Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp924538ybz; Wed, 29 Apr 2020 11:49:49 -0700 (PDT) X-Google-Smtp-Source: APiQypIdPyXfIPQ5oxYVV+pXsK4NIzOw8DZ/FK+JHnjo3PGd0m8nYajQht9eFAcKnIZ+L16giZ5P X-Received: by 2002:a17:906:7e19:: with SMTP id e25mr4158192ejr.358.1588186189425; Wed, 29 Apr 2020 11:49:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588186189; cv=none; d=google.com; s=arc-20160816; b=ch060H3o5hmZrUm8FL5DsjDgJ1GrOE3iquelbJwu3EyRdqP83H6UABBPXM+lYgAHTY drNx5gFfUoyByGox7SRKcs0+cieL0tGZd81M8+2YfQwl4OKSLYlZ/pl5IuGqfUhBqvkM OG8pj8dvSgXcAD6EyA0u+M4PPBRoJIqsjUF9d5O/p2wljU4Uv/hm4pWmC26mfAYRdMg5 EDtmYO7eY3lonSYLClLaxa3auHyYHPbJO/6bEWRrwKwN/GXWaxBll4HJT4iKwIhh5lfr Sz2oUSJ5EOxci7UTtVYlKHOrqQ/zWm/1Icw5yl/unALE+zdk1fCK9+wmu+qWqkp5V+Lr GSHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=NQyfrMFUyIoxV0IfKQIWi809uGZTEqCZqY0aLxAP134=; b=JDtXGNF6KGKe8oXlD9UxlFZoJ2KDkET0b5Xvf8sGWdJRLArMuIaSnxnI9xp7+eqWnm z38ebk3brHl9P3Fnw81QPKqjUTVpCCgEnRPvfSc7pS6tHkfljNEkYso7PtSzhn8+Tu1K lsMgu9Jf/DsCxv0fJAHQkaf49etGtsXexfNiG4eYBuJO48YiVItNM5xQsX8FIPl/VhEJ LX1m6PnEdGAN++qiazmjUEHbRocGcM5u/BetkVZPOgbLxNLV0nAAwG5hdfqxmEjAm4FL vMQOd+fXwviOl5q976fu0x2pB1WCYrHnh1aHsY6pKoAcwusNO/3lOvTVHNqC2dyW4/iP d9lA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i21si4401096ejh.256.2020.04.29.11.49.25; Wed, 29 Apr 2020 11:49:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726935AbgD2Srw (ORCPT + 99 others); Wed, 29 Apr 2020 14:47:52 -0400 Received: from smtprelay0228.hostedemail.com ([216.40.44.228]:60936 "EHLO smtprelay.hostedemail.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726423AbgD2Srv (ORCPT ); Wed, 29 Apr 2020 14:47:51 -0400 Received: from filter.hostedemail.com (clb03-v110.bra.tucows.net [216.40.38.60]) by smtprelay02.hostedemail.com (Postfix) with ESMTP id 75836483C; Wed, 29 Apr 2020 18:47:50 +0000 (UTC) X-Session-Marker: 6A6F6540706572636865732E636F6D X-Spam-Summary: 2,0,0,,d41d8cd98f00b204,joe@perches.com,,RULES_HIT:41:69:355:379:599:800:960:966:988:989:1260:1277:1311:1313:1314:1345:1359:1437:1515:1516:1518:1535:1544:1593:1594:1711:1730:1747:1777:1792:2196:2199:2393:2559:2562:2828:3138:3139:3140:3141:3142:3355:3622:3865:3866:3867:3871:3872:4321:4385:5007:6691:7974:8603:9040:10004:11026:11232:11473:11657:11658:11914:12043:12296:12297:12438:12555:12740:12760:12895:12986:13439:14181:14659:14721:21080:21212:21324:21325:21433:21451:21627:21660:21990:30012:30046:30054:30091,0,RBL:none,CacheIP:none,Bayesian:0.5,0.5,0.5,Netcheck:none,DomainCache:0,MSF:not bulk,SPF:,MSBL:0,DNSBL:none,Custom_rules:0:0:0,LFtime:1,LUA_SUMMARY:none X-HE-Tag: kick44_a1d68a6ba161 X-Filterd-Recvd-Size: 5691 Received: from XPS-9350.home (unknown [47.151.136.130]) (Authenticated sender: joe@perches.com) by omf09.hostedemail.com (Postfix) with ESMTPA; Wed, 29 Apr 2020 18:47:49 +0000 (UTC) Message-ID: Subject: Re: [PATCH 03/10] efi/x86: Use pr_efi_err for error messages From: Joe Perches To: Arvind Sankar , Ard Biesheuvel Cc: linux-efi@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org Date: Wed, 29 Apr 2020 11:47:48 -0700 In-Reply-To: <20200429174120.1497212-5-nivedita@alum.mit.edu> References: <20200429174120.1497212-1-nivedita@alum.mit.edu> <20200429174120.1497212-5-nivedita@alum.mit.edu> Content-Type: text/plain; charset="ISO-8859-1" User-Agent: Evolution 3.36.1-2 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 2020-04-29 at 13:41 -0400, Arvind Sankar wrote: > Use pr_efi_err instead of bare efi_printk for error messages. Perhaps it'd be better to rename pr_efi_err to eri_err to it's clearer it's a typical efi_ logging function. $ git grep -w --name-only pr_efi_err | \ xargs sed -i 's/\bpr_efi_err\b/efi_err/g' Looking at code for efi_printk -> efi_char16_printk, it's somewhat difficult to see where the "output_string" function pointer is set. Any clue? > Signed-off-by: Arvind Sankar > --- > drivers/firmware/efi/libstub/x86-stub.c | 24 ++++++++++++------------ > 1 file changed, 12 insertions(+), 12 deletions(-) > > diff --git a/drivers/firmware/efi/libstub/x86-stub.c b/drivers/firmware/efi/libstub/x86-stub.c > index 677b5a1e0543..933205772d8c 100644 > --- a/drivers/firmware/efi/libstub/x86-stub.c > +++ b/drivers/firmware/efi/libstub/x86-stub.c > @@ -49,7 +49,7 @@ preserve_pci_rom_image(efi_pci_io_protocol_t *pci, struct pci_setup_rom **__rom) > status = efi_bs_call(allocate_pool, EFI_LOADER_DATA, size, > (void **)&rom); > if (status != EFI_SUCCESS) { > - efi_printk("Failed to allocate memory for 'rom'\n"); > + pr_efi_err("Failed to allocate memory for 'rom'\n"); > return status; > } > > @@ -65,7 +65,7 @@ preserve_pci_rom_image(efi_pci_io_protocol_t *pci, struct pci_setup_rom **__rom) > PCI_VENDOR_ID, 1, &rom->vendor); > > if (status != EFI_SUCCESS) { > - efi_printk("Failed to read rom->vendor\n"); > + pr_efi_err("Failed to read rom->vendor\n"); > goto free_struct; > } > > @@ -73,7 +73,7 @@ preserve_pci_rom_image(efi_pci_io_protocol_t *pci, struct pci_setup_rom **__rom) > PCI_DEVICE_ID, 1, &rom->devid); > > if (status != EFI_SUCCESS) { > - efi_printk("Failed to read rom->devid\n"); > + pr_efi_err("Failed to read rom->devid\n"); > goto free_struct; > } > > @@ -118,7 +118,7 @@ static void setup_efi_pci(struct boot_params *params) > (void **)&pci_handle); > > if (status != EFI_SUCCESS) { > - efi_printk("Failed to allocate memory for 'pci_handle'\n"); > + pr_efi_err("Failed to allocate memory for 'pci_handle'\n"); > return; > } > > @@ -172,7 +172,7 @@ static void retrieve_apple_device_properties(struct boot_params *boot_params) > return; > > if (efi_table_attr(p, version) != 0x10000) { > - efi_printk("Unsupported properties proto version\n"); > + pr_efi_err("Unsupported properties proto version\n"); > return; > } > > @@ -185,7 +185,7 @@ static void retrieve_apple_device_properties(struct boot_params *boot_params) > size + sizeof(struct setup_data), > (void **)&new); > if (status != EFI_SUCCESS) { > - efi_printk("Failed to allocate memory for 'properties'\n"); > + pr_efi_err("Failed to allocate memory for 'properties'\n"); > return; > } > > @@ -372,7 +372,7 @@ efi_status_t __efiapi efi_pe_entry(efi_handle_t handle, > > status = efi_bs_call(handle_protocol, handle, &proto, (void **)&image); > if (status != EFI_SUCCESS) { > - efi_printk("Failed to get handle for LOADED_IMAGE_PROTOCOL\n"); > + pr_efi_err("Failed to get handle for LOADED_IMAGE_PROTOCOL\n"); > efi_exit(handle, status); > } > > @@ -382,7 +382,7 @@ efi_status_t __efiapi efi_pe_entry(efi_handle_t handle, > status = efi_allocate_pages(sizeof(struct boot_params), > (unsigned long *)&boot_params, ULONG_MAX); > if (status != EFI_SUCCESS) { > - efi_printk("Failed to allocate lowmem for boot params\n"); > + pr_efi_err("Failed to allocate lowmem for boot params\n"); > efi_exit(handle, status); > } > > @@ -749,7 +749,7 @@ unsigned long efi_main(efi_handle_t handle, > hdr->kernel_alignment, > LOAD_PHYSICAL_ADDR); > if (status != EFI_SUCCESS) { > - efi_printk("efi_relocate_kernel() failed!\n"); > + pr_efi_err("efi_relocate_kernel() failed!\n"); > goto fail; > } > /* > @@ -786,7 +786,7 @@ unsigned long efi_main(efi_handle_t handle, > efi_set_u64_split(size, &hdr->ramdisk_size, > &boot_params->ext_ramdisk_size); > } else if (status != EFI_NOT_FOUND) { > - efi_printk("efi_load_initrd_dev_path() failed!\n"); > + pr_efi_err("efi_load_initrd_dev_path() failed!\n"); > goto fail; > } > } > @@ -813,13 +813,13 @@ unsigned long efi_main(efi_handle_t handle, > > status = exit_boot(boot_params, handle); > if (status != EFI_SUCCESS) { > - efi_printk("exit_boot() failed!\n"); > + pr_efi_err("exit_boot() failed!\n"); > goto fail; > } > > return bzimage_addr; > fail: > - efi_printk("efi_main() failed!\n"); > + pr_efi_err("efi_main() failed!\n"); > > efi_exit(handle, status); > }