Changes between Initial Version and Version 1 of Ticket #15490
- Timestamp:
- Jun 17, 2016 7:53:31 AM (9 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
Ticket #15490 – Description
initial v1 1 1 Hyperguard (starting with TH2) blocks programs from scribbling over control registers like CR4. In RS1, Hyper-V opportunistically enables secure kernel which brings in Hyperguard when the Hyper-V role is enabled. 2 2 3 V box needs to do something here, detect an incompatible hypervisor and not bugcheck3 VBox needs to do something here, detect an incompatible hypervisor and not bugcheck 4 4 5 HyperGuard intercepts the write to CR4 and injects a #GP (here is the value VirtualBox tried to write: rax=0000000000000274).5 HyperGuard intercepts the write to CR4 and injects a #GP (here is the value !VirtualBox tried to write: rax=0000000000000274). 6 6 7 VirtualBox does not require VT-x to run 32-bit guests. In RS1, HyperGuard / secure kernel is always present when the hypervisor is present. That means that if a customer installs Hyper-V and VirtualBox, the machine will always bugcheck when the firstVirtualBox VM is started. This was not the case in TH2.7 !VirtualBox does not require VT-x to run 32-bit guests. In RS1, HyperGuard / secure kernel is always present when the hypervisor is present. That means that if a customer installs Hyper-V and !VirtualBox, the machine will always bugcheck when the first !VirtualBox VM is started. This was not the case in TH2. 8 8 9 9 {{{ 10 10 STACK_TEXT: 11 11 ffffde00`9e2ac668 ffffde00`99dca712 : 00000000`00000010 fffff802`1eec16c6 00000000`00000000 ffff858f`1cfea1a0 : 0xffffde00`99dca890 … … 20 20 ffffde00`9e2aca90 00007ffc`b7dc1344 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 [d:\rs1\minkernel\ntos\ke\amd64\trap.asm @ 2564] 21 21 00000000`0531f928 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`b7dc1344 22 23 22 }}}