#ifndef __NTOSKRNL_INCLUDE_INTERNAL_AMD64_KE_H #define __NTOSKRNL_INCLUDE_INTERNAL_AMD64_KE_H #define X86_EFLAGS_TF 0x00000100 /* Trap flag */ #define X86_EFLAGS_IF 0x00000200 /* Interrupt Enable flag */ #define X86_EFLAGS_IOPL 0x00003000 /* I/O Privilege Level bits */ #define X86_EFLAGS_NT 0x00004000 /* Nested Task flag */ #define X86_EFLAGS_RF 0x00010000 /* Resume flag */ #define X86_EFLAGS_VM 0x00020000 /* Virtual Mode */ #define X86_EFLAGS_ID 0x00200000 /* CPUID detection flag */ #define X86_CR0_PE 0x00000001 /* enable Protected Mode */ #define X86_CR0_NE 0x00000020 /* enable native FPU error reporting */ #define X86_CR0_TS 0x00000008 /* enable exception on FPU instruction for task switch */ #define X86_CR0_EM 0x00000004 /* enable FPU emulation (disable FPU) */ #define X86_CR0_MP 0x00000002 /* enable FPU monitoring */ #define X86_CR0_WP 0x00010000 /* enable Write Protect (copy on write) */ #define X86_CR0_PG 0x80000000 /* enable Paging */ #define X86_CR4_PAE 0x00000020 /* enable physical address extensions */ #define X86_CR4_PGE 0x00000080 /* enable global pages */ #define X86_CR4_OSFXSR 0x00000200 /* enable FXSAVE/FXRSTOR instructions */ #define X86_CR4_OSXMMEXCPT 0x00000400 /* enable #XF exception */ /* EDX flags */ #define X86_FEATURE_FPU 0x00000001 /* x87 FPU is present */ #define X86_FEATURE_VME 0x00000002 /* Virtual 8086 Extensions are present */ #define X86_FEATURE_DBG 0x00000004 /* Debugging extensions are present */ #define X86_FEATURE_PSE 0x00000008 /* Page Size Extension is present */ #define X86_FEATURE_TSC 0x00000010 /* time stamp counters are present */ #define X86_FEATURE_PAE 0x00000040 /* physical address extension is present */ #define X86_FEATURE_CX8 0x00000100 /* CMPXCHG8B instruction present */ #define X86_FEATURE_SYSCALL 0x00000800 /* SYSCALL/SYSRET support present */ #define X86_FEATURE_MTTR 0x00001000 /* Memory type range registers are present */ #define X86_FEATURE_PGE 0x00002000 /* Page Global Enable */ #define X86_FEATURE_CMOV 0x00008000 /* "Conditional move" instruction supported */ #define X86_FEATURE_PAT 0x00010000 /* Page Attribute Table is supported */ #define X86_FEATURE_DS 0x00200000 /* Debug Store is present */ #define X86_FEATURE_MMX 0x00800000 /* MMX extension present */ #define X86_FEATURE_FXSR 0x01000000 /* FXSAVE/FXRSTOR instructions present */ #define X86_FEATURE_SSE 0x02000000 /* SSE extension present */ #define X86_FEATURE_SSE2 0x04000000 /* SSE2 extension present */ #define X86_FEATURE_HT 0x10000000 /* Hyper-Threading present */ /* ECX flags */ #define X86_FEATURE_SSE3 0x00000001 /* SSE3 is supported */ #define X86_FEATURE_MONITOR 0x00000008 /* SSE3 Monitor instructions supported */ #define X86_FEATURE_VMX 0x00000020 /* Virtual Machine eXtensions are available */ #define X86_FEATURE_SSSE3 0x00000200 /* Supplemental SSE3 are available */ #define X86_FEATURE_FMA3 0x00001000 /* Fused multiple-add supported */ #define X86_FEATURE_CX16 0x00002000 /* CMPXCHG16B instruction are available */ #define X86_FEATURE_PCID 0x00020000 /* Process Context IDentifiers are supported */ #define X86_FEATURE_SSE41 0x00080000 /* SSE 4.1 is supported */ #define X86_FEATURE_SSE42 0x00100000 /* SSE 4.2 is supported */ #define X86_FEATURE_POPCNT 0x00800000 /* POPCNT instruction is available */ #define X86_FEATURE_XSAVE 0x04000000 /* XSAVE family are available */ /* EDX extended flags */ #define X86_FEATURE_NX 0x00100000 /* NX support present */ #define X86_EXT_FEATURE_SSE3 0x00000001 /* SSE3 extension present */ #define X86_EXT_FEATURE_3DNOW 0x40000000 /* 3DNOW! extension present */ #define FRAME_EDITED 0xFFF8 #define X86_MSR_GSBASE 0xC0000101 #define