Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp969540ybl; Fri, 24 Jan 2020 12:55:53 -0800 (PST) X-Google-Smtp-Source: APXvYqz+uAu4gvVCjpc4vxMylgk1lvRCy+Ddn7NkN4aLcvtSxJci0sUr9ldc5W61AsEkVed1mTS7 X-Received: by 2002:aca:4d58:: with SMTP id a85mr498782oib.35.1579899353798; Fri, 24 Jan 2020 12:55:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579899353; cv=none; d=google.com; s=arc-20160816; b=QPsbS59/Lzgk8xtxbQYihORx0ViQH7/RiSV2hupVSOA5+Ey1cXan4Fj+lU6wOA7oAM IPPVJTTCRD6blGMpJsuXUhPlVe8eh0818i0wGFBq42Eg0Q7NrBC3Hzn91Q+AVKXE0j3u TTV+ti3w8hcGMwKNMteeE9fNJ4A44Wvv0OBskO2Yf5TA+BY5kGqnfBiTi3ePtfRG/kAO tT58j8yeBYX5nRiygQP0xCzYXP0v1iZmmRt3BbHzRVNamHcoUKxzIKbT8K0j0jevggow dEhDEqzT3aXJb+9mUM8zyK77KQd9E+saGg8I29G0jv0U65nxOQp3B8O7dExzo3alCZ5R +xjQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=QM61o1gs/0bd/WDHBdVHAo1RK3V3y0ZD0814081OSGo=; b=svOlMtx2vf7aKZsuEHefn7NngbulN+Cjq9WpHMi+h05gAOoVwSYScF1bx68zBb78qH GCHncQJeDJT1pNe3XUmgy7YKa1yEQVKSqYds+mwrY/RNiDVu1JD2aE9PXe+j2WNFgefx gm3sLveBP10xmn1ti6G1EiW3EL+WmbHCdKCYZMO83JgokUMyyb9JVoGellVjS5G14lqb jk5VNApgLqJRUPqYaPb28SL3AAjZkDgOlKozDoVL8N8ZnahHWNPZR/sGe4MyAwz2d/sO Jd4Mt8TBwCYYe0gs5ghJaKnw3mskB4ltxL4VJZ2vAKRR0EUBb/hF85OvgxgFV0OGfqK9 iHFQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ABAj8SwR; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z22si2932745otq.94.2020.01.24.12.55.42; Fri, 24 Jan 2020 12:55:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ABAj8SwR; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731326AbgAXRPt (ORCPT + 99 others); Fri, 24 Jan 2020 12:15:49 -0500 Received: from mail-lf1-f67.google.com ([209.85.167.67]:33274 "EHLO mail-lf1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730514AbgAXRPs (ORCPT ); Fri, 24 Jan 2020 12:15:48 -0500 Received: by mail-lf1-f67.google.com with SMTP id n25so1618737lfl.0 for ; Fri, 24 Jan 2020 09:15:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=QM61o1gs/0bd/WDHBdVHAo1RK3V3y0ZD0814081OSGo=; b=ABAj8SwRRPiIPl/fqXcYbgdCHEUVBPd9Zgw11KE2Y/v1LFKap1T6ZtqTLCZroMbjsX Ie3eBn4JH5HigxDicXtcoESGItIa+XLZoUI9r++NJWy5wJKmSXXUVxYs+EQNWaawKSYO zaEJGdVNnX1yrFxAKKfxnnKJ61cvJnUxOEDaqI1M8+1WvNyEL6R9bOu4k+svl8iJbnyX ZshPFNwGBqlWxs6aIcDG9/1cKISP8EreCYg0pt4IdWM2fIAc2zeLmLypJlyNhluZr8cH Bz69g40S7igGv78tk5x/VDJ3xicKIyU7nESC1SwHVeYN4xCzKUAeEdoVZf73QD6Y0vk3 R5ZQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=QM61o1gs/0bd/WDHBdVHAo1RK3V3y0ZD0814081OSGo=; b=Qx4920lKbpmW21cczDBcPURC+Cqca/R7xLPacICH0Mgh6rSDpfhGEtQoovgg+7jaaz zCNTnqlVdg2L0prqJJ9NABO9KTq/YL0ncK6kYAhwP+5aU+RyJeMTffxOVpkxPVTz2NUh 7dmRNpo53fMT+oRoQYFChRAobrJEK2MDciXHOEjp9twsTTDKFa1hneNMIwq2moRAp1/I CFoqsqTZinoFxqwPsZU+xS2pt87tfCFkcokbyV4fTIFzJBoeEZ+9QA5A6fvfetqPM5bC ntGX7PQE9cicJjS/r3R6QZk070W8KpbXj7b91akb6dgV5o1QxSunl7p1Gr7v+9nQqvVp HwdA== X-Gm-Message-State: APjAAAVTda9eEgp3z31JrI4T3CG0U11zOUiYs/HEmPB3hILx66DVRknW 6mX3h7C0cpcqfU82knlkiVU= X-Received: by 2002:ac2:428a:: with SMTP id m10mr1830095lfh.158.1579886146509; Fri, 24 Jan 2020 09:15:46 -0800 (PST) Received: from satellite.lan ([2001:470:b62f:eee0:3001:7c88:84ef:9c69]) by smtp.gmail.com with ESMTPSA id c15sm3417718ljd.58.2020.01.24.09.15.43 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Jan 2020 09:15:44 -0800 (PST) From: Maxim Mikityanskiy To: Marcel Holtmann , Johan Hedberg Cc: linux-bluetooth@vger.kernel.org, Martin Blumenstingl , Carlo Caione , Maxim Mikityanskiy Subject: [PATCH] Bluetooth: btrtl: Use kvmalloc for FW allocations Date: Fri, 24 Jan 2020 19:15:35 +0200 Message-Id: <20200124171535.32919-1-maxtram95@gmail.com> X-Mailer: git-send-email 2.25.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-bluetooth-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org Currently, kmemdup is applied to the firmware data, and it invokes kmalloc under the hood. The firmware size and patch_length are big (more than PAGE_SIZE), and on some low-end systems (like ASUS E202SA) kmalloc may fail to allocate a contiguous chunk under high memory usage and fragmentation: Bluetooth: hci0: RTL: examining hci_ver=06 hci_rev=000a lmp_ver=06 lmp_subver=8821 Bluetooth: hci0: RTL: rom_version status=0 version=1 Bluetooth: hci0: RTL: loading rtl_bt/rtl8821a_fw.bin kworker/u9:2: page allocation failure: order:4, mode:0x40cc0(GFP_KERNEL|__GFP_COMP), nodemask=(null),cpuset=/,mems_allowed=0 As firmware load happens on each resume, Bluetooth will stop working after several iterations, when the kernel fails to allocate an order-4 page. This patch replaces kmemdup with kvmalloc+memcpy. It's not required to have a contiguous chunk here, because it's not mapped to the device directly. Signed-off-by: Maxim Mikityanskiy --- drivers/bluetooth/btrtl.c | 20 +++++++++++--------- 1 file changed, 11 insertions(+), 9 deletions(-) diff --git a/drivers/bluetooth/btrtl.c b/drivers/bluetooth/btrtl.c index f838537f9f89..577cfa3329db 100644 --- a/drivers/bluetooth/btrtl.c +++ b/drivers/bluetooth/btrtl.c @@ -370,11 +370,11 @@ static int rtlbt_parse_firmware(struct hci_dev *hdev, * the end. */ len = patch_length; - buf = kmemdup(btrtl_dev->fw_data + patch_offset, patch_length, - GFP_KERNEL); + buf = kvmalloc(patch_length, GFP_KERNEL); if (!buf) return -ENOMEM; + memcpy(buf, btrtl_dev->fw_data + patch_offset, patch_length - 4); memcpy(buf + patch_length - 4, &epatch_info->fw_version, 4); *_buf = buf; @@ -460,8 +460,10 @@ static int rtl_load_file(struct hci_dev *hdev, const char *name, u8 **buff) if (ret < 0) return ret; ret = fw->size; - *buff = kmemdup(fw->data, ret, GFP_KERNEL); - if (!*buff) + *buff = kvmalloc(fw->size, GFP_KERNEL); + if (*buff) + memcpy(*buff, fw->data, ret); + else ret = -ENOMEM; release_firmware(fw); @@ -499,14 +501,14 @@ static int btrtl_setup_rtl8723b(struct hci_dev *hdev, goto out; if (btrtl_dev->cfg_len > 0) { - tbuff = kzalloc(ret + btrtl_dev->cfg_len, GFP_KERNEL); + tbuff = kvzalloc(ret + btrtl_dev->cfg_len, GFP_KERNEL); if (!tbuff) { ret = -ENOMEM; goto out; } memcpy(tbuff, fw_data, ret); - kfree(fw_data); + kvfree(fw_data); memcpy(tbuff + ret, btrtl_dev->cfg_data, btrtl_dev->cfg_len); ret += btrtl_dev->cfg_len; @@ -519,14 +521,14 @@ static int btrtl_setup_rtl8723b(struct hci_dev *hdev, ret = rtl_download_firmware(hdev, fw_data, ret); out: - kfree(fw_data); + kvfree(fw_data); return ret; } void btrtl_free(struct btrtl_device_info *btrtl_dev) { - kfree(btrtl_dev->fw_data); - kfree(btrtl_dev->cfg_data); + kvfree(btrtl_dev->fw_data); + kvfree(btrtl_dev->cfg_data); kfree(btrtl_dev); } EXPORT_SYMBOL_GPL(btrtl_free); -- 2.25.0