
K_ptr : dd 0 Compiling and linking the loader jmp_k : mov edi, 1st argument of kernel_main (pointer to multiboot structure) mov eax, This is transformed to mov rax, and uses the double word reserved below dd 0 Trick the processor, contains high address of k_ptr as higher half of the address to k_ptr jmp eax This part is plain bad, tricking the processor is not the best thing to do here
HOW TO LOAD BOOT.ELF CODE
jmp_k Reload code selector by jumping to 64-bit code. data Reload data segment selectors mov ss, ax mov ds, ax mov es, ax jmp GDT. The code below is not optimal in the slightest, and you should try to put together your own alternative.Įnter_kernel : push ebp mov ebp, esp Set up the stack so the variables passed from the C code can be read mov esi, This is the kernel entry point mov, esi lgdt Load GDT mov ax, GDT. Now we are in Compatibility mode, to enter Long mode we have to set up a 64-bit GDT (This will be the GDT your kernel uses, so you have to set up everything here)

~ Patched by bfoos, DNS redirect provided by LiquidManZero and GSHI, permission granted by Jupi <-No longer using the DNS redirect. ~ Patched by bfoos, Day1 server script by misfire, Day1 server setup by LiquidManZero of GSHI * Domain changed to for retrieval of Day1 and game save files.


~ Credits to misfire for the RSA work, patched by bfoos

* RSA patched to allow loading of unsigned.
HOW TO LOAD BOOT.ELF CRACKED
* All of the original cracked ELF features (no Anti-mod chip, disable CD/DVD check). Currently, both official Codebreaker Day1 code saves, and game saves are served. It's purpose is to provide an avenue for Day1 files, both official and community generated to be hosted and usable by those capable of using the ELF. CBv92_GH_DAY1_ELFLDR is a joint project by bfoos and LiquidManZero.
