@@ -40,6 +40,8 @@ boot_image_validate(const struct flash_area *fa_p,
40
40
static uint8_t tmpbuf [BOOT_TMPBUF_SZ ];
41
41
FIH_DECLARE (fih_rc , FIH_FAILURE );
42
42
43
+ BOOT_LOG_DBG ("boot_image_validate: encrypted == %d" , (int )IS_ENCRYPTED (hdr ));
44
+
43
45
/* NOTE: The first argument to boot_image_validate, for enc_state pointer,
44
46
* is allowed to be NULL only because the single image loader compiles
45
47
* with BOOT_IMAGE_NUMBER == 1, which excludes the code that uses
@@ -71,6 +73,8 @@ boot_image_validate_once(const struct flash_area *fa_p,
71
73
int rc ;
72
74
FIH_DECLARE (fih_rc , FIH_FAILURE );
73
75
76
+ BOOT_LOG_DBG ("boot_image_validate_once: flash area %p" , fap_p );
77
+
74
78
memset (& state , 0 , sizeof (struct boot_swap_state ));
75
79
rc = boot_read_swap_state (fa_p , & state );
76
80
if (rc != 0 )
@@ -108,6 +112,8 @@ static fih_ret validate_image_slot(int slot, struct boot_rsp *rsp)
108
112
int rc = -1 ;
109
113
FIH_DECLARE (fih_rc , FIH_FAILURE );
110
114
115
+ BOOT_LOG_DBG ("validate_image_slot: slot %d" , slot );
116
+
111
117
rc = flash_area_open (slot , & _fa_p );
112
118
assert (rc == 0 );
113
119
@@ -156,6 +162,8 @@ boot_go(struct boot_rsp *rsp)
156
162
bool boot_firmware_loader = false;
157
163
FIH_DECLARE (fih_rc , FIH_FAILURE );
158
164
165
+ BOOT_LOG_DBG ("boot_go: firmware loader" );
166
+
159
167
#ifdef CONFIG_BOOT_FIRMWARE_LOADER_ENTRANCE_GPIO
160
168
if (io_detect_pin () &&
161
169
!io_boot_skip_serial_recovery ()) {
0 commit comments