source: mainline/kernel/arch/ia32/src/pm.c@ e32e092

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since e32e092 was e32e092, checked in by Jiri Svoboda <jirik.svoboda@…>, 17 years ago

Declare arguments for memstr.h operations as pointers instead of uintptr_t.

  • Property mode set to 100644
File size: 6.5 KB
RevLine 
[f761f1eb]1/*
[df4ed85]2 * Copyright (c) 2001-2004 Jakub Jermar
[f761f1eb]3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
[06e1e95]29/** @addtogroup ia32
[b45c443]30 * @{
31 */
32/** @file
33 */
34
[f761f1eb]35#include <arch/pm.h>
36#include <config.h>
37#include <arch/types.h>
38#include <arch/interrupt.h>
39#include <arch/asm.h>
40#include <arch/context.h>
41#include <panic.h>
[b07769b6]42#include <arch/mm/page.h>
[085d973]43#include <mm/slab.h>
[9c0a9b3]44#include <memstr.h>
[375237d1]45#include <arch/boot/boot.h>
[fcfac420]46#include <interrupt.h>
[f761f1eb]47
48/*
[397c77f]49 * Early ia32 configuration functions and data structures.
[f761f1eb]50 */
51
52/*
53 * We have no use for segmentation so we set up flat mode. In this
54 * mode, we use, for each privilege level, two segments spanning the
55 * whole memory. One is for code and one is for data.
[281b607]56 *
57 * One is for GS register which holds pointer to the TLS thread
58 * structure in it's base.
[f761f1eb]59 */
[39cea6a]60descriptor_t gdt[GDT_ITEMS] = {
[76cec1e]61 /* NULL descriptor */
62 { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 },
63 /* KTEXT descriptor */
64 { 0xffff, 0, 0, AR_PRESENT | AR_CODE | DPL_KERNEL, 0xf, 0, 0, 1, 1, 0 },
65 /* KDATA descriptor */
66 { 0xffff, 0, 0, AR_PRESENT | AR_DATA | AR_WRITABLE | DPL_KERNEL, 0xf, 0, 0, 1, 1, 0 },
67 /* UTEXT descriptor */
68 { 0xffff, 0, 0, AR_PRESENT | AR_CODE | DPL_USER, 0xf, 0, 0, 1, 1, 0 },
69 /* UDATA descriptor */
70 { 0xffff, 0, 0, AR_PRESENT | AR_DATA | AR_WRITABLE | DPL_USER, 0xf, 0, 0, 1, 1, 0 },
71 /* TSS descriptor - set up will be completed later */
[281b607]72 { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 },
[0ddeabc]73 /* TLS descriptor */
[22cf454d]74 { 0xffff, 0, 0, AR_PRESENT | AR_DATA | AR_WRITABLE | DPL_USER, 0xf, 0, 0, 1, 1, 0 },
75 /* VESA Init descriptor */
[e8194664]76#ifdef CONFIG_FB
[de07bcf]77 { 0xffff, 0, VESA_INIT_SEGMENT>>12, AR_PRESENT | AR_CODE | DPL_KERNEL, 0xf, 0, 0, 0, 0, 0 }
[e8194664]78#endif
[f761f1eb]79};
80
[39cea6a]81static idescriptor_t idt[IDT_ITEMS];
[f761f1eb]82
[39cea6a]83static tss_t tss;
[f761f1eb]84
[39cea6a]85tss_t *tss_p = NULL;
[f761f1eb]86
[cb4b61d]87/* gdtr is changed by kmp before next CPU is initialized */
[7f1c620]88ptr_16_32_t bootstrap_gdtr = { .limit = sizeof(gdt), .base = KA2PA((uintptr_t) gdt) };
89ptr_16_32_t gdtr = { .limit = sizeof(gdt), .base = (uintptr_t) gdt };
[f761f1eb]90
[7f1c620]91void gdt_setbase(descriptor_t *d, uintptr_t base)
[f761f1eb]92{
[76cec1e]93 d->base_0_15 = base & 0xffff;
94 d->base_16_23 = ((base) >> 16) & 0xff;
95 d->base_24_31 = ((base) >> 24) & 0xff;
[f761f1eb]96}
97
[7f1c620]98void gdt_setlimit(descriptor_t *d, uint32_t limit)
[f761f1eb]99{
[76cec1e]100 d->limit_0_15 = limit & 0xffff;
101 d->limit_16_19 = (limit >> 16) & 0xf;
[f761f1eb]102}
103
[7f1c620]104void idt_setoffset(idescriptor_t *d, uintptr_t offset)
[f761f1eb]105{
[b0bf501]106 /*
107 * Offset is a linear address.
108 */
109 d->offset_0_15 = offset & 0xffff;
110 d->offset_16_31 = offset >> 16;
[f761f1eb]111}
112
[39cea6a]113void tss_initialize(tss_t *t)
[f761f1eb]114{
[e32e092]115 memsetb(t, sizeof(struct tss), 0);
[f761f1eb]116}
117
118/*
119 * This function takes care of proper setup of IDT and IDTR.
120 */
121void idt_init(void)
122{
[39cea6a]123 idescriptor_t *d;
[f74bbaf]124 unsigned int i;
[76cec1e]125
[f761f1eb]126 for (i = 0; i < IDT_ITEMS; i++) {
127 d = &idt[i];
128
129 d->unused = 0;
130 d->selector = selector(KTEXT_DES);
131
132 d->access = AR_PRESENT | AR_INTERRUPT; /* masking interrupt */
133
134 if (i == VECTOR_SYSCALL) {
135 /*
[7e956eb]136 * The syscall interrupt gate must be calleable from
137 * userland.
[f761f1eb]138 */
139 d->access |= DPL_USER;
140 }
141
[7e956eb]142 idt_setoffset(d, ((uintptr_t) interrupt_handlers) +
143 i * interrupt_handler_size);
[f761f1eb]144 }
145}
146
147
[60875800]148/* Clean IOPL(12,13) and NT(14) flags in EFLAGS register */
[c192134]149static void clean_IOPL_NT_flags(void)
150{
[e7b7be3f]151 asm volatile (
[39cea6a]152 "pushfl\n"
153 "pop %%eax\n"
154 "and $0xffff8fff, %%eax\n"
155 "push %%eax\n"
156 "popfl\n"
157 : : : "eax"
[c192134]158 );
159}
160
[60875800]161/* Clean AM(18) flag in CR0 register */
[1eb0dd13]162static void clean_AM_flag(void)
163{
[e7b7be3f]164 asm volatile (
[39cea6a]165 "mov %%cr0, %%eax\n"
166 "and $0xfffbffff, %%eax\n"
167 "mov %%eax, %%cr0\n"
168 : : : "eax"
[1eb0dd13]169 );
170}
171
[f761f1eb]172void pm_init(void)
173{
[39cea6a]174 descriptor_t *gdt_p = (descriptor_t *) gdtr.base;
175 ptr_16_32_t idtr;
[69bd642]176
177 /*
178 * Update addresses in GDT and IDT to their virtual counterparts.
179 */
[4533601]180 idtr.limit = sizeof(idt);
[7f1c620]181 idtr.base = (uintptr_t) idt;
[897ad60]182 gdtr_load(&gdtr);
183 idtr_load(&idtr);
[69bd642]184
[f761f1eb]185 /*
186 * Each CPU has its private GDT and TSS.
187 * All CPUs share one IDT.
188 */
189
190 if (config.cpu_active == 1) {
191 idt_init();
192 /*
193 * NOTE: bootstrap CPU has statically allocated TSS, because
194 * the heap hasn't been initialized so far.
195 */
196 tss_p = &tss;
197 }
198 else {
[39cea6a]199 tss_p = (tss_t *) malloc(sizeof(tss_t), FRAME_ATOMIC);
[f761f1eb]200 if (!tss_p)
[02a99d2]201 panic("could not allocate TSS\n");
[f761f1eb]202 }
203
204 tss_initialize(tss_p);
205
206 gdt_p[TSS_DES].access = AR_PRESENT | AR_TSS | DPL_KERNEL;
207 gdt_p[TSS_DES].special = 1;
[11928d5]208 gdt_p[TSS_DES].granularity = 0;
[f761f1eb]209
[7f1c620]210 gdt_setbase(&gdt_p[TSS_DES], (uintptr_t) tss_p);
[11928d5]211 gdt_setlimit(&gdt_p[TSS_DES], TSS_BASIC_SIZE - 1);
[f761f1eb]212
213 /*
214 * As of this moment, the current CPU has its own GDT pointing
215 * to its own TSS. We just need to load the TR register.
216 */
[897ad60]217 tr_load(selector(TSS_DES));
[c192134]218
[11928d5]219 clean_IOPL_NT_flags(); /* Disable I/O on nonprivileged levels and clear NT flag. */
[60875800]220 clean_AM_flag(); /* Disable alignment check */
[f761f1eb]221}
[281b607]222
[7f1c620]223void set_tls_desc(uintptr_t tls)
[281b607]224{
[39cea6a]225 ptr_16_32_t cpugdtr;
[e185136]226 descriptor_t *gdt_p;
[281b607]227
[897ad60]228 gdtr_store(&cpugdtr);
[e185136]229 gdt_p = (descriptor_t *) cpugdtr.base;
[281b607]230 gdt_setbase(&gdt_p[TLS_DES], tls);
231 /* Reload gdt register to update GS in CPU */
[897ad60]232 gdtr_load(&cpugdtr);
[281b607]233}
[b45c443]234
[f74bbaf]235/* Reboot the machine by initiating
236 * a triple fault
237 */
238void arch_reboot(void)
239{
240 preemption_disable();
241 ipl_t ipl = interrupts_disable();
242
[e32e092]243 memsetb(idt, sizeof(idt), 0);
[f74bbaf]244
245 ptr_16_32_t idtr;
246 idtr.limit = sizeof(idt);
247 idtr.base = (uintptr_t) idt;
248 idtr_load(&idtr);
249
250 interrupts_restore(ipl);
251 asm volatile (
252 "int $0x03\n"
[6aea2e00]253 "cli\n"
[f74bbaf]254 "hlt\n"
255 );
256}
257
[06e1e95]258/** @}
[b45c443]259 */
Note: See TracBrowser for help on using the repository browser.