[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [RFC][PATCH][0/2] Intel(r) Trusted Execution Technology support: Overview
Hi Joseph, On 6/9/07, Cihula, Joseph <joseph.cihula@xxxxxxxxx> wrote: Attached is a preliminary patch that adds Intel(r) Trusted Execution Technology (Intel(r) TXT) support to Xen. Intel(r) TXT was formerly known by the codename LaGrande Technology (LT). This version of the patch (the previous version was posted last year) re-factors the Intel(r) TXT code into a separate module/binary that is passed as the 'kernel' to GRUB and which then launches Xen itself (after having performed the measured launch). This patch supports all of the Xen processor modes (32bit/32bitPAE/64bit) and supports multi-core/thread systems. It will run on either an Intel LT SDV3 or on the Intel(r) TXT TEP (Technology Enabling Platform) from MPC. Intel(r) TXT in Brief: ---------------------- o Provides dynamic root of trust for measurement (DRTM) o DMA protection (on SDV3/TEP platforms only) o Data protection in case of improper shutdown For more information, see http://www.intel.com/technology/security/. This site also has a link to the Intel(r) TXT Preliminary Architecture Specification. Overview of Patch Functionality: -------------------------------- o Measured Launch. If the processor is detected as being TXT-capable and enabled then the code will attempt to perform a measured launch. If the measured launch process fails (processor is not capable, TXT is not enabled, missing SINIT, corrupted data, etc.)) then it will fall-through to a non-TXT boot of Xen. This is interesting. Do I understand correctly as in below? - sboot runs in VMX root-operation, then it boots Xen. Then Xen is in non-root operation. - After that, Xen switches back to root-operation. Life goes on as it is now. If that is the case, then Xen can access the reserved memory by sboot, right? So in case Xen is compromised, the secrets saved in the reserved memory can be leaked? Perhaps I understand something wrong, as the whole things dont make sense to me. Thanks, Jun _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |