This patch makes a some elf debugging information available at log level
authorStefan Reinauer <stepan@coresystems.de>
Sat, 14 Apr 2007 16:34:32 +0000 (16:34 +0000)
committerStefan Reinauer <stepan@openbios.org>
Sat, 14 Apr 2007 16:34:32 +0000 (16:34 +0000)
debug instead of spew. (trivial)

Signed-off-by: Stefan Reinauer <stepan@coresystems.de>
Acked-by: Stefan Reinauer <stepan@coresystems.de>
git-svn-id: svn://svn.coreboot.org/coreboot/trunk@2611 2b7e53f0-3cfb-0310-b3e9-8179ed1497e1

src/boot/elfboot.c

index c0bcd177da779a00a8a251073ebfb5992ddad463..9050d7ba01910388bee79b53d80153974f8033ff 100644 (file)
@@ -627,7 +627,7 @@ int elfboot(struct lb_memory *mem)
        for(i = 0; i < ELF_HEAD_SIZE - (sizeof(Elf_ehdr) + sizeof(Elf_phdr)); i+=16) {
                ehdr = (Elf_ehdr *)(&header[i]);
                if (memcmp(ehdr->e_ident, ELFMAG, 4) != 0) {
-                       printk_spew("NO header at %d\n", i);
+                       printk_debug("No header at %d\n", i);
                        continue;
                }
                printk_debug("Found ELF candidate at offset %d\n", i);
@@ -646,12 +646,12 @@ int elfboot(struct lb_memory *mem)
                }
                ehdr = 0;
        }
-       printk_spew("header_offset is %d\n", header_offset);
+       printk_debug("header_offset is %d\n", header_offset);
        if (header_offset == -1) {
                goto out;
        }
 
-       printk_spew("Try to load at offset 0x%x\n", header_offset);
+       printk_debug("Try to load at offset 0x%x\n", header_offset);
        result = elfload(mem, 
                header + header_offset , ELF_HEAD_SIZE - header_offset);
  out:
@@ -659,7 +659,7 @@ int elfboot(struct lb_memory *mem)
                /* Shutdown the stream device */
                stream_fini();
 
-               printk_err("Cannot Load ELF Image\n");
+               printk_err("Can not load ELF Image.\n");
 
                post_code(0xff);
        }