aboutsummaryrefslogtreecommitdiffstats
path: root/roms/edk2/OvmfPkg/Include/Guid
diff options
context:
space:
mode:
authorAngelos Mouzakitis <a.mouzakitis@virtualopensystems.com>2023-10-10 14:33:42 +0000
committerAngelos Mouzakitis <a.mouzakitis@virtualopensystems.com>2023-10-10 14:33:42 +0000
commitaf1a266670d040d2f4083ff309d732d648afba2a (patch)
tree2fc46203448ddcc6f81546d379abfaeb323575e9 /roms/edk2/OvmfPkg/Include/Guid
parente02cda008591317b1625707ff8e115a4841aa889 (diff)
Add submodule dependency filesHEADmaster
Change-Id: Iaf8d18082d3991dec7c0ebbea540f092188eb4ec
Diffstat (limited to 'roms/edk2/OvmfPkg/Include/Guid')
-rw-r--r--roms/edk2/OvmfPkg/Include/Guid/LinuxEfiInitrdMedia.h17
-rw-r--r--roms/edk2/OvmfPkg/Include/Guid/MicrosoftVendor.h55
-rw-r--r--roms/edk2/OvmfPkg/Include/Guid/OvmfPkKek1AppPrefix.h45
-rw-r--r--roms/edk2/OvmfPkg/Include/Guid/OvmfPlatformConfig.h18
-rw-r--r--roms/edk2/OvmfPkg/Include/Guid/QemuKernelLoaderFsMedia.h18
-rw-r--r--roms/edk2/OvmfPkg/Include/Guid/QemuRamfb.h19
-rw-r--r--roms/edk2/OvmfPkg/Include/Guid/RootBridgesConnectedEventGroup.h27
-rw-r--r--roms/edk2/OvmfPkg/Include/Guid/VirtioMmioTransport.h19
-rw-r--r--roms/edk2/OvmfPkg/Include/Guid/XenBusRootDevice.h18
-rw-r--r--roms/edk2/OvmfPkg/Include/Guid/XenInfo.h36
10 files changed, 272 insertions, 0 deletions
diff --git a/roms/edk2/OvmfPkg/Include/Guid/LinuxEfiInitrdMedia.h b/roms/edk2/OvmfPkg/Include/Guid/LinuxEfiInitrdMedia.h
new file mode 100644
index 000000000..83fc3fc79
--- /dev/null
+++ b/roms/edk2/OvmfPkg/Include/Guid/LinuxEfiInitrdMedia.h
@@ -0,0 +1,17 @@
+/** @file
+ GUID definition for the Linux Initrd media device path
+
+ Copyright (c) 2020, Arm, Ltd. All rights reserved.<BR>
+
+ SPDX-License-Identifier: BSD-2-Clause-Patent
+**/
+
+#ifndef LINUX_EFI_INITRD_MEDIA_GUID_H__
+#define LINUX_EFI_INITRD_MEDIA_GUID_H__
+
+#define LINUX_EFI_INITRD_MEDIA_GUID \
+ {0x5568e427, 0x68fc, 0x4f3d, {0xac, 0x74, 0xca, 0x55, 0x52, 0x31, 0xcc, 0x68}}
+
+extern EFI_GUID gLinuxEfiInitrdMediaGuid;
+
+#endif
diff --git a/roms/edk2/OvmfPkg/Include/Guid/MicrosoftVendor.h b/roms/edk2/OvmfPkg/Include/Guid/MicrosoftVendor.h
new file mode 100644
index 000000000..db7a326c3
--- /dev/null
+++ b/roms/edk2/OvmfPkg/Include/Guid/MicrosoftVendor.h
@@ -0,0 +1,55 @@
+/** @file
+ Declare the GUID that is expected:
+
+ - as EFI_SIGNATURE_DATA.SignatureOwner GUID in association with X509 and
+ RSA2048 Secure Boot certificates issued by/for Microsoft,
+
+ - as UEFI variable vendor GUID in association with (unspecified)
+ Microsoft-owned variables.
+
+ Copyright (C) 2014-2019, Red Hat, Inc.
+
+ SPDX-License-Identifier: BSD-2-Clause-Patent
+
+ @par Specification Reference:
+ - MSDN: System.Fundamentals.Firmware at
+ <https://msdn.microsoft.com/en-us/ie/dn932805(v=vs.94)>.
