This allows the security label of stub domains to be specified.
Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Acked-by: Ian Jackson <ian.jackson@eu.citrix.com>
Committed-by: Ian Jackson <ian.jackson@eu.citrix.com>
be automatically selected based upon the other features and options
you have selected.
+=item B<device_model_stubdomain_seclabel="LABEL">
+
+Assign an XSM security label to the device-model stubdomain.
+
=item B<device_model_args=[ "ARG", "ARG", ...]>
Pass additional arbitrary options on the devide-model command
dm_config.c_info.type = LIBXL_DOMAIN_TYPE_PV;
dm_config.c_info.name = libxl__sprintf(gc, "%s-dm",
libxl__domid_to_name(gc, guest_domid));
+ dm_config.c_info.ssidref = guest_config->b_info.device_model_ssidref;
libxl_uuid_generate(&dm_config.c_info.uuid);
("device_model_stubdomain", bool),
# you set device_model you must set device_model_version too
("device_model", string),
+ ("device_model_ssidref", uint32),
# extra parameters pass directly to qemu, NULL terminated
("extra", libxl_string_list),
if (!xlu_cfg_get_long (config, "device_model_stubdomain_override", &l, 0))
b_info->device_model_stubdomain = l;
+ if (!xlu_cfg_get_string (config, "device_model_stubdomain_seclabel",
+ &buf, 0)) {
+ e = libxl_flask_context_to_sid(ctx, (char *)buf, strlen(buf),
+ &b_info->device_model_ssidref);
+ if (e) {
+ if (errno == ENOSYS) {
+ fprintf(stderr, "XSM Disabled:"
+ " device_model_stubdomain_seclabel not supported\n");
+ } else {
+ fprintf(stderr, "Invalid device_model_stubdomain_seclabel:"
+ " %s\n", buf);
+ exit(1);
+ }
+ }
+ }
#define parse_extra_args(type) \
e = xlu_cfg_get_list_as_string_list(config, "device_model_args"#type, \
&b_info->extra##type, 0); \