Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1033145imm; Wed, 10 Oct 2018 08:09:52 -0700 (PDT) X-Google-Smtp-Source: ACcGV61IijuGobjfWzm7C6jnloHyaWFhwn+iP+Deqf4lDQp7uLdIAdvacIa1eE7gdV18sCdGO6X0 X-Received: by 2002:a63:5605:: with SMTP id k5-v6mr30190284pgb.189.1539184192529; Wed, 10 Oct 2018 08:09:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539184192; cv=none; d=google.com; s=arc-20160816; b=IWjQAE0WMnDU3+oXly96A0eOAsMFBYrsjTOlennNsF4D4AceRLB8JkoeMyxNXN6sdz gqsviF2Xds31A/KKNFlhb4YkoSI+LleiZQ8nYNYg10YqWzsm7D6NOT1ktjwFcdewpW42 HPQQ3PRgz9Y9od+cgxkGR2ZLGzVvcgI+sOc4BM5jJQNHVUvXTDO/mkkya+OPJ/x9cYPG NzWKRDV4PWixqoyG6jM7sd+yzBsFCXtzrJgz/gQX1KjewgJi5QohFEFDMmqZFN0t/hmj W/9etIYo4kjb4FkOfDWQc7+va5GI1Bu1JDlibexQKdu0CIzwrG4C/QsSCFZXJgJ0esMC EZDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:date:message-id:from :references:cc:to:subject:dkim-signature; bh=YegHVM7DqawRuc0xkrr8YgLxRPBZmWJfnOD9RUSve4s=; b=BgR6fuRitpELupEAlauDsjylrjW3JVopkTHmCFOlrhuJceqCa9cxvPzhflzDJxjbap eCzg9fidfrhfzfmVnJjy/wAIqsB2wr2zyNSwC0HjaZBzQeIR2r8ir539UHfw+tyHBM6x h9F1VzEvfOFveHpKn9hrfLVyCxl+NaXDQEm7LdQ9yXR0/zHW6MJYrGn2yMScu2rBwtpH KEIAvQxfa87x+mU1IRKueJVKsvGAsVWoD+XnQ/QUZUMpxDwtA0o4F6iK1Km/tZn8t/9K VNXYXOSQRTbKG2WKoCj6Wkgtet/5gQMaqt0cI9t1uS0MkbCCSRtmD+dEpzBTRzu/CVoq /Wgg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2018-07-02 header.b="UMbUM0M/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n34-v6si24598519pld.311.2018.10.10.08.09.36; Wed, 10 Oct 2018 08:09:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2018-07-02 header.b="UMbUM0M/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726761AbeJJWbt (ORCPT + 99 others); Wed, 10 Oct 2018 18:31:49 -0400 Received: from userp2120.oracle.com ([156.151.31.85]:55952 "EHLO userp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726503AbeJJWbt (ORCPT ); Wed, 10 Oct 2018 18:31:49 -0400 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w9AEx5Tw025207; Wed, 10 Oct 2018 15:09:09 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=corp-2018-07-02; bh=YegHVM7DqawRuc0xkrr8YgLxRPBZmWJfnOD9RUSve4s=; b=UMbUM0M/dlV3SWxWuTwIhyq8IeZ2Y4jL5m6PXF/9cLNTw+xonP1j0UydNQn4LRFv0vUy 1zzU79Ow/geKZZwjVMgBK3aRIOGrE9OSSTFM45d7bCrj7mqsK4EI/I7Io8oGqPwkAbXJ AQUx6KRP3J3W8CVdaTtMBbrCYzlaN/NxJJ1mO7tGnhMh3l/jP4eaZeLAu/dkaz1KStba ZhlzptKPibPyyiepCjPEaXrg20lBCJu7F3/1mcL1qjMQZTvaGULcHjpL2+THE313yEms +v7LKh1Q6XsZxPRU458QdII5c4y68r4yEPr2G73bHgV8bemxXvUhBhh83UDQoxeosyrz Zw== Received: from aserv0022.oracle.com (aserv0022.oracle.com [141.146.126.234]) by userp2120.oracle.com with ESMTP id 2mxnpr4kny-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 10 Oct 2018 15:09:08 +0000 Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by aserv0022.oracle.com (8.14.4/8.14.4) with ESMTP id w9AF97Cc013241 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 10 Oct 2018 15:09:07 GMT Received: from abhmp0016.oracle.com (abhmp0016.oracle.com [141.146.116.22]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w9AF96QB005048; Wed, 10 Oct 2018 15:09:07 GMT Received: from [10.175.193.46] (/10.175.193.46) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 10 Oct 2018 15:09:06 +0000 Subject: Re: [Xen-devel] [PATCH] xen: drop writing error messages to xenstore To: Juergen Gross Cc: linux-kernel@vger.kernel.org, xen-devel@lists.xenproject.org, boris.ostrovsky@oracle.com References: <20181009160959.31076-1-jgross@suse.com> From: Joao Martins Message-ID: <5126873e-ade5-86b0-4ebf-58cb47c9cbe7@oracle.com> Date: Wed, 10 Oct 2018 16:09:02 +0100 MIME-Version: 1.0 In-Reply-To: <20181009160959.31076-1-jgross@suse.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=9041 signatures=668706 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=1 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1810100149 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/09/2018 05:09 PM, Juergen Gross wrote: > xenbus_va_dev_error() will try to write error messages to Xenstore > under the error//error node (with something like > "device/vbd/51872"). This will fail normally and another message > about this failure is added to dmesg. > > I believe this is a remnant from very ancient times, as it was added > in the first pvops rush of commits in 2007. > > So remove the additional message when writing to Xenstore failed as > a minimum step. > > Signed-off-by: Juergen Gross > --- > I am considering removing the Xenstore write altogether, but I'm > not sure it isn't needed e.g. by xend based installations. So please > speak up in case you know why this write is there. So this: "This will fail normally and another message about this failure is added to dmesg." Brings me to the question: What about {stub,driver}domains? Ideally you shouldn't be looking at domU's dmesg as a control domain no? I can't remember any other error node, but if something fails e.g. netfront fails to allocate an unbound event channel - how do you know the cause from the control domain perspective? Irrespective of xend or not: isn't this 'error' node the only one that propagates error causes per device from domU? Joao > --- > drivers/xen/xenbus/xenbus_client.c | 6 ++---- > 1 file changed, 2 insertions(+), 4 deletions(-) > > diff --git a/drivers/xen/xenbus/xenbus_client.c b/drivers/xen/xenbus/xenbus_client.c > index a1c17000129b..e17ca8156171 100644 > --- a/drivers/xen/xenbus/xenbus_client.c > +++ b/drivers/xen/xenbus/xenbus_client.c > @@ -278,10 +278,8 @@ static void xenbus_va_dev_error(struct xenbus_device *dev, int err, > dev_err(&dev->dev, "%s\n", printf_buffer); > > path_buffer = kasprintf(GFP_KERNEL, "error/%s", dev->nodename); > - if (!path_buffer || > - xenbus_write(XBT_NIL, path_buffer, "error", printf_buffer)) > - dev_err(&dev->dev, "failed to write error node for %s (%s)\n", > - dev->nodename, printf_buffer); > + if (path_buffer) > + xenbus_write(XBT_NIL, path_buffer, "error", printf_buffer); > > kfree(printf_buffer); > kfree(path_buffer); >