1999-01-28 17:46:27 +03:00
|
|
|
/* $NetBSD: uvm_amap.c,v 1.19 1999/01/28 14:46:27 chuck Exp $ */
|
1998-02-05 09:25:08 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
*
|
|
|
|
* Copyright (c) 1997 Charles D. Cranor and Washington University.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* This product includes software developed by Charles D. Cranor and
|
|
|
|
* Washington University.
|
|
|
|
* 4. The name of the author may not be used to endorse or promote products
|
|
|
|
* derived from this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
1999-01-28 17:46:27 +03:00
|
|
|
* uvm_amap.c: amap operations
|
1998-02-05 09:25:08 +03:00
|
|
|
*/
|
|
|
|
|
1999-01-28 17:46:27 +03:00
|
|
|
/*
|
|
|
|
* this file contains functions that perform operations on amaps. see
|
|
|
|
* uvm_amap.h for a brief explanation of the role of amaps in uvm.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#undef UVM_AMAP_INLINE /* enable/disable amap inlines */
|
|
|
|
|
1998-02-10 17:08:44 +03:00
|
|
|
#include "opt_uvmhist.h"
|
|
|
|
|
1998-02-05 09:25:08 +03:00
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/systm.h>
|
|
|
|
#include <sys/proc.h>
|
|
|
|
#include <sys/malloc.h>
|
1998-08-29 05:05:28 +04:00
|
|
|
#include <sys/pool.h>
|
1998-02-05 09:25:08 +03:00
|
|
|
|
|
|
|
#include <vm/vm.h>
|
|
|
|
#include <vm/vm_page.h>
|
|
|
|
#include <vm/vm_kern.h>
|
|
|
|
|
1999-01-28 17:46:27 +03:00
|
|
|
#define UVM_AMAP_C /* ensure disabled inlines are in */
|
1998-02-05 09:25:08 +03:00
|
|
|
#include <uvm/uvm.h>
|
|
|
|
#include <uvm/uvm_swap.h>
|
|
|
|
|
1998-08-29 05:05:28 +04:00
|
|
|
/*
|
1999-01-28 17:46:27 +03:00
|
|
|
* pool for allocation of vm_map structures. note that the pool has
|
|
|
|
* its own simplelock for its protection. also note that in order to
|
|
|
|
* avoid an endless loop, the amap pool's allocator cannot allocate
|
|
|
|
* memory from an amap (it currently goes through the kernel uobj, so
|
|
|
|
* we are ok).
|
1998-08-29 05:05:28 +04:00
|
|
|
*/
|
|
|
|
|
|
|
|
struct pool uvm_amap_pool;
|
|
|
|
|
1998-02-05 09:25:08 +03:00
|
|
|
/*
|
|
|
|
* local functions
|
|
|
|
*/
|
|
|
|
|
|
|
|
static struct vm_amap *amap_alloc1 __P((int, int, int));
|
|
|
|
|
1999-01-28 17:46:27 +03:00
|
|
|
#ifdef UVM_AMAP_PPREF
|
1998-02-05 09:25:08 +03:00
|
|
|
/*
|
|
|
|
* what is ppref? ppref is an _optional_ amap feature which is used
|
|
|
|
* to keep track of reference counts on a per-page basis. it is enabled
|
1999-01-28 17:46:27 +03:00
|
|
|
* when UVM_AMAP_PPREF is defined.
|
1998-02-05 09:25:08 +03:00
|
|
|
*
|
|
|
|
* when enabled, an array of ints is allocated for the pprefs. this
|
|
|
|
* array is allocated only when a partial reference is added to the
|
|
|
|
* map (either by unmapping part of the amap, or gaining a reference
|
|
|
|
* to only a part of an amap). if the malloc of the array fails
|
|
|
|
* (M_NOWAIT), then we set the array pointer to PPREF_NONE to indicate
|
|
|
|
* that we tried to do ppref's but couldn't alloc the array so just
|
|
|
|
* give up (after all, this is an optional feature!).
|
|
|
|
*
|
|
|
|
* the array is divided into page sized "chunks." for chunks of length 1,
|
|
|
|
* the chunk reference count plus one is stored in that chunk's slot.
|
|
|
|
* for chunks of length > 1 the first slot contains (the reference count
|
|
|
|
* plus one) * -1. [the negative value indicates that the length is
|
|
|
|
* greater than one.] the second slot of the chunk contains the length
|
|
|
|
* of the chunk. here is an example:
|
|
|
|
*
|
|
|
|
* actual REFS: 2 2 2 2 3 1 1 0 0 0 4 4 0 1 1 1
|
|
|
|
* ppref: -3 4 x x 4 -2 2 -1 3 x -5 2 1 -2 3 x
|
|
|
|
* <----------><-><----><-------><----><-><------->
|
|
|
|
* (x = don't care)
|
|
|
|
*
|
|
|
|
* this allows us to allow one int to contain the ref count for the whole
|
|
|
|
* chunk. note that the "plus one" part is needed because a reference
|
|
|
|
* count of zero is neither positive or negative (need a way to tell
|
|
|
|
* if we've got one zero or a bunch of them).
|
|
|
|
*
|
|
|
|
* here are some in-line functions to help us.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static __inline void pp_getreflen __P((int *, int, int *, int *));
|
|
|
|
static __inline void pp_setreflen __P((int *, int, int, int));
|
|
|
|
|
|
|
|
/*
|
|
|
|
* pp_getreflen: get the reference and length for a specific offset
|
1999-01-28 17:46:27 +03:00
|
|
|
*
|
|
|
|
* => ppref's amap must be locked
|
1998-02-05 09:25:08 +03:00
|
|
|
*/
|
1998-02-08 19:07:57 +03:00
|
|
|
static __inline void
|
|
|
|
pp_getreflen(ppref, offset, refp, lenp)
|
|
|
|
int *ppref, offset, *refp, *lenp;
|
1998-02-05 09:25:08 +03:00
|
|
|
{
|
1998-02-08 19:07:57 +03:00
|
|
|
|
|
|
|
if (ppref[offset] > 0) { /* chunk size must be 1 */
|
|
|
|
*refp = ppref[offset] - 1; /* don't forget to adjust */
|
|
|
|
*lenp = 1;
|
|
|
|
} else {
|
|
|
|
*refp = (ppref[offset] * -1) - 1;
|
|
|
|
*lenp = ppref[offset+1];
|
|
|
|
}
|
1998-02-05 09:25:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* pp_setreflen: set the reference and length for a specific offset
|
1999-01-28 17:46:27 +03:00
|
|
|
*
|
|
|
|
* => ppref's amap must be locked
|
1998-02-05 09:25:08 +03:00
|
|
|
*/
|
1998-02-08 19:07:57 +03:00
|
|
|
static __inline void
|
|
|
|
pp_setreflen(ppref, offset, ref, len)
|
|
|
|
int *ppref, offset, ref, len;
|
1998-02-05 09:25:08 +03:00
|
|
|
{
|
1998-02-08 19:07:57 +03:00
|
|
|
if (len == 1) {
|
|
|
|
ppref[offset] = ref + 1;
|
|
|
|
} else {
|
|
|
|
ppref[offset] = (ref + 1) * -1;
|
|
|
|
ppref[offset+1] = len;
|
|
|
|
}
|
1998-02-05 09:25:08 +03:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
1999-01-25 02:53:14 +03:00
|
|
|
/*
|
|
|
|
* amap_init: called at boot time to init global amap data structures
|
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
|
|
|
amap_init()
|
|
|
|
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Initialize the vm_amap pool.
|
|
|
|
*/
|
|
|
|
pool_init(&uvm_amap_pool, sizeof(struct vm_amap), 0, 0, 0,
|
|
|
|
"amappl", 0, pool_page_alloc_nointr, pool_page_free_nointr,
|
|
|
|
M_UVMAMAP);
|
|
|
|
}
|
|
|
|
|
1998-02-05 09:25:08 +03:00
|
|
|
/*
|
|
|
|
* amap_alloc1: internal function that allocates an amap, but does not
|
|
|
|
* init the overlay.
|
|
|
|
*
|
|
|
|
* => lock on returned amap is init'd
|
|
|
|
*/
|
1998-02-08 19:07:57 +03:00
|
|
|
static inline struct vm_amap *
|
|
|
|
amap_alloc1(slots, padslots, waitf)
|
|
|
|
int slots, padslots, waitf;
|
1998-02-05 09:25:08 +03:00
|
|
|
{
|
1998-02-08 19:07:57 +03:00
|
|
|
struct vm_amap *amap;
|
|
|
|
int totalslots = slots + padslots;
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-08-29 05:05:28 +04:00
|
|
|
amap = pool_get(&uvm_amap_pool, (waitf == M_WAITOK) ? PR_WAITOK : 0);
|
1998-02-08 19:07:57 +03:00
|
|
|
if (amap == NULL)
|
|
|
|
return(NULL);
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
simple_lock_init(&amap->am_l);
|
|
|
|
amap->am_ref = 1;
|
|
|
|
amap->am_flags = 0;
|
1999-01-28 17:46:27 +03:00
|
|
|
#ifdef UVM_AMAP_PPREF
|
1998-02-08 19:07:57 +03:00
|
|
|
amap->am_ppref = NULL;
|
1998-02-05 09:25:08 +03:00
|
|
|
#endif
|
1998-02-08 19:07:57 +03:00
|
|
|
amap->am_maxslot = totalslots;
|
|
|
|
amap->am_nslot = slots;
|
|
|
|
amap->am_nused = 0;
|
|
|
|
MALLOC(amap->am_slots, int *, totalslots * sizeof(int), M_UVMAMAP, waitf);
|
|
|
|
if (amap->am_slots) {
|
|
|
|
MALLOC(amap->am_bckptr, int *, totalslots * sizeof(int), M_UVMAMAP, waitf);
|
|
|
|
if (amap->am_bckptr) {
|
|
|
|
MALLOC(amap->am_anon, struct vm_anon **,
|
|
|
|
totalslots * sizeof(struct vm_anon *), M_UVMAMAP, waitf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (amap->am_anon)
|
|
|
|
return(amap);
|
|
|
|
|
|
|
|
if (amap->am_slots) {
|
|
|
|
FREE(amap->am_slots, M_UVMAMAP);
|
|
|
|
if (amap->am_bckptr)
|
|
|
|
FREE(amap->am_bckptr, M_UVMAMAP);
|
|
|
|
}
|
1998-08-29 05:05:28 +04:00
|
|
|
pool_put(&uvm_amap_pool, amap);
|
1998-02-08 19:07:57 +03:00
|
|
|
return (NULL);
|
1998-02-05 09:25:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* amap_alloc: allocate an amap to manage "sz" bytes of anonymous VM
|
|
|
|
*
|
|
|
|
* => caller should ensure sz is a multiple of PAGE_SIZE
|
|
|
|
* => reference count to new amap is set to one
|
|
|
|
* => new amap is returned unlocked
|
|
|
|
*/
|
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
struct vm_amap *
|
|
|
|
amap_alloc(sz, padsz, waitf)
|
1998-08-13 06:10:37 +04:00
|
|
|
vaddr_t sz, padsz;
|
1998-02-08 19:07:57 +03:00
|
|
|
int waitf;
|
1998-02-05 09:25:08 +03:00
|
|
|
{
|
1998-02-08 19:07:57 +03:00
|
|
|
struct vm_amap *amap;
|
|
|
|
int slots, padslots;
|
|
|
|
UVMHIST_FUNC("amap_alloc"); UVMHIST_CALLED(maphist);
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
AMAP_B2SLOT(slots, sz); /* load slots */
|
|
|
|
AMAP_B2SLOT(padslots, padsz);
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
amap = amap_alloc1(slots, padslots, waitf);
|
|
|
|
if (amap)
|
1998-08-10 02:36:37 +04:00
|
|
|
memset(amap->am_anon, 0, (slots + padslots) * sizeof(struct vm_anon *));
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
UVMHIST_LOG(maphist,"<- done, amap = 0x%x, sz=%d", amap, sz, 0, 0);
|
|
|
|
return(amap);
|
1998-02-05 09:25:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* amap_free: free an amap
|
|
|
|
*
|
1999-01-28 17:46:27 +03:00
|
|
|
* => the amap must be locked (mainly for simplelock accounting)
|
|
|
|
* => the amap should have a zero reference count and be empty
|
1998-02-05 09:25:08 +03:00
|
|
|
*/
|
1998-02-08 19:07:57 +03:00
|
|
|
void
|
|
|
|
amap_free(amap)
|
|
|
|
struct vm_amap *amap;
|
1998-02-05 09:25:08 +03:00
|
|
|
{
|
1998-02-08 19:07:57 +03:00
|
|
|
UVMHIST_FUNC("amap_free"); UVMHIST_CALLED(maphist);
|
1998-02-05 09:25:08 +03:00
|
|
|
|
|
|
|
#ifdef DIAGNOSTIC
|
1998-02-08 19:07:57 +03:00
|
|
|
if (amap->am_ref || amap->am_nused)
|
|
|
|
panic("amap_free");
|
1998-02-05 09:25:08 +03:00
|
|
|
#endif
|
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
FREE(amap->am_slots, M_UVMAMAP);
|
|
|
|
FREE(amap->am_bckptr, M_UVMAMAP);
|
|
|
|
FREE(amap->am_anon, M_UVMAMAP);
|
1999-01-28 17:46:27 +03:00
|
|
|
#ifdef UVM_AMAP_PPREF
|
1998-02-08 19:07:57 +03:00
|
|
|
if (amap->am_ppref && amap->am_ppref != PPREF_NONE)
|
|
|
|
FREE(amap->am_ppref, M_UVMAMAP);
|
1998-02-05 09:25:08 +03:00
|
|
|
#endif
|
1999-01-28 17:46:27 +03:00
|
|
|
amap_unlock(amap); /* mainly for lock debugging */
|
1998-08-29 05:05:28 +04:00
|
|
|
pool_put(&uvm_amap_pool, amap);
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
UVMHIST_LOG(maphist,"<- done, freed amap = 0x%x", amap, 0, 0, 0);
|
1998-02-05 09:25:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* amap_extend: extend the size of an amap (if needed)
|
|
|
|
*
|
1999-01-28 17:46:27 +03:00
|
|
|
* => called from uvm_map when we want to extend an amap to cover
|
|
|
|
* a new mapping (rather than allocate a new one)
|
|
|
|
* => amap should be unlocked (we will lock it)
|
|
|
|
* => to safely extend an amap it should have a reference count of
|
|
|
|
* one (thus it can't be shared)
|
|
|
|
* => XXXCDC: needs a waitflag or failure return value?
|
|
|
|
* => XXXCDC: support padding at this level?
|
1998-02-05 09:25:08 +03:00
|
|
|
*/
|
1998-02-08 19:07:57 +03:00
|
|
|
void
|
|
|
|
amap_extend(entry, addsize)
|
|
|
|
vm_map_entry_t entry;
|
1998-08-13 06:10:37 +04:00
|
|
|
vsize_t addsize;
|
1998-02-05 09:25:08 +03:00
|
|
|
{
|
1998-02-08 19:07:57 +03:00
|
|
|
struct vm_amap *amap = entry->aref.ar_amap;
|
1999-01-25 02:53:14 +03:00
|
|
|
int slotoff = entry->aref.ar_pageoff;
|
1998-02-08 19:07:57 +03:00
|
|
|
int slotmapped, slotadd, slotneed;
|
1999-01-28 17:46:27 +03:00
|
|
|
#ifdef UVM_AMAP_PPREF
|
1998-02-08 19:07:57 +03:00
|
|
|
int *newppref, *oldppref;
|
1998-02-05 09:25:08 +03:00
|
|
|
#endif
|
1998-02-08 19:07:57 +03:00
|
|
|
u_int *newsl, *newbck, *oldsl, *oldbck;
|
|
|
|
struct vm_anon **newover, **oldover;
|
|
|
|
int slotadded;
|
|
|
|
UVMHIST_FUNC("amap_extend"); UVMHIST_CALLED(maphist);
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
UVMHIST_LOG(maphist, " (entry=0x%x, addsize=0x%x)", entry,addsize,0,0);
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/*
|
1999-01-28 17:46:27 +03:00
|
|
|
* first, determine how many slots we need in the amap. don't
|
|
|
|
* forget that ar_pageoff could be non-zero: this means that
|
|
|
|
* there are some unused slots before us in the amap.
|
1998-02-08 19:07:57 +03:00
|
|
|
*/
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1999-01-25 02:53:14 +03:00
|
|
|
amap_lock(amap); /* lock! */
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
AMAP_B2SLOT(slotmapped, entry->end - entry->start); /* slots mapped */
|
|
|
|
AMAP_B2SLOT(slotadd, addsize); /* slots to add */
|
|
|
|
slotneed = slotoff + slotmapped + slotadd;
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/*
|
1999-01-28 17:46:27 +03:00
|
|
|
* case 1: we already have enough slots in the map and thus
|
|
|
|
* only need to bump the reference counts on the slots we are
|
|
|
|
* adding.
|
1998-02-08 19:07:57 +03:00
|
|
|
*/
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
if (amap->am_nslot >= slotneed) {
|
1999-01-28 17:46:27 +03:00
|
|
|
#ifdef UVM_AMAP_PPREF
|
1998-02-08 19:07:57 +03:00
|
|
|
if (amap->am_ppref && amap->am_ppref != PPREF_NONE) {
|
|
|
|
amap_pp_adjref(amap, slotoff + slotmapped, addsize, 1);
|
|
|
|
}
|
1998-02-05 09:25:08 +03:00
|
|
|
#endif
|
1999-01-25 02:53:14 +03:00
|
|
|
amap_unlock(amap);
|
1998-02-08 19:07:57 +03:00
|
|
|
UVMHIST_LOG(maphist,"<- done (case 1), amap = 0x%x, sltneed=%d",
|
|
|
|
amap, slotneed, 0, 0);
|
|
|
|
return; /* done! */
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
1999-01-28 17:46:27 +03:00
|
|
|
* case 2: we pre-allocated slots for use and we just need to
|
|
|
|
* bump nslot up to take account for these slots.
|
1998-02-08 19:07:57 +03:00
|
|
|
*/
|
|
|
|
if (amap->am_maxslot >= slotneed) {
|
1999-01-28 17:46:27 +03:00
|
|
|
#ifdef UVM_AMAP_PPREF
|
1998-02-08 19:07:57 +03:00
|
|
|
if (amap->am_ppref && amap->am_ppref != PPREF_NONE) {
|
|
|
|
if ((slotoff + slotmapped) < amap->am_nslot)
|
|
|
|
amap_pp_adjref(amap, slotoff + slotmapped,
|
1998-10-19 03:49:59 +04:00
|
|
|
(amap->am_nslot - (slotoff + slotmapped)) <<
|
|
|
|
PAGE_SHIFT, 1);
|
1998-02-08 19:07:57 +03:00
|
|
|
pp_setreflen(amap->am_ppref, amap->am_nslot, 1,
|
|
|
|
slotneed - amap->am_nslot);
|
|
|
|
}
|
1998-02-05 09:25:08 +03:00
|
|
|
#endif
|
1998-02-08 19:07:57 +03:00
|
|
|
amap->am_nslot = slotneed;
|
1999-01-25 02:53:14 +03:00
|
|
|
amap_unlock(amap);
|
1998-02-08 19:07:57 +03:00
|
|
|
/*
|
1999-01-28 17:46:27 +03:00
|
|
|
* no need to zero am_anon since that was done at
|
|
|
|
* alloc time and we never shrink an allocation.
|
1998-02-08 19:07:57 +03:00
|
|
|
*/
|
|
|
|
UVMHIST_LOG(maphist,"<- done (case 2), amap = 0x%x, slotneed=%d",
|
|
|
|
amap, slotneed, 0, 0);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
1999-01-28 17:46:27 +03:00
|
|
|
* case 3: we need to malloc a new amap and copy all the amap
|
|
|
|
* data over from old amap to the new one.
|
1998-02-08 19:07:57 +03:00
|
|
|
*
|
1999-01-28 17:46:27 +03:00
|
|
|
* XXXCDC: could we take advantage of a kernel realloc()?
|
1998-02-08 19:07:57 +03:00
|
|
|
*/
|
|
|
|
|
1999-01-25 02:53:14 +03:00
|
|
|
amap_unlock(amap); /* unlock in case we sleep in malloc */
|
1999-01-28 17:46:27 +03:00
|
|
|
#ifdef UVM_AMAP_PPREF
|
1998-02-08 19:07:57 +03:00
|
|
|
newppref = NULL;
|
|
|
|
if (amap->am_ppref && amap->am_ppref != PPREF_NONE) {
|
|
|
|
MALLOC(newppref, int *, slotneed * sizeof(int), M_UVMAMAP,
|
|
|
|
M_NOWAIT);
|
|
|
|
if (newppref == NULL) {
|
|
|
|
/* give up if malloc fails */
|
|
|
|
FREE(amap->am_ppref, M_UVMAMAP);
|
|
|
|
amap->am_ppref = PPREF_NONE;
|
|
|
|
}
|
|
|
|
}
|
1998-02-05 09:25:08 +03:00
|
|
|
#endif
|
1998-02-08 19:07:57 +03:00
|
|
|
MALLOC(newsl, int *, slotneed * sizeof(int), M_UVMAMAP, M_WAITOK);
|
|
|
|
MALLOC(newbck, int *, slotneed * sizeof(int), M_UVMAMAP, M_WAITOK);
|
|
|
|
MALLOC(newover, struct vm_anon **, slotneed * sizeof(struct vm_anon *),
|
1998-02-07 05:21:29 +03:00
|
|
|
M_UVMAMAP, M_WAITOK);
|
1999-01-25 02:53:14 +03:00
|
|
|
amap_lock(amap); /* re-lock! */
|
1998-02-05 09:25:08 +03:00
|
|
|
|
|
|
|
#ifdef DIAGNOSTIC
|
1998-02-08 19:07:57 +03:00
|
|
|
if (amap->am_maxslot >= slotneed)
|
|
|
|
panic("amap_extend: amap changed during malloc");
|
1998-02-05 09:25:08 +03:00
|
|
|
#endif
|
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/*
|
|
|
|
* now copy everything over to new malloc'd areas...
|
|
|
|
*/
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
slotadded = slotneed - amap->am_nslot;
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/* do am_slots */
|
|
|
|
oldsl = amap->am_slots;
|
1998-08-10 02:36:37 +04:00
|
|
|
memcpy(newsl, oldsl, sizeof(int) * amap->am_nused);
|
1998-02-08 19:07:57 +03:00
|
|
|
amap->am_slots = newsl;
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/* do am_anon */
|
|
|
|
oldover = amap->am_anon;
|
1998-08-10 02:36:37 +04:00
|
|
|
memcpy(newover, oldover, sizeof(struct vm_anon *) * amap->am_nslot);
|
|
|
|
memset(newover + amap->am_nslot, 0, sizeof(struct vm_anon *) * slotadded);
|
1998-02-08 19:07:57 +03:00
|
|
|
amap->am_anon = newover;
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/* do am_bckptr */
|
|
|
|
oldbck = amap->am_bckptr;
|
1998-08-10 02:36:37 +04:00
|
|
|
memcpy(newbck, oldbck, sizeof(int) * amap->am_nslot);
|
|
|
|
memset(newbck + amap->am_nslot, 0, sizeof(int) * slotadded); /* XXX: needed? */
|
1998-02-08 19:07:57 +03:00
|
|
|
amap->am_bckptr = newbck;
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1999-01-28 17:46:27 +03:00
|
|
|
#ifdef UVM_AMAP_PPREF
|
1998-02-08 19:07:57 +03:00
|
|
|
/* do ppref */
|
|
|
|
oldppref = amap->am_ppref;
|
|
|
|
if (newppref) {
|
1998-08-10 02:36:37 +04:00
|
|
|
memcpy(newppref, oldppref, sizeof(int) * amap->am_nslot);
|
|
|
|
memset(newppref + amap->am_nslot, 0, sizeof(int) * slotadded);
|
1998-02-08 19:07:57 +03:00
|
|
|
amap->am_ppref = newppref;
|
|
|
|
if ((slotoff + slotmapped) < amap->am_nslot)
|
|
|
|
amap_pp_adjref(amap, slotoff + slotmapped,
|
1998-10-19 03:49:59 +04:00
|
|
|
(amap->am_nslot - (slotoff + slotmapped)) <<
|
|
|
|
PAGE_SHIFT, 1);
|
1998-02-08 19:07:57 +03:00
|
|
|
pp_setreflen(newppref, amap->am_nslot, 1, slotadded);
|
|
|
|
}
|
1998-02-05 09:25:08 +03:00
|
|
|
#endif
|
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/* update master values */
|
|
|
|
amap->am_nslot = slotneed;
|
|
|
|
amap->am_maxslot = slotneed;
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/* unlock */
|
1999-01-25 02:53:14 +03:00
|
|
|
amap_unlock(amap);
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/* and free */
|
|
|
|
FREE(oldsl, M_UVMAMAP);
|
|
|
|
FREE(oldbck, M_UVMAMAP);
|
|
|
|
FREE(oldover, M_UVMAMAP);
|
1999-01-28 17:46:27 +03:00
|
|
|
#ifdef UVM_AMAP_PPREF
|
1998-02-08 19:07:57 +03:00
|
|
|
if (oldppref && oldppref != PPREF_NONE)
|
|
|
|
FREE(oldppref, M_UVMAMAP);
|
1998-02-05 09:25:08 +03:00
|
|
|
#endif
|
1998-02-08 19:07:57 +03:00
|
|
|
UVMHIST_LOG(maphist,"<- done (case 3), amap = 0x%x, slotneed=%d",
|
|
|
|
amap, slotneed, 0, 0);
|
1998-02-05 09:25:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
1999-01-28 17:46:27 +03:00
|
|
|
* amap_share_protect: change protection of anons in a shared amap
|
1998-02-05 09:25:08 +03:00
|
|
|
*
|
1999-01-28 17:46:27 +03:00
|
|
|
* for shared amaps, given the current data structure layout, it is
|
|
|
|
* not possible for us to directly locate all maps referencing the
|
|
|
|
* shared anon (to change the protection). in order to protect data
|
|
|
|
* in shared maps we use pmap_page_protect(). [this is useful for IPC
|
|
|
|
* mechanisms like map entry passing that may want to write-protect
|
|
|
|
* all mappings of a shared amap.] we traverse am_anon or am_slots
|
|
|
|
* depending on the current state of the amap.
|
1998-02-05 09:25:08 +03:00
|
|
|
*
|
1999-01-28 17:46:27 +03:00
|
|
|
* => entry's map and amap must be locked by the caller
|
1998-02-05 09:25:08 +03:00
|
|
|
*/
|
1998-02-08 19:07:57 +03:00
|
|
|
void
|
|
|
|
amap_share_protect(entry, prot)
|
|
|
|
vm_map_entry_t entry;
|
|
|
|
vm_prot_t prot;
|
1998-02-05 09:25:08 +03:00
|
|
|
{
|
1998-02-08 19:07:57 +03:00
|
|
|
struct vm_amap *amap = entry->aref.ar_amap;
|
|
|
|
int slots, lcv, slot, stop;
|
1998-03-09 03:58:55 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
AMAP_B2SLOT(slots, (entry->end - entry->start));
|
1999-01-25 02:53:14 +03:00
|
|
|
stop = entry->aref.ar_pageoff + slots;
|
1998-02-08 19:07:57 +03:00
|
|
|
|
|
|
|
if (slots < amap->am_nused) {
|
|
|
|
/* cheaper to traverse am_anon */
|
1999-01-25 02:53:14 +03:00
|
|
|
for (lcv = entry->aref.ar_pageoff ; lcv < stop ; lcv++) {
|
1998-02-08 19:07:57 +03:00
|
|
|
if (amap->am_anon[lcv] == NULL)
|
|
|
|
continue;
|
|
|
|
if (amap->am_anon[lcv]->u.an_page != NULL)
|
|
|
|
pmap_page_protect(
|
|
|
|
PMAP_PGARG(amap->am_anon[lcv]->u.an_page),
|
|
|
|
prot);
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* cheaper to traverse am_slots */
|
|
|
|
for (lcv = 0 ; lcv < amap->am_nused ; lcv++) {
|
|
|
|
slot = amap->am_slots[lcv];
|
1999-01-25 02:53:14 +03:00
|
|
|
if (slot < entry->aref.ar_pageoff || slot >= stop)
|
1998-02-08 19:07:57 +03:00
|
|
|
continue;
|
|
|
|
if (amap->am_anon[slot]->u.an_page != NULL)
|
|
|
|
pmap_page_protect(
|
|
|
|
PMAP_PGARG(amap->am_anon[slot]->u.an_page), prot);
|
|
|
|
}
|
|
|
|
return;
|
1998-02-05 09:25:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* amap_wipeout: wipeout all anon's in an amap; then free the amap!
|
|
|
|
*
|
1999-01-28 17:46:27 +03:00
|
|
|
* => called from amap_unref when the final reference to an amap is
|
|
|
|
* discarded (i.e. when reference count == 1)
|
|
|
|
* => the amap should be locked (by the caller)
|
1998-02-05 09:25:08 +03:00
|
|
|
*/
|
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
void
|
|
|
|
amap_wipeout(amap)
|
|
|
|
struct vm_amap *amap;
|
1998-02-05 09:25:08 +03:00
|
|
|
{
|
1998-02-08 19:07:57 +03:00
|
|
|
int lcv, slot;
|
|
|
|
struct vm_anon *anon;
|
|
|
|
UVMHIST_FUNC("amap_wipeout"); UVMHIST_CALLED(maphist);
|
|
|
|
UVMHIST_LOG(maphist,"(amap=0x%x)", amap, 0,0,0);
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
for (lcv = 0 ; lcv < amap->am_nused ; lcv++) {
|
1998-11-04 10:07:22 +03:00
|
|
|
int refs;
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
slot = amap->am_slots[lcv];
|
|
|
|
anon = amap->am_anon[slot];
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
if (anon == NULL || anon->an_ref == 0)
|
|
|
|
panic("amap_wipeout: corrupt amap");
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
simple_lock(&anon->an_lock); /* lock anon */
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
UVMHIST_LOG(maphist," processing anon 0x%x, ref=%d", anon,
|
|
|
|
anon->an_ref, 0, 0);
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-11-04 10:07:22 +03:00
|
|
|
refs = --anon->an_ref;
|
|
|
|
simple_unlock(&anon->an_lock);
|
|
|
|
if (refs == 0) {
|
|
|
|
/*
|
|
|
|
* we had the last reference to a vm_anon. free it.
|
|
|
|
*/
|
|
|
|
uvm_anfree(anon);
|
1998-02-08 19:07:57 +03:00
|
|
|
}
|
|
|
|
}
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/*
|
|
|
|
* now we free the map
|
|
|
|
*/
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1999-01-28 17:46:27 +03:00
|
|
|
amap->am_ref = 0; /* ... was one */
|
1998-02-08 19:07:57 +03:00
|
|
|
amap->am_nused = 0;
|
1999-01-28 17:46:27 +03:00
|
|
|
amap_free(amap); /* will unlock and free amap */
|
1998-02-08 19:07:57 +03:00
|
|
|
UVMHIST_LOG(maphist,"<- done!", 0,0,0,0);
|
1998-02-05 09:25:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* amap_copy: ensure that a map entry's "needs_copy" flag is false
|
|
|
|
* by copying the amap if necessary.
|
|
|
|
*
|
|
|
|
* => an entry with a null amap pointer will get a new (blank) one.
|
|
|
|
* => the map that the map entry belongs to must be locked by caller.
|
|
|
|
* => the amap currently attached to "entry" (if any) must be unlocked.
|
|
|
|
* => if canchunk is true, then we may clip the entry into a chunk
|
1998-05-14 17:51:28 +04:00
|
|
|
* => "startva" and "endva" are used only if canchunk is true. they are
|
|
|
|
* used to limit chunking (e.g. if you have a large space that you
|
|
|
|
* know you are going to need to allocate amaps for, there is no point
|
|
|
|
* in allowing that to be chunked)
|
1998-02-05 09:25:08 +03:00
|
|
|
*/
|
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
void
|
|
|
|
amap_copy(map, entry, waitf, canchunk, startva, endva)
|
|
|
|
vm_map_t map;
|
|
|
|
vm_map_entry_t entry;
|
|
|
|
int waitf;
|
|
|
|
boolean_t canchunk;
|
1998-08-13 06:10:37 +04:00
|
|
|
vaddr_t startva, endva;
|
1998-02-08 19:07:57 +03:00
|
|
|
{
|
|
|
|
struct vm_amap *amap, *srcamap;
|
|
|
|
int slots, lcv;
|
1998-08-13 06:10:37 +04:00
|
|
|
vaddr_t chunksize;
|
1998-02-08 19:07:57 +03:00
|
|
|
UVMHIST_FUNC("amap_copy"); UVMHIST_CALLED(maphist);
|
|
|
|
UVMHIST_LOG(maphist, " (map=%p, entry=%p, waitf=%d)", map, entry, waitf, 0);
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/*
|
|
|
|
* is there a map to copy? if not, create one from scratch.
|
|
|
|
*/
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
if (entry->aref.ar_amap == NULL) {
|
|
|
|
|
|
|
|
/*
|
1999-01-28 17:46:27 +03:00
|
|
|
* check to see if we have a large amap that we can
|
|
|
|
* chunk. we align startva/endva to chunk-sized
|
|
|
|
* boundaries and then clip to them.
|
1998-02-08 19:07:57 +03:00
|
|
|
*/
|
|
|
|
|
|
|
|
if (canchunk && atop(entry->end - entry->start) >=
|
|
|
|
UVM_AMAP_LARGE) {
|
|
|
|
/* convert slots to bytes */
|
1998-10-19 03:49:59 +04:00
|
|
|
chunksize = UVM_AMAP_CHUNK << PAGE_SHIFT;
|
1998-02-08 19:07:57 +03:00
|
|
|
startva = (startva / chunksize) * chunksize;
|
|
|
|
endva = roundup(endva, chunksize);
|
|
|
|
UVMHIST_LOG(maphist, " chunk amap ==> clip 0x%x->0x%x"
|
|
|
|
"to 0x%x->0x%x", entry->start, entry->end, startva,
|
|
|
|
endva);
|
|
|
|
UVM_MAP_CLIP_START(map, entry, startva);
|
1998-05-14 17:51:28 +04:00
|
|
|
/* watch out for endva wrap-around! */
|
|
|
|
if (endva >= startva)
|
|
|
|
UVM_MAP_CLIP_END(map, entry, endva);
|
1998-02-08 19:07:57 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
UVMHIST_LOG(maphist, "<- done [creating new amap 0x%x->0x%x]",
|
1998-02-05 09:25:08 +03:00
|
|
|
entry->start, entry->end, 0, 0);
|
1999-01-25 02:53:14 +03:00
|
|
|
entry->aref.ar_pageoff = 0;
|
1998-02-08 19:07:57 +03:00
|
|
|
entry->aref.ar_amap = amap_alloc(entry->end - entry->start, 0,
|
|
|
|
waitf);
|
|
|
|
if (entry->aref.ar_amap != NULL)
|
|
|
|
entry->etype &= ~UVM_ET_NEEDSCOPY;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
1999-01-28 17:46:27 +03:00
|
|
|
* first check and see if we are the only map entry
|
|
|
|
* referencing the amap we currently have. if so, then we can
|
|
|
|
* just take it over rather than copying it. note that we are
|
|
|
|
* reading am_ref with the amap unlocked... the value can only
|
|
|
|
* be one if we have the only reference to the amap (via our
|
|
|
|
* locked map). if we are greater than one we fall through to
|
|
|
|
* the next case (where we double check the value).
|
1998-02-08 19:07:57 +03:00
|
|
|
*/
|
|
|
|
|
|
|
|
if (entry->aref.ar_amap->am_ref == 1) {
|
|
|
|
entry->etype &= ~UVM_ET_NEEDSCOPY;
|
|
|
|
UVMHIST_LOG(maphist, "<- done [ref cnt = 1, took it over]",
|
|
|
|
0, 0, 0, 0);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* looks like we need to copy the map.
|
|
|
|
*/
|
|
|
|
|
|
|
|
UVMHIST_LOG(maphist," amap=%p, ref=%d, must copy it",
|
|
|
|
entry->aref.ar_amap, entry->aref.ar_amap->am_ref, 0, 0);
|
|
|
|
AMAP_B2SLOT(slots, entry->end - entry->start);
|
|
|
|
amap = amap_alloc1(slots, 0, waitf);
|
|
|
|
if (amap == NULL) {
|
|
|
|
UVMHIST_LOG(maphist, " amap_alloc1 failed", 0,0,0,0);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
srcamap = entry->aref.ar_amap;
|
1999-01-25 02:53:14 +03:00
|
|
|
amap_lock(srcamap);
|
1998-02-08 19:07:57 +03:00
|
|
|
|
|
|
|
/*
|
1999-01-28 17:46:27 +03:00
|
|
|
* need to double check reference count now that we've got the
|
|
|
|
* src amap locked down. the reference count could have
|
|
|
|
* changed while we were in malloc. if the reference count
|
|
|
|
* dropped down to one we take over the old map rather than
|
|
|
|
* copying the amap.
|
1998-02-08 19:07:57 +03:00
|
|
|
*/
|
|
|
|
|
1999-01-28 17:46:27 +03:00
|
|
|
if (srcamap->am_ref == 1) { /* take it over? */
|
1998-02-08 19:07:57 +03:00
|
|
|
entry->etype &= ~UVM_ET_NEEDSCOPY;
|
|
|
|
amap->am_ref--; /* drop final reference to map */
|
1999-01-28 17:46:27 +03:00
|
|
|
amap_free(amap); /* dispose of new (unused) amap */
|
1999-01-25 02:53:14 +03:00
|
|
|
amap_unlock(srcamap);
|
1998-02-08 19:07:57 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
1999-01-28 17:46:27 +03:00
|
|
|
* we must copy it now.
|
1998-02-08 19:07:57 +03:00
|
|
|
*/
|
|
|
|
|
|
|
|
UVMHIST_LOG(maphist, " copying amap now",0, 0, 0, 0);
|
|
|
|
for (lcv = 0 ; lcv < slots; lcv++) {
|
|
|
|
amap->am_anon[lcv] =
|
1999-01-25 02:53:14 +03:00
|
|
|
srcamap->am_anon[entry->aref.ar_pageoff + lcv];
|
1998-02-08 19:07:57 +03:00
|
|
|
if (amap->am_anon[lcv] == NULL)
|
|
|
|
continue;
|
|
|
|
simple_lock(&amap->am_anon[lcv]->an_lock);
|
|
|
|
amap->am_anon[lcv]->an_ref++;
|
|
|
|
simple_unlock(&amap->am_anon[lcv]->an_lock);
|
|
|
|
amap->am_bckptr[lcv] = amap->am_nused;
|
|
|
|
amap->am_slots[amap->am_nused] = lcv;
|
|
|
|
amap->am_nused++;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
1999-01-28 17:46:27 +03:00
|
|
|
* drop our reference to the old amap (srcamap) and unlock.
|
|
|
|
* we know that the reference count on srcamap is greater than
|
|
|
|
* one (we checked above), so there is no way we could drop
|
|
|
|
* the count to zero. [and no need to worry about freeing it]
|
1998-02-08 19:07:57 +03:00
|
|
|
*/
|
|
|
|
|
|
|
|
srcamap->am_ref--;
|
|
|
|
if (srcamap->am_ref == 1 && (srcamap->am_flags & AMAP_SHARED) != 0)
|
|
|
|
srcamap->am_flags &= ~AMAP_SHARED; /* clear shared flag */
|
1999-01-28 17:46:27 +03:00
|
|
|
#ifdef UVM_AMAP_PPREF
|
1998-02-08 19:07:57 +03:00
|
|
|
if (srcamap->am_ppref && srcamap->am_ppref != PPREF_NONE) {
|
1999-01-25 02:53:14 +03:00
|
|
|
amap_pp_adjref(srcamap, entry->aref.ar_pageoff,
|
1998-02-08 19:07:57 +03:00
|
|
|
entry->end - entry->start, -1);
|
|
|
|
}
|
1998-02-05 09:25:08 +03:00
|
|
|
#endif
|
|
|
|
|
1999-01-25 02:53:14 +03:00
|
|
|
amap_unlock(srcamap);
|
1998-02-08 19:07:57 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* install new amap.
|
|
|
|
*/
|
|
|
|
|
1999-01-25 02:53:14 +03:00
|
|
|
entry->aref.ar_pageoff = 0;
|
1998-02-08 19:07:57 +03:00
|
|
|
entry->aref.ar_amap = amap;
|
|
|
|
entry->etype &= ~UVM_ET_NEEDSCOPY;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* done!
|
|
|
|
*/
|
|
|
|
UVMHIST_LOG(maphist, "<- done",0, 0, 0, 0);
|
1998-02-05 09:25:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* amap_cow_now: resolve all copy-on-write faults in an amap now for fork(2)
|
|
|
|
*
|
|
|
|
* called during fork(2) when the parent process has a wired map
|
|
|
|
* entry. in that case we want to avoid write-protecting pages
|
|
|
|
* in the parent's map (e.g. like what you'd do for a COW page)
|
|
|
|
* so we resolve the COW here.
|
|
|
|
*
|
|
|
|
* => assume parent's entry was wired, thus all pages are resident.
|
|
|
|
* => assume pages that are loaned out (loan_count) are already mapped
|
|
|
|
* read-only in all maps, and thus no need for us to worry about them
|
|
|
|
* => assume both parent and child vm_map's are locked
|
|
|
|
* => caller passes child's map/entry in to us
|
|
|
|
* => if we run out of memory we will unlock the amap and sleep _with_ the
|
|
|
|
* parent and child vm_map's locked(!). we have to do this since
|
|
|
|
* we are in the middle of a fork(2) and we can't let the parent
|
|
|
|
* map change until we are done copying all the map entrys.
|
|
|
|
* => XXXCDC: out of memory should cause fork to fail, but there is
|
|
|
|
* currently no easy way to do this (needs fix)
|
|
|
|
* => page queues must be unlocked (we may lock them)
|
|
|
|
*/
|
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
void
|
|
|
|
amap_cow_now(map, entry)
|
|
|
|
struct vm_map *map;
|
|
|
|
struct vm_map_entry *entry;
|
1998-02-05 09:25:08 +03:00
|
|
|
{
|
1998-02-08 19:07:57 +03:00
|
|
|
struct vm_amap *amap = entry->aref.ar_amap;
|
|
|
|
int lcv, slot;
|
|
|
|
struct vm_anon *anon, *nanon;
|
|
|
|
struct vm_page *pg, *npg;
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/*
|
|
|
|
* note that if we unlock the amap then we must ReStart the "lcv" for
|
|
|
|
* loop because some other process could reorder the anon's in the
|
|
|
|
* am_anon[] array on us while the lock is dropped.
|
|
|
|
*/
|
1998-02-05 09:25:08 +03:00
|
|
|
ReStart:
|
1999-01-25 02:53:14 +03:00
|
|
|
amap_lock(amap);
|
1998-02-08 19:07:57 +03:00
|
|
|
|
|
|
|
for (lcv = 0 ; lcv < amap->am_nused ; lcv++) {
|
|
|
|
|
|
|
|
/*
|
|
|
|
* get the page
|
|
|
|
*/
|
|
|
|
|
|
|
|
slot = amap->am_slots[lcv];
|
|
|
|
anon = amap->am_anon[slot];
|
|
|
|
simple_lock(&anon->an_lock);
|
|
|
|
pg = anon->u.an_page;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* page must be resident since parent is wired
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (pg == NULL)
|
|
|
|
panic("amap_cow_now: non-resident wired page in anon %p",
|
|
|
|
anon);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* if the anon ref count is one and the page is not loaned,
|
|
|
|
* then we are safe (the child has exclusive access to the
|
|
|
|
* page). if the page is loaned, then it must already be
|
|
|
|
* mapped read-only.
|
|
|
|
*
|
|
|
|
* we only need to get involved when these are not true.
|
|
|
|
* [note: if loan_count == 0, then the anon must own the page]
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (anon->an_ref > 1 && pg->loan_count == 0) {
|
|
|
|
|
|
|
|
/*
|
|
|
|
* if the page is busy then we have to unlock, wait for
|
|
|
|
* it and then restart.
|
|
|
|
*/
|
|
|
|
if (pg->flags & PG_BUSY) {
|
|
|
|
pg->flags |= PG_WANTED;
|
1999-01-25 02:53:14 +03:00
|
|
|
amap_unlock(amap);
|
1998-02-08 19:07:57 +03:00
|
|
|
UVM_UNLOCK_AND_WAIT(pg, &anon->an_lock, FALSE,
|
|
|
|
"cownow", 0);
|
|
|
|
goto ReStart;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* ok, time to do a copy-on-write to a new anon
|
|
|
|
*/
|
|
|
|
nanon = uvm_analloc();
|
|
|
|
if (nanon)
|
|
|
|
npg = uvm_pagealloc(NULL, 0, nanon);
|
|
|
|
else
|
|
|
|
npg = NULL; /* XXX: quiet gcc warning */
|
|
|
|
|
|
|
|
if (nanon == NULL || npg == NULL) {
|
|
|
|
/* out of memory */
|
|
|
|
/*
|
|
|
|
* XXXCDC: we should cause fork to fail, but
|
|
|
|
* we can't ...
|
|
|
|
*/
|
|
|
|
if (nanon)
|
|
|
|
uvm_anfree(nanon);
|
|
|
|
simple_unlock(&anon->an_lock);
|
1999-01-25 02:53:14 +03:00
|
|
|
amap_unlock(amap);
|
1998-02-08 19:07:57 +03:00
|
|
|
uvm_wait("cownowpage");
|
|
|
|
goto ReStart;
|
|
|
|
}
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/*
|
|
|
|
* got it... now we can copy the data and replace anon
|
|
|
|
* with our new one...
|
|
|
|
*/
|
|
|
|
uvm_pagecopy(pg, npg); /* old -> new */
|
|
|
|
anon->an_ref--; /* can't drop to zero */
|
|
|
|
amap->am_anon[slot] = nanon; /* replace */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* drop PG_BUSY on new page ... since we have had it's
|
|
|
|
* owner locked the whole time it can't be
|
|
|
|
* PG_RELEASED | PG_WANTED.
|
|
|
|
*/
|
|
|
|
npg->flags &= ~(PG_BUSY|PG_FAKE);
|
|
|
|
UVM_PAGE_OWN(npg, NULL);
|
|
|
|
uvm_lock_pageq();
|
|
|
|
uvm_pageactivate(npg);
|
|
|
|
uvm_unlock_pageq();
|
|
|
|
}
|
|
|
|
|
|
|
|
simple_unlock(&anon->an_lock);
|
|
|
|
/*
|
|
|
|
* done with this anon, next ...!
|
|
|
|
*/
|
|
|
|
|
|
|
|
} /* end of 'for' loop */
|
|
|
|
|
|
|
|
return;
|
1998-02-05 09:25:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* amap_splitref: split a single reference into two seperate references
|
|
|
|
*
|
1999-01-28 17:46:27 +03:00
|
|
|
* => called from uvm_map's clip routines
|
|
|
|
* => origref's map should be locked
|
|
|
|
* => origref->ar_amap should be unlocked (we will lock)
|
1998-02-05 09:25:08 +03:00
|
|
|
*/
|
1998-02-08 19:07:57 +03:00
|
|
|
void
|
|
|
|
amap_splitref(origref, splitref, offset)
|
|
|
|
struct vm_aref *origref, *splitref;
|
1998-08-13 06:10:37 +04:00
|
|
|
vaddr_t offset;
|
1998-02-05 09:25:08 +03:00
|
|
|
{
|
1998-02-08 19:07:57 +03:00
|
|
|
int leftslots;
|
|
|
|
UVMHIST_FUNC("amap_splitref"); UVMHIST_CALLED(maphist);
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
AMAP_B2SLOT(leftslots, offset);
|
|
|
|
if (leftslots == 0)
|
|
|
|
panic("amap_splitref: split at zero offset");
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/*
|
|
|
|
* lock the amap
|
|
|
|
*/
|
1999-01-25 02:53:14 +03:00
|
|
|
amap_lock(origref->ar_amap);
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/*
|
|
|
|
* now: amap is locked and we have a valid am_mapped array.
|
|
|
|
*/
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1999-01-25 02:53:14 +03:00
|
|
|
if (origref->ar_amap->am_nslot - origref->ar_pageoff - leftslots <= 0)
|
1998-02-08 19:07:57 +03:00
|
|
|
panic("amap_splitref: map size check failed");
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1999-01-28 17:46:27 +03:00
|
|
|
#ifdef UVM_AMAP_PPREF
|
1998-10-08 23:47:50 +04:00
|
|
|
/*
|
|
|
|
* establish ppref before we add a duplicate reference to the amap
|
|
|
|
*/
|
|
|
|
if (origref->ar_amap->am_ppref == NULL)
|
|
|
|
amap_pp_establish(origref->ar_amap);
|
|
|
|
#endif
|
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
splitref->ar_amap = origref->ar_amap;
|
|
|
|
splitref->ar_amap->am_ref++; /* not a share reference */
|
1999-01-25 02:53:14 +03:00
|
|
|
splitref->ar_pageoff = origref->ar_pageoff + leftslots;
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1999-01-25 02:53:14 +03:00
|
|
|
amap_unlock(origref->ar_amap);
|
1998-02-05 09:25:08 +03:00
|
|
|
}
|
|
|
|
|
1999-01-28 17:46:27 +03:00
|
|
|
#ifdef UVM_AMAP_PPREF
|
1998-02-05 09:25:08 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* amap_pp_establish: add a ppref array to an amap, if possible
|
|
|
|
*
|
|
|
|
* => amap locked by caller
|
|
|
|
*/
|
1998-02-08 19:07:57 +03:00
|
|
|
void
|
|
|
|
amap_pp_establish(amap)
|
|
|
|
struct vm_amap *amap;
|
|
|
|
{
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
MALLOC(amap->am_ppref, int *, sizeof(int) * amap->am_maxslot,
|
|
|
|
M_UVMAMAP, M_NOWAIT);
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/*
|
|
|
|
* if we fail then we just won't use ppref for this amap
|
|
|
|
*/
|
|
|
|
if (amap->am_ppref == NULL) {
|
|
|
|
amap->am_ppref = PPREF_NONE; /* not using it */
|
|
|
|
return;
|
|
|
|
}
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/*
|
|
|
|
* init ppref
|
|
|
|
*/
|
1998-08-10 02:36:37 +04:00
|
|
|
memset(amap->am_ppref, 0, sizeof(int) * amap->am_maxslot);
|
1998-02-08 19:07:57 +03:00
|
|
|
pp_setreflen(amap->am_ppref, 0, amap->am_ref, amap->am_nslot);
|
|
|
|
return;
|
1998-02-05 09:25:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* amap_pp_adjref: adjust reference count to a part of an amap using the
|
|
|
|
* per-page reference count array.
|
|
|
|
*
|
|
|
|
* => map and amap locked by caller
|
|
|
|
* => caller must check that ppref != PPREF_NONE before calling
|
|
|
|
*/
|
1998-02-08 19:07:57 +03:00
|
|
|
void
|
|
|
|
amap_pp_adjref(amap, curslot, bytelen, adjval)
|
|
|
|
struct vm_amap *amap;
|
|
|
|
int curslot;
|
1998-08-13 06:10:37 +04:00
|
|
|
vsize_t bytelen;
|
1998-02-08 19:07:57 +03:00
|
|
|
int adjval;
|
|
|
|
{
|
|
|
|
int slots, stopslot, *ppref, lcv;
|
|
|
|
int ref, len;
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/*
|
|
|
|
* get init values
|
|
|
|
*/
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
AMAP_B2SLOT(slots, bytelen);
|
|
|
|
stopslot = curslot + slots;
|
|
|
|
ppref = amap->am_ppref;
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/*
|
|
|
|
* first advance to the correct place in the ppref array, fragment
|
|
|
|
* if needed.
|
|
|
|
*/
|
|
|
|
|
|
|
|
for (lcv = 0 ; lcv < curslot ; lcv += len) {
|
|
|
|
pp_getreflen(ppref, lcv, &ref, &len);
|
|
|
|
if (lcv + len > curslot) { /* goes past start? */
|
|
|
|
pp_setreflen(ppref, lcv, ref, curslot - lcv);
|
|
|
|
pp_setreflen(ppref, curslot, ref, len - (curslot -lcv));
|
|
|
|
len = curslot - lcv; /* new length of entry @ lcv */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* now adjust reference counts in range (make sure we dont overshoot)
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (lcv != curslot)
|
1999-01-28 17:46:27 +03:00
|
|
|
panic("amap_pp_adjref: overshot target");
|
1998-02-08 19:07:57 +03:00
|
|
|
|
|
|
|
for (/* lcv already set */; lcv < stopslot ; lcv += len) {
|
|
|
|
pp_getreflen(ppref, lcv, &ref, &len);
|
|
|
|
if (lcv + len > stopslot) { /* goes past end? */
|
|
|
|
pp_setreflen(ppref, lcv, ref, stopslot - lcv);
|
|
|
|
pp_setreflen(ppref, stopslot, ref,
|
|
|
|
len - (stopslot - lcv));
|
|
|
|
len = stopslot - lcv;
|
|
|
|
}
|
|
|
|
ref = ref + adjval; /* ADJUST! */
|
|
|
|
if (ref < 0)
|
|
|
|
panic("amap_pp_adjref: negative reference count");
|
|
|
|
pp_setreflen(ppref, lcv, ref, len);
|
|
|
|
if (ref == 0)
|
|
|
|
amap_wiperange(amap, lcv, len);
|
|
|
|
}
|
1998-02-05 09:25:08 +03:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* amap_wiperange: wipe out a range of an amap
|
|
|
|
* [different from amap_wipeout because the amap is kept intact]
|
|
|
|
*
|
|
|
|
* => both map and amap must be locked by caller.
|
|
|
|
*/
|
1998-02-08 19:07:57 +03:00
|
|
|
void
|
|
|
|
amap_wiperange(amap, slotoff, slots)
|
|
|
|
struct vm_amap *amap;
|
|
|
|
int slotoff, slots;
|
|
|
|
{
|
|
|
|
int byanon, lcv, stop, curslot, ptr;
|
|
|
|
struct vm_anon *anon;
|
|
|
|
UVMHIST_FUNC("amap_wiperange"); UVMHIST_CALLED(maphist);
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/*
|
|
|
|
* we can either traverse the amap by am_anon or by am_slots depending
|
|
|
|
* on which is cheaper. decide now.
|
|
|
|
*/
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
if (slots < amap->am_nused) {
|
|
|
|
byanon = TRUE;
|
|
|
|
lcv = slotoff;
|
|
|
|
stop = slotoff + slots;
|
|
|
|
} else {
|
|
|
|
byanon = FALSE;
|
|
|
|
lcv = 0;
|
|
|
|
stop = amap->am_nused;
|
|
|
|
}
|
1998-02-05 09:25:08 +03:00
|
|
|
|
1998-02-08 19:07:57 +03:00
|
|
|
/*
|
|
|
|
* ok, now do it!
|
|
|
|
*/
|
|
|
|
|
|
|
|
for (; lcv < stop; lcv++) {
|
1998-11-04 10:07:22 +03:00
|
|
|
int refs;
|
1998-02-08 19:07:57 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* verify the anon is ok.
|
|
|
|
*/
|
|
|
|
if (byanon) {
|
|
|
|
if (amap->am_anon[lcv] == NULL)
|
|
|
|
continue;
|
|
|
|
curslot = lcv;
|
|
|
|
} else {
|
|
|
|
curslot = amap->am_slots[lcv];
|
|
|
|
if (curslot < slotoff || curslot >= stop)
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
anon = amap->am_anon[curslot];
|
|
|
|
|
|
|
|
/*
|
|
|
|
* remove it from the amap
|
|
|
|
*/
|
|
|
|
amap->am_anon[curslot] = NULL;
|
|
|
|
ptr = amap->am_bckptr[curslot];
|
|
|
|
if (ptr != (amap->am_nused - 1)) {
|
|
|
|
amap->am_slots[ptr] =
|
|
|
|
amap->am_slots[amap->am_nused - 1];
|
|
|
|
amap->am_bckptr[amap->am_slots[ptr]] =
|
|
|
|
ptr; /* back ptr. */
|
|
|
|
}
|
|
|
|
amap->am_nused--;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* drop anon reference count
|
|
|
|
*/
|
|
|
|
simple_lock(&anon->an_lock);
|
1998-11-04 10:07:22 +03:00
|
|
|
refs = --anon->an_ref;
|
|
|
|
simple_unlock(&anon->an_lock);
|
|
|
|
if (refs == 0) {
|
|
|
|
/*
|
|
|
|
* we just eliminated the last reference to an anon.
|
|
|
|
* free it.
|
|
|
|
*/
|
|
|
|
uvm_anfree(anon);
|
1998-02-08 19:07:57 +03:00
|
|
|
}
|
|
|
|
}
|
1998-02-05 09:25:08 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|