xen-devel
[Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole
To: |
Zachary Amsden <zach@xxxxxxxxxx> |
Subject: |
[Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole |
From: |
Chris Wright <chrisw@xxxxxxxxxxxx> |
Date: |
Wed, 15 Mar 2006 01:09:35 -0800 |
Cc: |
Andrew Morton <akpm@xxxxxxxx>, Joshua LeVasseur <jtl@xxxxxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxx>, Pratap Subrahmanyam <pratap@xxxxxxxxxx>, Wim Coekaerts <wim.coekaerts@xxxxxxxxxx>, Jack Lo <jlo@xxxxxxxxxx>, Dan Hecht <dhecht@xxxxxxxxxx>, Linux Kernel Mailing List <linux-kernel@xxxxxxxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxxxx>, Christopher Li <chrisl@xxxxxxxxxx>, Chris Wright <chrisw@xxxxxxxxxxxx>, Virtualization Mailing List <virtualization@xxxxxxxxxxxxxx>, Linus Torvalds <torvalds@xxxxxxxx>, Anne Holler <anne@xxxxxxxxxx>, Jyothy Reddy <jreddy@xxxxxxxxxx>, Kip Macy <kmacy@xxxxxxxxxxx>, Gerd Hoffmann <kraxel@xxxxxxx>, Leendert van Doorn <leendert@xxxxxxxxxxxxxx>, Ky Srinivasan <ksrinivasan@xxxxxxxxxx>, Dan Arai <arai@xxxxxxxxxx> |
Delivery-date: |
Wed, 15 Mar 2006 10:24:57 +0000 |
Envelope-to: |
www-data@xxxxxxxxxxxxxxxxxxx |
In-reply-to: |
<4417D212.20401@xxxxxxxxxx> |
List-help: |
<mailto:xen-devel-request@lists.xensource.com?subject=help> |
List-id: |
Xen developer discussion <xen-devel.lists.xensource.com> |
List-post: |
<mailto:xen-devel@lists.xensource.com> |
List-subscribe: |
<http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe> |
List-unsubscribe: |
<http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe> |
References: |
<200603131804.k2DI4N6s005678@xxxxxxxxxxxxxxxxxxx> <20060314064107.GK12807@xxxxxxxxxxxxxxxxxx> <44166D6B.4090701@xxxxxxxxxx> <20060314215616.GM12807@xxxxxxxxxxxxxxxxxx> <4417454F.2080908@xxxxxxxxxx> <20060315043108.GP12807@xxxxxxxxxxxxxxxxxx> <4417CFDA.1060806@xxxxxxx> <4417D212.20401@xxxxxxxxxx> |
Sender: |
xen-devel-bounces@xxxxxxxxxxxxxxxxxxx |
User-agent: |
Mutt/1.4.2.1i |
* Zachary Amsden (zach@xxxxxxxxxx) wrote:
> ENTRY(sysenter_entry)
> movl TSS_sysenter_esp0(%esp),%esp
> sysenter_past_esp:
> STI
> pushl $(__USER_DS)
> pushl %ebp
> pushfl
> pushl $(__USER_CS)
> pushl $SYSENTER_RETURN
>
> SYSENTER_RETURN is a link time constant that is defined based on the
> location of the vsyscall page. If the vsyscall page can move, this can
> not be a constant. The reason is, this "fake" exception frame is used
> to return back to the EIP of the call site, and sysenter does not record
> the EIP of the call site.
It's only real issue for something like execshield. For this it's easy
to do the fixed math since it's still at fixed address.
+ DEFINE(VSYSCALL_BASE, (PAGE_OFFSET - 2*PAGE_SIZE));
But execshield has to make SYSENTER_RETURN context sensitive to current
since the vdso is mapped at random location.
thanks,
-chris
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-devel] [RFC, PATCH 7/24] i386 Vmi memory hole, Zachary Amsden
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Chris Wright
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Zachary Amsden
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Chris Wright
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Zachary Amsden
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Chris Wright
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Gerd Hoffmann
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Zachary Amsden
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole,
Chris Wright <=
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Zachary Amsden
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Chris Wright
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Gerd Hoffmann
- [Xen-devel] Re: [RFC, PATCH 7/24] i386 Vmi memory hole, Zachary Amsden
|
|
|