Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp571553pxk; Wed, 16 Sep 2020 11:04:44 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx4lT/Mok58VatL1yV73BLa7GmpLxzw2McuQ54vm7il/K70zit86gWpa56ZMeZZ9Wor2Mcs X-Received: by 2002:a17:906:60d3:: with SMTP id f19mr27664708ejk.141.1600279484200; Wed, 16 Sep 2020 11:04:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600279484; cv=none; d=google.com; s=arc-20160816; b=PsqXHxGErrbK3cBoa7lV9toJ+BjGMJZvQ6IwMTFcb0oFGDYvpUR4A35MqB8zVcLG5J TcitNg0IkMBtGofs2qPWK/KO7DofZWbHHED9vqSS4gam8Sz23o5Qmrx5uAPr24c6aI/G ezAoSM19TZk6kIVE2duj1saKgTRchzmRVs4HI4msBJMtoZ9ZYsSt8lu7JwJeA2kKdJx4 YwuzCv+8BAn4uLIrU+Q38EoAnyEUvPBJUcSg77qbohOG8hPidUFLaeHPZIPFBjiLytDX S2St0ladtjpqZ6jtO5ancMvb+40CGuCJmBvDbjpykBHzOF9GquDFMmSP1DBwHCrDXykj 44PQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=FrijnZ++rj0k/IqV96hiu8ZebrR8YvyqhTAImP6pnfc=; b=B4j4j+pg+MqHJbgffXT2wH4n1G+6fb8iyCXvxT4RNQdinLvYUXeXAM6PPfTmSIV1Ro +BQf7A4WBogqwNb86suR2LYNwwUgp5YuFlgxb3HclOTvsvVnqVXgbU02JPAV0ud7xCt/ eLV8NJtaTKqbZytvaXGjkfY7fkZXkmqcCgy2pjOhvBOaVhtp41x0//tI4yDhFuG7EoLU 32Db38dCUfGBRtUWTTphk63ofsQv/KTM7zYcjzkGTktEdBoCHGfmORZxSFYLSX0aWm7Y FoD79556vSwCH0sxKW9epIcpMBu04NdnSysE7R5Wrc53tM6wv75icRjcLJ+AQ66djc3o 6r+Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p21si12803091edq.151.2020.09.16.11.04.21; Wed, 16 Sep 2020 11:04:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727731AbgIPSBO (ORCPT + 99 others); Wed, 16 Sep 2020 14:01:14 -0400 Received: from lobo.ruivo.org ([173.14.175.98]:34564 "EHLO lobo.ruivo.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727621AbgIPR6n (ORCPT ); Wed, 16 Sep 2020 13:58:43 -0400 Received: by lobo.ruivo.org (Postfix, from userid 1011) id 4FFC1534C1; Wed, 16 Sep 2020 13:58:36 -0400 (EDT) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tate.lan.ruivo X-Spam-Level: X-Spam-Status: No, score=-2.9 required=3.5 tests=ALL_TRUSTED,BAYES_00 autolearn=ham autolearn_force=no version=3.4.2 Received: from jake.ruivo.org (bob.qemu.ruivo [192.168.72.19]) by lobo.ruivo.org (Postfix) with ESMTPA id 33C0752DA4; Wed, 16 Sep 2020 13:58:14 -0400 (EDT) Received: by jake.ruivo.org (Postfix, from userid 1000) id 06FC71A1A61; Wed, 16 Sep 2020 13:58:14 -0400 (EDT) Date: Wed, 16 Sep 2020 13:58:14 -0400 From: Aristeu Rozanski To: osalvador@suse.de Cc: naoya.horiguchi@nec.com, akpm@linux-foundation.org, mhocko@kernel.org, tony.luck@intel.com, cai@lca.pw, linux-kernel@vger.kernel.org, linux-mm@kvack.org Subject: Re: [PATCH v3 0/5] HWpoison: further fixes and cleanups Message-ID: <20200916175813.GD17169@cathedrallabs.org> References: <20200914101559.17103-1-osalvador@suse.de> <20200915212222.GA18315@cathedrallabs.org> <20200916072658.GA10692@linux> <20200916135358.GB17169@cathedrallabs.org> <20200916140921.GA17949@linux> <20200916144603.GC17169@cathedrallabs.org> <9bd7ac81968a7897474804d53bfc1286@suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Sep 16, 2020 at 06:34:52PM +0200, osalvador@suse.de wrote: > Fat fingers, sorry: > > Ok, this is something different. > The race you saw previously is kinda normal as there is a race window > between spotting a freepage and taking it off the buddy freelists. > The retry patch should help there. > > The issue you are seeing right here is due to the call to > page_handle_poison in __soft_offline_page being wrong, as we pass > hugepage_or_freepage = true inconditionally, which is wrong. > I think it was caused during rebasing. > > Should be: Tests passed with this patch on top of others. Thanks! -- Aristeu