lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <bfdfd736-68b2-635b-0c59-017574620f8c@huawei.com>
Date:   Thu, 5 Aug 2021 17:31:49 +0800
From:   Yunsheng Lin <linyunsheng@...wei.com>
To:     Ilias Apalodimas <ilias.apalodimas@...aro.org>
CC:     Matthew Wilcox <willy@...radead.org>, <davem@...emloft.net>,
        <kuba@...nel.org>, <hawk@...nel.org>, <mcroce@...rosoft.com>,
        <alexander.duyck@...il.com>, <netdev@...r.kernel.org>,
        <linux-kernel@...r.kernel.org>, <linuxarm@...neuler.org>,
        <chenhao288@...ilicon.com>
Subject: Re: [PATCH net] page_pool: mask the page->signature before the
 checking

On 2021/8/5 16:54, Ilias Apalodimas wrote:
> On Thu, Aug 05, 2021 at 10:14:39AM +0800, Yunsheng Lin wrote:
>> On 2021/8/5 9:50, Matthew Wilcox wrote:
>>> On Thu, Aug 05, 2021 at 09:06:57AM +0800, Yunsheng Lin wrote:
>>>> As mentioned in commit c07aea3ef4d4 ("mm: add a signature
>>>> in struct page"):
>>>> "The page->signature field is aliased to page->lru.next and
>>>> page->compound_head."
>>>>
>>>> And as the comment in page_is_pfmemalloc():
>>>> "lru.next has bit 1 set if the page is allocated from the
>>>> pfmemalloc reserves. Callers may simply overwrite it if they
>>>> do not need to preserve that information."
>>>>
>>>> The page->signature is or???ed with PP_SIGNATURE when a page is
>>>> allocated in page pool, see __page_pool_alloc_pages_slow(),
>>>> and page->signature is checked directly with PP_SIGNATURE in
>>>> page_pool_return_skb_page(), which might cause resoure leaking
>>>> problem for a page from page pool if bit 1 of lru.next is set for
>>>> a pfmemalloc page.
>>>>
>>>> As bit 0 is page->compound_head, So mask both bit 0 and 1 before
>>>> the checking in page_pool_return_skb_page().
>>>
>>> No, you don't understand.  We *want* the check to fail if we were low
>>> on memory so we return the emergency allocation.
>>
>> If the check failed, but the page pool assume the page is not from page
>> pool and will not do the resource cleaning(like dma unmapping), as the
>> page pool still use the page with pfmemalloc set and dma map the page
>> if pp_flags & PP_FLAG_DMA_MAP is true in __page_pool_alloc_pages_slow().
>>
>> The returning the emergency allocation you mentioned seems to be handled
>> in __page_pool_put_page(), see:
>>
>> https://elixir.bootlin.com/linux/latest/source/net/core/page_pool.c#L411
>>
>> We just use the page with pfmemalloc one time and do the resource cleaning
>> before returning the page back to page allocator. Or did I miss something
>> here?
>>
>>> .
>>>
> 
> I think you are right here.  What happens is that the original
> pp->signature is OR'ed after the allocation in order to preserve any
> existing bits.  When those are present though the if which will trigger the
> recycling will fail and those DMA mapping will be left stale.
> 
> If we mask the bits during the check (as your patch does), we'll end up not
> recycling the page anyway since it has the pfmemalloc bit set. The page
> pool recycle function will end up releasing the page and the DMA mappings right?

Yes.
The problem might be magnified when frag page in page pool is added, because
page pool only hold one ref of the page, and page_pool_return_skb_page() might
dec the page ref twice if the frag page has two users, supposing the above
checking fail with the pfmemalloc page, leaving to the below log:

[   49.584990] BUG: Bad page state in process iperf  pfn:20af242
[   49.584992] page:(____ptrval____) refcount:-1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x20af242

> 
> Regards
> /Ilias
> .
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