diff options
| author | Daniel Rosenberg <drosen@google.com> | 2017-03-16 17:46:13 -0700 |
|---|---|---|
| committer | Daniel Rosenberg <drosen@google.com> | 2017-03-23 20:13:01 -0700 |
| commit | b7dbda19b8cebde338a9034d4706519c93c25a39 (patch) | |
| tree | 584ca278cefd81350d0731d395577636c6a89d64 /fs/sdcardfs/derived_perm.c | |
| parent | 1ed9910bedd662fe74d213b6e4333d1f08dfdb90 (diff) | |
ANDROID: sdcardfs: Use pr_[...] instead of printk
Signed-off-by: Daniel Rosenberg <drosen@google.com>
Bug: 35331000
Change-Id: Ibc635ec865750530d32b87067779f681fe58a003
Diffstat (limited to 'fs/sdcardfs/derived_perm.c')
| -rw-r--r-- | fs/sdcardfs/derived_perm.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/fs/sdcardfs/derived_perm.c b/fs/sdcardfs/derived_perm.c index 748eb3741b3b..eabdbfd30054 100644 --- a/fs/sdcardfs/derived_perm.c +++ b/fs/sdcardfs/derived_perm.c @@ -318,7 +318,7 @@ inline void update_derived_permission_lock(struct dentry *dentry) struct dentry *parent; if (!dentry || !d_inode(dentry)) { - printk(KERN_ERR "sdcardfs: %s: invalid dentry\n", __func__); + pr_err("sdcardfs: %s: invalid dentry\n", __func__); return; } /* FIXME: @@ -379,7 +379,7 @@ int is_obbpath_invalid(struct dentry *dent) path_buf = kmalloc(PATH_MAX, GFP_ATOMIC); if (!path_buf) { ret = 1; - printk(KERN_ERR "sdcardfs: fail to allocate path_buf in %s.\n", __func__); + pr_err("sdcardfs: fail to allocate path_buf in %s.\n", __func__); } else { obbpath_s = d_path(&di->lower_path, path_buf, PATH_MAX); if (d_unhashed(di->lower_path.dentry) || @@ -451,7 +451,7 @@ int setup_obb_dentry(struct dentry *dentry, struct path *lower_path) * because the sdcard daemon also regards this case as * a lookup fail. */ - printk(KERN_INFO "sdcardfs: the sbi->obbpath is not available\n"); + pr_info("sdcardfs: the sbi->obbpath is not available\n"); } return err; } |
