]> git.proxmox.com Git - mirror_edk2.git/blobdiff - MdePkg/Include/IndustryStandard/WindowsSmmSecurityMitigationTable.h
UefiCpuPkg: Move AsmRelocateApLoopStart from Mpfuncs.nasm to AmdSev.nasm
[mirror_edk2.git] / MdePkg / Include / IndustryStandard / WindowsSmmSecurityMitigationTable.h
index 2b0a6446fa57060bb629127f06712d5600d58e44..786aea31c6774be6f04efaad3556f914945ad08f 100644 (file)
@@ -2,18 +2,11 @@
   Defines Windows SMM Security Mitigation Table\r
   @ https://msdn.microsoft.com/windows/hardware/drivers/bringup/acpi-system-description-tables#wsmt\r
 \r
-  Copyright (c) 2016, Intel Corporation. All rights reserved.<BR>\r
-  This program and the accompanying materials \r
-  are licensed and made available under the terms and conditions of the BSD License\r
-  which accompanies this distribution.  The full text of the license may be found at\r
-  http://opensource.org/licenses/bsd-license.php\r
-\r
-  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
-  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
+  Copyright (c) 2016 - 2018, Intel Corporation. All rights reserved.<BR>\r
+  SPDX-License-Identifier: BSD-2-Clause-Patent\r
 \r
 **/\r
 \r
-\r
 #ifndef _WINDOWS_SMM_SECURITY_MITIGATION_TABLE_H_\r
 #define _WINDOWS_SMM_SECURITY_MITIGATION_TABLE_H_\r
 \r
 #define EFI_WSMT_TABLE_REVISION  1\r
 \r
 typedef struct {\r
-  EFI_ACPI_DESCRIPTION_HEADER Header;\r
-  UINT32                      ProtectionFlags;\r
+  EFI_ACPI_DESCRIPTION_HEADER    Header;\r
+  UINT32                         ProtectionFlags;\r
 } EFI_ACPI_WSMT_TABLE;\r
 \r
-#define EFI_WSMT_PROTECTION_FLAGS_FIXED_COMM_BUFFERS                   0x1\r
-#define EFI_WSMT_PROTECTION_FLAGS_COMM_BUFFER_NESTED_PTR_PROTECTION    0x2\r
-#define EFI_WSMT_PROTECTION_FLAGS_SYSTEM_RESOURCE_PROTECTION           0x4\r
+#define EFI_WSMT_PROTECTION_FLAGS_FIXED_COMM_BUFFERS                 0x1\r
+#define EFI_WSMT_PROTECTION_FLAGS_COMM_BUFFER_NESTED_PTR_PROTECTION  0x2\r
+#define EFI_WSMT_PROTECTION_FLAGS_SYSTEM_RESOURCE_PROTECTION         0x4\r
 \r
 #pragma pack()\r
 \r