Chinaunix首页 | 论坛 | 博客
  • 博客访问: 372306
  • 博文数量: 64
  • 博客积分: 2975
  • 博客等级: 少校
  • 技术积分: 831
  • 用 户 组: 普通用户
  • 注册时间: 2007-01-14 10:59
文章存档

2014年(2)

2012年(7)

2010年(40)

2009年(5)

2008年(8)

2007年(2)

分类: LINUX

2012-07-16 16:45:24

main->copy_boot_params

    /* First, copy the boot header into the "zeropage" */
    copy_boot_params();

复制启动参数到hdr中
static void copy_boot_params(void)
{
    struct old_cmdline {
        u16 cl_magic;
        u16 cl_offset;
    };
    const struct old_cmdline * const oldcmd =
        (const struct old_cmdline *)OLD_CL_ADDRESS;// 0x020

    BUILD_BUG_ON(sizeof boot_params != 4096);
    memcpy(&boot_params.hdr, &hdr, sizeof hdr);//hdr在header.S中定义

    if (!boot_params.hdr.cmd_line_ptr &&//cmd_line_ptr == 0x99000
        oldcmd->cl_magic == OLD_CL_MAGIC) {
        /* Old-style command line protocol. */
        u16 cmdline_seg;

        /* Figure out if the command line falls in the region
           of memory that an old kernel would have copied up
           to 0x90000... */
        if (oldcmd->cl_offset < boot_params.hdr.setup_move_size)
            cmdline_seg = ds();
        else
            cmdline_seg = 0x9000;

        boot_params.hdr.cmd_line_ptr =
            (cmdline_seg << 4) + oldcmd->cl_offset;
    }
}

有用的就两行
    BUILD_BUG_ON(sizeof boot_params != 4096);
    memcpy(&boot_params.hdr, &hdr, sizeof hdr);//hdr在header.S中定义

BUILD_BUG_ON是一个宏
#define BUILD_BUG_ON(condition) ((void)sizeof(char[1 - 2*!!(condition)]))
如果条件为真则引起一个编译时错误。
因为(void)sizeof(char[-1])将触发 error: size of unnamed array is negative编译错误
(void)的作用是避免触发warning: statement with no effect [-Wunused-value]编译警告

hdr的声明在boot.h中
extern struct setup_header hdr;
定义在header.S中


接下来调用init_heap
main->init_heap
static void init_heap(void)
{
    char *stack_end;
//header.S中movw    $GRUB_LINUX_SETUP_STACK, %sp #0x9000,一直到后面的0x9100处是command line

    if (boot_params.hdr.loadflags & CAN_USE_HEAP) {//条件为true,参考grub
        asm("leal %P1(%%esp),%0"
            : "=r" (stack_end) : "i" (-STACK_SIZE));// 512栈大小
// leal -512(%esp),%eax           
//没有P,则会生成leal $-512(%esp),%eax,出错
//stack_end指向栈底
        heap_end = (char *)
            ((size_t)boot_params.hdr.heap_end_ptr + 0x200);// heap_end_ptr=0x9000-0x200,见grub
        if (heap_end > stack_end)//超过栈底,
            heap_end = stack_end;
    } else {
        /* Boot protocol 2.00 only, no heap available */
        puts("WARNING: Ancient bootloader, some functionality "
             "may be limited!\n");
    }
}

到此,可以归纳出实模式下的内存组织
0x9000:x00000----------------------
              bootsect.S
0x9000:0x0200----------------------_start
              setup.S

                             
      -----------------------------__bss_start

             未初始化区                            
       ------------------------------_end
              临时堆                    
       ------------------------------heap_end
            临时栈(512B)
0x9000:0x9000---------------------- 栈底
             cmdline(256B)
0x9000:0x9100______________________


main->detect_memory->detect_memory_e820
使用系统中断获得系统内存配置情况

#define SMAP    0x534d4150    /* ASCII "SMAP" */

static int detect_memory_e820(void)
{
    int count = 0;
    struct biosregs ireg, oreg;
    struct e820entry *desc = boot_params.e820_map;
    static struct e820entry buf; /* static so it is zeroed */
/*
Input: 
        EAX     功能代码    0XE820 
        EBX     继续信息    包含获取下一块物理内存的继续值,这一值是由上一次调用返回的,如果是第一次调用,则为0 
        ES:DI   缓冲区指针   指向 BIOS 要填写的地址描述符结构体 
        ECX     缓冲区大小   传入 BIOS 结构体字节数,BIOS 和调用者支持最小为 20 字节。 
        EDX     标识符     'SMAP' -  核实 BIOS 正确版本的标识 
     
    Output: 
        CF      进位标志    无进位标志表明没有错误 
        EAX     标识符     'SMAP' - 核实 BIOS 正确版本的标识 
        ES:DI   缓冲区指针   返回地址描述符缓冲区指针,与输入相同 
        ECX     缓冲区大小   传入 BIOS 结构体字节数,与输入相同 
        EBX     继续信息    包含得到下一地址描述符的继续值。为了迭代调用E820 获得下一地址描述符,调用者必须传入 
                            不经改变的继续值。返回值为 0 表示这是最后一个地址描述符。 
*/
    initregs(&ireg);
    ireg.ax  = 0xe820;
    ireg.cx  = sizeof buf;
    ireg.edx = SMAP;
    ireg.di  = (size_t)&buf;

    /*
     * Note: at least one BIOS is known which assumes that the
     * buffer pointed to by one e820 call is the same one as
     * the previous call, and only changes modified fields.  Therefore,
     * we use a temporary buffer and copy the results entry by entry.
     *
     * This routine deliberately does not try to account for
     * ACPI 3+ extended attributes.  This is because there are
     * BIOSes in the field which report zero for the valid bit for
     * all ranges, and we don't currently make any use of the
     * other attribute bits.  Revisit this if we see the extended
     * attribute bits deployed in a meaningful way in the future.
     */

    do {
        intcall(0x15, &ireg, &oreg);//在bioscall.S中
        ireg.ebx = oreg.ebx; /* for next iteration...下次循环需要这个值 */

        /* BIOSes which terminate the chain with CF = 1 as opposed对照
           to %ebx = 0 don't always report the SMAP signature on
           the final, failing, probe. */
        if (oreg.eflags & X86_EFLAGS_CF)//出错
            break;

        /* Some BIOSes stop returning SMAP in the middle of
           the search loop.  We don't know exactly how the BIOS
           screwed up the map at that point, we might have a
           partial map, the full map, or complete garbage, so
           just return failure. */
        if (oreg.eax != SMAP) {
            count = 0;
            break;
        }

        *desc++ = buf;//复制到boot_params
        count++;
    } while (ireg.ebx && count < ARRAY_SIZE(boot_params.e820_map));

    return boot_params.e820_entries = count;//赋值
}


main的最后一步是调用go_to_protected_mode,进入保护模式,不再返回
/*
 * Actual invocation sequence
 */
void go_to_protected_mode(void)
{
    /* Hook before leaving real mode, also disables interrupts */
    realmode_switch_hook();

    /* Enable the A20 gate */
    if (enable_a20()) {
        puts("A20 gate not responding, unable to boot...\n");
        die();
    }

    /* Reset coprocessor (IGNNE#) */
    reset_coprocessor();

    /* Mask all interrupts in the PIC */
    mask_all_interrupts();

    /* Actual transition to protected mode... */
    setup_idt();
    setup_gdt();
    //在pmjump.S中
    protected_mode_jump(boot_params.hdr.code32_start,
                (u32)&boot_params + (ds() << 4));
}

setup_idt,中断描述符表指向空描述符
/*
 * Set up the IDT
 */
static void setup_idt(void)
{
    static const struct gdt_ptr null_idt = {0, 0};
    asm volatile("lidtl %0" : : "m" (null_idt));
}

static void setup_gdt(void)
{
    /* There are machines which are known to not boot with the GDT
       being 8-byte unaligned.  Intel recommends 16 byte alignment. */
    static const u64 boot_gdt[] //__attribute__((aligned(16)))
    = {
        /* CS: code, read/execute, 4 GB, base 0 */
        [GDT_ENTRY_BOOT_CS] = GDT_ENTRY(0xc09b, 0, 0xfffff),
        /* DS: data, read/write, 4 GB, base 0 */
        [GDT_ENTRY_BOOT_DS] = GDT_ENTRY(0xc093, 0, 0xfffff),
        /* TSS: 32-bit tss, 104 bytes, base 4096 */
        /* We only have a TSS here to keep Intel VT happy;
           we don't actually use it for anything. */
        [GDT_ENTRY_BOOT_TSS] = GDT_ENTRY(0x0089, 4096, 103),
    };
    /* Xen HVM incorrectly stores a pointer to the gdt_ptr, instead
       of the gdt_ptr contents.  Thus, make it static so it will
       stay in memory, at least long enough that we switch to the
       proper kernel GDT. */
    static struct gdt_ptr gdt;

    gdt.len = sizeof(boot_gdt)-1;
    gdt.ptr = (u32)&boot_gdt + (ds() << 4);

    asm volatile("lgdtl %0" : : "m" (gdt));
}

临时GDT表中有四个描述符,NULL,BOOT_CS,BOOT_DS,BOOT_TSS

最后执行protected_mode_jump
    //在pmjump.S中
    protected_mode_jump(boot_params.hdr.code32_start,
                (u32)&boot_params + (ds() << 4));

code32_start值为0x100000,后一个表达式计算boot_params的线性地址

/* ----------------------------------------------------------------------- *
 *
 *   Copyright (C) 1991, 1992 Linus Torvalds
 *   Copyright 2007 rPath, Inc. - All Rights Reserved
 *
 *   This file is part of the Linux kernel, and is made available under
 *   the terms of the GNU General Public License version 2.
 *
 * ----------------------------------------------------------------------- */

/*
 * The actual transition into protected mode
 */

#include
#include
#include
#include

    .text
    .code16 #现在还是16位模式

/*
 * void protected_mode_jump(u32 entrypoint, u32 bootparams);
 */
GLOBAL(protected_mode_jump)
    movl    %edx, %esi        # Pointer to boot_params table

    xorl    %ebx, %ebx
    movw    %cs, %bx
    shll    $4, %ebx #0x90000
    addl    %ebx, 2f#计算in_pm32的线性地址
    jmp    1f            # Short jump to serialize on 386/486
1:

    movw    $__BOOT_DS, %cx
    movw    $__BOOT_TSS, %di

    movl    %cr0, %edx
    orb    $X86_CR0_PE, %dl    # Protected mode 置保护位
    movl    %edx, %cr0

    # Transition to 32-bit mode 进入32位保护模式
    .byte    0x66, 0xea        # ljmpl opcode
2:    .long    in_pm32            # offset
    .word    __BOOT_CS        # segment
ENDPROC(protected_mode_jump)

    .code32 #现在是32位模式
    .section ".text32","ax"
GLOBAL(in_pm32)
    # Set up data segments for flat 32-bit mode
    movl    %ecx, %ds #都指向BOOT_DS
    movl    %ecx, %es
    movl    %ecx, %fs
    movl    %ecx, %gs
    movl    %ecx, %ss
    # The 32-bit code sets up its own stack, but this way we do have
    # a valid stack if some debugging hack wants to use it.
    addl    %ebx, %esp #调整esp,高位怎么办? 保证是0? header.S中    movzwl    %dx, %esp    # Clear upper half of %esp 0x9000

    # Set up TR to make Intel VT happy
    ltr    %di #记载TR

    # Clear registers to allow for future extensions to the
    # 32-bit boot protocol
    #eax中存放code32_start
    #esi存放boot_params
    xorl    %ecx, %ecx #清空寄存器
    xorl    %edx, %edx
    xorl    %ebx, %ebx
    xorl    %ebp, %ebp
    xorl    %edi, %edi

    # Set up LDTR to make Intel VT happy
    lldt    %cx #ldt执行NULL描述符

    jmpl    *%eax            # Jump to the 32-bit entrypoint 跳到0x100000
ENDPROC(in_pm32)

main的任务结束
阅读(2481) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~