MdeModulePkg: Clean up source files
1. Do not use tab characters 2. No trailing white space in one line 3. All files must end with CRLF Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Liming Gao <liming.gao@intel.com> Reviewed-by: Star Zeng <star.zeng@intel.com>
This commit is contained in:
@ -67,7 +67,7 @@ CONST EFI_PEI_NOTIFY_DESCRIPTOR mMemoryDiscoveredNotifyList = {
|
||||
@param PeiServices Describes the list of possible PEI Services.
|
||||
|
||||
@retval EFI_SUCESS The entry point of DXE IPL PEIM executes successfully.
|
||||
@retval Others Some error occurs during the execution of this function.
|
||||
@retval Others Some error occurs during the execution of this function.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
@ -87,8 +87,8 @@ PeimInitializeDxeIpl (
|
||||
Status = PeiServicesRegisterForShadow (FileHandle);
|
||||
if (Status == EFI_SUCCESS) {
|
||||
//
|
||||
// EFI_SUCESS means it is the first time to call register for shadow.
|
||||
//
|
||||
// EFI_SUCESS means it is the first time to call register for shadow.
|
||||
//
|
||||
return Status;
|
||||
}
|
||||
|
||||
@ -116,7 +116,7 @@ PeimInitializeDxeIpl (
|
||||
// and section extraction.
|
||||
//
|
||||
Status = InstallIplPermanentMemoryPpis (NULL, NULL, NULL);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
} else {
|
||||
//
|
||||
// Install memory discovered PPI notification to install PPIs for
|
||||
@ -160,7 +160,7 @@ InstallIplPermanentMemoryPpis (
|
||||
EFI_PEI_PPI_DESCRIPTOR *GuidPpi;
|
||||
|
||||
//
|
||||
// Get custom extract guided section method guid list
|
||||
// Get custom extract guided section method guid list
|
||||
//
|
||||
ExtractHandlerNumber = ExtractGuidedSectionGetGuidList (&ExtractHandlerGuidTable);
|
||||
|
||||
@ -189,7 +189,7 @@ InstallIplPermanentMemoryPpis (
|
||||
}
|
||||
|
||||
/**
|
||||
Validate variable data for the MemoryTypeInformation.
|
||||
Validate variable data for the MemoryTypeInformation.
|
||||
|
||||
@param MemoryData Variable data.
|
||||
@param MemoryDataSize Variable data length.
|
||||
@ -236,16 +236,16 @@ ValidateMemoryTypeInfoVariable (
|
||||
}
|
||||
|
||||
/**
|
||||
Main entry point to last PEIM.
|
||||
Main entry point to last PEIM.
|
||||
|
||||
This function finds DXE Core in the firmware volume and transfer the control to
|
||||
DXE core.
|
||||
|
||||
|
||||
@param This Entry point for DXE IPL PPI.
|
||||
@param PeiServices General purpose services available to every PEIM.
|
||||
@param HobList Address to the Pei HOB list.
|
||||
|
||||
@return EFI_SUCCESS DXE core was successfully loaded.
|
||||
|
||||
@return EFI_SUCCESS DXE core was successfully loaded.
|
||||
@return EFI_OUT_OF_RESOURCES There are not enough resources to load DXE core.
|
||||
|
||||
**/
|
||||
@ -295,7 +295,7 @@ DxeLoadCore (
|
||||
);
|
||||
}
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
|
||||
|
||||
Status = S3Resume->S3RestoreConfig2 (S3Resume);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
} else if (BootMode == BOOT_IN_RECOVERY_MODE) {
|
||||
@ -310,7 +310,7 @@ DxeLoadCore (
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_ERROR, "Locate Recovery PPI Failed.(Status = %r)\n", Status));
|
||||
//
|
||||
// Report Status code the failure of locating Recovery PPI
|
||||
// Report Status code the failure of locating Recovery PPI
|
||||
//
|
||||
REPORT_STATUS_CODE (
|
||||
EFI_ERROR_CODE | EFI_ERROR_MAJOR,
|
||||
@ -350,8 +350,8 @@ DxeLoadCore (
|
||||
);
|
||||
if (!EFI_ERROR (Status)) {
|
||||
DataSize = sizeof (MemoryData);
|
||||
Status = Variable->GetVariable (
|
||||
Variable,
|
||||
Status = Variable->GetVariable (
|
||||
Variable,
|
||||
EFI_MEMORY_TYPE_INFORMATION_VARIABLE_NAME,
|
||||
&gEfiMemoryTypeInformationGuid,
|
||||
NULL,
|
||||
@ -441,7 +441,7 @@ DxeLoadCore (
|
||||
instance that contains DxeCore.
|
||||
|
||||
@return FileHandle of DxeCore to load DxeCore.
|
||||
|
||||
|
||||
**/
|
||||
EFI_PEI_FILE_HANDLE
|
||||
DxeIplFindDxeCore (
|
||||
@ -452,7 +452,7 @@ DxeIplFindDxeCore (
|
||||
UINTN Instance;
|
||||
EFI_PEI_FV_HANDLE VolumeHandle;
|
||||
EFI_PEI_FILE_HANDLE FileHandle;
|
||||
|
||||
|
||||
Instance = 0;
|
||||
while (TRUE) {
|
||||
//
|
||||
@ -467,7 +467,7 @@ DxeIplFindDxeCore (
|
||||
REPORT_STATUS_CODE (EFI_PROGRESS_CODE, (EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_CORE_EC_DXE_CORRUPT));
|
||||
}
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
|
||||
|
||||
//
|
||||
// Find the DxeCore file type from the beginning in this firmware volume.
|
||||
//
|
||||
@ -520,7 +520,7 @@ DxeIplFindDxeCore (
|
||||
output buffer. If the input
|
||||
section's GuidedSectionHeader.
|
||||
Attributes field has the
|
||||
EFI_GUIDED_SECTION_AUTH_STATUS_VALID
|
||||
EFI_GUIDED_SECTION_AUTH_STATUS_VALID
|
||||
bit as clear,
|
||||
AuthenticationStatus must return
|
||||
zero. These bits reflect the
|
||||
@ -530,14 +530,14 @@ DxeIplFindDxeCore (
|
||||
EFI_SUCCESS, the value of
|
||||
AuthenticationStatus is
|
||||
undefined.
|
||||
|
||||
|
||||
@retval EFI_SUCCESS The InputSection was
|
||||
successfully processed and the
|
||||
section contents were returned.
|
||||
|
||||
|
||||
@retval EFI_OUT_OF_RESOURCES The system has insufficient
|
||||
resources to process the request.
|
||||
|
||||
|
||||
@retval EFI_INVALID_PARAMETER The GUID in InputSection does
|
||||
not match this instance of the
|
||||
GUIDed Section Extraction PPI.
|
||||
@ -558,7 +558,7 @@ CustomGuidedSectionExtract (
|
||||
UINT32 ScratchBufferSize;
|
||||
UINT32 OutputBufferSize;
|
||||
UINT16 SectionAttribute;
|
||||
|
||||
|
||||
//
|
||||
// Init local variable
|
||||
//
|
||||
@ -573,12 +573,12 @@ CustomGuidedSectionExtract (
|
||||
&ScratchBufferSize,
|
||||
&SectionAttribute
|
||||
);
|
||||
|
||||
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_ERROR, "GetInfo from guided section Failed - %r\n", Status));
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
||||
if (ScratchBufferSize != 0) {
|
||||
//
|
||||
// Allocate scratch buffer
|
||||
@ -589,7 +589,7 @@ CustomGuidedSectionExtract (
|
||||
}
|
||||
}
|
||||
|
||||
if (((SectionAttribute & EFI_GUIDED_SECTION_PROCESSING_REQUIRED) != 0) && OutputBufferSize > 0) {
|
||||
if (((SectionAttribute & EFI_GUIDED_SECTION_PROCESSING_REQUIRED) != 0) && OutputBufferSize > 0) {
|
||||
//
|
||||
// Allocate output buffer
|
||||
//
|
||||
@ -599,9 +599,9 @@ CustomGuidedSectionExtract (
|
||||
}
|
||||
DEBUG ((DEBUG_INFO, "Customized Guided section Memory Size required is 0x%x and address is 0x%p\n", OutputBufferSize, *OutputBuffer));
|
||||
}
|
||||
|
||||
|
||||
Status = ExtractGuidedSectionDecode (
|
||||
InputSection,
|
||||
InputSection,
|
||||
OutputBuffer,
|
||||
ScratchBuffer,
|
||||
AuthenticationStatus
|
||||
@ -613,9 +613,9 @@ CustomGuidedSectionExtract (
|
||||
DEBUG ((DEBUG_ERROR, "Extract guided section Failed - %r\n", Status));
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
||||
*OutputSize = (UINTN) OutputBufferSize;
|
||||
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
@ -627,7 +627,7 @@ CustomGuidedSectionExtract (
|
||||
This function looks up the compression type field in the input section and
|
||||
applies the appropriate compression algorithm to compress the section to a
|
||||
callee allocated buffer.
|
||||
|
||||
|
||||
@param This Points to this instance of the
|
||||
EFI_PEI_DECOMPRESS_PEI PPI.
|
||||
@param CompressionSection Points to the compressed section.
|
||||
@ -635,14 +635,14 @@ CustomGuidedSectionExtract (
|
||||
sections.
|
||||
@param OutputSize Holds the returned size of the decompress
|
||||
section streams.
|
||||
|
||||
|
||||
@retval EFI_SUCCESS The section was decompressed successfully.
|
||||
OutputBuffer contains the resulting data and
|
||||
OutputSize contains the resulting size.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
EFIAPI
|
||||
Decompress (
|
||||
IN CONST EFI_PEI_DECOMPRESS_PPI *This,
|
||||
IN CONST EFI_COMPRESSION_SECTION *CompressionSection,
|
||||
@ -676,7 +676,7 @@ Decompress (
|
||||
UncompressedLength = CompressionSection->UncompressedLength;
|
||||
CompressionType = CompressionSection->CompressionType;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// This is a compression set, expand it
|
||||
//
|
||||
@ -791,8 +791,8 @@ UpdateStackHob (
|
||||
while ((Hob.Raw = GetNextHob (EFI_HOB_TYPE_MEMORY_ALLOCATION, Hob.Raw)) != NULL) {
|
||||
if (CompareGuid (&gEfiHobMemoryAllocStackGuid, &(Hob.MemoryAllocationStack->AllocDescriptor.Name))) {
|
||||
//
|
||||
// Build a new memory allocation HOB with old stack info with EfiBootServicesData type. Need to
|
||||
// avoid this region be reclaimed by DXE core as the IDT built in SEC might be on stack, and some
|
||||
// Build a new memory allocation HOB with old stack info with EfiBootServicesData type. Need to
|
||||
// avoid this region be reclaimed by DXE core as the IDT built in SEC might be on stack, and some
|
||||
// PEIMs may also keep key information on stack
|
||||
//
|
||||
BuildMemoryAllocationHob (
|
||||
|
Reference in New Issue
Block a user