131422Smckusick /* 249411Skarels * Copyright (c) 1987, 1991 The Regents of the University of California. 333439Smckusick * All rights reserved. 431422Smckusick * 544437Sbostic * %sccs.include.redist.c% 633439Smckusick * 7*50744Smckusick * @(#)kern_malloc.c 7.26 (Berkeley) 08/01/91 831422Smckusick */ 931422Smckusick 1031422Smckusick #include "param.h" 1131422Smckusick #include "proc.h" 1231422Smckusick #include "map.h" 1331422Smckusick #include "kernel.h" 1431422Smckusick #include "malloc.h" 1548411Skarels #include "vm/vm.h" 1648411Skarels #include "vm/vm_kern.h" 1731422Smckusick 1831422Smckusick struct kmembuckets bucket[MINBUCKET + 16]; 1931422Smckusick struct kmemstats kmemstats[M_LAST]; 2031422Smckusick struct kmemusage *kmemusage; 2146259Skarels char *kmembase, *kmemlimit; 2245154Smckusick char *memname[] = INITKMEMNAMES; 2331422Smckusick 24*50744Smckusick #ifdef DIAGNOSTIC 2531422Smckusick /* 26*50744Smckusick * This structure serves two purposes. 27*50744Smckusick * The first is to provide a set of masks to catch unaligned frees. 28*50744Smckusick * The second is to provide known text to copy into free objects so 29*50744Smckusick * that modifications after frees can be detected. 30*50744Smckusick */ 31*50744Smckusick #define WEIRD_ADDR 0xdeadbeef 32*50744Smckusick long addrmask[] = { WEIRD_ADDR, 33*50744Smckusick 0x00000001, 0x00000003, 0x00000007, 0x0000000f, 34*50744Smckusick 0x0000001f, 0x0000003f, 0x0000007f, 0x000000ff, 35*50744Smckusick 0x000001ff, 0x000003ff, 0x000007ff, 0x00000fff, 36*50744Smckusick 0x00001fff, 0x00003fff, 0x00007fff, 0x0000ffff, 37*50744Smckusick }; 38*50744Smckusick #endif /* DIAGNOSTIC */ 39*50744Smckusick 40*50744Smckusick /* 4131422Smckusick * Allocate a block of memory 4231422Smckusick */ 4349066Skarels void * 4433497Smckusick malloc(size, type, flags) 4531422Smckusick unsigned long size; 4634534Skarels int type, flags; 4731422Smckusick { 4831422Smckusick register struct kmembuckets *kbp; 4931422Smckusick register struct kmemusage *kup; 5034534Skarels long indx, npg, alloc, allocsize; 5134534Skarels int s; 5246259Skarels caddr_t va, cp, savedlist; 53*50744Smckusick #ifdef DIAGNOSTIC 54*50744Smckusick int i, copysize; 55*50744Smckusick #endif 5631422Smckusick #ifdef KMEMSTATS 5733438Smckusick register struct kmemstats *ksp = &kmemstats[type]; 5839732Smckusick 5939732Smckusick if (((unsigned long)type) > M_LAST) 6037478Ssklower panic("malloc - bogus type"); 6133438Smckusick #endif 6231422Smckusick 6331422Smckusick indx = BUCKETINDX(size); 6431422Smckusick kbp = &bucket[indx]; 6531422Smckusick s = splimp(); 6633438Smckusick #ifdef KMEMSTATS 6733613Smckusick while (ksp->ks_memuse >= ksp->ks_limit) { 6833438Smckusick if (flags & M_NOWAIT) { 6933438Smckusick splx(s); 7049066Skarels return ((void *) NULL); 7133438Smckusick } 7233438Smckusick if (ksp->ks_limblocks < 65535) 7333438Smckusick ksp->ks_limblocks++; 7445154Smckusick tsleep((caddr_t)ksp, PSWP+2, memname[type], 0); 7533438Smckusick } 7633438Smckusick #endif 77*50744Smckusick #ifdef DIAGNOSTIC 78*50744Smckusick copysize = 1 << indx < sizeof addrmask ? 1 << indx : sizeof addrmask; 79*50744Smckusick #endif 8031422Smckusick if (kbp->kb_next == NULL) { 8131422Smckusick if (size > MAXALLOCSAVE) 8231422Smckusick allocsize = roundup(size, CLBYTES); 8331422Smckusick else 8431422Smckusick allocsize = 1 << indx; 8531422Smckusick npg = clrnd(btoc(allocsize)); 8646259Skarels va = (caddr_t) kmem_malloc(kmem_map, (vm_size_t)ctob(npg), 8746259Skarels !(flags & M_NOWAIT)); 8846259Skarels if (va == NULL) { 8931422Smckusick splx(s); 9049066Skarels return ((void *) NULL); 9131422Smckusick } 9233438Smckusick #ifdef KMEMSTATS 9331422Smckusick kbp->kb_total += kbp->kb_elmpercl; 9431422Smckusick #endif 9531422Smckusick kup = btokup(va); 9631422Smckusick kup->ku_indx = indx; 9731422Smckusick if (allocsize > MAXALLOCSAVE) { 9831422Smckusick if (npg > 65535) 9931422Smckusick panic("malloc: allocation too large"); 10031422Smckusick kup->ku_pagecnt = npg; 10133438Smckusick #ifdef KMEMSTATS 10233438Smckusick ksp->ks_memuse += allocsize; 10333438Smckusick #endif 10431422Smckusick goto out; 10531422Smckusick } 10631422Smckusick #ifdef KMEMSTATS 10731422Smckusick kup->ku_freecnt = kbp->kb_elmpercl; 10831422Smckusick kbp->kb_totalfree += kbp->kb_elmpercl; 10931422Smckusick #endif 11046259Skarels /* 11146259Skarels * Just in case we blocked while allocating memory, 11246259Skarels * and someone else also allocated memory for this 11346259Skarels * bucket, don't assume the list is still empty. 11446259Skarels */ 11546259Skarels savedlist = kbp->kb_next; 11631422Smckusick kbp->kb_next = va + (npg * NBPG) - allocsize; 117*50744Smckusick for (cp = kbp->kb_next; ; cp -= allocsize) { 118*50744Smckusick #ifdef DIAGNOSTIC 119*50744Smckusick /* 120*50744Smckusick * Copy in known text to detect modification 121*50744Smckusick * after freeing. 122*50744Smckusick */ 123*50744Smckusick bcopy(addrmask, cp, copysize); 124*50744Smckusick #endif /* DIAGNOSTIC */ 125*50744Smckusick if (cp <= va) 126*50744Smckusick break; 12746259Skarels *(caddr_t *)cp = cp - allocsize; 128*50744Smckusick } 12946259Skarels *(caddr_t *)cp = savedlist; 13031422Smckusick } 13131422Smckusick va = kbp->kb_next; 13246259Skarels kbp->kb_next = *(caddr_t *)va; 133*50744Smckusick #ifdef DIAGNOSTIC 134*50744Smckusick *(caddr_t *)va = (char *)WEIRD_ADDR; 135*50744Smckusick if (bcmp(addrmask, va, copysize)) { 136*50744Smckusick copysize >>= 2; 137*50744Smckusick for (i = 0; i < copysize && addrmask[i] == ((int *)va)[i]; i++) 138*50744Smckusick /* void */; 139*50744Smckusick printf("Word %d %s 0x%x of size %d modified (0x%x != 0x%x)\n", 140*50744Smckusick i, "of object", va, size, ((int *)va)[i], addrmask[i]); 141*50744Smckusick panic("malloc: data modified on freelist"); 142*50744Smckusick } 143*50744Smckusick #endif /* DIAGNOSTIC */ 14431422Smckusick #ifdef KMEMSTATS 14531422Smckusick kup = btokup(va); 14631422Smckusick if (kup->ku_indx != indx) 14731422Smckusick panic("malloc: wrong bucket"); 14831422Smckusick if (kup->ku_freecnt == 0) 14931422Smckusick panic("malloc: lost data"); 15031422Smckusick kup->ku_freecnt--; 15131422Smckusick kbp->kb_totalfree--; 15233438Smckusick ksp->ks_memuse += 1 << indx; 15331422Smckusick out: 15431422Smckusick kbp->kb_calls++; 15531422Smckusick ksp->ks_inuse++; 15631422Smckusick ksp->ks_calls++; 15733613Smckusick if (ksp->ks_memuse > ksp->ks_maxused) 15833613Smckusick ksp->ks_maxused = ksp->ks_memuse; 15931422Smckusick #else 16031422Smckusick out: 16131422Smckusick #endif 16231422Smckusick splx(s); 16349066Skarels return ((void *) va); 16431422Smckusick } 16531422Smckusick 16631422Smckusick /* 16731422Smckusick * Free a block of memory allocated by malloc. 16831422Smckusick */ 16933497Smckusick void 17033497Smckusick free(addr, type) 17149066Skarels void *addr; 17234534Skarels int type; 17331422Smckusick { 17431422Smckusick register struct kmembuckets *kbp; 17531422Smckusick register struct kmemusage *kup; 176*50744Smckusick long size; 17734534Skarels int s; 178*50744Smckusick #ifdef DIAGNOSTIC 179*50744Smckusick caddr_t cp; 180*50744Smckusick long alloc, copysize; 181*50744Smckusick #endif 18233438Smckusick #ifdef KMEMSTATS 18333438Smckusick register struct kmemstats *ksp = &kmemstats[type]; 18433438Smckusick #endif 18531422Smckusick 18631422Smckusick kup = btokup(addr); 18745000Smckusick size = 1 << kup->ku_indx; 188*50744Smckusick kbp = &bucket[kup->ku_indx]; 189*50744Smckusick s = splimp(); 19045000Smckusick #ifdef DIAGNOSTIC 191*50744Smckusick /* 192*50744Smckusick * Check for returns of data that do not point to the 193*50744Smckusick * beginning of the allocation. 194*50744Smckusick */ 19545000Smckusick if (size > NBPG * CLSIZE) 19645000Smckusick alloc = addrmask[BUCKETINDX(NBPG * CLSIZE)]; 19745000Smckusick else 19845000Smckusick alloc = addrmask[kup->ku_indx]; 19945000Smckusick if (((u_long)addr & alloc) != 0) { 20045000Smckusick printf("free: unaligned addr 0x%x, size %d, type %d, mask %d\n", 20145000Smckusick addr, size, type, alloc); 20245000Smckusick panic("free: unaligned addr"); 20345000Smckusick } 20445000Smckusick #endif /* DIAGNOSTIC */ 20533613Smckusick if (size > MAXALLOCSAVE) { 20646259Skarels kmem_free(kmem_map, (vm_offset_t)addr, ctob(kup->ku_pagecnt)); 20731422Smckusick #ifdef KMEMSTATS 20833613Smckusick size = kup->ku_pagecnt << PGSHIFT; 20933613Smckusick ksp->ks_memuse -= size; 21031422Smckusick kup->ku_indx = 0; 21131422Smckusick kup->ku_pagecnt = 0; 21233613Smckusick if (ksp->ks_memuse + size >= ksp->ks_limit && 21333613Smckusick ksp->ks_memuse < ksp->ks_limit) 21433438Smckusick wakeup((caddr_t)ksp); 21533438Smckusick ksp->ks_inuse--; 21633497Smckusick kbp->kb_total -= 1; 21731422Smckusick #endif 21831422Smckusick splx(s); 21931422Smckusick return; 22031422Smckusick } 221*50744Smckusick #ifdef DIAGNOSTIC 222*50744Smckusick /* 223*50744Smckusick * Check for multiple frees. Use a quick check to see if 224*50744Smckusick * it looks free before laboriously searching the freelist. 225*50744Smckusick */ 226*50744Smckusick *(caddr_t *)addr = (char *)WEIRD_ADDR; 227*50744Smckusick copysize = size < sizeof addrmask ? size : sizeof addrmask; 228*50744Smckusick if (!bcmp(addrmask, addr, copysize)) { 229*50744Smckusick for (cp = kbp->kb_next; cp; cp = *(caddr_t *)cp) { 230*50744Smckusick if (addr == cp) { 231*50744Smckusick printf("multiply freed item 0x%x\n", addr); 232*50744Smckusick panic("free: duplicated free"); 233*50744Smckusick } 234*50744Smckusick } 235*50744Smckusick } 236*50744Smckusick /* 237*50744Smckusick * Copy in known text to detect modification after freeing 238*50744Smckusick * and to make it look free. 239*50744Smckusick */ 240*50744Smckusick bcopy(addrmask, addr, copysize); 241*50744Smckusick #endif /* DIAGNOSTIC */ 24231422Smckusick #ifdef KMEMSTATS 24331422Smckusick kup->ku_freecnt++; 24431422Smckusick if (kup->ku_freecnt >= kbp->kb_elmpercl) 24531422Smckusick if (kup->ku_freecnt > kbp->kb_elmpercl) 24631422Smckusick panic("free: multiple frees"); 24731422Smckusick else if (kbp->kb_totalfree > kbp->kb_highwat) 24831422Smckusick kbp->kb_couldfree++; 24931422Smckusick kbp->kb_totalfree++; 25033613Smckusick ksp->ks_memuse -= size; 25133613Smckusick if (ksp->ks_memuse + size >= ksp->ks_limit && 25233613Smckusick ksp->ks_memuse < ksp->ks_limit) 25333438Smckusick wakeup((caddr_t)ksp); 25433438Smckusick ksp->ks_inuse--; 25531422Smckusick #endif 25646259Skarels *(caddr_t *)addr = kbp->kb_next; 25731422Smckusick kbp->kb_next = addr; 25831422Smckusick splx(s); 25931422Smckusick } 26031422Smckusick 26131422Smckusick /* 26231422Smckusick * Initialize the kernel memory allocator 26331422Smckusick */ 26431422Smckusick kmeminit() 26531422Smckusick { 26631422Smckusick register long indx; 26733497Smckusick int npg; 26831422Smckusick 26934534Skarels #if ((MAXALLOCSAVE & (MAXALLOCSAVE - 1)) != 0) 27034534Skarels ERROR!_kmeminit:_MAXALLOCSAVE_not_power_of_2 27134534Skarels #endif 27234534Skarels #if (MAXALLOCSAVE > MINALLOCSIZE * 32768) 27334534Skarels ERROR!_kmeminit:_MAXALLOCSAVE_too_big 27434534Skarels #endif 27534534Skarels #if (MAXALLOCSAVE < CLBYTES) 27634534Skarels ERROR!_kmeminit:_MAXALLOCSAVE_too_small 27734534Skarels #endif 27846259Skarels npg = VM_KMEM_SIZE/ NBPG; 27946259Skarels kmemusage = (struct kmemusage *) kmem_alloc(kernel_map, 28046259Skarels (vm_size_t)(npg * sizeof(struct kmemusage))); 28146259Skarels kmem_map = kmem_suballoc(kernel_map, (vm_offset_t)&kmembase, 28246259Skarels (vm_offset_t)&kmemlimit, (vm_size_t)(npg * NBPG), FALSE); 28331422Smckusick #ifdef KMEMSTATS 28431422Smckusick for (indx = 0; indx < MINBUCKET + 16; indx++) { 28531422Smckusick if (1 << indx >= CLBYTES) 28631422Smckusick bucket[indx].kb_elmpercl = 1; 28731422Smckusick else 28831422Smckusick bucket[indx].kb_elmpercl = CLBYTES / (1 << indx); 28931422Smckusick bucket[indx].kb_highwat = 5 * bucket[indx].kb_elmpercl; 29031422Smckusick } 29131422Smckusick for (indx = 0; indx < M_LAST; indx++) 29241950Smckusick kmemstats[indx].ks_limit = npg * NBPG * 6 / 10; 29331422Smckusick #endif 29431422Smckusick } 295