Received: by 2002:a05:6a10:c7c6:0:0:0:0 with SMTP id h6csp682091pxy; Sat, 31 Jul 2021 22:18:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJynpqotjoi8AEE0LtXQskVSi1QEoVSBR7X6q9dT475BzRUBGFj0BoFU8R9CSYaAZZ03KBWK X-Received: by 2002:a17:906:3794:: with SMTP id n20mr8424947ejc.362.1627795091337; Sat, 31 Jul 2021 22:18:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627795091; cv=none; d=google.com; s=arc-20160816; b=0xLULS0I7tfLrfWgu6qMPBu8/gF1ZOay6l6cQg5TmrTp+iR60TBta40C98uaKTf9+G +GKGKsj/CvyqhdLf4qYqeFqy0ILIIZNBldHlDstPPSZ+hyzEzRsUPbWVSdrgojCrb2CC fYQW2drNsXBTfQc1RuA4xZDt7VFQ+suQD/BeUag/MgxK9ooTBSjDN304igUzosl2eB3O SUfMxpmenjgN0iwfAW+GUfKlLh0lAk+H3ehKPLBvkaq32D7t8U7/eN1gD65Im/WngJEB AmXz5/v4fxhqE4RfnhwvriVBAArwnmCBlLELoKclvy2Nr7X6NfOzrBTV+LcFkP+4RN/e DwZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=MuZoonSDNcaXq/hqSQnGOEsTVdWxJGIcNAcGquaK7mo=; b=nVCWRkSsqn26zAoVqUpQpIs4S6oLXnqJA3wM1BqFvkN9RaAo9X3L9gVxRBcorigION xoYnO8DtjugR7NEOceDGtm3bmzSmiOsSdpyBzJZVhU56HgiaZndB7dTui+bmM0rYxlIb dDas9XbcNARkq5vrDsdDMhTiVDKD1MmvgmbtEDMN1Y6Pz8tzRQnWN6pLKIWi1KQSiD0F 0o0xvKtoe+OSgRq29DxbCz9exCKq8B1opJizc6w+jaRQ4ZJ0NorOMZ45688uP7NXLuW1 oUFs4dg+/l0zJ6V1X3PoDy2hMJjytjs5a30tgqjMzbTJUddb/WfNUdrbztD2iEn7XfIg KdCQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w3si416475ejk.27.2021.07.31.22.17.48; Sat, 31 Jul 2021 22:18:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229557AbhHAFQm (ORCPT + 99 others); Sun, 1 Aug 2021 01:16:42 -0400 Received: from out30-42.freemail.mail.aliyun.com ([115.124.30.42]:50589 "EHLO out30-42.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229610AbhHAFQm (ORCPT ); Sun, 1 Aug 2021 01:16:42 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R151e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04420;MF=xianting.tian@linux.alibaba.com;NM=1;PH=DS;RN=8;SR=0;TI=SMTPD_---0UhaOfk-_1627794989; Received: from localhost(mailfrom:xianting.tian@linux.alibaba.com fp:SMTPD_---0UhaOfk-_1627794989) by smtp.aliyun-inc.com(127.0.0.1); Sun, 01 Aug 2021 13:16:29 +0800 From: Xianting Tian To: gregkh@linuxfoundation.org, jirislaby@kernel.org, amit@kernel.org, arnd@arndb.de Cc: linuxppc-dev@lists.ozlabs.org, virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, Xianting Tian Subject: [PATCH 1/2] tty: hvc: pass DMA capable memory to put_chars() Date: Sun, 1 Aug 2021 13:16:27 +0800 Message-Id: <20210801051627.78999-1-xianting.tian@linux.alibaba.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org As well known, hvc backend can register its opertions to hvc backend. the opertions contain put_chars(), get_chars() and so on. Some hvc backend may do dma in its opertions. eg, put_chars() of virtio-console. But in the code of hvc framework, it may pass DMA incapable memory to put_chars() under a specific configuration, which is explained in commit c4baad5029(virtio-console: avoid DMA from stack): 1, c[] is on stack, hvc_console_print(): char c[N_OUTBUF] __ALIGNED__; cons_ops[index]->put_chars(vtermnos[index], c, i); 2, ch is on stack, static void hvc_poll_put_char(,,char ch) { struct tty_struct *tty = driver->ttys[0]; struct hvc_struct *hp = tty->driver_data; int n; do { n = hp->ops->put_chars(hp->vtermno, &ch, 1); } while (n <= 0); } Commit c4baad5029 is just the fix to avoid DMA from stack memory, which is passed to virtio-console by hvc framework in above code. But I think the fix is aggressive, it directly uses kmemdup() to alloc new buffer from kmalloc area and do memcpy no matter the memory is in kmalloc area or not. But most importantly, it should better be fixed in the hvc framework, by changing it to never pass stack memory to the put_chars() function in the first place. Otherwise, we still face the smae issue if a new hvc backend using dma added in the furture. Considering lock competition of hp->outbuf and the complicated logic in hvc_console_print(), I didn’t use hp->outbuf, just allocate additional memory(length N_OUTBUF) and append it to hp->outbuf. For the issue in hvc_poll_put_char(), I use a static char to replace the char in stack. With the patch, we can remove the fix c4baad5029. Signed-off-by: Xianting Tian Tested-by: Xianting Tian --- drivers/tty/hvc/hvc_console.c | 14 +++++++++++--- 1 file changed, 11 insertions(+), 3 deletions(-) diff --git a/drivers/tty/hvc/hvc_console.c b/drivers/tty/hvc/hvc_console.c index 5bb8c4e44..f7a7fa083 100644 --- a/drivers/tty/hvc/hvc_console.c +++ b/drivers/tty/hvc/hvc_console.c @@ -151,9 +151,10 @@ static uint32_t vtermnos[MAX_NR_HVC_CONSOLES] = static void hvc_console_print(struct console *co, const char *b, unsigned count) { - char c[N_OUTBUF] __ALIGNED__; + char *c; unsigned i = 0, n = 0; int r, donecr = 0, index = co->index; + struct hvc_struct *hp; /* Console access attempt outside of acceptable console range. */ if (index >= MAX_NR_HVC_CONSOLES) @@ -163,8 +164,14 @@ static void hvc_console_print(struct console *co, const char *b, if (vtermnos[index] == -1) return; + list_for_each_entry(hp, &hvc_structs, next) + if (hp->vtermno == vtermnos[index]) + break; + + c = &hp->outbuf[hp->outbuf_size]; + while (count > 0 || i > 0) { - if (count > 0 && i < sizeof(c)) { + if (count > 0 && i < N_OUTBUF) { if (b[n] == '\n' && !donecr) { c[i++] = '\r'; donecr = 1; @@ -878,6 +885,7 @@ static void hvc_poll_put_char(struct tty_driver *driver, int line, char ch) struct tty_struct *tty = driver->ttys[0]; struct hvc_struct *hp = tty->driver_data; int n; + static char ch = ch; do { n = hp->ops->put_chars(hp->vtermno, &ch, 1); @@ -922,7 +930,7 @@ struct hvc_struct *hvc_alloc(uint32_t vtermno, int data, return ERR_PTR(err); } - hp = kzalloc(ALIGN(sizeof(*hp), sizeof(long)) + outbuf_size, + hp = kzalloc(ALIGN(sizeof(*hp), sizeof(long)) + outbuf_size + N_OUTBUF, GFP_KERNEL); if (!hp) return ERR_PTR(-ENOMEM); -- 2.17.1