Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 16 Sep 2019 04:54:17 +0000 (UTC)
From:      Alan Cox <alc@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-stable@freebsd.org, svn-src-stable-12@freebsd.org
Subject:   svn commit: r352374 - stable/12/sys/arm64/arm64
Message-ID:  <201909160454.x8G4sHVw049336@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: alc
Date: Mon Sep 16 04:54:17 2019
New Revision: 352374
URL: https://svnweb.freebsd.org/changeset/base/352374

Log:
  MFC r349323, r349442, r349866, r349975
    pmap_enter_quick_locked() never replaces a valid mapping, so it need not
    perform a TLB invalidation.  A barrier suffices.  (See r343876.)
  
    Add a comment to pmap_enter_quick_locked() in order to highlight the fact
    that it does not replace valid mappings.
  
    Correct a typo in one of pmap_enter()'s comments.
  
    Introduce pmap_clear(), which zeroes a page table entry, and use it,
    instead of pmap_load_clear(), in places where we don't care about the page
    table entry's prior contents.
  
    Eliminate an unnecessary pmap_load() from pmap_remove_all().  Instead, use
    the value returned by the pmap_load_clear() on the very next line.
  
    A KASSERT() in pmap_enter(), which originated in the amd64 pmap, was meant
    to check the value returned by the pmap_load_clear() on the previous
    line.  However, we were ignoring the value returned by the
    pmap_load_clear(), and so the KASSERT() was not serving its intended
    purpose.  Use the value returned by the pmap_load_clear() in the
    KASSERT().

Modified:
  stable/12/sys/arm64/arm64/pmap.c
Directory Properties:
  stable/12/   (props changed)

Modified: stable/12/sys/arm64/arm64/pmap.c
==============================================================================
--- stable/12/sys/arm64/arm64/pmap.c	Mon Sep 16 02:31:58 2019	(r352373)
+++ stable/12/sys/arm64/arm64/pmap.c	Mon Sep 16 04:54:17 2019	(r352374)
@@ -315,6 +315,7 @@ static __inline vm_page_t pmap_remove_pt_page(pmap_t p
  * They need to be atomic as the System MMU may write to the table at
  * the same time as the CPU.
  */
+#define	pmap_clear(table) atomic_store_64(table, 0)
 #define	pmap_load_store(table, entry) atomic_swap_64(table, entry)
 #define	pmap_set(table, mask) atomic_set_64(table, mask)
 #define	pmap_load_clear(table) atomic_swap_64(table, 0)
@@ -1208,7 +1209,7 @@ pmap_kremove(vm_offset_t va)
 	KASSERT(pte != NULL, ("pmap_kremove: Invalid address"));
 	KASSERT(lvl == 3, ("pmap_kremove: Invalid pte level %d", lvl));
 
-	pmap_load_clear(pte);
+	pmap_clear(pte);
 	pmap_invalidate_page(kernel_pmap, va);
 }
 
@@ -1230,7 +1231,7 @@ pmap_kremove_device(vm_offset_t sva, vm_size_t size)
 		KASSERT(pte != NULL, ("Invalid page table, va: 0x%lx", va));
 		KASSERT(lvl == 3,
 		    ("Invalid device pagetable level: %d != 3", lvl));
-		pmap_load_clear(pte);
+		pmap_clear(pte);
 
 		va += PAGE_SIZE;
 		size -= PAGE_SIZE;
@@ -1315,7 +1316,7 @@ pmap_qremove(vm_offset_t sva, int count)
 		KASSERT(lvl == 3,
 		    ("Invalid device pagetable level: %d != 3", lvl));
 		if (pte != NULL) {
-			pmap_load_clear(pte);
+			pmap_clear(pte);
 		}
 
 		va += PAGE_SIZE;
@@ -1374,19 +1375,19 @@ _pmap_unwire_l3(pmap_t pmap, vm_offset_t va, vm_page_t
 		pd_entry_t *l0;
 
 		l0 = pmap_l0(pmap, va);
-		pmap_load_clear(l0);
+		pmap_clear(l0);
 	} else if (m->pindex >= NUL2E) {
 		/* l2 page */
 		pd_entry_t *l1;
 
 		l1 = pmap_l1(pmap, va);
-		pmap_load_clear(l1);
+		pmap_clear(l1);
 	} else {
 		/* l3 page */
 		pd_entry_t *l2;
 
 		l2 = pmap_l2(pmap, va);
-		pmap_load_clear(l2);
+		pmap_clear(l2);
 	}
 	pmap_resident_count_dec(pmap, 1);
 	if (m->pindex < NUL2E) {
@@ -2760,8 +2761,7 @@ retry:
 		tpde = pmap_load(pde);
 
 		pte = pmap_l2_to_l3(pde, pv->pv_va);
-		tpte = pmap_load(pte);
-		pmap_load_clear(pte);
+		tpte = pmap_load_clear(pte);
 		pmap_invalidate_page(pmap, pv->pv_va);
 		if (tpte & ATTR_SW_WIRED)
 			pmap->pm_stats.wired_count--;
@@ -2930,7 +2930,7 @@ pmap_update_entry(pmap_t pmap, pd_entry_t *pte, pd_ent
 	critical_enter();
 
 	/* Clear the old mapping */
-	pmap_load_clear(pte);
+	pmap_clear(pte);
 	pmap_invalidate_range_nopin(pmap, va, va + size);
 
 	/* Create the new mapping */
@@ -3208,9 +3208,10 @@ havel3:
 		}
 
 		/*
-		 * The physical page has changed.
+		 * The physical page has changed.  Temporarily invalidate
+		 * the mapping.
 		 */
-		(void)pmap_load_clear(l3);
+		orig_l3 = pmap_load_clear(l3);
 		KASSERT((orig_l3 & ~ATTR_MASK) == opa,
 		    ("pmap_enter: unexpected pa update for %#lx", va));
 		if ((orig_l3 & ATTR_SW_MANAGED) != 0) {
@@ -3306,7 +3307,7 @@ validate:
 			    __func__, pmap, va, new_l3);
 		}
 	} else {
-		/* New mappig */
+		/* New mapping */
 		pmap_load_store(l3, new_l3);
 	}
 
@@ -3602,6 +3603,9 @@ pmap_enter_quick_locked(pmap_t pmap, vm_offset_t va, v
 		l3 = pmap_l2_to_l3(pde, va);
 	}
 
+	/*
+	 * Abort if a mapping already exists.
+	 */
 	if (pmap_load(l3) != 0) {
 		if (mpte != NULL) {
 			mpte->wire_count--;
@@ -3651,7 +3655,8 @@ pmap_enter_quick_locked(pmap_t pmap, vm_offset_t va, v
 		cpu_icache_sync_range(PHYS_TO_DMAP(pa), PAGE_SIZE);
 
 	pmap_load_store(l3, l3_val);
-	pmap_invalidate_page(pmap, va);
+	dsb(ishst);
+
 	return (mpte);
 }
 
@@ -4200,7 +4205,12 @@ pmap_remove_pages(pmap_t pmap)
 				    ("pmap_remove_pages: bad pte %#jx",
 				    (uintmax_t)tpte));
 
-				pmap_load_clear(pte);
+				/*
+				 * Because this pmap is not active on other
+				 * processors, the dirty bit cannot have
+				 * changed state since we last loaded pte.
+				 */
+				pmap_clear(pte);
 
 				/*
 				 * Update the vm_page_t clean/reference bits.
@@ -4911,7 +4921,7 @@ pmap_unmapbios(vm_offset_t va, vm_size_t size)
 			KASSERT(pde != NULL,
 			    ("pmap_unmapbios: Invalid page entry, va: 0x%lx", va_trunc));
 			l2 = pmap_l1_to_l2(pde, va_trunc);
-			pmap_load_clear(l2);
+			pmap_clear(l2);
 			pmap_invalidate_range(kernel_pmap, va_trunc, va_trunc + L2_SIZE);
 
 			if (block == (l2_blocks - 1))



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201909160454.x8G4sHVw049336>