]> git.proxmox.com Git - mirror_edk2.git/blame - MdePkg/Include/ConfidentialComputingGuestAttr.h
UefiCpuPkg: Move AsmRelocateApLoopStart from Mpfuncs.nasm to AmdSev.nasm
[mirror_edk2.git] / MdePkg / Include / ConfidentialComputingGuestAttr.h
CommitLineData
26210f94 1/** @file\r
3d97733f 2Definitions for Confidential Computing Guest Attributes\r
26210f94
BS
3\r
4Copyright (c) 2021 AMD Inc. All rights reserved.<BR>\r
5SPDX-License-Identifier: BSD-2-Clause-Patent\r
6\r
7**/\r
8\r
9#ifndef CONFIDENTIAL_COMPUTING_GUEST_ATTR_H_\r
10#define CONFIDENTIAL_COMPUTING_GUEST_ATTR_H_\r
11\r
3d97733f
MX
12//\r
13// Confidential computing guest type\r
14//\r
15typedef enum {\r
16 CcGuestTypeNonEncrypted = 0,\r
17 CcGuestTypeAmdSev,\r
18 CcGuestTypeIntelTdx,\r
19} CC_GUEST_TYPE;\r
20\r
26210f94
BS
21typedef enum {\r
22 /* The guest is running with memory encryption disabled. */\r
23 CCAttrNotEncrypted = 0,\r
24\r
25 /* The guest is running with AMD SEV memory encryption enabled. */\r
26 CCAttrAmdSev = 0x100,\r
27 CCAttrAmdSevEs = 0x101,\r
28 CCAttrAmdSevSnp = 0x102,\r
29\r
30 /* The guest is running with Intel TDX memory encryption enabled. */\r
31 CCAttrIntelTdx = 0x200,\r
32} CONFIDENTIAL_COMPUTING_GUEST_ATTR;\r
33\r
d983b102
MX
34#define CC_GUEST_IS_TDX(x) ((x) == CCAttrIntelTdx)\r
35#define CC_GUEST_IS_SEV(x) ((x) == CCAttrAmdSev || (x) == CCAttrAmdSevEs || (x) == CCAttrAmdSevSnp)\r
36\r
26210f94 37#endif\r