File: startup32.S

package info (click to toggle)
memtest86%2B 6.10-4
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 1,532 kB
  • sloc: ansic: 19,267; asm: 2,027; makefile: 367; sh: 134
file content (820 lines) | stat: -rw-r--r-- 16,557 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
// SPDX-License-Identifier: GPL-2.0
//
// startup32.S contains the 32-bit startup code for both the BSP and APs.
// It initialises stacks, memory management, and exception handling, clears
// the BSS, completes relocation, and finally calls the main application.
// It supports the 32-bit Linux boot protocol and EFI boot for the first
// boot of the BSP.
//
// Copyright (C) 2020-2022 Martin Whitaker.
//
// Derived from memtest86+ head.S:
//
// linux/boot/head.S
// Copyright (C) 1991, 1992  Linus Torvalds
// 1-Jan-96 Modified by Chris Brady for use as a boot/loader for MemTest-86.
// Set up the memory management for flat non-paged linear addressing.
// 17 May 2004 : Added X86_PWRCAP for AMD64 (Memtest86+ - Samuel D.)

#define __ASSEMBLY__

#include "boot.h"

#define	INT64_CS	0x08

#define NUM_INT_VEC	20

	.text
	.code32

# The Linux 32-bit boot entry point.

	.globl	startup32
startup32:
	cld
	cli

	# Jump to the shared 32-bit entry point with the boot params pointer
	# in %esi and the startup address in %edi.

	movl	0x214(%esi), %ebx	# bootparams.code32_start
	leal	(startup - startup32)(%ebx), %edi
	jmp	startup

# The Linux 32-bit EFI handover point.

	.org	0x10
	.globl	efi_handover
efi_handover:
	popl	%eax			# the return address (discard)
	popl	%ecx			# the EFI image handle
	popl	%edx			# the EFI system table pointer
	popl	%esi			# the boot params pointer

	# Load the GOT pointer.

	call	0f
0:	popl	%ebx
	addl	$_GLOBAL_OFFSET_TABLE_+[.-0b], %ebx

	# Fill out the boot params structure.

	subl	$12, %esp		# align the stack
	andl	$~0xf, %esp
	addl	$12, %esp

	pushl	%esi			# the boot params pointer
	pushl	%edx			# the EFI system table pointer
	pushl	%ecx			# the EFI image handle

	call	efi_setup

	# Fall through to the shared 32-bit entry point with the boot params
	# pointer in %esi and the startup address in %edi.

	movl	%eax, %esi
	movl	0x214(%esi), %ebx	# bootparams.code32_start
	leal	(startup - startup32)(%ebx), %edi

# The 32-bit entry point for AP boot and for restart after relocation.

	.globl	startup
startup:
	# Some of the startup actions are not thread safe. Use a mutex
	# to protect this section of code.

	leal	(startup_mutex - startup)(%edi), %eax
0: lock btsl	$0, (%eax)
	jc	0b

	# Use the startup stack until we pick the correct one.

	leal	(startup_stack_top - startup)(%edi), %esp

	# Load the GOT pointer.

	call	0f
0:	popl	%ebx
	addl	$_GLOBAL_OFFSET_TABLE_+[.-0b], %ebx

	# If first boot, save the boot params pointer...

	cmpl	$1, first_boot@GOTOFF(%ebx)
	jne	1f
	movl	%esi, boot_params_addr@GOTOFF(%ebx)

	# ...and check if the processor supports long mode.

	movl	$0x80000000, %eax	# check if function 0x80000001 is available
	pushl	%ebx			# ebx is overwritten by cpuid
	cpuid
	popl	%ebx			# restore ebx
	cmpl	$0x80000001, %eax
	jb	1f
	movl	$0x80000001, %eax	# test the LM flag
	pushl	%ebx			# ebx is overwritten by cpuid
	cpuid
	popl	%ebx			# restore ebx
	andl	$0x20000000, %edx
	jz	1f
	movl	$1, use_long_mode@GOTOFF(%ebx)
1:

	# Pick the correct stack.

	call	smp_my_cpu_num
	movl	$AP_STACK_SIZE, %edx
	mul	%edx
	addl	$(BSP_STACK_SIZE - LOCALS_SIZE), %eax
	leal	_stacks@GOTOFF(%ebx), %esp
	addl	%eax, %esp

	# Initialise the GDT descriptor.

	leal	gdt@GOTOFF(%ebx), %eax
	movl	%eax, 2 + gdt_descr@GOTOFF(%ebx)

	# Load the GDT and the segment registers.

	lgdt	gdt_descr@GOTOFF(%ebx)
	leal	flush@GOTOFF(%ebx), %eax
	movw	$KERNEL_CS, -2(%esp)
	movl	%eax, -6(%esp)
	ljmp	*-6(%esp)
flush:	movw	$KERNEL_DS, %ax
	movw	%ax, %ds
	movw	%ax, %es
	movw	%ax, %fs
	movw	%ax, %gs
	movw	%ax, %ss

	# Initialise the IDT. If we are going to operate in long mode, we need
	# a 64-bit IDT, otherwise we need a 32-bit IDT.

	leal	idt@GOTOFF(%ebx), %edi
	cmpl	$1, use_long_mode@GOTOFF(%ebx)
	je	init_idt64
	jmp	init_idt32

	# Initialise the IDT descriptor.

init_idt_descr:
	movw	%ax, idt_descr@GOTOFF(%ebx)
	leal	idt@GOTOFF(%ebx), %eax
	movl	%eax, 2 + idt_descr@GOTOFF(%ebx)

	# Load the IDT.

	lidt	idt_descr@GOTOFF(%ebx)

	# Zero the BSS (if first boot).

	cmpl	$1, first_boot@GOTOFF(%ebx)
	jne	1f
	xorl	%eax, %eax
	leal	_bss@GOTOFF(%ebx), %edi
	leal	_end@GOTOFF(%ebx), %ecx
	subl	%edi, %ecx
0:	movl	%eax, (%edi)
	addl	$4, %edi
	subl	$4, %ecx
	jnz	0b
	movl	$0, first_boot@GOTOFF(%ebx)
1:
	# Initialise the FPU.

	finit

	# Call the dynamic linker to fix up the addresses in the GOT.

	call	reloc

	# Disable paging (needed during restart). Also disable write protect
	# (in case set by EFI boot).

	movl	%cr0, %eax
	andl	$0x7ffeffff, %eax
	movl	%eax, %cr0

	# Enable PAE if supported.

	pushl	%ebx			# ebx is overwritten by cpuid
	movl	$0x00000001, %eax	# test the PAE flag
	cpuid
	andl	$0x00000040, %edx
	popl	%ebx			# restore ebx
	jz	1f			# bail if not supported

	movl	%cr4, %eax		# enable PAE
	orl	$0x00000020, %eax
	movl	%eax, %cr4

	leal	pdp@GOTOFF(%ebx), %eax	# set the page directory base address
	movl	%eax, %cr3

	# Enable long mode if supported.

	cmpl	$1, use_long_mode@GOTOFF(%ebx)
	jne	0f

	movl	$0xc0000080, %ecx	# enable long mode
	rdmsr
	orl	$0x00000100, %eax
	wrmsr

	leal	pml4@GOTOFF(%ebx), %eax # set the page directory base address
	movl	%eax, %cr3

	# Enable paging and protection.

0:	movl	%cr0, %eax
	orl	$0x80000001, %eax
	movl	%eax, %cr0
1:
	# Release the startup mutex.

	movl	$0, startup_mutex@GOTOFF(%ebx)

	# Run the application.

	call	main

	# In case we return, simulate an exception.

	pushfl
	pushl	%cs
	call	0f
0:	pushl	$0	# error code
	pushl	$257	# vector
	jmp	int_handler32

# The EFI PE32 boot entry point.

	.org	0x1e0
	.globl	efi_boot
efi_boot:
	popl	%eax			# the return address (discard)
	popl	%ecx			# the EFI image handle
	popl	%edx			# the EFI system table pointer

	pushl	$0			# the boot params pointer (0 = not yet allocated)
	pushl	%edx			# the EFI system table pointer
	pushl	%ecx			# the EFI image handle

	call	efi_handover		# never returns

# Initialise the 64-bit IDT.

init_idt64:
	leal	vec64_0@GOTOFF(%ebx), %esi
	movw	$NUM_INT_VEC, %cx
0:	movl	%esi, %edx
	movl	$(INT64_CS << 16), %eax
	movw	%dx, %ax		# selector = 0x0008 = long mode cs
	movw	$0x8E00, %dx		# interrupt gate - dpl=0, present
	movl	%eax, (%edi)
	movl	%edx, 4(%edi)
	addl	$(vec64_1-vec64_0), %esi
	addl	$16, %edi
	dec	%cx
	jnz	0b

