关于bootasm.s理解
来源:互联网 发布:uml软件建模教程 编辑:程序博客网 时间:2024/06/08 12:23
#include "asm.h"#include "memlayout.h"#include "mmu.h"#操作系统加载到内存中的第一个程序入口
#BIOS程序将该段程序加载到内存的0x7c00处## Start the first CPU: switch to 32-bit protected mode, jump into C.# The BIOS loads this code from the first sector of the hard disk into# memory at physical address 0x7c00 and starts executing in real mode# with %cs=0 %ip=7c00.由此处可以知道程序运行的CS段的值是0x0.code16 # Assemble for 16-bit mode.globl startstart: cli # BIOS enabled interrupts; disable # Zero data segment registers DS, ES, and SS. xorw %ax,%ax # Set %ax to zero movw %ax,%ds # -> Data Segment movw %ax,%es # -> Extra Segment movw %ax,%ss # -> Stack Segment # Physical address line A20 is tied to zero so that the first PCs # with 2 MB would run software that assumed 1 MB. Undo that.
# 打开A20,准备进入保护模式seta20.1: inb $0x64,%al # Wait for not busy testb $0x2,%al jnz seta20.1 movb $0xd1,%al # 0xd1 -> port 0x64 outb %al,$0x64seta20.2: inb $0x64,%al # Wait for not busy testb $0x2,%al jnz seta20.2 movb $0xdf,%al # 0xdf -> port 0x60 outb %al,$0x60 # Switch from real to protected mode. Use a bootstrap GDT that makes # virtual addresses map directly to physical addresses so that the # effective memory map doesn't change during the transition. #进入保护模式以后不能按照cs:ip去算取指令的地址或者说是跳转的地址计算方法变了
#例如下边的 ljmp $(SEG_KCODE<<3), $start32调整指令
#在实模式下:跳到$(SEG_KCODE<<3)×16+$start32的地址去运行
#在保护模式下:要根据gdtdesc表去找到第$(SEG_KCODE<<3)个48位的段基址然后去该地址运行。 lgdt gdtdesc
movl %cr0, %eax orl $CR0_PE, %eax movl %eax, %cr0 #PAGEBREAK! # Complete transition to 32-bit protected mode by using long jmp # to reload %cs and %eip. The segment descriptors are set up with no # translation, so that the mapping is still the identity mapping.<pre name="code" class="cpp">
# 前面描述了一下这条指令的意思,同时这条指令也是真正的从实模式转变到保护模式。
<pre name="code" class="cpp"> ljmp $(SEG_KCODE<<3), $start32.code32 # Tell assembler to generate 32-bit code now.start32: # Set up the protected-mode data segment registers movw $(SEG_KDATA<<3), %ax # Our data segment selector movw %ax, %ds # -> DS: Data Segment movw %ax, %es # -> ES: Extra Segment movw %ax, %ss # -> SS: Stack Segment movw $0, %ax # Zero segments not ready for use movw %ax, %fs # -> FS movw %ax, %gs # -> GS # Set up the stack pointer and call into C. movl $start, %esp call bootmain # If bootmain returns (it shouldn't), trigger a Bochs # breakpoint if running under Bochs, then loop. movw $0x8a00, %ax # 0x8a00 -> port 0x8a00 movw %ax, %dx outw %ax, %dx movw $0x8ae0, %ax # 0x8ae0 -> port 0x8a00 outw %ax, %dxspin: jmp spin
#这里就是前面的全局段描述表,这里只有3个,第0项都是0x000000000000,后边还有第1项,第2项。
<pre name="code" class="cpp"># Bootstrap GDT.p2align 2 # force 4 byte alignmentgdt: SEG_NULLASM # null seg SEG_ASM(STA_X|STA_R, 0x0, 0xffffffff) # code seg SEG_ASM(STA_W, 0x0, 0xffffffff) # data seg #0x2gdtdesc: .word (gdtdesc - gdt - 1) # sizeof(gdt) - 1 .long gdt # address gdt
似乎X86相关的BIOS都是把软盘里边的第0磁面0磁道1扇区的512B程序加载到0x7c00处,使用INT 0x19中断可以实现将第0磁面0磁道1扇区的512B程序加载到0x7c00处。
0 0
- 关于bootasm.s理解
- xv6的bootloader之一bootasm.s
- 关于S参数的一些理解
- 关于b/s与c/s模型的理解
- UBOOT start.S 关于S3C2440时钟设置的理解
- 关于达夫设备(Duff's device)的理解
- bootloader---8.start.S中关于bl指令的理解
- 有关http关于b/s模式的理解
- lowlevel_init.S学习理解
- IRQ.s的理解
- <s:ierator>理解
- lowlevel_init.S学习理解
- <s:ierator> 理解
- lowlevel_init.S学习理解
- 【Angular】理解$S
- c/s 和 b/s 的理解
- 关于flex's快捷键
- 关于<s:iterator/>标签
- rose类图中方法带参数
- 自制仿360首页支持拼音输入全模糊搜索和自动换肤
- 你真的会二分查找吗
- xUtils===xUtils3.0基本使用规则
- codeforces 724B Batch Sort
- 关于bootasm.s理解
- 如何选择VPS——已Hostus选择节点为例
- 解决debian7下安装GD扩展失败的问题
- Spring <context:component-scan/>与<mvc:annotation-driven/>
- 2016/10/09 今天真是忙碌的一天啊
- SD卡协议学习(一)
- trie树
- Leetcode 59. Spiral Matrix II (Medium) (java)
- socket学习(3)