]> git.proxmox.com Git - mirror_ubuntu-hirsute-kernel.git/blame - mm/vmalloc.c
staging: wfx: update TODO list
[mirror_ubuntu-hirsute-kernel.git] / mm / vmalloc.c
CommitLineData
457c8996 1// SPDX-License-Identifier: GPL-2.0-only
1da177e4
LT
2/*
3 * linux/mm/vmalloc.c
4 *
5 * Copyright (C) 1993 Linus Torvalds
6 * Support of BIGMEM added by Gerhard Wichert, Siemens AG, July 1999
7 * SMP-safe vmalloc/vfree/ioremap, Tigran Aivazian <tigran@veritas.com>, May 2000
8 * Major rework to support vmap/vunmap, Christoph Hellwig, SGI, August 2002
930fc45a 9 * Numa awareness, Christoph Lameter, SGI, June 2005
d758ffe6 10 * Improving global KVA allocator, Uladzislau Rezki, Sony, May 2019
1da177e4
LT
11 */
12
db64fe02 13#include <linux/vmalloc.h>
1da177e4
LT
14#include <linux/mm.h>
15#include <linux/module.h>
16#include <linux/highmem.h>
c3edc401 17#include <linux/sched/signal.h>
1da177e4
LT
18#include <linux/slab.h>
19#include <linux/spinlock.h>
20#include <linux/interrupt.h>
5f6a6a9c 21#include <linux/proc_fs.h>
a10aa579 22#include <linux/seq_file.h>
868b104d 23#include <linux/set_memory.h>
3ac7fe5a 24#include <linux/debugobjects.h>
23016969 25#include <linux/kallsyms.h>
db64fe02 26#include <linux/list.h>
4da56b99 27#include <linux/notifier.h>
db64fe02 28#include <linux/rbtree.h>
0f14599c 29#include <linux/xarray.h>
db64fe02 30#include <linux/rcupdate.h>
f0aa6617 31#include <linux/pfn.h>
89219d37 32#include <linux/kmemleak.h>
60063497 33#include <linux/atomic.h>
3b32123d 34#include <linux/compiler.h>
32fcfd40 35#include <linux/llist.h>
0f616be1 36#include <linux/bitops.h>
68ad4a33 37#include <linux/rbtree_augmented.h>
bdebd6a2 38#include <linux/overflow.h>
3b32123d 39
7c0f6ba6 40#include <linux/uaccess.h>
1da177e4 41#include <asm/tlbflush.h>
2dca6999 42#include <asm/shmparam.h>
1da177e4 43
dd56b046 44#include "internal.h"
2a681cfa 45#include "pgalloc-track.h"
dd56b046 46
186525bd
IM
47bool is_vmalloc_addr(const void *x)
48{
49 unsigned long addr = (unsigned long)x;
50
51 return addr >= VMALLOC_START && addr < VMALLOC_END;
52}
53EXPORT_SYMBOL(is_vmalloc_addr);
54
32fcfd40
AV
55struct vfree_deferred {
56 struct llist_head list;
57 struct work_struct wq;
58};
59static DEFINE_PER_CPU(struct vfree_deferred, vfree_deferred);
60
61static void __vunmap(const void *, int);
62
63static void free_work(struct work_struct *w)
64{
65 struct vfree_deferred *p = container_of(w, struct vfree_deferred, wq);
894e58c1
BP
66 struct llist_node *t, *llnode;
67
68 llist_for_each_safe(llnode, t, llist_del_all(&p->list))
69 __vunmap((void *)llnode, 1);
32fcfd40
AV
70}
71
db64fe02 72/*** Page table manipulation functions ***/
b221385b 73
2ba3e694
JR
74static void vunmap_pte_range(pmd_t *pmd, unsigned long addr, unsigned long end,
75 pgtbl_mod_mask *mask)
1da177e4
LT
76{
77 pte_t *pte;
78
79 pte = pte_offset_kernel(pmd, addr);
80 do {
81 pte_t ptent = ptep_get_and_clear(&init_mm, addr, pte);
82 WARN_ON(!pte_none(ptent) && !pte_present(ptent));
83 } while (pte++, addr += PAGE_SIZE, addr != end);
2ba3e694 84 *mask |= PGTBL_PTE_MODIFIED;
1da177e4
LT
85}
86
2ba3e694
JR
87static void vunmap_pmd_range(pud_t *pud, unsigned long addr, unsigned long end,
88 pgtbl_mod_mask *mask)
1da177e4
LT
89{
90 pmd_t *pmd;
91 unsigned long next;
2ba3e694 92 int cleared;
1da177e4
LT
93
94 pmd = pmd_offset(pud, addr);
95 do {
96 next = pmd_addr_end(addr, end);
2ba3e694
JR
97
98 cleared = pmd_clear_huge(pmd);
99 if (cleared || pmd_bad(*pmd))
100 *mask |= PGTBL_PMD_MODIFIED;
101
102 if (cleared)
b9820d8f 103 continue;
1da177e4
LT
104 if (pmd_none_or_clear_bad(pmd))
105 continue;
2ba3e694 106 vunmap_pte_range(pmd, addr, next, mask);
1da177e4
LT
107 } while (pmd++, addr = next, addr != end);
108}
109
2ba3e694
JR
110static void vunmap_pud_range(p4d_t *p4d, unsigned long addr, unsigned long end,
111 pgtbl_mod_mask *mask)
1da177e4
LT
112{
113 pud_t *pud;
114 unsigned long next;
2ba3e694 115 int cleared;
1da177e4 116
c2febafc 117 pud = pud_offset(p4d, addr);
1da177e4
LT
118 do {
119 next = pud_addr_end(addr, end);
2ba3e694
JR
120
121 cleared = pud_clear_huge(pud);
122 if (cleared || pud_bad(*pud))
123 *mask |= PGTBL_PUD_MODIFIED;
124
125 if (cleared)
b9820d8f 126 continue;
1da177e4
LT
127 if (pud_none_or_clear_bad(pud))
128 continue;
2ba3e694 129 vunmap_pmd_range(pud, addr, next, mask);
1da177e4
LT
130 } while (pud++, addr = next, addr != end);
131}
132
2ba3e694
JR
133static void vunmap_p4d_range(pgd_t *pgd, unsigned long addr, unsigned long end,
134 pgtbl_mod_mask *mask)
c2febafc
KS
135{
136 p4d_t *p4d;
137 unsigned long next;
2ba3e694 138 int cleared;
c2febafc
KS
139
140 p4d = p4d_offset(pgd, addr);
141 do {
142 next = p4d_addr_end(addr, end);
2ba3e694
JR
143
144 cleared = p4d_clear_huge(p4d);
145 if (cleared || p4d_bad(*p4d))
146 *mask |= PGTBL_P4D_MODIFIED;
147
148 if (cleared)
c2febafc
KS
149 continue;
150 if (p4d_none_or_clear_bad(p4d))
151 continue;
2ba3e694 152 vunmap_pud_range(p4d, addr, next, mask);
c2febafc
KS
153 } while (p4d++, addr = next, addr != end);
154}
155
b521c43f
CH
156/**
157 * unmap_kernel_range_noflush - unmap kernel VM area
2ba3e694 158 * @start: start of the VM area to unmap
b521c43f
CH
159 * @size: size of the VM area to unmap
160 *
161 * Unmap PFN_UP(@size) pages at @addr. The VM area @addr and @size specify
162 * should have been allocated using get_vm_area() and its friends.
163 *
164 * NOTE:
165 * This function does NOT do any cache flushing. The caller is responsible
166 * for calling flush_cache_vunmap() on to-be-mapped areas before calling this
167 * function and flush_tlb_kernel_range() after.
168 */
2ba3e694 169void unmap_kernel_range_noflush(unsigned long start, unsigned long size)
1da177e4 170{
2ba3e694 171 unsigned long end = start + size;
1da177e4 172 unsigned long next;
b521c43f 173 pgd_t *pgd;
2ba3e694
JR
174 unsigned long addr = start;
175 pgtbl_mod_mask mask = 0;
1da177e4
LT
176
177 BUG_ON(addr >= end);
178 pgd = pgd_offset_k(addr);
1da177e4
LT
179 do {
180 next = pgd_addr_end(addr, end);
2ba3e694
JR
181 if (pgd_bad(*pgd))
182 mask |= PGTBL_PGD_MODIFIED;
1da177e4
LT
183 if (pgd_none_or_clear_bad(pgd))
184 continue;
2ba3e694 185 vunmap_p4d_range(pgd, addr, next, &mask);
1da177e4 186 } while (pgd++, addr = next, addr != end);
2ba3e694
JR
187
188 if (mask & ARCH_PAGE_TABLE_SYNC_MASK)
189 arch_sync_kernel_mappings(start, end);
1da177e4
LT
190}
191
192static int vmap_pte_range(pmd_t *pmd, unsigned long addr,
2ba3e694
JR
193 unsigned long end, pgprot_t prot, struct page **pages, int *nr,
194 pgtbl_mod_mask *mask)
1da177e4
LT
195{
196 pte_t *pte;
197
db64fe02
NP
198 /*
199 * nr is a running index into the array which helps higher level
200 * callers keep track of where we're up to.
201 */
202
2ba3e694 203 pte = pte_alloc_kernel_track(pmd, addr, mask);
1da177e4
LT
204 if (!pte)
205 return -ENOMEM;
206 do {
db64fe02
NP
207 struct page *page = pages[*nr];
208
209 if (WARN_ON(!pte_none(*pte)))
210 return -EBUSY;
211 if (WARN_ON(!page))
1da177e4
LT
212 return -ENOMEM;
213 set_pte_at(&init_mm, addr, pte, mk_pte(page, prot));
db64fe02 214 (*nr)++;
1da177e4 215 } while (pte++, addr += PAGE_SIZE, addr != end);
2ba3e694 216 *mask |= PGTBL_PTE_MODIFIED;
1da177e4
LT
217 return 0;
218}
219
db64fe02 220static int vmap_pmd_range(pud_t *pud, unsigned long addr,
2ba3e694
JR
221 unsigned long end, pgprot_t prot, struct page **pages, int *nr,
222 pgtbl_mod_mask *mask)
1da177e4
LT
223{
224 pmd_t *pmd;
225 unsigned long next;
226
2ba3e694 227 pmd = pmd_alloc_track(&init_mm, pud, addr, mask);
1da177e4
LT
228 if (!pmd)
229 return -ENOMEM;
230 do {
231 next = pmd_addr_end(addr, end);
2ba3e694 232 if (vmap_pte_range(pmd, addr, next, prot, pages, nr, mask))
1da177e4
LT
233 return -ENOMEM;
234 } while (pmd++, addr = next, addr != end);
235 return 0;
236}
237
c2febafc 238static int vmap_pud_range(p4d_t *p4d, unsigned long addr,
2ba3e694
JR
239 unsigned long end, pgprot_t prot, struct page **pages, int *nr,
240 pgtbl_mod_mask *mask)
1da177e4
LT
241{
242 pud_t *pud;
243 unsigned long next;
244
2ba3e694 245 pud = pud_alloc_track(&init_mm, p4d, addr, mask);
1da177e4
LT
246 if (!pud)
247 return -ENOMEM;
248 do {
249 next = pud_addr_end(addr, end);
2ba3e694 250 if (vmap_pmd_range(pud, addr, next, prot, pages, nr, mask))
1da177e4
LT
251 return -ENOMEM;
252 } while (pud++, addr = next, addr != end);
253 return 0;
254}
255
c2febafc 256static int vmap_p4d_range(pgd_t *pgd, unsigned long addr,
2ba3e694
JR
257 unsigned long end, pgprot_t prot, struct page **pages, int *nr,
258 pgtbl_mod_mask *mask)
c2febafc
KS
259{
260 p4d_t *p4d;
261 unsigned long next;
262
2ba3e694 263 p4d = p4d_alloc_track(&init_mm, pgd, addr, mask);
c2febafc
KS
264 if (!p4d)
265 return -ENOMEM;
266 do {
267 next = p4d_addr_end(addr, end);
2ba3e694 268 if (vmap_pud_range(p4d, addr, next, prot, pages, nr, mask))
c2febafc
KS
269 return -ENOMEM;
270 } while (p4d++, addr = next, addr != end);
271 return 0;
272}
273
b521c43f
CH
274/**
275 * map_kernel_range_noflush - map kernel VM area with the specified pages
276 * @addr: start of the VM area to map
277 * @size: size of the VM area to map
278 * @prot: page protection flags to use
279 * @pages: pages to map
db64fe02 280 *
b521c43f
CH
281 * Map PFN_UP(@size) pages at @addr. The VM area @addr and @size specify should
282 * have been allocated using get_vm_area() and its friends.
283 *
284 * NOTE:
285 * This function does NOT do any cache flushing. The caller is responsible for
286 * calling flush_cache_vmap() on to-be-mapped areas before calling this
287 * function.
288 *
289 * RETURNS:
60bb4465 290 * 0 on success, -errno on failure.
db64fe02 291 */
b521c43f
CH
292int map_kernel_range_noflush(unsigned long addr, unsigned long size,
293 pgprot_t prot, struct page **pages)
1da177e4 294{
2ba3e694 295 unsigned long start = addr;
b521c43f 296 unsigned long end = addr + size;
1da177e4 297 unsigned long next;
b521c43f 298 pgd_t *pgd;
db64fe02
NP
299 int err = 0;
300 int nr = 0;
2ba3e694 301 pgtbl_mod_mask mask = 0;
1da177e4
LT
302
303 BUG_ON(addr >= end);
304 pgd = pgd_offset_k(addr);
1da177e4
LT
305 do {
306 next = pgd_addr_end(addr, end);
2ba3e694
JR
307 if (pgd_bad(*pgd))
308 mask |= PGTBL_PGD_MODIFIED;
309 err = vmap_p4d_range(pgd, addr, next, prot, pages, &nr, &mask);
1da177e4 310 if (err)
bf88c8c8 311 return err;
1da177e4 312 } while (pgd++, addr = next, addr != end);
db64fe02 313
2ba3e694
JR
314 if (mask & ARCH_PAGE_TABLE_SYNC_MASK)
315 arch_sync_kernel_mappings(start, end);
316
60bb4465 317 return 0;
1da177e4
LT
318}
319
ed1f324c
CH
320int map_kernel_range(unsigned long start, unsigned long size, pgprot_t prot,
321 struct page **pages)
8fc48985
TH
322{
323 int ret;
324
a29adb62
CH
325 ret = map_kernel_range_noflush(start, size, prot, pages);
326 flush_cache_vmap(start, start + size);
8fc48985
TH
327 return ret;
328}
329
81ac3ad9 330int is_vmalloc_or_module_addr(const void *x)
73bdf0a6
LT
331{
332 /*
ab4f2ee1 333 * ARM, x86-64 and sparc64 put modules in a special place,
73bdf0a6
LT
334 * and fall back on vmalloc() if that fails. Others
335 * just put it in the vmalloc space.
336 */
337#if defined(CONFIG_MODULES) && defined(MODULES_VADDR)
338 unsigned long addr = (unsigned long)x;
339 if (addr >= MODULES_VADDR && addr < MODULES_END)
340 return 1;
341#endif
342 return is_vmalloc_addr(x);
343}
344
48667e7a 345/*
add688fb 346 * Walk a vmap address to the struct page it maps.
48667e7a 347 */
add688fb 348struct page *vmalloc_to_page(const void *vmalloc_addr)
48667e7a
CL
349{
350 unsigned long addr = (unsigned long) vmalloc_addr;
add688fb 351 struct page *page = NULL;
48667e7a 352 pgd_t *pgd = pgd_offset_k(addr);
c2febafc
KS
353 p4d_t *p4d;
354 pud_t *pud;
355 pmd_t *pmd;
356 pte_t *ptep, pte;
48667e7a 357
7aa413de
IM
358 /*
359 * XXX we might need to change this if we add VIRTUAL_BUG_ON for
360 * architectures that do not vmalloc module space
361 */
73bdf0a6 362 VIRTUAL_BUG_ON(!is_vmalloc_or_module_addr(vmalloc_addr));
59ea7463 363
c2febafc
KS
364 if (pgd_none(*pgd))
365 return NULL;
366 p4d = p4d_offset(pgd, addr);
367 if (p4d_none(*p4d))
368 return NULL;
369 pud = pud_offset(p4d, addr);
029c54b0
AB
370
371 /*
372 * Don't dereference bad PUD or PMD (below) entries. This will also
373 * identify huge mappings, which we may encounter on architectures
374 * that define CONFIG_HAVE_ARCH_HUGE_VMAP=y. Such regions will be
375 * identified as vmalloc addresses by is_vmalloc_addr(), but are
376 * not [unambiguously] associated with a struct page, so there is
377 * no correct value to return for them.
378 */
379 WARN_ON_ONCE(pud_bad(*pud));
380 if (pud_none(*pud) || pud_bad(*pud))
c2febafc
KS
381 return NULL;
382 pmd = pmd_offset(pud, addr);
029c54b0
AB
383 WARN_ON_ONCE(pmd_bad(*pmd));
384 if (pmd_none(*pmd) || pmd_bad(*pmd))
c2febafc
KS
385 return NULL;
386
387 ptep = pte_offset_map(pmd, addr);
388 pte = *ptep;
389 if (pte_present(pte))
390 page = pte_page(pte);
391 pte_unmap(ptep);
add688fb 392 return page;
48667e7a 393}
add688fb 394EXPORT_SYMBOL(vmalloc_to_page);
48667e7a
CL
395
396/*
add688fb 397 * Map a vmalloc()-space virtual address to the physical page frame number.
48667e7a 398 */
add688fb 399unsigned long vmalloc_to_pfn(const void *vmalloc_addr)
48667e7a 400{
add688fb 401 return page_to_pfn(vmalloc_to_page(vmalloc_addr));
48667e7a 402}
add688fb 403EXPORT_SYMBOL(vmalloc_to_pfn);
48667e7a 404
db64fe02
NP
405
406/*** Global kva allocator ***/
407
bb850f4d 408#define DEBUG_AUGMENT_PROPAGATE_CHECK 0
a6cf4e0f 409#define DEBUG_AUGMENT_LOWEST_MATCH_CHECK 0
bb850f4d 410
db64fe02 411
db64fe02 412static DEFINE_SPINLOCK(vmap_area_lock);
e36176be 413static DEFINE_SPINLOCK(free_vmap_area_lock);
f1c4069e
JK
414/* Export for kexec only */
415LIST_HEAD(vmap_area_list);
80c4bd7a 416static LLIST_HEAD(vmap_purge_list);
89699605 417static struct rb_root vmap_area_root = RB_ROOT;
68ad4a33 418static bool vmap_initialized __read_mostly;
89699605 419
68ad4a33
URS
420/*
421 * This kmem_cache is used for vmap_area objects. Instead of
422 * allocating from slab we reuse an object from this cache to
423 * make things faster. Especially in "no edge" splitting of
424 * free block.
425 */
426static struct kmem_cache *vmap_area_cachep;
427
428/*
429 * This linked list is used in pair with free_vmap_area_root.
430 * It gives O(1) access to prev/next to perform fast coalescing.
431 */
432static LIST_HEAD(free_vmap_area_list);
433
434/*
435 * This augment red-black tree represents the free vmap space.
436 * All vmap_area objects in this tree are sorted by va->va_start
437 * address. It is used for allocation and merging when a vmap
438 * object is released.
439 *
440 * Each vmap_area node contains a maximum available free block
441 * of its sub-tree, right or left. Therefore it is possible to
442 * find a lowest match of free area.
443 */
444static struct rb_root free_vmap_area_root = RB_ROOT;
445
82dd23e8
URS
446/*
447 * Preload a CPU with one object for "no edge" split case. The
448 * aim is to get rid of allocations from the atomic context, thus
449 * to use more permissive allocation masks.
450 */
451static DEFINE_PER_CPU(struct vmap_area *, ne_fit_preload_node);
452
68ad4a33
URS
453static __always_inline unsigned long
454va_size(struct vmap_area *va)
455{
456 return (va->va_end - va->va_start);
457}
458
459static __always_inline unsigned long
460get_subtree_max_size(struct rb_node *node)
461{
462 struct vmap_area *va;
463
464 va = rb_entry_safe(node, struct vmap_area, rb_node);
465 return va ? va->subtree_max_size : 0;
466}
89699605 467
68ad4a33
URS
468/*
469 * Gets called when remove the node and rotate.
470 */
471static __always_inline unsigned long
472compute_subtree_max_size(struct vmap_area *va)
473{
474 return max3(va_size(va),
475 get_subtree_max_size(va->rb_node.rb_left),
476 get_subtree_max_size(va->rb_node.rb_right));
477}
478
315cc066
ML
479RB_DECLARE_CALLBACKS_MAX(static, free_vmap_area_rb_augment_cb,
480 struct vmap_area, rb_node, unsigned long, subtree_max_size, va_size)
68ad4a33
URS
481
482static void purge_vmap_area_lazy(void);
483static BLOCKING_NOTIFIER_HEAD(vmap_notify_list);
484static unsigned long lazy_max_pages(void);
db64fe02 485
97105f0a
RG
486static atomic_long_t nr_vmalloc_pages;
487
488unsigned long vmalloc_nr_pages(void)
489{
490 return atomic_long_read(&nr_vmalloc_pages);
491}
492
db64fe02 493static struct vmap_area *__find_vmap_area(unsigned long addr)
1da177e4 494{
db64fe02
NP
495 struct rb_node *n = vmap_area_root.rb_node;
496
497 while (n) {
498 struct vmap_area *va;
499
500 va = rb_entry(n, struct vmap_area, rb_node);
501 if (addr < va->va_start)
502 n = n->rb_left;
cef2ac3f 503 else if (addr >= va->va_end)
db64fe02
NP
504 n = n->rb_right;
505 else
506 return va;
507 }
508
509 return NULL;
510}
511
68ad4a33
URS
512/*
513 * This function returns back addresses of parent node
514 * and its left or right link for further processing.
9c801f61
URS
515 *
516 * Otherwise NULL is returned. In that case all further
517 * steps regarding inserting of conflicting overlap range
518 * have to be declined and actually considered as a bug.
68ad4a33
URS
519 */
520static __always_inline struct rb_node **
521find_va_links(struct vmap_area *va,
522 struct rb_root *root, struct rb_node *from,
523 struct rb_node **parent)
524{
525 struct vmap_area *tmp_va;
526 struct rb_node **link;
527
528 if (root) {
529 link = &root->rb_node;
530 if (unlikely(!*link)) {
531 *parent = NULL;
532 return link;
533 }
534 } else {
535 link = &from;
536 }
db64fe02 537
68ad4a33
URS
538 /*
539 * Go to the bottom of the tree. When we hit the last point
540 * we end up with parent rb_node and correct direction, i name
541 * it link, where the new va->rb_node will be attached to.
542 */
543 do {
544 tmp_va = rb_entry(*link, struct vmap_area, rb_node);
db64fe02 545
68ad4a33
URS
546 /*
547 * During the traversal we also do some sanity check.
548 * Trigger the BUG() if there are sides(left/right)
549 * or full overlaps.
550 */
551 if (va->va_start < tmp_va->va_end &&
552 va->va_end <= tmp_va->va_start)
553 link = &(*link)->rb_left;
554 else if (va->va_end > tmp_va->va_start &&
555 va->va_start >= tmp_va->va_end)
556 link = &(*link)->rb_right;
9c801f61
URS
557 else {
558 WARN(1, "vmalloc bug: 0x%lx-0x%lx overlaps with 0x%lx-0x%lx\n",
559 va->va_start, va->va_end, tmp_va->va_start, tmp_va->va_end);
560
561 return NULL;
562 }
68ad4a33
URS
563 } while (*link);
564
565 *parent = &tmp_va->rb_node;
566 return link;
567}
568
569static __always_inline struct list_head *
570get_va_next_sibling(struct rb_node *parent, struct rb_node **link)
571{
572 struct list_head *list;
573
574 if (unlikely(!parent))
575 /*
576 * The red-black tree where we try to find VA neighbors
577 * before merging or inserting is empty, i.e. it means
578 * there is no free vmap space. Normally it does not
579 * happen but we handle this case anyway.
580 */
581 return NULL;
582
583 list = &rb_entry(parent, struct vmap_area, rb_node)->list;
584 return (&parent->rb_right == link ? list->next : list);
585}
586
587static __always_inline void
588link_va(struct vmap_area *va, struct rb_root *root,
589 struct rb_node *parent, struct rb_node **link, struct list_head *head)
590{
591 /*
592 * VA is still not in the list, but we can
593 * identify its future previous list_head node.
594 */
595 if (likely(parent)) {
596 head = &rb_entry(parent, struct vmap_area, rb_node)->list;
597 if (&parent->rb_right != link)
598 head = head->prev;
db64fe02
NP
599 }
600
68ad4a33
URS
601 /* Insert to the rb-tree */
602 rb_link_node(&va->rb_node, parent, link);
603 if (root == &free_vmap_area_root) {
604 /*
605 * Some explanation here. Just perform simple insertion
606 * to the tree. We do not set va->subtree_max_size to
607 * its current size before calling rb_insert_augmented().
608 * It is because of we populate the tree from the bottom
609 * to parent levels when the node _is_ in the tree.
610 *
611 * Therefore we set subtree_max_size to zero after insertion,
612 * to let __augment_tree_propagate_from() puts everything to
613 * the correct order later on.
614 */
615 rb_insert_augmented(&va->rb_node,
616 root, &free_vmap_area_rb_augment_cb);
617 va->subtree_max_size = 0;
618 } else {
619 rb_insert_color(&va->rb_node, root);
620 }
db64fe02 621
68ad4a33
URS
622 /* Address-sort this list */
623 list_add(&va->list, head);
db64fe02
NP
624}
625
68ad4a33
URS
626static __always_inline void
627unlink_va(struct vmap_area *va, struct rb_root *root)
628{
460e42d1
URS
629 if (WARN_ON(RB_EMPTY_NODE(&va->rb_node)))
630 return;
db64fe02 631
460e42d1
URS
632 if (root == &free_vmap_area_root)
633 rb_erase_augmented(&va->rb_node,
634 root, &free_vmap_area_rb_augment_cb);
635 else
636 rb_erase(&va->rb_node, root);
637
638 list_del(&va->list);
639 RB_CLEAR_NODE(&va->rb_node);
68ad4a33
URS
640}
641
bb850f4d
URS
642#if DEBUG_AUGMENT_PROPAGATE_CHECK
643static void
da27c9ed 644augment_tree_propagate_check(void)
bb850f4d
URS
645{
646 struct vmap_area *va;
da27c9ed 647 unsigned long computed_size;
bb850f4d 648
da27c9ed
URS
649 list_for_each_entry(va, &free_vmap_area_list, list) {
650 computed_size = compute_subtree_max_size(va);
651 if (computed_size != va->subtree_max_size)
652 pr_emerg("tree is corrupted: %lu, %lu\n",
653 va_size(va), va->subtree_max_size);
bb850f4d 654 }
bb850f4d
URS
655}
656#endif
657
68ad4a33
URS
658/*
659 * This function populates subtree_max_size from bottom to upper
660 * levels starting from VA point. The propagation must be done
661 * when VA size is modified by changing its va_start/va_end. Or
662 * in case of newly inserting of VA to the tree.
663 *
664 * It means that __augment_tree_propagate_from() must be called:
665 * - After VA has been inserted to the tree(free path);
666 * - After VA has been shrunk(allocation path);
667 * - After VA has been increased(merging path).
668 *
669 * Please note that, it does not mean that upper parent nodes
670 * and their subtree_max_size are recalculated all the time up
671 * to the root node.
672 *
673 * 4--8
674 * /\
675 * / \
676 * / \
677 * 2--2 8--8
678 *
679 * For example if we modify the node 4, shrinking it to 2, then
680 * no any modification is required. If we shrink the node 2 to 1
681 * its subtree_max_size is updated only, and set to 1. If we shrink
682 * the node 8 to 6, then its subtree_max_size is set to 6 and parent
683 * node becomes 4--6.
684 */
685static __always_inline void
686augment_tree_propagate_from(struct vmap_area *va)
687{
15ae144f
URS
688 /*
689 * Populate the tree from bottom towards the root until
690 * the calculated maximum available size of checked node
691 * is equal to its current one.
692 */
693 free_vmap_area_rb_augment_cb_propagate(&va->rb_node, NULL);
bb850f4d
URS
694
695#if DEBUG_AUGMENT_PROPAGATE_CHECK
da27c9ed 696 augment_tree_propagate_check();
bb850f4d 697#endif
68ad4a33
URS
698}
699
700static void
701insert_vmap_area(struct vmap_area *va,
702 struct rb_root *root, struct list_head *head)
703{
704 struct rb_node **link;
705 struct rb_node *parent;
706
707 link = find_va_links(va, root, NULL, &parent);
9c801f61
URS
708 if (link)
709 link_va(va, root, parent, link, head);
68ad4a33
URS
710}
711
712static void
713insert_vmap_area_augment(struct vmap_area *va,
714 struct rb_node *from, struct rb_root *root,
715 struct list_head *head)
716{
717 struct rb_node **link;
718 struct rb_node *parent;
719
720 if (from)
721 link = find_va_links(va, NULL, from, &parent);
722 else
723 link = find_va_links(va, root, NULL, &parent);
724
9c801f61
URS
725 if (link) {
726 link_va(va, root, parent, link, head);
727 augment_tree_propagate_from(va);
728 }
68ad4a33
URS
729}
730
731/*
732 * Merge de-allocated chunk of VA memory with previous
733 * and next free blocks. If coalesce is not done a new
734 * free area is inserted. If VA has been merged, it is
735 * freed.
9c801f61
URS
736 *
737 * Please note, it can return NULL in case of overlap
738 * ranges, followed by WARN() report. Despite it is a
739 * buggy behaviour, a system can be alive and keep
740 * ongoing.
68ad4a33 741 */
3c5c3cfb 742static __always_inline struct vmap_area *
68ad4a33
URS
743merge_or_add_vmap_area(struct vmap_area *va,
744 struct rb_root *root, struct list_head *head)
745{
746 struct vmap_area *sibling;
747 struct list_head *next;
748 struct rb_node **link;
749 struct rb_node *parent;
750 bool merged = false;
751
752 /*
753 * Find a place in the tree where VA potentially will be
754 * inserted, unless it is merged with its sibling/siblings.
755 */
756 link = find_va_links(va, root, NULL, &parent);
9c801f61
URS
757 if (!link)
758 return NULL;
68ad4a33
URS
759
760 /*
761 * Get next node of VA to check if merging can be done.
762 */
763 next = get_va_next_sibling(parent, link);
764 if (unlikely(next == NULL))
765 goto insert;
766
767 /*
768 * start end
769 * | |
770 * |<------VA------>|<-----Next----->|
771 * | |
772 * start end
773 */
774 if (next != head) {
775 sibling = list_entry(next, struct vmap_area, list);
776 if (sibling->va_start == va->va_end) {
777 sibling->va_start = va->va_start;
778
68ad4a33
URS
779 /* Free vmap_area object. */
780 kmem_cache_free(vmap_area_cachep, va);
781
782 /* Point to the new merged area. */
783 va = sibling;
784 merged = true;
785 }
786 }
787
788 /*
789 * start end
790 * | |
791 * |<-----Prev----->|<------VA------>|
792 * | |
793 * start end
794 */
795 if (next->prev != head) {
796 sibling = list_entry(next->prev, struct vmap_area, list);
797 if (sibling->va_end == va->va_start) {
5dd78640
URS
798 /*
799 * If both neighbors are coalesced, it is important
800 * to unlink the "next" node first, followed by merging
801 * with "previous" one. Otherwise the tree might not be
802 * fully populated if a sibling's augmented value is
803 * "normalized" because of rotation operations.
804 */
54f63d9d
URS
805 if (merged)
806 unlink_va(va, root);
68ad4a33 807
5dd78640
URS
808 sibling->va_end = va->va_end;
809
68ad4a33
URS
810 /* Free vmap_area object. */
811 kmem_cache_free(vmap_area_cachep, va);
3c5c3cfb
DA
812
813 /* Point to the new merged area. */
814 va = sibling;
815 merged = true;
68ad4a33
URS
816 }
817 }
818
819insert:
5dd78640 820 if (!merged)
68ad4a33 821 link_va(va, root, parent, link, head);
3c5c3cfb 822
5dd78640
URS
823 /*
824 * Last step is to check and update the tree.
825 */
826 augment_tree_propagate_from(va);
3c5c3cfb 827 return va;
68ad4a33
URS
828}
829
830static __always_inline bool
831is_within_this_va(struct vmap_area *va, unsigned long size,
832 unsigned long align, unsigned long vstart)
833{
834 unsigned long nva_start_addr;
835
836 if (va->va_start > vstart)
837 nva_start_addr = ALIGN(va->va_start, align);
838 else
839 nva_start_addr = ALIGN(vstart, align);
840
841 /* Can be overflowed due to big size or alignment. */
842 if (nva_start_addr + size < nva_start_addr ||
843 nva_start_addr < vstart)
844 return false;
845
846 return (nva_start_addr + size <= va->va_end);
847}
848
849/*
850 * Find the first free block(lowest start address) in the tree,
851 * that will accomplish the request corresponding to passing
852 * parameters.
853 */
854static __always_inline struct vmap_area *
855find_vmap_lowest_match(unsigned long size,
856 unsigned long align, unsigned long vstart)
857{
858 struct vmap_area *va;
859 struct rb_node *node;
860 unsigned long length;
861
862 /* Start from the root. */
863 node = free_vmap_area_root.rb_node;
864
865 /* Adjust the search size for alignment overhead. */
866 length = size + align - 1;
867
868 while (node) {
869 va = rb_entry(node, struct vmap_area, rb_node);
870
871 if (get_subtree_max_size(node->rb_left) >= length &&
872 vstart < va->va_start) {
873 node = node->rb_left;
874 } else {
875 if (is_within_this_va(va, size, align, vstart))
876 return va;
877
878 /*
879 * Does not make sense to go deeper towards the right
880 * sub-tree if it does not have a free block that is
881 * equal or bigger to the requested search length.
882 */
883 if (get_subtree_max_size(node->rb_right) >= length) {
884 node = node->rb_right;
885 continue;
886 }
887
888 /*
3806b041 889 * OK. We roll back and find the first right sub-tree,
68ad4a33
URS
890 * that will satisfy the search criteria. It can happen
891 * only once due to "vstart" restriction.
892 */
893 while ((node = rb_parent(node))) {
894 va = rb_entry(node, struct vmap_area, rb_node);
895 if (is_within_this_va(va, size, align, vstart))
896 return va;
897
898 if (get_subtree_max_size(node->rb_right) >= length &&
899 vstart <= va->va_start) {
900 node = node->rb_right;
901 break;
902 }
903 }
904 }
905 }
906
907 return NULL;
908}
909
a6cf4e0f
URS
910#if DEBUG_AUGMENT_LOWEST_MATCH_CHECK
911#include <linux/random.h>
912
913static struct vmap_area *
914find_vmap_lowest_linear_match(unsigned long size,
915 unsigned long align, unsigned long vstart)
916{
917 struct vmap_area *va;
918
919 list_for_each_entry(va, &free_vmap_area_list, list) {
920 if (!is_within_this_va(va, size, align, vstart))
921 continue;
922
923 return va;
924 }
925
926 return NULL;
927}
928
929static void
930find_vmap_lowest_match_check(unsigned long size)
931{
932 struct vmap_area *va_1, *va_2;
933 unsigned long vstart;
934 unsigned int rnd;
935
936 get_random_bytes(&rnd, sizeof(rnd));
937 vstart = VMALLOC_START + rnd;
938
939 va_1 = find_vmap_lowest_match(size, 1, vstart);
940 va_2 = find_vmap_lowest_linear_match(size, 1, vstart);
941
942 if (va_1 != va_2)
943 pr_emerg("not lowest: t: 0x%p, l: 0x%p, v: 0x%lx\n",
944 va_1, va_2, vstart);
945}
946#endif
947
68ad4a33
URS
948enum fit_type {
949 NOTHING_FIT = 0,
950 FL_FIT_TYPE = 1, /* full fit */
951 LE_FIT_TYPE = 2, /* left edge fit */
952 RE_FIT_TYPE = 3, /* right edge fit */
953 NE_FIT_TYPE = 4 /* no edge fit */
954};
955
956static __always_inline enum fit_type
957classify_va_fit_type(struct vmap_area *va,
958 unsigned long nva_start_addr, unsigned long size)
959{
960 enum fit_type type;
961
962 /* Check if it is within VA. */
963 if (nva_start_addr < va->va_start ||
964 nva_start_addr + size > va->va_end)
965 return NOTHING_FIT;
966
967 /* Now classify. */
968 if (va->va_start == nva_start_addr) {
969 if (va->va_end == nva_start_addr + size)
970 type = FL_FIT_TYPE;
971 else
972 type = LE_FIT_TYPE;
973 } else if (va->va_end == nva_start_addr + size) {
974 type = RE_FIT_TYPE;
975 } else {
976 type = NE_FIT_TYPE;
977 }
978
979 return type;
980}
981
982static __always_inline int
983adjust_va_to_fit_type(struct vmap_area *va,
984 unsigned long nva_start_addr, unsigned long size,
985 enum fit_type type)
986{
2c929233 987 struct vmap_area *lva = NULL;
68ad4a33
URS
988
989 if (type == FL_FIT_TYPE) {
990 /*
991 * No need to split VA, it fully fits.
992 *
993 * | |
994 * V NVA V
995 * |---------------|
996 */
997 unlink_va(va, &free_vmap_area_root);
998 kmem_cache_free(vmap_area_cachep, va);
999 } else if (type == LE_FIT_TYPE) {
1000 /*
1001 * Split left edge of fit VA.
1002 *
1003 * | |
1004 * V NVA V R
1005 * |-------|-------|
1006 */
1007 va->va_start += size;
1008 } else if (type == RE_FIT_TYPE) {
1009 /*
1010 * Split right edge of fit VA.
1011 *
1012 * | |
1013 * L V NVA V
1014 * |-------|-------|
1015 */
1016 va->va_end = nva_start_addr;
1017 } else if (type == NE_FIT_TYPE) {
1018 /*
1019 * Split no edge of fit VA.
1020 *
1021 * | |
1022 * L V NVA V R
1023 * |---|-------|---|
1024 */
82dd23e8
URS
1025 lva = __this_cpu_xchg(ne_fit_preload_node, NULL);
1026 if (unlikely(!lva)) {
1027 /*
1028 * For percpu allocator we do not do any pre-allocation
1029 * and leave it as it is. The reason is it most likely
1030 * never ends up with NE_FIT_TYPE splitting. In case of
1031 * percpu allocations offsets and sizes are aligned to
1032 * fixed align request, i.e. RE_FIT_TYPE and FL_FIT_TYPE
1033 * are its main fitting cases.
1034 *
1035 * There are a few exceptions though, as an example it is
1036 * a first allocation (early boot up) when we have "one"
1037 * big free space that has to be split.
060650a2
URS
1038 *
1039 * Also we can hit this path in case of regular "vmap"
1040 * allocations, if "this" current CPU was not preloaded.
1041 * See the comment in alloc_vmap_area() why. If so, then
1042 * GFP_NOWAIT is used instead to get an extra object for
1043 * split purpose. That is rare and most time does not
1044 * occur.
1045 *
1046 * What happens if an allocation gets failed. Basically,
1047 * an "overflow" path is triggered to purge lazily freed
1048 * areas to free some memory, then, the "retry" path is
1049 * triggered to repeat one more time. See more details
1050 * in alloc_vmap_area() function.
82dd23e8
URS
1051 */
1052 lva = kmem_cache_alloc(vmap_area_cachep, GFP_NOWAIT);
1053 if (!lva)
1054 return -1;
1055 }
68ad4a33
URS
1056
1057 /*
1058 * Build the remainder.
1059 */
1060 lva->va_start = va->va_start;
1061 lva->va_end = nva_start_addr;
1062
1063 /*
1064 * Shrink this VA to remaining size.
1065 */
1066 va->va_start = nva_start_addr + size;
1067 } else {
1068 return -1;
1069 }
1070
1071 if (type != FL_FIT_TYPE) {
1072 augment_tree_propagate_from(va);
1073
2c929233 1074 if (lva) /* type == NE_FIT_TYPE */
68ad4a33
URS
1075 insert_vmap_area_augment(lva, &va->rb_node,
1076 &free_vmap_area_root, &free_vmap_area_list);
1077 }
1078
1079 return 0;
1080}
1081
1082/*
1083 * Returns a start address of the newly allocated area, if success.
1084 * Otherwise a vend is returned that indicates failure.
1085 */
1086static __always_inline unsigned long
1087__alloc_vmap_area(unsigned long size, unsigned long align,
cacca6ba 1088 unsigned long vstart, unsigned long vend)
68ad4a33
URS
1089{
1090 unsigned long nva_start_addr;
1091 struct vmap_area *va;
1092 enum fit_type type;
1093 int ret;
1094
1095 va = find_vmap_lowest_match(size, align, vstart);
1096 if (unlikely(!va))
1097 return vend;
1098
1099 if (va->va_start > vstart)
1100 nva_start_addr = ALIGN(va->va_start, align);
1101 else
1102 nva_start_addr = ALIGN(vstart, align);
1103
1104 /* Check the "vend" restriction. */
1105 if (nva_start_addr + size > vend)
1106 return vend;
1107
1108 /* Classify what we have found. */
1109 type = classify_va_fit_type(va, nva_start_addr, size);
1110 if (WARN_ON_ONCE(type == NOTHING_FIT))
1111 return vend;
1112
1113 /* Update the free vmap_area. */
1114 ret = adjust_va_to_fit_type(va, nva_start_addr, size, type);
1115 if (ret)
1116 return vend;
1117
a6cf4e0f
URS
1118#if DEBUG_AUGMENT_LOWEST_MATCH_CHECK
1119 find_vmap_lowest_match_check(size);
1120#endif
1121
68ad4a33
URS
1122 return nva_start_addr;
1123}
4da56b99 1124
d98c9e83
AR
1125/*
1126 * Free a region of KVA allocated by alloc_vmap_area
1127 */
1128static void free_vmap_area(struct vmap_area *va)
1129{
1130 /*
1131 * Remove from the busy tree/list.
1132 */
1133 spin_lock(&vmap_area_lock);
1134 unlink_va(va, &vmap_area_root);
1135 spin_unlock(&vmap_area_lock);
1136
1137 /*
1138 * Insert/Merge it back to the free tree/list.
1139 */
1140 spin_lock(&free_vmap_area_lock);
1141 merge_or_add_vmap_area(va, &free_vmap_area_root, &free_vmap_area_list);
1142 spin_unlock(&free_vmap_area_lock);
1143}
1144
db64fe02
NP
1145/*
1146 * Allocate a region of KVA of the specified size and alignment, within the
1147 * vstart and vend.
1148 */
1149static struct vmap_area *alloc_vmap_area(unsigned long size,
1150 unsigned long align,
1151 unsigned long vstart, unsigned long vend,
1152 int node, gfp_t gfp_mask)
1153{
82dd23e8 1154 struct vmap_area *va, *pva;
1da177e4 1155 unsigned long addr;
db64fe02 1156 int purged = 0;
d98c9e83 1157 int ret;
db64fe02 1158
7766970c 1159 BUG_ON(!size);
891c49ab 1160 BUG_ON(offset_in_page(size));
89699605 1161 BUG_ON(!is_power_of_2(align));
db64fe02 1162
68ad4a33
URS
1163 if (unlikely(!vmap_initialized))
1164 return ERR_PTR(-EBUSY);
1165
5803ed29 1166 might_sleep();
f07116d7 1167 gfp_mask = gfp_mask & GFP_RECLAIM_MASK;
4da56b99 1168
f07116d7 1169 va = kmem_cache_alloc_node(vmap_area_cachep, gfp_mask, node);
db64fe02
NP
1170 if (unlikely(!va))
1171 return ERR_PTR(-ENOMEM);
1172
7f88f88f
CM
1173 /*
1174 * Only scan the relevant parts containing pointers to other objects
1175 * to avoid false negatives.
1176 */
f07116d7 1177 kmemleak_scan_area(&va->rb_node, SIZE_MAX, gfp_mask);
7f88f88f 1178
db64fe02 1179retry:
82dd23e8 1180 /*
81f1ba58
URS
1181 * Preload this CPU with one extra vmap_area object. It is used
1182 * when fit type of free area is NE_FIT_TYPE. Please note, it
1183 * does not guarantee that an allocation occurs on a CPU that
1184 * is preloaded, instead we minimize the case when it is not.
1185 * It can happen because of cpu migration, because there is a
1186 * race until the below spinlock is taken.
82dd23e8
URS
1187 *
1188 * The preload is done in non-atomic context, thus it allows us
1189 * to use more permissive allocation masks to be more stable under
81f1ba58
URS
1190 * low memory condition and high memory pressure. In rare case,
1191 * if not preloaded, GFP_NOWAIT is used.
82dd23e8 1192 *
81f1ba58 1193 * Set "pva" to NULL here, because of "retry" path.
82dd23e8 1194 */
81f1ba58 1195 pva = NULL;
82dd23e8 1196
81f1ba58
URS
1197 if (!this_cpu_read(ne_fit_preload_node))
1198 /*
1199 * Even if it fails we do not really care about that.
1200 * Just proceed as it is. If needed "overflow" path
1201 * will refill the cache we allocate from.
1202 */
f07116d7 1203 pva = kmem_cache_alloc_node(vmap_area_cachep, gfp_mask, node);
82dd23e8 1204
e36176be 1205 spin_lock(&free_vmap_area_lock);
81f1ba58
URS
1206
1207 if (pva && __this_cpu_cmpxchg(ne_fit_preload_node, NULL, pva))
1208 kmem_cache_free(vmap_area_cachep, pva);
89699605 1209
afd07389 1210 /*
68ad4a33
URS
1211 * If an allocation fails, the "vend" address is
1212 * returned. Therefore trigger the overflow path.
afd07389 1213 */
cacca6ba 1214 addr = __alloc_vmap_area(size, align, vstart, vend);
e36176be
URS
1215 spin_unlock(&free_vmap_area_lock);
1216
68ad4a33 1217 if (unlikely(addr == vend))
89699605 1218 goto overflow;
db64fe02
NP
1219
1220 va->va_start = addr;
1221 va->va_end = addr + size;
688fcbfc 1222 va->vm = NULL;
68ad4a33 1223
d98c9e83 1224
e36176be
URS
1225 spin_lock(&vmap_area_lock);
1226 insert_vmap_area(va, &vmap_area_root, &vmap_area_list);
db64fe02
NP
1227 spin_unlock(&vmap_area_lock);
1228
61e16557 1229 BUG_ON(!IS_ALIGNED(va->va_start, align));
89699605
NP
1230 BUG_ON(va->va_start < vstart);
1231 BUG_ON(va->va_end > vend);
1232
d98c9e83
AR
1233 ret = kasan_populate_vmalloc(addr, size);
1234 if (ret) {
1235 free_vmap_area(va);
1236 return ERR_PTR(ret);
1237 }
1238
db64fe02 1239 return va;
89699605
NP
1240
1241overflow:
89699605
NP
1242 if (!purged) {
1243 purge_vmap_area_lazy();
1244 purged = 1;
1245 goto retry;
1246 }
4da56b99
CW
1247
1248 if (gfpflags_allow_blocking(gfp_mask)) {
1249 unsigned long freed = 0;
1250 blocking_notifier_call_chain(&vmap_notify_list, 0, &freed);
1251 if (freed > 0) {
1252 purged = 0;
1253 goto retry;
1254 }
1255 }
1256
03497d76 1257 if (!(gfp_mask & __GFP_NOWARN) && printk_ratelimit())
756a025f
JP
1258 pr_warn("vmap allocation for size %lu failed: use vmalloc=<size> to increase size\n",
1259 size);
68ad4a33
URS
1260
1261 kmem_cache_free(vmap_area_cachep, va);
89699605 1262 return ERR_PTR(-EBUSY);
db64fe02
NP
1263}
1264
4da56b99
CW
1265int register_vmap_purge_notifier(struct notifier_block *nb)
1266{
1267 return blocking_notifier_chain_register(&vmap_notify_list, nb);
1268}
1269EXPORT_SYMBOL_GPL(register_vmap_purge_notifier);
1270
1271int unregister_vmap_purge_notifier(struct notifier_block *nb)
1272{
1273 return blocking_notifier_chain_unregister(&vmap_notify_list, nb);
1274}
1275EXPORT_SYMBOL_GPL(unregister_vmap_purge_notifier);
1276
db64fe02
NP
1277/*
1278 * lazy_max_pages is the maximum amount of virtual address space we gather up
1279 * before attempting to purge with a TLB flush.
1280 *
1281 * There is a tradeoff here: a larger number will cover more kernel page tables
1282 * and take slightly longer to purge, but it will linearly reduce the number of
1283 * global TLB flushes that must be performed. It would seem natural to scale
1284 * this number up linearly with the number of CPUs (because vmapping activity
1285 * could also scale linearly with the number of CPUs), however it is likely
1286 * that in practice, workloads might be constrained in other ways that mean
1287 * vmap activity will not scale linearly with CPUs. Also, I want to be
1288 * conservative and not introduce a big latency on huge systems, so go with
1289 * a less aggressive log scale. It will still be an improvement over the old
1290 * code, and it will be simple to change the scale factor if we find that it
1291 * becomes a problem on bigger systems.
1292 */
1293static unsigned long lazy_max_pages(void)
1294{
1295 unsigned int log;
1296
1297 log = fls(num_online_cpus());
1298
1299 return log * (32UL * 1024 * 1024 / PAGE_SIZE);
1300}
1301
4d36e6f8 1302static atomic_long_t vmap_lazy_nr = ATOMIC_LONG_INIT(0);
db64fe02 1303
0574ecd1
CH
1304/*
1305 * Serialize vmap purging. There is no actual criticial section protected
1306 * by this look, but we want to avoid concurrent calls for performance
1307 * reasons and to make the pcpu_get_vm_areas more deterministic.
1308 */
f9e09977 1309static DEFINE_MUTEX(vmap_purge_lock);
0574ecd1 1310
02b709df
NP
1311/* for per-CPU blocks */
1312static void purge_fragmented_blocks_allcpus(void);
1313
3ee48b6a
CW
1314/*
1315 * called before a call to iounmap() if the caller wants vm_area_struct's
1316 * immediately freed.
1317 */
1318void set_iounmap_nonlazy(void)
1319{
4d36e6f8 1320 atomic_long_set(&vmap_lazy_nr, lazy_max_pages()+1);
3ee48b6a
CW
1321}
1322
db64fe02
NP
1323/*
1324 * Purges all lazily-freed vmap areas.
db64fe02 1325 */
0574ecd1 1326static bool __purge_vmap_area_lazy(unsigned long start, unsigned long end)
db64fe02 1327{
4d36e6f8 1328 unsigned long resched_threshold;
80c4bd7a 1329 struct llist_node *valist;
db64fe02 1330 struct vmap_area *va;
cbb76676 1331 struct vmap_area *n_va;
db64fe02 1332
0574ecd1 1333 lockdep_assert_held(&vmap_purge_lock);
02b709df 1334
80c4bd7a 1335 valist = llist_del_all(&vmap_purge_list);
68571be9
URS
1336 if (unlikely(valist == NULL))
1337 return false;
1338
1339 /*
1340 * TODO: to calculate a flush range without looping.
1341 * The list can be up to lazy_max_pages() elements.
1342 */
80c4bd7a 1343 llist_for_each_entry(va, valist, purge_list) {
0574ecd1
CH
1344 if (va->va_start < start)
1345 start = va->va_start;
1346 if (va->va_end > end)
1347 end = va->va_end;
db64fe02 1348 }
db64fe02 1349
0574ecd1 1350 flush_tlb_kernel_range(start, end);
4d36e6f8 1351 resched_threshold = lazy_max_pages() << 1;
db64fe02 1352
e36176be 1353 spin_lock(&free_vmap_area_lock);
763b218d 1354 llist_for_each_entry_safe(va, n_va, valist, purge_list) {
4d36e6f8 1355 unsigned long nr = (va->va_end - va->va_start) >> PAGE_SHIFT;
3c5c3cfb
DA
1356 unsigned long orig_start = va->va_start;
1357 unsigned long orig_end = va->va_end;
763b218d 1358
dd3b8353
URS
1359 /*
1360 * Finally insert or merge lazily-freed area. It is
1361 * detached and there is no need to "unlink" it from
1362 * anything.
1363 */
3c5c3cfb
DA
1364 va = merge_or_add_vmap_area(va, &free_vmap_area_root,
1365 &free_vmap_area_list);
1366
9c801f61
URS
1367 if (!va)
1368 continue;
1369
3c5c3cfb
DA
1370 if (is_vmalloc_or_module_addr((void *)orig_start))
1371 kasan_release_vmalloc(orig_start, orig_end,
1372 va->va_start, va->va_end);
dd3b8353 1373
4d36e6f8 1374 atomic_long_sub(nr, &vmap_lazy_nr);
68571be9 1375
4d36e6f8 1376 if (atomic_long_read(&vmap_lazy_nr) < resched_threshold)
e36176be 1377 cond_resched_lock(&free_vmap_area_lock);
763b218d 1378 }
e36176be 1379 spin_unlock(&free_vmap_area_lock);
0574ecd1 1380 return true;
db64fe02
NP
1381}
1382
496850e5
NP
1383/*
1384 * Kick off a purge of the outstanding lazy areas. Don't bother if somebody
1385 * is already purging.
1386 */
1387static void try_purge_vmap_area_lazy(void)
1388{
f9e09977 1389 if (mutex_trylock(&vmap_purge_lock)) {
0574ecd1 1390 __purge_vmap_area_lazy(ULONG_MAX, 0);
f9e09977 1391 mutex_unlock(&vmap_purge_lock);
0574ecd1 1392 }
496850e5
NP
1393}
1394
db64fe02
NP
1395/*
1396 * Kick off a purge of the outstanding lazy areas.
1397 */
1398static void purge_vmap_area_lazy(void)
1399{
f9e09977 1400 mutex_lock(&vmap_purge_lock);
0574ecd1
CH
1401 purge_fragmented_blocks_allcpus();
1402 __purge_vmap_area_lazy(ULONG_MAX, 0);
f9e09977 1403 mutex_unlock(&vmap_purge_lock);
db64fe02
NP
1404}
1405
1406/*
64141da5
JF
1407 * Free a vmap area, caller ensuring that the area has been unmapped
1408 * and flush_cache_vunmap had been called for the correct range
1409 * previously.
db64fe02 1410 */
64141da5 1411static void free_vmap_area_noflush(struct vmap_area *va)
db64fe02 1412{
4d36e6f8 1413 unsigned long nr_lazy;
80c4bd7a 1414
dd3b8353
URS
1415 spin_lock(&vmap_area_lock);
1416 unlink_va(va, &vmap_area_root);
1417 spin_unlock(&vmap_area_lock);
1418
4d36e6f8
URS
1419 nr_lazy = atomic_long_add_return((va->va_end - va->va_start) >>
1420 PAGE_SHIFT, &vmap_lazy_nr);
80c4bd7a
CW
1421
1422 /* After this point, we may free va at any time */
1423 llist_add(&va->purge_list, &vmap_purge_list);
1424
1425 if (unlikely(nr_lazy > lazy_max_pages()))
496850e5 1426 try_purge_vmap_area_lazy();
db64fe02
NP
1427}
1428
b29acbdc
NP
1429/*
1430 * Free and unmap a vmap area
1431 */
1432static void free_unmap_vmap_area(struct vmap_area *va)
1433{
1434 flush_cache_vunmap(va->va_start, va->va_end);
855e57a1 1435 unmap_kernel_range_noflush(va->va_start, va->va_end - va->va_start);
8e57f8ac 1436 if (debug_pagealloc_enabled_static())
82a2e924
CP
1437 flush_tlb_kernel_range(va->va_start, va->va_end);
1438
c8eef01e 1439 free_vmap_area_noflush(va);
b29acbdc
NP
1440}
1441
db64fe02
NP
1442static struct vmap_area *find_vmap_area(unsigned long addr)
1443{
1444 struct vmap_area *va;
1445
1446 spin_lock(&vmap_area_lock);
1447 va = __find_vmap_area(addr);
1448 spin_unlock(&vmap_area_lock);
1449
1450 return va;
1451}
1452
db64fe02
NP
1453/*** Per cpu kva allocator ***/
1454
1455/*
1456 * vmap space is limited especially on 32 bit architectures. Ensure there is
1457 * room for at least 16 percpu vmap blocks per CPU.
1458 */
1459/*
1460 * If we had a constant VMALLOC_START and VMALLOC_END, we'd like to be able
1461 * to #define VMALLOC_SPACE (VMALLOC_END-VMALLOC_START). Guess
1462 * instead (we just need a rough idea)
1463 */
1464#if BITS_PER_LONG == 32
1465#define VMALLOC_SPACE (128UL*1024*1024)
1466#else
1467#define VMALLOC_SPACE (128UL*1024*1024*1024)
1468#endif
1469
1470#define VMALLOC_PAGES (VMALLOC_SPACE / PAGE_SIZE)
1471#define VMAP_MAX_ALLOC BITS_PER_LONG /* 256K with 4K pages */
1472#define VMAP_BBMAP_BITS_MAX 1024 /* 4MB with 4K pages */
1473#define VMAP_BBMAP_BITS_MIN (VMAP_MAX_ALLOC*2)
1474#define VMAP_MIN(x, y) ((x) < (y) ? (x) : (y)) /* can't use min() */
1475#define VMAP_MAX(x, y) ((x) > (y) ? (x) : (y)) /* can't use max() */
f982f915
CL
1476#define VMAP_BBMAP_BITS \
1477 VMAP_MIN(VMAP_BBMAP_BITS_MAX, \
1478 VMAP_MAX(VMAP_BBMAP_BITS_MIN, \
1479 VMALLOC_PAGES / roundup_pow_of_two(NR_CPUS) / 16))
db64fe02
NP
1480
1481#define VMAP_BLOCK_SIZE (VMAP_BBMAP_BITS * PAGE_SIZE)
1482
1483struct vmap_block_queue {
1484 spinlock_t lock;
1485 struct list_head free;
db64fe02
NP
1486};
1487
1488struct vmap_block {
1489 spinlock_t lock;
1490 struct vmap_area *va;
db64fe02 1491 unsigned long free, dirty;
7d61bfe8 1492 unsigned long dirty_min, dirty_max; /*< dirty range */
de560423
NP
1493 struct list_head free_list;
1494 struct rcu_head rcu_head;
02b709df 1495 struct list_head purge;
db64fe02
NP
1496};
1497
1498/* Queue of free and dirty vmap blocks, for allocation and flushing purposes */
1499static DEFINE_PER_CPU(struct vmap_block_queue, vmap_block_queue);
1500
1501/*
0f14599c 1502 * XArray of vmap blocks, indexed by address, to quickly find a vmap block
db64fe02
NP
1503 * in the free path. Could get rid of this if we change the API to return a
1504 * "cookie" from alloc, to be passed to free. But no big deal yet.
1505 */
0f14599c 1506static DEFINE_XARRAY(vmap_blocks);
db64fe02
NP
1507
1508/*
1509 * We should probably have a fallback mechanism to allocate virtual memory
1510 * out of partially filled vmap blocks. However vmap block sizing should be
1511 * fairly reasonable according to the vmalloc size, so it shouldn't be a
1512 * big problem.
1513 */
1514
1515static unsigned long addr_to_vb_idx(unsigned long addr)
1516{
1517 addr -= VMALLOC_START & ~(VMAP_BLOCK_SIZE-1);
1518 addr /= VMAP_BLOCK_SIZE;
1519 return addr;
1520}
1521
cf725ce2
RP
1522static void *vmap_block_vaddr(unsigned long va_start, unsigned long pages_off)
1523{
1524 unsigned long addr;
1525
1526 addr = va_start + (pages_off << PAGE_SHIFT);
1527 BUG_ON(addr_to_vb_idx(addr) != addr_to_vb_idx(va_start));
1528 return (void *)addr;
1529}
1530
1531/**
1532 * new_vmap_block - allocates new vmap_block and occupies 2^order pages in this
1533 * block. Of course pages number can't exceed VMAP_BBMAP_BITS
1534 * @order: how many 2^order pages should be occupied in newly allocated block
1535 * @gfp_mask: flags for the page level allocator
1536 *
a862f68a 1537 * Return: virtual address in a newly allocated block or ERR_PTR(-errno)
cf725ce2
RP
1538 */
1539static void *new_vmap_block(unsigned int order, gfp_t gfp_mask)
db64fe02
NP
1540{
1541 struct vmap_block_queue *vbq;
1542 struct vmap_block *vb;
1543 struct vmap_area *va;
1544 unsigned long vb_idx;
1545 int node, err;
cf725ce2 1546 void *vaddr;
db64fe02
NP
1547
1548 node = numa_node_id();
1549
1550 vb = kmalloc_node(sizeof(struct vmap_block),
1551 gfp_mask & GFP_RECLAIM_MASK, node);
1552 if (unlikely(!vb))
1553 return ERR_PTR(-ENOMEM);
1554
1555 va = alloc_vmap_area(VMAP_BLOCK_SIZE, VMAP_BLOCK_SIZE,
1556 VMALLOC_START, VMALLOC_END,
1557 node, gfp_mask);
ddf9c6d4 1558 if (IS_ERR(va)) {
db64fe02 1559 kfree(vb);
e7d86340 1560 return ERR_CAST(va);
db64fe02
NP
1561 }
1562
cf725ce2 1563 vaddr = vmap_block_vaddr(va->va_start, 0);
db64fe02
NP
1564 spin_lock_init(&vb->lock);
1565 vb->va = va;
cf725ce2
RP
1566 /* At least something should be left free */
1567 BUG_ON(VMAP_BBMAP_BITS <= (1UL << order));
1568 vb->free = VMAP_BBMAP_BITS - (1UL << order);
db64fe02 1569 vb->dirty = 0;
7d61bfe8
RP
1570 vb->dirty_min = VMAP_BBMAP_BITS;
1571 vb->dirty_max = 0;
db64fe02 1572 INIT_LIST_HEAD(&vb->free_list);
db64fe02
NP
1573
1574 vb_idx = addr_to_vb_idx(va->va_start);
0f14599c
MWO
1575 err = xa_insert(&vmap_blocks, vb_idx, vb, gfp_mask);
1576 if (err) {
1577 kfree(vb);
1578 free_vmap_area(va);
1579 return ERR_PTR(err);
1580 }
db64fe02
NP
1581
1582 vbq = &get_cpu_var(vmap_block_queue);
db64fe02 1583 spin_lock(&vbq->lock);
68ac546f 1584 list_add_tail_rcu(&vb->free_list, &vbq->free);
db64fe02 1585 spin_unlock(&vbq->lock);
3f04ba85 1586 put_cpu_var(vmap_block_queue);
db64fe02 1587
cf725ce2 1588 return vaddr;
db64fe02
NP
1589}
1590
db64fe02
NP
1591static void free_vmap_block(struct vmap_block *vb)
1592{
1593 struct vmap_block *tmp;
db64fe02 1594
0f14599c 1595 tmp = xa_erase(&vmap_blocks, addr_to_vb_idx(vb->va->va_start));
db64fe02
NP
1596 BUG_ON(tmp != vb);
1597
64141da5 1598 free_vmap_area_noflush(vb->va);
22a3c7d1 1599 kfree_rcu(vb, rcu_head);
db64fe02
NP
1600}
1601
02b709df
NP
1602static void purge_fragmented_blocks(int cpu)
1603{
1604 LIST_HEAD(purge);
1605 struct vmap_block *vb;
1606 struct vmap_block *n_vb;
1607 struct vmap_block_queue *vbq = &per_cpu(vmap_block_queue, cpu);
1608
1609 rcu_read_lock();
1610 list_for_each_entry_rcu(vb, &vbq->free, free_list) {
1611
1612 if (!(vb->free + vb->dirty == VMAP_BBMAP_BITS && vb->dirty != VMAP_BBMAP_BITS))
1613 continue;
1614
1615 spin_lock(&vb->lock);
1616 if (vb->free + vb->dirty == VMAP_BBMAP_BITS && vb->dirty != VMAP_BBMAP_BITS) {
1617 vb->free = 0; /* prevent further allocs after releasing lock */
1618 vb->dirty = VMAP_BBMAP_BITS; /* prevent purging it again */
7d61bfe8
RP
1619 vb->dirty_min = 0;
1620 vb->dirty_max = VMAP_BBMAP_BITS;
02b709df
NP
1621 spin_lock(&vbq->lock);
1622 list_del_rcu(&vb->free_list);
1623 spin_unlock(&vbq->lock);
1624 spin_unlock(&vb->lock);
1625 list_add_tail(&vb->purge, &purge);
1626 } else
1627 spin_unlock(&vb->lock);
1628 }
1629 rcu_read_unlock();
1630
1631 list_for_each_entry_safe(vb, n_vb, &purge, purge) {
1632 list_del(&vb->purge);
1633 free_vmap_block(vb);
1634 }
1635}
1636
02b709df
NP
1637static void purge_fragmented_blocks_allcpus(void)
1638{
1639 int cpu;
1640
1641 for_each_possible_cpu(cpu)
1642 purge_fragmented_blocks(cpu);
1643}
1644
db64fe02
NP
1645static void *vb_alloc(unsigned long size, gfp_t gfp_mask)
1646{
1647 struct vmap_block_queue *vbq;
1648 struct vmap_block *vb;
cf725ce2 1649 void *vaddr = NULL;
db64fe02
NP
1650 unsigned int order;
1651
891c49ab 1652 BUG_ON(offset_in_page(size));
db64fe02 1653 BUG_ON(size > PAGE_SIZE*VMAP_MAX_ALLOC);
aa91c4d8
JK
1654 if (WARN_ON(size == 0)) {
1655 /*
1656 * Allocating 0 bytes isn't what caller wants since
1657 * get_order(0) returns funny result. Just warn and terminate
1658 * early.
1659 */
1660 return NULL;
1661 }
db64fe02
NP
1662 order = get_order(size);
1663
db64fe02
NP
1664 rcu_read_lock();
1665 vbq = &get_cpu_var(vmap_block_queue);
1666 list_for_each_entry_rcu(vb, &vbq->free, free_list) {
cf725ce2 1667 unsigned long pages_off;
db64fe02
NP
1668
1669 spin_lock(&vb->lock);
cf725ce2
RP
1670 if (vb->free < (1UL << order)) {
1671 spin_unlock(&vb->lock);
1672 continue;
1673 }
02b709df 1674
cf725ce2
RP
1675 pages_off = VMAP_BBMAP_BITS - vb->free;
1676 vaddr = vmap_block_vaddr(vb->va->va_start, pages_off);
02b709df
NP
1677 vb->free -= 1UL << order;
1678 if (vb->free == 0) {
1679 spin_lock(&vbq->lock);
1680 list_del_rcu(&vb->free_list);
1681 spin_unlock(&vbq->lock);
1682 }
cf725ce2 1683
02b709df
NP
1684 spin_unlock(&vb->lock);
1685 break;
db64fe02 1686 }
02b709df 1687
3f04ba85 1688 put_cpu_var(vmap_block_queue);
db64fe02
NP
1689 rcu_read_unlock();
1690
cf725ce2
RP
1691 /* Allocate new block if nothing was found */
1692 if (!vaddr)
1693 vaddr = new_vmap_block(order, gfp_mask);
db64fe02 1694
cf725ce2 1695 return vaddr;
db64fe02
NP
1696}
1697
78a0e8c4 1698static void vb_free(unsigned long addr, unsigned long size)
db64fe02
NP
1699{
1700 unsigned long offset;
db64fe02
NP
1701 unsigned int order;
1702 struct vmap_block *vb;
1703
891c49ab 1704 BUG_ON(offset_in_page(size));
db64fe02 1705 BUG_ON(size > PAGE_SIZE*VMAP_MAX_ALLOC);
b29acbdc 1706
78a0e8c4 1707 flush_cache_vunmap(addr, addr + size);
b29acbdc 1708
db64fe02 1709 order = get_order(size);
78a0e8c4 1710 offset = (addr & (VMAP_BLOCK_SIZE - 1)) >> PAGE_SHIFT;
0f14599c 1711 vb = xa_load(&vmap_blocks, addr_to_vb_idx(addr));
db64fe02 1712
b521c43f 1713 unmap_kernel_range_noflush(addr, size);
64141da5 1714
8e57f8ac 1715 if (debug_pagealloc_enabled_static())
78a0e8c4 1716 flush_tlb_kernel_range(addr, addr + size);
82a2e924 1717
db64fe02 1718 spin_lock(&vb->lock);
7d61bfe8
RP
1719
1720 /* Expand dirty range */
1721 vb->dirty_min = min(vb->dirty_min, offset);
1722 vb->dirty_max = max(vb->dirty_max, offset + (1UL << order));
d086817d 1723
db64fe02
NP
1724 vb->dirty += 1UL << order;
1725 if (vb->dirty == VMAP_BBMAP_BITS) {
de560423 1726 BUG_ON(vb->free);
db64fe02
NP
1727 spin_unlock(&vb->lock);
1728 free_vmap_block(vb);
1729 } else
1730 spin_unlock(&vb->lock);
1731}
1732
868b104d 1733static void _vm_unmap_aliases(unsigned long start, unsigned long end, int flush)
db64fe02 1734{
db64fe02 1735 int cpu;
db64fe02 1736
9b463334
JF
1737 if (unlikely(!vmap_initialized))
1738 return;
1739
5803ed29
CH
1740 might_sleep();
1741
db64fe02
NP
1742 for_each_possible_cpu(cpu) {
1743 struct vmap_block_queue *vbq = &per_cpu(vmap_block_queue, cpu);
1744 struct vmap_block *vb;
1745
1746 rcu_read_lock();
1747 list_for_each_entry_rcu(vb, &vbq->free, free_list) {
db64fe02 1748 spin_lock(&vb->lock);
7d61bfe8
RP
1749 if (vb->dirty) {
1750 unsigned long va_start = vb->va->va_start;
db64fe02 1751 unsigned long s, e;
b136be5e 1752
7d61bfe8
RP
1753 s = va_start + (vb->dirty_min << PAGE_SHIFT);
1754 e = va_start + (vb->dirty_max << PAGE_SHIFT);
db64fe02 1755
7d61bfe8
RP
1756 start = min(s, start);
1757 end = max(e, end);
db64fe02 1758
7d61bfe8 1759 flush = 1;
db64fe02
NP
1760 }
1761 spin_unlock(&vb->lock);
1762 }
1763 rcu_read_unlock();
1764 }
1765
f9e09977 1766 mutex_lock(&vmap_purge_lock);
0574ecd1
CH
1767 purge_fragmented_blocks_allcpus();
1768 if (!__purge_vmap_area_lazy(start, end) && flush)
1769 flush_tlb_kernel_range(start, end);
f9e09977 1770 mutex_unlock(&vmap_purge_lock);
db64fe02 1771}
868b104d
RE
1772
1773/**
1774 * vm_unmap_aliases - unmap outstanding lazy aliases in the vmap layer
1775 *
1776 * The vmap/vmalloc layer lazily flushes kernel virtual mappings primarily
1777 * to amortize TLB flushing overheads. What this means is that any page you
1778 * have now, may, in a former life, have been mapped into kernel virtual
1779 * address by the vmap layer and so there might be some CPUs with TLB entries
1780 * still referencing that page (additional to the regular 1:1 kernel mapping).
1781 *
1782 * vm_unmap_aliases flushes all such lazy mappings. After it returns, we can
1783 * be sure that none of the pages we have control over will have any aliases
1784 * from the vmap layer.
1785 */
1786void vm_unmap_aliases(void)
1787{
1788 unsigned long start = ULONG_MAX, end = 0;
1789 int flush = 0;
1790
1791 _vm_unmap_aliases(start, end, flush);
1792}
db64fe02
NP
1793EXPORT_SYMBOL_GPL(vm_unmap_aliases);
1794
1795/**
1796 * vm_unmap_ram - unmap linear kernel address space set up by vm_map_ram
1797 * @mem: the pointer returned by vm_map_ram
1798 * @count: the count passed to that vm_map_ram call (cannot unmap partial)
1799 */
1800void vm_unmap_ram(const void *mem, unsigned int count)
1801{
65ee03c4 1802 unsigned long size = (unsigned long)count << PAGE_SHIFT;
db64fe02 1803 unsigned long addr = (unsigned long)mem;
9c3acf60 1804 struct vmap_area *va;
db64fe02 1805
5803ed29 1806 might_sleep();
db64fe02
NP
1807 BUG_ON(!addr);
1808 BUG_ON(addr < VMALLOC_START);
1809 BUG_ON(addr > VMALLOC_END);
a1c0b1a0 1810 BUG_ON(!PAGE_ALIGNED(addr));
db64fe02 1811
d98c9e83
AR
1812 kasan_poison_vmalloc(mem, size);
1813
9c3acf60 1814 if (likely(count <= VMAP_MAX_ALLOC)) {
05e3ff95 1815 debug_check_no_locks_freed(mem, size);
78a0e8c4 1816 vb_free(addr, size);
9c3acf60
CH
1817 return;
1818 }
1819
1820 va = find_vmap_area(addr);
1821 BUG_ON(!va);
05e3ff95
CP
1822 debug_check_no_locks_freed((void *)va->va_start,
1823 (va->va_end - va->va_start));
9c3acf60 1824 free_unmap_vmap_area(va);
db64fe02
NP
1825}
1826EXPORT_SYMBOL(vm_unmap_ram);
1827
1828/**
1829 * vm_map_ram - map pages linearly into kernel virtual address (vmalloc space)
1830 * @pages: an array of pointers to the pages to be mapped
1831 * @count: number of pages
1832 * @node: prefer to allocate data structures on this node
e99c97ad 1833 *
36437638
GK
1834 * If you use this function for less than VMAP_MAX_ALLOC pages, it could be
1835 * faster than vmap so it's good. But if you mix long-life and short-life
1836 * objects with vm_map_ram(), it could consume lots of address space through
1837 * fragmentation (especially on a 32bit machine). You could see failures in
1838 * the end. Please use this function for short-lived objects.
1839 *
e99c97ad 1840 * Returns: a pointer to the address that has been mapped, or %NULL on failure
db64fe02 1841 */
d4efd79a 1842void *vm_map_ram(struct page **pages, unsigned int count, int node)
db64fe02 1843{
65ee03c4 1844 unsigned long size = (unsigned long)count << PAGE_SHIFT;
db64fe02
NP
1845 unsigned long addr;
1846 void *mem;
1847
1848 if (likely(count <= VMAP_MAX_ALLOC)) {
1849 mem = vb_alloc(size, GFP_KERNEL);
1850 if (IS_ERR(mem))
1851 return NULL;
1852 addr = (unsigned long)mem;
1853 } else {
1854 struct vmap_area *va;
1855 va = alloc_vmap_area(size, PAGE_SIZE,
1856 VMALLOC_START, VMALLOC_END, node, GFP_KERNEL);
1857 if (IS_ERR(va))
1858 return NULL;
1859
1860 addr = va->va_start;
1861 mem = (void *)addr;
1862 }
d98c9e83
AR
1863
1864 kasan_unpoison_vmalloc(mem, size);
1865
d4efd79a 1866 if (map_kernel_range(addr, size, PAGE_KERNEL, pages) < 0) {
db64fe02
NP
1867 vm_unmap_ram(mem, count);
1868 return NULL;
1869 }
1870 return mem;
1871}
1872EXPORT_SYMBOL(vm_map_ram);
1873
4341fa45 1874static struct vm_struct *vmlist __initdata;
92eac168 1875
be9b7335
NP
1876/**
1877 * vm_area_add_early - add vmap area early during boot
1878 * @vm: vm_struct to add
1879 *
1880 * This function is used to add fixed kernel vm area to vmlist before
1881 * vmalloc_init() is called. @vm->addr, @vm->size, and @vm->flags
1882 * should contain proper values and the other fields should be zero.
1883 *
1884 * DO NOT USE THIS FUNCTION UNLESS YOU KNOW WHAT YOU'RE DOING.
1885 */
1886void __init vm_area_add_early(struct vm_struct *vm)
1887{
1888 struct vm_struct *tmp, **p;
1889
1890 BUG_ON(vmap_initialized);
1891 for (p = &vmlist; (tmp = *p) != NULL; p = &tmp->next) {
1892 if (tmp->addr >= vm->addr) {
1893 BUG_ON(tmp->addr < vm->addr + vm->size);
1894 break;
1895 } else
1896 BUG_ON(tmp->addr + tmp->size > vm->addr);
1897 }
1898 vm->next = *p;
1899 *p = vm;
1900}
1901
f0aa6617
TH
1902/**
1903 * vm_area_register_early - register vmap area early during boot
1904 * @vm: vm_struct to register
c0c0a293 1905 * @align: requested alignment
f0aa6617
TH
1906 *
1907 * This function is used to register kernel vm area before
1908 * vmalloc_init() is called. @vm->size and @vm->flags should contain
1909 * proper values on entry and other fields should be zero. On return,
1910 * vm->addr contains the allocated address.
1911 *
1912 * DO NOT USE THIS FUNCTION UNLESS YOU KNOW WHAT YOU'RE DOING.
1913 */
c0c0a293 1914void __init vm_area_register_early(struct vm_struct *vm, size_t align)
f0aa6617
TH
1915{
1916 static size_t vm_init_off __initdata;
c0c0a293
TH
1917 unsigned long addr;
1918
1919 addr = ALIGN(VMALLOC_START + vm_init_off, align);
1920 vm_init_off = PFN_ALIGN(addr + vm->size) - VMALLOC_START;
f0aa6617 1921
c0c0a293 1922 vm->addr = (void *)addr;
f0aa6617 1923
be9b7335 1924 vm_area_add_early(vm);
f0aa6617
TH
1925}
1926
68ad4a33
URS
1927static void vmap_init_free_space(void)
1928{
1929 unsigned long vmap_start = 1;
1930 const unsigned long vmap_end = ULONG_MAX;
1931 struct vmap_area *busy, *free;
1932
1933 /*
1934 * B F B B B F
1935 * -|-----|.....|-----|-----|-----|.....|-
1936 * | The KVA space |
1937 * |<--------------------------------->|
1938 */
1939 list_for_each_entry(busy, &vmap_area_list, list) {
1940 if (busy->va_start - vmap_start > 0) {
1941 free = kmem_cache_zalloc(vmap_area_cachep, GFP_NOWAIT);
1942 if (!WARN_ON_ONCE(!free)) {
1943 free->va_start = vmap_start;
1944 free->va_end = busy->va_start;
1945
1946 insert_vmap_area_augment(free, NULL,
1947 &free_vmap_area_root,
1948 &free_vmap_area_list);
1949 }
1950 }
1951
1952 vmap_start = busy->va_end;
1953 }
1954
1955 if (vmap_end - vmap_start > 0) {
1956 free = kmem_cache_zalloc(vmap_area_cachep, GFP_NOWAIT);
1957 if (!WARN_ON_ONCE(!free)) {
1958 free->va_start = vmap_start;
1959 free->va_end = vmap_end;
1960
1961 insert_vmap_area_augment(free, NULL,
1962 &free_vmap_area_root,
1963 &free_vmap_area_list);
1964 }
1965 }
1966}
1967
db64fe02
NP
1968void __init vmalloc_init(void)
1969{
822c18f2
IK
1970 struct vmap_area *va;
1971 struct vm_struct *tmp;
db64fe02
NP
1972 int i;
1973
68ad4a33
URS
1974 /*
1975 * Create the cache for vmap_area objects.
1976 */
1977 vmap_area_cachep = KMEM_CACHE(vmap_area, SLAB_PANIC);
1978
db64fe02
NP
1979 for_each_possible_cpu(i) {
1980 struct vmap_block_queue *vbq;
32fcfd40 1981 struct vfree_deferred *p;
db64fe02
NP
1982
1983 vbq = &per_cpu(vmap_block_queue, i);
1984 spin_lock_init(&vbq->lock);
1985 INIT_LIST_HEAD(&vbq->free);
32fcfd40
AV
1986 p = &per_cpu(vfree_deferred, i);
1987 init_llist_head(&p->list);
1988 INIT_WORK(&p->wq, free_work);
db64fe02 1989 }
9b463334 1990
822c18f2
IK
1991 /* Import existing vmlist entries. */
1992 for (tmp = vmlist; tmp; tmp = tmp->next) {
68ad4a33
URS
1993 va = kmem_cache_zalloc(vmap_area_cachep, GFP_NOWAIT);
1994 if (WARN_ON_ONCE(!va))
1995 continue;
1996
822c18f2
IK
1997 va->va_start = (unsigned long)tmp->addr;
1998 va->va_end = va->va_start + tmp->size;
dbda591d 1999 va->vm = tmp;
68ad4a33 2000 insert_vmap_area(va, &vmap_area_root, &vmap_area_list);
822c18f2 2001 }
ca23e405 2002
68ad4a33
URS
2003 /*
2004 * Now we can initialize a free vmap space.
2005 */
2006 vmap_init_free_space();
9b463334 2007 vmap_initialized = true;
db64fe02
NP
2008}
2009
8fc48985
TH
2010/**
2011 * unmap_kernel_range - unmap kernel VM area and flush cache and TLB
2012 * @addr: start of the VM area to unmap
2013 * @size: size of the VM area to unmap
2014 *
2015 * Similar to unmap_kernel_range_noflush() but flushes vcache before
2016 * the unmapping and tlb after.
2017 */
db64fe02
NP
2018void unmap_kernel_range(unsigned long addr, unsigned long size)
2019{
2020 unsigned long end = addr + size;
f6fcba70
TH
2021
2022 flush_cache_vunmap(addr, end);
b521c43f 2023 unmap_kernel_range_noflush(addr, size);
db64fe02
NP
2024 flush_tlb_kernel_range(addr, end);
2025}
2026
e36176be
URS
2027static inline void setup_vmalloc_vm_locked(struct vm_struct *vm,
2028 struct vmap_area *va, unsigned long flags, const void *caller)
cf88c790 2029{
cf88c790
TH
2030 vm->flags = flags;
2031 vm->addr = (void *)va->va_start;
2032 vm->size = va->va_end - va->va_start;
2033 vm->caller = caller;
db1aecaf 2034 va->vm = vm;
e36176be
URS
2035}
2036
2037static void setup_vmalloc_vm(struct vm_struct *vm, struct vmap_area *va,
2038 unsigned long flags, const void *caller)
2039{
2040 spin_lock(&vmap_area_lock);
2041 setup_vmalloc_vm_locked(vm, va, flags, caller);
c69480ad 2042 spin_unlock(&vmap_area_lock);
f5252e00 2043}
cf88c790 2044
20fc02b4 2045static void clear_vm_uninitialized_flag(struct vm_struct *vm)
f5252e00 2046{
d4033afd 2047 /*
20fc02b4 2048 * Before removing VM_UNINITIALIZED,
d4033afd
JK
2049 * we should make sure that vm has proper values.
2050 * Pair with smp_rmb() in show_numa_info().
2051 */
2052 smp_wmb();
20fc02b4 2053 vm->flags &= ~VM_UNINITIALIZED;
cf88c790
TH
2054}
2055
db64fe02 2056static struct vm_struct *__get_vm_area_node(unsigned long size,
2dca6999 2057 unsigned long align, unsigned long flags, unsigned long start,
5e6cafc8 2058 unsigned long end, int node, gfp_t gfp_mask, const void *caller)
db64fe02 2059{
0006526d 2060 struct vmap_area *va;
db64fe02 2061 struct vm_struct *area;
d98c9e83 2062 unsigned long requested_size = size;
1da177e4 2063
52fd24ca 2064 BUG_ON(in_interrupt());
1da177e4 2065 size = PAGE_ALIGN(size);
31be8309
OH
2066 if (unlikely(!size))
2067 return NULL;
1da177e4 2068
252e5c6e 2069 if (flags & VM_IOREMAP)
2070 align = 1ul << clamp_t(int, get_count_order_long(size),
2071 PAGE_SHIFT, IOREMAP_MAX_ORDER);
2072
cf88c790 2073 area = kzalloc_node(sizeof(*area), gfp_mask & GFP_RECLAIM_MASK, node);
1da177e4
LT
2074 if (unlikely(!area))
2075 return NULL;
2076
71394fe5
AR
2077 if (!(flags & VM_NO_GUARD))
2078 size += PAGE_SIZE;
1da177e4 2079
db64fe02
NP
2080 va = alloc_vmap_area(size, align, start, end, node, gfp_mask);
2081 if (IS_ERR(va)) {
2082 kfree(area);
2083 return NULL;
1da177e4 2084 }
1da177e4 2085
d98c9e83 2086 kasan_unpoison_vmalloc((void *)va->va_start, requested_size);
f5252e00 2087
d98c9e83 2088 setup_vmalloc_vm(area, va, flags, caller);
3c5c3cfb 2089
1da177e4 2090 return area;
1da177e4
LT
2091}
2092
c2968612
BH
2093struct vm_struct *__get_vm_area_caller(unsigned long size, unsigned long flags,
2094 unsigned long start, unsigned long end,
5e6cafc8 2095 const void *caller)
c2968612 2096{
00ef2d2f
DR
2097 return __get_vm_area_node(size, 1, flags, start, end, NUMA_NO_NODE,
2098 GFP_KERNEL, caller);
c2968612
BH
2099}
2100
1da177e4 2101/**
92eac168
MR
2102 * get_vm_area - reserve a contiguous kernel virtual area
2103 * @size: size of the area
2104 * @flags: %VM_IOREMAP for I/O mappings or VM_ALLOC
1da177e4 2105 *
92eac168
MR
2106 * Search an area of @size in the kernel virtual mapping area,
2107 * and reserved it for out purposes. Returns the area descriptor
2108 * on success or %NULL on failure.
a862f68a
MR
2109 *
2110 * Return: the area descriptor on success or %NULL on failure.
1da177e4
LT
2111 */
2112struct vm_struct *get_vm_area(unsigned long size, unsigned long flags)
2113{
2dca6999 2114 return __get_vm_area_node(size, 1, flags, VMALLOC_START, VMALLOC_END,
00ef2d2f
DR
2115 NUMA_NO_NODE, GFP_KERNEL,
2116 __builtin_return_address(0));
23016969
CL
2117}
2118
2119struct vm_struct *get_vm_area_caller(unsigned long size, unsigned long flags,
5e6cafc8 2120 const void *caller)
23016969 2121{
2dca6999 2122 return __get_vm_area_node(size, 1, flags, VMALLOC_START, VMALLOC_END,
00ef2d2f 2123 NUMA_NO_NODE, GFP_KERNEL, caller);
1da177e4
LT
2124}
2125
e9da6e99 2126/**
92eac168
MR
2127 * find_vm_area - find a continuous kernel virtual area
2128 * @addr: base address
e9da6e99 2129 *
92eac168
MR
2130 * Search for the kernel VM area starting at @addr, and return it.
2131 * It is up to the caller to do all required locking to keep the returned
2132 * pointer valid.
a862f68a
MR
2133 *
2134 * Return: pointer to the found area or %NULL on faulure
e9da6e99
MS
2135 */
2136struct vm_struct *find_vm_area(const void *addr)
83342314 2137{
db64fe02 2138 struct vmap_area *va;
83342314 2139
db64fe02 2140 va = find_vmap_area((unsigned long)addr);
688fcbfc
PL
2141 if (!va)
2142 return NULL;
1da177e4 2143
688fcbfc 2144 return va->vm;
1da177e4
LT
2145}
2146
7856dfeb 2147/**
92eac168
MR
2148 * remove_vm_area - find and remove a continuous kernel virtual area
2149 * @addr: base address
7856dfeb 2150 *
92eac168
MR
2151 * Search for the kernel VM area starting at @addr, and remove it.
2152 * This function returns the found VM area, but using it is NOT safe
2153 * on SMP machines, except for its size or flags.
a862f68a
MR
2154 *
2155 * Return: pointer to the found area or %NULL on faulure
7856dfeb 2156 */
b3bdda02 2157struct vm_struct *remove_vm_area(const void *addr)
7856dfeb 2158{
db64fe02
NP
2159 struct vmap_area *va;
2160
5803ed29
CH
2161 might_sleep();
2162
dd3b8353
URS
2163 spin_lock(&vmap_area_lock);
2164 va = __find_vmap_area((unsigned long)addr);
688fcbfc 2165 if (va && va->vm) {
db1aecaf 2166 struct vm_struct *vm = va->vm;
f5252e00 2167
c69480ad 2168 va->vm = NULL;
c69480ad
JK
2169 spin_unlock(&vmap_area_lock);
2170
a5af5aa8 2171 kasan_free_shadow(vm);
dd32c279 2172 free_unmap_vmap_area(va);
dd32c279 2173
db64fe02
NP
2174 return vm;
2175 }
dd3b8353
URS
2176
2177 spin_unlock(&vmap_area_lock);
db64fe02 2178 return NULL;
7856dfeb
AK
2179}
2180
868b104d
RE
2181static inline void set_area_direct_map(const struct vm_struct *area,
2182 int (*set_direct_map)(struct page *page))
2183{
2184 int i;
2185
2186 for (i = 0; i < area->nr_pages; i++)
2187 if (page_address(area->pages[i]))
2188 set_direct_map(area->pages[i]);
2189}
2190
2191/* Handle removing and resetting vm mappings related to the vm_struct. */
2192static void vm_remove_mappings(struct vm_struct *area, int deallocate_pages)
2193{
868b104d
RE
2194 unsigned long start = ULONG_MAX, end = 0;
2195 int flush_reset = area->flags & VM_FLUSH_RESET_PERMS;
31e67340 2196 int flush_dmap = 0;
868b104d
RE
2197 int i;
2198
868b104d
RE
2199 remove_vm_area(area->addr);
2200
2201 /* If this is not VM_FLUSH_RESET_PERMS memory, no need for the below. */
2202 if (!flush_reset)
2203 return;
2204
2205 /*
2206 * If not deallocating pages, just do the flush of the VM area and
2207 * return.
2208 */
2209 if (!deallocate_pages) {
2210 vm_unmap_aliases();
2211 return;
2212 }
2213
2214 /*
2215 * If execution gets here, flush the vm mapping and reset the direct
2216 * map. Find the start and end range of the direct mappings to make sure
2217 * the vm_unmap_aliases() flush includes the direct map.
2218 */
2219 for (i = 0; i < area->nr_pages; i++) {
8e41f872
RE
2220 unsigned long addr = (unsigned long)page_address(area->pages[i]);
2221 if (addr) {
868b104d 2222 start = min(addr, start);
8e41f872 2223 end = max(addr + PAGE_SIZE, end);
31e67340 2224 flush_dmap = 1;
868b104d
RE
2225 }
2226 }
2227
2228 /*
2229 * Set direct map to something invalid so that it won't be cached if
2230 * there are any accesses after the TLB flush, then flush the TLB and
2231 * reset the direct map permissions to the default.
2232 */
2233 set_area_direct_map(area, set_direct_map_invalid_noflush);
31e67340 2234 _vm_unmap_aliases(start, end, flush_dmap);
868b104d
RE
2235 set_area_direct_map(area, set_direct_map_default_noflush);
2236}
2237
b3bdda02 2238static void __vunmap(const void *addr, int deallocate_pages)
1da177e4
LT
2239{
2240 struct vm_struct *area;
2241
2242 if (!addr)
2243 return;
2244
e69e9d4a 2245 if (WARN(!PAGE_ALIGNED(addr), "Trying to vfree() bad address (%p)\n",
ab15d9b4 2246 addr))
1da177e4 2247 return;
1da177e4 2248
6ade2032 2249 area = find_vm_area(addr);
1da177e4 2250 if (unlikely(!area)) {
4c8573e2 2251 WARN(1, KERN_ERR "Trying to vfree() nonexistent vm area (%p)\n",
1da177e4 2252 addr);
1da177e4
LT
2253 return;
2254 }
2255
05e3ff95
CP
2256 debug_check_no_locks_freed(area->addr, get_vm_area_size(area));
2257 debug_check_no_obj_freed(area->addr, get_vm_area_size(area));
9a11b49a 2258
d98c9e83 2259 kasan_poison_vmalloc(area->addr, area->size);
3c5c3cfb 2260
868b104d
RE
2261 vm_remove_mappings(area, deallocate_pages);
2262
1da177e4
LT
2263 if (deallocate_pages) {
2264 int i;
2265
2266 for (i = 0; i < area->nr_pages; i++) {
bf53d6f8
CL
2267 struct page *page = area->pages[i];
2268
2269 BUG_ON(!page);
4949148a 2270 __free_pages(page, 0);
1da177e4 2271 }
97105f0a 2272 atomic_long_sub(area->nr_pages, &nr_vmalloc_pages);
1da177e4 2273
244d63ee 2274 kvfree(area->pages);
1da177e4
LT
2275 }
2276
2277 kfree(area);
2278 return;
2279}
bf22e37a
AR
2280
2281static inline void __vfree_deferred(const void *addr)
2282{
2283 /*
2284 * Use raw_cpu_ptr() because this can be called from preemptible
2285 * context. Preemption is absolutely fine here, because the llist_add()
2286 * implementation is lockless, so it works even if we are adding to
73221d88 2287 * another cpu's list. schedule_work() should be fine with this too.
bf22e37a
AR
2288 */
2289 struct vfree_deferred *p = raw_cpu_ptr(&vfree_deferred);
2290
2291 if (llist_add((struct llist_node *)addr, &p->list))
2292 schedule_work(&p->wq);
2293}
2294
2295/**
92eac168
MR
2296 * vfree_atomic - release memory allocated by vmalloc()
2297 * @addr: memory base address
bf22e37a 2298 *
92eac168
MR
2299 * This one is just like vfree() but can be called in any atomic context
2300 * except NMIs.
bf22e37a
AR
2301 */
2302void vfree_atomic(const void *addr)
2303{
2304 BUG_ON(in_nmi());
2305
2306 kmemleak_free(addr);
2307
2308 if (!addr)
2309 return;
2310 __vfree_deferred(addr);
2311}
2312
c67dc624
RP
2313static void __vfree(const void *addr)
2314{
2315 if (unlikely(in_interrupt()))
2316 __vfree_deferred(addr);
2317 else
2318 __vunmap(addr, 1);
2319}
2320
1da177e4 2321/**
92eac168
MR
2322 * vfree - release memory allocated by vmalloc()
2323 * @addr: memory base address
1da177e4 2324 *
92eac168
MR
2325 * Free the virtually continuous memory area starting at @addr, as
2326 * obtained from vmalloc(), vmalloc_32() or __vmalloc(). If @addr is
2327 * NULL, no operation is performed.
1da177e4 2328 *
92eac168
MR
2329 * Must not be called in NMI context (strictly speaking, only if we don't
2330 * have CONFIG_ARCH_HAVE_NMI_SAFE_CMPXCHG, but making the calling
2331 * conventions for vfree() arch-depenedent would be a really bad idea)
c9fcee51 2332 *
92eac168 2333 * May sleep if called *not* from interrupt context.
3ca4ea3a 2334 *
92eac168 2335 * NOTE: assumes that the object at @addr has a size >= sizeof(llist_node)
1da177e4 2336 */
b3bdda02 2337void vfree(const void *addr)
1da177e4 2338{
32fcfd40 2339 BUG_ON(in_nmi());
89219d37
CM
2340
2341 kmemleak_free(addr);
2342
a8dda165
AR
2343 might_sleep_if(!in_interrupt());
2344
32fcfd40
AV
2345 if (!addr)
2346 return;
c67dc624
RP
2347
2348 __vfree(addr);
1da177e4 2349}
1da177e4
LT
2350EXPORT_SYMBOL(vfree);
2351
2352/**
92eac168
MR
2353 * vunmap - release virtual mapping obtained by vmap()
2354 * @addr: memory base address
1da177e4 2355 *
92eac168
MR
2356 * Free the virtually contiguous memory area starting at @addr,
2357 * which was created from the page array passed to vmap().
1da177e4 2358 *
92eac168 2359 * Must not be called in interrupt context.
1da177e4 2360 */
b3bdda02 2361void vunmap(const void *addr)
1da177e4
LT
2362{
2363 BUG_ON(in_interrupt());
34754b69 2364 might_sleep();
32fcfd40
AV
2365 if (addr)
2366 __vunmap(addr, 0);
1da177e4 2367}
1da177e4
LT
2368EXPORT_SYMBOL(vunmap);
2369
2370/**
92eac168
MR
2371 * vmap - map an array of pages into virtually contiguous space
2372 * @pages: array of page pointers
2373 * @count: number of pages to map
2374 * @flags: vm_area->flags
2375 * @prot: page protection for the mapping
2376 *
2377 * Maps @count pages from @pages into contiguous kernel virtual
2378 * space.
a862f68a
MR
2379 *
2380 * Return: the address of the area or %NULL on failure
1da177e4
LT
2381 */
2382void *vmap(struct page **pages, unsigned int count,
92eac168 2383 unsigned long flags, pgprot_t prot)
1da177e4
LT
2384{
2385 struct vm_struct *area;
65ee03c4 2386 unsigned long size; /* In bytes */
1da177e4 2387
34754b69
PZ
2388 might_sleep();
2389
ca79b0c2 2390 if (count > totalram_pages())
1da177e4
LT
2391 return NULL;
2392
65ee03c4
GJM
2393 size = (unsigned long)count << PAGE_SHIFT;
2394 area = get_vm_area_caller(size, flags, __builtin_return_address(0));
1da177e4
LT
2395 if (!area)
2396 return NULL;
23016969 2397
cca98e9f 2398 if (map_kernel_range((unsigned long)area->addr, size, pgprot_nx(prot),
ed1f324c 2399 pages) < 0) {
1da177e4
LT
2400 vunmap(area->addr);
2401 return NULL;
2402 }
2403
2404 return area->addr;
2405}
1da177e4
LT
2406EXPORT_SYMBOL(vmap);
2407
e31d9eb5 2408static void *__vmalloc_area_node(struct vm_struct *area, gfp_t gfp_mask,
3722e13c 2409 pgprot_t prot, int node)
1da177e4
LT
2410{
2411 struct page **pages;
2412 unsigned int nr_pages, array_size, i;
930f036b 2413 const gfp_t nested_gfp = (gfp_mask & GFP_RECLAIM_MASK) | __GFP_ZERO;
704b862f
LA
2414 const gfp_t alloc_mask = gfp_mask | __GFP_NOWARN;
2415 const gfp_t highmem_mask = (gfp_mask & (GFP_DMA | GFP_DMA32)) ?
2416 0 :
2417 __GFP_HIGHMEM;
1da177e4 2418
762216ab 2419 nr_pages = get_vm_area_size(area) >> PAGE_SHIFT;
1da177e4
LT
2420 array_size = (nr_pages * sizeof(struct page *));
2421
1da177e4 2422 /* Please note that the recursion is strictly bounded. */
8757d5fa 2423 if (array_size > PAGE_SIZE) {
704b862f 2424 pages = __vmalloc_node(array_size, 1, nested_gfp|highmem_mask,
f38fcb9c 2425 node, area->caller);
286e1ea3 2426 } else {
976d6dfb 2427 pages = kmalloc_node(array_size, nested_gfp, node);
286e1ea3 2428 }
7ea36242
AK
2429
2430 if (!pages) {
1da177e4
LT
2431 remove_vm_area(area->addr);
2432 kfree(area);
2433 return NULL;
2434 }
1da177e4 2435
7ea36242
AK
2436 area->pages = pages;
2437 area->nr_pages = nr_pages;
2438
1da177e4 2439 for (i = 0; i < area->nr_pages; i++) {
bf53d6f8
CL
2440 struct page *page;
2441
4b90951c 2442 if (node == NUMA_NO_NODE)
704b862f 2443 page = alloc_page(alloc_mask|highmem_mask);
930fc45a 2444 else
704b862f 2445 page = alloc_pages_node(node, alloc_mask|highmem_mask, 0);
bf53d6f8
CL
2446
2447 if (unlikely(!page)) {
1da177e4
LT
2448 /* Successfully allocated i pages, free them in __vunmap() */
2449 area->nr_pages = i;
97105f0a 2450 atomic_long_add(area->nr_pages, &nr_vmalloc_pages);
1da177e4
LT
2451 goto fail;
2452 }
bf53d6f8 2453 area->pages[i] = page;
dcf61ff0 2454 if (gfpflags_allow_blocking(gfp_mask))
660654f9 2455 cond_resched();
1da177e4 2456 }
97105f0a 2457 atomic_long_add(area->nr_pages, &nr_vmalloc_pages);
1da177e4 2458
ed1f324c
CH
2459 if (map_kernel_range((unsigned long)area->addr, get_vm_area_size(area),
2460 prot, pages) < 0)
1da177e4 2461 goto fail;
ed1f324c 2462
1da177e4
LT
2463 return area->addr;
2464
2465fail:
a8e99259 2466 warn_alloc(gfp_mask, NULL,
7877cdcc 2467 "vmalloc: allocation failure, allocated %ld of %ld bytes",
22943ab1 2468 (area->nr_pages*PAGE_SIZE), area->size);
c67dc624 2469 __vfree(area->addr);
1da177e4
LT
2470 return NULL;
2471}
2472
2473/**
92eac168
MR
2474 * __vmalloc_node_range - allocate virtually contiguous memory
2475 * @size: allocation size
2476 * @align: desired alignment
2477 * @start: vm area range start
2478 * @end: vm area range end
2479 * @gfp_mask: flags for the page level allocator
2480 * @prot: protection mask for the allocated pages
2481 * @vm_flags: additional vm area flags (e.g. %VM_NO_GUARD)
2482 * @node: node to use for allocation or NUMA_NO_NODE
2483 * @caller: caller's return address
2484 *
2485 * Allocate enough pages to cover @size from the page level
2486 * allocator with @gfp_mask flags. Map them into contiguous
2487 * kernel virtual space, using a pagetable protection of @prot.
a862f68a
MR
2488 *
2489 * Return: the address of the area or %NULL on failure
1da177e4 2490 */
d0a21265
DR
2491void *__vmalloc_node_range(unsigned long size, unsigned long align,
2492 unsigned long start, unsigned long end, gfp_t gfp_mask,
cb9e3c29
AR
2493 pgprot_t prot, unsigned long vm_flags, int node,
2494 const void *caller)
1da177e4
LT
2495{
2496 struct vm_struct *area;
89219d37
CM
2497 void *addr;
2498 unsigned long real_size = size;
1da177e4
LT
2499
2500 size = PAGE_ALIGN(size);
ca79b0c2 2501 if (!size || (size >> PAGE_SHIFT) > totalram_pages())
de7d2b56 2502 goto fail;
1da177e4 2503
d98c9e83 2504 area = __get_vm_area_node(real_size, align, VM_ALLOC | VM_UNINITIALIZED |
cb9e3c29 2505 vm_flags, start, end, node, gfp_mask, caller);
1da177e4 2506 if (!area)
de7d2b56 2507 goto fail;
1da177e4 2508
3722e13c 2509 addr = __vmalloc_area_node(area, gfp_mask, prot, node);
1368edf0 2510 if (!addr)
b82225f3 2511 return NULL;
89219d37 2512
f5252e00 2513 /*
20fc02b4
ZY
2514 * In this function, newly allocated vm_struct has VM_UNINITIALIZED
2515 * flag. It means that vm_struct is not fully initialized.
4341fa45 2516 * Now, it is fully initialized, so remove this flag here.
f5252e00 2517 */
20fc02b4 2518 clear_vm_uninitialized_flag(area);
f5252e00 2519
94f4a161 2520 kmemleak_vmalloc(area, size, gfp_mask);
89219d37
CM
2521
2522 return addr;
de7d2b56
JP
2523
2524fail:
a8e99259 2525 warn_alloc(gfp_mask, NULL,
7877cdcc 2526 "vmalloc: allocation failure: %lu bytes", real_size);
de7d2b56 2527 return NULL;
1da177e4
LT
2528}
2529
d0a21265 2530/**
92eac168
MR
2531 * __vmalloc_node - allocate virtually contiguous memory
2532 * @size: allocation size
2533 * @align: desired alignment
2534 * @gfp_mask: flags for the page level allocator
92eac168
MR
2535 * @node: node to use for allocation or NUMA_NO_NODE
2536 * @caller: caller's return address
a7c3e901 2537 *
f38fcb9c
CH
2538 * Allocate enough pages to cover @size from the page level allocator with
2539 * @gfp_mask flags. Map them into contiguous kernel virtual space.
a7c3e901 2540 *
92eac168
MR
2541 * Reclaim modifiers in @gfp_mask - __GFP_NORETRY, __GFP_RETRY_MAYFAIL
2542 * and __GFP_NOFAIL are not supported
a7c3e901 2543 *
92eac168
MR
2544 * Any use of gfp flags outside of GFP_KERNEL should be consulted
2545 * with mm people.
a862f68a
MR
2546 *
2547 * Return: pointer to the allocated memory or %NULL on error
d0a21265 2548 */
2b905948 2549void *__vmalloc_node(unsigned long size, unsigned long align,
f38fcb9c 2550 gfp_t gfp_mask, int node, const void *caller)
d0a21265
DR
2551{
2552 return __vmalloc_node_range(size, align, VMALLOC_START, VMALLOC_END,
f38fcb9c 2553 gfp_mask, PAGE_KERNEL, 0, node, caller);
d0a21265 2554}
c3f896dc
CH
2555/*
2556 * This is only for performance analysis of vmalloc and stress purpose.
2557 * It is required by vmalloc test module, therefore do not use it other
2558 * than that.
2559 */
2560#ifdef CONFIG_TEST_VMALLOC_MODULE
2561EXPORT_SYMBOL_GPL(__vmalloc_node);
2562#endif
d0a21265 2563
88dca4ca 2564void *__vmalloc(unsigned long size, gfp_t gfp_mask)
930fc45a 2565{
f38fcb9c 2566 return __vmalloc_node(size, 1, gfp_mask, NUMA_NO_NODE,
23016969 2567 __builtin_return_address(0));
930fc45a 2568}
1da177e4
LT
2569EXPORT_SYMBOL(__vmalloc);
2570
2571/**
92eac168
MR
2572 * vmalloc - allocate virtually contiguous memory
2573 * @size: allocation size
2574 *
2575 * Allocate enough pages to cover @size from the page level
2576 * allocator and map them into contiguous kernel virtual space.
1da177e4 2577 *
92eac168
MR
2578 * For tight control over page level allocator and protection flags
2579 * use __vmalloc() instead.
a862f68a
MR
2580 *
2581 * Return: pointer to the allocated memory or %NULL on error
1da177e4
LT
2582 */
2583void *vmalloc(unsigned long size)
2584{
4d39d728
CH
2585 return __vmalloc_node(size, 1, GFP_KERNEL, NUMA_NO_NODE,
2586 __builtin_return_address(0));
1da177e4 2587}
1da177e4
LT
2588EXPORT_SYMBOL(vmalloc);
2589
e1ca7788 2590/**
92eac168
MR
2591 * vzalloc - allocate virtually contiguous memory with zero fill
2592 * @size: allocation size
2593 *
2594 * Allocate enough pages to cover @size from the page level
2595 * allocator and map them into contiguous kernel virtual space.
2596 * The memory allocated is set to zero.
2597 *
2598 * For tight control over page level allocator and protection flags
2599 * use __vmalloc() instead.
a862f68a
MR
2600 *
2601 * Return: pointer to the allocated memory or %NULL on error
e1ca7788
DY
2602 */
2603void *vzalloc(unsigned long size)
2604{
4d39d728
CH
2605 return __vmalloc_node(size, 1, GFP_KERNEL | __GFP_ZERO, NUMA_NO_NODE,
2606 __builtin_return_address(0));
e1ca7788
DY
2607}
2608EXPORT_SYMBOL(vzalloc);
2609
83342314 2610/**
ead04089
REB
2611 * vmalloc_user - allocate zeroed virtually contiguous memory for userspace
2612 * @size: allocation size
83342314 2613 *
ead04089
REB
2614 * The resulting memory area is zeroed so it can be mapped to userspace
2615 * without leaking data.
a862f68a
MR
2616 *
2617 * Return: pointer to the allocated memory or %NULL on error
83342314
NP
2618 */
2619void *vmalloc_user(unsigned long size)
2620{
bc84c535
RP
2621 return __vmalloc_node_range(size, SHMLBA, VMALLOC_START, VMALLOC_END,
2622 GFP_KERNEL | __GFP_ZERO, PAGE_KERNEL,
2623 VM_USERMAP, NUMA_NO_NODE,
2624 __builtin_return_address(0));
83342314
NP
2625}
2626EXPORT_SYMBOL(vmalloc_user);
2627
930fc45a 2628/**
92eac168
MR
2629 * vmalloc_node - allocate memory on a specific node
2630 * @size: allocation size
2631 * @node: numa node
930fc45a 2632 *
92eac168
MR
2633 * Allocate enough pages to cover @size from the page level
2634 * allocator and map them into contiguous kernel virtual space.
930fc45a 2635 *
92eac168
MR
2636 * For tight control over page level allocator and protection flags
2637 * use __vmalloc() instead.
a862f68a
MR
2638 *
2639 * Return: pointer to the allocated memory or %NULL on error
930fc45a
CL
2640 */
2641void *vmalloc_node(unsigned long size, int node)
2642{
f38fcb9c
CH
2643 return __vmalloc_node(size, 1, GFP_KERNEL, node,
2644 __builtin_return_address(0));
930fc45a
CL
2645}
2646EXPORT_SYMBOL(vmalloc_node);
2647
e1ca7788
DY
2648/**
2649 * vzalloc_node - allocate memory on a specific node with zero fill
2650 * @size: allocation size
2651 * @node: numa node
2652 *
2653 * Allocate enough pages to cover @size from the page level
2654 * allocator and map them into contiguous kernel virtual space.
2655 * The memory allocated is set to zero.
2656 *
a862f68a 2657 * Return: pointer to the allocated memory or %NULL on error
e1ca7788
DY
2658 */
2659void *vzalloc_node(unsigned long size, int node)
2660{
4d39d728
CH
2661 return __vmalloc_node(size, 1, GFP_KERNEL | __GFP_ZERO, node,
2662 __builtin_return_address(0));
e1ca7788
DY
2663}
2664EXPORT_SYMBOL(vzalloc_node);
2665
0d08e0d3 2666#if defined(CONFIG_64BIT) && defined(CONFIG_ZONE_DMA32)
698d0831 2667#define GFP_VMALLOC32 (GFP_DMA32 | GFP_KERNEL)
0d08e0d3 2668#elif defined(CONFIG_64BIT) && defined(CONFIG_ZONE_DMA)
698d0831 2669#define GFP_VMALLOC32 (GFP_DMA | GFP_KERNEL)
0d08e0d3 2670#else
698d0831
MH
2671/*
2672 * 64b systems should always have either DMA or DMA32 zones. For others
2673 * GFP_DMA32 should do the right thing and use the normal zone.
2674 */
2675#define GFP_VMALLOC32 GFP_DMA32 | GFP_KERNEL
0d08e0d3
AK
2676#endif
2677
1da177e4 2678/**
92eac168
MR
2679 * vmalloc_32 - allocate virtually contiguous memory (32bit addressable)
2680 * @size: allocation size
1da177e4 2681 *
92eac168
MR
2682 * Allocate enough 32bit PA addressable pages to cover @size from the
2683 * page level allocator and map them into contiguous kernel virtual space.
a862f68a
MR
2684 *
2685 * Return: pointer to the allocated memory or %NULL on error
1da177e4
LT
2686 */
2687void *vmalloc_32(unsigned long size)
2688{
f38fcb9c
CH
2689 return __vmalloc_node(size, 1, GFP_VMALLOC32, NUMA_NO_NODE,
2690 __builtin_return_address(0));
1da177e4 2691}
1da177e4
LT
2692EXPORT_SYMBOL(vmalloc_32);
2693
83342314 2694/**
ead04089 2695 * vmalloc_32_user - allocate zeroed virtually contiguous 32bit memory
92eac168 2696 * @size: allocation size
ead04089
REB
2697 *
2698 * The resulting memory area is 32bit addressable and zeroed so it can be
2699 * mapped to userspace without leaking data.
a862f68a
MR
2700 *
2701 * Return: pointer to the allocated memory or %NULL on error
83342314
NP
2702 */
2703void *vmalloc_32_user(unsigned long size)
2704{
bc84c535
RP
2705 return __vmalloc_node_range(size, SHMLBA, VMALLOC_START, VMALLOC_END,
2706 GFP_VMALLOC32 | __GFP_ZERO, PAGE_KERNEL,
2707 VM_USERMAP, NUMA_NO_NODE,
2708 __builtin_return_address(0));
83342314
NP
2709}
2710EXPORT_SYMBOL(vmalloc_32_user);
2711
d0107eb0
KH
2712/*
2713 * small helper routine , copy contents to buf from addr.
2714 * If the page is not present, fill zero.
2715 */
2716
2717static int aligned_vread(char *buf, char *addr, unsigned long count)
2718{
2719 struct page *p;
2720 int copied = 0;
2721
2722 while (count) {
2723 unsigned long offset, length;
2724
891c49ab 2725 offset = offset_in_page(addr);
d0107eb0
KH
2726 length = PAGE_SIZE - offset;
2727 if (length > count)
2728 length = count;
2729 p = vmalloc_to_page(addr);
2730 /*
2731 * To do safe access to this _mapped_ area, we need
2732 * lock. But adding lock here means that we need to add
2733 * overhead of vmalloc()/vfree() calles for this _debug_
2734 * interface, rarely used. Instead of that, we'll use
2735 * kmap() and get small overhead in this access function.
2736 */
2737 if (p) {
2738 /*
2739 * we can expect USER0 is not used (see vread/vwrite's
2740 * function description)
2741 */
9b04c5fe 2742 void *map = kmap_atomic(p);
d0107eb0 2743 memcpy(buf, map + offset, length);
9b04c5fe 2744 kunmap_atomic(map);
d0107eb0
KH
2745 } else
2746 memset(buf, 0, length);
2747
2748 addr += length;
2749 buf += length;
2750 copied += length;
2751 count -= length;
2752 }
2753 return copied;
2754}
2755
2756static int aligned_vwrite(char *buf, char *addr, unsigned long count)
2757{
2758 struct page *p;
2759 int copied = 0;
2760
2761 while (count) {
2762 unsigned long offset, length;
2763
891c49ab 2764 offset = offset_in_page(addr);
d0107eb0
KH
2765 length = PAGE_SIZE - offset;
2766 if (length > count)
2767 length = count;
2768 p = vmalloc_to_page(addr);
2769 /*
2770 * To do safe access to this _mapped_ area, we need
2771 * lock. But adding lock here means that we need to add
2772 * overhead of vmalloc()/vfree() calles for this _debug_
2773 * interface, rarely used. Instead of that, we'll use
2774 * kmap() and get small overhead in this access function.
2775 */
2776 if (p) {
2777 /*
2778 * we can expect USER0 is not used (see vread/vwrite's
2779 * function description)
2780 */
9b04c5fe 2781 void *map = kmap_atomic(p);
d0107eb0 2782 memcpy(map + offset, buf, length);
9b04c5fe 2783 kunmap_atomic(map);
d0107eb0
KH
2784 }
2785 addr += length;
2786 buf += length;
2787 copied += length;
2788 count -= length;
2789 }
2790 return copied;
2791}
2792
2793/**
92eac168
MR
2794 * vread() - read vmalloc area in a safe way.
2795 * @buf: buffer for reading data
2796 * @addr: vm address.
2797 * @count: number of bytes to be read.
2798 *
92eac168
MR
2799 * This function checks that addr is a valid vmalloc'ed area, and
2800 * copy data from that area to a given buffer. If the given memory range
2801 * of [addr...addr+count) includes some valid address, data is copied to
2802 * proper area of @buf. If there are memory holes, they'll be zero-filled.
2803 * IOREMAP area is treated as memory hole and no copy is done.
2804 *
2805 * If [addr...addr+count) doesn't includes any intersects with alive
2806 * vm_struct area, returns 0. @buf should be kernel's buffer.
2807 *
2808 * Note: In usual ops, vread() is never necessary because the caller
2809 * should know vmalloc() area is valid and can use memcpy().
2810 * This is for routines which have to access vmalloc area without
d9009d67 2811 * any information, as /dev/kmem.
a862f68a
MR
2812 *
2813 * Return: number of bytes for which addr and buf should be increased
2814 * (same number as @count) or %0 if [addr...addr+count) doesn't
2815 * include any intersection with valid vmalloc area
d0107eb0 2816 */
1da177e4
LT
2817long vread(char *buf, char *addr, unsigned long count)
2818{
e81ce85f
JK
2819 struct vmap_area *va;
2820 struct vm_struct *vm;
1da177e4 2821 char *vaddr, *buf_start = buf;
d0107eb0 2822 unsigned long buflen = count;
1da177e4
LT
2823 unsigned long n;
2824
2825 /* Don't allow overflow */
2826 if ((unsigned long) addr + count < count)
2827 count = -(unsigned long) addr;
2828
e81ce85f
JK
2829 spin_lock(&vmap_area_lock);
2830 list_for_each_entry(va, &vmap_area_list, list) {
2831 if (!count)
2832 break;
2833
688fcbfc 2834 if (!va->vm)
e81ce85f
JK
2835 continue;
2836
2837 vm = va->vm;
2838 vaddr = (char *) vm->addr;
762216ab 2839 if (addr >= vaddr + get_vm_area_size(vm))
1da177e4
LT
2840 continue;
2841 while (addr < vaddr) {
2842 if (count == 0)
2843 goto finished;
2844 *buf = '\0';
2845 buf++;
2846 addr++;
2847 count--;
2848 }
762216ab 2849 n = vaddr + get_vm_area_size(vm) - addr;
d0107eb0
KH
2850 if (n > count)
2851 n = count;
e81ce85f 2852 if (!(vm->flags & VM_IOREMAP))
d0107eb0
KH
2853 aligned_vread(buf, addr, n);
2854 else /* IOREMAP area is treated as memory hole */
2855 memset(buf, 0, n);
2856 buf += n;
2857 addr += n;
2858 count -= n;
1da177e4
LT
2859 }
2860finished:
e81ce85f 2861 spin_unlock(&vmap_area_lock);
d0107eb0
KH
2862
2863 if (buf == buf_start)
2864 return 0;
2865 /* zero-fill memory holes */
2866 if (buf != buf_start + buflen)
2867 memset(buf, 0, buflen - (buf - buf_start));
2868
2869 return buflen;
1da177e4
LT
2870}
2871
d0107eb0 2872/**
92eac168
MR
2873 * vwrite() - write vmalloc area in a safe way.
2874 * @buf: buffer for source data
2875 * @addr: vm address.
2876 * @count: number of bytes to be read.
2877 *
92eac168
MR
2878 * This function checks that addr is a valid vmalloc'ed area, and
2879 * copy data from a buffer to the given addr. If specified range of
2880 * [addr...addr+count) includes some valid address, data is copied from
2881 * proper area of @buf. If there are memory holes, no copy to hole.
2882 * IOREMAP area is treated as memory hole and no copy is done.
2883 *
2884 * If [addr...addr+count) doesn't includes any intersects with alive
2885 * vm_struct area, returns 0. @buf should be kernel's buffer.
2886 *
2887 * Note: In usual ops, vwrite() is never necessary because the caller
2888 * should know vmalloc() area is valid and can use memcpy().
2889 * This is for routines which have to access vmalloc area without
d9009d67 2890 * any information, as /dev/kmem.
a862f68a
MR
2891 *
2892 * Return: number of bytes for which addr and buf should be
2893 * increased (same number as @count) or %0 if [addr...addr+count)
2894 * doesn't include any intersection with valid vmalloc area
d0107eb0 2895 */
1da177e4
LT
2896long vwrite(char *buf, char *addr, unsigned long count)
2897{
e81ce85f
JK
2898 struct vmap_area *va;
2899 struct vm_struct *vm;
d0107eb0
KH
2900 char *vaddr;
2901 unsigned long n, buflen;
2902 int copied = 0;
1da177e4
LT
2903
2904 /* Don't allow overflow */
2905 if ((unsigned long) addr + count < count)
2906 count = -(unsigned long) addr;
d0107eb0 2907 buflen = count;
1da177e4 2908
e81ce85f
JK
2909 spin_lock(&vmap_area_lock);
2910 list_for_each_entry(va, &vmap_area_list, list) {
2911 if (!count)
2912 break;
2913
688fcbfc 2914 if (!va->vm)
e81ce85f
JK
2915 continue;
2916
2917 vm = va->vm;
2918 vaddr = (char *) vm->addr;
762216ab 2919 if (addr >= vaddr + get_vm_area_size(vm))
1da177e4
LT
2920 continue;
2921 while (addr < vaddr) {
2922 if (count == 0)
2923 goto finished;
2924 buf++;
2925 addr++;
2926 count--;
2927 }
762216ab 2928 n = vaddr + get_vm_area_size(vm) - addr;
d0107eb0
KH
2929 if (n > count)
2930 n = count;
e81ce85f 2931 if (!(vm->flags & VM_IOREMAP)) {
d0107eb0
KH
2932 aligned_vwrite(buf, addr, n);
2933 copied++;
2934 }
2935 buf += n;
2936 addr += n;
2937 count -= n;
1da177e4
LT
2938 }
2939finished:
e81ce85f 2940 spin_unlock(&vmap_area_lock);
d0107eb0
KH
2941 if (!copied)
2942 return 0;
2943 return buflen;
1da177e4 2944}
83342314
NP
2945
2946/**
92eac168
MR
2947 * remap_vmalloc_range_partial - map vmalloc pages to userspace
2948 * @vma: vma to cover
2949 * @uaddr: target user address to start at
2950 * @kaddr: virtual address of vmalloc kernel memory
bdebd6a2 2951 * @pgoff: offset from @kaddr to start at
92eac168 2952 * @size: size of map area
7682486b 2953 *
92eac168 2954 * Returns: 0 for success, -Exxx on failure
83342314 2955 *
92eac168
MR
2956 * This function checks that @kaddr is a valid vmalloc'ed area,
2957 * and that it is big enough to cover the range starting at
2958 * @uaddr in @vma. Will return failure if that criteria isn't
2959 * met.
83342314 2960 *
92eac168 2961 * Similar to remap_pfn_range() (see mm/memory.c)
83342314 2962 */
e69e9d4a 2963int remap_vmalloc_range_partial(struct vm_area_struct *vma, unsigned long uaddr,
bdebd6a2
JH
2964 void *kaddr, unsigned long pgoff,
2965 unsigned long size)
83342314
NP
2966{
2967 struct vm_struct *area;
bdebd6a2
JH
2968 unsigned long off;
2969 unsigned long end_index;
2970
2971 if (check_shl_overflow(pgoff, PAGE_SHIFT, &off))
2972 return -EINVAL;
83342314 2973
e69e9d4a
HD
2974 size = PAGE_ALIGN(size);
2975
2976 if (!PAGE_ALIGNED(uaddr) || !PAGE_ALIGNED(kaddr))
83342314
NP
2977 return -EINVAL;
2978
e69e9d4a 2979 area = find_vm_area(kaddr);
83342314 2980 if (!area)
db64fe02 2981 return -EINVAL;
83342314 2982
fe9041c2 2983 if (!(area->flags & (VM_USERMAP | VM_DMA_COHERENT)))
db64fe02 2984 return -EINVAL;
83342314 2985
bdebd6a2
JH
2986 if (check_add_overflow(size, off, &end_index) ||
2987 end_index > get_vm_area_size(area))
db64fe02 2988 return -EINVAL;
bdebd6a2 2989 kaddr += off;
83342314 2990
83342314 2991 do {
e69e9d4a 2992 struct page *page = vmalloc_to_page(kaddr);
db64fe02
NP
2993 int ret;
2994
83342314
NP
2995 ret = vm_insert_page(vma, uaddr, page);
2996 if (ret)
2997 return ret;
2998
2999 uaddr += PAGE_SIZE;
e69e9d4a
HD
3000 kaddr += PAGE_SIZE;
3001 size -= PAGE_SIZE;
3002 } while (size > 0);
83342314 3003
314e51b9 3004 vma->vm_flags |= VM_DONTEXPAND | VM_DONTDUMP;
83342314 3005
db64fe02 3006 return 0;
83342314 3007}
e69e9d4a
HD
3008EXPORT_SYMBOL(remap_vmalloc_range_partial);
3009
3010/**
92eac168
MR
3011 * remap_vmalloc_range - map vmalloc pages to userspace
3012 * @vma: vma to cover (map full range of vma)
3013 * @addr: vmalloc memory
3014 * @pgoff: number of pages into addr before first page to map
e69e9d4a 3015 *
92eac168 3016 * Returns: 0 for success, -Exxx on failure
e69e9d4a 3017 *
92eac168
MR
3018 * This function checks that addr is a valid vmalloc'ed area, and
3019 * that it is big enough to cover the vma. Will return failure if
3020 * that criteria isn't met.
e69e9d4a 3021 *
92eac168 3022 * Similar to remap_pfn_range() (see mm/memory.c)
e69e9d4a
HD
3023 */
3024int remap_vmalloc_range(struct vm_area_struct *vma, void *addr,
3025 unsigned long pgoff)
3026{
3027 return remap_vmalloc_range_partial(vma, vma->vm_start,
bdebd6a2 3028 addr, pgoff,
e69e9d4a
HD
3029 vma->vm_end - vma->vm_start);
3030}
83342314
NP
3031EXPORT_SYMBOL(remap_vmalloc_range);
3032
8b1e0f81 3033static int f(pte_t *pte, unsigned long addr, void *data)
5f4352fb 3034{
cd12909c
DV
3035 pte_t ***p = data;
3036
3037 if (p) {
3038 *(*p) = pte;
3039 (*p)++;
3040 }
5f4352fb
JF
3041 return 0;
3042}
3043
3044/**
92eac168
MR
3045 * alloc_vm_area - allocate a range of kernel address space
3046 * @size: size of the area
3047 * @ptes: returns the PTEs for the address space
7682486b 3048 *
92eac168 3049 * Returns: NULL on failure, vm_struct on success
5f4352fb 3050 *
92eac168
MR
3051 * This function reserves a range of kernel address space, and
3052 * allocates pagetables to map that range. No actual mappings
3053 * are created.
cd12909c 3054 *
92eac168
MR
3055 * If @ptes is non-NULL, pointers to the PTEs (in init_mm)
3056 * allocated for the VM area are returned.
5f4352fb 3057 */
cd12909c 3058struct vm_struct *alloc_vm_area(size_t size, pte_t **ptes)
5f4352fb
JF
3059{
3060 struct vm_struct *area;
3061
23016969
CL
3062 area = get_vm_area_caller(size, VM_IOREMAP,
3063 __builtin_return_address(0));
5f4352fb
JF
3064 if (area == NULL)
3065 return NULL;
3066
3067 /*
3068 * This ensures that page tables are constructed for this region
3069 * of kernel virtual address space and mapped into init_mm.
3070 */
3071 if (apply_to_page_range(&init_mm, (unsigned long)area->addr,
cd12909c 3072 size, f, ptes ? &ptes : NULL)) {
5f4352fb
JF
3073 free_vm_area(area);
3074 return NULL;
3075 }
3076
5f4352fb
JF
3077 return area;
3078}
3079EXPORT_SYMBOL_GPL(alloc_vm_area);
3080
3081void free_vm_area(struct vm_struct *area)
3082{
3083 struct vm_struct *ret;
3084 ret = remove_vm_area(area->addr);
3085 BUG_ON(ret != area);
3086 kfree(area);
3087}
3088EXPORT_SYMBOL_GPL(free_vm_area);
a10aa579 3089
4f8b02b4 3090#ifdef CONFIG_SMP
ca23e405
TH
3091static struct vmap_area *node_to_va(struct rb_node *n)
3092{
4583e773 3093 return rb_entry_safe(n, struct vmap_area, rb_node);
ca23e405
TH
3094}
3095
3096/**
68ad4a33
URS
3097 * pvm_find_va_enclose_addr - find the vmap_area @addr belongs to
3098 * @addr: target address
ca23e405 3099 *
68ad4a33
URS
3100 * Returns: vmap_area if it is found. If there is no such area
3101 * the first highest(reverse order) vmap_area is returned
3102 * i.e. va->va_start < addr && va->va_end < addr or NULL
3103 * if there are no any areas before @addr.
ca23e405 3104 */
68ad4a33
URS
3105static struct vmap_area *
3106pvm_find_va_enclose_addr(unsigned long addr)
ca23e405 3107{
68ad4a33
URS
3108 struct vmap_area *va, *tmp;
3109 struct rb_node *n;
3110
3111 n = free_vmap_area_root.rb_node;
3112 va = NULL;
ca23e405
TH
3113
3114 while (n) {
68ad4a33
URS
3115 tmp = rb_entry(n, struct vmap_area, rb_node);
3116 if (tmp->va_start <= addr) {
3117 va = tmp;
3118 if (tmp->va_end >= addr)
3119 break;
3120
ca23e405 3121 n = n->rb_right;
68ad4a33
URS
3122 } else {
3123 n = n->rb_left;
3124 }
ca23e405
TH
3125 }
3126
68ad4a33 3127 return va;
ca23e405
TH
3128}
3129
3130/**
68ad4a33
URS
3131 * pvm_determine_end_from_reverse - find the highest aligned address
3132 * of free block below VMALLOC_END
3133 * @va:
3134 * in - the VA we start the search(reverse order);
3135 * out - the VA with the highest aligned end address.
ca23e405 3136 *
68ad4a33 3137 * Returns: determined end address within vmap_area
ca23e405 3138 */
68ad4a33
URS
3139static unsigned long
3140pvm_determine_end_from_reverse(struct vmap_area **va, unsigned long align)
ca23e405 3141{
68ad4a33 3142 unsigned long vmalloc_end = VMALLOC_END & ~(align - 1);
ca23e405
TH
3143 unsigned long addr;
3144
68ad4a33
URS
3145 if (likely(*va)) {
3146 list_for_each_entry_from_reverse((*va),
3147 &free_vmap_area_list, list) {
3148 addr = min((*va)->va_end & ~(align - 1), vmalloc_end);
3149 if ((*va)->va_start < addr)
3150 return addr;
3151 }
ca23e405
TH
3152 }
3153
68ad4a33 3154 return 0;
ca23e405
TH
3155}
3156
3157/**
3158 * pcpu_get_vm_areas - allocate vmalloc areas for percpu allocator
3159 * @offsets: array containing offset of each area
3160 * @sizes: array containing size of each area
3161 * @nr_vms: the number of areas to allocate
3162 * @align: alignment, all entries in @offsets and @sizes must be aligned to this
ca23e405
TH
3163 *
3164 * Returns: kmalloc'd vm_struct pointer array pointing to allocated
3165 * vm_structs on success, %NULL on failure
3166 *
3167 * Percpu allocator wants to use congruent vm areas so that it can
3168 * maintain the offsets among percpu areas. This function allocates
ec3f64fc
DR
3169 * congruent vmalloc areas for it with GFP_KERNEL. These areas tend to
3170 * be scattered pretty far, distance between two areas easily going up
3171 * to gigabytes. To avoid interacting with regular vmallocs, these
3172 * areas are allocated from top.
ca23e405 3173 *
68ad4a33
URS
3174 * Despite its complicated look, this allocator is rather simple. It
3175 * does everything top-down and scans free blocks from the end looking
3176 * for matching base. While scanning, if any of the areas do not fit the
3177 * base address is pulled down to fit the area. Scanning is repeated till
3178 * all the areas fit and then all necessary data structures are inserted
3179 * and the result is returned.
ca23e405
TH
3180 */
3181struct vm_struct **pcpu_get_vm_areas(const unsigned long *offsets,
3182 const size_t *sizes, int nr_vms,
ec3f64fc 3183 size_t align)
ca23e405
TH
3184{
3185 const unsigned long vmalloc_start = ALIGN(VMALLOC_START, align);
3186 const unsigned long vmalloc_end = VMALLOC_END & ~(align - 1);
68ad4a33 3187 struct vmap_area **vas, *va;
ca23e405
TH
3188 struct vm_struct **vms;
3189 int area, area2, last_area, term_area;
253a496d 3190 unsigned long base, start, size, end, last_end, orig_start, orig_end;
ca23e405 3191 bool purged = false;
68ad4a33 3192 enum fit_type type;
ca23e405 3193
ca23e405 3194 /* verify parameters and allocate data structures */
891c49ab 3195 BUG_ON(offset_in_page(align) || !is_power_of_2(align));
ca23e405
TH
3196 for (last_area = 0, area = 0; area < nr_vms; area++) {
3197 start = offsets[area];
3198 end = start + sizes[area];
3199
3200 /* is everything aligned properly? */
3201 BUG_ON(!IS_ALIGNED(offsets[area], align));
3202 BUG_ON(!IS_ALIGNED(sizes[area], align));
3203
3204 /* detect the area with the highest address */
3205 if (start > offsets[last_area])
3206 last_area = area;
3207
c568da28 3208 for (area2 = area + 1; area2 < nr_vms; area2++) {
ca23e405
TH
3209 unsigned long start2 = offsets[area2];
3210 unsigned long end2 = start2 + sizes[area2];
3211
c568da28 3212 BUG_ON(start2 < end && start < end2);
ca23e405
TH
3213 }
3214 }
3215 last_end = offsets[last_area] + sizes[last_area];
3216
3217 if (vmalloc_end - vmalloc_start < last_end) {
3218 WARN_ON(true);
3219 return NULL;
3220 }
3221
4d67d860
TM
3222 vms = kcalloc(nr_vms, sizeof(vms[0]), GFP_KERNEL);
3223 vas = kcalloc(nr_vms, sizeof(vas[0]), GFP_KERNEL);
ca23e405 3224 if (!vas || !vms)
f1db7afd 3225 goto err_free2;
ca23e405
TH
3226
3227 for (area = 0; area < nr_vms; area++) {
68ad4a33 3228 vas[area] = kmem_cache_zalloc(vmap_area_cachep, GFP_KERNEL);
ec3f64fc 3229 vms[area] = kzalloc(sizeof(struct vm_struct), GFP_KERNEL);
ca23e405
TH
3230 if (!vas[area] || !vms[area])
3231 goto err_free;
3232 }
3233retry:
e36176be 3234 spin_lock(&free_vmap_area_lock);
ca23e405
TH
3235
3236 /* start scanning - we scan from the top, begin with the last area */
3237 area = term_area = last_area;
3238 start = offsets[area];
3239 end = start + sizes[area];
3240
68ad4a33
URS
3241 va = pvm_find_va_enclose_addr(vmalloc_end);
3242 base = pvm_determine_end_from_reverse(&va, align) - end;
ca23e405
TH
3243
3244 while (true) {
ca23e405
TH
3245 /*
3246 * base might have underflowed, add last_end before
3247 * comparing.
3248 */
68ad4a33
URS
3249 if (base + last_end < vmalloc_start + last_end)
3250 goto overflow;
ca23e405
TH
3251
3252 /*
68ad4a33 3253 * Fitting base has not been found.
ca23e405 3254 */
68ad4a33
URS
3255 if (va == NULL)
3256 goto overflow;
ca23e405 3257
5336e52c 3258 /*
d8cc323d 3259 * If required width exceeds current VA block, move
5336e52c
KS
3260 * base downwards and then recheck.
3261 */
3262 if (base + end > va->va_end) {
3263 base = pvm_determine_end_from_reverse(&va, align) - end;
3264 term_area = area;
3265 continue;
3266 }
3267
ca23e405 3268 /*
68ad4a33 3269 * If this VA does not fit, move base downwards and recheck.
ca23e405 3270 */
5336e52c 3271 if (base + start < va->va_start) {
68ad4a33
URS
3272 va = node_to_va(rb_prev(&va->rb_node));
3273 base = pvm_determine_end_from_reverse(&va, align) - end;
ca23e405
TH
3274 term_area = area;
3275 continue;
3276 }
3277
3278 /*
3279 * This area fits, move on to the previous one. If
3280 * the previous one is the terminal one, we're done.
3281 */
3282 area = (area + nr_vms - 1) % nr_vms;
3283 if (area == term_area)
3284 break;
68ad4a33 3285
ca23e405
TH
3286 start = offsets[area];
3287 end = start + sizes[area];
68ad4a33 3288 va = pvm_find_va_enclose_addr(base + end);
ca23e405 3289 }
68ad4a33 3290
ca23e405
TH
3291 /* we've found a fitting base, insert all va's */
3292 for (area = 0; area < nr_vms; area++) {
68ad4a33 3293 int ret;
ca23e405 3294
68ad4a33
URS
3295 start = base + offsets[area];
3296 size = sizes[area];
ca23e405 3297
68ad4a33
URS
3298 va = pvm_find_va_enclose_addr(start);
3299 if (WARN_ON_ONCE(va == NULL))
3300 /* It is a BUG(), but trigger recovery instead. */
3301 goto recovery;
3302
3303 type = classify_va_fit_type(va, start, size);
3304 if (WARN_ON_ONCE(type == NOTHING_FIT))
3305 /* It is a BUG(), but trigger recovery instead. */
3306 goto recovery;
3307
3308 ret = adjust_va_to_fit_type(va, start, size, type);
3309 if (unlikely(ret))
3310 goto recovery;
3311
3312 /* Allocated area. */
3313 va = vas[area];
3314 va->va_start = start;
3315 va->va_end = start + size;
68ad4a33 3316 }
ca23e405 3317
e36176be 3318 spin_unlock(&free_vmap_area_lock);
ca23e405 3319
253a496d
DA
3320 /* populate the kasan shadow space */
3321 for (area = 0; area < nr_vms; area++) {
3322 if (kasan_populate_vmalloc(vas[area]->va_start, sizes[area]))
3323 goto err_free_shadow;
3324
3325 kasan_unpoison_vmalloc((void *)vas[area]->va_start,
3326 sizes[area]);
3327 }
3328
ca23e405 3329 /* insert all vm's */
e36176be
URS
3330 spin_lock(&vmap_area_lock);
3331 for (area = 0; area < nr_vms; area++) {
3332 insert_vmap_area(vas[area], &vmap_area_root, &vmap_area_list);
3333
3334 setup_vmalloc_vm_locked(vms[area], vas[area], VM_ALLOC,
3645cb4a 3335 pcpu_get_vm_areas);
e36176be
URS
3336 }
3337 spin_unlock(&vmap_area_lock);
ca23e405
TH
3338
3339 kfree(vas);
3340 return vms;
3341
68ad4a33 3342recovery:
e36176be
URS
3343 /*
3344 * Remove previously allocated areas. There is no
3345 * need in removing these areas from the busy tree,
3346 * because they are inserted only on the final step
3347 * and when pcpu_get_vm_areas() is success.
3348 */
68ad4a33 3349 while (area--) {
253a496d
DA
3350 orig_start = vas[area]->va_start;
3351 orig_end = vas[area]->va_end;
3352 va = merge_or_add_vmap_area(vas[area], &free_vmap_area_root,
3353 &free_vmap_area_list);
9c801f61
URS
3354 if (va)
3355 kasan_release_vmalloc(orig_start, orig_end,
3356 va->va_start, va->va_end);
68ad4a33
URS
3357 vas[area] = NULL;
3358 }
3359
3360overflow:
e36176be 3361 spin_unlock(&free_vmap_area_lock);
68ad4a33
URS
3362 if (!purged) {
3363 purge_vmap_area_lazy();
3364 purged = true;
3365
3366 /* Before "retry", check if we recover. */
3367 for (area = 0; area < nr_vms; area++) {
3368 if (vas[area])
3369 continue;
3370
3371 vas[area] = kmem_cache_zalloc(
3372 vmap_area_cachep, GFP_KERNEL);
3373 if (!vas[area])
3374 goto err_free;
3375 }
3376
3377 goto retry;
3378 }
3379
ca23e405
TH
3380err_free:
3381 for (area = 0; area < nr_vms; area++) {
68ad4a33
URS
3382 if (vas[area])
3383 kmem_cache_free(vmap_area_cachep, vas[area]);
3384
f1db7afd 3385 kfree(vms[area]);
ca23e405 3386 }
f1db7afd 3387err_free2:
ca23e405
TH
3388 kfree(vas);
3389 kfree(vms);
3390 return NULL;
253a496d
DA
3391
3392err_free_shadow:
3393 spin_lock(&free_vmap_area_lock);
3394 /*
3395 * We release all the vmalloc shadows, even the ones for regions that
3396 * hadn't been successfully added. This relies on kasan_release_vmalloc
3397 * being able to tolerate this case.
3398 */
3399 for (area = 0; area < nr_vms; area++) {
3400 orig_start = vas[area]->va_start;
3401 orig_end = vas[area]->va_end;
3402 va = merge_or_add_vmap_area(vas[area], &free_vmap_area_root,
3403 &free_vmap_area_list);
9c801f61
URS
3404 if (va)
3405 kasan_release_vmalloc(orig_start, orig_end,
3406 va->va_start, va->va_end);
253a496d
DA
3407 vas[area] = NULL;
3408 kfree(vms[area]);
3409 }
3410 spin_unlock(&free_vmap_area_lock);
3411 kfree(vas);
3412 kfree(vms);
3413 return NULL;
ca23e405
TH
3414}
3415
3416/**
3417 * pcpu_free_vm_areas - free vmalloc areas for percpu allocator
3418 * @vms: vm_struct pointer array returned by pcpu_get_vm_areas()
3419 * @nr_vms: the number of allocated areas
3420 *
3421 * Free vm_structs and the array allocated by pcpu_get_vm_areas().
3422 */
3423void pcpu_free_vm_areas(struct vm_struct **vms, int nr_vms)
3424{
3425 int i;
3426
3427 for (i = 0; i < nr_vms; i++)
3428 free_vm_area(vms[i]);
3429 kfree(vms);
3430}
4f8b02b4 3431#endif /* CONFIG_SMP */
a10aa579
CL
3432
3433#ifdef CONFIG_PROC_FS
3434static void *s_start(struct seq_file *m, loff_t *pos)
e36176be 3435 __acquires(&vmap_purge_lock)
d4033afd 3436 __acquires(&vmap_area_lock)
a10aa579 3437{
e36176be 3438 mutex_lock(&vmap_purge_lock);
d4033afd 3439 spin_lock(&vmap_area_lock);
e36176be 3440
3f500069 3441 return seq_list_start(&vmap_area_list, *pos);
a10aa579
CL
3442}
3443
3444static void *s_next(struct seq_file *m, void *p, loff_t *pos)
3445{
3f500069 3446 return seq_list_next(p, &vmap_area_list, pos);
a10aa579
CL
3447}
3448
3449static void s_stop(struct seq_file *m, void *p)
e36176be 3450 __releases(&vmap_purge_lock)
d4033afd 3451 __releases(&vmap_area_lock)
a10aa579 3452{
e36176be 3453 mutex_unlock(&vmap_purge_lock);
d4033afd 3454 spin_unlock(&vmap_area_lock);
a10aa579
CL
3455}
3456
a47a126a
ED
3457static void show_numa_info(struct seq_file *m, struct vm_struct *v)
3458{
e5adfffc 3459 if (IS_ENABLED(CONFIG_NUMA)) {
a47a126a
ED
3460 unsigned int nr, *counters = m->private;
3461
3462 if (!counters)
3463 return;
3464
af12346c
WL
3465 if (v->flags & VM_UNINITIALIZED)
3466 return;
7e5b528b
DV
3467 /* Pair with smp_wmb() in clear_vm_uninitialized_flag() */
3468 smp_rmb();
af12346c 3469
a47a126a
ED
3470 memset(counters, 0, nr_node_ids * sizeof(unsigned int));
3471
3472 for (nr = 0; nr < v->nr_pages; nr++)
3473 counters[page_to_nid(v->pages[nr])]++;
3474
3475 for_each_node_state(nr, N_HIGH_MEMORY)
3476 if (counters[nr])
3477 seq_printf(m, " N%u=%u", nr, counters[nr]);
3478 }
3479}
3480
dd3b8353
URS
3481static void show_purge_info(struct seq_file *m)
3482{
3483 struct llist_node *head;
3484 struct vmap_area *va;
3485
3486 head = READ_ONCE(vmap_purge_list.first);
3487 if (head == NULL)
3488 return;
3489
3490 llist_for_each_entry(va, head, purge_list) {
3491 seq_printf(m, "0x%pK-0x%pK %7ld unpurged vm_area\n",
3492 (void *)va->va_start, (void *)va->va_end,
3493 va->va_end - va->va_start);
3494 }
3495}
3496
a10aa579
CL
3497static int s_show(struct seq_file *m, void *p)
3498{
3f500069 3499 struct vmap_area *va;
d4033afd
JK
3500 struct vm_struct *v;
3501
3f500069 3502 va = list_entry(p, struct vmap_area, list);
3503
c2ce8c14 3504 /*
688fcbfc
PL
3505 * s_show can encounter race with remove_vm_area, !vm on behalf
3506 * of vmap area is being tear down or vm_map_ram allocation.
c2ce8c14 3507 */
688fcbfc 3508 if (!va->vm) {
dd3b8353 3509 seq_printf(m, "0x%pK-0x%pK %7ld vm_map_ram\n",
78c72746 3510 (void *)va->va_start, (void *)va->va_end,
dd3b8353 3511 va->va_end - va->va_start);
78c72746 3512
d4033afd 3513 return 0;
78c72746 3514 }
d4033afd
JK
3515
3516 v = va->vm;
a10aa579 3517
45ec1690 3518 seq_printf(m, "0x%pK-0x%pK %7ld",
a10aa579
CL
3519 v->addr, v->addr + v->size, v->size);
3520
62c70bce
JP
3521 if (v->caller)
3522 seq_printf(m, " %pS", v->caller);
23016969 3523
a10aa579
CL
3524 if (v->nr_pages)
3525 seq_printf(m, " pages=%d", v->nr_pages);
3526
3527 if (v->phys_addr)
199eaa05 3528 seq_printf(m, " phys=%pa", &v->phys_addr);
a10aa579
CL
3529
3530 if (v->flags & VM_IOREMAP)
f4527c90 3531 seq_puts(m, " ioremap");
a10aa579
CL
3532
3533 if (v->flags & VM_ALLOC)
f4527c90 3534 seq_puts(m, " vmalloc");
a10aa579
CL
3535
3536 if (v->flags & VM_MAP)
f4527c90 3537 seq_puts(m, " vmap");
a10aa579
CL
3538
3539 if (v->flags & VM_USERMAP)
f4527c90 3540 seq_puts(m, " user");
a10aa579 3541
fe9041c2
CH
3542 if (v->flags & VM_DMA_COHERENT)
3543 seq_puts(m, " dma-coherent");
3544
244d63ee 3545 if (is_vmalloc_addr(v->pages))
f4527c90 3546 seq_puts(m, " vpages");
a10aa579 3547
a47a126a 3548 show_numa_info(m, v);
a10aa579 3549 seq_putc(m, '\n');
dd3b8353
URS
3550
3551 /*
3552 * As a final step, dump "unpurged" areas. Note,
3553 * that entire "/proc/vmallocinfo" output will not
3554 * be address sorted, because the purge list is not
3555 * sorted.
3556 */
3557 if (list_is_last(&va->list, &vmap_area_list))
3558 show_purge_info(m);
3559
a10aa579
CL
3560 return 0;
3561}
3562
5f6a6a9c 3563static const struct seq_operations vmalloc_op = {
a10aa579
CL
3564 .start = s_start,
3565 .next = s_next,
3566 .stop = s_stop,
3567 .show = s_show,
3568};
5f6a6a9c 3569
5f6a6a9c
AD
3570static int __init proc_vmalloc_init(void)
3571{
fddda2b7 3572 if (IS_ENABLED(CONFIG_NUMA))
0825a6f9 3573 proc_create_seq_private("vmallocinfo", 0400, NULL,
44414d82
CH
3574 &vmalloc_op,
3575 nr_node_ids * sizeof(unsigned int), NULL);
fddda2b7 3576 else
0825a6f9 3577 proc_create_seq("vmallocinfo", 0400, NULL, &vmalloc_op);
5f6a6a9c
AD
3578 return 0;
3579}
3580module_init(proc_vmalloc_init);
db3808c1 3581
a10aa579 3582#endif