From mboxrd@z Thu Jan 1 00:00:00 1970 From: Anthony Liguori Subject: Re: [RFT] kvm with Windows optimization Date: Tue, 30 Oct 2007 00:02:52 -0500 Message-ID: <4726BAFC.6040905@codemonkey.ws> References: <4720D122.4070606@qumranet.com> <4720E023.8050804@codemonkey.ws> <10EA09EFD8728347A513008B6B0DA77A0248295E@pdsmsx411.ccr.corp.intel.com> <4721F4DC.2010501@codemonkey.ws> <10EA09EFD8728347A513008B6B0DA77A024CE569@pdsmsx411.ccr.corp.intel.com> <4725E022.6070202@codemonkey.ws> <4726ACFC.5090907@qumranet.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Cc: kvm-devel To: Avi Kivity Return-path: In-Reply-To: <4726ACFC.5090907-atKUWr5tajBWk0Htik3J/w@public.gmane.org> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: kvm-devel-bounces-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org Errors-To: kvm-devel-bounces-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org List-Id: kvm.vger.kernel.org Avi Kivity wrote: > Anthony Liguori wrote: >> Dong, Eddie wrote: >>> Anthony Liguori wrote: >>> >>>> Dong, Eddie wrote: >>>> >>>>>> BTW, is it wise to enable this by default for all guests? >>>>>> Ignoring the >>>>>> fact that we're modifying guest's memory without its knowledge, if a >>>>>> guest unmaps the VA mappings for the BIOS then all sorts of >>>>>> problems could occur. >>>>>> >>>>>> >>>>> Good movement! >>>>> >>>>> But, Vista won't work with patching. The memory guard in vista >>>>> will make the system refuse to service. Maybe we need a option to >>>>> check if it is vista. >>>>> >>>> FWIW, I successfully installed and booted Vista Enterprise Edition >>>> with the TPR optimization patch. >>>> >>>> >>> 32 bits or 64 bits? >>> See >>> http://blogs.msdn.com/windowsvistasecurity/archive/2006/08/11/695993.asp >>> >>> x >>> >>> It says: >>> >>> There are many brand new security features in Windows Vista, but Kernel >>> Patch Protection is actually not one of them. Kernel Patch Protection >>> was first supported on x64 (AMD64 and Intel EMT64T) CPU architecture >>> versions of Microsoft Windows including Microsoft Windows Server 2003 >>> SP1 and Windows XP Microsoft Windows XP Professional x64 Edition. >>> (Patch >>> protection is currently not supported on x86 or ia64 architectures.) >>> Though, as the use of 64-bit computers is increasing, Windows Vista >>> users will end up benefiting most from this technology. >>> Seems Vista 32 is not using patchguard yet, not sure about next SP. >>> If above is true, it looks like we are OK for current stage. >>> thx,eddie >>> >> >> I tested 32-bit Vista. We'll have to try 64-bit Vista and see if it >> gets upset. >> > > btw, it may have not triggered because the hack didn't recognize > Vista's memory map. > It successfully patched instructions. Not as many as with XP but it was at least a few. Regards, Anthony Liguori ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/