]>
Commit | Line | Data |
---|---|---|
1c79356b | 1 | /* |
39236c6e | 2 | * Copyright (c) 2000-2013 Apple Inc. All rights reserved. |
5d5c5d0d | 3 | * |
2d21ac55 | 4 | * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ |
1c79356b | 5 | * |
2d21ac55 A |
6 | * This file contains Original Code and/or Modifications of Original Code |
7 | * as defined in and that are subject to the Apple Public Source License | |
8 | * Version 2.0 (the 'License'). You may not use this file except in | |
9 | * compliance with the License. The rights granted to you under the License | |
10 | * may not be used to create, or enable the creation or redistribution of, | |
11 | * unlawful or unlicensed copies of an Apple operating system, or to | |
12 | * circumvent, violate, or enable the circumvention or violation of, any | |
13 | * terms of an Apple operating system software license agreement. | |
8f6c56a5 | 14 | * |
2d21ac55 A |
15 | * Please obtain a copy of the License at |
16 | * http://www.opensource.apple.com/apsl/ and read it before using this file. | |
17 | * | |
18 | * The Original Code and all software distributed under the License are | |
19 | * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER | |
8f6c56a5 A |
20 | * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, |
21 | * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, | |
2d21ac55 A |
22 | * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. |
23 | * Please see the License for the specific language governing rights and | |
24 | * limitations under the License. | |
8f6c56a5 | 25 | * |
2d21ac55 | 26 | * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ |
1c79356b A |
27 | */ |
28 | /* Copyright (c) 1995, 1997 Apple Computer, Inc. All Rights Reserved */ | |
29 | /* | |
30 | * Copyright (c) 1987, 1991, 1993 | |
31 | * The Regents of the University of California. All rights reserved. | |
32 | * | |
33 | * Redistribution and use in source and binary forms, with or without | |
34 | * modification, are permitted provided that the following conditions | |
35 | * are met: | |
36 | * 1. Redistributions of source code must retain the above copyright | |
37 | * notice, this list of conditions and the following disclaimer. | |
38 | * 2. Redistributions in binary form must reproduce the above copyright | |
39 | * notice, this list of conditions and the following disclaimer in the | |
40 | * documentation and/or other materials provided with the distribution. | |
41 | * 3. All advertising materials mentioning features or use of this software | |
42 | * must display the following acknowledgement: | |
43 | * This product includes software developed by the University of | |
44 | * California, Berkeley and its contributors. | |
45 | * 4. Neither the name of the University nor the names of its contributors | |
46 | * may be used to endorse or promote products derived from this software | |
47 | * without specific prior written permission. | |
48 | * | |
49 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND | |
50 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
51 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
52 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE | |
53 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
54 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
55 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
56 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
57 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
58 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
59 | * SUCH DAMAGE. | |
60 | * | |
61 | * @(#)kern_malloc.c 8.4 (Berkeley) 5/20/95 | |
62 | */ | |
2d21ac55 A |
63 | /* |
64 | * NOTICE: This file was modified by SPARTA, Inc. in 2005 to introduce | |
65 | * support for mandatory and extensible security protections. This notice | |
66 | * is included in support of clause 2.2 (b) of the Apple Public License, | |
67 | * Version 2.0. | |
68 | */ | |
1c79356b A |
69 | |
70 | #include <sys/param.h> | |
71 | #include <sys/malloc.h> | |
72 | ||
73 | #include <sys/socket.h> | |
74 | #include <sys/socketvar.h> | |
75 | ||
76 | #include <net/route.h> | |
fe8ab488 | 77 | #include <net/necp.h> |
1c79356b A |
78 | |
79 | #include <netinet/in.h> | |
80 | #include <netinet/in_systm.h> | |
81 | #include <netinet/ip.h> | |
82 | #include <netinet/in_pcb.h> | |
39236c6e | 83 | #include <netinet/flow_divert.h> |
1c79356b | 84 | |
55e303ae A |
85 | #include <sys/event.h> |
86 | #include <sys/eventvar.h> | |
87 | ||
91447636 A |
88 | #include <sys/proc_internal.h> |
89 | #include <sys/mount_internal.h> | |
90 | #include <sys/vnode_internal.h> | |
91 | #include <sys/ubc_internal.h> | |
1c79356b | 92 | #include <sys/namei.h> |
91447636 | 93 | #include <sys/file_internal.h> |
1c79356b A |
94 | #include <sys/filedesc.h> |
95 | #include <sys/tty.h> | |
9bccf70c | 96 | #include <sys/quota.h> |
91447636 | 97 | #include <sys/uio_internal.h> |
0c530ab8 | 98 | #include <sys/resourcevar.h> |
2d21ac55 | 99 | #include <sys/signalvar.h> |
39037602 | 100 | #include <sys/decmpfs.h> |
1c79356b | 101 | |
55e303ae | 102 | #include <miscfs/specfs/specdev.h> |
1c79356b A |
103 | |
104 | #include <nfs/rpcv2.h> | |
105 | #include <nfs/nfsproto.h> | |
106 | #include <nfs/nfsnode.h> | |
107 | #include <nfs/nfsmount.h> | |
1c79356b A |
108 | |
109 | #include <mach/mach_types.h> | |
110 | ||
111 | #include <kern/zalloc.h> | |
112 | #include <kern/kalloc.h> | |
113 | ||
39236c6e | 114 | void kmeminit(void); |
1c79356b | 115 | |
2d21ac55 A |
116 | /* Strings corresponding to types of memory. |
117 | * Must be in synch with the #defines is sys/malloc.h | |
118 | * NOTE - the reason we pass null strings in some cases is to reduce of foot | |
119 | * print as much as possible for systems where a tiny kernel is needed. | |
39037602 | 120 | * todo - We should probably redesign this and use enums for our types and only |
2d21ac55 A |
121 | * include types needed for that configuration of the kernel. This can't be |
122 | * done without some kind of kpi since several types are hardwired and exported | |
39037602 | 123 | * (for example see types M_UDFMNT, M_TEMP, etc in sys/malloc.h) |
2d21ac55 A |
124 | */ |
125 | const char *memname[] = { | |
126 | "free", /* 0 M_FREE */ | |
127 | "mbuf", /* 1 M_MBUF */ | |
128 | "devbuf", /* 2 M_DEVBUF */ | |
129 | "socket", /* 3 M_SOCKET */ | |
130 | "pcb", /* 4 M_PCB */ | |
131 | "routetbl", /* 5 M_RTABLE */ | |
132 | "hosttbl", /* 6 M_HTABLE */ | |
133 | "fragtbl", /* 7 M_FTABLE */ | |
134 | "zombie", /* 8 M_ZOMBIE */ | |
135 | "ifaddr", /* 9 M_IFADDR */ | |
136 | "soopts", /* 10 M_SOOPTS */ | |
137 | "soname", /* 11 M_SONAME */ | |
138 | "namei", /* 12 M_NAMEI */ | |
139 | "gprof", /* 13 M_GPROF */ | |
140 | "ioctlops", /* 14 M_IOCTLOPS */ | |
141 | "mapmem", /* 15 M_MAPMEM */ | |
142 | "cred", /* 16 M_CRED */ | |
143 | "pgrp", /* 17 M_PGRP */ | |
144 | "session", /* 18 M_SESSION */ | |
145 | "iov32", /* 19 M_IOV32 */ | |
146 | "mount", /* 20 M_MOUNT */ | |
147 | "fhandle", /* 21 M_FHANDLE */ | |
148 | #if (NFSCLIENT || NFSSERVER) | |
149 | "NFS req", /* 22 M_NFSREQ */ | |
150 | "NFS mount", /* 23 M_NFSMNT */ | |
151 | "NFS node", /* 24 M_NFSNODE */ | |
152 | #else | |
153 | "", /* 22 M_NFSREQ */ | |
154 | "", /* 23 M_NFSMNT */ | |
155 | "", /* 24 M_NFSNODE */ | |
156 | #endif | |
157 | "vnodes", /* 25 M_VNODE */ | |
158 | "namecache", /* 26 M_CACHE */ | |
159 | #if QUOTA | |
160 | "UFS quota", /* 27 M_DQUOT */ | |
161 | #else | |
162 | "", /* 27 M_DQUOT */ | |
163 | #endif | |
39236c6e | 164 | "proc uuid policy", /* 28 M_PROC_UUID_POLICY */ |
2d21ac55 A |
165 | #if (SYSV_SEM || SYSV_MSG || SYSV_SHM) |
166 | "shm", /* 29 M_SHM */ | |
167 | #else | |
168 | "", /* 29 M_SHM */ | |
169 | #endif | |
170 | "plimit", /* 30 M_VMMAP */ | |
171 | "sigacts", /* 31 M_VMMAPENT */ | |
172 | "VM object", /* 32 M_VMOBJ */ | |
173 | "VM objhash", /* 33 M_VMOBJHASH */ | |
174 | "VM pmap", /* 34 M_VMPMAP */ | |
175 | "VM pvmap", /* 35 M_VMPVENT */ | |
176 | "VM pager", /* 36 M_VMPAGER */ | |
177 | "VM pgdata", /* 37 M_VMPGDATA */ | |
178 | "fileproc", /* 38 M_FILEPROC */ | |
179 | "file desc", /* 39 M_FILEDESC */ | |
180 | "lockf", /* 40 M_LOCKF */ | |
181 | "proc", /* 41 M_PROC */ | |
182 | "pstats", /* 42 M_SUBPROC */ | |
183 | "LFS segment", /* 43 M_SEGMENT */ | |
184 | "LFS node", /* 44 M_LFSNODE */ | |
2d21ac55 | 185 | "", /* 45 M_FFSNODE */ |
2d21ac55 A |
186 | "MFS node", /* 46 M_MFSNODE */ |
187 | "NQNFS Lease", /* 47 M_NQLEASE */ | |
188 | "NQNFS Host", /* 48 M_NQMHOST */ | |
189 | "Export Host", /* 49 M_NETADDR */ | |
190 | #if (NFSCLIENT || NFSSERVER) | |
191 | "NFS srvsock", /* 50 M_NFSSVC */ | |
192 | "NFS uid", /* 51 M_NFSUID */ | |
193 | "NFS daemon", /* 52 M_NFSD */ | |
194 | #else | |
195 | "", /* 50 M_NFSSVC */ | |
196 | "", /* 51 M_NFSUID */ | |
197 | "", /* 52 M_NFSD */ | |
198 | #endif | |
199 | "ip_moptions", /* 53 M_IPMOPTS */ | |
200 | "in_multi", /* 54 M_IPMADDR */ | |
201 | "ether_multi", /* 55 M_IFMADDR */ | |
202 | "mrt", /* 56 M_MRTABLE */ | |
b0d623f7 A |
203 | "", /* 57 unused entry */ |
204 | "", /* 58 unused entry */ | |
2d21ac55 A |
205 | #if (NFSCLIENT || NFSSERVER) |
206 | "NFSV3 srvdesc",/* 59 M_NFSRVDESC */ | |
207 | "NFSV3 diroff", /* 60 M_NFSDIROFF */ | |
208 | "NFSV3 bigfh", /* 61 M_NFSBIGFH */ | |
209 | #else | |
210 | "", /* 59 M_NFSRVDESC */ | |
211 | "", /* 60 M_NFSDIROFF */ | |
212 | "", /* 61 M_NFSBIGFH */ | |
213 | #endif | |
214 | "MSDOSFS mount",/* 62 M_MSDOSFSMNT */ | |
215 | "MSDOSFS fat", /* 63 M_MSDOSFSFAT */ | |
216 | "MSDOSFS node", /* 64 M_MSDOSFSNODE */ | |
217 | "ttys", /* 65 M_TTYS */ | |
218 | "exec", /* 66 M_EXEC */ | |
219 | "miscfs mount", /* 67 M_MISCFSMNT */ | |
220 | "miscfs node", /* 68 M_MISCFSNODE */ | |
221 | "adosfs mount", /* 69 M_ADOSFSMNT */ | |
222 | "adosfs node", /* 70 M_ADOSFSNODE */ | |
223 | "adosfs anode", /* 71 M_ANODE */ | |
224 | "buf hdrs", /* 72 M_BUFHDR */ | |
225 | "ofile tabl", /* 73 M_OFILETABL */ | |
226 | "mbuf clust", /* 74 M_MCLUST */ | |
39037602 A |
227 | "", /* 75 unused */ |
228 | "", /* 76 unused */ | |
229 | "", /* 77 unused */ | |
230 | "", /* 78 unused */ | |
231 | "", /* 79 unused */ | |
2d21ac55 A |
232 | "temp", /* 80 M_TEMP */ |
233 | "key mgmt", /* 81 M_SECA */ | |
234 | "DEVFS", /* 82 M_DEVFS */ | |
235 | "IpFw/IpAcct", /* 83 M_IPFW */ | |
236 | "UDF node", /* 84 M_UDFNODE */ | |
237 | "UDF mount", /* 85 M_UDFMNT */ | |
238 | #if INET6 | |
239 | "IPv6 NDP", /* 86 M_IP6NDP */ | |
240 | "IPv6 options", /* 87 M_IP6OPT */ | |
241 | "IPv6 Misc", /* 88 M_IP6MISC */ | |
242 | #else | |
243 | "", /* 86 M_IP6NDP */ | |
244 | "", /* 87 M_IP6OPT */ | |
245 | "", /* 88 M_IP6MISC */ | |
246 | #endif | |
247 | "TCP Segment Q",/* 89 M_TSEGQ */ | |
248 | "IGMP state", /* 90 M_IGMP */ | |
39037602 A |
249 | "", /* 91 unused */ |
250 | "", /* 92 unused */ | |
2d21ac55 A |
251 | "specinfo", /* 93 M_SPECINFO */ |
252 | "kqueue", /* 94 M_KQUEUE */ | |
39037602 A |
253 | "", /* 95 unused */ |
254 | "cluster_read", /* 96 M_CLRDAHEAD */ | |
2d21ac55 A |
255 | "cluster_write",/* 97 M_CLWRBEHIND */ |
256 | "iov64", /* 98 M_IOV64 */ | |
257 | "fileglob", /* 99 M_FILEGLOB */ | |
258 | "kauth", /* 100 M_KAUTH */ | |
259 | "dummynet", /* 101 M_DUMMYNET */ | |
b0d623f7 | 260 | "", /* 102 M_UNSAFEFS */ |
2d21ac55 A |
261 | "macpipelabel", /* 103 M_MACPIPELABEL */ |
262 | "mactemp", /* 104 M_MACTEMP */ | |
263 | "sbuf", /* 105 M_SBUF */ | |
264 | "extattr", /* 106 M_EXTATTR */ | |
3e170ce0 | 265 | "select", /* 107 M_SELECT */ |
2d21ac55 A |
266 | #if TRAFFIC_MGT |
267 | "traffic_mgt", /* 108 M_TRAFFIC_MGT */ | |
268 | #else | |
269 | "", /* 108 M_TRAFFIC_MGT */ | |
270 | #endif | |
39037602 | 271 | #if FS_COMPRESSION |
b0d623f7 A |
272 | "decmpfs_cnode",/* 109 M_DECMPFS_CNODE */ |
273 | #else | |
274 | "", /* 109 M_DECMPFS_CNODE */ | |
39037602 | 275 | #endif /* FS_COMPRESSION */ |
6d2010ae A |
276 | "ipmfilter", /* 110 M_INMFILTER */ |
277 | "ipmsource", /* 111 M_IPMSOURCE */ | |
278 | "in6mfilter", /* 112 M_IN6MFILTER */ | |
279 | "ip6mopts", /* 113 M_IP6MOPTS */ | |
280 | "ip6msource", /* 114 M_IP6MSOURCE */ | |
39236c6e A |
281 | #if FLOW_DIVERT |
282 | "flow_divert_pcb", /* 115 M_FLOW_DIVERT_PCB */ | |
283 | "flow_divert_group", /* 116 M_FLOW_DIVERT_GROUP */ | |
284 | #else | |
285 | "", /* 115 M_FLOW_DIVERT_PCB */ | |
286 | "", /* 116 M_FLOW_DIVERT_GROUP */ | |
287 | #endif | |
288 | "ip6cga", /* 117 M_IP6CGA */ | |
fe8ab488 A |
289 | #if NECP |
290 | "necp", /* 118 M_NECP */ | |
291 | "necp_session_policy", /* 119 M_NECP_SESSION_POLICY */ | |
292 | "necp_socket_policy", /* 120 M_NECP_SOCKET_POLICY */ | |
293 | "necp_ip_policy", /* 121 M_NECP_IP_POLICY */ | |
294 | #else | |
295 | "", /* 118 M_NECP */ | |
296 | "", /* 119 M_NECP_SESSION_POLICY */ | |
297 | "", /* 120 M_NECP_SOCKET_POLICY */ | |
298 | "", /* 121 M_NECP_IP_POLICY */ | |
299 | #endif | |
300 | "fdvnodedata" /* 122 M_FD_VN_DATA */ | |
301 | "fddirbuf", /* 123 M_FD_DIRBUF */ | |
3e170ce0 | 302 | "netagent", /* 124 M_NETAGENT */ |
5ba3f43e A |
303 | "Event Handler",/* 125 M_EVENTHANDLER */ |
304 | "Link Layer Table", /* 126 M_LLTABLE */ | |
305 | "Network Work Queue", /* 127 M_NWKWQ */ | |
fe8ab488 | 306 | "" |
2d21ac55 A |
307 | }; |
308 | ||
309 | /* for use with kmzones.kz_zalloczone */ | |
6d2010ae | 310 | #define KMZ_CREATEZONE_ACCT ((void *)-3) |
1c79356b A |
311 | #define KMZ_CREATEZONE ((void *)-2) |
312 | #define KMZ_LOOKUPZONE ((void *)-1) | |
2d21ac55 | 313 | #define KMZ_MALLOC ((void *)0) |
1c79356b | 314 | #define KMZ_SHAREZONE ((void *)1) |
2d21ac55 A |
315 | |
316 | struct kmzones { | |
317 | size_t kz_elemsize; | |
318 | void *kz_zalloczone; | |
0b4c1975 | 319 | boolean_t kz_noencrypt; |
1c79356b A |
320 | } kmzones[M_LAST] = { |
321 | #define SOS(sname) sizeof (struct sname) | |
322 | #define SOX(sname) -1 | |
0b4c1975 A |
323 | { -1, 0, FALSE }, /* 0 M_FREE */ |
324 | { MSIZE, KMZ_CREATEZONE, FALSE }, /* 1 M_MBUF */ | |
325 | { 0, KMZ_MALLOC, FALSE }, /* 2 M_DEVBUF */ | |
326 | { SOS(socket), KMZ_CREATEZONE, TRUE }, /* 3 M_SOCKET */ | |
327 | { SOS(inpcb), KMZ_LOOKUPZONE, TRUE }, /* 4 M_PCB */ | |
328 | { M_MBUF, KMZ_SHAREZONE, FALSE }, /* 5 M_RTABLE */ | |
329 | { M_MBUF, KMZ_SHAREZONE, FALSE }, /* 6 M_HTABLE */ | |
330 | { M_MBUF, KMZ_SHAREZONE, FALSE }, /* 7 M_FTABLE */ | |
331 | { SOS(rusage), KMZ_CREATEZONE, TRUE }, /* 8 M_ZOMBIE */ | |
332 | { 0, KMZ_MALLOC, FALSE }, /* 9 M_IFADDR */ | |
333 | { M_MBUF, KMZ_SHAREZONE, FALSE }, /* 10 M_SOOPTS */ | |
334 | { 0, KMZ_MALLOC, FALSE }, /* 11 M_SONAME */ | |
335 | { MAXPATHLEN, KMZ_CREATEZONE, FALSE }, /* 12 M_NAMEI */ | |
336 | { 0, KMZ_MALLOC, FALSE }, /* 13 M_GPROF */ | |
337 | { 0, KMZ_MALLOC, FALSE }, /* 14 M_IOCTLOPS */ | |
338 | { 0, KMZ_MALLOC, FALSE }, /* 15 M_MAPMEM */ | |
339 | { SOS(ucred), KMZ_CREATEZONE, FALSE }, /* 16 M_CRED */ | |
340 | { SOS(pgrp), KMZ_CREATEZONE, FALSE }, /* 17 M_PGRP */ | |
341 | { SOS(session), KMZ_CREATEZONE, FALSE }, /* 18 M_SESSION */ | |
342 | { SOS(user32_iovec), KMZ_LOOKUPZONE, FALSE },/* 19 M_IOV32 */ | |
343 | { SOS(mount), KMZ_CREATEZONE, FALSE }, /* 20 M_MOUNT */ | |
344 | { 0, KMZ_MALLOC, FALSE }, /* 21 M_FHANDLE */ | |
2d21ac55 | 345 | #if (NFSCLIENT || NFSSERVER) |
0b4c1975 | 346 | { SOS(nfsreq), KMZ_CREATEZONE, FALSE }, /* 22 M_NFSREQ */ |
6d2010ae | 347 | { SOS(nfsmount),KMZ_CREATEZONE, FALSE }, /* 23 M_NFSMNT */ |
0b4c1975 | 348 | { SOS(nfsnode), KMZ_CREATEZONE, FALSE }, /* 24 M_NFSNODE */ |
2d21ac55 | 349 | #else |
0b4c1975 A |
350 | { 0, KMZ_MALLOC, FALSE }, /* 22 M_NFSREQ */ |
351 | { 0, KMZ_MALLOC, FALSE }, /* 23 M_NFSMNT */ | |
352 | { 0, KMZ_MALLOC, FALSE }, /* 24 M_NFSNODE */ | |
2d21ac55 | 353 | #endif |
0b4c1975 | 354 | { SOS(vnode), KMZ_CREATEZONE, TRUE }, /* 25 M_VNODE */ |
6d2010ae | 355 | { SOS(namecache), KMZ_CREATEZONE, FALSE }, /* 26 M_CACHE */ |
2d21ac55 | 356 | #if QUOTA |
0b4c1975 | 357 | { SOX(dquot), KMZ_LOOKUPZONE, FALSE }, /* 27 M_DQUOT */ |
2d21ac55 | 358 | #else |
0b4c1975 | 359 | { 0, KMZ_MALLOC, FALSE }, /* 27 M_DQUOT */ |
2d21ac55 | 360 | #endif |
39236c6e | 361 | { 0, KMZ_MALLOC, FALSE }, /* 28 M_PROC_UUID_POLICY */ |
6d2010ae | 362 | { 0, KMZ_MALLOC, FALSE }, /* 29 M_SHM */ |
0b4c1975 | 363 | { SOS(plimit), KMZ_CREATEZONE, TRUE }, /* 30 M_PLIMIT */ |
6d2010ae | 364 | { SOS(sigacts), KMZ_CREATEZONE_ACCT, TRUE }, /* 31 M_SIGACTS */ |
0b4c1975 A |
365 | { 0, KMZ_MALLOC, FALSE }, /* 32 M_VMOBJ */ |
366 | { 0, KMZ_MALLOC, FALSE }, /* 33 M_VMOBJHASH */ | |
367 | { 0, KMZ_MALLOC, FALSE }, /* 34 M_VMPMAP */ | |
368 | { 0, KMZ_MALLOC, FALSE }, /* 35 M_VMPVENT */ | |
369 | { 0, KMZ_MALLOC, FALSE }, /* 36 M_VMPAGER */ | |
370 | { 0, KMZ_MALLOC, FALSE }, /* 37 M_VMPGDATA */ | |
6d2010ae A |
371 | { SOS(fileproc),KMZ_CREATEZONE_ACCT, TRUE }, /* 38 M_FILEPROC */ |
372 | { SOS(filedesc),KMZ_CREATEZONE_ACCT, TRUE }, /* 39 M_FILEDESC */ | |
373 | { SOX(lockf), KMZ_CREATEZONE_ACCT, TRUE }, /* 40 M_LOCKF */ | |
0b4c1975 A |
374 | { SOS(proc), KMZ_CREATEZONE, FALSE }, /* 41 M_PROC */ |
375 | { SOS(pstats), KMZ_CREATEZONE, TRUE }, /* 42 M_PSTATS */ | |
376 | { 0, KMZ_MALLOC, FALSE }, /* 43 M_SEGMENT */ | |
377 | { M_FFSNODE, KMZ_SHAREZONE, FALSE }, /* 44 M_LFSNODE */ | |
378 | { 0, KMZ_MALLOC, FALSE }, /* 45 M_FFSNODE */ | |
379 | { M_FFSNODE, KMZ_SHAREZONE, FALSE }, /* 46 M_MFSNODE */ | |
380 | { 0, KMZ_MALLOC, FALSE }, /* 47 M_NQLEASE */ | |
381 | { 0, KMZ_MALLOC, FALSE }, /* 48 M_NQMHOST */ | |
382 | { 0, KMZ_MALLOC, FALSE }, /* 49 M_NETADDR */ | |
2d21ac55 A |
383 | #if (NFSCLIENT || NFSSERVER) |
384 | { SOX(nfsrv_sock), | |
6d2010ae | 385 | KMZ_CREATEZONE_ACCT, FALSE }, /* 50 M_NFSSVC */ |
0b4c1975 | 386 | { 0, KMZ_MALLOC, FALSE }, /* 51 M_NFSUID */ |
2d21ac55 | 387 | { SOX(nfsrvcache), |
6d2010ae | 388 | KMZ_CREATEZONE_ACCT, FALSE }, /* 52 M_NFSD */ |
2d21ac55 | 389 | #else |
0b4c1975 A |
390 | { 0, KMZ_MALLOC, FALSE }, /* 50 M_NFSSVC */ |
391 | { 0, KMZ_MALLOC, FALSE }, /* 51 M_NFSUID */ | |
392 | { 0, KMZ_MALLOC, FALSE }, /* 52 M_NFSD */ | |
2d21ac55 A |
393 | #endif |
394 | { SOX(ip_moptions), | |
0b4c1975 A |
395 | KMZ_LOOKUPZONE, FALSE }, /* 53 M_IPMOPTS */ |
396 | { SOX(in_multi),KMZ_LOOKUPZONE, FALSE }, /* 54 M_IPMADDR */ | |
2d21ac55 | 397 | { SOX(ether_multi), |
0b4c1975 A |
398 | KMZ_LOOKUPZONE, FALSE }, /* 55 M_IFMADDR */ |
399 | { SOX(mrt), KMZ_CREATEZONE, TRUE }, /* 56 M_MRTABLE */ | |
400 | { 0, KMZ_MALLOC, FALSE }, /* 57 unused entry */ | |
401 | { 0, KMZ_MALLOC, FALSE }, /* 58 unused entry */ | |
2d21ac55 A |
402 | #if (NFSCLIENT || NFSSERVER) |
403 | { SOS(nfsrv_descript), | |
6d2010ae | 404 | KMZ_CREATEZONE_ACCT, FALSE }, /* 59 M_NFSRVDESC */ |
0b4c1975 A |
405 | { SOS(nfsdmap), KMZ_CREATEZONE, FALSE }, /* 60 M_NFSDIROFF */ |
406 | { SOS(fhandle), KMZ_LOOKUPZONE, FALSE }, /* 61 M_NFSBIGFH */ | |
2d21ac55 | 407 | #else |
0b4c1975 A |
408 | { 0, KMZ_MALLOC, FALSE }, /* 59 M_NFSRVDESC */ |
409 | { 0, KMZ_MALLOC, FALSE }, /* 60 M_NFSDIROFF */ | |
410 | { 0, KMZ_MALLOC, FALSE }, /* 61 M_NFSBIGFH */ | |
2d21ac55 | 411 | #endif |
0b4c1975 A |
412 | { 0, KMZ_MALLOC, FALSE }, /* 62 M_MSDOSFSMNT */ |
413 | { 0, KMZ_MALLOC, FALSE }, /* 63 M_MSDOSFSFAT */ | |
414 | { 0, KMZ_MALLOC, FALSE }, /* 64 M_MSDOSFSNODE */ | |
415 | { SOS(tty), KMZ_CREATEZONE, FALSE }, /* 65 M_TTYS */ | |
416 | { 0, KMZ_MALLOC, FALSE }, /* 66 M_EXEC */ | |
417 | { 0, KMZ_MALLOC, FALSE }, /* 67 M_MISCFSMNT */ | |
418 | { 0, KMZ_MALLOC, FALSE }, /* 68 M_MISCFSNODE */ | |
419 | { 0, KMZ_MALLOC, FALSE }, /* 69 M_ADOSFSMNT */ | |
420 | { 0, KMZ_MALLOC, FALSE }, /* 70 M_ADOSFSNODE */ | |
421 | { 0, KMZ_MALLOC, FALSE }, /* 71 M_ANODE */ | |
6d2010ae | 422 | { 0, KMZ_MALLOC, TRUE }, /* 72 M_BUFHDR */ |
2d21ac55 | 423 | { (NDFILE * OFILESIZE), |
6d2010ae | 424 | KMZ_CREATEZONE_ACCT, FALSE }, /* 73 M_OFILETABL */ |
0b4c1975 | 425 | { MCLBYTES, KMZ_CREATEZONE, FALSE }, /* 74 M_MCLUST */ |
39037602 A |
426 | { 0, KMZ_MALLOC, FALSE }, /* 75 unused */ |
427 | { 0, KMZ_MALLOC, FALSE }, /* 76 unused */ | |
428 | { 0, KMZ_MALLOC, FALSE }, /* 77 unused */ | |
39236c6e A |
429 | { 0, KMZ_MALLOC, FALSE }, /* 78 unused */ |
430 | { 0, KMZ_MALLOC, FALSE }, /* 79 unused */ | |
0b4c1975 A |
431 | { 0, KMZ_MALLOC, FALSE }, /* 80 M_TEMP */ |
432 | { 0, KMZ_MALLOC, FALSE }, /* 81 M_SECA */ | |
433 | { 0, KMZ_MALLOC, FALSE }, /* 82 M_DEVFS */ | |
434 | { 0, KMZ_MALLOC, FALSE }, /* 83 M_IPFW */ | |
435 | { 0, KMZ_MALLOC, FALSE }, /* 84 M_UDFNODE */ | |
436 | { 0, KMZ_MALLOC, FALSE }, /* 85 M_UDFMOUNT */ | |
437 | { 0, KMZ_MALLOC, FALSE }, /* 86 M_IP6NDP */ | |
438 | { 0, KMZ_MALLOC, FALSE }, /* 87 M_IP6OPT */ | |
439 | { 0, KMZ_MALLOC, FALSE }, /* 88 M_IP6MISC */ | |
440 | { 0, KMZ_MALLOC, FALSE }, /* 89 M_TSEGQ */ | |
441 | { 0, KMZ_MALLOC, FALSE }, /* 90 M_IGMP */ | |
39037602 A |
442 | { 0, KMZ_MALLOC, FALSE }, /* 91 unused */ |
443 | { 0, KMZ_MALLOC, FALSE }, /* 92 unused */ | |
6d2010ae A |
444 | { SOS(specinfo),KMZ_CREATEZONE, TRUE }, /* 93 M_SPECINFO */ |
445 | { SOS(kqueue), KMZ_CREATEZONE, FALSE }, /* 94 M_KQUEUE */ | |
39037602 | 446 | { 0, KMZ_MALLOC, FALSE }, /* 95 unused */ |
0b4c1975 A |
447 | { SOS(cl_readahead), KMZ_CREATEZONE, TRUE }, /* 96 M_CLRDAHEAD */ |
448 | { SOS(cl_writebehind),KMZ_CREATEZONE, TRUE }, /* 97 M_CLWRBEHIND */ | |
449 | { SOS(user64_iovec), KMZ_LOOKUPZONE, FALSE },/* 98 M_IOV64 */ | |
450 | { SOS(fileglob), KMZ_CREATEZONE, TRUE }, /* 99 M_FILEGLOB */ | |
451 | { 0, KMZ_MALLOC, FALSE }, /* 100 M_KAUTH */ | |
452 | { 0, KMZ_MALLOC, FALSE }, /* 101 M_DUMMYNET */ | |
0b4c1975 | 453 | { 0, KMZ_MALLOC, FALSE }, /* 102 M_UNSAFEFS */ |
0b4c1975 A |
454 | { 0, KMZ_MALLOC, FALSE }, /* 103 M_MACPIPELABEL */ |
455 | { 0, KMZ_MALLOC, FALSE }, /* 104 M_MACTEMP */ | |
456 | { 0, KMZ_MALLOC, FALSE }, /* 105 M_SBUF */ | |
457 | { 0, KMZ_MALLOC, FALSE }, /* 106 M_HFS_EXTATTR */ | |
3e170ce0 | 458 | { 0, KMZ_MALLOC, FALSE }, /* 107 M_SELECT */ |
0b4c1975 | 459 | { 0, KMZ_MALLOC, FALSE }, /* 108 M_TRAFFIC_MGT */ |
39037602 | 460 | #if FS_COMPRESSION |
6d2010ae | 461 | { SOS(decmpfs_cnode),KMZ_CREATEZONE , FALSE}, /* 109 M_DECMPFS_CNODE */ |
b0d623f7 | 462 | #else |
0b4c1975 | 463 | { 0, KMZ_MALLOC, FALSE }, /* 109 M_DECMPFS_CNODE */ |
39037602 | 464 | #endif /* FS_COMPRESSION */ |
6d2010ae A |
465 | { 0, KMZ_MALLOC, FALSE }, /* 110 M_INMFILTER */ |
466 | { 0, KMZ_MALLOC, FALSE }, /* 111 M_IPMSOURCE */ | |
467 | { 0, KMZ_MALLOC, FALSE }, /* 112 M_IN6MFILTER */ | |
468 | { 0, KMZ_MALLOC, FALSE }, /* 113 M_IP6MOPTS */ | |
469 | { 0, KMZ_MALLOC, FALSE }, /* 114 M_IP6MSOURCE */ | |
39236c6e A |
470 | #if FLOW_DIVERT |
471 | { SOS(flow_divert_pcb), KMZ_CREATEZONE, TRUE }, /* 115 M_FLOW_DIVERT_PCB */ | |
472 | { SOS(flow_divert_group), KMZ_CREATEZONE, TRUE }, /* 116 M_FLOW_DIVERT_GROUP */ | |
473 | #else | |
474 | { 0, KMZ_MALLOC, FALSE }, /* 115 M_FLOW_DIVERT_PCB */ | |
475 | { 0, KMZ_MALLOC, FALSE }, /* 116 M_FLOW_DIVERT_GROUP */ | |
476 | #endif /* FLOW_DIVERT */ | |
477 | { 0, KMZ_MALLOC, FALSE }, /* 117 M_IP6CGA */ | |
fe8ab488 A |
478 | { 0, KMZ_MALLOC, FALSE }, /* 118 M_NECP */ |
479 | #if NECP | |
480 | { SOS(necp_session_policy), KMZ_CREATEZONE, TRUE }, /* 119 M_NECP_SESSION_POLICY */ | |
481 | { SOS(necp_kernel_socket_policy), KMZ_CREATEZONE, TRUE }, /* 120 M_NECP_SOCKET_POLICY */ | |
482 | { SOS(necp_kernel_ip_output_policy), KMZ_CREATEZONE, TRUE }, /* 121 M_NECP_IP_POLICY */ | |
483 | #else | |
484 | { 0, KMZ_MALLOC, FALSE }, /* 119 M_NECP_SESSION_POLICY */ | |
485 | { 0, KMZ_MALLOC, FALSE }, /* 120 M_NECP_SOCKET_POLICY */ | |
486 | { 0, KMZ_MALLOC, FALSE }, /* 121 M_NECP_IP_POLICY */ | |
487 | #endif /* NECP */ | |
3e170ce0 A |
488 | { 0, KMZ_MALLOC, FALSE }, /* 122 M_FD_VN_DATA */ |
489 | { 0, KMZ_MALLOC, FALSE }, /* 123 M_FD_DIRBUF */ | |
490 | { 0, KMZ_MALLOC, FALSE }, /* 124 M_NETAGENT */ | |
5ba3f43e A |
491 | { 0, KMZ_MALLOC, FALSE }, /* 125 M_EVENTHANDLER */ |
492 | { 0, KMZ_MALLOC, FALSE }, /* 126 M_LLTABLE */ | |
493 | { 0, KMZ_MALLOC, FALSE }, /* 127 M_NWKWQ */ | |
1c79356b A |
494 | #undef SOS |
495 | #undef SOX | |
496 | }; | |
497 | ||
55e303ae | 498 | extern zone_t kalloc_zone(vm_size_t); /* XXX */ |
1c79356b A |
499 | |
500 | /* | |
501 | * Initialize the kernel memory allocator | |
502 | */ | |
503 | void | |
504 | kmeminit(void) | |
505 | { | |
506 | struct kmzones *kmz; | |
507 | ||
d7e50217 | 508 | if ((sizeof(kmzones)/sizeof(kmzones[0])) != (sizeof(memname)/sizeof(memname[0]))) { |
2d21ac55 | 509 | panic("kmeminit: kmzones has %lu elements but memname has %lu\n", |
d7e50217 A |
510 | (sizeof(kmzones)/sizeof(kmzones[0])), (sizeof(memname)/sizeof(memname[0]))); |
511 | } | |
512 | ||
1c79356b A |
513 | kmz = kmzones; |
514 | while (kmz < &kmzones[M_LAST]) { | |
515 | /* XXX */ | |
2d21ac55 | 516 | if (kmz->kz_elemsize == (size_t)(-1)) |
1c79356b A |
517 | ; |
518 | else | |
519 | /* XXX */ | |
6d2010ae A |
520 | if (kmz->kz_zalloczone == KMZ_CREATEZONE || |
521 | kmz->kz_zalloczone == KMZ_CREATEZONE_ACCT) { | |
1c79356b A |
522 | kmz->kz_zalloczone = zinit(kmz->kz_elemsize, |
523 | 1024 * 1024, PAGE_SIZE, | |
524 | memname[kmz - kmzones]); | |
6d2010ae A |
525 | zone_change(kmz->kz_zalloczone, Z_CALLERACCT, |
526 | (kmz->kz_zalloczone == KMZ_CREATEZONE_ACCT)); | |
527 | ||
0b4c1975 A |
528 | if (kmz->kz_noencrypt == TRUE) |
529 | zone_change(kmz->kz_zalloczone, Z_NOENCRYPT, TRUE); | |
1c79356b A |
530 | } |
531 | else if (kmz->kz_zalloczone == KMZ_LOOKUPZONE) | |
532 | kmz->kz_zalloczone = kalloc_zone(kmz->kz_elemsize); | |
533 | ||
534 | kmz++; | |
535 | } | |
536 | ||
537 | kmz = kmzones; | |
538 | while (kmz < &kmzones[M_LAST]) { | |
539 | /* XXX */ | |
2d21ac55 | 540 | if (kmz->kz_elemsize == (size_t)(-1)) |
1c79356b A |
541 | ; |
542 | else | |
543 | /* XXX */ | |
544 | if (kmz->kz_zalloczone == KMZ_SHAREZONE) { | |
545 | kmz->kz_zalloczone = | |
546 | kmzones[kmz->kz_elemsize].kz_zalloczone; | |
547 | kmz->kz_elemsize = | |
548 | kmzones[kmz->kz_elemsize].kz_elemsize; | |
549 | } | |
550 | ||
551 | kmz++; | |
552 | } | |
553 | } | |
554 | ||
91447636 | 555 | void * |
3e170ce0 A |
556 | _MALLOC_external( |
557 | size_t size, | |
558 | int type, | |
559 | int flags); | |
560 | void * | |
561 | _MALLOC_external( | |
1c79356b A |
562 | size_t size, |
563 | int type, | |
564 | int flags) | |
3e170ce0 | 565 | { |
5ba3f43e | 566 | static vm_allocation_site_t site = { .tag = VM_KERN_MEMORY_KALLOC, .flags = VM_TAG_BT }; |
3e170ce0 A |
567 | return (__MALLOC(size, type, flags, &site)); |
568 | } | |
569 | ||
570 | void * | |
571 | __MALLOC( | |
572 | size_t size, | |
573 | int type, | |
574 | int flags, | |
575 | vm_allocation_site_t *site) | |
1c79356b | 576 | { |
39037602 A |
577 | void *addr = NULL; |
578 | vm_size_t msize = size; | |
1c79356b A |
579 | |
580 | if (type >= M_LAST) | |
581 | panic("_malloc TYPE"); | |
582 | ||
583 | if (size == 0) | |
2d21ac55 | 584 | return (NULL); |
1c79356b | 585 | |
39037602 A |
586 | if (msize != size) { |
587 | panic("Requested size to __MALLOC is too large (%llx)!\n", (uint64_t)size); | |
588 | } | |
589 | ||
1c79356b | 590 | if (flags & M_NOWAIT) { |
39037602 | 591 | addr = (void *)kalloc_canblock(&msize, FALSE, site); |
1c79356b | 592 | } else { |
39037602 A |
593 | addr = (void *)kalloc_canblock(&msize, TRUE, site); |
594 | if (addr == NULL) { | |
b0d623f7 A |
595 | /* |
596 | * We get here when the caller told us to block waiting for memory, but | |
597 | * kalloc said there's no memory left to get. Generally, this means there's a | |
813fb2f6 A |
598 | * leak or the caller asked for an impossibly large amount of memory. If the caller |
599 | * is expecting a NULL return code then it should explicitly set the flag M_NULL. | |
600 | * If the caller isn't expecting a NULL return code, we just panic. This is less | |
601 | * than ideal, but returning NULL when the caller isn't expecting it doesn't help | |
602 | * since the majority of callers don't check the return value and will just | |
603 | * dereference the pointer and trap anyway. We may as well get a more | |
604 | * descriptive message out while we can. | |
b0d623f7 | 605 | */ |
813fb2f6 A |
606 | if (flags & M_NULL) { |
607 | return NULL; | |
608 | } | |
b0d623f7 A |
609 | panic("_MALLOC: kalloc returned NULL (potential leak), size %llu", (uint64_t) size); |
610 | } | |
1c79356b | 611 | } |
39037602 | 612 | if (!addr) |
1c79356b A |
613 | return (0); |
614 | ||
55e303ae | 615 | if (flags & M_ZERO) |
39037602 | 616 | bzero(addr, size); |
55e303ae | 617 | |
39037602 | 618 | return (addr); |
1c79356b A |
619 | } |
620 | ||
91447636 A |
621 | void |
622 | _FREE( | |
1c79356b A |
623 | void *addr, |
624 | int type) | |
625 | { | |
1c79356b A |
626 | if (type >= M_LAST) |
627 | panic("_free TYPE"); | |
628 | ||
9bccf70c A |
629 | if (!addr) |
630 | return; /* correct (convenient bsd kernel legacy) */ | |
1c79356b | 631 | |
39037602 | 632 | kfree_addr(addr); |
1c79356b A |
633 | } |
634 | ||
6d2010ae | 635 | void * |
3e170ce0 | 636 | __REALLOC( |
6d2010ae A |
637 | void *addr, |
638 | size_t size, | |
639 | int type, | |
3e170ce0 A |
640 | int flags, |
641 | vm_allocation_site_t *site) | |
6d2010ae | 642 | { |
6d2010ae A |
643 | void *newaddr; |
644 | size_t alloc; | |
645 | ||
646 | /* realloc(NULL, ...) is equivalent to malloc(...) */ | |
647 | if (addr == NULL) | |
3e170ce0 | 648 | return (__MALLOC(size, type, flags, site)); |
6d2010ae | 649 | |
39037602 A |
650 | alloc = kalloc_size(addr); |
651 | /* | |
652 | * Find out the size of the bucket in which the new sized allocation | |
653 | * would land. If it matches the bucket of the original allocation, | |
654 | * simply return the address. | |
655 | */ | |
813fb2f6 A |
656 | if (kalloc_bucket_size(size) == alloc) { |
657 | if (flags & M_ZERO) { | |
658 | if (alloc < size) | |
5ba3f43e | 659 | bzero(addr + alloc, (size - alloc)); |
813fb2f6 | 660 | else |
5ba3f43e | 661 | bzero(addr + size, (alloc - size)); |
813fb2f6 | 662 | } |
39037602 | 663 | return addr; |
813fb2f6 | 664 | } |
39037602 | 665 | |
6d2010ae | 666 | /* Allocate a new, bigger (or smaller) block */ |
3e170ce0 | 667 | if ((newaddr = __MALLOC(size, type, flags, site)) == NULL) |
6d2010ae A |
668 | return (NULL); |
669 | ||
6d2010ae A |
670 | /* Copy over original contents */ |
671 | bcopy(addr, newaddr, MIN(size, alloc)); | |
672 | _FREE(addr, type); | |
673 | ||
674 | return (newaddr); | |
675 | } | |
676 | ||
91447636 | 677 | void * |
3e170ce0 A |
678 | _MALLOC_ZONE_external( |
679 | size_t size, | |
680 | int type, | |
681 | int flags); | |
682 | void * | |
683 | _MALLOC_ZONE_external( | |
1c79356b A |
684 | size_t size, |
685 | int type, | |
686 | int flags) | |
3e170ce0 A |
687 | { |
688 | return (__MALLOC_ZONE(size, type, flags, NULL)); | |
689 | } | |
690 | ||
691 | void * | |
692 | __MALLOC_ZONE( | |
693 | size_t size, | |
694 | int type, | |
695 | int flags, | |
696 | vm_allocation_site_t *site) | |
1c79356b A |
697 | { |
698 | struct kmzones *kmz; | |
699 | void *elem; | |
700 | ||
701 | if (type >= M_LAST) | |
702 | panic("_malloc_zone TYPE"); | |
703 | ||
704 | kmz = &kmzones[type]; | |
705 | if (kmz->kz_zalloczone == KMZ_MALLOC) | |
91447636 | 706 | panic("_malloc_zone ZONE: type = %d", type); |
1c79356b A |
707 | |
708 | /* XXX */ | |
2d21ac55 | 709 | if (kmz->kz_elemsize == (size_t)(-1)) |
1c79356b A |
710 | panic("_malloc_zone XXX"); |
711 | /* XXX */ | |
712 | if (size == kmz->kz_elemsize) | |
713 | if (flags & M_NOWAIT) { | |
714 | elem = (void *)zalloc_noblock(kmz->kz_zalloczone); | |
715 | } else { | |
716 | elem = (void *)zalloc(kmz->kz_zalloczone); | |
717 | } | |
39037602 A |
718 | else { |
719 | vm_size_t kalloc_size = size; | |
720 | if (size > kalloc_size) { | |
721 | elem = NULL; | |
722 | } else if (flags & M_NOWAIT) { | |
723 | elem = (void *)kalloc_canblock(&kalloc_size, FALSE, site); | |
1c79356b | 724 | } else { |
39037602 | 725 | elem = (void *)kalloc_canblock(&kalloc_size, TRUE, site); |
1c79356b | 726 | } |
39037602 | 727 | } |
1c79356b | 728 | |
4d15aeb1 A |
729 | if (elem && (flags & M_ZERO)) |
730 | bzero(elem, size); | |
731 | ||
1c79356b A |
732 | return (elem); |
733 | } | |
734 | ||
91447636 A |
735 | void |
736 | _FREE_ZONE( | |
1c79356b A |
737 | void *elem, |
738 | size_t size, | |
739 | int type) | |
740 | { | |
741 | struct kmzones *kmz; | |
742 | ||
743 | if (type >= M_LAST) | |
744 | panic("FREE_SIZE"); | |
745 | ||
746 | kmz = &kmzones[type]; | |
747 | if (kmz->kz_zalloczone == KMZ_MALLOC) | |
748 | panic("free_zone ZONE"); | |
749 | ||
750 | /* XXX */ | |
2d21ac55 | 751 | if (kmz->kz_elemsize == (size_t)(-1)) |
1c79356b A |
752 | panic("FREE_SIZE XXX"); |
753 | /* XXX */ | |
754 | if (size == kmz->kz_elemsize) | |
91447636 | 755 | zfree(kmz->kz_zalloczone, elem); |
1c79356b | 756 | else |
91447636 | 757 | kfree(elem, size); |
1c79356b | 758 | } |
6d2010ae | 759 | |
5ba3f43e A |
760 | #if DEBUG || DEVELOPMENT |
761 | ||
762 | extern unsigned int zone_map_jetsam_limit; | |
763 | ||
764 | static int | |
765 | sysctl_zone_map_jetsam_limit SYSCTL_HANDLER_ARGS | |
766 | { | |
767 | #pragma unused(oidp, arg1, arg2) | |
768 | int oldval = 0, val = 0, error = 0; | |
769 | ||
770 | oldval = zone_map_jetsam_limit; | |
771 | error = sysctl_io_number(req, oldval, sizeof(int), &val, NULL); | |
772 | if (error || !req->newptr) { | |
773 | return (error); | |
774 | } | |
775 | ||
776 | if (val <= 0 || val > 100) { | |
777 | printf("sysctl_zone_map_jetsam_limit: new jetsam limit value is invalid.\n"); | |
778 | return EINVAL; | |
779 | } | |
780 | ||
781 | zone_map_jetsam_limit = val; | |
782 | return (0); | |
783 | } | |
784 | ||
785 | SYSCTL_PROC(_kern, OID_AUTO, zone_map_jetsam_limit, CTLTYPE_INT|CTLFLAG_RW, 0, 0, | |
786 | sysctl_zone_map_jetsam_limit, "I", "Zone map jetsam limit"); | |
787 | ||
788 | extern boolean_t run_zone_test(void); | |
789 | ||
790 | static int | |
791 | sysctl_run_zone_test SYSCTL_HANDLER_ARGS | |
792 | { | |
793 | #pragma unused(oidp, arg1, arg2) | |
794 | int ret_val = run_zone_test(); | |
795 | ||
796 | return SYSCTL_OUT(req, &ret_val, sizeof(ret_val)); | |
797 | } | |
798 | ||
799 | SYSCTL_PROC(_kern, OID_AUTO, run_zone_test, | |
800 | CTLTYPE_INT | CTLFLAG_RD | CTLFLAG_MASKED | CTLFLAG_LOCKED, | |
801 | 0, 0, &sysctl_run_zone_test, "I", "Test zone allocator KPI"); | |
802 | ||
803 | #endif /* DEBUG || DEVELOPMENT */ | |
804 | ||
6d2010ae A |
805 | #if CONFIG_ZLEAKS |
806 | ||
807 | SYSCTL_DECL(_kern_zleak); | |
808 | SYSCTL_NODE(_kern, OID_AUTO, zleak, CTLFLAG_RW | CTLFLAG_LOCKED, 0, "zleak"); | |
809 | ||
810 | /* | |
811 | * kern.zleak.active | |
812 | * | |
813 | * Show the status of the zleak subsystem (0 = enabled, 1 = active, | |
814 | * and -1 = failed), and if enabled, allow it to be activated immediately. | |
815 | */ | |
816 | static int | |
817 | sysctl_zleak_active SYSCTL_HANDLER_ARGS | |
818 | { | |
819 | #pragma unused(arg1, arg2) | |
820 | int oldval, val, error; | |
821 | ||
822 | val = oldval = get_zleak_state(); | |
823 | error = sysctl_handle_int(oidp, &val, 0, req); | |
824 | if (error || !req->newptr) | |
825 | return (error); | |
826 | /* | |
827 | * Can only be activated if it's off (and not failed.) | |
828 | * Cannot be deactivated once it's on. | |
829 | */ | |
830 | if (val == 1 && oldval == 0) { | |
831 | kern_return_t kr = zleak_activate(); | |
832 | ||
833 | if (KERN_SUCCESS != kr) | |
834 | printf("zleak_active: failed to activate " | |
835 | "live zone leak debugging (%d).\n", kr); | |
836 | } if (val == 0 && oldval == 1) { | |
837 | printf("zleak_active: active, cannot be disabled.\n"); | |
838 | return (EINVAL); | |
839 | } | |
840 | return (0); | |
841 | } | |
842 | ||
843 | SYSCTL_PROC(_kern_zleak, OID_AUTO, active, | |
844 | CTLTYPE_INT | CTLFLAG_RW | CTLFLAG_LOCKED, | |
845 | 0, 0, sysctl_zleak_active, "I", "zleak activity"); | |
846 | ||
847 | /* | |
848 | * kern.zleak.max_zonemap_size | |
849 | * | |
850 | * Read the value of the maximum zonemap size in bytes; useful | |
851 | * as the maximum size that zleak.global_threshold and | |
852 | * zleak.zone_threshold should be set to. | |
853 | */ | |
854 | static int | |
855 | sysctl_zleak_max_zonemap_size SYSCTL_HANDLER_ARGS | |
856 | { | |
857 | uint64_t zmap_max_size = *(vm_size_t *)arg1; | |
858 | ||
859 | return sysctl_handle_quad(oidp, &zmap_max_size, arg2, req); | |
860 | } | |
861 | ||
862 | SYSCTL_PROC(_kern_zleak, OID_AUTO, max_zonemap_size, | |
863 | CTLTYPE_QUAD | CTLFLAG_RD | CTLFLAG_LOCKED, | |
864 | &zleak_max_zonemap_size, 0, | |
865 | sysctl_zleak_max_zonemap_size, "Q", "zleak max zonemap size"); | |
866 | ||
867 | ||
868 | static int | |
869 | sysctl_zleak_threshold SYSCTL_HANDLER_ARGS | |
870 | { | |
871 | #pragma unused(oidp, arg2) | |
872 | int error; | |
873 | uint64_t value = *(vm_size_t *)arg1; | |
874 | ||
875 | error = sysctl_io_number(req, value, sizeof (value), &value, NULL); | |
876 | ||
877 | if (error || !req->newptr) | |
878 | return (error); | |
879 | ||
880 | if (value > (uint64_t)zleak_max_zonemap_size) | |
881 | return (ERANGE); | |
882 | ||
883 | *(vm_size_t *)arg1 = value; | |
884 | return (0); | |
885 | } | |
886 | ||
887 | /* | |
888 | * kern.zleak.global_threshold | |
889 | * | |
890 | * Set the global zleak threshold size (in bytes). If the zone map | |
891 | * grows larger than this value, zleaks are automatically activated. | |
892 | * | |
893 | * The default value is set in zleak_init(). | |
894 | */ | |
895 | SYSCTL_PROC(_kern_zleak, OID_AUTO, global_threshold, | |
896 | CTLTYPE_QUAD | CTLFLAG_RW | CTLFLAG_LOCKED, | |
897 | &zleak_global_tracking_threshold, 0, | |
898 | sysctl_zleak_threshold, "Q", "zleak global threshold"); | |
899 | ||
900 | /* | |
901 | * kern.zleak.zone_threshold | |
902 | * | |
903 | * Set the per-zone threshold size (in bytes) above which any | |
904 | * zone will automatically start zleak tracking. | |
905 | * | |
906 | * The default value is set in zleak_init(). | |
907 | * | |
908 | * Setting this variable will have no effect until zleak tracking is | |
909 | * activated (See above.) | |
910 | */ | |
911 | SYSCTL_PROC(_kern_zleak, OID_AUTO, zone_threshold, | |
912 | CTLTYPE_QUAD | CTLFLAG_RW | CTLFLAG_LOCKED, | |
913 | &zleak_per_zone_tracking_threshold, 0, | |
914 | sysctl_zleak_threshold, "Q", "zleak per-zone threshold"); | |
915 | ||
916 | #endif /* CONFIG_ZLEAKS */ | |
5ba3f43e A |
917 | |
918 | extern uint64_t get_zones_collectable_bytes(void); | |
919 | ||
920 | static int | |
921 | sysctl_zones_collectable_bytes SYSCTL_HANDLER_ARGS | |
922 | { | |
923 | #pragma unused(oidp, arg1, arg2) | |
924 | uint64_t zones_free_mem = get_zones_collectable_bytes(); | |
925 | ||
926 | return SYSCTL_OUT(req, &zones_free_mem, sizeof(zones_free_mem)); | |
927 | } | |
928 | ||
929 | SYSCTL_PROC(_kern, OID_AUTO, zones_collectable_bytes, | |
930 | CTLTYPE_QUAD | CTLFLAG_RD | CTLFLAG_MASKED | CTLFLAG_LOCKED, | |
931 | 0, 0, &sysctl_zones_collectable_bytes, "Q", "Collectable memory in zones"); |