From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by mx.groups.io with SMTP id smtpd.web09.4779.1648080680578717265 for ; Wed, 23 Mar 2022 17:11:28 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=cQASugyj; spf=pass (domain: intel.com, ip: 134.134.136.65, mailfrom: min.m.xu@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1648080688; x=1679616688; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=3Pl0tzWATbEabyvQve0xo7585NX+iLRVT78mE8nd1gg=; b=cQASugyj/JkPdwL55NzMF4ltUv1Hze5Ebgq7ZgHiGRGMVZAIz/SqdVFk +gUdNIOdlKkxN/ZjX3jj05TQlR6NIv5XAvzeNO286zuHo6KStozJirpmP qTBz6e1l81pUW5UgW2C9/BNbrwkn/5oHHOS0uYRQCPqUYSldRGk3VqBWK A7FWbs0RSA0ira1pjFS2uc51r7BP7mJD0j9oOj+w40CT7P4cTh+ucGEEV 6/liTXFhBdu1w4KcU+zYfzvCGuT24blHA/V8hbDB3QdO38ddK/JdoAQkJ IP00TFhRm0bKRba6bgmkBK04IxqHz7oa9/vkMpZkRkBkx5yCzysRCrBy3 w==; X-IronPort-AV: E=McAfee;i="6200,9189,10295"; a="258207188" X-IronPort-AV: E=Sophos;i="5.90,205,1643702400"; d="scan'208";a="258207188" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Mar 2022 17:11:27 -0700 X-IronPort-AV: E=Sophos;i="5.90,205,1643702400"; d="scan'208";a="649651111" Received: from mxu9-mobl1.ccr.corp.intel.com ([10.255.31.90]) by orsmga004-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Mar 2022 17:11:24 -0700 From: "Min Xu" To: devel@edk2.groups.io Cc: Min Xu , Michael Roth , Ray Ni , Rahul Kumar , Eric Dong , James Bottomley , Jiewen Yao , Tom Lendacky , Jordan Justen , Ard Biesheuvel , Erdem Aktas , Gerd Hoffmann , Michael D Kinney , Liming Gao , Zhiguang Liu Subject: [PATCH V10 13/47] MdePkg: Add macro to check SEV / TDX guest Date: Thu, 24 Mar 2022 08:09:59 +0800 Message-Id: <20220324001033.1169-14-min.m.xu@intel.com> X-Mailer: git-send-email 2.29.2.windows.2 In-Reply-To: <20220324001033.1169-1-min.m.xu@intel.com> References: <20220324001033.1169-1-min.m.xu@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit RFC: https://bugzilla.tianocore.org/show_bug.cgi?id=3429 Add macros CC_GUEST_IS_SEV / CC_GUEST_IS_TDX to check SEV / TDX guest. Cc: Michael Roth Cc: Ray Ni Cc: Rahul Kumar Cc: Eric Dong Cc: James Bottomley Cc: Min Xu Cc: Jiewen Yao Cc: Tom Lendacky Cc: Jordan Justen Cc: Ard Biesheuvel Cc: Erdem Aktas Cc: Gerd Hoffmann Cc: Michael D Kinney Cc: Liming Gao Cc: Zhiguang Liu Acked-by: Gerd Hoffmann Reviewed-by: Liming Gao Signed-off-by: Min Xu --- MdePkg/Include/ConfidentialComputingGuestAttr.h | 3 +++ 1 file changed, 3 insertions(+) diff --git a/MdePkg/Include/ConfidentialComputingGuestAttr.h b/MdePkg/Include/ConfidentialComputingGuestAttr.h index 6a1301801519..dd2541c6dcdf 100644 --- a/MdePkg/Include/ConfidentialComputingGuestAttr.h +++ b/MdePkg/Include/ConfidentialComputingGuestAttr.h @@ -22,4 +22,7 @@ typedef enum { CCAttrIntelTdx = 0x200, } CONFIDENTIAL_COMPUTING_GUEST_ATTR; +#define CC_GUEST_IS_TDX(x) ((x) == CCAttrIntelTdx) +#define CC_GUEST_IS_SEV(x) ((x) == CCAttrAmdSev || (x) == CCAttrAmdSevEs || (x) == CCAttrAmdSevSnp) + #endif -- 2.29.2.windows.2