1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
|
;;;;;;;;;;;;;;;;;;;;;;;;;;; ;;;;;;;;;;;;;;;;;;;;;;;;;;;
;
; FoolOS Boot Loader
;
; Copyright 2014 M.Idziorek <m.i@gmx.at>
;
; we have just been loaded by the BIOS and are in 16-bits real mode!
;
; THIS IS THE CENTRAL FILE OF THE BOOTLOADER, after we finished we
; are inside the C kernel!
;
;;;;;;;;;;;;;;;;;;;;;;;;;;;; ;;;;;;;;;;;;;;;;;;;;;;;;;;;;
;we want 16-bit instructions, before we switch to 32-bit protected mode.
;define origin of boot record in memory: 0x7c00
;this is where the BIOS per definition will put the first
;512 bytes of data from the boot device
;The Boot record is identified by the last 2 magic bytes: 0xaa55 (?)
[org 0x7c00]
;define where we will load our kernel into memory
KERNEL_OFFSET equ 0x1000
MEMMAP_SIZE_OFFSET equ 0x7c00+0x600
MEMMAP_OFFSET equ 0x7c00+0x400
VESA_MODES equ 0x8300
VESA_MODE_INFO equ 0x8400
VESA_MODE_SELECT equ 0x4114
;VESA_MODE_SELECT equ 0x411A
[bits 16]
jmp boot_16 ;start boot process
BOOT_DRIVE:
db 0xff
;SOME Global Data, mainly strings
STR_VERSION:
db "v0.2~",0
VESA_CHECK:
db "vesa check.",0
;STR_PROT:
; db "32-bit PM",0
;STR_LOADED:
; db "loaded",0
;lets put our temporary GDT (Global Descriptor Table) here
%include "boot/GDT.asm"
;include 16-bit real mode routines (print_string, disk_load)
%include "boot/common.asm"
%include "boot/print16.asm"
;include 32-bit Protected Mode routines (print_string_pm,print_hex_pm)
;%include "boot/common_pm.asm"
;include our routines for switching to 32-bit protected mode
%include "boot/pm.asm"
;pic mapping
%include "boot/pic.asm"
;memory map
%include "boot/memmap.asm"
;;;;;;;; BOOT 16-bit real ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
;lets start
[bits 16]
boot_16:
mov bx, STR_VERSION
call print_string
;setup the stack
mov bp,0x8000
mov sp,bp
;remember BOOT_DRIVE (as was set by BIOS)
mov [BOOT_DRIVE],dl
;print FoolOS version info
; mov bx, STR_VERSION
; call print_string
;Load the KERNEL
mov bx,KERNEL_OFFSET
mov dh, 50 ;50 sectors!
mov dl, [BOOT_DRIVE]
call disk_load
;print info message that kernel was loaded
; mov bx, STR_LOADED
; call print_string
;get memory map from bios before we enter 32 bit protected mode
mov ax,0 ; set target address in es:di (0:offset)
mov es,ax
mov di,MEMMAP_OFFSET
call BiosGetMemoryMap ; this will also put the number of entries
; of the memory map at MEMMAP_SIZE_OFFSET
;get vesa modes!
mov ax,0 ; set target address in es:di (0:offset)
mov es,ax
mov di,VESA_MODES
mov ax,0x4f00 ;vesa function: Get Controller Info
int 0x10 ; call the interrupt to get the data from the bios!
vesa_err:
mov bx, VESA_CHECK
call print_string
cmp ax,0x004f
je vesa_ok
jmp vesa_err
vesa_ok:
;
;get info on mode of interest
mov ax,0 ; set target address in es:di (0:offset)
mov es,ax
mov di,VESA_MODE_INFO
mov ax,0x4f01 ;vesa function: Get Mode Info
mov cx,VESA_MODE_SELECT
int 0x10 ; call the interrupt to get the data from the bios!
vesa_err2:
mov bx, VESA_CHECK
call print_string
cmp ax,0x004f
je vesa_ok2
jmp vesa_err2
vesa_ok2:
;finally switch to the mode of choice!
mov ax,0x4f02 ;vesa function: Set Mode
mov bx,VESA_MODE_SELECT
int 0x10
;finally lets enter Protected mode!!!
call switch_to_pm
;;;;;;;; BOOT 32-bit protected mode;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
[bits 32]
boot_32_pm:
; we could do ALL This inside the kernel!!!!!! TODO
;print info message that we are in protected mode!
; mov ecx,160
; mov ebx,STR_PROT
; call print_string_pm
;enable A20
;http://www.brokenthorn.com/Resources/OSDev9.html
;Method 3.1: Enables A20 through keyboard controller
mov al, 0xdd ; command 0xdd: enable a20
out 0x64, al ; send command to controller
;pic setup
call pic_setup
call KERNEL_OFFSET ;jump into our Kernel it
;idt_descriptor:
; dw idt_end-idt_start-1
; dd KERNEL_OFFSET
;;;; DEBUGGING STUFF
;times 8 db '@'
;dw interrupt
;times 8 db '@'
;dw interrupt2
;times 8 db '@'
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
;so we get identified as MBR
times 510-($-$$) db 0
dw 0xaa55
;interrupt descriptor table (hardcoded address of interrupts:)
;idt_start:
;times 33 db 0x50,0x7c,0x08,0x00,0x00,10001110b,0x0,0x0
;db 0x59,0x7c,0x08,0x00,0x00,10001110b,0x0,0x0
;times 253 db 0x50,0x7c,0x08,0x00,0x00,10001110b,0x0,0x0
;idt_end:
|