2 * Copyright (c) 2000-2012 Apple Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
32 * Mach Operating System
33 * Copyright (c) 1991,1990 Carnegie Mellon University
34 * All Rights Reserved.
36 * Permission to use, copy, modify and distribute this software and its
37 * documentation is hereby granted, provided that both the copyright
38 * notice and this permission notice appear in all copies of the
39 * software, derivative works or modified versions, and any portions
40 * thereof, and that both notices appear in supporting documentation.
42 * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS"
43 * CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR
44 * ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
46 * Carnegie Mellon requests users of this software to return to
48 * Software Distribution Coordinator or Software.Distribution@CS.CMU.EDU
49 * School of Computer Science
50 * Carnegie Mellon University
51 * Pittsburgh PA 15213-3890
53 * any improvements or extensions that they make and grant Carnegie Mellon
54 * the rights to redistribute these changes.
60 #include <kern/cpu_number.h>
61 #include <kern/kalloc.h>
62 #include <kern/cpu_data.h>
63 #include <mach/mach_types.h>
64 #include <mach/machine.h>
65 #include <mach/vm_map.h>
66 #include <mach/machine/vm_param.h>
67 #include <vm/vm_kern.h>
68 #include <vm/vm_map.h>
70 #include <i386/bit_routines.h>
71 #include <i386/mp_desc.h>
72 #include <i386/misc_protos.h>
74 #include <i386/pmap.h>
75 #include <i386/postcode.h>
76 #include <i386/pmap_internal.h>
78 #include <i386/machine_check.h>
81 #include <kern/misc_protos.h>
84 #include <kern/monotonic.h>
85 #endif /* MONOTONIC */
86 #include <san/kasan.h>
88 #define K_INTR_GATE (ACC_P|ACC_PL_K|ACC_INTR_GATE)
89 #define U_INTR_GATE (ACC_P|ACC_PL_U|ACC_INTR_GATE)
91 // Declare macros that will declare the externs
92 #define TRAP(n, name) extern void *name ;
93 #define TRAP_ERR(n, name) extern void *name ;
94 #define TRAP_SPC(n, name) extern void *name ;
95 #define TRAP_IST1(n, name) extern void *name ;
96 #define TRAP_IST2(n, name) extern void *name ;
97 #define INTERRUPT(n) extern void *_intr_ ## n ;
98 #define USER_TRAP(n, name) extern void *name ;
99 #define USER_TRAP_SPC(n, name) extern void *name ;
101 // Include the table to declare the externs
102 #include "../x86_64/idt_table.h"
104 // Undef the macros, then redefine them so we can declare the table
114 #define TRAP(n, name) \
123 #define TRAP_ERR TRAP
124 #define TRAP_SPC TRAP
126 #define TRAP_IST1(n, name) \
135 #define TRAP_IST2(n, name) \
144 #define INTERRUPT(n) \
146 (uintptr_t)&_intr_ ## n,\
153 #define USER_TRAP(n, name) \
162 #define USER_TRAP_SPC USER_TRAP
164 // Declare the table using the macros we just set up
165 struct fake_descriptor64 master_idt64
[IDTSZ
]
166 __attribute__ ((section("__HIB,__desc")))
167 __attribute__ ((aligned(PAGE_SIZE
))) = {
168 #include "../x86_64/idt_table.h"
172 * First cpu`s interrupt stack.
174 extern uint32_t low_intstack
[]; /* bottom */
175 extern uint32_t low_eintstack
[]; /* top */
178 * Per-cpu data area pointers.
179 * The master cpu (cpu 0) has its data area statically allocated;
180 * others are allocated dynamically and this array is updated at runtime.
182 static cpu_data_t cpu_data_master
= {
183 .cpu_this
= &cpu_data_master
,
184 .cpu_nanotime
= &pal_rtc_nanotime_info
,
185 .cpu_int_stack_top
= (vm_offset_t
) low_eintstack
,
187 cpu_data_t
*cpu_data_ptr
[MAX_CPUS
] = { [0] = &cpu_data_master
};
189 decl_simple_lock_data(,ncpus_lock
); /* protects real_ncpus */
190 unsigned int real_ncpus
= 1;
191 unsigned int max_ncpus
= MAX_CPUS
;
193 extern void hi64_sysenter(void);
194 extern void hi64_syscall(void);
197 * Multiprocessor i386/i486 systems use a separate copy of the
198 * GDT, IDT, LDT, and kernel TSS per processor. The first three
199 * are separate to avoid lock contention: the i386 uses locked
200 * memory cycles to access the descriptor tables. The TSS is
201 * separate since each processor needs its own kernel stack,
202 * and since using a TSS marks it busy.
206 * Allocate and initialize the per-processor descriptor tables.
210 * This is the expanded, 64-bit variant of the kernel LDT descriptor.
211 * When switching to 64-bit mode this replaces KERNEL_LDT entry
212 * and the following empty slot. This enables the LDT to be referenced
213 * in the uber-space remapping window on the kernel.
215 struct fake_descriptor64 kernel_ldt_desc64
= {
217 LDTSZ_MIN
*sizeof(struct fake_descriptor
)-1,
219 ACC_P
|ACC_PL_K
|ACC_LDT
,
224 * This is the expanded, 64-bit variant of the kernel TSS descriptor.
225 * It is follows pattern of the KERNEL_LDT.
227 struct fake_descriptor64 kernel_tss_desc64
= {
229 sizeof(struct x86_64_tss
)-1,
231 ACC_P
|ACC_PL_K
|ACC_TSS
,
236 * Convert a descriptor from fake to real format.
238 * Fake descriptor format:
239 * bytes 0..3 base 31..0
240 * bytes 4..5 limit 15..0
241 * byte 6 access byte 2 | limit 19..16
242 * byte 7 access byte 1
244 * Real descriptor format:
245 * bytes 0..1 limit 15..0
246 * bytes 2..3 base 15..0
248 * byte 5 access byte 1
249 * byte 6 access byte 2 | limit 19..16
254 * bytes 4..5 selector
255 * byte 6 word count << 4 (to match fake descriptor)
256 * byte 7 access byte 1
259 * bytes 0..1 offset 15..0
260 * bytes 2..3 selector
262 * byte 5 access byte 1
263 * bytes 6..7 offset 31..16
266 fix_desc(void *d
, int num_desc
) {
267 //early_kprintf("fix_desc(%x, %x)\n", d, num_desc);
268 uint8_t *desc
= (uint8_t*) d
;
271 if ((desc
[7] & 0x14) == 0x04) { /* gate */
277 offset
= *((uint32_t*)(desc
));
278 selector
= *((uint32_t*)(desc
+4));
279 wordcount
= desc
[6] >> 4;
282 *((uint16_t*)desc
) = offset
& 0xFFFF;
283 *((uint16_t*)(desc
+2)) = selector
;
286 *((uint16_t*)(desc
+6)) = offset
>> 16;
288 } else { /* descriptor */
293 base
= *((uint32_t*)(desc
));
294 limit
= *((uint16_t*)(desc
+4));
298 *((uint16_t*)(desc
)) = limit
;
299 *((uint16_t*)(desc
+2)) = base
& 0xFFFF;
300 desc
[4] = (base
>> 16) & 0xFF;
303 desc
[7] = base
>> 24;
306 } while (--num_desc
);
310 fix_desc64(void *descp
, int count
)
312 struct fake_descriptor64
*fakep
;
314 struct real_gate64 gate
;
315 struct real_descriptor64 desc
;
319 fakep
= (struct fake_descriptor64
*) descp
;
321 for (i
= 0; i
< count
; i
++, fakep
++) {
323 * Construct the real decriptor locally.
326 bzero((void *) &real
, sizeof(real
));
328 switch (fakep
->access
& ACC_TYPE
) {
334 real
.gate
.offset_low16
= (uint16_t)(fakep
->offset64
& 0xFFFF);
335 real
.gate
.selector16
= fakep
->lim_or_seg
& 0xFFFF;
336 real
.gate
.IST
= fakep
->size_or_IST
& 0x7;
337 real
.gate
.access8
= fakep
->access
;
338 real
.gate
.offset_high16
= (uint16_t)((fakep
->offset64
>>16) & 0xFFFF);
339 real
.gate
.offset_top32
= (uint32_t)(fakep
->offset64
>>32);
341 default: /* Otherwise */
342 real
.desc
.limit_low16
= fakep
->lim_or_seg
& 0xFFFF;
343 real
.desc
.base_low16
= (uint16_t)(fakep
->offset64
& 0xFFFF);
344 real
.desc
.base_med8
= (uint8_t)((fakep
->offset64
>> 16) & 0xFF);
345 real
.desc
.access8
= fakep
->access
;
346 real
.desc
.limit_high4
= (fakep
->lim_or_seg
>> 16) & 0xFF;
347 real
.desc
.granularity4
= fakep
->size_or_IST
;
348 real
.desc
.base_high8
= (uint8_t)((fakep
->offset64
>> 24) & 0xFF);
349 real
.desc
.base_top32
= (uint32_t)(fakep
->offset64
>>32);
353 * Now copy back over the fake structure.
355 bcopy((void *) &real
, (void *) fakep
, sizeof(real
));
360 cpu_gdt_alias(vm_map_offset_t gdt
, vm_map_offset_t alias
)
362 pt_entry_t
*pte
= NULL
;
364 /* Require page alignment */
365 assert(page_aligned(gdt
));
366 assert(page_aligned(alias
));
368 pte
= pmap_pte(kernel_pmap
, alias
);
369 pmap_store_pte(pte
, kvtophys(gdt
) | INTEL_PTE_REF
376 kasan_notify_address(alias
, PAGE_SIZE
);
382 cpu_desc_init(cpu_data_t
*cdp
)
384 cpu_desc_index_t
*cdi
= &cdp
->cpu_desc_index
;
386 if (cdp
== &cpu_data_master
) {
388 * Master CPU uses the tables built at boot time.
389 * Just set the index pointers to the low memory space.
391 cdi
->cdi_ktss
= (void *)&master_ktss64
;
392 cdi
->cdi_sstk
= (vm_offset_t
) &master_sstk
.top
;
393 cdi
->cdi_gdt
.ptr
= (void *)MASTER_GDT_ALIAS
;
394 cdi
->cdi_idt
.ptr
= (void *)MASTER_IDT_ALIAS
;
395 cdi
->cdi_ldt
= (struct fake_descriptor
*) master_ldt
;
397 /* Replace the expanded LDTs and TSS slots in the GDT */
398 kernel_ldt_desc64
.offset64
= (uintptr_t) &master_ldt
;
399 *(struct fake_descriptor64
*) &master_gdt
[sel_idx(KERNEL_LDT
)] =
401 *(struct fake_descriptor64
*) &master_gdt
[sel_idx(USER_LDT
)] =
403 kernel_tss_desc64
.offset64
= (uintptr_t) &master_ktss64
;
404 *(struct fake_descriptor64
*) &master_gdt
[sel_idx(KERNEL_TSS
)] =
407 /* Fix up the expanded descriptors for 64-bit. */
408 fix_desc64((void *) &master_idt64
, IDTSZ
);
409 fix_desc64((void *) &master_gdt
[sel_idx(KERNEL_LDT
)], 1);
410 fix_desc64((void *) &master_gdt
[sel_idx(USER_LDT
)], 1);
411 fix_desc64((void *) &master_gdt
[sel_idx(KERNEL_TSS
)], 1);
414 * Set the NMI/fault stacks as IST2/IST1 in the 64-bit TSS
415 * Note: this will be dynamically re-allocated in VM later.
417 master_ktss64
.ist2
= (uintptr_t) low_eintstack
;
418 master_ktss64
.ist1
= (uintptr_t) low_eintstack
419 - sizeof(x86_64_intr_stack_frame_t
);
420 } else if (cdi
->cdi_ktss
== NULL
) { /* Skipping re-init on wake */
421 cpu_desc_table64_t
*cdt
= (cpu_desc_table64_t
*) cdp
->cpu_desc_tablep
;
424 * Per-cpu GDT, IDT, KTSS descriptors are allocated in kernel
425 * heap (cpu_desc_table).
426 * LDT descriptors are mapped into a separate area.
427 * GDT descriptors are addressed by alias to avoid sgdt leaks to user-space.
429 cdi
->cdi_idt
.ptr
= (void *)MASTER_IDT_ALIAS
;
430 cdi
->cdi_gdt
.ptr
= (void *)CPU_GDT_ALIAS(cdp
->cpu_number
);
431 cdi
->cdi_ktss
= (void *)&cdt
->ktss
;
432 cdi
->cdi_sstk
= (vm_offset_t
)&cdt
->sstk
.top
;
433 cdi
->cdi_ldt
= cdp
->cpu_ldtp
;
435 /* Make the virtual alias address for the GDT */
436 cpu_gdt_alias((vm_map_offset_t
) &cdt
->gdt
,
437 (vm_map_offset_t
) cdi
->cdi_gdt
.ptr
);
442 bcopy((char *)master_gdt
, (char *)cdt
->gdt
, sizeof(master_gdt
));
443 bcopy((char *)master_ldt
, (char *)cdp
->cpu_ldtp
, sizeof(master_ldt
));
444 bcopy((char *)&master_ktss64
, (char *)&cdt
->ktss
, sizeof(struct x86_64_tss
));
447 * Fix up the entries in the GDT to point to
448 * this LDT and this TSS.
450 kernel_ldt_desc64
.offset64
= (uintptr_t) cdi
->cdi_ldt
;
451 *(struct fake_descriptor64
*) &cdt
->gdt
[sel_idx(KERNEL_LDT
)] =
453 fix_desc64(&cdt
->gdt
[sel_idx(KERNEL_LDT
)], 1);
455 kernel_ldt_desc64
.offset64
= (uintptr_t) cdi
->cdi_ldt
;
456 *(struct fake_descriptor64
*) &cdt
->gdt
[sel_idx(USER_LDT
)] =
458 fix_desc64(&cdt
->gdt
[sel_idx(USER_LDT
)], 1);
460 kernel_tss_desc64
.offset64
= (uintptr_t) cdi
->cdi_ktss
;
461 *(struct fake_descriptor64
*) &cdt
->gdt
[sel_idx(KERNEL_TSS
)] =
463 fix_desc64(&cdt
->gdt
[sel_idx(KERNEL_TSS
)], 1);
465 /* Set (zeroed) fault stack as IST1, NMI intr stack IST2 */
466 bzero((void *) cdt
->fstk
, sizeof(cdt
->fstk
));
467 cdt
->ktss
.ist2
= (unsigned long)cdt
->fstk
+ sizeof(cdt
->fstk
);
468 cdt
->ktss
.ist1
= cdt
->ktss
.ist2
469 - sizeof(x86_64_intr_stack_frame_t
);
472 /* Require that the top of the sysenter stack is 16-byte aligned */
473 if ((cdi
->cdi_sstk
% 16) != 0)
474 panic("cpu_desc_init() sysenter stack not 16-byte aligned");
479 cpu_desc_load(cpu_data_t
*cdp
)
481 cpu_desc_index_t
*cdi
= &cdp
->cpu_desc_index
;
483 postcode(CPU_DESC_LOAD_ENTRY
);
485 /* Stuff the kernel per-cpu data area address into the MSRs */
486 postcode(CPU_DESC_LOAD_GS_BASE
);
487 wrmsr64(MSR_IA32_GS_BASE
, (uintptr_t) cdp
);
488 postcode(CPU_DESC_LOAD_KERNEL_GS_BASE
);
489 wrmsr64(MSR_IA32_KERNEL_GS_BASE
, (uintptr_t) cdp
);
492 * Ensure the TSS segment's busy bit is clear. This is required
493 * for the case of reloading descriptors at wake to avoid
494 * their complete re-initialization.
496 gdt_desc_p(KERNEL_TSS
)->access
&= ~ACC_TSS_BUSY
;
498 /* Load the GDT, LDT, IDT and TSS */
499 cdi
->cdi_gdt
.size
= sizeof(struct real_descriptor
)*GDTSZ
- 1;
500 cdi
->cdi_idt
.size
= 0x1000 + cdp
->cpu_number
;
502 postcode(CPU_DESC_LOAD_GDT
);
503 lgdt((uintptr_t *) &cdi
->cdi_gdt
);
504 postcode(CPU_DESC_LOAD_IDT
);
505 lidt((uintptr_t *) &cdi
->cdi_idt
);
506 postcode(CPU_DESC_LOAD_LDT
);
508 postcode(CPU_DESC_LOAD_TSS
);
511 #if GPROF // Hack to enable mcount to work on K64
512 __asm__
volatile("mov %0, %%gs" : : "rm" ((unsigned short)(KERNEL_DS
)));
514 postcode(CPU_DESC_LOAD_EXIT
);
519 * Set MSRs for sysenter/sysexit and syscall/sysret for 64-bit.
522 cpu_syscall_init(cpu_data_t
*cdp
)
526 #else /* MONOTONIC */
528 #endif /* !MONOTONIC */
529 wrmsr64(MSR_IA32_SYSENTER_CS
, SYSENTER_CS
);
530 wrmsr64(MSR_IA32_SYSENTER_EIP
, (uintptr_t) hi64_sysenter
);
531 wrmsr64(MSR_IA32_SYSENTER_ESP
, current_sstk());
532 /* Enable syscall/sysret */
533 wrmsr64(MSR_IA32_EFER
, rdmsr64(MSR_IA32_EFER
) | MSR_IA32_EFER_SCE
);
536 * MSRs for 64-bit syscall/sysret
537 * Note USER_CS because sysret uses this + 16 when returning to
540 wrmsr64(MSR_IA32_LSTAR
, (uintptr_t) hi64_syscall
);
541 wrmsr64(MSR_IA32_STAR
, (((uint64_t)USER_CS
) << 48) |
542 (((uint64_t)KERNEL64_CS
) << 32));
544 * Emulate eflags cleared by sysenter but note that
545 * we also clear the trace trap to avoid the complications
546 * of single-stepping into a syscall. The nested task bit
547 * is also cleared to avoid a spurious "task switch"
548 * should we choose to return via an IRET.
550 wrmsr64(MSR_IA32_FMASK
, EFL_DF
|EFL_IF
|EFL_TF
|EFL_NT
);
556 cpu_data_alloc(boolean_t is_boot_cpu
)
562 assert(real_ncpus
== 1);
564 if (cdp
->cpu_processor
== NULL
) {
565 simple_lock_init(&ncpus_lock
, 0);
566 cdp
->cpu_processor
= cpu_processor_alloc(TRUE
);
567 #if NCOPY_WINDOWS > 0
568 cdp
->cpu_pmap
= pmap_cpu_alloc(TRUE
);
575 * Allocate per-cpu data:
577 ret
= kmem_alloc(kernel_map
, (vm_offset_t
*) &cdp
, sizeof(cpu_data_t
), VM_KERN_MEMORY_CPU
);
578 if (ret
!= KERN_SUCCESS
) {
579 printf("cpu_data_alloc() failed, ret=%d\n", ret
);
582 bzero((void*) cdp
, sizeof(cpu_data_t
));
586 * Allocate interrupt stack:
588 ret
= kmem_alloc(kernel_map
,
589 (vm_offset_t
*) &cdp
->cpu_int_stack_top
,
590 INTSTACK_SIZE
, VM_KERN_MEMORY_CPU
);
591 if (ret
!= KERN_SUCCESS
) {
592 printf("cpu_data_alloc() int stack failed, ret=%d\n", ret
);
595 bzero((void*) cdp
->cpu_int_stack_top
, INTSTACK_SIZE
);
596 cdp
->cpu_int_stack_top
+= INTSTACK_SIZE
;
599 * Allocate descriptor table:
601 ret
= kmem_alloc(kernel_map
,
602 (vm_offset_t
*) &cdp
->cpu_desc_tablep
,
603 sizeof(cpu_desc_table64_t
),
605 if (ret
!= KERN_SUCCESS
) {
606 printf("cpu_data_alloc() desc_table failed, ret=%d\n", ret
);
613 ret
= kmem_alloc(kernel_map
,
614 (vm_offset_t
*) &cdp
->cpu_ldtp
,
615 sizeof(struct real_descriptor
) * LDTSZ
,
617 if (ret
!= KERN_SUCCESS
) {
618 printf("cpu_data_alloc() ldt failed, ret=%d\n", ret
);
623 /* Machine-check shadow register allocation. */
627 simple_lock(&ncpus_lock
);
629 cpu_data_ptr
[real_ncpus
] = cdp
;
630 cdp
->cpu_number
= real_ncpus
;
632 simple_unlock(&ncpus_lock
);
635 * Before this cpu has been assigned a real thread context,
636 * we give it a fake, unique, non-zero thread id which the locking
637 * primitives use as their lock value.
638 * Note that this does not apply to the boot processor, cpu 0, which
639 * transitions to a thread context well before other processors are
642 cdp
->cpu_active_thread
= (thread_t
) (uintptr_t) cdp
->cpu_number
;
644 cdp
->cpu_nanotime
= &pal_rtc_nanotime_info
;
646 kprintf("cpu_data_alloc(%d) %p desc_table: %p "
648 "int_stack: 0x%lx-0x%lx\n",
649 cdp
->cpu_number
, cdp
, cdp
->cpu_desc_tablep
, cdp
->cpu_ldtp
,
650 (long)(cdp
->cpu_int_stack_top
- INTSTACK_SIZE
), (long)(cdp
->cpu_int_stack_top
));
656 if (cdp
->cpu_desc_tablep
)
657 kfree((void *) cdp
->cpu_desc_tablep
,
658 sizeof(cpu_desc_table64_t
));
659 if (cdp
->cpu_int_stack_top
)
660 kfree((void *) (cdp
->cpu_int_stack_top
- INTSTACK_SIZE
),
662 kfree((void *) cdp
, sizeof(*cdp
));
668 valid_user_data_selector(uint16_t selector
)
670 sel_t sel
= selector_to_sel(selector
);
675 if (sel
.ti
== SEL_LDT
)
677 else if (sel
.index
< GDTSZ
) {
678 if ((gdt_desc_p(selector
)->access
& ACC_PL_U
) == ACC_PL_U
)
686 valid_user_code_selector(uint16_t selector
)
688 sel_t sel
= selector_to_sel(selector
);
693 if (sel
.ti
== SEL_LDT
) {
694 if (sel
.rpl
== USER_PRIV
)
697 else if (sel
.index
< GDTSZ
&& sel
.rpl
== USER_PRIV
) {
698 if ((gdt_desc_p(selector
)->access
& ACC_PL_U
) == ACC_PL_U
)
700 /* Explicitly validate the system code selectors
701 * even if not instantaneously privileged,
702 * since they are dynamically re-privileged
705 if ((selector
== USER_CS
) || (selector
== USER64_CS
))
713 valid_user_stack_selector(uint16_t selector
)
715 sel_t sel
= selector_to_sel(selector
);
720 if (sel
.ti
== SEL_LDT
) {
721 if (sel
.rpl
== USER_PRIV
)
724 else if (sel
.index
< GDTSZ
&& sel
.rpl
== USER_PRIV
) {
725 if ((gdt_desc_p(selector
)->access
& ACC_PL_U
) == ACC_PL_U
)
733 valid_user_segment_selectors(uint16_t cs
,
740 return valid_user_code_selector(cs
) &&
741 valid_user_stack_selector(ss
) &&
742 valid_user_data_selector(ds
) &&
743 valid_user_data_selector(es
) &&
744 valid_user_data_selector(fs
) &&
745 valid_user_data_selector(gs
);
748 #if NCOPY_WINDOWS > 0
750 static vm_offset_t user_window_base
= 0;
753 cpu_userwindow_init(int cpu
)
755 cpu_data_t
*cdp
= cpu_data_ptr
[cpu
];
756 vm_offset_t user_window
;
760 num_cpus
= ml_get_max_cpus();
763 panic("cpu_userwindow_init: cpu > num_cpus");
765 if (user_window_base
== 0) {
767 if (vm_allocate(kernel_map
, &vaddr
,
768 (NBPDE
* NCOPY_WINDOWS
* num_cpus
) + NBPDE
,
769 VM_FLAGS_ANYWHERE
| VM_MAKE_TAG(VM_KERN_MEMORY_CPU
)) != KERN_SUCCESS
)
770 panic("cpu_userwindow_init: "
771 "couldn't allocate user map window");
774 * window must start on a page table boundary
775 * in the virtual address space
777 user_window_base
= (vaddr
+ (NBPDE
- 1)) & ~(NBPDE
- 1);
780 * get rid of any allocation leading up to our
783 vm_deallocate(kernel_map
, vaddr
, user_window_base
- vaddr
);
786 * get rid of tail that we don't need
788 user_window
= user_window_base
+
789 (NBPDE
* NCOPY_WINDOWS
* num_cpus
);
791 vm_deallocate(kernel_map
, user_window
,
793 ((NBPDE
* NCOPY_WINDOWS
* num_cpus
) + NBPDE
)) -
797 user_window
= user_window_base
+ (cpu
* NCOPY_WINDOWS
* NBPDE
);
799 cdp
->cpu_copywindow_base
= user_window
;
801 * Abuse this pdp entry, the pdp now actually points to
802 * an array of copy windows addresses.
804 cdp
->cpu_copywindow_pdp
= pmap_pde(kernel_pmap
, user_window
);
809 cpu_physwindow_init(int cpu
)
811 cpu_data_t
*cdp
= cpu_data_ptr
[cpu
];
812 vm_offset_t phys_window
= cdp
->cpu_physwindow_base
;
814 if (phys_window
== 0) {
815 if (vm_allocate(kernel_map
, &phys_window
,
816 PAGE_SIZE
, VM_FLAGS_ANYWHERE
| VM_MAKE_TAG(VM_KERN_MEMORY_CPU
))
818 panic("cpu_physwindow_init: "
819 "couldn't allocate phys map window");
822 * make sure the page that encompasses the
823 * pte pointer we're interested in actually
824 * exists in the page table
826 pmap_expand(kernel_pmap
, phys_window
, PMAP_EXPAND_OPTIONS_NONE
);
828 cdp
->cpu_physwindow_base
= phys_window
;
829 cdp
->cpu_physwindow_ptep
= vtopte(phys_window
);
832 #endif /* NCOPY_WINDOWS > 0 */
835 * Allocate a new interrupt stack for the boot processor from the
836 * heap rather than continue to use the statically allocated space.
837 * Also switch to a dynamically allocated cpu data area.
840 cpu_data_realloc(void)
848 ret
= kmem_alloc(kernel_map
, &istk
, INTSTACK_SIZE
, VM_KERN_MEMORY_CPU
);
849 if (ret
!= KERN_SUCCESS
) {
850 panic("cpu_data_realloc() stack alloc, ret=%d\n", ret
);
852 bzero((void*) istk
, INTSTACK_SIZE
);
853 istk
+= INTSTACK_SIZE
;
855 ret
= kmem_alloc(kernel_map
, (vm_offset_t
*) &cdp
, sizeof(cpu_data_t
), VM_KERN_MEMORY_CPU
);
856 if (ret
!= KERN_SUCCESS
) {
857 panic("cpu_data_realloc() cpu data alloc, ret=%d\n", ret
);
860 /* Copy old contents into new area and make fix-ups */
861 assert(cpu_number() == 0);
862 bcopy((void *) cpu_data_ptr
[0], (void*) cdp
, sizeof(cpu_data_t
));
864 cdp
->cpu_int_stack_top
= istk
;
865 timer_call_queue_init(&cdp
->rtclock_timer
.queue
);
867 /* Allocate the separate fault stack */
868 ret
= kmem_alloc(kernel_map
, &fstk
, PAGE_SIZE
, VM_KERN_MEMORY_CPU
);
869 if (ret
!= KERN_SUCCESS
) {
870 panic("cpu_data_realloc() fault stack alloc, ret=%d\n", ret
);
872 bzero((void*) fstk
, PAGE_SIZE
);
876 * With interrupts disabled commmit the new areas.
878 istate
= ml_set_interrupts_enabled(FALSE
);
879 cpu_data_ptr
[0] = cdp
;
880 master_ktss64
.ist2
= (uintptr_t) fstk
;
881 master_ktss64
.ist1
= (uintptr_t) fstk
882 - sizeof(x86_64_intr_stack_frame_t
);
883 wrmsr64(MSR_IA32_GS_BASE
, (uintptr_t) cdp
);
884 wrmsr64(MSR_IA32_KERNEL_GS_BASE
, (uintptr_t) cdp
);
885 (void) ml_set_interrupts_enabled(istate
);
887 kprintf("Reallocated master cpu data: %p,"
888 " interrupt stack: %p, fault stack: %p\n",
889 (void *) cdp
, (void *) istk
, (void *) fstk
);