Displaying 5 results from an estimated 5 matches for "comapi_open".
2004 Feb 11
2
Problem with opening a file
...olks,
I've got a problem with COMBoot (16 bit) in SYSLINUX 2.06: while the write
string call (ax=2, int 22h) works just fine, the open file call (ax=6, int
22h) does nothing at all. Calling that function doesn't modify any register,
and doesn't modify the carry flag.
I then modified comapi_open in comboot.inc so it sets ax to some value and
recompiled SYSLINUX, reinstalled it in my disk image and reran my tests, and
still no modification to ax... I checked the syslinux source and my magic
values (0xDEAD and 0xBEEF for success and failure) are there, so the code did
get compiled.
Does...
2010 Apr 30
4
Syslinux 4.00-pre40 now a Release Candidate
I just released Syslinux 4.00-pre40. This is now a Release Candidate,
meaning that it is on track to be released as it currently is unless I
hear back about currently unexpected problems.
If you have a chance, please pretty please test it.
-hpa
2012 Jun 26
2
[GIT PULL] elflink bug fixes
...art with clean registers */
memset(&inregs, 0, sizeof(com32sys_t));
+ buf = lmalloc(size);
+ if (!buf)
+ return 0;
+
/* Put the filename in the bounce buffer */
- strlcpy(__com32.cs_bounce, filename, __com32.cs_bounce_size);
+ strlcpy(buf, filename, size);
/* Call comapi_open() which returns a structure pointer in SI
* to a structure whose first member happens to be the LBA.
*/
inregs.eax.w[0] = 0x0006;
- inregs.esi.w[0] = OFFS(__com32.cs_bounce);
- inregs.es = SEG(__com32.cs_bounce);
+ inregs.esi.w[0] = OFFS(buf);
+ inregs.es = SEG(buf);...
2012 Jul 16
5
[PATCH 0/5] Deleting __intcall() from Syslinux
From: Matt Fleming <matt.fleming at intel.com>
Since we can't use __intcall() for EFI, and since we can now have the
ELF module code resolve all our symbols at runtime, we should delete
as many references to __intcall() as possible and just access the
symbols directly.
The most interesting patch is the support for weak symbols. We need to
be able to reference derivative-specific
2012 Aug 14
1
[GIT PULL] elflink fixes
...Start with clean registers */
- memset(&inregs, 0, sizeof(com32sys_t));
-
buf = lmalloc(size);
if (!buf)
return 0;
@@ -108,32 +107,15 @@ uint32_t get_file_lba(const char *filename)
/* Put the filename in the bounce buffer */
strlcpy(buf, filename, size);
- /* Call comapi_open() which returns a structure pointer in SI
- * to a structure whose first member happens to be the LBA.
- */
- inregs.eax.w[0] = 0x0006;
- inregs.esi.w[0] = OFFS(buf);
- inregs.es = SEG(buf);
- __com32.cs_intcall(0x22, &inregs, &inregs);
-
- if ((inregs.eflags.l &...