lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20240804144505.25607-1-qiuxu.zhuo@intel.com>
Date: Sun,  4 Aug 2024 22:45:05 +0800
From: Qiuxu Zhuo <qiuxu.zhuo@...el.com>
To: tglx@...utronix.de
Cc: linux-kernel@...r.kernel.org,
	x86@...nel.org,
	qiuxu.zhuo@...el.com
Subject: Re: [patch 09/15] x86/mpparse: Cleanup apic_printk()s

> [...]
> Subject: [patch 09/15] x86/mpparse: Cleanup apic_printk()s
> 
> Use the new apic_pr_verbose() helper.
> 
> Signed-off-by: Thomas Gleixner <tglx@...utronix.de>
> ---
>  arch/x86/kernel/mpparse.c |   12 ++++++------
>  1 file changed, 6 insertions(+), 6 deletions(-)
> 
> --- a/arch/x86/kernel/mpparse.c
> +++ b/arch/x86/kernel/mpparse.c
> [...]
> @@ -560,7 +560,7 @@ static int __init smp_scan_config(unsign
>  	struct mpf_intel *mpf;
>  	int ret = 0;
>  
> -	apic_printk(APIC_VERBOSE, "Scan for SMP in [mem %#010lx-%#010lx]\n",
> +	apic_pr_verbose("Scan for SMP in [mem %#010lx-%#010lx]\n",
>  		    base, base + length - 1);

Align the open parenthesis.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