aboutsummaryrefslogtreecommitdiffstats
path: root/arch/um/kernel/tt
diff options
context:
space:
mode:
authorJeff Dike <jdike@addtoit.com>2007-05-06 17:51:32 -0400
committerLinus Torvalds <torvalds@woody.linux-foundation.org>2007-05-07 15:13:03 -0400
commit3d564047a5f45cb628ec72514f68076e532988f3 (patch)
tree3a4247baed8e66bfe5d159f058a88c1a5b7e7ed1 /arch/um/kernel/tt
parentf9d6e5f83b40d8ff73a74d4bba2c5f51d6048b12 (diff)
uml: start fixing os_read_file and os_write_file
This patch starts the removal of a very old, very broken piece of code. This stems from the problem of passing a userspace buffer into read() or write() on the host. If that buffer had not yet been faulted in, read and write will return -EFAULT. To avoid this problem, the solution was to fault the buffer in before the system call by touching the pages that hold the buffer by doing a copy-user of a byte to each page. This is obviously bogus, but it does usually work, in tt mode, since the kernel and process are in the same address space and userspace addresses can be accessed directly in the kernel. In skas mode, where the kernel and process are in separate address spaces, it is completely bogus because the userspace address, which is invalid in the kernel, is passed into the system call instead of the corresponding physical address, which would be valid. Here, it appears that this code, on every host read() or write(), tries to fault in a random process page. This doesn't seem to cause any correctness problems, but there is a performance impact. This patch, and the ones following, result in a 10-15% performance gain on a kernel build. This code can't be immediately tossed out because when it is, you can't log in. Apparently, there is some code in the console driver which depends on this somehow. However, we can start removing it by switching the code which does I/O using kernel addresses to using plain read() and write(). This patch introduces os_read_file_k and os_write_file_k for use with kernel buffers and converts all call locations which use obvious kernel buffers to use them. These include I/O using buffers which are local variables which are on the stack or kmalloc-ed. Later patches will handle the less obvious cases, followed by a mass conversion back to the original interface. Signed-off-by: Jeff Dike <jdike@linux.intel.com> Cc: Paolo 'Blaisorblade' Giarrusso <blaisorblade@yahoo.it> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'arch/um/kernel/tt')
-rw-r--r--arch/um/kernel/tt/process_kern.c7
-rw-r--r--arch/um/kernel/tt/ptproxy/proxy.c9
-rw-r--r--arch/um/kernel/tt/tracer.c2
3 files changed, 10 insertions, 8 deletions
diff --git a/arch/um/kernel/tt/process_kern.c b/arch/um/kernel/tt/process_kern.c
index 8029f72afaa7..c81bd2074930 100644
--- a/arch/um/kernel/tt/process_kern.c
+++ b/arch/um/kernel/tt/process_kern.c
@@ -57,14 +57,15 @@ void switch_to_tt(void *prev, void *next)
57 * nor the value in "to" (since it was the task which stole us the CPU, 57 * nor the value in "to" (since it was the task which stole us the CPU,
58 * which we don't care about). */ 58 * which we don't care about). */
59 59
60 err = os_write_file(to->thread.mode.tt.switch_pipe[1], &c, sizeof(c)); 60 err = os_write_file_k(to->thread.mode.tt.switch_pipe[1], &c, sizeof(c));
61 if(err != sizeof(c)) 61 if(err != sizeof(c))
62 panic("write of switch_pipe failed, err = %d", -err); 62 panic("write of switch_pipe failed, err = %d", -err);
63 63
64 if(from->thread.mode.tt.switch_pipe[0] == -1) 64 if(from->thread.mode.tt.switch_pipe[0] == -1)
65 os_kill_process(os_getpid(), 0); 65 os_kill_process(os_getpid(), 0);
66 66
67 err = os_read_file(from->thread.mode.tt.switch_pipe[0], &c, sizeof(c)); 67 err = os_read_file_k(from->thread.mode.tt.switch_pipe[0], &c,
68 sizeof(c));
68 if(err != sizeof(c)) 69 if(err != sizeof(c))
69 panic("read of switch_pipe failed, errno = %d", -err); 70 panic("read of switch_pipe failed, errno = %d", -err);
70 71
@@ -113,7 +114,7 @@ void suspend_new_thread(int fd)
113 char c; 114 char c;
114 115
115 os_stop_process(os_getpid()); 116 os_stop_process(os_getpid());
116 err = os_read_file(fd, &c, sizeof(c)); 117 err = os_read_file_k(fd, &c, sizeof(c));
117 if(err != sizeof(c)) 118 if(err != sizeof(c))
118 panic("read failed in suspend_new_thread, err = %d", -err); 119 panic("read failed in suspend_new_thread, err = %d", -err);
119} 120}
diff --git a/arch/um/kernel/tt/ptproxy/proxy.c b/arch/um/kernel/tt/ptproxy/proxy.c
index c88e7b5d8a76..007beb6b7c00 100644
--- a/arch/um/kernel/tt/ptproxy/proxy.c
+++ b/arch/um/kernel/tt/ptproxy/proxy.c
@@ -338,13 +338,14 @@ int start_debugger(char *prog, int startup, int stop, int *fd_out)
338 "err = %d\n", -fd); 338 "err = %d\n", -fd);
339 exit(1); 339 exit(1);
340 } 340 }
341 os_write_file(fd, gdb_init_string, sizeof(gdb_init_string) - 1); 341 os_write_file_k(fd, gdb_init_string,
342 sizeof(gdb_init_string) - 1);
342 if(startup){ 343 if(startup){
343 if(stop){ 344 if(stop){
344 os_write_file(fd, "b start_kernel\n", 345 os_write_file_k(fd, "b start_kernel\n",
345 strlen("b start_kernel\n")); 346 strlen("b start_kernel\n"));
346 } 347 }
347 os_write_file(fd, "c\n", strlen("c\n")); 348 os_write_file_k(fd, "c\n", strlen("c\n"));
348 } 349 }
349 if(ptrace(PTRACE_TRACEME, 0, 0, 0) < 0){ 350 if(ptrace(PTRACE_TRACEME, 0, 0, 0) < 0){
350 printk("start_debugger : PTRACE_TRACEME failed, " 351 printk("start_debugger : PTRACE_TRACEME failed, "
diff --git a/arch/um/kernel/tt/tracer.c b/arch/um/kernel/tt/tracer.c
index c23588393f6e..264da6c5a5c3 100644
--- a/arch/um/kernel/tt/tracer.c
+++ b/arch/um/kernel/tt/tracer.c
@@ -44,7 +44,7 @@ static void tracer_winch_handler(int sig)
44 int n; 44 int n;
45 char c = 1; 45 char c = 1;
46 46
47 n = os_write_file(tracer_winch[1], &c, sizeof(c)); 47 n = os_write_file_k(tracer_winch[1], &c, sizeof(c));
48 if(n != sizeof(c)) 48 if(n != sizeof(c))
49 printk("tracer_winch_handler - write failed, err = %d\n", -n); 49 printk("tracer_winch_handler - write failed, err = %d\n", -n);
50} 50}