From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from walk.intel-email.com (walk.intel-email.com [101.227.64.242]) by mx.groups.io with SMTP id smtpd.web11.4999.1670379227114445433 for ; Tue, 06 Dec 2022 18:13:48 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@byosoft.com.cn header.s=cloud-union header.b=aVFZA5nY; spf=pass (domain: byosoft.com.cn, ip: 101.227.64.242, mailfrom: gaoliming@byosoft.com.cn) Received: from walk.intel-email.com (localhost [127.0.0.1]) by walk.intel-email.com (Postfix) with ESMTP id BDCE9CD1F7BC for ; Wed, 7 Dec 2022 10:13:43 +0800 (CST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=byosoft.com.cn; s=cloud-union; t=1670379223; bh=FrvcHNbYQie6CZl6BlE4i2FmvRa5gNJVfL7EFBwrIsA=; h=From:To:Cc:References:In-Reply-To:Subject:Date; b=aVFZA5nY84JJI+AkPdd0rNBeHDLGfveDOnt/dBP7+GVK2SE0pOYc+no7T+bb0AKk6 b47dijW36ib7gbooB4tobTz+HC9KVw4FleIwMPCLBzjubo0XcLdSgMIAHlKROntygo UwdeCNNDBllHtNxQ1b8AymYpFJyxNzIaCqV4eKw4= Received: from localhost (localhost [127.0.0.1]) by walk.intel-email.com (Postfix) with ESMTP id B9946CD1F7B5 for ; Wed, 7 Dec 2022 10:13:43 +0800 (CST) Received: from walk.intel-email.com (localhost [127.0.0.1]) by walk.intel-email.com (Postfix) with ESMTP id 8CDEECD1F637 for ; Wed, 7 Dec 2022 10:13:43 +0800 (CST) Authentication-Results: walk.intel-email.com; none Received: from mail.byosoft.com.cn (mail.byosoft.com.cn [58.240.74.242]) by walk.intel-email.com (Postfix) with SMTP id 1DC36CD1F7C5 for ; Wed, 7 Dec 2022 10:13:40 +0800 (CST) Received: from DESKTOPS6D0PVI ([58.246.60.130]) (envelope-sender ) by 192.168.6.13 with ESMTP for ; Wed, 07 Dec 2022 10:13:35 +0800 X-WM-Sender: gaoliming@byosoft.com.cn X-Originating-IP: 58.246.60.130 X-WM-AuthFlag: YES X-WM-AuthUser: gaoliming@byosoft.com.cn From: "gaoliming" To: , Cc: "'Ard Biesheuvel'" , "'Jiewen Yao'" , "'Jordan Justen'" , "'Gerd Hoffmann'" , "'Brijesh Singh'" , "'Erdem Aktas'" , "'James Bottomley'" , "'Min Xu'" , "'Tom Lendacky'" References: <20221201023521.10028-1-aik@amd.com> <20221201023521.10028-2-aik@amd.com> In-Reply-To: <20221201023521.10028-2-aik@amd.com> Subject: =?UTF-8?B?5Zue5aSNOiBbZWRrMi1kZXZlbF0gW1BBVENIIG92bWYgMS81XSBNZGVQa2cvUmVnaXN0ZXIvQW1kOiBEZWZpbmUgYWxsIGJpdHMgZnJvbSBNU1JfU0VWX1NUQVRVU19SRUdJU1RFUg==?= Date: Wed, 7 Dec 2022 10:13:36 +0800 Message-ID: <001101d909e1$84079000$8c16b000$@byosoft.com.cn> MIME-Version: 1.0 X-Mailer: Microsoft Outlook 16.0 Thread-Index: AQHz9TSNfqLjJbqtNrhjTCelWEpymQMk2n0QrhKxSpA= Sender: "gaoliming" Content-Type: text/plain; charset="gb2312" Content-Transfer-Encoding: quoted-printable Content-Language: zh-cn Alexey: > -----=D3=CA=BC=FE=D4=AD=BC=FE----- > =B7=A2=BC=FE=C8=CB: devel@edk2.groups.io =B4=FA=B1= =ED Alexey > Kardashevskiy via groups.io > =B7=A2=CB=CD=CA=B1=BC=E4: 2022=C4=EA12=D4=C21=C8=D5 10:35 > =CA=D5=BC=FE=C8=CB: devel@edk2.groups.io > =B3=AD=CB=CD: Ard Biesheuvel ; Jiewen Yao > ; Jordan Justen ; Gerd > Hoffmann ; Brijesh Singh ; > Erdem Aktas ; James Bottomley > ; Min Xu ; Tom Lendacky > ; Alexey Kardashevskiy > =D6=F7=CC=E2: [edk2-devel] [PATCH ovmf 1/5] MdePkg/Register/Amd: Define a= ll bits > from MSR_SEV_STATUS_REGISTER >=20 > We will need soon DebugSwap but others likely too. >=20 > Signed-off-by: Alexey Kardashevskiy > --- > MdePkg/Include/Register/Amd/Fam17Msr.h | 57 +++++++++++++++++++- > 1 file changed, 56 insertions(+), 1 deletion(-) >=20 > diff --git a/MdePkg/Include/Register/Amd/Fam17Msr.h > b/MdePkg/Include/Register/Amd/Fam17Msr.h > index bb4e143e2456..f9474e6776f2 100644 > --- a/MdePkg/Include/Register/Amd/Fam17Msr.h > +++ b/MdePkg/Include/Register/Amd/Fam17Msr.h > @@ -121,7 +121,62 @@ typedef union { > /// > UINT32 SevSnpBit : 1; >=20 > - UINT32 Reserved2 : 29; > + /// > + /// [Bit 3] The guest was run with the Virtual TOM feature enabled i= n > SEV_FEATURES[1] > + /// > + UINT32 vTOM_Enabled : 1; > + This name doesn't follow name convention. You can create pull request to se= e CI test result.=20 Thanks Liming > + /// > + /// [Bit 4] The guest was run with the ReflectVC feature enabled in > SEV_FEATURES[2] > + /// > + UINT32 ReflectVC : 1; > + > + /// > + /// [Bit 5] The guest was run with the Restricted Injection feature > enabled in SEV_FEATURES[3] > + /// > + UINT32 RestrictedInjection : 1; > + > + /// > + /// [Bit 6] The guest was run with the Alternate Injection feature > enabled in SEV_FEATURES[4] > + /// > + UINT32 AlternateInjection : 1; > + > + /// > + /// [Bit 7] This guest was run with debug register swapping enabled in > SEV_FEATURES[5] > + /// > + UINT32 DebugSwap : 1; > + > + /// > + /// [Bit 8] This guest was run with the PreventHostIBS feature > enabled in SEV_FEATURES[6] > + /// > + UINT32 PreventHostIBS : 1; > + > + /// > + /// [Bit 9] The guest was run with the BTB isolation feature enabled in > SEV_FEATURES[7] > + /// > + UINT32 SNPBTBIsolation : 1; > + > + /// > + /// [Bit 10] > + /// > + UINT32 Reserved0 : 1; > + > + /// > + /// [Bit 11] The guest was run with the Secure TSC feature enabled i= n > SEV_FEATURES[9] > + /// > + UINT32 SecureTsc : 1; > + > + /// > + /// [Bits 12 13 14 15] > + /// > + UINT32 Reserved1 : 4; > + > + /// > + /// [Bit 16] The guest was run with the VMSA Register Protection > feature enabled in SEV_FEATURES[14] > + /// > + UINT32 VmsaRegProt_Enabled : 1; > + > + UINT32 Reserved2 : 15; > } Bits; > /// > /// All bit fields as a 32-bit value > -- > 2.38.1 >=20 >=20 >=20 >=20 >=20