source: mainline/kernel/arch/ia32xen/src/pm.c@ 57ce359

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 57ce359 was 57ce359, checked in by Jakub Jermar <jakub@…>, 19 years ago

Rename xen32 to ia32xen.
The name seems to be more logical as Xen supports more host architectures.

  • Property mode set to 100644
File size: 5.8 KB
Line 
1/*
2 * Copyright (C) 2006 Martin Decky
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
29/** @addtogroup ia32xen
30 * @{
31 */
32/** @file
33 */
34
35#include <arch/pm.h>
36#include <config.h>
37#include <arch/types.h>
38#include <typedefs.h>
39#include <arch/interrupt.h>
40#include <arch/asm.h>
41#include <arch/context.h>
42#include <panic.h>
43#include <arch/mm/page.h>
44#include <mm/slab.h>
45#include <memstr.h>
46#include <arch/boot/boot.h>
47#include <interrupt.h>
48
49/*
50 * Early ia32xen configuration functions and data structures.
51 */
52
53/*
54 * We have no use for segmentation so we set up flat mode. In this
55 * mode, we use, for each privilege level, two segments spanning the
56 * whole memory. One is for code and one is for data.
57 *
58 * One is for GS register which holds pointer to the TLS thread
59 * structure in it's base.
60 */
61descriptor_t gdt[GDT_ITEMS] = {
62 /* NULL descriptor */
63 { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 },
64 /* KTEXT descriptor */
65 { 0xffff, 0, 0, AR_PRESENT | AR_CODE | DPL_KERNEL, 0xf, 0, 0, 1, 1, 0 },
66 /* KDATA descriptor */
67 { 0xffff, 0, 0, AR_PRESENT | AR_DATA | AR_WRITABLE | DPL_KERNEL, 0xf, 0, 0, 1, 1, 0 },
68 /* UTEXT descriptor */
69 { 0xffff, 0, 0, AR_PRESENT | AR_CODE | DPL_USER, 0xf, 0, 0, 1, 1, 0 },
70 /* UDATA descriptor */
71 { 0xffff, 0, 0, AR_PRESENT | AR_DATA | AR_WRITABLE | DPL_USER, 0xf, 0, 0, 1, 1, 0 },
72 /* TSS descriptor - set up will be completed later */
73 { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 },
74 /* TLS descriptor */
75 { 0xffff, 0, 0, AR_PRESENT | AR_DATA | AR_WRITABLE | DPL_USER, 0xf, 0, 0, 1, 1, 0 },
76};
77
78static trap_info_t traps[IDT_ITEMS + 1];
79
80static tss_t tss;
81
82tss_t *tss_p = NULL;
83
84/* gdtr is changed by kmp before next CPU is initialized */
85ptr_16_32_t bootstrap_gdtr = { .limit = sizeof(gdt), .base = KA2PA((uintptr_t) gdt) };
86ptr_16_32_t gdtr = { .limit = sizeof(gdt), .base = (uintptr_t) gdt };
87
88void gdt_setbase(descriptor_t *d, uintptr_t base)
89{
90 d->base_0_15 = base & 0xffff;
91 d->base_16_23 = ((base) >> 16) & 0xff;
92 d->base_24_31 = ((base) >> 24) & 0xff;
93}
94
95void gdt_setlimit(descriptor_t *d, uint32_t limit)
96{
97 d->limit_0_15 = limit & 0xffff;
98 d->limit_16_19 = (limit >> 16) & 0xf;
99}
100
101void tss_initialize(tss_t *t)
102{
103 memsetb((uintptr_t) t, sizeof(struct tss), 0);
104}
105
106static void trap(void)
107{
108}
109
110void traps_init(void)
111{
112 index_t i;
113
114 for (i = 0; i < IDT_ITEMS; i++) {
115 traps[i].vector = i;
116
117 if (i == VECTOR_SYSCALL)
118 traps[i].flags = 3;
119 else
120 traps[i].flags = 0;
121
122 traps[i].cs = XEN_CS;
123 traps[i].address = trap;
124 exc_register(i, "undef", (iroutine) null_interrupt);
125 }
126 traps[IDT_ITEMS].vector = 0;
127 traps[IDT_ITEMS].flags = 0;
128 traps[IDT_ITEMS].cs = 0;
129 traps[IDT_ITEMS].address = NULL;
130
131 exc_register(13, "gp_fault", (iroutine) gp_fault);
132 exc_register( 7, "nm_fault", (iroutine) nm_fault);
133 exc_register(12, "ss_fault", (iroutine) ss_fault);
134 exc_register(19, "simd_fp", (iroutine) simd_fp_exception);
135}
136
137
138/* Clean IOPL(12,13) and NT(14) flags in EFLAGS register */
139static void clean_IOPL_NT_flags(void)
140{
141// __asm__ volatile (
142// "pushfl\n"
143// "pop %%eax\n"
144// "and $0xffff8fff, %%eax\n"
145// "push %%eax\n"
146// "popfl\n"
147// : : : "eax"
148// );
149}
150
151/* Clean AM(18) flag in CR0 register */
152static void clean_AM_flag(void)
153{
154// __asm__ volatile (
155// "mov %%cr0, %%eax\n"
156// "and $0xfffbffff, %%eax\n"
157// "mov %%eax, %%cr0\n"
158// : : : "eax"
159// );
160}
161
162void pm_init(void)
163{
164 descriptor_t *gdt_p = (descriptor_t *) gdtr.base;
165
166// gdtr_load(&gdtr);
167
168 if (config.cpu_active == 1) {
169 traps_init();
170 xen_set_trap_table(traps);
171 /*
172 * NOTE: bootstrap CPU has statically allocated TSS, because
173 * the heap hasn't been initialized so far.
174 */
175 tss_p = &tss;
176 } else {
177 tss_p = (tss_t *) malloc(sizeof(tss_t), FRAME_ATOMIC);
178 if (!tss_p)
179 panic("could not allocate TSS\n");
180 }
181
182// tss_initialize(tss_p);
183
184 gdt_p[TSS_DES].access = AR_PRESENT | AR_TSS | DPL_KERNEL;
185 gdt_p[TSS_DES].special = 1;
186 gdt_p[TSS_DES].granularity = 0;
187
188 gdt_setbase(&gdt_p[TSS_DES], (uintptr_t) tss_p);
189 gdt_setlimit(&gdt_p[TSS_DES], TSS_BASIC_SIZE - 1);
190
191 /*
192 * As of this moment, the current CPU has its own GDT pointing
193 * to its own TSS. We just need to load the TR register.
194 */
195// tr_load(selector(TSS_DES));
196
197 clean_IOPL_NT_flags(); /* Disable I/O on nonprivileged levels and clear NT flag. */
198 clean_AM_flag(); /* Disable alignment check */
199}
200
201void set_tls_desc(uintptr_t tls)
202{
203 ptr_16_32_t cpugdtr;
204 descriptor_t *gdt_p;
205
206 gdtr_store(&cpugdtr);
207 gdt_p = (descriptor_t *) cpugdtr.base;
208 gdt_setbase(&gdt_p[TLS_DES], tls);
209 /* Reload gdt register to update GS in CPU */
210 gdtr_load(&cpugdtr);
211}
212
213/** @}
214 */
Note: See TracBrowser for help on using the repository browser.