config XSM_POLICY
bool "Compile Xen with a built-in security policy"
default y if HAS_CHECKPOLICY = "y"
- depends on XSM
+ depends on FLASK
---help---
This includes a default XSM policy in the hypervisor so that the
bootloader does not need to load a policy to get sane behavior from an
If unsure, say Y.
-config XSM_SILO
+config SILO
def_bool y
prompt "SILO support"
depends on XSM
choice
prompt "Default XSM implementation"
depends on XSM
- default XSM_SILO_DEFAULT if XSM_SILO && ARM
- default XSM_FLASK_DEFAULT if XSM_FLASK
- default XSM_SILO_DEFAULT if XSM_SILO
+ default XSM_SILO_DEFAULT if SILO && ARM
+ default XSM_FLASK_DEFAULT if FLASK
+ default XSM_SILO_DEFAULT if SILO
default XSM_DUMMY_DEFAULT
config XSM_DUMMY_DEFAULT
bool "Match non-XSM behavior"
config XSM_FLASK_DEFAULT
- bool "FLux Advanced Security Kernel" if XSM_FLASK
+ bool "FLux Advanced Security Kernel" if FLASK
config XSM_SILO_DEFAULT
- bool "SILO" if XSM_SILO
+ bool "SILO" if SILO
endchoice
config LATE_HWDOM
extern const unsigned int xsm_init_policy_size;
#endif
-#ifdef CONFIG_XSM_SILO
+#ifdef CONFIG_SILO
extern void silo_init(void);
#else
static inline void silo_init(void) {}
obj-y += xsm_core.o
obj-$(CONFIG_XSM) += xsm_policy.o
obj-$(CONFIG_XSM) += dummy.o
-obj-$(CONFIG_XSM_SILO) += silo.o
+obj-$(CONFIG_SILO) += silo.o
subdir-$(CONFIG_FLASK) += flask
};
static enum xsm_bootparam __initdata xsm_bootparam =
-#ifdef CONFIG_XSM_FLASK_DEFAULT
+#if defined(CONFIG_XSM_FLASK_DEFAULT)
XSM_BOOTPARAM_FLASK;
-#elif CONFIG_XSM_SILO_DEFAULT
+#elif defined(CONFIG_XSM_SILO_DEFAULT)
XSM_BOOTPARAM_SILO;
#else
XSM_BOOTPARAM_DUMMY;
if ( !strcmp(s, "dummy") )
xsm_bootparam = XSM_BOOTPARAM_DUMMY;
-#ifdef CONFIG_XSM_FLASK
+#ifdef CONFIG_FLASK
else if ( !strcmp(s, "flask") )
xsm_bootparam = XSM_BOOTPARAM_FLASK;
#endif
-#ifdef CONFIG_XSM_SILO
+#ifdef CONFIG_SILO
else if ( !strcmp(s, "silo") )
xsm_bootparam = XSM_BOOTPARAM_SILO;
#endif