aboutsummaryrefslogtreecommitdiffstats
path: root/xen/common/domctl.c
diff options
context:
space:
mode:
authorDaniel De Graaf <dgdegra@tycho.nsa.gov>2012-01-28 13:49:05 +0000
committerDaniel De Graaf <dgdegra@tycho.nsa.gov>2012-01-28 13:49:05 +0000
commite60e5c9642a733ac951203e4d349ccb2609c97ef (patch)
treee8c8793fd78dad9b1eb0ce8d7f86b1731eedd953 /xen/common/domctl.c
parent4c4b722d452e99db6c42f356b8dd8f91f6a854da (diff)
downloadxen-e60e5c9642a733ac951203e4d349ccb2609c97ef.tar.gz
xen-e60e5c9642a733ac951203e4d349ccb2609c97ef.tar.bz2
xen-e60e5c9642a733ac951203e4d349ccb2609c97ef.zip
xen: use XSM instead of IS_PRIV for getdomaininfo
The XEN_DOMCTL_getdomaininfo domctl does not allow manipulation of domains, only basic information such as size and state, so its use does not fully justify making a domain privileged. XSM modules can also provide fine-grained control over what domains are visible to domains that call getdomaininfo. If XSM is disabled (either at compile time or by using the dummy XSM module) then there is no change in behavior: only IS_PRIV domains can use this domctl. If enabled, the XSM module controls access. Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov> Committed-by: Keir Fraser <keir@xen.org>
Diffstat (limited to 'xen/common/domctl.c')
-rw-r--r--xen/common/domctl.c4
1 files changed, 4 insertions, 0 deletions
diff --git a/xen/common/domctl.c b/xen/common/domctl.c
index 8001a916cc..904fb45e8f 100644
--- a/xen/common/domctl.c
+++ b/xen/common/domctl.c
@@ -264,6 +264,10 @@ long do_domctl(XEN_GUEST_HANDLE(xen_domctl_t) u_domctl)
return -EPERM;
break;
}
+#ifdef XSM_ENABLE
+ case XEN_DOMCTL_getdomaininfo:
+ break;
+#endif
default:
if ( !IS_PRIV(current->domain) )
return -EPERM;