无忧启动论坛
标题:
FreeDOS 代码学习
[打印本页]
作者:
不点
时间:
2014-12-13 10:02
标题:
FreeDOS 代码学习
以下是 kernel.asm 中的片段。代码显示出有关中断向量的重要信息。
; dummy interrupt return handlers
global _int22_handler
global _int28_handler
global _int2a_handler
global _empty_handler
_int22_handler:
_int28_handler:
_int2a_handler:
_empty_handler:
iret
global _initforceEnableA20
initforceEnableA20:
call near forceEnableA20
retf
global __HMARelocationTableStart
__HMARelocationTableStart:
global _int2f_handler
extern reloc_call_int2f_handler
_int2f_handler: jmp 0:reloc_call_int2f_handler
call near forceEnableA20
global _int20_handler
extern reloc_call_int20_handler
_int20_handler: jmp 0:reloc_call_int20_handler
call near forceEnableA20
global _int21_handler
extern reloc_call_int21_handler
_int21_handler: jmp 0:reloc_call_int21_handler
call near forceEnableA20
global _low_int25_handler
extern reloc_call_low_int25_handler
_low_int25_handler: jmp 0:reloc_call_low_int25_handler
call near forceEnableA20
global _low_int26_handler
extern reloc_call_low_int26_handler
_low_int26_handler: jmp 0:reloc_call_low_int26_handler
call near forceEnableA20
global _int27_handler
extern reloc_call_int27_handler
_int27_handler: jmp 0:reloc_call_int27_handler
call near forceEnableA20
global _int0_handler
extern reloc_call_int0_handler
_int0_handler: jmp 0:reloc_call_int0_handler
call near forceEnableA20
global _int6_handler
extern reloc_call_int6_handler
_int6_handler: jmp 0:reloc_call_int6_handler
call near forceEnableA20
global _int19_handler
extern reloc_call_int19_handler
_int19_handler: jmp 0:reloc_call_int19_handler
call near forceEnableA20
global _cpm_entry
extern reloc_call_cpm_entry
_cpm_entry: jmp 0:reloc_call_cpm_entry
call near forceEnableA20
global _reloc_call_blk_driver
extern _blk_driver
_reloc_call_blk_driver:
jmp 0:_blk_driver
call near forceEnableA20
global _reloc_call_clk_driver
extern _clk_driver
_reloc_call_clk_driver:
jmp 0:_clk_driver
call near forceEnableA20
global _CharMapSrvc ; in _DATA (see AARD)
extern _reloc_call_CharMapSrvc
_CharMapSrvc: jmp 0:_reloc_call_CharMapSrvc
call near forceEnableA20
global _init_call_p_0
extern reloc_call_p_0
_init_call_p_0: jmp 0:reloc_call_p_0
call near forceEnableA20
复制代码
作者:
不点
时间:
2014-12-18 11:42
以下是 grub4dos 有关实模式与保护模式环境切换的关键接口函数。
/*
* long realmode_run(long regs_ptr)
*
*/
ENTRY(realmode_run)
.code32
pushl %ebp
movl %esp, %ebp
pushl %ebx
movl 8(%ebp), %ebx /* EBX=regs_ptr */
/* check sanity */
xorl %eax, %eax /* EAX=0 for failure */
movl 0x20(%ebx), %ecx /* GS */
incl %ecx
jz 1f
decl %ecx
shrl $16, %ecx
jnz 2f /* failure */
1:
movl 0x24(%ebx), %ecx /* FS */
incl %ecx
jz 1f
decl %ecx
shrl $16, %ecx
jnz 2f /* failure */
1:
movl 0x28(%ebx), %ecx /* ES */
incl %ecx
jz 1f
decl %ecx
shrl $16, %ecx
jnz 2f /* failure */
1:
movl 0x2C(%ebx), %ecx /* DS */
incl %ecx
jz 1f
decl %ecx
shrl $16, %ecx
jnz 2f /* failure */
1:
movl 0x30(%ebx), %ecx /* SS */
movl 0x0C(%ebx), %edx /* ESP */
incl %ecx
jz 1f
decl %ecx
orl %edx, %ecx
shrl $16, %ecx
jnz 2f /* failure */
jmp 3f
1:
incl %edx
jnz 2f /* failure */
3:
movl 0x38(%ebx), %ecx /* CS */
movl 0x34(%ebx), %edx /* EIP */
incl %ecx
jz 1f
decl %ecx
orl %edx, %ecx
shrl $16, %ecx
jnz 2f /* failure */
jmp 3f
1:
cmpb $0xCD, %dl
jnz 2f /* failure */
shrl $16, %edx
incw %dx
jnz 2f /* failure */
3:
/* sanity check ok, run it! */
pushal
pushal
pushal
pushal
movl %esp, ABS(chain_stage1_esp)
/* mov the struct to stack */
subl $64, %esp
movl %esp, %edi
movl %ebx, %esi
movl $16, %ecx
cld
repz movsl
movl %esp, %ebp /* EBP point to struct on stack */
call EXT_C(prot_to_real)
.code16
sti
movl %ebp, %esp
/* check CS:EIP */
movl 0x38(%bp), %ecx /* CS */
movl 0x34(%bp), %edx /* EIP */
incl %ecx /* CS = -1? */
jz 3f /* yes, jump to INTxx code */
/* run user defined code */
decl %ecx /* CS */
/* 0xEA might have been changed to 0xCD previously, so we must restore
* it back to 0xEA.
*/
movb $0xEA, ABS(1f-1) /* opcode for "far jump" */
movw %dx, ABS(1f) /* IP in the far jump instruction */
movw %cx, ABS(1f + 2) /* CS in the far jump instruction */
/* set return address for user code to return */
movl $ABS(4f), %ecx
movl %ecx, 0x8201
jmp 6f
3:
/* run int xx */
movw %dx, ABS(1f - 1) /* int XX */
movb $0xE9, ABS(1f + 1) /* jmp */
movw $(4f - 1f - 4), ABS(1f + 2)
6:
movw %sp, ABS(8f) /* initial SP */
movw %ss, ABS(7f) /* initial SS */
/* set DS, ES, FS, GS */
movl 0x20(%bp), %ecx /* GS */
incl %ecx
jz 5f
decl %ecx
movw %cx, %gs
5:
movl 0x24(%bp), %ecx /* FS */
incl %ecx
jz 5f
decl %ecx
movw %cx, %fs
5:
movl 0x28(%bp), %ecx /* ES */
incl %ecx
jz 5f
decl %ecx
movw %cx, %es
5:
movl 0x2C(%bp), %ecx /* DS */
incl %ecx
jz 5f
decl %ecx
movw %cx, %ds
5:
movl 0x30(%bp), %ecx /* SS */
incl %ecx
jz 5f
decl %ecx
movw %cx, ABS(7f)
movw 0x0C(%bp), %dx /* SP */
movw %dx, ABS(8f)
5:
movl 0x3C(%bp), %ecx /* EFLAGS */
incl %ecx
jz 5f
decl %ecx
pushl %ecx
popfl
5:
popal /* setup general registers */
/* move SS and SP */
.byte 0xBC /* MOV SP */
7:
.word 0 /* SS */
movw %sp, %ss
.byte 0xBC /* MOV SP */
8:
.word 0 /* SP */
/* far jump to user code */
.byte 0xEA /* ljmp */
1:
.word 0 /* IP */
.word 0 /* CS */
4: /* return from user code */
/* CS:IP need not care */
/* use the stack already built by the user */
pushal
pushfl
pushl %cs
pushl $0
pushl %ss
pushl %ds
pushl %es
pushl %fs
pushl %gs
movl %ss, %ebp
shll $4, %ebp
xorl %eax, %eax
movw %ax, %ds
movw %ax, %es
movw %sp, %ax
addl %eax, %ebp /* physical address of stack */
call EXT_C(real_to_prot)
.code32
sti
cld
movl %ebp, %esi
movl ABS(chain_stage1_esp), %esp
movl 16(%esp), %ebx /* EBX=regs_ptr */
leal 32(%ebx), %edi
movl $8, %ecx
repz movsl
leal 32(%ebp), %esi
movl %ebx, %edi
movl $8, %ecx
repz movsl
/* the stack should not change! */
/* fix the pushed ESPs before checking */
movl $32, %ecx
subl %ecx, (32 + 12)(%esp)
movl $64, %ecx
subl %ecx, (64 + 12)(%esp)
movl $96, %ecx
subl %ecx, (96 + 12)(%esp)
movl %esp, %esi
leal 32(%esp), %edi
movl $8, %ecx
repz cmpsl
jnz 1f
movl %esp, %esi
leal 64(%esp), %edi
movl $16, %ecx
repz cmpsl
jnz 1f
popal
popal
popal
popal
movl $1, %eax /* success */
popl %ebx
popl %ebp
ret
1:
popal
popal
popal
popal
xorl %eax, %eax /* failure */
2:
popl %ebx
popl %ebp
ret
复制代码
欢迎光临 无忧启动论坛 (http://wuyou.net./)
Powered by Discuz! X3.3