lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 4 Dec 2014 10:02:25 +0000 From: Peter Maydell <peter.maydell@...aro.org> To: Eric Auger <eric.auger@...aro.org> Cc: eric.auger@...com, Christoffer Dall <christoffer.dall@...aro.org>, Marc Zyngier <marc.zyngier@....com>, arm-mail-list <linux-arm-kernel@...ts.infradead.org>, "kvmarm@...ts.cs.columbia.edu" <kvmarm@...ts.cs.columbia.edu>, kvm-devel <kvm@...r.kernel.org>, Alex Williamson <alex.williamson@...hat.com>, Alexander Graf <agraf@...e.de>, "gleb@...nel.org" <gleb@...nel.org>, Paolo Bonzini <pbonzini@...hat.com>, lkml - Kernel Mailing List <linux-kernel@...r.kernel.org>, Patch Tracking <patches@...aro.org> Subject: Re: [PATCH] KVM: arm/arm64: vgic: add init entry to VGIC KVM device On 2 December 2014 at 17:54, Eric Auger <eric.auger@...aro.org> wrote: > as soon as VFIO signaling is set up (the device IRQ index is linked to > an eventfd, the physical IRQ VFIO handler is installed and the physical > IRQ is enabled at interrupt controller level), virtual IRQs are likely > to be injected. With current QEMU code, we setup this VFIO signaling > *before* the vgic readiness (either on machine init done or reset > notifier) and we face that issue of early injection. QEMU related > patches to follow ... So can you describe in QEMU terms how the lifecycle of these things works? How do we ensure that we don't start trying to inject VFIO IRQs before we've even created the vgic, for instance? thanks -- PMM -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists