1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
|
;;;;;;;;;;;;;;;;;;;;;;;;;;; ;;;;;;;;;;;;;;;;;;;;;;;;;;;
;
; FoolOS Boot Loader
;
; Copyright 2014 M.Idziorek <m.i@gmx.at>
;
; we have just been loaded by the BIOS and are in 16-bits real mode!
;
; THIS IS THE CENTRAL FILE OF THE BOOTLOADER, after we finished we
; are inside the C kernel!
;
;;;;;;;;;;;;;;;;;;;;;;;;;;;; ;;;;;;;;;;;;;;;;;;;;;;;;;;;;
;we want 16-bit instructions, before we switch to 32-bit protected mode.
;define origin of boot record in memory: 0x7c00
;this is where the BIOS per definition will put the first
;512 bytes of data from the boot device
;The Boot record is identified by the last 2 magic bytes: 0xaa55 (?)
[org 0x7c00]
;define where we will load our kernel into memory
KERNEL_OFFSET equ 0x1000
[bits 16]
jmp boot_16 ;start boot process
;SOME Global Data, mainly strings
STR_VERSION:
db "_<-Fool-Loader~0.0.13~",0
STR_PROT:
db "Entered 32-bit Protected Mode.",0
STR_LOADED:
db "FoolOS Kernel Loaded.",0
BOOT_DRIVE:
db 0
;lets put our temporary GDT (Global Descriptor Table) here
%include "boot/GDT.asm"
;include 16-bit real mode routines (print_string, print_hex, disk_load)
%include "boot/common.asm"
;include 32-bit Protected Mode routines (print_string_pm,print_hex_pm)
%include "boot/common_pm.asm"
;include our routines for switching to 32-bit protected mode
%include "boot/pm.asm"
;pic mapping
%include "boot/pic.asm"
;;;;;;;; BOOT 16-bit real ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
;lets start
[bits 16]
boot_16:
;setup the stack
mov bp,0x8000
mov sp,bp
;remember BOOT_DRIVE (as was set by BIOS)
mov [BOOT_DRIVE],dl
;print FoolOS version info
mov bx, STR_VERSION
call print_string
;Load the KERNEL
mov bx,KERNEL_OFFSET
mov dh, 15
mov dl, [BOOT_DRIVE]
call disk_load
;print info message that kernel was loaded
mov bx, STR_LOADED
call print_string
;finally lets enter Protected mode!!!
call switch_to_pm
;;;;;;;; BOOT 32-bit protected mode;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
[bits 32]
boot_32_pm:
;print info message that we are in protected mode!
mov ecx,160
mov ebx,STR_PROT
call print_string_pm
;enable A20
;http://www.brokenthorn.com/Resources/OSDev9.html
;Method 3.1: Enables A20 through keyboard controller
mov al, 0xdd ; command 0xdd: enable a20
out 0x64, al ; send command to controller
;pic setup
call pic_setup
call KERNEL_OFFSET ;jump into our Kernel it
;idt_descriptor:
; dw idt_end-idt_start-1
; dd KERNEL_OFFSET
;;;; DEBUGGING STUFF
;times 8 db '@'
;dw interrupt
;times 8 db '@'
;dw interrupt2
;times 8 db '@'
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
;so we get identified as MBR
times 510-($-$$) db 0
dw 0xaa55
;interrupt descriptor table (hardcoded address of interrupts:)
;idt_start:
;times 33 db 0x50,0x7c,0x08,0x00,0x00,10001110b,0x0,0x0
;db 0x59,0x7c,0x08,0x00,0x00,10001110b,0x0,0x0
;times 253 db 0x50,0x7c,0x08,0x00,0x00,10001110b,0x0,0x0
;idt_end:
|