From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753057Ab2JAJzW (ORCPT ); Mon, 1 Oct 2012 05:55:22 -0400 Received: from mx1.redhat.com ([209.132.183.28]:15140 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752458Ab2JAJzV (ORCPT ); Mon, 1 Oct 2012 05:55:21 -0400 Date: Mon, 1 Oct 2012 15:09:49 +0530 From: Amit Shah To: Sjur BRENDELAND Cc: Masami Hiramatsu , "linux-kernel@vger.kernel.org" , "virtualization@lists.linux-foundation.org" , "sjurbren@gmail.com" , Rusty Russell , "Michael S. Tsirkin" , Linus Walleij , "yrl.pp-manager.tt@hitachi.com" Subject: Re: [PATCH 1/3] virtio_console:Merge struct buffer_token into struct port_buffer Message-ID: <20121001093949.GE9810@amit.redhat.com> References: <1348580837-10919-1-git-send-email-sjur.brandeland@stericsson.com> <1348580837-10919-2-git-send-email-sjur.brandeland@stericsson.com> <50626C11.9040708@hitachi.com> <81C3A93C17462B4BBD7E272753C1057923BD8365F7@EXDCVYMBSTM005.EQ1STM.local> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <81C3A93C17462B4BBD7E272753C1057923BD8365F7@EXDCVYMBSTM005.EQ1STM.local> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On (Wed) 26 Sep 2012 [09:48:12], Sjur BRENDELAND wrote: > > > This merge reduces code size by unifying the approach for > > > sending scatter-lists and regular buffers. Any type of > > > write operation (splice, write, put_chars) will now allocate > > > a port_buffer and send_buf() and free_buf() can always be used. > > > > Thanks! > > This looks much nicer and simpler. I just have some comments below. > > OK, good to hear that you agree to this kind of change. I'll do a respin > of this patch fixing the issues you have pointed out. > > > > static void free_buf(struct port_buffer *buf) > > > { > > > + int i; > > > + > > > kfree(buf->buf); > > > > this should be done only when !buf->sgpages, or (see below) > > Agree, I'll put this statement in an else branch to the if-statement below. Not necessary; see my comments in another mail. > > > -static struct port_buffer *alloc_buf(size_t buf_size) > > > +static struct port_buffer *alloc_buf(struct virtqueue *vq, size_t buf_size, > > > + int nrbufs) > > > { > > > struct port_buffer *buf; > > > + size_t alloc_size; > > > > > > - buf = kmalloc(sizeof(*buf), GFP_KERNEL); > > > + /* Allocate buffer and the scatter list */ > > > + alloc_size = sizeof(*buf) + sizeof(struct scatterlist) * nrbufs; > > > > This allocates one redundant sg entry when nrbuf > 0, > > but I think it is OK. (just a comment) > > I did this on purpose for the sake of simplicity, but I can > change this to something like: > alloc_size = sizeof(*buf) + sizeof(buf->sg) * max(nrbufs - 1, 1); > > > > > + buf = kmalloc(alloc_size, GFP_ATOMIC); > > > > This should be kzalloc(), or buf->buf and others are not initialized, > > which will cause unexpected kfree bug at kfree(buf->buf) in free_buf. > > Agree, kzalloc() is better in this case. Not really -- one thing I've picked up from Rusty is to use kmallocs and explicitly initialise values. Then, missing such initialisations (like in this case) will cause tools like valgrind to show the error pretty quickly. > > > if (!buf) > > > goto fail; > > > - buf->buf = kzalloc(buf_size, GFP_KERNEL); > > > + > > > + buf->sgpages = nrbufs; > > > + if (nrbufs > 0) > > > + return buf; > > > + > > > + buf->buf = kmalloc(buf_size, GFP_ATOMIC); > > > > You can also use kzalloc here as previous code does. > > But if the reason why using kzalloc comes from the security, > > I think kmalloc is enough here, since the host can access > > all the guest pages anyway. > > With this new patch alloc_buf() is used both for both RX and TX. > The out_vq did previously use malloc(). But I have preserved > the legacy behavior for the in_vq by calling memset() in function > fill_queue(). But we're dropping the memset/kzalloc anyway. Amit