From nobody Tue Feb 10 01:30:49 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of groups.io designates 66.175.222.12 as permitted sender) client-ip=66.175.222.12; envelope-from=bounce+27952+49770+1787277+3901457@groups.io; helo=web01.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zoho.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+49770+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=intel.com ARC-Seal: i=1; a=rsa-sha256; t=1572525097; cv=none; d=zoho.com; s=zohoarc; b=lbTDUtZ3HV85gOunK/sBG1uAzmj2meHHpTgCYypaQragXAxDA0eqj83HshcXP+9K5RhQL+zccLzAt0W4/zXjQcgJXg41HQXl6Oaca1Z9mFsAdswbCA1TMUMFATGpr8f0nIh9/SzT4IJvSEwJx4MTgspb6Qe75CSKhCpbYYgLqTQ= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1572525097; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Id:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=XAmLCbdOK1Rjb60dFgxBLNWFmck4v7o6bjp0S4npADA=; b=lp0KGVGbP1ZPFo5sS7uSYXsEJgP4uWdHq5oE0XsI3Wc59BveqQc+J9poJW/YMt3Hvu7crAeIgURh/5t5DPx3kXf18bYSFNs3jIvhAdzzSQdsYYn5lEWjLyNlQuY3hELAMoLoWs7xHqNoGKScO9sc5YpA8O5zfrWuNOaOhzA7SOQ= ARC-Authentication-Results: i=1; mx.zoho.com; dkim=pass; spf=pass (zoho.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+49770+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) header.from= Received: from web01.groups.io (web01.groups.io [66.175.222.12]) by mx.zohomail.com with SMTPS id 1572525097391230.9049700881709; Thu, 31 Oct 2019 05:31:37 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id iig4YY1788612xKCaKS4Ya8G; Thu, 31 Oct 2019 05:31:36 -0700 X-Received: from mga02.intel.com (mga02.intel.com []) by mx.groups.io with SMTP id smtpd.web11.5236.1572525094034209064 for ; Thu, 31 Oct 2019 05:31:36 -0700 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False X-Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga101.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 31 Oct 2019 05:31:35 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.68,250,1569308400"; d="scan'208";a="283875688" X-Received: from jyao1-mobl2.ccr.corp.intel.com ([10.254.211.198]) by orsmga001.jf.intel.com with ESMTP; 31 Oct 2019 05:31:34 -0700 From: "Yao, Jiewen" To: devel@edk2.groups.io Cc: Ray Ni , Rangasai V Chaganty , Yun Lou Subject: [edk2-devel] [PATCH V2 2/6] IntelSiliconPkg/Include: Add Platform Device Security Policy protocol Date: Thu, 31 Oct 2019 20:31:23 +0800 Message-Id: <20191031123127.10900-3-jiewen.yao@intel.com> In-Reply-To: <20191031123127.10900-1-jiewen.yao@intel.com> References: <20191031123127.10900-1-jiewen.yao@intel.com> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,jiewen.yao@intel.com X-Gm-Message-State: GwM2MaIii6UQWGGUeqAIgMKwx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1572525096; bh=lNMZEZlRTQLshID5guUAy8iYkxxZxg7yEA1r8BU0VTc=; h=Cc:Date:From:Reply-To:Subject:To; b=Uz1jBZ8O5x/j5wFva6x2qUchaXINw8JayV0fKvZD6PebNGTgRI/dRv1YjS5hp1fXu8V qvqAa9t4D5Nvqf7HMs95UQFz0hFtoG9KDs18PCa1gppdrtqHMTFHzPCHe6LCEmZqmTyAR V2fnGWNsh5yb/BKM5bt40EBfaToGJ+QW/t8= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Type: text/plain; charset="utf-8" REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D2303 Cc: Ray Ni Cc: Rangasai V Chaganty Cc: Yun Lou Signed-off-by: Jiewen Yao --- Silicon/Intel/IntelSiliconPkg/Include/Protocol/PlatformDeviceSecurityPolic= y.h | 84 ++++++++++++++++++++ 1 file changed, 84 insertions(+) diff --git a/Silicon/Intel/IntelSiliconPkg/Include/Protocol/PlatformDeviceS= ecurityPolicy.h b/Silicon/Intel/IntelSiliconPkg/Include/Protocol/PlatformDe= viceSecurityPolicy.h new file mode 100644 index 0000000000..cb5a71ad41 --- /dev/null +++ b/Silicon/Intel/IntelSiliconPkg/Include/Protocol/PlatformDeviceSecurity= Policy.h @@ -0,0 +1,84 @@ +/** @file + Device Security Policy Protocol definition + + Copyright (c) 2019, Intel Corporation. All rights reserved.
+ SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + + +#ifndef __EDKII_DEVICE_SECURITY_POLICY_PROTOCOL_H__ +#define __EDKII_DEVICE_SECURITY_POLICY_PROTOCOL_H__ + +#include +#include + +typedef struct _EDKII_DEVICE_SECURITY_POLICY_PROTOCOL EDKII_DEVICE_SECURIT= Y_POLICY_PROTOCOL; + +typedef struct { + UINT32 Version; // 0x1 + UINT32 MeasurementPolicy; + UINT32 AuthenticationPolicy; +} EDKII_DEVICE_SECURITY_POLICY; + +// BIT0 means if the action is needed or NOT +#define EDKII_DEVICE_MEASUREMENT_POLICY_REQUIRED BIT0 +#define EDKII_DEVICE_AUTHENTICATION_POLICY_REQUIRED BIT0 + +typedef struct { + UINT32 Version; // 0x1 + UINT32 MeasurementState; + UINT32 AuthenticationState; +} EDKII_DEVICE_SECURITY_STATE; + +// All zero means success +#define EDKII_DEVICE_SECURITY_STATE_SUCCESS 0 +#define EDKII_DEVICE_SECURITY_STATE_ERROR BIT31 +#define EDKII_DEVICE_SECURITY_STATE_ERROR_UEFI_UNSUPPORTED (EDKI= I_DEVICE_SECURITY_STATE_ERROR + 0x0) +#define EDKII_DEVICE_SECURITY_STATE_ERROR_UEFI_GET_POLICY_PROTOCOL (EDKI= I_DEVICE_SECURITY_STATE_ERROR + 0x1) +#define EDKII_DEVICE_SECURITY_STATE_ERROR_PCI_NO_CAPABILITIES (EDKI= I_DEVICE_SECURITY_STATE_ERROR + 0x10) +#define EDKII_DEVICE_SECURITY_STATE_ERROR_TCG_EXTEND_TPM_PCR (EDKI= I_DEVICE_SECURITY_STATE_ERROR + 0x20) + +/** + This function returns the device security policy associated with the dev= ice. + + @param[in] This The protocol instance pointer. + @param[in] DeviceId The Identifier for the device. + @param[out] DeviceSecurityPolicy The Device Security Policy associated= with the device. + + @retval EFI_SUCCESS The device security policy is returned +**/ +typedef +EFI_STATUS +(EFIAPI *EDKII_DEVICE_SECURITY_GET_DEVICE_POLICY) ( + IN EDKII_DEVICE_SECURITY_POLICY_PROTOCOL *This, + IN EDKII_DEVICE_IDENTIFIER *DeviceId, + OUT EDKII_DEVICE_SECURITY_POLICY **DeviceSecurityPolicy + ); + +/** + This function sets the device state based upon the authentication result. + + @param[in] This The protocol instance pointer. + @param[in] DeviceId The Identifier for the device. + @param[in] DeviceSecurityState The Device Security state associated = with the device. + + @retval EFI_SUCCESS The device state is set +**/ +typedef +EFI_STATUS +(EFIAPI *EDKII_DEVICE_SECURITY_SET_DEVICE_STATE) ( + IN EDKII_DEVICE_SECURITY_POLICY_PROTOCOL *This, + IN EDKII_DEVICE_IDENTIFIER *DeviceId, + IN EDKII_DEVICE_SECURITY_STATE *DeviceSecurityState + ); + +struct _EDKII_DEVICE_SECURITY_POLICY_PROTOCOL { + UINT32 Version; // 0x1 + EDKII_DEVICE_SECURITY_GET_DEVICE_POLICY GetDevicePolicy; + EDKII_DEVICE_SECURITY_SET_DEVICE_STATE SetDeviceState; +}; + +extern EFI_GUID gEdkiiDeviceSecurityPolicyProtocolGuid; + +#endif --=20 2.19.2.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#49770): https://edk2.groups.io/g/devel/message/49770 Mute This Topic: https://groups.io/mt/40117802/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-