summaryrefslogtreecommitdiff
path: root/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf
diff options
context:
space:
mode:
authorGerd Hoffmann <kraxel@redhat.com>2024-04-24 14:00:29 +0800
committermergify[bot] <37929162+mergify[bot]@users.noreply.github.com>2024-04-25 00:55:20 +0000
commit66c24219ade92b85b24f3ce29b988d187a9f6517 (patch)
treeab1ef3cf34bd26f25192ac4f7bcf0d5f5a0ac183 /OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf
parent90b6725562c82ec630d9e0cb19078f4b507db10b (diff)
downloadedk2-66c24219ade92b85b24f3ce29b988d187a9f6517.zip
edk2-66c24219ade92b85b24f3ce29b988d187a9f6517.tar.gz
edk2-66c24219ade92b85b24f3ce29b988d187a9f6517.tar.bz2
OvmfPkg/VirtHstiDxe: do not load driver in confidential guests
The VirtHstiDxe does not work in confidential guests. There also isn't anything we can reasonably test, neither flash storage nor SMM mode will be used in that case. So just skip driver load when running in a confidential guest. Cc: Ard Biesheuvel <ardb+tianocore@kernel.org> Cc: Jiewen Yao <jiewen.yao@intel.com> Fixes: 506740982bba ("OvmfPkg/VirtHstiDxe: add code flash check") Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> Tested-by: Srikanth Aithal <sraithal@amd.com> Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
Diffstat (limited to 'OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf')
-rw-r--r--OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf1
1 files changed, 1 insertions, 0 deletions
diff --git a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf
index 9514933..b5c2372 100644
--- a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf
+++ b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf
@@ -49,6 +49,7 @@
gUefiOvmfPkgTokenSpaceGuid.PcdSmmSmramRequire
[Pcd]
+ gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr
gUefiOvmfPkgTokenSpaceGuid.PcdBfvBase
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageVariableBase