All of lore.kernel.org
 help / color / mirror / Atom feed
* [Qemu-devel] [Bug 1078892] [NEW] qemu doesn't general protection fault if there are reserved bits set in page-directory-pointer table entries
@ 2012-11-14 20:48 Alexander Chernyakhovsky
  2017-04-07 13:54 ` [Qemu-devel] [Bug 1078892] " Thomas Huth
  2017-06-07  4:17 ` Launchpad Bug Tracker
  0 siblings, 2 replies; 3+ messages in thread
From: Alexander Chernyakhovsky @ 2012-11-14 20:48 UTC (permalink / raw)
  To: qemu-devel

Public bug reported:

While working on implementing 32-bit PAE mode in a custom operating
system, which I was testing in QEMU, I noticed that my OS worked
correctly, but resulted in a general protection fault when booted on
VMware, VirtualBox, or bochs.

According to the Intel Architecture Manual, Volume 3A, Section 4.4.1
"PDPTE Registers", "If any of the PDPTEs sets both the P flag (bit 0)
and any reserved bit, the MOV to CR instruction causes a general-
protection exception (#GP(0)) and the PDPTEs are not loaded." QEMU does
not emulate this behavior.

** Affects: qemu
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1078892

Title:
  qemu doesn't general protection fault if there are reserved bits set
  in page-directory-pointer table entries

Status in QEMU:
  New

Bug description:
  While working on implementing 32-bit PAE mode in a custom operating
  system, which I was testing in QEMU, I noticed that my OS worked
  correctly, but resulted in a general protection fault when booted on
  VMware, VirtualBox, or bochs.

  According to the Intel Architecture Manual, Volume 3A, Section 4.4.1
  "PDPTE Registers", "If any of the PDPTEs sets both the P flag (bit 0)
  and any reserved bit, the MOV to CR instruction causes a general-
  protection exception (#GP(0)) and the PDPTEs are not loaded." QEMU
  does not emulate this behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1078892/+subscriptions

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [Qemu-devel] [Bug 1078892] Re: qemu doesn't general protection fault if there are reserved bits set in page-directory-pointer table entries
  2012-11-14 20:48 [Qemu-devel] [Bug 1078892] [NEW] qemu doesn't general protection fault if there are reserved bits set in page-directory-pointer table entries Alexander Chernyakhovsky
@ 2017-04-07 13:54 ` Thomas Huth
  2017-06-07  4:17 ` Launchpad Bug Tracker
  1 sibling, 0 replies; 3+ messages in thread
From: Thomas Huth @ 2017-04-07 13:54 UTC (permalink / raw)
  To: qemu-devel

Triaging old bug tickets ... can you still reproduce this issue with the
latest version of QEMU (version 2.9)?

** Changed in: qemu
       Status: New => Incomplete

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1078892

Title:
  qemu doesn't general protection fault if there are reserved bits set
  in page-directory-pointer table entries

Status in QEMU:
  Incomplete

Bug description:
  While working on implementing 32-bit PAE mode in a custom operating
  system, which I was testing in QEMU, I noticed that my OS worked
  correctly, but resulted in a general protection fault when booted on
  VMware, VirtualBox, or bochs.

  According to the Intel Architecture Manual, Volume 3A, Section 4.4.1
  "PDPTE Registers", "If any of the PDPTEs sets both the P flag (bit 0)
  and any reserved bit, the MOV to CR instruction causes a general-
  protection exception (#GP(0)) and the PDPTEs are not loaded." QEMU
  does not emulate this behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1078892/+subscriptions

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [Qemu-devel] [Bug 1078892] Re: qemu doesn't general protection fault if there are reserved bits set in page-directory-pointer table entries
  2012-11-14 20:48 [Qemu-devel] [Bug 1078892] [NEW] qemu doesn't general protection fault if there are reserved bits set in page-directory-pointer table entries Alexander Chernyakhovsky
  2017-04-07 13:54 ` [Qemu-devel] [Bug 1078892] " Thomas Huth
@ 2017-06-07  4:17 ` Launchpad Bug Tracker
  1 sibling, 0 replies; 3+ messages in thread
From: Launchpad Bug Tracker @ 2017-06-07  4:17 UTC (permalink / raw)
  To: qemu-devel

[Expired for QEMU because there has been no activity for 60 days.]

** Changed in: qemu
       Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1078892

Title:
  qemu doesn't general protection fault if there are reserved bits set
  in page-directory-pointer table entries

Status in QEMU:
  Expired

Bug description:
  While working on implementing 32-bit PAE mode in a custom operating
  system, which I was testing in QEMU, I noticed that my OS worked
  correctly, but resulted in a general protection fault when booted on
  VMware, VirtualBox, or bochs.

  According to the Intel Architecture Manual, Volume 3A, Section 4.4.1
  "PDPTE Registers", "If any of the PDPTEs sets both the P flag (bit 0)
  and any reserved bit, the MOV to CR instruction causes a general-
  protection exception (#GP(0)) and the PDPTEs are not loaded." QEMU
  does not emulate this behavior.

To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1078892/+subscriptions

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2017-06-07  4:30 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2012-11-14 20:48 [Qemu-devel] [Bug 1078892] [NEW] qemu doesn't general protection fault if there are reserved bits set in page-directory-pointer table entries Alexander Chernyakhovsky
2017-04-07 13:54 ` [Qemu-devel] [Bug 1078892] " Thomas Huth
2017-06-07  4:17 ` Launchpad Bug Tracker

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.