15b81b6b3SRodney W. Grimes /*- 2df57947fSPedro F. Giffuni * SPDX-License-Identifier: BSD-4-Clause 3df57947fSPedro F. Giffuni * 45b81b6b3SRodney W. Grimes * Copyright (c) 1982, 1986 The Regents of the University of California. 55b81b6b3SRodney W. Grimes * Copyright (c) 1989, 1990 William Jolitz 61561d038SDavid Greenman * Copyright (c) 1994 John Dyson 75b81b6b3SRodney W. Grimes * All rights reserved. 85b81b6b3SRodney W. Grimes * 95b81b6b3SRodney W. Grimes * This code is derived from software contributed to Berkeley by 105b81b6b3SRodney W. Grimes * the Systems Programming Group of the University of Utah Computer 115b81b6b3SRodney W. Grimes * Science Department, and William Jolitz. 125b81b6b3SRodney W. Grimes * 135b81b6b3SRodney W. Grimes * Redistribution and use in source and binary forms, with or without 145b81b6b3SRodney W. Grimes * modification, are permitted provided that the following conditions 155b81b6b3SRodney W. Grimes * are met: 165b81b6b3SRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 175b81b6b3SRodney W. Grimes * notice, this list of conditions and the following disclaimer. 185b81b6b3SRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 195b81b6b3SRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 205b81b6b3SRodney W. Grimes * documentation and/or other materials provided with the distribution. 215b81b6b3SRodney W. Grimes * 3. All advertising materials mentioning features or use of this software 225b81b6b3SRodney W. Grimes * must display the following acknowledgement: 235b81b6b3SRodney W. Grimes * This product includes software developed by the University of 245b81b6b3SRodney W. Grimes * California, Berkeley and its contributors. 255b81b6b3SRodney W. Grimes * 4. Neither the name of the University nor the names of its contributors 265b81b6b3SRodney W. Grimes * may be used to endorse or promote products derived from this software 275b81b6b3SRodney W. Grimes * without specific prior written permission. 285b81b6b3SRodney W. Grimes * 295b81b6b3SRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 305b81b6b3SRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 315b81b6b3SRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 325b81b6b3SRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 335b81b6b3SRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 345b81b6b3SRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 355b81b6b3SRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 365b81b6b3SRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 375b81b6b3SRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 385b81b6b3SRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 395b81b6b3SRodney W. Grimes * SUCH DAMAGE. 405b81b6b3SRodney W. Grimes * 41960173b9SRodney W. Grimes * from: @(#)vm_machdep.c 7.3 (Berkeley) 5/13/91 425b81b6b3SRodney W. Grimes * Utah $Hdr: vm_machdep.c 1.16.1.1 89/06/23$ 435b81b6b3SRodney W. Grimes */ 445b81b6b3SRodney W. Grimes 459676a785SDavid E. O'Brien #include <sys/cdefs.h> 469676a785SDavid E. O'Brien __FBSDID("$FreeBSD$"); 479676a785SDavid E. O'Brien 486d7d4649SBruce Evans #include "opt_isa.h" 49558226eaSPeter Wemm #include "opt_npx.h" 500d74cc48SPeter Wemm #include "opt_reset.h" 51883bd55aSPoul-Henning Kamp #include "opt_cpu.h" 528890984dSGarrett Wollman 5326f9a767SRodney W. Grimes #include <sys/param.h> 5426f9a767SRodney W. Grimes #include <sys/systm.h> 559626b608SPoul-Henning Kamp #include <sys/bio.h> 5626f9a767SRodney W. Grimes #include <sys/buf.h> 5766095752SJohn Dyson #include <sys/kernel.h> 580384fff8SJason Evans #include <sys/ktr.h> 596d7d4649SBruce Evans #include <sys/lock.h> 606d7d4649SBruce Evans #include <sys/malloc.h> 61411d10a6SAlan Cox #include <sys/mbuf.h> 6213b0500fSJohn Baldwin #include <sys/mutex.h> 635ad5504cSKelly Yancey #include <sys/pioctl.h> 646d7d4649SBruce Evans #include <sys/proc.h> 65a7b89044SKonstantin Belousov #include <sys/sysent.h> 66e45db9b8SAlan Cox #include <sys/sf_buf.h> 676d7d4649SBruce Evans #include <sys/smp.h> 684c0e268aSStephan Uphoff #include <sys/sched.h> 6966095752SJohn Dyson #include <sys/sysctl.h> 7091c28bfdSLuoqi Chen #include <sys/unistd.h> 716d7d4649SBruce Evans #include <sys/vnode.h> 726d7d4649SBruce Evans #include <sys/vmmeter.h> 735b81b6b3SRodney W. Grimes 74a2a1c95cSPeter Wemm #include <machine/cpu.h> 7541ee9f1cSPoul-Henning Kamp #include <machine/cputypes.h> 761f8745a9SPeter Wemm #include <machine/md_var.h> 7791c28bfdSLuoqi Chen #include <machine/pcb.h> 7891c28bfdSLuoqi Chen #include <machine/pcb_ext.h> 795c0db7c7SAlan Cox #include <machine/smp.h> 8091c28bfdSLuoqi Chen #include <machine/vm86.h> 815b81b6b3SRodney W. Grimes 8226f9a767SRodney W. Grimes #include <vm/vm.h> 836d7d4649SBruce Evans #include <vm/vm_extern.h> 8426f9a767SRodney W. Grimes #include <vm/vm_kern.h> 8524a1cce3SDavid Greenman #include <vm/vm_page.h> 86efeaf95aSDavid Greenman #include <vm/vm_map.h> 876d7d4649SBruce Evans #include <vm/vm_param.h> 885b81b6b3SRodney W. Grimes 89099a0e58SBosko Milekic #ifndef NSFBUFS 90099a0e58SBosko Milekic #define NSFBUFS (512 + maxusers * 16) 91099a0e58SBosko Milekic #endif 92099a0e58SBosko Milekic 9331ffd803SEd Schouten _Static_assert(OFFSETOF_CURTHREAD == offsetof(struct pcpu, pc_curthread), 9431ffd803SEd Schouten "OFFSETOF_CURTHREAD does not correspond with offset of pc_curthread."); 9531ffd803SEd Schouten _Static_assert(OFFSETOF_CURPCB == offsetof(struct pcpu, pc_curpcb), 9631ffd803SEd Schouten "OFFSETOF_CURPCB does not correspond with offset of pc_curpcb."); 9748cae112SKonstantin Belousov _Static_assert(__OFFSETOF_MONITORBUF == offsetof(struct pcpu, pc_monitorbuf), 9848cae112SKonstantin Belousov "__OFFSETOF_MONINORBUF does not correspond with offset of pc_monitorbuf."); 99e93d0cbeSKonstantin Belousov 100824fc460SJohn Baldwin union savefpu * 101824fc460SJohn Baldwin get_pcb_user_save_td(struct thread *td) 102824fc460SJohn Baldwin { 103824fc460SJohn Baldwin vm_offset_t p; 1042f1e7069STor Egge 105824fc460SJohn Baldwin p = td->td_kstack + td->td_kstack_pages * PAGE_SIZE - 1063ef966c4SKonstantin Belousov roundup2(cpu_max_ext_state_size, XSAVE_AREA_ALIGN); 1073ef966c4SKonstantin Belousov KASSERT((p % XSAVE_AREA_ALIGN) == 0, ("Unaligned pcb_user_save area")); 108824fc460SJohn Baldwin return ((union savefpu *)p); 109824fc460SJohn Baldwin } 110824fc460SJohn Baldwin 111824fc460SJohn Baldwin union savefpu * 112824fc460SJohn Baldwin get_pcb_user_save_pcb(struct pcb *pcb) 113824fc460SJohn Baldwin { 114824fc460SJohn Baldwin vm_offset_t p; 115824fc460SJohn Baldwin 116824fc460SJohn Baldwin p = (vm_offset_t)(pcb + 1); 117824fc460SJohn Baldwin return ((union savefpu *)p); 118824fc460SJohn Baldwin } 119824fc460SJohn Baldwin 120824fc460SJohn Baldwin struct pcb * 121824fc460SJohn Baldwin get_pcb_td(struct thread *td) 122824fc460SJohn Baldwin { 123824fc460SJohn Baldwin vm_offset_t p; 124824fc460SJohn Baldwin 125824fc460SJohn Baldwin p = td->td_kstack + td->td_kstack_pages * PAGE_SIZE - 1263ef966c4SKonstantin Belousov roundup2(cpu_max_ext_state_size, XSAVE_AREA_ALIGN) - 1273ef966c4SKonstantin Belousov sizeof(struct pcb); 128824fc460SJohn Baldwin return ((struct pcb *)p); 129824fc460SJohn Baldwin } 130824fc460SJohn Baldwin 131824fc460SJohn Baldwin void * 132824fc460SJohn Baldwin alloc_fpusave(int flags) 133824fc460SJohn Baldwin { 134824fc460SJohn Baldwin void *res; 135824fc460SJohn Baldwin struct savefpu_ymm *sf; 136824fc460SJohn Baldwin 137824fc460SJohn Baldwin res = malloc(cpu_max_ext_state_size, M_DEVBUF, flags); 138824fc460SJohn Baldwin if (use_xsave) { 139824fc460SJohn Baldwin sf = (struct savefpu_ymm *)res; 140824fc460SJohn Baldwin bzero(&sf->sv_xstate.sx_hd, sizeof(sf->sv_xstate.sx_hd)); 141824fc460SJohn Baldwin sf->sv_xstate.sx_hd.xstate_bv = xsave_mask; 142824fc460SJohn Baldwin } 143824fc460SJohn Baldwin return (res); 144824fc460SJohn Baldwin } 145a4f7a4c9SDavid Greenman /* 1465b81b6b3SRodney W. Grimes * Finish a fork operation, with process p2 nearly set up. 147a2a1c95cSPeter Wemm * Copy and update the pcb, set up the stack so that the child 148a2a1c95cSPeter Wemm * ready to run and return to user mode. 1495b81b6b3SRodney W. Grimes */ 150a2a1c95cSPeter Wemm void 1519c16356cSKonstantin Belousov cpu_fork(struct thread *td1, struct proc *p2, struct thread *td2, int flags) 1525b81b6b3SRodney W. Grimes { 1533e85b721SEd Maste struct proc *p1; 15491c28bfdSLuoqi Chen struct pcb *pcb2; 15524db0459SJohn Baldwin struct mdproc *mdp2; 15691c28bfdSLuoqi Chen 157b40ce416SJulian Elischer p1 = td1->td_proc; 15891c28bfdSLuoqi Chen if ((flags & RFPROC) == 0) { 15991c28bfdSLuoqi Chen if ((flags & RFMEM) == 0) { 16091c28bfdSLuoqi Chen /* unshare user LDT */ 16145449f84SJulian Elischer struct mdproc *mdp1 = &p1->p_md; 1629719da13SKonstantin Belousov struct proc_ldt *pldt, *pldt1; 163bc2e774aSJohn Baldwin 1640ad5e7f3SJeff Roberson mtx_lock_spin(&dt_lock); 1659719da13SKonstantin Belousov if ((pldt1 = mdp1->md_ldt) != NULL && 1669719da13SKonstantin Belousov pldt1->ldt_refcnt > 1) { 1679719da13SKonstantin Belousov pldt = user_ldt_alloc(mdp1, pldt1->ldt_len); 16824db0459SJohn Baldwin if (pldt == NULL) 1691acf256dSJohn Baldwin panic("could not copy LDT"); 17024db0459SJohn Baldwin mdp1->md_ldt = pldt; 17124db0459SJohn Baldwin set_user_ldt(mdp1); 1729719da13SKonstantin Belousov user_ldt_deref(pldt1); 17302b0a160SAttilio Rao } else 1740ad5e7f3SJeff Roberson mtx_unlock_spin(&dt_lock); 17591c28bfdSLuoqi Chen } 17691c28bfdSLuoqi Chen return; 17791c28bfdSLuoqi Chen } 1785b81b6b3SRodney W. Grimes 1796cf9a08dSKonstantin Belousov /* Ensure that td1's pcb is up to date. */ 180b40ce416SJulian Elischer if (td1 == curthread) 181b40ce416SJulian Elischer td1->td_pcb->pcb_gs = rgs(); 1821060a94fSKonstantin Belousov critical_enter(); 1830bbc8826SJohn Baldwin if (PCPU_GET(fpcurthread) == td1) 1846cf9a08dSKonstantin Belousov npxsave(td1->td_pcb->pcb_save); 1851060a94fSKonstantin Belousov critical_exit(); 1861f8745a9SPeter Wemm 187b40ce416SJulian Elischer /* Point the pcb to the top of the stack */ 188824fc460SJohn Baldwin pcb2 = get_pcb_td(td2); 189b40ce416SJulian Elischer td2->td_pcb = pcb2; 190b40ce416SJulian Elischer 1916cf9a08dSKonstantin Belousov /* Copy td1's pcb */ 192b40ce416SJulian Elischer bcopy(td1->td_pcb, pcb2, sizeof(*pcb2)); 193a2a1c95cSPeter Wemm 1946cf9a08dSKonstantin Belousov /* Properly initialize pcb_save */ 195824fc460SJohn Baldwin pcb2->pcb_save = get_pcb_user_save_pcb(pcb2); 196824fc460SJohn Baldwin bcopy(get_pcb_user_save_td(td1), get_pcb_user_save_pcb(pcb2), 197824fc460SJohn Baldwin cpu_max_ext_state_size); 1986cf9a08dSKonstantin Belousov 19924db0459SJohn Baldwin /* Point mdproc and then copy over td1's contents */ 20045449f84SJulian Elischer mdp2 = &p2->p_md; 20145449f84SJulian Elischer bcopy(&p1->p_md, mdp2, sizeof(*mdp2)); 20224db0459SJohn Baldwin 203a2a1c95cSPeter Wemm /* 204a2a1c95cSPeter Wemm * Create a new fresh stack for the new process. 2051f8745a9SPeter Wemm * Copy the trap frame for the return to user mode as if from a 206a4b8c657SBruce Evans * syscall. This copies most of the user mode register values. 207*d86c1f0dSKonstantin Belousov * The -VM86_STACK_SPACE (-16) is so we can expand the trapframe 208*d86c1f0dSKonstantin Belousov * if we go to vm86. 209a2a1c95cSPeter Wemm */ 210*d86c1f0dSKonstantin Belousov td2->td_frame = (struct trapframe *)((caddr_t)td2->td_pcb - 211*d86c1f0dSKonstantin Belousov VM86_STACK_SPACE) - 1; 212b40ce416SJulian Elischer bcopy(td1->td_frame, td2->td_frame, sizeof(struct trapframe)); 213a2a1c95cSPeter Wemm 214b40ce416SJulian Elischer td2->td_frame->tf_eax = 0; /* Child returns zero */ 215b40ce416SJulian Elischer td2->td_frame->tf_eflags &= ~PSL_C; /* success */ 216b40ce416SJulian Elischer td2->td_frame->tf_edx = 1; 2170d54b9d1SJohn Baldwin 218a2a1c95cSPeter Wemm /* 2195ad5504cSKelly Yancey * If the parent process has the trap bit set (i.e. a debugger had 2205ad5504cSKelly Yancey * single stepped the process to the system call), we need to clear 2215ad5504cSKelly Yancey * the trap flag from the new frame unless the debugger had set PF_FORK 2225ad5504cSKelly Yancey * on the parent. Otherwise, the child will receive a (likely 2235ad5504cSKelly Yancey * unexpected) SIGTRAP when it executes the first instruction after 2245ad5504cSKelly Yancey * returning to userland. 2255ad5504cSKelly Yancey */ 2265ad5504cSKelly Yancey if ((p1->p_pfsflags & PF_FORK) == 0) 2275ad5504cSKelly Yancey td2->td_frame->tf_eflags &= ~PSL_T; 2285ad5504cSKelly Yancey 2295ad5504cSKelly Yancey /* 230a2a1c95cSPeter Wemm * Set registers for trampoline to user mode. Leave space for the 231a2a1c95cSPeter Wemm * return address on stack. These are the kernel mode register values. 232a2a1c95cSPeter Wemm */ 23334c15db9SKonstantin Belousov #if defined(PAE) || defined(PAE_TABLES) 2347ab9b220SJake Burkholder pcb2->pcb_cr3 = vtophys(vmspace_pmap(p2->p_vmspace)->pm_pdpt); 2357ab9b220SJake Burkholder #else 236b1028ad1SLuoqi Chen pcb2->pcb_cr3 = vtophys(vmspace_pmap(p2->p_vmspace)->pm_pdir); 2377ab9b220SJake Burkholder #endif 23837b087a6SPeter Wemm pcb2->pcb_edi = 0; 23937b087a6SPeter Wemm pcb2->pcb_esi = (int)fork_return; /* fork_trampoline argument */ 24037b087a6SPeter Wemm pcb2->pcb_ebp = 0; 241b40ce416SJulian Elischer pcb2->pcb_esp = (int)td2->td_frame - sizeof(void *); 242b40ce416SJulian Elischer pcb2->pcb_ebx = (int)td2; /* fork_trampoline argument */ 243*d86c1f0dSKonstantin Belousov pcb2->pcb_eip = (int)fork_trampoline + setidt_disp; 244a4b8c657SBruce Evans /*- 245a4b8c657SBruce Evans * pcb2->pcb_dr*: cloned above. 2461f8745a9SPeter Wemm * pcb2->pcb_savefpu: cloned above. 247a4b8c657SBruce Evans * pcb2->pcb_flags: cloned above. 2481f8745a9SPeter Wemm * pcb2->pcb_onfault: cloned above (always NULL here?). 249a4b8c657SBruce Evans * pcb2->pcb_gs: cloned above. 250a4b8c657SBruce Evans * pcb2->pcb_ext: cleared below. 2511f8745a9SPeter Wemm */ 2525b81b6b3SRodney W. Grimes 25348a09cf2SJohn Dyson /* 25448a09cf2SJohn Dyson * XXX don't copy the i/o pages. this should probably be fixed. 25548a09cf2SJohn Dyson */ 25648a09cf2SJohn Dyson pcb2->pcb_ext = 0; 25748a09cf2SJohn Dyson 2588c39a127SStefan Eßer /* Copy the LDT, if necessary. */ 2590ad5e7f3SJeff Roberson mtx_lock_spin(&dt_lock); 260753d1af1SJohn Baldwin if (mdp2->md_ldt != NULL) { 26191c28bfdSLuoqi Chen if (flags & RFMEM) { 26205dfa22fSAttilio Rao mdp2->md_ldt->ldt_refcnt++; 26391c28bfdSLuoqi Chen } else { 26424db0459SJohn Baldwin mdp2->md_ldt = user_ldt_alloc(mdp2, 26524db0459SJohn Baldwin mdp2->md_ldt->ldt_len); 26624db0459SJohn Baldwin if (mdp2->md_ldt == NULL) 267df4d012bSJohn Baldwin panic("could not copy LDT"); 26891c28bfdSLuoqi Chen } 2698c39a127SStefan Eßer } 2700ad5e7f3SJeff Roberson mtx_unlock_spin(&dt_lock); 2718c39a127SStefan Eßer 2721b1618fbSJeff Roberson /* Setup to release spin count in fork_exit(). */ 273c6a37e84SJohn Baldwin td2->td_md.md_spinlock_count = 1; 274c6a37e84SJohn Baldwin td2->td_md.md_saved_flags = PSL_KERNEL | PSL_I; 275ed95805eSJohn Baldwin 276a2a1c95cSPeter Wemm /* 277a2a1c95cSPeter Wemm * Now, cpu_switch() can schedule the new process. 278a2a1c95cSPeter Wemm * pcb_esp is loaded pointing to the cpu_switch() stack frame 279a2a1c95cSPeter Wemm * containing the return address when exiting cpu_switch. 28037b087a6SPeter Wemm * This will normally be to fork_trampoline(), which will have 28137b087a6SPeter Wemm * %ebx loaded with the new proc's pointer. fork_trampoline() 282a2a1c95cSPeter Wemm * will set up a stack to call fork_return(p, frame); to complete 283a2a1c95cSPeter Wemm * the return to user-mode. 284a2a1c95cSPeter Wemm */ 285a2a1c95cSPeter Wemm } 286a2a1c95cSPeter Wemm 287a2a1c95cSPeter Wemm /* 288a2a1c95cSPeter Wemm * Intercept the return address from a freshly forked process that has NOT 289a2a1c95cSPeter Wemm * been scheduled yet. 290a2a1c95cSPeter Wemm * 291a2a1c95cSPeter Wemm * This is needed to make kernel threads stay in kernel mode. 292a2a1c95cSPeter Wemm */ 293a2a1c95cSPeter Wemm void 2945c2cf818SKonstantin Belousov cpu_fork_kthread_handler(struct thread *td, void (*func)(void *), void *arg) 295a2a1c95cSPeter Wemm { 296a2a1c95cSPeter Wemm /* 297a2a1c95cSPeter Wemm * Note that the trap frame follows the args, so the function 298a2a1c95cSPeter Wemm * is really called like this: func(arg, frame); 299a2a1c95cSPeter Wemm */ 300b40ce416SJulian Elischer td->td_pcb->pcb_esi = (int) func; /* function */ 301b40ce416SJulian Elischer td->td_pcb->pcb_ebx = (int) arg; /* first arg */ 3025b81b6b3SRodney W. Grimes } 3035b81b6b3SRodney W. Grimes 3047c2b54e8SNate Williams void 305e602ba25SJulian Elischer cpu_exit(struct thread *td) 306e602ba25SJulian Elischer { 307e602ba25SJulian Elischer 308bc2e774aSJohn Baldwin /* 309bc2e774aSJohn Baldwin * If this process has a custom LDT, release it. Reset pc->pcb_gs 310bc2e774aSJohn Baldwin * and %gs before we free it in case they refer to an LDT entry. 311bc2e774aSJohn Baldwin */ 3120ad5e7f3SJeff Roberson mtx_lock_spin(&dt_lock); 313bc2e774aSJohn Baldwin if (td->td_proc->p_md.md_ldt) { 31466250360SDavid Xu td->td_pcb->pcb_gs = _udatasel; 31566250360SDavid Xu load_gs(_udatasel); 316e602ba25SJulian Elischer user_ldt_free(td); 31702b0a160SAttilio Rao } else 3180ad5e7f3SJeff Roberson mtx_unlock_spin(&dt_lock); 319e602ba25SJulian Elischer } 320e602ba25SJulian Elischer 321e602ba25SJulian Elischer void 322e602ba25SJulian Elischer cpu_thread_exit(struct thread *td) 3235b81b6b3SRodney W. Grimes { 3244cc99cf6SJohn Baldwin 3251060a94fSKonstantin Belousov critical_enter(); 326d5e1f581SDavid Xu if (td == PCPU_GET(fpcurthread)) 327d5e1f581SDavid Xu npxdrop(); 3281060a94fSKonstantin Belousov critical_exit(); 329bc2e774aSJohn Baldwin 330bc2e774aSJohn Baldwin /* Disable any hardware breakpoints. */ 331bc2e774aSJohn Baldwin if (td->td_pcb->pcb_flags & PCB_DBREGS) { 332b19d9defSMaxime Henrion reset_dbregs(); 333bc2e774aSJohn Baldwin td->td_pcb->pcb_flags &= ~PCB_DBREGS; 334b19d9defSMaxime Henrion } 335b19d9defSMaxime Henrion } 336b19d9defSMaxime Henrion 337b19d9defSMaxime Henrion void 338696058c3SJulian Elischer cpu_thread_clean(struct thread *td) 339b19d9defSMaxime Henrion { 340b19d9defSMaxime Henrion struct pcb *pcb; 341b19d9defSMaxime Henrion 342b19d9defSMaxime Henrion pcb = td->td_pcb; 343ae3676c4SJohn Baldwin if (pcb->pcb_ext != NULL) { 344e602ba25SJulian Elischer /* if (pcb->pcb_ext->ext_refcount-- == 1) ?? */ 34548a09cf2SJohn Dyson /* 34648a09cf2SJohn Dyson * XXX do we need to move the TSS off the allocated pages 34748a09cf2SJohn Dyson * before freeing them? (not done here) 34848a09cf2SJohn Dyson */ 349*d86c1f0dSKonstantin Belousov pmap_trm_free(pcb->pcb_ext, ctob(IOPAGES + 1)); 350ae3676c4SJohn Baldwin pcb->pcb_ext = NULL; 35148a09cf2SJohn Dyson } 3525b81b6b3SRodney W. Grimes } 3535b81b6b3SRodney W. Grimes 354381fe1aaSGarrett Wollman void 355710338e9SMarcel Moolenaar cpu_thread_swapin(struct thread *td) 356710338e9SMarcel Moolenaar { 357710338e9SMarcel Moolenaar } 358710338e9SMarcel Moolenaar 359710338e9SMarcel Moolenaar void 360710338e9SMarcel Moolenaar cpu_thread_swapout(struct thread *td) 361710338e9SMarcel Moolenaar { 362710338e9SMarcel Moolenaar } 363710338e9SMarcel Moolenaar 364710338e9SMarcel Moolenaar void 3650c3967e7SMarcel Moolenaar cpu_thread_alloc(struct thread *td) 366e602ba25SJulian Elischer { 367824fc460SJohn Baldwin struct pcb *pcb; 368824fc460SJohn Baldwin struct xstate_hdr *xhdr; 369e602ba25SJulian Elischer 370824fc460SJohn Baldwin td->td_pcb = pcb = get_pcb_td(td); 371*d86c1f0dSKonstantin Belousov td->td_frame = (struct trapframe *)((caddr_t)pcb - 372*d86c1f0dSKonstantin Belousov VM86_STACK_SPACE) - 1; 373824fc460SJohn Baldwin pcb->pcb_ext = NULL; 374824fc460SJohn Baldwin pcb->pcb_save = get_pcb_user_save_pcb(pcb); 375824fc460SJohn Baldwin if (use_xsave) { 376824fc460SJohn Baldwin xhdr = (struct xstate_hdr *)(pcb->pcb_save + 1); 377824fc460SJohn Baldwin bzero(xhdr, sizeof(*xhdr)); 378824fc460SJohn Baldwin xhdr->xstate_bv = xsave_mask; 379824fc460SJohn Baldwin } 380e602ba25SJulian Elischer } 381e602ba25SJulian Elischer 3820c3967e7SMarcel Moolenaar void 3830c3967e7SMarcel Moolenaar cpu_thread_free(struct thread *td) 3840c3967e7SMarcel Moolenaar { 3850c3967e7SMarcel Moolenaar 3860c3967e7SMarcel Moolenaar cpu_thread_clean(td); 3870c3967e7SMarcel Moolenaar } 3880c3967e7SMarcel Moolenaar 389a7b89044SKonstantin Belousov void 390a7b89044SKonstantin Belousov cpu_set_syscall_retval(struct thread *td, int error) 391a7b89044SKonstantin Belousov { 392a7b89044SKonstantin Belousov 393a7b89044SKonstantin Belousov switch (error) { 394a7b89044SKonstantin Belousov case 0: 395a7b89044SKonstantin Belousov td->td_frame->tf_eax = td->td_retval[0]; 396a7b89044SKonstantin Belousov td->td_frame->tf_edx = td->td_retval[1]; 397a7b89044SKonstantin Belousov td->td_frame->tf_eflags &= ~PSL_C; 398a7b89044SKonstantin Belousov break; 399a7b89044SKonstantin Belousov 400a7b89044SKonstantin Belousov case ERESTART: 401a7b89044SKonstantin Belousov /* 402a7b89044SKonstantin Belousov * Reconstruct pc, assuming lcall $X,y is 7 bytes, int 403a7b89044SKonstantin Belousov * 0x80 is 2 bytes. We saved this in tf_err. 404a7b89044SKonstantin Belousov */ 405a7b89044SKonstantin Belousov td->td_frame->tf_eip -= td->td_frame->tf_err; 406a7b89044SKonstantin Belousov break; 407a7b89044SKonstantin Belousov 408a7b89044SKonstantin Belousov case EJUSTRETURN: 409a7b89044SKonstantin Belousov break; 410a7b89044SKonstantin Belousov 411a7b89044SKonstantin Belousov default: 4125437e1d1SDmitry Chagin td->td_frame->tf_eax = SV_ABI_ERRNO(td->td_proc, error); 413a7b89044SKonstantin Belousov td->td_frame->tf_eflags |= PSL_C; 414a7b89044SKonstantin Belousov break; 415a7b89044SKonstantin Belousov } 416a7b89044SKonstantin Belousov } 417a7b89044SKonstantin Belousov 418e602ba25SJulian Elischer /* 4195c2cf818SKonstantin Belousov * Initialize machine state, mostly pcb and trap frame for a new 4205c2cf818SKonstantin Belousov * thread, about to return to userspace. Put enough state in the new 4215c2cf818SKonstantin Belousov * thread's PCB to get it to go back to the fork_return(), which 4225c2cf818SKonstantin Belousov * finalizes the thread state and handles peculiarities of the first 4235c2cf818SKonstantin Belousov * return to userspace for the new thread. 424e602ba25SJulian Elischer */ 425e602ba25SJulian Elischer void 4265c2cf818SKonstantin Belousov cpu_copy_thread(struct thread *td, struct thread *td0) 427e602ba25SJulian Elischer { 428e602ba25SJulian Elischer struct pcb *pcb2; 429e602ba25SJulian Elischer 430e602ba25SJulian Elischer /* Point the pcb to the top of the stack. */ 431e602ba25SJulian Elischer pcb2 = td->td_pcb; 432e602ba25SJulian Elischer 433e602ba25SJulian Elischer /* 434e602ba25SJulian Elischer * Copy the upcall pcb. This loads kernel regs. 435e602ba25SJulian Elischer * Those not loaded individually below get their default 436e602ba25SJulian Elischer * values here. 437e602ba25SJulian Elischer */ 43811e0f8e1SMarcel Moolenaar bcopy(td0->td_pcb, pcb2, sizeof(*pcb2)); 43965f99c74SKonstantin Belousov pcb2->pcb_flags &= ~(PCB_NPXINITDONE | PCB_NPXUSERINITDONE | 44065f99c74SKonstantin Belousov PCB_KERNNPX); 441824fc460SJohn Baldwin pcb2->pcb_save = get_pcb_user_save_pcb(pcb2); 442824fc460SJohn Baldwin bcopy(get_pcb_user_save_td(td0), pcb2->pcb_save, 443824fc460SJohn Baldwin cpu_max_ext_state_size); 444e602ba25SJulian Elischer 445e602ba25SJulian Elischer /* 446e602ba25SJulian Elischer * Create a new fresh stack for the new thread. 447e602ba25SJulian Elischer */ 44811e0f8e1SMarcel Moolenaar bcopy(td0->td_frame, td->td_frame, sizeof(struct trapframe)); 449e602ba25SJulian Elischer 4507ce5e15eSDavid Xu /* If the current thread has the trap bit set (i.e. a debugger had 4517ce5e15eSDavid Xu * single stepped the process to the system call), we need to clear 4527ce5e15eSDavid Xu * the trap flag from the new frame. Otherwise, the new thread will 4537ce5e15eSDavid Xu * receive a (likely unexpected) SIGTRAP when it executes the first 4547ce5e15eSDavid Xu * instruction after returning to userland. 4557ce5e15eSDavid Xu */ 4567ce5e15eSDavid Xu td->td_frame->tf_eflags &= ~PSL_T; 4577ce5e15eSDavid Xu 458e602ba25SJulian Elischer /* 459e602ba25SJulian Elischer * Set registers for trampoline to user mode. Leave space for the 460e602ba25SJulian Elischer * return address on stack. These are the kernel mode register values. 461e602ba25SJulian Elischer */ 462e602ba25SJulian Elischer pcb2->pcb_edi = 0; 463e602ba25SJulian Elischer pcb2->pcb_esi = (int)fork_return; /* trampoline arg */ 464e602ba25SJulian Elischer pcb2->pcb_ebp = 0; 465e602ba25SJulian Elischer pcb2->pcb_esp = (int)td->td_frame - sizeof(void *); /* trampoline arg */ 466e602ba25SJulian Elischer pcb2->pcb_ebx = (int)td; /* trampoline arg */ 467*d86c1f0dSKonstantin Belousov pcb2->pcb_eip = (int)fork_trampoline + setidt_disp; 4682257a44fSDavid Xu pcb2->pcb_gs = rgs(); 469e602ba25SJulian Elischer /* 470e602ba25SJulian Elischer * If we didn't copy the pcb, we'd need to do the following registers: 4719624b51aSAlan Cox * pcb2->pcb_cr3: cloned above. 472e602ba25SJulian Elischer * pcb2->pcb_dr*: cloned above. 473e602ba25SJulian Elischer * pcb2->pcb_savefpu: cloned above. 474e602ba25SJulian Elischer * pcb2->pcb_flags: cloned above. 475e602ba25SJulian Elischer * pcb2->pcb_onfault: cloned above (always NULL here?). 4766617724cSJeff Roberson * pcb2->pcb_gs: cloned above. 477e602ba25SJulian Elischer * pcb2->pcb_ext: cleared below. 478e602ba25SJulian Elischer */ 479e602ba25SJulian Elischer pcb2->pcb_ext = NULL; 480c6a37e84SJohn Baldwin 4811b1618fbSJeff Roberson /* Setup to release spin count in fork_exit(). */ 482c6a37e84SJohn Baldwin td->td_md.md_spinlock_count = 1; 483c6a37e84SJohn Baldwin td->td_md.md_saved_flags = PSL_KERNEL | PSL_I; 484e602ba25SJulian Elischer } 485e602ba25SJulian Elischer 486e602ba25SJulian Elischer /* 4875c2cf818SKonstantin Belousov * Set that machine state for performing an upcall that starts 4885c2cf818SKonstantin Belousov * the entry function with the given argument. 489e602ba25SJulian Elischer */ 490575525a0SJonathan Mini void 4915c2cf818SKonstantin Belousov cpu_set_upcall(struct thread *td, void (*entry)(void *), void *arg, 49221fc3164SDavid Xu stack_t *stack) 493575525a0SJonathan Mini { 494575525a0SJonathan Mini 495575525a0SJonathan Mini /* 496696058c3SJulian Elischer * Do any extra cleaning that needs to be done. 497696058c3SJulian Elischer * The thread may have optional components 498696058c3SJulian Elischer * that are not present in a fresh thread. 499696058c3SJulian Elischer * This may be a recycled thread so make it look 500696058c3SJulian Elischer * as though it's newly allocated. 501696058c3SJulian Elischer */ 502696058c3SJulian Elischer cpu_thread_clean(td); 503696058c3SJulian Elischer 504696058c3SJulian Elischer /* 5055c2cf818SKonstantin Belousov * Set the trap frame to point at the beginning of the entry 506575525a0SJonathan Mini * function. 507575525a0SJonathan Mini */ 5082396628bSDavid Xu td->td_frame->tf_ebp = 0; 509575525a0SJonathan Mini td->td_frame->tf_esp = 510fc643048SDavid Xu (((int)stack->ss_sp + stack->ss_size - 4) & ~0x0f) - 4; 51121fc3164SDavid Xu td->td_frame->tf_eip = (int)entry; 512575525a0SJonathan Mini 513f236378bSTijl Coosemans /* Return address sentinel value to stop stack unwinding. */ 514f236378bSTijl Coosemans suword((void *)td->td_frame->tf_esp, 0); 515f236378bSTijl Coosemans 5165c2cf818SKonstantin Belousov /* Pass the argument to the entry point. */ 517575525a0SJonathan Mini suword((void *)(td->td_frame->tf_esp + sizeof(void *)), 51821fc3164SDavid Xu (int)arg); 51921fc3164SDavid Xu } 52021fc3164SDavid Xu 521740fd64dSDavid Xu int 52221fc3164SDavid Xu cpu_set_user_tls(struct thread *td, void *tls_base) 52321fc3164SDavid Xu { 52421fc3164SDavid Xu struct segment_descriptor sd; 52521fc3164SDavid Xu uint32_t base; 52621fc3164SDavid Xu 52721fc3164SDavid Xu /* 52821fc3164SDavid Xu * Construct a descriptor and store it in the pcb for 52921fc3164SDavid Xu * the next context switch. Also store it in the gdt 53021fc3164SDavid Xu * so that the load of tf_fs into %fs will activate it 53121fc3164SDavid Xu * at return to userland. 53221fc3164SDavid Xu */ 53321fc3164SDavid Xu base = (uint32_t)tls_base; 53421fc3164SDavid Xu sd.sd_lobase = base & 0xffffff; 53521fc3164SDavid Xu sd.sd_hibase = (base >> 24) & 0xff; 53621fc3164SDavid Xu sd.sd_lolimit = 0xffff; /* 4GB limit, wraps around */ 53721fc3164SDavid Xu sd.sd_hilimit = 0xf; 53821fc3164SDavid Xu sd.sd_type = SDT_MEMRWA; 53921fc3164SDavid Xu sd.sd_dpl = SEL_UPL; 54021fc3164SDavid Xu sd.sd_p = 1; 54121fc3164SDavid Xu sd.sd_xx = 0; 54221fc3164SDavid Xu sd.sd_def32 = 1; 54321fc3164SDavid Xu sd.sd_gran = 1; 54421fc3164SDavid Xu critical_enter(); 54521fc3164SDavid Xu /* set %gs */ 54621fc3164SDavid Xu td->td_pcb->pcb_gsd = sd; 54721fc3164SDavid Xu if (td == curthread) { 54821fc3164SDavid Xu PCPU_GET(fsgs_gdt)[1] = sd; 54921fc3164SDavid Xu load_gs(GSEL(GUGS_SEL, SEL_UPL)); 55021fc3164SDavid Xu } 55121fc3164SDavid Xu critical_exit(); 552740fd64dSDavid Xu return (0); 553e602ba25SJulian Elischer } 554e602ba25SJulian Elischer 5555b81b6b3SRodney W. Grimes /* 5565b81b6b3SRodney W. Grimes * Convert kernel VA to physical address 5575b81b6b3SRodney W. Grimes */ 558227f9a1cSJake Burkholder vm_paddr_t 5597f8cb368SDavid Greenman kvtop(void *addr) 5605b81b6b3SRodney W. Grimes { 561227f9a1cSJake Burkholder vm_paddr_t pa; 5625b81b6b3SRodney W. Grimes 563227f9a1cSJake Burkholder pa = pmap_kextract((vm_offset_t)addr); 564227f9a1cSJake Burkholder if (pa == 0) 5655b81b6b3SRodney W. Grimes panic("kvtop: zero page frame"); 566227f9a1cSJake Burkholder return (pa); 5675b81b6b3SRodney W. Grimes } 5685b81b6b3SRodney W. Grimes 569e0b78e19SJoerg Wunsch /* 570b1e5dcf7SRobert Watson * Get an sf_buf from the freelist. May block if none are available. 571411d10a6SAlan Cox */ 572c8d2ffd6SGleb Smirnoff void 573c8d2ffd6SGleb Smirnoff sf_buf_map(struct sf_buf *sf, int flags) 574411d10a6SAlan Cox { 57520351fafSAlan Cox pt_entry_t opte, *ptep; 57620351fafSAlan Cox 57720351fafSAlan Cox /* 57820351fafSAlan Cox * Update the sf_buf's virtual-to-physical mapping, flushing the 5794c0e268aSStephan Uphoff * virtual address from the TLB. Since the reference count for 5804c0e268aSStephan Uphoff * the sf_buf's old mapping was zero, that mapping is not 5814c0e268aSStephan Uphoff * currently in use. Consequently, there is no need to exchange 5824c0e268aSStephan Uphoff * the old and new PTEs atomically, even under PAE. 58320351fafSAlan Cox */ 58420351fafSAlan Cox ptep = vtopte(sf->kva); 58520351fafSAlan Cox opte = *ptep; 586*d86c1f0dSKonstantin Belousov *ptep = VM_PAGE_TO_PHYS(sf->m) | PG_RW | PG_V | 587c8d2ffd6SGleb Smirnoff pmap_cache_bits(sf->m->md.pat_mode, 0); 588c71c8706SAlan Cox 589c71c8706SAlan Cox /* 590c71c8706SAlan Cox * Avoid unnecessary TLB invalidations: If the sf_buf's old 591c71c8706SAlan Cox * virtual-to-physical mapping was not used, then any processor 592c71c8706SAlan Cox * that has invalidated the sf_buf's virtual address from its TLB 593c71c8706SAlan Cox * since the last used mapping need not invalidate again. 594c71c8706SAlan Cox */ 5955c0db7c7SAlan Cox #ifdef SMP 596f6f67ea9SStephan Uphoff if ((opte & (PG_V | PG_A)) == (PG_V | PG_A)) 59771a19bdcSAttilio Rao CPU_ZERO(&sf->cpumask); 598c8d2ffd6SGleb Smirnoff 599c8d2ffd6SGleb Smirnoff sf_buf_shootdown(sf, flags); 600c8d2ffd6SGleb Smirnoff #else 601c8d2ffd6SGleb Smirnoff if ((opte & (PG_V | PG_A)) == (PG_V | PG_A)) 602c8d2ffd6SGleb Smirnoff pmap_invalidate_page(kernel_pmap, sf->kva); 603c8d2ffd6SGleb Smirnoff #endif 604c8d2ffd6SGleb Smirnoff } 605c8d2ffd6SGleb Smirnoff 606c8d2ffd6SGleb Smirnoff #ifdef SMP 607c8d2ffd6SGleb Smirnoff void 608c8d2ffd6SGleb Smirnoff sf_buf_shootdown(struct sf_buf *sf, int flags) 609c8d2ffd6SGleb Smirnoff { 610c8d2ffd6SGleb Smirnoff cpuset_t other_cpus; 611c8d2ffd6SGleb Smirnoff u_int cpuid; 612c8d2ffd6SGleb Smirnoff 613f6f67ea9SStephan Uphoff sched_pin(); 614250a44f6SAttilio Rao cpuid = PCPU_GET(cpuid); 615250a44f6SAttilio Rao if (!CPU_ISSET(cpuid, &sf->cpumask)) { 616250a44f6SAttilio Rao CPU_SET(cpuid, &sf->cpumask); 6175c0db7c7SAlan Cox invlpg(sf->kva); 6184c0e268aSStephan Uphoff } 619f6f67ea9SStephan Uphoff if ((flags & SFB_CPUPRIVATE) == 0) { 620250a44f6SAttilio Rao other_cpus = all_cpus; 621250a44f6SAttilio Rao CPU_CLR(cpuid, &other_cpus); 62271a19bdcSAttilio Rao CPU_NAND(&other_cpus, &sf->cpumask); 62371a19bdcSAttilio Rao if (!CPU_EMPTY(&other_cpus)) { 62471a19bdcSAttilio Rao CPU_OR(&sf->cpumask, &other_cpus); 625c8f9c1f3SKonstantin Belousov smp_masked_invlpg(other_cpus, sf->kva, kernel_pmap); 626f6f67ea9SStephan Uphoff } 627f6f67ea9SStephan Uphoff } 628f6f67ea9SStephan Uphoff sched_unpin(); 629411d10a6SAlan Cox } 630c8d2ffd6SGleb Smirnoff #endif 631411d10a6SAlan Cox 632411d10a6SAlan Cox /* 633c8d2ffd6SGleb Smirnoff * MD part of sf_buf_free(). 634411d10a6SAlan Cox */ 635c8d2ffd6SGleb Smirnoff int 636c8d2ffd6SGleb Smirnoff sf_buf_unmap(struct sf_buf *sf) 637411d10a6SAlan Cox { 638ed95805eSJohn Baldwin 639c8d2ffd6SGleb Smirnoff return (0); 6400543fa53SAlan Cox } 641c8d2ffd6SGleb Smirnoff 642c8d2ffd6SGleb Smirnoff static void 643c8d2ffd6SGleb Smirnoff sf_buf_invalidate(struct sf_buf *sf) 644c8d2ffd6SGleb Smirnoff { 645c8d2ffd6SGleb Smirnoff vm_page_t m = sf->m; 646c8d2ffd6SGleb Smirnoff 647c8d2ffd6SGleb Smirnoff /* 648c8d2ffd6SGleb Smirnoff * Use pmap_qenter to update the pte for 649c8d2ffd6SGleb Smirnoff * existing mapping, in particular, the PAT 650c8d2ffd6SGleb Smirnoff * settings are recalculated. 651c8d2ffd6SGleb Smirnoff */ 652c8d2ffd6SGleb Smirnoff pmap_qenter(sf->kva, &m, 1); 65307a92f34SKonstantin Belousov pmap_invalidate_cache_range(sf->kva, sf->kva + PAGE_SIZE, FALSE); 654c8d2ffd6SGleb Smirnoff } 655c8d2ffd6SGleb Smirnoff 656c8d2ffd6SGleb Smirnoff /* 657c8d2ffd6SGleb Smirnoff * Invalidate the cache lines that may belong to the page, if 658c8d2ffd6SGleb Smirnoff * (possibly old) mapping of the page by sf buffer exists. Returns 659c8d2ffd6SGleb Smirnoff * TRUE when mapping was found and cache invalidated. 660c8d2ffd6SGleb Smirnoff */ 661c8d2ffd6SGleb Smirnoff boolean_t 662c8d2ffd6SGleb Smirnoff sf_buf_invalidate_cache(vm_page_t m) 663c8d2ffd6SGleb Smirnoff { 664c8d2ffd6SGleb Smirnoff 665c8d2ffd6SGleb Smirnoff return (sf_buf_process_page(m, sf_buf_invalidate)); 666411d10a6SAlan Cox } 667411d10a6SAlan Cox 668411d10a6SAlan Cox /* 66957d7d7b3SJustin T. Gibbs * Software interrupt handler for queued VM system processing. 67057d7d7b3SJustin T. Gibbs */ 67157d7d7b3SJustin T. Gibbs void 6728088699fSJohn Baldwin swi_vm(void *dummy) 67357d7d7b3SJustin T. Gibbs { 67457d7d7b3SJustin T. Gibbs if (busdma_swi_pending != 0) 67557d7d7b3SJustin T. Gibbs busdma_swi(); 67657d7d7b3SJustin T. Gibbs } 67757d7d7b3SJustin T. Gibbs 67857d7d7b3SJustin T. Gibbs /* 679cae6f73aSJoerg Wunsch * Tell whether this address is in some physical memory region. 680e0b78e19SJoerg Wunsch * Currently used by the kernel coredump code in order to avoid 681e0b78e19SJoerg Wunsch * dumping the ``ISA memory hole'' which could cause indefinite hangs, 682e0b78e19SJoerg Wunsch * or other unpredictable behaviour. 683e0b78e19SJoerg Wunsch */ 684e0b78e19SJoerg Wunsch 685e0b78e19SJoerg Wunsch int 6862c38d78eSAlan Cox is_physical_memory(vm_paddr_t addr) 687e0b78e19SJoerg Wunsch { 688e0b78e19SJoerg Wunsch 68903927d3cSPeter Wemm #ifdef DEV_ISA 690e0b78e19SJoerg Wunsch /* The ISA ``memory hole''. */ 691e0b78e19SJoerg Wunsch if (addr >= 0xa0000 && addr < 0x100000) 692cae6f73aSJoerg Wunsch return 0; 693e0b78e19SJoerg Wunsch #endif 694e0b78e19SJoerg Wunsch 695e0b78e19SJoerg Wunsch /* 696e0b78e19SJoerg Wunsch * stuff other tests for known memory-mapped devices (PCI?) 697e0b78e19SJoerg Wunsch * here 698e0b78e19SJoerg Wunsch */ 699e0b78e19SJoerg Wunsch 700cae6f73aSJoerg Wunsch return 1; 701e0b78e19SJoerg Wunsch } 702