HEX
Server: Apache/2.4.65 (Ubuntu)
System: Linux ielts-store-v2 6.8.0-1036-gcp #38~22.04.1-Ubuntu SMP Thu Aug 14 01:19:18 UTC 2025 x86_64
User: root (0)
PHP: 7.2.34-54+ubuntu20.04.1+deb.sury.org+1
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
Upload Files
File: //lib/modules/6.8.0-1042-gcp/build/drivers/virt/coco/efi_secret/Kconfig
# SPDX-License-Identifier: GPL-2.0-only
config EFI_SECRET
	tristate "EFI secret area securityfs support"
	depends on EFI && X86_64
	select EFI_COCO_SECRET
	select SECURITYFS
	help
	  This is a driver for accessing the EFI secret area via securityfs.
	  The EFI secret area is a memory area designated by the firmware for
	  confidential computing secret injection (for example for AMD SEV
	  guests).  The driver exposes the secrets as files in
	  <securityfs>/secrets/coco.  Files can be read and deleted (deleting
	  a file wipes the secret from memory).

	  To compile this driver as a module, choose M here.
	  The module will be called efi_secret.