From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8C86DEB64DD for ; Thu, 3 Aug 2023 16:08:34 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236262AbjHCQId (ORCPT ); Thu, 3 Aug 2023 12:08:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49484 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235750AbjHCQIb (ORCPT ); Thu, 3 Aug 2023 12:08:31 -0400 Received: from mail-qk1-x734.google.com (mail-qk1-x734.google.com [IPv6:2607:f8b0:4864:20::734]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 33D1C1BF6 for ; Thu, 3 Aug 2023 09:08:30 -0700 (PDT) Received: by mail-qk1-x734.google.com with SMTP id af79cd13be357-76c4890a220so84117185a.3 for ; Thu, 03 Aug 2023 09:08:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cmpxchg-org.20221208.gappssmtp.com; s=20221208; t=1691078909; x=1691683709; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=+XToHAF3Tp6ttDMOwj4eUjXmrH43hQkGliAE52bu3OI=; b=nwBfuP1EF89+aISDQLUPsPs557pMHRTYHh/moPt/GEUf3VZSegFJN2WLjwtOxNaeVr tELhzCnpQiVVzn/p9TxTM40ypLAI9Wl8Dm00Ma0u6gCG9cYdJZyEwo/8Du3Xb48kiI3S aj+mMtHg5P4dd9nwwPCbs602BbZueBi9x/ZXCX+ClObKOCBNOJ2QGS2u1cys65T6jh4F sdy7Pm6FD7EqT02Lj5dytAzyu/Lm8M/yCK7CYer/QhZjZ1QXAsA3k1m/WtIhfHYpfDaQ JTwBdRXqxtir8UKBvShgRNW5OjaHl24g01HNtAzPqjO+63i2Pwtjedb13yOisZI7uZQ1 KP1A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1691078909; x=1691683709; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=+XToHAF3Tp6ttDMOwj4eUjXmrH43hQkGliAE52bu3OI=; b=Ki32I3zPtQP+q5mCQQzGdb3uVq9L2cQejuRKxpPHhrYFgSMFhs7J7pToG45ax+OSC5 JuN5AvCVKjmp8xfw1jfqEJ4xMaVHTW+zkpcn/C9Q8Blu5VsuBDK2YHbhwGrIMsvINicD C/2R6g72jVwBS+vHyeVjyzXeyWkEM3RfKx2OgyF5OSw1dy++0928P/r1TPx61o+P4jY1 Wi9zK6l9/ysv96u5gvSVHEi81txWyNpXfm1OZf8JkHjhBmxs52MjsqS8jp3dwqwo0LI3 7uELxGtV0pHHE/4RNffN0dAQyvfiWNYd0bOrJSEK+yIlOpSz2eNhaSUFrWC2bNE73rOk Sxhw== X-Gm-Message-State: ABy/qLY61AuzIAF5yyOTtl5+ZOpewyUEaB8KXTb5DSVX/TA3bwSnxTCi 6+FTCLjGWzfTVj4mG9MyV3ujDmy/YcR3IBHlMr8rtw== X-Google-Smtp-Source: APBJJlE/HITWbFDhpZ/D5lR41JynAMCPkaudsb/XHWlqv+SykPhRMLbLhtMkySOs7sEOxK1mOiRSuw== X-Received: by 2002:a37:5a05:0:b0:767:2471:c880 with SMTP id o5-20020a375a05000000b007672471c880mr18403599qkb.28.1691078909290; Thu, 03 Aug 2023 09:08:29 -0700 (PDT) Received: from localhost ([2620:10d:c091:400::5:9910]) by smtp.gmail.com with ESMTPSA id g16-20020ae9e110000000b0076cb0ed2d7asm14050qkm.24.2023.08.03.09.08.28 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 03 Aug 2023 09:08:29 -0700 (PDT) Date: Thu, 3 Aug 2023 12:08:28 -0400 From: Johannes Weiner To: Lucas Karpinski Cc: Michal Hocko , Roman Gushchin , Shakeel Butt , Muchun Song , Tejun Heo , Zefan Li , Shuah Khan , cgroups@vger.kernel.org, linux-mm@kvack.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] selftests: cgroup: fix test_kmem_basic slab1 check Message-ID: <20230803160828.GA223746@cmpxchg.org> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kselftest@vger.kernel.org On Thu, Aug 03, 2023 at 12:00:47PM -0400, Lucas Karpinski wrote: > test_kmem_basic creates 100,000 negative dentries, with each one mapping > to a slab object. After memory.high is set, these are reclaimed through > the shrink_slab function call which reclaims all 100,000 entries. The > test passes the majority of the time because when slab1 is calculated, > it is often above 0, however, 0 is also an acceptable value. > > Signed-off-by: Lucas Karpinski Acked-by: Johannes Weiner > @@ -71,7 +71,7 @@ static int test_kmem_basic(const char *root) > > cg_write(cg, "memory.high", "1M"); > slab1 = cg_read_key_long(cg, "memory.stat", "slab "); > - if (slab1 <= 0) > + if (slab1 < 0) > goto cleanup; This conflicts with a recent patch already queued up in -mm: selftests: cgroup: fix test_kmem_basic false positives which adds a sleep(1) between cg_write() and cg_read_key_long(). Can you please rebase on top of git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm.git mm-unstable and re-send the patch with To: Andrew Morton ? Thanks