x86/paravirt: Fix some warning messages
The first argument to WARN_ONCE() is a condition.
Fixes: 5800dc5c19
("x86/paravirt: Fix spectre-v2 mitigations for paravirt guests")
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Juergen Gross <jgross@suse.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Alok Kataria <akataria@vmware.com>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: virtualization@lists.linux-foundation.org
Cc: kernel-janitors@vger.kernel.org
Link: https://lkml.kernel.org/r/20180919103553.GD9238@mwanda
This commit is contained in:
parent
ffb2315fd2
commit
571d0563c8
@ -91,7 +91,7 @@ unsigned paravirt_patch_call(void *insnbuf,
|
|||||||
|
|
||||||
if (len < 5) {
|
if (len < 5) {
|
||||||
#ifdef CONFIG_RETPOLINE
|
#ifdef CONFIG_RETPOLINE
|
||||||
WARN_ONCE("Failing to patch indirect CALL in %ps\n", (void *)addr);
|
WARN_ONCE(1, "Failing to patch indirect CALL in %ps\n", (void *)addr);
|
||||||
#endif
|
#endif
|
||||||
return len; /* call too long for patch site */
|
return len; /* call too long for patch site */
|
||||||
}
|
}
|
||||||
@ -111,7 +111,7 @@ unsigned paravirt_patch_jmp(void *insnbuf, const void *target,
|
|||||||
|
|
||||||
if (len < 5) {
|
if (len < 5) {
|
||||||
#ifdef CONFIG_RETPOLINE
|
#ifdef CONFIG_RETPOLINE
|
||||||
WARN_ONCE("Failing to patch indirect JMP in %ps\n", (void *)addr);
|
WARN_ONCE(1, "Failing to patch indirect JMP in %ps\n", (void *)addr);
|
||||||
#endif
|
#endif
|
||||||
return len; /* call too long for patch site */
|
return len; /* call too long for patch site */
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user