[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4D3F07BA.5030702@zytor.com>
Date: Tue, 25 Jan 2011 09:26:18 -0800
From: "H. Peter Anvin" <hpa@...or.com>
To: "Ahmed S. Darwish" <darwish.07@...il.com>
CC: Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>, X86-ML <x86@...nel.org>,
Tony Luck <tony.luck@...el.com>, Dave Jones <davej@...hat.com>,
Andrew Morton <akpm@...ux-foundation.org>,
Randy Dunlap <rdunlap@...otime.net>,
Willy Tarreau <wtarreau@...a.kernel.org>,
Willy Tarreau <w@....eu>, Dirk Hohndel <hohndel@...radead.org>,
Dirk.Hohndel@...el.com, IDE-ML <linux-ide@...r.kernel.org>,
LKML <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH -next 1/2][RFC] x86: Saveoops: Switch to real-mode and
call BIOS
On 01/25/2011 05:51 AM, Ahmed S. Darwish wrote:
>
> We get called here upon panic()s to save the kernel log buffer.
>
> First, switch from 64-bit long mode to 16-bit real mode. Afterwards, save the
> log buffer to disk using extended INT 0x13 BIOS services. The user has given
> us an absolute LBA disk address to save the log buffer to.
>
> By x86 design, this code is mandated to run on a single identity-mapped page.
>
> - How to initialize the disk hardware to its POST state (thus making the
> BIOS code work reliably) while keeping system RAM unmodified?
You can't safely do so, really.
> - Is it guaranteed that '0x80' will always be the boot disk drive number?
> If not, we need to be passed the boot drive number from the bootloader.
It's not, and we may not even be booting from disk.
This code seems extremely dangerous, in the "may eat your data" kind of
way. Using the BIOS once the kernel has run is cantankerous, using it
to *write* is potentially lethal.
-hpa
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists