(+ Daniel De Graaf maintainer of the XSM/Flask code)

On 16/03/16 20:51, Benjamin Sanda wrote:
From: bensanda <ben.sa...@dornerworks.com>

Modified to provide support for xentrace on the ARM platform. Added flask 
credential to allow dom0 dom_xen mapping and write access for trace buffers.

Signed-off-by: Benjamin Sanda <ben.sa...@dornerworks.com>
---
  tools/flask/policy/policy/modules/xen/xen.te | 2 ++
  1 file changed, 2 insertions(+)

diff --git a/tools/flask/policy/policy/modules/xen/xen.te 
b/tools/flask/policy/policy/modules/xen/xen.te
index d35ae22..41d276a 100644
--- a/tools/flask/policy/policy/modules/xen/xen.te
+++ b/tools/flask/policy/policy/modules/xen/xen.te
@@ -90,6 +90,8 @@ allow dom0_t dom0_t:domain2 {
  };
  allow dom0_t dom0_t:resource { add remove };

+allow dom0_t domxen_t:mmu { memorymap map_write };
+
  # These permissions allow using the FLASK security server to compute access
  # checks locally, which could be used by a domain or service (such as 
xenstore)
  # that does not have its own security server to make access decisions based on


--
Julien Grall

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

Reply via email to