#include <kern/waitq.h>
#include <ipc/ipc_voucher.h>
#include <voucher/ipc_pthread_priority_internal.h>
+#include <mach/host_info.h>
#if CONFIG_ATM
#include <sys/csr.h>
#endif
-#if CONFIG_BANK
#include <bank/bank_internal.h>
-#endif
#if ALTERNATE_DEBUGGER
#include <arm64/alternate_debugger.h>
#if CONFIG_MACF
#include <security/mac_mach_internal.h>
+#if CONFIG_VNGUARD
+extern void vnguard_policy_init(void);
+#endif
#endif
#if KPC
#include <kern/hv_support.h>
#endif
+#include <san/kasan.h>
+
+#if defined(__arm__) || defined(__arm64__)
+#include <arm/misc_protos.h> // for arm_vm_prot_finalize
+#endif
#include <i386/pmCPU.h>
static void kernel_bootstrap_thread(void);
unsigned int wake_nkdbufs = 0;
unsigned int write_trace_on_panic = 0;
static char trace_typefilter[64] = { 0 };
+unsigned int trace_wrap = 0;
boolean_t trace_serial = FALSE;
-boolean_t oslog_early_boot_complete = FALSE;
+boolean_t early_boot_complete = FALSE;
/* mach leak logging */
int log_leaks = 0;
PE_parse_boot_argn("trace_wake", &wake_nkdbufs, sizeof (wake_nkdbufs));
PE_parse_boot_argn("trace_panic", &write_trace_on_panic, sizeof(write_trace_on_panic));
PE_parse_boot_arg_str("trace_typefilter", trace_typefilter, sizeof(trace_typefilter));
+ PE_parse_boot_argn("trace_wrap", &trace_wrap, sizeof(trace_wrap));
scale_setup();
oslog_init();
+#if KASAN
+ kernel_bootstrap_log("kasan_late_init");
+ kasan_late_init();
+#endif
+
#if CONFIG_TELEMETRY
kernel_bootstrap_log("telemetry_init");
telemetry_init();
/*
* Initialize the IPC, task, and thread subsystems.
*/
+
#if CONFIG_COALITIONS
kernel_bootstrap_log("coalitions_init");
coalitions_init();
kernel_bootstrap_log("mach_init_activity_id");
mach_init_activity_id();
-#if CONFIG_BANK
/* Initialize the BANK Manager. */
kernel_bootstrap_log("bank_init");
bank_init();
-#endif
kernel_bootstrap_log("ipc_pthread_priority_init");
ipc_pthread_priority_init();
/* initialize the corpse config based on boot-args */
corpses_init();
+ /* initialize host_statistics */
+ host_statistics_init();
+
/*
* Create a kernel thread to execute the kernel bootstrap.
*/
vm_offset_t vm_kernel_addrperm;
vm_offset_t buf_kernel_addrperm;
vm_offset_t vm_kernel_addrperm_ext;
+uint64_t vm_kernel_addrhash_salt;
+uint64_t vm_kernel_addrhash_salt_ext;
/*
* Now running in a thread. Kick off other services,
kernel_bootstrap_thread_log("thread_bind");
thread_bind(processor);
+#if __arm64__
+ if (IORamDiskBSDRoot()) {
+ cpm_preallocate_early();
+ }
+#endif /* __arm64__ */
/*
* Initialize ipc thread call support.
kernel_bootstrap_thread_log("ktrace_init");
ktrace_init();
- if (new_nkdbufs > 0 || kdebug_serial || log_leaks) {
- kdebug_boot_trace(new_nkdbufs, trace_typefilter);
- }
+ kdebug_init(new_nkdbufs, trace_typefilter, trace_wrap);
kernel_bootstrap_log("prng_init");
prng_cpu_init(master_cpu);
bsd_early_init();
#endif
+#if defined(__arm64__)
+ ml_lockdown_init();
+#endif
+
#ifdef IOKIT
kernel_bootstrap_log("PE_init_iokit");
PE_init_iokit();
assert(ml_get_interrupts_enabled() == FALSE);
- // Set this flag to indicate that it is now okay to start testing
- // for interrupts / preemeption disabled while logging
- oslog_early_boot_complete = TRUE;
+ /*
+ * Past this point, kernel subsystems that expect to operate with
+ * interrupts or preemption enabled may begin enforcement.
+ */
+ early_boot_complete = TRUE;
+#if INTERRUPT_MASKED_DEBUG
+ // Reset interrupts masked timeout before we enable interrupts
+ ml_spin_debug_clear_self();
+#endif
(void) spllo(); /* Allow interruptions */
#if (defined(__i386__) || defined(__x86_64__)) && NCOPY_WINDOWS > 0
#if CONFIG_MACF
kernel_bootstrap_log("mac_policy_initmach");
mac_policy_initmach();
+#if CONFIG_VNGUARD
+ vnguard_policy_init();
+#endif
#endif
+#if defined(__arm__) || defined(__arm64__)
+#if CONFIG_KERNEL_INTEGRITY
+ machine_lockdown_preflight();
+#endif
+ /*
+ * Finalize protections on statically mapped pages now that comm page mapping is established.
+ */
+ arm_vm_prot_finalize(PE_state.bootArgs);
+#endif
#if CONFIG_SCHED_SFI
kernel_bootstrap_log("sfi_init");
buf_kernel_addrperm |= 1;
read_random(&vm_kernel_addrperm_ext, sizeof(vm_kernel_addrperm_ext));
vm_kernel_addrperm_ext |= 1;
+ read_random(&vm_kernel_addrhash_salt, sizeof(vm_kernel_addrhash_salt));
+ read_random(&vm_kernel_addrhash_salt_ext, sizeof(vm_kernel_addrhash_salt_ext));
vm_set_restrictions();
+
/*
* Start the user bootstrap.
*/
*/
OSKextRemoveKextBootstrap();
+ /*
+ * Get rid of pages used for early boot tracing.
+ */
+ kdebug_free_early_buf();
+
serial_keyboard_init(); /* Start serial keyboard if wanted */
vm_page_init_local_q();
*
* Start the first thread on a processor.
*/
-static void
+static void __attribute__((noreturn))
load_context(
thread_t thread)
{
sched_run_incr(thread);
processor->active_thread = thread;
- processor->current_pri = thread->sched_pri;
- processor->current_thmode = thread->sched_mode;
- processor->current_sfi_class = SFI_CLASS_KERNEL;
+ processor_state_update_explicit(processor, thread->sched_pri,
+ SFI_CLASS_KERNEL, PSET_SMP, thread_get_perfcontrol_class(thread));
processor->starting_pri = thread->sched_pri;
-
processor->deadline = UINT64_MAX;
thread->last_processor = processor;
timer_start(&PROCESSOR_DATA(processor, system_state), processor->last_dispatch);
PROCESSOR_DATA(processor, current_state) = &PROCESSOR_DATA(processor, system_state);
+
PMAP_ACTIVATE_USER(thread, processor->cpu_id);
load_context_kprintf("machine_load_context\n");
if (scale > 16)
scale = 16;
task_max_base = 2500;
- } else if ((uint64_t)sane_size >= (uint64_t)(3 * 1024 * 1024 *1024ULL))
- scale = 2;
+ /* Raise limits for machines with >= 3GB */
+ } else if ((uint64_t)sane_size >= (uint64_t)(3 * 1024 * 1024 *1024ULL)) {
+ if ((uint64_t)sane_size < (uint64_t)(8 * 1024 * 1024 *1024ULL)) {
+ scale = 2;
+ } else {
+ /* limit to 64GB */
+ scale = MIN(16, (int)((uint64_t)sane_size / (uint64_t)(4 * 1024 * 1024 *1024ULL)));
+ }
+ }
task_max = MAX(task_max, task_max_base * scale);