⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 vm_glue.c

📁 open bsd vm device design
💻 C
📖 第 1 页 / 共 2 页
字号:
/*  * Copyright (c) 1991, 1993 *	The Regents of the University of California.  All rights reserved. * * This code is derived from software contributed to Berkeley by * The Mach Operating System project at Carnegie-Mellon University. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software *    must display the following acknowledgement: *	This product includes software developed by the University of *	California, Berkeley and its contributors. * 4. Neither the name of the University nor the names of its contributors *    may be used to endorse or promote products derived from this software *    without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * *	@(#)vm_glue.c	8.9 (Berkeley) 3/4/95 * * * Copyright (c) 1987, 1990 Carnegie-Mellon University. * All rights reserved. *  * Permission to use, copy, modify and distribute this software and * its documentation is hereby granted, provided that both the copyright * notice and this permission notice appear in all copies of the * software, derivative works or modified versions, and any portions * thereof, and that both notices appear in supporting documentation. *  * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS"  * CONDITION.  CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND  * FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE. *  * Carnegie Mellon requests users of this software to return to * *  Software Distribution Coordinator  or  Software.Distribution@CS.CMU.EDU *  School of Computer Science *  Carnegie Mellon University *  Pittsburgh PA 15213-3890 * * any improvements or extensions that they make and grant Carnegie the * rights to redistribute these changes. */#include <sys/param.h>#include <sys/systm.h>#include <sys/proc.h>#include <sys/resourcevar.h>#include <sys/buf.h>#include <sys/user.h>#include <vm/vm.h>#include <vm/vm_page.h>#include <vm/vm_kern.h>#include <machine/cpu.h>int	avefree = 0;		/* XXX */unsigned maxdmap = MAXDSIZ;	/* XXX */int	readbuffers = 0;	/* XXX allow kgdb to read kernel buffer pool */intkernacc(addr, len, rw)	caddr_t addr;	int len, rw;{	boolean_t rv;	vm_offset_t saddr, eaddr;	vm_prot_t prot = rw == B_READ ? VM_PROT_READ : VM_PROT_WRITE;	saddr = trunc_page(addr);	eaddr = round_page(addr+len);	rv = vm_map_check_protection(kernel_map, saddr, eaddr, prot);	/*	 * XXX there are still some things (e.g. the buffer cache) that	 * are managed behind the VM system's back so even though an	 * address is accessible in the mind of the VM system, there may	 * not be physical pages where the VM thinks there is.  This can	 * lead to bogus allocation of pages in the kernel address space	 * or worse, inconsistencies at the pmap level.  We only worry	 * about the buffer cache for now.	 */	if (!readbuffers && rv && (eaddr > (vm_offset_t)buffers &&		   saddr < (vm_offset_t)buffers + MAXBSIZE * nbuf))		rv = FALSE;	return(rv == TRUE);}intuseracc(addr, len, rw)	caddr_t addr;	int len, rw;{	boolean_t rv;	vm_prot_t prot = rw == B_READ ? VM_PROT_READ : VM_PROT_WRITE;	rv = vm_map_check_protection(&curproc->p_vmspace->vm_map,	    trunc_page(addr), round_page(addr+len), prot);	return(rv == TRUE);}#ifdef KGDB/* * Change protections on kernel pages from addr to addr+len * (presumably so debugger can plant a breakpoint). * * We force the protection change at the pmap level.  If we were * to use vm_map_protect a change to allow writing would be lazily- * applied meaning we would still take a protection fault, something * we really don't want to do.  It would also fragment the kernel * map unnecessarily.  We cannot use pmap_protect since it also won't * enforce a write-enable request.  Using pmap_enter is the only way * we can ensure the change takes place properly. */voidchgkprot(addr, len, rw)	register caddr_t addr;	int len, rw;{	vm_prot_t prot;	vm_offset_t pa, sva, eva;	prot = rw == B_READ ? VM_PROT_READ : VM_PROT_READ|VM_PROT_WRITE;	eva = round_page(addr + len);	for (sva = trunc_page(addr); sva < eva; sva += PAGE_SIZE) {		/*		 * Extract physical address for the page.		 * We use a cheezy hack to differentiate physical		 * page 0 from an invalid mapping, not that it		 * really matters...		 */		pa = pmap_extract(kernel_pmap, sva|1);		if (pa == 0)			panic("chgkprot: invalid page");		pmap_enter(kernel_pmap, sva, pa&~1, prot, TRUE);	}}#endifvoidvslock(addr, len)	caddr_t	addr;	u_int	len;{	vm_map_pageable(&curproc->p_vmspace->vm_map, trunc_page(addr),			round_page(addr+len), FALSE);}voidvsunlock(addr, len, dirtied)	caddr_t	addr;	u_int	len;	int dirtied;{#ifdef	lint	dirtied++;#endif	vm_map_pageable(&curproc->p_vmspace->vm_map, trunc_page(addr),			round_page(addr+len), TRUE);}/* * Implement fork's actions on an address space. * Here we arrange for the address space to be copied or referenced, * allocate a user struct (pcb and kernel stack), then call the * machine-dependent layer to fill those in and make the new process * ready to run. * NOTE: the kernel stack may be at a different location in the child * process, and thus addresses of automatic variables may be invalid * after cpu_fork returns in the child process.  We do nothing here * after cpu_fork returns. */intvm_fork(p1, p2, isvfork)	register struct proc *p1, *p2;	int isvfork;{	register struct user *up;	vm_offset_t addr;#ifdef i386	/*	 * avoid copying any of the parent's pagetables or other per-process	 * objects that reside in the map by marking all of them non-inheritable	 */	(void)vm_map_inherit(&p1->p_vmspace->vm_map,		UPT_MIN_ADDRESS-UPAGES*NBPG, VM_MAX_ADDRESS, VM_INHERIT_NONE);#endif	p2->p_vmspace = vmspace_fork(p1->p_vmspace);#ifdef SYSVSHM	if (p1->p_vmspace->vm_shm)		shmfork(p1, p2, isvfork);#endif#ifndef	i386	/*	 * Allocate a wired-down (for now) pcb and kernel stack for the process	 */	addr = kmem_alloc_pageable(kernel_map, ctob(UPAGES));	if (addr == 0)		panic("vm_fork: no more kernel virtual memory");	vm_map_pageable(kernel_map, addr, addr + ctob(UPAGES), FALSE);#else/* XXX somehow, on 386, ocassionally pageout removes active, wired down kstack,and pagetables, WITHOUT going thru vm_page_unwire! Why this appears to work isnot yet clear, yet it does... */	addr = kmem_alloc(kernel_map, ctob(UPAGES));	if (addr == 0)		panic("vm_fork: no more kernel virtual memory");#endif	up = (struct user *)addr;	p2->p_addr = up;	/*	 * p_stats and p_sigacts currently point at fields	 * in the user struct but not at &u, instead at p_addr.	 * Copy p_sigacts and parts of p_stats; zero the rest	 * of p_stats (statistics).	 */	p2->p_stats = &up->u_stats;	p2->p_sigacts = &up->u_sigacts;	up->u_sigacts = *p1->p_sigacts;	bzero(&up->u_stats.pstat_startzero,	    (unsigned) ((caddr_t)&up->u_stats.pstat_endzero -	    (caddr_t)&up->u_stats.pstat_startzero));	bcopy(&p1->p_stats->pstat_startcopy, &up->u_stats.pstat_startcopy,	    ((caddr_t)&up->u_stats.pstat_endcopy -	     (caddr_t)&up->u_stats.pstat_startcopy));#ifdef i386	{ u_int addr = UPT_MIN_ADDRESS - UPAGES*NBPG; struct vm_map *vp;	vp = &p2->p_vmspace->vm_map;	(void)vm_deallocate(vp, addr, UPT_MAX_ADDRESS - addr);	(void)vm_allocate(vp, &addr, UPT_MAX_ADDRESS - addr, FALSE);	(void)vm_map_inherit(vp, addr, UPT_MAX_ADDRESS, VM_INHERIT_NONE);	}#endif	/*	 * cpu_fork will copy and update the kernel stack and pcb,	 * and make the child ready to run.  It marks the child	 * so that it can return differently than the parent.	 * It returns twice, once in the parent process and	 * once in the child.	 */	return (cpu_fork(p1, p2));}/* * Set default limits for VM system. * Called for proc 0, and then inherited by all others. */voidvm_init_limits(p)	register struct proc *p;{	/*	 * Set up the initial limits on process VM.	 * Set the maximum resident set size to be all	 * of (reasonably) available memory.  This causes	 * any single, large process to start random page	 * replacement once it fills memory.	 */        p->p_rlimit[RLIMIT_STACK].rlim_cur = DFLSSIZ;        p->p_rlimit[RLIMIT_STACK].rlim_max = MAXSSIZ;        p->p_rlimit[RLIMIT_DATA].rlim_cur = DFLDSIZ;        p->p_rlimit[RLIMIT_DATA].rlim_max = MAXDSIZ;	p->p_rlimit[RLIMIT_RSS].rlim_cur = ptoa(cnt.v_free_count);}#include <vm/vm_pageout.h>#ifdef DEBUGint	enableswap = 1;int	swapdebug = 0;#define	SDB_FOLLOW	1#define SDB_SWAPIN	2#define SDB_SWAPOUT	4#endif/* * Brutally simple: *	1. Attempt to swapin every swaped-out, runnable process in *	   order of priority.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -