[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Xen-devel] Xen.efi and secure boot
 
- To: Ian Campbell <Ian.Campbell@xxxxxxxxxx>
 
- From: Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>
 
- Date: Tue, 27 Nov 2012 11:23:08 +0000
 
- Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>,	George Dunlap <dunlapg@xxxxxxxxx>, "Keir \(Xen.org\)" <keir@xxxxxxx>,	Jan Beulich <JBeulich@xxxxxxxx>,	"xen-devel@xxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxx>
 
- Delivery-date: Tue, 27 Nov 2012 11:18:03 +0000
 
- Face: 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
 
- List-id: Xen developer discussion <xen-devel.lists.xen.org>
 
 
 
> That probably involves some sort of black/whitelisting scheme for I/O
> ports and such which is pretty tedious but not overwhelming I don't
> think.
Until you start to think about indirect access via DMA or using one
device to set up an I/O window into another, or the ACPI EC or the GPU ...
its nigh on impossible. PC hardware isn't designed for restricted boot.
Alan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
 
 
    
     |