2 * Copyright (c) 2000-2019 Apple Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
29 #include <sys/errno.h>
31 #include <mach/mach_types.h>
32 #include <mach/mach_traps.h>
33 #include <mach/host_priv.h>
34 #include <mach/kern_return.h>
35 #include <mach/memory_object_control.h>
36 #include <mach/memory_object_types.h>
37 #include <mach/port.h>
38 #include <mach/policy.h>
40 #include <mach/thread_act.h>
42 #include <kern/assert.h>
43 #include <kern/host.h>
44 #include <kern/ledger.h>
45 #include <kern/thread.h>
46 #include <kern/ipc_kobject.h>
47 #include <os/refcnt.h>
49 #include <ipc/ipc_port.h>
50 #include <ipc/ipc_space.h>
52 #include <vm/vm_map.h>
53 #include <vm/vm_pageout.h>
54 #include <vm/memory_object.h>
55 #include <vm/vm_pageout.h>
56 #include <vm/vm_protos.h>
57 #include <vm/vm_purgeable_internal.h>
60 /* BSD VM COMPONENT INTERFACES */
80 return map
->hdr
.nentries
;
84 mach_get_vm_start(vm_map_t map
)
86 return vm_map_first_entry(map
)->vme_start
;
90 mach_get_vm_end(vm_map_t map
)
92 return vm_map_last_entry(map
)->vme_end
;
99 const struct memory_object_pager_ops vnode_pager_ops
= {
100 .memory_object_reference
= vnode_pager_reference
,
101 .memory_object_deallocate
= vnode_pager_deallocate
,
102 .memory_object_init
= vnode_pager_init
,
103 .memory_object_terminate
= vnode_pager_terminate
,
104 .memory_object_data_request
= vnode_pager_data_request
,
105 .memory_object_data_return
= vnode_pager_data_return
,
106 .memory_object_data_initialize
= vnode_pager_data_initialize
,
107 .memory_object_data_unlock
= vnode_pager_data_unlock
,
108 .memory_object_synchronize
= vnode_pager_synchronize
,
109 .memory_object_map
= vnode_pager_map
,
110 .memory_object_last_unmap
= vnode_pager_last_unmap
,
111 .memory_object_data_reclaim
= NULL
,
112 .memory_object_pager_name
= "vnode pager"
115 typedef struct vnode_pager
{
116 /* mandatory generic header */
117 struct memory_object vn_pgr_hdr
;
120 struct os_refcnt ref_count
;
121 struct vnode
*vnode_handle
; /* vnode handle */
126 vnode_pager_cluster_read( /* forward */
134 vnode_pager_cluster_write( /* forward */
138 vm_object_offset_t
*,
144 vnode_object_create( /* forward */
148 vnode_pager_lookup( /* forward */
152 vnode_pager_lookup_vnode( /* forward */
155 zone_t vnode_pager_zone
;
158 #define VNODE_PAGER_NULL ((vnode_pager_t) 0)
160 /* TODO: Should be set dynamically by vnode_pager_init() */
161 #define CLUSTER_SHIFT 1
163 /* TODO: Should be set dynamically by vnode_pager_bootstrap() */
164 #define MAX_VNODE 10000
170 #define PAGER_ALL 0xffffffff
171 #define PAGER_INIT 0x00000001
172 #define PAGER_PAGEIN 0x00000002
174 #define PAGER_DEBUG(LEVEL, A) {if ((pagerdebug & LEVEL)==LEVEL){printf A;}}
176 #define PAGER_DEBUG(LEVEL, A)
179 extern int proc_resetpcontrol(int);
182 extern int uiomove64(addr64_t
, int, void *);
186 memory_object_control_uiomove(
187 memory_object_control_t control
,
188 memory_object_offset_t offset
,
203 vm_page_t page_run
[MAX_RUN
];
204 int dirty_count
; /* keeps track of number of pages dirtied as part of this uiomove */
206 object
= memory_object_control_to_vm_object(control
);
207 if (object
== VM_OBJECT_NULL
) {
210 assert(!object
->internal
);
212 vm_object_lock(object
);
214 if (mark_dirty
&& object
->copy
!= VM_OBJECT_NULL
) {
216 * We can't modify the pages without honoring
217 * copy-on-write obligations first, so fall off
218 * this optimized path and fall back to the regular
221 vm_object_unlock(object
);
224 orig_offset
= start_offset
;
227 while (io_requested
&& retval
== 0) {
228 cur_needed
= (start_offset
+ io_requested
+ (PAGE_SIZE
- 1)) / PAGE_SIZE
;
230 if (cur_needed
> MAX_RUN
) {
231 cur_needed
= MAX_RUN
;
234 for (cur_run
= 0; cur_run
< cur_needed
;) {
235 if ((dst_page
= vm_page_lookup(object
, offset
)) == VM_PAGE_NULL
) {
240 if (dst_page
->vmp_busy
|| dst_page
->vmp_cleaning
) {
242 * someone else is playing with the page... if we've
243 * already collected pages into this run, go ahead
244 * and process now, we can't block on this
245 * page while holding other pages in the BUSY state
246 * otherwise we will wait
251 PAGE_SLEEP(object
, dst_page
, THREAD_UNINT
);
254 if (dst_page
->vmp_laundry
) {
255 vm_pageout_steal_laundry(dst_page
, FALSE
);
259 if (dst_page
->vmp_dirty
== FALSE
) {
262 SET_PAGE_DIRTY(dst_page
, FALSE
);
263 if (dst_page
->vmp_cs_validated
&&
264 !dst_page
->vmp_cs_tainted
) {
267 * We're modifying a code-signed
268 * page: force revalidate
270 dst_page
->vmp_cs_validated
= FALSE
;
272 VM_PAGEOUT_DEBUG(vm_cs_validated_resets
, 1);
274 pmap_disconnect(VM_PAGE_GET_PHYS_PAGE(dst_page
));
277 dst_page
->vmp_busy
= TRUE
;
279 page_run
[cur_run
++] = dst_page
;
281 offset
+= PAGE_SIZE_64
;
285 * we hit a 'hole' in the cache or
286 * a page we don't want to try to handle,
287 * so bail at this point
288 * we'll unlock the object below
292 vm_object_unlock(object
);
294 for (i
= 0; i
< cur_run
; i
++) {
295 dst_page
= page_run
[i
];
297 if ((xsize
= PAGE_SIZE
- start_offset
) > io_requested
) {
298 xsize
= io_requested
;
301 if ((retval
= uiomove64((addr64_t
)(((addr64_t
)(VM_PAGE_GET_PHYS_PAGE(dst_page
)) << PAGE_SHIFT
) + start_offset
), xsize
, uio
))) {
305 io_requested
-= xsize
;
308 vm_object_lock(object
);
311 * if we have more than 1 page to work on
312 * in the current run, or the original request
313 * started at offset 0 of the page, or we're
314 * processing multiple batches, we will move
315 * the pages to the tail of the inactive queue
316 * to implement an LRU for read/write accesses
318 * the check for orig_offset == 0 is there to
319 * mitigate the cost of small (< page_size) requests
320 * to the same page (this way we only move it once)
322 if (take_reference
&& (cur_run
> 1 || orig_offset
== 0)) {
323 vm_page_lockspin_queues();
325 for (i
= 0; i
< cur_run
; i
++) {
326 vm_page_lru(page_run
[i
]);
329 vm_page_unlock_queues();
331 for (i
= 0; i
< cur_run
; i
++) {
332 dst_page
= page_run
[i
];
335 * someone is explicitly referencing this page...
336 * update clustered and speculative state
339 if (dst_page
->vmp_clustered
) {
340 VM_PAGE_CONSUME_CLUSTERED(dst_page
);
343 PAGE_WAKEUP_DONE(dst_page
);
348 task_update_logical_writes(current_task(), (dirty_count
* PAGE_SIZE
), TASK_WRITE_DEFERRED
, vnode_pager_lookup_vnode(object
->pager
));
350 vm_object_unlock(object
);
359 vnode_pager_bootstrap(void)
363 size
= (vm_size_t
) sizeof(struct vnode_pager
);
364 vnode_pager_zone
= zinit(size
, (vm_size_t
) MAX_VNODE
* size
,
365 PAGE_SIZE
, "vnode pager structures");
366 zone_change(vnode_pager_zone
, Z_CALLERACCT
, FALSE
);
367 zone_change(vnode_pager_zone
, Z_NOENCRYPT
, TRUE
);
370 #if CONFIG_CODE_DECRYPTION
371 apple_protect_pager_bootstrap();
372 #endif /* CONFIG_CODE_DECRYPTION */
373 swapfile_pager_bootstrap();
375 fourk_pager_bootstrap();
376 #endif /* __arm64__ */
377 shared_region_pager_bootstrap();
388 __unused memory_object_t pager
)
390 vnode_pager_t vnode_object
;
392 vnode_object
= vnode_object_create(vp
);
393 if (vnode_object
== VNODE_PAGER_NULL
) {
394 panic("vnode_pager_setup: vnode_object_create() failed");
396 return (memory_object_t
)vnode_object
;
403 vnode_pager_init(memory_object_t mem_obj
,
404 memory_object_control_t control
,
408 memory_object_cluster_size_t pg_size
)
410 vnode_pager_t vnode_object
;
412 memory_object_attr_info_data_t attributes
;
415 PAGER_DEBUG(PAGER_ALL
, ("vnode_pager_init: %p, %p, %lx\n", mem_obj
, control
, (unsigned long)pg_size
));
417 if (control
== MEMORY_OBJECT_CONTROL_NULL
) {
418 return KERN_INVALID_ARGUMENT
;
421 vnode_object
= vnode_pager_lookup(mem_obj
);
423 memory_object_control_reference(control
);
425 vnode_object
->vn_pgr_hdr
.mo_control
= control
;
427 attributes
.copy_strategy
= MEMORY_OBJECT_COPY_DELAY
;
428 /* attributes.cluster_size = (1 << (CLUSTER_SHIFT + PAGE_SHIFT));*/
429 attributes
.cluster_size
= (1 << (PAGE_SHIFT
));
430 attributes
.may_cache_object
= TRUE
;
431 attributes
.temporary
= TRUE
;
433 kr
= memory_object_change_attributes(
435 MEMORY_OBJECT_ATTRIBUTE_INFO
,
436 (memory_object_info_t
) &attributes
,
437 MEMORY_OBJECT_ATTR_INFO_COUNT
);
438 if (kr
!= KERN_SUCCESS
) {
439 panic("vnode_pager_init: memory_object_change_attributes() failed");
449 vnode_pager_data_return(
450 memory_object_t mem_obj
,
451 memory_object_offset_t offset
,
452 memory_object_cluster_size_t data_cnt
,
453 memory_object_offset_t
*resid_offset
,
455 __unused boolean_t dirty
,
456 __unused boolean_t kernel_copy
,
459 vnode_pager_t vnode_object
;
461 vnode_object
= vnode_pager_lookup(mem_obj
);
463 vnode_pager_cluster_write(vnode_object
, offset
, data_cnt
, resid_offset
, io_error
, upl_flags
);
469 vnode_pager_data_initialize(
470 __unused memory_object_t mem_obj
,
471 __unused memory_object_offset_t offset
,
472 __unused memory_object_cluster_size_t data_cnt
)
474 panic("vnode_pager_data_initialize");
479 vnode_pager_data_unlock(
480 __unused memory_object_t mem_obj
,
481 __unused memory_object_offset_t offset
,
482 __unused memory_object_size_t size
,
483 __unused vm_prot_t desired_access
)
490 memory_object_t mem_obj
,
491 vm_object_offset_t s_offset
,
492 vm_object_offset_t e_offset
)
494 vnode_pager_t vnode_object
;
496 if (mem_obj
&& mem_obj
->mo_pager_ops
== &vnode_pager_ops
) {
497 vnode_object
= vnode_pager_lookup(mem_obj
);
498 vnode_pager_was_dirtied(vnode_object
->vnode_handle
, s_offset
, e_offset
);
503 vnode_pager_get_isinuse(
504 memory_object_t mem_obj
,
507 vnode_pager_t vnode_object
;
509 if (mem_obj
->mo_pager_ops
!= &vnode_pager_ops
) {
511 return KERN_INVALID_ARGUMENT
;
514 vnode_object
= vnode_pager_lookup(mem_obj
);
516 *isinuse
= vnode_pager_isinuse(vnode_object
->vnode_handle
);
521 vnode_pager_get_throttle_io_limit(
522 memory_object_t mem_obj
,
525 vnode_pager_t vnode_object
;
527 if (mem_obj
->mo_pager_ops
!= &vnode_pager_ops
) {
528 return KERN_INVALID_ARGUMENT
;
531 vnode_object
= vnode_pager_lookup(mem_obj
);
533 (void)vnode_pager_return_throttle_io_limit(vnode_object
->vnode_handle
, limit
);
538 vnode_pager_get_isSSD(
539 memory_object_t mem_obj
,
542 vnode_pager_t vnode_object
;
544 if (mem_obj
->mo_pager_ops
!= &vnode_pager_ops
) {
545 return KERN_INVALID_ARGUMENT
;
548 vnode_object
= vnode_pager_lookup(mem_obj
);
550 *isSSD
= vnode_pager_isSSD(vnode_object
->vnode_handle
);
555 vnode_pager_get_object_size(
556 memory_object_t mem_obj
,
557 memory_object_offset_t
*length
)
559 vnode_pager_t vnode_object
;
561 if (mem_obj
->mo_pager_ops
!= &vnode_pager_ops
) {
563 return KERN_INVALID_ARGUMENT
;
566 vnode_object
= vnode_pager_lookup(mem_obj
);
568 *length
= vnode_pager_get_filesize(vnode_object
->vnode_handle
);
573 vnode_pager_get_object_name(
574 memory_object_t mem_obj
,
576 vm_size_t pathname_len
,
578 vm_size_t filename_len
,
579 boolean_t
*truncated_path_p
)
581 vnode_pager_t vnode_object
;
583 if (mem_obj
->mo_pager_ops
!= &vnode_pager_ops
) {
584 return KERN_INVALID_ARGUMENT
;
587 vnode_object
= vnode_pager_lookup(mem_obj
);
589 return vnode_pager_get_name(vnode_object
->vnode_handle
,
598 vnode_pager_get_object_mtime(
599 memory_object_t mem_obj
,
600 struct timespec
*mtime
,
601 struct timespec
*cs_mtime
)
603 vnode_pager_t vnode_object
;
605 if (mem_obj
->mo_pager_ops
!= &vnode_pager_ops
) {
606 return KERN_INVALID_ARGUMENT
;
609 vnode_object
= vnode_pager_lookup(mem_obj
);
611 return vnode_pager_get_mtime(vnode_object
->vnode_handle
,
616 #if CHECK_CS_VALIDATION_BITMAP
618 vnode_pager_cs_check_validation_bitmap(
619 memory_object_t mem_obj
,
620 memory_object_offset_t offset
,
623 vnode_pager_t vnode_object
;
625 if (mem_obj
== MEMORY_OBJECT_NULL
||
626 mem_obj
->mo_pager_ops
!= &vnode_pager_ops
) {
627 return KERN_INVALID_ARGUMENT
;
630 vnode_object
= vnode_pager_lookup(mem_obj
);
631 return ubc_cs_check_validation_bitmap( vnode_object
->vnode_handle
, offset
, optype
);
633 #endif /* CHECK_CS_VALIDATION_BITMAP */
639 vnode_pager_data_request(
640 memory_object_t mem_obj
,
641 memory_object_offset_t offset
,
642 __unused memory_object_cluster_size_t length
,
643 __unused vm_prot_t desired_access
,
644 memory_object_fault_info_t fault_info
)
646 vnode_pager_t vnode_object
;
647 memory_object_offset_t base_offset
;
649 uint32_t io_streaming
= 0;
651 vnode_object
= vnode_pager_lookup(mem_obj
);
653 size
= MAX_UPL_TRANSFER_BYTES
;
654 base_offset
= offset
;
656 if (memory_object_cluster_size(vnode_object
->vn_pgr_hdr
.mo_control
,
657 &base_offset
, &size
, &io_streaming
,
658 fault_info
) != KERN_SUCCESS
) {
662 assert(offset
>= base_offset
&&
663 offset
< base_offset
+ size
);
665 return vnode_pager_cluster_read(vnode_object
, base_offset
, offset
, io_streaming
, size
);
672 vnode_pager_reference(
673 memory_object_t mem_obj
)
675 vnode_pager_t vnode_object
;
677 vnode_object
= vnode_pager_lookup(mem_obj
);
678 os_ref_retain(&vnode_object
->ref_count
);
685 vnode_pager_deallocate(
686 memory_object_t mem_obj
)
688 vnode_pager_t vnode_object
;
690 PAGER_DEBUG(PAGER_ALL
, ("vnode_pager_deallocate: %p\n", mem_obj
));
692 vnode_object
= vnode_pager_lookup(mem_obj
);
694 if (os_ref_release(&vnode_object
->ref_count
) == 0) {
695 if (vnode_object
->vnode_handle
!= NULL
) {
696 vnode_pager_vrele(vnode_object
->vnode_handle
);
698 zfree(vnode_pager_zone
, vnode_object
);
706 vnode_pager_terminate(
710 memory_object_t mem_obj
)
712 PAGER_DEBUG(PAGER_ALL
, ("vnode_pager_terminate: %p\n", mem_obj
));
721 vnode_pager_synchronize(
722 __unused memory_object_t mem_obj
,
723 __unused memory_object_offset_t offset
,
724 __unused memory_object_size_t length
,
725 __unused vm_sync_t sync_flags
)
727 panic("vnode_pager_synchronize: memory_object_synchronize no longer supported\n");
736 memory_object_t mem_obj
,
739 vnode_pager_t vnode_object
;
743 PAGER_DEBUG(PAGER_ALL
, ("vnode_pager_map: %p %x\n", mem_obj
, prot
));
745 vnode_object
= vnode_pager_lookup(mem_obj
);
747 ret
= ubc_map(vnode_object
->vnode_handle
, prot
);
759 vnode_pager_last_unmap(
760 memory_object_t mem_obj
)
762 vnode_pager_t vnode_object
;
764 PAGER_DEBUG(PAGER_ALL
, ("vnode_pager_last_unmap: %p\n", mem_obj
));
766 vnode_object
= vnode_pager_lookup(mem_obj
);
768 ubc_unmap(vnode_object
->vnode_handle
);
778 vnode_pager_cluster_write(
779 vnode_pager_t vnode_object
,
780 vm_object_offset_t offset
,
782 vm_object_offset_t
* resid_offset
,
789 if (upl_flags
& UPL_MSYNC
) {
790 upl_flags
|= UPL_VNODE_PAGER
;
792 if ((upl_flags
& UPL_IOSYNC
) && io_error
) {
793 upl_flags
|= UPL_KEEPCACHED
;
797 size
= (cnt
< MAX_UPL_TRANSFER_BYTES
) ? cnt
: MAX_UPL_TRANSFER_BYTES
; /* effective max */
799 assert((upl_size_t
) size
== size
);
800 vnode_pageout(vnode_object
->vnode_handle
,
801 NULL
, (upl_offset_t
)0, offset
, (upl_size_t
)size
, upl_flags
, &errno
);
803 if ((upl_flags
& UPL_KEEPCACHED
)) {
804 if ((*io_error
= errno
)) {
812 *resid_offset
= offset
;
815 vm_object_offset_t vnode_size
;
816 vm_object_offset_t base_offset
;
819 * this is the pageout path
821 vnode_size
= vnode_pager_get_filesize(vnode_object
->vnode_handle
);
823 if (vnode_size
> (offset
+ PAGE_SIZE
)) {
825 * preset the maximum size of the cluster
826 * and put us on a nice cluster boundary...
827 * and then clip the size to insure we
828 * don't request past the end of the underlying file
830 size
= MAX_UPL_TRANSFER_BYTES
;
831 base_offset
= offset
& ~((signed)(size
- 1));
833 if ((base_offset
+ size
) > vnode_size
) {
834 size
= round_page(((vm_size_t
)(vnode_size
- base_offset
)));
838 * we've been requested to page out a page beyond the current
839 * end of the 'file'... don't try to cluster in this case...
840 * we still need to send this page through because it might
841 * be marked precious and the underlying filesystem may need
842 * to do something with it (besides page it out)...
844 base_offset
= offset
;
847 assert((upl_size_t
) size
== size
);
848 vnode_pageout(vnode_object
->vnode_handle
,
849 NULL
, (upl_offset_t
)(offset
- base_offset
), base_offset
, (upl_size_t
) size
,
850 (upl_flags
& UPL_IOSYNC
) | UPL_VNODE_PAGER
, NULL
);
859 vnode_pager_cluster_read(
860 vnode_pager_t vnode_object
,
861 vm_object_offset_t base_offset
,
862 vm_object_offset_t offset
,
863 uint32_t io_streaming
,
870 assert(!(cnt
& PAGE_MASK
));
873 flags
|= UPL_IOSTREAMING
;
876 assert((upl_size_t
) cnt
== cnt
);
877 kret
= vnode_pagein(vnode_object
->vnode_handle
,
879 (upl_offset_t
) (offset
- base_offset
),
885 * if(kret == PAGER_ABSENT) {
886 * Need to work out the defs here, 1 corresponds to PAGER_ABSENT
887 * defined in bsd/vm/vm_pager.h However, we should not be including
888 * that file here it is a layering violation.
893 unsigned int count
= 0;
896 uplflags
= (UPL_NO_SYNC
|
900 assert((upl_size_t
) cnt
== cnt
);
901 kr
= memory_object_upl_request(vnode_object
->vn_pgr_hdr
.mo_control
,
902 base_offset
, (upl_size_t
) cnt
,
903 &upl
, NULL
, &count
, uplflags
, VM_KERN_MEMORY_NONE
);
904 if (kr
== KERN_SUCCESS
) {
909 * We couldn't gather the page list, probably
910 * because the memory object doesn't have a link
911 * to a VM object anymore (forced unmount, for
912 * example). Just return an error to the vm_fault()
913 * path and let it handle it.
930 vnode_pager_t vnode_object
;
932 vnode_object
= (struct vnode_pager
*) zalloc(vnode_pager_zone
);
933 if (vnode_object
== VNODE_PAGER_NULL
) {
934 return VNODE_PAGER_NULL
;
938 * The vm_map call takes both named entry ports and raw memory
939 * objects in the same parameter. We need to make sure that
940 * vm_map does not see this object as a named entry port. So,
941 * we reserve the first word in the object for a fake ip_kotype
942 * setting - that will tell vm_map to use it as a memory object.
944 vnode_object
->vn_pgr_hdr
.mo_ikot
= IKOT_MEMORY_OBJECT
;
945 vnode_object
->vn_pgr_hdr
.mo_pager_ops
= &vnode_pager_ops
;
946 vnode_object
->vn_pgr_hdr
.mo_control
= MEMORY_OBJECT_CONTROL_NULL
;
948 os_ref_init(&vnode_object
->ref_count
, NULL
);
949 vnode_object
->vnode_handle
= vp
;
959 memory_object_t name
)
961 vnode_pager_t vnode_object
;
963 vnode_object
= (vnode_pager_t
)name
;
964 assert(vnode_object
->vn_pgr_hdr
.mo_pager_ops
== &vnode_pager_ops
);
970 vnode_pager_lookup_vnode(
971 memory_object_t name
)
973 vnode_pager_t vnode_object
;
974 vnode_object
= (vnode_pager_t
)name
;
975 if (vnode_object
->vn_pgr_hdr
.mo_pager_ops
== &vnode_pager_ops
) {
976 return vnode_object
->vnode_handle
;
982 /*********************** proc_info implementation *************/
984 #include <sys/bsdtask_info.h>
986 static int fill_vnodeinfoforaddr( vm_map_entry_t entry
, uintptr_t * vnodeaddr
, uint32_t * vid
);
989 fill_procregioninfo(task_t task
, uint64_t arg
, struct proc_regioninfo_internal
*pinfo
, uintptr_t *vnodeaddr
, uint32_t *vid
)
992 vm_map_offset_t address
= (vm_map_offset_t
)arg
;
993 vm_map_entry_t tmp_entry
;
994 vm_map_entry_t entry
;
995 vm_map_offset_t start
;
996 vm_region_extended_info_data_t extended
;
997 vm_region_top_info_data_t top
;
998 boolean_t do_region_footprint
;
1002 if (map
== VM_MAP_NULL
) {
1006 vm_map_reference(map
);
1009 do_region_footprint
= task_self_region_footprint();
1011 vm_map_lock_read(map
);
1015 if (!vm_map_lookup_entry(map
, start
, &tmp_entry
)) {
1016 if ((entry
= tmp_entry
->vme_next
) == vm_map_to_entry(map
)) {
1017 if (do_region_footprint
&&
1018 address
== tmp_entry
->vme_end
) {
1019 ledger_amount_t ledger_resident
;
1020 ledger_amount_t ledger_compressed
;
1023 * This request is right after the last valid
1024 * memory region; instead of reporting the
1025 * end of the address space, report a fake
1026 * memory region to account for non-volatile
1027 * purgeable and/or ledger-tagged memory
1028 * owned by this task.
1030 task_ledgers_footprint(task
->ledger
,
1032 &ledger_compressed
);
1033 if (ledger_resident
+ ledger_compressed
== 0) {
1034 /* nothing to report */
1035 vm_map_unlock_read(map
);
1036 vm_map_deallocate(map
);
1040 /* provide fake region for purgeable */
1041 pinfo
->pri_offset
= address
;
1042 pinfo
->pri_protection
= VM_PROT_DEFAULT
;
1043 pinfo
->pri_max_protection
= VM_PROT_DEFAULT
;
1044 pinfo
->pri_inheritance
= VM_INHERIT_NONE
;
1045 pinfo
->pri_behavior
= VM_BEHAVIOR_DEFAULT
;
1046 pinfo
->pri_user_wired_count
= 0;
1047 pinfo
->pri_user_tag
= -1;
1048 pinfo
->pri_pages_resident
=
1049 (uint32_t) (ledger_resident
/ PAGE_SIZE
);
1050 pinfo
->pri_pages_shared_now_private
= 0;
1051 pinfo
->pri_pages_swapped_out
=
1052 (uint32_t) (ledger_compressed
/ PAGE_SIZE
);
1053 pinfo
->pri_pages_dirtied
=
1054 (uint32_t) (ledger_resident
/ PAGE_SIZE
);
1055 pinfo
->pri_ref_count
= 1;
1056 pinfo
->pri_shadow_depth
= 0;
1057 pinfo
->pri_share_mode
= SM_PRIVATE
;
1058 pinfo
->pri_private_pages_resident
=
1059 (uint32_t) (ledger_resident
/ PAGE_SIZE
);
1060 pinfo
->pri_shared_pages_resident
= 0;
1061 pinfo
->pri_obj_id
= INFO_MAKE_FAKE_OBJECT_ID(map
, task_ledgers
.purgeable_nonvolatile
);
1062 pinfo
->pri_address
= address
;
1064 (uint64_t) (ledger_resident
+ ledger_compressed
);
1065 pinfo
->pri_depth
= 0;
1067 vm_map_unlock_read(map
);
1068 vm_map_deallocate(map
);
1071 vm_map_unlock_read(map
);
1072 vm_map_deallocate(map
);
1079 start
= entry
->vme_start
;
1081 pinfo
->pri_offset
= VME_OFFSET(entry
);
1082 pinfo
->pri_protection
= entry
->protection
;
1083 pinfo
->pri_max_protection
= entry
->max_protection
;
1084 pinfo
->pri_inheritance
= entry
->inheritance
;
1085 pinfo
->pri_behavior
= entry
->behavior
;
1086 pinfo
->pri_user_wired_count
= entry
->user_wired_count
;
1087 pinfo
->pri_user_tag
= VME_ALIAS(entry
);
1089 if (entry
->is_sub_map
) {
1090 pinfo
->pri_flags
|= PROC_REGION_SUBMAP
;
1092 if (entry
->is_shared
) {
1093 pinfo
->pri_flags
|= PROC_REGION_SHARED
;
1098 extended
.protection
= entry
->protection
;
1099 extended
.user_tag
= VME_ALIAS(entry
);
1100 extended
.pages_resident
= 0;
1101 extended
.pages_swapped_out
= 0;
1102 extended
.pages_shared_now_private
= 0;
1103 extended
.pages_dirtied
= 0;
1104 extended
.external_pager
= 0;
1105 extended
.shadow_depth
= 0;
1107 vm_map_region_walk(map
, start
, entry
, VME_OFFSET(entry
), entry
->vme_end
- start
, &extended
, TRUE
, VM_REGION_EXTENDED_INFO_COUNT
);
1109 if (extended
.external_pager
&& extended
.ref_count
== 2 && extended
.share_mode
== SM_SHARED
) {
1110 extended
.share_mode
= SM_PRIVATE
;
1113 top
.private_pages_resident
= 0;
1114 top
.shared_pages_resident
= 0;
1115 vm_map_region_top_walk(entry
, &top
);
1118 pinfo
->pri_pages_resident
= extended
.pages_resident
;
1119 pinfo
->pri_pages_shared_now_private
= extended
.pages_shared_now_private
;
1120 pinfo
->pri_pages_swapped_out
= extended
.pages_swapped_out
;
1121 pinfo
->pri_pages_dirtied
= extended
.pages_dirtied
;
1122 pinfo
->pri_ref_count
= extended
.ref_count
;
1123 pinfo
->pri_shadow_depth
= extended
.shadow_depth
;
1124 pinfo
->pri_share_mode
= extended
.share_mode
;
1126 pinfo
->pri_private_pages_resident
= top
.private_pages_resident
;
1127 pinfo
->pri_shared_pages_resident
= top
.shared_pages_resident
;
1128 pinfo
->pri_obj_id
= top
.obj_id
;
1130 pinfo
->pri_address
= (uint64_t)start
;
1131 pinfo
->pri_size
= (uint64_t)(entry
->vme_end
- start
);
1132 pinfo
->pri_depth
= 0;
1134 if ((vnodeaddr
!= 0) && (entry
->is_sub_map
== 0)) {
1135 *vnodeaddr
= (uintptr_t)0;
1137 if (fill_vnodeinfoforaddr(entry
, vnodeaddr
, vid
) == 0) {
1138 vm_map_unlock_read(map
);
1139 vm_map_deallocate(map
);
1144 vm_map_unlock_read(map
);
1145 vm_map_deallocate(map
);
1150 fill_procregioninfo_onlymappedvnodes(task_t task
, uint64_t arg
, struct proc_regioninfo_internal
*pinfo
, uintptr_t *vnodeaddr
, uint32_t *vid
)
1153 vm_map_offset_t address
= (vm_map_offset_t
)arg
;
1154 vm_map_entry_t tmp_entry
;
1155 vm_map_entry_t entry
;
1159 if (map
== VM_MAP_NULL
) {
1163 vm_map_reference(map
);
1166 vm_map_lock_read(map
);
1168 if (!vm_map_lookup_entry(map
, address
, &tmp_entry
)) {
1169 if ((entry
= tmp_entry
->vme_next
) == vm_map_to_entry(map
)) {
1170 vm_map_unlock_read(map
);
1171 vm_map_deallocate(map
);
1178 while (entry
!= vm_map_to_entry(map
)) {
1182 if (entry
->is_sub_map
== 0) {
1183 if (fill_vnodeinfoforaddr(entry
, vnodeaddr
, vid
)) {
1184 pinfo
->pri_offset
= VME_OFFSET(entry
);
1185 pinfo
->pri_protection
= entry
->protection
;
1186 pinfo
->pri_max_protection
= entry
->max_protection
;
1187 pinfo
->pri_inheritance
= entry
->inheritance
;
1188 pinfo
->pri_behavior
= entry
->behavior
;
1189 pinfo
->pri_user_wired_count
= entry
->user_wired_count
;
1190 pinfo
->pri_user_tag
= VME_ALIAS(entry
);
1192 if (entry
->is_shared
) {
1193 pinfo
->pri_flags
|= PROC_REGION_SHARED
;
1196 pinfo
->pri_pages_resident
= 0;
1197 pinfo
->pri_pages_shared_now_private
= 0;
1198 pinfo
->pri_pages_swapped_out
= 0;
1199 pinfo
->pri_pages_dirtied
= 0;
1200 pinfo
->pri_ref_count
= 0;
1201 pinfo
->pri_shadow_depth
= 0;
1202 pinfo
->pri_share_mode
= 0;
1204 pinfo
->pri_private_pages_resident
= 0;
1205 pinfo
->pri_shared_pages_resident
= 0;
1206 pinfo
->pri_obj_id
= 0;
1208 pinfo
->pri_address
= (uint64_t)entry
->vme_start
;
1209 pinfo
->pri_size
= (uint64_t)(entry
->vme_end
- entry
->vme_start
);
1210 pinfo
->pri_depth
= 0;
1212 vm_map_unlock_read(map
);
1213 vm_map_deallocate(map
);
1218 /* Keep searching for a vnode-backed mapping */
1219 entry
= entry
->vme_next
;
1222 vm_map_unlock_read(map
);
1223 vm_map_deallocate(map
);
1228 find_region_details(task_t task
, vm_map_offset_t offset
,
1229 uintptr_t *vnodeaddr
, uint32_t *vid
,
1230 uint64_t *start
, uint64_t *len
)
1233 vm_map_entry_t tmp_entry
, entry
;
1238 if (map
== VM_MAP_NULL
) {
1242 vm_map_reference(map
);
1245 vm_map_lock_read(map
);
1246 if (!vm_map_lookup_entry(map
, offset
, &tmp_entry
)) {
1247 if ((entry
= tmp_entry
->vme_next
) == vm_map_to_entry(map
)) {
1255 while (entry
!= vm_map_to_entry(map
)) {
1261 if (entry
->is_sub_map
== 0) {
1262 if (fill_vnodeinfoforaddr(entry
, vnodeaddr
, vid
)) {
1263 *start
= entry
->vme_start
;
1264 *len
= entry
->vme_end
- entry
->vme_start
;
1270 entry
= entry
->vme_next
;
1274 vm_map_unlock_read(map
);
1275 vm_map_deallocate(map
);
1280 fill_vnodeinfoforaddr(
1281 vm_map_entry_t entry
,
1282 uintptr_t * vnodeaddr
,
1285 vm_object_t top_object
, object
;
1286 memory_object_t memory_object
;
1287 memory_object_pager_ops_t pager_ops
;
1292 if (entry
->is_sub_map
) {
1296 * The last object in the shadow chain has the
1297 * relevant pager information.
1299 top_object
= VME_OBJECT(entry
);
1300 if (top_object
== VM_OBJECT_NULL
) {
1301 object
= VM_OBJECT_NULL
;
1304 vm_object_lock(top_object
);
1305 for (object
= top_object
, shadow_depth
= 0;
1306 object
->shadow
!= VM_OBJECT_NULL
;
1307 object
= object
->shadow
, shadow_depth
++) {
1308 vm_object_lock(object
->shadow
);
1309 vm_object_unlock(object
);
1314 if (object
== VM_OBJECT_NULL
) {
1316 } else if (object
->internal
) {
1317 vm_object_unlock(object
);
1319 } else if (!object
->pager_ready
||
1320 object
->terminating
||
1322 vm_object_unlock(object
);
1325 memory_object
= object
->pager
;
1326 pager_ops
= memory_object
->mo_pager_ops
;
1327 if (pager_ops
== &vnode_pager_ops
) {
1328 kr
= vnode_pager_get_object_vnode(
1331 if (kr
!= KERN_SUCCESS
) {
1332 vm_object_unlock(object
);
1336 vm_object_unlock(object
);
1340 vm_object_unlock(object
);
1345 vnode_pager_get_object_vnode(
1346 memory_object_t mem_obj
,
1347 uintptr_t * vnodeaddr
,
1350 vnode_pager_t vnode_object
;
1352 vnode_object
= vnode_pager_lookup(mem_obj
);
1353 if (vnode_object
->vnode_handle
) {
1354 *vnodeaddr
= (uintptr_t)vnode_object
->vnode_handle
;
1355 *vid
= (uint32_t)vnode_vid((void *)vnode_object
->vnode_handle
);
1357 return KERN_SUCCESS
;
1360 return KERN_FAILURE
;
1365 vnode_pager_get_object_devvp(
1366 memory_object_t mem_obj
,
1372 if (vnode_pager_get_object_vnode(mem_obj
, (uintptr_t *)&vp
, (uint32_t *)&vid
) != KERN_SUCCESS
) {
1373 return KERN_FAILURE
;
1375 *devvp
= (uintptr_t)vnode_mountdevvp(vp
);
1377 return KERN_SUCCESS
;
1379 return KERN_FAILURE
;
1384 * Find the underlying vnode object for the given vm_map_entry. If found, return with the
1385 * object locked, otherwise return NULL with nothing locked.
1390 vm_map_entry_t entry
1393 vm_object_t top_object
, object
;
1394 memory_object_t memory_object
;
1395 memory_object_pager_ops_t pager_ops
;
1397 if (!entry
->is_sub_map
) {
1399 * The last object in the shadow chain has the
1400 * relevant pager information.
1403 top_object
= VME_OBJECT(entry
);
1406 vm_object_lock(top_object
);
1408 for (object
= top_object
; object
->shadow
!= VM_OBJECT_NULL
; object
= object
->shadow
) {
1409 vm_object_lock(object
->shadow
);
1410 vm_object_unlock(object
);
1413 if (object
&& !object
->internal
&& object
->pager_ready
&& !object
->terminating
&&
1415 memory_object
= object
->pager
;
1416 pager_ops
= memory_object
->mo_pager_ops
;
1419 * If this object points to the vnode_pager_ops, then we found what we're
1420 * looking for. Otherwise, this vm_map_entry doesn't have an underlying
1421 * vnode and so we fall through to the bottom and return NULL.
1424 if (pager_ops
== &vnode_pager_ops
) {
1425 return object
; /* we return with the object locked */
1429 vm_object_unlock(object
);
1433 return VM_OBJECT_NULL
;