]> git.proxmox.com Git - mirror_edk2.git/blobdiff - MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmm.c
MdeModulePkg: Apply uncrustify changes
[mirror_edk2.git] / MdeModulePkg / Universal / Variable / RuntimeDxe / VariableSmm.c
index 1ee6d2194e2014003d11dbb8032aa236b5bf2afc..517cae7b00f8e256adcbc80a5e37e10acab254f7 100644 (file)
@@ -34,11 +34,11 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
 #include "VariableParsing.h"\r
 #include "VariableRuntimeCache.h"\r
 \r
-extern VARIABLE_STORE_HEADER                         *mNvVariableCache;\r
+extern VARIABLE_STORE_HEADER  *mNvVariableCache;\r
 \r
-BOOLEAN                                              mAtRuntime              = FALSE;\r
-UINT8                                                *mVariableBufferPayload = NULL;\r
-UINTN                                                mVariableBufferPayloadSize;\r
+BOOLEAN  mAtRuntime              = FALSE;\r
+UINT8    *mVariableBufferPayload = NULL;\r
+UINTN    mVariableBufferPayloadSize;\r
 \r
 /**\r
   SecureBoot Hook for SetVariable.\r
@@ -50,11 +50,11 @@ UINTN                                                mVariableBufferPayloadSize;
 VOID\r
 EFIAPI\r
 SecureBootHook (\r
-  IN CHAR16                                 *VariableName,\r
-  IN EFI_GUID                               *VendorGuid\r
+  IN CHAR16    *VariableName,\r
+  IN EFI_GUID  *VendorGuid\r
   )\r
 {\r
-  return ;\r
+  return;\r
 }\r
 \r
 /**\r
@@ -78,14 +78,14 @@ SecureBootHook (
 EFI_STATUS\r
 EFIAPI\r
 SmmVariableSetVariable (\r
-  IN CHAR16                  *VariableName,\r
-  IN EFI_GUID                *VendorGuid,\r
-  IN UINT32                  Attributes,\r
-  IN UINTN                   DataSize,\r
-  IN VOID                    *Data\r
+  IN CHAR16    *VariableName,\r
+  IN EFI_GUID  *VendorGuid,\r
+  IN UINT32    Attributes,\r
+  IN UINTN     DataSize,\r
+  IN VOID      *Data\r
   )\r
 {\r
-  EFI_STATUS                 Status;\r
+  EFI_STATUS  Status;\r
 \r
   //\r
   // Disable write protection when the calling SetVariable() through EFI_SMM_VARIABLE_PROTOCOL.\r
@@ -102,16 +102,18 @@ SmmVariableSetVariable (
   return Status;\r
 }\r
 \r
-EFI_SMM_VARIABLE_PROTOCOL      gSmmVariable = {\r
+EFI_SMM_VARIABLE_PROTOCOL  gSmmVariable = {\r
   VariableServiceGetVariable,\r
   VariableServiceGetNextVariableName,\r
   SmmVariableSetVariable,\r
   VariableServiceQueryVariableInfo\r
 };\r
 \r
-EDKII_SMM_VAR_CHECK_PROTOCOL mSmmVarCheck = { VarCheckRegisterSetVariableCheckHandler,\r
-                                              VarCheckVariablePropertySet,\r
-                                              VarCheckVariablePropertyGet };\r
+EDKII_SMM_VAR_CHECK_PROTOCOL  mSmmVarCheck = {\r
+  VarCheckRegisterSetVariableCheckHandler,\r
+  VarCheckVariablePropertySet,\r
+  VarCheckVariablePropertyGet\r
+};\r
 \r
 /**\r
   Return TRUE if ExitBootServices () has been called.\r
@@ -144,8 +146,8 @@ AtRuntime (
 **/\r
 EFI_LOCK *\r
 InitializeLock (\r
-  IN OUT EFI_LOCK                         *Lock,\r
-  IN EFI_TPL                              Priority\r
+  IN OUT EFI_LOCK  *Lock,\r
+  IN EFI_TPL       Priority\r
   )\r
 {\r
   return Lock;\r
@@ -165,13 +167,11 @@ InitializeLock (
 **/\r
 VOID\r
 AcquireLockOnlyAtBootTime (\r
-  IN EFI_LOCK                             *Lock\r
+  IN EFI_LOCK  *Lock\r
   )\r
 {\r
-\r
 }\r
 \r
-\r
 /**\r
   Releases lock only at boot time. Simply returns at runtime.\r
 \r
@@ -186,10 +186,9 @@ AcquireLockOnlyAtBootTime (
 **/\r
 VOID\r
 ReleaseLockOnlyAtBootTime (\r
-  IN EFI_LOCK                             *Lock\r
+  IN EFI_LOCK  *Lock\r
   )\r
 {\r
-\r
 }\r
 \r
 /**\r
@@ -204,10 +203,10 @@ ReleaseLockOnlyAtBootTime (
 **/\r
 EFI_STATUS\r
 GetFtwProtocol (\r
-  OUT VOID                                **FtwProtocol\r
+  OUT VOID  **FtwProtocol\r
   )\r
 {\r
-  EFI_STATUS                              Status;\r
+  EFI_STATUS  Status;\r
 \r
   //\r
   // Locate Smm Fault Tolerent Write protocol\r
@@ -220,7 +219,6 @@ GetFtwProtocol (
   return Status;\r
 }\r
 \r
-\r
 /**\r
   Retrieve the SMM FVB protocol interface by HANDLE.\r
 \r
@@ -245,11 +243,10 @@ GetFvbByHandle (
   return gMmst->MmHandleProtocol (\r
                   FvBlockHandle,\r
                   &gEfiSmmFirmwareVolumeBlockProtocolGuid,\r
-                  (VOID **) FvBlock\r
+                  (VOID **)FvBlock\r
                   );\r
 }\r
 \r
-\r
 /**\r
   Function returns an array of handles that support the SMM FVB protocol\r
   in a buffer allocated from pool.\r
@@ -267,12 +264,12 @@ GetFvbByHandle (
 **/\r
 EFI_STATUS\r
 GetFvbCountAndBuffer (\r
-  OUT UINTN                               *NumberHandles,\r
-  OUT EFI_HANDLE                          **Buffer\r
+  OUT UINTN       *NumberHandles,\r
+  OUT EFI_HANDLE  **Buffer\r
   )\r
 {\r
-  EFI_STATUS                              Status;\r
-  UINTN                                   BufferSize;\r
+  EFI_STATUS  Status;\r
+  UINTN       BufferSize;\r
 \r
   if ((NumberHandles == NULL) || (Buffer == NULL)) {\r
     return EFI_INVALID_PARAMETER;\r
@@ -281,14 +278,14 @@ GetFvbCountAndBuffer (
   BufferSize     = 0;\r
   *NumberHandles = 0;\r
   *Buffer        = NULL;\r
-  Status = gMmst->MmLocateHandle (\r
-                    ByProtocol,\r
-                    &gEfiSmmFirmwareVolumeBlockProtocolGuid,\r
-                    NULL,\r
-                    &BufferSize,\r
-                    *Buffer\r
-                    );\r
-  if (EFI_ERROR(Status) && Status != EFI_BUFFER_TOO_SMALL) {\r
+  Status         = gMmst->MmLocateHandle (\r
+                            ByProtocol,\r
+                            &gEfiSmmFirmwareVolumeBlockProtocolGuid,\r
+                            NULL,\r
+                            &BufferSize,\r
+                            *Buffer\r
+                            );\r
+  if (EFI_ERROR (Status) && (Status != EFI_BUFFER_TOO_SMALL)) {\r
     return EFI_NOT_FOUND;\r
   }\r
 \r
@@ -305,8 +302,8 @@ GetFvbCountAndBuffer (
                     *Buffer\r
                     );\r
 \r
-  *NumberHandles = BufferSize / sizeof(EFI_HANDLE);\r
-  if (EFI_ERROR(Status)) {\r
+  *NumberHandles = BufferSize / sizeof (EFI_HANDLE);\r
+  if (EFI_ERROR (Status)) {\r
     *NumberHandles = 0;\r
     FreePool (*Buffer);\r
     *Buffer = NULL;\r
@@ -315,7 +312,6 @@ GetFvbCountAndBuffer (
   return Status;\r
 }\r
 \r
-\r
 /**\r
   Get the variable statistics information from the information buffer pointed by gVariableInfo.\r
 \r
@@ -338,16 +334,16 @@ GetFvbCountAndBuffer (
 **/\r
 EFI_STATUS\r
 SmmVariableGetStatistics (\r
-  IN OUT VARIABLE_INFO_ENTRY                           *InfoEntry,\r
-  IN OUT UINTN                                         *InfoSize\r
+  IN OUT VARIABLE_INFO_ENTRY  *InfoEntry,\r
+  IN OUT UINTN                *InfoSize\r
   )\r
 {\r
-  VARIABLE_INFO_ENTRY                                  *VariableInfo;\r
-  UINTN                                                NameSize;\r
-  UINTN                                                StatisticsInfoSize;\r
-  CHAR16                                               *InfoName;\r
-  UINTN                                                InfoNameMaxSize;\r
-  EFI_GUID                                             VendorGuid;\r
+  VARIABLE_INFO_ENTRY  *VariableInfo;\r
+  UINTN                NameSize;\r
+  UINTN                StatisticsInfoSize;\r
+  CHAR16               *InfoName;\r
+  UINTN                InfoNameMaxSize;\r
+  EFI_GUID             VendorGuid;\r
 \r
   if (InfoEntry == NULL) {\r
     return EFI_INVALID_PARAMETER;\r
@@ -363,7 +359,8 @@ SmmVariableGetStatistics (
     *InfoSize = StatisticsInfoSize;\r
     return EFI_BUFFER_TOO_SMALL;\r
   }\r
-  InfoName = (CHAR16 *)(InfoEntry + 1);\r
+\r
+  InfoName        = (CHAR16 *)(InfoEntry + 1);\r
   InfoNameMaxSize = (*InfoSize - sizeof (VARIABLE_INFO_ENTRY));\r
 \r
   CopyGuid (&VendorGuid, &InfoEntry->VendorGuid);\r
@@ -372,12 +369,13 @@ SmmVariableGetStatistics (
     //\r
     // Return the first variable info\r
     //\r
-    NameSize = StrSize (VariableInfo->Name);\r
+    NameSize           = StrSize (VariableInfo->Name);\r
     StatisticsInfoSize = sizeof (VARIABLE_INFO_ENTRY) + NameSize;\r
     if (*InfoSize < StatisticsInfoSize) {\r
       *InfoSize = StatisticsInfoSize;\r
       return EFI_BUFFER_TOO_SMALL;\r
     }\r
+\r
     CopyMem (InfoEntry, VariableInfo, sizeof (VARIABLE_INFO_ENTRY));\r
     CopyMem (InfoName, VariableInfo->Name, NameSize);\r
     *InfoSize = StatisticsInfoSize;\r
@@ -400,8 +398,9 @@ SmmVariableGetStatistics (
         }\r
       }\r
     }\r
+\r
     VariableInfo = VariableInfo->Next;\r
-  };\r
+  }\r
 \r
   if (VariableInfo == NULL) {\r
     *InfoSize = 0;\r
@@ -411,7 +410,7 @@ SmmVariableGetStatistics (
   //\r
   // Output the new variable info\r
   //\r
-  NameSize = StrSize (VariableInfo->Name);\r
+  NameSize           = StrSize (VariableInfo->Name);\r
   StatisticsInfoSize = sizeof (VARIABLE_INFO_ENTRY) + NameSize;\r
   if (*InfoSize < StatisticsInfoSize) {\r
     *InfoSize = StatisticsInfoSize;\r
@@ -425,7 +424,6 @@ SmmVariableGetStatistics (
   return EFI_SUCCESS;\r
 }\r
 \r
-\r
 /**\r
   Communication service SMI Handler entry.\r
 \r
@@ -455,34 +453,34 @@ SmmVariableGetStatistics (
 EFI_STATUS\r
 EFIAPI\r
 SmmVariableHandler (\r
-  IN     EFI_HANDLE                                       DispatchHandle,\r
-  IN     CONST VOID                                       *RegisterContext,\r
-  IN OUT VOID                                             *CommBuffer,\r
-  IN OUT UINTN                                            *CommBufferSize\r
+  IN     EFI_HANDLE  DispatchHandle,\r
+  IN     CONST VOID  *RegisterContext,\r
+  IN OUT VOID        *CommBuffer,\r
+  IN OUT UINTN       *CommBufferSize\r
   )\r
 {\r
-  EFI_STATUS                                              Status;\r
-  SMM_VARIABLE_COMMUNICATE_HEADER                         *SmmVariableFunctionHeader;\r
-  SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE                *SmmVariableHeader;\r
-  SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME         *GetNextVariableName;\r
-  SMM_VARIABLE_COMMUNICATE_QUERY_VARIABLE_INFO            *QueryVariableInfo;\r
-  SMM_VARIABLE_COMMUNICATE_GET_PAYLOAD_SIZE               *GetPayloadSize;\r
-  SMM_VARIABLE_COMMUNICATE_RUNTIME_VARIABLE_CACHE_CONTEXT *RuntimeVariableCacheContext;\r
-  SMM_VARIABLE_COMMUNICATE_GET_RUNTIME_CACHE_INFO         *GetRuntimeCacheInfo;\r
-  SMM_VARIABLE_COMMUNICATE_LOCK_VARIABLE                  *VariableToLock;\r
-  SMM_VARIABLE_COMMUNICATE_VAR_CHECK_VARIABLE_PROPERTY    *CommVariableProperty;\r
-  VARIABLE_INFO_ENTRY                                     *VariableInfo;\r
-  VARIABLE_RUNTIME_CACHE_CONTEXT                          *VariableCacheContext;\r
-  VARIABLE_STORE_HEADER                                   *VariableCache;\r
-  UINTN                                                   InfoSize;\r
-  UINTN                                                   NameBufferSize;\r
-  UINTN                                                   CommBufferPayloadSize;\r
-  UINTN                                                   TempCommBufferSize;\r
+  EFI_STATUS                                               Status;\r
+  SMM_VARIABLE_COMMUNICATE_HEADER                          *SmmVariableFunctionHeader;\r
+  SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE                 *SmmVariableHeader;\r
+  SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME          *GetNextVariableName;\r
+  SMM_VARIABLE_COMMUNICATE_QUERY_VARIABLE_INFO             *QueryVariableInfo;\r
+  SMM_VARIABLE_COMMUNICATE_GET_PAYLOAD_SIZE                *GetPayloadSize;\r
+  SMM_VARIABLE_COMMUNICATE_RUNTIME_VARIABLE_CACHE_CONTEXT  *RuntimeVariableCacheContext;\r
+  SMM_VARIABLE_COMMUNICATE_GET_RUNTIME_CACHE_INFO          *GetRuntimeCacheInfo;\r
+  SMM_VARIABLE_COMMUNICATE_LOCK_VARIABLE                   *VariableToLock;\r
+  SMM_VARIABLE_COMMUNICATE_VAR_CHECK_VARIABLE_PROPERTY     *CommVariableProperty;\r
+  VARIABLE_INFO_ENTRY                                      *VariableInfo;\r
+  VARIABLE_RUNTIME_CACHE_CONTEXT                           *VariableCacheContext;\r
+  VARIABLE_STORE_HEADER                                    *VariableCache;\r
+  UINTN                                                    InfoSize;\r
+  UINTN                                                    NameBufferSize;\r
+  UINTN                                                    CommBufferPayloadSize;\r
+  UINTN                                                    TempCommBufferSize;\r
 \r
   //\r
   // If input is invalid, stop processing this SMI\r
   //\r
-  if (CommBuffer == NULL || CommBufferSize == NULL) {\r
+  if ((CommBuffer == NULL) || (CommBufferSize == NULL)) {\r
     return EFI_SUCCESS;\r
   }\r
 \r
@@ -492,6 +490,7 @@ SmmVariableHandler (
     DEBUG ((DEBUG_ERROR, "SmmVariableHandler: SMM communication buffer size invalid!\n"));\r
     return EFI_SUCCESS;\r
   }\r
+\r
   CommBufferPayloadSize = TempCommBufferSize - SMM_VARIABLE_COMMUNICATE_HEADER_SIZE;\r
   if (CommBufferPayloadSize > mVariableBufferPayloadSize) {\r
     DEBUG ((DEBUG_ERROR, "SmmVariableHandler: SMM communication buffer payload size invalid!\n"));\r
@@ -506,24 +505,27 @@ SmmVariableHandler (
   SmmVariableFunctionHeader = (SMM_VARIABLE_COMMUNICATE_HEADER *)CommBuffer;\r
   switch (SmmVariableFunctionHeader->Function) {\r
     case SMM_VARIABLE_FUNCTION_GET_VARIABLE:\r
-      if (CommBufferPayloadSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)) {\r
+      if (CommBufferPayloadSize < OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)) {\r
         DEBUG ((DEBUG_ERROR, "GetVariable: SMM communication buffer size invalid!\n"));\r
         return EFI_SUCCESS;\r
       }\r
+\r
       //\r
       // Copy the input communicate buffer payload to pre-allocated SMM variable buffer payload.\r
       //\r
       CopyMem (mVariableBufferPayload, SmmVariableFunctionHeader->Data, CommBufferPayloadSize);\r
-      SmmVariableHeader = (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *) mVariableBufferPayload;\r
-      if (((UINTN)(~0) - SmmVariableHeader->DataSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)) ||\r
-         ((UINTN)(~0) - SmmVariableHeader->NameSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + SmmVariableHeader->DataSize)) {\r
+      SmmVariableHeader = (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *)mVariableBufferPayload;\r
+      if (((UINTN)(~0) - SmmVariableHeader->DataSize < OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)) ||\r
+          ((UINTN)(~0) - SmmVariableHeader->NameSize < OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + SmmVariableHeader->DataSize))\r
+      {\r
         //\r
         // Prevent InfoSize overflow happen\r
         //\r
         Status = EFI_ACCESS_DENIED;\r
         goto EXIT;\r
       }\r
-      InfoSize = OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)\r
+\r
+      InfoSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)\r
                  + SmmVariableHeader->DataSize + SmmVariableHeader->NameSize;\r
 \r
       //\r
@@ -541,7 +543,7 @@ SmmVariableHandler (
       // subsequent consumption of the CommBuffer content.\r
       //\r
       VariableSpeculationBarrier ();\r
-      if (SmmVariableHeader->NameSize < sizeof (CHAR16) || SmmVariableHeader->Name[SmmVariableHeader->NameSize/sizeof (CHAR16) - 1] != L'\0') {\r
+      if ((SmmVariableHeader->NameSize < sizeof (CHAR16)) || (SmmVariableHeader->Name[SmmVariableHeader->NameSize/sizeof (CHAR16) - 1] != L'\0')) {\r
         //\r
         // Make sure VariableName is A Null-terminated string.\r
         //\r
@@ -560,23 +562,25 @@ SmmVariableHandler (
       break;\r
 \r
     case SMM_VARIABLE_FUNCTION_GET_NEXT_VARIABLE_NAME:\r
-      if (CommBufferPayloadSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name)) {\r
+      if (CommBufferPayloadSize < OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name)) {\r
         DEBUG ((DEBUG_ERROR, "GetNextVariableName: SMM communication buffer size invalid!\n"));\r
         return EFI_SUCCESS;\r
       }\r
+\r
       //\r
       // Copy the input communicate buffer payload to pre-allocated SMM variable buffer payload.\r
       //\r
       CopyMem (mVariableBufferPayload, SmmVariableFunctionHeader->Data, CommBufferPayloadSize);\r
-      GetNextVariableName = (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME *) mVariableBufferPayload;\r
-      if ((UINTN)(~0) - GetNextVariableName->NameSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name)) {\r
+      GetNextVariableName = (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME *)mVariableBufferPayload;\r
+      if ((UINTN)(~0) - GetNextVariableName->NameSize < OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name)) {\r
         //\r
         // Prevent InfoSize overflow happen\r
         //\r
         Status = EFI_ACCESS_DENIED;\r
         goto EXIT;\r
       }\r
-      InfoSize = OFFSET_OF(SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name) + GetNextVariableName->NameSize;\r
+\r
+      InfoSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name) + GetNextVariableName->NameSize;\r
 \r
       //\r
       // SMRAM range check already covered before\r
@@ -587,8 +591,8 @@ SmmVariableHandler (
         goto EXIT;\r
       }\r
 \r
-      NameBufferSize = CommBufferPayloadSize - OFFSET_OF(SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name);\r
-      if (NameBufferSize < sizeof (CHAR16) || GetNextVariableName->Name[NameBufferSize/sizeof (CHAR16) - 1] != L'\0') {\r
+      NameBufferSize = CommBufferPayloadSize - OFFSET_OF (SMM_VARIABLE_COMMUNICATE_GET_NEXT_VARIABLE_NAME, Name);\r
+      if ((NameBufferSize < sizeof (CHAR16)) || (GetNextVariableName->Name[NameBufferSize/sizeof (CHAR16) - 1] != L'\0')) {\r
         //\r
         // Make sure input VariableName is A Null-terminated string.\r
         //\r
@@ -605,24 +609,27 @@ SmmVariableHandler (
       break;\r
 \r
     case SMM_VARIABLE_FUNCTION_SET_VARIABLE:\r
-      if (CommBufferPayloadSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)) {\r
+      if (CommBufferPayloadSize < OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)) {\r
         DEBUG ((DEBUG_ERROR, "SetVariable: SMM communication buffer size invalid!\n"));\r
         return EFI_SUCCESS;\r
       }\r
+\r
       //\r
       // Copy the input communicate buffer payload to pre-allocated SMM variable buffer payload.\r
       //\r
       CopyMem (mVariableBufferPayload, SmmVariableFunctionHeader->Data, CommBufferPayloadSize);\r
-      SmmVariableHeader = (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *) mVariableBufferPayload;\r
-      if (((UINTN)(~0) - SmmVariableHeader->DataSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)) ||\r
-         ((UINTN)(~0) - SmmVariableHeader->NameSize < OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + SmmVariableHeader->DataSize)) {\r
+      SmmVariableHeader = (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE *)mVariableBufferPayload;\r
+      if (((UINTN)(~0) - SmmVariableHeader->DataSize < OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)) ||\r
+          ((UINTN)(~0) - SmmVariableHeader->NameSize < OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name) + SmmVariableHeader->DataSize))\r
+      {\r
         //\r
         // Prevent InfoSize overflow happen\r
         //\r
         Status = EFI_ACCESS_DENIED;\r
         goto EXIT;\r
       }\r
-      InfoSize = OFFSET_OF(SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)\r
+\r
+      InfoSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_ACCESS_VARIABLE, Name)\r
                  + SmmVariableHeader->DataSize + SmmVariableHeader->NameSize;\r
 \r
       //\r
@@ -641,7 +648,7 @@ SmmVariableHandler (
       // subsequent consumption of the CommBuffer content.\r
       //\r
       VariableSpeculationBarrier ();\r
-      if (SmmVariableHeader->NameSize < sizeof (CHAR16) || SmmVariableHeader->Name[SmmVariableHeader->NameSize/sizeof (CHAR16) - 1] != L'\0') {\r
+      if ((SmmVariableHeader->NameSize < sizeof (CHAR16)) || (SmmVariableHeader->Name[SmmVariableHeader->NameSize/sizeof (CHAR16) - 1] != L'\0')) {\r
         //\r
         // Make sure VariableName is A Null-terminated string.\r
         //\r
@@ -663,7 +670,8 @@ SmmVariableHandler (
         DEBUG ((DEBUG_ERROR, "QueryVariableInfo: SMM communication buffer size invalid!\n"));\r
         return EFI_SUCCESS;\r
       }\r
-      QueryVariableInfo = (SMM_VARIABLE_COMMUNICATE_QUERY_VARIABLE_INFO *) SmmVariableFunctionHeader->Data;\r
+\r
+      QueryVariableInfo = (SMM_VARIABLE_COMMUNICATE_QUERY_VARIABLE_INFO *)SmmVariableFunctionHeader->Data;\r
 \r
       Status = VariableServiceQueryVariableInfo (\r
                  QueryVariableInfo->Attributes,\r
@@ -678,16 +686,18 @@ SmmVariableHandler (
         DEBUG ((DEBUG_ERROR, "GetPayloadSize: SMM communication buffer size invalid!\n"));\r
         return EFI_SUCCESS;\r
       }\r
-      GetPayloadSize = (SMM_VARIABLE_COMMUNICATE_GET_PAYLOAD_SIZE *) SmmVariableFunctionHeader->Data;\r
+\r
+      GetPayloadSize                      = (SMM_VARIABLE_COMMUNICATE_GET_PAYLOAD_SIZE *)SmmVariableFunctionHeader->Data;\r
       GetPayloadSize->VariablePayloadSize = mVariableBufferPayloadSize;\r
-      Status = EFI_SUCCESS;\r
+      Status                              = EFI_SUCCESS;\r
       break;\r
 \r
     case SMM_VARIABLE_FUNCTION_READY_TO_BOOT:\r
-      if (AtRuntime()) {\r
+      if (AtRuntime ()) {\r
         Status = EFI_UNSUPPORTED;\r
         break;\r
       }\r
+\r
       if (!mEndOfDxe) {\r
         MorLockInitAtEndOfDxe ();\r
         Status = LockVariablePolicy ();\r
@@ -699,18 +709,19 @@ SmmVariableHandler (
         //\r
         InitializeVariableQuota ();\r
       }\r
+\r
       ReclaimForOS ();\r
       Status = EFI_SUCCESS;\r
       break;\r
 \r
     case SMM_VARIABLE_FUNCTION_EXIT_BOOT_SERVICE:\r
       mAtRuntime = TRUE;\r
-      Status = EFI_SUCCESS;\r
+      Status     = EFI_SUCCESS;\r
       break;\r
 \r
     case SMM_VARIABLE_FUNCTION_GET_STATISTICS:\r
-      VariableInfo = (VARIABLE_INFO_ENTRY *) SmmVariableFunctionHeader->Data;\r
-      InfoSize = TempCommBufferSize - SMM_VARIABLE_COMMUNICATE_HEADER_SIZE;\r
+      VariableInfo = (VARIABLE_INFO_ENTRY *)SmmVariableFunctionHeader->Data;\r
+      InfoSize     = TempCommBufferSize - SMM_VARIABLE_COMMUNICATE_HEADER_SIZE;\r
 \r
       //\r
       // Do not need to check SmmVariableFunctionHeader->Data in SMRAM here.\r
@@ -722,7 +733,7 @@ SmmVariableHandler (
       // that was used by SMM core to cache CommSize from SmmCommunication protocol.\r
       //\r
 \r
-      Status = SmmVariableGetStatistics (VariableInfo, &InfoSize);\r
+      Status          = SmmVariableGetStatistics (VariableInfo, &InfoSize);\r
       *CommBufferSize = InfoSize + SMM_VARIABLE_COMMUNICATE_HEADER_SIZE;\r
       break;\r
 \r
@@ -730,43 +741,47 @@ SmmVariableHandler (
       if (mEndOfDxe) {\r
         Status = EFI_ACCESS_DENIED;\r
       } else {\r
-        VariableToLock = (SMM_VARIABLE_COMMUNICATE_LOCK_VARIABLE *) SmmVariableFunctionHeader->Data;\r
-        Status = VariableLockRequestToLock (\r
-                   NULL,\r
-                   VariableToLock->Name,\r
-                   &VariableToLock->Guid\r
-                   );\r
+        VariableToLock = (SMM_VARIABLE_COMMUNICATE_LOCK_VARIABLE *)SmmVariableFunctionHeader->Data;\r
+        Status         = VariableLockRequestToLock (\r
+                           NULL,\r
+                           VariableToLock->Name,\r
+                           &VariableToLock->Guid\r
+                           );\r
       }\r
+\r
       break;\r
     case SMM_VARIABLE_FUNCTION_VAR_CHECK_VARIABLE_PROPERTY_SET:\r
       if (mEndOfDxe) {\r
         Status = EFI_ACCESS_DENIED;\r
       } else {\r
-        CommVariableProperty = (SMM_VARIABLE_COMMUNICATE_VAR_CHECK_VARIABLE_PROPERTY *) SmmVariableFunctionHeader->Data;\r
-        Status = VarCheckVariablePropertySet (\r
-                   CommVariableProperty->Name,\r
-                   &CommVariableProperty->Guid,\r
-                   &CommVariableProperty->VariableProperty\r
-                   );\r
+        CommVariableProperty = (SMM_VARIABLE_COMMUNICATE_VAR_CHECK_VARIABLE_PROPERTY *)SmmVariableFunctionHeader->Data;\r
+        Status               = VarCheckVariablePropertySet (\r
+                                 CommVariableProperty->Name,\r
+                                 &CommVariableProperty->Guid,\r
+                                 &CommVariableProperty->VariableProperty\r
+                                 );\r
       }\r
+\r
       break;\r
     case SMM_VARIABLE_FUNCTION_VAR_CHECK_VARIABLE_PROPERTY_GET:\r
       if (CommBufferPayloadSize < OFFSET_OF (SMM_VARIABLE_COMMUNICATE_VAR_CHECK_VARIABLE_PROPERTY, Name)) {\r
         DEBUG ((DEBUG_ERROR, "VarCheckVariablePropertyGet: SMM communication buffer size invalid!\n"));\r
         return EFI_SUCCESS;\r
       }\r
+\r
       //\r
       // Copy the input communicate buffer payload to pre-allocated SMM variable buffer payload.\r
       //\r
       CopyMem (mVariableBufferPayload, SmmVariableFunctionHeader->Data, CommBufferPayloadSize);\r
-      CommVariableProperty = (SMM_VARIABLE_COMMUNICATE_VAR_CHECK_VARIABLE_PROPERTY *) mVariableBufferPayload;\r
-      if ((UINTN) (~0) - CommVariableProperty->NameSize < OFFSET_OF (SMM_VARIABLE_COMMUNICATE_VAR_CHECK_VARIABLE_PROPERTY, Name)) {\r
+      CommVariableProperty = (SMM_VARIABLE_COMMUNICATE_VAR_CHECK_VARIABLE_PROPERTY *)mVariableBufferPayload;\r
+      if ((UINTN)(~0) - CommVariableProperty->NameSize < OFFSET_OF (SMM_VARIABLE_COMMUNICATE_VAR_CHECK_VARIABLE_PROPERTY, Name)) {\r
         //\r
         // Prevent InfoSize overflow happen\r
         //\r
         Status = EFI_ACCESS_DENIED;\r
         goto EXIT;\r
       }\r
+\r
       InfoSize = OFFSET_OF (SMM_VARIABLE_COMMUNICATE_VAR_CHECK_VARIABLE_PROPERTY, Name) + CommVariableProperty->NameSize;\r
 \r
       //\r
@@ -784,7 +799,7 @@ SmmVariableHandler (
       // subsequent consumption of the CommBuffer content.\r
       //\r
       VariableSpeculationBarrier ();\r
-      if (CommVariableProperty->NameSize < sizeof (CHAR16) || CommVariableProperty->Name[CommVariableProperty->NameSize/sizeof (CHAR16) - 1] != L'\0') {\r
+      if ((CommVariableProperty->NameSize < sizeof (CHAR16)) || (CommVariableProperty->Name[CommVariableProperty->NameSize/sizeof (CHAR16) - 1] != L'\0')) {\r
         //\r
         // Make sure VariableName is A Null-terminated string.\r
         //\r
@@ -805,6 +820,7 @@ SmmVariableHandler (
         Status = EFI_ACCESS_DENIED;\r
         goto EXIT;\r
       }\r
+\r
       if (mEndOfDxe) {\r
         DEBUG ((DEBUG_ERROR, "InitRuntimeVariableCacheContext: Cannot init context after end of DXE!\n"));\r
         Status = EFI_ACCESS_DENIED;\r
