# Set memory encryption mask\r
gEfiMdeModulePkgTokenSpaceGuid.PcdPteMemoryEncryptionAddressOrMask|0x0\r
\r
+ # Set SEV-ES defaults\r
+ gUefiCpuPkgTokenSpaceGuid.PcdSevEsIsEnabled|0\r
+\r
!if $(SMM_REQUIRE) == TRUE\r
gUefiOvmfPkgTokenSpaceGuid.PcdQ35TsegMbytes|8\r
gUefiOvmfPkgTokenSpaceGuid.PcdQ35SmramAtDefaultSmbase|FALSE\r
# Set memory encryption mask\r
gEfiMdeModulePkgTokenSpaceGuid.PcdPteMemoryEncryptionAddressOrMask|0x0\r
\r
+ # Set SEV-ES defaults\r
+ gUefiCpuPkgTokenSpaceGuid.PcdSevEsIsEnabled|0\r
+\r
!if $(SMM_REQUIRE) == TRUE\r
gUefiOvmfPkgTokenSpaceGuid.PcdQ35TsegMbytes|8\r
gUefiOvmfPkgTokenSpaceGuid.PcdQ35SmramAtDefaultSmbase|FALSE\r
# Set memory encryption mask\r
gEfiMdeModulePkgTokenSpaceGuid.PcdPteMemoryEncryptionAddressOrMask|0x0\r
\r
+ # Set SEV-ES defaults\r
+ gUefiCpuPkgTokenSpaceGuid.PcdSevEsIsEnabled|0\r
+\r
!if $(SMM_REQUIRE) == TRUE\r
gUefiOvmfPkgTokenSpaceGuid.PcdQ35TsegMbytes|8\r
gUefiOvmfPkgTokenSpaceGuid.PcdQ35SmramAtDefaultSmbase|FALSE\r
\r
#include "Platform.h"\r
\r
+/**\r
+\r
+ Initialize SEV-ES support if running as an SEV-ES guest.\r
+\r
+ **/\r
+STATIC\r
+VOID\r
+AmdSevEsInitialize (\r
+ VOID\r
+ )\r
+{\r
+ RETURN_STATUS PcdStatus;\r
+\r
+ if (!MemEncryptSevEsIsEnabled ()) {\r
+ return;\r
+ }\r
+\r
+ PcdStatus = PcdSetBoolS (PcdSevEsIsEnabled, TRUE);\r
+ ASSERT_RETURN_ERROR (PcdStatus);\r
+}\r
+\r
/**\r
\r
Function checks if SEV support is available, if present then it sets\r
);\r
}\r
}\r
+\r
+ //\r
+ // Check and perform SEV-ES initialization if required.\r
+ //\r
+ AmdSevEsInitialize ();\r
}\r
gUefiCpuPkgTokenSpaceGuid.PcdCpuMaxLogicalProcessorNumber\r
gUefiCpuPkgTokenSpaceGuid.PcdCpuBootLogicalProcessorNumber\r
gUefiCpuPkgTokenSpaceGuid.PcdCpuApStackSize\r
+ gUefiCpuPkgTokenSpaceGuid.PcdSevEsIsEnabled\r
\r
[FixedPcd]\r
gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress\r