From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail05.groups.io (mail05.groups.io [45.79.224.7]) by spool.mail.gandi.net (Postfix) with ESMTPS id C8F0B941000 for ; Thu, 25 Apr 2024 02:37:18 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=06HTr2ylxmZLul0iflWZwJjgmktVlBEERam3FdMkJ2U=; c=relaxed/simple; d=groups.io; h=From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20240206; t=1714012637; v=1; b=WUy5rmkbKPQV4HATc6LAnXJ/bcqfG+HbfW3nuiaS3IH9oVyQtuZ0RKTH+M1BGbdkBme++LCx Zemt0/xMS6YJTp/WBP+NpNpFizMej6bEXxVtYY/XMBsf7lOuthL0q5rDiL/16LA06DQjTnr4v3F RETbXVHTLyLw8RsR9QEN3CF07YJZXaPVM5vB+YM+6Ysk2wWWD8xLUoriDICWOPw9hNZ8jAHTuCw RbGMWNYNZmF0U9uKfzGOl6JG7VatoQ5dh9eKECPmmASTU5lT+ozcDzlJ/arpYDqSMMbhuPwONd0 pt8zztg97AjtkulwivjBWPIlteBbHB5u17803lWNc0OjQ== X-Received: by 127.0.0.2 with SMTP id djcEYY7687511x1J9gFUGXHj; Wed, 24 Apr 2024 19:37:17 -0700 X-Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.14]) by mx.groups.io with SMTP id smtpd.web10.7715.1714012636113932637 for ; Wed, 24 Apr 2024 19:37:16 -0700 X-CSE-ConnectionGUID: NlVFF5tASsqbggUfgMFt0Q== X-CSE-MsgGUID: LTajk/IbRtCuF8Lx5zkwUA== X-IronPort-AV: E=McAfee;i="6600,9927,11054"; a="13509083" X-IronPort-AV: E=Sophos;i="6.07,228,1708416000"; d="scan'208";a="13509083" X-Received: from orviesa007.jf.intel.com ([10.64.159.147]) by orvoesa106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Apr 2024 19:37:16 -0700 X-CSE-ConnectionGUID: R7qcfSMcQLexlCvr9mQQ6w== X-CSE-MsgGUID: kaUP2px8QWmrpvGRjWMVnA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,228,1708416000"; d="scan'208";a="25422345" X-Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81]) by orviesa007.jf.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 24 Apr 2024 19:37:15 -0700 X-Received: from fmsmsx601.amr.corp.intel.com (10.18.126.81) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Wed, 24 Apr 2024 19:37:15 -0700 X-Received: from fmsedg601.ED.cps.intel.com (10.1.192.135) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Wed, 24 Apr 2024 19:37:14 -0700 X-Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.168) by edgegateway.intel.com (192.55.55.70) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Wed, 24 Apr 2024 19:37:14 -0700 X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by DM4PR11MB6238.namprd11.prod.outlook.com (2603:10b6:8:a8::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7519.23; Thu, 25 Apr 2024 02:37:11 +0000 X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::be3f:5a4f:5180:2ba9]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::be3f:5a4f:5180:2ba9%4]) with mapi id 15.20.7519.021; Thu, 25 Apr 2024 02:37:11 +0000 From: "Yao, Jiewen" To: Michael Kubacki , "devel@edk2.groups.io" , "Kinney, Michael D" , Sean Brogan CC: Gerd Hoffmann , Ard Biesheuvel , Oliver Steffen , Ard Biesheuvel , Srikanth Aithal Subject: Re: [edk2-devel] [PATCH v4 1/1] OvmfPkg/VirtHstiDxe: do not load driver in confidential guests Thread-Topic: [edk2-devel] [PATCH v4 1/1] OvmfPkg/VirtHstiDxe: do not load driver in confidential guests Thread-Index: AQHalgzZXK/pb0dUtkOD3j7sbeU47rF2+cwQgACif4CAAAJ4oIAACD0AgABhuwCAAAHJgIAAAdmQgAAD1YCAADaMEA== Date: Thu, 25 Apr 2024 02:37:10 +0000 Message-ID: References: <20240424060029.1330637-1-kraxel@redhat.com> In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|DM4PR11MB6238:EE_ x-ms-office365-filtering-correlation-id: 77662231-3285-4776-4aeb-08dc64d09bdc x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: =?us-ascii?Q?eN0XGir58bot0Jw6ojGvr7lJra0Dso/J6a1qJsSHpdtVyeaDI8rr+uotxtR8?= =?us-ascii?Q?f6gv8jwbPJtyvDHm7UIIqNxDsPNF05iylpoKXyQKcC3qkQxoCUFF9Pst0T5F?= =?us-ascii?Q?Nc/VLWf04uE/VR475QRzBzHv7XE5CDNn9AJfG14mbOy9+OnqGiyRgGp/1YUR?= =?us-ascii?Q?v/dAi4TSnQPYdQ9eUXqvXjSSQzXRJ+f8nJ85Ba9bYggZnXXhZa2xhNH9RGVx?= =?us-ascii?Q?/KCURaHv/Nlz3epbulPeBFE5csBQgifdYoHlkm+bj1XF78ExfqkbEZlSi/5H?= =?us-ascii?Q?xqorhzFqjP7hURJK6eSL0Zgd9Fc/0ZdqgZS2hK66XSRoue7fPzNSB8E1q6x6?= =?us-ascii?Q?QFHKYNGmyFQ6e6lrwlZ6nPjtvbtmTaxOQ2R9T77fqBqun8cKNq3xSN64Oave?= =?us-ascii?Q?bisxkhgVqbatOlXF2Aqq9LQElkN34WlfeG+JnaZFcnH835GeIBLrXnzUt654?= =?us-ascii?Q?ETnR99j1wXiauSVWT0bsBZMTQhn4Wqrg1RLVy/dok6EURwQMaChfOh+OzY/m?= =?us-ascii?Q?sMyD2bx7hOj3BPFUYMyT26BOMoK/jR1b6jhCh8X9fDNr8bKrNeC+wDUuxsAc?= =?us-ascii?Q?312JnNK7jKlVaDgkdrAhXbyDsO8pi9wqlHO4diKigA3mf8oeJdNkXI4JiyKs?= =?us-ascii?Q?F3VTb15CCPgl5zCcyTMX3Q1LbgtaM+J8dXAs858JPSM5jI7cEPlp3ZElLI0j?= =?us-ascii?Q?8HX/01JHabHnXAcXP7HDkdRbt0RrEj8OyGtOAangNeMTibnsayef4ag3uib9?= =?us-ascii?Q?dVJ6UooHXSQgwDuTVslB4nkGDIKFKMo8WfNakgZmioS9VuBloJUUOaUHgNOs?= =?us-ascii?Q?AWv9YXo9wkW0NlvAvoZGQti+3DLdP5JVD063GEcFIEyreRy4+f8vzrE/MmE2?= =?us-ascii?Q?Tt3eZ2qjlGweLTXUDuyZqYGTYr9W6zPlzsj0Df3avE2xNTyHVU/pqNuRBFTm?= =?us-ascii?Q?GBTF0s6SKS1BxqMXUJ8atKng56NqnZc7W21dXqm6Bd7hKkfdlxJQyrGLczEi?= =?us-ascii?Q?HBsOd7yHuQzzZ/Ln9oGnCXr0NQsoqaJyZqOEMAKSUKW/+uvWb3xSkfHcq1Pl?= =?us-ascii?Q?eQSoCLc42lN4MsjcerSKouyiuniMOgEXUaHAG0ihlKYVEMxfm6Z/jT22fVkL?= =?us-ascii?Q?7gmOc4RNokdrUIR5Y/5Bcs3blq4N9UHRBxMtIKFNUgScuYhbLaPNbK54HTHI?= =?us-ascii?Q?/gccKOb0UYEHq1dhh5MWR+bXiuaJLLq7tBN6V99+JE1Cl1PnfX5/SHxUWkoM?= =?us-ascii?Q?4XYCrutfW28FOiaI6cDHxR1xH98w0NnPM0qSZfzkwATh84S3rnq+z1LmkzRl?= =?us-ascii?Q?VQl8udztwugMibo2XPXujrlPilZHcaPhIQmoOhFwnAoUOQ=3D=3D?= x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?t7WE0GjApHBgoHwDx7CycN0zHF3zBQYm95++H3h0NAqB1/x8e7yL2CydXHy2?= =?us-ascii?Q?MouPTctrP5VAAzHoL9JkG4pV11sVbmUu7l/sDWf4C1rdxrVFXw8+SD77jyTK?= =?us-ascii?Q?9UmqPwJ44xhNDqVT9z7CAk7yotvtu76adutIY3UrYdgoWdPAbiyxyhTf1GLQ?= =?us-ascii?Q?7jsmH9pVz0paI2vxRh1pclN6J4eSnqGetlPmjxNNynIUsZUd2S3YBjo8Ehkn?= =?us-ascii?Q?wxBjc8xdlkI/36Ia9ioJMmHmDDlpmVXsF5k1KzWC12lO0Ffs/X827vaXiTFO?= =?us-ascii?Q?vKYSjNjdQ/JpX2Ue0dsiq7YhqI8Dov5NDKHho1ViPyYGIFxXmb/fVZbZYmWJ?= =?us-ascii?Q?dRRQOveoEa8IlfQ4ZxQ0BsFMoFkJxtI+iikP5rfbu0oNZ+LrmItm1bchtgZM?= =?us-ascii?Q?ieE0/N9vVA2R5jWMjigf5pL2+AcopfHMTnUPfLW6VooaAYWGPVvhhzlgZhPN?= =?us-ascii?Q?a99k/2/R+rmLoJOyfeSIa0NzJ3kyW9TIrgfMu897EzMjaqFjplFhzZmNy2i1?= =?us-ascii?Q?F9FFfGaTGxKjKSpa4ix6x8pbuaTl+aPeQN1AvlvNy/m9TPGPNMjW7bT7Xt+0?= =?us-ascii?Q?jmP4lXDyo74L0iRgcsVKVzLHSu27xmhyLPD9zQEEVQ1wLRWRt5yLk1XrjEW+?= =?us-ascii?Q?5nZ54MJyRmhPKqUnNbr0J0Fg0ShLeCq0ItBAUmPM4bHt4Hutkpfse5W2vaFo?= =?us-ascii?Q?gF63qBeWGy9exmnqnVu7RU+vDrCp8YCS4qczroCHJ0Cw47b5O562fylXlXl7?= =?us-ascii?Q?/5lf9T0biLQ+slGJW8Dn9MWZQzPxnhf79yaBBaCfdkAuYU66gp4v7tl3Igvz?= =?us-ascii?Q?mSZinljOxc/MwHOkesJL72qxfSCMW2Gb3qrTquiFSjINhxlKlNAhxTFT8OLU?= =?us-ascii?Q?gGSoRLtAga6hRizmO/Vl9kmiFaw28Rd62eAq/9F8C1Ol+CxPSxsSrDNalCu2?= =?us-ascii?Q?W88wObCQQ0PdUZvyz4Wjg/cMVEKYo+7dDIWeswvb6IKrGC9xYRp/GVaKpnEb?= =?us-ascii?Q?L/RdPaF2E7b3cU8UavJk+6/O1lVO52GzqCvDLqpsit7BaanrFCmXSCizBY9l?= =?us-ascii?Q?W89rUadGSwvEzbxxpvhotMiXBzLmgga+LI5WuEd657z7/14Fe7Nhf0MmhsZG?= =?us-ascii?Q?zmZzm120Zqdce2R2UQtuSsROjfRD5Wi0BK4gBUhm9enZUHSb1M0CeRih+sj4?= =?us-ascii?Q?p6GCjEQO4xMVbhfekITluKOaCkCj6daP0440v89cQwHR7Xbhdqdd32WBWa2Y?= =?us-ascii?Q?acOFGNBNPcZggvWp350h/oHQpVuTRXA11EdXJDDKhb64pnCslB+WXHsvMokS?= =?us-ascii?Q?bBLGIfa2ApRvf/HbaNterckaUhoJl5RAB1KXayfXLFw+bf1qEgFfvnzFiZzP?= =?us-ascii?Q?gs0E1DRerhgjx92RSi5vgNLJeIQ0fEmbi6hwsl3eqgdYBcRYFiuJdB5tGk28?= =?us-ascii?Q?TdjUa4krF/DqrrogiY3BG45wjWtB3TqRNfweFpuuLfYe3lG69u4E4B2sbEJ5?= =?us-ascii?Q?OGIldPmoQ8Hayq7eslG4KahirV7SGR49WZHkyTHBqOUKuTO6qZdPLyjk+aBX?= =?us-ascii?Q?pEj97KEHwFIAiyN620vG8sjh6Rpax2sSD0MIlqtp?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 77662231-3285-4776-4aeb-08dc64d09bdc X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Apr 2024 02:37:11.0341 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: UT+PbYt76Fk4aMAwgOdDRiZtdN32HwD81M0YZrkCeJLJmfjwDAOwyFw3uJslRFU2eYOVOqjd4ocBQN/czFj5Lg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR11MB6238 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Wed, 24 Apr 2024 19:37:16 -0700 Resent-From: jiewen.yao@intel.com Reply-To: devel@edk2.groups.io,jiewen.yao@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: ExhD9kzjzmyBONHOMU1eI3fQx7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=WUy5rmkb; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 45.79.224.7 as permitted sender) smtp.mailfrom=bounce@groups.io Thank you very much for the help. https://github.com/tianocore/edk2/pull/5595 merged. > -----Original Message----- > From: Michael Kubacki > Sent: Thursday, April 25, 2024 7:22 AM > To: devel@edk2.groups.io; Yao, Jiewen ; Kinney, Mic= hael > D ; Sean Brogan > Cc: Gerd Hoffmann ; Ard Biesheuvel ; > Oliver Steffen ; Ard Biesheuvel > ; Srikanth Aithal > Subject: Re: [edk2-devel] [PATCH v4 1/1] OvmfPkg/VirtHstiDxe: do not load= driver > in confidential guests >=20 > That issue looks different in that CodeQL did not have a problem. You > can use the same PR, just rebase with master. >=20 > It looks like that had an issue triggering pipelines from GitHub which > might be fixed be rerunning after the push. >=20 > Thanks, > Michael >=20 > On 4/24/2024 7:08 PM, Yao, Jiewen wrote: > > Ah, thank you Mike. > > > > Should I close/re-open my PR? > > Or should I keep waiting? > > > > Thank you > > Yao, Jiewen > > > >> -----Original Message----- > >> From: Kinney, Michael D > >> Sent: Thursday, April 25, 2024 7:01 AM > >> To: Yao, Jiewen ; devel@edk2.groups.io; Sean Bro= gan > >> ; Michael Kubacki > >> > >> Cc: Gerd Hoffmann ; Ard Biesheuvel ; > >> Oliver Steffen ; Ard Biesheuvel > >> ; Srikanth Aithal ; Kinne= y, > >> Michael D > >> Subject: RE: [PATCH v4 1/1] OvmfPkg/VirtHstiDxe: do not load driver in > >> confidential guests > >> > >> Hi Jiewen, > >> > >> Michael Kubacki has been working on a CI issue and a change is being m= erged > >> now. > >> > >> Mike > >> > >>> -----Original Message----- > >>> From: Yao, Jiewen > >>> Sent: Wednesday, April 24, 2024 3:57 PM > >>> To: devel@edk2.groups.io; Kinney, Michael D > >>> ; Sean Brogan > >>> Cc: Gerd Hoffmann ; Ard Biesheuvel > ; > >>> Oliver Steffen ; Ard Biesheuvel > >>> ; Srikanth Aithal > >>> Subject: RE: [PATCH v4 1/1] OvmfPkg/VirtHstiDxe: do not load driver i= n > >>> confidential guests > >>> > >>> Hi Mike/Sean > >>> Can someone look at the EDKII CI? > >>> > >>> My PR has been blocked for 9 hours - > >>> https://github.com/tianocore/edk2/pull/5595. > >>> > >>> Thank you > >>> Yao, Jiewen > >>> > >>> > >>>> -----Original Message----- > >>>> From: Ard Biesheuvel > >>>> Sent: Thursday, April 25, 2024 1:05 AM > >>>> To: Yao, Jiewen > >>>> Cc: Gerd Hoffmann ; devel@edk2.groups.io; Oliver > >>> Steffen > >>>> ; Ard Biesheuvel ; > >>> Srikanth > >>>> Aithal > >>>> Subject: Re: [PATCH v4 1/1] OvmfPkg/VirtHstiDxe: do not load driver = in > >>>> confidential guests > >>>> > >>>> On Wed, 24 Apr 2024 at 18:36, Yao, Jiewen > >>> wrote: > >>>>> > >>>>> Thanks Ard. > >>>>> > >>>>> I have submitted https://github.com/tianocore/edk2/pull/5595 3 hour= s > >>> ago. > >>>>> But it seems the CI stops working... > >>>>> > >>>> > >>>> OK, I have dropped my PR. > >>>> > >>>> > >>>> > >>>>> > >>>>> > >>>>>> -----Original Message----- > >>>>>> From: Ard Biesheuvel > >>>>>> Sent: Thursday, April 25, 2024 12:27 AM > >>>>>> To: Yao, Jiewen > >>>>>> Cc: Gerd Hoffmann ; devel@edk2.groups.io; > >>> Oliver > >>>> Steffen > >>>>>> ; Ard Biesheuvel ; > >>>> Srikanth > >>>>>> Aithal > >>>>>> Subject: Re: [PATCH v4 1/1] OvmfPkg/VirtHstiDxe: do not load > >>> driver in > >>>>>> confidential guests > >>>>>> > >>>>>> On Wed, 24 Apr 2024 at 08:45, Yao, Jiewen > >>> wrote: > >>>>>>> > >>>>>>> Reviewed-by: Jiewen Yao > >>>>>>> > >>>>>> > >>>>>> Thanks, I've queued this up. > >>>>>> > >>>>>> > >>>>>>>> -----Original Message----- > >>>>>>>> From: Gerd Hoffmann > >>>>>>>> Sent: Wednesday, April 24, 2024 2:00 PM > >>>>>>>> To: devel@edk2.groups.io > >>>>>>>> Cc: Oliver Steffen ; Gerd Hoffmann > >>>>>>>> ; Ard Biesheuvel > >>> ; Yao, > >>>>>> Jiewen > >>>>>>>> ; Srikanth Aithal > >>>>>>>> Subject: [PATCH v4 1/1] OvmfPkg/VirtHstiDxe: do not load > >>> driver in > >>>>>> confidential > >>>>>>>> guests > >>>>>>>> > >>>>>>>> The VirtHstiDxe does not work in confidential guests. There > >>> also isn't > >>>>>>>> anything we can reasonably test, neither flash storage nor SMM > >>> mode will > >>>>>>>> be used in that case. So just skip driver load when running > >>> in a > >>>>>>>> confidential guest. > >>>>>>>> > >>>>>>>> Cc: Ard Biesheuvel > >>>>>>>> Cc: Jiewen Yao > >>>>>>>> Fixes: 506740982bba ("OvmfPkg/VirtHstiDxe: add code flash > >>> check") > >>>>>>>> Signed-off-by: Gerd Hoffmann > >>>>>>>> Tested-by: Srikanth Aithal > >>>>>>>> --- > >>>>>>>> OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf | 1 + > >>>>>>>> OvmfPkg/VirtHstiDxe/VirtHstiDxe.c | 6 ++++++ > >>>>>>>> 2 files changed, 7 insertions(+) > >>>>>>>> > >>>>>>>> diff --git a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf > >>>>>>>> b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf > >>>>>>>> index 9514933011e8..b5c237288766 100644 > >>>>>>>> --- a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf > >>>>>>>> +++ b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf > >>>>>>>> @@ -49,6 +49,7 @@ [FeaturePcd] > >>>>>>>> gUefiOvmfPkgTokenSpaceGuid.PcdSmmSmramRequire > >>>>>>>> > >>>>>>>> [Pcd] > >>>>>>>> + gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr > >>>>>>>> gUefiOvmfPkgTokenSpaceGuid.PcdBfvBase > >>>>>>>> > >>> gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageVariableBase > >>>>>>>> > >>>>>>>> diff --git a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.c > >>>>>>>> b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.c > >>>>>>>> index b6e53a1219d1..efaff0d1f3cb 100644 > >>>>>>>> --- a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.c > >>>>>>>> +++ b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.c > >>>>>>>> @@ -17,6 +17,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent > >>>>>>>> #include > >>>>>>>> #include > >>>>>>>> #include > >>>>>>>> +#include > >>>>>>>> #include > >>>>>>>> > >>>>>>>> #include > >>>>>>>> @@ -140,6 +141,11 @@ VirtHstiDxeEntrypoint ( > >>>>>>>> EFI_STATUS Status; > >>>>>>>> EFI_EVENT Event; > >>>>>>>> > >>>>>>>> + if (PcdGet64 (PcdConfidentialComputingGuestAttr)) { > >>>>>>>> + DEBUG ((DEBUG_INFO, "%a: confidential guest\n", > >>> __func__)); > >>>>>>>> + return EFI_UNSUPPORTED; > >>>>>>>> + } > >>>>>>>> + > >>>>>>>> DevId =3D VirtHstiGetHostBridgeDevId (); > >>>>>>>> switch (DevId) { > >>>>>>>> case INTEL_82441_DEVICE_ID: > >>>>>>>> -- > >>>>>>>> 2.44.0 > >>>>>>> > > > > > >=20 > > -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#118254): https://edk2.groups.io/g/devel/message/118254 Mute This Topic: https://groups.io/mt/105705705/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-