[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [RFC][PATCH][0/4] Intel(R) Trusted Execution Technologysupport: Overview
On 29/8/07 11:13, "Keir Fraser" <keir@xxxxxxxxxxxxx> wrote: > Indeed, and this also needs solving for kexec of Xen, too: it is unsafe to > drop back into real mode with interrupts enabled when chain booted. This > problem is sidestepped for Linux because kexec simply strips off Linux's > real-mode loader and sets up the boot-sector information as if the real-mode > section had run. But actually no real-mode execution happens. Actually I see that kexec doesn't really pass much real information to the loaded kernel. It fakes out video info and EDID/EDD stuff is not to be seen. But I don't think it changes the fact that the easiest way to solve this particular problem in full is to extend the multiboot information format. Sboot can then take full advantage of the extension, and the e820 hack goes away, while kexec can at least use it to avoid needing manual specification of no-real-mode, and can pass at least what useful information it is able to gather. -- Keir _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |