From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.5 required=3.0 tests=DKIM_ADSP_CUSTOM_MED, DKIM_INVALID,DKIM_SIGNED,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,HTML_MESSAGE,MAILING_LIST_MULTI, MIME_QP_LONG_LINE,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6CBC7C76186 for ; Wed, 24 Jul 2019 17:43:13 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 3605B2190F for ; Wed, 24 Jul 2019 17:43:13 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="MQMPqBp7" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 3605B2190F Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hqLHv-0007hv-E9; Wed, 24 Jul 2019 17:42:51 +0000 Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hqLHt-0007hq-MD for xen-devel@lists.xenproject.org; Wed, 24 Jul 2019 17:42:49 +0000 X-Inumbo-ID: 7358565f-ae3a-11e9-8980-bc764e045a96 Received: from mail-qk1-x72c.google.com (unknown [2607:f8b0:4864:20::72c]) by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS id 7358565f-ae3a-11e9-8980-bc764e045a96; Wed, 24 Jul 2019 17:42:48 +0000 (UTC) Received: by mail-qk1-x72c.google.com with SMTP id r21so34426619qke.2 for ; Wed, 24 Jul 2019 10:42:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=QnJlXJm/uzDmuCiODV37HDdxuhhV3thqi5q4ZugVUyY=; b=MQMPqBp7OqtLTsw96VHI+B4k3AXg/iFcfCklfizCgZSZjCrOsdQQnEJyeFYjQ7PfFt GY3vxZxJzFMx4zhWc9iqxmlnlgW70VDJMDWOdMhUwT18WkmqmL+EnDwzU46R7AGt+9g6 M9p6rp6PRiKWnn9NrnEfXDfv4cMbNPm3lyiZ3l8qn+sQVu8cqxghHaNXp/s+nNDSpWn3 ehzbCv24d6sVj9AzKf28+do1M8uTTYskOH2Grgs5J+hJeUI1QV1X+TfnqSL1ildd3+Jf D8yfeFotedbHknzF1wnWJ7EU6yPhab/jQy2FcggriseYkVNbxeWBPmgclCe33xiXZkOB sGcA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=QnJlXJm/uzDmuCiODV37HDdxuhhV3thqi5q4ZugVUyY=; b=s123A9e0eIEGqOJuwVpzi5yVgRQjHoeU7ZEuvxQhWglWv4n7Fl1RsJ73HGbFgQA9kC cTv6gL1AkoJZ7eLhlAMTAQjLh2jluybslG/pSKQBWaFbj0YS5K9Qltj0oku7yHg7kSHf uMRZFyYcjyeSsL1AFPvfBAtkhUyZvTeG6GJrlxpEpPCrTlF9bVs5e3uothf6NkAY//Ks 02kyy9B9eq8qwIsnSjG2zMeDCS3DCpwF1PfClykN0zWwf7UqLrlsICa0tlnhXe6OUjnU bba+S+DzwpBC6paypi3wHPKwUlYeROuDB5joLtHmlpdWDrEVevgR7NlPdtICGAKpLBSx lIsA== X-Gm-Message-State: APjAAAU8xTlLrlRtuuaADaK15iqXDdpkgM6wIkxNExI+184b6GQ6XoR8 JDGm+WVlRCze2dZYqL0tG/A= X-Google-Smtp-Source: APXvYqw9veFEggavrGIVIQ8s70mfaY76Hb21zgKUm4Dv047g2DZUQbS9nSzhB/fgPCEWDYxWHopVaw== X-Received: by 2002:a05:620a:62b:: with SMTP id 11mr53577378qkv.282.1563990167420; Wed, 24 Jul 2019 10:42:47 -0700 (PDT) Received: from ?IPv6:2607:fb90:24a1:a61b:35c8:207e:1332:8c4e? ([2607:fb90:24a1:a61b:35c8:207e:1332:8c4e]) by smtp.gmail.com with ESMTPSA id l5sm20907724qte.9.2019.07.24.10.42.46 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 24 Jul 2019 10:42:46 -0700 (PDT) Mime-Version: 1.0 (1.0) From: Rich Persaud X-Mailer: iPhone Mail (16G77) In-Reply-To: Date: Wed, 24 Jul 2019 13:42:46 -0400 Message-Id: <56D3EEF5-A08A-4894-B21F-9FDA1717B566@gmail.com> References: To: Roman Shaposhnik Subject: Re: [Xen-devel] [BUG] After upgrade to Xen 4.12.0 iommu=no-igfx X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Daniel Smith , xen-devel@lists.xenproject.org Content-Type: multipart/mixed; boundary="===============1069722416013997961==" Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" --===============1069722416013997961== Content-Type: multipart/alternative; boundary=Apple-Mail-5CCAF58C-ADDF-4ACE-ABE7-C9955DA2E016 Content-Transfer-Encoding: 7bit --Apple-Mail-5CCAF58C-ADDF-4ACE-ABE7-C9955DA2E016 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable > On Jul 19, 2019, at 15:31, Roman Shaposhnik wrote: >=20 > Hi! >=20 > we're using Xen on Advantech ARK-2250 Embedded Box PC: > https://www.elmark.com.pl/web/uploaded/karty_produktow/advantech/ark-22= 50l/ark-2250l_instrukcja-uzytkownika.pdf Roman,=20 Good to see Xen being used on fanless devices. Does the AMI BIOS for the i7= 6600U Skylake CPU [1] variant of ARK-2250 [2] support Intel TXT DRTM and di= screte TPM, which would enable boot integrity [3] protection for Xen, read-o= nly dom0 and stateless VMs? Boot integrity is valuable on edge devices. Rich [1] CPU spec: https://ark.intel.com/content/www/us/en/ark/products/88192/int= el-core-i7-6600u-processor-4m-cache-up-to-3-40-ghz.html [2] PC spec: https://www.advantech.com/products/ark-2000_series_embedded_box= _pcs/ark-2250l/mod_66ebc4e0-9a0c-489c-96a5-70a8054e9037 [3] TrenchBoot, Xen Summit 2019, https://youtube.com/watch?v=3Df0LZFSq4Ack --Apple-Mail-5CCAF58C-ADDF-4ACE-ABE7-C9955DA2E016 Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: quoted-printable
On Jul 19, 2019, at 15:31, Roman Shaposhnik <roman@zededa.com> wrote:


Roman, 

Good to see X= en being used on fanless devices.  Does the AMI BIOS for the i7 6600U S= kylake CPU [1] variant of ARK-2250 [2] support Intel TXT DRTM and discrete T= PM, which would enable boot integrity [3] protection for Xen, read-only dom0= and stateless VMs?  Boot integrity is valuable on edge devices.
<= div dir=3D"ltr">
= --Apple-Mail-5CCAF58C-ADDF-4ACE-ABE7-C9955DA2E016-- --===============1069722416013997961== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLWRldmVs IG1haWxpbmcgbGlzdApYZW4tZGV2ZWxAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0 cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi1kZXZlbA== --===============1069722416013997961==--