aboutsummaryrefslogtreecommitdiffstats
path: root/xen/Rules.mk
diff options
context:
space:
mode:
authorkaf24@firebug.cl.cam.ac.uk <kaf24@firebug.cl.cam.ac.uk>2005-11-19 10:35:38 +0100
committerkaf24@firebug.cl.cam.ac.uk <kaf24@firebug.cl.cam.ac.uk>2005-11-19 10:35:38 +0100
commitac5d4d868f25ddd8ce58ca49c63e5aebd9d77597 (patch)
tree166ad67e2f274dd471542028d249f9546dfda39d /xen/Rules.mk
parentafb312d146f268bbf3e1f4f7bd7ff5a9f8c335ac (diff)
downloadxen-ac5d4d868f25ddd8ce58ca49c63e5aebd9d77597.tar.gz
xen-ac5d4d868f25ddd8ce58ca49c63e5aebd9d77597.tar.bz2
xen-ac5d4d868f25ddd8ce58ca49c63e5aebd9d77597.zip
Enable the Xen hypervisor ACM security policy to be determined at boot
time (instead of at compile time). Allows a single xen.gz binary to run under different security policy types, which simplifies distributions considerably. To this end, we replace the current single compile switch in Config.mk with the following two: 1. ACM_SECURITY (y/n) if "n", then the ACM is not compiled and no security policies can be configured at boot time. If "y", then the ACM is compiled and can be configured into any of the available policy types (null, chwall, ste, chwall_ste) by specifying a valid boot policy .bin file in the grub boot configuration. 2. ACM_DEFAULT_SECURITY_POLICY (null / chwall / ste / chwall_ste) specifies the policy into which Xen defaults in the case that security is enabled but no boot policy file is specified, or the specified policy file is invalid (wrong version, magic, corrupted, ...) While the type of the enabled policy (null, ste, ...) is decided once during boot for the whole boot cycle, the policy instantiation can be changed during operation as usual with the security tools. Signed-off by: Tomas Lendacky <toml@us.ibm.com> Signed-off by: Reiner Sailer <sailer@us.ibm.com>
Diffstat (limited to 'xen/Rules.mk')
-rw-r--r--xen/Rules.mk3
1 files changed, 2 insertions, 1 deletions
diff --git a/xen/Rules.mk b/xen/Rules.mk
index 484130c861..0f43b4efa9 100644
--- a/xen/Rules.mk
+++ b/xen/Rules.mk
@@ -37,8 +37,9 @@ OBJS += $(patsubst %.c,%.o,$(C_SRCS))
ALL_OBJS := $(BASEDIR)/common/common.o
ALL_OBJS += $(BASEDIR)/drivers/char/driver.o
ALL_OBJS += $(BASEDIR)/drivers/acpi/driver.o
-ifneq ($(ACM_USE_SECURITY_POLICY),ACM_NULL_POLICY)
+ifeq ($(ACM_SECURITY),y)
ALL_OBJS += $(BASEDIR)/acm/acm.o
+CFLAGS += -DACM_SECURITY
endif
ALL_OBJS += $(BASEDIR)/arch/$(TARGET_ARCH)/arch.o