[tip: x86/kdump] x86/crash: Fix minor typo/bug in debug message
From: tip-bot2 for Eric DeVolder
Date: Wed Apr 13 2022 - 13:52:52 EST
The following commit has been merged into the x86/kdump branch of tip:
Commit-ID: b57a7c9dd732ca29c4400a9a710c56c55877086d
Gitweb: https://git.kernel.org/tip/b57a7c9dd732ca29c4400a9a710c56c55877086d
Author: Eric DeVolder <eric.devolder@xxxxxxxxxx>
AuthorDate: Wed, 13 Apr 2022 12:42:30 -04:00
Committer: Borislav Petkov <bp@xxxxxxx>
CommitterDate: Wed, 13 Apr 2022 19:39:54 +02:00
x86/crash: Fix minor typo/bug in debug message
The pr_debug() intends to display the memsz member, but the
parameter is actually the bufsz member (which is already
displayed). Correct this to display memsz value.
Signed-off-by: Eric DeVolder <eric.devolder@xxxxxxxxxx>
Signed-off-by: Borislav Petkov <bp@xxxxxxx>
Acked-by: Baoquan He <bhe@xxxxxxxxxx>
Link: https://lore.kernel.org/r/20220413164237.20845-2-eric.devolder@xxxxxxxxxx
---
arch/x86/kernel/crash.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/kernel/crash.c b/arch/x86/kernel/crash.c
index e8326a8..9730c88 100644
--- a/arch/x86/kernel/crash.c
+++ b/arch/x86/kernel/crash.c
@@ -407,7 +407,7 @@ int crash_load_segments(struct kimage *image)
}
image->elf_load_addr = kbuf.mem;
pr_debug("Loaded ELF headers at 0x%lx bufsz=0x%lx memsz=0x%lx\n",
- image->elf_load_addr, kbuf.bufsz, kbuf.bufsz);
+ image->elf_load_addr, kbuf.bufsz, kbuf.memsz);
return ret;
}