Branch: refs/heads/next
  Home:   https://github.com/siemens/jailhouse
  Commit: 6ca605d1fd3d6d16cf89fed0812305f81bde8d7d
      
https://github.com/siemens/jailhouse/commit/6ca605d1fd3d6d16cf89fed0812305f81bde8d7d
  Author: Ralf Ramsauer <[email protected]>
  Date:   2019-06-10 (Mon, 10 Jun 2019)

  Changed paths:
    M inmates/tests/x86/mmio-access.c

  Log Message:
  -----------
  inmates: x86: mmio: fix data width of test

The sequence 67 48 a1 f8 1f 10 00 is "addr32 mov 0x101ff8, %rax".

In fact, data is accessed 64-bit wide, and not 32-bit wide as the
comment stated, and as the comparison expected.

0x67 only restricts the absolute address operand, and not the data
width.

Let's also use the mnemonic instead of the binary representation.

Cc: Henning Schild <[email protected]>
Fixes: 23f745cbe19089d ("x86: mmio: Skip over address size prefix found in x32 
code")
Signed-off-by: Ralf Ramsauer <[email protected]>
Signed-off-by: Jan Kiszka <[email protected]>


-- 
You received this message because you are subscribed to the Google Groups 
"Jailhouse" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/jailhouse-dev/siemens/jailhouse/push/refs/heads/next/7c0d29-6ca605%40github.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to