Subversion Repositories HelenOS

Rev

Rev 174 | Rev 177 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
1 jermar 1
#
2
# Copyright (C) 2001-2004 Jakub Jermar
3
# All rights reserved.
4
#
5
# Redistribution and use in source and binary forms, with or without
6
# modification, are permitted provided that the following conditions
7
# are met:
8
#
9
# - Redistributions of source code must retain the above copyright
10
#   notice, this list of conditions and the following disclaimer.
11
# - Redistributions in binary form must reproduce the above copyright
12
#   notice, this list of conditions and the following disclaimer in the
13
#   documentation and/or other materials provided with the distribution.
14
# - The name of the author may not be used to endorse or promote products
15
#   derived from this software without specific prior written permission.
16
#
17
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18
# IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19
# OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20
# IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21
# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22
# NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23
# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24
# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25
# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26
# THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27
#
28
 
29
.section K_TEXT_START
30
.global kernel_image_start
31
 
32
.code16
33
#
34
# This is where we require any SPARTAN-kernel-compatible boot loader
35
# to pass control in real mode.
36
#
37
# Protected mode tables are statically initialised during compile
38
# time. So we can just load the respective table registers and
39
# switch to protected mode.
40
#
41
kernel_image_start:
174 jermar 42
	cli
1 jermar 43
	xorw %ax,%ax
44
	movw %ax,%ds
176 jermar 45
	movw %ax,%ss			# initialize stack segment register
46
	movl $0x7c00,%esp		# initialize stack pointer
47
 
48
	call memmap_arch_init
49
 
1 jermar 50
	lgdt gdtr
51
	movl %cr0,%eax
52
	orl $0x1,%eax
53
	movl %eax,%cr0
112 jermar 54
	jmpl $8,$meeting_point
55
meeting_point:
56
.code32
57
 
1 jermar 58
	movw $16,%ax
59
	movw %ax,%es
60
	movw %ax,%gs
61
	movw %ax,%fs
62
	movw %ax,%ds			# kernel data + stack
125 jermar 63
	movw %ax,%ss
1 jermar 64
 
65
	lidt idtr
66
 
110 jermar 67
	call map_kernel
68
 
69
	movl $_hardcoded_ktext_size, hardcoded_ktext_size
70
	movl $_hardcoded_kdata_size, hardcoded_kdata_size
71
	movl $_hardcoded_load_address, hardcoded_load_address
72
 
73
	call main_bsp			# never returns
74
 
75
	cli
76
	hlt
77
 
78
.global map_kernel
79
map_kernel:
105 jermar 80
	#
81
	# Here we setup mapping for both the unmapped and mapped sections of the kernel.
82
	# For simplicity, we set only one 4M page for 0x00000000 and one for 0x80000000.
83
	#
84
	movl %cr4, %ecx
85
	orl $(1<<4), %ecx
86
	movl %ecx, %cr4				# turn PSE on
1 jermar 87
 
105 jermar 88
	movl $((1<<7)|(1<<0)), %eax
89
	movl %eax, page_directory		# mapping 0x00000000 => 0x00000000
1 jermar 90
 
105 jermar 91
	movl $(page_directory+(4096/2)), %edx
92
	movl %eax, (%edx)			# mapping 0x80000000 => 0x00000000
93
 
94
	leal page_directory, %eax
95
	movl %eax, %cr3
96
 
97
	# turn on paging
98
	movl %cr0, %ebx
99
	orl $(1<<31), %ebx
100
	movl %ebx, %cr0
110 jermar 101
	ret
105 jermar 102
 
103
 
104
.section K_DATA_START
105
 
106
.align 4096
107
page_directory:
108
	.space 4096, 0