blob: 07eff0ddeebbf893205625298d18c97315208362 [file] [log] [blame]
Stefan Reinauer38cd29e2009-08-11 21:28:25 +00001/*
2 * This file is part of the coreboot project.
3 *
Stefan Reinauer9839cbd2010-04-21 20:06:10 +00004 * Copyright (C) 2007 Advanced Micro Devices, Inc.
5 * Copyright (C) 2009-2010 coresystems GmbH
Stefan Reinauer38cd29e2009-08-11 21:28:25 +00006 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; version 2 of the License.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
Stefan Reinauer6c641ee2009-09-23 21:52:45 +000018 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA.
Stefan Reinauer38cd29e2009-08-11 21:28:25 +000019 */
20
21#include <device/pci.h>
22#include <string.h>
23
Stefan Reinauer38cd29e2009-08-11 21:28:25 +000024#include <arch/io.h>
Stefan Reinauer42dc7212009-10-24 00:47:07 +000025#include <arch/registers.h>
Stefan Reinauer38cd29e2009-08-11 21:28:25 +000026#include <console/console.h>
Libra Lic1436932009-12-23 19:16:47 +000027#include <arch/interrupt.h>
Stefan Reinauerc1efb902011-10-12 14:30:59 -070028#include <cbfs.h>
29#include <delay.h>
Stefan Reinauerb6b88712011-10-12 14:35:54 -070030#include <pc80/i8259.h>
Stefan Reinauer216fa462011-10-12 14:25:07 -070031#include "x86.h"
Stefan Reinauerc1efb902011-10-12 14:30:59 -070032#include "vbe.h"
Patrick Georgi3e77eb62012-11-22 10:39:16 +010033#include <lib/jpeg.h>
Patrick Georgi199b09c2012-11-22 12:46:12 +010034/* we use x86emu's register file representation */
35#include <x86emu/regs.h>
36
37/* to have a common register file for interrupt handlers */
38X86EMU_sysEnv _X86EMU_env;
Stefan Reinauer38cd29e2009-08-11 21:28:25 +000039
Stefan Reinauer841af5e2010-05-11 15:39:20 +000040void (*realmode_call)(u32 addr, u32 eax, u32 ebx, u32 ecx, u32 edx,
Stefan Reinauer399486e2012-12-06 13:54:29 -080041 u32 esi, u32 edi) asmlinkage =
Stefan Reinauerc1efb902011-10-12 14:30:59 -070042 (void *)&__realmode_call;
Stefan Reinauer841af5e2010-05-11 15:39:20 +000043
Stefan Reinauer5ff7c132011-10-31 12:56:45 -070044void (*realmode_interrupt)(u32 intno, u32 eax, u32 ebx, u32 ecx, u32 edx,
Stefan Reinauer399486e2012-12-06 13:54:29 -080045 u32 esi, u32 edi) asmlinkage =
Stefan Reinauerc1efb902011-10-12 14:30:59 -070046 (void *)&__realmode_interrupt;
Stefan Reinauer841af5e2010-05-11 15:39:20 +000047
Stefan Reinauer841af5e2010-05-11 15:39:20 +000048static void setup_rombios(void)
49{
50 const char date[] = "06/11/99";
51 memcpy((void *)0xffff5, &date, 8);
52
53 const char ident[] = "PCI_ISA";
54 memcpy((void *)0xfffd9, &ident, 7);
55
56 /* system model: IBM-AT */
57 write8(0xffffe, 0xfc);
58}
Stefan Reinauer38cd29e2009-08-11 21:28:25 +000059
Patrick Georgi199b09c2012-11-22 12:46:12 +010060static int (*intXX_handler[256])(void) = { NULL };
Stefan Reinauer38cd29e2009-08-11 21:28:25 +000061
Patrick Georgi199b09c2012-11-22 12:46:12 +010062static int intXX_exception_handler(void)
Stefan Reinauer38cd29e2009-08-11 21:28:25 +000063{
Patrick Georgi199b09c2012-11-22 12:46:12 +010064 /* compatibility shim */
65 struct eregs reg_info = {
66 .eax=X86_EAX,
67 .ecx=X86_ECX,
68 .edx=X86_EDX,
69 .ebx=X86_EBX,
70 .esp=X86_ESP,
71 .ebp=X86_EBP,
72 .esi=X86_ESI,
73 .edi=X86_EDI,
74 .vector=M.x86.intno,
75 .error_code=0, // FIXME: fill in
76 .eip=X86_EIP,
77 .cs=X86_CS,
78 .eflags=X86_EFLAGS
79 };
80 struct eregs *regs = &reg_info;
81
Stefan Reinauer14e22772010-04-27 06:56:47 +000082 printk(BIOS_INFO, "Oops, exception %d while executing option rom\n",
Stefan Reinauer38cd29e2009-08-11 21:28:25 +000083 regs->vector);
Stefan Reinauer14e22772010-04-27 06:56:47 +000084 x86_exception(regs); // Call coreboot exception handler
Stefan Reinauer38cd29e2009-08-11 21:28:25 +000085
Stefan Reinauerb6b88712011-10-12 14:35:54 -070086 return 0; // Never really returns
Stefan Reinauer38cd29e2009-08-11 21:28:25 +000087}
88
Patrick Georgi199b09c2012-11-22 12:46:12 +010089static int intXX_unknown_handler(void)
Stefan Reinauer38cd29e2009-08-11 21:28:25 +000090{
Myles Watsonf53eaa32010-09-09 14:42:58 +000091 printk(BIOS_INFO, "Unsupported software interrupt #0x%x eax 0x%x\n",
Patrick Georgi199b09c2012-11-22 12:46:12 +010092 M.x86.intno, X86_EAX);
Stefan Reinauer38cd29e2009-08-11 21:28:25 +000093
94 return -1;
95}
96
Libra Lic1436932009-12-23 19:16:47 +000097/* setup interrupt handlers for mainboard */
98void mainboard_interrupt_handlers(int intXX, void *intXX_func)
99{
100 intXX_handler[intXX] = intXX_func;
101}
102
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000103static void setup_interrupt_handlers(void)
104{
105 int i;
106
Stefan Reinauer14e22772010-04-27 06:56:47 +0000107 /* The first 16 intXX functions are not BIOS services,
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000108 * but the CPU-generated exceptions ("hardware interrupts")
109 */
110 for (i = 0; i < 0x10; i++)
111 intXX_handler[i] = &intXX_exception_handler;
Stefan Reinauer14e22772010-04-27 06:56:47 +0000112
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000113 /* Mark all other intXX calls as unknown first */
114 for (i = 0x10; i < 0x100; i++)
Libra Lic1436932009-12-23 19:16:47 +0000115 {
116 /* If the mainboard_interrupt_handler isn't called first.
117 */
118 if(!intXX_handler[i])
119 {
120 /* Now set the default functions that are actually
Stefan Reinauerc1efb902011-10-12 14:30:59 -0700121 * needed to initialize the option roms. This is
122 * very slick, as it allows us to implement mainboard
123 * specific interrupt handlers, such as the int15.
Libra Lic1436932009-12-23 19:16:47 +0000124 */
125 switch (i) {
Myles Watsonf53eaa32010-09-09 14:42:58 +0000126 case 0x10:
127 intXX_handler[0x10] = &int10_handler;
128 break;
Libra Lic1436932009-12-23 19:16:47 +0000129 case 0x12:
130 intXX_handler[0x12] = &int12_handler;
131 break;
Myles Watsonf53eaa32010-09-09 14:42:58 +0000132 case 0x16:
133 intXX_handler[0x16] = &int16_handler;
134 break;
Libra Lic1436932009-12-23 19:16:47 +0000135 case 0x1a:
136 intXX_handler[0x1a] = &int1a_handler;
137 break;
138 default:
139 intXX_handler[i] = &intXX_unknown_handler;
140 break;
141 }
142 }
143 }
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000144}
145
146static void write_idt_stub(void *target, u8 intnum)
147{
148 unsigned char *codeptr;
149 codeptr = (unsigned char *) target;
150 memcpy(codeptr, &__idt_handler, (size_t)&__idt_handler_size);
151 codeptr[3] = intnum; /* modify int# in the code stub. */
152}
153
154static void setup_realmode_idt(void)
155{
156 struct realmode_idt *idts = (struct realmode_idt *) 0;
157 int i;
158
159 /* Copy IDT stub code for each interrupt. This might seem wasteful
160 * but it is really simple
161 */
162 for (i = 0; i < 256; i++) {
163 idts[i].cs = 0;
164 idts[i].offset = 0x1000 + (i * (u32)&__idt_handler_size);
165 write_idt_stub((void *)((u32 )idts[i].offset), i);
166 }
167
168 /* Many option ROMs use the hard coded interrupt entry points in the
Stefan Reinauer14e22772010-04-27 06:56:47 +0000169 * system bios. So install them at the known locations.
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000170 */
Stefan Reinauer14e22772010-04-27 06:56:47 +0000171
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000172 /* int42 is the relocated int10 */
Stefan Reinauer714e2a12010-04-24 23:15:23 +0000173 write_idt_stub((void *)0xff065, 0x42);
Stefan Reinauer841af5e2010-05-11 15:39:20 +0000174 /* BIOS Int 11 Handler F000:F84D */
175 write_idt_stub((void *)0xff84d, 0x11);
176 /* BIOS Int 12 Handler F000:F841 */
177 write_idt_stub((void *)0xff841, 0x12);
178 /* BIOS Int 13 Handler F000:EC59 */
179 write_idt_stub((void *)0xfec59, 0x13);
180 /* BIOS Int 14 Handler F000:E739 */
181 write_idt_stub((void *)0xfe739, 0x14);
182 /* BIOS Int 15 Handler F000:F859 */
Stefan Reinauer14e22772010-04-27 06:56:47 +0000183 write_idt_stub((void *)0xff859, 0x15);
Stefan Reinauer841af5e2010-05-11 15:39:20 +0000184 /* BIOS Int 16 Handler F000:E82E */
185 write_idt_stub((void *)0xfe82e, 0x16);
186 /* BIOS Int 17 Handler F000:EFD2 */
187 write_idt_stub((void *)0xfefd2, 0x17);
188 /* ROM BIOS Int 1A Handler F000:FE6E */
189 write_idt_stub((void *)0xffe6e, 0x1a);
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000190}
191
Stefan Reinauerc1efb902011-10-12 14:30:59 -0700192#if CONFIG_FRAMEBUFFER_SET_VESA_MODE
Gabe Blackfb8632a2012-09-30 04:47:48 -0700193vbe_mode_info_t mode_info;
194static int mode_info_valid;
195
196int vbe_mode_info_valid(void)
197{
198 return mode_info_valid;
199}
200
201static u8 vbe_get_mode_info(vbe_mode_info_t * mi)
Stefan Reinauerc1efb902011-10-12 14:30:59 -0700202{
Stefan Reinauer01c3de92012-08-29 09:28:52 -0700203 printk(BIOS_DEBUG, "VBE: Getting information about VESA mode %04x\n",
Gabe Blackfb8632a2012-09-30 04:47:48 -0700204 mi->video_mode);
Stefan Reinauerc1efb902011-10-12 14:30:59 -0700205 char *buffer = (char *)&__buffer;
206 u16 buffer_seg = (((unsigned long)buffer) >> 4) & 0xff00;
207 u16 buffer_adr = ((unsigned long)buffer) & 0xffff;
208 realmode_interrupt(0x10, VESA_GET_MODE_INFO, 0x0000,
Gabe Blackfb8632a2012-09-30 04:47:48 -0700209 mi->video_mode, 0x0000, buffer_seg, buffer_adr);
210 memcpy(mi->mode_info_block, buffer, sizeof(vbe_mode_info_t));
211 mode_info_valid = 1;
Stefan Reinauerc1efb902011-10-12 14:30:59 -0700212 return 0;
213}
214
Gabe Blackfb8632a2012-09-30 04:47:48 -0700215static u8 vbe_set_mode(vbe_mode_info_t * mi)
Stefan Reinauerc1efb902011-10-12 14:30:59 -0700216{
Gabe Blackfb8632a2012-09-30 04:47:48 -0700217 printk(BIOS_DEBUG, "VBE: Setting VESA mode %04x\n", mi->video_mode);
Stefan Reinauerc1efb902011-10-12 14:30:59 -0700218 // request linear framebuffer mode
Gabe Blackfb8632a2012-09-30 04:47:48 -0700219 mi->video_mode |= (1 << 14);
Stefan Reinauerc1efb902011-10-12 14:30:59 -0700220 // request clearing of framebuffer
Gabe Blackfb8632a2012-09-30 04:47:48 -0700221 mi->video_mode &= ~(1 << 15);
222 realmode_interrupt(0x10, VESA_SET_MODE, mi->video_mode,
Stefan Reinauerc1efb902011-10-12 14:30:59 -0700223 0x0000, 0x0000, 0x0000, 0x0000);
224 return 0;
225}
226
Stefan Reinauerc1efb902011-10-12 14:30:59 -0700227/* These two functions could probably even be generic between
228 * yabel and x86 native. TBD later.
229 */
230void vbe_set_graphics(void)
231{
232 mode_info.video_mode = (1 << 14) | CONFIG_FRAMEBUFFER_VESA_MODE;
233 vbe_get_mode_info(&mode_info);
234 unsigned char *framebuffer =
Stefan Reinauerb6b88712011-10-12 14:35:54 -0700235 (unsigned char *)mode_info.vesa.phys_base_ptr;
Stefan Reinauer01c3de92012-08-29 09:28:52 -0700236 printk(BIOS_DEBUG, "VBE: resolution: %dx%d@%d\n",
237 le16_to_cpu(mode_info.vesa.x_resolution),
238 le16_to_cpu(mode_info.vesa.y_resolution),
239 mode_info.vesa.bits_per_pixel);
240 printk(BIOS_DEBUG, "VBE: framebuffer: %p\n", framebuffer);
241 if (!framebuffer) {
242 printk(BIOS_DEBUG, "VBE: Mode does not support linear "
243 "framebuffer\n");
244 return;
245 }
246
Stefan Reinauerc1efb902011-10-12 14:30:59 -0700247 vbe_set_mode(&mode_info);
248#if CONFIG_BOOTSPLASH
249 struct jpeg_decdata *decdata;
250 decdata = malloc(sizeof(*decdata));
Hung-Te Lin6fe0cab2013-01-22 18:57:56 +0800251 unsigned char *jpeg = cbfs_get_file_content(CBFS_DEFAULT_MEDIA,
252 "bootsplash.jpg",
253 CBFS_TYPE_BOOTSPLASH);
Stefan Reinauerc1efb902011-10-12 14:30:59 -0700254 if (!jpeg) {
Stefan Reinauer01c3de92012-08-29 09:28:52 -0700255 printk(BIOS_DEBUG, "VBE: No bootsplash found.\n");
Stefan Reinauerc1efb902011-10-12 14:30:59 -0700256 return;
257 }
258 int ret = 0;
259 ret = jpeg_decode(jpeg, framebuffer, 1024, 768, 16, decdata);
260#endif
261}
262
263void vbe_textmode_console(void)
264{
265 delay(2);
266 realmode_interrupt(0x10, 0x0003, 0x0000, 0x0000,
267 0x0000, 0x0000, 0x0000);
268}
269
270void fill_lb_framebuffer(struct lb_framebuffer *framebuffer)
271{
Stefan Reinauerb6b88712011-10-12 14:35:54 -0700272 framebuffer->physical_address = mode_info.vesa.phys_base_ptr;
Stefan Reinauerc1efb902011-10-12 14:30:59 -0700273
274 framebuffer->x_resolution = le16_to_cpu(mode_info.vesa.x_resolution);
275 framebuffer->y_resolution = le16_to_cpu(mode_info.vesa.y_resolution);
276 framebuffer->bytes_per_line =
277 le16_to_cpu(mode_info.vesa.bytes_per_scanline);
278 framebuffer->bits_per_pixel = mode_info.vesa.bits_per_pixel;
279
280 framebuffer->red_mask_pos = mode_info.vesa.red_mask_pos;
281 framebuffer->red_mask_size = mode_info.vesa.red_mask_size;
282
283 framebuffer->green_mask_pos = mode_info.vesa.green_mask_pos;
284 framebuffer->green_mask_size = mode_info.vesa.green_mask_size;
285
286 framebuffer->blue_mask_pos = mode_info.vesa.blue_mask_pos;
287 framebuffer->blue_mask_size = mode_info.vesa.blue_mask_size;
288
289 framebuffer->reserved_mask_pos = mode_info.vesa.reserved_mask_pos;
290 framebuffer->reserved_mask_size = mode_info.vesa.reserved_mask_size;
291}
292#endif
293
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000294void run_bios(struct device *dev, unsigned long addr)
295{
Stefan Reinauer841af5e2010-05-11 15:39:20 +0000296 u32 num_dev = (dev->bus->secondary << 8) | dev->path.pci.devfn;
297
Stefan Reinauerb6b88712011-10-12 14:35:54 -0700298 /* Setting up required hardware.
299 * Removing this will cause random illegal instruction exceptions
300 * in some option roms.
301 */
302 setup_i8259();
303
Stefan Reinauer841af5e2010-05-11 15:39:20 +0000304 /* Set up some legacy information in the F segment */
305 setup_rombios();
Libra Lic1436932009-12-23 19:16:47 +0000306
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000307 /* Set up C interrupt handlers */
308 setup_interrupt_handlers();
309
Stefan Reinauer841af5e2010-05-11 15:39:20 +0000310 /* Set up real-mode IDT */
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000311 setup_realmode_idt();
312
313 memcpy(REALMODE_BASE, &__realmode_code, (size_t)&__realmode_code_size);
314 printk(BIOS_SPEW, "Real mode stub @%p: %d bytes\n", REALMODE_BASE,
315 (u32)&__realmode_code_size);
316
317 printk(BIOS_DEBUG, "Calling Option ROM...\n");
Stefan Reinauer841af5e2010-05-11 15:39:20 +0000318 /* TODO ES:DI Pointer to System BIOS PnP Installation Check Structure */
319 /* Option ROM entry point is at OPROM start + 3 */
320 realmode_call(addr + 0x0003, num_dev, 0xffff, 0x0000, 0xffff, 0x0, 0x0);
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000321 printk(BIOS_DEBUG, "... Option ROM returned.\n");
Stefan Reinauerc1efb902011-10-12 14:30:59 -0700322
323#if CONFIG_FRAMEBUFFER_SET_VESA_MODE
324 vbe_set_graphics();
325#endif
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000326}
327
Stefan Reinauerd4814bd2011-04-21 20:45:45 +0000328#if CONFIG_GEODE_VSA
Stefan Reinauer9839cbd2010-04-21 20:06:10 +0000329#include <cpu/amd/lxdef.h>
330#include <cpu/amd/vr.h>
331#include <cbfs.h>
332
333#define VSA2_BUFFER 0x60000
334#define VSA2_ENTRY_POINT 0x60020
335
336// TODO move to a header file.
337void do_vsmbios(void);
338
339/* VSA virtual register helper */
340static u32 VSA_vrRead(u16 classIndex)
341{
342 u32 eax, ebx, ecx, edx;
343 asm volatile (
344 "movw $0x0AC1C, %%dx\n"
345 "orl $0x0FC530000, %%eax\n"
346 "outl %%eax, %%dx\n"
347 "addb $2, %%dl\n"
348 "inw %%dx, %%ax\n"
Stefan Reinauer14e22772010-04-27 06:56:47 +0000349 : "=a" (eax), "=b"(ebx), "=c"(ecx), "=d"(edx)
Stefan Reinauer9839cbd2010-04-21 20:06:10 +0000350 : "a"(classIndex)
351 );
352
353 return eax;
354}
355
356void do_vsmbios(void)
357{
358 printk(BIOS_DEBUG, "Preparing for VSA...\n");
359
Stefan Reinauer9839cbd2010-04-21 20:06:10 +0000360 /* Set up C interrupt handlers */
361 setup_interrupt_handlers();
362
363 /* Setting up realmode IDT */
364 setup_realmode_idt();
365
366 memcpy(REALMODE_BASE, &__realmode_code, (size_t)&__realmode_code_size);
367 printk(BIOS_SPEW, "VSA: Real mode stub @%p: %d bytes\n", REALMODE_BASE,
368 (u32)&__realmode_code_size);
369
Hung-Te Lin6fe0cab2013-01-22 18:57:56 +0800370 if ((unsigned int)cbfs_load_stage(CBFS_DEFAULT_MEDIA, "vsa") !=
371 VSA2_ENTRY_POINT) {
Stefan Reinauer9839cbd2010-04-21 20:06:10 +0000372 printk(BIOS_ERR, "Failed to load VSA.\n");
373 return;
374 }
375
376 unsigned char *buf = (unsigned char *)VSA2_BUFFER;
377 printk(BIOS_DEBUG, "VSA: Buffer @%p *[0k]=%02x\n", buf, buf[0]);
378 printk(BIOS_DEBUG, "VSA: Signature *[0x20-0x23] is %02x:%02x:%02x:%02x\n",
379 buf[0x20], buf[0x21], buf[0x22], buf[0x23]);
380
381 /* Check for code to emit POST code at start of VSA. */
382 if ((buf[0x20] != 0xb0) || (buf[0x21] != 0x10) ||
383 (buf[0x22] != 0xe6) || (buf[0x23] != 0x80)) {
384 printk(BIOS_WARNING, "VSA: Signature incorrect. Install failed.\n");
385 return;
386 }
387
388 printk(BIOS_DEBUG, "Calling VSA module...\n");
Stefan Reinauer841af5e2010-05-11 15:39:20 +0000389
Stefan Reinauer9839cbd2010-04-21 20:06:10 +0000390 /* ECX gets SMM, EDX gets SYSMEM */
Stefan Reinauer5ff7c132011-10-31 12:56:45 -0700391 realmode_call(VSA2_ENTRY_POINT, 0x0, 0x0, MSR_GLIU0_SMM,
Stefan Reinauer841af5e2010-05-11 15:39:20 +0000392 MSR_GLIU0_SYSMEM, 0x0, 0x0);
393
Stefan Reinauer9839cbd2010-04-21 20:06:10 +0000394 printk(BIOS_DEBUG, "... VSA module returned.\n");
395
396 /* Restart timer 1 */
397 outb(0x56, 0x43);
398 outb(0x12, 0x41);
399
400 /* Check that VSA is running OK */
401 if (VSA_vrRead(SIGNATURE) == VSA2_SIGNATURE)
402 printk(BIOS_DEBUG, "VSM: VSA2 VR signature verified.\n");
403 else
404 printk(BIOS_ERR, "VSM: VSA2 VR signature not valid. Install failed.\n");
405}
406#endif
407
Stefan Reinauer14e22772010-04-27 06:56:47 +0000408/* interrupt_handler() is called from assembler code only,
Stefan Reinauer9839cbd2010-04-21 20:06:10 +0000409 * so there is no use in putting the prototype into a header file.
410 */
Stefan Reinauer399486e2012-12-06 13:54:29 -0800411int asmlinkage interrupt_handler(u32 intnumber,
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000412 u32 gsfs, u32 dses,
413 u32 edi, u32 esi,
414 u32 ebp, u32 esp,
415 u32 ebx, u32 edx,
416 u32 ecx, u32 eax,
Uwe Hermann312673c2009-10-27 21:49:33 +0000417 u32 cs_ip, u16 stackflags);
418
Stefan Reinauer399486e2012-12-06 13:54:29 -0800419int asmlinkage interrupt_handler(u32 intnumber,
Uwe Hermann312673c2009-10-27 21:49:33 +0000420 u32 gsfs, u32 dses,
421 u32 edi, u32 esi,
422 u32 ebp, u32 esp,
423 u32 ebx, u32 edx,
424 u32 ecx, u32 eax,
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000425 u32 cs_ip, u16 stackflags)
426{
427 u32 ip;
428 u32 cs;
429 u32 flags;
Patrick Georgi503af722012-11-22 10:48:18 +0100430 int ret = 0;
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000431
432 ip = cs_ip & 0xffff;
433 cs = cs_ip >> 16;
434 flags = stackflags;
435
Myles Watson6c9bc012010-09-07 22:30:15 +0000436#if CONFIG_REALMODE_DEBUG
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000437 printk(BIOS_DEBUG, "oprom: INT# 0x%x\n", intnumber);
438 printk(BIOS_DEBUG, "oprom: eax: %08x ebx: %08x ecx: %08x edx: %08x\n",
439 eax, ebx, ecx, edx);
440 printk(BIOS_DEBUG, "oprom: ebp: %08x esp: %08x edi: %08x esi: %08x\n",
441 ebp, esp, edi, esi);
442 printk(BIOS_DEBUG, "oprom: ip: %04x cs: %04x flags: %08x\n",
443 ip, cs, flags);
Myles Watson6c9bc012010-09-07 22:30:15 +0000444#endif
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000445
Patrick Georgi199b09c2012-11-22 12:46:12 +0100446 // Fetch arguments from the stack and put them to a place
447 // suitable for the interrupt handlers
448 X86_EAX = eax;
449 X86_ECX = ecx;
450 X86_EDX = edx;
451 X86_EBX = ebx;
452 X86_ESP = esp;
453 X86_EBP = ebp;
454 X86_ESI = esi;
455 X86_EDI = edi;
456 M.x86.intno = intnumber;
457 /* TODO: error_code must be stored somewhere */
458 X86_EIP = ip;
459 X86_CS = cs;
460 X86_EFLAGS = flags;
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000461
462 // Call the interrupt handler for this int#
Patrick Georgi199b09c2012-11-22 12:46:12 +0100463 ret = intXX_handler[intnumber]();
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000464
465 // Put registers back on the stack. The assembler code
466 // will later pop them.
467 // What happens here is that we force (volatile!) changing
468 // the values of the parameters of this function. We do this
Stefan Reinauer14e22772010-04-27 06:56:47 +0000469 // because we know that they stay alive on the stack after
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000470 // we leave this function. Don't say this is bollocks.
Patrick Georgi199b09c2012-11-22 12:46:12 +0100471 *(volatile u32 *)&eax = X86_EAX;
472 *(volatile u32 *)&ecx = X86_ECX;
473 *(volatile u32 *)&edx = X86_EDX;
474 *(volatile u32 *)&ebx = X86_EBX;
475 *(volatile u32 *)&esi = X86_ESI;
476 *(volatile u32 *)&edi = X86_EDI;
477 flags = X86_EFLAGS;
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000478
Patrick Georgi503af722012-11-22 10:48:18 +0100479 /* Pass success or error back to our caller via the CARRY flag */
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000480 if (ret) {
Patrick Georgi503af722012-11-22 10:48:18 +0100481 flags &= ~1; // no error: clear carry
482 }else{
Stefan Reinauerf75b19a2010-04-22 18:15:32 +0000483 printk(BIOS_DEBUG,"int%02x call returned error.\n", intnumber);
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000484 flags |= 1; // error: set carry
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000485 }
486 *(volatile u16 *)&stackflags = flags;
487
Patrick Georgi503af722012-11-22 10:48:18 +0100488 /* The assembler code doesn't actually care for the return value,
489 * but keep it around so its expectations are met */
Stefan Reinauer38cd29e2009-08-11 21:28:25 +0000490 return ret;
491}
492