diff options
author | Daniel De Graaf <dgdegra@tycho.nsa.gov> | 2011-12-18 14:32:49 +0000 |
---|---|---|
committer | Daniel De Graaf <dgdegra@tycho.nsa.gov> | 2011-12-18 14:32:49 +0000 |
commit | d55b4c2dc629e9460d72c17bb2b0fa2028123199 (patch) | |
tree | 4cd67b8e40ebdc81548f58a715589810cddbfd7d /xen/xsm | |
parent | 2132cbee537186dbd88917b9d69dce9857f86dbb (diff) | |
download | xen-d55b4c2dc629e9460d72c17bb2b0fa2028123199.tar.gz xen-d55b4c2dc629e9460d72c17bb2b0fa2028123199.tar.bz2 xen-d55b4c2dc629e9460d72c17bb2b0fa2028123199.zip |
xsm: only log dummy override if not setting up dummy_xsm_ops
The log messages from dummy overrides appear on every boot with XSM
enabled, and are just noise when filling in the dummy_xsm_ops
structure.
Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Diffstat (limited to 'xen/xsm')
-rw-r--r-- | xen/xsm/dummy.c | 17 |
1 files changed, 9 insertions, 8 deletions
diff --git a/xen/xsm/dummy.c b/xen/xsm/dummy.c index a629396afe..d6f2da023f 100644 --- a/xen/xsm/dummy.c +++ b/xen/xsm/dummy.c @@ -469,14 +469,15 @@ static int dummy_ioport_permission (struct domain *d, uint32_t s, uint32_t e, ui struct xsm_operations dummy_xsm_ops; -#define set_to_dummy_if_null(ops, function) \ - do { \ - if ( !ops->function ) \ - { \ - ops->function = dummy_##function; \ - dprintk(XENLOG_DEBUG, "Had to override the " #function \ - " security operation with the dummy one.\n"); \ - } \ +#define set_to_dummy_if_null(ops, function) \ + do { \ + if ( !ops->function ) \ + { \ + ops->function = dummy_##function; \ + if (ops != &dummy_xsm_ops) \ + dprintk(XENLOG_DEBUG, "Had to override the " #function \ + " security operation with the dummy one.\n"); \ + } \ } while (0) void xsm_fixup_ops (struct xsm_operations *ops) |