Anthony Liguori wrote:
> Dong, Eddie wrote:
>>> BTW, is it wise to enable this by default for all guests?
>>> Ignoring the
>>> fact that we're modifying guest's memory without its knowledge, if a
>>> guest unmaps the VA mappings for the BIOS then all sorts of
>>> problems could occur. 
>>> 
>>> 
>> Good movement!
>> 
>> But, Vista won't work with patching. The memory guard in vista
>> will make the system refuse to service. Maybe we need a option to
>> check if it is vista. 
>> 
> 
> FWIW, I successfully installed and booted Vista Enterprise Edition
> with the TPR optimization patch.
> 
32 bits or 64 bits?
See
http://blogs.msdn.com/windowsvistasecurity/archive/2006/08/11/695993.asp
x

It says:

There are many brand new security features in Windows Vista, but Kernel
Patch Protection is actually not one of them. Kernel Patch Protection
was first supported on x64 (AMD64 and Intel EMT64T) CPU architecture
versions of Microsoft Windows including Microsoft Windows Server 2003
SP1 and Windows XP Microsoft Windows XP Professional x64 Edition. (Patch
protection is currently not supported on x86 or ia64 architectures.)
Though, as the use of 64-bit computers is increasing, Windows Vista
users will end up benefiting most from this technology. 

Seems Vista 32 is not using patchguard yet, not sure about next SP.
If above is true, it looks like we are OK for current stage.
thx,eddie

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel

Reply via email to