Just in case someone wants a more detailed explanation:
prot is read again after the first if (prot & 0x3) and may have changed,
so the second if (prot & 0x3) is not redundant.

Regards,
Carl-Daniel

On 06.05.2009 15:51, s...@coreboot.org wrote:
> Author: hailfinger
> Date: 2009-05-06 15:51:44 +0200 (Wed, 06 May 2009)
> New Revision: 467
>
> Modified:
>    trunk/chipset_enable.c
> Log:
> Revert r466 because it introduced a bug:
> If unprotect succeeded, it will print "SB600 unprotect failed".
>
> Signed-off-by: Carl-Daniel Hailfinger <c-d.hailfinger.devel.2...@gmx.net>
> Acked-by: Carl-Daniel Hailfinger <c-d.hailfinger.devel.2...@gmx.net>
>
>
> Modified: trunk/chipset_enable.c
> ===================================================================
> --- trunk/chipset_enable.c    2009-05-06 13:43:26 UTC (rev 466)
> +++ trunk/chipset_enable.c    2009-05-06 13:51:44 UTC (rev 467)
> @@ -675,11 +675,12 @@
>               prot &= 0xfffffffc;
>               pci_write_byte(dev, reg, prot);
>               prot = pci_read_long(dev, reg);
> -             printf("SB600 %s%sunprotect failed from %u to %u\n",
> -                     (prot & 0x1) ? "write " : "",
> -                     (prot & 0x2) ? "read " : "",
> -                     (prot & 0xfffffc00),
> -                     (prot & 0xfffffc00) + ((prot & 0x3ff) << 8));
> +             if (prot & 0x3)
> +                     printf("SB600 still %s%sprotected from %u to %u\n",
> +                             (prot & 0x1) ? "write " : "",
> +                             (prot & 0x2) ? "read " : "",
> +                             (prot & 0xfffffc00),
> +                             (prot & 0xfffffc00) + ((prot & 0x3ff) << 8));
>       }
>  
>       /* Read SPI_BaseAddr */
>
>
>   


-- 
http://www.hailfinger.org/


-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Reply via email to