15b81b6b3SRodney W. Grimes /*- 2df57947fSPedro F. Giffuni * SPDX-License-Identifier: BSD-4-Clause 3df57947fSPedro F. Giffuni * 45b81b6b3SRodney W. Grimes * Copyright (c) 1982, 1986 The Regents of the University of California. 55b81b6b3SRodney W. Grimes * Copyright (c) 1989, 1990 William Jolitz 61561d038SDavid Greenman * Copyright (c) 1994 John Dyson 75b81b6b3SRodney W. Grimes * All rights reserved. 85b81b6b3SRodney W. Grimes * 95b81b6b3SRodney W. Grimes * This code is derived from software contributed to Berkeley by 105b81b6b3SRodney W. Grimes * the Systems Programming Group of the University of Utah Computer 115b81b6b3SRodney W. Grimes * Science Department, and William Jolitz. 125b81b6b3SRodney W. Grimes * 135b81b6b3SRodney W. Grimes * Redistribution and use in source and binary forms, with or without 145b81b6b3SRodney W. Grimes * modification, are permitted provided that the following conditions 155b81b6b3SRodney W. Grimes * are met: 165b81b6b3SRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 175b81b6b3SRodney W. Grimes * notice, this list of conditions and the following disclaimer. 185b81b6b3SRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 195b81b6b3SRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 205b81b6b3SRodney W. Grimes * documentation and/or other materials provided with the distribution. 215b81b6b3SRodney W. Grimes * 3. All advertising materials mentioning features or use of this software 225b81b6b3SRodney W. Grimes * must display the following acknowledgement: 235b81b6b3SRodney W. Grimes * This product includes software developed by the University of 245b81b6b3SRodney W. Grimes * California, Berkeley and its contributors. 255b81b6b3SRodney W. Grimes * 4. Neither the name of the University nor the names of its contributors 265b81b6b3SRodney W. Grimes * may be used to endorse or promote products derived from this software 275b81b6b3SRodney W. Grimes * without specific prior written permission. 285b81b6b3SRodney W. Grimes * 295b81b6b3SRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 305b81b6b3SRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 315b81b6b3SRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 325b81b6b3SRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 335b81b6b3SRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 345b81b6b3SRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 355b81b6b3SRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 365b81b6b3SRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 375b81b6b3SRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 385b81b6b3SRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 395b81b6b3SRodney W. Grimes * SUCH DAMAGE. 405b81b6b3SRodney W. Grimes * 41960173b9SRodney W. Grimes * from: @(#)vm_machdep.c 7.3 (Berkeley) 5/13/91 425b81b6b3SRodney W. Grimes * Utah $Hdr: vm_machdep.c 1.16.1.1 89/06/23$ 435b81b6b3SRodney W. Grimes */ 445b81b6b3SRodney W. Grimes 459676a785SDavid E. O'Brien #include <sys/cdefs.h> 469676a785SDavid E. O'Brien __FBSDID("$FreeBSD$"); 479676a785SDavid E. O'Brien 486d7d4649SBruce Evans #include "opt_isa.h" 49558226eaSPeter Wemm #include "opt_npx.h" 500d74cc48SPeter Wemm #include "opt_reset.h" 51883bd55aSPoul-Henning Kamp #include "opt_cpu.h" 528890984dSGarrett Wollman 5326f9a767SRodney W. Grimes #include <sys/param.h> 5426f9a767SRodney W. Grimes #include <sys/systm.h> 559626b608SPoul-Henning Kamp #include <sys/bio.h> 5626f9a767SRodney W. Grimes #include <sys/buf.h> 5766095752SJohn Dyson #include <sys/kernel.h> 580384fff8SJason Evans #include <sys/ktr.h> 596d7d4649SBruce Evans #include <sys/lock.h> 606d7d4649SBruce Evans #include <sys/malloc.h> 61411d10a6SAlan Cox #include <sys/mbuf.h> 6213b0500fSJohn Baldwin #include <sys/mutex.h> 636d7d4649SBruce Evans #include <sys/proc.h> 64a7b89044SKonstantin Belousov #include <sys/sysent.h> 65e45db9b8SAlan Cox #include <sys/sf_buf.h> 666d7d4649SBruce Evans #include <sys/smp.h> 674c0e268aSStephan Uphoff #include <sys/sched.h> 6866095752SJohn Dyson #include <sys/sysctl.h> 6991c28bfdSLuoqi Chen #include <sys/unistd.h> 706d7d4649SBruce Evans #include <sys/vnode.h> 716d7d4649SBruce Evans #include <sys/vmmeter.h> 725b81b6b3SRodney W. Grimes 73a2a1c95cSPeter Wemm #include <machine/cpu.h> 7441ee9f1cSPoul-Henning Kamp #include <machine/cputypes.h> 751f8745a9SPeter Wemm #include <machine/md_var.h> 7691c28bfdSLuoqi Chen #include <machine/pcb.h> 7791c28bfdSLuoqi Chen #include <machine/pcb_ext.h> 785c0db7c7SAlan Cox #include <machine/smp.h> 7991c28bfdSLuoqi Chen #include <machine/vm86.h> 805b81b6b3SRodney W. Grimes 8126f9a767SRodney W. Grimes #include <vm/vm.h> 826d7d4649SBruce Evans #include <vm/vm_extern.h> 8326f9a767SRodney W. Grimes #include <vm/vm_kern.h> 8424a1cce3SDavid Greenman #include <vm/vm_page.h> 85efeaf95aSDavid Greenman #include <vm/vm_map.h> 866d7d4649SBruce Evans #include <vm/vm_param.h> 875b81b6b3SRodney W. Grimes 8848cae112SKonstantin Belousov _Static_assert(__OFFSETOF_MONITORBUF == offsetof(struct pcpu, pc_monitorbuf), 8940025d42SAndrey V. Elsukov "__OFFSETOF_MONITORBUF does not correspond with offset of pc_monitorbuf."); 90e93d0cbeSKonstantin Belousov 91824fc460SJohn Baldwin union savefpu * 92824fc460SJohn Baldwin get_pcb_user_save_td(struct thread *td) 93824fc460SJohn Baldwin { 94824fc460SJohn Baldwin vm_offset_t p; 952f1e7069STor Egge 96824fc460SJohn Baldwin p = td->td_kstack + td->td_kstack_pages * PAGE_SIZE - 973ef966c4SKonstantin Belousov roundup2(cpu_max_ext_state_size, XSAVE_AREA_ALIGN); 983ef966c4SKonstantin Belousov KASSERT((p % XSAVE_AREA_ALIGN) == 0, ("Unaligned pcb_user_save area")); 99824fc460SJohn Baldwin return ((union savefpu *)p); 100824fc460SJohn Baldwin } 101824fc460SJohn Baldwin 102824fc460SJohn Baldwin union savefpu * 103824fc460SJohn Baldwin get_pcb_user_save_pcb(struct pcb *pcb) 104824fc460SJohn Baldwin { 105824fc460SJohn Baldwin vm_offset_t p; 106824fc460SJohn Baldwin 107824fc460SJohn Baldwin p = (vm_offset_t)(pcb + 1); 108824fc460SJohn Baldwin return ((union savefpu *)p); 109824fc460SJohn Baldwin } 110824fc460SJohn Baldwin 111824fc460SJohn Baldwin struct pcb * 112824fc460SJohn Baldwin get_pcb_td(struct thread *td) 113824fc460SJohn Baldwin { 114824fc460SJohn Baldwin vm_offset_t p; 115824fc460SJohn Baldwin 116824fc460SJohn Baldwin p = td->td_kstack + td->td_kstack_pages * PAGE_SIZE - 1173ef966c4SKonstantin Belousov roundup2(cpu_max_ext_state_size, XSAVE_AREA_ALIGN) - 1183ef966c4SKonstantin Belousov sizeof(struct pcb); 119824fc460SJohn Baldwin return ((struct pcb *)p); 120824fc460SJohn Baldwin } 121824fc460SJohn Baldwin 122824fc460SJohn Baldwin void * 123824fc460SJohn Baldwin alloc_fpusave(int flags) 124824fc460SJohn Baldwin { 125824fc460SJohn Baldwin void *res; 126824fc460SJohn Baldwin struct savefpu_ymm *sf; 127824fc460SJohn Baldwin 128824fc460SJohn Baldwin res = malloc(cpu_max_ext_state_size, M_DEVBUF, flags); 129824fc460SJohn Baldwin if (use_xsave) { 130824fc460SJohn Baldwin sf = (struct savefpu_ymm *)res; 131824fc460SJohn Baldwin bzero(&sf->sv_xstate.sx_hd, sizeof(sf->sv_xstate.sx_hd)); 132824fc460SJohn Baldwin sf->sv_xstate.sx_hd.xstate_bv = xsave_mask; 133824fc460SJohn Baldwin } 134824fc460SJohn Baldwin return (res); 135824fc460SJohn Baldwin } 136a7883464SJohn Baldwin 137a7883464SJohn Baldwin /* 138a7883464SJohn Baldwin * Common code shared between cpu_fork() and cpu_copy_thread() for 139a7883464SJohn Baldwin * initializing a thread. 140a7883464SJohn Baldwin */ 141a7883464SJohn Baldwin static void 142a7883464SJohn Baldwin copy_thread(struct thread *td1, struct thread *td2) 143a7883464SJohn Baldwin { 144a7883464SJohn Baldwin struct pcb *pcb2; 145a7883464SJohn Baldwin 146a7883464SJohn Baldwin pcb2 = td2->td_pcb; 147a7883464SJohn Baldwin 148a7883464SJohn Baldwin /* Ensure that td1's pcb is up to date for user threads. */ 149a7883464SJohn Baldwin if ((td2->td_pflags & TDP_KTHREAD) == 0) { 150a7883464SJohn Baldwin MPASS(td1 == curthread); 151a7883464SJohn Baldwin td1->td_pcb->pcb_gs = rgs(); 152a7883464SJohn Baldwin critical_enter(); 153a7883464SJohn Baldwin if (PCPU_GET(fpcurthread) == td1) 154a7883464SJohn Baldwin npxsave(td1->td_pcb->pcb_save); 155a7883464SJohn Baldwin critical_exit(); 156a7883464SJohn Baldwin } 157a7883464SJohn Baldwin 158a7883464SJohn Baldwin /* Copy td1's pcb */ 159a7883464SJohn Baldwin bcopy(td1->td_pcb, pcb2, sizeof(*pcb2)); 160a7883464SJohn Baldwin 161a7883464SJohn Baldwin /* Properly initialize pcb_save */ 162a7883464SJohn Baldwin pcb2->pcb_save = get_pcb_user_save_pcb(pcb2); 163a7883464SJohn Baldwin 164a7883464SJohn Baldwin /* Kernel threads start with clean NPX and segment bases. */ 165a7883464SJohn Baldwin if ((td2->td_pflags & TDP_KTHREAD) != 0) { 166a7883464SJohn Baldwin pcb2->pcb_gs = _udatasel; 167a7883464SJohn Baldwin set_fsbase(td2, 0); 168a7883464SJohn Baldwin set_gsbase(td2, 0); 169a7883464SJohn Baldwin pcb2->pcb_flags &= ~(PCB_NPXINITDONE | PCB_NPXUSERINITDONE | 170a7883464SJohn Baldwin PCB_KERNNPX | PCB_KERNNPX_THR); 171a7883464SJohn Baldwin } else { 172a7883464SJohn Baldwin MPASS((pcb2->pcb_flags & (PCB_KERNNPX | PCB_KERNNPX_THR)) == 0); 173a7883464SJohn Baldwin bcopy(get_pcb_user_save_td(td1), get_pcb_user_save_pcb(pcb2), 174a7883464SJohn Baldwin cpu_max_ext_state_size); 175a7883464SJohn Baldwin } 176a7883464SJohn Baldwin 177a7883464SJohn Baldwin /* 178a7883464SJohn Baldwin * Set registers for trampoline to user mode. Leave space for the 179a7883464SJohn Baldwin * return address on stack. These are the kernel mode register values. 180a7883464SJohn Baldwin */ 181a7883464SJohn Baldwin pcb2->pcb_edi = 0; 182a7883464SJohn Baldwin pcb2->pcb_esi = (int)fork_return; /* trampoline arg */ 183a7883464SJohn Baldwin pcb2->pcb_ebp = 0; 184a7883464SJohn Baldwin pcb2->pcb_esp = (int)td2->td_frame - sizeof(void *); /* trampoline arg */ 185a7883464SJohn Baldwin pcb2->pcb_ebx = (int)td2; /* trampoline arg */ 186a7883464SJohn Baldwin pcb2->pcb_eip = (int)fork_trampoline + setidt_disp; 187a7883464SJohn Baldwin /* 188a7883464SJohn Baldwin * If we didn't copy the pcb, we'd need to do the following registers: 189a7883464SJohn Baldwin * pcb2->pcb_cr3: cloned above. 190a7883464SJohn Baldwin * pcb2->pcb_dr*: cloned above. 191a7883464SJohn Baldwin * pcb2->pcb_savefpu: cloned above. 192a7883464SJohn Baldwin * pcb2->pcb_flags: cloned above. 193a7883464SJohn Baldwin * pcb2->pcb_onfault: cloned above (always NULL here?). 194a7883464SJohn Baldwin * pcb2->pcb_gs: cloned above. 195a7883464SJohn Baldwin * pcb2->pcb_ext: cleared below. 196a7883464SJohn Baldwin */ 197a7883464SJohn Baldwin pcb2->pcb_ext = NULL; 198a7883464SJohn Baldwin 199a7883464SJohn Baldwin /* Setup to release spin count in fork_exit(). */ 200a7883464SJohn Baldwin td2->td_md.md_spinlock_count = 1; 201a7883464SJohn Baldwin td2->td_md.md_saved_flags = PSL_KERNEL | PSL_I; 202a7883464SJohn Baldwin } 203a7883464SJohn Baldwin 204a4f7a4c9SDavid Greenman /* 2055b81b6b3SRodney W. Grimes * Finish a fork operation, with process p2 nearly set up. 206a2a1c95cSPeter Wemm * Copy and update the pcb, set up the stack so that the child 207a2a1c95cSPeter Wemm * ready to run and return to user mode. 2085b81b6b3SRodney W. Grimes */ 209a2a1c95cSPeter Wemm void 2109c16356cSKonstantin Belousov cpu_fork(struct thread *td1, struct proc *p2, struct thread *td2, int flags) 2115b81b6b3SRodney W. Grimes { 2123e85b721SEd Maste struct proc *p1; 21391c28bfdSLuoqi Chen struct pcb *pcb2; 21424db0459SJohn Baldwin struct mdproc *mdp2; 21591c28bfdSLuoqi Chen 216b40ce416SJulian Elischer p1 = td1->td_proc; 21791c28bfdSLuoqi Chen if ((flags & RFPROC) == 0) { 21891c28bfdSLuoqi Chen if ((flags & RFMEM) == 0) { 21991c28bfdSLuoqi Chen /* unshare user LDT */ 22045449f84SJulian Elischer struct mdproc *mdp1 = &p1->p_md; 2219719da13SKonstantin Belousov struct proc_ldt *pldt, *pldt1; 222bc2e774aSJohn Baldwin 2230ad5e7f3SJeff Roberson mtx_lock_spin(&dt_lock); 2249719da13SKonstantin Belousov if ((pldt1 = mdp1->md_ldt) != NULL && 2259719da13SKonstantin Belousov pldt1->ldt_refcnt > 1) { 2269719da13SKonstantin Belousov pldt = user_ldt_alloc(mdp1, pldt1->ldt_len); 22724db0459SJohn Baldwin if (pldt == NULL) 2281acf256dSJohn Baldwin panic("could not copy LDT"); 22924db0459SJohn Baldwin mdp1->md_ldt = pldt; 23024db0459SJohn Baldwin set_user_ldt(mdp1); 2319719da13SKonstantin Belousov user_ldt_deref(pldt1); 23202b0a160SAttilio Rao } else 2330ad5e7f3SJeff Roberson mtx_unlock_spin(&dt_lock); 23491c28bfdSLuoqi Chen } 23591c28bfdSLuoqi Chen return; 23691c28bfdSLuoqi Chen } 2375b81b6b3SRodney W. Grimes 238b40ce416SJulian Elischer /* Point the pcb to the top of the stack */ 239824fc460SJohn Baldwin pcb2 = get_pcb_td(td2); 240b40ce416SJulian Elischer td2->td_pcb = pcb2; 241b40ce416SJulian Elischer 242a7883464SJohn Baldwin copy_thread(td1, td2); 2436cf9a08dSKonstantin Belousov 2448223717cSKonstantin Belousov /* Reset debug registers in the new process */ 245*290b0d12SKonstantin Belousov x86_clear_dbregs(pcb2); 2468223717cSKonstantin Belousov 24724db0459SJohn Baldwin /* Point mdproc and then copy over td1's contents */ 24845449f84SJulian Elischer mdp2 = &p2->p_md; 24945449f84SJulian Elischer bcopy(&p1->p_md, mdp2, sizeof(*mdp2)); 25024db0459SJohn Baldwin 251a2a1c95cSPeter Wemm /* 2521f8745a9SPeter Wemm * Copy the trap frame for the return to user mode as if from a 253a4b8c657SBruce Evans * syscall. This copies most of the user mode register values. 254d86c1f0dSKonstantin Belousov * The -VM86_STACK_SPACE (-16) is so we can expand the trapframe 255d86c1f0dSKonstantin Belousov * if we go to vm86. 256a2a1c95cSPeter Wemm */ 257d86c1f0dSKonstantin Belousov td2->td_frame = (struct trapframe *)((caddr_t)td2->td_pcb - 258d86c1f0dSKonstantin Belousov VM86_STACK_SPACE) - 1; 259b40ce416SJulian Elischer bcopy(td1->td_frame, td2->td_frame, sizeof(struct trapframe)); 260a2a1c95cSPeter Wemm 261b40ce416SJulian Elischer td2->td_frame->tf_eax = 0; /* Child returns zero */ 262b40ce416SJulian Elischer td2->td_frame->tf_eflags &= ~PSL_C; /* success */ 263b40ce416SJulian Elischer td2->td_frame->tf_edx = 1; 2640d54b9d1SJohn Baldwin 265a2a1c95cSPeter Wemm /* 26659838c1aSJohn Baldwin * If the parent process has the trap bit set (i.e. a debugger 26759838c1aSJohn Baldwin * had single stepped the process to the system call), we need 26859838c1aSJohn Baldwin * to clear the trap flag from the new frame. 2695ad5504cSKelly Yancey */ 2705ad5504cSKelly Yancey td2->td_frame->tf_eflags &= ~PSL_T; 2715ad5504cSKelly Yancey 272a7883464SJohn Baldwin /* Set cr3 for the new process. */ 2739a527560SKonstantin Belousov pcb2->pcb_cr3 = pmap_get_cr3(vmspace_pmap(p2->p_vmspace)); 2745b81b6b3SRodney W. Grimes 27548a09cf2SJohn Dyson /* 27648a09cf2SJohn Dyson * XXX don't copy the i/o pages. this should probably be fixed. 27748a09cf2SJohn Dyson */ 278a7883464SJohn Baldwin pcb2->pcb_ext = NULL; 27948a09cf2SJohn Dyson 2808c39a127SStefan Eßer /* Copy the LDT, if necessary. */ 2810ad5e7f3SJeff Roberson mtx_lock_spin(&dt_lock); 282753d1af1SJohn Baldwin if (mdp2->md_ldt != NULL) { 28391c28bfdSLuoqi Chen if (flags & RFMEM) { 28405dfa22fSAttilio Rao mdp2->md_ldt->ldt_refcnt++; 28591c28bfdSLuoqi Chen } else { 28624db0459SJohn Baldwin mdp2->md_ldt = user_ldt_alloc(mdp2, 28724db0459SJohn Baldwin mdp2->md_ldt->ldt_len); 28824db0459SJohn Baldwin if (mdp2->md_ldt == NULL) 289df4d012bSJohn Baldwin panic("could not copy LDT"); 29091c28bfdSLuoqi Chen } 2918c39a127SStefan Eßer } 2920ad5e7f3SJeff Roberson mtx_unlock_spin(&dt_lock); 2938c39a127SStefan Eßer 294a2a1c95cSPeter Wemm /* 295a2a1c95cSPeter Wemm * Now, cpu_switch() can schedule the new process. 296a2a1c95cSPeter Wemm * pcb_esp is loaded pointing to the cpu_switch() stack frame 297a2a1c95cSPeter Wemm * containing the return address when exiting cpu_switch. 29837b087a6SPeter Wemm * This will normally be to fork_trampoline(), which will have 29937b087a6SPeter Wemm * %ebx loaded with the new proc's pointer. fork_trampoline() 300a2a1c95cSPeter Wemm * will set up a stack to call fork_return(p, frame); to complete 301a2a1c95cSPeter Wemm * the return to user-mode. 302a2a1c95cSPeter Wemm */ 303a2a1c95cSPeter Wemm } 304a2a1c95cSPeter Wemm 305a2a1c95cSPeter Wemm /* 306a2a1c95cSPeter Wemm * Intercept the return address from a freshly forked process that has NOT 307a2a1c95cSPeter Wemm * been scheduled yet. 308a2a1c95cSPeter Wemm * 309a2a1c95cSPeter Wemm * This is needed to make kernel threads stay in kernel mode. 310a2a1c95cSPeter Wemm */ 311a2a1c95cSPeter Wemm void 3125c2cf818SKonstantin Belousov cpu_fork_kthread_handler(struct thread *td, void (*func)(void *), void *arg) 313a2a1c95cSPeter Wemm { 314a2a1c95cSPeter Wemm /* 315a2a1c95cSPeter Wemm * Note that the trap frame follows the args, so the function 316a2a1c95cSPeter Wemm * is really called like this: func(arg, frame); 317a2a1c95cSPeter Wemm */ 318b40ce416SJulian Elischer td->td_pcb->pcb_esi = (int) func; /* function */ 319b40ce416SJulian Elischer td->td_pcb->pcb_ebx = (int) arg; /* first arg */ 3205b81b6b3SRodney W. Grimes } 3215b81b6b3SRodney W. Grimes 3227c2b54e8SNate Williams void 323e602ba25SJulian Elischer cpu_exit(struct thread *td) 324e602ba25SJulian Elischer { 325e602ba25SJulian Elischer 326bc2e774aSJohn Baldwin /* 327bc2e774aSJohn Baldwin * If this process has a custom LDT, release it. Reset pc->pcb_gs 328bc2e774aSJohn Baldwin * and %gs before we free it in case they refer to an LDT entry. 329bc2e774aSJohn Baldwin */ 3300ad5e7f3SJeff Roberson mtx_lock_spin(&dt_lock); 331bc2e774aSJohn Baldwin if (td->td_proc->p_md.md_ldt) { 33266250360SDavid Xu td->td_pcb->pcb_gs = _udatasel; 33366250360SDavid Xu load_gs(_udatasel); 334e602ba25SJulian Elischer user_ldt_free(td); 33502b0a160SAttilio Rao } else 3360ad5e7f3SJeff Roberson mtx_unlock_spin(&dt_lock); 337e602ba25SJulian Elischer } 338e602ba25SJulian Elischer 339e602ba25SJulian Elischer void 340e602ba25SJulian Elischer cpu_thread_exit(struct thread *td) 3415b81b6b3SRodney W. Grimes { 3424cc99cf6SJohn Baldwin 3431060a94fSKonstantin Belousov critical_enter(); 344d5e1f581SDavid Xu if (td == PCPU_GET(fpcurthread)) 345d5e1f581SDavid Xu npxdrop(); 3461060a94fSKonstantin Belousov critical_exit(); 347bc2e774aSJohn Baldwin 348bc2e774aSJohn Baldwin /* Disable any hardware breakpoints. */ 349bc2e774aSJohn Baldwin if (td->td_pcb->pcb_flags & PCB_DBREGS) { 350b19d9defSMaxime Henrion reset_dbregs(); 351bc2e774aSJohn Baldwin td->td_pcb->pcb_flags &= ~PCB_DBREGS; 352b19d9defSMaxime Henrion } 353b19d9defSMaxime Henrion } 354b19d9defSMaxime Henrion 355b19d9defSMaxime Henrion void 356696058c3SJulian Elischer cpu_thread_clean(struct thread *td) 357b19d9defSMaxime Henrion { 358b19d9defSMaxime Henrion struct pcb *pcb; 359b19d9defSMaxime Henrion 360b19d9defSMaxime Henrion pcb = td->td_pcb; 361ae3676c4SJohn Baldwin if (pcb->pcb_ext != NULL) { 362e602ba25SJulian Elischer /* if (pcb->pcb_ext->ext_refcount-- == 1) ?? */ 36348a09cf2SJohn Dyson /* 36448a09cf2SJohn Dyson * XXX do we need to move the TSS off the allocated pages 36548a09cf2SJohn Dyson * before freeing them? (not done here) 36648a09cf2SJohn Dyson */ 367d86c1f0dSKonstantin Belousov pmap_trm_free(pcb->pcb_ext, ctob(IOPAGES + 1)); 368ae3676c4SJohn Baldwin pcb->pcb_ext = NULL; 36948a09cf2SJohn Dyson } 3705b81b6b3SRodney W. Grimes } 3715b81b6b3SRodney W. Grimes 372381fe1aaSGarrett Wollman void 373710338e9SMarcel Moolenaar cpu_thread_swapin(struct thread *td) 374710338e9SMarcel Moolenaar { 375710338e9SMarcel Moolenaar } 376710338e9SMarcel Moolenaar 377710338e9SMarcel Moolenaar void 378710338e9SMarcel Moolenaar cpu_thread_swapout(struct thread *td) 379710338e9SMarcel Moolenaar { 380710338e9SMarcel Moolenaar } 381710338e9SMarcel Moolenaar 382710338e9SMarcel Moolenaar void 3830c3967e7SMarcel Moolenaar cpu_thread_alloc(struct thread *td) 384e602ba25SJulian Elischer { 385824fc460SJohn Baldwin struct pcb *pcb; 386824fc460SJohn Baldwin struct xstate_hdr *xhdr; 387e602ba25SJulian Elischer 388824fc460SJohn Baldwin td->td_pcb = pcb = get_pcb_td(td); 389d86c1f0dSKonstantin Belousov td->td_frame = (struct trapframe *)((caddr_t)pcb - 390d86c1f0dSKonstantin Belousov VM86_STACK_SPACE) - 1; 391824fc460SJohn Baldwin pcb->pcb_ext = NULL; 392824fc460SJohn Baldwin pcb->pcb_save = get_pcb_user_save_pcb(pcb); 393824fc460SJohn Baldwin if (use_xsave) { 394824fc460SJohn Baldwin xhdr = (struct xstate_hdr *)(pcb->pcb_save + 1); 395824fc460SJohn Baldwin bzero(xhdr, sizeof(*xhdr)); 396824fc460SJohn Baldwin xhdr->xstate_bv = xsave_mask; 397824fc460SJohn Baldwin } 398e602ba25SJulian Elischer } 399e602ba25SJulian Elischer 4000c3967e7SMarcel Moolenaar void 4010c3967e7SMarcel Moolenaar cpu_thread_free(struct thread *td) 4020c3967e7SMarcel Moolenaar { 4030c3967e7SMarcel Moolenaar 4040c3967e7SMarcel Moolenaar cpu_thread_clean(td); 4050c3967e7SMarcel Moolenaar } 4060c3967e7SMarcel Moolenaar 4076f1fe330SKonstantin Belousov bool 4086f1fe330SKonstantin Belousov cpu_exec_vmspace_reuse(struct proc *p __unused, vm_map_t map __unused) 4096f1fe330SKonstantin Belousov { 4106f1fe330SKonstantin Belousov 4116f1fe330SKonstantin Belousov return (true); 4126f1fe330SKonstantin Belousov } 4136f1fe330SKonstantin Belousov 414fd8d844fSKonstantin Belousov int 415fd8d844fSKonstantin Belousov cpu_procctl(struct thread *td __unused, int idtype __unused, id_t id __unused, 416fd8d844fSKonstantin Belousov int com __unused, void *data __unused) 417fd8d844fSKonstantin Belousov { 418fd8d844fSKonstantin Belousov 419fd8d844fSKonstantin Belousov return (EINVAL); 420fd8d844fSKonstantin Belousov } 421fd8d844fSKonstantin Belousov 422a7b89044SKonstantin Belousov void 423a7b89044SKonstantin Belousov cpu_set_syscall_retval(struct thread *td, int error) 424a7b89044SKonstantin Belousov { 425a7b89044SKonstantin Belousov 426a7b89044SKonstantin Belousov switch (error) { 427a7b89044SKonstantin Belousov case 0: 428a7b89044SKonstantin Belousov td->td_frame->tf_eax = td->td_retval[0]; 429a7b89044SKonstantin Belousov td->td_frame->tf_edx = td->td_retval[1]; 430a7b89044SKonstantin Belousov td->td_frame->tf_eflags &= ~PSL_C; 431a7b89044SKonstantin Belousov break; 432a7b89044SKonstantin Belousov 433a7b89044SKonstantin Belousov case ERESTART: 434a7b89044SKonstantin Belousov /* 435a7b89044SKonstantin Belousov * Reconstruct pc, assuming lcall $X,y is 7 bytes, int 436a7b89044SKonstantin Belousov * 0x80 is 2 bytes. We saved this in tf_err. 437a7b89044SKonstantin Belousov */ 438a7b89044SKonstantin Belousov td->td_frame->tf_eip -= td->td_frame->tf_err; 439a7b89044SKonstantin Belousov break; 440a7b89044SKonstantin Belousov 441a7b89044SKonstantin Belousov case EJUSTRETURN: 442a7b89044SKonstantin Belousov break; 443a7b89044SKonstantin Belousov 444a7b89044SKonstantin Belousov default: 445c26391f4SEdward Tomasz Napierala td->td_frame->tf_eax = error; 446a7b89044SKonstantin Belousov td->td_frame->tf_eflags |= PSL_C; 447a7b89044SKonstantin Belousov break; 448a7b89044SKonstantin Belousov } 449a7b89044SKonstantin Belousov } 450a7b89044SKonstantin Belousov 451e602ba25SJulian Elischer /* 4525c2cf818SKonstantin Belousov * Initialize machine state, mostly pcb and trap frame for a new 4535c2cf818SKonstantin Belousov * thread, about to return to userspace. Put enough state in the new 4545c2cf818SKonstantin Belousov * thread's PCB to get it to go back to the fork_return(), which 4555c2cf818SKonstantin Belousov * finalizes the thread state and handles peculiarities of the first 4565c2cf818SKonstantin Belousov * return to userspace for the new thread. 457e602ba25SJulian Elischer */ 458e602ba25SJulian Elischer void 4595c2cf818SKonstantin Belousov cpu_copy_thread(struct thread *td, struct thread *td0) 460e602ba25SJulian Elischer { 461a7883464SJohn Baldwin copy_thread(td0, td); 462e602ba25SJulian Elischer 463e602ba25SJulian Elischer /* 46440d593d1SJohn Baldwin * Copy user general-purpose registers. 46540d593d1SJohn Baldwin * 46640d593d1SJohn Baldwin * Some of these registers are rewritten by cpu_set_upcall() 4673b57ddb0SJohn Baldwin * and linux_set_upcall(). 468e602ba25SJulian Elischer */ 46911e0f8e1SMarcel Moolenaar bcopy(td0->td_frame, td->td_frame, sizeof(struct trapframe)); 470e602ba25SJulian Elischer 4717ce5e15eSDavid Xu /* If the current thread has the trap bit set (i.e. a debugger had 4727ce5e15eSDavid Xu * single stepped the process to the system call), we need to clear 4737ce5e15eSDavid Xu * the trap flag from the new frame. Otherwise, the new thread will 4747ce5e15eSDavid Xu * receive a (likely unexpected) SIGTRAP when it executes the first 4757ce5e15eSDavid Xu * instruction after returning to userland. 4767ce5e15eSDavid Xu */ 4777ce5e15eSDavid Xu td->td_frame->tf_eflags &= ~PSL_T; 478e602ba25SJulian Elischer } 479e602ba25SJulian Elischer 480e602ba25SJulian Elischer /* 4815c2cf818SKonstantin Belousov * Set that machine state for performing an upcall that starts 4825c2cf818SKonstantin Belousov * the entry function with the given argument. 483e602ba25SJulian Elischer */ 484575525a0SJonathan Mini void 4855c2cf818SKonstantin Belousov cpu_set_upcall(struct thread *td, void (*entry)(void *), void *arg, 48621fc3164SDavid Xu stack_t *stack) 487575525a0SJonathan Mini { 488575525a0SJonathan Mini 489575525a0SJonathan Mini /* 490696058c3SJulian Elischer * Do any extra cleaning that needs to be done. 491696058c3SJulian Elischer * The thread may have optional components 492696058c3SJulian Elischer * that are not present in a fresh thread. 493696058c3SJulian Elischer * This may be a recycled thread so make it look 494696058c3SJulian Elischer * as though it's newly allocated. 495696058c3SJulian Elischer */ 496696058c3SJulian Elischer cpu_thread_clean(td); 497696058c3SJulian Elischer 498696058c3SJulian Elischer /* 4995c2cf818SKonstantin Belousov * Set the trap frame to point at the beginning of the entry 500575525a0SJonathan Mini * function. 501575525a0SJonathan Mini */ 5022396628bSDavid Xu td->td_frame->tf_ebp = 0; 503575525a0SJonathan Mini td->td_frame->tf_esp = 504fc643048SDavid Xu (((int)stack->ss_sp + stack->ss_size - 4) & ~0x0f) - 4; 50521fc3164SDavid Xu td->td_frame->tf_eip = (int)entry; 506575525a0SJonathan Mini 507f236378bSTijl Coosemans /* Return address sentinel value to stop stack unwinding. */ 508f236378bSTijl Coosemans suword((void *)td->td_frame->tf_esp, 0); 509f236378bSTijl Coosemans 5105c2cf818SKonstantin Belousov /* Pass the argument to the entry point. */ 511575525a0SJonathan Mini suword((void *)(td->td_frame->tf_esp + sizeof(void *)), 51221fc3164SDavid Xu (int)arg); 51321fc3164SDavid Xu } 51421fc3164SDavid Xu 515740fd64dSDavid Xu int 51621fc3164SDavid Xu cpu_set_user_tls(struct thread *td, void *tls_base) 51721fc3164SDavid Xu { 51821fc3164SDavid Xu struct segment_descriptor sd; 51921fc3164SDavid Xu uint32_t base; 52021fc3164SDavid Xu 52121fc3164SDavid Xu /* 52221fc3164SDavid Xu * Construct a descriptor and store it in the pcb for 52321fc3164SDavid Xu * the next context switch. Also store it in the gdt 52421fc3164SDavid Xu * so that the load of tf_fs into %fs will activate it 52521fc3164SDavid Xu * at return to userland. 52621fc3164SDavid Xu */ 52721fc3164SDavid Xu base = (uint32_t)tls_base; 52821fc3164SDavid Xu sd.sd_lobase = base & 0xffffff; 52921fc3164SDavid Xu sd.sd_hibase = (base >> 24) & 0xff; 53021fc3164SDavid Xu sd.sd_lolimit = 0xffff; /* 4GB limit, wraps around */ 53121fc3164SDavid Xu sd.sd_hilimit = 0xf; 53221fc3164SDavid Xu sd.sd_type = SDT_MEMRWA; 53321fc3164SDavid Xu sd.sd_dpl = SEL_UPL; 53421fc3164SDavid Xu sd.sd_p = 1; 53521fc3164SDavid Xu sd.sd_xx = 0; 53621fc3164SDavid Xu sd.sd_def32 = 1; 53721fc3164SDavid Xu sd.sd_gran = 1; 53821fc3164SDavid Xu critical_enter(); 53921fc3164SDavid Xu /* set %gs */ 54021fc3164SDavid Xu td->td_pcb->pcb_gsd = sd; 54121fc3164SDavid Xu if (td == curthread) { 54221fc3164SDavid Xu PCPU_GET(fsgs_gdt)[1] = sd; 54321fc3164SDavid Xu load_gs(GSEL(GUGS_SEL, SEL_UPL)); 54421fc3164SDavid Xu } 54521fc3164SDavid Xu critical_exit(); 546740fd64dSDavid Xu return (0); 547e602ba25SJulian Elischer } 548e602ba25SJulian Elischer 5495b81b6b3SRodney W. Grimes /* 5505b81b6b3SRodney W. Grimes * Convert kernel VA to physical address 5515b81b6b3SRodney W. Grimes */ 552227f9a1cSJake Burkholder vm_paddr_t 5537f8cb368SDavid Greenman kvtop(void *addr) 5545b81b6b3SRodney W. Grimes { 555227f9a1cSJake Burkholder vm_paddr_t pa; 5565b81b6b3SRodney W. Grimes 557227f9a1cSJake Burkholder pa = pmap_kextract((vm_offset_t)addr); 558227f9a1cSJake Burkholder if (pa == 0) 5595b81b6b3SRodney W. Grimes panic("kvtop: zero page frame"); 560227f9a1cSJake Burkholder return (pa); 5615b81b6b3SRodney W. Grimes } 5625b81b6b3SRodney W. Grimes 563e0b78e19SJoerg Wunsch /* 564b1e5dcf7SRobert Watson * Get an sf_buf from the freelist. May block if none are available. 565411d10a6SAlan Cox */ 566c8d2ffd6SGleb Smirnoff void 567c8d2ffd6SGleb Smirnoff sf_buf_map(struct sf_buf *sf, int flags) 568411d10a6SAlan Cox { 56920351fafSAlan Cox 5709a527560SKonstantin Belousov pmap_sf_buf_map(sf); 5715c0db7c7SAlan Cox #ifdef SMP 572c8d2ffd6SGleb Smirnoff sf_buf_shootdown(sf, flags); 573c8d2ffd6SGleb Smirnoff #endif 574c8d2ffd6SGleb Smirnoff } 575c8d2ffd6SGleb Smirnoff 576c8d2ffd6SGleb Smirnoff #ifdef SMP 5773b23ffe2SKonstantin Belousov static void 5783b23ffe2SKonstantin Belousov sf_buf_shootdown_curcpu_cb(pmap_t pmap __unused, 5793b23ffe2SKonstantin Belousov vm_offset_t addr1 __unused, vm_offset_t addr2 __unused) 5803b23ffe2SKonstantin Belousov { 5813b23ffe2SKonstantin Belousov } 5823b23ffe2SKonstantin Belousov 583c8d2ffd6SGleb Smirnoff void 584c8d2ffd6SGleb Smirnoff sf_buf_shootdown(struct sf_buf *sf, int flags) 585c8d2ffd6SGleb Smirnoff { 586c8d2ffd6SGleb Smirnoff cpuset_t other_cpus; 587c8d2ffd6SGleb Smirnoff u_int cpuid; 588c8d2ffd6SGleb Smirnoff 589f6f67ea9SStephan Uphoff sched_pin(); 590250a44f6SAttilio Rao cpuid = PCPU_GET(cpuid); 591250a44f6SAttilio Rao if (!CPU_ISSET(cpuid, &sf->cpumask)) { 592250a44f6SAttilio Rao CPU_SET(cpuid, &sf->cpumask); 5935c0db7c7SAlan Cox invlpg(sf->kva); 5944c0e268aSStephan Uphoff } 595f6f67ea9SStephan Uphoff if ((flags & SFB_CPUPRIVATE) == 0) { 596250a44f6SAttilio Rao other_cpus = all_cpus; 597250a44f6SAttilio Rao CPU_CLR(cpuid, &other_cpus); 5989825eadfSRyan Libby CPU_ANDNOT(&other_cpus, &sf->cpumask); 59971a19bdcSAttilio Rao if (!CPU_EMPTY(&other_cpus)) { 60071a19bdcSAttilio Rao CPU_OR(&sf->cpumask, &other_cpus); 6013b23ffe2SKonstantin Belousov smp_masked_invlpg(other_cpus, sf->kva, kernel_pmap, 6023b23ffe2SKonstantin Belousov sf_buf_shootdown_curcpu_cb); 603f6f67ea9SStephan Uphoff } 604f6f67ea9SStephan Uphoff } 605f6f67ea9SStephan Uphoff sched_unpin(); 606411d10a6SAlan Cox } 607c8d2ffd6SGleb Smirnoff #endif 608411d10a6SAlan Cox 609411d10a6SAlan Cox /* 610c8d2ffd6SGleb Smirnoff * MD part of sf_buf_free(). 611411d10a6SAlan Cox */ 612c8d2ffd6SGleb Smirnoff int 613c8d2ffd6SGleb Smirnoff sf_buf_unmap(struct sf_buf *sf) 614411d10a6SAlan Cox { 615ed95805eSJohn Baldwin 616c8d2ffd6SGleb Smirnoff return (0); 6170543fa53SAlan Cox } 618c8d2ffd6SGleb Smirnoff 619c8d2ffd6SGleb Smirnoff static void 620c8d2ffd6SGleb Smirnoff sf_buf_invalidate(struct sf_buf *sf) 621c8d2ffd6SGleb Smirnoff { 622c8d2ffd6SGleb Smirnoff vm_page_t m = sf->m; 623c8d2ffd6SGleb Smirnoff 624c8d2ffd6SGleb Smirnoff /* 625c8d2ffd6SGleb Smirnoff * Use pmap_qenter to update the pte for 626c8d2ffd6SGleb Smirnoff * existing mapping, in particular, the PAT 627c8d2ffd6SGleb Smirnoff * settings are recalculated. 628c8d2ffd6SGleb Smirnoff */ 629c8d2ffd6SGleb Smirnoff pmap_qenter(sf->kva, &m, 1); 630d12c4465SKonstantin Belousov pmap_invalidate_cache_range(sf->kva, sf->kva + PAGE_SIZE); 631c8d2ffd6SGleb Smirnoff } 632c8d2ffd6SGleb Smirnoff 633c8d2ffd6SGleb Smirnoff /* 634c8d2ffd6SGleb Smirnoff * Invalidate the cache lines that may belong to the page, if 635c8d2ffd6SGleb Smirnoff * (possibly old) mapping of the page by sf buffer exists. Returns 636c8d2ffd6SGleb Smirnoff * TRUE when mapping was found and cache invalidated. 637c8d2ffd6SGleb Smirnoff */ 638c8d2ffd6SGleb Smirnoff boolean_t 639c8d2ffd6SGleb Smirnoff sf_buf_invalidate_cache(vm_page_t m) 640c8d2ffd6SGleb Smirnoff { 641c8d2ffd6SGleb Smirnoff 642c8d2ffd6SGleb Smirnoff return (sf_buf_process_page(m, sf_buf_invalidate)); 643411d10a6SAlan Cox } 644411d10a6SAlan Cox 645411d10a6SAlan Cox /* 64657d7d7b3SJustin T. Gibbs * Software interrupt handler for queued VM system processing. 64757d7d7b3SJustin T. Gibbs */ 64857d7d7b3SJustin T. Gibbs void 6498088699fSJohn Baldwin swi_vm(void *dummy) 65057d7d7b3SJustin T. Gibbs { 65157d7d7b3SJustin T. Gibbs if (busdma_swi_pending != 0) 65257d7d7b3SJustin T. Gibbs busdma_swi(); 65357d7d7b3SJustin T. Gibbs } 65457d7d7b3SJustin T. Gibbs 65557d7d7b3SJustin T. Gibbs /* 656cae6f73aSJoerg Wunsch * Tell whether this address is in some physical memory region. 657e0b78e19SJoerg Wunsch * Currently used by the kernel coredump code in order to avoid 658e0b78e19SJoerg Wunsch * dumping the ``ISA memory hole'' which could cause indefinite hangs, 659e0b78e19SJoerg Wunsch * or other unpredictable behaviour. 660e0b78e19SJoerg Wunsch */ 661e0b78e19SJoerg Wunsch 662e0b78e19SJoerg Wunsch int 6632c38d78eSAlan Cox is_physical_memory(vm_paddr_t addr) 664e0b78e19SJoerg Wunsch { 665e0b78e19SJoerg Wunsch 66603927d3cSPeter Wemm #ifdef DEV_ISA 667e0b78e19SJoerg Wunsch /* The ISA ``memory hole''. */ 668e0b78e19SJoerg Wunsch if (addr >= 0xa0000 && addr < 0x100000) 669cae6f73aSJoerg Wunsch return 0; 670e0b78e19SJoerg Wunsch #endif 671e0b78e19SJoerg Wunsch 672e0b78e19SJoerg Wunsch /* 673e0b78e19SJoerg Wunsch * stuff other tests for known memory-mapped devices (PCI?) 674e0b78e19SJoerg Wunsch * here 675e0b78e19SJoerg Wunsch */ 676e0b78e19SJoerg Wunsch 677cae6f73aSJoerg Wunsch return 1; 678e0b78e19SJoerg Wunsch } 679