[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] Intel(R) Trusted Execution Technology support



On 29/10/07 18:00, "Cihula, Joseph" <joseph.cihula@xxxxxxxxx> wrote:

>> By low memory, do you mean the signature is in the bottom megabyte of
>> memory? If that's guaranteed then can we just scan the whole lot
>> 0x00000-0xfffff (excluding VGA hole)?
> 
> Yes, it's in the lower 1MB and that is where dom0 has problems with
> gaps.  But I think that the UNUSABLE->RESERVED approach will be just as
> effective and reduce the amount of memory to scan as well.

Okay, we should limit the scan to page-aligned addresses in UNUSABLE regions
below 1MB. It makes sense to put the UNUSABLE->RESERVED hack in Xen itself,
rather than in tboot. Once the interface is baked into 3.2.0 it's not
changing on our side.

 -- Keir



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.