]> git.proxmox.com Git - mirror_edk2.git/blame - OvmfPkg/Library/PlatformInitLib/IntelTdxNull.c
OvmfPkg/PlatformInitLib: detect physical address space
[mirror_edk2.git] / OvmfPkg / Library / PlatformInitLib / IntelTdxNull.c
CommitLineData
b22ac35b
MX
1/** @file\r
2 Initialize Intel TDX support.\r
3\r
4 Copyright (c) 2021, Intel Corporation. All rights reserved.<BR>\r
5\r
6 SPDX-License-Identifier: BSD-2-Clause-Patent\r
7\r
8**/\r
9\r
10#include <PiPei.h>\r
11\r
12/**\r
13 In Tdx guest, some information need to be passed from host VMM to guest\r
14 firmware. For example, the memory resource, etc. These information are\r
15 prepared by host VMM and put in HobList which is described in TdxMetadata.\r
16\r
17 Information in HobList is treated as external input. From the security\r
18 perspective before it is consumed, it should be validated.\r
19\r
20 @retval EFI_SUCCESS Successfully process the hoblist\r
21 @retval Others Other error as indicated\r
22**/\r
23EFI_STATUS\r
24EFIAPI\r
25ProcessTdxHobList (\r
26 VOID\r
27 )\r
28{\r
29 return EFI_UNSUPPORTED;\r
30}\r
e23f8f52
MX
31\r
32/**\r
33 In Tdx guest, the system memory is passed in TdHob by host VMM. So\r
34 the major task of PlatformTdxPublishRamRegions is to walk thru the\r
35 TdHob list and transfer the ResourceDescriptorHob and MemoryAllocationHob\r
36 to the hobs in DXE phase.\r
37\r
38 MemoryAllocationHob should also be created for Mailbox and Ovmf work area.\r
39**/\r
40VOID\r
41EFIAPI\r
42PlatformTdxPublishRamRegions (\r
43 VOID\r
44 )\r
45{\r
46}\r