vm_machdep.c revision 84977
136865Sdfr/*- 236865Sdfr * Copyright (c) 1982, 1986 The Regents of the University of California. 336865Sdfr * Copyright (c) 1989, 1990 William Jolitz 436865Sdfr * Copyright (c) 1994 John Dyson 536865Sdfr * All rights reserved. 636865Sdfr * 736865Sdfr * This code is derived from software contributed to Berkeley by 836865Sdfr * the Systems Programming Group of the University of Utah Computer 936865Sdfr * Science Department, and William Jolitz. 1036865Sdfr * 1136865Sdfr * Redistribution and use in source and binary forms, with or without 1236865Sdfr * modification, are permitted provided that the following conditions 1336865Sdfr * are met: 1436865Sdfr * 1. Redistributions of source code must retain the above copyright 1536865Sdfr * notice, this list of conditions and the following disclaimer. 1636865Sdfr * 2. Redistributions in binary form must reproduce the above copyright 1736865Sdfr * notice, this list of conditions and the following disclaimer in the 1836865Sdfr * documentation and/or other materials provided with the distribution. 1936865Sdfr * 3. All advertising materials mentioning features or use of this software 2036865Sdfr * must display the following acknowledgement: 2136865Sdfr * This product includes software developed by the University of 2236865Sdfr * California, Berkeley and its contributors. 2336865Sdfr * 4. Neither the name of the University nor the names of its contributors 2436865Sdfr * may be used to endorse or promote products derived from this software 2536865Sdfr * without specific prior written permission. 2636865Sdfr * 2736865Sdfr * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 2836865Sdfr * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 2936865Sdfr * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 3036865Sdfr * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 3136865Sdfr * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 3236865Sdfr * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 3336865Sdfr * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 3436865Sdfr * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 3536865Sdfr * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 3636865Sdfr * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 3736865Sdfr * SUCH DAMAGE. 3836865Sdfr * 3936865Sdfr * from: @(#)vm_machdep.c 7.3 (Berkeley) 5/13/91 4036865Sdfr * Utah $Hdr: vm_machdep.c 1.16.1.1 89/06/23$ 4150477Speter * $FreeBSD: head/sys/powerpc/aim/vm_machdep.c 84977 2001-10-15 12:24:43Z benno $ 4236865Sdfr */ 4336865Sdfr/* 4436865Sdfr * Copyright (c) 1994, 1995, 1996 Carnegie-Mellon University. 4536865Sdfr * All rights reserved. 4636865Sdfr * 4736865Sdfr * Author: Chris G. Demetriou 4836865Sdfr * 4936865Sdfr * Permission to use, copy, modify and distribute this software and 5036865Sdfr * its documentation is hereby granted, provided that both the copyright 5136865Sdfr * notice and this permission notice appear in all copies of the 5236865Sdfr * software, derivative works or modified versions, and any portions 5336865Sdfr * thereof, and that both notices appear in supporting documentation. 5436865Sdfr * 5536865Sdfr * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS" 5636865Sdfr * CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND 5736865Sdfr * FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE. 5836865Sdfr * 5936865Sdfr * Carnegie Mellon requests users of this software to return to 6036865Sdfr * 6136865Sdfr * Software Distribution Coordinator or Software.Distribution@CS.CMU.EDU 6236865Sdfr * School of Computer Science 6336865Sdfr * Carnegie Mellon University 6436865Sdfr * Pittsburgh PA 15213-3890 6536865Sdfr * 6636865Sdfr * any improvements or extensions that they make and grant Carnegie the 6736865Sdfr * rights to redistribute these changes. 6836865Sdfr */ 6936865Sdfr 7036865Sdfr#include <sys/param.h> 7136865Sdfr#include <sys/systm.h> 7236865Sdfr#include <sys/proc.h> 7336865Sdfr#include <sys/malloc.h> 7460041Sphk#include <sys/bio.h> 7536865Sdfr#include <sys/buf.h> 7667365Sjhb#include <sys/mutex.h> 7736865Sdfr#include <sys/vnode.h> 7836865Sdfr#include <sys/vmmeter.h> 7936865Sdfr#include <sys/kernel.h> 8036865Sdfr#include <sys/sysctl.h> 8154207Speter#include <sys/unistd.h> 8236865Sdfr 8336865Sdfr#include <machine/clock.h> 8436865Sdfr#include <machine/cpu.h> 8541499Sdfr#include <machine/fpu.h> 8636865Sdfr#include <machine/md_var.h> 8736865Sdfr 8878342Sbenno#include <dev/ofw/openfirm.h> 8978342Sbenno 9036865Sdfr#include <vm/vm.h> 9136865Sdfr#include <vm/vm_param.h> 9236865Sdfr#include <sys/lock.h> 9336865Sdfr#include <vm/vm_kern.h> 9436865Sdfr#include <vm/vm_page.h> 9536865Sdfr#include <vm/vm_map.h> 9636865Sdfr#include <vm/vm_extern.h> 9736865Sdfr 9836865Sdfr#include <sys/user.h> 9936865Sdfr 10036865Sdfr/* 10136865Sdfr * quick version of vm_fault 10236865Sdfr */ 10351474Sdillonint 10436865Sdfrvm_fault_quick(v, prot) 10536865Sdfr caddr_t v; 10636865Sdfr int prot; 10736865Sdfr{ 10851474Sdillon int r; 10936865Sdfr if (prot & VM_PROT_WRITE) 11051474Sdillon r = subyte(v, fubyte(v)); 11136865Sdfr else 11251474Sdillon r = fubyte(v); 11351474Sdillon return(r); 11436865Sdfr} 11536865Sdfr 11636865Sdfr/* 11736865Sdfr * Finish a fork operation, with process p2 nearly set up. 11836865Sdfr * Copy and update the pcb, set up the stack so that the child 11936865Sdfr * ready to run and return to user mode. 12036865Sdfr */ 12136865Sdfrvoid 12284977Sbennocpu_fork(struct thread *td1, struct proc *p2, int flags) 12336865Sdfr{ 12484977Sbenno struct proc *p1; 12584977Sbenno struct thread *td2; 12684977Sbenno struct trapframe *tf; 12784977Sbenno struct callframe *cf; 12884977Sbenno struct switchframe *sf; 12984977Sbenno caddr_t stktop1, stktop2; 13084977Sbenno struct pcb *pcb2; 13184977Sbenno 13284977Sbenno CTR3(KTR_PROC, "cpu_fork: called td1=%08x p2=%08x flags=%x", (u_int)td1, (u_int)p2, flags); 13384977Sbenno 13484977Sbenno if ((flags & RFPROC) == 0) 13584977Sbenno return; 13684977Sbenno 13784977Sbenno p1 = td1->td_proc; 13884977Sbenno td2 = &p2->p_thread; 13984977Sbenno 14084977Sbenno /* Point the pcb to the top of the stack */ 14184977Sbenno pcb2 = (struct pcb *)(td2->td_kstack + KSTACK_PAGES * PAGE_SIZE) - 1; 14284977Sbenno td2->td_pcb = pcb2; 14384977Sbenno 14484977Sbenno /* Copy p1's pcb. */ 14584977Sbenno bcopy(td1->td_pcb, pcb2, sizeof(*pcb2)); 14684977Sbenno 14784977Sbenno /* 14884977Sbenno * Create a new fresh stack for the new process. 14984977Sbenno * Copy the trap frame for the return to user mode as if from a 15084977Sbenno * syscall. This copies most of the user mode register values. 15184977Sbenno */ 15284977Sbenno td2->td_frame = (struct trapframe *)td2->td_pcb - 1; 15384977Sbenno bcopy(td1->td_frame, td2->td_frame, sizeof(struct trapframe)); 15484977Sbenno 15584977Sbenno stktop2 = (caddr_t)td2->td_frame; 15684977Sbenno 15784977Sbenno cf = (struct callframe *)stktop2; 15884977Sbenno cf->lr = (int)fork_trampoline; 15984977Sbenno 16084977Sbenno stktop2 -= 16; 16184977Sbenno cf = (struct callframe *)stktop2; 16284977Sbenno cf->r31 = (register_t)fork_return; 16384977Sbenno cf->r30 = (register_t)td2; 16484977Sbenno 16584977Sbenno stktop2 -= roundup(sizeof *sf, 16); 16684977Sbenno sf = (struct switchframe *)stktop2; 16784977Sbenno bzero((void *)sf, sizeof *sf); 16884977Sbenno sf->sp = (int)cf; 16984977Sbenno sf->user_sr = kernel_pmap->pm_sr[USER_SR]; 17084977Sbenno 17184977Sbenno pcb2->pcb_sp = (int)stktop2; 17284977Sbenno pcb2->pcb_spl = 0; 17336865Sdfr} 17436865Sdfr 17536865Sdfr/* 17636865Sdfr * Intercept the return address from a freshly forked process that has NOT 17736865Sdfr * been scheduled yet. 17836865Sdfr * 17936865Sdfr * This is needed to make kernel threads stay in kernel mode. 18036865Sdfr */ 18136865Sdfrvoid 18283682Smpcpu_set_fork_handler(td, func, arg) 18383682Smp struct thread *td; 18448391Speter void (*func) __P((void *)); 18548391Speter void *arg; 18636865Sdfr{ 18784977Sbenno struct switchframe *sf; 18884977Sbenno struct callframe *cf; 18984977Sbenno 19084977Sbenno CTR3(KTR_PROC, "cpu_set_fork_handler: called with td=%08x func=%08x arg=%08x", 19184977Sbenno (u_int)td, (u_int)func, (u_int)arg); 19284977Sbenno 19384977Sbenno sf = (struct switchframe *)td->td_pcb->pcb_sp; 19484977Sbenno cf = (struct callframe *)sf->sp; 19584977Sbenno 19684977Sbenno cf->r31 = (register_t)func; 19784977Sbenno cf->r30 = (register_t)arg; 19836865Sdfr} 19936865Sdfr 20036865Sdfr/* 20136865Sdfr * cpu_exit is called as the last action during exit. 20236865Sdfr * We release the address space of the process, block interrupts, 20336865Sdfr * and call switch_exit. switch_exit switches to proc0's PCB and stack, 20436865Sdfr * then jumps into the middle of cpu_switch, as if it were switching 20536865Sdfr * from proc0. 20636865Sdfr */ 20736865Sdfrvoid 20883682Smpcpu_exit(td) 20983682Smp register struct thread *td; 21036865Sdfr{ 21136865Sdfr} 21236865Sdfr 21336865Sdfrvoid 21483682Smpcpu_wait(td) 21583682Smp struct proc *td; 21636865Sdfr{ 21783276Speter} 21836865Sdfr 21983276Speter/* Temporary helper */ 22083276Spetervoid 22183276Spetercpu_throw(void) 22283276Speter{ 22383276Speter 22483276Speter cpu_switch(); 22583276Speter panic("cpu_throw() didn't"); 22636865Sdfr} 22736865Sdfr 22836865Sdfr/* 22936865Sdfr * Dump the machine specific header information at the start of a core dump. 23036865Sdfr */ 23136865Sdfrint 23283682Smpcpu_coredump(td, vp, cred) 23383682Smp struct thread *td; 23436865Sdfr struct vnode *vp; 23536865Sdfr struct ucred *cred; 23636865Sdfr{ 23783682Smp struct proc *p = td->td_proc; 23836865Sdfr 23983682Smp return (vn_rdwr(UIO_WRITE, vp, (caddr_t)p->p_uarea, ctob(UAREA_PAGES), 24083223Speter (off_t)0, UIO_SYSSPACE, IO_UNIT, cred, (int *)NULL, p)); 24136865Sdfr} 24236865Sdfr 24336865Sdfr/* 24436865Sdfr * Map an IO request into kernel virtual address space. 24536865Sdfr * 24636865Sdfr * All requests are (re)mapped into kernel VA space. 24736865Sdfr * Notice that we use b_bufsize for the size of the buffer 24836865Sdfr * to be mapped. b_bcount might be modified by the driver. 24936865Sdfr */ 25036865Sdfrvoid 25136865Sdfrvmapbuf(bp) 25236865Sdfr register struct buf *bp; 25336865Sdfr{ 25436865Sdfr register caddr_t addr, v, kva; 25536865Sdfr vm_offset_t pa; 25636865Sdfr 25779224Sdillon GIANT_REQUIRED; 25879224Sdillon 25936865Sdfr if ((bp->b_flags & B_PHYS) == 0) 26036865Sdfr panic("vmapbuf"); 26136865Sdfr 26236865Sdfr for (v = bp->b_saveaddr, addr = (caddr_t)trunc_page(bp->b_data); 26336865Sdfr addr < bp->b_data + bp->b_bufsize; 26436865Sdfr addr += PAGE_SIZE, v += PAGE_SIZE) { 26536865Sdfr /* 26636865Sdfr * Do the vm_fault if needed; do the copy-on-write thing 26736865Sdfr * when reading stuff off device into memory. 26836865Sdfr */ 26984381Smjacob vm_fault_quick((addr >= bp->b_data) ? addr : bp->b_data, 27058345Sphk (bp->b_iocmd == BIO_READ)?(VM_PROT_READ|VM_PROT_WRITE):VM_PROT_READ); 27136865Sdfr pa = trunc_page(pmap_kextract((vm_offset_t) addr)); 27236865Sdfr if (pa == 0) 27336865Sdfr panic("vmapbuf: page not present"); 27436865Sdfr vm_page_hold(PHYS_TO_VM_PAGE(pa)); 27536865Sdfr pmap_kenter((vm_offset_t) v, pa); 27636865Sdfr } 27736865Sdfr 27836865Sdfr kva = bp->b_saveaddr; 27936865Sdfr bp->b_saveaddr = bp->b_data; 28036865Sdfr bp->b_data = kva + (((vm_offset_t) bp->b_data) & PAGE_MASK); 28136865Sdfr} 28236865Sdfr 28336865Sdfr/* 28436865Sdfr * Free the io map PTEs associated with this IO operation. 28536865Sdfr * We also invalidate the TLB entries and restore the original b_addr. 28636865Sdfr */ 28736865Sdfrvoid 28836865Sdfrvunmapbuf(bp) 28936865Sdfr register struct buf *bp; 29036865Sdfr{ 29136865Sdfr register caddr_t addr; 29236865Sdfr vm_offset_t pa; 29336865Sdfr 29479224Sdillon GIANT_REQUIRED; 29579224Sdillon 29636865Sdfr if ((bp->b_flags & B_PHYS) == 0) 29736865Sdfr panic("vunmapbuf"); 29836865Sdfr 29936865Sdfr for (addr = (caddr_t)trunc_page(bp->b_data); 30036865Sdfr addr < bp->b_data + bp->b_bufsize; 30136865Sdfr addr += PAGE_SIZE) { 30236865Sdfr pa = trunc_page(pmap_kextract((vm_offset_t) addr)); 30336865Sdfr pmap_kremove((vm_offset_t) addr); 30436865Sdfr vm_page_unhold(PHYS_TO_VM_PAGE(pa)); 30536865Sdfr } 30636865Sdfr 30736865Sdfr bp->b_data = bp->b_saveaddr; 30836865Sdfr} 30936865Sdfr 31036865Sdfr/* 31165557Sjasone * Reset back to firmware. 31236865Sdfr */ 31336865Sdfrvoid 31436865Sdfrcpu_reset() 31536865Sdfr{ 31678342Sbenno OF_exit(); 31736865Sdfr} 31836865Sdfr 31936865Sdfrint 32043209Sjuliangrow_stack(p, sp) 32143209Sjulian struct proc *p; 32243209Sjulian size_t sp; 32343209Sjulian{ 32443209Sjulian int rv; 32536865Sdfr 32643209Sjulian rv = vm_map_growstack (p, sp); 32743209Sjulian if (rv != KERN_SUCCESS) 32843209Sjulian return (0); 32943209Sjulian 33043209Sjulian return (1); 33143209Sjulian} 33243209Sjulian 33336865Sdfr/* 33436865Sdfr * Software interrupt handler for queued VM system processing. 33536865Sdfr */ 33636865Sdfrvoid 33767551Sjhbswi_vm(void *dummy) 33836865Sdfr{ 33978342Sbenno#if 0 /* XXX: Don't have busdma stuff yet */ 34036865Sdfr if (busdma_swi_pending != 0) 34136865Sdfr busdma_swi(); 34278342Sbenno#endif 34336865Sdfr} 34436865Sdfr 34536865Sdfr/* 34636865Sdfr * Tell whether this address is in some physical memory region. 34736865Sdfr * Currently used by the kernel coredump code in order to avoid 34836865Sdfr * dumping the ``ISA memory hole'' which could cause indefinite hangs, 34936865Sdfr * or other unpredictable behaviour. 35036865Sdfr */ 35136865Sdfr 35236865Sdfr 35336865Sdfrint 35436865Sdfris_physical_memory(addr) 35536865Sdfr vm_offset_t addr; 35636865Sdfr{ 35736865Sdfr /* 35836865Sdfr * stuff other tests for known memory-mapped devices (PCI?) 35936865Sdfr * here 36036865Sdfr */ 36136865Sdfr 36236865Sdfr return 1; 36336865Sdfr} 364