MdeModulePkg: Apply uncrustify changes
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3737 Apply uncrustify changes to .c/.h files in the MdeModulePkg package Cc: Andrew Fish <afish@apple.com> Cc: Leif Lindholm <leif@nuviainc.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Signed-off-by: Michael Kubacki <michael.kubacki@microsoft.com> Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
This commit is contained in:
committed by
mergify[bot]
parent
7c7184e201
commit
1436aea4d5
@ -31,7 +31,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#include <Protocol/LockBox.h>
|
||||
#include <Guid/SmmLockBox.h>
|
||||
|
||||
BOOLEAN mLocked = FALSE;
|
||||
BOOLEAN mLocked = FALSE;
|
||||
|
||||
/**
|
||||
Dispatch function for SMM lock box save.
|
||||
@ -44,11 +44,11 @@ BOOLEAN mLocked = FALSE;
|
||||
**/
|
||||
VOID
|
||||
SmmLockBoxSave (
|
||||
IN EFI_SMM_LOCK_BOX_PARAMETER_SAVE *LockBoxParameterSave
|
||||
IN EFI_SMM_LOCK_BOX_PARAMETER_SAVE *LockBoxParameterSave
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_SMM_LOCK_BOX_PARAMETER_SAVE TempLockBoxParameterSave;
|
||||
EFI_STATUS Status;
|
||||
EFI_SMM_LOCK_BOX_PARAMETER_SAVE TempLockBoxParameterSave;
|
||||
|
||||
//
|
||||
// Sanity check
|
||||
@ -56,7 +56,7 @@ SmmLockBoxSave (
|
||||
if (mLocked) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Locked!\n"));
|
||||
LockBoxParameterSave->Header.ReturnStatus = (UINT64)EFI_ACCESS_DENIED;
|
||||
return ;
|
||||
return;
|
||||
}
|
||||
|
||||
CopyMem (&TempLockBoxParameterSave, LockBoxParameterSave, sizeof (EFI_SMM_LOCK_BOX_PARAMETER_SAVE));
|
||||
@ -67,8 +67,9 @@ SmmLockBoxSave (
|
||||
if (!SmmIsBufferOutsideSmmValid ((UINTN)TempLockBoxParameterSave.Buffer, (UINTN)TempLockBoxParameterSave.Length)) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Save address in SMRAM or buffer overflow!\n"));
|
||||
LockBoxParameterSave->Header.ReturnStatus = (UINT64)EFI_ACCESS_DENIED;
|
||||
return ;
|
||||
return;
|
||||
}
|
||||
|
||||
//
|
||||
// The SpeculationBarrier() call here is to ensure the above range check for
|
||||
// the CommBuffer have been completed before calling into SaveLockBox().
|
||||
@ -84,7 +85,7 @@ SmmLockBoxSave (
|
||||
(UINTN)TempLockBoxParameterSave.Length
|
||||
);
|
||||
LockBoxParameterSave->Header.ReturnStatus = (UINT64)Status;
|
||||
return ;
|
||||
return;
|
||||
}
|
||||
|
||||
/**
|
||||
@ -94,11 +95,11 @@ SmmLockBoxSave (
|
||||
**/
|
||||
VOID
|
||||
SmmLockBoxSetAttributes (
|
||||
IN EFI_SMM_LOCK_BOX_PARAMETER_SET_ATTRIBUTES *LockBoxParameterSetAttributes
|
||||
IN EFI_SMM_LOCK_BOX_PARAMETER_SET_ATTRIBUTES *LockBoxParameterSetAttributes
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_SMM_LOCK_BOX_PARAMETER_SET_ATTRIBUTES TempLockBoxParameterSetAttributes;
|
||||
EFI_STATUS Status;
|
||||
EFI_SMM_LOCK_BOX_PARAMETER_SET_ATTRIBUTES TempLockBoxParameterSetAttributes;
|
||||
|
||||
//
|
||||
// Sanity check
|
||||
@ -106,7 +107,7 @@ SmmLockBoxSetAttributes (
|
||||
if (mLocked) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Locked!\n"));
|
||||
LockBoxParameterSetAttributes->Header.ReturnStatus = (UINT64)EFI_ACCESS_DENIED;
|
||||
return ;
|
||||
return;
|
||||
}
|
||||
|
||||
CopyMem (&TempLockBoxParameterSetAttributes, LockBoxParameterSetAttributes, sizeof (EFI_SMM_LOCK_BOX_PARAMETER_SET_ATTRIBUTES));
|
||||
@ -119,7 +120,7 @@ SmmLockBoxSetAttributes (
|
||||
TempLockBoxParameterSetAttributes.Attributes
|
||||
);
|
||||
LockBoxParameterSetAttributes->Header.ReturnStatus = (UINT64)Status;
|
||||
return ;
|
||||
return;
|
||||
}
|
||||
|
||||
/**
|
||||
@ -133,11 +134,11 @@ SmmLockBoxSetAttributes (
|
||||
**/
|
||||
VOID
|
||||
SmmLockBoxUpdate (
|
||||
IN EFI_SMM_LOCK_BOX_PARAMETER_UPDATE *LockBoxParameterUpdate
|
||||
IN EFI_SMM_LOCK_BOX_PARAMETER_UPDATE *LockBoxParameterUpdate
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_SMM_LOCK_BOX_PARAMETER_UPDATE TempLockBoxParameterUpdate;
|
||||
EFI_STATUS Status;
|
||||
EFI_SMM_LOCK_BOX_PARAMETER_UPDATE TempLockBoxParameterUpdate;
|
||||
|
||||
//
|
||||
// Sanity check
|
||||
@ -145,7 +146,7 @@ SmmLockBoxUpdate (
|
||||
if (mLocked) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Locked!\n"));
|
||||
LockBoxParameterUpdate->Header.ReturnStatus = (UINT64)EFI_ACCESS_DENIED;
|
||||
return ;
|
||||
return;
|
||||
}
|
||||
|
||||
CopyMem (&TempLockBoxParameterUpdate, LockBoxParameterUpdate, sizeof (EFI_SMM_LOCK_BOX_PARAMETER_UPDATE));
|
||||
@ -156,8 +157,9 @@ SmmLockBoxUpdate (
|
||||
if (!SmmIsBufferOutsideSmmValid ((UINTN)TempLockBoxParameterUpdate.Buffer, (UINTN)TempLockBoxParameterUpdate.Length)) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Update address in SMRAM or buffer overflow!\n"));
|
||||
LockBoxParameterUpdate->Header.ReturnStatus = (UINT64)EFI_ACCESS_DENIED;
|
||||
return ;
|
||||
return;
|
||||
}
|
||||
|
||||
//
|
||||
// The SpeculationBarrier() call here is to ensure the above range check for
|
||||
// the CommBuffer have been completed before calling into UpdateLockBox().
|
||||
@ -174,7 +176,7 @@ SmmLockBoxUpdate (
|
||||
(UINTN)TempLockBoxParameterUpdate.Length
|
||||
);
|
||||
LockBoxParameterUpdate->Header.ReturnStatus = (UINT64)Status;
|
||||
return ;
|
||||
return;
|
||||
}
|
||||
|
||||
/**
|
||||
@ -188,11 +190,11 @@ SmmLockBoxUpdate (
|
||||
**/
|
||||
VOID
|
||||
SmmLockBoxRestore (
|
||||
IN EFI_SMM_LOCK_BOX_PARAMETER_RESTORE *LockBoxParameterRestore
|
||||
IN EFI_SMM_LOCK_BOX_PARAMETER_RESTORE *LockBoxParameterRestore
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_SMM_LOCK_BOX_PARAMETER_RESTORE TempLockBoxParameterRestore;
|
||||
EFI_STATUS Status;
|
||||
EFI_SMM_LOCK_BOX_PARAMETER_RESTORE TempLockBoxParameterRestore;
|
||||
|
||||
CopyMem (&TempLockBoxParameterRestore, LockBoxParameterRestore, sizeof (EFI_SMM_LOCK_BOX_PARAMETER_RESTORE));
|
||||
|
||||
@ -202,7 +204,7 @@ SmmLockBoxRestore (
|
||||
if (!SmmIsBufferOutsideSmmValid ((UINTN)TempLockBoxParameterRestore.Buffer, (UINTN)TempLockBoxParameterRestore.Length)) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Restore address in SMRAM or buffer overflow!\n"));
|
||||
LockBoxParameterRestore->Header.ReturnStatus = (UINT64)EFI_ACCESS_DENIED;
|
||||
return ;
|
||||
return;
|
||||
}
|
||||
|
||||
//
|
||||
@ -227,8 +229,9 @@ SmmLockBoxRestore (
|
||||
LockBoxParameterRestore->Length = TempLockBoxParameterRestore.Length;
|
||||
}
|
||||
}
|
||||
|
||||
LockBoxParameterRestore->Header.ReturnStatus = (UINT64)Status;
|
||||
return ;
|
||||
return;
|
||||
}
|
||||
|
||||
/**
|
||||
@ -238,14 +241,14 @@ SmmLockBoxRestore (
|
||||
**/
|
||||
VOID
|
||||
SmmLockBoxRestoreAllInPlace (
|
||||
IN EFI_SMM_LOCK_BOX_PARAMETER_RESTORE_ALL_IN_PLACE *LockBoxParameterRestoreAllInPlace
|
||||
IN EFI_SMM_LOCK_BOX_PARAMETER_RESTORE_ALL_IN_PLACE *LockBoxParameterRestoreAllInPlace
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_STATUS Status;
|
||||
|
||||
Status = RestoreAllLockBoxInPlace ();
|
||||
Status = RestoreAllLockBoxInPlace ();
|
||||
LockBoxParameterRestoreAllInPlace->Header.ReturnStatus = (UINT64)Status;
|
||||
return ;
|
||||
return;
|
||||
}
|
||||
|
||||
/**
|
||||
@ -273,15 +276,15 @@ SmmLockBoxHandler (
|
||||
IN OUT UINTN *CommBufferSize OPTIONAL
|
||||
)
|
||||
{
|
||||
EFI_SMM_LOCK_BOX_PARAMETER_HEADER *LockBoxParameterHeader;
|
||||
UINTN TempCommBufferSize;
|
||||
EFI_SMM_LOCK_BOX_PARAMETER_HEADER *LockBoxParameterHeader;
|
||||
UINTN TempCommBufferSize;
|
||||
|
||||
DEBUG ((DEBUG_INFO, "SmmLockBox SmmLockBoxHandler Enter\n"));
|
||||
|
||||
//
|
||||
// If input is invalid, stop processing this SMI
|
||||
//
|
||||
if (CommBuffer == NULL || CommBufferSize == NULL) {
|
||||
if ((CommBuffer == NULL) || (CommBufferSize == NULL)) {
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
@ -290,10 +293,11 @@ SmmLockBoxHandler (
|
||||
//
|
||||
// Sanity check
|
||||
//
|
||||
if (TempCommBufferSize < sizeof(EFI_SMM_LOCK_BOX_PARAMETER_HEADER)) {
|
||||
if (TempCommBufferSize < sizeof (EFI_SMM_LOCK_BOX_PARAMETER_HEADER)) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Command Buffer Size invalid!\n"));
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
if (!SmmIsBufferOutsideSmmValid ((UINTN)CommBuffer, TempCommBufferSize)) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Command Buffer in SMRAM or overflow!\n"));
|
||||
return EFI_SUCCESS;
|
||||
@ -308,44 +312,49 @@ SmmLockBoxHandler (
|
||||
DEBUG ((DEBUG_INFO, "SmmLockBox Command - %x\n", (UINTN)LockBoxParameterHeader->Command));
|
||||
|
||||
switch (LockBoxParameterHeader->Command) {
|
||||
case EFI_SMM_LOCK_BOX_COMMAND_SAVE:
|
||||
if (TempCommBufferSize < sizeof(EFI_SMM_LOCK_BOX_PARAMETER_SAVE)) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Command Buffer Size for SAVE invalid!\n"));
|
||||
case EFI_SMM_LOCK_BOX_COMMAND_SAVE:
|
||||
if (TempCommBufferSize < sizeof (EFI_SMM_LOCK_BOX_PARAMETER_SAVE)) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Command Buffer Size for SAVE invalid!\n"));
|
||||
break;
|
||||
}
|
||||
|
||||
SmmLockBoxSave ((EFI_SMM_LOCK_BOX_PARAMETER_SAVE *)(UINTN)LockBoxParameterHeader);
|
||||
break;
|
||||
}
|
||||
SmmLockBoxSave ((EFI_SMM_LOCK_BOX_PARAMETER_SAVE *)(UINTN)LockBoxParameterHeader);
|
||||
break;
|
||||
case EFI_SMM_LOCK_BOX_COMMAND_UPDATE:
|
||||
if (TempCommBufferSize < sizeof(EFI_SMM_LOCK_BOX_PARAMETER_UPDATE)) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Command Buffer Size for UPDATE invalid!\n"));
|
||||
case EFI_SMM_LOCK_BOX_COMMAND_UPDATE:
|
||||
if (TempCommBufferSize < sizeof (EFI_SMM_LOCK_BOX_PARAMETER_UPDATE)) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Command Buffer Size for UPDATE invalid!\n"));
|
||||
break;
|
||||
}
|
||||
|
||||
SmmLockBoxUpdate ((EFI_SMM_LOCK_BOX_PARAMETER_UPDATE *)(UINTN)LockBoxParameterHeader);
|
||||
break;
|
||||
}
|
||||
SmmLockBoxUpdate ((EFI_SMM_LOCK_BOX_PARAMETER_UPDATE *)(UINTN)LockBoxParameterHeader);
|
||||
break;
|
||||
case EFI_SMM_LOCK_BOX_COMMAND_RESTORE:
|
||||
if (TempCommBufferSize < sizeof(EFI_SMM_LOCK_BOX_PARAMETER_RESTORE)) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Command Buffer Size for RESTORE invalid!\n"));
|
||||
case EFI_SMM_LOCK_BOX_COMMAND_RESTORE:
|
||||
if (TempCommBufferSize < sizeof (EFI_SMM_LOCK_BOX_PARAMETER_RESTORE)) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Command Buffer Size for RESTORE invalid!\n"));
|
||||
break;
|
||||
}
|
||||
|
||||
SmmLockBoxRestore ((EFI_SMM_LOCK_BOX_PARAMETER_RESTORE *)(UINTN)LockBoxParameterHeader);
|
||||
break;
|
||||
}
|
||||
SmmLockBoxRestore ((EFI_SMM_LOCK_BOX_PARAMETER_RESTORE *)(UINTN)LockBoxParameterHeader);
|
||||
break;
|
||||
case EFI_SMM_LOCK_BOX_COMMAND_SET_ATTRIBUTES:
|
||||
if (TempCommBufferSize < sizeof(EFI_SMM_LOCK_BOX_PARAMETER_SET_ATTRIBUTES)) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Command Buffer Size for SET_ATTRIBUTES invalid!\n"));
|
||||
case EFI_SMM_LOCK_BOX_COMMAND_SET_ATTRIBUTES:
|
||||
if (TempCommBufferSize < sizeof (EFI_SMM_LOCK_BOX_PARAMETER_SET_ATTRIBUTES)) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Command Buffer Size for SET_ATTRIBUTES invalid!\n"));
|
||||
break;
|
||||
}
|
||||
|
||||
SmmLockBoxSetAttributes ((EFI_SMM_LOCK_BOX_PARAMETER_SET_ATTRIBUTES *)(UINTN)LockBoxParameterHeader);
|
||||
break;
|
||||
}
|
||||
SmmLockBoxSetAttributes ((EFI_SMM_LOCK_BOX_PARAMETER_SET_ATTRIBUTES *)(UINTN)LockBoxParameterHeader);
|
||||
break;
|
||||
case EFI_SMM_LOCK_BOX_COMMAND_RESTORE_ALL_IN_PLACE:
|
||||
if (TempCommBufferSize < sizeof(EFI_SMM_LOCK_BOX_PARAMETER_RESTORE_ALL_IN_PLACE)) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Command Buffer Size for RESTORE_ALL_IN_PLACE invalid!\n"));
|
||||
case EFI_SMM_LOCK_BOX_COMMAND_RESTORE_ALL_IN_PLACE:
|
||||
if (TempCommBufferSize < sizeof (EFI_SMM_LOCK_BOX_PARAMETER_RESTORE_ALL_IN_PLACE)) {
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Command Buffer Size for RESTORE_ALL_IN_PLACE invalid!\n"));
|
||||
break;
|
||||
}
|
||||
|
||||
SmmLockBoxRestoreAllInPlace ((EFI_SMM_LOCK_BOX_PARAMETER_RESTORE_ALL_IN_PLACE *)(UINTN)LockBoxParameterHeader);
|
||||
break;
|
||||
default:
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Command invalid!\n"));
|
||||
break;
|
||||
}
|
||||
SmmLockBoxRestoreAllInPlace ((EFI_SMM_LOCK_BOX_PARAMETER_RESTORE_ALL_IN_PLACE *)(UINTN)LockBoxParameterHeader);
|
||||
break;
|
||||
default:
|
||||
DEBUG ((DEBUG_ERROR, "SmmLockBox Command invalid!\n"));
|
||||
break;
|
||||
}
|
||||
|
||||
LockBoxParameterHeader->Command = (UINT32)-1;
|
||||
@ -394,9 +403,9 @@ SmmLockBoxEntryPoint (
|
||||
IN EFI_SYSTEM_TABLE *SystemTable
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_HANDLE DispatchHandle;
|
||||
VOID *Registration;
|
||||
EFI_STATUS Status;
|
||||
EFI_HANDLE DispatchHandle;
|
||||
VOID *Registration;
|
||||
|
||||
//
|
||||
// Register LockBox communication handler
|
||||
@ -422,12 +431,12 @@ SmmLockBoxEntryPoint (
|
||||
// Install NULL to DXE data base as notify
|
||||
//
|
||||
ImageHandle = NULL;
|
||||
Status = gBS->InstallProtocolInterface (
|
||||
&ImageHandle,
|
||||
&gEfiLockBoxProtocolGuid,
|
||||
EFI_NATIVE_INTERFACE,
|
||||
NULL
|
||||
);
|
||||
Status = gBS->InstallProtocolInterface (
|
||||
&ImageHandle,
|
||||
&gEfiLockBoxProtocolGuid,
|
||||
EFI_NATIVE_INTERFACE,
|
||||
NULL
|
||||
);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
|
||||
return Status;
|
||||
|
Reference in New Issue
Block a user