Dong, Eddie wrote: >> BTW, is it wise to enable this by default for all guests? >> Ignoring the >> fact that we're modifying guest's memory without its knowledge, if a >> guest unmaps the VA mappings for the BIOS then all sorts of problems >> could occur. >> >> > Good movement! > > But, Vista won't work with patching. The memory guard in vista > will make the system refuse to service. Maybe we need a option > to check if it is vista. >
Are you sure that Vista isn't just verifying memory during startup/driver load? Seems odd to periodically scan memory. In the recently released Windows Hypervisor specification, in section 13.2.2 (Local APIC Memory-mapped Accesses), it's dictated that the APIC can only be accessed through 6 instructions. They are all >= 5 byte instructions. When I first saw that, I figured they were also patching. Regards, Anthony Liguori > Eddie > > ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/ _______________________________________________ kvm-devel mailing list kvm-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/kvm-devel