 
	
| [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v8 16/20] xenctx: Fix handling of !guest_protected_mode
 On 04/01/14 10:14, Ian Campbell wrote: On Thu, 2014-03-27 at 15:05 -0400, Don Slutz wrote:Start with adding the code to the 64 bit path that the 32 bit path has.One for people who keep x86 in their brains, is it possible for a processor to be in 64-bit non-protected mode? 
Not in the way the question is asked.  This case is:
Breakpoint 1, instr_pointer (ctx=ctx@entry=0x7fffffffd040) at xenctx.c:413
413     {
(gdb) p ctxt_word_size
$1 = 8
(gdb) p guest_word_size
$2 = 4
I.E. the context is in 64, the guest is not.
This is why:
void print_ctx(vcpu_guest_context_any_t *ctx)
{
    if (ctxt_word_size == 4)
        print_ctx_32(&ctx->x32);
    else if (guest_word_size == 4)
        print_ctx_32on64(&ctx->x64);
    else
        print_ctx_64(&ctx->x64);
}
exists.
  -Don Slutz
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
 
 
 | 
|  | Lists.xenproject.org is hosted with RackSpace, monitoring our |