lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <48D12490.5010003@zytor.com>
Date:	Wed, 17 Sep 2008 08:38:56 -0700
From:	"H. Peter Anvin" <hpa@...or.com>
To:	Ingo Molnar <mingo@...e.hu>
CC:	Yan Li <elliot.li.tech@...il.com>, linux-kernel@...r.kernel.org,
	joerg.roedel@....com, rjmaomao@...il.com,
	Yinghai Lu <yhlu.kernel@...il.com>,
	Thomas Gleixner <tglx@...utronix.de>, nancydreaming@...il.com
Subject: Re: [PATCH 1/2] VMware detection support for x86 and x86-64

Ingo Molnar wrote:
> 
> that still leaves the CPUID/MSR method for the virtualizer to announce 
> itself.
> 

FWIW, it's getting pretty clear with the recent bout of Virtual PC bugs 
that we need virtualizer detection, and that a lot of VMs are doing 
various idiotic things.

Again, with Virtual PC, it seems that DMI is the preferred detection 
method, as disgusting as it is, simply because the alternatives are the 
moral equivalent of ad hoc probing for ISA cards (a random I/O port for 
VMWare, a random "hopefully unused" opcode for VPC.)

>> I feel It's also unfit to touch the whole PCI or DMI thing before CPU 
>> registers and memory are settled.  A simple solution here is to only 
>> issue a KERN_INFO when we detected mtrr is empty and later, when we 
>> can be sure that the OS is not running as a VM, issue a warning. The 
>> later part can be done in early_quirks().
> 
> ok, we can move the MTRR message further back, to after the early quirks 
> phase.

Makes sense to me.

	-hpa

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