From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pf1-f202.google.com (mail-pf1-f202.google.com [209.85.210.202]) by mx.groups.io with SMTP id smtpd.web08.9333.1641575045439594671 for ; Fri, 07 Jan 2022 09:04:05 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@google.com header.s=20210112 header.b=TNfYbUGj; spf=pass (domain: flex--pgonda.bounces.google.com, ip: 209.85.210.202, mailfrom: 3hhlyyqykbd8qhpoebhpphmf.dpnefwfmfeld.hspvqt.jp@flex--pgonda.bounces.google.com) Received: by mail-pf1-f202.google.com with SMTP id m27-20020a62a21b000000b004bac77dbb41so4183157pff.6 for ; Fri, 07 Jan 2022 09:04:05 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:message-id:mime-version:subject:from:to:cc; bh=ACO8qba2P+5N590uCbNzY7GqfMQXhZzQ1ChTrNd1klA=; b=TNfYbUGjqjd5z6y10AgP4TjvmQ7+vkYeYoV/FahJKJxbhDltlINp7pAdb4A/M9RBu2 9ZLA9pl0GTs/KdB/qSMUknhEHQfXe7qLHAGYCWOd/dqk95lx9AqZKBU8vbyLLWsKUYc1 AV00WH+0p/iM68T11nwE8iOx2wL/93s5njd8i493IeJad0lo8+E3eoh5Dob+j/pE3vKG VWlDs6nyDIXVteQCyzRVQq8nTv6lor4v8tpFH0UJXAvcKSpgXnr4EUkoLj2Z+AUALyea T1vqZT4h0/4qKODpMe5h6I42xPdKZCFCyOr7279WtSHIhidxPycUNoIa6glg146jPu65 Bnhw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:message-id:mime-version:subject:from:to:cc; bh=ACO8qba2P+5N590uCbNzY7GqfMQXhZzQ1ChTrNd1klA=; b=MABqGwagnnqbANicLcP5RVvR0hHACGs+Ktxm5Yn2f/hsXm96W0YI52MfdS6dbuNFRS TJYfeYNckvv2c8TVufsNExib6Esr8EKtifuV5XoXG33LYvxW5S/vv/vOxAwyeB40toAD 6YjCJZWUigvvzW8cAnRg1pufu+cYJWU/2IbDt/ihCaxUFn0J57Et+lUedGFh3EtOiTgR 3swW9zdy+PQ/2j5GHZWnX/TVjWBnTAvrwpswjPrDcurJDdnJi4hqRRy7z80hg3IdioOP Z8+reayX+ZnJ1AeFa3UDe3YoyS3lG8zwFpc/86YapDMuZPWJzcAvD16cCJqI8J11wfI/ hJgg== X-Gm-Message-State: AOAM5318y933WHsQM++uOGyOxrVFPvrx2CJItFMbTyBbCv3iymMWBmVQ 2V04cj5Vj2bdm019Cp3H+fpg6w9Mh3/hxeumSuFjBewMIWu/IIl17NPAi5p0Nmwu7Tx+WUnU62F 6MFlne9tgWYa+6+Wx2QVvftBfOAXQljtVBqLT+h7nClLWVp9rq4YEj2V8GaM= X-Google-Smtp-Source: ABdhPJx7c4DfvtwVG2RsOWhS1cOnZfX+GBhXPeTcUkpddMSGiDeFbgoAahJJXusNdploGCWqH3xT0ZOweXM= X-Received: from pgonda1.kir.corp.google.com ([2620:15c:29:203:288d:fe20:67e9:97f]) (user=pgonda job=sendgmr) by 2002:a63:3345:: with SMTP id z66mr46619510pgz.369.1641575044600; Fri, 07 Jan 2022 09:04:04 -0800 (PST) Date: Fri, 7 Jan 2022 09:04:00 -0800 Message-Id: Mime-Version: 1.0 X-Mailer: git-send-email 2.34.1.575.g55b058a8bb-goog Subject: [PATCH] OvmfPkg/ResetVector: Removing SEV-ES CPUID bit check From: pgonda@google.com To: devel@edk2.groups.io Cc: Peter Gonda , James Bottomley , Min Xu , Jiewen Yao , Tom Lendacky , Jordan Justen , Ard Biesheuvel , Laszlo Ersek , Erdem Aktas , Marc Orr , Brijesh Singh , Jim Mattson Content-Type: text/plain; charset="UTF-8" The SEV-ES bit of Fn800-001F[EAX] - Bit 3 is used for a host to determine support for running SEV-ES guests. It should not be checked by a guest to determine if it is running under SEV-ES. The guest should use the SEV_STATUS MSR Bit 1 to determine if SEV-ES is enabled. Cc: James Bottomley Cc: Min Xu Cc: Jiewen Yao Cc: Tom Lendacky Cc: Jordan Justen Cc: Ard Biesheuvel Cc: Laszlo Ersek Cc: Erdem Aktas Cc: Marc Orr Cc: Brijesh Singh Cc: Jim Mattson Signed-off-by: Peter Gonda --- OvmfPkg/ResetVector/Ia32/AmdSev.asm | 8 -------- 1 file changed, 8 deletions(-) diff --git a/OvmfPkg/ResetVector/Ia32/AmdSev.asm b/OvmfPkg/ResetVector/Ia32/AmdSev.asm index 1f827da3b9..77692db27e 100644 --- a/OvmfPkg/ResetVector/Ia32/AmdSev.asm +++ b/OvmfPkg/ResetVector/Ia32/AmdSev.asm @@ -265,14 +265,6 @@ CheckSevFeatures: ; Set the work area header to indicate that the SEV is enabled mov byte[WORK_AREA_GUEST_TYPE], 1 - ; Check for SEV-ES memory encryption feature: - ; CPUID Fn8000_001F[EAX] - Bit 3 - ; CPUID raises a #VC exception if running as an SEV-ES guest - mov eax, 0x8000001f - cpuid - bt eax, 3 - jnc GetSevEncBit - ; Check if SEV-ES is enabled ; MSR_0xC0010131 - Bit 1 (SEV-ES enabled) mov ecx, SEV_STATUS_MSR -- 2.34.1.448.ga2b2bfdf31-goog