From mboxrd@z Thu Jan 1 00:00:00 1970 From: Alan Cox Subject: Re: [linux-pm] [RFC] userland swsusp Date: Fri, 18 Nov 2005 22:07:15 +0000 Message-ID: <1132351635.5238.12.camel@localhost.localdomain> References: <20051115212942.GA9828@elf.ucw.cz> <20051115222549.GF17023@redhat.com> <1132342590.25914.86.camel@localhost.localdomain> <1132348998.2830.80.camel@laptopd505.fenrus.org> Mime-Version: 1.0 Content-Type: text/plain Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <1132348998.2830.80.camel@laptopd505.fenrus.org> Sender: linux-kernel-owner@vger.kernel.org To: Arjan van de Ven Cc: Dave Jones , Pavel Machek , kernel list , "Rafael J. Wysocki" , Linux-pm mailing list List-Id: linux-pm@vger.kernel.org On Gwe, 2005-11-18 at 22:23 +0100, Arjan van de Ven wrote: > 1) accessing non-ram memory (eg PCI mmio space) by X and the likes > (ideally should use sysfs but hey, changing X for this will take > forever) Once sysfs supports the relevant capabilities fixing X actually doesn't look too horrible, the PCI mapping routines are abstracted and done by PCITAG (ie PCI device). You would need the ISA hole too in some cases. > 2) accessing bios memory in the lower 1Gb for various emulation like > purposes (including vbetool and X mode setting) > 3) accessing things the kernel sees as RAM > > they are very distinct security wise. Agreed.