@param PeiServices Describes the list of possible PEI Services.\r
\r
@retval EFI_SUCESS The entry point of DXE IPL PEIM executes successfully.\r
- @retval Others Some error occurs during the execution of this function. \r
+ @retval Others Some error occurs during the execution of this function.\r
\r
**/\r
EFI_STATUS\r
Status = PeiServicesRegisterForShadow (FileHandle);\r
if (Status == EFI_SUCCESS) {\r
//\r
- // EFI_SUCESS means it is the first time to call register for shadow. \r
- // \r
+ // EFI_SUCESS means it is the first time to call register for shadow.\r
+ //\r
return Status;\r
}\r
\r
// and section extraction.\r
//\r
Status = InstallIplPermanentMemoryPpis (NULL, NULL, NULL);\r
- ASSERT_EFI_ERROR (Status); \r
+ ASSERT_EFI_ERROR (Status);\r
} else {\r
//\r
// Install memory discovered PPI notification to install PPIs for\r
EFI_PEI_PPI_DESCRIPTOR *GuidPpi;\r
\r
//\r
- // Get custom extract guided section method guid list \r
+ // Get custom extract guided section method guid list\r
//\r
ExtractHandlerNumber = ExtractGuidedSectionGetGuidList (&ExtractHandlerGuidTable);\r
\r
}\r
\r
/**\r
- Validate variable data for the MemoryTypeInformation. \r
+ Validate variable data for the MemoryTypeInformation.\r
\r
@param MemoryData Variable data.\r
@param MemoryDataSize Variable data length.\r
}\r
\r
/**\r
- Main entry point to last PEIM. \r
+ Main entry point to last PEIM.\r
\r
This function finds DXE Core in the firmware volume and transfer the control to\r
DXE core.\r
- \r
+\r
@param This Entry point for DXE IPL PPI.\r
@param PeiServices General purpose services available to every PEIM.\r
@param HobList Address to the Pei HOB list.\r
- \r
- @return EFI_SUCCESS DXE core was successfully loaded. \r
+\r
+ @return EFI_SUCCESS DXE core was successfully loaded.\r
@return EFI_OUT_OF_RESOURCES There are not enough resources to load DXE core.\r
\r
**/\r
);\r
}\r
ASSERT_EFI_ERROR (Status);\r
- \r
+\r
Status = S3Resume->S3RestoreConfig2 (S3Resume);\r
ASSERT_EFI_ERROR (Status);\r
} else if (BootMode == BOOT_IN_RECOVERY_MODE) {\r
if (EFI_ERROR (Status)) {\r
DEBUG ((DEBUG_ERROR, "Locate Recovery PPI Failed.(Status = %r)\n", Status));\r
//\r
- // Report Status code the failure of locating Recovery PPI \r
+ // Report Status code the failure of locating Recovery PPI\r
//\r
REPORT_STATUS_CODE (\r
EFI_ERROR_CODE | EFI_ERROR_MAJOR,\r
);\r
if (!EFI_ERROR (Status)) {\r
DataSize = sizeof (MemoryData);\r
- Status = Variable->GetVariable ( \r
- Variable, \r
+ Status = Variable->GetVariable (\r
+ Variable,\r
EFI_MEMORY_TYPE_INFORMATION_VARIABLE_NAME,\r
&gEfiMemoryTypeInformationGuid,\r
NULL,\r
instance that contains DxeCore.\r
\r
@return FileHandle of DxeCore to load DxeCore.\r
- \r
+\r
**/\r
EFI_PEI_FILE_HANDLE\r
DxeIplFindDxeCore (\r
UINTN Instance;\r
EFI_PEI_FV_HANDLE VolumeHandle;\r
EFI_PEI_FILE_HANDLE FileHandle;\r
- \r
+\r
Instance = 0;\r
while (TRUE) {\r
//\r
REPORT_STATUS_CODE (EFI_PROGRESS_CODE, (EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_CORE_EC_DXE_CORRUPT));\r
}\r
ASSERT_EFI_ERROR (Status);\r
- \r
+\r
//\r
// Find the DxeCore file type from the beginning in this firmware volume.\r
//\r
output buffer. If the input\r
section's GuidedSectionHeader.\r
Attributes field has the\r
- EFI_GUIDED_SECTION_AUTH_STATUS_VALID \r
+ EFI_GUIDED_SECTION_AUTH_STATUS_VALID\r
bit as clear,\r
AuthenticationStatus must return\r
zero. These bits reflect the\r
EFI_SUCCESS, the value of\r
AuthenticationStatus is\r
undefined.\r
- \r
+\r
@retval EFI_SUCCESS The InputSection was\r
successfully processed and the\r
section contents were returned.\r
- \r
+\r
@retval EFI_OUT_OF_RESOURCES The system has insufficient\r
resources to process the request.\r
- \r
+\r
@retval EFI_INVALID_PARAMETER The GUID in InputSection does\r
not match this instance of the\r
GUIDed Section Extraction PPI.\r
UINT32 ScratchBufferSize;\r
UINT32 OutputBufferSize;\r
UINT16 SectionAttribute;\r
- \r
+\r
//\r
// Init local variable\r
//\r
&ScratchBufferSize,\r
&SectionAttribute\r
);\r
- \r
+\r
if (EFI_ERROR (Status)) {\r
DEBUG ((DEBUG_ERROR, "GetInfo from guided section Failed - %r\n", Status));\r
return Status;\r
}\r
- \r
+\r
if (ScratchBufferSize != 0) {\r
//\r
// Allocate scratch buffer\r
}\r
}\r
\r
- if (((SectionAttribute & EFI_GUIDED_SECTION_PROCESSING_REQUIRED) != 0) && OutputBufferSize > 0) { \r
+ if (((SectionAttribute & EFI_GUIDED_SECTION_PROCESSING_REQUIRED) != 0) && OutputBufferSize > 0) {\r
//\r
// Allocate output buffer\r
//\r
}\r
DEBUG ((DEBUG_INFO, "Customized Guided section Memory Size required is 0x%x and address is 0x%p\n", OutputBufferSize, *OutputBuffer));\r
}\r
- \r
+\r
Status = ExtractGuidedSectionDecode (\r
- InputSection, \r
+ InputSection,\r
OutputBuffer,\r
ScratchBuffer,\r
AuthenticationStatus\r
DEBUG ((DEBUG_ERROR, "Extract guided section Failed - %r\n", Status));\r
return Status;\r
}\r
- \r
+\r
*OutputSize = (UINTN) OutputBufferSize;\r
- \r
+\r
return EFI_SUCCESS;\r
}\r
\r
This function looks up the compression type field in the input section and\r
applies the appropriate compression algorithm to compress the section to a\r
callee allocated buffer.\r
- \r
+\r
@param This Points to this instance of the\r
EFI_PEI_DECOMPRESS_PEI PPI.\r
@param CompressionSection Points to the compressed section.\r
sections.\r
@param OutputSize Holds the returned size of the decompress\r
section streams.\r
- \r
+\r
@retval EFI_SUCCESS The section was decompressed successfully.\r
OutputBuffer contains the resulting data and\r
OutputSize contains the resulting size.\r
\r
**/\r
EFI_STATUS\r
-EFIAPI \r
+EFIAPI\r
Decompress (\r
IN CONST EFI_PEI_DECOMPRESS_PPI *This,\r
IN CONST EFI_COMPRESSION_SECTION *CompressionSection,\r
UncompressedLength = CompressionSection->UncompressedLength;\r
CompressionType = CompressionSection->CompressionType;\r
}\r
- \r
+\r
//\r
// This is a compression set, expand it\r
//\r
while ((Hob.Raw = GetNextHob (EFI_HOB_TYPE_MEMORY_ALLOCATION, Hob.Raw)) != NULL) {\r
if (CompareGuid (&gEfiHobMemoryAllocStackGuid, &(Hob.MemoryAllocationStack->AllocDescriptor.Name))) {\r
//\r
- // Build a new memory allocation HOB with old stack info with EfiBootServicesData type. Need to \r
- // avoid this region be reclaimed by DXE core as the IDT built in SEC might be on stack, and some \r
+ // Build a new memory allocation HOB with old stack info with EfiBootServicesData type. Need to\r
+ // avoid this region be reclaimed by DXE core as the IDT built in SEC might be on stack, and some\r
// PEIMs may also keep key information on stack\r
//\r
BuildMemoryAllocationHob (\r