Re: Disabling x86 System Management Mode

2007-04-18 Thread John Sigler
Andrew Shewmaker wrote: John Sigler wrote: Andi Kleen wrote: There are usually chipset specific bits that can be set to disable SMMs. See the datasheet if you can get them. Unfortunately most chipset vendors don't give out data sheets easily. I managed to find the south bridge data sheet.

Re: Disabling x86 System Management Mode

2007-04-18 Thread Andrew Shewmaker
On 4/18/07, John Sigler <[EMAIL PROTECTED]> wrote: Andi Kleen wrote: > There are usually chipset specific bits that can be set to disable > SMMs. See the datasheet if you can get them. Unfortunately most > chipset vendors don't give out data sheets easily. I managed to find the south bridge

Re: Disabling x86 System Management Mode

2007-04-18 Thread John Sigler
Andi Kleen wrote: There are usually chipset specific bits that can be set to disable SMMs. See the datasheet if you can get them. Unfortunately most chipset vendors don't give out data sheets easily. I managed to find the south bridge data sheet. http://linux.kernel.free.fr/VT82C686B.pdf

Re: Disabling x86 System Management Mode

2007-04-18 Thread John Sigler
John Sigler wrote: # : >/var/log/kern.log; cat /proc/interrupts; /bin/time insmod houba.ko; cat /proc/interrupts; rmmod houba CPU0 0: 519083XT-PIC-XTtimer 2: 0XT-PIC-XTcascade 9: 0XT-PIC-XTacpi 10: 9786

Re: Disabling x86 System Management Mode

2007-04-18 Thread John Sigler
John Sigler wrote: # : /var/log/kern.log; cat /proc/interrupts; /bin/time insmod houba.ko; cat /proc/interrupts; rmmod houba CPU0 0: 519083XT-PIC-XTtimer 2: 0XT-PIC-XTcascade 9: 0XT-PIC-XTacpi 10: 9786

Re: Disabling x86 System Management Mode

2007-04-18 Thread John Sigler
Andi Kleen wrote: There are usually chipset specific bits that can be set to disable SMMs. See the datasheet if you can get them. Unfortunately most chipset vendors don't give out data sheets easily. I managed to find the south bridge data sheet. http://linux.kernel.free.fr/VT82C686B.pdf

Re: Disabling x86 System Management Mode

2007-04-18 Thread Andrew Shewmaker
On 4/18/07, John Sigler [EMAIL PROTECTED] wrote: Andi Kleen wrote: There are usually chipset specific bits that can be set to disable SMMs. See the datasheet if you can get them. Unfortunately most chipset vendors don't give out data sheets easily. I managed to find the south bridge data

Re: Disabling x86 System Management Mode

2007-04-18 Thread John Sigler
Andrew Shewmaker wrote: John Sigler wrote: Andi Kleen wrote: There are usually chipset specific bits that can be set to disable SMMs. See the datasheet if you can get them. Unfortunately most chipset vendors don't give out data sheets easily. I managed to find the south bridge data sheet.

Re: Disabling x86 System Management Mode

2007-04-17 Thread John Sigler
Andi Kleen wrote: Modern x86 CPUs execute code out of order and in parallel. I am aware of the (apparent) non-deterministic nature of superscalar out-of-order speculative execution. The reordering window can be quite large and the CPU can execute code speculatively. This can add large

Re: Disabling x86 System Management Mode

2007-04-17 Thread John Sigler
John Sigler wrote: static int hello_init(void) { int i; int *lat; printk(KERN_ALERT "INIT\n"); lat = kmalloc(MAX * sizeof *lat, GFP_KERNEL); if (lat == NULL) return -1; for (i=0; i < MAX; ++i) lat[i] = 0; for (i=0; i < 5; ++i) foo(); for (i=0; i < N; ++i) { unsigned count,

Re: Disabling x86 System Management Mode

2007-04-17 Thread Andi Kleen
On Tue, Apr 17, 2007 at 06:49:09PM +0200, John Sigler wrote: > >>.globl foo > >>foo: > >> push %ebx > >> push %esi > >> cpuid > >> rdtsc > > > >At least some SMM implementations restore the old TSC value. Sad but true. > > Why would they do that? I asked the same question. But it has

Re: Disabling x86 System Management Mode

2007-04-17 Thread John Sigler
Andi Kleen wrote: Please use a full real name for posting. OK. John Sigler wrote: AFAIU, even a hard real-time OS is "defenseless" against SMIs that kick the CPU into SMM. There are usually chipset specific bits that can be set to disable SMMs. See the datasheet if you can get them.

Re: Disabling x86 System Management Mode

2007-04-17 Thread John Sigler
Andi Kleen wrote: Please use a full real name for posting. OK. John Sigler wrote: AFAIU, even a hard real-time OS is defenseless against SMIs that kick the CPU into SMM. There are usually chipset specific bits that can be set to disable SMMs. See the datasheet if you can get them.

Re: Disabling x86 System Management Mode

2007-04-17 Thread Andi Kleen
On Tue, Apr 17, 2007 at 06:49:09PM +0200, John Sigler wrote: .globl foo foo: push %ebx push %esi cpuid rdtsc At least some SMM implementations restore the old TSC value. Sad but true. Why would they do that? I asked the same question. But it has been observed. How would

Re: Disabling x86 System Management Mode

2007-04-17 Thread John Sigler
John Sigler wrote: static int hello_init(void) { int i; int *lat; printk(KERN_ALERT INIT\n); lat = kmalloc(MAX * sizeof *lat, GFP_KERNEL); if (lat == NULL) return -1; for (i=0; i MAX; ++i) lat[i] = 0; for (i=0; i 5; ++i) foo(); for (i=0; i N; ++i) { unsigned count, res;

Re: Disabling x86 System Management Mode

2007-04-17 Thread John Sigler
Andi Kleen wrote: Modern x86 CPUs execute code out of order and in parallel. I am aware of the (apparent) non-deterministic nature of superscalar out-of-order speculative execution. The reordering window can be quite large and the CPU can execute code speculatively. This can add large

Re: Disabling x86 System Management Mode

2007-04-16 Thread Andi Kleen
John <[EMAIL PROTECTED]> writes: Please use a full real name for posting. > AFAIU, even a hard real-time OS is "defenseless" against SMIs that > kick the CPU into SMM. There are usually chipset specific bits that can be set to disable SMMs. See the datasheet if you can get them. Unfortunately

Re: Disabling x86 System Management Mode

2007-04-16 Thread Lee Revell
On 4/16/07, John <[EMAIL PROTECTED]> wrote: Chipset: VIA Pro133T http://www.via.com.tw/en/products/chipsets/legacy/pro133/ VT82C694T north bridge + VT82C686B south bridge AFAIU, the south bridge can be a source of SMIs. Can the north bridge also be a source of SMIs? What I/O ports do I need to

Re: Disabling x86 System Management Mode

2007-04-16 Thread John
John wrote: On the systems I have to work with [...] I didn't specify what they were. CPU: Intel Pentium 3 # cat /proc/cpuinfo processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 11 model name : Intel(R) Pentium(R) III CPU - S 1266MHz

Disabling x86 System Management Mode

2007-04-16 Thread John
Hello everyone, According to Wikipedia: http://en.wikipedia.org/wiki/Non-Maskable_Interrupt http://en.wikipedia.org/wiki/System_Management_Mode "SMM is an operating mode of the Intel 386SL and later microprocessor in which all normal execution (including the operating system) is suspended,

Disabling x86 System Management Mode

2007-04-16 Thread John
Hello everyone, According to Wikipedia: http://en.wikipedia.org/wiki/Non-Maskable_Interrupt http://en.wikipedia.org/wiki/System_Management_Mode SMM is an operating mode of the Intel 386SL and later microprocessor in which all normal execution (including the operating system) is suspended, and

Re: Disabling x86 System Management Mode

2007-04-16 Thread John
John wrote: On the systems I have to work with [...] I didn't specify what they were. CPU: Intel Pentium 3 # cat /proc/cpuinfo processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 11 model name : Intel(R) Pentium(R) III CPU - S 1266MHz

Re: Disabling x86 System Management Mode

2007-04-16 Thread Lee Revell
On 4/16/07, John [EMAIL PROTECTED] wrote: Chipset: VIA Pro133T http://www.via.com.tw/en/products/chipsets/legacy/pro133/ VT82C694T north bridge + VT82C686B south bridge AFAIU, the south bridge can be a source of SMIs. Can the north bridge also be a source of SMIs? What I/O ports do I need to

Re: Disabling x86 System Management Mode

2007-04-16 Thread Andi Kleen
John [EMAIL PROTECTED] writes: Please use a full real name for posting. AFAIU, even a hard real-time OS is defenseless against SMIs that kick the CPU into SMM. There are usually chipset specific bits that can be set to disable SMMs. See the datasheet if you can get them. Unfortunately most