2 * Copyright (c) 2000-2011 Apple Computer, Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
32 * Mach Operating System
33 * Copyright (c) 1991,1990,1989,1988,1987 Carnegie Mellon University
34 * All Rights Reserved.
36 * Permission to use, copy, modify and distribute this software and its
37 * documentation is hereby granted, provided that both the copyright
38 * notice and this permission notice appear in all copies of the
39 * software, derivative works or modified versions, and any portions
40 * thereof, and that both notices appear in supporting documentation.
42 * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS"
43 * CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR
44 * ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
46 * Carnegie Mellon requests users of this software to return to
48 * Software Distribution Coordinator or Software.Distribution@CS.CMU.EDU
49 * School of Computer Science
50 * Carnegie Mellon University
51 * Pittsburgh PA 15213-3890
53 * any improvements or extensions that they make and grant Carnegie Mellon
54 * the rights to redistribute these changes.
60 * Author: Avadis Tevanian, Jr.
63 * General kernel memory allocator. This allocator is designed
64 * to be used by the kernel to manage dynamic memory fast.
67 #include <zone_debug.h>
69 #include <mach/boolean.h>
71 #include <mach/machine/vm_types.h>
72 #include <mach/vm_param.h>
73 #include <kern/misc_protos.h>
74 #include <kern/zalloc.h>
75 #include <kern/kalloc.h>
76 #include <kern/ledger.h>
77 #include <vm/vm_kern.h>
78 #include <vm/vm_object.h>
79 #include <vm/vm_map.h>
80 #include <libkern/OSMalloc.h>
81 #include <sys/kdebug.h>
83 #include <san/kasan.h>
86 zone_t
kalloc_zone(vm_size_t
);
89 #define KALLOC_MAP_SIZE_MIN (16 * 1024 * 1024)
90 #define KALLOC_MAP_SIZE_MAX (128 * 1024 * 1024)
93 vm_size_t kalloc_max_prerounded
;
94 vm_size_t kalloc_kernmap_size
; /* size of kallocs that can come from kernel map */
96 /* how many times we couldn't allocate out of kalloc_map and fell back to kernel_map */
97 unsigned long kalloc_fallback_count
;
99 unsigned int kalloc_large_inuse
;
100 vm_size_t kalloc_large_total
;
101 vm_size_t kalloc_large_max
;
102 vm_size_t kalloc_largest_allocated
= 0;
103 uint64_t kalloc_large_sum
;
105 int kalloc_fake_zone_index
= -1; /* index of our fake zone in statistics arrays */
107 vm_offset_t kalloc_map_min
;
108 vm_offset_t kalloc_map_max
;
112 * Diagnostic code to track mutexes separately rather than via the 2^ zones
118 KALLOC_ZINFO_SALLOC(vm_size_t bytes
)
120 thread_t thr
= current_thread();
121 ledger_debit(thr
->t_ledger
, task_ledgers
.tkm_shared
, bytes
);
125 KALLOC_ZINFO_SFREE(vm_size_t bytes
)
127 thread_t thr
= current_thread();
128 ledger_credit(thr
->t_ledger
, task_ledgers
.tkm_shared
, bytes
);
132 * All allocations of size less than kalloc_max are rounded to the next nearest
133 * sized zone. This allocator is built on top of the zone allocator. A zone
134 * is created for each potential size that we are willing to get in small
137 * We assume that kalloc_max is not greater than 64K;
139 * Note that kalloc_max is somewhat confusingly named. It represents the first
140 * power of two for which no zone exists. kalloc_max_prerounded is the
141 * smallest allocation size, before rounding, for which no zone exists.
143 * Also if the allocation size is more than kalloc_kernmap_size then allocate
144 * from kernel map rather than kalloc_map.
147 #define KALLOC_MINALIGN (1 << KALLOC_LOG2_MINALIGN)
148 #define KiB(x) (1024 * (x))
151 * The k_zone_config table defines the configuration of zones on various platforms.
152 * The currently defined list of zones and their per-CPU caching behavior are as
153 * follows (X:zone not present; N:zone present no cpu-caching; Y:zone present with cpu-caching):
155 * Size macOS(64-bit) embedded(32-bit) embedded(64-bit)
156 *-------- ---------------- ---------------- ----------------
198 static const struct kalloc_zone_config
{
201 const char *kzc_name
;
202 } k_zone_config
[] = {
203 #define KZC_ENTRY(SIZE, caching) { .kzc_caching = (caching), .kzc_size = (SIZE), .kzc_name = "kalloc." #SIZE }
207 #if KALLOC_MINSIZE == 16 && KALLOC_LOG2_MINALIGN == 4
208 /* Zone config for embedded 64-bit platforms */
215 KZC_ENTRY(128, true),
216 KZC_ENTRY(160, true),
217 KZC_ENTRY(192, true),
218 KZC_ENTRY(224, true),
219 KZC_ENTRY(256, true),
220 KZC_ENTRY(288, true),
221 KZC_ENTRY(368, true),
222 KZC_ENTRY(400, true),
223 KZC_ENTRY(512, true),
224 KZC_ENTRY(576, false),
225 KZC_ENTRY(768, false),
226 KZC_ENTRY(1024, true),
227 KZC_ENTRY(1152, false),
228 KZC_ENTRY(1280, false),
229 KZC_ENTRY(1664, false),
230 KZC_ENTRY(2048, false),
231 KZC_ENTRY(4096, false),
232 KZC_ENTRY(6144, false),
233 KZC_ENTRY(8192, false),
234 KZC_ENTRY(16384, false),
235 KZC_ENTRY(32768, false),
237 #elif KALLOC_MINSIZE == 8 && KALLOC_LOG2_MINALIGN == 3
238 /* Zone config for embedded 32-bit platforms */
248 KZC_ENTRY(112, true),
249 KZC_ENTRY(128, true),
250 KZC_ENTRY(192, true),
251 KZC_ENTRY(256, true),
252 KZC_ENTRY(288, true),
253 KZC_ENTRY(384, true),
254 KZC_ENTRY(440, true),
255 KZC_ENTRY(512, true),
256 KZC_ENTRY(576, false),
257 KZC_ENTRY(768, false),
258 KZC_ENTRY(1024, true),
259 KZC_ENTRY(1152, false),
260 KZC_ENTRY(1280, false),
261 KZC_ENTRY(1536, false),
262 KZC_ENTRY(2048, false),
263 KZC_ENTRY(2128, false),
264 KZC_ENTRY(3072, false),
265 KZC_ENTRY(4096, false),
266 KZC_ENTRY(6144, false),
267 KZC_ENTRY(8192, false),
268 KZC_ENTRY(16384, false),
269 KZC_ENTRY(32768, false),
272 #error missing or invalid zone size parameters for kalloc
275 #else /* CONFIG_EMBEDDED */
277 /* Zone config for macOS 64-bit platforms */
284 KZC_ENTRY(128, true),
285 KZC_ENTRY(160, true),
286 KZC_ENTRY(192, true),
287 KZC_ENTRY(224, true),
288 KZC_ENTRY(256, true),
289 KZC_ENTRY(288, true),
290 KZC_ENTRY(368, true),
291 KZC_ENTRY(400, true),
292 KZC_ENTRY(512, true),
293 KZC_ENTRY(576, true),
294 KZC_ENTRY(768, true),
295 KZC_ENTRY(1024, true),
296 KZC_ENTRY(1152, false),
297 KZC_ENTRY(1280, false),
298 KZC_ENTRY(1664, false),
299 KZC_ENTRY(2048, true),
300 KZC_ENTRY(4096, true),
301 KZC_ENTRY(6144, false),
302 KZC_ENTRY(8192, true),
303 KZC_ENTRY(16384, false),
304 KZC_ENTRY(32768, false),
306 #endif /* CONFIG_EMBEDDED */
311 #define MAX_K_ZONE (int)(sizeof(k_zone_config) / sizeof(k_zone_config[0]))
314 * Many kalloc() allocations are for small structures containing a few
315 * pointers and longs - the k_zone_dlut[] direct lookup table, indexed by
316 * size normalized to the minimum alignment, finds the right zone index
317 * for them in one dereference.
320 #define INDEX_ZDLUT(size) \
321 (((size) + KALLOC_MINALIGN - 1) / KALLOC_MINALIGN)
322 #define N_K_ZDLUT (2048 / KALLOC_MINALIGN)
323 /* covers sizes [0 .. 2048 - KALLOC_MINALIGN] */
324 #define MAX_SIZE_ZDLUT ((N_K_ZDLUT - 1) * KALLOC_MINALIGN)
326 static int8_t k_zone_dlut
[N_K_ZDLUT
]; /* table of indices into k_zone[] */
329 * If there's no hit in the DLUT, then start searching from k_zindex_start.
331 static int k_zindex_start
;
333 static zone_t k_zone
[MAX_K_ZONE
];
335 /* #define KALLOC_DEBUG 1 */
337 /* forward declarations */
339 lck_grp_t kalloc_lck_grp
;
340 lck_mtx_t kalloc_lock
;
342 #define kalloc_spin_lock() lck_mtx_lock_spin(&kalloc_lock)
343 #define kalloc_unlock() lck_mtx_unlock(&kalloc_lock)
346 /* OSMalloc local data declarations */
348 queue_head_t OSMalloc_tag_list
;
350 lck_grp_t
*OSMalloc_tag_lck_grp
;
351 lck_mtx_t OSMalloc_tag_lock
;
353 #define OSMalloc_tag_spin_lock() lck_mtx_lock_spin(&OSMalloc_tag_lock)
354 #define OSMalloc_tag_unlock() lck_mtx_unlock(&OSMalloc_tag_lock)
357 /* OSMalloc forward declarations */
358 void OSMalloc_init(void);
359 void OSMalloc_Tagref(OSMallocTag tag
);
360 void OSMalloc_Tagrele(OSMallocTag tag
);
363 * Initialize the memory allocator. This should be called only
364 * once on a system wide basis (i.e. first processor to get here
365 * does the initialization).
367 * This initializes all of the zones.
374 kern_return_t retval
;
376 vm_size_t size
, kalloc_map_size
;
377 vm_map_kernel_flags_t vmk_flags
;
380 * Scale the kalloc_map_size to physical memory size: stay below
381 * 1/8th the total zone map size, or 128 MB (for a 32-bit kernel).
383 kalloc_map_size
= (vm_size_t
)(sane_size
>> 5);
385 if (kalloc_map_size
> KALLOC_MAP_SIZE_MAX
) {
386 kalloc_map_size
= KALLOC_MAP_SIZE_MAX
;
388 #endif /* !__LP64__ */
389 if (kalloc_map_size
< KALLOC_MAP_SIZE_MIN
) {
390 kalloc_map_size
= KALLOC_MAP_SIZE_MIN
;
393 vmk_flags
= VM_MAP_KERNEL_FLAGS_NONE
;
394 vmk_flags
.vmkf_permanent
= TRUE
;
396 retval
= kmem_suballoc(kernel_map
, &min
, kalloc_map_size
,
400 VM_KERN_MEMORY_KALLOC
,
403 if (retval
!= KERN_SUCCESS
) {
404 panic("kalloc_init: kmem_suballoc failed");
407 kalloc_map_min
= min
;
408 kalloc_map_max
= min
+ kalloc_map_size
- 1;
411 * Create zones up to a least 4 pages because small page-multiples are
412 * common allocations. Also ensure that zones up to size 16KB bytes exist.
413 * This is desirable because messages are allocated with kalloc(), and
414 * messages up through size 8192 are common.
416 kalloc_max
= PAGE_SIZE
<< 2;
417 if (kalloc_max
< KiB(16)) {
418 kalloc_max
= KiB(16);
420 assert(kalloc_max
<= KiB(64)); /* assumption made in size arrays */
422 kalloc_max_prerounded
= kalloc_max
/ 2 + 1;
423 /* allocations larger than 16 times kalloc_max go directly to kernel map */
424 kalloc_kernmap_size
= (kalloc_max
* 16) + 1;
425 kalloc_largest_allocated
= kalloc_kernmap_size
;
428 * Allocate a zone for each size we are going to handle.
430 for (int i
= 0; i
< MAX_K_ZONE
&& (size
= k_zone_config
[i
].kzc_size
) < kalloc_max
; i
++) {
431 k_zone
[i
] = zinit(size
, size
, size
, k_zone_config
[i
].kzc_name
);
434 * Don't charge the caller for the allocation, as we aren't sure how
435 * the memory will be handled.
437 zone_change(k_zone
[i
], Z_CALLERACCT
, FALSE
);
439 if (zone_tagging_on
) {
440 zone_change(k_zone
[i
], Z_TAGS_ENABLED
, TRUE
);
443 zone_change(k_zone
[i
], Z_KASAN_QUARANTINE
, FALSE
);
444 if (k_zone_config
[i
].kzc_caching
) {
445 zone_change(k_zone
[i
], Z_CACHING_ENABLED
, TRUE
);
450 * Build the Direct LookUp Table for small allocations
453 for (int i
= 0; i
<= N_K_ZDLUT
; i
++, size
+= KALLOC_MINALIGN
) {
456 while ((vm_size_t
)k_zone_config
[zindex
].kzc_size
< size
) {
460 if (i
== N_K_ZDLUT
) {
461 k_zindex_start
= zindex
;
464 k_zone_dlut
[i
] = (int8_t)zindex
;
468 printf("kalloc_init: k_zindex_start %d\n", k_zindex_start
);
471 * Do a quick synthesis to see how well/badly we can
472 * find-a-zone for a given size.
473 * Useful when debugging/tweaking the array of zone sizes.
474 * Cache misses probably more critical than compare-branches!
476 for (int i
= 0; i
< MAX_K_ZONE
; i
++) {
477 vm_size_t testsize
= (vm_size_t
)k_zone_config
[i
].kzc_size
- 1;
481 if (testsize
< MAX_SIZE_ZDLUT
) {
482 compare
+= 1; /* 'if' (T) */
484 long dindex
= INDEX_ZDLUT(testsize
);
485 zindex
= (int)k_zone_dlut
[dindex
];
486 } else if (testsize
< kalloc_max_prerounded
) {
487 compare
+= 2; /* 'if' (F), 'if' (T) */
489 zindex
= k_zindex_start
;
490 while ((vm_size_t
)k_zone_config
[zindex
].kzc_size
< testsize
) {
492 compare
++; /* 'while' (T) */
494 compare
++; /* 'while' (F) */
496 break; /* not zone-backed */
498 zone_t z
= k_zone
[zindex
];
499 printf("kalloc_init: req size %4lu: %11s took %d compare%s\n",
500 (unsigned long)testsize
, z
->zone_name
, compare
,
501 compare
== 1 ? "" : "s");
505 lck_grp_init(&kalloc_lck_grp
, "kalloc.large", LCK_GRP_ATTR_NULL
);
506 lck_mtx_init(&kalloc_lock
, &kalloc_lck_grp
, LCK_ATTR_NULL
);
509 lck_mtx_zone
= zinit(sizeof(struct _lck_mtx_
), 1024 * 256, 4096, "lck_mtx");
514 * Given an allocation size, return the kalloc zone it belongs to.
515 * Direct LookUp Table variant.
517 static __inline zone_t
518 get_zone_dlut(vm_size_t size
)
520 long dindex
= INDEX_ZDLUT(size
);
521 int zindex
= (int)k_zone_dlut
[dindex
];
522 return k_zone
[zindex
];
525 /* As above, but linear search k_zone_config[] for the next zone that fits. */
527 static __inline zone_t
528 get_zone_search(vm_size_t size
, int zindex
)
530 assert(size
< kalloc_max_prerounded
);
532 while ((vm_size_t
)k_zone_config
[zindex
].kzc_size
< size
) {
536 assert(zindex
< MAX_K_ZONE
&&
537 (vm_size_t
)k_zone_config
[zindex
].kzc_size
< kalloc_max
);
539 return k_zone
[zindex
];
543 vm_map_lookup_kalloc_entry_locked(
548 vm_map_entry_t vm_entry
= NULL
;
550 ret
= vm_map_lookup_entry(map
, (vm_map_offset_t
)addr
, &vm_entry
);
552 panic("Attempting to lookup/free an address not allocated via kalloc! (vm_map_lookup_entry() failed map: %p, addr: %p)\n",
555 if (vm_entry
->vme_start
!= (vm_map_offset_t
)addr
) {
556 panic("Attempting to lookup/free the middle of a kalloc'ed element! (map: %p, addr: %p, entry: %p)\n",
557 map
, addr
, vm_entry
);
559 if (!vm_entry
->vme_atomic
) {
560 panic("Attempting to lookup/free an address not managed by kalloc! (map: %p, addr: %p, entry: %p)\n",
561 map
, addr
, vm_entry
);
563 return vm_entry
->vme_end
- vm_entry
->vme_start
;
568 * KASAN kalloc stashes the original user-requested size away in the poisoned
569 * area. Return that directly.
572 kalloc_size(void *addr
)
574 (void)vm_map_lookup_kalloc_entry_locked
; /* silence warning */
575 return kasan_user_size((vm_offset_t
)addr
);
585 size
= zone_element_size(addr
, NULL
);
589 if (((vm_offset_t
)addr
>= kalloc_map_min
) && ((vm_offset_t
)addr
< kalloc_map_max
)) {
594 vm_map_lock_read(map
);
595 size
= vm_map_lookup_kalloc_entry_locked(map
, addr
);
596 vm_map_unlock_read(map
);
608 if (size
< MAX_SIZE_ZDLUT
) {
609 z
= get_zone_dlut(size
);
613 if (size
< kalloc_max_prerounded
) {
614 z
= get_zone_search(size
, k_zindex_start
);
618 if (size
>= kalloc_kernmap_size
) {
624 return vm_map_round_page(size
, VM_MAP_PAGE_MASK(map
));
629 (kfree_addr
)(void *addr
)
631 vm_size_t origsz
= kalloc_size(addr
);
645 size
= zone_element_size(addr
, &z
);
647 DTRACE_VM3(kfree
, vm_size_t
, -1, vm_size_t
, z
->elem_size
, void*, addr
);
652 if (((vm_offset_t
)addr
>= kalloc_map_min
) && ((vm_offset_t
)addr
< kalloc_map_max
)) {
657 if ((vm_offset_t
)addr
< VM_MIN_KERNEL_AND_KEXT_ADDRESS
) {
658 panic("kfree on an address not in the kernel & kext address range! addr: %p\n", addr
);
662 size
= vm_map_lookup_kalloc_entry_locked(map
, addr
);
663 ret
= vm_map_remove_locked(map
,
664 vm_map_trunc_page((vm_map_offset_t
)addr
,
665 VM_MAP_PAGE_MASK(map
)),
666 vm_map_round_page((vm_map_offset_t
)addr
+ size
,
667 VM_MAP_PAGE_MASK(map
)),
668 VM_MAP_REMOVE_KUNWIRE
);
669 if (ret
!= KERN_SUCCESS
) {
670 panic("vm_map_remove_locked() failed for kalloc vm_entry! addr: %p, map: %p ret: %d\n",
674 DTRACE_VM3(kfree
, vm_size_t
, -1, vm_size_t
, size
, void*, addr
);
677 kalloc_large_total
-= size
;
678 kalloc_large_inuse
--;
681 KALLOC_ZINFO_SFREE(size
);
690 vm_allocation_site_t
* site
)
697 tag
= VM_KERN_MEMORY_KALLOC
;
701 /* expand the allocation to accomodate redzones */
702 vm_size_t req_size
= size
;
703 size
= kasan_alloc_resize(req_size
);
706 if (size
< MAX_SIZE_ZDLUT
) {
707 z
= get_zone_dlut(size
);
708 } else if (size
< kalloc_max_prerounded
) {
709 z
= get_zone_search(size
, k_zindex_start
);
712 * If size is too large for a zone, then use kmem_alloc.
713 * (We use kmem_alloc instead of kmem_alloc_kobject so that
714 * krealloc can use kmem_realloc.)
718 /* kmem_alloc could block so we return if noblock */
724 /* large allocation - use guard pages instead of small redzones */
725 size
= round_page(req_size
+ 2 * PAGE_SIZE
);
726 assert(size
>= MAX_SIZE_ZDLUT
&& size
>= kalloc_max_prerounded
);
729 if (size
>= kalloc_kernmap_size
) {
730 alloc_map
= kernel_map
;
732 alloc_map
= kalloc_map
;
736 tag
= vm_tag_alloc(site
);
739 if (kmem_alloc_flags(alloc_map
, (vm_offset_t
*)&addr
, size
, tag
, KMA_ATOMIC
) != KERN_SUCCESS
) {
740 if (alloc_map
!= kernel_map
) {
741 if (kalloc_fallback_count
++ == 0) {
742 printf("%s: falling back to kernel_map\n", __func__
);
744 if (kmem_alloc_flags(kernel_map
, (vm_offset_t
*)&addr
, size
, tag
, KMA_ATOMIC
) != KERN_SUCCESS
) {
755 * Thread-safe version of the workaround for 4740071
758 if (size
> kalloc_largest_allocated
) {
759 kalloc_largest_allocated
= size
;
762 kalloc_large_inuse
++;
763 kalloc_large_total
+= size
;
764 kalloc_large_sum
+= size
;
766 if (kalloc_large_total
> kalloc_large_max
) {
767 kalloc_large_max
= kalloc_large_total
;
772 KALLOC_ZINFO_SALLOC(size
);
775 /* fixup the return address to skip the redzone */
776 addr
= (void *)kasan_alloc((vm_offset_t
)addr
, size
, req_size
, PAGE_SIZE
);
778 *psize
= round_page(size
);
780 DTRACE_VM3(kalloc
, vm_size_t
, size
, vm_size_t
, *psize
, void*, addr
);
784 if (size
> z
->elem_size
) {
785 panic("%s: z %p (%s) but requested size %lu", __func__
,
786 z
, z
->zone_name
, (unsigned long)size
);
790 assert(size
<= z
->elem_size
);
793 if (z
->tags
&& site
) {
794 tag
= vm_tag_alloc(site
);
795 if (!canblock
&& !vm_allocation_zone_totals
[tag
]) {
796 tag
= VM_KERN_MEMORY_KALLOC
;
801 addr
= zalloc_canblock_tag(z
, canblock
, size
, tag
);
804 /* fixup the return address to skip the redzone */
805 addr
= (void *)kasan_alloc((vm_offset_t
)addr
, z
->elem_size
, req_size
, KASAN_GUARD_SIZE
);
807 /* For KASan, the redzone lives in any additional space, so don't
808 * expand the allocation. */
810 *psize
= z
->elem_size
;
813 DTRACE_VM3(kalloc
, vm_size_t
, size
, vm_size_t
, *psize
, void*, addr
);
824 return kalloc_tag_bt(size
, VM_KERN_MEMORY_KALLOC
);
836 * Resize back to the real allocation size and hand off to the KASan
837 * quarantine. `data` may then point to a different allocation.
839 vm_size_t user_size
= size
;
840 kasan_check_free((vm_address_t
)data
, size
, KASAN_HEAP_KALLOC
);
841 data
= (void *)kasan_dealloc((vm_address_t
)data
, &size
);
842 kasan_free(&data
, &size
, KASAN_HEAP_KALLOC
, NULL
, user_size
, true);
848 if (size
< MAX_SIZE_ZDLUT
) {
849 z
= get_zone_dlut(size
);
850 } else if (size
< kalloc_max_prerounded
) {
851 z
= get_zone_search(size
, k_zindex_start
);
853 /* if size was too large for a zone, then use kmem_free */
855 vm_map_t alloc_map
= kernel_map
;
857 if ((((vm_offset_t
) data
) >= kalloc_map_min
) && (((vm_offset_t
) data
) <= kalloc_map_max
)) {
858 alloc_map
= kalloc_map
;
860 if (size
> kalloc_largest_allocated
) {
861 panic("kfree: size %lu > kalloc_largest_allocated %lu", (unsigned long)size
, (unsigned long)kalloc_largest_allocated
);
863 kmem_free(alloc_map
, (vm_offset_t
)data
, size
);
866 kalloc_large_total
-= size
;
867 kalloc_large_inuse
--;
872 DTRACE_VM3(kfree
, vm_size_t
, size
, vm_size_t
, size
, void*, data
);
875 KALLOC_ZINFO_SFREE(size
);
879 /* free to the appropriate zone */
881 if (size
> z
->elem_size
) {
882 panic("%s: z %p (%s) but requested size %lu", __func__
,
883 z
, z
->zone_name
, (unsigned long)size
);
886 assert(size
<= z
->elem_size
);
888 DTRACE_VM3(kfree
, vm_size_t
, size
, vm_size_t
, z
->elem_size
, void*, data
);
898 if (size
< MAX_SIZE_ZDLUT
) {
899 return get_zone_dlut(size
);
901 if (size
<= kalloc_max
) {
902 return get_zone_search(size
, k_zindex_start
);
912 queue_init(&OSMalloc_tag_list
);
914 OSMalloc_tag_lck_grp
= lck_grp_alloc_init("OSMalloc_tag", LCK_GRP_ATTR_NULL
);
915 lck_mtx_init(&OSMalloc_tag_lock
, OSMalloc_tag_lck_grp
, LCK_ATTR_NULL
);
925 OSMTag
= (OSMallocTag
)kalloc(sizeof(*OSMTag
));
927 bzero((void *)OSMTag
, sizeof(*OSMTag
));
929 if (flags
& OSMT_PAGEABLE
) {
930 OSMTag
->OSMT_attr
= OSMT_ATTR_PAGEABLE
;
933 OSMTag
->OSMT_refcnt
= 1;
935 strlcpy(OSMTag
->OSMT_name
, str
, OSMT_MAX_NAME
);
937 OSMalloc_tag_spin_lock();
938 enqueue_tail(&OSMalloc_tag_list
, (queue_entry_t
)OSMTag
);
939 OSMalloc_tag_unlock();
940 OSMTag
->OSMT_state
= OSMT_VALID
;
948 if (!((tag
->OSMT_state
& OSMT_VALID_MASK
) == OSMT_VALID
)) {
949 panic("OSMalloc_Tagref():'%s' has bad state 0x%08X\n", tag
->OSMT_name
, tag
->OSMT_state
);
952 (void)hw_atomic_add(&tag
->OSMT_refcnt
, 1);
959 if (!((tag
->OSMT_state
& OSMT_VALID_MASK
) == OSMT_VALID
)) {
960 panic("OSMalloc_Tagref():'%s' has bad state 0x%08X\n", tag
->OSMT_name
, tag
->OSMT_state
);
963 if (hw_atomic_sub(&tag
->OSMT_refcnt
, 1) == 0) {
964 if (hw_compare_and_store(OSMT_VALID
| OSMT_RELEASED
, OSMT_VALID
| OSMT_RELEASED
, &tag
->OSMT_state
)) {
965 OSMalloc_tag_spin_lock();
966 (void)remque((queue_entry_t
)tag
);
967 OSMalloc_tag_unlock();
968 kfree(tag
, sizeof(*tag
));
970 panic("OSMalloc_Tagrele():'%s' has refcnt 0\n", tag
->OSMT_name
);
979 if (!hw_compare_and_store(OSMT_VALID
, OSMT_VALID
| OSMT_RELEASED
, &tag
->OSMT_state
)) {
980 panic("OSMalloc_Tagfree():'%s' has bad state 0x%08X \n", tag
->OSMT_name
, tag
->OSMT_state
);
983 if (hw_atomic_sub(&tag
->OSMT_refcnt
, 1) == 0) {
984 OSMalloc_tag_spin_lock();
985 (void)remque((queue_entry_t
)tag
);
986 OSMalloc_tag_unlock();
987 kfree(tag
, sizeof(*tag
));
999 OSMalloc_Tagref(tag
);
1000 if ((tag
->OSMT_attr
& OSMT_PAGEABLE
)
1001 && (size
& ~PAGE_MASK
)) {
1002 if ((kr
= kmem_alloc_pageable_external(kernel_map
, (vm_offset_t
*)&addr
, size
)) != KERN_SUCCESS
) {
1006 addr
= kalloc_tag_bt((vm_size_t
)size
, VM_KERN_MEMORY_KALLOC
);
1010 OSMalloc_Tagrele(tag
);
1023 if (tag
->OSMT_attr
& OSMT_PAGEABLE
) {
1027 OSMalloc_Tagref(tag
);
1028 /* XXX: use non-blocking kalloc for now */
1029 addr
= kalloc_noblock_tag_bt((vm_size_t
)size
, VM_KERN_MEMORY_KALLOC
);
1031 OSMalloc_Tagrele(tag
);
1044 if (tag
->OSMT_attr
& OSMT_PAGEABLE
) {
1048 OSMalloc_Tagref(tag
);
1049 addr
= kalloc_noblock_tag_bt((vm_size_t
)size
, VM_KERN_MEMORY_KALLOC
);
1051 OSMalloc_Tagrele(tag
);
1063 if ((tag
->OSMT_attr
& OSMT_PAGEABLE
)
1064 && (size
& ~PAGE_MASK
)) {
1065 kmem_free(kernel_map
, (vm_offset_t
)addr
, size
);
1070 OSMalloc_Tagrele(tag
);
1077 return (uint32_t)kalloc_size(addr
);