Nightloader/i386/loader/src-asm/memory/gdt.asm

418 lines
9.5 KiB
NASM
Executable File

GDT_MEMORY_AREA equ 0x7e00
GDT_ENTRY_COUNT equ 3
; Arguments (note: all arguments are 4-byte padded):
; [Furthest from EBP]
;
; 4. uint32 privilege_level
; - Only 0 to 3; 0 being kernel and 3 being userland.
; Everything above 3 is an error.
;
; 3 uint32 num_pages
; - Only 20 bits are usable. Everything above will
; be cut off to be written to the segment descriptor.
;
; 2. ptr32 base_address
;
; 1. uint32 segment_index
; Note:
; - Zero is NOT usable and will throw an error.
; the highest theoretical value for this is 8191,
; but generally, one should stick to GDT_ENTRY_COUNT.
;
; [Nearest to EBP]
make_regular_data_segment_in_gdt:
.prolog:
push esi
add esp, 64
mov esi, esp
mov [esi + (64 - 4)], eax
mov [esi + (64 - 8)], ebx
mov [esi + (64 - 12)], ecx
mov [esi + (64 - 16)], edx
mov [esi + (64 - 20)], edi
.get_arguments:
mov eax, [ebp - 4] ; segment_index
mov ebx, [ebp - 8] ; base_address
mov ecx, [ebp - 12] ; num_pages
mov edx, [ebp - 16] ; privilege_level
mov [esi + 16], eax ; segment_index
mov [esi + 20], ebx ; base_address
mov [esi + 24], ecx ; num_pages
mov [esi + 28], edx ; privilege_level
.validate_arguments:
cmp eax, 8191
ja .segment_index_too_tall
cmp eax, 0
je .segment_index_is_zero
cmp edx, 3
ja .privilege_level_too_large
.calculate_work_address:
shl eax, 3 ; Entry offset from table start
add eax, GDT_MEMORY_AREA ; Entry address
mov [esi + 12], eax
.write_segment_limit:
mov [eax], cx
shr ecx, 16
and ecx, 0x0f
mov [eax + 6], cl
.write_base_address:
mov [eax + 2], bx
shr ebx, 16
mov [eax + 4], bl
mov [eax + 7], bh
.set_default_flags:
or [eax + 6], byte (0b1100 << 4)
.set_data_segment_specific_access_byte:
mov al, 0b1001
; OR the privilege level into the access byte
mov dl, [ebp - 16]
shl dl, 1
and dl, 0b0110
or al, dl
shl al, 4 ; Move the 4 bits of general flags to their place
; Data-segment specific part
or al, 0b0010 ; DATA | HEAP | READ_WRITE | NOT_ACCESSED
mov ebx, [esi + 12]
mov [ebx + 5], al ; Write to the final destination
.epilog:
mov edi, [esi + (64 - 20)]
mov edx, [esi + (64 - 16)]
mov ecx, [esi + (64 - 12)]
mov ebx, [esi + (64 - 8)]
mov eax, [esi + (64 - 4)]
sub esp, 64
pop esi
ret
.segment_index_too_tall:
.segment_index_is_zero:
.privilege_level_too_large:
; todo(logs): Write debug message.
cli
hlt
; Arguments (note: all arguments are 4-byte padded):
; [Furthest from EBP]
;
; 4. uint32 privilege_level
; - Only 0 to 3; 0 being kernel and 3 being userland.
; Everything above 3 is an error.
;
; 3 uint32 num_pages
; - Only 20 bits are usable. Everything above will
; be cut off to be written to the segment descriptor.
;
; 2. ptr32 base_address
;
; 1. uint32 segment_index
; Note:
; - Zero is NOT usable and will throw an error.
; the highest theoretical value for this is 8191,
; but generally, one should stick to GDT_ENTRY_COUNT.
;
; [Nearest to EBP]
; COMMENTED OUT DUE TO BEING BUGGY!
; make_stack_segment_in_gdt:
; .prolog:
; push esi
; add esp, 64
; mov esi, esp
; mov [esi + (64 - 4)], eax
; mov [esi + (64 - 8)], ebx
; mov [esi + (64 - 12)], ecx
; mov [esi + (64 - 16)], edx
; mov [esi + (64 - 20)], edi
; .get_arguments:
; mov eax, [ebp - 4] ; segment_index
; mov ebx, [ebp - 8] ; base_address
; mov ecx, [ebp - 12] ; num_pages
; mov edx, [ebp - 16] ; privilege_level
; mov [esi + 16], eax ; segment_index
; mov [esi + 20], ebx ; base_address
; mov [esi + 24], ecx ; num_pages
; mov [esi + 28], edx ; privilege_level
; .validate_arguments:
; cmp eax, 8191
; ja .segment_index_too_tall
; cmp eax, 0
; je .segment_index_is_zero
; cmp edx, 3
; ja .privilege_level_too_large
; .calculate_work_address:
; shl eax, 3 ; Entry offset from table start
; add eax, GDT_MEMORY_AREA ; Entry address
; mov [esi + 12], eax
; .write_segment_limit:
; mov [eax], cx
; shr ecx, 16
; and ecx, 0x0f
; mov [eax + 6], cl
; .write_base_address:
; mov [eax + 2], bx
; shr bx, 16
; mov [eax + 4], bl
; mov [eax + 7], bh
; .set_default_flags:
; or [eax + 6], word (0b1100 << 4)
; .set_stack_specific_access_byte:
; mov al, 0b1001
; ; OR the privilege level into the access byte
; mov dl, [ebp - 16]
; shl dl, 1
; and dl, 0b0110
; or al, dl
; shl al, 4 ; Move the 4 bits of general flags to their place
; ; Stack specific part
; or al, 0b0110 ; DATA | STACK | READ_WRITE | NOT_ACCESSED
; mov ebx, [esi + 12]
; mov [ebx + 5], al ; Write to the final destination
; .epilog:
; mov edi, [esi + (64 - 20)]
; mov edx, [esi + (64 - 16)]
; mov ecx, [esi + (64 - 12)]
; mov ebx, [esi + (64 - 8)]
; mov eax, [esi + (64 - 4)]
; sub esp, 64
; pop esi
; ret
; .segment_index_too_tall:
; .segment_index_is_zero:
; .privilege_level_too_large:
; ; todo(logs): Write debug message.
