uvm_fault.c revision 1.166.2.13 1 1.166.2.13 uebayasi /* $NetBSD: uvm_fault.c,v 1.166.2.13 2010/07/09 12:49:21 uebayasi Exp $ */
2 1.166.2.2 uebayasi
3 1.166.2.2 uebayasi /*
4 1.166.2.2 uebayasi *
5 1.166.2.2 uebayasi * Copyright (c) 1997 Charles D. Cranor and Washington University.
6 1.166.2.2 uebayasi * All rights reserved.
7 1.166.2.2 uebayasi *
8 1.166.2.2 uebayasi * Redistribution and use in source and binary forms, with or without
9 1.166.2.2 uebayasi * modification, are permitted provided that the following conditions
10 1.166.2.2 uebayasi * are met:
11 1.166.2.2 uebayasi * 1. Redistributions of source code must retain the above copyright
12 1.166.2.2 uebayasi * notice, this list of conditions and the following disclaimer.
13 1.166.2.2 uebayasi * 2. Redistributions in binary form must reproduce the above copyright
14 1.166.2.2 uebayasi * notice, this list of conditions and the following disclaimer in the
15 1.166.2.2 uebayasi * documentation and/or other materials provided with the distribution.
16 1.166.2.2 uebayasi * 3. All advertising materials mentioning features or use of this software
17 1.166.2.2 uebayasi * must display the following acknowledgement:
18 1.166.2.2 uebayasi * This product includes software developed by Charles D. Cranor and
19 1.166.2.2 uebayasi * Washington University.
20 1.166.2.2 uebayasi * 4. The name of the author may not be used to endorse or promote products
21 1.166.2.2 uebayasi * derived from this software without specific prior written permission.
22 1.166.2.2 uebayasi *
23 1.166.2.2 uebayasi * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
24 1.166.2.2 uebayasi * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
25 1.166.2.2 uebayasi * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
26 1.166.2.2 uebayasi * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
27 1.166.2.2 uebayasi * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
28 1.166.2.2 uebayasi * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
29 1.166.2.2 uebayasi * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
30 1.166.2.2 uebayasi * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
31 1.166.2.2 uebayasi * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
32 1.166.2.2 uebayasi * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
33 1.166.2.2 uebayasi *
34 1.166.2.2 uebayasi * from: Id: uvm_fault.c,v 1.1.2.23 1998/02/06 05:29:05 chs Exp
35 1.166.2.2 uebayasi */
36 1.166.2.2 uebayasi
37 1.166.2.2 uebayasi /*
38 1.166.2.2 uebayasi * uvm_fault.c: fault handler
39 1.166.2.2 uebayasi */
40 1.166.2.2 uebayasi
41 1.166.2.2 uebayasi #include <sys/cdefs.h>
42 1.166.2.13 uebayasi __KERNEL_RCSID(0, "$NetBSD: uvm_fault.c,v 1.166.2.13 2010/07/09 12:49:21 uebayasi Exp $");
43 1.166.2.2 uebayasi
44 1.166.2.2 uebayasi #include "opt_uvmhist.h"
45 1.166.2.3 uebayasi #include "opt_xip.h"
46 1.166.2.2 uebayasi
47 1.166.2.2 uebayasi #include <sys/param.h>
48 1.166.2.2 uebayasi #include <sys/systm.h>
49 1.166.2.2 uebayasi #include <sys/kernel.h>
50 1.166.2.2 uebayasi #include <sys/proc.h>
51 1.166.2.2 uebayasi #include <sys/malloc.h>
52 1.166.2.2 uebayasi #include <sys/mman.h>
53 1.166.2.2 uebayasi
54 1.166.2.2 uebayasi #include <uvm/uvm.h>
55 1.166.2.2 uebayasi
56 1.166.2.2 uebayasi /*
57 1.166.2.2 uebayasi *
58 1.166.2.2 uebayasi * a word on page faults:
59 1.166.2.2 uebayasi *
60 1.166.2.2 uebayasi * types of page faults we handle:
61 1.166.2.2 uebayasi *
62 1.166.2.2 uebayasi * CASE 1: upper layer faults CASE 2: lower layer faults
63 1.166.2.2 uebayasi *
64 1.166.2.2 uebayasi * CASE 1A CASE 1B CASE 2A CASE 2B
65 1.166.2.2 uebayasi * read/write1 write>1 read/write +-cow_write/zero
66 1.166.2.2 uebayasi * | | | |
67 1.166.2.2 uebayasi * +--|--+ +--|--+ +-----+ + | + | +-----+
68 1.166.2.2 uebayasi * amap | V | | ---------> new | | | | ^ |
69 1.166.2.2 uebayasi * +-----+ +-----+ +-----+ + | + | +--|--+
70 1.166.2.2 uebayasi * | | |
71 1.166.2.2 uebayasi * +-----+ +-----+ +--|--+ | +--|--+
72 1.166.2.2 uebayasi * uobj | d/c | | d/c | | V | +----+ |
73 1.166.2.2 uebayasi * +-----+ +-----+ +-----+ +-----+
74 1.166.2.2 uebayasi *
75 1.166.2.2 uebayasi * d/c = don't care
76 1.166.2.2 uebayasi *
77 1.166.2.2 uebayasi * case [0]: layerless fault
78 1.166.2.2 uebayasi * no amap or uobj is present. this is an error.
79 1.166.2.2 uebayasi *
80 1.166.2.2 uebayasi * case [1]: upper layer fault [anon active]
81 1.166.2.2 uebayasi * 1A: [read] or [write with anon->an_ref == 1]
82 1.166.2.2 uebayasi * I/O takes place in upper level anon and uobj is not touched.
83 1.166.2.2 uebayasi * 1B: [write with anon->an_ref > 1]
84 1.166.2.2 uebayasi * new anon is alloc'd and data is copied off ["COW"]
85 1.166.2.2 uebayasi *
86 1.166.2.2 uebayasi * case [2]: lower layer fault [uobj]
87 1.166.2.2 uebayasi * 2A: [read on non-NULL uobj] or [write to non-copy_on_write area]
88 1.166.2.2 uebayasi * I/O takes place directly in object.
89 1.166.2.2 uebayasi * 2B: [write to copy_on_write] or [read on NULL uobj]
90 1.166.2.2 uebayasi * data is "promoted" from uobj to a new anon.
91 1.166.2.2 uebayasi * if uobj is null, then we zero fill.
92 1.166.2.2 uebayasi *
93 1.166.2.2 uebayasi * we follow the standard UVM locking protocol ordering:
94 1.166.2.2 uebayasi *
95 1.166.2.2 uebayasi * MAPS => AMAP => UOBJ => ANON => PAGE QUEUES (PQ)
96 1.166.2.2 uebayasi * we hold a PG_BUSY page if we unlock for I/O
97 1.166.2.2 uebayasi *
98 1.166.2.2 uebayasi *
99 1.166.2.2 uebayasi * the code is structured as follows:
100 1.166.2.2 uebayasi *
101 1.166.2.2 uebayasi * - init the "IN" params in the ufi structure
102 1.166.2.2 uebayasi * ReFault:
103 1.166.2.2 uebayasi * - do lookups [locks maps], check protection, handle needs_copy
104 1.166.2.2 uebayasi * - check for case 0 fault (error)
105 1.166.2.2 uebayasi * - establish "range" of fault
106 1.166.2.2 uebayasi * - if we have an amap lock it and extract the anons
107 1.166.2.2 uebayasi * - if sequential advice deactivate pages behind us
108 1.166.2.2 uebayasi * - at the same time check pmap for unmapped areas and anon for pages
109 1.166.2.2 uebayasi * that we could map in (and do map it if found)
110 1.166.2.2 uebayasi * - check object for resident pages that we could map in
111 1.166.2.2 uebayasi * - if (case 2) goto Case2
112 1.166.2.2 uebayasi * - >>> handle case 1
113 1.166.2.2 uebayasi * - ensure source anon is resident in RAM
114 1.166.2.2 uebayasi * - if case 1B alloc new anon and copy from source
115 1.166.2.2 uebayasi * - map the correct page in
116 1.166.2.2 uebayasi * Case2:
117 1.166.2.2 uebayasi * - >>> handle case 2
118 1.166.2.2 uebayasi * - ensure source page is resident (if uobj)
119 1.166.2.2 uebayasi * - if case 2B alloc new anon and copy from source (could be zero
120 1.166.2.2 uebayasi * fill if uobj == NULL)
121 1.166.2.2 uebayasi * - map the correct page in
122 1.166.2.2 uebayasi * - done!
123 1.166.2.2 uebayasi *
124 1.166.2.2 uebayasi * note on paging:
125 1.166.2.2 uebayasi * if we have to do I/O we place a PG_BUSY page in the correct object,
126 1.166.2.2 uebayasi * unlock everything, and do the I/O. when I/O is done we must reverify
127 1.166.2.2 uebayasi * the state of the world before assuming that our data structures are
128 1.166.2.2 uebayasi * valid. [because mappings could change while the map is unlocked]
129 1.166.2.2 uebayasi *
130 1.166.2.2 uebayasi * alternative 1: unbusy the page in question and restart the page fault
131 1.166.2.2 uebayasi * from the top (ReFault). this is easy but does not take advantage
132 1.166.2.2 uebayasi * of the information that we already have from our previous lookup,
133 1.166.2.2 uebayasi * although it is possible that the "hints" in the vm_map will help here.
134 1.166.2.2 uebayasi *
135 1.166.2.2 uebayasi * alternative 2: the system already keeps track of a "version" number of
136 1.166.2.2 uebayasi * a map. [i.e. every time you write-lock a map (e.g. to change a
137 1.166.2.2 uebayasi * mapping) you bump the version number up by one...] so, we can save
138 1.166.2.2 uebayasi * the version number of the map before we release the lock and start I/O.
139 1.166.2.2 uebayasi * then when I/O is done we can relock and check the version numbers
140 1.166.2.2 uebayasi * to see if anything changed. this might save us some over 1 because
141 1.166.2.2 uebayasi * we don't have to unbusy the page and may be less compares(?).
142 1.166.2.2 uebayasi *
143 1.166.2.2 uebayasi * alternative 3: put in backpointers or a way to "hold" part of a map
144 1.166.2.2 uebayasi * in place while I/O is in progress. this could be complex to
145 1.166.2.2 uebayasi * implement (especially with structures like amap that can be referenced
146 1.166.2.2 uebayasi * by multiple map entries, and figuring out what should wait could be
147 1.166.2.2 uebayasi * complex as well...).
148 1.166.2.2 uebayasi *
149 1.166.2.2 uebayasi * we use alternative 2. given that we are multi-threaded now we may want
150 1.166.2.2 uebayasi * to reconsider the choice.
151 1.166.2.2 uebayasi */
152 1.166.2.2 uebayasi
153 1.166.2.2 uebayasi /*
154 1.166.2.2 uebayasi * local data structures
155 1.166.2.2 uebayasi */
156 1.166.2.2 uebayasi
157 1.166.2.2 uebayasi struct uvm_advice {
158 1.166.2.2 uebayasi int advice;
159 1.166.2.2 uebayasi int nback;
160 1.166.2.2 uebayasi int nforw;
161 1.166.2.2 uebayasi };
162 1.166.2.2 uebayasi
163 1.166.2.2 uebayasi /*
164 1.166.2.2 uebayasi * page range array:
165 1.166.2.2 uebayasi * note: index in array must match "advice" value
166 1.166.2.2 uebayasi * XXX: borrowed numbers from freebsd. do they work well for us?
167 1.166.2.2 uebayasi */
168 1.166.2.2 uebayasi
169 1.166.2.2 uebayasi static const struct uvm_advice uvmadvice[] = {
170 1.166.2.2 uebayasi { MADV_NORMAL, 3, 4 },
171 1.166.2.2 uebayasi { MADV_RANDOM, 0, 0 },
172 1.166.2.2 uebayasi { MADV_SEQUENTIAL, 8, 7},
173 1.166.2.2 uebayasi };
174 1.166.2.2 uebayasi
175 1.166.2.2 uebayasi #define UVM_MAXRANGE 16 /* must be MAX() of nback+nforw+1 */
176 1.166.2.2 uebayasi
177 1.166.2.2 uebayasi /*
178 1.166.2.2 uebayasi * private prototypes
179 1.166.2.2 uebayasi */
180 1.166.2.2 uebayasi
181 1.166.2.2 uebayasi /*
182 1.166.2.2 uebayasi * inline functions
183 1.166.2.2 uebayasi */
184 1.166.2.2 uebayasi
185 1.166.2.2 uebayasi /*
186 1.166.2.2 uebayasi * uvmfault_anonflush: try and deactivate pages in specified anons
187 1.166.2.2 uebayasi *
188 1.166.2.2 uebayasi * => does not have to deactivate page if it is busy
189 1.166.2.2 uebayasi */
190 1.166.2.2 uebayasi
191 1.166.2.2 uebayasi static inline void
192 1.166.2.2 uebayasi uvmfault_anonflush(struct vm_anon **anons, int n)
193 1.166.2.2 uebayasi {
194 1.166.2.2 uebayasi int lcv;
195 1.166.2.2 uebayasi struct vm_page *pg;
196 1.166.2.2 uebayasi
197 1.166.2.2 uebayasi for (lcv = 0; lcv < n; lcv++) {
198 1.166.2.2 uebayasi if (anons[lcv] == NULL)
199 1.166.2.2 uebayasi continue;
200 1.166.2.2 uebayasi mutex_enter(&anons[lcv]->an_lock);
201 1.166.2.2 uebayasi pg = anons[lcv]->an_page;
202 1.166.2.2 uebayasi if (pg && (pg->flags & PG_BUSY) == 0) {
203 1.166.2.2 uebayasi mutex_enter(&uvm_pageqlock);
204 1.166.2.2 uebayasi if (pg->wire_count == 0) {
205 1.166.2.2 uebayasi uvm_pagedeactivate(pg);
206 1.166.2.2 uebayasi }
207 1.166.2.2 uebayasi mutex_exit(&uvm_pageqlock);
208 1.166.2.2 uebayasi }
209 1.166.2.2 uebayasi mutex_exit(&anons[lcv]->an_lock);
210 1.166.2.2 uebayasi }
211 1.166.2.2 uebayasi }
212 1.166.2.2 uebayasi
213 1.166.2.2 uebayasi /*
214 1.166.2.2 uebayasi * normal functions
215 1.166.2.2 uebayasi */
216 1.166.2.2 uebayasi
217 1.166.2.2 uebayasi /*
218 1.166.2.2 uebayasi * uvmfault_amapcopy: clear "needs_copy" in a map.
219 1.166.2.2 uebayasi *
220 1.166.2.2 uebayasi * => called with VM data structures unlocked (usually, see below)
221 1.166.2.2 uebayasi * => we get a write lock on the maps and clear needs_copy for a VA
222 1.166.2.2 uebayasi * => if we are out of RAM we sleep (waiting for more)
223 1.166.2.2 uebayasi */
224 1.166.2.2 uebayasi
225 1.166.2.2 uebayasi static void
226 1.166.2.2 uebayasi uvmfault_amapcopy(struct uvm_faultinfo *ufi)
227 1.166.2.2 uebayasi {
228 1.166.2.2 uebayasi for (;;) {
229 1.166.2.2 uebayasi
230 1.166.2.2 uebayasi /*
231 1.166.2.2 uebayasi * no mapping? give up.
232 1.166.2.2 uebayasi */
233 1.166.2.2 uebayasi
234 1.166.2.2 uebayasi if (uvmfault_lookup(ufi, true) == false)
235 1.166.2.2 uebayasi return;
236 1.166.2.2 uebayasi
237 1.166.2.2 uebayasi /*
238 1.166.2.2 uebayasi * copy if needed.
239 1.166.2.2 uebayasi */
240 1.166.2.2 uebayasi
241 1.166.2.2 uebayasi if (UVM_ET_ISNEEDSCOPY(ufi->entry))
242 1.166.2.2 uebayasi amap_copy(ufi->map, ufi->entry, AMAP_COPY_NOWAIT,
243 1.166.2.2 uebayasi ufi->orig_rvaddr, ufi->orig_rvaddr + 1);
244 1.166.2.2 uebayasi
245 1.166.2.2 uebayasi /*
246 1.166.2.2 uebayasi * didn't work? must be out of RAM. unlock and sleep.
247 1.166.2.2 uebayasi */
248 1.166.2.2 uebayasi
249 1.166.2.2 uebayasi if (UVM_ET_ISNEEDSCOPY(ufi->entry)) {
250 1.166.2.2 uebayasi uvmfault_unlockmaps(ufi, true);
251 1.166.2.2 uebayasi uvm_wait("fltamapcopy");
252 1.166.2.2 uebayasi continue;
253 1.166.2.2 uebayasi }
254 1.166.2.2 uebayasi
255 1.166.2.2 uebayasi /*
256 1.166.2.2 uebayasi * got it! unlock and return.
257 1.166.2.2 uebayasi */
258 1.166.2.2 uebayasi
259 1.166.2.2 uebayasi uvmfault_unlockmaps(ufi, true);
260 1.166.2.2 uebayasi return;
261 1.166.2.2 uebayasi }
262 1.166.2.2 uebayasi /*NOTREACHED*/
263 1.166.2.2 uebayasi }
264 1.166.2.2 uebayasi
265 1.166.2.2 uebayasi /*
266 1.166.2.2 uebayasi * uvmfault_anonget: get data in an anon into a non-busy, non-released
267 1.166.2.2 uebayasi * page in that anon.
268 1.166.2.2 uebayasi *
269 1.166.2.2 uebayasi * => maps, amap, and anon locked by caller.
270 1.166.2.2 uebayasi * => if we fail (result != 0) we unlock everything.
271 1.166.2.2 uebayasi * => if we are successful, we return with everything still locked.
272 1.166.2.2 uebayasi * => we don't move the page on the queues [gets moved later]
273 1.166.2.2 uebayasi * => if we allocate a new page [we_own], it gets put on the queues.
274 1.166.2.2 uebayasi * either way, the result is that the page is on the queues at return time
275 1.166.2.2 uebayasi * => for pages which are on loan from a uvm_object (and thus are not
276 1.166.2.2 uebayasi * owned by the anon): if successful, we return with the owning object
277 1.166.2.2 uebayasi * locked. the caller must unlock this object when it unlocks everything
278 1.166.2.2 uebayasi * else.
279 1.166.2.2 uebayasi */
280 1.166.2.2 uebayasi
281 1.166.2.2 uebayasi int
282 1.166.2.2 uebayasi uvmfault_anonget(struct uvm_faultinfo *ufi, struct vm_amap *amap,
283 1.166.2.2 uebayasi struct vm_anon *anon)
284 1.166.2.2 uebayasi {
285 1.166.2.2 uebayasi bool we_own; /* we own anon's page? */
286 1.166.2.2 uebayasi bool locked; /* did we relock? */
287 1.166.2.2 uebayasi struct vm_page *pg;
288 1.166.2.2 uebayasi int error;
289 1.166.2.2 uebayasi UVMHIST_FUNC("uvmfault_anonget"); UVMHIST_CALLED(maphist);
290 1.166.2.2 uebayasi
291 1.166.2.2 uebayasi KASSERT(mutex_owned(&anon->an_lock));
292 1.166.2.2 uebayasi
293 1.166.2.2 uebayasi error = 0;
294 1.166.2.2 uebayasi uvmexp.fltanget++;
295 1.166.2.2 uebayasi /* bump rusage counters */
296 1.166.2.2 uebayasi if (anon->an_page)
297 1.166.2.2 uebayasi curlwp->l_ru.ru_minflt++;
298 1.166.2.2 uebayasi else
299 1.166.2.2 uebayasi curlwp->l_ru.ru_majflt++;
300 1.166.2.2 uebayasi
301 1.166.2.2 uebayasi /*
302 1.166.2.2 uebayasi * loop until we get it, or fail.
303 1.166.2.2 uebayasi */
304 1.166.2.2 uebayasi
305 1.166.2.2 uebayasi for (;;) {
306 1.166.2.2 uebayasi we_own = false; /* true if we set PG_BUSY on a page */
307 1.166.2.2 uebayasi pg = anon->an_page;
308 1.166.2.2 uebayasi
309 1.166.2.2 uebayasi /*
310 1.166.2.2 uebayasi * if there is a resident page and it is loaned, then anon
311 1.166.2.2 uebayasi * may not own it. call out to uvm_anon_lockpage() to ensure
312 1.166.2.2 uebayasi * the real owner of the page has been identified and locked.
313 1.166.2.2 uebayasi */
314 1.166.2.2 uebayasi
315 1.166.2.2 uebayasi if (pg && pg->loan_count)
316 1.166.2.2 uebayasi pg = uvm_anon_lockloanpg(anon);
317 1.166.2.2 uebayasi
318 1.166.2.2 uebayasi /*
319 1.166.2.2 uebayasi * page there? make sure it is not busy/released.
320 1.166.2.2 uebayasi */
321 1.166.2.2 uebayasi
322 1.166.2.2 uebayasi if (pg) {
323 1.166.2.2 uebayasi
324 1.166.2.2 uebayasi /*
325 1.166.2.2 uebayasi * at this point, if the page has a uobject [meaning
326 1.166.2.2 uebayasi * we have it on loan], then that uobject is locked
327 1.166.2.2 uebayasi * by us! if the page is busy, we drop all the
328 1.166.2.2 uebayasi * locks (including uobject) and try again.
329 1.166.2.2 uebayasi */
330 1.166.2.2 uebayasi
331 1.166.2.2 uebayasi if ((pg->flags & PG_BUSY) == 0) {
332 1.166.2.2 uebayasi UVMHIST_LOG(maphist, "<- OK",0,0,0,0);
333 1.166.2.2 uebayasi return (0);
334 1.166.2.2 uebayasi }
335 1.166.2.2 uebayasi pg->flags |= PG_WANTED;
336 1.166.2.2 uebayasi uvmexp.fltpgwait++;
337 1.166.2.2 uebayasi
338 1.166.2.2 uebayasi /*
339 1.166.2.2 uebayasi * the last unlock must be an atomic unlock+wait on
340 1.166.2.2 uebayasi * the owner of page
341 1.166.2.2 uebayasi */
342 1.166.2.2 uebayasi
343 1.166.2.2 uebayasi if (pg->uobject) { /* owner is uobject ? */
344 1.166.2.2 uebayasi uvmfault_unlockall(ufi, amap, NULL, anon);
345 1.166.2.2 uebayasi UVMHIST_LOG(maphist, " unlock+wait on uobj",0,
346 1.166.2.2 uebayasi 0,0,0);
347 1.166.2.2 uebayasi UVM_UNLOCK_AND_WAIT(pg,
348 1.166.2.2 uebayasi &pg->uobject->vmobjlock,
349 1.166.2.2 uebayasi false, "anonget1",0);
350 1.166.2.2 uebayasi } else {
351 1.166.2.2 uebayasi /* anon owns page */
352 1.166.2.2 uebayasi uvmfault_unlockall(ufi, amap, NULL, NULL);
353 1.166.2.2 uebayasi UVMHIST_LOG(maphist, " unlock+wait on anon",0,
354 1.166.2.2 uebayasi 0,0,0);
355 1.166.2.2 uebayasi UVM_UNLOCK_AND_WAIT(pg,&anon->an_lock,0,
356 1.166.2.2 uebayasi "anonget2",0);
357 1.166.2.2 uebayasi }
358 1.166.2.2 uebayasi } else {
359 1.166.2.2 uebayasi #if defined(VMSWAP)
360 1.166.2.2 uebayasi
361 1.166.2.2 uebayasi /*
362 1.166.2.2 uebayasi * no page, we must try and bring it in.
363 1.166.2.2 uebayasi */
364 1.166.2.2 uebayasi
365 1.166.2.2 uebayasi pg = uvm_pagealloc(NULL, 0, anon, 0);
366 1.166.2.2 uebayasi if (pg == NULL) { /* out of RAM. */
367 1.166.2.2 uebayasi uvmfault_unlockall(ufi, amap, NULL, anon);
368 1.166.2.2 uebayasi uvmexp.fltnoram++;
369 1.166.2.2 uebayasi UVMHIST_LOG(maphist, " noram -- UVM_WAIT",0,
370 1.166.2.2 uebayasi 0,0,0);
371 1.166.2.2 uebayasi if (!uvm_reclaimable()) {
372 1.166.2.2 uebayasi return ENOMEM;
373 1.166.2.2 uebayasi }
374 1.166.2.2 uebayasi uvm_wait("flt_noram1");
375 1.166.2.2 uebayasi } else {
376 1.166.2.2 uebayasi /* we set the PG_BUSY bit */
377 1.166.2.2 uebayasi we_own = true;
378 1.166.2.2 uebayasi uvmfault_unlockall(ufi, amap, NULL, anon);
379 1.166.2.2 uebayasi
380 1.166.2.2 uebayasi /*
381 1.166.2.2 uebayasi * we are passing a PG_BUSY+PG_FAKE+PG_CLEAN
382 1.166.2.2 uebayasi * page into the uvm_swap_get function with
383 1.166.2.2 uebayasi * all data structures unlocked. note that
384 1.166.2.2 uebayasi * it is ok to read an_swslot here because
385 1.166.2.2 uebayasi * we hold PG_BUSY on the page.
386 1.166.2.2 uebayasi */
387 1.166.2.2 uebayasi uvmexp.pageins++;
388 1.166.2.2 uebayasi error = uvm_swap_get(pg, anon->an_swslot,
389 1.166.2.2 uebayasi PGO_SYNCIO);
390 1.166.2.2 uebayasi
391 1.166.2.2 uebayasi /*
392 1.166.2.2 uebayasi * we clean up after the i/o below in the
393 1.166.2.2 uebayasi * "we_own" case
394 1.166.2.2 uebayasi */
395 1.166.2.2 uebayasi }
396 1.166.2.2 uebayasi #else /* defined(VMSWAP) */
397 1.166.2.2 uebayasi panic("%s: no page", __func__);
398 1.166.2.2 uebayasi #endif /* defined(VMSWAP) */
399 1.166.2.2 uebayasi }
400 1.166.2.2 uebayasi
401 1.166.2.2 uebayasi /*
402 1.166.2.2 uebayasi * now relock and try again
403 1.166.2.2 uebayasi */
404 1.166.2.2 uebayasi
405 1.166.2.2 uebayasi locked = uvmfault_relock(ufi);
406 1.166.2.2 uebayasi if (locked && amap != NULL) {
407 1.166.2.2 uebayasi amap_lock(amap);
408 1.166.2.2 uebayasi }
409 1.166.2.2 uebayasi if (locked || we_own)
410 1.166.2.2 uebayasi mutex_enter(&anon->an_lock);
411 1.166.2.2 uebayasi
412 1.166.2.2 uebayasi /*
413 1.166.2.2 uebayasi * if we own the page (i.e. we set PG_BUSY), then we need
414 1.166.2.2 uebayasi * to clean up after the I/O. there are three cases to
415 1.166.2.2 uebayasi * consider:
416 1.166.2.2 uebayasi * [1] page released during I/O: free anon and ReFault.
417 1.166.2.2 uebayasi * [2] I/O not OK. free the page and cause the fault
418 1.166.2.2 uebayasi * to fail.
419 1.166.2.2 uebayasi * [3] I/O OK! activate the page and sync with the
420 1.166.2.2 uebayasi * non-we_own case (i.e. drop anon lock if not locked).
421 1.166.2.2 uebayasi */
422 1.166.2.2 uebayasi
423 1.166.2.2 uebayasi if (we_own) {
424 1.166.2.2 uebayasi #if defined(VMSWAP)
425 1.166.2.2 uebayasi if (pg->flags & PG_WANTED) {
426 1.166.2.2 uebayasi wakeup(pg);
427 1.166.2.2 uebayasi }
428 1.166.2.2 uebayasi if (error) {
429 1.166.2.2 uebayasi
430 1.166.2.2 uebayasi /*
431 1.166.2.2 uebayasi * remove the swap slot from the anon
432 1.166.2.2 uebayasi * and mark the anon as having no real slot.
433 1.166.2.2 uebayasi * don't free the swap slot, thus preventing
434 1.166.2.2 uebayasi * it from being used again.
435 1.166.2.2 uebayasi */
436 1.166.2.2 uebayasi
437 1.166.2.2 uebayasi if (anon->an_swslot > 0)
438 1.166.2.2 uebayasi uvm_swap_markbad(anon->an_swslot, 1);
439 1.166.2.2 uebayasi anon->an_swslot = SWSLOT_BAD;
440 1.166.2.2 uebayasi
441 1.166.2.2 uebayasi if ((pg->flags & PG_RELEASED) != 0)
442 1.166.2.2 uebayasi goto released;
443 1.166.2.2 uebayasi
444 1.166.2.2 uebayasi /*
445 1.166.2.2 uebayasi * note: page was never !PG_BUSY, so it
446 1.166.2.2 uebayasi * can't be mapped and thus no need to
447 1.166.2.2 uebayasi * pmap_page_protect it...
448 1.166.2.2 uebayasi */
449 1.166.2.2 uebayasi
450 1.166.2.2 uebayasi mutex_enter(&uvm_pageqlock);
451 1.166.2.2 uebayasi uvm_pagefree(pg);
452 1.166.2.2 uebayasi mutex_exit(&uvm_pageqlock);
453 1.166.2.2 uebayasi
454 1.166.2.2 uebayasi if (locked)
455 1.166.2.2 uebayasi uvmfault_unlockall(ufi, amap, NULL,
456 1.166.2.2 uebayasi anon);
457 1.166.2.2 uebayasi else
458 1.166.2.2 uebayasi mutex_exit(&anon->an_lock);
459 1.166.2.2 uebayasi UVMHIST_LOG(maphist, "<- ERROR", 0,0,0,0);
460 1.166.2.2 uebayasi return error;
461 1.166.2.2 uebayasi }
462 1.166.2.2 uebayasi
463 1.166.2.2 uebayasi if ((pg->flags & PG_RELEASED) != 0) {
464 1.166.2.2 uebayasi released:
465 1.166.2.2 uebayasi KASSERT(anon->an_ref == 0);
466 1.166.2.2 uebayasi
467 1.166.2.2 uebayasi /*
468 1.166.2.2 uebayasi * released while we unlocked amap.
469 1.166.2.2 uebayasi */
470 1.166.2.2 uebayasi
471 1.166.2.2 uebayasi if (locked)
472 1.166.2.2 uebayasi uvmfault_unlockall(ufi, amap, NULL,
473 1.166.2.2 uebayasi NULL);
474 1.166.2.2 uebayasi
475 1.166.2.2 uebayasi uvm_anon_release(anon);
476 1.166.2.2 uebayasi
477 1.166.2.2 uebayasi if (error) {
478 1.166.2.2 uebayasi UVMHIST_LOG(maphist,
479 1.166.2.2 uebayasi "<- ERROR/RELEASED", 0,0,0,0);
480 1.166.2.2 uebayasi return error;
481 1.166.2.2 uebayasi }
482 1.166.2.2 uebayasi
483 1.166.2.2 uebayasi UVMHIST_LOG(maphist, "<- RELEASED", 0,0,0,0);
484 1.166.2.2 uebayasi return ERESTART;
485 1.166.2.2 uebayasi }
486 1.166.2.2 uebayasi
487 1.166.2.2 uebayasi /*
488 1.166.2.2 uebayasi * we've successfully read the page, activate it.
489 1.166.2.2 uebayasi */
490 1.166.2.2 uebayasi
491 1.166.2.2 uebayasi mutex_enter(&uvm_pageqlock);
492 1.166.2.2 uebayasi uvm_pageactivate(pg);
493 1.166.2.2 uebayasi mutex_exit(&uvm_pageqlock);
494 1.166.2.2 uebayasi pg->flags &= ~(PG_WANTED|PG_BUSY|PG_FAKE);
495 1.166.2.2 uebayasi UVM_PAGE_OWN(pg, NULL);
496 1.166.2.2 uebayasi if (!locked)
497 1.166.2.2 uebayasi mutex_exit(&anon->an_lock);
498 1.166.2.2 uebayasi #else /* defined(VMSWAP) */
499 1.166.2.2 uebayasi panic("%s: we_own", __func__);
500 1.166.2.2 uebayasi #endif /* defined(VMSWAP) */
501 1.166.2.2 uebayasi }
502 1.166.2.2 uebayasi
503 1.166.2.2 uebayasi /*
504 1.166.2.2 uebayasi * we were not able to relock. restart fault.
505 1.166.2.2 uebayasi */
506 1.166.2.2 uebayasi
507 1.166.2.2 uebayasi if (!locked) {
508 1.166.2.2 uebayasi UVMHIST_LOG(maphist, "<- REFAULT", 0,0,0,0);
509 1.166.2.2 uebayasi return (ERESTART);
510 1.166.2.2 uebayasi }
511 1.166.2.2 uebayasi
512 1.166.2.2 uebayasi /*
513 1.166.2.2 uebayasi * verify no one has touched the amap and moved the anon on us.
514 1.166.2.2 uebayasi */
515 1.166.2.2 uebayasi
516 1.166.2.2 uebayasi if (ufi != NULL &&
517 1.166.2.2 uebayasi amap_lookup(&ufi->entry->aref,
518 1.166.2.2 uebayasi ufi->orig_rvaddr - ufi->entry->start) != anon) {
519 1.166.2.2 uebayasi
520 1.166.2.2 uebayasi uvmfault_unlockall(ufi, amap, NULL, anon);
521 1.166.2.2 uebayasi UVMHIST_LOG(maphist, "<- REFAULT", 0,0,0,0);
522 1.166.2.2 uebayasi return (ERESTART);
523 1.166.2.2 uebayasi }
524 1.166.2.2 uebayasi
525 1.166.2.2 uebayasi /*
526 1.166.2.2 uebayasi * try it again!
527 1.166.2.2 uebayasi */
528 1.166.2.2 uebayasi
529 1.166.2.2 uebayasi uvmexp.fltanretry++;
530 1.166.2.2 uebayasi continue;
531 1.166.2.2 uebayasi }
532 1.166.2.2 uebayasi /*NOTREACHED*/
533 1.166.2.2 uebayasi }
534 1.166.2.2 uebayasi
535 1.166.2.2 uebayasi /*
536 1.166.2.2 uebayasi * uvmfault_promote: promote data to a new anon. used for 1B and 2B.
537 1.166.2.2 uebayasi *
538 1.166.2.2 uebayasi * 1. allocate an anon and a page.
539 1.166.2.2 uebayasi * 2. fill its contents.
540 1.166.2.2 uebayasi * 3. put it into amap.
541 1.166.2.2 uebayasi *
542 1.166.2.2 uebayasi * => if we fail (result != 0) we unlock everything.
543 1.166.2.2 uebayasi * => on success, return a new locked anon via 'nanon'.
544 1.166.2.2 uebayasi * (*nanon)->an_page will be a resident, locked, dirty page.
545 1.166.2.2 uebayasi */
546 1.166.2.2 uebayasi
547 1.166.2.2 uebayasi static int
548 1.166.2.2 uebayasi uvmfault_promote(struct uvm_faultinfo *ufi,
549 1.166.2.2 uebayasi struct vm_anon *oanon,
550 1.166.2.2 uebayasi struct uvm_object *uobj,
551 1.166.2.2 uebayasi struct vm_page *uobjpage,
552 1.166.2.2 uebayasi struct vm_anon **nanon, /* OUT: allocated anon */
553 1.166.2.2 uebayasi struct vm_anon **spare)
554 1.166.2.2 uebayasi {
555 1.166.2.2 uebayasi struct vm_amap *amap = ufi->entry->aref.ar_amap;
556 1.166.2.2 uebayasi struct vm_anon *anon;
557 1.166.2.2 uebayasi struct vm_page *pg;
558 1.166.2.2 uebayasi struct vm_page *opg;
559 1.166.2.2 uebayasi int error;
560 1.166.2.2 uebayasi UVMHIST_FUNC(__func__); UVMHIST_CALLED(maphist);
561 1.166.2.2 uebayasi
562 1.166.2.2 uebayasi if (oanon) {
563 1.166.2.2 uebayasi /* anon COW */
564 1.166.2.2 uebayasi opg = oanon->an_page;
565 1.166.2.2 uebayasi KASSERT(opg != NULL);
566 1.166.2.2 uebayasi KASSERT(opg->uobject == NULL || opg->loan_count > 0);
567 1.166.2.2 uebayasi } else if (uobjpage != PGO_DONTCARE) {
568 1.166.2.2 uebayasi /* object-backed COW */
569 1.166.2.2 uebayasi opg = uobjpage;
570 1.166.2.2 uebayasi } else {
571 1.166.2.2 uebayasi /* ZFOD */
572 1.166.2.2 uebayasi opg = NULL;
573 1.166.2.2 uebayasi }
574 1.166.2.2 uebayasi
575 1.166.2.2 uebayasi KASSERT(amap != NULL);
576 1.166.2.2 uebayasi KASSERT(uobjpage != NULL);
577 1.166.2.13 uebayasi KASSERT(uobjpage == PGO_DONTCARE || (uobjpage->flags & PG_BUSY) != 0);
578 1.166.2.2 uebayasi KASSERT(mutex_owned(&amap->am_l));
579 1.166.2.2 uebayasi KASSERT(oanon == NULL || mutex_owned(&oanon->an_lock));
580 1.166.2.2 uebayasi KASSERT(uobj == NULL || mutex_owned(&uobj->vmobjlock));
581 1.166.2.2 uebayasi #if 0
582 1.166.2.2 uebayasi KASSERT(*spare == NULL || !mutex_owned(&(*spare)->an_lock));
583 1.166.2.2 uebayasi #endif
584 1.166.2.2 uebayasi
585 1.166.2.2 uebayasi if (*spare != NULL) {
586 1.166.2.2 uebayasi anon = *spare;
587 1.166.2.2 uebayasi *spare = NULL;
588 1.166.2.2 uebayasi mutex_enter(&anon->an_lock);
589 1.166.2.2 uebayasi } else if (ufi->map != kernel_map) {
590 1.166.2.2 uebayasi anon = uvm_analloc();
591 1.166.2.2 uebayasi } else {
592 1.166.2.2 uebayasi UVMHIST_LOG(maphist, "kernel_map, unlock and retry", 0,0,0,0);
593 1.166.2.2 uebayasi
594 1.166.2.2 uebayasi /*
595 1.166.2.2 uebayasi * we can't allocate anons with kernel_map locked.
596 1.166.2.2 uebayasi */
597 1.166.2.2 uebayasi
598 1.166.2.2 uebayasi uvm_page_unbusy(&uobjpage, 1);
599 1.166.2.2 uebayasi uvmfault_unlockall(ufi, amap, uobj, oanon);
600 1.166.2.2 uebayasi
601 1.166.2.2 uebayasi *spare = uvm_analloc();
602 1.166.2.2 uebayasi if (*spare == NULL) {
603 1.166.2.2 uebayasi goto nomem;
604 1.166.2.2 uebayasi }
605 1.166.2.2 uebayasi mutex_exit(&(*spare)->an_lock);
606 1.166.2.2 uebayasi error = ERESTART;
607 1.166.2.2 uebayasi goto done;
608 1.166.2.2 uebayasi }
609 1.166.2.2 uebayasi if (anon) {
610 1.166.2.2 uebayasi
611 1.166.2.2 uebayasi /*
612 1.166.2.2 uebayasi * The new anon is locked.
613 1.166.2.2 uebayasi *
614 1.166.2.2 uebayasi * if opg == NULL, we want a zero'd, dirty page,
615 1.166.2.2 uebayasi * so have uvm_pagealloc() do that for us.
616 1.166.2.2 uebayasi */
617 1.166.2.2 uebayasi
618 1.166.2.2 uebayasi pg = uvm_pagealloc(NULL, 0, anon,
619 1.166.2.2 uebayasi (opg == NULL) ? UVM_PGA_ZERO : 0);
620 1.166.2.2 uebayasi } else {
621 1.166.2.2 uebayasi pg = NULL;
622 1.166.2.2 uebayasi }
623 1.166.2.2 uebayasi
624 1.166.2.2 uebayasi /*
625 1.166.2.2 uebayasi * out of memory resources?
626 1.166.2.2 uebayasi */
627 1.166.2.2 uebayasi
628 1.166.2.2 uebayasi if (pg == NULL) {
629 1.166.2.2 uebayasi /* save anon for the next try. */
630 1.166.2.2 uebayasi if (anon != NULL) {
631 1.166.2.2 uebayasi mutex_exit(&anon->an_lock);
632 1.166.2.2 uebayasi *spare = anon;
633 1.166.2.2 uebayasi }
634 1.166.2.2 uebayasi
635 1.166.2.2 uebayasi /* unlock and fail ... */
636 1.166.2.2 uebayasi uvm_page_unbusy(&uobjpage, 1);
637 1.166.2.2 uebayasi uvmfault_unlockall(ufi, amap, uobj, oanon);
638 1.166.2.2 uebayasi nomem:
639 1.166.2.2 uebayasi if (!uvm_reclaimable()) {
640 1.166.2.2 uebayasi UVMHIST_LOG(maphist, "out of VM", 0,0,0,0);
641 1.166.2.2 uebayasi uvmexp.fltnoanon++;
642 1.166.2.2 uebayasi error = ENOMEM;
643 1.166.2.2 uebayasi goto done;
644 1.166.2.2 uebayasi }
645 1.166.2.2 uebayasi
646 1.166.2.2 uebayasi UVMHIST_LOG(maphist, "out of RAM, waiting for more", 0,0,0,0);
647 1.166.2.2 uebayasi uvmexp.fltnoram++;
648 1.166.2.2 uebayasi uvm_wait("flt_noram5");
649 1.166.2.2 uebayasi error = ERESTART;
650 1.166.2.2 uebayasi goto done;
651 1.166.2.2 uebayasi }
652 1.166.2.2 uebayasi
653 1.166.2.2 uebayasi /* copy page [pg now dirty] */
654 1.166.2.2 uebayasi if (opg) {
655 1.166.2.2 uebayasi uvm_pagecopy(opg, pg);
656 1.166.2.2 uebayasi }
657 1.166.2.2 uebayasi
658 1.166.2.2 uebayasi amap_add(&ufi->entry->aref, ufi->orig_rvaddr - ufi->entry->start, anon,
659 1.166.2.2 uebayasi oanon != NULL);
660 1.166.2.2 uebayasi
661 1.166.2.2 uebayasi *nanon = anon;
662 1.166.2.2 uebayasi error = 0;
663 1.166.2.2 uebayasi done:
664 1.166.2.2 uebayasi return error;
665 1.166.2.2 uebayasi }
666 1.166.2.2 uebayasi
667 1.166.2.2 uebayasi
668 1.166.2.2 uebayasi /*
669 1.166.2.2 uebayasi * F A U L T - m a i n e n t r y p o i n t
670 1.166.2.2 uebayasi */
671 1.166.2.2 uebayasi
672 1.166.2.2 uebayasi /*
673 1.166.2.2 uebayasi * uvm_fault: page fault handler
674 1.166.2.2 uebayasi *
675 1.166.2.2 uebayasi * => called from MD code to resolve a page fault
676 1.166.2.2 uebayasi * => VM data structures usually should be unlocked. however, it is
677 1.166.2.2 uebayasi * possible to call here with the main map locked if the caller
678 1.166.2.2 uebayasi * gets a write lock, sets it recusive, and then calls us (c.f.
679 1.166.2.2 uebayasi * uvm_map_pageable). this should be avoided because it keeps
680 1.166.2.2 uebayasi * the map locked off during I/O.
681 1.166.2.2 uebayasi * => MUST NEVER BE CALLED IN INTERRUPT CONTEXT
682 1.166.2.2 uebayasi */
683 1.166.2.2 uebayasi
684 1.166.2.2 uebayasi #define MASK(entry) (UVM_ET_ISCOPYONWRITE(entry) ? \
685 1.166.2.2 uebayasi ~VM_PROT_WRITE : VM_PROT_ALL)
686 1.166.2.2 uebayasi
687 1.166.2.2 uebayasi /* fault_flag values passed from uvm_fault_wire to uvm_fault_internal */
688 1.166.2.2 uebayasi #define UVM_FAULT_WIRE (1 << 0)
689 1.166.2.2 uebayasi #define UVM_FAULT_MAXPROT (1 << 1)
690 1.166.2.2 uebayasi
691 1.166.2.2 uebayasi struct uvm_faultctx {
692 1.166.2.2 uebayasi vm_prot_t access_type;
693 1.166.2.2 uebayasi vm_prot_t enter_prot;
694 1.166.2.2 uebayasi vaddr_t startva;
695 1.166.2.2 uebayasi int npages;
696 1.166.2.2 uebayasi int centeridx;
697 1.166.2.2 uebayasi struct vm_anon *anon_spare;
698 1.166.2.2 uebayasi bool wire_mapping;
699 1.166.2.2 uebayasi bool narrow;
700 1.166.2.2 uebayasi bool wire_paging;
701 1.166.2.2 uebayasi bool maxprot;
702 1.166.2.2 uebayasi bool cow_now;
703 1.166.2.5 uebayasi bool promote;
704 1.166.2.2 uebayasi };
705 1.166.2.2 uebayasi
706 1.166.2.2 uebayasi static inline int uvm_fault_check(
707 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
708 1.166.2.2 uebayasi struct vm_anon ***, struct vm_page ***);
709 1.166.2.2 uebayasi
710 1.166.2.2 uebayasi static int uvm_fault_upper(
711 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
712 1.166.2.2 uebayasi struct vm_anon **);
713 1.166.2.2 uebayasi static inline int uvm_fault_upper_lookup(
714 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
715 1.166.2.2 uebayasi struct vm_anon **, struct vm_page **);
716 1.166.2.2 uebayasi static inline void uvm_fault_upper_neighbor(
717 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
718 1.166.2.2 uebayasi vaddr_t, struct vm_page *, bool);
719 1.166.2.2 uebayasi static inline int uvm_fault_upper_loan(
720 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
721 1.166.2.2 uebayasi struct vm_anon *, struct uvm_object **);
722 1.166.2.2 uebayasi static inline int uvm_fault_upper_promote(
723 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
724 1.166.2.2 uebayasi struct uvm_object *, struct vm_anon *);
725 1.166.2.2 uebayasi static inline int uvm_fault_upper_direct(
726 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
727 1.166.2.2 uebayasi struct uvm_object *, struct vm_anon *);
728 1.166.2.2 uebayasi static int uvm_fault_upper_enter(
729 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
730 1.166.2.2 uebayasi struct uvm_object *, struct vm_anon *,
731 1.166.2.2 uebayasi struct vm_page *, struct vm_anon *);
732 1.166.2.5 uebayasi static inline void uvm_fault_upper_done(
733 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
734 1.166.2.2 uebayasi struct uvm_object *, struct vm_anon *,
735 1.166.2.5 uebayasi struct vm_page *);
736 1.166.2.2 uebayasi
737 1.166.2.2 uebayasi static int uvm_fault_lower(
738 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
739 1.166.2.2 uebayasi struct vm_page **);
740 1.166.2.5 uebayasi static inline void uvm_fault_lower_lookup(
741 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
742 1.166.2.2 uebayasi struct vm_page **);
743 1.166.2.2 uebayasi static inline void uvm_fault_lower_neighbor(
744 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
745 1.166.2.2 uebayasi vaddr_t, struct vm_page *, bool);
746 1.166.2.2 uebayasi static inline int uvm_fault_lower_io(
747 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
748 1.166.2.2 uebayasi struct uvm_object **, struct vm_page **);
749 1.166.2.2 uebayasi static inline int uvm_fault_lower_direct(
750 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
751 1.166.2.2 uebayasi struct uvm_object *, struct vm_page *);
752 1.166.2.2 uebayasi static inline int uvm_fault_lower_direct_loan(
753 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
754 1.166.2.2 uebayasi struct uvm_object *, struct vm_page **,
755 1.166.2.2 uebayasi struct vm_page **);
756 1.166.2.2 uebayasi static inline int uvm_fault_lower_promote(
757 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
758 1.166.2.2 uebayasi struct uvm_object *, struct vm_page *);
759 1.166.2.2 uebayasi static int uvm_fault_lower_enter(
760 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
761 1.166.2.2 uebayasi struct uvm_object *,
762 1.166.2.2 uebayasi struct vm_anon *, struct vm_page *,
763 1.166.2.2 uebayasi struct vm_page *);
764 1.166.2.5 uebayasi static inline void uvm_fault_lower_done(
765 1.166.2.2 uebayasi struct uvm_faultinfo *, struct uvm_faultctx *,
766 1.166.2.5 uebayasi struct uvm_object *, struct vm_anon *,
767 1.166.2.5 uebayasi struct vm_page *);
768 1.166.2.2 uebayasi
769 1.166.2.2 uebayasi int
770 1.166.2.2 uebayasi uvm_fault_internal(struct vm_map *orig_map, vaddr_t vaddr,
771 1.166.2.2 uebayasi vm_prot_t access_type, int fault_flag)
772 1.166.2.2 uebayasi {
773 1.166.2.2 uebayasi struct uvm_faultinfo ufi;
774 1.166.2.2 uebayasi struct uvm_faultctx flt = {
775 1.166.2.2 uebayasi .access_type = access_type,
776 1.166.2.2 uebayasi
777 1.166.2.2 uebayasi /* don't look for neighborhood * pages on "wire" fault */
778 1.166.2.2 uebayasi .narrow = (fault_flag & UVM_FAULT_WIRE) != 0,
779 1.166.2.2 uebayasi
780 1.166.2.2 uebayasi /* "wire" fault causes wiring of both mapping and paging */
781 1.166.2.2 uebayasi .wire_mapping = (fault_flag & UVM_FAULT_WIRE) != 0,
782 1.166.2.2 uebayasi .wire_paging = (fault_flag & UVM_FAULT_WIRE) != 0,
783 1.166.2.2 uebayasi
784 1.166.2.2 uebayasi .maxprot = (fault_flag & UVM_FAULT_MAXPROT) != 0,
785 1.166.2.2 uebayasi };
786 1.166.2.2 uebayasi struct vm_anon *anons_store[UVM_MAXRANGE], **anons;
787 1.166.2.2 uebayasi struct vm_page *pages_store[UVM_MAXRANGE], **pages;
788 1.166.2.2 uebayasi int error;
789 1.166.2.2 uebayasi UVMHIST_FUNC("uvm_fault"); UVMHIST_CALLED(maphist);
790 1.166.2.2 uebayasi
791 1.166.2.2 uebayasi UVMHIST_LOG(maphist, "(map=0x%x, vaddr=0x%x, at=%d, ff=%d)",
792 1.166.2.2 uebayasi orig_map, vaddr, access_type, fault_flag);
793 1.166.2.2 uebayasi
794 1.166.2.2 uebayasi uvmexp.faults++; /* XXX: locking? */
795 1.166.2.2 uebayasi
796 1.166.2.2 uebayasi /*
797 1.166.2.2 uebayasi * init the IN parameters in the ufi
798 1.166.2.2 uebayasi */
799 1.166.2.2 uebayasi
800 1.166.2.2 uebayasi ufi.orig_map = orig_map;
801 1.166.2.2 uebayasi ufi.orig_rvaddr = trunc_page(vaddr);
802 1.166.2.2 uebayasi ufi.orig_size = PAGE_SIZE; /* can't get any smaller than this */
803 1.166.2.2 uebayasi
804 1.166.2.2 uebayasi error = ERESTART;
805 1.166.2.2 uebayasi while (error == ERESTART) {
806 1.166.2.2 uebayasi anons = anons_store;
807 1.166.2.2 uebayasi pages = pages_store;
808 1.166.2.2 uebayasi
809 1.166.2.2 uebayasi error = uvm_fault_check(&ufi, &flt, &anons, &pages);
810 1.166.2.2 uebayasi if (error != 0)
811 1.166.2.2 uebayasi continue;
812 1.166.2.2 uebayasi
813 1.166.2.2 uebayasi error = uvm_fault_upper_lookup(&ufi, &flt, anons, pages);
814 1.166.2.2 uebayasi if (error != 0)
815 1.166.2.2 uebayasi continue;
816 1.166.2.2 uebayasi
817 1.166.2.2 uebayasi if (pages[flt.centeridx] == PGO_DONTCARE)
818 1.166.2.2 uebayasi error = uvm_fault_upper(&ufi, &flt, anons);
819 1.166.2.5 uebayasi else {
820 1.166.2.5 uebayasi struct uvm_object * const uobj = ufi.entry->object.uvm_obj;
821 1.166.2.5 uebayasi
822 1.166.2.5 uebayasi if (uobj && uobj->pgops->pgo_fault != NULL) {
823 1.166.2.5 uebayasi /*
824 1.166.2.5 uebayasi * invoke "special" fault routine.
825 1.166.2.5 uebayasi */
826 1.166.2.5 uebayasi mutex_enter(&uobj->vmobjlock);
827 1.166.2.5 uebayasi /* locked: maps(read), amap(if there), uobj */
828 1.166.2.5 uebayasi error = uobj->pgops->pgo_fault(&ufi,
829 1.166.2.5 uebayasi flt.startva, pages, flt.npages,
830 1.166.2.5 uebayasi flt.centeridx, flt.access_type,
831 1.166.2.5 uebayasi PGO_LOCKED|PGO_SYNCIO);
832 1.166.2.5 uebayasi
833 1.166.2.5 uebayasi /* locked: nothing, pgo_fault has unlocked everything */
834 1.166.2.5 uebayasi
835 1.166.2.5 uebayasi /*
836 1.166.2.5 uebayasi * object fault routine responsible for pmap_update().
837 1.166.2.5 uebayasi */
838 1.166.2.5 uebayasi } else {
839 1.166.2.5 uebayasi error = uvm_fault_lower(&ufi, &flt, pages);
840 1.166.2.5 uebayasi }
841 1.166.2.5 uebayasi }
842 1.166.2.2 uebayasi }
843 1.166.2.2 uebayasi
844 1.166.2.2 uebayasi if (flt.anon_spare != NULL) {
845 1.166.2.2 uebayasi flt.anon_spare->an_ref--;
846 1.166.2.2 uebayasi uvm_anfree(flt.anon_spare);
847 1.166.2.2 uebayasi }
848 1.166.2.2 uebayasi return error;
849 1.166.2.2 uebayasi }
850 1.166.2.2 uebayasi
851 1.166.2.5 uebayasi /*
852 1.166.2.5 uebayasi * uvm_fault_check: check prot, handle needs-copy, etc.
853 1.166.2.5 uebayasi *
854 1.166.2.5 uebayasi * 1. lookup entry.
855 1.166.2.5 uebayasi * 2. check protection.
856 1.166.2.5 uebayasi * 3. adjust fault condition (mainly for simulated fault).
857 1.166.2.5 uebayasi * 4. handle needs-copy (lazy amap copy).
858 1.166.2.5 uebayasi * 5. establish range of interest for neighbor fault (aka pre-fault).
859 1.166.2.5 uebayasi * 6. look up anons (if amap exists).
860 1.166.2.5 uebayasi * 7. flush pages (if MADV_SEQUENTIAL)
861 1.166.2.5 uebayasi *
862 1.166.2.5 uebayasi * => called with nothing locked.
863 1.166.2.5 uebayasi * => if we fail (result != 0) we unlock everything.
864 1.166.2.5 uebayasi */
865 1.166.2.5 uebayasi
866 1.166.2.2 uebayasi static int
867 1.166.2.2 uebayasi uvm_fault_check(
868 1.166.2.2 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
869 1.166.2.2 uebayasi struct vm_anon ***ranons, struct vm_page ***rpages)
870 1.166.2.2 uebayasi {
871 1.166.2.2 uebayasi struct vm_amap *amap;
872 1.166.2.2 uebayasi struct uvm_object *uobj;
873 1.166.2.2 uebayasi vm_prot_t check_prot;
874 1.166.2.2 uebayasi int nback, nforw;
875 1.166.2.2 uebayasi UVMHIST_FUNC("uvm_fault_check"); UVMHIST_CALLED(maphist);
876 1.166.2.2 uebayasi
877 1.166.2.2 uebayasi /*
878 1.166.2.2 uebayasi * lookup and lock the maps
879 1.166.2.2 uebayasi */
880 1.166.2.2 uebayasi
881 1.166.2.2 uebayasi if (uvmfault_lookup(ufi, false) == false) {
882 1.166.2.2 uebayasi UVMHIST_LOG(maphist, "<- no mapping @ 0x%x", ufi->orig_rvaddr, 0,0,0);
883 1.166.2.2 uebayasi return EFAULT;
884 1.166.2.2 uebayasi }
885 1.166.2.2 uebayasi /* locked: maps(read) */
886 1.166.2.2 uebayasi
887 1.166.2.2 uebayasi #ifdef DIAGNOSTIC
888 1.166.2.2 uebayasi if ((ufi->map->flags & VM_MAP_PAGEABLE) == 0) {
889 1.166.2.2 uebayasi printf("Page fault on non-pageable map:\n");
890 1.166.2.2 uebayasi printf("ufi->map = %p\n", ufi->map);
891 1.166.2.2 uebayasi printf("ufi->orig_map = %p\n", ufi->orig_map);
892 1.166.2.2 uebayasi printf("ufi->orig_rvaddr = 0x%lx\n", (u_long) ufi->orig_rvaddr);
893 1.166.2.2 uebayasi panic("uvm_fault: (ufi->map->flags & VM_MAP_PAGEABLE) == 0");
894 1.166.2.2 uebayasi }
895 1.166.2.2 uebayasi #endif
896 1.166.2.2 uebayasi
897 1.166.2.2 uebayasi /*
898 1.166.2.2 uebayasi * check protection
899 1.166.2.2 uebayasi */
900 1.166.2.2 uebayasi
901 1.166.2.2 uebayasi check_prot = flt->maxprot ?
902 1.166.2.2 uebayasi ufi->entry->max_protection : ufi->entry->protection;
903 1.166.2.2 uebayasi if ((check_prot & flt->access_type) != flt->access_type) {
904 1.166.2.2 uebayasi UVMHIST_LOG(maphist,
905 1.166.2.2 uebayasi "<- protection failure (prot=0x%x, access=0x%x)",
906 1.166.2.2 uebayasi ufi->entry->protection, flt->access_type, 0, 0);
907 1.166.2.2 uebayasi uvmfault_unlockmaps(ufi, false);
908 1.166.2.2 uebayasi return EACCES;
909 1.166.2.2 uebayasi }
910 1.166.2.2 uebayasi
911 1.166.2.2 uebayasi /*
912 1.166.2.2 uebayasi * "enter_prot" is the protection we want to enter the page in at.
913 1.166.2.2 uebayasi * for certain pages (e.g. copy-on-write pages) this protection can
914 1.166.2.2 uebayasi * be more strict than ufi->entry->protection. "wired" means either
915 1.166.2.2 uebayasi * the entry is wired or we are fault-wiring the pg.
916 1.166.2.2 uebayasi */
917 1.166.2.2 uebayasi
918 1.166.2.2 uebayasi flt->enter_prot = ufi->entry->protection;
919 1.166.2.2 uebayasi if (VM_MAPENT_ISWIRED(ufi->entry))
920 1.166.2.2 uebayasi flt->wire_mapping = true;
921 1.166.2.2 uebayasi
922 1.166.2.2 uebayasi if (flt->wire_mapping) {
923 1.166.2.2 uebayasi flt->access_type = flt->enter_prot; /* full access for wired */
924 1.166.2.2 uebayasi flt->cow_now = (check_prot & VM_PROT_WRITE) != 0;
925 1.166.2.2 uebayasi } else {
926 1.166.2.2 uebayasi flt->cow_now = (flt->access_type & VM_PROT_WRITE) != 0;
927 1.166.2.2 uebayasi }
928 1.166.2.2 uebayasi
929 1.166.2.5 uebayasi flt->promote = false;
930 1.166.2.5 uebayasi
931 1.166.2.2 uebayasi /*
932 1.166.2.2 uebayasi * handle "needs_copy" case. if we need to copy the amap we will
933 1.166.2.2 uebayasi * have to drop our readlock and relock it with a write lock. (we
934 1.166.2.2 uebayasi * need a write lock to change anything in a map entry [e.g.
935 1.166.2.2 uebayasi * needs_copy]).
936 1.166.2.2 uebayasi */
937 1.166.2.2 uebayasi
938 1.166.2.2 uebayasi if (UVM_ET_ISNEEDSCOPY(ufi->entry)) {
939 1.166.2.2 uebayasi if (flt->cow_now || (ufi->entry->object.uvm_obj == NULL)) {
940 1.166.2.2 uebayasi KASSERT(!flt->maxprot);
941 1.166.2.2 uebayasi /* need to clear */
942 1.166.2.2 uebayasi UVMHIST_LOG(maphist,
943 1.166.2.2 uebayasi " need to clear needs_copy and refault",0,0,0,0);
944 1.166.2.2 uebayasi uvmfault_unlockmaps(ufi, false);
945 1.166.2.2 uebayasi uvmfault_amapcopy(ufi);
946 1.166.2.2 uebayasi uvmexp.fltamcopy++;
947 1.166.2.2 uebayasi return ERESTART;
948 1.166.2.2 uebayasi
949 1.166.2.2 uebayasi } else {
950 1.166.2.2 uebayasi
951 1.166.2.2 uebayasi /*
952 1.166.2.2 uebayasi * ensure that we pmap_enter page R/O since
953 1.166.2.2 uebayasi * needs_copy is still true
954 1.166.2.2 uebayasi */
955 1.166.2.2 uebayasi
956 1.166.2.2 uebayasi flt->enter_prot &= ~VM_PROT_WRITE;
957 1.166.2.2 uebayasi }
958 1.166.2.2 uebayasi }
959 1.166.2.2 uebayasi
960 1.166.2.2 uebayasi /*
961 1.166.2.2 uebayasi * identify the players
962 1.166.2.2 uebayasi */
963 1.166.2.2 uebayasi
964 1.166.2.2 uebayasi amap = ufi->entry->aref.ar_amap; /* upper layer */
965 1.166.2.2 uebayasi uobj = ufi->entry->object.uvm_obj; /* lower layer */
966 1.166.2.2 uebayasi
967 1.166.2.2 uebayasi /*
968 1.166.2.2 uebayasi * check for a case 0 fault. if nothing backing the entry then
969 1.166.2.2 uebayasi * error now.
970 1.166.2.2 uebayasi */
971 1.166.2.2 uebayasi
972 1.166.2.2 uebayasi if (amap == NULL && uobj == NULL) {
973 1.166.2.2 uebayasi uvmfault_unlockmaps(ufi, false);
974 1.166.2.2 uebayasi UVMHIST_LOG(maphist,"<- no backing store, no overlay",0,0,0,0);
975 1.166.2.2 uebayasi return EFAULT;
976 1.166.2.2 uebayasi }
977 1.166.2.2 uebayasi
978 1.166.2.2 uebayasi /*
979 1.166.2.2 uebayasi * establish range of interest based on advice from mapper
980 1.166.2.2 uebayasi * and then clip to fit map entry. note that we only want
981 1.166.2.2 uebayasi * to do this the first time through the fault. if we
982 1.166.2.2 uebayasi * ReFault we will disable this by setting "narrow" to true.
983 1.166.2.2 uebayasi */
984 1.166.2.2 uebayasi
985 1.166.2.2 uebayasi if (flt->narrow == false) {
986 1.166.2.2 uebayasi
987 1.166.2.2 uebayasi /* wide fault (!narrow) */
988 1.166.2.2 uebayasi KASSERT(uvmadvice[ufi->entry->advice].advice ==
989 1.166.2.2 uebayasi ufi->entry->advice);
990 1.166.2.2 uebayasi nback = MIN(uvmadvice[ufi->entry->advice].nback,
991 1.166.2.2 uebayasi (ufi->orig_rvaddr - ufi->entry->start) >> PAGE_SHIFT);
992 1.166.2.2 uebayasi flt->startva = ufi->orig_rvaddr - (nback << PAGE_SHIFT);
993 1.166.2.2 uebayasi nforw = MIN(uvmadvice[ufi->entry->advice].nforw,
994 1.166.2.2 uebayasi ((ufi->entry->end - ufi->orig_rvaddr) >>
995 1.166.2.2 uebayasi PAGE_SHIFT) - 1);
996 1.166.2.2 uebayasi /*
997 1.166.2.2 uebayasi * note: "-1" because we don't want to count the
998 1.166.2.2 uebayasi * faulting page as forw
999 1.166.2.2 uebayasi */
1000 1.166.2.2 uebayasi flt->npages = nback + nforw + 1;
1001 1.166.2.2 uebayasi flt->centeridx = nback;
1002 1.166.2.2 uebayasi
1003 1.166.2.2 uebayasi flt->narrow = true; /* ensure only once per-fault */
1004 1.166.2.2 uebayasi
1005 1.166.2.2 uebayasi } else {
1006 1.166.2.2 uebayasi
1007 1.166.2.2 uebayasi /* narrow fault! */
1008 1.166.2.2 uebayasi nback = nforw = 0;
1009 1.166.2.2 uebayasi flt->startva = ufi->orig_rvaddr;
1010 1.166.2.2 uebayasi flt->npages = 1;
1011 1.166.2.2 uebayasi flt->centeridx = 0;
1012 1.166.2.2 uebayasi
1013 1.166.2.2 uebayasi }
1014 1.166.2.2 uebayasi /* offset from entry's start to pgs' start */
1015 1.166.2.2 uebayasi const voff_t eoff = flt->startva - ufi->entry->start;
1016 1.166.2.2 uebayasi
1017 1.166.2.2 uebayasi /* locked: maps(read) */
1018 1.166.2.2 uebayasi UVMHIST_LOG(maphist, " narrow=%d, back=%d, forw=%d, startva=0x%x",
1019 1.166.2.2 uebayasi flt->narrow, nback, nforw, flt->startva);
1020 1.166.2.2 uebayasi UVMHIST_LOG(maphist, " entry=0x%x, amap=0x%x, obj=0x%x", ufi->entry,
1021 1.166.2.2 uebayasi amap, uobj, 0);
1022 1.166.2.2 uebayasi
1023 1.166.2.2 uebayasi /*
1024 1.166.2.2 uebayasi * if we've got an amap, lock it and extract current anons.
1025 1.166.2.2 uebayasi */
1026 1.166.2.2 uebayasi
1027 1.166.2.2 uebayasi if (amap) {
1028 1.166.2.2 uebayasi amap_lock(amap);
1029 1.166.2.2 uebayasi amap_lookups(&ufi->entry->aref, eoff, *ranons, flt->npages);
1030 1.166.2.2 uebayasi } else {
1031 1.166.2.2 uebayasi *ranons = NULL; /* to be safe */
1032 1.166.2.2 uebayasi }
1033 1.166.2.2 uebayasi
1034 1.166.2.2 uebayasi /* locked: maps(read), amap(if there) */
1035 1.166.2.2 uebayasi KASSERT(amap == NULL || mutex_owned(&amap->am_l));
1036 1.166.2.2 uebayasi
1037 1.166.2.2 uebayasi /*
1038 1.166.2.2 uebayasi * for MADV_SEQUENTIAL mappings we want to deactivate the back pages
1039 1.166.2.2 uebayasi * now and then forget about them (for the rest of the fault).
1040 1.166.2.2 uebayasi */
1041 1.166.2.2 uebayasi
1042 1.166.2.2 uebayasi if (ufi->entry->advice == MADV_SEQUENTIAL && nback != 0) {
1043 1.166.2.2 uebayasi
1044 1.166.2.2 uebayasi UVMHIST_LOG(maphist, " MADV_SEQUENTIAL: flushing backpages",
1045 1.166.2.2 uebayasi 0,0,0,0);
1046 1.166.2.2 uebayasi /* flush back-page anons? */
1047 1.166.2.2 uebayasi if (amap)
1048 1.166.2.2 uebayasi uvmfault_anonflush(*ranons, nback);
1049 1.166.2.2 uebayasi
1050 1.166.2.2 uebayasi /* flush object? */
1051 1.166.2.2 uebayasi if (uobj) {
1052 1.166.2.2 uebayasi voff_t uoff;
1053 1.166.2.2 uebayasi
1054 1.166.2.2 uebayasi uoff = ufi->entry->offset + eoff;
1055 1.166.2.2 uebayasi mutex_enter(&uobj->vmobjlock);
1056 1.166.2.2 uebayasi (void) (uobj->pgops->pgo_put)(uobj, uoff, uoff +
1057 1.166.2.2 uebayasi (nback << PAGE_SHIFT), PGO_DEACTIVATE);
1058 1.166.2.2 uebayasi }
1059 1.166.2.2 uebayasi
1060 1.166.2.2 uebayasi /* now forget about the backpages */
1061 1.166.2.2 uebayasi if (amap)
1062 1.166.2.2 uebayasi *ranons += nback;
1063 1.166.2.2 uebayasi flt->startva += (nback << PAGE_SHIFT);
1064 1.166.2.2 uebayasi flt->npages -= nback;
1065 1.166.2.2 uebayasi flt->centeridx = 0;
1066 1.166.2.2 uebayasi }
1067 1.166.2.2 uebayasi /*
1068 1.166.2.2 uebayasi * => startva is fixed
1069 1.166.2.2 uebayasi * => npages is fixed
1070 1.166.2.2 uebayasi */
1071 1.166.2.2 uebayasi
1072 1.166.2.2 uebayasi return 0;
1073 1.166.2.2 uebayasi }
1074 1.166.2.2 uebayasi
1075 1.166.2.5 uebayasi /*
1076 1.166.2.5 uebayasi * uvm_fault_upper_lookup: look up existing h/w mapping and amap.
1077 1.166.2.5 uebayasi *
1078 1.166.2.5 uebayasi * iterate range of interest:
1079 1.166.2.5 uebayasi * 1. check if h/w mapping exists. if yes, we don't care
1080 1.166.2.5 uebayasi * 2. check if anon exists. if not, page is lower.
1081 1.166.2.5 uebayasi * 3. if anon exists, enter h/w mapping for neighbors.
1082 1.166.2.5 uebayasi *
1083 1.166.2.5 uebayasi * => called with amap locked (if exists).
1084 1.166.2.5 uebayasi */
1085 1.166.2.5 uebayasi
1086 1.166.2.2 uebayasi static int
1087 1.166.2.2 uebayasi uvm_fault_upper_lookup(
1088 1.166.2.2 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
1089 1.166.2.2 uebayasi struct vm_anon **anons, struct vm_page **pages)
1090 1.166.2.2 uebayasi {
1091 1.166.2.2 uebayasi struct vm_amap *amap = ufi->entry->aref.ar_amap;
1092 1.166.2.2 uebayasi int lcv;
1093 1.166.2.2 uebayasi vaddr_t currva;
1094 1.166.2.2 uebayasi bool shadowed;
1095 1.166.2.2 uebayasi UVMHIST_FUNC("uvm_fault_upper_lookup"); UVMHIST_CALLED(maphist);
1096 1.166.2.2 uebayasi
1097 1.166.2.2 uebayasi /* locked: maps(read), amap(if there) */
1098 1.166.2.2 uebayasi KASSERT(amap == NULL || mutex_owned(&amap->am_l));
1099 1.166.2.2 uebayasi
1100 1.166.2.2 uebayasi /*
1101 1.166.2.2 uebayasi * map in the backpages and frontpages we found in the amap in hopes
1102 1.166.2.2 uebayasi * of preventing future faults. we also init the pages[] array as
1103 1.166.2.2 uebayasi * we go.
1104 1.166.2.2 uebayasi */
1105 1.166.2.2 uebayasi
1106 1.166.2.2 uebayasi currva = flt->startva;
1107 1.166.2.2 uebayasi shadowed = false;
1108 1.166.2.2 uebayasi for (lcv = 0; lcv < flt->npages; lcv++, currva += PAGE_SIZE) {
1109 1.166.2.2 uebayasi /*
1110 1.166.2.2 uebayasi * dont play with VAs that are already mapped
1111 1.166.2.2 uebayasi * except for center)
1112 1.166.2.2 uebayasi */
1113 1.166.2.2 uebayasi if (lcv != flt->centeridx &&
1114 1.166.2.2 uebayasi pmap_extract(ufi->orig_map->pmap, currva, NULL)) {
1115 1.166.2.2 uebayasi pages[lcv] = PGO_DONTCARE;
1116 1.166.2.2 uebayasi continue;
1117 1.166.2.2 uebayasi }
1118 1.166.2.2 uebayasi
1119 1.166.2.2 uebayasi /*
1120 1.166.2.2 uebayasi * unmapped or center page. check if any anon at this level.
1121 1.166.2.2 uebayasi */
1122 1.166.2.2 uebayasi if (amap == NULL || anons[lcv] == NULL) {
1123 1.166.2.2 uebayasi pages[lcv] = NULL;
1124 1.166.2.2 uebayasi continue;
1125 1.166.2.2 uebayasi }
1126 1.166.2.2 uebayasi
1127 1.166.2.2 uebayasi /*
1128 1.166.2.2 uebayasi * check for present page and map if possible. re-activate it.
1129 1.166.2.2 uebayasi */
1130 1.166.2.2 uebayasi
1131 1.166.2.2 uebayasi pages[lcv] = PGO_DONTCARE;
1132 1.166.2.2 uebayasi if (lcv == flt->centeridx) { /* save center for later! */
1133 1.166.2.2 uebayasi shadowed = true;
1134 1.166.2.2 uebayasi } else {
1135 1.166.2.2 uebayasi struct vm_anon *anon = anons[lcv];
1136 1.166.2.2 uebayasi
1137 1.166.2.2 uebayasi mutex_enter(&anon->an_lock);
1138 1.166.2.5 uebayasi struct vm_page *pg = anon->an_page;
1139 1.166.2.5 uebayasi
1140 1.166.2.5 uebayasi /* ignore loaned and busy pages */
1141 1.166.2.5 uebayasi if (pg != NULL && pg->loan_count == 0 &&
1142 1.166.2.5 uebayasi (pg->flags & PG_BUSY) == 0)
1143 1.166.2.5 uebayasi uvm_fault_upper_neighbor(ufi, flt, currva,
1144 1.166.2.5 uebayasi pg, anon->an_ref > 1);
1145 1.166.2.2 uebayasi mutex_exit(&anon->an_lock);
1146 1.166.2.2 uebayasi }
1147 1.166.2.2 uebayasi }
1148 1.166.2.2 uebayasi
1149 1.166.2.2 uebayasi /* locked: maps(read), amap(if there) */
1150 1.166.2.2 uebayasi KASSERT(amap == NULL || mutex_owned(&amap->am_l));
1151 1.166.2.2 uebayasi /* (shadowed == true) if there is an anon at the faulting address */
1152 1.166.2.2 uebayasi UVMHIST_LOG(maphist, " shadowed=%d, will_get=%d", shadowed,
1153 1.166.2.2 uebayasi (ufi->entry->object.uvm_obj && shadowed != false),0,0);
1154 1.166.2.2 uebayasi
1155 1.166.2.2 uebayasi /*
1156 1.166.2.2 uebayasi * note that if we are really short of RAM we could sleep in the above
1157 1.166.2.2 uebayasi * call to pmap_enter with everything locked. bad?
1158 1.166.2.2 uebayasi *
1159 1.166.2.2 uebayasi * XXX Actually, that is bad; pmap_enter() should just fail in that
1160 1.166.2.2 uebayasi * XXX case. --thorpej
1161 1.166.2.2 uebayasi */
1162 1.166.2.2 uebayasi
1163 1.166.2.2 uebayasi return 0;
1164 1.166.2.2 uebayasi }
1165 1.166.2.2 uebayasi
1166 1.166.2.5 uebayasi /*
1167 1.166.2.5 uebayasi * uvm_fault_upper_neighbor: enter single lower neighbor page.
1168 1.166.2.5 uebayasi *
1169 1.166.2.5 uebayasi * => called with amap and anon locked.
1170 1.166.2.5 uebayasi */
1171 1.166.2.5 uebayasi
1172 1.166.2.2 uebayasi static void
1173 1.166.2.2 uebayasi uvm_fault_upper_neighbor(
1174 1.166.2.2 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
1175 1.166.2.2 uebayasi vaddr_t currva, struct vm_page *pg, bool readonly)
1176 1.166.2.2 uebayasi {
1177 1.166.2.2 uebayasi UVMHIST_FUNC("uvm_fault_upper_neighbor"); UVMHIST_CALLED(maphist);
1178 1.166.2.2 uebayasi
1179 1.166.2.5 uebayasi /* locked: amap, anon */
1180 1.166.2.2 uebayasi
1181 1.166.2.2 uebayasi mutex_enter(&uvm_pageqlock);
1182 1.166.2.2 uebayasi uvm_pageenqueue(pg);
1183 1.166.2.2 uebayasi mutex_exit(&uvm_pageqlock);
1184 1.166.2.2 uebayasi UVMHIST_LOG(maphist,
1185 1.166.2.2 uebayasi " MAPPING: n anon: pm=0x%x, va=0x%x, pg=0x%x",
1186 1.166.2.2 uebayasi ufi->orig_map->pmap, currva, pg, 0);
1187 1.166.2.2 uebayasi uvmexp.fltnamap++;
1188 1.166.2.2 uebayasi
1189 1.166.2.2 uebayasi /*
1190 1.166.2.2 uebayasi * Since this page isn't the page that's actually faulting,
1191 1.166.2.2 uebayasi * ignore pmap_enter() failures; it's not critical that we
1192 1.166.2.2 uebayasi * enter these right now.
1193 1.166.2.2 uebayasi */
1194 1.166.2.2 uebayasi
1195 1.166.2.2 uebayasi (void) pmap_enter(ufi->orig_map->pmap, currva,
1196 1.166.2.2 uebayasi VM_PAGE_TO_PHYS(pg),
1197 1.166.2.2 uebayasi readonly ? (flt->enter_prot & ~VM_PROT_WRITE) :
1198 1.166.2.2 uebayasi flt->enter_prot,
1199 1.166.2.2 uebayasi PMAP_CANFAIL | (flt->wire_mapping ? PMAP_WIRED : 0));
1200 1.166.2.2 uebayasi
1201 1.166.2.2 uebayasi pmap_update(ufi->orig_map->pmap);
1202 1.166.2.2 uebayasi }
1203 1.166.2.2 uebayasi
1204 1.166.2.5 uebayasi /*
1205 1.166.2.5 uebayasi * uvm_fault_upper: handle upper fault.
1206 1.166.2.5 uebayasi *
1207 1.166.2.5 uebayasi * 1. acquire anon lock.
1208 1.166.2.5 uebayasi * 2. get anon. let uvmfault_anonget do the dirty work.
1209 1.166.2.5 uebayasi * 3. handle loan.
1210 1.166.2.5 uebayasi * 4. dispatch direct or promote handlers.
1211 1.166.2.5 uebayasi */
1212 1.166.2.11 uebayasi
1213 1.166.2.2 uebayasi static int
1214 1.166.2.2 uebayasi uvm_fault_upper(
1215 1.166.2.2 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
1216 1.166.2.2 uebayasi struct vm_anon **anons)
1217 1.166.2.2 uebayasi {
1218 1.166.2.2 uebayasi struct vm_amap * const amap = ufi->entry->aref.ar_amap;
1219 1.166.2.2 uebayasi struct vm_anon * const anon = anons[flt->centeridx];
1220 1.166.2.2 uebayasi struct uvm_object *uobj;
1221 1.166.2.2 uebayasi int error;
1222 1.166.2.2 uebayasi UVMHIST_FUNC("uvm_fault_upper"); UVMHIST_CALLED(maphist);
1223 1.166.2.2 uebayasi
1224 1.166.2.2 uebayasi /* locked: maps(read), amap */
1225 1.166.2.2 uebayasi KASSERT(mutex_owned(&amap->am_l));
1226 1.166.2.2 uebayasi
1227 1.166.2.2 uebayasi /*
1228 1.166.2.2 uebayasi * handle case 1: fault on an anon in our amap
1229 1.166.2.2 uebayasi */
1230 1.166.2.2 uebayasi
1231 1.166.2.2 uebayasi UVMHIST_LOG(maphist, " case 1 fault: anon=0x%x", anon, 0,0,0);
1232 1.166.2.2 uebayasi mutex_enter(&anon->an_lock);
1233 1.166.2.2 uebayasi
1234 1.166.2.2 uebayasi /* locked: maps(read), amap, anon */
1235 1.166.2.2 uebayasi KASSERT(mutex_owned(&amap->am_l));
1236 1.166.2.2 uebayasi KASSERT(mutex_owned(&anon->an_lock));
1237 1.166.2.2 uebayasi
1238 1.166.2.2 uebayasi /*
1239 1.166.2.2 uebayasi * no matter if we have case 1A or case 1B we are going to need to
1240 1.166.2.2 uebayasi * have the anon's memory resident. ensure that now.
1241 1.166.2.2 uebayasi */
1242 1.166.2.2 uebayasi
1243 1.166.2.2 uebayasi /*
1244 1.166.2.2 uebayasi * let uvmfault_anonget do the dirty work.
1245 1.166.2.2 uebayasi * if it fails (!OK) it will unlock everything for us.
1246 1.166.2.2 uebayasi * if it succeeds, locks are still valid and locked.
1247 1.166.2.2 uebayasi * also, if it is OK, then the anon's page is on the queues.
1248 1.166.2.2 uebayasi * if the page is on loan from a uvm_object, then anonget will
1249 1.166.2.2 uebayasi * lock that object for us if it does not fail.
1250 1.166.2.2 uebayasi */
1251 1.166.2.2 uebayasi
1252 1.166.2.2 uebayasi error = uvmfault_anonget(ufi, amap, anon);
1253 1.166.2.2 uebayasi switch (error) {
1254 1.166.2.2 uebayasi case 0:
1255 1.166.2.2 uebayasi break;
1256 1.166.2.2 uebayasi
1257 1.166.2.2 uebayasi case ERESTART:
1258 1.166.2.2 uebayasi return ERESTART;
1259 1.166.2.2 uebayasi
1260 1.166.2.2 uebayasi case EAGAIN:
1261 1.166.2.2 uebayasi kpause("fltagain1", false, hz/2, NULL);
1262 1.166.2.2 uebayasi return ERESTART;
1263 1.166.2.2 uebayasi
1264 1.166.2.2 uebayasi default:
1265 1.166.2.2 uebayasi return error;
1266 1.166.2.2 uebayasi }
1267 1.166.2.2 uebayasi
1268 1.166.2.2 uebayasi /*
1269 1.166.2.2 uebayasi * uobj is non null if the page is on loan from an object (i.e. uobj)
1270 1.166.2.2 uebayasi */
1271 1.166.2.2 uebayasi
1272 1.166.2.2 uebayasi uobj = anon->an_page->uobject; /* locked by anonget if !NULL */
1273 1.166.2.2 uebayasi
1274 1.166.2.2 uebayasi /* locked: maps(read), amap, anon, uobj(if one) */
1275 1.166.2.2 uebayasi KASSERT(mutex_owned(&amap->am_l));
1276 1.166.2.2 uebayasi KASSERT(mutex_owned(&anon->an_lock));
1277 1.166.2.2 uebayasi KASSERT(uobj == NULL || mutex_owned(&uobj->vmobjlock));
1278 1.166.2.2 uebayasi
1279 1.166.2.2 uebayasi /*
1280 1.166.2.2 uebayasi * special handling for loaned pages
1281 1.166.2.2 uebayasi */
1282 1.166.2.2 uebayasi
1283 1.166.2.2 uebayasi if (anon->an_page->loan_count) {
1284 1.166.2.2 uebayasi error = uvm_fault_upper_loan(ufi, flt, anon, &uobj);
1285 1.166.2.2 uebayasi if (error != 0)
1286 1.166.2.2 uebayasi return error;
1287 1.166.2.2 uebayasi }
1288 1.166.2.2 uebayasi
1289 1.166.2.2 uebayasi /*
1290 1.166.2.2 uebayasi * if we are case 1B then we will need to allocate a new blank
1291 1.166.2.2 uebayasi * anon to transfer the data into. note that we have a lock
1292 1.166.2.2 uebayasi * on anon, so no one can busy or release the page until we are done.
1293 1.166.2.2 uebayasi * also note that the ref count can't drop to zero here because
1294 1.166.2.2 uebayasi * it is > 1 and we are only dropping one ref.
1295 1.166.2.2 uebayasi *
1296 1.166.2.2 uebayasi * in the (hopefully very rare) case that we are out of RAM we
1297 1.166.2.2 uebayasi * will unlock, wait for more RAM, and refault.
1298 1.166.2.2 uebayasi *
1299 1.166.2.2 uebayasi * if we are out of anon VM we kill the process (XXX: could wait?).
1300 1.166.2.2 uebayasi */
1301 1.166.2.2 uebayasi
1302 1.166.2.2 uebayasi if (flt->cow_now && anon->an_ref > 1) {
1303 1.166.2.5 uebayasi flt->promote = true;
1304 1.166.2.2 uebayasi error = uvm_fault_upper_promote(ufi, flt, uobj, anon);
1305 1.166.2.2 uebayasi } else {
1306 1.166.2.2 uebayasi error = uvm_fault_upper_direct(ufi, flt, uobj, anon);
1307 1.166.2.2 uebayasi }
1308 1.166.2.2 uebayasi return error;
1309 1.166.2.2 uebayasi }
1310 1.166.2.2 uebayasi
1311 1.166.2.5 uebayasi /*
1312 1.166.2.5 uebayasi * uvm_fault_upper_loan: handle loaned upper page.
1313 1.166.2.5 uebayasi *
1314 1.166.2.5 uebayasi * 1. if not cow'ing now, just mark enter_prot as read-only.
1315 1.166.2.5 uebayasi * 2. if cow'ing now, and if ref count is 1, break loan.
1316 1.166.2.5 uebayasi */
1317 1.166.2.5 uebayasi
1318 1.166.2.2 uebayasi static int
1319 1.166.2.2 uebayasi uvm_fault_upper_loan(
1320 1.166.2.2 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
1321 1.166.2.2 uebayasi struct vm_anon *anon, struct uvm_object **ruobj)
1322 1.166.2.2 uebayasi {
1323 1.166.2.2 uebayasi struct vm_amap * const amap = ufi->entry->aref.ar_amap;
1324 1.166.2.2 uebayasi int error = 0;
1325 1.166.2.5 uebayasi UVMHIST_FUNC("uvm_fault_upper_loan"); UVMHIST_CALLED(maphist);
1326 1.166.2.2 uebayasi
1327 1.166.2.2 uebayasi if (!flt->cow_now) {
1328 1.166.2.2 uebayasi
1329 1.166.2.2 uebayasi /*
1330 1.166.2.2 uebayasi * for read faults on loaned pages we just cap the
1331 1.166.2.2 uebayasi * protection at read-only.
1332 1.166.2.2 uebayasi */
1333 1.166.2.2 uebayasi
1334 1.166.2.2 uebayasi flt->enter_prot = flt->enter_prot & ~VM_PROT_WRITE;
1335 1.166.2.2 uebayasi
1336 1.166.2.2 uebayasi } else {
1337 1.166.2.2 uebayasi /*
1338 1.166.2.2 uebayasi * note that we can't allow writes into a loaned page!
1339 1.166.2.2 uebayasi *
1340 1.166.2.2 uebayasi * if we have a write fault on a loaned page in an
1341 1.166.2.2 uebayasi * anon then we need to look at the anon's ref count.
1342 1.166.2.2 uebayasi * if it is greater than one then we are going to do
1343 1.166.2.2 uebayasi * a normal copy-on-write fault into a new anon (this
1344 1.166.2.2 uebayasi * is not a problem). however, if the reference count
1345 1.166.2.2 uebayasi * is one (a case where we would normally allow a
1346 1.166.2.2 uebayasi * write directly to the page) then we need to kill
1347 1.166.2.2 uebayasi * the loan before we continue.
1348 1.166.2.2 uebayasi */
1349 1.166.2.2 uebayasi
1350 1.166.2.2 uebayasi /* >1 case is already ok */
1351 1.166.2.2 uebayasi if (anon->an_ref == 1) {
1352 1.166.2.2 uebayasi error = uvm_loanbreak_anon(anon, *ruobj);
1353 1.166.2.2 uebayasi if (error != 0) {
1354 1.166.2.2 uebayasi uvmfault_unlockall(ufi, amap, *ruobj, anon);
1355 1.166.2.2 uebayasi uvm_wait("flt_noram2");
1356 1.166.2.2 uebayasi return ERESTART;
1357 1.166.2.2 uebayasi }
1358 1.166.2.2 uebayasi /* if we were a loan reciever uobj is gone */
1359 1.166.2.2 uebayasi if (*ruobj)
1360 1.166.2.2 uebayasi *ruobj = NULL;
1361 1.166.2.2 uebayasi }
1362 1.166.2.2 uebayasi }
1363 1.166.2.2 uebayasi return error;
1364 1.166.2.2 uebayasi }
1365 1.166.2.2 uebayasi
1366 1.166.2.5 uebayasi /*
1367 1.166.2.5 uebayasi * uvm_fault_upper_promote: promote upper page.
1368 1.166.2.5 uebayasi *
1369 1.166.2.5 uebayasi * 1. call uvmfault_promote.
1370 1.166.2.5 uebayasi * 2. enqueue page.
1371 1.166.2.5 uebayasi * 3. deref.
1372 1.166.2.5 uebayasi * 4. pass page to uvm_fault_upper_enter.
1373 1.166.2.5 uebayasi */
1374 1.166.2.5 uebayasi
1375 1.166.2.2 uebayasi static int
1376 1.166.2.2 uebayasi uvm_fault_upper_promote(
1377 1.166.2.2 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
1378 1.166.2.2 uebayasi struct uvm_object *uobj, struct vm_anon *anon)
1379 1.166.2.2 uebayasi {
1380 1.166.2.2 uebayasi struct vm_anon * const oanon = anon;
1381 1.166.2.2 uebayasi struct vm_page *pg;
1382 1.166.2.2 uebayasi int error;
1383 1.166.2.2 uebayasi UVMHIST_FUNC("uvm_fault_upper_promote"); UVMHIST_CALLED(maphist);
1384 1.166.2.2 uebayasi
1385 1.166.2.2 uebayasi UVMHIST_LOG(maphist, " case 1B: COW fault",0,0,0,0);
1386 1.166.2.2 uebayasi uvmexp.flt_acow++;
1387 1.166.2.2 uebayasi
1388 1.166.2.2 uebayasi error = uvmfault_promote(ufi, oanon, NULL, PGO_DONTCARE,
1389 1.166.2.2 uebayasi &anon, &flt->anon_spare);
1390 1.166.2.2 uebayasi switch (error) {
1391 1.166.2.2 uebayasi case 0:
1392 1.166.2.2 uebayasi break;
1393 1.166.2.2 uebayasi case ERESTART:
1394 1.166.2.2 uebayasi return ERESTART;
1395 1.166.2.2 uebayasi default:
1396 1.166.2.2 uebayasi return error;
1397 1.166.2.2 uebayasi }
1398 1.166.2.2 uebayasi
1399 1.166.2.2 uebayasi pg = anon->an_page;
1400 1.166.2.2 uebayasi mutex_enter(&uvm_pageqlock);
1401 1.166.2.2 uebayasi uvm_pageactivate(pg);
1402 1.166.2.2 uebayasi mutex_exit(&uvm_pageqlock);
1403 1.166.2.2 uebayasi pg->flags &= ~(PG_BUSY|PG_FAKE);
1404 1.166.2.2 uebayasi UVM_PAGE_OWN(pg, NULL);
1405 1.166.2.2 uebayasi
1406 1.166.2.2 uebayasi /* deref: can not drop to zero here by defn! */
1407 1.166.2.2 uebayasi oanon->an_ref--;
1408 1.166.2.2 uebayasi
1409 1.166.2.2 uebayasi /*
1410 1.166.2.2 uebayasi * note: oanon is still locked, as is the new anon. we
1411 1.166.2.2 uebayasi * need to check for this later when we unlock oanon; if
1412 1.166.2.2 uebayasi * oanon != anon, we'll have to unlock anon, too.
1413 1.166.2.2 uebayasi */
1414 1.166.2.2 uebayasi
1415 1.166.2.2 uebayasi return uvm_fault_upper_enter(ufi, flt, uobj, anon, pg, oanon);
1416 1.166.2.2 uebayasi }
1417 1.166.2.2 uebayasi
1418 1.166.2.5 uebayasi /*
1419 1.166.2.5 uebayasi * uvm_fault_upper_direct: handle direct fault.
1420 1.166.2.5 uebayasi */
1421 1.166.2.5 uebayasi
1422 1.166.2.2 uebayasi static int
1423 1.166.2.2 uebayasi uvm_fault_upper_direct(
1424 1.166.2.2 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
1425 1.166.2.2 uebayasi struct uvm_object *uobj, struct vm_anon *anon)
1426 1.166.2.2 uebayasi {
1427 1.166.2.2 uebayasi struct vm_anon * const oanon = anon;
1428 1.166.2.2 uebayasi struct vm_page *pg;
1429 1.166.2.5 uebayasi UVMHIST_FUNC("uvm_fault_upper_direct"); UVMHIST_CALLED(maphist);
1430 1.166.2.2 uebayasi
1431 1.166.2.2 uebayasi uvmexp.flt_anon++;
1432 1.166.2.2 uebayasi pg = anon->an_page;
1433 1.166.2.2 uebayasi if (anon->an_ref > 1) /* disallow writes to ref > 1 anons */
1434 1.166.2.2 uebayasi flt->enter_prot = flt->enter_prot & ~VM_PROT_WRITE;
1435 1.166.2.2 uebayasi
1436 1.166.2.2 uebayasi return uvm_fault_upper_enter(ufi, flt, uobj, anon, pg, oanon);
1437 1.166.2.2 uebayasi }
1438 1.166.2.2 uebayasi
1439 1.166.2.5 uebayasi /*
1440 1.166.2.5 uebayasi * uvm_fault_upper_enter: enter h/w mapping of upper page.
1441 1.166.2.5 uebayasi */
1442 1.166.2.5 uebayasi
1443 1.166.2.2 uebayasi static int
1444 1.166.2.2 uebayasi uvm_fault_upper_enter(
1445 1.166.2.2 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
1446 1.166.2.2 uebayasi struct uvm_object *uobj, struct vm_anon *anon, struct vm_page *pg,
1447 1.166.2.2 uebayasi struct vm_anon *oanon)
1448 1.166.2.2 uebayasi {
1449 1.166.2.2 uebayasi struct vm_amap * const amap = ufi->entry->aref.ar_amap;
1450 1.166.2.2 uebayasi UVMHIST_FUNC("uvm_fault_upper_enter"); UVMHIST_CALLED(maphist);
1451 1.166.2.2 uebayasi
1452 1.166.2.5 uebayasi /* locked: maps(read), amap, oanon, anon(if different from oanon) */
1453 1.166.2.2 uebayasi KASSERT(mutex_owned(&amap->am_l));
1454 1.166.2.2 uebayasi KASSERT(mutex_owned(&anon->an_lock));
1455 1.166.2.2 uebayasi KASSERT(mutex_owned(&oanon->an_lock));
1456 1.166.2.2 uebayasi
1457 1.166.2.2 uebayasi /*
1458 1.166.2.2 uebayasi * now map the page in.
1459 1.166.2.2 uebayasi */
1460 1.166.2.2 uebayasi
1461 1.166.2.5 uebayasi UVMHIST_LOG(maphist, " MAPPING: anon: pm=0x%x, va=0x%x, pg=0x%x, promote=%d",
1462 1.166.2.5 uebayasi ufi->orig_map->pmap, ufi->orig_rvaddr, pg, flt->promote);
1463 1.166.2.2 uebayasi if (pmap_enter(ufi->orig_map->pmap, ufi->orig_rvaddr, VM_PAGE_TO_PHYS(pg),
1464 1.166.2.2 uebayasi flt->enter_prot, flt->access_type | PMAP_CANFAIL | (flt->wire_mapping ? PMAP_WIRED : 0))
1465 1.166.2.2 uebayasi != 0) {
1466 1.166.2.2 uebayasi
1467 1.166.2.2 uebayasi /*
1468 1.166.2.2 uebayasi * No need to undo what we did; we can simply think of
1469 1.166.2.2 uebayasi * this as the pmap throwing away the mapping information.
1470 1.166.2.2 uebayasi *
1471 1.166.2.2 uebayasi * We do, however, have to go through the ReFault path,
1472 1.166.2.2 uebayasi * as the map may change while we're asleep.
1473 1.166.2.2 uebayasi */
1474 1.166.2.2 uebayasi
1475 1.166.2.2 uebayasi if (anon != oanon)
1476 1.166.2.2 uebayasi mutex_exit(&anon->an_lock);
1477 1.166.2.2 uebayasi uvmfault_unlockall(ufi, amap, uobj, oanon);
1478 1.166.2.2 uebayasi if (!uvm_reclaimable()) {
1479 1.166.2.2 uebayasi UVMHIST_LOG(maphist,
1480 1.166.2.2 uebayasi "<- failed. out of VM",0,0,0,0);
1481 1.166.2.2 uebayasi /* XXX instrumentation */
1482 1.166.2.2 uebayasi return ENOMEM;
1483 1.166.2.2 uebayasi }
1484 1.166.2.2 uebayasi /* XXX instrumentation */
1485 1.166.2.2 uebayasi uvm_wait("flt_pmfail1");
1486 1.166.2.2 uebayasi return ERESTART;
1487 1.166.2.2 uebayasi }
1488 1.166.2.2 uebayasi
1489 1.166.2.5 uebayasi uvm_fault_upper_done(ufi, flt, uobj, anon, pg);
1490 1.166.2.5 uebayasi
1491 1.166.2.5 uebayasi /*
1492 1.166.2.5 uebayasi * done case 1! finish up by unlocking everything and returning success
1493 1.166.2.5 uebayasi */
1494 1.166.2.5 uebayasi
1495 1.166.2.5 uebayasi if (anon != oanon)
1496 1.166.2.5 uebayasi mutex_exit(&anon->an_lock);
1497 1.166.2.5 uebayasi uvmfault_unlockall(ufi, amap, uobj, oanon);
1498 1.166.2.5 uebayasi pmap_update(ufi->orig_map->pmap);
1499 1.166.2.5 uebayasi return 0;
1500 1.166.2.2 uebayasi }
1501 1.166.2.2 uebayasi
1502 1.166.2.5 uebayasi /*
1503 1.166.2.5 uebayasi * uvm_fault_upper_done: queue upper center page.
1504 1.166.2.5 uebayasi */
1505 1.166.2.5 uebayasi
1506 1.166.2.5 uebayasi static void
1507 1.166.2.2 uebayasi uvm_fault_upper_done(
1508 1.166.2.2 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
1509 1.166.2.5 uebayasi struct uvm_object *uobj, struct vm_anon *anon, struct vm_page *pg)
1510 1.166.2.2 uebayasi {
1511 1.166.2.5 uebayasi UVMHIST_FUNC("uvm_fault_upper_done"); UVMHIST_CALLED(maphist);
1512 1.166.2.2 uebayasi
1513 1.166.2.2 uebayasi /*
1514 1.166.2.2 uebayasi * ... update the page queues.
1515 1.166.2.2 uebayasi */
1516 1.166.2.2 uebayasi
1517 1.166.2.2 uebayasi mutex_enter(&uvm_pageqlock);
1518 1.166.2.2 uebayasi if (flt->wire_paging) {
1519 1.166.2.2 uebayasi uvm_pagewire(pg);
1520 1.166.2.2 uebayasi
1521 1.166.2.2 uebayasi /*
1522 1.166.2.2 uebayasi * since the now-wired page cannot be paged out,
1523 1.166.2.2 uebayasi * release its swap resources for others to use.
1524 1.166.2.2 uebayasi * since an anon with no swap cannot be PG_CLEAN,
1525 1.166.2.2 uebayasi * clear its clean flag now.
1526 1.166.2.2 uebayasi */
1527 1.166.2.2 uebayasi
1528 1.166.2.2 uebayasi pg->flags &= ~(PG_CLEAN);
1529 1.166.2.2 uebayasi uvm_anon_dropswap(anon);
1530 1.166.2.2 uebayasi } else {
1531 1.166.2.2 uebayasi uvm_pageactivate(pg);
1532 1.166.2.2 uebayasi }
1533 1.166.2.2 uebayasi mutex_exit(&uvm_pageqlock);
1534 1.166.2.2 uebayasi }
1535 1.166.2.2 uebayasi
1536 1.166.2.5 uebayasi /*
1537 1.166.2.5 uebayasi * uvm_fault_lower: handle lower fault.
1538 1.166.2.5 uebayasi *
1539 1.166.2.5 uebayasi * 1. check uobj
1540 1.166.2.5 uebayasi * 1.1. if null, ZFOD.
1541 1.166.2.5 uebayasi * 1.2. if not null, look up unnmapped neighbor pages.
1542 1.166.2.5 uebayasi * 2. for center page, check if promote.
1543 1.166.2.5 uebayasi * 2.1. ZFOD always needs promotion.
1544 1.166.2.5 uebayasi * 2.2. other uobjs, when entry is marked COW (usually MAP_PRIVATE vnode).
1545 1.166.2.5 uebayasi * 3. if uobj is not ZFOD and page is not found, do i/o.
1546 1.166.2.5 uebayasi * 4. dispatch either direct / promote fault.
1547 1.166.2.5 uebayasi */
1548 1.166.2.5 uebayasi
1549 1.166.2.2 uebayasi static int
1550 1.166.2.5 uebayasi uvm_fault_lower(
1551 1.166.2.2 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
1552 1.166.2.5 uebayasi struct vm_page **pages)
1553 1.166.2.2 uebayasi {
1554 1.166.2.2 uebayasi #ifdef DIAGNOSTIC
1555 1.166.2.5 uebayasi struct vm_amap *amap = ufi->entry->aref.ar_amap;
1556 1.166.2.2 uebayasi #endif
1557 1.166.2.5 uebayasi struct uvm_object *uobj = ufi->entry->object.uvm_obj;
1558 1.166.2.5 uebayasi struct vm_page *uobjpage;
1559 1.166.2.2 uebayasi int error;
1560 1.166.2.5 uebayasi UVMHIST_FUNC("uvm_fault_lower"); UVMHIST_CALLED(maphist);
1561 1.166.2.5 uebayasi
1562 1.166.2.5 uebayasi /* locked: maps(read), amap(if there), uobj(if !null) */
1563 1.166.2.2 uebayasi
1564 1.166.2.2 uebayasi /*
1565 1.166.2.5 uebayasi * now, if the desired page is not shadowed by the amap and we have
1566 1.166.2.5 uebayasi * a backing object that does not have a special fault routine, then
1567 1.166.2.5 uebayasi * we ask (with pgo_get) the object for resident pages that we care
1568 1.166.2.5 uebayasi * about and attempt to map them in. we do not let pgo_get block
1569 1.166.2.5 uebayasi * (PGO_LOCKED).
1570 1.166.2.5 uebayasi */
1571 1.166.2.5 uebayasi
1572 1.166.2.5 uebayasi if (uobj == NULL) {
1573 1.166.2.5 uebayasi /* zero fill; don't care neighbor pages */
1574 1.166.2.5 uebayasi uobjpage = NULL;
1575 1.166.2.5 uebayasi } else {
1576 1.166.2.5 uebayasi uvm_fault_lower_lookup(ufi, flt, pages);
1577 1.166.2.5 uebayasi uobjpage = pages[flt->centeridx];
1578 1.166.2.5 uebayasi }
1579 1.166.2.5 uebayasi
1580 1.166.2.5 uebayasi /* locked: maps(read), amap(if there), uobj(if !null), uobjpage(if !null) */
1581 1.166.2.5 uebayasi KASSERT(amap == NULL || mutex_owned(&amap->am_l));
1582 1.166.2.5 uebayasi KASSERT(uobj == NULL || mutex_owned(&uobj->vmobjlock));
1583 1.166.2.13 uebayasi KASSERT(uobjpage == NULL || (uobjpage->flags & PG_BUSY) != 0);
1584 1.166.2.5 uebayasi
1585 1.166.2.5 uebayasi /*
1586 1.166.2.5 uebayasi * note that at this point we are done with any front or back pages.
1587 1.166.2.5 uebayasi * we are now going to focus on the center page (i.e. the one we've
1588 1.166.2.5 uebayasi * faulted on). if we have faulted on the upper (anon) layer
1589 1.166.2.5 uebayasi * [i.e. case 1], then the anon we want is anons[centeridx] (we have
1590 1.166.2.5 uebayasi * not touched it yet). if we have faulted on the bottom (uobj)
1591 1.166.2.5 uebayasi * layer [i.e. case 2] and the page was both present and available,
1592 1.166.2.5 uebayasi * then we've got a pointer to it as "uobjpage" and we've already
1593 1.166.2.5 uebayasi * made it BUSY.
1594 1.166.2.2 uebayasi */
1595 1.166.2.2 uebayasi
1596 1.166.2.2 uebayasi /*
1597 1.166.2.2 uebayasi * locked:
1598 1.166.2.2 uebayasi * maps(read), amap(if there), uobj(if !null), uobjpage(if !null)
1599 1.166.2.2 uebayasi */
1600 1.166.2.2 uebayasi KASSERT(amap == NULL || mutex_owned(&amap->am_l));
1601 1.166.2.2 uebayasi KASSERT(uobj == NULL || mutex_owned(&uobj->vmobjlock));
1602 1.166.2.13 uebayasi KASSERT(uobjpage == NULL || (uobjpage->flags & PG_BUSY) != 0);
1603 1.166.2.2 uebayasi
1604 1.166.2.2 uebayasi /*
1605 1.166.2.2 uebayasi * note that uobjpage can not be PGO_DONTCARE at this point. we now
1606 1.166.2.2 uebayasi * set uobjpage to PGO_DONTCARE if we are doing a zero fill. if we
1607 1.166.2.2 uebayasi * have a backing object, check and see if we are going to promote
1608 1.166.2.2 uebayasi * the data up to an anon during the fault.
1609 1.166.2.2 uebayasi */
1610 1.166.2.2 uebayasi
1611 1.166.2.2 uebayasi if (uobj == NULL) {
1612 1.166.2.2 uebayasi uobjpage = PGO_DONTCARE;
1613 1.166.2.5 uebayasi flt->promote = true; /* always need anon here */
1614 1.166.2.2 uebayasi } else {
1615 1.166.2.2 uebayasi KASSERT(uobjpage != PGO_DONTCARE);
1616 1.166.2.5 uebayasi flt->promote = flt->cow_now && UVM_ET_ISCOPYONWRITE(ufi->entry);
1617 1.166.2.2 uebayasi }
1618 1.166.2.2 uebayasi UVMHIST_LOG(maphist, " case 2 fault: promote=%d, zfill=%d",
1619 1.166.2.5 uebayasi flt->promote, (uobj == NULL), 0,0);
1620 1.166.2.2 uebayasi
1621 1.166.2.2 uebayasi /*
1622 1.166.2.2 uebayasi * if uobjpage is not null then we do not need to do I/O to get the
1623 1.166.2.2 uebayasi * uobjpage.
1624 1.166.2.2 uebayasi *
1625 1.166.2.2 uebayasi * if uobjpage is null, then we need to unlock and ask the pager to
1626 1.166.2.2 uebayasi * get the data for us. once we have the data, we need to reverify
1627 1.166.2.2 uebayasi * the state the world. we are currently not holding any resources.
1628 1.166.2.2 uebayasi */
1629 1.166.2.2 uebayasi
1630 1.166.2.2 uebayasi if (uobjpage) {
1631 1.166.2.2 uebayasi /* update rusage counters */
1632 1.166.2.2 uebayasi curlwp->l_ru.ru_minflt++;
1633 1.166.2.2 uebayasi } else {
1634 1.166.2.2 uebayasi error = uvm_fault_lower_io(ufi, flt, &uobj, &uobjpage);
1635 1.166.2.2 uebayasi if (error != 0)
1636 1.166.2.2 uebayasi return error;
1637 1.166.2.2 uebayasi }
1638 1.166.2.2 uebayasi
1639 1.166.2.2 uebayasi /*
1640 1.166.2.2 uebayasi * locked:
1641 1.166.2.2 uebayasi * maps(read), amap(if !null), uobj(if !null), uobjpage(if uobj)
1642 1.166.2.2 uebayasi */
1643 1.166.2.2 uebayasi KASSERT(amap == NULL || mutex_owned(&amap->am_l));
1644 1.166.2.2 uebayasi KASSERT(uobj == NULL || mutex_owned(&uobj->vmobjlock));
1645 1.166.2.13 uebayasi KASSERT(uobj == NULL || (uobjpage->flags & PG_BUSY) != 0);
1646 1.166.2.2 uebayasi
1647 1.166.2.2 uebayasi /*
1648 1.166.2.2 uebayasi * notes:
1649 1.166.2.2 uebayasi * - at this point uobjpage can not be NULL
1650 1.166.2.2 uebayasi * - at this point uobjpage can not be PG_RELEASED (since we checked
1651 1.166.2.2 uebayasi * for it above)
1652 1.166.2.2 uebayasi * - at this point uobjpage could be PG_WANTED (handle later)
1653 1.166.2.2 uebayasi */
1654 1.166.2.2 uebayasi
1655 1.166.2.13 uebayasi KASSERT(uobj == NULL || uobj == uobjpage->uobject);
1656 1.166.2.13 uebayasi KASSERT(uobj == NULL || !UVM_OBJ_IS_CLEAN(uobjpage->uobject) ||
1657 1.166.2.2 uebayasi (uobjpage->flags & PG_CLEAN) != 0);
1658 1.166.2.2 uebayasi
1659 1.166.2.5 uebayasi if (flt->promote == false) {
1660 1.166.2.2 uebayasi error = uvm_fault_lower_direct(ufi, flt, uobj, uobjpage);
1661 1.166.2.2 uebayasi } else {
1662 1.166.2.2 uebayasi error = uvm_fault_lower_promote(ufi, flt, uobj, uobjpage);
1663 1.166.2.2 uebayasi }
1664 1.166.2.2 uebayasi return error;
1665 1.166.2.2 uebayasi }
1666 1.166.2.2 uebayasi
1667 1.166.2.5 uebayasi /*
1668 1.166.2.5 uebayasi * uvm_fault_lower_lookup: look up on-memory uobj pages.
1669 1.166.2.5 uebayasi *
1670 1.166.2.5 uebayasi * 1. get on-memory pages.
1671 1.166.2.5 uebayasi * 2. if failed, give up (get only center page later).
1672 1.166.2.5 uebayasi * 3. if succeeded, enter h/w mapping of neighbor pages.
1673 1.166.2.5 uebayasi */
1674 1.166.2.5 uebayasi
1675 1.166.2.5 uebayasi static void
1676 1.166.2.5 uebayasi uvm_fault_lower_lookup(
1677 1.166.2.5 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
1678 1.166.2.5 uebayasi struct vm_page **pages)
1679 1.166.2.5 uebayasi {
1680 1.166.2.5 uebayasi struct uvm_object *uobj = ufi->entry->object.uvm_obj;
1681 1.166.2.5 uebayasi int lcv, gotpages;
1682 1.166.2.5 uebayasi vaddr_t currva;
1683 1.166.2.5 uebayasi UVMHIST_FUNC("uvm_fault_lower_lookup"); UVMHIST_CALLED(maphist);
1684 1.166.2.5 uebayasi
1685 1.166.2.5 uebayasi mutex_enter(&uobj->vmobjlock);
1686 1.166.2.5 uebayasi /* locked: maps(read), amap(if there), uobj */
1687 1.166.2.5 uebayasi /*
1688 1.166.2.5 uebayasi * the following call to pgo_get does _not_ change locking state
1689 1.166.2.5 uebayasi */
1690 1.166.2.5 uebayasi
1691 1.166.2.5 uebayasi uvmexp.fltlget++;
1692 1.166.2.5 uebayasi gotpages = flt->npages;
1693 1.166.2.5 uebayasi (void) uobj->pgops->pgo_get(uobj,
1694 1.166.2.5 uebayasi ufi->entry->offset + flt->startva - ufi->entry->start,
1695 1.166.2.5 uebayasi pages, &gotpages, flt->centeridx,
1696 1.166.2.5 uebayasi flt->access_type & MASK(ufi->entry), ufi->entry->advice, PGO_LOCKED);
1697 1.166.2.5 uebayasi
1698 1.166.2.5 uebayasi /*
1699 1.166.2.5 uebayasi * check for pages to map, if we got any
1700 1.166.2.5 uebayasi */
1701 1.166.2.5 uebayasi
1702 1.166.2.5 uebayasi if (gotpages == 0) {
1703 1.166.2.5 uebayasi pages[flt->centeridx] = NULL;
1704 1.166.2.5 uebayasi return;
1705 1.166.2.5 uebayasi }
1706 1.166.2.5 uebayasi
1707 1.166.2.5 uebayasi currva = flt->startva;
1708 1.166.2.5 uebayasi for (lcv = 0; lcv < flt->npages; lcv++, currva += PAGE_SIZE) {
1709 1.166.2.5 uebayasi struct vm_page *curpg;
1710 1.166.2.5 uebayasi
1711 1.166.2.5 uebayasi curpg = pages[lcv];
1712 1.166.2.5 uebayasi if (curpg == NULL || curpg == PGO_DONTCARE) {
1713 1.166.2.5 uebayasi continue;
1714 1.166.2.5 uebayasi }
1715 1.166.2.13 uebayasi KASSERT(curpg->uobject == uobj);
1716 1.166.2.5 uebayasi
1717 1.166.2.5 uebayasi /*
1718 1.166.2.5 uebayasi * if center page is resident and not PG_BUSY|PG_RELEASED
1719 1.166.2.5 uebayasi * then pgo_get made it PG_BUSY for us and gave us a handle
1720 1.166.2.5 uebayasi * to it.
1721 1.166.2.5 uebayasi */
1722 1.166.2.5 uebayasi
1723 1.166.2.5 uebayasi if (lcv == flt->centeridx) {
1724 1.166.2.5 uebayasi UVMHIST_LOG(maphist, " got uobjpage "
1725 1.166.2.5 uebayasi "(0x%x) with locked get",
1726 1.166.2.5 uebayasi curpg, 0,0,0);
1727 1.166.2.5 uebayasi } else {
1728 1.166.2.12 uebayasi bool readonly = (curpg->flags & PG_RDONLY)
1729 1.166.2.5 uebayasi || (curpg->loan_count > 0)
1730 1.166.2.5 uebayasi || UVM_OBJ_NEEDS_WRITEFAULT(curpg->uobject);
1731 1.166.2.5 uebayasi
1732 1.166.2.5 uebayasi uvm_fault_lower_neighbor(ufi, flt,
1733 1.166.2.5 uebayasi currva, curpg, readonly);
1734 1.166.2.5 uebayasi }
1735 1.166.2.5 uebayasi }
1736 1.166.2.5 uebayasi pmap_update(ufi->orig_map->pmap);
1737 1.166.2.5 uebayasi }
1738 1.166.2.5 uebayasi
1739 1.166.2.5 uebayasi /*
1740 1.166.2.5 uebayasi * uvm_fault_lower_neighbor: enter h/w mapping of lower neighbor page.
1741 1.166.2.5 uebayasi */
1742 1.166.2.5 uebayasi
1743 1.166.2.5 uebayasi static void
1744 1.166.2.5 uebayasi uvm_fault_lower_neighbor(
1745 1.166.2.5 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
1746 1.166.2.5 uebayasi vaddr_t currva, struct vm_page *pg, bool readonly)
1747 1.166.2.5 uebayasi {
1748 1.166.2.5 uebayasi UVMHIST_FUNC("uvm_fault_lower_neighor"); UVMHIST_CALLED(maphist);
1749 1.166.2.5 uebayasi
1750 1.166.2.5 uebayasi /* locked: maps(read), amap(if there), uobj */
1751 1.166.2.5 uebayasi
1752 1.166.2.7 uebayasi if (uvm_pageisdirect_p(pg))
1753 1.166.2.5 uebayasi goto uvm_fault_lower_neighbor_enter;
1754 1.166.2.5 uebayasi
1755 1.166.2.5 uebayasi /*
1756 1.166.2.5 uebayasi * calling pgo_get with PGO_LOCKED returns us pages which
1757 1.166.2.5 uebayasi * are neither busy nor released, so we don't need to check
1758 1.166.2.5 uebayasi * for this. we can just directly enter the pages.
1759 1.166.2.5 uebayasi */
1760 1.166.2.5 uebayasi
1761 1.166.2.5 uebayasi mutex_enter(&uvm_pageqlock);
1762 1.166.2.5 uebayasi uvm_pageenqueue(pg);
1763 1.166.2.5 uebayasi mutex_exit(&uvm_pageqlock);
1764 1.166.2.5 uebayasi
1765 1.166.2.5 uebayasi /*
1766 1.166.2.5 uebayasi * Since this page isn't the page that's actually faulting,
1767 1.166.2.5 uebayasi * ignore pmap_enter() failures; it's not critical that we
1768 1.166.2.5 uebayasi * enter these right now.
1769 1.166.2.5 uebayasi * NOTE: page can't be PG_WANTED or PG_RELEASED because we've
1770 1.166.2.5 uebayasi * held the lock the whole time we've had the handle.
1771 1.166.2.5 uebayasi */
1772 1.166.2.5 uebayasi KASSERT((pg->flags & PG_PAGEOUT) == 0);
1773 1.166.2.5 uebayasi KASSERT((pg->flags & PG_RELEASED) == 0);
1774 1.166.2.5 uebayasi KASSERT((pg->flags & PG_WANTED) == 0);
1775 1.166.2.5 uebayasi KASSERT(!UVM_OBJ_IS_CLEAN(pg->uobject) ||
1776 1.166.2.5 uebayasi (pg->flags & PG_CLEAN) != 0);
1777 1.166.2.13 uebayasi
1778 1.166.2.13 uebayasi uvm_fault_lower_neighbor_enter:
1779 1.166.2.5 uebayasi pg->flags &= ~(PG_BUSY);
1780 1.166.2.5 uebayasi UVM_PAGE_OWN(pg, NULL);
1781 1.166.2.5 uebayasi
1782 1.166.2.6 uebayasi UVMHIST_LOG(maphist,
1783 1.166.2.6 uebayasi " MAPPING: n obj: pm=0x%x, va=0x%x, pg=0x%x",
1784 1.166.2.6 uebayasi ufi->orig_map->pmap, currva, pg, 0);
1785 1.166.2.6 uebayasi uvmexp.fltnomap++;
1786 1.166.2.6 uebayasi
1787 1.166.2.5 uebayasi (void) pmap_enter(ufi->orig_map->pmap, currva,
1788 1.166.2.5 uebayasi VM_PAGE_TO_PHYS(pg),
1789 1.166.2.5 uebayasi readonly ? (flt->enter_prot & ~VM_PROT_WRITE) :
1790 1.166.2.5 uebayasi flt->enter_prot & MASK(ufi->entry),
1791 1.166.2.5 uebayasi PMAP_CANFAIL | (flt->wire_mapping ? PMAP_WIRED : 0));
1792 1.166.2.5 uebayasi }
1793 1.166.2.5 uebayasi
1794 1.166.2.5 uebayasi /*
1795 1.166.2.5 uebayasi * uvm_fault_lower_io: get lower page from backing store.
1796 1.166.2.5 uebayasi *
1797 1.166.2.5 uebayasi * 1. unlock everything, because i/o will block.
1798 1.166.2.5 uebayasi * 2. call pgo_get.
1799 1.166.2.5 uebayasi * 3. if failed, recover.
1800 1.166.2.5 uebayasi * 4. if succeeded, relock everything and verify things.
1801 1.166.2.5 uebayasi */
1802 1.166.2.5 uebayasi
1803 1.166.2.2 uebayasi static int
1804 1.166.2.2 uebayasi uvm_fault_lower_io(
1805 1.166.2.2 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
1806 1.166.2.2 uebayasi struct uvm_object **ruobj, struct vm_page **ruobjpage)
1807 1.166.2.2 uebayasi {
1808 1.166.2.2 uebayasi struct vm_amap * const amap = ufi->entry->aref.ar_amap;
1809 1.166.2.2 uebayasi struct uvm_object *uobj = *ruobj;
1810 1.166.2.2 uebayasi struct vm_page *pg;
1811 1.166.2.2 uebayasi bool locked;
1812 1.166.2.2 uebayasi int gotpages;
1813 1.166.2.2 uebayasi int error;
1814 1.166.2.2 uebayasi voff_t uoff;
1815 1.166.2.2 uebayasi UVMHIST_FUNC("uvm_fault_lower_io"); UVMHIST_CALLED(maphist);
1816 1.166.2.2 uebayasi
1817 1.166.2.2 uebayasi /* update rusage counters */
1818 1.166.2.2 uebayasi curlwp->l_ru.ru_majflt++;
1819 1.166.2.2 uebayasi
1820 1.166.2.2 uebayasi /* locked: maps(read), amap(if there), uobj */
1821 1.166.2.2 uebayasi uvmfault_unlockall(ufi, amap, NULL, NULL);
1822 1.166.2.2 uebayasi /* locked: uobj */
1823 1.166.2.2 uebayasi
1824 1.166.2.2 uebayasi uvmexp.fltget++;
1825 1.166.2.2 uebayasi gotpages = 1;
1826 1.166.2.2 uebayasi pg = NULL;
1827 1.166.2.2 uebayasi uoff = (ufi->orig_rvaddr - ufi->entry->start) + ufi->entry->offset;
1828 1.166.2.2 uebayasi error = uobj->pgops->pgo_get(uobj, uoff, &pg, &gotpages,
1829 1.166.2.2 uebayasi 0, flt->access_type & MASK(ufi->entry), ufi->entry->advice,
1830 1.166.2.2 uebayasi PGO_SYNCIO);
1831 1.166.2.2 uebayasi /* locked: pg(if no error) */
1832 1.166.2.2 uebayasi
1833 1.166.2.2 uebayasi /*
1834 1.166.2.2 uebayasi * recover from I/O
1835 1.166.2.2 uebayasi */
1836 1.166.2.2 uebayasi
1837 1.166.2.2 uebayasi if (error) {
1838 1.166.2.2 uebayasi if (error == EAGAIN) {
1839 1.166.2.2 uebayasi UVMHIST_LOG(maphist,
1840 1.166.2.2 uebayasi " pgo_get says TRY AGAIN!",0,0,0,0);
1841 1.166.2.2 uebayasi kpause("fltagain2", false, hz/2, NULL);
1842 1.166.2.2 uebayasi return ERESTART;
1843 1.166.2.2 uebayasi }
1844 1.166.2.2 uebayasi
1845 1.166.2.2 uebayasi #if 0
1846 1.166.2.2 uebayasi KASSERT(error != ERESTART);
1847 1.166.2.2 uebayasi #else
1848 1.166.2.2 uebayasi /* XXXUEBS don't re-fault? */
1849 1.166.2.2 uebayasi if (error == ERESTART)
1850 1.166.2.2 uebayasi error = EIO;
1851 1.166.2.2 uebayasi #endif
1852 1.166.2.2 uebayasi
1853 1.166.2.2 uebayasi UVMHIST_LOG(maphist, "<- pgo_get failed (code %d)",
1854 1.166.2.2 uebayasi error, 0,0,0);
1855 1.166.2.2 uebayasi return error;
1856 1.166.2.2 uebayasi }
1857 1.166.2.2 uebayasi
1858 1.166.2.2 uebayasi /* locked: pg */
1859 1.166.2.2 uebayasi
1860 1.166.2.2 uebayasi KASSERT((pg->flags & PG_BUSY) != 0);
1861 1.166.2.2 uebayasi
1862 1.166.2.2 uebayasi mutex_enter(&uvm_pageqlock);
1863 1.166.2.2 uebayasi uvm_pageactivate(pg);
1864 1.166.2.2 uebayasi mutex_exit(&uvm_pageqlock);
1865 1.166.2.2 uebayasi
1866 1.166.2.2 uebayasi /*
1867 1.166.2.2 uebayasi * re-verify the state of the world by first trying to relock
1868 1.166.2.2 uebayasi * the maps. always relock the object.
1869 1.166.2.2 uebayasi */
1870 1.166.2.2 uebayasi
1871 1.166.2.2 uebayasi locked = uvmfault_relock(ufi);
1872 1.166.2.2 uebayasi if (locked && amap)
1873 1.166.2.2 uebayasi amap_lock(amap);
1874 1.166.2.2 uebayasi
1875 1.166.2.2 uebayasi /* might be changed */
1876 1.166.2.2 uebayasi uobj = pg->uobject;
1877 1.166.2.2 uebayasi
1878 1.166.2.2 uebayasi mutex_enter(&uobj->vmobjlock);
1879 1.166.2.2 uebayasi
1880 1.166.2.2 uebayasi /* locked(locked): maps(read), amap(if !null), uobj, pg */
1881 1.166.2.2 uebayasi /* locked(!locked): uobj, pg */
1882 1.166.2.2 uebayasi
1883 1.166.2.2 uebayasi /*
1884 1.166.2.2 uebayasi * verify that the page has not be released and re-verify
1885 1.166.2.2 uebayasi * that amap slot is still free. if there is a problem,
1886 1.166.2.2 uebayasi * we unlock and clean up.
1887 1.166.2.2 uebayasi */
1888 1.166.2.2 uebayasi
1889 1.166.2.2 uebayasi if ((pg->flags & PG_RELEASED) != 0 ||
1890 1.166.2.2 uebayasi (locked && amap && amap_lookup(&ufi->entry->aref,
1891 1.166.2.2 uebayasi ufi->orig_rvaddr - ufi->entry->start))) {
1892 1.166.2.2 uebayasi if (locked)
1893 1.166.2.2 uebayasi uvmfault_unlockall(ufi, amap, NULL, NULL);
1894 1.166.2.2 uebayasi locked = false;
1895 1.166.2.2 uebayasi }
1896 1.166.2.2 uebayasi
1897 1.166.2.2 uebayasi /*
1898 1.166.2.2 uebayasi * didn't get the lock? release the page and retry.
1899 1.166.2.2 uebayasi */
1900 1.166.2.2 uebayasi
1901 1.166.2.2 uebayasi if (locked == false) {
1902 1.166.2.2 uebayasi UVMHIST_LOG(maphist,
1903 1.166.2.2 uebayasi " wasn't able to relock after fault: retry",
1904 1.166.2.2 uebayasi 0,0,0,0);
1905 1.166.2.2 uebayasi if (pg->flags & PG_WANTED) {
1906 1.166.2.2 uebayasi wakeup(pg);
1907 1.166.2.2 uebayasi }
1908 1.166.2.2 uebayasi if (pg->flags & PG_RELEASED) {
1909 1.166.2.2 uebayasi uvmexp.fltpgrele++;
1910 1.166.2.2 uebayasi uvm_pagefree(pg);
1911 1.166.2.2 uebayasi mutex_exit(&uobj->vmobjlock);
1912 1.166.2.2 uebayasi return ERESTART;
1913 1.166.2.2 uebayasi }
1914 1.166.2.2 uebayasi pg->flags &= ~(PG_BUSY|PG_WANTED);
1915 1.166.2.2 uebayasi UVM_PAGE_OWN(pg, NULL);
1916 1.166.2.2 uebayasi mutex_exit(&uobj->vmobjlock);
1917 1.166.2.2 uebayasi return ERESTART;
1918 1.166.2.2 uebayasi }
1919 1.166.2.2 uebayasi
1920 1.166.2.2 uebayasi /*
1921 1.166.2.2 uebayasi * we have the data in pg which is busy and
1922 1.166.2.2 uebayasi * not released. we are holding object lock (so the page
1923 1.166.2.2 uebayasi * can't be released on us).
1924 1.166.2.2 uebayasi */
1925 1.166.2.2 uebayasi
1926 1.166.2.2 uebayasi /* locked: maps(read), amap(if !null), uobj, pg */
1927 1.166.2.2 uebayasi
1928 1.166.2.2 uebayasi *ruobj = uobj;
1929 1.166.2.2 uebayasi *ruobjpage = pg;
1930 1.166.2.2 uebayasi return 0;
1931 1.166.2.2 uebayasi }
1932 1.166.2.2 uebayasi
1933 1.166.2.5 uebayasi /*
1934 1.166.2.5 uebayasi * uvm_fault_lower_direct: fault lower center page
1935 1.166.2.5 uebayasi *
1936 1.166.2.5 uebayasi * 1. adjust h/w mapping protection.
1937 1.166.2.5 uebayasi * 2. if page is loaned, resolve.
1938 1.166.2.5 uebayasi */
1939 1.166.2.5 uebayasi
1940 1.166.2.2 uebayasi int
1941 1.166.2.2 uebayasi uvm_fault_lower_direct(
1942 1.166.2.2 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
1943 1.166.2.2 uebayasi struct uvm_object *uobj, struct vm_page *uobjpage)
1944 1.166.2.2 uebayasi {
1945 1.166.2.2 uebayasi struct vm_page *pg;
1946 1.166.2.5 uebayasi UVMHIST_FUNC("uvm_fault_lower_direct"); UVMHIST_CALLED(maphist);
1947 1.166.2.2 uebayasi
1948 1.166.2.2 uebayasi /*
1949 1.166.2.2 uebayasi * we are not promoting. if the mapping is COW ensure that we
1950 1.166.2.2 uebayasi * don't give more access than we should (e.g. when doing a read
1951 1.166.2.2 uebayasi * fault on a COPYONWRITE mapping we want to map the COW page in
1952 1.166.2.2 uebayasi * R/O even though the entry protection could be R/W).
1953 1.166.2.2 uebayasi *
1954 1.166.2.2 uebayasi * set "pg" to the page we want to map in (uobjpage, usually)
1955 1.166.2.2 uebayasi */
1956 1.166.2.11 uebayasi
1957 1.166.2.3 uebayasi pg = uobjpage; /* map in the actual object */
1958 1.166.2.4 uebayasi uvmexp.flt_obj++;
1959 1.166.2.3 uebayasi
1960 1.166.2.7 uebayasi if (uvm_pageisdirect_p(uobjpage)) {
1961 1.166.2.6 uebayasi /* XIP'ed device pages are always read-only */
1962 1.166.2.3 uebayasi goto uvm_fault_lower_direct_done;
1963 1.166.2.6 uebayasi }
1964 1.166.2.2 uebayasi
1965 1.166.2.2 uebayasi if (UVM_ET_ISCOPYONWRITE(ufi->entry) ||
1966 1.166.2.2 uebayasi UVM_OBJ_NEEDS_WRITEFAULT(uobjpage->uobject))
1967 1.166.2.2 uebayasi flt->enter_prot &= ~VM_PROT_WRITE;
1968 1.166.2.2 uebayasi
1969 1.166.2.2 uebayasi KASSERT(uobjpage != PGO_DONTCARE);
1970 1.166.2.2 uebayasi
1971 1.166.2.2 uebayasi /*
1972 1.166.2.2 uebayasi * we are faulting directly on the page. be careful
1973 1.166.2.2 uebayasi * about writing to loaned pages...
1974 1.166.2.2 uebayasi */
1975 1.166.2.2 uebayasi
1976 1.166.2.2 uebayasi if (uobjpage->loan_count) {
1977 1.166.2.2 uebayasi uvm_fault_lower_direct_loan(ufi, flt, uobj, &pg, &uobjpage);
1978 1.166.2.2 uebayasi }
1979 1.166.2.2 uebayasi KASSERT(pg == uobjpage);
1980 1.166.2.2 uebayasi
1981 1.166.2.3 uebayasi uvm_fault_lower_direct_done:
1982 1.166.2.2 uebayasi return uvm_fault_lower_enter(ufi, flt, uobj, NULL, pg, uobjpage);
1983 1.166.2.2 uebayasi }
1984 1.166.2.2 uebayasi
1985 1.166.2.5 uebayasi /*
1986 1.166.2.5 uebayasi * uvm_fault_lower_direct_loan: resolve loaned page.
1987 1.166.2.5 uebayasi *
1988 1.166.2.5 uebayasi * 1. if not cow'ing, adjust h/w mapping protection.
1989 1.166.2.5 uebayasi * 2. if cow'ing, break loan.
1990 1.166.2.5 uebayasi */
1991 1.166.2.5 uebayasi
1992 1.166.2.2 uebayasi static int
1993 1.166.2.2 uebayasi uvm_fault_lower_direct_loan(
1994 1.166.2.2 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
1995 1.166.2.2 uebayasi struct uvm_object *uobj, struct vm_page **rpg, struct vm_page **ruobjpage)
1996 1.166.2.2 uebayasi {
1997 1.166.2.2 uebayasi struct vm_amap * const amap = ufi->entry->aref.ar_amap;
1998 1.166.2.2 uebayasi struct vm_page *pg;
1999 1.166.2.2 uebayasi struct vm_page *uobjpage = *ruobjpage;
2000 1.166.2.2 uebayasi UVMHIST_FUNC("uvm_fault_lower_direct_loan"); UVMHIST_CALLED(maphist);
2001 1.166.2.2 uebayasi
2002 1.166.2.2 uebayasi if (!flt->cow_now) {
2003 1.166.2.2 uebayasi /* read fault: cap the protection at readonly */
2004 1.166.2.2 uebayasi /* cap! */
2005 1.166.2.2 uebayasi flt->enter_prot = flt->enter_prot & ~VM_PROT_WRITE;
2006 1.166.2.2 uebayasi } else {
2007 1.166.2.2 uebayasi /* write fault: must break the loan here */
2008 1.166.2.2 uebayasi
2009 1.166.2.2 uebayasi pg = uvm_loanbreak(uobjpage);
2010 1.166.2.2 uebayasi if (pg == NULL) {
2011 1.166.2.2 uebayasi
2012 1.166.2.2 uebayasi /*
2013 1.166.2.2 uebayasi * drop ownership of page, it can't be released
2014 1.166.2.2 uebayasi */
2015 1.166.2.2 uebayasi
2016 1.166.2.2 uebayasi if (uobjpage->flags & PG_WANTED)
2017 1.166.2.2 uebayasi wakeup(uobjpage);
2018 1.166.2.2 uebayasi uobjpage->flags &= ~(PG_BUSY|PG_WANTED);
2019 1.166.2.2 uebayasi UVM_PAGE_OWN(uobjpage, NULL);
2020 1.166.2.2 uebayasi
2021 1.166.2.2 uebayasi uvmfault_unlockall(ufi, amap, uobj, NULL);
2022 1.166.2.2 uebayasi UVMHIST_LOG(maphist,
2023 1.166.2.2 uebayasi " out of RAM breaking loan, waiting",
2024 1.166.2.2 uebayasi 0,0,0,0);
2025 1.166.2.2 uebayasi uvmexp.fltnoram++;
2026 1.166.2.2 uebayasi uvm_wait("flt_noram4");
2027 1.166.2.2 uebayasi return ERESTART;
2028 1.166.2.2 uebayasi }
2029 1.166.2.2 uebayasi *rpg = pg;
2030 1.166.2.2 uebayasi *ruobjpage = pg;
2031 1.166.2.2 uebayasi }
2032 1.166.2.2 uebayasi return 0;
2033 1.166.2.2 uebayasi }
2034 1.166.2.2 uebayasi
2035 1.166.2.5 uebayasi /*
2036 1.166.2.5 uebayasi * uvm_fault_lower_promote: promote lower page.
2037 1.166.2.5 uebayasi *
2038 1.166.2.5 uebayasi * 1. call uvmfault_promote.
2039 1.166.2.5 uebayasi * 2. fill in data.
2040 1.166.2.5 uebayasi * 3. if not ZFOD, dispose old page.
2041 1.166.2.5 uebayasi */
2042 1.166.2.5 uebayasi
2043 1.166.2.2 uebayasi int
2044 1.166.2.2 uebayasi uvm_fault_lower_promote(
2045 1.166.2.2 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
2046 1.166.2.2 uebayasi struct uvm_object *uobj, struct vm_page *uobjpage)
2047 1.166.2.2 uebayasi {
2048 1.166.2.2 uebayasi struct vm_amap * const amap = ufi->entry->aref.ar_amap;
2049 1.166.2.2 uebayasi struct vm_anon *anon;
2050 1.166.2.2 uebayasi struct vm_page *pg;
2051 1.166.2.2 uebayasi int error;
2052 1.166.2.2 uebayasi UVMHIST_FUNC("uvm_fault_lower_promote"); UVMHIST_CALLED(maphist);
2053 1.166.2.2 uebayasi
2054 1.166.2.2 uebayasi /*
2055 1.166.2.2 uebayasi * if we are going to promote the data to an anon we
2056 1.166.2.2 uebayasi * allocate a blank anon here and plug it into our amap.
2057 1.166.2.2 uebayasi */
2058 1.166.2.2 uebayasi #if DIAGNOSTIC
2059 1.166.2.2 uebayasi if (amap == NULL)
2060 1.166.2.2 uebayasi panic("uvm_fault: want to promote data, but no anon");
2061 1.166.2.2 uebayasi #endif
2062 1.166.2.2 uebayasi error = uvmfault_promote(ufi, NULL, uobj, uobjpage,
2063 1.166.2.2 uebayasi &anon, &flt->anon_spare);
2064 1.166.2.2 uebayasi switch (error) {
2065 1.166.2.2 uebayasi case 0:
2066 1.166.2.2 uebayasi break;
2067 1.166.2.2 uebayasi case ERESTART:
2068 1.166.2.2 uebayasi return ERESTART;
2069 1.166.2.2 uebayasi default:
2070 1.166.2.2 uebayasi return error;
2071 1.166.2.2 uebayasi }
2072 1.166.2.2 uebayasi
2073 1.166.2.2 uebayasi pg = anon->an_page;
2074 1.166.2.2 uebayasi
2075 1.166.2.2 uebayasi /*
2076 1.166.2.2 uebayasi * fill in the data
2077 1.166.2.2 uebayasi */
2078 1.166.2.2 uebayasi
2079 1.166.2.2 uebayasi if (uobjpage != PGO_DONTCARE) {
2080 1.166.2.2 uebayasi uvmexp.flt_prcopy++;
2081 1.166.2.2 uebayasi
2082 1.166.2.2 uebayasi /*
2083 1.166.2.2 uebayasi * promote to shared amap? make sure all sharing
2084 1.166.2.2 uebayasi * procs see it
2085 1.166.2.2 uebayasi */
2086 1.166.2.2 uebayasi
2087 1.166.2.2 uebayasi if ((amap_flags(amap) & AMAP_SHARED) != 0) {
2088 1.166.2.2 uebayasi pmap_page_protect(uobjpage, VM_PROT_NONE);
2089 1.166.2.2 uebayasi /*
2090 1.166.2.2 uebayasi * XXX: PAGE MIGHT BE WIRED!
2091 1.166.2.2 uebayasi */
2092 1.166.2.2 uebayasi }
2093 1.166.2.2 uebayasi
2094 1.166.2.7 uebayasi if (uvm_pageisdirect_p(uobjpage)) {
2095 1.166.2.6 uebayasi /*
2096 1.166.2.6 uebayasi * XIP devices pages are never paged out, no need to
2097 1.166.2.6 uebayasi * dispose.
2098 1.166.2.6 uebayasi */
2099 1.166.2.4 uebayasi goto uvm_fault_lower_promote_done;
2100 1.166.2.6 uebayasi }
2101 1.166.2.4 uebayasi
2102 1.166.2.2 uebayasi /*
2103 1.166.2.2 uebayasi * dispose of uobjpage. it can't be PG_RELEASED
2104 1.166.2.2 uebayasi * since we still hold the object lock.
2105 1.166.2.2 uebayasi * drop handle to uobj as well.
2106 1.166.2.2 uebayasi */
2107 1.166.2.2 uebayasi
2108 1.166.2.2 uebayasi if (uobjpage->flags & PG_WANTED)
2109 1.166.2.2 uebayasi /* still have the obj lock */
2110 1.166.2.2 uebayasi wakeup(uobjpage);
2111 1.166.2.13 uebayasi
2112 1.166.2.13 uebayasi uvm_fault_lower_promote_done:
2113 1.166.2.2 uebayasi uobjpage->flags &= ~(PG_BUSY|PG_WANTED);
2114 1.166.2.2 uebayasi UVM_PAGE_OWN(uobjpage, NULL);
2115 1.166.2.4 uebayasi
2116 1.166.2.2 uebayasi mutex_exit(&uobj->vmobjlock);
2117 1.166.2.2 uebayasi uobj = NULL;
2118 1.166.2.2 uebayasi
2119 1.166.2.2 uebayasi UVMHIST_LOG(maphist,
2120 1.166.2.2 uebayasi " promote uobjpage 0x%x to anon/page 0x%x/0x%x",
2121 1.166.2.2 uebayasi uobjpage, anon, pg, 0);
2122 1.166.2.2 uebayasi
2123 1.166.2.2 uebayasi } else {
2124 1.166.2.2 uebayasi uvmexp.flt_przero++;
2125 1.166.2.2 uebayasi
2126 1.166.2.2 uebayasi /*
2127 1.166.2.2 uebayasi * Page is zero'd and marked dirty by
2128 1.166.2.2 uebayasi * uvmfault_promote().
2129 1.166.2.2 uebayasi */
2130 1.166.2.2 uebayasi
2131 1.166.2.2 uebayasi UVMHIST_LOG(maphist," zero fill anon/page 0x%x/0%x",
2132 1.166.2.2 uebayasi anon, pg, 0, 0);
2133 1.166.2.2 uebayasi }
2134 1.166.2.2 uebayasi
2135 1.166.2.2 uebayasi return uvm_fault_lower_enter(ufi, flt, uobj, anon, pg, uobjpage);
2136 1.166.2.2 uebayasi }
2137 1.166.2.2 uebayasi
2138 1.166.2.5 uebayasi /*
2139 1.166.2.5 uebayasi * uvm_fault_lower_enter: enter h/w mapping of lower page.
2140 1.166.2.5 uebayasi */
2141 1.166.2.5 uebayasi
2142 1.166.2.2 uebayasi int
2143 1.166.2.2 uebayasi uvm_fault_lower_enter(
2144 1.166.2.2 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
2145 1.166.2.2 uebayasi struct uvm_object *uobj,
2146 1.166.2.2 uebayasi struct vm_anon *anon, struct vm_page *pg, struct vm_page *uobjpage)
2147 1.166.2.2 uebayasi {
2148 1.166.2.2 uebayasi struct vm_amap * const amap = ufi->entry->aref.ar_amap;
2149 1.166.2.2 uebayasi int error;
2150 1.166.2.2 uebayasi UVMHIST_FUNC("uvm_fault_lower_enter"); UVMHIST_CALLED(maphist);
2151 1.166.2.2 uebayasi
2152 1.166.2.2 uebayasi /*
2153 1.166.2.2 uebayasi * locked:
2154 1.166.2.2 uebayasi * maps(read), amap(if !null), uobj(if !null), uobjpage(if uobj),
2155 1.166.2.2 uebayasi * anon(if !null), pg(if anon)
2156 1.166.2.2 uebayasi *
2157 1.166.2.2 uebayasi * note: pg is either the uobjpage or the new page in the new anon
2158 1.166.2.2 uebayasi */
2159 1.166.2.2 uebayasi KASSERT(amap == NULL || mutex_owned(&amap->am_l));
2160 1.166.2.2 uebayasi KASSERT(uobj == NULL || mutex_owned(&uobj->vmobjlock));
2161 1.166.2.13 uebayasi KASSERT(uobj == NULL || (uobjpage->flags & PG_BUSY) != 0);
2162 1.166.2.2 uebayasi KASSERT(anon == NULL || mutex_owned(&anon->an_lock));
2163 1.166.2.13 uebayasi KASSERT((pg->flags & PG_BUSY) != 0);
2164 1.166.2.2 uebayasi
2165 1.166.2.2 uebayasi /*
2166 1.166.2.2 uebayasi * all resources are present. we can now map it in and free our
2167 1.166.2.2 uebayasi * resources.
2168 1.166.2.2 uebayasi */
2169 1.166.2.2 uebayasi
2170 1.166.2.2 uebayasi UVMHIST_LOG(maphist,
2171 1.166.2.5 uebayasi " MAPPING: case2: pm=0x%x, va=0x%x, pg=0x%x, promote=%d",
2172 1.166.2.5 uebayasi ufi->orig_map->pmap, ufi->orig_rvaddr, pg, flt->promote);
2173 1.166.2.2 uebayasi KASSERT((flt->access_type & VM_PROT_WRITE) == 0 ||
2174 1.166.2.12 uebayasi (pg->flags & PG_RDONLY) == 0);
2175 1.166.2.12 uebayasi if (pmap_enter(ufi->orig_map->pmap, ufi->orig_rvaddr, VM_PAGE_TO_PHYS(pg),
2176 1.166.2.12 uebayasi pg->flags & PG_RDONLY ? flt->enter_prot & ~VM_PROT_WRITE : flt->enter_prot,
2177 1.166.2.2 uebayasi flt->access_type | PMAP_CANFAIL | (flt->wire_mapping ? PMAP_WIRED : 0)) != 0) {
2178 1.166.2.2 uebayasi
2179 1.166.2.7 uebayasi if (uvm_pageisdirect_p(pg)) {
2180 1.166.2.6 uebayasi /* Device pages never involve paging activity. */
2181 1.166.2.3 uebayasi goto uvm_fault_lower_enter_error_done;
2182 1.166.2.6 uebayasi }
2183 1.166.2.3 uebayasi
2184 1.166.2.2 uebayasi /*
2185 1.166.2.2 uebayasi * No need to undo what we did; we can simply think of
2186 1.166.2.2 uebayasi * this as the pmap throwing away the mapping information.
2187 1.166.2.2 uebayasi *
2188 1.166.2.2 uebayasi * We do, however, have to go through the ReFault path,
2189 1.166.2.2 uebayasi * as the map may change while we're asleep.
2190 1.166.2.2 uebayasi */
2191 1.166.2.2 uebayasi
2192 1.166.2.2 uebayasi if (pg->flags & PG_WANTED)
2193 1.166.2.2 uebayasi wakeup(pg);
2194 1.166.2.2 uebayasi
2195 1.166.2.2 uebayasi /*
2196 1.166.2.2 uebayasi * note that pg can't be PG_RELEASED since we did not drop
2197 1.166.2.2 uebayasi * the object lock since the last time we checked.
2198 1.166.2.2 uebayasi */
2199 1.166.2.2 uebayasi KASSERT((pg->flags & PG_RELEASED) == 0);
2200 1.166.2.2 uebayasi
2201 1.166.2.13 uebayasi uvm_fault_lower_enter_error_done:
2202 1.166.2.2 uebayasi pg->flags &= ~(PG_BUSY|PG_FAKE|PG_WANTED);
2203 1.166.2.2 uebayasi UVM_PAGE_OWN(pg, NULL);
2204 1.166.2.2 uebayasi uvmfault_unlockall(ufi, amap, uobj, anon);
2205 1.166.2.2 uebayasi if (!uvm_reclaimable()) {
2206 1.166.2.2 uebayasi UVMHIST_LOG(maphist,
2207 1.166.2.2 uebayasi "<- failed. out of VM",0,0,0,0);
2208 1.166.2.2 uebayasi /* XXX instrumentation */
2209 1.166.2.2 uebayasi error = ENOMEM;
2210 1.166.2.2 uebayasi return error;
2211 1.166.2.2 uebayasi }
2212 1.166.2.2 uebayasi /* XXX instrumentation */
2213 1.166.2.2 uebayasi uvm_wait("flt_pmfail2");
2214 1.166.2.2 uebayasi return ERESTART;
2215 1.166.2.2 uebayasi }
2216 1.166.2.2 uebayasi
2217 1.166.2.7 uebayasi if (!uvm_pageisdirect_p(pg))
2218 1.166.2.5 uebayasi uvm_fault_lower_done(ufi, flt, uobj, anon, pg);
2219 1.166.2.5 uebayasi
2220 1.166.2.13 uebayasi pg->flags &= ~(PG_BUSY|PG_FAKE|PG_WANTED);
2221 1.166.2.13 uebayasi UVM_PAGE_OWN(pg, NULL);
2222 1.166.2.13 uebayasi
2223 1.166.2.5 uebayasi uvmfault_unlockall(ufi, amap, uobj, anon);
2224 1.166.2.5 uebayasi pmap_update(ufi->orig_map->pmap);
2225 1.166.2.5 uebayasi UVMHIST_LOG(maphist, "<- done (SUCCESS!)",0,0,0,0);
2226 1.166.2.5 uebayasi return 0;
2227 1.166.2.2 uebayasi }
2228 1.166.2.2 uebayasi
2229 1.166.2.5 uebayasi /*
2230 1.166.2.5 uebayasi * uvm_fault_lower_done: queue lower center page.
2231 1.166.2.5 uebayasi */
2232 1.166.2.5 uebayasi
2233 1.166.2.5 uebayasi void
2234 1.166.2.2 uebayasi uvm_fault_lower_done(
2235 1.166.2.2 uebayasi struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
2236 1.166.2.2 uebayasi struct uvm_object *uobj, struct vm_anon *anon, struct vm_page *pg)
2237 1.166.2.2 uebayasi {
2238 1.166.2.2 uebayasi UVMHIST_FUNC("uvm_fault_lower_done"); UVMHIST_CALLED(maphist);
2239 1.166.2.2 uebayasi
2240 1.166.2.2 uebayasi mutex_enter(&uvm_pageqlock);
2241 1.166.2.2 uebayasi if (flt->wire_paging) {
2242 1.166.2.2 uebayasi uvm_pagewire(pg);
2243 1.166.2.2 uebayasi if (pg->pqflags & PQ_AOBJ) {
2244 1.166.2.2 uebayasi
2245 1.166.2.2 uebayasi /*
2246 1.166.2.2 uebayasi * since the now-wired page cannot be paged out,
2247 1.166.2.2 uebayasi * release its swap resources for others to use.
2248 1.166.2.2 uebayasi * since an aobj page with no swap cannot be PG_CLEAN,
2249 1.166.2.2 uebayasi * clear its clean flag now.
2250 1.166.2.2 uebayasi */
2251 1.166.2.2 uebayasi
2252 1.166.2.2 uebayasi KASSERT(uobj != NULL);
2253 1.166.2.2 uebayasi pg->flags &= ~(PG_CLEAN);
2254 1.166.2.2 uebayasi uao_dropswap(uobj, pg->offset >> PAGE_SHIFT);
2255 1.166.2.2 uebayasi }
2256 1.166.2.2 uebayasi } else {
2257 1.166.2.2 uebayasi uvm_pageactivate(pg);
2258 1.166.2.2 uebayasi }
2259 1.166.2.2 uebayasi mutex_exit(&uvm_pageqlock);
2260 1.166.2.5 uebayasi
2261 1.166.2.2 uebayasi if (pg->flags & PG_WANTED)
2262 1.166.2.2 uebayasi wakeup(pg);
2263 1.166.2.2 uebayasi
2264 1.166.2.2 uebayasi /*
2265 1.166.2.2 uebayasi * note that pg can't be PG_RELEASED since we did not drop the object
2266 1.166.2.2 uebayasi * lock since the last time we checked.
2267 1.166.2.2 uebayasi */
2268 1.166.2.2 uebayasi KASSERT((pg->flags & PG_RELEASED) == 0);
2269 1.166.2.2 uebayasi }
2270 1.166.2.2 uebayasi
2271 1.166.2.2 uebayasi
2272 1.166.2.2 uebayasi /*
2273 1.166.2.2 uebayasi * uvm_fault_wire: wire down a range of virtual addresses in a map.
2274 1.166.2.2 uebayasi *
2275 1.166.2.2 uebayasi * => map may be read-locked by caller, but MUST NOT be write-locked.
2276 1.166.2.2 uebayasi * => if map is read-locked, any operations which may cause map to
2277 1.166.2.2 uebayasi * be write-locked in uvm_fault() must be taken care of by
2278 1.166.2.2 uebayasi * the caller. See uvm_map_pageable().
2279 1.166.2.2 uebayasi */
2280 1.166.2.2 uebayasi
2281 1.166.2.2 uebayasi int
2282 1.166.2.2 uebayasi uvm_fault_wire(struct vm_map *map, vaddr_t start, vaddr_t end,
2283 1.166.2.2 uebayasi vm_prot_t access_type, int maxprot)
2284 1.166.2.2 uebayasi {
2285 1.166.2.2 uebayasi vaddr_t va;
2286 1.166.2.2 uebayasi int error;
2287 1.166.2.2 uebayasi
2288 1.166.2.2 uebayasi /*
2289 1.166.2.2 uebayasi * now fault it in a page at a time. if the fault fails then we have
2290 1.166.2.2 uebayasi * to undo what we have done. note that in uvm_fault VM_PROT_NONE
2291 1.166.2.2 uebayasi * is replaced with the max protection if fault_type is VM_FAULT_WIRE.
2292 1.166.2.2 uebayasi */
2293 1.166.2.2 uebayasi
2294 1.166.2.2 uebayasi /*
2295 1.166.2.2 uebayasi * XXX work around overflowing a vaddr_t. this prevents us from
2296 1.166.2.2 uebayasi * wiring the last page in the address space, though.
2297 1.166.2.2 uebayasi */
2298 1.166.2.2 uebayasi if (start > end) {
2299 1.166.2.2 uebayasi return EFAULT;
2300 1.166.2.2 uebayasi }
2301 1.166.2.2 uebayasi
2302 1.166.2.2 uebayasi for (va = start; va < end; va += PAGE_SIZE) {
2303 1.166.2.2 uebayasi error = uvm_fault_internal(map, va, access_type,
2304 1.166.2.2 uebayasi (maxprot ? UVM_FAULT_MAXPROT : 0) | UVM_FAULT_WIRE);
2305 1.166.2.2 uebayasi if (error) {
2306 1.166.2.2 uebayasi if (va != start) {
2307 1.166.2.2 uebayasi uvm_fault_unwire(map, start, va);
2308 1.166.2.2 uebayasi }
2309 1.166.2.2 uebayasi return error;
2310 1.166.2.2 uebayasi }
2311 1.166.2.2 uebayasi }
2312 1.166.2.2 uebayasi return 0;
2313 1.166.2.2 uebayasi }
2314 1.166.2.2 uebayasi
2315 1.166.2.2 uebayasi /*
2316 1.166.2.2 uebayasi * uvm_fault_unwire(): unwire range of virtual space.
2317 1.166.2.2 uebayasi */
2318 1.166.2.2 uebayasi
2319 1.166.2.2 uebayasi void
2320 1.166.2.2 uebayasi uvm_fault_unwire(struct vm_map *map, vaddr_t start, vaddr_t end)
2321 1.166.2.2 uebayasi {
2322 1.166.2.2 uebayasi vm_map_lock_read(map);
2323 1.166.2.2 uebayasi uvm_fault_unwire_locked(map, start, end);
2324 1.166.2.2 uebayasi vm_map_unlock_read(map);
2325 1.166.2.2 uebayasi }
2326 1.166.2.2 uebayasi
2327 1.166.2.2 uebayasi /*
2328 1.166.2.2 uebayasi * uvm_fault_unwire_locked(): the guts of uvm_fault_unwire().
2329 1.166.2.2 uebayasi *
2330 1.166.2.2 uebayasi * => map must be at least read-locked.
2331 1.166.2.2 uebayasi */
2332 1.166.2.2 uebayasi
2333 1.166.2.2 uebayasi void
2334 1.166.2.2 uebayasi uvm_fault_unwire_locked(struct vm_map *map, vaddr_t start, vaddr_t end)
2335 1.166.2.2 uebayasi {
2336 1.166.2.2 uebayasi struct vm_map_entry *entry;
2337 1.166.2.2 uebayasi pmap_t pmap = vm_map_pmap(map);
2338 1.166.2.2 uebayasi vaddr_t va;
2339 1.166.2.2 uebayasi paddr_t pa;
2340 1.166.2.2 uebayasi struct vm_page *pg;
2341 1.166.2.2 uebayasi
2342 1.166.2.2 uebayasi KASSERT((map->flags & VM_MAP_INTRSAFE) == 0);
2343 1.166.2.2 uebayasi
2344 1.166.2.2 uebayasi /*
2345 1.166.2.2 uebayasi * we assume that the area we are unwiring has actually been wired
2346 1.166.2.2 uebayasi * in the first place. this means that we should be able to extract
2347 1.166.2.2 uebayasi * the PAs from the pmap. we also lock out the page daemon so that
2348 1.166.2.2 uebayasi * we can call uvm_pageunwire.
2349 1.166.2.2 uebayasi */
2350 1.166.2.2 uebayasi
2351 1.166.2.2 uebayasi mutex_enter(&uvm_pageqlock);
2352 1.166.2.2 uebayasi
2353 1.166.2.2 uebayasi /*
2354 1.166.2.2 uebayasi * find the beginning map entry for the region.
2355 1.166.2.2 uebayasi */
2356 1.166.2.2 uebayasi
2357 1.166.2.2 uebayasi KASSERT(start >= vm_map_min(map) && end <= vm_map_max(map));
2358 1.166.2.2 uebayasi if (uvm_map_lookup_entry(map, start, &entry) == false)
2359 1.166.2.2 uebayasi panic("uvm_fault_unwire_locked: address not in map");
2360 1.166.2.2 uebayasi
2361 1.166.2.2 uebayasi for (va = start; va < end; va += PAGE_SIZE) {
2362 1.166.2.2 uebayasi if (pmap_extract(pmap, va, &pa) == false)
2363 1.166.2.2 uebayasi continue;
2364 1.166.2.2 uebayasi
2365 1.166.2.2 uebayasi /*
2366 1.166.2.2 uebayasi * find the map entry for the current address.
2367 1.166.2.2 uebayasi */
2368 1.166.2.2 uebayasi
2369 1.166.2.2 uebayasi KASSERT(va >= entry->start);
2370 1.166.2.2 uebayasi while (va >= entry->end) {
2371 1.166.2.2 uebayasi KASSERT(entry->next != &map->header &&
2372 1.166.2.2 uebayasi entry->next->start <= entry->end);
2373 1.166.2.2 uebayasi entry = entry->next;
2374 1.166.2.2 uebayasi }
2375 1.166.2.2 uebayasi
2376 1.166.2.2 uebayasi /*
2377 1.166.2.2 uebayasi * if the entry is no longer wired, tell the pmap.
2378 1.166.2.2 uebayasi */
2379 1.166.2.2 uebayasi
2380 1.166.2.2 uebayasi if (VM_MAPENT_ISWIRED(entry) == 0)
2381 1.166.2.2 uebayasi pmap_unwire(pmap, va);
2382 1.166.2.2 uebayasi
2383 1.166.2.2 uebayasi pg = PHYS_TO_VM_PAGE(pa);
2384 1.166.2.2 uebayasi if (pg)
2385 1.166.2.2 uebayasi uvm_pageunwire(pg);
2386 1.166.2.2 uebayasi }
2387 1.166.2.2 uebayasi
2388 1.166.2.2 uebayasi mutex_exit(&uvm_pageqlock);
2389 1.166.2.2 uebayasi }
2390