MdePkg: Clean up source files
1. Do not use tab characters 2. No trailing white space in one line 3. All files must end with CRLF Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Liming Gao <liming.gao@intel.com>
This commit is contained in:
@@ -4,8 +4,8 @@
|
||||
The SMM Mem Library provides function for checking if buffer is outside SMRAM and valid.
|
||||
It also provides functions for copy data from SMRAM to non-SMRAM, from non-SMRAM to SMRAM,
|
||||
from non-SMRAM to non-SMRAM, or set data in non-SMRAM.
|
||||
|
||||
Copyright (c) 2015, Intel Corporation. All rights reserved.<BR>
|
||||
|
||||
Copyright (c) 2015 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
@@ -68,7 +68,7 @@ SmmCopyMemToSmram (
|
||||
If the check passes, it copies memory and returns EFI_SUCCESS.
|
||||
If the check fails, it returns EFI_SECURITY_VIOLATION.
|
||||
The implementation must be reentrant.
|
||||
|
||||
|
||||
@param DestinationBuffer The pointer to the destination buffer of the memory copy.
|
||||
@param SourceBuffer The pointer to the source buffer of the memory copy.
|
||||
@param Length The number of bytes to copy from SourceBuffer to DestinationBuffer.
|
||||
@@ -93,7 +93,7 @@ SmmCopyMemFromSmram (
|
||||
If the check passes, it copies memory and returns EFI_SUCCESS.
|
||||
If the check fails, it returns EFI_SECURITY_VIOLATION.
|
||||
The implementation must be reentrant, and it must handle the case where source buffer overlaps destination buffer.
|
||||
|
||||
|
||||
@param DestinationBuffer The pointer to the destination buffer of the memory copy.
|
||||
@param SourceBuffer The pointer to the source buffer of the memory copy.
|
||||
@param Length The number of bytes to copy from SourceBuffer to DestinationBuffer.
|
||||
@@ -118,11 +118,11 @@ SmmCopyMem (
|
||||
It checks if target buffer is valid per processor architecture and not overlap with SMRAM.
|
||||
If the check passes, it fills memory and returns EFI_SUCCESS.
|
||||
If the check fails, it returns EFI_SECURITY_VIOLATION.
|
||||
|
||||
|
||||
@param Buffer The memory to set.
|
||||
@param Length The number of bytes to set.
|
||||
@param Value The value with which to fill Length bytes of Buffer.
|
||||
|
||||
|
||||
@retval EFI_SECURITY_VIOLATION The Buffer is invalid per processor architecture or overlap with SMRAM.
|
||||
@retval EFI_SUCCESS Memory is set.
|
||||
|
||||
@@ -135,4 +135,4 @@ SmmSetMem (
|
||||
IN UINT8 Value
|
||||
);
|
||||
|
||||
#endif
|
||||
#endif
|
||||
|
Reference in New Issue
Block a user