[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <p73odlo55q2.fsf@bingen.suse.de>
Date: 17 Apr 2007 00:12:21 +0200
From: Andi Kleen <andi@...stfloor.org>
To: John <linux.kernel@...e.fr>
Cc: linux-kernel@...r.kernel.org
Subject: Re: Disabling x86 System Management Mode
John <linux.kernel@...e.fr> writes:
Please use a full real name for posting.
> AFAIU, even a hard real-time OS is "defenseless" against SMIs that
> kick the CPU into SMM.
There are usually chipset specific bits that can be set to disable SMMs.
See the datasheet if you can get them. Unfortunately most chipset vendors
don't give out data sheets easily.
> .globl foo
> foo:
> push %ebx
> push %esi
> cpuid
> rdtsc
At least some SMM implementations restore the old TSC value. Sad but true.
Besides RDTSC can be speculated around on some CPUs which also adds errors.
-Andi
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists