lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <7eabc1e74e9b483e921a4324d609d527fc83ec62.1288471898.git.joe@perches.com> Date: Sat, 30 Oct 2010 14:08:55 -0700 From: Joe Perches <joe@...ches.com> To: Jiri Kosina <trivial@...nel.org> Cc: Johannes Berg <johannes@...solutions.net>, "John W. Linville" <linville@...driver.com>, "David S. Miller" <davem@...emloft.net>, linux-wireless@...r.kernel.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: [PATCH 38/39] net/rfkill/input.c: Update WARN uses Coalesce long formats. Align arguments. Signed-off-by: Joe Perches <joe@...ches.com> --- net/rfkill/input.c | 5 ++--- 1 files changed, 2 insertions(+), 3 deletions(-) diff --git a/net/rfkill/input.c b/net/rfkill/input.c index 1bca6d4..4343f59 100644 --- a/net/rfkill/input.c +++ b/net/rfkill/input.c @@ -75,9 +75,8 @@ static void __rfkill_handle_global_op(enum rfkill_sched_op op) default: /* memory corruption or bug, fail safely */ rfkill_epo(); - WARN(1, "Unknown requested operation %d! " - "rfkill Emergency Power Off activated\n", - op); + WARN(1, "Unknown requested operation %d! rfkill Emergency Power Off activated\n", + op); } } -- 1.7.3.1.g432b3.dirty -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists