2 * Copyright (c) 2003-2010 Apple Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
30 * Here's what to do if you want to add a new routine to the comm page:
32 * 1. Add a definition for it's address in osfmk/i386/cpu_capabilities.h,
33 * being careful to reserve room for future expansion.
35 * 2. Write one or more versions of the routine, each with it's own
36 * commpage_descriptor. The tricky part is getting the "special",
37 * "musthave", and "canthave" fields right, so that exactly one
38 * version of the routine is selected for every machine.
39 * The source files should be in osfmk/i386/commpage/.
41 * 3. Add a ptr to your new commpage_descriptor(s) in the "routines"
42 * array in osfmk/i386/commpage/commpage_asm.s. There are two
43 * arrays, one for the 32-bit and one for the 64-bit commpage.
45 * 4. Write the code in Libc to use the new routine.
48 #include <mach/mach_types.h>
49 #include <mach/machine.h>
50 #include <mach/vm_map.h>
51 #include <mach/mach_vm.h>
52 #include <mach/machine.h>
53 #include <i386/cpuid.h>
55 #include <i386/rtclock_protos.h>
56 #include <i386/cpu_data.h>
57 #include <i386/machine_routines.h>
58 #include <i386/misc_protos.h>
59 #include <i386/cpuid.h>
60 #include <machine/cpu_capabilities.h>
61 #include <machine/commpage.h>
62 #include <machine/pmap.h>
63 #include <vm/vm_kern.h>
64 #include <vm/vm_map.h>
66 #include <ipc/ipc_port.h>
68 #include <kern/page_decrypt.h>
69 #include <kern/processor.h>
71 #include <sys/kdebug.h>
73 /* the lists of commpage routines are in commpage_asm.s */
74 extern commpage_descriptor
* commpage_32_routines
[];
75 extern commpage_descriptor
* commpage_64_routines
[];
77 extern vm_map_t commpage32_map
; // the shared submap, set up in vm init
78 extern vm_map_t commpage64_map
; // the shared submap, set up in vm init
79 extern vm_map_t commpage_text32_map
; // the shared submap, set up in vm init
80 extern vm_map_t commpage_text64_map
; // the shared submap, set up in vm init
83 char *commPagePtr32
= NULL
; // virtual addr in kernel map of 32-bit commpage
84 char *commPagePtr64
= NULL
; // ...and of 64-bit commpage
85 char *commPageTextPtr32
= NULL
; // virtual addr in kernel map of 32-bit commpage
86 char *commPageTextPtr64
= NULL
; // ...and of 64-bit commpage
88 uint64_t _cpu_capabilities
= 0; // define the capability vector
90 typedef uint32_t commpage_address_t
;
92 static commpage_address_t next
; // next available address in comm page
94 static char *commPagePtr
; // virtual addr in kernel map of commpage we are working on
95 static commpage_address_t commPageBaseOffset
; // subtract from 32-bit runtime address to get offset in virtual commpage in kernel map
97 static commpage_time_data
*time_data32
= NULL
;
98 static commpage_time_data
*time_data64
= NULL
;
100 decl_simple_lock_data(static,commpage_active_cpus_lock
);
102 /* Allocate the commpage and add to the shared submap created by vm:
103 * 1. allocate a page in the kernel map (RW)
105 * 3. make a memory entry out of it
106 * 4. map that entry into the shared comm region map (R-only)
111 vm_map_t submap
, // commpage32_map or commpage_map64
112 size_t area_used
, // _COMM_PAGE32_AREA_USED or _COMM_PAGE64_AREA_USED
115 vm_offset_t kernel_addr
= 0; // address of commpage in kernel map
116 vm_offset_t zero
= 0;
117 vm_size_t size
= area_used
; // size actually populated
118 vm_map_entry_t entry
;
123 panic("commpage submap is null");
125 if ((kr
= vm_map(kernel_map
,&kernel_addr
,area_used
,0,VM_FLAGS_ANYWHERE
,NULL
,0,FALSE
,VM_PROT_ALL
,VM_PROT_ALL
,VM_INHERIT_NONE
)))
126 panic("cannot allocate commpage %d", kr
);
128 if ((kr
= vm_map_wire(kernel_map
,kernel_addr
,kernel_addr
+area_used
,VM_PROT_DEFAULT
,FALSE
)))
129 panic("cannot wire commpage: %d", kr
);
132 * Now that the object is created and wired into the kernel map, mark it so that no delay
133 * copy-on-write will ever be performed on it as a result of mapping it into user-space.
134 * If such a delayed copy ever occurred, we could remove the kernel's wired mapping - and
135 * that would be a real disaster.
137 * JMM - What we really need is a way to create it like this in the first place.
139 if (!(kr
= vm_map_lookup_entry( kernel_map
, vm_map_trunc_page(kernel_addr
, VM_MAP_PAGE_MASK(kernel_map
)), &entry
) || entry
->is_sub_map
))
140 panic("cannot find commpage entry %d", kr
);
141 entry
->object
.vm_object
->copy_strategy
= MEMORY_OBJECT_COPY_NONE
;
143 if ((kr
= mach_make_memory_entry( kernel_map
, // target map
145 kernel_addr
, // offset (address in kernel map)
146 uperm
, // protections as specified
147 &handle
, // this is the object handle we get
148 NULL
))) // parent_entry (what is this?)
149 panic("cannot make entry for commpage %d", kr
);
151 if ((kr
= vm_map_64( submap
, // target map (shared submap)
152 &zero
, // address (map into 1st page in submap)
155 VM_FLAGS_FIXED
, // flags (it must be 1st page in submap)
156 handle
, // port is the memory entry we just made
157 0, // offset (map 1st page in memory entry)
159 uperm
, // cur_protection (R-only in user map)
160 uperm
, // max_protection
161 VM_INHERIT_SHARE
))) // inheritance
162 panic("cannot map commpage %d", kr
);
164 ipc_port_release(handle
);
165 /* Make the kernel mapping non-executable. This cannot be done
166 * at the time of map entry creation as mach_make_memory_entry
167 * cannot handle disjoint permissions at this time.
169 kr
= vm_protect(kernel_map
, kernel_addr
, area_used
, FALSE
, VM_PROT_READ
| VM_PROT_WRITE
);
170 assert (kr
== KERN_SUCCESS
);
172 return (void*)(intptr_t)kernel_addr
; // return address in kernel map
175 /* Get address (in kernel map) of a commpage field. */
179 commpage_address_t addr_at_runtime
)
181 return (void*) ((uintptr_t)commPagePtr
+ (addr_at_runtime
- commPageBaseOffset
));
184 /* Determine number of CPUs on this system. We cannot rely on
185 * machine_info.max_cpus this early in the boot.
188 commpage_cpus( void )
192 cpus
= ml_get_max_cpus(); // NB: this call can block
195 panic("commpage cpus==0");
202 /* Initialize kernel version of _cpu_capabilities vector (used by KEXTs.) */
205 commpage_init_cpu_capabilities( void )
209 ml_cpu_info_t cpu_info
;
212 ml_cpu_get_info(&cpu_info
);
214 switch (cpu_info
.vector_unit
) {
225 bits
|= kHasSupplementalSSE3
;
241 switch (cpu_info
.cache_line_size
) {
254 cpus
= commpage_cpus(); // how many CPUs do we have
256 bits
|= (cpus
<< kNumCPUsShift
);
258 bits
|= kFastThreadLocalStorage
; // we use %gs for TLS
260 #define setif(_bits, _bit, _condition) \
261 if (_condition) _bits |= _bit
263 setif(bits
, kUP
, cpus
== 1);
264 setif(bits
, k64Bit
, cpu_mode_is64bit());
265 setif(bits
, kSlow
, tscFreq
<= SLOW_TSC_THRESHOLD
);
267 setif(bits
, kHasAES
, cpuid_features() &
269 setif(bits
, kHasF16C
, cpuid_features() &
271 setif(bits
, kHasRDRAND
, cpuid_features() &
272 CPUID_FEATURE_RDRAND
);
273 setif(bits
, kHasFMA
, cpuid_features() &
276 setif(bits
, kHasBMI1
, cpuid_leaf7_features() &
277 CPUID_LEAF7_FEATURE_BMI1
);
278 setif(bits
, kHasBMI2
, cpuid_leaf7_features() &
279 CPUID_LEAF7_FEATURE_BMI2
);
280 setif(bits
, kHasRTM
, cpuid_leaf7_features() &
281 CPUID_LEAF7_FEATURE_RTM
);
282 setif(bits
, kHasHLE
, cpuid_leaf7_features() &
283 CPUID_LEAF7_FEATURE_HLE
);
284 setif(bits
, kHasAVX2_0
, cpuid_leaf7_features() &
285 CPUID_LEAF7_FEATURE_AVX2
);
286 setif(bits
, kHasRDSEED
, cpuid_features() &
287 CPUID_LEAF7_FEATURE_RDSEED
);
288 setif(bits
, kHasADX
, cpuid_features() &
289 CPUID_LEAF7_FEATURE_ADX
);
291 uint64_t misc_enable
= rdmsr64(MSR_IA32_MISC_ENABLE
);
292 setif(bits
, kHasENFSTRG
, (misc_enable
& 1ULL) &&
293 (cpuid_leaf7_features() &
294 CPUID_LEAF7_FEATURE_ERMS
));
296 _cpu_capabilities
= bits
; // set kernel version for use by drivers etc
299 /* initialize the approx_time_supported flag and set the approx time to 0.
