lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1d7703d5c29dc9371ace3645377d0ddd9c89be30.camel@amazon.com>
Date:   Tue, 26 May 2020 18:22:56 +0000
From:   "Chocron, Jonathan" <jonnyc@...zon.com>
To:     "lorenzo.pieralisi@....com" <lorenzo.pieralisi@....com>,
        "thomas.petazzoni@...tlin.com" <thomas.petazzoni@...tlin.com>,
        "pratyush.anand@...il.com" <pratyush.anand@...il.com>,
        "robh@...nel.org" <robh@...nel.org>,
        "zhengdejin5@...il.com" <zhengdejin5@...il.com>,
        "linux-pci@...r.kernel.org" <linux-pci@...r.kernel.org>,
        "bhelgaas@...gle.com" <bhelgaas@...gle.com>,
        "tjoseph@...ence.com" <tjoseph@...ence.com>
CC:     "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH v1] PCI: controller: Remove duplicate error message

On Tue, 2020-05-26 at 23:09 +0800, Dejin Zheng wrote:
> CAUTION: This email originated from outside of the organization. Do
> not click links or open attachments unless you can confirm the sender
> and know the content is safe.
> 
> 
> 
> It will print an error message by itself when
> devm_pci_remap_cfg_resource() goes wrong. so remove the duplicate
> error message.
> 

It seems like that in the first error case in
devm_pci_remap_cfg_resource(), the print will be less indicative. Could
you please share an example print log with the duplicate print?

Thanks,
   Jonathan

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