From nobody Fri Mar 29 13:59:17 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+85436+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+85436+1787277+3901457@groups.io ARC-Seal: i=1; a=rsa-sha256; t=1641786918; cv=none; d=zohomail.com; s=zohoarc; b=Qj60wby/+8pSPevsJ+4ptTlqswYh0EhEKbHcHMseDpnjLb6WPPPM3fFqIXBRvsckmT1wVvZdssH0/tv0S2UXLatK5IWco9xKwFeAEpiQS1VPNuobCxTB/BWoOQlL58HwFF4tfUiJq3hx4/hmZf4/OROmDX9uyN0otcb2b6MDboA= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1641786918; h=Content-Type:Cc:Date:From:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:Sender:Subject:To; bh=YNjF4FT9KryV2TzbDW/i217duFHbmTCclc2Tzp4IV94=; b=HWLfrCTCdvKGO0zdfs5NyQfBC/FlrDvypWN05pHmD1QjYoicKNpyWpfXJ16olASWjoB+jScxKIl0AH1onc3AzAqEQYttByNDKS9BY1EKFj9My+KuG9ji+/EnQ3Q0MW7g5DinJSobeHW2RGcljKs8+UKNLjhdM7lWnjrN8ozNu3o= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+85436+1787277+3901457@groups.io Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1641786918179511.47369800210276; Sun, 9 Jan 2022 19:55:18 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id quvpYY1788612xRivpdN7thY; Sun, 09 Jan 2022 19:55:17 -0800 X-Received: from mail-pf1-f202.google.com (mail-pf1-f202.google.com [209.85.210.202]) by mx.groups.io with SMTP id smtpd.web08.9333.1641575045439594671 for ; Fri, 07 Jan 2022 09:04:05 -0800 X-Received: by mail-pf1-f202.google.com with SMTP id m27-20020a62a21b000000b004bac77dbb41so4183157pff.6 for ; Fri, 07 Jan 2022 09:04:05 -0800 (PST) X-Gm-Message-State: dBKkPDG8EtF9rW5JjhVnMwDmx1787277AA= X-Google-Smtp-Source: ABdhPJx7c4DfvtwVG2RsOWhS1cOnZfX+GBhXPeTcUkpddMSGiDeFbgoAahJJXusNdploGCWqH3xT0ZOweXM= X-Received: from pgonda1.kir.corp.google.com ([2620:15c:29:203:288d:fe20:67e9:97f]) (user=pgonda job=sendgmr) by 2002:a63:3345:: with SMTP id z66mr46619510pgz.369.1641575044600; Fri, 07 Jan 2022 09:04:04 -0800 (PST) Date: Fri, 7 Jan 2022 09:04:00 -0800 Message-Id: Mime-Version: 1.0 Subject: [edk2-devel] [PATCH] OvmfPkg/ResetVector: Removing SEV-ES CPUID bit check From: "Peter Gonda via groups.io" To: devel@edk2.groups.io Cc: Peter Gonda , James Bottomley , Min Xu , Jiewen Yao , Tom Lendacky , Jordan Justen , Ard Biesheuvel , Laszlo Ersek , Erdem Aktas , Marc Orr , Brijesh Singh , Jim Mattson Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,pgonda@google.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1641786917; bh=mQyZGXRE5grJpII2AHcu57nvsapGLLf7HmMvv3D9IwU=; h=Cc:Content-Type:Date:From:Reply-To:Subject:To; b=NX3HzC/qTFEEEO52KmrMWAfOaESMURb5d21+gkbdAgzwbmBV2UOOeYHnZjycNKFpiqB HI1KpSnkGmNTcdahMbUXrD3PezYXREK5mEPHdW+2OC655x4ZEUhYN1hs36Y0d3chcGZsf GbDrd8S7a2WDVbIvfuj2FhSqP2gSpeXhssA= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1641786920407100001 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The SEV-ES bit of Fn800-001F[EAX] - Bit 3 is used for a host to determine support for running SEV-ES guests. It should not be checked by a guest to determine if it is running under SEV-ES. The guest should use the SEV_STATUS MSR Bit 1 to determine if SEV-ES is enabled. Cc: James Bottomley Cc: Min Xu Cc: Jiewen Yao Cc: Tom Lendacky Cc: Jordan Justen Cc: Ard Biesheuvel Cc: Laszlo Ersek Cc: Erdem Aktas Cc: Marc Orr Cc: Brijesh Singh Cc: Jim Mattson Signed-off-by: Peter Gonda --- OvmfPkg/ResetVector/Ia32/AmdSev.asm | 8 -------- 1 file changed, 8 deletions(-) diff --git a/OvmfPkg/ResetVector/Ia32/AmdSev.asm b/OvmfPkg/ResetVector/Ia32= /AmdSev.asm index 1f827da3b9..77692db27e 100644 --- a/OvmfPkg/ResetVector/Ia32/AmdSev.asm +++ b/OvmfPkg/ResetVector/Ia32/AmdSev.asm @@ -265,14 +265,6 @@ CheckSevFeatures: ; Set the work area header to indicate that the SEV is enabled mov byte[WORK_AREA_GUEST_TYPE], 1 =20 - ; Check for SEV-ES memory encryption feature: - ; CPUID Fn8000_001F[EAX] - Bit 3 - ; CPUID raises a #VC exception if running as an SEV-ES guest - mov eax, 0x8000001f - cpuid - bt eax, 3 - jnc GetSevEncBit - ; Check if SEV-ES is enabled ; MSR_0xC0010131 - Bit 1 (SEV-ES enabled) mov ecx, SEV_STATUS_MSR --=20 2.34.1.448.ga2b2bfdf31-goog -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#85436): https://edk2.groups.io/g/devel/message/85436 Mute This Topic: https://groups.io/mt/88316786/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-