Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp4902020iob; Mon, 9 May 2022 04:28:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwiMAaoaRGvK6btDUBij9hVN6wlwOrdwICS0T5bUJzlN/r23PsgzHkgRPxFEX/7CqDlo/1z X-Received: by 2002:a17:90a:c002:b0:1d9:250a:73c8 with SMTP id p2-20020a17090ac00200b001d9250a73c8mr17635424pjt.133.1652095729221; Mon, 09 May 2022 04:28:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652095729; cv=none; d=google.com; s=arc-20160816; b=audOLlGgc13t3oxu55BL/fzJOeAZymcX0DIP//Nuxk8WNZXy92oBBhrA7I1gwYAFiK /DruOvjw0kV1QKBo5LA6tTGVCAwfSJx52ZWS32tbbkSIE0+Pl3jXncpNkb7+0OZfqUAo AKbaoI+IfGMQM4C1KsMMpFGxCIjAyGZRVUttrFYDkn0XkT2bc7D9bt6I3RMHQbwT/BGV +6L4K6mVwdWRSLm46c7UFwZ9a/F1vCCGWormjB5EXoBwcDmL60aKQ5CPPf6Lv65SH5k+ GCP7XvjBCW+3T4254lZo4ANamEUmnCeU4JpdLwcVdAILbQ0khlLUbnGQZlkT54AjLJt+ /rLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=eNbW88joc1WQormM6ug+550JQKLgPb1W/CR1qXZE5SQ=; b=UZICQ9UqlGxyFII+Q+nB2JCYWwjwz4GDe76Gizs9abgPYJizCYBUTX9ijjSV68bSl8 FQhQs88w+upBD1pYSLZj55AFkiOqRj+umcVqn13i6hmb2S93aIBQyHxpFS0LC1yOSoN5 +kC2f9F1f5lIWAGrubnpvjJXn2KN6uEyXbYhcEYDEeDcSKqkWtmFW9GwahaB2VfFTLt+ SDt5d3tXSI2fu6Q25hlnzSKr8uUdMsOUqiYrdGZGSE7Bzd0TM/Q6TBFmt2bj/c2WIevq eFpdY/jcWTjZYQOkl66hhs69/goLgSA4aAe2WTXjUA5usGQWUGa2HqANn7Aqt03U6FAW HI5Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=SLpt+2XV; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id j9-20020a17090a694900b001d96a38e16esi17549993pjm.73.2022.05.09.04.28.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 09 May 2022 04:28:49 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=SLpt+2XV; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id B2C002B4CBD; Mon, 9 May 2022 03:35:53 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231435AbiEIFho (ORCPT + 99 others); Mon, 9 May 2022 01:37:44 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51254 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233749AbiEIFbJ (ORCPT ); Mon, 9 May 2022 01:31:09 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 414BF3ED34 for ; Sun, 8 May 2022 22:27:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1652074036; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=eNbW88joc1WQormM6ug+550JQKLgPb1W/CR1qXZE5SQ=; b=SLpt+2XVeBmkoZqUTY45/nhvjNePLKeNCG5wmW0Tr5BWsIrO9GE1EPkPeJApYndaAgwuHq ZDsMNnfsBXXT2QTLpyovfVHWqyfjifc4vGt95pfHIamd/YjAdynzvHI1IZvjqdE5Db0+qm nvvLEAOpiNN92WuRL9GZ0at66tUg8cA= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-622-V-K_kfjLMYiiNSbbAzXMAA-1; Mon, 09 May 2022 01:27:10 -0400 X-MC-Unique: V-K_kfjLMYiiNSbbAzXMAA-1 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id EAE7C85A5BE; Mon, 9 May 2022 05:27:09 +0000 (UTC) Received: from localhost (ovpn-13-212.pek2.redhat.com [10.72.13.212]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 8DAE62166B2F; Mon, 9 May 2022 05:27:02 +0000 (UTC) Date: Mon, 9 May 2022 13:26:59 +0800 From: Baoquan He To: Sourabh Jain Cc: Eric DeVolder , linux-kernel@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, ebiederm@xmission.com, dyoung@redhat.com, vgoyal@redhat.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, hpa@zytor.com, nramas@linux.microsoft.com, thomas.lendacky@amd.com, robh@kernel.org, efault@gmx.de, rppt@kernel.org, david@redhat.com, konrad.wilk@oracle.com, boris.ostrovsky@oracle.com Subject: Re: [PATCH v8 1/7] x86/crash: fix minor typo/bug in debug message Message-ID: References: <20220505184603.1548-1-eric.devolder@oracle.com> <20220505184603.1548-2-eric.devolder@oracle.com> <72764a3c-8b8c-8652-945e-9b15f31cda15@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <72764a3c-8b8c-8652-945e-9b15f31cda15@linux.ibm.com> X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/09/22 at 10:46am, Sourabh Jain wrote: > > On 06/05/22 00:15, Eric DeVolder wrote: > > The pr_debug() intends to display the memsz member, but the > > parameter is actually the bufsz member (which is already > > displayed). Correct this to display memsz value. > > > > Signed-off-by: Eric DeVolder > > Reviewed-by: David Hildenbrand > > Acked-by: Baoquan He > > --- > > arch/x86/kernel/crash.c | 2 +- > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > diff --git a/arch/x86/kernel/crash.c b/arch/x86/kernel/crash.c > > index e8326a8d1c5d..9730c88530fc 100644 > > --- a/arch/x86/kernel/crash.c > > +++ b/arch/x86/kernel/crash.c > > @@ -407,7 +407,7 @@ int crash_load_segments(struct kimage *image) > > } > > image->elf_load_addr = kbuf.mem; > > pr_debug("Loaded ELF headers at 0x%lx bufsz=0x%lx memsz=0x%lx\n", > > - image->elf_load_addr, kbuf.bufsz, kbuf.bufsz); > > + image->elf_load_addr, kbuf.bufsz, kbuf.memsz); > > > I think we can push this patch separately. Boris has taken this into tip/x86/kdump.