X86_MSR_KERNEL_GSBASE 0xC0000102 #define X86_MSR_EFER 0xC0000080 #define X86_MSR_STAR 0xC0000081 #define X86_MSR_LSTAR 0xC0000082 #define X86_MSR_CSTAR 0xC0000083 #define X86_MSR_SFMASK 0xC0000084 #define EFER_SCE 0x0001 #define EFER_LME 0x0100 #define EFER_LMA 0x0400 #define EFER_NXE 0x0800 #define EFER_SVME 0x1000 #define EFER_FFXSR 0x4000 #define AMD64_TSS 9 #define APIC_EOI_REGISTER 0xFFFFFFFFFFFE00B0ULL #ifndef __ASM__ #include "intrin_i.h" typedef struct _KIDT_INIT { UCHAR InterruptId; UCHAR Dpl; UCHAR IstIndex; PVOID ServiceRoutine; } KIDT_INIT, *PKIDT_INIT; #include typedef struct _KI_INTERRUPT_DISPATCH_ENTRY { UCHAR _Op_nop; UCHAR _Op_push; UCHAR _Vector; UCHAR _Op_jmp; ULONG RelativeAddress; } KI_INTERRUPT_DISPATCH_ENTRY, *PKI_INTERRUPT_DISPATCH_ENTRY; #include extern ULONG KeI386NpxPresent; extern ULONG KeI386XMMIPresent; extern ULONG KeI386FxsrPresent; extern ULONG KeI386CpuType; extern ULONG KeI386CpuStep; // // INT3 is 1 byte long // #define KD_BREAKPOINT_TYPE UCHAR #define KD_BREAKPOINT_SIZE sizeof(UCHAR) #define KD_BREAKPOINT_VALUE 0xCC // // Macros for getting and setting special purpose registers in portable code // #define KeGetContextPc(Context) \ ((Context)->Rip) #define KeSetContextPc(Context, ProgramCounter) \ ((Context)->Rip = (ProgramCounter)) #define KeGetTrapFramePc(TrapFrame) \ ((TrapFrame)->Rip) #define KiGetLinkedTrapFrame(x) \ (PKTRAP_FRAME)((x)->TrapFrame) #define KeGetContextReturnRegister(Context) \ ((Context)->Rax) #define KeSetContextReturnRegister(Context, ReturnValue) \ ((Context)->Rax = (ReturnValue)) // // Macro to get trap and exception frame from a thread stack // #define KeGetTrapFrame(Thread) \ (PKTRAP_FRAME)((ULONG_PTR)((Thread)->InitialStack) - \ sizeof(KTRAP_FRAME)) // // Macro to get context switches from the PRCB // All architectures but x86 have it in the PRCB's KeContextSwitches // #define KeGetContextSwitches(Prcb) \ (Prcb->KeContextSwitches) // // Macro to get the second level cache size field name which differs between // CISC and RISC architectures, as the former has unified I/D cache // #define KiGetSecondLevelDCacheSize() ((PKIPCR)KeGetPcr())->SecondLevelCacheSize #define KeGetExceptionFrame(Thread) \ (PKEXCEPTION_FRAME)((ULONG_PTR)KeGetTrapFrame(Thread) - \ sizeof(KEXCEPTION_FRAME)) // // Returns the Interrupt State from a Trap Frame. // ON = TRUE, OFF = FALSE // #define KeGetTrapFrameInterruptState(TrapFrame) \ BooleanFlagOn((TrapFrame)->EFlags, EFLAGS_INTERRUPT_MASK) /* Diable interrupts and return whether they were enabled before */ FORCEINLINE BOOLEAN KeDisableInterrupts(VOID) { ULONG_PTR Flags; /* Get EFLAGS and check if the interrupt bit is set */ Flags = __readeflags(); /* Disable interrupts */ _disable(); return (Flags & EFLAGS_INTERRUPT_MASK) ? TRUE : FALSE; } /* Restore previous interrupt state */ FORCEINLINE VOID KeRestoreInterrupts(BOOLEAN WereEnabled) { if (WereEnabled) _enable(); } // // Invalidates the TLB entry for a specified address // FORCEINLINE VOID KeInvalidateTlbEntry(IN PVOID Address) { /* Invalidate the TLB entry for this address */ __invlpg(Address); } FORCEINLINE VOID KeFlushProcessTb(VOID) { /* Flush the TLB by resetting CR3 */ __writecr3(__readcr3()); } FORCEINLINE VOID KeSweepICache(IN PVOID BaseAddress, IN SIZE_T FlushSize) { // // Always sweep the whole cache // UNREFERENCED_PARAMETER(BaseAddress); UNREFERENCED_PARAMETER(FlushSize); __wbinvd(); } FORCEINLINE VOID KiRundownThread(IN PKTHREAD Thread) { #ifndef CONFIG_SMP DbgPrint("KiRundownThread is unimplemented\n"); #else /* Nothing to do */ #endif } /* Registers an interrupt handler with an IDT vector */ FORCEINLINE VOID