Franchie wrote:Thanks for the response, thats really interesting, and thanks for the link (and password)! I will definitively spend time reading all of that!
The user name and password are just to skip stages... If you went to the vesa homepage and filled-in a form they would return you the same login and pass....
For the moment, I am still designing my driver interface, which is why I wanted to investigate their potential needs.
Yes... It's essential, because you cannot in the future find that the interface is not sufficiently general...
A small question however. I do not have any real need for the VM86 monitor other than the graphics, so I would be happy to do without it if possible.
It's possible, but then if someone wants to run your OS on a computer with VESA<=2.0 with graphics (like me, who some days ago tried to run menuetOS in such a machine), They won't be able to...
You can of course write a routine the switches back to RM, does the int, and then returns in protected mode... I've done so in a boot loader... If you read the Free Loader (ReactOS boot loader) x86-specific functions you will find another implementation (I've been reading it yesterday!)...
Go to the svn and download the file... the path is
http://svn.reactos.org/svn/reactos/trun ... iew=markup ... Please pay attention to the license...
But... It's a bit heavy... And the deeper you setup your Protected Mode environment (PIC, PIT, IDT, BDA, Paging, physical memory under 1MB, etc), the most you will have to un-setup to make sure the BIOS works properly... Imagine the Linux kernel restoring the entire RM execution environment only to execute a VESA function... and then re-setuping PM, Paging, the PIC, the timer, and the interrupt table...
I imagine you are suggesting something similar by "scan the BIOS image for a header". I will need to read your documentation to find out exactly what to look for though!
The header I talked about is explained in page 21 of the vbe3 specification (29th PDF page)...
Would this be an acceptable alternative? Or does the other method have advantages that I have not yet guessed of?
AFAIK, you can either scan the BIOS image (not the EBDA) or ask the int 0x10 interface (while still in real mode) for the protected mode entry point header...
JJ