Skipping the overwrite of the bootblock only got it as far as the final call to protected_mode. Not sure if I can stay awake long enough to solve this one. I'm really impressed by how well VMware behaves so like the actual processor. It leads me to believe they let the processor handle most of the code directly, only trapping certain exceptions, and of course any memory accesses outside that of the image being executed.
Back to blog or home page
last updated 2013-01-10 20:52:08. served from tektonic