Hey Petr,

Petr Mladek writes:
This produces something like:

3Warning: unable to open an initial console.
3Failed to execute %s (error %d)
6Kernel memory protection disabled.
3Starting init: %s exists but couldn't execute it (error %d)
6Run %s as init process
7initcall %pS returned %d after %lld usecs
7calling  %pS @ %i
2initrd overwritten (0x%08lx < 0x%08lx) - disabling it.

The loglevel is not well separated. It is neither human readable
nor safe for a machine processing . It works only for single digit.
[...]
It looks in less like: [...]

Hmm, why is it important that debugfs output is human readable? My impression was that it's fine to have machine-readable stuff there.

Re: not being not safe for machine processing because it only works for a single digit, I'm a little confused. KERN_* levels are, as far as I know, only a single byte wide, and we rely on that already (eg. in printk_skip_header()). We also already have precedent for null-separation/control characters in (for example) /proc/pid/cmdline.

What am I missing? :-)

Well, it still might be non-trivial to find the string in the code
and see what exactly has changed. It might be pretty useful
to mention even the source_file:line, for example:

<3> init/main.c:1489: Warning: unable to open an initial console.\n
<3> init/main.c:1446: Failed to execute %s (error %d)\n
<6> init/main.c:1398: Kernel memory protection disabled.\n
<3> init/main.c:1366: Starting init: %s exists but couldn't execute it (error 
%d)\n

Almost certainly a theoretical concern, but I am not a big fan of this format, because it relies on a character (":") which is legal in paths (although as you'd expect, we don't have any cases in the kernel right now). That's one of the reasons why I preferred to use nulls, which can't be in a filename.

Reply via email to