xref: /freebsd/sys/vm/vm_fault.c (revision 47dd1d1b619cc035b82b49a91a25544309ff95ae)
1 /*-
2  * SPDX-License-Identifier: (BSD-4-Clause AND MIT-CMU)
3  *
4  * Copyright (c) 1991, 1993
5  *	The Regents of the University of California.  All rights reserved.
6  * Copyright (c) 1994 John S. Dyson
7  * All rights reserved.
8  * Copyright (c) 1994 David Greenman
9  * All rights reserved.
10  *
11  *
12  * This code is derived from software contributed to Berkeley by
13  * The Mach Operating System project at Carnegie-Mellon University.
14  *
15  * Redistribution and use in source and binary forms, with or without
16  * modification, are permitted provided that the following conditions
17  * are met:
18  * 1. Redistributions of source code must retain the above copyright
19  *    notice, this list of conditions and the following disclaimer.
20  * 2. Redistributions in binary form must reproduce the above copyright
21  *    notice, this list of conditions and the following disclaimer in the
22  *    documentation and/or other materials provided with the distribution.
23  * 3. All advertising materials mentioning features or use of this software
24  *    must display the following acknowledgement:
25  *	This product includes software developed by the University of
26  *	California, Berkeley and its contributors.
27  * 4. Neither the name of the University nor the names of its contributors
28  *    may be used to endorse or promote products derived from this software
29  *    without specific prior written permission.
30  *
31  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
32  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
33  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
34  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
35  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
36  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
37  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
38  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
39  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
40  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
41  * SUCH DAMAGE.
42  *
43  *	from: @(#)vm_fault.c	8.4 (Berkeley) 1/12/94
44  *
45  *
46  * Copyright (c) 1987, 1990 Carnegie-Mellon University.
47  * All rights reserved.
48  *
49  * Authors: Avadis Tevanian, Jr., Michael Wayne Young
50  *
51  * Permission to use, copy, modify and distribute this software and
52  * its documentation is hereby granted, provided that both the copyright
53  * notice and this permission notice appear in all copies of the
54  * software, derivative works or modified versions, and any portions
55  * thereof, and that both notices appear in supporting documentation.
56  *
57  * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS"
58  * CONDITION.  CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND
59  * FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
60  *
61  * Carnegie Mellon requests users of this software to return to
62  *
63  *  Software Distribution Coordinator  or  Software.Distribution@CS.CMU.EDU
64  *  School of Computer Science
65  *  Carnegie Mellon University
66  *  Pittsburgh PA 15213-3890
67  *
68  * any improvements or extensions that they make and grant Carnegie the
69  * rights to redistribute these changes.
70  */
71 
72 /*
73  *	Page fault handling module.
74  */
75 
76 #include <sys/cdefs.h>
77 __FBSDID("$FreeBSD$");
78 
79 #include "opt_ktrace.h"
80 #include "opt_vm.h"
81 
82 #include <sys/param.h>
83 #include <sys/systm.h>
84 #include <sys/kernel.h>
85 #include <sys/lock.h>
86 #include <sys/mman.h>
87 #include <sys/proc.h>
88 #include <sys/racct.h>
89 #include <sys/resourcevar.h>
90 #include <sys/rwlock.h>
91 #include <sys/sysctl.h>
92 #include <sys/vmmeter.h>
93 #include <sys/vnode.h>
94 #ifdef KTRACE
95 #include <sys/ktrace.h>
96 #endif
97 
98 #include <vm/vm.h>
99 #include <vm/vm_param.h>
100 #include <vm/pmap.h>
101 #include <vm/vm_map.h>
102 #include <vm/vm_object.h>
103 #include <vm/vm_page.h>
104 #include <vm/vm_pageout.h>
105 #include <vm/vm_kern.h>
106 #include <vm/vm_pager.h>
107 #include <vm/vm_extern.h>
108 #include <vm/vm_reserv.h>
109 
110 #define PFBAK 4
111 #define PFFOR 4
112 
113 #define	VM_FAULT_READ_DEFAULT	(1 + VM_FAULT_READ_AHEAD_INIT)
114 #define	VM_FAULT_READ_MAX	(1 + VM_FAULT_READ_AHEAD_MAX)
115 
116 #define	VM_FAULT_DONTNEED_MIN	1048576
117 
118 struct faultstate {
119 	vm_page_t m;
120 	vm_object_t object;
121 	vm_pindex_t pindex;
122 	vm_page_t first_m;
123 	vm_object_t	first_object;
124 	vm_pindex_t first_pindex;
125 	vm_map_t map;
126 	vm_map_entry_t entry;
127 	int map_generation;
128 	bool lookup_still_valid;
129 	struct vnode *vp;
130 };
131 
132 static void vm_fault_dontneed(const struct faultstate *fs, vm_offset_t vaddr,
133 	    int ahead);
134 static void vm_fault_prefault(const struct faultstate *fs, vm_offset_t addra,
135 	    int backward, int forward, bool obj_locked);
136 
137 static inline void
138 release_page(struct faultstate *fs)
139 {
140 
141 	vm_page_xunbusy(fs->m);
142 	vm_page_lock(fs->m);
143 	vm_page_deactivate(fs->m);
144 	vm_page_unlock(fs->m);
145 	fs->m = NULL;
146 }
147 
148 static inline void
149 unlock_map(struct faultstate *fs)
150 {
151 
152 	if (fs->lookup_still_valid) {
153 		vm_map_lookup_done(fs->map, fs->entry);
154 		fs->lookup_still_valid = false;
155 	}
156 }
157 
158 static void
159 unlock_vp(struct faultstate *fs)
160 {
161 
162 	if (fs->vp != NULL) {
163 		vput(fs->vp);
164 		fs->vp = NULL;
165 	}
166 }
167 
168 static void
169 unlock_and_deallocate(struct faultstate *fs)
170 {
171 
172 	vm_object_pip_wakeup(fs->object);
173 	VM_OBJECT_WUNLOCK(fs->object);
174 	if (fs->object != fs->first_object) {
175 		VM_OBJECT_WLOCK(fs->first_object);
176 		vm_page_lock(fs->first_m);
177 		vm_page_free(fs->first_m);
178 		vm_page_unlock(fs->first_m);
179 		vm_object_pip_wakeup(fs->first_object);
180 		VM_OBJECT_WUNLOCK(fs->first_object);
181 		fs->first_m = NULL;
182 	}
183 	vm_object_deallocate(fs->first_object);
184 	unlock_map(fs);
185 	unlock_vp(fs);
186 }
187 
188 static void
189 vm_fault_dirty(vm_map_entry_t entry, vm_page_t m, vm_prot_t prot,
190     vm_prot_t fault_type, int fault_flags, bool set_wd)
191 {
192 	bool need_dirty;
193 
194 	if (((prot & VM_PROT_WRITE) == 0 &&
195 	    (fault_flags & VM_FAULT_DIRTY) == 0) ||
196 	    (m->oflags & VPO_UNMANAGED) != 0)
197 		return;
198 
199 	VM_OBJECT_ASSERT_LOCKED(m->object);
200 
201 	need_dirty = ((fault_type & VM_PROT_WRITE) != 0 &&
202 	    (fault_flags & VM_FAULT_WIRE) == 0) ||
203 	    (fault_flags & VM_FAULT_DIRTY) != 0;
204 
205 	if (set_wd)
206 		vm_object_set_writeable_dirty(m->object);
207 	else
208 		/*
209 		 * If two callers of vm_fault_dirty() with set_wd ==
210 		 * FALSE, one for the map entry with MAP_ENTRY_NOSYNC
211 		 * flag set, other with flag clear, race, it is
212 		 * possible for the no-NOSYNC thread to see m->dirty
213 		 * != 0 and not clear VPO_NOSYNC.  Take vm_page lock
214 		 * around manipulation of VPO_NOSYNC and
215 		 * vm_page_dirty() call, to avoid the race and keep
216 		 * m->oflags consistent.
217 		 */
218 		vm_page_lock(m);
219 
220 	/*
221 	 * If this is a NOSYNC mmap we do not want to set VPO_NOSYNC
222 	 * if the page is already dirty to prevent data written with
223 	 * the expectation of being synced from not being synced.
224 	 * Likewise if this entry does not request NOSYNC then make
225 	 * sure the page isn't marked NOSYNC.  Applications sharing
226 	 * data should use the same flags to avoid ping ponging.
227 	 */
228 	if ((entry->eflags & MAP_ENTRY_NOSYNC) != 0) {
229 		if (m->dirty == 0) {
230 			m->oflags |= VPO_NOSYNC;
231 		}
232 	} else {
233 		m->oflags &= ~VPO_NOSYNC;
234 	}
235 
236 	/*
237 	 * If the fault is a write, we know that this page is being
238 	 * written NOW so dirty it explicitly to save on
239 	 * pmap_is_modified() calls later.
240 	 *
241 	 * Also, since the page is now dirty, we can possibly tell
242 	 * the pager to release any swap backing the page.  Calling
243 	 * the pager requires a write lock on the object.
244 	 */
245 	if (need_dirty)
246 		vm_page_dirty(m);
247 	if (!set_wd)
248 		vm_page_unlock(m);
249 	else if (need_dirty)
250 		vm_pager_page_unswapped(m);
251 }
252 
253 static void
254 vm_fault_fill_hold(vm_page_t *m_hold, vm_page_t m)
255 {
256 
257 	if (m_hold != NULL) {
258 		*m_hold = m;
259 		vm_page_lock(m);
260 		vm_page_hold(m);
261 		vm_page_unlock(m);
262 	}
263 }
264 
265 /*
266  * Unlocks fs.first_object and fs.map on success.
267  */
268 static int
269 vm_fault_soft_fast(struct faultstate *fs, vm_offset_t vaddr, vm_prot_t prot,
270     int fault_type, int fault_flags, boolean_t wired, vm_page_t *m_hold)
271 {
272 	vm_page_t m, m_map;
273 #if defined(__amd64__) && VM_NRESERVLEVEL > 0
274 	vm_page_t m_super;
275 	int flags;
276 #endif
277 	int psind, rv;
278 
279 	MPASS(fs->vp == NULL);
280 	m = vm_page_lookup(fs->first_object, fs->first_pindex);
281 	/* A busy page can be mapped for read|execute access. */
282 	if (m == NULL || ((prot & VM_PROT_WRITE) != 0 &&
283 	    vm_page_busied(m)) || m->valid != VM_PAGE_BITS_ALL)
284 		return (KERN_FAILURE);
285 	m_map = m;
286 	psind = 0;
287 #if defined(__amd64__) && VM_NRESERVLEVEL > 0
288 	if ((m->flags & PG_FICTITIOUS) == 0 &&
289 	    (m_super = vm_reserv_to_superpage(m)) != NULL &&
290 	    rounddown2(vaddr, pagesizes[m_super->psind]) >= fs->entry->start &&
291 	    roundup2(vaddr + 1, pagesizes[m_super->psind]) <= fs->entry->end &&
292 	    (vaddr & (pagesizes[m_super->psind] - 1)) == (VM_PAGE_TO_PHYS(m) &
293 	    (pagesizes[m_super->psind] - 1)) &&
294 	    pmap_ps_enabled(fs->map->pmap)) {
295 		flags = PS_ALL_VALID;
296 		if ((prot & VM_PROT_WRITE) != 0) {
297 			/*
298 			 * Create a superpage mapping allowing write access
299 			 * only if none of the constituent pages are busy and
300 			 * all of them are already dirty (except possibly for
301 			 * the page that was faulted on).
302 			 */
303 			flags |= PS_NONE_BUSY;
304 			if ((fs->first_object->flags & OBJ_UNMANAGED) == 0)
305 				flags |= PS_ALL_DIRTY;
306 		}
307 		if (vm_page_ps_test(m_super, flags, m)) {
308 			m_map = m_super;
309 			psind = m_super->psind;
310 			vaddr = rounddown2(vaddr, pagesizes[psind]);
311 			/* Preset the modified bit for dirty superpages. */
312 			if ((flags & PS_ALL_DIRTY) != 0)
313 				fault_type |= VM_PROT_WRITE;
314 		}
315 	}
316 #endif
317 	rv = pmap_enter(fs->map->pmap, vaddr, m_map, prot, fault_type |
318 	    PMAP_ENTER_NOSLEEP | (wired ? PMAP_ENTER_WIRED : 0), psind);
319 	if (rv != KERN_SUCCESS)
320 		return (rv);
321 	vm_fault_fill_hold(m_hold, m);
322 	vm_fault_dirty(fs->entry, m, prot, fault_type, fault_flags, false);
323 	if (psind == 0 && !wired)
324 		vm_fault_prefault(fs, vaddr, PFBAK, PFFOR, true);
325 	VM_OBJECT_RUNLOCK(fs->first_object);
326 	vm_map_lookup_done(fs->map, fs->entry);
327 	curthread->td_ru.ru_minflt++;
328 	return (KERN_SUCCESS);
329 }
330 
331 static void
332 vm_fault_restore_map_lock(struct faultstate *fs)
333 {
334 
335 	VM_OBJECT_ASSERT_WLOCKED(fs->first_object);
336 	MPASS(fs->first_object->paging_in_progress > 0);
337 
338 	if (!vm_map_trylock_read(fs->map)) {
339 		VM_OBJECT_WUNLOCK(fs->first_object);
340 		vm_map_lock_read(fs->map);
341 		VM_OBJECT_WLOCK(fs->first_object);
342 	}
343 	fs->lookup_still_valid = true;
344 }
345 
346 static void
347 vm_fault_populate_check_page(vm_page_t m)
348 {
349 
350 	/*
351 	 * Check each page to ensure that the pager is obeying the
352 	 * interface: the page must be installed in the object, fully
353 	 * valid, and exclusively busied.
354 	 */
355 	MPASS(m != NULL);
356 	MPASS(m->valid == VM_PAGE_BITS_ALL);
357 	MPASS(vm_page_xbusied(m));
358 }
359 
360 static void
361 vm_fault_populate_cleanup(vm_object_t object, vm_pindex_t first,
362     vm_pindex_t last)
363 {
364 	vm_page_t m;
365 	vm_pindex_t pidx;
366 
367 	VM_OBJECT_ASSERT_WLOCKED(object);
368 	MPASS(first <= last);
369 	for (pidx = first, m = vm_page_lookup(object, pidx);
370 	    pidx <= last; pidx++, m = vm_page_next(m)) {
371 		vm_fault_populate_check_page(m);
372 		vm_page_lock(m);
373 		vm_page_deactivate(m);
374 		vm_page_unlock(m);
375 		vm_page_xunbusy(m);
376 	}
377 }
378 
379 static int
380 vm_fault_populate(struct faultstate *fs, vm_offset_t vaddr, vm_prot_t prot,
381     int fault_type, int fault_flags, boolean_t wired, vm_page_t *m_hold)
382 {
383 	vm_page_t m;
384 	vm_pindex_t map_first, map_last, pager_first, pager_last, pidx;
385 	int rv;
386 
387 	MPASS(fs->object == fs->first_object);
388 	VM_OBJECT_ASSERT_WLOCKED(fs->first_object);
389 	MPASS(fs->first_object->paging_in_progress > 0);
390 	MPASS(fs->first_object->backing_object == NULL);
391 	MPASS(fs->lookup_still_valid);
392 
393 	pager_first = OFF_TO_IDX(fs->entry->offset);
394 	pager_last = pager_first + atop(fs->entry->end - fs->entry->start) - 1;
395 	unlock_map(fs);
396 	unlock_vp(fs);
397 
398 	/*
399 	 * Call the pager (driver) populate() method.
400 	 *
401 	 * There is no guarantee that the method will be called again
402 	 * if the current fault is for read, and a future fault is
403 	 * for write.  Report the entry's maximum allowed protection
404 	 * to the driver.
405 	 */
406 	rv = vm_pager_populate(fs->first_object, fs->first_pindex,
407 	    fault_type, fs->entry->max_protection, &pager_first, &pager_last);
408 
409 	VM_OBJECT_ASSERT_WLOCKED(fs->first_object);
410 	if (rv == VM_PAGER_BAD) {
411 		/*
412 		 * VM_PAGER_BAD is the backdoor for a pager to request
413 		 * normal fault handling.
414 		 */
415 		vm_fault_restore_map_lock(fs);
416 		if (fs->map->timestamp != fs->map_generation)
417 			return (KERN_RESOURCE_SHORTAGE); /* RetryFault */
418 		return (KERN_NOT_RECEIVER);
419 	}
420 	if (rv != VM_PAGER_OK)
421 		return (KERN_FAILURE); /* AKA SIGSEGV */
422 
423 	/* Ensure that the driver is obeying the interface. */
424 	MPASS(pager_first <= pager_last);
425 	MPASS(fs->first_pindex <= pager_last);
426 	MPASS(fs->first_pindex >= pager_first);
427 	MPASS(pager_last < fs->first_object->size);
428 
429 	vm_fault_restore_map_lock(fs);
430 	if (fs->map->timestamp != fs->map_generation) {
431 		vm_fault_populate_cleanup(fs->first_object, pager_first,
432 		    pager_last);
433 		return (KERN_RESOURCE_SHORTAGE); /* RetryFault */
434 	}
435 
436 	/*
437 	 * The map is unchanged after our last unlock.  Process the fault.
438 	 *
439 	 * The range [pager_first, pager_last] that is given to the
440 	 * pager is only a hint.  The pager may populate any range
441 	 * within the object that includes the requested page index.
442 	 * In case the pager expanded the range, clip it to fit into
443 	 * the map entry.
444 	 */
445 	map_first = OFF_TO_IDX(fs->entry->offset);
446 	if (map_first > pager_first) {
447 		vm_fault_populate_cleanup(fs->first_object, pager_first,
448 		    map_first - 1);
449 		pager_first = map_first;
450 	}
451 	map_last = map_first + atop(fs->entry->end - fs->entry->start) - 1;
452 	if (map_last < pager_last) {
453 		vm_fault_populate_cleanup(fs->first_object, map_last + 1,
454 		    pager_last);
455 		pager_last = map_last;
456 	}
457 	for (pidx = pager_first, m = vm_page_lookup(fs->first_object, pidx);
458 	    pidx <= pager_last; pidx++, m = vm_page_next(m)) {
459 		vm_fault_populate_check_page(m);
460 		vm_fault_dirty(fs->entry, m, prot, fault_type, fault_flags,
461 		    true);
462 		VM_OBJECT_WUNLOCK(fs->first_object);
463 		pmap_enter(fs->map->pmap, fs->entry->start + IDX_TO_OFF(pidx) -
464 		    fs->entry->offset, m, prot, fault_type | (wired ?
465 		    PMAP_ENTER_WIRED : 0), 0);
466 		VM_OBJECT_WLOCK(fs->first_object);
467 		if (pidx == fs->first_pindex)
468 			vm_fault_fill_hold(m_hold, m);
469 		vm_page_lock(m);
470 		if ((fault_flags & VM_FAULT_WIRE) != 0) {
471 			KASSERT(wired, ("VM_FAULT_WIRE && !wired"));
472 			vm_page_wire(m);
473 		} else {
474 			vm_page_activate(m);
475 		}
476 		vm_page_unlock(m);
477 		vm_page_xunbusy(m);
478 	}
479 	curthread->td_ru.ru_majflt++;
480 	return (KERN_SUCCESS);
481 }
482 
483 /*
484  *	vm_fault:
485  *
486  *	Handle a page fault occurring at the given address,
487  *	requiring the given permissions, in the map specified.
488  *	If successful, the page is inserted into the
489  *	associated physical map.
490  *
491  *	NOTE: the given address should be truncated to the
492  *	proper page address.
493  *
494  *	KERN_SUCCESS is returned if the page fault is handled; otherwise,
495  *	a standard error specifying why the fault is fatal is returned.
496  *
497  *	The map in question must be referenced, and remains so.
498  *	Caller may hold no locks.
499  */
500 int
501 vm_fault(vm_map_t map, vm_offset_t vaddr, vm_prot_t fault_type,
502     int fault_flags)
503 {
504 	struct thread *td;
505 	int result;
506 
507 	td = curthread;
508 	if ((td->td_pflags & TDP_NOFAULTING) != 0)
509 		return (KERN_PROTECTION_FAILURE);
510 #ifdef KTRACE
511 	if (map != kernel_map && KTRPOINT(td, KTR_FAULT))
512 		ktrfault(vaddr, fault_type);
513 #endif
514 	result = vm_fault_hold(map, trunc_page(vaddr), fault_type, fault_flags,
515 	    NULL);
516 #ifdef KTRACE
517 	if (map != kernel_map && KTRPOINT(td, KTR_FAULTEND))
518 		ktrfaultend(result);
519 #endif
520 	return (result);
521 }
522 
523 int
524 vm_fault_hold(vm_map_t map, vm_offset_t vaddr, vm_prot_t fault_type,
525     int fault_flags, vm_page_t *m_hold)
526 {
527 	struct faultstate fs;
528 	struct vnode *vp;
529 	vm_object_t next_object, retry_object;
530 	vm_offset_t e_end, e_start;
531 	vm_pindex_t retry_pindex;
532 	vm_prot_t prot, retry_prot;
533 	int ahead, alloc_req, behind, cluster_offset, error, era, faultcount;
534 	int locked, nera, result, rv;
535 	u_char behavior;
536 	boolean_t wired;	/* Passed by reference. */
537 	bool dead, hardfault, is_first_object_locked;
538 
539 	VM_CNT_INC(v_vm_faults);
540 	fs.vp = NULL;
541 	faultcount = 0;
542 	nera = -1;
543 	hardfault = false;
544 
545 RetryFault:;
546 
547 	/*
548 	 * Find the backing store object and offset into it to begin the
549 	 * search.
550 	 */
551 	fs.map = map;
552 	result = vm_map_lookup(&fs.map, vaddr, fault_type |
553 	    VM_PROT_FAULT_LOOKUP, &fs.entry, &fs.first_object,
554 	    &fs.first_pindex, &prot, &wired);
555 	if (result != KERN_SUCCESS) {
556 		unlock_vp(&fs);
557 		return (result);
558 	}
559 
560 	fs.map_generation = fs.map->timestamp;
561 
562 	if (fs.entry->eflags & MAP_ENTRY_NOFAULT) {
563 		panic("%s: fault on nofault entry, addr: %#lx",
564 		    __func__, (u_long)vaddr);
565 	}
566 
567 	if (fs.entry->eflags & MAP_ENTRY_IN_TRANSITION &&
568 	    fs.entry->wiring_thread != curthread) {
569 		vm_map_unlock_read(fs.map);
570 		vm_map_lock(fs.map);
571 		if (vm_map_lookup_entry(fs.map, vaddr, &fs.entry) &&
572 		    (fs.entry->eflags & MAP_ENTRY_IN_TRANSITION)) {
573 			unlock_vp(&fs);
574 			fs.entry->eflags |= MAP_ENTRY_NEEDS_WAKEUP;
575 			vm_map_unlock_and_wait(fs.map, 0);
576 		} else
577 			vm_map_unlock(fs.map);
578 		goto RetryFault;
579 	}
580 
581 	MPASS((fs.entry->eflags & MAP_ENTRY_GUARD) == 0);
582 
583 	if (wired)
584 		fault_type = prot | (fault_type & VM_PROT_COPY);
585 	else
586 		KASSERT((fault_flags & VM_FAULT_WIRE) == 0,
587 		    ("!wired && VM_FAULT_WIRE"));
588 
589 	/*
590 	 * Try to avoid lock contention on the top-level object through
591 	 * special-case handling of some types of page faults, specifically,
592 	 * those that are both (1) mapping an existing page from the top-
593 	 * level object and (2) not having to mark that object as containing
594 	 * dirty pages.  Under these conditions, a read lock on the top-level
595 	 * object suffices, allowing multiple page faults of a similar type to
596 	 * run in parallel on the same top-level object.
597 	 */
598 	if (fs.vp == NULL /* avoid locked vnode leak */ &&
599 	    (fault_flags & (VM_FAULT_WIRE | VM_FAULT_DIRTY)) == 0 &&
600 	    /* avoid calling vm_object_set_writeable_dirty() */
601 	    ((prot & VM_PROT_WRITE) == 0 ||
602 	    (fs.first_object->type != OBJT_VNODE &&
603 	    (fs.first_object->flags & OBJ_TMPFS_NODE) == 0) ||
604 	    (fs.first_object->flags & OBJ_MIGHTBEDIRTY) != 0)) {
605 		VM_OBJECT_RLOCK(fs.first_object);
606 		if ((prot & VM_PROT_WRITE) == 0 ||
607 		    (fs.first_object->type != OBJT_VNODE &&
608 		    (fs.first_object->flags & OBJ_TMPFS_NODE) == 0) ||
609 		    (fs.first_object->flags & OBJ_MIGHTBEDIRTY) != 0) {
610 			rv = vm_fault_soft_fast(&fs, vaddr, prot, fault_type,
611 			    fault_flags, wired, m_hold);
612 			if (rv == KERN_SUCCESS)
613 				return (rv);
614 		}
615 		if (!VM_OBJECT_TRYUPGRADE(fs.first_object)) {
616 			VM_OBJECT_RUNLOCK(fs.first_object);
617 			VM_OBJECT_WLOCK(fs.first_object);
618 		}
619 	} else {
620 		VM_OBJECT_WLOCK(fs.first_object);
621 	}
622 
623 	/*
624 	 * Make a reference to this object to prevent its disposal while we
625 	 * are messing with it.  Once we have the reference, the map is free
626 	 * to be diddled.  Since objects reference their shadows (and copies),
627 	 * they will stay around as well.
628 	 *
629 	 * Bump the paging-in-progress count to prevent size changes (e.g.
630 	 * truncation operations) during I/O.
631 	 */
632 	vm_object_reference_locked(fs.first_object);
633 	vm_object_pip_add(fs.first_object, 1);
634 
635 	fs.lookup_still_valid = true;
636 
637 	fs.first_m = NULL;
638 
639 	/*
640 	 * Search for the page at object/offset.
641 	 */
642 	fs.object = fs.first_object;
643 	fs.pindex = fs.first_pindex;
644 	while (TRUE) {
645 		/*
646 		 * If the object is marked for imminent termination,
647 		 * we retry here, since the collapse pass has raced
648 		 * with us.  Otherwise, if we see terminally dead
649 		 * object, return fail.
650 		 */
651 		if ((fs.object->flags & OBJ_DEAD) != 0) {
652 			dead = fs.object->type == OBJT_DEAD;
653 			unlock_and_deallocate(&fs);
654 			if (dead)
655 				return (KERN_PROTECTION_FAILURE);
656 			pause("vmf_de", 1);
657 			goto RetryFault;
658 		}
659 
660 		/*
661 		 * See if page is resident
662 		 */
663 		fs.m = vm_page_lookup(fs.object, fs.pindex);
664 		if (fs.m != NULL) {
665 			/*
666 			 * Wait/Retry if the page is busy.  We have to do this
667 			 * if the page is either exclusive or shared busy
668 			 * because the vm_pager may be using read busy for
669 			 * pageouts (and even pageins if it is the vnode
670 			 * pager), and we could end up trying to pagein and
671 			 * pageout the same page simultaneously.
672 			 *
673 			 * We can theoretically allow the busy case on a read
674 			 * fault if the page is marked valid, but since such
675 			 * pages are typically already pmap'd, putting that
676 			 * special case in might be more effort then it is
677 			 * worth.  We cannot under any circumstances mess
678 			 * around with a shared busied page except, perhaps,
679 			 * to pmap it.
680 			 */
681 			if (vm_page_busied(fs.m)) {
682 				/*
683 				 * Reference the page before unlocking and
684 				 * sleeping so that the page daemon is less
685 				 * likely to reclaim it.
686 				 */
687 				vm_page_aflag_set(fs.m, PGA_REFERENCED);
688 				if (fs.object != fs.first_object) {
689 					if (!VM_OBJECT_TRYWLOCK(
690 					    fs.first_object)) {
691 						VM_OBJECT_WUNLOCK(fs.object);
692 						VM_OBJECT_WLOCK(fs.first_object);
693 						VM_OBJECT_WLOCK(fs.object);
694 					}
695 					vm_page_lock(fs.first_m);
696 					vm_page_free(fs.first_m);
697 					vm_page_unlock(fs.first_m);
698 					vm_object_pip_wakeup(fs.first_object);
699 					VM_OBJECT_WUNLOCK(fs.first_object);
700 					fs.first_m = NULL;
701 				}
702 				unlock_map(&fs);
703 				if (fs.m == vm_page_lookup(fs.object,
704 				    fs.pindex)) {
705 					vm_page_sleep_if_busy(fs.m, "vmpfw");
706 				}
707 				vm_object_pip_wakeup(fs.object);
708 				VM_OBJECT_WUNLOCK(fs.object);
709 				VM_CNT_INC(v_intrans);
710 				vm_object_deallocate(fs.first_object);
711 				goto RetryFault;
712 			}
713 
714 			/*
715 			 * Mark page busy for other processes, and the
716 			 * pagedaemon.  If it still isn't completely valid
717 			 * (readable), jump to readrest, else break-out ( we
718 			 * found the page ).
719 			 */
720 			vm_page_xbusy(fs.m);
721 			if (fs.m->valid != VM_PAGE_BITS_ALL)
722 				goto readrest;
723 			break; /* break to PAGE HAS BEEN FOUND */
724 		}
725 		KASSERT(fs.m == NULL, ("fs.m should be NULL, not %p", fs.m));
726 
727 		/*
728 		 * Page is not resident.  If the pager might contain the page
729 		 * or this is the beginning of the search, allocate a new
730 		 * page.  (Default objects are zero-fill, so there is no real
731 		 * pager for them.)
732 		 */
733 		if (fs.object->type != OBJT_DEFAULT ||
734 		    fs.object == fs.first_object) {
735 			if (fs.pindex >= fs.object->size) {
736 				unlock_and_deallocate(&fs);
737 				return (KERN_PROTECTION_FAILURE);
738 			}
739 
740 			if (fs.object == fs.first_object &&
741 			    (fs.first_object->flags & OBJ_POPULATE) != 0 &&
742 			    fs.first_object->shadow_count == 0) {
743 				rv = vm_fault_populate(&fs, vaddr, prot,
744 				    fault_type, fault_flags, wired, m_hold);
745 				switch (rv) {
746 				case KERN_SUCCESS:
747 				case KERN_FAILURE:
748 					unlock_and_deallocate(&fs);
749 					return (rv);
750 				case KERN_RESOURCE_SHORTAGE:
751 					unlock_and_deallocate(&fs);
752 					goto RetryFault;
753 				case KERN_NOT_RECEIVER:
754 					/*
755 					 * Pager's populate() method
756 					 * returned VM_PAGER_BAD.
757 					 */
758 					break;
759 				default:
760 					panic("inconsistent return codes");
761 				}
762 			}
763 
764 			/*
765 			 * Allocate a new page for this object/offset pair.
766 			 *
767 			 * Unlocked read of the p_flag is harmless. At
768 			 * worst, the P_KILLED might be not observed
769 			 * there, and allocation can fail, causing
770 			 * restart and new reading of the p_flag.
771 			 */
772 			if (!vm_page_count_severe() || P_KILLED(curproc)) {
773 #if VM_NRESERVLEVEL > 0
774 				vm_object_color(fs.object, atop(vaddr) -
775 				    fs.pindex);
776 #endif
777 				alloc_req = P_KILLED(curproc) ?
778 				    VM_ALLOC_SYSTEM : VM_ALLOC_NORMAL;
779 				if (fs.object->type != OBJT_VNODE &&
780 				    fs.object->backing_object == NULL)
781 					alloc_req |= VM_ALLOC_ZERO;
782 				fs.m = vm_page_alloc(fs.object, fs.pindex,
783 				    alloc_req);
784 			}
785 			if (fs.m == NULL) {
786 				unlock_and_deallocate(&fs);
787 				vm_waitpfault();
788 				goto RetryFault;
789 			}
790 		}
791 
792 readrest:
793 		/*
794 		 * At this point, we have either allocated a new page or found
795 		 * an existing page that is only partially valid.
796 		 *
797 		 * We hold a reference on the current object and the page is
798 		 * exclusive busied.
799 		 */
800 
801 		/*
802 		 * If the pager for the current object might have the page,
803 		 * then determine the number of additional pages to read and
804 		 * potentially reprioritize previously read pages for earlier
805 		 * reclamation.  These operations should only be performed
806 		 * once per page fault.  Even if the current pager doesn't
807 		 * have the page, the number of additional pages to read will
808 		 * apply to subsequent objects in the shadow chain.
809 		 */
810 		if (fs.object->type != OBJT_DEFAULT && nera == -1 &&
811 		    !P_KILLED(curproc)) {
812 			KASSERT(fs.lookup_still_valid, ("map unlocked"));
813 			era = fs.entry->read_ahead;
814 			behavior = vm_map_entry_behavior(fs.entry);
815 			if (behavior == MAP_ENTRY_BEHAV_RANDOM) {
816 				nera = 0;
817 			} else if (behavior == MAP_ENTRY_BEHAV_SEQUENTIAL) {
818 				nera = VM_FAULT_READ_AHEAD_MAX;
819 				if (vaddr == fs.entry->next_read)
820 					vm_fault_dontneed(&fs, vaddr, nera);
821 			} else if (vaddr == fs.entry->next_read) {
822 				/*
823 				 * This is a sequential fault.  Arithmetically
824 				 * increase the requested number of pages in
825 				 * the read-ahead window.  The requested
826 				 * number of pages is "# of sequential faults
827 				 * x (read ahead min + 1) + read ahead min"
828 				 */
829 				nera = VM_FAULT_READ_AHEAD_MIN;
830 				if (era > 0) {
831 					nera += era + 1;
832 					if (nera > VM_FAULT_READ_AHEAD_MAX)
833 						nera = VM_FAULT_READ_AHEAD_MAX;
834 				}
835 				if (era == VM_FAULT_READ_AHEAD_MAX)
836 					vm_fault_dontneed(&fs, vaddr, nera);
837 			} else {
838 				/*
839 				 * This is a non-sequential fault.
840 				 */
841 				nera = 0;
842 			}
843 			if (era != nera) {
844 				/*
845 				 * A read lock on the map suffices to update
846 				 * the read ahead count safely.
847 				 */
848 				fs.entry->read_ahead = nera;
849 			}
850 
851 			/*
852 			 * Prepare for unlocking the map.  Save the map
853 			 * entry's start and end addresses, which are used to
854 			 * optimize the size of the pager operation below.
855 			 * Even if the map entry's addresses change after
856 			 * unlocking the map, using the saved addresses is
857 			 * safe.
858 			 */
859 			e_start = fs.entry->start;
860 			e_end = fs.entry->end;
861 		}
862 
863 		/*
864 		 * Call the pager to retrieve the page if there is a chance
865 		 * that the pager has it, and potentially retrieve additional
866 		 * pages at the same time.
867 		 */
868 		if (fs.object->type != OBJT_DEFAULT) {
869 			/*
870 			 * Release the map lock before locking the vnode or
871 			 * sleeping in the pager.  (If the current object has
872 			 * a shadow, then an earlier iteration of this loop
873 			 * may have already unlocked the map.)
874 			 */
875 			unlock_map(&fs);
876 
877 			if (fs.object->type == OBJT_VNODE &&
878 			    (vp = fs.object->handle) != fs.vp) {
879 				/*
880 				 * Perform an unlock in case the desired vnode
881 				 * changed while the map was unlocked during a
882 				 * retry.
883 				 */
884 				unlock_vp(&fs);
885 
886 				locked = VOP_ISLOCKED(vp);
887 				if (locked != LK_EXCLUSIVE)
888 					locked = LK_SHARED;
889 
890 				/*
891 				 * We must not sleep acquiring the vnode lock
892 				 * while we have the page exclusive busied or
893 				 * the object's paging-in-progress count
894 				 * incremented.  Otherwise, we could deadlock.
895 				 */
896 				error = vget(vp, locked | LK_CANRECURSE |
897 				    LK_NOWAIT, curthread);
898 				if (error != 0) {
899 					vhold(vp);
900 					release_page(&fs);
901 					unlock_and_deallocate(&fs);
902 					error = vget(vp, locked | LK_RETRY |
903 					    LK_CANRECURSE, curthread);
904 					vdrop(vp);
905 					fs.vp = vp;
906 					KASSERT(error == 0,
907 					    ("vm_fault: vget failed"));
908 					goto RetryFault;
909 				}
910 				fs.vp = vp;
911 			}
912 			KASSERT(fs.vp == NULL || !fs.map->system_map,
913 			    ("vm_fault: vnode-backed object mapped by system map"));
914 
915 			/*
916 			 * Page in the requested page and hint the pager,
917 			 * that it may bring up surrounding pages.
918 			 */
919 			if (nera == -1 || behavior == MAP_ENTRY_BEHAV_RANDOM ||
920 			    P_KILLED(curproc)) {
921 				behind = 0;
922 				ahead = 0;
923 			} else {
924 				/* Is this a sequential fault? */
925 				if (nera > 0) {
926 					behind = 0;
927 					ahead = nera;
928 				} else {
929 					/*
930 					 * Request a cluster of pages that is
931 					 * aligned to a VM_FAULT_READ_DEFAULT
932 					 * page offset boundary within the
933 					 * object.  Alignment to a page offset
934 					 * boundary is more likely to coincide
935 					 * with the underlying file system
936 					 * block than alignment to a virtual
937 					 * address boundary.
938 					 */
939 					cluster_offset = fs.pindex %
940 					    VM_FAULT_READ_DEFAULT;
941 					behind = ulmin(cluster_offset,
942 					    atop(vaddr - e_start));
943 					ahead = VM_FAULT_READ_DEFAULT - 1 -
944 					    cluster_offset;
945 				}
946 				ahead = ulmin(ahead, atop(e_end - vaddr) - 1);
947 			}
948 			rv = vm_pager_get_pages(fs.object, &fs.m, 1,
949 			    &behind, &ahead);
950 			if (rv == VM_PAGER_OK) {
951 				faultcount = behind + 1 + ahead;
952 				hardfault = true;
953 				break; /* break to PAGE HAS BEEN FOUND */
954 			}
955 			if (rv == VM_PAGER_ERROR)
956 				printf("vm_fault: pager read error, pid %d (%s)\n",
957 				    curproc->p_pid, curproc->p_comm);
958 
959 			/*
960 			 * If an I/O error occurred or the requested page was
961 			 * outside the range of the pager, clean up and return
962 			 * an error.
963 			 */
964 			if (rv == VM_PAGER_ERROR || rv == VM_PAGER_BAD) {
965 				vm_page_lock(fs.m);
966 				if (fs.m->wire_count == 0)
967 					vm_page_free(fs.m);
968 				else
969 					vm_page_xunbusy_maybelocked(fs.m);
970 				vm_page_unlock(fs.m);
971 				fs.m = NULL;
972 				unlock_and_deallocate(&fs);
973 				return (rv == VM_PAGER_ERROR ? KERN_FAILURE :
974 				    KERN_PROTECTION_FAILURE);
975 			}
976 
977 			/*
978 			 * The requested page does not exist at this object/
979 			 * offset.  Remove the invalid page from the object,
980 			 * waking up anyone waiting for it, and continue on to
981 			 * the next object.  However, if this is the top-level
982 			 * object, we must leave the busy page in place to
983 			 * prevent another process from rushing past us, and
984 			 * inserting the page in that object at the same time
985 			 * that we are.
986 			 */
987 			if (fs.object != fs.first_object) {
988 				vm_page_lock(fs.m);
989 				if (fs.m->wire_count == 0)
990 					vm_page_free(fs.m);
991 				else
992 					vm_page_xunbusy_maybelocked(fs.m);
993 				vm_page_unlock(fs.m);
994 				fs.m = NULL;
995 			}
996 		}
997 
998 		/*
999 		 * We get here if the object has default pager (or unwiring)
1000 		 * or the pager doesn't have the page.
1001 		 */
1002 		if (fs.object == fs.first_object)
1003 			fs.first_m = fs.m;
1004 
1005 		/*
1006 		 * Move on to the next object.  Lock the next object before
1007 		 * unlocking the current one.
1008 		 */
1009 		next_object = fs.object->backing_object;
1010 		if (next_object == NULL) {
1011 			/*
1012 			 * If there's no object left, fill the page in the top
1013 			 * object with zeros.
1014 			 */
1015 			if (fs.object != fs.first_object) {
1016 				vm_object_pip_wakeup(fs.object);
1017 				VM_OBJECT_WUNLOCK(fs.object);
1018 
1019 				fs.object = fs.first_object;
1020 				fs.pindex = fs.first_pindex;
1021 				fs.m = fs.first_m;
1022 				VM_OBJECT_WLOCK(fs.object);
1023 			}
1024 			fs.first_m = NULL;
1025 
1026 			/*
1027 			 * Zero the page if necessary and mark it valid.
1028 			 */
1029 			if ((fs.m->flags & PG_ZERO) == 0) {
1030 				pmap_zero_page(fs.m);
1031 			} else {
1032 				VM_CNT_INC(v_ozfod);
1033 			}
1034 			VM_CNT_INC(v_zfod);
1035 			fs.m->valid = VM_PAGE_BITS_ALL;
1036 			/* Don't try to prefault neighboring pages. */
1037 			faultcount = 1;
1038 			break;	/* break to PAGE HAS BEEN FOUND */
1039 		} else {
1040 			KASSERT(fs.object != next_object,
1041 			    ("object loop %p", next_object));
1042 			VM_OBJECT_WLOCK(next_object);
1043 			vm_object_pip_add(next_object, 1);
1044 			if (fs.object != fs.first_object)
1045 				vm_object_pip_wakeup(fs.object);
1046 			fs.pindex +=
1047 			    OFF_TO_IDX(fs.object->backing_object_offset);
1048 			VM_OBJECT_WUNLOCK(fs.object);
1049 			fs.object = next_object;
1050 		}
1051 	}
1052 
1053 	vm_page_assert_xbusied(fs.m);
1054 
1055 	/*
1056 	 * PAGE HAS BEEN FOUND. [Loop invariant still holds -- the object lock
1057 	 * is held.]
1058 	 */
1059 
1060 	/*
1061 	 * If the page is being written, but isn't already owned by the
1062 	 * top-level object, we have to copy it into a new page owned by the
1063 	 * top-level object.
1064 	 */
1065 	if (fs.object != fs.first_object) {
1066 		/*
1067 		 * We only really need to copy if we want to write it.
1068 		 */
1069 		if ((fault_type & (VM_PROT_COPY | VM_PROT_WRITE)) != 0) {
1070 			/*
1071 			 * This allows pages to be virtually copied from a
1072 			 * backing_object into the first_object, where the
1073 			 * backing object has no other refs to it, and cannot
1074 			 * gain any more refs.  Instead of a bcopy, we just
1075 			 * move the page from the backing object to the
1076 			 * first object.  Note that we must mark the page
1077 			 * dirty in the first object so that it will go out
1078 			 * to swap when needed.
1079 			 */
1080 			is_first_object_locked = false;
1081 			if (
1082 				/*
1083 				 * Only one shadow object
1084 				 */
1085 				(fs.object->shadow_count == 1) &&
1086 				/*
1087 				 * No COW refs, except us
1088 				 */
1089 				(fs.object->ref_count == 1) &&
1090 				/*
1091 				 * No one else can look this object up
1092 				 */
1093 				(fs.object->handle == NULL) &&
1094 				/*
1095 				 * No other ways to look the object up
1096 				 */
1097 				((fs.object->type == OBJT_DEFAULT) ||
1098 				 (fs.object->type == OBJT_SWAP)) &&
1099 			    (is_first_object_locked = VM_OBJECT_TRYWLOCK(fs.first_object)) &&
1100 				/*
1101 				 * We don't chase down the shadow chain
1102 				 */
1103 			    fs.object == fs.first_object->backing_object) {
1104 				vm_page_lock(fs.m);
1105 				vm_page_remque(fs.m);
1106 				vm_page_remove(fs.m);
1107 				vm_page_unlock(fs.m);
1108 				vm_page_lock(fs.first_m);
1109 				vm_page_replace_checked(fs.m, fs.first_object,
1110 				    fs.first_pindex, fs.first_m);
1111 				vm_page_free(fs.first_m);
1112 				vm_page_unlock(fs.first_m);
1113 				vm_page_dirty(fs.m);
1114 #if VM_NRESERVLEVEL > 0
1115 				/*
1116 				 * Rename the reservation.
1117 				 */
1118 				vm_reserv_rename(fs.m, fs.first_object,
1119 				    fs.object, OFF_TO_IDX(
1120 				    fs.first_object->backing_object_offset));
1121 #endif
1122 				/*
1123 				 * Removing the page from the backing object
1124 				 * unbusied it.
1125 				 */
1126 				vm_page_xbusy(fs.m);
1127 				fs.first_m = fs.m;
1128 				fs.m = NULL;
1129 				VM_CNT_INC(v_cow_optim);
1130 			} else {
1131 				/*
1132 				 * Oh, well, lets copy it.
1133 				 */
1134 				pmap_copy_page(fs.m, fs.first_m);
1135 				fs.first_m->valid = VM_PAGE_BITS_ALL;
1136 				if ((fault_flags & VM_FAULT_WIRE) == 0) {
1137 					prot &= ~VM_PROT_WRITE;
1138 					fault_type &= ~VM_PROT_WRITE;
1139 				}
1140 				if (wired && (fault_flags &
1141 				    VM_FAULT_WIRE) == 0) {
1142 					vm_page_lock(fs.first_m);
1143 					vm_page_wire(fs.first_m);
1144 					vm_page_unlock(fs.first_m);
1145 
1146 					vm_page_lock(fs.m);
1147 					vm_page_unwire(fs.m, PQ_INACTIVE);
1148 					vm_page_unlock(fs.m);
1149 				}
1150 				/*
1151 				 * We no longer need the old page or object.
1152 				 */
1153 				release_page(&fs);
1154 			}
1155 			/*
1156 			 * fs.object != fs.first_object due to above
1157 			 * conditional
1158 			 */
1159 			vm_object_pip_wakeup(fs.object);
1160 			VM_OBJECT_WUNLOCK(fs.object);
1161 			/*
1162 			 * Only use the new page below...
1163 			 */
1164 			fs.object = fs.first_object;
1165 			fs.pindex = fs.first_pindex;
1166 			fs.m = fs.first_m;
1167 			if (!is_first_object_locked)
1168 				VM_OBJECT_WLOCK(fs.object);
1169 			VM_CNT_INC(v_cow_faults);
1170 			curthread->td_cow++;
1171 		} else {
1172 			prot &= ~VM_PROT_WRITE;
1173 		}
1174 	}
1175 
1176 	/*
1177 	 * We must verify that the maps have not changed since our last
1178 	 * lookup.
1179 	 */
1180 	if (!fs.lookup_still_valid) {
1181 		if (!vm_map_trylock_read(fs.map)) {
1182 			release_page(&fs);
1183 			unlock_and_deallocate(&fs);
1184 			goto RetryFault;
1185 		}
1186 		fs.lookup_still_valid = true;
1187 		if (fs.map->timestamp != fs.map_generation) {
1188 			result = vm_map_lookup_locked(&fs.map, vaddr, fault_type,
1189 			    &fs.entry, &retry_object, &retry_pindex, &retry_prot, &wired);
1190 
1191 			/*
1192 			 * If we don't need the page any longer, put it on the inactive
1193 			 * list (the easiest thing to do here).  If no one needs it,
1194 			 * pageout will grab it eventually.
1195 			 */
1196 			if (result != KERN_SUCCESS) {
1197 				release_page(&fs);
1198 				unlock_and_deallocate(&fs);
1199 
1200 				/*
1201 				 * If retry of map lookup would have blocked then
1202 				 * retry fault from start.
1203 				 */
1204 				if (result == KERN_FAILURE)
1205 					goto RetryFault;
1206 				return (result);
1207 			}
1208 			if ((retry_object != fs.first_object) ||
1209 			    (retry_pindex != fs.first_pindex)) {
1210 				release_page(&fs);
1211 				unlock_and_deallocate(&fs);
1212 				goto RetryFault;
1213 			}
1214 
1215 			/*
1216 			 * Check whether the protection has changed or the object has
1217 			 * been copied while we left the map unlocked. Changing from
1218 			 * read to write permission is OK - we leave the page
1219 			 * write-protected, and catch the write fault. Changing from
1220 			 * write to read permission means that we can't mark the page
1221 			 * write-enabled after all.
1222 			 */
1223 			prot &= retry_prot;
1224 			fault_type &= retry_prot;
1225 			if (prot == 0) {
1226 				release_page(&fs);
1227 				unlock_and_deallocate(&fs);
1228 				goto RetryFault;
1229 			}
1230 		}
1231 	}
1232 
1233 	/*
1234 	 * If the page was filled by a pager, save the virtual address that
1235 	 * should be faulted on next under a sequential access pattern to the
1236 	 * map entry.  A read lock on the map suffices to update this address
1237 	 * safely.
1238 	 */
1239 	if (hardfault)
1240 		fs.entry->next_read = vaddr + ptoa(ahead) + PAGE_SIZE;
1241 
1242 	vm_fault_dirty(fs.entry, fs.m, prot, fault_type, fault_flags, true);
1243 	vm_page_assert_xbusied(fs.m);
1244 
1245 	/*
1246 	 * Page must be completely valid or it is not fit to
1247 	 * map into user space.  vm_pager_get_pages() ensures this.
1248 	 */
1249 	KASSERT(fs.m->valid == VM_PAGE_BITS_ALL,
1250 	    ("vm_fault: page %p partially invalid", fs.m));
1251 	VM_OBJECT_WUNLOCK(fs.object);
1252 
1253 	/*
1254 	 * Put this page into the physical map.  We had to do the unlock above
1255 	 * because pmap_enter() may sleep.  We don't put the page
1256 	 * back on the active queue until later so that the pageout daemon
1257 	 * won't find it (yet).
1258 	 */
1259 	pmap_enter(fs.map->pmap, vaddr, fs.m, prot,
1260 	    fault_type | (wired ? PMAP_ENTER_WIRED : 0), 0);
1261 	if (faultcount != 1 && (fault_flags & VM_FAULT_WIRE) == 0 &&
1262 	    wired == 0)
1263 		vm_fault_prefault(&fs, vaddr,
1264 		    faultcount > 0 ? behind : PFBAK,
1265 		    faultcount > 0 ? ahead : PFFOR, false);
1266 	VM_OBJECT_WLOCK(fs.object);
1267 	vm_page_lock(fs.m);
1268 
1269 	/*
1270 	 * If the page is not wired down, then put it where the pageout daemon
1271 	 * can find it.
1272 	 */
1273 	if ((fault_flags & VM_FAULT_WIRE) != 0) {
1274 		KASSERT(wired, ("VM_FAULT_WIRE && !wired"));
1275 		vm_page_wire(fs.m);
1276 	} else
1277 		vm_page_activate(fs.m);
1278 	if (m_hold != NULL) {
1279 		*m_hold = fs.m;
1280 		vm_page_hold(fs.m);
1281 	}
1282 	vm_page_unlock(fs.m);
1283 	vm_page_xunbusy(fs.m);
1284 
1285 	/*
1286 	 * Unlock everything, and return
1287 	 */
1288 	unlock_and_deallocate(&fs);
1289 	if (hardfault) {
1290 		VM_CNT_INC(v_io_faults);
1291 		curthread->td_ru.ru_majflt++;
1292 #ifdef RACCT
1293 		if (racct_enable && fs.object->type == OBJT_VNODE) {
1294 			PROC_LOCK(curproc);
1295 			if ((fault_type & (VM_PROT_COPY | VM_PROT_WRITE)) != 0) {
1296 				racct_add_force(curproc, RACCT_WRITEBPS,
1297 				    PAGE_SIZE + behind * PAGE_SIZE);
1298 				racct_add_force(curproc, RACCT_WRITEIOPS, 1);
1299 			} else {
1300 				racct_add_force(curproc, RACCT_READBPS,
1301 				    PAGE_SIZE + ahead * PAGE_SIZE);
1302 				racct_add_force(curproc, RACCT_READIOPS, 1);
1303 			}
1304 			PROC_UNLOCK(curproc);
1305 		}
1306 #endif
1307 	} else
1308 		curthread->td_ru.ru_minflt++;
1309 
1310 	return (KERN_SUCCESS);
1311 }
1312 
1313 /*
1314  * Speed up the reclamation of pages that precede the faulting pindex within
1315  * the first object of the shadow chain.  Essentially, perform the equivalent
1316  * to madvise(..., MADV_DONTNEED) on a large cluster of pages that precedes
1317  * the faulting pindex by the cluster size when the pages read by vm_fault()
1318  * cross a cluster-size boundary.  The cluster size is the greater of the
1319  * smallest superpage size and VM_FAULT_DONTNEED_MIN.
1320  *
1321  * When "fs->first_object" is a shadow object, the pages in the backing object
1322  * that precede the faulting pindex are deactivated by vm_fault().  So, this
1323  * function must only be concerned with pages in the first object.
1324  */
1325 static void
1326 vm_fault_dontneed(const struct faultstate *fs, vm_offset_t vaddr, int ahead)
1327 {
1328 	vm_map_entry_t entry;
1329 	vm_object_t first_object, object;
1330 	vm_offset_t end, start;
1331 	vm_page_t m, m_next;
1332 	vm_pindex_t pend, pstart;
1333 	vm_size_t size;
1334 
1335 	object = fs->object;
1336 	VM_OBJECT_ASSERT_WLOCKED(object);
1337 	first_object = fs->first_object;
1338 	if (first_object != object) {
1339 		if (!VM_OBJECT_TRYWLOCK(first_object)) {
1340 			VM_OBJECT_WUNLOCK(object);
1341 			VM_OBJECT_WLOCK(first_object);
1342 			VM_OBJECT_WLOCK(object);
1343 		}
1344 	}
1345 	/* Neither fictitious nor unmanaged pages can be reclaimed. */
1346 	if ((first_object->flags & (OBJ_FICTITIOUS | OBJ_UNMANAGED)) == 0) {
1347 		size = VM_FAULT_DONTNEED_MIN;
1348 		if (MAXPAGESIZES > 1 && size < pagesizes[1])
1349 			size = pagesizes[1];
1350 		end = rounddown2(vaddr, size);
1351 		if (vaddr - end >= size - PAGE_SIZE - ptoa(ahead) &&
1352 		    (entry = fs->entry)->start < end) {
1353 			if (end - entry->start < size)
1354 				start = entry->start;
1355 			else
1356 				start = end - size;
1357 			pmap_advise(fs->map->pmap, start, end, MADV_DONTNEED);
1358 			pstart = OFF_TO_IDX(entry->offset) + atop(start -
1359 			    entry->start);
1360 			m_next = vm_page_find_least(first_object, pstart);
1361 			pend = OFF_TO_IDX(entry->offset) + atop(end -
1362 			    entry->start);
1363 			while ((m = m_next) != NULL && m->pindex < pend) {
1364 				m_next = TAILQ_NEXT(m, listq);
1365 				if (m->valid != VM_PAGE_BITS_ALL ||
1366 				    vm_page_busied(m))
1367 					continue;
1368 
1369 				/*
1370 				 * Don't clear PGA_REFERENCED, since it would
1371 				 * likely represent a reference by a different
1372 				 * process.
1373 				 *
1374 				 * Typically, at this point, prefetched pages
1375 				 * are still in the inactive queue.  Only
1376 				 * pages that triggered page faults are in the
1377 				 * active queue.
1378 				 */
1379 				vm_page_lock(m);
1380 				if (!vm_page_inactive(m))
1381 					vm_page_deactivate(m);
1382 				vm_page_unlock(m);
1383 			}
1384 		}
1385 	}
1386 	if (first_object != object)
1387 		VM_OBJECT_WUNLOCK(first_object);
1388 }
1389 
1390 /*
1391  * vm_fault_prefault provides a quick way of clustering
1392  * pagefaults into a processes address space.  It is a "cousin"
1393  * of vm_map_pmap_enter, except it runs at page fault time instead
1394  * of mmap time.
1395  */
1396 static void
1397 vm_fault_prefault(const struct faultstate *fs, vm_offset_t addra,
1398     int backward, int forward, bool obj_locked)
1399 {
1400 	pmap_t pmap;
1401 	vm_map_entry_t entry;
1402 	vm_object_t backing_object, lobject;
1403 	vm_offset_t addr, starta;
1404 	vm_pindex_t pindex;
1405 	vm_page_t m;
1406 	int i;
1407 
1408 	pmap = fs->map->pmap;
1409 	if (pmap != vmspace_pmap(curthread->td_proc->p_vmspace))
1410 		return;
1411 
1412 	entry = fs->entry;
1413 
1414 	if (addra < backward * PAGE_SIZE) {
1415 		starta = entry->start;
1416 	} else {
1417 		starta = addra - backward * PAGE_SIZE;
1418 		if (starta < entry->start)
1419 			starta = entry->start;
1420 	}
1421 
1422 	/*
1423 	 * Generate the sequence of virtual addresses that are candidates for
1424 	 * prefaulting in an outward spiral from the faulting virtual address,
1425 	 * "addra".  Specifically, the sequence is "addra - PAGE_SIZE", "addra
1426 	 * + PAGE_SIZE", "addra - 2 * PAGE_SIZE", "addra + 2 * PAGE_SIZE", ...
1427 	 * If the candidate address doesn't have a backing physical page, then
1428 	 * the loop immediately terminates.
1429 	 */
1430 	for (i = 0; i < 2 * imax(backward, forward); i++) {
1431 		addr = addra + ((i >> 1) + 1) * ((i & 1) == 0 ? -PAGE_SIZE :
1432 		    PAGE_SIZE);
1433 		if (addr > addra + forward * PAGE_SIZE)
1434 			addr = 0;
1435 
1436 		if (addr < starta || addr >= entry->end)
1437 			continue;
1438 
1439 		if (!pmap_is_prefaultable(pmap, addr))
1440 			continue;
1441 
1442 		pindex = ((addr - entry->start) + entry->offset) >> PAGE_SHIFT;
1443 		lobject = entry->object.vm_object;
1444 		if (!obj_locked)
1445 			VM_OBJECT_RLOCK(lobject);
1446 		while ((m = vm_page_lookup(lobject, pindex)) == NULL &&
1447 		    lobject->type == OBJT_DEFAULT &&
1448 		    (backing_object = lobject->backing_object) != NULL) {
1449 			KASSERT((lobject->backing_object_offset & PAGE_MASK) ==
1450 			    0, ("vm_fault_prefault: unaligned object offset"));
1451 			pindex += lobject->backing_object_offset >> PAGE_SHIFT;
1452 			VM_OBJECT_RLOCK(backing_object);
1453 			if (!obj_locked || lobject != entry->object.vm_object)
1454 				VM_OBJECT_RUNLOCK(lobject);
1455 			lobject = backing_object;
1456 		}
1457 		if (m == NULL) {
1458 			if (!obj_locked || lobject != entry->object.vm_object)
1459 				VM_OBJECT_RUNLOCK(lobject);
1460 			break;
1461 		}
1462 		if (m->valid == VM_PAGE_BITS_ALL &&
1463 		    (m->flags & PG_FICTITIOUS) == 0)
1464 			pmap_enter_quick(pmap, addr, m, entry->protection);
1465 		if (!obj_locked || lobject != entry->object.vm_object)
1466 			VM_OBJECT_RUNLOCK(lobject);
1467 	}
1468 }
1469 
1470 /*
1471  * Hold each of the physical pages that are mapped by the specified range of
1472  * virtual addresses, ["addr", "addr" + "len"), if those mappings are valid
1473  * and allow the specified types of access, "prot".  If all of the implied
1474  * pages are successfully held, then the number of held pages is returned
1475  * together with pointers to those pages in the array "ma".  However, if any
1476  * of the pages cannot be held, -1 is returned.
1477  */
1478 int
1479 vm_fault_quick_hold_pages(vm_map_t map, vm_offset_t addr, vm_size_t len,
1480     vm_prot_t prot, vm_page_t *ma, int max_count)
1481 {
1482 	vm_offset_t end, va;
1483 	vm_page_t *mp;
1484 	int count;
1485 	boolean_t pmap_failed;
1486 
1487 	if (len == 0)
1488 		return (0);
1489 	end = round_page(addr + len);
1490 	addr = trunc_page(addr);
1491 
1492 	/*
1493 	 * Check for illegal addresses.
1494 	 */
1495 	if (addr < vm_map_min(map) || addr > end || end > vm_map_max(map))
1496 		return (-1);
1497 
1498 	if (atop(end - addr) > max_count)
1499 		panic("vm_fault_quick_hold_pages: count > max_count");
1500 	count = atop(end - addr);
1501 
1502 	/*
1503 	 * Most likely, the physical pages are resident in the pmap, so it is
1504 	 * faster to try pmap_extract_and_hold() first.
1505 	 */
1506 	pmap_failed = FALSE;
1507 	for (mp = ma, va = addr; va < end; mp++, va += PAGE_SIZE) {
1508 		*mp = pmap_extract_and_hold(map->pmap, va, prot);
1509 		if (*mp == NULL)
1510 			pmap_failed = TRUE;
1511 		else if ((prot & VM_PROT_WRITE) != 0 &&
1512 		    (*mp)->dirty != VM_PAGE_BITS_ALL) {
1513 			/*
1514 			 * Explicitly dirty the physical page.  Otherwise, the
1515 			 * caller's changes may go unnoticed because they are
1516 			 * performed through an unmanaged mapping or by a DMA
1517 			 * operation.
1518 			 *
1519 			 * The object lock is not held here.
1520 			 * See vm_page_clear_dirty_mask().
1521 			 */
1522 			vm_page_dirty(*mp);
1523 		}
1524 	}
1525 	if (pmap_failed) {
1526 		/*
1527 		 * One or more pages could not be held by the pmap.  Either no
1528 		 * page was mapped at the specified virtual address or that
1529 		 * mapping had insufficient permissions.  Attempt to fault in
1530 		 * and hold these pages.
1531 		 *
1532 		 * If vm_fault_disable_pagefaults() was called,
1533 		 * i.e., TDP_NOFAULTING is set, we must not sleep nor
1534 		 * acquire MD VM locks, which means we must not call
1535 		 * vm_fault_hold().  Some (out of tree) callers mark
1536 		 * too wide a code area with vm_fault_disable_pagefaults()
1537 		 * already, use the VM_PROT_QUICK_NOFAULT flag to request
1538 		 * the proper behaviour explicitly.
1539 		 */
1540 		if ((prot & VM_PROT_QUICK_NOFAULT) != 0 &&
1541 		    (curthread->td_pflags & TDP_NOFAULTING) != 0)
1542 			goto error;
1543 		for (mp = ma, va = addr; va < end; mp++, va += PAGE_SIZE)
1544 			if (*mp == NULL && vm_fault_hold(map, va, prot,
1545 			    VM_FAULT_NORMAL, mp) != KERN_SUCCESS)
1546 				goto error;
1547 	}
1548 	return (count);
1549 error:
1550 	for (mp = ma; mp < ma + count; mp++)
1551 		if (*mp != NULL) {
1552 			vm_page_lock(*mp);
1553 			vm_page_unhold(*mp);
1554 			vm_page_unlock(*mp);
1555 		}
1556 	return (-1);
1557 }
1558 
1559 /*
1560  *	Routine:
1561  *		vm_fault_copy_entry
1562  *	Function:
1563  *		Create new shadow object backing dst_entry with private copy of
1564  *		all underlying pages. When src_entry is equal to dst_entry,
1565  *		function implements COW for wired-down map entry. Otherwise,
1566  *		it forks wired entry into dst_map.
1567  *
1568  *	In/out conditions:
1569  *		The source and destination maps must be locked for write.
1570  *		The source map entry must be wired down (or be a sharing map
1571  *		entry corresponding to a main map entry that is wired down).
1572  */
1573 void
1574 vm_fault_copy_entry(vm_map_t dst_map, vm_map_t src_map,
1575     vm_map_entry_t dst_entry, vm_map_entry_t src_entry,
1576     vm_ooffset_t *fork_charge)
1577 {
1578 	vm_object_t backing_object, dst_object, object, src_object;
1579 	vm_pindex_t dst_pindex, pindex, src_pindex;
1580 	vm_prot_t access, prot;
1581 	vm_offset_t vaddr;
1582 	vm_page_t dst_m;
1583 	vm_page_t src_m;
1584 	boolean_t upgrade;
1585 
1586 #ifdef	lint
1587 	src_map++;
1588 #endif	/* lint */
1589 
1590 	upgrade = src_entry == dst_entry;
1591 	access = prot = dst_entry->protection;
1592 
1593 	src_object = src_entry->object.vm_object;
1594 	src_pindex = OFF_TO_IDX(src_entry->offset);
1595 
1596 	if (upgrade && (dst_entry->eflags & MAP_ENTRY_NEEDS_COPY) == 0) {
1597 		dst_object = src_object;
1598 		vm_object_reference(dst_object);
1599 	} else {
1600 		/*
1601 		 * Create the top-level object for the destination entry. (Doesn't
1602 		 * actually shadow anything - we copy the pages directly.)
1603 		 */
1604 		dst_object = vm_object_allocate(OBJT_DEFAULT,
1605 		    atop(dst_entry->end - dst_entry->start));
1606 #if VM_NRESERVLEVEL > 0
1607 		dst_object->flags |= OBJ_COLORED;
1608 		dst_object->pg_color = atop(dst_entry->start);
1609 #endif
1610 	}
1611 
1612 	VM_OBJECT_WLOCK(dst_object);
1613 	KASSERT(upgrade || dst_entry->object.vm_object == NULL,
1614 	    ("vm_fault_copy_entry: vm_object not NULL"));
1615 	if (src_object != dst_object) {
1616 		dst_object->domain = src_object->domain;
1617 		dst_entry->object.vm_object = dst_object;
1618 		dst_entry->offset = 0;
1619 		dst_object->charge = dst_entry->end - dst_entry->start;
1620 	}
1621 	if (fork_charge != NULL) {
1622 		KASSERT(dst_entry->cred == NULL,
1623 		    ("vm_fault_copy_entry: leaked swp charge"));
1624 		dst_object->cred = curthread->td_ucred;
1625 		crhold(dst_object->cred);
1626 		*fork_charge += dst_object->charge;
1627 	} else if (dst_object->cred == NULL) {
1628 		KASSERT(dst_entry->cred != NULL, ("no cred for entry %p",
1629 		    dst_entry));
1630 		dst_object->cred = dst_entry->cred;
1631 		dst_entry->cred = NULL;
1632 	}
1633 
1634 	/*
1635 	 * If not an upgrade, then enter the mappings in the pmap as
1636 	 * read and/or execute accesses.  Otherwise, enter them as
1637 	 * write accesses.
1638 	 *
1639 	 * A writeable large page mapping is only created if all of
1640 	 * the constituent small page mappings are modified. Marking
1641 	 * PTEs as modified on inception allows promotion to happen
1642 	 * without taking potentially large number of soft faults.
1643 	 */
1644 	if (!upgrade)
1645 		access &= ~VM_PROT_WRITE;
1646 
1647 	/*
1648 	 * Loop through all of the virtual pages within the entry's
1649 	 * range, copying each page from the source object to the
1650 	 * destination object.  Since the source is wired, those pages
1651 	 * must exist.  In contrast, the destination is pageable.
1652 	 * Since the destination object does share any backing storage
1653 	 * with the source object, all of its pages must be dirtied,
1654 	 * regardless of whether they can be written.
1655 	 */
1656 	for (vaddr = dst_entry->start, dst_pindex = 0;
1657 	    vaddr < dst_entry->end;
1658 	    vaddr += PAGE_SIZE, dst_pindex++) {
1659 again:
1660 		/*
1661 		 * Find the page in the source object, and copy it in.
1662 		 * Because the source is wired down, the page will be
1663 		 * in memory.
1664 		 */
1665 		if (src_object != dst_object)
1666 			VM_OBJECT_RLOCK(src_object);
1667 		object = src_object;
1668 		pindex = src_pindex + dst_pindex;
1669 		while ((src_m = vm_page_lookup(object, pindex)) == NULL &&
1670 		    (backing_object = object->backing_object) != NULL) {
1671 			/*
1672 			 * Unless the source mapping is read-only or
1673 			 * it is presently being upgraded from
1674 			 * read-only, the first object in the shadow
1675 			 * chain should provide all of the pages.  In
1676 			 * other words, this loop body should never be
1677 			 * executed when the source mapping is already
1678 			 * read/write.
1679 			 */
1680 			KASSERT((src_entry->protection & VM_PROT_WRITE) == 0 ||
1681 			    upgrade,
1682 			    ("vm_fault_copy_entry: main object missing page"));
1683 
1684 			VM_OBJECT_RLOCK(backing_object);
1685 			pindex += OFF_TO_IDX(object->backing_object_offset);
1686 			if (object != dst_object)
1687 				VM_OBJECT_RUNLOCK(object);
1688 			object = backing_object;
1689 		}
1690 		KASSERT(src_m != NULL, ("vm_fault_copy_entry: page missing"));
1691 
1692 		if (object != dst_object) {
1693 			/*
1694 			 * Allocate a page in the destination object.
1695 			 */
1696 			dst_m = vm_page_alloc(dst_object, (src_object ==
1697 			    dst_object ? src_pindex : 0) + dst_pindex,
1698 			    VM_ALLOC_NORMAL);
1699 			if (dst_m == NULL) {
1700 				VM_OBJECT_WUNLOCK(dst_object);
1701 				VM_OBJECT_RUNLOCK(object);
1702 				vm_wait(dst_object);
1703 				VM_OBJECT_WLOCK(dst_object);
1704 				goto again;
1705 			}
1706 			pmap_copy_page(src_m, dst_m);
1707 			VM_OBJECT_RUNLOCK(object);
1708 			dst_m->valid = VM_PAGE_BITS_ALL;
1709 			dst_m->dirty = VM_PAGE_BITS_ALL;
1710 		} else {
1711 			dst_m = src_m;
1712 			if (vm_page_sleep_if_busy(dst_m, "fltupg"))
1713 				goto again;
1714 			vm_page_xbusy(dst_m);
1715 			KASSERT(dst_m->valid == VM_PAGE_BITS_ALL,
1716 			    ("invalid dst page %p", dst_m));
1717 		}
1718 		VM_OBJECT_WUNLOCK(dst_object);
1719 
1720 		/*
1721 		 * Enter it in the pmap. If a wired, copy-on-write
1722 		 * mapping is being replaced by a write-enabled
1723 		 * mapping, then wire that new mapping.
1724 		 */
1725 		pmap_enter(dst_map->pmap, vaddr, dst_m, prot,
1726 		    access | (upgrade ? PMAP_ENTER_WIRED : 0), 0);
1727 
1728 		/*
1729 		 * Mark it no longer busy, and put it on the active list.
1730 		 */
1731 		VM_OBJECT_WLOCK(dst_object);
1732 
1733 		if (upgrade) {
1734 			if (src_m != dst_m) {
1735 				vm_page_lock(src_m);
1736 				vm_page_unwire(src_m, PQ_INACTIVE);
1737 				vm_page_unlock(src_m);
1738 				vm_page_lock(dst_m);
1739 				vm_page_wire(dst_m);
1740 				vm_page_unlock(dst_m);
1741 			} else {
1742 				KASSERT(dst_m->wire_count > 0,
1743 				    ("dst_m %p is not wired", dst_m));
1744 			}
1745 		} else {
1746 			vm_page_lock(dst_m);
1747 			vm_page_activate(dst_m);
1748 			vm_page_unlock(dst_m);
1749 		}
1750 		vm_page_xunbusy(dst_m);
1751 	}
1752 	VM_OBJECT_WUNLOCK(dst_object);
1753 	if (upgrade) {
1754 		dst_entry->eflags &= ~(MAP_ENTRY_COW | MAP_ENTRY_NEEDS_COPY);
1755 		vm_object_deallocate(src_object);
1756 	}
1757 }
1758 
1759 /*
1760  * Block entry into the machine-independent layer's page fault handler by
1761  * the calling thread.  Subsequent calls to vm_fault() by that thread will
1762  * return KERN_PROTECTION_FAILURE.  Enable machine-dependent handling of
1763  * spurious page faults.
1764  */
1765 int
1766 vm_fault_disable_pagefaults(void)
1767 {
1768 
1769 	return (curthread_pflags_set(TDP_NOFAULTING | TDP_RESETSPUR));
1770 }
1771 
1772 void
1773 vm_fault_enable_pagefaults(int save)
1774 {
1775 
1776 	curthread_pflags_restore(save);
1777 }
1778