aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--arm/aarch64/kvm.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/arm/aarch64/kvm.c b/arm/aarch64/kvm.c
index b38365fb..56a0aedc 100644
--- a/arm/aarch64/kvm.c
+++ b/arm/aarch64/kvm.c
@@ -16,7 +16,7 @@ unsigned long long kvm__arch_get_kern_offset(struct kvm *kvm, int fd)
struct arm64_image_header header;
off_t cur_offset;
ssize_t size;
- const char *warn_str;
+ const char *debug_str;
/* the 32bit kernel offset is a well known value */
if (kvm->cfg.arch.aarch32_guest)
@@ -25,8 +25,8 @@ unsigned long long kvm__arch_get_kern_offset(struct kvm *kvm, int fd)
cur_offset = lseek(fd, 0, SEEK_CUR);
if (cur_offset == (off_t)-1 ||
lseek(fd, 0, SEEK_SET) == (off_t)-1) {
- warn_str = "Failed to seek in kernel image file";
- goto fail;
+ debug_str = "Failed to seek in kernel image file";
+ goto default_offset;
}
size = xread(fd, &header, sizeof(header));
@@ -36,16 +36,16 @@ unsigned long long kvm__arch_get_kern_offset(struct kvm *kvm, int fd)
lseek(fd, cur_offset, SEEK_SET);
if (memcmp(&header.magic, ARM64_IMAGE_MAGIC, sizeof(header.magic))) {
- warn_str = "Kernel image magic not matching";
- goto fail;
+ debug_str = "Kernel image magic not matching";
+ goto default_offset;
}
if (le64_to_cpu(header.image_size))
return le64_to_cpu(header.text_offset);
- warn_str = "Image size is 0";
-fail:
- pr_warning("%s, assuming TEXT_OFFSET to be 0x80000", warn_str);
+ debug_str = "Image size is 0";
+default_offset:
+ pr_debug("%s, assuming TEXT_OFFSET to be 0x80000", debug_str);
return 0x80000;
}