On Fri, Jul 26, 2024 at 11:34:57AM +0200, Vlastimil Babka wrote:
> On 7/25/24 7:59 AM, kernel test robot wrote:
> > 
> > hi, Vlastimil Babka,
> > 
> > we noticed by this commit:
> > 
> > 7fd4dfd0d38db6f3 df00e211c9c11e8d20f2ea7b4ab
> > ---------------- ---------------------------
> >        fail:runs  %reproduction    fail:runs
> >            |             |             |
> >           6:6         -100%            :6     
> > dmesg.WARNING:at_mm/slab_common.c:#kmem_cache_destroy
> >            :6          100%           6:6     
> > dmesg.WARNING:at_mm/slab_common.c:#kmem_cache_kfree_rcu_destroy_workfn
> > 
> > below formal report just FYI what we observed in our tests. not sure if it's
> > valuable to supply any hints.
> > 
> > 
> > Hello,
> > 
> > kernel test robot noticed 
> > "WARNING:at_mm/slab_common.c:#kmem_cache_kfree_rcu_destroy_workfn" on:
> > 
> > commit: df00e211c9c11e8d20f2ea7b4ab1d7c9760fe822 ("mm, slab: asynchronously 
> > destroy caches with outstanding objects")
> > https://git.kernel.org/cgit/linux/kernel/git/vbabka/linux.git 
> > slab-kfree_rcu-destroy-v1r0
> 
> Yes, that's expected proves we need the proper barrier added from the RCU
> folks :)
> 
Give me some time, i will implement it! After discussion with Paul it
should not be so hard :)

Thanks!

--
Uladzislau Rezki

Reply via email to