xref: /openbmc/linux/arch/x86/boot/compressed/head_64.S (revision 65417d9f)
1/* SPDX-License-Identifier: GPL-2.0 */
2/*
3 *  linux/boot/head.S
4 *
5 *  Copyright (C) 1991, 1992, 1993  Linus Torvalds
6 */
7
8/*
9 *  head.S contains the 32-bit startup code.
10 *
11 * NOTE!!! Startup happens at absolute address 0x00001000, which is also where
12 * the page directory will exist. The startup code will be overwritten by
13 * the page directory. [According to comments etc elsewhere on a compressed
14 * kernel it will end up at 0x1000 + 1Mb I hope so as I assume this. - AC]
15 *
16 * Page 0 is deliberately kept safe, since System Management Mode code in
17 * laptops may need to access the BIOS data stored there.  This is also
18 * useful for future device drivers that either access the BIOS via VM86
19 * mode.
20 */
21
22/*
23 * High loaded stuff by Hans Lermen & Werner Almesberger, Feb. 1996
24 */
25	.code32
26	.text
27
28#include <linux/init.h>
29#include <linux/linkage.h>
30#include <asm/segment.h>
31#include <asm/boot.h>
32#include <asm/msr.h>
33#include <asm/processor-flags.h>
34#include <asm/asm-offsets.h>
35#include <asm/bootparam.h>
36
37/*
38 * Locally defined symbols should be marked hidden:
39 */
40	.hidden _bss
41	.hidden _ebss
42	.hidden _got
43	.hidden _egot
44
45	__HEAD
46	.code32
47ENTRY(startup_32)
48	/*
49	 * 32bit entry is 0 and it is ABI so immutable!
50	 * If we come here directly from a bootloader,
51	 * kernel(text+data+bss+brk) ramdisk, zero_page, command line
52	 * all need to be under the 4G limit.
53	 */
54	cld
55	/*
56	 * Test KEEP_SEGMENTS flag to see if the bootloader is asking
57	 * us to not reload segments
58	 */
59	testb $KEEP_SEGMENTS, BP_loadflags(%esi)
60	jnz 1f
61
62	cli
63	movl	$(__BOOT_DS), %eax
64	movl	%eax, %ds
65	movl	%eax, %es
66	movl	%eax, %ss
671:
68
69/*
70 * Calculate the delta between where we were compiled to run
71 * at and where we were actually loaded at.  This can only be done
72 * with a short local call on x86.  Nothing  else will tell us what
73 * address we are running at.  The reserved chunk of the real-mode
74 * data at 0x1e4 (defined as a scratch field) are used as the stack
75 * for this calculation. Only 4 bytes are needed.
76 */
77	leal	(BP_scratch+4)(%esi), %esp
78	call	1f
791:	popl	%ebp
80	subl	$1b, %ebp
81
82/* setup a stack and make sure cpu supports long mode. */
83	movl	$boot_stack_end, %eax
84	addl	%ebp, %eax
85	movl	%eax, %esp
86
87	call	verify_cpu
88	testl	%eax, %eax
89	jnz	no_longmode
90
91/*
92 * Compute the delta between where we were compiled to run at
93 * and where the code will actually run at.
94 *
95 * %ebp contains the address we are loaded at by the boot loader and %ebx
96 * contains the address where we should move the kernel image temporarily
97 * for safe in-place decompression.
98 */
99
100#ifdef CONFIG_RELOCATABLE
101	movl	%ebp, %ebx
102	movl	BP_kernel_alignment(%esi), %eax
103	decl	%eax
104	addl	%eax, %ebx
105	notl	%eax
106	andl	%eax, %ebx
107	cmpl	$LOAD_PHYSICAL_ADDR, %ebx
108	jge	1f
109#endif
110	movl	$LOAD_PHYSICAL_ADDR, %ebx
1111:
112
113	/* Target address to relocate to for decompression */
114	movl	BP_init_size(%esi), %eax
115	subl	$_end, %eax
116	addl	%eax, %ebx
117
118/*
119 * Prepare for entering 64 bit mode
120 */
121
122	/* Load new GDT with the 64bit segments using 32bit descriptor */
123	addl	%ebp, gdt+2(%ebp)
124	lgdt	gdt(%ebp)
125
126	/* Enable PAE mode */
127	movl	%cr4, %eax
128	orl	$X86_CR4_PAE, %eax
129	movl	%eax, %cr4
130
131 /*
132  * Build early 4G boot pagetable
133  */
134	/*
135	 * If SEV is active then set the encryption mask in the page tables.
136	 * This will insure that when the kernel is copied and decompressed
137	 * it will be done so encrypted.
138	 */
139	call	get_sev_encryption_bit
140	xorl	%edx, %edx
141	testl	%eax, %eax
142	jz	1f
143	subl	$32, %eax	/* Encryption bit is always above bit 31 */
144	bts	%eax, %edx	/* Set encryption mask for page tables */
1451:
146
147	/* Initialize Page tables to 0 */
148	leal	pgtable(%ebx), %edi
149	xorl	%eax, %eax
150	movl	$(BOOT_INIT_PGT_SIZE/4), %ecx
151	rep	stosl
152
153	/* Build Level 4 */
154	leal	pgtable + 0(%ebx), %edi
155	leal	0x1007 (%edi), %eax
156	movl	%eax, 0(%edi)
157	addl	%edx, 4(%edi)
158
159	/* Build Level 3 */
160	leal	pgtable + 0x1000(%ebx), %edi
161	leal	0x1007(%edi), %eax
162	movl	$4, %ecx
1631:	movl	%eax, 0x00(%edi)
164	addl	%edx, 0x04(%edi)
165	addl	$0x00001000, %eax
166	addl	$8, %edi
167	decl	%ecx
168	jnz	1b
169
170	/* Build Level 2 */
171	leal	pgtable + 0x2000(%ebx), %edi
172	movl	$0x00000183, %eax
173	movl	$2048, %ecx
1741:	movl	%eax, 0(%edi)
175	addl	%edx, 4(%edi)
176	addl	$0x00200000, %eax
177	addl	$8, %edi
178	decl	%ecx
179	jnz	1b
180
181	/* Enable the boot page tables */
182	leal	pgtable(%ebx), %eax
183	movl	%eax, %cr3
184
185	/* Enable Long mode in EFER (Extended Feature Enable Register) */
186	movl	$MSR_EFER, %ecx
187	rdmsr
188	btsl	$_EFER_LME, %eax
189	wrmsr
190
191	/* After gdt is loaded */
192	xorl	%eax, %eax
193	lldt	%ax
194	movl    $__BOOT_TSS, %eax
195	ltr	%ax
196
197	/*
198	 * Setup for the jump to 64bit mode
199	 *
200	 * When the jump is performend we will be in long mode but
201	 * in 32bit compatibility mode with EFER.LME = 1, CS.L = 0, CS.D = 1
202	 * (and in turn EFER.LMA = 1).	To jump into 64bit mode we use
203	 * the new gdt/idt that has __KERNEL_CS with CS.L = 1.
204	 * We place all of the values on our mini stack so lret can
205	 * used to perform that far jump.
206	 */
207	pushl	$__KERNEL_CS
208	leal	startup_64(%ebp), %eax
209#ifdef CONFIG_EFI_MIXED
210	movl	efi32_config(%ebp), %ebx
211	cmp	$0, %ebx
212	jz	1f
213	leal	handover_entry(%ebp), %eax
2141:
215#endif
216	pushl	%eax
217
218	/* Enter paged protected Mode, activating Long Mode */
219	movl	$(X86_CR0_PG | X86_CR0_PE), %eax /* Enable Paging and Protected mode */
220	movl	%eax, %cr0
221
222	/* Jump from 32bit compatibility mode into 64bit mode. */
223	lret
224ENDPROC(startup_32)
225
226#ifdef CONFIG_EFI_MIXED
227	.org 0x190
228ENTRY(efi32_stub_entry)
229	add	$0x4, %esp		/* Discard return address */
230	popl	%ecx
231	popl	%edx
232	popl	%esi
233
234	leal	(BP_scratch+4)(%esi), %esp
235	call	1f
2361:	pop	%ebp
237	subl	$1b, %ebp
238
239	movl	%ecx, efi32_config(%ebp)
240	movl	%edx, efi32_config+8(%ebp)
241	sgdtl	efi32_boot_gdt(%ebp)
242
243	leal	efi32_config(%ebp), %eax
244	movl	%eax, efi_config(%ebp)
245
246	jmp	startup_32
247ENDPROC(efi32_stub_entry)
248#endif
249
250	.code64
251	.org 0x200
252ENTRY(startup_64)
253	/*
254	 * 64bit entry is 0x200 and it is ABI so immutable!
255	 * We come here either from startup_32 or directly from a
256	 * 64bit bootloader.
257	 * If we come here from a bootloader, kernel(text+data+bss+brk),
258	 * ramdisk, zero_page, command line could be above 4G.
259	 * We depend on an identity mapped page table being provided
260	 * that maps our entire kernel(text+data+bss+brk), zero page
261	 * and command line.
262	 */
263
264	/* Setup data segments. */
265	xorl	%eax, %eax
266	movl	%eax, %ds
267	movl	%eax, %es
268	movl	%eax, %ss
269	movl	%eax, %fs
270	movl	%eax, %gs
271
272	/*
273	 * Compute the decompressed kernel start address.  It is where
274	 * we were loaded at aligned to a 2M boundary. %rbp contains the
275	 * decompressed kernel start address.
276	 *
277	 * If it is a relocatable kernel then decompress and run the kernel
278	 * from load address aligned to 2MB addr, otherwise decompress and
279	 * run the kernel from LOAD_PHYSICAL_ADDR
280	 *
281	 * We cannot rely on the calculation done in 32-bit mode, since we
282	 * may have been invoked via the 64-bit entry point.
283	 */
284
285	/* Start with the delta to where the kernel will run at. */
286#ifdef CONFIG_RELOCATABLE
287	leaq	startup_32(%rip) /* - $startup_32 */, %rbp
288	movl	BP_kernel_alignment(%rsi), %eax
289	decl	%eax
290	addq	%rax, %rbp
291	notq	%rax
292	andq	%rax, %rbp
293	cmpq	$LOAD_PHYSICAL_ADDR, %rbp
294	jge	1f
295#endif
296	movq	$LOAD_PHYSICAL_ADDR, %rbp
2971:
298
299	/* Target address to relocate to for decompression */
300	movl	BP_init_size(%rsi), %ebx
301	subl	$_end, %ebx
302	addq	%rbp, %rbx
303
304	/* Set up the stack */
305	leaq	boot_stack_end(%rbx), %rsp
306
307#ifdef CONFIG_X86_5LEVEL
308	/* Check if 5-level paging has already enabled */
309	movq	%cr4, %rax
310	testl	$X86_CR4_LA57, %eax
311	jnz	lvl5
312
313	/*
314	 * At this point we are in long mode with 4-level paging enabled,
315	 * but we want to enable 5-level paging.
316	 *
317	 * The problem is that we cannot do it directly. Setting LA57 in
318	 * long mode would trigger #GP. So we need to switch off long mode
319	 * first.
320	 *
321	 * NOTE: This is not going to work if bootloader put us above 4G
322	 * limit.
323	 *
324	 * The first step is go into compatibility mode.
325	 */
326
327	/* Clear additional page table */
328	leaq	lvl5_pgtable(%rbx), %rdi
329	xorq	%rax, %rax
330	movq	$(PAGE_SIZE/8), %rcx
331	rep	stosq
332
333	/*
334	 * Setup current CR3 as the first and only entry in a new top level
335	 * page table.
336	 */
337	movq	%cr3, %rdi
338	leaq	0x7 (%rdi), %rax
339	movq	%rax, lvl5_pgtable(%rbx)
340
341	/* Switch to compatibility mode (CS.L = 0 CS.D = 1) via far return */
342	pushq	$__KERNEL32_CS
343	leaq	compatible_mode(%rip), %rax
344	pushq	%rax
345	lretq
346lvl5:
347#endif
348
349	/* Zero EFLAGS */
350	pushq	$0
351	popfq
352
353/*
354 * Copy the compressed kernel to the end of our buffer
355 * where decompression in place becomes safe.
356 */
357	pushq	%rsi
358	leaq	(_bss-8)(%rip), %rsi
359	leaq	(_bss-8)(%rbx), %rdi
360	movq	$_bss /* - $startup_32 */, %rcx
361	shrq	$3, %rcx
362	std
363	rep	movsq
364	cld
365	popq	%rsi
366
367/*
368 * Jump to the relocated address.
369 */
370	leaq	relocated(%rbx), %rax
371	jmp	*%rax
372
373#ifdef CONFIG_EFI_STUB
374
375/* The entry point for the PE/COFF executable is efi_pe_entry. */
376ENTRY(efi_pe_entry)
377	movq	%rcx, efi64_config(%rip)	/* Handle */
378	movq	%rdx, efi64_config+8(%rip) /* EFI System table pointer */
379
380	leaq	efi64_config(%rip), %rax
381	movq	%rax, efi_config(%rip)
382
383	call	1f
3841:	popq	%rbp
385	subq	$1b, %rbp
386
387	/*
388	 * Relocate efi_config->call().
389	 */
390	addq	%rbp, efi64_config+40(%rip)
391
392	movq	%rax, %rdi
393	call	make_boot_params
394	cmpq	$0,%rax
395	je	fail
396	mov	%rax, %rsi
397	leaq	startup_32(%rip), %rax
398	movl	%eax, BP_code32_start(%rsi)
399	jmp	2f		/* Skip the relocation */
400
401handover_entry:
402	call	1f
4031:	popq	%rbp
404	subq	$1b, %rbp
405
406	/*
407	 * Relocate efi_config->call().
408	 */
409	movq	efi_config(%rip), %rax
410	addq	%rbp, 40(%rax)
4112:
412	movq	efi_config(%rip), %rdi
413	call	efi_main
414	movq	%rax,%rsi
415	cmpq	$0,%rax
416	jne	2f
417fail:
418	/* EFI init failed, so hang. */
419	hlt
420	jmp	fail
4212:
422	movl	BP_code32_start(%esi), %eax
423	leaq	startup_64(%rax), %rax
424	jmp	*%rax
425ENDPROC(efi_pe_entry)
426
427	.org 0x390
428ENTRY(efi64_stub_entry)
429	movq	%rdi, efi64_config(%rip)	/* Handle */
430	movq	%rsi, efi64_config+8(%rip) /* EFI System table pointer */
431
432	leaq	efi64_config(%rip), %rax
433	movq	%rax, efi_config(%rip)
434
435	movq	%rdx, %rsi
436	jmp	handover_entry
437ENDPROC(efi64_stub_entry)
438#endif
439
440	.text
441relocated:
442
443/*
444 * Clear BSS (stack is currently empty)
445 */
446	xorl	%eax, %eax
447	leaq    _bss(%rip), %rdi
448	leaq    _ebss(%rip), %rcx
449	subq	%rdi, %rcx
450	shrq	$3, %rcx
451	rep	stosq
452
453/*
454 * Adjust our own GOT
455 */
456	leaq	_got(%rip), %rdx
457	leaq	_egot(%rip), %rcx
4581:
459	cmpq	%rcx, %rdx
460	jae	2f
461	addq	%rbx, (%rdx)
462	addq	$8, %rdx
463	jmp	1b
4642:
465
466/*
467 * Do the extraction, and jump to the new kernel..
468 */
469	pushq	%rsi			/* Save the real mode argument */
470	movq	%rsi, %rdi		/* real mode address */
471	leaq	boot_heap(%rip), %rsi	/* malloc area for uncompression */
472	leaq	input_data(%rip), %rdx  /* input_data */
473	movl	$z_input_len, %ecx	/* input_len */
474	movq	%rbp, %r8		/* output target address */
475	movq	$z_output_len, %r9	/* decompressed length, end of relocs */
476	call	extract_kernel		/* returns kernel location in %rax */
477	popq	%rsi
478
479/*
480 * Jump to the decompressed kernel.
481 */
482	jmp	*%rax
483
484	.code32
485#ifdef CONFIG_X86_5LEVEL
486compatible_mode:
487	/* Setup data and stack segments */
488	movl	$__KERNEL_DS, %eax
489	movl	%eax, %ds
490	movl	%eax, %ss
491
492	/* Disable paging */
493	movl	%cr0, %eax
494	btrl	$X86_CR0_PG_BIT, %eax
495	movl	%eax, %cr0
496
497	/* Point CR3 to 5-level paging */
498	leal	lvl5_pgtable(%ebx), %eax
499	movl	%eax, %cr3
500
501	/* Enable PAE and LA57 mode */
502	movl	%cr4, %eax
503	orl	$(X86_CR4_PAE | X86_CR4_LA57), %eax
504	movl	%eax, %cr4
505
506	/* Calculate address we are running at */
507	call	1f
5081:	popl	%edi
509	subl	$1b, %edi
510
511	/* Prepare stack for far return to Long Mode */
512	pushl	$__KERNEL_CS
513	leal	lvl5(%edi), %eax
514	push	%eax
515
516	/* Enable paging back */
517	movl	$(X86_CR0_PG | X86_CR0_PE), %eax
518	movl	%eax, %cr0
519
520	lret
521#endif
522
523no_longmode:
524	/* This isn't an x86-64 CPU so hang */
5251:
526	hlt
527	jmp     1b
528
529#include "../../kernel/verify_cpu.S"
530
531	.data
532gdt:
533	.word	gdt_end - gdt
534	.long	gdt
535	.word	0
536	.quad	0x00cf9a000000ffff	/* __KERNEL32_CS */
537	.quad	0x00af9a000000ffff	/* __KERNEL_CS */
538	.quad	0x00cf92000000ffff	/* __KERNEL_DS */
539	.quad	0x0080890000000000	/* TS descriptor */
540	.quad   0x0000000000000000	/* TS continued */
541gdt_end:
542
543#ifdef CONFIG_EFI_STUB
544efi_config:
545	.quad	0
546
547#ifdef CONFIG_EFI_MIXED
548	.global efi32_config
549efi32_config:
550	.fill	5,8,0
551	.quad	efi64_thunk
552	.byte	0
553#endif
554
555	.global efi64_config
556efi64_config:
557	.fill	5,8,0
558	.quad	efi_call
559	.byte	1
560#endif /* CONFIG_EFI_STUB */
561
562/*
563 * Stack and heap for uncompression
564 */
565	.bss
566	.balign 4
567boot_heap:
568	.fill BOOT_HEAP_SIZE, 1, 0
569boot_stack:
570	.fill BOOT_STACK_SIZE, 1, 0
571boot_stack_end:
572
573/*
574 * Space for page tables (not in .bss so not zeroed)
575 */
576	.section ".pgtable","a",@nobits
577	.balign 4096
578pgtable:
579	.fill BOOT_PGT_SIZE, 1, 0
580#ifdef CONFIG_X86_5LEVEL
581lvl5_pgtable:
582	.fill PAGE_SIZE, 1, 0
583#endif
584