Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1518601rwb; Wed, 16 Nov 2022 20:00:28 -0800 (PST) X-Google-Smtp-Source: AA0mqf4HEUYZThtEHD563ABNDEDOU/mU/ond1EyvUIUSQxoAE5RpCcQKt8IT5mKjvpV5UpkugcWg X-Received: by 2002:aa7:cb8d:0:b0:467:bc1f:ca16 with SMTP id r13-20020aa7cb8d000000b00467bc1fca16mr597882edt.269.1668657628246; Wed, 16 Nov 2022 20:00:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668657628; cv=none; d=google.com; s=arc-20160816; b=rUJbG17lgaUFdAePZqcHWuggiDZeUV0fMImTD41D43HlR/M8ByOcJye/uh/iGO+NjB OCeYRHrXY8bpxvw6ruM+yZ77Q0MoNcATIlfjJEEqZ5yXOy02TTA/SfInrIrq9ijbOPzb a6b6ScaaICQnY8/17q5VwQr6UeN+2gF6nUvbRMr3qHkRuLnjCcJc2gCABVbILYeM5Cd/ tGu6dX9npoABofhSr4Ox3u0T+ScwHoRW81CvfLXtpuQO+VVstOKaejCqJXROf2SqIz6K L+F0o54TFBm28F1FPlZLifQiEgobBdZ7/+w5AeoXy9wbW1JvPBgr+wIsm8BM0i0MQeEa Z1cw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=mX/nVVLR77rl9DUJUGIPDy2hSVN2IuYJAyXn0XHxv7c=; b=s8l3rOzGLBjuOhvwQ/hRjhn6pAh084NVwZAbNoTKERF9aH2e4nMf0pYZiU3FM/KuK0 YLKnpv1YkApCJXpfRbBxW66AoVqOgBmnu4x7YfWgIFDMA6Jtgwi/PmCShKCQyqchba1C N1TAacKWg1OIiZOTbm4QHpUNg0kHKVjPrEqLgSeid6V9t6SRwOZ2omE8D11lqaMotca6 ftAQNd7WkT8JW7k0PMKrAhNV9V1LtmminGye7/IAUTgsz9GHgIYul+c/mc8U8B7QG3Y6 bmkglrPzAZ0sW0f1zHLSciZ21WeDSHxQKeRnoK3l0oyHH8lU541RskHwljQeQ7O6LjV5 9sjw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=cP7nrbOD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hg7-20020a1709072cc700b007a6ec6fb027si17408992ejc.538.2022.11.16.20.00.07; Wed, 16 Nov 2022 20:00:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=cP7nrbOD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230377AbiKQDo5 (ORCPT + 90 others); Wed, 16 Nov 2022 22:44:57 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57112 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232097AbiKQDoz (ORCPT ); Wed, 16 Nov 2022 22:44:55 -0500 Received: from mail-yw1-x1130.google.com (mail-yw1-x1130.google.com [IPv6:2607:f8b0:4864:20::1130]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A9C0561758 for ; Wed, 16 Nov 2022 19:44:54 -0800 (PST) Received: by mail-yw1-x1130.google.com with SMTP id 00721157ae682-369426664f9so6908297b3.12 for ; Wed, 16 Nov 2022 19:44:54 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=mX/nVVLR77rl9DUJUGIPDy2hSVN2IuYJAyXn0XHxv7c=; b=cP7nrbODehEq41oxats2cCXRpCH3pgtt27PbJxs7RbS06z34/NEe4qwUp4RITt1nt1 D/+HUWdgQAzDfbnGNQt0SNs5qqtb7DwaTu4c/0wDA9k1Mr5ov9IIVAqZj/kXjmCZFWoR /9RKa/XwGL88By0mdsQ7RUST7DpM3xlbnGbjQiVnvUZVz+ypi1ljTwI7tQMHNPfptF5a 0bOC1eb3DC4AqpsSdu1TBTTXy1odyyGyw99u5V9ow9IYRYZz+X66gW39g8t0wfcvT3mw mA/jDa11l/7qpNohYGDSOga5+DA8QS9s5UQ0Nc5VfcaEkybbSDsi01PW+1wLp2LblJ52 Mh4w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=mX/nVVLR77rl9DUJUGIPDy2hSVN2IuYJAyXn0XHxv7c=; b=ZaCdJZfX91K98vipSP/1FmqmIko4gzg+r2maXesTnJAc/gOFTr0H6TpbjlPkQQHYN/ voCv/KHh+4+oxaa5VatIHzM9XH6JUO93buIwyAZhjgRReyHAobb0YG84QVr1Xhp6dUoz TiPqHgzViGjrhc/jz4T+RubDQMHeipB/M7HGoXlAySXwE3Y4tFfvoJeb7aoBz3krR0/c CHWu7oazLR+UjBllN//k2c2pNxvonbPS/Ea20poTTPahMJkvoqmKq4uSYZwXFOqsFVMY aB0OVgYB557F6OMyltyeM3lsUoO+pLVQkAP0/3rHRzdlPtsZIVZj/agsx5+8HiUvwkhP AeFQ== X-Gm-Message-State: ANoB5plWPmDWNNaqBAUvNrcv5Cr+GsgiawNr+THqGqDI1wKTjOPnFiUi aWBoJTBar4o5badXXASH2LLEFQiAl5Eyt0cKG/fqYw== X-Received: by 2002:a0d:c103:0:b0:370:7a9a:564 with SMTP id c3-20020a0dc103000000b003707a9a0564mr427025ywd.278.1668656693295; Wed, 16 Nov 2022 19:44:53 -0800 (PST) MIME-Version: 1.0 References: <20221117031551.1142289-1-joel@joelfernandes.org> <20221117031551.1142289-3-joel@joelfernandes.org> In-Reply-To: <20221117031551.1142289-3-joel@joelfernandes.org> From: Eric Dumazet Date: Wed, 16 Nov 2022 19:44:41 -0800 Message-ID: Subject: Re: [PATCH rcu/dev 3/3] net: Use call_rcu_flush() for dst_destroy_rcu To: "Joel Fernandes (Google)" Cc: linux-kernel@vger.kernel.org, Cong Wang , David Ahern , "David S. Miller" , Hideaki YOSHIFUJI , Jakub Kicinski , Jamal Hadi Salim , Jiri Pirko , netdev@vger.kernel.org, Paolo Abeni , rcu@vger.kernel.org, rostedt@goodmis.org, paulmck@kernel.org, fweisbec@gmail.com Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Nov 16, 2022 at 7:16 PM Joel Fernandes (Google) wrote: > > In a networking test on ChromeOS, we find that using the new CONFIG_RCU_LAZY > causes a networking test to fail in the teardown phase. > > The failure happens during: ip netns del And ? What happens then next ? > > Using ftrace, I found the callbacks it was queuing which this series fixes. Use > call_rcu_flush() to revert to the old behavior. With that, the test passes. What is this test about ? What barrier was used to make it not flaky ? Was it depending on some undocumented RCU behavior ? Maybe adding a sysctl to force the flush would be better for functional tests ? I would rather change the test(s), than adding call_rcu_flush(), adding merge conflicts to future backports.