On 01/26/2017 08:55 AM, Paul Durrant wrote:
>> -----Original Message-----
>> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
>> Sent: 26 January 2017 13:26
>> To: Paul Durrant <paul.durr...@citrix.com>; xen-de...@lists.xenproject.org
>> Cc: Ian Jackson <ian.jack...@citrix.com>; Jennifer Herbert
>> <jennifer.herb...@citrix.com>; Jan Beulich <jbeul...@suse.com>
>> Subject: Re: [Xen-devel] [PATCH v8 1/8] public / x86: Introduce
>> __HYPERCALL_dm_op...
>>
>> On 01/24/2017 10:27 AM, Paul Durrant wrote:
>>> ...as a set of hypercalls to be used by a device model.
>>>
>>> As stated in the new docs/designs/dm_op.markdown:
>>>
>>> "The aim of DMOP is to prevent a compromised device model from
>>> compromising domains other then the one it is associated with. (And is
>>> therefore likely already compromised)."
>>>
>>> See that file for further information.
>>>
>>> This patch simply adds the boilerplate for the hypercall.
>>>
>>> Signed-off-by: Paul Durrant <paul.durr...@citrix.com>
>>> Suggested-by: Ian Jackson <ian.jack...@citrix.com>
>>> Suggested-by: Jennifer Herbert <jennifer.herb...@citrix.com>
>>> Acked-by: Daniel De Graaf <dgde...@tycho.nsa.gov>
>>> Acked-by: Wei Liu <wei.l...@citrix.com>
>>> Reviewed-by: Andrew Cooper <andrew.coop...@citrix.com>
>> This patch (and possibly others in the series) break FLASK-enabled build.
> Boris,
>
>   See the thread starting at 
> https://lists.xenproject.org/archives/html/xen-devel/2017-01/msg02721.html
>
>   I believe Wei still awaiting an ack.


Ah, I missed that. Sorry about that.

-boris

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

Reply via email to