3 * Copyright (C) 1991, 1992 Linus Torvalds
5 * Enhanced CPU detection and feature setting code by Mike Jagdis
6 * and Martin Mares, November 1997.
10 #include <linux/threads.h>
11 #include <linux/init.h>
12 #include <linux/linkage.h>
13 #include <asm/segment.h>
14 #include <asm/page_types.h>
15 #include <asm/pgtable_types.h>
16 #include <asm/cache.h>
17 #include <asm/thread_info.h>
18 #include <asm/asm-offsets.h>
19 #include <asm/setup.h>
20 #include <asm/processor-flags.h>
21 #include <asm/percpu.h>
23 /* Physical address */
24 #define pa(X) ((X) - __PAGE_OFFSET)
27 * References to members of the new_cpu_data structure.
30 #define X86 new_cpu_data+CPUINFO_x86
31 #define X86_VENDOR new_cpu_data+CPUINFO_x86_vendor
32 #define X86_MODEL new_cpu_data+CPUINFO_x86_model
33 #define X86_MASK new_cpu_data+CPUINFO_x86_mask
34 #define X86_HARD_MATH new_cpu_data+CPUINFO_hard_math
35 #define X86_CPUID new_cpu_data+CPUINFO_cpuid_level
36 #define X86_CAPABILITY new_cpu_data+CPUINFO_x86_capability
37 #define X86_VENDOR_ID new_cpu_data+CPUINFO_x86_vendor_id
40 * This is how much memory in addition to the memory covered up to
41 * and including _end we need mapped initially.
43 * (KERNEL_IMAGE_SIZE/4096) / 1024 pages (worst case, non PAE)
44 * (KERNEL_IMAGE_SIZE/4096) / 512 + 4 pages (worst case for PAE)
46 * Modulo rounding, each megabyte assigned here requires a kilobyte of
47 * memory, which is currently unreclaimed.
49 * This should be a multiple of a page.
51 * KERNEL_IMAGE_SIZE should be greater than pa(_end)
52 * and small than max_low_pfn, otherwise will waste some page table entries
56 #define PAGE_TABLE_SIZE(pages) (((pages) / PTRS_PER_PMD) + PTRS_PER_PGD)
58 #define PAGE_TABLE_SIZE(pages) ((pages) / PTRS_PER_PGD)
61 /* Enough space to fit pagetables for the low memory linear map */
62 MAPPING_BEYOND_END = \
63 PAGE_TABLE_SIZE(((1<<32) - __PAGE_OFFSET) >> PAGE_SHIFT) << PAGE_SHIFT
66 * Worst-case size of the kernel mapping we need to make:
67 * the worst-case size of the kernel itself, plus the extra we need
68 * to map for the linear map.
70 KERNEL_PAGES = (KERNEL_IMAGE_SIZE + MAPPING_BEYOND_END)>>PAGE_SHIFT
72 INIT_MAP_SIZE = PAGE_TABLE_SIZE(KERNEL_PAGES) * PAGE_SIZE_asm
73 RESERVE_BRK(pagetables, INIT_MAP_SIZE)
76 * 32-bit kernel entrypoint; only used by the boot CPU. On entry,
77 * %esi points to the real-mode code as a 32-bit pointer.
78 * CS and DS must be 4 GB flat segments, but we don't depend on
79 * any particular GDT layout, because we load our own as soon as we
82 .section .text.head,"ax",@progbits
84 /* test KEEP_SEGMENTS flag to see if the bootloader is asking
85 us to not reload segments */
86 testb $(1<<6), BP_loadflags(%esi)
90 * Set segments to known values.
92 lgdt pa(boot_gdt_descr)
93 movl $(__BOOT_DS),%eax
101 * Clear BSS first so that there are no surprises...
105 movl $pa(__bss_start),%edi
106 movl $pa(__bss_stop),%ecx
111 * Copy bootup parameters out of the way.
112 * Note: %esi still has the pointer to the real-mode data.
113 * With the kexec as boot loader, parameter segment might be loaded beyond
114 * kernel image and might not even be addressable by early boot page tables.
115 * (kexec on panic case). Hence copy out the parameters before initializing
118 movl $pa(boot_params),%edi
119 movl $(PARAM_SIZE/4),%ecx
123 movl pa(boot_params) + NEW_CL_POINTER,%esi
125 jz 1f # No comand line
126 movl $pa(boot_command_line),%edi
127 movl $(COMMAND_LINE_SIZE/4),%ecx
132 #ifdef CONFIG_PARAVIRT
133 /* This is can only trip for a broken bootloader... */
134 cmpw $0x207, pa(boot_params + BP_version)
137 /* Paravirt-compatible boot parameters. Look to see what architecture
138 we're booting under. */
139 movl pa(boot_params + BP_hardware_subarch), %eax
140 cmpl $num_subarch_entries, %eax
143 movl pa(subarch_entries)(,%eax,4), %eax
144 subl $__PAGE_OFFSET, %eax
150 /* Unknown implementation; there's really
151 nothing we can do at this point. */
157 .long default_entry /* normal x86/PC */
158 .long lguest_entry /* lguest hypervisor */
159 .long xen_entry /* Xen hypervisor */
160 num_subarch_entries = (. - subarch_entries) / 4
162 #endif /* CONFIG_PARAVIRT */
165 * Initialize page tables. This creates a PDE and a set of page
166 * tables, which are located immediately beyond __brk_base. The variable
167 * _brk_end is set up to point to the first "safe" location.
168 * Mappings are created both at virtual address 0 (identity mapping)
169 * and PAGE_OFFSET for up to _end.
171 * Note that the stack is not yet set up!
174 #ifdef CONFIG_X86_PAE
177 * In PAE mode swapper_pg_dir is statically defined to contain enough
178 * entries to cover the VMSPLIT option (that is the top 1, 2 or 3
179 * entries). The identity mapping is handled by pointing two PGD
180 * entries to the first kernel PMD.
182 * Note the upper half of each PMD or PTE are always zero at
186 #define KPMDS (((-__PAGE_OFFSET) >> 30) & 3) /* Number of kernel PMDs */
188 xorl %ebx,%ebx /* %ebx is kept at zero */
190 movl $pa(__brk_base), %edi
191 movl $pa(swapper_pg_pmd), %edx
192 movl $PTE_IDENT_ATTR, %eax
194 leal PDE_IDENT_ATTR(%edi),%ecx /* Create PMD entry */
195 movl %ecx,(%edx) /* Store PMD entry */
196 /* Upper half already zero */
208 * End condition: we must map up to the end + MAPPING_BEYOND_END.
210 movl $pa(_end) + MAPPING_BEYOND_END + PTE_IDENT_ATTR, %ebp
214 addl $__PAGE_OFFSET, %edi
215 movl %edi, pa(_brk_end)
217 movl %eax, pa(max_pfn_mapped)
219 /* Do early initialization of the fixmap area */
220 movl $pa(swapper_pg_fixmap)+PDE_IDENT_ATTR,%eax
221 movl %eax,pa(swapper_pg_pmd+0x1000*KPMDS-8)
224 page_pde_offset = (__PAGE_OFFSET >> 20);
226 movl $pa(__brk_base), %edi
227 movl $pa(swapper_pg_dir), %edx
228 movl $PTE_IDENT_ATTR, %eax
230 leal PDE_IDENT_ATTR(%edi),%ecx /* Create PDE entry */
231 movl %ecx,(%edx) /* Store identity PDE entry */
232 movl %ecx,page_pde_offset(%edx) /* Store kernel PDE entry */
240 * End condition: we must map up to the end + MAPPING_BEYOND_END.
242 movl $pa(_end) + MAPPING_BEYOND_END + PTE_IDENT_ATTR, %ebp
245 addl $__PAGE_OFFSET, %edi
246 movl %edi, pa(_brk_end)
248 movl %eax, pa(max_pfn_mapped)
250 /* Do early initialization of the fixmap area */
251 movl $pa(swapper_pg_fixmap)+PDE_IDENT_ATTR,%eax
252 movl %eax,pa(swapper_pg_dir+0xffc)
256 * Non-boot CPU entry point; entered from trampoline.S
257 * We can't lgdt here, because lgdt itself uses a data segment, but
258 * we know the trampoline has already loaded the boot_gdt for us.
260 * If cpu hotplug is not supported then this code can go in init section
261 * which will be freed later
267 ENTRY(startup_32_smp)
269 movl $(__BOOT_DS),%eax
274 #endif /* CONFIG_SMP */
278 * New page tables may be in 4Mbyte page mode and may
279 * be using the global pages.
281 * NOTE! If we are on a 486 we may have no cr4 at all!
282 * So we do not try to touch it unless we really have
283 * some bits in it to set. This won't work if the BSP
284 * implements cr4 but this AP does not -- very unlikely
285 * but be warned! The same applies to the pse feature
286 * if not equally supported. --macro
288 * NOTE! We have to correct for the fact that we're
289 * not yet offset PAGE_OFFSET..
291 #define cr4_bits pa(mmu_cr4_features)
295 movl %cr4,%eax # Turn on paging options (PSE,PAE,..)
299 btl $5, %eax # check if PAE is enabled
302 /* Check if extended functions are implemented */
303 movl $0x80000000, %eax
305 cmpl $0x80000000, %eax
307 mov $0x80000001, %eax
309 /* Execute Disable bit supported? */
313 /* Setup EFER (Extended Feature Enable Register) */
314 movl $0xc0000080, %ecx
318 /* Make changes effective */
326 movl $pa(swapper_pg_dir),%eax
327 movl %eax,%cr3 /* set the page table pointer.. */
330 movl %eax,%cr0 /* ..and set paging (PG) bit */
331 ljmp $__BOOT_CS,$1f /* Clear prefetch and normalize %eip */
333 /* Set up the stack pointer */
337 * Initialize eflags. Some BIOS's leave bits like NT set. This would
338 * confuse the debugger if this code is traced.
339 * XXX - best to initialize before switching to protected mode.
346 jz 1f /* Initial CPU cleans BSS */
349 #endif /* CONFIG_SMP */
352 * start system 32-bit setup. We need to re-do some of the things done
353 * in 16-bit mode for the "real" operations.
359 movl $-1,X86_CPUID # -1 for no CPUID initially
361 /* check if it is 486 or 386. */
363 * XXX - this does a lot of unnecessary setup. Alignment checks don't
364 * apply at our cpl of 0 and the stack ought to be aligned already, and
365 * we don't need to preserve eflags.
368 movb $3,X86 # at least 386
370 popl %eax # get EFLAGS
371 movl %eax,%ecx # save original EFLAGS
372 xorl $0x240000,%eax # flip AC and ID bits in EFLAGS
373 pushl %eax # copy to EFLAGS
375 pushfl # get new EFLAGS
376 popl %eax # put it in eax
377 xorl %ecx,%eax # change in flags
378 pushl %ecx # restore original EFLAGS
380 testl $0x40000,%eax # check if AC bit changed
383 movb $4,X86 # at least 486
384 testl $0x200000,%eax # check if ID bit changed
387 /* get vendor info */
388 xorl %eax,%eax # call CPUID with 0 -> return vendor ID
390 movl %eax,X86_CPUID # save CPUID level
391 movl %ebx,X86_VENDOR_ID # lo 4 chars
392 movl %edx,X86_VENDOR_ID+4 # next 4 chars
393 movl %ecx,X86_VENDOR_ID+8 # last 4 chars
395 orl %eax,%eax # do we have processor info as well?
398 movl $1,%eax # Use the CPUID instruction to get CPU type
400 movb %al,%cl # save reg for future use
401 andb $0x0f,%ah # mask processor family
403 andb $0xf0,%al # mask model
406 andb $0x0f,%cl # mask mask revision
408 movl %edx,X86_CAPABILITY
410 is486: movl $0x50022,%ecx # set AM, WP, NE and MP
413 is386: movl $2,%ecx # set MP
415 andl $0x80000011,%eax # Save PG,PE,ET
422 ljmp $(__KERNEL_CS),$1f
423 1: movl $(__KERNEL_DS),%eax # reload all the segment registers
424 movl %eax,%ss # after changing gdt.
426 movl $(__USER_DS),%eax # DS/ES contains default USER segment
430 movl $(__KERNEL_PERCPU), %eax
431 movl %eax,%fs # set this cpu's percpu
433 #ifdef CONFIG_CC_STACKPROTECTOR
435 * The linker can't handle this by relocation. Manually set
436 * base address in stack canary segment descriptor.
440 movl $per_cpu__gdt_page,%eax
441 movl $per_cpu__stack_canary,%ecx
442 movw %cx, 8 * GDT_ENTRY_STACK_CANARY + 2(%eax)
444 movb %cl, 8 * GDT_ENTRY_STACK_CANARY + 4(%eax)
445 movb %ch, 8 * GDT_ENTRY_STACK_CANARY + 7(%eax)
448 movl $(__KERNEL_STACK_CANARY),%eax
451 xorl %eax,%eax # Clear LDT
454 cld # gcc2 wants the direction flag cleared at all times
455 pushl $0 # fake return address for unwinder
459 cmpb $0,%cl # the first CPU calls start_kernel
461 movl (stack_start), %esp
463 #endif /* CONFIG_SMP */
467 * We depend on ET to be correct. This checks for 287/387.
470 movb $0,X86_HARD_MATH
476 movl %cr0,%eax /* no coprocessor: have to set bits */
477 xorl $4,%eax /* set EM */
481 1: movb $1,X86_HARD_MATH
482 .byte 0xDB,0xE4 /* fsetpm for 287, ignored by 387 */
488 * sets up a idt with 256 entries pointing to
489 * ignore_int, interrupt gates. It doesn't actually load
490 * idt - that can be done only after paging has been enabled
491 * and the kernel moved to PAGE_OFFSET. Interrupts
492 * are enabled elsewhere, when we can be relatively
493 * sure everything is ok.
495 * Warning: %esi is live across this function.
499 movl $(__KERNEL_CS << 16),%eax
500 movw %dx,%ax /* selector = 0x0010 = cs */
501 movw $0x8E00,%dx /* interrupt gate - dpl=0, present */
512 .macro set_early_handler handler,trapno
514 movl $(__KERNEL_CS << 16),%eax
516 movw $0x8E00,%dx /* interrupt gate - dpl=0, present */
518 movl %eax,8*\trapno(%edi)
519 movl %edx,8*\trapno+4(%edi)
522 set_early_handler handler=early_divide_err,trapno=0
523 set_early_handler handler=early_illegal_opcode,trapno=6
524 set_early_handler handler=early_protection_fault,trapno=13
525 set_early_handler handler=early_page_fault,trapno=14
531 pushl $0 /* fake errcode */
534 early_illegal_opcode:
536 pushl $0 /* fake errcode */
539 early_protection_fault:
551 movl $(__KERNEL_DS),%eax
554 cmpl $2,early_recursion_flag
556 incl early_recursion_flag
559 pushl %edx /* trapno */
568 /* This is the default interrupt "handler" :-) */
578 movl $(__KERNEL_DS),%eax
581 cmpl $2,early_recursion_flag
583 incl early_recursion_flag
605 .long i386_start_kernel
610 .section ".bss.page_aligned","wa"
612 #ifdef CONFIG_X86_PAE
616 ENTRY(swapper_pg_dir)
621 ENTRY(empty_zero_page)
625 * This starts the data section.
627 #ifdef CONFIG_X86_PAE
628 .section ".data.page_aligned","wa"
629 /* Page-aligned for the benefit of paravirt? */
631 ENTRY(swapper_pg_dir)
632 .long pa(swapper_pg_pmd+PGD_IDENT_ATTR),0 /* low identity map */
634 .long pa(swapper_pg_pmd+PGD_IDENT_ATTR),0
635 .long pa(swapper_pg_pmd+PGD_IDENT_ATTR+0x1000),0
636 .long pa(swapper_pg_pmd+PGD_IDENT_ATTR+0x2000),0
639 .long pa(swapper_pg_pmd+PGD_IDENT_ATTR),0
640 .long pa(swapper_pg_pmd+PGD_IDENT_ATTR+0x1000),0
644 .long pa(swapper_pg_pmd+PGD_IDENT_ATTR),0
646 # error "Kernel PMDs should be 1, 2 or 3"
648 .align PAGE_SIZE_asm /* needs to be page-sized too */
653 .long init_thread_union+THREAD_SIZE
658 early_recursion_flag:
662 .asciz "Unknown interrupt or fault at: %p %p %p\n"
666 .ascii "BUG: Int %d: CR2 %p\n"
668 .ascii " EDI %p ESI %p EBP %p ESP %p\n"
669 .ascii " EBX %p EDX %p ECX %p EAX %p\n"
671 .ascii " err %p EIP %p CS %p flg %p\n"
672 .ascii "Stack: %p %p %p %p %p %p %p %p\n"
673 .ascii " %p %p %p %p %p %p %p %p\n"
674 .asciz " %p %p %p %p %p %p %p %p\n"
676 #include "../../x86/xen/xen-head.S"
679 * The IDT and GDT 'descriptors' are a strange 48-bit object
680 * only used by the lidt and lgdt instructions. They are not
681 * like usual segment descriptors - they consist of a 16-bit
682 * segment size, and 32-bit linear address value:
685 .globl boot_gdt_descr
689 # early boot GDT descriptor (must use 1:1 address mapping)
690 .word 0 # 32 bit align gdt_desc.address
693 .long boot_gdt - __PAGE_OFFSET
695 .word 0 # 32-bit align idt_desc.address
697 .word IDT_ENTRIES*8-1 # idt contains 256 entries
700 # boot GDT descriptor (later on used by CPU#0):
701 .word 0 # 32 bit align gdt_desc.address
702 ENTRY(early_gdt_descr)
703 .word GDT_ENTRIES*8-1
704 .long per_cpu__gdt_page /* Overwritten for secondary CPUs */
707 * The boot_gdt must mirror the equivalent in setup.S and is
708 * used only for booting.
710 .align L1_CACHE_BYTES
712 .fill GDT_ENTRY_BOOT_CS,8,0
713 .quad 0x00cf9a000000ffff /* kernel 4GB code at 0x00000000 */
714 .quad 0x00cf92000000ffff /* kernel 4GB data at 0x00000000 */