source: mainline/arch/amd64/src/pm.c@ e8194664

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since e8194664 was e8194664, checked in by Jakub Vana <jakub.vana@…>, 19 years ago

VESA FB cut unwanted

  • Property mode set to 100644
File size: 6.5 KB
RevLine 
[c245372b]1/*
2 * Copyright (C) 2001-2004 Jakub Jermar
[49a39c2]3 * Copyright (C) 2005-2006 Ondrej Palkovsky
[c245372b]4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 *
10 * - Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * - Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * - The name of the author may not be used to endorse or promote products
16 * derived from this software without specific prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
19 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
20 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
21 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
22 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
23 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
24 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
25 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
26 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
27 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28 */
29
30#include <arch/pm.h>
31#include <arch/mm/page.h>
32#include <arch/types.h>
[b9e97fb]33#include <arch/interrupt.h>
34#include <arch/asm.h>
[fcfac420]35#include <interrupt.h>
[a98cdc7]36#include <mm/as.h>
[c245372b]37
[b9e97fb]38#include <config.h>
39
40#include <memstr.h>
[085d973]41#include <mm/slab.h>
[b9e97fb]42#include <debug.h>
[c245372b]43
44/*
45 * There is no segmentation in long mode so we set up flat mode. In this
46 * mode, we use, for each privilege level, two segments spanning the
47 * whole memory. One is for code and one is for data.
48 */
49
[39cea6a]50descriptor_t gdt[GDT_ITEMS] = {
[c245372b]51 /* NULL descriptor */
52 { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 },
53 /* KTEXT descriptor */
54 { .limit_0_15 = 0xffff,
55 .base_0_15 = 0,
56 .base_16_23 = 0,
[6f878b7]57 .access = AR_PRESENT | AR_CODE | DPL_KERNEL | AR_READABLE ,
[c245372b]58 .limit_16_19 = 0xf,
59 .available = 0,
60 .longmode = 1,
[6f878b7]61 .special = 0,
[c245372b]62 .granularity = 1,
63 .base_24_31 = 0 },
64 /* KDATA descriptor */
65 { .limit_0_15 = 0xffff,
66 .base_0_15 = 0,
67 .base_16_23 = 0,
68 .access = AR_PRESENT | AR_DATA | AR_WRITABLE | DPL_KERNEL,
69 .limit_16_19 = 0xf,
70 .available = 0,
71 .longmode = 0,
72 .special = 0,
[6f878b7]73 .granularity = 1,
[c245372b]74 .base_24_31 = 0 },
[dd4d6b0]75 /* UDATA descriptor */
[c245372b]76 { .limit_0_15 = 0xffff,
77 .base_0_15 = 0,
78 .base_16_23 = 0,
[dd4d6b0]79 .access = AR_PRESENT | AR_DATA | AR_WRITABLE | DPL_USER,
[c245372b]80 .limit_16_19 = 0xf,
81 .available = 0,
[dd4d6b0]82 .longmode = 0,
83 .special = 1,
[b9e97fb]84 .granularity = 1,
[c245372b]85 .base_24_31 = 0 },
[dd4d6b0]86 /* UTEXT descriptor */
[c245372b]87 { .limit_0_15 = 0xffff,
88 .base_0_15 = 0,
89 .base_16_23 = 0,
[dd4d6b0]90 .access = AR_PRESENT | AR_CODE | DPL_USER,
[c245372b]91 .limit_16_19 = 0xf,
92 .available = 0,
[dd4d6b0]93 .longmode = 1,
94 .special = 0,
[c245372b]95 .granularity = 1,
96 .base_24_31 = 0 },
[3156582]97 /* KTEXT 32-bit protected, for protected mode before long mode */
[6f878b7]98 { .limit_0_15 = 0xffff,
99 .base_0_15 = 0,
100 .base_16_23 = 0,
101 .access = AR_PRESENT | AR_CODE | DPL_KERNEL | AR_READABLE,
102 .limit_16_19 = 0xf,
103 .available = 0,
104 .longmode = 0,
[946b630]105 .special = 1,
[6f878b7]106 .granularity = 1,
107 .base_24_31 = 0 },
[b9e97fb]108 /* TSS descriptor - set up will be completed later,
109 * on AMD64 it is 64-bit - 2 items in table */
110 { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 },
[de07bcf]111 { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 },
112 /* VESA Init descriptor */
[e8194664]113#ifdef CONFIG_FB
[de07bcf]114 { 0xffff, 0, VESA_INIT_SEGMENT>>12, AR_PRESENT | AR_CODE | DPL_KERNEL, 0xf, 0, 0, 0, 0, 0 }
[e8194664]115#endif
[c245372b]116};
117
[39cea6a]118idescriptor_t idt[IDT_ITEMS];
[c245372b]119
[39cea6a]120ptr_16_64_t gdtr = {.limit = sizeof(gdt), .base= (__u64) gdt };
121ptr_16_64_t idtr = {.limit = sizeof(idt), .base= (__u64) idt };
[de25b6f]122
[39cea6a]123static tss_t tss;
124tss_t *tss_p = NULL;
[c245372b]125
[39cea6a]126void gdt_tss_setbase(descriptor_t *d, __address base)
[b9e97fb]127{
[39cea6a]128 tss_descriptor_t *td = (tss_descriptor_t *) d;
[b9e97fb]129
130 td->base_0_15 = base & 0xffff;
131 td->base_16_23 = ((base) >> 16) & 0xff;
132 td->base_24_31 = ((base) >> 24) & 0xff;
133 td->base_32_63 = ((base) >> 32);
134}
135
[39cea6a]136void gdt_tss_setlimit(descriptor_t *d, __u32 limit)
[b9e97fb]137{
[39cea6a]138 struct tss_descriptor *td = (tss_descriptor_t *) d;
[b9e97fb]139
140 td->limit_0_15 = limit & 0xffff;
141 td->limit_16_19 = (limit >> 16) & 0xf;
142}
143
[39cea6a]144void idt_setoffset(idescriptor_t *d, __address offset)
[b9e97fb]145{
146 /*
147 * Offset is a linear address.
148 */
149 d->offset_0_15 = offset & 0xffff;
150 d->offset_16_31 = offset >> 16 & 0xffff;
151 d->offset_32_63 = offset >> 32;
152}
153
[39cea6a]154void tss_initialize(tss_t *t)
[b9e97fb]155{
[39cea6a]156 memsetb((__address) t, sizeof(tss_t), 0);
[b9e97fb]157}
158
159/*
160 * This function takes care of proper setup of IDT and IDTR.
161 */
162void idt_init(void)
163{
[39cea6a]164 idescriptor_t *d;
[b9e97fb]165 int i;
166
167 for (i = 0; i < IDT_ITEMS; i++) {
168 d = &idt[i];
169
170 d->unused = 0;
[33ccb2c]171 d->selector = gdtselector(KTEXT_DES);
[b9e97fb]172
173 d->present = 1;
174 d->type = AR_INTERRUPT; /* masking interrupt */
175
176 idt_setoffset(d, ((__address) interrupt_handlers) + i*interrupt_handler_size);
[49a39c2]177 exc_register(i, "undef", (iroutine)null_interrupt);
[b9e97fb]178 }
[1ee9ced]179
[fcfac420]180 exc_register( 7, "nm_fault", nm_fault);
181 exc_register(12, "ss_fault", ss_fault);
[1ee9ced]182 exc_register(13, "gp_fault", gp_fault);
[dabe6333]183 exc_register(14, "ident_mapper", ident_page_fault);
[b9e97fb]184}
185
[49a39c2]186/** Initialize segmentation - code/data/idt tables
187 *
188 */
[b9e97fb]189void pm_init(void)
190{
[39cea6a]191 descriptor_t *gdt_p = (struct descriptor *) gdtr.base;
192 tss_descriptor_t *tss_desc;
[b9e97fb]193
194 /*
195 * Each CPU has its private GDT and TSS.
196 * All CPUs share one IDT.
197 */
198
199 if (config.cpu_active == 1) {
200 idt_init();
201 /*
202 * NOTE: bootstrap CPU has statically allocated TSS, because
203 * the heap hasn't been initialized so far.
204 */
205 tss_p = &tss;
206 }
207 else {
[a98cdc7]208 /* We are going to use malloc, which may return
209 * non boot-mapped pointer, initialize the CR3 register
210 * ahead of page_init */
211 write_cr3((__address) AS_KERNEL->page_table);
212
[39cea6a]213 tss_p = (struct tss *) malloc(sizeof(tss_t), FRAME_ATOMIC);
[b9e97fb]214 if (!tss_p)
215 panic("could not allocate TSS\n");
216 }
217
218 tss_initialize(tss_p);
219
[39cea6a]220 tss_desc = (tss_descriptor_t *) (&gdt_p[TSS_DES]);
[e291e5d]221 tss_desc->present = 1;
222 tss_desc->type = AR_TSS;
223 tss_desc->dpl = PL_KERNEL;
[b9e97fb]224
225 gdt_tss_setbase(&gdt_p[TSS_DES], (__address) tss_p);
[11928d5]226 gdt_tss_setlimit(&gdt_p[TSS_DES], TSS_BASIC_SIZE - 1);
[b9e97fb]227
[897ad60]228 gdtr_load(&gdtr);
229 idtr_load(&idtr);
[b9e97fb]230 /*
231 * As of this moment, the current CPU has its own GDT pointing
232 * to its own TSS. We just need to load the TR register.
233 */
[897ad60]234 tr_load(gdtselector(TSS_DES));
[b9e97fb]235}
Note: See TracBrowser for help on using the repository browser.