@@ -815,16 +831,17 @@ SmmVariableHandler (
       // Copy the input communicate buffer payload to the pre-allocated SMM variable payload buffer.\r
       //\r
       CopyMem (mVariableBufferPayload, SmmVariableFunctionHeader->Data, CommBufferPayloadSize);\r
-      RuntimeVariableCacheContext = (SMM_VARIABLE_COMMUNICATE_RUNTIME_VARIABLE_CACHE_CONTEXT *) mVariableBufferPayload;\r
+      RuntimeVariableCacheContext = (SMM_VARIABLE_COMMUNICATE_RUNTIME_VARIABLE_CACHE_CONTEXT *)mVariableBufferPayload;\r
 \r
       //\r
       // Verify required runtime cache buffers are provided.\r
       //\r
-      if (RuntimeVariableCacheContext->RuntimeVolatileCache == NULL ||\r
-          RuntimeVariableCacheContext->RuntimeNvCache == NULL ||\r
-          RuntimeVariableCacheContext->PendingUpdate == NULL ||\r
-          RuntimeVariableCacheContext->ReadLock == NULL ||\r
-          RuntimeVariableCacheContext->HobFlushComplete == NULL) {\r
+      if ((RuntimeVariableCacheContext->RuntimeVolatileCache == NULL) ||\r
+          (RuntimeVariableCacheContext->RuntimeNvCache == NULL) ||\r
+          (RuntimeVariableCacheContext->PendingUpdate == NULL) ||\r
+          (RuntimeVariableCacheContext->ReadLock == NULL) ||\r
+          (RuntimeVariableCacheContext->HobFlushComplete == NULL))\r
+      {\r
         DEBUG ((DEBUG_ERROR, "InitRuntimeVariableCacheContext: Required runtime cache buffer is NULL!\n"));\r
         Status = EFI_ACCESS_DENIED;\r
         goto EXIT;\r
@@ -833,10 +850,11 @@ SmmVariableHandler (
       //\r
       // Verify minimum size requirements for the runtime variable store buffers.\r
       //\r
-      if ((RuntimeVariableCacheContext->RuntimeHobCache != NULL &&\r
-          RuntimeVariableCacheContext->RuntimeHobCache->Size < sizeof (VARIABLE_STORE_HEADER)) ||\r
-          RuntimeVariableCacheContext->RuntimeVolatileCache->Size < sizeof (VARIABLE_STORE_HEADER) ||\r
-          RuntimeVariableCacheContext->RuntimeNvCache->Size < sizeof (VARIABLE_STORE_HEADER)) {\r
+      if (((RuntimeVariableCacheContext->RuntimeHobCache != NULL) &&\r
+           (RuntimeVariableCacheContext->RuntimeHobCache->Size < sizeof (VARIABLE_STORE_HEADER))) ||\r
+          (RuntimeVariableCacheContext->RuntimeVolatileCache->Size < sizeof (VARIABLE_STORE_HEADER)) ||\r
+          (RuntimeVariableCacheContext->RuntimeNvCache->Size < sizeof (VARIABLE_STORE_HEADER)))\r
+      {\r
         DEBUG ((DEBUG_ERROR, "InitRuntimeVariableCacheContext: A runtime cache buffer size is invalid!\n"));\r
         Status = EFI_ACCESS_DENIED;\r
         goto EXIT;\r
@@ -845,51 +863,68 @@ SmmVariableHandler (
       //\r
       // Verify runtime buffers do not overlap with SMRAM ranges.\r
       //\r
-      if (RuntimeVariableCacheContext->RuntimeHobCache != NULL &&\r
+      if ((RuntimeVariableCacheContext->RuntimeHobCache != NULL) &&\r
           !VariableSmmIsBufferOutsideSmmValid (\r
-            (UINTN) RuntimeVariableCacheContext->RuntimeHobCache,\r
-            (UINTN) RuntimeVariableCacheContext->RuntimeHobCache->Size)) {\r
+             (UINTN)RuntimeVariableCacheContext->RuntimeHobCache,\r
+             (UINTN)RuntimeVariableCacheContext->RuntimeHobCache->Size\r
+             ))\r
+      {\r
         DEBUG ((DEBUG_ERROR, "InitRuntimeVariableCacheContext: Runtime HOB cache buffer in SMRAM or overflow!\n"));\r
         Status = EFI_ACCESS_DENIED;\r
         goto EXIT;\r
       }\r
+\r
       if (!VariableSmmIsBufferOutsideSmmValid (\r
-            (UINTN) RuntimeVariableCacheContext->RuntimeVolatileCache,\r
-            (UINTN) RuntimeVariableCacheContext->RuntimeVolatileCache->Size)) {\r
+             (UINTN)RuntimeVariableCacheContext->RuntimeVolatileCache,\r
+             (UINTN)RuntimeVariableCacheContext->RuntimeVolatileCache->Size\r
+             ))\r
+      {\r
         DEBUG ((DEBUG_ERROR, "InitRuntimeVariableCacheContext: Runtime volatile cache buffer in SMRAM or overflow!\n"));\r
         Status = EFI_ACCESS_DENIED;\r
         goto EXIT;\r
       }\r
+\r
       if (!VariableSmmIsBufferOutsideSmmValid (\r
-            (UINTN) RuntimeVariableCacheContext->RuntimeNvCache,\r
-            (UINTN) RuntimeVariableCacheContext->RuntimeNvCache->Size)) {\r
+             (UINTN)RuntimeVariableCacheContext->RuntimeNvCache,\r
+             (UINTN)RuntimeVariableCacheContext->RuntimeNvCache->Size\r
+             ))\r
+      {\r
         DEBUG ((DEBUG_ERROR, "InitRuntimeVariableCacheContext: Runtime non-volatile cache buffer in SMRAM or overflow!\n"));\r
         Status = EFI_ACCESS_DENIED;\r
         goto EXIT;\r
       }\r
+\r
       if (!VariableSmmIsBufferOutsideSmmValid (\r
-            (UINTN) RuntimeVariableCacheContext->PendingUpdate,\r
-            sizeof (*(RuntimeVariableCacheContext->PendingUpdate)))) {\r
+             (UINTN)RuntimeVariableCacheContext->PendingUpdate,\r
+             sizeof (*(RuntimeVariableCacheContext->PendingUpdate))\r
+             ))\r
+      {\r
         DEBUG ((DEBUG_ERROR, "InitRuntimeVariableCacheContext: Runtime cache pending update buffer in SMRAM or overflow!\n"));\r
         Status = EFI_ACCESS_DENIED;\r
         goto EXIT;\r
       }\r
+\r
       if (!VariableSmmIsBufferOutsideSmmValid (\r
-            (UINTN) RuntimeVariableCacheContext->ReadLock,\r
-            sizeof (*(RuntimeVariableCacheContext->ReadLock)))) {\r
+             (UINTN)RuntimeVariableCacheContext->ReadLock,\r
+             sizeof (*(RuntimeVariableCacheContext->ReadLock))\r
+             ))\r
+      {\r
         DEBUG ((DEBUG_ERROR, "InitRuntimeVariableCacheContext: Runtime cache read lock buffer in SMRAM or overflow!\n"));\r
         Status = EFI_ACCESS_DENIED;\r
         goto EXIT;\r
       }\r
+\r
       if (!VariableSmmIsBufferOutsideSmmValid (\r
-            (UINTN) RuntimeVariableCacheContext->HobFlushComplete,\r
-            sizeof (*(RuntimeVariableCacheContext->HobFlushComplete)))) {\r
+             (UINTN)RuntimeVariableCacheContext->HobFlushComplete,\r
+             sizeof (*(RuntimeVariableCacheContext->HobFlushComplete))\r
+             ))\r
+      {\r
         DEBUG ((DEBUG_ERROR, "InitRuntimeVariableCacheContext: Runtime cache HOB flush complete buffer in SMRAM or overflow!\n"));\r
         Status = EFI_ACCESS_DENIED;\r
         goto EXIT;\r
       }\r
 \r
-      VariableCacheContext = &mVariableModuleGlobal->VariableGlobal.VariableRuntimeCacheContext;\r
+      VariableCacheContext                                     = &mVariableModuleGlobal->VariableGlobal.VariableRuntimeCacheContext;\r
       VariableCacheContext->VariableRuntimeHobCache.Store      = RuntimeVariableCacheContext->RuntimeHobCache;\r
       VariableCacheContext->VariableRuntimeVolatileCache.Store = RuntimeVariableCacheContext->RuntimeVolatileCache;\r
       VariableCacheContext->VariableRuntimeNvCache.Store       = RuntimeVariableCacheContext->RuntimeNvCache;\r
@@ -900,24 +935,26 @@ SmmVariableHandler (
       // Set up the intial pending request since the RT cache needs to be in sync with SMM cache\r
       VariableCacheContext->VariableRuntimeHobCache.PendingUpdateOffset = 0;\r
       VariableCacheContext->VariableRuntimeHobCache.PendingUpdateLength = 0;\r
-      if (mVariableModuleGlobal->VariableGlobal.HobVariableBase > 0 &&\r
-          VariableCacheContext->VariableRuntimeHobCache.Store != NULL) {\r
-        VariableCache = (VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.HobVariableBase;\r
-        VariableCacheContext->VariableRuntimeHobCache.PendingUpdateLength = (UINT32) ((UINTN) GetEndPointer (VariableCache) - (UINTN) VariableCache);\r
+      if ((mVariableModuleGlobal->VariableGlobal.HobVariableBase > 0) &&\r
+          (VariableCacheContext->VariableRuntimeHobCache.Store != NULL))\r
+      {\r
+        VariableCache                                                     = (VARIABLE_STORE_HEADER *)(UINTN)mVariableModuleGlobal->VariableGlobal.HobVariableBase;\r
+        VariableCacheContext->VariableRuntimeHobCache.PendingUpdateLength = (UINT32)((UINTN)GetEndPointer (VariableCache) - (UINTN)VariableCache);\r
         CopyGuid (&(VariableCacheContext->VariableRuntimeHobCache.Store->Signature), &(VariableCache->Signature));\r
       }\r
-      VariableCache = (VARIABLE_STORE_HEADER  *) (UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase;\r
-      VariableCacheContext->VariableRuntimeVolatileCache.PendingUpdateOffset   = 0;\r
-      VariableCacheContext->VariableRuntimeVolatileCache.PendingUpdateLength   = (UINT32) ((UINTN) GetEndPointer (VariableCache) - (UINTN) VariableCache);\r
+\r
+      VariableCache                                                          = (VARIABLE_STORE_HEADER  *)(UINTN)mVariableModuleGlobal->VariableGlobal.VolatileVariableBase;\r
+      VariableCacheContext->VariableRuntimeVolatileCache.PendingUpdateOffset = 0;\r
+      VariableCacheContext->VariableRuntimeVolatileCache.PendingUpdateLength = (UINT32)((UINTN)GetEndPointer (VariableCache) - (UINTN)VariableCache);\r
       CopyGuid (&(VariableCacheContext->VariableRuntimeVolatileCache.Store->Signature), &(VariableCache->Signature));\r
 \r
-      VariableCache = (VARIABLE_STORE_HEADER  *) (UINTN) mNvVariableCache;\r
+      VariableCache                                                    = (VARIABLE_STORE_HEADER  *)(UINTN)mNvVariableCache;\r
       VariableCacheContext->VariableRuntimeNvCache.PendingUpdateOffset = 0;\r
-      VariableCacheContext->VariableRuntimeNvCache.PendingUpdateLength = (UINT32) ((UINTN) GetEndPointer (VariableCache) - (UINTN) VariableCache);\r
+      VariableCacheContext->VariableRuntimeNvCache.PendingUpdateLength = (UINT32)((UINTN)GetEndPointer (VariableCache) - (UINTN)VariableCache);\r
       CopyGuid (&(VariableCacheContext->VariableRuntimeNvCache.Store->Signature), &(VariableCache->Signature));\r
 \r
-      *(VariableCacheContext->PendingUpdate) = TRUE;\r
-      *(VariableCacheContext->ReadLock) = FALSE;\r
+      *(VariableCacheContext->PendingUpdate)    = TRUE;\r
+      *(VariableCacheContext->ReadLock)         = FALSE;\r
       *(VariableCacheContext->HobFlushComplete) = FALSE;\r
 \r
       Status = EFI_SUCCESS;\r
@@ -930,19 +967,20 @@ SmmVariableHandler (
         DEBUG ((DEBUG_ERROR, "GetRuntimeCacheInfo: SMM communication buffer size invalid!\n"));\r
         return EFI_SUCCESS;\r
       }\r
-      GetRuntimeCacheInfo = (SMM_VARIABLE_COMMUNICATE_GET_RUNTIME_CACHE_INFO *) SmmVariableFunctionHeader->Data;\r
+\r
+      GetRuntimeCacheInfo = (SMM_VARIABLE_COMMUNICATE_GET_RUNTIME_CACHE_INFO *)SmmVariableFunctionHeader->Data;\r
 \r
       if (mVariableModuleGlobal->VariableGlobal.HobVariableBase > 0) {\r
-        VariableCache = (VARIABLE_STORE_HEADER *) (UINTN) mVariableModuleGlobal->VariableGlobal.HobVariableBase;\r
+        VariableCache                            = (VARIABLE_STORE_HEADER *)(UINTN)mVariableModuleGlobal->VariableGlobal.HobVariableBase;\r
         GetRuntimeCacheInfo->TotalHobStorageSize = VariableCache->Size;\r
       } else {\r
         GetRuntimeCacheInfo->TotalHobStorageSize = 0;\r
       }\r
 \r
-      VariableCache = (VARIABLE_STORE_HEADER  *) (UINTN) mVariableModuleGlobal->VariableGlobal.VolatileVariableBase;\r
-      GetRuntimeCacheInfo->TotalVolatileStorageSize = VariableCache->Size;\r
-      VariableCache = (VARIABLE_STORE_HEADER  *) (UINTN) mNvVariableCache;\r
-      GetRuntimeCacheInfo->TotalNvStorageSize = (UINTN) VariableCache->Size;\r
+      VariableCache                                   = (VARIABLE_STORE_HEADER  *)(UINTN)mVariableModuleGlobal->VariableGlobal.VolatileVariableBase;\r
+      GetRuntimeCacheInfo->TotalVolatileStorageSize   = VariableCache->Size;\r
+      VariableCache                                   = (VARIABLE_STORE_HEADER  *)(UINTN)mNvVariableCache;\r
+      GetRuntimeCacheInfo->TotalNvStorageSize         = (UINTN)VariableCache->Size;\r
       GetRuntimeCacheInfo->AuthenticatedVariableUsage = mVariableModuleGlobal->VariableGlobal.AuthFormat;\r
 \r
       Status = EFI_SUCCESS;\r
@@ -972,12 +1010,12 @@ EXIT:
 EFI_STATUS\r
 EFIAPI\r
 SmmEndOfDxeCallback (\r
-  IN CONST EFI_GUID                       *Protocol,\r
-  IN VOID                                 *Interface,\r
-  IN EFI_HANDLE                           Handle\r
+  IN CONST EFI_GUID  *Protocol,\r
+  IN VOID            *Interface,\r
+  IN EFI_HANDLE      Handle\r
   )\r
 {\r
-  EFI_STATUS    Status;\r
+  EFI_STATUS  Status;\r
 \r
   DEBUG ((DEBUG_INFO, "[Variable]SMM_END_OF_DXE is signaled\n"));\r
   MorLockInitAtEndOfDxe ();\r
@@ -1005,7 +1043,7 @@ VariableWriteServiceInitializeSmm (
   VOID\r
   )\r
 {\r
-  EFI_STATUS    Status;\r
+  EFI_STATUS  Status;\r
 \r
   Status = VariableWriteServiceInitialize ();\r
   if (EFI_ERROR (Status)) {\r
@@ -1035,9 +1073,9 @@ VariableWriteServiceInitializeSmm (
 EFI_STATUS\r
 EFIAPI\r
 SmmFtwNotificationEvent (\r
-  IN CONST EFI_GUID                       *Protocol,\r
-  IN VOID                                 *Interface,\r
-  IN EFI_HANDLE                           Handle\r
+  IN CONST EFI_GUID  *Protocol,\r
+  IN VOID            *Interface,\r
+  IN EFI_HANDLE      Handle\r
   )\r
 {\r
   EFI_STATUS                              Status;\r
@@ -1065,7 +1103,7 @@ SmmFtwNotificationEvent (
   }\r
 \r
   NvStorageVariableBase = NV_STORAGE_VARIABLE_BASE;\r
-  VariableStoreBase = NvStorageVariableBase + mNvFvHeaderCache->HeaderLength;\r
+  VariableStoreBase     = NvStorageVariableBase + mNvFvHeaderCache->HeaderLength;\r
 \r
   //\r
   // Let NonVolatileVariableBase point to flash variable store base directly after FTW ready.\r
@@ -1090,7 +1128,6 @@ SmmFtwNotificationEvent (
   return EFI_SUCCESS;\r
 }\r
 \r
-\r
 /**\r
   Variable Driver main entry point. The Variable driver places the 4 EFI\r
   runtime services in the EFI System Table and installs arch protocols\r
@@ -1106,10 +1143,10 @@ MmVariableServiceInitialize (
   VOID\r
   )\r
 {\r
-  EFI_STATUS                              Status;\r
-  EFI_HANDLE                              VariableHandle;\r
-  VOID                                    *SmmFtwRegistration;\r
-  VOID                                    *SmmEndOfDxeRegistration;\r
+  EFI_STATUS  Status;\r
+  EFI_HANDLE  VariableHandle;\r
+  VOID        *SmmFtwRegistration;\r
+  VOID        *SmmEndOfDxeRegistration;\r
 \r
   //\r
   // Variable initialize.\r
@@ -1121,12 +1158,12 @@ MmVariableServiceInitialize (
   // Install the Smm Variable Protocol on a new handle.\r
   //\r
   VariableHandle = NULL;\r
-  Status = gMmst->MmInstallProtocolInterface (\r
-                    &VariableHandle,\r
-                    &gEfiSmmVariableProtocolGuid,\r
-                    EFI_NATIVE_INTERFACE,\r
-                    &gSmmVariable\r
-                    );\r
+  Status         = gMmst->MmInstallProtocolInterface (\r
+                            &VariableHandle,\r
+                            &gEfiSmmVariableProtocolGuid,\r
+                            EFI_NATIVE_INTERFACE,\r
+                            &gSmmVariable\r
+                            );\r
   ASSERT_EFI_ERROR (Status);\r
 \r
   Status = gMmst->MmInstallProtocolInterface (\r
@@ -1138,8 +1175,8 @@ MmVariableServiceInitialize (
   ASSERT_EFI_ERROR (Status);\r
 \r
   mVariableBufferPayloadSize =  GetMaxVariableSize () +\r
-                                  OFFSET_OF (SMM_VARIABLE_COMMUNICATE_VAR_CHECK_VARIABLE_PROPERTY, Name) -\r
-                                  GetVariableHeaderSize (mVariableModuleGlobal->VariableGlobal.AuthFormat);\r
+                               OFFSET_OF (SMM_VARIABLE_COMMUNICATE_VAR_CHECK_VARIABLE_PROPERTY, Name) -\r
+                               GetVariableHeaderSize (mVariableModuleGlobal->VariableGlobal.AuthFormat);\r
 \r
   Status = gMmst->MmAllocatePool (\r
                     EfiRuntimeServicesData,\r
@@ -1152,7 +1189,7 @@ MmVariableServiceInitialize (
   /// Register SMM variable SMI handler\r
   ///\r
   VariableHandle = NULL;\r
-  Status = gMmst->MmiHandlerRegister (SmmVariableHandler, &gEfiSmmVariableProtocolGuid, &VariableHandle);\r
+  Status         = gMmst->MmiHandlerRegister (SmmVariableHandler, &gEfiSmmVariableProtocolGuid, &VariableHandle);\r
   ASSERT_EFI_ERROR (Status);\r
 \r
   //\r