From patchwork Tue Dec 16 21:18:07 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Simon Glass X-Patchwork-Id: 921 Return-Path: X-Original-To: u-boot-concept@u-boot.org Delivered-To: u-boot-concept@u-boot.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=u-boot.org; s=default; t=1765919929; bh=/+XIOulVIgz1CYgyrhZam0CyDExo/oFui8/peA+7VQc=; h=From:To:Date:In-Reply-To:References:CC:Subject:List-Id: List-Archive:List-Help:List-Owner:List-Post:List-Subscribe: List-Unsubscribe:From; b=DbQeWv5uBMYZsSt9xGEEY3CHYVOF69wB/SwrK7liy+xoFyIWSQDq6oJuppTSPnfLc bCvpXElCOnntoDnIDYQ9qfJg3xMHXBhCwyB28kf/FbykZ9CcTwWDdRgcxr9YQTfcPN 0fbG4nBvy3cSjXPaW6nTjrhBBfTOsuKo2d25yNcgkq0enpL2I+/Y37TmceQetPLVIZ 6R7Pognu8vVzUTZl57lBK3libKSh+Mo9zYPtkL/mJk5GGRL8LRbYkJ2L/GLbV4cq4c GUkjcu4xQHw7kclLPwXAqAnrFU6OVd4ywElv8/sS7ywroN9SXPeLHyjrxoRxTqoavX 9urAtFs1CrAQg== Received: from localhost (localhost [127.0.0.1]) by mail.u-boot.org (Postfix) with ESMTP id DD36868B8F for ; Tue, 16 Dec 2025 14:18:49 -0700 (MST) X-Virus-Scanned: Debian amavis at Received: from mail.u-boot.org ([127.0.0.1]) by localhost (mail.u-boot.org [127.0.0.1]) (amavis, port 10024) with ESMTP id PNjkho4U4uJ9 for ; Tue, 16 Dec 2025 14:18:49 -0700 (MST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=u-boot.org; s=default; t=1765919929; bh=/+XIOulVIgz1CYgyrhZam0CyDExo/oFui8/peA+7VQc=; h=From:To:Date:In-Reply-To:References:CC:Subject:List-Id: List-Archive:List-Help:List-Owner:List-Post:List-Subscribe: List-Unsubscribe:From; b=DbQeWv5uBMYZsSt9xGEEY3CHYVOF69wB/SwrK7liy+xoFyIWSQDq6oJuppTSPnfLc bCvpXElCOnntoDnIDYQ9qfJg3xMHXBhCwyB28kf/FbykZ9CcTwWDdRgcxr9YQTfcPN 0fbG4nBvy3cSjXPaW6nTjrhBBfTOsuKo2d25yNcgkq0enpL2I+/Y37TmceQetPLVIZ 6R7Pognu8vVzUTZl57lBK3libKSh+Mo9zYPtkL/mJk5GGRL8LRbYkJ2L/GLbV4cq4c GUkjcu4xQHw7kclLPwXAqAnrFU6OVd4ywElv8/sS7ywroN9SXPeLHyjrxoRxTqoavX 9urAtFs1CrAQg== Received: from mail.u-boot.org (localhost [127.0.0.1]) by mail.u-boot.org (Postfix) with ESMTP id CB39168AF5 for ; Tue, 16 Dec 2025 14:18:49 -0700 (MST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=u-boot.org; s=default; t=1765919928; bh=9letgCL1DAGrU6XtioDUSw5cXUXWgDEMyZ3d4FKpG1w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=w5X/XNMhCLf14RUJBr+1EJOCgQ/SL/nqjRV73LFMGDJJ9bkgAJEsdyhYUn6XvyfFL 4LfCb5zcQS8L/nQint2WK7E54R7IH5c//uK63DxsiYLgcxsBJaw2GZFPNdQOl6Zmqy fuGP/TGBUn8vtuRxkxJgz4BVOT4cd4GUkcEqwdmBXW5Ak0l/vMbFJ/5OLKmiJrO8O/ COaqQmPkbFzVrEGzQNiC0MdvcyzlkTzx/edKziIA2gfT1/WSP8DPtqbQQeOtcqdEeg Zk844Eson30RINalKac4YIm951ksgoHjTq3WF7qAE16er0of5BUMRXKLRdMY+hGG08 M4uoVWT4gcBJg== Received: from localhost (localhost [127.0.0.1]) by mail.u-boot.org (Postfix) with ESMTP id 20CBD68AD5; Tue, 16 Dec 2025 14:18:48 -0700 (MST) X-Virus-Scanned: Debian amavis at Received: from mail.u-boot.org ([127.0.0.1]) by localhost (mail.u-boot.org [127.0.0.1]) (amavis, port 10026) with ESMTP id psU7Gkmyii3g; Tue, 16 Dec 2025 14:18:48 -0700 (MST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=u-boot.org; s=default; t=1765919921; bh=E6818WhfCQycRpAMhvdxxiVki2FEUJFPw3IjVrA+imI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=IxJJtMOfg56oOhK6kUuIxNcaB7F48MS4j8dAtnJ1pIK0onFLY2zeNyX0azunFy5xa zbajz55HYUb4kzOlMg+AUtbNEnCz9y35NX1agzjmNalJAz+QBaF9XEPWHc6izYOEsZ TqYmfOeritJLR9jHdvxX28Lchqe0YizQ59JLRyOSSn1MYD2O90zt8qeFRUanUyCjcW CMzO0ukLlJOxQ+zr1a+SyQ7hYbLW+yhAVEz5F8BNnBHu8HYjkKAv9a7CiOp1M68mQO Q6wdIEMBd076fAoJSLHqJgN7DOpeJ9pAIaxRM4Mpn3BzAn4iMz8T5fP4DEMz7PMyso eQVSN99Hu/tBw== Received: from u-boot.org (unknown [73.34.74.121]) by mail.u-boot.org (Postfix) with ESMTPSA id D99F5689CD; Tue, 16 Dec 2025 14:18:40 -0700 (MST) From: Simon Glass To: U-Boot Concept Date: Tue, 16 Dec 2025 14:18:07 -0700 Message-ID: <20251216211817.4131167-7-sjg@u-boot.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251216211817.4131167-1-sjg@u-boot.org> References: <20251216211817.4131167-1-sjg@u-boot.org> MIME-Version: 1.0 Message-ID-Hash: 6YSIVG6W6VTFXVUUBPJG34W7QWMR4UO3 X-Message-ID-Hash: 6YSIVG6W6VTFXVUUBPJG34W7QWMR4UO3 X-MailFrom: sjg@u-boot.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; loop; banned-address; emergency; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: Simon Glass , "Claude Opus 4 . 5" X-Mailman-Version: 3.3.10 Precedence: list Subject: [Concept] [PATCH 06/11] ext4l: Extract alloc declarations into their own file List-Id: Discussion and patches related to U-Boot Concept Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: From: Simon Glass Create include/linux/slab.h and include/linux/vmalloc.h with memory allocation functions: slab.h: - GFP flags (GFP_KERNEL, GFP_ATOMIC, etc.) - kmalloc(), kzalloc(), kcalloc(), kmalloc_array() - kfree(), krealloc(), kmemdup() - kmem_cache_* functions vmalloc.h: - vmalloc(), vzalloc(), vfree() - __vmalloc() Update compat.h to include these headers and remove duplicate definitions. Co-developed-by: Claude Opus 4.5 Signed-off-by: Simon Glass --- include/linux/compat.h | 58 ++---------------------------- include/linux/slab.h | 79 +++++++++++++++++++++++++++++++++++++++++ include/linux/vmalloc.h | 24 +++++++++++++ 3 files changed, 105 insertions(+), 56 deletions(-) create mode 100644 include/linux/slab.h create mode 100644 include/linux/vmalloc.h diff --git a/include/linux/compat.h b/include/linux/compat.h index 190c3820a14..28207fb96b8 100644 --- a/include/linux/compat.h +++ b/include/linux/compat.h @@ -14,7 +14,9 @@ #include #include #include +#include #include +#include #ifdef CONFIG_XEN #include @@ -29,61 +31,6 @@ struct p_current{ extern struct p_current *current; -#define GFP_ATOMIC ((gfp_t) 0) -#define GFP_KERNEL ((gfp_t) 0) -#define GFP_NOFS ((gfp_t) 0) -#define GFP_USER ((gfp_t) 0) -#define __GFP_NOWARN ((gfp_t) 0) -#define __GFP_ZERO ((__force gfp_t)0x8000u) /* Return zeroed page on success */ - -void *kmalloc(size_t size, int flags); - -static inline void *kzalloc(size_t size, gfp_t flags) -{ - return kmalloc(size, flags | __GFP_ZERO); -} - -static inline void *kmalloc_array(size_t n, size_t size, gfp_t flags) -{ - if (size != 0 && n > SIZE_MAX / size) - return NULL; - return kmalloc(n * size, flags | __GFP_ZERO); -} - -static inline void *kcalloc(size_t n, size_t size, gfp_t flags) -{ - return kmalloc_array(n, size, flags | __GFP_ZERO); -} - -#define vmalloc(size) kmalloc(size, 0) -#define __vmalloc(size, flags, pgsz) kmalloc(size, flags) -static inline void *vzalloc(unsigned long size) -{ - return kzalloc(size, 0); -} -static inline void kfree(const void *block) -{ - free((void *)block); -} -static inline void vfree(const void *addr) -{ - free((void *)addr); -} - -struct kmem_cache { int sz; }; - -struct kmem_cache *get_mem(int element_sz); -#define kmem_cache_create(a, sz, c, d, e) get_mem(sz) -void *kmem_cache_alloc(struct kmem_cache *obj, int flag); -static inline void kmem_cache_free(struct kmem_cache *cachep, void *obj) -{ - free(obj); -} -static inline void kmem_cache_destroy(struct kmem_cache *cachep) -{ - free(cachep); -} - #define DECLARE_WAITQUEUE(...) do { } while (0) #define add_wait_queue(...) do { } while (0) #define remove_wait_queue(...) do { } while (0) @@ -357,7 +304,6 @@ struct writeback_control { unsigned for_sync:1; /* sync(2) WB_SYNC_ALL writeback */ }; -void *kmemdup(const void *src, size_t len, gfp_t gfp); typedef int irqreturn_t; diff --git a/include/linux/slab.h b/include/linux/slab.h new file mode 100644 index 00000000000..2ea124a420d --- /dev/null +++ b/include/linux/slab.h @@ -0,0 +1,79 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +/* + * Written by Mark Hemment, 1996 (markhe@nextd.demon.co.uk). + * + * (C) SGI 2006, Christoph Lameter + * Cleaned up and restructured to ease the addition of alternative + * implementations of SLAB allocators. + * (C) Linux Foundation 2008-2013 + * Unified interface for all slab allocators + * + * Memory allocation functions for Linux kernel compatibility. + * These map to U-Boot's malloc/free infrastructure. + */ +#ifndef _LINUX_SLAB_H +#define _LINUX_SLAB_H + +#include +#include + +#define GFP_ATOMIC ((gfp_t)0) +#define GFP_KERNEL ((gfp_t)0) +#define GFP_NOFS ((gfp_t)0) +#define GFP_USER ((gfp_t)0) +#define GFP_NOWAIT ((gfp_t)0) +#define __GFP_NOWARN ((gfp_t)0) +#define __GFP_ZERO ((__force gfp_t)0x8000u) +#define __GFP_NOFAIL ((gfp_t)0) + +void *kmalloc(size_t size, gfp_t flags); + +static inline void *kzalloc(size_t size, gfp_t flags) +{ + return kmalloc(size, flags | __GFP_ZERO); +} + +static inline void *kmalloc_array(size_t n, size_t size, gfp_t flags) +{ + if (size != 0 && n > SIZE_MAX / size) + return NULL; + return kmalloc(n * size, flags | __GFP_ZERO); +} + +static inline void *kcalloc(size_t n, size_t size, gfp_t flags) +{ + return kmalloc_array(n, size, flags | __GFP_ZERO); +} + +static inline void kfree(const void *block) +{ + free((void *)block); +} + +static inline void *krealloc(const void *p, size_t new_size, gfp_t flags) +{ + return realloc((void *)p, new_size); +} + +void *kmemdup(const void *src, size_t len, gfp_t gfp); + +/* kmem_cache stubs */ +struct kmem_cache { + int sz; +}; + +struct kmem_cache *get_mem(int element_sz); +#define kmem_cache_create(a, sz, c, d, e) get_mem(sz) +void *kmem_cache_alloc(struct kmem_cache *obj, gfp_t flag); + +static inline void kmem_cache_free(struct kmem_cache *cachep, void *obj) +{ + free(obj); +} + +static inline void kmem_cache_destroy(struct kmem_cache *cachep) +{ + free(cachep); +} + +#endif /* _LINUX_SLAB_H */ diff --git a/include/linux/vmalloc.h b/include/linux/vmalloc.h new file mode 100644 index 00000000000..b8b5e5e63a2 --- /dev/null +++ b/include/linux/vmalloc.h @@ -0,0 +1,24 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +/* + * vmalloc functions for Linux kernel compatibility. + * In U-Boot, these just map to regular malloc. + */ +#ifndef _LINUX_VMALLOC_H +#define _LINUX_VMALLOC_H + +#include + +#define vmalloc(size) kmalloc(size, 0) +#define __vmalloc(size, flags, pgsz) kmalloc(size, flags) + +static inline void *vzalloc(unsigned long size) +{ + return kzalloc(size, 0); +} + +static inline void vfree(const void *addr) +{ + free((void *)addr); +} + +#endif /* _LINUX_VMALLOC_H */