MdeModulePkg: Clean up source files
1. Do not use tab characters 2. No trailing white space in one line 3. All files must end with CRLF Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Liming Gao <liming.gao@intel.com> Reviewed-by: Star Zeng <star.zeng@intel.com>
This commit is contained in:
@@ -78,14 +78,14 @@ BdsEntry (
|
||||
then EFI_INVALID_PARAMETER is returned.
|
||||
@param VendorGuid A unique identifier for the vendor.
|
||||
@param Attributes Attributes bitmask to set for the variable.
|
||||
@param DataSize The size in bytes of the Data buffer. Unless the EFI_VARIABLE_APPEND_WRITE,
|
||||
@param DataSize The size in bytes of the Data buffer. Unless the EFI_VARIABLE_APPEND_WRITE,
|
||||
or EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS attribute is set, a size of zero
|
||||
causes the variable to be deleted. When the EFI_VARIABLE_APPEND_WRITE attribute is
|
||||
set, then a SetVariable() call with a DataSize of zero will not cause any change to
|
||||
the variable value (the timestamp associated with the variable may be updated however
|
||||
even if no new data value is provided,see the description of the
|
||||
EFI_VARIABLE_AUTHENTICATION_2 descriptor below. In this case the DataSize will not
|
||||
be zero since the EFI_VARIABLE_AUTHENTICATION_2 descriptor will be populated).
|
||||
causes the variable to be deleted. When the EFI_VARIABLE_APPEND_WRITE attribute is
|
||||
set, then a SetVariable() call with a DataSize of zero will not cause any change to
|
||||
the variable value (the timestamp associated with the variable may be updated however
|
||||
even if no new data value is provided,see the description of the
|
||||
EFI_VARIABLE_AUTHENTICATION_2 descriptor below. In this case the DataSize will not
|
||||
be zero since the EFI_VARIABLE_AUTHENTICATION_2 descriptor will be populated).
|
||||
@param Data The contents for the variable.
|
||||
|
||||
@retval EFI_SUCCESS The firmware has successfully stored the variable and its data as
|
||||
|
@@ -1,10 +1,10 @@
|
||||
## @file
|
||||
# BdsDxe module is core driver for BDS phase.
|
||||
#
|
||||
# When DxeCore dispatching all DXE driver, this module will produce architecture protocol
|
||||
# When DxeCore dispatching all DXE driver, this module will produce architecture protocol
|
||||
# gEfiBdsArchProtocolGuid. After DxeCore finish dispatching, DxeCore will invoke Entry
|
||||
# interface of protocol gEfiBdsArchProtocolGuid, then BDS phase is entered.
|
||||
#
|
||||
#
|
||||
# Copyright (c) 2008 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
# This program and the accompanying materials
|
||||
# are licensed and made available under the terms and conditions of the BSD License
|
||||
@@ -22,7 +22,7 @@
|
||||
MODULE_UNI_FILE = BdsDxe.uni
|
||||
FILE_GUID = 6D33944A-EC75-4855-A54D-809C75241F6C
|
||||
MODULE_TYPE = DXE_DRIVER
|
||||
VERSION_STRING = 1.0
|
||||
VERSION_STRING = 1.0
|
||||
ENTRY_POINT = BdsInitialize
|
||||
|
||||
#
|
||||
|
@@ -5,12 +5,12 @@
|
||||
// gEfiBdsArchProtocolGuid. After DxeCore finish dispatching, DxeCore will invoke Entry
|
||||
// interface of protocol gEfiBdsArchProtocolGuid, then BDS phase is entered.
|
||||
//
|
||||
// Copyright (c) 2015, Intel Corporation. All rights reserved.<BR>
|
||||
// Copyright (c) 2015 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
// This program and the accompanying materials
|
||||
// are licensed and made available under the terms and conditions of the BSD License
|
||||
// which accompanies this distribution. The full text of the license may be found at
|
||||
// http://opensource.org/licenses/bsd-license.php
|
||||
//
|
||||
//
|
||||
// THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||
//
|
||||
|
@@ -1,7 +1,7 @@
|
||||
// /** @file
|
||||
// BdsDxe Localized Strings and Content
|
||||
//
|
||||
// Copyright (c) 2015, Intel Corporation. All rights reserved.<BR>
|
||||
// Copyright (c) 2015 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
//
|
||||
// This program and the accompanying materials
|
||||
// are licensed and made available under the terms and conditions of the BSD License
|
||||
@@ -13,8 +13,8 @@
|
||||
//
|
||||
// **/
|
||||
|
||||
#string STR_PROPERTIES_MODULE_NAME
|
||||
#language en-US
|
||||
#string STR_PROPERTIES_MODULE_NAME
|
||||
#language en-US
|
||||
"Boot Device Selection Core DXE Driver"
|
||||
|
||||
|
||||
|
@@ -293,9 +293,9 @@ BdsReadKeys (
|
||||
}
|
||||
|
||||
while (gST->ConIn != NULL) {
|
||||
|
||||
|
||||
Status = gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
|
||||
|
||||
|
||||
if (EFI_ERROR (Status)) {
|
||||
//
|
||||
// No more keys.
|
||||
@@ -488,10 +488,10 @@ ProcessLoadOptions (
|
||||
|
||||
/**
|
||||
|
||||
Validate input console variable data.
|
||||
Validate input console variable data.
|
||||
|
||||
If found the device path is not a valid device path, remove the variable.
|
||||
|
||||
|
||||
@param VariableName Input console variable name.
|
||||
|
||||
**/
|
||||
@@ -505,7 +505,7 @@ BdsFormalizeConsoleVariable (
|
||||
EFI_STATUS Status;
|
||||
|
||||
GetEfiGlobalVariable2 (VariableName, (VOID **) &DevicePath, &VariableSize);
|
||||
if ((DevicePath != NULL) && !IsDevicePathValid (DevicePath, VariableSize)) {
|
||||
if ((DevicePath != NULL) && !IsDevicePathValid (DevicePath, VariableSize)) {
|
||||
Status = gRT->SetVariable (
|
||||
VariableName,
|
||||
&gEfiGlobalVariableGuid,
|
||||
@@ -525,17 +525,17 @@ BdsFormalizeConsoleVariable (
|
||||
}
|
||||
|
||||
/**
|
||||
Formalize OsIndication related variables.
|
||||
|
||||
For OsIndicationsSupported, Create a BS/RT/UINT64 variable to report caps
|
||||
Formalize OsIndication related variables.
|
||||
|
||||
For OsIndicationsSupported, Create a BS/RT/UINT64 variable to report caps
|
||||
Delete OsIndications variable if it is not NV/BS/RT UINT64.
|
||||
|
||||
|
||||
Item 3 is used to solve case when OS corrupts OsIndications. Here simply delete this NV variable.
|
||||
|
||||
Create a boot option for BootManagerMenu if it hasn't been created yet
|
||||
|
||||
**/
|
||||
VOID
|
||||
VOID
|
||||
BdsFormalizeOSIndicationVariable (
|
||||
VOID
|
||||
)
|
||||
@@ -613,10 +613,10 @@ BdsFormalizeOSIndicationVariable (
|
||||
|
||||
/**
|
||||
|
||||
Validate variables.
|
||||
Validate variables.
|
||||
|
||||
**/
|
||||
VOID
|
||||
VOID
|
||||
BdsFormalizeEfiGlobalVariable (
|
||||
VOID
|
||||
)
|
||||
@@ -884,7 +884,7 @@ BdsEntry (
|
||||
// Possible things that can be done in PlatformBootManagerBeforeConsole:
|
||||
// > Update console variable: 1. include hot-plug devices; 2. Clear ConIn and add SOL for AMT
|
||||
// > Register new Driver#### or Boot####
|
||||
// > Register new Key####: e.g.: F12
|
||||
// > Register new Key####: e.g.: F12
|
||||
// > Signal ReadyToLock event
|
||||
// > Authentication action: 1. connect Auth devices; 2. Identify auto logon user.
|
||||
//
|
||||
@@ -929,7 +929,7 @@ BdsEntry (
|
||||
// > Connect certain devices
|
||||
// > Dispatch aditional option roms
|
||||
// > Special boot: e.g.: USB boot, enter UI
|
||||
//
|
||||
//
|
||||
PERF_INMODULE_BEGIN("PlatformBootManagerAfterConsole");
|
||||
PlatformBootManagerAfterConsole ();
|
||||
PERF_INMODULE_END("PlatformBootManagerAfterConsole");
|
||||
@@ -981,7 +981,7 @@ BdsEntry (
|
||||
PlatformRecovery = (BOOLEAN) ((OsIndication & EFI_OS_INDICATIONS_START_PLATFORM_RECOVERY) != 0);
|
||||
//
|
||||
// Clear EFI_OS_INDICATIONS_BOOT_TO_FW_UI to acknowledge OS
|
||||
//
|
||||
//
|
||||
if (BootFwUi || PlatformRecovery) {
|
||||
OsIndication &= ~((UINT64) (EFI_OS_INDICATIONS_BOOT_TO_FW_UI | EFI_OS_INDICATIONS_START_PLATFORM_RECOVERY));
|
||||
Status = gRT->SetVariable (
|
||||
@@ -1059,7 +1059,7 @@ BdsEntry (
|
||||
if (!EFI_ERROR (Status)) {
|
||||
EfiBootManagerBoot (&LoadOption);
|
||||
EfiBootManagerFreeLoadOption (&LoadOption);
|
||||
if ((LoadOption.Status == EFI_SUCCESS) &&
|
||||
if ((LoadOption.Status == EFI_SUCCESS) &&
|
||||
(BootManagerMenuStatus != EFI_NOT_FOUND) &&
|
||||
(LoadOption.OptionNumber != BootManagerMenu.OptionNumber)) {
|
||||
//
|
||||
@@ -1107,14 +1107,14 @@ BdsEntry (
|
||||
then EFI_INVALID_PARAMETER is returned.
|
||||
@param VendorGuid A unique identifier for the vendor.
|
||||
@param Attributes Attributes bitmask to set for the variable.
|
||||
@param DataSize The size in bytes of the Data buffer. Unless the EFI_VARIABLE_APPEND_WRITE,
|
||||
@param DataSize The size in bytes of the Data buffer. Unless the EFI_VARIABLE_APPEND_WRITE,
|
||||
or EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS attribute is set, a size of zero
|
||||
causes the variable to be deleted. When the EFI_VARIABLE_APPEND_WRITE attribute is
|
||||
set, then a SetVariable() call with a DataSize of zero will not cause any change to
|
||||
the variable value (the timestamp associated with the variable may be updated however
|
||||
even if no new data value is provided,see the description of the
|
||||
EFI_VARIABLE_AUTHENTICATION_2 descriptor below. In this case the DataSize will not
|
||||
be zero since the EFI_VARIABLE_AUTHENTICATION_2 descriptor will be populated).
|
||||
causes the variable to be deleted. When the EFI_VARIABLE_APPEND_WRITE attribute is
|
||||
set, then a SetVariable() call with a DataSize of zero will not cause any change to
|
||||
the variable value (the timestamp associated with the variable may be updated however
|
||||
even if no new data value is provided,see the description of the
|
||||
EFI_VARIABLE_AUTHENTICATION_2 descriptor below. In this case the DataSize will not
|
||||
be zero since the EFI_VARIABLE_AUTHENTICATION_2 descriptor will be populated).
|
||||
@param Data The contents for the variable.
|
||||
|
||||
@retval EFI_SUCCESS The firmware has successfully stored the variable and its data as
|
||||
|
@@ -2,7 +2,7 @@
|
||||
Set the level of support for Hardware Error Record Persistence that is
|
||||
implemented by the platform.
|
||||
|
||||
Copyright (c) 2007 - 2015, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2007 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
@@ -28,9 +28,9 @@ InitializeHwErrRecSupport (
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
UINT16 HardwareErrorRecordLevel;
|
||||
|
||||
|
||||
HardwareErrorRecordLevel = PcdGet16 (PcdHardwareErrorRecordLevel);
|
||||
|
||||
|
||||
if (HardwareErrorRecordLevel != 0) {
|
||||
//
|
||||
// If level value equal 0, no need set to 0 to variable area because UEFI specification
|
||||
|
@@ -1,7 +1,7 @@
|
||||
/** @file
|
||||
Language settings
|
||||
|
||||
Copyright (c) 2004 - 2015, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2004 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
@@ -47,7 +47,7 @@ IsLangInSupportedLangCodes(
|
||||
IN CHAR8 *SupportedLang,
|
||||
IN CHAR8 *Lang,
|
||||
IN BOOLEAN Iso639Language
|
||||
)
|
||||
)
|
||||
{
|
||||
UINTN Index;
|
||||
UINTN CompareLength;
|
||||
@@ -79,8 +79,8 @@ IsLangInSupportedLangCodes(
|
||||
// Determine the length of the next language code in SupportedLang
|
||||
//
|
||||
for (CompareLength = 0; SupportedLang[CompareLength] != '\0' && SupportedLang[CompareLength] != ';'; CompareLength++);
|
||||
|
||||
if ((CompareLength == LanguageLength) &&
|
||||
|
||||
if ((CompareLength == LanguageLength) &&
|
||||
(AsciiStrnCmp (Lang, SupportedLang, CompareLength) == 0)) {
|
||||
//
|
||||
// Successfully find the Lang string in SupportedLang string.
|
||||
@@ -108,7 +108,7 @@ VOID
|
||||
InitializeLangVariable (
|
||||
IN CHAR16 *LangName,
|
||||
IN CHAR8 *SupportedLang,
|
||||
IN CHAR8 *DefaultLang,
|
||||
IN CHAR8 *DefaultLang,
|
||||
IN BOOLEAN Iso639Language
|
||||
)
|
||||
{
|
||||
|
Reference in New Issue
Block a user