From: noemail@basdxcqvbe.com   
      
   On Thu, 1 Jul 2021 23:14:26 -0700 (PDT)   
   "muta...@gmail.com" wrote:   
      
   > On Friday, July 2, 2021 at 2:42:32 PM UTC+10, Frank Kotler wrote:   
   >   
   > > > It may be, but I am certain there is no manipulation or use   
   > > > of "fs" in the Win32 executables I produce, because I know   
   > > > what goes into every byte of code,   
   > > Excellent!   
   > > ...   
   > > > I don't care if there are 50 billion INT calls and syscalls   
   > > > and manipulation of hardware and segment register   
   > > > manipulation so long as it happens OUTSIDE my   
   > > > executable.   
   >   
   > > Okay. I can assure you that there is no "crap" in an ordinary Linux   
   > > executable. The int 80h vector, ect. are set up by the OS. well   
   > > outside of out executable. No special permissions.   
   >   
   > No, you don't get my point. "int 80h" inside my executable   
   > *is* "crap". It requires the *caller* to have special   
   > permissions (they need to ensure an interrupt vector   
   > table exists).   
   >   
   > It may not exist.   
      
   ...   
      
   > I want to run Linux executables from PDOS/386, running   
   > as an unprivileged program running under Windows 10.   
   > I don't have access to INT 80H so the executable will   
   > fail (unless I was to somehow scan the executable and   
   > zap them all into callbacks).   
   >   
      
   You may wish to look at this old project. It directly runs Linux   
   executables under Windows. An old post of mine says it has an "int   
   0x80 syscall interface, DLL loader, and no POSIX layer".   
      
   LINE is not an emulator   
   https://sourceforge.net/projects/line/   
      
   --   
   What is hidden in the ground, when found, is hidden there again?   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   
|