- UINT32 Reserved2 : 29; + /// + /// [Bit 3] The guest was run with the Virtual TOM feature enabled in SEV_FEATURES[1] + /// + UINT32 vTOM_Enabled : 1; +
This name doesn't follow name convention. You can create pull request to see CI test result.
Thanks Liming
+ /// + /// [Bit 4] The guest was run with the ReflectVC feature enabled in SEV_FEATURES[2] + /// + UINT32 ReflectVC : 1; + + /// + /// [Bit 5] The guest was run with the Restricted Injection feature enabled in SEV_FEATURES[3] + /// + UINT32 RestrictedInjection : 1; + + /// + /// [Bit 6] The guest was run with the Alternate Injection feature enabled in SEV_FEATURES[4] + /// + UINT32 AlternateInjection : 1; + + /// + /// [Bit 7] This guest was run with debug register swapping enabled
in
SEV_FEATURES[5] + /// + UINT32 DebugSwap : 1; + + /// + /// [Bit 8] This guest was run with the PreventHostIBS feature enabled in SEV_FEATURES[6] + /// + UINT32 PreventHostIBS : 1; + + /// + /// [Bit 9] The guest was run with the BTB isolation feature enabled
in
SEV_FEATURES[7] + /// + UINT32 SNPBTBIsolation : 1; + + /// + /// [Bit 10] + /// + UINT32 Reserved0 : 1; + + /// + /// [Bit 11] The guest was run with the Secure TSC feature enabled in SEV_FEATURES[9] + /// + UINT32 SecureTsc : 1; + + /// + /// [Bits 12 13 14 15] + /// + UINT32 Reserved1 : 4; + + /// + /// [Bit 16] The guest was run with the VMSA Register Protection feature enabled in SEV_FEATURES[14] + /// + UINT32 VmsaRegProt_Enabled : 1; + + UINT32 Reserved2 : 15; } Bits; /// /// All bit fields as a 32-bit value -- 2.38.1
- UINT32 Reserved2 : 29; + /// + /// [Bit 3] The guest was run with the Virtual TOM feature enabled in SEV_FEATURES[1] + /// + UINT32 vTOM_Enabled : 1; +
This name doesn't follow name convention. You can create pull request to see CI test result.
It is though what 40332.pdf ("AMD64 Architecture Programmer’s Manual: Volumes 1-5") uses and I find it _extremely_ useful when searching for a feature in 3000+ pages PDF.
What is the preferred way?
Thanks,
Thanks Liming
+ /// + /// [Bit 4] The guest was run with the ReflectVC feature enabled in SEV_FEATURES[2] + /// + UINT32 ReflectVC : 1; + + /// + /// [Bit 5] The guest was run with the Restricted Injection feature enabled in SEV_FEATURES[3] + /// + UINT32 RestrictedInjection : 1; + + /// + /// [Bit 6] The guest was run with the Alternate Injection feature enabled in SEV_FEATURES[4] + /// + UINT32 AlternateInjection : 1; + + /// + /// [Bit 7] This guest was run with debug register swapping enabled
in
SEV_FEATURES[5] + /// + UINT32 DebugSwap : 1; + + /// + /// [Bit 8] This guest was run with the PreventHostIBS feature enabled in SEV_FEATURES[6] + /// + UINT32 PreventHostIBS : 1; + + /// + /// [Bit 9] The guest was run with the BTB isolation feature enabled
in
SEV_FEATURES[7] + /// + UINT32 SNPBTBIsolation : 1; + + /// + /// [Bit 10] + /// + UINT32 Reserved0 : 1; + + /// + /// [Bit 11] The guest was run with the Secure TSC feature enabled in SEV_FEATURES[9] + /// + UINT32 SecureTsc : 1; + + /// + /// [Bits 12 13 14 15] + /// + UINT32 Reserved1 : 4; + + /// + /// [Bit 16] The guest was run with the VMSA Register Protection feature enabled in SEV_FEATURES[14] + /// + UINT32 VmsaRegProt_Enabled : 1; + + UINT32 Reserved2 : 15; } Bits; /// /// All bit fields as a 32-bit value -- 2.38.1