Skip to content
项目
群组
代码片段
帮助
当前项目
正在载入...
登录 / 注册
切换导航面板
X
xv6-public
项目
项目
详情
活动
周期分析
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
统计图
问题
0
问题
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
CI / CD
CI / CD
流水线
作业
日程
统计图
Wiki
Wiki
代码片段
代码片段
成员
成员
折叠边栏
关闭边栏
活动
图像
聊天
创建新问题
作业
提交
问题看板
Open sidebar
银宸时代
OS Lab Group
奖励实验
xv6-public
提交
ba71a527
提交
ba71a527
4月 02, 2012
创建
作者:
Nickolai Zeldovich
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
start trying to handle resource exhaustion
上级
644017a3
隐藏空白字符变更
内嵌
并排
正在显示
8 个修改的文件
包含
55 行增加
和
53 行删除
+55
-53
forkexectree.cc
bin/forkexectree.cc
+1
-1
cpputil.hh
include/cpputil.hh
+8
-1
errno.h
include/errno.h
+0
-3
cpprt.cc
kernel/cpprt.cc
+10
-0
kalloc.cc
kernel/kalloc.cc
+1
-1
proc.cc
kernel/proc.cc
+7
-5
syscall.cc
kernel/syscall.cc
+19
-18
vm.cc
kernel/vm.cc
+9
-24
没有找到文件。
bin/forkexectree.cc
浏览文件 @
ba71a527
...
...
@@ -3,7 +3,7 @@
#include "user.h"
#define NCHILD 2
#define NDEPTH
5
#define NDEPTH
12
void
forktree
(
int
depth
)
...
...
include/cpputil.hh
浏览文件 @
ba71a527
...
...
@@ -45,6 +45,8 @@ class scoped_acquire {
void
acquire
(
spinlock
*
l
)
{
assert
(
!
_l
);
::
acquire
(
l
);
_l
=
l
;
}
};
class
retryable
{};
namespace
std
{
template
<
class
T
>
struct
remove_reference
...
...
@@ -113,6 +115,8 @@ namespace std {
s
.
next_width
=
sw
.
_n
;
return
s
;
}
class
bad_alloc
:
public
retryable
{};
}
/* C++ runtime */
...
...
@@ -133,7 +137,10 @@ extern void *__dso_handle;
#define NEW_DELETE_OPS(classname) \
static void* operator new(unsigned long nbytes) { \
assert(nbytes == sizeof(classname)); \
return kmalloc(sizeof(classname), #classname); \
void* p = kmalloc(sizeof(classname), #classname); \
if (p == nullptr) \
throw std::bad_alloc(); \
return p; \
} \
\
static void* operator new(unsigned long nbytes, classname *buf) { \
...
...
include/errno.h
deleted
100644 → 0
浏览文件 @
644017a3
#pragma once
#define E_RETRY -3
kernel/cpprt.cc
浏览文件 @
ba71a527
...
...
@@ -211,4 +211,14 @@ initcpprt(void)
{
extern
u8
__EH_FRAME_BEGIN__
[];
__register_frame
(
__EH_FRAME_BEGIN__
);
// Initialize lazy exception handling data structures
try
{
throw
5
;
}
catch
(
int
&
x
)
{
assert
(
x
==
5
);
return
;
}
panic
(
"no catch"
);
}
kernel/kalloc.cc
浏览文件 @
ba71a527
...
...
@@ -205,7 +205,7 @@ kalloc_pool(struct kmem *km, const char *name)
if
(
r
==
0
)
{
cprintf
(
"kalloc: out of memory in pool %s
\n
"
,
km
->
name
);
kmemprint
();
//
kmemprint();
return
0
;
}
...
...
kernel/proc.cc
浏览文件 @
ba71a527
...
...
@@ -59,6 +59,8 @@ proc::proc(int npid) :
proc
::~
proc
(
void
)
{
if
(
kstack
)
ksfree
(
slab_stack
,
kstack
);
destroylock
(
&
lock
);
destroycondvar
(
&
cv
);
}
...
...
@@ -350,7 +352,9 @@ fork(int flags)
// Allocate process.
if
((
np
=
proc
::
alloc
())
==
0
)
return
-
1
;
throw
std
::
bad_alloc
();
// XXX use a scoped cleanup handler to do xnspid->remove & freeproc
if
(
flags
&
FORK_SHARE_VMAP
)
{
np
->
vmap
=
myproc
()
->
vmap
;
...
...
@@ -358,12 +362,10 @@ fork(int flags)
}
else
{
// Copy process state from p.
if
((
np
->
vmap
=
myproc
()
->
vmap
->
copy
(
cow
))
==
0
){
ksfree
(
slab_stack
,
np
->
kstack
);
np
->
kstack
=
0
;
if
(
!
xnspid
->
remove
(
np
->
pid
,
&
np
))
panic
(
"fork: ns_remove"
);
freeproc
(
np
);
return
-
1
;
throw
std
::
bad_alloc
()
;
}
}
...
...
@@ -384,7 +386,7 @@ fork(int flags)
if
(
np
->
ftable
==
nullptr
)
{
// XXX(sbw) leaking?
freeproc
(
np
);
return
-
1
;
throw
std
::
bad_alloc
()
;
}
}
...
...
kernel/syscall.cc
浏览文件 @
ba71a527
...
...
@@ -9,7 +9,6 @@
#include "syscall.h"
#include "cpu.hh"
#include "kmtrace.hh"
#include "errno.h"
extern
"C"
int
__uaccess_mem
(
void
*
dst
,
const
void
*
src
,
u64
size
);
extern
"C"
int
__uaccess_str
(
char
*
dst
,
const
char
*
src
,
u64
size
);
...
...
@@ -81,23 +80,25 @@ argcheckptr(void *p, int size)
u64
syscall
(
u64
a0
,
u64
a1
,
u64
a2
,
u64
a3
,
u64
a4
,
u64
num
)
{
u64
r
;
mt_ascope
ascope
(
"syscall(%lx,%lx,%lx,%lx,%lx,%lx)"
,
num
,
a0
,
a1
,
a2
,
a3
,
a4
);
retry:
if
(
num
<
SYS_ncount
&&
syscalls
[
num
])
{
mtstart
(
syscalls
[
num
],
myproc
());
mtrec
();
r
=
syscalls
[
num
](
a0
,
a1
,
a2
,
a3
,
a4
);
mtstop
(
myproc
());
mtign
();
}
else
{
cprintf
(
"%d %s: unknown sys call %ld
\n
"
,
myproc
()
->
pid
,
myproc
()
->
name
,
num
);
r
=
-
1
;
}
if
(
r
==
E_RETRY
)
goto
retry
;
return
r
;
for
(;;)
{
try
{
if
(
num
<
SYS_ncount
&&
syscalls
[
num
])
{
mtstart
(
syscalls
[
num
],
myproc
());
mtrec
();
u64
r
=
syscalls
[
num
](
a0
,
a1
,
a2
,
a3
,
a4
);
mtstop
(
myproc
());
mtign
();
return
r
;
}
else
{
cprintf
(
"%d %s: unknown sys call %ld
\n
"
,
myproc
()
->
pid
,
myproc
()
->
name
,
num
);
return
-
1
;
}
}
catch
(
retryable
&
e
)
{
cprintf
(
"%d: syscall retry
\n
"
,
myproc
()
->
pid
);
yield
();
}
}
}
kernel/vm.cc
浏览文件 @
ba71a527
...
...
@@ -112,16 +112,13 @@ vmnode::copy()
vmnode
*
c
=
new
vmnode
(
npages
,
type
,
(
type
==
ONDEMAND
)
?
idup
(
ip
)
:
0
,
offset
,
sz
);
if
(
c
==
0
)
return
0
;
if
(
empty
)
return
c
;
if
(
c
->
allocall
(
false
)
<
0
)
{
cprintf
(
"vmn_copy: out of memory
\n
"
);
delete
c
;
return
0
;
throw
std
::
bad_alloc
()
;
}
for
(
u64
i
=
0
;
i
<
npages
;
i
++
)
if
(
page
[
i
])
...
...
@@ -280,8 +277,6 @@ vmap*
vmap
::
copy
(
int
share
)
{
vmap
*
nm
=
new
vmap
();
if
(
nm
==
0
)
return
0
;
#if VM_CRANGE
for
(
auto
r
:
cr
)
{
...
...
@@ -318,17 +313,10 @@ vmap::copy(int share)
});
}
}
else
{
// XXX free vmnode copy if vma alloc fails
ne
=
new
vma
(
nm
,
e
->
vma_start
,
e
->
vma_end
,
PRIVATE
,
e
->
n
->
copy
());
}
if
(
ne
==
0
)
goto
err
;
if
(
ne
->
n
==
0
)
{
delete
ne
;
goto
err
;
}
#if VM_CRANGE
auto
span
=
nm
->
cr
.
search_lock
(
ne
->
vma_start
,
ne
->
vma_end
-
ne
->
vma_start
);
#endif
...
...
@@ -362,12 +350,7 @@ vmap::copy(int share)
}
nm
->
brk_
=
brk_
;
return
nm
;
err
:
delete
nm
;
return
0
;
}
// Does any vma overlap start..start+len?
...
...
@@ -549,10 +532,6 @@ vmap::pagefault_wcow(vma *m)
// because other processes may change ref count while this process
// is handling wcow.
struct
vmnode
*
nodecopy
=
m
->
n
->
copy
();
if
(
nodecopy
==
0
)
{
cprintf
(
"pagefault_wcow: out of mem
\n
"
);
return
-
1
;
}
vma
*
repl
=
new
vma
(
this
,
m
->
vma_start
,
m
->
vma_end
,
PRIVATE
,
nodecopy
);
...
...
@@ -663,7 +642,13 @@ pagefault(struct vmap *vmap, uptr va, u32 err)
mtwriteavar
(
"page:%p.%016x"
,
vmap
,
PGROUNDDOWN
(
va
));
#endif
return
vmap
->
pagefault
(
va
,
err
);
for
(;;)
{
try
{
return
vmap
->
pagefault
(
va
,
err
);
}
catch
(
retryable
&
e
)
{
cprintf
(
"%d: pagefault retry
\n
"
,
myproc
()
->
pid
);
}
}
}
// Copy len bytes from p to user address va in vmap.
...
...
编写
预览
您添加了
0
人
到此讨论。请谨慎行事。
请先完成此评论的编辑!
取消
请
注册
或者
登录
后发表评论