1 /*- 2 * SPDX-License-Identifier: BSD-3-Clause 3 * 4 * Copyright (c) 1987, 1993 5 * The Regents of the University of California. 6 * Copyright (c) 2005, 2009 Robert N. M. Watson 7 * All rights reserved. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 3. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * @(#)malloc.h 8.5 (Berkeley) 5/3/95 34 * $FreeBSD$ 35 */ 36 37 #ifndef _SYS_MALLOC_H_ 38 #define _SYS_MALLOC_H_ 39 40 #include <sys/param.h> 41 #ifdef _KERNEL 42 #include <sys/systm.h> 43 #endif 44 #include <sys/queue.h> 45 #include <sys/_lock.h> 46 #include <sys/_mutex.h> 47 #include <machine/_limits.h> 48 49 #define MINALLOCSIZE UMA_SMALLEST_UNIT 50 51 /* 52 * Flags to memory allocation functions. 53 */ 54 #define M_NOWAIT 0x0001 /* do not block */ 55 #define M_WAITOK 0x0002 /* ok to block */ 56 #define M_ZERO 0x0100 /* bzero the allocation */ 57 #define M_NOVM 0x0200 /* don't ask VM for pages */ 58 #define M_USE_RESERVE 0x0400 /* can alloc out of reserve memory */ 59 #define M_NODUMP 0x0800 /* don't dump pages in this allocation */ 60 #define M_FIRSTFIT 0x1000 /* only for vmem, fast fit */ 61 #define M_BESTFIT 0x2000 /* only for vmem, low fragmentation */ 62 #define M_EXEC 0x4000 /* allocate executable space */ 63 #define M_NEXTFIT 0x8000 /* only for vmem, follow cursor */ 64 65 #define M_MAGIC 877983977 /* time when first defined :-) */ 66 67 /* 68 * Two malloc type structures are present: malloc_type, which is used by a 69 * type owner to declare the type, and malloc_type_internal, which holds 70 * malloc-owned statistics and other ABI-sensitive fields, such as the set of 71 * malloc statistics indexed by the compile-time MAXCPU constant. 72 * Applications should avoid introducing dependence on the allocator private 73 * data layout and size. 74 * 75 * The malloc_type ks_next field is protected by malloc_mtx. Other fields in 76 * malloc_type are static after initialization so unsynchronized. 77 * 78 * Statistics in malloc_type_stats are written only when holding a critical 79 * section and running on the CPU associated with the index into the stat 80 * array, but read lock-free resulting in possible (minor) races, which the 81 * monitoring app should take into account. 82 */ 83 struct malloc_type_stats { 84 uint64_t mts_memalloced; /* Bytes allocated on CPU. */ 85 uint64_t mts_memfreed; /* Bytes freed on CPU. */ 86 uint64_t mts_numallocs; /* Number of allocates on CPU. */ 87 uint64_t mts_numfrees; /* number of frees on CPU. */ 88 uint64_t mts_size; /* Bitmask of sizes allocated on CPU. */ 89 uint64_t _mts_reserved1; /* Reserved field. */ 90 uint64_t _mts_reserved2; /* Reserved field. */ 91 uint64_t _mts_reserved3; /* Reserved field. */ 92 }; 93 94 /* 95 * Index definitions for the mti_probes[] array. 96 */ 97 #define DTMALLOC_PROBE_MALLOC 0 98 #define DTMALLOC_PROBE_FREE 1 99 #define DTMALLOC_PROBE_MAX 2 100 101 struct malloc_type_internal { 102 uint32_t mti_probes[DTMALLOC_PROBE_MAX]; 103 /* DTrace probe ID array. */ 104 u_char mti_zone; 105 struct malloc_type_stats *mti_stats; 106 }; 107 108 /* 109 * Public data structure describing a malloc type. Private data is hung off 110 * of ks_handle to avoid encoding internal malloc(9) data structures in 111 * modules, which will statically allocate struct malloc_type. 112 */ 113 struct malloc_type { 114 struct malloc_type *ks_next; /* Next in global chain. */ 115 u_long ks_magic; /* Detect programmer error. */ 116 const char *ks_shortdesc; /* Printable type name. */ 117 void *ks_handle; /* Priv. data, was lo_class. */ 118 }; 119 120 /* 121 * Statistics structure headers for user space. The kern.malloc sysctl 122 * exposes a structure stream consisting of a stream header, then a series of 123 * malloc type headers and statistics structures (quantity maxcpus). For 124 * convenience, the kernel will provide the current value of maxcpus at the 125 * head of the stream. 126 */ 127 #define MALLOC_TYPE_STREAM_VERSION 0x00000001 128 struct malloc_type_stream_header { 129 uint32_t mtsh_version; /* Stream format version. */ 130 uint32_t mtsh_maxcpus; /* Value of MAXCPU for stream. */ 131 uint32_t mtsh_count; /* Number of records. */ 132 uint32_t _mtsh_pad; /* Pad/reserved field. */ 133 }; 134 135 #define MALLOC_MAX_NAME 32 136 struct malloc_type_header { 137 char mth_name[MALLOC_MAX_NAME]; 138 }; 139 140 #ifdef _KERNEL 141 #define MALLOC_DEFINE(type, shortdesc, longdesc) \ 142 struct malloc_type type[1] = { \ 143 { NULL, M_MAGIC, shortdesc, NULL } \ 144 }; \ 145 SYSINIT(type##_init, SI_SUB_KMEM, SI_ORDER_THIRD, malloc_init, \ 146 type); \ 147 SYSUNINIT(type##_uninit, SI_SUB_KMEM, SI_ORDER_ANY, \ 148 malloc_uninit, type) 149 150 #define MALLOC_DECLARE(type) \ 151 extern struct malloc_type type[1] 152 153 MALLOC_DECLARE(M_CACHE); 154 MALLOC_DECLARE(M_DEVBUF); 155 MALLOC_DECLARE(M_TEMP); 156 157 /* 158 * XXX this should be declared in <sys/uio.h>, but that tends to fail 159 * because <sys/uio.h> is included in a header before the source file 160 * has a chance to include <sys/malloc.h> to get MALLOC_DECLARE() defined. 161 */ 162 MALLOC_DECLARE(M_IOV); 163 164 struct domainset; 165 extern struct mtx malloc_mtx; 166 167 /* 168 * Function type used when iterating over the list of malloc types. 169 */ 170 typedef void malloc_type_list_func_t(struct malloc_type *, void *); 171 172 void contigfree(void *addr, unsigned long size, struct malloc_type *type); 173 void *contigmalloc(unsigned long size, struct malloc_type *type, int flags, 174 vm_paddr_t low, vm_paddr_t high, unsigned long alignment, 175 vm_paddr_t boundary) __malloc_like __result_use_check 176 __alloc_size(1) __alloc_align(6); 177 void *contigmalloc_domainset(unsigned long size, struct malloc_type *type, 178 struct domainset *ds, int flags, vm_paddr_t low, vm_paddr_t high, 179 unsigned long alignment, vm_paddr_t boundary) 180 __malloc_like __result_use_check __alloc_size(1) __alloc_align(7); 181 void free(void *addr, struct malloc_type *type); 182 void zfree(void *addr, struct malloc_type *type); 183 void free_domain(void *addr, struct malloc_type *type); 184 void *malloc(size_t size, struct malloc_type *type, int flags) __malloc_like 185 __result_use_check __alloc_size(1); 186 /* 187 * Try to optimize malloc(..., ..., M_ZERO) allocations by doing zeroing in 188 * place if the size is known at compilation time. 189 * 190 * Passing the flag down requires malloc to blindly zero the entire object. 191 * In practice a lot of the zeroing can be avoided if most of the object 192 * gets explicitly initialized after the allocation. Letting the compiler 193 * zero in place gives it the opportunity to take advantage of this state. 194 * 195 * Note that the operation is only applicable if both flags and size are 196 * known at compilation time. If M_ZERO is passed but M_WAITOK is not, the 197 * allocation can fail and a NULL check is needed. However, if M_WAITOK is 198 * passed we know the allocation must succeed and the check can be elided. 199 * 200 * _malloc_item = malloc(_size, type, (flags) &~ M_ZERO); 201 * if (((flags) & M_WAITOK) != 0 || _malloc_item != NULL) 202 * bzero(_malloc_item, _size); 203 * 204 * If the flag is set, the compiler knows the left side is always true, 205 * therefore the entire statement is true and the callsite is: 206 * 207 * _malloc_item = malloc(_size, type, (flags) &~ M_ZERO); 208 * bzero(_malloc_item, _size); 209 * 210 * If the flag is not set, the compiler knows the left size is always false 211 * and the NULL check is needed, therefore the callsite is: 212 * 213 * _malloc_item = malloc(_size, type, (flags) &~ M_ZERO); 214 * if (_malloc_item != NULL) 215 * bzero(_malloc_item, _size); 216 * 217 * The implementation is a macro because of what appears to be a clang 6 bug: 218 * an inline function variant ended up being compiled to a mere malloc call 219 * regardless of argument. gcc generates expected code (like the above). 220 */ 221 #define malloc(size, type, flags) ({ \ 222 void *_malloc_item; \ 223 size_t _size = (size); \ 224 if (__builtin_constant_p(size) && __builtin_constant_p(flags) &&\ 225 ((flags) & M_ZERO) != 0) { \ 226 _malloc_item = malloc(_size, type, (flags) &~ M_ZERO); \ 227 if (((flags) & M_WAITOK) != 0 || \ 228 __predict_true(_malloc_item != NULL)) \ 229 bzero(_malloc_item, _size); \ 230 } else { \ 231 _malloc_item = malloc(_size, type, flags); \ 232 } \ 233 _malloc_item; \ 234 }) 235 236 void *malloc_domainset(size_t size, struct malloc_type *type, 237 struct domainset *ds, int flags) __malloc_like __result_use_check 238 __alloc_size(1); 239 void *mallocarray(size_t nmemb, size_t size, struct malloc_type *type, 240 int flags) __malloc_like __result_use_check 241 __alloc_size2(1, 2); 242 void malloc_init(void *); 243 int malloc_last_fail(void); 244 void malloc_type_allocated(struct malloc_type *type, unsigned long size); 245 void malloc_type_freed(struct malloc_type *type, unsigned long size); 246 void malloc_type_list(malloc_type_list_func_t *, void *); 247 void malloc_uninit(void *); 248 void *realloc(void *addr, size_t size, struct malloc_type *type, int flags) 249 __result_use_check __alloc_size(2); 250 void *reallocf(void *addr, size_t size, struct malloc_type *type, int flags) 251 __result_use_check __alloc_size(2); 252 253 struct malloc_type *malloc_desc2type(const char *desc); 254 255 /* 256 * This is sqrt(SIZE_MAX+1), as s1*s2 <= SIZE_MAX 257 * if both s1 < MUL_NO_OVERFLOW and s2 < MUL_NO_OVERFLOW 258 */ 259 #define MUL_NO_OVERFLOW (1UL << (sizeof(size_t) * 8 / 2)) 260 static inline bool 261 WOULD_OVERFLOW(size_t nmemb, size_t size) 262 { 263 264 return ((nmemb >= MUL_NO_OVERFLOW || size >= MUL_NO_OVERFLOW) && 265 nmemb > 0 && __SIZE_T_MAX / nmemb < size); 266 } 267 #undef MUL_NO_OVERFLOW 268 #endif /* _KERNEL */ 269 270 #endif /* !_SYS_MALLOC_H_ */ 271