2 * Copyright (c) 2000-2011 Apple Computer, Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
32 * Mach Operating System
33 * Copyright (c) 1991,1990,1989,1988,1987 Carnegie Mellon University
34 * All Rights Reserved.
36 * Permission to use, copy, modify and distribute this software and its
37 * documentation is hereby granted, provided that both the copyright
38 * notice and this permission notice appear in all copies of the
39 * software, derivative works or modified versions, and any portions
40 * thereof, and that both notices appear in supporting documentation.
42 * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS"
43 * CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR
44 * ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.
46 * Carnegie Mellon requests users of this software to return to
48 * Software Distribution Coordinator or Software.Distribution@CS.CMU.EDU
49 * School of Computer Science
50 * Carnegie Mellon University
51 * Pittsburgh PA 15213-3890
53 * any improvements or extensions that they make and grant Carnegie Mellon
54 * the rights to redistribute these changes.
60 * Author: Avadis Tevanian, Jr.
63 * General kernel memory allocator. This allocator is designed
64 * to be used by the kernel to manage dynamic memory fast.
67 #include <zone_debug.h>
69 #include <mach/boolean.h>
71 #include <mach/machine/vm_types.h>
72 #include <mach/vm_param.h>
73 #include <kern/misc_protos.h>
74 #include <kern/zalloc.h>
75 #include <kern/kalloc.h>
76 #include <kern/ledger.h>
77 #include <vm/vm_kern.h>
78 #include <vm/vm_object.h>
79 #include <vm/vm_map.h>
80 #include <libkern/OSMalloc.h>
81 #include <sys/kdebug.h>
83 #include <san/kasan.h>
86 zone_t
kalloc_zone(vm_size_t
);
89 #define KALLOC_MAP_SIZE_MIN (16 * 1024 * 1024)
90 #define KALLOC_MAP_SIZE_MAX (128 * 1024 * 1024)
93 vm_size_t kalloc_max_prerounded
;
94 vm_size_t kalloc_kernmap_size
; /* size of kallocs that can come from kernel map */
96 /* how many times we couldn't allocate out of kalloc_map and fell back to kernel_map */
97 unsigned long kalloc_fallback_count
;
99 uint_t kalloc_large_inuse
;
100 vm_size_t kalloc_large_total
;
101 vm_size_t kalloc_large_max
;
102 vm_size_t kalloc_largest_allocated
= 0;
103 uint64_t kalloc_large_sum
;
105 int kalloc_fake_zone_index
= -1; /* index of our fake zone in statistics arrays */
107 vm_offset_t kalloc_map_min
;
108 vm_offset_t kalloc_map_max
;
112 * Diagnostic code to track mutexes separately rather than via the 2^ zones
118 KALLOC_ZINFO_SALLOC(vm_size_t bytes
)
120 thread_t thr
= current_thread();
121 ledger_debit(thr
->t_ledger
, task_ledgers
.tkm_shared
, bytes
);
125 KALLOC_ZINFO_SFREE(vm_size_t bytes
)
127 thread_t thr
= current_thread();
128 ledger_credit(thr
->t_ledger
, task_ledgers
.tkm_shared
, bytes
);
132 * All allocations of size less than kalloc_max are rounded to the next nearest
133 * sized zone. This allocator is built on top of the zone allocator. A zone
134 * is created for each potential size that we are willing to get in small
137 * We assume that kalloc_max is not greater than 64K;
139 * Note that kalloc_max is somewhat confusingly named. It represents the first
140 * power of two for which no zone exists. kalloc_max_prerounded is the
141 * smallest allocation size, before rounding, for which no zone exists.
143 * Also if the allocation size is more than kalloc_kernmap_size then allocate
144 * from kernel map rather than kalloc_map.
147 #define KALLOC_MINALIGN (1 << KALLOC_LOG2_MINALIGN)
148 #define KiB(x) (1024 * (x))
151 * The k_zone_config table defines the configuration of zones on various platforms.
152 * The currently defined list of zones and their per-CPU caching behavior are as
153 * follows (X:zone not present; N:zone present no cpu-caching; Y:zone present with cpu-caching):
155 * Size macOS(64-bit) embedded(32-bit) embedded(64-bit)
156 *-------- ---------------- ---------------- ----------------
199 static const struct kalloc_zone_config
{
202 const char *kzc_name
;
203 } k_zone_config
[] = {
204 #define KZC_ENTRY(SIZE, caching) { .kzc_caching = (caching), .kzc_size = (SIZE), .kzc_name = "kalloc." #SIZE }
208 #if KALLOC_MINSIZE == 16 && KALLOC_LOG2_MINALIGN == 4
209 /* Zone config for embedded 64-bit platforms */
216 KZC_ENTRY(128, true),
217 KZC_ENTRY(160, true),
218 KZC_ENTRY(192, true),
219 KZC_ENTRY(224, true),
220 KZC_ENTRY(256, true),
221 KZC_ENTRY(288, true),
222 KZC_ENTRY(368, true),
223 KZC_ENTRY(400, true),
224 KZC_ENTRY(512, true),
225 KZC_ENTRY(576, false),
226 KZC_ENTRY(768, false),
227 KZC_ENTRY(1024, true),
228 KZC_ENTRY(1152, false),
229 KZC_ENTRY(1280, false),
230 KZC_ENTRY(1664, false),
231 KZC_ENTRY(2048, false),
232 KZC_ENTRY(4096, false),
233 KZC_ENTRY(6144, false),
234 KZC_ENTRY(8192, false),
235 KZC_ENTRY(16384, false),
236 KZC_ENTRY(32768, false),
238 #elif KALLOC_MINSIZE == 8 && KALLOC_LOG2_MINALIGN == 3
239 /* Zone config for embedded 32-bit platforms */
249 KZC_ENTRY(112, true),
250 KZC_ENTRY(128, true),
251 KZC_ENTRY(192, true),
252 KZC_ENTRY(256, true),
253 KZC_ENTRY(288, true),
254 KZC_ENTRY(384, true),
255 KZC_ENTRY(440, true),
256 KZC_ENTRY(512, true),
257 KZC_ENTRY(576, false),
258 KZC_ENTRY(768, false),
259 KZC_ENTRY(1024, true),
260 KZC_ENTRY(1152, false),
261 KZC_ENTRY(1280, false),
262 KZC_ENTRY(1536, false),
263 KZC_ENTRY(2048, false),
264 KZC_ENTRY(2128, false),
265 KZC_ENTRY(3072, false),
266 KZC_ENTRY(4096, false),
267 KZC_ENTRY(6144, false),
268 KZC_ENTRY(8192, false),
269 KZC_ENTRY(16384, false),
270 KZC_ENTRY(32768, false),
273 #error missing or invalid zone size parameters for kalloc
276 #else /* CONFIG_EMBEDDED */
278 /* Zone config for macOS 64-bit platforms */
285 KZC_ENTRY(128, true),
286 KZC_ENTRY(160, true),
287 KZC_ENTRY(192, true),
288 KZC_ENTRY(224, true),
289 KZC_ENTRY(256, true),
290 KZC_ENTRY(288, true),
291 KZC_ENTRY(368, true),
292 KZC_ENTRY(400, true),
293 KZC_ENTRY(512, true),
294 KZC_ENTRY(576, true),
295 KZC_ENTRY(768, true),
296 KZC_ENTRY(1024, true),
297 KZC_ENTRY(1152, false),
298 KZC_ENTRY(1280, false),
299 KZC_ENTRY(1664, false),
300 KZC_ENTRY(2048, true),
301 KZC_ENTRY(4096, true),
302 KZC_ENTRY(6144, false),
303 KZC_ENTRY(8192, true),
304 KZC_ENTRY(12288, false),
305 KZC_ENTRY(16384, false)
307 #endif /* CONFIG_EMBEDDED */
312 #define MAX_K_ZONE (int)(sizeof(k_zone_config) / sizeof(k_zone_config[0]))
315 * Many kalloc() allocations are for small structures containing a few
316 * pointers and longs - the k_zone_dlut[] direct lookup table, indexed by
317 * size normalized to the minimum alignment, finds the right zone index
318 * for them in one dereference.
321 #define INDEX_ZDLUT(size) \
322 (((size) + KALLOC_MINALIGN - 1) / KALLOC_MINALIGN)
323 #define N_K_ZDLUT (2048 / KALLOC_MINALIGN)
324 /* covers sizes [0 .. 2048 - KALLOC_MINALIGN] */
325 #define MAX_SIZE_ZDLUT ((N_K_ZDLUT - 1) * KALLOC_MINALIGN)
327 static int8_t k_zone_dlut
[N_K_ZDLUT
]; /* table of indices into k_zone[] */
330 * If there's no hit in the DLUT, then start searching from k_zindex_start.
332 static int k_zindex_start
;
334 static zone_t k_zone
[MAX_K_ZONE
];
336 /* #define KALLOC_DEBUG 1 */
338 /* forward declarations */
340 lck_grp_t kalloc_lck_grp
;
341 lck_mtx_t kalloc_lock
;
343 #define kalloc_spin_lock() lck_mtx_lock_spin(&kalloc_lock)
344 #define kalloc_unlock() lck_mtx_unlock(&kalloc_lock)
347 /* OSMalloc local data declarations */
349 queue_head_t OSMalloc_tag_list
;
351 lck_grp_t
*OSMalloc_tag_lck_grp
;
352 lck_mtx_t OSMalloc_tag_lock
;
354 #define OSMalloc_tag_spin_lock() lck_mtx_lock_spin(&OSMalloc_tag_lock)
355 #define OSMalloc_tag_unlock() lck_mtx_unlock(&OSMalloc_tag_lock)
358 /* OSMalloc forward declarations */
359 void OSMalloc_init(void);
360 void OSMalloc_Tagref(OSMallocTag tag
);
361 void OSMalloc_Tagrele(OSMallocTag tag
);
364 * Initialize the memory allocator. This should be called only
365 * once on a system wide basis (i.e. first processor to get here
366 * does the initialization).
368 * This initializes all of the zones.
375 kern_return_t retval
;
377 vm_size_t size
, kalloc_map_size
;
378 vm_map_kernel_flags_t vmk_flags
;
381 * Scale the kalloc_map_size to physical memory size: stay below
382 * 1/8th the total zone map size, or 128 MB (for a 32-bit kernel).
384 kalloc_map_size
= (vm_size_t
)(sane_size
>> 5);
386 if (kalloc_map_size
> KALLOC_MAP_SIZE_MAX
) {
387 kalloc_map_size
= KALLOC_MAP_SIZE_MAX
;
389 #endif /* !__LP64__ */
390 if (kalloc_map_size
< KALLOC_MAP_SIZE_MIN
) {
391 kalloc_map_size
= KALLOC_MAP_SIZE_MIN
;
394 vmk_flags
= VM_MAP_KERNEL_FLAGS_NONE
;
395 vmk_flags
.vmkf_permanent
= TRUE
;
397 retval
= kmem_suballoc(kernel_map
, &min
, kalloc_map_size
,
401 VM_KERN_MEMORY_KALLOC
,
404 if (retval
!= KERN_SUCCESS
) {
405 panic("kalloc_init: kmem_suballoc failed");
408 kalloc_map_min
= min
;
409 kalloc_map_max
= min
+ kalloc_map_size
- 1;
411 kalloc_max
= (k_zone_config
[MAX_K_ZONE
- 1].kzc_size
<< 1);
412 if (kalloc_max
< KiB(16)) {
413 kalloc_max
= KiB(16);
415 assert(kalloc_max
<= KiB(64)); /* assumption made in size arrays */
417 kalloc_max_prerounded
= kalloc_max
/ 2 + 1;
418 /* allocations larger than 16 times kalloc_max go directly to kernel map */
419 kalloc_kernmap_size
= (kalloc_max
* 16) + 1;
420 kalloc_largest_allocated
= kalloc_kernmap_size
;
423 * Allocate a zone for each size we are going to handle.
425 for (int i
= 0; i
< MAX_K_ZONE
&& (size
= k_zone_config
[i
].kzc_size
) < kalloc_max
; i
++) {
426 k_zone
[i
] = zinit(size
, size
, size
, k_zone_config
[i
].kzc_name
);
429 * Don't charge the caller for the allocation, as we aren't sure how
430 * the memory will be handled.
432 zone_change(k_zone
[i
], Z_CALLERACCT
, FALSE
);
434 if (zone_tagging_on
) {
435 zone_change(k_zone
[i
], Z_TAGS_ENABLED
, TRUE
);
438 zone_change(k_zone
[i
], Z_KASAN_QUARANTINE
, FALSE
);
439 if (k_zone_config
[i
].kzc_caching
) {
440 zone_change(k_zone
[i
], Z_CACHING_ENABLED
, TRUE
);
445 * Build the Direct LookUp Table for small allocations
448 for (int i
= 0; i
<= N_K_ZDLUT
; i
++, size
+= KALLOC_MINALIGN
) {
451 while ((vm_size_t
)k_zone_config
[zindex
].kzc_size
< size
) {
455 if (i
== N_K_ZDLUT
) {
456 k_zindex_start
= zindex
;
459 k_zone_dlut
[i
] = (int8_t)zindex
;
463 printf("kalloc_init: k_zindex_start %d\n", k_zindex_start
);
466 * Do a quick synthesis to see how well/badly we can
467 * find-a-zone for a given size.
468 * Useful when debugging/tweaking the array of zone sizes.
469 * Cache misses probably more critical than compare-branches!
471 for (int i
= 0; i
< MAX_K_ZONE
; i
++) {
472 vm_size_t testsize
= (vm_size_t
)k_zone_config
[i
].kzc_size
- 1;
476 if (testsize
< MAX_SIZE_ZDLUT
) {
477 compare
+= 1; /* 'if' (T) */
479 long dindex
= INDEX_ZDLUT(testsize
);
480 zindex
= (int)k_zone_dlut
[dindex
];
481 } else if (testsize
< kalloc_max_prerounded
) {
482 compare
+= 2; /* 'if' (F), 'if' (T) */
484 zindex
= k_zindex_start
;
485 while ((vm_size_t
)k_zone_config
[zindex
].kzc_size
< testsize
) {
487 compare
++; /* 'while' (T) */
489 compare
++; /* 'while' (F) */
491 break; /* not zone-backed */
493 zone_t z
= k_zone
[zindex
];
494 printf("kalloc_init: req size %4lu: %11s took %d compare%s\n",
495 (unsigned long)testsize
, z
->zone_name
, compare
,
496 compare
== 1 ? "" : "s");
500 lck_grp_init(&kalloc_lck_grp
, "kalloc.large", LCK_GRP_ATTR_NULL
);
501 lck_mtx_init(&kalloc_lock
, &kalloc_lck_grp
, LCK_ATTR_NULL
);
504 lck_mtx_zone
= zinit(sizeof(struct _lck_mtx_
), 1024 * 256, 4096, "lck_mtx");
509 * Given an allocation size, return the kalloc zone it belongs to.
510 * Direct LookUp Table variant.
512 static __inline zone_t
513 get_zone_dlut(vm_size_t size
)
515 long dindex
= INDEX_ZDLUT(size
);
516 int zindex
= (int)k_zone_dlut
[dindex
];
517 return k_zone
[zindex
];
520 /* As above, but linear search k_zone_config[] for the next zone that fits. */
522 static __inline zone_t
523 get_zone_search(vm_size_t size
, int zindex
)
525 assert(size
< kalloc_max_prerounded
);
527 while ((vm_size_t
)k_zone_config
[zindex
].kzc_size
< size
) {
531 assert(zindex
< MAX_K_ZONE
&&
532 (vm_size_t
)k_zone_config
[zindex
].kzc_size
< kalloc_max
);
534 return k_zone
[zindex
];
538 vm_map_lookup_kalloc_entry_locked(
543 vm_map_entry_t vm_entry
= NULL
;
545 ret
= vm_map_lookup_entry(map
, (vm_map_offset_t
)addr
, &vm_entry
);
547 panic("Attempting to lookup/free an address not allocated via kalloc! (vm_map_lookup_entry() failed map: %p, addr: %p)\n",
550 if (vm_entry
->vme_start
!= (vm_map_offset_t
)addr
) {
551 panic("Attempting to lookup/free the middle of a kalloc'ed element! (map: %p, addr: %p, entry: %p)\n",
552 map
, addr
, vm_entry
);
554 if (!vm_entry
->vme_atomic
) {
555 panic("Attempting to lookup/free an address not managed by kalloc! (map: %p, addr: %p, entry: %p)\n",
556 map
, addr
, vm_entry
);
558 return vm_entry
->vme_end
- vm_entry
->vme_start
;
563 * KASAN kalloc stashes the original user-requested size away in the poisoned
564 * area. Return that directly.
567 kalloc_size(void *addr
)
569 (void)vm_map_lookup_kalloc_entry_locked
; /* silence warning */
570 return kasan_user_size((vm_offset_t
)addr
);
580 size
= zone_element_size(addr
, NULL
);
584 if (((vm_offset_t
)addr
>= kalloc_map_min
) && ((vm_offset_t
)addr
< kalloc_map_max
)) {
589 vm_map_lock_read(map
);
590 size
= vm_map_lookup_kalloc_entry_locked(map
, addr
);
591 vm_map_unlock_read(map
);
603 if (size
< MAX_SIZE_ZDLUT
) {
604 z
= get_zone_dlut(size
);
608 if (size
< kalloc_max_prerounded
) {
609 z
= get_zone_search(size
, k_zindex_start
);
613 if (size
>= kalloc_kernmap_size
) {
619 return vm_map_round_page(size
, VM_MAP_PAGE_MASK(map
));
624 (kfree_addr
)(void *addr
)
626 vm_size_t origsz
= kalloc_size(addr
);
640 size
= zone_element_size(addr
, &z
);
642 DTRACE_VM3(kfree
, vm_size_t
, -1, vm_size_t
, z
->elem_size
, void*, addr
);
647 if (((vm_offset_t
)addr
>= kalloc_map_min
) && ((vm_offset_t
)addr
< kalloc_map_max
)) {
652 if ((vm_offset_t
)addr
< VM_MIN_KERNEL_AND_KEXT_ADDRESS
) {
653 panic("kfree on an address not in the kernel & kext address range! addr: %p\n", addr
);
657 size
= vm_map_lookup_kalloc_entry_locked(map
, addr
);
658 ret
= vm_map_remove_locked(map
,
659 vm_map_trunc_page((vm_map_offset_t
)addr
,
660 VM_MAP_PAGE_MASK(map
)),
661 vm_map_round_page((vm_map_offset_t
)addr
+ size
,
662 VM_MAP_PAGE_MASK(map
)),
663 VM_MAP_REMOVE_KUNWIRE
);
664 if (ret
!= KERN_SUCCESS
) {
665 panic("vm_map_remove_locked() failed for kalloc vm_entry! addr: %p, map: %p ret: %d\n",
669 DTRACE_VM3(kfree
, vm_size_t
, -1, vm_size_t
, size
, void*, addr
);
672 assert(kalloc_large_total
>= size
);
673 kalloc_large_total
-= size
;
674 kalloc_large_inuse
--;
677 KALLOC_ZINFO_SFREE(size
);
686 vm_allocation_site_t
*site
)
693 tag
= VM_KERN_MEMORY_KALLOC
;
697 /* expand the allocation to accomodate redzones */
698 vm_size_t req_size
= size
;
699 size
= kasan_alloc_resize(req_size
);
702 if (size
< MAX_SIZE_ZDLUT
) {
703 z
= get_zone_dlut(size
);
704 } else if (size
< kalloc_max_prerounded
) {
705 z
= get_zone_search(size
, k_zindex_start
);
708 * If size is too large for a zone, then use kmem_alloc.
709 * (We use kmem_alloc instead of kmem_alloc_kobject so that
710 * krealloc can use kmem_realloc.)
714 /* kmem_alloc could block so we return if noblock */
720 /* large allocation - use guard pages instead of small redzones */
721 size
= round_page(req_size
+ 2 * PAGE_SIZE
);
722 assert(size
>= MAX_SIZE_ZDLUT
&& size
>= kalloc_max_prerounded
);
724 size
= round_page(size
);
727 if (size
>= kalloc_kernmap_size
) {
728 alloc_map
= kernel_map
;
730 alloc_map
= kalloc_map
;
734 tag
= vm_tag_alloc(site
);
737 if (kmem_alloc_flags(alloc_map
, (vm_offset_t
*)&addr
, size
, tag
, KMA_ATOMIC
) != KERN_SUCCESS
) {
738 if (alloc_map
!= kernel_map
) {
739 if (kalloc_fallback_count
++ == 0) {
740 printf("%s: falling back to kernel_map\n", __func__
);
742 if (kmem_alloc_flags(kernel_map
, (vm_offset_t
*)&addr
, size
, tag
, KMA_ATOMIC
) != KERN_SUCCESS
) {
753 * Thread-safe version of the workaround for 4740071
756 if (size
> kalloc_largest_allocated
) {
757 kalloc_largest_allocated
= size
;
760 kalloc_large_inuse
++;
761 assert(kalloc_large_total
+ size
>= kalloc_large_total
); /* no wrap around */
762 kalloc_large_total
+= size
;
763 kalloc_large_sum
+= size
;
765 if (kalloc_large_total
> kalloc_large_max
) {
766 kalloc_large_max
= kalloc_large_total
;
771 KALLOC_ZINFO_SALLOC(size
);
774 /* fixup the return address to skip the redzone */
775 addr
= (void *)kasan_alloc((vm_offset_t
)addr
, size
, req_size
, PAGE_SIZE
);
779 DTRACE_VM3(kalloc
, vm_size_t
, size
, vm_size_t
, *psize
, void*, addr
);
783 if (size
> z
->elem_size
) {
784 panic("%s: z %p (%s) but requested size %lu", __func__
,
785 z
, z
->zone_name
, (unsigned long)size
);
789 assert(size
<= z
->elem_size
);
792 if (z
->tags
&& site
) {
793 tag
= vm_tag_alloc(site
);
794 if (!canblock
&& !vm_allocation_zone_totals
[tag
]) {
795 tag
= VM_KERN_MEMORY_KALLOC
;
800 addr
= zalloc_canblock_tag(z
, canblock
, size
, tag
);
803 /* fixup the return address to skip the redzone */
804 addr
= (void *)kasan_alloc((vm_offset_t
)addr
, z
->elem_size
, req_size
, KASAN_GUARD_SIZE
);
806 /* For KASan, the redzone lives in any additional space, so don't
807 * expand the allocation. */
809 *psize
= z
->elem_size
;
812 DTRACE_VM3(kalloc
, vm_size_t
, size
, vm_size_t
, *psize
, void*, addr
);
823 return kalloc_tag_bt(size
, VM_KERN_MEMORY_KALLOC
);
835 * Resize back to the real allocation size and hand off to the KASan
836 * quarantine. `data` may then point to a different allocation.
838 vm_size_t user_size
= size
;
839 kasan_check_free((vm_address_t
)data
, size
, KASAN_HEAP_KALLOC
);
840 data
= (void *)kasan_dealloc((vm_address_t
)data
, &size
);
841 kasan_free(&data
, &size
, KASAN_HEAP_KALLOC
, NULL
, user_size
, true);
847 if (size
< MAX_SIZE_ZDLUT
) {
848 z
= get_zone_dlut(size
);
849 } else if (size
< kalloc_max_prerounded
) {
850 z
= get_zone_search(size
, k_zindex_start
);
852 /* if size was too large for a zone, then use kmem_free */
854 vm_map_t alloc_map
= kernel_map
;
856 if ((((vm_offset_t
) data
) >= kalloc_map_min
) && (((vm_offset_t
) data
) <= kalloc_map_max
)) {
857 alloc_map
= kalloc_map
;
859 if (size
> kalloc_largest_allocated
) {
860 panic("kfree: size %lu > kalloc_largest_allocated %lu", (unsigned long)size
, (unsigned long)kalloc_largest_allocated
);
862 kmem_free(alloc_map
, (vm_offset_t
)data
, size
);
865 assert(kalloc_large_total
>= size
);
866 kalloc_large_total
-= size
;
867 kalloc_large_inuse
--;
872 DTRACE_VM3(kfree
, vm_size_t
, size
, vm_size_t
, size
, void*, data
);
875 KALLOC_ZINFO_SFREE(size
);
879 /* free to the appropriate zone */
881 if (size
> z
->elem_size
) {
882 panic("%s: z %p (%s) but requested size %lu", __func__
,
883 z
, z
->zone_name
, (unsigned long)size
);
886 assert(size
<= z
->elem_size
);
888 DTRACE_VM3(kfree
, vm_size_t
, size
, vm_size_t
, z
->elem_size
, void*, data
);
898 if (size
< MAX_SIZE_ZDLUT
) {
899 return get_zone_dlut(size
);
901 if (size
<= kalloc_max
) {
902 return get_zone_search(size
, k_zindex_start
);
912 queue_init(&OSMalloc_tag_list
);
914 OSMalloc_tag_lck_grp
= lck_grp_alloc_init("OSMalloc_tag", LCK_GRP_ATTR_NULL
);
915 lck_mtx_init(&OSMalloc_tag_lock
, OSMalloc_tag_lck_grp
, LCK_ATTR_NULL
);
925 OSMTag
= (OSMallocTag
)kalloc(sizeof(*OSMTag
));
927 bzero((void *)OSMTag
, sizeof(*OSMTag
));
929 if (flags
& OSMT_PAGEABLE
) {
930 OSMTag
->OSMT_attr
= OSMT_ATTR_PAGEABLE
;
933 OSMTag
->OSMT_refcnt
= 1;
935 strlcpy(OSMTag
->OSMT_name
, str
, OSMT_MAX_NAME
);
937 OSMalloc_tag_spin_lock();
938 enqueue_tail(&OSMalloc_tag_list
, (queue_entry_t
)OSMTag
);
939 OSMalloc_tag_unlock();
940 OSMTag
->OSMT_state
= OSMT_VALID
;
948 if (!((tag
->OSMT_state
& OSMT_VALID_MASK
) == OSMT_VALID
)) {
949 panic("OSMalloc_Tagref():'%s' has bad state 0x%08X\n", tag
->OSMT_name
, tag
->OSMT_state
);
952 os_atomic_inc(&tag
->OSMT_refcnt
, relaxed
);
959 if (!((tag
->OSMT_state
& OSMT_VALID_MASK
) == OSMT_VALID
)) {
960 panic("OSMalloc_Tagref():'%s' has bad state 0x%08X\n", tag
->OSMT_name
, tag
->OSMT_state
);
963 if (os_atomic_dec(&tag
->OSMT_refcnt
, relaxed
) == 0) {
964 if (os_atomic_cmpxchg(&tag
->OSMT_state
, OSMT_VALID
| OSMT_RELEASED
, OSMT_VALID
| OSMT_RELEASED
, acq_rel
)) {
965 OSMalloc_tag_spin_lock();
966 (void)remque((queue_entry_t
)tag
);
967 OSMalloc_tag_unlock();
968 kfree(tag
, sizeof(*tag
));
970 panic("OSMalloc_Tagrele():'%s' has refcnt 0\n", tag
->OSMT_name
);
979 if (!os_atomic_cmpxchg(&tag
->OSMT_state
, OSMT_VALID
, OSMT_VALID
| OSMT_RELEASED
, acq_rel
)) {
980 panic("OSMalloc_Tagfree():'%s' has bad state 0x%08X \n", tag
->OSMT_name
, tag
->OSMT_state
);
983 if (os_atomic_dec(&tag
->OSMT_refcnt
, relaxed
) == 0) {
984 OSMalloc_tag_spin_lock();
985 (void)remque((queue_entry_t
)tag
);
986 OSMalloc_tag_unlock();
987 kfree(tag
, sizeof(*tag
));
999 OSMalloc_Tagref(tag
);
1000 if ((tag
->OSMT_attr
& OSMT_PAGEABLE
)
1001 && (size
& ~PAGE_MASK
)) {
1002 if ((kr
= kmem_alloc_pageable_external(kernel_map
, (vm_offset_t
*)&addr
, size
)) != KERN_SUCCESS
) {
1006 addr
= kalloc_tag_bt((vm_size_t
)size
, VM_KERN_MEMORY_KALLOC
);
1010 OSMalloc_Tagrele(tag
);
1023 if (tag
->OSMT_attr
& OSMT_PAGEABLE
) {
1027 OSMalloc_Tagref(tag
);
1028 /* XXX: use non-blocking kalloc for now */
1029 addr
= kalloc_noblock_tag_bt((vm_size_t
)size
, VM_KERN_MEMORY_KALLOC
);
1031 OSMalloc_Tagrele(tag
);
1044 if (tag
->OSMT_attr
& OSMT_PAGEABLE
) {
1048 OSMalloc_Tagref(tag
);
1049 addr
= kalloc_noblock_tag_bt((vm_size_t
)size
, VM_KERN_MEMORY_KALLOC
);
1051 OSMalloc_Tagrele(tag
);
1063 if ((tag
->OSMT_attr
& OSMT_PAGEABLE
)
1064 && (size
& ~PAGE_MASK
)) {
1065 kmem_free(kernel_map
, (vm_offset_t
)addr
, size
);
1070 OSMalloc_Tagrele(tag
);
1077 return (uint32_t)kalloc_size(addr
);