Home | History | Annotate | Line # | Download | only in uvm
uvm_fault.c revision 1.166.2.13
      1  1.166.2.13  uebayasi /*	$NetBSD: uvm_fault.c,v 1.166.2.13 2010/07/09 12:49:21 uebayasi Exp $	*/
      2   1.166.2.2  uebayasi 
      3   1.166.2.2  uebayasi /*
      4   1.166.2.2  uebayasi  *
      5   1.166.2.2  uebayasi  * Copyright (c) 1997 Charles D. Cranor and Washington University.
      6   1.166.2.2  uebayasi  * All rights reserved.
      7   1.166.2.2  uebayasi  *
      8   1.166.2.2  uebayasi  * Redistribution and use in source and binary forms, with or without
      9   1.166.2.2  uebayasi  * modification, are permitted provided that the following conditions
     10   1.166.2.2  uebayasi  * are met:
     11   1.166.2.2  uebayasi  * 1. Redistributions of source code must retain the above copyright
     12   1.166.2.2  uebayasi  *    notice, this list of conditions and the following disclaimer.
     13   1.166.2.2  uebayasi  * 2. Redistributions in binary form must reproduce the above copyright
     14   1.166.2.2  uebayasi  *    notice, this list of conditions and the following disclaimer in the
     15   1.166.2.2  uebayasi  *    documentation and/or other materials provided with the distribution.
     16   1.166.2.2  uebayasi  * 3. All advertising materials mentioning features or use of this software
     17   1.166.2.2  uebayasi  *    must display the following acknowledgement:
     18   1.166.2.2  uebayasi  *      This product includes software developed by Charles D. Cranor and
     19   1.166.2.2  uebayasi  *      Washington University.
     20   1.166.2.2  uebayasi  * 4. The name of the author may not be used to endorse or promote products
     21   1.166.2.2  uebayasi  *    derived from this software without specific prior written permission.
     22   1.166.2.2  uebayasi  *
     23   1.166.2.2  uebayasi  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
     24   1.166.2.2  uebayasi  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
     25   1.166.2.2  uebayasi  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     26   1.166.2.2  uebayasi  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
     27   1.166.2.2  uebayasi  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
     28   1.166.2.2  uebayasi  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
     29   1.166.2.2  uebayasi  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
     30   1.166.2.2  uebayasi  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
     31   1.166.2.2  uebayasi  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
     32   1.166.2.2  uebayasi  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     33   1.166.2.2  uebayasi  *
     34   1.166.2.2  uebayasi  * from: Id: uvm_fault.c,v 1.1.2.23 1998/02/06 05:29:05 chs Exp
     35   1.166.2.2  uebayasi  */
     36   1.166.2.2  uebayasi 
     37   1.166.2.2  uebayasi /*
     38   1.166.2.2  uebayasi  * uvm_fault.c: fault handler
     39   1.166.2.2  uebayasi  */
     40   1.166.2.2  uebayasi 
     41   1.166.2.2  uebayasi #include <sys/cdefs.h>
     42  1.166.2.13  uebayasi __KERNEL_RCSID(0, "$NetBSD: uvm_fault.c,v 1.166.2.13 2010/07/09 12:49:21 uebayasi Exp $");
     43   1.166.2.2  uebayasi 
     44   1.166.2.2  uebayasi #include "opt_uvmhist.h"
     45   1.166.2.3  uebayasi #include "opt_xip.h"
     46   1.166.2.2  uebayasi 
     47   1.166.2.2  uebayasi #include <sys/param.h>
     48   1.166.2.2  uebayasi #include <sys/systm.h>
     49   1.166.2.2  uebayasi #include <sys/kernel.h>
     50   1.166.2.2  uebayasi #include <sys/proc.h>
     51   1.166.2.2  uebayasi #include <sys/malloc.h>
     52   1.166.2.2  uebayasi #include <sys/mman.h>
     53   1.166.2.2  uebayasi 
     54   1.166.2.2  uebayasi #include <uvm/uvm.h>
     55   1.166.2.2  uebayasi 
     56   1.166.2.2  uebayasi /*
     57   1.166.2.2  uebayasi  *
     58   1.166.2.2  uebayasi  * a word on page faults:
     59   1.166.2.2  uebayasi  *
     60   1.166.2.2  uebayasi  * types of page faults we handle:
     61   1.166.2.2  uebayasi  *
     62   1.166.2.2  uebayasi  * CASE 1: upper layer faults                   CASE 2: lower layer faults
     63   1.166.2.2  uebayasi  *
     64   1.166.2.2  uebayasi  *    CASE 1A         CASE 1B                  CASE 2A        CASE 2B
     65   1.166.2.2  uebayasi  *    read/write1     write>1                  read/write   +-cow_write/zero
     66   1.166.2.2  uebayasi  *         |             |                         |        |
     67   1.166.2.2  uebayasi  *      +--|--+       +--|--+     +-----+       +  |  +     | +-----+
     68   1.166.2.2  uebayasi  * amap |  V  |       |  ---------> new |          |        | |  ^  |
     69   1.166.2.2  uebayasi  *      +-----+       +-----+     +-----+       +  |  +     | +--|--+
     70   1.166.2.2  uebayasi  *                                                 |        |    |
     71   1.166.2.2  uebayasi  *      +-----+       +-----+                   +--|--+     | +--|--+
     72   1.166.2.2  uebayasi  * uobj | d/c |       | d/c |                   |  V  |     +----+  |
     73   1.166.2.2  uebayasi  *      +-----+       +-----+                   +-----+       +-----+
     74   1.166.2.2  uebayasi  *
     75   1.166.2.2  uebayasi  * d/c = don't care
     76   1.166.2.2  uebayasi  *
     77   1.166.2.2  uebayasi  *   case [0]: layerless fault
     78   1.166.2.2  uebayasi  *	no amap or uobj is present.   this is an error.
     79   1.166.2.2  uebayasi  *
     80   1.166.2.2  uebayasi  *   case [1]: upper layer fault [anon active]
     81   1.166.2.2  uebayasi  *     1A: [read] or [write with anon->an_ref == 1]
     82   1.166.2.2  uebayasi  *		I/O takes place in upper level anon and uobj is not touched.
     83   1.166.2.2  uebayasi  *     1B: [write with anon->an_ref > 1]
     84   1.166.2.2  uebayasi  *		new anon is alloc'd and data is copied off ["COW"]
     85   1.166.2.2  uebayasi  *
     86   1.166.2.2  uebayasi  *   case [2]: lower layer fault [uobj]
     87   1.166.2.2  uebayasi  *     2A: [read on non-NULL uobj] or [write to non-copy_on_write area]
     88   1.166.2.2  uebayasi  *		I/O takes place directly in object.
     89   1.166.2.2  uebayasi  *     2B: [write to copy_on_write] or [read on NULL uobj]
     90   1.166.2.2  uebayasi  *		data is "promoted" from uobj to a new anon.
     91   1.166.2.2  uebayasi  *		if uobj is null, then we zero fill.
     92   1.166.2.2  uebayasi  *
     93   1.166.2.2  uebayasi  * we follow the standard UVM locking protocol ordering:
     94   1.166.2.2  uebayasi  *
     95   1.166.2.2  uebayasi  * MAPS => AMAP => UOBJ => ANON => PAGE QUEUES (PQ)
     96   1.166.2.2  uebayasi  * we hold a PG_BUSY page if we unlock for I/O
     97   1.166.2.2  uebayasi  *
     98   1.166.2.2  uebayasi  *
     99   1.166.2.2  uebayasi  * the code is structured as follows:
    100   1.166.2.2  uebayasi  *
    101   1.166.2.2  uebayasi  *     - init the "IN" params in the ufi structure
    102   1.166.2.2  uebayasi  *   ReFault:
    103   1.166.2.2  uebayasi  *     - do lookups [locks maps], check protection, handle needs_copy
    104   1.166.2.2  uebayasi  *     - check for case 0 fault (error)
    105   1.166.2.2  uebayasi  *     - establish "range" of fault
    106   1.166.2.2  uebayasi  *     - if we have an amap lock it and extract the anons
    107   1.166.2.2  uebayasi  *     - if sequential advice deactivate pages behind us
    108   1.166.2.2  uebayasi  *     - at the same time check pmap for unmapped areas and anon for pages
    109   1.166.2.2  uebayasi  *	 that we could map in (and do map it if found)
    110   1.166.2.2  uebayasi  *     - check object for resident pages that we could map in
    111   1.166.2.2  uebayasi  *     - if (case 2) goto Case2
    112   1.166.2.2  uebayasi  *     - >>> handle case 1
    113   1.166.2.2  uebayasi  *           - ensure source anon is resident in RAM
    114   1.166.2.2  uebayasi  *           - if case 1B alloc new anon and copy from source
    115   1.166.2.2  uebayasi  *           - map the correct page in
    116   1.166.2.2  uebayasi  *   Case2:
    117   1.166.2.2  uebayasi  *     - >>> handle case 2
    118   1.166.2.2  uebayasi  *           - ensure source page is resident (if uobj)
    119   1.166.2.2  uebayasi  *           - if case 2B alloc new anon and copy from source (could be zero
    120   1.166.2.2  uebayasi  *		fill if uobj == NULL)
    121   1.166.2.2  uebayasi  *           - map the correct page in
    122   1.166.2.2  uebayasi  *     - done!
    123   1.166.2.2  uebayasi  *
    124   1.166.2.2  uebayasi  * note on paging:
    125   1.166.2.2  uebayasi  *   if we have to do I/O we place a PG_BUSY page in the correct object,
    126   1.166.2.2  uebayasi  * unlock everything, and do the I/O.   when I/O is done we must reverify
    127   1.166.2.2  uebayasi  * the state of the world before assuming that our data structures are
    128   1.166.2.2  uebayasi  * valid.   [because mappings could change while the map is unlocked]
    129   1.166.2.2  uebayasi  *
    130   1.166.2.2  uebayasi  *  alternative 1: unbusy the page in question and restart the page fault
    131   1.166.2.2  uebayasi  *    from the top (ReFault).   this is easy but does not take advantage
    132   1.166.2.2  uebayasi  *    of the information that we already have from our previous lookup,
    133   1.166.2.2  uebayasi  *    although it is possible that the "hints" in the vm_map will help here.
    134   1.166.2.2  uebayasi  *
    135   1.166.2.2  uebayasi  * alternative 2: the system already keeps track of a "version" number of
    136   1.166.2.2  uebayasi  *    a map.   [i.e. every time you write-lock a map (e.g. to change a
    137   1.166.2.2  uebayasi  *    mapping) you bump the version number up by one...]   so, we can save
    138   1.166.2.2  uebayasi  *    the version number of the map before we release the lock and start I/O.
    139   1.166.2.2  uebayasi  *    then when I/O is done we can relock and check the version numbers
    140   1.166.2.2  uebayasi  *    to see if anything changed.    this might save us some over 1 because
    141   1.166.2.2  uebayasi  *    we don't have to unbusy the page and may be less compares(?).
    142   1.166.2.2  uebayasi  *
    143   1.166.2.2  uebayasi  * alternative 3: put in backpointers or a way to "hold" part of a map
    144   1.166.2.2  uebayasi  *    in place while I/O is in progress.   this could be complex to
    145   1.166.2.2  uebayasi  *    implement (especially with structures like amap that can be referenced
    146   1.166.2.2  uebayasi  *    by multiple map entries, and figuring out what should wait could be
    147   1.166.2.2  uebayasi  *    complex as well...).
    148   1.166.2.2  uebayasi  *
    149   1.166.2.2  uebayasi  * we use alternative 2.  given that we are multi-threaded now we may want
    150   1.166.2.2  uebayasi  * to reconsider the choice.
    151   1.166.2.2  uebayasi  */
    152   1.166.2.2  uebayasi 
    153   1.166.2.2  uebayasi /*
    154   1.166.2.2  uebayasi  * local data structures
    155   1.166.2.2  uebayasi  */
    156   1.166.2.2  uebayasi 
    157   1.166.2.2  uebayasi struct uvm_advice {
    158   1.166.2.2  uebayasi 	int advice;
    159   1.166.2.2  uebayasi 	int nback;
    160   1.166.2.2  uebayasi 	int nforw;
    161   1.166.2.2  uebayasi };
    162   1.166.2.2  uebayasi 
    163   1.166.2.2  uebayasi /*
    164   1.166.2.2  uebayasi  * page range array:
    165   1.166.2.2  uebayasi  * note: index in array must match "advice" value
    166   1.166.2.2  uebayasi  * XXX: borrowed numbers from freebsd.   do they work well for us?
    167   1.166.2.2  uebayasi  */
    168   1.166.2.2  uebayasi 
    169   1.166.2.2  uebayasi static const struct uvm_advice uvmadvice[] = {
    170   1.166.2.2  uebayasi 	{ MADV_NORMAL, 3, 4 },
    171   1.166.2.2  uebayasi 	{ MADV_RANDOM, 0, 0 },
    172   1.166.2.2  uebayasi 	{ MADV_SEQUENTIAL, 8, 7},
    173   1.166.2.2  uebayasi };
    174   1.166.2.2  uebayasi 
    175   1.166.2.2  uebayasi #define UVM_MAXRANGE 16	/* must be MAX() of nback+nforw+1 */
    176   1.166.2.2  uebayasi 
    177   1.166.2.2  uebayasi /*
    178   1.166.2.2  uebayasi  * private prototypes
    179   1.166.2.2  uebayasi  */
    180   1.166.2.2  uebayasi 
    181   1.166.2.2  uebayasi /*
    182   1.166.2.2  uebayasi  * inline functions
    183   1.166.2.2  uebayasi  */
    184   1.166.2.2  uebayasi 
    185   1.166.2.2  uebayasi /*
    186   1.166.2.2  uebayasi  * uvmfault_anonflush: try and deactivate pages in specified anons
    187   1.166.2.2  uebayasi  *
    188   1.166.2.2  uebayasi  * => does not have to deactivate page if it is busy
    189   1.166.2.2  uebayasi  */
    190   1.166.2.2  uebayasi 
    191   1.166.2.2  uebayasi static inline void
    192   1.166.2.2  uebayasi uvmfault_anonflush(struct vm_anon **anons, int n)
    193   1.166.2.2  uebayasi {
    194   1.166.2.2  uebayasi 	int lcv;
    195   1.166.2.2  uebayasi 	struct vm_page *pg;
    196   1.166.2.2  uebayasi 
    197   1.166.2.2  uebayasi 	for (lcv = 0; lcv < n; lcv++) {
    198   1.166.2.2  uebayasi 		if (anons[lcv] == NULL)
    199   1.166.2.2  uebayasi 			continue;
    200   1.166.2.2  uebayasi 		mutex_enter(&anons[lcv]->an_lock);
    201   1.166.2.2  uebayasi 		pg = anons[lcv]->an_page;
    202   1.166.2.2  uebayasi 		if (pg && (pg->flags & PG_BUSY) == 0) {
    203   1.166.2.2  uebayasi 			mutex_enter(&uvm_pageqlock);
    204   1.166.2.2  uebayasi 			if (pg->wire_count == 0) {
    205   1.166.2.2  uebayasi 				uvm_pagedeactivate(pg);
    206   1.166.2.2  uebayasi 			}
    207   1.166.2.2  uebayasi 			mutex_exit(&uvm_pageqlock);
    208   1.166.2.2  uebayasi 		}
    209   1.166.2.2  uebayasi 		mutex_exit(&anons[lcv]->an_lock);
    210   1.166.2.2  uebayasi 	}
    211   1.166.2.2  uebayasi }
    212   1.166.2.2  uebayasi 
    213   1.166.2.2  uebayasi /*
    214   1.166.2.2  uebayasi  * normal functions
    215   1.166.2.2  uebayasi  */
    216   1.166.2.2  uebayasi 
    217   1.166.2.2  uebayasi /*
    218   1.166.2.2  uebayasi  * uvmfault_amapcopy: clear "needs_copy" in a map.
    219   1.166.2.2  uebayasi  *
    220   1.166.2.2  uebayasi  * => called with VM data structures unlocked (usually, see below)
    221   1.166.2.2  uebayasi  * => we get a write lock on the maps and clear needs_copy for a VA
    222   1.166.2.2  uebayasi  * => if we are out of RAM we sleep (waiting for more)
    223   1.166.2.2  uebayasi  */
    224   1.166.2.2  uebayasi 
    225   1.166.2.2  uebayasi static void
    226   1.166.2.2  uebayasi uvmfault_amapcopy(struct uvm_faultinfo *ufi)
    227   1.166.2.2  uebayasi {
    228   1.166.2.2  uebayasi 	for (;;) {
    229   1.166.2.2  uebayasi 
    230   1.166.2.2  uebayasi 		/*
    231   1.166.2.2  uebayasi 		 * no mapping?  give up.
    232   1.166.2.2  uebayasi 		 */
    233   1.166.2.2  uebayasi 
    234   1.166.2.2  uebayasi 		if (uvmfault_lookup(ufi, true) == false)
    235   1.166.2.2  uebayasi 			return;
    236   1.166.2.2  uebayasi 
    237   1.166.2.2  uebayasi 		/*
    238   1.166.2.2  uebayasi 		 * copy if needed.
    239   1.166.2.2  uebayasi 		 */
    240   1.166.2.2  uebayasi 
    241   1.166.2.2  uebayasi 		if (UVM_ET_ISNEEDSCOPY(ufi->entry))
    242   1.166.2.2  uebayasi 			amap_copy(ufi->map, ufi->entry, AMAP_COPY_NOWAIT,
    243   1.166.2.2  uebayasi 				ufi->orig_rvaddr, ufi->orig_rvaddr + 1);
    244   1.166.2.2  uebayasi 
    245   1.166.2.2  uebayasi 		/*
    246   1.166.2.2  uebayasi 		 * didn't work?  must be out of RAM.   unlock and sleep.
    247   1.166.2.2  uebayasi 		 */
    248   1.166.2.2  uebayasi 
    249   1.166.2.2  uebayasi 		if (UVM_ET_ISNEEDSCOPY(ufi->entry)) {
    250   1.166.2.2  uebayasi 			uvmfault_unlockmaps(ufi, true);
    251   1.166.2.2  uebayasi 			uvm_wait("fltamapcopy");
    252   1.166.2.2  uebayasi 			continue;
    253   1.166.2.2  uebayasi 		}
    254   1.166.2.2  uebayasi 
    255   1.166.2.2  uebayasi 		/*
    256   1.166.2.2  uebayasi 		 * got it!   unlock and return.
    257   1.166.2.2  uebayasi 		 */
    258   1.166.2.2  uebayasi 
    259   1.166.2.2  uebayasi 		uvmfault_unlockmaps(ufi, true);
    260   1.166.2.2  uebayasi 		return;
    261   1.166.2.2  uebayasi 	}
    262   1.166.2.2  uebayasi 	/*NOTREACHED*/
    263   1.166.2.2  uebayasi }
    264   1.166.2.2  uebayasi 
    265   1.166.2.2  uebayasi /*
    266   1.166.2.2  uebayasi  * uvmfault_anonget: get data in an anon into a non-busy, non-released
    267   1.166.2.2  uebayasi  * page in that anon.
    268   1.166.2.2  uebayasi  *
    269   1.166.2.2  uebayasi  * => maps, amap, and anon locked by caller.
    270   1.166.2.2  uebayasi  * => if we fail (result != 0) we unlock everything.
    271   1.166.2.2  uebayasi  * => if we are successful, we return with everything still locked.
    272   1.166.2.2  uebayasi  * => we don't move the page on the queues [gets moved later]
    273   1.166.2.2  uebayasi  * => if we allocate a new page [we_own], it gets put on the queues.
    274   1.166.2.2  uebayasi  *    either way, the result is that the page is on the queues at return time
    275   1.166.2.2  uebayasi  * => for pages which are on loan from a uvm_object (and thus are not
    276   1.166.2.2  uebayasi  *    owned by the anon): if successful, we return with the owning object
    277   1.166.2.2  uebayasi  *    locked.   the caller must unlock this object when it unlocks everything
    278   1.166.2.2  uebayasi  *    else.
    279   1.166.2.2  uebayasi  */
    280   1.166.2.2  uebayasi 
    281   1.166.2.2  uebayasi int
    282   1.166.2.2  uebayasi uvmfault_anonget(struct uvm_faultinfo *ufi, struct vm_amap *amap,
    283   1.166.2.2  uebayasi     struct vm_anon *anon)
    284   1.166.2.2  uebayasi {
    285   1.166.2.2  uebayasi 	bool we_own;	/* we own anon's page? */
    286   1.166.2.2  uebayasi 	bool locked;	/* did we relock? */
    287   1.166.2.2  uebayasi 	struct vm_page *pg;
    288   1.166.2.2  uebayasi 	int error;
    289   1.166.2.2  uebayasi 	UVMHIST_FUNC("uvmfault_anonget"); UVMHIST_CALLED(maphist);
    290   1.166.2.2  uebayasi 
    291   1.166.2.2  uebayasi 	KASSERT(mutex_owned(&anon->an_lock));
    292   1.166.2.2  uebayasi 
    293   1.166.2.2  uebayasi 	error = 0;
    294   1.166.2.2  uebayasi 	uvmexp.fltanget++;
    295   1.166.2.2  uebayasi         /* bump rusage counters */
    296   1.166.2.2  uebayasi 	if (anon->an_page)
    297   1.166.2.2  uebayasi 		curlwp->l_ru.ru_minflt++;
    298   1.166.2.2  uebayasi 	else
    299   1.166.2.2  uebayasi 		curlwp->l_ru.ru_majflt++;
    300   1.166.2.2  uebayasi 
    301   1.166.2.2  uebayasi 	/*
    302   1.166.2.2  uebayasi 	 * loop until we get it, or fail.
    303   1.166.2.2  uebayasi 	 */
    304   1.166.2.2  uebayasi 
    305   1.166.2.2  uebayasi 	for (;;) {
    306   1.166.2.2  uebayasi 		we_own = false;		/* true if we set PG_BUSY on a page */
    307   1.166.2.2  uebayasi 		pg = anon->an_page;
    308   1.166.2.2  uebayasi 
    309   1.166.2.2  uebayasi 		/*
    310   1.166.2.2  uebayasi 		 * if there is a resident page and it is loaned, then anon
    311   1.166.2.2  uebayasi 		 * may not own it.   call out to uvm_anon_lockpage() to ensure
    312   1.166.2.2  uebayasi 		 * the real owner of the page has been identified and locked.
    313   1.166.2.2  uebayasi 		 */
    314   1.166.2.2  uebayasi 
    315   1.166.2.2  uebayasi 		if (pg && pg->loan_count)
    316   1.166.2.2  uebayasi 			pg = uvm_anon_lockloanpg(anon);
    317   1.166.2.2  uebayasi 
    318   1.166.2.2  uebayasi 		/*
    319   1.166.2.2  uebayasi 		 * page there?   make sure it is not busy/released.
    320   1.166.2.2  uebayasi 		 */
    321   1.166.2.2  uebayasi 
    322   1.166.2.2  uebayasi 		if (pg) {
    323   1.166.2.2  uebayasi 
    324   1.166.2.2  uebayasi 			/*
    325   1.166.2.2  uebayasi 			 * at this point, if the page has a uobject [meaning
    326   1.166.2.2  uebayasi 			 * we have it on loan], then that uobject is locked
    327   1.166.2.2  uebayasi 			 * by us!   if the page is busy, we drop all the
    328   1.166.2.2  uebayasi 			 * locks (including uobject) and try again.
    329   1.166.2.2  uebayasi 			 */
    330   1.166.2.2  uebayasi 
    331   1.166.2.2  uebayasi 			if ((pg->flags & PG_BUSY) == 0) {
    332   1.166.2.2  uebayasi 				UVMHIST_LOG(maphist, "<- OK",0,0,0,0);
    333   1.166.2.2  uebayasi 				return (0);
    334   1.166.2.2  uebayasi 			}
    335   1.166.2.2  uebayasi 			pg->flags |= PG_WANTED;
    336   1.166.2.2  uebayasi 			uvmexp.fltpgwait++;
    337   1.166.2.2  uebayasi 
    338   1.166.2.2  uebayasi 			/*
    339   1.166.2.2  uebayasi 			 * the last unlock must be an atomic unlock+wait on
    340   1.166.2.2  uebayasi 			 * the owner of page
    341   1.166.2.2  uebayasi 			 */
    342   1.166.2.2  uebayasi 
    343   1.166.2.2  uebayasi 			if (pg->uobject) {	/* owner is uobject ? */
    344   1.166.2.2  uebayasi 				uvmfault_unlockall(ufi, amap, NULL, anon);
    345   1.166.2.2  uebayasi 				UVMHIST_LOG(maphist, " unlock+wait on uobj",0,
    346   1.166.2.2  uebayasi 				    0,0,0);
    347   1.166.2.2  uebayasi 				UVM_UNLOCK_AND_WAIT(pg,
    348   1.166.2.2  uebayasi 				    &pg->uobject->vmobjlock,
    349   1.166.2.2  uebayasi 				    false, "anonget1",0);
    350   1.166.2.2  uebayasi 			} else {
    351   1.166.2.2  uebayasi 				/* anon owns page */
    352   1.166.2.2  uebayasi 				uvmfault_unlockall(ufi, amap, NULL, NULL);
    353   1.166.2.2  uebayasi 				UVMHIST_LOG(maphist, " unlock+wait on anon",0,
    354   1.166.2.2  uebayasi 				    0,0,0);
    355   1.166.2.2  uebayasi 				UVM_UNLOCK_AND_WAIT(pg,&anon->an_lock,0,
    356   1.166.2.2  uebayasi 				    "anonget2",0);
    357   1.166.2.2  uebayasi 			}
    358   1.166.2.2  uebayasi 		} else {
    359   1.166.2.2  uebayasi #if defined(VMSWAP)
    360   1.166.2.2  uebayasi 
    361   1.166.2.2  uebayasi 			/*
    362   1.166.2.2  uebayasi 			 * no page, we must try and bring it in.
    363   1.166.2.2  uebayasi 			 */
    364   1.166.2.2  uebayasi 
    365   1.166.2.2  uebayasi 			pg = uvm_pagealloc(NULL, 0, anon, 0);
    366   1.166.2.2  uebayasi 			if (pg == NULL) {		/* out of RAM.  */
    367   1.166.2.2  uebayasi 				uvmfault_unlockall(ufi, amap, NULL, anon);
    368   1.166.2.2  uebayasi 				uvmexp.fltnoram++;
    369   1.166.2.2  uebayasi 				UVMHIST_LOG(maphist, "  noram -- UVM_WAIT",0,
    370   1.166.2.2  uebayasi 				    0,0,0);
    371   1.166.2.2  uebayasi 				if (!uvm_reclaimable()) {
    372   1.166.2.2  uebayasi 					return ENOMEM;
    373   1.166.2.2  uebayasi 				}
    374   1.166.2.2  uebayasi 				uvm_wait("flt_noram1");
    375   1.166.2.2  uebayasi 			} else {
    376   1.166.2.2  uebayasi 				/* we set the PG_BUSY bit */
    377   1.166.2.2  uebayasi 				we_own = true;
    378   1.166.2.2  uebayasi 				uvmfault_unlockall(ufi, amap, NULL, anon);
    379   1.166.2.2  uebayasi 
    380   1.166.2.2  uebayasi 				/*
    381   1.166.2.2  uebayasi 				 * we are passing a PG_BUSY+PG_FAKE+PG_CLEAN
    382   1.166.2.2  uebayasi 				 * page into the uvm_swap_get function with
    383   1.166.2.2  uebayasi 				 * all data structures unlocked.  note that
    384   1.166.2.2  uebayasi 				 * it is ok to read an_swslot here because
    385   1.166.2.2  uebayasi 				 * we hold PG_BUSY on the page.
    386   1.166.2.2  uebayasi 				 */
    387   1.166.2.2  uebayasi 				uvmexp.pageins++;
    388   1.166.2.2  uebayasi 				error = uvm_swap_get(pg, anon->an_swslot,
    389   1.166.2.2  uebayasi 				    PGO_SYNCIO);
    390   1.166.2.2  uebayasi 
    391   1.166.2.2  uebayasi 				/*
    392   1.166.2.2  uebayasi 				 * we clean up after the i/o below in the
    393   1.166.2.2  uebayasi 				 * "we_own" case
    394   1.166.2.2  uebayasi 				 */
    395   1.166.2.2  uebayasi 			}
    396   1.166.2.2  uebayasi #else /* defined(VMSWAP) */
    397   1.166.2.2  uebayasi 			panic("%s: no page", __func__);
    398   1.166.2.2  uebayasi #endif /* defined(VMSWAP) */
    399   1.166.2.2  uebayasi 		}
    400   1.166.2.2  uebayasi 
    401   1.166.2.2  uebayasi 		/*
    402   1.166.2.2  uebayasi 		 * now relock and try again
    403   1.166.2.2  uebayasi 		 */
    404   1.166.2.2  uebayasi 
    405   1.166.2.2  uebayasi 		locked = uvmfault_relock(ufi);
    406   1.166.2.2  uebayasi 		if (locked && amap != NULL) {
    407   1.166.2.2  uebayasi 			amap_lock(amap);
    408   1.166.2.2  uebayasi 		}
    409   1.166.2.2  uebayasi 		if (locked || we_own)
    410   1.166.2.2  uebayasi 			mutex_enter(&anon->an_lock);
    411   1.166.2.2  uebayasi 
    412   1.166.2.2  uebayasi 		/*
    413   1.166.2.2  uebayasi 		 * if we own the page (i.e. we set PG_BUSY), then we need
    414   1.166.2.2  uebayasi 		 * to clean up after the I/O. there are three cases to
    415   1.166.2.2  uebayasi 		 * consider:
    416   1.166.2.2  uebayasi 		 *   [1] page released during I/O: free anon and ReFault.
    417   1.166.2.2  uebayasi 		 *   [2] I/O not OK.   free the page and cause the fault
    418   1.166.2.2  uebayasi 		 *       to fail.
    419   1.166.2.2  uebayasi 		 *   [3] I/O OK!   activate the page and sync with the
    420   1.166.2.2  uebayasi 		 *       non-we_own case (i.e. drop anon lock if not locked).
    421   1.166.2.2  uebayasi 		 */
    422   1.166.2.2  uebayasi 
    423   1.166.2.2  uebayasi 		if (we_own) {
    424   1.166.2.2  uebayasi #if defined(VMSWAP)
    425   1.166.2.2  uebayasi 			if (pg->flags & PG_WANTED) {
    426   1.166.2.2  uebayasi 				wakeup(pg);
    427   1.166.2.2  uebayasi 			}
    428   1.166.2.2  uebayasi 			if (error) {
    429   1.166.2.2  uebayasi 
    430   1.166.2.2  uebayasi 				/*
    431   1.166.2.2  uebayasi 				 * remove the swap slot from the anon
    432   1.166.2.2  uebayasi 				 * and mark the anon as having no real slot.
    433   1.166.2.2  uebayasi 				 * don't free the swap slot, thus preventing
    434   1.166.2.2  uebayasi 				 * it from being used again.
    435   1.166.2.2  uebayasi 				 */
    436   1.166.2.2  uebayasi 
    437   1.166.2.2  uebayasi 				if (anon->an_swslot > 0)
    438   1.166.2.2  uebayasi 					uvm_swap_markbad(anon->an_swslot, 1);
    439   1.166.2.2  uebayasi 				anon->an_swslot = SWSLOT_BAD;
    440   1.166.2.2  uebayasi 
    441   1.166.2.2  uebayasi 				if ((pg->flags & PG_RELEASED) != 0)
    442   1.166.2.2  uebayasi 					goto released;
    443   1.166.2.2  uebayasi 
    444   1.166.2.2  uebayasi 				/*
    445   1.166.2.2  uebayasi 				 * note: page was never !PG_BUSY, so it
    446   1.166.2.2  uebayasi 				 * can't be mapped and thus no need to
    447   1.166.2.2  uebayasi 				 * pmap_page_protect it...
    448   1.166.2.2  uebayasi 				 */
    449   1.166.2.2  uebayasi 
    450   1.166.2.2  uebayasi 				mutex_enter(&uvm_pageqlock);
    451   1.166.2.2  uebayasi 				uvm_pagefree(pg);
    452   1.166.2.2  uebayasi 				mutex_exit(&uvm_pageqlock);
    453   1.166.2.2  uebayasi 
    454   1.166.2.2  uebayasi 				if (locked)
    455   1.166.2.2  uebayasi 					uvmfault_unlockall(ufi, amap, NULL,
    456   1.166.2.2  uebayasi 					    anon);
    457   1.166.2.2  uebayasi 				else
    458   1.166.2.2  uebayasi 					mutex_exit(&anon->an_lock);
    459   1.166.2.2  uebayasi 				UVMHIST_LOG(maphist, "<- ERROR", 0,0,0,0);
    460   1.166.2.2  uebayasi 				return error;
    461   1.166.2.2  uebayasi 			}
    462   1.166.2.2  uebayasi 
    463   1.166.2.2  uebayasi 			if ((pg->flags & PG_RELEASED) != 0) {
    464   1.166.2.2  uebayasi released:
    465   1.166.2.2  uebayasi 				KASSERT(anon->an_ref == 0);
    466   1.166.2.2  uebayasi 
    467   1.166.2.2  uebayasi 				/*
    468   1.166.2.2  uebayasi 				 * released while we unlocked amap.
    469   1.166.2.2  uebayasi 				 */
    470   1.166.2.2  uebayasi 
    471   1.166.2.2  uebayasi 				if (locked)
    472   1.166.2.2  uebayasi 					uvmfault_unlockall(ufi, amap, NULL,
    473   1.166.2.2  uebayasi 					    NULL);
    474   1.166.2.2  uebayasi 
    475   1.166.2.2  uebayasi 				uvm_anon_release(anon);
    476   1.166.2.2  uebayasi 
    477   1.166.2.2  uebayasi 				if (error) {
    478   1.166.2.2  uebayasi 					UVMHIST_LOG(maphist,
    479   1.166.2.2  uebayasi 					    "<- ERROR/RELEASED", 0,0,0,0);
    480   1.166.2.2  uebayasi 					return error;
    481   1.166.2.2  uebayasi 				}
    482   1.166.2.2  uebayasi 
    483   1.166.2.2  uebayasi 				UVMHIST_LOG(maphist, "<- RELEASED", 0,0,0,0);
    484   1.166.2.2  uebayasi 				return ERESTART;
    485   1.166.2.2  uebayasi 			}
    486   1.166.2.2  uebayasi 
    487   1.166.2.2  uebayasi 			/*
    488   1.166.2.2  uebayasi 			 * we've successfully read the page, activate it.
    489   1.166.2.2  uebayasi 			 */
    490   1.166.2.2  uebayasi 
    491   1.166.2.2  uebayasi 			mutex_enter(&uvm_pageqlock);
    492   1.166.2.2  uebayasi 			uvm_pageactivate(pg);
    493   1.166.2.2  uebayasi 			mutex_exit(&uvm_pageqlock);
    494   1.166.2.2  uebayasi 			pg->flags &= ~(PG_WANTED|PG_BUSY|PG_FAKE);
    495   1.166.2.2  uebayasi 			UVM_PAGE_OWN(pg, NULL);
    496   1.166.2.2  uebayasi 			if (!locked)
    497   1.166.2.2  uebayasi 				mutex_exit(&anon->an_lock);
    498   1.166.2.2  uebayasi #else /* defined(VMSWAP) */
    499   1.166.2.2  uebayasi 			panic("%s: we_own", __func__);
    500   1.166.2.2  uebayasi #endif /* defined(VMSWAP) */
    501   1.166.2.2  uebayasi 		}
    502   1.166.2.2  uebayasi 
    503   1.166.2.2  uebayasi 		/*
    504   1.166.2.2  uebayasi 		 * we were not able to relock.   restart fault.
    505   1.166.2.2  uebayasi 		 */
    506   1.166.2.2  uebayasi 
    507   1.166.2.2  uebayasi 		if (!locked) {
    508   1.166.2.2  uebayasi 			UVMHIST_LOG(maphist, "<- REFAULT", 0,0,0,0);
    509   1.166.2.2  uebayasi 			return (ERESTART);
    510   1.166.2.2  uebayasi 		}
    511   1.166.2.2  uebayasi 
    512   1.166.2.2  uebayasi 		/*
    513   1.166.2.2  uebayasi 		 * verify no one has touched the amap and moved the anon on us.
    514   1.166.2.2  uebayasi 		 */
    515   1.166.2.2  uebayasi 
    516   1.166.2.2  uebayasi 		if (ufi != NULL &&
    517   1.166.2.2  uebayasi 		    amap_lookup(&ufi->entry->aref,
    518   1.166.2.2  uebayasi 				ufi->orig_rvaddr - ufi->entry->start) != anon) {
    519   1.166.2.2  uebayasi 
    520   1.166.2.2  uebayasi 			uvmfault_unlockall(ufi, amap, NULL, anon);
    521   1.166.2.2  uebayasi 			UVMHIST_LOG(maphist, "<- REFAULT", 0,0,0,0);
    522   1.166.2.2  uebayasi 			return (ERESTART);
    523   1.166.2.2  uebayasi 		}
    524   1.166.2.2  uebayasi 
    525   1.166.2.2  uebayasi 		/*
    526   1.166.2.2  uebayasi 		 * try it again!
    527   1.166.2.2  uebayasi 		 */
    528   1.166.2.2  uebayasi 
    529   1.166.2.2  uebayasi 		uvmexp.fltanretry++;
    530   1.166.2.2  uebayasi 		continue;
    531   1.166.2.2  uebayasi 	}
    532   1.166.2.2  uebayasi 	/*NOTREACHED*/
    533   1.166.2.2  uebayasi }
    534   1.166.2.2  uebayasi 
    535   1.166.2.2  uebayasi /*
    536   1.166.2.2  uebayasi  * uvmfault_promote: promote data to a new anon.  used for 1B and 2B.
    537   1.166.2.2  uebayasi  *
    538   1.166.2.2  uebayasi  *	1. allocate an anon and a page.
    539   1.166.2.2  uebayasi  *	2. fill its contents.
    540   1.166.2.2  uebayasi  *	3. put it into amap.
    541   1.166.2.2  uebayasi  *
    542   1.166.2.2  uebayasi  * => if we fail (result != 0) we unlock everything.
    543   1.166.2.2  uebayasi  * => on success, return a new locked anon via 'nanon'.
    544   1.166.2.2  uebayasi  *    (*nanon)->an_page will be a resident, locked, dirty page.
    545   1.166.2.2  uebayasi  */
    546   1.166.2.2  uebayasi 
    547   1.166.2.2  uebayasi static int
    548   1.166.2.2  uebayasi uvmfault_promote(struct uvm_faultinfo *ufi,
    549   1.166.2.2  uebayasi     struct vm_anon *oanon,
    550   1.166.2.2  uebayasi     struct uvm_object *uobj,
    551   1.166.2.2  uebayasi     struct vm_page *uobjpage,
    552   1.166.2.2  uebayasi     struct vm_anon **nanon, /* OUT: allocated anon */
    553   1.166.2.2  uebayasi     struct vm_anon **spare)
    554   1.166.2.2  uebayasi {
    555   1.166.2.2  uebayasi 	struct vm_amap *amap = ufi->entry->aref.ar_amap;
    556   1.166.2.2  uebayasi 	struct vm_anon *anon;
    557   1.166.2.2  uebayasi 	struct vm_page *pg;
    558   1.166.2.2  uebayasi 	struct vm_page *opg;
    559   1.166.2.2  uebayasi 	int error;
    560   1.166.2.2  uebayasi 	UVMHIST_FUNC(__func__); UVMHIST_CALLED(maphist);
    561   1.166.2.2  uebayasi 
    562   1.166.2.2  uebayasi 	if (oanon) {
    563   1.166.2.2  uebayasi 		/* anon COW */
    564   1.166.2.2  uebayasi 		opg = oanon->an_page;
    565   1.166.2.2  uebayasi 		KASSERT(opg != NULL);
    566   1.166.2.2  uebayasi 		KASSERT(opg->uobject == NULL || opg->loan_count > 0);
    567   1.166.2.2  uebayasi 	} else if (uobjpage != PGO_DONTCARE) {
    568   1.166.2.2  uebayasi 		/* object-backed COW */
    569   1.166.2.2  uebayasi 		opg = uobjpage;
    570   1.166.2.2  uebayasi 	} else {
    571   1.166.2.2  uebayasi 		/* ZFOD */
    572   1.166.2.2  uebayasi 		opg = NULL;
    573   1.166.2.2  uebayasi 	}
    574   1.166.2.2  uebayasi 
    575   1.166.2.2  uebayasi 	KASSERT(amap != NULL);
    576   1.166.2.2  uebayasi 	KASSERT(uobjpage != NULL);
    577  1.166.2.13  uebayasi 	KASSERT(uobjpage == PGO_DONTCARE || (uobjpage->flags & PG_BUSY) != 0);
    578   1.166.2.2  uebayasi 	KASSERT(mutex_owned(&amap->am_l));
    579   1.166.2.2  uebayasi 	KASSERT(oanon == NULL || mutex_owned(&oanon->an_lock));
    580   1.166.2.2  uebayasi 	KASSERT(uobj == NULL || mutex_owned(&uobj->vmobjlock));
    581   1.166.2.2  uebayasi #if 0
    582   1.166.2.2  uebayasi 	KASSERT(*spare == NULL || !mutex_owned(&(*spare)->an_lock));
    583   1.166.2.2  uebayasi #endif
    584   1.166.2.2  uebayasi 
    585   1.166.2.2  uebayasi 	if (*spare != NULL) {
    586   1.166.2.2  uebayasi 		anon = *spare;
    587   1.166.2.2  uebayasi 		*spare = NULL;
    588   1.166.2.2  uebayasi 		mutex_enter(&anon->an_lock);
    589   1.166.2.2  uebayasi 	} else if (ufi->map != kernel_map) {
    590   1.166.2.2  uebayasi 		anon = uvm_analloc();
    591   1.166.2.2  uebayasi 	} else {
    592   1.166.2.2  uebayasi 		UVMHIST_LOG(maphist, "kernel_map, unlock and retry", 0,0,0,0);
    593   1.166.2.2  uebayasi 
    594   1.166.2.2  uebayasi 		/*
    595   1.166.2.2  uebayasi 		 * we can't allocate anons with kernel_map locked.
    596   1.166.2.2  uebayasi 		 */
    597   1.166.2.2  uebayasi 
    598   1.166.2.2  uebayasi 		uvm_page_unbusy(&uobjpage, 1);
    599   1.166.2.2  uebayasi 		uvmfault_unlockall(ufi, amap, uobj, oanon);
    600   1.166.2.2  uebayasi 
    601   1.166.2.2  uebayasi 		*spare = uvm_analloc();
    602   1.166.2.2  uebayasi 		if (*spare == NULL) {
    603   1.166.2.2  uebayasi 			goto nomem;
    604   1.166.2.2  uebayasi 		}
    605   1.166.2.2  uebayasi 		mutex_exit(&(*spare)->an_lock);
    606   1.166.2.2  uebayasi 		error = ERESTART;
    607   1.166.2.2  uebayasi 		goto done;
    608   1.166.2.2  uebayasi 	}
    609   1.166.2.2  uebayasi 	if (anon) {
    610   1.166.2.2  uebayasi 
    611   1.166.2.2  uebayasi 		/*
    612   1.166.2.2  uebayasi 		 * The new anon is locked.
    613   1.166.2.2  uebayasi 		 *
    614   1.166.2.2  uebayasi 		 * if opg == NULL, we want a zero'd, dirty page,
    615   1.166.2.2  uebayasi 		 * so have uvm_pagealloc() do that for us.
    616   1.166.2.2  uebayasi 		 */
    617   1.166.2.2  uebayasi 
    618   1.166.2.2  uebayasi 		pg = uvm_pagealloc(NULL, 0, anon,
    619   1.166.2.2  uebayasi 		    (opg == NULL) ? UVM_PGA_ZERO : 0);
    620   1.166.2.2  uebayasi 	} else {
    621   1.166.2.2  uebayasi 		pg = NULL;
    622   1.166.2.2  uebayasi 	}
    623   1.166.2.2  uebayasi 
    624   1.166.2.2  uebayasi 	/*
    625   1.166.2.2  uebayasi 	 * out of memory resources?
    626   1.166.2.2  uebayasi 	 */
    627   1.166.2.2  uebayasi 
    628   1.166.2.2  uebayasi 	if (pg == NULL) {
    629   1.166.2.2  uebayasi 		/* save anon for the next try. */
    630   1.166.2.2  uebayasi 		if (anon != NULL) {
    631   1.166.2.2  uebayasi 			mutex_exit(&anon->an_lock);
    632   1.166.2.2  uebayasi 			*spare = anon;
    633   1.166.2.2  uebayasi 		}
    634   1.166.2.2  uebayasi 
    635   1.166.2.2  uebayasi 		/* unlock and fail ... */
    636   1.166.2.2  uebayasi 		uvm_page_unbusy(&uobjpage, 1);
    637   1.166.2.2  uebayasi 		uvmfault_unlockall(ufi, amap, uobj, oanon);
    638   1.166.2.2  uebayasi nomem:
    639   1.166.2.2  uebayasi 		if (!uvm_reclaimable()) {
    640   1.166.2.2  uebayasi 			UVMHIST_LOG(maphist, "out of VM", 0,0,0,0);
    641   1.166.2.2  uebayasi 			uvmexp.fltnoanon++;
    642   1.166.2.2  uebayasi 			error = ENOMEM;
    643   1.166.2.2  uebayasi 			goto done;
    644   1.166.2.2  uebayasi 		}
    645   1.166.2.2  uebayasi 
    646   1.166.2.2  uebayasi 		UVMHIST_LOG(maphist, "out of RAM, waiting for more", 0,0,0,0);
    647   1.166.2.2  uebayasi 		uvmexp.fltnoram++;
    648   1.166.2.2  uebayasi 		uvm_wait("flt_noram5");
    649   1.166.2.2  uebayasi 		error = ERESTART;
    650   1.166.2.2  uebayasi 		goto done;
    651   1.166.2.2  uebayasi 	}
    652   1.166.2.2  uebayasi 
    653   1.166.2.2  uebayasi 	/* copy page [pg now dirty] */
    654   1.166.2.2  uebayasi 	if (opg) {
    655   1.166.2.2  uebayasi 		uvm_pagecopy(opg, pg);
    656   1.166.2.2  uebayasi 	}
    657   1.166.2.2  uebayasi 
    658   1.166.2.2  uebayasi 	amap_add(&ufi->entry->aref, ufi->orig_rvaddr - ufi->entry->start, anon,
    659   1.166.2.2  uebayasi 	    oanon != NULL);
    660   1.166.2.2  uebayasi 
    661   1.166.2.2  uebayasi 	*nanon = anon;
    662   1.166.2.2  uebayasi 	error = 0;
    663   1.166.2.2  uebayasi done:
    664   1.166.2.2  uebayasi 	return error;
    665   1.166.2.2  uebayasi }
    666   1.166.2.2  uebayasi 
    667   1.166.2.2  uebayasi 
    668   1.166.2.2  uebayasi /*
    669   1.166.2.2  uebayasi  *   F A U L T   -   m a i n   e n t r y   p o i n t
    670   1.166.2.2  uebayasi  */
    671   1.166.2.2  uebayasi 
    672   1.166.2.2  uebayasi /*
    673   1.166.2.2  uebayasi  * uvm_fault: page fault handler
    674   1.166.2.2  uebayasi  *
    675   1.166.2.2  uebayasi  * => called from MD code to resolve a page fault
    676   1.166.2.2  uebayasi  * => VM data structures usually should be unlocked.   however, it is
    677   1.166.2.2  uebayasi  *	possible to call here with the main map locked if the caller
    678   1.166.2.2  uebayasi  *	gets a write lock, sets it recusive, and then calls us (c.f.
    679   1.166.2.2  uebayasi  *	uvm_map_pageable).   this should be avoided because it keeps
    680   1.166.2.2  uebayasi  *	the map locked off during I/O.
    681   1.166.2.2  uebayasi  * => MUST NEVER BE CALLED IN INTERRUPT CONTEXT
    682   1.166.2.2  uebayasi  */
    683   1.166.2.2  uebayasi 
    684   1.166.2.2  uebayasi #define MASK(entry)     (UVM_ET_ISCOPYONWRITE(entry) ? \
    685   1.166.2.2  uebayasi 			 ~VM_PROT_WRITE : VM_PROT_ALL)
    686   1.166.2.2  uebayasi 
    687   1.166.2.2  uebayasi /* fault_flag values passed from uvm_fault_wire to uvm_fault_internal */
    688   1.166.2.2  uebayasi #define UVM_FAULT_WIRE		(1 << 0)
    689   1.166.2.2  uebayasi #define UVM_FAULT_MAXPROT	(1 << 1)
    690   1.166.2.2  uebayasi 
    691   1.166.2.2  uebayasi struct uvm_faultctx {
    692   1.166.2.2  uebayasi 	vm_prot_t access_type;
    693   1.166.2.2  uebayasi 	vm_prot_t enter_prot;
    694   1.166.2.2  uebayasi 	vaddr_t startva;
    695   1.166.2.2  uebayasi 	int npages;
    696   1.166.2.2  uebayasi 	int centeridx;
    697   1.166.2.2  uebayasi 	struct vm_anon *anon_spare;
    698   1.166.2.2  uebayasi 	bool wire_mapping;
    699   1.166.2.2  uebayasi 	bool narrow;
    700   1.166.2.2  uebayasi 	bool wire_paging;
    701   1.166.2.2  uebayasi 	bool maxprot;
    702   1.166.2.2  uebayasi 	bool cow_now;
    703   1.166.2.5  uebayasi 	bool promote;
    704   1.166.2.2  uebayasi };
    705   1.166.2.2  uebayasi 
    706   1.166.2.2  uebayasi static inline int	uvm_fault_check(
    707   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    708   1.166.2.2  uebayasi 			    struct vm_anon ***, struct vm_page ***);
    709   1.166.2.2  uebayasi 
    710   1.166.2.2  uebayasi static int		uvm_fault_upper(
    711   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    712   1.166.2.2  uebayasi 			    struct vm_anon **);
    713   1.166.2.2  uebayasi static inline int	uvm_fault_upper_lookup(
    714   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    715   1.166.2.2  uebayasi 			    struct vm_anon **, struct vm_page **);
    716   1.166.2.2  uebayasi static inline void	uvm_fault_upper_neighbor(
    717   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    718   1.166.2.2  uebayasi 			    vaddr_t, struct vm_page *, bool);
    719   1.166.2.2  uebayasi static inline int	uvm_fault_upper_loan(
    720   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    721   1.166.2.2  uebayasi 			    struct vm_anon *, struct uvm_object **);
    722   1.166.2.2  uebayasi static inline int	uvm_fault_upper_promote(
    723   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    724   1.166.2.2  uebayasi 			    struct uvm_object *, struct vm_anon *);
    725   1.166.2.2  uebayasi static inline int	uvm_fault_upper_direct(
    726   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    727   1.166.2.2  uebayasi 			    struct uvm_object *, struct vm_anon *);
    728   1.166.2.2  uebayasi static int		uvm_fault_upper_enter(
    729   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    730   1.166.2.2  uebayasi 			    struct uvm_object *, struct vm_anon *,
    731   1.166.2.2  uebayasi 			    struct vm_page *, struct vm_anon *);
    732   1.166.2.5  uebayasi static inline void	uvm_fault_upper_done(
    733   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    734   1.166.2.2  uebayasi 			    struct uvm_object *, struct vm_anon *,
    735   1.166.2.5  uebayasi 			    struct vm_page *);
    736   1.166.2.2  uebayasi 
    737   1.166.2.2  uebayasi static int		uvm_fault_lower(
    738   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    739   1.166.2.2  uebayasi 			    struct vm_page **);
    740   1.166.2.5  uebayasi static inline void	uvm_fault_lower_lookup(
    741   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    742   1.166.2.2  uebayasi 			    struct vm_page **);
    743   1.166.2.2  uebayasi static inline void	uvm_fault_lower_neighbor(
    744   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    745   1.166.2.2  uebayasi 			    vaddr_t, struct vm_page *, bool);
    746   1.166.2.2  uebayasi static inline int	uvm_fault_lower_io(
    747   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    748   1.166.2.2  uebayasi 			    struct uvm_object **, struct vm_page **);
    749   1.166.2.2  uebayasi static inline int	uvm_fault_lower_direct(
    750   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    751   1.166.2.2  uebayasi 			    struct uvm_object *, struct vm_page *);
    752   1.166.2.2  uebayasi static inline int	uvm_fault_lower_direct_loan(
    753   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    754   1.166.2.2  uebayasi 			    struct uvm_object *, struct vm_page **,
    755   1.166.2.2  uebayasi 			    struct vm_page **);
    756   1.166.2.2  uebayasi static inline int	uvm_fault_lower_promote(
    757   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    758   1.166.2.2  uebayasi 			    struct uvm_object *, struct vm_page *);
    759   1.166.2.2  uebayasi static int		uvm_fault_lower_enter(
    760   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    761   1.166.2.2  uebayasi 			    struct uvm_object *,
    762   1.166.2.2  uebayasi 			    struct vm_anon *, struct vm_page *,
    763   1.166.2.2  uebayasi 			    struct vm_page *);
    764   1.166.2.5  uebayasi static inline void	uvm_fault_lower_done(
    765   1.166.2.2  uebayasi 			    struct uvm_faultinfo *, struct uvm_faultctx *,
    766   1.166.2.5  uebayasi 			    struct uvm_object *, struct vm_anon *,
    767   1.166.2.5  uebayasi 			    struct vm_page *);
    768   1.166.2.2  uebayasi 
    769   1.166.2.2  uebayasi int
    770   1.166.2.2  uebayasi uvm_fault_internal(struct vm_map *orig_map, vaddr_t vaddr,
    771   1.166.2.2  uebayasi     vm_prot_t access_type, int fault_flag)
    772   1.166.2.2  uebayasi {
    773   1.166.2.2  uebayasi 	struct uvm_faultinfo ufi;
    774   1.166.2.2  uebayasi 	struct uvm_faultctx flt = {
    775   1.166.2.2  uebayasi 		.access_type = access_type,
    776   1.166.2.2  uebayasi 
    777   1.166.2.2  uebayasi 		/* don't look for neighborhood * pages on "wire" fault */
    778   1.166.2.2  uebayasi 		.narrow = (fault_flag & UVM_FAULT_WIRE) != 0,
    779   1.166.2.2  uebayasi 
    780   1.166.2.2  uebayasi 		/* "wire" fault causes wiring of both mapping and paging */
    781   1.166.2.2  uebayasi 		.wire_mapping = (fault_flag & UVM_FAULT_WIRE) != 0,
    782   1.166.2.2  uebayasi 		.wire_paging = (fault_flag & UVM_FAULT_WIRE) != 0,
    783   1.166.2.2  uebayasi 
    784   1.166.2.2  uebayasi 		.maxprot = (fault_flag & UVM_FAULT_MAXPROT) != 0,
    785   1.166.2.2  uebayasi 	};
    786   1.166.2.2  uebayasi 	struct vm_anon *anons_store[UVM_MAXRANGE], **anons;
    787   1.166.2.2  uebayasi 	struct vm_page *pages_store[UVM_MAXRANGE], **pages;
    788   1.166.2.2  uebayasi 	int error;
    789   1.166.2.2  uebayasi 	UVMHIST_FUNC("uvm_fault"); UVMHIST_CALLED(maphist);
    790   1.166.2.2  uebayasi 
    791   1.166.2.2  uebayasi 	UVMHIST_LOG(maphist, "(map=0x%x, vaddr=0x%x, at=%d, ff=%d)",
    792   1.166.2.2  uebayasi 	      orig_map, vaddr, access_type, fault_flag);
    793   1.166.2.2  uebayasi 
    794   1.166.2.2  uebayasi 	uvmexp.faults++;	/* XXX: locking? */
    795   1.166.2.2  uebayasi 
    796   1.166.2.2  uebayasi 	/*
    797   1.166.2.2  uebayasi 	 * init the IN parameters in the ufi
    798   1.166.2.2  uebayasi 	 */
    799   1.166.2.2  uebayasi 
    800   1.166.2.2  uebayasi 	ufi.orig_map = orig_map;
    801   1.166.2.2  uebayasi 	ufi.orig_rvaddr = trunc_page(vaddr);
    802   1.166.2.2  uebayasi 	ufi.orig_size = PAGE_SIZE;	/* can't get any smaller than this */
    803   1.166.2.2  uebayasi 
    804   1.166.2.2  uebayasi 	error = ERESTART;
    805   1.166.2.2  uebayasi 	while (error == ERESTART) {
    806   1.166.2.2  uebayasi 		anons = anons_store;
    807   1.166.2.2  uebayasi 		pages = pages_store;
    808   1.166.2.2  uebayasi 
    809   1.166.2.2  uebayasi 		error = uvm_fault_check(&ufi, &flt, &anons, &pages);
    810   1.166.2.2  uebayasi 		if (error != 0)
    811   1.166.2.2  uebayasi 			continue;
    812   1.166.2.2  uebayasi 
    813   1.166.2.2  uebayasi 		error = uvm_fault_upper_lookup(&ufi, &flt, anons, pages);
    814   1.166.2.2  uebayasi 		if (error != 0)
    815   1.166.2.2  uebayasi 			continue;
    816   1.166.2.2  uebayasi 
    817   1.166.2.2  uebayasi 		if (pages[flt.centeridx] == PGO_DONTCARE)
    818   1.166.2.2  uebayasi 			error = uvm_fault_upper(&ufi, &flt, anons);
    819   1.166.2.5  uebayasi 		else {
    820   1.166.2.5  uebayasi 			struct uvm_object * const uobj = ufi.entry->object.uvm_obj;
    821   1.166.2.5  uebayasi 
    822   1.166.2.5  uebayasi 			if (uobj && uobj->pgops->pgo_fault != NULL) {
    823   1.166.2.5  uebayasi 				/*
    824   1.166.2.5  uebayasi 				 * invoke "special" fault routine.
    825   1.166.2.5  uebayasi 				 */
    826   1.166.2.5  uebayasi 				mutex_enter(&uobj->vmobjlock);
    827   1.166.2.5  uebayasi 				/* locked: maps(read), amap(if there), uobj */
    828   1.166.2.5  uebayasi 				error = uobj->pgops->pgo_fault(&ufi,
    829   1.166.2.5  uebayasi 				    flt.startva, pages, flt.npages,
    830   1.166.2.5  uebayasi 				    flt.centeridx, flt.access_type,
    831   1.166.2.5  uebayasi 				    PGO_LOCKED|PGO_SYNCIO);
    832   1.166.2.5  uebayasi 
    833   1.166.2.5  uebayasi 				/* locked: nothing, pgo_fault has unlocked everything */
    834   1.166.2.5  uebayasi 
    835   1.166.2.5  uebayasi 				/*
    836   1.166.2.5  uebayasi 				 * object fault routine responsible for pmap_update().
    837   1.166.2.5  uebayasi 				 */
    838   1.166.2.5  uebayasi 			} else {
    839   1.166.2.5  uebayasi 				error = uvm_fault_lower(&ufi, &flt, pages);
    840   1.166.2.5  uebayasi 			}
    841   1.166.2.5  uebayasi 		}
    842   1.166.2.2  uebayasi 	}
    843   1.166.2.2  uebayasi 
    844   1.166.2.2  uebayasi 	if (flt.anon_spare != NULL) {
    845   1.166.2.2  uebayasi 		flt.anon_spare->an_ref--;
    846   1.166.2.2  uebayasi 		uvm_anfree(flt.anon_spare);
    847   1.166.2.2  uebayasi 	}
    848   1.166.2.2  uebayasi 	return error;
    849   1.166.2.2  uebayasi }
    850   1.166.2.2  uebayasi 
    851   1.166.2.5  uebayasi /*
    852   1.166.2.5  uebayasi  * uvm_fault_check: check prot, handle needs-copy, etc.
    853   1.166.2.5  uebayasi  *
    854   1.166.2.5  uebayasi  *	1. lookup entry.
    855   1.166.2.5  uebayasi  *	2. check protection.
    856   1.166.2.5  uebayasi  *	3. adjust fault condition (mainly for simulated fault).
    857   1.166.2.5  uebayasi  *	4. handle needs-copy (lazy amap copy).
    858   1.166.2.5  uebayasi  *	5. establish range of interest for neighbor fault (aka pre-fault).
    859   1.166.2.5  uebayasi  *	6. look up anons (if amap exists).
    860   1.166.2.5  uebayasi  *	7. flush pages (if MADV_SEQUENTIAL)
    861   1.166.2.5  uebayasi  *
    862   1.166.2.5  uebayasi  * => called with nothing locked.
    863   1.166.2.5  uebayasi  * => if we fail (result != 0) we unlock everything.
    864   1.166.2.5  uebayasi  */
    865   1.166.2.5  uebayasi 
    866   1.166.2.2  uebayasi static int
    867   1.166.2.2  uebayasi uvm_fault_check(
    868   1.166.2.2  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
    869   1.166.2.2  uebayasi 	struct vm_anon ***ranons, struct vm_page ***rpages)
    870   1.166.2.2  uebayasi {
    871   1.166.2.2  uebayasi 	struct vm_amap *amap;
    872   1.166.2.2  uebayasi 	struct uvm_object *uobj;
    873   1.166.2.2  uebayasi 	vm_prot_t check_prot;
    874   1.166.2.2  uebayasi 	int nback, nforw;
    875   1.166.2.2  uebayasi 	UVMHIST_FUNC("uvm_fault_check"); UVMHIST_CALLED(maphist);
    876   1.166.2.2  uebayasi 
    877   1.166.2.2  uebayasi 	/*
    878   1.166.2.2  uebayasi 	 * lookup and lock the maps
    879   1.166.2.2  uebayasi 	 */
    880   1.166.2.2  uebayasi 
    881   1.166.2.2  uebayasi 	if (uvmfault_lookup(ufi, false) == false) {
    882   1.166.2.2  uebayasi 		UVMHIST_LOG(maphist, "<- no mapping @ 0x%x", ufi->orig_rvaddr, 0,0,0);
    883   1.166.2.2  uebayasi 		return EFAULT;
    884   1.166.2.2  uebayasi 	}
    885   1.166.2.2  uebayasi 	/* locked: maps(read) */
    886   1.166.2.2  uebayasi 
    887   1.166.2.2  uebayasi #ifdef DIAGNOSTIC
    888   1.166.2.2  uebayasi 	if ((ufi->map->flags & VM_MAP_PAGEABLE) == 0) {
    889   1.166.2.2  uebayasi 		printf("Page fault on non-pageable map:\n");
    890   1.166.2.2  uebayasi 		printf("ufi->map = %p\n", ufi->map);
    891   1.166.2.2  uebayasi 		printf("ufi->orig_map = %p\n", ufi->orig_map);
    892   1.166.2.2  uebayasi 		printf("ufi->orig_rvaddr = 0x%lx\n", (u_long) ufi->orig_rvaddr);
    893   1.166.2.2  uebayasi 		panic("uvm_fault: (ufi->map->flags & VM_MAP_PAGEABLE) == 0");
    894   1.166.2.2  uebayasi 	}
    895   1.166.2.2  uebayasi #endif
    896   1.166.2.2  uebayasi 
    897   1.166.2.2  uebayasi 	/*
    898   1.166.2.2  uebayasi 	 * check protection
    899   1.166.2.2  uebayasi 	 */
    900   1.166.2.2  uebayasi 
    901   1.166.2.2  uebayasi 	check_prot = flt->maxprot ?
    902   1.166.2.2  uebayasi 	    ufi->entry->max_protection : ufi->entry->protection;
    903   1.166.2.2  uebayasi 	if ((check_prot & flt->access_type) != flt->access_type) {
    904   1.166.2.2  uebayasi 		UVMHIST_LOG(maphist,
    905   1.166.2.2  uebayasi 		    "<- protection failure (prot=0x%x, access=0x%x)",
    906   1.166.2.2  uebayasi 		    ufi->entry->protection, flt->access_type, 0, 0);
    907   1.166.2.2  uebayasi 		uvmfault_unlockmaps(ufi, false);
    908   1.166.2.2  uebayasi 		return EACCES;
    909   1.166.2.2  uebayasi 	}
    910   1.166.2.2  uebayasi 
    911   1.166.2.2  uebayasi 	/*
    912   1.166.2.2  uebayasi 	 * "enter_prot" is the protection we want to enter the page in at.
    913   1.166.2.2  uebayasi 	 * for certain pages (e.g. copy-on-write pages) this protection can
    914   1.166.2.2  uebayasi 	 * be more strict than ufi->entry->protection.  "wired" means either
    915   1.166.2.2  uebayasi 	 * the entry is wired or we are fault-wiring the pg.
    916   1.166.2.2  uebayasi 	 */
    917   1.166.2.2  uebayasi 
    918   1.166.2.2  uebayasi 	flt->enter_prot = ufi->entry->protection;
    919   1.166.2.2  uebayasi 	if (VM_MAPENT_ISWIRED(ufi->entry))
    920   1.166.2.2  uebayasi 		flt->wire_mapping = true;
    921   1.166.2.2  uebayasi 
    922   1.166.2.2  uebayasi 	if (flt->wire_mapping) {
    923   1.166.2.2  uebayasi 		flt->access_type = flt->enter_prot; /* full access for wired */
    924   1.166.2.2  uebayasi 		flt->cow_now = (check_prot & VM_PROT_WRITE) != 0;
    925   1.166.2.2  uebayasi 	} else {
    926   1.166.2.2  uebayasi 		flt->cow_now = (flt->access_type & VM_PROT_WRITE) != 0;
    927   1.166.2.2  uebayasi 	}
    928   1.166.2.2  uebayasi 
    929   1.166.2.5  uebayasi 	flt->promote = false;
    930   1.166.2.5  uebayasi 
    931   1.166.2.2  uebayasi 	/*
    932   1.166.2.2  uebayasi 	 * handle "needs_copy" case.   if we need to copy the amap we will
    933   1.166.2.2  uebayasi 	 * have to drop our readlock and relock it with a write lock.  (we
    934   1.166.2.2  uebayasi 	 * need a write lock to change anything in a map entry [e.g.
    935   1.166.2.2  uebayasi 	 * needs_copy]).
    936   1.166.2.2  uebayasi 	 */
    937   1.166.2.2  uebayasi 
    938   1.166.2.2  uebayasi 	if (UVM_ET_ISNEEDSCOPY(ufi->entry)) {
    939   1.166.2.2  uebayasi 		if (flt->cow_now || (ufi->entry->object.uvm_obj == NULL)) {
    940   1.166.2.2  uebayasi 			KASSERT(!flt->maxprot);
    941   1.166.2.2  uebayasi 			/* need to clear */
    942   1.166.2.2  uebayasi 			UVMHIST_LOG(maphist,
    943   1.166.2.2  uebayasi 			    "  need to clear needs_copy and refault",0,0,0,0);
    944   1.166.2.2  uebayasi 			uvmfault_unlockmaps(ufi, false);
    945   1.166.2.2  uebayasi 			uvmfault_amapcopy(ufi);
    946   1.166.2.2  uebayasi 			uvmexp.fltamcopy++;
    947   1.166.2.2  uebayasi 			return ERESTART;
    948   1.166.2.2  uebayasi 
    949   1.166.2.2  uebayasi 		} else {
    950   1.166.2.2  uebayasi 
    951   1.166.2.2  uebayasi 			/*
    952   1.166.2.2  uebayasi 			 * ensure that we pmap_enter page R/O since
    953   1.166.2.2  uebayasi 			 * needs_copy is still true
    954   1.166.2.2  uebayasi 			 */
    955   1.166.2.2  uebayasi 
    956   1.166.2.2  uebayasi 			flt->enter_prot &= ~VM_PROT_WRITE;
    957   1.166.2.2  uebayasi 		}
    958   1.166.2.2  uebayasi 	}
    959   1.166.2.2  uebayasi 
    960   1.166.2.2  uebayasi 	/*
    961   1.166.2.2  uebayasi 	 * identify the players
    962   1.166.2.2  uebayasi 	 */
    963   1.166.2.2  uebayasi 
    964   1.166.2.2  uebayasi 	amap = ufi->entry->aref.ar_amap;	/* upper layer */
    965   1.166.2.2  uebayasi 	uobj = ufi->entry->object.uvm_obj;	/* lower layer */
    966   1.166.2.2  uebayasi 
    967   1.166.2.2  uebayasi 	/*
    968   1.166.2.2  uebayasi 	 * check for a case 0 fault.  if nothing backing the entry then
    969   1.166.2.2  uebayasi 	 * error now.
    970   1.166.2.2  uebayasi 	 */
    971   1.166.2.2  uebayasi 
    972   1.166.2.2  uebayasi 	if (amap == NULL && uobj == NULL) {
    973   1.166.2.2  uebayasi 		uvmfault_unlockmaps(ufi, false);
    974   1.166.2.2  uebayasi 		UVMHIST_LOG(maphist,"<- no backing store, no overlay",0,0,0,0);
    975   1.166.2.2  uebayasi 		return EFAULT;
    976   1.166.2.2  uebayasi 	}
    977   1.166.2.2  uebayasi 
    978   1.166.2.2  uebayasi 	/*
    979   1.166.2.2  uebayasi 	 * establish range of interest based on advice from mapper
    980   1.166.2.2  uebayasi 	 * and then clip to fit map entry.   note that we only want
    981   1.166.2.2  uebayasi 	 * to do this the first time through the fault.   if we
    982   1.166.2.2  uebayasi 	 * ReFault we will disable this by setting "narrow" to true.
    983   1.166.2.2  uebayasi 	 */
    984   1.166.2.2  uebayasi 
    985   1.166.2.2  uebayasi 	if (flt->narrow == false) {
    986   1.166.2.2  uebayasi 
    987   1.166.2.2  uebayasi 		/* wide fault (!narrow) */
    988   1.166.2.2  uebayasi 		KASSERT(uvmadvice[ufi->entry->advice].advice ==
    989   1.166.2.2  uebayasi 			 ufi->entry->advice);
    990   1.166.2.2  uebayasi 		nback = MIN(uvmadvice[ufi->entry->advice].nback,
    991   1.166.2.2  uebayasi 			    (ufi->orig_rvaddr - ufi->entry->start) >> PAGE_SHIFT);
    992   1.166.2.2  uebayasi 		flt->startva = ufi->orig_rvaddr - (nback << PAGE_SHIFT);
    993   1.166.2.2  uebayasi 		nforw = MIN(uvmadvice[ufi->entry->advice].nforw,
    994   1.166.2.2  uebayasi 			    ((ufi->entry->end - ufi->orig_rvaddr) >>
    995   1.166.2.2  uebayasi 			     PAGE_SHIFT) - 1);
    996   1.166.2.2  uebayasi 		/*
    997   1.166.2.2  uebayasi 		 * note: "-1" because we don't want to count the
    998   1.166.2.2  uebayasi 		 * faulting page as forw
    999   1.166.2.2  uebayasi 		 */
   1000   1.166.2.2  uebayasi 		flt->npages = nback + nforw + 1;
   1001   1.166.2.2  uebayasi 		flt->centeridx = nback;
   1002   1.166.2.2  uebayasi 
   1003   1.166.2.2  uebayasi 		flt->narrow = true;	/* ensure only once per-fault */
   1004   1.166.2.2  uebayasi 
   1005   1.166.2.2  uebayasi 	} else {
   1006   1.166.2.2  uebayasi 
   1007   1.166.2.2  uebayasi 		/* narrow fault! */
   1008   1.166.2.2  uebayasi 		nback = nforw = 0;
   1009   1.166.2.2  uebayasi 		flt->startva = ufi->orig_rvaddr;
   1010   1.166.2.2  uebayasi 		flt->npages = 1;
   1011   1.166.2.2  uebayasi 		flt->centeridx = 0;
   1012   1.166.2.2  uebayasi 
   1013   1.166.2.2  uebayasi 	}
   1014   1.166.2.2  uebayasi 	/* offset from entry's start to pgs' start */
   1015   1.166.2.2  uebayasi 	const voff_t eoff = flt->startva - ufi->entry->start;
   1016   1.166.2.2  uebayasi 
   1017   1.166.2.2  uebayasi 	/* locked: maps(read) */
   1018   1.166.2.2  uebayasi 	UVMHIST_LOG(maphist, "  narrow=%d, back=%d, forw=%d, startva=0x%x",
   1019   1.166.2.2  uebayasi 		    flt->narrow, nback, nforw, flt->startva);
   1020   1.166.2.2  uebayasi 	UVMHIST_LOG(maphist, "  entry=0x%x, amap=0x%x, obj=0x%x", ufi->entry,
   1021   1.166.2.2  uebayasi 		    amap, uobj, 0);
   1022   1.166.2.2  uebayasi 
   1023   1.166.2.2  uebayasi 	/*
   1024   1.166.2.2  uebayasi 	 * if we've got an amap, lock it and extract current anons.
   1025   1.166.2.2  uebayasi 	 */
   1026   1.166.2.2  uebayasi 
   1027   1.166.2.2  uebayasi 	if (amap) {
   1028   1.166.2.2  uebayasi 		amap_lock(amap);
   1029   1.166.2.2  uebayasi 		amap_lookups(&ufi->entry->aref, eoff, *ranons, flt->npages);
   1030   1.166.2.2  uebayasi 	} else {
   1031   1.166.2.2  uebayasi 		*ranons = NULL;	/* to be safe */
   1032   1.166.2.2  uebayasi 	}
   1033   1.166.2.2  uebayasi 
   1034   1.166.2.2  uebayasi 	/* locked: maps(read), amap(if there) */
   1035   1.166.2.2  uebayasi 	KASSERT(amap == NULL || mutex_owned(&amap->am_l));
   1036   1.166.2.2  uebayasi 
   1037   1.166.2.2  uebayasi 	/*
   1038   1.166.2.2  uebayasi 	 * for MADV_SEQUENTIAL mappings we want to deactivate the back pages
   1039   1.166.2.2  uebayasi 	 * now and then forget about them (for the rest of the fault).
   1040   1.166.2.2  uebayasi 	 */
   1041   1.166.2.2  uebayasi 
   1042   1.166.2.2  uebayasi 	if (ufi->entry->advice == MADV_SEQUENTIAL && nback != 0) {
   1043   1.166.2.2  uebayasi 
   1044   1.166.2.2  uebayasi 		UVMHIST_LOG(maphist, "  MADV_SEQUENTIAL: flushing backpages",
   1045   1.166.2.2  uebayasi 		    0,0,0,0);
   1046   1.166.2.2  uebayasi 		/* flush back-page anons? */
   1047   1.166.2.2  uebayasi 		if (amap)
   1048   1.166.2.2  uebayasi 			uvmfault_anonflush(*ranons, nback);
   1049   1.166.2.2  uebayasi 
   1050   1.166.2.2  uebayasi 		/* flush object? */
   1051   1.166.2.2  uebayasi 		if (uobj) {
   1052   1.166.2.2  uebayasi 			voff_t uoff;
   1053   1.166.2.2  uebayasi 
   1054   1.166.2.2  uebayasi 			uoff = ufi->entry->offset + eoff;
   1055   1.166.2.2  uebayasi 			mutex_enter(&uobj->vmobjlock);
   1056   1.166.2.2  uebayasi 			(void) (uobj->pgops->pgo_put)(uobj, uoff, uoff +
   1057   1.166.2.2  uebayasi 				    (nback << PAGE_SHIFT), PGO_DEACTIVATE);
   1058   1.166.2.2  uebayasi 		}
   1059   1.166.2.2  uebayasi 
   1060   1.166.2.2  uebayasi 		/* now forget about the backpages */
   1061   1.166.2.2  uebayasi 		if (amap)
   1062   1.166.2.2  uebayasi 			*ranons += nback;
   1063   1.166.2.2  uebayasi 		flt->startva += (nback << PAGE_SHIFT);
   1064   1.166.2.2  uebayasi 		flt->npages -= nback;
   1065   1.166.2.2  uebayasi 		flt->centeridx = 0;
   1066   1.166.2.2  uebayasi 	}
   1067   1.166.2.2  uebayasi 	/*
   1068   1.166.2.2  uebayasi 	 * => startva is fixed
   1069   1.166.2.2  uebayasi 	 * => npages is fixed
   1070   1.166.2.2  uebayasi 	 */
   1071   1.166.2.2  uebayasi 
   1072   1.166.2.2  uebayasi 	return 0;
   1073   1.166.2.2  uebayasi }
   1074   1.166.2.2  uebayasi 
   1075   1.166.2.5  uebayasi /*
   1076   1.166.2.5  uebayasi  * uvm_fault_upper_lookup: look up existing h/w mapping and amap.
   1077   1.166.2.5  uebayasi  *
   1078   1.166.2.5  uebayasi  * iterate range of interest:
   1079   1.166.2.5  uebayasi  *	1. check if h/w mapping exists.  if yes, we don't care
   1080   1.166.2.5  uebayasi  *	2. check if anon exists.  if not, page is lower.
   1081   1.166.2.5  uebayasi  *	3. if anon exists, enter h/w mapping for neighbors.
   1082   1.166.2.5  uebayasi  *
   1083   1.166.2.5  uebayasi  * => called with amap locked (if exists).
   1084   1.166.2.5  uebayasi  */
   1085   1.166.2.5  uebayasi 
   1086   1.166.2.2  uebayasi static int
   1087   1.166.2.2  uebayasi uvm_fault_upper_lookup(
   1088   1.166.2.2  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   1089   1.166.2.2  uebayasi 	struct vm_anon **anons, struct vm_page **pages)
   1090   1.166.2.2  uebayasi {
   1091   1.166.2.2  uebayasi 	struct vm_amap *amap = ufi->entry->aref.ar_amap;
   1092   1.166.2.2  uebayasi 	int lcv;
   1093   1.166.2.2  uebayasi 	vaddr_t currva;
   1094   1.166.2.2  uebayasi 	bool shadowed;
   1095   1.166.2.2  uebayasi 	UVMHIST_FUNC("uvm_fault_upper_lookup"); UVMHIST_CALLED(maphist);
   1096   1.166.2.2  uebayasi 
   1097   1.166.2.2  uebayasi 	/* locked: maps(read), amap(if there) */
   1098   1.166.2.2  uebayasi 	KASSERT(amap == NULL || mutex_owned(&amap->am_l));
   1099   1.166.2.2  uebayasi 
   1100   1.166.2.2  uebayasi 	/*
   1101   1.166.2.2  uebayasi 	 * map in the backpages and frontpages we found in the amap in hopes
   1102   1.166.2.2  uebayasi 	 * of preventing future faults.    we also init the pages[] array as
   1103   1.166.2.2  uebayasi 	 * we go.
   1104   1.166.2.2  uebayasi 	 */
   1105   1.166.2.2  uebayasi 
   1106   1.166.2.2  uebayasi 	currva = flt->startva;
   1107   1.166.2.2  uebayasi 	shadowed = false;
   1108   1.166.2.2  uebayasi 	for (lcv = 0; lcv < flt->npages; lcv++, currva += PAGE_SIZE) {
   1109   1.166.2.2  uebayasi 		/*
   1110   1.166.2.2  uebayasi 		 * dont play with VAs that are already mapped
   1111   1.166.2.2  uebayasi 		 * except for center)
   1112   1.166.2.2  uebayasi 		 */
   1113   1.166.2.2  uebayasi 		if (lcv != flt->centeridx &&
   1114   1.166.2.2  uebayasi 		    pmap_extract(ufi->orig_map->pmap, currva, NULL)) {
   1115   1.166.2.2  uebayasi 			pages[lcv] = PGO_DONTCARE;
   1116   1.166.2.2  uebayasi 			continue;
   1117   1.166.2.2  uebayasi 		}
   1118   1.166.2.2  uebayasi 
   1119   1.166.2.2  uebayasi 		/*
   1120   1.166.2.2  uebayasi 		 * unmapped or center page.   check if any anon at this level.
   1121   1.166.2.2  uebayasi 		 */
   1122   1.166.2.2  uebayasi 		if (amap == NULL || anons[lcv] == NULL) {
   1123   1.166.2.2  uebayasi 			pages[lcv] = NULL;
   1124   1.166.2.2  uebayasi 			continue;
   1125   1.166.2.2  uebayasi 		}
   1126   1.166.2.2  uebayasi 
   1127   1.166.2.2  uebayasi 		/*
   1128   1.166.2.2  uebayasi 		 * check for present page and map if possible.   re-activate it.
   1129   1.166.2.2  uebayasi 		 */
   1130   1.166.2.2  uebayasi 
   1131   1.166.2.2  uebayasi 		pages[lcv] = PGO_DONTCARE;
   1132   1.166.2.2  uebayasi 		if (lcv == flt->centeridx) {		/* save center for later! */
   1133   1.166.2.2  uebayasi 			shadowed = true;
   1134   1.166.2.2  uebayasi 		} else {
   1135   1.166.2.2  uebayasi 			struct vm_anon *anon = anons[lcv];
   1136   1.166.2.2  uebayasi 
   1137   1.166.2.2  uebayasi 			mutex_enter(&anon->an_lock);
   1138   1.166.2.5  uebayasi 			struct vm_page *pg = anon->an_page;
   1139   1.166.2.5  uebayasi 
   1140   1.166.2.5  uebayasi 			/* ignore loaned and busy pages */
   1141   1.166.2.5  uebayasi 			if (pg != NULL && pg->loan_count == 0 &&
   1142   1.166.2.5  uebayasi 			    (pg->flags & PG_BUSY) == 0)
   1143   1.166.2.5  uebayasi 				uvm_fault_upper_neighbor(ufi, flt, currva,
   1144   1.166.2.5  uebayasi 				    pg, anon->an_ref > 1);
   1145   1.166.2.2  uebayasi 			mutex_exit(&anon->an_lock);
   1146   1.166.2.2  uebayasi 		}
   1147   1.166.2.2  uebayasi 	}
   1148   1.166.2.2  uebayasi 
   1149   1.166.2.2  uebayasi 	/* locked: maps(read), amap(if there) */
   1150   1.166.2.2  uebayasi 	KASSERT(amap == NULL || mutex_owned(&amap->am_l));
   1151   1.166.2.2  uebayasi 	/* (shadowed == true) if there is an anon at the faulting address */
   1152   1.166.2.2  uebayasi 	UVMHIST_LOG(maphist, "  shadowed=%d, will_get=%d", shadowed,
   1153   1.166.2.2  uebayasi 	    (ufi->entry->object.uvm_obj && shadowed != false),0,0);
   1154   1.166.2.2  uebayasi 
   1155   1.166.2.2  uebayasi 	/*
   1156   1.166.2.2  uebayasi 	 * note that if we are really short of RAM we could sleep in the above
   1157   1.166.2.2  uebayasi 	 * call to pmap_enter with everything locked.   bad?
   1158   1.166.2.2  uebayasi 	 *
   1159   1.166.2.2  uebayasi 	 * XXX Actually, that is bad; pmap_enter() should just fail in that
   1160   1.166.2.2  uebayasi 	 * XXX case.  --thorpej
   1161   1.166.2.2  uebayasi 	 */
   1162   1.166.2.2  uebayasi 
   1163   1.166.2.2  uebayasi 	return 0;
   1164   1.166.2.2  uebayasi }
   1165   1.166.2.2  uebayasi 
   1166   1.166.2.5  uebayasi /*
   1167   1.166.2.5  uebayasi  * uvm_fault_upper_neighbor: enter single lower neighbor page.
   1168   1.166.2.5  uebayasi  *
   1169   1.166.2.5  uebayasi  * => called with amap and anon locked.
   1170   1.166.2.5  uebayasi  */
   1171   1.166.2.5  uebayasi 
   1172   1.166.2.2  uebayasi static void
   1173   1.166.2.2  uebayasi uvm_fault_upper_neighbor(
   1174   1.166.2.2  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   1175   1.166.2.2  uebayasi 	vaddr_t currva, struct vm_page *pg, bool readonly)
   1176   1.166.2.2  uebayasi {
   1177   1.166.2.2  uebayasi 	UVMHIST_FUNC("uvm_fault_upper_neighbor"); UVMHIST_CALLED(maphist);
   1178   1.166.2.2  uebayasi 
   1179   1.166.2.5  uebayasi 	/* locked: amap, anon */
   1180   1.166.2.2  uebayasi 
   1181   1.166.2.2  uebayasi 	mutex_enter(&uvm_pageqlock);
   1182   1.166.2.2  uebayasi 	uvm_pageenqueue(pg);
   1183   1.166.2.2  uebayasi 	mutex_exit(&uvm_pageqlock);
   1184   1.166.2.2  uebayasi 	UVMHIST_LOG(maphist,
   1185   1.166.2.2  uebayasi 	    "  MAPPING: n anon: pm=0x%x, va=0x%x, pg=0x%x",
   1186   1.166.2.2  uebayasi 	    ufi->orig_map->pmap, currva, pg, 0);
   1187   1.166.2.2  uebayasi 	uvmexp.fltnamap++;
   1188   1.166.2.2  uebayasi 
   1189   1.166.2.2  uebayasi 	/*
   1190   1.166.2.2  uebayasi 	 * Since this page isn't the page that's actually faulting,
   1191   1.166.2.2  uebayasi 	 * ignore pmap_enter() failures; it's not critical that we
   1192   1.166.2.2  uebayasi 	 * enter these right now.
   1193   1.166.2.2  uebayasi 	 */
   1194   1.166.2.2  uebayasi 
   1195   1.166.2.2  uebayasi 	(void) pmap_enter(ufi->orig_map->pmap, currva,
   1196   1.166.2.2  uebayasi 	    VM_PAGE_TO_PHYS(pg),
   1197   1.166.2.2  uebayasi 	    readonly ? (flt->enter_prot & ~VM_PROT_WRITE) :
   1198   1.166.2.2  uebayasi 	    flt->enter_prot,
   1199   1.166.2.2  uebayasi 	    PMAP_CANFAIL | (flt->wire_mapping ? PMAP_WIRED : 0));
   1200   1.166.2.2  uebayasi 
   1201   1.166.2.2  uebayasi 	pmap_update(ufi->orig_map->pmap);
   1202   1.166.2.2  uebayasi }
   1203   1.166.2.2  uebayasi 
   1204   1.166.2.5  uebayasi /*
   1205   1.166.2.5  uebayasi  * uvm_fault_upper: handle upper fault.
   1206   1.166.2.5  uebayasi  *
   1207   1.166.2.5  uebayasi  *	1. acquire anon lock.
   1208   1.166.2.5  uebayasi  *	2. get anon.  let uvmfault_anonget do the dirty work.
   1209   1.166.2.5  uebayasi  *	3. handle loan.
   1210   1.166.2.5  uebayasi  *	4. dispatch direct or promote handlers.
   1211   1.166.2.5  uebayasi  */
   1212  1.166.2.11  uebayasi 
   1213   1.166.2.2  uebayasi static int
   1214   1.166.2.2  uebayasi uvm_fault_upper(
   1215   1.166.2.2  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   1216   1.166.2.2  uebayasi 	struct vm_anon **anons)
   1217   1.166.2.2  uebayasi {
   1218   1.166.2.2  uebayasi 	struct vm_amap * const amap = ufi->entry->aref.ar_amap;
   1219   1.166.2.2  uebayasi 	struct vm_anon * const anon = anons[flt->centeridx];
   1220   1.166.2.2  uebayasi 	struct uvm_object *uobj;
   1221   1.166.2.2  uebayasi 	int error;
   1222   1.166.2.2  uebayasi 	UVMHIST_FUNC("uvm_fault_upper"); UVMHIST_CALLED(maphist);
   1223   1.166.2.2  uebayasi 
   1224   1.166.2.2  uebayasi 	/* locked: maps(read), amap */
   1225   1.166.2.2  uebayasi 	KASSERT(mutex_owned(&amap->am_l));
   1226   1.166.2.2  uebayasi 
   1227   1.166.2.2  uebayasi 	/*
   1228   1.166.2.2  uebayasi 	 * handle case 1: fault on an anon in our amap
   1229   1.166.2.2  uebayasi 	 */
   1230   1.166.2.2  uebayasi 
   1231   1.166.2.2  uebayasi 	UVMHIST_LOG(maphist, "  case 1 fault: anon=0x%x", anon, 0,0,0);
   1232   1.166.2.2  uebayasi 	mutex_enter(&anon->an_lock);
   1233   1.166.2.2  uebayasi 
   1234   1.166.2.2  uebayasi 	/* locked: maps(read), amap, anon */
   1235   1.166.2.2  uebayasi 	KASSERT(mutex_owned(&amap->am_l));
   1236   1.166.2.2  uebayasi 	KASSERT(mutex_owned(&anon->an_lock));
   1237   1.166.2.2  uebayasi 
   1238   1.166.2.2  uebayasi 	/*
   1239   1.166.2.2  uebayasi 	 * no matter if we have case 1A or case 1B we are going to need to
   1240   1.166.2.2  uebayasi 	 * have the anon's memory resident.   ensure that now.
   1241   1.166.2.2  uebayasi 	 */
   1242   1.166.2.2  uebayasi 
   1243   1.166.2.2  uebayasi 	/*
   1244   1.166.2.2  uebayasi 	 * let uvmfault_anonget do the dirty work.
   1245   1.166.2.2  uebayasi 	 * if it fails (!OK) it will unlock everything for us.
   1246   1.166.2.2  uebayasi 	 * if it succeeds, locks are still valid and locked.
   1247   1.166.2.2  uebayasi 	 * also, if it is OK, then the anon's page is on the queues.
   1248   1.166.2.2  uebayasi 	 * if the page is on loan from a uvm_object, then anonget will
   1249   1.166.2.2  uebayasi 	 * lock that object for us if it does not fail.
   1250   1.166.2.2  uebayasi 	 */
   1251   1.166.2.2  uebayasi 
   1252   1.166.2.2  uebayasi 	error = uvmfault_anonget(ufi, amap, anon);
   1253   1.166.2.2  uebayasi 	switch (error) {
   1254   1.166.2.2  uebayasi 	case 0:
   1255   1.166.2.2  uebayasi 		break;
   1256   1.166.2.2  uebayasi 
   1257   1.166.2.2  uebayasi 	case ERESTART:
   1258   1.166.2.2  uebayasi 		return ERESTART;
   1259   1.166.2.2  uebayasi 
   1260   1.166.2.2  uebayasi 	case EAGAIN:
   1261   1.166.2.2  uebayasi 		kpause("fltagain1", false, hz/2, NULL);
   1262   1.166.2.2  uebayasi 		return ERESTART;
   1263   1.166.2.2  uebayasi 
   1264   1.166.2.2  uebayasi 	default:
   1265   1.166.2.2  uebayasi 		return error;
   1266   1.166.2.2  uebayasi 	}
   1267   1.166.2.2  uebayasi 
   1268   1.166.2.2  uebayasi 	/*
   1269   1.166.2.2  uebayasi 	 * uobj is non null if the page is on loan from an object (i.e. uobj)
   1270   1.166.2.2  uebayasi 	 */
   1271   1.166.2.2  uebayasi 
   1272   1.166.2.2  uebayasi 	uobj = anon->an_page->uobject;	/* locked by anonget if !NULL */
   1273   1.166.2.2  uebayasi 
   1274   1.166.2.2  uebayasi 	/* locked: maps(read), amap, anon, uobj(if one) */
   1275   1.166.2.2  uebayasi 	KASSERT(mutex_owned(&amap->am_l));
   1276   1.166.2.2  uebayasi 	KASSERT(mutex_owned(&anon->an_lock));
   1277   1.166.2.2  uebayasi 	KASSERT(uobj == NULL || mutex_owned(&uobj->vmobjlock));
   1278   1.166.2.2  uebayasi 
   1279   1.166.2.2  uebayasi 	/*
   1280   1.166.2.2  uebayasi 	 * special handling for loaned pages
   1281   1.166.2.2  uebayasi 	 */
   1282   1.166.2.2  uebayasi 
   1283   1.166.2.2  uebayasi 	if (anon->an_page->loan_count) {
   1284   1.166.2.2  uebayasi 		error = uvm_fault_upper_loan(ufi, flt, anon, &uobj);
   1285   1.166.2.2  uebayasi 		if (error != 0)
   1286   1.166.2.2  uebayasi 			return error;
   1287   1.166.2.2  uebayasi 	}
   1288   1.166.2.2  uebayasi 
   1289   1.166.2.2  uebayasi 	/*
   1290   1.166.2.2  uebayasi 	 * if we are case 1B then we will need to allocate a new blank
   1291   1.166.2.2  uebayasi 	 * anon to transfer the data into.   note that we have a lock
   1292   1.166.2.2  uebayasi 	 * on anon, so no one can busy or release the page until we are done.
   1293   1.166.2.2  uebayasi 	 * also note that the ref count can't drop to zero here because
   1294   1.166.2.2  uebayasi 	 * it is > 1 and we are only dropping one ref.
   1295   1.166.2.2  uebayasi 	 *
   1296   1.166.2.2  uebayasi 	 * in the (hopefully very rare) case that we are out of RAM we
   1297   1.166.2.2  uebayasi 	 * will unlock, wait for more RAM, and refault.
   1298   1.166.2.2  uebayasi 	 *
   1299   1.166.2.2  uebayasi 	 * if we are out of anon VM we kill the process (XXX: could wait?).
   1300   1.166.2.2  uebayasi 	 */
   1301   1.166.2.2  uebayasi 
   1302   1.166.2.2  uebayasi 	if (flt->cow_now && anon->an_ref > 1) {
   1303   1.166.2.5  uebayasi 		flt->promote = true;
   1304   1.166.2.2  uebayasi 		error = uvm_fault_upper_promote(ufi, flt, uobj, anon);
   1305   1.166.2.2  uebayasi 	} else {
   1306   1.166.2.2  uebayasi 		error = uvm_fault_upper_direct(ufi, flt, uobj, anon);
   1307   1.166.2.2  uebayasi 	}
   1308   1.166.2.2  uebayasi 	return error;
   1309   1.166.2.2  uebayasi }
   1310   1.166.2.2  uebayasi 
   1311   1.166.2.5  uebayasi /*
   1312   1.166.2.5  uebayasi  * uvm_fault_upper_loan: handle loaned upper page.
   1313   1.166.2.5  uebayasi  *
   1314   1.166.2.5  uebayasi  *	1. if not cow'ing now, just mark enter_prot as read-only.
   1315   1.166.2.5  uebayasi  *	2. if cow'ing now, and if ref count is 1, break loan.
   1316   1.166.2.5  uebayasi  */
   1317   1.166.2.5  uebayasi 
   1318   1.166.2.2  uebayasi static int
   1319   1.166.2.2  uebayasi uvm_fault_upper_loan(
   1320   1.166.2.2  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   1321   1.166.2.2  uebayasi 	struct vm_anon *anon, struct uvm_object **ruobj)
   1322   1.166.2.2  uebayasi {
   1323   1.166.2.2  uebayasi 	struct vm_amap * const amap = ufi->entry->aref.ar_amap;
   1324   1.166.2.2  uebayasi 	int error = 0;
   1325   1.166.2.5  uebayasi 	UVMHIST_FUNC("uvm_fault_upper_loan"); UVMHIST_CALLED(maphist);
   1326   1.166.2.2  uebayasi 
   1327   1.166.2.2  uebayasi 	if (!flt->cow_now) {
   1328   1.166.2.2  uebayasi 
   1329   1.166.2.2  uebayasi 		/*
   1330   1.166.2.2  uebayasi 		 * for read faults on loaned pages we just cap the
   1331   1.166.2.2  uebayasi 		 * protection at read-only.
   1332   1.166.2.2  uebayasi 		 */
   1333   1.166.2.2  uebayasi 
   1334   1.166.2.2  uebayasi 		flt->enter_prot = flt->enter_prot & ~VM_PROT_WRITE;
   1335   1.166.2.2  uebayasi 
   1336   1.166.2.2  uebayasi 	} else {
   1337   1.166.2.2  uebayasi 		/*
   1338   1.166.2.2  uebayasi 		 * note that we can't allow writes into a loaned page!
   1339   1.166.2.2  uebayasi 		 *
   1340   1.166.2.2  uebayasi 		 * if we have a write fault on a loaned page in an
   1341   1.166.2.2  uebayasi 		 * anon then we need to look at the anon's ref count.
   1342   1.166.2.2  uebayasi 		 * if it is greater than one then we are going to do
   1343   1.166.2.2  uebayasi 		 * a normal copy-on-write fault into a new anon (this
   1344   1.166.2.2  uebayasi 		 * is not a problem).  however, if the reference count
   1345   1.166.2.2  uebayasi 		 * is one (a case where we would normally allow a
   1346   1.166.2.2  uebayasi 		 * write directly to the page) then we need to kill
   1347   1.166.2.2  uebayasi 		 * the loan before we continue.
   1348   1.166.2.2  uebayasi 		 */
   1349   1.166.2.2  uebayasi 
   1350   1.166.2.2  uebayasi 		/* >1 case is already ok */
   1351   1.166.2.2  uebayasi 		if (anon->an_ref == 1) {
   1352   1.166.2.2  uebayasi 			error = uvm_loanbreak_anon(anon, *ruobj);
   1353   1.166.2.2  uebayasi 			if (error != 0) {
   1354   1.166.2.2  uebayasi 				uvmfault_unlockall(ufi, amap, *ruobj, anon);
   1355   1.166.2.2  uebayasi 				uvm_wait("flt_noram2");
   1356   1.166.2.2  uebayasi 				return ERESTART;
   1357   1.166.2.2  uebayasi 			}
   1358   1.166.2.2  uebayasi 			/* if we were a loan reciever uobj is gone */
   1359   1.166.2.2  uebayasi 			if (*ruobj)
   1360   1.166.2.2  uebayasi 				*ruobj = NULL;
   1361   1.166.2.2  uebayasi 		}
   1362   1.166.2.2  uebayasi 	}
   1363   1.166.2.2  uebayasi 	return error;
   1364   1.166.2.2  uebayasi }
   1365   1.166.2.2  uebayasi 
   1366   1.166.2.5  uebayasi /*
   1367   1.166.2.5  uebayasi  * uvm_fault_upper_promote: promote upper page.
   1368   1.166.2.5  uebayasi  *
   1369   1.166.2.5  uebayasi  *	1. call uvmfault_promote.
   1370   1.166.2.5  uebayasi  *	2. enqueue page.
   1371   1.166.2.5  uebayasi  *	3. deref.
   1372   1.166.2.5  uebayasi  *	4. pass page to uvm_fault_upper_enter.
   1373   1.166.2.5  uebayasi  */
   1374   1.166.2.5  uebayasi 
   1375   1.166.2.2  uebayasi static int
   1376   1.166.2.2  uebayasi uvm_fault_upper_promote(
   1377   1.166.2.2  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   1378   1.166.2.2  uebayasi 	struct uvm_object *uobj, struct vm_anon *anon)
   1379   1.166.2.2  uebayasi {
   1380   1.166.2.2  uebayasi 	struct vm_anon * const oanon = anon;
   1381   1.166.2.2  uebayasi 	struct vm_page *pg;
   1382   1.166.2.2  uebayasi 	int error;
   1383   1.166.2.2  uebayasi 	UVMHIST_FUNC("uvm_fault_upper_promote"); UVMHIST_CALLED(maphist);
   1384   1.166.2.2  uebayasi 
   1385   1.166.2.2  uebayasi 	UVMHIST_LOG(maphist, "  case 1B: COW fault",0,0,0,0);
   1386   1.166.2.2  uebayasi 	uvmexp.flt_acow++;
   1387   1.166.2.2  uebayasi 
   1388   1.166.2.2  uebayasi 	error = uvmfault_promote(ufi, oanon, NULL, PGO_DONTCARE,
   1389   1.166.2.2  uebayasi 	    &anon, &flt->anon_spare);
   1390   1.166.2.2  uebayasi 	switch (error) {
   1391   1.166.2.2  uebayasi 	case 0:
   1392   1.166.2.2  uebayasi 		break;
   1393   1.166.2.2  uebayasi 	case ERESTART:
   1394   1.166.2.2  uebayasi 		return ERESTART;
   1395   1.166.2.2  uebayasi 	default:
   1396   1.166.2.2  uebayasi 		return error;
   1397   1.166.2.2  uebayasi 	}
   1398   1.166.2.2  uebayasi 
   1399   1.166.2.2  uebayasi 	pg = anon->an_page;
   1400   1.166.2.2  uebayasi 	mutex_enter(&uvm_pageqlock);
   1401   1.166.2.2  uebayasi 	uvm_pageactivate(pg);
   1402   1.166.2.2  uebayasi 	mutex_exit(&uvm_pageqlock);
   1403   1.166.2.2  uebayasi 	pg->flags &= ~(PG_BUSY|PG_FAKE);
   1404   1.166.2.2  uebayasi 	UVM_PAGE_OWN(pg, NULL);
   1405   1.166.2.2  uebayasi 
   1406   1.166.2.2  uebayasi 	/* deref: can not drop to zero here by defn! */
   1407   1.166.2.2  uebayasi 	oanon->an_ref--;
   1408   1.166.2.2  uebayasi 
   1409   1.166.2.2  uebayasi 	/*
   1410   1.166.2.2  uebayasi 	 * note: oanon is still locked, as is the new anon.  we
   1411   1.166.2.2  uebayasi 	 * need to check for this later when we unlock oanon; if
   1412   1.166.2.2  uebayasi 	 * oanon != anon, we'll have to unlock anon, too.
   1413   1.166.2.2  uebayasi 	 */
   1414   1.166.2.2  uebayasi 
   1415   1.166.2.2  uebayasi 	return uvm_fault_upper_enter(ufi, flt, uobj, anon, pg, oanon);
   1416   1.166.2.2  uebayasi }
   1417   1.166.2.2  uebayasi 
   1418   1.166.2.5  uebayasi /*
   1419   1.166.2.5  uebayasi  * uvm_fault_upper_direct: handle direct fault.
   1420   1.166.2.5  uebayasi  */
   1421   1.166.2.5  uebayasi 
   1422   1.166.2.2  uebayasi static int
   1423   1.166.2.2  uebayasi uvm_fault_upper_direct(
   1424   1.166.2.2  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   1425   1.166.2.2  uebayasi 	struct uvm_object *uobj, struct vm_anon *anon)
   1426   1.166.2.2  uebayasi {
   1427   1.166.2.2  uebayasi 	struct vm_anon * const oanon = anon;
   1428   1.166.2.2  uebayasi 	struct vm_page *pg;
   1429   1.166.2.5  uebayasi 	UVMHIST_FUNC("uvm_fault_upper_direct"); UVMHIST_CALLED(maphist);
   1430   1.166.2.2  uebayasi 
   1431   1.166.2.2  uebayasi 	uvmexp.flt_anon++;
   1432   1.166.2.2  uebayasi 	pg = anon->an_page;
   1433   1.166.2.2  uebayasi 	if (anon->an_ref > 1)     /* disallow writes to ref > 1 anons */
   1434   1.166.2.2  uebayasi 		flt->enter_prot = flt->enter_prot & ~VM_PROT_WRITE;
   1435   1.166.2.2  uebayasi 
   1436   1.166.2.2  uebayasi 	return uvm_fault_upper_enter(ufi, flt, uobj, anon, pg, oanon);
   1437   1.166.2.2  uebayasi }
   1438   1.166.2.2  uebayasi 
   1439   1.166.2.5  uebayasi /*
   1440   1.166.2.5  uebayasi  * uvm_fault_upper_enter: enter h/w mapping of upper page.
   1441   1.166.2.5  uebayasi  */
   1442   1.166.2.5  uebayasi 
   1443   1.166.2.2  uebayasi static int
   1444   1.166.2.2  uebayasi uvm_fault_upper_enter(
   1445   1.166.2.2  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   1446   1.166.2.2  uebayasi 	struct uvm_object *uobj, struct vm_anon *anon, struct vm_page *pg,
   1447   1.166.2.2  uebayasi 	struct vm_anon *oanon)
   1448   1.166.2.2  uebayasi {
   1449   1.166.2.2  uebayasi 	struct vm_amap * const amap = ufi->entry->aref.ar_amap;
   1450   1.166.2.2  uebayasi 	UVMHIST_FUNC("uvm_fault_upper_enter"); UVMHIST_CALLED(maphist);
   1451   1.166.2.2  uebayasi 
   1452   1.166.2.5  uebayasi 	/* locked: maps(read), amap, oanon, anon(if different from oanon) */
   1453   1.166.2.2  uebayasi 	KASSERT(mutex_owned(&amap->am_l));
   1454   1.166.2.2  uebayasi 	KASSERT(mutex_owned(&anon->an_lock));
   1455   1.166.2.2  uebayasi 	KASSERT(mutex_owned(&oanon->an_lock));
   1456   1.166.2.2  uebayasi 
   1457   1.166.2.2  uebayasi 	/*
   1458   1.166.2.2  uebayasi 	 * now map the page in.
   1459   1.166.2.2  uebayasi 	 */
   1460   1.166.2.2  uebayasi 
   1461   1.166.2.5  uebayasi 	UVMHIST_LOG(maphist, "  MAPPING: anon: pm=0x%x, va=0x%x, pg=0x%x, promote=%d",
   1462   1.166.2.5  uebayasi 	    ufi->orig_map->pmap, ufi->orig_rvaddr, pg, flt->promote);
   1463   1.166.2.2  uebayasi 	if (pmap_enter(ufi->orig_map->pmap, ufi->orig_rvaddr, VM_PAGE_TO_PHYS(pg),
   1464   1.166.2.2  uebayasi 	    flt->enter_prot, flt->access_type | PMAP_CANFAIL | (flt->wire_mapping ? PMAP_WIRED : 0))
   1465   1.166.2.2  uebayasi 	    != 0) {
   1466   1.166.2.2  uebayasi 
   1467   1.166.2.2  uebayasi 		/*
   1468   1.166.2.2  uebayasi 		 * No need to undo what we did; we can simply think of
   1469   1.166.2.2  uebayasi 		 * this as the pmap throwing away the mapping information.
   1470   1.166.2.2  uebayasi 		 *
   1471   1.166.2.2  uebayasi 		 * We do, however, have to go through the ReFault path,
   1472   1.166.2.2  uebayasi 		 * as the map may change while we're asleep.
   1473   1.166.2.2  uebayasi 		 */
   1474   1.166.2.2  uebayasi 
   1475   1.166.2.2  uebayasi 		if (anon != oanon)
   1476   1.166.2.2  uebayasi 			mutex_exit(&anon->an_lock);
   1477   1.166.2.2  uebayasi 		uvmfault_unlockall(ufi, amap, uobj, oanon);
   1478   1.166.2.2  uebayasi 		if (!uvm_reclaimable()) {
   1479   1.166.2.2  uebayasi 			UVMHIST_LOG(maphist,
   1480   1.166.2.2  uebayasi 			    "<- failed.  out of VM",0,0,0,0);
   1481   1.166.2.2  uebayasi 			/* XXX instrumentation */
   1482   1.166.2.2  uebayasi 			return ENOMEM;
   1483   1.166.2.2  uebayasi 		}
   1484   1.166.2.2  uebayasi 		/* XXX instrumentation */
   1485   1.166.2.2  uebayasi 		uvm_wait("flt_pmfail1");
   1486   1.166.2.2  uebayasi 		return ERESTART;
   1487   1.166.2.2  uebayasi 	}
   1488   1.166.2.2  uebayasi 
   1489   1.166.2.5  uebayasi 	uvm_fault_upper_done(ufi, flt, uobj, anon, pg);
   1490   1.166.2.5  uebayasi 
   1491   1.166.2.5  uebayasi 	/*
   1492   1.166.2.5  uebayasi 	 * done case 1!  finish up by unlocking everything and returning success
   1493   1.166.2.5  uebayasi 	 */
   1494   1.166.2.5  uebayasi 
   1495   1.166.2.5  uebayasi 	if (anon != oanon)
   1496   1.166.2.5  uebayasi 		mutex_exit(&anon->an_lock);
   1497   1.166.2.5  uebayasi 	uvmfault_unlockall(ufi, amap, uobj, oanon);
   1498   1.166.2.5  uebayasi 	pmap_update(ufi->orig_map->pmap);
   1499   1.166.2.5  uebayasi 	return 0;
   1500   1.166.2.2  uebayasi }
   1501   1.166.2.2  uebayasi 
   1502   1.166.2.5  uebayasi /*
   1503   1.166.2.5  uebayasi  * uvm_fault_upper_done: queue upper center page.
   1504   1.166.2.5  uebayasi  */
   1505   1.166.2.5  uebayasi 
   1506   1.166.2.5  uebayasi static void
   1507   1.166.2.2  uebayasi uvm_fault_upper_done(
   1508   1.166.2.2  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   1509   1.166.2.5  uebayasi 	struct uvm_object *uobj, struct vm_anon *anon, struct vm_page *pg)
   1510   1.166.2.2  uebayasi {
   1511   1.166.2.5  uebayasi 	UVMHIST_FUNC("uvm_fault_upper_done"); UVMHIST_CALLED(maphist);
   1512   1.166.2.2  uebayasi 
   1513   1.166.2.2  uebayasi 	/*
   1514   1.166.2.2  uebayasi 	 * ... update the page queues.
   1515   1.166.2.2  uebayasi 	 */
   1516   1.166.2.2  uebayasi 
   1517   1.166.2.2  uebayasi 	mutex_enter(&uvm_pageqlock);
   1518   1.166.2.2  uebayasi 	if (flt->wire_paging) {
   1519   1.166.2.2  uebayasi 		uvm_pagewire(pg);
   1520   1.166.2.2  uebayasi 
   1521   1.166.2.2  uebayasi 		/*
   1522   1.166.2.2  uebayasi 		 * since the now-wired page cannot be paged out,
   1523   1.166.2.2  uebayasi 		 * release its swap resources for others to use.
   1524   1.166.2.2  uebayasi 		 * since an anon with no swap cannot be PG_CLEAN,
   1525   1.166.2.2  uebayasi 		 * clear its clean flag now.
   1526   1.166.2.2  uebayasi 		 */
   1527   1.166.2.2  uebayasi 
   1528   1.166.2.2  uebayasi 		pg->flags &= ~(PG_CLEAN);
   1529   1.166.2.2  uebayasi 		uvm_anon_dropswap(anon);
   1530   1.166.2.2  uebayasi 	} else {
   1531   1.166.2.2  uebayasi 		uvm_pageactivate(pg);
   1532   1.166.2.2  uebayasi 	}
   1533   1.166.2.2  uebayasi 	mutex_exit(&uvm_pageqlock);
   1534   1.166.2.2  uebayasi }
   1535   1.166.2.2  uebayasi 
   1536   1.166.2.5  uebayasi /*
   1537   1.166.2.5  uebayasi  * uvm_fault_lower: handle lower fault.
   1538   1.166.2.5  uebayasi  *
   1539   1.166.2.5  uebayasi  *	1. check uobj
   1540   1.166.2.5  uebayasi  *	1.1. if null, ZFOD.
   1541   1.166.2.5  uebayasi  *	1.2. if not null, look up unnmapped neighbor pages.
   1542   1.166.2.5  uebayasi  *	2. for center page, check if promote.
   1543   1.166.2.5  uebayasi  *	2.1. ZFOD always needs promotion.
   1544   1.166.2.5  uebayasi  *	2.2. other uobjs, when entry is marked COW (usually MAP_PRIVATE vnode).
   1545   1.166.2.5  uebayasi  *	3. if uobj is not ZFOD and page is not found, do i/o.
   1546   1.166.2.5  uebayasi  *	4. dispatch either direct / promote fault.
   1547   1.166.2.5  uebayasi  */
   1548   1.166.2.5  uebayasi 
   1549   1.166.2.2  uebayasi static int
   1550   1.166.2.5  uebayasi uvm_fault_lower(
   1551   1.166.2.2  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   1552   1.166.2.5  uebayasi 	struct vm_page **pages)
   1553   1.166.2.2  uebayasi {
   1554   1.166.2.2  uebayasi #ifdef DIAGNOSTIC
   1555   1.166.2.5  uebayasi 	struct vm_amap *amap = ufi->entry->aref.ar_amap;
   1556   1.166.2.2  uebayasi #endif
   1557   1.166.2.5  uebayasi 	struct uvm_object *uobj = ufi->entry->object.uvm_obj;
   1558   1.166.2.5  uebayasi 	struct vm_page *uobjpage;
   1559   1.166.2.2  uebayasi 	int error;
   1560   1.166.2.5  uebayasi 	UVMHIST_FUNC("uvm_fault_lower"); UVMHIST_CALLED(maphist);
   1561   1.166.2.5  uebayasi 
   1562   1.166.2.5  uebayasi 	/* locked: maps(read), amap(if there), uobj(if !null) */
   1563   1.166.2.2  uebayasi 
   1564   1.166.2.2  uebayasi 	/*
   1565   1.166.2.5  uebayasi 	 * now, if the desired page is not shadowed by the amap and we have
   1566   1.166.2.5  uebayasi 	 * a backing object that does not have a special fault routine, then
   1567   1.166.2.5  uebayasi 	 * we ask (with pgo_get) the object for resident pages that we care
   1568   1.166.2.5  uebayasi 	 * about and attempt to map them in.  we do not let pgo_get block
   1569   1.166.2.5  uebayasi 	 * (PGO_LOCKED).
   1570   1.166.2.5  uebayasi 	 */
   1571   1.166.2.5  uebayasi 
   1572   1.166.2.5  uebayasi 	if (uobj == NULL) {
   1573   1.166.2.5  uebayasi 		/* zero fill; don't care neighbor pages */
   1574   1.166.2.5  uebayasi 		uobjpage = NULL;
   1575   1.166.2.5  uebayasi 	} else {
   1576   1.166.2.5  uebayasi 		uvm_fault_lower_lookup(ufi, flt, pages);
   1577   1.166.2.5  uebayasi 		uobjpage = pages[flt->centeridx];
   1578   1.166.2.5  uebayasi 	}
   1579   1.166.2.5  uebayasi 
   1580   1.166.2.5  uebayasi 	/* locked: maps(read), amap(if there), uobj(if !null), uobjpage(if !null) */
   1581   1.166.2.5  uebayasi 	KASSERT(amap == NULL || mutex_owned(&amap->am_l));
   1582   1.166.2.5  uebayasi 	KASSERT(uobj == NULL || mutex_owned(&uobj->vmobjlock));
   1583  1.166.2.13  uebayasi 	KASSERT(uobjpage == NULL || (uobjpage->flags & PG_BUSY) != 0);
   1584   1.166.2.5  uebayasi 
   1585   1.166.2.5  uebayasi 	/*
   1586   1.166.2.5  uebayasi 	 * note that at this point we are done with any front or back pages.
   1587   1.166.2.5  uebayasi 	 * we are now going to focus on the center page (i.e. the one we've
   1588   1.166.2.5  uebayasi 	 * faulted on).  if we have faulted on the upper (anon) layer
   1589   1.166.2.5  uebayasi 	 * [i.e. case 1], then the anon we want is anons[centeridx] (we have
   1590   1.166.2.5  uebayasi 	 * not touched it yet).  if we have faulted on the bottom (uobj)
   1591   1.166.2.5  uebayasi 	 * layer [i.e. case 2] and the page was both present and available,
   1592   1.166.2.5  uebayasi 	 * then we've got a pointer to it as "uobjpage" and we've already
   1593   1.166.2.5  uebayasi 	 * made it BUSY.
   1594   1.166.2.2  uebayasi 	 */
   1595   1.166.2.2  uebayasi 
   1596   1.166.2.2  uebayasi 	/*
   1597   1.166.2.2  uebayasi 	 * locked:
   1598   1.166.2.2  uebayasi 	 * maps(read), amap(if there), uobj(if !null), uobjpage(if !null)
   1599   1.166.2.2  uebayasi 	 */
   1600   1.166.2.2  uebayasi 	KASSERT(amap == NULL || mutex_owned(&amap->am_l));
   1601   1.166.2.2  uebayasi 	KASSERT(uobj == NULL || mutex_owned(&uobj->vmobjlock));
   1602  1.166.2.13  uebayasi 	KASSERT(uobjpage == NULL || (uobjpage->flags & PG_BUSY) != 0);
   1603   1.166.2.2  uebayasi 
   1604   1.166.2.2  uebayasi 	/*
   1605   1.166.2.2  uebayasi 	 * note that uobjpage can not be PGO_DONTCARE at this point.  we now
   1606   1.166.2.2  uebayasi 	 * set uobjpage to PGO_DONTCARE if we are doing a zero fill.  if we
   1607   1.166.2.2  uebayasi 	 * have a backing object, check and see if we are going to promote
   1608   1.166.2.2  uebayasi 	 * the data up to an anon during the fault.
   1609   1.166.2.2  uebayasi 	 */
   1610   1.166.2.2  uebayasi 
   1611   1.166.2.2  uebayasi 	if (uobj == NULL) {
   1612   1.166.2.2  uebayasi 		uobjpage = PGO_DONTCARE;
   1613   1.166.2.5  uebayasi 		flt->promote = true;		/* always need anon here */
   1614   1.166.2.2  uebayasi 	} else {
   1615   1.166.2.2  uebayasi 		KASSERT(uobjpage != PGO_DONTCARE);
   1616   1.166.2.5  uebayasi 		flt->promote = flt->cow_now && UVM_ET_ISCOPYONWRITE(ufi->entry);
   1617   1.166.2.2  uebayasi 	}
   1618   1.166.2.2  uebayasi 	UVMHIST_LOG(maphist, "  case 2 fault: promote=%d, zfill=%d",
   1619   1.166.2.5  uebayasi 	    flt->promote, (uobj == NULL), 0,0);
   1620   1.166.2.2  uebayasi 
   1621   1.166.2.2  uebayasi 	/*
   1622   1.166.2.2  uebayasi 	 * if uobjpage is not null then we do not need to do I/O to get the
   1623   1.166.2.2  uebayasi 	 * uobjpage.
   1624   1.166.2.2  uebayasi 	 *
   1625   1.166.2.2  uebayasi 	 * if uobjpage is null, then we need to unlock and ask the pager to
   1626   1.166.2.2  uebayasi 	 * get the data for us.   once we have the data, we need to reverify
   1627   1.166.2.2  uebayasi 	 * the state the world.   we are currently not holding any resources.
   1628   1.166.2.2  uebayasi 	 */
   1629   1.166.2.2  uebayasi 
   1630   1.166.2.2  uebayasi 	if (uobjpage) {
   1631   1.166.2.2  uebayasi 		/* update rusage counters */
   1632   1.166.2.2  uebayasi 		curlwp->l_ru.ru_minflt++;
   1633   1.166.2.2  uebayasi 	} else {
   1634   1.166.2.2  uebayasi 		error = uvm_fault_lower_io(ufi, flt, &uobj, &uobjpage);
   1635   1.166.2.2  uebayasi 		if (error != 0)
   1636   1.166.2.2  uebayasi 			return error;
   1637   1.166.2.2  uebayasi 	}
   1638   1.166.2.2  uebayasi 
   1639   1.166.2.2  uebayasi 	/*
   1640   1.166.2.2  uebayasi 	 * locked:
   1641   1.166.2.2  uebayasi 	 * maps(read), amap(if !null), uobj(if !null), uobjpage(if uobj)
   1642   1.166.2.2  uebayasi 	 */
   1643   1.166.2.2  uebayasi 	KASSERT(amap == NULL || mutex_owned(&amap->am_l));
   1644   1.166.2.2  uebayasi 	KASSERT(uobj == NULL || mutex_owned(&uobj->vmobjlock));
   1645  1.166.2.13  uebayasi 	KASSERT(uobj == NULL || (uobjpage->flags & PG_BUSY) != 0);
   1646   1.166.2.2  uebayasi 
   1647   1.166.2.2  uebayasi 	/*
   1648   1.166.2.2  uebayasi 	 * notes:
   1649   1.166.2.2  uebayasi 	 *  - at this point uobjpage can not be NULL
   1650   1.166.2.2  uebayasi 	 *  - at this point uobjpage can not be PG_RELEASED (since we checked
   1651   1.166.2.2  uebayasi 	 *  for it above)
   1652   1.166.2.2  uebayasi 	 *  - at this point uobjpage could be PG_WANTED (handle later)
   1653   1.166.2.2  uebayasi 	 */
   1654   1.166.2.2  uebayasi 
   1655  1.166.2.13  uebayasi 	KASSERT(uobj == NULL || uobj == uobjpage->uobject);
   1656  1.166.2.13  uebayasi 	KASSERT(uobj == NULL || !UVM_OBJ_IS_CLEAN(uobjpage->uobject) ||
   1657   1.166.2.2  uebayasi 	    (uobjpage->flags & PG_CLEAN) != 0);
   1658   1.166.2.2  uebayasi 
   1659   1.166.2.5  uebayasi 	if (flt->promote == false) {
   1660   1.166.2.2  uebayasi 		error = uvm_fault_lower_direct(ufi, flt, uobj, uobjpage);
   1661   1.166.2.2  uebayasi 	} else {
   1662   1.166.2.2  uebayasi 		error = uvm_fault_lower_promote(ufi, flt, uobj, uobjpage);
   1663   1.166.2.2  uebayasi 	}
   1664   1.166.2.2  uebayasi 	return error;
   1665   1.166.2.2  uebayasi }
   1666   1.166.2.2  uebayasi 
   1667   1.166.2.5  uebayasi /*
   1668   1.166.2.5  uebayasi  * uvm_fault_lower_lookup: look up on-memory uobj pages.
   1669   1.166.2.5  uebayasi  *
   1670   1.166.2.5  uebayasi  *	1. get on-memory pages.
   1671   1.166.2.5  uebayasi  *	2. if failed, give up (get only center page later).
   1672   1.166.2.5  uebayasi  *	3. if succeeded, enter h/w mapping of neighbor pages.
   1673   1.166.2.5  uebayasi  */
   1674   1.166.2.5  uebayasi 
   1675   1.166.2.5  uebayasi static void
   1676   1.166.2.5  uebayasi uvm_fault_lower_lookup(
   1677   1.166.2.5  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   1678   1.166.2.5  uebayasi 	struct vm_page **pages)
   1679   1.166.2.5  uebayasi {
   1680   1.166.2.5  uebayasi 	struct uvm_object *uobj = ufi->entry->object.uvm_obj;
   1681   1.166.2.5  uebayasi 	int lcv, gotpages;
   1682   1.166.2.5  uebayasi 	vaddr_t currva;
   1683   1.166.2.5  uebayasi 	UVMHIST_FUNC("uvm_fault_lower_lookup"); UVMHIST_CALLED(maphist);
   1684   1.166.2.5  uebayasi 
   1685   1.166.2.5  uebayasi 	mutex_enter(&uobj->vmobjlock);
   1686   1.166.2.5  uebayasi 	/* locked: maps(read), amap(if there), uobj */
   1687   1.166.2.5  uebayasi 	/*
   1688   1.166.2.5  uebayasi 	 * the following call to pgo_get does _not_ change locking state
   1689   1.166.2.5  uebayasi 	 */
   1690   1.166.2.5  uebayasi 
   1691   1.166.2.5  uebayasi 	uvmexp.fltlget++;
   1692   1.166.2.5  uebayasi 	gotpages = flt->npages;
   1693   1.166.2.5  uebayasi 	(void) uobj->pgops->pgo_get(uobj,
   1694   1.166.2.5  uebayasi 	    ufi->entry->offset + flt->startva - ufi->entry->start,
   1695   1.166.2.5  uebayasi 	    pages, &gotpages, flt->centeridx,
   1696   1.166.2.5  uebayasi 	    flt->access_type & MASK(ufi->entry), ufi->entry->advice, PGO_LOCKED);
   1697   1.166.2.5  uebayasi 
   1698   1.166.2.5  uebayasi 	/*
   1699   1.166.2.5  uebayasi 	 * check for pages to map, if we got any
   1700   1.166.2.5  uebayasi 	 */
   1701   1.166.2.5  uebayasi 
   1702   1.166.2.5  uebayasi 	if (gotpages == 0) {
   1703   1.166.2.5  uebayasi 		pages[flt->centeridx] = NULL;
   1704   1.166.2.5  uebayasi 		return;
   1705   1.166.2.5  uebayasi 	}
   1706   1.166.2.5  uebayasi 
   1707   1.166.2.5  uebayasi 	currva = flt->startva;
   1708   1.166.2.5  uebayasi 	for (lcv = 0; lcv < flt->npages; lcv++, currva += PAGE_SIZE) {
   1709   1.166.2.5  uebayasi 		struct vm_page *curpg;
   1710   1.166.2.5  uebayasi 
   1711   1.166.2.5  uebayasi 		curpg = pages[lcv];
   1712   1.166.2.5  uebayasi 		if (curpg == NULL || curpg == PGO_DONTCARE) {
   1713   1.166.2.5  uebayasi 			continue;
   1714   1.166.2.5  uebayasi 		}
   1715  1.166.2.13  uebayasi 		KASSERT(curpg->uobject == uobj);
   1716   1.166.2.5  uebayasi 
   1717   1.166.2.5  uebayasi 		/*
   1718   1.166.2.5  uebayasi 		 * if center page is resident and not PG_BUSY|PG_RELEASED
   1719   1.166.2.5  uebayasi 		 * then pgo_get made it PG_BUSY for us and gave us a handle
   1720   1.166.2.5  uebayasi 		 * to it.
   1721   1.166.2.5  uebayasi 		 */
   1722   1.166.2.5  uebayasi 
   1723   1.166.2.5  uebayasi 		if (lcv == flt->centeridx) {
   1724   1.166.2.5  uebayasi 			UVMHIST_LOG(maphist, "  got uobjpage "
   1725   1.166.2.5  uebayasi 			    "(0x%x) with locked get",
   1726   1.166.2.5  uebayasi 			    curpg, 0,0,0);
   1727   1.166.2.5  uebayasi 		} else {
   1728  1.166.2.12  uebayasi 			bool readonly = (curpg->flags & PG_RDONLY)
   1729   1.166.2.5  uebayasi 			    || (curpg->loan_count > 0)
   1730   1.166.2.5  uebayasi 			    || UVM_OBJ_NEEDS_WRITEFAULT(curpg->uobject);
   1731   1.166.2.5  uebayasi 
   1732   1.166.2.5  uebayasi 			uvm_fault_lower_neighbor(ufi, flt,
   1733   1.166.2.5  uebayasi 			    currva, curpg, readonly);
   1734   1.166.2.5  uebayasi 		}
   1735   1.166.2.5  uebayasi 	}
   1736   1.166.2.5  uebayasi 	pmap_update(ufi->orig_map->pmap);
   1737   1.166.2.5  uebayasi }
   1738   1.166.2.5  uebayasi 
   1739   1.166.2.5  uebayasi /*
   1740   1.166.2.5  uebayasi  * uvm_fault_lower_neighbor: enter h/w mapping of lower neighbor page.
   1741   1.166.2.5  uebayasi  */
   1742   1.166.2.5  uebayasi 
   1743   1.166.2.5  uebayasi static void
   1744   1.166.2.5  uebayasi uvm_fault_lower_neighbor(
   1745   1.166.2.5  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   1746   1.166.2.5  uebayasi 	vaddr_t currva, struct vm_page *pg, bool readonly)
   1747   1.166.2.5  uebayasi {
   1748   1.166.2.5  uebayasi 	UVMHIST_FUNC("uvm_fault_lower_neighor"); UVMHIST_CALLED(maphist);
   1749   1.166.2.5  uebayasi 
   1750   1.166.2.5  uebayasi 	/* locked: maps(read), amap(if there), uobj */
   1751   1.166.2.5  uebayasi 
   1752   1.166.2.7  uebayasi 	if (uvm_pageisdirect_p(pg))
   1753   1.166.2.5  uebayasi 		goto uvm_fault_lower_neighbor_enter;
   1754   1.166.2.5  uebayasi 
   1755   1.166.2.5  uebayasi 	/*
   1756   1.166.2.5  uebayasi 	 * calling pgo_get with PGO_LOCKED returns us pages which
   1757   1.166.2.5  uebayasi 	 * are neither busy nor released, so we don't need to check
   1758   1.166.2.5  uebayasi 	 * for this.  we can just directly enter the pages.
   1759   1.166.2.5  uebayasi 	 */
   1760   1.166.2.5  uebayasi 
   1761   1.166.2.5  uebayasi 	mutex_enter(&uvm_pageqlock);
   1762   1.166.2.5  uebayasi 	uvm_pageenqueue(pg);
   1763   1.166.2.5  uebayasi 	mutex_exit(&uvm_pageqlock);
   1764   1.166.2.5  uebayasi 
   1765   1.166.2.5  uebayasi 	/*
   1766   1.166.2.5  uebayasi 	 * Since this page isn't the page that's actually faulting,
   1767   1.166.2.5  uebayasi 	 * ignore pmap_enter() failures; it's not critical that we
   1768   1.166.2.5  uebayasi 	 * enter these right now.
   1769   1.166.2.5  uebayasi 	 * NOTE: page can't be PG_WANTED or PG_RELEASED because we've
   1770   1.166.2.5  uebayasi 	 * held the lock the whole time we've had the handle.
   1771   1.166.2.5  uebayasi 	 */
   1772   1.166.2.5  uebayasi 	KASSERT((pg->flags & PG_PAGEOUT) == 0);
   1773   1.166.2.5  uebayasi 	KASSERT((pg->flags & PG_RELEASED) == 0);
   1774   1.166.2.5  uebayasi 	KASSERT((pg->flags & PG_WANTED) == 0);
   1775   1.166.2.5  uebayasi 	KASSERT(!UVM_OBJ_IS_CLEAN(pg->uobject) ||
   1776   1.166.2.5  uebayasi 	    (pg->flags & PG_CLEAN) != 0);
   1777  1.166.2.13  uebayasi 
   1778  1.166.2.13  uebayasi uvm_fault_lower_neighbor_enter:
   1779   1.166.2.5  uebayasi 	pg->flags &= ~(PG_BUSY);
   1780   1.166.2.5  uebayasi 	UVM_PAGE_OWN(pg, NULL);
   1781   1.166.2.5  uebayasi 
   1782   1.166.2.6  uebayasi 	UVMHIST_LOG(maphist,
   1783   1.166.2.6  uebayasi 	    "  MAPPING: n obj: pm=0x%x, va=0x%x, pg=0x%x",
   1784   1.166.2.6  uebayasi 	    ufi->orig_map->pmap, currva, pg, 0);
   1785   1.166.2.6  uebayasi 	uvmexp.fltnomap++;
   1786   1.166.2.6  uebayasi 
   1787   1.166.2.5  uebayasi 	(void) pmap_enter(ufi->orig_map->pmap, currva,
   1788   1.166.2.5  uebayasi 	    VM_PAGE_TO_PHYS(pg),
   1789   1.166.2.5  uebayasi 	    readonly ? (flt->enter_prot & ~VM_PROT_WRITE) :
   1790   1.166.2.5  uebayasi 	    flt->enter_prot & MASK(ufi->entry),
   1791   1.166.2.5  uebayasi 	    PMAP_CANFAIL | (flt->wire_mapping ? PMAP_WIRED : 0));
   1792   1.166.2.5  uebayasi }
   1793   1.166.2.5  uebayasi 
   1794   1.166.2.5  uebayasi /*
   1795   1.166.2.5  uebayasi  * uvm_fault_lower_io: get lower page from backing store.
   1796   1.166.2.5  uebayasi  *
   1797   1.166.2.5  uebayasi  *	1. unlock everything, because i/o will block.
   1798   1.166.2.5  uebayasi  *	2. call pgo_get.
   1799   1.166.2.5  uebayasi  *	3. if failed, recover.
   1800   1.166.2.5  uebayasi  *	4. if succeeded, relock everything and verify things.
   1801   1.166.2.5  uebayasi  */
   1802   1.166.2.5  uebayasi 
   1803   1.166.2.2  uebayasi static int
   1804   1.166.2.2  uebayasi uvm_fault_lower_io(
   1805   1.166.2.2  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   1806   1.166.2.2  uebayasi 	struct uvm_object **ruobj, struct vm_page **ruobjpage)
   1807   1.166.2.2  uebayasi {
   1808   1.166.2.2  uebayasi 	struct vm_amap * const amap = ufi->entry->aref.ar_amap;
   1809   1.166.2.2  uebayasi 	struct uvm_object *uobj = *ruobj;
   1810   1.166.2.2  uebayasi 	struct vm_page *pg;
   1811   1.166.2.2  uebayasi 	bool locked;
   1812   1.166.2.2  uebayasi 	int gotpages;
   1813   1.166.2.2  uebayasi 	int error;
   1814   1.166.2.2  uebayasi 	voff_t uoff;
   1815   1.166.2.2  uebayasi 	UVMHIST_FUNC("uvm_fault_lower_io"); UVMHIST_CALLED(maphist);
   1816   1.166.2.2  uebayasi 
   1817   1.166.2.2  uebayasi 	/* update rusage counters */
   1818   1.166.2.2  uebayasi 	curlwp->l_ru.ru_majflt++;
   1819   1.166.2.2  uebayasi 
   1820   1.166.2.2  uebayasi 	/* locked: maps(read), amap(if there), uobj */
   1821   1.166.2.2  uebayasi 	uvmfault_unlockall(ufi, amap, NULL, NULL);
   1822   1.166.2.2  uebayasi 	/* locked: uobj */
   1823   1.166.2.2  uebayasi 
   1824   1.166.2.2  uebayasi 	uvmexp.fltget++;
   1825   1.166.2.2  uebayasi 	gotpages = 1;
   1826   1.166.2.2  uebayasi 	pg = NULL;
   1827   1.166.2.2  uebayasi 	uoff = (ufi->orig_rvaddr - ufi->entry->start) + ufi->entry->offset;
   1828   1.166.2.2  uebayasi 	error = uobj->pgops->pgo_get(uobj, uoff, &pg, &gotpages,
   1829   1.166.2.2  uebayasi 	    0, flt->access_type & MASK(ufi->entry), ufi->entry->advice,
   1830   1.166.2.2  uebayasi 	    PGO_SYNCIO);
   1831   1.166.2.2  uebayasi 	/* locked: pg(if no error) */
   1832   1.166.2.2  uebayasi 
   1833   1.166.2.2  uebayasi 	/*
   1834   1.166.2.2  uebayasi 	 * recover from I/O
   1835   1.166.2.2  uebayasi 	 */
   1836   1.166.2.2  uebayasi 
   1837   1.166.2.2  uebayasi 	if (error) {
   1838   1.166.2.2  uebayasi 		if (error == EAGAIN) {
   1839   1.166.2.2  uebayasi 			UVMHIST_LOG(maphist,
   1840   1.166.2.2  uebayasi 			    "  pgo_get says TRY AGAIN!",0,0,0,0);
   1841   1.166.2.2  uebayasi 			kpause("fltagain2", false, hz/2, NULL);
   1842   1.166.2.2  uebayasi 			return ERESTART;
   1843   1.166.2.2  uebayasi 		}
   1844   1.166.2.2  uebayasi 
   1845   1.166.2.2  uebayasi #if 0
   1846   1.166.2.2  uebayasi 		KASSERT(error != ERESTART);
   1847   1.166.2.2  uebayasi #else
   1848   1.166.2.2  uebayasi 		/* XXXUEBS don't re-fault? */
   1849   1.166.2.2  uebayasi 		if (error == ERESTART)
   1850   1.166.2.2  uebayasi 			error = EIO;
   1851   1.166.2.2  uebayasi #endif
   1852   1.166.2.2  uebayasi 
   1853   1.166.2.2  uebayasi 		UVMHIST_LOG(maphist, "<- pgo_get failed (code %d)",
   1854   1.166.2.2  uebayasi 		    error, 0,0,0);
   1855   1.166.2.2  uebayasi 		return error;
   1856   1.166.2.2  uebayasi 	}
   1857   1.166.2.2  uebayasi 
   1858   1.166.2.2  uebayasi 	/* locked: pg */
   1859   1.166.2.2  uebayasi 
   1860   1.166.2.2  uebayasi 	KASSERT((pg->flags & PG_BUSY) != 0);
   1861   1.166.2.2  uebayasi 
   1862   1.166.2.2  uebayasi 	mutex_enter(&uvm_pageqlock);
   1863   1.166.2.2  uebayasi 	uvm_pageactivate(pg);
   1864   1.166.2.2  uebayasi 	mutex_exit(&uvm_pageqlock);
   1865   1.166.2.2  uebayasi 
   1866   1.166.2.2  uebayasi 	/*
   1867   1.166.2.2  uebayasi 	 * re-verify the state of the world by first trying to relock
   1868   1.166.2.2  uebayasi 	 * the maps.  always relock the object.
   1869   1.166.2.2  uebayasi 	 */
   1870   1.166.2.2  uebayasi 
   1871   1.166.2.2  uebayasi 	locked = uvmfault_relock(ufi);
   1872   1.166.2.2  uebayasi 	if (locked && amap)
   1873   1.166.2.2  uebayasi 		amap_lock(amap);
   1874   1.166.2.2  uebayasi 
   1875   1.166.2.2  uebayasi 	/* might be changed */
   1876   1.166.2.2  uebayasi 	uobj = pg->uobject;
   1877   1.166.2.2  uebayasi 
   1878   1.166.2.2  uebayasi 	mutex_enter(&uobj->vmobjlock);
   1879   1.166.2.2  uebayasi 
   1880   1.166.2.2  uebayasi 	/* locked(locked): maps(read), amap(if !null), uobj, pg */
   1881   1.166.2.2  uebayasi 	/* locked(!locked): uobj, pg */
   1882   1.166.2.2  uebayasi 
   1883   1.166.2.2  uebayasi 	/*
   1884   1.166.2.2  uebayasi 	 * verify that the page has not be released and re-verify
   1885   1.166.2.2  uebayasi 	 * that amap slot is still free.   if there is a problem,
   1886   1.166.2.2  uebayasi 	 * we unlock and clean up.
   1887   1.166.2.2  uebayasi 	 */
   1888   1.166.2.2  uebayasi 
   1889   1.166.2.2  uebayasi 	if ((pg->flags & PG_RELEASED) != 0 ||
   1890   1.166.2.2  uebayasi 	    (locked && amap && amap_lookup(&ufi->entry->aref,
   1891   1.166.2.2  uebayasi 	      ufi->orig_rvaddr - ufi->entry->start))) {
   1892   1.166.2.2  uebayasi 		if (locked)
   1893   1.166.2.2  uebayasi 			uvmfault_unlockall(ufi, amap, NULL, NULL);
   1894   1.166.2.2  uebayasi 		locked = false;
   1895   1.166.2.2  uebayasi 	}
   1896   1.166.2.2  uebayasi 
   1897   1.166.2.2  uebayasi 	/*
   1898   1.166.2.2  uebayasi 	 * didn't get the lock?   release the page and retry.
   1899   1.166.2.2  uebayasi 	 */
   1900   1.166.2.2  uebayasi 
   1901   1.166.2.2  uebayasi 	if (locked == false) {
   1902   1.166.2.2  uebayasi 		UVMHIST_LOG(maphist,
   1903   1.166.2.2  uebayasi 		    "  wasn't able to relock after fault: retry",
   1904   1.166.2.2  uebayasi 		    0,0,0,0);
   1905   1.166.2.2  uebayasi 		if (pg->flags & PG_WANTED) {
   1906   1.166.2.2  uebayasi 			wakeup(pg);
   1907   1.166.2.2  uebayasi 		}
   1908   1.166.2.2  uebayasi 		if (pg->flags & PG_RELEASED) {
   1909   1.166.2.2  uebayasi 			uvmexp.fltpgrele++;
   1910   1.166.2.2  uebayasi 			uvm_pagefree(pg);
   1911   1.166.2.2  uebayasi 			mutex_exit(&uobj->vmobjlock);
   1912   1.166.2.2  uebayasi 			return ERESTART;
   1913   1.166.2.2  uebayasi 		}
   1914   1.166.2.2  uebayasi 		pg->flags &= ~(PG_BUSY|PG_WANTED);
   1915   1.166.2.2  uebayasi 		UVM_PAGE_OWN(pg, NULL);
   1916   1.166.2.2  uebayasi 		mutex_exit(&uobj->vmobjlock);
   1917   1.166.2.2  uebayasi 		return ERESTART;
   1918   1.166.2.2  uebayasi 	}
   1919   1.166.2.2  uebayasi 
   1920   1.166.2.2  uebayasi 	/*
   1921   1.166.2.2  uebayasi 	 * we have the data in pg which is busy and
   1922   1.166.2.2  uebayasi 	 * not released.  we are holding object lock (so the page
   1923   1.166.2.2  uebayasi 	 * can't be released on us).
   1924   1.166.2.2  uebayasi 	 */
   1925   1.166.2.2  uebayasi 
   1926   1.166.2.2  uebayasi 	/* locked: maps(read), amap(if !null), uobj, pg */
   1927   1.166.2.2  uebayasi 
   1928   1.166.2.2  uebayasi 	*ruobj = uobj;
   1929   1.166.2.2  uebayasi 	*ruobjpage = pg;
   1930   1.166.2.2  uebayasi 	return 0;
   1931   1.166.2.2  uebayasi }
   1932   1.166.2.2  uebayasi 
   1933   1.166.2.5  uebayasi /*
   1934   1.166.2.5  uebayasi  * uvm_fault_lower_direct: fault lower center page
   1935   1.166.2.5  uebayasi  *
   1936   1.166.2.5  uebayasi  *	1. adjust h/w mapping protection.
   1937   1.166.2.5  uebayasi  *	2. if page is loaned, resolve.
   1938   1.166.2.5  uebayasi  */
   1939   1.166.2.5  uebayasi 
   1940   1.166.2.2  uebayasi int
   1941   1.166.2.2  uebayasi uvm_fault_lower_direct(
   1942   1.166.2.2  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   1943   1.166.2.2  uebayasi 	struct uvm_object *uobj, struct vm_page *uobjpage)
   1944   1.166.2.2  uebayasi {
   1945   1.166.2.2  uebayasi 	struct vm_page *pg;
   1946   1.166.2.5  uebayasi 	UVMHIST_FUNC("uvm_fault_lower_direct"); UVMHIST_CALLED(maphist);
   1947   1.166.2.2  uebayasi 
   1948   1.166.2.2  uebayasi 	/*
   1949   1.166.2.2  uebayasi 	 * we are not promoting.   if the mapping is COW ensure that we
   1950   1.166.2.2  uebayasi 	 * don't give more access than we should (e.g. when doing a read
   1951   1.166.2.2  uebayasi 	 * fault on a COPYONWRITE mapping we want to map the COW page in
   1952   1.166.2.2  uebayasi 	 * R/O even though the entry protection could be R/W).
   1953   1.166.2.2  uebayasi 	 *
   1954   1.166.2.2  uebayasi 	 * set "pg" to the page we want to map in (uobjpage, usually)
   1955   1.166.2.2  uebayasi 	 */
   1956  1.166.2.11  uebayasi 
   1957   1.166.2.3  uebayasi 	pg = uobjpage;		/* map in the actual object */
   1958   1.166.2.4  uebayasi 	uvmexp.flt_obj++;
   1959   1.166.2.3  uebayasi 
   1960   1.166.2.7  uebayasi 	if (uvm_pageisdirect_p(uobjpage)) {
   1961   1.166.2.6  uebayasi 		/* XIP'ed device pages are always read-only */
   1962   1.166.2.3  uebayasi 		goto uvm_fault_lower_direct_done;
   1963   1.166.2.6  uebayasi 	}
   1964   1.166.2.2  uebayasi 
   1965   1.166.2.2  uebayasi 	if (UVM_ET_ISCOPYONWRITE(ufi->entry) ||
   1966   1.166.2.2  uebayasi 	    UVM_OBJ_NEEDS_WRITEFAULT(uobjpage->uobject))
   1967   1.166.2.2  uebayasi 		flt->enter_prot &= ~VM_PROT_WRITE;
   1968   1.166.2.2  uebayasi 
   1969   1.166.2.2  uebayasi 	KASSERT(uobjpage != PGO_DONTCARE);
   1970   1.166.2.2  uebayasi 
   1971   1.166.2.2  uebayasi 	/*
   1972   1.166.2.2  uebayasi 	 * we are faulting directly on the page.   be careful
   1973   1.166.2.2  uebayasi 	 * about writing to loaned pages...
   1974   1.166.2.2  uebayasi 	 */
   1975   1.166.2.2  uebayasi 
   1976   1.166.2.2  uebayasi 	if (uobjpage->loan_count) {
   1977   1.166.2.2  uebayasi 		uvm_fault_lower_direct_loan(ufi, flt, uobj, &pg, &uobjpage);
   1978   1.166.2.2  uebayasi 	}
   1979   1.166.2.2  uebayasi 	KASSERT(pg == uobjpage);
   1980   1.166.2.2  uebayasi 
   1981   1.166.2.3  uebayasi uvm_fault_lower_direct_done:
   1982   1.166.2.2  uebayasi 	return uvm_fault_lower_enter(ufi, flt, uobj, NULL, pg, uobjpage);
   1983   1.166.2.2  uebayasi }
   1984   1.166.2.2  uebayasi 
   1985   1.166.2.5  uebayasi /*
   1986   1.166.2.5  uebayasi  * uvm_fault_lower_direct_loan: resolve loaned page.
   1987   1.166.2.5  uebayasi  *
   1988   1.166.2.5  uebayasi  *	1. if not cow'ing, adjust h/w mapping protection.
   1989   1.166.2.5  uebayasi  *	2. if cow'ing, break loan.
   1990   1.166.2.5  uebayasi  */
   1991   1.166.2.5  uebayasi 
   1992   1.166.2.2  uebayasi static int
   1993   1.166.2.2  uebayasi uvm_fault_lower_direct_loan(
   1994   1.166.2.2  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   1995   1.166.2.2  uebayasi 	struct uvm_object *uobj, struct vm_page **rpg, struct vm_page **ruobjpage)
   1996   1.166.2.2  uebayasi {
   1997   1.166.2.2  uebayasi 	struct vm_amap * const amap = ufi->entry->aref.ar_amap;
   1998   1.166.2.2  uebayasi 	struct vm_page *pg;
   1999   1.166.2.2  uebayasi 	struct vm_page *uobjpage = *ruobjpage;
   2000   1.166.2.2  uebayasi 	UVMHIST_FUNC("uvm_fault_lower_direct_loan"); UVMHIST_CALLED(maphist);
   2001   1.166.2.2  uebayasi 
   2002   1.166.2.2  uebayasi 	if (!flt->cow_now) {
   2003   1.166.2.2  uebayasi 		/* read fault: cap the protection at readonly */
   2004   1.166.2.2  uebayasi 		/* cap! */
   2005   1.166.2.2  uebayasi 		flt->enter_prot = flt->enter_prot & ~VM_PROT_WRITE;
   2006   1.166.2.2  uebayasi 	} else {
   2007   1.166.2.2  uebayasi 		/* write fault: must break the loan here */
   2008   1.166.2.2  uebayasi 
   2009   1.166.2.2  uebayasi 		pg = uvm_loanbreak(uobjpage);
   2010   1.166.2.2  uebayasi 		if (pg == NULL) {
   2011   1.166.2.2  uebayasi 
   2012   1.166.2.2  uebayasi 			/*
   2013   1.166.2.2  uebayasi 			 * drop ownership of page, it can't be released
   2014   1.166.2.2  uebayasi 			 */
   2015   1.166.2.2  uebayasi 
   2016   1.166.2.2  uebayasi 			if (uobjpage->flags & PG_WANTED)
   2017   1.166.2.2  uebayasi 				wakeup(uobjpage);
   2018   1.166.2.2  uebayasi 			uobjpage->flags &= ~(PG_BUSY|PG_WANTED);
   2019   1.166.2.2  uebayasi 			UVM_PAGE_OWN(uobjpage, NULL);
   2020   1.166.2.2  uebayasi 
   2021   1.166.2.2  uebayasi 			uvmfault_unlockall(ufi, amap, uobj, NULL);
   2022   1.166.2.2  uebayasi 			UVMHIST_LOG(maphist,
   2023   1.166.2.2  uebayasi 			  "  out of RAM breaking loan, waiting",
   2024   1.166.2.2  uebayasi 			  0,0,0,0);
   2025   1.166.2.2  uebayasi 			uvmexp.fltnoram++;
   2026   1.166.2.2  uebayasi 			uvm_wait("flt_noram4");
   2027   1.166.2.2  uebayasi 			return ERESTART;
   2028   1.166.2.2  uebayasi 		}
   2029   1.166.2.2  uebayasi 		*rpg = pg;
   2030   1.166.2.2  uebayasi 		*ruobjpage = pg;
   2031   1.166.2.2  uebayasi 	}
   2032   1.166.2.2  uebayasi 	return 0;
   2033   1.166.2.2  uebayasi }
   2034   1.166.2.2  uebayasi 
   2035   1.166.2.5  uebayasi /*
   2036   1.166.2.5  uebayasi  * uvm_fault_lower_promote: promote lower page.
   2037   1.166.2.5  uebayasi  *
   2038   1.166.2.5  uebayasi  *	1. call uvmfault_promote.
   2039   1.166.2.5  uebayasi  *	2. fill in data.
   2040   1.166.2.5  uebayasi  *	3. if not ZFOD, dispose old page.
   2041   1.166.2.5  uebayasi  */
   2042   1.166.2.5  uebayasi 
   2043   1.166.2.2  uebayasi int
   2044   1.166.2.2  uebayasi uvm_fault_lower_promote(
   2045   1.166.2.2  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   2046   1.166.2.2  uebayasi 	struct uvm_object *uobj, struct vm_page *uobjpage)
   2047   1.166.2.2  uebayasi {
   2048   1.166.2.2  uebayasi 	struct vm_amap * const amap = ufi->entry->aref.ar_amap;
   2049   1.166.2.2  uebayasi 	struct vm_anon *anon;
   2050   1.166.2.2  uebayasi 	struct vm_page *pg;
   2051   1.166.2.2  uebayasi 	int error;
   2052   1.166.2.2  uebayasi 	UVMHIST_FUNC("uvm_fault_lower_promote"); UVMHIST_CALLED(maphist);
   2053   1.166.2.2  uebayasi 
   2054   1.166.2.2  uebayasi 	/*
   2055   1.166.2.2  uebayasi 	 * if we are going to promote the data to an anon we
   2056   1.166.2.2  uebayasi 	 * allocate a blank anon here and plug it into our amap.
   2057   1.166.2.2  uebayasi 	 */
   2058   1.166.2.2  uebayasi #if DIAGNOSTIC
   2059   1.166.2.2  uebayasi 	if (amap == NULL)
   2060   1.166.2.2  uebayasi 		panic("uvm_fault: want to promote data, but no anon");
   2061   1.166.2.2  uebayasi #endif
   2062   1.166.2.2  uebayasi 	error = uvmfault_promote(ufi, NULL, uobj, uobjpage,
   2063   1.166.2.2  uebayasi 	    &anon, &flt->anon_spare);
   2064   1.166.2.2  uebayasi 	switch (error) {
   2065   1.166.2.2  uebayasi 	case 0:
   2066   1.166.2.2  uebayasi 		break;
   2067   1.166.2.2  uebayasi 	case ERESTART:
   2068   1.166.2.2  uebayasi 		return ERESTART;
   2069   1.166.2.2  uebayasi 	default:
   2070   1.166.2.2  uebayasi 		return error;
   2071   1.166.2.2  uebayasi 	}
   2072   1.166.2.2  uebayasi 
   2073   1.166.2.2  uebayasi 	pg = anon->an_page;
   2074   1.166.2.2  uebayasi 
   2075   1.166.2.2  uebayasi 	/*
   2076   1.166.2.2  uebayasi 	 * fill in the data
   2077   1.166.2.2  uebayasi 	 */
   2078   1.166.2.2  uebayasi 
   2079   1.166.2.2  uebayasi 	if (uobjpage != PGO_DONTCARE) {
   2080   1.166.2.2  uebayasi 		uvmexp.flt_prcopy++;
   2081   1.166.2.2  uebayasi 
   2082   1.166.2.2  uebayasi 		/*
   2083   1.166.2.2  uebayasi 		 * promote to shared amap?  make sure all sharing
   2084   1.166.2.2  uebayasi 		 * procs see it
   2085   1.166.2.2  uebayasi 		 */
   2086   1.166.2.2  uebayasi 
   2087   1.166.2.2  uebayasi 		if ((amap_flags(amap) & AMAP_SHARED) != 0) {
   2088   1.166.2.2  uebayasi 			pmap_page_protect(uobjpage, VM_PROT_NONE);
   2089   1.166.2.2  uebayasi 			/*
   2090   1.166.2.2  uebayasi 			 * XXX: PAGE MIGHT BE WIRED!
   2091   1.166.2.2  uebayasi 			 */
   2092   1.166.2.2  uebayasi 		}
   2093   1.166.2.2  uebayasi 
   2094   1.166.2.7  uebayasi 		if (uvm_pageisdirect_p(uobjpage)) {
   2095   1.166.2.6  uebayasi 			/*
   2096   1.166.2.6  uebayasi 			 * XIP devices pages are never paged out, no need to
   2097   1.166.2.6  uebayasi 			 * dispose.
   2098   1.166.2.6  uebayasi 			 */
   2099   1.166.2.4  uebayasi 			goto uvm_fault_lower_promote_done;
   2100   1.166.2.6  uebayasi 		}
   2101   1.166.2.4  uebayasi 
   2102   1.166.2.2  uebayasi 		/*
   2103   1.166.2.2  uebayasi 		 * dispose of uobjpage.  it can't be PG_RELEASED
   2104   1.166.2.2  uebayasi 		 * since we still hold the object lock.
   2105   1.166.2.2  uebayasi 		 * drop handle to uobj as well.
   2106   1.166.2.2  uebayasi 		 */
   2107   1.166.2.2  uebayasi 
   2108   1.166.2.2  uebayasi 		if (uobjpage->flags & PG_WANTED)
   2109   1.166.2.2  uebayasi 			/* still have the obj lock */
   2110   1.166.2.2  uebayasi 			wakeup(uobjpage);
   2111  1.166.2.13  uebayasi 
   2112  1.166.2.13  uebayasi uvm_fault_lower_promote_done:
   2113   1.166.2.2  uebayasi 		uobjpage->flags &= ~(PG_BUSY|PG_WANTED);
   2114   1.166.2.2  uebayasi 		UVM_PAGE_OWN(uobjpage, NULL);
   2115   1.166.2.4  uebayasi 
   2116   1.166.2.2  uebayasi 		mutex_exit(&uobj->vmobjlock);
   2117   1.166.2.2  uebayasi 		uobj = NULL;
   2118   1.166.2.2  uebayasi 
   2119   1.166.2.2  uebayasi 		UVMHIST_LOG(maphist,
   2120   1.166.2.2  uebayasi 		    "  promote uobjpage 0x%x to anon/page 0x%x/0x%x",
   2121   1.166.2.2  uebayasi 		    uobjpage, anon, pg, 0);
   2122   1.166.2.2  uebayasi 
   2123   1.166.2.2  uebayasi 	} else {
   2124   1.166.2.2  uebayasi 		uvmexp.flt_przero++;
   2125   1.166.2.2  uebayasi 
   2126   1.166.2.2  uebayasi 		/*
   2127   1.166.2.2  uebayasi 		 * Page is zero'd and marked dirty by
   2128   1.166.2.2  uebayasi 		 * uvmfault_promote().
   2129   1.166.2.2  uebayasi 		 */
   2130   1.166.2.2  uebayasi 
   2131   1.166.2.2  uebayasi 		UVMHIST_LOG(maphist,"  zero fill anon/page 0x%x/0%x",
   2132   1.166.2.2  uebayasi 		    anon, pg, 0, 0);
   2133   1.166.2.2  uebayasi 	}
   2134   1.166.2.2  uebayasi 
   2135   1.166.2.2  uebayasi 	return uvm_fault_lower_enter(ufi, flt, uobj, anon, pg, uobjpage);
   2136   1.166.2.2  uebayasi }
   2137   1.166.2.2  uebayasi 
   2138   1.166.2.5  uebayasi /*
   2139   1.166.2.5  uebayasi  * uvm_fault_lower_enter: enter h/w mapping of lower page.
   2140   1.166.2.5  uebayasi  */
   2141   1.166.2.5  uebayasi 
   2142   1.166.2.2  uebayasi int
   2143   1.166.2.2  uebayasi uvm_fault_lower_enter(
   2144   1.166.2.2  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   2145   1.166.2.2  uebayasi 	struct uvm_object *uobj,
   2146   1.166.2.2  uebayasi 	struct vm_anon *anon, struct vm_page *pg, struct vm_page *uobjpage)
   2147   1.166.2.2  uebayasi {
   2148   1.166.2.2  uebayasi 	struct vm_amap * const amap = ufi->entry->aref.ar_amap;
   2149   1.166.2.2  uebayasi 	int error;
   2150   1.166.2.2  uebayasi 	UVMHIST_FUNC("uvm_fault_lower_enter"); UVMHIST_CALLED(maphist);
   2151   1.166.2.2  uebayasi 
   2152   1.166.2.2  uebayasi 	/*
   2153   1.166.2.2  uebayasi 	 * locked:
   2154   1.166.2.2  uebayasi 	 * maps(read), amap(if !null), uobj(if !null), uobjpage(if uobj),
   2155   1.166.2.2  uebayasi 	 *   anon(if !null), pg(if anon)
   2156   1.166.2.2  uebayasi 	 *
   2157   1.166.2.2  uebayasi 	 * note: pg is either the uobjpage or the new page in the new anon
   2158   1.166.2.2  uebayasi 	 */
   2159   1.166.2.2  uebayasi 	KASSERT(amap == NULL || mutex_owned(&amap->am_l));
   2160   1.166.2.2  uebayasi 	KASSERT(uobj == NULL || mutex_owned(&uobj->vmobjlock));
   2161  1.166.2.13  uebayasi 	KASSERT(uobj == NULL || (uobjpage->flags & PG_BUSY) != 0);
   2162   1.166.2.2  uebayasi 	KASSERT(anon == NULL || mutex_owned(&anon->an_lock));
   2163  1.166.2.13  uebayasi 	KASSERT((pg->flags & PG_BUSY) != 0);
   2164   1.166.2.2  uebayasi 
   2165   1.166.2.2  uebayasi 	/*
   2166   1.166.2.2  uebayasi 	 * all resources are present.   we can now map it in and free our
   2167   1.166.2.2  uebayasi 	 * resources.
   2168   1.166.2.2  uebayasi 	 */
   2169   1.166.2.2  uebayasi 
   2170   1.166.2.2  uebayasi 	UVMHIST_LOG(maphist,
   2171   1.166.2.5  uebayasi 	    "  MAPPING: case2: pm=0x%x, va=0x%x, pg=0x%x, promote=%d",
   2172   1.166.2.5  uebayasi 	    ufi->orig_map->pmap, ufi->orig_rvaddr, pg, flt->promote);
   2173   1.166.2.2  uebayasi 	KASSERT((flt->access_type & VM_PROT_WRITE) == 0 ||
   2174  1.166.2.12  uebayasi 		(pg->flags & PG_RDONLY) == 0);
   2175  1.166.2.12  uebayasi 	if (pmap_enter(ufi->orig_map->pmap, ufi->orig_rvaddr, VM_PAGE_TO_PHYS(pg),
   2176  1.166.2.12  uebayasi 	    pg->flags & PG_RDONLY ? flt->enter_prot & ~VM_PROT_WRITE : flt->enter_prot,
   2177   1.166.2.2  uebayasi 	    flt->access_type | PMAP_CANFAIL | (flt->wire_mapping ? PMAP_WIRED : 0)) != 0) {
   2178   1.166.2.2  uebayasi 
   2179   1.166.2.7  uebayasi 		if (uvm_pageisdirect_p(pg)) {
   2180   1.166.2.6  uebayasi 			/* Device pages never involve paging activity. */
   2181   1.166.2.3  uebayasi 			goto uvm_fault_lower_enter_error_done;
   2182   1.166.2.6  uebayasi 		}
   2183   1.166.2.3  uebayasi 
   2184   1.166.2.2  uebayasi 		/*
   2185   1.166.2.2  uebayasi 		 * No need to undo what we did; we can simply think of
   2186   1.166.2.2  uebayasi 		 * this as the pmap throwing away the mapping information.
   2187   1.166.2.2  uebayasi 		 *
   2188   1.166.2.2  uebayasi 		 * We do, however, have to go through the ReFault path,
   2189   1.166.2.2  uebayasi 		 * as the map may change while we're asleep.
   2190   1.166.2.2  uebayasi 		 */
   2191   1.166.2.2  uebayasi 
   2192   1.166.2.2  uebayasi 		if (pg->flags & PG_WANTED)
   2193   1.166.2.2  uebayasi 			wakeup(pg);
   2194   1.166.2.2  uebayasi 
   2195   1.166.2.2  uebayasi 		/*
   2196   1.166.2.2  uebayasi 		 * note that pg can't be PG_RELEASED since we did not drop
   2197   1.166.2.2  uebayasi 		 * the object lock since the last time we checked.
   2198   1.166.2.2  uebayasi 		 */
   2199   1.166.2.2  uebayasi 		KASSERT((pg->flags & PG_RELEASED) == 0);
   2200   1.166.2.2  uebayasi 
   2201  1.166.2.13  uebayasi uvm_fault_lower_enter_error_done:
   2202   1.166.2.2  uebayasi 		pg->flags &= ~(PG_BUSY|PG_FAKE|PG_WANTED);
   2203   1.166.2.2  uebayasi 		UVM_PAGE_OWN(pg, NULL);
   2204   1.166.2.2  uebayasi 		uvmfault_unlockall(ufi, amap, uobj, anon);
   2205   1.166.2.2  uebayasi 		if (!uvm_reclaimable()) {
   2206   1.166.2.2  uebayasi 			UVMHIST_LOG(maphist,
   2207   1.166.2.2  uebayasi 			    "<- failed.  out of VM",0,0,0,0);
   2208   1.166.2.2  uebayasi 			/* XXX instrumentation */
   2209   1.166.2.2  uebayasi 			error = ENOMEM;
   2210   1.166.2.2  uebayasi 			return error;
   2211   1.166.2.2  uebayasi 		}
   2212   1.166.2.2  uebayasi 		/* XXX instrumentation */
   2213   1.166.2.2  uebayasi 		uvm_wait("flt_pmfail2");
   2214   1.166.2.2  uebayasi 		return ERESTART;
   2215   1.166.2.2  uebayasi 	}
   2216   1.166.2.2  uebayasi 
   2217   1.166.2.7  uebayasi 	if (!uvm_pageisdirect_p(pg))
   2218   1.166.2.5  uebayasi 		uvm_fault_lower_done(ufi, flt, uobj, anon, pg);
   2219   1.166.2.5  uebayasi 
   2220  1.166.2.13  uebayasi 	pg->flags &= ~(PG_BUSY|PG_FAKE|PG_WANTED);
   2221  1.166.2.13  uebayasi 	UVM_PAGE_OWN(pg, NULL);
   2222  1.166.2.13  uebayasi 
   2223   1.166.2.5  uebayasi 	uvmfault_unlockall(ufi, amap, uobj, anon);
   2224   1.166.2.5  uebayasi 	pmap_update(ufi->orig_map->pmap);
   2225   1.166.2.5  uebayasi 	UVMHIST_LOG(maphist, "<- done (SUCCESS!)",0,0,0,0);
   2226   1.166.2.5  uebayasi 	return 0;
   2227   1.166.2.2  uebayasi }
   2228   1.166.2.2  uebayasi 
   2229   1.166.2.5  uebayasi /*
   2230   1.166.2.5  uebayasi  * uvm_fault_lower_done: queue lower center page.
   2231   1.166.2.5  uebayasi  */
   2232   1.166.2.5  uebayasi 
   2233   1.166.2.5  uebayasi void
   2234   1.166.2.2  uebayasi uvm_fault_lower_done(
   2235   1.166.2.2  uebayasi 	struct uvm_faultinfo *ufi, struct uvm_faultctx *flt,
   2236   1.166.2.2  uebayasi 	struct uvm_object *uobj, struct vm_anon *anon, struct vm_page *pg)
   2237   1.166.2.2  uebayasi {
   2238   1.166.2.2  uebayasi 	UVMHIST_FUNC("uvm_fault_lower_done"); UVMHIST_CALLED(maphist);
   2239   1.166.2.2  uebayasi 
   2240   1.166.2.2  uebayasi 	mutex_enter(&uvm_pageqlock);
   2241   1.166.2.2  uebayasi 	if (flt->wire_paging) {
   2242   1.166.2.2  uebayasi 		uvm_pagewire(pg);
   2243   1.166.2.2  uebayasi 		if (pg->pqflags & PQ_AOBJ) {
   2244   1.166.2.2  uebayasi 
   2245   1.166.2.2  uebayasi 			/*
   2246   1.166.2.2  uebayasi 			 * since the now-wired page cannot be paged out,
   2247   1.166.2.2  uebayasi 			 * release its swap resources for others to use.
   2248   1.166.2.2  uebayasi 			 * since an aobj page with no swap cannot be PG_CLEAN,
   2249   1.166.2.2  uebayasi 			 * clear its clean flag now.
   2250   1.166.2.2  uebayasi 			 */
   2251   1.166.2.2  uebayasi 
   2252   1.166.2.2  uebayasi 			KASSERT(uobj != NULL);
   2253   1.166.2.2  uebayasi 			pg->flags &= ~(PG_CLEAN);
   2254   1.166.2.2  uebayasi 			uao_dropswap(uobj, pg->offset >> PAGE_SHIFT);
   2255   1.166.2.2  uebayasi 		}
   2256   1.166.2.2  uebayasi 	} else {
   2257   1.166.2.2  uebayasi 		uvm_pageactivate(pg);
   2258   1.166.2.2  uebayasi 	}
   2259   1.166.2.2  uebayasi 	mutex_exit(&uvm_pageqlock);
   2260   1.166.2.5  uebayasi 
   2261   1.166.2.2  uebayasi 	if (pg->flags & PG_WANTED)
   2262   1.166.2.2  uebayasi 		wakeup(pg);
   2263   1.166.2.2  uebayasi 
   2264   1.166.2.2  uebayasi 	/*
   2265   1.166.2.2  uebayasi 	 * note that pg can't be PG_RELEASED since we did not drop the object
   2266   1.166.2.2  uebayasi 	 * lock since the last time we checked.
   2267   1.166.2.2  uebayasi 	 */
   2268   1.166.2.2  uebayasi 	KASSERT((pg->flags & PG_RELEASED) == 0);
   2269   1.166.2.2  uebayasi }
   2270   1.166.2.2  uebayasi 
   2271   1.166.2.2  uebayasi 
   2272   1.166.2.2  uebayasi /*
   2273   1.166.2.2  uebayasi  * uvm_fault_wire: wire down a range of virtual addresses in a map.
   2274   1.166.2.2  uebayasi  *
   2275   1.166.2.2  uebayasi  * => map may be read-locked by caller, but MUST NOT be write-locked.
   2276   1.166.2.2  uebayasi  * => if map is read-locked, any operations which may cause map to
   2277   1.166.2.2  uebayasi  *	be write-locked in uvm_fault() must be taken care of by
   2278   1.166.2.2  uebayasi  *	the caller.  See uvm_map_pageable().
   2279   1.166.2.2  uebayasi  */
   2280   1.166.2.2  uebayasi 
   2281   1.166.2.2  uebayasi int
   2282   1.166.2.2  uebayasi uvm_fault_wire(struct vm_map *map, vaddr_t start, vaddr_t end,
   2283   1.166.2.2  uebayasi     vm_prot_t access_type, int maxprot)
   2284   1.166.2.2  uebayasi {
   2285   1.166.2.2  uebayasi 	vaddr_t va;
   2286   1.166.2.2  uebayasi 	int error;
   2287   1.166.2.2  uebayasi 
   2288   1.166.2.2  uebayasi 	/*
   2289   1.166.2.2  uebayasi 	 * now fault it in a page at a time.   if the fault fails then we have
   2290   1.166.2.2  uebayasi 	 * to undo what we have done.   note that in uvm_fault VM_PROT_NONE
   2291   1.166.2.2  uebayasi 	 * is replaced with the max protection if fault_type is VM_FAULT_WIRE.
   2292   1.166.2.2  uebayasi 	 */
   2293   1.166.2.2  uebayasi 
   2294   1.166.2.2  uebayasi 	/*
   2295   1.166.2.2  uebayasi 	 * XXX work around overflowing a vaddr_t.  this prevents us from
   2296   1.166.2.2  uebayasi 	 * wiring the last page in the address space, though.
   2297   1.166.2.2  uebayasi 	 */
   2298   1.166.2.2  uebayasi 	if (start > end) {
   2299   1.166.2.2  uebayasi 		return EFAULT;
   2300   1.166.2.2  uebayasi 	}
   2301   1.166.2.2  uebayasi 
   2302   1.166.2.2  uebayasi 	for (va = start; va < end; va += PAGE_SIZE) {
   2303   1.166.2.2  uebayasi 		error = uvm_fault_internal(map, va, access_type,
   2304   1.166.2.2  uebayasi 				(maxprot ? UVM_FAULT_MAXPROT : 0) | UVM_FAULT_WIRE);
   2305   1.166.2.2  uebayasi 		if (error) {
   2306   1.166.2.2  uebayasi 			if (va != start) {
   2307   1.166.2.2  uebayasi 				uvm_fault_unwire(map, start, va);
   2308   1.166.2.2  uebayasi 			}
   2309   1.166.2.2  uebayasi 			return error;
   2310   1.166.2.2  uebayasi 		}
   2311   1.166.2.2  uebayasi 	}
   2312   1.166.2.2  uebayasi 	return 0;
   2313   1.166.2.2  uebayasi }
   2314   1.166.2.2  uebayasi 
   2315   1.166.2.2  uebayasi /*
   2316   1.166.2.2  uebayasi  * uvm_fault_unwire(): unwire range of virtual space.
   2317   1.166.2.2  uebayasi  */
   2318   1.166.2.2  uebayasi 
   2319   1.166.2.2  uebayasi void
   2320   1.166.2.2  uebayasi uvm_fault_unwire(struct vm_map *map, vaddr_t start, vaddr_t end)
   2321   1.166.2.2  uebayasi {
   2322   1.166.2.2  uebayasi 	vm_map_lock_read(map);
   2323   1.166.2.2  uebayasi 	uvm_fault_unwire_locked(map, start, end);
   2324   1.166.2.2  uebayasi 	vm_map_unlock_read(map);
   2325   1.166.2.2  uebayasi }
   2326   1.166.2.2  uebayasi 
   2327   1.166.2.2  uebayasi /*
   2328   1.166.2.2  uebayasi  * uvm_fault_unwire_locked(): the guts of uvm_fault_unwire().
   2329   1.166.2.2  uebayasi  *
   2330   1.166.2.2  uebayasi  * => map must be at least read-locked.
   2331   1.166.2.2  uebayasi  */
   2332   1.166.2.2  uebayasi 
   2333   1.166.2.2  uebayasi void
   2334   1.166.2.2  uebayasi uvm_fault_unwire_locked(struct vm_map *map, vaddr_t start, vaddr_t end)
   2335   1.166.2.2  uebayasi {
   2336   1.166.2.2  uebayasi 	struct vm_map_entry *entry;
   2337   1.166.2.2  uebayasi 	pmap_t pmap = vm_map_pmap(map);
   2338   1.166.2.2  uebayasi 	vaddr_t va;
   2339   1.166.2.2  uebayasi 	paddr_t pa;
   2340   1.166.2.2  uebayasi 	struct vm_page *pg;
   2341   1.166.2.2  uebayasi 
   2342   1.166.2.2  uebayasi 	KASSERT((map->flags & VM_MAP_INTRSAFE) == 0);
   2343   1.166.2.2  uebayasi 
   2344   1.166.2.2  uebayasi 	/*
   2345   1.166.2.2  uebayasi 	 * we assume that the area we are unwiring has actually been wired
   2346   1.166.2.2  uebayasi 	 * in the first place.   this means that we should be able to extract
   2347   1.166.2.2  uebayasi 	 * the PAs from the pmap.   we also lock out the page daemon so that
   2348   1.166.2.2  uebayasi 	 * we can call uvm_pageunwire.
   2349   1.166.2.2  uebayasi 	 */
   2350   1.166.2.2  uebayasi 
   2351   1.166.2.2  uebayasi 	mutex_enter(&uvm_pageqlock);
   2352   1.166.2.2  uebayasi 
   2353   1.166.2.2  uebayasi 	/*
   2354   1.166.2.2  uebayasi 	 * find the beginning map entry for the region.
   2355   1.166.2.2  uebayasi 	 */
   2356   1.166.2.2  uebayasi 
   2357   1.166.2.2  uebayasi 	KASSERT(start >= vm_map_min(map) && end <= vm_map_max(map));
   2358   1.166.2.2  uebayasi 	if (uvm_map_lookup_entry(map, start, &entry) == false)
   2359   1.166.2.2  uebayasi 		panic("uvm_fault_unwire_locked: address not in map");
   2360   1.166.2.2  uebayasi 
   2361   1.166.2.2  uebayasi 	for (va = start; va < end; va += PAGE_SIZE) {
   2362   1.166.2.2  uebayasi 		if (pmap_extract(pmap, va, &pa) == false)
   2363   1.166.2.2  uebayasi 			continue;
   2364   1.166.2.2  uebayasi 
   2365   1.166.2.2  uebayasi 		/*
   2366   1.166.2.2  uebayasi 		 * find the map entry for the current address.
   2367   1.166.2.2  uebayasi 		 */
   2368   1.166.2.2  uebayasi 
   2369   1.166.2.2  uebayasi 		KASSERT(va >= entry->start);
   2370   1.166.2.2  uebayasi 		while (va >= entry->end) {
   2371   1.166.2.2  uebayasi 			KASSERT(entry->next != &map->header &&
   2372   1.166.2.2  uebayasi 				entry->next->start <= entry->end);
   2373   1.166.2.2  uebayasi 			entry = entry->next;
   2374   1.166.2.2  uebayasi 		}
   2375   1.166.2.2  uebayasi 
   2376   1.166.2.2  uebayasi 		/*
   2377   1.166.2.2  uebayasi 		 * if the entry is no longer wired, tell the pmap.
   2378   1.166.2.2  uebayasi 		 */
   2379   1.166.2.2  uebayasi 
   2380   1.166.2.2  uebayasi 		if (VM_MAPENT_ISWIRED(entry) == 0)
   2381   1.166.2.2  uebayasi 			pmap_unwire(pmap, va);
   2382   1.166.2.2  uebayasi 
   2383   1.166.2.2  uebayasi 		pg = PHYS_TO_VM_PAGE(pa);
   2384   1.166.2.2  uebayasi 		if (pg)
   2385   1.166.2.2  uebayasi 			uvm_pageunwire(pg);
   2386   1.166.2.2  uebayasi 	}
   2387   1.166.2.2  uebayasi 
   2388   1.166.2.2  uebayasi 	mutex_exit(&uvm_pageqlock);
   2389   1.166.2.2  uebayasi }
   2390