From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: <bounce+27952+114650+7686176+12367111@groups.io>
Received: from mail02.groups.io (mail02.groups.io [66.175.222.108])
	by spool.mail.gandi.net (Postfix) with ESMTPS id CBE3B7803CC
	for <rebecca@openfw.io>; Sat, 27 Jan 2024 17:48:43 +0000 (UTC)
DKIM-Signature: a=rsa-sha256; bh=42VgpPF+ojYYFasDYziuq+GpuqPrITto9wJI48NheHw=;
 c=relaxed/simple; d=groups.io;
 h=ARC-Seal:ARC-Message-Signature:ARC-Authentication-Results:Message-ID:Date:User-Agent:Subject:To:Cc:References:From:In-Reply-To:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding;
 s=20140610; t=1706377722; v=1;
 b=eTqZaX/4iKIEK9Hi6tSRrpvKJ0Szs/LF6ABVMH1iONrv27upi0wohpaf9fS/KEaPT+uJ0JzG
 RJKLKxxzMxqxZJHGzUCZXhhIDIZcsi9rS+OLPnrCUU5K8flksVP9mKcKf7ZYeniYaBmDlFOkiwJ
 UxYuslmvYGdNXVoUPL3gzl/E=
X-Received: by 127.0.0.2 with SMTP id hJb3YY7687511xBoWugzy3bN; Sat, 27 Jan 2024 09:48:42 -0800
X-Received: from NAM12-DM6-obe.outbound.protection.outlook.com (NAM12-DM6-obe.outbound.protection.outlook.com [40.107.243.53])
 by mx.groups.io with SMTP id smtpd.web11.20880.1706377721326074015
 for <devel@edk2.groups.io>;
 Sat, 27 Jan 2024 09:48:41 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=H1jam5jQ24H9wC8qxZAKdzz7bRbLonTxZVPMxxWBGDAUVveNJLdqeD5PPxkskiH9eX1DYDeh0f4EnHzNvO1wdUAZOHSl0ACD133ipO/Y6xnWN+HvFS2tfEJlnPGUVBOy0dhFiSz0uHDgDiXSd12NmSEgNMB6UvR8azTY/KZPrWHoWVO0fC9tk84Dx0JfyvCxsxGw23NN4eXHM376fPdKmeFoiDAPdif9blsLcGJPaaJmMIAPtfh0vL1XlewC725GERNSUcjBgxV6F5yetV8TjvSSoi5pE8TfuGacqEN6qeiEQxbqjADC146KwCOJjrRU22BSRpkV3B+M+JdrjpxWTw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Mfiavur2SpR6RugMsOlZ0CpMDTsBynSKwAfaOXfEBMA=;
 b=TEZwlrDnm/ERK14fNOjK0IUGgEnLIi0Cjuz9G7pRMgqrzlhUnjVP652kHGFi0gUHETjyEku0G+W1NsD8fdDhxIN9KK/Qxwl1bOBph1oQqQRnO8SskTAGz3bko8lLoG8AI6oTceWosGa9gpuZYrtSmIwpLhMnmTQPI2dAiBsNw5pY52SN+moSyknynvKQIGT60EquR/Pj7DlzSl4EJ+boHJLeMrGXuhQWtIlEQ0rwfjd58LwUyuNOcDw8SWLbCUFOeuqP/AVkkr+Onvq1qP1vxePijCS1M8sWeo6/LfvUpiATW69z1osagp+ETHFwd4yTv748GY/bvUKSoxoFMOOVmg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass
 header.d=amd.com; arc=none
X-Received: from BL1PR12MB5732.namprd12.prod.outlook.com (2603:10b6:208:387::17)
 by BY5PR12MB4936.namprd12.prod.outlook.com (2603:10b6:a03:1d4::13) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7228.30; Sat, 27 Jan
 2024 17:48:36 +0000
X-Received: from BL1PR12MB5732.namprd12.prod.outlook.com
 ([fe80::200:c1d0:b9aa:e16c]) by BL1PR12MB5732.namprd12.prod.outlook.com
 ([fe80::200:c1d0:b9aa:e16c%4]) with mapi id 15.20.7228.029; Sat, 27 Jan 2024
 17:48:36 +0000
Message-ID: <0fa719f4-bdeb-ec82-1fe5-8e3254b6f3ee@amd.com>
Date: Sat, 27 Jan 2024 11:48:33 -0600
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
 Thunderbird/102.15.1
Subject: Re: [edk2-devel] [PATCH 00/16] Provide SEV-SNP support for running under an SVSM
To: "Yao, Jiewen" <jiewen.yao@intel.com>,
 "devel@edk2.groups.io" <devel@edk2.groups.io>
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>,
 "Aktas, Erdem" <erdemaktas@google.com>, Gerd Hoffmann <kraxel@redhat.com>,
 Laszlo Ersek <lersek@redhat.com>, Liming Gao <gaoliming@byosoft.com.cn>,
 "Kinney, Michael D" <michael.d.kinney@intel.com>,
 "Xu, Min M" <min.m.xu@intel.com>, "Liu, Zhiguang" <zhiguang.liu@intel.com>,
 "Kumar, Rahul R" <rahul.r.kumar@intel.com>, "Ni, Ray" <ray.ni@intel.com>,
 Michael Roth <michael.roth@amd.com>
References: <cover.1706307195.git.thomas.lendacky@amd.com>
 <MW4PR11MB5872462F1F0BF5D43C9B3E428C782@MW4PR11MB5872.namprd11.prod.outlook.com>
From: "Lendacky, Thomas via groups.io" <thomas.lendacky=amd.com@groups.io>
In-Reply-To: <MW4PR11MB5872462F1F0BF5D43C9B3E428C782@MW4PR11MB5872.namprd11.prod.outlook.com>
X-ClientProxiedBy: DS7PR07CA0001.namprd07.prod.outlook.com
 (2603:10b6:5:3af::10) To BL1PR12MB5732.namprd12.prod.outlook.com
 (2603:10b6:208:387::17)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: BL1PR12MB5732:EE_|BY5PR12MB4936:EE_
X-MS-Office365-Filtering-Correlation-Id: 37584157-5960-4845-4a8d-08dc1f603023
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Message-Info: 
	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
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?SXd3TnlxajRKWGZ2WW1iQXB1bU43UU1SUGtVZ2dWKzlKNU96VW83a2d3eFZX?=
 =?utf-8?B?aDZHZnRCK1J0QlBtTnppU3RwUFZNNzhlemtyYmRpVm16UmVWM2lob1dVRWNi?=
 =?utf-8?B?VzA2amRMR3g0WGtlZjFuamE5T0FRL1YvbnZWYTgrY1B6TmxLTFIwdFgxMXBF?=
 =?utf-8?B?VG1RK3BIMEZMMFhJaW5VVDlyc2ZLZWZTTVd0VGI4Z3M2Nm5Kb2x1MHJSNmZ1?=
 =?utf-8?B?d2ZpSTdGMXNWa2pDZW1aRUVNTHNWR283YlN1WDNZOGc3RGVsWWlIMGVIN2NO?=
 =?utf-8?B?TVNGWTVXZ1JhRWRGU1RzNkZ2S1dXNWJQV09LeDFCTHhCeDlSTi9zZktOOHF4?=
 =?utf-8?B?akZiUmJQSzdmdzVGOHpjV2M3blc4YkVLMlprS2E4aHZVL2lvZmFlYmtBWk00?=
 =?utf-8?B?S00yZjh3YkkvZU1VNzkrb3M2LzlFUTc2R2Yza0o4RHFTKzc4ck5yZXI2djkv?=
 =?utf-8?B?UWY0TkJNc2VrOTN2Z3B6OE0wZkw0QkVGYmN3TEFCeVM4K2tMVWxFNWs1Qk1a?=
 =?utf-8?B?eHNCRWY2WWVHb3BCRVNIN3hWUXV3NGt6OTRYRXF1OTR6RDRnQnlNaFlWUjhw?=
 =?utf-8?B?L3ZlU05zOTcvRE1OSTN6RXV1OGJZUm5OT2tMdVpxOVRFdjVsOEk3QmhiTGc1?=
 =?utf-8?B?bTdKdm95ZHBtQWlFVlZ1SCtzRWN1UUZ6SXRIRFNqUm82NG9kQmdlM2tOTVlh?=
 =?utf-8?B?d2NDeUZraXBxeEoxeW9SMTRHSGNPdmMrMmpCUkNZVzF3bzJJSmIxc290WXhH?=
 =?utf-8?B?bGxXN240MEowaUtsbmxKNjNsalhNZXl6Qzh1U2IraXlrV2EvWDFLWG5sUDRy?=
 =?utf-8?B?eWxUZFFVWjV6alcrNW16WFB5dGdSdTdrYUNNNUdnQmJiT0dSVzVJS3hJQ0Jh?=
 =?utf-8?B?YWMxMGNHN1o4ajZHN3J4ZFYycDVFZ2RjZFlLem5XV2RlRWNUWWRUa2M1WUJp?=
 =?utf-8?B?UlRVUG1uekxNd3VaZ2hjTHRueW1PeTQyMFZrZC85TGlzK0VrTi9JQklHNVd6?=
 =?utf-8?B?NElrNDRLc0U3VC9lRjNOc3dXU0U5RjNlbWpxSms5WXFVNktWaTVqRThtVFhT?=
 =?utf-8?B?QnA2a0RUdlV2ZURUbGI3MXVjVG5BU0krdmtJcXRaTmNXZjd4enZjWW1yMVZ2?=
 =?utf-8?B?NURjeWJ5cXRQL2tjRVZFWVR5cnE3RWJaTHE2ZUhOUTgvYkZHeFJsM2dTdWN3?=
 =?utf-8?B?OVB4L2UvLzdJOFVHL3dsR1cxT2JuWU5sMCtjL2cvQkpzUllCWG44RnZFNklx?=
 =?utf-8?B?VWlETXdnMGhXVlBheVRLVXVkcWtDTUhsUzhnK2hzcXpGcGJmbkQzaGhHbzhx?=
 =?utf-8?B?WFpULzRSR3d1SlZUMkl6SWhFNTR1aWZ5ZVZndDJhYUg0ZGJ5cFBDdkRLVWJX?=
 =?utf-8?B?bmNudDFmL1BzdVJFUHVEbVh5bGtzSWFkZE00K1JNN2RmcnJWMlhxN1VtUkVD?=
 =?utf-8?B?c1o5TmFUZlIzbFVteWFodEpqMnJYNnNod0syakNjYkxEOHVhUHVXMkJqMjNS?=
 =?utf-8?B?MW0waHdiZlRxTGFIOW9UZ1ZmbzJCSm9qR3RzRHJKMDlLR2RoalRnL0VIcDlN?=
 =?utf-8?B?OHVzRVF0L1pRWEkyMklTV05JMjVHR3lkT0xBWGJhc1FuRjczTHYrZU1aRThL?=
 =?utf-8?B?M1VpSnc1ejBJWHJPYVFVeVlLV1FmbHdINFNOWXdoK1VZNUFDeFYxLzd2SEVn?=
 =?utf-8?B?ZDFFSEFIUGlGeFJtL1lySEdFQXI1S3BHNG02MVFkQ3lTRG9WMlFTVitmWGZi?=
 =?utf-8?B?M1VEYnNUVXFXdDJGZkppa1owSitJekRJQ2NvQnNwN291M25aQUVTaGpPTFlu?=
 =?utf-8?B?OFpTT3JpR3ZjK24veXViNnNoaEduNldmOW9lcFFaNEtmYjMyOGNjUzYyVFo3?=
 =?utf-8?B?WnBqaUxJT0p1MjJYYVRhZHgvelVsNko5SkJoa2NnajBoSUxXRk9GdElCS2hx?=
 =?utf-8?B?b3RWTTFIRkNpWmVlQ3NqY1krR0RTUmlKKzd6bFovTVRQclBEQy9MSTJJMlI3?=
 =?utf-8?B?MlZwc1BkSWgxRlFCYWVLaGEwY2VHZGxVYnAxUHN1aGFjM094ajQ3N3ZnWnUv?=
 =?utf-8?B?VklkcmZLbGtvUldndVNVdnFBSHpwVUFzcU81U3JuRFNraHV6ZTB5VzkybTBl?=
 =?utf-8?Q?EB6UXB/M2LkoDVYakJGfbmT+0?=
X-OriginatorOrg: amd.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 37584157-5960-4845-4a8d-08dc1f603023
X-MS-Exchange-CrossTenant-AuthSource: BL1PR12MB5732.namprd12.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 27 Jan 2024 17:48:36.5680
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: qLZK02WjUqJGhmrOddL9wjsjcc83PrKepIEg814N0oX3zc6T9lw0Ge0XGZVcU3IUrywEbR3zV0FVuMHdB6yw6A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR12MB4936
Precedence: Bulk
List-Subscribe: <mailto:devel+subscribe@edk2.groups.io>
List-Help: <mailto:devel+help@edk2.groups.io>
Sender: devel@edk2.groups.io
List-Id: <devel.edk2.groups.io>
Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io
Reply-To: devel@edk2.groups.io,thomas.lendacky@amd.com
List-Unsubscribe-Post: List-Unsubscribe=One-Click
List-Unsubscribe: <https://edk2.groups.io/g/devel/leave/12367111/7686176/1913456212/plugh>
X-Gm-Message-State: dlllvBbdoXg8vt9EEkDMVXpKx7686176AA=
Content-Language: en-US
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: quoted-printable
X-GND-Status: LEGIT
Authentication-Results: spool.mail.gandi.net;
	dkim=pass header.d=groups.io header.s=20140610 header.b="eTqZaX/4";
	arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}");
	dmarc=none;
	spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io

On 1/26/24 22:04, Yao, Jiewen wrote:
> Thanks Tom.
> Please give me some time to digest this patch set before I can give some =
feedback.
>=20
> One quick question to you:
> With this patch, we need to support multiple SEV modes:
> 1. SEV guest firmware
> 2. SEV-ES guest firmware
> 3. SEV-SNP guest firmware
> 4. SEV-SNP SVSM guest firmware

This last mode is still an SNP guest, it just requires invoking an API to=
=20
perform operations that require VMPL0 permissions. I'm not sure what you=20
mean by having firmware at the end of each mode. The same firmware is used=
=20
for all SEV guest modes as well as non-SEV guests.

> And all these mode requires runtime detection. Am I right?

Yes

> If so, where is the flag to set those mode?

There are function calls available to detect the SEV mode. See the=20
implementation of MemEncryptSevIsEnabled(), MemEncryptSevEsIsEnabled() and=
=20
MemEncryptSevSnpIsEnabled().

OvmfPkg/Library/BaseMemEncryptSevLib/SecMemEncryptSevLibInternal.c
OvmfPkg/Library/BaseMemEncryptSevLib/PeiMemEncryptSevLibInternal.c
OvmfPkg/Library/BaseMemEncryptSevLib/DxeMemEncryptSevLibInternal.c

(OvmfPkg/Sec/AmdSev.c also has some early detection support)

Note:
   - An SEV-SNP guest is also considered an SEV-ES and SEV guest.
   - An SEV-ES guest is also considered an SEV guest.

Within the CcExitLib library, the decision to use the SVSM API will be=20
based on the VMPL level at which OVMF is running.

Thanks,
Tom

>=20
> Please correct me if my understanding is wrong.
>=20
> Thank you
> Yao, Jiewen
>=20
>> -----Original Message-----
>> From: Tom Lendacky <thomas.lendacky@amd.com>
>> Sent: Saturday, January 27, 2024 6:13 AM
>> To: devel@edk2.groups.io
>> Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>; Aktas, Erdem
>> <erdemaktas@google.com>; Gerd Hoffmann <kraxel@redhat.com>; Yao, Jiewen
>> <jiewen.yao@intel.com>; Laszlo Ersek <lersek@redhat.com>; Liming Gao
>> <gaoliming@byosoft.com.cn>; Kinney, Michael D <michael.d.kinney@intel.co=
m>;
>> Xu, Min M <min.m.xu@intel.com>; Liu, Zhiguang <zhiguang.liu@intel.com>;
>> Kumar, Rahul R <rahul.r.kumar@intel.com>; Ni, Ray <ray.ni@intel.com>; Mi=
chael
>> Roth <michael.roth@amd.com>
>> Subject: [PATCH 00/16] Provide SEV-SNP support for running under an SVSM
>>
>>
>> BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3D4654
>>
>> This series adds SEV-SNP support for running OVMF under an Secure VM
>> Service Module (SVSM) at a less privileged VM Privilege Level (VMPL).
>> By running at a less priviledged VMPL, the SVSM can be used to provide
>> services, e.g. a virtual TPM, for the guest OS within the SEV-SNP
>> confidential VM (CVM) rather than trust such services from the hyperviso=
r.
>>
>> Currently, OVMF expects to run at the highest VMPL, VMPL0, and there are
>> certain SNP related operations that require that VMPL level. Specificall=
y,
>> the PVALIDATE instruction and the RMPADJUST instruction when setting the
>> the VMSA attribute of a page (used when starting APs).
>>
>> If OVMF is to run at a less privileged VMPL, e.g. VMPL2, then it must
>> use an SVSM (which is running at VMPL0) to perform the operations that
>> it is no longer able to perform.
>>
>> How OVMF interacts with and uses the SVSM is documented in the SVSM
>> specification [1] and the GHCB specification [2].
>>
>> This series introduces support to run OVMF under an SVSM. It consists
>> of:
>>    - Reorganize the page state change support to not directly use the
>>      GHCB buffer since an SVSM will use the calling area buffer, instead
>>    - Detecting the presence of an SVSM
>>    - When not running at VMPL0, invoking the SVSM for page validation an=
d
>>      VMSA page creation/deletion
>>    - Retrieving the list of vCPU APIC IDs and starting up all APs withou=
t
>>      performing a broadcast SIPI
>>    - Detecting and allowing OVMF to run in a VMPL other than 0 when an
>>      SVSM is present
>>
>> The series is based off of commit:
>>
>>    7d7decfa3dc8 ("UefiPayloadPkg/Crypto: Support external Crypto drivers=
.")
>>
>> [1] https://www.amd.com/content/dam/amd/en/documents/epyc-technical-
>> docs/specifications/58019.pdf
>> [2] https://www.amd.com/content/dam/amd/en/documents/epyc-technical-
>> docs/specifications/56421.pdf
>>
>> ---
>>
>> Tom Lendacky (16):
>>    OvmfPkg/BaseMemEncryptSevLib: Re-organize page state change support
>>    MdePkg/Register/Amd: Define the SVSM related information
>>    MdePkg/BaseLib: Add a new VMGEXIT instruction invocation for SVSM
>>    UefiCpuPkg/CcExitLib: Extend the CcExitLib library to support an SVSM
>>    Ovmfpkg/CcExitLib: Extend CcExitLib to handle SVSM related services
>>    OvmfPkg: Create a calling area used to communicate with the SVSM
>>    OvmfPkg/CcExitLib: Add support for the SVSM_CORE_PVALIDATE call
>>    OvmfPkg/CcExitLib: Add support for the SVSM create/delete vCPU calls
>>    UefiCpuPkg/MpInitLib: Use CcExitSnpVmsaRmpAdjust() to set/clear VMSA
>>    MdePkg: GHCB APIC ID retrieval support definitions
>>    UefiCpuPkg: Create APIC ID list PCD
>>    OvmfPkg/PlatformPei: Retrieve APIC IDs from the hypervisor
>>    UefiCpuPkg/MpInitLib: Always use AP Create if PcdSevSnpApicIds is set
>>    UefiCpuPkg/MpInitLib: AP creation support under an SVSM
>>    Ovmfpkg/CcExitLib: Provide SVSM discovery support
>>    OvmfPkg/BaseMemEncryptLib: Check for presence of an SVSM when not at
>>      VMPL0
>>
>>   OvmfPkg/OvmfPkg.dec                                                   =
|   4 +
>>   UefiCpuPkg/UefiCpuPkg.dec                                             =
|   7 +-
>>   OvmfPkg/AmdSev/AmdSevX64.fdf                                          =
|   9 +-
>>   OvmfPkg/OvmfPkgX64.fdf                                                =
|   3 +
>>   MdePkg/Library/BaseLib/BaseLib.inf                                    =
|   2 +
>>   OvmfPkg/Library/CcExitLib/CcExitLib.inf                               =
|   5 +-
>>   OvmfPkg/Library/CcExitLib/SecCcExitLib.inf                            =
|   5 +-
>>   OvmfPkg/PlatformPei/PlatformPei.inf                                   =
|   3 +
>>   OvmfPkg/ResetVector/ResetVector.inf                                   =
|   2 +
>>   UefiCpuPkg/Library/MpInitLib/DxeMpInitLib.inf                         =
|   1 +
>>   UefiCpuPkg/Library/MpInitLib/PeiMpInitLib.inf                         =
|   3 +-
>>   MdePkg/Include/Library/BaseLib.h                                      =
|  39 ++
>>   MdePkg/Include/Register/Amd/Fam17Msr.h                                =
|  19 +-
>>   MdePkg/Include/Register/Amd/Ghcb.h                                    =
|  19 +-
>>   MdePkg/Include/Register/Amd/Msr.h                                     =
|   3 +-
>>   MdePkg/Include/Register/Amd/Svsm.h                                    =
| 101 ++++
>>   MdePkg/Include/Register/Amd/SvsmMsr.h                                 =
|  35 ++
>>   OvmfPkg/Include/WorkArea.h                                            =
|   7 +
>>   OvmfPkg/Library/BaseMemEncryptSevLib/X64/SnpPageStateChange.h         =
|   4
>> +-
>>   OvmfPkg/Library/CcExitLib/CcExitSvsm.h                                =
|  29 ++
>>   UefiCpuPkg/Include/Library/CcExitLib.h                                =
|  71 ++-
>>   UefiCpuPkg/Library/MpInitLib/MpLib.h                                  =
|  27 +-
>>   OvmfPkg/Library/BaseMemEncryptSevLib/X64/DxeSnpSystemRamValidate.c    =
|
>> 16 +-
>>   OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c        =
|  25
>> +-
>>   OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiSnpSystemRamValidate.c    =
|
>> 20 +-
>>   OvmfPkg/Library/BaseMemEncryptSevLib/X64/SecSnpSystemRamValidate.c    =
|
>> 25 +-
>>   OvmfPkg/Library/BaseMemEncryptSevLib/X64/SnpPageStateChangeInternal.c =
|
>> 203 ++++----
>>   OvmfPkg/Library/CcExitLib/CcExitSvsm.c                                =
| 532
>> ++++++++++++++++++++
>>   OvmfPkg/Library/CcExitLib/CcExitVcHandler.c                           =
|  29 +-
>>   OvmfPkg/PlatformPei/AmdSev.c                                          =
| 100 +++-
>>   UefiCpuPkg/Library/CcExitLibNull/CcExitLibNull.c                      =
|  82 ++-
>>   UefiCpuPkg/Library/MpInitLib/Ia32/AmdSev.c                            =
|  19 +-
>>   UefiCpuPkg/Library/MpInitLib/MpLib.c                                  =
|   7 +-
>>   UefiCpuPkg/Library/MpInitLib/X64/AmdSev.c                             =
| 127 +++--
>>   MdePkg/Library/BaseLib/Ia32/VmgExitSvsm.nasm                          =
|  39 ++
>>   MdePkg/Library/BaseLib/X64/VmgExitSvsm.nasm                           =
|  94 ++++
>>   OvmfPkg/ResetVector/ResetVector.nasmb                                 =
|   6 +-
>>   OvmfPkg/ResetVector/X64/OvmfSevMetadata.asm                           =
|   9 +
>>   UefiCpuPkg/UefiCpuPkg.uni                                             =
|   3 +
>>   39 files changed, 1524 insertions(+), 210 deletions(-)
>>   create mode 100644 MdePkg/Include/Register/Amd/Svsm.h
>>   create mode 100644 MdePkg/Include/Register/Amd/SvsmMsr.h
>>   create mode 100644 OvmfPkg/Library/CcExitLib/CcExitSvsm.h
>>   create mode 100644 OvmfPkg/Library/CcExitLib/CcExitSvsm.c
>>   create mode 100644 MdePkg/Library/BaseLib/Ia32/VmgExitSvsm.nasm
>>   create mode 100644 MdePkg/Library/BaseLib/X64/VmgExitSvsm.nasm
>>
>> --
>> 2.42.0
>=20


-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#114650): https://edk2.groups.io/g/devel/message/114650
Mute This Topic: https://groups.io/mt/103986434/7686176
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io]
-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-