[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [Xen-devel] [Patch] Fix for x86_64 boot failures due to badsegment setup for protected mode.
This patch caused one problem. If the guest change the DS/SS etc between it set cr0.PE and the jump instruction. Considering following code: mov eax, cr0 or eax, 0x11 mov cr0, eax ---> here enable PE, and old_ctx.ds is cleard mov ax, 0x0020 mov ds, ax -> changes the DS here jmp pword ptr [edi + 0x60] mov ax, word ptr [bx + 0x00a8] The vmxassit clear the oldctx.ds_sel when guest enable PE, and when guest executed the mov ds, ax, the content on oldctx is not updated. Later when the last instruction, the ds is infact 0x0, not the 0x20 as guest hoped. This issue is in fact not caused entirely by this change, since we should emulate all instructions between the set cr0.PE and the jump instruction. But because the "mov ds, ax" is in fact executed by guest, not by vmxassist, it do cause problem for us. Thanks Yunhong Jiang -----Original Message----- From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx [mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Stephen C. Tweedie Sent: 2006年11月10日 1:31 To: Keir Fraser Cc: Yu, Wilfred; Xin, Xiaohui; xen-devel@xxxxxxxxxxxxxxxxxxx; Herbert Xu; Li, Susie; Steven Rostedt; Li, Xin B Subject: Re: [Xen-devel] [Patch] Fix for x86_64 boot failures due to badsegment setup for protected mode. Hi, On Thu, 2006-11-09 at 14:08 +0000, Keir Fraser wrote: > A smaller patch might have been to implement those VMENTER sanity checks > inside load_seg(). I'm sure they're quite simple. I checked, as that was going to be my first approach. Turns out that they are not actually all that simple, with all sorts of different rules for base, size, access rights, type, flags and so on, dependent on which segment it is, whether it's 16 or 32-bit, etc. They aren't _too_ tricky, but after looking at it some, there are enough rules there that I was actually more worried about introducing a regression going down that route than in the patch I ended up with. Cheers, Stephen _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |