+#endif /* HIBERNATION */
+
+#if CONFIG_SLEEP
+ /* Becase we don't save the bootstrap page, and we share it
+ * between sleep and mp slave init, we need to recreate it
+ * after coming back from sleep or hibernate */
+ install_real_mode_bootstrap(slave_pstart);
+#endif /* CONFIG_SLEEP */
+}
+
+void
+ml_hibernate_active_pre(void)
+{
+#if HIBERNATION
+ hibernate_rebuild_vm_structs();
+#endif /* HIBERNATION */
+}
+
+void
+ml_hibernate_active_post(void)
+{
+#if HIBERNATION
+ if (current_cpu_datap()->cpu_hibernate) {
+ KDBG(IOKDBG_CODE(DBG_HIBERNATE, 2) | DBG_FUNC_START);
+ hibernate_machine_init();
+ KDBG(IOKDBG_CODE(DBG_HIBERNATE, 2) | DBG_FUNC_END);
+ current_cpu_datap()->cpu_hibernate = 0;
+ }
+#endif /* HIBERNATION */
+}
+
+/*
+ * acpi_idle_kernel is called by the ACPI Platform kext to request the kernel
+ * to idle the boot processor in the deepest C-state for S0 sleep. All slave
+ * processors are expected already to have been offlined in the deepest C-state.
+ *
+ * The contract with ACPI is that although the kernel is called with interrupts
+ * disabled, interrupts may need to be re-enabled to dismiss any pending timer
+ * interrupt. However, the callback function will be called once this has
+ * occurred and interrupts are guaranteed to be disabled at that time,
+ * and to remain disabled during C-state entry, exit (wake) and return
+ * from acpi_idle_kernel.
+ */
+void
+acpi_idle_kernel(acpi_sleep_callback func, void *refcon)
+{
+ boolean_t istate = ml_get_interrupts_enabled();
+
+ kprintf("acpi_idle_kernel, cpu=%d, interrupts %s\n",
+ cpu_number(), istate ? "enabled" : "disabled");
+
+ assert(cpu_number() == master_cpu);
+
+#if MONOTONIC
+ mt_cpu_down(cpu_datap(0));
+#endif /* MONOTONIC */
+
+ /* Cancel any pending deadline */
+ setPop(0);
+ while (lapic_is_interrupting(LAPIC_TIMER_VECTOR)
+#if MONOTONIC
+ || lapic_is_interrupting(LAPIC_VECTOR(PERFCNT))
+#endif /* MONOTONIC */
+ ) {
+ (void) ml_set_interrupts_enabled(TRUE);
+ setPop(0);
+ ml_set_interrupts_enabled(FALSE);
+ }
+
+ if (current_cpu_datap()->cpu_hibernate) {
+ /* Call hibernate_write_image() to put disk to low power state */
+ hibernate_write_image();
+ cpu_datap(0)->cpu_hibernate = 0;
+ }
+
+ /*
+ * Call back to caller to indicate that interrupts will remain
+ * disabled while we deep idle, wake and return.
+ */
+ IOCPURunPlatformQuiesceActions();
+
+ func(refcon);
+
+ acpi_idle_abstime = mach_absolute_time();
+
+ KERNEL_DEBUG_CONSTANT(
+ MACHDBG_CODE(DBG_MACH_SCHED, MACH_DEEP_IDLE) | DBG_FUNC_START,
+ acpi_idle_abstime, deep_idle_rebase, 0, 0, 0);
+
+ /*
+ * Disable tracing during S0-sleep
+ * unless overridden by sysctl -w tsc.deep_idle_rebase=0
+ */
+ if (deep_idle_rebase) {
+ save_kdebug_enable = kdebug_enable;
+ kdebug_enable = 0;
+ }
+
+ /*
+ * Call into power-management to enter the lowest C-state.
+ * Note when called on the boot processor this routine will
+ * return directly when awoken.
+ */
+ pmCPUHalt(PM_HALT_SLEEP);
+
+ /*
+ * Get wakeup time relative to the TSC which has progressed.
+ * Then rebase nanotime to reflect time not progressing over sleep
+ * - unless overriden so that tracing can occur during deep_idle.
+ */
+ acpi_wake_abstime = mach_absolute_time();
+ if (deep_idle_rebase) {
+ rtc_sleep_wakeup(acpi_idle_abstime);
+ kdebug_enable = save_kdebug_enable;
+ }
+ acpi_wake_postrebase_abstime = mach_absolute_time();
+ assert(mach_absolute_time() >= acpi_idle_abstime);
+
+ KERNEL_DEBUG_CONSTANT(
+ MACHDBG_CODE(DBG_MACH_SCHED, MACH_DEEP_IDLE) | DBG_FUNC_END,
+ acpi_wake_abstime, acpi_wake_abstime - acpi_idle_abstime, 0, 0, 0);
+
+#if MONOTONIC
+ mt_cpu_up(cpu_datap(0));
+#endif /* MONOTONIC */
+
+ /* Like S3 sleep, turn on tracing if trace_wake boot-arg is present */
+ if (kdebug_enable == 0) {
+ kdebug_wake();
+ }
+
+ IOCPURunPlatformActiveActions();
+
+ /* Restart timer interrupts */
+ rtc_timer_start();
+}
+
+extern char real_mode_bootstrap_end[];
+extern char real_mode_bootstrap_base[];
+
+void
+install_real_mode_bootstrap(void *prot_entry)
+{
+ /*
+ * Copy the boot entry code to the real-mode vector area REAL_MODE_BOOTSTRAP_OFFSET.
