Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Mon, 12 Aug 2002 09:17:29 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Mon, 12 Aug 2002 09:17:29 -0400 Received: from mx1.elte.hu ([157.181.1.137]:12493 "HELO mx1.elte.hu") by vger.kernel.org with SMTP id ; Mon, 12 Aug 2002 09:17:29 -0400 Date: Mon, 12 Aug 2002 17:20:01 +0200 (CEST) From: Ingo Molnar Reply-To: Ingo Molnar To: Alan Cox Cc: Stephen Rothwell , Linus Torvalds , , , Subject: Re: [patch] tls-2.5.31-C3 In-Reply-To: <1029146896.16216.113.camel@irongate.swansea.linux.org.uk> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 929 Lines: 25 On 12 Aug 2002, Alan Cox wrote: > Which does mean you can steal the old TLS value and put it back across > the calls just by changing the TLS data for that process. [...] yes - the 0x40 segment can be saved & restored safely. We have per-CPU GDTs so nobody can modify them while the APM BIOS is executing. (assuming preemption is disabled.) > [...] For that matter on Windows emulation I thought Windows also needed > 0x40 to be the same offset as the BIOS does so can't we leave it > hardwired ? another thing: do we want this with descriptor priviledge level 3? Because the APM 0x40 GDT entry was a ring 0 descriptor, but that would not be accessible to Wine or DOSEMU. Ingo - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/