xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: Tim Deegan <tim@xen.org>
To: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Cc: Keir Fraser <keir@xen.org>, Jan Beulich <jbeulich@suse.com>,
	xen-devel@lists.xen.org
Subject: Re: [PATCH 23/23] xen/xsm: Add xsm_default parameter to XSM hooks
Date: Thu, 6 Dec 2012 09:51:35 +0000	[thread overview]
Message-ID: <20121206095135.GD82725@ocelot.phlegethon.org> (raw)
In-Reply-To: <1354289830-24642-24-git-send-email-dgdegra@tycho.nsa.gov>

At 10:37 -0500 on 30 Nov (1354271830), Daniel De Graaf wrote:
> Include the default XSM hook action as the first argument of the hook to
> facilitate quick understanding of how the call site is expected to be
> used (dom0-only, arbitrary guest, or device model). This argument does
> not solely define how a given hook is interpreted, since any changes to
> the hook's default action need to be made identically to all callers of
> a hook (if there are multiple callers; most hooks only have one), and
> may also require changing the arguments of the hook.
> 
> Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
> Cc: Tim Deegan <tim@xen.org>
> Cc: Jan Beulich <jbeulich@suse.com>
> Cc: Keir Fraser <keir@xen.org>

Acked-by: Tim Deegan <tim@xen.org>

      reply	other threads:[~2012-12-06  9:51 UTC|newest]

Thread overview: 27+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-11-30 15:36 [PATCH v6] Merge IS_PRIV checks into XSM hooks Daniel De Graaf
2012-11-30 15:36 ` [PATCH 01/23] libxl: introduce XSM relabel on build Daniel De Graaf
2012-11-30 15:36 ` [PATCH 02/23] flask/policy: Add domain relabel example Daniel De Graaf
2012-11-30 15:36 ` [PATCH 03/23] arch/x86: add distinct XSM hooks for map/unmap Daniel De Graaf
2012-11-30 15:36 ` [PATCH 04/23] xsm/flask: Add checks on the domain performing the set_target operation Daniel De Graaf
2012-11-30 15:36 ` [PATCH 05/23] xsm: Use the dummy XSM module if XSM is disabled Daniel De Graaf
2012-11-30 15:36 ` [PATCH 06/23] xen: use XSM instead of IS_PRIV where duplicated Daniel De Graaf
2012-11-30 15:36 ` [PATCH 07/23] xen: avoid calling rcu_lock_*target_domain when an XSM hook exists Daniel De Graaf
2012-11-30 15:36 ` [PATCH 08/23] arch/x86: convert platform_hypercall to use XSM Daniel De Graaf
2012-11-30 15:36 ` [PATCH 09/23] xen: lock target domain in do_domctl common code Daniel De Graaf
2012-11-30 15:36 ` [PATCH 10/23] xen: convert do_domctl to use XSM Daniel De Graaf
2012-11-30 15:36 ` [PATCH 11/23] xen: convert do_sysctl " Daniel De Graaf
2012-11-30 15:36 ` [PATCH 12/23] xsm/flask: add missing hooks Daniel De Graaf
2012-11-30 15:37 ` [PATCH 13/23] xsm/flask: add distinct SIDs for self/target access Daniel De Graaf
2012-11-30 15:37 ` [PATCH 14/23] arch/x86: Add missing mem_sharing XSM hooks Daniel De Graaf
2012-11-30 15:37 ` [PATCH 15/23] arch/x86: use XSM hooks for get_pg_owner access checks Daniel De Graaf
2012-12-06  9:51   ` Tim Deegan
2012-11-30 15:37 ` [PATCH 16/23] xen: Add XSM hook for XENMEM_exchange Daniel De Graaf
2012-11-30 15:37 ` [PATCH 17/23] tmem: add XSM hooks Daniel De Graaf
2012-11-30 15:37 ` [PATCH 18/23] xen/arch/*: add struct domain parameter to arch_do_domctl Daniel De Graaf
2012-12-06  9:51   ` Tim Deegan
2012-11-30 15:37 ` [PATCH 19/23] flask: move policy headers into hypervisor Daniel De Graaf
2012-11-30 15:37 ` [PATCH 20/23] xen: domctl XSM hook removal Daniel De Graaf
2012-11-30 15:37 ` [PATCH 21/23] xen: sysctl " Daniel De Graaf
2012-11-30 15:37 ` [PATCH 22/23] xen: platform_hypercall " Daniel De Graaf
2012-11-30 15:37 ` [PATCH 23/23] xen/xsm: Add xsm_default parameter to XSM hooks Daniel De Graaf
2012-12-06  9:51   ` Tim Deegan [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20121206095135.GD82725@ocelot.phlegethon.org \
    --to=tim@xen.org \
    --cc=dgdegra@tycho.nsa.gov \
    --cc=jbeulich@suse.com \
    --cc=keir@xen.org \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).