On 01/26/2017 08:55 AM, Paul Durrant wrote: >> -----Original Message----- >> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com] >> Sent: 26 January 2017 13:26 >> To: Paul Durrant <paul.durr...@citrix.com>; xen-de...@lists.xenproject.org >> Cc: Ian Jackson <ian.jack...@citrix.com>; Jennifer Herbert >> <jennifer.herb...@citrix.com>; Jan Beulich <jbeul...@suse.com> >> Subject: Re: [Xen-devel] [PATCH v8 1/8] public / x86: Introduce >> __HYPERCALL_dm_op... >> >> On 01/24/2017 10:27 AM, Paul Durrant wrote: >>> ...as a set of hypercalls to be used by a device model. >>> >>> As stated in the new docs/designs/dm_op.markdown: >>> >>> "The aim of DMOP is to prevent a compromised device model from >>> compromising domains other then the one it is associated with. (And is >>> therefore likely already compromised)." >>> >>> See that file for further information. >>> >>> This patch simply adds the boilerplate for the hypercall. >>> >>> Signed-off-by: Paul Durrant <paul.durr...@citrix.com> >>> Suggested-by: Ian Jackson <ian.jack...@citrix.com> >>> Suggested-by: Jennifer Herbert <jennifer.herb...@citrix.com> >>> Acked-by: Daniel De Graaf <dgde...@tycho.nsa.gov> >>> Acked-by: Wei Liu <wei.l...@citrix.com> >>> Reviewed-by: Andrew Cooper <andrew.coop...@citrix.com> >> This patch (and possibly others in the series) break FLASK-enabled build. > Boris, > > See the thread starting at > https://lists.xenproject.org/archives/html/xen-devel/2017-01/msg02721.html > > I believe Wei still awaiting an ack.
Ah, I missed that. Sorry about that. -boris _______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel