Drop support for kernels < 4.4 from 'wrapper/vmalloc.h'
[lttng-modules.git] / include / wrapper / vmalloc.h
CommitLineData
b7cdc182 1/* SPDX-License-Identifier: (GPL-2.0-only or LGPL-2.1-only)
9f36eaed 2 *
886d51a3 3 * wrapper/vmalloc.h
6d2a620c
MD
4 *
5 * wrapper around vmalloc_sync_all. Using KALLSYMS to get its address when
6 * available, else we need to have a kernel that exports this function to GPL
7 * modules.
8 *
886d51a3 9 * Copyright (C) 2011-2012 Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
6d2a620c
MD
10 */
11
9f36eaed
MJ
12#ifndef _LTTNG_WRAPPER_VMALLOC_H
13#define _LTTNG_WRAPPER_VMALLOC_H
14
5f4c791e 15#include <lttng/kernel-version.h>
48f5e0b5 16#include <linux/vmalloc.h>
45fe4e1a 17#include <linux/slab.h>
01ab5113 18#include <linux/mm.h>
48f5e0b5 19
6d2a620c
MD
20#ifdef CONFIG_KALLSYMS
21
22#include <linux/kallsyms.h>
5a2f5e92 23#include <wrapper/kallsyms.h>
2b3dbafc 24#include <lttng/kernel-version.h>
6d2a620c 25
5f4c791e 26#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(5,8,0))
0dcc94fa
MJ
27
28/*
29 * wrapper_vmalloc_sync_mappings was removed in v5.8, the vmalloc mappings
30 * are now synchronized when they are created or torn down.
31 */
32static inline
33void wrapper_vmalloc_sync_mappings(void)
34{}
35
5f4c791e 36#elif (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(5,6,0) \
9bfe744a 37 || LTTNG_KERNEL_RANGE(5,5,12, 5,6,0) \
2b3dbafc
OP
38 || LTTNG_KERNEL_RANGE(5,4,28, 5,5,0) \
39 || LTTNG_KERNEL_RANGE(5,2,37, 5,3,0) \
40 || LTTNG_KERNEL_RANGE(4,19,113, 4,20,0) \
41 || LTTNG_KERNEL_RANGE(4,14,175, 4,15,0) \
42 || LTTNG_KERNEL_RANGE(4,9,218, 4,10,0) \
05355f0b 43 || LTTNG_KERNEL_RANGE(4,4,218, 4,5,0) \
2e4c781e
SB
44 || LTTNG_UBUNTU_KERNEL_RANGE(4,15,18,97, 4,16,0,0) \
45 || LTTNG_UBUNTU_KERNEL_RANGE(5,0,21,48, 5,1,0,0) \
05355f0b
MJ
46 || LTTNG_UBUNTU_KERNEL_RANGE(5,3,18,52, 5,4,0,0) \
47 || LTTNG_RHEL_KERNEL_RANGE(4,18,0,240,0,0, 4,19,0,0,0,0))
263b6c88
MD
48
49static inline
50void wrapper_vmalloc_sync_mappings(void)
51{
52 void (*vmalloc_sync_mappings_sym)(void);
53
54 vmalloc_sync_mappings_sym = (void *) kallsyms_lookup_funcptr("vmalloc_sync_mappings");
55 if (vmalloc_sync_mappings_sym) {
56 vmalloc_sync_mappings_sym();
57 } else {
58#ifdef CONFIG_X86
59 /*
60 * Only x86 needs vmalloc_sync_mappings to make sure LTTng does not
61 * trigger recursive page faults.
62 */
63 printk_once(KERN_WARNING "LTTng: vmalloc_sync_mappings symbol lookup failed.\n");
5a15f70c 64 printk_once(KERN_WARNING "LTTng: Page fault handler and NMI tracing might trigger faults.\n");
263b6c88
MD
65#endif
66 }
67}
68
3dfec228
MJ
69/*
70 * Canary function to check for 'vmalloc_sync_mappings()' at compile time.
71 *
72 * From 'include/linux/vmalloc.h':
73 *
74 * void vmalloc_sync_mappings(void);
75 */
76static inline
77void __canary__vmalloc_sync_mappings(void)
78{
79 vmalloc_sync_mappings();
80}
81
5f4c791e 82#else /* #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(5,6,0)) */
263b6c88
MD
83
84/*
3dfec228 85 * Map vmalloc_sync_mappings to vmalloc_sync_all() on kernels before 5.6.
263b6c88 86 */
6d2a620c 87static inline
263b6c88 88void wrapper_vmalloc_sync_mappings(void)
6d2a620c
MD
89{
90 void (*vmalloc_sync_all_sym)(void);
91
c539a324 92 vmalloc_sync_all_sym = (void *) kallsyms_lookup_funcptr("vmalloc_sync_all");
6d2a620c
MD
93 if (vmalloc_sync_all_sym) {
94 vmalloc_sync_all_sym();
95 } else {
96#ifdef CONFIG_X86
97 /*
98 * Only x86 needs vmalloc_sync_all to make sure LTTng does not
99 * trigger recursive page faults.
100 */
e36de50d 101 printk_once(KERN_WARNING "LTTng: vmalloc_sync_all symbol lookup failed.\n");
5a15f70c 102 printk_once(KERN_WARNING "LTTng: Page fault handler and NMI tracing might trigger faults.\n");
6d2a620c
MD
103#endif
104 }
105}
263b6c88 106
3dfec228
MJ
107/*
108 * Canary function to check for 'vmalloc_sync_all()' at compile time.
109 *
110 * From 'include/linux/vmalloc.h':
111 *
112 * void vmalloc_sync_all(void);
113 */
114static inline
115void __canary__vmalloc_sync_all(void)
116{
117 vmalloc_sync_all();
118}
119
5f4c791e 120#endif /* #else #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(5,6,0)) */
263b6c88 121
f740341a 122#else /* CONFIG_KALLSYMS */
6d2a620c 123
5f4c791e 124#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(5,8,0))
f740341a
MJ
125
126/*
127 * wrapper_vmalloc_sync_mappings was removed in v5.8, the vmalloc mappings
128 * are now synchronized when they are created or torn down.
129 */
130static inline
131void wrapper_vmalloc_sync_mappings(void)
132{}
133
5f4c791e 134#elif (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(5,6,0) \
9bfe744a 135 || LTTNG_KERNEL_RANGE(5,5,12, 5,6,0) \
2b3dbafc
OP
136 || LTTNG_KERNEL_RANGE(5,4,28, 5,5,0) \
137 || LTTNG_KERNEL_RANGE(5,2,37, 5,3,0) \
138 || LTTNG_KERNEL_RANGE(4,19,113, 4,20,0) \
139 || LTTNG_KERNEL_RANGE(4,14,175, 4,15,0) \
140 || LTTNG_KERNEL_RANGE(4,9,218, 4,10,0) \
2e4c781e
SB
141 || LTTNG_KERNEL_RANGE(4,4,218, 4,5,0)) \
142 || LTTNG_UBUNTU_KERNEL_RANGE(4,15,18,97, 4,18,0,0) \
143 || LTTNG_UBUNTU_KERNEL_RANGE(5,0,21,48, 5,1,0,0) \
144 || LTTNG_UBUNTU_KERNEL_RANGE(5,3,18,52, 5,4,0,0)
263b6c88 145
6d2a620c 146static inline
263b6c88
MD
147void wrapper_vmalloc_sync_mappings(void)
148{
149 return vmalloc_sync_mappings();
150}
151
5f4c791e 152#else /* #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(5,6,0)) */
263b6c88
MD
153
154static inline
155void wrapper_vmalloc_sync_mappings(void)
6d2a620c
MD
156{
157 return vmalloc_sync_all();
158}
263b6c88 159
5f4c791e 160#endif /* #else #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(5,6,0)) */
263b6c88 161
116a8cdb 162#endif /* CONFIG_KALLSYMS */
b13f3ebe 163
5f4c791e 164#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,12,0))
48f5e0b5
MJ
165static inline
166void *lttng_kvmalloc_node(unsigned long size, gfp_t flags, int node)
167{
168 void *ret;
169
170 ret = kvmalloc_node(size, flags, node);
171 if (is_vmalloc_addr(ret)) {
172 /*
173 * Make sure we don't trigger recursive page faults in the
174 * tracing fast path.
175 */
263b6c88 176 wrapper_vmalloc_sync_mappings();
48f5e0b5
MJ
177 }
178 return ret;
179}
180
181static inline
182void *lttng_kvzalloc_node(unsigned long size, gfp_t flags, int node)
183{
184 return lttng_kvmalloc_node(size, flags | __GFP_ZERO, node);
185}
186
187static inline
188void *lttng_kvmalloc(unsigned long size, gfp_t flags)
189{
190 return lttng_kvmalloc_node(size, flags, NUMA_NO_NODE);
191}
192
193static inline
194void *lttng_kvzalloc(unsigned long size, gfp_t flags)
195{
196 return lttng_kvzalloc_node(size, flags, NUMA_NO_NODE);
197}
198
199static inline
200void lttng_kvfree(const void *addr)
201{
202 kvfree(addr);
203}
204
116a8cdb 205#else /* >= LTTNG_KERNEL_VERSION(4,12,0) */
48f5e0b5
MJ
206
207#include <linux/slab.h>
48f5e0b5 208
20eb87c9
MD
209static inline
210void print_vmalloc_node_range_warning(void)
211{
212 printk_once(KERN_WARNING "LTTng: __vmalloc_node_range symbol lookup failed.\n");
5a15f70c
MJ
213 printk_once(KERN_WARNING "LTTng: Tracer performance will be degraded on NUMA systems.\n");
214 printk_once(KERN_WARNING "LTTng: Please rebuild your kernel with CONFIG_KALLSYMS enabled.\n");
20eb87c9
MD
215}
216
48f5e0b5
MJ
217/*
218 * kallsyms wrapper of __vmalloc_node with a fallback to kmalloc_node.
219 */
220static inline
20eb87c9
MD
221void *__lttng_vmalloc_node_range(unsigned long size, unsigned long align,
222 unsigned long start, unsigned long end, gfp_t gfp_mask,
223 pgprot_t prot, unsigned long vm_flags, int node,
224 const void *caller)
48f5e0b5 225{
48f5e0b5
MJ
226#ifdef CONFIG_KALLSYMS
227 /*
20eb87c9 228 * If we have KALLSYMS, get * __vmalloc_node_range which is not exported.
48f5e0b5 229 */
20eb87c9
MD
230 void *(*lttng__vmalloc_node_range)(unsigned long size, unsigned long align,
231 unsigned long start, unsigned long end, gfp_t gfp_mask,
232 pgprot_t prot, unsigned long vm_flags, int node,
233 const void *caller);
234
235 lttng__vmalloc_node_range = (void *) kallsyms_lookup_funcptr("__vmalloc_node_range");
236 if (lttng__vmalloc_node_range)
237 return lttng__vmalloc_node_range(size, align, start, end, gfp_mask, prot,
238 vm_flags, node, caller);
48f5e0b5 239#endif
20eb87c9
MD
240 if (node != NUMA_NO_NODE)
241 print_vmalloc_node_range_warning();
242 return __vmalloc(size, gfp_mask, prot);
48f5e0b5 243}
3dfec228
MJ
244
245/*
246 * Canary function to check for '__vmalloc_node_range()' at compile time.
247 *
248 * From 'include/linux/vmalloc.h':
249 *
250 * extern void *__vmalloc_node_range(unsigned long size, unsigned long align,
251 * unsigned long start, unsigned long end, gfp_t gfp_mask,
252 * pgprot_t prot, unsigned long vm_flags, int node,
253 * const void *caller);
254 */
255static inline
256void *__canary____lttng_vmalloc_node_range(unsigned long size, unsigned long align,
257 unsigned long start, unsigned long end, gfp_t gfp_mask,
258 pgprot_t prot, unsigned long vm_flags, int node,
259 const void *caller)
260{
261 return __vmalloc_node_range(size, align, start, end, gfp_mask, prot,
262 vm_flags, node, caller);
263}
48f5e0b5
MJ
264
265/**
266 * lttng_kvmalloc_node - attempt to allocate physically contiguous memory, but upon
267 * failure, fall back to non-contiguous (vmalloc) allocation.
268 * @size: size of the request.
269 * @flags: gfp mask for the allocation - must be compatible with GFP_KERNEL.
270 *
271 * Uses kmalloc to get the memory but if the allocation fails then falls back
272 * to the vmalloc allocator. Use lttng_kvfree to free the memory.
273 *
274 * Reclaim modifiers - __GFP_NORETRY, __GFP_REPEAT and __GFP_NOFAIL are not supported
275 */
276static inline
277void *lttng_kvmalloc_node(unsigned long size, gfp_t flags, int node)
278{
279 void *ret;
280
281 /*
282 * vmalloc uses GFP_KERNEL for some internal allocations (e.g page tables)
283 * so the given set of flags has to be compatible.
284 */
285 WARN_ON_ONCE((flags & GFP_KERNEL) != GFP_KERNEL);
286
287 /*
288 * If the allocation fits in a single page, do not fallback.
289 */
290 if (size <= PAGE_SIZE) {
291 return kmalloc_node(size, flags, node);
292 }
293
294 /*
295 * Make sure that larger requests are not too disruptive - no OOM
296 * killer and no allocation failure warnings as we have a fallback
297 */
298 ret = kmalloc_node(size, flags | __GFP_NOWARN | __GFP_NORETRY, node);
299 if (!ret) {
20eb87c9
MD
300 ret = __lttng_vmalloc_node_range(size, 1,
301 VMALLOC_START, VMALLOC_END,
302 flags | __GFP_HIGHMEM, PAGE_KERNEL, 0,
303 node, __builtin_return_address(0));
48f5e0b5
MJ
304 /*
305 * Make sure we don't trigger recursive page faults in the
306 * tracing fast path.
307 */
f3e4ba5d 308 wrapper_vmalloc_sync_mappings();
48f5e0b5
MJ
309 }
310 return ret;
311}
312
313static inline
314void *lttng_kvzalloc_node(unsigned long size, gfp_t flags, int node)
315{
316 return lttng_kvmalloc_node(size, flags | __GFP_ZERO, node);
317}
318
319static inline
320void *lttng_kvmalloc(unsigned long size, gfp_t flags)
321{
322 return lttng_kvmalloc_node(size, flags, NUMA_NO_NODE);
323}
324
325static inline
326void *lttng_kvzalloc(unsigned long size, gfp_t flags)
327{
328 return lttng_kvzalloc_node(size, flags, NUMA_NO_NODE);
329}
330
331static inline
332void lttng_kvfree(const void *addr)
333{
334 if (is_vmalloc_addr(addr)) {
335 vfree(addr);
336 } else {
337 kfree(addr);
338 }
339}
116a8cdb 340#endif /* >= LTTNG_KERNEL_VERSION(4,12,0) */
48f5e0b5 341
a90917c3 342#endif /* _LTTNG_WRAPPER_VMALLOC_H */
This page took 0.066761 seconds and 4 git commands to generate.