X-Git-Url: https://git.saurik.com/apple/xnu.git/blobdiff_plain/4452a7af2eac33dbad800bcc91f2399d62c18f53..3903760236c30e3b5ace7a4eefac3a269d68957c:/osfmk/i386/commpage/commpage.c?ds=sidebyside diff --git a/osfmk/i386/commpage/commpage.c b/osfmk/i386/commpage/commpage.c index 328e095ab..6dae08567 100644 --- a/osfmk/i386/commpage/commpage.c +++ b/osfmk/i386/commpage/commpage.c @@ -1,5 +1,5 @@ /* - * Copyright (c) 2003-2006 Apple Computer, Inc. All rights reserved. + * Copyright (c) 2003-2010 Apple Inc. All rights reserved. * * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ * @@ -48,43 +48,60 @@ #include #include #include +#include +#include +#include +#include +#include +#include #include #include +#include #include #include #include #include #include + #include #include +#include + +#include + +#if CONFIG_ATM +#include +#endif /* the lists of commpage routines are in commpage_asm.s */ extern commpage_descriptor* commpage_32_routines[]; extern commpage_descriptor* commpage_64_routines[]; -/* translated commpage descriptors from commpage_sigs.c */ -extern commpage_descriptor sigdata_descriptor; -extern commpage_descriptor *ba_descriptors[]; +extern vm_map_t commpage32_map; // the shared submap, set up in vm init +extern vm_map_t commpage64_map; // the shared submap, set up in vm init +extern vm_map_t commpage_text32_map; // the shared submap, set up in vm init +extern vm_map_t commpage_text64_map; // the shared submap, set up in vm init -extern vm_map_t com_region_map32; // the shared submap, set up in vm init -extern vm_map_t com_region_map64; // the shared submap, set up in vm init char *commPagePtr32 = NULL; // virtual addr in kernel map of 32-bit commpage char *commPagePtr64 = NULL; // ...and of 64-bit commpage -int _cpu_capabilities = 0; // define the capability vector +char *commPageTextPtr32 = NULL; // virtual addr in kernel map of 32-bit commpage +char *commPageTextPtr64 = NULL; // ...and of 64-bit commpage -int noVMX = 0; /* if true, do not set kHasAltivec in ppc _cpu_capabilities */ +uint64_t _cpu_capabilities = 0; // define the capability vector -void* dsmos_blobs[3]; /* ptrs to the system integrity data in each commpage */ -int dsmos_blob_count = 0; +typedef uint32_t commpage_address_t; -static uintptr_t next; // next available byte in comm page -static int cur_routine; // comm page address of "current" routine -static int matched; // true if we've found a match for "current" routine +static commpage_address_t next; // next available address in comm page static char *commPagePtr; // virtual addr in kernel map of commpage we are working on -static size_t commPageBaseOffset; // add to 32-bit runtime address to get offset in commpage +static commpage_address_t commPageBaseOffset; // subtract from 32-bit runtime address to get offset in virtual commpage in kernel map + +static commpage_time_data *time_data32 = NULL; +static commpage_time_data *time_data64 = NULL; + +decl_simple_lock_data(static,commpage_active_cpus_lock); /* Allocate the commpage and add to the shared submap created by vm: * 1. allocate a page in the kernel map (RW) @@ -95,23 +112,39 @@ static size_t commPageBaseOffset; // add to 32-bit runtime address to get offset static void* commpage_allocate( - vm_map_t submap, // com_region_map32 or com_region_map64 - size_t area_used ) // _COMM_PAGE32_AREA_USED or _COMM_PAGE64_AREA_USED + vm_map_t submap, // commpage32_map or commpage_map64 + size_t area_used, // _COMM_PAGE32_AREA_USED or _COMM_PAGE64_AREA_USED + vm_prot_t uperm) { - vm_offset_t kernel_addr; // address of commpage in kernel map + vm_offset_t kernel_addr = 0; // address of commpage in kernel map vm_offset_t zero = 0; vm_size_t size = area_used; // size actually populated vm_map_entry_t entry; ipc_port_t handle; + kern_return_t kr; if (submap == NULL) panic("commpage submap is null"); - if (vm_allocate(kernel_map,&kernel_addr,area_used,VM_FLAGS_ANYWHERE)) - panic("cannot allocate commpage"); - - if (vm_map_wire(kernel_map,kernel_addr,kernel_addr+area_used,VM_PROT_DEFAULT,FALSE)) - panic("cannot wire commpage"); + if ((kr = vm_map(kernel_map, + &kernel_addr, + area_used, + 0, + VM_FLAGS_ANYWHERE | VM_MAKE_TAG(VM_KERN_MEMORY_OSFMK), + NULL, + 0, + FALSE, + VM_PROT_ALL, + VM_PROT_ALL, + VM_INHERIT_NONE))) + panic("cannot allocate commpage %d", kr); + + if ((kr = vm_map_wire(kernel_map, + kernel_addr, + kernel_addr+area_used, + VM_PROT_DEFAULT|VM_PROT_MEMORY_TAG_MAKE(VM_KERN_MEMORY_OSFMK), + FALSE))) + panic("cannot wire commpage: %d", kr); /* * Now that the object is created and wired into the kernel map, mark it so that no delay @@ -121,19 +154,19 @@ commpage_allocate( * * JMM - What we really need is a way to create it like this in the first place. */ - if (!vm_map_lookup_entry( kernel_map, vm_map_trunc_page(kernel_addr), &entry) || entry->is_sub_map) - panic("cannot find commpage entry"); - entry->object.vm_object->copy_strategy = MEMORY_OBJECT_COPY_NONE; + if (!(kr = vm_map_lookup_entry( kernel_map, vm_map_trunc_page(kernel_addr, VM_MAP_PAGE_MASK(kernel_map)), &entry) || entry->is_sub_map)) + panic("cannot find commpage entry %d", kr); + VME_OBJECT(entry)->copy_strategy = MEMORY_OBJECT_COPY_NONE; - if (mach_make_memory_entry( kernel_map, // target map + if ((kr = mach_make_memory_entry( kernel_map, // target map &size, // size kernel_addr, // offset (address in kernel map) - VM_PROT_DEFAULT, // map it RW + uperm, // protections as specified &handle, // this is the object handle we get - NULL )) // parent_entry (what is this?) - panic("cannot make entry for commpage"); + NULL ))) // parent_entry (what is this?) + panic("cannot make entry for commpage %d", kr); - if (vm_map_64( submap, // target map (shared submap) + if ((kr = vm_map_64( submap, // target map (shared submap) &zero, // address (map into 1st page in submap) area_used, // size 0, // mask @@ -141,23 +174,29 @@ commpage_allocate( handle, // port is the memory entry we just made 0, // offset (map 1st page in memory entry) FALSE, // copy - VM_PROT_READ, // cur_protection (R-only in user map) - VM_PROT_READ, // max_protection - VM_INHERIT_SHARE )) // inheritance - panic("cannot map commpage"); + uperm, // cur_protection (R-only in user map) + uperm, // max_protection + VM_INHERIT_SHARE ))) // inheritance + panic("cannot map commpage %d", kr); ipc_port_release(handle); + /* Make the kernel mapping non-executable. This cannot be done + * at the time of map entry creation as mach_make_memory_entry + * cannot handle disjoint permissions at this time. + */ + kr = vm_protect(kernel_map, kernel_addr, area_used, FALSE, VM_PROT_READ | VM_PROT_WRITE); + assert (kr == KERN_SUCCESS); - return (void*) kernel_addr; // return address in kernel map + return (void*)(intptr_t)kernel_addr; // return address in kernel map } /* Get address (in kernel map) of a commpage field. */ static void* commpage_addr_of( - int addr_at_runtime ) + commpage_address_t addr_at_runtime ) { - return (void*) ((uintptr_t)commPagePtr + addr_at_runtime - commPageBaseOffset); + return (void*) ((uintptr_t)commPagePtr + (addr_at_runtime - commPageBaseOffset)); } /* Determine number of CPUs on this system. We cannot rely on @@ -183,7 +222,7 @@ commpage_cpus( void ) static void commpage_init_cpu_capabilities( void ) { - int bits; + uint64_t bits; int cpus; ml_cpu_info_t cpu_info; @@ -191,6 +230,15 @@ commpage_init_cpu_capabilities( void ) ml_cpu_get_info(&cpu_info); switch (cpu_info.vector_unit) { + case 9: + bits |= kHasAVX1_0; + /* fall thru */ + case 8: + bits |= kHasSSE4_2; + /* fall thru */ + case 7: + bits |= kHasSSE4_1; + /* fall thru */ case 6: bits |= kHasSupplementalSSE3; /* fall thru */ @@ -223,21 +271,97 @@ commpage_init_cpu_capabilities( void ) } cpus = commpage_cpus(); // how many CPUs do we have - if (cpus == 1) - bits |= kUP; - bits |= (cpus << kNumCPUsShift); bits |= kFastThreadLocalStorage; // we use %gs for TLS - if (cpu_mode_is64bit()) // k64Bit means processor is 64-bit capable - bits |= k64Bit; - +#define setif(_bits, _bit, _condition) \ + if (_condition) _bits |= _bit + + setif(bits, kUP, cpus == 1); + setif(bits, k64Bit, cpu_mode_is64bit()); + setif(bits, kSlow, tscFreq <= SLOW_TSC_THRESHOLD); + + setif(bits, kHasAES, cpuid_features() & + CPUID_FEATURE_AES); + setif(bits, kHasF16C, cpuid_features() & + CPUID_FEATURE_F16C); + setif(bits, kHasRDRAND, cpuid_features() & + CPUID_FEATURE_RDRAND); + setif(bits, kHasFMA, cpuid_features() & + CPUID_FEATURE_FMA); + + setif(bits, kHasBMI1, cpuid_leaf7_features() & + CPUID_LEAF7_FEATURE_BMI1); + setif(bits, kHasBMI2, cpuid_leaf7_features() & + CPUID_LEAF7_FEATURE_BMI2); + setif(bits, kHasRTM, cpuid_leaf7_features() & + CPUID_LEAF7_FEATURE_RTM); + setif(bits, kHasHLE, cpuid_leaf7_features() & + CPUID_LEAF7_FEATURE_HLE); + setif(bits, kHasAVX2_0, cpuid_leaf7_features() & + CPUID_LEAF7_FEATURE_AVX2); + setif(bits, kHasRDSEED, cpuid_features() & + CPUID_LEAF7_FEATURE_RDSEED); + setif(bits, kHasADX, cpuid_features() & + CPUID_LEAF7_FEATURE_ADX); + + setif(bits, kHasMPX, cpuid_leaf7_features() & + CPUID_LEAF7_FEATURE_MPX); + setif(bits, kHasSGX, cpuid_leaf7_features() & + CPUID_LEAF7_FEATURE_SGX); + uint64_t misc_enable = rdmsr64(MSR_IA32_MISC_ENABLE); + setif(bits, kHasENFSTRG, (misc_enable & 1ULL) && + (cpuid_leaf7_features() & + CPUID_LEAF7_FEATURE_ERMS)); + _cpu_capabilities = bits; // set kernel version for use by drivers etc } -int -_get_cpu_capabilities() +/* initialize the approx_time_supported flag and set the approx time to 0. + * Called during initial commpage population. + */ +static void +commpage_mach_approximate_time_init(void) +{ + char *cp = commPagePtr32; + uint8_t supported; + +#ifdef CONFIG_MACH_APPROXIMATE_TIME + supported = 1; +#else + supported = 0; +#endif + if ( cp ) { + cp += (_COMM_PAGE_APPROX_TIME_SUPPORTED - _COMM_PAGE32_BASE_ADDRESS); + *(boolean_t *)cp = supported; + } + + cp = commPagePtr64; + if ( cp ) { + cp += (_COMM_PAGE_APPROX_TIME_SUPPORTED - _COMM_PAGE32_START_ADDRESS); + *(boolean_t *)cp = supported; + } + commpage_update_mach_approximate_time(0); +} + +static void +commpage_mach_continuous_time_init(void) +{ + commpage_update_mach_continuous_time(0); +} + +static void +commpage_boottime_init(void) +{ + clock_sec_t secs; + clock_usec_t microsecs; + clock_get_boottime_microtime(&secs, µsecs); + commpage_update_boottime(secs * USEC_PER_SEC + microsecs); +} + +uint64_t +_get_cpu_capabilities(void) { return _cpu_capabilities; } @@ -246,164 +370,91 @@ _get_cpu_capabilities() static void commpage_stuff( - int address, + commpage_address_t address, const void *source, int length ) { void *dest = commpage_addr_of(address); - if ((uintptr_t)dest < next) - panic("commpage overlap at address 0x%x, 0x%x < 0x%x", address, dest, next); + if (address < next) + panic("commpage overlap at address 0x%p, 0x%x < 0x%x", dest, address, next); bcopy(source,dest,length); - next = ((uintptr_t)dest + length); -} - -static void -commpage_stuff_swap( - int address, - void *source, - int length, - int legacy ) -{ - if ( legacy ) { - void *dest = commpage_addr_of(address); - dest = (void *)((uintptr_t) dest + _COMM_PAGE_SIGS_OFFSET); - switch (length) { - case 2: - OSWriteSwapInt16(dest, 0, *(uint16_t *)source); - break; - case 4: - OSWriteSwapInt32(dest, 0, *(uint32_t *)source); - break; - case 8: - OSWriteSwapInt64(dest, 0, *(uint64_t *)source); - break; - } - } -} - -static void -commpage_stuff2( - int address, - void *source, - int length, - int legacy ) -{ - commpage_stuff_swap(address, source, length, legacy); - commpage_stuff(address, source, length); + next = address + length; } /* Copy a routine into comm page if it matches running machine. */ static void commpage_stuff_routine( - commpage_descriptor *rd ) + commpage_descriptor *rd ) { - int must,cant; - - if (rd->commpage_address != cur_routine) { - if ((cur_routine!=0) && (matched==0)) - panic("commpage no match for last, next address %08x", rd->commpage_address); - cur_routine = rd->commpage_address; - matched = 0; - } - - must = _cpu_capabilities & rd->musthave; - cant = _cpu_capabilities & rd->canthave; - - if ((must == rd->musthave) && (cant == 0)) { - if (matched) - panic("commpage multiple matches for address %08x", rd->commpage_address); - matched = 1; - - commpage_stuff(rd->commpage_address,rd->code_address,rd->code_length); - } + commpage_stuff(rd->commpage_address,rd->code_address,rd->code_length); } /* Fill in the 32- or 64-bit commpage. Called once for each. - * The 32-bit ("legacy") commpage has a bunch of stuff added to it - * for translated processes, some of which is byte-swapped. */ static void commpage_populate_one( - vm_map_t submap, // com_region_map32 or com_region_map64 + vm_map_t submap, // commpage32_map or compage64_map char ** kernAddressPtr, // &commPagePtr32 or &commPagePtr64 size_t area_used, // _COMM_PAGE32_AREA_USED or _COMM_PAGE64_AREA_USED - size_t base_offset, // will become commPageBaseOffset - commpage_descriptor** commpage_routines, // list of routine ptrs for this commpage - boolean_t legacy, // true if 32-bit commpage - const char* signature ) // "commpage 32-bit" or "commpage 64-bit" + commpage_address_t base_offset, // will become commPageBaseOffset + commpage_time_data** time_data, // &time_data32 or &time_data64 + const char* signature, // "commpage 32-bit" or "commpage 64-bit" + vm_prot_t uperm) { - short c2; - static double two52 = 1048576.0 * 1048576.0 * 4096.0; // 2**52 - static double ten6 = 1000000.0; // 10**6 - commpage_descriptor **rd; + uint8_t c1; + uint16_t c2; + int c4; + uint64_t c8; + uint32_t cfamily; short version = _COMM_PAGE_THIS_VERSION; - int swapcaps; - next = (uintptr_t) NULL; - cur_routine = 0; - commPagePtr = (char *)commpage_allocate( submap, (vm_size_t) area_used ); + next = 0; + commPagePtr = (char *)commpage_allocate( submap, (vm_size_t) area_used, uperm ); *kernAddressPtr = commPagePtr; // save address either in commPagePtr32 or 64 commPageBaseOffset = base_offset; + *time_data = commpage_addr_of( _COMM_PAGE_TIME_DATA_START ); + /* Stuff in the constants. We move things into the comm page in strictly * ascending order, so we can check for overlap and panic if so. + * Note: the 32-bit cpu_capabilities vector is retained in addition to + * the expanded 64-bit vector. */ - commpage_stuff(_COMM_PAGE_SIGNATURE,signature,strlen(signature)); - commpage_stuff2(_COMM_PAGE_VERSION,&version,sizeof(short),legacy); - commpage_stuff(_COMM_PAGE_CPU_CAPABILITIES,&_cpu_capabilities,sizeof(int)); - - /* excuse our magic constants, we cannot include ppc/cpu_capabilities.h */ - /* always set kCache32 and kDcbaAvailable */ - swapcaps = 0x44; - if ( _cpu_capabilities & kUP ) - swapcaps |= (kUP + (1 << kNumCPUsShift)); - else - swapcaps |= 2 << kNumCPUsShift; /* limit #cpus to 2 */ - if ( ! noVMX ) /* if rosetta will be emulating altivec... */ - swapcaps |= 0x101; /* ...then set kHasAltivec and kDataStreamsAvailable too */ - commpage_stuff_swap(_COMM_PAGE_CPU_CAPABILITIES, &swapcaps, sizeof(int), legacy); - c2 = 32; - commpage_stuff_swap(_COMM_PAGE_CACHE_LINESIZE,&c2,2,legacy); - - if (_cpu_capabilities & kCache32) - c2 = 32; - else if (_cpu_capabilities & kCache64) + commpage_stuff(_COMM_PAGE_SIGNATURE,signature,(int)MIN(_COMM_PAGE_SIGNATURELEN, strlen(signature))); + commpage_stuff(_COMM_PAGE_CPU_CAPABILITIES64,&_cpu_capabilities,sizeof(_cpu_capabilities)); + commpage_stuff(_COMM_PAGE_VERSION,&version,sizeof(short)); + commpage_stuff(_COMM_PAGE_CPU_CAPABILITIES,&_cpu_capabilities,sizeof(uint32_t)); + + c2 = 32; // default + if (_cpu_capabilities & kCache64) c2 = 64; else if (_cpu_capabilities & kCache128) c2 = 128; commpage_stuff(_COMM_PAGE_CACHE_LINESIZE,&c2,2); - if ( legacy ) { - commpage_stuff2(_COMM_PAGE_2_TO_52,&two52,8,legacy); - commpage_stuff2(_COMM_PAGE_10_TO_6,&ten6,8,legacy); - } - - for( rd = commpage_routines; *rd != NULL ; rd++ ) - commpage_stuff_routine(*rd); + c4 = MP_SPIN_TRIES; + commpage_stuff(_COMM_PAGE_SPIN_COUNT,&c4,4); - if (!matched) - panic("commpage no match on last routine"); + /* machine_info valid after ml_get_max_cpus() */ + c1 = machine_info.physical_cpu_max; + commpage_stuff(_COMM_PAGE_PHYSICAL_CPUS,&c1,1); + c1 = machine_info.logical_cpu_max; + commpage_stuff(_COMM_PAGE_LOGICAL_CPUS,&c1,1); - if (next > (uintptr_t)_COMM_PAGE_END) - panic("commpage overflow: next = 0x%08x, commPagePtr = 0x%08x", next, (uintptr_t)commPagePtr); + c8 = ml_cpu_cache_size(0); + commpage_stuff(_COMM_PAGE_MEMORY_SIZE, &c8, 8); - if ( legacy ) { - next = (uintptr_t) NULL; - for( rd = ba_descriptors; *rd != NULL ; rd++ ) - commpage_stuff_routine(*rd); + cfamily = cpuid_info()->cpuid_cpufamily; + commpage_stuff(_COMM_PAGE_CPUFAMILY, &cfamily, 4); - next = (uintptr_t) NULL; - commpage_stuff_routine(&sigdata_descriptor); - } + if (next > _COMM_PAGE_END) + panic("commpage overflow: next = 0x%08x, commPagePtr = 0x%p", next, commPagePtr); - /* salt away a ptr to the system integrity data in this commpage */ - dsmos_blobs[dsmos_blob_count++] = - commpage_addr_of( _COMM_PAGE_SYSTEM_INTEGRITY ); } @@ -419,27 +470,425 @@ commpage_populate( void ) { commpage_init_cpu_capabilities(); - commpage_populate_one( com_region_map32, + commpage_populate_one( commpage32_map, &commPagePtr32, _COMM_PAGE32_AREA_USED, _COMM_PAGE32_BASE_ADDRESS, - commpage_32_routines, - TRUE, /* legacy (32-bit) commpage */ - "commpage 32-bit"); + &time_data32, + "commpage 32-bit", + VM_PROT_READ); +#ifndef __LP64__ pmap_commpage32_init((vm_offset_t) commPagePtr32, _COMM_PAGE32_BASE_ADDRESS, _COMM_PAGE32_AREA_USED/INTEL_PGBYTES); +#endif + time_data64 = time_data32; /* if no 64-bit commpage, point to 32-bit */ if (_cpu_capabilities & k64Bit) { - commpage_populate_one( com_region_map64, + commpage_populate_one( commpage64_map, &commPagePtr64, _COMM_PAGE64_AREA_USED, - _COMM_PAGE32_START_ADDRESS, /* because kernel is built 32-bit */ - commpage_64_routines, - FALSE, /* not a legacy commpage */ - "commpage 64-bit"); + _COMM_PAGE32_START_ADDRESS, /* commpage address are relative to 32-bit commpage placement */ + &time_data64, + "commpage 64-bit", + VM_PROT_READ); +#ifndef __LP64__ pmap_commpage64_init((vm_offset_t) commPagePtr64, _COMM_PAGE64_BASE_ADDRESS, _COMM_PAGE64_AREA_USED/INTEL_PGBYTES); +#endif } + simple_lock_init(&commpage_active_cpus_lock, 0); + + commpage_update_active_cpus(); + commpage_mach_approximate_time_init(); + commpage_mach_continuous_time_init(); + commpage_boottime_init(); rtc_nanotime_init_commpage(); + commpage_update_kdebug_state(); +#if CONFIG_ATM + commpage_update_atm_diagnostic_config(atm_get_diagnostic_config()); +#endif +} + +/* Fill in the common routines during kernel initialization. + * This is called before user-mode code is running. + */ +void commpage_text_populate( void ){ + commpage_descriptor **rd; + + next = 0; + commPagePtr = (char *) commpage_allocate(commpage_text32_map, (vm_size_t) _COMM_PAGE_TEXT_AREA_USED, VM_PROT_READ | VM_PROT_EXECUTE); + commPageTextPtr32 = commPagePtr; + + char *cptr = commPagePtr; + int i=0; + for(; i< _COMM_PAGE_TEXT_AREA_USED; i++){ + cptr[i]=0xCC; + } + + commPageBaseOffset = _COMM_PAGE_TEXT_START; + for (rd = commpage_32_routines; *rd != NULL; rd++) { + commpage_stuff_routine(*rd); + } + +#ifndef __LP64__ + pmap_commpage32_init((vm_offset_t) commPageTextPtr32, _COMM_PAGE_TEXT_START, + _COMM_PAGE_TEXT_AREA_USED/INTEL_PGBYTES); +#endif + + if (_cpu_capabilities & k64Bit) { + next = 0; + commPagePtr = (char *) commpage_allocate(commpage_text64_map, (vm_size_t) _COMM_PAGE_TEXT_AREA_USED, VM_PROT_READ | VM_PROT_EXECUTE); + commPageTextPtr64 = commPagePtr; + + cptr=commPagePtr; + for(i=0; i<_COMM_PAGE_TEXT_AREA_USED; i++){ + cptr[i]=0xCC; + } + + for (rd = commpage_64_routines; *rd !=NULL; rd++) { + commpage_stuff_routine(*rd); + } + +#ifndef __LP64__ + pmap_commpage64_init((vm_offset_t) commPageTextPtr64, _COMM_PAGE_TEXT_START, + _COMM_PAGE_TEXT_AREA_USED/INTEL_PGBYTES); +#endif + } + + if (next > _COMM_PAGE_TEXT_END) + panic("commpage text overflow: next=0x%08x, commPagePtr=%p", next, commPagePtr); + +} + +/* Update commpage nanotime information. + * + * This routine must be serialized by some external means, ie a lock. + */ + +void +commpage_set_nanotime( + uint64_t tsc_base, + uint64_t ns_base, + uint32_t scale, + uint32_t shift ) +{ + commpage_time_data *p32 = time_data32; + commpage_time_data *p64 = time_data64; + static uint32_t generation = 0; + uint32_t next_gen; + + if (p32 == NULL) /* have commpages been allocated yet? */ + return; + + if ( generation != p32->nt_generation ) + panic("nanotime trouble 1"); /* possibly not serialized */ + if ( ns_base < p32->nt_ns_base ) + panic("nanotime trouble 2"); + if ((shift != 0) && ((_cpu_capabilities & kSlow)==0) ) + panic("nanotime trouble 3"); + + next_gen = ++generation; + if (next_gen == 0) + next_gen = ++generation; + + p32->nt_generation = 0; /* mark invalid, so commpage won't try to use it */ + p64->nt_generation = 0; + + p32->nt_tsc_base = tsc_base; + p64->nt_tsc_base = tsc_base; + + p32->nt_ns_base = ns_base; + p64->nt_ns_base = ns_base; + + p32->nt_scale = scale; + p64->nt_scale = scale; + + p32->nt_shift = shift; + p64->nt_shift = shift; + + p32->nt_generation = next_gen; /* mark data as valid */ + p64->nt_generation = next_gen; +} + + +/* Disable commpage gettimeofday(), forcing commpage to call through to the kernel. */ + +void +commpage_disable_timestamp( void ) +{ + time_data32->gtod_generation = 0; + time_data64->gtod_generation = 0; +} + + +/* Update commpage gettimeofday() information. As with nanotime(), we interleave + * updates to the 32- and 64-bit commpage, in order to keep time more nearly in sync + * between the two environments. + * + * This routine must be serializeed by some external means, ie a lock. + */ + + void + commpage_set_timestamp( + uint64_t abstime, + uint64_t secs ) +{ + commpage_time_data *p32 = time_data32; + commpage_time_data *p64 = time_data64; + static uint32_t generation = 0; + uint32_t next_gen; + + next_gen = ++generation; + if (next_gen == 0) + next_gen = ++generation; + + p32->gtod_generation = 0; /* mark invalid, so commpage won't try to use it */ + p64->gtod_generation = 0; + + p32->gtod_ns_base = abstime; + p64->gtod_ns_base = abstime; + + p32->gtod_sec_base = secs; + p64->gtod_sec_base = secs; + + p32->gtod_generation = next_gen; /* mark data as valid */ + p64->gtod_generation = next_gen; +} + + +/* Update _COMM_PAGE_MEMORY_PRESSURE. Called periodically from vm's compute_memory_pressure() */ + +void +commpage_set_memory_pressure( + unsigned int pressure ) +{ + char *cp; + uint32_t *ip; + + cp = commPagePtr32; + if ( cp ) { + cp += (_COMM_PAGE_MEMORY_PRESSURE - _COMM_PAGE32_BASE_ADDRESS); + ip = (uint32_t*) (void *) cp; + *ip = (uint32_t) pressure; + } + + cp = commPagePtr64; + if ( cp ) { + cp += (_COMM_PAGE_MEMORY_PRESSURE - _COMM_PAGE32_START_ADDRESS); + ip = (uint32_t*) (void *) cp; + *ip = (uint32_t) pressure; + } + +} + + +/* Update _COMM_PAGE_SPIN_COUNT. We might want to reduce when running on a battery, etc. */ + +void +commpage_set_spin_count( + unsigned int count ) +{ + char *cp; + uint32_t *ip; + + if (count == 0) /* we test for 0 after decrement, not before */ + count = 1; + + cp = commPagePtr32; + if ( cp ) { + cp += (_COMM_PAGE_SPIN_COUNT - _COMM_PAGE32_BASE_ADDRESS); + ip = (uint32_t*) (void *) cp; + *ip = (uint32_t) count; + } + + cp = commPagePtr64; + if ( cp ) { + cp += (_COMM_PAGE_SPIN_COUNT - _COMM_PAGE32_START_ADDRESS); + ip = (uint32_t*) (void *) cp; + *ip = (uint32_t) count; + } + +} + +/* Updated every time a logical CPU goes offline/online */ +void +commpage_update_active_cpus(void) +{ + char *cp; + volatile uint8_t *ip; + + /* At least 32-bit commpage must be initialized */ + if (!commPagePtr32) + return; + + simple_lock(&commpage_active_cpus_lock); + + cp = commPagePtr32; + cp += (_COMM_PAGE_ACTIVE_CPUS - _COMM_PAGE32_BASE_ADDRESS); + ip = (volatile uint8_t*) cp; + *ip = (uint8_t) processor_avail_count; + + cp = commPagePtr64; + if ( cp ) { + cp += (_COMM_PAGE_ACTIVE_CPUS - _COMM_PAGE32_START_ADDRESS); + ip = (volatile uint8_t*) cp; + *ip = (uint8_t) processor_avail_count; + } + + simple_unlock(&commpage_active_cpus_lock); +} + +/* + * Update the commpage with current kdebug state. This currently has bits for + * global trace state, and typefilter enablement. It is likely additional state + * will be tracked in the future. + * + * INVARIANT: This value will always be 0 if global tracing is disabled. This + * allows simple guard tests of "if (*_COMM_PAGE_KDEBUG_ENABLE) { ... }" + */ +void +commpage_update_kdebug_state(void) +{ + volatile uint32_t *saved_data_ptr; + char *cp; + + cp = commPagePtr32; + if (cp) { + cp += (_COMM_PAGE_KDEBUG_ENABLE - _COMM_PAGE32_BASE_ADDRESS); + saved_data_ptr = (volatile uint32_t *)cp; + *saved_data_ptr = kdebug_commpage_state(); + } + + cp = commPagePtr64; + if (cp) { + cp += (_COMM_PAGE_KDEBUG_ENABLE - _COMM_PAGE32_START_ADDRESS); + saved_data_ptr = (volatile uint32_t *)cp; + *saved_data_ptr = kdebug_commpage_state(); + } } + +/* Ditto for atm_diagnostic_config */ +void +commpage_update_atm_diagnostic_config(uint32_t diagnostic_config) +{ + volatile uint32_t *saved_data_ptr; + char *cp; + + cp = commPagePtr32; + if (cp) { + cp += (_COMM_PAGE_ATM_DIAGNOSTIC_CONFIG - _COMM_PAGE32_BASE_ADDRESS); + saved_data_ptr = (volatile uint32_t *)cp; + *saved_data_ptr = diagnostic_config; + } + + cp = commPagePtr64; + if ( cp ) { + cp += (_COMM_PAGE_ATM_DIAGNOSTIC_CONFIG - _COMM_PAGE32_START_ADDRESS); + saved_data_ptr = (volatile uint32_t *)cp; + *saved_data_ptr = diagnostic_config; + } +} + +/* + * update the commpage data for last known value of mach_absolute_time() + */ + +void +commpage_update_mach_approximate_time(uint64_t abstime) +{ +#ifdef CONFIG_MACH_APPROXIMATE_TIME + uint64_t saved_data; + char *cp; + + cp = commPagePtr32; + if ( cp ) { + cp += (_COMM_PAGE_APPROX_TIME - _COMM_PAGE32_BASE_ADDRESS); + saved_data = *(uint64_t *)cp; + if (saved_data < abstime) { + /* ignoring the success/fail return value assuming that + * if the value has been updated since we last read it, + * "someone" has a newer timestamp than us and ours is + * now invalid. */ + OSCompareAndSwap64(saved_data, abstime, (uint64_t *)cp); + } + } + cp = commPagePtr64; + if ( cp ) { + cp += (_COMM_PAGE_APPROX_TIME - _COMM_PAGE32_START_ADDRESS); + saved_data = *(uint64_t *)cp; + if (saved_data < abstime) { + /* ignoring the success/fail return value assuming that + * if the value has been updated since we last read it, + * "someone" has a newer timestamp than us and ours is + * now invalid. */ + OSCompareAndSwap64(saved_data, abstime, (uint64_t *)cp); + } + } +#else +#pragma unused (abstime) +#endif +} + +void +commpage_update_mach_continuous_time(uint64_t sleeptime) +{ + char *cp; + cp = commPagePtr32; + if (cp) { + cp += (_COMM_PAGE_CONT_TIMEBASE - _COMM_PAGE32_START_ADDRESS); + *(uint64_t *)cp = sleeptime; + } + + cp = commPagePtr64; + if (cp) { + cp += (_COMM_PAGE_CONT_TIMEBASE - _COMM_PAGE32_START_ADDRESS); + *(uint64_t *)cp = sleeptime; + } +} + +void +commpage_update_boottime(uint64_t boottime) +{ + char *cp; + cp = commPagePtr32; + if (cp) { + cp += (_COMM_PAGE_BOOTTIME_USEC - _COMM_PAGE32_START_ADDRESS); + *(uint64_t *)cp = boottime; + } + + cp = commPagePtr64; + if (cp) { + cp += (_COMM_PAGE_BOOTTIME_USEC - _COMM_PAGE32_START_ADDRESS); + *(uint64_t *)cp = boottime; + } +} + + +extern user32_addr_t commpage_text32_location; +extern user64_addr_t commpage_text64_location; + +/* Check to see if a given address is in the Preemption Free Zone (PFZ) */ + +uint32_t +commpage_is_in_pfz32(uint32_t addr32) +{ + if ( (addr32 >= (commpage_text32_location + _COMM_TEXT_PFZ_START_OFFSET)) + && (addr32 < (commpage_text32_location+_COMM_TEXT_PFZ_END_OFFSET))) { + return 1; + } + else + return 0; +} + +uint32_t +commpage_is_in_pfz64(addr64_t addr64) +{ + if ( (addr64 >= (commpage_text64_location + _COMM_TEXT_PFZ_START_OFFSET)) + && (addr64 < (commpage_text64_location + _COMM_TEXT_PFZ_END_OFFSET))) { + return 1; + } + else + return 0; +} +