Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp6119884pxb; Mon, 14 Feb 2022 16:04:41 -0800 (PST) X-Google-Smtp-Source: ABdhPJzX8SLHhhsCYbVSkwLGuWkEJoyTgZBAalskxu/F0n64J9LvKbSbdf6Sl5v9rzsgMy/05xqn X-Received: by 2002:a05:6a00:2305:: with SMTP id h5mr1616624pfh.13.1644883481491; Mon, 14 Feb 2022 16:04:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644883481; cv=none; d=google.com; s=arc-20160816; b=ypcIfoCTWY1jiZF1F1MVARWn6CpTkDFIUeFGpZv6zKUUkTbF7TPqvWxW9IeRpuv3xr B8YZ0yO5wAOzIYnxgI+ySRSM0rzq+O20yK0sgjYwdfZdJZcGvwXleC9JdoAEStK39f7h 6srOalKpnfBtBEHymUBo2dsL0nLCwdWHnzH9V7RA5IY61F9mamtyriAZpBm2RyY6zrGW uI2JUaOw+fmsFwifJL6jQO8/JrctjOctXfAS+a6fhMKN2cmUOSny016Z2rChv55pp3Q0 v7M1lQu0GizPH67BaSdHLOASJWg+z2sTagEitxRH9Ai6rJhFXXJFilvSrRNw+vtANAO9 +Ddg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:mail-followup-to:message-id:subject:cc:to :from:date:dkim-signature; bh=igSZ+LIeYPLAApT1YhTZtQ97ydr79Zt0qEblfETPg64=; b=rOPOH1XDwg2hy8Vk0Cjo/Uk6KoVYY9tYYE+8ZC90sD0QDE+QyCDaAVAEuJcqj9fJy6 wl7oi2Um5YFpKtmo0RQRoXd9+VtBOgxlw7/5y/CvUfkvYgW9S3jo/q3xUe5KfbTpvQ6Y 6psZYGEnz+ie2upU5fhvMgq37sqA3mqFt+c6ArpJRwFD4tAP7BVXMUCsy7Pr6AWQGFQa 5kyKPLjakD2v7niZcmkqjmKddYUqTkYapQ5AJkVNTDQIZ0pMguozssRq4BinlDRx/ZnL 2iM5K6vnpygsHrWehLJWQmOiaplzSmrwj+8BvEhpbOSxfYx2ZWkYyA5yJydaAJwvHSIK 7/1g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=HqJ3k34e; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u190si1069235pgd.578.2022.02.14.16.04.25; Mon, 14 Feb 2022 16:04:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=HqJ3k34e; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230037AbiBNXNI (ORCPT + 99 others); Mon, 14 Feb 2022 18:13:08 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:33908 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229458AbiBNXNH (ORCPT ); Mon, 14 Feb 2022 18:13:07 -0500 Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 77E5116C4E6 for ; Mon, 14 Feb 2022 15:12:57 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1644880377; x=1676416377; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=hleKJXrUDhmmOrMMCvBDlVg74DPqUhOtXuvUOdPHjK0=; b=HqJ3k34e3QvV1IJ/eRcLJh2mGgw36BEcF8tv8oZtnw87xzOYbqqjy4u/ J6wKRV9rW5GHcE+0eUxfP4EbbVyir4kK/bb1EHGySqp+JdxyoRfr3qPRH clUO8Bi/i92t83nfsxvXBy5T6opL/n9To4FtIFL4Ed2ONcI05Xax/Q/cl JiwLXEkgiOckyD6vHtK73RZv3/lqWAKlknQv70+xVG5frnKDqcS2pAVHs gdLFakVQYmE7580CjJ6xt4ZsauEi2SQsRiKIXqLbdXvdbdU8ohtG5Bmk8 qjpLaUBqIV0SrZUvmvoZnYf2ZsKntf6maOYmkETDN7J1uHZY7MlP34ABU Q==; X-IronPort-AV: E=McAfee;i="6200,9189,10258"; a="230843424" X-IronPort-AV: E=Sophos;i="5.88,368,1635231600"; d="scan'208";a="230843424" Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Feb 2022 15:12:57 -0800 X-IronPort-AV: E=Sophos;i="5.88,368,1635231600"; d="scan'208";a="680755418" Received: from iweiny-desk2.sc.intel.com (HELO localhost) ([10.3.52.147]) by fmsmga001-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Feb 2022 15:12:56 -0800 Date: Mon, 14 Feb 2022 15:12:56 -0800 From: Ira Weiny To: Dan Williams Cc: Tong Zhang , Vishal Verma , Dave Jiang , Linux NVDIMM , Linux Kernel Mailing List Subject: Re: [PATCH] dax: make sure inodes are flushed before destroy cache Message-ID: <20220214231256.GX785175@iweiny-DESK2.sc.intel.com> Mail-Followup-To: Dan Williams , Tong Zhang , Vishal Verma , Dave Jiang , Linux NVDIMM , Linux Kernel Mailing List References: <20220212071111.148575-1-ztong0001@gmail.com> <20220214175905.GV785175@iweiny-DESK2.sc.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.11.1 (2018-12-01) X-Spam-Status: No, score=-4.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Feb 14, 2022 at 12:09:54PM -0800, Dan Williams wrote: > On Mon, Feb 14, 2022 at 9:59 AM Ira Weiny wrote: > > > > On Fri, Feb 11, 2022 at 11:11:11PM -0800, Tong Zhang wrote: > > > A bug can be triggered by following command > > > > > > $ modprobe nd_pmem && modprobe -r nd_pmem > > > > > > [ 10.060014] BUG dax_cache (Not tainted): Objects remaining in dax_cache on __kmem_cache_shutdown() > > > [ 10.060938] Slab 0x0000000085b729ac objects=9 used=1 fp=0x000000004f5ae469 flags=0x200000000010200(slab|head|node) > > > [ 10.062433] Call Trace: > > > [ 10.062673] dump_stack_lvl+0x34/0x44 > > > [ 10.062865] slab_err+0x90/0xd0 > > > [ 10.063619] __kmem_cache_shutdown+0x13b/0x2f0 > > > [ 10.063848] kmem_cache_destroy+0x4a/0x110 > > > [ 10.064058] __x64_sys_delete_module+0x265/0x300 > > > > > > This is caused by dax_fs_exit() not flushing inodes before destroy cache. > > > To fix this issue, call rcu_barrier() before destroy cache. > > > > I don't doubt that this fixes the bug. However, I can't help but think this is > > hiding a bug, or perhaps a missing step, in the kmem_cache layer? As far as I > > can see dax does not call call_rcu() and only uses srcu not rcu? I was tempted > > to suggest srcu_barrier() but dax does not call call_srcu() either. > > This rcu_barrier() is associated with the call_rcu() in destroy_inode(). Ok yea. > > While kern_unmount() does a full sycnrhonize_rcu() after clearing > ->mnt_ns. Any pending destroy_inode() callbacks need to be flushed > before the kmem_cache is destroyed. > > > So I'm not clear about what is really going on and why this fixes it. I know > > that dax is not using srcu is a standard way so perhaps this helps in a way I > > don't quite grok? If so perhaps a comment here would be in order? > > Looks like a common pattern I missed that all filesystem exit paths implement. I think a comment would be in order, especially since since it looks like every other FS has one: fs/ext4/super.c: ... /* * Make sure all delayed rcu free inodes are flushed before we * destroy cache. */ rcu_barrier(); ... Anyway ok. Reviewed-by: Ira Weiny Thanks for looking Dan, Ira