From owner-freebsd-hackers Mon Nov 10 02:26:23 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id CAA20760 for hackers-outgoing; Mon, 10 Nov 1997 02:26:23 -0800 (PST) (envelope-from owner-freebsd-hackers) Received: from d198-232.uoregon.edu (d198-232.uoregon.edu [128.223.198.232]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id CAA20753 for ; Mon, 10 Nov 1997 02:26:20 -0800 (PST) (envelope-from mini@d198-232.uoregon.edu) Received: (from mini@localhost) by d198-232.uoregon.edu (8.8.5/8.8.5) id CAA26782; Mon, 10 Nov 1997 02:25:41 -0800 (PST) Message-ID: <19971110022540.34863@micron.mini.net> Date: Mon, 10 Nov 1997 02:25:40 -0800 From: Jonathan Mini To: Tony Overfield Cc: Mike Smith , John-Mark Gurney , Chuck Robey , Terry Lambert , jamil@trojanhorse.ml.org, hackers@freebsd.org Subject: Re: >64MB References: <199711070205.MAA00455@word.smith.net.au> <3.0.3.32.19971110034509.0069e370@bugs.us.dell.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 0.85e In-Reply-To: <3.0.3.32.19971110034509.0069e370@bugs.us.dell.com>; from Tony Overfield on Mon, Nov 10, 1997 at 03:45:09AM -0600 X-files: The Truth is Out There Sender: owner-freebsd-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Tony Overfield stands accused of saying: > At 12:34 PM 11/7/97 +1030, Mike Smith wrote: > >The kernel is loaded above 1M, so you would have to be careful to make > >sure that your BIOS calls came out of the lowest 64K. That could be > >done with a dispatcher in locore.s though. > > I assume you mean the lowest 640K. But yes, a dispatcher would have > to exist down there, with a buffer large enough for your INT 13h calls > and etc. THat's not true, the call needs to come from the lower 1087K, or the lower 1024K (1M) if you want to be really nice. (calculate the linear adress for FFFF:FFFF - it's (64K - 1) above 1M) > >The other reason is that I don't know how to make the change. 8) If I > >did, I'd certainly consider it, although vm86 has a few other uses that > >argue for using it just out of commonality. > > Have you seen this? > > /pub/NetBSD-current/src/sys/arch/i386/bioscall/biostramp.S > > I don't know if it works, but it looks simple enough. I do realize it > offends the sensibilities of some real-mode fearing folks. > > If you can't trust the BIOS after the kernel is in memory, how can you > trust it to load the kernel into memory? While the kernel is still > "booting...", the BIOS should be safe enough to call in real-mode. The reason you can't trust the BIOS always is because once FreeBSD touches a device, the BIOS doesn't know it and might assume that the device is in a different state than it really is. The solution to this is to ensure that the BIOS and FreeBSD never touch the same devices. The only real way to ensure this is if FreeBSD doesn't touch devices, or the BIOS doesn't touch devices. -- Jonathan Mini Ingenious Productions Software Development P.O. Box 5693, Eugene, Or. 97405 "A child of five could understand this! Quick -- Fetch me a child of five."