[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [Embedded-pv-devel] [PATCH RFC 00/18] System adjustment to customer needs.
> If a malicious user has access to the Android guest (via USB key, wifi,...) > he would be able to crash the platform using the GPU because there is no > SMMU protection. That's why we are shadowing GPU MMU translation tables in xen heap. And this is leaded us to need of [PATCH RFC 18/18] arm: Add ability to allocate Xen heap in lowmem. Patche for GPU MMU shadowing is not published yet, I still have to check if it lacks of proprietary information. Andrii Anisov | Associate Manager, Engineering GlobalLogic Kyiv, 03038, Protasov Business Park, M.Grinchenka, 2/1 P +38.044.492.9695x3664 M +380505738852 S andriyanisov www.globallogic.com http://www.globallogic.com/email_disclaimer.txt _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |