Message ID | 20220511113035.27070-1-dpsmith@apertussolutions.com (mailing list archive) |
---|---|
Headers | show |
Series | Adds starting the idle domain privileged | expand |
On 5/11/22 07:30, Daniel P. Smith wrote: > This series makes it so that the idle domain is started privileged under the > default policy, which the SILO policy inherits, and under the flask policy. It > then introduces a new one-way XSM hook, xsm_transition_running, that is hooked > by an XSM policy to transition the idle domain to its running privilege level. > > Changes in v7: > - adjusted error message in default and flask xsm_set_system_active hooks > - merged panic messages in arm and x86 setup.c to a single line > Pinging to see if there are open issues I need to address or is the series acceptable? IIU I am missing an ACK on patch 1 of the series from x86 and sched maintainers. If it is already in your queues, apologies for the nag. V/r, Daniel P. Smith
On 30.05.2022 19:15, Daniel P. Smith wrote: > > On 5/11/22 07:30, Daniel P. Smith wrote: >> This series makes it so that the idle domain is started privileged under the >> default policy, which the SILO policy inherits, and under the flask policy. It >> then introduces a new one-way XSM hook, xsm_transition_running, that is hooked >> by an XSM policy to transition the idle domain to its running privilege level. >> >> Changes in v7: >> - adjusted error message in default and flask xsm_set_system_active hooks >> - merged panic messages in arm and x86 setup.c to a single line >> > > Pinging to see if there are open issues I need to address or is the > series acceptable? IIU I am missing an ACK on patch 1 of the series from > x86 and sched maintainers. And a REST maintainer ack (to stand in for the designated maintainer continuing to play dead). Also I notice your ping did include neither x86 nor sched maintainers as (at least) Cc. Jan