15b81b6b3SRodney W. Grimes /*- 2df57947fSPedro F. Giffuni * SPDX-License-Identifier: BSD-4-Clause 3df57947fSPedro F. Giffuni * 45b81b6b3SRodney W. Grimes * Copyright (c) 1982, 1986 The Regents of the University of California. 55b81b6b3SRodney W. Grimes * Copyright (c) 1989, 1990 William Jolitz 61561d038SDavid Greenman * Copyright (c) 1994 John Dyson 75b81b6b3SRodney W. Grimes * All rights reserved. 85b81b6b3SRodney W. Grimes * 95b81b6b3SRodney W. Grimes * This code is derived from software contributed to Berkeley by 105b81b6b3SRodney W. Grimes * the Systems Programming Group of the University of Utah Computer 115b81b6b3SRodney W. Grimes * Science Department, and William Jolitz. 125b81b6b3SRodney W. Grimes * 135b81b6b3SRodney W. Grimes * Redistribution and use in source and binary forms, with or without 145b81b6b3SRodney W. Grimes * modification, are permitted provided that the following conditions 155b81b6b3SRodney W. Grimes * are met: 165b81b6b3SRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 175b81b6b3SRodney W. Grimes * notice, this list of conditions and the following disclaimer. 185b81b6b3SRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 195b81b6b3SRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 205b81b6b3SRodney W. Grimes * documentation and/or other materials provided with the distribution. 215b81b6b3SRodney W. Grimes * 3. All advertising materials mentioning features or use of this software 225b81b6b3SRodney W. Grimes * must display the following acknowledgement: 235b81b6b3SRodney W. Grimes * This product includes software developed by the University of 245b81b6b3SRodney W. Grimes * California, Berkeley and its contributors. 255b81b6b3SRodney W. Grimes * 4. Neither the name of the University nor the names of its contributors 265b81b6b3SRodney W. Grimes * may be used to endorse or promote products derived from this software 275b81b6b3SRodney W. Grimes * without specific prior written permission. 285b81b6b3SRodney W. Grimes * 295b81b6b3SRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 305b81b6b3SRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 315b81b6b3SRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 325b81b6b3SRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 335b81b6b3SRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 345b81b6b3SRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 355b81b6b3SRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 365b81b6b3SRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 375b81b6b3SRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 385b81b6b3SRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 395b81b6b3SRodney W. Grimes * SUCH DAMAGE. 405b81b6b3SRodney W. Grimes * 41960173b9SRodney W. Grimes * from: @(#)vm_machdep.c 7.3 (Berkeley) 5/13/91 425b81b6b3SRodney W. Grimes * Utah $Hdr: vm_machdep.c 1.16.1.1 89/06/23$ 435b81b6b3SRodney W. Grimes */ 445b81b6b3SRodney W. Grimes 459676a785SDavid E. O'Brien #include <sys/cdefs.h> 469676a785SDavid E. O'Brien __FBSDID("$FreeBSD$"); 479676a785SDavid E. O'Brien 486d7d4649SBruce Evans #include "opt_isa.h" 49558226eaSPeter Wemm #include "opt_npx.h" 500d74cc48SPeter Wemm #include "opt_reset.h" 51883bd55aSPoul-Henning Kamp #include "opt_cpu.h" 528890984dSGarrett Wollman 5326f9a767SRodney W. Grimes #include <sys/param.h> 5426f9a767SRodney W. Grimes #include <sys/systm.h> 559626b608SPoul-Henning Kamp #include <sys/bio.h> 5626f9a767SRodney W. Grimes #include <sys/buf.h> 5766095752SJohn Dyson #include <sys/kernel.h> 580384fff8SJason Evans #include <sys/ktr.h> 596d7d4649SBruce Evans #include <sys/lock.h> 606d7d4649SBruce Evans #include <sys/malloc.h> 61411d10a6SAlan Cox #include <sys/mbuf.h> 6213b0500fSJohn Baldwin #include <sys/mutex.h> 636d7d4649SBruce Evans #include <sys/proc.h> 64a7b89044SKonstantin Belousov #include <sys/sysent.h> 65e45db9b8SAlan Cox #include <sys/sf_buf.h> 666d7d4649SBruce Evans #include <sys/smp.h> 674c0e268aSStephan Uphoff #include <sys/sched.h> 6866095752SJohn Dyson #include <sys/sysctl.h> 6991c28bfdSLuoqi Chen #include <sys/unistd.h> 706d7d4649SBruce Evans #include <sys/vnode.h> 716d7d4649SBruce Evans #include <sys/vmmeter.h> 725b81b6b3SRodney W. Grimes 73a2a1c95cSPeter Wemm #include <machine/cpu.h> 7441ee9f1cSPoul-Henning Kamp #include <machine/cputypes.h> 751f8745a9SPeter Wemm #include <machine/md_var.h> 7691c28bfdSLuoqi Chen #include <machine/pcb.h> 7791c28bfdSLuoqi Chen #include <machine/pcb_ext.h> 785c0db7c7SAlan Cox #include <machine/smp.h> 7991c28bfdSLuoqi Chen #include <machine/vm86.h> 805b81b6b3SRodney W. Grimes 8126f9a767SRodney W. Grimes #include <vm/vm.h> 826d7d4649SBruce Evans #include <vm/vm_extern.h> 8326f9a767SRodney W. Grimes #include <vm/vm_kern.h> 8424a1cce3SDavid Greenman #include <vm/vm_page.h> 85efeaf95aSDavid Greenman #include <vm/vm_map.h> 866d7d4649SBruce Evans #include <vm/vm_param.h> 875b81b6b3SRodney W. Grimes 8848cae112SKonstantin Belousov _Static_assert(__OFFSETOF_MONITORBUF == offsetof(struct pcpu, pc_monitorbuf), 8940025d42SAndrey V. Elsukov "__OFFSETOF_MONITORBUF does not correspond with offset of pc_monitorbuf."); 90e93d0cbeSKonstantin Belousov 91824fc460SJohn Baldwin union savefpu * 92824fc460SJohn Baldwin get_pcb_user_save_td(struct thread *td) 93824fc460SJohn Baldwin { 94824fc460SJohn Baldwin vm_offset_t p; 952f1e7069STor Egge 96824fc460SJohn Baldwin p = td->td_kstack + td->td_kstack_pages * PAGE_SIZE - 973ef966c4SKonstantin Belousov roundup2(cpu_max_ext_state_size, XSAVE_AREA_ALIGN); 983ef966c4SKonstantin Belousov KASSERT((p % XSAVE_AREA_ALIGN) == 0, ("Unaligned pcb_user_save area")); 99824fc460SJohn Baldwin return ((union savefpu *)p); 100824fc460SJohn Baldwin } 101824fc460SJohn Baldwin 102824fc460SJohn Baldwin union savefpu * 103824fc460SJohn Baldwin get_pcb_user_save_pcb(struct pcb *pcb) 104824fc460SJohn Baldwin { 105824fc460SJohn Baldwin vm_offset_t p; 106824fc460SJohn Baldwin 107824fc460SJohn Baldwin p = (vm_offset_t)(pcb + 1); 108824fc460SJohn Baldwin return ((union savefpu *)p); 109824fc460SJohn Baldwin } 110824fc460SJohn Baldwin 111824fc460SJohn Baldwin struct pcb * 112824fc460SJohn Baldwin get_pcb_td(struct thread *td) 113824fc460SJohn Baldwin { 114824fc460SJohn Baldwin vm_offset_t p; 115824fc460SJohn Baldwin 116824fc460SJohn Baldwin p = td->td_kstack + td->td_kstack_pages * PAGE_SIZE - 1173ef966c4SKonstantin Belousov roundup2(cpu_max_ext_state_size, XSAVE_AREA_ALIGN) - 1183ef966c4SKonstantin Belousov sizeof(struct pcb); 119824fc460SJohn Baldwin return ((struct pcb *)p); 120824fc460SJohn Baldwin } 121824fc460SJohn Baldwin 122824fc460SJohn Baldwin void * 123824fc460SJohn Baldwin alloc_fpusave(int flags) 124824fc460SJohn Baldwin { 125824fc460SJohn Baldwin void *res; 126824fc460SJohn Baldwin struct savefpu_ymm *sf; 127824fc460SJohn Baldwin 128824fc460SJohn Baldwin res = malloc(cpu_max_ext_state_size, M_DEVBUF, flags); 129824fc460SJohn Baldwin if (use_xsave) { 130824fc460SJohn Baldwin sf = (struct savefpu_ymm *)res; 131824fc460SJohn Baldwin bzero(&sf->sv_xstate.sx_hd, sizeof(sf->sv_xstate.sx_hd)); 132824fc460SJohn Baldwin sf->sv_xstate.sx_hd.xstate_bv = xsave_mask; 133824fc460SJohn Baldwin } 134824fc460SJohn Baldwin return (res); 135824fc460SJohn Baldwin } 136a7883464SJohn Baldwin 137a7883464SJohn Baldwin /* 138a7883464SJohn Baldwin * Common code shared between cpu_fork() and cpu_copy_thread() for 139a7883464SJohn Baldwin * initializing a thread. 140a7883464SJohn Baldwin */ 141a7883464SJohn Baldwin static void 142a7883464SJohn Baldwin copy_thread(struct thread *td1, struct thread *td2) 143a7883464SJohn Baldwin { 144a7883464SJohn Baldwin struct pcb *pcb2; 145a7883464SJohn Baldwin 146a7883464SJohn Baldwin pcb2 = td2->td_pcb; 147a7883464SJohn Baldwin 148a7883464SJohn Baldwin /* Ensure that td1's pcb is up to date for user threads. */ 149a7883464SJohn Baldwin if ((td2->td_pflags & TDP_KTHREAD) == 0) { 150a7883464SJohn Baldwin MPASS(td1 == curthread); 151a7883464SJohn Baldwin td1->td_pcb->pcb_gs = rgs(); 152a7883464SJohn Baldwin critical_enter(); 153a7883464SJohn Baldwin if (PCPU_GET(fpcurthread) == td1) 154a7883464SJohn Baldwin npxsave(td1->td_pcb->pcb_save); 155a7883464SJohn Baldwin critical_exit(); 156a7883464SJohn Baldwin } 157a7883464SJohn Baldwin 158a7883464SJohn Baldwin /* Copy td1's pcb */ 159a7883464SJohn Baldwin bcopy(td1->td_pcb, pcb2, sizeof(*pcb2)); 160a7883464SJohn Baldwin 161a7883464SJohn Baldwin /* Properly initialize pcb_save */ 162a7883464SJohn Baldwin pcb2->pcb_save = get_pcb_user_save_pcb(pcb2); 163a7883464SJohn Baldwin 164a7883464SJohn Baldwin /* Kernel threads start with clean NPX and segment bases. */ 165a7883464SJohn Baldwin if ((td2->td_pflags & TDP_KTHREAD) != 0) { 166a7883464SJohn Baldwin pcb2->pcb_gs = _udatasel; 167a7883464SJohn Baldwin set_fsbase(td2, 0); 168a7883464SJohn Baldwin set_gsbase(td2, 0); 169a7883464SJohn Baldwin pcb2->pcb_flags &= ~(PCB_NPXINITDONE | PCB_NPXUSERINITDONE | 170a7883464SJohn Baldwin PCB_KERNNPX | PCB_KERNNPX_THR); 171a7883464SJohn Baldwin } else { 172a7883464SJohn Baldwin MPASS((pcb2->pcb_flags & (PCB_KERNNPX | PCB_KERNNPX_THR)) == 0); 173a7883464SJohn Baldwin bcopy(get_pcb_user_save_td(td1), get_pcb_user_save_pcb(pcb2), 174a7883464SJohn Baldwin cpu_max_ext_state_size); 175a7883464SJohn Baldwin } 176a7883464SJohn Baldwin 177a7883464SJohn Baldwin /* 178a7883464SJohn Baldwin * Set registers for trampoline to user mode. Leave space for the 179a7883464SJohn Baldwin * return address on stack. These are the kernel mode register values. 180a7883464SJohn Baldwin */ 181a7883464SJohn Baldwin pcb2->pcb_edi = 0; 182a7883464SJohn Baldwin pcb2->pcb_esi = (int)fork_return; /* trampoline arg */ 183a7883464SJohn Baldwin pcb2->pcb_ebp = 0; 184a7883464SJohn Baldwin pcb2->pcb_esp = (int)td2->td_frame - sizeof(void *); /* trampoline arg */ 185a7883464SJohn Baldwin pcb2->pcb_ebx = (int)td2; /* trampoline arg */ 186a7883464SJohn Baldwin pcb2->pcb_eip = (int)fork_trampoline + setidt_disp; 187a7883464SJohn Baldwin /* 188a7883464SJohn Baldwin * If we didn't copy the pcb, we'd need to do the following registers: 189a7883464SJohn Baldwin * pcb2->pcb_cr3: cloned above. 190a7883464SJohn Baldwin * pcb2->pcb_dr*: cloned above. 191a7883464SJohn Baldwin * pcb2->pcb_savefpu: cloned above. 192a7883464SJohn Baldwin * pcb2->pcb_flags: cloned above. 193a7883464SJohn Baldwin * pcb2->pcb_onfault: cloned above (always NULL here?). 194a7883464SJohn Baldwin * pcb2->pcb_gs: cloned above. 195a7883464SJohn Baldwin * pcb2->pcb_ext: cleared below. 196a7883464SJohn Baldwin */ 197a7883464SJohn Baldwin pcb2->pcb_ext = NULL; 198a7883464SJohn Baldwin 199a7883464SJohn Baldwin /* Setup to release spin count in fork_exit(). */ 200a7883464SJohn Baldwin td2->td_md.md_spinlock_count = 1; 201a7883464SJohn Baldwin td2->td_md.md_saved_flags = PSL_KERNEL | PSL_I; 202a7883464SJohn Baldwin } 203a7883464SJohn Baldwin 204a4f7a4c9SDavid Greenman /* 2055b81b6b3SRodney W. Grimes * Finish a fork operation, with process p2 nearly set up. 206a2a1c95cSPeter Wemm * Copy and update the pcb, set up the stack so that the child 207a2a1c95cSPeter Wemm * ready to run and return to user mode. 2085b81b6b3SRodney W. Grimes */ 209a2a1c95cSPeter Wemm void 2109c16356cSKonstantin Belousov cpu_fork(struct thread *td1, struct proc *p2, struct thread *td2, int flags) 2115b81b6b3SRodney W. Grimes { 2123e85b721SEd Maste struct proc *p1; 21391c28bfdSLuoqi Chen struct pcb *pcb2; 21424db0459SJohn Baldwin struct mdproc *mdp2; 21591c28bfdSLuoqi Chen 216b40ce416SJulian Elischer p1 = td1->td_proc; 21791c28bfdSLuoqi Chen if ((flags & RFPROC) == 0) { 21891c28bfdSLuoqi Chen if ((flags & RFMEM) == 0) { 21991c28bfdSLuoqi Chen /* unshare user LDT */ 22045449f84SJulian Elischer struct mdproc *mdp1 = &p1->p_md; 2219719da13SKonstantin Belousov struct proc_ldt *pldt, *pldt1; 222bc2e774aSJohn Baldwin 2230ad5e7f3SJeff Roberson mtx_lock_spin(&dt_lock); 2249719da13SKonstantin Belousov if ((pldt1 = mdp1->md_ldt) != NULL && 2259719da13SKonstantin Belousov pldt1->ldt_refcnt > 1) { 2269719da13SKonstantin Belousov pldt = user_ldt_alloc(mdp1, pldt1->ldt_len); 22724db0459SJohn Baldwin if (pldt == NULL) 2281acf256dSJohn Baldwin panic("could not copy LDT"); 22924db0459SJohn Baldwin mdp1->md_ldt = pldt; 23024db0459SJohn Baldwin set_user_ldt(mdp1); 2319719da13SKonstantin Belousov user_ldt_deref(pldt1); 23202b0a160SAttilio Rao } else 2330ad5e7f3SJeff Roberson mtx_unlock_spin(&dt_lock); 23491c28bfdSLuoqi Chen } 23591c28bfdSLuoqi Chen return; 23691c28bfdSLuoqi Chen } 2375b81b6b3SRodney W. Grimes 238b40ce416SJulian Elischer /* Point the pcb to the top of the stack */ 239824fc460SJohn Baldwin pcb2 = get_pcb_td(td2); 240b40ce416SJulian Elischer td2->td_pcb = pcb2; 241b40ce416SJulian Elischer 242a7883464SJohn Baldwin copy_thread(td1, td2); 2436cf9a08dSKonstantin Belousov 24424db0459SJohn Baldwin /* Point mdproc and then copy over td1's contents */ 24545449f84SJulian Elischer mdp2 = &p2->p_md; 24645449f84SJulian Elischer bcopy(&p1->p_md, mdp2, sizeof(*mdp2)); 24724db0459SJohn Baldwin 248a2a1c95cSPeter Wemm /* 2491f8745a9SPeter Wemm * Copy the trap frame for the return to user mode as if from a 250a4b8c657SBruce Evans * syscall. This copies most of the user mode register values. 251d86c1f0dSKonstantin Belousov * The -VM86_STACK_SPACE (-16) is so we can expand the trapframe 252d86c1f0dSKonstantin Belousov * if we go to vm86. 253a2a1c95cSPeter Wemm */ 254d86c1f0dSKonstantin Belousov td2->td_frame = (struct trapframe *)((caddr_t)td2->td_pcb - 255d86c1f0dSKonstantin Belousov VM86_STACK_SPACE) - 1; 256b40ce416SJulian Elischer bcopy(td1->td_frame, td2->td_frame, sizeof(struct trapframe)); 257a2a1c95cSPeter Wemm 258b40ce416SJulian Elischer td2->td_frame->tf_eax = 0; /* Child returns zero */ 259b40ce416SJulian Elischer td2->td_frame->tf_eflags &= ~PSL_C; /* success */ 260b40ce416SJulian Elischer td2->td_frame->tf_edx = 1; 2610d54b9d1SJohn Baldwin 262a2a1c95cSPeter Wemm /* 26359838c1aSJohn Baldwin * If the parent process has the trap bit set (i.e. a debugger 26459838c1aSJohn Baldwin * had single stepped the process to the system call), we need 26559838c1aSJohn Baldwin * to clear the trap flag from the new frame. 2665ad5504cSKelly Yancey */ 2675ad5504cSKelly Yancey td2->td_frame->tf_eflags &= ~PSL_T; 2685ad5504cSKelly Yancey 269a7883464SJohn Baldwin /* Set cr3 for the new process. */ 2709a527560SKonstantin Belousov pcb2->pcb_cr3 = pmap_get_cr3(vmspace_pmap(p2->p_vmspace)); 2715b81b6b3SRodney W. Grimes 27248a09cf2SJohn Dyson /* 27348a09cf2SJohn Dyson * XXX don't copy the i/o pages. this should probably be fixed. 27448a09cf2SJohn Dyson */ 275a7883464SJohn Baldwin pcb2->pcb_ext = NULL; 27648a09cf2SJohn Dyson 2778c39a127SStefan Eßer /* Copy the LDT, if necessary. */ 2780ad5e7f3SJeff Roberson mtx_lock_spin(&dt_lock); 279753d1af1SJohn Baldwin if (mdp2->md_ldt != NULL) { 28091c28bfdSLuoqi Chen if (flags & RFMEM) { 28105dfa22fSAttilio Rao mdp2->md_ldt->ldt_refcnt++; 28291c28bfdSLuoqi Chen } else { 28324db0459SJohn Baldwin mdp2->md_ldt = user_ldt_alloc(mdp2, 28424db0459SJohn Baldwin mdp2->md_ldt->ldt_len); 28524db0459SJohn Baldwin if (mdp2->md_ldt == NULL) 286df4d012bSJohn Baldwin panic("could not copy LDT"); 28791c28bfdSLuoqi Chen } 2888c39a127SStefan Eßer } 2890ad5e7f3SJeff Roberson mtx_unlock_spin(&dt_lock); 2908c39a127SStefan Eßer 291a2a1c95cSPeter Wemm /* 292a2a1c95cSPeter Wemm * Now, cpu_switch() can schedule the new process. 293a2a1c95cSPeter Wemm * pcb_esp is loaded pointing to the cpu_switch() stack frame 294a2a1c95cSPeter Wemm * containing the return address when exiting cpu_switch. 29537b087a6SPeter Wemm * This will normally be to fork_trampoline(), which will have 29637b087a6SPeter Wemm * %ebx loaded with the new proc's pointer. fork_trampoline() 297a2a1c95cSPeter Wemm * will set up a stack to call fork_return(p, frame); to complete 298a2a1c95cSPeter Wemm * the return to user-mode. 299a2a1c95cSPeter Wemm */ 300a2a1c95cSPeter Wemm } 301a2a1c95cSPeter Wemm 302a2a1c95cSPeter Wemm /* 303a2a1c95cSPeter Wemm * Intercept the return address from a freshly forked process that has NOT 304a2a1c95cSPeter Wemm * been scheduled yet. 305a2a1c95cSPeter Wemm * 306a2a1c95cSPeter Wemm * This is needed to make kernel threads stay in kernel mode. 307a2a1c95cSPeter Wemm */ 308a2a1c95cSPeter Wemm void 3095c2cf818SKonstantin Belousov cpu_fork_kthread_handler(struct thread *td, void (*func)(void *), void *arg) 310a2a1c95cSPeter Wemm { 311a2a1c95cSPeter Wemm /* 312a2a1c95cSPeter Wemm * Note that the trap frame follows the args, so the function 313a2a1c95cSPeter Wemm * is really called like this: func(arg, frame); 314a2a1c95cSPeter Wemm */ 315b40ce416SJulian Elischer td->td_pcb->pcb_esi = (int) func; /* function */ 316b40ce416SJulian Elischer td->td_pcb->pcb_ebx = (int) arg; /* first arg */ 3175b81b6b3SRodney W. Grimes } 3185b81b6b3SRodney W. Grimes 3197c2b54e8SNate Williams void 320e602ba25SJulian Elischer cpu_exit(struct thread *td) 321e602ba25SJulian Elischer { 322e602ba25SJulian Elischer 323bc2e774aSJohn Baldwin /* 324bc2e774aSJohn Baldwin * If this process has a custom LDT, release it. Reset pc->pcb_gs 325bc2e774aSJohn Baldwin * and %gs before we free it in case they refer to an LDT entry. 326bc2e774aSJohn Baldwin */ 3270ad5e7f3SJeff Roberson mtx_lock_spin(&dt_lock); 328bc2e774aSJohn Baldwin if (td->td_proc->p_md.md_ldt) { 32966250360SDavid Xu td->td_pcb->pcb_gs = _udatasel; 33066250360SDavid Xu load_gs(_udatasel); 331e602ba25SJulian Elischer user_ldt_free(td); 33202b0a160SAttilio Rao } else 3330ad5e7f3SJeff Roberson mtx_unlock_spin(&dt_lock); 334e602ba25SJulian Elischer } 335e602ba25SJulian Elischer 336e602ba25SJulian Elischer void 337e602ba25SJulian Elischer cpu_thread_exit(struct thread *td) 3385b81b6b3SRodney W. Grimes { 3394cc99cf6SJohn Baldwin 3401060a94fSKonstantin Belousov critical_enter(); 341d5e1f581SDavid Xu if (td == PCPU_GET(fpcurthread)) 342d5e1f581SDavid Xu npxdrop(); 3431060a94fSKonstantin Belousov critical_exit(); 344bc2e774aSJohn Baldwin 345bc2e774aSJohn Baldwin /* Disable any hardware breakpoints. */ 346bc2e774aSJohn Baldwin if (td->td_pcb->pcb_flags & PCB_DBREGS) { 347b19d9defSMaxime Henrion reset_dbregs(); 348bc2e774aSJohn Baldwin td->td_pcb->pcb_flags &= ~PCB_DBREGS; 349b19d9defSMaxime Henrion } 350b19d9defSMaxime Henrion } 351b19d9defSMaxime Henrion 352b19d9defSMaxime Henrion void 353696058c3SJulian Elischer cpu_thread_clean(struct thread *td) 354b19d9defSMaxime Henrion { 355b19d9defSMaxime Henrion struct pcb *pcb; 356b19d9defSMaxime Henrion 357b19d9defSMaxime Henrion pcb = td->td_pcb; 358ae3676c4SJohn Baldwin if (pcb->pcb_ext != NULL) { 359e602ba25SJulian Elischer /* if (pcb->pcb_ext->ext_refcount-- == 1) ?? */ 36048a09cf2SJohn Dyson /* 36148a09cf2SJohn Dyson * XXX do we need to move the TSS off the allocated pages 36248a09cf2SJohn Dyson * before freeing them? (not done here) 36348a09cf2SJohn Dyson */ 364d86c1f0dSKonstantin Belousov pmap_trm_free(pcb->pcb_ext, ctob(IOPAGES + 1)); 365ae3676c4SJohn Baldwin pcb->pcb_ext = NULL; 36648a09cf2SJohn Dyson } 3675b81b6b3SRodney W. Grimes } 3685b81b6b3SRodney W. Grimes 369381fe1aaSGarrett Wollman void 370710338e9SMarcel Moolenaar cpu_thread_swapin(struct thread *td) 371710338e9SMarcel Moolenaar { 372710338e9SMarcel Moolenaar } 373710338e9SMarcel Moolenaar 374710338e9SMarcel Moolenaar void 375710338e9SMarcel Moolenaar cpu_thread_swapout(struct thread *td) 376710338e9SMarcel Moolenaar { 377710338e9SMarcel Moolenaar } 378710338e9SMarcel Moolenaar 379710338e9SMarcel Moolenaar void 3800c3967e7SMarcel Moolenaar cpu_thread_alloc(struct thread *td) 381e602ba25SJulian Elischer { 382824fc460SJohn Baldwin struct pcb *pcb; 383824fc460SJohn Baldwin struct xstate_hdr *xhdr; 384e602ba25SJulian Elischer 385824fc460SJohn Baldwin td->td_pcb = pcb = get_pcb_td(td); 386d86c1f0dSKonstantin Belousov td->td_frame = (struct trapframe *)((caddr_t)pcb - 387d86c1f0dSKonstantin Belousov VM86_STACK_SPACE) - 1; 388824fc460SJohn Baldwin pcb->pcb_ext = NULL; 389824fc460SJohn Baldwin pcb->pcb_save = get_pcb_user_save_pcb(pcb); 390824fc460SJohn Baldwin if (use_xsave) { 391824fc460SJohn Baldwin xhdr = (struct xstate_hdr *)(pcb->pcb_save + 1); 392824fc460SJohn Baldwin bzero(xhdr, sizeof(*xhdr)); 393824fc460SJohn Baldwin xhdr->xstate_bv = xsave_mask; 394824fc460SJohn Baldwin } 395e602ba25SJulian Elischer } 396e602ba25SJulian Elischer 3970c3967e7SMarcel Moolenaar void 3980c3967e7SMarcel Moolenaar cpu_thread_free(struct thread *td) 3990c3967e7SMarcel Moolenaar { 4000c3967e7SMarcel Moolenaar 4010c3967e7SMarcel Moolenaar cpu_thread_clean(td); 4020c3967e7SMarcel Moolenaar } 4030c3967e7SMarcel Moolenaar 4046f1fe330SKonstantin Belousov bool 4056f1fe330SKonstantin Belousov cpu_exec_vmspace_reuse(struct proc *p __unused, vm_map_t map __unused) 4066f1fe330SKonstantin Belousov { 4076f1fe330SKonstantin Belousov 4086f1fe330SKonstantin Belousov return (true); 4096f1fe330SKonstantin Belousov } 4106f1fe330SKonstantin Belousov 411fd8d844fSKonstantin Belousov int 412fd8d844fSKonstantin Belousov cpu_procctl(struct thread *td __unused, int idtype __unused, id_t id __unused, 413fd8d844fSKonstantin Belousov int com __unused, void *data __unused) 414fd8d844fSKonstantin Belousov { 415fd8d844fSKonstantin Belousov 416fd8d844fSKonstantin Belousov return (EINVAL); 417fd8d844fSKonstantin Belousov } 418fd8d844fSKonstantin Belousov 419a7b89044SKonstantin Belousov void 420a7b89044SKonstantin Belousov cpu_set_syscall_retval(struct thread *td, int error) 421a7b89044SKonstantin Belousov { 422a7b89044SKonstantin Belousov 423a7b89044SKonstantin Belousov switch (error) { 424a7b89044SKonstantin Belousov case 0: 425a7b89044SKonstantin Belousov td->td_frame->tf_eax = td->td_retval[0]; 426a7b89044SKonstantin Belousov td->td_frame->tf_edx = td->td_retval[1]; 427a7b89044SKonstantin Belousov td->td_frame->tf_eflags &= ~PSL_C; 428a7b89044SKonstantin Belousov break; 429a7b89044SKonstantin Belousov 430a7b89044SKonstantin Belousov case ERESTART: 431a7b89044SKonstantin Belousov /* 432a7b89044SKonstantin Belousov * Reconstruct pc, assuming lcall $X,y is 7 bytes, int 433a7b89044SKonstantin Belousov * 0x80 is 2 bytes. We saved this in tf_err. 434a7b89044SKonstantin Belousov */ 435a7b89044SKonstantin Belousov td->td_frame->tf_eip -= td->td_frame->tf_err; 436a7b89044SKonstantin Belousov break; 437a7b89044SKonstantin Belousov 438a7b89044SKonstantin Belousov case EJUSTRETURN: 439a7b89044SKonstantin Belousov break; 440a7b89044SKonstantin Belousov 441a7b89044SKonstantin Belousov default: 442c26391f4SEdward Tomasz Napierala td->td_frame->tf_eax = error; 443a7b89044SKonstantin Belousov td->td_frame->tf_eflags |= PSL_C; 444a7b89044SKonstantin Belousov break; 445a7b89044SKonstantin Belousov } 446a7b89044SKonstantin Belousov } 447a7b89044SKonstantin Belousov 448e602ba25SJulian Elischer /* 4495c2cf818SKonstantin Belousov * Initialize machine state, mostly pcb and trap frame for a new 4505c2cf818SKonstantin Belousov * thread, about to return to userspace. Put enough state in the new 4515c2cf818SKonstantin Belousov * thread's PCB to get it to go back to the fork_return(), which 4525c2cf818SKonstantin Belousov * finalizes the thread state and handles peculiarities of the first 4535c2cf818SKonstantin Belousov * return to userspace for the new thread. 454e602ba25SJulian Elischer */ 455e602ba25SJulian Elischer void 4565c2cf818SKonstantin Belousov cpu_copy_thread(struct thread *td, struct thread *td0) 457e602ba25SJulian Elischer { 458a7883464SJohn Baldwin copy_thread(td0, td); 459e602ba25SJulian Elischer 460e602ba25SJulian Elischer /* 46140d593d1SJohn Baldwin * Copy user general-purpose registers. 46240d593d1SJohn Baldwin * 46340d593d1SJohn Baldwin * Some of these registers are rewritten by cpu_set_upcall() 464*3b57ddb0SJohn Baldwin * and linux_set_upcall(). 465e602ba25SJulian Elischer */ 46611e0f8e1SMarcel Moolenaar bcopy(td0->td_frame, td->td_frame, sizeof(struct trapframe)); 467e602ba25SJulian Elischer 4687ce5e15eSDavid Xu /* If the current thread has the trap bit set (i.e. a debugger had 4697ce5e15eSDavid Xu * single stepped the process to the system call), we need to clear 4707ce5e15eSDavid Xu * the trap flag from the new frame. Otherwise, the new thread will 4717ce5e15eSDavid Xu * receive a (likely unexpected) SIGTRAP when it executes the first 4727ce5e15eSDavid Xu * instruction after returning to userland. 4737ce5e15eSDavid Xu */ 4747ce5e15eSDavid Xu td->td_frame->tf_eflags &= ~PSL_T; 475e602ba25SJulian Elischer } 476e602ba25SJulian Elischer 477e602ba25SJulian Elischer /* 4785c2cf818SKonstantin Belousov * Set that machine state for performing an upcall that starts 4795c2cf818SKonstantin Belousov * the entry function with the given argument. 480e602ba25SJulian Elischer */ 481575525a0SJonathan Mini void 4825c2cf818SKonstantin Belousov cpu_set_upcall(struct thread *td, void (*entry)(void *), void *arg, 48321fc3164SDavid Xu stack_t *stack) 484575525a0SJonathan Mini { 485575525a0SJonathan Mini 486575525a0SJonathan Mini /* 487696058c3SJulian Elischer * Do any extra cleaning that needs to be done. 488696058c3SJulian Elischer * The thread may have optional components 489696058c3SJulian Elischer * that are not present in a fresh thread. 490696058c3SJulian Elischer * This may be a recycled thread so make it look 491696058c3SJulian Elischer * as though it's newly allocated. 492696058c3SJulian Elischer */ 493696058c3SJulian Elischer cpu_thread_clean(td); 494696058c3SJulian Elischer 495696058c3SJulian Elischer /* 4965c2cf818SKonstantin Belousov * Set the trap frame to point at the beginning of the entry 497575525a0SJonathan Mini * function. 498575525a0SJonathan Mini */ 4992396628bSDavid Xu td->td_frame->tf_ebp = 0; 500575525a0SJonathan Mini td->td_frame->tf_esp = 501fc643048SDavid Xu (((int)stack->ss_sp + stack->ss_size - 4) & ~0x0f) - 4; 50221fc3164SDavid Xu td->td_frame->tf_eip = (int)entry; 503575525a0SJonathan Mini 504f236378bSTijl Coosemans /* Return address sentinel value to stop stack unwinding. */ 505f236378bSTijl Coosemans suword((void *)td->td_frame->tf_esp, 0); 506f236378bSTijl Coosemans 5075c2cf818SKonstantin Belousov /* Pass the argument to the entry point. */ 508575525a0SJonathan Mini suword((void *)(td->td_frame->tf_esp + sizeof(void *)), 50921fc3164SDavid Xu (int)arg); 51021fc3164SDavid Xu } 51121fc3164SDavid Xu 512740fd64dSDavid Xu int 51321fc3164SDavid Xu cpu_set_user_tls(struct thread *td, void *tls_base) 51421fc3164SDavid Xu { 51521fc3164SDavid Xu struct segment_descriptor sd; 51621fc3164SDavid Xu uint32_t base; 51721fc3164SDavid Xu 51821fc3164SDavid Xu /* 51921fc3164SDavid Xu * Construct a descriptor and store it in the pcb for 52021fc3164SDavid Xu * the next context switch. Also store it in the gdt 52121fc3164SDavid Xu * so that the load of tf_fs into %fs will activate it 52221fc3164SDavid Xu * at return to userland. 52321fc3164SDavid Xu */ 52421fc3164SDavid Xu base = (uint32_t)tls_base; 52521fc3164SDavid Xu sd.sd_lobase = base & 0xffffff; 52621fc3164SDavid Xu sd.sd_hibase = (base >> 24) & 0xff; 52721fc3164SDavid Xu sd.sd_lolimit = 0xffff; /* 4GB limit, wraps around */ 52821fc3164SDavid Xu sd.sd_hilimit = 0xf; 52921fc3164SDavid Xu sd.sd_type = SDT_MEMRWA; 53021fc3164SDavid Xu sd.sd_dpl = SEL_UPL; 53121fc3164SDavid Xu sd.sd_p = 1; 53221fc3164SDavid Xu sd.sd_xx = 0; 53321fc3164SDavid Xu sd.sd_def32 = 1; 53421fc3164SDavid Xu sd.sd_gran = 1; 53521fc3164SDavid Xu critical_enter(); 53621fc3164SDavid Xu /* set %gs */ 53721fc3164SDavid Xu td->td_pcb->pcb_gsd = sd; 53821fc3164SDavid Xu if (td == curthread) { 53921fc3164SDavid Xu PCPU_GET(fsgs_gdt)[1] = sd; 54021fc3164SDavid Xu load_gs(GSEL(GUGS_SEL, SEL_UPL)); 54121fc3164SDavid Xu } 54221fc3164SDavid Xu critical_exit(); 543740fd64dSDavid Xu return (0); 544e602ba25SJulian Elischer } 545e602ba25SJulian Elischer 5465b81b6b3SRodney W. Grimes /* 5475b81b6b3SRodney W. Grimes * Convert kernel VA to physical address 5485b81b6b3SRodney W. Grimes */ 549227f9a1cSJake Burkholder vm_paddr_t 5507f8cb368SDavid Greenman kvtop(void *addr) 5515b81b6b3SRodney W. Grimes { 552227f9a1cSJake Burkholder vm_paddr_t pa; 5535b81b6b3SRodney W. Grimes 554227f9a1cSJake Burkholder pa = pmap_kextract((vm_offset_t)addr); 555227f9a1cSJake Burkholder if (pa == 0) 5565b81b6b3SRodney W. Grimes panic("kvtop: zero page frame"); 557227f9a1cSJake Burkholder return (pa); 5585b81b6b3SRodney W. Grimes } 5595b81b6b3SRodney W. Grimes 560e0b78e19SJoerg Wunsch /* 561b1e5dcf7SRobert Watson * Get an sf_buf from the freelist. May block if none are available. 562411d10a6SAlan Cox */ 563c8d2ffd6SGleb Smirnoff void 564c8d2ffd6SGleb Smirnoff sf_buf_map(struct sf_buf *sf, int flags) 565411d10a6SAlan Cox { 56620351fafSAlan Cox 5679a527560SKonstantin Belousov pmap_sf_buf_map(sf); 5685c0db7c7SAlan Cox #ifdef SMP 569c8d2ffd6SGleb Smirnoff sf_buf_shootdown(sf, flags); 570c8d2ffd6SGleb Smirnoff #endif 571c8d2ffd6SGleb Smirnoff } 572c8d2ffd6SGleb Smirnoff 573c8d2ffd6SGleb Smirnoff #ifdef SMP 5743b23ffe2SKonstantin Belousov static void 5753b23ffe2SKonstantin Belousov sf_buf_shootdown_curcpu_cb(pmap_t pmap __unused, 5763b23ffe2SKonstantin Belousov vm_offset_t addr1 __unused, vm_offset_t addr2 __unused) 5773b23ffe2SKonstantin Belousov { 5783b23ffe2SKonstantin Belousov } 5793b23ffe2SKonstantin Belousov 580c8d2ffd6SGleb Smirnoff void 581c8d2ffd6SGleb Smirnoff sf_buf_shootdown(struct sf_buf *sf, int flags) 582c8d2ffd6SGleb Smirnoff { 583c8d2ffd6SGleb Smirnoff cpuset_t other_cpus; 584c8d2ffd6SGleb Smirnoff u_int cpuid; 585c8d2ffd6SGleb Smirnoff 586f6f67ea9SStephan Uphoff sched_pin(); 587250a44f6SAttilio Rao cpuid = PCPU_GET(cpuid); 588250a44f6SAttilio Rao if (!CPU_ISSET(cpuid, &sf->cpumask)) { 589250a44f6SAttilio Rao CPU_SET(cpuid, &sf->cpumask); 5905c0db7c7SAlan Cox invlpg(sf->kva); 5914c0e268aSStephan Uphoff } 592f6f67ea9SStephan Uphoff if ((flags & SFB_CPUPRIVATE) == 0) { 593250a44f6SAttilio Rao other_cpus = all_cpus; 594250a44f6SAttilio Rao CPU_CLR(cpuid, &other_cpus); 5959825eadfSRyan Libby CPU_ANDNOT(&other_cpus, &sf->cpumask); 59671a19bdcSAttilio Rao if (!CPU_EMPTY(&other_cpus)) { 59771a19bdcSAttilio Rao CPU_OR(&sf->cpumask, &other_cpus); 5983b23ffe2SKonstantin Belousov smp_masked_invlpg(other_cpus, sf->kva, kernel_pmap, 5993b23ffe2SKonstantin Belousov sf_buf_shootdown_curcpu_cb); 600f6f67ea9SStephan Uphoff } 601f6f67ea9SStephan Uphoff } 602f6f67ea9SStephan Uphoff sched_unpin(); 603411d10a6SAlan Cox } 604c8d2ffd6SGleb Smirnoff #endif 605411d10a6SAlan Cox 606411d10a6SAlan Cox /* 607c8d2ffd6SGleb Smirnoff * MD part of sf_buf_free(). 608411d10a6SAlan Cox */ 609c8d2ffd6SGleb Smirnoff int 610c8d2ffd6SGleb Smirnoff sf_buf_unmap(struct sf_buf *sf) 611411d10a6SAlan Cox { 612ed95805eSJohn Baldwin 613c8d2ffd6SGleb Smirnoff return (0); 6140543fa53SAlan Cox } 615c8d2ffd6SGleb Smirnoff 616c8d2ffd6SGleb Smirnoff static void 617c8d2ffd6SGleb Smirnoff sf_buf_invalidate(struct sf_buf *sf) 618c8d2ffd6SGleb Smirnoff { 619c8d2ffd6SGleb Smirnoff vm_page_t m = sf->m; 620c8d2ffd6SGleb Smirnoff 621c8d2ffd6SGleb Smirnoff /* 622c8d2ffd6SGleb Smirnoff * Use pmap_qenter to update the pte for 623c8d2ffd6SGleb Smirnoff * existing mapping, in particular, the PAT 624c8d2ffd6SGleb Smirnoff * settings are recalculated. 625c8d2ffd6SGleb Smirnoff */ 626c8d2ffd6SGleb Smirnoff pmap_qenter(sf->kva, &m, 1); 627d12c4465SKonstantin Belousov pmap_invalidate_cache_range(sf->kva, sf->kva + PAGE_SIZE); 628c8d2ffd6SGleb Smirnoff } 629c8d2ffd6SGleb Smirnoff 630c8d2ffd6SGleb Smirnoff /* 631c8d2ffd6SGleb Smirnoff * Invalidate the cache lines that may belong to the page, if 632c8d2ffd6SGleb Smirnoff * (possibly old) mapping of the page by sf buffer exists. Returns 633c8d2ffd6SGleb Smirnoff * TRUE when mapping was found and cache invalidated. 634c8d2ffd6SGleb Smirnoff */ 635c8d2ffd6SGleb Smirnoff boolean_t 636c8d2ffd6SGleb Smirnoff sf_buf_invalidate_cache(vm_page_t m) 637c8d2ffd6SGleb Smirnoff { 638c8d2ffd6SGleb Smirnoff 639c8d2ffd6SGleb Smirnoff return (sf_buf_process_page(m, sf_buf_invalidate)); 640411d10a6SAlan Cox } 641411d10a6SAlan Cox 642411d10a6SAlan Cox /* 64357d7d7b3SJustin T. Gibbs * Software interrupt handler for queued VM system processing. 64457d7d7b3SJustin T. Gibbs */ 64557d7d7b3SJustin T. Gibbs void 6468088699fSJohn Baldwin swi_vm(void *dummy) 64757d7d7b3SJustin T. Gibbs { 64857d7d7b3SJustin T. Gibbs if (busdma_swi_pending != 0) 64957d7d7b3SJustin T. Gibbs busdma_swi(); 65057d7d7b3SJustin T. Gibbs } 65157d7d7b3SJustin T. Gibbs 65257d7d7b3SJustin T. Gibbs /* 653cae6f73aSJoerg Wunsch * Tell whether this address is in some physical memory region. 654e0b78e19SJoerg Wunsch * Currently used by the kernel coredump code in order to avoid 655e0b78e19SJoerg Wunsch * dumping the ``ISA memory hole'' which could cause indefinite hangs, 656e0b78e19SJoerg Wunsch * or other unpredictable behaviour. 657e0b78e19SJoerg Wunsch */ 658e0b78e19SJoerg Wunsch 659e0b78e19SJoerg Wunsch int 6602c38d78eSAlan Cox is_physical_memory(vm_paddr_t addr) 661e0b78e19SJoerg Wunsch { 662e0b78e19SJoerg Wunsch 66303927d3cSPeter Wemm #ifdef DEV_ISA 664e0b78e19SJoerg Wunsch /* The ISA ``memory hole''. */ 665e0b78e19SJoerg Wunsch if (addr >= 0xa0000 && addr < 0x100000) 666cae6f73aSJoerg Wunsch return 0; 667e0b78e19SJoerg Wunsch #endif 668e0b78e19SJoerg Wunsch 669e0b78e19SJoerg Wunsch /* 670e0b78e19SJoerg Wunsch * stuff other tests for known memory-mapped devices (PCI?) 671e0b78e19SJoerg Wunsch * here 672e0b78e19SJoerg Wunsch */ 673e0b78e19SJoerg Wunsch 674cae6f73aSJoerg Wunsch return 1; 675e0b78e19SJoerg Wunsch } 676