From mboxrd@z Thu Jan 1 00:00:00 1970 From: Eric DeVolder Date: Mon, 9 May 2022 10:41:13 -0500 Subject: [PATCH v8 1/7] x86/crash: fix minor typo/bug in debug message In-Reply-To: References: <20220505184603.1548-1-eric.devolder@oracle.com> <20220505184603.1548-2-eric.devolder@oracle.com> <72764a3c-8b8c-8652-945e-9b15f31cda15@linux.ibm.com> Message-ID: <9174fbce-6160-ef5c-15cd-2a62502f21da@oracle.com> List-Id: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: kexec@lists.infradead.org On 5/9/22 00:26, Baoquan He wrote: > On 05/09/22 at 10:46am, Sourabh Jain wrote: >> >> On 06/05/22 00:15, Eric DeVolder wrote: >>> The pr_debug() intends to display the memsz member, but the >>> parameter is actually the bufsz member (which is already >>> displayed). Correct this to display memsz value. >>> >>> Signed-off-by: Eric DeVolder >>> Reviewed-by: David Hildenbrand >>> Acked-by: Baoquan He >>> --- >>> arch/x86/kernel/crash.c | 2 +- >>> 1 file changed, 1 insertion(+), 1 deletion(-) >>> >>> diff --git a/arch/x86/kernel/crash.c b/arch/x86/kernel/crash.c >>> index e8326a8d1c5d..9730c88530fc 100644 >>> --- a/arch/x86/kernel/crash.c >>> +++ b/arch/x86/kernel/crash.c >>> @@ -407,7 +407,7 @@ int crash_load_segments(struct kimage *image) >>> } >>> image->elf_load_addr = kbuf.mem; >>> pr_debug("Loaded ELF headers at 0x%lx bufsz=0x%lx memsz=0x%lx\n", >>> - image->elf_load_addr, kbuf.bufsz, kbuf.bufsz); >>> + image->elf_load_addr, kbuf.bufsz, kbuf.memsz); >>> >> I think we can push this patch separately. > > Boris has taken this into tip/x86/kdump. > Excellent, I'll remove this patch going forward. Eric