On 10.09.2021 22:13, Daniel P. Smith wrote:
> --- a/xen/common/Kconfig
> +++ b/xen/common/Kconfig
> @@ -200,23 +200,20 @@ config XENOPROF
>  
>         If unsure, say Y.
>  
> -config XSM
> -     bool "Xen Security Modules support"
> +config XSM_CONFIGURABLE
> +     bool "Configure Xen Security Modules"
>       default ARM
> -     ---help---
> -       Enables the security framework known as Xen Security Modules which
> -       allows administrators fine-grained control over a Xen domain and
> -       its capabilities by defining permissible interactions between domains,
> -       the hypervisor itself, and related resources such as memory and
> -       devices.
> +     help
> +       Allows for configuring the Xen Security Modules (XSM) policy or 
> policies
> +       modules that will be availble and which will be the default.
>  
>         If unsure, say N.
>  
>  config XSM_FLASK
> -     def_bool y
> -     prompt "FLux Advanced Security Kernel support"
> -     depends on XSM
> -     ---help---
> +     bool "FLux Advanced Security Kernel support"
> +     depends on XSM_CONFIGURABLE
> +     select XSM_EVTCHN_LABELING
> +     help
>         Enables FLASK (FLux Advanced Security Kernel) as the access control
>         mechanism used by the XSM framework.  This provides a mandatory access
>         control framework by which security enforcement, isolation, and

I continue to think that the default here and ...

> @@ -253,10 +250,10 @@ config XSM_FLASK_POLICY
>         If unsure, say Y.
>  
>  config XSM_SILO
> -     def_bool y
> -     prompt "SILO support"
> -     depends on XSM
> -     ---help---
> +     bool "SILO support"
> +     default y if ARM
> +     depends on XSM_CONFIGURABLE
> +     help
>         Enables SILO as the access control mechanism used by the XSM 
> framework.
>         This is not the default module, add boot parameter xsm=silo to choose
>         it. This will deny any unmediated communication channels (grant tables

... here should not change. If it changes, the change needs justifying
in the description.

> @@ -282,15 +279,15 @@ endchoice
>  config LATE_HWDOM
>       bool "Dedicated hardware domain"
>       default n
> -     depends on XSM && X86
> -     ---help---
> +     depends on XSM_FLASK && X86
> +     help
>         Allows the creation of a dedicated hardware domain distinct from
>         domain 0 that manages devices without needing access to other
>         privileged functionality such as the ability to manage domains.
>         This requires that the actual domain 0 be a stub domain that
>         constructs the actual hardware domain instead of initializing the
>         hardware itself.  Because the hardware domain needs access to
> -       hypercalls not available to unprivileged guests, an XSM policy
> +       hypercalls not available to unprivileged guests, an XSM Flask policy
>         is required to properly define the privilege of these domains.

I also continue to think that this would better be a separate change.
Or if not, the seemingly unrelated change needs mentioning in the
description (to make clear it's not a stray change).

Jan


Reply via email to