2005-04-17 02:20:36 +04:00
/*
* linux / mm / slab . c
* Written by Mark Hemment , 1996 / 97.
* ( markhe @ nextd . demon . co . uk )
*
* kmem_cache_destroy ( ) + some cleanup - 1999 Andrea Arcangeli
*
* Major cleanup , different bufctl logic , per - cpu arrays
* ( c ) 2000 Manfred Spraul
*
* Cleanup , make the head arrays unconditional , preparation for NUMA
* ( c ) 2002 Manfred Spraul
*
* An implementation of the Slab Allocator as described in outline in ;
* UNIX Internals : The New Frontiers by Uresh Vahalia
* Pub : Prentice Hall ISBN 0 - 13 - 101908 - 2
* or with a little more detail in ;
* The Slab Allocator : An Object - Caching Kernel Memory Allocator
* Jeff Bonwick ( Sun Microsystems ) .
* Presented at : USENIX Summer 1994 Technical Conference
*
* The memory is organized in caches , one cache for each object type .
* ( e . g . inode_cache , dentry_cache , buffer_head , vm_area_struct )
* Each cache consists out of many slabs ( they are small ( usually one
* page long ) and always contiguous ) , and each slab contains multiple
* initialized objects .
*
* This means , that your constructor is used only for newly allocated
2007-10-20 03:27:18 +04:00
* slabs and you must pass objects with the same initializations to
2005-04-17 02:20:36 +04:00
* kmem_cache_free .
*
* Each cache can only support one memory type ( GFP_DMA , GFP_HIGHMEM ,
* normal ) . If you need a special memory type , then must create a new
* cache for that memory type .
*
* In order to reduce fragmentation , the slabs are sorted in 3 groups :
* full slabs with 0 free objects
* partial slabs
* empty slabs with no allocated objects
*
* If partial slabs exist , then new allocations come from these slabs ,
* otherwise from empty slabs or new slabs are allocated .
*
* kmem_cache_destroy ( ) CAN CRASH if you try to allocate from the cache
* during kmem_cache_destroy ( ) . The caller must prevent concurrent allocs .
*
* Each cache has a short per - cpu head array , most allocs
* and frees go into that array , and if that array overflows , then 1 / 2
* of the entries in the array are given back into the global cache .
* The head array is strictly LIFO and should improve the cache hit rates .
* On SMP , it additionally reduces the spinlock operations .
*
2006-03-22 11:08:11 +03:00
* The c_cpuarray may not be read with enabled local interrupts -
2005-04-17 02:20:36 +04:00
* it ' s changed with a smp_call_function ( ) .
*
* SMP synchronization :
* constructors and destructors are called without any locking .
2006-02-01 14:05:50 +03:00
* Several members in struct kmem_cache and struct slab never change , they
2005-04-17 02:20:36 +04:00
* are accessed without any locking .
* The per - cpu arrays are never accessed from the wrong cpu , no locking ,
* and local interrupts are disabled so slab code is preempt - safe .
* The non - constant members are protected with a per - cache irq spinlock .
*
* Many thanks to Mark Hemment , who wrote another per - cpu slab patch
* in 2000 - many ideas in the current implementation are derived from
* his patch .
*
* Further notes from the original documentation :
*
* 11 April ' 97. Started multi - threading - markhe
2006-01-19 04:42:33 +03:00
* The global cache - chain is protected by the mutex ' cache_chain_mutex ' .
2005-04-17 02:20:36 +04:00
* The sem is only needed when accessing / extending the cache - chain , which
* can never happen inside an interrupt ( kmem_cache_create ( ) ,
* kmem_cache_shrink ( ) and kmem_cache_reap ( ) ) .
*
* At present , each engine can be growing a cache . This should be blocked .
*
2005-09-10 00:03:32 +04:00
* 15 March 2005. NUMA slab allocator .
* Shai Fultheim < shai @ scalex86 . org > .
* Shobhit Dayal < shobhit @ calsoftinc . com >
* Alok N Kataria < alokk @ calsoftinc . com >
* Christoph Lameter < christoph @ lameter . com >
*
* Modified the slab allocator to be node aware on NUMA systems .
* Each node has its own list of partial , free and full slabs .
* All object allocations for a node occur from node specific slab lists .
2005-04-17 02:20:36 +04:00
*/
# include <linux/slab.h>
# include <linux/mm.h>
2006-06-27 13:53:52 +04:00
# include <linux/poison.h>
2005-04-17 02:20:36 +04:00
# include <linux/swap.h>
# include <linux/cache.h>
# include <linux/interrupt.h>
# include <linux/init.h>
# include <linux/compiler.h>
[PATCH] cpuset memory spread slab cache implementation
Provide the slab cache infrastructure to support cpuset memory spreading.
See the previous patches, cpuset_mem_spread, for an explanation of cpuset
memory spreading.
This patch provides a slab cache SLAB_MEM_SPREAD flag. If set in the
kmem_cache_create() call defining a slab cache, then any task marked with the
process state flag PF_MEMSPREAD will spread memory page allocations for that
cache over all the allowed nodes, instead of preferring the local (faulting)
node.
On systems not configured with CONFIG_NUMA, this results in no change to the
page allocation code path for slab caches.
On systems with cpusets configured in the kernel, but the "memory_spread"
cpuset option not enabled for the current tasks cpuset, this adds a call to a
cpuset routine and failed bit test of the processor state flag PF_SPREAD_SLAB.
For tasks so marked, a second inline test is done for the slab cache flag
SLAB_MEM_SPREAD, and if that is set and if the allocation is not
in_interrupt(), this adds a call to to a cpuset routine that computes which of
the tasks mems_allowed nodes should be preferred for this allocation.
==> This patch adds another hook into the performance critical
code path to allocating objects from the slab cache, in the
____cache_alloc() chunk, below. The next patch optimizes this
hook, reducing the impact of the combined mempolicy plus memory
spreading hooks on this critical code path to a single check
against the tasks task_struct flags word.
This patch provides the generic slab flags and logic needed to apply memory
spreading to a particular slab.
A subsequent patch will mark a few specific slab caches for this placement
policy.
Signed-off-by: Paul Jackson <pj@sgi.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-03-24 14:16:07 +03:00
# include <linux/cpuset.h>
2005-04-17 02:20:36 +04:00
# include <linux/seq_file.h>
# include <linux/notifier.h>
# include <linux/kallsyms.h>
# include <linux/cpu.h>
# include <linux/sysctl.h>
# include <linux/module.h>
# include <linux/rcupdate.h>
2005-06-23 11:09:02 +04:00
# include <linux/string.h>
2006-12-07 07:36:41 +03:00
# include <linux/uaccess.h>
2005-09-10 00:03:32 +04:00
# include <linux/nodemask.h>
2006-01-19 04:42:36 +03:00
# include <linux/mempolicy.h>
2006-01-19 04:42:33 +03:00
# include <linux/mutex.h>
2006-12-08 13:39:44 +03:00
# include <linux/fault-inject.h>
2006-06-27 13:54:55 +04:00
# include <linux/rtmutex.h>
2006-12-13 11:34:27 +03:00
# include <linux/reciprocal_div.h>
2005-04-17 02:20:36 +04:00
# include <asm/cacheflush.h>
# include <asm/tlbflush.h>
# include <asm/page.h>
/*
2007-05-07 01:50:16 +04:00
* DEBUG - 1 for kmem_cache_create ( ) to honour ; SLAB_RED_ZONE & SLAB_POISON .
2005-04-17 02:20:36 +04:00
* 0 for faster , smaller code ( especially in the critical paths ) .
*
* STATS - 1 to collect stats for / proc / slabinfo .
* 0 for faster , smaller code ( especially in the critical paths ) .
*
* FORCED_DEBUG - 1 enables SLAB_RED_ZONE and SLAB_POISON ( if possible )
*/
# ifdef CONFIG_DEBUG_SLAB
# define DEBUG 1
# define STATS 1
# define FORCED_DEBUG 1
# else
# define DEBUG 0
# define STATS 0
# define FORCED_DEBUG 0
# endif
/* Shouldn't this be in a header file somewhere? */
# define BYTES_PER_WORD sizeof(void *)
Fix slab redzone alignment
Commit b46b8f19c9cd435ecac4d9d12b39d78c137ecd66 fixed a couple of bugs
by switching the redzone to 64 bits. Unfortunately, it neglected to
ensure that the _second_ redzone, after the slab object, is aligned
correctly. This caused illegal instruction faults on sparc32, which for
some reason not entirely clear to me are not trapped and fixed up.
Two things need to be done to fix this:
- increase the object size, rounding up to alignof(long long) so
that the second redzone can be aligned correctly.
- If SLAB_STORE_USER is set but alignof(long long)==8, allow a
full 64 bits of space for the user word at the end of the buffer,
even though we may not _use_ the whole 64 bits.
This patch should be a no-op on any 64-bit architecture or any 32-bit
architecture where alignof(long long) == 4. Of the others, it's tested
on ppc32 by myself and a very similar patch was tested on sparc32 by
Mark Fortescue, who reported the new problem.
Also, fix the conditions for FORCED_DEBUG, which hadn't been adjusted to
the new sizes. Again noticed by Mark.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-07-05 05:26:44 +04:00
# define REDZONE_ALIGN max(BYTES_PER_WORD, __alignof__(unsigned long long))
2005-04-17 02:20:36 +04:00
# ifndef cache_line_size
# define cache_line_size() L1_CACHE_BYTES
# endif
# ifndef ARCH_KMALLOC_MINALIGN
/*
* Enforce a minimum alignment for the kmalloc caches .
* Usually , the kmalloc caches are cache_line_size ( ) aligned , except when
* DEBUG and FORCED_DEBUG are enabled , then they are BYTES_PER_WORD aligned .
* Some archs want to perform DMA into kmalloc caches and need a guaranteed
Increase slab redzone to 64bits
There are two problems with the existing redzone implementation.
Firstly, it's causing misalignment of structures which contain a 64-bit
integer, such as netfilter's 'struct ipt_entry' -- causing netfilter
modules to fail to load because of the misalignment. (In particular, the
first check in
net/ipv4/netfilter/ip_tables.c::check_entry_size_and_hooks())
On ppc32 and sparc32, amongst others, __alignof__(uint64_t) == 8.
With slab debugging, we use 32-bit redzones. And allocated slab objects
aren't sufficiently aligned to hold a structure containing a uint64_t.
By _just_ setting ARCH_KMALLOC_MINALIGN to __alignof__(u64) we'd disable
redzone checks on those architectures. By using 64-bit redzones we avoid that
loss of debugging, and also fix the other problem while we're at it.
When investigating this, I noticed that on 64-bit platforms we're using a
32-bit value of RED_ACTIVE/RED_INACTIVE in the 64-bit memory location set
aside for the redzone. Which means that the four bytes immediately before
or after the allocated object at 0x00,0x00,0x00,0x00 for LE and BE
machines, respectively. Which is probably not the most useful choice of
poison value.
One way to fix both of those at once is just to switch to 64-bit
redzones in all cases.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Acked-by: Pekka Enberg <penberg@cs.helsinki.fi>
Cc: Christoph Lameter <clameter@engr.sgi.com>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-05-08 11:22:59 +04:00
* alignment larger than the alignment of a 64 - bit integer .
* ARCH_KMALLOC_MINALIGN allows that .
* Note that increasing this value may disable some debug features .
2005-04-17 02:20:36 +04:00
*/
Increase slab redzone to 64bits
There are two problems with the existing redzone implementation.
Firstly, it's causing misalignment of structures which contain a 64-bit
integer, such as netfilter's 'struct ipt_entry' -- causing netfilter
modules to fail to load because of the misalignment. (In particular, the
first check in
net/ipv4/netfilter/ip_tables.c::check_entry_size_and_hooks())
On ppc32 and sparc32, amongst others, __alignof__(uint64_t) == 8.
With slab debugging, we use 32-bit redzones. And allocated slab objects
aren't sufficiently aligned to hold a structure containing a uint64_t.
By _just_ setting ARCH_KMALLOC_MINALIGN to __alignof__(u64) we'd disable
redzone checks on those architectures. By using 64-bit redzones we avoid that
loss of debugging, and also fix the other problem while we're at it.
When investigating this, I noticed that on 64-bit platforms we're using a
32-bit value of RED_ACTIVE/RED_INACTIVE in the 64-bit memory location set
aside for the redzone. Which means that the four bytes immediately before
or after the allocated object at 0x00,0x00,0x00,0x00 for LE and BE
machines, respectively. Which is probably not the most useful choice of
poison value.
One way to fix both of those at once is just to switch to 64-bit
redzones in all cases.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Acked-by: Pekka Enberg <penberg@cs.helsinki.fi>
Cc: Christoph Lameter <clameter@engr.sgi.com>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-05-08 11:22:59 +04:00
# define ARCH_KMALLOC_MINALIGN __alignof__(unsigned long long)
2005-04-17 02:20:36 +04:00
# endif
# ifndef ARCH_SLAB_MINALIGN
/*
* Enforce a minimum alignment for all caches .
* Intended for archs that get misalignment faults even for BYTES_PER_WORD
* aligned buffers . Includes ARCH_KMALLOC_MINALIGN .
* If possible : Do not enable this flag for CONFIG_DEBUG_SLAB , it disables
* some debug features .
*/
# define ARCH_SLAB_MINALIGN 0
# endif
# ifndef ARCH_KMALLOC_FLAGS
# define ARCH_KMALLOC_FLAGS SLAB_HWCACHE_ALIGN
# endif
/* Legal flag mask for kmem_cache_create(). */
# if DEBUG
2007-05-07 01:50:16 +04:00
# define CREATE_MASK (SLAB_RED_ZONE | \
2005-04-17 02:20:36 +04:00
SLAB_POISON | SLAB_HWCACHE_ALIGN | \
2006-03-22 11:08:15 +03:00
SLAB_CACHE_DMA | \
2007-05-07 01:49:56 +04:00
SLAB_STORE_USER | \
2005-04-17 02:20:36 +04:00
SLAB_RECLAIM_ACCOUNT | SLAB_PANIC | \
[PATCH] cpuset memory spread slab cache implementation
Provide the slab cache infrastructure to support cpuset memory spreading.
See the previous patches, cpuset_mem_spread, for an explanation of cpuset
memory spreading.
This patch provides a slab cache SLAB_MEM_SPREAD flag. If set in the
kmem_cache_create() call defining a slab cache, then any task marked with the
process state flag PF_MEMSPREAD will spread memory page allocations for that
cache over all the allowed nodes, instead of preferring the local (faulting)
node.
On systems not configured with CONFIG_NUMA, this results in no change to the
page allocation code path for slab caches.
On systems with cpusets configured in the kernel, but the "memory_spread"
cpuset option not enabled for the current tasks cpuset, this adds a call to a
cpuset routine and failed bit test of the processor state flag PF_SPREAD_SLAB.
For tasks so marked, a second inline test is done for the slab cache flag
SLAB_MEM_SPREAD, and if that is set and if the allocation is not
in_interrupt(), this adds a call to to a cpuset routine that computes which of
the tasks mems_allowed nodes should be preferred for this allocation.
==> This patch adds another hook into the performance critical
code path to allocating objects from the slab cache, in the
____cache_alloc() chunk, below. The next patch optimizes this
hook, reducing the impact of the combined mempolicy plus memory
spreading hooks on this critical code path to a single check
against the tasks task_struct flags word.
This patch provides the generic slab flags and logic needed to apply memory
spreading to a particular slab.
A subsequent patch will mark a few specific slab caches for this placement
policy.
Signed-off-by: Paul Jackson <pj@sgi.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-03-24 14:16:07 +03:00
SLAB_DESTROY_BY_RCU | SLAB_MEM_SPREAD )
2005-04-17 02:20:36 +04:00
# else
2006-03-22 11:08:15 +03:00
# define CREATE_MASK (SLAB_HWCACHE_ALIGN | \
2007-05-07 01:49:56 +04:00
SLAB_CACHE_DMA | \
2005-04-17 02:20:36 +04:00
SLAB_RECLAIM_ACCOUNT | SLAB_PANIC | \
[PATCH] cpuset memory spread slab cache implementation
Provide the slab cache infrastructure to support cpuset memory spreading.
See the previous patches, cpuset_mem_spread, for an explanation of cpuset
memory spreading.
This patch provides a slab cache SLAB_MEM_SPREAD flag. If set in the
kmem_cache_create() call defining a slab cache, then any task marked with the
process state flag PF_MEMSPREAD will spread memory page allocations for that
cache over all the allowed nodes, instead of preferring the local (faulting)
node.
On systems not configured with CONFIG_NUMA, this results in no change to the
page allocation code path for slab caches.
On systems with cpusets configured in the kernel, but the "memory_spread"
cpuset option not enabled for the current tasks cpuset, this adds a call to a
cpuset routine and failed bit test of the processor state flag PF_SPREAD_SLAB.
For tasks so marked, a second inline test is done for the slab cache flag
SLAB_MEM_SPREAD, and if that is set and if the allocation is not
in_interrupt(), this adds a call to to a cpuset routine that computes which of
the tasks mems_allowed nodes should be preferred for this allocation.
==> This patch adds another hook into the performance critical
code path to allocating objects from the slab cache, in the
____cache_alloc() chunk, below. The next patch optimizes this
hook, reducing the impact of the combined mempolicy plus memory
spreading hooks on this critical code path to a single check
against the tasks task_struct flags word.
This patch provides the generic slab flags and logic needed to apply memory
spreading to a particular slab.
A subsequent patch will mark a few specific slab caches for this placement
policy.
Signed-off-by: Paul Jackson <pj@sgi.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-03-24 14:16:07 +03:00
SLAB_DESTROY_BY_RCU | SLAB_MEM_SPREAD )
2005-04-17 02:20:36 +04:00
# endif
/*
* kmem_bufctl_t :
*
* Bufctl ' s are used for linking objs within a slab
* linked offsets .
*
* This implementation relies on " struct page " for locating the cache &
* slab an object belongs to .
* This allows the bufctl structure to be small ( one int ) , but limits
* the number of objects a slab ( not a cache ) can contain when off - slab
* bufctls are used . The limit is the size of the largest general cache
* that does not use off - slab slabs .
* For 32 bit archs with 4 kB pages , is this 56.
* This is not serious , as it is only for large objects , when it is unwise
* to have too many per slab .
* Note : This limit can be raised by introducing a general cache whose size
* is less than 512 ( PAGE_SIZE < < 3 ) , but greater than 256.
*/
2005-09-04 02:55:03 +04:00
typedef unsigned int kmem_bufctl_t ;
2005-04-17 02:20:36 +04:00
# define BUFCTL_END (((kmem_bufctl_t)(~0U))-0)
# define BUFCTL_FREE (((kmem_bufctl_t)(~0U))-1)
2006-03-25 14:06:39 +03:00
# define BUFCTL_ACTIVE (((kmem_bufctl_t)(~0U))-2)
# define SLAB_LIMIT (((kmem_bufctl_t)(~0U))-3)
2005-04-17 02:20:36 +04:00
/*
* struct slab
*
* Manages the objs in a slab . Placed either at the beginning of mem allocated
* for a slab , or allocated from an general cache .
* Slabs are chained into three list : fully used , partial , fully free slabs .
*/
struct slab {
2006-01-08 12:00:37 +03:00
struct list_head list ;
unsigned long colouroff ;
void * s_mem ; /* including colour offset */
unsigned int inuse ; /* num of objs active in slab */
kmem_bufctl_t free ;
unsigned short nodeid ;
2005-04-17 02:20:36 +04:00
} ;
/*
* struct slab_rcu
*
* slab_destroy on a SLAB_DESTROY_BY_RCU cache uses this structure to
* arrange for kmem_freepages to be called via RCU . This is useful if
* we need to approach a kernel structure obliquely , from its address
* obtained without the usual locking . We can lock the structure to
* stabilize it and check it ' s still at the given address , only if we
* can be sure that the memory has not been meanwhile reused for some
* other kind of object ( which our subsystem ' s lock might corrupt ) .
*
* rcu_read_lock before reading the address , then rcu_read_unlock after
* taking the spinlock within the structure expected at that address .
*
* We assume struct slab_rcu can overlay struct slab when destroying .
*/
struct slab_rcu {
2006-01-08 12:00:37 +03:00
struct rcu_head head ;
2006-02-01 14:05:50 +03:00
struct kmem_cache * cachep ;
2006-01-08 12:00:37 +03:00
void * addr ;
2005-04-17 02:20:36 +04:00
} ;
/*
* struct array_cache
*
* Purpose :
* - LIFO ordering , to hand out cache - warm objects from _alloc
* - reduce the number of linked list operations
* - reduce spinlock operations
*
* The limit is stored in the per - cpu structure to reduce the data cache
* footprint .
*
*/
struct array_cache {
unsigned int avail ;
unsigned int limit ;
unsigned int batchcount ;
unsigned int touched ;
2005-09-10 00:03:32 +04:00
spinlock_t lock ;
2007-10-17 10:30:05 +04:00
void * entry [ ] ; /*
2006-03-22 11:08:11 +03:00
* Must have this definition in here for the proper
* alignment of array_cache . Also simplifies accessing
* the entries .
*/
2005-04-17 02:20:36 +04:00
} ;
2006-03-22 11:08:11 +03:00
/*
* bootstrap : The caches do not work without cpuarrays anymore , but the
* cpuarrays are allocated from the generic caches . . .
2005-04-17 02:20:36 +04:00
*/
# define BOOT_CPUCACHE_ENTRIES 1
struct arraycache_init {
struct array_cache cache ;
2006-01-08 12:00:37 +03:00
void * entries [ BOOT_CPUCACHE_ENTRIES ] ;
2005-04-17 02:20:36 +04:00
} ;
/*
2005-09-10 00:03:32 +04:00
* The slab lists for all objects .
2005-04-17 02:20:36 +04:00
*/
struct kmem_list3 {
2006-01-08 12:00:37 +03:00
struct list_head slabs_partial ; /* partial list first, better asm code */
struct list_head slabs_full ;
struct list_head slabs_free ;
unsigned long free_objects ;
unsigned int free_limit ;
2006-02-05 10:27:56 +03:00
unsigned int colour_next ; /* Per-node cache coloring */
2006-01-08 12:00:37 +03:00
spinlock_t list_lock ;
struct array_cache * shared ; /* shared per node */
struct array_cache * * alien ; /* on other nodes */
2006-03-22 11:09:05 +03:00
unsigned long next_reap ; /* updated without locking */
int free_touched ; /* updated without locking */
2005-04-17 02:20:36 +04:00
} ;
2005-09-10 00:03:32 +04:00
/*
* Need this for bootstrapping a per node allocator .
*/
2008-01-25 09:20:51 +03:00
# define NUM_INIT_LISTS (3 * MAX_NUMNODES)
2005-09-10 00:03:32 +04:00
struct kmem_list3 __initdata initkmem_list3 [ NUM_INIT_LISTS ] ;
# define CACHE_CACHE 0
2008-01-25 09:20:51 +03:00
# define SIZE_AC MAX_NUMNODES
# define SIZE_L3 (2 * MAX_NUMNODES)
2005-09-10 00:03:32 +04:00
2006-06-30 12:55:45 +04:00
static int drain_freelist ( struct kmem_cache * cache ,
struct kmem_list3 * l3 , int tofree ) ;
static void free_block ( struct kmem_cache * cachep , void * * objpp , int len ,
int node ) ;
2006-09-26 10:31:38 +04:00
static int enable_cpucache ( struct kmem_cache * cachep ) ;
2006-11-22 17:55:48 +03:00
static void cache_reap ( struct work_struct * unused ) ;
2006-06-30 12:55:45 +04:00
2005-09-10 00:03:32 +04:00
/*
2006-03-22 11:08:11 +03:00
* This function must be completely optimized away if a constant is passed to
* it . Mostly the same as what is in linux / slab . h except it returns an index .
2005-09-10 00:03:32 +04:00
*/
2005-09-23 08:43:58 +04:00
static __always_inline int index_of ( const size_t size )
2005-09-10 00:03:32 +04:00
{
2006-02-01 14:05:44 +03:00
extern void __bad_size ( void ) ;
2005-09-10 00:03:32 +04:00
if ( __builtin_constant_p ( size ) ) {
int i = 0 ;
# define CACHE(x) \
if ( size < = x ) \
return i ; \
else \
i + + ;
2008-03-06 00:58:17 +03:00
# include <linux/kmalloc_sizes.h>
2005-09-10 00:03:32 +04:00
# undef CACHE
2006-02-01 14:05:44 +03:00
__bad_size ( ) ;
2005-09-23 08:43:58 +04:00
} else
2006-02-01 14:05:44 +03:00
__bad_size ( ) ;
2005-09-10 00:03:32 +04:00
return 0 ;
}
2006-06-23 13:03:46 +04:00
static int slab_early_init = 1 ;
2005-09-10 00:03:32 +04:00
# define INDEX_AC index_of(sizeof(struct arraycache_init))
# define INDEX_L3 index_of(sizeof(struct kmem_list3))
2005-04-17 02:20:36 +04:00
2006-02-01 14:05:48 +03:00
static void kmem_list3_init ( struct kmem_list3 * parent )
2005-09-10 00:03:32 +04:00
{
INIT_LIST_HEAD ( & parent - > slabs_full ) ;
INIT_LIST_HEAD ( & parent - > slabs_partial ) ;
INIT_LIST_HEAD ( & parent - > slabs_free ) ;
parent - > shared = NULL ;
parent - > alien = NULL ;
2006-02-05 10:27:56 +03:00
parent - > colour_next = 0 ;
2005-09-10 00:03:32 +04:00
spin_lock_init ( & parent - > list_lock ) ;
parent - > free_objects = 0 ;
parent - > free_touched = 0 ;
}
2006-03-22 11:08:11 +03:00
# define MAKE_LIST(cachep, listp, slab, nodeid) \
do { \
INIT_LIST_HEAD ( listp ) ; \
list_splice ( & ( cachep - > nodelists [ nodeid ] - > slab ) , listp ) ; \
2005-09-10 00:03:32 +04:00
} while ( 0 )
2006-03-22 11:08:11 +03:00
# define MAKE_ALL_LISTS(cachep, ptr, nodeid) \
do { \
2005-09-10 00:03:32 +04:00
MAKE_LIST ( ( cachep ) , ( & ( ptr ) - > slabs_full ) , slabs_full , nodeid ) ; \
MAKE_LIST ( ( cachep ) , ( & ( ptr ) - > slabs_partial ) , slabs_partial , nodeid ) ; \
MAKE_LIST ( ( cachep ) , ( & ( ptr ) - > slabs_free ) , slabs_free , nodeid ) ; \
} while ( 0 )
2005-04-17 02:20:36 +04:00
/*
2006-02-01 14:05:50 +03:00
* struct kmem_cache
2005-04-17 02:20:36 +04:00
*
* manages a cache .
*/
2006-01-08 12:00:37 +03:00
2005-11-07 11:58:01 +03:00
struct kmem_cache {
2005-04-17 02:20:36 +04:00
/* 1) per-cpu data, touched during every alloc/free */
2006-01-08 12:00:37 +03:00
struct array_cache * array [ NR_CPUS ] ;
2006-03-22 11:08:12 +03:00
/* 2) Cache tunables. Protected by cache_chain_mutex */
2006-01-08 12:00:37 +03:00
unsigned int batchcount ;
unsigned int limit ;
unsigned int shared ;
2006-03-22 11:08:12 +03:00
2006-02-01 14:05:42 +03:00
unsigned int buffer_size ;
2006-12-13 11:34:27 +03:00
u32 reciprocal_buffer_size ;
2006-03-22 11:08:12 +03:00
/* 3) touched by every alloc & free from the backend */
2006-03-22 11:08:11 +03:00
unsigned int flags ; /* constant flags */
unsigned int num ; /* # of objs per slab */
2005-04-17 02:20:36 +04:00
2006-03-22 11:08:12 +03:00
/* 4) cache_grow/shrink */
2005-04-17 02:20:36 +04:00
/* order of pgs per slab (2^n) */
2006-01-08 12:00:37 +03:00
unsigned int gfporder ;
2005-04-17 02:20:36 +04:00
/* force GFP flags, e.g. GFP_DMA */
2006-01-08 12:00:37 +03:00
gfp_t gfpflags ;
2005-04-17 02:20:36 +04:00
2006-03-22 11:08:11 +03:00
size_t colour ; /* cache colouring range */
2006-01-08 12:00:37 +03:00
unsigned int colour_off ; /* colour offset */
2006-02-01 14:05:50 +03:00
struct kmem_cache * slabp_cache ;
2006-01-08 12:00:37 +03:00
unsigned int slab_size ;
2006-03-22 11:08:11 +03:00
unsigned int dflags ; /* dynamic flags */
2005-04-17 02:20:36 +04:00
/* constructor func */
2007-10-17 10:25:51 +04:00
void ( * ctor ) ( struct kmem_cache * , void * ) ;
2005-04-17 02:20:36 +04:00
2006-03-22 11:08:12 +03:00
/* 5) cache creation/removal */
2006-01-08 12:00:37 +03:00
const char * name ;
struct list_head next ;
2005-04-17 02:20:36 +04:00
2006-03-22 11:08:12 +03:00
/* 6) statistics */
2005-04-17 02:20:36 +04:00
# if STATS
2006-01-08 12:00:37 +03:00
unsigned long num_active ;
unsigned long num_allocations ;
unsigned long high_mark ;
unsigned long grown ;
unsigned long reaped ;
unsigned long errors ;
unsigned long max_freeable ;
unsigned long node_allocs ;
unsigned long node_frees ;
2006-04-11 09:52:54 +04:00
unsigned long node_overflow ;
2006-01-08 12:00:37 +03:00
atomic_t allochit ;
atomic_t allocmiss ;
atomic_t freehit ;
atomic_t freemiss ;
2005-04-17 02:20:36 +04:00
# endif
# if DEBUG
2006-02-01 14:05:42 +03:00
/*
* If debugging is enabled , then the allocator can add additional
* fields and / or padding to every object . buffer_size contains the total
* object size including these internal fields , the following two
* variables contain the offset to the user object and its size .
*/
int obj_offset ;
int obj_size ;
2005-04-17 02:20:36 +04:00
# endif
2007-05-07 01:49:29 +04:00
/*
* We put nodelists [ ] at the end of kmem_cache , because we want to size
* this array to nr_node_ids slots instead of MAX_NUMNODES
* ( see kmem_cache_init ( ) )
* We still use [ MAX_NUMNODES ] and not [ 1 ] or [ 0 ] because cache_cache
* is statically defined , so we reserve the max number of nodes .
*/
struct kmem_list3 * nodelists [ MAX_NUMNODES ] ;
/*
* Do not add fields after nodelists [ ]
*/
2005-04-17 02:20:36 +04:00
} ;
# define CFLGS_OFF_SLAB (0x80000000UL)
# define OFF_SLAB(x) ((x)->flags & CFLGS_OFF_SLAB)
# define BATCHREFILL_LIMIT 16
2006-03-22 11:08:11 +03:00
/*
* Optimization question : fewer reaps means less probability for unnessary
* cpucache drain / refill cycles .
2005-04-17 02:20:36 +04:00
*
2005-11-08 18:44:08 +03:00
* OTOH the cpuarrays can contain lots of objects ,
2005-04-17 02:20:36 +04:00
* which could lock up otherwise freeable slabs .
*/
# define REAPTIMEOUT_CPUC (2*HZ)
# define REAPTIMEOUT_LIST3 (4*HZ)
# if STATS
# define STATS_INC_ACTIVE(x) ((x)->num_active++)
# define STATS_DEC_ACTIVE(x) ((x)->num_active--)
# define STATS_INC_ALLOCED(x) ((x)->num_allocations++)
# define STATS_INC_GROWN(x) ((x)->grown++)
2006-06-30 12:55:45 +04:00
# define STATS_ADD_REAPED(x,y) ((x)->reaped += (y))
2006-03-22 11:08:11 +03:00
# define STATS_SET_HIGH(x) \
do { \
if ( ( x ) - > num_active > ( x ) - > high_mark ) \
( x ) - > high_mark = ( x ) - > num_active ; \
} while ( 0 )
2005-04-17 02:20:36 +04:00
# define STATS_INC_ERR(x) ((x)->errors++)
# define STATS_INC_NODEALLOCS(x) ((x)->node_allocs++)
2005-09-10 00:03:32 +04:00
# define STATS_INC_NODEFREES(x) ((x)->node_frees++)
2006-04-11 09:52:54 +04:00
# define STATS_INC_ACOVERFLOW(x) ((x)->node_overflow++)
2006-03-22 11:08:11 +03:00
# define STATS_SET_FREEABLE(x, i) \
do { \
if ( ( x ) - > max_freeable < i ) \
( x ) - > max_freeable = i ; \
} while ( 0 )
2005-04-17 02:20:36 +04:00
# define STATS_INC_ALLOCHIT(x) atomic_inc(&(x)->allochit)
# define STATS_INC_ALLOCMISS(x) atomic_inc(&(x)->allocmiss)
# define STATS_INC_FREEHIT(x) atomic_inc(&(x)->freehit)
# define STATS_INC_FREEMISS(x) atomic_inc(&(x)->freemiss)
# else
# define STATS_INC_ACTIVE(x) do { } while (0)
# define STATS_DEC_ACTIVE(x) do { } while (0)
# define STATS_INC_ALLOCED(x) do { } while (0)
# define STATS_INC_GROWN(x) do { } while (0)
2006-06-30 12:55:45 +04:00
# define STATS_ADD_REAPED(x,y) do { } while (0)
2005-04-17 02:20:36 +04:00
# define STATS_SET_HIGH(x) do { } while (0)
# define STATS_INC_ERR(x) do { } while (0)
# define STATS_INC_NODEALLOCS(x) do { } while (0)
2005-09-10 00:03:32 +04:00
# define STATS_INC_NODEFREES(x) do { } while (0)
2006-04-11 09:52:54 +04:00
# define STATS_INC_ACOVERFLOW(x) do { } while (0)
2006-03-22 11:08:11 +03:00
# define STATS_SET_FREEABLE(x, i) do { } while (0)
2005-04-17 02:20:36 +04:00
# define STATS_INC_ALLOCHIT(x) do { } while (0)
# define STATS_INC_ALLOCMISS(x) do { } while (0)
# define STATS_INC_FREEHIT(x) do { } while (0)
# define STATS_INC_FREEMISS(x) do { } while (0)
# endif
# if DEBUG
2006-03-22 11:08:11 +03:00
/*
* memory layout of objects :
2005-04-17 02:20:36 +04:00
* 0 : objp
2006-02-01 14:05:42 +03:00
* 0 . . cachep - > obj_offset - BYTES_PER_WORD - 1 : padding . This ensures that
2005-04-17 02:20:36 +04:00
* the end of an object is aligned with the end of the real
* allocation . Catches writes behind the end of the allocation .
2006-02-01 14:05:42 +03:00
* cachep - > obj_offset - BYTES_PER_WORD . . cachep - > obj_offset - 1 :
2005-04-17 02:20:36 +04:00
* redzone word .
2006-02-01 14:05:42 +03:00
* cachep - > obj_offset : The real object .
* cachep - > buffer_size - 2 * BYTES_PER_WORD : redzone word [ BYTES_PER_WORD long ]
2006-03-22 11:08:11 +03:00
* cachep - > buffer_size - 1 * BYTES_PER_WORD : last caller address
* [ BYTES_PER_WORD long ]
2005-04-17 02:20:36 +04:00
*/
2006-02-01 14:05:50 +03:00
static int obj_offset ( struct kmem_cache * cachep )
2005-04-17 02:20:36 +04:00
{
2006-02-01 14:05:42 +03:00
return cachep - > obj_offset ;
2005-04-17 02:20:36 +04:00
}
2006-02-01 14:05:50 +03:00
static int obj_size ( struct kmem_cache * cachep )
2005-04-17 02:20:36 +04:00
{
2006-02-01 14:05:42 +03:00
return cachep - > obj_size ;
2005-04-17 02:20:36 +04:00
}
Increase slab redzone to 64bits
There are two problems with the existing redzone implementation.
Firstly, it's causing misalignment of structures which contain a 64-bit
integer, such as netfilter's 'struct ipt_entry' -- causing netfilter
modules to fail to load because of the misalignment. (In particular, the
first check in
net/ipv4/netfilter/ip_tables.c::check_entry_size_and_hooks())
On ppc32 and sparc32, amongst others, __alignof__(uint64_t) == 8.
With slab debugging, we use 32-bit redzones. And allocated slab objects
aren't sufficiently aligned to hold a structure containing a uint64_t.
By _just_ setting ARCH_KMALLOC_MINALIGN to __alignof__(u64) we'd disable
redzone checks on those architectures. By using 64-bit redzones we avoid that
loss of debugging, and also fix the other problem while we're at it.
When investigating this, I noticed that on 64-bit platforms we're using a
32-bit value of RED_ACTIVE/RED_INACTIVE in the 64-bit memory location set
aside for the redzone. Which means that the four bytes immediately before
or after the allocated object at 0x00,0x00,0x00,0x00 for LE and BE
machines, respectively. Which is probably not the most useful choice of
poison value.
One way to fix both of those at once is just to switch to 64-bit
redzones in all cases.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Acked-by: Pekka Enberg <penberg@cs.helsinki.fi>
Cc: Christoph Lameter <clameter@engr.sgi.com>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-05-08 11:22:59 +04:00
static unsigned long long * dbg_redzone1 ( struct kmem_cache * cachep , void * objp )
2005-04-17 02:20:36 +04:00
{
BUG_ON ( ! ( cachep - > flags & SLAB_RED_ZONE ) ) ;
Increase slab redzone to 64bits
There are two problems with the existing redzone implementation.
Firstly, it's causing misalignment of structures which contain a 64-bit
integer, such as netfilter's 'struct ipt_entry' -- causing netfilter
modules to fail to load because of the misalignment. (In particular, the
first check in
net/ipv4/netfilter/ip_tables.c::check_entry_size_and_hooks())
On ppc32 and sparc32, amongst others, __alignof__(uint64_t) == 8.
With slab debugging, we use 32-bit redzones. And allocated slab objects
aren't sufficiently aligned to hold a structure containing a uint64_t.
By _just_ setting ARCH_KMALLOC_MINALIGN to __alignof__(u64) we'd disable
redzone checks on those architectures. By using 64-bit redzones we avoid that
loss of debugging, and also fix the other problem while we're at it.
When investigating this, I noticed that on 64-bit platforms we're using a
32-bit value of RED_ACTIVE/RED_INACTIVE in the 64-bit memory location set
aside for the redzone. Which means that the four bytes immediately before
or after the allocated object at 0x00,0x00,0x00,0x00 for LE and BE
machines, respectively. Which is probably not the most useful choice of
poison value.
One way to fix both of those at once is just to switch to 64-bit
redzones in all cases.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Acked-by: Pekka Enberg <penberg@cs.helsinki.fi>
Cc: Christoph Lameter <clameter@engr.sgi.com>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-05-08 11:22:59 +04:00
return ( unsigned long long * ) ( objp + obj_offset ( cachep ) -
sizeof ( unsigned long long ) ) ;
2005-04-17 02:20:36 +04:00
}
Increase slab redzone to 64bits
There are two problems with the existing redzone implementation.
Firstly, it's causing misalignment of structures which contain a 64-bit
integer, such as netfilter's 'struct ipt_entry' -- causing netfilter
modules to fail to load because of the misalignment. (In particular, the
first check in
net/ipv4/netfilter/ip_tables.c::check_entry_size_and_hooks())
On ppc32 and sparc32, amongst others, __alignof__(uint64_t) == 8.
With slab debugging, we use 32-bit redzones. And allocated slab objects
aren't sufficiently aligned to hold a structure containing a uint64_t.
By _just_ setting ARCH_KMALLOC_MINALIGN to __alignof__(u64) we'd disable
redzone checks on those architectures. By using 64-bit redzones we avoid that
loss of debugging, and also fix the other problem while we're at it.
When investigating this, I noticed that on 64-bit platforms we're using a
32-bit value of RED_ACTIVE/RED_INACTIVE in the 64-bit memory location set
aside for the redzone. Which means that the four bytes immediately before
or after the allocated object at 0x00,0x00,0x00,0x00 for LE and BE
machines, respectively. Which is probably not the most useful choice of
poison value.
One way to fix both of those at once is just to switch to 64-bit
redzones in all cases.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Acked-by: Pekka Enberg <penberg@cs.helsinki.fi>
Cc: Christoph Lameter <clameter@engr.sgi.com>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-05-08 11:22:59 +04:00
static unsigned long long * dbg_redzone2 ( struct kmem_cache * cachep , void * objp )
2005-04-17 02:20:36 +04:00
{
BUG_ON ( ! ( cachep - > flags & SLAB_RED_ZONE ) ) ;
if ( cachep - > flags & SLAB_STORE_USER )
Increase slab redzone to 64bits
There are two problems with the existing redzone implementation.
Firstly, it's causing misalignment of structures which contain a 64-bit
integer, such as netfilter's 'struct ipt_entry' -- causing netfilter
modules to fail to load because of the misalignment. (In particular, the
first check in
net/ipv4/netfilter/ip_tables.c::check_entry_size_and_hooks())
On ppc32 and sparc32, amongst others, __alignof__(uint64_t) == 8.
With slab debugging, we use 32-bit redzones. And allocated slab objects
aren't sufficiently aligned to hold a structure containing a uint64_t.
By _just_ setting ARCH_KMALLOC_MINALIGN to __alignof__(u64) we'd disable
redzone checks on those architectures. By using 64-bit redzones we avoid that
loss of debugging, and also fix the other problem while we're at it.
When investigating this, I noticed that on 64-bit platforms we're using a
32-bit value of RED_ACTIVE/RED_INACTIVE in the 64-bit memory location set
aside for the redzone. Which means that the four bytes immediately before
or after the allocated object at 0x00,0x00,0x00,0x00 for LE and BE
machines, respectively. Which is probably not the most useful choice of
poison value.
One way to fix both of those at once is just to switch to 64-bit
redzones in all cases.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Acked-by: Pekka Enberg <penberg@cs.helsinki.fi>
Cc: Christoph Lameter <clameter@engr.sgi.com>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-05-08 11:22:59 +04:00
return ( unsigned long long * ) ( objp + cachep - > buffer_size -
sizeof ( unsigned long long ) -
Fix slab redzone alignment
Commit b46b8f19c9cd435ecac4d9d12b39d78c137ecd66 fixed a couple of bugs
by switching the redzone to 64 bits. Unfortunately, it neglected to
ensure that the _second_ redzone, after the slab object, is aligned
correctly. This caused illegal instruction faults on sparc32, which for
some reason not entirely clear to me are not trapped and fixed up.
Two things need to be done to fix this:
- increase the object size, rounding up to alignof(long long) so
that the second redzone can be aligned correctly.
- If SLAB_STORE_USER is set but alignof(long long)==8, allow a
full 64 bits of space for the user word at the end of the buffer,
even though we may not _use_ the whole 64 bits.
This patch should be a no-op on any 64-bit architecture or any 32-bit
architecture where alignof(long long) == 4. Of the others, it's tested
on ppc32 by myself and a very similar patch was tested on sparc32 by
Mark Fortescue, who reported the new problem.
Also, fix the conditions for FORCED_DEBUG, which hadn't been adjusted to
the new sizes. Again noticed by Mark.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-07-05 05:26:44 +04:00
REDZONE_ALIGN ) ;
Increase slab redzone to 64bits
There are two problems with the existing redzone implementation.
Firstly, it's causing misalignment of structures which contain a 64-bit
integer, such as netfilter's 'struct ipt_entry' -- causing netfilter
modules to fail to load because of the misalignment. (In particular, the
first check in
net/ipv4/netfilter/ip_tables.c::check_entry_size_and_hooks())
On ppc32 and sparc32, amongst others, __alignof__(uint64_t) == 8.
With slab debugging, we use 32-bit redzones. And allocated slab objects
aren't sufficiently aligned to hold a structure containing a uint64_t.
By _just_ setting ARCH_KMALLOC_MINALIGN to __alignof__(u64) we'd disable
redzone checks on those architectures. By using 64-bit redzones we avoid that
loss of debugging, and also fix the other problem while we're at it.
When investigating this, I noticed that on 64-bit platforms we're using a
32-bit value of RED_ACTIVE/RED_INACTIVE in the 64-bit memory location set
aside for the redzone. Which means that the four bytes immediately before
or after the allocated object at 0x00,0x00,0x00,0x00 for LE and BE
machines, respectively. Which is probably not the most useful choice of
poison value.
One way to fix both of those at once is just to switch to 64-bit
redzones in all cases.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Acked-by: Pekka Enberg <penberg@cs.helsinki.fi>
Cc: Christoph Lameter <clameter@engr.sgi.com>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-05-08 11:22:59 +04:00
return ( unsigned long long * ) ( objp + cachep - > buffer_size -
sizeof ( unsigned long long ) ) ;
2005-04-17 02:20:36 +04:00
}
2006-02-01 14:05:50 +03:00
static void * * dbg_userword ( struct kmem_cache * cachep , void * objp )
2005-04-17 02:20:36 +04:00
{
BUG_ON ( ! ( cachep - > flags & SLAB_STORE_USER ) ) ;
2006-02-01 14:05:42 +03:00
return ( void * * ) ( objp + cachep - > buffer_size - BYTES_PER_WORD ) ;
2005-04-17 02:20:36 +04:00
}
# else
2006-02-01 14:05:42 +03:00
# define obj_offset(x) 0
# define obj_size(cachep) (cachep->buffer_size)
Increase slab redzone to 64bits
There are two problems with the existing redzone implementation.
Firstly, it's causing misalignment of structures which contain a 64-bit
integer, such as netfilter's 'struct ipt_entry' -- causing netfilter
modules to fail to load because of the misalignment. (In particular, the
first check in
net/ipv4/netfilter/ip_tables.c::check_entry_size_and_hooks())
On ppc32 and sparc32, amongst others, __alignof__(uint64_t) == 8.
With slab debugging, we use 32-bit redzones. And allocated slab objects
aren't sufficiently aligned to hold a structure containing a uint64_t.
By _just_ setting ARCH_KMALLOC_MINALIGN to __alignof__(u64) we'd disable
redzone checks on those architectures. By using 64-bit redzones we avoid that
loss of debugging, and also fix the other problem while we're at it.
When investigating this, I noticed that on 64-bit platforms we're using a
32-bit value of RED_ACTIVE/RED_INACTIVE in the 64-bit memory location set
aside for the redzone. Which means that the four bytes immediately before
or after the allocated object at 0x00,0x00,0x00,0x00 for LE and BE
machines, respectively. Which is probably not the most useful choice of
poison value.
One way to fix both of those at once is just to switch to 64-bit
redzones in all cases.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Acked-by: Pekka Enberg <penberg@cs.helsinki.fi>
Cc: Christoph Lameter <clameter@engr.sgi.com>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-05-08 11:22:59 +04:00
# define dbg_redzone1(cachep, objp) ({BUG(); (unsigned long long *)NULL;})
# define dbg_redzone2(cachep, objp) ({BUG(); (unsigned long long *)NULL;})
2005-04-17 02:20:36 +04:00
# define dbg_userword(cachep, objp) ({BUG(); (void **)NULL;})
# endif
/*
* Do not go above this order unless 0 objects fit into the slab .
*/
# define BREAK_GFP_ORDER_HI 1
# define BREAK_GFP_ORDER_LO 0
static int slab_break_gfp_order = BREAK_GFP_ORDER_LO ;
2006-03-22 11:08:11 +03:00
/*
* Functions for storing / retrieving the cachep and or slab from the page
* allocator . These are used to find the slab an obj belongs to . With kfree ( ) ,
* these are used to find the cache which an obj belongs to .
2005-04-17 02:20:36 +04:00
*/
2005-11-14 03:06:46 +03:00
static inline void page_set_cache ( struct page * page , struct kmem_cache * cache )
{
page - > lru . next = ( struct list_head * ) cache ;
}
static inline struct kmem_cache * page_get_cache ( struct page * page )
{
2007-05-07 01:49:39 +04:00
page = compound_head ( page ) ;
2006-06-23 13:03:40 +04:00
BUG_ON ( ! PageSlab ( page ) ) ;
2005-11-14 03:06:46 +03:00
return ( struct kmem_cache * ) page - > lru . next ;
}
static inline void page_set_slab ( struct page * page , struct slab * slab )
{
page - > lru . prev = ( struct list_head * ) slab ;
}
static inline struct slab * page_get_slab ( struct page * page )
{
2006-06-23 13:03:40 +04:00
BUG_ON ( ! PageSlab ( page ) ) ;
2005-11-14 03:06:46 +03:00
return ( struct slab * ) page - > lru . prev ;
}
2005-04-17 02:20:36 +04:00
2006-02-01 14:05:49 +03:00
static inline struct kmem_cache * virt_to_cache ( const void * obj )
{
2007-05-07 01:49:41 +04:00
struct page * page = virt_to_head_page ( obj ) ;
2006-02-01 14:05:49 +03:00
return page_get_cache ( page ) ;
}
static inline struct slab * virt_to_slab ( const void * obj )
{
2007-05-07 01:49:41 +04:00
struct page * page = virt_to_head_page ( obj ) ;
2006-02-01 14:05:49 +03:00
return page_get_slab ( page ) ;
}
2006-03-22 11:08:10 +03:00
static inline void * index_to_obj ( struct kmem_cache * cache , struct slab * slab ,
unsigned int idx )
{
return slab - > s_mem + cache - > buffer_size * idx ;
}
2006-12-13 11:34:27 +03:00
/*
* We want to avoid an expensive divide : ( offset / cache - > buffer_size )
* Using the fact that buffer_size is a constant for a particular cache ,
* we can replace ( offset / cache - > buffer_size ) by
* reciprocal_divide ( offset , cache - > reciprocal_buffer_size )
*/
static inline unsigned int obj_to_index ( const struct kmem_cache * cache ,
const struct slab * slab , void * obj )
2006-03-22 11:08:10 +03:00
{
2006-12-13 11:34:27 +03:00
u32 offset = ( obj - slab - > s_mem ) ;
return reciprocal_divide ( offset , cache - > reciprocal_buffer_size ) ;
2006-03-22 11:08:10 +03:00
}
2006-03-22 11:08:11 +03:00
/*
* These are the default caches for kmalloc . Custom caches can have other sizes .
*/
2005-04-17 02:20:36 +04:00
struct cache_sizes malloc_sizes [ ] = {
# define CACHE(x) { .cs_size = (x) },
# include <linux/kmalloc_sizes.h>
CACHE ( ULONG_MAX )
# undef CACHE
} ;
EXPORT_SYMBOL ( malloc_sizes ) ;
/* Must match cache_sizes above. Out of line to keep cache footprint low. */
struct cache_names {
char * name ;
char * name_dma ;
} ;
static struct cache_names __initdata cache_names [ ] = {
# define CACHE(x) { .name = "size-" #x, .name_dma = "size-" #x "(DMA)" },
# include <linux/kmalloc_sizes.h>
2006-01-08 12:00:37 +03:00
{ NULL , }
2005-04-17 02:20:36 +04:00
# undef CACHE
} ;
static struct arraycache_init initarray_cache __initdata =
2006-01-08 12:00:37 +03:00
{ { 0 , BOOT_CPUCACHE_ENTRIES , 1 , 0 } } ;
2005-04-17 02:20:36 +04:00
static struct arraycache_init initarray_generic =
2006-01-08 12:00:37 +03:00
{ { 0 , BOOT_CPUCACHE_ENTRIES , 1 , 0 } } ;
2005-04-17 02:20:36 +04:00
/* internal cache of cache description objs */
2006-02-01 14:05:50 +03:00
static struct kmem_cache cache_cache = {
2006-01-08 12:00:37 +03:00
. batchcount = 1 ,
. limit = BOOT_CPUCACHE_ENTRIES ,
. shared = 1 ,
2006-02-01 14:05:50 +03:00
. buffer_size = sizeof ( struct kmem_cache ) ,
2006-01-08 12:00:37 +03:00
. name = " kmem_cache " ,
2005-04-17 02:20:36 +04:00
} ;
2006-09-26 10:31:38 +04:00
# define BAD_ALIEN_MAGIC 0x01020304ul
2006-07-13 16:46:03 +04:00
# ifdef CONFIG_LOCKDEP
/*
* Slab sometimes uses the kmalloc slabs to store the slab headers
* for other slabs " off slab " .
* The locking for this is tricky in that it nests within the locks
* of all other slabs in a few places ; to deal with this special
* locking we put on - slab caches into a separate lock - class .
2006-09-26 10:31:38 +04:00
*
* We set lock class for alien array caches which are up during init .
* The lock annotation will be lost if all cpus of a node goes down and
* then comes back up during hotplug
2006-07-13 16:46:03 +04:00
*/
2006-09-26 10:31:38 +04:00
static struct lock_class_key on_slab_l3_key ;
static struct lock_class_key on_slab_alc_key ;
static inline void init_lock_keys ( void )
2006-07-13 16:46:03 +04:00
{
int q ;
2006-09-26 10:31:38 +04:00
struct cache_sizes * s = malloc_sizes ;
while ( s - > cs_size ! = ULONG_MAX ) {
for_each_node ( q ) {
struct array_cache * * alc ;
int r ;
struct kmem_list3 * l3 = s - > cs_cachep - > nodelists [ q ] ;
if ( ! l3 | | OFF_SLAB ( s - > cs_cachep ) )
continue ;
lockdep_set_class ( & l3 - > list_lock , & on_slab_l3_key ) ;
alc = l3 - > alien ;
/*
* FIXME : This check for BAD_ALIEN_MAGIC
* should go away when common slab code is taught to
* work even without alien caches .
* Currently , non NUMA code returns BAD_ALIEN_MAGIC
* for alloc_alien_cache ,
*/
if ( ! alc | | ( unsigned long ) alc = = BAD_ALIEN_MAGIC )
continue ;
for_each_node ( r ) {
if ( alc [ r ] )
lockdep_set_class ( & alc [ r ] - > lock ,
& on_slab_alc_key ) ;
}
}
s + + ;
2006-07-13 16:46:03 +04:00
}
}
# else
2006-09-26 10:31:38 +04:00
static inline void init_lock_keys ( void )
2006-07-13 16:46:03 +04:00
{
}
# endif
[PATCH] mm: slab: eliminate lock_cpu_hotplug from slab
Here's an attempt towards doing away with lock_cpu_hotplug in the slab
subsystem. This approach also fixes a bug which shows up when cpus are
being offlined/onlined and slab caches are being tuned simultaneously.
http://marc.theaimsgroup.com/?l=linux-kernel&m=116098888100481&w=2
The patch has been stress tested overnight on a 2 socket 4 core AMD box with
repeated cpu online and offline, while dbench and kernbench process are
running, and slab caches being tuned at the same time.
There were no lockdep warnings either. (This test on 2,6.18 as 2.6.19-rc
crashes at __drain_pages
http://marc.theaimsgroup.com/?l=linux-kernel&m=116172164217678&w=2 )
The approach here is to hold cache_chain_mutex from CPU_UP_PREPARE until
CPU_ONLINE (similar in approach as worqueue_mutex) . Slab code sensitive
to cpu_online_map (kmem_cache_create, kmem_cache_destroy, slabinfo_write,
__cache_shrink) is already serialized with cache_chain_mutex. (This patch
lengthens cache_chain_mutex hold time at kmem_cache_destroy to cover this).
This patch also takes the cache_chain_sem at kmem_cache_shrink to protect
sanity of cpu_online_map at __cache_shrink, as viewed by slab.
(kmem_cache_shrink->__cache_shrink->drain_cpu_caches). But, really,
kmem_cache_shrink is used at just one place in the acpi subsystem! Do we
really need to keep kmem_cache_shrink at all?
Another note. Looks like a cpu hotplug event can send CPU_UP_CANCELED to
a registered subsystem even if the subsystem did not receive CPU_UP_PREPARE.
This could be due to a subsystem registered for notification earlier than
the current subsystem crapping out with NOTIFY_BAD. Badness can occur with
in the CPU_UP_CANCELED code path at slab if this happens (The same would
apply for workqueue.c as well). To overcome this, we might have to use either
a) a per subsystem flag and avoid handling of CPU_UP_CANCELED, or
b) Use a special notifier events like LOCK_ACQUIRE/RELEASE as Gautham was
using in his experiments, or
c) Do not send CPU_UP_CANCELED to a subsystem which did not receive
CPU_UP_PREPARE.
I would prefer c).
Signed-off-by: Ravikiran Thirumalai <kiran@scalex86.org>
Signed-off-by: Shai Fultheim <shai@scalex86.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-07 07:32:14 +03:00
/*
2008-01-25 23:08:02 +03:00
* Guard access to the cache - chain .
[PATCH] mm: slab: eliminate lock_cpu_hotplug from slab
Here's an attempt towards doing away with lock_cpu_hotplug in the slab
subsystem. This approach also fixes a bug which shows up when cpus are
being offlined/onlined and slab caches are being tuned simultaneously.
http://marc.theaimsgroup.com/?l=linux-kernel&m=116098888100481&w=2
The patch has been stress tested overnight on a 2 socket 4 core AMD box with
repeated cpu online and offline, while dbench and kernbench process are
running, and slab caches being tuned at the same time.
There were no lockdep warnings either. (This test on 2,6.18 as 2.6.19-rc
crashes at __drain_pages
http://marc.theaimsgroup.com/?l=linux-kernel&m=116172164217678&w=2 )
The approach here is to hold cache_chain_mutex from CPU_UP_PREPARE until
CPU_ONLINE (similar in approach as worqueue_mutex) . Slab code sensitive
to cpu_online_map (kmem_cache_create, kmem_cache_destroy, slabinfo_write,
__cache_shrink) is already serialized with cache_chain_mutex. (This patch
lengthens cache_chain_mutex hold time at kmem_cache_destroy to cover this).
This patch also takes the cache_chain_sem at kmem_cache_shrink to protect
sanity of cpu_online_map at __cache_shrink, as viewed by slab.
(kmem_cache_shrink->__cache_shrink->drain_cpu_caches). But, really,
kmem_cache_shrink is used at just one place in the acpi subsystem! Do we
really need to keep kmem_cache_shrink at all?
Another note. Looks like a cpu hotplug event can send CPU_UP_CANCELED to
a registered subsystem even if the subsystem did not receive CPU_UP_PREPARE.
This could be due to a subsystem registered for notification earlier than
the current subsystem crapping out with NOTIFY_BAD. Badness can occur with
in the CPU_UP_CANCELED code path at slab if this happens (The same would
apply for workqueue.c as well). To overcome this, we might have to use either
a) a per subsystem flag and avoid handling of CPU_UP_CANCELED, or
b) Use a special notifier events like LOCK_ACQUIRE/RELEASE as Gautham was
using in his experiments, or
c) Do not send CPU_UP_CANCELED to a subsystem which did not receive
CPU_UP_PREPARE.
I would prefer c).
Signed-off-by: Ravikiran Thirumalai <kiran@scalex86.org>
Signed-off-by: Shai Fultheim <shai@scalex86.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-07 07:32:14 +03:00
*/
2006-01-19 04:42:33 +03:00
static DEFINE_MUTEX ( cache_chain_mutex ) ;
2005-04-17 02:20:36 +04:00
static struct list_head cache_chain ;
/*
* chicken and egg problem : delay the per - cpu array allocation
* until the general caches are up .
*/
static enum {
NONE ,
2005-09-10 00:03:32 +04:00
PARTIAL_AC ,
PARTIAL_L3 ,
2005-04-17 02:20:36 +04:00
FULL
} g_cpucache_up ;
2006-05-15 20:44:13 +04:00
/*
* used by boot code to determine if it can use slab based allocator
*/
int slab_is_available ( void )
{
return g_cpucache_up = = FULL ;
}
2006-11-22 17:54:01 +03:00
static DEFINE_PER_CPU ( struct delayed_work , reap_work ) ;
2005-04-17 02:20:36 +04:00
2006-02-01 14:05:50 +03:00
static inline struct array_cache * cpu_cache_get ( struct kmem_cache * cachep )
2005-04-17 02:20:36 +04:00
{
return cachep - > array [ smp_processor_id ( ) ] ;
}
2006-03-22 11:08:11 +03:00
static inline struct kmem_cache * __find_general_cachep ( size_t size ,
gfp_t gfpflags )
2005-04-17 02:20:36 +04:00
{
struct cache_sizes * csizep = malloc_sizes ;
# if DEBUG
/* This happens if someone tries to call
2006-01-08 12:00:37 +03:00
* kmem_cache_create ( ) , or __kmalloc ( ) , before
* the generic caches are initialized .
*/
[PATCH] Fix slab BUG_ON() triggered by change in array cache size
With the new changes that we made in the initialization of the slab
allocator, we first setup the cache from which array caches are allocated,
and then the cache, from which kmem_list3's are allocated.
Now if the array cache comes from a cache in which objsize > 32, (in this
instance size-64) then, first size-64 cache will be allocated and then the
size-128 (if this is the cache from which kmem_list3's are going to be
allocated).
So with these new changes, we are not guaranteed that we will be
initializing the malloc_sizes array in a serialized order. Thus there is
a bug in __find_general_cachep, as we are checking whether the first
cache_sizes ptr is NULL.
This is replaced by checking whether the array-cache cache is initialized.
Attached is a patch which does that. Boots fine on a x86-64, with
DEBUG_SPIN, DEBUG_SLAB, and preempt.
Attached is a patch which does that. Boots fine on a x86-64, with
DEBUG_SPIN, DEBUG_SLAB, and preempt.Thanks & Regards, Alok
Signed-off-by: Alok N Kataria <alokk@calsoftinc.com>
Signed-off-by: Shobhit Dayal <shobhitdayal.com>
Cc: Manfred Spraul <manfred@colorfullife.com>
Cc: Christoph Lameter <christoph@lameter.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-09-14 23:17:53 +04:00
BUG_ON ( malloc_sizes [ INDEX_AC ] . cs_cachep = = NULL ) ;
2005-04-17 02:20:36 +04:00
# endif
2007-07-17 15:03:22 +04:00
if ( ! size )
return ZERO_SIZE_PTR ;
2005-04-17 02:20:36 +04:00
while ( size > csizep - > cs_size )
csizep + + ;
/*
2005-09-04 02:54:54 +04:00
* Really subtle : The last entry with cs - > cs_size = = ULONG_MAX
2005-04-17 02:20:36 +04:00
* has cs_ { dma , } cachep = = NULL . Thus no special case
* for large kmalloc calls required .
*/
2007-02-10 12:43:10 +03:00
# ifdef CONFIG_ZONE_DMA
2005-04-17 02:20:36 +04:00
if ( unlikely ( gfpflags & GFP_DMA ) )
return csizep - > cs_dmacachep ;
2007-02-10 12:43:10 +03:00
# endif
2005-04-17 02:20:36 +04:00
return csizep - > cs_cachep ;
}
2006-09-26 10:31:02 +04:00
static struct kmem_cache * kmem_find_general_cachep ( size_t size , gfp_t gfpflags )
2005-05-01 19:58:38 +04:00
{
return __find_general_cachep ( size , gfpflags ) ;
}
2006-02-01 14:05:45 +03:00
static size_t slab_mgmt_size ( size_t nr_objs , size_t align )
2005-04-17 02:20:36 +04:00
{
2006-02-01 14:05:45 +03:00
return ALIGN ( sizeof ( struct slab ) + nr_objs * sizeof ( kmem_bufctl_t ) , align ) ;
}
2005-04-17 02:20:36 +04:00
2006-03-22 11:08:11 +03:00
/*
* Calculate the number of objects and left - over bytes for a given buffer size .
*/
2006-02-01 14:05:45 +03:00
static void cache_estimate ( unsigned long gfporder , size_t buffer_size ,
size_t align , int flags , size_t * left_over ,
unsigned int * num )
{
int nr_objs ;
size_t mgmt_size ;
size_t slab_size = PAGE_SIZE < < gfporder ;
2005-04-17 02:20:36 +04:00
2006-02-01 14:05:45 +03:00
/*
* The slab management structure can be either off the slab or
* on it . For the latter case , the memory allocated for a
* slab is used for :
*
* - The struct slab
* - One kmem_bufctl_t for each object
* - Padding to respect alignment of @ align
* - @ buffer_size bytes for each object
*
* If the slab management structure is off the slab , then the
* alignment will already be calculated into the size . Because
* the slabs are all pages aligned , the objects will be at the
* correct alignment when allocated .
*/
if ( flags & CFLGS_OFF_SLAB ) {
mgmt_size = 0 ;
nr_objs = slab_size / buffer_size ;
if ( nr_objs > SLAB_LIMIT )
nr_objs = SLAB_LIMIT ;
} else {
/*
* Ignore padding for the initial guess . The padding
* is at most @ align - 1 bytes , and @ buffer_size is at
* least @ align . In the worst case , this result will
* be one greater than the number of objects that fit
* into the memory allocation when taking the padding
* into account .
*/
nr_objs = ( slab_size - sizeof ( struct slab ) ) /
( buffer_size + sizeof ( kmem_bufctl_t ) ) ;
/*
* This calculated number will be either the right
* amount , or one greater than what we want .
*/
if ( slab_mgmt_size ( nr_objs , align ) + nr_objs * buffer_size
> slab_size )
nr_objs - - ;
if ( nr_objs > SLAB_LIMIT )
nr_objs = SLAB_LIMIT ;
mgmt_size = slab_mgmt_size ( nr_objs , align ) ;
}
* num = nr_objs ;
* left_over = slab_size - nr_objs * buffer_size - mgmt_size ;
2005-04-17 02:20:36 +04:00
}
# define slab_error(cachep, msg) __slab_error(__FUNCTION__, cachep, msg)
2006-03-22 11:08:11 +03:00
static void __slab_error ( const char * function , struct kmem_cache * cachep ,
char * msg )
2005-04-17 02:20:36 +04:00
{
printk ( KERN_ERR " slab error in %s(): cache `%s': %s \n " ,
2006-01-08 12:00:37 +03:00
function , cachep - > name , msg ) ;
2005-04-17 02:20:36 +04:00
dump_stack ( ) ;
}
2006-12-07 07:32:16 +03:00
/*
* By default on NUMA we use alien caches to stage the freeing of
* objects allocated from other nodes . This causes massive memory
* inefficiencies when using fake NUMA setup to split memory into a
* large number of small nodes , so it can be disabled on the command
* line
*/
static int use_alien_caches __read_mostly = 1 ;
2007-08-23 01:01:49 +04:00
static int numa_platform __read_mostly = 1 ;
2006-12-07 07:32:16 +03:00
static int __init noaliencache_setup ( char * s )
{
use_alien_caches = 0 ;
return 1 ;
}
__setup ( " noaliencache " , noaliencache_setup ) ;
2006-03-10 04:33:54 +03:00
# ifdef CONFIG_NUMA
/*
* Special reaping functions for NUMA systems called from cache_reap ( ) .
* These take care of doing round robin flushing of alien caches ( containing
* objects freed on different nodes from which they were allocated ) and the
* flushing of remote pcps by calling drain_node_pages .
*/
static DEFINE_PER_CPU ( unsigned long , reap_node ) ;
static void init_reap_node ( int cpu )
{
int node ;
node = next_node ( cpu_to_node ( cpu ) , node_online_map ) ;
if ( node = = MAX_NUMNODES )
2006-03-22 11:09:11 +03:00
node = first_node ( node_online_map ) ;
2006-03-10 04:33:54 +03:00
2006-11-03 09:07:14 +03:00
per_cpu ( reap_node , cpu ) = node ;
2006-03-10 04:33:54 +03:00
}
static void next_reap_node ( void )
{
int node = __get_cpu_var ( reap_node ) ;
node = next_node ( node , node_online_map ) ;
if ( unlikely ( node > = MAX_NUMNODES ) )
node = first_node ( node_online_map ) ;
__get_cpu_var ( reap_node ) = node ;
}
# else
# define init_reap_node(cpu) do { } while (0)
# define next_reap_node(void) do { } while (0)
# endif
2005-04-17 02:20:36 +04:00
/*
* Initiate the reap timer running on the target CPU . We run at around 1 to 2 Hz
* via the workqueue / eventd .
* Add the CPU number into the expiration time to minimize the possibility of
* the CPUs getting into lockstep and contending for the global cache chain
* lock .
*/
2007-07-16 10:38:20 +04:00
static void __cpuinit start_cpu_timer ( int cpu )
2005-04-17 02:20:36 +04:00
{
2006-11-22 17:54:01 +03:00
struct delayed_work * reap_work = & per_cpu ( reap_work , cpu ) ;
2005-04-17 02:20:36 +04:00
/*
* When this gets called from do_initcalls via cpucache_init ( ) ,
* init_workqueues ( ) has already run , so keventd will be setup
* at that time .
*/
2006-11-22 17:54:01 +03:00
if ( keventd_up ( ) & & reap_work - > work . func = = NULL ) {
2006-03-10 04:33:54 +03:00
init_reap_node ( cpu ) ;
2006-11-22 17:55:48 +03:00
INIT_DELAYED_WORK ( reap_work , cache_reap ) ;
2006-12-10 13:21:28 +03:00
schedule_delayed_work_on ( cpu , reap_work ,
__round_jiffies_relative ( HZ , cpu ) ) ;
2005-04-17 02:20:36 +04:00
}
}
2005-09-10 00:03:32 +04:00
static struct array_cache * alloc_arraycache ( int node , int entries ,
2006-01-08 12:00:37 +03:00
int batchcount )
2005-04-17 02:20:36 +04:00
{
2006-01-08 12:00:37 +03:00
int memsize = sizeof ( void * ) * entries + sizeof ( struct array_cache ) ;
2005-04-17 02:20:36 +04:00
struct array_cache * nc = NULL ;
2005-09-10 00:03:32 +04:00
nc = kmalloc_node ( memsize , GFP_KERNEL , node ) ;
2005-04-17 02:20:36 +04:00
if ( nc ) {
nc - > avail = 0 ;
nc - > limit = entries ;
nc - > batchcount = batchcount ;
nc - > touched = 0 ;
2005-09-10 00:03:32 +04:00
spin_lock_init ( & nc - > lock ) ;
2005-04-17 02:20:36 +04:00
}
return nc ;
}
2006-03-25 14:06:44 +03:00
/*
* Transfer objects in one arraycache to another .
* Locking must be handled by the caller .
*
* Return the number of entries transferred .
*/
static int transfer_objects ( struct array_cache * to ,
struct array_cache * from , unsigned int max )
{
/* Figure out how many entries to transfer */
int nr = min ( min ( from - > avail , max ) , to - > limit - to - > avail ) ;
if ( ! nr )
return 0 ;
memcpy ( to - > entry + to - > avail , from - > entry + from - > avail - nr ,
sizeof ( void * ) * nr ) ;
from - > avail - = nr ;
to - > avail + = nr ;
to - > touched = 1 ;
return nr ;
}
2006-09-27 12:50:08 +04:00
# ifndef CONFIG_NUMA
# define drain_alien_cache(cachep, alien) do { } while (0)
# define reap_alien(cachep, l3) do { } while (0)
static inline struct array_cache * * alloc_alien_cache ( int node , int limit )
{
return ( struct array_cache * * ) BAD_ALIEN_MAGIC ;
}
static inline void free_alien_cache ( struct array_cache * * ac_ptr )
{
}
static inline int cache_free_alien ( struct kmem_cache * cachep , void * objp )
{
return 0 ;
}
static inline void * alternate_node_alloc ( struct kmem_cache * cachep ,
gfp_t flags )
{
return NULL ;
}
2006-12-07 07:32:30 +03:00
static inline void * ____cache_alloc_node ( struct kmem_cache * cachep ,
2006-09-27 12:50:08 +04:00
gfp_t flags , int nodeid )
{
return NULL ;
}
# else /* CONFIG_NUMA */
2006-12-07 07:32:30 +03:00
static void * ____cache_alloc_node ( struct kmem_cache * , gfp_t , int ) ;
2006-03-24 14:16:08 +03:00
static void * alternate_node_alloc ( struct kmem_cache * , gfp_t ) ;
2006-01-19 04:42:36 +03:00
2006-02-01 14:05:48 +03:00
static struct array_cache * * alloc_alien_cache ( int node , int limit )
2005-09-10 00:03:32 +04:00
{
struct array_cache * * ac_ptr ;
2007-02-21 00:57:52 +03:00
int memsize = sizeof ( void * ) * nr_node_ids ;
2005-09-10 00:03:32 +04:00
int i ;
if ( limit > 1 )
limit = 12 ;
ac_ptr = kmalloc_node ( memsize , GFP_KERNEL , node ) ;
if ( ac_ptr ) {
for_each_node ( i ) {
if ( i = = node | | ! node_online ( i ) ) {
ac_ptr [ i ] = NULL ;
continue ;
}
ac_ptr [ i ] = alloc_arraycache ( node , limit , 0xbaadf00d ) ;
if ( ! ac_ptr [ i ] ) {
2007-11-15 03:58:35 +03:00
for ( i - - ; i > = 0 ; i - - )
2005-09-10 00:03:32 +04:00
kfree ( ac_ptr [ i ] ) ;
kfree ( ac_ptr ) ;
return NULL ;
}
}
}
return ac_ptr ;
}
2006-02-01 14:05:48 +03:00
static void free_alien_cache ( struct array_cache * * ac_ptr )
2005-09-10 00:03:32 +04:00
{
int i ;
if ( ! ac_ptr )
return ;
for_each_node ( i )
2006-01-08 12:00:37 +03:00
kfree ( ac_ptr [ i ] ) ;
2005-09-10 00:03:32 +04:00
kfree ( ac_ptr ) ;
}
2006-02-01 14:05:50 +03:00
static void __drain_alien_cache ( struct kmem_cache * cachep ,
2006-02-01 14:05:48 +03:00
struct array_cache * ac , int node )
2005-09-10 00:03:32 +04:00
{
struct kmem_list3 * rl3 = cachep - > nodelists [ node ] ;
if ( ac - > avail ) {
spin_lock ( & rl3 - > list_lock ) ;
2006-03-25 14:06:45 +03:00
/*
* Stuff objects into the remote nodes shared array first .
* That way we could avoid the overhead of putting the objects
* into the free lists and getting them back later .
*/
2006-04-28 19:54:37 +04:00
if ( rl3 - > shared )
transfer_objects ( rl3 - > shared , ac , ac - > limit ) ;
2006-03-25 14:06:45 +03:00
2005-09-23 08:44:02 +04:00
free_block ( cachep , ac - > entry , ac - > avail , node ) ;
2005-09-10 00:03:32 +04:00
ac - > avail = 0 ;
spin_unlock ( & rl3 - > list_lock ) ;
}
}
2006-03-10 04:33:54 +03:00
/*
* Called from cache_reap ( ) to regularly drain alien caches round robin .
*/
static void reap_alien ( struct kmem_cache * cachep , struct kmem_list3 * l3 )
{
int node = __get_cpu_var ( reap_node ) ;
if ( l3 - > alien ) {
struct array_cache * ac = l3 - > alien [ node ] ;
2006-03-25 14:06:45 +03:00
if ( ac & & ac - > avail & & spin_trylock_irq ( & ac - > lock ) ) {
2006-03-10 04:33:54 +03:00
__drain_alien_cache ( cachep , ac , node ) ;
spin_unlock_irq ( & ac - > lock ) ;
}
}
}
2006-03-22 11:08:11 +03:00
static void drain_alien_cache ( struct kmem_cache * cachep ,
struct array_cache * * alien )
2005-09-10 00:03:32 +04:00
{
2006-01-08 12:00:37 +03:00
int i = 0 ;
2005-09-10 00:03:32 +04:00
struct array_cache * ac ;
unsigned long flags ;
for_each_online_node ( i ) {
[PATCH] NUMA slab locking fixes: fix cpu down and up locking
This fixes locking and bugs in cpu_down and cpu_up paths of the NUMA slab
allocator. Sonny Rao <sonny@burdell.org> reported problems sometime back on
POWER5 boxes, when the last cpu on the nodes were being offlined. We could
not reproduce the same on x86_64 because the cpumask (node_to_cpumask) was not
being updated on cpu down. Since that issue is now fixed, we can reproduce
Sonny's problems on x86_64 NUMA, and here is the fix.
The problem earlier was on CPU_DOWN, if it was the last cpu on the node to go
down, the array_caches (shared, alien) and the kmem_list3 of the node were
being freed (kfree) with the kmem_list3 lock held. If the l3 or the
array_caches were to come from the same cache being cleared, we hit on
badness.
This patch cleans up the locking in cpu_up and cpu_down path. We cannot
really free l3 on cpu down because, there is no node offlining yet and even
though a cpu is not yet up, node local memory can be allocated for it. So l3s
are usually allocated at keme_cache_create and destroyed at
kmem_cache_destroy. Hence, we don't need cachep->spinlock protection to get
to the cachep->nodelist[nodeid] either.
Patch survived onlining and offlining on a 4 core 2 node Tyan box with a 4
dbench process running all the time.
Signed-off-by: Alok N Kataria <alokk@calsoftinc.com>
Signed-off-by: Ravikiran Thirumalai <kiran@scalex86.org>
Cc: Christoph Lameter <christoph@lameter.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-02-05 10:27:59 +03:00
ac = alien [ i ] ;
2005-09-10 00:03:32 +04:00
if ( ac ) {
spin_lock_irqsave ( & ac - > lock , flags ) ;
__drain_alien_cache ( cachep , ac , i ) ;
spin_unlock_irqrestore ( & ac - > lock , flags ) ;
}
}
}
2006-06-23 13:03:05 +04:00
2006-07-13 16:44:38 +04:00
static inline int cache_free_alien ( struct kmem_cache * cachep , void * objp )
2006-06-23 13:03:05 +04:00
{
struct slab * slabp = virt_to_slab ( objp ) ;
int nodeid = slabp - > nodeid ;
struct kmem_list3 * l3 ;
struct array_cache * alien = NULL ;
2006-10-06 11:43:52 +04:00
int node ;
node = numa_node_id ( ) ;
2006-06-23 13:03:05 +04:00
/*
* Make sure we are not freeing a object from another node to the array
* cache on this cpu .
*/
2007-05-02 21:27:18 +04:00
if ( likely ( slabp - > nodeid = = node ) )
2006-06-23 13:03:05 +04:00
return 0 ;
2006-10-06 11:43:52 +04:00
l3 = cachep - > nodelists [ node ] ;
2006-06-23 13:03:05 +04:00
STATS_INC_NODEFREES ( cachep ) ;
if ( l3 - > alien & & l3 - > alien [ nodeid ] ) {
alien = l3 - > alien [ nodeid ] ;
2006-07-13 16:44:38 +04:00
spin_lock ( & alien - > lock ) ;
2006-06-23 13:03:05 +04:00
if ( unlikely ( alien - > avail = = alien - > limit ) ) {
STATS_INC_ACOVERFLOW ( cachep ) ;
__drain_alien_cache ( cachep , alien , nodeid ) ;
}
alien - > entry [ alien - > avail + + ] = objp ;
spin_unlock ( & alien - > lock ) ;
} else {
spin_lock ( & ( cachep - > nodelists [ nodeid ] ) - > list_lock ) ;
free_block ( cachep , & objp , 1 , nodeid ) ;
spin_unlock ( & ( cachep - > nodelists [ nodeid ] ) - > list_lock ) ;
}
return 1 ;
}
2005-09-10 00:03:32 +04:00
# endif
2007-10-18 14:05:09 +04:00
static void __cpuinit cpuup_canceled ( long cpu )
{
struct kmem_cache * cachep ;
struct kmem_list3 * l3 = NULL ;
int node = cpu_to_node ( cpu ) ;
list_for_each_entry ( cachep , & cache_chain , next ) {
struct array_cache * nc ;
struct array_cache * shared ;
struct array_cache * * alien ;
cpumask_t mask ;
mask = node_to_cpumask ( node ) ;
/* cpu is dead; no one can alloc from it. */
nc = cachep - > array [ cpu ] ;
cachep - > array [ cpu ] = NULL ;
l3 = cachep - > nodelists [ node ] ;
if ( ! l3 )
goto free_array_cache ;
spin_lock_irq ( & l3 - > list_lock ) ;
/* Free limit for this kmem_list3 */
l3 - > free_limit - = cachep - > batchcount ;
if ( nc )
free_block ( cachep , nc - > entry , nc - > avail , node ) ;
if ( ! cpus_empty ( mask ) ) {
spin_unlock_irq ( & l3 - > list_lock ) ;
goto free_array_cache ;
}
shared = l3 - > shared ;
if ( shared ) {
free_block ( cachep , shared - > entry ,
shared - > avail , node ) ;
l3 - > shared = NULL ;
}
alien = l3 - > alien ;
l3 - > alien = NULL ;
spin_unlock_irq ( & l3 - > list_lock ) ;
kfree ( shared ) ;
if ( alien ) {
drain_alien_cache ( cachep , alien ) ;
free_alien_cache ( alien ) ;
}
free_array_cache :
kfree ( nc ) ;
}
/*
* In the previous loop , all the objects were freed to
* the respective cache ' s slabs , now we can go ahead and
* shrink each nodelist to its limit .
*/
list_for_each_entry ( cachep , & cache_chain , next ) {
l3 = cachep - > nodelists [ node ] ;
if ( ! l3 )
continue ;
drain_freelist ( cachep , l3 , l3 - > free_objects ) ;
}
}
static int __cpuinit cpuup_prepare ( long cpu )
2005-04-17 02:20:36 +04:00
{
2006-02-01 14:05:50 +03:00
struct kmem_cache * cachep ;
2005-09-10 00:03:32 +04:00
struct kmem_list3 * l3 = NULL ;
int node = cpu_to_node ( cpu ) ;
2007-07-19 12:49:09 +04:00
const int memsize = sizeof ( struct kmem_list3 ) ;
2005-04-17 02:20:36 +04:00
2007-10-18 14:05:09 +04:00
/*
* We need to do this right in the beginning since
* alloc_arraycache ' s are going to use this list .
* kmalloc_node allows us to add the slab to the right
* kmem_list3 and not this cpu ' s kmem_list3
*/
list_for_each_entry ( cachep , & cache_chain , next ) {
2006-03-22 11:08:11 +03:00
/*
2007-10-18 14:05:09 +04:00
* Set up the size64 kmemlist for cpu before we can
* begin anything . Make sure some other cpu on this
* node has not already allocated this
2005-09-10 00:03:32 +04:00
*/
2007-10-18 14:05:09 +04:00
if ( ! cachep - > nodelists [ node ] ) {
l3 = kmalloc_node ( memsize , GFP_KERNEL , node ) ;
if ( ! l3 )
goto bad ;
kmem_list3_init ( l3 ) ;
l3 - > next_reap = jiffies + REAPTIMEOUT_LIST3 +
( ( unsigned long ) cachep ) % REAPTIMEOUT_LIST3 ;
2005-09-10 00:03:32 +04:00
2006-03-22 11:08:11 +03:00
/*
2007-10-18 14:05:09 +04:00
* The l3s don ' t come and go as CPUs come and
* go . cache_chain_mutex is sufficient
* protection here .
2005-09-10 00:03:32 +04:00
*/
2007-10-18 14:05:09 +04:00
cachep - > nodelists [ node ] = l3 ;
2005-09-10 00:03:32 +04:00
}
2007-10-18 14:05:09 +04:00
spin_lock_irq ( & cachep - > nodelists [ node ] - > list_lock ) ;
cachep - > nodelists [ node ] - > free_limit =
( 1 + nr_cpus_node ( node ) ) *
cachep - > batchcount + cachep - > num ;
spin_unlock_irq ( & cachep - > nodelists [ node ] - > list_lock ) ;
}
/*
* Now we can go ahead with allocating the shared arrays and
* array caches
*/
list_for_each_entry ( cachep , & cache_chain , next ) {
struct array_cache * nc ;
struct array_cache * shared = NULL ;
struct array_cache * * alien = NULL ;
nc = alloc_arraycache ( node , cachep - > limit ,
cachep - > batchcount ) ;
if ( ! nc )
goto bad ;
if ( cachep - > shared ) {
shared = alloc_arraycache ( node ,
cachep - > shared * cachep - > batchcount ,
0xbaadf00d ) ;
2007-10-18 14:05:11 +04:00
if ( ! shared ) {
kfree ( nc ) ;
2005-04-17 02:20:36 +04:00
goto bad ;
2007-10-18 14:05:11 +04:00
}
2007-10-18 14:05:09 +04:00
}
if ( use_alien_caches ) {
alien = alloc_alien_cache ( node , cachep - > limit ) ;
2007-10-18 14:05:11 +04:00
if ( ! alien ) {
kfree ( shared ) ;
kfree ( nc ) ;
2007-10-18 14:05:09 +04:00
goto bad ;
2007-10-18 14:05:11 +04:00
}
2007-10-18 14:05:09 +04:00
}
cachep - > array [ cpu ] = nc ;
l3 = cachep - > nodelists [ node ] ;
BUG_ON ( ! l3 ) ;
spin_lock_irq ( & l3 - > list_lock ) ;
if ( ! l3 - > shared ) {
/*
* We are serialised from CPU_DEAD or
* CPU_UP_CANCELLED by the cpucontrol lock
*/
l3 - > shared = shared ;
shared = NULL ;
}
[PATCH] NUMA slab locking fixes: fix cpu down and up locking
This fixes locking and bugs in cpu_down and cpu_up paths of the NUMA slab
allocator. Sonny Rao <sonny@burdell.org> reported problems sometime back on
POWER5 boxes, when the last cpu on the nodes were being offlined. We could
not reproduce the same on x86_64 because the cpumask (node_to_cpumask) was not
being updated on cpu down. Since that issue is now fixed, we can reproduce
Sonny's problems on x86_64 NUMA, and here is the fix.
The problem earlier was on CPU_DOWN, if it was the last cpu on the node to go
down, the array_caches (shared, alien) and the kmem_list3 of the node were
being freed (kfree) with the kmem_list3 lock held. If the l3 or the
array_caches were to come from the same cache being cleared, we hit on
badness.
This patch cleans up the locking in cpu_up and cpu_down path. We cannot
really free l3 on cpu down because, there is no node offlining yet and even
though a cpu is not yet up, node local memory can be allocated for it. So l3s
are usually allocated at keme_cache_create and destroyed at
kmem_cache_destroy. Hence, we don't need cachep->spinlock protection to get
to the cachep->nodelist[nodeid] either.
Patch survived onlining and offlining on a 4 core 2 node Tyan box with a 4
dbench process running all the time.
Signed-off-by: Alok N Kataria <alokk@calsoftinc.com>
Signed-off-by: Ravikiran Thirumalai <kiran@scalex86.org>
Cc: Christoph Lameter <christoph@lameter.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-02-05 10:27:59 +03:00
# ifdef CONFIG_NUMA
2007-10-18 14:05:09 +04:00
if ( ! l3 - > alien ) {
l3 - > alien = alien ;
alien = NULL ;
2005-04-17 02:20:36 +04:00
}
2007-10-18 14:05:09 +04:00
# endif
spin_unlock_irq ( & l3 - > list_lock ) ;
kfree ( shared ) ;
free_alien_cache ( alien ) ;
}
return 0 ;
bad :
2007-10-18 14:05:11 +04:00
cpuup_canceled ( cpu ) ;
2007-10-18 14:05:09 +04:00
return - ENOMEM ;
}
static int __cpuinit cpuup_callback ( struct notifier_block * nfb ,
unsigned long action , void * hcpu )
{
long cpu = ( long ) hcpu ;
int err = 0 ;
switch ( action ) {
case CPU_UP_PREPARE :
case CPU_UP_PREPARE_FROZEN :
2008-01-25 23:08:02 +03:00
mutex_lock ( & cache_chain_mutex ) ;
2007-10-18 14:05:09 +04:00
err = cpuup_prepare ( cpu ) ;
2008-01-25 23:08:02 +03:00
mutex_unlock ( & cache_chain_mutex ) ;
2005-04-17 02:20:36 +04:00
break ;
case CPU_ONLINE :
2007-05-09 13:35:10 +04:00
case CPU_ONLINE_FROZEN :
2005-04-17 02:20:36 +04:00
start_cpu_timer ( cpu ) ;
break ;
# ifdef CONFIG_HOTPLUG_CPU
2007-05-09 13:34:22 +04:00
case CPU_DOWN_PREPARE :
2007-05-09 13:35:10 +04:00
case CPU_DOWN_PREPARE_FROZEN :
2007-05-09 13:34:22 +04:00
/*
* Shutdown cache reaper . Note that the cache_chain_mutex is
* held so that if cache_reap ( ) is invoked it cannot do
* anything expensive but will only modify reap_work
* and reschedule the timer .
*/
cancel_rearming_delayed_work ( & per_cpu ( reap_work , cpu ) ) ;
/* Now the cache_reaper is guaranteed to be not running. */
per_cpu ( reap_work , cpu ) . work . func = NULL ;
break ;
case CPU_DOWN_FAILED :
2007-05-09 13:35:10 +04:00
case CPU_DOWN_FAILED_FROZEN :
2007-05-09 13:34:22 +04:00
start_cpu_timer ( cpu ) ;
break ;
2005-04-17 02:20:36 +04:00
case CPU_DEAD :
2007-05-09 13:35:10 +04:00
case CPU_DEAD_FROZEN :
[PATCH] NUMA slab locking fixes: fix cpu down and up locking
This fixes locking and bugs in cpu_down and cpu_up paths of the NUMA slab
allocator. Sonny Rao <sonny@burdell.org> reported problems sometime back on
POWER5 boxes, when the last cpu on the nodes were being offlined. We could
not reproduce the same on x86_64 because the cpumask (node_to_cpumask) was not
being updated on cpu down. Since that issue is now fixed, we can reproduce
Sonny's problems on x86_64 NUMA, and here is the fix.
The problem earlier was on CPU_DOWN, if it was the last cpu on the node to go
down, the array_caches (shared, alien) and the kmem_list3 of the node were
being freed (kfree) with the kmem_list3 lock held. If the l3 or the
array_caches were to come from the same cache being cleared, we hit on
badness.
This patch cleans up the locking in cpu_up and cpu_down path. We cannot
really free l3 on cpu down because, there is no node offlining yet and even
though a cpu is not yet up, node local memory can be allocated for it. So l3s
are usually allocated at keme_cache_create and destroyed at
kmem_cache_destroy. Hence, we don't need cachep->spinlock protection to get
to the cachep->nodelist[nodeid] either.
Patch survived onlining and offlining on a 4 core 2 node Tyan box with a 4
dbench process running all the time.
Signed-off-by: Alok N Kataria <alokk@calsoftinc.com>
Signed-off-by: Ravikiran Thirumalai <kiran@scalex86.org>
Cc: Christoph Lameter <christoph@lameter.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-02-05 10:27:59 +03:00
/*
* Even if all the cpus of a node are down , we don ' t free the
* kmem_list3 of any cache . This to avoid a race between
* cpu_down , and a kmalloc allocation from another cpu for
* memory from the node of the cpu going down . The list3
* structure is usually allocated from kmem_cache_create ( ) and
* gets destroyed at kmem_cache_destroy ( ) .
*/
2007-10-20 03:27:18 +04:00
/* fall through */
[PATCH] mm: slab: eliminate lock_cpu_hotplug from slab
Here's an attempt towards doing away with lock_cpu_hotplug in the slab
subsystem. This approach also fixes a bug which shows up when cpus are
being offlined/onlined and slab caches are being tuned simultaneously.
http://marc.theaimsgroup.com/?l=linux-kernel&m=116098888100481&w=2
The patch has been stress tested overnight on a 2 socket 4 core AMD box with
repeated cpu online and offline, while dbench and kernbench process are
running, and slab caches being tuned at the same time.
There were no lockdep warnings either. (This test on 2,6.18 as 2.6.19-rc
crashes at __drain_pages
http://marc.theaimsgroup.com/?l=linux-kernel&m=116172164217678&w=2 )
The approach here is to hold cache_chain_mutex from CPU_UP_PREPARE until
CPU_ONLINE (similar in approach as worqueue_mutex) . Slab code sensitive
to cpu_online_map (kmem_cache_create, kmem_cache_destroy, slabinfo_write,
__cache_shrink) is already serialized with cache_chain_mutex. (This patch
lengthens cache_chain_mutex hold time at kmem_cache_destroy to cover this).
This patch also takes the cache_chain_sem at kmem_cache_shrink to protect
sanity of cpu_online_map at __cache_shrink, as viewed by slab.
(kmem_cache_shrink->__cache_shrink->drain_cpu_caches). But, really,
kmem_cache_shrink is used at just one place in the acpi subsystem! Do we
really need to keep kmem_cache_shrink at all?
Another note. Looks like a cpu hotplug event can send CPU_UP_CANCELED to
a registered subsystem even if the subsystem did not receive CPU_UP_PREPARE.
This could be due to a subsystem registered for notification earlier than
the current subsystem crapping out with NOTIFY_BAD. Badness can occur with
in the CPU_UP_CANCELED code path at slab if this happens (The same would
apply for workqueue.c as well). To overcome this, we might have to use either
a) a per subsystem flag and avoid handling of CPU_UP_CANCELED, or
b) Use a special notifier events like LOCK_ACQUIRE/RELEASE as Gautham was
using in his experiments, or
c) Do not send CPU_UP_CANCELED to a subsystem which did not receive
CPU_UP_PREPARE.
I would prefer c).
Signed-off-by: Ravikiran Thirumalai <kiran@scalex86.org>
Signed-off-by: Shai Fultheim <shai@scalex86.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-07 07:32:14 +03:00
# endif
2005-04-17 02:20:36 +04:00
case CPU_UP_CANCELED :
2007-05-09 13:35:10 +04:00
case CPU_UP_CANCELED_FROZEN :
2008-01-25 23:08:02 +03:00
mutex_lock ( & cache_chain_mutex ) ;
2007-10-18 14:05:09 +04:00
cpuup_canceled ( cpu ) ;
2006-01-19 04:42:33 +03:00
mutex_unlock ( & cache_chain_mutex ) ;
2005-04-17 02:20:36 +04:00
break ;
}
2007-10-18 14:05:09 +04:00
return err ? NOTIFY_BAD : NOTIFY_OK ;
2005-04-17 02:20:36 +04:00
}
2006-06-27 13:54:09 +04:00
static struct notifier_block __cpuinitdata cpucache_notifier = {
& cpuup_callback , NULL , 0
} ;
2005-04-17 02:20:36 +04:00
2005-09-10 00:03:32 +04:00
/*
* swap the static kmem_list3 with kmalloced memory
*/
2006-03-22 11:08:11 +03:00
static void init_list ( struct kmem_cache * cachep , struct kmem_list3 * list ,
int nodeid )
2005-09-10 00:03:32 +04:00
{
struct kmem_list3 * ptr ;
ptr = kmalloc_node ( sizeof ( struct kmem_list3 ) , GFP_KERNEL , nodeid ) ;
BUG_ON ( ! ptr ) ;
local_irq_disable ( ) ;
memcpy ( ptr , list , sizeof ( struct kmem_list3 ) ) ;
2006-07-03 11:25:28 +04:00
/*
* Do not assume that spinlocks can be initialized via memcpy :
*/
spin_lock_init ( & ptr - > list_lock ) ;
2005-09-10 00:03:32 +04:00
MAKE_ALL_LISTS ( cachep , ptr , nodeid ) ;
cachep - > nodelists [ nodeid ] = ptr ;
local_irq_enable ( ) ;
}
2008-01-25 09:20:51 +03:00
/*
* For setting up all the kmem_list3s for cache whose buffer_size is same as
* size of kmem_list3 .
*/
static void __init set_up_list3s ( struct kmem_cache * cachep , int index )
{
int node ;
for_each_online_node ( node ) {
cachep - > nodelists [ node ] = & initkmem_list3 [ index + node ] ;
cachep - > nodelists [ node ] - > next_reap = jiffies +
REAPTIMEOUT_LIST3 +
( ( unsigned long ) cachep ) % REAPTIMEOUT_LIST3 ;
}
}
2006-03-22 11:08:11 +03:00
/*
* Initialisation . Called after the page allocator have been initialised and
* before smp_init ( ) .
2005-04-17 02:20:36 +04:00
*/
void __init kmem_cache_init ( void )
{
size_t left_over ;
struct cache_sizes * sizes ;
struct cache_names * names ;
2005-09-10 00:03:32 +04:00
int i ;
2006-03-08 08:55:46 +03:00
int order ;
2006-10-06 11:43:52 +04:00
int node ;
2005-09-10 00:03:32 +04:00
2007-08-23 01:01:49 +04:00
if ( num_possible_nodes ( ) = = 1 ) {
2007-05-02 21:27:18 +04:00
use_alien_caches = 0 ;
2007-08-23 01:01:49 +04:00
numa_platform = 0 ;
}
2007-05-02 21:27:18 +04:00
2005-09-10 00:03:32 +04:00
for ( i = 0 ; i < NUM_INIT_LISTS ; i + + ) {
kmem_list3_init ( & initkmem_list3 [ i ] ) ;
if ( i < MAX_NUMNODES )
cache_cache . nodelists [ i ] = NULL ;
}
2008-01-25 09:20:51 +03:00
set_up_list3s ( & cache_cache , CACHE_CACHE ) ;
2005-04-17 02:20:36 +04:00
/*
* Fragmentation resistance on low memory - only use bigger
* page orders on machines with more than 32 MB of memory .
*/
if ( num_physpages > ( 32 < < 20 ) > > PAGE_SHIFT )
slab_break_gfp_order = BREAK_GFP_ORDER_HI ;
/* Bootstrap is tricky, because several objects are allocated
* from caches that do not exist yet :
2006-03-22 11:08:11 +03:00
* 1 ) initialize the cache_cache cache : it contains the struct
* kmem_cache structures of all caches , except cache_cache itself :
* cache_cache is statically allocated .
2005-09-10 00:03:32 +04:00
* Initially an __init data area is used for the head array and the
* kmem_list3 structures , it ' s replaced with a kmalloc allocated
* array at the end of the bootstrap .
2005-04-17 02:20:36 +04:00
* 2 ) Create the first kmalloc cache .
2006-02-01 14:05:50 +03:00
* The struct kmem_cache for the new cache is allocated normally .
2005-09-10 00:03:32 +04:00
* An __init data area is used for the head array .
* 3 ) Create the remaining kmalloc caches , with minimally sized
* head arrays .
2005-04-17 02:20:36 +04:00
* 4 ) Replace the __init data head arrays for cache_cache and the first
* kmalloc cache with kmalloc allocated arrays .
2005-09-10 00:03:32 +04:00
* 5 ) Replace the __init data for kmem_list3 for cache_cache and
* the other cache ' s with kmalloc allocated memory .
* 6 ) Resize the head arrays of the kmalloc caches to their final sizes .
2005-04-17 02:20:36 +04:00
*/
2006-10-06 11:43:52 +04:00
node = numa_node_id ( ) ;
2005-04-17 02:20:36 +04:00
/* 1) create the cache_cache */
INIT_LIST_HEAD ( & cache_chain ) ;
list_add ( & cache_cache . next , & cache_chain ) ;
cache_cache . colour_off = cache_line_size ( ) ;
cache_cache . array [ smp_processor_id ( ) ] = & initarray_cache . cache ;
2008-03-26 00:59:08 +03:00
cache_cache . nodelists [ node ] = & initkmem_list3 [ CACHE_CACHE + node ] ;
2005-04-17 02:20:36 +04:00
2007-05-07 01:49:29 +04:00
/*
* struct kmem_cache size depends on nr_node_ids , which
* can be less than MAX_NUMNODES .
*/
cache_cache . buffer_size = offsetof ( struct kmem_cache , nodelists ) +
nr_node_ids * sizeof ( struct kmem_list3 * ) ;
# if DEBUG
cache_cache . obj_size = cache_cache . buffer_size ;
# endif
2006-03-22 11:08:11 +03:00
cache_cache . buffer_size = ALIGN ( cache_cache . buffer_size ,
cache_line_size ( ) ) ;
2006-12-13 11:34:27 +03:00
cache_cache . reciprocal_buffer_size =
reciprocal_value ( cache_cache . buffer_size ) ;
2005-04-17 02:20:36 +04:00
2006-03-08 08:55:46 +03:00
for ( order = 0 ; order < MAX_ORDER ; order + + ) {
cache_estimate ( order , cache_cache . buffer_size ,
cache_line_size ( ) , 0 , & left_over , & cache_cache . num ) ;
if ( cache_cache . num )
break ;
}
2006-04-02 15:49:25 +04:00
BUG_ON ( ! cache_cache . num ) ;
2006-03-08 08:55:46 +03:00
cache_cache . gfporder = order ;
2006-01-08 12:00:37 +03:00
cache_cache . colour = left_over / cache_cache . colour_off ;
cache_cache . slab_size = ALIGN ( cache_cache . num * sizeof ( kmem_bufctl_t ) +
sizeof ( struct slab ) , cache_line_size ( ) ) ;
2005-04-17 02:20:36 +04:00
/* 2+3) create the kmalloc caches */
sizes = malloc_sizes ;
names = cache_names ;
2006-03-22 11:08:11 +03:00
/*
* Initialize the caches that provide memory for the array cache and the
* kmem_list3 structures first . Without this , further allocations will
* bug .
2005-09-10 00:03:32 +04:00
*/
sizes [ INDEX_AC ] . cs_cachep = kmem_cache_create ( names [ INDEX_AC ] . name ,
2006-03-22 11:08:11 +03:00
sizes [ INDEX_AC ] . cs_size ,
ARCH_KMALLOC_MINALIGN ,
ARCH_KMALLOC_FLAGS | SLAB_PANIC ,
2007-07-20 05:11:58 +04:00
NULL ) ;
2005-09-10 00:03:32 +04:00
2006-03-22 11:08:11 +03:00
if ( INDEX_AC ! = INDEX_L3 ) {
2005-09-10 00:03:32 +04:00
sizes [ INDEX_L3 ] . cs_cachep =
2006-03-22 11:08:11 +03:00
kmem_cache_create ( names [ INDEX_L3 ] . name ,
sizes [ INDEX_L3 ] . cs_size ,
ARCH_KMALLOC_MINALIGN ,
ARCH_KMALLOC_FLAGS | SLAB_PANIC ,
2007-07-20 05:11:58 +04:00
NULL ) ;
2006-03-22 11:08:11 +03:00
}
2005-09-10 00:03:32 +04:00
2006-06-23 13:03:46 +04:00
slab_early_init = 0 ;
2005-04-17 02:20:36 +04:00
while ( sizes - > cs_size ! = ULONG_MAX ) {
2005-09-10 00:03:32 +04:00
/*
* For performance , all the general caches are L1 aligned .
2005-04-17 02:20:36 +04:00
* This should be particularly beneficial on SMP boxes , as it
* eliminates " false sharing " .
* Note for systems short on memory removing the alignment will
2005-09-10 00:03:32 +04:00
* allow tighter packing of the smaller caches .
*/
2006-03-22 11:08:11 +03:00
if ( ! sizes - > cs_cachep ) {
2005-09-10 00:03:32 +04:00
sizes - > cs_cachep = kmem_cache_create ( names - > name ,
2006-03-22 11:08:11 +03:00
sizes - > cs_size ,
ARCH_KMALLOC_MINALIGN ,
ARCH_KMALLOC_FLAGS | SLAB_PANIC ,
2007-07-20 05:11:58 +04:00
NULL ) ;
2006-03-22 11:08:11 +03:00
}
2007-02-10 12:43:10 +03:00
# ifdef CONFIG_ZONE_DMA
sizes - > cs_dmacachep = kmem_cache_create (
names - > name_dma ,
2006-03-22 11:08:11 +03:00
sizes - > cs_size ,
ARCH_KMALLOC_MINALIGN ,
ARCH_KMALLOC_FLAGS | SLAB_CACHE_DMA |
SLAB_PANIC ,
2007-07-20 05:11:58 +04:00
NULL ) ;
2007-02-10 12:43:10 +03:00
# endif
2005-04-17 02:20:36 +04:00
sizes + + ;
names + + ;
}
/* 4) Replace the bootstrap head arrays */
{
2006-07-03 11:25:28 +04:00
struct array_cache * ptr ;
2005-09-10 00:03:32 +04:00
2005-04-17 02:20:36 +04:00
ptr = kmalloc ( sizeof ( struct arraycache_init ) , GFP_KERNEL ) ;
2005-09-10 00:03:32 +04:00
2005-04-17 02:20:36 +04:00
local_irq_disable ( ) ;
2006-02-01 14:05:49 +03:00
BUG_ON ( cpu_cache_get ( & cache_cache ) ! = & initarray_cache . cache ) ;
memcpy ( ptr , cpu_cache_get ( & cache_cache ) ,
2006-01-08 12:00:37 +03:00
sizeof ( struct arraycache_init ) ) ;
2006-07-03 11:25:28 +04:00
/*
* Do not assume that spinlocks can be initialized via memcpy :
*/
spin_lock_init ( & ptr - > lock ) ;
2005-04-17 02:20:36 +04:00
cache_cache . array [ smp_processor_id ( ) ] = ptr ;
local_irq_enable ( ) ;
2005-09-10 00:03:32 +04:00
2005-04-17 02:20:36 +04:00
ptr = kmalloc ( sizeof ( struct arraycache_init ) , GFP_KERNEL ) ;
2005-09-10 00:03:32 +04:00
2005-04-17 02:20:36 +04:00
local_irq_disable ( ) ;
2006-02-01 14:05:49 +03:00
BUG_ON ( cpu_cache_get ( malloc_sizes [ INDEX_AC ] . cs_cachep )
2006-01-08 12:00:37 +03:00
! = & initarray_generic . cache ) ;
2006-02-01 14:05:49 +03:00
memcpy ( ptr , cpu_cache_get ( malloc_sizes [ INDEX_AC ] . cs_cachep ) ,
2006-01-08 12:00:37 +03:00
sizeof ( struct arraycache_init ) ) ;
2006-07-03 11:25:28 +04:00
/*
* Do not assume that spinlocks can be initialized via memcpy :
*/
spin_lock_init ( & ptr - > lock ) ;
2005-09-10 00:03:32 +04:00
malloc_sizes [ INDEX_AC ] . cs_cachep - > array [ smp_processor_id ( ) ] =
2006-01-08 12:00:37 +03:00
ptr ;
2005-04-17 02:20:36 +04:00
local_irq_enable ( ) ;
}
2005-09-10 00:03:32 +04:00
/* 5) Replace the bootstrap kmem_list3's */
{
2006-10-06 11:43:52 +04:00
int nid ;
2008-01-24 16:49:54 +03:00
for_each_online_node ( nid ) {
2008-03-26 00:59:08 +03:00
init_list ( & cache_cache , & initkmem_list3 [ CACHE_CACHE + nid ] , nid ) ;
2008-01-25 09:20:51 +03:00
2005-09-10 00:03:32 +04:00
init_list ( malloc_sizes [ INDEX_AC ] . cs_cachep ,
2006-10-06 11:43:52 +04:00
& initkmem_list3 [ SIZE_AC + nid ] , nid ) ;
2005-09-10 00:03:32 +04:00
if ( INDEX_AC ! = INDEX_L3 ) {
init_list ( malloc_sizes [ INDEX_L3 ] . cs_cachep ,
2006-10-06 11:43:52 +04:00
& initkmem_list3 [ SIZE_L3 + nid ] , nid ) ;
2005-09-10 00:03:32 +04:00
}
}
}
2005-04-17 02:20:36 +04:00
2005-09-10 00:03:32 +04:00
/* 6) resize the head arrays to their final sizes */
2005-04-17 02:20:36 +04:00
{
2006-02-01 14:05:50 +03:00
struct kmem_cache * cachep ;
2006-01-19 04:42:33 +03:00
mutex_lock ( & cache_chain_mutex ) ;
2005-04-17 02:20:36 +04:00
list_for_each_entry ( cachep , & cache_chain , next )
2006-09-26 10:31:38 +04:00
if ( enable_cpucache ( cachep ) )
BUG ( ) ;
2006-01-19 04:42:33 +03:00
mutex_unlock ( & cache_chain_mutex ) ;
2005-04-17 02:20:36 +04:00
}
2006-09-26 10:31:38 +04:00
/* Annotate slab for lockdep -- annotate the malloc caches */
init_lock_keys ( ) ;
2005-04-17 02:20:36 +04:00
/* Done! */
g_cpucache_up = FULL ;
2006-03-22 11:08:11 +03:00
/*
* Register a cpu startup notifier callback that initializes
* cpu_cache_get for all new cpus
2005-04-17 02:20:36 +04:00
*/
register_cpu_notifier ( & cpucache_notifier ) ;
2006-03-22 11:08:11 +03:00
/*
* The reap timers are started later , with a module init call : That part
* of the kernel is not yet operational .
2005-04-17 02:20:36 +04:00
*/
}
static int __init cpucache_init ( void )
{
int cpu ;
2006-03-22 11:08:11 +03:00
/*
* Register the timers that return unneeded pages to the page allocator
2005-04-17 02:20:36 +04:00
*/
2005-09-10 00:03:32 +04:00
for_each_online_cpu ( cpu )
2006-03-22 11:08:11 +03:00
start_cpu_timer ( cpu ) ;
2005-04-17 02:20:36 +04:00
return 0 ;
}
__initcall ( cpucache_init ) ;
/*
* Interface to system ' s page allocator . No need to hold the cache - lock .
*
* If we requested dmaable memory , we will get it . Even if we
* did not request dmaable memory , we might get it , but that
* would be relatively rare and ignorable .
*/
2006-02-01 14:05:50 +03:00
static void * kmem_getpages ( struct kmem_cache * cachep , gfp_t flags , int nodeid )
2005-04-17 02:20:36 +04:00
{
struct page * page ;
2006-06-23 13:03:17 +04:00
int nr_pages ;
2005-04-17 02:20:36 +04:00
int i ;
2006-04-11 09:52:56 +04:00
# ifndef CONFIG_MMU
2006-06-23 13:03:17 +04:00
/*
* Nommu uses slab ' s for process anonymous memory allocations , and thus
* requires __GFP_COMP to properly refcount higher order allocations
2006-04-11 09:52:56 +04:00
*/
2006-06-23 13:03:17 +04:00
flags | = __GFP_COMP ;
2006-04-11 09:52:56 +04:00
# endif
2006-09-27 12:50:08 +04:00
2006-12-07 07:33:29 +03:00
flags | = cachep - > gfpflags ;
2007-10-16 12:25:52 +04:00
if ( cachep - > flags & SLAB_RECLAIM_ACCOUNT )
flags | = __GFP_RECLAIMABLE ;
2006-06-23 13:03:17 +04:00
page = alloc_pages_node ( nodeid , flags , cachep - > gfporder ) ;
2005-04-17 02:20:36 +04:00
if ( ! page )
return NULL ;
2006-06-23 13:03:17 +04:00
nr_pages = ( 1 < < cachep - > gfporder ) ;
2005-04-17 02:20:36 +04:00
if ( cachep - > flags & SLAB_RECLAIM_ACCOUNT )
2006-09-26 10:31:51 +04:00
add_zone_page_state ( page_zone ( page ) ,
NR_SLAB_RECLAIMABLE , nr_pages ) ;
else
add_zone_page_state ( page_zone ( page ) ,
NR_SLAB_UNRECLAIMABLE , nr_pages ) ;
2006-06-23 13:03:17 +04:00
for ( i = 0 ; i < nr_pages ; i + + )
__SetPageSlab ( page + i ) ;
return page_address ( page ) ;
2005-04-17 02:20:36 +04:00
}
/*
* Interface to system ' s page release .
*/
2006-02-01 14:05:50 +03:00
static void kmem_freepages ( struct kmem_cache * cachep , void * addr )
2005-04-17 02:20:36 +04:00
{
2006-01-08 12:00:37 +03:00
unsigned long i = ( 1 < < cachep - > gfporder ) ;
2005-04-17 02:20:36 +04:00
struct page * page = virt_to_page ( addr ) ;
const unsigned long nr_freed = i ;
2006-09-26 10:31:51 +04:00
if ( cachep - > flags & SLAB_RECLAIM_ACCOUNT )
sub_zone_page_state ( page_zone ( page ) ,
NR_SLAB_RECLAIMABLE , nr_freed ) ;
else
sub_zone_page_state ( page_zone ( page ) ,
NR_SLAB_UNRECLAIMABLE , nr_freed ) ;
2005-04-17 02:20:36 +04:00
while ( i - - ) {
2006-03-22 11:08:02 +03:00
BUG_ON ( ! PageSlab ( page ) ) ;
__ClearPageSlab ( page ) ;
2005-04-17 02:20:36 +04:00
page + + ;
}
if ( current - > reclaim_state )
current - > reclaim_state - > reclaimed_slab + = nr_freed ;
free_pages ( ( unsigned long ) addr , cachep - > gfporder ) ;
}
static void kmem_rcu_free ( struct rcu_head * head )
{
2006-01-08 12:00:37 +03:00
struct slab_rcu * slab_rcu = ( struct slab_rcu * ) head ;
2006-02-01 14:05:50 +03:00
struct kmem_cache * cachep = slab_rcu - > cachep ;
2005-04-17 02:20:36 +04:00
kmem_freepages ( cachep , slab_rcu - > addr ) ;
if ( OFF_SLAB ( cachep ) )
kmem_cache_free ( cachep - > slabp_cache , slab_rcu ) ;
}
# if DEBUG
# ifdef CONFIG_DEBUG_PAGEALLOC
2006-02-01 14:05:50 +03:00
static void store_stackinfo ( struct kmem_cache * cachep , unsigned long * addr ,
2006-01-08 12:00:37 +03:00
unsigned long caller )
2005-04-17 02:20:36 +04:00
{
2006-02-01 14:05:42 +03:00
int size = obj_size ( cachep ) ;
2005-04-17 02:20:36 +04:00
2006-02-01 14:05:42 +03:00
addr = ( unsigned long * ) & ( ( char * ) addr ) [ obj_offset ( cachep ) ] ;
2005-04-17 02:20:36 +04:00
2006-01-08 12:00:37 +03:00
if ( size < 5 * sizeof ( unsigned long ) )
2005-04-17 02:20:36 +04:00
return ;
2006-01-08 12:00:37 +03:00
* addr + + = 0x12345678 ;
* addr + + = caller ;
* addr + + = smp_processor_id ( ) ;
size - = 3 * sizeof ( unsigned long ) ;
2005-04-17 02:20:36 +04:00
{
unsigned long * sptr = & caller ;
unsigned long svalue ;
while ( ! kstack_end ( sptr ) ) {
svalue = * sptr + + ;
if ( kernel_text_address ( svalue ) ) {
2006-01-08 12:00:37 +03:00
* addr + + = svalue ;
2005-04-17 02:20:36 +04:00
size - = sizeof ( unsigned long ) ;
if ( size < = sizeof ( unsigned long ) )
break ;
}
}
}
2006-01-08 12:00:37 +03:00
* addr + + = 0x87654321 ;
2005-04-17 02:20:36 +04:00
}
# endif
2006-02-01 14:05:50 +03:00
static void poison_obj ( struct kmem_cache * cachep , void * addr , unsigned char val )
2005-04-17 02:20:36 +04:00
{
2006-02-01 14:05:42 +03:00
int size = obj_size ( cachep ) ;
addr = & ( ( char * ) addr ) [ obj_offset ( cachep ) ] ;
2005-04-17 02:20:36 +04:00
memset ( addr , val , size ) ;
2006-01-08 12:00:37 +03:00
* ( unsigned char * ) ( addr + size - 1 ) = POISON_END ;
2005-04-17 02:20:36 +04:00
}
static void dump_line ( char * data , int offset , int limit )
{
int i ;
2006-09-29 12:59:51 +04:00
unsigned char error = 0 ;
int bad_count = 0 ;
2005-04-17 02:20:36 +04:00
printk ( KERN_ERR " %03x: " , offset ) ;
2006-09-29 12:59:51 +04:00
for ( i = 0 ; i < limit ; i + + ) {
if ( data [ offset + i ] ! = POISON_FREE ) {
error = data [ offset + i ] ;
bad_count + + ;
}
2006-01-08 12:00:37 +03:00
printk ( " %02x " , ( unsigned char ) data [ offset + i ] ) ;
2006-09-29 12:59:51 +04:00
}
2005-04-17 02:20:36 +04:00
printk ( " \n " ) ;
2006-09-29 12:59:51 +04:00
if ( bad_count = = 1 ) {
error ^ = POISON_FREE ;
if ( ! ( error & ( error - 1 ) ) ) {
printk ( KERN_ERR " Single bit error detected. Probably "
" bad RAM. \n " ) ;
# ifdef CONFIG_X86
printk ( KERN_ERR " Run memtest86+ or a similar memory "
" test tool. \n " ) ;
# else
printk ( KERN_ERR " Run a memory test tool. \n " ) ;
# endif
}
}
2005-04-17 02:20:36 +04:00
}
# endif
# if DEBUG
2006-02-01 14:05:50 +03:00
static void print_objinfo ( struct kmem_cache * cachep , void * objp , int lines )
2005-04-17 02:20:36 +04:00
{
int i , size ;
char * realobj ;
if ( cachep - > flags & SLAB_RED_ZONE ) {
Increase slab redzone to 64bits
There are two problems with the existing redzone implementation.
Firstly, it's causing misalignment of structures which contain a 64-bit
integer, such as netfilter's 'struct ipt_entry' -- causing netfilter
modules to fail to load because of the misalignment. (In particular, the
first check in
net/ipv4/netfilter/ip_tables.c::check_entry_size_and_hooks())
On ppc32 and sparc32, amongst others, __alignof__(uint64_t) == 8.
With slab debugging, we use 32-bit redzones. And allocated slab objects
aren't sufficiently aligned to hold a structure containing a uint64_t.
By _just_ setting ARCH_KMALLOC_MINALIGN to __alignof__(u64) we'd disable
redzone checks on those architectures. By using 64-bit redzones we avoid that
loss of debugging, and also fix the other problem while we're at it.
When investigating this, I noticed that on 64-bit platforms we're using a
32-bit value of RED_ACTIVE/RED_INACTIVE in the 64-bit memory location set
aside for the redzone. Which means that the four bytes immediately before
or after the allocated object at 0x00,0x00,0x00,0x00 for LE and BE
machines, respectively. Which is probably not the most useful choice of
poison value.
One way to fix both of those at once is just to switch to 64-bit
redzones in all cases.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Acked-by: Pekka Enberg <penberg@cs.helsinki.fi>
Cc: Christoph Lameter <clameter@engr.sgi.com>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-05-08 11:22:59 +04:00
printk ( KERN_ERR " Redzone: 0x%llx/0x%llx. \n " ,
2006-03-22 11:08:11 +03:00
* dbg_redzone1 ( cachep , objp ) ,
* dbg_redzone2 ( cachep , objp ) ) ;
2005-04-17 02:20:36 +04:00
}
if ( cachep - > flags & SLAB_STORE_USER ) {
printk ( KERN_ERR " Last user: [<%p>] " ,
2006-03-22 11:08:11 +03:00
* dbg_userword ( cachep , objp ) ) ;
2005-04-17 02:20:36 +04:00
print_symbol ( " (%s) " ,
2006-03-22 11:08:11 +03:00
( unsigned long ) * dbg_userword ( cachep , objp ) ) ;
2005-04-17 02:20:36 +04:00
printk ( " \n " ) ;
}
2006-02-01 14:05:42 +03:00
realobj = ( char * ) objp + obj_offset ( cachep ) ;
size = obj_size ( cachep ) ;
2006-01-08 12:00:37 +03:00
for ( i = 0 ; i < size & & lines ; i + = 16 , lines - - ) {
2005-04-17 02:20:36 +04:00
int limit ;
limit = 16 ;
2006-01-08 12:00:37 +03:00
if ( i + limit > size )
limit = size - i ;
2005-04-17 02:20:36 +04:00
dump_line ( realobj , i , limit ) ;
}
}
2006-02-01 14:05:50 +03:00
static void check_poison_obj ( struct kmem_cache * cachep , void * objp )
2005-04-17 02:20:36 +04:00
{
char * realobj ;
int size , i ;
int lines = 0 ;
2006-02-01 14:05:42 +03:00
realobj = ( char * ) objp + obj_offset ( cachep ) ;
size = obj_size ( cachep ) ;
2005-04-17 02:20:36 +04:00
2006-01-08 12:00:37 +03:00
for ( i = 0 ; i < size ; i + + ) {
2005-04-17 02:20:36 +04:00
char exp = POISON_FREE ;
2006-01-08 12:00:37 +03:00
if ( i = = size - 1 )
2005-04-17 02:20:36 +04:00
exp = POISON_END ;
if ( realobj [ i ] ! = exp ) {
int limit ;
/* Mismatch ! */
/* Print header */
if ( lines = = 0 ) {
2006-01-08 12:00:37 +03:00
printk ( KERN_ERR
2007-04-03 02:46:28 +04:00
" Slab corruption: %s start=%p, len=%d \n " ,
cachep - > name , realobj , size ) ;
2005-04-17 02:20:36 +04:00
print_objinfo ( cachep , objp , 0 ) ;
}
/* Hexdump the affected line */
2006-01-08 12:00:37 +03:00
i = ( i / 16 ) * 16 ;
2005-04-17 02:20:36 +04:00
limit = 16 ;
2006-01-08 12:00:37 +03:00
if ( i + limit > size )
limit = size - i ;
2005-04-17 02:20:36 +04:00
dump_line ( realobj , i , limit ) ;
i + = 16 ;
lines + + ;
/* Limit to 5 lines */
if ( lines > 5 )
break ;
}
}
if ( lines ! = 0 ) {
/* Print some data about the neighboring objects, if they
* exist :
*/
2006-02-01 14:05:49 +03:00
struct slab * slabp = virt_to_slab ( objp ) ;
2006-03-22 11:08:10 +03:00
unsigned int objnr ;
2005-04-17 02:20:36 +04:00
2006-03-22 11:08:10 +03:00
objnr = obj_to_index ( cachep , slabp , objp ) ;
2005-04-17 02:20:36 +04:00
if ( objnr ) {
2006-03-22 11:08:10 +03:00
objp = index_to_obj ( cachep , slabp , objnr - 1 ) ;
2006-02-01 14:05:42 +03:00
realobj = ( char * ) objp + obj_offset ( cachep ) ;
2005-04-17 02:20:36 +04:00
printk ( KERN_ERR " Prev obj: start=%p, len=%d \n " ,
2006-01-08 12:00:37 +03:00
realobj , size ) ;
2005-04-17 02:20:36 +04:00
print_objinfo ( cachep , objp , 2 ) ;
}
2006-01-08 12:00:37 +03:00
if ( objnr + 1 < cachep - > num ) {
2006-03-22 11:08:10 +03:00
objp = index_to_obj ( cachep , slabp , objnr + 1 ) ;
2006-02-01 14:05:42 +03:00
realobj = ( char * ) objp + obj_offset ( cachep ) ;
2005-04-17 02:20:36 +04:00
printk ( KERN_ERR " Next obj: start=%p, len=%d \n " ,
2006-01-08 12:00:37 +03:00
realobj , size ) ;
2005-04-17 02:20:36 +04:00
print_objinfo ( cachep , objp , 2 ) ;
}
}
}
# endif
2006-02-01 14:05:46 +03:00
# if DEBUG
/**
2006-03-22 11:08:14 +03:00
* slab_destroy_objs - destroy a slab and its objects
* @ cachep : cache pointer being destroyed
* @ slabp : slab pointer being destroyed
*
* Call the registered destructor for each object in a slab that is being
* destroyed .
2005-04-17 02:20:36 +04:00
*/
2006-02-01 14:05:50 +03:00
static void slab_destroy_objs ( struct kmem_cache * cachep , struct slab * slabp )
2005-04-17 02:20:36 +04:00
{
int i ;
for ( i = 0 ; i < cachep - > num ; i + + ) {
2006-03-22 11:08:10 +03:00
void * objp = index_to_obj ( cachep , slabp , i ) ;
2005-04-17 02:20:36 +04:00
if ( cachep - > flags & SLAB_POISON ) {
# ifdef CONFIG_DEBUG_PAGEALLOC
2006-03-22 11:08:11 +03:00
if ( cachep - > buffer_size % PAGE_SIZE = = 0 & &
OFF_SLAB ( cachep ) )
2006-01-08 12:00:37 +03:00
kernel_map_pages ( virt_to_page ( objp ) ,
2006-03-22 11:08:11 +03:00
cachep - > buffer_size / PAGE_SIZE , 1 ) ;
2005-04-17 02:20:36 +04:00
else
check_poison_obj ( cachep , objp ) ;
# else
check_poison_obj ( cachep , objp ) ;
# endif
}
if ( cachep - > flags & SLAB_RED_ZONE ) {
if ( * dbg_redzone1 ( cachep , objp ) ! = RED_INACTIVE )
slab_error ( cachep , " start of a freed object "
2006-01-08 12:00:37 +03:00
" was overwritten " ) ;
2005-04-17 02:20:36 +04:00
if ( * dbg_redzone2 ( cachep , objp ) ! = RED_INACTIVE )
slab_error ( cachep , " end of a freed object "
2006-01-08 12:00:37 +03:00
" was overwritten " ) ;
2005-04-17 02:20:36 +04:00
}
}
2006-02-01 14:05:46 +03:00
}
2005-04-17 02:20:36 +04:00
# else
2006-02-01 14:05:50 +03:00
static void slab_destroy_objs ( struct kmem_cache * cachep , struct slab * slabp )
2006-02-01 14:05:46 +03:00
{
}
2005-04-17 02:20:36 +04:00
# endif
2006-03-22 11:08:14 +03:00
/**
* slab_destroy - destroy and release all objects in a slab
* @ cachep : cache pointer being destroyed
* @ slabp : slab pointer being destroyed
*
2006-02-01 14:05:46 +03:00
* Destroy all the objs in a slab , and release the mem back to the system .
2006-03-22 11:08:11 +03:00
* Before calling the slab must have been unlinked from the cache . The
* cache - lock is not held / needed .
2006-02-01 14:05:46 +03:00
*/
2006-02-01 14:05:50 +03:00
static void slab_destroy ( struct kmem_cache * cachep , struct slab * slabp )
2006-02-01 14:05:46 +03:00
{
void * addr = slabp - > s_mem - slabp - > colouroff ;
slab_destroy_objs ( cachep , slabp ) ;
2005-04-17 02:20:36 +04:00
if ( unlikely ( cachep - > flags & SLAB_DESTROY_BY_RCU ) ) {
struct slab_rcu * slab_rcu ;
2006-01-08 12:00:37 +03:00
slab_rcu = ( struct slab_rcu * ) slabp ;
2005-04-17 02:20:36 +04:00
slab_rcu - > cachep = cachep ;
slab_rcu - > addr = addr ;
call_rcu ( & slab_rcu - > head , kmem_rcu_free ) ;
} else {
kmem_freepages ( cachep , addr ) ;
2006-07-13 16:44:38 +04:00
if ( OFF_SLAB ( cachep ) )
kmem_cache_free ( cachep - > slabp_cache , slabp ) ;
2005-04-17 02:20:36 +04:00
}
}
2006-09-26 10:31:37 +04:00
static void __kmem_cache_destroy ( struct kmem_cache * cachep )
{
int i ;
struct kmem_list3 * l3 ;
for_each_online_cpu ( i )
kfree ( cachep - > array [ i ] ) ;
/* NUMA: free the list3 structures */
for_each_online_node ( i ) {
l3 = cachep - > nodelists [ i ] ;
if ( l3 ) {
kfree ( l3 - > shared ) ;
free_alien_cache ( l3 - > alien ) ;
kfree ( l3 ) ;
}
}
kmem_cache_free ( & cache_cache , cachep ) ;
}
2006-01-08 12:00:36 +03:00
/**
2006-02-01 14:05:52 +03:00
* calculate_slab_order - calculate size ( page order ) of slabs
* @ cachep : pointer to the cache that is being created
* @ size : size of objects to be created in this cache .
* @ align : required alignment for the objects .
* @ flags : slab allocation flags
*
* Also calculates the number of objects per slab .
2006-01-08 12:00:36 +03:00
*
* This could be made much more intelligent . For now , try to avoid using
* high order pages for slabs . When the gfp ( ) functions are more friendly
* towards high - order requests , this should be changed .
*/
2006-03-22 11:08:11 +03:00
static size_t calculate_slab_order ( struct kmem_cache * cachep ,
2006-02-01 14:05:53 +03:00
size_t size , size_t align , unsigned long flags )
2006-01-08 12:00:36 +03:00
{
2006-06-02 17:44:58 +04:00
unsigned long offslab_limit ;
2006-01-08 12:00:36 +03:00
size_t left_over = 0 ;
2006-03-07 04:44:43 +03:00
int gfporder ;
2006-01-08 12:00:36 +03:00
2007-05-17 09:11:01 +04:00
for ( gfporder = 0 ; gfporder < = KMALLOC_MAX_ORDER ; gfporder + + ) {
2006-01-08 12:00:36 +03:00
unsigned int num ;
size_t remainder ;
2006-03-07 04:44:43 +03:00
cache_estimate ( gfporder , size , align , flags , & remainder , & num ) ;
2006-01-08 12:00:36 +03:00
if ( ! num )
continue ;
2006-03-07 04:44:43 +03:00
2006-06-02 17:44:58 +04:00
if ( flags & CFLGS_OFF_SLAB ) {
/*
* Max number of objs - per - slab for caches which
* use off - slab slabs . Needed to avoid a possible
* looping condition in cache_grow ( ) .
*/
offslab_limit = size - sizeof ( struct slab ) ;
offslab_limit / = sizeof ( kmem_bufctl_t ) ;
if ( num > offslab_limit )
break ;
}
2006-01-08 12:00:36 +03:00
2006-03-07 04:44:43 +03:00
/* Found something acceptable - save it away */
2006-01-08 12:00:36 +03:00
cachep - > num = num ;
2006-03-07 04:44:43 +03:00
cachep - > gfporder = gfporder ;
2006-01-08 12:00:36 +03:00
left_over = remainder ;
2006-03-08 21:33:05 +03:00
/*
* A VFS - reclaimable slab tends to have most allocations
* as GFP_NOFS and we really don ' t want to have to be allocating
* higher - order pages when we are unable to shrink dcache .
*/
if ( flags & SLAB_RECLAIM_ACCOUNT )
break ;
2006-01-08 12:00:36 +03:00
/*
* Large number of objects is good , but very large slabs are
* currently bad for the gfp ( ) s .
*/
2006-03-07 04:44:43 +03:00
if ( gfporder > = slab_break_gfp_order )
2006-01-08 12:00:36 +03:00
break ;
2006-03-07 04:44:43 +03:00
/*
* Acceptable internal fragmentation ?
*/
2006-03-22 11:08:11 +03:00
if ( left_over * 8 < = ( PAGE_SIZE < < gfporder ) )
2006-01-08 12:00:36 +03:00
break ;
}
return left_over ;
}
2007-05-18 01:48:19 +04:00
static int __init_refok setup_cpu_cache ( struct kmem_cache * cachep )
2006-03-22 11:08:11 +03:00
{
2006-09-26 10:31:38 +04:00
if ( g_cpucache_up = = FULL )
return enable_cpucache ( cachep ) ;
2006-03-22 11:08:11 +03:00
if ( g_cpucache_up = = NONE ) {
/*
* Note : the first kmem_cache_create must create the cache
* that ' s used by kmalloc ( 24 ) , otherwise the creation of
* further caches will BUG ( ) .
*/
cachep - > array [ smp_processor_id ( ) ] = & initarray_generic . cache ;
/*
* If the cache that ' s used by kmalloc ( sizeof ( kmem_list3 ) ) is
* the first cache , then we need to set up all its list3s ,
* otherwise the creation of further caches will BUG ( ) .
*/
set_up_list3s ( cachep , SIZE_AC ) ;
if ( INDEX_AC = = INDEX_L3 )
g_cpucache_up = PARTIAL_L3 ;
else
g_cpucache_up = PARTIAL_AC ;
} else {
cachep - > array [ smp_processor_id ( ) ] =
kmalloc ( sizeof ( struct arraycache_init ) , GFP_KERNEL ) ;
if ( g_cpucache_up = = PARTIAL_AC ) {
set_up_list3s ( cachep , SIZE_L3 ) ;
g_cpucache_up = PARTIAL_L3 ;
} else {
int node ;
2008-01-25 09:20:51 +03:00
for_each_online_node ( node ) {
2006-03-22 11:08:11 +03:00
cachep - > nodelists [ node ] =
kmalloc_node ( sizeof ( struct kmem_list3 ) ,
GFP_KERNEL , node ) ;
BUG_ON ( ! cachep - > nodelists [ node ] ) ;
kmem_list3_init ( cachep - > nodelists [ node ] ) ;
}
}
}
cachep - > nodelists [ numa_node_id ( ) ] - > next_reap =
jiffies + REAPTIMEOUT_LIST3 +
( ( unsigned long ) cachep ) % REAPTIMEOUT_LIST3 ;
cpu_cache_get ( cachep ) - > avail = 0 ;
cpu_cache_get ( cachep ) - > limit = BOOT_CPUCACHE_ENTRIES ;
cpu_cache_get ( cachep ) - > batchcount = 1 ;
cpu_cache_get ( cachep ) - > touched = 0 ;
cachep - > batchcount = 1 ;
cachep - > limit = BOOT_CPUCACHE_ENTRIES ;
2006-09-26 10:31:38 +04:00
return 0 ;
2006-03-22 11:08:11 +03:00
}
2005-04-17 02:20:36 +04:00
/**
* kmem_cache_create - Create a cache .
* @ name : A string which is used in / proc / slabinfo to identify this cache .
* @ size : The size of objects to be created in this cache .
* @ align : The required alignment for the objects .
* @ flags : SLAB flags
* @ ctor : A constructor for the objects .
*
* Returns a ptr to the cache on success , NULL on failure .
* Cannot be called within a int , but can be interrupted .
2007-07-20 05:11:58 +04:00
* The @ ctor is run when new pages are allocated by the cache .
2005-04-17 02:20:36 +04:00
*
* @ name must be valid until the cache is destroyed . This implies that
2006-03-22 11:08:11 +03:00
* the module calling this has to destroy the cache before getting unloaded .
*
2005-04-17 02:20:36 +04:00
* The flags are
*
* % SLAB_POISON - Poison the slab with a known test pattern ( a5a5a5a5 )
* to catch references to uninitialised memory .
*
* % SLAB_RED_ZONE - Insert ` Red ' zones around the allocated memory to check
* for buffer overruns .
*
* % SLAB_HWCACHE_ALIGN - Align the objects in this cache to a hardware
* cacheline . This can be beneficial if you ' re counting cycles as closely
* as davem .
*/
2006-02-01 14:05:50 +03:00
struct kmem_cache *
2005-04-17 02:20:36 +04:00
kmem_cache_create ( const char * name , size_t size , size_t align ,
2006-03-22 11:08:11 +03:00
unsigned long flags ,
2007-10-17 10:25:51 +04:00
void ( * ctor ) ( struct kmem_cache * , void * ) )
2005-04-17 02:20:36 +04:00
{
size_t left_over , slab_size , ralign ;
2006-06-23 13:03:17 +04:00
struct kmem_cache * cachep = NULL , * pc ;
2005-04-17 02:20:36 +04:00
/*
* Sanity checks . . . these are all serious usage bugs .
*/
2006-03-22 11:08:11 +03:00
if ( ! name | | in_interrupt ( ) | | ( size < BYTES_PER_WORD ) | |
2007-07-20 05:11:58 +04:00
size > KMALLOC_MAX_SIZE ) {
2006-03-22 11:08:11 +03:00
printk ( KERN_ERR " %s: Early error in slab %s \n " , __FUNCTION__ ,
name ) ;
2006-01-08 12:00:37 +03:00
BUG ( ) ;
}
2005-04-17 02:20:36 +04:00
2006-02-10 12:51:13 +03:00
/*
[PATCH] mm: slab: eliminate lock_cpu_hotplug from slab
Here's an attempt towards doing away with lock_cpu_hotplug in the slab
subsystem. This approach also fixes a bug which shows up when cpus are
being offlined/onlined and slab caches are being tuned simultaneously.
http://marc.theaimsgroup.com/?l=linux-kernel&m=116098888100481&w=2
The patch has been stress tested overnight on a 2 socket 4 core AMD box with
repeated cpu online and offline, while dbench and kernbench process are
running, and slab caches being tuned at the same time.
There were no lockdep warnings either. (This test on 2,6.18 as 2.6.19-rc
crashes at __drain_pages
http://marc.theaimsgroup.com/?l=linux-kernel&m=116172164217678&w=2 )
The approach here is to hold cache_chain_mutex from CPU_UP_PREPARE until
CPU_ONLINE (similar in approach as worqueue_mutex) . Slab code sensitive
to cpu_online_map (kmem_cache_create, kmem_cache_destroy, slabinfo_write,
__cache_shrink) is already serialized with cache_chain_mutex. (This patch
lengthens cache_chain_mutex hold time at kmem_cache_destroy to cover this).
This patch also takes the cache_chain_sem at kmem_cache_shrink to protect
sanity of cpu_online_map at __cache_shrink, as viewed by slab.
(kmem_cache_shrink->__cache_shrink->drain_cpu_caches). But, really,
kmem_cache_shrink is used at just one place in the acpi subsystem! Do we
really need to keep kmem_cache_shrink at all?
Another note. Looks like a cpu hotplug event can send CPU_UP_CANCELED to
a registered subsystem even if the subsystem did not receive CPU_UP_PREPARE.
This could be due to a subsystem registered for notification earlier than
the current subsystem crapping out with NOTIFY_BAD. Badness can occur with
in the CPU_UP_CANCELED code path at slab if this happens (The same would
apply for workqueue.c as well). To overcome this, we might have to use either
a) a per subsystem flag and avoid handling of CPU_UP_CANCELED, or
b) Use a special notifier events like LOCK_ACQUIRE/RELEASE as Gautham was
using in his experiments, or
c) Do not send CPU_UP_CANCELED to a subsystem which did not receive
CPU_UP_PREPARE.
I would prefer c).
Signed-off-by: Ravikiran Thirumalai <kiran@scalex86.org>
Signed-off-by: Shai Fultheim <shai@scalex86.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-07 07:32:14 +03:00
* We use cache_chain_mutex to ensure a consistent view of
* cpu_online_map as well . Please see cpuup_callback
2006-02-10 12:51:13 +03:00
*/
2008-01-25 23:08:02 +03:00
get_online_cpus ( ) ;
2006-01-19 04:42:33 +03:00
mutex_lock ( & cache_chain_mutex ) ;
2005-11-07 11:58:00 +03:00
2006-06-23 13:03:17 +04:00
list_for_each_entry ( pc , & cache_chain , next ) {
2005-11-07 11:58:00 +03:00
char tmp ;
int res ;
/*
* This happens when the module gets unloaded and doesn ' t
* destroy its slab cache and no - one else reuses the vmalloc
* area of the module . Print a warning .
*/
2006-12-07 07:36:41 +03:00
res = probe_kernel_address ( pc - > name , tmp ) ;
2005-11-07 11:58:00 +03:00
if ( res ) {
2007-05-07 01:49:52 +04:00
printk ( KERN_ERR
" SLAB: cache with size %d has lost its name \n " ,
2006-02-01 14:05:42 +03:00
pc - > buffer_size ) ;
2005-11-07 11:58:00 +03:00
continue ;
}
2006-01-08 12:00:37 +03:00
if ( ! strcmp ( pc - > name , name ) ) {
2007-05-07 01:49:52 +04:00
printk ( KERN_ERR
" kmem_cache_create: duplicate cache %s \n " , name ) ;
2005-11-07 11:58:00 +03:00
dump_stack ( ) ;
goto oops ;
}
}
2005-04-17 02:20:36 +04:00
# if DEBUG
WARN_ON ( strchr ( name , ' ' ) ) ; /* It confuses parsers */
# if FORCED_DEBUG
/*
* Enable redzoning and last user accounting , except for caches with
* large objects , if the increased size would increase the object size
* above the next power of two : caches with object sizes just above a
* power of two have a significant amount of internal fragmentation .
*/
Fix slab redzone alignment
Commit b46b8f19c9cd435ecac4d9d12b39d78c137ecd66 fixed a couple of bugs
by switching the redzone to 64 bits. Unfortunately, it neglected to
ensure that the _second_ redzone, after the slab object, is aligned
correctly. This caused illegal instruction faults on sparc32, which for
some reason not entirely clear to me are not trapped and fixed up.
Two things need to be done to fix this:
- increase the object size, rounding up to alignof(long long) so
that the second redzone can be aligned correctly.
- If SLAB_STORE_USER is set but alignof(long long)==8, allow a
full 64 bits of space for the user word at the end of the buffer,
even though we may not _use_ the whole 64 bits.
This patch should be a no-op on any 64-bit architecture or any 32-bit
architecture where alignof(long long) == 4. Of the others, it's tested
on ppc32 by myself and a very similar patch was tested on sparc32 by
Mark Fortescue, who reported the new problem.
Also, fix the conditions for FORCED_DEBUG, which hadn't been adjusted to
the new sizes. Again noticed by Mark.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-07-05 05:26:44 +04:00
if ( size < 4096 | | fls ( size - 1 ) = = fls ( size - 1 + REDZONE_ALIGN +
2 * sizeof ( unsigned long long ) ) )
2006-01-08 12:00:37 +03:00
flags | = SLAB_RED_ZONE | SLAB_STORE_USER ;
2005-04-17 02:20:36 +04:00
if ( ! ( flags & SLAB_DESTROY_BY_RCU ) )
flags | = SLAB_POISON ;
# endif
if ( flags & SLAB_DESTROY_BY_RCU )
BUG_ON ( flags & SLAB_POISON ) ;
# endif
/*
2006-03-22 11:08:11 +03:00
* Always checks flags , a caller might be expecting debug support which
* isn ' t available .
2005-04-17 02:20:36 +04:00
*/
2006-04-02 15:49:25 +04:00
BUG_ON ( flags & ~ CREATE_MASK ) ;
2005-04-17 02:20:36 +04:00
2006-03-22 11:08:11 +03:00
/*
* Check that size is in terms of words . This is needed to avoid
2005-04-17 02:20:36 +04:00
* unaligned accesses for some archs when redzoning is used , and makes
* sure any on - slab bufctl ' s are also correctly aligned .
*/
2006-01-08 12:00:37 +03:00
if ( size & ( BYTES_PER_WORD - 1 ) ) {
size + = ( BYTES_PER_WORD - 1 ) ;
size & = ~ ( BYTES_PER_WORD - 1 ) ;
2005-04-17 02:20:36 +04:00
}
2006-03-22 11:08:11 +03:00
/* calculate the final buffer alignment: */
2005-04-17 02:20:36 +04:00
/* 1) arch recommendation: can be overridden for debug */
if ( flags & SLAB_HWCACHE_ALIGN ) {
2006-03-22 11:08:11 +03:00
/*
* Default alignment : as specified by the arch code . Except if
* an object is really small , then squeeze multiple objects into
* one cacheline .
2005-04-17 02:20:36 +04:00
*/
ralign = cache_line_size ( ) ;
2006-01-08 12:00:37 +03:00
while ( size < = ralign / 2 )
2005-04-17 02:20:36 +04:00
ralign / = 2 ;
} else {
ralign = BYTES_PER_WORD ;
}
2006-09-26 10:31:25 +04:00
/*
Fix slab redzone alignment
Commit b46b8f19c9cd435ecac4d9d12b39d78c137ecd66 fixed a couple of bugs
by switching the redzone to 64 bits. Unfortunately, it neglected to
ensure that the _second_ redzone, after the slab object, is aligned
correctly. This caused illegal instruction faults on sparc32, which for
some reason not entirely clear to me are not trapped and fixed up.
Two things need to be done to fix this:
- increase the object size, rounding up to alignof(long long) so
that the second redzone can be aligned correctly.
- If SLAB_STORE_USER is set but alignof(long long)==8, allow a
full 64 bits of space for the user word at the end of the buffer,
even though we may not _use_ the whole 64 bits.
This patch should be a no-op on any 64-bit architecture or any 32-bit
architecture where alignof(long long) == 4. Of the others, it's tested
on ppc32 by myself and a very similar patch was tested on sparc32 by
Mark Fortescue, who reported the new problem.
Also, fix the conditions for FORCED_DEBUG, which hadn't been adjusted to
the new sizes. Again noticed by Mark.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-07-05 05:26:44 +04:00
* Redzoning and user store require word alignment or possibly larger .
* Note this will be overridden by architecture or caller mandated
* alignment if either is greater than BYTES_PER_WORD .
2006-09-26 10:31:25 +04:00
*/
Fix slab redzone alignment
Commit b46b8f19c9cd435ecac4d9d12b39d78c137ecd66 fixed a couple of bugs
by switching the redzone to 64 bits. Unfortunately, it neglected to
ensure that the _second_ redzone, after the slab object, is aligned
correctly. This caused illegal instruction faults on sparc32, which for
some reason not entirely clear to me are not trapped and fixed up.
Two things need to be done to fix this:
- increase the object size, rounding up to alignof(long long) so
that the second redzone can be aligned correctly.
- If SLAB_STORE_USER is set but alignof(long long)==8, allow a
full 64 bits of space for the user word at the end of the buffer,
even though we may not _use_ the whole 64 bits.
This patch should be a no-op on any 64-bit architecture or any 32-bit
architecture where alignof(long long) == 4. Of the others, it's tested
on ppc32 by myself and a very similar patch was tested on sparc32 by
Mark Fortescue, who reported the new problem.
Also, fix the conditions for FORCED_DEBUG, which hadn't been adjusted to
the new sizes. Again noticed by Mark.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-07-05 05:26:44 +04:00
if ( flags & SLAB_STORE_USER )
ralign = BYTES_PER_WORD ;
if ( flags & SLAB_RED_ZONE ) {
ralign = REDZONE_ALIGN ;
/* If redzoning, ensure that the second redzone is suitably
* aligned , by adjusting the object size accordingly . */
size + = REDZONE_ALIGN - 1 ;
size & = ~ ( REDZONE_ALIGN - 1 ) ;
}
2006-09-26 10:31:25 +04:00
2006-12-07 07:32:11 +03:00
/* 2) arch mandated alignment */
2005-04-17 02:20:36 +04:00
if ( ralign < ARCH_SLAB_MINALIGN ) {
ralign = ARCH_SLAB_MINALIGN ;
}
2006-12-07 07:32:11 +03:00
/* 3) caller mandated alignment */
2005-04-17 02:20:36 +04:00
if ( ralign < align ) {
ralign = align ;
}
2006-12-07 07:32:11 +03:00
/* disable debug if necessary */
Increase slab redzone to 64bits
There are two problems with the existing redzone implementation.
Firstly, it's causing misalignment of structures which contain a 64-bit
integer, such as netfilter's 'struct ipt_entry' -- causing netfilter
modules to fail to load because of the misalignment. (In particular, the
first check in
net/ipv4/netfilter/ip_tables.c::check_entry_size_and_hooks())
On ppc32 and sparc32, amongst others, __alignof__(uint64_t) == 8.
With slab debugging, we use 32-bit redzones. And allocated slab objects
aren't sufficiently aligned to hold a structure containing a uint64_t.
By _just_ setting ARCH_KMALLOC_MINALIGN to __alignof__(u64) we'd disable
redzone checks on those architectures. By using 64-bit redzones we avoid that
loss of debugging, and also fix the other problem while we're at it.
When investigating this, I noticed that on 64-bit platforms we're using a
32-bit value of RED_ACTIVE/RED_INACTIVE in the 64-bit memory location set
aside for the redzone. Which means that the four bytes immediately before
or after the allocated object at 0x00,0x00,0x00,0x00 for LE and BE
machines, respectively. Which is probably not the most useful choice of
poison value.
One way to fix both of those at once is just to switch to 64-bit
redzones in all cases.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Acked-by: Pekka Enberg <penberg@cs.helsinki.fi>
Cc: Christoph Lameter <clameter@engr.sgi.com>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-05-08 11:22:59 +04:00
if ( ralign > __alignof__ ( unsigned long long ) )
2006-12-07 07:32:11 +03:00
flags & = ~ ( SLAB_RED_ZONE | SLAB_STORE_USER ) ;
2006-03-22 11:08:11 +03:00
/*
2006-09-26 10:31:25 +04:00
* 4 ) Store it .
2005-04-17 02:20:36 +04:00
*/
align = ralign ;
/* Get cache's description obj. */
2006-12-07 07:33:17 +03:00
cachep = kmem_cache_zalloc ( & cache_cache , GFP_KERNEL ) ;
2005-04-17 02:20:36 +04:00
if ( ! cachep )
2005-11-07 11:58:00 +03:00
goto oops ;
2005-04-17 02:20:36 +04:00
# if DEBUG
2006-02-01 14:05:42 +03:00
cachep - > obj_size = size ;
2005-04-17 02:20:36 +04:00
2006-09-26 10:31:25 +04:00
/*
* Both debugging options require word - alignment which is calculated
* into align above .
*/
2005-04-17 02:20:36 +04:00
if ( flags & SLAB_RED_ZONE ) {
/* add space for red zone words */
Increase slab redzone to 64bits
There are two problems with the existing redzone implementation.
Firstly, it's causing misalignment of structures which contain a 64-bit
integer, such as netfilter's 'struct ipt_entry' -- causing netfilter
modules to fail to load because of the misalignment. (In particular, the
first check in
net/ipv4/netfilter/ip_tables.c::check_entry_size_and_hooks())
On ppc32 and sparc32, amongst others, __alignof__(uint64_t) == 8.
With slab debugging, we use 32-bit redzones. And allocated slab objects
aren't sufficiently aligned to hold a structure containing a uint64_t.
By _just_ setting ARCH_KMALLOC_MINALIGN to __alignof__(u64) we'd disable
redzone checks on those architectures. By using 64-bit redzones we avoid that
loss of debugging, and also fix the other problem while we're at it.
When investigating this, I noticed that on 64-bit platforms we're using a
32-bit value of RED_ACTIVE/RED_INACTIVE in the 64-bit memory location set
aside for the redzone. Which means that the four bytes immediately before
or after the allocated object at 0x00,0x00,0x00,0x00 for LE and BE
machines, respectively. Which is probably not the most useful choice of
poison value.
One way to fix both of those at once is just to switch to 64-bit
redzones in all cases.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Acked-by: Pekka Enberg <penberg@cs.helsinki.fi>
Cc: Christoph Lameter <clameter@engr.sgi.com>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-05-08 11:22:59 +04:00
cachep - > obj_offset + = sizeof ( unsigned long long ) ;
size + = 2 * sizeof ( unsigned long long ) ;
2005-04-17 02:20:36 +04:00
}
if ( flags & SLAB_STORE_USER ) {
2006-09-26 10:31:25 +04:00
/* user store requires one word storage behind the end of
Fix slab redzone alignment
Commit b46b8f19c9cd435ecac4d9d12b39d78c137ecd66 fixed a couple of bugs
by switching the redzone to 64 bits. Unfortunately, it neglected to
ensure that the _second_ redzone, after the slab object, is aligned
correctly. This caused illegal instruction faults on sparc32, which for
some reason not entirely clear to me are not trapped and fixed up.
Two things need to be done to fix this:
- increase the object size, rounding up to alignof(long long) so
that the second redzone can be aligned correctly.
- If SLAB_STORE_USER is set but alignof(long long)==8, allow a
full 64 bits of space for the user word at the end of the buffer,
even though we may not _use_ the whole 64 bits.
This patch should be a no-op on any 64-bit architecture or any 32-bit
architecture where alignof(long long) == 4. Of the others, it's tested
on ppc32 by myself and a very similar patch was tested on sparc32 by
Mark Fortescue, who reported the new problem.
Also, fix the conditions for FORCED_DEBUG, which hadn't been adjusted to
the new sizes. Again noticed by Mark.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-07-05 05:26:44 +04:00
* the real object . But if the second red zone needs to be
* aligned to 64 bits , we must allow that much space .
2005-04-17 02:20:36 +04:00
*/
Fix slab redzone alignment
Commit b46b8f19c9cd435ecac4d9d12b39d78c137ecd66 fixed a couple of bugs
by switching the redzone to 64 bits. Unfortunately, it neglected to
ensure that the _second_ redzone, after the slab object, is aligned
correctly. This caused illegal instruction faults on sparc32, which for
some reason not entirely clear to me are not trapped and fixed up.
Two things need to be done to fix this:
- increase the object size, rounding up to alignof(long long) so
that the second redzone can be aligned correctly.
- If SLAB_STORE_USER is set but alignof(long long)==8, allow a
full 64 bits of space for the user word at the end of the buffer,
even though we may not _use_ the whole 64 bits.
This patch should be a no-op on any 64-bit architecture or any 32-bit
architecture where alignof(long long) == 4. Of the others, it's tested
on ppc32 by myself and a very similar patch was tested on sparc32 by
Mark Fortescue, who reported the new problem.
Also, fix the conditions for FORCED_DEBUG, which hadn't been adjusted to
the new sizes. Again noticed by Mark.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-07-05 05:26:44 +04:00
if ( flags & SLAB_RED_ZONE )
size + = REDZONE_ALIGN ;
else
size + = BYTES_PER_WORD ;
2005-04-17 02:20:36 +04:00
}
# if FORCED_DEBUG && defined(CONFIG_DEBUG_PAGEALLOC)
2006-01-08 12:00:37 +03:00
if ( size > = malloc_sizes [ INDEX_L3 + 1 ] . cs_size
2006-02-01 14:05:42 +03:00
& & cachep - > obj_size > cache_line_size ( ) & & size < PAGE_SIZE ) {
cachep - > obj_offset + = PAGE_SIZE - size ;
2005-04-17 02:20:36 +04:00
size = PAGE_SIZE ;
}
# endif
# endif
2006-06-23 13:03:46 +04:00
/*
* Determine if the slab management is ' on ' or ' off ' slab .
* ( bootstrapping cannot cope with offslab caches so don ' t do
* it too early on . )
*/
if ( ( size > = ( PAGE_SIZE > > 3 ) ) & & ! slab_early_init )
2005-04-17 02:20:36 +04:00
/*
* Size is large , assume best to place the slab management obj
* off - slab ( should allow better packing of objs ) .
*/
flags | = CFLGS_OFF_SLAB ;
size = ALIGN ( size , align ) ;
2006-03-08 21:33:05 +03:00
left_over = calculate_slab_order ( cachep , size , align , flags ) ;
2005-04-17 02:20:36 +04:00
if ( ! cachep - > num ) {
2007-05-07 01:49:52 +04:00
printk ( KERN_ERR
" kmem_cache_create: couldn't create cache %s. \n " , name ) ;
2005-04-17 02:20:36 +04:00
kmem_cache_free ( & cache_cache , cachep ) ;
cachep = NULL ;
2005-11-07 11:58:00 +03:00
goto oops ;
2005-04-17 02:20:36 +04:00
}
2006-01-08 12:00:37 +03:00
slab_size = ALIGN ( cachep - > num * sizeof ( kmem_bufctl_t )
+ sizeof ( struct slab ) , align ) ;
2005-04-17 02:20:36 +04:00
/*
* If the slab has been placed off - slab , and we have enough space then
* move it on - slab . This is at the expense of any extra colouring .
*/
if ( flags & CFLGS_OFF_SLAB & & left_over > = slab_size ) {
flags & = ~ CFLGS_OFF_SLAB ;
left_over - = slab_size ;
}
if ( flags & CFLGS_OFF_SLAB ) {
/* really off slab. No need for manual alignment */
2006-01-08 12:00:37 +03:00
slab_size =
cachep - > num * sizeof ( kmem_bufctl_t ) + sizeof ( struct slab ) ;
2005-04-17 02:20:36 +04:00
}
cachep - > colour_off = cache_line_size ( ) ;
/* Offset must be a multiple of the alignment. */
if ( cachep - > colour_off < align )
cachep - > colour_off = align ;
2006-01-08 12:00:37 +03:00
cachep - > colour = left_over / cachep - > colour_off ;
2005-04-17 02:20:36 +04:00
cachep - > slab_size = slab_size ;
cachep - > flags = flags ;
cachep - > gfpflags = 0 ;
2007-02-10 12:43:10 +03:00
if ( CONFIG_ZONE_DMA_FLAG & & ( flags & SLAB_CACHE_DMA ) )
2005-04-17 02:20:36 +04:00
cachep - > gfpflags | = GFP_DMA ;
2006-02-01 14:05:42 +03:00
cachep - > buffer_size = size ;
2006-12-13 11:34:27 +03:00
cachep - > reciprocal_buffer_size = reciprocal_value ( size ) ;
2005-04-17 02:20:36 +04:00
2006-09-26 10:31:34 +04:00
if ( flags & CFLGS_OFF_SLAB ) {
2005-09-10 11:26:36 +04:00
cachep - > slabp_cache = kmem_find_general_cachep ( slab_size , 0u ) ;
2006-09-26 10:31:34 +04:00
/*
* This is a possibility for one of the malloc_sizes caches .
* But since we go off slab only for object size greater than
* PAGE_SIZE / 8 , and malloc_sizes gets created in ascending order ,
* this should not happen at all .
* But leave a BUG_ON for some lucky dude .
*/
2007-07-17 15:03:22 +04:00
BUG_ON ( ZERO_OR_NULL_PTR ( cachep - > slabp_cache ) ) ;
2006-09-26 10:31:34 +04:00
}
2005-04-17 02:20:36 +04:00
cachep - > ctor = ctor ;
cachep - > name = name ;
2006-09-26 10:31:38 +04:00
if ( setup_cpu_cache ( cachep ) ) {
__kmem_cache_destroy ( cachep ) ;
cachep = NULL ;
goto oops ;
}
2005-04-17 02:20:36 +04:00
/* cache setup completed, link it into the list */
list_add ( & cachep - > next , & cache_chain ) ;
2006-03-22 11:08:11 +03:00
oops :
2005-04-17 02:20:36 +04:00
if ( ! cachep & & ( flags & SLAB_PANIC ) )
panic ( " kmem_cache_create(): failed to create slab `%s' \n " ,
2006-01-08 12:00:37 +03:00
name ) ;
2006-01-19 04:42:33 +03:00
mutex_unlock ( & cache_chain_mutex ) ;
2008-01-25 23:08:02 +03:00
put_online_cpus ( ) ;
2005-04-17 02:20:36 +04:00
return cachep ;
}
EXPORT_SYMBOL ( kmem_cache_create ) ;
# if DEBUG
static void check_irq_off ( void )
{
BUG_ON ( ! irqs_disabled ( ) ) ;
}
static void check_irq_on ( void )
{
BUG_ON ( irqs_disabled ( ) ) ;
}
2006-02-01 14:05:50 +03:00
static void check_spinlock_acquired ( struct kmem_cache * cachep )
2005-04-17 02:20:36 +04:00
{
# ifdef CONFIG_SMP
check_irq_off ( ) ;
2005-09-10 00:03:32 +04:00
assert_spin_locked ( & cachep - > nodelists [ numa_node_id ( ) ] - > list_lock ) ;
2005-04-17 02:20:36 +04:00
# endif
}
2005-09-10 00:03:32 +04:00
2006-02-01 14:05:50 +03:00
static void check_spinlock_acquired_node ( struct kmem_cache * cachep , int node )
2005-09-10 00:03:32 +04:00
{
# ifdef CONFIG_SMP
check_irq_off ( ) ;
assert_spin_locked ( & cachep - > nodelists [ node ] - > list_lock ) ;
# endif
}
2005-04-17 02:20:36 +04:00
# else
# define check_irq_off() do { } while(0)
# define check_irq_on() do { } while(0)
# define check_spinlock_acquired(x) do { } while(0)
2005-09-10 00:03:32 +04:00
# define check_spinlock_acquired_node(x, y) do { } while(0)
2005-04-17 02:20:36 +04:00
# endif
2006-03-22 11:09:06 +03:00
static void drain_array ( struct kmem_cache * cachep , struct kmem_list3 * l3 ,
struct array_cache * ac ,
int force , int node ) ;
2005-04-17 02:20:36 +04:00
static void do_drain ( void * arg )
{
2006-03-22 11:08:11 +03:00
struct kmem_cache * cachep = arg ;
2005-04-17 02:20:36 +04:00
struct array_cache * ac ;
2005-09-23 08:44:02 +04:00
int node = numa_node_id ( ) ;
2005-04-17 02:20:36 +04:00
check_irq_off ( ) ;
2006-02-01 14:05:49 +03:00
ac = cpu_cache_get ( cachep ) ;
2005-09-23 08:44:02 +04:00
spin_lock ( & cachep - > nodelists [ node ] - > list_lock ) ;
free_block ( cachep , ac - > entry , ac - > avail , node ) ;
spin_unlock ( & cachep - > nodelists [ node ] - > list_lock ) ;
2005-04-17 02:20:36 +04:00
ac - > avail = 0 ;
}
2006-02-01 14:05:50 +03:00
static void drain_cpu_caches ( struct kmem_cache * cachep )
2005-04-17 02:20:36 +04:00
{
2005-09-10 00:03:32 +04:00
struct kmem_list3 * l3 ;
int node ;
2006-03-22 11:08:17 +03:00
on_each_cpu ( do_drain , cachep , 1 , 1 ) ;
2005-04-17 02:20:36 +04:00
check_irq_on ( ) ;
2006-01-08 12:00:37 +03:00
for_each_online_node ( node ) {
2005-09-10 00:03:32 +04:00
l3 = cachep - > nodelists [ node ] ;
2006-05-15 22:41:00 +04:00
if ( l3 & & l3 - > alien )
drain_alien_cache ( cachep , l3 - > alien ) ;
}
for_each_online_node ( node ) {
l3 = cachep - > nodelists [ node ] ;
if ( l3 )
2006-03-22 11:09:06 +03:00
drain_array ( cachep , l3 , l3 - > shared , 1 , node ) ;
2005-09-10 00:03:32 +04:00
}
2005-04-17 02:20:36 +04:00
}
2006-06-30 12:55:45 +04:00
/*
* Remove slabs from the list of free slabs .
* Specify the number of slabs to drain in tofree .
*
* Returns the actual number of slabs released .
*/
static int drain_freelist ( struct kmem_cache * cache ,
struct kmem_list3 * l3 , int tofree )
2005-04-17 02:20:36 +04:00
{
2006-06-30 12:55:45 +04:00
struct list_head * p ;
int nr_freed ;
2005-04-17 02:20:36 +04:00
struct slab * slabp ;
2006-06-30 12:55:45 +04:00
nr_freed = 0 ;
while ( nr_freed < tofree & & ! list_empty ( & l3 - > slabs_free ) ) {
2005-04-17 02:20:36 +04:00
2006-06-30 12:55:45 +04:00
spin_lock_irq ( & l3 - > list_lock ) ;
2005-09-10 00:03:32 +04:00
p = l3 - > slabs_free . prev ;
2006-06-30 12:55:45 +04:00
if ( p = = & l3 - > slabs_free ) {
spin_unlock_irq ( & l3 - > list_lock ) ;
goto out ;
}
2005-04-17 02:20:36 +04:00
2006-06-30 12:55:45 +04:00
slabp = list_entry ( p , struct slab , list ) ;
2005-04-17 02:20:36 +04:00
# if DEBUG
2006-04-02 15:49:25 +04:00
BUG_ON ( slabp - > inuse ) ;
2005-04-17 02:20:36 +04:00
# endif
list_del ( & slabp - > list ) ;
2006-06-30 12:55:45 +04:00
/*
* Safe to drop the lock . The slab is no longer linked
* to the cache .
*/
l3 - > free_objects - = cache - > num ;
2005-09-10 00:03:32 +04:00
spin_unlock_irq ( & l3 - > list_lock ) ;
2006-06-30 12:55:45 +04:00
slab_destroy ( cache , slabp ) ;
nr_freed + + ;
2005-04-17 02:20:36 +04:00
}
2006-06-30 12:55:45 +04:00
out :
return nr_freed ;
2005-04-17 02:20:36 +04:00
}
[PATCH] mm: slab: eliminate lock_cpu_hotplug from slab
Here's an attempt towards doing away with lock_cpu_hotplug in the slab
subsystem. This approach also fixes a bug which shows up when cpus are
being offlined/onlined and slab caches are being tuned simultaneously.
http://marc.theaimsgroup.com/?l=linux-kernel&m=116098888100481&w=2
The patch has been stress tested overnight on a 2 socket 4 core AMD box with
repeated cpu online and offline, while dbench and kernbench process are
running, and slab caches being tuned at the same time.
There were no lockdep warnings either. (This test on 2,6.18 as 2.6.19-rc
crashes at __drain_pages
http://marc.theaimsgroup.com/?l=linux-kernel&m=116172164217678&w=2 )
The approach here is to hold cache_chain_mutex from CPU_UP_PREPARE until
CPU_ONLINE (similar in approach as worqueue_mutex) . Slab code sensitive
to cpu_online_map (kmem_cache_create, kmem_cache_destroy, slabinfo_write,
__cache_shrink) is already serialized with cache_chain_mutex. (This patch
lengthens cache_chain_mutex hold time at kmem_cache_destroy to cover this).
This patch also takes the cache_chain_sem at kmem_cache_shrink to protect
sanity of cpu_online_map at __cache_shrink, as viewed by slab.
(kmem_cache_shrink->__cache_shrink->drain_cpu_caches). But, really,
kmem_cache_shrink is used at just one place in the acpi subsystem! Do we
really need to keep kmem_cache_shrink at all?
Another note. Looks like a cpu hotplug event can send CPU_UP_CANCELED to
a registered subsystem even if the subsystem did not receive CPU_UP_PREPARE.
This could be due to a subsystem registered for notification earlier than
the current subsystem crapping out with NOTIFY_BAD. Badness can occur with
in the CPU_UP_CANCELED code path at slab if this happens (The same would
apply for workqueue.c as well). To overcome this, we might have to use either
a) a per subsystem flag and avoid handling of CPU_UP_CANCELED, or
b) Use a special notifier events like LOCK_ACQUIRE/RELEASE as Gautham was
using in his experiments, or
c) Do not send CPU_UP_CANCELED to a subsystem which did not receive
CPU_UP_PREPARE.
I would prefer c).
Signed-off-by: Ravikiran Thirumalai <kiran@scalex86.org>
Signed-off-by: Shai Fultheim <shai@scalex86.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-07 07:32:14 +03:00
/* Called with cache_chain_mutex held to protect against cpu hotplug */
2006-02-01 14:05:50 +03:00
static int __cache_shrink ( struct kmem_cache * cachep )
2005-09-10 00:03:32 +04:00
{
int ret = 0 , i = 0 ;
struct kmem_list3 * l3 ;
drain_cpu_caches ( cachep ) ;
check_irq_on ( ) ;
for_each_online_node ( i ) {
l3 = cachep - > nodelists [ i ] ;
2006-06-30 12:55:45 +04:00
if ( ! l3 )
continue ;
drain_freelist ( cachep , l3 , l3 - > free_objects ) ;
ret + = ! list_empty ( & l3 - > slabs_full ) | |
! list_empty ( & l3 - > slabs_partial ) ;
2005-09-10 00:03:32 +04:00
}
return ( ret ? 1 : 0 ) ;
}
2005-04-17 02:20:36 +04:00
/**
* kmem_cache_shrink - Shrink a cache .
* @ cachep : The cache to shrink .
*
* Releases as many slabs as possible for a cache .
* To help debugging , a zero exit status indicates all slabs were released .
*/
2006-02-01 14:05:50 +03:00
int kmem_cache_shrink ( struct kmem_cache * cachep )
2005-04-17 02:20:36 +04:00
{
[PATCH] mm: slab: eliminate lock_cpu_hotplug from slab
Here's an attempt towards doing away with lock_cpu_hotplug in the slab
subsystem. This approach also fixes a bug which shows up when cpus are
being offlined/onlined and slab caches are being tuned simultaneously.
http://marc.theaimsgroup.com/?l=linux-kernel&m=116098888100481&w=2
The patch has been stress tested overnight on a 2 socket 4 core AMD box with
repeated cpu online and offline, while dbench and kernbench process are
running, and slab caches being tuned at the same time.
There were no lockdep warnings either. (This test on 2,6.18 as 2.6.19-rc
crashes at __drain_pages
http://marc.theaimsgroup.com/?l=linux-kernel&m=116172164217678&w=2 )
The approach here is to hold cache_chain_mutex from CPU_UP_PREPARE until
CPU_ONLINE (similar in approach as worqueue_mutex) . Slab code sensitive
to cpu_online_map (kmem_cache_create, kmem_cache_destroy, slabinfo_write,
__cache_shrink) is already serialized with cache_chain_mutex. (This patch
lengthens cache_chain_mutex hold time at kmem_cache_destroy to cover this).
This patch also takes the cache_chain_sem at kmem_cache_shrink to protect
sanity of cpu_online_map at __cache_shrink, as viewed by slab.
(kmem_cache_shrink->__cache_shrink->drain_cpu_caches). But, really,
kmem_cache_shrink is used at just one place in the acpi subsystem! Do we
really need to keep kmem_cache_shrink at all?
Another note. Looks like a cpu hotplug event can send CPU_UP_CANCELED to
a registered subsystem even if the subsystem did not receive CPU_UP_PREPARE.
This could be due to a subsystem registered for notification earlier than
the current subsystem crapping out with NOTIFY_BAD. Badness can occur with
in the CPU_UP_CANCELED code path at slab if this happens (The same would
apply for workqueue.c as well). To overcome this, we might have to use either
a) a per subsystem flag and avoid handling of CPU_UP_CANCELED, or
b) Use a special notifier events like LOCK_ACQUIRE/RELEASE as Gautham was
using in his experiments, or
c) Do not send CPU_UP_CANCELED to a subsystem which did not receive
CPU_UP_PREPARE.
I would prefer c).
Signed-off-by: Ravikiran Thirumalai <kiran@scalex86.org>
Signed-off-by: Shai Fultheim <shai@scalex86.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-07 07:32:14 +03:00
int ret ;
2006-04-02 15:49:25 +04:00
BUG_ON ( ! cachep | | in_interrupt ( ) ) ;
2005-04-17 02:20:36 +04:00
2008-01-25 23:08:02 +03:00
get_online_cpus ( ) ;
[PATCH] mm: slab: eliminate lock_cpu_hotplug from slab
Here's an attempt towards doing away with lock_cpu_hotplug in the slab
subsystem. This approach also fixes a bug which shows up when cpus are
being offlined/onlined and slab caches are being tuned simultaneously.
http://marc.theaimsgroup.com/?l=linux-kernel&m=116098888100481&w=2
The patch has been stress tested overnight on a 2 socket 4 core AMD box with
repeated cpu online and offline, while dbench and kernbench process are
running, and slab caches being tuned at the same time.
There were no lockdep warnings either. (This test on 2,6.18 as 2.6.19-rc
crashes at __drain_pages
http://marc.theaimsgroup.com/?l=linux-kernel&m=116172164217678&w=2 )
The approach here is to hold cache_chain_mutex from CPU_UP_PREPARE until
CPU_ONLINE (similar in approach as worqueue_mutex) . Slab code sensitive
to cpu_online_map (kmem_cache_create, kmem_cache_destroy, slabinfo_write,
__cache_shrink) is already serialized with cache_chain_mutex. (This patch
lengthens cache_chain_mutex hold time at kmem_cache_destroy to cover this).
This patch also takes the cache_chain_sem at kmem_cache_shrink to protect
sanity of cpu_online_map at __cache_shrink, as viewed by slab.
(kmem_cache_shrink->__cache_shrink->drain_cpu_caches). But, really,
kmem_cache_shrink is used at just one place in the acpi subsystem! Do we
really need to keep kmem_cache_shrink at all?
Another note. Looks like a cpu hotplug event can send CPU_UP_CANCELED to
a registered subsystem even if the subsystem did not receive CPU_UP_PREPARE.
This could be due to a subsystem registered for notification earlier than
the current subsystem crapping out with NOTIFY_BAD. Badness can occur with
in the CPU_UP_CANCELED code path at slab if this happens (The same would
apply for workqueue.c as well). To overcome this, we might have to use either
a) a per subsystem flag and avoid handling of CPU_UP_CANCELED, or
b) Use a special notifier events like LOCK_ACQUIRE/RELEASE as Gautham was
using in his experiments, or
c) Do not send CPU_UP_CANCELED to a subsystem which did not receive
CPU_UP_PREPARE.
I would prefer c).
Signed-off-by: Ravikiran Thirumalai <kiran@scalex86.org>
Signed-off-by: Shai Fultheim <shai@scalex86.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-07 07:32:14 +03:00
mutex_lock ( & cache_chain_mutex ) ;
ret = __cache_shrink ( cachep ) ;
mutex_unlock ( & cache_chain_mutex ) ;
2008-01-25 23:08:02 +03:00
put_online_cpus ( ) ;
[PATCH] mm: slab: eliminate lock_cpu_hotplug from slab
Here's an attempt towards doing away with lock_cpu_hotplug in the slab
subsystem. This approach also fixes a bug which shows up when cpus are
being offlined/onlined and slab caches are being tuned simultaneously.
http://marc.theaimsgroup.com/?l=linux-kernel&m=116098888100481&w=2
The patch has been stress tested overnight on a 2 socket 4 core AMD box with
repeated cpu online and offline, while dbench and kernbench process are
running, and slab caches being tuned at the same time.
There were no lockdep warnings either. (This test on 2,6.18 as 2.6.19-rc
crashes at __drain_pages
http://marc.theaimsgroup.com/?l=linux-kernel&m=116172164217678&w=2 )
The approach here is to hold cache_chain_mutex from CPU_UP_PREPARE until
CPU_ONLINE (similar in approach as worqueue_mutex) . Slab code sensitive
to cpu_online_map (kmem_cache_create, kmem_cache_destroy, slabinfo_write,
__cache_shrink) is already serialized with cache_chain_mutex. (This patch
lengthens cache_chain_mutex hold time at kmem_cache_destroy to cover this).
This patch also takes the cache_chain_sem at kmem_cache_shrink to protect
sanity of cpu_online_map at __cache_shrink, as viewed by slab.
(kmem_cache_shrink->__cache_shrink->drain_cpu_caches). But, really,
kmem_cache_shrink is used at just one place in the acpi subsystem! Do we
really need to keep kmem_cache_shrink at all?
Another note. Looks like a cpu hotplug event can send CPU_UP_CANCELED to
a registered subsystem even if the subsystem did not receive CPU_UP_PREPARE.
This could be due to a subsystem registered for notification earlier than
the current subsystem crapping out with NOTIFY_BAD. Badness can occur with
in the CPU_UP_CANCELED code path at slab if this happens (The same would
apply for workqueue.c as well). To overcome this, we might have to use either
a) a per subsystem flag and avoid handling of CPU_UP_CANCELED, or
b) Use a special notifier events like LOCK_ACQUIRE/RELEASE as Gautham was
using in his experiments, or
c) Do not send CPU_UP_CANCELED to a subsystem which did not receive
CPU_UP_PREPARE.
I would prefer c).
Signed-off-by: Ravikiran Thirumalai <kiran@scalex86.org>
Signed-off-by: Shai Fultheim <shai@scalex86.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-07 07:32:14 +03:00
return ret ;
2005-04-17 02:20:36 +04:00
}
EXPORT_SYMBOL ( kmem_cache_shrink ) ;
/**
* kmem_cache_destroy - delete a cache
* @ cachep : the cache to destroy
*
2007-02-10 12:45:59 +03:00
* Remove a & struct kmem_cache object from the slab cache .
2005-04-17 02:20:36 +04:00
*
* It is expected this function will be called by a module when it is
* unloaded . This will remove the cache completely , and avoid a duplicate
* cache being allocated each time a module is loaded and unloaded , if the
* module doesn ' t have persistent in - kernel storage across loads and unloads .
*
* The cache must be empty before calling this function .
*
* The caller must guarantee that noone will allocate memory from the cache
* during the kmem_cache_destroy ( ) .
*/
[PATCH] Make kmem_cache_destroy() return void
un-, de-, -free, -destroy, -exit, etc functions should in general return
void. Also,
There is very little, say, filesystem driver code can do upon failed
kmem_cache_destroy(). If it will be decided to BUG in this case, BUG
should be put in generic code, instead.
Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-09-27 12:49:41 +04:00
void kmem_cache_destroy ( struct kmem_cache * cachep )
2005-04-17 02:20:36 +04:00
{
2006-04-02 15:49:25 +04:00
BUG_ON ( ! cachep | | in_interrupt ( ) ) ;
2005-04-17 02:20:36 +04:00
/* Find the cache in the chain of caches. */
2008-01-25 23:08:02 +03:00
get_online_cpus ( ) ;
2006-01-19 04:42:33 +03:00
mutex_lock ( & cache_chain_mutex ) ;
2005-04-17 02:20:36 +04:00
/*
* the chain is never empty , cache_cache is never destroyed
*/
list_del ( & cachep - > next ) ;
if ( __cache_shrink ( cachep ) ) {
slab_error ( cachep , " Can't free all objects " ) ;
2006-01-08 12:00:37 +03:00
list_add ( & cachep - > next , & cache_chain ) ;
2006-01-19 04:42:33 +03:00
mutex_unlock ( & cache_chain_mutex ) ;
2008-01-25 23:08:02 +03:00
put_online_cpus ( ) ;
[PATCH] Make kmem_cache_destroy() return void
un-, de-, -free, -destroy, -exit, etc functions should in general return
void. Also,
There is very little, say, filesystem driver code can do upon failed
kmem_cache_destroy(). If it will be decided to BUG in this case, BUG
should be put in generic code, instead.
Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-09-27 12:49:41 +04:00
return ;
2005-04-17 02:20:36 +04:00
}
if ( unlikely ( cachep - > flags & SLAB_DESTROY_BY_RCU ) )
2005-05-01 19:59:04 +04:00
synchronize_rcu ( ) ;
2005-04-17 02:20:36 +04:00
2006-09-26 10:31:37 +04:00
__kmem_cache_destroy ( cachep ) ;
[PATCH] mm: slab: eliminate lock_cpu_hotplug from slab
Here's an attempt towards doing away with lock_cpu_hotplug in the slab
subsystem. This approach also fixes a bug which shows up when cpus are
being offlined/onlined and slab caches are being tuned simultaneously.
http://marc.theaimsgroup.com/?l=linux-kernel&m=116098888100481&w=2
The patch has been stress tested overnight on a 2 socket 4 core AMD box with
repeated cpu online and offline, while dbench and kernbench process are
running, and slab caches being tuned at the same time.
There were no lockdep warnings either. (This test on 2,6.18 as 2.6.19-rc
crashes at __drain_pages
http://marc.theaimsgroup.com/?l=linux-kernel&m=116172164217678&w=2 )
The approach here is to hold cache_chain_mutex from CPU_UP_PREPARE until
CPU_ONLINE (similar in approach as worqueue_mutex) . Slab code sensitive
to cpu_online_map (kmem_cache_create, kmem_cache_destroy, slabinfo_write,
__cache_shrink) is already serialized with cache_chain_mutex. (This patch
lengthens cache_chain_mutex hold time at kmem_cache_destroy to cover this).
This patch also takes the cache_chain_sem at kmem_cache_shrink to protect
sanity of cpu_online_map at __cache_shrink, as viewed by slab.
(kmem_cache_shrink->__cache_shrink->drain_cpu_caches). But, really,
kmem_cache_shrink is used at just one place in the acpi subsystem! Do we
really need to keep kmem_cache_shrink at all?
Another note. Looks like a cpu hotplug event can send CPU_UP_CANCELED to
a registered subsystem even if the subsystem did not receive CPU_UP_PREPARE.
This could be due to a subsystem registered for notification earlier than
the current subsystem crapping out with NOTIFY_BAD. Badness can occur with
in the CPU_UP_CANCELED code path at slab if this happens (The same would
apply for workqueue.c as well). To overcome this, we might have to use either
a) a per subsystem flag and avoid handling of CPU_UP_CANCELED, or
b) Use a special notifier events like LOCK_ACQUIRE/RELEASE as Gautham was
using in his experiments, or
c) Do not send CPU_UP_CANCELED to a subsystem which did not receive
CPU_UP_PREPARE.
I would prefer c).
Signed-off-by: Ravikiran Thirumalai <kiran@scalex86.org>
Signed-off-by: Shai Fultheim <shai@scalex86.org>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-07 07:32:14 +03:00
mutex_unlock ( & cache_chain_mutex ) ;
2008-01-25 23:08:02 +03:00
put_online_cpus ( ) ;
2005-04-17 02:20:36 +04:00
}
EXPORT_SYMBOL ( kmem_cache_destroy ) ;
2006-09-26 10:31:34 +04:00
/*
* Get the memory for a slab management obj .
* For a slab cache when the slab descriptor is off - slab , slab descriptors
* always come from malloc_sizes caches . The slab descriptor cannot
* come from the same cache which is getting created because ,
* when we are searching for an appropriate cache for these
* descriptors in kmem_cache_create , we search through the malloc_sizes array .
* If we are creating a malloc_sizes cache here it would not be visible to
* kmem_find_general_cachep till the initialization is complete .
* Hence we cannot have slabp_cache same as the original cache .
*/
2006-02-01 14:05:50 +03:00
static struct slab * alloc_slabmgmt ( struct kmem_cache * cachep , void * objp ,
2006-04-11 09:52:53 +04:00
int colour_off , gfp_t local_flags ,
int nodeid )
2005-04-17 02:20:36 +04:00
{
struct slab * slabp ;
2006-01-08 12:00:37 +03:00
2005-04-17 02:20:36 +04:00
if ( OFF_SLAB ( cachep ) ) {
/* Slab management obj is off-slab. */
2006-04-11 09:52:53 +04:00
slabp = kmem_cache_alloc_node ( cachep - > slabp_cache ,
2006-12-07 07:33:29 +03:00
local_flags & ~ GFP_THISNODE , nodeid ) ;
2005-04-17 02:20:36 +04:00
if ( ! slabp )
return NULL ;
} else {
2006-01-08 12:00:37 +03:00
slabp = objp + colour_off ;
2005-04-17 02:20:36 +04:00
colour_off + = cachep - > slab_size ;
}
slabp - > inuse = 0 ;
slabp - > colouroff = colour_off ;
2006-01-08 12:00:37 +03:00
slabp - > s_mem = objp + colour_off ;
2006-04-11 09:52:53 +04:00
slabp - > nodeid = nodeid ;
2008-02-10 13:21:54 +03:00
slabp - > free = 0 ;
2005-04-17 02:20:36 +04:00
return slabp ;
}
static inline kmem_bufctl_t * slab_bufctl ( struct slab * slabp )
{
2006-01-08 12:00:37 +03:00
return ( kmem_bufctl_t * ) ( slabp + 1 ) ;
2005-04-17 02:20:36 +04:00
}
2006-02-01 14:05:50 +03:00
static void cache_init_objs ( struct kmem_cache * cachep ,
2007-05-17 09:10:57 +04:00
struct slab * slabp )
2005-04-17 02:20:36 +04:00
{
int i ;
for ( i = 0 ; i < cachep - > num ; i + + ) {
2006-03-22 11:08:10 +03:00
void * objp = index_to_obj ( cachep , slabp , i ) ;
2005-04-17 02:20:36 +04:00
# if DEBUG
/* need to poison the objs? */
if ( cachep - > flags & SLAB_POISON )
poison_obj ( cachep , objp , POISON_FREE ) ;
if ( cachep - > flags & SLAB_STORE_USER )
* dbg_userword ( cachep , objp ) = NULL ;
if ( cachep - > flags & SLAB_RED_ZONE ) {
* dbg_redzone1 ( cachep , objp ) = RED_INACTIVE ;
* dbg_redzone2 ( cachep , objp ) = RED_INACTIVE ;
}
/*
2006-03-22 11:08:11 +03:00
* Constructors are not allowed to allocate memory from the same
* cache which they are a constructor for . Otherwise , deadlock .
* They must also be threaded .
2005-04-17 02:20:36 +04:00
*/
if ( cachep - > ctor & & ! ( cachep - > flags & SLAB_POISON ) )
2007-10-17 10:25:51 +04:00
cachep - > ctor ( cachep , objp + obj_offset ( cachep ) ) ;
2005-04-17 02:20:36 +04:00
if ( cachep - > flags & SLAB_RED_ZONE ) {
if ( * dbg_redzone2 ( cachep , objp ) ! = RED_INACTIVE )
slab_error ( cachep , " constructor overwrote the "
2006-01-08 12:00:37 +03:00
" end of an object " ) ;
2005-04-17 02:20:36 +04:00
if ( * dbg_redzone1 ( cachep , objp ) ! = RED_INACTIVE )
slab_error ( cachep , " constructor overwrote the "
2006-01-08 12:00:37 +03:00
" start of an object " ) ;
2005-04-17 02:20:36 +04:00
}
2006-03-22 11:08:11 +03:00
if ( ( cachep - > buffer_size % PAGE_SIZE ) = = 0 & &
OFF_SLAB ( cachep ) & & cachep - > flags & SLAB_POISON )
2006-01-08 12:00:37 +03:00
kernel_map_pages ( virt_to_page ( objp ) ,
2006-02-01 14:05:42 +03:00
cachep - > buffer_size / PAGE_SIZE , 0 ) ;
2005-04-17 02:20:36 +04:00
# else
if ( cachep - > ctor )
2007-10-17 10:25:51 +04:00
cachep - > ctor ( cachep , objp ) ;
2005-04-17 02:20:36 +04:00
# endif
2006-01-08 12:00:37 +03:00
slab_bufctl ( slabp ) [ i ] = i + 1 ;
2005-04-17 02:20:36 +04:00
}
2006-01-08 12:00:37 +03:00
slab_bufctl ( slabp ) [ i - 1 ] = BUFCTL_END ;
2005-04-17 02:20:36 +04:00
}
2006-02-01 14:05:50 +03:00
static void kmem_flagcheck ( struct kmem_cache * cachep , gfp_t flags )
2005-04-17 02:20:36 +04:00
{
2007-02-10 12:43:10 +03:00
if ( CONFIG_ZONE_DMA_FLAG ) {
if ( flags & GFP_DMA )
BUG_ON ( ! ( cachep - > gfpflags & GFP_DMA ) ) ;
else
BUG_ON ( cachep - > gfpflags & GFP_DMA ) ;
}
2005-04-17 02:20:36 +04:00
}
2006-03-22 11:08:11 +03:00
static void * slab_get_obj ( struct kmem_cache * cachep , struct slab * slabp ,
int nodeid )
2006-02-01 14:05:47 +03:00
{
2006-03-22 11:08:10 +03:00
void * objp = index_to_obj ( cachep , slabp , slabp - > free ) ;
2006-02-01 14:05:47 +03:00
kmem_bufctl_t next ;
slabp - > inuse + + ;
next = slab_bufctl ( slabp ) [ slabp - > free ] ;
# if DEBUG
slab_bufctl ( slabp ) [ slabp - > free ] = BUFCTL_FREE ;
WARN_ON ( slabp - > nodeid ! = nodeid ) ;
# endif
slabp - > free = next ;
return objp ;
}
2006-03-22 11:08:11 +03:00
static void slab_put_obj ( struct kmem_cache * cachep , struct slab * slabp ,
void * objp , int nodeid )
2006-02-01 14:05:47 +03:00
{
2006-03-22 11:08:10 +03:00
unsigned int objnr = obj_to_index ( cachep , slabp , objp ) ;
2006-02-01 14:05:47 +03:00
# if DEBUG
/* Verify that the slab belongs to the intended node */
WARN_ON ( slabp - > nodeid ! = nodeid ) ;
2006-03-25 14:06:39 +03:00
if ( slab_bufctl ( slabp ) [ objnr ] + 1 < = SLAB_LIMIT + 1 ) {
2006-02-01 14:05:47 +03:00
printk ( KERN_ERR " slab: double free detected in cache "
2006-03-22 11:08:11 +03:00
" '%s', objp %p \n " , cachep - > name , objp ) ;
2006-02-01 14:05:47 +03:00
BUG ( ) ;
}
# endif
slab_bufctl ( slabp ) [ objnr ] = slabp - > free ;
slabp - > free = objnr ;
slabp - > inuse - - ;
}
2006-06-23 13:03:07 +04:00
/*
* Map pages beginning at addr to the given cache and slab . This is required
* for the slab allocator to be able to lookup the cache and slab of a
* virtual address for kfree , ksize , kmem_ptr_validate , and slab debugging .
*/
static void slab_map_pages ( struct kmem_cache * cache , struct slab * slab ,
void * addr )
2005-04-17 02:20:36 +04:00
{
2006-06-23 13:03:07 +04:00
int nr_pages ;
2005-04-17 02:20:36 +04:00
struct page * page ;
2006-06-23 13:03:07 +04:00
page = virt_to_page ( addr ) ;
2006-03-22 11:08:34 +03:00
2006-06-23 13:03:07 +04:00
nr_pages = 1 ;
2006-03-22 11:08:34 +03:00
if ( likely ( ! PageCompound ( page ) ) )
2006-06-23 13:03:07 +04:00
nr_pages < < = cache - > gfporder ;
2005-04-17 02:20:36 +04:00
do {
2006-06-23 13:03:07 +04:00
page_set_cache ( page , cache ) ;
page_set_slab ( page , slab ) ;
2005-04-17 02:20:36 +04:00
page + + ;
2006-06-23 13:03:07 +04:00
} while ( - - nr_pages ) ;
2005-04-17 02:20:36 +04:00
}
/*
* Grow ( by 1 ) the number of slabs within a cache . This is called by
* kmem_cache_alloc ( ) when there are no active objs left in a cache .
*/
2006-12-07 07:33:29 +03:00
static int cache_grow ( struct kmem_cache * cachep ,
gfp_t flags , int nodeid , void * objp )
2005-04-17 02:20:36 +04:00
{
2006-01-08 12:00:37 +03:00
struct slab * slabp ;
size_t offset ;
gfp_t local_flags ;
2005-09-10 00:03:32 +04:00
struct kmem_list3 * l3 ;
2005-04-17 02:20:36 +04:00
2006-03-22 11:08:11 +03:00
/*
* Be lazy and only check for valid flags here , keeping it out of the
* critical path in kmem_cache_alloc ( ) .
2005-04-17 02:20:36 +04:00
*/
2007-10-16 12:25:41 +04:00
BUG_ON ( flags & GFP_SLAB_BUG_MASK ) ;
local_flags = flags & ( GFP_CONSTRAINT_MASK | GFP_RECLAIM_MASK ) ;
2005-04-17 02:20:36 +04:00
2006-02-05 10:27:56 +03:00
/* Take the l3 list lock to change the colour_next on this node */
2005-04-17 02:20:36 +04:00
check_irq_off ( ) ;
2006-02-05 10:27:56 +03:00
l3 = cachep - > nodelists [ nodeid ] ;
spin_lock ( & l3 - > list_lock ) ;
2005-04-17 02:20:36 +04:00
/* Get colour for the slab, and cal the next value. */
2006-02-05 10:27:56 +03:00
offset = l3 - > colour_next ;
l3 - > colour_next + + ;
if ( l3 - > colour_next > = cachep - > colour )
l3 - > colour_next = 0 ;
spin_unlock ( & l3 - > list_lock ) ;
2005-04-17 02:20:36 +04:00
2006-02-05 10:27:56 +03:00
offset * = cachep - > colour_off ;
2005-04-17 02:20:36 +04:00
if ( local_flags & __GFP_WAIT )
local_irq_enable ( ) ;
/*
* The test for missing atomic flag is performed here , rather than
* the more obvious place , simply to reduce the critical path length
* in kmem_cache_alloc ( ) . If a caller is seriously mis - behaving they
* will eventually be caught here ( where it matters ) .
*/
kmem_flagcheck ( cachep , flags ) ;
2006-03-22 11:08:11 +03:00
/*
* Get mem for the objs . Attempt to allocate a physical page from
* ' nodeid ' .
2005-09-10 00:03:32 +04:00
*/
2006-12-07 07:33:29 +03:00
if ( ! objp )
2007-07-24 23:02:40 +04:00
objp = kmem_getpages ( cachep , local_flags , nodeid ) ;
2006-03-22 11:08:11 +03:00
if ( ! objp )
2005-04-17 02:20:36 +04:00
goto failed ;
/* Get slab management. */
2006-12-07 07:33:29 +03:00
slabp = alloc_slabmgmt ( cachep , objp , offset ,
2007-10-16 12:25:41 +04:00
local_flags & ~ GFP_CONSTRAINT_MASK , nodeid ) ;
2006-03-22 11:08:11 +03:00
if ( ! slabp )
2005-04-17 02:20:36 +04:00
goto opps1 ;
2006-06-23 13:03:07 +04:00
slab_map_pages ( cachep , slabp , objp ) ;
2005-04-17 02:20:36 +04:00
2007-05-17 09:10:57 +04:00
cache_init_objs ( cachep , slabp ) ;
2005-04-17 02:20:36 +04:00
if ( local_flags & __GFP_WAIT )
local_irq_disable ( ) ;
check_irq_off ( ) ;
2005-09-10 00:03:32 +04:00
spin_lock ( & l3 - > list_lock ) ;
2005-04-17 02:20:36 +04:00
/* Make slab active. */
2005-09-10 00:03:32 +04:00
list_add_tail ( & slabp - > list , & ( l3 - > slabs_free ) ) ;
2005-04-17 02:20:36 +04:00
STATS_INC_GROWN ( cachep ) ;
2005-09-10 00:03:32 +04:00
l3 - > free_objects + = cachep - > num ;
spin_unlock ( & l3 - > list_lock ) ;
2005-04-17 02:20:36 +04:00
return 1 ;
2006-03-22 11:08:11 +03:00
opps1 :
2005-04-17 02:20:36 +04:00
kmem_freepages ( cachep , objp ) ;
2006-03-22 11:08:11 +03:00
failed :
2005-04-17 02:20:36 +04:00
if ( local_flags & __GFP_WAIT )
local_irq_disable ( ) ;
return 0 ;
}
# if DEBUG
/*
* Perform extra freeing checks :
* - detect bad pointers .
* - POISON / RED_ZONE checking
*/
static void kfree_debugcheck ( const void * objp )
{
if ( ! virt_addr_valid ( objp ) ) {
printk ( KERN_ERR " kfree_debugcheck: out of range ptr %lxh. \n " ,
2006-01-08 12:00:37 +03:00
( unsigned long ) objp ) ;
BUG ( ) ;
2005-04-17 02:20:36 +04:00
}
}
2006-06-23 13:03:24 +04:00
static inline void verify_redzone_free ( struct kmem_cache * cache , void * obj )
{
Increase slab redzone to 64bits
There are two problems with the existing redzone implementation.
Firstly, it's causing misalignment of structures which contain a 64-bit
integer, such as netfilter's 'struct ipt_entry' -- causing netfilter
modules to fail to load because of the misalignment. (In particular, the
first check in
net/ipv4/netfilter/ip_tables.c::check_entry_size_and_hooks())
On ppc32 and sparc32, amongst others, __alignof__(uint64_t) == 8.
With slab debugging, we use 32-bit redzones. And allocated slab objects
aren't sufficiently aligned to hold a structure containing a uint64_t.
By _just_ setting ARCH_KMALLOC_MINALIGN to __alignof__(u64) we'd disable
redzone checks on those architectures. By using 64-bit redzones we avoid that
loss of debugging, and also fix the other problem while we're at it.
When investigating this, I noticed that on 64-bit platforms we're using a
32-bit value of RED_ACTIVE/RED_INACTIVE in the 64-bit memory location set
aside for the redzone. Which means that the four bytes immediately before
or after the allocated object at 0x00,0x00,0x00,0x00 for LE and BE
machines, respectively. Which is probably not the most useful choice of
poison value.
One way to fix both of those at once is just to switch to 64-bit
redzones in all cases.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Acked-by: Pekka Enberg <penberg@cs.helsinki.fi>
Cc: Christoph Lameter <clameter@engr.sgi.com>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-05-08 11:22:59 +04:00
unsigned long long redzone1 , redzone2 ;
2006-06-23 13:03:24 +04:00
redzone1 = * dbg_redzone1 ( cache , obj ) ;
redzone2 = * dbg_redzone2 ( cache , obj ) ;
/*
* Redzone is ok .
*/
if ( redzone1 = = RED_ACTIVE & & redzone2 = = RED_ACTIVE )
return ;
if ( redzone1 = = RED_INACTIVE & & redzone2 = = RED_INACTIVE )
slab_error ( cache , " double free detected " ) ;
else
slab_error ( cache , " memory outside object was overwritten " ) ;
Increase slab redzone to 64bits
There are two problems with the existing redzone implementation.
Firstly, it's causing misalignment of structures which contain a 64-bit
integer, such as netfilter's 'struct ipt_entry' -- causing netfilter
modules to fail to load because of the misalignment. (In particular, the
first check in
net/ipv4/netfilter/ip_tables.c::check_entry_size_and_hooks())
On ppc32 and sparc32, amongst others, __alignof__(uint64_t) == 8.
With slab debugging, we use 32-bit redzones. And allocated slab objects
aren't sufficiently aligned to hold a structure containing a uint64_t.
By _just_ setting ARCH_KMALLOC_MINALIGN to __alignof__(u64) we'd disable
redzone checks on those architectures. By using 64-bit redzones we avoid that
loss of debugging, and also fix the other problem while we're at it.
When investigating this, I noticed that on 64-bit platforms we're using a
32-bit value of RED_ACTIVE/RED_INACTIVE in the 64-bit memory location set
aside for the redzone. Which means that the four bytes immediately before
or after the allocated object at 0x00,0x00,0x00,0x00 for LE and BE
machines, respectively. Which is probably not the most useful choice of
poison value.
One way to fix both of those at once is just to switch to 64-bit
redzones in all cases.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Acked-by: Pekka Enberg <penberg@cs.helsinki.fi>
Cc: Christoph Lameter <clameter@engr.sgi.com>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-05-08 11:22:59 +04:00
printk ( KERN_ERR " %p: redzone 1:0x%llx, redzone 2:0x%llx. \n " ,
2006-06-23 13:03:24 +04:00
obj , redzone1 , redzone2 ) ;
}
2006-02-01 14:05:50 +03:00
static void * cache_free_debugcheck ( struct kmem_cache * cachep , void * objp ,
2006-01-08 12:00:37 +03:00
void * caller )
2005-04-17 02:20:36 +04:00
{
struct page * page ;
unsigned int objnr ;
struct slab * slabp ;
2007-11-29 22:05:13 +03:00
BUG_ON ( virt_to_cache ( objp ) ! = cachep ) ;
2006-02-01 14:05:42 +03:00
objp - = obj_offset ( cachep ) ;
2005-04-17 02:20:36 +04:00
kfree_debugcheck ( objp ) ;
2007-05-07 01:49:41 +04:00
page = virt_to_head_page ( objp ) ;
2005-04-17 02:20:36 +04:00
2005-11-14 03:06:46 +03:00
slabp = page_get_slab ( page ) ;
2005-04-17 02:20:36 +04:00
if ( cachep - > flags & SLAB_RED_ZONE ) {
2006-06-23 13:03:24 +04:00
verify_redzone_free ( cachep , objp ) ;
2005-04-17 02:20:36 +04:00
* dbg_redzone1 ( cachep , objp ) = RED_INACTIVE ;
* dbg_redzone2 ( cachep , objp ) = RED_INACTIVE ;
}
if ( cachep - > flags & SLAB_STORE_USER )
* dbg_userword ( cachep , objp ) = caller ;
2006-03-22 11:08:10 +03:00
objnr = obj_to_index ( cachep , slabp , objp ) ;
2005-04-17 02:20:36 +04:00
BUG_ON ( objnr > = cachep - > num ) ;
2006-03-22 11:08:10 +03:00
BUG_ON ( objp ! = index_to_obj ( cachep , slabp , objnr ) ) ;
2005-04-17 02:20:36 +04:00
2006-03-25 14:06:39 +03:00
# ifdef CONFIG_DEBUG_SLAB_LEAK
slab_bufctl ( slabp ) [ objnr ] = BUFCTL_FREE ;
# endif
2005-04-17 02:20:36 +04:00
if ( cachep - > flags & SLAB_POISON ) {
# ifdef CONFIG_DEBUG_PAGEALLOC
2006-03-22 11:08:11 +03:00
if ( ( cachep - > buffer_size % PAGE_SIZE ) = = 0 & & OFF_SLAB ( cachep ) ) {
2005-04-17 02:20:36 +04:00
store_stackinfo ( cachep , objp , ( unsigned long ) caller ) ;
2006-01-08 12:00:37 +03:00
kernel_map_pages ( virt_to_page ( objp ) ,
2006-02-01 14:05:42 +03:00
cachep - > buffer_size / PAGE_SIZE , 0 ) ;
2005-04-17 02:20:36 +04:00
} else {
poison_obj ( cachep , objp , POISON_FREE ) ;
}
# else
poison_obj ( cachep , objp , POISON_FREE ) ;
# endif
}
return objp ;
}
2006-02-01 14:05:50 +03:00
static void check_slabp ( struct kmem_cache * cachep , struct slab * slabp )
2005-04-17 02:20:36 +04:00
{
kmem_bufctl_t i ;
int entries = 0 ;
2006-01-08 12:00:37 +03:00
2005-04-17 02:20:36 +04:00
/* Check slab's freelist to see if this obj is there. */
for ( i = slabp - > free ; i ! = BUFCTL_END ; i = slab_bufctl ( slabp ) [ i ] ) {
entries + + ;
if ( entries > cachep - > num | | i > = cachep - > num )
goto bad ;
}
if ( entries ! = cachep - > num - slabp - > inuse ) {
2006-03-22 11:08:11 +03:00
bad :
printk ( KERN_ERR " slab: Internal list corruption detected in "
" cache '%s'(%d), slabp %p(%d). Hexdump: \n " ,
cachep - > name , cachep - > num , slabp , slabp - > inuse ) ;
2006-01-08 12:00:37 +03:00
for ( i = 0 ;
2006-03-06 23:10:07 +03:00
i < sizeof ( * slabp ) + cachep - > num * sizeof ( kmem_bufctl_t ) ;
2006-01-08 12:00:37 +03:00
i + + ) {
2006-03-22 11:08:11 +03:00
if ( i % 16 = = 0 )
2005-04-17 02:20:36 +04:00
printk ( " \n %03x: " , i ) ;
2006-01-08 12:00:37 +03:00
printk ( " %02x " , ( ( unsigned char * ) slabp ) [ i ] ) ;
2005-04-17 02:20:36 +04:00
}
printk ( " \n " ) ;
BUG ( ) ;
}
}
# else
# define kfree_debugcheck(x) do { } while(0)
# define cache_free_debugcheck(x,objp,z) (objp)
# define check_slabp(x,y) do { } while(0)
# endif
2006-02-01 14:05:50 +03:00
static void * cache_alloc_refill ( struct kmem_cache * cachep , gfp_t flags )
2005-04-17 02:20:36 +04:00
{
int batchcount ;
struct kmem_list3 * l3 ;
struct array_cache * ac ;
2006-10-06 11:43:52 +04:00
int node ;
2008-03-06 02:04:59 +03:00
retry :
2005-04-17 02:20:36 +04:00
check_irq_off ( ) ;
2008-03-06 02:04:59 +03:00
node = numa_node_id ( ) ;
2006-02-01 14:05:49 +03:00
ac = cpu_cache_get ( cachep ) ;
2005-04-17 02:20:36 +04:00
batchcount = ac - > batchcount ;
if ( ! ac - > touched & & batchcount > BATCHREFILL_LIMIT ) {
2006-03-22 11:08:11 +03:00
/*
* If there was little recent activity on this cache , then
* perform only a partial refill . Otherwise we could generate
* refill bouncing .
2005-04-17 02:20:36 +04:00
*/
batchcount = BATCHREFILL_LIMIT ;
}
2006-10-06 11:43:52 +04:00
l3 = cachep - > nodelists [ node ] ;
2005-09-10 00:03:32 +04:00
BUG_ON ( ac - > avail > 0 | | ! l3 ) ;
spin_lock ( & l3 - > list_lock ) ;
2005-04-17 02:20:36 +04:00
2006-03-25 14:06:44 +03:00
/* See if we can refill from the shared array */
if ( l3 - > shared & & transfer_objects ( ac , l3 - > shared , batchcount ) )
goto alloc_done ;
2005-04-17 02:20:36 +04:00
while ( batchcount > 0 ) {
struct list_head * entry ;
struct slab * slabp ;
/* Get slab alloc is to come from. */
entry = l3 - > slabs_partial . next ;
if ( entry = = & l3 - > slabs_partial ) {
l3 - > free_touched = 1 ;
entry = l3 - > slabs_free . next ;
if ( entry = = & l3 - > slabs_free )
goto must_grow ;
}
slabp = list_entry ( entry , struct slab , list ) ;
check_slabp ( cachep , slabp ) ;
check_spinlock_acquired ( cachep ) ;
2007-05-07 01:49:03 +04:00
/*
* The slab was either on partial or free list so
* there must be at least one object available for
* allocation .
*/
BUG_ON ( slabp - > inuse < 0 | | slabp - > inuse > = cachep - > num ) ;
2005-04-17 02:20:36 +04:00
while ( slabp - > inuse < cachep - > num & & batchcount - - ) {
STATS_INC_ALLOCED ( cachep ) ;
STATS_INC_ACTIVE ( cachep ) ;
STATS_SET_HIGH ( cachep ) ;
2006-02-01 14:05:47 +03:00
ac - > entry [ ac - > avail + + ] = slab_get_obj ( cachep , slabp ,
2006-10-06 11:43:52 +04:00
node ) ;
2005-04-17 02:20:36 +04:00
}
check_slabp ( cachep , slabp ) ;
/* move slabp to correct slabp list: */
list_del ( & slabp - > list ) ;
if ( slabp - > free = = BUFCTL_END )
list_add ( & slabp - > list , & l3 - > slabs_full ) ;
else
list_add ( & slabp - > list , & l3 - > slabs_partial ) ;
}
2006-03-22 11:08:11 +03:00
must_grow :
2005-04-17 02:20:36 +04:00
l3 - > free_objects - = ac - > avail ;
2006-03-22 11:08:11 +03:00
alloc_done :
2005-09-10 00:03:32 +04:00
spin_unlock ( & l3 - > list_lock ) ;
2005-04-17 02:20:36 +04:00
if ( unlikely ( ! ac - > avail ) ) {
int x ;
2006-12-07 07:33:29 +03:00
x = cache_grow ( cachep , flags | GFP_THISNODE , node , NULL ) ;
2005-09-10 00:03:32 +04:00
2006-03-22 11:08:11 +03:00
/* cache_grow can reenable interrupts, then ac could change. */
2006-02-01 14:05:49 +03:00
ac = cpu_cache_get ( cachep ) ;
2006-03-22 11:08:11 +03:00
if ( ! x & & ac - > avail = = 0 ) /* no objects in sight? abort */
2005-04-17 02:20:36 +04:00
return NULL ;
2006-03-22 11:08:11 +03:00
if ( ! ac - > avail ) /* objects refilled by interrupt? */
2005-04-17 02:20:36 +04:00
goto retry ;
}
ac - > touched = 1 ;
2005-09-10 00:03:32 +04:00
return ac - > entry [ - - ac - > avail ] ;
2005-04-17 02:20:36 +04:00
}
2006-03-22 11:08:11 +03:00
static inline void cache_alloc_debugcheck_before ( struct kmem_cache * cachep ,
gfp_t flags )
2005-04-17 02:20:36 +04:00
{
might_sleep_if ( flags & __GFP_WAIT ) ;
# if DEBUG
kmem_flagcheck ( cachep , flags ) ;
# endif
}
# if DEBUG
2006-03-22 11:08:11 +03:00
static void * cache_alloc_debugcheck_after ( struct kmem_cache * cachep ,
gfp_t flags , void * objp , void * caller )
2005-04-17 02:20:36 +04:00
{
2006-01-08 12:00:37 +03:00
if ( ! objp )
2005-04-17 02:20:36 +04:00
return objp ;
2006-01-08 12:00:37 +03:00
if ( cachep - > flags & SLAB_POISON ) {
2005-04-17 02:20:36 +04:00
# ifdef CONFIG_DEBUG_PAGEALLOC
2006-02-01 14:05:42 +03:00
if ( ( cachep - > buffer_size % PAGE_SIZE ) = = 0 & & OFF_SLAB ( cachep ) )
2006-01-08 12:00:37 +03:00
kernel_map_pages ( virt_to_page ( objp ) ,
2006-02-01 14:05:42 +03:00
cachep - > buffer_size / PAGE_SIZE , 1 ) ;
2005-04-17 02:20:36 +04:00
else
check_poison_obj ( cachep , objp ) ;
# else
check_poison_obj ( cachep , objp ) ;
# endif
poison_obj ( cachep , objp , POISON_INUSE ) ;
}
if ( cachep - > flags & SLAB_STORE_USER )
* dbg_userword ( cachep , objp ) = caller ;
if ( cachep - > flags & SLAB_RED_ZONE ) {
2006-03-22 11:08:11 +03:00
if ( * dbg_redzone1 ( cachep , objp ) ! = RED_INACTIVE | |
* dbg_redzone2 ( cachep , objp ) ! = RED_INACTIVE ) {
slab_error ( cachep , " double free, or memory outside "
" object was overwritten " ) ;
2006-01-08 12:00:37 +03:00
printk ( KERN_ERR
Increase slab redzone to 64bits
There are two problems with the existing redzone implementation.
Firstly, it's causing misalignment of structures which contain a 64-bit
integer, such as netfilter's 'struct ipt_entry' -- causing netfilter
modules to fail to load because of the misalignment. (In particular, the
first check in
net/ipv4/netfilter/ip_tables.c::check_entry_size_and_hooks())
On ppc32 and sparc32, amongst others, __alignof__(uint64_t) == 8.
With slab debugging, we use 32-bit redzones. And allocated slab objects
aren't sufficiently aligned to hold a structure containing a uint64_t.
By _just_ setting ARCH_KMALLOC_MINALIGN to __alignof__(u64) we'd disable
redzone checks on those architectures. By using 64-bit redzones we avoid that
loss of debugging, and also fix the other problem while we're at it.
When investigating this, I noticed that on 64-bit platforms we're using a
32-bit value of RED_ACTIVE/RED_INACTIVE in the 64-bit memory location set
aside for the redzone. Which means that the four bytes immediately before
or after the allocated object at 0x00,0x00,0x00,0x00 for LE and BE
machines, respectively. Which is probably not the most useful choice of
poison value.
One way to fix both of those at once is just to switch to 64-bit
redzones in all cases.
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Acked-by: Pekka Enberg <penberg@cs.helsinki.fi>
Cc: Christoph Lameter <clameter@engr.sgi.com>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-05-08 11:22:59 +04:00
" %p: redzone 1:0x%llx, redzone 2:0x%llx \n " ,
2006-03-22 11:08:11 +03:00
objp , * dbg_redzone1 ( cachep , objp ) ,
* dbg_redzone2 ( cachep , objp ) ) ;
2005-04-17 02:20:36 +04:00
}
* dbg_redzone1 ( cachep , objp ) = RED_ACTIVE ;
* dbg_redzone2 ( cachep , objp ) = RED_ACTIVE ;
}
2006-03-25 14:06:39 +03:00
# ifdef CONFIG_DEBUG_SLAB_LEAK
{
struct slab * slabp ;
unsigned objnr ;
2007-05-07 01:49:41 +04:00
slabp = page_get_slab ( virt_to_head_page ( objp ) ) ;
2006-03-25 14:06:39 +03:00
objnr = ( unsigned ) ( objp - slabp - > s_mem ) / cachep - > buffer_size ;
slab_bufctl ( slabp ) [ objnr ] = BUFCTL_ACTIVE ;
}
# endif
2006-02-01 14:05:42 +03:00
objp + = obj_offset ( cachep ) ;
2007-05-07 01:50:17 +04:00
if ( cachep - > ctor & & cachep - > flags & SLAB_POISON )
2007-10-17 10:25:51 +04:00
cachep - > ctor ( cachep , objp ) ;
2006-12-07 07:32:11 +03:00
# if ARCH_SLAB_MINALIGN
if ( ( u32 ) objp & ( ARCH_SLAB_MINALIGN - 1 ) ) {
printk ( KERN_ERR " 0x%p: not aligned to ARCH_SLAB_MINALIGN=%d \n " ,
objp , ARCH_SLAB_MINALIGN ) ;
}
# endif
2005-04-17 02:20:36 +04:00
return objp ;
}
# else
# define cache_alloc_debugcheck_after(a,b,objp,d) (objp)
# endif
2006-12-08 13:39:44 +03:00
# ifdef CONFIG_FAILSLAB
static struct failslab_attr {
struct fault_attr attr ;
u32 ignore_gfp_wait ;
# ifdef CONFIG_FAULT_INJECTION_DEBUG_FS
struct dentry * ignore_gfp_wait_file ;
# endif
} failslab = {
. attr = FAULT_ATTR_INITIALIZER ,
2006-12-08 13:39:53 +03:00
. ignore_gfp_wait = 1 ,
2006-12-08 13:39:44 +03:00
} ;
static int __init setup_failslab ( char * str )
{
return setup_fault_attr ( & failslab . attr , str ) ;
}
__setup ( " failslab= " , setup_failslab ) ;
static int should_failslab ( struct kmem_cache * cachep , gfp_t flags )
{
if ( cachep = = & cache_cache )
return 0 ;
if ( flags & __GFP_NOFAIL )
return 0 ;
if ( failslab . ignore_gfp_wait & & ( flags & __GFP_WAIT ) )
return 0 ;
return should_fail ( & failslab . attr , obj_size ( cachep ) ) ;
}
# ifdef CONFIG_FAULT_INJECTION_DEBUG_FS
static int __init failslab_debugfs ( void )
{
mode_t mode = S_IFREG | S_IRUSR | S_IWUSR ;
struct dentry * dir ;
int err ;
2007-05-07 01:49:58 +04:00
err = init_fault_attr_dentries ( & failslab . attr , " failslab " ) ;
2006-12-08 13:39:44 +03:00
if ( err )
return err ;
dir = failslab . attr . dentries . dir ;
failslab . ignore_gfp_wait_file =
debugfs_create_bool ( " ignore-gfp-wait " , mode , dir ,
& failslab . ignore_gfp_wait ) ;
if ( ! failslab . ignore_gfp_wait_file ) {
err = - ENOMEM ;
debugfs_remove ( failslab . ignore_gfp_wait_file ) ;
cleanup_fault_attr_dentries ( & failslab . attr ) ;
}
return err ;
}
late_initcall ( failslab_debugfs ) ;
# endif /* CONFIG_FAULT_INJECTION_DEBUG_FS */
# else /* CONFIG_FAILSLAB */
static inline int should_failslab ( struct kmem_cache * cachep , gfp_t flags )
{
return 0 ;
}
# endif /* CONFIG_FAILSLAB */
2006-02-01 14:05:50 +03:00
static inline void * ____cache_alloc ( struct kmem_cache * cachep , gfp_t flags )
2005-04-17 02:20:36 +04:00
{
2006-01-08 12:00:37 +03:00
void * objp ;
2005-04-17 02:20:36 +04:00
struct array_cache * ac ;
2005-09-28 08:45:46 +04:00
check_irq_off ( ) ;
2006-12-08 13:39:44 +03:00
2006-02-01 14:05:49 +03:00
ac = cpu_cache_get ( cachep ) ;
2005-04-17 02:20:36 +04:00
if ( likely ( ac - > avail ) ) {
STATS_INC_ALLOCHIT ( cachep ) ;
ac - > touched = 1 ;
2005-09-10 00:03:32 +04:00
objp = ac - > entry [ - - ac - > avail ] ;
2005-04-17 02:20:36 +04:00
} else {
STATS_INC_ALLOCMISS ( cachep ) ;
objp = cache_alloc_refill ( cachep , flags ) ;
}
2005-09-28 08:45:46 +04:00
return objp ;
}
2005-09-10 00:03:32 +04:00
# ifdef CONFIG_NUMA
2006-03-24 14:16:08 +03:00
/*
2006-03-24 14:16:12 +03:00
* Try allocating on another node if PF_SPREAD_SLAB | PF_MEMPOLICY .
2006-03-24 14:16:08 +03:00
*
* If we are in_interrupt , then process context , including cpusets and
* mempolicy , may not apply and should not be used for allocation policy .
*/
static void * alternate_node_alloc ( struct kmem_cache * cachep , gfp_t flags )
{
int nid_alloc , nid_here ;
2006-09-27 12:50:08 +04:00
if ( in_interrupt ( ) | | ( flags & __GFP_THISNODE ) )
2006-03-24 14:16:08 +03:00
return NULL ;
nid_alloc = nid_here = numa_node_id ( ) ;
if ( cpuset_do_slab_mem_spread ( ) & & ( cachep - > flags & SLAB_MEM_SPREAD ) )
nid_alloc = cpuset_mem_spread_node ( ) ;
else if ( current - > mempolicy )
nid_alloc = slab_node ( current - > mempolicy ) ;
if ( nid_alloc ! = nid_here )
2006-12-07 07:32:30 +03:00
return ____cache_alloc_node ( cachep , flags , nid_alloc ) ;
2006-03-24 14:16:08 +03:00
return NULL ;
}
2006-09-27 12:50:08 +04:00
/*
* Fallback function if there was no memory available and no objects on a
2006-12-07 07:33:29 +03:00
* certain node and fall back is permitted . First we scan all the
* available nodelists for available objects . If that fails then we
* perform an allocation without specifying a node . This allows the page
* allocator to do its reclaim / fallback magic . We then insert the
* slab into the proper nodelist and then allocate from it .
2006-09-27 12:50:08 +04:00
*/
2007-02-10 12:42:53 +03:00
static void * fallback_alloc ( struct kmem_cache * cache , gfp_t flags )
2006-09-27 12:50:08 +04:00
{
2007-02-10 12:42:53 +03:00
struct zonelist * zonelist ;
gfp_t local_flags ;
2006-09-27 12:50:08 +04:00
struct zone * * z ;
void * obj = NULL ;
2006-12-07 07:33:29 +03:00
int nid ;
2007-02-10 12:42:53 +03:00
if ( flags & __GFP_THISNODE )
return NULL ;
zonelist = & NODE_DATA ( slab_node ( current - > mempolicy ) )
- > node_zonelists [ gfp_zone ( flags ) ] ;
2007-10-16 12:25:41 +04:00
local_flags = flags & ( GFP_CONSTRAINT_MASK | GFP_RECLAIM_MASK ) ;
2006-09-27 12:50:08 +04:00
2006-12-07 07:33:29 +03:00
retry :
/*
* Look through allowed nodes for objects available
* from existing per node queues .
*/
2006-10-21 21:24:16 +04:00
for ( z = zonelist - > zones ; * z & & ! obj ; z + + ) {
2006-12-07 07:33:29 +03:00
nid = zone_to_nid ( * z ) ;
2006-10-21 21:24:16 +04:00
[PATCH] cpuset: rework cpuset_zone_allowed api
Elaborate the API for calling cpuset_zone_allowed(), so that users have to
explicitly choose between the two variants:
cpuset_zone_allowed_hardwall()
cpuset_zone_allowed_softwall()
Until now, whether or not you got the hardwall flavor depended solely on
whether or not you or'd in the __GFP_HARDWALL gfp flag to the gfp_mask
argument.
If you didn't specify __GFP_HARDWALL, you implicitly got the softwall
version.
Unfortunately, this meant that users would end up with the softwall version
without thinking about it. Since only the softwall version might sleep,
this led to bugs with possible sleeping in interrupt context on more than
one occassion.
The hardwall version requires that the current tasks mems_allowed allows
the node of the specified zone (or that you're in interrupt or that
__GFP_THISNODE is set or that you're on a one cpuset system.)
The softwall version, depending on the gfp_mask, might allow a node if it
was allowed in the nearest enclusing cpuset marked mem_exclusive (which
requires taking the cpuset lock 'callback_mutex' to evaluate.)
This patch removes the cpuset_zone_allowed() call, and forces the caller to
explicitly choose between the hardwall and the softwall case.
If the caller wants the gfp_mask to determine this choice, they should (1)
be sure they can sleep or that __GFP_HARDWALL is set, and (2) invoke the
cpuset_zone_allowed_softwall() routine.
This adds another 100 or 200 bytes to the kernel text space, due to the few
lines of nearly duplicate code at the top of both cpuset_zone_allowed_*
routines. It should save a few instructions executed for the calls that
turned into calls of cpuset_zone_allowed_hardwall, thanks to not having to
set (before the call) then check (within the call) the __GFP_HARDWALL flag.
For the most critical call, from get_page_from_freelist(), the same
instructions are executed as before -- the old cpuset_zone_allowed()
routine it used to call is the same code as the
cpuset_zone_allowed_softwall() routine that it calls now.
Not a perfect win, but seems worth it, to reduce this chance of hitting a
sleeping with irq off complaint again.
Signed-off-by: Paul Jackson <pj@sgi.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-13 11:34:25 +03:00
if ( cpuset_zone_allowed_hardwall ( * z , flags ) & &
2006-12-07 07:33:29 +03:00
cache - > nodelists [ nid ] & &
cache - > nodelists [ nid ] - > free_objects )
obj = ____cache_alloc_node ( cache ,
flags | GFP_THISNODE , nid ) ;
}
2007-05-07 01:50:17 +04:00
if ( ! obj ) {
2006-12-07 07:33:29 +03:00
/*
* This allocation will be performed within the constraints
* of the current cpuset / memory policy requirements .
* We may trigger various forms of reclaim on the allowed
* set and go into memory reserves if necessary .
*/
2006-12-13 11:34:11 +03:00
if ( local_flags & __GFP_WAIT )
local_irq_enable ( ) ;
kmem_flagcheck ( cache , flags ) ;
2008-03-04 23:24:22 +03:00
obj = kmem_getpages ( cache , local_flags , - 1 ) ;
2006-12-13 11:34:11 +03:00
if ( local_flags & __GFP_WAIT )
local_irq_disable ( ) ;
2006-12-07 07:33:29 +03:00
if ( obj ) {
/*
* Insert into the appropriate per node queues
*/
nid = page_to_nid ( virt_to_page ( obj ) ) ;
if ( cache_grow ( cache , flags , nid , obj ) ) {
obj = ____cache_alloc_node ( cache ,
flags | GFP_THISNODE , nid ) ;
if ( ! obj )
/*
* Another processor may allocate the
* objects in the slab since we are
* not holding any locks .
*/
goto retry ;
} else {
2007-01-06 03:36:36 +03:00
/* cache_grow already freed obj */
2006-12-07 07:33:29 +03:00
obj = NULL ;
}
}
2006-10-21 21:24:16 +04:00
}
2006-09-27 12:50:08 +04:00
return obj ;
}
2005-09-10 00:03:32 +04:00
/*
* A interface to enable slab creation on nodeid
2005-04-17 02:20:36 +04:00
*/
2006-12-07 07:32:30 +03:00
static void * ____cache_alloc_node ( struct kmem_cache * cachep , gfp_t flags ,
2006-03-22 11:08:11 +03:00
int nodeid )
2005-09-10 00:03:32 +04:00
{
struct list_head * entry ;
2006-01-08 12:00:37 +03:00
struct slab * slabp ;
struct kmem_list3 * l3 ;
void * obj ;
int x ;
l3 = cachep - > nodelists [ nodeid ] ;
BUG_ON ( ! l3 ) ;
2006-03-22 11:08:11 +03:00
retry :
2006-02-05 10:27:58 +03:00
check_irq_off ( ) ;
2006-01-08 12:00:37 +03:00
spin_lock ( & l3 - > list_lock ) ;
entry = l3 - > slabs_partial . next ;
if ( entry = = & l3 - > slabs_partial ) {
l3 - > free_touched = 1 ;
entry = l3 - > slabs_free . next ;
if ( entry = = & l3 - > slabs_free )
goto must_grow ;
}
slabp = list_entry ( entry , struct slab , list ) ;
check_spinlock_acquired_node ( cachep , nodeid ) ;
check_slabp ( cachep , slabp ) ;
STATS_INC_NODEALLOCS ( cachep ) ;
STATS_INC_ACTIVE ( cachep ) ;
STATS_SET_HIGH ( cachep ) ;
BUG_ON ( slabp - > inuse = = cachep - > num ) ;
2006-02-01 14:05:47 +03:00
obj = slab_get_obj ( cachep , slabp , nodeid ) ;
2006-01-08 12:00:37 +03:00
check_slabp ( cachep , slabp ) ;
l3 - > free_objects - - ;
/* move slabp to correct slabp list: */
list_del ( & slabp - > list ) ;
2006-03-22 11:08:11 +03:00
if ( slabp - > free = = BUFCTL_END )
2006-01-08 12:00:37 +03:00
list_add ( & slabp - > list , & l3 - > slabs_full ) ;
2006-03-22 11:08:11 +03:00
else
2006-01-08 12:00:37 +03:00
list_add ( & slabp - > list , & l3 - > slabs_partial ) ;
2005-09-10 00:03:32 +04:00
2006-01-08 12:00:37 +03:00
spin_unlock ( & l3 - > list_lock ) ;
goto done ;
2005-09-10 00:03:32 +04:00
2006-03-22 11:08:11 +03:00
must_grow :
2006-01-08 12:00:37 +03:00
spin_unlock ( & l3 - > list_lock ) ;
2006-12-07 07:33:29 +03:00
x = cache_grow ( cachep , flags | GFP_THISNODE , nodeid , NULL ) ;
2006-09-27 12:50:08 +04:00
if ( x )
goto retry ;
2005-04-17 02:20:36 +04:00
2007-02-10 12:42:53 +03:00
return fallback_alloc ( cachep , flags ) ;
2005-09-10 00:03:32 +04:00
2006-03-22 11:08:11 +03:00
done :
2006-01-08 12:00:37 +03:00
return obj ;
2005-09-10 00:03:32 +04:00
}
2007-02-10 12:42:53 +03:00
/**
* kmem_cache_alloc_node - Allocate an object on the specified node
* @ cachep : The cache to allocate from .
* @ flags : See kmalloc ( ) .
* @ nodeid : node number of the target node .
* @ caller : return address of caller , used for debug information
*
* Identical to kmem_cache_alloc but it will allocate memory on the given
* node , which can improve the performance for cpu bound structures .
*
* Fallback to other node is possible if __GFP_THISNODE is not set .
*/
static __always_inline void *
__cache_alloc_node ( struct kmem_cache * cachep , gfp_t flags , int nodeid ,
void * caller )
{
unsigned long save_flags ;
void * ptr ;
2007-05-07 01:49:58 +04:00
if ( should_failslab ( cachep , flags ) )
return NULL ;
2007-02-10 12:42:53 +03:00
cache_alloc_debugcheck_before ( cachep , flags ) ;
local_irq_save ( save_flags ) ;
if ( unlikely ( nodeid = = - 1 ) )
nodeid = numa_node_id ( ) ;
if ( unlikely ( ! cachep - > nodelists [ nodeid ] ) ) {
/* Node not bootstrapped yet */
ptr = fallback_alloc ( cachep , flags ) ;
goto out ;
}
if ( nodeid = = numa_node_id ( ) ) {
/*
* Use the locally cached objects if possible .
* However ____cache_alloc does not allow fallback
* to other nodes . It may fail while we still have
* objects on other nodes available .
*/
ptr = ____cache_alloc ( cachep , flags ) ;
if ( ptr )
goto out ;
}
/* ___cache_alloc_node can fall back to other nodes */
ptr = ____cache_alloc_node ( cachep , flags , nodeid ) ;
out :
local_irq_restore ( save_flags ) ;
ptr = cache_alloc_debugcheck_after ( cachep , flags , ptr , caller ) ;
2007-07-17 15:03:23 +04:00
if ( unlikely ( ( flags & __GFP_ZERO ) & & ptr ) )
memset ( ptr , 0 , obj_size ( cachep ) ) ;
2007-02-10 12:42:53 +03:00
return ptr ;
}
static __always_inline void *
__do_cache_alloc ( struct kmem_cache * cache , gfp_t flags )
{
void * objp ;
if ( unlikely ( current - > flags & ( PF_SPREAD_SLAB | PF_MEMPOLICY ) ) ) {
objp = alternate_node_alloc ( cache , flags ) ;
if ( objp )
goto out ;
}
objp = ____cache_alloc ( cache , flags ) ;
/*
* We may just have run out of memory on the local node .
* ____cache_alloc_node ( ) knows how to locate memory on other nodes
*/
if ( ! objp )
objp = ____cache_alloc_node ( cache , flags , numa_node_id ( ) ) ;
out :
return objp ;
}
# else
static __always_inline void *
__do_cache_alloc ( struct kmem_cache * cachep , gfp_t flags )
{
return ____cache_alloc ( cachep , flags ) ;
}
# endif /* CONFIG_NUMA */
static __always_inline void *
__cache_alloc ( struct kmem_cache * cachep , gfp_t flags , void * caller )
{
unsigned long save_flags ;
void * objp ;
2007-05-07 01:49:58 +04:00
if ( should_failslab ( cachep , flags ) )
return NULL ;
2007-02-10 12:42:53 +03:00
cache_alloc_debugcheck_before ( cachep , flags ) ;
local_irq_save ( save_flags ) ;
objp = __do_cache_alloc ( cachep , flags ) ;
local_irq_restore ( save_flags ) ;
objp = cache_alloc_debugcheck_after ( cachep , flags , objp , caller ) ;
prefetchw ( objp ) ;
2007-07-17 15:03:23 +04:00
if ( unlikely ( ( flags & __GFP_ZERO ) & & objp ) )
memset ( objp , 0 , obj_size ( cachep ) ) ;
2007-02-10 12:42:53 +03:00
return objp ;
}
2005-09-10 00:03:32 +04:00
/*
* Caller needs to acquire correct kmem_list ' s list_lock
*/
2006-02-01 14:05:50 +03:00
static void free_block ( struct kmem_cache * cachep , void * * objpp , int nr_objects ,
2006-01-08 12:00:37 +03:00
int node )
2005-04-17 02:20:36 +04:00
{
int i ;
2005-09-10 00:03:32 +04:00
struct kmem_list3 * l3 ;
2005-04-17 02:20:36 +04:00
for ( i = 0 ; i < nr_objects ; i + + ) {
void * objp = objpp [ i ] ;
struct slab * slabp ;
2006-02-01 14:05:49 +03:00
slabp = virt_to_slab ( objp ) ;
2005-09-23 08:44:02 +04:00
l3 = cachep - > nodelists [ node ] ;
2005-04-17 02:20:36 +04:00
list_del ( & slabp - > list ) ;
2005-09-23 08:44:02 +04:00
check_spinlock_acquired_node ( cachep , node ) ;
2005-04-17 02:20:36 +04:00
check_slabp ( cachep , slabp ) ;
2006-02-01 14:05:47 +03:00
slab_put_obj ( cachep , slabp , objp , node ) ;
2005-04-17 02:20:36 +04:00
STATS_DEC_ACTIVE ( cachep ) ;
2005-09-10 00:03:32 +04:00
l3 - > free_objects + + ;
2005-04-17 02:20:36 +04:00
check_slabp ( cachep , slabp ) ;
/* fixup slab chains */
if ( slabp - > inuse = = 0 ) {
2005-09-10 00:03:32 +04:00
if ( l3 - > free_objects > l3 - > free_limit ) {
l3 - > free_objects - = cachep - > num ;
2006-09-26 10:31:34 +04:00
/* No need to drop any previously held
* lock here , even if we have a off - slab slab
* descriptor it is guaranteed to come from
* a different cache , refer to comments before
* alloc_slabmgmt .
*/
2005-04-17 02:20:36 +04:00
slab_destroy ( cachep , slabp ) ;
} else {
2005-09-10 00:03:32 +04:00
list_add ( & slabp - > list , & l3 - > slabs_free ) ;
2005-04-17 02:20:36 +04:00
}
} else {
/* Unconditionally move a slab to the end of the
* partial list on free - maximum time for the
* other objects to be freed , too .
*/
2005-09-10 00:03:32 +04:00
list_add_tail ( & slabp - > list , & l3 - > slabs_partial ) ;
2005-04-17 02:20:36 +04:00
}
}
}
2006-02-01 14:05:50 +03:00
static void cache_flusharray ( struct kmem_cache * cachep , struct array_cache * ac )
2005-04-17 02:20:36 +04:00
{
int batchcount ;
2005-09-10 00:03:32 +04:00
struct kmem_list3 * l3 ;
2005-09-23 08:44:02 +04:00
int node = numa_node_id ( ) ;
2005-04-17 02:20:36 +04:00
batchcount = ac - > batchcount ;
# if DEBUG
BUG_ON ( ! batchcount | | batchcount > ac - > avail ) ;
# endif
check_irq_off ( ) ;
2005-09-23 08:44:02 +04:00
l3 = cachep - > nodelists [ node ] ;
2006-07-13 16:44:38 +04:00
spin_lock ( & l3 - > list_lock ) ;
2005-09-10 00:03:32 +04:00
if ( l3 - > shared ) {
struct array_cache * shared_array = l3 - > shared ;
2006-01-08 12:00:37 +03:00
int max = shared_array - > limit - shared_array - > avail ;
2005-04-17 02:20:36 +04:00
if ( max ) {
if ( batchcount > max )
batchcount = max ;
2005-09-10 00:03:32 +04:00
memcpy ( & ( shared_array - > entry [ shared_array - > avail ] ) ,
2006-01-08 12:00:37 +03:00
ac - > entry , sizeof ( void * ) * batchcount ) ;
2005-04-17 02:20:36 +04:00
shared_array - > avail + = batchcount ;
goto free_done ;
}
}
2005-09-23 08:44:02 +04:00
free_block ( cachep , ac - > entry , batchcount , node ) ;
2006-03-22 11:08:11 +03:00
free_done :
2005-04-17 02:20:36 +04:00
# if STATS
{
int i = 0 ;
struct list_head * p ;
2005-09-10 00:03:32 +04:00
p = l3 - > slabs_free . next ;
while ( p ! = & ( l3 - > slabs_free ) ) {
2005-04-17 02:20:36 +04:00
struct slab * slabp ;
slabp = list_entry ( p , struct slab , list ) ;
BUG_ON ( slabp - > inuse ) ;
i + + ;
p = p - > next ;
}
STATS_SET_FREEABLE ( cachep , i ) ;
}
# endif
2005-09-10 00:03:32 +04:00
spin_unlock ( & l3 - > list_lock ) ;
2005-04-17 02:20:36 +04:00
ac - > avail - = batchcount ;
2006-03-22 11:08:11 +03:00
memmove ( ac - > entry , & ( ac - > entry [ batchcount ] ) , sizeof ( void * ) * ac - > avail ) ;
2005-04-17 02:20:36 +04:00
}
/*
2006-03-22 11:08:11 +03:00
* Release an obj back to its cache . If the obj has a constructed state , it must
* be in this state _before_ it is released . Called with disabled ints .
2005-04-17 02:20:36 +04:00
*/
2006-07-13 16:44:38 +04:00
static inline void __cache_free ( struct kmem_cache * cachep , void * objp )
2005-04-17 02:20:36 +04:00
{
2006-02-01 14:05:49 +03:00
struct array_cache * ac = cpu_cache_get ( cachep ) ;
2005-04-17 02:20:36 +04:00
check_irq_off ( ) ;
objp = cache_free_debugcheck ( cachep , objp , __builtin_return_address ( 0 ) ) ;
2007-08-23 01:01:49 +04:00
/*
* Skip calling cache_free_alien ( ) when the platform is not numa .
* This will avoid cache misses that happen while accessing slabp ( which
* is per page memory reference ) to get nodeid . Instead use a global
* variable to skip the call , which is mostly likely to be present in
* the cache .
*/
if ( numa_platform & & cache_free_alien ( cachep , objp ) )
2006-06-23 13:03:05 +04:00
return ;
2005-04-17 02:20:36 +04:00
if ( likely ( ac - > avail < ac - > limit ) ) {
STATS_INC_FREEHIT ( cachep ) ;
2005-09-10 00:03:32 +04:00
ac - > entry [ ac - > avail + + ] = objp ;
2005-04-17 02:20:36 +04:00
return ;
} else {
STATS_INC_FREEMISS ( cachep ) ;
cache_flusharray ( cachep , ac ) ;
2005-09-10 00:03:32 +04:00
ac - > entry [ ac - > avail + + ] = objp ;
2005-04-17 02:20:36 +04:00
}
}
/**
* kmem_cache_alloc - Allocate an object
* @ cachep : The cache to allocate from .
* @ flags : See kmalloc ( ) .
*
* Allocate an object from this cache . The flags are only relevant
* if the cache has no available objects .
*/
2006-02-01 14:05:50 +03:00
void * kmem_cache_alloc ( struct kmem_cache * cachep , gfp_t flags )
2005-04-17 02:20:36 +04:00
{
2006-02-01 14:05:52 +03:00
return __cache_alloc ( cachep , flags , __builtin_return_address ( 0 ) ) ;
2005-04-17 02:20:36 +04:00
}
EXPORT_SYMBOL ( kmem_cache_alloc ) ;
/**
2008-03-20 03:00:40 +03:00
* kmem_ptr_validate - check if an untrusted pointer might be a slab entry .
2005-04-17 02:20:36 +04:00
* @ cachep : the cache we ' re checking against
* @ ptr : pointer to validate
*
2008-03-20 03:00:40 +03:00
* This verifies that the untrusted pointer looks sane ;
2005-04-17 02:20:36 +04:00
* it is _not_ a guarantee that the pointer is actually
* part of the slab cache in question , but it at least
* validates that the pointer can be dereferenced and
* looks half - way sane .
*
* Currently only used for dentry validation .
*/
2006-12-22 12:06:44 +03:00
int kmem_ptr_validate ( struct kmem_cache * cachep , const void * ptr )
2005-04-17 02:20:36 +04:00
{
2006-01-08 12:00:37 +03:00
unsigned long addr = ( unsigned long ) ptr ;
2005-04-17 02:20:36 +04:00
unsigned long min_addr = PAGE_OFFSET ;
2006-01-08 12:00:37 +03:00
unsigned long align_mask = BYTES_PER_WORD - 1 ;
2006-02-01 14:05:42 +03:00
unsigned long size = cachep - > buffer_size ;
2005-04-17 02:20:36 +04:00
struct page * page ;
if ( unlikely ( addr < min_addr ) )
goto out ;
if ( unlikely ( addr > ( unsigned long ) high_memory - size ) )
goto out ;
if ( unlikely ( addr & align_mask ) )
goto out ;
if ( unlikely ( ! kern_addr_valid ( addr ) ) )
goto out ;
if ( unlikely ( ! kern_addr_valid ( addr + size - 1 ) ) )
goto out ;
page = virt_to_page ( ptr ) ;
if ( unlikely ( ! PageSlab ( page ) ) )
goto out ;
2005-11-14 03:06:46 +03:00
if ( unlikely ( page_get_cache ( page ) ! = cachep ) )
2005-04-17 02:20:36 +04:00
goto out ;
return 1 ;
2006-03-22 11:08:11 +03:00
out :
2005-04-17 02:20:36 +04:00
return 0 ;
}
# ifdef CONFIG_NUMA
2006-12-07 07:32:30 +03:00
void * kmem_cache_alloc_node ( struct kmem_cache * cachep , gfp_t flags , int nodeid )
{
return __cache_alloc_node ( cachep , flags , nodeid ,
__builtin_return_address ( 0 ) ) ;
}
2005-04-17 02:20:36 +04:00
EXPORT_SYMBOL ( kmem_cache_alloc_node ) ;
2006-12-07 07:32:30 +03:00
static __always_inline void *
__do_kmalloc_node ( size_t size , gfp_t flags , int node , void * caller )
2005-05-01 19:58:38 +04:00
{
2006-02-01 14:05:50 +03:00
struct kmem_cache * cachep ;
2005-05-01 19:58:38 +04:00
cachep = kmem_find_general_cachep ( size , flags ) ;
2007-07-17 15:03:22 +04:00
if ( unlikely ( ZERO_OR_NULL_PTR ( cachep ) ) )
return cachep ;
2005-05-01 19:58:38 +04:00
return kmem_cache_alloc_node ( cachep , flags , node ) ;
}
2006-12-07 07:32:30 +03:00
# ifdef CONFIG_DEBUG_SLAB
void * __kmalloc_node ( size_t size , gfp_t flags , int node )
{
return __do_kmalloc_node ( size , flags , node ,
__builtin_return_address ( 0 ) ) ;
}
2006-09-26 10:31:36 +04:00
EXPORT_SYMBOL ( __kmalloc_node ) ;
2006-12-07 07:32:30 +03:00
void * __kmalloc_node_track_caller ( size_t size , gfp_t flags ,
int node , void * caller )
{
return __do_kmalloc_node ( size , flags , node , caller ) ;
}
EXPORT_SYMBOL ( __kmalloc_node_track_caller ) ;
# else
void * __kmalloc_node ( size_t size , gfp_t flags , int node )
{
return __do_kmalloc_node ( size , flags , node , NULL ) ;
}
EXPORT_SYMBOL ( __kmalloc_node ) ;
# endif /* CONFIG_DEBUG_SLAB */
# endif /* CONFIG_NUMA */
2005-04-17 02:20:36 +04:00
/**
2006-06-23 13:03:48 +04:00
* __do_kmalloc - allocate memory
2005-04-17 02:20:36 +04:00
* @ size : how many bytes of memory are required .
2006-06-23 13:03:48 +04:00
* @ flags : the type of memory to allocate ( see kmalloc ) .
2006-03-22 11:08:14 +03:00
* @ caller : function caller for debug tracking of the caller
2005-04-17 02:20:36 +04:00
*/
2006-02-01 14:05:52 +03:00
static __always_inline void * __do_kmalloc ( size_t size , gfp_t flags ,
void * caller )
2005-04-17 02:20:36 +04:00
{
2006-02-01 14:05:50 +03:00
struct kmem_cache * cachep ;
2005-04-17 02:20:36 +04:00
2005-05-01 19:58:38 +04:00
/* If you want to save a few bytes .text space: replace
* __ with kmem_ .
* Then kmalloc uses the uninlined functions instead of the inline
* functions .
*/
cachep = __find_general_cachep ( size , flags ) ;
2007-07-20 00:17:15 +04:00
if ( unlikely ( ZERO_OR_NULL_PTR ( cachep ) ) )
return cachep ;
2006-02-01 14:05:52 +03:00
return __cache_alloc ( cachep , flags , caller ) ;
}
2006-10-04 13:15:25 +04:00
# ifdef CONFIG_DEBUG_SLAB
2006-02-01 14:05:52 +03:00
void * __kmalloc ( size_t size , gfp_t flags )
{
2006-03-25 14:06:39 +03:00
return __do_kmalloc ( size , flags , __builtin_return_address ( 0 ) ) ;
2005-04-17 02:20:36 +04:00
}
EXPORT_SYMBOL ( __kmalloc ) ;
2006-02-01 14:05:52 +03:00
void * __kmalloc_track_caller ( size_t size , gfp_t flags , void * caller )
{
return __do_kmalloc ( size , flags , caller ) ;
}
EXPORT_SYMBOL ( __kmalloc_track_caller ) ;
2006-10-04 13:15:25 +04:00
# else
void * __kmalloc ( size_t size , gfp_t flags )
{
return __do_kmalloc ( size , flags , NULL ) ;
}
EXPORT_SYMBOL ( __kmalloc ) ;
2006-02-01 14:05:52 +03:00
# endif
2005-04-17 02:20:36 +04:00
/**
* kmem_cache_free - Deallocate an object
* @ cachep : The cache the allocation was from .
* @ objp : The previously allocated object .
*
* Free an object which was previously allocated from this
* cache .
*/
2006-02-01 14:05:50 +03:00
void kmem_cache_free ( struct kmem_cache * cachep , void * objp )
2005-04-17 02:20:36 +04:00
{
unsigned long flags ;
local_irq_save ( flags ) ;
2007-02-10 12:44:57 +03:00
debug_check_no_locks_freed ( objp , obj_size ( cachep ) ) ;
2006-07-13 16:44:38 +04:00
__cache_free ( cachep , objp ) ;
2005-04-17 02:20:36 +04:00
local_irq_restore ( flags ) ;
}
EXPORT_SYMBOL ( kmem_cache_free ) ;
/**
* kfree - free previously allocated memory
* @ objp : pointer returned by kmalloc .
*
2005-09-10 00:10:16 +04:00
* If @ objp is NULL , no operation is performed .
*
2005-04-17 02:20:36 +04:00
* Don ' t free memory not originally allocated by kmalloc ( )
* or you will run into trouble .
*/
void kfree ( const void * objp )
{
2006-02-01 14:05:50 +03:00
struct kmem_cache * c ;
2005-04-17 02:20:36 +04:00
unsigned long flags ;
2007-07-17 15:03:22 +04:00
if ( unlikely ( ZERO_OR_NULL_PTR ( objp ) ) )
2005-04-17 02:20:36 +04:00
return ;
local_irq_save ( flags ) ;
kfree_debugcheck ( objp ) ;
2006-02-01 14:05:49 +03:00
c = virt_to_cache ( objp ) ;
2006-06-27 13:54:49 +04:00
debug_check_no_locks_freed ( objp , obj_size ( c ) ) ;
2006-07-13 16:44:38 +04:00
__cache_free ( c , ( void * ) objp ) ;
2005-04-17 02:20:36 +04:00
local_irq_restore ( flags ) ;
}
EXPORT_SYMBOL ( kfree ) ;
2006-02-01 14:05:50 +03:00
unsigned int kmem_cache_size ( struct kmem_cache * cachep )
2005-04-17 02:20:36 +04:00
{
2006-02-01 14:05:42 +03:00
return obj_size ( cachep ) ;
2005-04-17 02:20:36 +04:00
}
EXPORT_SYMBOL ( kmem_cache_size ) ;
2006-02-01 14:05:50 +03:00
const char * kmem_cache_name ( struct kmem_cache * cachep )
2005-06-19 09:46:19 +04:00
{
return cachep - > name ;
}
EXPORT_SYMBOL_GPL ( kmem_cache_name ) ;
2005-09-10 00:03:32 +04:00
/*
2007-10-20 03:27:18 +04:00
* This initializes kmem_list3 or resizes various caches for all nodes .
2005-09-10 00:03:32 +04:00
*/
2006-02-01 14:05:50 +03:00
static int alloc_kmemlist ( struct kmem_cache * cachep )
2005-09-10 00:03:32 +04:00
{
int node ;
struct kmem_list3 * l3 ;
2006-03-25 14:06:46 +03:00
struct array_cache * new_shared ;
2006-12-07 07:32:16 +03:00
struct array_cache * * new_alien = NULL ;
2005-09-10 00:03:32 +04:00
2008-01-24 16:49:54 +03:00
for_each_online_node ( node ) {
2006-03-25 14:06:46 +03:00
2006-12-07 07:32:16 +03:00
if ( use_alien_caches ) {
new_alien = alloc_alien_cache ( node , cachep - > limit ) ;
if ( ! new_alien )
goto fail ;
}
2006-03-25 14:06:46 +03:00
2007-05-07 01:49:28 +04:00
new_shared = NULL ;
if ( cachep - > shared ) {
new_shared = alloc_arraycache ( node ,
2006-03-25 14:06:47 +03:00
cachep - > shared * cachep - > batchcount ,
2006-03-22 11:08:11 +03:00
0xbaadf00d ) ;
2007-05-07 01:49:28 +04:00
if ( ! new_shared ) {
free_alien_cache ( new_alien ) ;
goto fail ;
}
2006-03-25 14:06:47 +03:00
}
2006-03-25 14:06:46 +03:00
2006-03-22 11:08:11 +03:00
l3 = cachep - > nodelists [ node ] ;
if ( l3 ) {
2006-03-25 14:06:46 +03:00
struct array_cache * shared = l3 - > shared ;
2005-09-10 00:03:32 +04:00
spin_lock_irq ( & l3 - > list_lock ) ;
2006-03-25 14:06:46 +03:00
if ( shared )
2006-03-25 14:06:47 +03:00
free_block ( cachep , shared - > entry ,
shared - > avail , node ) ;
2005-09-10 00:03:32 +04:00
2006-03-25 14:06:46 +03:00
l3 - > shared = new_shared ;
if ( ! l3 - > alien ) {
2005-09-10 00:03:32 +04:00
l3 - > alien = new_alien ;
new_alien = NULL ;
}
2006-01-08 12:00:37 +03:00
l3 - > free_limit = ( 1 + nr_cpus_node ( node ) ) *
2006-03-22 11:08:11 +03:00
cachep - > batchcount + cachep - > num ;
2005-09-10 00:03:32 +04:00
spin_unlock_irq ( & l3 - > list_lock ) ;
2006-03-25 14:06:46 +03:00
kfree ( shared ) ;
2005-09-10 00:03:32 +04:00
free_alien_cache ( new_alien ) ;
continue ;
}
2006-03-22 11:08:11 +03:00
l3 = kmalloc_node ( sizeof ( struct kmem_list3 ) , GFP_KERNEL , node ) ;
2006-03-25 14:06:47 +03:00
if ( ! l3 ) {
free_alien_cache ( new_alien ) ;
kfree ( new_shared ) ;
2005-09-10 00:03:32 +04:00
goto fail ;
2006-03-25 14:06:47 +03:00
}
2005-09-10 00:03:32 +04:00
kmem_list3_init ( l3 ) ;
l3 - > next_reap = jiffies + REAPTIMEOUT_LIST3 +
2006-03-22 11:08:11 +03:00
( ( unsigned long ) cachep ) % REAPTIMEOUT_LIST3 ;
2006-03-25 14:06:46 +03:00
l3 - > shared = new_shared ;
2005-09-10 00:03:32 +04:00
l3 - > alien = new_alien ;
2006-01-08 12:00:37 +03:00
l3 - > free_limit = ( 1 + nr_cpus_node ( node ) ) *
2006-03-22 11:08:11 +03:00
cachep - > batchcount + cachep - > num ;
2005-09-10 00:03:32 +04:00
cachep - > nodelists [ node ] = l3 ;
}
2006-03-25 14:06:46 +03:00
return 0 ;
2006-03-25 14:06:47 +03:00
2006-03-22 11:08:11 +03:00
fail :
2006-03-25 14:06:47 +03:00
if ( ! cachep - > next . next ) {
/* Cache is not active yet. Roll back what we did */
node - - ;
while ( node > = 0 ) {
if ( cachep - > nodelists [ node ] ) {
l3 = cachep - > nodelists [ node ] ;
kfree ( l3 - > shared ) ;
free_alien_cache ( l3 - > alien ) ;
kfree ( l3 ) ;
cachep - > nodelists [ node ] = NULL ;
}
node - - ;
}
}
2006-03-25 14:06:46 +03:00
return - ENOMEM ;
2005-09-10 00:03:32 +04:00
}
2005-04-17 02:20:36 +04:00
struct ccupdate_struct {
2006-02-01 14:05:50 +03:00
struct kmem_cache * cachep ;
2005-04-17 02:20:36 +04:00
struct array_cache * new [ NR_CPUS ] ;
} ;
static void do_ccupdate_local ( void * info )
{
2006-03-22 11:08:11 +03:00
struct ccupdate_struct * new = info ;
2005-04-17 02:20:36 +04:00
struct array_cache * old ;
check_irq_off ( ) ;
2006-02-01 14:05:49 +03:00
old = cpu_cache_get ( new - > cachep ) ;
2005-09-10 00:03:32 +04:00
2005-04-17 02:20:36 +04:00
new - > cachep - > array [ smp_processor_id ( ) ] = new - > new [ smp_processor_id ( ) ] ;
new - > new [ smp_processor_id ( ) ] = old ;
}
2006-03-22 11:08:12 +03:00
/* Always called with the cache_chain_mutex held */
2006-03-22 11:08:11 +03:00
static int do_tune_cpucache ( struct kmem_cache * cachep , int limit ,
int batchcount , int shared )
2005-04-17 02:20:36 +04:00
{
2006-09-26 10:31:47 +04:00
struct ccupdate_struct * new ;
2006-09-26 10:31:38 +04:00
int i ;
2005-04-17 02:20:36 +04:00
2006-09-26 10:31:47 +04:00
new = kzalloc ( sizeof ( * new ) , GFP_KERNEL ) ;
if ( ! new )
return - ENOMEM ;
2005-09-10 00:03:32 +04:00
for_each_online_cpu ( i ) {
2006-09-26 10:31:47 +04:00
new - > new [ i ] = alloc_arraycache ( cpu_to_node ( i ) , limit ,
2006-03-22 11:08:11 +03:00
batchcount ) ;
2006-09-26 10:31:47 +04:00
if ( ! new - > new [ i ] ) {
2006-01-08 12:00:37 +03:00
for ( i - - ; i > = 0 ; i - - )
2006-09-26 10:31:47 +04:00
kfree ( new - > new [ i ] ) ;
kfree ( new ) ;
2005-09-10 00:03:32 +04:00
return - ENOMEM ;
2005-04-17 02:20:36 +04:00
}
}
2006-09-26 10:31:47 +04:00
new - > cachep = cachep ;
2005-04-17 02:20:36 +04:00
2006-09-26 10:31:47 +04:00
on_each_cpu ( do_ccupdate_local , ( void * ) new , 1 , 1 ) ;
2005-09-10 00:03:32 +04:00
2005-04-17 02:20:36 +04:00
check_irq_on ( ) ;
cachep - > batchcount = batchcount ;
cachep - > limit = limit ;
2005-09-10 00:03:32 +04:00
cachep - > shared = shared ;
2005-04-17 02:20:36 +04:00
2005-09-10 00:03:32 +04:00
for_each_online_cpu ( i ) {
2006-09-26 10:31:47 +04:00
struct array_cache * ccold = new - > new [ i ] ;
2005-04-17 02:20:36 +04:00
if ( ! ccold )
continue ;
2005-09-10 00:03:32 +04:00
spin_lock_irq ( & cachep - > nodelists [ cpu_to_node ( i ) ] - > list_lock ) ;
2005-09-23 08:44:02 +04:00
free_block ( cachep , ccold - > entry , ccold - > avail , cpu_to_node ( i ) ) ;
2005-09-10 00:03:32 +04:00
spin_unlock_irq ( & cachep - > nodelists [ cpu_to_node ( i ) ] - > list_lock ) ;
2005-04-17 02:20:36 +04:00
kfree ( ccold ) ;
}
2006-09-26 10:31:47 +04:00
kfree ( new ) ;
2006-09-26 10:31:38 +04:00
return alloc_kmemlist ( cachep ) ;
2005-04-17 02:20:36 +04:00
}
2006-03-22 11:08:12 +03:00
/* Called with cache_chain_mutex held always */
2006-09-26 10:31:38 +04:00
static int enable_cpucache ( struct kmem_cache * cachep )
2005-04-17 02:20:36 +04:00
{
int err ;
int limit , shared ;
2006-03-22 11:08:11 +03:00
/*
* The head array serves three purposes :
2005-04-17 02:20:36 +04:00
* - create a LIFO ordering , i . e . return objects that are cache - warm
* - reduce the number of spinlock operations .
2006-03-22 11:08:11 +03:00
* - reduce the number of linked list operations on the slab and
2005-04-17 02:20:36 +04:00
* bufctl chains : array operations are cheaper .
* The numbers are guessed , we should auto - tune as described by
* Bonwick .
*/
2006-02-01 14:05:42 +03:00
if ( cachep - > buffer_size > 131072 )
2005-04-17 02:20:36 +04:00
limit = 1 ;
2006-02-01 14:05:42 +03:00
else if ( cachep - > buffer_size > PAGE_SIZE )
2005-04-17 02:20:36 +04:00
limit = 8 ;
2006-02-01 14:05:42 +03:00
else if ( cachep - > buffer_size > 1024 )
2005-04-17 02:20:36 +04:00
limit = 24 ;
2006-02-01 14:05:42 +03:00
else if ( cachep - > buffer_size > 256 )
2005-04-17 02:20:36 +04:00
limit = 54 ;
else
limit = 120 ;
2006-03-22 11:08:11 +03:00
/*
* CPU bound tasks ( e . g . network routing ) can exhibit cpu bound
2005-04-17 02:20:36 +04:00
* allocation behaviour : Most allocs on one cpu , most free operations
* on another cpu . For these cases , an efficient object passing between
* cpus is necessary . This is provided by a shared array . The array
* replaces Bonwick ' s magazine layer .
* On uniprocessor , it ' s functionally equivalent ( but less efficient )
* to a larger limit . Thus disabled by default .
*/
shared = 0 ;
2007-05-07 01:49:27 +04:00
if ( cachep - > buffer_size < = PAGE_SIZE & & num_possible_cpus ( ) > 1 )
2005-04-17 02:20:36 +04:00
shared = 8 ;
# if DEBUG
2006-03-22 11:08:11 +03:00
/*
* With debugging enabled , large batchcount lead to excessively long
* periods with disabled local interrupts . Limit the batchcount
2005-04-17 02:20:36 +04:00
*/
if ( limit > 32 )
limit = 32 ;
# endif
2006-01-08 12:00:37 +03:00
err = do_tune_cpucache ( cachep , limit , ( limit + 1 ) / 2 , shared ) ;
2005-04-17 02:20:36 +04:00
if ( err )
printk ( KERN_ERR " enable_cpucache failed for %s, error %d. \n " ,
2006-01-08 12:00:37 +03:00
cachep - > name , - err ) ;
2006-09-26 10:31:38 +04:00
return err ;
2005-04-17 02:20:36 +04:00
}
2006-03-22 11:09:07 +03:00
/*
* Drain an array if it contains any elements taking the l3 lock only if
2006-03-22 11:09:07 +03:00
* necessary . Note that the l3 listlock also protects the array_cache
* if drain_array ( ) is used on the shared array .
2006-03-22 11:09:07 +03:00
*/
void drain_array ( struct kmem_cache * cachep , struct kmem_list3 * l3 ,
struct array_cache * ac , int force , int node )
2005-04-17 02:20:36 +04:00
{
int tofree ;
2006-03-22 11:09:07 +03:00
if ( ! ac | | ! ac - > avail )
return ;
2005-04-17 02:20:36 +04:00
if ( ac - > touched & & ! force ) {
ac - > touched = 0 ;
2006-03-22 11:09:07 +03:00
} else {
2006-03-22 11:09:07 +03:00
spin_lock_irq ( & l3 - > list_lock ) ;
2006-03-22 11:09:07 +03:00
if ( ac - > avail ) {
tofree = force ? ac - > avail : ( ac - > limit + 4 ) / 5 ;
if ( tofree > ac - > avail )
tofree = ( ac - > avail + 1 ) / 2 ;
free_block ( cachep , ac - > entry , tofree , node ) ;
ac - > avail - = tofree ;
memmove ( ac - > entry , & ( ac - > entry [ tofree ] ) ,
sizeof ( void * ) * ac - > avail ) ;
}
2006-03-22 11:09:07 +03:00
spin_unlock_irq ( & l3 - > list_lock ) ;
2005-04-17 02:20:36 +04:00
}
}
/**
* cache_reap - Reclaim memory from caches .
2007-03-01 07:12:13 +03:00
* @ w : work descriptor
2005-04-17 02:20:36 +04:00
*
* Called from workqueue / eventd every few seconds .
* Purpose :
* - clear the per - cpu caches for this CPU .
* - return freeable pages to the main free memory pool .
*
2006-03-22 11:08:11 +03:00
* If we cannot acquire the cache chain mutex then just give up - we ' ll try
* again on the next iteration .
2005-04-17 02:20:36 +04:00
*/
2007-02-10 12:42:55 +03:00
static void cache_reap ( struct work_struct * w )
2005-04-17 02:20:36 +04:00
{
2006-06-23 13:03:17 +04:00
struct kmem_cache * searchp ;
2005-09-10 00:03:32 +04:00
struct kmem_list3 * l3 ;
2006-03-22 11:09:06 +03:00
int node = numa_node_id ( ) ;
2007-02-10 12:42:55 +03:00
struct delayed_work * work =
container_of ( w , struct delayed_work , work ) ;
2005-04-17 02:20:36 +04:00
2007-02-10 12:42:55 +03:00
if ( ! mutex_trylock ( & cache_chain_mutex ) )
2005-04-17 02:20:36 +04:00
/* Give up. Setup the next iteration. */
2007-02-10 12:42:55 +03:00
goto out ;
2005-04-17 02:20:36 +04:00
2006-06-23 13:03:17 +04:00
list_for_each_entry ( searchp , & cache_chain , next ) {
2005-04-17 02:20:36 +04:00
check_irq_on ( ) ;
2006-03-22 11:09:05 +03:00
/*
* We only take the l3 lock if absolutely necessary and we
* have established with reasonable certainty that
* we can do some work if the lock was obtained .
*/
2006-03-22 11:09:06 +03:00
l3 = searchp - > nodelists [ node ] ;
2006-03-22 11:09:05 +03:00
2006-03-10 04:33:54 +03:00
reap_alien ( searchp , l3 ) ;
2005-04-17 02:20:36 +04:00
2006-03-22 11:09:06 +03:00
drain_array ( searchp , l3 , cpu_cache_get ( searchp ) , 0 , node ) ;
2005-04-17 02:20:36 +04:00
2006-03-22 11:09:05 +03:00
/*
* These are racy checks but it does not matter
* if we skip one check or scan twice .
*/
2005-09-10 00:03:32 +04:00
if ( time_after ( l3 - > next_reap , jiffies ) )
2006-03-22 11:09:05 +03:00
goto next ;
2005-04-17 02:20:36 +04:00
2005-09-10 00:03:32 +04:00
l3 - > next_reap = jiffies + REAPTIMEOUT_LIST3 ;
2005-04-17 02:20:36 +04:00
2006-03-22 11:09:06 +03:00
drain_array ( searchp , l3 , l3 - > shared , 0 , node ) ;
2005-04-17 02:20:36 +04:00
2006-06-30 12:55:45 +04:00
if ( l3 - > free_touched )
2005-09-10 00:03:32 +04:00
l3 - > free_touched = 0 ;
2006-06-30 12:55:45 +04:00
else {
int freed ;
2005-04-17 02:20:36 +04:00
2006-06-30 12:55:45 +04:00
freed = drain_freelist ( searchp , l3 , ( l3 - > free_limit +
5 * searchp - > num - 1 ) / ( 5 * searchp - > num ) ) ;
STATS_ADD_REAPED ( searchp , freed ) ;
}
2006-03-22 11:09:05 +03:00
next :
2005-04-17 02:20:36 +04:00
cond_resched ( ) ;
}
check_irq_on ( ) ;
2006-01-19 04:42:33 +03:00
mutex_unlock ( & cache_chain_mutex ) ;
2006-03-10 04:33:54 +03:00
next_reap_node ( ) ;
2007-02-10 12:42:55 +03:00
out :
2006-03-22 11:08:11 +03:00
/* Set up the next iteration */
2007-02-10 12:42:55 +03:00
schedule_delayed_work ( work , round_jiffies_relative ( REAPTIMEOUT_CPUC ) ) ;
2005-04-17 02:20:36 +04:00
}
2008-01-03 00:04:48 +03:00
# ifdef CONFIG_SLABINFO
2005-04-17 02:20:36 +04:00
2006-01-08 12:00:36 +03:00
static void print_slabinfo_header ( struct seq_file * m )
2005-04-17 02:20:36 +04:00
{
2006-01-08 12:00:36 +03:00
/*
* Output format version , so at least we can change it
* without _too_ many complaints .
*/
2005-04-17 02:20:36 +04:00
# if STATS
2006-01-08 12:00:36 +03:00
seq_puts ( m , " slabinfo - version: 2.1 (statistics) \n " ) ;
2005-04-17 02:20:36 +04:00
# else
2006-01-08 12:00:36 +03:00
seq_puts ( m , " slabinfo - version: 2.1 \n " ) ;
2005-04-17 02:20:36 +04:00
# endif
2006-01-08 12:00:36 +03:00
seq_puts ( m , " # name <active_objs> <num_objs> <objsize> "
" <objperslab> <pagesperslab> " ) ;
seq_puts ( m , " : tunables <limit> <batchcount> <sharedfactor> " ) ;
seq_puts ( m , " : slabdata <active_slabs> <num_slabs> <sharedavail> " ) ;
2005-04-17 02:20:36 +04:00
# if STATS
2006-01-08 12:00:36 +03:00
seq_puts ( m , " : globalstat <listallocs> <maxobjs> <grown> <reaped> "
2006-04-11 09:52:54 +04:00
" <error> <maxfreeable> <nodeallocs> <remotefrees> <alienoverflow> " ) ;
2006-01-08 12:00:36 +03:00
seq_puts ( m , " : cpustat <allochit> <allocmiss> <freehit> <freemiss> " ) ;
2005-04-17 02:20:36 +04:00
# endif
2006-01-08 12:00:36 +03:00
seq_putc ( m , ' \n ' ) ;
}
static void * s_start ( struct seq_file * m , loff_t * pos )
{
loff_t n = * pos ;
2006-01-19 04:42:33 +03:00
mutex_lock ( & cache_chain_mutex ) ;
2006-01-08 12:00:36 +03:00
if ( ! n )
print_slabinfo_header ( m ) ;
2007-07-16 10:38:04 +04:00
return seq_list_start ( & cache_chain , * pos ) ;
2005-04-17 02:20:36 +04:00
}
static void * s_next ( struct seq_file * m , void * p , loff_t * pos )
{
2007-07-16 10:38:04 +04:00
return seq_list_next ( p , & cache_chain , pos ) ;
2005-04-17 02:20:36 +04:00
}
static void s_stop ( struct seq_file * m , void * p )
{
2006-01-19 04:42:33 +03:00
mutex_unlock ( & cache_chain_mutex ) ;
2005-04-17 02:20:36 +04:00
}
static int s_show ( struct seq_file * m , void * p )
{
2007-07-16 10:38:04 +04:00
struct kmem_cache * cachep = list_entry ( p , struct kmem_cache , next ) ;
2006-01-08 12:00:37 +03:00
struct slab * slabp ;
unsigned long active_objs ;
unsigned long num_objs ;
unsigned long active_slabs = 0 ;
unsigned long num_slabs , free_objects = 0 , shared_avail = 0 ;
2005-09-10 00:03:32 +04:00
const char * name ;
2005-04-17 02:20:36 +04:00
char * error = NULL ;
2005-09-10 00:03:32 +04:00
int node ;
struct kmem_list3 * l3 ;
2005-04-17 02:20:36 +04:00
active_objs = 0 ;
num_slabs = 0 ;
2005-09-10 00:03:32 +04:00
for_each_online_node ( node ) {
l3 = cachep - > nodelists [ node ] ;
if ( ! l3 )
continue ;
2006-02-05 10:27:58 +03:00
check_irq_on ( ) ;
spin_lock_irq ( & l3 - > list_lock ) ;
2005-09-10 00:03:32 +04:00
2006-06-23 13:03:17 +04:00
list_for_each_entry ( slabp , & l3 - > slabs_full , list ) {
2005-09-10 00:03:32 +04:00
if ( slabp - > inuse ! = cachep - > num & & ! error )
error = " slabs_full accounting error " ;
active_objs + = cachep - > num ;
active_slabs + + ;
}
2006-06-23 13:03:17 +04:00
list_for_each_entry ( slabp , & l3 - > slabs_partial , list ) {
2005-09-10 00:03:32 +04:00
if ( slabp - > inuse = = cachep - > num & & ! error )
error = " slabs_partial inuse accounting error " ;
if ( ! slabp - > inuse & & ! error )
error = " slabs_partial/inuse accounting error " ;
active_objs + = slabp - > inuse ;
active_slabs + + ;
}
2006-06-23 13:03:17 +04:00
list_for_each_entry ( slabp , & l3 - > slabs_free , list ) {
2005-09-10 00:03:32 +04:00
if ( slabp - > inuse & & ! error )
error = " slabs_free/inuse accounting error " ;
num_slabs + + ;
}
free_objects + = l3 - > free_objects ;
[PATCH] NUMA slab locking fixes: fix cpu down and up locking
This fixes locking and bugs in cpu_down and cpu_up paths of the NUMA slab
allocator. Sonny Rao <sonny@burdell.org> reported problems sometime back on
POWER5 boxes, when the last cpu on the nodes were being offlined. We could
not reproduce the same on x86_64 because the cpumask (node_to_cpumask) was not
being updated on cpu down. Since that issue is now fixed, we can reproduce
Sonny's problems on x86_64 NUMA, and here is the fix.
The problem earlier was on CPU_DOWN, if it was the last cpu on the node to go
down, the array_caches (shared, alien) and the kmem_list3 of the node were
being freed (kfree) with the kmem_list3 lock held. If the l3 or the
array_caches were to come from the same cache being cleared, we hit on
badness.
This patch cleans up the locking in cpu_up and cpu_down path. We cannot
really free l3 on cpu down because, there is no node offlining yet and even
though a cpu is not yet up, node local memory can be allocated for it. So l3s
are usually allocated at keme_cache_create and destroyed at
kmem_cache_destroy. Hence, we don't need cachep->spinlock protection to get
to the cachep->nodelist[nodeid] either.
Patch survived onlining and offlining on a 4 core 2 node Tyan box with a 4
dbench process running all the time.
Signed-off-by: Alok N Kataria <alokk@calsoftinc.com>
Signed-off-by: Ravikiran Thirumalai <kiran@scalex86.org>
Cc: Christoph Lameter <christoph@lameter.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-02-05 10:27:59 +03:00
if ( l3 - > shared )
shared_avail + = l3 - > shared - > avail ;
2005-09-10 00:03:32 +04:00
2006-02-05 10:27:58 +03:00
spin_unlock_irq ( & l3 - > list_lock ) ;
2005-04-17 02:20:36 +04:00
}
2006-01-08 12:00:37 +03:00
num_slabs + = active_slabs ;
num_objs = num_slabs * cachep - > num ;
2005-09-10 00:03:32 +04:00
if ( num_objs - active_objs ! = free_objects & & ! error )
2005-04-17 02:20:36 +04:00
error = " free_objects accounting error " ;
2006-01-08 12:00:37 +03:00
name = cachep - > name ;
2005-04-17 02:20:36 +04:00
if ( error )
printk ( KERN_ERR " slab: cache %s error: %s \n " , name , error ) ;
seq_printf ( m , " %-17s %6lu %6lu %6u %4u %4d " ,
2006-02-01 14:05:42 +03:00
name , active_objs , num_objs , cachep - > buffer_size ,
2006-01-08 12:00:37 +03:00
cachep - > num , ( 1 < < cachep - > gfporder ) ) ;
2005-04-17 02:20:36 +04:00
seq_printf ( m , " : tunables %4u %4u %4u " ,
2006-01-08 12:00:37 +03:00
cachep - > limit , cachep - > batchcount , cachep - > shared ) ;
2005-09-10 00:03:32 +04:00
seq_printf ( m , " : slabdata %6lu %6lu %6lu " ,
2006-01-08 12:00:37 +03:00
active_slabs , num_slabs , shared_avail ) ;
2005-04-17 02:20:36 +04:00
# if STATS
2006-01-08 12:00:37 +03:00
{ /* list3 stats */
2005-04-17 02:20:36 +04:00
unsigned long high = cachep - > high_mark ;
unsigned long allocs = cachep - > num_allocations ;
unsigned long grown = cachep - > grown ;
unsigned long reaped = cachep - > reaped ;
unsigned long errors = cachep - > errors ;
unsigned long max_freeable = cachep - > max_freeable ;
unsigned long node_allocs = cachep - > node_allocs ;
2005-09-10 00:03:32 +04:00
unsigned long node_frees = cachep - > node_frees ;
2006-04-11 09:52:54 +04:00
unsigned long overflows = cachep - > node_overflow ;
2005-04-17 02:20:36 +04:00
2005-09-10 00:03:32 +04:00
seq_printf ( m , " : globalstat %7lu %6lu %5lu %4lu \
2006-04-11 09:52:54 +04:00
% 4lu % 4lu % 4lu % 4lu % 4lu " , allocs, high, grown,
2006-03-22 11:08:11 +03:00
reaped , errors , max_freeable , node_allocs ,
2006-04-11 09:52:54 +04:00
node_frees , overflows ) ;
2005-04-17 02:20:36 +04:00
}
/* cpu stats */
{
unsigned long allochit = atomic_read ( & cachep - > allochit ) ;
unsigned long allocmiss = atomic_read ( & cachep - > allocmiss ) ;
unsigned long freehit = atomic_read ( & cachep - > freehit ) ;
unsigned long freemiss = atomic_read ( & cachep - > freemiss ) ;
seq_printf ( m , " : cpustat %6lu %6lu %6lu %6lu " ,
2006-01-08 12:00:37 +03:00
allochit , allocmiss , freehit , freemiss ) ;
2005-04-17 02:20:36 +04:00
}
# endif
seq_putc ( m , ' \n ' ) ;
return 0 ;
}
/*
* slabinfo_op - iterator that generates / proc / slabinfo
*
* Output layout :
* cache - name
* num - active - objs
* total - objs
* object size
* num - active - slabs
* total - slabs
* num - pages - per - slab
* + further values on SMP and with statistics enabled
*/
2006-12-07 07:40:36 +03:00
const struct seq_operations slabinfo_op = {
2006-01-08 12:00:37 +03:00
. start = s_start ,
. next = s_next ,
. stop = s_stop ,
. show = s_show ,
2005-04-17 02:20:36 +04:00
} ;
# define MAX_SLABINFO_WRITE 128
/**
* slabinfo_write - Tuning for the slab allocator
* @ file : unused
* @ buffer : user buffer
* @ count : data length
* @ ppos : unused
*/
2006-01-08 12:00:37 +03:00
ssize_t slabinfo_write ( struct file * file , const char __user * buffer ,
size_t count , loff_t * ppos )
2005-04-17 02:20:36 +04:00
{
2006-01-08 12:00:37 +03:00
char kbuf [ MAX_SLABINFO_WRITE + 1 ] , * tmp ;
2005-04-17 02:20:36 +04:00
int limit , batchcount , shared , res ;
2006-06-23 13:03:17 +04:00
struct kmem_cache * cachep ;
2006-01-08 12:00:37 +03:00
2005-04-17 02:20:36 +04:00
if ( count > MAX_SLABINFO_WRITE )
return - EINVAL ;
if ( copy_from_user ( & kbuf , buffer , count ) )
return - EFAULT ;
2006-01-08 12:00:37 +03:00
kbuf [ MAX_SLABINFO_WRITE ] = ' \0 ' ;
2005-04-17 02:20:36 +04:00
tmp = strchr ( kbuf , ' ' ) ;
if ( ! tmp )
return - EINVAL ;
* tmp = ' \0 ' ;
tmp + + ;
if ( sscanf ( tmp , " %d %d %d " , & limit , & batchcount , & shared ) ! = 3 )
return - EINVAL ;
/* Find the cache in the chain of caches. */
2006-01-19 04:42:33 +03:00
mutex_lock ( & cache_chain_mutex ) ;
2005-04-17 02:20:36 +04:00
res = - EINVAL ;
2006-06-23 13:03:17 +04:00
list_for_each_entry ( cachep , & cache_chain , next ) {
2005-04-17 02:20:36 +04:00
if ( ! strcmp ( cachep - > name , kbuf ) ) {
2006-03-22 11:08:11 +03:00
if ( limit < 1 | | batchcount < 1 | |
batchcount > limit | | shared < 0 ) {
2005-09-10 00:03:32 +04:00
res = 0 ;
2005-04-17 02:20:36 +04:00
} else {
2005-09-10 00:03:32 +04:00
res = do_tune_cpucache ( cachep , limit ,
2006-01-08 12:00:37 +03:00
batchcount , shared ) ;
2005-04-17 02:20:36 +04:00
}
break ;
}
}
2006-01-19 04:42:33 +03:00
mutex_unlock ( & cache_chain_mutex ) ;
2005-04-17 02:20:36 +04:00
if ( res > = 0 )
res = count ;
return res ;
}
2006-03-25 14:06:39 +03:00
# ifdef CONFIG_DEBUG_SLAB_LEAK
static void * leaks_start ( struct seq_file * m , loff_t * pos )
{
mutex_lock ( & cache_chain_mutex ) ;
2007-07-16 10:38:04 +04:00
return seq_list_start ( & cache_chain , * pos ) ;
2006-03-25 14:06:39 +03:00
}
static inline int add_caller ( unsigned long * n , unsigned long v )
{
unsigned long * p ;
int l ;
if ( ! v )
return 1 ;
l = n [ 1 ] ;
p = n + 2 ;
while ( l ) {
int i = l / 2 ;
unsigned long * q = p + 2 * i ;
if ( * q = = v ) {
q [ 1 ] + + ;
return 1 ;
}
if ( * q > v ) {
l = i ;
} else {
p = q + 2 ;
l - = i + 1 ;
}
}
if ( + + n [ 1 ] = = n [ 0 ] )
return 0 ;
memmove ( p + 2 , p , n [ 1 ] * 2 * sizeof ( unsigned long ) - ( ( void * ) p - ( void * ) n ) ) ;
p [ 0 ] = v ;
p [ 1 ] = 1 ;
return 1 ;
}
static void handle_slab ( unsigned long * n , struct kmem_cache * c , struct slab * s )
{
void * p ;
int i ;
if ( n [ 0 ] = = n [ 1 ] )
return ;
for ( i = 0 , p = s - > s_mem ; i < c - > num ; i + + , p + = c - > buffer_size ) {
if ( slab_bufctl ( s ) [ i ] ! = BUFCTL_ACTIVE )
continue ;
if ( ! add_caller ( n , ( unsigned long ) * dbg_userword ( c , p ) ) )
return ;
}
}
static void show_symbol ( struct seq_file * m , unsigned long address )
{
# ifdef CONFIG_KALLSYMS
unsigned long offset , size ;
2007-07-17 15:03:51 +04:00
char modname [ MODULE_NAME_LEN ] , name [ KSYM_NAME_LEN ] ;
2006-03-25 14:06:39 +03:00
2007-05-08 11:28:47 +04:00
if ( lookup_symbol_attrs ( address , & size , & offset , modname , name ) = = 0 ) {
2006-03-25 14:06:39 +03:00
seq_printf ( m , " %s+%#lx/%#lx " , name , offset , size ) ;
2007-05-08 11:28:47 +04:00
if ( modname [ 0 ] )
2006-03-25 14:06:39 +03:00
seq_printf ( m , " [%s] " , modname ) ;
return ;
}
# endif
seq_printf ( m , " %p " , ( void * ) address ) ;
}
static int leaks_show ( struct seq_file * m , void * p )
{
2007-07-16 10:38:04 +04:00
struct kmem_cache * cachep = list_entry ( p , struct kmem_cache , next ) ;
2006-03-25 14:06:39 +03:00
struct slab * slabp ;
struct kmem_list3 * l3 ;
const char * name ;
unsigned long * n = m - > private ;
int node ;
int i ;
if ( ! ( cachep - > flags & SLAB_STORE_USER ) )
return 0 ;
if ( ! ( cachep - > flags & SLAB_RED_ZONE ) )
return 0 ;
/* OK, we can do it */
n [ 1 ] = 0 ;
for_each_online_node ( node ) {
l3 = cachep - > nodelists [ node ] ;
if ( ! l3 )
continue ;
check_irq_on ( ) ;
spin_lock_irq ( & l3 - > list_lock ) ;
2006-06-23 13:03:17 +04:00
list_for_each_entry ( slabp , & l3 - > slabs_full , list )
2006-03-25 14:06:39 +03:00
handle_slab ( n , cachep , slabp ) ;
2006-06-23 13:03:17 +04:00
list_for_each_entry ( slabp , & l3 - > slabs_partial , list )
2006-03-25 14:06:39 +03:00
handle_slab ( n , cachep , slabp ) ;
spin_unlock_irq ( & l3 - > list_lock ) ;
}
name = cachep - > name ;
if ( n [ 0 ] = = n [ 1 ] ) {
/* Increase the buffer size */
mutex_unlock ( & cache_chain_mutex ) ;
m - > private = kzalloc ( n [ 0 ] * 4 * sizeof ( unsigned long ) , GFP_KERNEL ) ;
if ( ! m - > private ) {
/* Too bad, we are really out */
m - > private = n ;
mutex_lock ( & cache_chain_mutex ) ;
return - ENOMEM ;
}
* ( unsigned long * ) m - > private = n [ 0 ] * 2 ;
kfree ( n ) ;
mutex_lock ( & cache_chain_mutex ) ;
/* Now make sure this entry will be retried */
m - > count = m - > size ;
return 0 ;
}
for ( i = 0 ; i < n [ 1 ] ; i + + ) {
seq_printf ( m , " %s: %lu " , name , n [ 2 * i + 3 ] ) ;
show_symbol ( m , n [ 2 * i + 2 ] ) ;
seq_putc ( m , ' \n ' ) ;
}
2006-09-26 10:31:47 +04:00
2006-03-25 14:06:39 +03:00
return 0 ;
}
2006-12-07 07:40:36 +03:00
const struct seq_operations slabstats_op = {
2006-03-25 14:06:39 +03:00
. start = leaks_start ,
. next = s_next ,
. stop = s_stop ,
. show = leaks_show ,
} ;
# endif
2005-04-17 02:20:36 +04:00
# endif
2005-09-04 02:55:07 +04:00
/**
* ksize - get the actual amount of memory allocated for a given object
* @ objp : Pointer to the object
*
* kmalloc may internally round up allocations and return more memory
* than requested . ksize ( ) can be used to determine the actual amount of
* memory allocated . The caller may use this additional memory , even though
* a smaller amount of memory was initially specified with the kmalloc call .
* The caller must guarantee that objp points to a valid object previously
* allocated with either kmalloc ( ) or kmem_cache_alloc ( ) . The object
* must not be freed during the duration of the call .
*/
2007-05-07 01:48:40 +04:00
size_t ksize ( const void * objp )
2005-04-17 02:20:36 +04:00
{
2007-10-16 12:24:46 +04:00
BUG_ON ( ! objp ) ;
if ( unlikely ( objp = = ZERO_SIZE_PTR ) )
2005-09-04 02:55:07 +04:00
return 0 ;
2005-04-17 02:20:36 +04:00
2006-02-01 14:05:49 +03:00
return obj_size ( virt_to_cache ( objp ) ) ;
2005-04-17 02:20:36 +04:00
}
2007-12-05 10:45:08 +03:00
EXPORT_SYMBOL ( ksize ) ;