Message ID | 20230321052337.26553-2-qiuxu.zhuo@intel.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:604a:0:0:0:0:0 with SMTP id j10csp1597391wrt; Mon, 20 Mar 2023 22:28:26 -0700 (PDT) X-Google-Smtp-Source: AK7set8w79rSOdmfj8Pp/MUWbDDHKyLnAsIyfblTBreOyW9B4lXPWEN2tvpS0jN2SkbvoJMObs9q X-Received: by 2002:a17:90b:38d0:b0:23f:9445:318b with SMTP id nn16-20020a17090b38d000b0023f9445318bmr1334713pjb.19.1679376506738; Mon, 20 Mar 2023 22:28:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1679376506; cv=none; d=google.com; s=arc-20160816; b=KvNu/CrL+WsI/P9Zha372xU/5RhLQ+44mqr1mEOYLYS0NxT83EcEaBNP3k0f81B4II hG2OZdIQc03SdRfZrQF2ejGIbpcj5sBaXqgKCoD1hCHunPgeTi/dNQrMX824j+ZOHRLw 2hd0nx8b/N7tWdRt5awWJgm3B+/oFeOeMHyn3E9oadYldwSssA6fc4B6/bUOMXDGZsq3 9vnv20lCT999UsY4BVEgiZsprWy8jmgKKnSf06J/LFjyhhHSyNpASaoNrlQR13WL2HCk 8U/CqH+kQxsYVBk8GCYSacI0VJf8tm2T8UMsoWDxzCYPTkPFhjsisEc2QEltBBMPxgqi md4w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:dkim-signature; bh=SO37Vt0vwdskvUq2r//KojjoQTiNELuvvBKMJ83x53I=; b=bgW7VhxUDDnQLW//1uJl098CdPKZXJSGB9lb63ksaTj0MFer0n5inqriRVKXt7T8xo 1e+U1xbdY7zJV+mwIkysKwxyAJ7iyup6mAeLS3COaAp61LEw3MnuDR/uOL08PY4lOelR mblfF+HikNfGIETclFaQkTbVCgB6nGEiZwJAUDxQxKWR0z27bJJ62LTDz/BB45Ve7JRG Wf4KrhzlSbl0EzQU/1APtKS3W9Mk29lfRihYSa3gulBkJ+AQmWJJjQw0TyhdLno3T1tK v3Usw70XTxKWCnqWPbWTwQ1yadB8VJFm5A124elj9GcCUHM/Rsc4tedCFHT4H7tyd8oz n/6w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=eVXpNA2d; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f5-20020a17090aa78500b00233e76fe27fsi11778875pjq.183.2023.03.20.22.28.11; Mon, 20 Mar 2023 22:28:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=eVXpNA2d; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229898AbjCUFZL (ORCPT <rfc822;pusanteemu@gmail.com> + 99 others); Tue, 21 Mar 2023 01:25:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42666 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229634AbjCUFZJ (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Tue, 21 Mar 2023 01:25:09 -0400 Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C6C4D3B0E0; Mon, 20 Mar 2023 22:24:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1679376270; x=1710912270; h=from:to:cc:subject:date:message-id:in-reply-to: references; bh=WIoVvAkmRwdIk8RpBsrQeOKQhl/bXKbU5Sl7z6ngXk8=; b=eVXpNA2djoiHAz515QnV3jRQr6jMGd/L3OhXSRqx+27xMlBVt9rdqHb9 IGZspVlfm9k+XQ5QZXFlxaO97QwDT/JqrrZMlnDot0neeSj2ujgIAxuOy 9bLNIcc6+ZV+6lpoVKfQjUjoLNRtzFhy72j0jXoqXz2ju2WlQN/M6A8FE vkXgCwd76ehNxwMCKFJ79xgzWAIQ9AR9B3aGg2T3Dt1m0KxO2vuVgbI24 phCQIrIL5CSi2RDs6Osm2/IesG07Xr3B92PAnX7AKj+pQKr5pIvtz3fFE lOUgR3SaEaoiJM+xC1fCrkj4UeVSKvki1cQK21/UNvN+IZjGHl/06lIU3 Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10655"; a="337571150" X-IronPort-AV: E=Sophos;i="5.98,277,1673942400"; d="scan'208";a="337571150" Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Mar 2023 22:24:29 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10655"; a="750397879" X-IronPort-AV: E=Sophos;i="5.98,277,1673942400"; d="scan'208";a="750397879" Received: from qiuxu-clx.sh.intel.com ([10.239.53.109]) by fmsmga004-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Mar 2023 22:24:26 -0700 From: Qiuxu Zhuo <qiuxu.zhuo@intel.com> To: paulmck@kernel.org Cc: dave@stgolabs.net, frederic@kernel.org, jiangshanlai@gmail.com, joel@joelfernandes.org, josh@joshtriplett.org, linux-kernel@vger.kernel.org, mathieu.desnoyers@efficios.com, qiuxu.zhuo@intel.com, quic_neeraju@quicinc.com, rcu@vger.kernel.org, rostedt@goodmis.org Subject: [PATCH v3 2/2] rcu/rcuscale: Stop kfree_scale_thread thread(s) after unloading rcuscale Date: Tue, 21 Mar 2023 13:23:37 +0800 Message-Id: <20230321052337.26553-2-qiuxu.zhuo@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20230321052337.26553-1-qiuxu.zhuo@intel.com> References: <72ba8619-88cb-4bf4-8232-18d8a1b6b5bf@paulmck-laptop> <20230321052337.26553-1-qiuxu.zhuo@intel.com> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1760239874467795146?= X-GMAIL-MSGID: =?utf-8?q?1760953899886545787?= |
Series |
[v3,1/2] rcu/rcuscale: Move rcu_scale_*() after kfree_scale_cleanup()
|
|
Commit Message
Qiuxu Zhuo
March 21, 2023, 5:23 a.m. UTC
When running the 'kfree_rcu_test' test case with commands [1] the call
trace [2] was thrown. This was because the kfree_scale_thread thread(s)
still run after unloading rcuscale and torture modules. Fix the call
trace by invoking kfree_scale_cleanup() from rcu_scale_cleanup() when
removing the rcuscale module.
[1] modprobe rcuscale kfree_rcu_test=1
// After some time
rmmod rcuscale
rmmod torture
[2] BUG: unable to handle page fault for address: ffffffffc0601a87
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 11de4f067 P4D 11de4f067 PUD 11de51067 PMD 112f4d067 PTE 0
Oops: 0010 [#1] PREEMPT SMP NOPTI
CPU: 1 PID: 1798 Comm: kfree_scale_thr Not tainted 6.3.0-rc1-rcu+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015
RIP: 0010:0xffffffffc0601a87
Code: Unable to access opcode bytes at 0xffffffffc0601a5d.
RSP: 0018:ffffb25bc2e57e18 EFLAGS: 00010297
RAX: 0000000000000000 RBX: ffffffffc061f0b6 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff962fd0de RDI: ffffffff962fd0de
RBP: ffffb25bc2e57ea8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
R13: 0000000000000000 R14: 000000000000000a R15: 00000000001c1dbe
FS: 0000000000000000(0000) GS:ffff921fa2200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffc0601a5d CR3: 000000011de4c006 CR4: 0000000000370ee0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? kvfree_call_rcu+0xf0/0x3a0
? kthread+0xf3/0x120
? kthread_complete_and_exit+0x20/0x20
? ret_from_fork+0x1f/0x30
</TASK>
Modules linked in: rfkill sunrpc ... [last unloaded: torture]
CR2: ffffffffc0601a87
---[ end trace 0000000000000000 ]---
Fixes: e6e78b004fa7 ("rcuperf: Add kfree_rcu() performance Tests")
Signed-off-by: Qiuxu Zhuo <qiuxu.zhuo@intel.com>
---
v1 -> v2:
- Move rcu_scale_cleanup() after kfree_scale_cleanup() to eliminate the
declaration of kfree_scale_cleanup().
- Remove the unnecessary step "modprobe torture" from the commit message.
- Add the description for why move rcu_scale_cleanup() after
kfree_scale_cleanup() to the commit message.
v2 -> v3:
- Split the single v2 patch into two patches.
- Move the commit message description for why move rcu_scale_cleanup()
after kfree_scale_cleanup() to Patch 1.
kernel/rcu/rcuscale.c | 5 +++++
1 file changed, 5 insertions(+)
Comments
On Tue, 21 Mar 2023, Qiuxu Zhuo wrote: >When running the 'kfree_rcu_test' test case with commands [1] the call >trace [2] was thrown. This was because the kfree_scale_thread thread(s) >still run after unloading rcuscale and torture modules. Fix the call >trace by invoking kfree_scale_cleanup() from rcu_scale_cleanup() when >removing the rcuscale module. > >[1] modprobe rcuscale kfree_rcu_test=1 > // After some time > rmmod rcuscale > rmmod torture > >[2] BUG: unable to handle page fault for address: ffffffffc0601a87 > #PF: supervisor instruction fetch in kernel mode > #PF: error_code(0x0010) - not-present page > PGD 11de4f067 P4D 11de4f067 PUD 11de51067 PMD 112f4d067 PTE 0 > Oops: 0010 [#1] PREEMPT SMP NOPTI > CPU: 1 PID: 1798 Comm: kfree_scale_thr Not tainted 6.3.0-rc1-rcu+ #1 > Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 > RIP: 0010:0xffffffffc0601a87 > Code: Unable to access opcode bytes at 0xffffffffc0601a5d. > RSP: 0018:ffffb25bc2e57e18 EFLAGS: 00010297 > RAX: 0000000000000000 RBX: ffffffffc061f0b6 RCX: 0000000000000000 > RDX: 0000000000000000 RSI: ffffffff962fd0de RDI: ffffffff962fd0de > RBP: ffffb25bc2e57ea8 R08: 0000000000000000 R09: 0000000000000000 > R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000 > R13: 0000000000000000 R14: 000000000000000a R15: 00000000001c1dbe > FS: 0000000000000000(0000) GS:ffff921fa2200000(0000) knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: ffffffffc0601a5d CR3: 000000011de4c006 CR4: 0000000000370ee0 > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > Call Trace: > <TASK> > ? kvfree_call_rcu+0xf0/0x3a0 > ? kthread+0xf3/0x120 > ? kthread_complete_and_exit+0x20/0x20 > ? ret_from_fork+0x1f/0x30 > </TASK> > Modules linked in: rfkill sunrpc ... [last unloaded: torture] > CR2: ffffffffc0601a87 > ---[ end trace 0000000000000000 ]--- > >Fixes: e6e78b004fa7 ("rcuperf: Add kfree_rcu() performance Tests") >Signed-off-by: Qiuxu Zhuo <qiuxu.zhuo@intel.com> Reviewed-by: Davidlohr Bueso <dave@stgolabs.net>
On Tue, Mar 21, 2023 at 08:47:51AM -0700, Davidlohr Bueso wrote: > On Tue, 21 Mar 2023, Qiuxu Zhuo wrote: > > > When running the 'kfree_rcu_test' test case with commands [1] the call > > trace [2] was thrown. This was because the kfree_scale_thread thread(s) > > still run after unloading rcuscale and torture modules. Fix the call > > trace by invoking kfree_scale_cleanup() from rcu_scale_cleanup() when > > removing the rcuscale module. > > > > [1] modprobe rcuscale kfree_rcu_test=1 > > // After some time > > rmmod rcuscale > > rmmod torture > > > > [2] BUG: unable to handle page fault for address: ffffffffc0601a87 > > #PF: supervisor instruction fetch in kernel mode > > #PF: error_code(0x0010) - not-present page > > PGD 11de4f067 P4D 11de4f067 PUD 11de51067 PMD 112f4d067 PTE 0 > > Oops: 0010 [#1] PREEMPT SMP NOPTI > > CPU: 1 PID: 1798 Comm: kfree_scale_thr Not tainted 6.3.0-rc1-rcu+ #1 > > Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 > > RIP: 0010:0xffffffffc0601a87 > > Code: Unable to access opcode bytes at 0xffffffffc0601a5d. > > RSP: 0018:ffffb25bc2e57e18 EFLAGS: 00010297 > > RAX: 0000000000000000 RBX: ffffffffc061f0b6 RCX: 0000000000000000 > > RDX: 0000000000000000 RSI: ffffffff962fd0de RDI: ffffffff962fd0de > > RBP: ffffb25bc2e57ea8 R08: 0000000000000000 R09: 0000000000000000 > > R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000 > > R13: 0000000000000000 R14: 000000000000000a R15: 00000000001c1dbe > > FS: 0000000000000000(0000) GS:ffff921fa2200000(0000) knlGS:0000000000000000 > > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > > CR2: ffffffffc0601a5d CR3: 000000011de4c006 CR4: 0000000000370ee0 > > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > > Call Trace: > > <TASK> > > ? kvfree_call_rcu+0xf0/0x3a0 > > ? kthread+0xf3/0x120 > > ? kthread_complete_and_exit+0x20/0x20 > > ? ret_from_fork+0x1f/0x30 > > </TASK> > > Modules linked in: rfkill sunrpc ... [last unloaded: torture] > > CR2: ffffffffc0601a87 > > ---[ end trace 0000000000000000 ]--- > > > > Fixes: e6e78b004fa7 ("rcuperf: Add kfree_rcu() performance Tests") > > Signed-off-by: Qiuxu Zhuo <qiuxu.zhuo@intel.com> > > Reviewed-by: Davidlohr Bueso <dave@stgolabs.net> Much better, thank you both! But unfortunately, these patches do not apply cleanly. Qiuxu Zhuo, could you please forward port these to the -rcu "dev" branch [1]? Thanx, Paul [1] https://mirrors.edge.kernel.org/pub/linux/kernel/people/paulmck/rcutodo.html
On Tue, Mar 21, 2023 at 3:24 PM Paul E. McKenney <paulmck@kernel.org> wrote: > > On Tue, Mar 21, 2023 at 08:47:51AM -0700, Davidlohr Bueso wrote: > > On Tue, 21 Mar 2023, Qiuxu Zhuo wrote: > > > > > When running the 'kfree_rcu_test' test case with commands [1] the call > > > trace [2] was thrown. This was because the kfree_scale_thread thread(s) > > > still run after unloading rcuscale and torture modules. Fix the call > > > trace by invoking kfree_scale_cleanup() from rcu_scale_cleanup() when > > > removing the rcuscale module. > > > > > > [1] modprobe rcuscale kfree_rcu_test=1 > > > // After some time > > > rmmod rcuscale > > > rmmod torture > > > > > > [2] BUG: unable to handle page fault for address: ffffffffc0601a87 > > > #PF: supervisor instruction fetch in kernel mode > > > #PF: error_code(0x0010) - not-present page > > > PGD 11de4f067 P4D 11de4f067 PUD 11de51067 PMD 112f4d067 PTE 0 > > > Oops: 0010 [#1] PREEMPT SMP NOPTI > > > CPU: 1 PID: 1798 Comm: kfree_scale_thr Not tainted 6.3.0-rc1-rcu+ #1 > > > Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 > > > RIP: 0010:0xffffffffc0601a87 > > > Code: Unable to access opcode bytes at 0xffffffffc0601a5d. > > > RSP: 0018:ffffb25bc2e57e18 EFLAGS: 00010297 > > > RAX: 0000000000000000 RBX: ffffffffc061f0b6 RCX: 0000000000000000 > > > RDX: 0000000000000000 RSI: ffffffff962fd0de RDI: ffffffff962fd0de > > > RBP: ffffb25bc2e57ea8 R08: 0000000000000000 R09: 0000000000000000 > > > R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000 > > > R13: 0000000000000000 R14: 000000000000000a R15: 00000000001c1dbe > > > FS: 0000000000000000(0000) GS:ffff921fa2200000(0000) knlGS:0000000000000000 > > > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > > > CR2: ffffffffc0601a5d CR3: 000000011de4c006 CR4: 0000000000370ee0 > > > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > > > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > > > Call Trace: > > > <TASK> > > > ? kvfree_call_rcu+0xf0/0x3a0 > > > ? kthread+0xf3/0x120 > > > ? kthread_complete_and_exit+0x20/0x20 > > > ? ret_from_fork+0x1f/0x30 > > > </TASK> > > > Modules linked in: rfkill sunrpc ... [last unloaded: torture] > > > CR2: ffffffffc0601a87 > > > ---[ end trace 0000000000000000 ]--- > > > > > > Fixes: e6e78b004fa7 ("rcuperf: Add kfree_rcu() performance Tests") > > > Signed-off-by: Qiuxu Zhuo <qiuxu.zhuo@intel.com> > > > > Reviewed-by: Davidlohr Bueso <dave@stgolabs.net> > > Much better, thank you both! > > But unfortunately, these patches do not apply cleanly. Qiuxu Zhuo, > could you please forward port these to the -rcu "dev" branch [1]? After making it cleanly apply: Reviewed-by: Joel Fernandes (Google) <joel@joelfernandes.org> thanks, - Joel > > Thanx, Paul > > [1] https://mirrors.edge.kernel.org/pub/linux/kernel/people/paulmck/rcutodo.html
> From: Paul E. McKenney <paulmck@kernel.org> > [...] > > > Fixes: e6e78b004fa7 ("rcuperf: Add kfree_rcu() performance Tests") > > > Signed-off-by: Qiuxu Zhuo <qiuxu.zhuo@intel.com> > > > > Reviewed-by: Davidlohr Bueso <dave@stgolabs.net> > > Much better, thank you both! > > But unfortunately, these patches do not apply cleanly. Qiuxu Zhuo, could > you please forward port these to the -rcu "dev" branch [1]? > Hi Paul, OK. I'll be making v4 patches rebased on the top of the -rcu "dev" branch. Thanks for letting me know more about the RCU patch workflow. Also thank you Davidlohr Bueso and Joel for reviewing the patches. - Qiuxu > Thanx, Paul > > [1] > https://mirrors.edge.kernel.org/pub/linux/kernel/people/paulmck/rcutodo. > html
On Tue, Mar 21, 2023 at 9:26 PM Zhuo, Qiuxu <qiuxu.zhuo@intel.com> wrote: > > > From: Paul E. McKenney <paulmck@kernel.org> > > [...] > > > > Fixes: e6e78b004fa7 ("rcuperf: Add kfree_rcu() performance Tests") > > > > Signed-off-by: Qiuxu Zhuo <qiuxu.zhuo@intel.com> > > > > > > Reviewed-by: Davidlohr Bueso <dave@stgolabs.net> > > > > Much better, thank you both! > > > > But unfortunately, these patches do not apply cleanly. Qiuxu Zhuo, could > > you please forward port these to the -rcu "dev" branch [1]? > > > > Hi Paul, > > OK. > I'll be making v4 patches rebased on the top of the -rcu "dev" branch. > Thanks for letting me know more about the RCU patch workflow. > > Also thank you Davidlohr Bueso and Joel for reviewing the patches. You're welcome and thanks for your interactions on the mailing list and RCU interest. :-) - Joel
diff --git a/kernel/rcu/rcuscale.c b/kernel/rcu/rcuscale.c index e99096a4f094..5a000d26f03e 100644 --- a/kernel/rcu/rcuscale.c +++ b/kernel/rcu/rcuscale.c @@ -797,6 +797,11 @@ rcu_scale_cleanup(void) if (gp_exp && gp_async) SCALEOUT_ERRSTRING("No expedited async GPs, so went with async!"); + if (kfree_rcu_test) { + kfree_scale_cleanup(); + return; + } + if (torture_cleanup_begin()) return; if (!cur_ops) {