Reviewed-by: Chasel Chiu <chasel.c...@intel.com>

> -----Original Message-----
> From: Kubacki, Michael A
> Sent: Saturday, August 17, 2019 8:15 AM
> To: devel@edk2.groups.io
> Cc: Chaganty, Rangasai V <rangasai.v.chaga...@intel.com>; Chiu, Chasel
> <chasel.c...@intel.com>; Desimone, Nathaniel L
> <nathaniel.l.desim...@intel.com>; Gao, Liming <liming....@intel.com>;
> Kinney, Michael D <michael.d.kin...@intel.com>; Sinha, Ankit
> <ankit.si...@intel.com>
> Subject: [edk2-platforms][PATCH V1 03/37] CoffeelakeSiliconPkg/Me: Add
> Include headers
> 
> REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2082
> 
> Adds header files common to ME modules.
> 
> Cc: Sai Chaganty <rangasai.v.chaga...@intel.com>
> Cc: Chasel Chiu <chasel.c...@intel.com>
> Cc: Nate DeSimone <nathaniel.l.desim...@intel.com>
> Cc: Liming Gao <liming....@intel.com>
> Cc: Michael D Kinney <michael.d.kin...@intel.com>
> Cc: Ankit Sinha <ankit.si...@intel.com>
> Signed-off-by: Michael Kubacki <michael.a.kuba...@intel.com>
> ---
>  Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/ConfigBlock/MePeiConfig.h |
> 124 ++++++++++++++
> Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/Library/DxeMePolicyLib.h  |
> 59 +++++++
> Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/Library/PeiMePolicyLib.h  |
> 87 ++++++++++
>  Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/MeChipset.h               | 172
> ++++++++++++++++++++
>  Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/MePolicyHob.h             |  17
> ++
>  Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/MkhiMsgs.h                |  19
> +++
>  Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/Protocol/MePolicy.h       |
> 41 +++++
>  7 files changed, 519 insertions(+)
> 
> diff --git
> a/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/ConfigBlock/MePeiConfig.h
> b/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/ConfigBlock/MePeiConfig.h
> new file mode 100644
> index 0000000000..102fb43bd1
> --- /dev/null
> +++ b/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/ConfigBlock/MePeiCon
> +++ fig.h
> @@ -0,0 +1,124 @@
> +/** @file
> +  ME config block for PEI phase
> +
> +  Copyright (c) 2019 Intel Corporation. All rights reserved. <BR>
> +
> +  SPDX-License-Identifier: BSD-2-Clause-Patent **/
> +
> +#ifndef _ME_PEI_CONFIG_H_
> +#define _ME_PEI_CONFIG_H_
> +
> +#include <ConfigBlock.h>
> +
> +#define ME_PEI_PREMEM_CONFIG_REVISION 2 extern EFI_GUID
> +gMePeiPreMemConfigGuid;
> +
> +#ifndef PLATFORM_POR
> +#define PLATFORM_POR  0
> +#endif
> +#ifndef FORCE_ENABLE
> +#define FORCE_ENABLE  1
> +#endif
> +#ifndef FORCE_DISABLE
> +#define FORCE_DISABLE 2
> +#endif
> +
> +#pragma pack (push,1)
> +
> +/**
> +  ME Pei Pre-Memory Configuration Structure.
> +
> +  <b>Revision 1:</b>
> +  - Initial version.
> +  <b>Revision 2</b>:
> +  - Change DidInitStat bit width.
> +**/
> +typedef struct {
> +  CONFIG_BLOCK_HEADER   Header;                 ///< Config Block Header
> +  UINT32 HeciTimeouts                     : 1;  ///< 0: Disable; <b>1: 
> Enable</b>
> - HECI Send/Receive Timeouts.
> +  /**
> +    <b>(Test)</b>
> +    <b>0: Disabled</b>
> +       1: ME DID init stat 0 - Success
> +       2: ME DID init stat 1 - No Memory in Channels
> +       3: ME DID init stat 2 - Memory Init Error
> +  **/
> +  UINT32 DidInitStat                      : 2;
> +  /**
> +    <b>(Test)</b>
> +    <b>0: Set to 0 to enable polling for CPU replacement</b>
> +       1: Set to 1 will disable polling for CPU replacement
> +  **/
> +  UINT32 DisableCpuReplacedPolling        : 1;
> +  UINT32 SendDidMsg                       : 1;  ///< <b>(Test)</b> 0: 
> Disable;
> <b>1: Enable</b> - Enable/Disable to send DID message.
> +  /**
> +    <b>(Test)</b>
> +    <b>0: Set to 0 to enable retry mechanism for HECI APIs</b>
> +       1: Set to 1 will disable retry mechanism for HECI APIs
> +  **/
> +  UINT32 DisableHeciRetry                 : 1;
> +  /**
> +    <b>(Test)</b>
> +    <b>0: ME BIOS will check each messages before sending</b>
> +       1: ME BIOS always sends messages without checking
> +  **/
> +  UINT32 DisableMessageCheck              : 1;
> +  /**
> +    <b>(Test)</b>
> +    The SkipMbpHob policy determines whether ME BIOS Payload data will be
> requested during boot
> +    in a MBP message. If set to 1, BIOS will send the MBP message with
> SkipMbp flag
> +    set causing CSME to respond with MKHI header only and no MBP data
> +    <b>0: ME BIOS will keep MBP and create HOB for MBP data</b>
> +       1: ME BIOS will skip MBP data
> +  **/
> +  UINT32 SkipMbpHob                       : 1;
> +  UINT32 HeciCommunication2               : 1;  ///< <b>(Test)</b> <b>0:
> Disable</b>; 1: Enable - Enable/Disable HECI2.
> +  UINT32 KtDeviceEnable                   : 1;  ///< <b>(Test)</b> 0: 
> Disable;
> <b>1: Enable</b> - Enable/Disable Kt Device.
> +  UINT32 RsvdBits                         : 22; ///< Reserved for future use 
> &
> Config block alignment
> +  UINT32 Heci1BarAddress;                       ///< HECI1 BAR address.
> +  UINT32 Heci2BarAddress;                       ///< HECI2 BAR address.
> +  UINT32 Heci3BarAddress;                       ///< HECI3 BAR address.
> +} ME_PEI_PREMEM_CONFIG;
> +#pragma pack (pop)
> +
> +
> +#define ME_PEI_CONFIG_REVISION 2
> +extern EFI_GUID gMePeiConfigGuid;
> +
> +#pragma pack (push,1)
> +
> +/**
> +  ME Pei Post-Memory Configuration Structure.
> +
> +  <b>Revision 1:</b>
> +  - Initial version.
> +  <b>Revision 2</b>:
> +  - Add MctpBroadcastCycle test setting.
> +**/
> +typedef struct {
> +  CONFIG_BLOCK_HEADER   Header;                 ///< Config Block Header
> +
> +  UINT32 EndOfPostMessage                 : 2;  ///< 0: Disabled; 1: Send in 
> PEI;
> <b>2: Send in DXE</b> - Send EOP at specific phase.
> +  /**
> +    HECI3 state from Mbp for reference in S3 path only
> +    <b>0: Disabled</b>; 1: Enabled
> +  **/
> +  UINT32 Heci3Enabled                     : 1;
> +  UINT32 DisableD0I3SettingForHeci        : 1;  ///< <b>(Test)</b> <b>0:
> Disable</b>; 1: Enable - Enable/Disable D0i3 for HECI.
> +  /**
> +    Enable/Disable Me Unconfig On Rtc Clear. If enabled, BIOS will send
> MeUnconfigOnRtcClearDisable Msg with parameter 0.
> +    It will cause ME to unconfig if RTC is cleared.
> +    -    0: Disable
> +    - <b>1: Enable</b>
> +    -    2: Cmos is clear, status unkonwn
> +    -    3: Reserved
> +  **/
> +  UINT32 MeUnconfigOnRtcClear             : 2;
> +  UINT32 MctpBroadcastCycle               : 1;   ///< <b>(Test)</b> <b>0:
> Disable</b>; 1: Enable - Program registers for MCTP Cycle.
> +  UINT32 RsvdBits                         : 25;  ///< Reserved for future 
> use &
> Config block alignment
> +} ME_PEI_CONFIG;
> +
> +#pragma pack (pop)
> +
> +#endif // _ME_PEI_CONFIG_H_
> diff --git
> a/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/Library/DxeMePolicyLib.h
> b/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/Library/DxeMePolicyLib.h
> new file mode 100644
> index 0000000000..46f7f86021
> --- /dev/null
> +++ b/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/Library/DxeMePolicyL
> +++ ib.h
> @@ -0,0 +1,59 @@
> +/** @file
> +  Prototype of the DxeMePolicyLib library.
> +
> +  Copyright (c) 2019 Intel Corporation. All rights reserved. <BR>
> +
> +  SPDX-License-Identifier: BSD-2-Clause-Patent **/
> +
> +#ifndef _DXE_ME_POLICY_LIB_H_
> +#define _DXE_ME_POLICY_LIB_H_
> +
> +#include <Protocol/MePolicy.h>
> +
> +/**
> +  This function prints the ME DXE phase policy.
> +
> +  @param[in] DxeMePolicy - ME DXE Policy protocol **/ VOID
> +MePrintPolicyProtocol (
> +  IN  ME_POLICY_PROTOCOL             *DxeMePolicy
> +  );
> +
> +/**
> +  MeCreatePolicyDefaults creates the default setting of ME Policy.
> +  It allocates and zero out buffer, and fills in the Intel default settings.
> +
> +  @param[in, out] DxeMePolicy           The pointer to get ME Policy protocol
> instance
> +
> +  @retval EFI_SUCCESS                   The policy default is initialized.
> +  @retval EFI_OUT_OF_RESOURCES          Insufficient resources to create
> buffer
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +MeCreatePolicyDefaults (
> +  IN OUT  ME_POLICY_PROTOCOL            **DxeMePolicy
> +  );
> +
> +/**
> +  MeInstallPolicyProtocol installs ME Policy.
> +  While installed, RC assumes the Policy is ready and finalized. So
> +please update and override
> +  any setting before calling this function.
> +
> +  @param[in] ImageHandle                Image handle of this driver.
> +  @param[in] DxeMePolicy                The pointer to ME Policy Protocol
> instance
> +
> +  @retval EFI_SUCCESS                   The policy is installed.
> +  @retval EFI_OUT_OF_RESOURCES          Insufficient resources to create
> buffer
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +MeInstallPolicyProtocol (
> +  IN  EFI_HANDLE                    ImageHandle,
> +  IN  ME_POLICY_PROTOCOL            *DxeMePolicy
> +  );
> +
> +#endif // _DXE_ME_POLICY_LIB_H_
> diff --git
> a/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/Library/PeiMePolicyLib.h
> b/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/Library/PeiMePolicyLib.h
> new file mode 100644
> index 0000000000..5db4714346
> --- /dev/null
> +++ b/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/Library/PeiMePolicyL
> +++ ib.h
> @@ -0,0 +1,87 @@
> +/** @file
> +  Prototype of the MePolicyLibPei library.
> +
> +  Copyright (c) 2019 Intel Corporation. All rights reserved. <BR>
> +
> +  SPDX-License-Identifier: BSD-2-Clause-Patent **/
> +
> +#ifndef _PEI_ME_POLICY_LIB_H_
> +#define _PEI_ME_POLICY_LIB_H_
> +
> +#include <Ppi/SiPolicy.h>
> +#include <Library/ConfigBlockLib.h>
> +
> +/**
> +  This function prints the PEI phase PreMem policy.
> +
> +  @param[in] SiPolicyPreMemPpi              The RC PreMem Policy PPI
> instance
> +**/
> +VOID
> +EFIAPI
> +MePrintPolicyPpiPreMem (
> +  IN  SI_PREMEM_POLICY_PPI *SiPolicyPreMemPpi
> +  );
> +
> +/**
> +  This function prints the PEI phase policy.
> +
> +  @param[in] SiPolicyPpi              The RC Policy PPI instance
> +**/
> +VOID
> +EFIAPI
> +MePrintPolicyPpi (
> +  IN  SI_POLICY_PPI     *SiPolicyPpi
> +  );
> +
> +/**
> +  Get Me config block table total size.
> +
> +  @retval     Size of Me config block table
> +**/
> +UINT16
> +EFIAPI
> +MeGetConfigBlockTotalSize (
> +  VOID
> +  );
> +
> +/**
> +  Get ME config block table total size.
> +
> +  @retval      Size of ME config block table
> +**/
> +UINT16
> +EFIAPI
> +MeGetConfigBlockTotalSizePreMem (
> +  VOID
> +  );
> +
> +/**
> +  MeAddConfigBlocksPreMem add all ME config blocks.
> +
> +  @param[in] ConfigBlockTableAddress    The pointer to add ME config
> blocks
> +
> +  @retval EFI_SUCCESS                   The policy default is initialized.
> +  @retval EFI_OUT_OF_RESOURCES          Insufficient resources to create
> buffer
> +**/
> +EFI_STATUS
> +EFIAPI
> +MeAddConfigBlocksPreMem (
> +  IN VOID           *ConfigBlockTableAddress
> +  );
> +
> +/**
> +  MeAddConfigBlocks add all ME config blocks.
> +
> +  @param[in] ConfigBlockTableAddress    The pointer to add ME config
> blocks
> +
> +  @retval EFI_SUCCESS                   The policy default is initialized.
> +  @retval EFI_OUT_OF_RESOURCES          Insufficient resources to create
> buffer
> +**/
> +EFI_STATUS
> +EFIAPI
> +MeAddConfigBlocks (
> +  IN VOID           *ConfigBlockTableAddress
> +  );
> +
> +#endif // _PEI_ME_POLICY_LIB_H_
> diff --git a/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/MeChipset.h
> b/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/MeChipset.h
> new file mode 100644
> index 0000000000..f29f9bc8bd
> --- /dev/null
> +++ b/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/MeChipset.h
> @@ -0,0 +1,172 @@
> +/** @file
> +  Chipset definition for ME Devices.
> +
> +  Conventions:
> +
> +  - Prefixes:
> +    - Definitions beginning with "R_" are registers
> +    - Definitions beginning with "B_" are bits within registers
> +    - Definitions beginning with "V_" are meaningful values of bits within 
> the
> registers
> +    - Definitions beginning with "S_" are register sizes
> +    - Definitions beginning with "N_" are the bit position
> +  - Registers / bits that are different between PCH generations are denoted 
> by
> +    "_ME_[generation_name]_" in register/bit names.
> +  - Registers / bits that are specific to PCH-H denoted by "PCH_H_" in
> register/bit names.
> +    Registers / bits that are specific to PCH-LP denoted by "PCH_LP_" in
> register/bit names.
> +    e.g., "_ME_PCH_H_", "_ME_PCH_LP_"
> +    Registers / bits names without _PCH_H_ or _PCH_LP_ apply for both H and
> LP.
> +  - Registers / bits that are different between SKUs are denoted by
> "_[SKU_name]"
> +    at the end of the register/bit names
> +  - Registers / bits of new devices introduced in a PCH generation will be 
> just
> named
> +    as "_ME_" without [generation_name] inserted.
> +
> +  Copyright (c) 2019 Intel Corporation. All rights reserved. <BR>
> +
> +  SPDX-License-Identifier: BSD-2-Clause-Patent **/
> +
> +#ifndef _ME_CHIPSET_H_
> +#define _ME_CHIPSET_H_
> +
> +#define ME_SEGMENT            0
> +#define ME_BUS                0
> +#define ME_DEVICE_NUMBER      22
> +#define HECI_MIN_FUNC         0
> +#define HECI_MAX_FUNC         5
> +
> +#define HECI_FUNCTION_NUMBER  0x00
> +#define HECI2_FUNCTION_NUMBER 0x01
> +#define IDER_FUNCTION_NUMBER  0x02
> +#define SOL_FUNCTION_NUMBER   0x03
> +#define HECI3_FUNCTION_NUMBER 0x04
> +#define HECI4_FUNCTION_NUMBER 0x05
> +
> +#define IDER_BUS_NUMBER       ME_BUS
> +#define IDER_DEVICE_NUMBER    ME_DEVICE_NUMBER
> +#define SOL_BUS_NUMBER        ME_BUS
> +#define SOL_DEVICE_NUMBER     ME_DEVICE_NUMBER
> +
> + ///
> +/// Convert to HECI# defined in BWG from Fun# /// #define
> +HECI_NAME_MAP(a) ((a < 2) ? (a + 1) : (a - 1))
> +
> +///
> +/// ME-related Chipset Definition
> +///
> +#define HeciEnable()    MeDeviceControl (HECI1, Enabled);
> +#define Heci2Enable()   MeDeviceControl (HECI2, Enabled);
> +#define Heci3Enable()   MeDeviceControl (HECI3, Enabled);
> +#define Heci4Enable()   MeDeviceControl (HECI4, Enabled);
> +#define IderEnable()    MeDeviceControl (IDER, Enabled);
> +#define SolEnable()     MeDeviceControl (SOL, Enabled);
> +
> +#define HeciDisable()   MeDeviceControl (HECI1, Disabled);
> +#define Heci2Disable()  MeDeviceControl (HECI2, Disabled); #define
> +Heci3Disable()  MeDeviceControl (HECI3, Disabled);
> +#define IderDisable()   MeDeviceControl (IDER, Disabled);
> +#define SolDisable()    MeDeviceControl (SOL, Disabled);
> +
> +#define DisableAllMeDevices() \
> +  HeciDisable (); \
> +  Heci2Disable (); \
> +  Heci3Disable (); \
> +  IderDisable (); \
> +  SolDisable ();
> +
> +///
> +/// HECI Device Id Definitions
> +///
> + #define IS_PCH_H_HECI_DEVICE_ID(DeviceId) \
> +     (  \
> +       (DeviceId == V_ME_PCH_H_HECI_DEVICE_ID) \
> +     )
> +
> + #define IS_PCH_LP_HECI_DEVICE_ID(DeviceId) \
> +     (  \
> +       (DeviceId == V_ME_PCH_LP_HECI_DEVICE_ID) \
> +     )
> +
> + #define IS_HECI_DEVICE_ID(DeviceId) \
> +     ( \
> +       IS_PCH_H_HECI_DEVICE_ID(DeviceId) || \
> +       IS_PCH_LP_HECI_DEVICE_ID(DeviceId) \
> +     )
> +
> +///
> +/// HECI2 Device Id Definitions
> +///
> +#define IS_PCH_H_HECI2_DEVICE_ID(DeviceId) \
> +     (  \
> +       (DeviceId == V_ME_PCH_H_HECI2_DEVICE_ID) \
> +     )
> +
> +#define IS_PCH_LP_HECI2_DEVICE_ID(DeviceId) \
> +     (  \
> +       (DeviceId == V_ME_PCH_LP_HECI2_DEVICE_ID) \
> +     )
> +
> +#define IS_HECI2_DEVICE_ID(DeviceId) \
> +     ( \
> +       IS_PCH_H_HECI2_DEVICE_ID(DeviceId) || \
> +       IS_PCH_LP_HECI2_DEVICE_ID(DeviceId) \
> +     )
> +
> +///
> +/// HECI3 Device Id Definitions
> +///
> +#define IS_PCH_H_HECI3_DEVICE_ID(DeviceId) \
> +    (  \
> +      (DeviceId == V_ME_PCH_H_HECI3_DEVICE_ID) \
> +    )
> +
> +#define IS_PCH_LP_HECI3_DEVICE_ID(DeviceId) \
> +    (  \
> +      (DeviceId == V_ME_PCH_LP_HECI3_DEVICE_ID) \
> +    )
> +
> +#define IS_HECI3_DEVICE_ID(DeviceId) \
> +    ( \
> +      IS_PCH_H_HECI3_DEVICE_ID(DeviceId) || \
> +      IS_PCH_LP_HECI3_DEVICE_ID(DeviceId) \
> +    )
> +
> +///
> +/// HECI4 Device Id Definitions
> +///
> +#define IS_PCH_H_HECI4_DEVICE_ID(DeviceId) \
> +    (  \
> +      (DeviceId == V_ME_PCH_H_HECI4_DEVICE_ID) \
> +    )
> +
> +#define IS_PCH_LP_HECI4_DEVICE_ID(DeviceId) \
> +    (  \
> +      (DeviceId == V_ME_PCH_LP_HECI4_DEVICE_ID) \
> +    )
> +
> +#define IS_HECI4_DEVICE_ID(DeviceId) \
> +    ( \
> +      IS_PCH_H_HECI4_DEVICE_ID(DeviceId) || \
> +      IS_PCH_LP_HECI4_DEVICE_ID(DeviceId) \
> +    )
> +
> +///
> +/// SoL Device Id Definitions
> +///
> +#define IS_PCH_H_SOL_DEVICE_ID(DeviceId) \
> +    (  \
> +      (DeviceId == V_ME_PCH_H_SOL_DEVICE_ID) \
> +    )
> +
> +#define IS_PCH_LP_SOL_DEVICE_ID(DeviceId) \
> +    (  \
> +      (DeviceId == V_ME_PCH_LP_SOL_DEVICE_ID) \
> +    )
> +
> +#define IS_PCH_SOL_DEVICE_ID(DeviceId) \
> +    ( \
> +      IS_PCH_H_SOL_DEVICE_ID(DeviceId) || \
> +      IS_PCH_LP_SOL_DEVICE_ID(DeviceId) \
> +    )
> +
> +#endif
> diff --git a/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/MePolicyHob.h
> b/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/MePolicyHob.h
> new file mode 100644
> index 0000000000..a24973ce32
> --- /dev/null
> +++ b/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/MePolicyHob.h
> @@ -0,0 +1,17 @@
> +/** @file
> +  This file contains definitions of ME Policy HOB.
> +
> +  Copyright (c) 2019 Intel Corporation. All rights reserved. <BR>
> +
> +  SPDX-License-Identifier: BSD-2-Clause-Patent **/
> +
> +#ifndef _ME_POLICY_HOB_H_
> +#define _ME_POLICY_HOB_H_
> +
> +#include <MePolicyCommon.h>
> +
> +extern EFI_GUID gMePolicyHobGuid;
> +extern EFI_GUID gMePreMemPolicyHobGuid;
> +
> +#endif // _ME_POLICY_HOB_H_
> diff --git a/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/MkhiMsgs.h
> b/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/MkhiMsgs.h
> new file mode 100644
> index 0000000000..2d8ef1cf7a
> --- /dev/null
> +++ b/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/MkhiMsgs.h
> @@ -0,0 +1,19 @@
> +/** @file
> +  MKHI Messages
> +
> +  Copyright (c) 2019 Intel Corporation. All rights reserved. <BR>
> +
> +  SPDX-License-Identifier: BSD-2-Clause-Patent **/
> +
> +#ifndef _MKHI_MSGS_H
> +#define _MKHI_MSGS_H
> +
> +///
> +/// End of Post
> +///
> +#define EOP_DISABLED    0
> +#define EOP_SEND_IN_PEI 1
> +#define EOP_SEND_IN_DXE 2
> +
> +#endif // _MKHI_MSGS_H
> diff --git
> a/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/Protocol/MePolicy.h
> b/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/Protocol/MePolicy.h
> new file mode 100644
> index 0000000000..518041cb58
> --- /dev/null
> +++ b/Silicon/Intel/CoffeelakeSiliconPkg/Me/Include/Protocol/MePolicy.h
> @@ -0,0 +1,41 @@
> +/** @file
> +  Interface definition details between ME and platform drivers during DXE
> phase.
> +
> +  Copyright (c) 2019 Intel Corporation. All rights reserved. <BR>
> +
> +  SPDX-License-Identifier: BSD-2-Clause-Patent **/
> +
> +#ifndef _ME_POLICY_H_
> +#define _ME_POLICY_H_
> +
> +#include <ConfigBlock.h>
> +
> +/**
> +  ME Policy Protocol.
> +  All ME Policy Protocol change history listed here.
> +
> +**/
> +#define ME_POLICY_PROTOCOL_REVISION  1
> +
> +extern EFI_GUID gDxeMePolicyGuid;
> +
> +#pragma pack (push,1)
> +
> +/**
> +  ME policy provided by platform for DXE phase
> +  This protocol provides an interface to get Intel ME Configuration
> +information
> +
> +  <b>Revision 1</b>:
> +  - Initial version.
> +**/
> +typedef struct _ME_POLICY_PROTOCOL {
> +  CONFIG_BLOCK_TABLE_HEADER      TableHeader;
> +/*
> +  Individual Config Block Structures are added here in memory as part
> +of AddConfigBlock() */ } ME_POLICY_PROTOCOL;
> +
> +#pragma pack (pop)
> +
> +#endif // _ME_POLICY_H_
> --
> 2.16.2.windows.1


-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.

View/Reply Online (#45967): https://edk2.groups.io/g/devel/message/45967
Mute This Topic: https://groups.io/mt/32918172/21656
Group Owner: devel+ow...@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub  [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to