lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 4 Apr 2022 11:36:27 +0100
From:   Martin Habets <habetsm.xilinx@...il.com>
To:     Taehee Yoo <ap420073@...il.com>
Cc:     davem@...emloft.net, kuba@...nel.org, pabeni@...hat.com,
        netdev@...r.kernel.org, bpf@...r.kernel.org,
        ecree.xilinx@...il.com, ast@...nel.org, daniel@...earbox.net,
        hawk@...nel.org, john.fastabend@...il.com
Subject: Re: [PATCH net v2] net: sfc: add missing xdp queue reinitialization

Hi Taehee,

On Sat, Apr 02, 2022 at 03:48:14AM +0900, Taehee Yoo wrote:
> On 4/1/22 20:06, Martin Habets wrote:
> 
> Hi Martin,
> Thank you so much for your review!
> 
> > Hi Taehee,
> >
> > Thanks for looking into this. Unfortunately efx_realloc_channels()
> > has turned out to be quite fragile over the years, so I'm
> > keen to remove it in stead of patching it up all the time.
> 
> I agree with you.
> efx_realloc_channels() is too complex.
> 
> >
> > Could you try the patch below please?
> > If it works ok for you as well we'll be able to remove
> > efx_realloc_channels(). The added advantage of this approach
> > is that the netdev notifiers get informed of the change.
> 
> I tested your patch and I found a page reference count problem.
> How to test:
> 1. set up XDP_TX
> 2. traffic on
> 3. traffic off
> 4. ring buffer size change
> 5. loop from 2 to 4.
> 
> [   87.836195][   T72] BUG: Bad page state in process kworker/u16:1
> pfn:125445
> [   87.843356][   T72] page:000000003725f642 refcount:-2 mapcount:0
> mapping:0000000000000000 index:0x0 pfn:0x125445
> [   87.853783][   T72] flags: 0x200000000000000(node=0|zone=2)
> 
> [   87.859391][   T72] raw: 0200000000000000 dead000000000100
> dead000000000122 0000000000000000
> [   87.867928][   T72] raw: 0000000000000000 0000000000000000
> fffffffeffffffff 0000000000000000
> [   87.876569][   T72] page dumped because: nonzero _refcount
> 
> [   87.882125][   T72] Modules linked in: af_packet sfc ixgbe mtd atlantic
> coretemp mdio hwmon sch_fq_codel msr bpf_prelx
> [   87.895331][   T72] CPU: 0 PID: 72 Comm: kworker/u16:1 Not tainted
> 5.17.0+ #62 dbf33652f22e5147659e7e2472bb962779c4833
> [   87.906350][   T72] Hardware name: ASUS System Product Name/PRIME Z690-P
> D4, BIOS 0603 11/01/2021
> [   87.915360][   T72] Workqueue: netns cleanup_net
> 
> [   87.920087][   T72] Call Trace:
> 
> [   87.923311][   T72]  <TASK>
> 
> [   87.926188][   T72]  dump_stack_lvl+0x56/0x7b
> 
> [   87.930597][   T72]  bad_page.cold.125+0x63/0x93
> 
> [   87.935288][   T72]  free_pcppages_bulk+0x63c/0x6f0
> 
> [   87.940232][   T72]  free_unref_page+0x8b/0xf0
> 
> [   87.944749][   T72]  efx_fini_rx_queue+0x15f/0x210 [sfc
> 49c5d4f562a40c6a7ed913c25f5bd4e126bcfa4e]

Looks to me like this is in efx_fini_rx_recycle_ring().
It could be a side effect of the memory leak you report below.
If this is in efx_fini_rx_recycle_ring() I'll post a patch for
that soon on a separate thread.

> [   87.953756][   T72]  efx_stop_channels+0xef/0x1b0 [sfc
> 49c5d4f562a40c6a7ed913c25f5bd4e126bcfa4e]
> [   87.962699][   T72]  efx_net_stop+0x4d/0x60 [sfc
> 49c5d4f562a40c6a7ed913c25f5bd4e126bcfa4e]
> [   87.971029][   T72]  __dev_close_many+0x8b/0xf0
> 
> [   87.975618][   T72]  dev_close_many+0x7d/0x120
> 
> [ ... ]
> 
> 
> In addition, I would like to share issues that I'm currently looking into:
> 1. TX DMA error
> when interface down/up or ring buffer size changes, TX DMA error would occur
> because tx_queue can be used before initialization.
> But It will be fixed by the below patch.
> 
>  static void efx_ethtool_get_wol(struct net_device *net_dev,
> diff --git a/drivers/net/ethernet/sfc/tx.c b/drivers/net/ethernet/sfc/tx.c
> index d16e031e95f4..6983799e1c05 100644
> --- a/drivers/net/ethernet/sfc/tx.c
> +++ b/drivers/net/ethernet/sfc/tx.c
> @@ -443,6 +443,9 @@ int efx_xdp_tx_buffers(struct efx_nic *efx, int n,
> struct xdp_frame **xdpfs,
>         if (unlikely(!tx_queue))
>                 return -EINVAL;
> 
> +       if (!tx_queue->initialised)
> +               return -EINVAL;
> +
>         if (efx->xdp_txq_queues_mode != EFX_XDP_TX_QUEUES_DEDICATED)
>                 HARD_TX_LOCK(efx->net_dev, tx_queue->core_txq, cpu);
> 
> diff --git a/drivers/net/ethernet/sfc/tx_common.c
> b/drivers/net/ethernet/sfc/tx_common.c
> index d530cde2b864..9bc8281b7f5b 100644
> --- a/drivers/net/ethernet/sfc/tx_common.c
> +++ b/drivers/net/ethernet/sfc/tx_common.c
> @@ -101,6 +101,8 @@ void efx_fini_tx_queue(struct efx_tx_queue *tx_queue)
>         netif_dbg(tx_queue->efx, drv, tx_queue->efx->net_dev,
>                   "shutting down TX queue %d\n", tx_queue->queue);
> 
> +       tx_queue->initialised = false;
> +
>         if (!tx_queue->buffer)
>                 return;

Looks ok, but xmit_hard should never be called on an interface that
is down. Makes me wonder if we have a seqence issue in our ndo_stop API.

> 
> After your patch, unfortunately, it can't fix ring buffer size change case.
> It can fix only interface down/up case.
> I will look into this more.
> 
> 2. Memory leak
> There is a memory leak in ring buffer size change logic.
> reproducer:
>    while :
>    do
>        ethtool -G <interface name> rx 2048 tx 2048
>        ethtool -G <interface name> rx 1024 tx 1024
>    done

Is this with my patch or only with yours?
Thanks a lot for testing this.

Martin

> Thanks a lot,
> Taehee Yoo
> 
> >
> > Regards,
> > Martin Habets <habetsm.xilinx@...il.com>
> >
> > ---
> >   drivers/net/ethernet/sfc/ethtool.c |   13 ++++++++++++-
> >   1 file changed, 12 insertions(+), 1 deletion(-)
> >
> > diff --git a/drivers/net/ethernet/sfc/ethtool.c
> b/drivers/net/ethernet/sfc/ethtool.c
> > index 48506373721a..8cfbe61737bb 100644
> > --- a/drivers/net/ethernet/sfc/ethtool.c
> > +++ b/drivers/net/ethernet/sfc/ethtool.c
> > @@ -179,6 +179,7 @@ efx_ethtool_set_ringparam(struct net_device *net_dev,
> >   {
> >   	struct efx_nic *efx = netdev_priv(net_dev);
> >   	u32 txq_entries;
> > +	int rc = 0;
> >
> >   	if (ring->rx_mini_pending || ring->rx_jumbo_pending ||
> >   	    ring->rx_pending > EFX_MAX_DMAQ_SIZE ||
> > @@ -198,7 +199,17 @@ efx_ethtool_set_ringparam(struct net_device *net_dev,
> >   			   "increasing TX queue size to minimum of %u\n",
> >   			   txq_entries);
> >
> > -	return efx_realloc_channels(efx, ring->rx_pending, txq_entries);
> > +	/* Apply the new settings */
> > +	efx->rxq_entries = ring->rx_pending;
> > +	efx->txq_entries = ring->tx_pending;
> > +
> > +	/* Update the datapath with the new settings if the interface is up */
> > +	if (!efx_check_disabled(efx) && netif_running(efx->net_dev)) {
> > +		dev_close(net_dev);
> > +		rc = dev_open(net_dev, NULL);
> > +	}
> > +
> > +	return rc;
> >   }
> >
> >   static void efx_ethtool_get_wol(struct net_device *net_dev,

-- 
Martin Habets <habetsm.xilinx@...il.com>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