Received: by 10.223.176.46 with SMTP id f43csp723022wra; Fri, 19 Jan 2018 00:43:17 -0800 (PST) X-Google-Smtp-Source: ACJfBouK4vCuMCLCN6G4hPS2or6qrIiOnovnWpT9LsVaTUF4t4XLRY3jGpnb1gj/Z8LZZsBMkEo8 X-Received: by 10.98.163.79 with SMTP id s76mr39421784pfe.67.1516351397865; Fri, 19 Jan 2018 00:43:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516351397; cv=none; d=google.com; s=arc-20160816; b=mycJkm190/REmUm2dO94aBKQEpJlqvEHMrQnfOffOMtUV7mUMW/v+eGpK+1sGPtNcE YoV+rm+yISnDg9hJrSbJRls5cg8x3Kxm0dv4ehpvNNZKUsKmS8DtlOzZ8QygkF67oJ5r Wf69uJV3areBxR9/chjFv7a7Tgd4lbV3AKXJUl+rtgka69p5GboEb3FMMIks4NVlbIfc yTuD4kvkwFt94TPKkPdftoNdBULX8pG4dbbl0MIcQBkWcXdTlFZt2zfHcppcja8p2HLA QObagRZSagqd0vbN+ETMC14IzYkBd1nAfdn3QyzAqgoVAhuysBgu/V/I1w7BrBLlGNDG Kc8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=dgV7OTT1h3aCFr9Hkkl8/kHQwHrtAXlU/TwJdQKGZyM=; b=EIY2GH4a70YkTOpHEzYq5VYg4JZX+N9giBWgsFnD6p4vJFtn9G+MvpMny0jQq+hCaZ ZTZmz4+Me8m2KhwpxRiFEujHthqvgPxrhk7FyaqyUZRb1PeNQtpkgcZpzFIETF9FzSFN pBXbRcbum8VvQWO0Zgi+5VmhCYh4tqDs4jXEcb3EIIbbuzkz5fKbNgtfbyjAjA7002Y1 XkfM6PNMCbdIVLbWy/ZbCbTfT3zuTj3AYd3CTSD+Q7i2iyDCj/1lcvvi7taFX43hQwJs Td6H6j2P+nVGcsgIQlBvDdcDsYAQC+FkIpUYwjT9dfM2sBrXVJPGtZrfY2F49o99RQDo 2Xpg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a2si8754706pfa.307.2018.01.19.00.43.03; Fri, 19 Jan 2018 00:43:17 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754910AbeASIme (ORCPT + 99 others); Fri, 19 Jan 2018 03:42:34 -0500 Received: from mx1.redhat.com ([209.132.183.28]:42892 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754070AbeASIma (ORCPT ); Fri, 19 Jan 2018 03:42:30 -0500 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id CB68882A; Fri, 19 Jan 2018 08:42:30 +0000 (UTC) Received: from dhcp-128-65.nay.redhat.com (ovpn-12-45.pek2.redhat.com [10.72.12.45]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 560CD6046B; Fri, 19 Jan 2018 08:42:27 +0000 (UTC) Date: Fri, 19 Jan 2018 16:42:23 +0800 From: Dave Young To: Sergey Senozhatsky Cc: Andi Kleen , pmladek@suse.com, sergey.senozhatsky@gmail.com, rostedt@goodmis.org, linux-kernel@vger.kernel.org, akpm@linux-foundation.org, kexec@lists.infradead.org Subject: Re: [PATCH] print kdump kernel loaded status in stack dump Message-ID: <20180119084223.GC3985@dhcp-128-65.nay.redhat.com> References: <20180117045057.GA4994@dhcp-128-65.nay.redhat.com> <878tcvt592.fsf@linux.intel.com> <20180119054538.GA484@jagdpanzerIV> <20180119081628.GB3985@dhcp-128-65.nay.redhat.com> <20180119082835.GA477@jagdpanzerIV> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180119082835.GA477@jagdpanzerIV> User-Agent: Mutt/1.9.1 (2017-09-22) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.29]); Fri, 19 Jan 2018 08:42:30 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/19/18 at 05:28pm, Sergey Senozhatsky wrote: > On (01/19/18 16:16), Dave Young wrote: > > On 01/19/18 at 02:45pm, Sergey Senozhatsky wrote: > > > On (01/18/18 10:02), Andi Kleen wrote: > > > > Dave Young writes: > > > > > printk("%sHardware name: %s\n", > > > > > log_lvl, dump_stack_arch_desc_str); > > > > > + if (kexec_crash_loaded()) > > > > > + printk("%skdump kernel loaded\n", log_lvl); > > > > > > > > Oops/warnings are getting longer and longer, often scrolling away > > > > from the screen, and if the kernel crashes backscroll does not work > > > > anymore, so precious information is lost. > > > > > > true. I even ended up having a console_reflush_on_panic() function. it > > > simply re-prints with a delay [so I can at least read the oops] logbuf > > > entries every once in a while, staring with the first oops_in_progress > > > record. > > > > > > > If too many messages printed on screen, then the next flush will > > still scroll up. > > right. but it re-prints Oops with a new console_unlock_delay() delay > which gives me enough time to either read it as many times as I want, > or take a picture, etc. it's not as fast as the normal oops print out. > > [I'm not entirely sure I see why do we have printk_delay() in > vprintk_emit()... I mean I probably can see some reasoning behind > it, but at the same it makes sense to slow down console_unlock() > as well] Looks like I am the guy who added the code :) Actually no special reason, just did not thinking about the performance issue at all at that time.. > > -ss