mirror of https://github.com/acidanthera/audk.git
OvmfPkg/QemuFwCfgDxeLib: use PcdConfidentialComputingGuestAttr
Check PcdConfidentialComputingGuestAttr instead of calling MemEncryptSevIsEnabled() and MemEncryptTdxIsEnabled() to figure whenever SEV or TDX is enabled. This allows to remove the MemEncryptSevLib + MemEncryptTdxLib dependencies. Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
This commit is contained in:
parent
194cdc1700
commit
775d6cd7ed
|
@ -56,6 +56,7 @@ QemuFwCfgInitialize (
|
|||
{
|
||||
UINT32 Signature;
|
||||
UINT32 Revision;
|
||||
UINT64 CcGuestAttr;
|
||||
|
||||
//
|
||||
// Enable the access routines while probing to see if it is supported.
|
||||
|
@ -86,7 +87,10 @@ QemuFwCfgInitialize (
|
|||
DEBUG ((DEBUG_INFO, "QemuFwCfg interface (DMA) is supported.\n"));
|
||||
}
|
||||
|
||||
if (mQemuFwCfgDmaSupported && (MemEncryptSevIsEnabled () || (MemEncryptTdxIsEnabled ()))) {
|
||||
CcGuestAttr = PcdGet64 (PcdConfidentialComputingGuestAttr);
|
||||
if (mQemuFwCfgDmaSupported && (CC_GUEST_IS_SEV (CcGuestAttr) ||
|
||||
CC_GUEST_IS_TDX (CcGuestAttr)))
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
|
||||
//
|
||||
|
@ -415,7 +419,7 @@ InternalQemuFwCfgDmaBytes (
|
|||
// When SEV or TDX is enabled, map Buffer to DMA address before issuing the DMA
|
||||
// request
|
||||
//
|
||||
if (MemEncryptSevIsEnabled () || MemEncryptTdxIsEnabled ()) {
|
||||
if (mIoMmuProtocol != NULL) {
|
||||
VOID *AccessBuffer;
|
||||
EFI_PHYSICAL_ADDRESS DataBufferAddress;
|
||||
|
||||
|
|
|
@ -42,11 +42,12 @@
|
|||
DebugLib
|
||||
IoLib
|
||||
MemoryAllocationLib
|
||||
MemEncryptSevLib
|
||||
MemEncryptTdxLib
|
||||
|
||||
[Protocols]
|
||||
gEdkiiIoMmuProtocolGuid ## SOMETIMES_CONSUMES
|
||||
|
||||
[Pcd]
|
||||
gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr
|
||||
|
||||
[Depex]
|
||||
gEdkiiIoMmuProtocolGuid OR gIoMmuAbsentProtocolGuid
|
||||
|
|
Loading…
Reference in New Issue