From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by mx.groups.io with SMTP id smtpd.web11.45149.1671714738764023628 for ; Thu, 22 Dec 2022 05:12:18 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=YaN3MknE; spf=pass (domain: intel.com, ip: 134.134.136.100, mailfrom: min.m.xu@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1671714738; x=1703250738; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=xBTY6z6Ph0PMzJ097/rPh7ujomorn4Pme6BOB5fLNyA=; b=YaN3MknEtg3CpRBd/PdTlirdQ9B/rxLvgPG3OCXKSagYpDeOBaadSwvn 5OKxZggfrSgYLQak9UjjuyQlEN7OKYmzsy9H14/IMTLRwv12ucU3gN8C6 aeRZ0/kCociIpOUcMknIT5YwqY732gr1Qic2taTplweqnMvVaXM+mjWS2 6fJoDfJ7TKwQ8r9NSRCOjk22xX6SoGmEDzbVjBjc0p8ai+2vM+QYnHSY/ PaJayhvevkoa8sTHQmD4lduS3ly+RpPu+DA4k4nAIZl2xxrkXQubJcydN BddcJcvgg0+ZB1wJJtIZ0q0nvBfn2hfkL5Xt+0N6b5+GoinQamAOcDoQI w==; X-IronPort-AV: E=McAfee;i="6500,9779,10568"; a="384475562" X-IronPort-AV: E=Sophos;i="5.96,265,1665471600"; d="scan'208";a="384475562" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Dec 2022 05:12:18 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10568"; a="758941367" X-IronPort-AV: E=Sophos;i="5.96,265,1665471600"; d="scan'208";a="758941367" Received: from mxu9-mobl1.ccr.corp.intel.com ([10.249.172.37]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Dec 2022 05:12:15 -0800 From: "Min Xu" To: devel@edk2.groups.io Cc: Min Xu , Ard Biesheuvel , Leif Lindholm , Sami Mujawar , Gerd Hoffmann , Erdem Aktas , James Bottomley , Jiewen Yao , Tom Lendacky Subject: [PATCH V1 0/2] Check PcdConfidentialComputingGuestAttr in AcpiPlatformDxe Date: Thu, 22 Dec 2022 21:11:54 +0800 Message-Id: <20221222131156.411-1-min.m.xu@intel.com> X-Mailer: git-send-email 2.29.2.windows.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit PcdConfidentialComputingGuestAttr can be used to check the cc guest type, including td-guest or sev-guest. CcProbe() can do the same thing but CcProbeLib should be included in the dsc which uses AcpiPlatformDxe. The difference between PcdConfidentialComputingGuestAttr and CcProbe() is that PcdConfidentialComputingGuestAttr cannot be used in multi-processor scenario but CcProbe() can. But there is no such issue in AcpiPlatformDxe. So we use PcdConfidentialComputingGuestAttr instead of CcProbeLib so that it is simpler. After CcProbe is removed from AcpiPlatformDxe, it is removed from ArmVirtQemu.dsc as well. Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Sami Mujawar Cc: Gerd Hoffmann Cc: Erdem Aktas Cc: James Bottomley Cc: Jiewen Yao Cc: Tom Lendacky Signed-off-by: Min Xu Min M Xu (2): OvmfPkg/AcpiPlatformDxe: Check PcdConfidentialComputingGuestAttr ArmVirtPkg: Remove CcProbeLib from ArmVirtQemu.dsc ArmVirtPkg/ArmVirtQemu.dsc | 1 - OvmfPkg/AcpiPlatformDxe/AcpiPlatform.c | 6 ++---- OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf | 2 +- 3 files changed, 3 insertions(+), 6 deletions(-) -- 2.29.2.windows.2