2005-01-07 02:29:27 +00:00
|
|
|
/*-
|
2017-11-20 19:43:44 +00:00
|
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
*
|
1994-05-24 10:09:53 +00:00
|
|
|
* Copyright (c) 1988 University of Utah.
|
|
|
|
* Copyright (c) 1991, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* This code is derived from software contributed to Berkeley by
|
|
|
|
* the Systems Programming Group of the University of Utah Computer
|
|
|
|
* Science Department.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
2017-02-28 23:42:47 +00:00
|
|
|
* 3. Neither the name of the University nor the names of its contributors
|
1994-05-24 10:09:53 +00:00
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* from: Utah $Hdr: vm_unix.c 1.1 89/11/07$
|
|
|
|
*
|
|
|
|
* @(#)vm_unix.c 8.1 (Berkeley) 6/11/93
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Traditional sbrk/grow interface to VM
|
|
|
|
*/
|
2001-05-24 18:04:29 +00:00
|
|
|
|
2003-06-11 23:50:51 +00:00
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/param.h>
|
2001-05-01 08:13:21 +00:00
|
|
|
#include <sys/lock.h>
|
2001-05-22 07:21:46 +00:00
|
|
|
#include <sys/mutex.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/proc.h>
|
2011-04-05 20:23:59 +00:00
|
|
|
#include <sys/racct.h>
|
1994-05-24 10:09:53 +00:00
|
|
|
#include <sys/resourcevar.h>
|
2018-06-27 14:45:13 +00:00
|
|
|
#include <sys/syscallsubr.h>
|
2011-10-13 16:20:10 +00:00
|
|
|
#include <sys/sysent.h>
|
2001-05-22 07:21:46 +00:00
|
|
|
#include <sys/sysproto.h>
|
2001-05-19 01:28:09 +00:00
|
|
|
#include <sys/systm.h>
|
2019-02-09 03:51:51 +00:00
|
|
|
#if defined(__amd64__) || defined(__i386__) /* for i386_read_exec */
|
|
|
|
#include <machine/md_var.h>
|
|
|
|
#endif
|
1994-05-24 10:09:53 +00:00
|
|
|
|
|
|
|
#include <vm/vm.h>
|
1995-12-07 12:48:31 +00:00
|
|
|
#include <vm/vm_param.h>
|
|
|
|
#include <vm/pmap.h>
|
|
|
|
#include <vm/vm_map.h>
|
1994-05-25 09:21:21 +00:00
|
|
|
|
1995-11-12 06:43:28 +00:00
|
|
|
#ifndef _SYS_SYSPROTO_H_
|
2018-06-14 21:27:25 +00:00
|
|
|
struct break_args {
|
1995-11-11 06:40:35 +00:00
|
|
|
char *nsize;
|
1994-05-24 10:09:53 +00:00
|
|
|
};
|
1995-11-12 06:43:28 +00:00
|
|
|
#endif
|
1994-05-24 10:09:53 +00:00
|
|
|
int
|
2018-06-14 21:27:25 +00:00
|
|
|
sys_break(struct thread *td, struct break_args *uap)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2018-07-23 19:49:54 +00:00
|
|
|
#if !defined(__aarch64__) && !defined(__riscv)
|
2018-06-27 14:45:13 +00:00
|
|
|
uintptr_t addr;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
addr = (uintptr_t)uap->nsize;
|
|
|
|
error = kern_break(td, &addr);
|
|
|
|
if (error == 0)
|
|
|
|
td->td_retval[0] = addr;
|
|
|
|
return (error);
|
2018-07-23 19:49:54 +00:00
|
|
|
#else /* defined(__aarch64__) || defined(__riscv) */
|
2018-06-27 14:45:13 +00:00
|
|
|
return (ENOSYS);
|
2018-07-23 19:49:54 +00:00
|
|
|
#endif /* defined(__aarch64__) || defined(__riscv) */
|
2018-06-27 14:45:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
kern_break(struct thread *td, uintptr_t *addr)
|
|
|
|
{
|
2001-09-12 08:38:13 +00:00
|
|
|
struct vmspace *vm = td->td_proc->p_vmspace;
|
2013-01-11 09:58:35 +00:00
|
|
|
vm_map_t map = &vm->vm_map;
|
1996-06-25 00:36:46 +00:00
|
|
|
vm_offset_t new, old, base;
|
2012-12-18 07:35:01 +00:00
|
|
|
rlim_t datalim, lmemlim, vmemlim;
|
2011-10-13 16:20:10 +00:00
|
|
|
int prot, rv;
|
2001-07-04 16:20:28 +00:00
|
|
|
int error = 0;
|
|
|
|
|
2015-06-10 10:48:12 +00:00
|
|
|
datalim = lim_cur(td, RLIMIT_DATA);
|
|
|
|
lmemlim = lim_cur(td, RLIMIT_MEMLOCK);
|
|
|
|
vmemlim = lim_cur(td, RLIMIT_VMEM);
|
2004-02-04 21:52:57 +00:00
|
|
|
|
2018-06-27 14:45:13 +00:00
|
|
|
new = round_page(*addr);
|
2013-01-11 09:58:35 +00:00
|
|
|
vm_map_lock(map);
|
1994-05-24 10:09:53 +00:00
|
|
|
|
1996-06-25 00:36:46 +00:00
|
|
|
base = round_page((vm_offset_t) vm->vm_daddr);
|
2000-10-06 13:03:50 +00:00
|
|
|
old = base + ctob(vm->vm_dsize);
|
1996-06-25 00:36:46 +00:00
|
|
|
if (new > base) {
|
2000-10-06 13:03:50 +00:00
|
|
|
/*
|
2002-06-20 18:38:28 +00:00
|
|
|
* Check the resource limit, but allow a process to reduce
|
|
|
|
* its usage, even if it remains over the limit.
|
2000-10-06 13:03:50 +00:00
|
|
|
*/
|
2004-02-04 21:52:57 +00:00
|
|
|
if (new - base > datalim && new > old) {
|
2001-07-04 16:20:28 +00:00
|
|
|
error = ENOMEM;
|
|
|
|
goto done;
|
|
|
|
}
|
2013-01-11 09:58:35 +00:00
|
|
|
if (new > vm_map_max(map)) {
|
2001-07-04 16:20:28 +00:00
|
|
|
error = ENOMEM;
|
|
|
|
goto done;
|
|
|
|
}
|
1996-06-25 00:36:46 +00:00
|
|
|
} else if (new < base) {
|
|
|
|
/*
|
2018-06-04 19:35:15 +00:00
|
|
|
* Simply return the current break address without
|
|
|
|
* modifying any state. This is an ad-hoc interface
|
|
|
|
* used by libc to determine the initial break address,
|
|
|
|
* avoiding a dependency on magic features in the system
|
|
|
|
* linker.
|
1996-06-25 00:36:46 +00:00
|
|
|
*/
|
2018-06-04 19:35:15 +00:00
|
|
|
new = old;
|
2001-07-04 16:20:28 +00:00
|
|
|
goto done;
|
1996-06-25 00:36:46 +00:00
|
|
|
}
|
2018-06-04 19:35:15 +00:00
|
|
|
|
1996-06-25 00:36:46 +00:00
|
|
|
if (new > old) {
|
2013-01-11 09:58:35 +00:00
|
|
|
if (!old_mlock && map->flags & MAP_WIREFUTURE) {
|
|
|
|
if (ptoa(pmap_wired_count(map->pmap)) +
|
2012-12-18 07:35:01 +00:00
|
|
|
(new - old) > lmemlim) {
|
|
|
|
error = ENOMEM;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
}
|
2013-01-11 09:58:35 +00:00
|
|
|
if (map->size + (new - old) > vmemlim) {
|
2002-06-26 00:29:28 +00:00
|
|
|
error = ENOMEM;
|
|
|
|
goto done;
|
|
|
|
}
|
2011-07-06 20:06:44 +00:00
|
|
|
#ifdef RACCT
|
2015-04-29 10:23:02 +00:00
|
|
|
if (racct_enable) {
|
|
|
|
PROC_LOCK(td->td_proc);
|
|
|
|
error = racct_set(td->td_proc, RACCT_DATA, new - base);
|
|
|
|
if (error != 0) {
|
|
|
|
PROC_UNLOCK(td->td_proc);
|
|
|
|
error = ENOMEM;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
error = racct_set(td->td_proc, RACCT_VMEM,
|
|
|
|
map->size + (new - old));
|
2012-12-18 07:35:01 +00:00
|
|
|
if (error != 0) {
|
|
|
|
racct_set_force(td->td_proc, RACCT_DATA,
|
|
|
|
old - base);
|
|
|
|
PROC_UNLOCK(td->td_proc);
|
|
|
|
error = ENOMEM;
|
|
|
|
goto done;
|
|
|
|
}
|
2015-04-29 10:23:02 +00:00
|
|
|
if (!old_mlock && map->flags & MAP_WIREFUTURE) {
|
|
|
|
error = racct_set(td->td_proc, RACCT_MEMLOCK,
|
|
|
|
ptoa(pmap_wired_count(map->pmap)) +
|
|
|
|
(new - old));
|
|
|
|
if (error != 0) {
|
|
|
|
racct_set_force(td->td_proc, RACCT_DATA,
|
|
|
|
old - base);
|
|
|
|
racct_set_force(td->td_proc, RACCT_VMEM,
|
|
|
|
map->size);
|
|
|
|
PROC_UNLOCK(td->td_proc);
|
|
|
|
error = ENOMEM;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
PROC_UNLOCK(td->td_proc);
|
2012-12-18 07:35:01 +00:00
|
|
|
}
|
2011-10-13 16:20:10 +00:00
|
|
|
#endif
|
|
|
|
prot = VM_PROT_RW;
|
2019-02-09 03:56:48 +00:00
|
|
|
#if (defined(COMPAT_FREEBSD32) && defined(__amd64__)) || defined(__i386__)
|
2011-10-15 12:35:18 +00:00
|
|
|
if (i386_read_exec && SV_PROC_FLAG(td->td_proc, SV_ILP32))
|
2011-10-13 16:20:10 +00:00
|
|
|
prot |= VM_PROT_EXECUTE;
|
2011-07-06 20:06:44 +00:00
|
|
|
#endif
|
Provide separate accounting for user-wired pages.
Historically we have not distinguished between kernel wirings and user
wirings for accounting purposes. User wirings (via mlock(2)) were
subject to a global limit on the number of wired pages, so if large
swaths of physical memory were wired by the kernel, as happens with
the ZFS ARC among other things, the limit could be exceeded, causing
user wirings to fail.
The change adds a new counter, v_user_wire_count, which counts the
number of virtual pages wired by user processes via mlock(2) and
mlockall(2). Only user-wired pages are subject to the system-wide
limit which helps provide some safety against deadlocks. In
particular, while sources of kernel wirings typically support some
backpressure mechanism, there is no way to reclaim user-wired pages
shorting of killing the wiring process. The limit is exported as
vm.max_user_wired, renamed from vm.max_wired, and changed from u_int
to u_long.
The choice to count virtual user-wired pages rather than physical
pages was done for simplicity. There are mechanisms that can cause
user-wired mappings to be destroyed while maintaining a wiring of
the backing physical page; these make it difficult to accurately
track user wirings at the physical page layer.
The change also closes some holes which allowed user wirings to succeed
even when they would cause the system limit to be exceeded. For
instance, mmap() may now fail with ENOMEM in a process that has called
mlockall(MCL_FUTURE) if the new mapping would cause the user wiring
limit to be exceeded.
Note that bhyve -S is subject to the user wiring limit, which defaults
to 1/3 of physical RAM. Users that wish to exceed the limit must tune
vm.max_user_wired.
Reviewed by: kib, ngie (mlock() test changes)
Tested by: pho (earlier version)
MFC after: 45 days
Sponsored by: Netflix
Differential Revision: https://reviews.freebsd.org/D19908
2019-05-13 16:38:48 +00:00
|
|
|
rv = vm_map_insert(map, NULL, 0, old, new, prot, VM_PROT_ALL,
|
|
|
|
0);
|
|
|
|
if (rv == KERN_SUCCESS && (map->flags & MAP_WIREFUTURE) != 0) {
|
|
|
|
rv = vm_map_wire_locked(map, old, new,
|
|
|
|
VM_MAP_WIRE_USER | VM_MAP_WIRE_NOHOLES);
|
|
|
|
if (rv != KERN_SUCCESS)
|
2020-09-09 21:34:31 +00:00
|
|
|
(void)vm_map_delete(map, old, new);
|
Provide separate accounting for user-wired pages.
Historically we have not distinguished between kernel wirings and user
wirings for accounting purposes. User wirings (via mlock(2)) were
subject to a global limit on the number of wired pages, so if large
swaths of physical memory were wired by the kernel, as happens with
the ZFS ARC among other things, the limit could be exceeded, causing
user wirings to fail.
The change adds a new counter, v_user_wire_count, which counts the
number of virtual pages wired by user processes via mlock(2) and
mlockall(2). Only user-wired pages are subject to the system-wide
limit which helps provide some safety against deadlocks. In
particular, while sources of kernel wirings typically support some
backpressure mechanism, there is no way to reclaim user-wired pages
shorting of killing the wiring process. The limit is exported as
vm.max_user_wired, renamed from vm.max_wired, and changed from u_int
to u_long.
The choice to count virtual user-wired pages rather than physical
pages was done for simplicity. There are mechanisms that can cause
user-wired mappings to be destroyed while maintaining a wiring of
the backing physical page; these make it difficult to accurately
track user wirings at the physical page layer.
The change also closes some holes which allowed user wirings to succeed
even when they would cause the system limit to be exceeded. For
instance, mmap() may now fail with ENOMEM in a process that has called
mlockall(MCL_FUTURE) if the new mapping would cause the user wiring
limit to be exceeded.
Note that bhyve -S is subject to the user wiring limit, which defaults
to 1/3 of physical RAM. Users that wish to exceed the limit must tune
vm.max_user_wired.
Reviewed by: kib, ngie (mlock() test changes)
Tested by: pho (earlier version)
MFC after: 45 days
Sponsored by: Netflix
Differential Revision: https://reviews.freebsd.org/D19908
2019-05-13 16:38:48 +00:00
|
|
|
}
|
1994-05-24 10:09:53 +00:00
|
|
|
if (rv != KERN_SUCCESS) {
|
2011-07-06 20:06:44 +00:00
|
|
|
#ifdef RACCT
|
2015-04-29 10:23:02 +00:00
|
|
|
if (racct_enable) {
|
|
|
|
PROC_LOCK(td->td_proc);
|
|
|
|
racct_set_force(td->td_proc,
|
|
|
|
RACCT_DATA, old - base);
|
|
|
|
racct_set_force(td->td_proc,
|
|
|
|
RACCT_VMEM, map->size);
|
|
|
|
if (!old_mlock && map->flags & MAP_WIREFUTURE) {
|
|
|
|
racct_set_force(td->td_proc,
|
|
|
|
RACCT_MEMLOCK,
|
|
|
|
ptoa(pmap_wired_count(map->pmap)));
|
|
|
|
}
|
|
|
|
PROC_UNLOCK(td->td_proc);
|
2012-12-18 07:35:01 +00:00
|
|
|
}
|
2011-07-06 20:06:44 +00:00
|
|
|
#endif
|
2001-07-04 16:20:28 +00:00
|
|
|
error = ENOMEM;
|
|
|
|
goto done;
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
2002-06-20 02:04:55 +00:00
|
|
|
vm->vm_dsize += btoc(new - old);
|
1996-06-25 00:36:46 +00:00
|
|
|
} else if (new < old) {
|
2013-01-11 09:58:35 +00:00
|
|
|
rv = vm_map_delete(map, new, old);
|
1994-05-24 10:09:53 +00:00
|
|
|
if (rv != KERN_SUCCESS) {
|
2001-07-04 16:20:28 +00:00
|
|
|
error = ENOMEM;
|
|
|
|
goto done;
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
1996-06-25 00:36:46 +00:00
|
|
|
vm->vm_dsize -= btoc(old - new);
|
2011-07-06 20:06:44 +00:00
|
|
|
#ifdef RACCT
|
2015-04-29 10:23:02 +00:00
|
|
|
if (racct_enable) {
|
|
|
|
PROC_LOCK(td->td_proc);
|
|
|
|
racct_set_force(td->td_proc, RACCT_DATA, new - base);
|
|
|
|
racct_set_force(td->td_proc, RACCT_VMEM, map->size);
|
|
|
|
if (!old_mlock && map->flags & MAP_WIREFUTURE) {
|
|
|
|
racct_set_force(td->td_proc, RACCT_MEMLOCK,
|
|
|
|
ptoa(pmap_wired_count(map->pmap)));
|
|
|
|
}
|
|
|
|
PROC_UNLOCK(td->td_proc);
|
2012-12-18 07:35:01 +00:00
|
|
|
}
|
2011-07-06 20:06:44 +00:00
|
|
|
#endif
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
2001-07-04 16:20:28 +00:00
|
|
|
done:
|
2013-01-11 09:58:35 +00:00
|
|
|
vm_map_unlock(map);
|
2003-08-11 07:14:08 +00:00
|
|
|
|
2018-06-04 19:35:15 +00:00
|
|
|
if (error == 0)
|
2018-06-27 14:45:13 +00:00
|
|
|
*addr = new;
|
2018-06-04 19:35:15 +00:00
|
|
|
|
2001-07-04 16:20:28 +00:00
|
|
|
return (error);
|
1994-05-24 10:09:53 +00:00
|
|
|
}
|
|
|
|
|
2018-05-25 20:40:23 +00:00
|
|
|
#ifdef COMPAT_FREEBSD11
|
1994-05-24 10:09:53 +00:00
|
|
|
int
|
2018-05-25 20:40:23 +00:00
|
|
|
freebsd11_vadvise(struct thread *td, struct freebsd11_vadvise_args *uap)
|
1994-05-24 10:09:53 +00:00
|
|
|
{
|
2018-05-25 20:40:23 +00:00
|
|
|
|
1994-05-24 10:09:53 +00:00
|
|
|
return (EINVAL);
|
|
|
|
}
|
2018-05-25 20:40:23 +00:00
|
|
|
#endif
|