xref: /freebsd/sys/vm/vm_glue.c (revision b76278407dc1b20319f598998ce72d13ada7cc6b)
160727d8bSWarner Losh /*-
2df8bae1dSRodney W. Grimes  * Copyright (c) 1991, 1993
3df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
4df8bae1dSRodney W. Grimes  *
5df8bae1dSRodney W. Grimes  * This code is derived from software contributed to Berkeley by
6df8bae1dSRodney W. Grimes  * The Mach Operating System project at Carnegie-Mellon University.
7df8bae1dSRodney W. Grimes  *
8df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
9df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
10df8bae1dSRodney W. Grimes  * are met:
11df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
12df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
13df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
14df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
15df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
16df8bae1dSRodney W. Grimes  * 4. Neither the name of the University nor the names of its contributors
17df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
18df8bae1dSRodney W. Grimes  *    without specific prior written permission.
19df8bae1dSRodney W. Grimes  *
20df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
31df8bae1dSRodney W. Grimes  *
323c4dd356SDavid Greenman  *	from: @(#)vm_glue.c	8.6 (Berkeley) 1/5/94
33df8bae1dSRodney W. Grimes  *
34df8bae1dSRodney W. Grimes  *
35df8bae1dSRodney W. Grimes  * Copyright (c) 1987, 1990 Carnegie-Mellon University.
36df8bae1dSRodney W. Grimes  * All rights reserved.
37df8bae1dSRodney W. Grimes  *
38df8bae1dSRodney W. Grimes  * Permission to use, copy, modify and distribute this software and
39df8bae1dSRodney W. Grimes  * its documentation is hereby granted, provided that both the copyright
40df8bae1dSRodney W. Grimes  * notice and this permission notice appear in all copies of the
41df8bae1dSRodney W. Grimes  * software, derivative works or modified versions, and any portions
42df8bae1dSRodney W. Grimes  * thereof, and that both notices appear in supporting documentation.
43df8bae1dSRodney W. Grimes  *
44df8bae1dSRodney W. Grimes  * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS"
45df8bae1dSRodney W. Grimes  * CONDITION.  CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND
46df8bae1dSRodney W. Grimes  * FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
47df8bae1dSRodney W. Grimes  *
48df8bae1dSRodney W. Grimes  * Carnegie Mellon requests users of this software to return to
49df8bae1dSRodney W. Grimes  *
50df8bae1dSRodney W. Grimes  *  Software Distribution Coordinator  or  Software.Distribution@CS.CMU.EDU
51df8bae1dSRodney W. Grimes  *  School of Computer Science
52df8bae1dSRodney W. Grimes  *  Carnegie Mellon University
53df8bae1dSRodney W. Grimes  *  Pittsburgh PA 15213-3890
54df8bae1dSRodney W. Grimes  *
55df8bae1dSRodney W. Grimes  * any improvements or extensions that they make and grant Carnegie the
56df8bae1dSRodney W. Grimes  * rights to redistribute these changes.
57df8bae1dSRodney W. Grimes  */
58df8bae1dSRodney W. Grimes 
59874651b1SDavid E. O'Brien #include <sys/cdefs.h>
60874651b1SDavid E. O'Brien __FBSDID("$FreeBSD$");
61874651b1SDavid E. O'Brien 
62faa5f8d8SAndrzej Bialecki #include "opt_vm.h"
6315a7ad60SPeter Wemm #include "opt_kstack_pages.h"
6415a7ad60SPeter Wemm #include "opt_kstack_max_pages.h"
65*b7627840SKonstantin Belousov #include "opt_kstack_usage_prof.h"
66e9822d92SJoerg Wunsch 
67df8bae1dSRodney W. Grimes #include <sys/param.h>
68df8bae1dSRodney W. Grimes #include <sys/systm.h>
69104a9b7eSAlexander Kabaev #include <sys/limits.h>
70fb919e4dSMark Murray #include <sys/lock.h>
715df87b21SJeff Roberson #include <sys/malloc.h>
72fb919e4dSMark Murray #include <sys/mutex.h>
73df8bae1dSRodney W. Grimes #include <sys/proc.h>
741ba5ad42SEdward Tomasz Napierala #include <sys/racct.h>
75df8bae1dSRodney W. Grimes #include <sys/resourcevar.h>
7689f6b863SAttilio Rao #include <sys/rwlock.h>
77da61b9a6SAlan Cox #include <sys/sched.h>
78da61b9a6SAlan Cox #include <sys/sf_buf.h>
793aa12267SBruce Evans #include <sys/shm.h>
80efeaf95aSDavid Greenman #include <sys/vmmeter.h>
815df87b21SJeff Roberson #include <sys/vmem.h>
821005a129SJohn Baldwin #include <sys/sx.h>
83ceb0cf87SJohn Dyson #include <sys/sysctl.h>
84e878d997SKonstantin Belousov #include <sys/_kstack_cache.h>
858a945d10SKonstantin Belousov #include <sys/eventhandler.h>
8626f9a767SRodney W. Grimes #include <sys/kernel.h>
870384fff8SJason Evans #include <sys/ktr.h>
88a2a1c95cSPeter Wemm #include <sys/unistd.h>
8926f9a767SRodney W. Grimes 
90df8bae1dSRodney W. Grimes #include <vm/vm.h>
91efeaf95aSDavid Greenman #include <vm/vm_param.h>
92efeaf95aSDavid Greenman #include <vm/pmap.h>
93efeaf95aSDavid Greenman #include <vm/vm_map.h>
94df8bae1dSRodney W. Grimes #include <vm/vm_page.h>
9526f9a767SRodney W. Grimes #include <vm/vm_pageout.h>
96a136efe9SPeter Wemm #include <vm/vm_object.h>
97df8bae1dSRodney W. Grimes #include <vm/vm_kern.h>
98efeaf95aSDavid Greenman #include <vm/vm_extern.h>
99a136efe9SPeter Wemm #include <vm/vm_pager.h>
10092da00bbSMatthew Dillon #include <vm/swap_pager.h>
101efeaf95aSDavid Greenman 
102*b7627840SKonstantin Belousov #include <machine/cpu.h>
103*b7627840SKonstantin Belousov 
104e50f5c2eSBruce Evans #ifndef NO_SWAPPING
105b61ce5b0SJeff Roberson static int swapout(struct proc *);
106b61ce5b0SJeff Roberson static void swapclear(struct proc *);
107ac45ee97SAlan Cox static void vm_thread_swapin(struct thread *td);
108ac45ee97SAlan Cox static void vm_thread_swapout(struct thread *td);
109e50f5c2eSBruce Evans #endif
110f708ef1bSPoul-Henning Kamp 
11143a90f3aSAlan Cox /*
11243a90f3aSAlan Cox  * MPSAFE
1132d5c7e45SMatthew Dillon  *
1142d5c7e45SMatthew Dillon  * WARNING!  This code calls vm_map_check_protection() which only checks
1152d5c7e45SMatthew Dillon  * the associated vm_map_entry range.  It does not determine whether the
1162d5c7e45SMatthew Dillon  * contents of the memory is actually readable or writable.  In most cases
1172d5c7e45SMatthew Dillon  * just checking the vm_map_entry is sufficient within the kernel's address
1182d5c7e45SMatthew Dillon  * space.
11943a90f3aSAlan Cox  */
120df8bae1dSRodney W. Grimes int
121df8bae1dSRodney W. Grimes kernacc(addr, len, rw)
122c3dfdfd1SAlfred Perlstein 	void *addr;
123df8bae1dSRodney W. Grimes 	int len, rw;
124df8bae1dSRodney W. Grimes {
125df8bae1dSRodney W. Grimes 	boolean_t rv;
126df8bae1dSRodney W. Grimes 	vm_offset_t saddr, eaddr;
12702c58685SPoul-Henning Kamp 	vm_prot_t prot;
128df8bae1dSRodney W. Grimes 
129e50f5c2eSBruce Evans 	KASSERT((rw & ~VM_PROT_ALL) == 0,
13002c58685SPoul-Henning Kamp 	    ("illegal ``rw'' argument to kernacc (%x)\n", rw));
13175337a56SAlan Cox 
13275337a56SAlan Cox 	if ((vm_offset_t)addr + len > kernel_map->max_offset ||
13375337a56SAlan Cox 	    (vm_offset_t)addr + len < (vm_offset_t)addr)
13475337a56SAlan Cox 		return (FALSE);
13575337a56SAlan Cox 
13602c58685SPoul-Henning Kamp 	prot = rw;
1376cde7a16SDavid Greenman 	saddr = trunc_page((vm_offset_t)addr);
1386cde7a16SDavid Greenman 	eaddr = round_page((vm_offset_t)addr + len);
139d8834602SAlan Cox 	vm_map_lock_read(kernel_map);
140df8bae1dSRodney W. Grimes 	rv = vm_map_check_protection(kernel_map, saddr, eaddr, prot);
141d8834602SAlan Cox 	vm_map_unlock_read(kernel_map);
142df8bae1dSRodney W. Grimes 	return (rv == TRUE);
143df8bae1dSRodney W. Grimes }
144df8bae1dSRodney W. Grimes 
14543a90f3aSAlan Cox /*
14643a90f3aSAlan Cox  * MPSAFE
1472d5c7e45SMatthew Dillon  *
1482d5c7e45SMatthew Dillon  * WARNING!  This code calls vm_map_check_protection() which only checks
1492d5c7e45SMatthew Dillon  * the associated vm_map_entry range.  It does not determine whether the
1502d5c7e45SMatthew Dillon  * contents of the memory is actually readable or writable.  vmapbuf(),
1512d5c7e45SMatthew Dillon  * vm_fault_quick(), or copyin()/copout()/su*()/fu*() functions should be
1522d5c7e45SMatthew Dillon  * used in conjuction with this call.
15343a90f3aSAlan Cox  */
154df8bae1dSRodney W. Grimes int
155df8bae1dSRodney W. Grimes useracc(addr, len, rw)
156c3dfdfd1SAlfred Perlstein 	void *addr;
157df8bae1dSRodney W. Grimes 	int len, rw;
158df8bae1dSRodney W. Grimes {
159df8bae1dSRodney W. Grimes 	boolean_t rv;
16002c58685SPoul-Henning Kamp 	vm_prot_t prot;
16105ba50f5SJake Burkholder 	vm_map_t map;
162df8bae1dSRodney W. Grimes 
163e50f5c2eSBruce Evans 	KASSERT((rw & ~VM_PROT_ALL) == 0,
16402c58685SPoul-Henning Kamp 	    ("illegal ``rw'' argument to useracc (%x)\n", rw));
16502c58685SPoul-Henning Kamp 	prot = rw;
16605ba50f5SJake Burkholder 	map = &curproc->p_vmspace->vm_map;
16705ba50f5SJake Burkholder 	if ((vm_offset_t)addr + len > vm_map_max(map) ||
16805ba50f5SJake Burkholder 	    (vm_offset_t)addr + len < (vm_offset_t)addr) {
16926f9a767SRodney W. Grimes 		return (FALSE);
17026f9a767SRodney W. Grimes 	}
171d8834602SAlan Cox 	vm_map_lock_read(map);
17205ba50f5SJake Burkholder 	rv = vm_map_check_protection(map, trunc_page((vm_offset_t)addr),
17305ba50f5SJake Burkholder 	    round_page((vm_offset_t)addr + len), prot);
174d8834602SAlan Cox 	vm_map_unlock_read(map);
175df8bae1dSRodney W. Grimes 	return (rv == TRUE);
176df8bae1dSRodney W. Grimes }
177df8bae1dSRodney W. Grimes 
17816929939SDon Lewis int
179f0ea4612SDon Lewis vslock(void *addr, size_t len)
18016929939SDon Lewis {
181bb734798SDon Lewis 	vm_offset_t end, last, start;
182bb734798SDon Lewis 	vm_size_t npages;
183bb734798SDon Lewis 	int error;
18416929939SDon Lewis 
185bb734798SDon Lewis 	last = (vm_offset_t)addr + len;
186ce8660e3SDon Lewis 	start = trunc_page((vm_offset_t)addr);
187bb734798SDon Lewis 	end = round_page(last);
188bb734798SDon Lewis 	if (last < (vm_offset_t)addr || end < (vm_offset_t)addr)
18916929939SDon Lewis 		return (EINVAL);
19016929939SDon Lewis 	npages = atop(end - start);
19116929939SDon Lewis 	if (npages > vm_page_max_wired)
19216929939SDon Lewis 		return (ENOMEM);
19316929939SDon Lewis #if 0
19416929939SDon Lewis 	/*
19516929939SDon Lewis 	 * XXX - not yet
19616929939SDon Lewis 	 *
19716929939SDon Lewis 	 * The limit for transient usage of wired pages should be
19816929939SDon Lewis 	 * larger than for "permanent" wired pages (mlock()).
19916929939SDon Lewis 	 *
20016929939SDon Lewis 	 * Also, the sysctl code, which is the only present user
20116929939SDon Lewis 	 * of vslock(), does a hard loop on EAGAIN.
20216929939SDon Lewis 	 */
20344f1c916SBryan Drewery 	if (npages + vm_cnt.v_wire_count > vm_page_max_wired)
20416929939SDon Lewis 		return (EAGAIN);
20516929939SDon Lewis #endif
206ce8660e3SDon Lewis 	error = vm_map_wire(&curproc->p_vmspace->vm_map, start, end,
207d9b2500eSBrian Feldman 	    VM_MAP_WIRE_SYSTEM | VM_MAP_WIRE_NOHOLES);
208ce8660e3SDon Lewis 	/*
209ce8660e3SDon Lewis 	 * Return EFAULT on error to match copy{in,out}() behaviour
210ce8660e3SDon Lewis 	 * rather than returning ENOMEM like mlock() would.
211ce8660e3SDon Lewis 	 */
212ce8660e3SDon Lewis 	return (error == KERN_SUCCESS ? 0 : EFAULT);
21316929939SDon Lewis }
21416929939SDon Lewis 
215ce8660e3SDon Lewis void
216f0ea4612SDon Lewis vsunlock(void *addr, size_t len)
21716929939SDon Lewis {
21816929939SDon Lewis 
219ce8660e3SDon Lewis 	/* Rely on the parameter sanity checks performed by vslock(). */
220ce8660e3SDon Lewis 	(void)vm_map_unwire(&curproc->p_vmspace->vm_map,
221ce8660e3SDon Lewis 	    trunc_page((vm_offset_t)addr), round_page((vm_offset_t)addr + len),
22216929939SDon Lewis 	    VM_MAP_WIRE_SYSTEM | VM_MAP_WIRE_NOHOLES);
22316929939SDon Lewis }
22416929939SDon Lewis 
225da61b9a6SAlan Cox /*
226da61b9a6SAlan Cox  * Pin the page contained within the given object at the given offset.  If the
227da61b9a6SAlan Cox  * page is not resident, allocate and load it using the given object's pager.
228da61b9a6SAlan Cox  * Return the pinned page if successful; otherwise, return NULL.
229da61b9a6SAlan Cox  */
230da61b9a6SAlan Cox static vm_page_t
231be996836SAttilio Rao vm_imgact_hold_page(vm_object_t object, vm_ooffset_t offset)
232da61b9a6SAlan Cox {
233da61b9a6SAlan Cox 	vm_page_t m, ma[1];
234da61b9a6SAlan Cox 	vm_pindex_t pindex;
235da61b9a6SAlan Cox 	int rv;
236da61b9a6SAlan Cox 
23789f6b863SAttilio Rao 	VM_OBJECT_WLOCK(object);
238da61b9a6SAlan Cox 	pindex = OFF_TO_IDX(offset);
2395944de8eSKonstantin Belousov 	m = vm_page_grab(object, pindex, VM_ALLOC_NORMAL);
2400a2e596aSAlan Cox 	if (m->valid != VM_PAGE_BITS_ALL) {
241da61b9a6SAlan Cox 		ma[0] = m;
242da61b9a6SAlan Cox 		rv = vm_pager_get_pages(object, ma, 1, 0);
243da61b9a6SAlan Cox 		m = vm_page_lookup(object, pindex);
244da61b9a6SAlan Cox 		if (m == NULL)
245da61b9a6SAlan Cox 			goto out;
246d1a6e42dSAlan Cox 		if (rv != VM_PAGER_OK) {
2472965a453SKip Macy 			vm_page_lock(m);
248da61b9a6SAlan Cox 			vm_page_free(m);
2492965a453SKip Macy 			vm_page_unlock(m);
250da61b9a6SAlan Cox 			m = NULL;
251da61b9a6SAlan Cox 			goto out;
252da61b9a6SAlan Cox 		}
253da61b9a6SAlan Cox 	}
254c7aebda8SAttilio Rao 	vm_page_xunbusy(m);
255be996836SAttilio Rao 	vm_page_lock(m);
256be996836SAttilio Rao 	vm_page_hold(m);
25770978c93SKonstantin Belousov 	vm_page_activate(m);
258be996836SAttilio Rao 	vm_page_unlock(m);
259da61b9a6SAlan Cox out:
26089f6b863SAttilio Rao 	VM_OBJECT_WUNLOCK(object);
261da61b9a6SAlan Cox 	return (m);
262da61b9a6SAlan Cox }
263da61b9a6SAlan Cox 
264da61b9a6SAlan Cox /*
265da61b9a6SAlan Cox  * Return a CPU private mapping to the page at the given offset within the
266da61b9a6SAlan Cox  * given object.  The page is pinned before it is mapped.
267da61b9a6SAlan Cox  */
268da61b9a6SAlan Cox struct sf_buf *
269da61b9a6SAlan Cox vm_imgact_map_page(vm_object_t object, vm_ooffset_t offset)
270da61b9a6SAlan Cox {
271da61b9a6SAlan Cox 	vm_page_t m;
272da61b9a6SAlan Cox 
273be996836SAttilio Rao 	m = vm_imgact_hold_page(object, offset);
274da61b9a6SAlan Cox 	if (m == NULL)
275da61b9a6SAlan Cox 		return (NULL);
276da61b9a6SAlan Cox 	sched_pin();
277da61b9a6SAlan Cox 	return (sf_buf_alloc(m, SFB_CPUPRIVATE));
278da61b9a6SAlan Cox }
279da61b9a6SAlan Cox 
280da61b9a6SAlan Cox /*
281da61b9a6SAlan Cox  * Destroy the given CPU private mapping and unpin the page that it mapped.
282da61b9a6SAlan Cox  */
283da61b9a6SAlan Cox void
284be996836SAttilio Rao vm_imgact_unmap_page(struct sf_buf *sf)
285da61b9a6SAlan Cox {
286da61b9a6SAlan Cox 	vm_page_t m;
287da61b9a6SAlan Cox 
288da61b9a6SAlan Cox 	m = sf_buf_page(sf);
289da61b9a6SAlan Cox 	sf_buf_free(sf);
290da61b9a6SAlan Cox 	sched_unpin();
291be996836SAttilio Rao 	vm_page_lock(m);
292be996836SAttilio Rao 	vm_page_unhold(m);
293be996836SAttilio Rao 	vm_page_unlock(m);
294da61b9a6SAlan Cox }
295da61b9a6SAlan Cox 
2961a4fcaebSMarcel Moolenaar void
2971a4fcaebSMarcel Moolenaar vm_sync_icache(vm_map_t map, vm_offset_t va, vm_offset_t sz)
2981a4fcaebSMarcel Moolenaar {
2991a4fcaebSMarcel Moolenaar 
3001a4fcaebSMarcel Moolenaar 	pmap_sync_icache(map->pmap, va, sz);
3011a4fcaebSMarcel Moolenaar }
3021a4fcaebSMarcel Moolenaar 
303e878d997SKonstantin Belousov struct kstack_cache_entry *kstack_cache;
3048a945d10SKonstantin Belousov static int kstack_cache_size = 128;
3058a945d10SKonstantin Belousov static int kstacks;
3068a945d10SKonstantin Belousov static struct mtx kstack_cache_mtx;
30725c1e164SAndre Oppermann MTX_SYSINIT(kstack_cache, &kstack_cache_mtx, "kstkch", MTX_DEF);
30825c1e164SAndre Oppermann 
3098a945d10SKonstantin Belousov SYSCTL_INT(_vm, OID_AUTO, kstack_cache_size, CTLFLAG_RW, &kstack_cache_size, 0,
3108a945d10SKonstantin Belousov     "");
3118a945d10SKonstantin Belousov SYSCTL_INT(_vm, OID_AUTO, kstacks, CTLFLAG_RD, &kstacks, 0,
3128a945d10SKonstantin Belousov     "");
3138a945d10SKonstantin Belousov 
31449a2507bSAlan Cox #ifndef KSTACK_MAX_PAGES
31549a2507bSAlan Cox #define KSTACK_MAX_PAGES 32
31649a2507bSAlan Cox #endif
31749a2507bSAlan Cox 
31849a2507bSAlan Cox /*
31949a2507bSAlan Cox  * Create the kernel stack (including pcb for i386) for a new thread.
32049a2507bSAlan Cox  * This routine directly affects the fork perf for a process and
32149a2507bSAlan Cox  * create performance for a thread.
32249a2507bSAlan Cox  */
32389b57fcfSKonstantin Belousov int
32449a2507bSAlan Cox vm_thread_new(struct thread *td, int pages)
32549a2507bSAlan Cox {
32649a2507bSAlan Cox 	vm_object_t ksobj;
32749a2507bSAlan Cox 	vm_offset_t ks;
32849a2507bSAlan Cox 	vm_page_t m, ma[KSTACK_MAX_PAGES];
3298a945d10SKonstantin Belousov 	struct kstack_cache_entry *ks_ce;
33049a2507bSAlan Cox 	int i;
33149a2507bSAlan Cox 
33249a2507bSAlan Cox 	/* Bounds check */
33349a2507bSAlan Cox 	if (pages <= 1)
33449a2507bSAlan Cox 		pages = KSTACK_PAGES;
33549a2507bSAlan Cox 	else if (pages > KSTACK_MAX_PAGES)
33649a2507bSAlan Cox 		pages = KSTACK_MAX_PAGES;
3378a945d10SKonstantin Belousov 
3388a945d10SKonstantin Belousov 	if (pages == KSTACK_PAGES) {
3398a945d10SKonstantin Belousov 		mtx_lock(&kstack_cache_mtx);
3408a945d10SKonstantin Belousov 		if (kstack_cache != NULL) {
3418a945d10SKonstantin Belousov 			ks_ce = kstack_cache;
3428a945d10SKonstantin Belousov 			kstack_cache = ks_ce->next_ks_entry;
3438a945d10SKonstantin Belousov 			mtx_unlock(&kstack_cache_mtx);
3448a945d10SKonstantin Belousov 
3458a945d10SKonstantin Belousov 			td->td_kstack_obj = ks_ce->ksobj;
3468a945d10SKonstantin Belousov 			td->td_kstack = (vm_offset_t)ks_ce;
3478a945d10SKonstantin Belousov 			td->td_kstack_pages = KSTACK_PAGES;
3488a945d10SKonstantin Belousov 			return (1);
3498a945d10SKonstantin Belousov 		}
3508a945d10SKonstantin Belousov 		mtx_unlock(&kstack_cache_mtx);
3518a945d10SKonstantin Belousov 	}
3528a945d10SKonstantin Belousov 
35349a2507bSAlan Cox 	/*
35449a2507bSAlan Cox 	 * Allocate an object for the kstack.
35549a2507bSAlan Cox 	 */
35649a2507bSAlan Cox 	ksobj = vm_object_allocate(OBJT_DEFAULT, pages);
357374ae2a3SJeff Roberson 
35849a2507bSAlan Cox 	/*
35949a2507bSAlan Cox 	 * Get a kernel virtual address for this thread's kstack.
36049a2507bSAlan Cox 	 */
361ca596a25SJuli Mallett #if defined(__mips__)
362ca596a25SJuli Mallett 	/*
363ca596a25SJuli Mallett 	 * We need to align the kstack's mapped address to fit within
364ca596a25SJuli Mallett 	 * a single TLB entry.
365ca596a25SJuli Mallett 	 */
3665df87b21SJeff Roberson 	if (vmem_xalloc(kernel_arena, (pages + KSTACK_GUARD_PAGES) * PAGE_SIZE,
3675df87b21SJeff Roberson 	    PAGE_SIZE * 2, 0, 0, VMEM_ADDR_MIN, VMEM_ADDR_MAX,
3685df87b21SJeff Roberson 	    M_BESTFIT | M_NOWAIT, &ks)) {
3695df87b21SJeff Roberson 		ks = 0;
3705df87b21SJeff Roberson 	}
371ca596a25SJuli Mallett #else
3725df87b21SJeff Roberson 	ks = kva_alloc((pages + KSTACK_GUARD_PAGES) * PAGE_SIZE);
373ca596a25SJuli Mallett #endif
37489b57fcfSKonstantin Belousov 	if (ks == 0) {
37589b57fcfSKonstantin Belousov 		printf("vm_thread_new: kstack allocation failed\n");
37689b57fcfSKonstantin Belousov 		vm_object_deallocate(ksobj);
37789b57fcfSKonstantin Belousov 		return (0);
37889b57fcfSKonstantin Belousov 	}
37989b57fcfSKonstantin Belousov 
3808a945d10SKonstantin Belousov 	atomic_add_int(&kstacks, 1);
38149a2507bSAlan Cox 	if (KSTACK_GUARD_PAGES != 0) {
38249a2507bSAlan Cox 		pmap_qremove(ks, KSTACK_GUARD_PAGES);
38349a2507bSAlan Cox 		ks += KSTACK_GUARD_PAGES * PAGE_SIZE;
38449a2507bSAlan Cox 	}
38589b57fcfSKonstantin Belousov 	td->td_kstack_obj = ksobj;
38649a2507bSAlan Cox 	td->td_kstack = ks;
38749a2507bSAlan Cox 	/*
38849a2507bSAlan Cox 	 * Knowing the number of pages allocated is useful when you
38949a2507bSAlan Cox 	 * want to deallocate them.
39049a2507bSAlan Cox 	 */
39149a2507bSAlan Cox 	td->td_kstack_pages = pages;
39249a2507bSAlan Cox 	/*
39349a2507bSAlan Cox 	 * For the length of the stack, link in a real page of ram for each
39449a2507bSAlan Cox 	 * page of stack.
39549a2507bSAlan Cox 	 */
39689f6b863SAttilio Rao 	VM_OBJECT_WLOCK(ksobj);
39749a2507bSAlan Cox 	for (i = 0; i < pages; i++) {
39849a2507bSAlan Cox 		/*
39949a2507bSAlan Cox 		 * Get a kernel stack page.
40049a2507bSAlan Cox 		 */
401ddf4bb37SAlan Cox 		m = vm_page_grab(ksobj, i, VM_ALLOC_NOBUSY |
4025944de8eSKonstantin Belousov 		    VM_ALLOC_NORMAL | VM_ALLOC_WIRED);
40349a2507bSAlan Cox 		ma[i] = m;
40449a2507bSAlan Cox 		m->valid = VM_PAGE_BITS_ALL;
40549a2507bSAlan Cox 	}
40689f6b863SAttilio Rao 	VM_OBJECT_WUNLOCK(ksobj);
40749a2507bSAlan Cox 	pmap_qenter(ks, ma, pages);
40889b57fcfSKonstantin Belousov 	return (1);
40949a2507bSAlan Cox }
41049a2507bSAlan Cox 
4118a945d10SKonstantin Belousov static void
4128a945d10SKonstantin Belousov vm_thread_stack_dispose(vm_object_t ksobj, vm_offset_t ks, int pages)
41349a2507bSAlan Cox {
41449a2507bSAlan Cox 	vm_page_t m;
4158a945d10SKonstantin Belousov 	int i;
41649a2507bSAlan Cox 
4178a945d10SKonstantin Belousov 	atomic_add_int(&kstacks, -1);
41849a2507bSAlan Cox 	pmap_qremove(ks, pages);
41989f6b863SAttilio Rao 	VM_OBJECT_WLOCK(ksobj);
42049a2507bSAlan Cox 	for (i = 0; i < pages; i++) {
42149a2507bSAlan Cox 		m = vm_page_lookup(ksobj, i);
42249a2507bSAlan Cox 		if (m == NULL)
42349a2507bSAlan Cox 			panic("vm_thread_dispose: kstack already missing?");
4242965a453SKip Macy 		vm_page_lock(m);
4253ae10f74SAttilio Rao 		vm_page_unwire(m, PQ_INACTIVE);
42649a2507bSAlan Cox 		vm_page_free(m);
4272965a453SKip Macy 		vm_page_unlock(m);
42849a2507bSAlan Cox 	}
42989f6b863SAttilio Rao 	VM_OBJECT_WUNLOCK(ksobj);
43049a2507bSAlan Cox 	vm_object_deallocate(ksobj);
4315df87b21SJeff Roberson 	kva_free(ks - (KSTACK_GUARD_PAGES * PAGE_SIZE),
43249a2507bSAlan Cox 	    (pages + KSTACK_GUARD_PAGES) * PAGE_SIZE);
433c3cf0b47SKonstantin Belousov }
434c3cf0b47SKonstantin Belousov 
435c3cf0b47SKonstantin Belousov /*
4368a945d10SKonstantin Belousov  * Dispose of a thread's kernel stack.
4378a945d10SKonstantin Belousov  */
4388a945d10SKonstantin Belousov void
4398a945d10SKonstantin Belousov vm_thread_dispose(struct thread *td)
4408a945d10SKonstantin Belousov {
4418a945d10SKonstantin Belousov 	vm_object_t ksobj;
4428a945d10SKonstantin Belousov 	vm_offset_t ks;
4438a945d10SKonstantin Belousov 	struct kstack_cache_entry *ks_ce;
4448a945d10SKonstantin Belousov 	int pages;
4458a945d10SKonstantin Belousov 
4468a945d10SKonstantin Belousov 	pages = td->td_kstack_pages;
4478a945d10SKonstantin Belousov 	ksobj = td->td_kstack_obj;
4488a945d10SKonstantin Belousov 	ks = td->td_kstack;
4498a945d10SKonstantin Belousov 	td->td_kstack = 0;
4508a945d10SKonstantin Belousov 	td->td_kstack_pages = 0;
4518a945d10SKonstantin Belousov 	if (pages == KSTACK_PAGES && kstacks <= kstack_cache_size) {
4528a945d10SKonstantin Belousov 		ks_ce = (struct kstack_cache_entry *)ks;
4538a945d10SKonstantin Belousov 		ks_ce->ksobj = ksobj;
4548a945d10SKonstantin Belousov 		mtx_lock(&kstack_cache_mtx);
4558a945d10SKonstantin Belousov 		ks_ce->next_ks_entry = kstack_cache;
4568a945d10SKonstantin Belousov 		kstack_cache = ks_ce;
4578a945d10SKonstantin Belousov 		mtx_unlock(&kstack_cache_mtx);
4588a945d10SKonstantin Belousov 		return;
4598a945d10SKonstantin Belousov 	}
4608a945d10SKonstantin Belousov 	vm_thread_stack_dispose(ksobj, ks, pages);
4618a945d10SKonstantin Belousov }
4628a945d10SKonstantin Belousov 
4638a945d10SKonstantin Belousov static void
4648a945d10SKonstantin Belousov vm_thread_stack_lowmem(void *nulll)
4658a945d10SKonstantin Belousov {
4668a945d10SKonstantin Belousov 	struct kstack_cache_entry *ks_ce, *ks_ce1;
4678a945d10SKonstantin Belousov 
4688a945d10SKonstantin Belousov 	mtx_lock(&kstack_cache_mtx);
4698a945d10SKonstantin Belousov 	ks_ce = kstack_cache;
4708a945d10SKonstantin Belousov 	kstack_cache = NULL;
4718a945d10SKonstantin Belousov 	mtx_unlock(&kstack_cache_mtx);
4728a945d10SKonstantin Belousov 
4738a945d10SKonstantin Belousov 	while (ks_ce != NULL) {
4748a945d10SKonstantin Belousov 		ks_ce1 = ks_ce;
4758a945d10SKonstantin Belousov 		ks_ce = ks_ce->next_ks_entry;
4768a945d10SKonstantin Belousov 
4778a945d10SKonstantin Belousov 		vm_thread_stack_dispose(ks_ce1->ksobj, (vm_offset_t)ks_ce1,
4788a945d10SKonstantin Belousov 		    KSTACK_PAGES);
4798a945d10SKonstantin Belousov 	}
4808a945d10SKonstantin Belousov }
4818a945d10SKonstantin Belousov 
4828a945d10SKonstantin Belousov static void
4838a945d10SKonstantin Belousov kstack_cache_init(void *nulll)
4848a945d10SKonstantin Belousov {
4858a945d10SKonstantin Belousov 
4868a945d10SKonstantin Belousov 	EVENTHANDLER_REGISTER(vm_lowmem, vm_thread_stack_lowmem, NULL,
4878a945d10SKonstantin Belousov 	    EVENTHANDLER_PRI_ANY);
4888a945d10SKonstantin Belousov }
4898a945d10SKonstantin Belousov 
4908a945d10SKonstantin Belousov SYSINIT(vm_kstacks, SI_SUB_KTHREAD_INIT, SI_ORDER_ANY, kstack_cache_init, NULL);
4918a945d10SKonstantin Belousov 
492*b7627840SKonstantin Belousov #ifdef KSTACK_USAGE_PROF
493*b7627840SKonstantin Belousov /*
494*b7627840SKonstantin Belousov  * Track maximum stack used by a thread in kernel.
495*b7627840SKonstantin Belousov  */
496*b7627840SKonstantin Belousov static int max_kstack_used;
497*b7627840SKonstantin Belousov 
498*b7627840SKonstantin Belousov SYSCTL_INT(_debug, OID_AUTO, max_kstack_used, CTLFLAG_RD,
499*b7627840SKonstantin Belousov     &max_kstack_used, 0,
500*b7627840SKonstantin Belousov     "Maxiumum stack depth used by a thread in kernel");
501*b7627840SKonstantin Belousov 
502*b7627840SKonstantin Belousov void
503*b7627840SKonstantin Belousov intr_prof_stack_use(struct thread *td, struct trapframe *frame)
504*b7627840SKonstantin Belousov {
505*b7627840SKonstantin Belousov 	vm_offset_t stack_top;
506*b7627840SKonstantin Belousov 	vm_offset_t current;
507*b7627840SKonstantin Belousov 	int used, prev_used;
508*b7627840SKonstantin Belousov 
509*b7627840SKonstantin Belousov 	/*
510*b7627840SKonstantin Belousov 	 * Testing for interrupted kernel mode isn't strictly
511*b7627840SKonstantin Belousov 	 * needed. It optimizes the execution, since interrupts from
512*b7627840SKonstantin Belousov 	 * usermode will have only the trap frame on the stack.
513*b7627840SKonstantin Belousov 	 */
514*b7627840SKonstantin Belousov 	if (TRAPF_USERMODE(frame))
515*b7627840SKonstantin Belousov 		return;
516*b7627840SKonstantin Belousov 
517*b7627840SKonstantin Belousov 	stack_top = td->td_kstack + td->td_kstack_pages * PAGE_SIZE;
518*b7627840SKonstantin Belousov 	current = (vm_offset_t)(uintptr_t)&stack_top;
519*b7627840SKonstantin Belousov 
520*b7627840SKonstantin Belousov 	/*
521*b7627840SKonstantin Belousov 	 * Try to detect if interrupt is using kernel thread stack.
522*b7627840SKonstantin Belousov 	 * Hardware could use a dedicated stack for interrupt handling.
523*b7627840SKonstantin Belousov 	 */
524*b7627840SKonstantin Belousov 	if (stack_top <= current || current < td->td_kstack)
525*b7627840SKonstantin Belousov 		return;
526*b7627840SKonstantin Belousov 
527*b7627840SKonstantin Belousov 	used = stack_top - current;
528*b7627840SKonstantin Belousov 	for (;;) {
529*b7627840SKonstantin Belousov 		prev_used = max_kstack_used;
530*b7627840SKonstantin Belousov 		if (prev_used >= used)
531*b7627840SKonstantin Belousov 			break;
532*b7627840SKonstantin Belousov 		if (atomic_cmpset_int(&max_kstack_used, prev_used, used))
533*b7627840SKonstantin Belousov 			break;
534*b7627840SKonstantin Belousov 	}
535*b7627840SKonstantin Belousov }
536*b7627840SKonstantin Belousov #endif /* KSTACK_USAGE_PROF */
537*b7627840SKonstantin Belousov 
538ac45ee97SAlan Cox #ifndef NO_SWAPPING
5398a945d10SKonstantin Belousov /*
54049a2507bSAlan Cox  * Allow a thread's kernel stack to be paged out.
54149a2507bSAlan Cox  */
542ac45ee97SAlan Cox static void
54349a2507bSAlan Cox vm_thread_swapout(struct thread *td)
54449a2507bSAlan Cox {
54549a2507bSAlan Cox 	vm_object_t ksobj;
54649a2507bSAlan Cox 	vm_page_t m;
54749a2507bSAlan Cox 	int i, pages;
54849a2507bSAlan Cox 
549710338e9SMarcel Moolenaar 	cpu_thread_swapout(td);
55049a2507bSAlan Cox 	pages = td->td_kstack_pages;
55149a2507bSAlan Cox 	ksobj = td->td_kstack_obj;
55249a2507bSAlan Cox 	pmap_qremove(td->td_kstack, pages);
55389f6b863SAttilio Rao 	VM_OBJECT_WLOCK(ksobj);
55449a2507bSAlan Cox 	for (i = 0; i < pages; i++) {
55549a2507bSAlan Cox 		m = vm_page_lookup(ksobj, i);
55649a2507bSAlan Cox 		if (m == NULL)
55749a2507bSAlan Cox 			panic("vm_thread_swapout: kstack already missing?");
55849a2507bSAlan Cox 		vm_page_dirty(m);
5592965a453SKip Macy 		vm_page_lock(m);
5603ae10f74SAttilio Rao 		vm_page_unwire(m, PQ_INACTIVE);
5612965a453SKip Macy 		vm_page_unlock(m);
56249a2507bSAlan Cox 	}
56389f6b863SAttilio Rao 	VM_OBJECT_WUNLOCK(ksobj);
56449a2507bSAlan Cox }
56549a2507bSAlan Cox 
56649a2507bSAlan Cox /*
56749a2507bSAlan Cox  * Bring the kernel stack for a specified thread back in.
56849a2507bSAlan Cox  */
569ac45ee97SAlan Cox static void
57049a2507bSAlan Cox vm_thread_swapin(struct thread *td)
57149a2507bSAlan Cox {
57249a2507bSAlan Cox 	vm_object_t ksobj;
5736fb8c0c1SKonstantin Belousov 	vm_page_t ma[KSTACK_MAX_PAGES];
5746fb8c0c1SKonstantin Belousov 	int i, j, k, pages, rv;
57549a2507bSAlan Cox 
57649a2507bSAlan Cox 	pages = td->td_kstack_pages;
57749a2507bSAlan Cox 	ksobj = td->td_kstack_obj;
57889f6b863SAttilio Rao 	VM_OBJECT_WLOCK(ksobj);
5796fb8c0c1SKonstantin Belousov 	for (i = 0; i < pages; i++)
5805944de8eSKonstantin Belousov 		ma[i] = vm_page_grab(ksobj, i, VM_ALLOC_NORMAL |
5816c68c971SAlan Cox 		    VM_ALLOC_WIRED);
5826fb8c0c1SKonstantin Belousov 	for (i = 0; i < pages; i++) {
5836fb8c0c1SKonstantin Belousov 		if (ma[i]->valid != VM_PAGE_BITS_ALL) {
584c7aebda8SAttilio Rao 			vm_page_assert_xbusied(ma[i]);
5856fb8c0c1SKonstantin Belousov 			vm_object_pip_add(ksobj, 1);
5866fb8c0c1SKonstantin Belousov 			for (j = i + 1; j < pages; j++) {
587c7aebda8SAttilio Rao 				if (ma[j]->valid != VM_PAGE_BITS_ALL)
588c7aebda8SAttilio Rao 					vm_page_assert_xbusied(ma[j]);
5896fb8c0c1SKonstantin Belousov 				if (ma[j]->valid == VM_PAGE_BITS_ALL)
5906fb8c0c1SKonstantin Belousov 					break;
59149a2507bSAlan Cox 			}
5926fb8c0c1SKonstantin Belousov 			rv = vm_pager_get_pages(ksobj, ma + i, j - i, 0);
5936fb8c0c1SKonstantin Belousov 			if (rv != VM_PAGER_OK)
5946fb8c0c1SKonstantin Belousov 	panic("vm_thread_swapin: cannot get kstack for proc: %d",
5956fb8c0c1SKonstantin Belousov 				    td->td_proc->p_pid);
5966fb8c0c1SKonstantin Belousov 			vm_object_pip_wakeup(ksobj);
5976fb8c0c1SKonstantin Belousov 			for (k = i; k < j; k++)
5986fb8c0c1SKonstantin Belousov 				ma[k] = vm_page_lookup(ksobj, k);
599c7aebda8SAttilio Rao 			vm_page_xunbusy(ma[i]);
600c7aebda8SAttilio Rao 		} else if (vm_page_xbusied(ma[i]))
601c7aebda8SAttilio Rao 			vm_page_xunbusy(ma[i]);
60249a2507bSAlan Cox 	}
60389f6b863SAttilio Rao 	VM_OBJECT_WUNLOCK(ksobj);
60449a2507bSAlan Cox 	pmap_qenter(td->td_kstack, ma, pages);
605710338e9SMarcel Moolenaar 	cpu_thread_swapin(td);
60649a2507bSAlan Cox }
607ac45ee97SAlan Cox #endif /* !NO_SWAPPING */
60849a2507bSAlan Cox 
609a136efe9SPeter Wemm /*
610df8bae1dSRodney W. Grimes  * Implement fork's actions on an address space.
611df8bae1dSRodney W. Grimes  * Here we arrange for the address space to be copied or referenced,
612df8bae1dSRodney W. Grimes  * allocate a user struct (pcb and kernel stack), then call the
613df8bae1dSRodney W. Grimes  * machine-dependent layer to fill those in and make the new process
614a2a1c95cSPeter Wemm  * ready to run.  The new process is set up so that it returns directly
615a2a1c95cSPeter Wemm  * to user mode to avoid stack copying and relocation problems.
616df8bae1dSRodney W. Grimes  */
61789b57fcfSKonstantin Belousov int
61889b57fcfSKonstantin Belousov vm_forkproc(td, p2, td2, vm2, flags)
619b40ce416SJulian Elischer 	struct thread *td;
620b40ce416SJulian Elischer 	struct proc *p2;
621079b7badSJulian Elischer 	struct thread *td2;
62289b57fcfSKonstantin Belousov 	struct vmspace *vm2;
623a2a1c95cSPeter Wemm 	int flags;
624df8bae1dSRodney W. Grimes {
625b40ce416SJulian Elischer 	struct proc *p1 = td->td_proc;
62689b57fcfSKonstantin Belousov 	int error;
627df8bae1dSRodney W. Grimes 
62891c28bfdSLuoqi Chen 	if ((flags & RFPROC) == 0) {
62991c28bfdSLuoqi Chen 		/*
63091c28bfdSLuoqi Chen 		 * Divorce the memory, if it is shared, essentially
63191c28bfdSLuoqi Chen 		 * this changes shared memory amongst threads, into
63291c28bfdSLuoqi Chen 		 * COW locally.
63391c28bfdSLuoqi Chen 		 */
63491c28bfdSLuoqi Chen 		if ((flags & RFMEM) == 0) {
63591c28bfdSLuoqi Chen 			if (p1->p_vmspace->vm_refcnt > 1) {
63689b57fcfSKonstantin Belousov 				error = vmspace_unshare(p1);
63789b57fcfSKonstantin Belousov 				if (error)
63889b57fcfSKonstantin Belousov 					return (error);
63991c28bfdSLuoqi Chen 			}
64091c28bfdSLuoqi Chen 		}
641079b7badSJulian Elischer 		cpu_fork(td, p2, td2, flags);
64289b57fcfSKonstantin Belousov 		return (0);
64391c28bfdSLuoqi Chen 	}
64491c28bfdSLuoqi Chen 
6455856e12eSJohn Dyson 	if (flags & RFMEM) {
6465856e12eSJohn Dyson 		p2->p_vmspace = p1->p_vmspace;
6471a276a3fSAlan Cox 		atomic_add_int(&p1->p_vmspace->vm_refcnt, 1);
6485856e12eSJohn Dyson 	}
6495856e12eSJohn Dyson 
65090ecac61SMatthew Dillon 	while (vm_page_count_severe()) {
65126f9a767SRodney W. Grimes 		VM_WAIT;
6520d94caffSDavid Greenman 	}
65326f9a767SRodney W. Grimes 
6545856e12eSJohn Dyson 	if ((flags & RFMEM) == 0) {
65589b57fcfSKonstantin Belousov 		p2->p_vmspace = vm2;
656df8bae1dSRodney W. Grimes 		if (p1->p_vmspace->vm_shm)
657dabee6feSPeter Wemm 			shmfork(p1, p2);
658a2a1c95cSPeter Wemm 	}
659df8bae1dSRodney W. Grimes 
66039fb8e6bSJulian Elischer 	/*
661a2a1c95cSPeter Wemm 	 * cpu_fork will copy and update the pcb, set up the kernel stack,
662a2a1c95cSPeter Wemm 	 * and make the child ready to run.
663df8bae1dSRodney W. Grimes 	 */
664079b7badSJulian Elischer 	cpu_fork(td, p2, td2, flags);
66589b57fcfSKonstantin Belousov 	return (0);
666df8bae1dSRodney W. Grimes }
667df8bae1dSRodney W. Grimes 
668df8bae1dSRodney W. Grimes /*
669eb30c1c0SPeter Wemm  * Called after process has been wait(2)'ed apon and is being reaped.
670eb30c1c0SPeter Wemm  * The idea is to reclaim resources that we could not reclaim while
671eb30c1c0SPeter Wemm  * the process was still executing.
672eb30c1c0SPeter Wemm  */
673eb30c1c0SPeter Wemm void
674eb30c1c0SPeter Wemm vm_waitproc(p)
675eb30c1c0SPeter Wemm 	struct proc *p;
676eb30c1c0SPeter Wemm {
677eb30c1c0SPeter Wemm 
678582ec34cSAlfred Perlstein 	vmspace_exitfree(p);		/* and clean-out the vmspace */
679eb30c1c0SPeter Wemm }
680eb30c1c0SPeter Wemm 
68126f9a767SRodney W. Grimes void
68226f9a767SRodney W. Grimes faultin(p)
68326f9a767SRodney W. Grimes 	struct proc *p;
68426f9a767SRodney W. Grimes {
68511edc1e0SJohn Baldwin #ifdef NO_SWAPPING
68611edc1e0SJohn Baldwin 
68711edc1e0SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
688b61ce5b0SJeff Roberson 	if ((p->p_flag & P_INMEM) == 0)
68911edc1e0SJohn Baldwin 		panic("faultin: proc swapped out with NO_SWAPPING!");
69011edc1e0SJohn Baldwin #else /* !NO_SWAPPING */
691664f718bSJohn Baldwin 	struct thread *td;
69226f9a767SRodney W. Grimes 
693c96d52a9SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
6941d7b9ed2SJulian Elischer 	/*
6951d7b9ed2SJulian Elischer 	 * If another process is swapping in this process,
6961d7b9ed2SJulian Elischer 	 * just wait until it finishes.
6971d7b9ed2SJulian Elischer 	 */
698b61ce5b0SJeff Roberson 	if (p->p_flag & P_SWAPPINGIN) {
699b61ce5b0SJeff Roberson 		while (p->p_flag & P_SWAPPINGIN)
700b61ce5b0SJeff Roberson 			msleep(&p->p_flag, &p->p_mtx, PVM, "faultin", 0);
701b61ce5b0SJeff Roberson 		return;
702b61ce5b0SJeff Roberson 	}
703b61ce5b0SJeff Roberson 	if ((p->p_flag & P_INMEM) == 0) {
704664f718bSJohn Baldwin 		/*
705664f718bSJohn Baldwin 		 * Don't let another thread swap process p out while we are
706664f718bSJohn Baldwin 		 * busy swapping it in.
707664f718bSJohn Baldwin 		 */
708664f718bSJohn Baldwin 		++p->p_lock;
709b61ce5b0SJeff Roberson 		p->p_flag |= P_SWAPPINGIN;
71045ece682SJohn Baldwin 		PROC_UNLOCK(p);
71126f9a767SRodney W. Grimes 
712b61ce5b0SJeff Roberson 		/*
713b61ce5b0SJeff Roberson 		 * We hold no lock here because the list of threads
714b61ce5b0SJeff Roberson 		 * can not change while all threads in the process are
715b61ce5b0SJeff Roberson 		 * swapped out.
716b61ce5b0SJeff Roberson 		 */
717664f718bSJohn Baldwin 		FOREACH_THREAD_IN_PROC(p, td)
71849a2507bSAlan Cox 			vm_thread_swapin(td);
71945ece682SJohn Baldwin 		PROC_LOCK(p);
720b61ce5b0SJeff Roberson 		swapclear(p);
721258853abSJeff Roberson 		p->p_swtick = ticks;
72226f9a767SRodney W. Grimes 
723b61ce5b0SJeff Roberson 		wakeup(&p->p_flag);
72426f9a767SRodney W. Grimes 
725664f718bSJohn Baldwin 		/* Allow other threads to swap p out now. */
72626f9a767SRodney W. Grimes 		--p->p_lock;
72726f9a767SRodney W. Grimes 	}
72811edc1e0SJohn Baldwin #endif /* NO_SWAPPING */
72926f9a767SRodney W. Grimes }
73026f9a767SRodney W. Grimes 
731df8bae1dSRodney W. Grimes /*
73226f9a767SRodney W. Grimes  * This swapin algorithm attempts to swap-in processes only if there
73326f9a767SRodney W. Grimes  * is enough space for them.  Of course, if a process waits for a long
73426f9a767SRodney W. Grimes  * time, it will be swapped in anyway.
7350384fff8SJason Evans  *
73610c447faSAlan Cox  * Giant is held on entry.
737df8bae1dSRodney W. Grimes  */
738785797c3SAndriy Gapon void
739785797c3SAndriy Gapon swapper(void)
740df8bae1dSRodney W. Grimes {
74154d92145SMatthew Dillon 	struct proc *p;
742e602ba25SJulian Elischer 	struct thread *td;
743df8bae1dSRodney W. Grimes 	struct proc *pp;
744258853abSJeff Roberson 	int slptime;
745258853abSJeff Roberson 	int swtime;
746df8bae1dSRodney W. Grimes 	int ppri;
747258853abSJeff Roberson 	int pri;
748df8bae1dSRodney W. Grimes 
749df8bae1dSRodney W. Grimes loop:
75090ecac61SMatthew Dillon 	if (vm_page_count_min()) {
7510d94caffSDavid Greenman 		VM_WAIT;
75290ecac61SMatthew Dillon 		goto loop;
7530d94caffSDavid Greenman 	}
75426f9a767SRodney W. Grimes 
755df8bae1dSRodney W. Grimes 	pp = NULL;
756df8bae1dSRodney W. Grimes 	ppri = INT_MIN;
7571005a129SJohn Baldwin 	sx_slock(&allproc_lock);
758b40ce416SJulian Elischer 	FOREACH_PROC_IN_SYSTEM(p) {
759b61ce5b0SJeff Roberson 		PROC_LOCK(p);
760e806d352SJohn Baldwin 		if (p->p_state == PRS_NEW ||
761e806d352SJohn Baldwin 		    p->p_flag & (P_SWAPPINGOUT | P_SWAPPINGIN | P_INMEM)) {
762b61ce5b0SJeff Roberson 			PROC_UNLOCK(p);
763e602ba25SJulian Elischer 			continue;
764e602ba25SJulian Elischer 		}
765258853abSJeff Roberson 		swtime = (ticks - p->p_swtick) / hz;
766e602ba25SJulian Elischer 		FOREACH_THREAD_IN_PROC(p, td) {
7671d7b9ed2SJulian Elischer 			/*
76871fad9fdSJulian Elischer 			 * An otherwise runnable thread of a process
76971fad9fdSJulian Elischer 			 * swapped out has only the TDI_SWAPPED bit set.
77071fad9fdSJulian Elischer 			 *
7711d7b9ed2SJulian Elischer 			 */
772982d11f8SJeff Roberson 			thread_lock(td);
77371fad9fdSJulian Elischer 			if (td->td_inhibitors == TDI_SWAPPED) {
774258853abSJeff Roberson 				slptime = (ticks - td->td_slptick) / hz;
775258853abSJeff Roberson 				pri = swtime + slptime;
776b61ce5b0SJeff Roberson 				if ((td->td_flags & TDF_SWAPINREQ) == 0)
777fa885116SJulian Elischer 					pri -= p->p_nice * 8;
77826f9a767SRodney W. Grimes 				/*
779ad1e7d28SJulian Elischer 				 * if this thread is higher priority
780b40ce416SJulian Elischer 				 * and there is enough space, then select
781b40ce416SJulian Elischer 				 * this process instead of the previous
782b40ce416SJulian Elischer 				 * selection.
78326f9a767SRodney W. Grimes 				 */
7840d94caffSDavid Greenman 				if (pri > ppri) {
785df8bae1dSRodney W. Grimes 					pp = p;
786df8bae1dSRodney W. Grimes 					ppri = pri;
787df8bae1dSRodney W. Grimes 				}
788df8bae1dSRodney W. Grimes 			}
789982d11f8SJeff Roberson 			thread_unlock(td);
790b40ce416SJulian Elischer 		}
791b61ce5b0SJeff Roberson 		PROC_UNLOCK(p);
792df8bae1dSRodney W. Grimes 	}
7931005a129SJohn Baldwin 	sx_sunlock(&allproc_lock);
79426f9a767SRodney W. Grimes 
795df8bae1dSRodney W. Grimes 	/*
796a669a6e9SJohn Dyson 	 * Nothing to do, back to sleep.
797df8bae1dSRodney W. Grimes 	 */
798df8bae1dSRodney W. Grimes 	if ((p = pp) == NULL) {
799785797c3SAndriy Gapon 		tsleep(&proc0, PVM, "swapin", MAXSLP * hz / 2);
800df8bae1dSRodney W. Grimes 		goto loop;
801df8bae1dSRodney W. Grimes 	}
8021d7b9ed2SJulian Elischer 	PROC_LOCK(p);
8031d7b9ed2SJulian Elischer 
8041d7b9ed2SJulian Elischer 	/*
8051d7b9ed2SJulian Elischer 	 * Another process may be bringing or may have already
8061d7b9ed2SJulian Elischer 	 * brought this process in while we traverse all threads.
8071d7b9ed2SJulian Elischer 	 * Or, this process may even be being swapped out again.
8081d7b9ed2SJulian Elischer 	 */
809b61ce5b0SJeff Roberson 	if (p->p_flag & (P_INMEM | P_SWAPPINGOUT | P_SWAPPINGIN)) {
8101d7b9ed2SJulian Elischer 		PROC_UNLOCK(p);
8111d7b9ed2SJulian Elischer 		goto loop;
8121d7b9ed2SJulian Elischer 	}
8131d7b9ed2SJulian Elischer 
814df8bae1dSRodney W. Grimes 	/*
81526f9a767SRodney W. Grimes 	 * We would like to bring someone in. (only if there is space).
816e602ba25SJulian Elischer 	 * [What checks the space? ]
817df8bae1dSRodney W. Grimes 	 */
81826f9a767SRodney W. Grimes 	faultin(p);
81945ece682SJohn Baldwin 	PROC_UNLOCK(p);
820df8bae1dSRodney W. Grimes 	goto loop;
821df8bae1dSRodney W. Grimes }
822df8bae1dSRodney W. Grimes 
823da7bbd2cSJohn Baldwin void
824da7bbd2cSJohn Baldwin kick_proc0(void)
825d13ec713SStephan Uphoff {
826d13ec713SStephan Uphoff 
827da7bbd2cSJohn Baldwin 	wakeup(&proc0);
828d13ec713SStephan Uphoff }
829d13ec713SStephan Uphoff 
8305afce282SDavid Greenman #ifndef NO_SWAPPING
8315afce282SDavid Greenman 
832ceb0cf87SJohn Dyson /*
833ceb0cf87SJohn Dyson  * Swap_idle_threshold1 is the guaranteed swapped in time for a process
834ceb0cf87SJohn Dyson  */
835303b270bSEivind Eklund static int swap_idle_threshold1 = 2;
8362a3eeaa2STom Rhodes SYSCTL_INT(_vm, OID_AUTO, swap_idle_threshold1, CTLFLAG_RW,
8379faaf3b3STom Rhodes     &swap_idle_threshold1, 0, "Guaranteed swapped in time for a process");
838ceb0cf87SJohn Dyson 
839ceb0cf87SJohn Dyson /*
840ceb0cf87SJohn Dyson  * Swap_idle_threshold2 is the time that a process can be idle before
841ceb0cf87SJohn Dyson  * it will be swapped out, if idle swapping is enabled.
842ceb0cf87SJohn Dyson  */
843303b270bSEivind Eklund static int swap_idle_threshold2 = 10;
8442a3eeaa2STom Rhodes SYSCTL_INT(_vm, OID_AUTO, swap_idle_threshold2, CTLFLAG_RW,
8459faaf3b3STom Rhodes     &swap_idle_threshold2, 0, "Time before a process will be swapped out");
846ceb0cf87SJohn Dyson 
847df8bae1dSRodney W. Grimes /*
84850a57dfbSKonstantin Belousov  * First, if any processes have been sleeping or stopped for at least
84950a57dfbSKonstantin Belousov  * "swap_idle_threshold1" seconds, they are swapped out.  If, however,
85050a57dfbSKonstantin Belousov  * no such processes exist, then the longest-sleeping or stopped
85150a57dfbSKonstantin Belousov  * process is swapped out.  Finally, and only as a last resort, if
85250a57dfbSKonstantin Belousov  * there are no sleeping or stopped processes, the longest-resident
85350a57dfbSKonstantin Belousov  * process is swapped out.
854df8bae1dSRodney W. Grimes  */
855df8bae1dSRodney W. Grimes void
8563a2dc656SJohn Dyson swapout_procs(action)
8573a2dc656SJohn Dyson int action;
858df8bae1dSRodney W. Grimes {
85954d92145SMatthew Dillon 	struct proc *p;
860e602ba25SJulian Elischer 	struct thread *td;
861df8bae1dSRodney W. Grimes 	int didswap = 0;
862df8bae1dSRodney W. Grimes 
8630d94caffSDavid Greenman retry:
8643a2189d4SJohn Baldwin 	sx_slock(&allproc_lock);
865e602ba25SJulian Elischer 	FOREACH_PROC_IN_SYSTEM(p) {
866b18bfc3dSJohn Dyson 		struct vmspace *vm;
867b40ce416SJulian Elischer 		int minslptime = 100000;
868258853abSJeff Roberson 		int slptime;
869b18bfc3dSJohn Dyson 
8709eb881f8SSeigo Tanimura 		/*
871b1f99ebeSSeigo Tanimura 		 * Watch out for a process in
872b1f99ebeSSeigo Tanimura 		 * creation.  It may have no
8731c865ac7SJohn Baldwin 		 * address space or lock yet.
8741c865ac7SJohn Baldwin 		 */
875b61ce5b0SJeff Roberson 		if (p->p_state == PRS_NEW)
8761c865ac7SJohn Baldwin 			continue;
8771c865ac7SJohn Baldwin 		/*
878b1f99ebeSSeigo Tanimura 		 * An aio daemon switches its
879b1f99ebeSSeigo Tanimura 		 * address space while running.
880b1f99ebeSSeigo Tanimura 		 * Perform a quick check whether
881b1f99ebeSSeigo Tanimura 		 * a process has P_SYSTEM.
8829eb881f8SSeigo Tanimura 		 */
8838f887403SJohn Baldwin 		if ((p->p_flag & P_SYSTEM) != 0)
884b1f99ebeSSeigo Tanimura 			continue;
8851c865ac7SJohn Baldwin 		/*
8861c865ac7SJohn Baldwin 		 * Do not swapout a process that
8871c865ac7SJohn Baldwin 		 * is waiting for VM data
8881c865ac7SJohn Baldwin 		 * structures as there is a possible
8891c865ac7SJohn Baldwin 		 * deadlock.  Test this first as
8901c865ac7SJohn Baldwin 		 * this may block.
8911c865ac7SJohn Baldwin 		 *
8921c865ac7SJohn Baldwin 		 * Lock the map until swapout
8931c865ac7SJohn Baldwin 		 * finishes, or a thread of this
8941c865ac7SJohn Baldwin 		 * process may attempt to alter
8951c865ac7SJohn Baldwin 		 * the map.
8961c865ac7SJohn Baldwin 		 */
89757051fdcSTor Egge 		vm = vmspace_acquire_ref(p);
89857051fdcSTor Egge 		if (vm == NULL)
89957051fdcSTor Egge 			continue;
9009eb881f8SSeigo Tanimura 		if (!vm_map_trylock(&vm->vm_map))
9019eb881f8SSeigo Tanimura 			goto nextproc1;
9029eb881f8SSeigo Tanimura 
9035074aecdSJohn Baldwin 		PROC_LOCK(p);
90469b40456SJohn Baldwin 		if (p->p_lock != 0 ||
9051279572aSDavid Xu 		    (p->p_flag & (P_STOPPED_SINGLE|P_TRACED|P_SYSTEM|P_WEXIT)
9061279572aSDavid Xu 		    ) != 0) {
907374ae2a3SJeff Roberson 			goto nextproc;
9085074aecdSJohn Baldwin 		}
90923955314SAlfred Perlstein 		/*
91023955314SAlfred Perlstein 		 * only aiod changes vmspace, however it will be
91123955314SAlfred Perlstein 		 * skipped because of the if statement above checking
91223955314SAlfred Perlstein 		 * for P_SYSTEM
91323955314SAlfred Perlstein 		 */
914b61ce5b0SJeff Roberson 		if ((p->p_flag & (P_INMEM|P_SWAPPINGOUT|P_SWAPPINGIN)) != P_INMEM)
915374ae2a3SJeff Roberson 			goto nextproc;
91669b40456SJohn Baldwin 
917e602ba25SJulian Elischer 		switch (p->p_state) {
9180d94caffSDavid Greenman 		default:
919e602ba25SJulian Elischer 			/* Don't swap out processes in any sort
920e602ba25SJulian Elischer 			 * of 'special' state. */
9218f887403SJohn Baldwin 			break;
922df8bae1dSRodney W. Grimes 
923e602ba25SJulian Elischer 		case PRS_NORMAL:
92426f9a767SRodney W. Grimes 			/*
925bfbfac11SDavid Greenman 			 * do not swapout a realtime process
926b40ce416SJulian Elischer 			 * Check all the thread groups..
927bfbfac11SDavid Greenman 			 */
9288460a577SJohn Birrell 			FOREACH_THREAD_IN_PROC(p, td) {
929b61ce5b0SJeff Roberson 				thread_lock(td);
930b61ce5b0SJeff Roberson 				if (PRI_IS_REALTIME(td->td_pri_class)) {
931b61ce5b0SJeff Roberson 					thread_unlock(td);
932b40ce416SJulian Elischer 					goto nextproc;
933b61ce5b0SJeff Roberson 				}
934258853abSJeff Roberson 				slptime = (ticks - td->td_slptick) / hz;
935bfbfac11SDavid Greenman 				/*
9369eb881f8SSeigo Tanimura 				 * Guarantee swap_idle_threshold1
937ceb0cf87SJohn Dyson 				 * time in memory.
9380d94caffSDavid Greenman 				 */
939258853abSJeff Roberson 				if (slptime < swap_idle_threshold1) {
940b61ce5b0SJeff Roberson 					thread_unlock(td);
941b40ce416SJulian Elischer 					goto nextproc;
942b61ce5b0SJeff Roberson 				}
9439eb881f8SSeigo Tanimura 
9441d7b9ed2SJulian Elischer 				/*
9459eb881f8SSeigo Tanimura 				 * Do not swapout a process if it is
9469eb881f8SSeigo Tanimura 				 * waiting on a critical event of some
9479eb881f8SSeigo Tanimura 				 * kind or there is a thread whose
9489eb881f8SSeigo Tanimura 				 * pageable memory may be accessed.
9491d7b9ed2SJulian Elischer 				 *
9501d7b9ed2SJulian Elischer 				 * This could be refined to support
9511d7b9ed2SJulian Elischer 				 * swapping out a thread.
9521d7b9ed2SJulian Elischer 				 */
953c5aa6b58SJeff Roberson 				if (!thread_safetoswapout(td)) {
954b61ce5b0SJeff Roberson 					thread_unlock(td);
955e602ba25SJulian Elischer 					goto nextproc;
956b61ce5b0SJeff Roberson 				}
957ceb0cf87SJohn Dyson 				/*
958b40ce416SJulian Elischer 				 * If the system is under memory stress,
959b40ce416SJulian Elischer 				 * or if we are swapping
960b40ce416SJulian Elischer 				 * idle processes >= swap_idle_threshold2,
961b40ce416SJulian Elischer 				 * then swap the process out.
962ceb0cf87SJohn Dyson 				 */
963ceb0cf87SJohn Dyson 				if (((action & VM_SWAP_NORMAL) == 0) &&
964ceb0cf87SJohn Dyson 				    (((action & VM_SWAP_IDLE) == 0) ||
965258853abSJeff Roberson 				    (slptime < swap_idle_threshold2))) {
966b61ce5b0SJeff Roberson 					thread_unlock(td);
967b40ce416SJulian Elischer 					goto nextproc;
968b61ce5b0SJeff Roberson 				}
9699eb881f8SSeigo Tanimura 
970258853abSJeff Roberson 				if (minslptime > slptime)
971258853abSJeff Roberson 					minslptime = slptime;
972b61ce5b0SJeff Roberson 				thread_unlock(td);
973b40ce416SJulian Elischer 			}
9740d94caffSDavid Greenman 
97511b224dcSDavid Greenman 			/*
97617d9d0d0SDavid Schultz 			 * If the pageout daemon didn't free enough pages,
97717d9d0d0SDavid Schultz 			 * or if this process is idle and the system is
97817d9d0d0SDavid Schultz 			 * configured to swap proactively, swap it out.
97911b224dcSDavid Greenman 			 */
980ceb0cf87SJohn Dyson 			if ((action & VM_SWAP_NORMAL) ||
981ceb0cf87SJohn Dyson 				((action & VM_SWAP_IDLE) &&
982b40ce416SJulian Elischer 				 (minslptime > swap_idle_threshold2))) {
983b61ce5b0SJeff Roberson 				if (swapout(p) == 0)
984df8bae1dSRodney W. Grimes 					didswap++;
985664f718bSJohn Baldwin 				PROC_UNLOCK(p);
9869eb881f8SSeigo Tanimura 				vm_map_unlock(&vm->vm_map);
9879eb881f8SSeigo Tanimura 				vmspace_free(vm);
9889eb881f8SSeigo Tanimura 				sx_sunlock(&allproc_lock);
9890d94caffSDavid Greenman 				goto retry;
990c96d52a9SJohn Baldwin 			}
9918f887403SJohn Baldwin 		}
992374ae2a3SJeff Roberson nextproc:
9939eb881f8SSeigo Tanimura 		PROC_UNLOCK(p);
9949eb881f8SSeigo Tanimura 		vm_map_unlock(&vm->vm_map);
9959eb881f8SSeigo Tanimura nextproc1:
9969eb881f8SSeigo Tanimura 		vmspace_free(vm);
99730171114SPeter Wemm 		continue;
998ceb0cf87SJohn Dyson 	}
9991005a129SJohn Baldwin 	sx_sunlock(&allproc_lock);
100026f9a767SRodney W. Grimes 	/*
100126f9a767SRodney W. Grimes 	 * If we swapped something out, and another process needed memory,
100226f9a767SRodney W. Grimes 	 * then wakeup the sched process.
100326f9a767SRodney W. Grimes 	 */
10040d94caffSDavid Greenman 	if (didswap)
100524a1cce3SDavid Greenman 		wakeup(&proc0);
1006df8bae1dSRodney W. Grimes }
1007df8bae1dSRodney W. Grimes 
1008f708ef1bSPoul-Henning Kamp static void
1009b61ce5b0SJeff Roberson swapclear(p)
1010b61ce5b0SJeff Roberson 	struct proc *p;
1011b61ce5b0SJeff Roberson {
1012b61ce5b0SJeff Roberson 	struct thread *td;
1013b61ce5b0SJeff Roberson 
1014b61ce5b0SJeff Roberson 	PROC_LOCK_ASSERT(p, MA_OWNED);
1015b61ce5b0SJeff Roberson 
1016b61ce5b0SJeff Roberson 	FOREACH_THREAD_IN_PROC(p, td) {
1017b61ce5b0SJeff Roberson 		thread_lock(td);
1018b61ce5b0SJeff Roberson 		td->td_flags |= TDF_INMEM;
1019b61ce5b0SJeff Roberson 		td->td_flags &= ~TDF_SWAPINREQ;
1020b61ce5b0SJeff Roberson 		TD_CLR_SWAPPED(td);
1021b61ce5b0SJeff Roberson 		if (TD_CAN_RUN(td))
1022da7bbd2cSJohn Baldwin 			if (setrunnable(td)) {
1023da7bbd2cSJohn Baldwin #ifdef INVARIANTS
1024da7bbd2cSJohn Baldwin 				/*
1025da7bbd2cSJohn Baldwin 				 * XXX: We just cleared TDI_SWAPPED
1026da7bbd2cSJohn Baldwin 				 * above and set TDF_INMEM, so this
1027da7bbd2cSJohn Baldwin 				 * should never happen.
1028da7bbd2cSJohn Baldwin 				 */
1029da7bbd2cSJohn Baldwin 				panic("not waking up swapper");
1030da7bbd2cSJohn Baldwin #endif
1031da7bbd2cSJohn Baldwin 			}
1032b61ce5b0SJeff Roberson 		thread_unlock(td);
1033b61ce5b0SJeff Roberson 	}
1034b61ce5b0SJeff Roberson 	p->p_flag &= ~(P_SWAPPINGIN|P_SWAPPINGOUT);
1035b61ce5b0SJeff Roberson 	p->p_flag |= P_INMEM;
1036b61ce5b0SJeff Roberson }
1037b61ce5b0SJeff Roberson 
1038b61ce5b0SJeff Roberson static int
1039df8bae1dSRodney W. Grimes swapout(p)
104054d92145SMatthew Dillon 	struct proc *p;
1041df8bae1dSRodney W. Grimes {
1042b40ce416SJulian Elischer 	struct thread *td;
1043df8bae1dSRodney W. Grimes 
1044ea754954SJohn Baldwin 	PROC_LOCK_ASSERT(p, MA_OWNED);
1045d3a34985SJohn Dyson #if defined(SWAP_DEBUG)
1046d3a34985SJohn Dyson 	printf("swapping out %d\n", p->p_pid);
1047d3a34985SJohn Dyson #endif
10481d7b9ed2SJulian Elischer 
10491d7b9ed2SJulian Elischer 	/*
10509eb881f8SSeigo Tanimura 	 * The states of this process and its threads may have changed
10519eb881f8SSeigo Tanimura 	 * by now.  Assuming that there is only one pageout daemon thread,
10529eb881f8SSeigo Tanimura 	 * this process should still be in memory.
10539eb881f8SSeigo Tanimura 	 */
1054b61ce5b0SJeff Roberson 	KASSERT((p->p_flag & (P_INMEM|P_SWAPPINGOUT|P_SWAPPINGIN)) == P_INMEM,
10559eb881f8SSeigo Tanimura 		("swapout: lost a swapout race?"));
10569eb881f8SSeigo Tanimura 
1057df8bae1dSRodney W. Grimes 	/*
105826f9a767SRodney W. Grimes 	 * remember the process resident count
1059df8bae1dSRodney W. Grimes 	 */
1060b1028ad1SLuoqi Chen 	p->p_vmspace->vm_swrss = vmspace_resident_count(p->p_vmspace);
1061b61ce5b0SJeff Roberson 	/*
1062b61ce5b0SJeff Roberson 	 * Check and mark all threads before we proceed.
1063b61ce5b0SJeff Roberson 	 */
1064b61ce5b0SJeff Roberson 	p->p_flag &= ~P_INMEM;
1065b61ce5b0SJeff Roberson 	p->p_flag |= P_SWAPPINGOUT;
1066982d11f8SJeff Roberson 	FOREACH_THREAD_IN_PROC(p, td) {
1067982d11f8SJeff Roberson 		thread_lock(td);
1068b61ce5b0SJeff Roberson 		if (!thread_safetoswapout(td)) {
1069b61ce5b0SJeff Roberson 			thread_unlock(td);
1070b61ce5b0SJeff Roberson 			swapclear(p);
1071b61ce5b0SJeff Roberson 			return (EBUSY);
1072b61ce5b0SJeff Roberson 		}
1073b61ce5b0SJeff Roberson 		td->td_flags &= ~TDF_INMEM;
1074664f718bSJohn Baldwin 		TD_SET_SWAPPED(td);
1075982d11f8SJeff Roberson 		thread_unlock(td);
1076982d11f8SJeff Roberson 	}
1077b61ce5b0SJeff Roberson 	td = FIRST_THREAD_IN_PROC(p);
1078b61ce5b0SJeff Roberson 	++td->td_ru.ru_nswap;
1079b61ce5b0SJeff Roberson 	PROC_UNLOCK(p);
108026f9a767SRodney W. Grimes 
1081b61ce5b0SJeff Roberson 	/*
1082b61ce5b0SJeff Roberson 	 * This list is stable because all threads are now prevented from
1083b61ce5b0SJeff Roberson 	 * running.  The list is only modified in the context of a running
1084b61ce5b0SJeff Roberson 	 * thread in this process.
1085b61ce5b0SJeff Roberson 	 */
1086664f718bSJohn Baldwin 	FOREACH_THREAD_IN_PROC(p, td)
108749a2507bSAlan Cox 		vm_thread_swapout(td);
1088664f718bSJohn Baldwin 
1089664f718bSJohn Baldwin 	PROC_LOCK(p);
1090b61ce5b0SJeff Roberson 	p->p_flag &= ~P_SWAPPINGOUT;
1091258853abSJeff Roberson 	p->p_swtick = ticks;
1092b61ce5b0SJeff Roberson 	return (0);
1093df8bae1dSRodney W. Grimes }
10945afce282SDavid Greenman #endif /* !NO_SWAPPING */
1095