From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mailman by lists.gnu.org with tmda-scanned (Exim 4.43) id 1JGjIG-0004iO-F8 for qemu-devel@nongnu.org; Sun, 20 Jan 2008 18:09:36 -0500 Received: from exim by lists.gnu.org with spam-scanned (Exim 4.43) id 1JGjIE-0004dW-RS for qemu-devel@nongnu.org; Sun, 20 Jan 2008 18:09:36 -0500 Received: from [199.232.76.173] (helo=monty-python.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1JGjIE-0004dJ-Nb for qemu-devel@nongnu.org; Sun, 20 Jan 2008 18:09:34 -0500 Received: from an-out-0708.google.com ([209.85.132.244]) by monty-python.gnu.org with esmtp (Exim 4.60) (envelope-from ) id 1JGjIE-0004uY-Dw for qemu-devel@nongnu.org; Sun, 20 Jan 2008 18:09:34 -0500 Received: by an-out-0708.google.com with SMTP id b38so507546ana.130 for ; Sun, 20 Jan 2008 15:09:33 -0800 (PST) Message-ID: <4793D4B6.8030408@codemonkey.ws> Date: Sun, 20 Jan 2008 17:09:42 -0600 From: Anthony Liguori MIME-Version: 1.0 Subject: Re: AW: Re: [Qemu-devel] VMport patch References: <20080120222742.B2F993A9B@csgraf.de> In-Reply-To: <20080120222742.B2F993A9B@csgraf.de> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 8bit Reply-To: qemu-devel@nongnu.org List-Id: qemu-devel.nongnu.org List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: qemu-devel@nongnu.org Alexander Graf wrote: > I think it would be great to maintain compatibility with the binary-only versions of the vm tools though. > But you're changing the semantics of the x86 instruction set. You potentially break a real operating system. It also eliminates the possibility of nesting with something like kqemu because you can't trap all PIO operations. Regards, Anthony Liguori > Regards, > > Alex > > ----- Ursprüngliche Nachricht ----- > Von: Anthony Liguori > Gesendet: Sonntag, 20. Januar 2008 22:40 > An: qemu-devel@nongnu.org > Betreff: Re: [Qemu-devel] VMport patch > > Filip Navara wrote: > >> Hello, >> >> the current version of QEMU emulates the VMware backdoor I/O port and >> it works quite well. Unfortunately it doesn't emulate the VMware >> behavior of ignoring the I/O permissions when accessing this special >> port. The attached patch corrects it. It's important to ignore the >> permissions, so that user mode VMware tools can communicate to the >> backdoor. = >> > > I really dislike that VMware relies on this. It's very hard to > implement in kqemu or KVM. I think it would be better to modify > open-vm-tools than to modify QEMU. > > Regards, > > Anthony Liguori > > >> Best regards, >> Filip Navara >> > > > > > > >