WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Xen

xen-devel

[Top] [All Lists]

RE: [Xen-devel] [RFC][PATCH][0/4] Intel(R) Trusted Execution Technologys

To: "Keir Fraser" <Keir.Fraser@xxxxxxxxxxxx>, "Jan Beulich" <jbeulich@xxxxxxxxxx>
Subject: RE: [Xen-devel] [RFC][PATCH][0/4] Intel(R) Trusted Execution Technologysupport: Overview
From: "Cihula, Joseph" <joseph.cihula@xxxxxxxxx>
Date: 2007年8月29日 14:52:41 -0700
Cc: xen-devel@xxxxxxxxxxxxxxxxxxx, "Zhai, Edwin" <edwin.zhai@xxxxxxxxx>, "Xu, James" <james.xu@xxxxxxxxx>, "Wang, Shane" <shane.wang@xxxxxxxxx>, xense-devel@xxxxxxxxxxxxxxxxxxx, "Wei, Gang" <gang.wei@xxxxxxxxx>
Delivery-date: 2007年8月29日 14:53:25 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <C2FB63C2.15008%Keir.Fraser@xxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <C2FB053C.14FBB%keir@xxxxxxxxxxxxx> <C2FB63C2.15008%Keir.Fraser@xxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcfqJS1qa85J3FYYEdyVXAAX8io7RQAOFci6AACkcnA=
Thread-topic: [Xen-devel] [RFC][PATCH][0/4] Intel(R) Trusted Execution Technologysupport: Overview
Keir Fraser <mailto:Keir.Fraser@xxxxxxxxxxxx> scribbled on Wednesday,
August 29, 2007 9:56 AM:
> On 29/8/07 11:13, "Keir Fraser" <keir@xxxxxxxxxxxxx> wrote:
>
>> Indeed, and this also needs solving for kexec of Xen, too: it is
>> unsafe to drop back into real mode with interrupts enabled when
>> chain booted. This problem is sidestepped for Linux because kexec
>> simply strips off Linux's real-mode loader and sets up the
>> boot-sector information as if the real-mode section had run. But
>> actually no real-mode execution happens. 
>
> Actually I see that kexec doesn't really pass much real information
> to the loaded kernel. It fakes out video info and EDID/EDD stuff is
not to
> be seen. But I don't think it changes the fact that the easiest way to
solve
> this particular problem in full is to extend the multiboot information
> format. Sboot can then take full advantage of the extension, and the
e820
> hack goes away, while kexec can at least use it to avoid needing
manual
> specification of no-real-mode, and can pass at least what useful
information it is
> able to gather.
>
> -- Keir
Just some background on sboot's current approach:
o The new patch doesn't misuse, IMHO, the ACPI memory types. By using
a type that is intended to indicate memory that is not usable by the
system, it allows kernels/VMMs that are not aware of sboot to still
treat these memory regions properly.
o Once we have performed a TXT measured launch, we do not want to go
back and execute any unmeasured code. So going back into BIOS (and
really not necessarily BIOS, but whatever later code may have set
vectors in the real mode IDT) breaks the trust of the TCB.
o We do several checks in sboot to ensure that the e820 memory map does
not contain usable regions that overlap certain system-reserved areas
(SMM, MMIO, etc.), that the areas used by TXT and sboot are not marked
as usable, initial DMA protection covers all of RAM, etc. So it is
important that Xen use the same table that sboot has used, verified, and
adjusted.
o While the initial target for sboot is to launch Xen, we would like it
to be generic enough that it could be used by other VMMs or OS kernels,
e.g. Linux. So we've tried to minimize the necessary post-sboot code
changes and altering the e820 table seems like a pretty generic way to
do that. Now if all modern kernels/VMMs ignore GRUB's table and go back
to BIOS to read it (and can't have that disabled like Xen can) then this
approach won't be useful even if it is generic.
All that said, if extending the multiboot data can satisfy these
objectives then I'd be happy to discuss it.
Joe
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>
Previous by Date: Re: [Xen-devel] PCI Passthru: fn0 exported but not fn1 , Stefan Neuwirth
Next by Date: [Xen-devel] [PATCH] 1/2: cpufreq/PowerNow! in Xen: Time and platform changes , Mark Langsdorf
Previous by Thread: Re: [Xen-devel] [RFC][PATCH][0/4] Intel(R) Trusted Execution Technologysupport: Overview , Keir Fraser
Next by Thread: RE: [Xen-devel] [RFC][PATCH][0/4] Intel(R) Trusted Execution Technologysupport: Overview , Jan Beulich
Indexes: [Date] [Thread] [Top] [All Lists]

Copyright ©, Citrix Systems Inc. All rights reserved. Legal and Privacy
Citrix This site is hosted by Citrix

AltStyle によって変換されたページ (->オリジナル) /