Branch: refs/heads/next
Home: https://github.com/siemens/jailhouse
Commit: 6ca605d1fd3d6d16cf89fed0812305f81bde8d7d
https://github.com/siemens/jailhouse/commit/6ca605d1fd3d6d16cf89fed0812305f81bde8d7d
Author: Ralf Ramsauer <[email protected]>
Date: 2019-06-10 (Mon, 10 Jun 2019)
Changed paths:
M inmates/tests/x86/mmio-access.c
Log Message:
-----------
inmates: x86: mmio: fix data width of test
The sequence 67 48 a1 f8 1f 10 00 is "addr32 mov 0x101ff8, %rax".
In fact, data is accessed 64-bit wide, and not 32-bit wide as the
comment stated, and as the comparison expected.
0x67 only restricts the absolute address operand, and not the data
width.
Let's also use the mnemonic instead of the binary representation.
Cc: Henning Schild <[email protected]>
Fixes: 23f745cbe19089d ("x86: mmio: Skip over address size prefix found in x32
code")
Signed-off-by: Ralf Ramsauer <[email protected]>
Signed-off-by: Jan Kiszka <[email protected]>
--
You received this message because you are subscribed to the Google Groups
"Jailhouse" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/jailhouse-dev/siemens/jailhouse/push/refs/heads/next/7c0d29-6ca605%40github.com.
For more options, visit https://groups.google.com/d/optout.