[PATCH] protect PAL mapping printk with EFI_DEBUG

From: Jesse Barnes <jbarnes_at_sgi.com>
Date: 2003-09-11 07:34:57
Having this print out for every CPU on a large system was a pain, so
protect the printk with EFI_DEBUG.

Jesse


diff -Nru a/arch/ia64/kernel/efi.c b/arch/ia64/kernel/efi.c
--- a/arch/ia64/kernel/efi.c	Wed Sep 10 14:26:40 2003
+++ b/arch/ia64/kernel/efi.c	Wed Sep 10 14:26:40 2003
@@ -446,10 +446,12 @@
 			panic("Woah!  PAL code size bigger than a granule!");
 
 		mask  = ~((1 << IA64_GRANULE_SHIFT) - 1);
+#if EFI_DEBUG
 		printk(KERN_INFO "CPU %d: mapping PAL code [0x%lx-0x%lx) into [0x%lx-0x%lx)\n",
 		       smp_processor_id(), md->phys_addr,
 		       md->phys_addr + (md->num_pages << EFI_PAGE_SHIFT),
 		       vaddr & mask, (vaddr & mask) + IA64_GRANULE_SIZE);
+#endif
 
 		/*
 		 * Cannot write to CRx with PSR.ic=1
-
To unsubscribe from this list: send the line "unsubscribe linux-ia64" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Received on Wed Sep 10 17:50:43 2003

This archive was generated by hypermail 2.1.8 : 2005-08-02 09:20:17 EST