EFI_PHYSICAL_ADDRESS EndOfFile;\r
\r
if (Fv->Signature != EFI_FVH_SIGNATURE) {\r
- DEBUG ((EFI_D_ERROR, "FV at %p does not have FV header signature\n", Fv));\r
+ DEBUG ((DEBUG_ERROR, "FV at %p does not have FV header signature\n", Fv));\r
return EFI_VOLUME_CORRUPTED;\r
}\r
\r
(EFI_COMMON_SECTION_HEADER**) &Section\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Unable to find GUID defined section\n"));\r
+ DEBUG ((DEBUG_ERROR, "Unable to find GUID defined section\n"));\r
return Status;\r
}\r
\r
&SectionAttribute\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Unable to GetInfo for GUIDed section\n"));\r
+ DEBUG ((DEBUG_ERROR, "Unable to GetInfo for GUIDed section\n"));\r
return Status;\r
}\r
\r
OutputBuffer = (VOID*) ((UINT8*)(UINTN) PcdGet32 (PcdOvmfDxeMemFvBase) + SIZE_1MB);\r
ScratchBuffer = ALIGN_POINTER ((UINT8*) OutputBuffer + OutputBufferSize, SIZE_1MB);\r
\r
- DEBUG ((EFI_D_VERBOSE, "%a: OutputBuffer@%p+0x%x ScratchBuffer@%p+0x%x "\r
+ DEBUG ((DEBUG_VERBOSE, "%a: OutputBuffer@%p+0x%x ScratchBuffer@%p+0x%x "\r
"PcdOvmfDecompressionScratchEnd=0x%x\n", __FUNCTION__, OutputBuffer,\r
OutputBufferSize, ScratchBuffer, ScratchBufferSize,\r
PcdGet32 (PcdOvmfDecompressionScratchEnd)));\r
&AuthenticationStatus\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Error during GUID section decode\n"));\r
+ DEBUG ((DEBUG_ERROR, "Error during GUID section decode\n"));\r
return Status;\r
}\r
\r
&FvSection\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Unable to find PEI FV section\n"));\r
+ DEBUG ((DEBUG_ERROR, "Unable to find PEI FV section\n"));\r
return Status;\r
}\r
\r
CopyMem (PeiMemFv, (VOID*) (FvSection + 1), PcdGet32 (PcdOvmfPeiMemFvSize));\r
\r
if (PeiMemFv->Signature != EFI_FVH_SIGNATURE) {\r
- DEBUG ((EFI_D_ERROR, "Extracted FV at %p does not have FV header signature\n", PeiMemFv));\r
+ DEBUG ((DEBUG_ERROR, "Extracted FV at %p does not have FV header signature\n", PeiMemFv));\r
CpuDeadLoop ();\r
return EFI_VOLUME_CORRUPTED;\r
}\r
&FvSection\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Unable to find DXE FV section\n"));\r
+ DEBUG ((DEBUG_ERROR, "Unable to find DXE FV section\n"));\r
return Status;\r
}\r
\r
CopyMem (DxeMemFv, (VOID*) ((UINTN)FvSection + FvHeaderSize), PcdGet32 (PcdOvmfDxeMemFvSize));\r
\r
if (DxeMemFv->Signature != EFI_FVH_SIGNATURE) {\r
- DEBUG ((EFI_D_ERROR, "Extracted FV at %p does not have FV header signature\n", DxeMemFv));\r
+ DEBUG ((DEBUG_ERROR, "Extracted FV at %p does not have FV header signature\n", DxeMemFv));\r
CpuDeadLoop ();\r
return EFI_VOLUME_CORRUPTED;\r
}\r
&Section\r
);\r
if (EFI_ERROR (Status)) {\r
- DEBUG ((EFI_D_ERROR, "Unable to find PEI Core image\n"));\r
+ DEBUG ((DEBUG_ERROR, "Unable to find PEI Core image\n"));\r
return Status;\r
}\r
}\r
// A malicious runtime OS may have injected something into our previously\r
// decoded PEI FV, but we don't care about that unless SMM/SMRAM is required.\r
//\r
- DEBUG ((EFI_D_VERBOSE, "SEC: S3 resume\n"));\r
+ DEBUG ((DEBUG_VERBOSE, "SEC: S3 resume\n"));\r
GetS3ResumePeiFv (BootFv);\r
} else {\r
//\r
// We're either not resuming, or resuming "securely" -- we'll decompress\r
// both PEI FV and DXE FV from pristine flash.\r
//\r
- DEBUG ((EFI_D_VERBOSE, "SEC: %a\n",\r
+ DEBUG ((DEBUG_VERBOSE, "SEC: %a\n",\r
S3Resume ? "S3 resume (with PEI decompression)" : "Normal boot"));\r
FindMainFv (BootFv);\r
\r
\r
ProcessLibraryConstructorList (NULL, NULL);\r
\r
- DEBUG ((EFI_D_INFO,\r
+ DEBUG ((DEBUG_INFO,\r
"SecCoreStartupWithStack(0x%x, 0x%x)\n",\r
(UINT32)(UINTN)BootFv,\r
(UINT32)(UINTN)TopOfCurrentStack\r
BOOLEAN OldStatus;\r
BASE_LIBRARY_JUMP_BUFFER JumpBuffer;\r
\r
- DEBUG ((EFI_D_INFO,\r
+ DEBUG ((DEBUG_INFO,\r
"TemporaryRamMigration(0x%Lx, 0x%Lx, 0x%Lx)\n",\r
TemporaryMemoryBase,\r
PermanentMemoryBase,\r