From owner-freebsd-hackers Fri Nov 7 18:05:35 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id SAA09565 for hackers-outgoing; Fri, 7 Nov 1997 18:05:35 -0800 (PST) (envelope-from owner-freebsd-hackers) Received: from word.smith.net.au (word.smith.net.au [202.0.75.3]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id SAA09559 for ; Fri, 7 Nov 1997 18:05:29 -0800 (PST) (envelope-from mike@word.smith.net.au) Received: from word.smith.net.au (localhost.smith.net.au [127.0.0.1]) by word.smith.net.au (8.8.7/8.8.5) with ESMTP id MAA00452; Sat, 8 Nov 1997 12:31:31 +1030 (CST) Message-Id: <199711080201.MAA00452@word.smith.net.au> X-Mailer: exmh version 2.0zeta 7/24/97 To: Jonathan Mini cc: Mike Smith , hackers@FreeBSD.ORG Subject: Re: x86 gods; advice? Suggestions? In-reply-to: Your message of "Fri, 07 Nov 1997 01:44:44 -0800." <19971107014444.46046@micron.mini.net> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Sat, 08 Nov 1997 12:31:29 +1030 From: Mike Smith Sender: owner-freebsd-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk > Mike Smith stands accused of saying: > > > What privelege level is this running at? > > > > It has to run with DPL = 0. > > Why? Because it has to in order to meet the spec. If you're interested, or think you have some ideas on this, you can grab the spec from microsoft's website. Make sure you get the clarification as well, as there's a very confusing error in one of the critical digrams... > > > Why not just execute an illegal instruction and catch it? > > > > Because this is in the kernel context, and I've no way of knowing how > > to say "just for now I want illegal instructions to come here". > > Although it seems less elegant, it seems to me that it really is the best > solution to create threads for kernel-started processes for things like > vm86/16-bit-protected-mode BIOS calls. Is it feasible to fork a process running in 16-bit protected mode? I know the vm86 stuff works; I'm using it now. > What we need is an elegant way to fork a process to do something for the > kernel. (an interesting concept when you think about it. Kind of a reverse > syscall) It's actually pretty easy; with any luck I'll be happy enough with the vm86 stuff to commit it tomorrow. mike