Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Aem boot delay fix #17

Open
wants to merge 8 commits into
base: aem-4.17.4
Choose a base branch
from
Open

Aem boot delay fix #17

wants to merge 8 commits into from

Conversation

miczyg1
Copy link

@miczyg1 miczyg1 commented Aug 17, 2024

No description provided.

@krystian-hebel krystian-hebel deleted the branch aem-4.17.4 August 26, 2024 11:41
@SergiiDmytruk SergiiDmytruk reopened this Aug 30, 2024
@SergiiDmytruk SergiiDmytruk changed the base branch from aem-4.17.4 to aem-phase4-rebase August 30, 2024 22:01
@SergiiDmytruk
Copy link
Member

I think this PR got closed accidentally due to target branch removed, so I changed its base (didn't rebase the branch) and reopened.

@miczyg1
Copy link
Author

miczyg1 commented Sep 5, 2024

I think this PR got closed accidentally due to target branch removed, so I changed its base (didn't rebase the branch) and reopened.

I can see Krystian deleted the branch and it made a mess from this PR... Anyway, it was not yet solving the problem I had.

@SergiiDmytruk
Copy link
Member

I can see Krystian deleted the branch and it made a mess from this PR... Anyway, it was not yet solving the problem I had.

The mess is the result of me changing the target branch to be able to reopen the PR. Rebasing the top 2 commits will fix this, I just didn't want to fix the PR without fixing your local branch.

@miczyg1 miczyg1 force-pushed the aem_boot_delay_fix branch 3 times, most recently from ca95ec5 to e91a466 Compare September 15, 2024 13:07
Map the TPM event log after the TXT regions are mapped to avoid
an early page fault when booting with slaunch.

Signed-off-by: Michał Żygowski <[email protected]>
Right now the MTRRs were restored in an ugly way, while MTRR enable bit
was set and caching was not disabled. Mimic the generic Xen MTRR driver
behavior when changing MTRRs.

Signed-off-by: Michał Żygowski <[email protected]>
The MTRR capabilities and default type were read before the MTRRs were
restored in slaunch flow. The restoration itself updated the MTRR default
type MSR, so the mtrr_top_of_ram had invalid state in mtrr_cap and
mtrr_def variables. Move reading those MSRs after MTRRs are restored
in slaunch flow.

Signed-off-by: Michał Żygowski <[email protected]>
Do the check if IA32_FEATURE_CONTROL has the proper bits enabled to run
VMX in SMX when slaunch is active.

Signed-off-by: Michał Żygowski <[email protected]>
…ities

The bootloader should prepare the MTRR masks using MAXPHYADDRs. On modern
Intel platforms, the SINIT ACM forces this bit to be 1 according to
TXT MLE Software Development Guide Revision 017.4.

Signed-off-by: Michał Żygowski <[email protected]>
Report the SMX and TXT capabilitiesso that dom0 can query the
Intel TXT support information using xl dmesg.

Signed-off-by: Michał Żygowski <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants