From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (NAM11-DM6-obe.outbound.protection.outlook.com [40.107.223.58]) by mx.groups.io with SMTP id smtpd.web12.6762.1639020529593813650 for ; Wed, 08 Dec 2021 19:28:49 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="body hash did not verify" header.i=@amd.com header.s=selector1 header.b=5BAAWwkY; spf=permerror, err=parse error for token &{10 18 %{i}._ip.%{h}._ehlo.%{d}._spf.vali.email}: invalid domain name (domain: amd.com, ip: 40.107.223.58, mailfrom: brijesh.singh@amd.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CUhdTj3Ch4WXvlVyt1NJ+YJKLC6Bl+7XnYrIwq4Y5Mgf2NJ6jW1K/fWT1SfygioHgxkuTm4ehljtETep96gEMZjp1f2iXz+EM2ffs0KO+LwH31YlEd2G7thFFIJd8kpiekTy8MHb2NAjvfcufH2M1E95pSBoCAKZOy3Uip8YVC/zTdrVLxlz4dTPUoxgV8HyuHSYIuZjmt8SV5ETZcsYDi9uMwd3DsYK4ftYGv6UE0pRumOD+gG3d8pUlXYFnmem29dE1ClCBQwmdX7RsGmXH8MUyfRhv1GTB+Fzjj7Sc8pkTBSBZ2KTOQsM0K2kyJXOOusAB6R4z//q4/cuByKzcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=fyUM/arM6+ndN/DDKNHZaLKwpQ5dne/L8jjIPxhGeiM=; b=PxUg/MG52u5ZAkCBIKQFJhGzpQ9UPbzdfdFJUBqq1A4GBLkc8srP3Jf4MwbY+Xs1J8VpVURB4kCpPpnCooTNfEqNDKXC3v45Tchczr5sb3CUXujuzX2nZLdNmVkR07mH5dnD8+4rB2GNsS9WkwPvptvNFbFM/hZR3YrM6Ucwe0+m60ZmlClYMD9aouRGFldCbtIjIcrhU2TLeYScE5v0hmbFyezNtSPhKXkoJzbp4XiGTMW2ooPAzD8zCZCu1Ca3RodvddcBcAphBQsBFUPTasxPkOBZ2/AUjgyS0HDZzszcOePLqI6CFKXPn3RNLQNPtiL0h8x03A3KbNLXwUwr6g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fyUM/arM6+ndN/DDKNHZaLKwpQ5dne/L8jjIPxhGeiM=; b=5BAAWwkYzoQVHwnCzRo4Kk+P6iJ/XBWn/PuVZkk0TCxTdAars2MV6f5B9UAjIa6frc4mdwq0eiXC/pyL87uean8HmiglftfweOsRbOSGPQOHvcBhzf5a5rxRpDXp4Zsv65Qjod8iW0ftwSi079KmA8RlhBAWoknscSJ442mzSrE= Received: from MWHPR21CA0055.namprd21.prod.outlook.com (2603:10b6:300:db::17) by BN8PR12MB2947.namprd12.prod.outlook.com (2603:10b6:408:6c::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4755.11; Thu, 9 Dec 2021 03:28:47 +0000 Received: from CO1NAM11FT059.eop-nam11.prod.protection.outlook.com (2603:10b6:300:db:cafe::99) by MWHPR21CA0055.outlook.office365.com (2603:10b6:300:db::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4801.6 via Frontend Transport; Thu, 9 Dec 2021 03:28:47 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB03.amd.com; Received: from SATLEXMB03.amd.com (165.204.84.17) by CO1NAM11FT059.mail.protection.outlook.com (10.13.174.160) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.4755.13 via Frontend Transport; Thu, 9 Dec 2021 03:28:46 +0000 Received: from sbrijesh-desktop.amd.com (10.180.168.240) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.17; Wed, 8 Dec 2021 21:28:44 -0600 From: "Brijesh Singh" To: CC: James Bottomley , Min Xu , "Jiewen Yao" , Tom Lendacky , "Jordan Justen" , Ard Biesheuvel , Erdem Aktas , "Michael Roth" , Gerd Hoffmann , "Michael D Kinney" , Liming Gao , Zhiguang Liu , Ray Ni , Rahul Kumar , Eric Dong , Brijesh Singh , Michael Roth Subject: [PATCH v14 20/32] MdePkg: Define ConfidentialComputingGuestAttr Date: Wed, 8 Dec 2021 21:27:48 -0600 Message-ID: <20211209032800.3802995-21-brijesh.singh@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20211209032800.3802995-1-brijesh.singh@amd.com> References: <20211209032800.3802995-1-brijesh.singh@amd.com> MIME-Version: 1.0 Return-Path: brijesh.singh@amd.com X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB03.amd.com (10.181.40.144) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 7670ea7e-97c2-4c05-1b76-08d9bac402b3 X-MS-TrafficTypeDiagnostic: BN8PR12MB2947:EE_ X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:6108; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB03.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(36840700001)(46966006)(40470700001)(8936002)(26005)(8676002)(426003)(1076003)(7416002)(5660300002)(83380400001)(2616005)(508600001)(36756003)(316002)(40460700001)(54906003)(7696005)(16526019)(186003)(2906002)(336012)(966005)(81166007)(44832011)(36860700001)(86362001)(70206006)(70586007)(82310400004)(47076005)(356005)(6916009)(4326008)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Dec 2021 03:28:46.9722 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 7670ea7e-97c2-4c05-1b76-08d9bac402b3 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB03.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CO1NAM11FT059.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR12MB2947 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3275 While initializing APs, the MpInitLib may need to know whether the guest is running with active AMD SEV or Intel TDX memory encryption. Add a new ConfidentialComputingGuestAttr PCD that can be used to query the memory encryption attribute. Cc: Michael D Kinney Cc: Liming Gao Cc: Zhiguang Liu Cc: Michael Roth Cc: Ray Ni Cc: Rahul Kumar Cc: Eric Dong Cc: James Bottomley Cc: Min Xu Cc: Jiewen Yao Cc: Tom Lendacky Cc: Jordan Justen Cc: Ard Biesheuvel Cc: Erdem Aktas Cc: Gerd Hoffmann Acked-by: Ray Ni Suggested-by: Jiewen Yao Acked-by: Gerd Hoffmann Signed-off-by: Brijesh Singh --- MdePkg/MdePkg.dec | 4 +++ .../Include/ConfidentialComputingGuestAttr.h | 25 +++++++++++++++++++ 2 files changed, 29 insertions(+) create mode 100644 MdePkg/Include/ConfidentialComputingGuestAttr.h diff --git a/MdePkg/MdePkg.dec b/MdePkg/MdePkg.dec index 8b18415b107a..cd903c35d2ff 100644 --- a/MdePkg/MdePkg.dec +++ b/MdePkg/MdePkg.dec @@ -2396,5 +2396,9 @@ [PcdsFixedAtBuild, PcdsPatchableInModule, PcdsDynamic= , PcdsDynamicEx] # @Prompt FSB Clock. gEfiMdePkgTokenSpaceGuid.PcdFSBClock|200000000|UINT32|0x0000000c =20 + ## This dynamic PCD indicates the memory encryption attribute of the gue= st. + # @Prompt Memory encryption attribute + gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr|0|UINT64|0x00= 00002e + [UserExtensions.TianoCore."ExtraFiles"] MdePkgExtra.uni diff --git a/MdePkg/Include/ConfidentialComputingGuestAttr.h b/MdePkg/Inclu= de/ConfidentialComputingGuestAttr.h new file mode 100644 index 000000000000..6a1301801519 --- /dev/null +++ b/MdePkg/Include/ConfidentialComputingGuestAttr.h @@ -0,0 +1,25 @@ +/** @file +Definitions for Confidential Computing Attribute + +Copyright (c) 2021 AMD Inc. All rights reserved.
+SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#ifndef CONFIDENTIAL_COMPUTING_GUEST_ATTR_H_ +#define CONFIDENTIAL_COMPUTING_GUEST_ATTR_H_ + +typedef enum { + /* The guest is running with memory encryption disabled. */ + CCAttrNotEncrypted =3D 0, + + /* The guest is running with AMD SEV memory encryption enabled. */ + CCAttrAmdSev =3D 0x100, + CCAttrAmdSevEs =3D 0x101, + CCAttrAmdSevSnp =3D 0x102, + + /* The guest is running with Intel TDX memory encryption enabled. */ + CCAttrIntelTdx =3D 0x200, +} CONFIDENTIAL_COMPUTING_GUEST_ATTR; + +#endif --=20 2.25.1