Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp1276425pxu; Thu, 17 Dec 2020 06:28:35 -0800 (PST) X-Google-Smtp-Source: ABdhPJyaOFVr/Oq2q2LPcn+PClfqcmIrjNOPzqMYWKgIJtDDHc76u5iUzx6wWWux7TUH+h2uGVgy X-Received: by 2002:aa7:da03:: with SMTP id r3mr23530264eds.155.1608215315431; Thu, 17 Dec 2020 06:28:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1608215315; cv=none; d=google.com; s=arc-20160816; b=Hd2S0Mbe6Id1qGlRABnU6CYA7gGqGWPMjh1oOjLZpfsONFFPTRL8GR9HhGP1UvcMTQ b8lfk6v+3AEC8I/0vQuAemu+H6pR1fTOlrSzTDkMLhoTMG/QRdDQfOvhd2qA16ykkhH2 gjzN/pfhwlwXQNUVz/BBZpC5BAQdfNhGRU4TINGAbfzOagjtlq0eh0qfkrDprnElKWxr OyDAUx+bcoJQ5V3IqyFUrSXI8Qju1tJ13wXTQPTlj7FZ8irkLYSt3xZgQrxb8sJE9qcF gwnszp/WiDhSZjjWUguu8O/CAijwolYtmPbkzZISeyaHWlGTF/SkbthiDF5m29I8KBQW XLlg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:in-reply-to :subject:cc:to:from:message-id:date; bh=7c6AjHtm2MeG75rQUFswwjjFC87rWrY0fHU/X4It9Uk=; b=ftnTeblx/wa8oICuJrlUHv49Bid5IcqY3pbIScL0gPzTz1dYYOpmBSD1rFW2CaB+Tz y7yAt3MMvTOU1vG62M0V+tgiBRNUcxOYiCSGrCpvjzravFy8fN6CnbT5TNG0abtKlwjf PYXbVIgnoQgha9yQR0ASPaqvpM0Zd4jhJ2DfnINDxhMykgfVsDatNX3I46++LmaJ1Irr OOMWMdxOPKlf9TrpaUH0rDzUyitnhaOm9SN1DirXUYSxyUEDk4v3XhEjgZwdDna7dx7h pOnYME7SWOiklgjqghEHhp8XvayO33srwhGp4f1l2UXlQida3twrLFLuz1szEER5ox4K Ub+g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n6si2623361ejy.51.2020.12.17.06.28.11; Thu, 17 Dec 2020 06:28:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728538AbgLQOZH (ORCPT + 99 others); Thu, 17 Dec 2020 09:25:07 -0500 Received: from mx2.suse.de ([195.135.220.15]:35654 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728534AbgLQOZE (ORCPT ); Thu, 17 Dec 2020 09:25:04 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 7B624B75F; Thu, 17 Dec 2020 14:24:21 +0000 (UTC) Date: Thu, 17 Dec 2020 15:24:21 +0100 Message-ID: From: Takashi Iwai To: Lars-Peter Clausen Cc: alsa-devel@alsa-project.org, gustavoars@kernel.org, linux-kernel@vger.kernel.org, shengjiu.wang@nxp.com, tiwai@suse.com, pierre-louis.bossart@linux.intel.com, xiang@kernel.org, Robin Gong , akpm@linux-foundation.org Subject: Re: [PATCH v1 ] ALSA: core: memalloc: add page alignment for iram In-Reply-To: <8e103a2b-1097-6d54-7266-34743321efac@metafoo.de> References: <1608221747-3474-1-git-send-email-yibin.gong@nxp.com> <05c824e5-0c33-4182-26fa-b116a42b10d6@metafoo.de> <70074f62-954a-9b40-ab4a-cb438925060c@metafoo.de> <8e103a2b-1097-6d54-7266-34743321efac@metafoo.de> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI/1.14.6 (Maruoka) FLIM/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL/10.8 Emacs/25.3 (x86_64-suse-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka") Content-Type: text/plain; charset=US-ASCII Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 17 Dec 2020 14:16:48 +0100, Lars-Peter Clausen wrote: > > On 12/17/20 12:06 PM, Takashi Iwai wrote: > > On Thu, 17 Dec 2020 11:59:23 +0100, > > Lars-Peter Clausen wrote: > >> On 12/17/20 10:55 AM, Takashi Iwai wrote: > >>> On Thu, 17 Dec 2020 10:43:45 +0100, > >>> Lars-Peter Clausen wrote: > >>>> On 12/17/20 5:15 PM, Robin Gong wrote: > >>>>> Since mmap for userspace is based on page alignment, add page alignment > >>>>> for iram alloc from pool, otherwise, some good data located in the same > >>>>> page of dmab->area maybe touched wrongly by userspace like pulseaudio. > >>>>> > >>>> I wonder, do we also have to align size to be a multiple of PAGE_SIZE > >>>> to avoid leaking unrelated data? > >>> Hm, a good question. Basically the PCM buffer size itself shouldn't > >>> be influenced by that (i.e. no hw-constraint or such is needed), but > >>> the padding should be cleared indeed. I somehow left those to the > >>> allocator side, but maybe it's safer to clear the whole buffer in > >>> sound/core/memalloc.c commonly. > >> What I meant was that most of the APIs that we use to allocate memory > >> work on a PAGE_SIZE granularity. I.e. if you request a buffer that > >> where the size is not a multiple of PAGE_SIZE internally they will > >> still allocate a buffer that is a multiple of PAGE_SIZE and mark the > >> unused bytes as reserved. > >> > >> But I believe that is not the case gen_pool_dma_alloc(). It will > >> happily allocate those extra bytes to some other allocation request. > >> > >> That we need to zero out the reserved bytes even for those other APIs > >> is a very good additional point! > >> > >> I looked at this a few years ago and I'm pretty sure that we cleared > >> out the allocated area, but I can't find that anymore in the current > >> code. Which is not so great I guess. > > IIRC, we used GFP_ZERO in the past for the normal page allocations, > > but this was dropped as it's no longer supported or so. > > > > Also, we clear out the PCM buffer in hw_params call, but this is for > > the requested size, not the actual allocated size, hence the padding > > bytes will remain uncleared. > Ah! That memset() in hw_params is new. > > > > So I believe it's safer to add an extra memset() like my test patch. > > Yea, we definitely want that. > > Do we care about leaking audio samples from a previous > application. I.e. application 'A' allocates a buffer plays back some > data and then closes the device again. Application 'B' then opens the > same audio devices allocates a slightly smaller buffer, so that it > still uses the same number of pages. The buffer from the previous > allocation get reused, but the remainder of the last page wont get > cleared in hw_params(). That's true. On the second though, it might be better to extend that memset() in hw_params to assure clearing the whole allocated buffer. We can check runtime->dma_buffer_p->bytes for the actual size. Also, in the PCM memory allocator, we make sure that the allocation is performed for page size. Below is another untested patch. thanks, Takashi --- --- a/sound/core/pcm_memory.c +++ b/sound/core/pcm_memory.c @@ -36,6 +36,7 @@ static int do_alloc_pages(struct snd_card *card, int type, struct device *dev, { int err; + size = PAGE_ALIGN(size); if (max_alloc_per_card && card->total_pcm_alloc_bytes + size > max_alloc_per_card) return -ENOMEM; @@ -187,7 +188,7 @@ static void snd_pcm_lib_preallocate_proc_write(struct snd_info_entry *entry, buffer->error = -ENOMEM; return; } - substream->buffer_bytes_max = size; + substream->buffer_bytes_max = new_dmab.bytes; } else { substream->buffer_bytes_max = UINT_MAX; } diff --git a/sound/core/pcm_native.c b/sound/core/pcm_native.c index 47b155a49226..6aabad070abf 100644 --- a/sound/core/pcm_native.c +++ b/sound/core/pcm_native.c @@ -755,8 +755,15 @@ static int snd_pcm_hw_params(struct snd_pcm_substream *substream, runtime->boundary *= 2; /* clear the buffer for avoiding possible kernel info leaks */ - if (runtime->dma_area && !substream->ops->copy_user) - memset(runtime->dma_area, 0, runtime->dma_bytes); + if (runtime->dma_area && !substream->ops->copy_user) { + size_t size; + + if (runtime->dma_buffer_p) + size = runtime->dma_buffer_p->bytes; + else + size = runtime->dma_bytes; + memset(runtime->dma_area, 0, size); + } snd_pcm_timer_resolution_change(substream); snd_pcm_set_state(substream, SNDRV_PCM_STATE_SETUP);