Hello, I've been working on an open-source BIOS project called SeaBIOS for the last few years: http://seabios.org/
I'm trying to track down some information on whether or not programs are known to call the BIOS in 16bit protected mode. I thought I'd reach out to this audience as well, as I suspect the group here has quite a bit of knowledge of applications that directly invoke the BIOS. Specifically, I am trying to determine if there are legacy applications or operating systems that invoke standard BIOS real-mode interrupt handlers while in 16bit protected mode. (The legacy real-mode entry points - like "int 0x13" - not the declared 16bit protected mode entry points defined by the PnP and APM specs.) I am considering changes to SeaBIOS that would make 16bit protected mode callers much less likely to work. (Specifically, enhancing SeaBIOS to use memory in the e-segment which is unlikely to be mapped in protected mode.) Most documents I've seen state that calling the real-mode entry points in protected mode will not work. Though, I am aware that the PCI BIOS spec specifically requires this support for calls to "int 0x1a ah=0xb1". The advantage of making these changes is that it will allow SeaBIOS to use notably less stack space and therefore be more compatible with old applications that call the BIOS with very little stack space. For example, these changes enable DOS 1.0 to boot and run under SeaBIOS. What would really help is pointers to applications and/or program images that use 16bit protected mode calls to real-mode entry points. Specifications or documents detailing valid or invalid uses would also be helpful. For those that are willing to run tests, one can compare the standard SeaBIOS v1.7.0 image (for KVM/QEMU) at: http://git.seabios.org/downloads/get/bios.bin-1.7.0.gz to a test image with the new code at: http://git.seabios.org/downloads/get/bios.bin-test-20120613.gz Thanks, -Kevin ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Freedos-devel mailing list Freedos-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/freedos-devel