diff options
author | Rebecca Cran <rebecca@bsdio.com> | 2020-04-29 15:53:27 -0600 |
---|---|---|
committer | mergify[bot] <37929162+mergify[bot]@users.noreply.github.com> | 2020-04-30 13:01:16 +0000 |
commit | 70d5086c3274b1a5b099d642d546581070374e6e (patch) | |
tree | d29d1dce98c5dd86fa7ae78844a489f65b33af80 /OvmfPkg/Sec | |
parent | 2a7a1223d0c6f6ec10076584f92d40abbf6020d1 (diff) | |
download | edk2-70d5086c3274b1a5b099d642d546581070374e6e.tar.gz edk2-70d5086c3274b1a5b099d642d546581070374e6e.tar.bz2 edk2-70d5086c3274b1a5b099d642d546581070374e6e.zip |
OvmfPkg: replace old EFI_D_ debug levels with new DEBUG_ ones
Generated mechanically with:
find OvmfPkg -type f -exec sed -i -e 's/EFI_D_/DEBUG_/g' {} \;
Signed-off-by: Rebecca Cran <rebecca@bsdio.com>
Cc: Philippe Mathieu-Daude <philmd@redhat.com>
Cc: Jordan Justen <jordan.l.justen@intel.com>
Cc: Ard Biesheuvel <ard.biesheuvel@arm.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Message-Id: <20200429215327.606467-1-rebecca@bsdio.com>
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Diffstat (limited to 'OvmfPkg/Sec')
-rw-r--r-- | OvmfPkg/Sec/SecMain.c | 28 |
1 files changed, 14 insertions, 14 deletions
diff --git a/OvmfPkg/Sec/SecMain.c b/OvmfPkg/Sec/SecMain.c index bae9764577..6dea6e771a 100644 --- a/OvmfPkg/Sec/SecMain.c +++ b/OvmfPkg/Sec/SecMain.c @@ -256,7 +256,7 @@ FindFfsFileAndSection ( EFI_PHYSICAL_ADDRESS EndOfFile;
if (Fv->Signature != EFI_FVH_SIGNATURE) {
- DEBUG ((EFI_D_ERROR, "FV at %p does not have FV header signature\n", Fv));
+ DEBUG ((DEBUG_ERROR, "FV at %p does not have FV header signature\n", Fv));
return EFI_VOLUME_CORRUPTED;
}
@@ -342,7 +342,7 @@ DecompressMemFvs ( (EFI_COMMON_SECTION_HEADER**) &Section
);
if (EFI_ERROR (Status)) {
- DEBUG ((EFI_D_ERROR, "Unable to find GUID defined section\n"));
+ DEBUG ((DEBUG_ERROR, "Unable to find GUID defined section\n"));
return Status;
}
@@ -353,14 +353,14 @@ DecompressMemFvs ( &SectionAttribute
);
if (EFI_ERROR (Status)) {
- DEBUG ((EFI_D_ERROR, "Unable to GetInfo for GUIDed section\n"));
+ DEBUG ((DEBUG_ERROR, "Unable to GetInfo for GUIDed section\n"));
return Status;
}
OutputBuffer = (VOID*) ((UINT8*)(UINTN) PcdGet32 (PcdOvmfDxeMemFvBase) + SIZE_1MB);
ScratchBuffer = ALIGN_POINTER ((UINT8*) OutputBuffer + OutputBufferSize, SIZE_1MB);
- DEBUG ((EFI_D_VERBOSE, "%a: OutputBuffer@%p+0x%x ScratchBuffer@%p+0x%x "
+ DEBUG ((DEBUG_VERBOSE, "%a: OutputBuffer@%p+0x%x ScratchBuffer@%p+0x%x "
"PcdOvmfDecompressionScratchEnd=0x%x\n", __FUNCTION__, OutputBuffer,
OutputBufferSize, ScratchBuffer, ScratchBufferSize,
PcdGet32 (PcdOvmfDecompressionScratchEnd)));
@@ -374,7 +374,7 @@ DecompressMemFvs ( &AuthenticationStatus
);
if (EFI_ERROR (Status)) {
- DEBUG ((EFI_D_ERROR, "Error during GUID section decode\n"));
+ DEBUG ((DEBUG_ERROR, "Error during GUID section decode\n"));
return Status;
}
@@ -386,7 +386,7 @@ DecompressMemFvs ( &FvSection
);
if (EFI_ERROR (Status)) {
- DEBUG ((EFI_D_ERROR, "Unable to find PEI FV section\n"));
+ DEBUG ((DEBUG_ERROR, "Unable to find PEI FV section\n"));
return Status;
}
@@ -398,7 +398,7 @@ DecompressMemFvs ( CopyMem (PeiMemFv, (VOID*) (FvSection + 1), PcdGet32 (PcdOvmfPeiMemFvSize));
if (PeiMemFv->Signature != EFI_FVH_SIGNATURE) {
- DEBUG ((EFI_D_ERROR, "Extracted FV at %p does not have FV header signature\n", PeiMemFv));
+ DEBUG ((DEBUG_ERROR, "Extracted FV at %p does not have FV header signature\n", PeiMemFv));
CpuDeadLoop ();
return EFI_VOLUME_CORRUPTED;
}
@@ -411,7 +411,7 @@ DecompressMemFvs ( &FvSection
);
if (EFI_ERROR (Status)) {
- DEBUG ((EFI_D_ERROR, "Unable to find DXE FV section\n"));
+ DEBUG ((DEBUG_ERROR, "Unable to find DXE FV section\n"));
return Status;
}
@@ -431,7 +431,7 @@ DecompressMemFvs ( CopyMem (DxeMemFv, (VOID*) ((UINTN)FvSection + FvHeaderSize), PcdGet32 (PcdOvmfDxeMemFvSize));
if (DxeMemFv->Signature != EFI_FVH_SIGNATURE) {
- DEBUG ((EFI_D_ERROR, "Extracted FV at %p does not have FV header signature\n", DxeMemFv));
+ DEBUG ((DEBUG_ERROR, "Extracted FV at %p does not have FV header signature\n", DxeMemFv));
CpuDeadLoop ();
return EFI_VOLUME_CORRUPTED;
}
@@ -474,7 +474,7 @@ FindPeiCoreImageBaseInFv ( &Section
);
if (EFI_ERROR (Status)) {
- DEBUG ((EFI_D_ERROR, "Unable to find PEI Core image\n"));
+ DEBUG ((DEBUG_ERROR, "Unable to find PEI Core image\n"));
return Status;
}
}
@@ -554,14 +554,14 @@ FindPeiCoreImageBase ( // A malicious runtime OS may have injected something into our previously
// decoded PEI FV, but we don't care about that unless SMM/SMRAM is required.
//
- DEBUG ((EFI_D_VERBOSE, "SEC: S3 resume\n"));
+ DEBUG ((DEBUG_VERBOSE, "SEC: S3 resume\n"));
GetS3ResumePeiFv (BootFv);
} else {
//
// We're either not resuming, or resuming "securely" -- we'll decompress
// both PEI FV and DXE FV from pristine flash.
//
- DEBUG ((EFI_D_VERBOSE, "SEC: %a\n",
+ DEBUG ((DEBUG_VERBOSE, "SEC: %a\n",
S3Resume ? "S3 resume (with PEI decompression)" : "Normal boot"));
FindMainFv (BootFv);
@@ -739,7 +739,7 @@ SecCoreStartupWithStack ( ProcessLibraryConstructorList (NULL, NULL);
- DEBUG ((EFI_D_INFO,
+ DEBUG ((DEBUG_INFO,
"SecCoreStartupWithStack(0x%x, 0x%x)\n",
(UINT32)(UINTN)BootFv,
(UINT32)(UINTN)TopOfCurrentStack
@@ -882,7 +882,7 @@ TemporaryRamMigration ( BOOLEAN OldStatus;
BASE_LIBRARY_JUMP_BUFFER JumpBuffer;
- DEBUG ((EFI_D_INFO,
+ DEBUG ((DEBUG_INFO,
"TemporaryRamMigration(0x%Lx, 0x%Lx, 0x%Lx)\n",
TemporaryMemoryBase,
PermanentMemoryBase,
|