1*b2809c5eSriastradh /* $NetBSD: pmap_private.h,v 1.4 2022/08/21 09:12:43 riastradh Exp $ */
28f18579dSriastradh
38f18579dSriastradh /*
48f18579dSriastradh * Copyright (c) 1997 Charles D. Cranor and Washington University.
58f18579dSriastradh * All rights reserved.
68f18579dSriastradh *
78f18579dSriastradh * Redistribution and use in source and binary forms, with or without
88f18579dSriastradh * modification, are permitted provided that the following conditions
98f18579dSriastradh * are met:
108f18579dSriastradh * 1. Redistributions of source code must retain the above copyright
118f18579dSriastradh * notice, this list of conditions and the following disclaimer.
128f18579dSriastradh * 2. Redistributions in binary form must reproduce the above copyright
138f18579dSriastradh * notice, this list of conditions and the following disclaimer in the
148f18579dSriastradh * documentation and/or other materials provided with the distribution.
158f18579dSriastradh *
168f18579dSriastradh * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
178f18579dSriastradh * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
188f18579dSriastradh * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
198f18579dSriastradh * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
208f18579dSriastradh * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
218f18579dSriastradh * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
228f18579dSriastradh * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
238f18579dSriastradh * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
248f18579dSriastradh * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
258f18579dSriastradh * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
268f18579dSriastradh */
278f18579dSriastradh
288f18579dSriastradh /*
298f18579dSriastradh * Copyright (c) 2001 Wasabi Systems, Inc.
308f18579dSriastradh * All rights reserved.
318f18579dSriastradh *
328f18579dSriastradh * Written by Frank van der Linden for Wasabi Systems, Inc.
338f18579dSriastradh *
348f18579dSriastradh * Redistribution and use in source and binary forms, with or without
358f18579dSriastradh * modification, are permitted provided that the following conditions
368f18579dSriastradh * are met:
378f18579dSriastradh * 1. Redistributions of source code must retain the above copyright
388f18579dSriastradh * notice, this list of conditions and the following disclaimer.
398f18579dSriastradh * 2. Redistributions in binary form must reproduce the above copyright
408f18579dSriastradh * notice, this list of conditions and the following disclaimer in the
418f18579dSriastradh * documentation and/or other materials provided with the distribution.
428f18579dSriastradh * 3. All advertising materials mentioning features or use of this software
438f18579dSriastradh * must display the following acknowledgement:
448f18579dSriastradh * This product includes software developed for the NetBSD Project by
458f18579dSriastradh * Wasabi Systems, Inc.
468f18579dSriastradh * 4. The name of Wasabi Systems, Inc. may not be used to endorse
478f18579dSriastradh * or promote products derived from this software without specific prior
488f18579dSriastradh * written permission.
498f18579dSriastradh *
508f18579dSriastradh * THIS SOFTWARE IS PROVIDED BY WASABI SYSTEMS, INC. ``AS IS'' AND
518f18579dSriastradh * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
528f18579dSriastradh * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
538f18579dSriastradh * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL WASABI SYSTEMS, INC
548f18579dSriastradh * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
558f18579dSriastradh * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
568f18579dSriastradh * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
578f18579dSriastradh * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
588f18579dSriastradh * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
598f18579dSriastradh * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
608f18579dSriastradh * POSSIBILITY OF SUCH DAMAGE.
618f18579dSriastradh */
628f18579dSriastradh
638f18579dSriastradh #ifndef _I386_PMAP_H_
648f18579dSriastradh #define _I386_PMAP_H_
658f18579dSriastradh
668f18579dSriastradh #if defined(_KERNEL_OPT)
678f18579dSriastradh #include "opt_xen.h"
688f18579dSriastradh #endif
698f18579dSriastradh
708f18579dSriastradh #include <sys/atomic.h>
718f18579dSriastradh
728f18579dSriastradh #include <i386/pte.h>
738f18579dSriastradh #include <i386/vmparam.h>
748f18579dSriastradh #include <machine/segments.h>
758f18579dSriastradh #if defined(_KERNEL)
768f18579dSriastradh #include <machine/cpufunc.h>
778f18579dSriastradh #endif
788f18579dSriastradh
798f18579dSriastradh #include <uvm/uvm_object.h>
808f18579dSriastradh #ifdef XENPV
818f18579dSriastradh #include <xen/xenfunc.h>
828f18579dSriastradh #include <xen/xenpmap.h>
838f18579dSriastradh #endif /* XENPV */
848f18579dSriastradh
858f18579dSriastradh /*
868f18579dSriastradh * see pte.h for a description of i386 MMU terminology and hardware
878f18579dSriastradh * interface.
888f18579dSriastradh *
898f18579dSriastradh * a pmap describes a processes' 4GB virtual address space. when PAE
908f18579dSriastradh * is not in use, this virtual address space can be broken up into 1024 4MB
918f18579dSriastradh * regions which are described by PDEs in the PDP. the PDEs are defined as
928f18579dSriastradh * follows:
938f18579dSriastradh *
948f18579dSriastradh * (ranges are inclusive -> exclusive, just like vm_map_entry start/end)
958f18579dSriastradh * (the following assumes that KERNBASE is 0xc0000000)
968f18579dSriastradh *
978f18579dSriastradh * PDE#s VA range usage
988f18579dSriastradh * 0->766 0x0 -> 0xbfc00000 user address space
998f18579dSriastradh * 767 0xbfc00000-> recursive mapping of PDP (used for
1008f18579dSriastradh * 0xc0000000 linear mapping of PTPs)
1018f18579dSriastradh * 768->1023 0xc0000000-> kernel address space (constant
1028f18579dSriastradh * 0xffc00000 across all pmap's/processes)
1038f18579dSriastradh * <end>
1048f18579dSriastradh *
1058f18579dSriastradh *
1068f18579dSriastradh * note: a recursive PDP mapping provides a way to map all the PTEs for
1078f18579dSriastradh * a 4GB address space into a linear chunk of virtual memory. in other
1088f18579dSriastradh * words, the PTE for page 0 is the first int mapped into the 4MB recursive
1098f18579dSriastradh * area. the PTE for page 1 is the second int. the very last int in the
1108f18579dSriastradh * 4MB range is the PTE that maps VA 0xfffff000 (the last page in a 4GB
1118f18579dSriastradh * address).
1128f18579dSriastradh *
1138f18579dSriastradh * all pmap's PD's must have the same values in slots 768->1023 so that
1148f18579dSriastradh * the kernel is always mapped in every process. these values are loaded
1158f18579dSriastradh * into the PD at pmap creation time.
1168f18579dSriastradh *
1178f18579dSriastradh * at any one time only one pmap can be active on a processor. this is
1188f18579dSriastradh * the pmap whose PDP is pointed to by processor register %cr3. this pmap
1198f18579dSriastradh * will have all its PTEs mapped into memory at the recursive mapping
1208f18579dSriastradh * point (slot #767 as show above). when the pmap code wants to find the
1218f18579dSriastradh * PTE for a virtual address, all it has to do is the following:
1228f18579dSriastradh *
1238f18579dSriastradh * address of PTE = (767 * 4MB) + (VA / PAGE_SIZE) * sizeof(pt_entry_t)
1248f18579dSriastradh * = 0xbfc00000 + (VA / 4096) * 4
1258f18579dSriastradh *
1268f18579dSriastradh * what happens if the pmap layer is asked to perform an operation
1278f18579dSriastradh * on a pmap that is not the one which is currently active? in that
1288f18579dSriastradh * case we temporarily load this pmap, perform the operation, and mark
1298f18579dSriastradh * the currently active one as pending lazy reload.
1308f18579dSriastradh *
1318f18579dSriastradh * the following figure shows the effects of the recursive PDP mapping:
1328f18579dSriastradh *
1338f18579dSriastradh * PDP (%cr3)
1348f18579dSriastradh * +----+
1358f18579dSriastradh * | 0| -> PTP#0 that maps VA 0x0 -> 0x400000
1368f18579dSriastradh * | |
1378f18579dSriastradh * | |
1388f18579dSriastradh * | 767| -> points back to PDP (%cr3) mapping VA 0xbfc00000 -> 0xc0000000
1398f18579dSriastradh * | 768| -> first kernel PTP (maps 0xc0000000 -> 0xc0400000)
1408f18579dSriastradh * | |
1418f18579dSriastradh * +----+
1428f18579dSriastradh *
1438f18579dSriastradh * note that the PDE#767 VA (0xbfc00000) is defined as "PTE_BASE"
1448f18579dSriastradh *
1458f18579dSriastradh * starting at VA 0xbfc00000 the current active PDP (%cr3) acts as a
1468f18579dSriastradh * PTP:
1478f18579dSriastradh *
1488f18579dSriastradh * PTP#767 == PDP(%cr3) => maps VA 0xbfc00000 -> 0xc0000000
1498f18579dSriastradh * +----+
1508f18579dSriastradh * | 0| -> maps the contents of PTP#0 at VA 0xbfc00000->0xbfc01000
1518f18579dSriastradh * | |
1528f18579dSriastradh * | |
1538f18579dSriastradh * | 767| -> maps contents of PTP#767 (the PDP) at VA 0xbfeff000
1548f18579dSriastradh * | 768| -> maps contents of first kernel PTP
1558f18579dSriastradh * | |
1568f18579dSriastradh * |1023|
1578f18579dSriastradh * +----+
1588f18579dSriastradh *
1598f18579dSriastradh * note that mapping of the PDP at PTP#767's VA (0xbfeff000) is
1608f18579dSriastradh * defined as "PDP_BASE".... within that mapping there are two
1618f18579dSriastradh * defines:
1628f18579dSriastradh * "PDP_PDE" (0xbfeffbfc) is the VA of the PDE in the PDP
1638f18579dSriastradh * which points back to itself.
1648f18579dSriastradh *
1658f18579dSriastradh * - PAE support -
1668f18579dSriastradh * ---------------
1678f18579dSriastradh *
1688f18579dSriastradh * PAE adds another layer of indirection during address translation, breaking
1698f18579dSriastradh * up the translation process in 3 different levels:
1708f18579dSriastradh * - L3 page directory, containing 4 * 64-bits addresses (index determined by
1718f18579dSriastradh * bits [31:30] from the virtual address). This breaks up the address space
1728f18579dSriastradh * in 4 1GB regions.
1738f18579dSriastradh * - the PD (L2), containing 512 64-bits addresses, breaking each L3 region
1748f18579dSriastradh * in 512 * 2MB regions.
1758f18579dSriastradh * - the PT (L1), also containing 512 64-bits addresses (at L1, the size of
1768f18579dSriastradh * the pages is still 4K).
1778f18579dSriastradh *
1788f18579dSriastradh * The kernel virtual space is mapped by the last entry in the L3 page,
1798f18579dSriastradh * the first 3 entries mapping the user VA space.
1808f18579dSriastradh *
1818f18579dSriastradh * Because the L3 has only 4 entries of 1GB each, we can't use recursive
1828f18579dSriastradh * mappings at this level for PDP_PDE (this would eat up 2 of the 4GB
1838f18579dSriastradh * virtual space). There are also restrictions imposed by Xen on the
1848f18579dSriastradh * last entry of the L3 PD (reference count to this page cannot be
1858f18579dSriastradh * bigger than 1), which makes it hard to use one L3 page per pmap to
1868f18579dSriastradh * switch between pmaps using %cr3.
1878f18579dSriastradh *
1888f18579dSriastradh * As such, each CPU gets its own L3 page that is always loaded into its %cr3
1898f18579dSriastradh * (ci_pae_l3_pd in the associated cpu_info struct). We claim that the VM has
1908f18579dSriastradh * only a 2-level PTP (similar to the non-PAE case). L2 PD is now 4 contiguous
1918f18579dSriastradh * pages long (corresponding to the 4 entries of the L3), and the different
1928f18579dSriastradh * index/slots (like PDP_PDE) are adapted accordingly.
1938f18579dSriastradh *
1948f18579dSriastradh * Kernel space remains in L3[3], L3[0-2] maps the user VA space. Switching
1958f18579dSriastradh * between pmaps consists in modifying the first 3 entries of the CPU's L3 page.
1968f18579dSriastradh *
1978f18579dSriastradh * PTE_BASE will need 4 entries in the L2 PD pages to map the L2 pages
1988f18579dSriastradh * recursively.
1998f18579dSriastradh *
2008f18579dSriastradh * In addition, for Xen, we can't recursively map L3[3] (Xen wants the ref
2018f18579dSriastradh * count on this page to be exactly one), so we use a shadow PD page for
2028f18579dSriastradh * the last L2 PD. The shadow page could be static too, but to make pm_pdir[]
2038f18579dSriastradh * contiguous we'll allocate/copy one page per pmap.
2048f18579dSriastradh */
2058f18579dSriastradh
2068f18579dSriastradh /*
2078f18579dSriastradh * the following defines give the virtual addresses of various MMU
2088f18579dSriastradh * data structures:
2098f18579dSriastradh * PTE_BASE: the base VA of the linear PTE mappings
2108f18579dSriastradh * PDP_BASE: the base VA of the recursive mapping of the PDP
2118f18579dSriastradh * PDP_PDE: the VA of the PDE that points back to the PDP
2128f18579dSriastradh */
2138f18579dSriastradh
2148f18579dSriastradh #define PTE_BASE ((pt_entry_t *) (PDIR_SLOT_PTE * NBPD_L2))
2158f18579dSriastradh
2168f18579dSriastradh #define L1_BASE PTE_BASE
2178f18579dSriastradh
2188f18579dSriastradh #define L2_BASE ((pd_entry_t *)((char *)L1_BASE + L2_SLOT_PTE * NBPD_L1))
2198f18579dSriastradh
2208f18579dSriastradh #define PDP_PDE (L2_BASE + PDIR_SLOT_PTE)
2218f18579dSriastradh
2228f18579dSriastradh #define PDP_BASE L2_BASE
2238f18579dSriastradh
2248f18579dSriastradh #define NPDPG (PAGE_SIZE / sizeof (pd_entry_t))
2258f18579dSriastradh
2268f18579dSriastradh #define PTP_MASK_INITIALIZER { L1_MASK, L2_MASK }
2278f18579dSriastradh #define PTP_FRAME_INITIALIZER { L1_FRAME, L2_FRAME }
2288f18579dSriastradh #define PTP_SHIFT_INITIALIZER { L1_SHIFT, L2_SHIFT }
2298f18579dSriastradh #define NKPTP_INITIALIZER { NKL1_START_ENTRIES, NKL2_START_ENTRIES }
2308f18579dSriastradh #define NKPTPMAX_INITIALIZER { NKL1_MAX_ENTRIES, NKL2_MAX_ENTRIES }
2318f18579dSriastradh #define NBPD_INITIALIZER { NBPD_L1, NBPD_L2 }
2328f18579dSriastradh #define PDES_INITIALIZER { L2_BASE }
2338f18579dSriastradh
23455d48114Sriastradh #define PTP_LEVELS 2
23555d48114Sriastradh
2368f18579dSriastradh /*
2378f18579dSriastradh * PTE_AVL usage: we make use of the ignored bits of the PTE
2388f18579dSriastradh */
2398f18579dSriastradh #define PTE_WIRED PTE_AVL1 /* Wired Mapping */
2408f18579dSriastradh #define PTE_PVLIST PTE_AVL2 /* Mapping has entry on pvlist */
2418f18579dSriastradh #define PTE_X PTE_AVL3 /* Executable */
2428f18579dSriastradh
2438f18579dSriastradh /* XXX To be deleted. */
2448f18579dSriastradh #define PG_W PTE_WIRED
2458f18579dSriastradh #define PG_PVLIST PTE_PVLIST
2468f18579dSriastradh #define PG_X PTE_X
2478f18579dSriastradh
2488f18579dSriastradh #define _MACHINE_PMAP_PRIVATE_H_X86
2498f18579dSriastradh #include <x86/pmap_private.h>
2508f18579dSriastradh #undef _MACHINE_PMAP_PRIVATE_H_X86
2518f18579dSriastradh
2528f18579dSriastradh #ifndef XENPV
253d7bf4bedSriastradh
2548f18579dSriastradh #define pmap_pa2pte(a) (a)
2558f18579dSriastradh #define pmap_pte2pa(a) ((a) & PTE_FRAME)
2568f18579dSriastradh #define pmap_pte_set(p, n) do { *(p) = (n); } while (0)
2578f18579dSriastradh #define pmap_pte_flush() /* nothing */
2588f18579dSriastradh
2598f18579dSriastradh #ifdef PAE
2608f18579dSriastradh #define pmap_pte_cas(p, o, n) atomic_cas_64((p), (o), (n))
2618f18579dSriastradh #define pmap_pte_testset(p, n) \
2628f18579dSriastradh atomic_swap_64((volatile uint64_t *)p, n)
2638f18579dSriastradh #define pmap_pte_setbits(p, b) \
2648f18579dSriastradh atomic_or_64((volatile uint64_t *)p, b)
2658f18579dSriastradh #define pmap_pte_clearbits(p, b) \
2668f18579dSriastradh atomic_and_64((volatile uint64_t *)p, ~(b))
2678f18579dSriastradh #else /* PAE */
2688f18579dSriastradh #define pmap_pte_cas(p, o, n) atomic_cas_32((p), (o), (n))
2698f18579dSriastradh #define pmap_pte_testset(p, n) \
2708f18579dSriastradh atomic_swap_ulong((volatile unsigned long *)p, n)
2718f18579dSriastradh #define pmap_pte_setbits(p, b) \
2728f18579dSriastradh atomic_or_ulong((volatile unsigned long *)p, b)
2738f18579dSriastradh #define pmap_pte_clearbits(p, b) \
2748f18579dSriastradh atomic_and_ulong((volatile unsigned long *)p, ~(b))
2758f18579dSriastradh #endif /* PAE */
2768f18579dSriastradh
2778f18579dSriastradh #else /* XENPV */
278d7bf4bedSriastradh
2798f18579dSriastradh extern kmutex_t pte_lock;
2808f18579dSriastradh
2818f18579dSriastradh static __inline pt_entry_t
pmap_pa2pte(paddr_t pa)2828f18579dSriastradh pmap_pa2pte(paddr_t pa)
2838f18579dSriastradh {
2848f18579dSriastradh return (pt_entry_t)xpmap_ptom_masked(pa);
2858f18579dSriastradh }
2868f18579dSriastradh
2878f18579dSriastradh static __inline paddr_t
pmap_pte2pa(pt_entry_t pte)2888f18579dSriastradh pmap_pte2pa(pt_entry_t pte)
2898f18579dSriastradh {
2908f18579dSriastradh return xpmap_mtop_masked(pte & PTE_FRAME);
2918f18579dSriastradh }
292d7bf4bedSriastradh
2938f18579dSriastradh static __inline void
pmap_pte_set(pt_entry_t * pte,pt_entry_t npte)2948f18579dSriastradh pmap_pte_set(pt_entry_t *pte, pt_entry_t npte)
2958f18579dSriastradh {
2968f18579dSriastradh int s = splvm();
2978f18579dSriastradh xpq_queue_pte_update(xpmap_ptetomach(pte), npte);
2988f18579dSriastradh splx(s);
2998f18579dSriastradh }
3008f18579dSriastradh
3018f18579dSriastradh static __inline pt_entry_t
pmap_pte_cas(volatile pt_entry_t * ptep,pt_entry_t o,pt_entry_t n)3028f18579dSriastradh pmap_pte_cas(volatile pt_entry_t *ptep, pt_entry_t o, pt_entry_t n)
3038f18579dSriastradh {
3048f18579dSriastradh pt_entry_t opte;
3058f18579dSriastradh
3068f18579dSriastradh mutex_enter(&pte_lock);
3078f18579dSriastradh opte = *ptep;
3088f18579dSriastradh if (opte == o) {
3098f18579dSriastradh xpq_queue_pte_update(xpmap_ptetomach(__UNVOLATILE(ptep)), n);
3108f18579dSriastradh xpq_flush_queue();
3118f18579dSriastradh }
3128f18579dSriastradh mutex_exit(&pte_lock);
3138f18579dSriastradh return opte;
3148f18579dSriastradh }
3158f18579dSriastradh
3168f18579dSriastradh static __inline pt_entry_t
pmap_pte_testset(volatile pt_entry_t * pte,pt_entry_t npte)3178f18579dSriastradh pmap_pte_testset(volatile pt_entry_t *pte, pt_entry_t npte)
3188f18579dSriastradh {
3198f18579dSriastradh pt_entry_t opte;
3208f18579dSriastradh
3218f18579dSriastradh mutex_enter(&pte_lock);
3228f18579dSriastradh opte = *pte;
323d7bf4bedSriastradh xpq_queue_pte_update(xpmap_ptetomach(__UNVOLATILE(pte)), npte);
3248f18579dSriastradh xpq_flush_queue();
3258f18579dSriastradh mutex_exit(&pte_lock);
3268f18579dSriastradh return opte;
3278f18579dSriastradh }
3288f18579dSriastradh
3298f18579dSriastradh static __inline void
pmap_pte_setbits(volatile pt_entry_t * pte,pt_entry_t bits)3308f18579dSriastradh pmap_pte_setbits(volatile pt_entry_t *pte, pt_entry_t bits)
3318f18579dSriastradh {
3328f18579dSriastradh mutex_enter(&pte_lock);
3338f18579dSriastradh xpq_queue_pte_update(xpmap_ptetomach(__UNVOLATILE(pte)), (*pte) | bits);
3348f18579dSriastradh xpq_flush_queue();
3358f18579dSriastradh mutex_exit(&pte_lock);
3368f18579dSriastradh }
3378f18579dSriastradh
3388f18579dSriastradh static __inline void
pmap_pte_clearbits(volatile pt_entry_t * pte,pt_entry_t bits)3398f18579dSriastradh pmap_pte_clearbits(volatile pt_entry_t *pte, pt_entry_t bits)
3408f18579dSriastradh {
3418f18579dSriastradh mutex_enter(&pte_lock);
3428f18579dSriastradh xpq_queue_pte_update(xpmap_ptetomach(__UNVOLATILE(pte)),
3438f18579dSriastradh (*pte) & ~bits);
3448f18579dSriastradh xpq_flush_queue();
3458f18579dSriastradh mutex_exit(&pte_lock);
3468f18579dSriastradh }
3478f18579dSriastradh
3488f18579dSriastradh static __inline void
pmap_pte_flush(void)3498f18579dSriastradh pmap_pte_flush(void)
3508f18579dSriastradh {
3518f18579dSriastradh int s = splvm();
3528f18579dSriastradh xpq_flush_queue();
3538f18579dSriastradh splx(s);
3548f18579dSriastradh }
3558f18579dSriastradh
3568f18579dSriastradh #endif
3578f18579dSriastradh
3588f18579dSriastradh struct vm_map;
3598f18579dSriastradh struct trapframe;
3608f18579dSriastradh struct pcb;
3618f18579dSriastradh
3628f18579dSriastradh int pmap_exec_fixup(struct vm_map *, struct trapframe *, struct pcb *);
3638f18579dSriastradh
3648f18579dSriastradh #endif /* _I386_PMAP_H_ */
365