* question about XSM hooks
@ 2009-07-22 6:36 ` tianshuo06
2009-07-22 8:25 ` Patrick Colp
0 siblings, 1 reply; 2+ messages in thread
From: tianshuo06 @ 2009-07-22 6:36 UTC (permalink / raw)
To: xen-devel
[-- Attachment #1.1: Type: text/plain, Size: 450 bytes --]
1. did XSM hooks are placed in the source code of xen manually?
As we all know, the hooks are used to insert authorization checks on the security-critical operation, now my question is,
2. how to identify security-critical operation?
security-critical operations are inter-VM communication and cooperation implementing on top of shared virtual resources,
3. does the XSM hooks cover all the operations completely?
thanks.
tianshuo06
2009-07-22
[-- Attachment #1.2: Type: text/html, Size: 1252 bytes --]
[-- Attachment #2: Type: text/plain, Size: 138 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: question about XSM hooks
2009-07-22 6:36 ` tianshuo06
@ 2009-07-22 8:25 ` Patrick Colp
0 siblings, 0 replies; 2+ messages in thread
From: Patrick Colp @ 2009-07-22 8:25 UTC (permalink / raw)
To: tianshuo06; +Cc: xen-devel
> 1. did XSM hooks are placed in the source code of xen manually?
Yes.
> 2. how to identify security-critical operation?
This is why the answer to 1 is yes. It requires reasoning about what different
security policies might want to enforce, what might be exploitable or could lead
to convert channels, etc.
> 3. does the XSM hooks cover all the operations completely?
Probably not. Certainly not with new features, anyway.
Patrick
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2009-07-22 8:25 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2009-07-22 6:36 question about XSM hooks tianshuo06
2009-07-22 6:36 ` tianshuo06
2009-07-22 8:25 ` Patrick Colp
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.