+**/
+
+#ifndef MICROSOFT_VENDOR_H_
+#define MICROSOFT_VENDOR_H_
+
+#include <Uefi/UefiBaseType.h>
+
+//
+// The following test cases of the Secure Boot Logo Test in the Microsoft
+// Hardware Certification Kit:
+//
+// - Microsoft.UefiSecureBootLogo.Tests.OutOfBoxVerifyMicrosoftKEKpresent
+// - Microsoft.UefiSecureBootLogo.Tests.OutOfBoxConfirmMicrosoftSignatureInDB
+//
+// expect the EFI_SIGNATURE_DATA.SignatureOwner GUID to be
+// 77FA9ABD-0359-4D32-BD60-28F4E78F784B, when the
+// EFI_SIGNATURE_DATA.SignatureData field carries any of the following X509
+// certificates:
+//
+// - "Microsoft Corporation KEK CA 2011" (in KEK)
+// - "Microsoft Windows Production PCA 2011" (in db)
+// - "Microsoft Corporation UEFI CA 2011" (in db)
+//
+// This is despite the fact that the UEFI specification requires
+// EFI_SIGNATURE_DATA.SignatureOwner to reflect the agent (i.e., OS,
+// application or driver) that enrolled and therefore owns
+// EFI_SIGNATURE_DATA.SignatureData, and not the organization that issued
+// EFI_SIGNATURE_DATA.SignatureData.
+//
+#define MICROSOFT_VENDOR_GUID \
+ { 0x77fa9abd, \
+ 0x0359, \
+ 0x4d32, \
+ { 0xbd, 0x60, 0x28, 0xf4, 0xe7, 0x8f, 0x78, 0x4b }, \
+ }
+
+extern EFI_GUID gMicrosoftVendorGuid;
+
+#endif /* MICROSOFT_VENDOR_H_ */
diff --git a/roms/edk2/OvmfPkg/Include/Guid/OvmfPkKek1AppPrefix.h b/roms/edk2/OvmfPkg/Include/Guid/OvmfPkKek1AppPrefix.h
new file mode 100644
index 000000000..e05d2fe02
--- /dev/null
+++ b/roms/edk2/OvmfPkg/Include/Guid/OvmfPkKek1AppPrefix.h
@@ -0,0 +1,45 @@
+/** @file
+ Declare the application prefix string as a GUID, for locating the PK/KEK1
+ X509 certificate to enroll, in the "OEM Strings" SMBIOS table.
+
+ Copyright (C) 2019, Red Hat, Inc.
+
+ SPDX-License-Identifier: BSD-2-Clause-Patent
+
+ @par Specification Reference:
+ - https://git.qemu.org/?p=qemu.git;a=commit;h=2d6dcbf93fb0
+ - https://libvirt.org/formatdomain.html#elementsSysinfo
+ - https://bugs.launchpad.net/qemu/+bug/1826200
+ - https://bugzilla.tianocore.org/show_bug.cgi?id=1747
+**/
+
+#ifndef OVMF_PK_KEK1_APP_PREFIX_H_
+#define OVMF_PK_KEK1_APP_PREFIX_H_
+
+#include <Uefi/UefiBaseType.h>
+
+//
+// For the EnrollDefaultKeys application, the hypervisor is expected to add a
+// string entry to the "OEM Strings" (Type 11) SMBIOS table, with the following
+// format:
+//
+// 4e32566d-8e9e-4f52-81d3-5bb9715f9727:<Base64 X509 cert for PK and first KEK>
+//
+// The string representation of the GUID at the front is the "application
+// prefix". It is matched by EnrollDefaultKeys case-insensitively.
+//
+// The base64-encoded blob following the application prefix and the colon (:)
+// is an X509 certificate in DER representation; the hypervisor instructs
+// EnrollDefaultKeys to enroll this certificate as both Platform Key and first
+// Key Exchange Key.
+//
+#define OVMF_PK_KEK1_APP_PREFIX_GUID \
+ { 0x4e32566d, \
+ 0x8e9e, \
+ 0x4f52, \
+ { 0x81, 0xd3, 0x5b, 0xb9, 0x71, 0x5f, 0x97, 0x27 }, \
+ }
+
+extern EFI_GUID gOvmfPkKek1AppPrefixGuid;
+
+#endif /* OVMF_PK_KEK1_APP_PREFIX_H_ */
diff --git a/roms/edk2/OvmfPkg/Include/Guid/OvmfPlatformConfig.h b/roms/edk2/OvmfPkg/Include/Guid/OvmfPlatformConfig.h
new file mode 100644
index 000000000..19b3936cf
--- /dev/null
+++ b/roms/edk2/OvmfPkg/Include/Guid/OvmfPlatformConfig.h
@@ -0,0 +1,18 @@
+/** @file
+ GUID for UEFI variables that are specific to OVMF configuration.
+
+ Copyright (C) 2014, Red Hat, Inc.
+
+ SPDX-License-Identifier: BSD-2-Clause-Patent
+
+**/
+
+#ifndef __OVMF_PLATFORM_CONFIG_H__
+#define __OVMF_PLATFORM_CONFIG_H__
+
+#define OVMF_PLATFORM_CONFIG_GUID \
+{0x7235c51c, 0x0c80, 0x4cab, {0x87, 0xac, 0x3b, 0x08, 0x4a, 0x63, 0x04, 0xb1}}
+
+extern EFI_GUID gOvmfPlatformConfigGuid;
+
+#endif
diff --git a/roms/edk2/OvmfPkg/Include/Guid/QemuKernelLoaderFsMedia.h b/roms/edk2/OvmfPkg/Include/Guid/QemuKernelLoaderFsMedia.h
new file mode 100644
index 000000000..225c3c494
--- /dev/null
+++ b/roms/edk2/OvmfPkg/Include/Guid/QemuKernelLoaderFsMedia.h
@@ -0,0 +1,18 @@
+/** @file
+ GUID definition for the QEMU LoaderFs media device path, containing the
+ kernel, initrd and command line as file objects
+
+ Copyright (c) 2020, Arm, Ltd. All rights reserved.<BR>
+
+ SPDX-License-Identifier: BSD-2-Clause-Patent
+**/
+
+#ifndef QEMU_KERNEL_LOADER_FS_MEDIA_GUID_H__
+#define QEMU_KERNEL_LOADER_FS_MEDIA_GUID_H__
+
+#define QEMU_KERNEL_LOADER_FS_MEDIA_GUID \
+ {0x1428f772, 0xb64a, 0x441e, {0xb8, 0xc3, 0x9e, 0xbd, 0xd7, 0xf8, 0x93, 0xc7}}
+
+extern EFI_GUID gQemuKernelLoaderFsMediaGuid;
+
+#endif
diff --git a/roms/edk2/OvmfPkg/Include/Guid/QemuRamfb.h b/roms/edk2/OvmfPkg/Include/Guid/QemuRamfb.h
new file mode 100644
index 000000000..b0102ec05
--- /dev/null
+++ b/roms/edk2/OvmfPkg/Include/Guid/QemuRamfb.h
@@ -0,0 +1,19 @@
+/** @file
+ Recommended GUID to be used in the Vendor Hardware device path nodes that
+ identify qemu ramfb devices.
+
+ Copyright (C) 2018, Red Hat, Inc.
+
+ SPDX-License-Identifier: BSD-2-Clause-Patent
+
+**/
+
+#ifndef __QEMU_RAMFB_H__
+#define __QEMU_RAMFB_H__
+
+#define QEMU_RAMFB_GUID \
+{0x557423a1, 0x63ab, 0x406c, {0xbe, 0x7e, 0x91, 0xcd, 0xbc, 0x08, 0xc4, 0x57}}
+
+extern EFI_GUID gQemuRamfbGuid;
+
+#endif
diff --git a/roms/edk2/OvmfPkg/Include/Guid/RootBridgesConnectedEventGroup.h b/roms/edk2/OvmfPkg/Include/Guid/RootBridgesConnectedEventGroup.h
new file mode 100644
index 000000000..b85f8743c
--- /dev/null
+++ b/roms/edk2/OvmfPkg/Include/Guid/RootBridgesConnectedEventGroup.h
@@ -0,0 +1,27 @@
+/** @file
+ An event group GUID with which BDS indicates that PCI root bridges have been
+ connected, and PciIo protocol instances have become available.
+
+ Note that this differs from the PCI Enumeration Complete Protocol as defined
+ in the PI 1.1 specification. That protocol is installed by the PCI bus driver
+ after enumeration and resource allocation have been completed, but before
+ PciIo protocol instances are created.
+
+ Copyright (C) 2016, Red Hat, Inc.
