Methods and apparatus to protect a protocol interface are described
herein. In an example method, a driver request is received during an
operation phase of firmware in a processor system. The driver request may
be identified as a request associated with a violating condition of the
protocol interface. Accordingly, the driver request is rejected.