提交 ead68239 编写于 作者: D Dirk Brandewie 提交者: Inaky Perez-Gonzalez

wimax/i2400m: Change d_printf() level for secure boot messages

Changing debug level of print out to support validation engineers
getting the messages they need.
Signed-off-by: N  <dirk.j.brandewie@intel.com>
上级 16eafba8
...@@ -532,14 +532,14 @@ int i2400m_dnload_finalize(struct i2400m *i2400m, ...@@ -532,14 +532,14 @@ int i2400m_dnload_finalize(struct i2400m *i2400m,
cmd = (void *) bcf + offset; cmd = (void *) bcf + offset;
if (i2400m->sboot == 0) { if (i2400m->sboot == 0) {
struct i2400m_bootrom_header jump_ack; struct i2400m_bootrom_header jump_ack;
d_printf(3, dev, "unsecure boot, jumping to 0x%08x\n", d_printf(1, dev, "unsecure boot, jumping to 0x%08x\n",
le32_to_cpu(cmd->target_addr)); le32_to_cpu(cmd->target_addr));
i2400m_brh_set_opcode(cmd, I2400M_BRH_JUMP); i2400m_brh_set_opcode(cmd, I2400M_BRH_JUMP);
cmd->data_size = 0; cmd->data_size = 0;
ret = i2400m_bm_cmd(i2400m, cmd, sizeof(*cmd), ret = i2400m_bm_cmd(i2400m, cmd, sizeof(*cmd),
&jump_ack, sizeof(jump_ack), 0); &jump_ack, sizeof(jump_ack), 0);
} else { } else {
d_printf(3, dev, "secure boot, jumping to 0x%08x\n", d_printf(1, dev, "secure boot, jumping to 0x%08x\n",
le32_to_cpu(cmd->target_addr)); le32_to_cpu(cmd->target_addr));
cmd_buf = i2400m->bm_cmd_buf; cmd_buf = i2400m->bm_cmd_buf;
memcpy(&cmd_buf->cmd, cmd, sizeof(*cmd)); memcpy(&cmd_buf->cmd, cmd, sizeof(*cmd));
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册