mirror of
https://github.com/acidanthera/audk.git
synced 2025-08-20 00:58:10 +02:00
The VirtHstiDxe does not work in confidential guests. There also isn't anything we can reasonably test, neither flash storage nor SMM mode will be used in that case. So just skip driver load when running in a confidential guest. Cc: Ard Biesheuvel <ardb+tianocore@kernel.org> Cc: Jiewen Yao <jiewen.yao@intel.com> Fixes: 506740982bba ("OvmfPkg/VirtHstiDxe: add code flash check") Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> Tested-by: Srikanth Aithal <sraithal@amd.com> Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
58 lines
1.2 KiB
INI
58 lines
1.2 KiB
INI
## @file
|
|
# Component description file for Virt Hsti Driver
|
|
#
|
|
# Copyright (c) 2017, Intel Corporation. All rights reserved.<BR>
|
|
# Copyright (c) Microsoft Corporation.<BR>
|
|
# Copyright (c) 2024, Red Hat. Inc
|
|
#
|
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
|
#
|
|
##
|
|
|
|
[Defines]
|
|
INF_VERSION = 0x00010005
|
|
BASE_NAME = VirtHstiDxe
|
|
FILE_GUID = 60740CF3-D428-4500-80E6-04A5798241ED
|
|
MODULE_TYPE = DXE_DRIVER
|
|
VERSION_STRING = 1.0
|
|
ENTRY_POINT = VirtHstiDxeEntrypoint
|
|
|
|
[Sources]
|
|
VirtHstiDxe.h
|
|
VirtHstiDxe.c
|
|
QemuPC.c
|
|
QemuQ35.c
|
|
QemuCommon.c
|
|
Flash.c
|
|
|
|
[Packages]
|
|
MdePkg/MdePkg.dec
|
|
OvmfPkg/OvmfPkg.dec
|
|
|
|
[LibraryClasses]
|
|
UefiDriverEntryPoint
|
|
UefiLib
|
|
BaseLib
|
|
BaseMemoryLib
|
|
MemoryAllocationLib
|
|
DebugLib
|
|
HobLib
|
|
HstiLib
|
|
PcdLib
|
|
PciLib
|
|
UefiBootServicesTableLib
|
|
|
|
[Guids]
|
|
gUefiOvmfPkgPlatformInfoGuid
|
|
|
|
[FeaturePcd]
|
|
gUefiOvmfPkgTokenSpaceGuid.PcdSmmSmramRequire
|
|
|
|
[Pcd]
|
|
gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr
|
|
gUefiOvmfPkgTokenSpaceGuid.PcdBfvBase
|
|
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageVariableBase
|
|
|
|
[Depex]
|
|
TRUE
|