2 * SPDX-License-Identifier: BSD-4-Clause
4 * Copyright (c) 2003 Peter Wemm.
5 * Copyright (c) 1992 Terrence R. Lambert.
6 * Copyright (c) 1982, 1987, 1990 The Regents of the University of California.
9 * This code is derived from software contributed to Berkeley by
12 * Redistribution and use in source and binary forms, with or without
13 * modification, are permitted provided that the following conditions
15 * 1. Redistributions of source code must retain the above copyright
16 * notice, this list of conditions and the following disclaimer.
17 * 2. Redistributions in binary form must reproduce the above copyright
18 * notice, this list of conditions and the following disclaimer in the
19 * documentation and/or other materials provided with the distribution.
20 * 3. All advertising materials mentioning features or use of this software
21 * must display the following acknowledgement:
22 * This product includes software developed by the University of
23 * California, Berkeley and its contributors.
24 * 4. Neither the name of the University nor the names of its contributors
25 * may be used to endorse or promote products derived from this software
26 * without specific prior written permission.
28 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
29 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
30 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
31 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
32 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
33 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
34 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
35 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
36 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
37 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
40 * from: @(#)machdep.c 7.4 (Berkeley) 6/3/91
43 #include <sys/cdefs.h>
44 __FBSDID("$FreeBSD$");
46 #include "opt_atpic.h"
51 #include "opt_kstack_pages.h"
52 #include "opt_maxmem.h"
53 #include "opt_mp_watchdog.h"
55 #include "opt_platform.h"
56 #include "opt_sched.h"
58 #include <sys/param.h>
60 #include <sys/systm.h>
64 #include <sys/callout.h>
69 #include <sys/eventhandler.h>
71 #include <sys/imgact.h>
73 #include <sys/kernel.h>
75 #include <sys/linker.h>
77 #include <sys/malloc.h>
78 #include <sys/memrange.h>
79 #include <sys/msgbuf.h>
80 #include <sys/mutex.h>
82 #include <sys/ptrace.h>
83 #include <sys/reboot.h>
84 #include <sys/rwlock.h>
85 #include <sys/sched.h>
86 #include <sys/signalvar.h>
90 #include <sys/syscallsubr.h>
91 #include <sys/sysctl.h>
92 #include <sys/sysent.h>
93 #include <sys/sysproto.h>
94 #include <sys/ucontext.h>
95 #include <sys/vmmeter.h>
98 #include <vm/vm_param.h>
99 #include <vm/vm_extern.h>
100 #include <vm/vm_kern.h>
101 #include <vm/vm_page.h>
102 #include <vm/vm_map.h>
103 #include <vm/vm_object.h>
104 #include <vm/vm_pager.h>
105 #include <vm/vm_phys.h>
106 #include <vm/vm_dumpset.h>
110 #error KDB must be enabled in order for DDB to work!
113 #include <ddb/db_sym.h>
116 #include <net/netisr.h>
118 #include <machine/clock.h>
119 #include <machine/cpu.h>
120 #include <machine/cputypes.h>
121 #include <machine/frame.h>
122 #include <machine/intr_machdep.h>
124 #include <machine/md_var.h>
125 #include <machine/metadata.h>
126 #include <machine/mp_watchdog.h>
127 #include <machine/pc/bios.h>
128 #include <machine/pcb.h>
129 #include <machine/proc.h>
130 #include <machine/reg.h>
131 #include <machine/sigframe.h>
132 #include <machine/specialreg.h>
133 #include <machine/trap.h>
134 #include <machine/tss.h>
135 #include <x86/ucode.h>
136 #include <x86/ifunc.h>
138 #include <machine/smp.h>
145 #include <x86/isa/icu.h>
147 #include <x86/apicvar.h>
150 #include <isa/isareg.h>
152 #include <x86/init.h>
154 /* Sanity check for __curthread() */
155 CTASSERT(offsetof(struct pcpu, pc_curthread) == 0);
158 * The PTI trampoline stack needs enough space for a hardware trapframe and a
159 * couple of scratch registers, as well as the trapframe left behind after an
162 CTASSERT(PC_PTI_STACK_SZ * sizeof(register_t) >= 2 * sizeof(struct pti_frame) -
163 offsetof(struct pti_frame, pti_rip));
165 extern u_int64_t hammer_time(u_int64_t, u_int64_t);
167 #define CS_SECURE(cs) (ISPL(cs) == SEL_UPL)
168 #define EFL_SECURE(ef, oef) ((((ef) ^ (oef)) & ~PSL_USERCHANGE) == 0)
170 static void cpu_startup(void *);
171 static void get_fpcontext(struct thread *td, mcontext_t *mcp,
172 char *xfpusave, size_t xfpusave_len);
173 static int set_fpcontext(struct thread *td, mcontext_t *mcp,
174 char *xfpustate, size_t xfpustate_len);
175 SYSINIT(cpu, SI_SUB_CPU, SI_ORDER_FIRST, cpu_startup, NULL);
177 /* Preload data parse function */
178 static caddr_t native_parse_preload_data(u_int64_t);
180 /* Native function to fetch and parse the e820 map */
181 static void native_parse_memmap(caddr_t, vm_paddr_t *, int *);
183 /* Default init_ops implementation. */
184 struct init_ops init_ops = {
185 .parse_preload_data = native_parse_preload_data,
186 .early_clock_source_init = i8254_init,
187 .early_delay = i8254_delay,
188 .parse_memmap = native_parse_memmap,
190 .mp_bootaddress = mp_bootaddress,
191 .start_all_aps = native_start_all_aps,
194 .msi_init = msi_init,
199 * Physical address of the EFI System Table. Stashed from the metadata hints
200 * passed into the kernel and used by the EFI code to call runtime services.
202 vm_paddr_t efi_systbl_phys;
204 /* Intel ICH registers */
205 #define ICH_PMBASE 0x400
206 #define ICH_SMI_EN ICH_PMBASE + 0x30
208 int _udatasel, _ucodesel, _ucode32sel, _ufssel, _ugssel;
215 struct kva_md_info kmi;
217 static struct trapframe proc0_tf;
218 struct region_descriptor r_idt;
221 struct pcpu temp_bsp_pcpu;
225 struct mem_range_softc mem_range_softc;
227 struct mtx dt_lock; /* lock for GDT and LDT */
229 void (*vmm_resume_p)(void);
239 * On MacBooks, we need to disallow the legacy USB circuit to
240 * generate an SMI# because this can cause several problems,
241 * namely: incorrect CPU frequency detection and failure to
243 * We do this by disabling a bit in the SMI_EN (SMI Control and
244 * Enable register) of the Intel ICH LPC Interface Bridge.
246 sysenv = kern_getenv("smbios.system.product");
247 if (sysenv != NULL) {
248 if (strncmp(sysenv, "MacBook1,1", 10) == 0 ||
249 strncmp(sysenv, "MacBook3,1", 10) == 0 ||
250 strncmp(sysenv, "MacBook4,1", 10) == 0 ||
251 strncmp(sysenv, "MacBookPro1,1", 13) == 0 ||
252 strncmp(sysenv, "MacBookPro1,2", 13) == 0 ||
253 strncmp(sysenv, "MacBookPro3,1", 13) == 0 ||
254 strncmp(sysenv, "MacBookPro4,1", 13) == 0 ||
255 strncmp(sysenv, "Macmini1,1", 10) == 0) {
257 printf("Disabling LEGACY_USB_EN bit on "
259 outl(ICH_SMI_EN, inl(ICH_SMI_EN) & ~0x8);
265 * Good {morning,afternoon,evening,night}.
271 * Display physical memory if SMBIOS reports reasonable amount.
274 sysenv = kern_getenv("smbios.memory.enabled");
275 if (sysenv != NULL) {
276 memsize = (uintmax_t)strtoul(sysenv, (char **)NULL, 10) << 10;
279 if (memsize < ptoa((uintmax_t)vm_free_count()))
280 memsize = ptoa((uintmax_t)Maxmem);
281 printf("real memory = %ju (%ju MB)\n", memsize, memsize >> 20);
282 realmem = atop(memsize);
285 * Display any holes after the first chunk of extended memory.
290 printf("Physical memory chunk(s):\n");
291 for (indx = 0; phys_avail[indx + 1] != 0; indx += 2) {
294 size = phys_avail[indx + 1] - phys_avail[indx];
296 "0x%016jx - 0x%016jx, %ju bytes (%ju pages)\n",
297 (uintmax_t)phys_avail[indx],
298 (uintmax_t)phys_avail[indx + 1] - 1,
299 (uintmax_t)size, (uintmax_t)size / PAGE_SIZE);
303 vm_ksubmap_init(&kmi);
305 printf("avail memory = %ju (%ju MB)\n",
306 ptoa((uintmax_t)vm_free_count()),
307 ptoa((uintmax_t)vm_free_count()) / 1048576);
309 if (bootverbose && intel_graphics_stolen_base != 0)
310 printf("intel stolen mem: base %#jx size %ju MB\n",
311 (uintmax_t)intel_graphics_stolen_base,
312 (uintmax_t)intel_graphics_stolen_size / 1024 / 1024);
316 * Set up buffers, so they can be used to read disk labels.
319 vm_pager_bufferinit();
325 late_ifunc_resolve(void *dummy __unused)
327 link_elf_late_ireloc();
329 SYSINIT(late_ifunc_resolve, SI_SUB_CPU, SI_ORDER_ANY, late_ifunc_resolve, NULL);
332 * Send an interrupt to process.
334 * Stack is set up to allow sigcode stored
335 * at top to call routine, followed by call
336 * to sigreturn routine below. After sigreturn
337 * resets the signal mask, the stack, and the
338 * frame pointer, it returns to the user
342 sendsig(sig_t catcher, ksiginfo_t *ksi, sigset_t *mask)
344 struct sigframe sf, *sfp;
350 struct trapframe *regs;
359 PROC_LOCK_ASSERT(p, MA_OWNED);
360 sig = ksi->ksi_signo;
362 mtx_assert(&psp->ps_mtx, MA_OWNED);
364 oonstack = sigonstack(regs->tf_rsp);
366 if (cpu_max_ext_state_size > sizeof(struct savefpu) && use_xsave) {
367 xfpusave_len = cpu_max_ext_state_size - sizeof(struct savefpu);
368 xfpusave = __builtin_alloca(xfpusave_len);
374 /* Save user context. */
375 bzero(&sf, sizeof(sf));
376 sf.sf_uc.uc_sigmask = *mask;
377 sf.sf_uc.uc_stack = td->td_sigstk;
378 sf.sf_uc.uc_stack.ss_flags = (td->td_pflags & TDP_ALTSTACK)
379 ? ((oonstack) ? SS_ONSTACK : 0) : SS_DISABLE;
380 sf.sf_uc.uc_mcontext.mc_onstack = (oonstack) ? 1 : 0;
381 bcopy(regs, &sf.sf_uc.uc_mcontext.mc_rdi, sizeof(*regs));
382 sf.sf_uc.uc_mcontext.mc_len = sizeof(sf.sf_uc.uc_mcontext); /* magic */
383 get_fpcontext(td, &sf.sf_uc.uc_mcontext, xfpusave, xfpusave_len);
385 update_pcb_bases(pcb);
386 sf.sf_uc.uc_mcontext.mc_fsbase = pcb->pcb_fsbase;
387 sf.sf_uc.uc_mcontext.mc_gsbase = pcb->pcb_gsbase;
388 bzero(sf.sf_uc.uc_mcontext.mc_spare,
389 sizeof(sf.sf_uc.uc_mcontext.mc_spare));
391 /* Allocate space for the signal handler context. */
392 if ((td->td_pflags & TDP_ALTSTACK) != 0 && !oonstack &&
393 SIGISMEMBER(psp->ps_sigonstack, sig)) {
394 sp = (char *)td->td_sigstk.ss_sp + td->td_sigstk.ss_size;
395 #if defined(COMPAT_43)
396 td->td_sigstk.ss_flags |= SS_ONSTACK;
399 sp = (char *)regs->tf_rsp - 128;
400 if (xfpusave != NULL) {
402 sp = (char *)((unsigned long)sp & ~0x3Ful);
403 sf.sf_uc.uc_mcontext.mc_xfpustate = (register_t)sp;
405 sp -= sizeof(struct sigframe);
406 /* Align to 16 bytes. */
407 sfp = (struct sigframe *)((unsigned long)sp & ~0xFul);
409 /* Build the argument list for the signal handler. */
410 regs->tf_rdi = sig; /* arg 1 in %rdi */
411 regs->tf_rdx = (register_t)&sfp->sf_uc; /* arg 3 in %rdx */
412 bzero(&sf.sf_si, sizeof(sf.sf_si));
413 if (SIGISMEMBER(psp->ps_siginfo, sig)) {
414 /* Signal handler installed with SA_SIGINFO. */
415 regs->tf_rsi = (register_t)&sfp->sf_si; /* arg 2 in %rsi */
416 sf.sf_ahu.sf_action = (__siginfohandler_t *)catcher;
418 /* Fill in POSIX parts */
419 sf.sf_si = ksi->ksi_info;
420 sf.sf_si.si_signo = sig; /* maybe a translated signal */
421 regs->tf_rcx = (register_t)ksi->ksi_addr; /* arg 4 in %rcx */
423 /* Old FreeBSD-style arguments. */
424 regs->tf_rsi = ksi->ksi_code; /* arg 2 in %rsi */
425 regs->tf_rcx = (register_t)ksi->ksi_addr; /* arg 4 in %rcx */
426 sf.sf_ahu.sf_handler = catcher;
428 mtx_unlock(&psp->ps_mtx);
432 * Copy the sigframe out to the user's stack.
434 if (copyout(&sf, sfp, sizeof(*sfp)) != 0 ||
435 (xfpusave != NULL && copyout(xfpusave,
436 (void *)sf.sf_uc.uc_mcontext.mc_xfpustate, xfpusave_len)
439 printf("process %ld has trashed its stack\n", (long)p->p_pid);
445 regs->tf_rsp = (long)sfp;
446 regs->tf_rip = p->p_sysent->sv_sigcode_base;
447 regs->tf_rflags &= ~(PSL_T | PSL_D);
448 regs->tf_cs = _ucodesel;
449 regs->tf_ds = _udatasel;
450 regs->tf_ss = _udatasel;
451 regs->tf_es = _udatasel;
452 regs->tf_fs = _ufssel;
453 regs->tf_gs = _ugssel;
454 regs->tf_flags = TF_HASSEGS;
456 mtx_lock(&psp->ps_mtx);
460 * System call to cleanup state after a signal
461 * has been taken. Reset signal mask and
462 * stack state from context left by sendsig (above).
463 * Return to previous pc and psl as specified by
464 * context left by sendsig. Check carefully to
465 * make sure that the user has not modified the
466 * state to gain improper privileges.
471 sys_sigreturn(td, uap)
473 struct sigreturn_args /* {
474 const struct __ucontext *sigcntxp;
480 struct trapframe *regs;
483 size_t xfpustate_len;
491 error = copyin(uap->sigcntxp, &uc, sizeof(uc));
493 uprintf("pid %d (%s): sigreturn copyin failed\n",
494 p->p_pid, td->td_name);
498 if ((ucp->uc_mcontext.mc_flags & ~_MC_FLAG_MASK) != 0) {
499 uprintf("pid %d (%s): sigreturn mc_flags %x\n", p->p_pid,
500 td->td_name, ucp->uc_mcontext.mc_flags);
504 rflags = ucp->uc_mcontext.mc_rflags;
506 * Don't allow users to change privileged or reserved flags.
508 if (!EFL_SECURE(rflags, regs->tf_rflags)) {
509 uprintf("pid %d (%s): sigreturn rflags = 0x%lx\n", p->p_pid,
510 td->td_name, rflags);
515 * Don't allow users to load a valid privileged %cs. Let the
516 * hardware check for invalid selectors, excess privilege in
517 * other selectors, invalid %eip's and invalid %esp's.
519 cs = ucp->uc_mcontext.mc_cs;
520 if (!CS_SECURE(cs)) {
521 uprintf("pid %d (%s): sigreturn cs = 0x%x\n", p->p_pid,
523 ksiginfo_init_trap(&ksi);
524 ksi.ksi_signo = SIGBUS;
525 ksi.ksi_code = BUS_OBJERR;
526 ksi.ksi_trapno = T_PROTFLT;
527 ksi.ksi_addr = (void *)regs->tf_rip;
528 trapsignal(td, &ksi);
532 if ((uc.uc_mcontext.mc_flags & _MC_HASFPXSTATE) != 0) {
533 xfpustate_len = uc.uc_mcontext.mc_xfpustate_len;
534 if (xfpustate_len > cpu_max_ext_state_size -
535 sizeof(struct savefpu)) {
536 uprintf("pid %d (%s): sigreturn xfpusave_len = 0x%zx\n",
537 p->p_pid, td->td_name, xfpustate_len);
540 xfpustate = __builtin_alloca(xfpustate_len);
541 error = copyin((const void *)uc.uc_mcontext.mc_xfpustate,
542 xfpustate, xfpustate_len);
545 "pid %d (%s): sigreturn copying xfpustate failed\n",
546 p->p_pid, td->td_name);
553 ret = set_fpcontext(td, &ucp->uc_mcontext, xfpustate, xfpustate_len);
555 uprintf("pid %d (%s): sigreturn set_fpcontext err %d\n",
556 p->p_pid, td->td_name, ret);
559 bcopy(&ucp->uc_mcontext.mc_rdi, regs, sizeof(*regs));
560 update_pcb_bases(pcb);
561 pcb->pcb_fsbase = ucp->uc_mcontext.mc_fsbase;
562 pcb->pcb_gsbase = ucp->uc_mcontext.mc_gsbase;
564 #if defined(COMPAT_43)
565 if (ucp->uc_mcontext.mc_onstack & 1)
566 td->td_sigstk.ss_flags |= SS_ONSTACK;
568 td->td_sigstk.ss_flags &= ~SS_ONSTACK;
571 kern_sigprocmask(td, SIG_SETMASK, &ucp->uc_sigmask, NULL, 0);
572 return (EJUSTRETURN);
575 #ifdef COMPAT_FREEBSD4
577 freebsd4_sigreturn(struct thread *td, struct freebsd4_sigreturn_args *uap)
580 return sys_sigreturn(td, (struct sigreturn_args *)uap);
585 * Reset the hardware debug registers if they were in use.
586 * They won't have any meaning for the newly exec'd process.
589 x86_clear_dbregs(struct pcb *pcb)
591 if ((pcb->pcb_flags & PCB_DBREGS) == 0)
603 * Clear the debug registers on the running CPU,
604 * otherwise they will end up affecting the next
605 * process we switch to.
609 clear_pcb_flags(pcb, PCB_DBREGS);
613 * Reset registers to default values on exec.
616 exec_setregs(struct thread *td, struct image_params *imgp, uintptr_t stack)
618 struct trapframe *regs;
620 register_t saved_rflags;
625 if (td->td_proc->p_md.md_ldt != NULL)
628 update_pcb_bases(pcb);
631 clear_pcb_flags(pcb, PCB_32BIT);
632 pcb->pcb_initial_fpucw = __INITIAL_FPUCW__;
634 saved_rflags = regs->tf_rflags & PSL_T;
635 bzero((char *)regs, sizeof(struct trapframe));
636 regs->tf_rip = imgp->entry_addr;
637 regs->tf_rsp = ((stack - 8) & ~0xFul) + 8;
638 regs->tf_rdi = stack; /* argv */
639 regs->tf_rflags = PSL_USER | saved_rflags;
640 regs->tf_ss = _udatasel;
641 regs->tf_cs = _ucodesel;
642 regs->tf_ds = _udatasel;
643 regs->tf_es = _udatasel;
644 regs->tf_fs = _ufssel;
645 regs->tf_gs = _ugssel;
646 regs->tf_flags = TF_HASSEGS;
648 x86_clear_dbregs(pcb);
651 * Drop the FP state if we hold it, so that the process gets a
652 * clean FP state if it uses the FPU again.
664 * CR0_MP, CR0_NE and CR0_TS are also set by npx_probe() for the
665 * BSP. See the comments there about why we set them.
667 cr0 |= CR0_MP | CR0_NE | CR0_TS | CR0_WP | CR0_AM;
672 * Initialize amd64 and configure to run kernel
676 * Initialize segments & interrupt table
678 static struct gate_descriptor idt0[NIDT];
679 struct gate_descriptor *idt = &idt0[0]; /* interrupt descriptor table */
681 static char dblfault_stack[DBLFAULT_STACK_SIZE] __aligned(16);
682 static char mce0_stack[MCE_STACK_SIZE] __aligned(16);
683 static char nmi0_stack[NMI_STACK_SIZE] __aligned(16);
684 static char dbg0_stack[DBG_STACK_SIZE] __aligned(16);
685 CTASSERT(sizeof(struct nmi_pcpu) == 16);
688 * Software prototypes -- in more palatable form.
690 * Keep GUFS32, GUGS32, GUCODE32 and GUDATA at the same
691 * slots as corresponding segments for i386 kernel.
693 struct soft_segment_descriptor gdt_segs[] = {
694 /* GNULL_SEL 0 Null Descriptor */
703 /* GNULL2_SEL 1 Null Descriptor */
712 /* GUFS32_SEL 2 32 bit %gs Descriptor for user */
714 .ssd_limit = 0xfffff,
715 .ssd_type = SDT_MEMRWA,
721 /* GUGS32_SEL 3 32 bit %fs Descriptor for user */
723 .ssd_limit = 0xfffff,
724 .ssd_type = SDT_MEMRWA,
730 /* GCODE_SEL 4 Code Descriptor for kernel */
732 .ssd_limit = 0xfffff,
733 .ssd_type = SDT_MEMERA,
739 /* GDATA_SEL 5 Data Descriptor for kernel */
741 .ssd_limit = 0xfffff,
742 .ssd_type = SDT_MEMRWA,
748 /* GUCODE32_SEL 6 32 bit Code Descriptor for user */
750 .ssd_limit = 0xfffff,
751 .ssd_type = SDT_MEMERA,
757 /* GUDATA_SEL 7 32/64 bit Data Descriptor for user */
759 .ssd_limit = 0xfffff,
760 .ssd_type = SDT_MEMRWA,
766 /* GUCODE_SEL 8 64 bit Code Descriptor for user */
768 .ssd_limit = 0xfffff,
769 .ssd_type = SDT_MEMERA,
775 /* GPROC0_SEL 9 Proc 0 Tss Descriptor */
777 .ssd_limit = sizeof(struct amd64tss) + IOPERM_BITMAP_SIZE - 1,
778 .ssd_type = SDT_SYSTSS,
784 /* Actually, the TSS is a system descriptor which is double size */
793 /* GUSERLDT_SEL 11 LDT Descriptor */
802 /* GUSERLDT_SEL 12 LDT Descriptor, double size */
812 _Static_assert(nitems(gdt_segs) == NGDT, "Stale NGDT");
815 setidt(int idx, inthand_t *func, int typ, int dpl, int ist)
817 struct gate_descriptor *ip;
820 ip->gd_looffset = (uintptr_t)func;
821 ip->gd_selector = GSEL(GCODE_SEL, SEL_KPL);
827 ip->gd_hioffset = ((uintptr_t)func)>>16 ;
831 IDTVEC(div), IDTVEC(dbg), IDTVEC(nmi), IDTVEC(bpt), IDTVEC(ofl),
832 IDTVEC(bnd), IDTVEC(ill), IDTVEC(dna), IDTVEC(fpusegm),
833 IDTVEC(tss), IDTVEC(missing), IDTVEC(stk), IDTVEC(prot),
834 IDTVEC(page), IDTVEC(mchk), IDTVEC(rsvd), IDTVEC(fpu), IDTVEC(align),
835 IDTVEC(xmm), IDTVEC(dblfault),
836 IDTVEC(div_pti), IDTVEC(bpt_pti),
837 IDTVEC(ofl_pti), IDTVEC(bnd_pti), IDTVEC(ill_pti), IDTVEC(dna_pti),
838 IDTVEC(fpusegm_pti), IDTVEC(tss_pti), IDTVEC(missing_pti),
839 IDTVEC(stk_pti), IDTVEC(prot_pti), IDTVEC(page_pti),
840 IDTVEC(rsvd_pti), IDTVEC(fpu_pti), IDTVEC(align_pti),
843 IDTVEC(dtrace_ret), IDTVEC(dtrace_ret_pti),
846 IDTVEC(xen_intr_upcall), IDTVEC(xen_intr_upcall_pti),
848 IDTVEC(fast_syscall), IDTVEC(fast_syscall32),
849 IDTVEC(fast_syscall_pti);
853 * Display the index and function name of any IDT entries that don't use
854 * the default 'rsvd' entry point.
856 DB_SHOW_COMMAND(idt, db_show_idt)
858 struct gate_descriptor *ip;
863 for (idx = 0; idx < NIDT && !db_pager_quit; idx++) {
864 func = ((long)ip->gd_hioffset << 16 | ip->gd_looffset);
865 if (func != (uintptr_t)&IDTVEC(rsvd)) {
866 db_printf("%3d\t", idx);
867 db_printsym(func, DB_STGY_PROC);
874 /* Show privileged registers. */
875 DB_SHOW_COMMAND(sysregs, db_show_sysregs)
880 } __packed idtr, gdtr;
883 __asm __volatile("sidt %0" : "=m" (idtr));
884 db_printf("idtr\t0x%016lx/%04x\n",
885 (u_long)idtr.base, (u_int)idtr.limit);
886 __asm __volatile("sgdt %0" : "=m" (gdtr));
887 db_printf("gdtr\t0x%016lx/%04x\n",
888 (u_long)gdtr.base, (u_int)gdtr.limit);
889 __asm __volatile("sldt %0" : "=r" (ldt));
890 db_printf("ldtr\t0x%04x\n", ldt);
891 __asm __volatile("str %0" : "=r" (tr));
892 db_printf("tr\t0x%04x\n", tr);
893 db_printf("cr0\t0x%016lx\n", rcr0());
894 db_printf("cr2\t0x%016lx\n", rcr2());
895 db_printf("cr3\t0x%016lx\n", rcr3());
896 db_printf("cr4\t0x%016lx\n", rcr4());
897 if (rcr4() & CR4_XSAVE)
898 db_printf("xcr0\t0x%016lx\n", rxcr(0));
899 db_printf("EFER\t0x%016lx\n", rdmsr(MSR_EFER));
900 if (cpu_feature2 & (CPUID2_VMX | CPUID2_SMX))
901 db_printf("FEATURES_CTL\t%016lx\n",
902 rdmsr(MSR_IA32_FEATURE_CONTROL));
903 db_printf("DEBUG_CTL\t0x%016lx\n", rdmsr(MSR_DEBUGCTLMSR));
904 db_printf("PAT\t0x%016lx\n", rdmsr(MSR_PAT));
905 db_printf("GSBASE\t0x%016lx\n", rdmsr(MSR_GSBASE));
908 DB_SHOW_COMMAND(dbregs, db_show_dbregs)
911 db_printf("dr0\t0x%016lx\n", rdr0());
912 db_printf("dr1\t0x%016lx\n", rdr1());
913 db_printf("dr2\t0x%016lx\n", rdr2());
914 db_printf("dr3\t0x%016lx\n", rdr3());
915 db_printf("dr6\t0x%016lx\n", rdr6());
916 db_printf("dr7\t0x%016lx\n", rdr7());
922 struct user_segment_descriptor *sd;
923 struct soft_segment_descriptor *ssd;
926 ssd->ssd_base = (sd->sd_hibase << 24) | sd->sd_lobase;
927 ssd->ssd_limit = (sd->sd_hilimit << 16) | sd->sd_lolimit;
928 ssd->ssd_type = sd->sd_type;
929 ssd->ssd_dpl = sd->sd_dpl;
930 ssd->ssd_p = sd->sd_p;
931 ssd->ssd_long = sd->sd_long;
932 ssd->ssd_def32 = sd->sd_def32;
933 ssd->ssd_gran = sd->sd_gran;
938 struct soft_segment_descriptor *ssd;
939 struct user_segment_descriptor *sd;
942 sd->sd_lobase = (ssd->ssd_base) & 0xffffff;
943 sd->sd_hibase = (ssd->ssd_base >> 24) & 0xff;
944 sd->sd_lolimit = (ssd->ssd_limit) & 0xffff;
945 sd->sd_hilimit = (ssd->ssd_limit >> 16) & 0xf;
946 sd->sd_type = ssd->ssd_type;
947 sd->sd_dpl = ssd->ssd_dpl;
948 sd->sd_p = ssd->ssd_p;
949 sd->sd_long = ssd->ssd_long;
950 sd->sd_def32 = ssd->ssd_def32;
951 sd->sd_gran = ssd->ssd_gran;
956 struct soft_segment_descriptor *ssd;
957 struct system_segment_descriptor *sd;
960 sd->sd_lobase = (ssd->ssd_base) & 0xffffff;
961 sd->sd_hibase = (ssd->ssd_base >> 24) & 0xfffffffffful;
962 sd->sd_lolimit = (ssd->ssd_limit) & 0xffff;
963 sd->sd_hilimit = (ssd->ssd_limit >> 16) & 0xf;
964 sd->sd_type = ssd->ssd_type;
965 sd->sd_dpl = ssd->ssd_dpl;
966 sd->sd_p = ssd->ssd_p;
967 sd->sd_gran = ssd->ssd_gran;
973 add_physmap_entry(uint64_t base, uint64_t length, vm_paddr_t *physmap,
976 int i, insert_idx, physmap_idx;
978 physmap_idx = *physmap_idxp;
984 * Find insertion point while checking for overlap. Start off by
985 * assuming the new entry will be added to the end.
987 * NB: physmap_idx points to the next free slot.
989 insert_idx = physmap_idx;
990 for (i = 0; i <= physmap_idx; i += 2) {
991 if (base < physmap[i + 1]) {
992 if (base + length <= physmap[i]) {
996 if (boothowto & RB_VERBOSE)
998 "Overlapping memory regions, ignoring second region\n");
1003 /* See if we can prepend to the next entry. */
1004 if (insert_idx <= physmap_idx && base + length == physmap[insert_idx]) {
1005 physmap[insert_idx] = base;
1009 /* See if we can append to the previous entry. */
1010 if (insert_idx > 0 && base == physmap[insert_idx - 1]) {
1011 physmap[insert_idx - 1] += length;
1016 *physmap_idxp = physmap_idx;
1017 if (physmap_idx == PHYS_AVAIL_ENTRIES) {
1019 "Too many segments in the physical address map, giving up\n");
1024 * Move the last 'N' entries down to make room for the new
1027 for (i = (physmap_idx - 2); i > insert_idx; i -= 2) {
1028 physmap[i] = physmap[i - 2];
1029 physmap[i + 1] = physmap[i - 1];
1032 /* Insert the new entry. */
1033 physmap[insert_idx] = base;
1034 physmap[insert_idx + 1] = base + length;
1039 bios_add_smap_entries(struct bios_smap *smapbase, u_int32_t smapsize,
1040 vm_paddr_t *physmap, int *physmap_idx)
1042 struct bios_smap *smap, *smapend;
1044 smapend = (struct bios_smap *)((uintptr_t)smapbase + smapsize);
1046 for (smap = smapbase; smap < smapend; smap++) {
1047 if (boothowto & RB_VERBOSE)
1048 printf("SMAP type=%02x base=%016lx len=%016lx\n",
1049 smap->type, smap->base, smap->length);
1051 if (smap->type != SMAP_TYPE_MEMORY)
1054 if (!add_physmap_entry(smap->base, smap->length, physmap,
1061 add_efi_map_entries(struct efi_map_header *efihdr, vm_paddr_t *physmap,
1064 struct efi_md *map, *p;
1069 static const char *types[] = {
1075 "RuntimeServicesCode",
1076 "RuntimeServicesData",
1077 "ConventionalMemory",
1079 "ACPIReclaimMemory",
1082 "MemoryMappedIOPortSpace",
1088 * Memory map data provided by UEFI via the GetMemoryMap
1089 * Boot Services API.
1091 efisz = (sizeof(struct efi_map_header) + 0xf) & ~0xf;
1092 map = (struct efi_md *)((uint8_t *)efihdr + efisz);
1094 if (efihdr->descriptor_size == 0)
1096 ndesc = efihdr->memory_size / efihdr->descriptor_size;
1098 if (boothowto & RB_VERBOSE)
1099 printf("%23s %12s %12s %8s %4s\n",
1100 "Type", "Physical", "Virtual", "#Pages", "Attr");
1102 for (i = 0, p = map; i < ndesc; i++,
1103 p = efi_next_descriptor(p, efihdr->descriptor_size)) {
1104 if (boothowto & RB_VERBOSE) {
1105 if (p->md_type < nitems(types))
1106 type = types[p->md_type];
1109 printf("%23s %012lx %12p %08lx ", type, p->md_phys,
1110 p->md_virt, p->md_pages);
1111 if (p->md_attr & EFI_MD_ATTR_UC)
1113 if (p->md_attr & EFI_MD_ATTR_WC)
1115 if (p->md_attr & EFI_MD_ATTR_WT)
1117 if (p->md_attr & EFI_MD_ATTR_WB)
1119 if (p->md_attr & EFI_MD_ATTR_UCE)
1121 if (p->md_attr & EFI_MD_ATTR_WP)
1123 if (p->md_attr & EFI_MD_ATTR_RP)
1125 if (p->md_attr & EFI_MD_ATTR_XP)
1127 if (p->md_attr & EFI_MD_ATTR_NV)
1129 if (p->md_attr & EFI_MD_ATTR_MORE_RELIABLE)
1130 printf("MORE_RELIABLE ");
1131 if (p->md_attr & EFI_MD_ATTR_RO)
1133 if (p->md_attr & EFI_MD_ATTR_RT)
1138 switch (p->md_type) {
1139 case EFI_MD_TYPE_CODE:
1140 case EFI_MD_TYPE_DATA:
1141 case EFI_MD_TYPE_BS_CODE:
1142 case EFI_MD_TYPE_BS_DATA:
1143 case EFI_MD_TYPE_FREE:
1145 * We're allowed to use any entry with these types.
1152 if (!add_physmap_entry(p->md_phys, (p->md_pages * PAGE_SIZE),
1153 physmap, physmap_idx))
1159 native_parse_memmap(caddr_t kmdp, vm_paddr_t *physmap, int *physmap_idx)
1161 struct bios_smap *smap;
1162 struct efi_map_header *efihdr;
1166 * Memory map from INT 15:E820.
1168 * subr_module.c says:
1169 * "Consumer may safely assume that size value precedes data."
1170 * ie: an int32_t immediately precedes smap.
1173 efihdr = (struct efi_map_header *)preload_search_info(kmdp,
1174 MODINFO_METADATA | MODINFOMD_EFI_MAP);
1175 smap = (struct bios_smap *)preload_search_info(kmdp,
1176 MODINFO_METADATA | MODINFOMD_SMAP);
1177 if (efihdr == NULL && smap == NULL)
1178 panic("No BIOS smap or EFI map info from loader!");
1180 if (efihdr != NULL) {
1181 add_efi_map_entries(efihdr, physmap, physmap_idx);
1182 strlcpy(bootmethod, "UEFI", sizeof(bootmethod));
1184 size = *((u_int32_t *)smap - 1);
1185 bios_add_smap_entries(smap, size, physmap, physmap_idx);
1186 strlcpy(bootmethod, "BIOS", sizeof(bootmethod));
1190 #define PAGES_PER_GB (1024 * 1024 * 1024 / PAGE_SIZE)
1193 * Populate the (physmap) array with base/bound pairs describing the
1194 * available physical memory in the system, then test this memory and
1195 * build the phys_avail array describing the actually-available memory.
1197 * Total memory size may be set by the kernel environment variable
1198 * hw.physmem or the compile-time define MAXMEM.
1200 * XXX first should be vm_paddr_t.
1203 getmemsize(caddr_t kmdp, u_int64_t first)
1205 int i, physmap_idx, pa_indx, da_indx;
1206 vm_paddr_t pa, physmap[PHYS_AVAIL_ENTRIES];
1207 u_long physmem_start, physmem_tunable, memtest;
1209 quad_t dcons_addr, dcons_size;
1213 * Tell the physical memory allocator about pages used to store
1214 * the kernel and preloaded data. See kmem_bootstrap_free().
1216 vm_phys_early_add_seg((vm_paddr_t)kernphys, trunc_page(first));
1218 bzero(physmap, sizeof(physmap));
1221 init_ops.parse_memmap(kmdp, physmap, &physmap_idx);
1225 * Find the 'base memory' segment for SMP
1228 for (i = 0; i <= physmap_idx; i += 2) {
1229 if (physmap[i] <= 0xA0000) {
1230 basemem = physmap[i + 1] / 1024;
1234 if (basemem == 0 || basemem > 640) {
1237 "Memory map doesn't contain a basemem segment, faking it");
1242 * Maxmem isn't the "maximum memory", it's one larger than the
1243 * highest page of the physical address space. It should be
1244 * called something like "Maxphyspage". We may adjust this
1245 * based on ``hw.physmem'' and the results of the memory test.
1247 Maxmem = atop(physmap[physmap_idx + 1]);
1250 Maxmem = MAXMEM / 4;
1253 if (TUNABLE_ULONG_FETCH("hw.physmem", &physmem_tunable))
1254 Maxmem = atop(physmem_tunable);
1257 * The boot memory test is disabled by default, as it takes a
1258 * significant amount of time on large-memory systems, and is
1259 * unfriendly to virtual machines as it unnecessarily touches all
1262 * A general name is used as the code may be extended to support
1263 * additional tests beyond the current "page present" test.
1266 TUNABLE_ULONG_FETCH("hw.memtest.tests", &memtest);
1269 * Don't allow MAXMEM or hw.physmem to extend the amount of memory
1272 if (Maxmem > atop(physmap[physmap_idx + 1]))
1273 Maxmem = atop(physmap[physmap_idx + 1]);
1275 if (atop(physmap[physmap_idx + 1]) != Maxmem &&
1276 (boothowto & RB_VERBOSE))
1277 printf("Physical memory use set to %ldK\n", Maxmem * 4);
1280 * Make hole for "AP -> long mode" bootstrap code. The
1281 * mp_bootaddress vector is only available when the kernel
1282 * is configured to support APs and APs for the system start
1283 * in real mode mode (e.g. SMP bare metal).
1285 if (init_ops.mp_bootaddress)
1286 init_ops.mp_bootaddress(physmap, &physmap_idx);
1288 /* call pmap initialization to make new kernel address space */
1289 pmap_bootstrap(&first);
1292 * Size up each available chunk of physical memory.
1294 * XXX Some BIOSes corrupt low 64KB between suspend and resume.
1295 * By default, mask off the first 16 pages unless we appear to be
1298 physmem_start = (vm_guest > VM_GUEST_NO ? 1 : 16) << PAGE_SHIFT;
1299 TUNABLE_ULONG_FETCH("hw.physmem.start", &physmem_start);
1300 if (physmap[0] < physmem_start) {
1301 if (physmem_start < PAGE_SIZE)
1302 physmap[0] = PAGE_SIZE;
1303 else if (physmem_start >= physmap[1])
1304 physmap[0] = round_page(physmap[1] - PAGE_SIZE);
1306 physmap[0] = round_page(physmem_start);
1310 phys_avail[pa_indx++] = physmap[0];
1311 phys_avail[pa_indx] = physmap[0];
1312 dump_avail[da_indx] = physmap[0];
1316 * Get dcons buffer address
1318 if (getenv_quad("dcons.addr", &dcons_addr) == 0 ||
1319 getenv_quad("dcons.size", &dcons_size) == 0)
1323 * physmap is in bytes, so when converting to page boundaries,
1324 * round up the start address and round down the end address.
1328 printf("Testing system memory");
1329 for (i = 0; i <= physmap_idx; i += 2) {
1332 end = ptoa((vm_paddr_t)Maxmem);
1333 if (physmap[i + 1] < end)
1334 end = trunc_page(physmap[i + 1]);
1335 for (pa = round_page(physmap[i]); pa < end; pa += PAGE_SIZE) {
1336 int tmp, page_bad, full;
1337 int *ptr = (int *)CADDR1;
1341 * block out kernel memory as not available.
1343 if (pa >= (vm_paddr_t)kernphys && pa < first)
1347 * block out dcons buffer
1350 && pa >= trunc_page(dcons_addr)
1351 && pa < dcons_addr + dcons_size)
1359 * Print a "." every GB to show we're making
1363 if ((page_counter % PAGES_PER_GB) == 0)
1367 * map page into kernel: valid, read/write,non-cacheable
1369 *pte = pa | PG_V | PG_RW | PG_NC_PWT | PG_NC_PCD;
1374 * Test for alternating 1's and 0's
1376 *(volatile int *)ptr = 0xaaaaaaaa;
1377 if (*(volatile int *)ptr != 0xaaaaaaaa)
1380 * Test for alternating 0's and 1's
1382 *(volatile int *)ptr = 0x55555555;
1383 if (*(volatile int *)ptr != 0x55555555)
1388 *(volatile int *)ptr = 0xffffffff;
1389 if (*(volatile int *)ptr != 0xffffffff)
1394 *(volatile int *)ptr = 0x0;
1395 if (*(volatile int *)ptr != 0x0)
1398 * Restore original value.
1404 * Adjust array of valid/good pages.
1406 if (page_bad == TRUE)
1409 * If this good page is a continuation of the
1410 * previous set of good pages, then just increase
1411 * the end pointer. Otherwise start a new chunk.
1412 * Note that "end" points one higher than end,
1413 * making the range >= start and < end.
1414 * If we're also doing a speculative memory
1415 * test and we at or past the end, bump up Maxmem
1416 * so that we keep going. The first bad page
1417 * will terminate the loop.
1419 if (phys_avail[pa_indx] == pa) {
1420 phys_avail[pa_indx] += PAGE_SIZE;
1423 if (pa_indx == PHYS_AVAIL_ENTRIES) {
1425 "Too many holes in the physical address space, giving up\n");
1430 phys_avail[pa_indx++] = pa; /* start */
1431 phys_avail[pa_indx] = pa + PAGE_SIZE; /* end */
1435 if (dump_avail[da_indx] == pa) {
1436 dump_avail[da_indx] += PAGE_SIZE;
1439 if (da_indx == PHYS_AVAIL_ENTRIES) {
1443 dump_avail[da_indx++] = pa; /* start */
1444 dump_avail[da_indx] = pa + PAGE_SIZE; /* end */
1458 * The last chunk must contain at least one page plus the message
1459 * buffer to avoid complicating other code (message buffer address
1460 * calculation, etc.).
1462 while (phys_avail[pa_indx - 1] + PAGE_SIZE +
1463 round_page(msgbufsize) >= phys_avail[pa_indx]) {
1464 physmem -= atop(phys_avail[pa_indx] - phys_avail[pa_indx - 1]);
1465 phys_avail[pa_indx--] = 0;
1466 phys_avail[pa_indx--] = 0;
1469 Maxmem = atop(phys_avail[pa_indx]);
1471 /* Trim off space for the message buffer. */
1472 phys_avail[pa_indx] -= round_page(msgbufsize);
1474 /* Map the message buffer. */
1475 msgbufp = (struct msgbuf *)PHYS_TO_DMAP(phys_avail[pa_indx]);
1479 native_parse_preload_data(u_int64_t modulep)
1484 vm_offset_t ksym_start;
1485 vm_offset_t ksym_end;
1488 preload_metadata = (caddr_t)(uintptr_t)(modulep + KERNBASE);
1489 preload_bootstrap_relocate(KERNBASE);
1490 kmdp = preload_search_by_type("elf kernel");
1492 kmdp = preload_search_by_type("elf64 kernel");
1493 boothowto = MD_FETCH(kmdp, MODINFOMD_HOWTO, int);
1494 envp = MD_FETCH(kmdp, MODINFOMD_ENVP, char *);
1497 init_static_kenv(envp, 0);
1499 ksym_start = MD_FETCH(kmdp, MODINFOMD_SSYM, uintptr_t);
1500 ksym_end = MD_FETCH(kmdp, MODINFOMD_ESYM, uintptr_t);
1501 db_fetch_ksymtab(ksym_start, ksym_end, 0);
1503 efi_systbl_phys = MD_FETCH(kmdp, MODINFOMD_FW_HANDLE, vm_paddr_t);
1509 amd64_kdb_init(void)
1513 if (boothowto & RB_KDB)
1514 kdb_enter(KDB_WHY_BOOTFLAGS, "Boot flags requested debugger");
1518 /* Set up the fast syscall stuff */
1520 amd64_conf_fast_syscall(void)
1524 msr = rdmsr(MSR_EFER) | EFER_SCE;
1525 wrmsr(MSR_EFER, msr);
1526 wrmsr(MSR_LSTAR, pti ? (u_int64_t)IDTVEC(fast_syscall_pti) :
1527 (u_int64_t)IDTVEC(fast_syscall));
1528 wrmsr(MSR_CSTAR, (u_int64_t)IDTVEC(fast_syscall32));
1529 msr = ((u_int64_t)GSEL(GCODE_SEL, SEL_KPL) << 32) |
1530 ((u_int64_t)GSEL(GUCODE32_SEL, SEL_UPL) << 48);
1531 wrmsr(MSR_STAR, msr);
1532 wrmsr(MSR_SF_MASK, PSL_NT | PSL_T | PSL_I | PSL_C | PSL_D | PSL_AC);
1536 amd64_bsp_pcpu_init1(struct pcpu *pc)
1538 struct user_segment_descriptor *gdt;
1540 PCPU_SET(prvspace, pc);
1541 gdt = *PCPU_PTR(gdt);
1542 PCPU_SET(curthread, &thread0);
1543 PCPU_SET(tssp, PCPU_PTR(common_tss));
1544 PCPU_SET(tss, (struct system_segment_descriptor *)&gdt[GPROC0_SEL]);
1545 PCPU_SET(ldt, (struct system_segment_descriptor *)&gdt[GUSERLDT_SEL]);
1546 PCPU_SET(fs32p, &gdt[GUFS32_SEL]);
1547 PCPU_SET(gs32p, &gdt[GUGS32_SEL]);
1548 PCPU_SET(ucr3_load_mask, PMAP_UCR3_NOMASK);
1549 PCPU_SET(smp_tlb_gen, 1);
1553 amd64_bsp_pcpu_init2(uint64_t rsp0)
1556 PCPU_SET(rsp0, rsp0);
1557 PCPU_SET(pti_rsp0, ((vm_offset_t)PCPU_PTR(pti_stack) +
1558 PC_PTI_STACK_SZ * sizeof(uint64_t)) & ~0xful);
1559 PCPU_SET(curpcb, thread0.td_pcb);
1563 amd64_bsp_ist_init(struct pcpu *pc)
1565 struct nmi_pcpu *np;
1566 struct amd64tss *tssp;
1568 tssp = &pc->pc_common_tss;
1570 /* doublefault stack space, runs on ist1 */
1571 np = ((struct nmi_pcpu *)&dblfault_stack[sizeof(dblfault_stack)]) - 1;
1572 np->np_pcpu = (register_t)pc;
1573 tssp->tss_ist1 = (long)np;
1576 * NMI stack, runs on ist2. The pcpu pointer is stored just
1577 * above the start of the ist2 stack.
1579 np = ((struct nmi_pcpu *)&nmi0_stack[sizeof(nmi0_stack)]) - 1;
1580 np->np_pcpu = (register_t)pc;
1581 tssp->tss_ist2 = (long)np;
1584 * MC# stack, runs on ist3. The pcpu pointer is stored just
1585 * above the start of the ist3 stack.
1587 np = ((struct nmi_pcpu *)&mce0_stack[sizeof(mce0_stack)]) - 1;
1588 np->np_pcpu = (register_t)pc;
1589 tssp->tss_ist3 = (long)np;
1592 * DB# stack, runs on ist4.
1594 np = ((struct nmi_pcpu *)&dbg0_stack[sizeof(dbg0_stack)]) - 1;
1595 np->np_pcpu = (register_t)pc;
1596 tssp->tss_ist4 = (long)np;
1600 hammer_time(u_int64_t modulep, u_int64_t physfree)
1605 struct xstate_hdr *xhdr;
1608 struct user_segment_descriptor *gdt;
1609 struct region_descriptor r_gdt;
1613 TSRAW(&thread0, TS_ENTER, __func__, NULL);
1615 kmdp = init_ops.parse_preload_data(modulep);
1617 physfree += ucode_load_bsp(physfree + KERNBASE);
1618 physfree = roundup2(physfree, PAGE_SIZE);
1621 identify_hypervisor();
1622 identify_cpu_fixup_bsp();
1624 initializecpucache();
1627 * Check for pti, pcid, and invpcid before ifuncs are
1628 * resolved, to correctly select the implementation for
1629 * pmap_activate_sw_mode().
1631 pti = pti_get_default();
1632 TUNABLE_INT_FETCH("vm.pmap.pti", &pti);
1633 TUNABLE_INT_FETCH("vm.pmap.pcid_enabled", &pmap_pcid_enabled);
1634 if ((cpu_feature2 & CPUID2_PCID) != 0 && pmap_pcid_enabled) {
1635 invpcid_works = (cpu_stdext_feature &
1636 CPUID_STDEXT_INVPCID) != 0;
1638 pmap_pcid_enabled = 0;
1641 link_elf_ireloc(kmdp);
1644 * This may be done better later if it gets more high level
1645 * components in it. If so just link td->td_proc here.
1647 proc_linkup0(&proc0, &thread0);
1649 /* Init basic tunables, hz etc */
1652 thread0.td_kstack = physfree + KERNBASE;
1653 thread0.td_kstack_pages = kstack_pages;
1654 kstack0_sz = thread0.td_kstack_pages * PAGE_SIZE;
1655 bzero((void *)thread0.td_kstack, kstack0_sz);
1656 physfree += kstack0_sz;
1659 * Initialize enough of thread0 for delayed invalidation to
1660 * work very early. Rely on thread0.td_base_pri
1661 * zero-initialization, it is reset to PVM at proc0_init().
1663 pmap_thread_init_invl_gen(&thread0);
1665 pc = &temp_bsp_pcpu;
1666 pcpu_init(pc, 0, sizeof(struct pcpu));
1667 gdt = &temp_bsp_pcpu.pc_gdt[0];
1670 * make gdt memory segments
1672 for (x = 0; x < NGDT; x++) {
1673 if (x != GPROC0_SEL && x != (GPROC0_SEL + 1) &&
1674 x != GUSERLDT_SEL && x != (GUSERLDT_SEL) + 1)
1675 ssdtosd(&gdt_segs[x], &gdt[x]);
1677 gdt_segs[GPROC0_SEL].ssd_base = (uintptr_t)&pc->pc_common_tss;
1678 ssdtosyssd(&gdt_segs[GPROC0_SEL],
1679 (struct system_segment_descriptor *)&gdt[GPROC0_SEL]);
1681 r_gdt.rd_limit = NGDT * sizeof(gdt[0]) - 1;
1682 r_gdt.rd_base = (long)gdt;
1685 wrmsr(MSR_FSBASE, 0); /* User value */
1686 wrmsr(MSR_GSBASE, (u_int64_t)pc);
1687 wrmsr(MSR_KGSBASE, 0); /* User value while in the kernel */
1689 dpcpu_init((void *)(physfree + KERNBASE), 0);
1690 physfree += DPCPU_SIZE;
1691 amd64_bsp_pcpu_init1(pc);
1692 /* Non-late cninit() and printf() can be moved up to here. */
1695 * Initialize mutexes.
1697 * icu_lock: in order to allow an interrupt to occur in a critical
1698 * section, to set pcpu->ipending (etc...) properly, we
1699 * must be able to get the icu lock, so it can't be
1703 mtx_init(&icu_lock, "icu", NULL, MTX_SPIN | MTX_NOWITNESS);
1704 mtx_init(&dt_lock, "descriptor tables", NULL, MTX_DEF);
1707 for (x = 0; x < NIDT; x++)
1708 setidt(x, pti ? &IDTVEC(rsvd_pti) : &IDTVEC(rsvd), SDT_SYSIGT,
1710 setidt(IDT_DE, pti ? &IDTVEC(div_pti) : &IDTVEC(div), SDT_SYSIGT,
1712 setidt(IDT_DB, &IDTVEC(dbg), SDT_SYSIGT, SEL_KPL, 4);
1713 setidt(IDT_NMI, &IDTVEC(nmi), SDT_SYSIGT, SEL_KPL, 2);
1714 setidt(IDT_BP, pti ? &IDTVEC(bpt_pti) : &IDTVEC(bpt), SDT_SYSIGT,
1716 setidt(IDT_OF, pti ? &IDTVEC(ofl_pti) : &IDTVEC(ofl), SDT_SYSIGT,
1718 setidt(IDT_BR, pti ? &IDTVEC(bnd_pti) : &IDTVEC(bnd), SDT_SYSIGT,
1720 setidt(IDT_UD, pti ? &IDTVEC(ill_pti) : &IDTVEC(ill), SDT_SYSIGT,
1722 setidt(IDT_NM, pti ? &IDTVEC(dna_pti) : &IDTVEC(dna), SDT_SYSIGT,
1724 setidt(IDT_DF, &IDTVEC(dblfault), SDT_SYSIGT, SEL_KPL, 1);
1725 setidt(IDT_FPUGP, pti ? &IDTVEC(fpusegm_pti) : &IDTVEC(fpusegm),
1726 SDT_SYSIGT, SEL_KPL, 0);
1727 setidt(IDT_TS, pti ? &IDTVEC(tss_pti) : &IDTVEC(tss), SDT_SYSIGT,
1729 setidt(IDT_NP, pti ? &IDTVEC(missing_pti) : &IDTVEC(missing),
1730 SDT_SYSIGT, SEL_KPL, 0);
1731 setidt(IDT_SS, pti ? &IDTVEC(stk_pti) : &IDTVEC(stk), SDT_SYSIGT,
1733 setidt(IDT_GP, pti ? &IDTVEC(prot_pti) : &IDTVEC(prot), SDT_SYSIGT,
1735 setidt(IDT_PF, pti ? &IDTVEC(page_pti) : &IDTVEC(page), SDT_SYSIGT,
1737 setidt(IDT_MF, pti ? &IDTVEC(fpu_pti) : &IDTVEC(fpu), SDT_SYSIGT,
1739 setidt(IDT_AC, pti ? &IDTVEC(align_pti) : &IDTVEC(align), SDT_SYSIGT,
1741 setidt(IDT_MC, &IDTVEC(mchk), SDT_SYSIGT, SEL_KPL, 3);
1742 setidt(IDT_XF, pti ? &IDTVEC(xmm_pti) : &IDTVEC(xmm), SDT_SYSIGT,
1744 #ifdef KDTRACE_HOOKS
1745 setidt(IDT_DTRACE_RET, pti ? &IDTVEC(dtrace_ret_pti) :
1746 &IDTVEC(dtrace_ret), SDT_SYSIGT, SEL_UPL, 0);
1749 setidt(IDT_EVTCHN, pti ? &IDTVEC(xen_intr_upcall_pti) :
1750 &IDTVEC(xen_intr_upcall), SDT_SYSIGT, SEL_KPL, 0);
1752 r_idt.rd_limit = sizeof(idt0) - 1;
1753 r_idt.rd_base = (long) idt;
1757 * Initialize the clock before the console so that console
1758 * initialization can use DELAY().
1763 * Use vt(4) by default for UEFI boot (during the sc(4)/vt(4)
1765 * Once bootblocks have updated, we can test directly for
1766 * efi_systbl != NULL here...
1768 if (preload_search_info(kmdp, MODINFO_METADATA | MODINFOMD_EFI_MAP)
1770 vty_set_preferred(VTY_VT);
1772 TUNABLE_INT_FETCH("hw.ibrs_disable", &hw_ibrs_disable);
1773 TUNABLE_INT_FETCH("machdep.mitigations.ibrs.disable", &hw_ibrs_disable);
1775 TUNABLE_INT_FETCH("hw.spec_store_bypass_disable", &hw_ssb_disable);
1776 TUNABLE_INT_FETCH("machdep.mitigations.ssb.disable", &hw_ssb_disable);
1778 TUNABLE_INT_FETCH("machdep.syscall_ret_l1d_flush",
1779 &syscall_ret_l1d_flush_mode);
1781 TUNABLE_INT_FETCH("hw.mds_disable", &hw_mds_disable);
1782 TUNABLE_INT_FETCH("machdep.mitigations.mds.disable", &hw_mds_disable);
1784 TUNABLE_INT_FETCH("machdep.mitigations.taa.enable", &x86_taa_enable);
1786 TUNABLE_INT_FETCH("machdep.mitigations.rndgs.enable",
1787 &x86_rngds_mitg_enable);
1789 finishidentcpu(); /* Final stage of CPU initialization */
1790 initializecpu(); /* Initialize CPU registers */
1792 amd64_bsp_ist_init(pc);
1794 /* Set the IO permission bitmap (empty due to tss seg limit) */
1795 pc->pc_common_tss.tss_iobase = sizeof(struct amd64tss) +
1798 gsel_tss = GSEL(GPROC0_SEL, SEL_KPL);
1801 amd64_conf_fast_syscall();
1804 * We initialize the PCB pointer early so that exception
1805 * handlers will work. Also set up td_critnest to short-cut
1806 * the page fault handler.
1808 cpu_max_ext_state_size = sizeof(struct savefpu);
1809 set_top_of_stack_td(&thread0);
1810 thread0.td_pcb = get_pcb_td(&thread0);
1811 thread0.td_critnest = 1;
1814 * The console and kdb should be initialized even earlier than here,
1815 * but some console drivers don't work until after getmemsize().
1816 * Default to late console initialization to support these drivers.
1817 * This loses mainly printf()s in getmemsize() and early debugging.
1820 TUNABLE_INT_FETCH("debug.late_console", &late_console);
1821 if (!late_console) {
1826 getmemsize(kmdp, physfree);
1827 init_param2(physmem);
1829 /* now running on new page tables, configured,and u/iom is accessible */
1832 /* This call might adjust phys_avail[]. */
1840 * Dump the boot metadata. We have to wait for cninit() since console
1841 * output is required. If it's grossly incorrect the kernel will never
1844 if (getenv_is_true("debug.dump_modinfo_at_boot"))
1852 /* Reset and mask the atpics and leave them shut down. */
1856 * Point the ICU spurious interrupt vectors at the APIC spurious
1857 * interrupt handler.
1859 setidt(IDT_IO_INTS + 7, IDTVEC(spuriousint), SDT_SYSIGT, SEL_KPL, 0);
1860 setidt(IDT_IO_INTS + 15, IDTVEC(spuriousint), SDT_SYSIGT, SEL_KPL, 0);
1863 #error "have you forgotten the isa device?"
1869 msgbufinit(msgbufp, msgbufsize);
1873 * Reinitialize thread0's stack base now that the xsave area size is
1874 * known. Set up thread0's pcb save area after fpuinit calculated fpu
1875 * save area size. Zero out the extended state header in fpu save area.
1877 set_top_of_stack_td(&thread0);
1878 thread0.td_pcb->pcb_save = get_pcb_user_save_td(&thread0);
1879 bzero(thread0.td_pcb->pcb_save, cpu_max_ext_state_size);
1881 xhdr = (struct xstate_hdr *)(get_pcb_user_save_td(&thread0) +
1883 xhdr->xstate_bv = xsave_mask;
1885 /* make an initial tss so cpu can get interrupt stack on syscall! */
1886 rsp0 = thread0.td_md.md_stack_base;
1887 /* Ensure the stack is aligned to 16 bytes */
1889 PCPU_PTR(common_tss)->tss_rsp0 = rsp0;
1890 amd64_bsp_pcpu_init2(rsp0);
1892 /* transfer to user mode */
1894 _ucodesel = GSEL(GUCODE_SEL, SEL_UPL);
1895 _udatasel = GSEL(GUDATA_SEL, SEL_UPL);
1896 _ucode32sel = GSEL(GUCODE32_SEL, SEL_UPL);
1897 _ufssel = GSEL(GUFS32_SEL, SEL_UPL);
1898 _ugssel = GSEL(GUGS32_SEL, SEL_UPL);
1904 /* setup proc 0's pcb */
1905 thread0.td_pcb->pcb_flags = 0;
1906 thread0.td_frame = &proc0_tf;
1908 env = kern_getenv("kernelname");
1910 strlcpy(kernelname, env, sizeof(kernelname));
1917 thread0.td_critnest = 0;
1921 /* Location of kernel stack for locore */
1922 return (thread0.td_md.md_stack_base);
1926 cpu_pcpu_init(struct pcpu *pcpu, int cpuid, size_t size)
1929 pcpu->pc_acpi_id = 0xffffffff;
1933 smap_sysctl_handler(SYSCTL_HANDLER_ARGS)
1935 struct bios_smap *smapbase;
1936 struct bios_smap_xattr smap;
1939 int count, error, i;
1941 /* Retrieve the system memory map from the loader. */
1942 kmdp = preload_search_by_type("elf kernel");
1944 kmdp = preload_search_by_type("elf64 kernel");
1945 smapbase = (struct bios_smap *)preload_search_info(kmdp,
1946 MODINFO_METADATA | MODINFOMD_SMAP);
1947 if (smapbase == NULL)
1949 smapattr = (uint32_t *)preload_search_info(kmdp,
1950 MODINFO_METADATA | MODINFOMD_SMAP_XATTR);
1951 count = *((uint32_t *)smapbase - 1) / sizeof(*smapbase);
1953 for (i = 0; i < count; i++) {
1954 smap.base = smapbase[i].base;
1955 smap.length = smapbase[i].length;
1956 smap.type = smapbase[i].type;
1957 if (smapattr != NULL)
1958 smap.xattr = smapattr[i];
1961 error = SYSCTL_OUT(req, &smap, sizeof(smap));
1965 SYSCTL_PROC(_machdep, OID_AUTO, smap,
1966 CTLTYPE_OPAQUE | CTLFLAG_RD | CTLFLAG_MPSAFE, NULL, 0,
1967 smap_sysctl_handler, "S,bios_smap_xattr",
1968 "Raw BIOS SMAP data");
1971 efi_map_sysctl_handler(SYSCTL_HANDLER_ARGS)
1973 struct efi_map_header *efihdr;
1977 kmdp = preload_search_by_type("elf kernel");
1979 kmdp = preload_search_by_type("elf64 kernel");
1980 efihdr = (struct efi_map_header *)preload_search_info(kmdp,
1981 MODINFO_METADATA | MODINFOMD_EFI_MAP);
1984 efisize = *((uint32_t *)efihdr - 1);
1985 return (SYSCTL_OUT(req, efihdr, efisize));
1987 SYSCTL_PROC(_machdep, OID_AUTO, efi_map,
1988 CTLTYPE_OPAQUE | CTLFLAG_RD | CTLFLAG_MPSAFE, NULL, 0,
1989 efi_map_sysctl_handler, "S,efi_map_header",
1990 "Raw EFI Memory Map");
1993 spinlock_enter(void)
1999 if (td->td_md.md_spinlock_count == 0) {
2000 flags = intr_disable();
2001 td->td_md.md_spinlock_count = 1;
2002 td->td_md.md_saved_flags = flags;
2005 td->td_md.md_spinlock_count++;
2015 flags = td->td_md.md_saved_flags;
2016 td->td_md.md_spinlock_count--;
2017 if (td->td_md.md_spinlock_count == 0) {
2019 intr_restore(flags);
2024 * Construct a PCB from a trapframe. This is called from kdb_trap() where
2025 * we want to start a backtrace from the function that caused us to enter
2026 * the debugger. We have the context in the trapframe, but base the trace
2027 * on the PCB. The PCB doesn't have to be perfect, as long as it contains
2028 * enough for a backtrace.
2031 makectx(struct trapframe *tf, struct pcb *pcb)
2034 pcb->pcb_r12 = tf->tf_r12;
2035 pcb->pcb_r13 = tf->tf_r13;
2036 pcb->pcb_r14 = tf->tf_r14;
2037 pcb->pcb_r15 = tf->tf_r15;
2038 pcb->pcb_rbp = tf->tf_rbp;
2039 pcb->pcb_rbx = tf->tf_rbx;
2040 pcb->pcb_rip = tf->tf_rip;
2041 pcb->pcb_rsp = tf->tf_rsp;
2045 ptrace_set_pc(struct thread *td, unsigned long addr)
2048 td->td_frame->tf_rip = addr;
2049 set_pcb_flags(td->td_pcb, PCB_FULL_IRET);
2054 ptrace_single_step(struct thread *td)
2057 PROC_LOCK_ASSERT(td->td_proc, MA_OWNED);
2058 if ((td->td_frame->tf_rflags & PSL_T) == 0) {
2059 td->td_frame->tf_rflags |= PSL_T;
2060 td->td_dbgflags |= TDB_STEP;
2066 ptrace_clear_single_step(struct thread *td)
2069 PROC_LOCK_ASSERT(td->td_proc, MA_OWNED);
2070 td->td_frame->tf_rflags &= ~PSL_T;
2071 td->td_dbgflags &= ~TDB_STEP;
2076 fill_regs(struct thread *td, struct reg *regs)
2078 struct trapframe *tp;
2081 return (fill_frame_regs(tp, regs));
2085 fill_frame_regs(struct trapframe *tp, struct reg *regs)
2088 regs->r_r15 = tp->tf_r15;
2089 regs->r_r14 = tp->tf_r14;
2090 regs->r_r13 = tp->tf_r13;
2091 regs->r_r12 = tp->tf_r12;
2092 regs->r_r11 = tp->tf_r11;
2093 regs->r_r10 = tp->tf_r10;
2094 regs->r_r9 = tp->tf_r9;
2095 regs->r_r8 = tp->tf_r8;
2096 regs->r_rdi = tp->tf_rdi;
2097 regs->r_rsi = tp->tf_rsi;
2098 regs->r_rbp = tp->tf_rbp;
2099 regs->r_rbx = tp->tf_rbx;
2100 regs->r_rdx = tp->tf_rdx;
2101 regs->r_rcx = tp->tf_rcx;
2102 regs->r_rax = tp->tf_rax;
2103 regs->r_rip = tp->tf_rip;
2104 regs->r_cs = tp->tf_cs;
2105 regs->r_rflags = tp->tf_rflags;
2106 regs->r_rsp = tp->tf_rsp;
2107 regs->r_ss = tp->tf_ss;
2108 if (tp->tf_flags & TF_HASSEGS) {
2109 regs->r_ds = tp->tf_ds;
2110 regs->r_es = tp->tf_es;
2111 regs->r_fs = tp->tf_fs;
2112 regs->r_gs = tp->tf_gs;
2125 set_regs(struct thread *td, struct reg *regs)
2127 struct trapframe *tp;
2131 rflags = regs->r_rflags & 0xffffffff;
2132 if (!EFL_SECURE(rflags, tp->tf_rflags) || !CS_SECURE(regs->r_cs))
2134 tp->tf_r15 = regs->r_r15;
2135 tp->tf_r14 = regs->r_r14;
2136 tp->tf_r13 = regs->r_r13;
2137 tp->tf_r12 = regs->r_r12;
2138 tp->tf_r11 = regs->r_r11;
2139 tp->tf_r10 = regs->r_r10;
2140 tp->tf_r9 = regs->r_r9;
2141 tp->tf_r8 = regs->r_r8;
2142 tp->tf_rdi = regs->r_rdi;
2143 tp->tf_rsi = regs->r_rsi;
2144 tp->tf_rbp = regs->r_rbp;
2145 tp->tf_rbx = regs->r_rbx;
2146 tp->tf_rdx = regs->r_rdx;
2147 tp->tf_rcx = regs->r_rcx;
2148 tp->tf_rax = regs->r_rax;
2149 tp->tf_rip = regs->r_rip;
2150 tp->tf_cs = regs->r_cs;
2151 tp->tf_rflags = rflags;
2152 tp->tf_rsp = regs->r_rsp;
2153 tp->tf_ss = regs->r_ss;
2154 if (0) { /* XXXKIB */
2155 tp->tf_ds = regs->r_ds;
2156 tp->tf_es = regs->r_es;
2157 tp->tf_fs = regs->r_fs;
2158 tp->tf_gs = regs->r_gs;
2159 tp->tf_flags = TF_HASSEGS;
2161 set_pcb_flags(td->td_pcb, PCB_FULL_IRET);
2165 /* XXX check all this stuff! */
2166 /* externalize from sv_xmm */
2168 fill_fpregs_xmm(struct savefpu *sv_xmm, struct fpreg *fpregs)
2170 struct envxmm *penv_fpreg = (struct envxmm *)&fpregs->fpr_env;
2171 struct envxmm *penv_xmm = &sv_xmm->sv_env;
2175 bzero(fpregs, sizeof(*fpregs));
2177 /* FPU control/status */
2178 penv_fpreg->en_cw = penv_xmm->en_cw;
2179 penv_fpreg->en_sw = penv_xmm->en_sw;
2180 penv_fpreg->en_tw = penv_xmm->en_tw;
2181 penv_fpreg->en_opcode = penv_xmm->en_opcode;
2182 penv_fpreg->en_rip = penv_xmm->en_rip;
2183 penv_fpreg->en_rdp = penv_xmm->en_rdp;
2184 penv_fpreg->en_mxcsr = penv_xmm->en_mxcsr;
2185 penv_fpreg->en_mxcsr_mask = penv_xmm->en_mxcsr_mask;
2188 for (i = 0; i < 8; ++i)
2189 bcopy(sv_xmm->sv_fp[i].fp_acc.fp_bytes, fpregs->fpr_acc[i], 10);
2192 for (i = 0; i < 16; ++i)
2193 bcopy(sv_xmm->sv_xmm[i].xmm_bytes, fpregs->fpr_xacc[i], 16);
2196 /* internalize from fpregs into sv_xmm */
2198 set_fpregs_xmm(struct fpreg *fpregs, struct savefpu *sv_xmm)
2200 struct envxmm *penv_xmm = &sv_xmm->sv_env;
2201 struct envxmm *penv_fpreg = (struct envxmm *)&fpregs->fpr_env;
2205 /* FPU control/status */
2206 penv_xmm->en_cw = penv_fpreg->en_cw;
2207 penv_xmm->en_sw = penv_fpreg->en_sw;
2208 penv_xmm->en_tw = penv_fpreg->en_tw;
2209 penv_xmm->en_opcode = penv_fpreg->en_opcode;
2210 penv_xmm->en_rip = penv_fpreg->en_rip;
2211 penv_xmm->en_rdp = penv_fpreg->en_rdp;
2212 penv_xmm->en_mxcsr = penv_fpreg->en_mxcsr;
2213 penv_xmm->en_mxcsr_mask = penv_fpreg->en_mxcsr_mask & cpu_mxcsr_mask;
2216 for (i = 0; i < 8; ++i)
2217 bcopy(fpregs->fpr_acc[i], sv_xmm->sv_fp[i].fp_acc.fp_bytes, 10);
2220 for (i = 0; i < 16; ++i)
2221 bcopy(fpregs->fpr_xacc[i], sv_xmm->sv_xmm[i].xmm_bytes, 16);
2224 /* externalize from td->pcb */
2226 fill_fpregs(struct thread *td, struct fpreg *fpregs)
2229 KASSERT(td == curthread || TD_IS_SUSPENDED(td) ||
2230 P_SHOULDSTOP(td->td_proc),
2231 ("not suspended thread %p", td));
2233 fill_fpregs_xmm(get_pcb_user_save_td(td), fpregs);
2237 /* internalize to td->pcb */
2239 set_fpregs(struct thread *td, struct fpreg *fpregs)
2243 set_fpregs_xmm(fpregs, get_pcb_user_save_td(td));
2250 * Get machine context.
2253 get_mcontext(struct thread *td, mcontext_t *mcp, int flags)
2256 struct trapframe *tp;
2260 PROC_LOCK(curthread->td_proc);
2261 mcp->mc_onstack = sigonstack(tp->tf_rsp);
2262 PROC_UNLOCK(curthread->td_proc);
2263 mcp->mc_r15 = tp->tf_r15;
2264 mcp->mc_r14 = tp->tf_r14;
2265 mcp->mc_r13 = tp->tf_r13;
2266 mcp->mc_r12 = tp->tf_r12;
2267 mcp->mc_r11 = tp->tf_r11;
2268 mcp->mc_r10 = tp->tf_r10;
2269 mcp->mc_r9 = tp->tf_r9;
2270 mcp->mc_r8 = tp->tf_r8;
2271 mcp->mc_rdi = tp->tf_rdi;
2272 mcp->mc_rsi = tp->tf_rsi;
2273 mcp->mc_rbp = tp->tf_rbp;
2274 mcp->mc_rbx = tp->tf_rbx;
2275 mcp->mc_rcx = tp->tf_rcx;
2276 mcp->mc_rflags = tp->tf_rflags;
2277 if (flags & GET_MC_CLEAR_RET) {
2280 mcp->mc_rflags &= ~PSL_C;
2282 mcp->mc_rax = tp->tf_rax;
2283 mcp->mc_rdx = tp->tf_rdx;
2285 mcp->mc_rip = tp->tf_rip;
2286 mcp->mc_cs = tp->tf_cs;
2287 mcp->mc_rsp = tp->tf_rsp;
2288 mcp->mc_ss = tp->tf_ss;
2289 mcp->mc_ds = tp->tf_ds;
2290 mcp->mc_es = tp->tf_es;
2291 mcp->mc_fs = tp->tf_fs;
2292 mcp->mc_gs = tp->tf_gs;
2293 mcp->mc_flags = tp->tf_flags;
2294 mcp->mc_len = sizeof(*mcp);
2295 get_fpcontext(td, mcp, NULL, 0);
2296 update_pcb_bases(pcb);
2297 mcp->mc_fsbase = pcb->pcb_fsbase;
2298 mcp->mc_gsbase = pcb->pcb_gsbase;
2299 mcp->mc_xfpustate = 0;
2300 mcp->mc_xfpustate_len = 0;
2301 bzero(mcp->mc_spare, sizeof(mcp->mc_spare));
2306 * Set machine context.
2308 * However, we don't set any but the user modifiable flags, and we won't
2309 * touch the cs selector.
2312 set_mcontext(struct thread *td, mcontext_t *mcp)
2315 struct trapframe *tp;
2322 if (mcp->mc_len != sizeof(*mcp) ||
2323 (mcp->mc_flags & ~_MC_FLAG_MASK) != 0)
2325 rflags = (mcp->mc_rflags & PSL_USERCHANGE) |
2326 (tp->tf_rflags & ~PSL_USERCHANGE);
2327 if (mcp->mc_flags & _MC_HASFPXSTATE) {
2328 if (mcp->mc_xfpustate_len > cpu_max_ext_state_size -
2329 sizeof(struct savefpu))
2331 xfpustate = __builtin_alloca(mcp->mc_xfpustate_len);
2332 ret = copyin((void *)mcp->mc_xfpustate, xfpustate,
2333 mcp->mc_xfpustate_len);
2338 ret = set_fpcontext(td, mcp, xfpustate, mcp->mc_xfpustate_len);
2341 tp->tf_r15 = mcp->mc_r15;
2342 tp->tf_r14 = mcp->mc_r14;
2343 tp->tf_r13 = mcp->mc_r13;
2344 tp->tf_r12 = mcp->mc_r12;
2345 tp->tf_r11 = mcp->mc_r11;
2346 tp->tf_r10 = mcp->mc_r10;
2347 tp->tf_r9 = mcp->mc_r9;
2348 tp->tf_r8 = mcp->mc_r8;
2349 tp->tf_rdi = mcp->mc_rdi;
2350 tp->tf_rsi = mcp->mc_rsi;
2351 tp->tf_rbp = mcp->mc_rbp;
2352 tp->tf_rbx = mcp->mc_rbx;
2353 tp->tf_rdx = mcp->mc_rdx;
2354 tp->tf_rcx = mcp->mc_rcx;
2355 tp->tf_rax = mcp->mc_rax;
2356 tp->tf_rip = mcp->mc_rip;
2357 tp->tf_rflags = rflags;
2358 tp->tf_rsp = mcp->mc_rsp;
2359 tp->tf_ss = mcp->mc_ss;
2360 tp->tf_flags = mcp->mc_flags;
2361 if (tp->tf_flags & TF_HASSEGS) {
2362 tp->tf_ds = mcp->mc_ds;
2363 tp->tf_es = mcp->mc_es;
2364 tp->tf_fs = mcp->mc_fs;
2365 tp->tf_gs = mcp->mc_gs;
2367 set_pcb_flags(pcb, PCB_FULL_IRET);
2368 if (mcp->mc_flags & _MC_HASBASES) {
2369 pcb->pcb_fsbase = mcp->mc_fsbase;
2370 pcb->pcb_gsbase = mcp->mc_gsbase;
2376 get_fpcontext(struct thread *td, mcontext_t *mcp, char *xfpusave,
2377 size_t xfpusave_len)
2379 size_t max_len, len;
2381 mcp->mc_ownedfp = fpugetregs(td);
2382 bcopy(get_pcb_user_save_td(td), &mcp->mc_fpstate[0],
2383 sizeof(mcp->mc_fpstate));
2384 mcp->mc_fpformat = fpuformat();
2385 if (!use_xsave || xfpusave_len == 0)
2387 max_len = cpu_max_ext_state_size - sizeof(struct savefpu);
2389 if (len > max_len) {
2391 bzero(xfpusave + max_len, len - max_len);
2393 mcp->mc_flags |= _MC_HASFPXSTATE;
2394 mcp->mc_xfpustate_len = len;
2395 bcopy(get_pcb_user_save_td(td) + 1, xfpusave, len);
2399 set_fpcontext(struct thread *td, mcontext_t *mcp, char *xfpustate,
2400 size_t xfpustate_len)
2404 if (mcp->mc_fpformat == _MC_FPFMT_NODEV)
2406 else if (mcp->mc_fpformat != _MC_FPFMT_XMM)
2408 else if (mcp->mc_ownedfp == _MC_FPOWNED_NONE) {
2409 /* We don't care what state is left in the FPU or PCB. */
2412 } else if (mcp->mc_ownedfp == _MC_FPOWNED_FPU ||
2413 mcp->mc_ownedfp == _MC_FPOWNED_PCB) {
2414 error = fpusetregs(td, (struct savefpu *)&mcp->mc_fpstate,
2415 xfpustate, xfpustate_len);
2422 fpstate_drop(struct thread *td)
2425 KASSERT(PCB_USER_FPU(td->td_pcb), ("fpstate_drop: kernel-owned fpu"));
2427 if (PCPU_GET(fpcurthread) == td)
2430 * XXX force a full drop of the fpu. The above only drops it if we
2433 * XXX I don't much like fpugetuserregs()'s semantics of doing a full
2434 * drop. Dropping only to the pcb matches fnsave's behaviour.
