xref: /openbmc/linux/Documentation/core-api/memory-allocation.rst (revision 1ac731c529cd4d6adbce134754b51ff7d822b145)
1cd7198fcSTobin C. Harding.. _memory_allocation:
2acf0f57aSMatthew Wilcox
352272c92SMike Rapoport=======================
452272c92SMike RapoportMemory Allocation Guide
552272c92SMike Rapoport=======================
652272c92SMike Rapoport
752272c92SMike RapoportLinux provides a variety of APIs for memory allocation. You can
852272c92SMike Rapoportallocate small chunks using `kmalloc` or `kmem_cache_alloc` families,
952272c92SMike Rapoportlarge virtually contiguous areas using `vmalloc` and its derivatives,
1052272c92SMike Rapoportor you can directly request pages from the page allocator with
1152272c92SMike Rapoport`alloc_pages`. It is also possible to use more specialized allocators,
1252272c92SMike Rapoportfor instance `cma_alloc` or `zs_malloc`.
1352272c92SMike Rapoport
1452272c92SMike RapoportMost of the memory allocation APIs use GFP flags to express how that
1552272c92SMike Rapoportmemory should be allocated. The GFP acronym stands for "get free
1652272c92SMike Rapoportpages", the underlying memory allocation function.
1752272c92SMike Rapoport
1852272c92SMike RapoportDiversity of the allocation APIs combined with the numerous GFP flags
1952272c92SMike Rapoportmakes the question "How should I allocate memory?" not that easy to
2052272c92SMike Rapoportanswer, although very likely you should use
2152272c92SMike Rapoport
2252272c92SMike Rapoport::
2352272c92SMike Rapoport
2452272c92SMike Rapoport  kzalloc(<size>, GFP_KERNEL);
2552272c92SMike Rapoport
2652272c92SMike RapoportOf course there are cases when other allocation APIs and different GFP
2752272c92SMike Rapoportflags must be used.
2852272c92SMike Rapoport
2952272c92SMike RapoportGet Free Page flags
3052272c92SMike Rapoport===================
3152272c92SMike Rapoport
3252272c92SMike RapoportThe GFP flags control the allocators behavior. They tell what memory
3352272c92SMike Rapoportzones can be used, how hard the allocator should try to find free
3452272c92SMike Rapoportmemory, whether the memory can be accessed by the userspace etc. The
3552272c92SMike Rapoport:ref:`Documentation/core-api/mm-api.rst <mm-api-gfp-flags>` provides
3652272c92SMike Rapoportreference documentation for the GFP flags and their combinations and
3752272c92SMike Rapoporthere we briefly outline their recommended usage:
3852272c92SMike Rapoport
3952272c92SMike Rapoport  * Most of the time ``GFP_KERNEL`` is what you need. Memory for the
4052272c92SMike Rapoport    kernel data structures, DMAable memory, inode cache, all these and
4152272c92SMike Rapoport    many other allocations types can use ``GFP_KERNEL``. Note, that
4252272c92SMike Rapoport    using ``GFP_KERNEL`` implies ``GFP_RECLAIM``, which means that
4352272c92SMike Rapoport    direct reclaim may be triggered under memory pressure; the calling
4452272c92SMike Rapoport    context must be allowed to sleep.
4552272c92SMike Rapoport  * If the allocation is performed from an atomic context, e.g interrupt
4652272c92SMike Rapoport    handler, use ``GFP_NOWAIT``. This flag prevents direct reclaim and
4752272c92SMike Rapoport    IO or filesystem operations. Consequently, under memory pressure
4852272c92SMike Rapoport    ``GFP_NOWAIT`` allocation is likely to fail. Allocations which
4952272c92SMike Rapoport    have a reasonable fallback should be using ``GFP_NOWARN``.
5052272c92SMike Rapoport  * If you think that accessing memory reserves is justified and the kernel
5152272c92SMike Rapoport    will be stressed unless allocation succeeds, you may use ``GFP_ATOMIC``.
5252272c92SMike Rapoport  * Untrusted allocations triggered from userspace should be a subject
5352272c92SMike Rapoport    of kmem accounting and must have ``__GFP_ACCOUNT`` bit set. There
5452272c92SMike Rapoport    is the handy ``GFP_KERNEL_ACCOUNT`` shortcut for ``GFP_KERNEL``
5552272c92SMike Rapoport    allocations that should be accounted.
5652272c92SMike Rapoport  * Userspace allocations should use either of the ``GFP_USER``,
5752272c92SMike Rapoport    ``GFP_HIGHUSER`` or ``GFP_HIGHUSER_MOVABLE`` flags. The longer
5852272c92SMike Rapoport    the flag name the less restrictive it is.
5952272c92SMike Rapoport
6052272c92SMike Rapoport    ``GFP_HIGHUSER_MOVABLE`` does not require that allocated memory
6152272c92SMike Rapoport    will be directly accessible by the kernel and implies that the
6252272c92SMike Rapoport    data is movable.
6352272c92SMike Rapoport
6452272c92SMike Rapoport    ``GFP_HIGHUSER`` means that the allocated memory is not movable,
6552272c92SMike Rapoport    but it is not required to be directly accessible by the kernel. An
6652272c92SMike Rapoport    example may be a hardware allocation that maps data directly into
6752272c92SMike Rapoport    userspace but has no addressing limitations.
6852272c92SMike Rapoport
6952272c92SMike Rapoport    ``GFP_USER`` means that the allocated memory is not movable and it
7052272c92SMike Rapoport    must be directly accessible by the kernel.
7152272c92SMike Rapoport
7252272c92SMike RapoportYou may notice that quite a few allocations in the existing code
7352272c92SMike Rapoportspecify ``GFP_NOIO`` or ``GFP_NOFS``. Historically, they were used to
7452272c92SMike Rapoportprevent recursion deadlocks caused by direct memory reclaim calling
7552272c92SMike Rapoportback into the FS or IO paths and blocking on already held
7652272c92SMike Rapoportresources. Since 4.12 the preferred way to address this issue is to
7752272c92SMike Rapoportuse new scope APIs described in
7852272c92SMike Rapoport:ref:`Documentation/core-api/gfp_mask-from-fs-io.rst <gfp_mask_from_fs_io>`.
7952272c92SMike Rapoport
8052272c92SMike RapoportOther legacy GFP flags are ``GFP_DMA`` and ``GFP_DMA32``. They are
8152272c92SMike Rapoportused to ensure that the allocated memory is accessible by hardware
8252272c92SMike Rapoportwith limited addressing capabilities. So unless you are writing a
8352272c92SMike Rapoportdriver for a device with such restrictions, avoid using these flags.
8452272c92SMike RapoportAnd even with hardware with restrictions it is preferable to use
8552272c92SMike Rapoport`dma_alloc*` APIs.
8652272c92SMike Rapoport
8700bafa57SMike RapoportGFP flags and reclaim behavior
8800bafa57SMike Rapoport------------------------------
8900bafa57SMike RapoportMemory allocations may trigger direct or background reclaim and it is
9000bafa57SMike Rapoportuseful to understand how hard the page allocator will try to satisfy that
9100bafa57SMike Rapoportor another request.
9200bafa57SMike Rapoport
9300bafa57SMike Rapoport  * ``GFP_KERNEL & ~__GFP_RECLAIM`` - optimistic allocation without _any_
9400bafa57SMike Rapoport    attempt to free memory at all. The most light weight mode which even
9500bafa57SMike Rapoport    doesn't kick the background reclaim. Should be used carefully because it
9600bafa57SMike Rapoport    might deplete the memory and the next user might hit the more aggressive
9700bafa57SMike Rapoport    reclaim.
9800bafa57SMike Rapoport
9900bafa57SMike Rapoport  * ``GFP_KERNEL & ~__GFP_DIRECT_RECLAIM`` (or ``GFP_NOWAIT``)- optimistic
10000bafa57SMike Rapoport    allocation without any attempt to free memory from the current
10100bafa57SMike Rapoport    context but can wake kswapd to reclaim memory if the zone is below
10200bafa57SMike Rapoport    the low watermark. Can be used from either atomic contexts or when
10300bafa57SMike Rapoport    the request is a performance optimization and there is another
10400bafa57SMike Rapoport    fallback for a slow path.
10500bafa57SMike Rapoport
10600bafa57SMike Rapoport  * ``(GFP_KERNEL|__GFP_HIGH) & ~__GFP_DIRECT_RECLAIM`` (aka ``GFP_ATOMIC``) -
10700bafa57SMike Rapoport    non sleeping allocation with an expensive fallback so it can access
10800bafa57SMike Rapoport    some portion of memory reserves. Usually used from interrupt/bottom-half
10900bafa57SMike Rapoport    context with an expensive slow path fallback.
11000bafa57SMike Rapoport
11100bafa57SMike Rapoport  * ``GFP_KERNEL`` - both background and direct reclaim are allowed and the
11200bafa57SMike Rapoport    **default** page allocator behavior is used. That means that not costly
11300bafa57SMike Rapoport    allocation requests are basically no-fail but there is no guarantee of
11400bafa57SMike Rapoport    that behavior so failures have to be checked properly by callers
11500bafa57SMike Rapoport    (e.g. OOM killer victim is allowed to fail currently).
11600bafa57SMike Rapoport
11700bafa57SMike Rapoport  * ``GFP_KERNEL | __GFP_NORETRY`` - overrides the default allocator behavior
11800bafa57SMike Rapoport    and all allocation requests fail early rather than cause disruptive
11900bafa57SMike Rapoport    reclaim (one round of reclaim in this implementation). The OOM killer
12000bafa57SMike Rapoport    is not invoked.
12100bafa57SMike Rapoport
12200bafa57SMike Rapoport  * ``GFP_KERNEL | __GFP_RETRY_MAYFAIL`` - overrides the default allocator
12300bafa57SMike Rapoport    behavior and all allocation requests try really hard. The request
12400bafa57SMike Rapoport    will fail if the reclaim cannot make any progress. The OOM killer
12500bafa57SMike Rapoport    won't be triggered.
12600bafa57SMike Rapoport
12700bafa57SMike Rapoport  * ``GFP_KERNEL | __GFP_NOFAIL`` - overrides the default allocator behavior
12800bafa57SMike Rapoport    and all allocation requests will loop endlessly until they succeed.
12900bafa57SMike Rapoport    This might be really dangerous especially for larger orders.
13000bafa57SMike Rapoport
13152272c92SMike RapoportSelecting memory allocator
13252272c92SMike Rapoport==========================
13352272c92SMike Rapoport
13452272c92SMike RapoportThe most straightforward way to allocate memory is to use a function
135094ef1c9SChris Packhamfrom the kmalloc() family. And, to be on the safe side it's best to use
136094ef1c9SChris Packhamroutines that set memory to zero, like kzalloc(). If you need to
137094ef1c9SChris Packhamallocate memory for an array, there are kmalloc_array() and kcalloc()
1381c16b3d5SChris Packhamhelpers. The helpers struct_size(), array_size() and array3_size() can
1391c16b3d5SChris Packhambe used to safely calculate object sizes without overflowing.
14052272c92SMike Rapoport
14152272c92SMike RapoportThe maximal size of a chunk that can be allocated with `kmalloc` is
14252272c92SMike Rapoportlimited. The actual limit depends on the hardware and the kernel
14352272c92SMike Rapoportconfiguration, but it is a good practice to use `kmalloc` for objects
14452272c92SMike Rapoportsmaller than page size.
14552272c92SMike Rapoport
14659bb4798SVlastimil BabkaThe address of a chunk allocated with `kmalloc` is aligned to at least
14759bb4798SVlastimil BabkaARCH_KMALLOC_MINALIGN bytes.  For sizes which are a power of two, the
14859bb4798SVlastimil Babkaalignment is also guaranteed to be at least the respective size.
14959bb4798SVlastimil Babka
150f0dbd2bdSBartosz GolaszewskiChunks allocated with kmalloc() can be resized with krealloc(). Similarly
151f0dbd2bdSBartosz Golaszewskito kmalloc_array(): a helper for resizing arrays is provided in the form of
152f0dbd2bdSBartosz Golaszewskikrealloc_array().
153f0dbd2bdSBartosz Golaszewski
154094ef1c9SChris PackhamFor large allocations you can use vmalloc() and vzalloc(), or directly
155094ef1c9SChris Packhamrequest pages from the page allocator. The memory allocated by `vmalloc`
156094ef1c9SChris Packhamand related functions is not physically contiguous.
15752272c92SMike Rapoport
15852272c92SMike RapoportIf you are not sure whether the allocation size is too large for
159094ef1c9SChris Packham`kmalloc`, it is possible to use kvmalloc() and its derivatives. It will
160094ef1c9SChris Packhamtry to allocate memory with `kmalloc` and if the allocation fails it
161094ef1c9SChris Packhamwill be retried with `vmalloc`. There are restrictions on which GFP
162094ef1c9SChris Packhamflags can be used with `kvmalloc`; please see kvmalloc_node() reference
163094ef1c9SChris Packhamdocumentation. Note that `kvmalloc` may return memory that is not
164094ef1c9SChris Packhamphysically contiguous.
16552272c92SMike Rapoport
16652272c92SMike RapoportIf you need to allocate many identical objects you can use the slab
167094ef1c9SChris Packhamcache allocator. The cache should be set up with kmem_cache_create() or
168094ef1c9SChris Packhamkmem_cache_create_usercopy() before it can be used. The second function
169094ef1c9SChris Packhamshould be used if a part of the cache might be copied to the userspace.
170094ef1c9SChris PackhamAfter the cache is created kmem_cache_alloc() and its convenience
171094ef1c9SChris Packhamwrappers can allocate memory from that cache.
17252272c92SMike Rapoport
173*ae65a521SVlastimil BabkaWhen the allocated memory is no longer needed it must be freed.
174*ae65a521SVlastimil Babka
175*ae65a521SVlastimil BabkaObjects allocated by `kmalloc` can be freed by `kfree` or `kvfree`. Objects
176*ae65a521SVlastimil Babkaallocated by `kmem_cache_alloc` can be freed with `kmem_cache_free`, `kfree`
177*ae65a521SVlastimil Babkaor `kvfree`, where the latter two might be more convenient thanks to not
178*ae65a521SVlastimil Babkaneeding the kmem_cache pointer.
179*ae65a521SVlastimil Babka
180*ae65a521SVlastimil BabkaThe same rules apply to _bulk and _rcu flavors of freeing functions.
181*ae65a521SVlastimil Babka
182*ae65a521SVlastimil BabkaMemory allocated by `vmalloc` can be freed with `vfree` or `kvfree`.
183*ae65a521SVlastimil BabkaMemory allocated by `kvmalloc` can be freed with `kvfree`.
184*ae65a521SVlastimil BabkaCaches created by `kmem_cache_create` should be freed with
185*ae65a521SVlastimil Babka`kmem_cache_destroy` only after freeing all the allocated objects first.
186