On 20 March 2017 at 11:09, Laszlo Ersek <ler...@redhat.com> wrote: > UEFI executables that consist of a single read+write+exec PE/COFF section > trigger this message, but such a binary layout isn't actually an error. > The image can be launched alright, only image protection cannot be applied > to it fully. > > One example that elicits the message is (some) Linux kernels (with the EFI > stub of course). > > Cc: Ard Biesheuvel <ard.biesheu...@linaro.org> > Cc: Feng Tian <feng.t...@intel.com> > Cc: Jiewen Yao <jiewen....@intel.com> > Cc: Star Zeng <star.z...@intel.com> > Contributed-under: TianoCore Contribution Agreement 1.0 > Signed-off-by: Laszlo Ersek <ler...@redhat.com>
Acked-by: Ard Biesheuvel <ard.biesheu...@linaro.org> > --- > MdeModulePkg/Core/Dxe/Misc/MemoryProtection.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/MdeModulePkg/Core/Dxe/Misc/MemoryProtection.c > b/MdeModulePkg/Core/Dxe/Misc/MemoryProtection.c > index 7689c794a8ad..699c9a827720 100644 > --- a/MdeModulePkg/Core/Dxe/Misc/MemoryProtection.c > +++ b/MdeModulePkg/Core/Dxe/Misc/MemoryProtection.c > @@ -580,10 +580,10 @@ ProtectUefiImageCommon ( > } > > if (ImageRecord->CodeSegmentCount == 0) { > - DEBUG ((DEBUG_ERROR, "!!!!!!!! ProtectUefiImageCommon - > CodeSegmentCount is 0 !!!!!!!!\n")); > + DEBUG ((DEBUG_WARN, "!!!!!!!! ProtectUefiImageCommon - CodeSegmentCount > is 0 !!!!!!!!\n")); > PdbPointer = PeCoffLoaderGetPdbPointer ((VOID*) (UINTN) ImageAddress); > if (PdbPointer != NULL) { > - DEBUG ((DEBUG_ERROR, "!!!!!!!! Image - %a !!!!!!!!\n", PdbPointer)); > + DEBUG ((DEBUG_WARN, "!!!!!!!! Image - %a !!!!!!!!\n", PdbPointer)); > } > goto Finish; > } > -- > 2.9.3 > _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel