[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [v2 0/3] xsm: refactor and optimize policy loading


  • To: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Tue, 31 May 2022 10:25:22 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=XiG6PFZfhjVGsIA/wdDcU84fErX3fpItHievOS/np0w=; b=mAoQKyzehSjfAX7avLBJRLYHVy8UoazmKrgG/1S/JwZgazV525Gh824U4OrzP1ivHYyj+DdNy3j39S+vpjCHfmCAXQxxS9bgZ5vX83vyYpqzRVW162PFK3zR8uiyh3lB1lq4MqmVkMQHR8bfwX1TP7RehIBaCLEcIRnNX3/7nyELCQ/LkcI/ZgtgElpul8tGsY5QP6xIodA53iPEv4AUWpfr/PyvAB6iGcicYRGNFt0d1yGbeA2K6h4V0pL5fAwqE+GBPOfhmaC72FWy1kk5+n9XeSQgaO+Co2cEKFPH8g8qvy0tPJVXdI8w1de3n/jRfZjfFOr6h3djK6qf/l0XNQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=aipddmgkwVdHdZtf2wqN1R0q6r4txLSsdCtKp8QnJprjeDmGGQwTNIu1ttY8ZZoVrCuGRAX9SZFc+X//dbAI9lWZKaGl4dab024appP/AHwh/qEgYI7OIXEC6yicsJNCqpiGnp1CNGPGq6rfkCNFQqP73Ji6ciOQla3eMv2DBScxHd0I8tk2HSrdPCLNEGCTdmaAtRe4YKkc5sFzoC+mZ37FLGO2qvvw3q8hyQ0fzMLV6bfhqmuNhh4PhOeEsKX5BIA+Z3DzOgDjXs+jnpsWwuB0BUlYVwAYDak3OSVMCO5lZ/8fjJn0DDlvgHlexrkjrQffQHTc6X8yNrXf8B8xXw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: scott.davis@xxxxxxxxxx, christopher.clark@xxxxxxxxxx, jandryuk@xxxxxxxxx, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Tue, 31 May 2022 08:25:31 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 31.05.2022 04:39, Daniel P. Smith wrote:
> This series was born out of some cleanup work done while crafting the
> hyperlaunch boot modules patch series. The primary purpose of this series was
> to stop walking all boot modules when it was not necessary, but the scope
> creeped during review.
> 
> Changes in v2:
> * changed init_policy to policy_file_required
> * split the patch into a series
> * corrected casting of policy buffer
> * use IS_ENABLED() instead of #ifdef sequence
> * moved #ifdef inside of braces for xsm_dt_policy_init()
> * addressed lack of error handling of xsm{mb,dt}_init()
> 
> Daniel P. Smith (3):
>   xsm: only search for a policy file when needed
>   xsm: consolidate loading the policy buffer
>   xsm: properly handle error from XSM init

The thread consists of 5 follow-ups, including two different 1/3 and two
different 2/3. This wants sorting and then perhaps (properly) resending.

Jan




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.