Received: by 10.192.165.148 with SMTP id m20csp358791imm; Thu, 3 May 2018 22:17:40 -0700 (PDT) X-Google-Smtp-Source: AB8JxZq+Bw3U92C8HfQ0136T+aSZmEDnvKoNQKF8McyJvQL218UQNJdf4sUcwMnrakAWWHi7Ml2d X-Received: by 10.98.147.66 with SMTP id b63mr25667579pfe.130.1525411060864; Thu, 03 May 2018 22:17:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525411060; cv=none; d=google.com; s=arc-20160816; b=0YB5Sf0T76G+mbERvMMxgAk4cESZN/sD91DZvEA8pN5VRGoCUQVXeBxin7m3/yElHS 3JzXruV/WuSLJWrd9F7euvwq3dGdo6gMvfV03K1ZzR5HLsN4x0F7jqX+YIYNJlIIGJRU xl7YvUeDEm/KlOeJhco2PB99smh6pKHckZW3TmAa4ZuaWKWMQG7awZQMgCYi5YuveNGj xkyuYUVttWOomYgNU/fDgwPuY2DWYDQyYLyo+tDU+EK+ayKMqaLFKpQaNG00HlPB/zWQ Uhr7sN0qErXYmIEBm07/g9KNid2EsDYRfs0Wpm2UYgdeBptrLUSFlIjclmqSoOr3YQoo GtNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:arc-authentication-results; bh=y1VmhAjGWJE4X/8MyTt1HOKuHBNHNBtzJmn4AgyDf7w=; b=q1nKtuFoK52pG7CyrRQEcidh18920x2f1wCd5OA/DbCsbbTz/sdPNOKfW4rbyVtNEh r5eB0wLD7ZwXRXaDTuaWxrEicwDse2ce+QjgNIsnKJe2lEGCSecAlPZPka88M/YHs6eB iTm9B6gE+xLpA11lyMsFDpGrLb3CgEnDdEOSrF6Qi76Eq+jmbikiK2merUI2QdMU1Kde eqBNpQg5HkO9bGD9TY+xFj4SJ+T+/7E08WuqSUPCbXjE/TsDUAs751MinPTDWY54/f05 HuKiCJD99FiyP9/4O2v9OPDh5hTMxbdNGkwvw3fABmGCry+7xwB3PbtaLb0sR+g82pAH SOQQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 24si2177296pfj.6.2018.05.03.22.17.26; Thu, 03 May 2018 22:17:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751343AbeEDFQs (ORCPT + 99 others); Fri, 4 May 2018 01:16:48 -0400 Received: from ozlabs.org ([203.11.71.1]:36513 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750946AbeEDFQr (ORCPT ); Fri, 4 May 2018 01:16:47 -0400 Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPSA id 40cgH04sN3z9s27; Fri, 4 May 2018 15:16:44 +1000 (AEST) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=ellerman.id.au From: Michael Ellerman To: Nicholas Piggin , linuxppc-dev@lists.ozlabs.org Cc: Jiri Slaby , linux-kernel@vger.kernel.org, Nicholas Piggin , Greg Kroah-Hartman Subject: Re: [PATCH 04/15] powerpc/powernv: opal-kmsg use flush fallback from console code In-Reply-To: <20180430145558.4308-5-npiggin@gmail.com> References: <20180430145558.4308-1-npiggin@gmail.com> <20180430145558.4308-5-npiggin@gmail.com> Date: Fri, 04 May 2018 15:16:37 +1000 Message-ID: <87muxg80ga.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Nicholas Piggin writes: > Use the more refined and tested event polling loop from opal_put_chars > as the fallback console flush in the opal-kmsg path. This loop is used > by the console driver today, whereas the opal-kmsg fallback is not > likely to have been used for years. > > Use WARN_ONCE rather than a printk when the fallback is invoked to > prepare for moving the console flush into a common function. Do we want to add a WARN in that path? If we're panicking things might get worse if we WARN (which takes a trap). cheers