1
0
Fork 0
mirror of https://gitlab.com/sortix/sortix.git synced 2023-02-13 20:55:38 -05:00
sortix--sortix/sortix/x64/boot.s

181 lines
4.6 KiB
ArmAsm
Raw Normal View History

2011-08-05 08:25:00 -04:00
/******************************************************************************
COPYRIGHT(C) JONAS 'SORTIE' TERMANSEN 2011.
This file is part of Sortix.
Sortix is free software: you can redistribute it and/or modify it under the
terms of the GNU General Public License as published by the Free Software
Foundation, either version 3 of the License, or (at your option) any later
version.
Sortix is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY# without even the implied warranty of MERCHANTABILITY or FITNESS
FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
details.
You should have received a copy of the GNU General Public License along
with Sortix. If not, see <http://www.gnu.org/licenses/>.
boot.s
Bootstraps the kernel and passes over control from the boot-loader to the
kernel main function. It also jumps into long mode!
******************************************************************************/
.globl start, _start
.section .text
.text 0x100000
.type _start, @function
.code32
start:
_start:
jmp multiboot_entry
# Align 32 bits boundary.
2011-09-21 15:08:43 -04:00
.align 4
2011-08-05 08:25:00 -04:00
# Multiboot header.
multiboot_header:
# Magic.
2011-09-21 15:08:43 -04:00
.long 0x1BADB002
2011-08-05 08:25:00 -04:00
# Flags.
2011-09-21 15:08:43 -04:00
.long 0x00000003
2011-08-05 08:25:00 -04:00
# Checksum.
2011-09-21 15:08:43 -04:00
.long -(0x1BADB002 + 0x00000003)
2011-08-05 08:25:00 -04:00
multiboot_entry:
# We got our multiboot information in various registers. But we are going
# to need these registers. But where can we store them then? Oh hey, let's
# store then in the code already run!
# Store the pointer to the Multiboot information structure.
mov %ebx, 0x100000
# Store the magic value.
mov %eax, 0x100004
# Clear the first $0xE000 bytes following 0x1000.
2011-08-05 08:25:00 -04:00
movl $0x1000, %edi
mov %edi, %cr3
xorl %eax, %eax
movl $0xE000, %ecx
2011-08-05 08:25:00 -04:00
rep stosl
movl %cr3, %edi
2011-09-21 15:08:43 -04:00
# Set the initial page tables.
# Page-Map Level 4
2011-08-05 08:25:00 -04:00
movl $0x2003, (%edi)
addl $0x1000, %edi
# Page-Directory Pointer Table
2011-08-05 08:25:00 -04:00
movl $0x3003, (%edi)
addl $0x1000, %edi
# Page-Directory
2011-08-05 08:25:00 -04:00
movl $0x4003, (%edi)
addl $0x1000, %edi
# Page-Table
2011-09-21 15:08:43 -04:00
# Memory map the first 2 MiB.
2011-08-05 08:25:00 -04:00
movl $0x3, %ebx
movl $512, %ecx
SetEntry:
mov %ebx, (%edi)
add $0x1000, %ebx
add $8, %edi
loop SetEntry
2011-09-21 15:08:43 -04:00
# Enable PAE.
2011-08-05 08:25:00 -04:00
mov %cr4, %eax
orl $0x20, %eax
mov %eax, %cr4
2011-09-21 15:08:43 -04:00
# Enable long mode.
2011-08-05 08:25:00 -04:00
mov $0xC0000080, %ecx
rdmsr
orl $0x100, %eax
wrmsr
2011-09-21 15:08:43 -04:00
# Enable paging and enter long mode (still 32-bit)
2011-08-05 08:25:00 -04:00
mov %cr0, %eax
orl $0x80000000, %eax
mov %eax, %cr0
2011-09-21 15:08:43 -04:00
# Load the long mode GDT.
2011-08-05 08:25:00 -04:00
mov GDTPointer, %eax
lgdtl GDTPointer
2011-09-21 15:08:43 -04:00
# Now use the 64-bit code segment, and we are in full 64-bit mode.
2011-08-05 08:25:00 -04:00
ljmp $0x10, $Realm64
.code64
Realm64:
2011-09-21 15:08:43 -04:00
# Now, set up the other segment registers.
2011-08-05 08:25:00 -04:00
cli
mov $0x18, %ax
mov %ax, %ds
mov %ax, %es
mov %ax, %fs
mov %ax, %gs
2011-09-21 15:08:43 -04:00
# Alright, that was the bootstrap code. Now begin preparing to run the
# actual 64-bit kernel.
2011-08-05 08:25:00 -04:00
jmp Main
.section .data
GDT64: # Global Descriptor Table (64-bit).
GDTNull: # The null descriptor.
.word 0 # Limit (low).
.word 0 # Base (low).
.byte 0 # Base (middle)
.byte 0 # Access.
.byte 0 # Granularity.
.byte 0 # Base (high).
GDTUnused: # The null descriptor.
.word 0 # Limit (low).
.word 0 # Base (low).
.byte 0 # Base (middle)
.byte 0 # Access.
.byte 0 # Granularity.
.byte 0 # Base (high).
GDTCode: # The code descriptor.
.word 0xFFFF # Limit (low).
.word 0 # Base (low).
.byte 0 # Base (middle)
.byte 0x9A # Access.
.byte 0xAF # Granularity.
.byte 0 # Base (high).
GDTData: # The data descriptor.
.word 0xFFFF # Limit (low).
.word 0 # Base (low).
.byte 0 # Base (middle)
.byte 0x92 # Access.
.byte 0x8F # Granularity.
.byte 0 # Base (high).
GDTPointer: # The GDT-pointer.
.word GDTPointer - GDT64 - 1 # Limit.
.long GDT64 # Base.
.long 0
Main:
# Copy the character B onto the screen so we know it works.
movq $0x242, %r15
movq %r15, %rax
movw %ax, 0xB8000
# Load the pointer to the Multiboot information structure.
mov 0x100000, %ebx
# Load the magic value.
mov 0x100004, %eax
# The linker is kindly asked to put the real 64-bit kernel at 0x110000.
jmp 0x110000