300 * Called during initial commpage population.
303 commpage_mach_approximate_time_init(void)
305 char *cp
= commPagePtr32
;
308 #ifdef CONFIG_MACH_APPROXIMATE_TIME
314 cp
+= (_COMM_PAGE_APPROX_TIME_SUPPORTED
- _COMM_PAGE32_BASE_ADDRESS
);
315 *(boolean_t
*)cp
= supported
;
319 cp
+= (_COMM_PAGE_APPROX_TIME_SUPPORTED
- _COMM_PAGE32_START_ADDRESS
);
320 *(boolean_t
*)cp
= supported
;
322 commpage_update_mach_approximate_time(0);
327 _get_cpu_capabilities(void)
329 return _cpu_capabilities
;
332 /* Copy data into commpage. */
336 commpage_address_t address
,
340 void *dest
= commpage_addr_of(address
);
343 panic("commpage overlap at address 0x%p, 0x%x < 0x%x", dest
, address
, next
);
345 bcopy(source
,dest
,length
);
347 next
= address
+ length
;
350 /* Copy a routine into comm page if it matches running machine.
353 commpage_stuff_routine(
354 commpage_descriptor
*rd
)
356 commpage_stuff(rd
->commpage_address
,rd
->code_address
,rd
->code_length
);
359 /* Fill in the 32- or 64-bit commpage. Called once for each.
363 commpage_populate_one(
364 vm_map_t submap
, // commpage32_map or compage64_map
365 char ** kernAddressPtr
, // &commPagePtr32 or &commPagePtr64
366 size_t area_used
, // _COMM_PAGE32_AREA_USED or _COMM_PAGE64_AREA_USED
367 commpage_address_t base_offset
, // will become commPageBaseOffset
368 commpage_time_data
** time_data
, // &time_data32 or &time_data64
369 const char* signature
, // "commpage 32-bit" or "commpage 64-bit"
377 short version
= _COMM_PAGE_THIS_VERSION
;
380 commPagePtr
= (char *)commpage_allocate( submap
, (vm_size_t
) area_used
, uperm
);
381 *kernAddressPtr
= commPagePtr
; // save address either in commPagePtr32 or 64
382 commPageBaseOffset
= base_offset
;
384 *time_data
= commpage_addr_of( _COMM_PAGE_TIME_DATA_START
);
386 /* Stuff in the constants. We move things into the comm page in strictly
387 * ascending order, so we can check for overlap and panic if so.
388 * Note: the 32-bit cpu_capabilities vector is retained in addition to
389 * the expanded 64-bit vector.
391 commpage_stuff(_COMM_PAGE_SIGNATURE
,signature
,(int)MIN(_COMM_PAGE_SIGNATURELEN
, strlen(signature
)));
392 commpage_stuff(_COMM_PAGE_CPU_CAPABILITIES64
,&_cpu_capabilities
,sizeof(_cpu_capabilities
));
393 commpage_stuff(_COMM_PAGE_VERSION
,&version
,sizeof(short));
394 commpage_stuff(_COMM_PAGE_CPU_CAPABILITIES
,&_cpu_capabilities
,sizeof(uint32_t));
397 if (_cpu_capabilities
& kCache64
)
399 else if (_cpu_capabilities
& kCache128
)
401 commpage_stuff(_COMM_PAGE_CACHE_LINESIZE
,&c2
,2);
404 commpage_stuff(_COMM_PAGE_SPIN_COUNT
,&c4
,4);
406 /* machine_info valid after ml_get_max_cpus() */
407 c1
= machine_info
.physical_cpu_max
;
408 commpage_stuff(_COMM_PAGE_PHYSICAL_CPUS
,&c1
,1);
409 c1
= machine_info
.logical_cpu_max
;
410 commpage_stuff(_COMM_PAGE_LOGICAL_CPUS
,&c1
,1);
412 c8
= ml_cpu_cache_size(0);
413 commpage_stuff(_COMM_PAGE_MEMORY_SIZE
, &c8
, 8);
415 cfamily
= cpuid_info()->cpuid_cpufamily
;
416 commpage_stuff(_COMM_PAGE_CPUFAMILY
, &cfamily
, 4);
418 if (next
> _COMM_PAGE_END
)
419 panic("commpage overflow: next = 0x%08x, commPagePtr = 0x%p", next
, commPagePtr
);
424 /* Fill in commpages: called once, during kernel initialization, from the
425 * startup thread before user-mode code is running.
427 * See the top of this file for a list of what you have to do to add
428 * a new routine to the commpage.
432 commpage_populate( void )
434 commpage_init_cpu_capabilities();
436 commpage_populate_one( commpage32_map
,
438 _COMM_PAGE32_AREA_USED
,
439 _COMM_PAGE32_BASE_ADDRESS
,
444 pmap_commpage32_init((vm_offset_t
) commPagePtr32
, _COMM_PAGE32_BASE_ADDRESS
,
445 _COMM_PAGE32_AREA_USED
/INTEL_PGBYTES
);
447 time_data64
= time_data32
; /* if no 64-bit commpage, point to 32-bit */
449 if (_cpu_capabilities
& k64Bit
) {
450 commpage_populate_one( commpage64_map
,
452 _COMM_PAGE64_AREA_USED
,
453 _COMM_PAGE32_START_ADDRESS
, /* commpage address are relative to 32-bit commpage placement */
458 pmap_commpage64_init((vm_offset_t
) commPagePtr64
, _COMM_PAGE64_BASE_ADDRESS
,
459 _COMM_PAGE64_AREA_USED
/INTEL_PGBYTES
);
463 simple_lock_init(&commpage_active_cpus_lock
, 0);
465 commpage_update_active_cpus();
466 commpage_mach_approximate_time_init();
467 rtc_nanotime_init_commpage();
468 commpage_update_kdebug_enable();
471 /* Fill in the common routines during kernel initialization.
472 * This is called before user-mode code is running.
474 void commpage_text_populate( void ){
475 commpage_descriptor
**rd
;
478 commPagePtr
= (char *) commpage_allocate(commpage_text32_map
, (vm_size_t
) _COMM_PAGE_TEXT_AREA_USED
, VM_PROT_READ
| VM_PROT_EXECUTE
);
479 commPageTextPtr32
= commPagePtr
;
481 char *cptr
= commPagePtr
;
483 for(; i
< _COMM_PAGE_TEXT_AREA_USED
; i
++){
487 commPageBaseOffset
= _COMM_PAGE_TEXT_START
;
488 for (rd
= commpage_32_routines
; *rd
!= NULL
; rd
++) {
489 commpage_stuff_routine(*rd
);
493 pmap_commpage32_init((vm_offset_t
) commPageTextPtr32
, _COMM_PAGE_TEXT_START
,
494 _COMM_PAGE_TEXT_AREA_USED
/INTEL_PGBYTES
);
497 if (_cpu_capabilities
& k64Bit
) {
499 commPagePtr
= (char *) commpage_allocate(commpage_text64_map
, (vm_size_t
) _COMM_PAGE_TEXT_AREA_USED
, VM_PROT_READ
| VM_PROT_EXECUTE
);
500 commPageTextPtr64
= commPagePtr
;
503 for(i
=0; i
<_COMM_PAGE_TEXT_AREA_USED
; i
++){
507 for (rd
= commpage_64_routines
; *rd
!=NULL
; rd
++) {
508 commpage_stuff_routine(*rd
);
512 pmap_commpage64_init((vm_offset_t
) commPageTextPtr64
, _COMM_PAGE_TEXT_START
,
513 _COMM_PAGE_TEXT_AREA_USED
/INTEL_PGBYTES
);
517 if (next
> _COMM_PAGE_TEXT_END
)
518 panic("commpage text overflow: next=0x%08x, commPagePtr=%p", next
, commPagePtr
);
522 /* Update commpage nanotime information.
524 * This routine must be serialized by some external means, ie a lock.
528 commpage_set_nanotime(
534 commpage_time_data
*p32
= time_data32
;
535 commpage_time_data
*p64
= time_data64
;
536 static uint32_t generation
= 0;
539 if (p32
== NULL
) /* have commpages been allocated yet? */
542 if ( generation
!= p32
->nt_generation
)
543 panic("nanotime trouble 1"); /* possibly not serialized */
544 if ( ns_base
< p32
->nt_ns_base
)
545 panic("nanotime trouble 2");
546 if ((shift
!= 0) && ((_cpu_capabilities
& kSlow
)==0) )
547 panic("nanotime trouble 3");
549 next_gen
= ++generation
;
551 next_gen
= ++generation
;
553 p32
->nt_generation
= 0; /* mark invalid, so commpage won't try to use it */
554 p64
->nt_generation
= 0;
556 p32
->nt_tsc_base
= tsc_base
;
557 p64
->nt_tsc_base
= tsc_base
;
559 p32
->nt_ns_base
= ns_base
;
560 p64
->nt_ns_base
= ns_base
;
562 p32
->nt_scale
= scale
;
563 p64
->nt_scale
= scale
;
565 p32
->nt_shift
= shift
;
566 p64
->nt_shift
= shift
;
568 p32
->nt_generation
= next_gen
; /* mark data as valid */
569 p64
->nt_generation
= next_gen
;
573 /* Disable commpage gettimeofday(), forcing commpage to call through to the kernel. */
576 commpage_disable_timestamp( void )
578 time_data32
->gtod_generation
= 0;
579 time_data64
->gtod_generation
= 0;
583 /* Update commpage gettimeofday() information. As with nanotime(), we interleave
584 * updates to the 32- and 64-bit commpage, in order to keep time more nearly in sync
585 * between the two environments.
587 * This routine must be serializeed by some external means, ie a lock.
591 commpage_set_timestamp(
595 commpage_time_data
*p32
= time_data32
;
596 commpage_time_data
*p64
= time_data64
;
597 static uint32_t generation
= 0;
600 next_gen
= ++generation
;
602 next_gen
= ++generation
;
604 p32
->gtod_generation
= 0; /* mark invalid, so commpage won't try to use it */
605 p64
->gtod_generation
= 0;
607 p32
->gtod_ns_base
= abstime
;
608 p64
->gtod_ns_base
= abstime
;
610 p32
->gtod_sec_base
= secs
;
611 p64
->gtod_sec_base
= secs
;
613 p32
->gtod_generation
= next_gen
; /* mark data as valid */
614 p64
->gtod_generation
= next_gen
;
618 /* Update _COMM_PAGE_MEMORY_PRESSURE. Called periodically from vm's compute_memory_pressure() */
621 commpage_set_memory_pressure(
622 unsigned int pressure
)
629 cp
+= (_COMM_PAGE_MEMORY_PRESSURE
- _COMM_PAGE32_BASE_ADDRESS
);
630 ip
= (uint32_t*) (void *) cp
;
631 *ip
= (uint32_t) pressure
;
636 cp
+= (_COMM_PAGE_MEMORY_PRESSURE
- _COMM_PAGE32_START_ADDRESS
);
637 ip
= (uint32_t*) (void *) cp
;
638 *ip
= (uint32_t) pressure
;
644 /* Update _COMM_PAGE_SPIN_COUNT. We might want to reduce when running on a battery, etc. */
647 commpage_set_spin_count(
653 if (count
== 0) /* we test for 0 after decrement, not before */
658 cp
+= (_COMM_PAGE_SPIN_COUNT
- _COMM_PAGE32_BASE_ADDRESS
);
659 ip
= (uint32_t*) (void *) cp
;
660 *ip
= (uint32_t) count
;
665 cp
+= (_COMM_PAGE_SPIN_COUNT
- _COMM_PAGE32_START_ADDRESS
);
666 ip
= (uint32_t*) (void *) cp
;
667 *ip
= (uint32_t) count
;
672 /* Updated every time a logical CPU goes offline/online */
674 commpage_update_active_cpus(void)
677 volatile uint8_t *ip
;
679 /* At least 32-bit commpage must be initialized */
683 simple_lock(&commpage_active_cpus_lock
);
686 cp
+= (_COMM_PAGE_ACTIVE_CPUS
- _COMM_PAGE32_BASE_ADDRESS
);
687 ip
= (volatile uint8_t*) cp
;
688 *ip
= (uint8_t) processor_avail_count
;
692 cp
+= (_COMM_PAGE_ACTIVE_CPUS
- _COMM_PAGE32_START_ADDRESS
);
693 ip
= (volatile uint8_t*) cp
;
694 *ip
= (uint8_t) processor_avail_count
;
697 simple_unlock(&commpage_active_cpus_lock
);
701 * Update the commpage data with the value of the "kdebug_enable"
702 * global so that userspace can avoid trapping into the kernel
703 * for kdebug_trace() calls. Serialization is handled
704 * by the caller in bsd/kern/kdebug.c.
707 commpage_update_kdebug_enable(void)
709 volatile uint32_t *saved_data_ptr
;
714 cp
+= (_COMM_PAGE_KDEBUG_ENABLE
- _COMM_PAGE32_BASE_ADDRESS
);
715 saved_data_ptr
= (volatile uint32_t *)cp
;
716 *saved_data_ptr
= kdebug_enable
;
721 cp
+= (_COMM_PAGE_KDEBUG_ENABLE
- _COMM_PAGE32_START_ADDRESS
);
722 saved_data_ptr
= (volatile uint32_t *)cp
;
723 *saved_data_ptr
= kdebug_enable
;
729 * update the commpage data for last known value of mach_absolute_time()
733 commpage_update_mach_approximate_time(uint64_t abstime
)
735 #ifdef CONFIG_MACH_APPROXIMATE_TIME
741 cp
+= (_COMM_PAGE_APPROX_TIME
- _COMM_PAGE32_BASE_ADDRESS
);
742 saved_data
= *(uint64_t *)cp
;
743 if (saved_data
< abstime
) {
744 /* ignoring the success/fail return value assuming that
745 * if the value has been updated since we last read it,
746 * "someone" has a newer timestamp than us and ours is
748 OSCompareAndSwap64(saved_data
, abstime
, (uint64_t *)cp
);
753 cp
+= (_COMM_PAGE_APPROX_TIME
- _COMM_PAGE32_START_ADDRESS
);
754 saved_data
= *(uint64_t *)cp
;
755 if (saved_data
< abstime
) {
756 /* ignoring the success/fail return value assuming that
757 * if the value has been updated since we last read it,
758 * "someone" has a newer timestamp than us and ours is
760 OSCompareAndSwap64(saved_data
, abstime
, (uint64_t *)cp
);
764 #pragma unused (abstime)
769 extern user32_addr_t commpage_text32_location
;
770 extern user64_addr_t commpage_text64_location
;
772 /* Check to see if a given address is in the Preemption Free Zone (PFZ) */
775 commpage_is_in_pfz32(uint32_t addr32
)
777 if ( (addr32
>= (commpage_text32_location
+ _COMM_TEXT_PFZ_START_OFFSET
))
778 && (addr32
< (commpage_text32_location
+_COMM_TEXT_PFZ_END_OFFSET
))) {
786 commpage_is_in_pfz64(addr64_t addr64
)
788 if ( (addr64
>= (commpage_text64_location
+ _COMM_TEXT_PFZ_START_OFFSET
))
789 && (addr64
< (commpage_text64_location
+ _COMM_TEXT_PFZ_END_OFFSET
))) {