[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xense-devel] RE: [Xen-devel] [PATCH] Intel(R) Trusted Execution Technology support



On Monday, October 29, 2007 11:47 AM, Keir Fraser wrote:
> On 29/10/07 18:34, "Cihula, Joseph" <joseph.cihula@xxxxxxxxx> wrote:
> 
>>> Okay, we should limit the scan to page-aligned addresses in UNUSABLE
regions
>>> below 1MB. It makes sense to put the UNUSABLE->RESERVED hack in Xen
itself,
>>> rather than in tboot. Once the interface is baked into 3.2.0 it's
not
>>> changing on our side.
>> 
>> I'd like to allow for the shared page to be moved to a higher memory
>> location in the future, so I'd prefer not to limit the search to
below
>> 1MB.  Since only tboot is using the UNUSABLE type and it should find
the
>> shared page in the first UNUSABLE section anyway (whether it gets
moved
>> or not), the search should still be quick.  Also, I'll only change
the
>> type from UNUSABLE->RESERVED if it is found in the lower 1MB.
> 
> Actually I have a better idea to avoid the scan entirely. tboot should
> append 'tboot=<address of shared area>' to Xen's command line (e.g.,
> tboot=0x71000). This gives a better more guaranteed handoff from tboot
to
> Xen, it avoids the user needing to manually add any options to Xen's
command
> line (we can make tboot= imply no-real-mode), and means that rather
than
> doing a scan we simply need to confirm the UUID is at the given
address.
> 
> I can easily do the Xen side of this if you agree it makes sense.

Sounds good.  I'll work up a patch for tboot and post a new tarball
tonight.

Joe

_______________________________________________
Xense-devel mailing list
Xense-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xense-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.