From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 1F62381EC6 for ; Tue, 15 Nov 2016 00:37:41 -0800 (PST) Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga101.fm.intel.com with ESMTP; 15 Nov 2016 00:37:45 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.31,641,1473145200"; d="scan'208";a="31391212" Received: from fmsmsx106.amr.corp.intel.com ([10.18.124.204]) by orsmga005.jf.intel.com with ESMTP; 15 Nov 2016 00:37:42 -0800 Received: from fmsmsx113.amr.corp.intel.com (10.18.116.7) by FMSMSX106.amr.corp.intel.com (10.18.124.204) with Microsoft SMTP Server (TLS) id 14.3.248.2; Tue, 15 Nov 2016 00:37:25 -0800 Received: from shsmsx102.ccr.corp.intel.com (10.239.4.154) by FMSMSX113.amr.corp.intel.com (10.18.116.7) with Microsoft SMTP Server (TLS) id 14.3.248.2; Tue, 15 Nov 2016 00:37:25 -0800 Received: from shsmsx101.ccr.corp.intel.com ([169.254.1.239]) by shsmsx102.ccr.corp.intel.com ([169.254.2.239]) with mapi id 14.03.0248.002; Tue, 15 Nov 2016 16:37:22 +0800 From: "Tian, Feng" To: "Fan, Jeff" , "edk2-devel@ml01.01.org" CC: "Kinney, Michael D" , "Tian, Feng" Thread-Topic: [PATCH] UefiCpuPkg/SecCore: Use %x to print stack information Thread-Index: AQHSPxrn2ZYvKD9d+06agDz3WFIcUKDZuLRA Date: Tue, 15 Nov 2016 08:37:22 +0000 Message-ID: <7F1BAD85ADEA444D97065A60D2E97EE566E50E1E@SHSMSX101.ccr.corp.intel.com> References: <20161115083213.7700-1-jeff.fan@intel.com> In-Reply-To: <20161115083213.7700-1-jeff.fan@intel.com> Accept-Language: zh-CN, en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.239.127.40] MIME-Version: 1.0 Subject: Re: [PATCH] UefiCpuPkg/SecCore: Use %x to print stack information X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 15 Nov 2016 08:37:41 -0000 Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Reviewed-by: Feng Tian Thanks Feng -----Original Message----- From: Fan, Jeff=20 Sent: Tuesday, November 15, 2016 4:32 PM To: edk2-devel@ml01.01.org Cc: Tian, Feng ; Kinney, Michael D Subject: [PATCH] UefiCpuPkg/SecCore: Use %x to print stack information SecCoreData->StackBase is VOID * type and SecCoreData->StackSize is UINTN t= ype. We should use %x to dump their value instead of %lx. Cast pointer type to UINTN before print it. Cc: Feng Tian Cc: Michael D Kinney Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Jeff Fan --- UefiCpuPkg/SecCore/SecMain.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/UefiCpuPkg/SecCore/SecMain.c b/UefiCpuPkg/SecCore/SecMain.c in= dex 2ebbc22..4d08f48 100644 --- a/UefiCpuPkg/SecCore/SecMain.c +++ b/UefiCpuPkg/SecCore/SecMain.c @@ -239,9 +239,9 @@ SecStartupPhase2( =20 DEBUG (( DEBUG_INFO, - "%a() Stack Base: 0x%lx, Stack Size: 0x%lx\n", + "%a() Stack Base: 0x%x, Stack Size: 0x%x\n", __FUNCTION__, - SecCoreData->StackBase, + (UINTN) SecCoreData->StackBase, SecCoreData->StackSize )); =20 -- 2.9.3.windows.2