	movw	$(NUM_INT_VEC*16 - 1), %ax
	jmp	init_idt_descr

# Initialise the 32-bit IDT.

init_idt32:
	leal	vec32_0@GOTOFF(%ebx), %esi
	movw	$NUM_INT_VEC, %cx
0:	movl	%esi, %edx
	movl	$(KERNEL_CS << 16), %eax
	movw	%dx, %ax		# selector = 0x0010 = cs
	movw	$0x8E00, %dx		# interrupt gate - dpl=0, present
	movl	%eax, (%edi)
	movl	%edx, 4(%edi)
	addl	$(vec32_1-vec32_0), %esi
	addl	$8, %edi
	dec	%cx
	jnz	0b

	movw	$(NUM_INT_VEC*8 - 1), %ax
	jmp	init_idt_descr

# Individual interrupt vector handlers for long mode. These need to be
# spaced equally, to allow the IDT initialisation loop above to work,
# so we use noops to pad out where required.

	.code64

vec64_0:
	pushq	$0	# error code
	pushq	$0	# vector
	jmp	int_handler64

vec64_1:
	pushq	$0	# error code
	pushq	$1	# vector
	jmp	int_handler64

vec64_2:
	pushq	$0	# error code
	pushq	$2	# vector
	jmp	int_handler64

vec64_3:
	pushq	$0	# error code
	pushq	$3	# vector
	jmp	int_handler64

vec64_4:
	pushq	$0	# error code
	pushq	$4	# vector
	jmp	int_handler64

vec64_5:
	pushq	$0	# error code
	pushq	$5	# vector
	jmp	int_handler64

vec64_6:
	pushq	$0	# error code
	pushq	$6	# vector
	jmp	int_handler64

vec64_7:
	pushq	$0	# error code
	pushq	$7	# vector
	jmp	int_handler64

vec64_8:
	nop;nop 	# error code already provided
	pushq	$8	# vector
	jmp	int_handler64

vec64_9:
	pushq	$0	# error code
	pushq	$9	# vector
	jmp	int_handler64

vec64_10:
	nop;nop 	# error code already provided
	pushq	$10	# vector
	jmp	int_handler64

vec64_11:
	nop;nop 	# error code already provided
	pushq	$11	# vector
	jmp	int_handler64

vec64_12:
	nop;nop 	# error code already provided
	pushq	$12	# vector
	jmp	int_handler64

vec64_13:
	nop;nop 	# error code already provided
	pushq	$13	# vector
	jmp	int_handler64

vec64_14:
	nop;nop 	# error code already provided
	pushq	$14	# vector
	jmp	int_handler64

vec64_15:
	pushq	$0	# error code
	pushq	$15	# vector
	jmp	int_handler64

vec64_16:
	pushq	$0	# error code
	pushq	$16	# vector
	jmp	int_handler64

vec64_17:
	nop;nop 	# error code
	pushq	$17	# vector
	jmp	int_handler64

vec64_18:
	pushq	$0	# error code
	pushq	$18	# vector
	jmp	int_handler64

vec64_19:
	pushq	$0	# error code
	pushq	$19	# vector
	jmp	int_handler64

# The interrupt handler code for long mode. Pass the register state to the
# common interrupt handler. On entry this expects the stack to contain:
#
#	rsp+30	ss
#	rsp+28	rsp
#	rsp+20	rflags
#	rsp+18	cs
#	rsp+10	rip
#	rsp+08	error code
#	rsp+00	vector number
#
# We create a new stack frame in the format expected by int_handler. We can
# reuse the space currently occupied by the vector number and the error code,
# as they are not needed on return.

int_handler64:
	subq	$16, %rsp
	movl	%ebp, 0x04(%rsp)	# save the state of ebp
	leal	0x48(%rsp), %ebp	# save the state of esp before the interrupt
	movl	%ebp, 0x00(%rsp)
	movl	0x10(%rsp), %ebp	# save the vector number
	movl	%ebp, 0x08(%rsp)
	movl	0x18(%rsp), %ebp	# save the error code
	movl	%ebp, 0x0c(%rsp)
	movl	0x20(%rsp), %ebp	# save the state of eip
	movl	%ebp, 0x10(%rsp)
	movl	0x28(%rsp), %ebp	# save the state of cs
	movl	%ebp, 0x14(%rsp)
	movl	0x30(%rsp), %ebp	# save the state of eflags
	movl	%ebp, 0x18(%rsp)
	leal	int_handler(%rip), %ebp
	movw	$KERNEL_CS, -2(%rsp)
	movl	%ebp, -6(%rsp)
	lcall	*-6(%rsp)
	movl	0x04(%rsp), %ebp	# restore the saved state of ebp
	addq	$32, %rsp		# discard the stack frame we created
	iretq

# Individual interrupt vector handlers for protected mode. These need to be
# spaced equally, to allow the IDT initialisation loop above to work, so we
# use noops to pad out where required.

	.code32

vec32_0:
	pushl	$0	# error code
	pushl	$0	# vector
	jmp	int_handler32

vec32_1:
	pushl	$0	# error code
	pushl	$1	# vector
	jmp	int_handler32

vec32_2:
	pushl	$0	# error code
	pushl	$2	# vector
	jmp	int_handler32

vec32_3:
	pushl	$0	# error code
	pushl	$3	# vector
	jmp	int_handler32

vec32_4:
	pushl	$0	# error code
	pushl	$4	# vector
	jmp	int_handler32

vec32_5:
	pushl	$0	# error code
	pushl	$5	# vector
	jmp	int_handler32

vec32_6:
	pushl	$0	# error code
	pushl	$6	# vector
	jmp	int_handler32

vec32_7:
	pushl	$0	# error code
	pushl	$7	# vector
	jmp	int_handler32

vec32_8:
	nop;nop 	# error code already provided
	pushl	$8	# vector
	jmp	int_handler32

vec32_9:
	pushl	$0	# error code
	pushl	$9	# vector
	jmp	int_handler32

vec32_10:
	nop;nop 	# error code already provided
	pushl	$10	# vector
	jmp	int_handler32

vec32_11:
	nop;nop 	# error code already provided
	pushl	$11	# vector
	jmp	int_handler32

vec32_12:
	nop;nop 	# error code already provided
	pushl	$12	# vector
	jmp	int_handler32

vec32_13:
	nop;nop 	# error code already provided
	pushl	$13	# vector
	jmp	int_handler32

vec32_14:
	nop;nop 	# error code already provided
	pushl	$14	# vector
	jmp	int_handler32

vec32_15:
	pushl	$0	# error code
	pushl	$15	# vector
	jmp	int_handler32

vec32_16:
	pushl	$0	# error code
	pushl	$16	# vector
	jmp	int_handler32

vec32_17:
	nop;nop 	# error code
	pushl	$17	# vector
	jmp	int_handler32

vec32_18:
	pushl	$0	# error code
	pushl	$18	# vector
	jmp	int_handler32

vec32_19:
	pushl	$0	# error code
	pushl	$19	# vector
	jmp	int_handler32

# The interrupt handler code for protected mode. Pass the register state to
# the common interrupt handler. On entry this expects the stack to contain:
#
#	esp+10	eflags
#	esp+0c	cs
#	esp+08	eip
#	esp+04	error code
#	esp+00	vector number
#
# It adds the additional state expected by int_handler to the bottom of the
# stack frame.

int_handler32:
	pushl	%ebp		# save the state of ebp
	leal	24(%esp), %ebp	# save the state of esp before the interrupt
	pushl	%ebp
	leal	int_handler@GOTOFF(%ebx), %ebp
	movw	$KERNEL_CS, -2(%esp)
	movl	%ebp, -6(%esp)
	lcall	*-6(%esp)
	popl	%ebp		# discard the saved state of esp
	popl	%ebp		# restore the saved state of ebp
	addl	$8, %esp	# discard the vector number and error code
	iret

# The common interrupt handler code. Pass the register state to the application
# interrupt handler. On entry this expects the stack to contain:
#
#	esp+18	eflags
#	esp+14	cs
#	esp+10	eip
#	esp+0c	error code
#	esp+08	vector number
#	esp+04	ebp
#	esp+00	esp
#
# It adds the additional state expected by the application to the bottom of the
# stack frame.

int_handler:
	pushl	%esi
	pushl	%edi
	pushl	%edx
	pushl	%ecx
	pushl	%ebx
	pushl	%eax
	pushl	%ss
	pushl	%es
	pushl	%ds
	pushl	%esp		# pointer to trap regs struct on the stack
	cld
	call	interrupt
	addl	$16, %esp
	popl	%eax
	popl	%ebx
	popl	%ecx
	popl	%edx
	popl	%edi
	popl	%esi
	lret

# The interrupt descriptor table, used for both long mode and protected mode.

	.align	4
	.word	0			# for alignment
	.globl	idt_descr
idt_descr:
	.word	0			# size: filled in at run time
	.quad	0			# addr: filled in at run time

	.align	8
	.globl	idt
idt:
	.fill	2*NUM_INT_VEC, 8, 0	# filled in at run time
idt_end:

# The global descriptor table.

	.align	4
	.word	0			# for alignment
gdt_descr:
	.word	gdt_end - gdt - 1	# size
	.long	0			# addr: filled in at run time

	.align	4
	.globl	gdt
gdt:
	.quad	0x0000000000000000	# NULL descriptor
	.quad	0x00209a0000000000	# 0x08 64-bit code at 0x000000
	.quad	0x00cf9a000000ffff	# 0x10 main 4gb code at 0x000000
	.quad	0x00cf92000000ffff	# 0x18 main 4gb data at 0x000000

	.globl	gdt_end
gdt_end:

	.data

	.macro	ptes64 start, count=64
	.quad	\start + 0x0000000 + 0x83
	.quad	\start + 0x0200000 + 0x83
	.quad	\start + 0x0400000 + 0x83
	.quad	\start + 0x0600000 + 0x83
	.quad	\start + 0x0800000 + 0x83
	.quad	\start + 0x0A00000 + 0x83
	.quad	\start + 0x0C00000 + 0x83
	.quad	\start + 0x0E00000 + 0x83
	.if \count-1
	ptes64	"(\start+0x01000000)",\count-1
	.endif
	.endm

	.macro	maxdepth depth=1
	.if \depth-1
	maxdepth \depth-1
	.endif
	.endm

	maxdepth

# The long mode level 4 page map table.

	.align	4096
	.globl	pml4
pml4:
	.long	pdp + 0x3		# relocated at run time
	.long	0

# Page Directory Pointer Table:
# 4 Entries, pointing to the Page Directory Tables.

	.align	4096
	.globl	pdp
pdp:
	.long	pd0 + 0x1		# relocated at run time
	.long	0
	.long	pd1 + 0x1		# relocated at run time
	.long	0
	.long	pd2 + 0x1		# relocated at run time
	.long	0
	.long	pd3 + 0x1		# relocated at run time
	.long	0

# Page Directory Tables:
# There are 4 tables. The first two map the first 2 GB of memory. The third
# is used with PAE to map the rest of memory in 1 GB segments. The fourth is
# reserved for mapping the video frame buffer. We use 2 MB pages so only the
# Page Directory Table is used (no page tables).

	.align	4096
	.globl	pd0
pd0:
	ptes64	0x0000000000000000

	.align	4096
	.globl	pd1
pd1:
	ptes64	0x0000000040000000

	.align	4096
	.globl	pd2
pd2:
	ptes64	0x0000000080000000

	.align	4096
	.globl	pd3
pd3:
	ptes64	0x00000000C0000000

	.previous

# ap_trampoline is the entry point for CPUs other than the bootstrap
# CPU (BSP). It gets copied to a page in low memory, to enable the APs
# to boot when the main program has been loaded in high memory.

	.code16
	.align	4

	.globl	ap_trampoline
ap_trampoline:
	movw	%cs, %ax
	movw	%ax, %ds

	# Load the startup address and use it to patch the jump address.

	movl	(ap_startup_addr - ap_trampoline), %edi
	movl	%edi, (ap_jump - ap_trampoline + 2)

	# Patch and load the GDT descriptor. It should point to the main
	# GDT descriptor, which has already been initialised by the BSP.

	movl	%edi, %eax
	addl	$(gdt - startup), %eax
	movl	%eax, (ap_gdt_descr - ap_trampoline + 2)
data32	lgdt	ap_gdt_descr - ap_trampoline

	# Switch to protected mode and reload the segment registers.

	movl	%cr0, %eax
	orl	$1, %eax
	movl	%eax, %cr0
	jmp	ap_flush
ap_flush:
	movw	$KERNEL_DS, %ax
	movw	%ax, %ds
	movw	%ax, %es
	movw	%ax, %fs
	movw	%ax, %gs
	movw	%ax, %ss

	# Jump to the main entry point with the startup address in %edi.
ap_jump:
data32	ljmp	$KERNEL_CS, $0

	.align	4
	.word	0			# for alignment
ap_gdt_descr:
	.word	gdt_end - gdt - 1	# gdt limit
	.long	0			# gdt base - filled in at run time

	.globl	ap_startup_addr
ap_startup_addr:
	.long	0			# filled in at run time

	.globl	ap_trampoline_end
ap_trampoline_end:

	.previous

# Variables.

	.data
	.align	4

	.globl	boot_params_addr
boot_params_addr:
	.long	0

startup_mutex:
	.long	0

first_boot:
	.long	1

use_long_mode:
	.long	0

	.previous

# Startup stack.

	.bss
	.align	16

startup_stack_base:
	. = . + 64
startup_stack_top:

	.previous

# Main stack area.

	.section    ".stacks", "aw", @nobits
	.align  16

	. = . + STACKS_SIZE

	.previous