[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: PING: [PATCH v7 0/2] Adds starting the idle domain privileged


  • To: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Tue, 31 May 2022 10:22:17 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=4mGml9iN/Ky/RiMOrdboD8kbCJsxPinu45pIM4N7ZUQ=; b=X6XQjAR5SkEaiJQIy4DCMcOYfyjeztU2KqGAhPpNuKD41Wty3sivnEUsbyxYEflLMGz1NDOQtjztEO6y2Q7PWuRN6Yx5jmfaEJFvgqXBteuW3rgkIrVsHuKN7FD7f5oUXerrcFxU34hdH4hJ6nFkkPijqGZr3YP5ShHHk2IH4RHCIbKxJOPrOllhnwWio0eYg3Pi+Jy0g1jamTT5FTEOrbmn0ikGL9+GD8FDBanpGDAp3KFfR0Lo8uLaofj7rP4l5zhqAaBb3Q/5lpidbMIGKrvv9mEbmlUS7OBxich74o2YH9k4d4mx4T4/rCCQDYcNajnLgsVGgZ4lpd0Q6Ivp0w==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XiWyUQt4M2PHCaVwG11YnRU9IEcu0fuwWqV7axrmrY2tdLxN4uQEhTdy4Y0vWdZnW3p2udoZXDPmftzdW/bu7S1cKc+K8wpA1BfaLs9IxWoDacY9hoWQ0Y0/kVi3UhITReHg/LYaEATHiodgA5oXEd08pda0qmQIeALqa9hkImXhW3D1IvKnmJuqe8xaJv+MknXO/SrhuNIZhoikd7jmdvN6DUXLXT71kykzghbzvIwMSmH/T7y/Bjd7/a+OUP7fgc55HbDvMo8igvgFfFtHQw60QRPObdTbY3ndjEaVkelJ57dLvzMtsBgDz/NjCKCAStqdMxE9z+zb7tjTk+RO1g==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: scott.davis@xxxxxxxxxx, jandryuk@xxxxxxxxx, christopher.clark@xxxxxxxxxx, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Tue, 31 May 2022 08:22:25 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 30.05.2022 19:15, Daniel P. Smith wrote:
> 
> On 5/11/22 07:30, Daniel P. Smith wrote:
>> This series makes it so that the idle domain is started privileged under the
>> default policy, which the SILO policy inherits, and under the flask policy. 
>> It
>> then introduces a new one-way XSM hook, xsm_transition_running, that is 
>> hooked
>> by an XSM policy to transition the idle domain to its running privilege 
>> level.
>>
>> Changes in v7:
>> - adjusted error message in default and flask xsm_set_system_active hooks
>> - merged panic messages in arm and x86 setup.c to a single line
>>
> 
> Pinging to see if there are open issues I need to address or is the
> series acceptable? IIU I am missing an ACK on patch 1 of the series from
> x86 and sched maintainers.

And a REST maintainer ack (to stand in for the designated maintainer continuing
to play dead).

Also I notice your ping did include neither x86 nor sched maintainers as (at
least) Cc.

Jan




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.