On Tue, Feb 21, 2017 at 07:10:11PM +0000, James Morse wrote: > Hi Tyler, > > On 15/02/17 19:51, Tyler Baicar wrote: > > + } else { > > + const void *unknown_err; > > + > > + unknown_err = acpi_hest_generic_data_payload(gdata); > > + printk("%ssection type: %pUl\n", newpfx, sec_type); > > + printk("%ssection length: %d\n", newpfx, > > Nit: please use the "%s""section... that this file consistently uses. This means > this code will still work as expected when someone adds '%ss' support to printk! No. That is wrong: "%s""section" is stored in memory as bytes containing: '%' 's' 's' 'e' 'c' 't' 'i' 'o' 'n' whereas "%ssection" is stored in memory as bytes containing: '%' 's' 's' 'e' 'c' 't' 'i' 'o' 'n' They're exactly the same, so when printk() comes to parse the string, it sees exactly the same byte sequence. So, the only thing that's happening is code obfuscation for no good reason what so ever. If you don't believe me, run some build tests and look at the resulting strings... also look at the C standard. "Adjacent string literal tokens are concatenated." Please get rid of this obfuscation. -- RMK's Patch system: http://www.armlinux.org.uk/developer/patches/ FTTC broadband for 0.8mile line: currently at 9.6Mbps down 400kbps up according to speedtest.net. -- To unsubscribe from this list: send the line "unsubscribe linux-efi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html