WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] RE: [Xen-changelog] [xen-unstable] [HVM][SVM] Obtaining

To: "Petersson, Mats" <Mats.Petersson@xxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: Re: [Xen-devel] RE: [Xen-changelog] [xen-unstable] [HVM][SVM] Obtaining instruction address needs to mask to 32 bits
From: Keir Fraser <Keir.Fraser@xxxxxxxxxxxx>
Date: Mon, 02 Oct 2006 14:06:20 +0100
Delivery-date: Mon, 02 Oct 2006 06:05:22 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <907625E08839C4409CE5768403633E0B018E15B1@xxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: Acbkj2Ycm+fX3Gs5TrexzyyKH0xy7gBfZ8EgAAKtui4AAAQ+oAAC8CS0
Thread-topic: [Xen-devel] RE: [Xen-changelog] [xen-unstable] [HVM][SVM] Obtaining instruction address needs to mask to 32 bits
User-agent: Microsoft-Entourage/11.2.5.060620
On 2/10/06 12:56, "Petersson, Mats" <Mats.Petersson@xxxxxxx> wrote:

> Where we're adding to EIP we probably should take this into acocunt -
> although most code wouldn't naturally wrap the IP (in fact, I think it's
> a fault to do so - but I can't confirm that from any of my books), so
> it's probably a very obscure corner-case - but it's probably a bit
> nightmarish to debug so it's possibly better to have code that deals
> with it correctly. I'll figure out if it's a fault or "wrap" that is the
> correct operation first...

I think it faults on AMD and silently wraps on Intel. One of the Xbox hacks
relies on this 'feature' to break into the secure bootstrap sequence. I
doubt anyone legitimately relies on it so I'm not too concerned about this
case.

Also, back to my original point, it's probably a good idea to mask the high
bits of RIP when in 16-bit mode. I doubt that the switch from 32- to 16-bit
mode guarantees to clear those high bits. Or does it?

 -- Keir



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel