X86 | Lds

Eleanor muttered, “Oh, you ancient beast.”

lds bx, [si] ; Load 32-bit pointer from address DS:SI into DS:BX The geophysicist had used it to chase a linked list of fault lines. Eleanor realized the bug: the code assumed SI pointed to a far pointer stored in the current data segment. But in protected mode, under a DOS extender, DS could change anytime a task switched. One moment DS pointed to low memory; the next, to a buffer in extended memory.

She couldn’t just remove the LDS . The entire linked list traversal depended on far pointers. But she could replace it.

A decade later, she’d tell interns: “ LDS loads a pointer and destroys your data segment. Respect it. Then avoid it.” x86 lds

“It poisoned its own segment register,” Eleanor whispered. “Like a snake biting its tail.”

In the spring of 1992, Eleanor, a young and slightly reckless systems programmer, found herself hunched over a beige 386 DX/40. The machine groaned under MS-DOS 5.0, and in front of her was a nightmare: a core dump from a geological modeling program she’d inherited.

The disassembly pointed to one instruction: LDS . Eleanor muttered, “Oh, you ancient beast

That night, Eleanor poured a whiskey and thought about LDS . Born in 1978 with the 8086, mature in the 286’s protected mode, and already a zombie on the 386—kept alive only by backward compatibility. It was the programming equivalent of a rotary phone in a smartphone world. You could still use it. But you really, really shouldn’t.

The offending line looked innocent:

After patching, the model ran. It plotted Devonian shale layers for three hours without a single fault. One moment DS pointed to low memory; the

The code was a fossil, written in a hybrid of C and inline assembly by a geophysicist who had long since retired to a cabin without electricity. The error was a General Protection Fault (GPF)—the 386’s way of screaming, “You touched memory you don’t own.”

She knew LDS —Load Pointer Using DS. A relic from the segmented memory model of the 16-bit era, when pointers were 32-bit monsters: a 16-bit segment and a 16-bit offset. On her 32-bit 386, it still worked—mostly. But it was a time bomb.

And somewhere in a museum, a 386 motherboard smiled, its LDS instruction still perfectly capable of crashing any program that dared to wake it.