# # Copyright (C) 2005 Ondrej Palkovsky # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions # are met: # # - Redistributions of source code must retain the above copyright # notice, this list of conditions and the following disclaimer. # - Redistributions in binary form must reproduce the above copyright # notice, this list of conditions and the following disclaimer in the # documentation and/or other materials provided with the distribution. # - The name of the author may not be used to endorse or promote products # derived from this software without specific prior written permission. # # THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR # IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES # OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. # IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, # INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT # NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, # DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY # THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT # (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF # THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. # #define __ASM__ #include #include #include #include #include #include #define START_STACK_64 0xffffffff80007c00 # # This is where we require any SPARTAN-kernel-compatible boot loader # to pass control in real mode. # # Protected mode tables are statically initialised during compile # time. So we can just load the respective table registers and # switch to protected mode. # #define START_STACK (BOOTSTRAP_OFFSET-0x400) .section K_TEXT_START, "ax" .code16 .global kernel_image_start kernel_image_start: cli xorw %ax,%ax movw %ax,%ds movw %ax,%es movw %ax,%ss # initialize stack segment register movl $(START_STACK), %esp # initialize stack pointer call memmap_arch_init movl $0x80000000, %eax cpuid cmp $0x80000000, %eax # any function > 80000000h? jbe no_long_mode movl $(AMD_CPUID_EXTENDED), %eax # Extended function code 80000001 cpuid bt $29, %edx # Test if long mode is supported. jnc no_long_mode # Load gdtr, idtr lgdt real_bootstrap_gdtr_boot movl %cr0,%eax orl $0x1,%eax movl %eax,%cr0 # switch to protected mode jmpl $gdtselector(KTEXT32_DES), $now_in_prot no_long_mode: 1: jmp 1b # Protected 32-bit. We want to reuse the code-seg descriptor, # the Default operand size must not be 1 when entering long mode .code32 now_in_prot: # Set up stack & data descriptors movw $gdtselector(KDATA_DES), %ax movw %ax, %ds movw %ax, %ss movb $0xd1, %al # enable A20 using the keyboard controller outb %al, $0x64 movb $0xdf, %al outb %al, $0x60 # Enable 64-bit page transaltion entries - CR4.PAE = 1. # Paging is not enabled until after long mode is enabled movl %cr4, %eax btsl $5, %eax movl %eax, %cr4 # Set up paging tables leal ptl_0, %eax movl %eax, %cr3 # Enable long mode movl $EFER_MSR_NUM, %ecx # EFER MSR number rdmsr # Read EFER btsl $AMD_LME_FLAG, %eax # Set LME=1 wrmsr # Write EFER # Enable paging to activate long mode (set CR0.PG=1) movl %cr0, %eax btsl $31, %eax movl %eax, %cr0 # At this point we are in compatibility mode jmpl $gdtselector(KTEXT_DES), $start64 .code64 start64: movq $(PA2KA(START_STACK)), %rsp # Copy kernel to higher physical memory movq $BOOTSTRAP_OFFSET, %rsi movq $BOOTSTRAP_OFFSET + BOOT_OFFSET, %rdi movq $_hardcoded_kernel_size, %rcx cld rep movsb call main_bsp # never returns 1: jmp 1b .section K_DATA_START, "aw", @progbits .align 4096 # Identical mapping of first 64MB and the same of -2GB -> 0 .global ptl_2 ptl_2: .quad 0x0 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x200000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x400000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x600000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x800000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0xa00000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0xc00000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0xe00000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x1000000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x1200000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x1400000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x1600000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x1800000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x1a00000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x1c00000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x1e00000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x2000000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x2200000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x2400000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x2600000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x2800000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x2a00000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x2c00000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x2e00000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x3000000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x3200000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x3400000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x3600000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x3800000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x3a00000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x3c00000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .quad 0x3e00000 | (PTL_WRITABLE | PTL_PRESENT | PTL_2MB_PAGE) .align 4096 .global ptl_1 ptl_1: .quad ptl_2 + (PTL_WRITABLE | PTL_PRESENT) .fill 509,8,0 .quad ptl_2 + (PTL_WRITABLE | PTL_PRESENT) .fill 1,8,0 .align 4096 .global ptl_0 ptl_0: .quad ptl_1 + (PTL_WRITABLE | PTL_PRESENT) .fill 510,8,0 .quad ptl_1 + (PTL_WRITABLE | PTL_PRESENT) .global real_bootstrap_gdtr_boot real_bootstrap_gdtr_boot: .word gdtselector(GDT_ITEMS) .long KA2PA(gdt)-BOOT_OFFSET