mirror of
https://github.com/cfenollosa/os-tutorial.git
synced 2024-10-27 20:34:19 +00:00
lesson 3, boot sector with memory addressing
This commit is contained in:
parent
81e9f2c974
commit
bdca5e65da
BIN
03-bootsector-memory/.boot_sect_memory.asm.swp
Normal file
BIN
03-bootsector-memory/.boot_sect_memory.asm.swp
Normal file
Binary file not shown.
@ -1,3 +1,38 @@
|
|||||||
TBD
|
*Concepts you may want to Google beforehand: memory offsets, pointers*
|
||||||
|
|
||||||
Our new boot sector will refer to memory addresses and labels
|
The only goal of this lesson is to learn where the boot sector is stored
|
||||||
|
|
||||||
|
Please open page 14 [of this document](
|
||||||
|
http://www.cs.bham.ac.uk/~exr/lectures/opsys/10_11/lectures/os-dev.pdf)<sup>*</sup>
|
||||||
|
and look at the figure with the memory layout.
|
||||||
|
|
||||||
|
I could just go ahead and tell you that it starts at `0x7C00`, but it's
|
||||||
|
better with an example.
|
||||||
|
|
||||||
|
We want to print an X on screen. We will try 4 different strategies
|
||||||
|
and see which ones work and why.
|
||||||
|
|
||||||
|
First, we will define the X as data, with a label:
|
||||||
|
```nasm
|
||||||
|
the_secret:
|
||||||
|
db "X"
|
||||||
|
```
|
||||||
|
|
||||||
|
Then we will try to access `the_secret` in many different ways:
|
||||||
|
|
||||||
|
1. `mov al, the_secret`
|
||||||
|
2. `mov al, [the_secret]`
|
||||||
|
3. `mov al, the_secret + 0x7C00`
|
||||||
|
4. `mov al, 2d + 0x7C00`, where `2d` is the actual position of the X in the binary
|
||||||
|
|
||||||
|
Take a look at the code and read the comments.
|
||||||
|
|
||||||
|
Compile and run the code. You should see a string similar to `1[2¢3X4X`, where
|
||||||
|
the bytes following 1 and 2 are just random garbage.
|
||||||
|
|
||||||
|
If you add or remove instructions, remember to compute the new offset of the X
|
||||||
|
by counting the bytes, and replace `0x2d` with the new one.
|
||||||
|
|
||||||
|
~~~~~
|
||||||
|
This whole tutorial is heavily inspired on that document. Please read the
|
||||||
|
root-level README for more information on that.
|
||||||
|
47
03-bootsector-memory/boot_sect_memory.asm
Normal file
47
03-bootsector-memory/boot_sect_memory.asm
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
mov ah, 0x0e
|
||||||
|
|
||||||
|
; attempt 1
|
||||||
|
; Fails because it tries to print the memory address (i.e. pointer)
|
||||||
|
; not its actual contents
|
||||||
|
mov al, "1"
|
||||||
|
int 0x10
|
||||||
|
mov al, the_secret
|
||||||
|
int 0x10
|
||||||
|
|
||||||
|
; attempt 2
|
||||||
|
; It tries to print the memory address of 'the_secret' which is the correct approach.
|
||||||
|
; However, BIOS starts loading at address 0x7c00
|
||||||
|
; so we need to add that padding beforehand. We'll do that in attempt 3
|
||||||
|
mov al, "2"
|
||||||
|
int 0x10
|
||||||
|
mov al, [the_secret]
|
||||||
|
int 0x10
|
||||||
|
|
||||||
|
; attempt 3
|
||||||
|
; Add the BIOS starting offset 0x7c00 to the memory address of the X
|
||||||
|
; and then dereference the contents of that pointer
|
||||||
|
mov al, "3"
|
||||||
|
int 0x10
|
||||||
|
mov bx, the_secret
|
||||||
|
add bx, 0x7c00
|
||||||
|
mov al, [bx]
|
||||||
|
int 0x10
|
||||||
|
|
||||||
|
; attempt 4
|
||||||
|
; We try a shortcut since we know that the X is stored at byte 0x2d in our binary
|
||||||
|
mov al, "4"
|
||||||
|
int 0x10
|
||||||
|
mov al, [0x7c2d]
|
||||||
|
int 0x10
|
||||||
|
|
||||||
|
|
||||||
|
jmp $
|
||||||
|
|
||||||
|
|
||||||
|
the_secret:
|
||||||
|
; ASCII code 0x58 is stored just before the zero-padding
|
||||||
|
; on this code that is at byte 0x2d (check it out using xdd)
|
||||||
|
db "X"
|
||||||
|
|
||||||
|
times 510-($-$$) db 0
|
||||||
|
dw 0xaa55
|
Loading…
Reference in New Issue
Block a user