Linux Audio

Check our new training course

Loading...
v3.15
 
  1/*
  2 *  linux/boot/head.S
  3 *
  4 *  Copyright (C) 1991, 1992, 1993  Linus Torvalds
  5 */
  6
  7/*
  8 *  head.S contains the 32-bit startup code.
  9 *
 10 * NOTE!!! Startup happens at absolute address 0x00001000, which is also where
 11 * the page directory will exist. The startup code will be overwritten by
 12 * the page directory. [According to comments etc elsewhere on a compressed
 13 * kernel it will end up at 0x1000 + 1Mb I hope so as I assume this. - AC]
 14 *
 15 * Page 0 is deliberately kept safe, since System Management Mode code in
 16 * laptops may need to access the BIOS data stored there.  This is also
 17 * useful for future device drivers that either access the BIOS via VM86
 18 * mode.
 19 */
 20
 21/*
 22 * High loaded stuff by Hans Lermen & Werner Almesberger, Feb. 1996
 23 */
 24	.text
 25
 26#include <linux/init.h>
 27#include <linux/linkage.h>
 28#include <asm/segment.h>
 29#include <asm/page_types.h>
 30#include <asm/boot.h>
 31#include <asm/asm-offsets.h>
 
 32
 33	__HEAD
 34ENTRY(startup_32)
 35#ifdef CONFIG_EFI_STUB
 36	jmp	preferred_addr
 37
 38	/*
 39	 * We don't need the return address, so set up the stack so
 40	 * efi_main() can find its arguments.
 41	 */
 42ENTRY(efi_pe_entry)
 43	add	$0x4, %esp
 44
 45	call	1f
 461:	popl	%esi
 47	subl	$1b, %esi
 48
 49	popl	%ecx
 50	movl	%ecx, efi32_config(%esi)	/* Handle */
 51	popl	%ecx
 52	movl	%ecx, efi32_config+8(%esi)	/* EFI System table pointer */
 53
 54	/* Relocate efi_config->call() */
 55	leal	efi32_config(%esi), %eax
 56	add	%esi, 88(%eax)
 57	pushl	%eax
 58
 59	call	make_boot_params
 60	cmpl	$0, %eax
 61	je	fail
 62	movl	%esi, BP_code32_start(%eax)
 63	popl	%ecx
 64	pushl	%eax
 65	pushl	%ecx
 66	jmp	2f		/* Skip efi_config initialization */
 67
 68ENTRY(efi32_stub_entry)
 69	add	$0x4, %esp
 70	popl	%ecx
 71	popl	%edx
 72
 73	call	1f
 741:	popl	%esi
 75	subl	$1b, %esi
 76
 77	movl	%ecx, efi32_config(%esi)	/* Handle */
 78	movl	%edx, efi32_config+8(%esi)	/* EFI System table pointer */
 79
 80	/* Relocate efi_config->call() */
 81	leal	efi32_config(%esi), %eax
 82	add	%esi, 88(%eax)
 83	pushl	%eax
 842:
 85	call	efi_main
 86	cmpl	$0, %eax
 87	movl	%eax, %esi
 88	jne	2f
 89fail:
 90	/* EFI init failed, so hang. */
 91	hlt
 92	jmp	fail
 932:
 94	movl	BP_code32_start(%esi), %eax
 95	leal	preferred_addr(%eax), %eax
 96	jmp	*%eax
 97
 98preferred_addr:
 99#endif
100	cld
101	/*
102	 * Test KEEP_SEGMENTS flag to see if the bootloader is asking
103	 * us to not reload segments
104	 */
105	testb	$(1<<6), BP_loadflags(%esi)
106	jnz	1f
107
108	cli
109	movl	$__BOOT_DS, %eax
110	movl	%eax, %ds
111	movl	%eax, %es
112	movl	%eax, %fs
113	movl	%eax, %gs
114	movl	%eax, %ss
1151:
116
117/*
118 * Calculate the delta between where we were compiled to run
119 * at and where we were actually loaded at.  This can only be done
120 * with a short local call on x86.  Nothing  else will tell us what
121 * address we are running at.  The reserved chunk of the real-mode
122 * data at 0x1e4 (defined as a scratch field) are used as the stack
123 * for this calculation. Only 4 bytes are needed.
124 */
125	leal	(BP_scratch+4)(%esi), %esp
126	call	1f
1271:	popl	%ebp
128	subl	$1b, %ebp
 
 
 
 
 
 
 
 
 
 
 
 
 
129
130/*
131 * %ebp contains the address we are loaded at by the boot loader and %ebx
132 * contains the address where we should move the kernel image temporarily
133 * for safe in-place decompression.
 
 
 
134 */
135
136#ifdef CONFIG_RELOCATABLE
137	movl	%ebp, %ebx
 
 
 
 
 
 
 
 
 
 
 
 
 
138	movl	BP_kernel_alignment(%esi), %eax
139	decl	%eax
140	addl    %eax, %ebx
141	notl	%eax
142	andl    %eax, %ebx
143	cmpl	$LOAD_PHYSICAL_ADDR, %ebx
144	jge	1f
145#endif
146	movl	$LOAD_PHYSICAL_ADDR, %ebx
1471:
148
 
149	/* Target address to relocate to for decompression */
150	addl	$z_extract_offset, %ebx
 
151
152	/* Set up the stack */
153	leal	boot_stack_end(%ebx), %esp
154
155	/* Zero EFLAGS */
156	pushl	$0
157	popfl
158
159/*
160 * Copy the compressed kernel to the end of our buffer
161 * where decompression in place becomes safe.
162 */
163	pushl	%esi
164	leal	(_bss-4)(%ebp), %esi
165	leal	(_bss-4)(%ebx), %edi
166	movl	$(_bss - startup_32), %ecx
167	shrl	$2, %ecx
168	std
169	rep	movsl
170	cld
171	popl	%esi
172
 
 
 
 
 
 
 
 
 
173/*
174 * Jump to the relocated address.
175 */
176	leal	relocated(%ebx), %eax
 
 
 
 
 
 
 
 
 
177	jmp	*%eax
178ENDPROC(startup_32)
 
 
179
180	.text
181relocated:
182
183/*
184 * Clear BSS (stack is currently empty)
185 */
186	xorl	%eax, %eax
187	leal	_bss(%ebx), %edi
188	leal	_ebss(%ebx), %ecx
189	subl	%edi, %ecx
190	shrl	$2, %ecx
191	rep	stosl
192
193/*
194 * Adjust our own GOT
195 */
196	leal	_got(%ebx), %edx
197	leal	_egot(%ebx), %ecx
1981:
199	cmpl	%ecx, %edx
200	jae	2f
201	addl	%ebx, (%edx)
202	addl	$4, %edx
203	jmp	1b
2042:
205
206/*
207 * Do the decompression, and jump to the new kernel..
208 */
209				/* push arguments for decompress_kernel: */
210	pushl	$z_output_len	/* decompressed length */
211	leal	z_extract_offset_negative(%ebx), %ebp
212	pushl	%ebp		/* output address */
213	pushl	$z_input_len	/* input_len */
214	leal	input_data(%ebx), %eax
215	pushl	%eax		/* input_data */
216	leal	boot_heap(%ebx), %eax
217	pushl	%eax		/* heap area */
218	pushl	%esi		/* real mode pointer */
219	call	decompress_kernel /* returns kernel location in %eax */
220	addl	$24, %esp
221
222/*
223 * Jump to the decompressed kernel.
224 */
225	xorl	%ebx, %ebx
226	jmp	*%eax
 
227
228#ifdef CONFIG_EFI_STUB
229	.data
230efi32_config:
231	.fill 11,8,0
232	.long efi_call_phys
233	.long 0
234	.byte 0
235#endif
 
 
 
236
237/*
238 * Stack and heap for uncompression
239 */
240	.bss
241	.balign 4
242boot_heap:
243	.fill BOOT_HEAP_SIZE, 1, 0
244boot_stack:
245	.fill BOOT_STACK_SIZE, 1, 0
246boot_stack_end:
v6.2
  1/* SPDX-License-Identifier: GPL-2.0 */
  2/*
  3 *  linux/boot/head.S
  4 *
  5 *  Copyright (C) 1991, 1992, 1993  Linus Torvalds
  6 */
  7
  8/*
  9 *  head.S contains the 32-bit startup code.
 10 *
 11 * NOTE!!! Startup happens at absolute address 0x00001000, which is also where
 12 * the page directory will exist. The startup code will be overwritten by
 13 * the page directory. [According to comments etc elsewhere on a compressed
 14 * kernel it will end up at 0x1000 + 1Mb I hope so as I assume this. - AC]
 15 *
 16 * Page 0 is deliberately kept safe, since System Management Mode code in
 17 * laptops may need to access the BIOS data stored there.  This is also
 18 * useful for future device drivers that either access the BIOS via VM86
 19 * mode.
 20 */
 21
 22/*
 23 * High loaded stuff by Hans Lermen & Werner Almesberger, Feb. 1996
 24 */
 25	.text
 26
 27#include <linux/init.h>
 28#include <linux/linkage.h>
 29#include <asm/segment.h>
 30#include <asm/page_types.h>
 31#include <asm/boot.h>
 32#include <asm/asm-offsets.h>
 33#include <asm/bootparam.h>
 34
 35/*
 36 * These symbols needed to be marked as .hidden to prevent the BFD linker from
 37 * generating R_386_32 (rather than R_386_RELATIVE) relocations for them when
 38 * the 32-bit compressed kernel is linked as PIE. This is no longer necessary,
 39 * but it doesn't hurt to keep them .hidden.
 40 */
 41	.hidden _bss
 42	.hidden _ebss
 43	.hidden _end
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 44
 45	__HEAD
 46SYM_FUNC_START(startup_32)
 47	cld
 
 
 
 
 
 
 
 48	cli
 
 
 
 
 
 
 
 49
 50/*
 51 * Calculate the delta between where we were compiled to run
 52 * at and where we were actually loaded at.  This can only be done
 53 * with a short local call on x86.  Nothing  else will tell us what
 54 * address we are running at.  The reserved chunk of the real-mode
 55 * data at 0x1e4 (defined as a scratch field) are used as the stack
 56 * for this calculation. Only 4 bytes are needed.
 57 */
 58	leal	(BP_scratch+4)(%esi), %esp
 59	call	1f
 601:	popl	%edx
 61	addl	$_GLOBAL_OFFSET_TABLE_+(.-1b), %edx
 62
 63	/* Load new GDT */
 64	leal	gdt@GOTOFF(%edx), %eax
 65	movl	%eax, 2(%eax)
 66	lgdt	(%eax)
 67
 68	/* Load segment registers with our descriptors */
 69	movl	$__BOOT_DS, %eax
 70	movl	%eax, %ds
 71	movl	%eax, %es
 72	movl	%eax, %fs
 73	movl	%eax, %gs
 74	movl	%eax, %ss
 75
 76/*
 77 * %edx contains the address we are loaded at by the boot loader (plus the
 78 * offset to the GOT).  The below code calculates %ebx to be the address where
 79 * we should move the kernel image temporarily for safe in-place decompression
 80 * (again, plus the offset to the GOT).
 81 *
 82 * %ebp is calculated to be the address that the kernel will be decompressed to.
 83 */
 84
 85#ifdef CONFIG_RELOCATABLE
 86	leal	startup_32@GOTOFF(%edx), %ebx
 87
 88#ifdef CONFIG_EFI_STUB
 89/*
 90 * If we were loaded via the EFI LoadImage service, startup_32() will be at an
 91 * offset to the start of the space allocated for the image. efi_pe_entry() will
 92 * set up image_offset to tell us where the image actually starts, so that we
 93 * can use the full available buffer.
 94 *	image_offset = startup_32 - image_base
 95 * Otherwise image_offset will be zero and has no effect on the calculations.
 96 */
 97	subl    image_offset@GOTOFF(%edx), %ebx
 98#endif
 99
100	movl	BP_kernel_alignment(%esi), %eax
101	decl	%eax
102	addl    %eax, %ebx
103	notl	%eax
104	andl    %eax, %ebx
105	cmpl	$LOAD_PHYSICAL_ADDR, %ebx
106	jae	1f
107#endif
108	movl	$LOAD_PHYSICAL_ADDR, %ebx
1091:
110
111	movl	%ebx, %ebp	// Save the output address for later
112	/* Target address to relocate to for decompression */
113	addl    BP_init_size(%esi), %ebx
114	subl    $_end@GOTOFF, %ebx
115
116	/* Set up the stack */
117	leal	boot_stack_end@GOTOFF(%ebx), %esp
118
119	/* Zero EFLAGS */
120	pushl	$0
121	popfl
122
123/*
124 * Copy the compressed kernel to the end of our buffer
125 * where decompression in place becomes safe.
126 */
127	pushl	%esi
128	leal	(_bss@GOTOFF-4)(%edx), %esi
129	leal	(_bss@GOTOFF-4)(%ebx), %edi
130	movl	$(_bss - startup_32), %ecx
131	shrl	$2, %ecx
132	std
133	rep	movsl
134	cld
135	popl	%esi
136
137	/*
138	 * The GDT may get overwritten either during the copy we just did or
139	 * during extract_kernel below. To avoid any issues, repoint the GDTR
140	 * to the new copy of the GDT.
141	 */
142	leal	gdt@GOTOFF(%ebx), %eax
143	movl	%eax, 2(%eax)
144	lgdt	(%eax)
145
146/*
147 * Jump to the relocated address.
148 */
149	leal	.Lrelocated@GOTOFF(%ebx), %eax
150	jmp	*%eax
151SYM_FUNC_END(startup_32)
152
153#ifdef CONFIG_EFI_STUB
154SYM_FUNC_START(efi32_stub_entry)
155	add	$0x4, %esp
156	movl	8(%esp), %esi	/* save boot_params pointer */
157	call	efi_main
158	/* efi_main returns the possibly relocated address of startup_32 */
159	jmp	*%eax
160SYM_FUNC_END(efi32_stub_entry)
161SYM_FUNC_ALIAS(efi_stub_entry, efi32_stub_entry)
162#endif
163
164	.text
165SYM_FUNC_START_LOCAL_NOALIGN(.Lrelocated)
166
167/*
168 * Clear BSS (stack is currently empty)
169 */
170	xorl	%eax, %eax
171	leal	_bss@GOTOFF(%ebx), %edi
172	leal	_ebss@GOTOFF(%ebx), %ecx
173	subl	%edi, %ecx
174	shrl	$2, %ecx
175	rep	stosl
176
177/*
178 * Do the extraction, and jump to the new kernel..
179 */
180	/* push arguments for extract_kernel: */
181
182	pushl	output_len@GOTOFF(%ebx)	/* decompressed length, end of relocs */
183	pushl	%ebp			/* output address */
184	pushl	input_len@GOTOFF(%ebx)	/* input_len */
185	leal	input_data@GOTOFF(%ebx), %eax
186	pushl	%eax			/* input_data */
187	leal	boot_heap@GOTOFF(%ebx), %eax
188	pushl	%eax			/* heap area */
189	pushl	%esi			/* real mode pointer */
190	call	extract_kernel		/* returns kernel location in %eax */
 
 
 
 
 
 
 
 
 
 
 
 
 
191	addl	$24, %esp
192
193/*
194 * Jump to the extracted kernel.
195 */
196	xorl	%ebx, %ebx
197	jmp	*%eax
198SYM_FUNC_END(.Lrelocated)
199
 
200	.data
201	.balign	8
202SYM_DATA_START_LOCAL(gdt)
203	.word	gdt_end - gdt - 1
204	.long	0
205	.word	0
206	.quad	0x0000000000000000	/* Reserved */
207	.quad	0x00cf9a000000ffff	/* __KERNEL_CS */
208	.quad	0x00cf92000000ffff	/* __KERNEL_DS */
209SYM_DATA_END_LABEL(gdt, SYM_L_LOCAL, gdt_end)
210
211/*
212 * Stack and heap for uncompression
213 */
214	.bss
215	.balign 4
216boot_heap:
217	.fill BOOT_HEAP_SIZE, 1, 0
218boot_stack:
219	.fill BOOT_STACK_SIZE, 1, 0
220boot_stack_end: