From: Keir Fraser <keir@xen.org>
To: Ian Campbell <Ian.Campbell@citrix.com>,
Daniel De Graaf <dgdegra@tycho.nsa.gov>
Cc: "xen-devel@lists.xen.org" <xen-devel@lists.xen.org>
Subject: Re: [PATCH v7 00/22] Merge IS_PRIV checks into XSM hooks
Date: Fri, 11 Jan 2013 13:47:41 +0000 [thread overview]
Message-ID: <CD15C87D.583A8%keir@xen.org> (raw)
In-Reply-To: <1357905858.20328.52.camel@zakaz.uk.xensource.com>
On 11/01/2013 12:04, "Ian Campbell" <Ian.Campbell@citrix.com> wrote:
> I see Keir has applied a bunch of these but now my builds are failing
> with:
Should be fixed now.
-- Keir
> ld -melf_x86_64 -T xen.lds -N prelink.o \
> /local/scratch/ianc/devel/committer.git/xen/common/symbols-dummy.o -o
> /local/scratch/ianc/devel/committer.git/xen/.xen-syms.0
> prelink.o: In function `xsm_default_action':
> /local/scratch/ianc/devel/committer.git/xen/include/xsm/dummy.h:75: undefined
> reference to `__xsm_action_mismatch_detected'
> /local/scratch/ianc/devel/committer.git/xen/include/xsm/dummy.h:75: relocation
> truncated to fit: R_X86_64_PC32 against undefined symbol
> `__xsm_action_mismatch_detected'
> /local/scratch/ianc/devel/committer.git/xen/include/xsm/dummy.h:75: undefined
> reference to `__xsm_action_mismatch_detected'
> /local/scratch/ianc/devel/committer.git/xen/include/xsm/dummy.h:75: relocation
> truncated to fit: R_X86_64_PC32 against undefined symbol
> `__xsm_action_mismatch_detected'
> [...lots more...]
>
> Ian.
>
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@lists.xen.org
> http://lists.xen.org/xen-devel
prev parent reply other threads:[~2013-01-11 13:47 UTC|newest]
Thread overview: 28+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-01-10 15:33 [PATCH v7 00/22] Merge IS_PRIV checks into XSM hooks Daniel De Graaf
2013-01-10 15:33 ` [PATCH 01/22] xsm: Use the dummy XSM module if XSM is disabled Daniel De Graaf
2013-01-10 15:33 ` [PATCH 02/22] flask: move policy headers into hypervisor Daniel De Graaf
2013-01-10 15:33 ` [PATCH 03/22] arch/x86: add distinct XSM hooks for map/unmap Daniel De Graaf
2013-01-10 15:33 ` [PATCH 04/22] xen: use XSM instead of IS_PRIV where duplicated Daniel De Graaf
2013-01-10 15:33 ` [PATCH 05/22] xen: avoid calling rcu_lock_*target_domain when an XSM hook exists Daniel De Graaf
2013-01-10 15:33 ` [PATCH 06/22] xen: convert do_domctl to use XSM Daniel De Graaf
2013-01-10 15:33 ` [PATCH 07/22] xen: convert do_sysctl " Daniel De Graaf
2013-01-10 15:33 ` [PATCH 08/22] arch/x86: convert platform_hypercall " Daniel De Graaf
2013-01-10 15:33 ` [PATCH 09/22] xsm/flask: Add checks on the domain performing the set_target operation Daniel De Graaf
2013-01-10 15:33 ` [PATCH 10/22] xsm/flask: add missing hooks Daniel De Graaf
2013-01-10 15:33 ` [PATCH 11/22] xsm/flask: add distinct SIDs for self/target access Daniel De Graaf
2013-01-10 15:33 ` [PATCH 12/22] arch/x86: Add missing mem_sharing XSM hooks Daniel De Graaf
2013-01-10 15:33 ` [PATCH 13/22] arch/x86: use XSM hooks for get_pg_owner access checks Daniel De Graaf
2013-01-10 15:33 ` [PATCH 14/22] xen: add XSM hook for XENMEM_exchange Daniel De Graaf
2013-01-10 15:33 ` [PATCH 15/22] xen: domctl XSM hook removal Daniel De Graaf
2013-01-10 15:33 ` [PATCH 16/22] xen: sysctl " Daniel De Graaf
2013-01-10 15:33 ` [PATCH 17/22] xen: platform_hypercall " Daniel De Graaf
2013-01-10 15:33 ` [PATCH 18/22] xen/xsm: Add xsm_default parameter to XSM hooks Daniel De Graaf
2013-01-10 15:33 ` [PATCH 19/22] tmem: add " Daniel De Graaf
2013-01-10 15:33 ` [PATCH 20/22] xen/xsm: distinguish scheduler get/set operations Daniel De Graaf
2013-01-15 16:50 ` George Dunlap
2013-01-10 15:33 ` [PATCH 21/22] xsm/flask: document the access vectors Daniel De Graaf
2013-01-10 15:33 ` [PATCH 22/22] xsm/flask: remove unused permissions Daniel De Graaf
2013-01-11 12:04 ` [PATCH v7 00/22] Merge IS_PRIV checks into XSM hooks Ian Campbell
2013-01-11 12:10 ` Ian Campbell
2013-01-11 13:27 ` Keir Fraser
2013-01-11 13:47 ` Keir Fraser [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=CD15C87D.583A8%keir@xen.org \
--to=keir@xen.org \
--cc=Ian.Campbell@citrix.com \
--cc=dgdegra@tycho.nsa.gov \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).