From nobody Thu Apr 25 07:57:43 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) client-ip=66.175.222.12; envelope-from=bounce+27952+51374+1787277+3901457@groups.io; helo=web01.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+51374+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=intel.com ARC-Seal: i=1; a=rsa-sha256; t=1574884854; cv=none; d=zohomail.com; s=zohoarc; b=NjBtCUqILVUuwNAlCpKYOOEafFCsQGtl5MCfC9ylORIa7WQMAtq+Iv0lzfBtPiE7m40+yKsbqKYvYMTBwi9AjjHrVZEhFTGYYOUQZzx5InAZLzQ9icyn3FT/HjZ+vneZgqetLMAZ1EuO6pC2Vdk4VeOT2XufNCjd4giN/7k4zrQ= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1574884854; h=Cc:Date:From:In-Reply-To:List-Id:List-Unsubscribe:Message-ID:Reply-To:References:Sender:Subject:To; bh=8N4+c0Ej/B0yL7yywAPpIjBAQH3Ub/cvC8r3IiwBzt0=; b=dBKMIMPJjiPxKcom2EYDwtYjbJ2oiwkZyjtQf9lxWZ+ncsAdTbqv229QUG7huGY4Kdzc4TOSCyf8apGBIeT+tszw/d5PYm3Fx+NUmLaYTt6ZZNL3mTGjd1mvBm8eCaXsWH8WlypfDLRXYFlMjhUQVWSmLX6A0xbynCa0iAn09nU= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+51374+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) header.from= Received: from web01.groups.io (web01.groups.io [66.175.222.12]) by mx.zohomail.com with SMTPS id 1574884854776204.27792811483982; Wed, 27 Nov 2019 12:00:54 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id KqupYY1788612xAdGmdZ4x0z; Wed, 27 Nov 2019 12:00:54 -0800 X-Received: from mga12.intel.com (mga12.intel.com []) by mx.groups.io with SMTP id smtpd.web10.2043.1574884849011527644 for ; Wed, 27 Nov 2019 12:00:53 -0800 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False X-Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga106.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 27 Nov 2019 12:00:53 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.69,250,1571727600"; d="scan'208";a="221088575" X-Received: from makuback-desk1.amr.corp.intel.com ([10.7.159.162]) by orsmga002.jf.intel.com with ESMTP; 27 Nov 2019 12:00:53 -0800 From: "Kubacki, Michael A" To: devel@edk2.groups.io Cc: Dandan Bi , Liming Gao , Jian J Wang , Hao A Wu Subject: [edk2-devel] [PATCH V2 1/2] MdeModulePkg PeiCore: Fix typos Date: Wed, 27 Nov 2019 11:57:46 -0800 Message-Id: <20191127195747.3192-2-michael.a.kubacki@intel.com> In-Reply-To: <20191127195747.3192-1-michael.a.kubacki@intel.com> References: <20191127195747.3192-1-michael.a.kubacki@intel.com> Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,michael.a.kubacki@intel.com X-Gm-Message-State: S9mQCUsSNcU1KU2SDYYknb6Ox1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1574884854; bh=x0DIjovJ6l/7vxR7Noul3RiEkpWHYgK1LFZODAiuCcM=; h=Cc:Date:From:Reply-To:Subject:To; b=JeesIkPI0Gpew4ZOONGQtNKfLZmgJSqK9vjms3mNo1cZcAhtNLYMt7jlZjYI9vXiDNz rPabmMtN6x2vgoVULzW4XnVyzy6B/+njKK/Px9sBMQIYwM2y4LZU+aSF3AkGNaWDehJ2Z krYf4tPoJBI4TT/V7ZNwvV0NQcrgtOSrLmI= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Cc: Dandan Bi Cc: Liming Gao Cc: Jian J Wang Cc: Hao A Wu Signed-off-by: Michael Kubacki Reviewed-by responses: Reviewed-by: Jian J Wang Reviewed-by: Liming Gao Reviewed-by: Philippe Mathieu-Daude --- MdeModulePkg/Core/Pei/PeiMain.inf | 10 ++-- MdeModulePkg/Core/Pei/FwVol/FwVol.h | 20 ++++---- MdeModulePkg/Core/Pei/PeiMain.h | 40 ++++++++-------- MdeModulePkg/Core/Pei/Dependency/Dependency.c | 8 ++-- MdeModulePkg/Core/Pei/Dispatcher/Dispatcher.c | 48 +++++++++---------- MdeModulePkg/Core/Pei/FwVol/FwVol.c | 50 ++++++++++---------- MdeModulePkg/Core/Pei/Hob/Hob.c | 4 +- MdeModulePkg/Core/Pei/Image/Image.c | 10 ++-- MdeModulePkg/Core/Pei/Memory/MemoryServices.c | 16 +++---- MdeModulePkg/Core/Pei/PeiMain/PeiMain.c | 2 +- MdeModulePkg/Core/Pei/Ppi/Ppi.c | 4 +- MdeModulePkg/Core/Pei/Security/Security.c | 12 ++--- 12 files changed, 112 insertions(+), 112 deletions(-) diff --git a/MdeModulePkg/Core/Pei/PeiMain.inf b/MdeModulePkg/Core/Pei/PeiM= ain.inf index 7c482dacfc..6e25cc4023 100644 --- a/MdeModulePkg/Core/Pei/PeiMain.inf +++ b/MdeModulePkg/Core/Pei/PeiMain.inf @@ -69,12 +69,12 @@ =20 [Guids] gPeiAprioriFileNameGuid ## SOMETIMES_CONSUMES ## File - ## PRODUCES ## UNDEFINED # Install ppi - ## CONSUMES ## UNDEFINED # Locate ppi + ## PRODUCES ## UNDEFINED # Install PPI + ## CONSUMES ## UNDEFINED # Locate PPI gEfiFirmwareFileSystem2Guid - ## PRODUCES ## UNDEFINED # Install ppi - ## CONSUMES ## UNDEFINED # Locate ppi - ## CONSUMES ## GUID # Used to compare with FV's file system guid = and get the FV's file system format + ## PRODUCES ## UNDEFINED # Install PPI + ## CONSUMES ## UNDEFINED # Locate PPI + ## CONSUMES ## GUID # Used to compare with FV's file system GUID = and get the FV's file system format gEfiFirmwareFileSystem3Guid =20 [Ppis] diff --git a/MdeModulePkg/Core/Pei/FwVol/FwVol.h b/MdeModulePkg/Core/Pei/Fw= Vol/FwVol.h index ca80e84e0f..263f0d7a56 100644 --- a/MdeModulePkg/Core/Pei/FwVol/FwVol.h +++ b/MdeModulePkg/Core/Pei/FwVol/FwVol.h @@ -1,7 +1,7 @@ /** @file The internal header file for firmware volume related definitions. =20 -Copyright (c) 2009 - 2018, Intel Corporation. All rights reserved.
+Copyright (c) 2009 - 2019, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ @@ -303,12 +303,12 @@ FindFileEx ( ); =20 /** - Report the information for a new discoveried FV in unknown format. + Report the information for a new discovered FV in unknown format. =20 - If the EFI_PEI_FIRMWARE_VOLUME_PPI has not been installed for specifical= FV format, but - the FV in this FV format has been discoveried, then the information of t= his FV + If the EFI_PEI_FIRMWARE_VOLUME_PPI has not been installed for specific F= V format, but + the FV in this FV format has been discovered, then the information of th= is FV will be cached into PEI_CORE_INSTANCE's UnknownFvInfo array. - Also a notification would be installed for unknown FV format guid, if EF= I_PEI_FIRMWARE_VOLUME_PPI + Also a notification would be installed for unknown FV format GUID, if EF= I_PEI_FIRMWARE_VOLUME_PPI is installed later by platform's PEIM, the original unknown FV will be p= rocessed by using new installed EFI_PEI_FIRMWARE_VOLUME_PPI. =20 @@ -325,14 +325,14 @@ AddUnknownFormatFvInfo ( ); =20 /** - Find the FV information according to FV format guid. + Find the FV information according to FV format GUID. =20 - This routine also will remove the FV information found by given FV forma= t guid from + This routine also will remove the FV information found by given FV forma= t GUID from PrivateData->UnknownFvInfo[]. =20 @param PrivateData Point to instance of PEI_CORE_INSTANCE - @param Format Point to given FV format guid - @param FvInfo On return, the pointer of FV information buffer = in given FV format guid + @param Format Point to given FV format GUID + @param FvInfo On return, the pointer of FV information buffer = in given FV format GUID @param FvInfoSize On return, the size of FV information buffer. @param AuthenticationStatus On return, the authentication status of FV i= nformation buffer. =20 @@ -352,7 +352,7 @@ FindUnknownFormatFvInfo ( Notification callback function for EFI_PEI_FIRMWARE_VOLUME_PPI. =20 When a EFI_PEI_FIRMWARE_VOLUME_PPI is installed to support new FV format= , this - routine is called to process all discoveried FVs in this format. + routine is called to process all discovered FVs in this format. =20 @param PeiServices An indirect pointer to the EFI_PEI_SERVICES tab= le published by the PEI Foundation @param NotifyDescriptor Address of the notification descriptor data str= ucture. diff --git a/MdeModulePkg/Core/Pei/PeiMain.h b/MdeModulePkg/Core/Pei/PeiMai= n.h index f2aa97c664..3f61247a0f 100644 --- a/MdeModulePkg/Core/Pei/PeiMain.h +++ b/MdeModulePkg/Core/Pei/PeiMain.h @@ -47,7 +47,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent =20 /// /// It is an FFS type extension used for PeiFindFileEx. It indicates curre= nt -/// Ffs searching is for all PEIMs can be dispatched by PeiCore. +/// FFS searching is for all PEIMs can be dispatched by PeiCore. /// #define PEI_CORE_INTERNAL_FFS_FILE_DISPATCH_TYPE 0xff =20 @@ -116,7 +116,7 @@ typedef struct { } PEI_PPI_DATABASE; =20 // -// PEI_CORE_FV_HANDE.PeimState +// PEI_CORE_FV_HANDLE.PeimState // Do not change these values as there is code doing math to change states. // Look for Private->Fv[FvCount].PeimState[PeimCount]++; // @@ -136,11 +136,11 @@ typedef struct { EFI_PEI_FV_HANDLE FvHandle; UINTN PeimCount; // - // Ponter to the buffer with the PeimCount number of Entries. + // Pointer to the buffer with the PeimCount number of Entries. // UINT8 *PeimState; // - // Ponter to the buffer with the PeimCount number of Entries. + // Pointer to the buffer with the PeimCount number of Entries. // EFI_PEI_FILE_HANDLE *FvFileHandles; BOOLEAN ScanFv; @@ -277,7 +277,7 @@ struct _PEI_CORE_INSTANCE { // // For Loading modules at fixed address feature to cache the top address= below which the // Runtime code, boot time code and PEI memory will be placed. Please no= te that the offset between this field - // and Ps should not be changed since maybe user could get this top add= ress by using the offet to Ps. + // and Ps should not be changed since maybe user could get this top addr= ess by using the offset to Ps. // EFI_PHYSICAL_ADDRESS LoadModuleAtFixAddressTopAddress; // @@ -372,7 +372,7 @@ PeiCore ( =20 This is the POSTFIX version of the dependency evaluator. When a PUSH [PPI GUID] is encountered, a pointer to the GUID is stored on - the evaluation stack. When that entry is poped from the evaluation + the evaluation stack. When that entry is popped from the evaluation stack, the PPI is checked if it is installed. This method allows some time savings as not all PPIs must be checked for certain operation types (AND, OR). @@ -412,7 +412,7 @@ PeiDispatcher ( =20 @param PrivateData PeiCore's private data structure @param OldCoreData Old data from SecCore - NULL if being run in non-permament memory mode. + NULL if being run in non-permanent memory mode. @param SecCoreData Points to a data structure containing SEC to PEI = handoff data, such as the size and location of temporary RAM, the stack location= and the BFV location. =20 @@ -453,7 +453,7 @@ DepexSatisfied ( =20 @param PrivateData Pointer to the PEI Core data. @param OldCoreData Pointer to old PEI Core data. - NULL if being run in non-permament memory mode. + NULL if being run in non-permanent memory mode. =20 **/ VOID @@ -482,7 +482,7 @@ ConvertPpiPointers ( Install PPI services. It is implementation of EFI_PEI_SERVICE.InstallPpi. =20 @param PeiServices An indirect pointer to the EFI_PEI_SER= VICES table published by the PEI Foundation. - @param PpiList Pointer to ppi array that want to be i= nstalled. + @param PpiList Pointer to PPI array that want to be i= nstalled. =20 @retval EFI_SUCCESS if all PPIs in PpiList are successfull= y installed. @retval EFI_INVALID_PARAMETER if PpiList is NULL pointer @@ -659,7 +659,7 @@ PeiSetBootMode ( =20 @param PeiServices An indirect pointer to the EFI_PEI_SERVICES table= published by the PEI Foundation. @param OldCoreData Pointer to the old core data. - NULL if being run in non-permament memory mode. + NULL if being run in non-permanent memory mode. =20 **/ VOID @@ -687,7 +687,7 @@ VerifyFv ( =20 @param PrivateData PeiCore's private data structure @param VolumeHandle Handle of FV - @param FileHandle Handle of PEIM's ffs + @param FileHandle Handle of PEIM's FFS @param AuthenticationStatus Authentication status =20 @retval EFI_SUCCESS Image is OK @@ -730,7 +730,7 @@ PeiGetHobList ( @param Length Length of the new HOB to allocate. @param Hob Pointer to the new HOB. =20 - @return EFI_SUCCESS Success to create hob. + @return EFI_SUCCESS Success to create HOB. @retval EFI_INVALID_PARAMETER if Hob is NULL @retval EFI_NOT_AVAILABLE_YET if HobList is still not available. @retval EFI_OUT_OF_RESOURCES if there is no more memory to grow the Ho= blist. @@ -887,7 +887,7 @@ PeiFfsFindNextVolume ( @param SecCoreData Points to a data structure containing SEC to PEI = handoff data, such as the size and location of temporary RAM, the stack location= and the BFV location. @param OldCoreData Pointer to the PEI Core data. - NULL if being run in non-permament memory mode. + NULL if being run in non-permanent memory mode. =20 **/ VOID @@ -1111,7 +1111,7 @@ PeiResetSystem2 ( =20 /** =20 - Initialize PeiCore Fv List. + Initialize PeiCore FV List. =20 =20 @param PrivateData - Pointer to PEI_CORE_INSTANCE. @@ -1125,7 +1125,7 @@ PeiInitializeFv ( ); =20 /** - Process Firmware Volum Information once FvInfoPPI install. + Process Firmware Volume Information once FvInfoPPI install. =20 @param PeiServices An indirect pointer to the EFI_PEI_SERVICES tab= le published by the PEI Foundation. @param NotifyDescriptor Address of the notification descriptor data str= ucture. @@ -1136,7 +1136,7 @@ PeiInitializeFv ( **/ EFI_STATUS EFIAPI -FirmwareVolmeInfoPpiNotifyCallback ( +FirmwareVolumeInfoPpiNotifyCallback ( IN EFI_PEI_SERVICES **PeiServices, IN EFI_PEI_NOTIFY_DESCRIPTOR *NotifyDescriptor, IN VOID *Ppi @@ -1293,11 +1293,11 @@ SecurityPpiNotifyCallback ( ); =20 /** - Get Fv image(s) from the FV type file, then install FV INFO(2) ppi, Buil= d FV(2, 3) hob. + Get FV image(s) from the FV type file, then install FV INFO(2) PPI, Buil= d FV(2, 3) HOB. =20 @param PrivateData PeiCore's private data structure - @param ParentFvCoreHandle Pointer of EFI_CORE_FV_HANDLE to parent Fv i= mage that contain this Fv image. - @param ParentFvFileHandle File handle of a Fv type file that contain t= his Fv image. + @param ParentFvCoreHandle Pointer of EFI_CORE_FV_HANDLE to parent FV i= mage that contain this FV image. + @param ParentFvFileHandle File handle of a FV type file that contain t= his FV image. =20 @retval EFI_NOT_FOUND FV image can't be found. @retval EFI_SUCCESS Successfully to process it. @@ -1316,7 +1316,7 @@ ProcessFvFile ( /** Get instance of PEI_CORE_FV_HANDLE for next volume according to given in= dex. =20 - This routine also will install FvInfo ppi for FV hob in PI ways. + This routine also will install FvInfo PPI for FV HOB in PI ways. =20 @param Private Pointer of PEI_CORE_INSTANCE @param Instance The index of FV want to be searched. diff --git a/MdeModulePkg/Core/Pei/Dependency/Dependency.c b/MdeModulePkg/C= ore/Pei/Dependency/Dependency.c index 6ce610a028..9a8353aef2 100644 --- a/MdeModulePkg/Core/Pei/Dependency/Dependency.c +++ b/MdeModulePkg/Core/Pei/Dependency/Dependency.c @@ -5,7 +5,7 @@ if a driver can be scheduled for execution. The criteria for schedulability is that the dependency expression is satisfied. =20 -Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.
+Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ @@ -45,7 +45,7 @@ IsPpiInstalled ( } =20 // - // Copy the Guid into a locale variable so that there are no + // Copy the GUID into a local variable so that there are no // possibilities of alignment faults for cross-compilation // environments such as Intel?Itanium(TM). // @@ -72,7 +72,7 @@ IsPpiInstalled ( =20 This is the POSTFIX version of the dependency evaluator. When a PUSH [PPI GUID] is encountered, a pointer to the GUID is stored on - the evaluation stack. When that entry is poped from the evaluation + the evaluation stack. When that entry is popped from the evaluation stack, the PPI is checked if it is installed. This method allows some time savings as not all PPIs must be checked for certain operation types (AND, OR). @@ -123,7 +123,7 @@ PeimDispatchReadiness ( =20 // // Push the pointer to the PUSH opcode operator (pointer to PPI GU= ID) - // We will evaluate if the PPI is insalled on the POP operation. + // We will evaluate if the PPI is installed on the POP operation. // StackPtr->Operator =3D (VOID *) Iterator; Iterator =3D Iterator + sizeof (EFI_GUID); diff --git a/MdeModulePkg/Core/Pei/Dispatcher/Dispatcher.c b/MdeModulePkg/C= ore/Pei/Dispatcher/Dispatcher.c index ba2fd0cae1..c9f2a91264 100644 --- a/MdeModulePkg/Core/Pei/Dispatcher/Dispatcher.c +++ b/MdeModulePkg/Core/Pei/Dispatcher/Dispatcher.c @@ -1,7 +1,7 @@ /** @file EFI PEI Core dispatch services =20 -Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.
+Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.
(C) Copyright 2016 Hewlett Packard Enterprise Development LP
SPDX-License-Identifier: BSD-2-Clause-Patent =20 @@ -11,7 +11,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent =20 /** =20 - Discover all Peims and optional Apriori file in one FV. There is at most= one + Discover all PEIMs and optional Apriori file in one FV. There is at most= one Apriori file in one FV. =20 =20 @@ -49,7 +49,7 @@ DiscoverPeimsAndOrderWithApriori ( Guid =3D NULL; =20 // - // If the current Fv has been scanned, directly get its cached records. + // If the current FV has been scanned, directly get its cached records. // if (CoreFileHandle->ScanFv) { Private->CurrentFvFileHandles =3D CoreFileHandle->FvFileHandles; @@ -60,7 +60,7 @@ DiscoverPeimsAndOrderWithApriori ( TempFileGuid =3D Private->TempFileGuid; =20 // - // Go ahead to scan this Fv, get PeimCount and cache FileHandles within = it to TempFileHandles. + // Go ahead to scan this FV, get PeimCount and cache FileHandles within = it to TempFileHandles. // PeimCount =3D 0; FileHandle =3D NULL; @@ -147,7 +147,7 @@ DiscoverPeimsAndOrderWithApriori ( =20 for (Index =3D 0; Index < PeimCount; Index++) { // - // Make an array of file name guids that matches the FileHandle ar= ray so we can convert + // Make an array of file name GUIDs that matches the FileHandle ar= ray so we can convert // quickly from file name to file handle // Status =3D FvPpi->GetFileInfo (FvPpi, TempFileHandles[Index], &Fil= eInfo); @@ -156,7 +156,7 @@ DiscoverPeimsAndOrderWithApriori ( } =20 // - // Walk through TempFileGuid array to find out who is invalid PEIM g= uid in Apriori file. + // Walk through TempFileGuid array to find out who is invalid PEIM G= UID in Apriori file. // Add available PEIMs in Apriori file into FvFileHandles array. // Index =3D 0; @@ -194,8 +194,8 @@ DiscoverPeimsAndOrderWithApriori ( } =20 // - // The current Fv File Handles have been cached. So that we don't have t= o scan the Fv again. - // Instead, we can retrieve the file handles within this Fv from cached = records. + // The current FV File Handles have been cached. So that we don't have t= o scan the FV again. + // Instead, we can retrieve the file handles within this FV from cached = records. // CoreFileHandle->ScanFv =3D TRUE; Private->CurrentFvFileHandles =3D CoreFileHandle->FvFileHandles; @@ -307,7 +307,7 @@ PeiLoadFixAddressHook( DEBUG ((EFI_D_INFO, "LOADING MODULE FIXED INFO: PcdLoadFixAddressPeiCode= PageNumber=3D 0x%x.\n", PcdGet32(PcdLoadFixAddressPeiCodePageNumber))); DEBUG ((EFI_D_INFO, "LOADING MODULE FIXED INFO: Total Reserved Memory Si= ze =3D 0x%lx.\n", TotalReservedMemorySize)); // - // Loop through the system memory typed hob to merge the adjacent memory= range + // Loop through the system memory typed HOB to merge the adjacent memory= range // for (Hob.Raw =3D PrivateData->HobList.Raw; !END_OF_HOB_LIST(Hob); Hob.Ra= w =3D GET_NEXT_HOB(Hob)) { // @@ -317,7 +317,7 @@ PeiLoadFixAddressHook( =20 ResourceHob =3D Hob.ResourceDescriptor; // - // If range described in this hob is not system memory or heigher th= an MAX_ADDRESS, ignored. + // If range described in this HOB is not system memory or higher tha= n MAX_ADDRESS, ignored. // if (ResourceHob->ResourceType !=3D EFI_RESOURCE_SYSTEM_MEMORY || ResourceHob->PhysicalStart + ResourceHob->ResourceLength > MAX_A= DDRESS) { @@ -387,18 +387,18 @@ PeiLoadFixAddressHook( if (GET_HOB_TYPE (NextHob) =3D=3D EFI_HOB_TYPE_RESOURCE_DESCRIPTOR= ) { NextResourceHob =3D NextHob.ResourceDescriptor; // - // If range described in this hob is not system memory or heighe= r than MAX_ADDRESS, ignored. + // If range described in this HOB is not system memory or higher= than MAX_ADDRESS, ignored. // if (NextResourceHob->ResourceType !=3D EFI_RESOURCE_SYSTEM_MEMOR= Y || NextResourceHob->PhysicalStart + NextResourceHob->ResourceLength > MAX= _ADDRESS) { continue; } // - // If the range describe in memory allocation HOB belongs to th= e memroy range described by the resource hob + // If the range describe in memory allocation HOB belongs to the= memory range described by the resource HOB // if (MemoryHob->AllocDescriptor.MemoryBaseAddress >=3D NextResour= ceHob->PhysicalStart && MemoryHob->AllocDescriptor.MemoryBaseAddress + MemoryHob->Al= locDescriptor.MemoryLength <=3D NextResourceHob->PhysicalStart + NextResour= ceHob->ResourceLength) { // - // Build seperate resource hob for this allocated range + // Build separate resource HOB for this allocated range // if (MemoryHob->AllocDescriptor.MemoryBaseAddress > NextResour= ceHob->PhysicalStart) { BuildResourceDescriptorHob ( @@ -452,7 +452,7 @@ PeiLoadFixAddressHook( =20 ResourceHob =3D Hob.ResourceDescriptor; // - // See if this resource descrior HOB describes tested system memor= y below MAX_ADDRESS + // See if this resource descriptor HOB describes tested system mem= ory below MAX_ADDRESS // if (ResourceHob->ResourceType =3D=3D EFI_RESOURCE_SYSTEM_MEMORY && ResourceHob->PhysicalStart + ResourceHob->ResourceLength <=3D = MAX_ADDRESS) { @@ -476,7 +476,7 @@ PeiLoadFixAddressHook( DEBUG ((EFI_D_INFO, "LOADING MODULE FIXED ERROR:Top Address 0x%lx is= invalid \n", TopLoadingAddress)); DEBUG ((EFI_D_INFO, "LOADING MODULE FIXED ERROR:The recommended Top = Address for the platform is: \n")); // - // Print the recomended Top address range. + // Print the recommended Top address range. // for (Hob.Raw =3D PrivateData->HobList.Raw; !END_OF_HOB_LIST(Hob); Ho= b.Raw =3D GET_NEXT_HOB(Hob)) { // @@ -486,7 +486,7 @@ PeiLoadFixAddressHook( =20 ResourceHob =3D Hob.ResourceDescriptor; // - // See if this resource descrior HOB describes tested system mem= ory below MAX_ADDRESS + // See if this resource descriptor HOB describes tested system m= emory below MAX_ADDRESS // if (ResourceHob->ResourceType =3D=3D EFI_RESOURCE_SYSTEM_MEMORY = && ResourceHob->PhysicalStart + ResourceHob->ResourceLength <= =3D MAX_ADDRESS) { @@ -524,7 +524,7 @@ PeiLoadFixAddressHook( =20 ResourceHob =3D Hob.ResourceDescriptor; // - // See if this resource descrior HOB describes tested system memor= y below MAX_ADDRESS + // See if this resource descriptor HOB describes tested system mem= ory below MAX_ADDRESS // if (ResourceHob->ResourceType =3D=3D EFI_RESOURCE_SYSTEM_MEMORY && ResourceHob->PhysicalStart + ResourceHob->ResourceLength <=3D = MAX_ADDRESS && @@ -554,7 +554,7 @@ PeiLoadFixAddressHook( =20 if (CurrentResourceHob !=3D NULL) { // - // rebuild resource HOB for PEI memmory and reserved memory + // rebuild resource HOB for PEI memory and reserved memory // BuildResourceDescriptorHob ( EFI_RESOURCE_SYSTEM_MEMORY, @@ -750,7 +750,7 @@ PeiCheckAndSwitchStack ( ASSERT (NewStackSize >=3D SecCoreData->StackSize); =20 // - // Calculate stack offset and heap offset between temporary memory and= new permement + // Calculate stack offset and heap offset between temporary memory and= new permanent // memory seperately. // TopOfOldStack =3D (UINTN)SecCoreData->StackBase + SecCoreData->StackSi= ze; @@ -1042,10 +1042,10 @@ PeiDispatcher ( // // This is the main dispatch loop. It will search known FVs for PEIMs a= nd // attempt to dispatch them. If any PEIM gets dispatched through a sing= le - // pass of the dispatcher, it will start over from the Bfv again to see + // pass of the dispatcher, it will start over from the BFV again to see // if any new PEIMs dependencies got satisfied. With a well ordered // FV where PEIMs are found in the order their dependencies are also - // satisfied, this dipatcher should run only once. + // satisfied, this dispatcher should run only once. // do { // @@ -1081,7 +1081,7 @@ PeiDispatcher ( } =20 // - // Start to dispatch all modules within the current Fv. + // Start to dispatch all modules within the current FV. // for (PeimCount =3D Private->CurrentPeimCount; PeimCount < Private->Fv[FvCount].PeimCount; @@ -1097,7 +1097,7 @@ PeiDispatcher ( ASSERT_EFI_ERROR (Status); if (FvFileInfo.FileType =3D=3D EFI_FV_FILETYPE_FIRMWARE_VOLUME= _IMAGE) { // - // For Fv type file, Produce new FvInfo PPI and FV hob + // For FV type file, Produce new FvInfo PPI and FV HOB // Status =3D ProcessFvFile (Private, &Private->Fv[FvCount], Pe= imFileHandle); if (Status =3D=3D EFI_SUCCESS) { @@ -1317,7 +1317,7 @@ DepexSatisfied ( =20 if (PeimCount < Private->AprioriCount) { // - // If it's in the Apriori file then we set Depex to TRUE + // If it's in the Apriori file then we set DEPEX to TRUE // DEBUG ((DEBUG_DISPATCH, " RESULT =3D TRUE (Apriori)\n")); return TRUE; diff --git a/MdeModulePkg/Core/Pei/FwVol/FwVol.c b/MdeModulePkg/Core/Pei/Fw= Vol/FwVol.c index f4642c47c1..c21eb9c039 100644 --- a/MdeModulePkg/Core/Pei/FwVol/FwVol.c +++ b/MdeModulePkg/Core/Pei/FwVol/FwVol.c @@ -13,12 +13,12 @@ EFI_PEI_NOTIFY_DESCRIPTOR mNotifyOnFvInfoList[] =3D { { EFI_PEI_PPI_DESCRIPTOR_NOTIFY_CALLBACK, &gEfiPeiFirmwareVolumeInfoPpiGuid, - FirmwareVolmeInfoPpiNotifyCallback + FirmwareVolumeInfoPpiNotifyCallback }, { (EFI_PEI_PPI_DESCRIPTOR_NOTIFY_CALLBACK | EFI_PEI_PPI_DESCRIPTOR_TERMI= NATE_LIST), &gEfiPeiFirmwareVolumeInfo2PpiGuid, - FirmwareVolmeInfoPpiNotifyCallback + FirmwareVolumeInfoPpiNotifyCallback } }; =20 @@ -447,7 +447,7 @@ FindFileEx ( } =20 /** - Initialize PeiCore Fv List. + Initialize PeiCore FV List. =20 @param PrivateData - Pointer to PEI_CORE_INSTANCE. @param SecCoreData - Pointer to EFI_SEC_PEI_HAND_OFF. @@ -520,7 +520,7 @@ PeiInitializeFv ( =20 // // Post a call-back for the FvInfoPPI and FvInfo2PPI services to expose - // additional Fvs to PeiCore. + // additional FVs to PeiCore. // Status =3D PeiServicesNotifyPpi (mNotifyOnFvInfoList); ASSERT_EFI_ERROR (Status); @@ -528,7 +528,7 @@ PeiInitializeFv ( } =20 /** - Process Firmware Volum Information once FvInfoPPI or FvInfo2PPI install. + Process Firmware Volume Information once FvInfoPPI or FvInfo2PPI install. The FV Info will be registered into PeiCore private data structure. And search the inside FV image, if found, the new FV INFO(2) PPI will be= installed. =20 @@ -537,12 +537,12 @@ PeiInitializeFv ( @param Ppi Address of the PPI that was installed. =20 @retval EFI_SUCCESS The FV Info is registered into PeiCore private da= ta structure. - @return if not EFI_SUCESS, fail to verify FV. + @return if not EFI_SUCCESS, fail to verify FV. =20 **/ EFI_STATUS EFIAPI -FirmwareVolmeInfoPpiNotifyCallback ( +FirmwareVolumeInfoPpiNotifyCallback ( IN EFI_PEI_SERVICES **PeiServices, IN EFI_PEI_NOTIFY_DESCRIPTOR *NotifyDescriptor, IN VOID *Ppi @@ -593,7 +593,7 @@ FirmwareVolmeInfoPpiNotifyCallback ( } =20 // - // Locate the corresponding FV_PPI according to founded FV's format guid + // Locate the corresponding FV_PPI according to founded FV's format GUID // Status =3D PeiServicesLocatePpi ( &FvInfo2Ppi.FvFormat, @@ -620,7 +620,7 @@ FirmwareVolmeInfoPpiNotifyCallback ( PrivateData->Fv[FvIndex].AuthenticationStatus =3D FvInfo2Ppi.Aut= henticationStatus; DEBUG ((EFI_D_INFO, "Update AuthenticationStatus of the %dth FV = to 0x%x!\n", FvIndex, FvInfo2Ppi.AuthenticationStatus)); } - DEBUG ((EFI_D_INFO, "The Fv %p has already been processed!\n", FvI= nfo2Ppi.FvInfo)); + DEBUG ((DEBUG_INFO, "The FV %p has already been processed!\n", FvI= nfo2Ppi.FvInfo)); return EFI_SUCCESS; } } @@ -661,7 +661,7 @@ FirmwareVolmeInfoPpiNotifyCallback ( PrivateData->FvCount ++; =20 // - // Scan and process the new discoveried FV for EFI_FV_FILETYPE_FIRMWAR= E_VOLUME_IMAGE + // Scan and process the new discovered FV for EFI_FV_FILETYPE_FIRMWARE= _VOLUME_IMAGE // FileHandle =3D NULL; do { @@ -1359,11 +1359,11 @@ GetFvUsedSize ( } =20 /** - Get Fv image(s) from the FV type file, then install FV INFO(2) ppi, Buil= d FV(2, 3) hob. + Get FV image(s) from the FV type file, then install FV INFO(2) PPI, Buil= d FV(2, 3) HOB. =20 @param PrivateData PeiCore's private data structure - @param ParentFvCoreHandle Pointer of EFI_CORE_FV_HANDLE to parent Fv i= mage that contain this Fv image. - @param ParentFvFileHandle File handle of a Fv type file that contain t= his Fv image. + @param ParentFvCoreHandle Pointer of EFI_CORE_FV_HANDLE to parent FV i= mage that contain this FV image. + @param ParentFvFileHandle File handle of a FV type file that contain t= his FV image. =20 @retval EFI_NOT_FOUND FV image can't be found. @retval EFI_SUCCESS Successfully to process it. @@ -1533,7 +1533,7 @@ ProcessFvFile ( ); =20 // - // Inform the extracted FvImage to Fv HOB consumer phase, i.e. DXE pha= se + // Inform the extracted FvImage to FV HOB consumer phase, i.e. DXE pha= se // BuildFvHob ( (EFI_PHYSICAL_ADDRESS) (UINTN) FvHeader, @@ -1619,7 +1619,7 @@ PeiFfsFvPpiProcessVolume ( =20 // // The build-in EFI_PEI_FIRMWARE_VOLUME_PPI for FFS2/FFS3 support memory= -mapped - // FV image and the handle is pointed to Fv image's buffer. + // FV image and the handle is pointed to FV image's buffer. // *FvHandle =3D (EFI_PEI_FV_HANDLE) Buffer; =20 @@ -1915,7 +1915,7 @@ PeiFfsFvPpiGetVolumeInfo ( CopyMem (&FwVolHeader, FvHandle, sizeof (EFI_FIRMWARE_VOLUME_HEADER)); =20 // - // Check Fv Image Signature + // Check FV Image Signature // if (FwVolHeader.Signature !=3D EFI_FVH_SIGNATURE) { return EFI_INVALID_PARAMETER; @@ -2089,7 +2089,7 @@ FvHandleToCoreHandle ( /** Get instance of PEI_CORE_FV_HANDLE for next volume according to given in= dex. =20 - This routine also will install FvInfo ppi for FV hob in PI ways. + This routine also will install FvInfo PPI for FV HOB in PI ways. =20 @param Private Pointer of PEI_CORE_INSTANCE @param Instance The index of FV want to be searched. @@ -2185,10 +2185,10 @@ PeiReinitializeFv ( } =20 /** - Report the information for a new discoveried FV in unknown third-party f= ormat. + Report the information for a new discovered FV in unknown third-party fo= rmat. =20 If the EFI_PEI_FIRMWARE_VOLUME_PPI has not been installed for third-part= y FV format, but - the FV in this format has been discoveried, then this FV's information w= ill be cached into + the FV in this format has been discovered, then this FV's information wi= ll be cached into PEI_CORE_INSTANCE's UnknownFvInfo array. Also a notification would be installed for unknown third-party FV format= guid, if EFI_PEI_FIRMWARE_VOLUME_PPI is installed later by platform's PEIM, the original unknown third-party = FV will be processed by @@ -2242,13 +2242,13 @@ AddUnknownFormatFvInfo ( } =20 /** - Find the FV information according to third-party FV format guid. + Find the FV information according to third-party FV format GUID. =20 - This routine also will remove the FV information found by given FV forma= t guid from + This routine also will remove the FV information found by given FV forma= t GUID from PrivateData->UnknownFvInfo[]. =20 @param PrivateData Point to instance of PEI_CORE_INSTANCE - @param Format Point to given FV format guid + @param Format Point to given FV format GUID @param FvInfo On return, the pointer of FV information buffer @param FvInfoSize On return, the size of FV information buffer. @param AuthenticationStatus On return, the authentication status of FV i= nformation buffer. @@ -2298,7 +2298,7 @@ FindUnknownFormatFvInfo ( Notification callback function for EFI_PEI_FIRMWARE_VOLUME_PPI. =20 When a EFI_PEI_FIRMWARE_VOLUME_PPI is installed to support new FV format= , this - routine is called to process all discoveried FVs in this format. + routine is called to process all discovered FVs in this format. =20 @param PeiServices An indirect pointer to the EFI_PEI_SERVICES tab= le published by the PEI Foundation @param NotifyDescriptor Address of the notification descriptor data str= ucture. @@ -2352,7 +2352,7 @@ ThirdPartyFvPpiNotifyCallback ( IsProcessed =3D FALSE; for (FvIndex =3D 0; FvIndex < PrivateData->FvCount; FvIndex ++) { if (PrivateData->Fv[FvIndex].FvHandle =3D=3D FvHandle) { - DEBUG ((EFI_D_INFO, "The Fv %p has already been processed!\n", FvI= nfo)); + DEBUG ((DEBUG_INFO, "The FV %p has already been processed!\n", FvI= nfo)); IsProcessed =3D TRUE; break; } @@ -2398,7 +2398,7 @@ ThirdPartyFvPpiNotifyCallback ( PrivateData->FvCount ++; =20 // - // Scan and process the new discoveried FV for EFI_FV_FILETYPE_FIRMWAR= E_VOLUME_IMAGE + // Scan and process the new discovered FV for EFI_FV_FILETYPE_FIRMWARE= _VOLUME_IMAGE // FileHandle =3D NULL; do { diff --git a/MdeModulePkg/Core/Pei/Hob/Hob.c b/MdeModulePkg/Core/Pei/Hob/Ho= b.c index 5900f6042b..e0e47fad25 100644 --- a/MdeModulePkg/Core/Pei/Hob/Hob.c +++ b/MdeModulePkg/Core/Pei/Hob/Hob.c @@ -1,7 +1,7 @@ /** @file This module provide Hand-Off Block manupulation. =20 -Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.
+Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ @@ -55,7 +55,7 @@ PeiGetHobList ( @param Length Length of the new HOB to allocate. @param Hob Pointer to the new HOB. =20 - @return EFI_SUCCESS Success to create hob. + @return EFI_SUCCESS Success to create HOB. @retval EFI_INVALID_PARAMETER if Hob is NULL @retval EFI_NOT_AVAILABLE_YET if HobList is still not available. @retval EFI_OUT_OF_RESOURCES if there is no more memory to grow the Ho= blist. diff --git a/MdeModulePkg/Core/Pei/Image/Image.c b/MdeModulePkg/Core/Pei/Im= age/Image.c index d553d9128f..e3ee369933 100644 --- a/MdeModulePkg/Core/Pei/Image/Image.c +++ b/MdeModulePkg/Core/Pei/Image/Image.c @@ -1,7 +1,7 @@ /** @file Pei Core Load Image Support =20 -Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.
+Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ @@ -99,7 +99,7 @@ CheckAndMarkFixLoadingMemoryUsageBitMap ( } =20 // - // Test if the memory is avalaible or not. + // Test if the memory is available or not. // MemoryUsageBitMap =3D Private->PeiCodeMemoryRangeUsageBitMap; BaseOffsetPageNumber =3D EFI_SIZE_TO_PAGES((UINT32)(ImageBase - PeiCode= Base)); @@ -290,7 +290,7 @@ LoadAndRelocatePeCoffImage ( } =20 // - // Initilize local IsS3Boot and IsRegisterForShadow variable + // Initialize local IsS3Boot and IsRegisterForShadow variable // IsS3Boot =3D FALSE; if (Private->HobList.HandoffInformationTable->BootMode =3D=3D BOOT_ON_S3= _RESUME) { @@ -363,7 +363,7 @@ LoadAndRelocatePeCoffImage ( if (EFI_ERROR (Status)){ DEBUG ((EFI_D_INFO|EFI_D_LOAD, "LOADING MODULE FIXED ERROR: Failed= to load module at fixed address. \n")); // - // The PEIM is not assiged valid address, try to allocate page to = load it. + // The PEIM is not assigned valid address, try to allocate page to= load it. // Status =3D PeiServicesAllocatePages (EfiBootServicesCode, EFI_SIZE_TO_PAGES ((UINT32) Ali= gnImageSize), @@ -602,7 +602,7 @@ PeiLoadImageLoadImage ( // // Copy the PDB file name to our temporary string, and replace .pdb = with .efi // The PDB file name is limited in the range of 0~511. - // If the length is bigger than 511, trim the redudant characters to= avoid overflow in array boundary. + // If the length is bigger than 511, trim the redundant characters t= o avoid overflow in array boundary. // for (Index =3D 0; Index < sizeof (EfiFileName) - 4; Index++) { EfiFileName[Index] =3D AsciiString[Index + StartIndex]; diff --git a/MdeModulePkg/Core/Pei/Memory/MemoryServices.c b/MdeModulePkg/C= ore/Pei/Memory/MemoryServices.c index 706837890f..838a003baa 100644 --- a/MdeModulePkg/Core/Pei/Memory/MemoryServices.c +++ b/MdeModulePkg/Core/Pei/Memory/MemoryServices.c @@ -1,7 +1,7 @@ /** @file EFI PEI Core memory services =20 -Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.
+Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ @@ -17,7 +17,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent environment, such as the size and location of tem= porary RAM, the stack location and the BFV location. @param OldCoreData Pointer to the PEI Core data. - NULL if being run in non-permament memory mode. + NULL if being run in non-permanent memory mode. =20 **/ VOID @@ -32,7 +32,7 @@ InitializeMemoryServices ( =20 // // First entering PeiCore, following code will initialized some field - // in PeiCore's private data according to hand off data from sec core. + // in PeiCore's private data according to hand off data from SEC core. // if (OldCoreData =3D=3D NULL) { =20 @@ -61,7 +61,7 @@ InitializeMemoryServices ( The usage model is that the PEIM that discovers the permanent memory sha= ll invoke this service. This routine will hold discoveried memory information into PeiCore's pri= vate data, and set SwitchStackSignal flag. After PEIM who discovery memory is dispa= tched, - PeiDispatcher will migrate temporary memory to permenement memory. + PeiDispatcher will migrate temporary memory to permanent memory. =20 @param PeiServices An indirect pointer to the EFI_PEI_SERVICES ta= ble published by the PEI Foundation. @param MemoryBegin Start of memory address. @@ -86,7 +86,7 @@ PeiInstallPeiMemory ( // // PEI_SERVICE.InstallPeiMemory should only be called one time during wh= ole PEI phase. // If it is invoked more than one time, ASSERT information is given for = developer debugging in debug tip and - // simply return EFI_SUCESS in release tip to ignore it. + // simply return EFI_SUCCESS in release tip to ignore it. // if (PrivateData->PeiMemoryInstalled) { DEBUG ((EFI_D_ERROR, "ERROR: PeiInstallPeiMemory is called more than o= nce!\n")); @@ -758,8 +758,8 @@ PeiFreePages ( =20 /** =20 - Pool allocation service. Before permanent memory is discoveried, the poo= l will - be allocated the heap in the temporary memory. Genenrally, the size of h= eap in temporary + Pool allocation service. Before permanent memory is discovered, the pool= will + be allocated the heap in the temporary memory. Generally, the size of he= ap in temporary memory does not exceed to 64K, so the biggest pool size could be allocat= ed is 64K. =20 @@ -790,7 +790,7 @@ PeiAllocatePool ( =20 // // Generally, the size of heap in temporary memory does not exceed to 64= K, - // HobLength is multiples of 8 bytes, so the maxmium size of pool is 0xF= FF8 - sizeof (EFI_HOB_MEMORY_POOL) + // HobLength is multiples of 8 bytes, so the maximum size of pool is 0xF= FF8 - sizeof (EFI_HOB_MEMORY_POOL) // if (Size > (0xFFF8 - sizeof (EFI_HOB_MEMORY_POOL))) { return EFI_OUT_OF_RESOURCES; diff --git a/MdeModulePkg/Core/Pei/PeiMain/PeiMain.c b/MdeModulePkg/Core/Pe= i/PeiMain/PeiMain.c index 33f056ea8f..025d7f98ec 100644 --- a/MdeModulePkg/Core/Pei/PeiMain/PeiMain.c +++ b/MdeModulePkg/Core/Pei/PeiMain/PeiMain.c @@ -315,7 +315,7 @@ PeiCore ( } =20 // - // Shadow PEI Core. When permanent memory is avaiable, shadow + // Shadow PEI Core. When permanent memory is available, shadow // PEI Core and PEIMs to get high performance. // OldCoreData->ShadowedPeiCore =3D (PEICORE_FUNCTION_POINTER) (UINTN) = PeiCore; diff --git a/MdeModulePkg/Core/Pei/Ppi/Ppi.c b/MdeModulePkg/Core/Pei/Ppi/Pp= i.c index 964aee690e..1ffe718c47 100644 --- a/MdeModulePkg/Core/Pei/Ppi/Ppi.c +++ b/MdeModulePkg/Core/Pei/Ppi/Ppi.c @@ -1,7 +1,7 @@ /** @file EFI PEI Core PPI services =20 -Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.
+Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ @@ -663,7 +663,7 @@ ProcessDispatchNotifyList ( // // Check if the PEIM that was just dispatched resulted in any // Notifies getting installed. If so, go process any dispatch - // level Notifies that match the previouly installed PPIs. + // level Notifies that match the previously installed PPIs. // Use "while" instead of "if" since ProcessNotify can modify // DispatchNotifyList.CurrentCount (with NotifyPpi) so we have // to iterate until the same. diff --git a/MdeModulePkg/Core/Pei/Security/Security.c b/MdeModulePkg/Core/= Pei/Security/Security.c index 99da505538..8c18ed6cc8 100644 --- a/MdeModulePkg/Core/Pei/Security/Security.c +++ b/MdeModulePkg/Core/Pei/Security/Security.c @@ -1,7 +1,7 @@ /** @file EFI PEI Core Security services =20 -Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.
+Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ @@ -20,7 +20,7 @@ EFI_PEI_NOTIFY_DESCRIPTOR mNotifyList =3D { =20 @param PeiServices An indirect pointer to the EFI_PEI_SERVICES table= published by the PEI Foundation. @param OldCoreData Pointer to the old core data. - NULL if being run in non-permament memory mode. + NULL if being run in non-permanent memory mode. =20 **/ VOID @@ -76,7 +76,7 @@ SecurityPpiNotifyCallback ( =20 @param PrivateData PeiCore's private data structure @param VolumeHandle Handle of FV - @param FileHandle Handle of PEIM's ffs + @param FileHandle Handle of PEIM's FFS @param AuthenticationStatus Authentication status =20 @retval EFI_SUCCESS Image is OK @@ -92,7 +92,7 @@ VerifyPeim ( ) { EFI_STATUS Status; - BOOLEAN DeferExection; + BOOLEAN DeferExecution; =20 Status =3D EFI_NOT_FOUND; if (PrivateData->PrivateSecurityPpi =3D=3D NULL) { @@ -114,9 +114,9 @@ VerifyPeim ( AuthenticationStatus, VolumeHandle, FileHandle, - &DeferExection + &DeferExecution ); - if (DeferExection) { + if (DeferExecution) { Status =3D EFI_SECURITY_VIOLATION; } } --=20 2.16.2.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#51374): https://edk2.groups.io/g/devel/message/51374 Mute This Topic: https://groups.io/mt/62875584/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Thu Apr 25 07:57:43 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) client-ip=66.175.222.12; envelope-from=bounce+27952+51375+1787277+3901457@groups.io; helo=web01.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+51375+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=intel.com ARC-Seal: i=1; a=rsa-sha256; t=1574884864; cv=none; d=zohomail.com; s=zohoarc; b=MSoZ6qA9dqKhxw/A4MGmzXgF25vqt1ztf1Kl4kvhetYNgyunCMkpQj7GiZ57w+Li5GO7nVdT0qREcZFzhj9MotzhenuoOWMM36XVyCFcdZA47dsryoe2CW+NjOLudo5KpYqwAG93e9ohUx8o6WFG5tP8CyirqbOBYh9ye6gCQ9s= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1574884864; h=Cc:Date:From:In-Reply-To:List-Id:List-Unsubscribe:Message-ID:Reply-To:References:Sender:Subject:To; bh=QwddbPZO5tcjl4rzAl9ip46KhF6+YzHPwjc6cArda28=; b=Z/rNDBYg2mMDvEvZIBNU8NXtNdCeprKGBQtOlJdDGyDqngMvxQku0uu7POvFyN5G7rVVwZNrtttkco4owivOCapjxSEqttuIZguvN1EeC9AvE7RRTSKyhgmjWD0Xbgeo/6peFMl4J2182zTcxb/GZxC5b5bNDPyXY+Q/vqHauVI= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+51375+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) header.from= Received: from web01.groups.io (web01.groups.io [66.175.222.12]) by mx.zohomail.com with SMTPS id 1574884864166772.4212399545387; Wed, 27 Nov 2019 12:01:04 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id Ohf4YY1788612xn2byWQGNBQ; Wed, 27 Nov 2019 12:01:03 -0800 X-Received: from mga12.intel.com (mga12.intel.com []) by mx.groups.io with SMTP id smtpd.web10.2043.1574884849011527644 for ; Wed, 27 Nov 2019 12:00:58 -0800 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False X-Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga106.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 27 Nov 2019 12:00:58 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.69,250,1571727600"; d="scan'208";a="221088637" X-Received: from makuback-desk1.amr.corp.intel.com ([10.7.159.162]) by orsmga002.jf.intel.com with ESMTP; 27 Nov 2019 12:00:58 -0800 From: "Kubacki, Michael A" To: devel@edk2.groups.io Cc: Dandan Bi , Liming Gao , Jian J Wang , Hao A Wu Subject: [edk2-devel] [PATCH V2 2/2] MdeModulePkg PeiCore: Improve comment semantics Date: Wed, 27 Nov 2019 11:57:47 -0800 Message-Id: <20191127195747.3192-3-michael.a.kubacki@intel.com> In-Reply-To: <20191127195747.3192-1-michael.a.kubacki@intel.com> References: <20191127195747.3192-1-michael.a.kubacki@intel.com> Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,michael.a.kubacki@intel.com X-Gm-Message-State: IOVgnt3klzrBQBiQAr5QZDmtx1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1574884863; bh=kTOHpL6oiU9vsDJNUAhhlH0+GMQ0jnJebY75g5eAkp4=; h=Cc:Date:From:Reply-To:Subject:To; b=guZmm46K5INnUw3ETQLwwDt4E8CLOlitgdH2EGolijukibEKEqRr02a+02Kjmq4qjol 95cymy9Shr2Ktv8ywWlYk/MZeVTivw3yttloQWHpU5mtt2XGsZqD03Nrm9O0KJobVXCUT 4LDJH5T7P8FoEJY6MF3RColMz+peYN5+2i0= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" This patch clarifies wording in several PeiCore comments to improve reading comprehension. Cc: Dandan Bi Cc: Liming Gao Cc: Jian J Wang Cc: Hao A Wu Signed-off-by: Michael Kubacki Reviewed-by responses: Reviewed-by: Jian J Wang Reviewed-by: Liming Gao --- MdeModulePkg/Core/Pei/FwVol/FwVol.h | 9 ++++---- MdeModulePkg/Core/Pei/PeiMain.h | 11 +++++---- MdeModulePkg/Core/Pei/Dependency/Dependency.c | 4 ++-- MdeModulePkg/Core/Pei/Dispatcher/Dispatcher.c | 4 ++-- MdeModulePkg/Core/Pei/FwVol/FwVol.c | 24 +++++++++++--------- MdeModulePkg/Core/Pei/Memory/MemoryServices.c | 4 ++-- 6 files changed, 30 insertions(+), 26 deletions(-) diff --git a/MdeModulePkg/Core/Pei/FwVol/FwVol.h b/MdeModulePkg/Core/Pei/Fw= Vol/FwVol.h index 263f0d7a56..7241c01b8c 100644 --- a/MdeModulePkg/Core/Pei/FwVol/FwVol.h +++ b/MdeModulePkg/Core/Pei/FwVol/FwVol.h @@ -303,11 +303,12 @@ FindFileEx ( ); =20 /** - Report the information for a new discovered FV in unknown format. + Report the information for a newly discovered FV in an unknown format. + + If the EFI_PEI_FIRMWARE_VOLUME_PPI has not been installed for a third-pa= rty FV format, but + the FV has been discovered, then the information of this FV will be cach= ed into PEI_CORE_INSTANCE's + UnknownFvInfo array. =20 - If the EFI_PEI_FIRMWARE_VOLUME_PPI has not been installed for specific F= V format, but - the FV in this FV format has been discovered, then the information of th= is FV - will be cached into PEI_CORE_INSTANCE's UnknownFvInfo array. Also a notification would be installed for unknown FV format GUID, if EF= I_PEI_FIRMWARE_VOLUME_PPI is installed later by platform's PEIM, the original unknown FV will be p= rocessed by using new installed EFI_PEI_FIRMWARE_VOLUME_PPI. diff --git a/MdeModulePkg/Core/Pei/PeiMain.h b/MdeModulePkg/Core/Pei/PeiMai= n.h index 3f61247a0f..6431bdaaac 100644 --- a/MdeModulePkg/Core/Pei/PeiMain.h +++ b/MdeModulePkg/Core/Pei/PeiMain.h @@ -1217,8 +1217,8 @@ PeiFfsGetVolumeInfo ( ); =20 /** - This routine enable a PEIM to register itself to shadow when PEI Foundat= ion - discovery permanent memory. + This routine enables a PEIM to register itself for shadow when the PEI F= oundation + discovers permanent memory. =20 @param FileHandle File handle of a PEIM. =20 @@ -1314,12 +1314,13 @@ ProcessFvFile ( ); =20 /** - Get instance of PEI_CORE_FV_HANDLE for next volume according to given in= dex. + Gets a PEI_CORE_FV_HANDLE instance for the next volume according to the = given index. =20 - This routine also will install FvInfo PPI for FV HOB in PI ways. + This routine also will install an instance of the FvInfo PPI for the FV = HOB + as defined in the PI specification. =20 @param Private Pointer of PEI_CORE_INSTANCE - @param Instance The index of FV want to be searched. + @param Instance Index of the FV to search =20 @return Instance of PEI_CORE_FV_HANDLE. **/ diff --git a/MdeModulePkg/Core/Pei/Dependency/Dependency.c b/MdeModulePkg/C= ore/Pei/Dependency/Dependency.c index 9a8353aef2..b53e5f2686 100644 --- a/MdeModulePkg/Core/Pei/Dependency/Dependency.c +++ b/MdeModulePkg/Core/Pei/Dependency/Dependency.c @@ -2,8 +2,8 @@ PEI Dispatcher Dependency Evaluator =20 This routine evaluates a dependency expression (DEPENDENCY_EXPRESSION) t= o determine - if a driver can be scheduled for execution. The criteria for - schedulability is that the dependency expression is satisfied. + if a driver can be scheduled for execution. The criteria to be schedule= d is + that the dependency expression is satisfied. =20 Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent diff --git a/MdeModulePkg/Core/Pei/Dispatcher/Dispatcher.c b/MdeModulePkg/C= ore/Pei/Dispatcher/Dispatcher.c index c9f2a91264..a18ac47f61 100644 --- a/MdeModulePkg/Core/Pei/Dispatcher/Dispatcher.c +++ b/MdeModulePkg/Core/Pei/Dispatcher/Dispatcher.c @@ -1347,8 +1347,8 @@ DepexSatisfied ( } =20 /** - This routine enable a PEIM to register itself to shadow when PEI Foundat= ion - discovery permanent memory. + This routine enables a PEIM to register itself for shadow when the PEI F= oundation + discovers permanent memory. =20 @param FileHandle File handle of a PEIM. =20 diff --git a/MdeModulePkg/Core/Pei/FwVol/FwVol.c b/MdeModulePkg/Core/Pei/Fw= Vol/FwVol.c index c21eb9c039..b3661146f2 100644 --- a/MdeModulePkg/Core/Pei/FwVol/FwVol.c +++ b/MdeModulePkg/Core/Pei/FwVol/FwVol.c @@ -593,7 +593,7 @@ FirmwareVolumeInfoPpiNotifyCallback ( } =20 // - // Locate the corresponding FV_PPI according to founded FV's format GUID + // Locate the corresponding FV_PPI according to the format GUID of the F= V found // Status =3D PeiServicesLocatePpi ( &FvInfo2Ppi.FvFormat, @@ -1533,7 +1533,7 @@ ProcessFvFile ( ); =20 // - // Inform the extracted FvImage to FV HOB consumer phase, i.e. DXE pha= se + // Expose the extracted FvImage to the FV HOB consumer phase, i.e. DXE= phase // BuildFvHob ( (EFI_PHYSICAL_ADDRESS) (UINTN) FvHeader, @@ -2087,12 +2087,13 @@ FvHandleToCoreHandle ( } =20 /** - Get instance of PEI_CORE_FV_HANDLE for next volume according to given in= dex. + Gets a PEI_CORE_FV_HANDLE instance for the next volume according to the = given index. =20 - This routine also will install FvInfo PPI for FV HOB in PI ways. + This routine also will install an instance of the FvInfo PPI for the FV = HOB + as defined in the PI specification. =20 @param Private Pointer of PEI_CORE_INSTANCE - @param Instance The index of FV want to be searched. + @param Instance Index of the FV to search =20 @return Instance of PEI_CORE_FV_HANDLE. **/ @@ -2185,13 +2186,14 @@ PeiReinitializeFv ( } =20 /** - Report the information for a new discovered FV in unknown third-party fo= rmat. + Report the information for a newly discovered FV in an unknown format. =20 - If the EFI_PEI_FIRMWARE_VOLUME_PPI has not been installed for third-part= y FV format, but - the FV in this format has been discovered, then this FV's information wi= ll be cached into - PEI_CORE_INSTANCE's UnknownFvInfo array. - Also a notification would be installed for unknown third-party FV format= guid, if EFI_PEI_FIRMWARE_VOLUME_PPI - is installed later by platform's PEIM, the original unknown third-party = FV will be processed by + If the EFI_PEI_FIRMWARE_VOLUME_PPI has not been installed for a third-pa= rty FV format, but + the FV has been discovered, then the information of this FV will be cach= ed into PEI_CORE_INSTANCE's + UnknownFvInfo array. + + Also a notification would be installed for unknown FV format GUID, if EF= I_PEI_FIRMWARE_VOLUME_PPI + is installed later by platform's PEIM, the original unknown FV will be p= rocessed by using new installed EFI_PEI_FIRMWARE_VOLUME_PPI. =20 @param PrivateData Point to instance of PEI_CORE_INSTANCE diff --git a/MdeModulePkg/Core/Pei/Memory/MemoryServices.c b/MdeModulePkg/C= ore/Pei/Memory/MemoryServices.c index 838a003baa..e713e6811a 100644 --- a/MdeModulePkg/Core/Pei/Memory/MemoryServices.c +++ b/MdeModulePkg/Core/Pei/Memory/MemoryServices.c @@ -759,7 +759,7 @@ PeiFreePages ( /** =20 Pool allocation service. Before permanent memory is discovered, the pool= will - be allocated the heap in the temporary memory. Generally, the size of he= ap in temporary + be allocated in the heap in temporary memory. Generally, the size of the= heap in temporary memory does not exceed to 64K, so the biggest pool size could be allocat= ed is 64K. =20 @@ -789,7 +789,7 @@ PeiAllocatePool ( // =20 // - // Generally, the size of heap in temporary memory does not exceed to 64= K, + // Generally, the size of heap in temporary memory does not exceed 64K, // HobLength is multiples of 8 bytes, so the maximum size of pool is 0xF= FF8 - sizeof (EFI_HOB_MEMORY_POOL) // if (Size > (0xFFF8 - sizeof (EFI_HOB_MEMORY_POOL))) { --=20 2.16.2.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#51375): https://edk2.groups.io/g/devel/message/51375 Mute This Topic: https://groups.io/mt/62875705/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-