kern_malloc.c revision 1.62 1 1.62 thorpej /* $NetBSD: kern_malloc.c,v 1.62 2001/08/17 00:48:30 thorpej Exp $ */
2 1.9 cgd
3 1.1 cgd /*
4 1.37 christos * Copyright (c) 1996 Christopher G. Demetriou. All rights reserved.
5 1.8 cgd * Copyright (c) 1987, 1991, 1993
6 1.8 cgd * The Regents of the University of California. All rights reserved.
7 1.1 cgd *
8 1.1 cgd * Redistribution and use in source and binary forms, with or without
9 1.1 cgd * modification, are permitted provided that the following conditions
10 1.1 cgd * are met:
11 1.1 cgd * 1. Redistributions of source code must retain the above copyright
12 1.1 cgd * notice, this list of conditions and the following disclaimer.
13 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 cgd * notice, this list of conditions and the following disclaimer in the
15 1.1 cgd * documentation and/or other materials provided with the distribution.
16 1.1 cgd * 3. All advertising materials mentioning features or use of this software
17 1.1 cgd * must display the following acknowledgement:
18 1.1 cgd * This product includes software developed by the University of
19 1.1 cgd * California, Berkeley and its contributors.
20 1.1 cgd * 4. Neither the name of the University nor the names of its contributors
21 1.1 cgd * may be used to endorse or promote products derived from this software
22 1.1 cgd * without specific prior written permission.
23 1.1 cgd *
24 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
25 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 1.1 cgd * SUCH DAMAGE.
35 1.1 cgd *
36 1.32 fvdl * @(#)kern_malloc.c 8.4 (Berkeley) 5/20/95
37 1.1 cgd */
38 1.31 mrg
39 1.33 thorpej #include "opt_lockdebug.h"
40 1.1 cgd
41 1.7 mycroft #include <sys/param.h>
42 1.7 mycroft #include <sys/proc.h>
43 1.8 cgd #include <sys/map.h>
44 1.7 mycroft #include <sys/kernel.h>
45 1.7 mycroft #include <sys/malloc.h>
46 1.12 christos #include <sys/systm.h>
47 1.24 thorpej
48 1.28 mrg #include <uvm/uvm_extern.h>
49 1.28 mrg
50 1.61 thorpej static struct vm_map kmem_map_store;
51 1.58 chs struct vm_map *kmem_map = NULL;
52 1.28 mrg
53 1.49 thorpej #include "opt_kmempages.h"
54 1.49 thorpej
55 1.49 thorpej #ifdef NKMEMCLUSTERS
56 1.52 sommerfe #error NKMEMCLUSTERS is obsolete; remove it from your kernel config file and use NKMEMPAGES instead or let the kernel auto-size
57 1.49 thorpej #endif
58 1.49 thorpej
59 1.49 thorpej /*
60 1.49 thorpej * Default number of pages in kmem_map. We attempt to calculate this
61 1.49 thorpej * at run-time, but allow it to be either patched or set in the kernel
62 1.49 thorpej * config file.
63 1.49 thorpej */
64 1.49 thorpej #ifndef NKMEMPAGES
65 1.49 thorpej #define NKMEMPAGES 0
66 1.49 thorpej #endif
67 1.49 thorpej int nkmempages = NKMEMPAGES;
68 1.49 thorpej
69 1.49 thorpej /*
70 1.49 thorpej * Defaults for lower- and upper-bounds for the kmem_map page count.
71 1.49 thorpej * Can be overridden by kernel config options.
72 1.49 thorpej */
73 1.49 thorpej #ifndef NKMEMPAGES_MIN
74 1.49 thorpej #define NKMEMPAGES_MIN NKMEMPAGES_MIN_DEFAULT
75 1.49 thorpej #endif
76 1.49 thorpej
77 1.49 thorpej #ifndef NKMEMPAGES_MAX
78 1.49 thorpej #define NKMEMPAGES_MAX NKMEMPAGES_MAX_DEFAULT
79 1.49 thorpej #endif
80 1.49 thorpej
81 1.24 thorpej #include "opt_kmemstats.h"
82 1.27 thorpej #include "opt_malloclog.h"
83 1.12 christos
84 1.1 cgd struct kmembuckets bucket[MINBUCKET + 16];
85 1.8 cgd struct kmemstats kmemstats[M_LAST];
86 1.1 cgd struct kmemusage *kmemusage;
87 1.1 cgd char *kmembase, *kmemlimit;
88 1.57 jdolecek const char * const memname[] = INITKMEMNAMES;
89 1.1 cgd
90 1.27 thorpej #ifdef MALLOCLOG
91 1.27 thorpej #ifndef MALLOCLOGSIZE
92 1.27 thorpej #define MALLOCLOGSIZE 100000
93 1.27 thorpej #endif
94 1.27 thorpej
95 1.27 thorpej struct malloclog {
96 1.27 thorpej void *addr;
97 1.27 thorpej long size;
98 1.27 thorpej int type;
99 1.27 thorpej int action;
100 1.27 thorpej const char *file;
101 1.27 thorpej long line;
102 1.27 thorpej } malloclog[MALLOCLOGSIZE];
103 1.27 thorpej
104 1.27 thorpej long malloclogptr;
105 1.27 thorpej
106 1.27 thorpej static void domlog __P((void *a, long size, int type, int action,
107 1.27 thorpej const char *file, long line));
108 1.27 thorpej static void hitmlog __P((void *a));
109 1.27 thorpej
110 1.27 thorpej static void
111 1.27 thorpej domlog(a, size, type, action, file, line)
112 1.27 thorpej void *a;
113 1.27 thorpej long size;
114 1.27 thorpej int type;
115 1.27 thorpej int action;
116 1.27 thorpej const char *file;
117 1.27 thorpej long line;
118 1.27 thorpej {
119 1.27 thorpej
120 1.27 thorpej malloclog[malloclogptr].addr = a;
121 1.27 thorpej malloclog[malloclogptr].size = size;
122 1.27 thorpej malloclog[malloclogptr].type = type;
123 1.27 thorpej malloclog[malloclogptr].action = action;
124 1.27 thorpej malloclog[malloclogptr].file = file;
125 1.27 thorpej malloclog[malloclogptr].line = line;
126 1.27 thorpej malloclogptr++;
127 1.27 thorpej if (malloclogptr >= MALLOCLOGSIZE)
128 1.27 thorpej malloclogptr = 0;
129 1.27 thorpej }
130 1.27 thorpej
131 1.27 thorpej static void
132 1.27 thorpej hitmlog(a)
133 1.27 thorpej void *a;
134 1.27 thorpej {
135 1.27 thorpej struct malloclog *lp;
136 1.27 thorpej long l;
137 1.27 thorpej
138 1.27 thorpej #define PRT \
139 1.27 thorpej if (malloclog[l].addr == a && malloclog[l].action) { \
140 1.27 thorpej lp = &malloclog[l]; \
141 1.27 thorpej printf("malloc log entry %ld:\n", l); \
142 1.27 thorpej printf("\taddr = %p\n", lp->addr); \
143 1.27 thorpej printf("\tsize = %ld\n", lp->size); \
144 1.27 thorpej printf("\ttype = %s\n", memname[lp->type]); \
145 1.27 thorpej printf("\taction = %s\n", lp->action == 1 ? "alloc" : "free"); \
146 1.27 thorpej printf("\tfile = %s\n", lp->file); \
147 1.27 thorpej printf("\tline = %ld\n", lp->line); \
148 1.27 thorpej }
149 1.27 thorpej
150 1.27 thorpej for (l = malloclogptr; l < MALLOCLOGSIZE; l++)
151 1.27 thorpej PRT
152 1.27 thorpej
153 1.27 thorpej for (l = 0; l < malloclogptr; l++)
154 1.27 thorpej PRT
155 1.27 thorpej }
156 1.27 thorpej #endif /* MALLOCLOG */
157 1.27 thorpej
158 1.8 cgd #ifdef DIAGNOSTIC
159 1.8 cgd /*
160 1.8 cgd * This structure provides a set of masks to catch unaligned frees.
161 1.8 cgd */
162 1.57 jdolecek const long addrmask[] = { 0,
163 1.8 cgd 0x00000001, 0x00000003, 0x00000007, 0x0000000f,
164 1.8 cgd 0x0000001f, 0x0000003f, 0x0000007f, 0x000000ff,
165 1.8 cgd 0x000001ff, 0x000003ff, 0x000007ff, 0x00000fff,
166 1.8 cgd 0x00001fff, 0x00003fff, 0x00007fff, 0x0000ffff,
167 1.8 cgd };
168 1.8 cgd
169 1.8 cgd /*
170 1.8 cgd * The WEIRD_ADDR is used as known text to copy into free objects so
171 1.8 cgd * that modifications after frees can be detected.
172 1.8 cgd */
173 1.12 christos #define WEIRD_ADDR ((unsigned) 0xdeadbeef)
174 1.55 chs #ifdef DEBUG
175 1.55 chs #define MAX_COPY PAGE_SIZE
176 1.55 chs #else
177 1.8 cgd #define MAX_COPY 32
178 1.55 chs #endif
179 1.8 cgd
180 1.8 cgd /*
181 1.11 cgd * Normally the freelist structure is used only to hold the list pointer
182 1.11 cgd * for free objects. However, when running with diagnostics, the first
183 1.11 cgd * 8 bytes of the structure is unused except for diagnostic information,
184 1.11 cgd * and the free list pointer is at offst 8 in the structure. Since the
185 1.11 cgd * first 8 bytes is the portion of the structure most often modified, this
186 1.11 cgd * helps to detect memory reuse problems and avoid free list corruption.
187 1.8 cgd */
188 1.8 cgd struct freelist {
189 1.11 cgd int32_t spare0;
190 1.11 cgd int16_t type;
191 1.11 cgd int16_t spare1;
192 1.8 cgd caddr_t next;
193 1.8 cgd };
194 1.8 cgd #else /* !DIAGNOSTIC */
195 1.8 cgd struct freelist {
196 1.8 cgd caddr_t next;
197 1.8 cgd };
198 1.8 cgd #endif /* DIAGNOSTIC */
199 1.8 cgd
200 1.1 cgd /*
201 1.1 cgd * Allocate a block of memory
202 1.1 cgd */
203 1.27 thorpej #ifdef MALLOCLOG
204 1.27 thorpej void *
205 1.27 thorpej _malloc(size, type, flags, file, line)
206 1.27 thorpej unsigned long size;
207 1.27 thorpej int type, flags;
208 1.27 thorpej const char *file;
209 1.27 thorpej long line;
210 1.27 thorpej #else
211 1.1 cgd void *
212 1.1 cgd malloc(size, type, flags)
213 1.1 cgd unsigned long size;
214 1.1 cgd int type, flags;
215 1.27 thorpej #endif /* MALLOCLOG */
216 1.1 cgd {
217 1.50 augustss struct kmembuckets *kbp;
218 1.50 augustss struct kmemusage *kup;
219 1.50 augustss struct freelist *freep;
220 1.5 andrew long indx, npg, allocsize;
221 1.1 cgd int s;
222 1.1 cgd caddr_t va, cp, savedlist;
223 1.8 cgd #ifdef DIAGNOSTIC
224 1.11 cgd int32_t *end, *lp;
225 1.8 cgd int copysize;
226 1.26 mycroft const char *savedtype;
227 1.8 cgd #endif
228 1.1 cgd #ifdef KMEMSTATS
229 1.50 augustss struct kmemstats *ksp = &kmemstats[type];
230 1.1 cgd
231 1.51 thorpej if (__predict_false(((unsigned long)type) > M_LAST))
232 1.1 cgd panic("malloc - bogus type");
233 1.1 cgd #endif
234 1.59 thorpej #ifdef LOCKDEBUG
235 1.59 thorpej if ((flags & M_NOWAIT) == 0)
236 1.59 thorpej simple_lock_only_held(NULL, "malloc");
237 1.59 thorpej #endif
238 1.62 thorpej #ifdef MALLOC_DEBUG
239 1.62 thorpej if (debug_malloc(size, type, flags, (void **) &va))
240 1.62 thorpej return ((void *) va);
241 1.62 thorpej #endif
242 1.1 cgd indx = BUCKETINDX(size);
243 1.1 cgd kbp = &bucket[indx];
244 1.56 thorpej s = splvm();
245 1.1 cgd #ifdef KMEMSTATS
246 1.1 cgd while (ksp->ks_memuse >= ksp->ks_limit) {
247 1.1 cgd if (flags & M_NOWAIT) {
248 1.1 cgd splx(s);
249 1.1 cgd return ((void *) NULL);
250 1.1 cgd }
251 1.1 cgd if (ksp->ks_limblocks < 65535)
252 1.1 cgd ksp->ks_limblocks++;
253 1.1 cgd tsleep((caddr_t)ksp, PSWP+2, memname[type], 0);
254 1.1 cgd }
255 1.8 cgd ksp->ks_size |= 1 << indx;
256 1.8 cgd #endif
257 1.8 cgd #ifdef DIAGNOSTIC
258 1.8 cgd copysize = 1 << indx < MAX_COPY ? 1 << indx : MAX_COPY;
259 1.1 cgd #endif
260 1.1 cgd if (kbp->kb_next == NULL) {
261 1.8 cgd kbp->kb_last = NULL;
262 1.1 cgd if (size > MAXALLOCSAVE)
263 1.49 thorpej allocsize = roundup(size, PAGE_SIZE);
264 1.1 cgd else
265 1.1 cgd allocsize = 1 << indx;
266 1.47 ragge npg = btoc(allocsize);
267 1.28 mrg va = (caddr_t) uvm_km_kmemalloc(kmem_map, uvmexp.kmem_object,
268 1.35 eeh (vsize_t)ctob(npg),
269 1.28 mrg (flags & M_NOWAIT) ? UVM_KMF_NOWAIT : 0);
270 1.51 thorpej if (__predict_false(va == NULL)) {
271 1.17 cgd /*
272 1.17 cgd * Kmem_malloc() can return NULL, even if it can
273 1.17 cgd * wait, if there is no map space avaiable, because
274 1.17 cgd * it can't fix that problem. Neither can we,
275 1.17 cgd * right now. (We should release pages which
276 1.17 cgd * are completely free and which are in buckets
277 1.17 cgd * with too many free elements.)
278 1.17 cgd */
279 1.17 cgd if ((flags & M_NOWAIT) == 0)
280 1.17 cgd panic("malloc: out of space in kmem_map");
281 1.6 cgd splx(s);
282 1.6 cgd return ((void *) NULL);
283 1.1 cgd }
284 1.1 cgd #ifdef KMEMSTATS
285 1.1 cgd kbp->kb_total += kbp->kb_elmpercl;
286 1.1 cgd #endif
287 1.1 cgd kup = btokup(va);
288 1.1 cgd kup->ku_indx = indx;
289 1.1 cgd if (allocsize > MAXALLOCSAVE) {
290 1.1 cgd if (npg > 65535)
291 1.1 cgd panic("malloc: allocation too large");
292 1.1 cgd kup->ku_pagecnt = npg;
293 1.1 cgd #ifdef KMEMSTATS
294 1.1 cgd ksp->ks_memuse += allocsize;
295 1.1 cgd #endif
296 1.1 cgd goto out;
297 1.1 cgd }
298 1.1 cgd #ifdef KMEMSTATS
299 1.1 cgd kup->ku_freecnt = kbp->kb_elmpercl;
300 1.1 cgd kbp->kb_totalfree += kbp->kb_elmpercl;
301 1.1 cgd #endif
302 1.1 cgd /*
303 1.1 cgd * Just in case we blocked while allocating memory,
304 1.1 cgd * and someone else also allocated memory for this
305 1.1 cgd * bucket, don't assume the list is still empty.
306 1.1 cgd */
307 1.1 cgd savedlist = kbp->kb_next;
308 1.49 thorpej kbp->kb_next = cp = va + (npg << PAGE_SHIFT) - allocsize;
309 1.8 cgd for (;;) {
310 1.8 cgd freep = (struct freelist *)cp;
311 1.8 cgd #ifdef DIAGNOSTIC
312 1.8 cgd /*
313 1.8 cgd * Copy in known text to detect modification
314 1.8 cgd * after freeing.
315 1.8 cgd */
316 1.11 cgd end = (int32_t *)&cp[copysize];
317 1.11 cgd for (lp = (int32_t *)cp; lp < end; lp++)
318 1.8 cgd *lp = WEIRD_ADDR;
319 1.8 cgd freep->type = M_FREE;
320 1.8 cgd #endif /* DIAGNOSTIC */
321 1.8 cgd if (cp <= va)
322 1.8 cgd break;
323 1.8 cgd cp -= allocsize;
324 1.8 cgd freep->next = cp;
325 1.8 cgd }
326 1.8 cgd freep->next = savedlist;
327 1.8 cgd if (kbp->kb_last == NULL)
328 1.8 cgd kbp->kb_last = (caddr_t)freep;
329 1.1 cgd }
330 1.1 cgd va = kbp->kb_next;
331 1.8 cgd kbp->kb_next = ((struct freelist *)va)->next;
332 1.8 cgd #ifdef DIAGNOSTIC
333 1.8 cgd freep = (struct freelist *)va;
334 1.8 cgd savedtype = (unsigned)freep->type < M_LAST ?
335 1.8 cgd memname[freep->type] : "???";
336 1.29 chs if (kbp->kb_next) {
337 1.29 chs int rv;
338 1.35 eeh vaddr_t addr = (vaddr_t)kbp->kb_next;
339 1.29 chs
340 1.43 thorpej vm_map_lock(kmem_map);
341 1.29 chs rv = uvm_map_checkprot(kmem_map, addr,
342 1.29 chs addr + sizeof(struct freelist),
343 1.29 chs VM_PROT_WRITE);
344 1.43 thorpej vm_map_unlock(kmem_map);
345 1.29 chs
346 1.51 thorpej if (__predict_false(rv == 0)) {
347 1.41 mrg printf(
348 1.21 christos "%s %ld of object %p size %ld %s %s (invalid addr %p)\n",
349 1.41 mrg "Data modified on freelist: word",
350 1.41 mrg (long)((int32_t *)&kbp->kb_next - (int32_t *)kbp),
351 1.41 mrg va, size, "previous type", savedtype, kbp->kb_next);
352 1.27 thorpej #ifdef MALLOCLOG
353 1.41 mrg hitmlog(va);
354 1.27 thorpej #endif
355 1.41 mrg kbp->kb_next = NULL;
356 1.29 chs }
357 1.8 cgd }
358 1.11 cgd
359 1.11 cgd /* Fill the fields that we've used with WEIRD_ADDR */
360 1.8 cgd #if BYTE_ORDER == BIG_ENDIAN
361 1.8 cgd freep->type = WEIRD_ADDR >> 16;
362 1.8 cgd #endif
363 1.8 cgd #if BYTE_ORDER == LITTLE_ENDIAN
364 1.8 cgd freep->type = (short)WEIRD_ADDR;
365 1.8 cgd #endif
366 1.11 cgd end = (int32_t *)&freep->next +
367 1.11 cgd (sizeof(freep->next) / sizeof(int32_t));
368 1.11 cgd for (lp = (int32_t *)&freep->next; lp < end; lp++)
369 1.11 cgd *lp = WEIRD_ADDR;
370 1.11 cgd
371 1.11 cgd /* and check that the data hasn't been modified. */
372 1.11 cgd end = (int32_t *)&va[copysize];
373 1.11 cgd for (lp = (int32_t *)va; lp < end; lp++) {
374 1.51 thorpej if (__predict_true(*lp == WEIRD_ADDR))
375 1.8 cgd continue;
376 1.22 christos printf("%s %ld of object %p size %ld %s %s (0x%x != 0x%x)\n",
377 1.21 christos "Data modified on freelist: word",
378 1.21 christos (long)(lp - (int32_t *)va), va, size, "previous type",
379 1.21 christos savedtype, *lp, WEIRD_ADDR);
380 1.27 thorpej #ifdef MALLOCLOG
381 1.27 thorpej hitmlog(va);
382 1.27 thorpej #endif
383 1.8 cgd break;
384 1.8 cgd }
385 1.11 cgd
386 1.8 cgd freep->spare0 = 0;
387 1.8 cgd #endif /* DIAGNOSTIC */
388 1.1 cgd #ifdef KMEMSTATS
389 1.1 cgd kup = btokup(va);
390 1.1 cgd if (kup->ku_indx != indx)
391 1.1 cgd panic("malloc: wrong bucket");
392 1.1 cgd if (kup->ku_freecnt == 0)
393 1.1 cgd panic("malloc: lost data");
394 1.1 cgd kup->ku_freecnt--;
395 1.1 cgd kbp->kb_totalfree--;
396 1.1 cgd ksp->ks_memuse += 1 << indx;
397 1.1 cgd out:
398 1.1 cgd kbp->kb_calls++;
399 1.1 cgd ksp->ks_inuse++;
400 1.1 cgd ksp->ks_calls++;
401 1.1 cgd if (ksp->ks_memuse > ksp->ks_maxused)
402 1.1 cgd ksp->ks_maxused = ksp->ks_memuse;
403 1.1 cgd #else
404 1.1 cgd out:
405 1.1 cgd #endif
406 1.27 thorpej #ifdef MALLOCLOG
407 1.27 thorpej domlog(va, size, type, 1, file, line);
408 1.27 thorpej #endif
409 1.1 cgd splx(s);
410 1.1 cgd return ((void *) va);
411 1.1 cgd }
412 1.1 cgd
413 1.1 cgd /*
414 1.1 cgd * Free a block of memory allocated by malloc.
415 1.1 cgd */
416 1.27 thorpej #ifdef MALLOCLOG
417 1.27 thorpej void
418 1.27 thorpej _free(addr, type, file, line)
419 1.27 thorpej void *addr;
420 1.27 thorpej int type;
421 1.27 thorpej const char *file;
422 1.27 thorpej long line;
423 1.27 thorpej #else
424 1.1 cgd void
425 1.1 cgd free(addr, type)
426 1.1 cgd void *addr;
427 1.1 cgd int type;
428 1.27 thorpej #endif /* MALLOCLOG */
429 1.1 cgd {
430 1.50 augustss struct kmembuckets *kbp;
431 1.50 augustss struct kmemusage *kup;
432 1.50 augustss struct freelist *freep;
433 1.8 cgd long size;
434 1.8 cgd int s;
435 1.5 andrew #ifdef DIAGNOSTIC
436 1.8 cgd caddr_t cp;
437 1.11 cgd int32_t *end, *lp;
438 1.11 cgd long alloc, copysize;
439 1.5 andrew #endif
440 1.1 cgd #ifdef KMEMSTATS
441 1.50 augustss struct kmemstats *ksp = &kmemstats[type];
442 1.48 thorpej #endif
443 1.48 thorpej
444 1.62 thorpej #ifdef MALLOC_DEBUG
445 1.62 thorpej if (debug_free(addr, type))
446 1.62 thorpej return;
447 1.62 thorpej #endif
448 1.62 thorpej
449 1.48 thorpej #ifdef DIAGNOSTIC
450 1.48 thorpej /*
451 1.48 thorpej * Ensure that we're free'ing something that we could
452 1.48 thorpej * have allocated in the first place. That is, check
453 1.48 thorpej * to see that the address is within kmem_map.
454 1.48 thorpej */
455 1.51 thorpej if (__predict_false((vaddr_t)addr < kmem_map->header.start ||
456 1.51 thorpej (vaddr_t)addr >= kmem_map->header.end))
457 1.48 thorpej panic("free: addr %p not within kmem_map", addr);
458 1.1 cgd #endif
459 1.1 cgd
460 1.1 cgd kup = btokup(addr);
461 1.1 cgd size = 1 << kup->ku_indx;
462 1.8 cgd kbp = &bucket[kup->ku_indx];
463 1.56 thorpej s = splvm();
464 1.27 thorpej #ifdef MALLOCLOG
465 1.27 thorpej domlog(addr, 0, type, 2, file, line);
466 1.27 thorpej #endif
467 1.1 cgd #ifdef DIAGNOSTIC
468 1.8 cgd /*
469 1.8 cgd * Check for returns of data that do not point to the
470 1.8 cgd * beginning of the allocation.
471 1.8 cgd */
472 1.49 thorpej if (size > PAGE_SIZE)
473 1.49 thorpej alloc = addrmask[BUCKETINDX(PAGE_SIZE)];
474 1.1 cgd else
475 1.1 cgd alloc = addrmask[kup->ku_indx];
476 1.8 cgd if (((u_long)addr & alloc) != 0)
477 1.15 christos panic("free: unaligned addr %p, size %ld, type %s, mask %ld\n",
478 1.8 cgd addr, size, memname[type], alloc);
479 1.1 cgd #endif /* DIAGNOSTIC */
480 1.1 cgd if (size > MAXALLOCSAVE) {
481 1.35 eeh uvm_km_free(kmem_map, (vaddr_t)addr, ctob(kup->ku_pagecnt));
482 1.1 cgd #ifdef KMEMSTATS
483 1.1 cgd size = kup->ku_pagecnt << PGSHIFT;
484 1.1 cgd ksp->ks_memuse -= size;
485 1.1 cgd kup->ku_indx = 0;
486 1.1 cgd kup->ku_pagecnt = 0;
487 1.1 cgd if (ksp->ks_memuse + size >= ksp->ks_limit &&
488 1.1 cgd ksp->ks_memuse < ksp->ks_limit)
489 1.1 cgd wakeup((caddr_t)ksp);
490 1.1 cgd ksp->ks_inuse--;
491 1.1 cgd kbp->kb_total -= 1;
492 1.1 cgd #endif
493 1.1 cgd splx(s);
494 1.1 cgd return;
495 1.1 cgd }
496 1.8 cgd freep = (struct freelist *)addr;
497 1.8 cgd #ifdef DIAGNOSTIC
498 1.8 cgd /*
499 1.8 cgd * Check for multiple frees. Use a quick check to see if
500 1.8 cgd * it looks free before laboriously searching the freelist.
501 1.8 cgd */
502 1.51 thorpej if (__predict_false(freep->spare0 == WEIRD_ADDR)) {
503 1.16 cgd for (cp = kbp->kb_next; cp;
504 1.16 cgd cp = ((struct freelist *)cp)->next) {
505 1.8 cgd if (addr != cp)
506 1.8 cgd continue;
507 1.22 christos printf("multiply freed item %p\n", addr);
508 1.27 thorpej #ifdef MALLOCLOG
509 1.27 thorpej hitmlog(addr);
510 1.27 thorpej #endif
511 1.8 cgd panic("free: duplicated free");
512 1.8 cgd }
513 1.8 cgd }
514 1.38 chs #ifdef LOCKDEBUG
515 1.38 chs /*
516 1.38 chs * Check if we're freeing a locked simple lock.
517 1.38 chs */
518 1.40 chs simple_lock_freecheck(addr, (char *)addr + size);
519 1.38 chs #endif
520 1.8 cgd /*
521 1.8 cgd * Copy in known text to detect modification after freeing
522 1.8 cgd * and to make it look free. Also, save the type being freed
523 1.8 cgd * so we can list likely culprit if modification is detected
524 1.8 cgd * when the object is reallocated.
525 1.8 cgd */
526 1.8 cgd copysize = size < MAX_COPY ? size : MAX_COPY;
527 1.11 cgd end = (int32_t *)&((caddr_t)addr)[copysize];
528 1.11 cgd for (lp = (int32_t *)addr; lp < end; lp++)
529 1.8 cgd *lp = WEIRD_ADDR;
530 1.8 cgd freep->type = type;
531 1.8 cgd #endif /* DIAGNOSTIC */
532 1.1 cgd #ifdef KMEMSTATS
533 1.1 cgd kup->ku_freecnt++;
534 1.36 thorpej if (kup->ku_freecnt >= kbp->kb_elmpercl) {
535 1.1 cgd if (kup->ku_freecnt > kbp->kb_elmpercl)
536 1.1 cgd panic("free: multiple frees");
537 1.1 cgd else if (kbp->kb_totalfree > kbp->kb_highwat)
538 1.1 cgd kbp->kb_couldfree++;
539 1.36 thorpej }
540 1.1 cgd kbp->kb_totalfree++;
541 1.1 cgd ksp->ks_memuse -= size;
542 1.1 cgd if (ksp->ks_memuse + size >= ksp->ks_limit &&
543 1.1 cgd ksp->ks_memuse < ksp->ks_limit)
544 1.1 cgd wakeup((caddr_t)ksp);
545 1.1 cgd ksp->ks_inuse--;
546 1.1 cgd #endif
547 1.8 cgd if (kbp->kb_next == NULL)
548 1.8 cgd kbp->kb_next = addr;
549 1.8 cgd else
550 1.8 cgd ((struct freelist *)kbp->kb_last)->next = addr;
551 1.8 cgd freep->next = NULL;
552 1.8 cgd kbp->kb_last = addr;
553 1.1 cgd splx(s);
554 1.20 cgd }
555 1.20 cgd
556 1.20 cgd /*
557 1.20 cgd * Change the size of a block of memory.
558 1.20 cgd */
559 1.20 cgd void *
560 1.20 cgd realloc(curaddr, newsize, type, flags)
561 1.20 cgd void *curaddr;
562 1.20 cgd unsigned long newsize;
563 1.20 cgd int type, flags;
564 1.20 cgd {
565 1.50 augustss struct kmemusage *kup;
566 1.20 cgd long cursize;
567 1.20 cgd void *newaddr;
568 1.20 cgd #ifdef DIAGNOSTIC
569 1.20 cgd long alloc;
570 1.20 cgd #endif
571 1.20 cgd
572 1.20 cgd /*
573 1.20 cgd * Realloc() with a NULL pointer is the same as malloc().
574 1.20 cgd */
575 1.20 cgd if (curaddr == NULL)
576 1.20 cgd return (malloc(newsize, type, flags));
577 1.20 cgd
578 1.20 cgd /*
579 1.20 cgd * Realloc() with zero size is the same as free().
580 1.20 cgd */
581 1.20 cgd if (newsize == 0) {
582 1.20 cgd free(curaddr, type);
583 1.20 cgd return (NULL);
584 1.20 cgd }
585 1.59 thorpej
586 1.59 thorpej #ifdef LOCKDEBUG
587 1.59 thorpej if ((flags & M_NOWAIT) == 0)
588 1.59 thorpej simple_lock_only_held(NULL, "realloc");
589 1.59 thorpej #endif
590 1.20 cgd
591 1.20 cgd /*
592 1.20 cgd * Find out how large the old allocation was (and do some
593 1.20 cgd * sanity checking).
594 1.20 cgd */
595 1.20 cgd kup = btokup(curaddr);
596 1.20 cgd cursize = 1 << kup->ku_indx;
597 1.20 cgd
598 1.20 cgd #ifdef DIAGNOSTIC
599 1.20 cgd /*
600 1.20 cgd * Check for returns of data that do not point to the
601 1.20 cgd * beginning of the allocation.
602 1.20 cgd */
603 1.49 thorpej if (cursize > PAGE_SIZE)
604 1.49 thorpej alloc = addrmask[BUCKETINDX(PAGE_SIZE)];
605 1.20 cgd else
606 1.20 cgd alloc = addrmask[kup->ku_indx];
607 1.20 cgd if (((u_long)curaddr & alloc) != 0)
608 1.20 cgd panic("realloc: unaligned addr %p, size %ld, type %s, mask %ld\n",
609 1.20 cgd curaddr, cursize, memname[type], alloc);
610 1.20 cgd #endif /* DIAGNOSTIC */
611 1.20 cgd
612 1.20 cgd if (cursize > MAXALLOCSAVE)
613 1.20 cgd cursize = ctob(kup->ku_pagecnt);
614 1.20 cgd
615 1.20 cgd /*
616 1.20 cgd * If we already actually have as much as they want, we're done.
617 1.20 cgd */
618 1.20 cgd if (newsize <= cursize)
619 1.20 cgd return (curaddr);
620 1.20 cgd
621 1.20 cgd /*
622 1.20 cgd * Can't satisfy the allocation with the existing block.
623 1.20 cgd * Allocate a new one and copy the data.
624 1.20 cgd */
625 1.20 cgd newaddr = malloc(newsize, type, flags);
626 1.51 thorpej if (__predict_false(newaddr == NULL)) {
627 1.20 cgd /*
628 1.20 cgd * Malloc() failed, because flags included M_NOWAIT.
629 1.20 cgd * Return NULL to indicate that failure. The old
630 1.20 cgd * pointer is still valid.
631 1.20 cgd */
632 1.20 cgd return NULL;
633 1.20 cgd }
634 1.34 perry memcpy(newaddr, curaddr, cursize);
635 1.20 cgd
636 1.20 cgd /*
637 1.20 cgd * We were successful: free the old allocation and return
638 1.20 cgd * the new one.
639 1.20 cgd */
640 1.20 cgd free(curaddr, type);
641 1.20 cgd return (newaddr);
642 1.1 cgd }
643 1.1 cgd
644 1.1 cgd /*
645 1.49 thorpej * Compute the number of pages that kmem_map will map, that is,
646 1.49 thorpej * the size of the kernel malloc arena.
647 1.49 thorpej */
648 1.49 thorpej void
649 1.49 thorpej kmeminit_nkmempages()
650 1.49 thorpej {
651 1.49 thorpej int npages;
652 1.49 thorpej
653 1.49 thorpej if (nkmempages != 0) {
654 1.49 thorpej /*
655 1.49 thorpej * It's already been set (by us being here before, or
656 1.49 thorpej * by patching or kernel config options), bail out now.
657 1.49 thorpej */
658 1.49 thorpej return;
659 1.49 thorpej }
660 1.49 thorpej
661 1.49 thorpej /*
662 1.49 thorpej * We use the following (simple) formula:
663 1.49 thorpej *
664 1.49 thorpej * - Starting point is physical memory / 4.
665 1.49 thorpej *
666 1.49 thorpej * - Clamp it down to NKMEMPAGES_MAX.
667 1.49 thorpej *
668 1.49 thorpej * - Round it up to NKMEMPAGES_MIN.
669 1.49 thorpej */
670 1.49 thorpej npages = physmem / 4;
671 1.49 thorpej
672 1.49 thorpej if (npages > NKMEMPAGES_MAX)
673 1.49 thorpej npages = NKMEMPAGES_MAX;
674 1.49 thorpej
675 1.49 thorpej if (npages < NKMEMPAGES_MIN)
676 1.49 thorpej npages = NKMEMPAGES_MIN;
677 1.49 thorpej
678 1.49 thorpej nkmempages = npages;
679 1.49 thorpej }
680 1.49 thorpej
681 1.49 thorpej /*
682 1.1 cgd * Initialize the kernel memory allocator
683 1.1 cgd */
684 1.12 christos void
685 1.1 cgd kmeminit()
686 1.1 cgd {
687 1.23 tls #ifdef KMEMSTATS
688 1.50 augustss long indx;
689 1.23 tls #endif
690 1.1 cgd
691 1.1 cgd #if ((MAXALLOCSAVE & (MAXALLOCSAVE - 1)) != 0)
692 1.1 cgd ERROR!_kmeminit:_MAXALLOCSAVE_not_power_of_2
693 1.1 cgd #endif
694 1.1 cgd #if (MAXALLOCSAVE > MINALLOCSIZE * 32768)
695 1.1 cgd ERROR!_kmeminit:_MAXALLOCSAVE_too_big
696 1.1 cgd #endif
697 1.47 ragge #if (MAXALLOCSAVE < NBPG)
698 1.1 cgd ERROR!_kmeminit:_MAXALLOCSAVE_too_small
699 1.1 cgd #endif
700 1.11 cgd
701 1.11 cgd if (sizeof(struct freelist) > (1 << MINBUCKET))
702 1.11 cgd panic("minbucket too small/struct freelist too big");
703 1.11 cgd
704 1.49 thorpej /*
705 1.49 thorpej * Compute the number of kmem_map pages, if we have not
706 1.49 thorpej * done so already.
707 1.49 thorpej */
708 1.49 thorpej kmeminit_nkmempages();
709 1.49 thorpej
710 1.28 mrg kmemusage = (struct kmemusage *) uvm_km_zalloc(kernel_map,
711 1.49 thorpej (vsize_t)(nkmempages * sizeof(struct kmemusage)));
712 1.35 eeh kmem_map = uvm_km_suballoc(kernel_map, (vaddr_t *)&kmembase,
713 1.49 thorpej (vaddr_t *)&kmemlimit, (vsize_t)(nkmempages << PAGE_SHIFT),
714 1.61 thorpej VM_MAP_INTRSAFE, FALSE, &kmem_map_store);
715 1.1 cgd #ifdef KMEMSTATS
716 1.1 cgd for (indx = 0; indx < MINBUCKET + 16; indx++) {
717 1.49 thorpej if (1 << indx >= PAGE_SIZE)
718 1.1 cgd bucket[indx].kb_elmpercl = 1;
719 1.1 cgd else
720 1.49 thorpej bucket[indx].kb_elmpercl = PAGE_SIZE / (1 << indx);
721 1.1 cgd bucket[indx].kb_highwat = 5 * bucket[indx].kb_elmpercl;
722 1.1 cgd }
723 1.8 cgd for (indx = 0; indx < M_LAST; indx++)
724 1.60 thorpej kmemstats[indx].ks_limit =
725 1.60 thorpej ((u_long)nkmempages << PAGE_SHIFT) * 6U / 10U;
726 1.62 thorpej #endif
727 1.62 thorpej #ifdef MALLOC_DEBUG
728 1.62 thorpej debug_malloc_init();
729 1.1 cgd #endif
730 1.1 cgd }
731 1.39 thorpej
732 1.39 thorpej #ifdef DDB
733 1.39 thorpej #include <ddb/db_output.h>
734 1.39 thorpej
735 1.39 thorpej /*
736 1.39 thorpej * Dump kmem statistics from ddb.
737 1.39 thorpej *
738 1.39 thorpej * usage: call dump_kmemstats
739 1.39 thorpej */
740 1.39 thorpej void dump_kmemstats __P((void));
741 1.39 thorpej
742 1.39 thorpej void
743 1.39 thorpej dump_kmemstats()
744 1.39 thorpej {
745 1.39 thorpej #ifdef KMEMSTATS
746 1.39 thorpej const char *name;
747 1.39 thorpej int i;
748 1.39 thorpej
749 1.39 thorpej for (i = 0; i < M_LAST; i++) {
750 1.39 thorpej name = memname[i] ? memname[i] : "";
751 1.39 thorpej
752 1.39 thorpej db_printf("%2d %s%.*s %ld\n", i, name,
753 1.39 thorpej (int)(20 - strlen(name)), " ",
754 1.39 thorpej kmemstats[i].ks_memuse);
755 1.39 thorpej }
756 1.39 thorpej #else
757 1.39 thorpej db_printf("Kmem stats are not being collected.\n");
758 1.39 thorpej #endif /* KMEMSTATS */
759 1.39 thorpej }
760 1.39 thorpej #endif /* DDB */
761