From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mailman by lists.gnu.org with tmda-scanned (Exim 4.43) id 1JGfCa-0007AF-EP for qemu-devel@nongnu.org; Sun, 20 Jan 2008 13:47:28 -0500 Received: from exim by lists.gnu.org with spam-scanned (Exim 4.43) id 1JGfCZ-00079u-Jb for qemu-devel@nongnu.org; Sun, 20 Jan 2008 13:47:27 -0500 Received: from [199.232.76.173] (helo=monty-python.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1JGfCZ-00079r-EO for qemu-devel@nongnu.org; Sun, 20 Jan 2008 13:47:27 -0500 Received: from rv-out-0910.google.com ([209.85.198.189]) by monty-python.gnu.org with esmtp (Exim 4.60) (envelope-from ) id 1JGfCZ-0000ri-58 for qemu-devel@nongnu.org; Sun, 20 Jan 2008 13:47:27 -0500 Received: by rv-out-0910.google.com with SMTP id g11so5036410rvb.22 for ; Sun, 20 Jan 2008 10:47:25 -0800 (PST) Message-ID: <5b31733c0801201047o283aad77ndaae4ea23a1525d@mail.gmail.com> Date: Sun, 20 Jan 2008 19:47:25 +0100 From: "Filip Navara" Sender: filip.navara@gmail.com MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_Part_12573_4234302.1200854845631" Subject: [Qemu-devel] VMport patch Reply-To: qemu-devel@nongnu.org List-Id: qemu-devel.nongnu.org List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: qemu-devel@nongnu.org ------=_Part_12573_4234302.1200854845631 Content-Type: multipart/alternative; boundary="----=_Part_12574_32983666.1200854845632" ------=_Part_12574_32983666.1200854845632 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline Hello, the current version of QEMU emulates the VMware backdoor I/O port and it works quite well. Unfortunately it doesn't emulate the VMware behavior of ignoring the I/O permissions when accessing this special port. The attached patch corrects it. It's important to ignore the permissions, so that user mode VMware tools can communicate to the backdoor. Best regards, Filip Navara ------=_Part_12574_32983666.1200854845632 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline Hello,

the current version of QEMU emulates the VMware backdoor I/O port and it works quite well. Unfortunately it doesn't emulate the VMware behavior of ignoring the I/O permissions when accessing this special port. The attached patch corrects it. It's important to ignore the permissions, so that user mode VMware tools can communicate to the backdoor.

Best regards,
Filip Navara
------=_Part_12574_32983666.1200854845632-- ------=_Part_12573_4234302.1200854845631 Content-Type: application/octet-stream; name=vmport.patch Content-Transfer-Encoding: base64 X-Attachment-Id: f_fbnxubs80 Content-Disposition: attachment; filename=vmport.patch LS0tIHRhcmdldC1pMzg2L2hlbHBlci5jCTI2IEp1biAyMDA3IDA4OjM1OjE4IC0wMDAwCTEuODQN CisrKyB0YXJnZXQtaTM4Ni9oZWxwZXIuYwkyMCBKYW4gMjAwOCAxODozMzozMyAtMDAwMA0KQEAg LTQ4Niw3ICs0ODYsOSBAQA0KIHN0YXRpYyBpbmxpbmUgdm9pZCBjaGVja19pbyhpbnQgYWRkciwg aW50IHNpemUpDQogew0KICAgICBpbnQgaW9fb2Zmc2V0LCB2YWwsIG1hc2s7DQotICAgIA0KKyAg ICAvKiBWTXdhcmUgYmFja2Rvb3IgSS9PIHBvcnQgaWdub3JlcyBwcml2aWxlZGdlIGNvbnRyb2wg Ki8NCisgICAgaWYgKGFkZHIgPT0gMHg1NjU4KQ0KKyAgICAgICAgcmV0dXJuOyAgIA0KICAgICAv KiBUU1MgbXVzdCBiZSBhIHZhbGlkIDMyIGJpdCBvbmUgKi8NCiAgICAgaWYgKCEoZW52LT50ci5m bGFncyAmIERFU0NfUF9NQVNLKSB8fA0KICAgICAgICAgKChlbnYtPnRyLmZsYWdzID4+IERFU0Nf VFlQRV9TSElGVCkgJiAweGYpICE9IDkgfHwNCg== ------=_Part_12573_4234302.1200854845631--