; cli
; hlt
; Arguments (note: all arguments are 4-byte padded):
; [Furthest from EBP]
;
; 4. uint32 privilege_level
; - Only 0 to 3; 0 being kernel and 3 being userland.
; Everything above 3 is an error.
;
; 3 uint32 num_pages
; - Only 20 bits are usable. Everything above will
; be cut off to be written to the segment descriptor.
;
; 2. ptr32 base_address
;
; 1. uint32 segment_index
; Note:
; - Zero is NOT usable and will throw an error.
; the highest theoretical value for this is 8191,
; but generally, one should stick to GDT_ENTRY_COUNT.
;
; [Nearest to EBP]
make_code_segment_in_gdt:
.prolog:
push esi
add esp, 64
mov esi, esp
mov [esi + (64 - 4)], eax
mov [esi + (64 - 8)], ebx
mov [esi + (64 - 12)], ecx
mov [esi + (64 - 16)], edx
mov [esi + (64 - 20)], edi
.get_arguments:
mov eax, [ebp - 4] ; segment_index
mov ebx, [ebp - 8] ; base_address
mov ecx, [ebp - 12] ; num_pages
mov edx, [ebp - 16] ; privilege_level
mov [esi + 16], eax ; segment_index
mov [esi + 20], ebx ; base_address
mov [esi + 24], ecx ; num_pages
mov [esi + 28], edx ; privilege_level
.validate_arguments:
cmp eax, 8191
ja .segment_index_too_tall
cmp eax, 0
je .segment_index_is_zero
cmp edx, 3
ja .privilege_level_too_large
.calculate_work_address:
shl eax, 3 ; Entry offset from table start
add eax, GDT_MEMORY_AREA ; Entry address
mov [esi + 12], eax
.write_segment_limit:
mov [eax], cx
shr ecx, 16
and ecx, 0x0f
mov [eax + 6], cl
.write_base_address:
mov [eax + 2], bx
shr ebx, 16
mov [eax + 4], bl
mov [eax + 7], bh
.set_default_flags:
or [eax + 6], word (0b1100 << 4)
.set_code_segment_specific_access_byte:
mov al, 0b1001
; OR the privilege level into the access byte
mov dl, [ebp - 16]
shl dl, 1
and dl, 0b0110
or al, dl
shl al, 4 ; Move the 4 bits of general flags to their place
; Code-segment specific part
or al, 0b1010 ; CODE | NON-CONFORMING | READABLE | NOT_ACCESSED
mov ebx, [esi + 12]
mov [ebx + 5], al ; Write to the final destination
.epilog:
mov edi, [esi + (64 - 20)]
mov edx, [esi + (64 - 16)]
mov ecx, [esi + (64 - 12)]
mov ebx, [esi + (64 - 8)]
mov eax, [esi + (64 - 4)]
sub esp, 64
pop esi
ret
.segment_index_too_tall:
.segment_index_is_zero:
.privilege_level_too_large:
; todo(logs): Write debug message.
cli
hlt
; [Furthest to EBP]
; 1) Return Address
; [Nearest to EBP]
load_flat_gdt:
.prolog:
push esi
add esp, 64
mov esi, esp
mov [esi + (64 - 4)], eax
mov [esi + (64 - 8)], ebx
mov [esi + (64 - 12)], ecx
mov [esi + (64 - 16)], edx
mov [esi + (64 - 20)], edi
; mov eax, [ebp - 4]
; mov [esi], eax
.set_segments:
push ebp
mov ebp, esp
push dword 2 ; Segment Index
push dword 0 ; Start Offset
push dword 0xfffff ; Page Count
push dword 0 ; Required privilege level
call make_regular_data_segment_in_gdt
mov esp, ebp
pop ebp
; COMMENTED OUT DUE TO BEING BUGGY
; push ebp
; mov ebp, esp
; push dword 3 ; Segment Index
; push dword LOWER_STACK_POINTER ; Start Offset
; push dword 0xfffff ; Page Count
; push dword 0 ; Required privilege level
; call make_stack_segment_in_gdt
; mov esp, ebp
; pop ebp
push ebp
mov ebp, esp
push dword 1 ; Segment Index
push dword 0x0000 ; Start Offset
push dword 0xfffff ; Page Count
push dword 0 ; Required privilege level
call make_code_segment_in_gdt
mov esp, ebp
pop ebp
mov bx, 0
mov ds, bx
lgdt [.gdtr]
mov bx, (2 << 3)
mov ds, bx
mov es, bx
mov fs, bx
mov gs, bx
; mov bx, (3 << 3)
mov ss, bx
mov ebx, cr0
or ebx, 1
mov cr0, ebx
xor bx, bx
mov ds, bx
jmp dword 0x08:.epilog
bits 32
.epilog:
mov edi, [esi + (64 - 20)]
mov edx, [esi + (64 - 16)]
mov ecx, [esi + (64 - 12)]
mov ebx, [esi + (64 - 8)]
mov eax, [esi + (64 - 4)]
add esp, 64
pop esi
jmp stage2_true_entry
; jmp after_gdt_loaded
align 16
.gdtr:
.gdtr.length:
dw 15
.gdtr.pointer:
dd GDT_MEMORY_AREA
align 1