From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mailman by lists.gnu.org with archive (Exim 4.33) id 1BcQKh-0005MG-VV for mharc-grub-devel@gnu.org; Mon, 21 Jun 2004 11:03:40 -0400 Received: from mailman by lists.gnu.org with tmda-scanned (Exim 4.33) id 1BcQKg-0005Lj-M1 for grub-devel@gnu.org; Mon, 21 Jun 2004 11:03:38 -0400 Received: from exim by lists.gnu.org with spam-scanned (Exim 4.33) id 1BcQKc-0005Jb-Bc for grub-devel@gnu.org; Mon, 21 Jun 2004 11:03:38 -0400 Received: from [199.232.76.173] (helo=monty-python.gnu.org) by lists.gnu.org with esmtp (Exim 4.33) id 1BcQKc-0005JW-7o for grub-devel@gnu.org; Mon, 21 Jun 2004 11:03:34 -0400 Received: from [64.4.16.57] (helo=hotmail.com) by monty-python.gnu.org with esmtp (Exim 4.34) id 1BcQJ9-0006fe-0m for grub-devel@gnu.org; Mon, 21 Jun 2004 11:02:03 -0400 Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Mon, 21 Jun 2004 08:02:17 -0700 Received: from 194.7.240.2 by by22fd.bay22.hotmail.msn.com with HTTP; Mon, 21 Jun 2004 15:02:17 GMT X-Originating-IP: [194.7.240.2] X-Originating-Email: [lode_leroy@hotmail.com] X-Sender: lode_leroy@hotmail.com From: "lode leroy" To: grub-devel@gnu.org Bcc: Date: Mon, 21 Jun 2004 17:02:17 +0200 Mime-Version: 1.0 Content-Type: text/plain; format=flowed Message-ID: X-OriginalArrivalTime: 21 Jun 2004 15:02:17.0375 (UTC) FILETIME=[BE62DAF0:01C457A0] Subject: calling UNDI API X-BeenThere: grub-devel@gnu.org X-Mailman-Version: 2.1.4 Precedence: list Reply-To: The development of GRUB 2 List-Id: The development of GRUB 2 List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 21 Jun 2004 15:03:39 -0000 Hi, does anyone have code to call UNDI functions from withing GRUB? I can obtain the physical address of a function "entry16point" or "entry32point" which are supposedly callable from real mode and/or protected mode, but I do not know how to use them (successfully) I'm looking into the sources from NILO and etherboot, but there's too much stuff to learn... (I'm not sufficiently familiar with x86 protected mode used in grub2...) -- lode u_int16_t (*entry16point)(u_int16_t func, void *param); /* 16bit stack segment API entry */ /* point. This will be seg:off in */ /* real mode and sel:off in 16:16 */ /* protected mode. */ u_int16_t (*entry32point)(u_int16_t func, void *param); /* 32bit stack segment API entry */ /* point. This will be sel:off. */ /* In real mode, sel == 0 */ _________________________________________________________________ Online een nieuwe taal leren? http://www.msn.be/msnacademy