]> git.proxmox.com Git - mirror_edk2.git/blame - IntelFrameworkPkg/Include/Protocol/SmmBase.h
Remove blank for function typedef, it will break generating doxygen document.
[mirror_edk2.git] / IntelFrameworkPkg / Include / Protocol / SmmBase.h
CommitLineData
79964ac8 1/** @file\r
2 This file declares SMM Base abstraction protocol.\r
8411f1c0 3 This protocol is used to install SMM handlers for support of subsequent SMI/PMI activations. This\r
3471dae2 4 protocol is available on both IA-32 and Itanium based systems.\r
8411f1c0 5 \r
6 The EFI_SMM_BASE_PROTOCOL is a set of services that is exported by a processor device. It is\r
7 a required protocol for the platform processor. This protocol can be used in both boot services and\r
8 runtime mode. However, only the following member functions need to exist into runtime:\r
9 - InSmm()\r
10 - Communicate()\r
11 This protocol is responsible for registering the handler services. The order in which the handlers are\r
12 executed is prescribed only with respect to the MakeLast flag in the RegisterCallback()\r
13 service. The driver exports these registration and unregistration services in boot services mode, but\r
14 the registered handlers will execute through the preboot and runtime. The only way to change the\r
15 behavior of a registered driver after ExitBootServices() has been invoked is to use some\r
16 private communication mechanism with the driver to order it to quiesce. This model permits typical\r
17 use cases, such as invoking the handler to enter ACPI mode, where the OS loader would make this\r
18 call before boot services are terminated. On the other hand, handlers for services such as chipset\r
19 workarounds for the century rollover in CMOS should provide commensurate services throughout\r
20 preboot and OS runtime.\r
21 \r
79964ac8 22 Copyright (c) 2007, Intel Corporation\r
23 All rights reserved. This program and the accompanying materials\r
24 are licensed and made available under the terms and conditions of the BSD License\r
25 which accompanies this distribution. The full text of the license may be found at\r
26 http://opensource.org/licenses/bsd-license.php\r
27\r
28 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
29 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
30\r
79964ac8 31 @par Revision Reference:\r
32 This Protocol is defined in Framework of EFI SMM Core Interface Spec\r
33 Version 0.9.\r
34\r
35**/\r
36\r
37#ifndef _SMM_BASE_H_\r
38#define _SMM_BASE_H_\r
39\r
b80fbe85 40#include <FrameworkSmm.h>\r
41\r
79964ac8 42#define EFI_SMM_BASE_PROTOCOL_GUID \\r
43 { \\r
44 0x1390954D, 0xda95, 0x4227, {0x93, 0x28, 0x72, 0x82, 0xc2, 0x17, 0xda, 0xa8 } \\r
45 }\r
46\r
47typedef struct _EFI_SMM_BASE_PROTOCOL EFI_SMM_BASE_PROTOCOL;\r
48\r
49//\r
50// SMM Handler Definition\r
51//\r
52#define EFI_HANDLER_SUCCESS 0x0000\r
53#define EFI_HANDLER_CRITICAL_EXIT 0x0001\r
54#define EFI_HANDLER_SOURCE_QUIESCED 0x0002\r
55#define EFI_HANDLER_SOURCE_PENDING 0x0003\r
56\r
57/**\r
58 Entry Point to Callback service\r
59\r
60 @param SmmImageHandle A handle allocated by the SMM infrastructure code\r
61 to uniquely designate a specific DXE SMM driver.\r
62 @param CommunicationBuffer A pointer to a collection of data in memory\r
63 that will be conveyed from a non-SMM environment into an SMM environment.\r
64 The buffer must be contiguous, physically mapped, and be a physical address.\r
65 @param SourceSize The size of the CommunicationBuffer.\r
66\r
67 @return Status code\r
68\r
69**/\r
70typedef\r
71EFI_STATUS\r
69686d56 72(EFIAPI *EFI_SMM_CALLBACK_ENTRY_POINT)(\r
79964ac8 73 IN EFI_HANDLE SmmImageHandle,\r
74 IN OUT VOID *CommunicationBuffer OPTIONAL,\r
75 IN OUT UINTN *SourceSize OPTIONAL\r
76 );\r
77\r
78//\r
79// SMM Base Protocol Definition\r
80//\r
81/**\r
82 Register a given driver into SMRAM.This is the equivalent of performing\r
83 the LoadImage/StartImage into System Management Mode.\r
84\r
85 @param This Protocol instance pointer.\r
86 @param FilePath Location of the image to be installed as the handler.\r
87 @param SourceBuffer Optional source buffer in case of the image file\r
88 being in memory.\r
89 @param SourceSize Size of the source image file, if in memory.\r
90 @param ImageHandle Pointer to the handle that reflects the driver\r
91 loaded into SMM.\r
92 @param LegacyIA32Binary The binary image to load is legacy 16 bit code.\r
93\r
94 @retval EFI_SUCCESS The operation was successful.\r
95 @retval EFI_OUT_OF_RESOURCES There were no additional SMRAM resources to load the handler\r
96 @retval EFI_UNSUPPORTED This platform does not support 16-bit handlers.\r
97 @retval EFI_UNSUPPORTED In runtime.\r
98 @retval EFI_INVALID_PARAMETER The handlers was not the correct image type\r
99\r
100**/\r
101typedef\r
102EFI_STATUS\r
69686d56 103(EFIAPI *EFI_SMM_REGISTER_HANDLER)(\r
79964ac8 104 IN EFI_SMM_BASE_PROTOCOL *This,\r
105 IN EFI_DEVICE_PATH_PROTOCOL *FilePath,\r
106 IN VOID *SourceBuffer OPTIONAL,\r
107 IN UINTN SourceSize,\r
108 OUT EFI_HANDLE *ImageHandle,\r
109 IN BOOLEAN LegacyIA32Binary OPTIONAL\r
110 )\r
111;\r
112\r
113/**\r
114 Remove a given driver SMRAM. This is the equivalent of performing\r
115 the UnloadImage System Management Mode.\r
116\r
117 @param This Protocol instance pointer.\r
118 @param ImageHandle Pointer to the handle that reflects the driver\r
119 loaded into SMM.\r
120\r
121 @retval EFI_SUCCESS The operation was successful\r
122 @retval EFI_INVALID_PARAMETER The handler did not exist\r
123 @retval EFI_UNSUPPORTED In runtime.\r
124\r
125**/\r
126typedef\r
127EFI_STATUS\r
69686d56 128(EFIAPI *EFI_SMM_UNREGISTER_HANDLER)(\r
79964ac8 129 IN EFI_SMM_BASE_PROTOCOL *This,\r
130 IN EFI_HANDLE ImageHandle\r
131 )\r
132;\r
133\r
134/**\r
135 The SMM Inter-module Communicate Service Communicate() function\r
136 provides a services to send/received messages from a registered\r
137 EFI service. The BASE protocol driver is responsible for doing\r
138 any of the copies such that the data lives in boot-service accessible RAM.\r
139\r
140 @param This Protocol instance pointer.\r
141 @param ImageHandle Pointer to the handle that reflects the driver\r
142 loaded into SMM.\r
143 @param CommunicationBuffer Pointer to the buffer to convey into SMRAM.\r
144 @param SourceSize Size of the contents of buffer..\r
145\r
146 @retval EFI_SUCCESS The message was successfully posted\r
147 @retval EFI_INVALID_PARAMETER The buffer was NULL\r
148\r
149**/\r
150typedef\r
151EFI_STATUS\r
69686d56 152(EFIAPI *EFI_SMM_COMMUNICATE)(\r
79964ac8 153 IN EFI_SMM_BASE_PROTOCOL *This,\r
154 IN EFI_HANDLE ImageHandle,\r
155 IN OUT VOID *CommunicationBuffer,\r
156 IN OUT UINTN *SourceSize\r
157 )\r
158;\r
159\r
160/**\r
161 Register a callback to execute within SMM.\r
162 This allows receipt of messages created with the Boot Service COMMUNICATE.\r
163\r
164 @param This Protocol instance pointer.\r
165 @param CallbackAddress Address of the callback service\r
166 @param MakeFirst If present, will stipulate that the handler is posted\r
167 to be the first module executed in the dispatch table.\r
168 @param MakeLast If present, will stipulate that the handler is posted\r
169 to be last executed in the dispatch table.\r
170 @param FloatingPointSave This is an optional parameter which informs the\r
171 EFI_SMM_ACCESS_PROTOCOL Driver core if it needs to save\r
172 the floating point register state. If any of the handlers\r
173 require this, then the state will be saved for all of the handlers.\r
174\r
175 @retval EFI_SUCCESS The operation was successful\r
176 @retval EFI_OUT_OF_RESOURCES Not enough space in the dispatch queue\r
177 @retval EFI_UNSUPPORTED In runtime.\r
178 @retval EFI_UNSUPPORTED Not in SMM.\r
179\r
180**/\r
181typedef\r
182EFI_STATUS\r
69686d56 183(EFIAPI *EFI_SMM_CALLBACK_SERVICE)(\r
79964ac8 184 IN EFI_SMM_BASE_PROTOCOL *This,\r
185 IN EFI_HANDLE SmmImageHandle,\r
186 IN EFI_SMM_CALLBACK_ENTRY_POINT CallbackAddress,\r
187 IN BOOLEAN MakeLast OPTIONAL,\r
188 IN BOOLEAN FloatingPointSave OPTIONAL\r
189 )\r
190;\r
191\r
192/**\r
193 The SmmAllocatePool() function allocates a memory region of Size bytes from memory of\r
194 type PoolType and returns the address of the allocated memory in the location referenced\r
195 by Buffer. This function allocates pages from EFI SMRAM Memory as needed to grow the\r
196 requested pool type. All allocations are eight-byte aligned.\r
197\r
198 @param This Protocol instance pointer.\r
199 @param PoolType The type of pool to allocate.\r
200 The only supported type is EfiRuntimeServicesData;\r
201 the interface will internally map this runtime request to SMRAM.\r
202 @param Size The number of bytes to allocate from the pool.\r
203 @param Buffer A pointer to a pointer to the allocated buffer if the call\r
204 succeeds; undefined otherwise.\r
205\r
206 @retval EFI_SUCCESS The requested number of bytes was allocated.\r
207 @retval EFI_OUT_OF_RESOURCES The pool requested could not be allocated.\r
208 @retval EFI_INVALID_PARAMETER PoolType was invalid.\r
209 @retval EFI_UNSUPPORTED In runtime.\r
210\r
211**/\r
212typedef\r
213EFI_STATUS\r
69686d56 214(EFIAPI *EFI_SMM_ALLOCATE_POOL)(\r
79964ac8 215 IN EFI_SMM_BASE_PROTOCOL *This,\r
216 IN EFI_MEMORY_TYPE PoolType,\r
217 IN UINTN Size,\r
218 OUT VOID **Buffer\r
219 )\r
220;\r
221\r
222/**\r
223 The SmmFreePool() function returns the memory specified by Buffer to the system.\r
224 On return, the memory's type is EFI SMRAM Memory. The Buffer that is freed must\r
225 have been allocated by SmmAllocatePool().\r
226\r
227 @param This Protocol instance pointer.\r
228 @param Buffer Pointer to the buffer allocation.\r
229\r
230 @retval EFI_SUCCESS The memory was returned to the system.\r
231 @retval EFI_INVALID_PARAMETER Buffer was invalid.\r
232 @retval EFI_UNSUPPORTED In runtime.\r
233\r
234**/\r
235typedef\r
236EFI_STATUS\r
69686d56 237(EFIAPI *EFI_SMM_FREE_POOL)(\r
79964ac8 238 IN EFI_SMM_BASE_PROTOCOL *This,\r
239 IN VOID *Buffer\r
240 )\r
241;\r
242\r
243/**\r
244 This routine tells caller if execution context is SMM or not.\r
245\r
246 @param This Protocol instance pointer.\r
247 @param InSmm Whether the caller is inside SMM for IA-32 or servicing a PMI for the Itanium processor family.\r
248\r
249 @retval EFI_SUCCESS The operation was successful\r
250\r
251**/\r
252typedef\r
253EFI_STATUS\r
69686d56 254(EFIAPI *EFI_SMM_INSIDE_OUT)(\r
79964ac8 255 IN EFI_SMM_BASE_PROTOCOL *This,\r
256 OUT BOOLEAN *InSmm\r
257 )\r
258;\r
259\r
260/**\r
261 The GetSmstLocation() function returns the locatin of the System Management\r
262 Service Table. The use of the API is such that a driver can discover the\r
263 location of the SMST in its entry point and then cache it in some driver\r
264 global variable so that the SMST can be invoked in subsequent callbacks.\r
265\r
266 @param This Protocol instance pointer.\r
267 @param Smst Pointer to the SMST.\r
268\r
269 @retval EFI_SUCCESS The operation was successful\r
270 @retval EFI_INVALID_PARAMETER Smst was invalid.\r
271 @retval EFI_UNSUPPORTED Not in SMM.\r
272\r
273**/\r
274typedef\r
275EFI_STATUS\r
69686d56 276(EFIAPI *EFI_SMM_GET_SMST_LOCATION)(\r
79964ac8 277 IN EFI_SMM_BASE_PROTOCOL *This,\r
278 IN OUT EFI_SMM_SYSTEM_TABLE **Smst\r
279 )\r
280;\r
281\r
282/**\r
283 @par Protocol Description:\r
284 This protocol is used to install SMM handlers for support of subsequent SMI/PMI\r
285 activations. This protocol is available on both IA-32 and Itanium-based systems.\r
286\r
287 @param Register\r
288 Registers a handler to run in System Management RAM (SMRAM).\r
289\r
290 @param UnRegister\r
291 Removes a handler from execution in SMRAM.\r
292\r
293 @param Communicate\r
294 Sends/receives a message for a registered handler.\r
295\r
296 @param RegisterCallback\r
297 Registers a callback from the constructor.\r
298\r
299 @param InSmm\r
300 Detects whether the caller is inside or outside of SMM. SName\r
301\r
302 @param SmmAllocatePool\r
303 Allocates SMRAM.\r
304\r
305 @param SmmFreePool\r
306 Deallocates SMRAM.\r
307\r
308 @param GetSmstLocation\r
309 Retrieves the location of the System Management System Table (SMST).\r
310\r
311**/\r
312struct _EFI_SMM_BASE_PROTOCOL {\r
313 EFI_SMM_REGISTER_HANDLER Register;\r
314 EFI_SMM_UNREGISTER_HANDLER UnRegister;\r
315 EFI_SMM_COMMUNICATE Communicate;\r
316 EFI_SMM_CALLBACK_SERVICE RegisterCallback;\r
317 EFI_SMM_INSIDE_OUT InSmm;\r
318 EFI_SMM_ALLOCATE_POOL SmmAllocatePool;\r
319 EFI_SMM_FREE_POOL SmmFreePool;\r
320 EFI_SMM_GET_SMST_LOCATION GetSmstLocation;\r
321};\r
322\r
323extern EFI_GUID gEfiSmmBaseProtocolGuid;\r
324\r
325#endif\r