]> git.proxmox.com Git - mirror_edk2.git/blame - MdePkg/Library/UefiRuntimeLib/RuntimeLib.c
Fix the bug that SetMem.S of BaseMemoryLibOptDxe is incorrect.
[mirror_edk2.git] / MdePkg / Library / UefiRuntimeLib / RuntimeLib.c
CommitLineData
42eedea9 1/** @file\r
60c93673 2 UEFI Runtime Library implementation for non IPF processor types.\r
ebcc8fb7 3\r
363bb1b5 4 This library hides the global variable for the EFI Runtime Services so the\r
5 caller does not need to deal with the possibility of being called from an\r
6 OS virtual address space. All pointer values are different for a virtual \r
7 mapping than from the normal physical mapping at boot services time.\r
8\r
9Copyright (c) 2006 - 2009 Intel Corporation. <BR>\r
ebcc8fb7 10All rights reserved. This program and the accompanying materials\r
11are licensed and made available under the terms and conditions of the BSD License\r
12which accompanies this distribution. The full text of the license may be found at\r
13http://opensource.org/licenses/bsd-license.php\r
14\r
15THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
16WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
17\r
18**/\r
19\r
363bb1b5 20#include <Uefi.h>\r
21#include <Library/UefiRuntimeLib.h>\r
22#include <Library/DebugLib.h>\r
23#include <Library/UefiBootServicesTableLib.h>\r
24#include <Library/UefiRuntimeServicesTableLib.h>\r
25#include <Guid/EventGroup.h>\r
ebcc8fb7 26\r
27///\r
28/// Driver Lib Module Globals\r
29///\r
fe467413 30EFI_EVENT mEfiVirtualNotifyEvent;\r
31EFI_EVENT mEfiExitBootServicesEvent;\r
32BOOLEAN mEfiGoneVirtual = FALSE;\r
33BOOLEAN mEfiAtRuntime = FALSE;\r
363bb1b5 34EFI_RUNTIME_SERVICES *mInternalRT;\r
ebcc8fb7 35\r
36/**\r
42eedea9 37 Set AtRuntime flag as TRUE after ExitBootServices.\r
ebcc8fb7 38\r
39 @param[in] Event The Event that is being processed\r
40 @param[in] Context Event Context\r
363bb1b5 41\r
ebcc8fb7 42**/\r
43VOID\r
44EFIAPI\r
21998b67 45RuntimeLibExitBootServicesEvent (\r
ebcc8fb7 46 IN EFI_EVENT Event,\r
47 IN VOID *Context\r
48 )\r
49{\r
50 //\r
51 // Clear out BootService globals\r
52 //\r
53 gBS = NULL;\r
54\r
55 mEfiAtRuntime = TRUE;\r
56}\r
57\r
58/**\r
59 Fixup internal data so that EFI can be call in virtual mode.\r
60 Call the passed in Child Notify event and convert any pointers in\r
61 lib to virtual mode.\r
62\r
63 @param[in] Event The Event that is being processed\r
64 @param[in] Context Event Context\r
65**/\r
ebcc8fb7 66VOID\r
67EFIAPI\r
68RuntimeLibVirtualNotifyEvent (\r
69 IN EFI_EVENT Event,\r
70 IN VOID *Context\r
71 )\r
72{\r
ebcc8fb7 73 //\r
74 // Update global for Runtime Services Table and IO\r
75 //\r
363bb1b5 76 EfiConvertPointer (0, (VOID **) &mInternalRT);\r
ebcc8fb7 77\r
78 mEfiGoneVirtual = TRUE;\r
79}\r
80\r
81/**\r
a9b896f4 82 Initialize runtime Driver Lib if it has not yet been initialized.\r
60c93673
LG
83 It will ASSERT() if gRT is NULL or gBS is NULL.\r
84 It will ASSERT() if that operation fails.\r
ebcc8fb7 85\r
86 @param[in] ImageHandle The firmware allocated handle for the EFI image.\r
87 @param[in] SystemTable A pointer to the EFI System Table.\r
88\r
89 @return EFI_STATUS always returns EFI_SUCCESS except EFI_ALREADY_STARTED if already started.\r
90**/\r
91EFI_STATUS\r
92EFIAPI\r
93RuntimeDriverLibConstruct (\r
94 IN EFI_HANDLE ImageHandle,\r
95 IN EFI_SYSTEM_TABLE *SystemTable\r
96 )\r
97{\r
98 EFI_STATUS Status;\r
99\r
60c93673
LG
100 ASSERT (gRT != NULL);\r
101 ASSERT (gBS != NULL);\r
102\r
363bb1b5 103 mInternalRT = gRT;\r
ebcc8fb7 104 //\r
105 // Register SetVirtualAddressMap () notify function\r
106 //\r
57a31578 107 Status = gBS->CreateEventEx (\r
108 EVT_NOTIFY_SIGNAL,\r
ebcc8fb7 109 TPL_NOTIFY,\r
110 RuntimeLibVirtualNotifyEvent,\r
111 NULL,\r
57a31578 112 &gEfiEventVirtualAddressChangeGuid,\r
ebcc8fb7 113 &mEfiVirtualNotifyEvent\r
114 );\r
115\r
116 ASSERT_EFI_ERROR (Status);\r
117\r
57a31578 118 Status = gBS->CreateEventEx (\r
119 EVT_NOTIFY_SIGNAL,\r
21998b67 120 TPL_NOTIFY,\r
121 RuntimeLibExitBootServicesEvent,\r
122 NULL,\r
57a31578 123 &gEfiEventExitBootServicesGuid,\r
21998b67 124 &mEfiExitBootServicesEvent\r
125 );\r
126\r
127 ASSERT_EFI_ERROR (Status);\r
128\r
ebcc8fb7 129 return Status;\r
130}\r
131\r
132/**\r
60c93673
LG
133 If a runtime driver exits with an error, it must call this routine \r
134 to free the allocated resource before the exiting.\r
135 It will ASSERT() if gBS is NULL.\r
136 It will ASSERT() if that operation fails.\r
ebcc8fb7 137\r
42eedea9 138 @param[in] ImageHandle The firmware allocated handle for the EFI image.\r
139 @param[in] SystemTable A pointer to the EFI System Table.\r
140\r
ebcc8fb7 141 @retval EFI_SUCCESS Shutdown the Runtime Driver Lib successfully\r
142 @retval EFI_UNSUPPORTED Runtime Driver lib was not initialized at all\r
143**/\r
144EFI_STATUS\r
145EFIAPI\r
146RuntimeDriverLibDeconstruct (\r
147 IN EFI_HANDLE ImageHandle,\r
148 IN EFI_SYSTEM_TABLE *SystemTable\r
149 )\r
150{\r
151 EFI_STATUS Status;\r
152\r
153 //\r
154 // Close SetVirtualAddressMap () notify function\r
155 //\r
156 ASSERT (gBS != NULL);\r
157 Status = gBS->CloseEvent (mEfiVirtualNotifyEvent);\r
158 ASSERT_EFI_ERROR (Status);\r
159\r
21998b67 160 Status = gBS->CloseEvent (mEfiExitBootServicesEvent);\r
161 ASSERT_EFI_ERROR (Status);\r
162\r
ebcc8fb7 163 return Status;\r
164}\r
165\r
166/**\r
1d37ab9f 167 This function allows the caller to determine if UEFI ExitBootServices() has been called.\r
168\r
169 This function returns TRUE after all the EVT_SIGNAL_EXIT_BOOT_SERVICES functions have\r
170 executed as a result of the OS calling ExitBootServices(). Prior to this time FALSE\r
171 is returned. This function is used by runtime code to decide it is legal to access\r
172 services that go away after ExitBootServices().\r
173\r
174 @retval TRUE The system has finished executing the EVT_SIGNAL_EXIT_BOOT_SERVICES event.\r
175 @retval FALSE The system has not finished executing the EVT_SIGNAL_EXIT_BOOT_SERVICES event.\r
ebcc8fb7 176\r
ebcc8fb7 177**/\r
178BOOLEAN\r
179EFIAPI\r
180EfiAtRuntime (\r
181 VOID\r
182 )\r
183{\r
184 return mEfiAtRuntime;\r
185}\r
186\r
187/**\r
1d37ab9f 188 This function allows the caller to determine if UEFI SetVirtualAddressMap() has been called. \r
189\r
190 This function returns TRUE after all the EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE functions have\r
191 executed as a result of the OS calling SetVirtualAddressMap(). Prior to this time FALSE\r
192 is returned. This function is used by runtime code to decide it is legal to access services\r
193 that go away after SetVirtualAddressMap().\r
194\r
195 @retval TRUE The system has finished executing the EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event.\r
196 @retval FALSE The system has not finished executing the EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event.\r
ebcc8fb7 197\r
ebcc8fb7 198**/\r
199BOOLEAN\r
200EFIAPI\r
201EfiGoneVirtual (\r
202 VOID\r
203 )\r
204{\r
205 return mEfiGoneVirtual;\r
206}\r
207\r
363bb1b5 208\r
209/**\r
210 This service is a wrapper for the UEFI Runtime Service ResetSystem().\r
211\r
212 The ResetSystem()function resets the entire platform, including all processors and devices,and reboots the system.\r
213 Calling this interface with ResetType of EfiResetCold causes a system-wide reset. This sets all circuitry within\r
214 the system to its initial state. This type of reset is asynchronous to system operation and operates without regard\r
215 to cycle boundaries. EfiResetCold is tantamount to a system power cycle.\r
216 Calling this interface with ResetType of EfiResetWarm causes a system-wide initialization. The processors are set to\r
217 their initial state, and pending cycles are not corrupted. If the system does not support this reset type, then an\r
218 EfiResetCold must be performed.\r
219 Calling this interface with ResetType of EfiResetShutdown causes the system to enter a power state equivalent to the\r
220 ACPI G2/S5 or G3 states. If the system does not support this reset type, then when the system is rebooted, it should\r
221 exhibit the EfiResetCold attributes.\r
222 The platform may optionally log the parameters from any non-normal reset that occurs.\r
223 The ResetSystem() function does not return.\r
224\r
225 @param ResetType The type of reset to perform.\r
226 @param ResetStatus The status code for the reset. If the system reset is part of a normal operation, the status code\r
227 would be EFI_SUCCESS. If the system reset is due to some type of failure the most appropriate EFI\r
228 Status code would be used.\r
229 @param DataSizeThe size, in bytes, of ResetData.\r
230 @param ResetData For a ResetType of EfiResetCold, EfiResetWarm, or EfiResetShutdown the data buffer starts with a\r
231 Null-terminated Unicode string, optionally followed by additional binary data. The string is a\r
232 description that the caller may use to further indicate the reason for the system reset. ResetData\r
233 is only valid if ResetStatus is something other then EFI_SUCCESS. This pointer must be a physical\r
234 address. For a ResetType of EfiRestUpdate the data buffer also starts with a Null-terminated string\r
235 that is followed by a physical VOID * to an EFI_CAPSULE_HEADER.\r
236\r
237**/\r
238VOID\r
239EFIAPI\r
240EfiResetSystem (\r
241 IN EFI_RESET_TYPE ResetType,\r
242 IN EFI_STATUS ResetStatus,\r
243 IN UINTN DataSize,\r
244 IN VOID *ResetData OPTIONAL\r
245 )\r
246{\r
247 mInternalRT->ResetSystem (ResetType, ResetStatus, DataSize, ResetData);\r
248}\r
249\r
250\r
251/**\r
252 This service is a wrapper for the UEFI Runtime Service GetTime().\r
253\r
254 The GetTime() function returns a time that was valid sometime during the call to the function.\r
255 While the returned EFI_TIME structure contains TimeZone and Daylight savings time information,\r
256 the actual clock does not maintain these values. The current time zone and daylight saving time\r
257 information returned by GetTime() are the values that were last set via SetTime().\r
258 The GetTime() function should take approximately the same amount of time to read the time each\r
259 time it is called. All reported device capabilities are to be rounded up.\r
260 During runtime, if a PC-AT CMOS device is present in the platform the caller must synchronize\r
261 access to the device before calling GetTime().\r
262\r
263 @param Time A pointer to storage to receive a snapshot of the current time.\r
264 @param Capabilities An optional pointer to a buffer to receive the real time clock device's\r
265 capabilities.\r
266\r
267 @retval EFI_SUCCESS The operation completed successfully.\r
268 @retval EFI_INVALID_PARAMETER Time is NULL.\r
269 @retval EFI_DEVICE_ERROR The time could not be retrieved due to a hardware error.\r
270\r
271**/\r
272EFI_STATUS\r
273EFIAPI\r
274EfiGetTime (\r
275 OUT EFI_TIME *Time,\r
276 OUT EFI_TIME_CAPABILITIES *Capabilities OPTIONAL\r
277 )\r
278{\r
279 return mInternalRT->GetTime (Time, Capabilities);\r
280}\r
281\r
282\r
283/**\r
284 This service is a wrapper for the UEFI Runtime Service SetTime().\r
285\r
286 The SetTime() function sets the real time clock device to the supplied time, and records the\r
287 current time zone and daylight savings time information. The SetTime() function is not allowed\r
288 to loop based on the current time. For example, if the device does not support a hardware reset\r
289 for the sub-resolution time, the code is not to implement the feature by waiting for the time to\r
290 wrap.\r
291 During runtime, if a PC-AT CMOS device is present in the platform the caller must synchronize\r
292 access to the device before calling SetTime().\r
293\r
294 @param Time A pointer to the current time. Type EFI_TIME is defined in the GetTime()\r
295 function description. Full error checking is performed on the different\r
296 fields of the EFI_TIME structure (refer to the EFI_TIME definition in the\r
297 GetTime() function description for full details), and EFI_INVALID_PARAMETER\r
298 is returned if any field is out of range.\r
299\r
300 @retval EFI_SUCCESS The operation completed successfully.\r
301 @retval EFI_INVALID_PARAMETER A time field is out of range.\r
302 @retval EFI_DEVICE_ERROR The time could not be set due to a hardware error.\r
303\r
304**/\r
305EFI_STATUS\r
306EFIAPI\r
307EfiSetTime (\r
308 IN EFI_TIME *Time\r
309 )\r
310{\r
311 return mInternalRT->SetTime (Time);\r
312}\r
313\r
314\r
315/**\r
316 This service is a wrapper for the UEFI Runtime Service GetWakeupTime().\r
317\r
318 The alarm clock time may be rounded from the set alarm clock time to be within the resolution\r
319 of the alarm clock device. The resolution of the alarm clock device is defined to be one second.\r
320 During runtime, if a PC-AT CMOS device is present in the platform the caller must synchronize\r
321 access to the device before calling GetWakeupTime().\r
322\r
323 @param Enabled Indicates if the alarm is currently enabled or disabled.\r
324 @param Pending Indicates if the alarm signal is pending and requires acknowledgement.\r
325 @param Time The current alarm setting. Type EFI_TIME is defined in the GetTime()\r
326 function description.\r
327\r
328 @retval EFI_SUCCESS The alarm settings were returned.\r
329 @retval EFI_INVALID_PARAMETER Enabled is NULL.\r
330 @retval EFI_INVALID_PARAMETER Pending is NULL.\r
331 @retval EFI_INVALID_PARAMETER Time is NULL.\r
332 @retval EFI_DEVICE_ERROR The wakeup time could not be retrieved due to a hardware error.\r
333 @retval EFI_UNSUPPORTED A wakeup timer is not supported on this platform.\r
334\r
335**/\r
336EFI_STATUS\r
337EFIAPI\r
338EfiGetWakeupTime (\r
339 OUT BOOLEAN *Enabled,\r
340 OUT BOOLEAN *Pending,\r
341 OUT EFI_TIME *Time\r
342 )\r
343{\r
344 return mInternalRT->GetWakeupTime (Enabled, Pending, Time);\r
345}\r
346\r
347\r
348\r
349/**\r
350 This service is a wrapper for the UEFI Runtime Service SetWakeupTime()\r
351\r
352 Setting a system wakeup alarm causes the system to wake up or power on at the set time.\r
353 When the alarm fires, the alarm signal is latched until it is acknowledged by calling SetWakeupTime()\r
354 to disable the alarm. If the alarm fires before the system is put into a sleeping or off state,\r
355 since the alarm signal is latched the system will immediately wake up. If the alarm fires while\r
356 the system is off and there is insufficient power to power on the system, the system is powered\r
357 on when power is restored.\r
358\r
359 @param Enable Enable or disable the wakeup alarm.\r
360 @param Time If Enable is TRUE, the time to set the wakeup alarm for. Type EFI_TIME\r
361 is defined in the GetTime() function description. If Enable is FALSE,\r
362 then this parameter is optional, and may be NULL.\r
363\r
364 @retval EFI_SUCCESS If Enable is TRUE, then the wakeup alarm was enabled.\r
365 If Enable is FALSE, then the wakeup alarm was disabled.\r
366 @retval EFI_INVALID_PARAMETER A time field is out of range.\r
367 @retval EFI_DEVICE_ERROR The wakeup time could not be set due to a hardware error.\r
368 @retval EFI_UNSUPPORTED A wakeup timer is not supported on this platform.\r
369\r
370**/\r
371EFI_STATUS\r
372EFIAPI\r
373EfiSetWakeupTime (\r
374 IN BOOLEAN Enable,\r
375 IN EFI_TIME *Time OPTIONAL\r
376 )\r
377{\r
378 return mInternalRT->SetWakeupTime (Enable, Time);\r
379}\r
380\r
381\r
382/**\r
383 This service is a wrapper for the UEFI Runtime Service GetVariable().\r
384\r
385 Each vendor may create and manage its own variables without the risk of name conflicts by\r
386 using a unique VendorGuid. When a variable is set its Attributes are supplied to indicate\r
387 how the data variable should be stored and maintained by the system. The attributes affect\r
388 when the variable may be accessed and volatility of the data. Any attempts to access a variable\r
389 that does not have the attribute set for runtime access will yield the EFI_NOT_FOUND error.\r
390 If the Data buffer is too small to hold the contents of the variable, the error EFI_BUFFER_TOO_SMALL\r
391 is returned and DataSize is set to the required buffer size to obtain the data.\r
392\r
393 @param VariableName the name of the vendor's variable, it's a Null-Terminated Unicode String\r
394 @param VendorGuid Unify identifier for vendor.\r
395 @param Attributes Point to memory location to return the attributes of variable. If the point\r
396 is NULL, the parameter would be ignored.\r
397 @param DataSize As input, point to the maximum size of return Data-Buffer.\r
398 As output, point to the actual size of the returned Data-Buffer.\r
399 @param Data Point to return Data-Buffer.\r
400\r
401 @retval EFI_SUCCESS The function completed successfully.\r
402 @retval EFI_NOT_FOUND The variable was not found.\r
403 @retval EFI_BUFFER_TOO_SMALL The DataSize is too small for the result. DataSize has\r
404 been updated with the size needed to complete the request.\r
405 @retval EFI_INVALID_PARAMETER VariableName is NULL.\r
406 @retval EFI_INVALID_PARAMETER VendorGuid is NULL.\r
407 @retval EFI_INVALID_PARAMETER DataSize is NULL.\r
408 @retval EFI_INVALID_PARAMETER The DataSize is not too small and Data is NULL.\r
409 @retval EFI_DEVICE_ERROR The variable could not be retrieved due to a hardware error.\r
410 @retval EFI_SECURITY_VIOLATION The variable could not be retrieved due to an authentication failure.\r
411**/\r
412EFI_STATUS\r
413EFIAPI\r
414EfiGetVariable (\r
415 IN CHAR16 *VariableName,\r
416 IN EFI_GUID *VendorGuid,\r
417 OUT UINT32 *Attributes OPTIONAL,\r
418 IN OUT UINTN *DataSize,\r
419 OUT VOID *Data\r
420 )\r
421{\r
422 return mInternalRT->GetVariable (VariableName, VendorGuid, Attributes, DataSize, Data);\r
423}\r
424\r
425\r
426/**\r
427 This service is a wrapper for the UEFI Runtime Service GetNextVariableName().\r
428\r
429 GetNextVariableName() is called multiple times to retrieve the VariableName and VendorGuid of\r
430 all variables currently available in the system. On each call to GetNextVariableName() the\r
431 previous results are passed into the interface, and on output the interface returns the next\r
432 variable name data. When the entire variable list has been returned, the error EFI_NOT_FOUND\r
433 is returned.\r
434\r
435 @param VariableNameSize As input, point to maximum size of variable name.\r
436 As output, point to actual size of variable name.\r
437 @param VariableName As input, supplies the last VariableName that was returned by\r
438 GetNextVariableName().\r
439 As output, returns the name of variable. The name\r
440 string is Null-Terminated Unicode string.\r
441 @param VendorGuid As input, supplies the last VendorGuid that was returned by\r
442 GetNextVriableName().\r
443 As output, returns the VendorGuid of the current variable.\r
444\r
445 @retval EFI_SUCCESS The function completed successfully.\r
446 @retval EFI_NOT_FOUND The next variable was not found.\r
447 @retval EFI_BUFFER_TOO_SMALL The VariableNameSize is too small for the result.\r
448 VariableNameSize has been updated with the size needed\r
449 to complete the request.\r
450 @retval EFI_INVALID_PARAMETER VariableNameSize is NULL.\r
451 @retval EFI_INVALID_PARAMETER VariableName is NULL.\r
452 @retval EFI_INVALID_PARAMETER VendorGuid is NULL.\r
453 @retval EFI_DEVICE_ERROR The variable name could not be retrieved due to a hardware error.\r
454\r
455**/\r
456EFI_STATUS\r
457EFIAPI\r
458EfiGetNextVariableName (\r
459 IN OUT UINTN *VariableNameSize,\r
460 IN OUT CHAR16 *VariableName,\r
461 IN OUT EFI_GUID *VendorGuid\r
462 )\r
463{\r
464 return mInternalRT->GetNextVariableName (VariableNameSize, VariableName, VendorGuid);\r
465}\r
466\r
467\r
468/**\r
469 This service is a wrapper for the UEFI Runtime Service GetNextVariableName()\r
470\r
471 Variables are stored by the firmware and may maintain their values across power cycles. Each vendor\r
472 may create and manage its own variables without the risk of name conflicts by using a unique VendorGuid.\r
473\r
474 @param VariableName the name of the vendor's variable, it's a\r
475 Null-Terminated Unicode String\r
476 @param VendorGuid Unify identifier for vendor.\r
477 @param Attributes Point to memory location to return the attributes of variable. If the point\r
478 is NULL, the parameter would be ignored.\r
479 @param DataSize The size in bytes of Data-Buffer.\r
480 @param Data Point to the content of the variable.\r
481\r
482 @retval EFI_SUCCESS The firmware has successfully stored the variable and its data as\r
483 defined by the Attributes.\r
484 @retval EFI_INVALID_PARAMETER An invalid combination of attribute bits was supplied, or the\r
485 DataSize exceeds the maximum allowed.\r
486 @retval EFI_INVALID_PARAMETER VariableName is an empty Unicode string.\r
487 @retval EFI_OUT_OF_RESOURCES Not enough storage is available to hold the variable and its data.\r
488 @retval EFI_DEVICE_ERROR The variable could not be saved due to a hardware failure.\r
489 @retval EFI_WRITE_PROTECTED The variable in question is read-only.\r
490 @retval EFI_WRITE_PROTECTED The variable in question cannot be deleted.\r
491 @retval EFI_SECURITY_VIOLATION The variable could not be written due to EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS\r
492 set but the AuthInfo does NOT pass the validation check carried\r
493 out by the firmware.\r
494 @retval EFI_NOT_FOUND The variable trying to be updated or deleted was not found.\r
495\r
496**/\r
497EFI_STATUS\r
498EFIAPI\r
499EfiSetVariable (\r
500 IN CHAR16 *VariableName,\r
501 IN EFI_GUID *VendorGuid,\r
502 IN UINT32 Attributes,\r
503 IN UINTN DataSize,\r
504 IN VOID *Data\r
505 )\r
506{\r
507 return mInternalRT->SetVariable (VariableName, VendorGuid, Attributes, DataSize, Data);\r
508}\r
509\r
510\r
511/**\r
512 This service is a wrapper for the UEFI Runtime Service GetNextHighMonotonicCount().\r
513\r
514 The platform's monotonic counter is comprised of two 32-bit quantities: the high 32 bits and\r
515 the low 32 bits. During boot service time the low 32-bit value is volatile: it is reset to zero\r
516 on every system reset and is increased by 1 on every call to GetNextMonotonicCount(). The high\r
517 32-bit value is nonvolatile and is increased by 1 whenever the system resets or whenever the low\r
518 32-bit count (returned by GetNextMonoticCount()) overflows.\r
519\r
520 @param HighCount Pointer to returned value.\r
521\r
522 @retval EFI_SUCCESS The next high monotonic count was returned.\r
523 @retval EFI_DEVICE_ERROR The device is not functioning properly.\r
524 @retval EFI_INVALID_PARAMETER HighCount is NULL.\r
525\r
526**/\r
527EFI_STATUS\r
528EFIAPI\r
529EfiGetNextHighMonotonicCount (\r
530 OUT UINT32 *HighCount\r
531 )\r
532{\r
533 return mInternalRT->GetNextHighMonotonicCount (HighCount);\r
534}\r
535\r
536\r
537/**\r
538 This service is a wrapper for the UEFI Runtime Service ConvertPointer(). \r
539\r
540 The ConvertPointer() function is used by an EFI component during the SetVirtualAddressMap() operation.\r
541 ConvertPointer()must be called using physical address pointers during the execution of SetVirtualAddressMap().\r
542\r
543 @param DebugDisposition Supplies type information for the pointer being converted.\r
544 @param Address The pointer to a pointer that is to be fixed to be the\r
545 value needed for the new virtual address mapping being\r
546 applied.\r
547\r
548 @retval EFI_SUCCESS The pointer pointed to by Address was modified.\r
549 @retval EFI_NOT_FOUND The pointer pointed to by Address was not found to be part of\r
550 the current memory map. This is normally fatal.\r
551 @retval EFI_INVALID_PARAMETER Address is NULL.\r
552 @retval EFI_INVALID_PARAMETER *Address is NULL and DebugDispositio\r
553\r
554**/\r
555EFI_STATUS\r
556EFIAPI\r
557EfiConvertPointer (\r
558 IN UINTN DebugDisposition,\r
559 IN OUT VOID **Address\r
560 )\r
561{\r
562 return gRT->ConvertPointer (DebugDisposition, Address);\r
563}\r
564\r
565\r
566/**\r
567 Determines the new virtual address that is to be used on subsequent memory accesses.\r
568\r
569 For IA32, x64, and EBC, this service is a wrapper for the UEFI Runtime Service\r
570 ConvertPointer(). See the UEFI Specification for details. \r
571 For IPF, this function interprets Address as a pointer to an EFI_PLABEL structure\r
572 and both the EntryPoint and GP fields of an EFI_PLABEL are converted from physical\r
573 to virtiual addressing. Since IPF allows the GP to point to an address outside\r
574 a PE/COFF image, the physical to virtual offset for the EntryPoint field is used\r
575 to adjust the GP field. The UEFI Runtime Service ConvertPointer() is used to convert\r
576 EntryPoint and the status code for this conversion is always returned. If the convertion\r
577 of EntryPoint fails, then neither EntryPoint nor GP are modified. See the UEFI\r
578 Specification for details on the UEFI Runtime Service ConvertPointer().\r
579\r
580 @param DebugDisposition Supplies type information for the pointer being converted.\r
581 @param Address The pointer to a pointer that is to be fixed to be the\r
582 value needed for the new virtual address mapping being\r
583 applied.\r
584\r
585 @return EFI_STATUS value from EfiConvertPointer().\r
586\r
587**/\r
588EFI_STATUS\r
589EFIAPI\r
590EfiConvertFunctionPointer (\r
591 IN UINTN DebugDisposition,\r
592 IN OUT VOID **Address\r
593 )\r
594{\r
595 return EfiConvertPointer (DebugDisposition, Address);\r
596}\r
597\r
598\r
599/**\r
600 Convert the standard Lib double linked list to a virtual mapping.\r
601\r
602 This service uses EfiConvertPointer() to walk a double linked list and convert all the link\r
603 pointers to their virtual mappings. This function is only guaranteed to work during the\r
604 EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event and calling it at other times has undefined results.\r
605\r
606 @param DebugDisposition Supplies type information for the pointer being converted.\r
607 @param ListHead Head of linked list to convert.\r
608\r
609 @retval EFI_SUCCESS Success to execute the function.\r
610 @retval !EFI_SUCCESS Failed to e3xecute the function.\r
611\r
612**/\r
613EFI_STATUS\r
614EFIAPI\r
615EfiConvertList (\r
616 IN UINTN DebugDisposition,\r
617 IN OUT LIST_ENTRY *ListHead\r
618 )\r
619{\r
620 LIST_ENTRY *Link;\r
621 LIST_ENTRY *NextLink;\r
622 \r
623 //\r
624 // For NULL List, return EFI_SUCCESS\r
625 //\r
626 if (ListHead == NULL) {\r
627 return EFI_SUCCESS;\r
628 }\r
629\r
630 //\r
631 // Convert all the ForwardLink & BackLink pointers in the list\r
632 //\r
633 Link = ListHead;\r
634 do {\r
635 NextLink = Link->ForwardLink;\r
636\r
637 EfiConvertPointer (\r
638 Link->ForwardLink == ListHead ? DebugDisposition : 0,\r
639 (VOID **) &Link->ForwardLink\r
640 );\r
641\r
642 EfiConvertPointer (\r
643 Link->BackLink == ListHead ? DebugDisposition : 0,\r
644 (VOID **) &Link->BackLink\r
645 );\r
646\r
647 Link = NextLink;\r
648 } while (Link != ListHead);\r
649 return EFI_SUCCESS;\r
650}\r
651\r
652\r
653/**\r
654 This service is a wrapper for the UEFI Runtime Service SetVirtualAddressMap().\r
655\r
656 The SetVirtualAddressMap() function is used by the OS loader. The function can only be called\r
657 at runtime, and is called by the owner of the system's memory map. I.e., the component which\r
658 called ExitBootServices(). All events of type EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE must be signaled\r
659 before SetVirtualAddressMap() returns.\r
660\r
661 @param MemoryMapSize The size in bytes of VirtualMap.\r
662 @param DescriptorSize The size in bytes of an entry in the VirtualMap.\r
663 @param DescriptorVersion The version of the structure entries in VirtualMap.\r
664 @param VirtualMap An array of memory descriptors which contain new virtual\r
665 address mapping information for all runtime ranges. Type\r
666 EFI_MEMORY_DESCRIPTOR is defined in the\r
667 GetMemoryMap() function description.\r
668\r
669 @retval EFI_SUCCESS The virtual address map has been applied.\r
670 @retval EFI_UNSUPPORTED EFI firmware is not at runtime, or the EFI firmware is already in\r
671 virtual address mapped mode.\r
672 @retval EFI_INVALID_PARAMETER DescriptorSize or DescriptorVersion is\r
673 invalid.\r
674 @retval EFI_NO_MAPPING A virtual address was not supplied for a range in the memory\r
675 map that requires a mapping.\r
676 @retval EFI_NOT_FOUND A virtual address was supplied for an address that is not found\r
677 in the memory map.\r
678**/\r
679EFI_STATUS\r
680EFIAPI\r
681EfiSetVirtualAddressMap (\r
682 IN UINTN MemoryMapSize,\r
683 IN UINTN DescriptorSize,\r
684 IN UINT32 DescriptorVersion,\r
685 IN CONST EFI_MEMORY_DESCRIPTOR *VirtualMap\r
686 )\r
687{\r
688 return mInternalRT->SetVirtualAddressMap (\r
689 MemoryMapSize,\r
690 DescriptorSize,\r
691 DescriptorVersion,\r
692 (EFI_MEMORY_DESCRIPTOR *) VirtualMap\r
693 );\r
694}\r
695\r
696\r
697/**\r
698 This service is a wrapper for the UEFI Runtime Service UpdateCapsule().\r
699\r
700 Passes capsules to the firmware with both virtual and physical mapping. Depending on the intended\r
701 consumption, the firmware may process the capsule immediately. If the payload should persist across a\r
702 system reset, the reset value returned from EFI_QueryCapsuleCapabilities must be passed into ResetSystem()\r
703 and will cause the capsule to be processed by the firmware as part of the reset process.\r
704\r
705 @param CapsuleHeaderArray Virtual pointer to an array of virtual pointers to the capsules\r
706 being passed into update capsule. Each capsules is assumed to\r
707 stored in contiguous virtual memory. The capsules in the\r
708 CapsuleHeaderArray must be the same capsules as the\r
709 ScatterGatherList. The CapsuleHeaderArray must\r
710 have the capsules in the same order as the ScatterGatherList.\r
711 @param CapsuleCount Number of pointers to EFI_CAPSULE_HEADER in\r
712 CaspuleHeaderArray.\r
713 @param ScatterGatherList Physical pointer to a set of\r
714 EFI_CAPSULE_BLOCK_DESCRIPTOR that describes the\r
715 location in physical memory of a set of capsules. See Related\r
716 Definitions for an explanation of how more than one capsule is\r
717 passed via this interface. The capsules in the\r
718 ScatterGatherList must be in the same order as the\r
719 CapsuleHeaderArray. This parameter is only referenced if\r
720 the capsules are defined to persist across system reset.\r
721\r
722 @retval EFI_SUCCESS Valid capsule was passed. If CAPSULE_FLAGS_PERSIT_ACROSS_RESET is not set,\r
723 the capsule has been successfully processed by the firmware.\r
724 @retval EFI_INVALID_PARAMETER CapsuleSize or HeaderSize is NULL.\r
725 @retval EFI_INVALID_PARAMETER CapsuleCount is 0\r
726 @retval EFI_DEVICE_ERROR The capsule update was started, but failed due to a device error.\r
727 @retval EFI_UNSUPPORTED The capsule type is not supported on this platform.\r
728 @retval EFI_OUT_OF_RESOURCES There were insufficient resources to process the capsule.\r
729\r
730**/\r
731EFI_STATUS\r
732EFIAPI\r
733EfiUpdateCapsule (\r
734 IN EFI_CAPSULE_HEADER **CapsuleHeaderArray,\r
735 IN UINTN CapsuleCount,\r
736 IN EFI_PHYSICAL_ADDRESS ScatterGatherList OPTIONAL\r
737 )\r
738{\r
739 return mInternalRT->UpdateCapsule (\r
740 CapsuleHeaderArray,\r
741 CapsuleCount,\r
742 ScatterGatherList\r
743 );\r
744}\r
745\r
746\r
747/**\r
748 This service is a wrapper for the UEFI Runtime Service QueryCapsuleCapabilities().\r
749\r
750 The QueryCapsuleCapabilities() function allows a caller to test to see if a capsule or\r
751 capsules can be updated via UpdateCapsule(). The Flags values in the capsule header and\r
752 size of the entire capsule is checked.\r
753 If the caller needs to query for generic capsule capability a fake EFI_CAPSULE_HEADER can be\r
754 constructed where CapsuleImageSize is equal to HeaderSize that is equal to sizeof\r
755 (EFI_CAPSULE_HEADER). To determine reset requirements,\r
756 CAPSULE_FLAGS_PERSIST_ACROSS_RESET should be set in the Flags field of the\r
757 EFI_CAPSULE_HEADER.\r
758 The firmware must support any capsule that has the\r
759 CAPSULE_FLAGS_PERSIST_ACROSS_RESET flag set in EFI_CAPSULE_HEADER. The\r
760 firmware sets the policy for what capsules are supported that do not have the\r
761 CAPSULE_FLAGS_PERSIST_ACROSS_RESET flag set.\r
762\r
763 @param CapsuleHeaderArray Virtual pointer to an array of virtual pointers to the capsules\r
764 being passed into update capsule. The capsules are assumed to\r
765 stored in contiguous virtual memory.\r
766 @param CapsuleCount Number of pointers to EFI_CAPSULE_HEADER in\r
767 CaspuleHeaderArray.\r
768 @param MaximumCapsuleSize On output the maximum size that UpdateCapsule() can\r
769 support as an argument to UpdateCapsule() via\r
770 CapsuleHeaderArray and ScatterGatherList.\r
771 Undefined on input.\r
772 @param ResetType Returns the type of reset required for the capsule update.\r
773\r
774 @retval EFI_SUCCESS Valid answer returned.\r
775 @retval EFI_INVALID_PARAMETER MaximumCapsuleSize is NULL.\r
776 @retval EFI_UNSUPPORTED The capsule type is not supported on this platform, and\r
777 MaximumCapsuleSize and ResetType are undefined.\r
778 @retval EFI_OUT_OF_RESOURCES There were insufficient resources to process the query request.\r
779\r
780**/\r
781EFI_STATUS\r
782EFIAPI\r
783EfiQueryCapsuleCapabilities (\r
784 IN EFI_CAPSULE_HEADER **CapsuleHeaderArray,\r
785 IN UINTN CapsuleCount,\r
786 OUT UINT64 *MaximumCapsuleSize,\r
787 OUT EFI_RESET_TYPE *ResetType\r
788 )\r
789{\r
790 return mInternalRT->QueryCapsuleCapabilities (\r
791 CapsuleHeaderArray,\r
792 CapsuleCount,\r
793 MaximumCapsuleSize,\r
794 ResetType\r
795 );\r
796}\r
797\r
798\r
799/**\r
800 This service is a wrapper for the UEFI Runtime Service QueryVariableInfo().\r
801\r
802 The QueryVariableInfo() function allows a caller to obtain the information about the\r
803 maximum size of the storage space available for the EFI variables, the remaining size of the storage\r
804 space available for the EFI variables and the maximum size of each individual EFI variable,\r
805 associated with the attributes specified.\r
806 The returned MaximumVariableStorageSize, RemainingVariableStorageSize,\r
807 MaximumVariableSize information may change immediately after the call based on other\r
808 runtime activities including asynchronous error events. Also, these values associated with different\r
809 attributes are not additive in nature.\r
810\r
811 @param Attributes Attributes bitmask to specify the type of variables on\r
812 which to return information. Refer to the\r
813 GetVariable() function description.\r
814 @param MaximumVariableStorageSize\r
815 On output the maximum size of the storage space\r
816 available for the EFI variables associated with the\r
817 attributes specified.\r
818 @param RemainingVariableStorageSize\r
819 Returns the remaining size of the storage space\r
820 available for the EFI variables associated with the\r
821 attributes specified..\r
822 @param MaximumVariableSize Returns the maximum size of the individual EFI\r
823 variables associated with the attributes specified.\r
824\r
825 @retval EFI_SUCCESS Valid answer returned.\r
826 @retval EFI_INVALID_PARAMETER An invalid combination of attribute bits was supplied.\r
827 @retval EFI_UNSUPPORTED EFI_UNSUPPORTED The attribute is not supported on this platform, and the\r
828 MaximumVariableStorageSize,\r
829 RemainingVariableStorageSize, MaximumVariableSize\r
830 are undefined.\r
831\r
832**/\r
833EFI_STATUS\r
834EFIAPI\r
835EfiQueryVariableInfo (\r
836 IN UINT32 Attributes,\r
837 OUT UINT64 *MaximumVariableStorageSize,\r
838 OUT UINT64 *RemainingVariableStorageSize,\r
839 OUT UINT64 *MaximumVariableSize\r
840 )\r
841{\r
842 return mInternalRT->QueryVariableInfo (\r
843 Attributes,\r
844 MaximumVariableStorageSize,\r
845 RemainingVariableStorageSize,\r
846 MaximumVariableSize\r
847 );\r
848}\r