Changeset 85718 in vbox for trunk/src/VBox/Devices/EFI/FirmwareNew/ShellPkg/Library/UefiShellLevel2CommandsLib/Load.c
- Timestamp:
- Aug 12, 2020 4:09:12 PM (5 years ago)
- svn:sync-xref-src-repo-rev:
- 139865
- Location:
- trunk/src/VBox/Devices/EFI/FirmwareNew
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/VBox/Devices/EFI/FirmwareNew
-
Property svn:mergeinfo
changed from (toggle deleted branches)
to (toggle deleted branches)/vendor/edk2/current 103735-103757,103769-103776,129194-133213 /vendor/edk2/current 103735-103757,103769-103776,129194-139864
-
Property svn:mergeinfo
changed from (toggle deleted branches)
-
trunk/src/VBox/Devices/EFI/FirmwareNew/ShellPkg/Library/UefiShellLevel2CommandsLib/Load.c
r80721 r85718 3 3 4 4 (C) Copyright 2015 Hewlett-Packard Development Company, L.P.<BR> 5 Copyright (c) 2009 - 201 8, Intel Corporation. All rights reserved.<BR>5 Copyright (c) 2009 - 2019, Intel Corporation. All rights reserved.<BR> 6 6 SPDX-License-Identifier: BSD-2-Clause-Patent 7 7 … … 113 113 114 114 if (EFI_ERROR(Status)) { 115 // 116 // With EFI_SECURITY_VIOLATION retval, the Image was loaded and an ImageHandle was created 117 // with a valid EFI_LOADED_IMAGE_PROTOCOL, but the image can not be started right now. 118 // If the caller doesn't have the option to defer the execution of an image, we should 119 // unload image for the EFI_SECURITY_VIOLATION to avoid resource leak. 120 // 121 if (Status == EFI_SECURITY_VIOLATION) { 122 gBS->UnloadImage (LoadedDriverHandle); 123 } 115 124 ShellPrintHiiEx(-1, -1, NULL, STRING_TOKEN (STR_LOAD_NOT_IMAGE), gShellLevel2HiiHandle, FileName, Status); 116 125 } else {
Note:
See TracChangeset
for help on using the changeset viewer.