From: malware@t-online.de (Michael Mueller)
To: unlisted-recipients:; (no To-header on input)@pop.zip.com.au
Cc: linux-kernel@vger.kernel.org
Subject: Re: Strange 2.4.2 boot error
Date: Fri, 02 Mar 2001 23:32:17 +0100 [thread overview]
Message-ID: <200103022232.XAA20644@fire.malware.de> (raw)
In-Reply-To: <3A9A9A75.6B6B5311@idcomm.com> <97ensv$u1k$1@fire.malware.de> <3A9B3CFD.CEBF80B6@idcomm.com> <97hf1j$cd1$1@fire.malware.de> <3A9C80BC.E5984683@idcomm.com>
Hi folks and D. Stimits,
Summary of discussion taken place so far (for linux-kernel people):
D. Stimits noticed he can not boot his kernel from a 1.44MB floppy
created with "make bzdisk". This would lead into a register dump. The
dump does show the boot code tries to read track 80 of the disk.
However mkbootdisk as delivered with a pre-release of the RedHat 7.1
distribution can be used to create a working boot disk using the bzImage
generated by above.
My last question to D. Stimits was:
> > How large is the file ./arch/i386/boot/bzImage?
And he answered
> 1040155 Feb 24 23:28 bzImage
>
> Definitely within 1.44 Mb floppy size.
I see following problem with the bootsector code for bzImage:
Within bootsector the size of the kernel is stored as number of 16 byte
blocks. This gives a number of 0xfdf2 in this case.
Now while loading the kernel the bootsector code calls a helper routine
(in setup[.S]) which does copy 64kByte if available and does nothing
else. This routine does the return the number of 16 byte blocks read.
This number then is a multiple of 1000h.
So no when a kernel of above size is completely loaded the count of the
16 byte blocks returned by the helper routine wents from f000h into
0000h due to the 16 bit size of the register ax used. The bootsector
code does then compare 0000h to fdf2h and it is less, so it does
continue loading until it does reach the end of the disk and fails with
a read error.
Malware
parent reply other threads:[~2001-03-02 22:32 UTC|newest]
Thread overview: expand[flat|nested] mbox.gz Atom feed
[parent not found: <3A9C80BC.E5984683@idcomm.com>]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=200103022232.XAA20644@fire.malware.de \
--to=malware@t-online.de \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox