Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp724558ybx; Fri, 1 Nov 2019 10:13:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqyd9gvELG840eerGLyV4/apL7IzAjUCgaPjWXLANjKVZizB3eMkN5yGuePb5jlL2U5ADDIi X-Received: by 2002:a17:906:8141:: with SMTP id z1mr11088667ejw.128.1572628389476; Fri, 01 Nov 2019 10:13:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572628389; cv=none; d=google.com; s=arc-20160816; b=RoryDHSeXrbna8o7eK/RryGsKildRUmFxeAo2ZpikIRGhmP36xmAjk/W1nJS3KF1Mr Ud6Wow45pWLwBvNxZt4HDttDdYRKgC6pgf6uXna7DY4Bn6FVOkqJ4+nZug64DsbMig4n BkOsHkqaSwlraYkW6R1ob31eR4nU+xzEJEGtnU2EyozLxfzU6Smoa8Mk6QirIQ/81Knl V9/zqnTgmX9RzqBDj8xEM1OlCEcs38xB6e6megCHGE12uVDE/Wc2fxguXg7NhT/fy3YT Dz98fJ7PbJLgZFuuAlBToHmrZzG9W8uqce46OOxbga8VLApIkR3RsrI9xJg686cZP6fp 06Pw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=vU6VGS46rfg0BH1qVh/1bYvbh3G5urqXBMKadSJ/iro=; b=NjmoB0eDVOdVMKrkZJlq03YgwpW0Zr06K87lGMa04BJFL+tQGoqXdF6qDKoJt66MFY YfVmjtJFocPHudIqOAbdAnW/tep1b9cUhFn3de5mnay2U/v8VTqQSvnkS+25EYwFOM7Z RgIe1JZVo5CxKib+vGcSsoQuVlLXHF2xezWmXEGhctTe2gzSh8A+2fC0qqatGRtD936H SbES8bI5cN5S7mWv050YGyJPmSlCANLnXxInCd3RekcmX5DMZFJkdKBsDL80J5oDe0H/ kSJqn4aZembgvu8UGieex4D5dSevQBqeENZcfD4QLG2gNhz8gjY+pmgbujclO8FWzfqi u/Qw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b="CEtN9CI/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v9si974479edl.90.2019.11.01.10.12.45; Fri, 01 Nov 2019 10:13:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b="CEtN9CI/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729093AbfKAPyZ (ORCPT + 99 others); Fri, 1 Nov 2019 11:54:25 -0400 Received: from mail.skyhub.de ([5.9.137.197]:52652 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727123AbfKAPyY (ORCPT ); Fri, 1 Nov 2019 11:54:24 -0400 Received: from nazgul.tnic (unknown [46.218.74.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 25F2B1EC0AD6; Fri, 1 Nov 2019 16:54:23 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=dkim; t=1572623663; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=vU6VGS46rfg0BH1qVh/1bYvbh3G5urqXBMKadSJ/iro=; b=CEtN9CI/TgQxUo/VD7Kqn6nOrA9q5B2ao4s5aCW7j8Qmsw2QNYdFSTuignxxD4ju5GyXO1 hARQDoV7vZMX0kTTW7dteByHvEglKiVCfP9rVcQrrcC+jOoW+j7ltgLDCr/6hbGrW0bwaB f2yNmiSyVSHHwMhuqmWXAJiDj4yt18Y= Date: Fri, 1 Nov 2019 16:54:12 +0100 From: Borislav Petkov To: "Ghannam, Yazen" Cc: "linux-edac@vger.kernel.org" , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH v2 0/6] AMD64 EDAC: Check for nodes without memory, etc. Message-ID: <20191101155412.GA2300@nazgul.tnic> References: <20191022203448.13962-1-Yazen.Ghannam@amd.com> <20191025133456.GA6483@zn.tnic> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Nov 01, 2019 at 03:19:36PM +0000, Ghannam, Yazen wrote: > Is the module being probed twice? We have this problem in general, e.g. the > module gets loaded multiple times on failure. Yap, it looks like it. > The clue for me is that node 0 gets detected twice. This is done in > per_family_init() early in probe_one_instance(). > > In any case, I think we can make !ecc_enabled(pvt) in probe_one_instance() a > failure now that we have an explicit check for memory on a node. In other > words, if we have memory and ECC is disabled then this is a failure for the > module. Yeah, for that case we should be printing ecc_msg. Makes sense. Thx. -- Regards/Gruss, Boris. ECO tip #101: Trim your mails when you reply. --