]> git.proxmox.com Git - mirror_edk2.git/blame_incremental - OvmfPkg/Library/PlatformInitLib/IntelTdxNull.c
UefiCpuPkg: Move AsmRelocateApLoopStart from Mpfuncs.nasm to AmdSev.nasm
[mirror_edk2.git] / OvmfPkg / Library / PlatformInitLib / IntelTdxNull.c
... / ...
CommitLineData
1/** @file\r
2 Initialize Intel TDX support.\r
3\r
4 Copyright (c) 2021, Intel Corporation. All rights reserved.<BR>\r
5\r
6 SPDX-License-Identifier: BSD-2-Clause-Patent\r
7\r
8**/\r
9\r
10#include <PiPei.h>\r
11\r
12/**\r
13 In Tdx guest, some information need to be passed from host VMM to guest\r
14 firmware. For example, the memory resource, etc. These information are\r
15 prepared by host VMM and put in HobList which is described in TdxMetadata.\r
16\r
17 Information in HobList is treated as external input. From the security\r
18 perspective before it is consumed, it should be validated.\r
19\r
20 @retval EFI_SUCCESS Successfully process the hoblist\r
21 @retval Others Other error as indicated\r
22**/\r
23EFI_STATUS\r
24EFIAPI\r
25ProcessTdxHobList (\r
26 VOID\r
27 )\r
28{\r
29 return EFI_UNSUPPORTED;\r
30}\r
31\r
32/**\r
33 In Tdx guest, the system memory is passed in TdHob by host VMM. So\r
34 the major task of PlatformTdxPublishRamRegions is to walk thru the\r
35 TdHob list and transfer the ResourceDescriptorHob and MemoryAllocationHob\r
36 to the hobs in DXE phase.\r
37\r
38 MemoryAllocationHob should also be created for Mailbox and Ovmf work area.\r
39**/\r
40VOID\r
41EFIAPI\r
42PlatformTdxPublishRamRegions (\r
43 VOID\r
44 )\r
45{\r
46}\r