linux/arch/x86
Bart Kuivenhoven 0ce6cda2c7 x86 efi: bugfix interrupt disabling sequence
The problem in efi_main was that the idt was cleared before the
interrupts were disabled.

The UEFI spec states that interrupts aren't used so this shouldn't be
too much of a problem. Peripherals however don't necessarily know about
this and thus might cause interrupts to happen anyway. Even if
ExitBootServices() has been called.

This means there is a risk of an interrupt being triggered while the IDT
register is nullified and the interrupt bit hasn't been cleared,
allowing for a triple fault.

This patch disables the interrupt flag, while leaving the existing IDT
in place. The CPU won't care about the IDT at all as long as the
interrupt bit is off, so it's safe to leave it in place as nothing will
ever happen to it.

[ Removed the now unused 'idt' variable - Matt ]

Signed-off-by: Bart Kuivenhoven <bemk@redhat.com>
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
2013-09-30 10:23:11 +01:00
..
boot x86 efi: bugfix interrupt disabling sequence 2013-09-30 10:23:11 +01:00
configs
crypto
ia32
include
kernel
kvm
lguest
lib
math-emu
mm
net
oprofile
pci
platform efi: x86: make efi_lookup_mapped_addr() a common function 2013-09-05 13:29:29 +01:00
power
realmode
syscalls
tools
um
vdso
video
xen
.gitignore
Kbuild
Kconfig EFI stub documentation updates 2013-09-25 12:34:32 +01:00
Kconfig.cpu
Kconfig.debug
Makefile
Makefile_32.cpu
Makefile.um