SoC common: optimize bl30 size - common printf [2/3]

PD#SWPL-194170

Problem:
bl30 size overflow, too much printf.

Solution:
Optimize bl30 common printf.

Verify:
t5m

Change-Id: Ic40309d31293940668777a6376ded57464319ba3
Signed-off-by: bangzheng.liu <bangzheng.liu@amlogic.com>
diff --git a/main.c b/main.c
index b770e44..f13afa3 100644
--- a/main.c
+++ b/main.c
@@ -74,25 +74,24 @@
 
 void vApplicationStackOverflowHook(TaskHandle_t xTask, char *pcTaskName)
 {
-    ( void ) pcTaskName;
-    ( void ) xTask;
+	(void)xTask;
 
-    /* Run time stack overflow checking is performed if
-    configconfigCHECK_FOR_STACK_OVERFLOW is defined to 1 or 2.  This hook
-    function is called if a stack overflow is detected.  pxCurrentTCB can be
-    inspected in the debugger if the task name passed into this function is
-    corrupt. */
-    //write(1, "Stack Overflow\n", 15);
-	printf("vApplicationStackOverflowHook, current task is %s\n", pcTaskName);
+	/* Run time stack overflow checking is performed if
+	 * configconfigCHECK_FOR_STACK_OVERFLOW is defined to 1 or 2. This hook
+	 * function is called if a stack overflow is detected. pxCurrentTCB can be
+	 * inspected in the debugger if the task name passed into this function is
+	 * corrupt.
+	 */
+	printf("bl30 task %s stack overflow\n", pcTaskName);
 	vTaskDumpStack(NULL);
-    for ( ;; );
+	for ( ;; )
+		;
 }
 /*-----------------------------------------------------------*/
 
 #ifdef CONFIG_STACK_PROTECTOR_STRONG
 void additional_message_hook(void *address)
 {
-	printf("bl30 stack smashing detected, stop here!\n");
-	printf("The last addr of smashing function: 0x%x\n", address);
+	printf("bl30 stack smashing func last addr: 0x%x, stop!\n", address);
 }
 #endif