home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.os.development      Operating system development chatter      4,255 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 2,401 of 4,255   
   mutazilah@gmail.com to Frank Kotler   
   Re: microsoft vs linux   
   01 Jul 21 23:14:26   
   
   From: muta...@gmail.com   
      
   On Friday, July 2, 2021 at 2:42:32 PM UTC+10, Frank Kotler wrote:   
      
   > > It may be, but I am certain there is no manipulation or use   
   > > of "fs" in the Win32 executables I produce, because I know   
   > > what goes into every byte of code,   
   > Excellent!   
   > ...   
   > > I don't care if there are 50 billion INT calls and syscalls   
   > > and manipulation of hardware and segment register   
   > > manipulation so long as it happens OUTSIDE my   
   > > executable.   
      
   > Okay. I can assure you that there is no "crap" in an ordinary Linux   
   > executable. The int 80h vector, ect. are set up by the OS. well outside   
   > of out executable. No special permissions.   
      
   No, you don't get my point. "int 80h" inside my executable   
   *is* "crap". It requires the *caller* to have special   
   permissions (they need to ensure an interrupt vector   
   table exists).   
      
   It may not exist.   
      
   I want to run Linux executables from PDOS/386, running   
   as an unprivileged program running under Windows 10.   
   I don't have access to INT 80H so the executable will   
   fail (unless I was to somehow scan the executable and   
   zap them all into callbacks).   
      
   Whereas if I run Windows executables from PDOS/386,   
   running as an unprivileged program running under Linux,   
   I do not have this problem. Because the Win32 executables   
   (at least mine) that follow the kernel32/msvcrt rules, have   
   address stubs that are filled in at load time.   
      
   I can easily get PDOS/386 to load the Win32 executable,   
   redirect those stubs to myself, and it doesn't matter that   
   there is no kernel32, no msvcrt, no Windows, and Linux   
   has no clue whatsoever about anything that is happening.   
   No interrupt table is involved either, although PDOS/386   
   will (nominally *) call INT 80H to get access to Linux services.   
      
   BFN. Paul.   
      
      
   (*) Then we get to making PDOS clean by offloading BIOS   
   calls to another abstraction layer, and then it is only at   
   the BIOS level that INT 80H is (nominally **) done.   
      
      
   (**) Then we get to the next abstraction layer where the   
   BIOS is implemented by calling the functions provided   
   by the parameter after envp, rather than mandating an   
   interrupt table. Then Linux itself can be running   
   unauthorized, under perhaps MacOS.   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca