2 * SPDX-License-Identifier: BSD-4-Clause
4 * Copyright (c) 2003 Peter Wemm.
5 * Copyright (c) 1992 Terrence R. Lambert.
6 * Copyright (c) 1982, 1987, 1990 The Regents of the University of California.
9 * This code is derived from software contributed to Berkeley by
12 * Redistribution and use in source and binary forms, with or without
13 * modification, are permitted provided that the following conditions
15 * 1. Redistributions of source code must retain the above copyright
16 * notice, this list of conditions and the following disclaimer.
17 * 2. Redistributions in binary form must reproduce the above copyright
18 * notice, this list of conditions and the following disclaimer in the
19 * documentation and/or other materials provided with the distribution.
20 * 3. All advertising materials mentioning features or use of this software
21 * must display the following acknowledgement:
22 * This product includes software developed by the University of
23 * California, Berkeley and its contributors.
24 * 4. Neither the name of the University nor the names of its contributors
25 * may be used to endorse or promote products derived from this software
26 * without specific prior written permission.
28 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
29 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
30 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
31 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
32 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
33 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
34 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
35 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
36 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
37 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
40 * from: @(#)machdep.c 7.4 (Berkeley) 6/3/91
43 #include <sys/cdefs.h>
44 __FBSDID("$FreeBSD$");
46 #include "opt_atpic.h"
51 #include "opt_kstack_pages.h"
52 #include "opt_maxmem.h"
53 #include "opt_mp_watchdog.h"
55 #include "opt_platform.h"
56 #include "opt_sched.h"
58 #include <sys/param.h>
60 #include <sys/systm.h>
64 #include <sys/callout.h>
69 #include <sys/eventhandler.h>
71 #include <sys/imgact.h>
73 #include <sys/kernel.h>
75 #include <sys/linker.h>
77 #include <sys/malloc.h>
78 #include <sys/memrange.h>
79 #include <sys/msgbuf.h>
80 #include <sys/mutex.h>
82 #include <sys/ptrace.h>
83 #include <sys/reboot.h>
84 #include <sys/rwlock.h>
85 #include <sys/sched.h>
86 #include <sys/signalvar.h>
90 #include <sys/syscallsubr.h>
91 #include <sys/sysctl.h>
92 #include <sys/sysent.h>
93 #include <sys/sysproto.h>
94 #include <sys/ucontext.h>
95 #include <sys/vmmeter.h>
98 #include <vm/vm_extern.h>
99 #include <vm/vm_kern.h>
100 #include <vm/vm_page.h>
101 #include <vm/vm_map.h>
102 #include <vm/vm_object.h>
103 #include <vm/vm_pager.h>
104 #include <vm/vm_param.h>
105 #include <vm/vm_phys.h>
109 #error KDB must be enabled in order for DDB to work!
112 #include <ddb/db_sym.h>
115 #include <net/netisr.h>
117 #include <machine/clock.h>
118 #include <machine/cpu.h>
119 #include <machine/cputypes.h>
120 #include <machine/frame.h>
121 #include <machine/intr_machdep.h>
123 #include <machine/md_var.h>
124 #include <machine/metadata.h>
125 #include <machine/mp_watchdog.h>
126 #include <machine/pc/bios.h>
127 #include <machine/pcb.h>
128 #include <machine/proc.h>
129 #include <machine/reg.h>
130 #include <machine/sigframe.h>
131 #include <machine/specialreg.h>
132 #include <machine/trap.h>
133 #include <machine/tss.h>
134 #include <x86/ucode.h>
135 #include <x86/ifunc.h>
137 #include <machine/smp.h>
144 #include <x86/isa/icu.h>
146 #include <x86/apicvar.h>
149 #include <isa/isareg.h>
151 #include <x86/init.h>
153 /* Sanity check for __curthread() */
154 CTASSERT(offsetof(struct pcpu, pc_curthread) == 0);
157 * The PTI trampoline stack needs enough space for a hardware trapframe and a
158 * couple of scratch registers, as well as the trapframe left behind after an
161 CTASSERT(PC_PTI_STACK_SZ * sizeof(register_t) >= 2 * sizeof(struct pti_frame) -
162 offsetof(struct pti_frame, pti_rip));
164 extern u_int64_t hammer_time(u_int64_t, u_int64_t);
166 #define CS_SECURE(cs) (ISPL(cs) == SEL_UPL)
167 #define EFL_SECURE(ef, oef) ((((ef) ^ (oef)) & ~PSL_USERCHANGE) == 0)
169 static void cpu_startup(void *);
170 static void get_fpcontext(struct thread *td, mcontext_t *mcp,
171 char *xfpusave, size_t xfpusave_len);
172 static int set_fpcontext(struct thread *td, mcontext_t *mcp,
173 char *xfpustate, size_t xfpustate_len);
174 SYSINIT(cpu, SI_SUB_CPU, SI_ORDER_FIRST, cpu_startup, NULL);
176 /* Preload data parse function */
177 static caddr_t native_parse_preload_data(u_int64_t);
179 /* Native function to fetch and parse the e820 map */
180 static void native_parse_memmap(caddr_t, vm_paddr_t *, int *);
182 /* Default init_ops implementation. */
183 struct init_ops init_ops = {
184 .parse_preload_data = native_parse_preload_data,
185 .early_clock_source_init = i8254_init,
186 .early_delay = i8254_delay,
187 .parse_memmap = native_parse_memmap,
189 .mp_bootaddress = mp_bootaddress,
190 .start_all_aps = native_start_all_aps,
193 .msi_init = msi_init,
198 * Physical address of the EFI System Table. Stashed from the metadata hints
199 * passed into the kernel and used by the EFI code to call runtime services.
201 vm_paddr_t efi_systbl_phys;
203 /* Intel ICH registers */
204 #define ICH_PMBASE 0x400
205 #define ICH_SMI_EN ICH_PMBASE + 0x30
207 int _udatasel, _ucodesel, _ucode32sel, _ufssel, _ugssel;
214 struct kva_md_info kmi;
216 static struct trapframe proc0_tf;
217 struct region_descriptor r_idt;
220 struct pcpu temp_bsp_pcpu;
224 struct mem_range_softc mem_range_softc;
226 struct mtx dt_lock; /* lock for GDT and LDT */
228 void (*vmm_resume_p)(void);
238 * On MacBooks, we need to disallow the legacy USB circuit to
239 * generate an SMI# because this can cause several problems,
240 * namely: incorrect CPU frequency detection and failure to
242 * We do this by disabling a bit in the SMI_EN (SMI Control and
243 * Enable register) of the Intel ICH LPC Interface Bridge.
245 sysenv = kern_getenv("smbios.system.product");
246 if (sysenv != NULL) {
247 if (strncmp(sysenv, "MacBook1,1", 10) == 0 ||
248 strncmp(sysenv, "MacBook3,1", 10) == 0 ||
249 strncmp(sysenv, "MacBook4,1", 10) == 0 ||
250 strncmp(sysenv, "MacBookPro1,1", 13) == 0 ||
251 strncmp(sysenv, "MacBookPro1,2", 13) == 0 ||
252 strncmp(sysenv, "MacBookPro3,1", 13) == 0 ||
253 strncmp(sysenv, "MacBookPro4,1", 13) == 0 ||
254 strncmp(sysenv, "Macmini1,1", 10) == 0) {
256 printf("Disabling LEGACY_USB_EN bit on "
258 outl(ICH_SMI_EN, inl(ICH_SMI_EN) & ~0x8);
264 * Good {morning,afternoon,evening,night}.
270 * Display physical memory if SMBIOS reports reasonable amount.
273 sysenv = kern_getenv("smbios.memory.enabled");
274 if (sysenv != NULL) {
275 memsize = (uintmax_t)strtoul(sysenv, (char **)NULL, 10) << 10;
278 if (memsize < ptoa((uintmax_t)vm_free_count()))
279 memsize = ptoa((uintmax_t)Maxmem);
280 printf("real memory = %ju (%ju MB)\n", memsize, memsize >> 20);
281 realmem = atop(memsize);
284 * Display any holes after the first chunk of extended memory.
289 printf("Physical memory chunk(s):\n");
290 for (indx = 0; phys_avail[indx + 1] != 0; indx += 2) {
293 size = phys_avail[indx + 1] - phys_avail[indx];
295 "0x%016jx - 0x%016jx, %ju bytes (%ju pages)\n",
296 (uintmax_t)phys_avail[indx],
297 (uintmax_t)phys_avail[indx + 1] - 1,
298 (uintmax_t)size, (uintmax_t)size / PAGE_SIZE);
302 vm_ksubmap_init(&kmi);
304 printf("avail memory = %ju (%ju MB)\n",
305 ptoa((uintmax_t)vm_free_count()),
306 ptoa((uintmax_t)vm_free_count()) / 1048576);
308 if (bootverbose && intel_graphics_stolen_base != 0)
309 printf("intel stolen mem: base %#jx size %ju MB\n",
310 (uintmax_t)intel_graphics_stolen_base,
311 (uintmax_t)intel_graphics_stolen_size / 1024 / 1024);
315 * Set up buffers, so they can be used to read disk labels.
318 vm_pager_bufferinit();
324 * Send an interrupt to process.
326 * Stack is set up to allow sigcode stored
327 * at top to call routine, followed by call
328 * to sigreturn routine below. After sigreturn
329 * resets the signal mask, the stack, and the
330 * frame pointer, it returns to the user
334 sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask)
336 struct sigframe sf, *sfp;
342 struct trapframe *regs;
351 PROC_LOCK_ASSERT(p, MA_OWNED);
352 sig = ksi->ksi_signo;
354 mtx_assert(&psp->ps_mtx, MA_OWNED);
356 oonstack = sigonstack(regs->tf_rsp);
358 if (cpu_max_ext_state_size > sizeof(struct savefpu) && use_xsave) {
359 xfpusave_len = cpu_max_ext_state_size - sizeof(struct savefpu);
360 xfpusave = __builtin_alloca(xfpusave_len);
366 /* Save user context. */
367 bzero(&sf, sizeof(sf));
368 sf.sf_uc.uc_sigmask = *mask;
369 sf.sf_uc.uc_stack = td->td_sigstk;
370 sf.sf_uc.uc_stack.ss_flags = (td->td_pflags & TDP_ALTSTACK)
371 ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE;
372 sf.sf_uc.uc_mcontext.mc_onstack = (oonstack) ? 1 : 0;
373 bcopy(regs, &sf.sf_uc.uc_mcontext.mc_rdi, sizeof(*regs));
374 sf.sf_uc.uc_mcontext.mc_len = sizeof(sf.sf_uc.uc_mcontext); /* magic */
375 get_fpcontext(td, &sf.sf_uc.uc_mcontext, xfpusave, xfpusave_len);
377 update_pcb_bases(pcb);
378 sf.sf_uc.uc_mcontext.mc_fsbase = pcb->pcb_fsbase;
379 sf.sf_uc.uc_mcontext.mc_gsbase = pcb->pcb_gsbase;
380 bzero(sf.sf_uc.uc_mcontext.mc_spare,
381 sizeof(sf.sf_uc.uc_mcontext.mc_spare));
383 /* Allocate space for the signal handler context. */
384 if ((td->td_pflags & TDP_ALTSTACK) != 0 && !oonstack &&
385 SIGISMEMBER(psp->ps_sigonstack, sig)) {
386 sp = (char *)td->td_sigstk.ss_sp + td->td_sigstk.ss_size;
387 #if defined(COMPAT_43)
388 td->td_sigstk.ss_flags |= SS_ONSTACK;
391 sp = (char *)regs->tf_rsp - 128;
392 if (xfpusave != NULL) {
394 sp = (char *)((unsigned long)sp & ~0x3Ful);
395 sf.sf_uc.uc_mcontext.mc_xfpustate = (register_t)sp;
397 sp -= sizeof(struct sigframe);
398 /* Align to 16 bytes. */
399 sfp = (struct sigframe *)((unsigned long)sp & ~0xFul);
401 /* Build the argument list for the signal handler. */
402 regs->tf_rdi = sig; /* arg 1 in %rdi */
403 regs->tf_rdx = (register_t)&sfp->sf_uc; /* arg 3 in %rdx */
404 bzero(&sf.sf_si, sizeof(sf.sf_si));
405 if (SIGISMEMBER(psp->ps_siginfo, sig)) {
406 /* Signal handler installed with SA_SIGINFO. */
407 regs->tf_rsi = (register_t)&sfp->sf_si; /* arg 2 in %rsi */
408 sf.sf_ahu.sf_action = (__siginfohandler_t *)catcher;
410 /* Fill in POSIX parts */
411 sf.sf_si = ksi->ksi_info;
412 sf.sf_si.si_signo = sig; /* maybe a translated signal */
413 regs->tf_rcx = (register_t)ksi->ksi_addr; /* arg 4 in %rcx */
415 /* Old FreeBSD-style arguments. */
416 regs->tf_rsi = ksi->ksi_code; /* arg 2 in %rsi */
417 regs->tf_rcx = (register_t)ksi->ksi_addr; /* arg 4 in %rcx */
418 sf.sf_ahu.sf_handler = catcher;
420 mtx_unlock(&psp->ps_mtx);
424 * Copy the sigframe out to the user's stack.
426 if (copyout(&sf, sfp, sizeof(*sfp)) != 0 ||
427 (xfpusave != NULL && copyout(xfpusave,
428 (void *)sf.sf_uc.uc_mcontext.mc_xfpustate, xfpusave_len)
431 printf("process %ld has trashed its stack\n", (long)p->p_pid);
437 regs->tf_rsp = (long)sfp;
438 regs->tf_rip = p->p_sysent->sv_sigcode_base;
439 regs->tf_rflags &= ~(PSL_T | PSL_D);
440 regs->tf_cs = _ucodesel;
441 regs->tf_ds = _udatasel;
442 regs->tf_ss = _udatasel;
443 regs->tf_es = _udatasel;
444 regs->tf_fs = _ufssel;
445 regs->tf_gs = _ugssel;
446 regs->tf_flags = TF_HASSEGS;
448 mtx_lock(&psp->ps_mtx);
452 * System call to cleanup state after a signal
453 * has been taken. Reset signal mask and
454 * stack state from context left by sendsig (above).
455 * Return to previous pc and psl as specified by
456 * context left by sendsig. Check carefully to
457 * make sure that the user has not modified the
458 * state to gain improper privileges.
463 sys_sigreturn(td, uap)
465 struct sigreturn_args /* {
466 const struct __ucontext *sigcntxp;
472 struct trapframe *regs;
475 size_t xfpustate_len;
483 error = copyin(uap->sigcntxp, &uc, sizeof(uc));
485 uprintf("pid %d (%s): sigreturn copyin failed\n",
486 p->p_pid, td->td_name);
490 if ((ucp->uc_mcontext.mc_flags & ~_MC_FLAG_MASK) != 0) {
491 uprintf("pid %d (%s): sigreturn mc_flags %x\n", p->p_pid,
492 td->td_name, ucp->uc_mcontext.mc_flags);
496 rflags = ucp->uc_mcontext.mc_rflags;
498 * Don't allow users to change privileged or reserved flags.
500 if (!EFL_SECURE(rflags, regs->tf_rflags)) {
501 uprintf("pid %d (%s): sigreturn rflags = 0x%lx\n", p->p_pid,
502 td->td_name, rflags);
507 * Don't allow users to load a valid privileged %cs. Let the
508 * hardware check for invalid selectors, excess privilege in
509 * other selectors, invalid %eip's and invalid %esp's.
511 cs = ucp->uc_mcontext.mc_cs;
512 if (!CS_SECURE(cs)) {
513 uprintf("pid %d (%s): sigreturn cs = 0x%x\n", p->p_pid,
515 ksiginfo_init_trap(&ksi);
516 ksi.ksi_signo = SIGBUS;
517 ksi.ksi_code = BUS_OBJERR;
518 ksi.ksi_trapno = T_PROTFLT;
519 ksi.ksi_addr = (void *)regs->tf_rip;
520 trapsignal(td, &ksi);
524 if ((uc.uc_mcontext.mc_flags & _MC_HASFPXSTATE) != 0) {
525 xfpustate_len = uc.uc_mcontext.mc_xfpustate_len;
526 if (xfpustate_len > cpu_max_ext_state_size -
527 sizeof(struct savefpu)) {
528 uprintf("pid %d (%s): sigreturn xfpusave_len = 0x%zx\n",
529 p->p_pid, td->td_name, xfpustate_len);
532 xfpustate = __builtin_alloca(xfpustate_len);
533 error = copyin((const void *)uc.uc_mcontext.mc_xfpustate,
534 xfpustate, xfpustate_len);
537 "pid %d (%s): sigreturn copying xfpustate failed\n",
538 p->p_pid, td->td_name);
545 ret = set_fpcontext(td, &ucp->uc_mcontext, xfpustate, xfpustate_len);
547 uprintf("pid %d (%s): sigreturn set_fpcontext err %d\n",
548 p->p_pid, td->td_name, ret);
551 bcopy(&ucp->uc_mcontext.mc_rdi, regs, sizeof(*regs));
552 update_pcb_bases(pcb);
553 pcb->pcb_fsbase = ucp->uc_mcontext.mc_fsbase;
554 pcb->pcb_gsbase = ucp->uc_mcontext.mc_gsbase;
556 #if defined(COMPAT_43)
557 if (ucp->uc_mcontext.mc_onstack & 1)
558 td->td_sigstk.ss_flags |= SS_ONSTACK;
560 td->td_sigstk.ss_flags &= ~SS_ONSTACK;
563 kern_sigprocmask(td, SIG_SETMASK, &ucp->uc_sigmask, NULL, 0);
564 return (EJUSTRETURN);
567 #ifdef COMPAT_FREEBSD4
569 freebsd4_sigreturn(struct thread *td, struct freebsd4_sigreturn_args *uap)
572 return sys_sigreturn(td, (struct sigreturn_args *)uap);
577 * Reset registers to default values on exec.
580 exec_setregs(struct thread *td, struct image_params *imgp, uintptr_t stack)
582 struct trapframe *regs;
584 register_t saved_rflags;
589 if (td->td_proc->p_md.md_ldt != NULL)
592 update_pcb_bases(pcb);
595 clear_pcb_flags(pcb, PCB_32BIT);
596 pcb->pcb_initial_fpucw = __INITIAL_FPUCW__;
598 saved_rflags = regs->tf_rflags & PSL_T;
599 bzero((char *)regs, sizeof(struct trapframe));
600 regs->tf_rip = imgp->entry_addr;
601 regs->tf_rsp = ((stack - 8) & ~0xFul) + 8;
602 regs->tf_rdi = stack; /* argv */
603 regs->tf_rflags = PSL_USER | saved_rflags;
604 regs->tf_ss = _udatasel;
605 regs->tf_cs = _ucodesel;
606 regs->tf_ds = _udatasel;
607 regs->tf_es = _udatasel;
608 regs->tf_fs = _ufssel;
609 regs->tf_gs = _ugssel;
610 regs->tf_flags = TF_HASSEGS;
613 * Reset the hardware debug registers if they were in use.
614 * They won't have any meaning for the newly exec'd process.
616 if (pcb->pcb_flags & PCB_DBREGS) {
625 * Clear the debug registers on the running
626 * CPU, otherwise they will end up affecting
627 * the next process we switch to.
631 clear_pcb_flags(pcb, PCB_DBREGS);
635 * Drop the FP state if we hold it, so that the process gets a
636 * clean FP state if it uses the FPU again.
648 * CR0_MP, CR0_NE and CR0_TS are also set by npx_probe() for the
649 * BSP. See the comments there about why we set them.
651 cr0 |= CR0_MP | CR0_NE | CR0_TS | CR0_WP | CR0_AM;
656 * Initialize amd64 and configure to run kernel
660 * Initialize segments & interrupt table
662 static struct gate_descriptor idt0[NIDT];
663 struct gate_descriptor *idt = &idt0[0]; /* interrupt descriptor table */
665 static char dblfault_stack[PAGE_SIZE] __aligned(16);
666 static char mce0_stack[PAGE_SIZE] __aligned(16);
667 static char nmi0_stack[PAGE_SIZE] __aligned(16);
668 static char dbg0_stack[PAGE_SIZE] __aligned(16);
669 CTASSERT(sizeof(struct nmi_pcpu) == 16);
672 * Software prototypes -- in more palatable form.
674 * Keep GUFS32, GUGS32, GUCODE32 and GUDATA at the same
675 * slots as corresponding segments for i386 kernel.
677 struct soft_segment_descriptor gdt_segs[] = {
678 /* GNULL_SEL 0 Null Descriptor */
687 /* GNULL2_SEL 1 Null Descriptor */
696 /* GUFS32_SEL 2 32 bit %gs Descriptor for user */
698 .ssd_limit = 0xfffff,
699 .ssd_type = SDT_MEMRWA,
705 /* GUGS32_SEL 3 32 bit %fs Descriptor for user */
707 .ssd_limit = 0xfffff,
708 .ssd_type = SDT_MEMRWA,
714 /* GCODE_SEL 4 Code Descriptor for kernel */
716 .ssd_limit = 0xfffff,
717 .ssd_type = SDT_MEMERA,
723 /* GDATA_SEL 5 Data Descriptor for kernel */
725 .ssd_limit = 0xfffff,
726 .ssd_type = SDT_MEMRWA,
732 /* GUCODE32_SEL 6 32 bit Code Descriptor for user */
734 .ssd_limit = 0xfffff,
735 .ssd_type = SDT_MEMERA,
741 /* GUDATA_SEL 7 32/64 bit Data Descriptor for user */
743 .ssd_limit = 0xfffff,
744 .ssd_type = SDT_MEMRWA,
750 /* GUCODE_SEL 8 64 bit Code Descriptor for user */
752 .ssd_limit = 0xfffff,
753 .ssd_type = SDT_MEMERA,
759 /* GPROC0_SEL 9 Proc 0 Tss Descriptor */
761 .ssd_limit = sizeof(struct amd64tss) + IOPERM_BITMAP_SIZE - 1,
762 .ssd_type = SDT_SYSTSS,
768 /* Actually, the TSS is a system descriptor which is double size */
777 /* GUSERLDT_SEL 11 LDT Descriptor */
786 /* GUSERLDT_SEL 12 LDT Descriptor, double size */
796 _Static_assert(nitems(gdt_segs) == NGDT, "Stale NGDT");
799 setidt(int idx, inthand_t *func, int typ, int dpl, int ist)
801 struct gate_descriptor *ip;
804 ip->gd_looffset = (uintptr_t)func;
805 ip->gd_selector = GSEL(GCODE_SEL, SEL_KPL);
811 ip->gd_hioffset = ((uintptr_t)func)>>16 ;
815 IDTVEC(div), IDTVEC(dbg), IDTVEC(nmi), IDTVEC(bpt), IDTVEC(ofl),
816 IDTVEC(bnd), IDTVEC(ill), IDTVEC(dna), IDTVEC(fpusegm),
817 IDTVEC(tss), IDTVEC(missing), IDTVEC(stk), IDTVEC(prot),
818 IDTVEC(page), IDTVEC(mchk), IDTVEC(rsvd), IDTVEC(fpu), IDTVEC(align),
819 IDTVEC(xmm), IDTVEC(dblfault),
820 IDTVEC(div_pti), IDTVEC(bpt_pti),
821 IDTVEC(ofl_pti), IDTVEC(bnd_pti), IDTVEC(ill_pti), IDTVEC(dna_pti),
822 IDTVEC(fpusegm_pti), IDTVEC(tss_pti), IDTVEC(missing_pti),
823 IDTVEC(stk_pti), IDTVEC(prot_pti), IDTVEC(page_pti),
824 IDTVEC(rsvd_pti), IDTVEC(fpu_pti), IDTVEC(align_pti),
827 IDTVEC(dtrace_ret), IDTVEC(dtrace_ret_pti),
830 IDTVEC(xen_intr_upcall), IDTVEC(xen_intr_upcall_pti),
832 IDTVEC(fast_syscall), IDTVEC(fast_syscall32),
833 IDTVEC(fast_syscall_pti);
837 * Display the index and function name of any IDT entries that don't use
838 * the default 'rsvd' entry point.
840 DB_SHOW_COMMAND(idt, db_show_idt)
842 struct gate_descriptor *ip;
847 for (idx = 0; idx < NIDT && !db_pager_quit; idx++) {
848 func = ((long)ip->gd_hioffset << 16 | ip->gd_looffset);
849 if (func != (uintptr_t)&IDTVEC(rsvd)) {
850 db_printf("%3d\t", idx);
851 db_printsym(func, DB_STGY_PROC);
858 /* Show privileged registers. */
859 DB_SHOW_COMMAND(sysregs, db_show_sysregs)
864 } __packed idtr, gdtr;
867 __asm __volatile("sidt %0" : "=m" (idtr));
868 db_printf("idtr\t0x%016lx/%04x\n",
869 (u_long)idtr.base, (u_int)idtr.limit);
870 __asm __volatile("sgdt %0" : "=m" (gdtr));
871 db_printf("gdtr\t0x%016lx/%04x\n",
872 (u_long)gdtr.base, (u_int)gdtr.limit);
873 __asm __volatile("sldt %0" : "=r" (ldt));
874 db_printf("ldtr\t0x%04x\n", ldt);
875 __asm __volatile("str %0" : "=r" (tr));
876 db_printf("tr\t0x%04x\n", tr);
877 db_printf("cr0\t0x%016lx\n", rcr0());
878 db_printf("cr2\t0x%016lx\n", rcr2());
879 db_printf("cr3\t0x%016lx\n", rcr3());
880 db_printf("cr4\t0x%016lx\n", rcr4());
881 if (rcr4() & CR4_XSAVE)
882 db_printf("xcr0\t0x%016lx\n", rxcr(0));
883 db_printf("EFER\t0x%016lx\n", rdmsr(MSR_EFER));
884 if (cpu_feature2 & (CPUID2_VMX | CPUID2_SMX))
885 db_printf("FEATURES_CTL\t%016lx\n",
886 rdmsr(MSR_IA32_FEATURE_CONTROL));
887 db_printf("DEBUG_CTL\t0x%016lx\n", rdmsr(MSR_DEBUGCTLMSR));
888 db_printf("PAT\t0x%016lx\n", rdmsr(MSR_PAT));
889 db_printf("GSBASE\t0x%016lx\n", rdmsr(MSR_GSBASE));
892 DB_SHOW_COMMAND(dbregs, db_show_dbregs)
895 db_printf("dr0\t0x%016lx\n", rdr0());
896 db_printf("dr1\t0x%016lx\n", rdr1());
897 db_printf("dr2\t0x%016lx\n", rdr2());
898 db_printf("dr3\t0x%016lx\n", rdr3());
899 db_printf("dr6\t0x%016lx\n", rdr6());
900 db_printf("dr7\t0x%016lx\n", rdr7());
906 struct user_segment_descriptor *sd;
907 struct soft_segment_descriptor *ssd;
910 ssd->ssd_base = (sd->sd_hibase << 24) | sd->sd_lobase;
911 ssd->ssd_limit = (sd->sd_hilimit << 16) | sd->sd_lolimit;
912 ssd->ssd_type = sd->sd_type;
913 ssd->ssd_dpl = sd->sd_dpl;
914 ssd->ssd_p = sd->sd_p;
915 ssd->ssd_long = sd->sd_long;
916 ssd->ssd_def32 = sd->sd_def32;
917 ssd->ssd_gran = sd->sd_gran;
922 struct soft_segment_descriptor *ssd;
923 struct user_segment_descriptor *sd;
926 sd->sd_lobase = (ssd->ssd_base) & 0xffffff;
927 sd->sd_hibase = (ssd->ssd_base >> 24) & 0xff;
928 sd->sd_lolimit = (ssd->ssd_limit) & 0xffff;
929 sd->sd_hilimit = (ssd->ssd_limit >> 16) & 0xf;
930 sd->sd_type = ssd->ssd_type;
931 sd->sd_dpl = ssd->ssd_dpl;
932 sd->sd_p = ssd->ssd_p;
933 sd->sd_long = ssd->ssd_long;
934 sd->sd_def32 = ssd->ssd_def32;
935 sd->sd_gran = ssd->ssd_gran;
940 struct soft_segment_descriptor *ssd;
941 struct system_segment_descriptor *sd;
944 sd->sd_lobase = (ssd->ssd_base) & 0xffffff;
945 sd->sd_hibase = (ssd->ssd_base >> 24) & 0xfffffffffful;
946 sd->sd_lolimit = (ssd->ssd_limit) & 0xffff;
947 sd->sd_hilimit = (ssd->ssd_limit >> 16) & 0xf;
948 sd->sd_type = ssd->ssd_type;
949 sd->sd_dpl = ssd->ssd_dpl;
950 sd->sd_p = ssd->ssd_p;
951 sd->sd_gran = ssd->ssd_gran;
954 #if !defined(DEV_ATPIC) && defined(DEV_ISA)
955 #include <isa/isavar.h>
956 #include <isa/isareg.h>
958 * Return a bitmap of the current interrupt requests. This is 8259-specific
959 * and is only suitable for use at probe time.
960 * This is only here to pacify sio. It is NOT FATAL if this doesn't work.
961 * It shouldn't be here. There should probably be an APIC centric
962 * implementation in the apic driver code, if at all.
965 isa_irq_pending(void)
972 return ((irr2 << 8) | irr1);
979 add_physmap_entry(uint64_t base, uint64_t length, vm_paddr_t *physmap,
982 int i, insert_idx, physmap_idx;
984 physmap_idx = *physmap_idxp;
990 * Find insertion point while checking for overlap. Start off by
991 * assuming the new entry will be added to the end.
993 * NB: physmap_idx points to the next free slot.
995 insert_idx = physmap_idx;
996 for (i = 0; i <= physmap_idx; i += 2) {
997 if (base < physmap[i + 1]) {
998 if (base + length <= physmap[i]) {
1002 if (boothowto & RB_VERBOSE)
1004 "Overlapping memory regions, ignoring second region\n");
1009 /* See if we can prepend to the next entry. */
1010 if (insert_idx <= physmap_idx && base + length == physmap[insert_idx]) {
1011 physmap[insert_idx] = base;
1015 /* See if we can append to the previous entry. */
1016 if (insert_idx > 0 && base == physmap[insert_idx - 1]) {
1017 physmap[insert_idx - 1] += length;
1022 *physmap_idxp = physmap_idx;
1023 if (physmap_idx == PHYS_AVAIL_ENTRIES) {
1025 "Too many segments in the physical address map, giving up\n");
1030 * Move the last 'N' entries down to make room for the new
1033 for (i = (physmap_idx - 2); i > insert_idx; i -= 2) {
1034 physmap[i] = physmap[i - 2];
1035 physmap[i + 1] = physmap[i - 1];
1038 /* Insert the new entry. */
1039 physmap[insert_idx] = base;
1040 physmap[insert_idx + 1] = base + length;
1045 bios_add_smap_entries(struct bios_smap *smapbase, u_int32_t smapsize,
1046 vm_paddr_t *physmap, int *physmap_idx)
1048 struct bios_smap *smap, *smapend;
1050 smapend = (struct bios_smap *)((uintptr_t)smapbase + smapsize);
1052 for (smap = smapbase; smap < smapend; smap++) {
1053 if (boothowto & RB_VERBOSE)
1054 printf("SMAP type=%02x base=%016lx len=%016lx\n",
1055 smap->type, smap->base, smap->length);
1057 if (smap->type != SMAP_TYPE_MEMORY)
1060 if (!add_physmap_entry(smap->base, smap->length, physmap,
1067 add_efi_map_entries(struct efi_map_header *efihdr, vm_paddr_t *physmap,
1070 struct efi_md *map, *p;
1075 static const char *types[] = {
1081 "RuntimeServicesCode",
1082 "RuntimeServicesData",
1083 "ConventionalMemory",
1085 "ACPIReclaimMemory",
1088 "MemoryMappedIOPortSpace",
1094 * Memory map data provided by UEFI via the GetMemoryMap
1095 * Boot Services API.
1097 efisz = (sizeof(struct efi_map_header) + 0xf) & ~0xf;
1098 map = (struct efi_md *)((uint8_t *)efihdr + efisz);
1100 if (efihdr->descriptor_size == 0)
1102 ndesc = efihdr->memory_size / efihdr->descriptor_size;
1104 if (boothowto & RB_VERBOSE)
1105 printf("%23s %12s %12s %8s %4s\n",
1106 "Type", "Physical", "Virtual", "#Pages", "Attr");
1108 for (i = 0, p = map; i < ndesc; i++,
1109 p = efi_next_descriptor(p, efihdr->descriptor_size)) {
1110 if (boothowto & RB_VERBOSE) {
1111 if (p->md_type < nitems(types))
1112 type = types[p->md_type];
1115 printf("%23s %012lx %12p %08lx ", type, p->md_phys,
1116 p->md_virt, p->md_pages);
1117 if (p->md_attr & EFI_MD_ATTR_UC)
1119 if (p->md_attr & EFI_MD_ATTR_WC)
1121 if (p->md_attr & EFI_MD_ATTR_WT)
1123 if (p->md_attr & EFI_MD_ATTR_WB)
1125 if (p->md_attr & EFI_MD_ATTR_UCE)
1127 if (p->md_attr & EFI_MD_ATTR_WP)
1129 if (p->md_attr & EFI_MD_ATTR_RP)
1131 if (p->md_attr & EFI_MD_ATTR_XP)
1133 if (p->md_attr & EFI_MD_ATTR_NV)
1135 if (p->md_attr & EFI_MD_ATTR_MORE_RELIABLE)
1136 printf("MORE_RELIABLE ");
1137 if (p->md_attr & EFI_MD_ATTR_RO)
1139 if (p->md_attr & EFI_MD_ATTR_RT)
1144 switch (p->md_type) {
1145 case EFI_MD_TYPE_CODE:
1146 case EFI_MD_TYPE_DATA:
1147 case EFI_MD_TYPE_BS_CODE:
1148 case EFI_MD_TYPE_BS_DATA:
1149 case EFI_MD_TYPE_FREE:
1151 * We're allowed to use any entry with these types.
1158 if (!add_physmap_entry(p->md_phys, (p->md_pages * PAGE_SIZE),
1159 physmap, physmap_idx))
1164 static char bootmethod[16] = "";
1165 SYSCTL_STRING(_machdep, OID_AUTO, bootmethod, CTLFLAG_RD, bootmethod, 0,
1166 "System firmware boot method");
1169 native_parse_memmap(caddr_t kmdp, vm_paddr_t *physmap, int *physmap_idx)
1171 struct bios_smap *smap;
1172 struct efi_map_header *efihdr;
1176 * Memory map from INT 15:E820.
1178 * subr_module.c says:
1179 * "Consumer may safely assume that size value precedes data."
1180 * ie: an int32_t immediately precedes smap.
1183 efihdr = (struct efi_map_header *)preload_search_info(kmdp,
1184 MODINFO_METADATA | MODINFOMD_EFI_MAP);
1185 smap = (struct bios_smap *)preload_search_info(kmdp,
1186 MODINFO_METADATA | MODINFOMD_SMAP);
1187 if (efihdr == NULL && smap == NULL)
1188 panic("No BIOS smap or EFI map info from loader!");
1190 if (efihdr != NULL) {
1191 add_efi_map_entries(efihdr, physmap, physmap_idx);
1192 strlcpy(bootmethod, "UEFI", sizeof(bootmethod));
1194 size = *((u_int32_t *)smap - 1);
1195 bios_add_smap_entries(smap, size, physmap, physmap_idx);
1196 strlcpy(bootmethod, "BIOS", sizeof(bootmethod));
1200 #define PAGES_PER_GB (1024 * 1024 * 1024 / PAGE_SIZE)
1203 * Populate the (physmap) array with base/bound pairs describing the
1204 * available physical memory in the system, then test this memory and
1205 * build the phys_avail array describing the actually-available memory.
1207 * Total memory size may be set by the kernel environment variable
1208 * hw.physmem or the compile-time define MAXMEM.
1210 * XXX first should be vm_paddr_t.
1213 getmemsize(caddr_t kmdp, u_int64_t first)
1215 int i, physmap_idx, pa_indx, da_indx;
1216 vm_paddr_t pa, physmap[PHYS_AVAIL_ENTRIES];
1217 u_long physmem_start, physmem_tunable, memtest;
1219 quad_t dcons_addr, dcons_size;
1223 * Tell the physical memory allocator about pages used to store
1224 * the kernel and preloaded data. See kmem_bootstrap_free().
1226 vm_phys_add_seg((vm_paddr_t)kernphys, trunc_page(first));
1228 bzero(physmap, sizeof(physmap));
1231 init_ops.parse_memmap(kmdp, physmap, &physmap_idx);
1235 * Find the 'base memory' segment for SMP
1238 for (i = 0; i <= physmap_idx; i += 2) {
1239 if (physmap[i] <= 0xA0000) {
1240 basemem = physmap[i + 1] / 1024;
1244 if (basemem == 0 || basemem > 640) {
1247 "Memory map doesn't contain a basemem segment, faking it");
1252 * Maxmem isn't the "maximum memory", it's one larger than the
1253 * highest page of the physical address space. It should be
1254 * called something like "Maxphyspage". We may adjust this
1255 * based on ``hw.physmem'' and the results of the memory test.
1257 Maxmem = atop(physmap[physmap_idx + 1]);
1260 Maxmem = MAXMEM / 4;
1263 if (TUNABLE_ULONG_FETCH("hw.physmem", &physmem_tunable))
1264 Maxmem = atop(physmem_tunable);
1267 * The boot memory test is disabled by default, as it takes a
1268 * significant amount of time on large-memory systems, and is
1269 * unfriendly to virtual machines as it unnecessarily touches all
1272 * A general name is used as the code may be extended to support
1273 * additional tests beyond the current "page present" test.
1276 TUNABLE_ULONG_FETCH("hw.memtest.tests", &memtest);
1279 * Don't allow MAXMEM or hw.physmem to extend the amount of memory
1282 if (Maxmem > atop(physmap[physmap_idx + 1]))
1283 Maxmem = atop(physmap[physmap_idx + 1]);
1285 if (atop(physmap[physmap_idx + 1]) != Maxmem &&
1286 (boothowto & RB_VERBOSE))
1287 printf("Physical memory use set to %ldK\n", Maxmem * 4);
1290 * Make hole for "AP -> long mode" bootstrap code. The
1291 * mp_bootaddress vector is only available when the kernel
1292 * is configured to support APs and APs for the system start
1293 * in real mode mode (e.g. SMP bare metal).
1295 if (init_ops.mp_bootaddress)
1296 init_ops.mp_bootaddress(physmap, &physmap_idx);
1298 /* call pmap initialization to make new kernel address space */
1299 pmap_bootstrap(&first);
1302 * Size up each available chunk of physical memory.
1304 * XXX Some BIOSes corrupt low 64KB between suspend and resume.
1305 * By default, mask off the first 16 pages unless we appear to be
1308 physmem_start = (vm_guest > VM_GUEST_NO ? 1 : 16) << PAGE_SHIFT;
1309 TUNABLE_ULONG_FETCH("hw.physmem.start", &physmem_start);
1310 if (physmap[0] < physmem_start) {
1311 if (physmem_start < PAGE_SIZE)
1312 physmap[0] = PAGE_SIZE;
1313 else if (physmem_start >= physmap[1])
1314 physmap[0] = round_page(physmap[1] - PAGE_SIZE);
1316 physmap[0] = round_page(physmem_start);
1320 phys_avail[pa_indx++] = physmap[0];
1321 phys_avail[pa_indx] = physmap[0];
1322 dump_avail[da_indx] = physmap[0];
1326 * Get dcons buffer address
1328 if (getenv_quad("dcons.addr", &dcons_addr) == 0 ||
1329 getenv_quad("dcons.size", &dcons_size) == 0)
1333 * physmap is in bytes, so when converting to page boundaries,
1334 * round up the start address and round down the end address.
1338 printf("Testing system memory");
1339 for (i = 0; i <= physmap_idx; i += 2) {
1342 end = ptoa((vm_paddr_t)Maxmem);
1343 if (physmap[i + 1] < end)
1344 end = trunc_page(physmap[i + 1]);
1345 for (pa = round_page(physmap[i]); pa < end; pa += PAGE_SIZE) {
1346 int tmp, page_bad, full;
1347 int *ptr = (int *)CADDR1;
1351 * block out kernel memory as not available.
1353 if (pa >= (vm_paddr_t)kernphys && pa < first)
1357 * block out dcons buffer
1360 && pa >= trunc_page(dcons_addr)
1361 && pa < dcons_addr + dcons_size)
1369 * Print a "." every GB to show we're making
1373 if ((page_counter % PAGES_PER_GB) == 0)
1377 * map page into kernel: valid, read/write,non-cacheable
1379 *pte = pa | PG_V | PG_RW | PG_NC_PWT | PG_NC_PCD;
1384 * Test for alternating 1's and 0's
1386 *(volatile int *)ptr = 0xaaaaaaaa;
1387 if (*(volatile int *)ptr != 0xaaaaaaaa)
1390 * Test for alternating 0's and 1's
1392 *(volatile int *)ptr = 0x55555555;
1393 if (*(volatile int *)ptr != 0x55555555)
1398 *(volatile int *)ptr = 0xffffffff;
1399 if (*(volatile int *)ptr != 0xffffffff)
1404 *(volatile int *)ptr = 0x0;
1405 if (*(volatile int *)ptr != 0x0)
1408 * Restore original value.
1414 * Adjust array of valid/good pages.
1416 if (page_bad == TRUE)
1419 * If this good page is a continuation of the
1420 * previous set of good pages, then just increase
1421 * the end pointer. Otherwise start a new chunk.
1422 * Note that "end" points one higher than end,
1423 * making the range >= start and < end.
1424 * If we're also doing a speculative memory
1425 * test and we at or past the end, bump up Maxmem
1426 * so that we keep going. The first bad page
1427 * will terminate the loop.
1429 if (phys_avail[pa_indx] == pa) {
1430 phys_avail[pa_indx] += PAGE_SIZE;
1433 if (pa_indx == PHYS_AVAIL_ENTRIES) {
1435 "Too many holes in the physical address space, giving up\n");
1440 phys_avail[pa_indx++] = pa; /* start */
1441 phys_avail[pa_indx] = pa + PAGE_SIZE; /* end */
1445 if (dump_avail[da_indx] == pa) {
1446 dump_avail[da_indx] += PAGE_SIZE;
1449 if (da_indx == PHYS_AVAIL_ENTRIES) {
1453 dump_avail[da_indx++] = pa; /* start */
1454 dump_avail[da_indx] = pa + PAGE_SIZE; /* end */
1468 * The last chunk must contain at least one page plus the message
1469 * buffer to avoid complicating other code (message buffer address
1470 * calculation, etc.).
1472 while (phys_avail[pa_indx - 1] + PAGE_SIZE +
1473 round_page(msgbufsize) >= phys_avail[pa_indx]) {
1474 physmem -= atop(phys_avail[pa_indx] - phys_avail[pa_indx - 1]);
1475 phys_avail[pa_indx--] = 0;
1476 phys_avail[pa_indx--] = 0;
1479 Maxmem = atop(phys_avail[pa_indx]);
1481 /* Trim off space for the message buffer. */
1482 phys_avail[pa_indx] -= round_page(msgbufsize);
1484 /* Map the message buffer. */
1485 msgbufp = (struct msgbuf *)PHYS_TO_DMAP(phys_avail[pa_indx]);
1489 native_parse_preload_data(u_int64_t modulep)
1494 vm_offset_t ksym_start;
1495 vm_offset_t ksym_end;
1498 preload_metadata = (caddr_t)(uintptr_t)(modulep + KERNBASE);
1499 preload_bootstrap_relocate(KERNBASE);
1500 kmdp = preload_search_by_type("elf kernel");
1502 kmdp = preload_search_by_type("elf64 kernel");
1503 boothowto = MD_FETCH(kmdp, MODINFOMD_HOWTO, int);
1504 envp = MD_FETCH(kmdp, MODINFOMD_ENVP, char *);
1507 init_static_kenv(envp, 0);
1509 ksym_start = MD_FETCH(kmdp, MODINFOMD_SSYM, uintptr_t);
1510 ksym_end = MD_FETCH(kmdp, MODINFOMD_ESYM, uintptr_t);
1511 db_fetch_ksymtab(ksym_start, ksym_end);
1513 efi_systbl_phys = MD_FETCH(kmdp, MODINFOMD_FW_HANDLE, vm_paddr_t);
1519 amd64_kdb_init(void)
1523 if (boothowto & RB_KDB)
1524 kdb_enter(KDB_WHY_BOOTFLAGS, "Boot flags requested debugger");
1528 /* Set up the fast syscall stuff */
1530 amd64_conf_fast_syscall(void)
1534 msr = rdmsr(MSR_EFER) | EFER_SCE;
1535 wrmsr(MSR_EFER, msr);
1536 wrmsr(MSR_LSTAR, pti ? (u_int64_t)IDTVEC(fast_syscall_pti) :
1537 (u_int64_t)IDTVEC(fast_syscall));
1538 wrmsr(MSR_CSTAR, (u_int64_t)IDTVEC(fast_syscall32));
1539 msr = ((u_int64_t)GSEL(GCODE_SEL, SEL_KPL) << 32) |
1540 ((u_int64_t)GSEL(GUCODE32_SEL, SEL_UPL) << 48);
1541 wrmsr(MSR_STAR, msr);
1542 wrmsr(MSR_SF_MASK, PSL_NT | PSL_T | PSL_I | PSL_C | PSL_D | PSL_AC);
1546 amd64_bsp_pcpu_init1(struct pcpu *pc)
1548 struct user_segment_descriptor *gdt;
1550 PCPU_SET(prvspace, pc);
1551 gdt = *PCPU_PTR(gdt);
1552 PCPU_SET(curthread, &thread0);
1553 PCPU_SET(tssp, PCPU_PTR(common_tss));
1554 PCPU_SET(tss, (struct system_segment_descriptor *)&gdt[GPROC0_SEL]);
1555 PCPU_SET(ldt, (struct system_segment_descriptor *)&gdt[GUSERLDT_SEL]);
1556 PCPU_SET(fs32p, &gdt[GUFS32_SEL]);
1557 PCPU_SET(gs32p, &gdt[GUGS32_SEL]);
1561 amd64_bsp_pcpu_init2(uint64_t rsp0)
1564 PCPU_SET(rsp0, rsp0);
1565 PCPU_SET(pti_rsp0, ((vm_offset_t)PCPU_PTR(pti_stack) +
1566 PC_PTI_STACK_SZ * sizeof(uint64_t)) & ~0xful);
1567 PCPU_SET(curpcb, thread0.td_pcb);
1571 amd64_bsp_ist_init(struct pcpu *pc)
1573 struct nmi_pcpu *np;
1574 struct amd64tss *tssp;
1576 tssp = &pc->pc_common_tss;
1578 /* doublefault stack space, runs on ist1 */
1579 np = ((struct nmi_pcpu *)&dblfault_stack[sizeof(dblfault_stack)]) - 1;
1580 np->np_pcpu = (register_t)pc;
1581 tssp->tss_ist1 = (long)np;
1584 * NMI stack, runs on ist2. The pcpu pointer is stored just
1585 * above the start of the ist2 stack.
1587 np = ((struct nmi_pcpu *)&nmi0_stack[sizeof(nmi0_stack)]) - 1;
1588 np->np_pcpu = (register_t)pc;
1589 tssp->tss_ist2 = (long)np;
1592 * MC# stack, runs on ist3. The pcpu pointer is stored just
1593 * above the start of the ist3 stack.
1595 np = ((struct nmi_pcpu *)&mce0_stack[sizeof(mce0_stack)]) - 1;
1596 np->np_pcpu = (register_t)pc;
1597 tssp->tss_ist3 = (long)np;
1600 * DB# stack, runs on ist4.
1602 np = ((struct nmi_pcpu *)&dbg0_stack[sizeof(dbg0_stack)]) - 1;
1603 np->np_pcpu = (register_t)pc;
1604 tssp->tss_ist4 = (long)np;
1608 hammer_time(u_int64_t modulep, u_int64_t physfree)
1613 struct xstate_hdr *xhdr;
1616 struct user_segment_descriptor *gdt;
1617 struct region_descriptor r_gdt;
1621 TSRAW(&thread0, TS_ENTER, __func__, NULL);
1623 kmdp = init_ops.parse_preload_data(modulep);
1625 physfree += ucode_load_bsp(physfree + KERNBASE);
1626 physfree = roundup2(physfree, PAGE_SIZE);
1629 identify_hypervisor();
1630 identify_cpu_fixup_bsp();
1632 initializecpucache();
1635 * Check for pti, pcid, and invpcid before ifuncs are
1636 * resolved, to correctly select the implementation for
1637 * pmap_activate_sw_mode().
1639 pti = pti_get_default();
1640 TUNABLE_INT_FETCH("vm.pmap.pti", &pti);
1641 TUNABLE_INT_FETCH("vm.pmap.pcid_enabled", &pmap_pcid_enabled);
1642 if ((cpu_feature2 & CPUID2_PCID) != 0 && pmap_pcid_enabled) {
1643 invpcid_works = (cpu_stdext_feature &
1644 CPUID_STDEXT_INVPCID) != 0;
1646 pmap_pcid_enabled = 0;
1649 link_elf_ireloc(kmdp);
1652 * This may be done better later if it gets more high level
1653 * components in it. If so just link td->td_proc here.
1655 proc_linkup0(&proc0, &thread0);
1657 /* Init basic tunables, hz etc */
1660 thread0.td_kstack = physfree + KERNBASE;
1661 thread0.td_kstack_pages = kstack_pages;
1662 kstack0_sz = thread0.td_kstack_pages * PAGE_SIZE;
1663 bzero((void *)thread0.td_kstack, kstack0_sz);
1664 physfree += kstack0_sz;
1667 * Initialize enough of thread0 for delayed invalidation to
1668 * work very early. Rely on thread0.td_base_pri
1669 * zero-initialization, it is reset to PVM at proc0_init().
1671 pmap_thread_init_invl_gen(&thread0);
1673 pc = &temp_bsp_pcpu;
1674 pcpu_init(pc, 0, sizeof(struct pcpu));
1675 gdt = &temp_bsp_pcpu.pc_gdt[0];
1678 * make gdt memory segments
1680 for (x = 0; x < NGDT; x++) {
1681 if (x != GPROC0_SEL && x != (GPROC0_SEL + 1) &&
1682 x != GUSERLDT_SEL && x != (GUSERLDT_SEL) + 1)
1683 ssdtosd(&gdt_segs[x], &gdt[x]);
1685 gdt_segs[GPROC0_SEL].ssd_base = (uintptr_t)&pc->pc_common_tss;
1686 ssdtosyssd(&gdt_segs[GPROC0_SEL],
1687 (struct system_segment_descriptor *)&gdt[GPROC0_SEL]);
1689 r_gdt.rd_limit = NGDT * sizeof(gdt[0]) - 1;
1690 r_gdt.rd_base = (long)gdt;
1693 wrmsr(MSR_FSBASE, 0); /* User value */
1694 wrmsr(MSR_GSBASE, (u_int64_t)pc);
1695 wrmsr(MSR_KGSBASE, 0); /* User value while in the kernel */
1697 dpcpu_init((void *)(physfree + KERNBASE), 0);
1698 physfree += DPCPU_SIZE;
1699 amd64_bsp_pcpu_init1(pc);
1700 /* Non-late cninit() and printf() can be moved up to here. */
1703 * Initialize mutexes.
1705 * icu_lock: in order to allow an interrupt to occur in a critical
1706 * section, to set pcpu->ipending (etc...) properly, we
1707 * must be able to get the icu lock, so it can't be
1711 mtx_init(&icu_lock, "icu", NULL, MTX_SPIN | MTX_NOWITNESS);
1712 mtx_init(&dt_lock, "descriptor tables", NULL, MTX_DEF);
1715 for (x = 0; x < NIDT; x++)
1716 setidt(x, pti ? &IDTVEC(rsvd_pti) : &IDTVEC(rsvd), SDT_SYSIGT,
1718 setidt(IDT_DE, pti ? &IDTVEC(div_pti) : &IDTVEC(div), SDT_SYSIGT,
1720 setidt(IDT_DB, &IDTVEC(dbg), SDT_SYSIGT, SEL_KPL, 4);
1721 setidt(IDT_NMI, &IDTVEC(nmi), SDT_SYSIGT, SEL_KPL, 2);
1722 setidt(IDT_BP, pti ? &IDTVEC(bpt_pti) : &IDTVEC(bpt), SDT_SYSIGT,
1724 setidt(IDT_OF, pti ? &IDTVEC(ofl_pti) : &IDTVEC(ofl), SDT_SYSIGT,
1726 setidt(IDT_BR, pti ? &IDTVEC(bnd_pti) : &IDTVEC(bnd), SDT_SYSIGT,
1728 setidt(IDT_UD, pti ? &IDTVEC(ill_pti) : &IDTVEC(ill), SDT_SYSIGT,
1730 setidt(IDT_NM, pti ? &IDTVEC(dna_pti) : &IDTVEC(dna), SDT_SYSIGT,
1732 setidt(IDT_DF, &IDTVEC(dblfault), SDT_SYSIGT, SEL_KPL, 1);
1733 setidt(IDT_FPUGP, pti ? &IDTVEC(fpusegm_pti) : &IDTVEC(fpusegm),
1734 SDT_SYSIGT, SEL_KPL, 0);
1735 setidt(IDT_TS, pti ? &IDTVEC(tss_pti) : &IDTVEC(tss), SDT_SYSIGT,
1737 setidt(IDT_NP, pti ? &IDTVEC(missing_pti) : &IDTVEC(missing),
1738 SDT_SYSIGT, SEL_KPL, 0);
1739 setidt(IDT_SS, pti ? &IDTVEC(stk_pti) : &IDTVEC(stk), SDT_SYSIGT,
1741 setidt(IDT_GP, pti ? &IDTVEC(prot_pti) : &IDTVEC(prot), SDT_SYSIGT,
1743 setidt(IDT_PF, pti ? &IDTVEC(page_pti) : &IDTVEC(page), SDT_SYSIGT,
1745 setidt(IDT_MF, pti ? &IDTVEC(fpu_pti) : &IDTVEC(fpu), SDT_SYSIGT,
1747 setidt(IDT_AC, pti ? &IDTVEC(align_pti) : &IDTVEC(align), SDT_SYSIGT,
1749 setidt(IDT_MC, &IDTVEC(mchk), SDT_SYSIGT, SEL_KPL, 3);
1750 setidt(IDT_XF, pti ? &IDTVEC(xmm_pti) : &IDTVEC(xmm), SDT_SYSIGT,
1752 #ifdef KDTRACE_HOOKS
1753 setidt(IDT_DTRACE_RET, pti ? &IDTVEC(dtrace_ret_pti) :
1754 &IDTVEC(dtrace_ret), SDT_SYSIGT, SEL_UPL, 0);
1757 setidt(IDT_EVTCHN, pti ? &IDTVEC(xen_intr_upcall_pti) :
1758 &IDTVEC(xen_intr_upcall), SDT_SYSIGT, SEL_KPL, 0);
1760 r_idt.rd_limit = sizeof(idt0) - 1;
1761 r_idt.rd_base = (long) idt;
1765 * Initialize the clock before the console so that console
1766 * initialization can use DELAY().
1771 * Use vt(4) by default for UEFI boot (during the sc(4)/vt(4)
1773 * Once bootblocks have updated, we can test directly for
1774 * efi_systbl != NULL here...
1776 if (preload_search_info(kmdp, MODINFO_METADATA | MODINFOMD_EFI_MAP)
1778 vty_set_preferred(VTY_VT);
1780 TUNABLE_INT_FETCH("hw.ibrs_disable", &hw_ibrs_disable);
1781 TUNABLE_INT_FETCH("machdep.mitigations.ibrs.disable", &hw_ibrs_disable);
1783 TUNABLE_INT_FETCH("hw.spec_store_bypass_disable", &hw_ssb_disable);
1784 TUNABLE_INT_FETCH("machdep.mitigations.ssb.disable", &hw_ssb_disable);
1786 TUNABLE_INT_FETCH("machdep.syscall_ret_l1d_flush",
1787 &syscall_ret_l1d_flush_mode);
1789 TUNABLE_INT_FETCH("hw.mds_disable", &hw_mds_disable);
1790 TUNABLE_INT_FETCH("machdep.mitigations.mds.disable", &hw_mds_disable);
1792 TUNABLE_INT_FETCH("machdep.mitigations.taa.enable", &x86_taa_enable);
1794 finishidentcpu(); /* Final stage of CPU initialization */
1795 initializecpu(); /* Initialize CPU registers */
1797 amd64_bsp_ist_init(pc);
1799 /* Set the IO permission bitmap (empty due to tss seg limit) */
1800 pc->pc_common_tss.tss_iobase = sizeof(struct amd64tss) +
1803 gsel_tss = GSEL(GPROC0_SEL, SEL_KPL);
1806 amd64_conf_fast_syscall();
1809 * We initialize the PCB pointer early so that exception
1810 * handlers will work. Also set up td_critnest to short-cut
1811 * the page fault handler.
1813 cpu_max_ext_state_size = sizeof(struct savefpu);
1814 set_top_of_stack_td(&thread0);
1815 thread0.td_pcb = get_pcb_td(&thread0);
1816 thread0.td_critnest = 1;
1819 * The console and kdb should be initialized even earlier than here,
1820 * but some console drivers don't work until after getmemsize().
1821 * Default to late console initialization to support these drivers.
1822 * This loses mainly printf()s in getmemsize() and early debugging.
1825 TUNABLE_INT_FETCH("debug.late_console", &late_console);
1826 if (!late_console) {
1831 getmemsize(kmdp, physfree);
1832 init_param2(physmem);
1834 /* now running on new page tables, configured,and u/iom is accessible */
1837 /* This call might adjust phys_avail[]. */
1849 /* Reset and mask the atpics and leave them shut down. */
1853 * Point the ICU spurious interrupt vectors at the APIC spurious
1854 * interrupt handler.
1856 setidt(IDT_IO_INTS + 7, IDTVEC(spuriousint), SDT_SYSIGT, SEL_KPL, 0);
1857 setidt(IDT_IO_INTS + 15, IDTVEC(spuriousint), SDT_SYSIGT, SEL_KPL, 0);
1860 #error "have you forgotten the isa device?";
1866 msgbufinit(msgbufp, msgbufsize);
1870 * Set up thread0 pcb save area after fpuinit calculated fpu save
1871 * area size. Zero out the extended state header in fpu save
1874 thread0.td_pcb->pcb_save = get_pcb_user_save_td(&thread0);
1875 bzero(get_pcb_user_save_td(&thread0), cpu_max_ext_state_size);
1877 xhdr = (struct xstate_hdr *)(get_pcb_user_save_td(&thread0) +
1879 xhdr->xstate_bv = xsave_mask;
1881 /* make an initial tss so cpu can get interrupt stack on syscall! */
1882 rsp0 = thread0.td_md.md_stack_base;
1883 /* Ensure the stack is aligned to 16 bytes */
1885 __pcpu[0].pc_common_tss.tss_rsp0 = rsp0;
1886 amd64_bsp_pcpu_init2(rsp0);
1888 /* transfer to user mode */
1890 _ucodesel = GSEL(GUCODE_SEL, SEL_UPL);
1891 _udatasel = GSEL(GUDATA_SEL, SEL_UPL);
1892 _ucode32sel = GSEL(GUCODE32_SEL, SEL_UPL);
1893 _ufssel = GSEL(GUFS32_SEL, SEL_UPL);
1894 _ugssel = GSEL(GUGS32_SEL, SEL_UPL);
1900 /* setup proc 0's pcb */
1901 thread0.td_pcb->pcb_flags = 0;
1902 thread0.td_frame = &proc0_tf;
1904 env = kern_getenv("kernelname");
1906 strlcpy(kernelname, env, sizeof(kernelname));
1915 thread0.td_critnest = 0;
1919 /* Location of kernel stack for locore */
1920 return (thread0.td_md.md_stack_base);
1924 cpu_pcpu_init(struct pcpu *pcpu, int cpuid, size_t size)
1927 pcpu->pc_acpi_id = 0xffffffff;
1931 smap_sysctl_handler(SYSCTL_HANDLER_ARGS)
1933 struct bios_smap *smapbase;
1934 struct bios_smap_xattr smap;
1937 int count, error, i;
1939 /* Retrieve the system memory map from the loader. */
1940 kmdp = preload_search_by_type("elf kernel");
1942 kmdp = preload_search_by_type("elf64 kernel");
1943 smapbase = (struct bios_smap *)preload_search_info(kmdp,
1944 MODINFO_METADATA | MODINFOMD_SMAP);
1945 if (smapbase == NULL)
1947 smapattr = (uint32_t *)preload_search_info(kmdp,
1948 MODINFO_METADATA | MODINFOMD_SMAP_XATTR);
1949 count = *((uint32_t *)smapbase - 1) / sizeof(*smapbase);
1951 for (i = 0; i < count; i++) {
1952 smap.base = smapbase[i].base;
1953 smap.length = smapbase[i].length;
1954 smap.type = smapbase[i].type;
1955 if (smapattr != NULL)
1956 smap.xattr = smapattr[i];
1959 error = SYSCTL_OUT(req, &smap, sizeof(smap));
1963 SYSCTL_PROC(_machdep, OID_AUTO, smap, CTLTYPE_OPAQUE|CTLFLAG_RD, NULL, 0,
1964 smap_sysctl_handler, "S,bios_smap_xattr", "Raw BIOS SMAP data");
1967 efi_map_sysctl_handler(SYSCTL_HANDLER_ARGS)
1969 struct efi_map_header *efihdr;
1973 kmdp = preload_search_by_type("elf kernel");
1975 kmdp = preload_search_by_type("elf64 kernel");
1976 efihdr = (struct efi_map_header *)preload_search_info(kmdp,
1977 MODINFO_METADATA | MODINFOMD_EFI_MAP);
1980 efisize = *((uint32_t *)efihdr - 1);
1981 return (SYSCTL_OUT(req, efihdr, efisize));
1983 SYSCTL_PROC(_machdep, OID_AUTO, efi_map, CTLTYPE_OPAQUE|CTLFLAG_RD, NULL, 0,
1984 efi_map_sysctl_handler, "S,efi_map_header", "Raw EFI Memory Map");
1987 spinlock_enter(void)
1993 if (td->td_md.md_spinlock_count == 0) {
1994 flags = intr_disable();
1995 td->td_md.md_spinlock_count = 1;
1996 td->td_md.md_saved_flags = flags;
1999 td->td_md.md_spinlock_count++;
2009 flags = td->td_md.md_saved_flags;
2010 td->td_md.md_spinlock_count--;
2011 if (td->td_md.md_spinlock_count == 0) {
2013 intr_restore(flags);
2018 * Construct a PCB from a trapframe. This is called from kdb_trap() where
2019 * we want to start a backtrace from the function that caused us to enter
2020 * the debugger. We have the context in the trapframe, but base the trace
2021 * on the PCB. The PCB doesn't have to be perfect, as long as it contains
2022 * enough for a backtrace.
