From 9e569e2f55d142026945760ff2cb9b5e3134aa18 Mon Sep 17 00:00:00 2001 From: Dirk Brandewie Date: Tue, 12 May 2009 06:22:27 -0700 Subject: [PATCH] --- yaml --- r: 150871 b: refs/heads/master c: ead68239913cb9c19150facf1656517f81d66fcb h: refs/heads/master i: 150869: ecf0ba70c65bb385c39ff7a4e17bff477382f31c 150867: 2c2c63adb44bc332384fb4c0094bf2264f6d6712 150863: 831f395a3b071dcafc79964583d92380a08d6311 v: v3 --- [refs] | 2 +- trunk/drivers/net/wimax/i2400m/fw.c | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/[refs] b/[refs] index 361c63983c10..74cadb237e7c 100644 --- a/[refs] +++ b/[refs] @@ -1,2 +1,2 @@ --- -refs/heads/master: 16eafba8defcd507831eec926b61db474af0aabb +refs/heads/master: ead68239913cb9c19150facf1656517f81d66fcb diff --git a/trunk/drivers/net/wimax/i2400m/fw.c b/trunk/drivers/net/wimax/i2400m/fw.c index 675c6ce810c0..7ee1b99b3843 100644 --- a/trunk/drivers/net/wimax/i2400m/fw.c +++ b/trunk/drivers/net/wimax/i2400m/fw.c @@ -532,14 +532,14 @@ int i2400m_dnload_finalize(struct i2400m *i2400m, cmd = (void *) bcf + offset; if (i2400m->sboot == 0) { struct i2400m_bootrom_header jump_ack; - d_printf(3, dev, "unsecure boot, jumping to 0x%08x\n", + d_printf(1, dev, "unsecure boot, jumping to 0x%08x\n", le32_to_cpu(cmd->target_addr)); i2400m_brh_set_opcode(cmd, I2400M_BRH_JUMP); cmd->data_size = 0; ret = i2400m_bm_cmd(i2400m, cmd, sizeof(*cmd), &jump_ack, sizeof(jump_ack), 0); } else { - d_printf(3, dev, "secure boot, jumping to 0x%08x\n", + d_printf(1, dev, "secure boot, jumping to 0x%08x\n", le32_to_cpu(cmd->target_addr)); cmd_buf = i2400m->bm_cmd_buf; memcpy(&cmd_buf->cmd, cmd, sizeof(*cmd));