[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [Xen-devel] Windows SMP
> On 29/12/2008 08:47, "James Harper" <james.harper@xxxxxxxxxxxxxxxx> wrote: > > >> The WHQL tests are oblivious to it. It's just a patching of mmio > >> writes to the APIC TPR register. > > > > Looking at the way KVM does it, it appears to detect writes to the TPR > > register when they are trapped, and then give the DomU (or whatever KVM > > calls it) the address of the instruction so that the DomU driver can > > then patch it. Is that what Citrix is doing? Does the current xensource > > tree have such a mechanism in it? > > The result is the same, but there's no hypervisor component, so none of it > is open sourced. :) > You could get similar results by putting static Windows-kernel-specific > fixup tables in your drivers, As in 'write bytes to offset x into kernel function y', with x depending on the exact kernel build? Wouldn't the rootkit detectors complain about that? > or I'd be open to having a KVM type of > interaction between Xen and your GPLPV drivers. Putting the payload in the > generic virtual BIOS seemed kind of gross to me. Is it possible for a virtualised DomU to trap the MMIO write itself, or can it only be trapped by the hypervisor? Btw, is it the vmexit that is slow about these TPR writes, or is it the writes themselves? Thanks James _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |