From nobody Mon Feb 9 19:25:19 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+69113+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 160821041788342.400208450499804; Thu, 17 Dec 2020 05:06:57 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id KrI8YY1788612xgHZkyvSH59; Thu, 17 Dec 2020 05:06:53 -0800 X-Received: from EUR01-VE1-obe.outbound.protection.outlook.com (EUR01-VE1-obe.outbound.protection.outlook.com [40.107.14.58]) by mx.groups.io with SMTP id smtpd.web09.7703.1608210378393788056 for ; Thu, 17 Dec 2020 05:06:19 -0800 X-Received: from AM0PR04CA0128.eurprd04.prod.outlook.com (2603:10a6:208:55::33) by AM6PR08MB3223.eurprd08.prod.outlook.com (2603:10a6:209:4d::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.12; Thu, 17 Dec 2020 13:06:14 +0000 X-Received: from AM5EUR03FT010.eop-EUR03.prod.protection.outlook.com (2603:10a6:208:55:cafe::78) by AM0PR04CA0128.outlook.office365.com (2603:10a6:208:55::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.12 via Frontend Transport; Thu, 17 Dec 2020 13:06:14 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+69113+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT010.mail.protection.outlook.com (10.152.16.134) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3676.22 via Frontend Transport; Thu, 17 Dec 2020 13:06:13 +0000 X-Received: ("Tessian outbound 6af064f543d4:v71"); Thu, 17 Dec 2020 13:06:13 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 35c578aeb606fe55 X-CR-MTA-TID: 64aa7808 X-Received: from 65340ff9386d.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 70249FA8-048D-4903-91A0-B0205858F830.1; Thu, 17 Dec 2020 13:05:53 +0000 X-Received: from EUR02-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 65340ff9386d.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 17 Dec 2020 13:05:53 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=n8tADkUSPY188e6JjRBMyQRWGvBwFd5u2UtMeChE60R1FbVDlLTLsI/F/73LeL7BPbwiqBonVfEw/56zFD2lVValxI262JXozA/cdMAg0O5/LPxJVtlqepHLD0mtVBY3FTM0IRwvxhsUkjmBm6hGnW3y2UstoLw+dVFPXJzjhVtHdRCUpqurIIX4UA45ingUKo1LtYnDXBWnJKxLw9lnTMmloKSXLwo/8TMPYndotZayFX3dqehV6oXLSsHas8z/TM0dJ6sTcRBikUGgfArROINnRf1ryCzrbFjcwMsvqRM++Pe19/Xu5GxZswQ6noU4A9lEjc4QJKolwRgzL6Cz+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+WDlT38CwKgafqLPAnYewfFOoNEdYOHNgQdwgKU+eVg=; b=h6fiWOVCp6Y41oIUAnso5OiWa0bC5fx3eiQuuST9CbUvNtXKd0iczyB+97K0FdQ+Uzq56DNHF8HvqH1k68tb3NGaRDJvpZamiCTm9wTWqKRL7e+CUqcBzLBvqRT7SCmhdhumvn4sk9TBNJ3UEpO1gKuxIzYM21iOXTsm4/unJcY8CAPWp01nFBxdCO1htI2M6TrNLkHqhnAhphW540vLG2BsLhtHh1R91PtzAPskETM4oggW2+tIO3GT7DLcghbVL0C2Cbfdq+daWJj56uwCj9E0F9xvJpglqBt9hp9Q6rjihanVA3+BAYXGpm0NzvUPTFnKNRvEG4ra10spBRoNhQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from DB6PR0301CA0008.eurprd03.prod.outlook.com (2603:10a6:4:3e::18) by PA4PR08MB5885.eurprd08.prod.outlook.com (2603:10a6:102:e6::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.12; Thu, 17 Dec 2020 13:05:51 +0000 X-Received: from DB5EUR03FT037.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:3e:cafe::1d) by DB6PR0301CA0008.outlook.office365.com (2603:10a6:4:3e::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.12 via Frontend Transport; Thu, 17 Dec 2020 13:05:51 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT037.mail.protection.outlook.com (10.152.20.215) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3676.22 via Frontend Transport; Thu, 17 Dec 2020 13:05:50 +0000 X-Received: from AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.2044.4; Thu, 17 Dec 2020 13:05:15 +0000 X-Received: from AZ-NEU-EX03.Arm.com (10.251.24.31) by AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1779.2; Thu, 17 Dec 2020 13:05:12 +0000 X-Received: from E107187.Arm.com (10.57.33.43) by mail.arm.com (10.251.24.31) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Thu, 17 Dec 2020 13:05:11 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , , Subject: [edk2-devel] [PATCH v2 03/26] StandaloneMmPkg: Fix spell check reported errors Date: Thu, 17 Dec 2020 13:04:46 +0000 Message-ID: <20201217130509.12568-4-sami.mujawar@arm.com> In-Reply-To: <20201217130509.12568-1-sami.mujawar@arm.com> References: <20201217130509.12568-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: e8440ea3-2e04-414a-88da-08d8a28c8864 X-MS-TrafficTypeDiagnostic: PA4PR08MB5885:|AM6PR08MB3223: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:10000;OLM:10000; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 2d9NKcFMDbjCjpWPBq4nYPlrcVf82EbnexLIuUw7/CboM8JPgwENA9TpSIBAE15YzZ4d1yEeKNG8wYAOU4NbmPC9a1E4utJyPBAmcxbwSZ4D8QPo5GIAMfM5JGbbQ1AwzsJyQP8Xm2aIOuxcKxLT8TiDSZ+6Zu78S+5aYOXdldzAAtgbEctTlcrbOXldoaWH/kJM8EsIp3oqh7lOXdZ1sj6cVXW0tBzqzsAJ3xgNtZg7yCgbfKAM+5QJp67DByO+WVPRktvNq7dhY3tKK0y0GwF5auOlE5SvXQpiGkXplfjuqrfQiFFBvO11rUoq4QFXaGsiQtsmcxdYH+fxjduQAk7p7rDxSnO1p6op3qDBQSkIb2dIWsibqHrWje2OAGw85lRDWLz+Sf+orvGhWs1Img== X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(6029001)(4636009)(346002)(376002)(39850400004)(136003)(396003)(46966005)(44832011)(82740400003)(8936002)(478600001)(82310400003)(70206006)(70586007)(1076003)(6666004)(356005)(2906002)(30864003)(36756003)(86362001)(19627235002)(4326008)(5660300002)(6916009)(81166007)(8676002)(54906003)(26005)(7696005)(316002)(186003)(336012)(2616005)(47076004)(83380400001)(426003);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR08MB5885 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT010.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: e422e765-1d66-477b-3ce4-08d8a28c7a90 X-Microsoft-Antispam-Message-Info: Zg4e8DuKpv4MYn8Xp/BTQZuxoHvHHdJWJhZ/UmbNNUtIte4DrQN05MB6pU+l8EJ8B2NAt8N0LhcpXavRo0zKrc0siF1pHJeM7SCfO4Ro19qb3FjY97yn0yaBsowDtDDaxdvGC0M/rfUssoFtr9muejw3sbp0Gnps4FCQ/ZEJ/+DrbXlZx+vKLwsl0btPTU8lRnV6pQu11N1IvuAkBnNyF3X8BbqpdXxjlwiKr/X3d0SapAkkf8CjpMOZbaNGr3bouhunkkW7DqgZRzTM0ONATEWclRmR5HeHF9E1G7ok8ia32RdadkalByazryOiSd1+yJ1q/xSMgEUaUW92CHUWKbEOCkwMtq9xMmnQs3wP9NKfR9nIU2bI4jY4V1QHRT3Y5sIMBci6d9mvNeFl02xQQQ== X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Dec 2020 13:06:13.9666 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: e8440ea3-2e04-414a-88da-08d8a28c8864 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT010.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3223 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: iTbLdIIRLuvlzPW0vnvLgWJwx1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1608210413; bh=EDV0Cx61+Fa0+IjmuNQ/MXucHOfdpqfVQHk6jNukeLs=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=k9a3MXTf1mcQlO4AbBGdT0MMSIrDp0XOqtII+DFWWdBKUKpvl9gAfjo8jDb9BlFccon wla9bHmYtNRqgzsILXI9J/JAYDkwsXaoq8yDyB/M5aRiyQS4KGkM6PSXjwWPnLAKW28hK MaJqUtY4nqUg7b+b+/oMrdY5Jkyfo1BSL6Y= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Fix the spelling mistakes reported by the spell check utility that is run as part of the Core CI. Signed-off-by: Sami Mujawar Acked-by: Jiewen Yao --- Notes: v2: - No code change. Resending patch with v2 series. [SAMI] StandaloneMmPkg/Core/Dependency.c = | 6 ++-- StandaloneMmPkg/Core/Dispatcher.c = | 33 ++++++++++---------- StandaloneMmPkg/Core/Locate.c = | 6 ++-- StandaloneMmPkg/Core/Mmi.c = | 4 +-- StandaloneMmPkg/Core/StandaloneMmCore.c = | 8 ++--- StandaloneMmPkg/Core/StandaloneMmCore.h = | 12 +++---- StandaloneMmPkg/Include/Guid/MmCoreData.h = | 6 ++-- StandaloneMmPkg/Include/Library/StandaloneMmDriverEntryPoint.h = | 4 +-- StandaloneMmPkg/Include/Library/StandaloneMmMemLib.h = | 6 ++-- StandaloneMmPkg/Library/StandaloneMmCoreMemoryAllocationLib/StandaloneMmCo= reMemoryAllocationLib.inf | 4 +-- StandaloneMmPkg/Library/StandaloneMmMemLib/StandaloneMmMemLib.c = | 6 ++-- StandaloneMmPkg/Library/VariableMmDependency/VariableMmDependency.c = | 4 +-- StandaloneMmPkg/Library/VariableMmDependency/VariableMmDependency.inf = | 4 +-- 13 files changed, 52 insertions(+), 51 deletions(-) diff --git a/StandaloneMmPkg/Core/Dependency.c b/StandaloneMmPkg/Core/Depen= dency.c index e0f2d3518369e9b712f80d34e32011d4fff27509..d2703e4538028a4c34e3baa158b= a9850a78cfb2a 100644 --- a/StandaloneMmPkg/Core/Dependency.c +++ b/StandaloneMmPkg/Core/Dependency.c @@ -3,10 +3,10 @@ =20 This routine evaluates a dependency expression (DEPENDENCY_EXPRESSION) t= o determine if a driver can be scheduled for execution. The criteria for - schedulability is that the dependency expression is satisfied. + scheduling is that the dependency expression is satisfied. =20 Copyright (c) 2009 - 2010, Intel Corporation. All rights reserved.
- Copyright (c) 2016 - 2018, ARM Limited. All rights reserved.
+ Copyright (c) 2016 - 2020, Arm Limited. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ @@ -193,7 +193,7 @@ MmIsSchedulable ( if (DriverEntry->Depex =3D=3D NULL) { // // A NULL Depex means that the MM driver is not built correctly. - // All MM drivers must have a valid depex expressiion. + // All MM drivers must have a valid depex expression. // DEBUG ((DEBUG_DISPATCH, " RESULT =3D FALSE (Depex is empty)\n")); ASSERT (FALSE); diff --git a/StandaloneMmPkg/Core/Dispatcher.c b/StandaloneMmPkg/Core/Dispa= tcher.c index c99e6c04c8de31a4ef7022a7cafee6a9db88c5a2..45b17fe3acfec9c056396873006= c03f668c1aed6 100644 --- a/StandaloneMmPkg/Core/Dispatcher.c +++ b/StandaloneMmPkg/Core/Dispatcher.c @@ -15,9 +15,10 @@ =20 Step #3 - Adding to the mScheduledQueue requires that you process Before and After dependencies. This is done recursively as the call t= o add - to the mScheduledQueue checks for Before and recursively adds - all Befores. It then addes the item that was passed in and then - processess the After dependecies by recursively calling the ro= utine. + to the mScheduledQueue checks for Before Depexes and recursive= ly + adds all Before Depexes. It then adds the item that was passed= in + and then processess the After dependencies by recursively call= ing + the routine. =20 Dispatcher Rules: The rules for the dispatcher are similar to the DXE dispatcher. @@ -29,7 +30,7 @@ =20 Copyright (c) 2014, Hewlett-Packard Development Company, L.P. Copyright (c) 2009 - 2014, Intel Corporation. All rights reserved.
- Copyright (c) 2016 - 2018, ARM Limited. All rights reserved.
+ Copyright (c) 2016 - 2020, Arm Limited. All rights reserved.
=20 SPDX-License-Identifier: BSD-2-Clause-Patent =20 @@ -60,8 +61,8 @@ MmCoreFfsFindMmDriver ( /** Insert InsertedDriverEntry onto the mScheduledQueue. To do this you must add any driver with a before dependency on InsertedDriverEntry firs= t. - You do this by recursively calling this routine. After all the Befores a= re - processed you can add InsertedDriverEntry to the mScheduledQueue. + You do this by recursively calling this routine. After all the Before De= pexes + are processed you can add InsertedDriverEntry to the mScheduledQueue. Then you can add any driver with an After dependency on InsertedDriverEn= try by recursively calling this routine. =20 @@ -92,7 +93,7 @@ LIST_ENTRY mScheduledQueue =3D INITIALIZE_LIST_HEAD_VARI= ABLE (mScheduledQueue); LIST_ENTRY mFwVolList =3D INITIALIZE_LIST_HEAD_VARIABLE (mFwVolList); =20 // -// Flag for the MM Dispacher. TRUE if dispatcher is execuing. +// Flag for the MM Dispacher. TRUE if dispatcher is executing. // BOOLEAN gDispatcherRunning =3D FALSE; =20 @@ -110,7 +111,7 @@ GLOBAL_REMOVE_IF_UNREFERENCED UINT64 = *mMmCodeMemoryRangeUsageB =20 /** To check memory usage bit map array to figure out if the memory range in= which the image will be loaded - is available or not. If memory range is avaliable, the function will mar= k the correponding bits to 1 + is available or not. If memory range is avaliable, the function will mar= k the corresponding bits to 1 which indicates the memory range is used. The function is only invoked w= hen load modules at fixed address feature is enabled. =20 @@ -163,7 +164,7 @@ CheckAndMarkFixLoadingMemoryUsageBitMap ( } =20 // - // Test if the memory is avalaible or not. + // Test if the memory is available or not. // BaseOffsetPageNumber =3D (UINTN)EFI_SIZE_TO_PAGES ((UINT32)(ImageBase - = MmCodeBase)); TopOffsetPageNumber =3D (UINTN)EFI_SIZE_TO_PAGES ((UINT32)(ImageBase + = ImageSize - MmCodeBase)); @@ -328,7 +329,7 @@ MmLoadImage ( ImageContext.ImageAddress =3D (EFI_PHYSICAL_ADDRESS)DstBuffer; =20 // - // Align buffer on section boundry + // Align buffer on section boundary // ImageContext.ImageAddress +=3D ImageContext.SectionAlignment - 1; ImageContext.ImageAddress &=3D ~((EFI_PHYSICAL_ADDRESS)(ImageContext.Sec= tionAlignment - 1)); @@ -604,7 +605,7 @@ MmDispatcher ( =20 // // Load the MM Driver image into memory. If the Driver was transitio= ned from - // Untrused to Scheduled it would have already been loaded so we may= need to + // Untrusted to Scheduled it would have already been loaded so we ma= y need to // skip the LoadImage // if (DriverEntry->ImageHandle =3D=3D NULL) { @@ -703,8 +704,8 @@ MmDispatcher ( /** Insert InsertedDriverEntry onto the mScheduledQueue. To do this you must add any driver with a before dependency on InsertedDriverEntry firs= t. - You do this by recursively calling this routine. After all the Befores a= re - processed you can add InsertedDriverEntry to the mScheduledQueue. + You do this by recursively calling this routine. After all the Before De= pexes + are processed you can add InsertedDriverEntry to the mScheduledQueue. Then you can add any driver with an After dependency on InsertedDriverEn= try by recursively calling this routine. =20 @@ -828,9 +829,9 @@ FvIsBeingProcessed ( =20 /** Add an entry to the mDiscoveredList. Allocate memory to store the Driver= Entry, - and initilize any state variables. Read the Depex from the FV and store = it + and initialise any state variables. Read the Depex from the FV and store= it in DriverEntry. Pre-process the Depex to set the Before and After state. - The Discovered list is never free'ed and contains booleans that represen= t the + The Discovered list is never freed and contains booleans that represent = the other possible MM driver states. =20 @param Fv Fv protocol, needed to read Depex info out= of @@ -885,7 +886,7 @@ MmAddToDriverList ( =20 /** Traverse the discovered list for any drivers that were discovered but no= t loaded - because the dependency experessions evaluated to false. + because the dependency expressions evaluated to false. =20 **/ VOID diff --git a/StandaloneMmPkg/Core/Locate.c b/StandaloneMmPkg/Core/Locate.c index 00e395eca6dab8a64d2f587e1c52d2c528ed76f9..1db6f43d7d8a2e65da5199476e0= 0b7f2af6bf56e 100644 --- a/StandaloneMmPkg/Core/Locate.c +++ b/StandaloneMmPkg/Core/Locate.c @@ -2,7 +2,7 @@ Locate handle functions =20 Copyright (c) 2009 - 2017, Intel Corporation. All rights reserved.
- Copyright (c) 2016 - 2018, ARM Limited. All rights reserved.
+ Copyright (c) 2016 - 2020, Arm Limited. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ @@ -173,8 +173,8 @@ MmGetNextLocateByProtocol ( =20 /** Return the first Protocol Interface that matches the Protocol GUID. If - Registration is pasased in return a Protocol Instance that was just add - to the system. If Retistration is NULL return the first Protocol Interfa= ce + Registration is passed in return a Protocol Instance that was just add + to the system. If Registration is NULL return the first Protocol Interfa= ce you find. =20 @param Protocol The protocol to search for diff --git a/StandaloneMmPkg/Core/Mmi.c b/StandaloneMmPkg/Core/Mmi.c index 5ed2295ff37409242cc59cadceffc9d3968af6b5..f636a71e26ff586eb3a9b59725b= 8fb33767dd275 100644 --- a/StandaloneMmPkg/Core/Mmi.c +++ b/StandaloneMmPkg/Core/Mmi.c @@ -2,7 +2,7 @@ MMI management. =20 Copyright (c) 2009 - 2013, Intel Corporation. All rights reserved.
- Copyright (c) 2016 - 2018, ARM Limited. All rights reserved.
+ Copyright (c) 2016 - 2020, Arm Limited. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ @@ -220,7 +220,7 @@ MmiManage ( /** Registers a handler to execute within MM. =20 - @param Handler Handler service funtion pointer. + @param Handler Handler service function pointer. @param HandlerType Points to the handler type or NULL for root MMI h= andlers. @param DispatchHandle On return, contains a unique handle which can be = used to later unregister the handler function. =20 diff --git a/StandaloneMmPkg/Core/StandaloneMmCore.c b/StandaloneMmPkg/Core= /StandaloneMmCore.c index ac3e2c0b1b93859ebda04841f72a0bed28c02580..0b3ddbaa6a35e2e609f737a39ac= e62c2406bf8df 100644 --- a/StandaloneMmPkg/Core/StandaloneMmCore.c +++ b/StandaloneMmPkg/Core/StandaloneMmCore.c @@ -2,7 +2,7 @@ MM Core Main Entry Point =20 Copyright (c) 2009 - 2014, Intel Corporation. All rights reserved.
- Copyright (c) 2016 - 2018, ARM Limited. All rights reserved.
+ Copyright (c) 2016 - 2020, Arm Limited. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ @@ -590,9 +590,9 @@ StandaloneMmMain ( =20 // // No need to initialize memory service. - // It is done in constructor of StandaloneMmCoreMemoryAllocationLib(), - // so that the library linked with StandaloneMmCore can use AllocatePool= () in constuctor. - // + // It is done in the constructor of StandaloneMmCoreMemoryAllocationLib(= ), + // so that the library linked with StandaloneMmCore can use AllocatePool= () in + // the constructor. =20 DEBUG ((DEBUG_INFO, "MmInstallConfigurationTable For HobList\n")); // diff --git a/StandaloneMmPkg/Core/StandaloneMmCore.h b/StandaloneMmPkg/Core= /StandaloneMmCore.h index 96c195311addf5a7121953a97f3c8c572fca85a2..dcffdd768cff9de1da4c9de4716= 22d553e6815e2 100644 --- a/StandaloneMmPkg/Core/StandaloneMmCore.h +++ b/StandaloneMmPkg/Core/StandaloneMmCore.h @@ -3,7 +3,7 @@ internal structure and functions used by MmCore module. =20 Copyright (c) 2009 - 2014, Intel Corporation. All rights reserved.
- Copyright (c) 2016 - 2018, ARM Limited. All rights reserved.
+ Copyright (c) 2016 - 2020, Arm Limited. All rights reserved.
=20 SPDX-License-Identifier: BSD-2-Clause-Patent =20 @@ -131,7 +131,7 @@ typedef struct { EFI_GUID ProtocolID; /// All protocol interfaces LIST_ENTRY Protocols; - /// Registerd notification handlers + /// Registered notification handlers LIST_ENTRY Notify; } PROTOCOL_ENTRY; =20 @@ -516,8 +516,8 @@ MmLocateHandle ( =20 /** Return the first Protocol Interface that matches the Protocol GUID. If - Registration is pasased in return a Protocol Instance that was just add - to the system. If Retistration is NULL return the first Protocol Interfa= ce + Registration is passed in return a Protocol Instance that was just add + to the system. If Registration is NULL return the first Protocol Interfa= ce you find. =20 @param Protocol The protocol to search for @@ -564,7 +564,7 @@ MmiManage ( /** Registers a handler to execute within MM. =20 - @param Handler Handler service funtion pointer. + @param Handler Handler service function pointer. @param HandlerType Points to the handler type or NULL for root MMI h= andlers. @param DispatchHandle On return, contains a unique handle which can be = used to later unregister the handler function. =20 @@ -728,7 +728,7 @@ MmEfiNotAvailableYetArg5 ( ); =20 // -//Functions used during debug buils +//Functions used during debug builds // =20 /** diff --git a/StandaloneMmPkg/Include/Guid/MmCoreData.h b/StandaloneMmPkg/In= clude/Guid/MmCoreData.h index 8bd80e0519a40360eb91f68673d9afea0abf5004..6c7f9fb67204f19ff250eadece6= 065e62612a2c8 100644 --- a/StandaloneMmPkg/Include/Guid/MmCoreData.h +++ b/StandaloneMmPkg/Include/Guid/MmCoreData.h @@ -2,7 +2,7 @@ MM Core data. =20 Copyright (c) 2015, Intel Corporation. All rights reserved.
-Copyright (c) 2018, ARM Limited. All rights reserved.
+Copyright (c) 2018 - 2020, Arm Limited. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ @@ -98,14 +98,14 @@ typedef struct { EFI_PHYSICAL_ADDRESS Mmst; =20 /// - /// This field is used by the MM Communicatioon Protocol to pass a buffe= r into + /// This field is used by the MM Communication Protocol to pass a buffer= into /// a software MMI handler and for the software MMI handler to pass a bu= ffer back to /// the caller of the MM Communication Protocol. /// EFI_PHYSICAL_ADDRESS CommunicationBuffer; =20 /// - /// This field is used by the MM Communicatioon Protocol to pass the siz= e of a buffer, + /// This field is used by the MM Communication Protocol to pass the size= of a buffer, /// in bytes, into a software MMI handler and for the software MMI handl= er to pass the /// size, in bytes, of a buffer back to the caller of the MM Communicati= on Protocol. /// diff --git a/StandaloneMmPkg/Include/Library/StandaloneMmDriverEntryPoint.h= b/StandaloneMmPkg/Include/Library/StandaloneMmDriverEntryPoint.h index c83212b405977645df61d0a8eceac80ba2e891b6..a2cd1566f5f6ded2618a16737ec= ad46f8dae8467 100644 --- a/StandaloneMmPkg/Include/Library/StandaloneMmDriverEntryPoint.h +++ b/StandaloneMmPkg/Include/Library/StandaloneMmDriverEntryPoint.h @@ -2,7 +2,7 @@ Module entry point library for Standalone MM Drivers. =20 Copyright (c) 2006 - 2008, Intel Corporation. All rights reserved.
-Copyright (c) 2016 - 2018, ARM Limited. All rights reserved.
+Copyright (c) 2016 - 2020, Arm Limited. All rights reserved.
=20 SPDX-License-Identifier: BSD-2-Clause-Patent =20 @@ -29,7 +29,7 @@ extern CONST UINT32 _gMmRevision; than zero, then an unload handler must be registered for this image and the unload handler must invoke ProcessModuleUnloadList(). If _gUefiDriverRevision is not zero and SystemTable->Hdr.Revision is - less than _gUefiDriverRevison, then return EFI_INCOMPATIBLE_VERSION. + less than _gUefiDriverRevision, then return EFI_INCOMPATIBLE_VERSION. =20 @param ImageHandle The image handle of the Standalone MM Driver. @param SystemTable A pointer to the EFI System Table. diff --git a/StandaloneMmPkg/Include/Library/StandaloneMmMemLib.h b/Standal= oneMmPkg/Include/Library/StandaloneMmMemLib.h index baa6fe99810acc695a0e24f1f6d5ead0b59ea497..a061389d23f8521abf4c0fae757= 25d27e8b8a9d6 100644 --- a/StandaloneMmPkg/Include/Library/StandaloneMmMemLib.h +++ b/StandaloneMmPkg/Include/Library/StandaloneMmMemLib.h @@ -6,7 +6,7 @@ from non-MMRAM to non-MMRAM, or set data in non-MMRAM. =20 Copyright (c) 2015, Intel Corporation. All rights reserved.
- Copyright (c) 2016 - 2018, ARM Limited. All rights reserved.
+ Copyright (c) 2016 - 2020, Arm Limited. All rights reserved.
=20 SPDX-License-Identifier: BSD-2-Clause-Patent =20 @@ -69,7 +69,7 @@ MmCopyMemToMmram ( @param SourceBuffer The pointer to the source buffer of the memo= ry copy. @param Length The number of bytes to copy from SourceBuffe= r to DestinationBuffer. =20 - @retval EFI_SECURITY_VIOLATION The DesinationBuffer is invalid per proce= ssor architecture or overlap with MMRAM. + @retval EFI_SECURITY_VIOLATION The DestinationBuffer is invalid per proc= essor architecture or overlap with MMRAM. @retval EFI_SUCCESS Memory is copied. =20 **/ @@ -94,7 +94,7 @@ MmCopyMemFromMmram ( @param SourceBuffer The pointer to the source buffer of the memo= ry copy. @param Length The number of bytes to copy from SourceBuffe= r to DestinationBuffer. =20 - @retval EFI_SECURITY_VIOLATION The DesinationBuffer is invalid per proce= ssor architecture or overlap with MMRAM. + @retval EFI_SECURITY_VIOLATION The DestinationBuffer is invalid per proc= essor architecture or overlap with MMRAM. @retval EFI_SECURITY_VIOLATION The SourceBuffer is invalid per processor= architecture or overlap with MMRAM. @retval EFI_SUCCESS Memory is copied. =20 diff --git a/StandaloneMmPkg/Library/StandaloneMmCoreMemoryAllocationLib/St= andaloneMmCoreMemoryAllocationLib.inf b/StandaloneMmPkg/Library/StandaloneM= mCoreMemoryAllocationLib/StandaloneMmCoreMemoryAllocationLib.inf index 3fa08f2c650c36e764825a21644d25b2bb03ca56..faed919094100c69b8227b1b688= 19955ec5dd433 100644 --- a/StandaloneMmPkg/Library/StandaloneMmCoreMemoryAllocationLib/Standalon= eMmCoreMemoryAllocationLib.inf +++ b/StandaloneMmPkg/Library/StandaloneMmCoreMemoryAllocationLib/Standalon= eMmCoreMemoryAllocationLib.inf @@ -1,11 +1,11 @@ ## @file # Memory Allocation Library instance dedicated to MM Core. # The implementation borrows the MM Core Memory Allocation services as the= primitive -# for memory allocation instead of using MM System Table servces in an ind= irect way. +# for memory allocation instead of using MM System Table services in an in= direct way. # It is assumed that this library instance must be linked with MM Core in = this package. # # Copyright (c) 2010 - 2015, Intel Corporation. All rights reserved.
-# Copyright (c) 2016 - 2018, ARM Limited. All rights reserved.
+# Copyright (c) 2016 - 2020, Arm Limited. All rights reserved.
# # SPDX-License-Identifier: BSD-2-Clause-Patent # diff --git a/StandaloneMmPkg/Library/StandaloneMmMemLib/StandaloneMmMemLib.= c b/StandaloneMmPkg/Library/StandaloneMmMemLib/StandaloneMmMemLib.c index f82cdb3ba816a5a36d10fcdf13fc6bd73f76820f..76456c12647b025c5dcab7aee33= 464aea462b7e6 100644 --- a/StandaloneMmPkg/Library/StandaloneMmMemLib/StandaloneMmMemLib.c +++ b/StandaloneMmPkg/Library/StandaloneMmMemLib/StandaloneMmMemLib.c @@ -7,7 +7,7 @@ and MM driver) and/or specific dedicated hardware. =20 Copyright (c) 2015, Intel Corporation. All rights reserved.
- Copyright (c) 2016 - 2018, ARM Limited. All rights reserved.
+ Copyright (c) 2016 - 2020, Arm Limited. All rights reserved.
=20 SPDX-License-Identifier: BSD-2-Clause-Patent =20 @@ -145,7 +145,7 @@ MmCopyMemToMmram ( @param SourceBuffer The pointer to the source buffer of the memo= ry copy. @param Length The number of bytes to copy from SourceBuffe= r to DestinationBuffer. =20 - @retval EFI_SECURITY_VIOLATION The DesinationBuffer is invalid per proce= ssor architecture or overlap with MMRAM. + @retval EFI_SECURITY_VIOLATION The DestinationBuffer is invalid per proc= essor architecture or overlap with MMRAM. @retval EFI_SUCCESS Memory is copied. =20 **/ @@ -179,7 +179,7 @@ MmCopyMemFromMmram ( @param SourceBuffer The pointer to the source buffer of the memo= ry copy. @param Length The number of bytes to copy from SourceBuffe= r to DestinationBuffer. =20 - @retval EFI_SECURITY_VIOLATION The DesinationBuffer is invalid per proce= ssor architecture or overlap with MMRAM. + @retval EFI_SECURITY_VIOLATION The DestinationBuffer is invalid per proc= essor architecture or overlap with MMRAM. @retval EFI_SECURITY_VIOLATION The SourceBuffer is invalid per processor= architecture or overlap with MMRAM. @retval EFI_SUCCESS Memory is copied. =20 diff --git a/StandaloneMmPkg/Library/VariableMmDependency/VariableMmDepende= ncy.c b/StandaloneMmPkg/Library/VariableMmDependency/VariableMmDependency.c index 1fef0a93b77a0317e454f735e0afb2c2f2c85c40..3549eed791c3eca661fbf6d0e10= c0c86f509ea54 100644 --- a/StandaloneMmPkg/Library/VariableMmDependency/VariableMmDependency.c +++ b/StandaloneMmPkg/Library/VariableMmDependency/VariableMmDependency.c @@ -1,10 +1,10 @@ /** @file - Runtime DXE part corresponding to StanaloneMM variable module. + Runtime DXE part corresponding to StandaloneMM variable module. =20 This module installs variable arch protocol and variable write arch protoc= ol to StandaloneMM runtime variable service. =20 -Copyright (c) 2019, ARM Ltd. All rights reserved. +Copyright (c) 2019 - 2020, Arm Ltd. All rights reserved. =20 SPDX-License-Identifier: BSD-2-Clause-Patent =20 diff --git a/StandaloneMmPkg/Library/VariableMmDependency/VariableMmDepende= ncy.inf b/StandaloneMmPkg/Library/VariableMmDependency/VariableMmDependency= .inf index 34adce6f39fcb0a5709f21c4e50101fa82e3ba79..eb54776602655ead9bf76038d92= bfa80e7636dc5 100644 --- a/StandaloneMmPkg/Library/VariableMmDependency/VariableMmDependency.inf +++ b/StandaloneMmPkg/Library/VariableMmDependency/VariableMmDependency.inf @@ -1,10 +1,10 @@ ## @file -# Runtime DXE part corresponding to StanaloneMM variable module. +# Runtime DXE part corresponding to StandaloneMM variable module. # # This module installs variable arch protocol and variable write arch pro= tocol # to StandaloneMM runtime variable service. # -# Copyright (c) 2019, ARM Ltd. All rights reserved. +# Copyright (c) 2019 - 2020, Arm Ltd. All rights reserved. # SPDX-License-Identifier: BSD-2-Clause-Patent # ## --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#69113): https://edk2.groups.io/g/devel/message/69113 Mute This Topic: https://groups.io/mt/79035563/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-