On Fri, Jul 26, 2024 at 11:34:57AM +0200, Vlastimil Babka wrote: > On 7/25/24 7:59 AM, kernel test robot wrote: > > > > hi, Vlastimil Babka, > > > > we noticed by this commit: > > > > 7fd4dfd0d38db6f3 df00e211c9c11e8d20f2ea7b4ab > > ---------------- --------------------------- > > fail:runs %reproduction fail:runs > > | | | > > 6:6 -100% :6 dmesg.WARNING:at_mm/slab_common.c:#kmem_cache_destroy > > :6 100% 6:6 dmesg.WARNING:at_mm/slab_common.c:#kmem_cache_kfree_rcu_destroy_workfn > > > > below formal report just FYI what we observed in our tests. not sure if it's > > valuable to supply any hints. > > > > > > Hello, > > > > kernel test robot noticed "WARNING:at_mm/slab_common.c:#kmem_cache_kfree_rcu_destroy_workfn" on: > > > > commit: df00e211c9c11e8d20f2ea7b4ab1d7c9760fe822 ("mm, slab: asynchronously destroy caches with outstanding objects") > > https://git.kernel.org/cgit/linux/kernel/git/vbabka/linux.git slab-kfree_rcu-destroy-v1r0 > > Yes, that's expected proves we need the proper barrier added from the RCU > folks :) > Give me some time, i will implement it! After discussion with Paul it should not be so hard :) Thanks! -- Uladzislau Rezki