From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (NAM12-MW2-obe.outbound.protection.outlook.com [40.107.244.80]) by mx.groups.io with SMTP id smtpd.web09.232.1653060521280863670 for ; Fri, 20 May 2022 08:28:41 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@amd.com header.s=selector1 header.b=OIgn3gRK; spf=permerror, err=parse error for token &{10 18 %{i}._ip.%{h}._ehlo.%{d}._spf.vali.email}: invalid domain name (domain: amd.com, ip: 40.107.244.80, mailfrom: michael.roth@amd.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HFx4gtqFaE2QZDckTlg3xJCb2AWsgG5EgoddL2S6TW/JmBzAv9mkBKbrv56c63P4AP/Seru03qJGU8twQwkFliZL+FptJO8+q48SWqZXXjtIaCNlHrvYoT2nmwhAHH2kWjITk5bwEw0cFjc6AU3G+ceJc2/4o0JhVlmN79NkGYjY4Z9qd+ZM3dd2IXvyr36bNkQpEcmhacXR0h2+QKm+iA6Tug373tPgwSOCbSyWpQmL2NtHtdwx1ZUmS9FjtjN3K0MYmQrtE4QMPpG/5RWk6h4pzq1Al7shXdMcYmW+TJ7USB+jNfOHqnf2uK2IRGmBRZugNtrAr5rYyli53/viRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JJ1OpqByW1A5MC0EqxJGNsE8oaEFvMgEOaN29akKLCU=; b=Ns7G7t5wY/aT0S0wROVF7vzqwzbOjdf4/FPP4PLH81t2mDZlpnAgGXzR1Lwk0SuY6R0L/HkZLm/zEu2Z4JmohkD4vwU9YJHUEmT7gL8Bz069Db0KiCxhqXqZr0Wv9FUAKppehkCrueTfBio2xFdngGci4GkHqyfxeDn9QY7PkARWn0YVfX3kOO9dtpzbLTDzal62hGdU1ctVw/uDiUotHglerVooDq6OA+Sp+Mu5WsndZ/eKOBWSxEbiRUzIqJ7lLa1u96IUWhXmmfShFjGAFs1jlxzzs8DKDg2aW2tCchC9QkubYF6/D1RW7bVykLXTScowl3Kv8Tj3emkrbKJMIQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JJ1OpqByW1A5MC0EqxJGNsE8oaEFvMgEOaN29akKLCU=; b=OIgn3gRKM/vvJX5l2u8HKZyi6xtqZcBGib7O0Pg6h2KrfTh4z6ZdM4KeCumr6i8DwhmWHokmUPAvn5TSJM4koLzWMyT7yGK9IbfJIEgZb7PrkgLZ/nMAIzOu2Me8asLK1NgGe5sx9BTHPwiNDx/UomogXgD434ft6G2kQRvXJkY= Received: from DM6PR04CA0012.namprd04.prod.outlook.com (2603:10b6:5:334::17) by DM4PR12MB5102.namprd12.prod.outlook.com (2603:10b6:5:391::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5273.15; Fri, 20 May 2022 15:28:39 +0000 Received: from DM6NAM11FT004.eop-nam11.prod.protection.outlook.com (2603:10b6:5:334:cafe::31) by DM6PR04CA0012.outlook.office365.com (2603:10b6:5:334::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5273.13 via Frontend Transport; Fri, 20 May 2022 15:28:39 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by DM6NAM11FT004.mail.protection.outlook.com (10.13.172.217) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.5273.14 via Frontend Transport; Fri, 20 May 2022 15:28:39 +0000 Received: from localhost (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Fri, 20 May 2022 10:28:38 -0500 From: Michael Roth To: CC: Tom Lendacky , "Ni, Ray" Subject: [PATCH v3 1/4] MdePkg: Add header for SEV-SNP secrets page struct Date: Fri, 20 May 2022 10:27:27 -0500 Message-ID: <20220520152730.7924-2-michael.roth@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220520152730.7924-1-michael.roth@amd.com> References: <20220520152730.7924-1-michael.roth@amd.com> MIME-Version: 1.0 Return-Path: Michael.Roth@amd.com X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: f1fa5241-9b8b-4ffc-4896-08da3a756a30 X-MS-TrafficTypeDiagnostic: DM4PR12MB5102:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(36860700001)(54906003)(44832011)(2906002)(6916009)(40460700003)(8936002)(70586007)(70206006)(8676002)(356005)(4326008)(81166007)(5660300002)(186003)(16526019)(83380400001)(508600001)(86362001)(1076003)(82310400005)(47076005)(336012)(426003)(26005)(6666004)(316002)(2616005)(36756003)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 May 2022 15:28:39.2386 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: f1fa5241-9b8b-4ffc-4896-08da3a756a30 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DM6NAM11FT004.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR12MB5102 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain This will be needed so that the AP Jump Table address can be stored for use by the operating system later, and possibly for other things in the future. Signed-off-by: Michael Roth --- MdePkg/Include/Register/Amd/SnpSecretsPage.h | 56 ++++++++++++++++++++ 1 file changed, 56 insertions(+) create mode 100644 MdePkg/Include/Register/Amd/SnpSecretsPage.h diff --git a/MdePkg/Include/Register/Amd/SnpSecretsPage.h b/MdePkg/Include/= Register/Amd/SnpSecretsPage.h new file mode 100644 index 0000000000..3188459150 --- /dev/null +++ b/MdePkg/Include/Register/Amd/SnpSecretsPage.h @@ -0,0 +1,56 @@ +/** @file=0D +Definitions for AMD SEV-SNP Secrets Page=0D +=0D +Copyright (c) 2022 AMD Inc. All rights reserved.
=0D +SPDX-License-Identifier: BSD-2-Clause-Patent=0D +=0D +**/=0D +=0D +#ifndef SNP_SECRETS_PAGE_H_=0D +#define SNP_SECRETS_PAGE_H_=0D +=0D +//=0D +// OS-defined area of secrets page=0D +//=0D +// As defined by "SEV-ES Guest-Hypervisor Communication Block Standardizat= ion",=0D +// revision 2.01, section 2.7, "SEV-SNP Secrets Page".=0D +//=0D +typedef PACKED struct _SNP_SECRETS_OS_AREA {=0D + UINT32 Vmpl0MsgSeqNumLo;=0D + UINT32 Vmpl1MsgSeqNumLo;=0D + UINT32 Vmpl2MsgSeqNumLo;=0D + UINT32 Vmpl3MsgSeqNumLo;=0D + UINT64 ApJumpTablePa;=0D + UINT32 Vmpl0MsgSeqNumHi;=0D + UINT32 Vmpl1MsgSeqNumHi;=0D + UINT32 Vmpl2MsgSeqNumHi;=0D + UINT32 Vmpl3MsgSeqNumHi;=0D + UINT8 Reserved2[22];=0D + UINT16 Version;=0D + UINT8 GuestUsage[32];=0D +} SNP_SECRETS_OS_AREA;=0D +=0D +#define VMPCK_KEY_LEN 32=0D +=0D +//=0D +// SEV-SNP Secrets page=0D +//=0D +// As defined by "SEV-SNP Firmware ABI", revision 1.51, section 8.17.2.5,= =0D +// "PAGE_TYPE_SECRETS".=0D +//=0D +typedef PACKED struct _SNP_SECRETS_PAGE {=0D + UINT32 Version;=0D + UINT32 ImiEn : 1,=0D + Reserved : 31;=0D + UINT32 Fms;=0D + UINT32 Reserved2;=0D + UINT8 Gosvw[16];=0D + UINT8 Vmpck0[VMPCK_KEY_LEN];=0D + UINT8 Vmpck1[VMPCK_KEY_LEN];=0D + UINT8 Vmpck2[VMPCK_KEY_LEN];=0D + UINT8 Vmpck3[VMPCK_KEY_LEN];=0D + SNP_SECRETS_OS_AREA OsArea;=0D + UINT8 Reserved3[3840];=0D +} SNP_SECRETS_PAGE;=0D +=0D +#endif=0D --=20 2.25.1