Dong, Eddie wrote:
>> BTW, is it wise to enable this by default for all guests?
>> Ignoring the
>> fact that we're modifying guest's memory without its knowledge, if a
>> guest unmaps the VA mappings for the BIOS then all sorts of problems
>> could occur. 
>>
>>     
> Good movement!
>
> But, Vista won't work with patching. The memory guard in vista 
> will make the system refuse to service. Maybe we need a option
> to check if it is vista.
>   

Are you sure that Vista isn't just verifying memory during 
startup/driver load?  Seems odd to periodically scan memory.

In the recently released Windows Hypervisor specification, in section 
13.2.2 (Local APIC Memory-mapped Accesses), it's dictated that the APIC 
can only be accessed through 6 instructions.  They are all >= 5 byte 
instructions.  When I first saw that, I figured they were also patching.

Regards,

Anthony Liguori

> Eddie
>
>   


-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel

Reply via email to