diff options
author | James Bottomley <jejb@linux.ibm.com> | 2020-11-30 12:28:19 -0800 |
---|---|---|
committer | mergify[bot] <37929162+mergify[bot]@users.noreply.github.com> | 2020-12-14 19:56:18 +0000 |
commit | 01726b6d23d4c8a870dbd5b96c0b9e3caf38ef3c (patch) | |
tree | db9d56da1c9805a48c82063ce9eb8f7745f87046 /.azurepipelines | |
parent | bff2811c6d99c1e41a4cbb81b30cc4b5cb8e4f20 (diff) | |
download | edk2-01726b6d23d4c8a870dbd5b96c0b9e3caf38ef3c.zip edk2-01726b6d23d4c8a870dbd5b96c0b9e3caf38ef3c.tar.gz edk2-01726b6d23d4c8a870dbd5b96c0b9e3caf38ef3c.tar.bz2 |
OvmfPkg/AmdSev: Expose the Sev Secret area using a configuration table
Now that the secret area is protected by a boot time HOB, extract its
location details into a configuration table referenced by
gSevLaunchSecretGuid so the boot loader or OS can locate it before a
call to ExitBootServices().
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3077
Signed-off-by: James Bottomley <jejb@linux.ibm.com>
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Message-Id: <20201130202819.3910-7-jejb@linux.ibm.com>
Acked-by: Ard Biesheuvel <ard.biesheuvel@arm.com>
[lersek@redhat.com: fix indentation of InstallConfigurationTable() args]
Diffstat (limited to '.azurepipelines')
0 files changed, 0 insertions, 0 deletions