Received: by 10.223.164.202 with SMTP id h10csp238799wrb; Tue, 14 Nov 2017 00:12:09 -0800 (PST) X-Google-Smtp-Source: AGs4zMZaJbI6EnWj6iE/zuD9vgBU/Ty51DJquKZicOEhvctRLjYuym9E6Z75m4icqlY9Wai/2W3c X-Received: by 10.84.244.2 with SMTP id g2mr11339877pll.170.1510647128986; Tue, 14 Nov 2017 00:12:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1510647128; cv=none; d=google.com; s=arc-20160816; b=qU2rzNB1euCTesyB4Xv6EgR16N4mkwSh9BnveR2QEu9+5B9ZIc3bKgJCmEcpn6dac4 TgdYvZdcQMOY04jPeuXglBXlxpNYvRf+7a3d10YqnXbyfRL5NCLLo2U41LlXJguoh1kw g+q7MsJGKZjo9jxT2xaMpVks3eri6ocZLlYld/4VvZu6Os1fCCeLs/1tsayVgsOsNfzl /cx+J5je9zSLrSmDMFRRMrRGVQQnPNAij3oF59Vfu5J1JLfPrMfswAPu7aRYYMGQoHxA G/0Pp8aXmBRh+hSXsZRxqC7EbrzfWItDb7pnOPbVxUA3XxgX+3fnlOJshPKjUuiU4y57 7QEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:content-disposition :mime-version:message-id:subject:cc:to:from:date :arc-authentication-results; bh=dPsRR9mMzGr2Qo3BaFyv+18RZebFfIW1/mp7mMeESSY=; b=0tWle9/b2cgMIumh0F+qCMMzDnAUCn9gEzkMNZE4eZZPbEpWoByeXMhZKFp9YRFqWA y3ywe2Mf12IRG8zAK3CDzPnuZMQ40fcutWbyI1D8bSAzjBE9tA4ZzRYh1kjPfBFF6IaK reulcf9mTwhBwkmMY4Qc6zJZRRMxgI8wPYYbtkL4zEbDPqLSY2vfIvE1TcNGC4vO9CgB PG5JOS179WPfIJfDPSp7p3n4LBQcSriI3gSrnJg7bpZ+t1rxv7/DZ85ZQ4iF9UJkmHDG NhZkUm746XJBBiOmDXXbFwL02QtnMR6HrUgaLBEpPyHhdEvAzj0gQjjrMA230p0W2Y37 fl0w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o3si962670pls.289.2017.11.14.00.11.57; Tue, 14 Nov 2017 00:12:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753321AbdKNIBo (ORCPT + 89 others); Tue, 14 Nov 2017 03:01:44 -0500 Received: from mx1.redhat.com ([209.132.183.28]:34510 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751626AbdKNIBh (ORCPT ); Tue, 14 Nov 2017 03:01:37 -0500 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id C48C77653F; Tue, 14 Nov 2017 08:01:37 +0000 (UTC) Received: from dhcp-128-65.nay.redhat.com (ovpn-12-45.pek2.redhat.com [10.72.12.45]) by smtp.corp.redhat.com (Postfix) with ESMTPS id AFB8293508; Tue, 14 Nov 2017 08:01:33 +0000 (UTC) Date: Tue, 14 Nov 2017 16:01:29 +0800 From: Dave Young To: kexec@lists.infradead.org, linux-kernel@vger.kernel.org Cc: akpm@linux-foundation.org, bhe@redhat.com, vgoyal@redhat.com, bhsharma@redhat.com Subject: [PATCH V2] kdump: print a message in case parse_crashkernel_mem resulted in zero bytes Message-ID: <20171114080129.GA6115@dhcp-128-65.nay.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.8.3 (2017-05-23) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Tue, 14 Nov 2017 08:01:37 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In parse_crashkernel_mem, it silently return in case we get zero bytes in the parsing function. It is useful for debugging for adding a message especially sometimes kernel can not boot up correctly. Add a pr_info instead of pr_warn because it is expected behavior for size = 0, eg. crashkernel=2G-4G:128M, size will be 0 in case system memory is less than 2G. Signed-off-by: Dave Young --- [v1 -> v2]: bhsharma: pr_warn looks confusing because of return 0 kernel/crash_core.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- linux-x86.orig/kernel/crash_core.c +++ linux-x86/kernel/crash_core.c @@ -108,7 +108,8 @@ static int __init parse_crashkernel_mem( return -EINVAL; } } - } + } else + pr_info("crashkernel size resulted in zero bytes\n"); return 0; } From 1584044860993818457@xxx Tue Nov 14 12:34:59 +0000 2017 X-GM-THRID: 1583947963447418004 X-Gmail-Labels: Inbox,Category Forums,HistoricalUnread