2008-07-26 06:44:36 +04:00
# include <linux/mm.h>
2006-01-08 12:01:43 +03:00
# include <linux/slab.h>
# include <linux/string.h>
# include <linux/module.h>
2006-03-24 14:18:42 +03:00
# include <linux/err.h>
2008-07-27 02:22:28 +04:00
# include <linux/sched.h>
2006-03-24 14:18:42 +03:00
# include <asm/uaccess.h>
2006-01-08 12:01:43 +03:00
2009-04-10 17:36:00 +04:00
# define CREATE_TRACE_POINTS
2009-04-15 03:39:12 +04:00
# include <trace/events/kmem.h>
2009-04-10 17:36:00 +04:00
2006-01-08 12:01:43 +03:00
/**
* kstrdup - allocate space for and copy an existing string
* @ s : the string to duplicate
* @ gfp : the GFP mask used in the kmalloc ( ) call when allocating memory
*/
char * kstrdup ( const char * s , gfp_t gfp )
{
size_t len ;
char * buf ;
if ( ! s )
return NULL ;
len = strlen ( s ) + 1 ;
2006-10-04 13:15:25 +04:00
buf = kmalloc_track_caller ( len , gfp ) ;
2006-01-08 12:01:43 +03:00
if ( buf )
memcpy ( buf , s , len ) ;
return buf ;
}
EXPORT_SYMBOL ( kstrdup ) ;
2006-03-24 14:18:42 +03:00
2007-07-18 05:37:02 +04:00
/**
* kstrndup - allocate space for and copy an existing string
* @ s : the string to duplicate
* @ max : read at most @ max chars from @ s
* @ gfp : the GFP mask used in the kmalloc ( ) call when allocating memory
*/
char * kstrndup ( const char * s , size_t max , gfp_t gfp )
{
size_t len ;
char * buf ;
if ( ! s )
return NULL ;
len = strnlen ( s , max ) ;
buf = kmalloc_track_caller ( len + 1 , gfp ) ;
if ( buf ) {
memcpy ( buf , s , len ) ;
buf [ len ] = ' \0 ' ;
}
return buf ;
}
EXPORT_SYMBOL ( kstrndup ) ;
[PATCH] kmemdup: introduce
One of idiomatic ways to duplicate a region of memory is
dst = kmalloc(len, GFP_KERNEL);
if (!dst)
return -ENOMEM;
memcpy(dst, src, len);
which is neat code except a programmer needs to write size twice. Which
sometimes leads to mistakes. If len passed to kmalloc is smaller that len
passed to memcpy, it's straight overwrite-beyond-end. If len passed to
memcpy is smaller than len passed to kmalloc, it's either a) legit
behaviour ;-), or b) cloned buffer will contain garbage in second half.
Slight trolling of commit lists shows several duplications bugs
done exactly because of diverged lenghts:
Linux:
[CRYPTO]: Fix memcpy/memset args.
[PATCH] memcpy/memset fixes
OpenBSD:
kerberosV/src/lib/asn1: der_copy.c:1.4
If programmer is given only one place to play with lengths, I believe, such
mistakes could be avoided.
With kmemdup, the snippet above will be rewritten as:
dst = kmemdup(src, len, GFP_KERNEL);
if (!dst)
return -ENOMEM;
This also leads to smaller code (kzalloc effect). Quick grep shows
200+ places where kmemdup() can be used.
Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-10-01 10:27:20 +04:00
/**
* kmemdup - duplicate region of memory
*
* @ src : memory region to duplicate
* @ len : memory region length
* @ gfp : GFP mask to use
*/
void * kmemdup ( const void * src , size_t len , gfp_t gfp )
{
void * p ;
2006-10-04 13:15:25 +04:00
p = kmalloc_track_caller ( len , gfp ) ;
[PATCH] kmemdup: introduce
One of idiomatic ways to duplicate a region of memory is
dst = kmalloc(len, GFP_KERNEL);
if (!dst)
return -ENOMEM;
memcpy(dst, src, len);
which is neat code except a programmer needs to write size twice. Which
sometimes leads to mistakes. If len passed to kmalloc is smaller that len
passed to memcpy, it's straight overwrite-beyond-end. If len passed to
memcpy is smaller than len passed to kmalloc, it's either a) legit
behaviour ;-), or b) cloned buffer will contain garbage in second half.
Slight trolling of commit lists shows several duplications bugs
done exactly because of diverged lenghts:
Linux:
[CRYPTO]: Fix memcpy/memset args.
[PATCH] memcpy/memset fixes
OpenBSD:
kerberosV/src/lib/asn1: der_copy.c:1.4
If programmer is given only one place to play with lengths, I believe, such
mistakes could be avoided.
With kmemdup, the snippet above will be rewritten as:
dst = kmemdup(src, len, GFP_KERNEL);
if (!dst)
return -ENOMEM;
This also leads to smaller code (kzalloc effect). Quick grep shows
200+ places where kmemdup() can be used.
Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-10-01 10:27:20 +04:00
if ( p )
memcpy ( p , src , len ) ;
return p ;
}
EXPORT_SYMBOL ( kmemdup ) ;
2009-04-01 02:23:16 +04:00
/**
* memdup_user - duplicate memory region from user space
*
* @ src : source address in user space
* @ len : number of bytes to copy
*
* Returns an ERR_PTR ( ) on failure .
*/
void * memdup_user ( const void __user * src , size_t len )
{
void * p ;
/*
* Always use GFP_KERNEL , since copy_from_user ( ) can sleep and
* cause pagefault , which makes it pointless to use GFP_NOFS
* or GFP_ATOMIC .
*/
p = kmalloc_track_caller ( len , GFP_KERNEL ) ;
if ( ! p )
return ERR_PTR ( - ENOMEM ) ;
if ( copy_from_user ( p , src , len ) ) {
kfree ( p ) ;
return ERR_PTR ( - EFAULT ) ;
}
return p ;
}
EXPORT_SYMBOL ( memdup_user ) ;
2007-07-17 15:03:21 +04:00
/**
2008-07-27 04:49:33 +04:00
* __krealloc - like krealloc ( ) but don ' t free @ p .
2007-07-17 15:03:21 +04:00
* @ p : object to reallocate memory for .
* @ new_size : how many bytes of memory are required .
* @ flags : the type of memory to allocate .
*
2008-07-27 04:49:33 +04:00
* This function is like krealloc ( ) except it never frees the originally
* allocated buffer . Use this if you don ' t want to free the buffer immediately
* like , for example , with RCU .
2007-07-17 15:03:21 +04:00
*/
2008-07-27 04:49:33 +04:00
void * __krealloc ( const void * p , size_t new_size , gfp_t flags )
2007-07-17 15:03:21 +04:00
{
void * ret ;
2007-10-16 12:24:46 +04:00
size_t ks = 0 ;
2007-07-17 15:03:21 +04:00
2008-07-27 04:49:33 +04:00
if ( unlikely ( ! new_size ) )
2007-07-17 15:03:22 +04:00
return ZERO_SIZE_PTR ;
2007-07-17 15:03:21 +04:00
2007-10-16 12:24:46 +04:00
if ( p )
ks = ksize ( p ) ;
2007-07-17 15:03:21 +04:00
if ( ks > = new_size )
return ( void * ) p ;
ret = kmalloc_track_caller ( new_size , flags ) ;
2008-07-27 04:49:33 +04:00
if ( ret & & p )
2007-11-15 04:00:01 +03:00
memcpy ( ret , p , ks ) ;
2008-07-27 04:49:33 +04:00
return ret ;
}
EXPORT_SYMBOL ( __krealloc ) ;
/**
* krealloc - reallocate memory . The contents will remain unchanged .
* @ p : object to reallocate memory for .
* @ new_size : how many bytes of memory are required .
* @ flags : the type of memory to allocate .
*
* The contents of the object pointed to are preserved up to the
* lesser of the new and old sizes . If @ p is % NULL , krealloc ( )
* behaves exactly like kmalloc ( ) . If @ size is 0 and @ p is not a
* % NULL pointer , the object pointed to is freed .
*/
void * krealloc ( const void * p , size_t new_size , gfp_t flags )
{
void * ret ;
if ( unlikely ( ! new_size ) ) {
2007-07-17 15:03:21 +04:00
kfree ( p ) ;
2008-07-27 04:49:33 +04:00
return ZERO_SIZE_PTR ;
2007-07-17 15:03:21 +04:00
}
2008-07-27 04:49:33 +04:00
ret = __krealloc ( p , new_size , flags ) ;
if ( ret & & p ! = ret )
kfree ( p ) ;
2007-07-17 15:03:21 +04:00
return ret ;
}
EXPORT_SYMBOL ( krealloc ) ;
2009-02-21 02:38:41 +03:00
/**
* kzfree - like kfree but zero memory
* @ p : object to free memory of
*
* The memory of the object @ p points to is zeroed before freed .
* If @ p is % NULL , kzfree ( ) does nothing .
2009-05-31 14:50:38 +04:00
*
* Note : this function zeroes the whole allocated buffer which can be a good
* deal bigger than the requested buffer size passed to kmalloc ( ) . So be
* careful when using this function in performance sensitive code .
2009-02-21 02:38:41 +03:00
*/
void kzfree ( const void * p )
{
size_t ks ;
void * mem = ( void * ) p ;
if ( unlikely ( ZERO_OR_NULL_PTR ( mem ) ) )
return ;
ks = ksize ( mem ) ;
memset ( mem , 0 , ks ) ;
kfree ( mem ) ;
}
EXPORT_SYMBOL ( kzfree ) ;
2006-03-24 14:18:42 +03:00
/*
* strndup_user - duplicate an existing string from user space
* @ s : The string to duplicate
* @ n : Maximum number of bytes to copy , including the trailing NUL .
*/
char * strndup_user ( const char __user * s , long n )
{
char * p ;
long length ;
length = strnlen_user ( s , n ) ;
if ( ! length )
return ERR_PTR ( - EFAULT ) ;
if ( length > n )
return ERR_PTR ( - EINVAL ) ;
p = kmalloc ( length , GFP_KERNEL ) ;
if ( ! p )
return ERR_PTR ( - ENOMEM ) ;
if ( copy_from_user ( p , s , length ) ) {
kfree ( p ) ;
return ERR_PTR ( - EFAULT ) ;
}
p [ length - 1 ] = ' \0 ' ;
return p ;
}
EXPORT_SYMBOL ( strndup_user ) ;
2008-07-26 06:44:36 +04:00
# ifndef HAVE_ARCH_PICK_MMAP_LAYOUT
void arch_pick_mmap_layout ( struct mm_struct * mm )
{
mm - > mmap_base = TASK_UNMAPPED_BASE ;
mm - > get_unmapped_area = arch_get_unmapped_area ;
mm - > unmap_area = arch_unmap_area ;
}
# endif
2008-08-13 02:52:52 +04:00
2009-04-14 01:40:05 +04:00
/**
* get_user_pages_fast ( ) - pin user pages in memory
* @ start : starting user address
* @ nr_pages : number of pages from start to pin
* @ write : whether pages will be written to
* @ pages : array that receives pointers to the pages pinned .
* Should be at least nr_pages long .
*
* Returns number of pages pinned . This may be fewer than the number
* requested . If nr_pages is 0 or negative , returns 0. If no pages
* were pinned , returns - errno .
2009-06-17 02:31:39 +04:00
*
* get_user_pages_fast provides equivalent functionality to get_user_pages ,
* operating on current and current - > mm , with force = 0 and vma = NULL . However
* unlike get_user_pages , it must be called without mmap_sem held .
*
* get_user_pages_fast may take mmap_sem and page table locks , so no
* assumptions can be made about lack of locking . get_user_pages_fast is to be
* implemented in a way that is advantageous ( vs get_user_pages ( ) ) when the
* user memory area is already faulted in and present in ptes . However if the
* pages have to be faulted in , it may turn out to be slightly slower so
* callers need to carefully consider what to use . On many architectures ,
* get_user_pages_fast simply falls back to get_user_pages .
2009-04-14 01:40:05 +04:00
*/
2008-08-13 02:52:52 +04:00
int __attribute__ ( ( weak ) ) get_user_pages_fast ( unsigned long start ,
int nr_pages , int write , struct page * * pages )
{
struct mm_struct * mm = current - > mm ;
int ret ;
down_read ( & mm - > mmap_sem ) ;
ret = get_user_pages ( current , mm , start , nr_pages ,
write , 0 , pages , NULL ) ;
up_read ( & mm - > mmap_sem ) ;
return ret ;
}
EXPORT_SYMBOL_GPL ( get_user_pages_fast ) ;
2009-03-23 16:12:24 +03:00
/* Tracepoints definitions. */
EXPORT_TRACEPOINT_SYMBOL ( kmalloc ) ;
EXPORT_TRACEPOINT_SYMBOL ( kmem_cache_alloc ) ;
EXPORT_TRACEPOINT_SYMBOL ( kmalloc_node ) ;
EXPORT_TRACEPOINT_SYMBOL ( kmem_cache_alloc_node ) ;
EXPORT_TRACEPOINT_SYMBOL ( kfree ) ;
EXPORT_TRACEPOINT_SYMBOL ( kmem_cache_free ) ;