From patchwork Thu Apr 27 19:25:11 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jesper Dangaard Brouer X-Patchwork-Id: 13225708 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id E7276C77B73 for ; Thu, 27 Apr 2023 19:25:22 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 4899B6B0072; Thu, 27 Apr 2023 15:25:22 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 4135D6B0074; Thu, 27 Apr 2023 15:25:22 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 2DAE56B0075; Thu, 27 Apr 2023 15:25:22 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 20B0D6B0072 for ; Thu, 27 Apr 2023 15:25:22 -0400 (EDT) Received: from smtpin30.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id E20F8140261 for ; Thu, 27 Apr 2023 19:25:21 +0000 (UTC) X-FDA: 80728149642.30.CD22DF1 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by imf20.hostedemail.com (Postfix) with ESMTP id E26BE1C0010 for ; Thu, 27 Apr 2023 19:25:18 +0000 (UTC) Authentication-Results: imf20.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=HfvRGYc4; dmarc=pass (policy=none) header.from=redhat.com; spf=pass (imf20.hostedemail.com: domain of brouer@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=brouer@redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1682623518; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=qcuOPz9LM/qRerLte17VvS0x1xld3O8uCgJGJPJa064=; b=a1d2X4bgrbI3KJXgNX7TJETtUAnzI1okAlVJQZFsvRALDY3aRX2oYwuOivXBJVKzA+eLWx dEb4zQjNxCw4Eok0kPq5uqoNEgEhy2/FTwCEWsvWCfJY+0E914RF9Ui/RPaTtu98fjZ9hL 3npazl0b9ZZBIKsbXV2yK0jPeiiOOrM= ARC-Authentication-Results: i=1; imf20.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=HfvRGYc4; dmarc=pass (policy=none) header.from=redhat.com; spf=pass (imf20.hostedemail.com: domain of brouer@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=brouer@redhat.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1682623518; a=rsa-sha256; cv=none; b=jInqT9903RbNPIuWzR9DDua0a53EhQ6JEJYwBKiHJ4A0Anz84BzO4rnrl9NgZ8tSjCrZg3 fT2sAlLY4dGnoeiprU1tHmk6X6O7wodXUMDGa3SF5zUdmMcHjv0JPF/inbwbsdJkwslix8 Wr5vcWRegCCuJGBPRCpcYeBg4pxximE= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1682623518; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=qcuOPz9LM/qRerLte17VvS0x1xld3O8uCgJGJPJa064=; b=HfvRGYc4g1OUNseHVu+yBKnkwZrO0Svua+fbR7jNlCRHiMYK8MO9kxgSOwIqz4m+BWOL8y FJZUrYjsTMS19+uw91ezUVX0EGc9tuGAbWdF5rCy29QHLgsmc05pmOdKXw66aaowiiZucB rCyrPK878JuaxEaNwC3M31s84wGL0Zg= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-561-90draVwwN9GOawUVFuLo3w-1; Thu, 27 Apr 2023 15:25:14 -0400 X-MC-Unique: 90draVwwN9GOawUVFuLo3w-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 9AC90800047; Thu, 27 Apr 2023 19:25:12 +0000 (UTC) Received: from firesoul.localdomain (unknown [10.45.242.4]) by smtp.corp.redhat.com (Postfix) with ESMTP id 37A74492C3E; Thu, 27 Apr 2023 19:25:12 +0000 (UTC) Received: from [10.1.1.1] (localhost [IPv6:::1]) by firesoul.localdomain (Postfix) with ESMTP id 575CA307372E8; Thu, 27 Apr 2023 21:25:11 +0200 (CEST) Subject: [PATCH RFC net-next/mm V2 1/2] page_pool: Remove workqueue in new shutdown scheme From: Jesper Dangaard Brouer To: Ilias Apalodimas , netdev@vger.kernel.org, Eric Dumazet , linux-mm@kvack.org, Mel Gorman Cc: Jesper Dangaard Brouer , lorenzo@kernel.org, =?utf-8?q?Toke_H=C3=B8iland-J=C3=B8rgensen?= , linyunsheng@huawei.com, bpf@vger.kernel.org, "David S. Miller" , Jakub Kicinski , Paolo Abeni , Andrew Morton , willy@infradead.org Date: Thu, 27 Apr 2023 21:25:11 +0200 Message-ID: <168262351129.2036355.1136491155595493268.stgit@firesoul> In-Reply-To: <168262348084.2036355.16294550378793036683.stgit@firesoul> References: <168262348084.2036355.16294550378793036683.stgit@firesoul> User-Agent: StGit/1.4 MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.10 X-Rspam-User: X-Rspamd-Server: rspam02 X-Rspamd-Queue-Id: E26BE1C0010 X-Stat-Signature: wp4wau6zy3ora16qoeqm4sqw8jxfjdio X-HE-Tag: 1682623518-5936 X-HE-Meta: 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 DCeMgyJn U9+bExpgaU9TW14WiPgzmZS5roTg75heUOVdTXbbpmVRn5UZwRYMTt1XsDJYj0dAOwrFgmjsQNbsqY5nkvI6grWZuASRKGQQEMBIU27dNVjAb/a7FDJOR1T7WyPCWE6ul3sVTp/IPf4ap0Rc7cP7amdDkeN9TmUixotHGG3ONDMBmxi4azUVWNkPdsj8uMZUUiNB1OfVnrLD4BL1AdAAr3Mqr9C51c/aIuM8Ki8xXLO1Z/5C8WCYzuq8QPw8QGpLG1Tr6oGvVxSYrAxN2LS51looTTs0xp9wkuFhdzhlKWZ6THfH0medfgRUXy/OK4oxBy6yoBXW9kqdEZ+M7NwKY5va9/ZhTkG6ZwdvOEHlOBfuguYrY8YVfAtuTOg== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: This removes the workqueue scheme that periodically tests when inflight reach zero such that page_pool memory can be freed. This change adds code to fast-path free checking for a shutdown flags bit after returning PP pages. Performance is very important for PP, as the fast path is used for XDP_DROP use-cases where NIC drivers recycle PP pages directly into PP alloc cache. The goal were that this code change should have zero impact on this fast-path. The slight code reorg of likely() are deliberate. Micro benchmarking done via kernel module[1] on x86_64, shows this code change only cost a single instruction extra (approx 0.3 nanosec on CPU E5-1650 @3.60GHz). It is possible to make this code zero impact via static_key, but that change is not considered worth the complexity. [1] https://github.com/netoptimizer/prototype-kernel/blob/master/kernel/lib/bench_page_pool_simple.c Signed-off-by: Jesper Dangaard Brouer --- include/net/page_pool.h | 9 ++-- net/core/page_pool.c | 100 +++++++++++++++++++++++++++++------------------ 2 files changed, 66 insertions(+), 43 deletions(-) diff --git a/include/net/page_pool.h b/include/net/page_pool.h index c8ec2f34722b..a71c0f2695b0 100644 --- a/include/net/page_pool.h +++ b/include/net/page_pool.h @@ -50,6 +50,9 @@ PP_FLAG_DMA_SYNC_DEV |\ PP_FLAG_PAGE_FRAG) +/* Internal flag: PP in shutdown phase, waiting for inflight pages */ +#define PP_FLAG_SHUTDOWN BIT(8) + /* * Fast allocation side cache array/stack * @@ -151,11 +154,6 @@ static inline u64 *page_pool_ethtool_stats_get(u64 *data, void *stats) struct page_pool { struct page_pool_params p; - struct delayed_work release_dw; - void (*disconnect)(void *); - unsigned long defer_start; - unsigned long defer_warn; - u32 pages_state_hold_cnt; unsigned int frag_offset; struct page *frag_page; @@ -165,6 +163,7 @@ struct page_pool { /* these stats are incremented while in softirq context */ struct page_pool_alloc_stats alloc_stats; #endif + void (*disconnect)(void *); u32 xdp_mem_id; /* diff --git a/net/core/page_pool.c b/net/core/page_pool.c index e212e9d7edcb..b8359d84e30f 100644 --- a/net/core/page_pool.c +++ b/net/core/page_pool.c @@ -23,9 +23,6 @@ #include -#define DEFER_TIME (msecs_to_jiffies(1000)) -#define DEFER_WARN_INTERVAL (60 * HZ) - #define BIAS_MAX LONG_MAX #ifdef CONFIG_PAGE_POOL_STATS @@ -380,6 +377,10 @@ static struct page *__page_pool_alloc_pages_slow(struct page_pool *pool, struct page *page; int i, nr_pages; + /* API usage BUG: PP in shutdown phase, cannot alloc new pages */ + if (WARN_ON(pool->p.flags & PP_FLAG_SHUTDOWN)) + return NULL; + /* Don't support bulk alloc for high-order pages */ if (unlikely(pp_order)) return __page_pool_alloc_page_order(pool, gfp); @@ -445,15 +446,20 @@ struct page *page_pool_alloc_pages(struct page_pool *pool, gfp_t gfp) } EXPORT_SYMBOL(page_pool_alloc_pages); +/* Avoid inlining code to avoid speculative fetching cacheline */ +noinline u32 pp_read_hold_cnt(struct page_pool *pool) +{ + return READ_ONCE(pool->pages_state_hold_cnt); +} + /* Calculate distance between two u32 values, valid if distance is below 2^(31) * https://en.wikipedia.org/wiki/Serial_number_arithmetic#General_Solution */ #define _distance(a, b) (s32)((a) - (b)) -static s32 page_pool_inflight(struct page_pool *pool) +static s32 __page_pool_inflight(struct page_pool *pool, + u32 hold_cnt, u32 release_cnt) { - u32 release_cnt = atomic_read(&pool->pages_state_release_cnt); - u32 hold_cnt = READ_ONCE(pool->pages_state_hold_cnt); s32 inflight; inflight = _distance(hold_cnt, release_cnt); @@ -464,6 +470,16 @@ static s32 page_pool_inflight(struct page_pool *pool) return inflight; } +static s32 page_pool_inflight(struct page_pool *pool) +{ + u32 hold_cnt = READ_ONCE(pool->pages_state_hold_cnt); + u32 release_cnt = atomic_read(&pool->pages_state_release_cnt); + return __page_pool_inflight(pool, hold_cnt, release_cnt); +} + +static int page_pool_free_attempt(struct page_pool *pool, + u32 hold_cnt, u32 release_cnt); + /* Disconnects a page (from a page_pool). API users can have a need * to disconnect a page (from a page_pool), to allow it to be used as * a regular page (that will eventually be returned to the normal @@ -471,8 +487,10 @@ static s32 page_pool_inflight(struct page_pool *pool) */ void page_pool_release_page(struct page_pool *pool, struct page *page) { + unsigned int flags = READ_ONCE(pool->p.flags); dma_addr_t dma; - int count; + u32 release_cnt; + u32 hold_cnt; if (!(pool->p.flags & PP_FLAG_DMA_MAP)) /* Always account for inflight pages, even if we didn't @@ -490,11 +508,15 @@ void page_pool_release_page(struct page_pool *pool, struct page *page) skip_dma_unmap: page_pool_clear_pp_info(page); - /* This may be the last page returned, releasing the pool, so - * it is not safe to reference pool afterwards. - */ - count = atomic_inc_return_relaxed(&pool->pages_state_release_cnt); - trace_page_pool_state_release(pool, page, count); + if (flags & PP_FLAG_SHUTDOWN) + hold_cnt = pp_read_hold_cnt(pool); + + release_cnt = atomic_inc_return(&pool->pages_state_release_cnt); + trace_page_pool_state_release(pool, page, release_cnt); + + /* In shutdown phase, last page will free pool instance */ + if (flags & PP_FLAG_SHUTDOWN) + page_pool_free_attempt(pool, hold_cnt, release_cnt); } EXPORT_SYMBOL(page_pool_release_page); @@ -535,7 +557,7 @@ static bool page_pool_recycle_in_ring(struct page_pool *pool, struct page *page) static bool page_pool_recycle_in_cache(struct page *page, struct page_pool *pool) { - if (unlikely(pool->alloc.count == PP_ALLOC_CACHE_SIZE)) { + if (pool->alloc.count == PP_ALLOC_CACHE_SIZE) { recycle_stat_inc(pool, cache_full); return false; } @@ -546,6 +568,8 @@ static bool page_pool_recycle_in_cache(struct page *page, return true; } +static void page_pool_empty_ring(struct page_pool *pool); + /* If the page refcnt == 1, this will try to recycle the page. * if PP_FLAG_DMA_SYNC_DEV is set, we'll try to sync the DMA area for * the configured size min(dma_sync_size, pool->max_len). @@ -572,7 +596,8 @@ __page_pool_put_page(struct page_pool *pool, struct page *page, page_pool_dma_sync_for_device(pool, page, dma_sync_size); - if (allow_direct && in_softirq() && + /* During PP shutdown, no direct recycle must occur */ + if (likely(allow_direct && in_softirq()) && page_pool_recycle_in_cache(page, pool)) return NULL; @@ -609,6 +634,8 @@ void page_pool_put_defragged_page(struct page_pool *pool, struct page *page, recycle_stat_inc(pool, ring_full); page_pool_return_page(pool, page); } + if (pool->p.flags & PP_FLAG_SHUTDOWN) + page_pool_empty_ring(pool); } EXPORT_SYMBOL(page_pool_put_defragged_page); @@ -648,13 +675,17 @@ void page_pool_put_page_bulk(struct page_pool *pool, void **data, /* Hopefully all pages was return into ptr_ring */ if (likely(i == bulk_len)) - return; + goto out; /* ptr_ring cache full, free remaining pages outside producer lock * since put_page() with refcnt == 1 can be an expensive operation */ for (; i < bulk_len; i++) page_pool_return_page(pool, data[i]); + +out: + if (pool->p.flags & PP_FLAG_SHUTDOWN) + page_pool_empty_ring(pool); } EXPORT_SYMBOL(page_pool_put_page_bulk); @@ -737,6 +768,7 @@ struct page *page_pool_alloc_frag(struct page_pool *pool, } EXPORT_SYMBOL(page_pool_alloc_frag); +noinline static void page_pool_empty_ring(struct page_pool *pool) { struct page *page; @@ -796,39 +828,29 @@ static void page_pool_scrub(struct page_pool *pool) page_pool_empty_ring(pool); } -static int page_pool_release(struct page_pool *pool) +noinline +static int page_pool_free_attempt(struct page_pool *pool, + u32 hold_cnt, u32 release_cnt) { int inflight; - page_pool_scrub(pool); - inflight = page_pool_inflight(pool); + inflight = __page_pool_inflight(pool, hold_cnt, release_cnt); if (!inflight) page_pool_free(pool); return inflight; } -static void page_pool_release_retry(struct work_struct *wq) +static int page_pool_release(struct page_pool *pool) { - struct delayed_work *dwq = to_delayed_work(wq); - struct page_pool *pool = container_of(dwq, typeof(*pool), release_dw); int inflight; - inflight = page_pool_release(pool); + page_pool_scrub(pool); + inflight = page_pool_inflight(pool); if (!inflight) - return; - - /* Periodic warning */ - if (time_after_eq(jiffies, pool->defer_warn)) { - int sec = (s32)((u32)jiffies - (u32)pool->defer_start) / HZ; - - pr_warn("%s() stalled pool shutdown %d inflight %d sec\n", - __func__, inflight, sec); - pool->defer_warn = jiffies + DEFER_WARN_INTERVAL; - } + page_pool_free(pool); - /* Still not ready to be disconnected, retry later */ - schedule_delayed_work(&pool->release_dw, DEFER_TIME); + return inflight; } void page_pool_use_xdp_mem(struct page_pool *pool, void (*disconnect)(void *), @@ -868,11 +890,13 @@ void page_pool_destroy(struct page_pool *pool) if (!page_pool_release(pool)) return; - pool->defer_start = jiffies; - pool->defer_warn = jiffies + DEFER_WARN_INTERVAL; + /* PP have pages inflight, thus cannot immediately release memory. + * Enter into shutdown phase. + */ + pool->p.flags |= PP_FLAG_SHUTDOWN; - INIT_DELAYED_WORK(&pool->release_dw, page_pool_release_retry); - schedule_delayed_work(&pool->release_dw, DEFER_TIME); + /* Concurrent CPUs could have returned last pages into ptr_ring */ + page_pool_empty_ring(pool); } EXPORT_SYMBOL(page_pool_destroy); From patchwork Thu Apr 27 19:25:16 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jesper Dangaard Brouer X-Patchwork-Id: 13225709 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 46A81C77B61 for ; Thu, 27 Apr 2023 19:25:28 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id D63756B0074; Thu, 27 Apr 2023 15:25:27 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id D13D46B0075; Thu, 27 Apr 2023 15:25:27 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id BDBA16B0078; Thu, 27 Apr 2023 15:25:27 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id B0CD56B0074 for ; Thu, 27 Apr 2023 15:25:27 -0400 (EDT) Received: from smtpin15.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 8607B14013F for ; Thu, 27 Apr 2023 19:25:27 +0000 (UTC) X-FDA: 80728149894.15.DF88CF6 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by imf14.hostedemail.com (Postfix) with ESMTP id 9B4F0100016 for ; Thu, 27 Apr 2023 19:25:25 +0000 (UTC) Authentication-Results: imf14.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=OQJbJFp1; spf=pass (imf14.hostedemail.com: domain of brouer@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=brouer@redhat.com; dmarc=pass (policy=none) header.from=redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1682623525; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=wynb7GdU79YYV9ENu+xz5worQ7/3FbOaM+jXoCkc6Vg=; b=MmYP0bV6BbdLB8ewod8L3XiSkz0vYBpBsEpwZEkzAiOlF0UjEf870jBlR0POJG9Lxsg5uc DRONtO75yknuyyLDu+WDI9HwxQ46n0t9ZMjRSXrA7hKcpmwyvA6m+52nL8IX2BvQhCdFpX MQtdf2aH8AVWufmvxAUnabZo8GZ08sI= ARC-Authentication-Results: i=1; imf14.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=OQJbJFp1; spf=pass (imf14.hostedemail.com: domain of brouer@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=brouer@redhat.com; dmarc=pass (policy=none) header.from=redhat.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1682623525; a=rsa-sha256; cv=none; b=KpqN+DBaQbN4IV8UAP/a236vs4PANHOTQcIJf5yyB3pfnBJcWYDUynQW7uLNK0e7sxH9F6 RyWw/sWSZsnnKvAUdOJdzZiniJN6feyYDbQvrgFHaQFZedAMUywUDmeYP3MM4oFF1m7rUD IBzyKSspLcNsucM9mC7LOXsHhvUi7hA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1682623525; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=wynb7GdU79YYV9ENu+xz5worQ7/3FbOaM+jXoCkc6Vg=; b=OQJbJFp1Dw4SYvZSWhag03MXxedfwpKbmTDd6CBAQI/BYbtOoIujan8xThCZ+tKEqS7RWG UjdRooWAE4NztTy6D2ZdJVREdjHv9wDLpw1uedYdkTzyGZK4i323HukqtHkFdUnsD9vSXn G6/OwAh4Dz/AFsfCssuYhUYZEy6qy7U= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-571-kl80mYlSMgig3GF4mRmU3Q-1; Thu, 27 Apr 2023 15:25:18 -0400 X-MC-Unique: kl80mYlSMgig3GF4mRmU3Q-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 7FD86281294A; Thu, 27 Apr 2023 19:25:17 +0000 (UTC) Received: from firesoul.localdomain (unknown [10.45.242.4]) by smtp.corp.redhat.com (Postfix) with ESMTP id 430DA1121314; Thu, 27 Apr 2023 19:25:17 +0000 (UTC) Received: from [10.1.1.1] (localhost [IPv6:::1]) by firesoul.localdomain (Postfix) with ESMTP id 65F7C307372E8; Thu, 27 Apr 2023 21:25:16 +0200 (CEST) Subject: [PATCH RFC net-next/mm V2 2/2] mm/page_pool: catch page_pool memory leaks From: Jesper Dangaard Brouer To: Ilias Apalodimas , netdev@vger.kernel.org, Eric Dumazet , linux-mm@kvack.org, Mel Gorman Cc: Jesper Dangaard Brouer , lorenzo@kernel.org, =?utf-8?q?Toke_H=C3=B8iland-J=C3=B8rgensen?= , linyunsheng@huawei.com, bpf@vger.kernel.org, "David S. Miller" , Jakub Kicinski , Paolo Abeni , Andrew Morton , willy@infradead.org Date: Thu, 27 Apr 2023 21:25:16 +0200 Message-ID: <168262351637.2036355.17064734185414935239.stgit@firesoul> In-Reply-To: <168262348084.2036355.16294550378793036683.stgit@firesoul> References: <168262348084.2036355.16294550378793036683.stgit@firesoul> User-Agent: StGit/1.4 MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.3 X-Stat-Signature: 15rbihhryhinwcpd6n7wujegfzktkcr6 X-Rspam-User: X-Rspamd-Queue-Id: 9B4F0100016 X-Rspamd-Server: rspam06 X-HE-Tag: 1682623525-15937 X-HE-Meta: U2FsdGVkX19ZRw+qyhV5Fs9Ijl+LVR/JNbEwONMRKLpMUuxSqqemjuXAUgIPX58jeT/0h8N5CLbod39iZVzh4TXCeGampv8UTLhVC35ltBUnh5iKzdFKEmsuY5tSqCHjErT23chKnsxw/J/Lwbm2ehJmJs6xdRTyDcbWXs5CloieH4kodJxvy8NvB9yMgJoDXHDtTggVWAb7mRhiI4pa+KvPlWSdrENQXnSEXsXU3pVljHCPPDSnNSrVobzaEjmKLvgZc447hdcNzkQsVeDvRLbHdyQhqE+3JXckC30CLOmNoZ4dFPX2cnxWEX9h1+EZM0WpA6Dt53zFXnPTMoTlWLTNJZ4HOVdmJGsuyc/yFVXuaTiUaCBoKJz+vjSrHQby3RbGgZXtkOSilKN3GEMn9EWIWzs4K9kjmr7/zqC1zq7Lp/AJyJ+EN9zgvCEhfsCPZEwTB/4ETvF2R+wCPthsxQqBjFog/HNAhX+8CS6pcfObYbawmfBzn6j0NMepNvVwk+szfqp8/QO3Hs4Qny+u4i2sUxRN9ZM4jaR7s3UeNhLbMM/n0BT4+WaHAkMb/GeftH65FKD2qwG5AwQrZ+mTnpbAg09zf0s6Rmq1oi2Z0q5dWQvbDIkzpSTPOrsYQGKrIMleErAfgfnBtrw4uIhW24okJ7a/r4cbdB7mb65rus8pxKO880CUNGEOZ3fYMWNiigCR3Tow1bFcIX9nV0tOMMynOvrbhmFOnQmlOo4ZGs3ZMNRkRY1b0GlLFlJqeMlLnrNgyvnYZKXD8mfzgAxBL6tizx+L9tGnVoV1rJ6yhjjTxpnrPwNxH8axJ04LYmY0ED19XjBGFTg+hdp7ErV0pC+eZ6uEyWPIiXTTGBy3xT/kkHXSXlQS8xgzdZFPMvgPzqjmzIKU56vHLTS6X9fE3MZGyz29f/pwUugfrkJdoZyE4IOeCly510KaFCDRrH1/AqZD+eCQkzRd+dC+E73 VdLg9+Ul KU4AwVc/+I7STnl5K7fk7vZihVZdtqKBbEdVFnSqCE7CfVr0X0ujeoh35TGSq4YoLxVGLWZZsSBJ0wSjqACjC3GkhDvz95UZBtYgU07hsVnVnZERqCFjKevYTcWrhCDK1tl5TiZ43jol4Y53+1AdYkrvixf3syMIRiTo/oqdTeP4ATGyPeTqG/3P5g4Stnik3ITHonmkqAAwUeERxz3Xcq2x3XaL4XotuK+93z67k465nL4C1pgMZIgVa2an/gIvC2orz3t7oWBvpvqx7lxWdAIFaoV2zHjrdZPvGlwfKg/dK9dy6v+F8mU9scTEJS3dembxP X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Pages belonging to a page_pool (PP) instance must be freed through the PP APIs in-order to correctly release any DMA mappings and release refcnt on the DMA device when freeing PP instance. When PP release a page (page_pool_release_page) the page->pp_magic value is cleared. This patch detect a leaked PP page in free_page_is_bad() via unexpected state of page->pp_magic value being PP_SIGNATURE. We choose to report and treat it as a bad page. It would be possible to release the page via returning it to the PP instance as the page->pp pointer is likely still valid. Notice this code is only activated when either compiled with CONFIG_DEBUG_VM or boot cmdline debug_pagealloc=on, and CONFIG_PAGE_POOL. Reduced example output of leak with PP_SIGNATURE = dead000000000040: BUG: Bad page state in process swapper/0 pfn:110bbf page:000000005bc8cfb8 refcount:0 mapcount:0 mapping:0000000000000000 index:0x110bbf000 pfn:0x110bbf flags: 0x2fffff80000000(node=0|zone=2|lastcpupid=0x1fffff) raw: 002fffff80000000 dead000000000040 ffff888117255000 0000000000000000 raw: 0000000110bbf000 000000000000003e 00000000ffffffff 0000000000000000 page dumped because: page_pool leak [...] Signed-off-by: Jesper Dangaard Brouer --- mm/page_alloc.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/mm/page_alloc.c b/mm/page_alloc.c index 8e39705c7bdc..137b72f8ab8b 100644 --- a/mm/page_alloc.c +++ b/mm/page_alloc.c @@ -1247,6 +1247,9 @@ static inline bool page_expected_state(struct page *page, page_ref_count(page) | #ifdef CONFIG_MEMCG page->memcg_data | +#endif +#ifdef CONFIG_PAGE_POOL + ((page->pp_magic & ~0x3UL) == PP_SIGNATURE) | #endif (page->flags & check_flags))) return false; @@ -1273,6 +1276,10 @@ static const char *page_bad_reason(struct page *page, unsigned long flags) #ifdef CONFIG_MEMCG if (unlikely(page->memcg_data)) bad_reason = "page still charged to cgroup"; +#endif +#ifdef CONFIG_PAGE_POOL + if (unlikely((page->pp_magic & ~0x3UL) == PP_SIGNATURE)) + bad_reason = "page_pool leak"; #endif return bad_reason; }