diff options
-rw-r--r-- | arm/aarch64/kvm.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/arm/aarch64/kvm.c b/arm/aarch64/kvm.c index b38365fb..56a0aedc 100644 --- a/arm/aarch64/kvm.c +++ b/arm/aarch64/kvm.c @@ -16,7 +16,7 @@ unsigned long long kvm__arch_get_kern_offset(struct kvm *kvm, int fd) struct arm64_image_header header; off_t cur_offset; ssize_t size; - const char *warn_str; + const char *debug_str; /* the 32bit kernel offset is a well known value */ if (kvm->cfg.arch.aarch32_guest) @@ -25,8 +25,8 @@ unsigned long long kvm__arch_get_kern_offset(struct kvm *kvm, int fd) cur_offset = lseek(fd, 0, SEEK_CUR); if (cur_offset == (off_t)-1 || lseek(fd, 0, SEEK_SET) == (off_t)-1) { - warn_str = "Failed to seek in kernel image file"; - goto fail; + debug_str = "Failed to seek in kernel image file"; + goto default_offset; } size = xread(fd, &header, sizeof(header)); @@ -36,16 +36,16 @@ unsigned long long kvm__arch_get_kern_offset(struct kvm *kvm, int fd) lseek(fd, cur_offset, SEEK_SET); if (memcmp(&header.magic, ARM64_IMAGE_MAGIC, sizeof(header.magic))) { - warn_str = "Kernel image magic not matching"; - goto fail; + debug_str = "Kernel image magic not matching"; + goto default_offset; } if (le64_to_cpu(header.image_size)) return le64_to_cpu(header.text_offset); - warn_str = "Image size is 0"; -fail: - pr_warning("%s, assuming TEXT_OFFSET to be 0x80000", warn_str); + debug_str = "Image size is 0"; +default_offset: + pr_debug("%s, assuming TEXT_OFFSET to be 0x80000", debug_str); return 0x80000; } |