+
+ SPDX-License-Identifier: BSD-2-Clause-Patent
+**/
+
+#ifndef _ROOT_BRIDGES_CONNECTED_EVENT_GROUP_H_
+#define _ROOT_BRIDGES_CONNECTED_EVENT_GROUP_H_
+
+#define ROOT_BRIDGES_CONNECTED_EVENT_GROUP_GUID \
+ { 0x24a2d66f, \
+ 0xeedd, \
+ 0x4086, \
+ { 0x90, 0x42, 0xf2, 0x6e, 0x47, 0x97, 0xee, 0x69 }, \
+ }
+
+extern EFI_GUID gRootBridgesConnectedEventGroupGuid;
+
+#endif
diff --git a/roms/edk2/OvmfPkg/Include/Guid/VirtioMmioTransport.h b/roms/edk2/OvmfPkg/Include/Guid/VirtioMmioTransport.h
new file mode 100644
index 000000000..91e1f1391
--- /dev/null
+++ b/roms/edk2/OvmfPkg/Include/Guid/VirtioMmioTransport.h
@@ -0,0 +1,19 @@
+/** @file
+ Recommended GUID to be used in the Vendor Hardware device path nodes that
+ identify virtio-mmio transports.
+
+ Copyright (C) 2014, Red Hat, Inc.
+
+ SPDX-License-Identifier: BSD-2-Clause-Patent
+
+**/
+
+#ifndef __VIRTIO_MMIO_TRANSPORT_H__
+#define __VIRTIO_MMIO_TRANSPORT_H__
+
+#define VIRTIO_MMIO_TRANSPORT_GUID \
+{0x837dca9e, 0xe874, 0x4d82, {0xb2, 0x9a, 0x23, 0xfe, 0x0e, 0x23, 0xd1, 0xe2}}
+
+extern EFI_GUID gVirtioMmioTransportGuid;
+
+#endif
diff --git a/roms/edk2/OvmfPkg/Include/Guid/XenBusRootDevice.h b/roms/edk2/OvmfPkg/Include/Guid/XenBusRootDevice.h
new file mode 100644
index 000000000..932f6cf7f
--- /dev/null
+++ b/roms/edk2/OvmfPkg/Include/Guid/XenBusRootDevice.h
@@ -0,0 +1,18 @@
+/** @file
+ GUID to be used to identify the XenBus root node on non-PCI Xen guests
+
+ Copyright (C) 2015, Linaro Ltd.
+
+ SPDX-License-Identifier: BSD-2-Clause-Patent
+
+**/
+
+#ifndef __XENBUS_ROOT_DEVICE_H__
+#define __XENBUS_ROOT_DEVICE_H__
+
+#define XENBUS_ROOT_DEVICE_GUID \
+{0xa732241f, 0x383d, 0x4d9c, {0x8a, 0xe1, 0x8e, 0x09, 0x83, 0x75, 0x89, 0xd7}}
+
+extern EFI_GUID gXenBusRootDeviceGuid;
+
+#endif
diff --git a/roms/edk2/OvmfPkg/Include/Guid/XenInfo.h b/roms/edk2/OvmfPkg/Include/Guid/XenInfo.h
new file mode 100644
index 000000000..25743b388
--- /dev/null
+++ b/roms/edk2/OvmfPkg/Include/Guid/XenInfo.h
@@ -0,0 +1,36 @@
+/** @file
+ XenInfo HOB passed by PEI into DXE.
+
+Copyright (c) 2011, Andrei Warkentin <andreiw@motorola.com>
+SPDX-License-Identifier: BSD-2-Clause-Patent
+
+**/
+
+#ifndef __XEN_INFO_H__
+#define __XEN_INFO_H__
+
+#define EFI_XEN_INFO_GUID \
+ { 0xd3b46f3b, 0xd441, 0x1244, {0x9a, 0x12, 0x0, 0x12, 0x27, 0x3f, 0xc1, 0x4d } }
+
+typedef struct {
+ ///
+ /// Beginning of the hypercall page.
+ ///
+ VOID *HyperPages;
+ ///
+ /// Hypervisor major version.
+ ///
+ UINT16 VersionMajor;
+ ///
+ /// Hypervisor minor version.
+ ///
+ UINT16 VersionMinor;
+ ///
+ /// Pointer to the RSDP found in the hvm_start_info provided to a PVH guest
+ ///
+ VOID *RsdpPvh;
+} EFI_XEN_INFO;
+
+extern EFI_GUID gEfiXenInfoGuid;
+
+#endif