2 * Copyright (c) 2007-2016 Apple Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
29 #include <mach_assert.h>
30 #include <mach/vm_types.h>
31 #include <mach/mach_time.h>
32 #include <kern/timer.h>
33 #include <kern/clock.h>
34 #include <kern/machine.h>
35 #include <mach/machine.h>
36 #include <mach/machine/vm_param.h>
38 #include <kdp/kdp_udp.h>
40 #include <kdp/kdp_callout.h>
41 #endif /* !MACH_KDP */
42 #include <arm/cpu_data.h>
43 #include <arm/cpu_data_internal.h>
44 #include <arm/caches_internal.h>
46 #include <vm/vm_kern.h>
47 #include <vm/vm_map.h>
50 #include <arm/misc_protos.h>
52 #include <sys/errno.h>
54 #define INT_SIZE (BYTE_SIZE * sizeof (int))
58 bcopy_phys(addr64_t src
, addr64_t dst
, vm_size_t bytes
)
60 unsigned int src_index
;
61 unsigned int dst_index
;
62 vm_offset_t src_offset
;
63 vm_offset_t dst_offset
;
65 unsigned int wimg_bits_src
, wimg_bits_dst
;
66 ppnum_t pn_src
= (src
>> PAGE_SHIFT
);
67 ppnum_t pn_dst
= (dst
>> PAGE_SHIFT
);
69 wimg_bits_src
= pmap_cache_attributes(pn_src
);
70 wimg_bits_dst
= pmap_cache_attributes(pn_dst
);
72 if (mmu_kvtop_wpreflight(phystokv((pmap_paddr_t
) dst
)) &&
73 ((wimg_bits_src
& VM_WIMG_MASK
) == VM_WIMG_DEFAULT
) &&
74 ((wimg_bits_dst
& VM_WIMG_MASK
) == VM_WIMG_DEFAULT
)) {
75 /* Fast path - dst is writable and both source and destination have default attributes */
76 bcopy((char *)phystokv((pmap_paddr_t
) src
), (char *)phystokv((pmap_paddr_t
) dst
), bytes
);
80 src_offset
= src
& PAGE_MASK
;
81 dst_offset
= dst
& PAGE_MASK
;
83 if ((src_offset
+ bytes
) > PAGE_SIZE
|| (dst_offset
+ bytes
) > PAGE_SIZE
)
84 panic("bcopy extends beyond copy windows");
86 mp_disable_preemption();
87 cpu_num
= cpu_number();
88 src_index
= pmap_map_cpu_windows_copy(pn_src
, VM_PROT_READ
, wimg_bits_src
);
89 dst_index
= pmap_map_cpu_windows_copy(pn_dst
, VM_PROT_READ
|VM_PROT_WRITE
, wimg_bits_dst
);
91 bcopy((char *)(pmap_cpu_windows_copy_addr(cpu_num
, src_index
)+src_offset
),
92 (char *)(pmap_cpu_windows_copy_addr(cpu_num
, dst_index
)+dst_offset
),
95 pmap_unmap_cpu_windows_copy(src_index
);
96 pmap_unmap_cpu_windows_copy(dst_index
);
97 mp_enable_preemption();
101 bzero_phys_nc(addr64_t src64
, vm_size_t bytes
)
103 bzero_phys(src64
, bytes
);
106 /* Zero bytes starting at a physical address */
108 bzero_phys(addr64_t src
, vm_size_t bytes
)
110 unsigned int wimg_bits
;
111 ppnum_t pn
= (src
>> PAGE_SHIFT
);
113 wimg_bits
= pmap_cache_attributes(pn
);
114 if ((wimg_bits
& VM_WIMG_MASK
) == VM_WIMG_DEFAULT
) {
115 /* Fast path - default attributes */
116 bzero((char *)phystokv((pmap_paddr_t
) src
), bytes
);
118 mp_disable_preemption();
120 unsigned int cpu_num
= cpu_number();
123 vm_offset_t offset
= src
& PAGE_MASK
;
124 uint32_t count
= PAGE_SIZE
- offset
;
129 unsigned int index
= pmap_map_cpu_windows_copy(src
>> PAGE_SHIFT
, VM_PROT_READ
| VM_PROT_WRITE
, wimg_bits
);
131 bzero((char *)(pmap_cpu_windows_copy_addr(cpu_num
, index
) + offset
), count
);
133 pmap_unmap_cpu_windows_copy(index
);
139 mp_enable_preemption();
144 * Read data from a physical address.
149 ml_phys_read_data(pmap_paddr_t paddr
, int size
)
153 unsigned int wimg_bits
;
154 ppnum_t pn
= (paddr
>> PAGE_SHIFT
);
157 vm_offset_t copywindow_vaddr
= 0;
159 mp_disable_preemption();
160 wimg_bits
= pmap_cache_attributes(pn
);
161 index
= pmap_map_cpu_windows_copy(pn
, VM_PROT_READ
, wimg_bits
);
162 copywindow_vaddr
= pmap_cpu_windows_copy_addr(cpu_number(), index
) | ((uint32_t)paddr
& PAGE_MASK
);;
166 s1
= *(volatile unsigned char *)(copywindow_vaddr
);
170 s2
= *(volatile unsigned short *)(copywindow_vaddr
);
175 result
= *(volatile unsigned int *)(copywindow_vaddr
);
179 pmap_unmap_cpu_windows_copy(index
);
180 mp_enable_preemption();
185 static unsigned long long
186 ml_phys_read_long_long(pmap_paddr_t paddr
)
190 unsigned int wimg_bits
;
191 ppnum_t pn
= (paddr
>> PAGE_SHIFT
);
193 mp_disable_preemption();
194 wimg_bits
= pmap_cache_attributes(pn
);
195 index
= pmap_map_cpu_windows_copy(pn
, VM_PROT_READ
, wimg_bits
);
197 result
= *(volatile unsigned long long *)(pmap_cpu_windows_copy_addr(cpu_number(), index
)
198 | ((uint32_t)paddr
& PAGE_MASK
));
200 pmap_unmap_cpu_windows_copy(index
);
201 mp_enable_preemption();
206 unsigned int ml_phys_read( vm_offset_t paddr
)
208 return ml_phys_read_data((pmap_paddr_t
)paddr
, 4);
211 unsigned int ml_phys_read_word(vm_offset_t paddr
) {
213 return ml_phys_read_data((pmap_paddr_t
)paddr
, 4);
216 unsigned int ml_phys_read_64(addr64_t paddr64
)
218 return ml_phys_read_data((pmap_paddr_t
)paddr64
, 4);
221 unsigned int ml_phys_read_word_64(addr64_t paddr64
)
223 return ml_phys_read_data((pmap_paddr_t
)paddr64
, 4);
226 unsigned int ml_phys_read_half(vm_offset_t paddr
)
228 return ml_phys_read_data((pmap_paddr_t
)paddr
, 2);
231 unsigned int ml_phys_read_half_64(addr64_t paddr64
)
233 return ml_phys_read_data((pmap_paddr_t
)paddr64
, 2);
236 unsigned int ml_phys_read_byte(vm_offset_t paddr
)
238 return ml_phys_read_data((pmap_paddr_t
)paddr
, 1);
241 unsigned int ml_phys_read_byte_64(addr64_t paddr64
)
243 return ml_phys_read_data((pmap_paddr_t
)paddr64
, 1);
246 unsigned long long ml_phys_read_double(vm_offset_t paddr
)
248 return ml_phys_read_long_long((pmap_paddr_t
)paddr
);
251 unsigned long long ml_phys_read_double_64(addr64_t paddr64
)
253 return ml_phys_read_long_long((pmap_paddr_t
)paddr64
);
259 * Write data to a physical address.
263 ml_phys_write_data(pmap_paddr_t paddr
, unsigned long data
, int size
)
266 unsigned int wimg_bits
;
267 ppnum_t pn
= (paddr
>> PAGE_SHIFT
);
268 vm_offset_t copywindow_vaddr
= 0;
270 mp_disable_preemption();
271 wimg_bits
= pmap_cache_attributes(pn
);
272 index
= pmap_map_cpu_windows_copy(pn
, VM_PROT_READ
|VM_PROT_WRITE
, wimg_bits
);
273 copywindow_vaddr
= pmap_cpu_windows_copy_addr(cpu_number(), index
) | ((uint32_t) paddr
& PAGE_MASK
);
277 *(volatile unsigned char *)(copywindow_vaddr
) = (unsigned char)data
;
280 *(volatile unsigned short *)(copywindow_vaddr
) = (unsigned short)data
;
284 *(volatile unsigned int *)(copywindow_vaddr
) = (uint32_t)data
;
288 pmap_unmap_cpu_windows_copy(index
);
289 mp_enable_preemption();
293 ml_phys_write_long_long(pmap_paddr_t paddr
, unsigned long long data
)
296 unsigned int wimg_bits
;
297 ppnum_t pn
= (paddr
>> PAGE_SHIFT
);
299 mp_disable_preemption();
300 wimg_bits
= pmap_cache_attributes(pn
);
301 index
= pmap_map_cpu_windows_copy(pn
, VM_PROT_READ
|VM_PROT_WRITE
, wimg_bits
);
303 *(volatile unsigned long long *)(pmap_cpu_windows_copy_addr(cpu_number(), index
)
304 | ((uint32_t)paddr
& PAGE_MASK
)) = data
;
306 pmap_unmap_cpu_windows_copy(index
);
307 mp_enable_preemption();
312 void ml_phys_write_byte(vm_offset_t paddr
, unsigned int data
)
314 ml_phys_write_data((pmap_paddr_t
)paddr
, data
, 1);
317 void ml_phys_write_byte_64(addr64_t paddr64
, unsigned int data
)
319 ml_phys_write_data((pmap_paddr_t
)paddr64
, data
, 1);
322 void ml_phys_write_half(vm_offset_t paddr
, unsigned int data
)
324 ml_phys_write_data((pmap_paddr_t
)paddr
, data
, 2);
327 void ml_phys_write_half_64(addr64_t paddr64
, unsigned int data
)
329 ml_phys_write_data((pmap_paddr_t
)paddr64
, data
, 2);
332 void ml_phys_write(vm_offset_t paddr
, unsigned int data
)
334 ml_phys_write_data((pmap_paddr_t
)paddr
, data
, 4);
337 void ml_phys_write_64(addr64_t paddr64
, unsigned int data
)
339 ml_phys_write_data((pmap_paddr_t
)paddr64
, data
, 4);
342 void ml_phys_write_word(vm_offset_t paddr
, unsigned int data
)
344 ml_phys_write_data((pmap_paddr_t
)paddr
, data
, 4);
347 void ml_phys_write_word_64(addr64_t paddr64
, unsigned int data
)
349 ml_phys_write_data((pmap_paddr_t
)paddr64
, data
, 4);
352 void ml_phys_write_double(vm_offset_t paddr
, unsigned long long data
)
354 ml_phys_write_long_long((pmap_paddr_t
)paddr
, data
);
357 void ml_phys_write_double_64(addr64_t paddr64
, unsigned long long data
)
359 ml_phys_write_long_long((pmap_paddr_t
)paddr64
, data
);
364 * Set indicated bit in bit string.
367 setbit(int bitno
, int *s
)
369 s
[bitno
/ INT_SIZE
] |= 1 << (bitno
% INT_SIZE
);
373 * Clear indicated bit in bit string.
376 clrbit(int bitno
, int *s
)
378 s
[bitno
/ INT_SIZE
] &= ~(1 << (bitno
% INT_SIZE
));
382 * Test if indicated bit is set in bit string.
385 testbit(int bitno
, int *s
)
387 return s
[bitno
/ INT_SIZE
] & (1 << (bitno
% INT_SIZE
));
391 * Find first bit set in bit string.
398 for (offset
= 0; !*s
; offset
+= INT_SIZE
, ++s
);
399 return offset
+ __builtin_ctz(*s
);
403 ffs(unsigned int mask
)
409 * NOTE: cannot use __builtin_ffs because it generates a call to
412 return 1 + __builtin_ctz(mask
);
416 ffsll(unsigned long long mask
)
422 * NOTE: cannot use __builtin_ffsll because it generates a call to
425 return 1 + __builtin_ctzll(mask
);
429 * Find last bit set in bit string.
432 fls(unsigned int mask
)
437 return (sizeof (mask
) << 3) - __builtin_clz(mask
);
441 flsll(unsigned long long mask
)
446 return (sizeof (mask
) << 3) - __builtin_clzll(mask
);
455 const char *a
= (const char *) pa
;
456 const char *b
= (const char *) pb
;
470 memcmp(const void *s1
, const void *s2
, size_t n
)
473 const unsigned char *p1
= s1
, *p2
= s2
;
477 return (*--p1
- *--p2
);
484 copypv(addr64_t source
, addr64_t sink
, unsigned int size
, int which
)
486 kern_return_t retval
= KERN_SUCCESS
;
488 unsigned int from_wimg_bits
, to_wimg_bits
;
490 from
= CAST_DOWN(void *, source
);
491 to
= CAST_DOWN(void *, sink
);
493 if ((which
& (cppvPsrc
| cppvPsnk
)) == 0) /* Make sure that only
495 panic("copypv: no more than 1 parameter may be virtual\n"); /* Not allowed */
497 if (which
& cppvPsrc
)
498 from
= (void *)phystokv(from
);
499 if (which
& cppvPsnk
)
500 to
= (void *)phystokv(to
);
502 if ((which
& (cppvPsrc
| cppvKmap
)) == 0) /* Source is virtual in
504 retval
= copyin((user_addr_t
) from
, to
, size
);
505 else if ((which
& (cppvPsnk
| cppvKmap
)) == 0) /* Sink is virtual in
507 retval
= copyout(from
, (user_addr_t
) to
, size
);
508 else /* both addresses are physical or kernel map */
509 bcopy(from
, to
, size
);
511 if (which
& cppvFsrc
) {
512 flush_dcache64(source
, size
, ((which
& cppvPsrc
) == cppvPsrc
));
513 } else if (which
& cppvPsrc
) {
514 from_wimg_bits
= pmap_cache_attributes(source
>> PAGE_SHIFT
);
515 if ((from_wimg_bits
!= VM_WIMG_COPYBACK
) && (from_wimg_bits
!= VM_WIMG_WTHRU
))
516 flush_dcache64(source
, size
, TRUE
);
519 if (which
& cppvFsnk
) {
520 flush_dcache64(sink
, size
, ((which
& cppvPsnk
) == cppvPsnk
));
521 } else if (which
& cppvPsnk
) {
522 to_wimg_bits
= pmap_cache_attributes(sink
>> PAGE_SHIFT
);
523 if (to_wimg_bits
!= VM_WIMG_COPYBACK
)
524 flush_dcache64(sink
, size
, TRUE
);
530 * Copy sizes bigger than this value will cause a kernel panic.
532 * Yes, this is an arbitrary fixed limit, but it's almost certainly
533 * a programming error to be copying more than this amount between
534 * user and wired kernel memory in a single invocation on this
537 const int copysize_limit_panic
= (64 * 1024 * 1024);
540 * Validate the arguments to copy{in,out} on this platform.
542 * Called when nbytes is "large" e.g. more than a page. Such sizes are
543 * infrequent, and very large sizes are likely indications of attempts
544 * to exploit kernel programming errors (bugs).
547 copy_validate(const user_addr_t user_addr
,
548 uintptr_t kernel_addr
, vm_size_t nbytes
)
550 uintptr_t kernel_addr_last
= kernel_addr
+ nbytes
;
552 if (kernel_addr
< VM_MIN_KERNEL_ADDRESS
||
553 kernel_addr
> VM_MAX_KERNEL_ADDRESS
||
554 kernel_addr_last
< kernel_addr
||
555 kernel_addr_last
> VM_MAX_KERNEL_ADDRESS
)
556 panic("%s(%p, %p, %u) - kaddr not in kernel", __func__
,
557 (void *)user_addr
, (void *)kernel_addr
, nbytes
);
559 user_addr_t user_addr_last
= user_addr
+ nbytes
;
561 if (user_addr_last
< user_addr
||
562 user_addr_last
> VM_MIN_KERNEL_ADDRESS
)
565 if (__improbable(nbytes
> copysize_limit_panic
))
566 panic("%s(%p, %p, %u) - transfer too large", __func__
,
567 (void *)user_addr
, (void *)kernel_addr
, nbytes
);
573 copyin_validate(const user_addr_t ua
, uintptr_t ka
, vm_size_t nbytes
)
575 return (copy_validate(ua
, ka
, nbytes
));
579 copyout_validate(uintptr_t ka
, const user_addr_t ua
, vm_size_t nbytes
)
581 return (copy_validate(ua
, ka
, nbytes
));
586 extern int copyinframe(vm_address_t fp
, char *frame
);
589 * Machine-dependent routine to fill in an array with up to callstack_max
590 * levels of return pc information.
595 vm_size_t callstack_max
)
597 /* Captures the USER call stack */
601 struct arm_saved_state
* state
= find_user_regs(current_thread());
604 while (i
<callstack_max
)
607 buf
[i
++] = (uintptr_t)state
->pc
;
608 frame
[0] = state
->r
[7];
610 while (i
<callstack_max
&& frame
[0] != 0) {
611 if (copyinframe(frame
[0], (void*) frame
))
613 buf
[i
++] = (uintptr_t)frame
[1];
616 while (i
<callstack_max
)
621 #endif /* MACH_ASSERT */
632 __unused vm_offset_t paddr
,
633 __unused
unsigned int *val
)
635 panic("ml_probe_read() unimplemented");
641 __unused addr64_t paddr
,
642 __unused
unsigned int *val
)
644 panic("ml_probe_read_64() unimplemented");
651 __unused thread_t thread
,
652 __unused
unsigned policy_id
,
653 __unused
unsigned policy_info
)
655 // <rdar://problem/7141284>: Reduce print noise
656 // kprintf("ml_thread_policy() unimplemented\n");
661 kdp_register_callout(kdp_callout_fn_t fn
, void *arg
)
663 #pragma unused(fn,arg)