Do you think it is fine for a multiboot compliant boot loader to pass additional data to the loaded module/kernel for specific types of kernels? Just curious what others think

What sort of information?neon wrote:Do you think it is fine for a multiboot compliant boot loader to pass additional data to the loaded module/kernel for specific types of kernels? Just curious what others think
That was my original problem, actually. Basically there was no nice way for me to return to real mode because my systems image base is at 64k. Entering rmode limits CS to 0xffff (1 byte less then 64K) so a gpf would occur. I was originally thinking of passing my bootloaders rmode<>pmode routine (bad, I know.)Brendan wrote:or do what I always do - switch back to real mode as soon as your code is running so you can do things properly (with no compatibility problems).
I'd assume you'd be able to change your code so that your image base isn't at 64 KiB...neon wrote:That was my original problem, actually. Basically there was no nice way for me to return to real mode because my systems image base is at 64k.Brendan wrote:or do what I always do - switch back to real mode as soon as your code is running so you can do things properly (with no compatibility problems).
No. In real mode, if CS is set to 0xFFFF then you'd be able to access from 0xFFFF:0x0000 to 0xFFFF:0xFFFF without getting a general protection fault because the offset is always below the segment limit. This works out to physical addresses 0x000FFFF0 to 0x0010FFEF.neon wrote:Entering rmode limits CS to 0xffff (1 byte less then 64K) so a gpf would occur. I was originally thinking of passing my bootloaders rmode<>pmode routine (bad, I know.)
The problem here is that you don't know what you're overwriting at 0x1000 (for e.g. you could be trashing the multi-boot information structure).neon wrote:While my compiler does not allow me to rebase the image less then 64K, I have came up with a nice solution: I took my bootloaders relocate() routine and, upon entry of the program, the program will relocate itself to 0x1000 and continue execution from there which creates a nice environment for real mode code.
Thats what I thought. Except its Bochs that is causing the gpf for that reason (cs:eip > limit) which is set to 0xffff whenever I enter real mode regardless of how my gdt entry flags are set up.No. In real mode, if CS is set to 0xFFFF then you'd be able to access from 0xFFFF:0x0000 to 0xFFFF:0xFFFF without getting a general protection fault because the offset is always below the segment limit. This works out to physical addresses 0x000FFFF0 to 0x0010FFEF.
...Although I have not tried that. Im going to give that a try when I get back from work and see what happens.Of course you could do the same without changing your image base - use CS/DS/ES/SS = 0xFF00 (where the real mode address "0xFF00:0x1000" is the physical address "0x00100000") and then create GDT entries with "base = 0x000FF000".