KeRegisterInterruptHandler(IN ULONG Vector, IN PVOID Handler) { UCHAR Entry; PKIDTENTRY64 Idt; /* Get the entry from the HAL */ Entry = HalVectorToIDTEntry(Vector); /* Now set the data */ Idt = &KeGetPcr()->IdtBase[Entry]; Idt->OffsetLow = (ULONG_PTR)Handler & 0xffff; Idt->OffsetMiddle = ((ULONG_PTR)Handler >> 16) & 0xffff; Idt->OffsetHigh = (ULONG_PTR)Handler >> 32; Idt->Selector = KGDT64_R0_CODE; Idt->IstIndex = 0; Idt->Type = 0x0e; Idt->Dpl = 0; Idt->Present = 1; Idt->Reserved0 = 0; Idt->Reserved1 = 0; } /* Returns the registered interrupt handler for a given IDT vector */ FORCEINLINE PVOID KeQueryInterruptHandler(IN ULONG Vector) { UCHAR Entry; PKIDTENTRY64 Idt; /* Get the entry from the HAL */ Entry = HalVectorToIDTEntry(Vector); /* Get the IDT entry */ Idt = &KeGetPcr()->IdtBase[Entry]; /* Return the address */ return (PVOID)((ULONG64)Idt->OffsetHigh << 32 | (ULONG64)Idt->OffsetMiddle << 16 | (ULONG64)Idt->OffsetLow); } VOID FORCEINLINE KiSendEOI(VOID) { /* Write 0 to the apic EOI register */ *((volatile ULONG*)APIC_EOI_REGISTER) = 0; } VOID FORCEINLINE KiEndInterrupt(IN KIRQL Irql, IN PKTRAP_FRAME TrapFrame) { /* Make sure this is from the clock handler */ ASSERT(TrapFrame->ErrorCode == 0xc10c4); //KeLowerIrql(Irql); } BOOLEAN FORCEINLINE KiUserTrap(IN PKTRAP_FRAME TrapFrame) { /* Anything else but Ring 0 is Ring 3 */ return !!(TrapFrame->SegCs & MODE_MASK); } #define Ki386PerfEnd() struct _KPCR; //VOID KiInitializeTss(IN PKTSS Tss, IN UINT64 Stack); VOID KiSwitchToBootStack(IN ULONG_PTR InitialStack); VOID KiDivideErrorFault(VOID); VOID KiDebugTrapOrFault(VOID); VOID KiNmiInterrupt(VOID); VOID KiBreakpointTrap(VOID); VOID KiOverflowTrap(VOID); VOID KiBoundFault(VOID); VOID KiInvalidOpcodeFault(VOID); VOID KiNpxNotAvailableFault(VOID); VOID KiDoubleFaultAbort(VOID); VOID KiNpxSegmentOverrunAbort(VOID); VOID KiInvalidTssFault(VOID); VOID KiSegmentNotPresentFault(VOID); VOID KiStackFault(VOID); VOID KiGeneralProtectionFault(VOID); VOID KiPageFault(VOID); VOID KiFloatingErrorFault(VOID); VOID KiAlignmentFault(VOID); VOID KiMcheckAbort(VOID); VOID KiXmmException(VOID); VOID KiApcInterrupt(VOID); VOID KiRaiseAssertion(VOID); VOID KiDebugServiceTrap(VOID); VOID KiDpcInterrupt(VOID); VOID KiIpiInterrupt(VOID); VOID KiGdtPrepareForApplicationProcessorInit(ULONG Id); VOID Ki386InitializeLdt(VOID); VOID Ki386SetProcessorFeatures(VOID); VOID KiGetCacheInformation(VOID); VOID KiSetProcessorType(VOID); ULONG KiGetFeatureBits(VOID); VOID KiInitializeCpuFeatures(VOID); ULONG KeAllocateGdtSelector(ULONG Desc[2]); VOID KeFreeGdtSelector(ULONG Entry); VOID NtEarlyInitVdm(VOID); VOID KeApplicationProcessorInitDispatcher(VOID); VOID KeCreateApplicationProcessorIdleThread(ULONG Id); VOID Ke386InitThreadWithContext(PKTHREAD Thread, PKSYSTEM_ROUTINE SystemRoutine, PKSTART_ROUTINE StartRoutine, PVOID StartContext, PCONTEXT Context); #define KeArchInitThreadWithContext(Thread,SystemRoutine,StartRoutine,StartContext,Context) \ Ke386InitThreadWithContext(Thread,SystemRoutine,StartRoutine,StartContext,Context) #ifdef _NTOSKRNL_ /* FIXME: Move flags above to NDK instead of here */ VOID KiThreadStartup(PKSYSTEM_ROUTINE SystemRoutine, PKSTART_ROUTINE StartRoutine, PVOID StartContext, BOOLEAN UserThread, KTRAP_FRAME TrapFrame); #endif #endif /* __ASM__ */ // HACK extern NTKERNELAPI volatile KSYSTEM_TIME KeTickCount; // win64 uses DMA macros, this one is not defined NTHALAPI NTSTATUS NTAPI HalAllocateAdapterChannel( IN PADAPTER_OBJECT AdapterObject, IN PWAIT_CONTEXT_BLOCK Wcb, IN ULONG NumberOfMapRegisters, IN PDRIVER_CONTROL ExecutionRoutine); #endif /* __NTOSKRNL_INCLUDE_INTERNAL_AMD64_KE_H */ /* EOF */