// make them reserved.\r
//\r
GhcbPageCount = mMaxCpuCount * 2;\r
- GhcbBase = AllocateReservedPages (GhcbPageCount);\r
+ GhcbBase = AllocateReservedPages (GhcbPageCount);\r
ASSERT (GhcbBase != NULL);\r
\r
- GhcbBasePa = (PHYSICAL_ADDRESS)(UINTN) GhcbBase;\r
+ GhcbBasePa = (PHYSICAL_ADDRESS)(UINTN)GhcbBase;\r
\r
//\r
// Each vCPU gets two consecutive pages, the first is the GHCB and the\r
//\r
for (PageCount = 0; PageCount < GhcbPageCount; PageCount += 2) {\r
DecryptStatus = MemEncryptSevClearPageEncMask (\r
- 0,\r
- GhcbBasePa + EFI_PAGES_TO_SIZE (PageCount),\r
- 1\r
- );\r
+ 0,\r
+ GhcbBasePa + EFI_PAGES_TO_SIZE (PageCount),\r
+ 1\r
+ );\r
ASSERT_RETURN_ERROR (DecryptStatus);\r
}\r
\r
PcdStatus = PcdSet64S (PcdGhcbSize, EFI_PAGES_TO_SIZE (GhcbPageCount));\r
ASSERT_RETURN_ERROR (PcdStatus);\r
\r
- DEBUG ((DEBUG_INFO,\r
+ DEBUG ((\r
+ DEBUG_INFO,\r
"SEV-ES is enabled, %lu GHCB pages allocated starting at 0x%p\n",\r
- (UINT64)GhcbPageCount, GhcbBase));\r
+ (UINT64)GhcbPageCount,\r
+ GhcbBase\r
+ ));\r
\r
//\r
// Allocate #VC recursion backup pages. The number of backup pages needed is\r
// one less than the maximum VC count.\r
//\r
GhcbBackupPageCount = mMaxCpuCount * (VMGEXIT_MAXIMUM_VC_COUNT - 1);\r
- GhcbBackupBase = AllocatePages (GhcbBackupPageCount);\r
+ GhcbBackupBase = AllocatePages (GhcbBackupPageCount);\r
ASSERT (GhcbBackupBase != NULL);\r
\r
GhcbBackupPages = GhcbBackupBase;\r
GhcbBackupPages += EFI_PAGE_SIZE * (VMGEXIT_MAXIMUM_VC_COUNT - 1);\r
}\r
\r
- DEBUG ((DEBUG_INFO,\r
+ DEBUG ((\r
+ DEBUG_INFO,\r
"SEV-ES is enabled, %lu GHCB backup pages allocated starting at 0x%p\n",\r
- (UINT64)GhcbBackupPageCount, GhcbBackupBase));\r
+ (UINT64)GhcbBackupPageCount,\r
+ GhcbBackupBase\r
+ ));\r
\r
AsmWriteMsr64 (MSR_SEV_ES_GHCB, GhcbBasePa);\r
\r
//\r
AsmReadGdtr (&Gdtr);\r
\r
- Gdt = AllocatePages (EFI_SIZE_TO_PAGES ((UINTN) Gdtr.Limit + 1));\r
+ Gdt = AllocatePages (EFI_SIZE_TO_PAGES ((UINTN)Gdtr.Limit + 1));\r
ASSERT (Gdt != NULL);\r
\r
- CopyMem (Gdt, (VOID *) Gdtr.Base, Gdtr.Limit + 1);\r
- Gdtr.Base = (UINTN) Gdt;\r
+ CopyMem (Gdt, (VOID *)Gdtr.Base, Gdtr.Limit + 1);\r
+ Gdtr.Base = (UINTN)Gdt;\r
AsmWriteGdtr (&Gdtr);\r
}\r
\r
VOID\r
)\r
{\r
- UINT64 EncryptionMask;\r
- RETURN_STATUS PcdStatus;\r
+ UINT64 EncryptionMask;\r
+ RETURN_STATUS PcdStatus;\r
\r
//\r
// Check if SEV is enabled\r
// Set Memory Encryption Mask PCD\r
//\r
EncryptionMask = MemEncryptSevGetEncryptionMask ();\r
- PcdStatus = PcdSet64S (PcdPteMemoryEncryptionAddressOrMask, EncryptionMask);\r
+ PcdStatus = PcdSet64S (PcdPteMemoryEncryptionAddressOrMask, EncryptionMask);\r
ASSERT_RETURN_ERROR (PcdStatus);\r
\r
DEBUG ((DEBUG_INFO, "SEV is enabled (mask 0x%lx)\n", EncryptionMask));\r
// hypervisor.\r
//\r
if (FeaturePcdGet (PcdSmmSmramRequire) && (mBootMode != BOOT_ON_S3_RESUME)) {\r
- RETURN_STATUS LocateMapStatus;\r
- UINTN MapPagesBase;\r
- UINTN MapPagesCount;\r
+ RETURN_STATUS LocateMapStatus;\r
+ UINTN MapPagesBase;\r
+ UINTN MapPagesCount;\r
\r
LocateMapStatus = MemEncryptSevLocateInitialSmramSaveStateMapPages (\r
&MapPagesBase,\r