2025 makectx(struct trapframe *tf, struct pcb *pcb)
2028 pcb->pcb_r12 = tf->tf_r12;
2029 pcb->pcb_r13 = tf->tf_r13;
2030 pcb->pcb_r14 = tf->tf_r14;
2031 pcb->pcb_r15 = tf->tf_r15;
2032 pcb->pcb_rbp = tf->tf_rbp;
2033 pcb->pcb_rbx = tf->tf_rbx;
2034 pcb->pcb_rip = tf->tf_rip;
2035 pcb->pcb_rsp = tf->tf_rsp;
2039 ptrace_set_pc(struct thread *td, unsigned long addr)
2042 td->td_frame->tf_rip = addr;
2043 set_pcb_flags(td->td_pcb, PCB_FULL_IRET);
2048 ptrace_single_step(struct thread *td)
2051 PROC_LOCK_ASSERT(td->td_proc, MA_OWNED);
2052 if ((td->td_frame->tf_rflags & PSL_T) == 0) {
2053 td->td_frame->tf_rflags |= PSL_T;
2054 td->td_dbgflags |= TDB_STEP;
2060 ptrace_clear_single_step(struct thread *td)
2063 PROC_LOCK_ASSERT(td->td_proc, MA_OWNED);
2064 td->td_frame->tf_rflags &= ~PSL_T;
2065 td->td_dbgflags &= ~TDB_STEP;
2070 fill_regs(struct thread *td, struct reg *regs)
2072 struct trapframe *tp;
2075 return (fill_frame_regs(tp, regs));
2079 fill_frame_regs(struct trapframe *tp, struct reg *regs)
2082 regs->r_r15 = tp->tf_r15;
2083 regs->r_r14 = tp->tf_r14;
2084 regs->r_r13 = tp->tf_r13;
2085 regs->r_r12 = tp->tf_r12;
2086 regs->r_r11 = tp->tf_r11;
2087 regs->r_r10 = tp->tf_r10;
2088 regs->r_r9 = tp->tf_r9;
2089 regs->r_r8 = tp->tf_r8;
2090 regs->r_rdi = tp->tf_rdi;
2091 regs->r_rsi = tp->tf_rsi;
2092 regs->r_rbp = tp->tf_rbp;
2093 regs->r_rbx = tp->tf_rbx;
2094 regs->r_rdx = tp->tf_rdx;
2095 regs->r_rcx = tp->tf_rcx;
2096 regs->r_rax = tp->tf_rax;
2097 regs->r_rip = tp->tf_rip;
2098 regs->r_cs = tp->tf_cs;
2099 regs->r_rflags = tp->tf_rflags;
2100 regs->r_rsp = tp->tf_rsp;
2101 regs->r_ss = tp->tf_ss;
2102 if (tp->tf_flags & TF_HASSEGS) {
2103 regs->r_ds = tp->tf_ds;
2104 regs->r_es = tp->tf_es;
2105 regs->r_fs = tp->tf_fs;
2106 regs->r_gs = tp->tf_gs;
2119 set_regs(struct thread *td, struct reg *regs)
2121 struct trapframe *tp;
2125 rflags = regs->r_rflags & 0xffffffff;
2126 if (!EFL_SECURE(rflags, tp->tf_rflags) || !CS_SECURE(regs->r_cs))
2128 tp->tf_r15 = regs->r_r15;
2129 tp->tf_r14 = regs->r_r14;
2130 tp->tf_r13 = regs->r_r13;
2131 tp->tf_r12 = regs->r_r12;
2132 tp->tf_r11 = regs->r_r11;
2133 tp->tf_r10 = regs->r_r10;
2134 tp->tf_r9 = regs->r_r9;
2135 tp->tf_r8 = regs->r_r8;
2136 tp->tf_rdi = regs->r_rdi;
2137 tp->tf_rsi = regs->r_rsi;
2138 tp->tf_rbp = regs->r_rbp;
2139 tp->tf_rbx = regs->r_rbx;
2140 tp->tf_rdx = regs->r_rdx;
2141 tp->tf_rcx = regs->r_rcx;
2142 tp->tf_rax = regs->r_rax;
2143 tp->tf_rip = regs->r_rip;
2144 tp->tf_cs = regs->r_cs;
2145 tp->tf_rflags = rflags;
2146 tp->tf_rsp = regs->r_rsp;
2147 tp->tf_ss = regs->r_ss;
2148 if (0) { /* XXXKIB */
2149 tp->tf_ds = regs->r_ds;
2150 tp->tf_es = regs->r_es;
2151 tp->tf_fs = regs->r_fs;
2152 tp->tf_gs = regs->r_gs;
2153 tp->tf_flags = TF_HASSEGS;
2155 set_pcb_flags(td->td_pcb, PCB_FULL_IRET);
2159 /* XXX check all this stuff! */
2160 /* externalize from sv_xmm */
2162 fill_fpregs_xmm(struct savefpu *sv_xmm, struct fpreg *fpregs)
2164 struct envxmm *penv_fpreg = (struct envxmm *)&fpregs->fpr_env;
2165 struct envxmm *penv_xmm = &sv_xmm->sv_env;
2169 bzero(fpregs, sizeof(*fpregs));
2171 /* FPU control/status */
2172 penv_fpreg->en_cw = penv_xmm->en_cw;
2173 penv_fpreg->en_sw = penv_xmm->en_sw;
2174 penv_fpreg->en_tw = penv_xmm->en_tw;
2175 penv_fpreg->en_opcode = penv_xmm->en_opcode;
2176 penv_fpreg->en_rip = penv_xmm->en_rip;
2177 penv_fpreg->en_rdp = penv_xmm->en_rdp;
2178 penv_fpreg->en_mxcsr = penv_xmm->en_mxcsr;
2179 penv_fpreg->en_mxcsr_mask = penv_xmm->en_mxcsr_mask;
2182 for (i = 0; i < 8; ++i)
2183 bcopy(sv_xmm->sv_fp[i].fp_acc.fp_bytes, fpregs->fpr_acc[i], 10);
2186 for (i = 0; i < 16; ++i)
2187 bcopy(sv_xmm->sv_xmm[i].xmm_bytes, fpregs->fpr_xacc[i], 16);
2190 /* internalize from fpregs into sv_xmm */
2192 set_fpregs_xmm(struct fpreg *fpregs, struct savefpu *sv_xmm)
2194 struct envxmm *penv_xmm = &sv_xmm->sv_env;
2195 struct envxmm *penv_fpreg = (struct envxmm *)&fpregs->fpr_env;
2199 /* FPU control/status */
2200 penv_xmm->en_cw = penv_fpreg->en_cw;
2201 penv_xmm->en_sw = penv_fpreg->en_sw;
2202 penv_xmm->en_tw = penv_fpreg->en_tw;
2203 penv_xmm->en_opcode = penv_fpreg->en_opcode;
2204 penv_xmm->en_rip = penv_fpreg->en_rip;
2205 penv_xmm->en_rdp = penv_fpreg->en_rdp;
2206 penv_xmm->en_mxcsr = penv_fpreg->en_mxcsr;
2207 penv_xmm->en_mxcsr_mask = penv_fpreg->en_mxcsr_mask & cpu_mxcsr_mask;
2210 for (i = 0; i < 8; ++i)
2211 bcopy(fpregs->fpr_acc[i], sv_xmm->sv_fp[i].fp_acc.fp_bytes, 10);
2214 for (i = 0; i < 16; ++i)
2215 bcopy(fpregs->fpr_xacc[i], sv_xmm->sv_xmm[i].xmm_bytes, 16);
2218 /* externalize from td->pcb */
2220 fill_fpregs(struct thread *td, struct fpreg *fpregs)
2223 KASSERT(td == curthread || TD_IS_SUSPENDED(td) ||
2224 P_SHOULDSTOP(td->td_proc),
2225 ("not suspended thread %p", td));
2227 fill_fpregs_xmm(get_pcb_user_save_td(td), fpregs);
2231 /* internalize to td->pcb */
2233 set_fpregs(struct thread *td, struct fpreg *fpregs)
2237 set_fpregs_xmm(fpregs, get_pcb_user_save_td(td));
2244 * Get machine context.
2247 get_mcontext(struct thread *td, mcontext_t *mcp, int flags)
2250 struct trapframe *tp;
2254 PROC_LOCK(curthread->td_proc);
2255 mcp->mc_onstack = sigonstack(tp->tf_rsp);
2256 PROC_UNLOCK(curthread->td_proc);
2257 mcp->mc_r15 = tp->tf_r15;
2258 mcp->mc_r14 = tp->tf_r14;
2259 mcp->mc_r13 = tp->tf_r13;
2260 mcp->mc_r12 = tp->tf_r12;
2261 mcp->mc_r11 = tp->tf_r11;
2262 mcp->mc_r10 = tp->tf_r10;
2263 mcp->mc_r9 = tp->tf_r9;
2264 mcp->mc_r8 = tp->tf_r8;
2265 mcp->mc_rdi = tp->tf_rdi;
2266 mcp->mc_rsi = tp->tf_rsi;
2267 mcp->mc_rbp = tp->tf_rbp;
2268 mcp->mc_rbx = tp->tf_rbx;
2269 mcp->mc_rcx = tp->tf_rcx;
2270 mcp->mc_rflags = tp->tf_rflags;
2271 if (flags & GET_MC_CLEAR_RET) {
2274 mcp->mc_rflags &= ~PSL_C;
2276 mcp->mc_rax = tp->tf_rax;
2277 mcp->mc_rdx = tp->tf_rdx;
2279 mcp->mc_rip = tp->tf_rip;
2280 mcp->mc_cs = tp->tf_cs;
2281 mcp->mc_rsp = tp->tf_rsp;
2282 mcp->mc_ss = tp->tf_ss;
2283 mcp->mc_ds = tp->tf_ds;
2284 mcp->mc_es = tp->tf_es;
2285 mcp->mc_fs = tp->tf_fs;
2286 mcp->mc_gs = tp->tf_gs;
2287 mcp->mc_flags = tp->tf_flags;
2288 mcp->mc_len = sizeof(*mcp);
2289 get_fpcontext(td, mcp, NULL, 0);
2290 update_pcb_bases(pcb);
2291 mcp->mc_fsbase = pcb->pcb_fsbase;
2292 mcp->mc_gsbase = pcb->pcb_gsbase;
2293 mcp->mc_xfpustate = 0;
2294 mcp->mc_xfpustate_len = 0;
2295 bzero(mcp->mc_spare, sizeof(mcp->mc_spare));
2300 * Set machine context.
2302 * However, we don't set any but the user modifiable flags, and we won't
2303 * touch the cs selector.
2306 set_mcontext(struct thread *td, mcontext_t *mcp)
2309 struct trapframe *tp;
2316 if (mcp->mc_len != sizeof(*mcp) ||
2317 (mcp->mc_flags & ~_MC_FLAG_MASK) != 0)
2319 rflags = (mcp->mc_rflags & PSL_USERCHANGE) |
2320 (tp->tf_rflags & ~PSL_USERCHANGE);
2321 if (mcp->mc_flags & _MC_HASFPXSTATE) {
2322 if (mcp->mc_xfpustate_len > cpu_max_ext_state_size -
2323 sizeof(struct savefpu))
2325 xfpustate = __builtin_alloca(mcp->mc_xfpustate_len);
2326 ret = copyin((void *)mcp->mc_xfpustate, xfpustate,
2327 mcp->mc_xfpustate_len);
2332 ret = set_fpcontext(td, mcp, xfpustate, mcp->mc_xfpustate_len);
2335 tp->tf_r15 = mcp->mc_r15;
2336 tp->tf_r14 = mcp->mc_r14;
2337 tp->tf_r13 = mcp->mc_r13;
2338 tp->tf_r12 = mcp->mc_r12;
2339 tp->tf_r11 = mcp->mc_r11;
2340 tp->tf_r10 = mcp->mc_r10;
2341 tp->tf_r9 = mcp->mc_r9;
2342 tp->tf_r8 = mcp->mc_r8;
2343 tp->tf_rdi = mcp->mc_rdi;
2344 tp->tf_rsi = mcp->mc_rsi;
2345 tp->tf_rbp = mcp->mc_rbp;
2346 tp->tf_rbx = mcp->mc_rbx;
2347 tp->tf_rdx = mcp->mc_rdx;
2348 tp->tf_rcx = mcp->mc_rcx;
2349 tp->tf_rax = mcp->mc_rax;
2350 tp->tf_rip = mcp->mc_rip;
2351 tp->tf_rflags = rflags;
2352 tp->tf_rsp = mcp->mc_rsp;
2353 tp->tf_ss = mcp->mc_ss;
2354 tp->tf_flags = mcp->mc_flags;
2355 if (tp->tf_flags & TF_HASSEGS) {
2356 tp->tf_ds = mcp->mc_ds;
2357 tp->tf_es = mcp->mc_es;
2358 tp->tf_fs = mcp->mc_fs;
2359 tp->tf_gs = mcp->mc_gs;
2361 set_pcb_flags(pcb, PCB_FULL_IRET);
2362 if (mcp->mc_flags & _MC_HASBASES) {
2363 pcb->pcb_fsbase = mcp->mc_fsbase;
2364 pcb->pcb_gsbase = mcp->mc_gsbase;
2370 get_fpcontext(struct thread *td, mcontext_t *mcp, char *xfpusave,
2371 size_t xfpusave_len)
2373 size_t max_len, len;
2375 mcp->mc_ownedfp = fpugetregs(td);
2376 bcopy(get_pcb_user_save_td(td), &mcp->mc_fpstate[0],
2377 sizeof(mcp->mc_fpstate));
2378 mcp->mc_fpformat = fpuformat();
2379 if (!use_xsave || xfpusave_len == 0)
2381 max_len = cpu_max_ext_state_size - sizeof(struct savefpu);
2383 if (len > max_len) {
2385 bzero(xfpusave + max_len, len - max_len);
2387 mcp->mc_flags |= _MC_HASFPXSTATE;
2388 mcp->mc_xfpustate_len = len;
2389 bcopy(get_pcb_user_save_td(td) + 1, xfpusave, len);
2393 set_fpcontext(struct thread *td, mcontext_t *mcp, char *xfpustate,
2394 size_t xfpustate_len)
2398 if (mcp->mc_fpformat == _MC_FPFMT_NODEV)
2400 else if (mcp->mc_fpformat != _MC_FPFMT_XMM)
2402 else if (mcp->mc_ownedfp == _MC_FPOWNED_NONE) {
2403 /* We don't care what state is left in the FPU or PCB. */
2406 } else if (mcp->mc_ownedfp == _MC_FPOWNED_FPU ||
2407 mcp->mc_ownedfp == _MC_FPOWNED_PCB) {
2408 error = fpusetregs(td, (struct savefpu *)&mcp->mc_fpstate,
2409 xfpustate, xfpustate_len);
2416 fpstate_drop(struct thread *td)
2419 KASSERT(PCB_USER_FPU(td->td_pcb), ("fpstate_drop: kernel-owned fpu"));
2421 if (PCPU_GET(fpcurthread) == td)
2424 * XXX force a full drop of the fpu. The above only drops it if we
2427 * XXX I don't much like fpugetuserregs()'s semantics of doing a full
2428 * drop. Dropping only to the pcb matches fnsave's behaviour.
2429 * We only need to drop to !PCB_INITDONE in sendsig(). But
2430 * sendsig() is the only caller of fpugetuserregs()... perhaps we just
2431 * have too many layers.
2433 clear_pcb_flags(curthread->td_pcb,
2434 PCB_FPUINITDONE | PCB_USERFPUINITDONE);
2439 fill_dbregs(struct thread *td, struct dbreg *dbregs)
2444 dbregs->dr[0] = rdr0();
2445 dbregs->dr[1] = rdr1();
2446 dbregs->dr[2] = rdr2();
2447 dbregs->dr[3] = rdr3();
2448 dbregs->dr[6] = rdr6();
2449 dbregs->dr[7] = rdr7();
2452 dbregs->dr[0] = pcb->pcb_dr0;
2453 dbregs->dr[1] = pcb->pcb_dr1;
2454 dbregs->dr[2] = pcb->pcb_dr2;
2455 dbregs->dr[3] = pcb->pcb_dr3;
2456 dbregs->dr[6] = pcb->pcb_dr6;
2457 dbregs->dr[7] = pcb->pcb_dr7;
2473 set_dbregs(struct thread *td, struct dbreg *dbregs)
2479 load_dr0(dbregs->dr[0]);
2480 load_dr1(dbregs->dr[1]);
2481 load_dr2(dbregs->dr[2]);
2482 load_dr3(dbregs->dr[3]);
2483 load_dr6(dbregs->dr[6]);
2484 load_dr7(dbregs->dr[7]);
2487 * Don't let an illegal value for dr7 get set. Specifically,
2488 * check for undefined settings. Setting these bit patterns
2489 * result in undefined behaviour and can lead to an unexpected
2490 * TRCTRAP or a general protection fault right here.
2491 * Upper bits of dr6 and dr7 must not be set
2493 for (i = 0; i < 4; i++) {
2494 if (DBREG_DR7_ACCESS(dbregs->dr[7], i) == 0x02)
2496 if (td->td_frame->tf_cs == _ucode32sel &&
2497 DBREG_DR7_LEN(dbregs->dr[7], i) == DBREG_DR7_LEN_8)
2500 if ((dbregs->dr[6] & 0xffffffff00000000ul) != 0 ||
2501 (dbregs->dr[7] & 0xffffffff00000000ul) != 0)
2507 * Don't let a process set a breakpoint that is not within the
2508 * process's address space. If a process could do this, it
2509 * could halt the system by setting a breakpoint in the kernel
2510 * (if ddb was enabled). Thus, we need to check to make sure
2511 * that no breakpoints are being enabled for addresses outside
2512 * process's address space.
2514 * XXX - what about when the watched area of the user's
2515 * address space is written into from within the kernel
2516 * ... wouldn't that still cause a breakpoint to be generated
2517 * from within kernel mode?
2520 if (DBREG_DR7_ENABLED(dbregs->dr[7], 0)) {
2521 /* dr0 is enabled */
2522 if (dbregs->dr[0] >= VM_MAXUSER_ADDRESS)
2525 if (DBREG_DR7_ENABLED(dbregs->dr[7], 1)) {
2526 /* dr1 is enabled */
2527 if (dbregs->dr[1] >= VM_MAXUSER_ADDRESS)
2530 if (DBREG_DR7_ENABLED(dbregs->dr[7], 2)) {
2531 /* dr2 is enabled */
2532 if (dbregs->dr[2] >= VM_MAXUSER_ADDRESS)
2535 if (DBREG_DR7_ENABLED(dbregs->dr[7], 3)) {
2536 /* dr3 is enabled */
2537 if (dbregs->dr[3] >= VM_MAXUSER_ADDRESS)
2541 pcb->pcb_dr0 = dbregs->dr[0];
2542 pcb->pcb_dr1 = dbregs->dr[1];
2543 pcb->pcb_dr2 = dbregs->dr[2];
2544 pcb->pcb_dr3 = dbregs->dr[3];
2545 pcb->pcb_dr6 = dbregs->dr[6];
2546 pcb->pcb_dr7 = dbregs->dr[7];
2548 set_pcb_flags(pcb, PCB_DBREGS);
2558 load_dr7(0); /* Turn off the control bits first */
2567 * Return > 0 if a hardware breakpoint has been hit, and the
2568 * breakpoint was in user space. Return 0, otherwise.
2571 user_dbreg_trap(register_t dr6)
2574 u_int64_t bp; /* breakpoint bits extracted from dr6 */
2575 int nbp; /* number of breakpoints that triggered */
2576 caddr_t addr[4]; /* breakpoint addresses */
2579 bp = dr6 & DBREG_DR6_BMASK;
2582 * None of the breakpoint bits are set meaning this
2583 * trap was not caused by any of the debug registers
2589 if ((dr7 & 0x000000ff) == 0) {
2591 * all GE and LE bits in the dr7 register are zero,
2592 * thus the trap couldn't have been caused by the
2593 * hardware debug registers
2601 * at least one of the breakpoints were hit, check to see
2602 * which ones and if any of them are user space addresses
2606 addr[nbp++] = (caddr_t)rdr0();
2609 addr[nbp++] = (caddr_t)rdr1();
2612 addr[nbp++] = (caddr_t)rdr2();
2615 addr[nbp++] = (caddr_t)rdr3();
2618 for (i = 0; i < nbp; i++) {
2619 if (addr[i] < (caddr_t)VM_MAXUSER_ADDRESS) {
2621 * addr[i] is in user space
2628 * None of the breakpoints are in user space.
2634 * The pcb_flags is only modified by current thread, or by other threads
2635 * when current thread is stopped. However, current thread may change it
2636 * from the interrupt context in cpu_switch(), or in the trap handler.
2637 * When we read-modify-write pcb_flags from C sources, compiler may generate
2638 * code that is not atomic regarding the interrupt handler. If a trap or
2639 * interrupt happens and any flag is modified from the handler, it can be
2640 * clobbered with the cached value later. Therefore, we implement setting
2641 * and clearing flags with single-instruction functions, which do not race
2642 * with possible modification of the flags from the trap or interrupt context,
2643 * because traps and interrupts are executed only on instruction boundary.
2646 set_pcb_flags_raw(struct pcb *pcb, const u_int flags)
2649 __asm __volatile("orl %1,%0"
2650 : "=m" (pcb->pcb_flags) : "ir" (flags), "m" (pcb->pcb_flags)
2656 * The support for RDFSBASE, WRFSBASE and similar instructions for %gs
2657 * base requires that kernel saves MSR_FSBASE and MSR_{K,}GSBASE into
2658 * pcb if user space modified the bases. We must save on the context
2659 * switch or if the return to usermode happens through the doreti.
2661 * Tracking of both events is performed by the pcb flag PCB_FULL_IRET,
2662 * which have a consequence that the base MSRs must be saved each time
2663 * the PCB_FULL_IRET flag is set. We disable interrupts to sync with
2667 set_pcb_flags_fsgsbase(struct pcb *pcb, const u_int flags)
2671 if (curpcb == pcb &&
2672 (flags & PCB_FULL_IRET) != 0 &&
2673 (pcb->pcb_flags & PCB_FULL_IRET) == 0) {
2675 if ((pcb->pcb_flags & PCB_FULL_IRET) == 0) {
2676 if (rfs() == _ufssel)
2677 pcb->pcb_fsbase = rdfsbase();
2678 if (rgs() == _ugssel)
2679 pcb->pcb_gsbase = rdmsr(MSR_KGSBASE);
2681 set_pcb_flags_raw(pcb, flags);
2684 set_pcb_flags_raw(pcb, flags);
2688 DEFINE_IFUNC(, void, set_pcb_flags, (struct pcb *, const u_int))
2691 return ((cpu_stdext_feature & CPUID_STDEXT_FSGSBASE) != 0 ?
2692 set_pcb_flags_fsgsbase : set_pcb_flags_raw);
2696 clear_pcb_flags(struct pcb *pcb, const u_int flags)
2699 __asm __volatile("andl %1,%0"
2700 : "=m" (pcb->pcb_flags) : "ir" (~flags), "m" (pcb->pcb_flags)
2707 * Provide inb() and outb() as functions. They are normally only available as
2708 * inline functions, thus cannot be called from the debugger.
2711 /* silence compiler warnings */
2712 u_char inb_(u_short);
2713 void outb_(u_short, u_char);
2722 outb_(u_short port, u_char data)
2733 void *memset_std(void *buf, int c, size_t len);
2734 void *memset_erms(void *buf, int c, size_t len);
2735 void *memmove_std(void * _Nonnull dst, const void * _Nonnull src,
2737 void *memmove_erms(void * _Nonnull dst, const void * _Nonnull src,
2739 void *memcpy_std(void * _Nonnull dst, const void * _Nonnull src,
2741 void *memcpy_erms(void * _Nonnull dst, const void * _Nonnull src,
2746 * These fail to build as ifuncs when used with KCSAN.
2749 memset(void *buf, int c, size_t len)
2752 return (memset_std(buf, c, len));
2756 memmove(void * _Nonnull dst, const void * _Nonnull src, size_t len)
2759 return (memmove_std(dst, src, len));
2763 memcpy(void * _Nonnull dst, const void * _Nonnull src, size_t len)
2766 return (memcpy_std(dst, src, len));
2769 DEFINE_IFUNC(, void *, memset, (void *, int, size_t))
2772 return ((cpu_stdext_feature & CPUID_STDEXT_ERMS) != 0 ?
2773 memset_erms : memset_std);
2776 DEFINE_IFUNC(, void *, memmove, (void * _Nonnull, const void * _Nonnull,
2780 return ((cpu_stdext_feature & CPUID_STDEXT_ERMS) != 0 ?
2781 memmove_erms : memmove_std);
2784 DEFINE_IFUNC(, void *, memcpy, (void * _Nonnull, const void * _Nonnull,size_t))
2787 return ((cpu_stdext_feature & CPUID_STDEXT_ERMS) != 0 ?
2788 memcpy_erms : memcpy_std);
2792 void pagezero_std(void *addr);
2793 void pagezero_erms(void *addr);
2794 DEFINE_IFUNC(, void , pagezero, (void *))
2797 return ((cpu_stdext_feature & CPUID_STDEXT_ERMS) != 0 ?
2798 pagezero_erms : pagezero_std);