-
Notifications
You must be signed in to change notification settings - Fork 35
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
out of range top detection #522
Comments
we've discussed this locally - we think the main issue is to prevent cases where the top overflows from allowing accesses to wrap the address space and allow access to byte 0, which the SAIL curently does, even though byte 0 is out of bounds |
I'm not sure if I'm reading that right: the SAIL currently allows the access, or doesn't allow it? I would have thought it would not allow it. Broadly, the way I thought of it currently is that addresses wrap but bounds don't. |
@PeterRugg - If you have a cap with Current Sail function:
This was modified to the following, which solved the issue:
So for a non-infinite bounds case, the |
cases where the top is greater than the infinite top are hard to detect without expanding the bounds
they are in the same category as malformed bounds, i.e. can not be created by correct hardware
#521
The PR has a suggestion of how to detect them and clear the tag in hardware
The text was updated successfully, but these errors were encountered: