]> git.proxmox.com Git - mirror_edk2.git/blobdiff - SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.c
SecurityPkg: Apply uncrustify changes
[mirror_edk2.git] / SecurityPkg / Tcg / MemoryOverwriteControl / TcgMor.c
index e5dd06ebcf8132e362a2e2f1648a3914aed0a051..0addf575a00395a9c5e27c8e372080f56b27ebef 100644 (file)
@@ -12,7 +12,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
 \r
 #include "TcgMor.h"\r
 \r
-UINT8    mMorControl;\r
+UINT8  mMorControl;\r
 \r
 /**\r
   Ready to Boot Event notification handler.\r
@@ -24,8 +24,8 @@ UINT8    mMorControl;
 VOID\r
 EFIAPI\r
 OnReadyToBoot (\r
-  IN      EFI_EVENT                 Event,\r
-  IN      VOID                      *Context\r
+  IN      EFI_EVENT  Event,\r
+  IN      VOID       *Context\r
   )\r
 {\r
   EFI_STATUS  Status;\r
@@ -35,8 +35,9 @@ OnReadyToBoot (
     //\r
     // MorControl is expected, directly return to avoid unnecessary variable operation\r
     //\r
-    return ;\r
+    return;\r
   }\r
+\r
   //\r
   // Clear MOR_CLEAR_MEMORY_BIT\r
   //\r
@@ -45,12 +46,12 @@ OnReadyToBoot (
 \r
   DataSize = sizeof (mMorControl);\r
   Status   = gRT->SetVariable (\r
-               MEMORY_OVERWRITE_REQUEST_VARIABLE_NAME,\r
-               &gEfiMemoryOverwriteControlDataGuid,\r
-               EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS,\r
-               DataSize,\r
-               &mMorControl\r
-               );\r
+                    MEMORY_OVERWRITE_REQUEST_VARIABLE_NAME,\r
+                    &gEfiMemoryOverwriteControlDataGuid,\r
+                    EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS,\r
+                    DataSize,\r
+                    &mMorControl\r
+                    );\r
   if (EFI_ERROR (Status)) {\r
     DEBUG ((DEBUG_ERROR, "TcgMor: Clear MOR_CLEAR_MEMORY_BIT failure, Status = %r\n", Status));\r
   }\r
@@ -70,11 +71,10 @@ OnReadyToBoot (
 **/\r
 VOID\r
 InitiateTPerReset (\r
-  IN  EFI_STORAGE_SECURITY_COMMAND_PROTOCOL    *Ssp,\r
-  IN  UINT32                                   MediaId\r
+  IN  EFI_STORAGE_SECURITY_COMMAND_PROTOCOL  *Ssp,\r
+  IN  UINT32                                 MediaId\r
   )\r
 {\r
-\r
   EFI_STATUS                                   Status;\r
   UINT8                                        *Buffer;\r
   UINTN                                        XferSize;\r
@@ -84,17 +84,17 @@ InitiateTPerReset (
   BOOLEAN                                      IeeeFlag;\r
   SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA  *Data;\r
 \r
-  Buffer        = NULL;\r
-  TcgFlag       = FALSE;\r
-  IeeeFlag      = FALSE;\r
+  Buffer   = NULL;\r
+  TcgFlag  = FALSE;\r
+  IeeeFlag = FALSE;\r
 \r
   //\r
   // ATA8-ACS 7.57.6.1 indicates the Transfer Length field requirements a multiple of 512.\r
   // If the length of the TRUSTED RECEIVE parameter data is greater than the Transfer Length,\r
   // then the device shall return the TRUSTED RECEIVE parameter data truncated to the requested Transfer Length.\r
   //\r
-  Len           = ROUNDUP512(sizeof(SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA));\r
-  Buffer        = AllocateZeroPool(Len);\r
+  Len    = ROUNDUP512 (sizeof (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA));\r
+  Buffer = AllocateZeroPool (Len);\r
 \r
   if (Buffer == NULL) {\r
     return;\r
@@ -122,17 +122,18 @@ InitiateTPerReset (
   // In returned data, the ListLength field indicates the total length, in bytes,\r
   // of the supported security protocol list.\r
   //\r
-  Data = (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA*)Buffer;\r
-  Len  = ROUNDUP512(sizeof (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA) +\r
-                    (Data->SupportedSecurityListLength[0] << 8) +\r
-                    (Data->SupportedSecurityListLength[1])\r
-                    );\r
+  Data = (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA *)Buffer;\r
+  Len  = ROUNDUP512 (\r
+           sizeof (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA) +\r
+           (Data->SupportedSecurityListLength[0] << 8) +\r
+           (Data->SupportedSecurityListLength[1])\r
+           );\r
 \r
   //\r
   // Free original buffer and allocate new buffer.\r
   //\r
-  FreePool(Buffer);\r
-  Buffer = AllocateZeroPool(Len);\r
+  FreePool (Buffer);\r
+  Buffer = AllocateZeroPool (Len);\r
   if (Buffer == NULL) {\r
     return;\r
   }\r
@@ -155,7 +156,7 @@ InitiateTPerReset (
     goto Exit;\r
   }\r
 \r
-  Data = (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA*)Buffer;\r
+  Data = (SUPPORTED_SECURITY_PROTOCOLS_PARAMETER_DATA *)Buffer;\r
   Len  = (Data->SupportedSecurityListLength[0] << 8) + Data->SupportedSecurityListLength[1];\r
 \r
   //\r
@@ -219,7 +220,7 @@ InitiateTPerReset (
 Exit:\r
 \r
   if (Buffer != NULL) {\r
-    FreePool(Buffer);\r
+    FreePool (Buffer);\r
   }\r
 }\r
 \r
@@ -237,12 +238,12 @@ TPerResetAtEndOfDxe (
   IN VOID       *Context\r
   )\r
 {\r
-  EFI_STORAGE_SECURITY_COMMAND_PROTOCOL   *Ssp;\r
-  EFI_BLOCK_IO_PROTOCOL                   *BlockIo;\r
-  EFI_STATUS                              Status;\r
-  UINTN                                   HandleCount;\r
-  EFI_HANDLE                              *HandleBuffer;\r
-  UINTN                                   Index;\r
+  EFI_STORAGE_SECURITY_COMMAND_PROTOCOL  *Ssp;\r
+  EFI_BLOCK_IO_PROTOCOL                  *BlockIo;\r
+  EFI_STATUS                             Status;\r
+  UINTN                                  HandleCount;\r
+  EFI_HANDLE                             *HandleBuffer;\r
+  UINTN                                  Index;\r
 \r
   //\r
   // Locate all SSP protocol instances.\r
@@ -262,24 +263,24 @@ TPerResetAtEndOfDxe (
     return;\r
   }\r
 \r
-  for (Index = 0; Index < HandleCount; Index ++) {\r
+  for (Index = 0; Index < HandleCount; Index++) {\r
     //\r
     // Get the SSP interface.\r
     //\r
-    Status = gBS->HandleProtocol(\r
+    Status = gBS->HandleProtocol (\r
                     HandleBuffer[Index],\r
                     &gEfiStorageSecurityCommandProtocolGuid,\r
-                    (VOID **) &Ssp\r
+                    (VOID **)&Ssp\r
                     );\r
 \r
     if (EFI_ERROR (Status)) {\r
       continue;\r
     }\r
 \r
-    Status = gBS->HandleProtocol(\r
+    Status = gBS->HandleProtocol (\r
                     HandleBuffer[Index],\r
                     &gEfiBlockIoProtocolGuid,\r
-                    (VOID **) &BlockIo\r
+                    (VOID **)&BlockIo\r
                     );\r
 \r
     if (EFI_ERROR (Status)) {\r
@@ -317,25 +318,25 @@ MorDriverEntryPoint (
   ///\r
 \r
   DataSize = sizeof (mMorControl);\r
-  Status = gRT->GetVariable (\r
-                  MEMORY_OVERWRITE_REQUEST_VARIABLE_NAME,\r
-                  &gEfiMemoryOverwriteControlDataGuid,\r
-                  NULL,\r
-                  &DataSize,\r
-                  &mMorControl\r
-                  );\r
+  Status   = gRT->GetVariable (\r
+                    MEMORY_OVERWRITE_REQUEST_VARIABLE_NAME,\r
+                    &gEfiMemoryOverwriteControlDataGuid,\r
+                    NULL,\r
+                    &DataSize,\r
+                    &mMorControl\r
+                    );\r
   if (EFI_ERROR (Status)) {\r
     //\r
     // Set default value to 0\r
     //\r
     mMorControl = 0;\r
-    Status = gRT->SetVariable (\r
-                    MEMORY_OVERWRITE_REQUEST_VARIABLE_NAME,\r
-                    &gEfiMemoryOverwriteControlDataGuid,\r
-                    EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS,\r
-                    DataSize,\r
-                    &mMorControl\r
-                    );\r
+    Status      = gRT->SetVariable (\r
+                         MEMORY_OVERWRITE_REQUEST_VARIABLE_NAME,\r
+                         &gEfiMemoryOverwriteControlDataGuid,\r
+                         EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS,\r
+                         DataSize,\r
+                         &mMorControl\r
+                         );\r
     DEBUG ((DEBUG_INFO, "TcgMor: Create MOR variable! Status = %r\n", Status));\r
   } else {\r
     //\r