[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [RFC][PATCH][0/4] Intel(R) Trusted Execution Technologysupport: Overview



On 29/8/07 11:13, "Keir Fraser" <keir@xxxxxxxxxxxxx> wrote:

> Indeed, and this also needs solving for kexec of Xen, too: it is unsafe to
> drop back into real mode with interrupts enabled when chain booted. This
> problem is sidestepped for Linux because kexec simply strips off Linux's
> real-mode loader and sets up the boot-sector information as if the real-mode
> section had run. But actually no real-mode execution happens.

Actually I see that kexec doesn't really pass much real information to the
loaded kernel. It fakes out video info and EDID/EDD stuff is not to be seen.
But I don't think it changes the fact that the easiest way to solve this
particular problem in full is to extend the multiboot information format.
Sboot can then take full advantage of the extension, and the e820 hack goes
away, while kexec can at least use it to avoid needing manual specification
of no-real-mode, and can pass at least what useful information it is able to
gather.

 -- Keir



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.