lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 6 Jul 2015 23:34:19 -0400 From: Boris Ostrovsky <boris.ostrovsky@...cle.com> To: david.vrabel@...rix.com, konrad.wilk@...cle.com Cc: roger.pau@...rix.com, elena.ufimtseva@...cle.com, stefano.stabellini@...citrix.com, tim@....org, jbeulich@...e.com, andrew.cooper3@...rix.com, ian.campbell@...rix.com, wei.liu2@...rix.com, ian.jackson@...citrix.com, xen-devel@...ts.xenproject.org, linux-kernel@...r.kernel.org, boris.ostrovsky@...cle.com Subject: [PATCH 0/6] 32-bit PVH domU support A set of PVH-related patches. The first patch is x86-64 ABI fix for PVH guests. The second is a small update that removes redundant memset (both on PV and PVH code paths) The rest is to enable non-privileged 32-bit PVH guests. This requires hypervisor patches from http://lists.xenproject.org/archives/html/xen-devel/2015-06/msg04817.html Boris Ostrovsky (6): xen/x86/pvh: Save %rbx in xen_pvh_early_cpu_init() xen/x86: Remove unnecessary memset() call xen/x86/pvh: Properly set page tables for 32-bit PVH guests xen/x86/pvh: Set up descriptors for 32-bit PVH guests xen/x86/pvh: Add 32-bit PVH initialization code xen/x86/pvh: Allow building 32-bit PVH guests arch/x86/xen/Kconfig | 2 +- arch/x86/xen/enlighten.c | 20 ++++++++++++-------- arch/x86/xen/mmu.c | 22 +++++++++++++--------- arch/x86/xen/smp.c | 21 ++++++++++++--------- arch/x86/xen/smp.h | 4 ++++ arch/x86/xen/xen-head.S | 29 +++++++++++++++++++++-------- 6 files changed, 63 insertions(+), 35 deletions(-) -- 1.8.1.4 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists