[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20090206145838.GA28197@x200.localdomain>
Date: Fri, 6 Feb 2009 17:58:38 +0300
From: Alexey Dobriyan <adobriyan@...il.com>
To: Frank Seidel <fseidel@...e.de>
Cc: linux kernel <linux-kernel@...r.kernel.org>,
akpm@...ux-foundation.org, "David S. Miller" <davem@...emloft.net>,
linux-crypto@...r.kernel.org, frank@...eidel.de,
herbert@...dor.apana.org.au, jarod@...hat.com
Subject: Re: [PATCH] crypto: add missing KERN_* constants to printks
On Fri, Feb 06, 2009 at 03:19:10PM +0100, Frank Seidel wrote:
> According to kerneljanitors todo list all printk calls (beginning
> a new line) should have an according KERN_* constant.
Forget about kernel janitors todo list, fix a bug instead.
> Those are the missing pieces here for the crypto subsystem.
You're inserting KERN_WARNING everywhere, what for?
> --- a/crypto/tcrypt.c
> +++ b/crypto/tcrypt.c
> @@ -74,7 +74,7 @@ static int test_cipher_jiffies(struct bl
> return ret;
> }
>
> - printk("%d operations in %d seconds (%ld bytes)\n",
> + printk(KERN_WARNING "%d operations in %d seconds (%ld bytes)\n",
> bcount, sec, (long)bcount * blen);
> return 0;
> }
> @@ -122,7 +122,7 @@ out:
> local_bh_enable();
>
> if (ret == 0)
> - printk("1 operation in %lu cycles (%d bytes)\n",
> + printk(KERN_WARNING "1 operation in %lu cycles (%d bytes)\n",
> (cycles + 4) / 8, blen);
>
> return ret;
> @@ -146,13 +146,13 @@ static void test_cipher_speed(const char
> else
> e = "decryption";
>
> - printk("\ntesting speed of %s %s\n", algo, e);
> + printk(KERN_WARNING "\ntesting speed of %s %s\n", algo, e);
>
> tfm = crypto_alloc_blkcipher(algo, 0, CRYPTO_ALG_ASYNC);
>
> if (IS_ERR(tfm)) {
> - printk("failed to load transform for %s: %ld\n", algo,
> - PTR_ERR(tfm));
> + printk(KERN_WARNING "failed to load transform for %s: %ld\n",
> + algo, PTR_ERR(tfm));
> return;
> }
> desc.tfm = tfm;
> @@ -166,14 +166,16 @@ static void test_cipher_speed(const char
> struct scatterlist sg[TVMEMSIZE];
>
> if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) {
> - printk("template (%u) too big for "
> + printk(KERN_WARNING
> + "template (%u) too big for "
> "tvmem (%lu)\n", *keysize + *b_size,
> TVMEMSIZE * PAGE_SIZE);
> goto out;
> }
>
> - printk("test %u (%d bit key, %d byte blocks): ", i,
> - *keysize * 8, *b_size);
> + printk(KERN_WARNING
> + "test %u (%d bit key, %d byte blocks): ",
> + i, *keysize * 8, *b_size);
>
> memset(tvmem[0], 0xff, PAGE_SIZE);
>
> @@ -188,7 +190,8 @@ static void test_cipher_speed(const char
>
> ret = crypto_blkcipher_setkey(tfm, key, *keysize);
> if (ret) {
> - printk("setkey() failed flags=%x\n",
> + printk(KERN_WARNING
> + "setkey() failed flags=%x\n",
> crypto_blkcipher_get_flags(tfm));
> goto out;
> }
> @@ -215,7 +218,8 @@ static void test_cipher_speed(const char
> *b_size);
>
> if (ret) {
> - printk("%s() failed flags=%x\n", e, desc.flags);
> + printk(KERN_WARNING "%s() failed flags=%x\n",
> + e, desc.flags);
> break;
> }
> b_size++;
> @@ -243,7 +247,7 @@ static int test_hash_jiffies_digest(stru
> return ret;
> }
>
> - printk("%6u opers/sec, %9lu bytes/sec\n",
> + printk(KERN_WARNING "%6u opers/sec, %9lu bytes/sec\n",
> bcount / sec, ((long)bcount * blen) / sec);
>
> return 0;
> @@ -275,7 +279,7 @@ static int test_hash_jiffies(struct hash
> return ret;
> }
>
> - printk("%6u opers/sec, %9lu bytes/sec\n",
> + printk(KERN_WARNING "%6u opers/sec, %9lu bytes/sec\n",
> bcount / sec, ((long)bcount * blen) / sec);
>
> return 0;
> @@ -320,7 +324,7 @@ out:
> if (ret)
> return ret;
>
> - printk("%6lu cycles/operation, %4lu cycles/byte\n",
> + printk(KERN_WARNING "%6lu cycles/operation, %4lu cycles/byte\n",
> cycles / 8, cycles / (8 * blen));
>
> return 0;
> @@ -384,7 +388,7 @@ out:
> if (ret)
> return ret;
>
> - printk("%6lu cycles/operation, %4lu cycles/byte\n",
> + printk(KERN_WARNING "%6lu cycles/operation, %4lu cycles/byte\n",
> cycles / 8, cycles / (8 * blen));
>
> return 0;
> @@ -400,13 +404,13 @@ static void test_hash_speed(const char *
> int i;
> int ret;
>
> - printk("\ntesting speed of %s\n", algo);
> + printk(KERN_WARNING "\ntesting speed of %s\n", algo);
>
> tfm = crypto_alloc_hash(algo, 0, CRYPTO_ALG_ASYNC);
>
> if (IS_ERR(tfm)) {
> - printk("failed to load transform for %s: %ld\n", algo,
> - PTR_ERR(tfm));
> + printk(KERN_WARNING "failed to load transform for %s: %ld\n",
> + algo, PTR_ERR(tfm));
> return;
> }
>
> @@ -414,7 +418,7 @@ static void test_hash_speed(const char *
> desc.flags = 0;
>
> if (crypto_hash_digestsize(tfm) > sizeof(output)) {
> - printk("digestsize(%u) > outputbuffer(%zu)\n",
> + printk(KERN_WARNING "digestsize(%u) > outputbuffer(%zu)\n",
> crypto_hash_digestsize(tfm), sizeof(output));
> goto out;
> }
> @@ -427,12 +431,14 @@ static void test_hash_speed(const char *
>
> for (i = 0; speed[i].blen != 0; i++) {
> if (speed[i].blen > TVMEMSIZE * PAGE_SIZE) {
> - printk("template (%u) too big for tvmem (%lu)\n",
> + printk(KERN_WARNING
> + "template (%u) too big for tvmem (%lu)\n",
> speed[i].blen, TVMEMSIZE * PAGE_SIZE);
> goto out;
> }
>
> - printk("test%3u (%5u byte blocks,%5u bytes per update,%4u updates): ",
> + printk(KERN_WARNING
> + "test%3u (%5u byte blocks,%5u bytes per update,%4u updates): ",
> i, speed[i].blen, speed[i].plen, speed[i].blen / speed[i].plen);
>
> if (sec)
> @@ -443,7 +449,7 @@ static void test_hash_speed(const char *
> speed[i].plen, output);
>
> if (ret) {
> - printk("hashing failed ret=%d\n", ret);
> + printk(KERN_WARNING "hashing failed ret=%d\n", ret);
> break;
> }
> }
> --- a/crypto/ansi_cprng.c
> +++ b/crypto/ansi_cprng.c
> @@ -167,7 +167,7 @@ static int _get_more_prng_bytes(struct p
> break;
> }
>
> - dbgprint("Returning new block for context %p\n", ctx);
> + dbgprint(KERN_WARNING "Returning new block for context %p\n", ctx);
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists