vm_machdep.c revision 85201
136865Sdfr/*-
236865Sdfr * Copyright (c) 1982, 1986 The Regents of the University of California.
336865Sdfr * Copyright (c) 1989, 1990 William Jolitz
436865Sdfr * Copyright (c) 1994 John Dyson
536865Sdfr * All rights reserved.
636865Sdfr *
736865Sdfr * This code is derived from software contributed to Berkeley by
836865Sdfr * the Systems Programming Group of the University of Utah Computer
936865Sdfr * Science Department, and William Jolitz.
1036865Sdfr *
1136865Sdfr * Redistribution and use in source and binary forms, with or without
1236865Sdfr * modification, are permitted provided that the following conditions
1336865Sdfr * are met:
1436865Sdfr * 1. Redistributions of source code must retain the above copyright
1536865Sdfr *    notice, this list of conditions and the following disclaimer.
1636865Sdfr * 2. Redistributions in binary form must reproduce the above copyright
1736865Sdfr *    notice, this list of conditions and the following disclaimer in the
1836865Sdfr *    documentation and/or other materials provided with the distribution.
1936865Sdfr * 3. All advertising materials mentioning features or use of this software
2036865Sdfr *    must display the following acknowledgement:
2136865Sdfr *	This product includes software developed by the University of
2236865Sdfr *	California, Berkeley and its contributors.
2336865Sdfr * 4. Neither the name of the University nor the names of its contributors
2436865Sdfr *    may be used to endorse or promote products derived from this software
2536865Sdfr *    without specific prior written permission.
2636865Sdfr *
2736865Sdfr * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
2836865Sdfr * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
2936865Sdfr * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
3036865Sdfr * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
3136865Sdfr * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
3236865Sdfr * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
3336865Sdfr * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
3436865Sdfr * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
3536865Sdfr * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
3636865Sdfr * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
3736865Sdfr * SUCH DAMAGE.
3836865Sdfr *
3936865Sdfr *	from: @(#)vm_machdep.c	7.3 (Berkeley) 5/13/91
4036865Sdfr *	Utah $Hdr: vm_machdep.c 1.16.1.1 89/06/23$
4150477Speter * $FreeBSD: head/sys/powerpc/aim/vm_machdep.c 85201 2001-10-19 22:45:46Z mp $
4236865Sdfr */
4336865Sdfr/*
4436865Sdfr * Copyright (c) 1994, 1995, 1996 Carnegie-Mellon University.
4536865Sdfr * All rights reserved.
4636865Sdfr *
4736865Sdfr * Author: Chris G. Demetriou
4836865Sdfr *
4936865Sdfr * Permission to use, copy, modify and distribute this software and
5036865Sdfr * its documentation is hereby granted, provided that both the copyright
5136865Sdfr * notice and this permission notice appear in all copies of the
5236865Sdfr * software, derivative works or modified versions, and any portions
5336865Sdfr * thereof, and that both notices appear in supporting documentation.
5436865Sdfr *
5536865Sdfr * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS"
5636865Sdfr * CONDITION.  CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND
5736865Sdfr * FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
5836865Sdfr *
5936865Sdfr * Carnegie Mellon requests users of this software to return to
6036865Sdfr *
6136865Sdfr *  Software Distribution Coordinator  or  Software.Distribution@CS.CMU.EDU
6236865Sdfr *  School of Computer Science
6336865Sdfr *  Carnegie Mellon University
6436865Sdfr *  Pittsburgh PA 15213-3890
6536865Sdfr *
6636865Sdfr * any improvements or extensions that they make and grant Carnegie the
6736865Sdfr * rights to redistribute these changes.
6836865Sdfr */
6936865Sdfr
7036865Sdfr#include <sys/param.h>
7136865Sdfr#include <sys/systm.h>
7236865Sdfr#include <sys/proc.h>
7336865Sdfr#include <sys/malloc.h>
7460041Sphk#include <sys/bio.h>
7536865Sdfr#include <sys/buf.h>
7685201Smp#include <sys/ktr.h>
7785201Smp#include <sys/lock.h>
7867365Sjhb#include <sys/mutex.h>
7936865Sdfr#include <sys/vnode.h>
8036865Sdfr#include <sys/vmmeter.h>
8136865Sdfr#include <sys/kernel.h>
8236865Sdfr#include <sys/sysctl.h>
8354207Speter#include <sys/unistd.h>
8436865Sdfr
8536865Sdfr#include <machine/clock.h>
8636865Sdfr#include <machine/cpu.h>
8741499Sdfr#include <machine/fpu.h>
8836865Sdfr#include <machine/md_var.h>
8936865Sdfr
9078342Sbenno#include <dev/ofw/openfirm.h>
9178342Sbenno
9236865Sdfr#include <vm/vm.h>
9336865Sdfr#include <vm/vm_param.h>
9436865Sdfr#include <vm/vm_kern.h>
9536865Sdfr#include <vm/vm_page.h>
9636865Sdfr#include <vm/vm_map.h>
9736865Sdfr#include <vm/vm_extern.h>
9836865Sdfr
9936865Sdfr#include <sys/user.h>
10036865Sdfr
10136865Sdfr/*
10236865Sdfr * quick version of vm_fault
10336865Sdfr */
10451474Sdillonint
10536865Sdfrvm_fault_quick(v, prot)
10636865Sdfr	caddr_t v;
10736865Sdfr	int prot;
10836865Sdfr{
10951474Sdillon	int r;
11036865Sdfr	if (prot & VM_PROT_WRITE)
11151474Sdillon		r = subyte(v, fubyte(v));
11236865Sdfr	else
11351474Sdillon		r = fubyte(v);
11451474Sdillon	return(r);
11536865Sdfr}
11636865Sdfr
11736865Sdfr/*
11836865Sdfr * Finish a fork operation, with process p2 nearly set up.
11936865Sdfr * Copy and update the pcb, set up the stack so that the child
12036865Sdfr * ready to run and return to user mode.
12136865Sdfr */
12236865Sdfrvoid
12384977Sbennocpu_fork(struct thread *td1, struct proc *p2, int flags)
12436865Sdfr{
12584977Sbenno	struct	proc *p1;
12684977Sbenno	struct	thread *td2;
12784977Sbenno	struct	trapframe *tf;
12884977Sbenno	struct	callframe *cf;
12984977Sbenno	struct	switchframe *sf;
13084977Sbenno	caddr_t	stktop1, stktop2;
13184977Sbenno	struct	pcb *pcb2;
13284977Sbenno
13384977Sbenno	CTR3(KTR_PROC, "cpu_fork: called td1=%08x p2=%08x flags=%x", (u_int)td1, (u_int)p2, flags);
13484977Sbenno
13584977Sbenno	if ((flags & RFPROC) == 0)
13684977Sbenno		return;
13784977Sbenno
13884977Sbenno	p1 = td1->td_proc;
13984977Sbenno	td2 = &p2->p_thread;
14084977Sbenno
14184977Sbenno	/* Point the pcb to the top of the stack */
14284977Sbenno	pcb2 = (struct pcb *)(td2->td_kstack + KSTACK_PAGES * PAGE_SIZE) - 1;
14384977Sbenno	td2->td_pcb = pcb2;
14484977Sbenno
14584977Sbenno	/* Copy p1's pcb. */
14684977Sbenno	bcopy(td1->td_pcb, pcb2, sizeof(*pcb2));
14784977Sbenno
14884977Sbenno	/*
14984977Sbenno	 * Create a new fresh stack for the new process.
15084977Sbenno	 * Copy the trap frame for the return to user mode as if from a
15184977Sbenno	 * syscall.  This copies most of the user mode register values.
15284977Sbenno	 */
15384977Sbenno	td2->td_frame = (struct trapframe *)td2->td_pcb - 1;
15484977Sbenno	bcopy(td1->td_frame, td2->td_frame, sizeof(struct trapframe));
15584977Sbenno
15684977Sbenno	stktop2 = (caddr_t)td2->td_frame;
15784977Sbenno
15884977Sbenno	cf = (struct callframe *)stktop2;
15984977Sbenno	cf->lr = (int)fork_trampoline;
16084977Sbenno
16184977Sbenno	stktop2 -= 16;
16284977Sbenno	cf = (struct callframe *)stktop2;
16384977Sbenno	cf->r31 = (register_t)fork_return;
16484977Sbenno	cf->r30 = (register_t)td2;
16584977Sbenno
16684977Sbenno	stktop2 -= roundup(sizeof *sf, 16);
16784977Sbenno	sf = (struct switchframe *)stktop2;
16884977Sbenno	bzero((void *)sf, sizeof *sf);
16984977Sbenno	sf->sp = (int)cf;
17084977Sbenno	sf->user_sr = kernel_pmap->pm_sr[USER_SR];
17184977Sbenno
17284977Sbenno	pcb2->pcb_sp = (int)stktop2;
17384977Sbenno	pcb2->pcb_spl = 0;
17436865Sdfr}
17536865Sdfr
17636865Sdfr/*
17736865Sdfr * Intercept the return address from a freshly forked process that has NOT
17836865Sdfr * been scheduled yet.
17936865Sdfr *
18036865Sdfr * This is needed to make kernel threads stay in kernel mode.
18136865Sdfr */
18236865Sdfrvoid
18383682Smpcpu_set_fork_handler(td, func, arg)
18483682Smp	struct thread *td;
18548391Speter	void (*func) __P((void *));
18648391Speter	void *arg;
18736865Sdfr{
18884977Sbenno	struct	switchframe *sf;
18984977Sbenno	struct	callframe *cf;
19084977Sbenno
19184977Sbenno	CTR3(KTR_PROC, "cpu_set_fork_handler: called with td=%08x func=%08x arg=%08x",
19284977Sbenno	    (u_int)td, (u_int)func, (u_int)arg);
19384977Sbenno
19484977Sbenno	sf = (struct switchframe *)td->td_pcb->pcb_sp;
19584977Sbenno	cf = (struct callframe *)sf->sp;
19684977Sbenno
19784977Sbenno	cf->r31 = (register_t)func;
19884977Sbenno	cf->r30 = (register_t)arg;
19936865Sdfr}
20036865Sdfr
20136865Sdfr/*
20236865Sdfr * cpu_exit is called as the last action during exit.
20336865Sdfr * We release the address space of the process, block interrupts,
20436865Sdfr * and call switch_exit.  switch_exit switches to proc0's PCB and stack,
20536865Sdfr * then jumps into the middle of cpu_switch, as if it were switching
20636865Sdfr * from proc0.
20736865Sdfr */
20836865Sdfrvoid
20983682Smpcpu_exit(td)
21083682Smp	register struct thread *td;
21136865Sdfr{
21236865Sdfr}
21336865Sdfr
21436865Sdfrvoid
21583682Smpcpu_wait(td)
21683682Smp	struct proc *td;
21736865Sdfr{
21883276Speter}
21936865Sdfr
22083276Speter/* Temporary helper */
22183276Spetervoid
22283276Spetercpu_throw(void)
22383276Speter{
22483276Speter
22583276Speter	cpu_switch();
22683276Speter	panic("cpu_throw() didn't");
22736865Sdfr}
22836865Sdfr
22936865Sdfr/*
23036865Sdfr * Dump the machine specific header information at the start of a core dump.
23136865Sdfr */
23236865Sdfrint
23383682Smpcpu_coredump(td, vp, cred)
23483682Smp	struct thread *td;
23536865Sdfr	struct vnode *vp;
23636865Sdfr	struct ucred *cred;
23736865Sdfr{
23883682Smp	struct proc *p = td->td_proc;
23936865Sdfr
24083682Smp	return (vn_rdwr(UIO_WRITE, vp, (caddr_t)p->p_uarea, ctob(UAREA_PAGES),
24183223Speter	    (off_t)0, UIO_SYSSPACE, IO_UNIT, cred, (int *)NULL, p));
24236865Sdfr}
24336865Sdfr
24436865Sdfr/*
24536865Sdfr * Map an IO request into kernel virtual address space.
24636865Sdfr *
24736865Sdfr * All requests are (re)mapped into kernel VA space.
24836865Sdfr * Notice that we use b_bufsize for the size of the buffer
24936865Sdfr * to be mapped.  b_bcount might be modified by the driver.
25036865Sdfr */
25136865Sdfrvoid
25236865Sdfrvmapbuf(bp)
25336865Sdfr	register struct buf *bp;
25436865Sdfr{
25536865Sdfr	register caddr_t addr, v, kva;
25636865Sdfr	vm_offset_t pa;
25736865Sdfr
25879224Sdillon	GIANT_REQUIRED;
25979224Sdillon
26036865Sdfr	if ((bp->b_flags & B_PHYS) == 0)
26136865Sdfr		panic("vmapbuf");
26236865Sdfr
26336865Sdfr	for (v = bp->b_saveaddr, addr = (caddr_t)trunc_page(bp->b_data);
26436865Sdfr	    addr < bp->b_data + bp->b_bufsize;
26536865Sdfr	    addr += PAGE_SIZE, v += PAGE_SIZE) {
26636865Sdfr		/*
26736865Sdfr		 * Do the vm_fault if needed; do the copy-on-write thing
26836865Sdfr		 * when reading stuff off device into memory.
26936865Sdfr		 */
27084381Smjacob		vm_fault_quick((addr >= bp->b_data) ? addr : bp->b_data,
27158345Sphk			(bp->b_iocmd == BIO_READ)?(VM_PROT_READ|VM_PROT_WRITE):VM_PROT_READ);
27236865Sdfr		pa = trunc_page(pmap_kextract((vm_offset_t) addr));
27336865Sdfr		if (pa == 0)
27436865Sdfr			panic("vmapbuf: page not present");
27536865Sdfr		vm_page_hold(PHYS_TO_VM_PAGE(pa));
27636865Sdfr		pmap_kenter((vm_offset_t) v, pa);
27736865Sdfr	}
27836865Sdfr
27936865Sdfr	kva = bp->b_saveaddr;
28036865Sdfr	bp->b_saveaddr = bp->b_data;
28136865Sdfr	bp->b_data = kva + (((vm_offset_t) bp->b_data) & PAGE_MASK);
28236865Sdfr}
28336865Sdfr
28436865Sdfr/*
28536865Sdfr * Free the io map PTEs associated with this IO operation.
28636865Sdfr * We also invalidate the TLB entries and restore the original b_addr.
28736865Sdfr */
28836865Sdfrvoid
28936865Sdfrvunmapbuf(bp)
29036865Sdfr	register struct buf *bp;
29136865Sdfr{
29236865Sdfr	register caddr_t addr;
29336865Sdfr	vm_offset_t pa;
29436865Sdfr
29579224Sdillon	GIANT_REQUIRED;
29679224Sdillon
29736865Sdfr	if ((bp->b_flags & B_PHYS) == 0)
29836865Sdfr		panic("vunmapbuf");
29936865Sdfr
30036865Sdfr	for (addr = (caddr_t)trunc_page(bp->b_data);
30136865Sdfr	    addr < bp->b_data + bp->b_bufsize;
30236865Sdfr	    addr += PAGE_SIZE) {
30336865Sdfr		pa = trunc_page(pmap_kextract((vm_offset_t) addr));
30436865Sdfr		pmap_kremove((vm_offset_t) addr);
30536865Sdfr		vm_page_unhold(PHYS_TO_VM_PAGE(pa));
30636865Sdfr	}
30736865Sdfr
30836865Sdfr	bp->b_data = bp->b_saveaddr;
30936865Sdfr}
31036865Sdfr
31136865Sdfr/*
31265557Sjasone * Reset back to firmware.
31336865Sdfr */
31436865Sdfrvoid
31536865Sdfrcpu_reset()
31636865Sdfr{
31778342Sbenno	OF_exit();
31836865Sdfr}
31936865Sdfr
32036865Sdfrint
32143209Sjuliangrow_stack(p, sp)
32243209Sjulian	struct proc *p;
32343209Sjulian	size_t sp;
32443209Sjulian{
32543209Sjulian	int rv;
32636865Sdfr
32743209Sjulian	rv = vm_map_growstack (p, sp);
32843209Sjulian	if (rv != KERN_SUCCESS)
32943209Sjulian		return (0);
33043209Sjulian
33143209Sjulian	return (1);
33243209Sjulian}
33343209Sjulian
33436865Sdfr/*
33536865Sdfr * Software interrupt handler for queued VM system processing.
33636865Sdfr */
33736865Sdfrvoid
33867551Sjhbswi_vm(void *dummy)
33936865Sdfr{
34078342Sbenno#if 0 /* XXX: Don't have busdma stuff yet */
34136865Sdfr	if (busdma_swi_pending != 0)
34236865Sdfr		busdma_swi();
34378342Sbenno#endif
34436865Sdfr}
34536865Sdfr
34636865Sdfr/*
34736865Sdfr * Tell whether this address is in some physical memory region.
34836865Sdfr * Currently used by the kernel coredump code in order to avoid
34936865Sdfr * dumping the ``ISA memory hole'' which could cause indefinite hangs,
35036865Sdfr * or other unpredictable behaviour.
35136865Sdfr */
35236865Sdfr
35336865Sdfr
35436865Sdfrint
35536865Sdfris_physical_memory(addr)
35636865Sdfr	vm_offset_t addr;
35736865Sdfr{
35836865Sdfr	/*
35936865Sdfr	 * stuff other tests for known memory-mapped devices (PCI?)
36036865Sdfr	 * here
36136865Sdfr	 */
36236865Sdfr
36336865Sdfr	return 1;
36436865Sdfr}
365