1/* 2 * linux/boot/head.S 3 * 4 * Copyright (C) 1991, 1992, 1993 Linus Torvalds 5 */ 6 7/* 8 * head.S contains the 32-bit startup code. 9 * 10 * NOTE!!! Startup happens at absolute address 0x00001000, which is also where 11 * the page directory will exist. The startup code will be overwritten by 12 * the page directory. [According to comments etc elsewhere on a compressed 13 * kernel it will end up at 0x1000 + 1Mb I hope so as I assume this. - AC] 14 * 15 * Page 0 is deliberately kept safe, since System Management Mode code in 16 * laptops may need to access the BIOS data stored there. This is also 17 * useful for future device drivers that either access the BIOS via VM86 18 * mode. 19 */ 20 21/* 22 * High loaded stuff by Hans Lermen & Werner Almesberger, Feb. 1996 23 */ 24 .code32 25 .text 26 27#include <linux/init.h> 28#include <linux/linkage.h> 29#include <asm/segment.h> 30#include <asm/boot.h> 31#include <asm/msr.h> 32#include <asm/processor-flags.h> 33#include <asm/asm-offsets.h> 34#include <asm/bootparam.h> 35 36/* 37 * Locally defined symbols should be marked hidden: 38 */ 39 .hidden _bss 40 .hidden _ebss 41 .hidden _got 42 .hidden _egot 43 44 __HEAD 45 .code32 46ENTRY(startup_32) 47 /* 48 * 32bit entry is 0 and it is ABI so immutable! 49 * If we come here directly from a bootloader, 50 * kernel(text+data+bss+brk) ramdisk, zero_page, command line 51 * all need to be under the 4G limit. 52 */ 53 cld 54 /* 55 * Test KEEP_SEGMENTS flag to see if the bootloader is asking 56 * us to not reload segments 57 */ 58 testb $KEEP_SEGMENTS, BP_loadflags(%esi) 59 jnz 1f 60 61 cli 62 movl $(__BOOT_DS), %eax 63 movl %eax, %ds 64 movl %eax, %es 65 movl %eax, %ss 661: 67 68/* 69 * Calculate the delta between where we were compiled to run 70 * at and where we were actually loaded at. This can only be done 71 * with a short local call on x86. Nothing else will tell us what 72 * address we are running at. The reserved chunk of the real-mode 73 * data at 0x1e4 (defined as a scratch field) are used as the stack 74 * for this calculation. Only 4 bytes are needed. 75 */ 76 leal (BP_scratch+4)(%esi), %esp 77 call 1f 781: popl %ebp 79 subl $1b, %ebp 80 81/* setup a stack and make sure cpu supports long mode. */ 82 movl $boot_stack_end, %eax 83 addl %ebp, %eax 84 movl %eax, %esp 85 86 call verify_cpu 87 testl %eax, %eax 88 jnz no_longmode 89 90/* 91 * Compute the delta between where we were compiled to run at 92 * and where the code will actually run at. 93 * 94 * %ebp contains the address we are loaded at by the boot loader and %ebx 95 * contains the address where we should move the kernel image temporarily 96 * for safe in-place decompression. 