diff options
| -rw-r--r-- | drivers/acpi/acpica/hwvalid.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/drivers/acpi/acpica/hwvalid.c b/drivers/acpi/acpica/hwvalid.c index 3094cec4eab4..d1679035d5f3 100644 --- a/drivers/acpi/acpica/hwvalid.c +++ b/drivers/acpi/acpica/hwvalid.c | |||
| @@ -128,14 +128,14 @@ acpi_hw_validate_io_request(acpi_io_address address, u32 bit_width) | |||
| 128 | acpi_io_address last_address; | 128 | acpi_io_address last_address; |
| 129 | const struct acpi_port_info *port_info; | 129 | const struct acpi_port_info *port_info; |
| 130 | 130 | ||
| 131 | ACPI_FUNCTION_NAME(hw_validate_io_request); | 131 | ACPI_FUNCTION_TRACE(hw_validate_io_request); |
| 132 | 132 | ||
| 133 | /* Supported widths are 8/16/32 */ | 133 | /* Supported widths are 8/16/32 */ |
| 134 | 134 | ||
| 135 | if ((bit_width != 8) && (bit_width != 16) && (bit_width != 32)) { | 135 | if ((bit_width != 8) && (bit_width != 16) && (bit_width != 32)) { |
| 136 | ACPI_ERROR((AE_INFO, | 136 | ACPI_ERROR((AE_INFO, |
| 137 | "Bad BitWidth parameter: %8.8X", bit_width)); | 137 | "Bad BitWidth parameter: %8.8X", bit_width)); |
| 138 | return (AE_BAD_PARAMETER); | 138 | return_ACPI_STATUS(AE_BAD_PARAMETER); |
| 139 | } | 139 | } |
| 140 | 140 | ||
| 141 | port_info = acpi_protected_ports; | 141 | port_info = acpi_protected_ports; |
| @@ -153,13 +153,13 @@ acpi_hw_validate_io_request(acpi_io_address address, u32 bit_width) | |||
| 153 | ACPI_ERROR((AE_INFO, | 153 | ACPI_ERROR((AE_INFO, |
| 154 | "Illegal I/O port address/length above 64K: %8.8X%8.8X/0x%X", | 154 | "Illegal I/O port address/length above 64K: %8.8X%8.8X/0x%X", |
| 155 | ACPI_FORMAT_UINT64(address), byte_width)); | 155 | ACPI_FORMAT_UINT64(address), byte_width)); |
| 156 | return (AE_LIMIT); | 156 | return_ACPI_STATUS(AE_LIMIT); |
| 157 | } | 157 | } |
| 158 | 158 | ||
| 159 | /* Exit if requested address is not within the protected port table */ | 159 | /* Exit if requested address is not within the protected port table */ |
| 160 | 160 | ||
| 161 | if (address > acpi_protected_ports[ACPI_PORT_INFO_ENTRIES - 1].end) { | 161 | if (address > acpi_protected_ports[ACPI_PORT_INFO_ENTRIES - 1].end) { |
| 162 | return (AE_OK); | 162 | return_ACPI_STATUS(AE_OK); |
| 163 | } | 163 | } |
| 164 | 164 | ||
| 165 | /* Check request against the list of protected I/O ports */ | 165 | /* Check request against the list of protected I/O ports */ |
| @@ -180,8 +180,8 @@ acpi_hw_validate_io_request(acpi_io_address address, u32 bit_width) | |||
| 180 | /* Port illegality may depend on the _OSI calls made by the BIOS */ | 180 | /* Port illegality may depend on the _OSI calls made by the BIOS */ |
| 181 | 181 | ||
| 182 | if (acpi_gbl_osi_data >= port_info->osi_dependency) { | 182 | if (acpi_gbl_osi_data >= port_info->osi_dependency) { |
| 183 | ACPI_DEBUG_PRINT((ACPI_DB_IO, | 183 | ACPI_DEBUG_PRINT((ACPI_DB_VALUES, |
| 184 | "Denied AML access to port 0x%8.8X%8.8X/%X (%s 0x%.4X-0x%.4X)", | 184 | "Denied AML access to port 0x%8.8X%8.8X/%X (%s 0x%.4X-0x%.4X)\n", |
| 185 | ACPI_FORMAT_UINT64(address), | 185 | ACPI_FORMAT_UINT64(address), |
| 186 | byte_width, port_info->name, | 186 | byte_width, port_info->name, |
| 187 | port_info->start, | 187 | port_info->start, |
| @@ -198,7 +198,7 @@ acpi_hw_validate_io_request(acpi_io_address address, u32 bit_width) | |||
| 198 | } | 198 | } |
| 199 | } | 199 | } |
| 200 | 200 | ||
| 201 | return (AE_OK); | 201 | return_ACPI_STATUS(AE_OK); |
| 202 | } | 202 | } |
| 203 | 203 | ||
| 204 | /****************************************************************************** | 204 | /****************************************************************************** |
