From nobody Thu May 2 09:12:01 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of groups.io designates 66.175.222.12 as permitted sender) client-ip=66.175.222.12; envelope-from=bounce+27952+49245+1787277+3901457@groups.io; helo=web01.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zoho.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+49245+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=intel.com ARC-Seal: i=1; a=rsa-sha256; t=1571430289; cv=none; d=zoho.com; s=zohoarc; b=GW85IHxCRFeHyCO2LvAlpksY+tKrV00RO+3hohXZaxD8eyW9B4uT7nVimXIJcOT7w9Tl08AbijxGLaH/Rebd3jThuREd2ybSbF96/3orSfAWnqgEH98oHW0qmxfXBBILJNASLdlcvzZPVou+0cWkGby+g2xRneJBoV0H51QsLTs= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1571430289; h=Content-Transfer-Encoding:Cc:Date:From:List-Id:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:Sender:Subject:To; bh=dpXOb/REPzFNjcpo3VmMs9FiRDTzbTeAhYkNSOQqb4s=; b=Jj3iVoe6RFXkRnzjyeUcyUNFxG7Vho82Kdf0KWbEJkZlnCBr/Ki3TtSIGZoPmLz9dkAbyEbSU8pc8J0iCIOFwNVP+BQPqJgcrup4ysm3NHcP/Eez4GGUXvhcsXRw0uVSwO40ujvqynSynnpYmGk7OeV8s3taXvtMOBa2jZ3XVKQ= ARC-Authentication-Results: i=1; mx.zoho.com; dkim=pass; spf=pass (zoho.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+49245+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) header.from= Received: from web01.groups.io (web01.groups.io [66.175.222.12]) by mx.zohomail.com with SMTPS id 1571430289249973.9602415981801; Fri, 18 Oct 2019 13:24:49 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id B6MZYY1788612xDowyTxrU7S; Fri, 18 Oct 2019 13:24:48 -0700 X-Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by mx.groups.io with SMTP id smtpd.web11.1445.1571430288102737412 for ; Fri, 18 Oct 2019 13:24:48 -0700 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False X-Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga106.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 18 Oct 2019 13:24:47 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.67,312,1566889200"; d="scan'208";a="195564514" X-Received: from unknown (HELO mdkinney-MOBL2.amr.corp.intel.com) ([10.241.111.156]) by fmsmga008.fm.intel.com with ESMTP; 18 Oct 2019 13:24:47 -0700 From: "Michael D Kinney" To: devel@edk2.groups.io Cc: Sean Brogan , Liming Gao Subject: [edk2-devel] [Patch] FmpDevicePkg: Fix spelling errors Date: Fri, 18 Oct 2019 13:24:45 -0700 Message-Id: <20191018202445.23596-1-michael.d.kinney@intel.com> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,michael.d.kinney@intel.com X-Gm-Message-State: XAvD8qf7zsas3ftRSgh2YMM8x1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1571430288; bh=sj2eZDx5bUOXGam1vaNYD2JPdw4SS+E0LLH8PvcbCs0=; h=Cc:Date:From:Reply-To:Subject:To; b=VF5KqjPZyHUKJU5l85/jUmR+zVuD539WVF4uBn34isY2v/q6sXNeVFqFo+ipSnGYoEp LpIXdrPqy2meYmsFvuJ/FvvgKtFpHxaZhQp6Xs4HnjLnW+iRHgf9u9QPckfmDNriizmXq g8gFLdWUq3GUJVtDx7FcacOPy1qOnS3dVg0= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Type: text/plain; charset="utf-8" From: Sean Brogan https://bugzilla.tianocore.org/show_bug.cgi?id=3D2262 Cc: Liming Gao Cc: Michael D Kinney Signed-off-by: Michael D Kinney Reviewed-by: Liming Gao Reviewed-by: Philippe Mathieu-Daude --- .../CapsuleUpdatePolicyDxe/CapsuleUpdatePolicyDxe.c | 4 ++-- .../CapsuleUpdatePolicyDxe.inf | 2 +- FmpDevicePkg/FmpDevicePkg.dec | 4 ++-- FmpDevicePkg/FmpDevicePkg.dsc | 2 +- FmpDevicePkg/FmpDevicePkg.uni | 2 +- FmpDevicePkg/FmpDxe/FmpDxe.c | 12 ++++++------ FmpDevicePkg/Include/Library/FmpDeviceLib.h | 4 ++-- .../CapsuleUpdatePolicyLibOnProtocol.c | 2 +- .../CapsuleUpdatePolicyLibOnProtocol.inf | 2 +- FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLib.c | 4 ++-- .../PrivateInclude/Protocol/CapsuleUpdatePolicy.h | 2 +- 11 files changed, 20 insertions(+), 20 deletions(-) diff --git a/FmpDevicePkg/CapsuleUpdatePolicyDxe/CapsuleUpdatePolicyDxe.c b= /FmpDevicePkg/CapsuleUpdatePolicyDxe/CapsuleUpdatePolicyDxe.c index d2571fd0e6..1035fd67dd 100644 --- a/FmpDevicePkg/CapsuleUpdatePolicyDxe/CapsuleUpdatePolicyDxe.c +++ b/FmpDevicePkg/CapsuleUpdatePolicyDxe/CapsuleUpdatePolicyDxe.c @@ -161,10 +161,10 @@ CapsuleUpdatePolicyInitialize ( { EFI_STATUS Status; =20 - ASSERT_PROTOCOL_ALREADY_INSTALLED (NULL, &gEdkiiCapuleUpdatePolicyProtoc= olGuid); + ASSERT_PROTOCOL_ALREADY_INSTALLED (NULL, &gEdkiiCapsuleUpdatePolicyProto= colGuid); Status =3D gBS->InstallMultipleProtocolInterfaces ( &mHandle, - &gEdkiiCapuleUpdatePolicyProtocolGuid, &mCapsuleUpdatePo= licy, + &gEdkiiCapsuleUpdatePolicyProtocolGuid, &mCapsuleUpdateP= olicy, NULL ); ASSERT_EFI_ERROR (Status); diff --git a/FmpDevicePkg/CapsuleUpdatePolicyDxe/CapsuleUpdatePolicyDxe.inf= b/FmpDevicePkg/CapsuleUpdatePolicyDxe/CapsuleUpdatePolicyDxe.inf index d168780eb9..5ed7086b91 100644 --- a/FmpDevicePkg/CapsuleUpdatePolicyDxe/CapsuleUpdatePolicyDxe.inf +++ b/FmpDevicePkg/CapsuleUpdatePolicyDxe/CapsuleUpdatePolicyDxe.inf @@ -39,7 +39,7 @@ [LibraryClasses] CapsuleUpdatePolicyLib =20 [Protocols] - gEdkiiCapuleUpdatePolicyProtocolGuid ## PRODUCES + gEdkiiCapsuleUpdatePolicyProtocolGuid ## PRODUCES =20 [Depex] TRUE diff --git a/FmpDevicePkg/FmpDevicePkg.dec b/FmpDevicePkg/FmpDevicePkg.dec index 8312b7cb22..55671878dd 100644 --- a/FmpDevicePkg/FmpDevicePkg.dec +++ b/FmpDevicePkg/FmpDevicePkg.dec @@ -50,12 +50,12 @@ [Guids] =20 [Protocols.Common.Private] ## Capsule Update Policy Protocol - gEdkiiCapuleUpdatePolicyProtocolGuid =3D { 0x487784c5, 0x6299, 0x4ba6, {= 0xb0, 0x96, 0x5c, 0xc5, 0x27, 0x7c, 0xf7, 0x57 } } + gEdkiiCapsuleUpdatePolicyProtocolGuid =3D { 0x487784c5, 0x6299, 0x4ba6, = { 0xb0, 0x96, 0x5c, 0xc5, 0x27, 0x7c, 0xf7, 0x57 } } =20 [PcdsFeatureFlag] ## Indicates if the Firmware Management Protocol supports access to # to a firmware storage device. If set to FALSE, then only GetImageInf= o() - # is supported. This is used by FMP drivers that require the samllest + # is supported. This is used by FMP drivers that require the smallest # possible Firmware Management Protocol implementation that supports # advertising the updatable firmware device in the ESRT.
# TRUE - All Firmware Management Protocol services supported.
diff --git a/FmpDevicePkg/FmpDevicePkg.dsc b/FmpDevicePkg/FmpDevicePkg.dsc index bf283b93ea..67b5aa7a32 100644 --- a/FmpDevicePkg/FmpDevicePkg.dsc +++ b/FmpDevicePkg/FmpDevicePkg.dsc @@ -60,7 +60,7 @@ [LibraryClasses] [LibraryClasses.ARM, LibraryClasses.AARCH64] # # It is not possible to prevent the ARM compiler for generic intrinsic f= unctions. - # This library provides the instrinsic functions generate by a given com= piler. + # This library provides the intrinsic functions generate by a given comp= iler. # [LibraryClasses.ARM, LibraryClasses.AARCH64] and NULL mean link this l= ibrary # into all ARM and AARCH64 images. # diff --git a/FmpDevicePkg/FmpDevicePkg.uni b/FmpDevicePkg/FmpDevicePkg.uni index 9e21130fae..263f88078b 100644 --- a/FmpDevicePkg/FmpDevicePkg.uni +++ b/FmpDevicePkg/FmpDevicePkg.uni @@ -19,7 +19,7 @@ #string STR_gFmpDevicePkgTokenSpaceGuid_PcdFmpDeviceStorageAccessEnable_PR= OMPT #language en-US "Firmware Device Storage Access Enabled." #string STR_gFmpDevicePkgTokenSpaceGuid_PcdFmpDeviceStorageAccessEnable_HE= LP #language en-US "Indicates if the Firmware Management Protocol suppor= ts access to" = "to a firmware storage device. If set to FALSE, then= only GetImageInfo()" - = "is supported. This is used by FMP drivers that requ= ire the samllest" + = "is supported. This is used by FMP drivers that requ= ire the smallest" = "possible Firmware Management Protocol implementation= that supports" = "advertising the updatable firmware device in the ESR= T.
" = " TRUE - All Firmware Management Protocol services = supported.
" diff --git a/FmpDevicePkg/FmpDxe/FmpDxe.c b/FmpDevicePkg/FmpDxe/FmpDxe.c index 3ca9d3526a..fe465af11e 100644 --- a/FmpDevicePkg/FmpDxe/FmpDxe.c +++ b/FmpDevicePkg/FmpDxe/FmpDxe.c @@ -963,7 +963,7 @@ SetTheImage ( VOID *FmpHeader; UINTN FmpPayloadSize; UINT32 AllHeaderSize; - UINT32 IncommingFwVersion; + UINT32 IncomingFwVersion; UINT32 LastAttemptStatus; UINT32 Version; UINT32 LowestSupportedVersion; @@ -975,7 +975,7 @@ SetTheImage ( FmpHeader =3D NULL; FmpPayloadSize =3D 0; AllHeaderSize =3D 0; - IncommingFwVersion =3D 0; + IncomingFwVersion =3D 0; LastAttemptStatus =3D LAST_ATTEMPT_STATUS_ERROR_UNSUCCESSFUL; =20 if (!FeaturePcdGet (PcdFmpDeviceStorageAccessEnable)) { @@ -996,7 +996,7 @@ SetTheImage ( // // Set to 0 to clear any previous results. // - SetLastAttemptVersionInVariable (Private, IncommingFwVersion); + SetLastAttemptVersionInVariable (Private, IncomingFwVersion); =20 // // if we have locked the device, then skip the set operation. @@ -1030,12 +1030,12 @@ SetTheImage ( Status =3D EFI_ABORTED; goto cleanup; } - Status =3D GetFmpPayloadHeaderVersion (FmpHeader, FmpPayloadSize, &Incom= mingFwVersion); + Status =3D GetFmpPayloadHeaderVersion (FmpHeader, FmpPayloadSize, &Incom= ingFwVersion); if (!EFI_ERROR (Status)) { // // Set to actual value // - SetLastAttemptVersionInVariable (Private, IncommingFwVersion); + SetLastAttemptVersionInVariable (Private, IncomingFwVersion); } =20 =20 @@ -1158,7 +1158,7 @@ SetTheImage ( ImageSize - AllHeaderSize, VendorCode, FmpDxeProgress, - IncommingFwVersion, + IncomingFwVersion, AbortReason ); if (EFI_ERROR (Status)) { diff --git a/FmpDevicePkg/Include/Library/FmpDeviceLib.h b/FmpDevicePkg/Inc= lude/Library/FmpDeviceLib.h index 1e498c13ce..9a89f5c2ee 100644 --- a/FmpDevicePkg/Include/Library/FmpDeviceLib.h +++ b/FmpDevicePkg/Include/Library/FmpDeviceLib.h @@ -89,7 +89,7 @@ RegisterFmpInstaller ( Protocol. =20 @retval EFI_SUCCESS The device is managed by a driver that follows = the - UEFI Driver Model. FmpUinstaller must be calle= d on + UEFI Driver Model. FmpUninstaller must be call= ed on each Driver Binding Stop(). @retval EFI_UNSUPPORTED The device is not managed by a driver that foll= ows the UEFI Driver Model. @@ -321,7 +321,7 @@ FmpDeviceGetVersion ( device. =20 @retval EFI_SUCCESS The hardware instance for the current firmware - devide is returned in HardwareInstance. + device is returned in HardwareInstance. @retval EFI_UNSUPPORTED The firmware device does not support a method = to report the hardware instance value. @retval EFI_DEVICE_ERROR An error occurred attempting to retrieve the h= ardware diff --git a/FmpDevicePkg/Library/CapsuleUpdatePolicyLibOnProtocol/CapsuleU= pdatePolicyLibOnProtocol.c b/FmpDevicePkg/Library/CapsuleUpdatePolicyLibOnP= rotocol/CapsuleUpdatePolicyLibOnProtocol.c index 2c7c37fa92..6f916888c7 100644 --- a/FmpDevicePkg/Library/CapsuleUpdatePolicyLibOnProtocol/CapsuleUpdatePo= licyLibOnProtocol.c +++ b/FmpDevicePkg/Library/CapsuleUpdatePolicyLibOnProtocol/CapsuleUpdatePo= licyLibOnProtocol.c @@ -37,7 +37,7 @@ LookupCapsuleUpdatePolicyProtocol ( return TRUE; } Status =3D gBS->LocateProtocol ( - &gEdkiiCapuleUpdatePolicyProtocolGuid, + &gEdkiiCapsuleUpdatePolicyProtocolGuid, NULL, (VOID **)&mCapsuleUpdatePolicy ); diff --git a/FmpDevicePkg/Library/CapsuleUpdatePolicyLibOnProtocol/CapsuleU= pdatePolicyLibOnProtocol.inf b/FmpDevicePkg/Library/CapsuleUpdatePolicyLibO= nProtocol/CapsuleUpdatePolicyLibOnProtocol.inf index 042daaabce..a56b836d22 100644 --- a/FmpDevicePkg/Library/CapsuleUpdatePolicyLibOnProtocol/CapsuleUpdatePo= licyLibOnProtocol.inf +++ b/FmpDevicePkg/Library/CapsuleUpdatePolicyLibOnProtocol/CapsuleUpdatePo= licyLibOnProtocol.inf @@ -37,4 +37,4 @@ [LibraryClasses] UefiBootServicesTableLib =20 [Protocols] - gEdkiiCapuleUpdatePolicyProtocolGuid ## CONSUMES + gEdkiiCapsuleUpdatePolicyProtocolGuid ## CONSUMES diff --git a/FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLib.c b/FmpDevi= cePkg/Library/FmpDeviceLibNull/FmpDeviceLib.c index fd219cb70b..316de12e91 100644 --- a/FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLib.c +++ b/FmpDevicePkg/Library/FmpDeviceLibNull/FmpDeviceLib.c @@ -50,7 +50,7 @@ RegisterFmpInstaller ( Protocol. =20 @retval EFI_SUCCESS The device is managed by a driver that follows = the - UEFI Driver Model. FmpUinstaller must be calle= d on + UEFI Driver Model. FmpUninstaller must be call= ed on each Driver Binding Stop(). @retval EFI_UNSUPPORTED The device is not managed by a driver that foll= ows the UEFI Driver Model. @@ -319,7 +319,7 @@ FmpDeviceGetVersion ( device. =20 @retval EFI_SUCCESS The hardware instance for the current firmware - devide is returned in HardwareInstance. + device is returned in HardwareInstance. @retval EFI_UNSUPPORTED The firmware device does not support a method = to report the hardware instance value. @retval EFI_DEVICE_ERROR An error occurred attempting to retrieve the h= ardware diff --git a/FmpDevicePkg/PrivateInclude/Protocol/CapsuleUpdatePolicy.h b/F= mpDevicePkg/PrivateInclude/Protocol/CapsuleUpdatePolicy.h index 871f0a1854..4f7d917295 100644 --- a/FmpDevicePkg/PrivateInclude/Protocol/CapsuleUpdatePolicy.h +++ b/FmpDevicePkg/PrivateInclude/Protocol/CapsuleUpdatePolicy.h @@ -127,6 +127,6 @@ struct _EDKII_CAPSULE_UPDATE_POLICY_PROTOCOL { EDKII_CAPSULE_UPDATE_POLICY_IS_FMP_DEVICE_AT_LOCK_EVENT_REQUIRED = IsLockFmpDeviceAtLockEventGuidRequired; }; =20 -extern EFI_GUID gEdkiiCapuleUpdatePolicyProtocolGuid; +extern EFI_GUID gEdkiiCapsuleUpdatePolicyProtocolGuid; =20 #endif --=20 2.21.0.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#49245): https://edk2.groups.io/g/devel/message/49245 Mute This Topic: https://groups.io/mt/35103493/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-