[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] results
> On Tue, 13 Jul 2004, Ian Pratt wrote: > > > If you actually get somewhere with this approach, we could > > consider having a special linux GPF handler that decodes the > > instruction and patches these up. Barf. > > you guys have nicely avoided putting in insn decode so far, best avoided > on these horrible CPUs :-0 If Mark's right about there being a 2D driver in the Xserver that works without the nvidia binary-only kernel driver, then that's definitely the way to go. I seriously think it's worth a doing a disassembly of the binary module and seeing the scale of the problem. If we're lucky and it's just the rd/wrmsr that are the problem, they'll be easy to deal with by nop'ing them. If there are cli/sti then that's more of a pain, but it would actually be pretty easy to do in a Linux (as opposed to Xen) GPF handler that spots them and does the appropriate Xen call. They're both 1 byte instructions (0xfa/b) with no operands, so easy to spot. As an alternative, you could use static binary rewriting. I'm not too familiar with the various x86 binary re-writing tools that exist, but perhaps one is up to the job? It's almost do-able with objdump -d | awk | gas ;-) Can anyone recommend a good static binary rewriting tool for x86? Ian ------------------------------------------------------- This SF.Net email sponsored by Black Hat Briefings & Training. Attend Black Hat Briefings & Training, Las Vegas July 24-29 - digital self defense, top technical experts, no vendor pitches, unmatched networking opportunities. Visit www.blackhat.com _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxxx https://lists.sourceforge.net/lists/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |