131422Smckusick /* 249411Skarels * Copyright (c) 1987, 1991 The Regents of the University of California. 333439Smckusick * All rights reserved. 431422Smckusick * 544437Sbostic * %sccs.include.redist.c% 633439Smckusick * 7*56499Smckusick * @(#)kern_malloc.c 7.34 (Berkeley) 10/09/92 831422Smckusick */ 931422Smckusick 1031422Smckusick #include "param.h" 1131422Smckusick #include "proc.h" 1231422Smckusick #include "map.h" 1331422Smckusick #include "kernel.h" 1431422Smckusick #include "malloc.h" 1548411Skarels #include "vm/vm.h" 1648411Skarels #include "vm/vm_kern.h" 1731422Smckusick 1831422Smckusick struct kmembuckets bucket[MINBUCKET + 16]; 1931422Smckusick struct kmemstats kmemstats[M_LAST]; 2031422Smckusick struct kmemusage *kmemusage; 2146259Skarels char *kmembase, *kmemlimit; 2245154Smckusick char *memname[] = INITKMEMNAMES; 2331422Smckusick 2450744Smckusick #ifdef DIAGNOSTIC 2531422Smckusick /* 2652931Smckusick * This structure provides a set of masks to catch unaligned frees. 2750744Smckusick */ 2852931Smckusick long addrmask[] = { 0, 2950744Smckusick 0x00000001, 0x00000003, 0x00000007, 0x0000000f, 3050744Smckusick 0x0000001f, 0x0000003f, 0x0000007f, 0x000000ff, 3150744Smckusick 0x000001ff, 0x000003ff, 0x000007ff, 0x00000fff, 3250744Smckusick 0x00001fff, 0x00003fff, 0x00007fff, 0x0000ffff, 3350744Smckusick }; 3450937Smckusick 3550937Smckusick /* 3652931Smckusick * The WEIRD_ADDR is used as known text to copy into free objects so 3752931Smckusick * that modifications after frees can be detected. 3852931Smckusick */ 3952931Smckusick #define WEIRD_ADDR 0xdeadbeef 4052931Smckusick #define MAX_COPY 32 4152931Smckusick 4252931Smckusick /* 4350937Smckusick * Normally the first word of the structure is used to hold the list 4450937Smckusick * pointer for free objects. However, when running with diagnostics, 4550937Smckusick * we use the third and fourth fields, so as to catch modifications 4650937Smckusick * in the most commonly trashed first two words. 4750937Smckusick */ 4850937Smckusick struct freelist { 4950937Smckusick long spare0; 5053632Smckusick short type; 5150937Smckusick long spare1; 5250937Smckusick caddr_t next; 5350937Smckusick }; 5450937Smckusick #else /* !DIAGNOSTIC */ 5550937Smckusick struct freelist { 5650937Smckusick caddr_t next; 5750937Smckusick }; 5850744Smckusick #endif /* DIAGNOSTIC */ 5950744Smckusick 6050744Smckusick /* 6131422Smckusick * Allocate a block of memory 6231422Smckusick */ 6349066Skarels void * 6433497Smckusick malloc(size, type, flags) 6531422Smckusick unsigned long size; 6634534Skarels int type, flags; 6731422Smckusick { 6831422Smckusick register struct kmembuckets *kbp; 6931422Smckusick register struct kmemusage *kup; 7050937Smckusick register struct freelist *freep; 7134534Skarels long indx, npg, alloc, allocsize; 7234534Skarels int s; 7346259Skarels caddr_t va, cp, savedlist; 7450744Smckusick #ifdef DIAGNOSTIC 7552931Smckusick long *end, *lp; 7652931Smckusick int copysize; 7752943Sralph char *savedtype; 7850744Smckusick #endif 7931422Smckusick #ifdef KMEMSTATS 8033438Smckusick register struct kmemstats *ksp = &kmemstats[type]; 8139732Smckusick 8239732Smckusick if (((unsigned long)type) > M_LAST) 8337478Ssklower panic("malloc - bogus type"); 8433438Smckusick #endif 8531422Smckusick indx = BUCKETINDX(size); 8631422Smckusick kbp = &bucket[indx]; 8731422Smckusick s = splimp(); 8833438Smckusick #ifdef KMEMSTATS 8933613Smckusick while (ksp->ks_memuse >= ksp->ks_limit) { 9033438Smckusick if (flags & M_NOWAIT) { 9133438Smckusick splx(s); 9249066Skarels return ((void *) NULL); 9333438Smckusick } 9433438Smckusick if (ksp->ks_limblocks < 65535) 9533438Smckusick ksp->ks_limblocks++; 9645154Smckusick tsleep((caddr_t)ksp, PSWP+2, memname[type], 0); 9733438Smckusick } 9833438Smckusick #endif 9950744Smckusick #ifdef DIAGNOSTIC 10052931Smckusick copysize = 1 << indx < MAX_COPY ? 1 << indx : MAX_COPY; 10150744Smckusick #endif 10231422Smckusick if (kbp->kb_next == NULL) { 103*56499Smckusick kbp->kb_last = NULL; 10431422Smckusick if (size > MAXALLOCSAVE) 10531422Smckusick allocsize = roundup(size, CLBYTES); 10631422Smckusick else 10731422Smckusick allocsize = 1 << indx; 10831422Smckusick npg = clrnd(btoc(allocsize)); 10946259Skarels va = (caddr_t) kmem_malloc(kmem_map, (vm_size_t)ctob(npg), 11046259Skarels !(flags & M_NOWAIT)); 11146259Skarels if (va == NULL) { 11231422Smckusick splx(s); 11349066Skarels return ((void *) NULL); 11431422Smckusick } 11533438Smckusick #ifdef KMEMSTATS 11631422Smckusick kbp->kb_total += kbp->kb_elmpercl; 11731422Smckusick #endif 11831422Smckusick kup = btokup(va); 11931422Smckusick kup->ku_indx = indx; 12031422Smckusick if (allocsize > MAXALLOCSAVE) { 12131422Smckusick if (npg > 65535) 12231422Smckusick panic("malloc: allocation too large"); 12331422Smckusick kup->ku_pagecnt = npg; 12433438Smckusick #ifdef KMEMSTATS 12533438Smckusick ksp->ks_memuse += allocsize; 12633438Smckusick #endif 12731422Smckusick goto out; 12831422Smckusick } 12931422Smckusick #ifdef KMEMSTATS 13031422Smckusick kup->ku_freecnt = kbp->kb_elmpercl; 13131422Smckusick kbp->kb_totalfree += kbp->kb_elmpercl; 13231422Smckusick #endif 13346259Skarels /* 13446259Skarels * Just in case we blocked while allocating memory, 13546259Skarels * and someone else also allocated memory for this 13646259Skarels * bucket, don't assume the list is still empty. 13746259Skarels */ 13846259Skarels savedlist = kbp->kb_next; 13952943Sralph kbp->kb_next = cp = va + (npg * NBPG) - allocsize; 14052943Sralph for (;;) { 14150937Smckusick freep = (struct freelist *)cp; 14250744Smckusick #ifdef DIAGNOSTIC 14350744Smckusick /* 14450744Smckusick * Copy in known text to detect modification 14550744Smckusick * after freeing. 14650744Smckusick */ 14752931Smckusick end = (long *)&cp[copysize]; 14852931Smckusick for (lp = (long *)cp; lp < end; lp++) 14952931Smckusick *lp = WEIRD_ADDR; 15050937Smckusick freep->type = M_FREE; 15150744Smckusick #endif /* DIAGNOSTIC */ 15250744Smckusick if (cp <= va) 15350744Smckusick break; 15452943Sralph cp -= allocsize; 15552943Sralph freep->next = cp; 15650744Smckusick } 15750937Smckusick freep->next = savedlist; 158*56499Smckusick if (kbp->kb_last == NULL) 159*56499Smckusick kbp->kb_last = (caddr_t)freep; 16031422Smckusick } 16131422Smckusick va = kbp->kb_next; 16250937Smckusick kbp->kb_next = ((struct freelist *)va)->next; 16350744Smckusick #ifdef DIAGNOSTIC 16450937Smckusick freep = (struct freelist *)va; 16552943Sralph savedtype = (unsigned)freep->type < M_LAST ? 16652943Sralph memname[freep->type] : "???"; 16752943Sralph #if BYTE_ORDER == BIG_ENDIAN 16852931Smckusick freep->type = WEIRD_ADDR >> 16; 16952943Sralph #endif 17052943Sralph #if BYTE_ORDER == LITTLE_ENDIAN 17152943Sralph freep->type = WEIRD_ADDR; 17252943Sralph #endif 17353632Smckusick if (((long)(&freep->next)) & 0x2) 17453632Smckusick freep->next = (caddr_t)((WEIRD_ADDR >> 16)|(WEIRD_ADDR << 16)); 17553632Smckusick else 17653632Smckusick freep->next = (caddr_t)WEIRD_ADDR; 17752931Smckusick end = (long *)&va[copysize]; 17852931Smckusick for (lp = (long *)va; lp < end; lp++) { 17952931Smckusick if (*lp == WEIRD_ADDR) 18052423Storek continue; 18150937Smckusick printf("%s %d of object 0x%x size %d %s %s (0x%x != 0x%x)\n", 18252943Sralph "Data modified on freelist: word", lp - (long *)va, 18352943Sralph va, size, "previous type", savedtype, *lp, WEIRD_ADDR); 18452931Smckusick break; 18550744Smckusick } 18650937Smckusick freep->spare0 = 0; 18750744Smckusick #endif /* DIAGNOSTIC */ 18831422Smckusick #ifdef KMEMSTATS 18931422Smckusick kup = btokup(va); 19031422Smckusick if (kup->ku_indx != indx) 19131422Smckusick panic("malloc: wrong bucket"); 19231422Smckusick if (kup->ku_freecnt == 0) 19331422Smckusick panic("malloc: lost data"); 19431422Smckusick kup->ku_freecnt--; 19531422Smckusick kbp->kb_totalfree--; 19633438Smckusick ksp->ks_memuse += 1 << indx; 19731422Smckusick out: 19831422Smckusick kbp->kb_calls++; 19931422Smckusick ksp->ks_inuse++; 20031422Smckusick ksp->ks_calls++; 20133613Smckusick if (ksp->ks_memuse > ksp->ks_maxused) 20233613Smckusick ksp->ks_maxused = ksp->ks_memuse; 20331422Smckusick #else 20431422Smckusick out: 20531422Smckusick #endif 20631422Smckusick splx(s); 20749066Skarels return ((void *) va); 20831422Smckusick } 20931422Smckusick 21031422Smckusick /* 21131422Smckusick * Free a block of memory allocated by malloc. 21231422Smckusick */ 21333497Smckusick void 21433497Smckusick free(addr, type) 21549066Skarels void *addr; 21634534Skarels int type; 21731422Smckusick { 21831422Smckusick register struct kmembuckets *kbp; 21931422Smckusick register struct kmemusage *kup; 22050937Smckusick register struct freelist *freep; 22150744Smckusick long size; 22234534Skarels int s; 22350744Smckusick #ifdef DIAGNOSTIC 22450744Smckusick caddr_t cp; 22552931Smckusick long *end, *lp, alloc, copysize; 22650744Smckusick #endif 22733438Smckusick #ifdef KMEMSTATS 22833438Smckusick register struct kmemstats *ksp = &kmemstats[type]; 22933438Smckusick #endif 23031422Smckusick 23131422Smckusick kup = btokup(addr); 23245000Smckusick size = 1 << kup->ku_indx; 23350744Smckusick kbp = &bucket[kup->ku_indx]; 23450744Smckusick s = splimp(); 23545000Smckusick #ifdef DIAGNOSTIC 23650744Smckusick /* 23750744Smckusick * Check for returns of data that do not point to the 23850744Smckusick * beginning of the allocation. 23950744Smckusick */ 24045000Smckusick if (size > NBPG * CLSIZE) 24145000Smckusick alloc = addrmask[BUCKETINDX(NBPG * CLSIZE)]; 24245000Smckusick else 24345000Smckusick alloc = addrmask[kup->ku_indx]; 24452536Smckusick if (((u_long)addr & alloc) != 0) 24552536Smckusick panic("free: unaligned addr 0x%x, size %d, type %s, mask %d\n", 24652536Smckusick addr, size, memname[type], alloc); 24745000Smckusick #endif /* DIAGNOSTIC */ 24833613Smckusick if (size > MAXALLOCSAVE) { 24946259Skarels kmem_free(kmem_map, (vm_offset_t)addr, ctob(kup->ku_pagecnt)); 25031422Smckusick #ifdef KMEMSTATS 25133613Smckusick size = kup->ku_pagecnt << PGSHIFT; 25233613Smckusick ksp->ks_memuse -= size; 25331422Smckusick kup->ku_indx = 0; 25431422Smckusick kup->ku_pagecnt = 0; 25533613Smckusick if (ksp->ks_memuse + size >= ksp->ks_limit && 25633613Smckusick ksp->ks_memuse < ksp->ks_limit) 25733438Smckusick wakeup((caddr_t)ksp); 25833438Smckusick ksp->ks_inuse--; 25933497Smckusick kbp->kb_total -= 1; 26031422Smckusick #endif 26131422Smckusick splx(s); 26231422Smckusick return; 26331422Smckusick } 26450937Smckusick freep = (struct freelist *)addr; 26550744Smckusick #ifdef DIAGNOSTIC 26650744Smckusick /* 26750744Smckusick * Check for multiple frees. Use a quick check to see if 26850744Smckusick * it looks free before laboriously searching the freelist. 26950744Smckusick */ 27050937Smckusick if (freep->spare0 == WEIRD_ADDR) { 27152931Smckusick for (cp = kbp->kb_next; cp; cp = *(caddr_t *)cp) { 27252931Smckusick if (addr != cp) 27352931Smckusick continue; 27452931Smckusick printf("multiply freed item 0x%x\n", addr); 27552931Smckusick panic("free: duplicated free"); 27650744Smckusick } 27750744Smckusick } 27850744Smckusick /* 27950744Smckusick * Copy in known text to detect modification after freeing 28050937Smckusick * and to make it look free. Also, save the type being freed 28150937Smckusick * so we can list likely culprit if modification is detected 28250937Smckusick * when the object is reallocated. 28350744Smckusick */ 28452931Smckusick copysize = size < MAX_COPY ? size : MAX_COPY; 28552931Smckusick end = (long *)&((caddr_t)addr)[copysize]; 28652931Smckusick for (lp = (long *)addr; lp < end; lp++) 28752931Smckusick *lp = WEIRD_ADDR; 28850937Smckusick freep->type = type; 28950744Smckusick #endif /* DIAGNOSTIC */ 29031422Smckusick #ifdef KMEMSTATS 29131422Smckusick kup->ku_freecnt++; 29231422Smckusick if (kup->ku_freecnt >= kbp->kb_elmpercl) 29331422Smckusick if (kup->ku_freecnt > kbp->kb_elmpercl) 29431422Smckusick panic("free: multiple frees"); 29531422Smckusick else if (kbp->kb_totalfree > kbp->kb_highwat) 29631422Smckusick kbp->kb_couldfree++; 29731422Smckusick kbp->kb_totalfree++; 29833613Smckusick ksp->ks_memuse -= size; 29933613Smckusick if (ksp->ks_memuse + size >= ksp->ks_limit && 30033613Smckusick ksp->ks_memuse < ksp->ks_limit) 30133438Smckusick wakeup((caddr_t)ksp); 30233438Smckusick ksp->ks_inuse--; 30331422Smckusick #endif 304*56499Smckusick if (kbp->kb_next == NULL) 305*56499Smckusick kbp->kb_next = addr; 306*56499Smckusick else 307*56499Smckusick ((struct freelist *)kbp->kb_last)->next = addr; 308*56499Smckusick freep->next = NULL; 309*56499Smckusick kbp->kb_last = addr; 31031422Smckusick splx(s); 31131422Smckusick } 31231422Smckusick 31331422Smckusick /* 31431422Smckusick * Initialize the kernel memory allocator 31531422Smckusick */ 31631422Smckusick kmeminit() 31731422Smckusick { 31831422Smckusick register long indx; 31933497Smckusick int npg; 32031422Smckusick 32134534Skarels #if ((MAXALLOCSAVE & (MAXALLOCSAVE - 1)) != 0) 32234534Skarels ERROR!_kmeminit:_MAXALLOCSAVE_not_power_of_2 32334534Skarels #endif 32434534Skarels #if (MAXALLOCSAVE > MINALLOCSIZE * 32768) 32534534Skarels ERROR!_kmeminit:_MAXALLOCSAVE_too_big 32634534Skarels #endif 32734534Skarels #if (MAXALLOCSAVE < CLBYTES) 32834534Skarels ERROR!_kmeminit:_MAXALLOCSAVE_too_small 32934534Skarels #endif 33046259Skarels npg = VM_KMEM_SIZE/ NBPG; 33146259Skarels kmemusage = (struct kmemusage *) kmem_alloc(kernel_map, 33246259Skarels (vm_size_t)(npg * sizeof(struct kmemusage))); 33352423Storek kmem_map = kmem_suballoc(kernel_map, (vm_offset_t *)&kmembase, 33452423Storek (vm_offset_t *)&kmemlimit, (vm_size_t)(npg * NBPG), FALSE); 33531422Smckusick #ifdef KMEMSTATS 33631422Smckusick for (indx = 0; indx < MINBUCKET + 16; indx++) { 33731422Smckusick if (1 << indx >= CLBYTES) 33831422Smckusick bucket[indx].kb_elmpercl = 1; 33931422Smckusick else 34031422Smckusick bucket[indx].kb_elmpercl = CLBYTES / (1 << indx); 34131422Smckusick bucket[indx].kb_highwat = 5 * bucket[indx].kb_elmpercl; 34231422Smckusick } 34331422Smckusick for (indx = 0; indx < M_LAST; indx++) 34441950Smckusick kmemstats[indx].ks_limit = npg * NBPG * 6 / 10; 34531422Smckusick #endif 34631422Smckusick } 347