On 21.01.2025 23:56, Jason Andryuk wrote:
> On 2025-01-03 20:58, Denis Mukhin via B4 Relay wrote:
>> --- a/xen/drivers/char/console.c
>> +++ b/xen/drivers/char/console.c
> 
>> @@ -579,6 +571,9 @@ static void __serial_rx(char c)
>>       if ( pv_shim && pv_console )
>>           consoled_guest_tx(c);
>>   #endif
>> +
>> +    if ( rc )
>> +        printk(KERN_ERR "d%pd: failed to process console input: %d\n", d, 
>> rc);
>>   }
>>   
>>   static void cf_check serial_rx(char c)
>>
> 
> This will print the ENOSPC that was formerly silent.  Since this is 
> input from the console, that seems more informative to the user and okay 
> to me.

I don't view this as okay. For one it needs to be a guest log level, such
that rate limiting can suitably suppress too many of these messages in a
short time (which in particular might happen if the ENOSPC reason isn't
dealt with by the receiving domain). And then I wonder whether this
wouldn't better be even more strongly limited, perhaps to just once per
domain.

I'm also unconvinced of KERN_ERR - from Xen's perspective nothing error-
like has happened, once again most notably for the ENOSPC case. I'd view
this as a warning at best.

Finally: Why d%pd? It ought to be just %pd.

Jan

Reply via email to