diff mbox series

[net-next,v2] rtnetlink: instroduce vnlmsg_new and use it in rtnl_getlink

Message ID 20231114095522.27939-1-lirongqing@baidu.com (mailing list archive)
State Changes Requested
Delegated to: Netdev Maintainers
Headers show
Series [net-next,v2] rtnetlink: instroduce vnlmsg_new and use it in rtnl_getlink | expand

Checks

Context Check Description
netdev/series_format success Single patches do not need cover letters
netdev/tree_selection success Clearly marked for net-next
netdev/fixes_present success Fixes tag not required for -next series
netdev/header_inline success No static functions without inline keyword in header files
netdev/build_32bit success Errors and warnings before: 6011 this patch: 6011
netdev/cc_maintainers warning 3 maintainers not CCed: edwin.peer@broadcom.com lucien.xin@gmail.com kuniyu@amazon.com
netdev/build_clang success Errors and warnings before: 2375 this patch: 2375
netdev/verify_signedoff success Signed-off-by tag matches author and committer
netdev/deprecated_api success None detected
netdev/check_selftest success No net selftest shell script
netdev/verify_fixes success No Fixes tag
netdev/build_allmodconfig_warn success Errors and warnings before: 6351 this patch: 6351
netdev/checkpatch warning CHECK: Alignment should match open parenthesis
netdev/build_clang_rust success No Rust files in patch. Skipping build
netdev/kdoc success Errors and warnings before: 0 this patch: 0
netdev/source_inline success Was 0 now: 0

Commit Message

Li,Rongqing Nov. 14, 2023, 9:55 a.m. UTC
if a PF has 256 or more VFs, ip link command will allocate a order 3
memory or more, and maybe trigger OOM due to memory fragement,
the VFs needed memory size is computed in rtnl_vfinfo_size.

so instroduce vnlmsg_new which calls netlink_alloc_large_skb in which
vmalloc is used for large memory, to avoid the failure of allocating
memory

    ip invoked oom-killer: gfp_mask=0xc2cc0(GFP_KERNEL|__GFP_NOWARN|\
	__GFP_COMP|__GFP_NOMEMALLOC), order=3, oom_score_adj=0
    CPU: 74 PID: 204414 Comm: ip Kdump: loaded Tainted: P           OE
    Call Trace:
    dump_stack+0x57/0x6a
    dump_header+0x4a/0x210
    oom_kill_process+0xe4/0x140
    out_of_memory+0x3e8/0x790
    __alloc_pages_slowpath.constprop.116+0x953/0xc50
    __alloc_pages_nodemask+0x2af/0x310
    kmalloc_large_node+0x38/0xf0
    __kmalloc_node_track_caller+0x417/0x4d0
    __kmalloc_reserve.isra.61+0x2e/0x80
    __alloc_skb+0x82/0x1c0
    rtnl_getlink+0x24f/0x370
    rtnetlink_rcv_msg+0x12c/0x350
    netlink_rcv_skb+0x50/0x100
    netlink_unicast+0x1b2/0x280
    netlink_sendmsg+0x355/0x4a0
    sock_sendmsg+0x5b/0x60
    ____sys_sendmsg+0x1ea/0x250
    ___sys_sendmsg+0x88/0xd0
    __sys_sendmsg+0x5e/0xa0
    do_syscall_64+0x33/0x40
    entry_SYSCALL_64_after_hwframe+0x44/0xa9
    RIP: 0033:0x7f95a65a5b70

Cc: Yunsheng Lin <linyunsheng@huawei.com>
Signed-off-by: Li RongQing <lirongqing@baidu.com>
---

Comments

Yunsheng Lin Nov. 14, 2023, 11:31 a.m. UTC | #1
On 2023/11/14 17:55, Li RongQing wrote:
> if a PF has 256 or more VFs, ip link command will allocate a order 3
> memory or more, and maybe trigger OOM due to memory fragement,

fragement -> fragment?

> the VFs needed memory size is computed in rtnl_vfinfo_size.
> 
> so instroduce vnlmsg_new which calls netlink_alloc_large_skb in which

instroduce -> introduce?

> vmalloc is used for large memory, to avoid the failure of allocating
> memory
> 
>     ip invoked oom-killer: gfp_mask=0xc2cc0(GFP_KERNEL|__GFP_NOWARN|\
> 	__GFP_COMP|__GFP_NOMEMALLOC), order=3, oom_score_adj=0
>     CPU: 74 PID: 204414 Comm: ip Kdump: loaded Tainted: P           OE
>     Call Trace:
>     dump_stack+0x57/0x6a
>     dump_header+0x4a/0x210
>     oom_kill_process+0xe4/0x140
>     out_of_memory+0x3e8/0x790
>     __alloc_pages_slowpath.constprop.116+0x953/0xc50
>     __alloc_pages_nodemask+0x2af/0x310
>     kmalloc_large_node+0x38/0xf0
>     __kmalloc_node_track_caller+0x417/0x4d0
>     __kmalloc_reserve.isra.61+0x2e/0x80
>     __alloc_skb+0x82/0x1c0
>     rtnl_getlink+0x24f/0x370
>     rtnetlink_rcv_msg+0x12c/0x350
>     netlink_rcv_skb+0x50/0x100
>     netlink_unicast+0x1b2/0x280
>     netlink_sendmsg+0x355/0x4a0
>     sock_sendmsg+0x5b/0x60
>     ____sys_sendmsg+0x1ea/0x250
>     ___sys_sendmsg+0x88/0xd0
>     __sys_sendmsg+0x5e/0xa0
>     do_syscall_64+0x33/0x40
>     entry_SYSCALL_64_after_hwframe+0x44/0xa9
>     RIP: 0033:0x7f95a65a5b70
> 
> Cc: Yunsheng Lin <linyunsheng@huawei.com>
> Signed-off-by: Li RongQing <lirongqing@baidu.com>
> ---
> diff with v1: not move netlink_alloc_large_skb to skbuff.c
> 
>  include/linux/netlink.h  |  1 +
>  include/net/netlink.h    | 17 +++++++++++++++++
>  net/core/rtnetlink.c     |  2 +-
>  net/netlink/af_netlink.c |  2 +-
>  4 files changed, 20 insertions(+), 2 deletions(-)
> 
> diff --git a/include/linux/netlink.h b/include/linux/netlink.h
> index 75d7de3..abe91ed 100644
> --- a/include/linux/netlink.h
> +++ b/include/linux/netlink.h
> @@ -351,5 +351,6 @@ bool netlink_ns_capable(const struct sk_buff *skb,
>  			struct user_namespace *ns, int cap);
>  bool netlink_capable(const struct sk_buff *skb, int cap);
>  bool netlink_net_capable(const struct sk_buff *skb, int cap);
> +struct sk_buff *netlink_alloc_large_skb(unsigned int size, int broadcast);
>  
>  #endif	/* __LINUX_NETLINK_H */
> diff --git a/include/net/netlink.h b/include/net/netlink.h
> index 83bdf78..7d31217 100644
> --- a/include/net/netlink.h
> +++ b/include/net/netlink.h
> @@ -1011,6 +1011,23 @@ static inline struct sk_buff *nlmsg_new(size_t payload, gfp_t flags)
>  }
>  
>  /**
> + * vnlmsg_new - Allocate a new netlink message with non-contiguous
> + * physical memory
> + * @payload: size of the message payload
> + *
> + * Use NLMSG_DEFAULT_SIZE if the size of the payload isn't known
> + * and a good default is needed.
> + *
> + * The allocated skb is unable to have frag page for shinfo->frags*,
> + * as the NULL setting for skb->head in netlink_skb_destructor() will
> + * bypass most of the handling in skb_release_data()
> + */
> +static inline struct sk_buff *vnlmsg_new(size_t payload)
> +{
> +	return netlink_alloc_large_skb(nlmsg_total_size(payload), 0);
> +}

The nlmsg_new() has the below parameters, there is no gfp flags for
vnlmsg_new() and always assuming GFP_KERNEL?

 * @payload: size of the message payload
 * @flags: the type of memory to allocate.

There are a lot of callers for nlmsg_new(), I am wondering how many
of existing nlmsg_new() caller can change to use vnlmsg_new().
https://elixir.free-electrons.com/linux/v6.7-rc1/A/ident/nlmsg_new

> +
> +/**
>   * nlmsg_end - Finalize a netlink message
>   * @skb: socket buffer the message is stored in
>   * @nlh: netlink message header
> diff --git a/net/core/rtnetlink.c b/net/core/rtnetlink.c
> index e8431c6..bfae6bf 100644
> --- a/net/core/rtnetlink.c
> +++ b/net/core/rtnetlink.c
> @@ -3849,7 +3849,7 @@ static int rtnl_getlink(struct sk_buff *skb, struct nlmsghdr *nlh,
>  		goto out;
>  
>  	err = -ENOBUFS;
> -	nskb = nlmsg_new(if_nlmsg_size(dev, ext_filter_mask), GFP_KERNEL);
> +	nskb = vnlmsg_new(if_nlmsg_size(dev, ext_filter_mask));
>  	if (nskb == NULL)
>  		goto out;
>  
> diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c
> index eb086b0..17587f1 100644
> --- a/net/netlink/af_netlink.c
> +++ b/net/netlink/af_netlink.c
> @@ -1204,7 +1204,7 @@ struct sock *netlink_getsockbyfilp(struct file *filp)
>  	return sock;
>  }
>  
> -static struct sk_buff *netlink_alloc_large_skb(unsigned int size,
> +struct sk_buff *netlink_alloc_large_skb(unsigned int size,
>  					       int broadcast)
>  {
>  	struct sk_buff *skb;
>
Li,Rongqing Nov. 14, 2023, 12:02 p.m. UTC | #2
> -----Original Message-----
> From: Yunsheng Lin <linyunsheng@huawei.com>
> Sent: Tuesday, November 14, 2023 7:32 PM
> To: Li,Rongqing <lirongqing@baidu.com>; davem@davemloft.net;
> edumazet@google.com; kuba@kernel.org; pabeni@redhat.com;
> Liam.Howlett@oracle.com; anjali.k.kulkarni@oracle.com; leon@kernel.org;
> fw@strlen.de; shayagr@amazon.com; idosch@nvidia.com;
> razor@blackwall.org; netdev@vger.kernel.org
> Subject: Re: [PATCH][net-next][v2] rtnetlink: instroduce vnlmsg_new and use it
> in rtnl_getlink
> 
> On 2023/11/14 17:55, Li RongQing wrote:
> > if a PF has 256 or more VFs, ip link command will allocate a order 3
> > memory or more, and maybe trigger OOM due to memory fragement,
> 
> fragement -> fragment?

I will fix it 
Thanks

> 
> > the VFs needed memory size is computed in rtnl_vfinfo_size.
> >
> > so instroduce vnlmsg_new which calls netlink_alloc_large_skb in which
> 
> instroduce -> introduce?

Thanks

> 
> > vmalloc is used for large memory, to avoid the failure of allocating
> > memory
> >
> >     ip invoked oom-killer:
> gfp_mask=0xc2cc0(GFP_KERNEL|__GFP_NOWARN|\
> > 	__GFP_COMP|__GFP_NOMEMALLOC), order=3, oom_score_adj=0
> >     CPU: 74 PID: 204414 Comm: ip Kdump: loaded Tainted: P
> OE
> >     Call Trace:
> >     dump_stack+0x57/0x6a
> >     dump_header+0x4a/0x210
> >     oom_kill_process+0xe4/0x140
> >     out_of_memory+0x3e8/0x790
> >     __alloc_pages_slowpath.constprop.116+0x953/0xc50
> >     __alloc_pages_nodemask+0x2af/0x310
> >     kmalloc_large_node+0x38/0xf0
> >     __kmalloc_node_track_caller+0x417/0x4d0
> >     __kmalloc_reserve.isra.61+0x2e/0x80
> >     __alloc_skb+0x82/0x1c0
> >     rtnl_getlink+0x24f/0x370
> >     rtnetlink_rcv_msg+0x12c/0x350
> >     netlink_rcv_skb+0x50/0x100
> >     netlink_unicast+0x1b2/0x280
> >     netlink_sendmsg+0x355/0x4a0
> >     sock_sendmsg+0x5b/0x60
> >     ____sys_sendmsg+0x1ea/0x250
> >     ___sys_sendmsg+0x88/0xd0
> >     __sys_sendmsg+0x5e/0xa0
> >     do_syscall_64+0x33/0x40
> >     entry_SYSCALL_64_after_hwframe+0x44/0xa9
> >     RIP: 0033:0x7f95a65a5b70
> >
> > Cc: Yunsheng Lin <linyunsheng@huawei.com>
> > Signed-off-by: Li RongQing <lirongqing@baidu.com>
> > ---
> > diff with v1: not move netlink_alloc_large_skb to skbuff.c
> >
> >  include/linux/netlink.h  |  1 +
> >  include/net/netlink.h    | 17 +++++++++++++++++
> >  net/core/rtnetlink.c     |  2 +-
> >  net/netlink/af_netlink.c |  2 +-
> >  4 files changed, 20 insertions(+), 2 deletions(-)
> >
> > diff --git a/include/linux/netlink.h b/include/linux/netlink.h index
> > 75d7de3..abe91ed 100644
> > --- a/include/linux/netlink.h
> > +++ b/include/linux/netlink.h
> > @@ -351,5 +351,6 @@ bool netlink_ns_capable(const struct sk_buff *skb,
> >  			struct user_namespace *ns, int cap);  bool
> netlink_capable(const
> > struct sk_buff *skb, int cap);  bool netlink_net_capable(const struct
> > sk_buff *skb, int cap);
> > +struct sk_buff *netlink_alloc_large_skb(unsigned int size, int
> > +broadcast);
> >
> >  #endif	/* __LINUX_NETLINK_H */
> > diff --git a/include/net/netlink.h b/include/net/netlink.h index
> > 83bdf78..7d31217 100644
> > --- a/include/net/netlink.h
> > +++ b/include/net/netlink.h
> > @@ -1011,6 +1011,23 @@ static inline struct sk_buff *nlmsg_new(size_t
> > payload, gfp_t flags)  }
> >
> >  /**
> > + * vnlmsg_new - Allocate a new netlink message with non-contiguous
> > + * physical memory
> > + * @payload: size of the message payload
> > + *
> > + * Use NLMSG_DEFAULT_SIZE if the size of the payload isn't known
> > + * and a good default is needed.
> > + *
> > + * The allocated skb is unable to have frag page for shinfo->frags*,
> > + * as the NULL setting for skb->head in netlink_skb_destructor() will
> > + * bypass most of the handling in skb_release_data()  */ static
> > +inline struct sk_buff *vnlmsg_new(size_t payload) {
> > +	return netlink_alloc_large_skb(nlmsg_total_size(payload), 0); }
> 
> The nlmsg_new() has the below parameters, there is no gfp flags for
> vnlmsg_new() and always assuming GFP_KERNEL?
> 

I think that vnlmsg_new is similar as vmalloc,  so no flag is needed, and always assuming GFP_KERNEL 

-Li
>  * @payload: size of the message payload
>  * @flags: the type of memory to allocate.
> 
> There are a lot of callers for nlmsg_new(), I am wondering how many of existing
> nlmsg_new() caller can change to use vnlmsg_new().
> https://elixir.free-electrons.com/linux/v6.7-rc1/A/ident/nlmsg_new
>
Jakub Kicinski Nov. 14, 2023, 10:37 p.m. UTC | #3
On Tue, 14 Nov 2023 17:55:22 +0800 Li RongQing wrote:
> -	nskb = nlmsg_new(if_nlmsg_size(dev, ext_filter_mask), GFP_KERNEL);
> +	nskb = vnlmsg_new(if_nlmsg_size(dev, ext_filter_mask));

Why vnlmsg_new()? nlmsg_ is a prefix, for netlink message.
prefixes do not combine like you're trying to make them.
Can you call it nlmsg_new_large() or similar?

>  	if (nskb == NULL)
>  		goto out;
>  
> diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c
> index eb086b0..17587f1 100644
> --- a/net/netlink/af_netlink.c
> +++ b/net/netlink/af_netlink.c
> @@ -1204,7 +1204,7 @@ struct sock *netlink_getsockbyfilp(struct file *filp)
>  	return sock;
>  }
>  
> -static struct sk_buff *netlink_alloc_large_skb(unsigned int size,
> +struct sk_buff *netlink_alloc_large_skb(unsigned int size,
>  					       int broadcast)

You need to fix the alignment of the continuation line.
Perhaps it now fits in 80chars so line break is not needed?
Li,Rongqing Nov. 15, 2023, 8:16 a.m. UTC | #4
> -----Original Message-----
> From: Jakub Kicinski <kuba@kernel.org>
> Sent: Wednesday, November 15, 2023 6:38 AM
> To: Li,Rongqing <lirongqing@baidu.com>
> Cc: davem@davemloft.net; edumazet@google.com; pabeni@redhat.com;
> Liam.Howlett@oracle.com; anjali.k.kulkarni@oracle.com; leon@kernel.org;
> fw@strlen.de; shayagr@amazon.com; idosch@nvidia.com;
> razor@blackwall.org; linyunsheng@huawei.com; netdev@vger.kernel.org
> Subject: Re: [PATCH][net-next][v2] rtnetlink: instroduce vnlmsg_new and use it
> in rtnl_getlink
> 
> On Tue, 14 Nov 2023 17:55:22 +0800 Li RongQing wrote:
> > -	nskb = nlmsg_new(if_nlmsg_size(dev, ext_filter_mask), GFP_KERNEL);
> > +	nskb = vnlmsg_new(if_nlmsg_size(dev, ext_filter_mask));
> 
> Why vnlmsg_new()? nlmsg_ is a prefix, for netlink message.
> prefixes do not combine like you're trying to make them.
> Can you call it nlmsg_new_large() or similar?

I will rename it as nlmsg_new_large


> 
> >  	if (nskb == NULL)
> 
> You need to fix the alignment of the continuation line.
> Perhaps it now fits in 80chars so line break is not needed?

Line break is not needed,

Thanks

-Li
diff mbox series

Patch

diff with v1: not move netlink_alloc_large_skb to skbuff.c

 include/linux/netlink.h  |  1 +
 include/net/netlink.h    | 17 +++++++++++++++++
 net/core/rtnetlink.c     |  2 +-
 net/netlink/af_netlink.c |  2 +-
 4 files changed, 20 insertions(+), 2 deletions(-)

diff --git a/include/linux/netlink.h b/include/linux/netlink.h
index 75d7de3..abe91ed 100644
--- a/include/linux/netlink.h
+++ b/include/linux/netlink.h
@@ -351,5 +351,6 @@  bool netlink_ns_capable(const struct sk_buff *skb,
 			struct user_namespace *ns, int cap);
 bool netlink_capable(const struct sk_buff *skb, int cap);
 bool netlink_net_capable(const struct sk_buff *skb, int cap);
+struct sk_buff *netlink_alloc_large_skb(unsigned int size, int broadcast);
 
 #endif	/* __LINUX_NETLINK_H */
diff --git a/include/net/netlink.h b/include/net/netlink.h
index 83bdf78..7d31217 100644
--- a/include/net/netlink.h
+++ b/include/net/netlink.h
@@ -1011,6 +1011,23 @@  static inline struct sk_buff *nlmsg_new(size_t payload, gfp_t flags)
 }
 
 /**
+ * vnlmsg_new - Allocate a new netlink message with non-contiguous
+ * physical memory
+ * @payload: size of the message payload
+ *
+ * Use NLMSG_DEFAULT_SIZE if the size of the payload isn't known
+ * and a good default is needed.
+ *
+ * The allocated skb is unable to have frag page for shinfo->frags*,
+ * as the NULL setting for skb->head in netlink_skb_destructor() will
+ * bypass most of the handling in skb_release_data()
+ */
+static inline struct sk_buff *vnlmsg_new(size_t payload)
+{
+	return netlink_alloc_large_skb(nlmsg_total_size(payload), 0);
+}
+
+/**
  * nlmsg_end - Finalize a netlink message
  * @skb: socket buffer the message is stored in
  * @nlh: netlink message header
diff --git a/net/core/rtnetlink.c b/net/core/rtnetlink.c
index e8431c6..bfae6bf 100644
--- a/net/core/rtnetlink.c
+++ b/net/core/rtnetlink.c
@@ -3849,7 +3849,7 @@  static int rtnl_getlink(struct sk_buff *skb, struct nlmsghdr *nlh,
 		goto out;
 
 	err = -ENOBUFS;
-	nskb = nlmsg_new(if_nlmsg_size(dev, ext_filter_mask), GFP_KERNEL);
+	nskb = vnlmsg_new(if_nlmsg_size(dev, ext_filter_mask));
 	if (nskb == NULL)
 		goto out;
 
diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c
index eb086b0..17587f1 100644
--- a/net/netlink/af_netlink.c
+++ b/net/netlink/af_netlink.c
@@ -1204,7 +1204,7 @@  struct sock *netlink_getsockbyfilp(struct file *filp)
 	return sock;
 }
 
-static struct sk_buff *netlink_alloc_large_skb(unsigned int size,
+struct sk_buff *netlink_alloc_large_skb(unsigned int size,
 					       int broadcast)
 {
 	struct sk_buff *skb;