summaryrefslogtreecommitdiffhomepage
path: root/src/loader/impl/mb2.c
blob: f46310b144c7f13e2ef53770070496292a80fa2c (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
// MIT License, Copyright (c) 2021 Marvin Borner
// Everything according to spec

#include <elf.h>
#include <impl/mb2.h>
#include <lib.h>
#include <pnc.h>

// The address where data gets stored
#define MB2_LOAD_ADDRESS 0x10000

struct multiboot_entry {
	u32 magic;
	u32 flags;
	u32 header_length;
	u32 checksum; // Everything after that is optional
	u8 *tags;
};

// The (really simple) multiboot checksum algorithm
/* static u32 mb2_checksum(struct multiboot_entry *entry) */
/* { */
/* 	return -(entry->magic + entry->flags); */
/* } */

// Load data into memory and return address (not overlapping
static u32 mb2_store(void *data, u32 size)
{
	static u32 offset = 0;
	memcpy((void *)MB2_LOAD_ADDRESS, data, size);
	offset += size;
	return MB2_LOAD_ADDRESS + (size - offset);
}

// Load the mb2 structs into memory
static void mb2_load(struct multiboot_entry *entry)
{
	(void)mb2_store;
	(void)entry;
}

// Jump to kernel with correct info pointer in eax
static void mb2_jump(u32 entry, u32 info)
{
	log("Jumping. So long and thanks for all the fish!\n");

	// Move and jump!
	__asm__ volatile("movl $" STRINGIFY(MB2_LOAD_MAGIC) ", %%eax\n\t"
							    "jmpl *%%edi\n\t"
			 :
			 : "D"(entry), "b"(info)
			 : "memory");

	panic("Jumper returned\n");
}

// Detect and verify mb2
u8 mb2_detect(struct cfg_entry *cfg)
{
	u8 header[8192] = { 0 };

	s32 ret = cfg->dev->p.disk.fs.read(cfg->path, header, 0, sizeof(header), cfg->dev);
	if (ret < 12)
		return 0;

	// Find start of multiboot entry by searching for magic
	struct multiboot_entry *entry = 0;
	for (u32 i = 0; i < sizeof(header); i++) {
		u32 *p = (u32 *)&header[i];
		if (*p == MB2_MAGIC) {
			entry = (void *)p;
			break;
		}
	}

	if (!entry)
		return 0;

	// TODO: mb2 checksum
	/* u32 checksum = mb2_checksum(entry); */
	/* if (checksum != entry->checksum) */
	/* 	return 0; */

	cfg->impl.type = IMPL_MB2;
	cfg->impl.start = entry;

	return 1;
}

// Execute mb2 type kernel
void mb2_exec(struct cfg_entry *cfg)
{
	u32 entry = elf_load(cfg->dev, cfg->path);
	mb2_load(cfg->impl.start);

	// This is a kind of hacky parameter stack pushing thing, just disable warning :)
#pragma GCC diagnostic ignored "-Wpedantic"
	jmp_kernel((void *)mb2_jump, 2, entry, MB2_LOAD_ADDRESS);
#pragma GCC diagnostic pop
}