lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 10 Oct 2013 12:12:08 +0200
From: Michal Simek <michal.simek@...inx.com>
To: Russell King <linux@....linux.org.uk>
Cc: linux-arm-kernel@...ts.infradead.org, monstr@...str.eu,
Nicolas Pitre <nico@...aro.org>,
Will Deacon <will.deacon@....com>,
Vitaly Andrianov <vitalya@...com>,
Cyril Chemparathy <cyril@...com>, linux-kernel@...r.kernel.org
Subject: [PATCH] ARM: mm: Fix ECC mem policy printk
ECC policy is just connected to L1 cache
(IMP - bit 9 - in L1 page table entry format)
and has no connection to other ECC capable devices
in the system. That's why declaring connection with
L1 cache make sense.
Signed-off-by: Michal Simek <michal.simek@...inx.com>
---
IRC printk without KERN_ facility level is just INFO.
Please correct me if I am wrong.
---
arch/arm/mm/mmu.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/arm/mm/mmu.c b/arch/arm/mm/mmu.c
index b1d17ee..e9899dc 100644
--- a/arch/arm/mm/mmu.c
+++ b/arch/arm/mm/mmu.c
@@ -556,7 +556,7 @@ static void __init build_mem_type_table(void)
mem_types[MT_CACHECLEAN].prot_sect |= PMD_SECT_WB;
break;
}
- printk("Memory policy: ECC %sabled, Data cache %s\n",
+ pr_info("Memory policy: L1 ECC %sabled, Data cache %s\n",
ecc_mask ? "en" : "dis", cp->policy);
for (i = 0; i < ARRAY_SIZE(mem_types); i++) {
--
1.8.2.3
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists