[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <m1mz09ritr.fsf@ebiederm.dsl.xmission.com>
Date: Sat, 12 May 2007 12:35:28 -0600
From: ebiederm@...ssion.com (Eric W. Biederman)
To: "H. Peter Anvin" <hpa@...or.com>
Cc: Alexander van Heukelum <heukelum@...lshack.com>,
"Antonino A. Daplas" <adaplas@...il.com>, Andi Kleen <ak@...e.de>,
Andrew Morton <akpm@...l.org>,
Matt Domsch <Matt_Domsch@...l.com>,
Vivek Goyal <vgoyal@...ibm.com>,
James Bottomley <James.Bottomley@...senPar>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Re: x86 setup rewrite tree ready for flamage^W review
"H. Peter Anvin" <hpa@...or.com> writes:
> Eric W. Biederman wrote:
>>
>> HPA is both right and wrong on this. The safe sequence for entering
>> protected mode requires a jump immediately after setting PE in %cr0.
>> To serialize the instruction stream and to be on an execution that
>> is tested and guaranteed to work in cpus.
>>
>
> Eric, that's complete nonsense. What Intel documents and what Intel
> tests are two very different things.
Likely.
> Intel appears to be afraid of what they call "the crack", but the
> semantics of the transition are quite well understood.
Regardless not putting a jump in there violates the principle of
be conservative in what you send.
> A lot of the Intel manuals are boilerplate written by technical writers.
> Once you're used to them you can spot it quite easily because it's
> carried from generation to generation with little change, even when it's
> blatantly obsoleted.
Even on 386 and 486 class cpus?
To some extent if the rules don't change it makes sense for them to
copy the information from one generation to the next of the architecture.
Even if the current cpus don't really care.
I guess I just don't see the sense in taking chances if we don't have
to, and I don't see any real advantage of doing a data segment reload
before the jump.
Eric
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists