From dc857d5641883b98e4f73c9da6fb131d43962bb8 Mon Sep 17 00:00:00 2001 From: klu2 Date: Fri, 8 Aug 2008 01:37:44 +0000 Subject: [PATCH] correct comments git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@5616 6f19259b-4bc3-4df7-8a09-765794883524 --- MdeModulePkg/Core/Pei/BootMode/BootMode.c | 8 ++++---- MdeModulePkg/Core/Pei/Reset/Reset.c | 2 +- MdeModulePkg/Core/Pei/Security/Security.c | 18 +++++++++--------- 3 files changed, 14 insertions(+), 14 deletions(-) diff --git a/MdeModulePkg/Core/Pei/BootMode/BootMode.c b/MdeModulePkg/Core/Pei/BootMode/BootMode.c index eac541d574..8c38fa8dc6 100644 --- a/MdeModulePkg/Core/Pei/BootMode/BootMode.c +++ b/MdeModulePkg/Core/Pei/BootMode/BootMode.c @@ -21,7 +21,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. /** This service enables PEIMs to ascertain the present value of the boot mode. - @param PeiServices The PEI core services table. + @param PeiServices An indirect pointer to the EFI_PEI_SERVICES table published by the PEI Foundation. @param BootMode A pointer to contain the value of the boot mode. @retval EFI_SUCCESS The boot mode was returned successfully. @@ -58,10 +58,10 @@ PeiGetBootMode ( This service enables PEIMs to update the boot mode variable. - @param PeiServices - The PEI core services table. - @param BootMode - The value of the boot mode to set. + @param PeiServices An indirect pointer to the EFI_PEI_SERVICES table published by the PEI Foundation. + @param BootMode The value of the boot mode to set. - @return EFI_SUCCESS - The value was successfully updated + @return EFI_SUCCESS The value was successfully updated **/ EFI_STATUS diff --git a/MdeModulePkg/Core/Pei/Reset/Reset.c b/MdeModulePkg/Core/Pei/Reset/Reset.c index f71a23375f..0bd016b8d4 100644 --- a/MdeModulePkg/Core/Pei/Reset/Reset.c +++ b/MdeModulePkg/Core/Pei/Reset/Reset.c @@ -19,7 +19,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. Core version of the Reset System - @param PeiServices - The PEI core services table. + @param PeiServices An indirect pointer to the EFI_PEI_SERVICES table published by the PEI Foundation. @retval EFI_NOT_AVAILABLE_YET PPI not available yet. @retval EFI_DEVICE_ERROR Did not reset system. diff --git a/MdeModulePkg/Core/Pei/Security/Security.c b/MdeModulePkg/Core/Pei/Security/Security.c index b7cc10058e..7460707a27 100644 --- a/MdeModulePkg/Core/Pei/Security/Security.c +++ b/MdeModulePkg/Core/Pei/Security/Security.c @@ -18,9 +18,9 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. Provide a callback for when the security PPI is installed. - @param PeiServices - The PEI core services table. - @param NotifyDescriptor - The descriptor for the notification event. - @param Ppi - Pointer to the PPI in question. + @param PeiServices An indirect pointer to the EFI_PEI_SERVICES table published by the PEI Foundation. + @param NotifyDescriptor The descriptor for the notification event. + @param Ppi Pointer to the PPI in question. @return Always success @@ -42,7 +42,7 @@ STATIC EFI_PEI_NOTIFY_DESCRIPTOR mNotifyList = { /** Initialize the security services. - @param PeiServices The PEI core services table. + @param PeiServices An indirect pointer to the EFI_PEI_SERVICES table published by the PEI Foundation. @param OldCoreData Pointer to the old core data. NULL if being run in non-permament memory mode. @@ -63,9 +63,9 @@ InitializeSecurityServices ( Provide a callback for when the security PPI is installed. - @param PeiServices - The PEI core services table. - @param NotifyDescriptor - The descriptor for the notification event. - @param Ppi - Pointer to the PPI in question. + @param PeiServices An indirect pointer to the EFI_PEI_SERVICES table published by the PEI Foundation. + @param NotifyDescriptor The descriptor for the notification event. + @param Ppi Pointer to the PPI in question. @return Always success @@ -150,8 +150,8 @@ VerifyPeim ( @param CurrentFvAddress - Pointer to the current Firmware Volume under consideration - @retval EFI_SUCCESS - Firmware Volume is legal - @retval EFI_SECURITY_VIOLATION - Firmware Volume fails integrity test + @retval EFI_SUCCESS Firmware Volume is legal + @retval EFI_SECURITY_VIOLATION Firmware Volume fails integrity test **/ EFI_STATUS -- 2.39.2