Pekka Enberg a écrit : > On Thu, Sep 3, 2009 at 4:04 AM, Eric Dumazet<eric.dumazet@xxxxxxxxx> wrote: >> Zdenek Kabelac a écrit : >>> Well I'm not noticing any ill behavior - also note - rcu_barrier() is >>> there before the cache is destroyed. >>> But as I said - it's just my shot into the dark - which seems to work for me... >>> >> Reading again your traces, I do believe there are two bugs in slub >> >> Maybe not explaining your problem, but worth to fix ! >> >> Thank you >> >> [PATCH] slub: fix slab_pad_check() and SLAB_DESTROY_BY_RCU >> >> When SLAB_POISON is used and slab_pad_check() finds an overwrite of the >> slab padding, we call restore_bytes() on the whole slab, not only >> on the padding. >> >> kmem_cache_destroy() should call rcu_barrier() *after* kmem_cache_close() >> and *before* sysfs_slab_remove() or risk rcu_free_slab() >> being called after kmem_cache is deleted (kfreed). >> >> rmmod nf_conntrack can crash the machine because it has to >> kmem_cache_destroy() a SLAB_DESTROY_BY_RCU enabled cache. >> >> Reported-by: Zdenek Kabelac <zdenek.kabelac@xxxxxxxxx> >> Signed-off-by: Eric Dumazet <eric.dumazet@xxxxxxxxx> >> --- >> diff --git a/mm/slub.c b/mm/slub.c >> index b9f1491..0ac839f 100644 >> --- a/mm/slub.c >> +++ b/mm/slub.c >> @@ -646,7 +646,7 @@ static int slab_pad_check(struct kmem_cache *s, struct page *page) >> slab_err(s, page, "Padding overwritten. 0x%p-0x%p", fault, end - 1); >> print_section("Padding", end - remainder, remainder); >> >> - restore_bytes(s, "slab padding", POISON_INUSE, start, end); >> + restore_bytes(s, "slab padding", POISON_INUSE, end - remainder, end); > > OK, makes sense. > >> return 0; >> } >> >> @@ -2594,8 +2594,6 @@ static inline int kmem_cache_close(struct kmem_cache *s) >> */ >> void kmem_cache_destroy(struct kmem_cache *s) >> { >> - if (s->flags & SLAB_DESTROY_BY_RCU) >> - rcu_barrier(); >> down_write(&slub_lock); >> s->refcount--; >> if (!s->refcount) { >> @@ -2606,6 +2604,8 @@ void kmem_cache_destroy(struct kmem_cache *s) >> "still has objects.\n", s->name, __func__); >> dump_stack(); >> } >> + if (s->flags & SLAB_DESTROY_BY_RCU) >> + rcu_barrier(); >> sysfs_slab_remove(s); >> } else >> up_write(&slub_lock); > > The rcu_barrier() call was added by this commit: > > http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=7ed9f7e5db58c6e8c2b4b738a75d5dcd8e17aad5 > > I guess we should CC Paul as well. Sure ! rcu_barrier() is definitly better than synchronize_rcu() in kmem_cache_destroy() But its location was not really right (for SLUB at least) SLAB_DESTROY_BY_RCU means subsystem will call kfree(elems) without waiting RCU grace period. By the time subsystem calls kmem_cache_destroy(), all previously allocated elems must have already be kfreed() by this subsystem. We must however wait that all slabs, queued for freeing by rcu_free_slab(), are indeed freed, since this freeing needs access to kmem_cache pointer. As kmem_cache_close() might clean/purge the cache and call rcu_free_slab(), we must call rcu_barrier() *after* kmem_cache_close(), and before kfree(kmem_cache *s) Alternatively we could delay this final kfree(s) (with call_rcu()) but would have to copy s->name in kmem_cache_create() instead of keeping a pointer to a string that might be in a module, and freed at rmmod time. Given that there is few uses in current tree that call kmem_cache_destroy() on a SLAB_DESTROY_BY_RCU cache, there is no need to try to optimize this rcu_barrier() call, unless we want superfast reboot/halt sequences... -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html