diff options
author | Daniel De Graaf <dgdegra@tycho.nsa.gov> | 2012-01-28 13:49:05 +0000 |
---|---|---|
committer | Daniel De Graaf <dgdegra@tycho.nsa.gov> | 2012-01-28 13:49:05 +0000 |
commit | e60e5c9642a733ac951203e4d349ccb2609c97ef (patch) | |
tree | e8c8793fd78dad9b1eb0ce8d7f86b1731eedd953 /xen/common/domctl.c | |
parent | 4c4b722d452e99db6c42f356b8dd8f91f6a854da (diff) | |
download | xen-e60e5c9642a733ac951203e4d349ccb2609c97ef.tar.gz xen-e60e5c9642a733ac951203e4d349ccb2609c97ef.tar.bz2 xen-e60e5c9642a733ac951203e4d349ccb2609c97ef.zip |
xen: use XSM instead of IS_PRIV for getdomaininfo
The XEN_DOMCTL_getdomaininfo domctl does not allow manipulation of
domains, only basic information such as size and state, so its use
does not fully justify making a domain privileged. XSM modules can
also provide fine-grained control over what domains are visible to
domains that call getdomaininfo.
If XSM is disabled (either at compile time or by using the dummy XSM
module) then there is no change in behavior: only IS_PRIV domains can
use this domctl. If enabled, the XSM module controls access.
Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Committed-by: Keir Fraser <keir@xen.org>
Diffstat (limited to 'xen/common/domctl.c')
-rw-r--r-- | xen/common/domctl.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/xen/common/domctl.c b/xen/common/domctl.c index 8001a916cc..904fb45e8f 100644 --- a/xen/common/domctl.c +++ b/xen/common/domctl.c @@ -264,6 +264,10 @@ long do_domctl(XEN_GUEST_HANDLE(xen_domctl_t) u_domctl) return -EPERM; break; } +#ifdef XSM_ENABLE + case XEN_DOMCTL_getdomaininfo: + break; +#endif default: if ( !IS_PRIV(current->domain) ) return -EPERM; |