From patchwork Mon Mar 22 19:38:19 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Matthew Wilcox X-Patchwork-Id: 12156011 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.6 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1C391C433C1 for ; Mon, 22 Mar 2021 20:00:42 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id A937861934 for ; Mon, 22 Mar 2021 20:00:41 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org A937861934 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=infradead.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 3410C6B00E4; Mon, 22 Mar 2021 16:00:41 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 317D26B00E6; Mon, 22 Mar 2021 16:00:41 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 1B89A6B00E8; Mon, 22 Mar 2021 16:00:41 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0228.hostedemail.com [216.40.44.228]) by kanga.kvack.org (Postfix) with ESMTP id F27296B00E4 for ; Mon, 22 Mar 2021 16:00:40 -0400 (EDT) Received: from smtpin06.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay03.hostedemail.com (Postfix) with ESMTP id B573D8249980 for ; Mon, 22 Mar 2021 20:00:40 +0000 (UTC) X-FDA: 77948577840.06.1486113 Received: from casper.infradead.org (casper.infradead.org [90.155.50.34]) by imf23.hostedemail.com (Postfix) with ESMTP id 74AB0A001AB8 for ; Mon, 22 Mar 2021 19:59:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=Content-Transfer-Encoding:MIME-Version: Message-Id:Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type:Content-ID: Content-Description:In-Reply-To:References; bh=umAyPvMB0ox2owuNnUxAWBk74eoFU1cPIidPuUVXyPc=; b=OkbGN2/+7oiOzKyUuQ1trRXPSH xe/OOw3UKZ4E1Kf7kiAkKE2YzDYBmkfce9VDl50jFpGlCGNZPHTB9zzn4wt+hv380CVWT18ZvbAqq RUsATnyf0ElBF0mRuLmOqkRNCEb5KsSbsqB2dk8RANS9k/JefDEo2RvLa0Z/c+5Y6fs1mzLX8Y3Be GwB9va8d6u/5RSTV1N10/MXhSrziW1HTECs4tNkitUi2mqZlhx3nshdtYwomAo8oeLCHi7gdp9ZaZ /YyJBZ1us4bvLJaN5LAV3czhoJBsArMev3XFInjesxp8LMZ0jTwAs2yJhdol3YOE8TeKYY1FZldU5 07elDNxA==; Received: from willy by casper.infradead.org with local (Exim 4.94 #2 (Red Hat Linux)) id 1lOQNa-008yos-2G; Mon, 22 Mar 2021 19:38:31 +0000 From: "Matthew Wilcox (Oracle)" To: Andrew Morton , Christoph Lameter , Pekka Enberg , David Rientjes , Joonsoo Kim , Vlastimil Babka , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Uladzislau Rezki , Nicholas Piggin Cc: "Matthew Wilcox (Oracle)" Subject: [PATCH 1/2] mm/util: Add kvmalloc_node_caller Date: Mon, 22 Mar 2021 19:38:19 +0000 Message-Id: <20210322193820.2140045-1-willy@infradead.org> X-Mailer: git-send-email 2.29.2 MIME-Version: 1.0 X-Stat-Signature: 6nfaqk33xfkhwtxtp418dmys1ewqhfsi X-Rspamd-Server: rspam05 X-Rspamd-Queue-Id: 74AB0A001AB8 Received-SPF: none (infradead.org>: No applicable sender policy available) receiver=imf23; identity=mailfrom; envelope-from=""; helo=casper.infradead.org; client-ip=90.155.50.34 X-HE-DKIM-Result: pass/pass X-HE-Tag: 1616443164-261518 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Allow the caller of kvmalloc to specify who counts as the allocator of the memory instead of assuming it's the immediate caller. Signed-off-by: Matthew Wilcox (Oracle) --- include/linux/mm.h | 4 +++- include/linux/slab.h | 2 ++ mm/util.c | 52 ++++++++++++++++++++++++-------------------- 3 files changed, 34 insertions(+), 24 deletions(-) diff --git a/include/linux/mm.h b/include/linux/mm.h index cb1e191da319..b65a7105d9a7 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -786,7 +786,9 @@ static inline int is_vmalloc_or_module_addr(const void *x) } #endif -extern void *kvmalloc_node(size_t size, gfp_t flags, int node); +void *kvmalloc_node_caller(size_t size, gfp_t flags, int node, + unsigned long caller); +void *kvmalloc_node(size_t size, gfp_t flags, int node); static inline void *kvmalloc(size_t size, gfp_t flags) { return kvmalloc_node(size, flags, NUMA_NO_NODE); diff --git a/include/linux/slab.h b/include/linux/slab.h index 0c97d788762c..6611b8ee55ee 100644 --- a/include/linux/slab.h +++ b/include/linux/slab.h @@ -663,6 +663,8 @@ extern void *__kmalloc_node_track_caller(size_t, gfp_t, int, unsigned long); #else /* CONFIG_NUMA */ +#define __kmalloc_node_track_caller(size, flags, node, caller) \ + __kmalloc_track_caller(size, flags, caller) #define kmalloc_node_track_caller(size, flags, node) \ kmalloc_track_caller(size, flags) diff --git a/mm/util.c b/mm/util.c index 0b6dd9d81da7..7120bb8ff9ca 100644 --- a/mm/util.c +++ b/mm/util.c @@ -539,26 +539,8 @@ unsigned long vm_mmap(struct file *file, unsigned long addr, } EXPORT_SYMBOL(vm_mmap); -/** - * kvmalloc_node - attempt to allocate physically contiguous memory, but upon - * failure, fall back to non-contiguous (vmalloc) allocation. - * @size: size of the request. - * @flags: gfp mask for the allocation - must be compatible (superset) with GFP_KERNEL. - * @node: numa node to allocate from - * - * Uses kmalloc to get the memory but if the allocation fails then falls back - * to the vmalloc allocator. Use kvfree for freeing the memory. - * - * Reclaim modifiers - __GFP_NORETRY and __GFP_NOFAIL are not supported. - * __GFP_RETRY_MAYFAIL is supported, and it should be used only if kmalloc is - * preferable to the vmalloc fallback, due to visible performance drawbacks. - * - * Please note that any use of gfp flags outside of GFP_KERNEL is careful to not - * fall back to vmalloc. - * - * Return: pointer to the allocated memory of %NULL in case of failure - */ -void *kvmalloc_node(size_t size, gfp_t flags, int node) +void *kvmalloc_node_caller(size_t size, gfp_t flags, int node, + unsigned long caller) { gfp_t kmalloc_flags = flags; void *ret; @@ -584,7 +566,7 @@ void *kvmalloc_node(size_t size, gfp_t flags, int node) kmalloc_flags |= __GFP_NORETRY; } - ret = kmalloc_node(size, kmalloc_flags, node); + ret = __kmalloc_node_track_caller(size, kmalloc_flags, node, caller); /* * It doesn't really make sense to fallback to vmalloc for sub page @@ -593,8 +575,32 @@ void *kvmalloc_node(size_t size, gfp_t flags, int node) if (ret || size <= PAGE_SIZE) return ret; - return __vmalloc_node(size, 1, flags, node, - __builtin_return_address(0)); + return __vmalloc_node(size, 1, flags, node, (void *)caller); +} + +/** + * kvmalloc_node - attempt to allocate physically contiguous memory, but upon + * failure, fall back to non-contiguous (vmalloc) allocation. + * @size: size of the request. + * @flags: GFP flags for the allocation - must be compatible (superset) with GFP_KERNEL. + * @node: numa node to allocate from + * + * Uses kmalloc to get the memory but if the allocation fails then falls back + * to the vmalloc allocator. Use kvfree for freeing the memory. + * + * Reclaim modifiers - __GFP_NORETRY and __GFP_NOFAIL are not supported. + * __GFP_RETRY_MAYFAIL is supported, and it should be used only if kmalloc is + * preferable to the vmalloc fallback, due to visible performance drawbacks. + * + * Please note that any use of gfp flags outside of GFP_KERNEL is careful to not + * fall back to vmalloc. + * + * Return: pointer to the allocated memory or %NULL in case of failure. + * %ZERO_SIZE_PTR if @size is zero. + */ +void *kvmalloc_node(size_t size, gfp_t flags, int node) +{ + return kvmalloc_node_caller(size, flags, node, _RET_IP_); } EXPORT_SYMBOL(kvmalloc_node);