From patchwork Tue Mar 25 15:45:42 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Toke_H=C3=B8iland-J=C3=B8rgensen?= X-Patchwork-Id: 14029157 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id CFFF8C35FFC for ; Tue, 25 Mar 2025 15:46:47 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 01DFD28000C; Tue, 25 Mar 2025 11:46:45 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id E6FA8280007; Tue, 25 Mar 2025 11:46:44 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id CCB4A280015; Tue, 25 Mar 2025 11:46:44 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id A39C0280007 for ; Tue, 25 Mar 2025 11:46:44 -0400 (EDT) Received: from smtpin15.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 3DB8EB996D for ; Tue, 25 Mar 2025 15:46:46 +0000 (UTC) X-FDA: 83260501212.15.AA5A408 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by imf21.hostedemail.com (Postfix) with ESMTP id 632491C0008 for ; Tue, 25 Mar 2025 15:46:43 +0000 (UTC) Authentication-Results: imf21.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=eM16o6nz; dmarc=pass (policy=quarantine) header.from=redhat.com; spf=pass (imf21.hostedemail.com: domain of toke@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=toke@redhat.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1742917603; a=rsa-sha256; cv=none; b=rvHFsYaUp7VUO4Mw1h4yMvAF6r5IqpbSIyVk1rLZBuY9cVTouzWElgcX14RidUyYCHeU3W 5AtB6rgKavxv+Xum5RGf54ouuua3Vx04c/6KkQtSBUZvuRGx2cxyaz0xGuwZmYPKXBR02B FzNC0Drla+h+oHA4v0Nw0tdW27tezpw= ARC-Authentication-Results: i=1; imf21.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=eM16o6nz; dmarc=pass (policy=quarantine) header.from=redhat.com; spf=pass (imf21.hostedemail.com: domain of toke@redhat.com designates 170.10.133.124 as permitted sender) smtp.mailfrom=toke@redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1742917603; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=wHU3gd5R+PcFSPJyd+8lTgr7QvXzHN6SGWRXjaUKaHA=; b=G2Ze39pqIlzm5/h8gucYw5BQqtV95TUnUgKyS4V6WECFS+x+DxHRV9KqWUCLjGw1+Yiemi nT9A2NDW5xOxDFXNwBwZuUWktLPIqZJA52leyhiSx9QvnVa7PSITqnSsPQVVg5xS5+CEcI cjTXbbfW/kPNqDVGiSC6EVjNRKP1AGk= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1742917602; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=wHU3gd5R+PcFSPJyd+8lTgr7QvXzHN6SGWRXjaUKaHA=; b=eM16o6nzZz0/vjwgHZ+teEw9shTtdaMXE1Pduf5QmW3pOzpZpPlWPYymbcU+K7AS7eynRt 9c1QV1GDKyWX4KKn36ECtBrtMiZHfsv0hjk6TUsl1KWxXUIJ/cPvNx7VvOBONA/Xjvg7M5 JlgVzMW1kqB8SsuWb19kVK6KCj57YTY= Received: from mail-ej1-f72.google.com (mail-ej1-f72.google.com [209.85.218.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-340-WjjLKlKINFi4YewD7iD73g-1; Tue, 25 Mar 2025 11:46:41 -0400 X-MC-Unique: WjjLKlKINFi4YewD7iD73g-1 X-Mimecast-MFC-AGG-ID: WjjLKlKINFi4YewD7iD73g_1742917600 Received: by mail-ej1-f72.google.com with SMTP id a640c23a62f3a-ac3d89cc4f3so439697166b.2 for ; Tue, 25 Mar 2025 08:46:41 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1742917600; x=1743522400; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=wHU3gd5R+PcFSPJyd+8lTgr7QvXzHN6SGWRXjaUKaHA=; b=f1ofhQzj+cmGtrTbsSO1U0gqiezB5evcKLWoiNcjBI3i9ZOpqXCGNUsw7TiDfqnl7K k6NfhhrNN5NvgTCk+FvPT64jM1ERCc/72DoRRJ3VFgLiZRVRCzrngKpajYrmELg4FeML x18QGTbhfEaODON9ptfHRK7NAsv5PJ9RwdjgyHzD+/4q7cKjaV9l8i40fxSG9DPhzYiP DkdXH4a8jkCbHF3ZmJxdYYBSYMlx7e/gwfIBNRTJHfI/Y5hfjrcZ+DuKpk2+uMuIk8QA fEvcBFCQBZ15LWKSucIYmkIIpzQKHHBvDAWCtY3lQUQIlOlAfnCDP7gEVZzXsk2jAnZe 0h1w== X-Forwarded-Encrypted: i=1; AJvYcCV9iZ1mUoVDZLefyOqy3aO479DHHol4dYVM7mCqkL4/CiCEbcapJMPkJFMw5qIpwjxgp5EeM9Uz3Q==@kvack.org X-Gm-Message-State: AOJu0YwBYnwPV66utqmEYAZoF2Wb6DSmJRqk5eClLirDSvex4GnY6wUz EI1yD/bF1HMiKiNFsFeCmDocYYRQUFRlIVnJogyHnClhoEikn327mEQ54sE+Ds8UqywGTqRaUyW K67AOwIiixuBSaFkCYAiWpHMqdux9TTqCn5jF3SrJg8yYrSLo X-Gm-Gg: ASbGnctmlj1nWeSdXj937jkT6MyyOyAU2rqfpDI6rlAx4rg9VSdmDnJ4JPiJz2INziS Cs/Vihw/zXQvCB/bMlLNrwSqi39kr1FmlAZdTcxZG3oa+pb/W4RCFH1OZ/WeLfFlwQ6GzNVVBPW 0qYIvlm0ot4phb6xBhV6h+CsIa4FuCrRFe+1QUJDlkCwer8uabWw1j2DM+OsYScEVjkGoO5rA91 3dScjMAdz88+RdfSkmouo2WE02aHoVHMgXQMCs3hnbgjjCB3NAgB89MZd526HBYjToDQ8/OYFba ANUMmqDC+C2mho0jD9fk7fA8A+NsLDTXGZ0nBbor X-Received: by 2002:a17:907:d786:b0:ac3:48e4:f8bb with SMTP id a640c23a62f3a-ac3f24adcd2mr2028798166b.41.1742917599851; Tue, 25 Mar 2025 08:46:39 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEHYnNtpCnvUp6kAetaPQVboemrGa0ubCCpu4/locWPfqZN0d+JRIaI57zV4LgX72gZ8HdAqQ== X-Received: by 2002:a17:907:d786:b0:ac3:48e4:f8bb with SMTP id a640c23a62f3a-ac3f24adcd2mr2028794266b.41.1742917599357; Tue, 25 Mar 2025 08:46:39 -0700 (PDT) Received: from alrua-x1.borgediget.toke.dk ([45.145.92.2]) by smtp.gmail.com with ESMTPSA id a640c23a62f3a-ac3ef8e52c6sm863354366b.70.2025.03.25.08.46.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 25 Mar 2025 08:46:38 -0700 (PDT) Received: by alrua-x1.borgediget.toke.dk (Postfix, from userid 1000) id C703818FC8B8; Tue, 25 Mar 2025 16:46:36 +0100 (CET) From: =?utf-8?q?Toke_H=C3=B8iland-J=C3=B8rgensen?= Date: Tue, 25 Mar 2025 16:45:42 +0100 Subject: [PATCH net-next v2 1/3] page_pool: Move pp_magic check into helper functions MIME-Version: 1.0 Message-Id: <20250325-page-pool-track-dma-v2-1-113ebc1946f3@redhat.com> References: <20250325-page-pool-track-dma-v2-0-113ebc1946f3@redhat.com> In-Reply-To: <20250325-page-pool-track-dma-v2-0-113ebc1946f3@redhat.com> To: "David S. Miller" , Jakub Kicinski , Jesper Dangaard Brouer , Saeed Mahameed , Leon Romanovsky , Tariq Toukan , Andrew Lunn , Eric Dumazet , Paolo Abeni , Ilias Apalodimas , Simon Horman , Andrew Morton , Mina Almasry , Yonglong Liu , Yunsheng Lin , Pavel Begunkov , Matthew Wilcox Cc: netdev@vger.kernel.org, bpf@vger.kernel.org, linux-rdma@vger.kernel.org, linux-mm@kvack.org, =?utf-8?q?Toke_H=C3=B8iland-J=C3=B8rgensen?= X-Mailer: b4 0.14.2 X-Mimecast-Spam-Score: 0 X-Mimecast-MFC-PROC-ID: JNeMLqwwiz0-4Bx2LYNQV9dZCF3KIbUDAbowm93CuGg_1742917600 X-Mimecast-Originator: redhat.com X-Rspam-User: X-Rspamd-Server: rspam03 X-Rspamd-Queue-Id: 632491C0008 X-Stat-Signature: aoqrcs41r48wu9th713kyzyuapfxnbpz X-HE-Tag: 1742917603-453110 X-HE-Meta: U2FsdGVkX18zzdbybxJ3M7zVRaklSBlhaRuCfkBqW0TRjZUcgtynqSyULKB5ssdL3u50g04vSkV1ia9ZHDjIJbrHHDJro57SOwclaYEP4L8/x+mXEE5orewTbPdamc3KL3UEZhp17zjBjI2xcYMb0C1QTuo6QGB46Iq3LxwEPkNhl3wf5PxyHR6fqWqax7g0ztFIGeT+U5pY3xxP0oaIQbPn4DoEuxxx70f7+v8WMqYFTRy+U5PT+YyhftneUB6D1lEf02VR7Ottp10szwh3/Ipg74iESqTvwmS/nT3vnvgBI4zNUNwqJu1nXsgBWXRMp3v9gWL2C8ia2HLAQK8mDkha6os+4dJQlmj3UCoBWuyaOwgl0zEq4Dsux+lIAD/L0s7reDbH7H27+STgyGNB7W4/7W72/sR13Ayh4+PfrHQL0bVsRJaG3h1yoNIc8wYp/8PhQIy6CWc5N3NVwPlwuKC4bRkNTTfLAhUNvVQE4S+rzFRX0qnyiC+w56AGRPZqs9G8Z/9/YzZkHRFoBIKeSui8zrZJCTsxcVtMz7qPXh8JR5jFg8ySSIwzyr6TkSfgbKn4YoD1g2A9isqrHyOStSjSmW9aZ+sIPMs0yZEr9TFpydIGVYQtKUXKDtvAqN+53Fj6ue9/AI8iVuuK1jbPD8szPfLBhiEqmdmBRNcti6JQbZBMgC1eDnmaWL1XZG0Dz/UCXvhT0cNLqCkXxrxBZzDQQe5Q4PM5IrcE8zlrBs8spnAMhbdlsNni+Z7em0QBFsetrv3OAh9vzZvAuUmbO1nku0x39HosIAzvR+272ucp+qWJam8Y/gTk7s829pmObdEq9IfBDSo0vgthhyS4JF/mQvTojYLdRGvJJxRyB37egSGd6ZVze2EuP0W2+EWI1OLSscrFDErEw0dOV52bdPjLXUQY7Z3LPIgL+GTB+jHns+QhMmUARmGJIEAwnMN1DQe0LyWEreVkIlQjRUT o0Q69ydF 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Since we are about to stash some more information into the pp_magic field, let's move the magic signature checks into a pair of helper functions so it can be changed in one place. Reviewed-by: Mina Almasry Tested-by: Yonglong Liu Signed-off-by: Toke Høiland-Jørgensen --- drivers/net/ethernet/mellanox/mlx5/core/en/xdp.c | 4 ++-- include/net/page_pool/types.h | 18 ++++++++++++++++++ mm/page_alloc.c | 9 +++------ net/core/netmem_priv.h | 5 +++++ net/core/skbuff.c | 16 ++-------------- net/core/xdp.c | 4 ++-- 6 files changed, 32 insertions(+), 24 deletions(-) diff --git a/drivers/net/ethernet/mellanox/mlx5/core/en/xdp.c b/drivers/net/ethernet/mellanox/mlx5/core/en/xdp.c index 6f3094a479e1ec61854bb48a6a0c812167487173..70c6f0b2abb921778c98fbd428594ebd7986a302 100644 --- a/drivers/net/ethernet/mellanox/mlx5/core/en/xdp.c +++ b/drivers/net/ethernet/mellanox/mlx5/core/en/xdp.c @@ -706,8 +706,8 @@ static void mlx5e_free_xdpsq_desc(struct mlx5e_xdpsq *sq, xdpi = mlx5e_xdpi_fifo_pop(xdpi_fifo); page = xdpi.page.page; - /* No need to check ((page->pp_magic & ~0x3UL) == PP_SIGNATURE) - * as we know this is a page_pool page. + /* No need to check page_pool_page_is_pp() as we + * know this is a page_pool page. */ page_pool_recycle_direct(page->pp, page); } while (++n < num); diff --git a/include/net/page_pool/types.h b/include/net/page_pool/types.h index 36eb57d73abc6cfc601e700ca08be20fb8281055..df0d3c1608929605224feb26173135ff37951ef8 100644 --- a/include/net/page_pool/types.h +++ b/include/net/page_pool/types.h @@ -54,6 +54,14 @@ struct pp_alloc_cache { netmem_ref cache[PP_ALLOC_CACHE_SIZE]; }; +/* Mask used for checking in page_pool_page_is_pp() below. page->pp_magic is + * OR'ed with PP_SIGNATURE after the allocation in order to preserve bit 0 for + * the head page of compound page and bit 1 for pfmemalloc page. + * page_is_pfmemalloc() is checked in __page_pool_put_page() to avoid recycling + * the pfmemalloc page. + */ +#define PP_MAGIC_MASK ~0x3UL + /** * struct page_pool_params - page pool parameters * @fast: params accessed frequently on hotpath @@ -264,6 +272,11 @@ void page_pool_destroy(struct page_pool *pool); void page_pool_use_xdp_mem(struct page_pool *pool, void (*disconnect)(void *), const struct xdp_mem_info *mem); void page_pool_put_netmem_bulk(netmem_ref *data, u32 count); + +static inline bool page_pool_page_is_pp(struct page *page) +{ + return (page->pp_magic & PP_MAGIC_MASK) == PP_SIGNATURE; +} #else static inline void page_pool_destroy(struct page_pool *pool) { @@ -278,6 +291,11 @@ static inline void page_pool_use_xdp_mem(struct page_pool *pool, static inline void page_pool_put_netmem_bulk(netmem_ref *data, u32 count) { } + +static inline bool page_pool_page_is_pp(struct page *page) +{ + return false; +} #endif void page_pool_put_unrefed_netmem(struct page_pool *pool, netmem_ref netmem, diff --git a/mm/page_alloc.c b/mm/page_alloc.c index 542d25f77be80304b731411ffd29b276ee13be0c..3535ee76afe946cbb042ecbce603bdbedc9233b9 100644 --- a/mm/page_alloc.c +++ b/mm/page_alloc.c @@ -55,6 +55,7 @@ #include #include #include +#include #include #include "internal.h" #include "shuffle.h" @@ -872,9 +873,7 @@ static inline bool page_expected_state(struct page *page, #ifdef CONFIG_MEMCG page->memcg_data | #endif -#ifdef CONFIG_PAGE_POOL - ((page->pp_magic & ~0x3UL) == PP_SIGNATURE) | -#endif + page_pool_page_is_pp(page) | (page->flags & check_flags))) return false; @@ -901,10 +900,8 @@ static const char *page_bad_reason(struct page *page, unsigned long flags) if (unlikely(page->memcg_data)) bad_reason = "page still charged to cgroup"; #endif -#ifdef CONFIG_PAGE_POOL - if (unlikely((page->pp_magic & ~0x3UL) == PP_SIGNATURE)) + if (unlikely(page_pool_page_is_pp(page))) bad_reason = "page_pool leak"; -#endif return bad_reason; } diff --git a/net/core/netmem_priv.h b/net/core/netmem_priv.h index 7eadb8393e002fd1cc2cef8a313d2ea7df76f301..f33162fd281c23e109273ba09950c5d0a2829bc9 100644 --- a/net/core/netmem_priv.h +++ b/net/core/netmem_priv.h @@ -18,6 +18,11 @@ static inline void netmem_clear_pp_magic(netmem_ref netmem) __netmem_clear_lsb(netmem)->pp_magic = 0; } +static inline bool netmem_is_pp(netmem_ref netmem) +{ + return (netmem_get_pp_magic(netmem) & PP_MAGIC_MASK) == PP_SIGNATURE; +} + static inline void netmem_set_pp(netmem_ref netmem, struct page_pool *pool) { __netmem_clear_lsb(netmem)->pp = pool; diff --git a/net/core/skbuff.c b/net/core/skbuff.c index ab8acb737b93299f503e5c298b87e18edd59d555..a64d777488e403d5fdef83ae42ae9e4924c1a0dc 100644 --- a/net/core/skbuff.c +++ b/net/core/skbuff.c @@ -893,11 +893,6 @@ static void skb_clone_fraglist(struct sk_buff *skb) skb_get(list); } -static bool is_pp_netmem(netmem_ref netmem) -{ - return (netmem_get_pp_magic(netmem) & ~0x3UL) == PP_SIGNATURE; -} - int skb_pp_cow_data(struct page_pool *pool, struct sk_buff **pskb, unsigned int headroom) { @@ -995,14 +990,7 @@ bool napi_pp_put_page(netmem_ref netmem) { netmem = netmem_compound_head(netmem); - /* page->pp_magic is OR'ed with PP_SIGNATURE after the allocation - * in order to preserve any existing bits, such as bit 0 for the - * head page of compound page and bit 1 for pfmemalloc page, so - * mask those bits for freeing side when doing below checking, - * and page_is_pfmemalloc() is checked in __page_pool_put_page() - * to avoid recycling the pfmemalloc page. - */ - if (unlikely(!is_pp_netmem(netmem))) + if (unlikely(!netmem_is_pp(netmem))) return false; page_pool_put_full_netmem(netmem_get_pp(netmem), netmem, false); @@ -1042,7 +1030,7 @@ static int skb_pp_frag_ref(struct sk_buff *skb) for (i = 0; i < shinfo->nr_frags; i++) { head_netmem = netmem_compound_head(shinfo->frags[i].netmem); - if (likely(is_pp_netmem(head_netmem))) + if (likely(netmem_is_pp(head_netmem))) page_pool_ref_netmem(head_netmem); else page_ref_inc(netmem_to_page(head_netmem)); diff --git a/net/core/xdp.c b/net/core/xdp.c index f86eedad586a77eb63a96a85aa6d068d3e94f077..0ba73943c6eed873b3d1c681b3b9a802b590f2d9 100644 --- a/net/core/xdp.c +++ b/net/core/xdp.c @@ -437,8 +437,8 @@ void __xdp_return(netmem_ref netmem, enum xdp_mem_type mem_type, netmem = netmem_compound_head(netmem); if (napi_direct && xdp_return_frame_no_direct()) napi_direct = false; - /* No need to check ((page->pp_magic & ~0x3UL) == PP_SIGNATURE) - * as mem->type knows this a page_pool page + /* No need to check netmem_is_pp() as mem->type knows this a + * page_pool page */ page_pool_put_full_netmem(netmem_get_pp(netmem), netmem, napi_direct); From patchwork Tue Mar 25 15:45:43 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Toke_H=C3=B8iland-J=C3=B8rgensen?= X-Patchwork-Id: 14029159 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 12D21C35FFC for ; Tue, 25 Mar 2025 15:46:52 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 9F07D280015; Tue, 25 Mar 2025 11:46:45 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 7B43D280007; Tue, 25 Mar 2025 11:46:45 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 5B111280007; Tue, 25 Mar 2025 11:46:45 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 0D129280020 for ; Tue, 25 Mar 2025 11:46:45 -0400 (EDT) Received: from smtpin06.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id 3E959576BA for ; Tue, 25 Mar 2025 15:46:46 +0000 (UTC) X-FDA: 83260501212.06.724EB27 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by imf20.hostedemail.com (Postfix) with ESMTP id ADC4B1C0018 for ; Tue, 25 Mar 2025 15:46:43 +0000 (UTC) Authentication-Results: imf20.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b="BsBaq/Hr"; spf=pass (imf20.hostedemail.com: domain of toke@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=toke@redhat.com; dmarc=pass (policy=quarantine) header.from=redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1742917603; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=7qelpf0cr1Bxyx5yCbHo7HXz9cxxZ6ghzCl2hi3M+JE=; b=4iQZC4SCUMj4s23ciBV9vD2SxWdIt+IZzDjC+dMAgBLrth3u7A+KDKHzejw4rRaAVA0Ngv RYwe2Yvvki8DiMcQjVwu0Socvavf0EeEewvcQggMJ1+m9GxtDeZC0I+g4ufvRLTWEwFs2/ JbsqNHlMhz5Wh2rFmysr+Nb3F7cGXhM= ARC-Authentication-Results: i=1; imf20.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b="BsBaq/Hr"; spf=pass (imf20.hostedemail.com: domain of toke@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=toke@redhat.com; dmarc=pass (policy=quarantine) header.from=redhat.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1742917603; a=rsa-sha256; cv=none; b=J/V/f/X8xXKCfa3MZeewMq52piiqJoFfb3sJ4MZrtJKBpa4sKxdLDUn2umYuo5p/VI7ooJ nXITP4IRluakoEFHQq1m/Y2N3CVfHp2u1hXoxUkWRhqd1TmGVUVxOZ2ndY27zZ3JY1nBdR QRD4/PMPGEllSnEcS4BF42VD8gaeYpk= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1742917603; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=7qelpf0cr1Bxyx5yCbHo7HXz9cxxZ6ghzCl2hi3M+JE=; b=BsBaq/HrHAP/NHNgkrEAlTtpi3PXxI/qkriefpEZCNsFA1sSbSQcGaEuQIes0Nuzt/YvIL 01rrqB5w62M/86cr7fzCyZ39pzWE/lLNh7gqFY8DMEsuv6RAtf71UlLMONh7T6Gmn0qLE7 J17EtiDzzo6N54mwHANNJsXRIWIhEnA= Received: from mail-ej1-f72.google.com (mail-ej1-f72.google.com [209.85.218.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-413-Hqi6YHqwPu69piBSm-8Vtw-1; Tue, 25 Mar 2025 11:46:41 -0400 X-MC-Unique: Hqi6YHqwPu69piBSm-8Vtw-1 X-Mimecast-MFC-AGG-ID: Hqi6YHqwPu69piBSm-8Vtw_1742917600 Received: by mail-ej1-f72.google.com with SMTP id a640c23a62f3a-ac27f00a8a5so443547066b.3 for ; Tue, 25 Mar 2025 08:46:41 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1742917600; x=1743522400; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=7qelpf0cr1Bxyx5yCbHo7HXz9cxxZ6ghzCl2hi3M+JE=; b=PTd2wByq8myXkcFtVK5Ev7a9w2WhIyExhUZm6hjim37LDjQp+sTqUJB9gWPGhHgRyz mwOAyxSghy5Oz6/C3BQjLPhhCtUTkj9fgeuF+nNYjlK+BTY9hQAJQn6u/UHHiPuj1pl+ WJFef4EANa6cTT8ZqsWPxAu1z/4bvb9cUaSzS5aQhosiQQ47tfuYa9SW3bIfzX9gaXdl cBlQI+SRLPNMbGceHwIC84grSYmO9OkOwvwQMhx42HRSJnEASKWuAcCedHY/RJbKEnb/ M88pmCUzYWpC2R1hg/kREftNO/KOreJn/ZZI4Bj7HL5u4k3sHNu540TbKcr0pyVvFAP9 C2LQ== X-Forwarded-Encrypted: i=1; AJvYcCURktUgid46/3xfxU9QgEByf97GGENqFQA4/Cj3wFx8SVl9nFOU9ut2goF/JlZNhZsUwg6DzXWh6Q==@kvack.org X-Gm-Message-State: AOJu0YwGIWtnE1aefFU8hYqCPsxbtd9yUqMt9si5ErJXptD5rQVW2sfy 66UefqPTSnGBG5sIzD3mYIH1sT0Ih8B8q5z6y8ihc3HgRVyo1wLveX+SvVtY6EbW9IyxRGb/gK9 3+AdBEmoao5eoe5VsyKwb+7WXJxBMVSr1LVjuaLURZNkoF7yt X-Gm-Gg: ASbGnctcyDTP+Ly0zwV7BMqb+3xFqsVCmVqZyW9j/UhZQhD3eqgFTe/IXbpxKsSnfdP 4LRipO41w1Ml7lKsmWVbXdINBjDSlov3sRcYhWL/AEfguFRnlgOjDXUEsPHrpRJeNuDDBrA9mJ6 ylv+Vhe1QIA6+cbrZc94+g2nJG/5S9MnZoCURU99PJZ9Hn2BE0q9DayCnN+faanGMfyAkyGK8+Q cpwbuWVesSaZnEK8G5gZy7Vqk3JynXMTqgvrfCcyz6vY1hvEm+RdayEQte/lmKZgSeJ0BhrWJr2 LbJ36tEhJfUDhiOHr4mNgKuLGsKjhvlRomYPKbqO X-Received: by 2002:a17:906:c109:b0:ac6:cea2:6c7 with SMTP id a640c23a62f3a-ac6cea2122dmr209870366b.42.1742917600056; Tue, 25 Mar 2025 08:46:40 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGOdJXWY+OX6Pisfk0vOr5e4GyVLnFPg79bwnTUB2L/Or27l1la/vuNBO9tmBFaSgYvASXEiA== X-Received: by 2002:a17:906:c109:b0:ac6:cea2:6c7 with SMTP id a640c23a62f3a-ac6cea2122dmr209865166b.42.1742917599597; Tue, 25 Mar 2025 08:46:39 -0700 (PDT) Received: from alrua-x1.borgediget.toke.dk ([45.145.92.2]) by smtp.gmail.com with ESMTPSA id a640c23a62f3a-ac3ef8675a9sm876497966b.28.2025.03.25.08.46.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 25 Mar 2025 08:46:38 -0700 (PDT) Received: by alrua-x1.borgediget.toke.dk (Postfix, from userid 1000) id C8DC518FC8BA; Tue, 25 Mar 2025 16:46:36 +0100 (CET) From: =?utf-8?q?Toke_H=C3=B8iland-J=C3=B8rgensen?= Date: Tue, 25 Mar 2025 16:45:43 +0100 Subject: [PATCH net-next v2 2/3] page_pool: Turn dma_sync and dma_sync_cpu fields into a bitmap MIME-Version: 1.0 Message-Id: <20250325-page-pool-track-dma-v2-2-113ebc1946f3@redhat.com> References: <20250325-page-pool-track-dma-v2-0-113ebc1946f3@redhat.com> In-Reply-To: <20250325-page-pool-track-dma-v2-0-113ebc1946f3@redhat.com> To: "David S. Miller" , Jakub Kicinski , Jesper Dangaard Brouer , Saeed Mahameed , Leon Romanovsky , Tariq Toukan , Andrew Lunn , Eric Dumazet , Paolo Abeni , Ilias Apalodimas , Simon Horman , Andrew Morton , Mina Almasry , Yonglong Liu , Yunsheng Lin , Pavel Begunkov , Matthew Wilcox Cc: netdev@vger.kernel.org, bpf@vger.kernel.org, linux-rdma@vger.kernel.org, linux-mm@kvack.org, =?utf-8?q?Toke_H=C3=B8iland-J=C3=B8rgensen?= X-Mailer: b4 0.14.2 X-Mimecast-Spam-Score: 0 X-Mimecast-MFC-PROC-ID: C0E7b_-TI-uPJIhM6pJ_GT9My31hjhrp1jH7ER6N4_c_1742917600 X-Mimecast-Originator: redhat.com X-Rspamd-Queue-Id: ADC4B1C0018 X-Stat-Signature: wmht7gmakmhgceowywzsgsb41nbhsurw X-Rspam-User: X-Rspamd-Server: rspam12 X-HE-Tag: 1742917603-692530 X-HE-Meta: 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 jz/r/ji3 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Change the single-bit booleans for dma_sync into an unsigned long with BIT() definitions so that a subsequent patch can write them both with a singe WRITE_ONCE() on teardown. Also move the check for the sync_cpu side into __page_pool_dma_sync_for_cpu() so it can be disabled for non-netmem providers as well. Reviewed-by: Mina Almasry Tested-by: Yonglong Liu Signed-off-by: Toke Høiland-Jørgensen --- include/net/page_pool/helpers.h | 6 +++--- include/net/page_pool/types.h | 8 ++++++-- net/core/devmem.c | 3 +-- net/core/page_pool.c | 9 +++++---- 4 files changed, 15 insertions(+), 11 deletions(-) diff --git a/include/net/page_pool/helpers.h b/include/net/page_pool/helpers.h index 582a3d00cbe2315edeb92850b6a42ab21e509e45..7ed32bde4b8944deb7fb22e291e95b8487be681a 100644 --- a/include/net/page_pool/helpers.h +++ b/include/net/page_pool/helpers.h @@ -443,6 +443,9 @@ static inline void __page_pool_dma_sync_for_cpu(const struct page_pool *pool, const dma_addr_t dma_addr, u32 offset, u32 dma_sync_size) { + if (!(READ_ONCE(pool->dma_sync) & PP_DMA_SYNC_CPU)) + return; + dma_sync_single_range_for_cpu(pool->p.dev, dma_addr, offset + pool->p.offset, dma_sync_size, page_pool_get_dma_dir(pool)); @@ -473,9 +476,6 @@ page_pool_dma_sync_netmem_for_cpu(const struct page_pool *pool, const netmem_ref netmem, u32 offset, u32 dma_sync_size) { - if (!pool->dma_sync_for_cpu) - return; - __page_pool_dma_sync_for_cpu(pool, page_pool_get_dma_addr_netmem(netmem), offset, dma_sync_size); diff --git a/include/net/page_pool/types.h b/include/net/page_pool/types.h index df0d3c1608929605224feb26173135ff37951ef8..fbe34024b20061e8bcd1d4474f6ebfc70992f1eb 100644 --- a/include/net/page_pool/types.h +++ b/include/net/page_pool/types.h @@ -33,6 +33,10 @@ #define PP_FLAG_ALL (PP_FLAG_DMA_MAP | PP_FLAG_DMA_SYNC_DEV | \ PP_FLAG_SYSTEM_POOL | PP_FLAG_ALLOW_UNREADABLE_NETMEM) +/* bit values used in pp->dma_sync */ +#define PP_DMA_SYNC_DEV BIT(0) +#define PP_DMA_SYNC_CPU BIT(1) + /* * Fast allocation side cache array/stack * @@ -175,12 +179,12 @@ struct page_pool { bool has_init_callback:1; /* slow::init_callback is set */ bool dma_map:1; /* Perform DMA mapping */ - bool dma_sync:1; /* Perform DMA sync for device */ - bool dma_sync_for_cpu:1; /* Perform DMA sync for cpu */ #ifdef CONFIG_PAGE_POOL_STATS bool system:1; /* This is a global percpu pool */ #endif + unsigned long dma_sync; + __cacheline_group_begin_aligned(frag, PAGE_POOL_FRAG_GROUP_ALIGN); long frag_users; netmem_ref frag_page; diff --git a/net/core/devmem.c b/net/core/devmem.c index 6802e82a4d03b6030f6df50ae3661f81e40bc101..955d392d707b12fe784747aa2040ce1a882a64db 100644 --- a/net/core/devmem.c +++ b/net/core/devmem.c @@ -340,8 +340,7 @@ int mp_dmabuf_devmem_init(struct page_pool *pool) /* dma-buf dma addresses do not need and should not be used with * dma_sync_for_cpu/device. Force disable dma_sync. */ - pool->dma_sync = false; - pool->dma_sync_for_cpu = false; + pool->dma_sync = 0; if (pool->p.order != 0) return -E2BIG; diff --git a/net/core/page_pool.c b/net/core/page_pool.c index acef1fcd8ddcfd1853a6f2055c1f1820ab248e8d..d51ca4389dd62d8bc266a9a2b792838257173535 100644 --- a/net/core/page_pool.c +++ b/net/core/page_pool.c @@ -203,7 +203,7 @@ static int page_pool_init(struct page_pool *pool, memcpy(&pool->slow, ¶ms->slow, sizeof(pool->slow)); pool->cpuid = cpuid; - pool->dma_sync_for_cpu = true; + pool->dma_sync = PP_DMA_SYNC_CPU; /* Validate only known flags were used */ if (pool->slow.flags & ~PP_FLAG_ALL) @@ -238,7 +238,7 @@ static int page_pool_init(struct page_pool *pool, if (!pool->p.max_len) return -EINVAL; - pool->dma_sync = true; + pool->dma_sync |= PP_DMA_SYNC_DEV; /* pool->p.offset has to be set according to the address * offset used by the DMA engine to start copying rx data @@ -291,7 +291,7 @@ static int page_pool_init(struct page_pool *pool, } if (pool->mp_ops) { - if (!pool->dma_map || !pool->dma_sync) + if (!pool->dma_map || !(pool->dma_sync & PP_DMA_SYNC_DEV)) return -EOPNOTSUPP; if (WARN_ON(!is_kernel_rodata((unsigned long)pool->mp_ops))) { @@ -466,7 +466,8 @@ page_pool_dma_sync_for_device(const struct page_pool *pool, netmem_ref netmem, u32 dma_sync_size) { - if (pool->dma_sync && dma_dev_need_sync(pool->p.dev)) + if ((READ_ONCE(pool->dma_sync) & PP_DMA_SYNC_DEV) && + dma_dev_need_sync(pool->p.dev)) __page_pool_dma_sync_for_device(pool, netmem, dma_sync_size); } From patchwork Tue Mar 25 15:45:44 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Toke_H=C3=B8iland-J=C3=B8rgensen?= X-Patchwork-Id: 14029158 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id B0180C3600C for ; Tue, 25 Mar 2025 15:46:49 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 67879280020; Tue, 25 Mar 2025 11:46:45 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 600B0280015; Tue, 25 Mar 2025 11:46:45 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 00D57280015; Tue, 25 Mar 2025 11:46:44 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id C818828000C for ; Tue, 25 Mar 2025 11:46:44 -0400 (EDT) Received: from smtpin02.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 47491C08F7 for ; Tue, 25 Mar 2025 15:46:46 +0000 (UTC) X-FDA: 83260501212.02.B150E22 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by imf25.hostedemail.com (Postfix) with ESMTP id 7EE29A0021 for ; Tue, 25 Mar 2025 15:46:43 +0000 (UTC) Authentication-Results: imf25.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=YKoGYZj7; spf=pass (imf25.hostedemail.com: domain of toke@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=toke@redhat.com; dmarc=pass (policy=quarantine) header.from=redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1742917603; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=4cL2Je5/zKhjyTSWfDJw6WZ2ATPKBCK/7bYtweLz2WU=; b=zB9ZQ05Pfse0vct4TyvAX8zkxqokeB5llm9VjnDRins/yjTm0hkrNakx2QkWWbRUNpU0Fe t70xi8r9zYuJeK7TykNIFHT5TlEfVbVXFqAVOi8Qi04xD1RAkTPEUxVSPOBNNe2epznaXO gbvrWtg5lkA2o6BcK6lMvyGmgPyTQUM= ARC-Authentication-Results: i=1; imf25.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=YKoGYZj7; spf=pass (imf25.hostedemail.com: domain of toke@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=toke@redhat.com; dmarc=pass (policy=quarantine) header.from=redhat.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1742917603; a=rsa-sha256; cv=none; b=6uD7Wu3UlO7i2EtwFTK9skfXaUroJwFrDGVFv/Ep1qjqtEVolAZ1JIvUMqdNCrltyLD5wp +DFWusCeWMz9UihCOPCxyfgckaNs/sUVwwKgMfMEwyTupSW4Q2OWEBYBb29E2ya8HFC1M4 z8btR+UJXYbR5fmWDs/duDVgzsZvNQk= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1742917602; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=4cL2Je5/zKhjyTSWfDJw6WZ2ATPKBCK/7bYtweLz2WU=; b=YKoGYZj7NA8h2v7onvM9zReD4mjtI2DMwQYRiAbHK6tVHrt54X9BPpT/ZOOjbmR7HuuxvO 6eZMGMpWAwMm6GnKLHE8GxbqFQ0/PVCZ3uYEEvfOBTnt/+Ab5tTfJr8toguwqLc5IAJtJ0 ctVGt4njFH3pCF41dMzU2oLtpyV5cHk= Received: from mail-ej1-f71.google.com (mail-ej1-f71.google.com [209.85.218.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-383-AZl0BM72MeSCf9Qt2A1Fcw-1; Tue, 25 Mar 2025 11:46:41 -0400 X-MC-Unique: AZl0BM72MeSCf9Qt2A1Fcw-1 X-Mimecast-MFC-AGG-ID: AZl0BM72MeSCf9Qt2A1Fcw_1742917600 Received: by mail-ej1-f71.google.com with SMTP id a640c23a62f3a-ac28a2c7c48so551399566b.3 for ; Tue, 25 Mar 2025 08:46:41 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1742917600; x=1743522400; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=4cL2Je5/zKhjyTSWfDJw6WZ2ATPKBCK/7bYtweLz2WU=; b=pJmvmWQ1BP3Md7hWZIchXpv/j0XHVri2zHJaLTeiCtKZbCXeSXP990qPu1LSVDftAz jdZDRVVkqrHUlIbcVUJTYc1OzSyb5hgr07aDwINRSE2ex57PkJjeJeL7MOWJMXrOEWpf 6G+3cRL3z3oS+Ywgq5J9zVl2dOBDDy7fojs9fZ96vDSmDWVjIaCuOVL7pe5y7nmqFx8T yftIuhQIyLHaV07OBMs7Kl0deodudIbKl7rsN667qWelsI3aDExRF8y69OQH3QGdL5ju fu2ITOh4PAHLAofhVcmC5o4tEJf7ZYc0rLF0KccwuCHQlMbpuEreJL2at9r2p3p0oBJP IQuA== X-Forwarded-Encrypted: i=1; AJvYcCVjlHLefm1Pozl+STDUzXIJfMzHgeK+7EnHIn4abf4Z0hx6udI1bqO/q7KfNfWF1uu/WDb+qrAQSw==@kvack.org X-Gm-Message-State: AOJu0YyKJfyOxQO4vXitV//9Mxvo+Tw+NzsLIa+dA9rCfq1nORdCvhZf wyzWfBUff1MgeMoUR/N2DGZDhojt0fywsBn1UF/7NZGBO0e9p2lcNlMsepmBvyneQgSKLdCWDJM HP4FKlcJr1zRmYk6bKNHcu4WyZAQUP5xqmQQk0EkIaff+CCbr X-Gm-Gg: ASbGnctsDkFSoOJK+qEso/7xcKjH3JZ/Y7zXsriHWpxLZnxd/1uIj1Of0hYX4tp1gJF xr16iLtwHFO/aw0lNJim88uNB4zw2EHD7LdTj8rP2V0UN1EdSjbSkTSnKixPMvtQMKZmKpZL327 YNncaKlsO4/zzwWr5VuPvBTLjAqsqLlGEwxXsWdpCyUEGHyLAsP3Vv+v9r/ZlmH1TiVNTqtNXVM lFBdYFPoOR4efv0OKPaE1RrfJOIwo9su5+SLA6GjfbmPqExmtI6BU9k9xq0au5FhTbaMEnIcayZ /TSIzNzlpC6Lc8DVMLY+rV6Sw7dVHWt/EdmZrQuU X-Received: by 2002:a17:907:da0:b0:abf:6cc9:7ef2 with SMTP id a640c23a62f3a-ac3f24d5d6bmr1846863566b.42.1742917599654; Tue, 25 Mar 2025 08:46:39 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGloroThWQzK+IvD2vQc5+hsionAhTB7nO8WVzYnb0VAdJyRU/u3lgC0MeEV5Lcl0vC/iNyug== X-Received: by 2002:a17:907:da0:b0:abf:6cc9:7ef2 with SMTP id a640c23a62f3a-ac3f24d5d6bmr1846860466b.42.1742917599026; Tue, 25 Mar 2025 08:46:39 -0700 (PDT) Received: from alrua-x1.borgediget.toke.dk ([45.145.92.2]) by smtp.gmail.com with ESMTPSA id a640c23a62f3a-ac3ef8d3f0csm870430666b.71.2025.03.25.08.46.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 25 Mar 2025 08:46:38 -0700 (PDT) Received: by alrua-x1.borgediget.toke.dk (Postfix, from userid 1000) id CB19B18FC8BC; Tue, 25 Mar 2025 16:46:36 +0100 (CET) From: =?utf-8?q?Toke_H=C3=B8iland-J=C3=B8rgensen?= Date: Tue, 25 Mar 2025 16:45:44 +0100 Subject: [PATCH net-next v2 3/3] page_pool: Track DMA-mapped pages and unmap them when destroying the pool MIME-Version: 1.0 Message-Id: <20250325-page-pool-track-dma-v2-3-113ebc1946f3@redhat.com> References: <20250325-page-pool-track-dma-v2-0-113ebc1946f3@redhat.com> In-Reply-To: <20250325-page-pool-track-dma-v2-0-113ebc1946f3@redhat.com> To: "David S. Miller" , Jakub Kicinski , Jesper Dangaard Brouer , Saeed Mahameed , Leon Romanovsky , Tariq Toukan , Andrew Lunn , Eric Dumazet , Paolo Abeni , Ilias Apalodimas , Simon Horman , Andrew Morton , Mina Almasry , Yonglong Liu , Yunsheng Lin , Pavel Begunkov , Matthew Wilcox Cc: netdev@vger.kernel.org, bpf@vger.kernel.org, linux-rdma@vger.kernel.org, linux-mm@kvack.org, =?utf-8?q?Toke_H=C3=B8iland-J=C3=B8rgensen?= , Qiuling Ren , Yuying Ma X-Mailer: b4 0.14.2 X-Mimecast-Spam-Score: 0 X-Mimecast-MFC-PROC-ID: xNGZ5dhXFQUw_YmqxqkJ3IjC5179srpR997RNuna4WY_1742917600 X-Mimecast-Originator: redhat.com X-Rspamd-Queue-Id: 7EE29A0021 X-Rspam-User: X-Rspamd-Server: rspam02 X-Stat-Signature: 4btiztwgypoy66tzwb4afd86wefo3f98 X-HE-Tag: 1742917603-23483 X-HE-Meta: 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 XQi4IfkE tR55aGPALskP2O5fnhdIoyKka9HLfQJdU9KelF8KBFl4MGWq4got4OePdIvXGdDmPfGnKoBmO6UVKTrPJH0fAYJ2hPS2V9LiOKodr2+Abi+oGA7NxOZ5FO0fPaztSXhWA67uXcJ+LMfEqGobuV6XWvIyulSEGyH01QEe/7fUIH0J6h4sbrrHpNMmYE9VjylDGXcViZjzy5SoOU/cdRkzN/bdSGxFa5NVsFRKm0QEx7lfcwCI7v6SrJn48tUz9Zhlb636/YM4kwPBZkfbgU36/0IVP4hQ4JYp9KAh+0YCfOolQkKfnoD6dUL8stzaI+F/9sVpXMtL+xKE/DYG2DoE1HBZ3vBEcEyLhVpw5GZxOKpUdtDB5S44gfoqgAiD6tHAEyON8VZYbDlCtjmN5MSdAxE02s3L4/RwKs7sVfmaYyqHYmNeAAvg7zsN2KvhFd8Ny4/WpD+atIXI/GRf9sgbHIiyz1nw3e4c+PevK9tUsugZAnYAgYJdPA0pnM8g/lT4cpGN7lTlgqqE8hGl/JxY6aB0Sy8aj9BiBaUEJ6oKdNEAUC56LNg9J1MALUjufMMM5YCz6XBHKOl8f9/nNjBlRBexQdmlt7o6qdK6Xgi+NOAL4KtO8RZwYwCdaDnwvhmLxePqZm3KRh5narnY1/8VbuQBd9lZNcKNW2pLdQU/WkmvCuElaciPByFPv2AEmTtISPWcu X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: When enabling DMA mapping in page_pool, pages are kept DMA mapped until they are released from the pool, to avoid the overhead of re-mapping the pages every time they are used. This causes resource leaks and/or crashes when there are pages still outstanding while the device is torn down, because page_pool will attempt an unmap through a non-existent DMA device on the subsequent page return. To fix this, implement a simple tracking of outstanding DMA-mapped pages in page pool using an xarray. This was first suggested by Mina[0], and turns out to be fairly straight forward: We simply store pointers to pages directly in the xarray with xa_alloc() when they are first DMA mapped, and remove them from the array on unmap. Then, when a page pool is torn down, it can simply walk the xarray and unmap all pages still present there before returning, which also allows us to get rid of the get/put_device() calls in page_pool. Using xa_cmpxchg(), no additional synchronisation is needed, as a page will only ever be unmapped once. To avoid having to walk the entire xarray on unmap to find the page reference, we stash the ID assigned by xa_alloc() into the page structure itself, using the upper bits of the pp_magic field. This requires a couple of defines to avoid conflicting with the POINTER_POISON_DELTA define, but this is all evaluated at compile-time, so does not affect run-time performance. The bitmap calculations in this patch gives the following number of bits for different architectures: - 23 bits on 32-bit architectures - 21 bits on PPC64 (because of the definition of ILLEGAL_POINTER_VALUE) - 32 bits on other 64-bit architectures Stashing a value into the unused bits of pp_magic does have the effect that it can make the value stored there lie outside the unmappable range (as governed by the mmap_min_addr sysctl), for architectures that don't define ILLEGAL_POINTER_VALUE. This means that if one of the pointers that is aliased to the pp_magic field (such as page->lru.next) is dereferenced while the page is owned by page_pool, that could lead to a dereference into userspace, which is a security concern. The risk of this is mitigated by the fact that (a) we always clear pp_magic before releasing a page from page_pool, and (b) this would need a use-after-free bug for struct page, which can have many other risks since page->lru.next is used as a generic list pointer in multiple places in the kernel. As such, with this patch we take the position that this risk is negligible in practice. For more discussion, see[1]. Since all the tracking added in this patch is performed on DMA map/unmap, no additional code is needed in the fast path, meaning the performance overhead of this tracking is negligible there. A micro-benchmark shows that the total overhead of the tracking itself is about 400 ns (39 cycles(tsc) 395.218 ns; sum for both map and unmap[2]). Since this cost is only paid on DMA map and unmap, it seems like an acceptable cost to fix the late unmap issue. Further optimisation can narrow the cases where this cost is paid (for instance by eliding the tracking when DMA map/unmap is a no-op). The extra memory needed to track the pages is neatly encapsulated inside xarray, which uses the 'struct xa_node' structure to track items. This structure is 576 bytes long, with slots for 64 items, meaning that a full node occurs only 9 bytes of overhead per slot it tracks (in practice, it probably won't be this efficient, but in any case it should be an acceptable overhead). [0] https://lore.kernel.org/all/CAHS8izPg7B5DwKfSuzz-iOop_YRbk3Sd6Y4rX7KBG9DcVJcyWg@mail.gmail.com/ [1] https://lore.kernel.org/r/20250320023202.GA25514@openwall.com [2] https://lore.kernel.org/r/ae07144c-9295-4c9d-a400-153bb689fe9e@huawei.com Reported-by: Yonglong Liu Closes: https://lore.kernel.org/r/8743264a-9700-4227-a556-5f931c720211@huawei.com Fixes: ff7d6b27f894 ("page_pool: refurbish version of page_pool code") Suggested-by: Mina Almasry Reviewed-by: Mina Almasry Reviewed-by: Jesper Dangaard Brouer Tested-by: Jesper Dangaard Brouer Tested-by: Qiuling Ren Tested-by: Yuying Ma Tested-by: Yonglong Liu Signed-off-by: Toke Høiland-Jørgensen Acked-by: Jesper Dangaard Brouer --- include/linux/poison.h | 4 +++ include/net/page_pool/types.h | 49 +++++++++++++++++++++++--- net/core/netmem_priv.h | 28 ++++++++++++++- net/core/page_pool.c | 82 ++++++++++++++++++++++++++++++++++++------- 4 files changed, 145 insertions(+), 18 deletions(-) diff --git a/include/linux/poison.h b/include/linux/poison.h index 331a9a996fa8746626afa63ea462b85ca3e5938b..5351efd710d5e21cc341f7bb533b1aeea4a0808a 100644 --- a/include/linux/poison.h +++ b/include/linux/poison.h @@ -70,6 +70,10 @@ #define KEY_DESTROY 0xbd /********** net/core/page_pool.c **********/ +/* + * page_pool uses additional free bits within this value to store data, see the + * definition of PP_DMA_INDEX_MASK in include/net/page_pool/types.h + */ #define PP_SIGNATURE (0x40 + POISON_POINTER_DELTA) /********** net/core/skbuff.c **********/ diff --git a/include/net/page_pool/types.h b/include/net/page_pool/types.h index fbe34024b20061e8bcd1d4474f6ebfc70992f1eb..8f9ed92a4b2af6c136406c41b1a829c8e52ba3e2 100644 --- a/include/net/page_pool/types.h +++ b/include/net/page_pool/types.h @@ -6,6 +6,7 @@ #include #include #include +#include #include #define PP_FLAG_DMA_MAP BIT(0) /* Should page_pool do the DMA @@ -58,13 +59,51 @@ struct pp_alloc_cache { netmem_ref cache[PP_ALLOC_CACHE_SIZE]; }; +/* + * DMA mapping IDs + * + * When DMA-mapping a page, we allocate an ID (from an xarray) and stash this in + * the upper bits of page->pp_magic. We always want to be able to unambiguously + * identify page pool pages (using page_pool_page_is_pp()). Non-PP pages can + * have arbitrary kernel pointers stored in the same field as pp_magic (since it + * overlaps with page->lru.next), so we must ensure that we cannot mistake a + * valid kernel pointer with any of the values we write into this field. + * + * On architectures that set POISON_POINTER_DELTA, this is already ensured, + * since this value becomes part of PP_SIGNATURE; meaning we can just use the + * space between the PP_SIGNATURE value (without POISON_POINTER_DELTA), and the + * lowest bits of POISON_POINTER_DELTA. On arches where POISON_POINTER_DELTA is + * 0, we make sure that we leave the two topmost bits empty, as that guarantees + * we won't mistake a valid kernel pointer for a value we set, regardless of the + * VMSPLIT setting. + * + * Altogether, this means that the number of bits available is constrained by + * the size of an unsigned long (at the upper end, subtracting two bits per the + * above), and the definition of PP_SIGNATURE (with or without + * POISON_POINTER_DELTA). + */ +#define PP_DMA_INDEX_SHIFT (1 + __fls(PP_SIGNATURE - POISON_POINTER_DELTA)) +#if POISON_POINTER_DELTA > 0 +/* PP_SIGNATURE includes POISON_POINTER_DELTA, so limit the size of the DMA + * index to not overlap with that if set + */ +#define PP_DMA_INDEX_BITS MIN(32, __ffs(POISON_POINTER_DELTA) - PP_DMA_INDEX_SHIFT) +#else +/* Always leave out the topmost two; see above. */ +#define PP_DMA_INDEX_BITS MIN(32, BITS_PER_LONG - PP_DMA_INDEX_SHIFT - 2) +#endif + +#define PP_DMA_INDEX_MASK GENMASK(PP_DMA_INDEX_BITS + PP_DMA_INDEX_SHIFT - 1, \ + PP_DMA_INDEX_SHIFT) +#define PP_DMA_INDEX_LIMIT XA_LIMIT(1, BIT(PP_DMA_INDEX_BITS) - 1) + /* Mask used for checking in page_pool_page_is_pp() below. page->pp_magic is * OR'ed with PP_SIGNATURE after the allocation in order to preserve bit 0 for - * the head page of compound page and bit 1 for pfmemalloc page. - * page_is_pfmemalloc() is checked in __page_pool_put_page() to avoid recycling - * the pfmemalloc page. + * the head page of compound page and bit 1 for pfmemalloc page, as well as the + * bits used for the DMA index. page_is_pfmemalloc() is checked in + * __page_pool_put_page() to avoid recycling the pfmemalloc page. */ -#define PP_MAGIC_MASK ~0x3UL +#define PP_MAGIC_MASK ~(PP_DMA_INDEX_MASK | 0x3UL) /** * struct page_pool_params - page pool parameters @@ -233,6 +272,8 @@ struct page_pool { void *mp_priv; const struct memory_provider_ops *mp_ops; + struct xarray dma_mapped; + #ifdef CONFIG_PAGE_POOL_STATS /* recycle stats are per-cpu to avoid locking */ struct page_pool_recycle_stats __percpu *recycle_stats; diff --git a/net/core/netmem_priv.h b/net/core/netmem_priv.h index f33162fd281c23e109273ba09950c5d0a2829bc9..cd95394399b40c3604934ba7898eeeeacb8aee99 100644 --- a/net/core/netmem_priv.h +++ b/net/core/netmem_priv.h @@ -5,7 +5,7 @@ static inline unsigned long netmem_get_pp_magic(netmem_ref netmem) { - return __netmem_clear_lsb(netmem)->pp_magic; + return __netmem_clear_lsb(netmem)->pp_magic & ~PP_DMA_INDEX_MASK; } static inline void netmem_or_pp_magic(netmem_ref netmem, unsigned long pp_magic) @@ -15,6 +15,8 @@ static inline void netmem_or_pp_magic(netmem_ref netmem, unsigned long pp_magic) static inline void netmem_clear_pp_magic(netmem_ref netmem) { + WARN_ON_ONCE(__netmem_clear_lsb(netmem)->pp_magic & PP_DMA_INDEX_MASK); + __netmem_clear_lsb(netmem)->pp_magic = 0; } @@ -33,4 +35,28 @@ static inline void netmem_set_dma_addr(netmem_ref netmem, { __netmem_clear_lsb(netmem)->dma_addr = dma_addr; } + +static inline unsigned long netmem_get_dma_index(netmem_ref netmem) +{ + unsigned long magic; + + if (WARN_ON_ONCE(netmem_is_net_iov(netmem))) + return 0; + + magic = __netmem_clear_lsb(netmem)->pp_magic; + + return (magic & PP_DMA_INDEX_MASK) >> PP_DMA_INDEX_SHIFT; +} + +static inline void netmem_set_dma_index(netmem_ref netmem, + unsigned long id) +{ + unsigned long magic; + + if (WARN_ON_ONCE(netmem_is_net_iov(netmem))) + return; + + magic = netmem_get_pp_magic(netmem) | (id << PP_DMA_INDEX_SHIFT); + __netmem_clear_lsb(netmem)->pp_magic = magic; +} #endif diff --git a/net/core/page_pool.c b/net/core/page_pool.c index d51ca4389dd62d8bc266a9a2b792838257173535..55acb4bc2c57893486f222e9f39b48a09b0d78d0 100644 --- a/net/core/page_pool.c +++ b/net/core/page_pool.c @@ -226,6 +226,8 @@ static int page_pool_init(struct page_pool *pool, return -EINVAL; pool->dma_map = true; + + xa_init_flags(&pool->dma_mapped, XA_FLAGS_ALLOC1); } if (pool->slow.flags & PP_FLAG_DMA_SYNC_DEV) { @@ -275,9 +277,6 @@ static int page_pool_init(struct page_pool *pool, /* Driver calling page_pool_create() also call page_pool_destroy() */ refcount_set(&pool->user_cnt, 1); - if (pool->dma_map) - get_device(pool->p.dev); - if (pool->slow.flags & PP_FLAG_ALLOW_UNREADABLE_NETMEM) { /* We rely on rtnl_lock()ing to make sure netdev_rx_queue * configuration doesn't change while we're initializing @@ -325,7 +324,7 @@ static void page_pool_uninit(struct page_pool *pool) ptr_ring_cleanup(&pool->ring, NULL); if (pool->dma_map) - put_device(pool->p.dev); + xa_destroy(&pool->dma_mapped); #ifdef CONFIG_PAGE_POOL_STATS if (!pool->system) @@ -466,14 +465,20 @@ page_pool_dma_sync_for_device(const struct page_pool *pool, netmem_ref netmem, u32 dma_sync_size) { - if ((READ_ONCE(pool->dma_sync) & PP_DMA_SYNC_DEV) && - dma_dev_need_sync(pool->p.dev)) - __page_pool_dma_sync_for_device(pool, netmem, dma_sync_size); + if (dma_dev_need_sync(pool->p.dev)) { + rcu_read_lock(); + if (READ_ONCE(pool->dma_sync) & PP_DMA_SYNC_DEV) + __page_pool_dma_sync_for_device(pool, netmem, + dma_sync_size); + rcu_read_unlock(); + } } -static bool page_pool_dma_map(struct page_pool *pool, netmem_ref netmem) +static bool page_pool_dma_map(struct page_pool *pool, netmem_ref netmem, gfp_t gfp) { dma_addr_t dma; + int err; + u32 id; /* Setup DMA mapping: use 'struct page' area for storing DMA-addr * since dma_addr_t can be either 32 or 64 bits and does not always fit @@ -487,15 +492,28 @@ static bool page_pool_dma_map(struct page_pool *pool, netmem_ref netmem) if (dma_mapping_error(pool->p.dev, dma)) return false; - if (page_pool_set_dma_addr_netmem(netmem, dma)) + if (in_softirq()) + err = xa_alloc(&pool->dma_mapped, &id, netmem_to_page(netmem), + PP_DMA_INDEX_LIMIT, gfp); + else + err = xa_alloc_bh(&pool->dma_mapped, &id, netmem_to_page(netmem), + PP_DMA_INDEX_LIMIT, gfp); + if (err) { + WARN_ONCE(1, "couldn't track DMA mapping, please report to netdev@"); goto unmap_failed; + } + if (page_pool_set_dma_addr_netmem(netmem, dma)) { + WARN_ONCE(1, "unexpected DMA address, please report to netdev@"); + goto unmap_failed; + } + + netmem_set_dma_index(netmem, id); page_pool_dma_sync_for_device(pool, netmem, pool->p.max_len); return true; unmap_failed: - WARN_ONCE(1, "unexpected DMA address, please report to netdev@"); dma_unmap_page_attrs(pool->p.dev, dma, PAGE_SIZE << pool->p.order, pool->p.dma_dir, DMA_ATTR_SKIP_CPU_SYNC | DMA_ATTR_WEAK_ORDERING); @@ -512,7 +530,7 @@ static struct page *__page_pool_alloc_page_order(struct page_pool *pool, if (unlikely(!page)) return NULL; - if (pool->dma_map && unlikely(!page_pool_dma_map(pool, page_to_netmem(page)))) { + if (pool->dma_map && unlikely(!page_pool_dma_map(pool, page_to_netmem(page), gfp))) { put_page(page); return NULL; } @@ -558,7 +576,7 @@ static noinline netmem_ref __page_pool_alloc_pages_slow(struct page_pool *pool, */ for (i = 0; i < nr_pages; i++) { netmem = pool->alloc.cache[i]; - if (dma_map && unlikely(!page_pool_dma_map(pool, netmem))) { + if (dma_map && unlikely(!page_pool_dma_map(pool, netmem, gfp))) { put_page(netmem_to_page(netmem)); continue; } @@ -660,6 +678,8 @@ void page_pool_clear_pp_info(netmem_ref netmem) static __always_inline void __page_pool_release_page_dma(struct page_pool *pool, netmem_ref netmem) { + struct page *old, *page = netmem_to_page(netmem); + unsigned long id; dma_addr_t dma; if (!pool->dma_map) @@ -668,6 +688,17 @@ static __always_inline void __page_pool_release_page_dma(struct page_pool *pool, */ return; + id = netmem_get_dma_index(netmem); + if (!id) + return; + + if (in_softirq()) + old = xa_cmpxchg(&pool->dma_mapped, id, page, NULL, 0); + else + old = xa_cmpxchg_bh(&pool->dma_mapped, id, page, NULL, 0); + if (old != page) + return; + dma = page_pool_get_dma_addr_netmem(netmem); /* When page is unmapped, it cannot be returned to our pool */ @@ -675,6 +706,7 @@ static __always_inline void __page_pool_release_page_dma(struct page_pool *pool, PAGE_SIZE << pool->p.order, pool->p.dma_dir, DMA_ATTR_SKIP_CPU_SYNC | DMA_ATTR_WEAK_ORDERING); page_pool_set_dma_addr_netmem(netmem, 0); + netmem_set_dma_index(netmem, 0); } /* Disconnects a page (from a page_pool). API users can have a need @@ -1084,8 +1116,32 @@ static void page_pool_empty_alloc_cache_once(struct page_pool *pool) static void page_pool_scrub(struct page_pool *pool) { + unsigned long id; + void *ptr; + page_pool_empty_alloc_cache_once(pool); - pool->destroy_cnt++; + if (!pool->destroy_cnt++ && pool->dma_map) { + if (pool->dma_sync) { + /* paired with READ_ONCE in + * page_pool_dma_sync_for_device() and + * __page_pool_dma_sync_for_cpu() + */ + WRITE_ONCE(pool->dma_sync, false); + + /* Make sure all concurrent returns that may see the old + * value of dma_sync (and thus perform a sync) have + * finished before doing the unmapping below. Skip the + * wait if the device doesn't actually need syncing, or + * if there are no outstanding mapped pages. + */ + if (dma_dev_need_sync(pool->p.dev) && + !xa_empty(&pool->dma_mapped)) + synchronize_net(); + } + + xa_for_each(&pool->dma_mapped, id, ptr) + __page_pool_release_page_dma(pool, page_to_netmem(ptr)); + } /* No more consumers should exist, but producers could still * be in-flight.