From: Tim Deegan <tim@xen.org>
To: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Cc: Keir Fraser <keir@xen.org>, Jan Beulich <jbeulich@suse.com>,
xen-devel@lists.xen.org
Subject: Re: [PATCH 23/23] xen/xsm: Add xsm_default parameter to XSM hooks
Date: Thu, 6 Dec 2012 09:51:35 +0000 [thread overview]
Message-ID: <20121206095135.GD82725@ocelot.phlegethon.org> (raw)
In-Reply-To: <1354289830-24642-24-git-send-email-dgdegra@tycho.nsa.gov>
At 10:37 -0500 on 30 Nov (1354271830), Daniel De Graaf wrote:
> Include the default XSM hook action as the first argument of the hook to
> facilitate quick understanding of how the call site is expected to be
> used (dom0-only, arbitrary guest, or device model). This argument does
> not solely define how a given hook is interpreted, since any changes to
> the hook's default action need to be made identically to all callers of
> a hook (if there are multiple callers; most hooks only have one), and
> may also require changing the arguments of the hook.
>
> Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
> Cc: Tim Deegan <tim@xen.org>
> Cc: Jan Beulich <jbeulich@suse.com>
> Cc: Keir Fraser <keir@xen.org>
Acked-by: Tim Deegan <tim@xen.org>
prev parent reply other threads:[~2012-12-06 9:51 UTC|newest]
Thread overview: 27+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-11-30 15:36 [PATCH v6] Merge IS_PRIV checks into XSM hooks Daniel De Graaf
2012-11-30 15:36 ` [PATCH 01/23] libxl: introduce XSM relabel on build Daniel De Graaf
2012-11-30 15:36 ` [PATCH 02/23] flask/policy: Add domain relabel example Daniel De Graaf
2012-11-30 15:36 ` [PATCH 03/23] arch/x86: add distinct XSM hooks for map/unmap Daniel De Graaf
2012-11-30 15:36 ` [PATCH 04/23] xsm/flask: Add checks on the domain performing the set_target operation Daniel De Graaf
2012-11-30 15:36 ` [PATCH 05/23] xsm: Use the dummy XSM module if XSM is disabled Daniel De Graaf
2012-11-30 15:36 ` [PATCH 06/23] xen: use XSM instead of IS_PRIV where duplicated Daniel De Graaf
2012-11-30 15:36 ` [PATCH 07/23] xen: avoid calling rcu_lock_*target_domain when an XSM hook exists Daniel De Graaf
2012-11-30 15:36 ` [PATCH 08/23] arch/x86: convert platform_hypercall to use XSM Daniel De Graaf
2012-11-30 15:36 ` [PATCH 09/23] xen: lock target domain in do_domctl common code Daniel De Graaf
2012-11-30 15:36 ` [PATCH 10/23] xen: convert do_domctl to use XSM Daniel De Graaf
2012-11-30 15:36 ` [PATCH 11/23] xen: convert do_sysctl " Daniel De Graaf
2012-11-30 15:36 ` [PATCH 12/23] xsm/flask: add missing hooks Daniel De Graaf
2012-11-30 15:37 ` [PATCH 13/23] xsm/flask: add distinct SIDs for self/target access Daniel De Graaf
2012-11-30 15:37 ` [PATCH 14/23] arch/x86: Add missing mem_sharing XSM hooks Daniel De Graaf
2012-11-30 15:37 ` [PATCH 15/23] arch/x86: use XSM hooks for get_pg_owner access checks Daniel De Graaf
2012-12-06 9:51 ` Tim Deegan
2012-11-30 15:37 ` [PATCH 16/23] xen: Add XSM hook for XENMEM_exchange Daniel De Graaf
2012-11-30 15:37 ` [PATCH 17/23] tmem: add XSM hooks Daniel De Graaf
2012-11-30 15:37 ` [PATCH 18/23] xen/arch/*: add struct domain parameter to arch_do_domctl Daniel De Graaf
2012-12-06 9:51 ` Tim Deegan
2012-11-30 15:37 ` [PATCH 19/23] flask: move policy headers into hypervisor Daniel De Graaf
2012-11-30 15:37 ` [PATCH 20/23] xen: domctl XSM hook removal Daniel De Graaf
2012-11-30 15:37 ` [PATCH 21/23] xen: sysctl " Daniel De Graaf
2012-11-30 15:37 ` [PATCH 22/23] xen: platform_hypercall " Daniel De Graaf
2012-11-30 15:37 ` [PATCH 23/23] xen/xsm: Add xsm_default parameter to XSM hooks Daniel De Graaf
2012-12-06 9:51 ` Tim Deegan [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20121206095135.GD82725@ocelot.phlegethon.org \
--to=tim@xen.org \
--cc=dgdegra@tycho.nsa.gov \
--cc=jbeulich@suse.com \
--cc=keir@xen.org \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).