From patchwork Fri Jan 22 17:17:15 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Anatoly Burakov X-Patchwork-Id: 87109 X-Patchwork-Delegate: thomas@monjalon.net Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id D1C60A0A0A; Fri, 22 Jan 2021 18:17:19 +0100 (CET) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 58DBA141047; Fri, 22 Jan 2021 18:17:19 +0100 (CET) Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by mails.dpdk.org (Postfix) with ESMTP id 9747114103D for ; Fri, 22 Jan 2021 18:17:17 +0100 (CET) IronPort-SDR: 17GYvnmT/BTZZgCwL5lyX/HJHG2kT9Xvg5/urA2RDbuEmQzKWEnp5c5P06KD820u1QLgp2BCw8 qiOcll4twtTA== X-IronPort-AV: E=McAfee;i="6000,8403,9872"; a="159251155" X-IronPort-AV: E=Sophos;i="5.79,367,1602572400"; d="scan'208";a="159251155" Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Jan 2021 09:17:16 -0800 IronPort-SDR: enKRPkroE76P1B769pHuKO2YA+ZOzr3P9Ijm3cTD9NNwaAQELCDNvtSI+xyY1UiUlxlUJUCxlQ FNEu8n3RExOA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.79,367,1602572400"; d="scan'208";a="400734244" Received: from silpixa00399498.ir.intel.com (HELO silpixa00399498.ger.corp.intel.com) ([10.237.222.179]) by fmsmga004.fm.intel.com with ESMTP; 22 Jan 2021 09:17:16 -0800 From: Anatoly Burakov To: dev@dpdk.org Date: Fri, 22 Jan 2021 17:17:15 +0000 Message-Id: X-Mailer: git-send-email 2.25.1 In-Reply-To: <20ad523bdee024979dfc74cc32c8c02954cd1d4c.1610984505.git.anatoly.burakov@intel.com> References: <20ad523bdee024979dfc74cc32c8c02954cd1d4c.1610984505.git.anatoly.burakov@intel.com> MIME-Version: 1.0 Subject: [dpdk-dev] [PATCH v3] mem: improve parameter checking on memory hotplug X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Currently, we don't check anything that comes in through memory hotplug subsystem using the IPC, because we always assume the data is correct. This is okay as anyone having access to the IPC socket would also have rights to crash the DPDK process through other means, but it's still a good practice to do parameter checking, so fix the code to do that. Signed-off-by: Anatoly Burakov --- Notes: v3: - Fixed typos v2: - Fixed 32-bit compile issues lib/librte_eal/common/malloc_heap.c | 3 +- lib/librte_eal/common/malloc_mp.c | 70 +++++++++++++++++++++++++---- lib/librte_eal/common/malloc_mp.h | 4 +- 3 files changed, 66 insertions(+), 11 deletions(-) diff --git a/lib/librte_eal/common/malloc_heap.c b/lib/librte_eal/common/malloc_heap.c index 5a09247a65..ee400f38ec 100644 --- a/lib/librte_eal/common/malloc_heap.c +++ b/lib/librte_eal/common/malloc_heap.c @@ -460,6 +460,7 @@ try_expand_heap_secondary(struct malloc_heap *heap, uint64_t pg_sz, size_t elt_size, int socket, unsigned int flags, size_t align, size_t bound, bool contig) { + struct rte_mem_config *mcfg = rte_eal_get_configuration()->mem_config; struct malloc_mp_req req; int req_result; @@ -473,7 +474,7 @@ try_expand_heap_secondary(struct malloc_heap *heap, uint64_t pg_sz, req.alloc_req.elt_size = elt_size; req.alloc_req.page_sz = pg_sz; req.alloc_req.socket = socket; - req.alloc_req.heap = heap; /* it's in shared memory */ + req.alloc_req.malloc_heap_idx = heap - mcfg->malloc_heaps; req_result = request_to_primary(&req); diff --git a/lib/librte_eal/common/malloc_mp.c b/lib/librte_eal/common/malloc_mp.c index 1f212f8349..0b19d4d5fb 100644 --- a/lib/librte_eal/common/malloc_mp.c +++ b/lib/librte_eal/common/malloc_mp.c @@ -11,6 +11,7 @@ #include "eal_memalloc.h" #include "eal_memcfg.h" +#include "eal_private.h" #include "malloc_elem.h" #include "malloc_mp.h" @@ -175,10 +176,49 @@ handle_sync(const struct rte_mp_msg *msg, const void *peer) return 0; } +static int +handle_free_request(const struct malloc_mp_req *m) +{ + const struct rte_memseg_list *msl; + void *start, *end; + size_t len; + + len = m->free_req.len; + start = m->free_req.addr; + end = RTE_PTR_ADD(start, len - 1); + + /* check if the requested memory actually exists */ + msl = rte_mem_virt2memseg_list(start); + if (msl == NULL) { + RTE_LOG(ERR, EAL, "Requested to free unknown memory\n"); + return -1; + } + + /* check if end is within the same memory region */ + if (rte_mem_virt2memseg_list(end) != msl) { + RTE_LOG(ERR, EAL, "Requested to free memory spanning multiple regions\n"); + return -1; + } + + /* we're supposed to only free memory that's not external */ + if (msl->external) { + RTE_LOG(ERR, EAL, "Requested to free external memory\n"); + return -1; + } + + /* now that we've validated the request, announce it */ + eal_memalloc_mem_event_notify(RTE_MEM_EVENT_FREE, + m->free_req.addr, m->free_req.len); + + /* now, do the actual freeing */ + return malloc_heap_free_pages(m->free_req.addr, m->free_req.len); +} + static int handle_alloc_request(const struct malloc_mp_req *m, struct mp_request *req) { + struct rte_mem_config *mcfg = rte_eal_get_configuration()->mem_config; const struct malloc_req_alloc *ar = &m->alloc_req; struct malloc_heap *heap; struct malloc_elem *elem; @@ -187,17 +227,35 @@ handle_alloc_request(const struct malloc_mp_req *m, int n_segs; void *map_addr; + /* this is checked by the API, but we need to prevent divide by zero */ + if (ar->page_sz == 0 || !rte_is_power_of_2(ar->page_sz)) { + RTE_LOG(ERR, EAL, "Attempting to allocate with invalid page size\n"); + return -1; + } + + /* heap idx is index into the heap array, not socket ID */ + if (ar->malloc_heap_idx >= RTE_MAX_HEAPS) { + RTE_LOG(ERR, EAL, "Attempting to allocate from invalid heap\n"); + return -1; + } + + heap = &mcfg->malloc_heaps[ar->malloc_heap_idx]; + + /* for allocations, we must only use internal heaps */ + if (rte_malloc_heap_socket_is_external(heap->socket_id)) { + RTE_LOG(ERR, EAL, "Attempting to allocate from external heap\n"); + return -1; + } + alloc_sz = RTE_ALIGN_CEIL(ar->align + ar->elt_size + MALLOC_ELEM_TRAILER_LEN, ar->page_sz); n_segs = alloc_sz / ar->page_sz; - heap = ar->heap; - /* we can't know in advance how many pages we'll need, so we malloc */ ms = malloc(sizeof(*ms) * n_segs); if (ms == NULL) { RTE_LOG(ERR, EAL, "Couldn't allocate memory for request state\n"); - goto fail; + return -1; } memset(ms, 0, sizeof(*ms) * n_segs); @@ -261,11 +319,7 @@ handle_request(const struct rte_mp_msg *msg, const void *peer __rte_unused) if (m->t == REQ_TYPE_ALLOC) { ret = handle_alloc_request(m, entry); } else if (m->t == REQ_TYPE_FREE) { - eal_memalloc_mem_event_notify(RTE_MEM_EVENT_FREE, - m->free_req.addr, m->free_req.len); - - ret = malloc_heap_free_pages(m->free_req.addr, - m->free_req.len); + ret = handle_free_request(m); } else { RTE_LOG(ERR, EAL, "Unexpected request from secondary\n"); goto fail; diff --git a/lib/librte_eal/common/malloc_mp.h b/lib/librte_eal/common/malloc_mp.h index 2b86b76f68..0095062b72 100644 --- a/lib/librte_eal/common/malloc_mp.h +++ b/lib/librte_eal/common/malloc_mp.h @@ -30,7 +30,7 @@ enum malloc_req_result { }; struct malloc_req_alloc { - struct malloc_heap *heap; + uint32_t malloc_heap_idx; uint64_t page_sz; size_t elt_size; int socket; @@ -46,7 +46,7 @@ struct malloc_req_free { void *addr; uint64_t addr_64; }; - uint64_t len; + size_t len; }; struct malloc_mp_req {