97 */ 98 99#ifdef CONFIG_RELOCATABLE 100 movl %ebp, %ebx 101 movl BP_kernel_alignment(%esi), %eax 102 decl %eax 103 addl %eax, %ebx 104 notl %eax 105 andl %eax, %ebx 106 cmpl $LOAD_PHYSICAL_ADDR, %ebx 107 jge 1f 108#endif 109 movl $LOAD_PHYSICAL_ADDR, %ebx 1101: 111 112 /* Target address to relocate to for decompression */ 113 movl BP_init_size(%esi), %eax 114 subl $_end, %eax 115 addl %eax, %ebx 116 117/* 118 * Prepare for entering 64 bit mode 119 */ 120 121 /* Load new GDT with the 64bit segments using 32bit descriptor */ 122 addl %ebp, gdt+2(%ebp) 123 lgdt gdt(%ebp) 124 125 /* Enable PAE mode */ 126 movl %cr4, %eax 127 orl $X86_CR4_PAE, %eax 128 movl %eax, %cr4 129 130 /* 131 * Build early 4G boot pagetable 132 */ 133 /* Initialize Page tables to 0 */ 134 leal pgtable(%ebx), %edi 135 xorl %eax, %eax 136 movl $(BOOT_INIT_PGT_SIZE/4), %ecx 137 rep stosl 138 139 /* Build Level 4 */ 140 leal pgtable + 0(%ebx), %edi 141 leal 0x1007 (%edi), %eax 142 movl %eax, 0(%edi) 143 144 /* Build Level 3 */ 145 leal pgtable + 0x1000(%ebx), %edi 146 leal 0x1007(%edi), %eax 147 movl $4, %ecx 1481: movl %eax, 0x00(%edi) 149 addl $0x00001000, %eax 150 addl $8, %edi 151 decl %ecx 152 jnz 1b 153 154 /* Build Level 2 */ 155 leal pgtable + 0x2000(%ebx), %edi 156 movl $0x00000183, %eax 157 movl $2048, %ecx 1581: movl %eax, 0(%edi) 159 addl $0x00200000, %eax 160 addl $8, %edi 161 decl %ecx 162 jnz 1b 163 164 /* Enable the boot page tables */ 165 leal pgtable(%ebx), %eax 166 movl %eax, %cr3 167 168 /* Enable Long mode in EFER (Extended Feature Enable Register) */ 169 movl $MSR_EFER, %ecx 170 rdmsr 171 btsl $_EFER_LME, %eax 172 wrmsr 173 174 /* After gdt is loaded */ 175 xorl %eax, %eax 176 lldt %ax 177 movl $__BOOT_TSS, %eax 178 ltr %ax 179 180 /* 181 * Setup for the jump to 64bit mode 182 * 183 * When the jump is performend we will be in long mode but 184 * in 32bit compatibility mode with EFER.LME = 1, CS.L = 0, CS.D = 1 185 * (and in turn EFER.LMA = 1). To jump into 64bit mode we use 186 * the new gdt/idt that has __KERNEL_CS with CS.L = 1. 187 * We place all of the values on our mini stack so lret can 188 * used to perform that far jump. 189 */ 190 pushl $__KERNEL_CS 191 leal startup_64(%ebp), %eax 192#ifdef CONFIG_EFI_MIXED 193 movl efi32_config(%ebp), %ebx 194 cmp $0, %ebx 195 jz 1f 196 leal handover_entry(%ebp), %eax 1971: 198#endif 199 pushl %eax 200 201 /* Enter paged protected Mode, activating Long Mode */ 202 movl $(X86_CR0_PG | X86_CR0_PE), %eax /* Enable Paging and Protected mode */ 203 movl %eax, %cr0 204 205 /* Jump from 32bit compatibility mode into 64bit mode. */ 206 lret 207ENDPROC(startup_32) 208 209#ifdef CONFIG_EFI_MIXED 210 .org 0x190 211ENTRY(efi32_stub_entry) 212 add $0x4, %esp /* Discard return address */ 213 popl %ecx 214 popl %edx 215 popl %esi 216 217 leal (BP_scratch+4)(%esi), %esp 218 call 1f 2191: pop %ebp 220 subl $1b, %ebp 221 222 movl %ecx, efi32_config(%ebp) 223 movl %edx, efi32_config+8(%ebp) 224 sgdtl efi32_boot_gdt(%ebp) 225 226 leal efi32_config(%ebp), %eax 227 movl %eax, efi_config(%ebp) 228 229 jmp startup_32 230ENDPROC(efi32_stub_entry) 231#endif 232 233 .code64 234 .org 0x200 235ENTRY(startup_64) 236 /* 237 * 64bit entry is 0x200 and it is ABI so immutable! 238 * We come here either from startup_32 or directly from a 239 * 64bit bootloader. 240 * If we come here from a bootloader, kernel(text+data+bss+brk), 241 * ramdisk, zero_page, command line could be above 4G. 242 * We depend on an identity mapped page table being provided 243 * that maps our entire kernel(text+data+bss+brk), zero page 244 * and command line. 245 */ 246#ifdef CONFIG_EFI_STUB 247 /* 248 * The entry point for the PE/COFF executable is efi_pe_entry, so 249 * only legacy boot loaders will execute this jmp. 250 */ 251 jmp preferred_addr 252 253ENTRY(efi_pe_entry) 254 movq %rcx, efi64_config(%rip) /* Handle */ 255 movq %rdx, efi64_config+8(%rip) /* EFI System table pointer */ 256 257 leaq efi64_config(%rip), %rax 258 movq %rax, efi_config(%rip) 259 260 call 1f 2611: popq %rbp 262 subq $1b, %rbp 263 264 /* 265 * Relocate efi_config->call(). 266 */ 267 addq %rbp, efi64_config+40(%rip) 268 269 movq %rax, %rdi 270 call make_boot_params 271 cmpq $0,%rax 272 je fail 273 mov %rax, %rsi 274 leaq startup_32(%rip), %rax 275 movl %eax, BP_code32_start(%rsi) 276 jmp 2f /* Skip the relocation */ 277 278handover_entry: 279 call 1f 2801: popq %rbp 281 subq $1b, %rbp 282 283 /* 284 * Relocate efi_config->call(). 285 */ 286 movq efi_config(%rip), %rax 287 addq %rbp, 40(%rax) 2882: 289 movq efi_config(%rip), %rdi 290 call efi_main 291 movq %rax,%rsi 292 cmpq $0,%rax 293 jne 2f 294fail: 295 /* EFI init failed, so hang. */ 296 hlt 297 jmp fail 2982: 299 movl BP_code32_start(%esi), %eax 300 leaq preferred_addr(%rax), %rax 301 jmp *%rax 302 303preferred_addr: 304#endif 305 306 /* Setup data segments. */ 307 xorl %eax, %eax 308 movl %eax, %ds 309 movl %eax, %es 310 movl %eax, %ss 311 movl %eax, %fs 312 movl %eax, %gs 313 314 /* 315 * Compute the decompressed kernel start address. It is where 316 * we were loaded at aligned to a 2M boundary. %rbp contains the 317 * decompressed kernel start address. 318 * 319 * If it is a relocatable kernel then decompress and run the kernel 320 * from load address aligned to 2MB addr, otherwise decompress and 321 * run the kernel from LOAD_PHYSICAL_ADDR 322 * 323 * We cannot rely on the calculation done in 32-bit mode, since we 324 * may have been invoked via the 64-bit entry point. 325 */ 326 327 /* Start with the delta to where the kernel will run at. */ 328#ifdef CONFIG_RELOCATABLE 329 leaq startup_32(%rip) /* - $startup_32 */, %rbp 330 movl BP_kernel_alignment(%rsi), %eax 331 decl %eax 332 addq %rax, %rbp 333 notq %rax 334 andq %rax, %rbp 335 cmpq $LOAD_PHYSICAL_ADDR, %rbp 336 jge 1f 337#endif 338 movq $LOAD_PHYSICAL_ADDR, %rbp 3391: 340 341 /* Target address to relocate to for decompression */ 342 movl BP_init_size(%rsi), %ebx 343 subl $_end, %ebx 344 addq %rbp, %rbx 345 346 /* Set up the stack */ 347 leaq boot_stack_end(%rbx), %rsp 348 349 /* Zero EFLAGS */ 350 pushq $0 351 popfq 352 353/* 354 * Copy the compressed kernel to the end of our buffer 355 * where decompression in place becomes safe. 356 */ 357 pushq %rsi 358 leaq (_bss-8)(%rip), %rsi 359 leaq (_bss-8)(%rbx), %rdi 360 movq $_bss /* - $startup_32 */, %rcx 361 shrq $3, %rcx 362 std 363 rep movsq 364 cld 365 popq %rsi 366 367/* 368 * Jump to the relocated address. 369 */ 370 leaq relocated(%rbx), %rax 371 jmp *%rax 372 373#ifdef CONFIG_EFI_STUB 374 .org 0x390 375ENTRY(efi64_stub_entry) 376 movq %rdi, efi64_config(%rip) /* Handle */ 377 movq %rsi, efi64_config+8(%rip) /* EFI System table pointer */ 378 379 leaq efi64_config(%rip), %rax 380 movq %rax, efi_config(%rip) 381 382 movq %rdx, %rsi 383 jmp handover_entry 384ENDPROC(efi64_stub_entry) 385#endif 386 387 .text 388relocated: 389 390/* 391 * Clear BSS (stack is currently empty) 392 */ 393 xorl %eax, %eax 394 leaq _bss(%rip), %rdi 395 leaq _ebss(%rip), %rcx 396 subq %rdi, %rcx 397 shrq $3, %rcx 398 rep stosq 399 400/* 401 * Adjust our own GOT 402 */ 403 leaq _got(%rip), %rdx 404 leaq _egot(%rip), %rcx 4051: 406 cmpq %rcx, %rdx 407 jae 2f 408 addq %rbx, (%rdx) 409 addq $8, %rdx 410 jmp 1b 4112: 412 413/* 414 * Do the extraction, and jump to the new kernel.. 415 */ 416 pushq %rsi /* Save the real mode argument */ 417 movq %rsi, %rdi /* real mode address */ 418 leaq boot_heap(%rip), %rsi /* malloc area for uncompression */ 419 leaq input_data(%rip), %rdx /* input_data */ 420 movl $z_input_len, %ecx /* input_len */ 421 movq %rbp, %r8 /* output target address */ 422 movq $z_output_len, %r9 /* decompressed length, end of relocs */ 423 call extract_kernel /* returns kernel location in %rax */ 424 popq %rsi 425 426/* 427 * Jump to the decompressed kernel. 428 */ 429 jmp *%rax 430 431 .code32 432no_longmode: 433 /* This isn't an x86-64 CPU so hang */ 4341: 435 hlt 436 jmp 1b 437 438#include "../../kernel/verify_cpu.S" 439 440 .data 441gdt: 442 .word gdt_end - gdt 443 .long gdt 444 .word 0 445 .quad 0x0000000000000000 /* NULL descriptor */ 446 .quad 0x00af9a000000ffff /* __KERNEL_CS */ 447 .quad 0x00cf92000000ffff /* __KERNEL_DS */ 448 .quad 0x0080890000000000 /* TS descriptor */ 449 .quad 0x0000000000000000 /* TS continued */ 450gdt_end: 451 452#ifdef CONFIG_EFI_STUB 453efi_config: 454 .quad 0 455 456#ifdef CONFIG_EFI_MIXED 457 .global efi32_config 458efi32_config: 459 .fill 5,8,0 460 .quad efi64_thunk 461 .byte 0 462#endif 463 464 .global efi64_config 465efi64_config: 466 .fill 5,8,0 467 .quad efi_call 468 .byte 1 469#endif /* CONFIG_EFI_STUB */ 470 471/* 472 * Stack and heap for uncompression 473 */ 474 .bss 475 .balign 4 476boot_heap: 477 .fill BOOT_HEAP_SIZE, 1, 0 478boot_stack: 479 .fill BOOT_STACK_SIZE, 1, 0 480boot_stack_end: 481 482/* 483 * Space for page tables (not in .bss so not zeroed) 484 */ 485 .section ".pgtable","a",@nobits 486 .balign 4096 487pgtable: 488 .fill BOOT_PGT_SIZE, 1, 0 489