On Sun, 14 Apr 2024, keltargw wrote: > Thanks for the suggestion. I'm not that familiar with ipset source code, > do you mean something like issuing a second rcu_barrier between call_rcu > and returning result code back to netlink (and only doing that for list > type)? > > As I understand it there isn't much that could be done in e.g. > list_set_destroy as it might not be called yet, sitting in the rcu wait > queue. No, I meant release the reference counter of the element sets immediately when destroying a list type of set. Something like moving just the ip_set_put_byindex() call list_for_each_entry_safe(e, n, &map->members, list) { ... ip_set_put_byindex(map->net, e->id); ... } from list_set_destroy() into list_set_cancel_gc(). That way the member sets can be destroyed without waiting for anything. Best regards, Jozsef > On Sat, 13 Apr 2024 at 19:02, Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxx> wrote: > > > > On Sat, 13 Apr 2024, keltargw wrote: > > > > > I have a problem with recent kernels. Due to delayed ipset destroy I'm > > > unable to destroy ipset that was recently in use by another (destroyed) > > > ipset. It is demonstrated by this example: > > > > > > #!/bin/bash > > > set -x > > > > > > ipset create qwe1 list:set > > > ipset create asd1 hash:net > > > ipset add qwe1 asd1 > > > ipset add asd1 1.1.1.1 > > > > > > ipset destroy qwe1 > > > ipset list asd1 -t > > > ipset destroy asd1 > > > > > > Second ipset destroy reports an error "ipset v7.21: Set cannot be > > > destroyed: it is in use by a kernel component". > > > If this command is repeated after a short delay, it deletes ipset > > > without any problems. > > > > > > It seems it could be fixed with that kernel module patch: > > > > > > Index: linux-6.7.9/net/netfilter/ipset/ip_set_core.c > > > =================================================================== > > > --- linux-6.7.9.orig/net/netfilter/ipset/ip_set_core.c > > > +++ linux-6.7.9/net/netfilter/ipset/ip_set_core.c > > > @@ -1241,6 +1241,9 @@ static int ip_set_destroy(struct sk_buff > > > u32 flags = flag_exist(info->nlh); > > > u16 features = 0; > > > > > > + /* Wait for flush to ensure references are cleared */ > > > + rcu_barrier(); > > > + > > > read_lock_bh(&ip_set_ref_lock); > > > s = find_set_and_id(inst, nla_data(attr[IPSET_ATTR_SETNAME]), > > > &i); > > > > > > If you have any suggestions on how this problem should be approached > > > please let me know. > > > > I'd better solve it in the list type itself: your patch unnecessarily > > slows down all set destroy operations. > > > > Best regards, > > Jozsef > > -- > > E-mail : kadlec@xxxxxxxxxxxxxxxxx, kadlecsik.jozsef@xxxxxxxxx > > PGP key : https://wigner.hu/~kadlec/pgp_public_key.txt > > Address : Wigner Research Centre for Physics > > H-1525 Budapest 114, POB. 49, Hungary > -- E-mail : kadlec@xxxxxxxxxxxxxxxxx, kadlecsik.jozsef@xxxxxxxxx PGP key : https://wigner.hu/~kadlec/pgp_public_key.txt Address : Wigner Research Centre for Physics H-1525 Budapest 114, POB. 49, Hungary