+ * This is in page 1 which has been reserved for this purpose by
+ * machine_startup() from the boot processor.
+ * The slave boot code is responsible for switching to protected
+ * mode and then jumping to the common startup, _start().
+ */
+ bcopy_phys(kvtophys((vm_offset_t) real_mode_bootstrap_base),
+ (addr64_t) REAL_MODE_BOOTSTRAP_OFFSET,
+ real_mode_bootstrap_end - real_mode_bootstrap_base);
+
+ /*
+ * Set the location at the base of the stack to point to the
+ * common startup entry.
+ */
+ ml_phys_write_word(
+ PROT_MODE_START + REAL_MODE_BOOTSTRAP_OFFSET,
+ (unsigned int)kvtophys((vm_offset_t)prot_entry));
+
+ /* Flush caches */
+ __asm__("wbinvd");
+}
+
+boolean_t
+ml_recent_wake(void)
+{
+ uint64_t ctime = mach_absolute_time();
+ assert(ctime > acpi_wake_postrebase_abstime);
+ return (ctime - acpi_wake_postrebase_abstime) < 5 * NSEC_PER_SEC;
+}
+
+static uint8_t
+cksum8(uint8_t *ptr, uint32_t size)
+{
+ uint8_t sum = 0;
+ uint32_t i;
+
+ for (i = 0; i < size; i++) {
+ sum += ptr[i];
+ }
+
+ return sum;
+}
+
+/*
+ * Parameterized search for a specified table given an sdtp (either RSDT or XSDT).
+ * Note that efiboot does not modify the addresses of tables in the RSDT or XSDT
+ * TableOffsetEntry array, so we do not need to "convert" from efiboot virtual to
+ * physical.
+ */
+#define SEARCH_FOR_ACPI_TABLE(sdtp, signature, entry_type) \
+{ \
+ uint32_t i, pointer_count; \
+ \
+ /* Walk the list of tables in the *SDT, looking for the signature passed in */ \
+ pointer_count = ((sdtp)->Length - sizeof(ACPI_TABLE_HEADER)) / sizeof(entry_type); \
+ \
+ for (i = 0; i < pointer_count; i++) { \
+ ACPI_TABLE_HEADER *next_table = \
+ (ACPI_TABLE_HEADER *)PHYSMAP_PTOV( \
+ (uintptr_t)(sdtp)->TableOffsetEntry[i]); \
+ if (strncmp(&next_table->Signature[0], (signature), 4) == 0) { \
+ /* \
+ * Checksum the table first, then return it if the checksum \
+ * is valid. \
+ */ \
+ if (cksum8((uint8_t *)next_table, next_table->Length) == 0) { \
+ return next_table; \
+ } else { \
+ DBG("Invalid checksum for table [%s]@0x%lx!\n", (signature), \
+ (unsigned long)(sdtp)->TableOffsetEntry[i]); \
+ return NULL; \
+ } \
+ } \
+ } \
+ \
+ return NULL; \
+}
+
+static ACPI_TABLE_HEADER *
+acpi_find_table_via_xsdt(XSDT_DESCRIPTOR *xsdtp, const char *signature)
+{
+ SEARCH_FOR_ACPI_TABLE(xsdtp, signature, UINT64);
+}
+
+static ACPI_TABLE_HEADER *
+acpi_find_table_via_rsdt(RSDT_DESCRIPTOR *rsdtp, const char *signature)
+{
+ SEARCH_FOR_ACPI_TABLE(rsdtp, signature, UINT32);
+}
+
+/*
+ * Returns a pointer to an ACPI table header corresponding to the table
+ * whose signature is passed in, or NULL if no such table could be found.
+ */
+static ACPI_TABLE_HEADER *
+acpi_find_table(uintptr_t rsdp_physaddr, const char *signature)
+{
+ static RSDP_DESCRIPTOR *rsdp = NULL;
+ static XSDT_DESCRIPTOR *xsdtp = NULL;
+ static RSDT_DESCRIPTOR *rsdtp = NULL;
+
+ if (signature == NULL) {
+ DBG("Invalid NULL signature passed to acpi_find_table\n");
+ return NULL;
+ }
+
+ /*
+ * RSDT or XSDT is required; without it, we cannot locate other tables.
+ */
+ if (__improbable(rsdp == NULL || (rsdtp == NULL && xsdtp == NULL))) {
+ rsdp = PHYSMAP_PTOV(rsdp_physaddr);
+
+ /* Verify RSDP signature */
+ if (__improbable(strncmp((void *)rsdp, "RSD PTR ", 8) != 0)) {
+ DBG("RSDP signature mismatch: Aborting acpi_find_table\n");
+ rsdp = NULL;
+ return NULL;
+ }
+
+ /* Verify RSDP checksum */
+ if (__improbable(cksum8((uint8_t *)rsdp, sizeof(RSDP_DESCRIPTOR)) != 0)) {
+ DBG("RSDP@0x%lx signature mismatch: Aborting acpi_find_table\n",
+ (unsigned long)rsdp_physaddr);
+ rsdp = NULL;
+ return NULL;
+ }
+
+ /* Ensure the revision of the RSDP indicates the presence of an RSDT or XSDT */
+ if (__improbable(rsdp->Revision >= RSDP_VERSION_ACPI20 && rsdp->XsdtPhysicalAddress == 0ULL)) {
+ DBG("RSDP XSDT Physical Address is 0!: Aborting acpi_find_table\n");
+ rsdp = NULL;
+ return NULL;
+ } else if (__probable(rsdp->Revision >= RSDP_VERSION_ACPI20)) {
+ /* XSDT (with 64-bit pointers to tables) */
+ rsdtp = NULL;
+ xsdtp = PHYSMAP_PTOV(rsdp->XsdtPhysicalAddress);
+ if (cksum8((uint8_t *)xsdtp, xsdtp->Length) != 0) {
+ DBG("ERROR: XSDT@0x%lx checksum is non-zero; not using this XSDT\n",
+ (unsigned long)rsdp->XsdtPhysicalAddress);
+ xsdtp = NULL;
+ return NULL;
+ }
+ } else if (__improbable(rsdp->Revision == RSDP_VERSION_ACPI10 && rsdp->RsdtPhysicalAddress == 0)) {
+ DBG("RSDP RSDT Physical Address is 0!: Aborting acpi_find_table\n");
+ rsdp = NULL;
+ return NULL;
+ } else if (__improbable(rsdp->Revision == RSDP_VERSION_ACPI10)) {
+ /* RSDT (with 32-bit pointers to tables) */
+ xsdtp = NULL;
+ rsdtp = PHYSMAP_PTOV((uintptr_t)rsdp->RsdtPhysicalAddress);
+ if (cksum8((uint8_t *)rsdtp, rsdtp->Length) != 0) {
+ DBG("ERROR: RSDT@0x%lx checksum is non-zero; not using this RSDT\n",
+ (unsigned long)rsdp->RsdtPhysicalAddress);
+ rsdtp = NULL;
+ return NULL;
+ }
+ } else {
+ DBG("Unrecognized RSDP Revision (0x%x): Aborting acpi_find_table\n",
+ rsdp->Revision);
+ rsdp = NULL;
+ return NULL;
+ }
+ }
+
+ assert(xsdtp != NULL || rsdtp != NULL);
+
+ if (__probable(xsdtp != NULL)) {
+ return acpi_find_table_via_xsdt(xsdtp, signature);
+ } else if (rsdtp != NULL) {
+ return acpi_find_table_via_rsdt(rsdtp, signature);
+ }
+
+ return NULL;
+}
+
+/*
+ * Returns the count of enabled logical processors present in the ACPI
+ * MADT, or 0 if the MADT could not be located.
+ */
+uint32_t
+acpi_count_enabled_logical_processors(void)
+{
+ MULTIPLE_APIC_TABLE *madtp;
+ void *end_ptr;
+ APIC_HEADER *next_apic_entryp;
+ uint32_t enabled_cpu_count = 0;
+ uint64_t rsdp_physaddr;
+
+ rsdp_physaddr = efi_get_rsdp_physaddr();
+ if (__improbable(rsdp_physaddr == 0)) {
+ DBG("acpi_count_enabled_logical_processors: Could not get RSDP physaddr from EFI.\n");
+ return 0;
+ }
+
+ madtp = (MULTIPLE_APIC_TABLE *)acpi_find_table(rsdp_physaddr, ACPI_SIG_MADT);
+
+ if (__improbable(madtp == NULL)) {
+ DBG("acpi_count_enabled_logical_processors: Could not find the MADT.\n");
+ return 0;
+ }
+
+ end_ptr = (void *)((uintptr_t)madtp + madtp->Length);
+ next_apic_entryp = (APIC_HEADER *)((uintptr_t)madtp + sizeof(MULTIPLE_APIC_TABLE));
+
+ while ((void *)next_apic_entryp < end_ptr) {
+ switch (next_apic_entryp->Type) {
+ case APIC_PROCESSOR:
+ {
+ MADT_PROCESSOR_APIC *madt_procp = (MADT_PROCESSOR_APIC *)next_apic_entryp;
+ if (madt_procp->ProcessorEnabled) {
+ enabled_cpu_count++;
+ }
+
+ break;
+ }
+
+ default:
+ DBG("Ignoring MADT entry type 0x%x length 0x%x\n", next_apic_entryp->Type,
+ next_apic_entryp->Length);
+ break;
+ }
+
+ next_apic_entryp = (APIC_HEADER *)((uintptr_t)next_apic_entryp + next_apic_entryp->Length);
+ }
+
+ return enabled_cpu_count;