From mboxrd@z Thu Jan 1 00:00:00 1970 From: Wei Huang Subject: Re: Windows SMP Date: Tue, 30 Dec 2008 10:58:26 -0600 Message-ID: <495A5332.1020204@amd.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset="ISO-8859-1"; format=flowed Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xensource.com Errors-To: xen-devel-bounces@lists.xensource.com To: James Harper Cc: xen-devel@lists.xensource.com, Dirk Utterback , Keir Fraser , Venefax List-Id: xen-devel@lists.xenproject.org James, Travis Betak released a Windows driver which patches Windows TPR accesses. You can find it from http://sourceforge.net/projects/amdvopt/. The code would be useful as a reference. src link: svn co https://amdvopt.svn.sourceforge.net/svnroot/amdvopt amdvopt Thanks, -Wei James Harper wrote: >> On 29/12/2008 08:20, "James Harper" > wrote: >>>> 3. Run Citrix drivers which patch Windows to avoid TPR writes. >>> Can you elaborate on that last point? Does that pass WHQL? >> The WHQL tests are oblivious to it. It's just a patching of mmio > writes to >> the APIC TPR register. >> > > Looking at the way KVM does it, it appears to detect writes to the TPR > register when they are trapped, and then give the DomU (or whatever KVM > calls it) the address of the instruction so that the DomU driver can > then patch it. Is that what Citrix is doing? Does the current xensource > tree have such a mechanism in it? > > Thanks > > James > > _______________________________________________ > Xen-devel mailing list > Xen-devel@lists.xensource.com > http://lists.xensource.com/xen-devel >