Re: [PATCH 1/2] VMware detection support for x86 and x86-64

From: H. Peter Anvin
Date: Thu Sep 25 2008 - 00:54:50 EST


Alok Kataria wrote:
On Wed, 2008-09-24 at 21:38 -0700, H. Peter Anvin wrote:
Alok kataria wrote:
Even if there is anything on that port on native hardware it would
work perfectly well and is _safe_.
First let me post the code to access this backdoor port (the way it
should really be done )

So whenever we query port 0x5658 , with the GETVERSION command (which
is the first thing we do with this port), we expect that eax !=
0xFFFFFFFF and ebx has a VMWARE specific MAGIC value. Please note
that ebx has been initialized to zero in the code above.

You have no idea what you just did to a real piece of hardware.
Why ? what do you mean ? ebx is a local variable in the code above that i posted. Only when on hypervisor will we write the magic value over there.
How can this affect native hardware, i fail to understand. Please explain.


You accessed a bloody I/O port!

If you think it's harmless because it was an IN, you're sorely mistaken.

-hpa

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/