From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by mx.groups.io with SMTP id smtpd.web09.5799.1635834295214701306 for ; Mon, 01 Nov 2021 23:24:55 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@intel.onmicrosoft.com header.s=selector2-intel-onmicrosoft-com header.b=HNEeW9wH; spf=pass (domain: intel.com, ip: 192.55.52.151, mailfrom: jiewen.yao@intel.com) X-IronPort-AV: E=McAfee;i="6200,9189,10155"; a="211951436" X-IronPort-AV: E=Sophos;i="5.87,201,1631602800"; d="scan'208";a="211951436" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Nov 2021 23:24:25 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.87,201,1631602800"; d="scan'208";a="666995601" Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by orsmga005.jf.intel.com with ESMTP; 01 Nov 2021 23:24:25 -0700 Received: from orsmsx611.amr.corp.intel.com (10.22.229.24) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.12; Mon, 1 Nov 2021 23:24:25 -0700 Received: from orsmsx608.amr.corp.intel.com (10.22.229.21) by ORSMSX611.amr.corp.intel.com (10.22.229.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.12; Mon, 1 Nov 2021 23:24:24 -0700 Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx608.amr.corp.intel.com (10.22.229.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.12 via Frontend Transport; Mon, 1 Nov 2021 23:24:24 -0700 Received: from NAM04-MW2-obe.outbound.protection.outlook.com (104.47.73.168) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2242.12; Mon, 1 Nov 2021 23:24:24 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SePu6OAmJEinjTTUqcuKqRMDEu8op9o24ex0CuB0qy3YGFU7mBKFz0JrJ/TEcHlf5RMBqafIns5rd6bdClWfqSulGpiEeV2PpLptk8eX+YMMHY6572VddQESVcLF5iKtGX/bqkR3bddmM8tjRB2jLiCyqMXveUVeXx01z8Ky+JwEs+Dh7cv5YJZKe9XUiJnLQbNF92ftiFJTuwcl1cwY7hHpOhe6U+GZgtsOUitm1E/Yu/QGlCuh0s1ejw5t9y7pEP5FsjeCHa2y+knQ//sU2KvEWbrqQgrKLsg/72YrWN/c5Z7XftSb6fTANnpOxSJIv+76X4OMD+Lj9trgIVbTGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=nDFTlyCTgHyEquj/hcQUJm/BeVv40Wipenl5qoH6c9M=; b=HktbE33u54NACrUppiZMNMr6Kdk5DNhzzTkpCTmwQDJArurFq7Zbh6emO5Ge4FSAp7sLjmb0Vx9mdxDZnsgrw3FSHiGo3Y8nzQKnAdi8axQ077JuWCtSQQQKWOaFnKMx4S7iWxhEnZpzNaNLUkaJb2fN0ifDzVvigOxA8/DmgjKmr7ul2Sd5VSBYIchfoMalTa+7/oeCxDr68H/rmycVt5BxLykvJXqyTy0WEYMIfziND2B8IUaa0D4sVfPufyD08cYUcyKtHBNJ3oWlOzC+VxmO5h5ecBgQXGVRLlTa6A6ehZbQmoOtWAXC+bC/Ft+Ml0bgGcLQP43Z1013odQEiA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel.onmicrosoft.com; s=selector2-intel-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=nDFTlyCTgHyEquj/hcQUJm/BeVv40Wipenl5qoH6c9M=; b=HNEeW9wHB9PVxEmG8426JufjpArEzjN3OE2RfNN1MM0StIwgsKEXjSqQad2Ld02XlF7xCgtPuuIajUoRkqZEIV9pcsNDCBfir+AhQPK9mihb9jUgD+sxMLyp2+j8jCAVVX6vDCz/ef7At+DMck6vEff9FznN5T0a3D1YxXFx6aM= Received: from PH0PR11MB4885.namprd11.prod.outlook.com (2603:10b6:510:35::14) by PH0PR11MB5046.namprd11.prod.outlook.com (2603:10b6:510:3b::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4649.14; Tue, 2 Nov 2021 06:24:23 +0000 Received: from PH0PR11MB4885.namprd11.prod.outlook.com ([fe80::c5cb:e37a:9f3:8f80]) by PH0PR11MB4885.namprd11.prod.outlook.com ([fe80::c5cb:e37a:9f3:8f80%5]) with mapi id 15.20.4649.019; Tue, 2 Nov 2021 06:24:23 +0000 From: "Yao, Jiewen" To: "Xu, Min M" , "devel@edk2.groups.io" CC: "Kinney, Michael D" , Liming Gao , "Liu, Zhiguang" , "Wang, Jian J" , "Lu, Ken" , Sami Mujawar , Gerd Hoffmann Subject: Re: [PATCH V4 1/3] MdePkg: Introduce CcMeasurementProtocol for CC Guest firmware Thread-Topic: [PATCH V4 1/3] MdePkg: Introduce CcMeasurementProtocol for CC Guest firmware Thread-Index: AQHXz5SfmV9tDEAwB0aWri0GcUZwJKvvxVYw Date: Tue, 2 Nov 2021 06:24:23 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-version: 11.6.200.16 dlp-product: dlpe-windows dlp-reaction: no-action authentication-results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: aa585d0a-d93e-4e9c-6962-08d99dc969a1 x-ms-traffictypediagnostic: PH0PR11MB5046: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:303; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR11MB4885.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(6029001)(366004)(316002)(66476007)(64756008)(66556008)(66446008)(52536014)(53546011)(6506007)(76116006)(71200400001)(26005)(966005)(508600001)(5660300002)(86362001)(54906003)(66946007)(4326008)(7696005)(110136005)(2906002)(33656002)(122000001)(38100700002)(30864003)(82960400001)(8676002)(9686003)(55016002)(38070700005)(83380400001)(186003)(8936002);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?cDBnTFLgPqWEyHQmtooWCoz1rsoIAGOeM0yTlrUFsK4FGeFPEEQGVG6HnIkw?= =?us-ascii?Q?K8DT3jkyHILjw81M6JOL9VLQTk+nicjxr9Z25oqGPsq84BYNp0v4O/ZrDICs?= =?us-ascii?Q?b8S8ZXFsh2XyrNG3V58cCgSqegsw0pAYd71rNTxgzJBMjWlJuAf3Jprlyfmb?= =?us-ascii?Q?1oKYJNGLnLVntozOktVlrLS2c2yKYIsUnxLqKOec2T5/P/355F/CxABIoI/L?= =?us-ascii?Q?0A4MR2c6CGnFgnN9ZhdAcu7VzzFok003ZEEitubf22nkZc2Kz94C6pFfamVX?= =?us-ascii?Q?O+IEj40rL8J0BrWd8Qbiwq+n/4gzK6j1KY3a1VlHcOZvn87pJxwMH8xyTY2F?= =?us-ascii?Q?g+gZfjjLye6zm6O6MhE/pgxuEapooLM6iwrA8lO4bm5Q/6Vv0sOygkrkW3jP?= =?us-ascii?Q?oxVHxB2yVtxjNTGvgFUZPzEQAa0kWmkHoTG1ugdGzkYph4xxUeQJq4slU8Yq?= =?us-ascii?Q?ggRntJwJ6Skp/h9kD0RXI7GEM3OFWKFfEOoMZTE7OtdMoyy9MjwcDu2ikhqA?= =?us-ascii?Q?tZVB+F8tjmjZHZVuull58NOgQIikHKLHitFkQzkhOrriwT6dyO8bwyjnnNcG?= =?us-ascii?Q?E7B+vYd6PH+iZQc0DuQMFGOlXLru9iJgegzuZmgrXl2kRGJsN6/pDI4Xt48t?= =?us-ascii?Q?03RAme7J8EeqFOA5ZvqCGN65PGlxzTfWzYDjK4EVuheZdPohPFZhZswVeE9S?= =?us-ascii?Q?THPzREOb+jqEDHrOztCOpUwihFjREcK6HPrujtYNb+9KjMSf7nkepbe0we8S?= =?us-ascii?Q?zL23ERCV9D/cFVS0l06KybF/t/IelNNuyC79gXkffEsaIr0jKpy60AGveLTM?= =?us-ascii?Q?dHiWiJdZ6FFGQnrhd2JUiUUJu2957x1iD4JEg97rzjAHTS46qEC0h3Iw39cU?= =?us-ascii?Q?Nvs4Je0rXtF4VjDWo5Lon/26cdlFAWLf0q0/Cgz8nqQthrCY5+eMEXIDyVsV?= =?us-ascii?Q?QlIO0b/Py9RczSOKVg2NASZPhQp7Q/7SRIFyDG+zdO1LfzWL2R1gRYxqeDKd?= =?us-ascii?Q?dJdeCDYhLzti0JjfyXn/RGNWwoghji8wPSaTHb3VPhm2M9cuYEU027iRQoKW?= =?us-ascii?Q?X2Ts9G4PRREc9uMDLOxSjWGyWWzrqw977YAuXH2WO5KxkQVyvtaOC7kon8vx?= =?us-ascii?Q?TUTmH4FVS5G6YKpicsZjVbhsCokX5Md1bqbpSXu/QZkh5QC9OlOo3fy1xPH4?= =?us-ascii?Q?EoU6iWwXd0LxEQe37tomFs+oeXc+8bWS/7tOjki9QI+/0etiu8GsT8DZsRPh?= =?us-ascii?Q?hkYIEwrMLPEHD+H8GT/Kr22RdK3gEyM4PSbvPu04fMC0lEEblmrvyDaga9T7?= =?us-ascii?Q?yiMpVISAYDNbStUXYSPxK4FBk8+KIwK0qqNEV7hx6gxcBX4ndK2xN8PF8fAn?= =?us-ascii?Q?1Oflh+wqFNx45CZMZHgAudd6WBy6lPBqUJKRtOHM8bjCwK9kDkQc5DYPJUri?= =?us-ascii?Q?WuRZCUKfp3UrqpkIX9r1UpvDIlXiIhklkSKnFQW0Eouht/t5ywLSOf/W3MhJ?= =?us-ascii?Q?OUNgXmDOsrj+TEWpcLM8yf2Zz3wFN/2xji3VaBY5/rSuoZ6dL9Az2qP3GhXi?= =?us-ascii?Q?cWzSbSaosH3eEMqSvk/b/l2aFB62RL4fnN0ds42oKWh+p21J7svnaKBidRu0?= =?us-ascii?Q?zH1iJzUZN82zQJLEswu+ETY=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4885.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: aa585d0a-d93e-4e9c-6962-08d99dc969a1 X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Nov 2021 06:24:23.4096 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: nz6xulnUeqdILIymDiEfJejAXoOzsfcXqwgLX8/yo5ouw7YQWUVeHmVqrOm8sEEo67DkQjhqCZnduPlyedD0cw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB5046 Return-Path: jiewen.yao@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Reviewed-by: Jiewen Yao > -----Original Message----- > From: Xu, Min M > Sent: Tuesday, November 2, 2021 10:51 AM > To: devel@edk2.groups.io > Cc: Xu, Min M ; Kinney, Michael D > ; Liming Gao ; Liu, > Zhiguang ; Yao, Jiewen ; > Wang, Jian J ; Lu, Ken ; Sami > Mujawar ; Gerd Hoffmann > Subject: [PATCH V4 1/3] MdePkg: Introduce CcMeasurementProtocol for CC > Guest firmware >=20 > BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3625 >=20 > CC guest is a Confidential Computing guest. If CC Guest firmware > supports measurement and an event is created, CC Guest firmware > is designed to report the event log with the same data structure > in TCG-Platform-Firmware-Profile specification with > EFI_TCG2_EVENT_LOG_FORMAT_TCG_2 format. >=20 > The CC Guest firmware supports measurement. It is designed to > produce EFI_CC_MEASUREMENT_PROTOCOL with new GUID > EFI_CC_MEASUREMENT_PROTOCOL_GUID to report event log and provides > hash capability. >=20 > Cc: Michael D Kinney > Cc: Liming Gao > Cc: Zhiguang Liu > Cc: Jiewen Yao > Cc: Jian J Wang > Cc: Ken Lu > Cc: Sami Mujawar > Cc: Gerd Hoffmann > Signed-off-by: Min Xu > --- > MdePkg/Include/Protocol/CcMeasurement.h | 305 > ++++++++++++++++++++++++ > MdePkg/MdePkg.dec | 4 + > 2 files changed, 309 insertions(+) > create mode 100644 MdePkg/Include/Protocol/CcMeasurement.h >=20 > diff --git a/MdePkg/Include/Protocol/CcMeasurement.h > b/MdePkg/Include/Protocol/CcMeasurement.h > new file mode 100644 > index 000000000000..eaedbfffdb6a > --- /dev/null > +++ b/MdePkg/Include/Protocol/CcMeasurement.h > @@ -0,0 +1,305 @@ > +/** @file > + If CC Guest firmware supports measurement and an event is created, > + CC Guest firmware is designed to report the event log with the same > + data structure in TCG-Platform-Firmware-Profile specification with > + EFI_TCG2_EVENT_LOG_FORMAT_TCG_2 format. > + > + The CC Guest firmware supports measurement, the CC Guest Firmware is > + designed to produce EFI_CC_MEASUREMENT_PROTOCOL with new GUID > + EFI_CC_MEASUREMENT_PROTOCOL_GUID to report event log and provides > hash > + capability. > + > +Copyright (c) 2020 - 2021, Intel Corporation. All rights reserved.
> +SPDX-License-Identifier: BSD-2-Clause-Patent > + > +**/ > + > +#ifndef CC_MEASUREMENT_PROTOCOL_H_ > +#define CC_MEASUREMENT_PROTOCOL_H_ > + > +#include > + > +#define EFI_CC_MEASUREMENT_PROTOCOL_GUID \ > + { 0x96751a3d, 0x72f4, 0x41a6, { 0xa7, 0x94, 0xed, 0x5d, 0x0e, 0x67, 0x= ae, > 0x6b }} > +extern EFI_GUID gEfiCcMeasurementProtocolGuid; > + > +typedef struct _EFI_CC_MEASUREMENT_PROTOCOL > EFI_CC_MEASUREMENT_PROTOCOL; > + > +typedef struct { > + UINT8 Major; > + UINT8 Minor; > +} EFI_CC_VERSION; > + > +// > +// EFI_CC Type/SubType definition > +// > +#define EFI_CC_TYPE_NONE 0 > +#define EFI_CC_TYPE_SEV 1 > +#define EFI_CC_TYPE_TDX 2 > + > +typedef struct { > + UINT8 Type; > + UINT8 SubType; > +} EFI_CC_TYPE; > + > +typedef UINT32 EFI_CC_EVENT_LOG_BITMAP; > +typedef UINT32 EFI_CC_EVENT_LOG_FORMAT; > +typedef UINT32 EFI_CC_EVENT_ALGORITHM_BITMAP; > +typedef UINT32 EFI_CC_MR_INDEX; > + > +// > +// Intel TDX measure register index > +// > +#define TDX_MR_INDEX_MRTD 0 > +#define TDX_MR_INDEX_RTMR0 1 > +#define TDX_MR_INDEX_RTMR1 2 > +#define TDX_MR_INDEX_RTMR2 3 > +#define TDX_MR_INDEX_RTMR3 4 > + > + > +#define EFI_CC_EVENT_LOG_FORMAT_TCG_2 0x00000002 > +#define EFI_CC_BOOT_HASH_ALG_SHA384 0x00000004 > + > +// > +// This bit is shall be set when an event shall be extended but not logg= ed. > +// > +#define EFI_CC_FLAG_EXTEND_ONLY 0x0000000000000001 > +// > +// This bit shall be set when the intent is to measure a PE/COFF image. > +// > +#define EFI_CC_FLAG_PE_COFF_IMAGE 0x0000000000000010 > + > +#pragma pack (1) > + > +#define EFI_CC_EVENT_HEADER_VERSION 1 > + > +typedef struct { > + // > + // Size of the event header itself (sizeof(EFI_CC_EVENT_HEADER)). > + // > + UINT32 HeaderSize; > + // > + // Header version. For this version of this specification, the value s= hall be 1. > + // > + UINT16 HeaderVersion; > + // > + // Index of the MR (measurement register) that shall be extended. > + // > + EFI_CC_MR_INDEX MrIndex; > + // > + // Type of the event that shall be extended (and optionally logged). > + // > + UINT32 EventType; > +} EFI_CC_EVENT_HEADER; > + > +typedef struct { > + // > + // Total size of the event including the Size component, the header an= d the > Event data. > + // > + UINT32 Size; > + EFI_CC_EVENT_HEADER Header; > + UINT8 Event[1]; > +} EFI_CC_EVENT; > + > +#pragma pack() > + > + > +typedef struct { > + // > + // Allocated size of the structure > + // > + UINT8 Size; > + // > + // Version of the EFI_CC_BOOT_SERVICE_CAPABILITY structure itself. > + // For this version of the protocol, the Major version shall be set to= 1 > + // and the Minor version shall be set to 0. > + // > + EFI_CC_VERSION StructureVersion; > + // > + // Version of the EFI CC Measurement protocol. > + // For this version of the protocol, the Major version shall be set to= 1 > + // and the Minor version shall be set to 0. > + // > + EFI_CC_VERSION ProtocolVersion; > + // > + // Supported hash algorithms > + // > + EFI_CC_EVENT_ALGORITHM_BITMAP HashAlgorithmBitmap; > + // > + // Bitmap of supported event log formats > + // > + EFI_CC_EVENT_LOG_BITMAP SupportedEventLogs; > + > + // > + // Indicates the CC type > + // > + EFI_CC_TYPE CcType; > +} EFI_CC_BOOT_SERVICE_CAPABILITY; > + > +/** > + The EFI_CC_MEASUREMENT_PROTOCOL GetCapability function call provides > protocol > + capability information and state information. > + > + @param[in] This Indicates the calling context > + @param[in, out] ProtocolCapability The caller allocates memory for a > EFI_CC_BOOT_SERVICE_CAPABILITY > + structure and sets the size field t= o the size of the structure > allocated. > + The callee fills in the fields with= the EFI CC BOOT Service > capability > + information and the current CC info= rmation. > + > + @retval EFI_SUCCESS Operation completed successfully. > + @retval EFI_DEVICE_ERROR The command was unsuccessful. > + The ProtocolCapability variable will no= t be populated. > + @retval EFI_INVALID_PARAMETER One or more of the parameters are > incorrect. > + The ProtocolCapability variable will no= t be populated. > + @retval EFI_BUFFER_TOO_SMALL The ProtocolCapability variable is too > small to hold the full response. > + It will be partially populated (require= d Size field will be set). > +**/ > +typedef > +EFI_STATUS > +(EFIAPI *EFI_CC_GET_CAPABILITY) ( > + IN EFI_CC_MEASUREMENT_PROTOCOL *This, > + IN OUT EFI_CC_BOOT_SERVICE_CAPABILITY *ProtocolCapability > + ); > + > +/** > + The EFI_CC_MEASUREMENT_PROTOCOL Get Event Log function call allows a > caller to > + retrieve the address of a given event log and its last entry. > + > + @param[in] This Indicates the calling context > + @param[in] EventLogFormat The type of the event log for which the > information is requested. > + @param[out] EventLogLocation A pointer to the memory address of the > event log. > + @param[out] EventLogLastEntry If the Event Log contains more than one > entry, this is a pointer to the > + address of the start of the last entry = in the event log in > memory. > + @param[out] EventLogTruncated If the Event Log is missing at least on= e > entry because an event would > + have exceeded the area allocated for ev= ents, this value is set > to TRUE. > + Otherwise, the value will be FALSE and = the Event Log will be > complete. > + > + @retval EFI_SUCCESS Operation completed successfully. > + @retval EFI_INVALID_PARAMETER One or more of the parameters are > incorrect > + (e.g. asking for an event log whose for= mat is not supported). > +**/ > +typedef > +EFI_STATUS > +(EFIAPI *EFI_CC_GET_EVENT_LOG) ( > + IN EFI_CC_MEASUREMENT_PROTOCOL *This, > + IN EFI_CC_EVENT_LOG_FORMAT EventLogFormat, > + OUT EFI_PHYSICAL_ADDRESS *EventLogLocation, > + OUT EFI_PHYSICAL_ADDRESS *EventLogLastEntry, > + OUT BOOLEAN *EventLogTruncated > + ); > + > +/** > + The EFI_CC_MEASUREMENT_PROTOCOL HashLogExtendEvent function call > provides > + callers with an opportunity to extend and optionally log events withou= t > requiring > + knowledge of actual CC commands. > + The extend operation will occur even if this function cannot create an= event > + log entry (e.g. due to the event log being full). > + > + @param[in] This Indicates the calling context > + @param[in] Flags Bitmap providing additional information= . > + @param[in] DataToHash Physical address of the start of the da= ta buffer > to be hashed. > + @param[in] DataToHashLen The length in bytes of the buffer refer= enced > by DataToHash. > + @param[in] EfiCcEvent Pointer to data buffer containing inform= ation > about the event. > + > + @retval EFI_SUCCESS Operation completed successfully. > + @retval EFI_DEVICE_ERROR The command was unsuccessful. > + @retval EFI_VOLUME_FULL The extend operation occurred, but the = event > could not be written to one or more event logs. > + @retval EFI_INVALID_PARAMETER One or more of the parameters are > incorrect. > + @retval EFI_UNSUPPORTED The PE/COFF image type is not supported= . > +**/ > +typedef > +EFI_STATUS > +(EFIAPI * EFI_CC_HASH_LOG_EXTEND_EVENT) ( > + IN EFI_CC_MEASUREMENT_PROTOCOL *This, > + IN UINT64 Flags, > + IN EFI_PHYSICAL_ADDRESS DataToHash, > + IN UINT64 DataToHashLen, > + IN EFI_CC_EVENT *EfiCcEvent > + ); > + > +/** > + The EFI_CC_MEASUREMENT_PROTOCOL MapPcrToMrIndex function call > provides callers > + the info on TPM PCR <-> CC MR mapping information. > + > + @param[in] This Indicates the calling context > + @param[in] PcrIndex TPM PCR index. > + @param[out] MrIndex CC MR index. > + > + @retval EFI_SUCCESS The MrIndex is returned. > + @retval EFI_INVALID_PARAMETER The MrIndex is NULL. > + @retval EFI_UNSUPPORTED The PcrIndex is invalid. > +**/ > +typedef > +EFI_STATUS > +(EFIAPI * EFI_CC_MAP_PCR_TO_MR_INDEX) ( > + IN EFI_CC_MEASUREMENT_PROTOCOL *This, > + IN TCG_PCRINDEX PcrIndex, > + OUT EFI_CC_MR_INDEX *MrIndex > + ); > + > +struct _EFI_CC_MEASUREMENT_PROTOCOL { > + EFI_CC_GET_CAPABILITY GetCapability; > + EFI_CC_GET_EVENT_LOG GetEventLog; > + EFI_CC_HASH_LOG_EXTEND_EVENT HashLogExtendEvent; > + EFI_CC_MAP_PCR_TO_MR_INDEX MapPcrToMrIndex; > +}; > + > +// > +// CC event log > +// > + > +#pragma pack(1) > + > +// > +// Crypto Agile Log Entry Format. > +// It is similar with TCG_PCR_EVENT2 except the field of MrIndex and PCR= Index. > +// > +typedef struct { > + EFI_CC_MR_INDEX MrIndex; > + UINT32 EventType; > + TPML_DIGEST_VALUES Digests; > + UINT32 EventSize; > + UINT8 Event[1]; > +} CC_EVENT; > + > +// > +// EFI CC Event Header > +// It is similar with TCG_PCR_EVENT2_HDR except the field of MrIndex and > PCRIndex > +// > +typedef struct { > + EFI_CC_MR_INDEX MrIndex; > + UINT32 EventType; > + TPML_DIGEST_VALUES Digests; > + UINT32 EventSize; > +} CC_EVENT_HDR; > + > +#pragma pack() > + > +// > +// Log entries after Get Event Log service > +// > + > +#define EFI_CC_FINAL_EVENTS_TABLE_VERSION 1 > + > +typedef struct { > + // > + // The version of this structure. It shall be set to 1. > + // > + UINT64 Version; > + // > + // Number of events recorded after invocation of GetEventLog API > + // > + UINT64 NumberOfEvents; > + // > + // List of events of type CC_EVENT. > + // > + //CC_EVENT Event[1]; > +} EFI_CC_FINAL_EVENTS_TABLE; > + > + > +#define EFI_CC_FINAL_EVENTS_TABLE_GUID \ > + {0xdd4a4648, 0x2de7, 0x4665, {0x96, 0x4d, 0x21, 0xd9, 0xef, 0x5f, 0xb4= , > 0x46}} > + > +extern EFI_GUID gEfiCcFinalEventsTableGuid; > + > +#endif > diff --git a/MdePkg/MdePkg.dec b/MdePkg/MdePkg.dec > index 8b18415b107a..8e19be662ada 100644 > --- a/MdePkg/MdePkg.dec > +++ b/MdePkg/MdePkg.dec > @@ -1011,6 +1011,10 @@ > ## Include/Protocol/PcdInfo.h > gGetPcdInfoProtocolGuid =3D { 0x5be40f57, 0xfa68, 0x4610, { 0xb= b, 0xbf, > 0xe9, 0xc5, 0xfc, 0xda, 0xd3, 0x65 } } >=20 > + ## Include/Protocol/CcMeasurement.h > + gEfiCcMeasurementProtocolGuid =3D { 0x96751a3d, 0x72f4, 0x41a6, { 0xa= 7, > 0x94, 0xed, 0x5d, 0x0e, 0x67, 0xae, 0x6b }} > + gEfiCcFinalEventsTableGuid =3D { 0xdd4a4648, 0x2de7, 0x4665, { 0x9= 6, 0x4d, > 0x21, 0xd9, 0xef, 0x5f, 0xb4, 0x46 }} > + > # > # Protocols defined in PI1.0. > # > -- > 2.29.2.windows.2