From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 521E281CE7 for ; Mon, 16 Jan 2017 23:08:55 -0800 (PST) Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga105.jf.intel.com with ESMTP; 16 Jan 2017 23:08:55 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.33,243,1477983600"; d="scan'208";a="1083871656" Received: from shwdeopenpsi068.ccr.corp.intel.com ([10.239.9.9]) by orsmga001.jf.intel.com with ESMTP; 16 Jan 2017 23:08:52 -0800 From: Star Zeng To: edk2-devel@lists.01.org Cc: Star Zeng , Maurice Ma , Prince Agyeman , Liming Gao , Michael Kinney Date: Tue, 17 Jan 2017 15:08:38 +0800 Message-Id: <1484636920-180432-6-git-send-email-star.zeng@intel.com> X-Mailer: git-send-email 2.7.0.windows.1 In-Reply-To: <1484636920-180432-1-git-send-email-star.zeng@intel.com> References: <1484636920-180432-1-git-send-email-star.zeng@intel.com> Subject: [PATCH 5/7] CorebootPayloadPkg: Use EfiEventGroupSignal from UefiLib X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Jan 2017 07:08:55 -0000 Use EfiEventGroupSignal from UefiLib and remove InternalBdsEmptyCallbackFuntion. REF: https://bugzilla.tianocore.org/show_bug.cgi?id=298 Cc: Maurice Ma Cc: Prince Agyeman Cc: Liming Gao Cc: Michael Kinney Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Star Zeng --- .../PlatformBootManagerLib/PlatformBootManager.c | 25 ++-------------------- 1 file changed, 2 insertions(+), 23 deletions(-) diff --git a/CorebootPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c b/CorebootPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c index 56be30f7a041..7e92441da11f 100644 --- a/CorebootPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c +++ b/CorebootPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c @@ -2,7 +2,7 @@ This file include all platform action which can be customized by IBV/OEM. -Copyright (c) 2015 - 2016, Intel Corporation. All rights reserved.
+Copyright (c) 2015 - 2017, Intel Corporation. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the BSD License which accompanies this distribution. The full text of the license may be found at @@ -17,16 +17,6 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. #include "PlatformConsole.h" VOID -EFIAPI -InternalBdsEmptyCallbackFuntion ( - IN EFI_EVENT Event, - IN VOID *Context - ) -{ - return; -} - -VOID InstallReadyToLock ( VOID ) @@ -34,24 +24,13 @@ InstallReadyToLock ( EFI_STATUS Status; EFI_HANDLE Handle; EFI_SMM_ACCESS2_PROTOCOL *SmmAccess; - EFI_EVENT EndOfDxeEvent; DEBUG((DEBUG_INFO,"InstallReadyToLock entering......\n")); // // Inform the SMM infrastructure that we're entering BDS and may run 3rd party code hereafter // Since PI1.2.1, we need signal EndOfDxe as ExitPmAuth // - Status = gBS->CreateEventEx ( - EVT_NOTIFY_SIGNAL, - TPL_CALLBACK, - InternalBdsEmptyCallbackFuntion, - NULL, - &gEfiEndOfDxeEventGroupGuid, - &EndOfDxeEvent - ); - ASSERT_EFI_ERROR (Status); - gBS->SignalEvent (EndOfDxeEvent); - gBS->CloseEvent (EndOfDxeEvent); + EfiEventGroupSignal (&gEfiEndOfDxeEventGroupGuid); DEBUG((DEBUG_INFO,"All EndOfDxe callbacks have returned successfully\n")); // -- 2.7.0.windows.1