1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
|
// MIT License, Copyright (c) 2021 Marvin Borner
#include <assert.h>
#include <def.h>
#include <gdt.h>
#include <mem.h>
#define GDT_MAX_LIMIT 0xffff
#define GDT_PRESENT (1 << 7)
#define GDT_RING3 (3 << 5)
#define GDT_DESCRIPTOR (1 << 4)
#define GDT_EXECUTABLE (1 << 3)
#define GDT_READWRITE (1 << 1)
#define GDT_ACCESSED (1 << 0)
#define GDT_GRANULARITY (0x80 | 0x00)
#define GDT_SIZE (0x40 | 0x00)
#define GDT_DATA_OFFSET 0x10
static struct gdt_entry gdt[6] = { 0 };
static struct tss_entry tss = { 0 };
PROTECTED static struct gdt_ptr gp = { 0 };
CLEAR static void gdt_set_gate(u32 num, u32 base, u32 limit, u8 access, u8 gran)
{
// Set descriptor base address
gdt[num].base_low = (u16)(base & 0xffff);
gdt[num].base_middle = (u8)((base >> 16) & 0xff);
gdt[num].base_high = (u8)((base >> 24) & 0xff);
gdt[num].limit_low = (u16)(limit & 0xffff);
// Set granularity and access flags
gdt[num].granularity = (u8)((limit >> 16) & 0x0f);
gdt[num].granularity |= (gran & 0xf0);
gdt[num].access = access;
}
// TODO: Fix GPF for in/out operations in userspace (not necessarily a TSS problem)
CLEAR static void tss_write(u32 num, u16 ss0, u32 esp0)
{
u32 base = (u32)&tss;
u32 limit = base + sizeof(tss);
gdt_set_gate(num, base, limit, GDT_PRESENT | GDT_RING3 | GDT_EXECUTABLE | GDT_ACCESSED,
GDT_SIZE);
memset(&tss, 0, sizeof(tss));
tss.ss0 = ss0;
tss.esp0 = esp0;
tss.cs = 0x0b;
tss.ss = tss.ds = tss.es = tss.fs = tss.gs = 0x13;
}
CLEAR static void tss_flush(void)
{
__asm__ volatile("ltr %0" ::"r"((u16)((u32)&gdt[5] - (u32)gdt)));
}
CLEAR static void gdt_flush(void)
{
__asm__ volatile("lgdt %0" ::"m"(gp) : "memory");
}
void tss_set_stack(u32 ss, u32 esp)
{
assert(ss && esp);
tss.esp0 = esp;
tss.ss0 = ss;
}
CLEAR void gdt_install(u32 esp)
{
// Set GDT pointer and limit
gp.limit = sizeof(gdt) - 1;
gp.base = &gdt;
// NULL descriptor
gdt_set_gate(0, 0, 0, 0, 0);
// Code segment
gdt_set_gate(1, 0, 0xffffffff,
GDT_PRESENT | GDT_DESCRIPTOR | GDT_EXECUTABLE | GDT_READWRITE,
GDT_GRANULARITY | GDT_SIZE);
// Data segment
gdt_set_gate(2, 0, 0xffffffff, GDT_PRESENT | GDT_DESCRIPTOR | GDT_READWRITE,
GDT_GRANULARITY | GDT_SIZE);
// User mode code segment
gdt_set_gate(3, 0, 0xffffffff,
GDT_PRESENT | GDT_RING3 | GDT_DESCRIPTOR | GDT_EXECUTABLE | GDT_READWRITE,
GDT_GRANULARITY | GDT_SIZE);
// User mode data segment
gdt_set_gate(4, 0, 0xffffffff, GDT_PRESENT | GDT_RING3 | GDT_DESCRIPTOR | GDT_READWRITE,
GDT_GRANULARITY | GDT_SIZE);
// Write TSS
tss_write(5, GDT_SUPER_DATA_OFFSET, esp);
// Remove old GDT and install the new changes!
gdt_flush();
tss_flush();
__asm__ volatile("mov %%ax, %%ds\n"
"mov %%ax, %%es\n"
"mov %%ax, %%fs\n"
"mov %%ax, %%gs\n"
"mov %%ax, %%ss\n" ::"a"(GDT_SUPER_DATA_OFFSET)
: "memory");
__asm__ volatile("ljmpl $" STRINGIFY(GDT_SUPER_CODE_OFFSET) ", $code\n"
"code:\n");
}
|