Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1B919C54EAA for ; Tue, 24 Jan 2023 17:23:07 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233907AbjAXRXF (ORCPT ); Tue, 24 Jan 2023 12:23:05 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56310 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229681AbjAXRXC (ORCPT ); Tue, 24 Jan 2023 12:23:02 -0500 Received: from nbd.name (nbd.name [46.4.11.11]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 263BD2FCF2; Tue, 24 Jan 2023 09:23:02 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=nbd.name; s=20160729; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:From :References:Cc:To:MIME-Version:Date:Message-ID:Sender:Reply-To:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=MYj9nCLj90PGC2wxkcR/ViTrY81E8h0VHrdqaID0ilg=; b=DbE783Hozxw6INRZSNBO4FkVll Kcbif1n/507Jg75eUs60XwFIbcUAag7NXUeWWYhzY7QghhRhHQOnCmmq6FBo+/sRZFZvX6HPFZTb1 Dj2FFB8+jGVcoHaNm74sLlFi6jKgkAJ+NhDdK9zl5KSb0eUVXoWWlHQpkJI71j0xEYxo=; Received: from [2a01:598:b1ac:c6:f0db:950f:e1fc:548d] (helo=nf.local) by ds12 with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.94.2) (envelope-from ) id 1pKN0Z-0026A3-3K; Tue, 24 Jan 2023 18:22:55 +0100 Message-ID: <19121deb-368f-9786-8700-f1c45d227a4c@nbd.name> Date: Tue, 24 Jan 2023 18:22:54 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Thunderbird/102.6.1 Content-Language: en-US To: Ilias Apalodimas Cc: netdev@vger.kernel.org, Jesper Dangaard Brouer , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Lorenzo Bianconi , linux-kernel@vger.kernel.org, Alexander Duyck , Yunsheng Lin References: <20230124124300.94886-1-nbd@nbd.name> From: Felix Fietkau Subject: Re: [PATCH] net: page_pool: fix refcounting issues with fragmented allocation In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 24.01.23 15:11, Ilias Apalodimas wrote: > Hi Felix, > > ++cc Alexander and Yunsheng. > > Thanks for the report > > On Tue, 24 Jan 2023 at 14:43, Felix Fietkau wrote: >> >> While testing fragmented page_pool allocation in the mt76 driver, I was able >> to reliably trigger page refcount underflow issues, which did not occur with >> full-page page_pool allocation. >> It appears to me, that handling refcounting in two separate counters >> (page->pp_frag_count and page refcount) is racy when page refcount gets >> incremented by code dealing with skb fragments directly, and >> page_pool_return_skb_page is called multiple times for the same fragment. >> >> Dropping page->pp_frag_count and relying entirely on the page refcount makes >> these underflow issues and crashes go away. >> > > This has been discussed here [1]. TL;DR changing this to page > refcount might blow up in other colorful ways. Can we look closer and > figure out why the underflow happens? I don't see how the approch taken in my patch would blow up. From what I can tell, it should be fairly close to how refcount is handled in page_frag_alloc. The main improvement it adds is to prevent it from blowing up if pool-allocated fragments get shared across multiple skbs with corresponding get_page and page_pool_return_skb_page calls. - Felix