> Which does mean you can steal the old TLS value and put it back across
> the calls just by changing the TLS data for that process. [...]
yes - the 0x40 segment can be saved & restored safely. We have per-CPU
GDTs so nobody can modify them while the APM BIOS is executing. (assuming
preemption is disabled.)
> [...] For that matter on Windows emulation I thought Windows also needed
> 0x40 to be the same offset as the BIOS does so can't we leave it
> hardwired ?
another thing: do we want this with descriptor priviledge level 3? Because
the APM 0x40 GDT entry was a ring 0 descriptor, but that would not be
accessible to Wine or DOSEMU.
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to firstname.lastname@example.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/