lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 16 Feb 2017 23:11:21 -0800 From: Joe Perches <joe@...ches.com> To: linux-kernel@...r.kernel.org Cc: "David S. Miller" <davem@...emloft.net>, sparclinux@...r.kernel.org Subject: [PATCH 08/35] sparc: Convert remaining use of pr_warning to pr_warn To enable eventual removal of pr_warning This makes pr_warn use consistent for arch/sparc Prior to this patch, there was 1 use of pr_warning and 8 uses of pr_warn in arch/sparc Signed-off-by: Joe Perches <joe@...ches.com> --- arch/sparc/kernel/smp_64.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/arch/sparc/kernel/smp_64.c b/arch/sparc/kernel/smp_64.c index dcb12d9002e9..ca0f8faa79a9 100644 --- a/arch/sparc/kernel/smp_64.c +++ b/arch/sparc/kernel/smp_64.c @@ -1564,9 +1564,8 @@ void __init setup_per_cpu_areas(void) pcpu_alloc_bootmem, pcpu_free_bootmem); if (rc) - pr_warning("PERCPU: %s allocator failed (%d), " - "falling back to page size\n", - pcpu_fc_names[pcpu_chosen_fc], rc); + pr_warn("PERCPU: %s allocator failed (%d), falling back to page size\n", + pcpu_fc_names[pcpu_chosen_fc], rc); } if (rc < 0) rc = pcpu_page_first_chunk(PERCPU_MODULE_RESERVE, -- 2.10.0.rc2.1.g053435c
Powered by blists - more mailing lists