From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id BFB65C77B7C for ; Mon, 23 Jun 2025 14:58:55 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 5B3676B00C6; Mon, 23 Jun 2025 10:58:55 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 563D16B00C9; Mon, 23 Jun 2025 10:58:55 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 4049E6B00CC; Mon, 23 Jun 2025 10:58:55 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id 2BC586B00C6 for ; Mon, 23 Jun 2025 10:58:55 -0400 (EDT) Received: from smtpin18.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 9C65A1406BE for ; Mon, 23 Jun 2025 14:58:54 +0000 (UTC) X-FDA: 83586972588.18.A12882B Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by imf12.hostedemail.com (Postfix) with ESMTP id 2580B40002 for ; Mon, 23 Jun 2025 14:58:51 +0000 (UTC) Authentication-Results: imf12.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b="FGe3990/"; dmarc=pass (policy=quarantine) header.from=redhat.com; spf=pass (imf12.hostedemail.com: domain of david@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=david@redhat.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1750690732; a=rsa-sha256; cv=none; b=L+XkbC1YdQpJ6GB/mI54+nSTTB3gOX7qxDMq1fsuq0LUFwKW7/SUj2oYARyVpOcvDYPqBa ra/AbwAT2xpMEawUbH4n78Bu08f/cpieKCHqj719JH1eX/iT4T6enNsLYinYvfq8cDd5dr MR/lJIVyKHoRmCCIHdgVyYMY9qrWMcU= ARC-Authentication-Results: i=1; imf12.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b="FGe3990/"; dmarc=pass (policy=quarantine) header.from=redhat.com; spf=pass (imf12.hostedemail.com: domain of david@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=david@redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1750690732; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=2fxkqf4Mvr7CSFJ3WG+x2K7csO1QpeDPNxQNGZa8XgY=; b=Q6drwCdxUIBcj2UuwGq21nX9u1dehHZraI7197r0+L8vgCZrtrfPSHClfxjsfi1AM6afVv GekipJt6DDkF3SBSGXgVhlLQXWQIWL6N2TxwprkFNwOLV2rXM/7ZMPdkTlBIE9VE8rUH81 pAe7ufr4DgrDPwgzIQsEegbNehQbjp8= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1750690731; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; bh=2fxkqf4Mvr7CSFJ3WG+x2K7csO1QpeDPNxQNGZa8XgY=; b=FGe3990/KsSeCodlHswxavBxvaLt83Oto+nynw+Weudveguko5fL/FCtlgw6ucfWmTs4CK ERP02h38xTrgLVp6M0H915CVsrahAIVZ2CkEbHMzONRvTeLVC/kPk0N1bxCzkJEjKeIqRN hq4+wpSiDqTbBKQDTLdKHH4gHZYawXs= Received: from mail-wm1-f71.google.com (mail-wm1-f71.google.com [209.85.128.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-401-ePjAHbXAOV-Pag0YEYNRtw-1; Mon, 23 Jun 2025 10:58:50 -0400 X-MC-Unique: ePjAHbXAOV-Pag0YEYNRtw-1 X-Mimecast-MFC-AGG-ID: ePjAHbXAOV-Pag0YEYNRtw_1750690729 Received: by mail-wm1-f71.google.com with SMTP id 5b1f17b1804b1-4530c186394so19403695e9.0 for ; Mon, 23 Jun 2025 07:58:49 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1750690729; x=1751295529; h=content-transfer-encoding:in-reply-to:organization:autocrypt :content-language:from:references:cc:to:subject:user-agent :mime-version:date:message-id:x-gm-message-state:from:to:cc:subject :date:message-id:reply-to; bh=2fxkqf4Mvr7CSFJ3WG+x2K7csO1QpeDPNxQNGZa8XgY=; b=g2HMBMqeUPoxgska+6fg8gjUFw/+qAooap8tdI1yy4WggMqIaTijJSN1hH/Sb5WApV 7ywx53EumMlEeimnINkItexp6DsULN0iKpLaqHWqgTJ7k7f1O12Fa+vpPW+9Q3gYLh6Q fIkBVHZJ6TJsjTgFgfRQzDvrLI/raMNYe76SM/uVAF11pu4xjVNuV4nS8kssVuYxvY2c QnQVllsWMm4kVvka6xaP2v5tM0jmECoPtUGeYcBcmR4wxWNN//FwwrhUqHZXGRW9VriD F/PWlCPPFq5zcz/6CDVSljQXXWsBLUqxy1ATdlKh70vyrJHAljEnCInzI9qJyUG06/8x N1Ag== X-Forwarded-Encrypted: i=1; AJvYcCVp/EgVYBPHykJ45vrPStbNwNMMFh0rXusMpc4usDQ0m1ULkSZajQ3lCMplExeDUtMPQSe50fvmrw==@kvack.org X-Gm-Message-State: AOJu0YyvH5bmGCXuXf/ZHCFB8AirMwv71ChvGsbEg9cPwH1q/cngVGWW +cptoN958PbbaILy/TYw7hGmNFpZ06MXDfjQr4Y9Xb3YFcPwPXLipWJtRU/ND0FzQaunCOE/xrS XB6BC30meYREwI/12I66dZq740JyPqwcuo7my1JZ1oPwaHr+XxfXG X-Gm-Gg: ASbGncuEj4yQMGxj6cqww9xlboEuKua0+f0dE7opGbwuuu/GBAHub6LWUjGO8m+FF4j JVkvvrk+32VxMBJVy5tbGypli+3VntHtYSMuQBGRStA6mHX1vU5kVHGqrRep4TqkskiOvWWZ0j+ k/3FTFGhbpwVgVuaerWkiQPArG+rFxqW40kn+jX9XPr0W0Sl1dVfsa1sgmYS2ufnRUhWv1eJGz5 qULf2kWU0quOeX9jeowls5u7g4FFkcSHHoMsuTrWvbeE32JTk3IQ5+lhyihiqWE2mhnMSc0wkD5 7kA/VQ52GC9/36yrEsH0QBJj/+ghTYVUPz2wKwoIPHpCAES7m1clJy1Du75oupXwOpgUfhWCK9k 0yoLTWHfeOpb0SxJURq5BGzXOKfuDCFzt0tLgrRscRzNn/VnFuA== X-Received: by 2002:a05:600c:3b83:b0:43c:f513:9591 with SMTP id 5b1f17b1804b1-453659ca16cmr131187045e9.14.1750690728809; Mon, 23 Jun 2025 07:58:48 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFtIybu0ONExVt+k2ulZMylHRwnO9hazFruWs7MB2pWYLqNa2thHFPG//NOW6TTZxku9Gf+yg== X-Received: by 2002:a05:600c:3b83:b0:43c:f513:9591 with SMTP id 5b1f17b1804b1-453659ca16cmr131186835e9.14.1750690728381; Mon, 23 Jun 2025 07:58:48 -0700 (PDT) Received: from ?IPV6:2003:d8:2f4e:fd00:8e13:e3b5:90c8:1159? (p200300d82f4efd008e13e3b590c81159.dip0.t-ipconnect.de. [2003:d8:2f4e:fd00:8e13:e3b5:90c8:1159]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4535eada7adsm149082415e9.35.2025.06.23.07.58.46 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 23 Jun 2025 07:58:47 -0700 (PDT) Message-ID: Date: Mon, 23 Jun 2025 16:58:45 +0200 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH net-next v6 9/9] page_pool: access ->pp_magic through struct netmem_desc in page_pool_page_is_pp() To: Zi Yan , Byungchul Park Cc: willy@infradead.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, kernel_team@skhynix.com, kuba@kernel.org, almasrymina@google.com, ilias.apalodimas@linaro.org, harry.yoo@oracle.com, hawk@kernel.org, akpm@linux-foundation.org, davem@davemloft.net, john.fastabend@gmail.com, andrew+netdev@lunn.ch, asml.silence@gmail.com, toke@redhat.com, tariqt@nvidia.com, edumazet@google.com, pabeni@redhat.com, saeedm@nvidia.com, leon@kernel.org, ast@kernel.org, daniel@iogearbox.net, lorenzo.stoakes@oracle.com, Liam.Howlett@oracle.com, vbabka@suse.cz, rppt@kernel.org, surenb@google.com, mhocko@suse.com, horms@kernel.org, linux-rdma@vger.kernel.org, bpf@vger.kernel.org, vishal.moola@gmail.com, hannes@cmpxchg.org, jackmanb@google.com References: <20250620041224.46646-1-byungchul@sk.com> <20250620041224.46646-10-byungchul@sk.com> <20250623101622.GB3199@system.software.com> <460ACE40-9E99-42B8-90F0-2B18D2D8C72C@nvidia.com> From: David Hildenbrand Autocrypt: addr=david@redhat.com; keydata= xsFNBFXLn5EBEAC+zYvAFJxCBY9Tr1xZgcESmxVNI/0ffzE/ZQOiHJl6mGkmA1R7/uUpiCjJ dBrn+lhhOYjjNefFQou6478faXE6o2AhmebqT4KiQoUQFV4R7y1KMEKoSyy8hQaK1umALTdL QZLQMzNE74ap+GDK0wnacPQFpcG1AE9RMq3aeErY5tujekBS32jfC/7AnH7I0v1v1TbbK3Gp XNeiN4QroO+5qaSr0ID2sz5jtBLRb15RMre27E1ImpaIv2Jw8NJgW0k/D1RyKCwaTsgRdwuK Kx/Y91XuSBdz0uOyU/S8kM1+ag0wvsGlpBVxRR/xw/E8M7TEwuCZQArqqTCmkG6HGcXFT0V9 PXFNNgV5jXMQRwU0O/ztJIQqsE5LsUomE//bLwzj9IVsaQpKDqW6TAPjcdBDPLHvriq7kGjt WhVhdl0qEYB8lkBEU7V2Yb+SYhmhpDrti9Fq1EsmhiHSkxJcGREoMK/63r9WLZYI3+4W2rAc UucZa4OT27U5ZISjNg3Ev0rxU5UH2/pT4wJCfxwocmqaRr6UYmrtZmND89X0KigoFD/XSeVv jwBRNjPAubK9/k5NoRrYqztM9W6sJqrH8+UWZ1Idd/DdmogJh0gNC0+N42Za9yBRURfIdKSb B3JfpUqcWwE7vUaYrHG1nw54pLUoPG6sAA7Mehl3nd4pZUALHwARAQABzSREYXZpZCBIaWxk ZW5icmFuZCA8ZGF2aWRAcmVkaGF0LmNvbT7CwZgEEwEIAEICGwMGCwkIBwMCBhUIAgkKCwQW AgMBAh4BAheAAhkBFiEEG9nKrXNcTDpGDfzKTd4Q9wD/g1oFAl8Ox4kFCRKpKXgACgkQTd4Q 9wD/g1oHcA//a6Tj7SBNjFNM1iNhWUo1lxAja0lpSodSnB2g4FCZ4R61SBR4l/psBL73xktp rDHrx4aSpwkRP6Epu6mLvhlfjmkRG4OynJ5HG1gfv7RJJfnUdUM1z5kdS8JBrOhMJS2c/gPf wv1TGRq2XdMPnfY2o0CxRqpcLkx4vBODvJGl2mQyJF/gPepdDfcT8/PY9BJ7FL6Hrq1gnAo4 3Iv9qV0JiT2wmZciNyYQhmA1V6dyTRiQ4YAc31zOo2IM+xisPzeSHgw3ONY/XhYvfZ9r7W1l pNQdc2G+o4Di9NPFHQQhDw3YTRR1opJaTlRDzxYxzU6ZnUUBghxt9cwUWTpfCktkMZiPSDGd KgQBjnweV2jw9UOTxjb4LXqDjmSNkjDdQUOU69jGMUXgihvo4zhYcMX8F5gWdRtMR7DzW/YE BgVcyxNkMIXoY1aYj6npHYiNQesQlqjU6azjbH70/SXKM5tNRplgW8TNprMDuntdvV9wNkFs 9TyM02V5aWxFfI42+aivc4KEw69SE9KXwC7FSf5wXzuTot97N9Phj/Z3+jx443jo2NR34XgF 89cct7wJMjOF7bBefo0fPPZQuIma0Zym71cP61OP/i11ahNye6HGKfxGCOcs5wW9kRQEk8P9 M/k2wt3mt/fCQnuP/mWutNPt95w9wSsUyATLmtNrwccz63XOwU0EVcufkQEQAOfX3n0g0fZz Bgm/S2zF/kxQKCEKP8ID+Vz8sy2GpDvveBq4H2Y34XWsT1zLJdvqPI4af4ZSMxuerWjXbVWb T6d4odQIG0fKx4F8NccDqbgHeZRNajXeeJ3R7gAzvWvQNLz4piHrO/B4tf8svmRBL0ZB5P5A 2uhdwLU3NZuK22zpNn4is87BPWF8HhY0L5fafgDMOqnf4guJVJPYNPhUFzXUbPqOKOkL8ojk CXxkOFHAbjstSK5Ca3fKquY3rdX3DNo+EL7FvAiw1mUtS+5GeYE+RMnDCsVFm/C7kY8c2d0G NWkB9pJM5+mnIoFNxy7YBcldYATVeOHoY4LyaUWNnAvFYWp08dHWfZo9WCiJMuTfgtH9tc75 7QanMVdPt6fDK8UUXIBLQ2TWr/sQKE9xtFuEmoQGlE1l6bGaDnnMLcYu+Asp3kDT0w4zYGsx 5r6XQVRH4+5N6eHZiaeYtFOujp5n+pjBaQK7wUUjDilPQ5QMzIuCL4YjVoylWiBNknvQWBXS lQCWmavOT9sttGQXdPCC5ynI+1ymZC1ORZKANLnRAb0NH/UCzcsstw2TAkFnMEbo9Zu9w7Kv AxBQXWeXhJI9XQssfrf4Gusdqx8nPEpfOqCtbbwJMATbHyqLt7/oz/5deGuwxgb65pWIzufa N7eop7uh+6bezi+rugUI+w6DABEBAAHCwXwEGAEIACYCGwwWIQQb2cqtc1xMOkYN/MpN3hD3 AP+DWgUCXw7HsgUJEqkpoQAKCRBN3hD3AP+DWrrpD/4qS3dyVRxDcDHIlmguXjC1Q5tZTwNB boaBTPHSy/Nksu0eY7x6HfQJ3xajVH32Ms6t1trDQmPx2iP5+7iDsb7OKAb5eOS8h+BEBDeq 3ecsQDv0fFJOA9ag5O3LLNk+3x3q7e0uo06XMaY7UHS341ozXUUI7wC7iKfoUTv03iO9El5f XpNMx/YrIMduZ2+nd9Di7o5+KIwlb2mAB9sTNHdMrXesX8eBL6T9b+MZJk+mZuPxKNVfEQMQ a5SxUEADIPQTPNvBewdeI80yeOCrN+Zzwy/Mrx9EPeu59Y5vSJOx/z6OUImD/GhX7Xvkt3kq Er5KTrJz3++B6SH9pum9PuoE/k+nntJkNMmQpR4MCBaV/J9gIOPGodDKnjdng+mXliF3Ptu6 3oxc2RCyGzTlxyMwuc2U5Q7KtUNTdDe8T0uE+9b8BLMVQDDfJjqY0VVqSUwImzTDLX9S4g/8 kC4HRcclk8hpyhY2jKGluZO0awwTIMgVEzmTyBphDg/Gx7dZU1Xf8HFuE+UZ5UDHDTnwgv7E th6RC9+WrhDNspZ9fJjKWRbveQgUFCpe1sa77LAw+XFrKmBHXp9ZVIe90RMe2tRL06BGiRZr jPrnvUsUUsjRoRNJjKKA/REq+sAnhkNPPZ/NNMjaZ5b8Tovi8C0tmxiCHaQYqj7G2rgnT0kt WNyWQQ== Organization: Red Hat In-Reply-To: <460ACE40-9E99-42B8-90F0-2B18D2D8C72C@nvidia.com> X-Mimecast-Spam-Score: 0 X-Mimecast-MFC-PROC-ID: DzaQdZhR0qUy-1OI4w5DGm-hKB3R3-rkZuOXq3kPcQ0_1750690729 X-Mimecast-Originator: redhat.com Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Rspamd-Server: rspam08 X-Rspamd-Queue-Id: 2580B40002 X-Stat-Signature: 16mndc6gf6unmndw5utziwj5ds3o65aq X-Rspam-User: X-HE-Tag: 1750690731-448388 X-HE-Meta: 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 MtyIU95D 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 23.06.25 13:13, Zi Yan wrote: > On 23 Jun 2025, at 6:16, Byungchul Park wrote: > >> On Mon, Jun 23, 2025 at 11:16:43AM +0200, David Hildenbrand wrote: >>> On 20.06.25 06:12, Byungchul Park wrote: >>>> To simplify struct page, the effort to separate its own descriptor from >>>> struct page is required and the work for page pool is on going. >>>> >>>> To achieve that, all the code should avoid directly accessing page pool >>>> members of struct page. >>>> >>>> Access ->pp_magic through struct netmem_desc instead of directly >>>> accessing it through struct page in page_pool_page_is_pp(). Plus, move >>>> page_pool_page_is_pp() from mm.h to netmem.h to use struct netmem_desc >>>> without header dependency issue. >>>> >>>> Signed-off-by: Byungchul Park >>>> Reviewed-by: Toke Høiland-Jørgensen >>>> Reviewed-by: Mina Almasry >>>> Reviewed-by: Pavel Begunkov >>>> Reviewed-by: Vlastimil Babka >>>> Acked-by: Harry Yoo >>>> --- >>>> include/linux/mm.h | 12 ------------ >>>> include/net/netmem.h | 14 ++++++++++++++ >>>> mm/page_alloc.c | 1 + >>>> 3 files changed, 15 insertions(+), 12 deletions(-) >>>> >>>> diff --git a/include/linux/mm.h b/include/linux/mm.h >>>> index 0ef2ba0c667a..0b7f7f998085 100644 >>>> --- a/include/linux/mm.h >>>> +++ b/include/linux/mm.h >>>> @@ -4172,16 +4172,4 @@ int arch_lock_shadow_stack_status(struct task_struct *t, unsigned long status); >>>> */ >>>> #define PP_MAGIC_MASK ~(PP_DMA_INDEX_MASK | 0x3UL) >>>> >>>> -#ifdef CONFIG_PAGE_POOL >>>> -static inline bool page_pool_page_is_pp(struct page *page) >>>> -{ >>>> - return (page->pp_magic & PP_MAGIC_MASK) == PP_SIGNATURE; >>>> -} >>>> -#else >>>> -static inline bool page_pool_page_is_pp(struct page *page) >>>> -{ >>>> - return false; >>>> -} >>>> -#endif >>>> - >>>> #endif /* _LINUX_MM_H */ >>>> diff --git a/include/net/netmem.h b/include/net/netmem.h >>>> index d49ed49d250b..3d1b1dfc9ba5 100644 >>>> --- a/include/net/netmem.h >>>> +++ b/include/net/netmem.h >>>> @@ -56,6 +56,20 @@ NETMEM_DESC_ASSERT_OFFSET(pp_ref_count, pp_ref_count); >>>> */ >>>> static_assert(sizeof(struct netmem_desc) <= offsetof(struct page, _refcount)); >>>> >>>> +#ifdef CONFIG_PAGE_POOL >>>> +static inline bool page_pool_page_is_pp(struct page *page) >>>> +{ >>>> + struct netmem_desc *desc = (struct netmem_desc *)page; >>>> + >>>> + return (desc->pp_magic & PP_MAGIC_MASK) == PP_SIGNATURE; >>>> +} >>>> +#else >>>> +static inline bool page_pool_page_is_pp(struct page *page) >>>> +{ >>>> + return false; >>>> +} >>>> +#endif >>> >>> I wonder how helpful this cleanup is long-term. >>> >>> page_pool_page_is_pp() is only called from mm/page_alloc.c, right? >> >> Yes. >> >>> There, we want to make sure that no pagepool page is ever returned to >>> the buddy. >>> >>> How reasonable is this sanity check to have long-term? Wouldn't we be >>> able to check that on some higher-level freeing path? >>> >>> The reason I am commenting is that once we decouple "struct page" from >>> "struct netmem_desc", we'd have to lookup here the corresponding "struct >>> netmem_desc". >>> >>> ... but at that point here (when we free the actual pages), the "struct >>> netmem_desc" would likely already have been freed separately (remember: >>> it will be dynamically allocated). >>> >>> With that in mind: >>> >>> 1) Is there a higher level "struct netmem_desc" freeing path where we >>> could check that instead, so we don't have to cast from pages to >>> netmem_desc at all. >> >> I also thought it's too paranoiac. However, I thought it's other issue >> than this work. That's why I left the API as is for now, it can be gone >> once we get convinced the check is unnecessary in deep buddy. Wrong? >> >>> 2) How valuable are these sanity checks deep in the buddy? >> >> That was also what I felt weird on. > > It seems very useful when I asked last time[1]: > > |> We have actually used this at Cloudflare to catch some page_pool bugs. My question is rather, whether there is some higher-level freeing path for netmem_desc where we could check that instead (IOW, earlier). Or is it really arbitrary put_page() (IOW, we assume that many possible references can be held)? -- Cheers, David / dhildenb