Hi all,

I'm studying the TPR access optimization in qemu-kvm for quite a while
now. It's one of the, well, let's call it "hardest" parts of qemu-kvm I
dealt with so far. But it's slowly getting clearer.

One thing I'm wondering now: This is practically targeting only 32-bit
Windows, right? Already the assumption that we find a CPU index at
fs:0x51 is apparently hard-coding this. Or that kernel code is at
0x8xxxxxxx or 0xExxxxxxx.

But what makes sure that we aren't patching some other obscure OS that
doesn't comply with our assumptions but triggers the TPR access reports
nevertheless? Is there a way to detect the supported target OSes
reliably before patching anything? Otherwise this feature has to remain
off by default in upstream, I suppose.

Jan

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to