diff options
author | Mark A. Greer <mgreer@animalcreek.com> | 2012-03-17 21:22:48 -0400 |
---|---|---|
committer | Kevin Hilman <khilman@ti.com> | 2012-03-22 19:11:17 -0400 |
commit | 981798569b090543453baccbc0657fbcea311668 (patch) | |
tree | b6a48804fa261715d2abd28d8812a125fd62982d /arch/arm/mach-omap2/pm34xx.c | |
parent | ce229c5d79c03f09d4612dd2bcbff532fdc24e80 (diff) |
arm: omap3: pm34xx.c: Replace printk() with appropriate pr_*()
Currently, pm34xx.c has a mix of printk() and pr_*() statements
so replace the printk() statements with the equivalent pr_*()
statements.
Signed-off-by: Mark A. Greer <mgreer@animalcreek.com>
Signed-off-by: Kevin Hilman <khilman@ti.com>
Diffstat (limited to 'arch/arm/mach-omap2/pm34xx.c')
-rw-r--r-- | arch/arm/mach-omap2/pm34xx.c | 22 |
1 files changed, 10 insertions, 12 deletions
diff --git a/arch/arm/mach-omap2/pm34xx.c b/arch/arm/mach-omap2/pm34xx.c index c598d26f3317..6aeacf660790 100644 --- a/arch/arm/mach-omap2/pm34xx.c +++ b/arch/arm/mach-omap2/pm34xx.c | |||
@@ -166,8 +166,7 @@ static void omap3_save_secure_ram_context(void) | |||
166 | pwrdm_set_next_pwrst(mpu_pwrdm, mpu_next_state); | 166 | pwrdm_set_next_pwrst(mpu_pwrdm, mpu_next_state); |
167 | /* Following is for error tracking, it should not happen */ | 167 | /* Following is for error tracking, it should not happen */ |
168 | if (ret) { | 168 | if (ret) { |
169 | printk(KERN_ERR "save_secure_sram() returns %08x\n", | 169 | pr_err("save_secure_sram() returns %08x\n", ret); |
170 | ret); | ||
171 | while (1) | 170 | while (1) |
172 | ; | 171 | ; |
173 | } | 172 | } |
@@ -307,7 +306,7 @@ void omap_sram_idle(void) | |||
307 | break; | 306 | break; |
308 | default: | 307 | default: |
309 | /* Invalid state */ | 308 | /* Invalid state */ |
310 | printk(KERN_ERR "Invalid mpu state in sram_idle\n"); | 309 | pr_err("Invalid mpu state in sram_idle\n"); |
311 | return; | 310 | return; |
312 | } | 311 | } |
313 | 312 | ||
@@ -463,18 +462,17 @@ restore: | |||
463 | list_for_each_entry(pwrst, &pwrst_list, node) { | 462 | list_for_each_entry(pwrst, &pwrst_list, node) { |
464 | state = pwrdm_read_prev_pwrst(pwrst->pwrdm); | 463 | state = pwrdm_read_prev_pwrst(pwrst->pwrdm); |
465 | if (state > pwrst->next_state) { | 464 | if (state > pwrst->next_state) { |
466 | printk(KERN_INFO "Powerdomain (%s) didn't enter " | 465 | pr_info("Powerdomain (%s) didn't enter " |
467 | "target state %d\n", | 466 | "target state %d\n", |
468 | pwrst->pwrdm->name, pwrst->next_state); | 467 | pwrst->pwrdm->name, pwrst->next_state); |
469 | ret = -1; | 468 | ret = -1; |
470 | } | 469 | } |
471 | omap_set_pwrdm_state(pwrst->pwrdm, pwrst->saved_state); | 470 | omap_set_pwrdm_state(pwrst->pwrdm, pwrst->saved_state); |
472 | } | 471 | } |
473 | if (ret) | 472 | if (ret) |
474 | printk(KERN_ERR "Could not enter target state in pm_suspend\n"); | 473 | pr_err("Could not enter target state in pm_suspend\n"); |
475 | else | 474 | else |
476 | printk(KERN_INFO "Successfully put all powerdomains " | 475 | pr_info("Successfully put all powerdomains to target state\n"); |
477 | "to target state\n"); | ||
478 | 476 | ||
479 | return ret; | 477 | return ret; |
480 | } | 478 | } |
@@ -822,7 +820,7 @@ static int __init omap3_pm_init(void) | |||
822 | 820 | ||
823 | ret = pwrdm_for_each(pwrdms_setup, NULL); | 821 | ret = pwrdm_for_each(pwrdms_setup, NULL); |
824 | if (ret) { | 822 | if (ret) { |
825 | printk(KERN_ERR "Failed to setup powerdomains\n"); | 823 | pr_err("Failed to setup powerdomains\n"); |
826 | goto err3; | 824 | goto err3; |
827 | } | 825 | } |
828 | 826 | ||
@@ -830,7 +828,7 @@ static int __init omap3_pm_init(void) | |||
830 | 828 | ||
831 | mpu_pwrdm = pwrdm_lookup("mpu_pwrdm"); | 829 | mpu_pwrdm = pwrdm_lookup("mpu_pwrdm"); |
832 | if (mpu_pwrdm == NULL) { | 830 | if (mpu_pwrdm == NULL) { |
833 | printk(KERN_ERR "Failed to get mpu_pwrdm\n"); | 831 | pr_err("Failed to get mpu_pwrdm\n"); |
834 | ret = -EINVAL; | 832 | ret = -EINVAL; |
835 | goto err3; | 833 | goto err3; |
836 | } | 834 | } |
@@ -865,8 +863,8 @@ static int __init omap3_pm_init(void) | |||
865 | omap3_secure_ram_storage = | 863 | omap3_secure_ram_storage = |
866 | kmalloc(0x803F, GFP_KERNEL); | 864 | kmalloc(0x803F, GFP_KERNEL); |
867 | if (!omap3_secure_ram_storage) | 865 | if (!omap3_secure_ram_storage) |
868 | printk(KERN_ERR "Memory allocation failed when" | 866 | pr_err("Memory allocation failed when " |
869 | "allocating for secure sram context\n"); | 867 | "allocating for secure sram context\n"); |
870 | 868 | ||
871 | local_irq_disable(); | 869 | local_irq_disable(); |
872 | local_fiq_disable(); | 870 | local_fiq_disable(); |