diff options
author | Pridhiviraj Paidipeddi <ppaidipe@linux.vnet.ibm.com> | 2018-02-08 00:01:13 +0530 |
---|---|---|
committer | Stewart Smith <stewart@linux.vnet.ibm.com> | 2018-02-07 21:22:22 -0600 |
commit | b90b08fc2f9a9e6b54be8f50b804dedb8a52f1e8 (patch) | |
tree | 8e5e6978bfda69efb72945ed8b33e819c153e750 /libstb | |
parent | 9b7289511d7ebdce5a289a37a06d3cb9f4543e28 (diff) | |
download | talos-skiboot-b90b08fc2f9a9e6b54be8f50b804dedb8a52f1e8.tar.gz talos-skiboot-b90b08fc2f9a9e6b54be8f50b804dedb8a52f1e8.zip |
libstb: increase the log level of verify/measure messages to PR_NOTICE.
Currently libstb logs the verify and hash caluculation messages in
PR_INFO level. So when there is a secure boot enforcement happens
in loading last flash resource(Ex: BOOTKERNEL), the previous verify
and measure messages are not logged to console, which is not clear
to the end user which resource is verified and measured.
So this patch fixes this by increasing the log level to PR_NOTICE.
Signed-off-by: Pridhiviraj Paidipeddi <ppaidipe@linux.vnet.ibm.com>
Signed-off-by: Stewart Smith <stewart@linux.vnet.ibm.com>
Diffstat (limited to 'libstb')
-rw-r--r-- | libstb/secureboot.c | 2 | ||||
-rw-r--r-- | libstb/trustedboot.c | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/libstb/secureboot.c b/libstb/secureboot.c index afe19fe9..08a6ae6d 100644 --- a/libstb/secureboot.c +++ b/libstb/secureboot.c @@ -179,7 +179,7 @@ int secureboot_verify(enum resource_id id, void *buf, size_t len) rc = call_cvc_verify(buf, len, hw_key_hash, hw_key_hash_size, &log); if (rc == OPAL_SUCCESS) { - prlog(PR_INFO, "%s verified\n", name); + prlog(PR_NOTICE, "%s verified\n", name); } else if (rc == OPAL_PARTIAL) { /* * The value returned in log indicates what checking has diff --git a/libstb/trustedboot.c b/libstb/trustedboot.c index e2df0e6f..058e45e3 100644 --- a/libstb/trustedboot.c +++ b/libstb/trustedboot.c @@ -215,7 +215,7 @@ int trustedboot_measure(enum resource_id id, void *buf, size_t len) rc = call_cvc_sha512(buf_aux, len_aux, digest, SHA512_DIGEST_LENGTH); if (rc == OPAL_SUCCESS) { - prlog(PR_INFO, "%s hash calculated\n", name); + prlog(PR_NOTICE, "%s hash calculated\n", name); } else if (rc == OPAL_PARAMETER) { prlog(PR_ERR, "%s NOT MEASURED, invalid param. buf=%p, " "len=%zd, digest=%p\n", name, buf_aux, |