2435 * We only need to drop to !PCB_INITDONE in sendsig(). But
2436 * sendsig() is the only caller of fpugetuserregs()... perhaps we just
2437 * have too many layers.
2439 clear_pcb_flags(curthread->td_pcb,
2440 PCB_FPUINITDONE | PCB_USERFPUINITDONE);
2445 fill_dbregs(struct thread *td, struct dbreg *dbregs)
2450 dbregs->dr[0] = rdr0();
2451 dbregs->dr[1] = rdr1();
2452 dbregs->dr[2] = rdr2();
2453 dbregs->dr[3] = rdr3();
2454 dbregs->dr[6] = rdr6();
2455 dbregs->dr[7] = rdr7();
2458 dbregs->dr[0] = pcb->pcb_dr0;
2459 dbregs->dr[1] = pcb->pcb_dr1;
2460 dbregs->dr[2] = pcb->pcb_dr2;
2461 dbregs->dr[3] = pcb->pcb_dr3;
2462 dbregs->dr[6] = pcb->pcb_dr6;
2463 dbregs->dr[7] = pcb->pcb_dr7;
2479 set_dbregs(struct thread *td, struct dbreg *dbregs)
2485 load_dr0(dbregs->dr[0]);
2486 load_dr1(dbregs->dr[1]);
2487 load_dr2(dbregs->dr[2]);
2488 load_dr3(dbregs->dr[3]);
2489 load_dr6(dbregs->dr[6]);
2490 load_dr7(dbregs->dr[7]);
2493 * Don't let an illegal value for dr7 get set. Specifically,
2494 * check for undefined settings. Setting these bit patterns
2495 * result in undefined behaviour and can lead to an unexpected
2496 * TRCTRAP or a general protection fault right here.
2497 * Upper bits of dr6 and dr7 must not be set
2499 for (i = 0; i < 4; i++) {
2500 if (DBREG_DR7_ACCESS(dbregs->dr[7], i) == 0x02)
2502 if (td->td_frame->tf_cs == _ucode32sel &&
2503 DBREG_DR7_LEN(dbregs->dr[7], i) == DBREG_DR7_LEN_8)
2506 if ((dbregs->dr[6] & 0xffffffff00000000ul) != 0 ||
2507 (dbregs->dr[7] & 0xffffffff00000000ul) != 0)
2513 * Don't let a process set a breakpoint that is not within the
2514 * process's address space. If a process could do this, it
2515 * could halt the system by setting a breakpoint in the kernel
2516 * (if ddb was enabled). Thus, we need to check to make sure
2517 * that no breakpoints are being enabled for addresses outside
2518 * process's address space.
2520 * XXX - what about when the watched area of the user's
2521 * address space is written into from within the kernel
2522 * ... wouldn't that still cause a breakpoint to be generated
2523 * from within kernel mode?
2526 if (DBREG_DR7_ENABLED(dbregs->dr[7], 0)) {
2527 /* dr0 is enabled */
2528 if (dbregs->dr[0] >= VM_MAXUSER_ADDRESS)
2531 if (DBREG_DR7_ENABLED(dbregs->dr[7], 1)) {
2532 /* dr1 is enabled */
2533 if (dbregs->dr[1] >= VM_MAXUSER_ADDRESS)
2536 if (DBREG_DR7_ENABLED(dbregs->dr[7], 2)) {
2537 /* dr2 is enabled */
2538 if (dbregs->dr[2] >= VM_MAXUSER_ADDRESS)
2541 if (DBREG_DR7_ENABLED(dbregs->dr[7], 3)) {
2542 /* dr3 is enabled */
2543 if (dbregs->dr[3] >= VM_MAXUSER_ADDRESS)
2547 pcb->pcb_dr0 = dbregs->dr[0];
2548 pcb->pcb_dr1 = dbregs->dr[1];
2549 pcb->pcb_dr2 = dbregs->dr[2];
2550 pcb->pcb_dr3 = dbregs->dr[3];
2551 pcb->pcb_dr6 = dbregs->dr[6];
2552 pcb->pcb_dr7 = dbregs->dr[7];
2554 set_pcb_flags(pcb, PCB_DBREGS);
2564 load_dr7(0); /* Turn off the control bits first */
2573 * Return > 0 if a hardware breakpoint has been hit, and the
2574 * breakpoint was in user space. Return 0, otherwise.
2577 user_dbreg_trap(register_t dr6)
2580 u_int64_t bp; /* breakpoint bits extracted from dr6 */
2581 int nbp; /* number of breakpoints that triggered */
2582 caddr_t addr[4]; /* breakpoint addresses */
2585 bp = dr6 & DBREG_DR6_BMASK;
2588 * None of the breakpoint bits are set meaning this
2589 * trap was not caused by any of the debug registers
2595 if ((dr7 & 0x000000ff) == 0) {
2597 * all GE and LE bits in the dr7 register are zero,
2598 * thus the trap couldn't have been caused by the
2599 * hardware debug registers
2607 * at least one of the breakpoints were hit, check to see
2608 * which ones and if any of them are user space addresses
2612 addr[nbp++] = (caddr_t)rdr0();
2615 addr[nbp++] = (caddr_t)rdr1();
2618 addr[nbp++] = (caddr_t)rdr2();
2621 addr[nbp++] = (caddr_t)rdr3();
2624 for (i = 0; i < nbp; i++) {
2625 if (addr[i] < (caddr_t)VM_MAXUSER_ADDRESS) {
2627 * addr[i] is in user space
2634 * None of the breakpoints are in user space.
2640 * The pcb_flags is only modified by current thread, or by other threads
2641 * when current thread is stopped. However, current thread may change it
2642 * from the interrupt context in cpu_switch(), or in the trap handler.
2643 * When we read-modify-write pcb_flags from C sources, compiler may generate
2644 * code that is not atomic regarding the interrupt handler. If a trap or
2645 * interrupt happens and any flag is modified from the handler, it can be
2646 * clobbered with the cached value later. Therefore, we implement setting
2647 * and clearing flags with single-instruction functions, which do not race
2648 * with possible modification of the flags from the trap or interrupt context,
2649 * because traps and interrupts are executed only on instruction boundary.
2652 set_pcb_flags_raw(struct pcb *pcb, const u_int flags)
2655 __asm __volatile("orl %1,%0"
2656 : "=m" (pcb->pcb_flags) : "ir" (flags), "m" (pcb->pcb_flags)
2662 * The support for RDFSBASE, WRFSBASE and similar instructions for %gs
2663 * base requires that kernel saves MSR_FSBASE and MSR_{K,}GSBASE into
2664 * pcb if user space modified the bases. We must save on the context
2665 * switch or if the return to usermode happens through the doreti.
2667 * Tracking of both events is performed by the pcb flag PCB_FULL_IRET,
2668 * which have a consequence that the base MSRs must be saved each time
2669 * the PCB_FULL_IRET flag is set. We disable interrupts to sync with
2673 set_pcb_flags_fsgsbase(struct pcb *pcb, const u_int flags)
2677 if (curpcb == pcb &&
2678 (flags & PCB_FULL_IRET) != 0 &&
2679 (pcb->pcb_flags & PCB_FULL_IRET) == 0) {
2681 if ((pcb->pcb_flags & PCB_FULL_IRET) == 0) {
2682 if (rfs() == _ufssel)
2683 pcb->pcb_fsbase = rdfsbase();
2684 if (rgs() == _ugssel)
2685 pcb->pcb_gsbase = rdmsr(MSR_KGSBASE);
2687 set_pcb_flags_raw(pcb, flags);
2690 set_pcb_flags_raw(pcb, flags);
2694 DEFINE_IFUNC(, void, set_pcb_flags, (struct pcb *, const u_int))
2697 return ((cpu_stdext_feature & CPUID_STDEXT_FSGSBASE) != 0 ?
2698 set_pcb_flags_fsgsbase : set_pcb_flags_raw);
2702 clear_pcb_flags(struct pcb *pcb, const u_int flags)
2705 __asm __volatile("andl %1,%0"
2706 : "=m" (pcb->pcb_flags) : "ir" (~flags), "m" (pcb->pcb_flags)
2713 * Provide inb() and outb() as functions. They are normally only available as
2714 * inline functions, thus cannot be called from the debugger.
2717 /* silence compiler warnings */
2718 u_char inb_(u_short);
2719 void outb_(u_short, u_char);
2728 outb_(u_short port, u_char data)
2739 void *memset_std(void *buf, int c, size_t len);
2740 void *memset_erms(void *buf, int c, size_t len);
2741 void *memmove_std(void * _Nonnull dst, const void * _Nonnull src,
2743 void *memmove_erms(void * _Nonnull dst, const void * _Nonnull src,
2745 void *memcpy_std(void * _Nonnull dst, const void * _Nonnull src,
2747 void *memcpy_erms(void * _Nonnull dst, const void * _Nonnull src,
2752 * These fail to build as ifuncs when used with KCSAN.
2755 memset(void *buf, int c, size_t len)
2758 return (memset_std(buf, c, len));
2762 memmove(void * _Nonnull dst, const void * _Nonnull src, size_t len)
2765 return (memmove_std(dst, src, len));
2769 memcpy(void * _Nonnull dst, const void * _Nonnull src, size_t len)
2772 return (memcpy_std(dst, src, len));
2775 DEFINE_IFUNC(, void *, memset, (void *, int, size_t))
2778 return ((cpu_stdext_feature & CPUID_STDEXT_ERMS) != 0 ?
2779 memset_erms : memset_std);
2782 DEFINE_IFUNC(, void *, memmove, (void * _Nonnull, const void * _Nonnull,
2786 return ((cpu_stdext_feature & CPUID_STDEXT_ERMS) != 0 ?
2787 memmove_erms : memmove_std);
2790 DEFINE_IFUNC(, void *, memcpy, (void * _Nonnull, const void * _Nonnull,size_t))
2793 return ((cpu_stdext_feature & CPUID_STDEXT_ERMS) != 0 ?
2794 memcpy_erms : memcpy_std);
2798 void pagezero_std(void *addr);
2799 void pagezero_erms(void *addr);
2800 DEFINE_IFUNC(, void , pagezero, (void *))
2803 return ((cpu_stdext_feature & CPUID_STDEXT_ERMS) != 0 ?
2804 pagezero_erms : pagezero_std);