wimax/i2400m: Change d_printf() level for secure boot messages
Changing debug level of print out to support validation engineers getting the messages they need. Signed-off-by: <dirk.j.brandewie@intel.com>
This commit is contained in:
parent
16eafba8de
commit
ead6823991
|
@ -532,14 +532,14 @@ int i2400m_dnload_finalize(struct i2400m *i2400m,
|
||||||
cmd = (void *) bcf + offset;
|
cmd = (void *) bcf + offset;
|
||||||
if (i2400m->sboot == 0) {
|
if (i2400m->sboot == 0) {
|
||||||
struct i2400m_bootrom_header jump_ack;
|
struct i2400m_bootrom_header jump_ack;
|
||||||
d_printf(3, dev, "unsecure boot, jumping to 0x%08x\n",
|
d_printf(1, dev, "unsecure boot, jumping to 0x%08x\n",
|
||||||
le32_to_cpu(cmd->target_addr));
|
le32_to_cpu(cmd->target_addr));
|
||||||
i2400m_brh_set_opcode(cmd, I2400M_BRH_JUMP);
|
i2400m_brh_set_opcode(cmd, I2400M_BRH_JUMP);
|
||||||
cmd->data_size = 0;
|
cmd->data_size = 0;
|
||||||
ret = i2400m_bm_cmd(i2400m, cmd, sizeof(*cmd),
|
ret = i2400m_bm_cmd(i2400m, cmd, sizeof(*cmd),
|
||||||
&jump_ack, sizeof(jump_ack), 0);
|
&jump_ack, sizeof(jump_ack), 0);
|
||||||
} else {
|
} else {
|
||||||
d_printf(3, dev, "secure boot, jumping to 0x%08x\n",
|
d_printf(1, dev, "secure boot, jumping to 0x%08x\n",
|
||||||
le32_to_cpu(cmd->target_addr));
|
le32_to_cpu(cmd->target_addr));
|
||||||
cmd_buf = i2400m->bm_cmd_buf;
|
cmd_buf = i2400m->bm_cmd_buf;
|
||||||
memcpy(&cmd_buf->cmd, cmd, sizeof(*cmd));
|
memcpy(&cmd_buf->cmd, cmd, sizeof(*cmd));
|
||||||
|
|
Loading…
Reference in a new issue