[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] Intel(R) Trusted Execution Technology support
On 29/10/07 18:00, "Cihula, Joseph" <joseph.cihula@xxxxxxxxx> wrote: >> By low memory, do you mean the signature is in the bottom megabyte of >> memory? If that's guaranteed then can we just scan the whole lot >> 0x00000-0xfffff (excluding VGA hole)? > > Yes, it's in the lower 1MB and that is where dom0 has problems with > gaps. But I think that the UNUSABLE->RESERVED approach will be just as > effective and reduce the amount of memory to scan as well. Okay, we should limit the scan to page-aligned addresses in UNUSABLE regions below 1MB. It makes sense to put the UNUSABLE->RESERVED hack in Xen itself, rather than in tboot. Once the interface is baked into 3.2.0 it's not changing on our side. -- Keir _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |