lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 20 Sep 2012 14:30:26 +0100 From: Ian Campbell <Ian.Campbell@...rix.com> To: Marc Zyngier <marc.zyngier@....com> CC: Stefano Stabellini <Stefano.Stabellini@...citrix.com>, Pawel Moll <Pawel.Moll@....com>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "xen-devel@...ts.xensource.com" <xen-devel@...ts.xensource.com>, "konrad.wilk@...cle.com" <konrad.wilk@...cle.com>, "linux-arm-kernel@...ts.infradead.org" <linux-arm-kernel@...ts.infradead.org>, Arnd Bergmann <arnd@...db.de> Subject: Re: [PATCH] arm: introduce a DTS for Xen unprivileged virtual machines On Thu, 2012-09-20 at 13:28 +0100, Marc Zyngier wrote: > I think the important thing here is that the memory map is RS1. As this > is a (very limited) subset of a vexpress A15, it seems to make some sense. Looking at arch/arm/boot/dts/vexpress-v2m-rs1.dtsi I don't think we provide anything which is on rs1 though. The Xen VM environment has only a gic (via a combination of the gic virtualisation mode for CPU regs and emulation for the distributor), the arch timers and xenbus (which is the s/w bus which Xen uses to discover its paravirtualised peripherals). Currently we provide a very simple output only emulation of UART0, simply to get the debug output from the decompresser, but we want that to go away not get baked in. Ian. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists