Home | History | Annotate | Line # | Download | only in lib
realprot.S revision 1.6.78.2
      1 /*	$NetBSD: realprot.S,v 1.6.78.2 2009/05/04 08:11:19 yamt Exp $	*/
      2 
      3 /*-
      4  * Copyright (c) 2003 The NetBSD Foundation, Inc.
      5  * All rights reserved.
      6  *
      7  * This code is derived from software contributed to The NetBSD Foundation
      8  * by David Laight.
      9  *
     10  * Redistribution and use in source and binary forms, with or without
     11  * modification, are permitted provided that the following conditions
     12  * are met:
     13  * 1. Redistributions of source code must retain the above copyright
     14  *    notice, this list of conditions and the following disclaimer.
     15  * 2. Redistributions in binary form must reproduce the above copyright
     16  *    notice, this list of conditions and the following disclaimer in the
     17  *    documentation and/or other materials provided with the distribution.
     18  *
     19  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29  * POSSIBILITY OF SUCH DAMAGE.
     30  */
     31 
     32 /*
     33  * Loosely based on code from stand/lib/libcrt/bootsect/start_bootsect.S
     34  */
     35 
     36 #include <machine/asm.h>
     37 
     38 #define	CR0_PE		1
     39 
     40 	.text
     41 	.align  16
     42 gdt:
     43 	.word	0, 0
     44 	.byte	0, 0x00, 0x00, 0
     45 
     46 	/* kernel code segment */
     47 	.globl flatcodeseg
     48 flatcodeseg = . - gdt
     49 	.word	0xffff, 0
     50 	.byte	0, 0x9f, 0xcf, 0
     51 
     52 	/* kernel data segment */
     53 	.globl flatdataseg
     54 flatdataseg = . - gdt
     55 	.word	0xffff, 0
     56 	.byte	0, 0x93, 0xcf, 0
     57 
     58 	/* boot code segment, base will be patched */
     59 bootcodeseg = . - gdt
     60 	.word	0xffff, 0
     61 	.byte	0, 0x9e, 0x4f, 0
     62 
     63 	/* boot data segment, base will be patched */
     64 bootdataseg = . - gdt
     65 	.word	0xffff, 0
     66 	.byte	0, 0x92, 0xcf, 0
     67 
     68 	/* 16 bit real mode, base will be patched */
     69 bootrealseg = . - gdt
     70 	.word	0xffff, 0
     71 	.byte	0, 0x9e, 0x00, 0
     72 
     73 	/* limits (etc) for data segment in real mode */
     74 bootrealdata = . - gdt
     75 	.word	0xffff, 0
     76 	.byte	0, 0x92, 0x00, 0
     77 gdtlen = . - gdt
     78 
     79 	.align	16
     80 gdtarg:
     81 	.word	gdtlen-1		/* limit */
     82 	.long	0			/* physical addr, will be inserted */
     83 
     84 toreal:	.word	xreal			/* off:seg address for indirect jump */
     85 ourseg:	.word	0			/* real mode code and data segment */
     86 
     87 stkseg:	.word	0			/* real mode stack segment */
     88 stkdif:	.long	0			/* diff. between real and prot sp */
     89 
     90 	.global	gdt_fixup
     91 gdt_fixup:
     92 	.code16
     93 	push	%ax
     94 	push	%dx
     95 
     96 	xorl	%eax, %eax
     97 	mov	%cs, %ax
     98 	mov	%ax, ourseg
     99 	/* sort out stuff for %ss != %ds */
    100 	movw	%ss, %dx
    101 	movw	%dx, stkseg
    102 	subw	%ax, %dx
    103 	shll	$16, %edx
    104 	shrl	$12, %edx
    105 	movl	%edx, stkdif
    106 
    107 	/* fix up GDT entries for bootstrap */
    108 	mov	%ax, %dx
    109 	shll	$4, %eax
    110 	shr	$12, %dx
    111 
    112 #define FIXUP(gdt_index) \
    113 	movw	%ax, gdt+gdt_index+2; \
    114 	movb	%dl, gdt+gdt_index+4
    115 
    116 	FIXUP(bootcodeseg)
    117 	FIXUP(bootrealseg)
    118 	FIXUP(bootdataseg)
    119 
    120 	/* fix up GDT pointer */
    121 	addl	$gdt, %eax
    122 	movl	%eax, gdtarg+2
    123 
    124 	pop	%dx
    125 	pop	%ax
    126 	ret
    127 
    128 /*
    129  * real_to_prot()
    130  *
    131  * Switch CPU to 32bit protected mode to execute C.
    132  *
    133  * NB: Call with the 32bit calll instruction so that a 32 bit
    134  *     return address is pushed.
    135  *
    136  * All registers are preserved, %ss:%esp will point to the same
    137  * place as %ss:%sp did, although the actual value of %esp might
    138  * be changed.
    139  *
    140  * Interrupts are disabled while we are in 32bit mode to save us
    141  * having to setup a different IDT.  This code is only used during
    142  * the boot process and it doesn't use any interrupts.
    143  */
    144 ENTRY(real_to_prot)
    145 	.code16
    146 	pushl	%eax
    147 	cli
    148 
    149 	lgdt	%cs:gdtarg		/* Global descriptor table */
    150 
    151 	movl	%cr0, %eax
    152 	or	$CR0_PE, %ax
    153 	movl	%eax, %cr0 		/* Enter 'protected mode' */
    154 
    155 	ljmp	$bootcodeseg, $1f	/* Jump into a 32bit segment */
    156 1:
    157 
    158 	.code32
    159 	/*  Set all the segment registers to map the same area as the code */
    160 	mov	$bootdataseg, %eax
    161 	mov	%ax, %ds
    162 	mov	%ax, %es
    163 	mov	%ax, %ss
    164 	addl	stkdif, %esp		/* Allow for real %ss != %ds */
    165 
    166 	popl	%eax
    167 	ret
    168 
    169 /*
    170  * prot_to_real()
    171  *
    172  * Switch CPU back to 16bit real mode in order to call system bios functions.
    173  *
    174  * All registers are preserved, except that %sp may be changed so that
    175  * %ss:%sp points to the same memory.
    176  * Note that %ebp is preserved and will not reference the correct part
    177  * of the stack.
    178  *
    179  * Interrupts are enabled while in real mode.
    180  *
    181  * Based on the descripton in section 14.5 of the 80386 Programmer's
    182  * reference book.
    183  */
    184 /*
    185  * EPIA_HACK
    186  *
    187  * VIA C3 processors don't seem to correctly switch back to executing
    188  * 16 bit code after the switch to real mode and subsequent jump.
    189  *
    190  * It is speculated that the CPU is prefetching and decoding branch
    191  * targets and not invalidating this buffer on the long jump.
    192  *
    193  * The precise reason for this hack working is still unknown, but
    194  * it was determined experimentally on two theories:
    195  * 1) Flush the pipeline with NOPs
    196  * 2) call/ret after the return from prot_to_real seems to improve matters,
    197  *    perhaps by making more work for the branch prediction/prefetch logic.
    198  *
    199  * Neither of these individually are effective, but this combination is
    200  * determined experimentally to be sufficient.
    201  */
    202 ENTRY(prot_to_real)
    203 #ifdef EPIA_HACK
    204 	.code32
    205 	call prot_to_real_main
    206 	.code16
    207 	call epia_nops
    208 	retl
    209 
    210 prot_to_real_main:
    211 #endif
    212 	.code32
    213 	pushl	%eax
    214 
    215 	/*
    216 	 * Load the segment registers while still in protected mode.
    217 	 * Otherwise the control bits don't get changed.
    218 	 * The correct base addresses are loaded later.
    219 	 */
    220 	movw    $bootrealdata, %ax
    221 	movw    %ax, %ds
    222 	movw    %ax, %es
    223 	movw    %ax, %ss
    224 
    225 	/*
    226 	 * Load %cs with a segment that has the correct attributes for
    227 	 * 16bit operation.
    228 	 */
    229 	ljmp	$bootrealseg, $1f
    230 1:
    231 
    232 	.code16
    233 	movl	%cr0, %eax
    234 	and 	$~CR0_PE, %eax
    235 	movl	%eax, %cr0		/* Disable potected mode */
    236 
    237 	/* Jump far indirect to load real mode %cs */
    238 	ljmp	*%cs:toreal
    239 xreal:
    240 	/*
    241 	 * CPU is now in real mode, load the other segment registers
    242 	 * with their correct base addresses.
    243 	 */
    244 	mov	%cs, %ax
    245 	mov	%ax, %ds
    246 	mov	%ax, %es
    247 	/*
    248 	 * If stack was above 64k, 16bit %ss needs to be different from
    249 	 * 32bit %ss (and the other segment registers).
    250 	 */
    251 	mov	stkseg, %ax
    252 	mov	%ax, %ss
    253 	subl	stkdif, %esp
    254 
    255 	/* Check we are returning to an address below 64k */
    256 	push	%bp
    257 	movw	%sp, %bp
    258 	movw	2/*bp*/ + 4/*eax*/ + 2(%bp), %ax	/* high bits ret addr */
    259 	test	%ax, %ax
    260 	jne	1f
    261 	pop	%bp
    262 
    263 #ifdef EPIA_HACK
    264 	call epia_nops
    265 #endif
    266 
    267 	sti
    268 	popl	%eax
    269 	retl
    270 
    271 1:	movw	$3f, %si
    272 	call	message
    273 	movl	2/*bp*/ + 4/*eax*/(%bp), %eax		/*  return address */
    274 	call	dump_eax
    275 	int	$0x18
    276 2:	sti
    277 	hlt
    278 	jmp	2b
    279 3:	.asciz	"prot_to_real can't return to "
    280 
    281 	.global	dump_eax_buff
    282 dump_eax_buff:
    283 	. = . + 16
    284 
    285 #ifdef EPIA_HACK
    286 epia_nops:
    287 	.code16
    288 	nop
    289 	nop
    290 	nop
    291 	nop
    292 	nop
    293 	nop
    294 	ret
    295 #endif
    296 
    297 /* vtophys(void *)
    298  * convert boot time 'linear' address to a physical one
    299  */
    300 
    301 ENTRY(vtophys)
    302 	.code32
    303 	xorl	%eax, %eax
    304 	movw	ourseg, %ax
    305 	shll	$4, %eax
    306 	addl	4(%esp), %eax
    307 	ret
    308