[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

PING: [PATCH v7 0/2] Adds starting the idle domain privileged


  • To: xen-devel@xxxxxxxxxxxxxxxxxxxx
  • From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
  • Date: Mon, 30 May 2022 13:15:00 -0400
  • Arc-authentication-results: i=1; mx.zohomail.com; dkim=pass header.i=apertussolutions.com; spf=pass smtp.mailfrom=dpsmith@xxxxxxxxxxxxxxxxxxxx; dmarc=pass header.from=<dpsmith@xxxxxxxxxxxxxxxxxxxx>
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1653930989; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; bh=vEH37xc67Ijg3jQLE7drU5kLQbof2IZGxoa4VwC/JJA=; b=D9qHgPnBkg0LmOZqSpAamt8V/zydi9ktLdTaFijg/Av356APZpo19YH6diP7HQLe73ekgGXSy2ngF32+QI7M+6n/cZOPsIHgDVZYSx0OpnJYJ6rjZ2BpdeySU8oNXnq0jlo1vM+Z/aSt8NkNcmaYALqDHQetK+R1wJ+izGlRWhY=
  • Arc-seal: i=1; a=rsa-sha256; t=1653930989; cv=none; d=zohomail.com; s=zohoarc; b=FZSmp3w6yb9TuGGL/tLA4W9hnHp5WDTpLElYoQsekbmyhBNRVHFhfqRc75HGvMH8zYHkozukU9iQrJMFxY9VPjgbNe2iq00L8bv3e/wryT5KIjzlnSdaYOaMNFUYDSIdrjAV0ClK1Hfd/dy0hKoXhfJknzNw84gOsYnzHdJBLYg=
  • Cc: scott.davis@xxxxxxxxxx, jandryuk@xxxxxxxxx, christopher.clark@xxxxxxxxxx
  • Delivery-date: Mon, 30 May 2022 17:16:55 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 5/11/22 07:30, Daniel P. Smith wrote:
> This series makes it so that the idle domain is started privileged under the
> default policy, which the SILO policy inherits, and under the flask policy. It
> then introduces a new one-way XSM hook, xsm_transition_running, that is hooked
> by an XSM policy to transition the idle domain to its running privilege level.
> 
> Changes in v7:
> - adjusted error message in default and flask xsm_set_system_active hooks
> - merged panic messages in arm and x86 setup.c to a single line
> 

Pinging to see if there are open issues I need to address or is the
series acceptable? IIU I am missing an ACK on patch 1 of the series from
x86 and sched maintainers. If it is already in your queues, apologies
for the nag.

V/r,
Daniel P. Smith



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.