Subversion Repositories HelenOS

Rev

Rev 1816 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed

Rev 1816 Rev 1829
1
/*
1
/*
2
 * Copyright (C) 2001-2004 Jakub Jermar
2
 * Copyright (C) 2001-2004 Jakub Jermar
3
 * All rights reserved.
3
 * All rights reserved.
4
 *
4
 *
5
 * Redistribution and use in source and binary forms, with or without
5
 * Redistribution and use in source and binary forms, with or without
6
 * modification, are permitted provided that the following conditions
6
 * modification, are permitted provided that the following conditions
7
 * are met:
7
 * are met:
8
 *
8
 *
9
 * - Redistributions of source code must retain the above copyright
9
 * - Redistributions of source code must retain the above copyright
10
 *   notice, this list of conditions and the following disclaimer.
10
 *   notice, this list of conditions and the following disclaimer.
11
 * - Redistributions in binary form must reproduce the above copyright
11
 * - Redistributions in binary form must reproduce the above copyright
12
 *   notice, this list of conditions and the following disclaimer in the
12
 *   notice, this list of conditions and the following disclaimer in the
13
 *   documentation and/or other materials provided with the distribution.
13
 *   documentation and/or other materials provided with the distribution.
14
 * - The name of the author may not be used to endorse or promote products
14
 * - The name of the author may not be used to endorse or promote products
15
 *   derived from this software without specific prior written permission.
15
 *   derived from this software without specific prior written permission.
16
 *
16
 *
17
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27
 */
27
 */
28
 
28
 
29
/** @addtogroup xen32  
29
/** @addtogroup xen32  
30
 * @{
30
 * @{
31
 */
31
 */
32
/** @file
32
/** @file
33
 */
33
 */
34
 
34
 
35
#include <arch/pm.h>
35
#include <arch/pm.h>
36
#include <config.h>
36
#include <config.h>
37
#include <arch/types.h>
37
#include <arch/types.h>
38
#include <typedefs.h>
38
#include <typedefs.h>
39
#include <arch/interrupt.h>
39
#include <arch/interrupt.h>
40
#include <arch/asm.h>
40
#include <arch/asm.h>
41
#include <arch/context.h>
41
#include <arch/context.h>
42
#include <panic.h>
42
#include <panic.h>
43
#include <arch/mm/page.h>
43
#include <arch/mm/page.h>
44
#include <mm/slab.h>
44
#include <mm/slab.h>
45
#include <memstr.h>
45
#include <memstr.h>
46
#include <arch/boot/boot.h>
46
#include <arch/boot/boot.h>
47
#include <interrupt.h>
47
#include <interrupt.h>
48
 
48
 
49
/*
49
/*
50
 * Early xen32 configuration functions and data structures.
50
 * Early xen32 configuration functions and data structures.
51
 */
51
 */
52
 
52
 
53
/*
53
/*
54
 * We have no use for segmentation so we set up flat mode. In this
54
 * We have no use for segmentation so we set up flat mode. In this
55
 * mode, we use, for each privilege level, two segments spanning the
55
 * mode, we use, for each privilege level, two segments spanning the
56
 * whole memory. One is for code and one is for data.
56
 * whole memory. One is for code and one is for data.
57
 *
57
 *
58
 * One is for GS register which holds pointer to the TLS thread
58
 * One is for GS register which holds pointer to the TLS thread
59
 * structure in it's base.
59
 * structure in it's base.
60
 */
60
 */
61
descriptor_t gdt[GDT_ITEMS] = {
61
descriptor_t gdt[GDT_ITEMS] = {
62
    /* NULL descriptor */
62
    /* NULL descriptor */
63
    { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 },
63
    { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 },
64
    /* KTEXT descriptor */
64
    /* KTEXT descriptor */
65
    { 0xffff, 0, 0, AR_PRESENT | AR_CODE | DPL_KERNEL, 0xf, 0, 0, 1, 1, 0 },
65
    { 0xffff, 0, 0, AR_PRESENT | AR_CODE | DPL_KERNEL, 0xf, 0, 0, 1, 1, 0 },
66
    /* KDATA descriptor */
66
    /* KDATA descriptor */
67
    { 0xffff, 0, 0, AR_PRESENT | AR_DATA | AR_WRITABLE | DPL_KERNEL, 0xf, 0, 0, 1, 1, 0 },
67
    { 0xffff, 0, 0, AR_PRESENT | AR_DATA | AR_WRITABLE | DPL_KERNEL, 0xf, 0, 0, 1, 1, 0 },
68
    /* UTEXT descriptor */
68
    /* UTEXT descriptor */
69
    { 0xffff, 0, 0, AR_PRESENT | AR_CODE | DPL_USER, 0xf, 0, 0, 1, 1, 0 },
69
    { 0xffff, 0, 0, AR_PRESENT | AR_CODE | DPL_USER, 0xf, 0, 0, 1, 1, 0 },
70
    /* UDATA descriptor */
70
    /* UDATA descriptor */
71
    { 0xffff, 0, 0, AR_PRESENT | AR_DATA | AR_WRITABLE | DPL_USER, 0xf, 0, 0, 1, 1, 0 },
71
    { 0xffff, 0, 0, AR_PRESENT | AR_DATA | AR_WRITABLE | DPL_USER, 0xf, 0, 0, 1, 1, 0 },
72
    /* TSS descriptor - set up will be completed later */
72
    /* TSS descriptor - set up will be completed later */
73
    { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 },
73
    { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 },
74
    /* TLS descriptor */
74
    /* TLS descriptor */
75
    { 0xffff, 0, 0, AR_PRESENT | AR_DATA | AR_WRITABLE | DPL_USER, 0xf, 0, 0, 1, 1, 0 },
75
    { 0xffff, 0, 0, AR_PRESENT | AR_DATA | AR_WRITABLE | DPL_USER, 0xf, 0, 0, 1, 1, 0 },
76
};
76
};
77
 
77
 
78
static idescriptor_t idt[IDT_ITEMS];
78
static trap_info_t traps[IDT_ITEMS + 1];
79
 
79
 
80
static tss_t tss;
80
static tss_t tss;
81
 
81
 
82
tss_t *tss_p = NULL;
82
tss_t *tss_p = NULL;
83
 
83
 
84
/* gdtr is changed by kmp before next CPU is initialized */
84
/* gdtr is changed by kmp before next CPU is initialized */
85
ptr_16_32_t bootstrap_gdtr = { .limit = sizeof(gdt), .base = KA2PA((uintptr_t) gdt) };
85
ptr_16_32_t bootstrap_gdtr = { .limit = sizeof(gdt), .base = KA2PA((uintptr_t) gdt) };
86
ptr_16_32_t gdtr = { .limit = sizeof(gdt), .base = (uintptr_t) gdt };
86
ptr_16_32_t gdtr = { .limit = sizeof(gdt), .base = (uintptr_t) gdt };
87
 
87
 
88
void gdt_setbase(descriptor_t *d, uintptr_t base)
88
void gdt_setbase(descriptor_t *d, uintptr_t base)
89
{
89
{
90
    d->base_0_15 = base & 0xffff;
90
    d->base_0_15 = base & 0xffff;
91
    d->base_16_23 = ((base) >> 16) & 0xff;
91
    d->base_16_23 = ((base) >> 16) & 0xff;
92
    d->base_24_31 = ((base) >> 24) & 0xff;
92
    d->base_24_31 = ((base) >> 24) & 0xff;
93
}
93
}
94
 
94
 
95
void gdt_setlimit(descriptor_t *d, uint32_t limit)
95
void gdt_setlimit(descriptor_t *d, uint32_t limit)
96
{
96
{
97
    d->limit_0_15 = limit & 0xffff;
97
    d->limit_0_15 = limit & 0xffff;
98
    d->limit_16_19 = (limit >> 16) & 0xf;
98
    d->limit_16_19 = (limit >> 16) & 0xf;
99
}
99
}
100
 
100
 
101
void idt_setoffset(idescriptor_t *d, uintptr_t offset)
-
 
102
{
-
 
103
    /*
-
 
104
     * Offset is a linear address.
-
 
105
     */
-
 
106
    d->offset_0_15 = offset & 0xffff;
-
 
107
    d->offset_16_31 = offset >> 16;
-
 
108
}
-
 
109
 
-
 
110
void tss_initialize(tss_t *t)
101
void tss_initialize(tss_t *t)
111
{
102
{
112
    memsetb((uintptr_t) t, sizeof(struct tss), 0);
103
    memsetb((uintptr_t) t, sizeof(struct tss), 0);
113
}
104
}
114
 
105
 
115
/*
-
 
116
 * This function takes care of proper setup of IDT and IDTR.
-
 
117
 */
-
 
118
void idt_init(void)
106
void traps_init(void)
119
{
107
{
120
    idescriptor_t *d;
-
 
121
    int i;
108
    index_t i;
122
 
109
   
123
    for (i = 0; i < IDT_ITEMS; i++) {
110
    for (i = 0; i < IDT_ITEMS; i++) {
124
        d = &idt[i];
-
 
125
 
-
 
126
        d->unused = 0;
111
        traps[i].vector = i;
127
        d->selector = selector(KTEXT_DES);
-
 
128
 
112
       
129
        d->access = AR_PRESENT | AR_INTERRUPT;  /* masking interrupt */
-
 
130
 
-
 
131
        if (i == VECTOR_SYSCALL) {
113
        if (i == VECTOR_SYSCALL)
132
            /*
-
 
133
             * The syscall interrupt gate must be calleable from userland.
114
            traps[i].flags = 3;
134
             */
115
        else
135
            d->access |= DPL_USER;
116
            traps[i].flags = 0;
136
        }
-
 
137
       
117
       
-
 
118
        traps[i].cs = XEN_CS;
138
        idt_setoffset(d, ((uintptr_t) interrupt_handlers) + i*interrupt_handler_size);
119
        traps[i].address = ((uintptr_t) interrupt_handlers) + i * interrupt_handler_size;
139
        exc_register(i, "undef", (iroutine) null_interrupt);
120
        exc_register(i, "undef", (iroutine) null_interrupt);
140
    }
121
    }
-
 
122
    traps[IDT_ITEMS].vector = 0;
-
 
123
    traps[IDT_ITEMS].flags = 0;
-
 
124
    traps[IDT_ITEMS].cs = 0;
-
 
125
    traps[IDT_ITEMS].address = NULL;
-
 
126
   
141
    exc_register(13, "gp_fault", (iroutine) gp_fault);
127
    exc_register(13, "gp_fault", (iroutine) gp_fault);
142
    exc_register( 7, "nm_fault", (iroutine) nm_fault);
128
    exc_register( 7, "nm_fault", (iroutine) nm_fault);
143
    exc_register(12, "ss_fault", (iroutine) ss_fault);
129
    exc_register(12, "ss_fault", (iroutine) ss_fault);
144
    exc_register(19, "simd_fp", (iroutine) simd_fp_exception);
130
    exc_register(19, "simd_fp", (iroutine) simd_fp_exception);
145
}
131
}
146
 
132
 
147
 
133
 
148
/* Clean IOPL(12,13) and NT(14) flags in EFLAGS register */
134
/* Clean IOPL(12,13) and NT(14) flags in EFLAGS register */
149
static void clean_IOPL_NT_flags(void)
135
static void clean_IOPL_NT_flags(void)
150
{
136
{
151
//  __asm__ volatile (
137
//  __asm__ volatile (
152
//      "pushfl\n"
138
//      "pushfl\n"
153
//      "pop %%eax\n"
139
//      "pop %%eax\n"
154
//      "and $0xffff8fff, %%eax\n"
140
//      "and $0xffff8fff, %%eax\n"
155
//      "push %%eax\n"
141
//      "push %%eax\n"
156
//      "popfl\n"
142
//      "popfl\n"
157
//      : : : "eax"
143
//      : : : "eax"
158
//  );
144
//  );
159
}
145
}
160
 
146
 
161
/* Clean AM(18) flag in CR0 register */
147
/* Clean AM(18) flag in CR0 register */
162
static void clean_AM_flag(void)
148
static void clean_AM_flag(void)
163
{
149
{
164
//  __asm__ volatile (
150
//  __asm__ volatile (
165
//      "mov %%cr0, %%eax\n"
151
//      "mov %%cr0, %%eax\n"
166
//      "and $0xfffbffff, %%eax\n"
152
//      "and $0xfffbffff, %%eax\n"
167
//      "mov %%eax, %%cr0\n"
153
//      "mov %%eax, %%cr0\n"
168
//      : : : "eax"
154
//      : : : "eax"
169
//  );
155
//  );
170
}
156
}
171
 
157
 
172
void pm_init(void)
158
void pm_init(void)
173
{
159
{
174
    descriptor_t *gdt_p = (descriptor_t *) gdtr.base;
160
    descriptor_t *gdt_p = (descriptor_t *) gdtr.base;
175
    ptr_16_32_t idtr;
-
 
176
 
161
 
177
    /*
-
 
178
     * Update addresses in GDT and IDT to their virtual counterparts.
-
 
179
     */
-
 
180
    idtr.limit = sizeof(idt);
-
 
181
    idtr.base = (uintptr_t) idt;
-
 
182
//  gdtr_load(&gdtr);
162
//  gdtr_load(&gdtr);
183
//  idtr_load(&idtr);
-
 
184
   
163
   
185
    /*
-
 
186
     * Each CPU has its private GDT and TSS.
-
 
187
     * All CPUs share one IDT.
-
 
188
     */
-
 
189
 
-
 
190
//  if (config.cpu_active == 1) {
164
    if (config.cpu_active == 1) {
191
//      idt_init();
165
        traps_init();
-
 
166
        xen_set_trap_table(traps);
192
//      /*
167
        /*
193
//       * NOTE: bootstrap CPU has statically allocated TSS, because
168
         * NOTE: bootstrap CPU has statically allocated TSS, because
194
//       * the heap hasn't been initialized so far.
169
         * the heap hasn't been initialized so far.
195
//       */
170
         */
196
        tss_p = &tss;
171
        tss_p = &tss;
197
//  }
-
 
198
//  else {
172
    } else {
199
//      tss_p = (tss_t *) malloc(sizeof(tss_t), FRAME_ATOMIC);
173
        tss_p = (tss_t *) malloc(sizeof(tss_t), FRAME_ATOMIC);
200
//      if (!tss_p)
174
        if (!tss_p)
201
//          panic("could not allocate TSS\n");
175
            panic("could not allocate TSS\n");
202
//  }
176
    }
203
 
177
 
204
//  tss_initialize(tss_p);
178
//  tss_initialize(tss_p);
205
   
179
   
206
    gdt_p[TSS_DES].access = AR_PRESENT | AR_TSS | DPL_KERNEL;
180
    gdt_p[TSS_DES].access = AR_PRESENT | AR_TSS | DPL_KERNEL;
207
    gdt_p[TSS_DES].special = 1;
181
    gdt_p[TSS_DES].special = 1;
208
    gdt_p[TSS_DES].granularity = 0;
182
    gdt_p[TSS_DES].granularity = 0;
209
   
183
   
210
    gdt_setbase(&gdt_p[TSS_DES], (uintptr_t) tss_p);
184
    gdt_setbase(&gdt_p[TSS_DES], (uintptr_t) tss_p);
211
    gdt_setlimit(&gdt_p[TSS_DES], TSS_BASIC_SIZE - 1);
185
    gdt_setlimit(&gdt_p[TSS_DES], TSS_BASIC_SIZE - 1);
212
 
186
 
213
    /*
187
    /*
214
     * As of this moment, the current CPU has its own GDT pointing
188
     * As of this moment, the current CPU has its own GDT pointing
215
     * to its own TSS. We just need to load the TR register.
189
     * to its own TSS. We just need to load the TR register.
216
     */
190
     */
217
//  tr_load(selector(TSS_DES));
191
//  tr_load(selector(TSS_DES));
218
   
192
   
219
    clean_IOPL_NT_flags();    /* Disable I/O on nonprivileged levels and clear NT flag. */
193
    clean_IOPL_NT_flags();    /* Disable I/O on nonprivileged levels and clear NT flag. */
220
    clean_AM_flag();          /* Disable alignment check */
194
    clean_AM_flag();          /* Disable alignment check */
221
}
195
}
222
 
196
 
223
void set_tls_desc(uintptr_t tls)
197
void set_tls_desc(uintptr_t tls)
224
{
198
{
225
    ptr_16_32_t cpugdtr;
199
    ptr_16_32_t cpugdtr;
226
    descriptor_t *gdt_p;
200
    descriptor_t *gdt_p;
227
 
201
 
228
    gdtr_store(&cpugdtr);
202
    gdtr_store(&cpugdtr);
229
    gdt_p = (descriptor_t *) cpugdtr.base;
203
    gdt_p = (descriptor_t *) cpugdtr.base;
230
    gdt_setbase(&gdt_p[TLS_DES], tls);
204
    gdt_setbase(&gdt_p[TLS_DES], tls);
231
    /* Reload gdt register to update GS in CPU */
205
    /* Reload gdt register to update GS in CPU */
232
    gdtr_load(&cpugdtr);
206
    gdtr_load(&cpugdtr);
233
}
207
}
234
 
208
 
235
/** @}
209
/** @}
236
 */
210
 */
237
 
211