1. 21 Aug, 2015 1 commit
    • Michal Hocko's avatar
      mm: make page pfmemalloc check more robust · 2f064f34
      Michal Hocko authored
      Commit c48a11c7 ("netvm: propagate page->pfmemalloc to skb") added
      checks for page->pfmemalloc to __skb_fill_page_desc():
              if (page->pfmemalloc && !page->mapping)
                      skb->pfmemalloc = true;
      It assumes page->mapping == NULL implies that page->pfmemalloc can be
      trusted.  However, __delete_from_page_cache() can set set page->mapping
      to NULL and leave page->index value alone.  Due to being in union, a
      non-zero page->index will be interpreted as true page->pfmemalloc.
      So the assumption is invalid if the networking code can see such a page.
      And it seems it can.  We have encountered this with a NFS over loopback
      setup when such a page is attached to a new skbuf.  There is no copying
      going on in this case so the page confuses __skb_fill_page_desc which
      interprets the index as pfmemalloc flag and the network stack drops
      packets that have been allocated using the reserves unless they are to
      be queued on sockets handling the swapping which is the case here and
      that leads to hangs when the nfs client waits for a response from the
      server which has been dropped and thus never arrive.
      The struct page is already heavily packed so rather than finding another
      hole to put it in, let's do a trick instead.  We can reuse the index
      again but define it to an impossible value (-1UL).  This is the page
      index so it should never see the value that large.  Replace all direct
      users of page->pfmemalloc by page_is_pfmemalloc which will hide this
      nastiness from unspoiled eyes.
      The information will get lost if somebody wants to use page->index
      obviously but that was the case before and the original code expected
      that the information should be persisted somewhere else if that is
      really needed (e.g.  what SLAB and SLUB do).
      [akpm@linux-foundation.org: fix blooper in slub]
      Fixes: c48a11c7
       ("netvm: propagate page->pfmemalloc to skb")
      Signed-off-by: default avatarMichal Hocko <mhocko@suse.com>
      Debugged-by: default avatarVlastimil Babka <vbabka@suse.com>
      Debugged-by: default avatarJiri Bohac <jbohac@suse.com>
      Cc: Eric Dumazet <eric.dumazet@gmail.com>
      Cc: David Miller <davem@davemloft.net>
      Acked-by: default avatarMel Gorman <mgorman@suse.de>
      Cc: <stable@vger.kernel.org>	[3.6+]
      Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
  2. 04 May, 2015 1 commit
  3. 11 Apr, 2015 1 commit
  4. 13 Mar, 2015 1 commit
  5. 06 Feb, 2015 7 commits
  6. 31 Jan, 2015 1 commit
  7. 13 Jan, 2015 1 commit
  8. 09 Dec, 2014 1 commit
  9. 05 Dec, 2014 2 commits
  10. 20 Nov, 2014 9 commits
  11. 18 Sep, 2014 1 commit
  12. 12 Aug, 2014 1 commit
  13. 23 Apr, 2014 1 commit
  14. 18 Apr, 2014 1 commit
  15. 11 Apr, 2014 2 commits
  16. 31 Mar, 2014 2 commits
  17. 21 Mar, 2014 3 commits
  18. 20 Mar, 2014 3 commits
  19. 15 Mar, 2014 1 commit