[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] x86-64: clear DF for kernel when forwarding syscall



>>> Keir Fraser <Keir.Fraser@xxxxxxxxxxxx> 06/25/07 12:02 AM >>>
>On 24/6/07 11:58, "Jan Beulich" <jbeulich@xxxxxxxxxx> wrote:
>
>> I had sent a mail to that effect (at least I think I had) - on x86-64, this
>> may
>> be the preferred way (at least for the !XEN_COMPAT case), but the i386
>> kernel has to remain runnable on 32-bit Xen, and doing gp-fault-recoverable
>> MSR accesses doesn't buy us anything in terms of not needing specialized
>> Xen code (i.e. if we need special Xen code, we can equally well do
>> hypercalls).
>> For that reason, at this point I implemented both access methods, but haven't
>> got around yet to make the kernel side use them.
>
>The only problem is it probably requires an entirely new top-level hypercall
>because it's not going to fit into the constraints of the existing
>callback_op(). 

Why? The flags mask can be put in the offset/address field, and there's nothing
preventing the guest from putting NULL or even garbage in the selector field on
32-bits.

Jan

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.