netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH v2 net 0/5] net: fix races accessing page->_count
@ 2014-10-10 11:48 Eric Dumazet
  2014-10-10 11:48 ` [PATCH v2 net 1/5] fm10k: fix race " Eric Dumazet
                   ` (5 more replies)
  0 siblings, 6 replies; 7+ messages in thread
From: Eric Dumazet @ 2014-10-10 11:48 UTC (permalink / raw)
  To: David S. Miller
  Cc: netdev, Alexander Duyck, Jeff Kirsher, Andres Lagar-Cavilla,
	Greg Thelen, Hugh Dickins, David Rientjes, Eric Dumazet

This is illegal to use atomic_set(&page->_count, ...) even if we 'own'
the page. Other entities in the kernel need to use get_page_unless_zero()
to get a reference to the page before testing page properties, so we could
loose a refcount increment.

The only case it is valid is when page->_count is 0, we can use this in
__netdev_alloc_frag()

Note that I never seen crashes caused by these races, the issue was reported
by Andres Lagar-Cavilla and Hugh Dickins.


Eric Dumazet (5):
  fm10k: fix race accessing page->_count
  igb: fix race accessing page->_count
  ixgbe: fix race accessing page->_count
  mlx4: fix race accessing page->_count
  net: fix races in page->_count manipulation

 drivers/net/ethernet/intel/fm10k/fm10k_main.c |  7 +++----
 drivers/net/ethernet/intel/igb/igb_main.c     |  7 +++----
 drivers/net/ethernet/intel/ixgbe/ixgbe_main.c |  8 +++-----
 drivers/net/ethernet/mellanox/mlx4/en_rx.c    |  6 +++---
 net/core/skbuff.c                             | 25 ++++++++++++++++++-------
 5 files changed, 30 insertions(+), 23 deletions(-)

-- 
2.1.0.rc2.206.gedb03e5

^ permalink raw reply	[flat|nested] 7+ messages in thread

* [PATCH v2 net 1/5] fm10k: fix race accessing page->_count
  2014-10-10 11:48 [PATCH v2 net 0/5] net: fix races accessing page->_count Eric Dumazet
@ 2014-10-10 11:48 ` Eric Dumazet
  2014-10-10 11:48 ` [PATCH v2 net 2/5] igb: " Eric Dumazet
                   ` (4 subsequent siblings)
  5 siblings, 0 replies; 7+ messages in thread
From: Eric Dumazet @ 2014-10-10 11:48 UTC (permalink / raw)
  To: David S. Miller
  Cc: netdev, Alexander Duyck, Jeff Kirsher, Andres Lagar-Cavilla,
	Greg Thelen, Hugh Dickins, David Rientjes, Eric Dumazet

This is illegal to use atomic_set(&page->_count, 2) even if we 'own'
the page. Other entities in the kernel need to use get_page_unless_zero()
to get a reference to the page before testing page properties, so we could
loose a refcount increment.

Signed-off-by: Eric Dumazet <edumazet@google.com>
Acked-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
---
 drivers/net/ethernet/intel/fm10k/fm10k_main.c | 7 +++----
 1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/drivers/net/ethernet/intel/fm10k/fm10k_main.c b/drivers/net/ethernet/intel/fm10k/fm10k_main.c
index 6c800a330d66..9d7118a0d67a 100644
--- a/drivers/net/ethernet/intel/fm10k/fm10k_main.c
+++ b/drivers/net/ethernet/intel/fm10k/fm10k_main.c
@@ -219,11 +219,10 @@ static bool fm10k_can_reuse_rx_page(struct fm10k_rx_buffer *rx_buffer,
 	/* flip page offset to other buffer */
 	rx_buffer->page_offset ^= FM10K_RX_BUFSZ;
 
-	/* since we are the only owner of the page and we need to
-	 * increment it, just set the value to 2 in order to avoid
-	 * an unnecessary locked operation
+	/* Even if we own the page, we are not allowed to use atomic_set()
+	 * This would break get_page_unless_zero() users.
 	 */
-	atomic_set(&page->_count, 2);
+	atomic_inc(&page->_count);
 #else
 	/* move offset up to the next cache line */
 	rx_buffer->page_offset += truesize;
-- 
2.1.0.rc2.206.gedb03e5

^ permalink raw reply related	[flat|nested] 7+ messages in thread

* [PATCH v2 net 2/5] igb: fix race accessing page->_count
  2014-10-10 11:48 [PATCH v2 net 0/5] net: fix races accessing page->_count Eric Dumazet
  2014-10-10 11:48 ` [PATCH v2 net 1/5] fm10k: fix race " Eric Dumazet
@ 2014-10-10 11:48 ` Eric Dumazet
  2014-10-10 11:48 ` [PATCH v2 net 3/5] ixgbe: " Eric Dumazet
                   ` (3 subsequent siblings)
  5 siblings, 0 replies; 7+ messages in thread
From: Eric Dumazet @ 2014-10-10 11:48 UTC (permalink / raw)
  To: David S. Miller
  Cc: netdev, Alexander Duyck, Jeff Kirsher, Andres Lagar-Cavilla,
	Greg Thelen, Hugh Dickins, David Rientjes, Eric Dumazet

This is illegal to use atomic_set(&page->_count, 2) even if we 'own'
the page. Other entities in the kernel need to use get_page_unless_zero()
to get a reference to the page before testing page properties, so we could
loose a refcount increment.

Signed-off-by: Eric Dumazet <edumazet@google.com>
Acked-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
---
 drivers/net/ethernet/intel/igb/igb_main.c | 7 +++----
 1 file changed, 3 insertions(+), 4 deletions(-)

diff --git a/drivers/net/ethernet/intel/igb/igb_main.c b/drivers/net/ethernet/intel/igb/igb_main.c
index ae59c0b108c5..a21b14495ebd 100644
--- a/drivers/net/ethernet/intel/igb/igb_main.c
+++ b/drivers/net/ethernet/intel/igb/igb_main.c
@@ -6545,11 +6545,10 @@ static bool igb_can_reuse_rx_page(struct igb_rx_buffer *rx_buffer,
 	/* flip page offset to other buffer */
 	rx_buffer->page_offset ^= IGB_RX_BUFSZ;
 
-	/* since we are the only owner of the page and we need to
-	 * increment it, just set the value to 2 in order to avoid
-	 * an unnecessary locked operation
+	/* Even if we own the page, we are not allowed to use atomic_set()
+	 * This would break get_page_unless_zero() users.
 	 */
-	atomic_set(&page->_count, 2);
+	atomic_inc(&page->_count);
 #else
 	/* move offset up to the next cache line */
 	rx_buffer->page_offset += truesize;
-- 
2.1.0.rc2.206.gedb03e5

^ permalink raw reply related	[flat|nested] 7+ messages in thread

* [PATCH v2 net 3/5] ixgbe: fix race accessing page->_count
  2014-10-10 11:48 [PATCH v2 net 0/5] net: fix races accessing page->_count Eric Dumazet
  2014-10-10 11:48 ` [PATCH v2 net 1/5] fm10k: fix race " Eric Dumazet
  2014-10-10 11:48 ` [PATCH v2 net 2/5] igb: " Eric Dumazet
@ 2014-10-10 11:48 ` Eric Dumazet
  2014-10-10 11:48 ` [PATCH v2 net 4/5] mlx4: " Eric Dumazet
                   ` (2 subsequent siblings)
  5 siblings, 0 replies; 7+ messages in thread
From: Eric Dumazet @ 2014-10-10 11:48 UTC (permalink / raw)
  To: David S. Miller
  Cc: netdev, Alexander Duyck, Jeff Kirsher, Andres Lagar-Cavilla,
	Greg Thelen, Hugh Dickins, David Rientjes, Eric Dumazet

This is illegal to use atomic_set(&page->_count, 2) even if we 'own'
the page. Other entities in the kernel need to use get_page_unless_zero()
to get a reference to the page before testing page properties, so we could
loose a refcount increment.

Signed-off-by: Eric Dumazet <edumazet@google.com>
Acked-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
---
 drivers/net/ethernet/intel/ixgbe/ixgbe_main.c | 8 +++-----
 1 file changed, 3 insertions(+), 5 deletions(-)

diff --git a/drivers/net/ethernet/intel/ixgbe/ixgbe_main.c b/drivers/net/ethernet/intel/ixgbe/ixgbe_main.c
index d677b5a23b58..fec5212d4337 100644
--- a/drivers/net/ethernet/intel/ixgbe/ixgbe_main.c
+++ b/drivers/net/ethernet/intel/ixgbe/ixgbe_main.c
@@ -1865,12 +1865,10 @@ static bool ixgbe_add_rx_frag(struct ixgbe_ring *rx_ring,
 	/* flip page offset to other buffer */
 	rx_buffer->page_offset ^= truesize;
 
-	/*
-	 * since we are the only owner of the page and we need to
-	 * increment it, just set the value to 2 in order to avoid
-	 * an unecessary locked operation
+	/* Even if we own the page, we are not allowed to use atomic_set()
+	 * This would break get_page_unless_zero() users.
 	 */
-	atomic_set(&page->_count, 2);
+	atomic_inc(&page->_count);
 #else
 	/* move offset up to the next cache line */
 	rx_buffer->page_offset += truesize;
-- 
2.1.0.rc2.206.gedb03e5

^ permalink raw reply related	[flat|nested] 7+ messages in thread

* [PATCH v2 net 4/5] mlx4: fix race accessing page->_count
  2014-10-10 11:48 [PATCH v2 net 0/5] net: fix races accessing page->_count Eric Dumazet
                   ` (2 preceding siblings ...)
  2014-10-10 11:48 ` [PATCH v2 net 3/5] ixgbe: " Eric Dumazet
@ 2014-10-10 11:48 ` Eric Dumazet
  2014-10-10 11:48 ` [PATCH v2 net 5/5] net: fix races in page->_count manipulation Eric Dumazet
  2014-10-10 19:37 ` [PATCH v2 net 0/5] net: fix races accessing page->_count David Miller
  5 siblings, 0 replies; 7+ messages in thread
From: Eric Dumazet @ 2014-10-10 11:48 UTC (permalink / raw)
  To: David S. Miller
  Cc: netdev, Alexander Duyck, Jeff Kirsher, Andres Lagar-Cavilla,
	Greg Thelen, Hugh Dickins, David Rientjes, Eric Dumazet

This is illegal to use atomic_set(&page->_count, ...) even if we 'own'
the page. Other entities in the kernel need to use get_page_unless_zero()
to get a reference to the page before testing page properties, so we could
loose a refcount increment.

Signed-off-by: Eric Dumazet <edumazet@google.com>
---
 drivers/net/ethernet/mellanox/mlx4/en_rx.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/drivers/net/ethernet/mellanox/mlx4/en_rx.c b/drivers/net/ethernet/mellanox/mlx4/en_rx.c
index a33048ee9621..01660c595f5c 100644
--- a/drivers/net/ethernet/mellanox/mlx4/en_rx.c
+++ b/drivers/net/ethernet/mellanox/mlx4/en_rx.c
@@ -76,10 +76,10 @@ static int mlx4_alloc_pages(struct mlx4_en_priv *priv,
 	page_alloc->dma = dma;
 	page_alloc->page_offset = frag_info->frag_align;
 	/* Not doing get_page() for each frag is a big win
-	 * on asymetric workloads.
+	 * on asymetric workloads. Note we can not use atomic_set().
 	 */
-	atomic_set(&page->_count,
-		   page_alloc->page_size / frag_info->frag_stride);
+	atomic_add(page_alloc->page_size / frag_info->frag_stride - 1,
+		   &page->_count);
 	return 0;
 }
 
-- 
2.1.0.rc2.206.gedb03e5

^ permalink raw reply related	[flat|nested] 7+ messages in thread

* [PATCH v2 net 5/5] net: fix races in page->_count manipulation
  2014-10-10 11:48 [PATCH v2 net 0/5] net: fix races accessing page->_count Eric Dumazet
                   ` (3 preceding siblings ...)
  2014-10-10 11:48 ` [PATCH v2 net 4/5] mlx4: " Eric Dumazet
@ 2014-10-10 11:48 ` Eric Dumazet
  2014-10-10 19:37 ` [PATCH v2 net 0/5] net: fix races accessing page->_count David Miller
  5 siblings, 0 replies; 7+ messages in thread
From: Eric Dumazet @ 2014-10-10 11:48 UTC (permalink / raw)
  To: David S. Miller
  Cc: netdev, Alexander Duyck, Jeff Kirsher, Andres Lagar-Cavilla,
	Greg Thelen, Hugh Dickins, David Rientjes, Eric Dumazet

This is illegal to use atomic_set(&page->_count, ...) even if we 'own'
the page. Other entities in the kernel need to use get_page_unless_zero()
to get a reference to the page before testing page properties, so we could
loose a refcount increment.

The only case it is valid is when page->_count is 0

Fixes: 540eb7bf0bbed ("net: Update alloc frag to reduce get/put page usage and recycle pages")
Signed-off-by: Eric Dumaze <edumazet@google.com>
---
 net/core/skbuff.c | 25 ++++++++++++++++++-------
 1 file changed, 18 insertions(+), 7 deletions(-)

diff --git a/net/core/skbuff.c b/net/core/skbuff.c
index a30d750647e7..829d013745ab 100644
--- a/net/core/skbuff.c
+++ b/net/core/skbuff.c
@@ -360,18 +360,29 @@ refill:
 				goto end;
 		}
 		nc->frag.size = PAGE_SIZE << order;
-recycle:
-		atomic_set(&nc->frag.page->_count, NETDEV_PAGECNT_MAX_BIAS);
+		/* Even if we own the page, we do not use atomic_set().
+		 * This would break get_page_unless_zero() users.
+		 */
+		atomic_add(NETDEV_PAGECNT_MAX_BIAS - 1,
+			   &nc->frag.page->_count);
 		nc->pagecnt_bias = NETDEV_PAGECNT_MAX_BIAS;
 		nc->frag.offset = 0;
 	}
 
 	if (nc->frag.offset + fragsz > nc->frag.size) {
-		/* avoid unnecessary locked operations if possible */
-		if ((atomic_read(&nc->frag.page->_count) == nc->pagecnt_bias) ||
-		    atomic_sub_and_test(nc->pagecnt_bias, &nc->frag.page->_count))
-			goto recycle;
-		goto refill;
+		if (atomic_read(&nc->frag.page->_count) != nc->pagecnt_bias) {
+			if (!atomic_sub_and_test(nc->pagecnt_bias,
+						 &nc->frag.page->_count))
+				goto refill;
+			/* OK, page count is 0, we can safely set it */
+			atomic_set(&nc->frag.page->_count,
+				   NETDEV_PAGECNT_MAX_BIAS);
+		} else {
+			atomic_add(NETDEV_PAGECNT_MAX_BIAS - nc->pagecnt_bias,
+				   &nc->frag.page->_count);
+		}
+		nc->pagecnt_bias = NETDEV_PAGECNT_MAX_BIAS;
+		nc->frag.offset = 0;
 	}
 
 	data = page_address(nc->frag.page) + nc->frag.offset;
-- 
2.1.0.rc2.206.gedb03e5

^ permalink raw reply related	[flat|nested] 7+ messages in thread

* Re: [PATCH v2 net 0/5] net: fix races accessing page->_count
  2014-10-10 11:48 [PATCH v2 net 0/5] net: fix races accessing page->_count Eric Dumazet
                   ` (4 preceding siblings ...)
  2014-10-10 11:48 ` [PATCH v2 net 5/5] net: fix races in page->_count manipulation Eric Dumazet
@ 2014-10-10 19:37 ` David Miller
  5 siblings, 0 replies; 7+ messages in thread
From: David Miller @ 2014-10-10 19:37 UTC (permalink / raw)
  To: edumazet
  Cc: netdev, alexander.h.duyck, jeffrey.t.kirsher, andreslc, gthelen,
	hughd, rientjes

From: Eric Dumazet <edumazet@google.com>
Date: Fri, 10 Oct 2014 04:48:13 -0700

> This is illegal to use atomic_set(&page->_count, ...) even if we 'own'
> the page. Other entities in the kernel need to use get_page_unless_zero()
> to get a reference to the page before testing page properties, so we could
> loose a refcount increment.
> 
> The only case it is valid is when page->_count is 0, we can use this in
> __netdev_alloc_frag()
> 
> Note that I never seen crashes caused by these races, the issue was reported
> by Andres Lagar-Cavilla and Hugh Dickins.

Series applied, thanks Eric.

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2014-10-10 19:38 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-10-10 11:48 [PATCH v2 net 0/5] net: fix races accessing page->_count Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 1/5] fm10k: fix race " Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 2/5] igb: " Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 3/5] ixgbe: " Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 4/5] mlx4: " Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 5/5] net: fix races in page->_count manipulation Eric Dumazet
2014-10-10 19:37 ` [PATCH v2 net 0/5] net: fix races accessing page->_count David Miller

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).