From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga05.intel.com (mga05.intel.com [192.55.52.43]) by mx.groups.io with SMTP id smtpd.web12.4394.1631585168344682238 for ; Mon, 13 Sep 2021 19:06:08 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@intel.onmicrosoft.com header.s=selector2-intel-onmicrosoft-com header.b=qb5KafrQ; spf=pass (domain: intel.com, ip: 192.55.52.43, mailfrom: jiewen.yao@intel.com) X-IronPort-AV: E=McAfee;i="6200,9189,10106"; a="307400740" X-IronPort-AV: E=Sophos;i="5.85,291,1624345200"; d="scan'208";a="307400740" Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Sep 2021 19:06:06 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.85,291,1624345200"; d="scan'208";a="697138520" Received: from orsmsx601.amr.corp.intel.com ([10.22.229.14]) by fmsmga006.fm.intel.com with ESMTP; 13 Sep 2021 19:06:06 -0700 Received: from orsmsx607.amr.corp.intel.com (10.22.229.20) by ORSMSX601.amr.corp.intel.com (10.22.229.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.12; Mon, 13 Sep 2021 19:06:05 -0700 Received: from orsmsx604.amr.corp.intel.com (10.22.229.17) by ORSMSX607.amr.corp.intel.com (10.22.229.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.12; Mon, 13 Sep 2021 19:06:05 -0700 Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx604.amr.corp.intel.com (10.22.229.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.12 via Frontend Transport; Mon, 13 Sep 2021 19:06:05 -0700 Received: from NAM12-BN8-obe.outbound.protection.outlook.com (104.47.55.177) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2242.12; Mon, 13 Sep 2021 19:06:05 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=JJ9VgPthlHmY6F5zmkYYgAg5wFwkLS6T4RF+Tvk+ozfXo8mKwJDd9kZUvCsNpiMQnaAzw2ZOy6zJCLIEthcOi0bfVsWgCrgnEXuPsaqhfSTwNms0HibX0gsLD0PHtjtGGy8XJSsKWCbJleqeTQLS9jSSnIuse5xv4i7SipkwqOszbHm7nrMbKzkw4KTLS01NIwX16LHasKxBp8eGNKNYWJdsFmhMnOadj/Ji8G5/d2LHLumf0iFAYLXmYKEiu/0bW/L3grUeigRcnQvZwk3x8khjcEUktv2xyBSrzOQPRt4JTmxgQWHPp2eB6wK00skclifQg0vqThIa8fPWtM5CgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=5wtZb22epwxKnJ/Ki1Wfkgaxaz5eM7TRg1C9KKHixpM=; b=RV1Mt0qkrQR17COkCoeNk3gpKb3XGX9oK3LUxam7cORl4OzS4Tbj8fBDJUbkM/xu8ZSJme4SKIMPzetLtlCZKHMIFuWTPg6iho8EplsxRZKEBWLmii7YLS4QGInkL++GIhNOshDi95nxwvUxVtZnEHePDMZX61Gc/kuLzyu6bZRUFYYOa2FLW41jTcFwSKgDjHFxceLv8yEZIvhrhZlqFYXkzCKDnRPGCDu9HMeK+lj4VkB3tZFDi15jyjBXzqlxT9n4oVmQtA0YvOnd5z9beEZ1bJkBl8n9WHfjBKAEzo02YMbMvaQrRhIHVFE+GfsD+zl3T4r4EgscEL+Vslpaag== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel.onmicrosoft.com; s=selector2-intel-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5wtZb22epwxKnJ/Ki1Wfkgaxaz5eM7TRg1C9KKHixpM=; b=qb5KafrQsXG2sc3eXbz43tsUxVf1iUbKx3Bo1zZrvt6qRigMU8HVdn0otdYpAWY2KF3lhGIN7RzCZ4YyXO2TNlmMvZKxYwgv7vn7H95780ObxbYRUpjfTlV7Ls5V6fK8sZ+dqNuNlX5F5pguPfjpm2tE5bTPanuiv+qG/Tz6dp8= Received: from PH0PR11MB4885.namprd11.prod.outlook.com (2603:10b6:510:35::14) by PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4500.14; Tue, 14 Sep 2021 02:05:57 +0000 Received: from PH0PR11MB4885.namprd11.prod.outlook.com ([fe80::754e:42e9:16cd:1306]) by PH0PR11MB4885.namprd11.prod.outlook.com ([fe80::754e:42e9:16cd:1306%7]) with mapi id 15.20.4500.019; Tue, 14 Sep 2021 02:05:57 +0000 From: "Yao, Jiewen" To: "Xu, Min M" , "devel@edk2.groups.io" CC: "Kinney, Michael D" , Liming Gao , "Liu, Zhiguang" , "Wang, Jian J" , "Lu, Ken" Subject: Re: [PATCH 1/2] MdePkg: Introduce TdProtocol for TD-Guest firmware Thread-Topic: [PATCH 1/2] MdePkg: Introduce TdProtocol for TD-Guest firmware Thread-Index: AQHXqQvqAqkdzeQwtEGjuHf3d8TzGquix+Sw Date: Tue, 14 Sep 2021 02:05:57 +0000 Message-ID: References: <29ffecfbc2a4076d9cb9fc40238548ab637c5f19.1631583583.git.min.m.xu@intel.com> In-Reply-To: <29ffecfbc2a4076d9cb9fc40238548ab637c5f19.1631583583.git.min.m.xu@intel.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-version: 11.5.1.3 dlp-product: dlpe-windows dlp-reaction: timeout-no-action authentication-results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: ea789db4-9f73-441d-d44d-08d9772430e3 x-ms-traffictypediagnostic: PH0PR11MB4966: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:374; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR11MB4885.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(6029001)(4636009)(376002)(136003)(396003)(346002)(39860400002)(366004)(83380400001)(6506007)(53546011)(38070700005)(9686003)(38100700002)(186003)(7696005)(5660300002)(966005)(8676002)(30864003)(66556008)(66446008)(55016002)(64756008)(54906003)(122000001)(478600001)(8936002)(107886003)(2906002)(110136005)(71200400001)(26005)(86362001)(316002)(66476007)(52536014)(66946007)(76116006)(33656002)(4326008);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?pyAnglGtsA7e8ZDW8Izkcn8E8w1Z1Jcg88EGIGj9Jh4QRmKu5us1zXipZoSu?= =?us-ascii?Q?yIrdQM/CXZrAUNYl8cf9Z72+bu9arw06xNJXrDquGyDkGvWxPhmsHK4Wqcpm?= =?us-ascii?Q?/KDW/LzWFwmNKImYI4xCpp3kRX13B1CEkvLUFwLArB76h9+nPXdEvMS8zqso?= =?us-ascii?Q?tKD2Q0Oy8M4aGm4G4UzbtLyJTXQ6w6Y1NYBRjSRrw+oS0HLXGPj5PeJ/37CA?= =?us-ascii?Q?4+MNIJ9El305gLyx8pZ4xytL/VVG4ozAA+pKIL/88fbomlLgAtUs98JkRjRO?= =?us-ascii?Q?VahRd8iMmys/qsIi9dq7+G5r3K5kYNXKbAM2qSsttkFsLvxTKGNNkIkLZH5O?= =?us-ascii?Q?vrk+Lm43+rmiCT3LjYUxDW0mKqxeuTh09TF0mINiNrRiHYR+ZGpCQCKSu1nE?= =?us-ascii?Q?yVz9jyAuvodbsYFVqUJOhsKr1N9pn4CIk9dQBvBgLEnDL8O11pFuP3dvmqZg?= =?us-ascii?Q?yq1gi8dstdSSM/ABds/8gQjaG0GS4OAVHqo0CnAUXzlN10CRxwYTAO9YvARX?= =?us-ascii?Q?efxZzlzfJMYgWSnw/SvHU9tsveGKTfLMrkSi+lVKHuVKFtzl/7pWlENXhoST?= =?us-ascii?Q?gF7AodTlIy7NK87Gg2KZZIv8hNHF2J/RjB+o5zZOGorGBhNvts4gGiRFuk0v?= =?us-ascii?Q?AmaNcNqf5cXhCY2A4xIeeTEtyjCQ8q471AaQ3vAHZQuNVXE19jsj/64fd46A?= =?us-ascii?Q?F3YQlqgEhcHGfUnUFe5/9H/EeKsvcGQ1TTfzUINl8tWpRQmdcqOXpGN3q94c?= =?us-ascii?Q?SEsofVGlr7wb/vmcNVnkg6sSzs9EGyFTKd85CyRocU6FSxvPjAPdoUVNgdfc?= =?us-ascii?Q?KKNpazC8LIF9LI6Dn/6HwlcmIXp95hnqspm8w4u8b3iyBtNskIx1zvL3VqPM?= =?us-ascii?Q?9D+2rq9d8QcaU9V5yZG+obOM0g3J5dTfOHBO+1IFGwG7S+fMTZ0qUBG6Jv+8?= =?us-ascii?Q?dzXbQEoiIZvuj6LEki4WPgdBRk1uowlH7/JU430SWnZmE3jjnWdWdxiO2BQX?= =?us-ascii?Q?1OiVeUgrlLt/rXDC1/JETjdAwcwUfu95TYbNOMC7rTlIj+tg0MHLB4Cmft5z?= =?us-ascii?Q?+8CL7yfgHRJmjRSp0m9hgSBoygScE8vfcRoGF4ts/rqnkuQ1kFc1ntv8kDTt?= =?us-ascii?Q?46OMGBbhwPp1rOfw2cC14Bh4DI/H2Yew9ZK5kLeW6CEyt5LWnH11MpmYVpfQ?= =?us-ascii?Q?tndaSfRsD7Sf6exNh1PAiDN+ClZKx1TtPyVQkTv78hKSJQZMOMGXnPdU7ph/?= =?us-ascii?Q?g9Rujm/tHXOKQlrEi0qMKpnOGTL4v4Eh6ZQ2WqWVdwIvNJqzfD+v+3+Ydu5O?= =?us-ascii?Q?eX96mknFvtdHSEmWYpFPNpJm?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4885.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: ea789db4-9f73-441d-d44d-08d9772430e3 X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Sep 2021 02:05:57.1027 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: IgKcTe1ql6GQANqyw26SgFTcacO5WlbvT3NfeIQ5x3iK6VndzdhI38t6Wn9KQaNy88f6LJnAEmNT3FGgPH0mgw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB4966 Return-Path: jiewen.yao@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable I think "+ // List of events of type TCG_TD_EVENT." Shall be "+ // List o= f events of type TD_EVENT." With that change, reviewed-by: Jiewen Yao > -----Original Message----- > From: Xu, Min M > Sent: Tuesday, September 14, 2021 9:57 AM > To: devel@edk2.groups.io > Cc: Xu, Min M ; Kinney, Michael D > ; Liming Gao ; Liu, > Zhiguang ; Yao, Jiewen ; > Wang, Jian J ; Lu, Ken > Subject: [PATCH 1/2] MdePkg: Introduce TdProtocol for TD-Guest firmware >=20 > BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3625 >=20 > If TD-Guest firmware supports measurement and an event is created, > TD-Guest firmware is designed to report the event log with the same data > structure in TCG-Platform-Firmware-Profile specification with > EFI_TCG2_EVENT_LOG_FORMAT_TCG_2 format. >=20 > The TD-Guest firmware supports measurement, the TD Guest Firmware is > designed to produce EFI_TD_PROTOCOL with new GUID > EFI_TD_PROTOCOL_GUID > to report event log and provides hash capability. >=20 > Cc: Michael D Kinney > Cc: Liming Gao > Cc: Zhiguang Liu > Cc: Jiewen Yao > Cc: Jian J Wang > Cc: Ken Lu > Signed-off-by: Min Xu > --- > MdePkg/Include/Protocol/TdProtocol.h | 305 +++++++++++++++++++++++++++ > MdePkg/MdePkg.dec | 3 + > 2 files changed, 308 insertions(+) > create mode 100644 MdePkg/Include/Protocol/TdProtocol.h >=20 > diff --git a/MdePkg/Include/Protocol/TdProtocol.h > b/MdePkg/Include/Protocol/TdProtocol.h > new file mode 100644 > index 000000000000..5a015fca0079 > --- /dev/null > +++ b/MdePkg/Include/Protocol/TdProtocol.h > @@ -0,0 +1,305 @@ > +/** @file > + If TD-Guest firmware supports measurement and an event is created, TD- > Guest > + firmware is designed to report the event log with the same data struct= ure > + in TCG-Platform-Firmware-Profile specification with > + EFI_TCG2_EVENT_LOG_FORMAT_TCG_2 format. > + > + The TD-Guest firmware supports measurement, the TD Guest Firmware is > designed > + to produce EFI_TD_PROTOCOL with new GUID EFI_TD_PROTOCOL_GUID to > report > + event log and provides hash capability. > + > +Copyright (c) 2020 - 2021, Intel Corporation. All rights reserved.
> +SPDX-License-Identifier: BSD-2-Clause-Patent > + > +**/ > + > + > +#ifndef TD_PROTOCOL_H_ > +#define TD_PROTOCOL_H_ > + > +#include > +#include > +#include > + > + > +#define EFI_TD_PROTOCOL_GUID \ > + { 0x96751a3d, 0x72f4, 0x41a6, { 0xa7, 0x94, 0xed, 0x5d, 0x0e, 0x67, 0x= ae, > 0x6b }} > +extern EFI_GUID gEfiTdProtocolGuid; > + > +typedef struct _EFI_TD_PROTOCOL EFI_TD_PROTOCOL; > + > +typedef struct { > + UINT8 Major; > + UINT8 Minor; > +} EFI_TD_VERSION; > + > +typedef UINT32 EFI_TD_EVENT_LOG_BITMAP; > +typedef UINT32 EFI_TD_EVENT_LOG_FORMAT; > +typedef UINT32 EFI_TD_EVENT_ALGORITHM_BITMAP; > +typedef UINT32 EFI_TD_MR_INDEX; > + > +#define EFI_TD_EVENT_LOG_FORMAT_TCG_2 0x00000002 > +#define EFI_TD_BOOT_HASH_ALG_SHA384 0x00000004 > + > +// > +// This bit is shall be set when an event shall be extended but not logg= ed. > +// > +#define EFI_TD_FLAG_EXTEND_ONLY 0x0000000000000001 > +// > +// This bit shall be set when the intent is to measure a PE/COFF image. > +// > +#define EFI_TD_FLAG_PE_COFF_IMAGE 0x0000000000000010 > + > +#define MR_INDEX_MRTD 0 > +#define MR_INDEX_RTMR0 1 > +#define MR_INDEX_RTMR1 2 > +#define MR_INDEX_RTMR2 3 > +#define MR_INDEX_RTMR3 4 > + > +// > +// This bit shall be set when the intent is to measure a PE/COFF image. > +// > +#define PE_COFF_IMAGE 0x0000000000000010 > + > +#pragma pack (1) > + > +#define EFI_TD_EVENT_HEADER_VERSION 1 > + > +typedef struct { > + // > + // Size of the event header itself (sizeof(EFI_TD_EVENT_HEADER)). > + // > + UINT32 HeaderSize; > + // > + // Header version. For this version of this specification, the value s= hall be 1. > + // > + UINT16 HeaderVersion; > + // > + // Index of the MR that shall be extended. > + // > + EFI_TD_MR_INDEX MrIndex; > + // > + // Type of the event that shall be extended (and optionally logged). > + // > + UINT32 EventType; > +} EFI_TD_EVENT_HEADER; > + > +typedef struct { > + // > + // Total size of the event including the Size component, the header an= d the > Event data. > + // > + UINT32 Size; > + EFI_TD_EVENT_HEADER Header; > + UINT8 Event[1]; > +} EFI_TD_EVENT; > + > +#pragma pack() > + > + > +typedef struct { > + // > + // Allocated size of the structure > + // > + UINT8 Size; > + // > + // Version of the EFI_TD_BOOT_SERVICE_CAPABILITY structure itself. > + // For this version of the protocol, the Major version shall be set to= 1 > + // and the Minor version shall be set to 1. > + // > + EFI_TD_VERSION StructureVersion; > + // > + // Version of the EFI TD protocol. > + // For this version of the protocol, the Major version shall be set to= 1 > + // and the Minor version shall be set to 1. > + // > + EFI_TD_VERSION ProtocolVersion; > + // > + // Supported hash algorithms > + // > + EFI_TD_EVENT_ALGORITHM_BITMAP HashAlgorithmBitmap; > + // > + // Bitmap of supported event log formats > + // > + EFI_TD_EVENT_LOG_BITMAP SupportedEventLogs; > + > + // > + // False =3D TD not present > + // > + BOOLEAN TdPresentFlag; > +} EFI_TD_BOOT_SERVICE_CAPABILITY; > + > +/** > + The EFI_TD_PROTOCOL GetCapability function call provides protocol > + capability information and state information. > + > + @param[in] This Indicates the calling context > + @param[in, out] ProtocolCapability The caller allocates memory for a > EFI_TD_BOOT_SERVICE_CAPABILITY > + structure and sets the size field t= o the size of the structure > allocated. > + The callee fills in the fields with= the EFI protocol capability > information > + and the current EFI TD state inform= ation up to the number > of fields which > + fit within the size of the structur= e passed in. > + > + @retval EFI_SUCCESS Operation completed successfully. > + @retval EFI_DEVICE_ERROR The command was unsuccessful. > + The ProtocolCapability variable will no= t be populated. > + @retval EFI_INVALID_PARAMETER One or more of the parameters are > incorrect. > + The ProtocolCapability variable will no= t be populated. > + @retval EFI_BUFFER_TOO_SMALL The ProtocolCapability variable is too > small to hold the full response. > + It will be partially populated (require= d Size field will be set). > +**/ > +typedef > +EFI_STATUS > +(EFIAPI *EFI_TD_GET_CAPABILITY) ( > + IN EFI_TD_PROTOCOL *This, > + IN OUT EFI_TD_BOOT_SERVICE_CAPABILITY *ProtocolCapability > + ); > + > +/** > + The EFI_TD_PROTOCOL Get Event Log function call allows a caller to > + retrieve the address of a given event log and its last entry. > + > + @param[in] This Indicates the calling context > + @param[in] EventLogFormat The type of the event log for which the > information is requested. > + @param[out] EventLogLocation A pointer to the memory address of the > event log. > + @param[out] EventLogLastEntry If the Event Log contains more than one > entry, this is a pointer to the > + address of the start of the last entry = in the event log in > memory. > + @param[out] EventLogTruncated If the Event Log is missing at least on= e > entry because an event would > + have exceeded the area allocated for ev= ents, this value is set > to TRUE. > + Otherwise, the value will be FALSE and = the Event Log will be > complete. > + > + @retval EFI_SUCCESS Operation completed successfully. > + @retval EFI_INVALID_PARAMETER One or more of the parameters are > incorrect > + (e.g. asking for an event log whose for= mat is not supported). > +**/ > +typedef > +EFI_STATUS > +(EFIAPI *EFI_TD_GET_EVENT_LOG) ( > + IN EFI_TD_PROTOCOL *This, > + IN EFI_TD_EVENT_LOG_FORMAT EventLogFormat, > + OUT EFI_PHYSICAL_ADDRESS *EventLogLocation, > + OUT EFI_PHYSICAL_ADDRESS *EventLogLastEntry, > + OUT BOOLEAN *EventLogTruncated > + ); > + > +/** > + The EFI_TD_PROTOCOL HashLogExtendEvent function call provides callers > with > + an opportunity to extend and optionally log events without requiring > + knowledge of actual TD commands. > + The extend operation will occur even if this function cannot create an= event > + log entry (e.g. due to the event log being full). > + > + @param[in] This Indicates the calling context > + @param[in] Flags Bitmap providing additional information= . > + @param[in] DataToHash Physical address of the start of the da= ta buffer > to be hashed. > + @param[in] DataToHashLen The length in bytes of the buffer refer= enced > by DataToHash. > + @param[in] EfiTdEvent Pointer to data buffer containing infor= mation > about the event. > + > + @retval EFI_SUCCESS Operation completed successfully. > + @retval EFI_DEVICE_ERROR The command was unsuccessful. > + @retval EFI_VOLUME_FULL The extend operation occurred, but the = event > could not be written to one or more event logs. > + @retval EFI_INVALID_PARAMETER One or more of the parameters are > incorrect. > + @retval EFI_UNSUPPORTED The PE/COFF image type is not supported= . > +**/ > +typedef > +EFI_STATUS > +(EFIAPI * EFI_TD_HASH_LOG_EXTEND_EVENT) ( > + IN EFI_TD_PROTOCOL *This, > + IN UINT64 Flags, > + IN EFI_PHYSICAL_ADDRESS DataToHash, > + IN UINT64 DataToHashLen, > + IN EFI_TD_EVENT *EfiTdEvent > + ); > + > +/** > + The EFI_TD_PROTOCOL MapPcrToMrIndex function call provides callers > + the info on TPM PCR<-> measurement register mapping information. > + > + In current version, we use below mapping: > + PCR0 -> MRTD (Index 0) > + PCR1 -> RTMR0 (Index 1) > + PCR2~6 -> RTMR1 (Index 2) > + PCR7 -> RTMR0 (Index 1) > + PCR8~15 -> RTMR2 (Index 3) > + > + @param[in] This Indicates the calling context > + @param[in] PcrIndex TPM PCR index. > + @param[out] MrIndex Measurement register index. > + > + @retval EFI_SUCCESS The MR index is returned. > + @retval EFI_INVALID_PARAMETER The MrIndex is NULL. > + @retval EFI_UNSUPPORTED The PcrIndex is invalid. > +**/ > +typedef > +EFI_STATUS > +(EFIAPI * EFI_TD_MAP_PCR_TO_MR_INDEX) ( > + IN EFI_TD_PROTOCOL *This, > + IN TCG_PCRINDEX PcrIndex, > + OUT EFI_TD_MR_INDEX *MrIndex > + ); > + > +struct _EFI_TD_PROTOCOL { > + EFI_TD_GET_CAPABILITY GetCapability; > + EFI_TD_GET_EVENT_LOG GetEventLog; > + EFI_TD_HASH_LOG_EXTEND_EVENT HashLogExtendEvent; > + EFI_TD_MAP_PCR_TO_MR_INDEX MapPcrToMrIndex; > +}; > + > + > +// > +// TD event log > +// > + > +#pragma pack(1) > + > +// > +// Crypto Agile Log Entry Format. > +// It is similar with TCG_PCR_EVENT2 except the field of MrIndex and PCR= Index. > +// > +typedef struct { > + EFI_TD_MR_INDEX MrIndex; > + UINT32 EventType; > + TPML_DIGEST_VALUES Digests; > + UINT32 EventSize; > + UINT8 Event[1]; > +} TD_EVENT; > + > +// > +// EFI TD Event Header > +// It is similar with TCG_PCR_EVENT2_HDR except the field of MrIndex and > PCRIndex > +// > +typedef struct { > + EFI_TD_MR_INDEX MrIndex; > + UINT32 EventType; > + TPML_DIGEST_VALUES Digests; > + UINT32 EventSize; > +} TD_EVENT_HDR; > + > +#pragma pack() > + > +// > +// Log entries after Get Event Log service > +// > + > + > +typedef struct { > + // > + // The version of this structure. It shall be set ot 1. > + // > + UINT64 Version; > + // > + // Number of events recorded after invocation of GetEventLog API > + // > + UINT64 NumberOfEvents; > + // > + // List of events of type TCG_TD_EVENT. > + // > + //TD_EVENT Event[1]; > +} EFI_TD_FINAL_EVENTS_TABLE; > + > + > +#define EFI_TD_FINAL_EVENTS_TABLE_GUID \ > + {0xdd4a4648, 0x2de7, 0x4665, {0x96, 0x4d, 0x21, 0xd9, 0xef, 0x5f, 0xb4= , > 0x46}} > + > +extern EFI_GUID gEfiTdFinalEventsTableGuid; > + > +#endif > diff --git a/MdePkg/MdePkg.dec b/MdePkg/MdePkg.dec > index a28a2daaffa8..2f48f6c40c1e 100644 > --- a/MdePkg/MdePkg.dec > +++ b/MdePkg/MdePkg.dec > @@ -1008,6 +1008,9 @@ > ## Include/Protocol/PcdInfo.h > gGetPcdInfoProtocolGuid =3D { 0x5be40f57, 0xfa68, 0x4610, { 0xb= b, 0xbf, > 0xe9, 0xc5, 0xfc, 0xda, 0xd3, 0x65 } } >=20 > + ## Include/Protocol/TdProtocol.h > + gEfiTdProtocolGuid =3D { 0x96751a3d, 0x72f4, 0x41a6, { 0xa= 7, 0x94, 0xed, > 0x5d, 0x0e, 0x67, 0xae, 0x6b }} > + > # > # Protocols defined in PI1.0. > # > -- > 2.29.2.windows.2