From nobody Sat May 18 21:16:15 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+100564+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+100564+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=intel.com ARC-Seal: i=1; a=rsa-sha256; t=1677646534; cv=none; d=zohomail.com; s=zohoarc; b=P9wKglo/Qq/F+tcEr5X/OZhLLb8/CJyMTdxSgQK4m90rScD3E7bwMTiHn+YxT94FUtr158QgQFoY5+IiYfK1Figd9ZWwZ3Db2+yaXLAvfXaOJfH0UWLjRzYP4c04UNH9yUaRhkB5IHfG2xiHrp/53VgZnexPO4Sw3KjNDbPVEb4= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1677646534; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=M1pzGMzW170tncc1U5SzTAweXKWXTka7n2tsnwoWmyo=; b=PvYc7oIX531Mi/wwYMYoRdA/+ud8pOYwfwA4lgWO6FGcsCRsSTff7/oC6G0RHYHekywoNLoap8oPRqBPY57ZQZVLGoV7tasRA1vfK7YsqQeeIhqi1sWATPanO7IdnjlZzBpoNeV5Z4BwDHy3NxWkVd84MDaCLJQ1PPmiK3Pukjc= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+100564+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1677646534737589.9785594991498; Tue, 28 Feb 2023 20:55:34 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id W4osYY1788612x4XB6ppXK9Z; Tue, 28 Feb 2023 20:55:34 -0800 X-Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by mx.groups.io with SMTP id smtpd.web10.15151.1677646531793211118 for ; Tue, 28 Feb 2023 20:55:32 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10635"; a="399103054" X-IronPort-AV: E=Sophos;i="5.98,223,1673942400"; d="scan'208";a="399103054" X-Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Feb 2023 20:55:31 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10635"; a="706832940" X-IronPort-AV: E=Sophos;i="5.98,223,1673942400"; d="scan'208";a="706832940" X-Received: from nldesimo-desk.amr.corp.intel.com ([10.24.12.177]) by orsmga001-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Feb 2023 20:55:30 -0800 From: "Nate DeSimone" To: devel@edk2.groups.io Cc: Nate DeSimone , Andrew Fish , Ray Ni , Michael D Kinney , Chasel Chiu Subject: [edk2-devel] [PATCH v1] EmulatorPkg: Rename Variable Date: Tue, 28 Feb 2023 20:55:23 -0800 Message-Id: <20230301045524.1044-6-nathaniel.l.desimone@intel.com> In-Reply-To: <20230301045524.1044-1-nathaniel.l.desimone@intel.com> References: <20230301045524.1044-1-nathaniel.l.desimone@intel.com> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,nathaniel.l.desimone@intel.com X-Gm-Message-State: DqBF3EGX4a26N4wd85ok1A8Gx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1677646534; bh=F9VOvm7x/T8ARdR06PKVqXEgYI2B4MVupiNzDyUTboI=; h=Cc:Date:From:Reply-To:Subject:To; b=tdJt3jb98tuYKmj/Txk2lzM0snYUaCl1TwkMjxetg6vqoVP0lP8SQguwC/oAzV8Cmuo O76FjrHH81yMT1C2EcqWnvIutBzPBbebdXT5Pgnj12UMKnTO4ghAU5zF2UOyY+usveJXs SlLGoEKbfzwIVZy+NhxAOBe8RARq8Tnw6wY= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1677646536877100021 Content-Type: text/plain; charset="utf-8" From: Nate DeSimone Rename PeiCorePe32File to SecCorePe32File, because the variable actually contains the SEC core... not PEI core. Cc: Andrew Fish Cc: Ray Ni Cc: Michael D Kinney Cc: Chasel Chiu Signed-off-by: Nate DeSimone Acked-by: Ray Ni --- EmulatorPkg/Unix/Host/Host.c | 12 ++++++------ EmulatorPkg/Unix/Host/Host.h | 4 ++-- 2 files changed, 8 insertions(+), 8 deletions(-) diff --git a/EmulatorPkg/Unix/Host/Host.c b/EmulatorPkg/Unix/Host/Host.c index 1f29dd00a3..940e1953af 100644 --- a/EmulatorPkg/Unix/Host/Host.c +++ b/EmulatorPkg/Unix/Host/Host.c @@ -1,6 +1,6 @@ /*++ @file =20 -Copyright (c) 2006 - 2022, Intel Corporation. All rights reserved.
+Copyright (c) 2006 - 2023, Intel Corporation. All rights reserved.
Portions copyright (c) 2008 - 2011, Apple Inc. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 @@ -535,7 +535,7 @@ Arguments: LargestRegion - Memory to use for SEC. LargestRegionSize - Size of Memory to use for PEI BootFirmwareVolumeBase - Start of the Boot FV - PeiCorePe32File - SEC PE32 + SecCorePe32File - SEC PE32 =20 Returns: Success means control is transferred and thus we should never return @@ -546,13 +546,13 @@ SecLoadFromCore ( IN UINTN LargestRegion, IN UINTN LargestRegionSize, IN UINTN BootFirmwareVolumeBase, - IN VOID *PeiCorePe32File + IN VOID *SecCorePe32File ) { EFI_STATUS Status; EFI_PHYSICAL_ADDRESS TopOfMemory; VOID *TopOfStack; - EFI_PHYSICAL_ADDRESS PeiCoreEntryPoint; + EFI_PHYSICAL_ADDRESS SecCoreEntryPoint; EFI_SEC_PEI_HAND_OFF *SecCoreData; UINTN PeiStackSize; =20 @@ -597,7 +597,7 @@ SecLoadFromCore ( // // Find the SEC Core Entry Point // - Status =3D SecPeCoffGetEntryPoint (PeiCorePe32File, (VOID **)&PeiCoreEnt= ryPoint); + Status =3D SecPeCoffGetEntryPoint (SecCorePe32File, (VOID **)&SecCoreEnt= ryPoint); if (EFI_ERROR (Status)) { return; } @@ -606,7 +606,7 @@ SecLoadFromCore ( // Transfer control to the SEC Core // PeiSwitchStacks ( - (SWITCH_STACK_ENTRY_POINT)(UINTN)PeiCoreEntryPoint, + (SWITCH_STACK_ENTRY_POINT)(UINTN)SecCoreEntryPoint, SecCoreData, (VOID *)gPpiList, TopOfStack diff --git a/EmulatorPkg/Unix/Host/Host.h b/EmulatorPkg/Unix/Host/Host.h index 0c81cdfc01..aecebc0143 100644 --- a/EmulatorPkg/Unix/Host/Host.h +++ b/EmulatorPkg/Unix/Host/Host.h @@ -1,6 +1,6 @@ /*++ @file =20 -Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.
+Copyright (c) 2006 - 2023, Intel Corporation. All rights reserved.
Portions copyright (c) 2008 - 2011, Apple Inc. All rights reserved.
=20 SPDX-License-Identifier: BSD-2-Clause-Patent @@ -162,7 +162,7 @@ SecLoadFromCore ( IN UINTN LargestRegion, IN UINTN LargestRegionSize, IN UINTN BootFirmwareVolumeBase, - IN VOID *PeiCoreFile + IN VOID *SecCoreFile ); =20 EFI_STATUS --=20 2.30.2 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#100564): https://edk2.groups.io/g/devel/message/100564 Mute This Topic: https://groups.io/mt/97308245/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-