public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
* kvm's vapic
@ 2012-01-29 15:37 Jan Kiszka
  2012-01-29 15:51 ` Avi Kivity
  0 siblings, 1 reply; 6+ messages in thread
From: Jan Kiszka @ 2012-01-29 15:37 UTC (permalink / raw)
  To: Avi Kivity, Marcelo Tosatti, Gleb Natapov; +Cc: kvm

[-- Attachment #1: Type: text/plain, Size: 780 bytes --]

Hi all,

I'm studying the TPR access optimization in qemu-kvm for quite a while
now. It's one of the, well, let's call it "hardest" parts of qemu-kvm I
dealt with so far. But it's slowly getting clearer.

One thing I'm wondering now: This is practically targeting only 32-bit
Windows, right? Already the assumption that we find a CPU index at
fs:0x51 is apparently hard-coding this. Or that kernel code is at
0x8xxxxxxx or 0xExxxxxxx.

But what makes sure that we aren't patching some other obscure OS that
doesn't comply with our assumptions but triggers the TPR access reports
nevertheless? Is there a way to detect the supported target OSes
reliably before patching anything? Otherwise this feature has to remain
off by default in upstream, I suppose.

Jan


[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 262 bytes --]

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2012-01-29 16:31 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-01-29 15:37 kvm's vapic Jan Kiszka
2012-01-29 15:51 ` Avi Kivity
2012-01-29 15:52   ` Avi Kivity
2012-01-29 15:55     ` Jan Kiszka
2012-01-29 16:27       ` Avi Kivity
2012-01-29 16:31         ` Jan Kiszka

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox