summaryrefslogtreecommitdiffstats
path: root/OvmfPkg/Sec/SecMain.c
diff options
context:
space:
mode:
authorRebecca Cran <rebecca@bsdio.com>2020-04-29 15:53:27 -0600
committermergify[bot] <37929162+mergify[bot]@users.noreply.github.com>2020-04-30 13:01:16 +0000
commit70d5086c3274b1a5b099d642d546581070374e6e (patch)
treed29d1dce98c5dd86fa7ae78844a489f65b33af80 /OvmfPkg/Sec/SecMain.c
parent2a7a1223d0c6f6ec10076584f92d40abbf6020d1 (diff)
downloadedk2-70d5086c3274b1a5b099d642d546581070374e6e.tar.gz
edk2-70d5086c3274b1a5b099d642d546581070374e6e.tar.bz2
edk2-70d5086c3274b1a5b099d642d546581070374e6e.zip
OvmfPkg: replace old EFI_D_ debug levels with new DEBUG_ ones
Generated mechanically with: find OvmfPkg -type f -exec sed -i -e 's/EFI_D_/DEBUG_/g' {} \; Signed-off-by: Rebecca Cran <rebecca@bsdio.com> Cc: Philippe Mathieu-Daude <philmd@redhat.com> Cc: Jordan Justen <jordan.l.justen@intel.com> Cc: Ard Biesheuvel <ard.biesheuvel@arm.com> Cc: Laszlo Ersek <lersek@redhat.com> Message-Id: <20200429215327.606467-1-rebecca@bsdio.com> Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Diffstat (limited to 'OvmfPkg/Sec/SecMain.c')
-rw-r--r--OvmfPkg/Sec/SecMain.c28
1 files changed, 14 insertions, 14 deletions
diff --git a/OvmfPkg/Sec/SecMain.c b/OvmfPkg/Sec/SecMain.c
index bae9764577..6dea6e771a 100644
--- a/OvmfPkg/Sec/SecMain.c
+++ b/OvmfPkg/Sec/SecMain.c
@@ -256,7 +256,7 @@ FindFfsFileAndSection (
EFI_PHYSICAL_ADDRESS EndOfFile;
if (Fv->Signature != EFI_FVH_SIGNATURE) {
- DEBUG ((EFI_D_ERROR, "FV at %p does not have FV header signature\n", Fv));
+ DEBUG ((DEBUG_ERROR, "FV at %p does not have FV header signature\n", Fv));
return EFI_VOLUME_CORRUPTED;
}
@@ -342,7 +342,7 @@ DecompressMemFvs (
(EFI_COMMON_SECTION_HEADER**) &Section
);
if (EFI_ERROR (Status)) {
- DEBUG ((EFI_D_ERROR, "Unable to find GUID defined section\n"));
+ DEBUG ((DEBUG_ERROR, "Unable to find GUID defined section\n"));
return Status;
}
@@ -353,14 +353,14 @@ DecompressMemFvs (
&SectionAttribute
);
if (EFI_ERROR (Status)) {
- DEBUG ((EFI_D_ERROR, "Unable to GetInfo for GUIDed section\n"));
+ DEBUG ((DEBUG_ERROR, "Unable to GetInfo for GUIDed section\n"));
return Status;
}
OutputBuffer = (VOID*) ((UINT8*)(UINTN) PcdGet32 (PcdOvmfDxeMemFvBase) + SIZE_1MB);
ScratchBuffer = ALIGN_POINTER ((UINT8*) OutputBuffer + OutputBufferSize, SIZE_1MB);
- DEBUG ((EFI_D_VERBOSE, "%a: OutputBuffer@%p+0x%x ScratchBuffer@%p+0x%x "
+ DEBUG ((DEBUG_VERBOSE, "%a: OutputBuffer@%p+0x%x ScratchBuffer@%p+0x%x "
"PcdOvmfDecompressionScratchEnd=0x%x\n", __FUNCTION__, OutputBuffer,
OutputBufferSize, ScratchBuffer, ScratchBufferSize,
PcdGet32 (PcdOvmfDecompressionScratchEnd)));
@@ -374,7 +374,7 @@ DecompressMemFvs (
&AuthenticationStatus
);
if (EFI_ERROR (Status)) {
- DEBUG ((EFI_D_ERROR, "Error during GUID section decode\n"));
+ DEBUG ((DEBUG_ERROR, "Error during GUID section decode\n"));
return Status;
}
@@ -386,7 +386,7 @@ DecompressMemFvs (
&FvSection
);
if (EFI_ERROR (Status)) {
- DEBUG ((EFI_D_ERROR, "Unable to find PEI FV section\n"));
+ DEBUG ((DEBUG_ERROR, "Unable to find PEI FV section\n"));
return Status;
}
@@ -398,7 +398,7 @@ DecompressMemFvs (
CopyMem (PeiMemFv, (VOID*) (FvSection + 1), PcdGet32 (PcdOvmfPeiMemFvSize));
if (PeiMemFv->Signature != EFI_FVH_SIGNATURE) {
- DEBUG ((EFI_D_ERROR, "Extracted FV at %p does not have FV header signature\n", PeiMemFv));
+ DEBUG ((DEBUG_ERROR, "Extracted FV at %p does not have FV header signature\n", PeiMemFv));
CpuDeadLoop ();
return EFI_VOLUME_CORRUPTED;
}
@@ -411,7 +411,7 @@ DecompressMemFvs (
&FvSection
);
if (EFI_ERROR (Status)) {
- DEBUG ((EFI_D_ERROR, "Unable to find DXE FV section\n"));
+ DEBUG ((DEBUG_ERROR, "Unable to find DXE FV section\n"));
return Status;
}
@@ -431,7 +431,7 @@ DecompressMemFvs (
CopyMem (DxeMemFv, (VOID*) ((UINTN)FvSection + FvHeaderSize), PcdGet32 (PcdOvmfDxeMemFvSize));
if (DxeMemFv->Signature != EFI_FVH_SIGNATURE) {
- DEBUG ((EFI_D_ERROR, "Extracted FV at %p does not have FV header signature\n", DxeMemFv));
+ DEBUG ((DEBUG_ERROR, "Extracted FV at %p does not have FV header signature\n", DxeMemFv));
CpuDeadLoop ();
return EFI_VOLUME_CORRUPTED;
}
@@ -474,7 +474,7 @@ FindPeiCoreImageBaseInFv (
&Section
);
if (EFI_ERROR (Status)) {
- DEBUG ((EFI_D_ERROR, "Unable to find PEI Core image\n"));
+ DEBUG ((DEBUG_ERROR, "Unable to find PEI Core image\n"));
return Status;
}
}
@@ -554,14 +554,14 @@ FindPeiCoreImageBase (
// A malicious runtime OS may have injected something into our previously
// decoded PEI FV, but we don't care about that unless SMM/SMRAM is required.
//
- DEBUG ((EFI_D_VERBOSE, "SEC: S3 resume\n"));
+ DEBUG ((DEBUG_VERBOSE, "SEC: S3 resume\n"));
GetS3ResumePeiFv (BootFv);
} else {
//
// We're either not resuming, or resuming "securely" -- we'll decompress
// both PEI FV and DXE FV from pristine flash.
//
- DEBUG ((EFI_D_VERBOSE, "SEC: %a\n",
+ DEBUG ((DEBUG_VERBOSE, "SEC: %a\n",
S3Resume ? "S3 resume (with PEI decompression)" : "Normal boot"));
FindMainFv (BootFv);
@@ -739,7 +739,7 @@ SecCoreStartupWithStack (
ProcessLibraryConstructorList (NULL, NULL);
- DEBUG ((EFI_D_INFO,
+ DEBUG ((DEBUG_INFO,
"SecCoreStartupWithStack(0x%x, 0x%x)\n",
(UINT32)(UINTN)BootFv,
(UINT32)(UINTN)TopOfCurrentStack
@@ -882,7 +882,7 @@ TemporaryRamMigration (
BOOLEAN OldStatus;
BASE_LIBRARY_JUMP_BUFFER JumpBuffer;
- DEBUG ((EFI_D_INFO,
+ DEBUG ((DEBUG_INFO,
"TemporaryRamMigration(0x%Lx, 0x%Lx, 0x%Lx)\n",
TemporaryMemoryBase,
PermanentMemoryBase,