* [PATCH v2 net 0/5] net: fix races accessing page->_count
@ 2014-10-10 11:48 Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 1/5] fm10k: fix race " Eric Dumazet
` (5 more replies)
0 siblings, 6 replies; 7+ messages in thread
From: Eric Dumazet @ 2014-10-10 11:48 UTC (permalink / raw)
To: David S. Miller
Cc: netdev, Alexander Duyck, Jeff Kirsher, Andres Lagar-Cavilla,
Greg Thelen, Hugh Dickins, David Rientjes, Eric Dumazet
This is illegal to use atomic_set(&page->_count, ...) even if we 'own'
the page. Other entities in the kernel need to use get_page_unless_zero()
to get a reference to the page before testing page properties, so we could
loose a refcount increment.
The only case it is valid is when page->_count is 0, we can use this in
__netdev_alloc_frag()
Note that I never seen crashes caused by these races, the issue was reported
by Andres Lagar-Cavilla and Hugh Dickins.
Eric Dumazet (5):
fm10k: fix race accessing page->_count
igb: fix race accessing page->_count
ixgbe: fix race accessing page->_count
mlx4: fix race accessing page->_count
net: fix races in page->_count manipulation
drivers/net/ethernet/intel/fm10k/fm10k_main.c | 7 +++----
drivers/net/ethernet/intel/igb/igb_main.c | 7 +++----
drivers/net/ethernet/intel/ixgbe/ixgbe_main.c | 8 +++-----
drivers/net/ethernet/mellanox/mlx4/en_rx.c | 6 +++---
net/core/skbuff.c | 25 ++++++++++++++++++-------
5 files changed, 30 insertions(+), 23 deletions(-)
--
2.1.0.rc2.206.gedb03e5
^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH v2 net 1/5] fm10k: fix race accessing page->_count
2014-10-10 11:48 [PATCH v2 net 0/5] net: fix races accessing page->_count Eric Dumazet
@ 2014-10-10 11:48 ` Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 2/5] igb: " Eric Dumazet
` (4 subsequent siblings)
5 siblings, 0 replies; 7+ messages in thread
From: Eric Dumazet @ 2014-10-10 11:48 UTC (permalink / raw)
To: David S. Miller
Cc: netdev, Alexander Duyck, Jeff Kirsher, Andres Lagar-Cavilla,
Greg Thelen, Hugh Dickins, David Rientjes, Eric Dumazet
This is illegal to use atomic_set(&page->_count, 2) even if we 'own'
the page. Other entities in the kernel need to use get_page_unless_zero()
to get a reference to the page before testing page properties, so we could
loose a refcount increment.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Acked-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
---
drivers/net/ethernet/intel/fm10k/fm10k_main.c | 7 +++----
1 file changed, 3 insertions(+), 4 deletions(-)
diff --git a/drivers/net/ethernet/intel/fm10k/fm10k_main.c b/drivers/net/ethernet/intel/fm10k/fm10k_main.c
index 6c800a330d66..9d7118a0d67a 100644
--- a/drivers/net/ethernet/intel/fm10k/fm10k_main.c
+++ b/drivers/net/ethernet/intel/fm10k/fm10k_main.c
@@ -219,11 +219,10 @@ static bool fm10k_can_reuse_rx_page(struct fm10k_rx_buffer *rx_buffer,
/* flip page offset to other buffer */
rx_buffer->page_offset ^= FM10K_RX_BUFSZ;
- /* since we are the only owner of the page and we need to
- * increment it, just set the value to 2 in order to avoid
- * an unnecessary locked operation
+ /* Even if we own the page, we are not allowed to use atomic_set()
+ * This would break get_page_unless_zero() users.
*/
- atomic_set(&page->_count, 2);
+ atomic_inc(&page->_count);
#else
/* move offset up to the next cache line */
rx_buffer->page_offset += truesize;
--
2.1.0.rc2.206.gedb03e5
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [PATCH v2 net 2/5] igb: fix race accessing page->_count
2014-10-10 11:48 [PATCH v2 net 0/5] net: fix races accessing page->_count Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 1/5] fm10k: fix race " Eric Dumazet
@ 2014-10-10 11:48 ` Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 3/5] ixgbe: " Eric Dumazet
` (3 subsequent siblings)
5 siblings, 0 replies; 7+ messages in thread
From: Eric Dumazet @ 2014-10-10 11:48 UTC (permalink / raw)
To: David S. Miller
Cc: netdev, Alexander Duyck, Jeff Kirsher, Andres Lagar-Cavilla,
Greg Thelen, Hugh Dickins, David Rientjes, Eric Dumazet
This is illegal to use atomic_set(&page->_count, 2) even if we 'own'
the page. Other entities in the kernel need to use get_page_unless_zero()
to get a reference to the page before testing page properties, so we could
loose a refcount increment.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Acked-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
---
drivers/net/ethernet/intel/igb/igb_main.c | 7 +++----
1 file changed, 3 insertions(+), 4 deletions(-)
diff --git a/drivers/net/ethernet/intel/igb/igb_main.c b/drivers/net/ethernet/intel/igb/igb_main.c
index ae59c0b108c5..a21b14495ebd 100644
--- a/drivers/net/ethernet/intel/igb/igb_main.c
+++ b/drivers/net/ethernet/intel/igb/igb_main.c
@@ -6545,11 +6545,10 @@ static bool igb_can_reuse_rx_page(struct igb_rx_buffer *rx_buffer,
/* flip page offset to other buffer */
rx_buffer->page_offset ^= IGB_RX_BUFSZ;
- /* since we are the only owner of the page and we need to
- * increment it, just set the value to 2 in order to avoid
- * an unnecessary locked operation
+ /* Even if we own the page, we are not allowed to use atomic_set()
+ * This would break get_page_unless_zero() users.
*/
- atomic_set(&page->_count, 2);
+ atomic_inc(&page->_count);
#else
/* move offset up to the next cache line */
rx_buffer->page_offset += truesize;
--
2.1.0.rc2.206.gedb03e5
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [PATCH v2 net 3/5] ixgbe: fix race accessing page->_count
2014-10-10 11:48 [PATCH v2 net 0/5] net: fix races accessing page->_count Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 1/5] fm10k: fix race " Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 2/5] igb: " Eric Dumazet
@ 2014-10-10 11:48 ` Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 4/5] mlx4: " Eric Dumazet
` (2 subsequent siblings)
5 siblings, 0 replies; 7+ messages in thread
From: Eric Dumazet @ 2014-10-10 11:48 UTC (permalink / raw)
To: David S. Miller
Cc: netdev, Alexander Duyck, Jeff Kirsher, Andres Lagar-Cavilla,
Greg Thelen, Hugh Dickins, David Rientjes, Eric Dumazet
This is illegal to use atomic_set(&page->_count, 2) even if we 'own'
the page. Other entities in the kernel need to use get_page_unless_zero()
to get a reference to the page before testing page properties, so we could
loose a refcount increment.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Acked-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
---
drivers/net/ethernet/intel/ixgbe/ixgbe_main.c | 8 +++-----
1 file changed, 3 insertions(+), 5 deletions(-)
diff --git a/drivers/net/ethernet/intel/ixgbe/ixgbe_main.c b/drivers/net/ethernet/intel/ixgbe/ixgbe_main.c
index d677b5a23b58..fec5212d4337 100644
--- a/drivers/net/ethernet/intel/ixgbe/ixgbe_main.c
+++ b/drivers/net/ethernet/intel/ixgbe/ixgbe_main.c
@@ -1865,12 +1865,10 @@ static bool ixgbe_add_rx_frag(struct ixgbe_ring *rx_ring,
/* flip page offset to other buffer */
rx_buffer->page_offset ^= truesize;
- /*
- * since we are the only owner of the page and we need to
- * increment it, just set the value to 2 in order to avoid
- * an unecessary locked operation
+ /* Even if we own the page, we are not allowed to use atomic_set()
+ * This would break get_page_unless_zero() users.
*/
- atomic_set(&page->_count, 2);
+ atomic_inc(&page->_count);
#else
/* move offset up to the next cache line */
rx_buffer->page_offset += truesize;
--
2.1.0.rc2.206.gedb03e5
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [PATCH v2 net 4/5] mlx4: fix race accessing page->_count
2014-10-10 11:48 [PATCH v2 net 0/5] net: fix races accessing page->_count Eric Dumazet
` (2 preceding siblings ...)
2014-10-10 11:48 ` [PATCH v2 net 3/5] ixgbe: " Eric Dumazet
@ 2014-10-10 11:48 ` Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 5/5] net: fix races in page->_count manipulation Eric Dumazet
2014-10-10 19:37 ` [PATCH v2 net 0/5] net: fix races accessing page->_count David Miller
5 siblings, 0 replies; 7+ messages in thread
From: Eric Dumazet @ 2014-10-10 11:48 UTC (permalink / raw)
To: David S. Miller
Cc: netdev, Alexander Duyck, Jeff Kirsher, Andres Lagar-Cavilla,
Greg Thelen, Hugh Dickins, David Rientjes, Eric Dumazet
This is illegal to use atomic_set(&page->_count, ...) even if we 'own'
the page. Other entities in the kernel need to use get_page_unless_zero()
to get a reference to the page before testing page properties, so we could
loose a refcount increment.
Signed-off-by: Eric Dumazet <edumazet@google.com>
---
drivers/net/ethernet/mellanox/mlx4/en_rx.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/net/ethernet/mellanox/mlx4/en_rx.c b/drivers/net/ethernet/mellanox/mlx4/en_rx.c
index a33048ee9621..01660c595f5c 100644
--- a/drivers/net/ethernet/mellanox/mlx4/en_rx.c
+++ b/drivers/net/ethernet/mellanox/mlx4/en_rx.c
@@ -76,10 +76,10 @@ static int mlx4_alloc_pages(struct mlx4_en_priv *priv,
page_alloc->dma = dma;
page_alloc->page_offset = frag_info->frag_align;
/* Not doing get_page() for each frag is a big win
- * on asymetric workloads.
+ * on asymetric workloads. Note we can not use atomic_set().
*/
- atomic_set(&page->_count,
- page_alloc->page_size / frag_info->frag_stride);
+ atomic_add(page_alloc->page_size / frag_info->frag_stride - 1,
+ &page->_count);
return 0;
}
--
2.1.0.rc2.206.gedb03e5
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [PATCH v2 net 5/5] net: fix races in page->_count manipulation
2014-10-10 11:48 [PATCH v2 net 0/5] net: fix races accessing page->_count Eric Dumazet
` (3 preceding siblings ...)
2014-10-10 11:48 ` [PATCH v2 net 4/5] mlx4: " Eric Dumazet
@ 2014-10-10 11:48 ` Eric Dumazet
2014-10-10 19:37 ` [PATCH v2 net 0/5] net: fix races accessing page->_count David Miller
5 siblings, 0 replies; 7+ messages in thread
From: Eric Dumazet @ 2014-10-10 11:48 UTC (permalink / raw)
To: David S. Miller
Cc: netdev, Alexander Duyck, Jeff Kirsher, Andres Lagar-Cavilla,
Greg Thelen, Hugh Dickins, David Rientjes, Eric Dumazet
This is illegal to use atomic_set(&page->_count, ...) even if we 'own'
the page. Other entities in the kernel need to use get_page_unless_zero()
to get a reference to the page before testing page properties, so we could
loose a refcount increment.
The only case it is valid is when page->_count is 0
Fixes: 540eb7bf0bbed ("net: Update alloc frag to reduce get/put page usage and recycle pages")
Signed-off-by: Eric Dumaze <edumazet@google.com>
---
net/core/skbuff.c | 25 ++++++++++++++++++-------
1 file changed, 18 insertions(+), 7 deletions(-)
diff --git a/net/core/skbuff.c b/net/core/skbuff.c
index a30d750647e7..829d013745ab 100644
--- a/net/core/skbuff.c
+++ b/net/core/skbuff.c
@@ -360,18 +360,29 @@ refill:
goto end;
}
nc->frag.size = PAGE_SIZE << order;
-recycle:
- atomic_set(&nc->frag.page->_count, NETDEV_PAGECNT_MAX_BIAS);
+ /* Even if we own the page, we do not use atomic_set().
+ * This would break get_page_unless_zero() users.
+ */
+ atomic_add(NETDEV_PAGECNT_MAX_BIAS - 1,
+ &nc->frag.page->_count);
nc->pagecnt_bias = NETDEV_PAGECNT_MAX_BIAS;
nc->frag.offset = 0;
}
if (nc->frag.offset + fragsz > nc->frag.size) {
- /* avoid unnecessary locked operations if possible */
- if ((atomic_read(&nc->frag.page->_count) == nc->pagecnt_bias) ||
- atomic_sub_and_test(nc->pagecnt_bias, &nc->frag.page->_count))
- goto recycle;
- goto refill;
+ if (atomic_read(&nc->frag.page->_count) != nc->pagecnt_bias) {
+ if (!atomic_sub_and_test(nc->pagecnt_bias,
+ &nc->frag.page->_count))
+ goto refill;
+ /* OK, page count is 0, we can safely set it */
+ atomic_set(&nc->frag.page->_count,
+ NETDEV_PAGECNT_MAX_BIAS);
+ } else {
+ atomic_add(NETDEV_PAGECNT_MAX_BIAS - nc->pagecnt_bias,
+ &nc->frag.page->_count);
+ }
+ nc->pagecnt_bias = NETDEV_PAGECNT_MAX_BIAS;
+ nc->frag.offset = 0;
}
data = page_address(nc->frag.page) + nc->frag.offset;
--
2.1.0.rc2.206.gedb03e5
^ permalink raw reply related [flat|nested] 7+ messages in thread
* Re: [PATCH v2 net 0/5] net: fix races accessing page->_count
2014-10-10 11:48 [PATCH v2 net 0/5] net: fix races accessing page->_count Eric Dumazet
` (4 preceding siblings ...)
2014-10-10 11:48 ` [PATCH v2 net 5/5] net: fix races in page->_count manipulation Eric Dumazet
@ 2014-10-10 19:37 ` David Miller
5 siblings, 0 replies; 7+ messages in thread
From: David Miller @ 2014-10-10 19:37 UTC (permalink / raw)
To: edumazet
Cc: netdev, alexander.h.duyck, jeffrey.t.kirsher, andreslc, gthelen,
hughd, rientjes
From: Eric Dumazet <edumazet@google.com>
Date: Fri, 10 Oct 2014 04:48:13 -0700
> This is illegal to use atomic_set(&page->_count, ...) even if we 'own'
> the page. Other entities in the kernel need to use get_page_unless_zero()
> to get a reference to the page before testing page properties, so we could
> loose a refcount increment.
>
> The only case it is valid is when page->_count is 0, we can use this in
> __netdev_alloc_frag()
>
> Note that I never seen crashes caused by these races, the issue was reported
> by Andres Lagar-Cavilla and Hugh Dickins.
Series applied, thanks Eric.
^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2014-10-10 19:38 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-10-10 11:48 [PATCH v2 net 0/5] net: fix races accessing page->_count Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 1/5] fm10k: fix race " Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 2/5] igb: " Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 3/5] ixgbe: " Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 4/5] mlx4: " Eric Dumazet
2014-10-10 11:48 ` [PATCH v2 net 5/5] net: fix races in page->_count manipulation Eric Dumazet
2014-10-10 19:37 ` [PATCH v2 net 0/5] net: fix races accessing page->_count David Miller
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).