]> git.proxmox.com Git - mirror_edk2.git/blame_incremental - MdePkg/Include/Library/UefiRuntimeLib.h
UefiCpuPkg: Move AsmRelocateApLoopStart from Mpfuncs.nasm to AmdSev.nasm
[mirror_edk2.git] / MdePkg / Include / Library / UefiRuntimeLib.h
... / ...
CommitLineData
1/** @file\r
2 Provides library functions for each of the UEFI Runtime Services.\r
3 Only available to DXE and UEFI module types.\r
4\r
5Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR>\r
6SPDX-License-Identifier: BSD-2-Clause-Patent\r
7**/\r
8\r
9#ifndef __UEFI_RUNTIME_LIB__\r
10#define __UEFI_RUNTIME_LIB__\r
11\r
12/**\r
13 This function allows the caller to determine if UEFI ExitBootServices() has been called.\r
14\r
15 This function returns TRUE after all the EVT_SIGNAL_EXIT_BOOT_SERVICES functions have\r
16 executed as a result of the OS calling ExitBootServices(). Prior to this time FALSE\r
17 is returned. This function is used by runtime code to decide it is legal to access\r
18 services that go away after ExitBootServices().\r
19\r
20 @retval TRUE The system has finished executing the EVT_SIGNAL_EXIT_BOOT_SERVICES event.\r
21 @retval FALSE The system has not finished executing the EVT_SIGNAL_EXIT_BOOT_SERVICES event.\r
22\r
23**/\r
24BOOLEAN\r
25EFIAPI\r
26EfiAtRuntime (\r
27 VOID\r
28 );\r
29\r
30/**\r
31 This function allows the caller to determine if UEFI SetVirtualAddressMap() has been called.\r
32\r
33 This function returns TRUE after all the EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE functions have\r
34 executed as a result of the OS calling SetVirtualAddressMap(). Prior to this time FALSE\r
35 is returned. This function is used by runtime code to decide it is legal to access services\r
36 that go away after SetVirtualAddressMap().\r
37\r
38 @retval TRUE The system has finished executing the EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event.\r
39 @retval FALSE The system has not finished executing the EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event.\r
40\r
41**/\r
42BOOLEAN\r
43EFIAPI\r
44EfiGoneVirtual (\r
45 VOID\r
46 );\r
47\r
48/**\r
49 This service is a wrapper for the UEFI Runtime Service GetTime().\r
50\r
51 The GetTime() function returns a time that was valid sometime during the call to the function.\r
52 While the returned EFI_TIME structure contains TimeZone and Daylight savings time information,\r
53 the actual clock does not maintain these values. The current time zone and daylight saving time\r
54 information returned by GetTime() are the values that were last set via SetTime().\r
55 The GetTime() function should take approximately the same amount of time to read the time each\r
56 time it is called. All reported device capabilities are to be rounded up.\r
57 During runtime, if a PC-AT CMOS device is present in the platform, the caller must synchronize\r
58 access to the device before calling GetTime().\r
59\r
60 @param Time A pointer to storage to receive a snapshot of the current time.\r
61 @param Capabilities An optional pointer to a buffer to receive the real time clock device's\r
62 capabilities.\r
63\r
64 @retval EFI_SUCCESS The operation completed successfully.\r
65 @retval EFI_INVALID_PARAMETER Time is NULL.\r
66 @retval EFI_DEVICE_ERROR The time could not be retrieved due to a hardware error.\r
67\r
68**/\r
69EFI_STATUS\r
70EFIAPI\r
71EfiGetTime (\r
72 OUT EFI_TIME *Time,\r
73 OUT EFI_TIME_CAPABILITIES *Capabilities OPTIONAL\r
74 );\r
75\r
76/**\r
77 This service is a wrapper for the UEFI Runtime Service SetTime().\r
78\r
79 The SetTime() function sets the real time clock device to the supplied time, and records the\r
80 current time zone and daylight savings time information. The SetTime() function is not allowed\r
81 to loop based on the current time. For example, if the device does not support a hardware reset\r
82 for the sub-resolution time, the code is not to implement the feature by waiting for the time to\r
83 wrap.\r
84 During runtime, if a PC-AT CMOS device is present in the platform, the caller must synchronize\r
85 access to the device before calling SetTime().\r
86\r
87 @param Time A pointer to the current time. Type EFI_TIME is defined in the GetTime()\r
88 function description. Full error checking is performed on the different\r
89 fields of the EFI_TIME structure (refer to the EFI_TIME definition in the\r
90 GetTime() function description for full details), and EFI_INVALID_PARAMETER\r
91 is returned if any field is out of range.\r
92\r
93 @retval EFI_SUCCESS The operation completed successfully.\r
94 @retval EFI_INVALID_PARAMETER A time field is out of range.\r
95 @retval EFI_DEVICE_ERROR The time could not be set due to a hardware error.\r
96\r
97**/\r
98EFI_STATUS\r
99EFIAPI\r
100EfiSetTime (\r
101 IN EFI_TIME *Time\r
102 );\r
103\r
104/**\r
105 This service is a wrapper for the UEFI Runtime Service GetWakeupTime().\r
106\r
107 The alarm clock time may be rounded from the set alarm clock time to be within the resolution\r
108 of the alarm clock device. The resolution of the alarm clock device is defined to be one second.\r
109 During runtime, if a PC-AT CMOS device is present in the platform the caller must synchronize\r
110 access to the device before calling GetWakeupTime().\r
111\r
112 @param Enabled Indicates if the alarm is currently enabled or disabled.\r
113 @param Pending Indicates if the alarm signal is pending and requires acknowledgement.\r
114 @param Time The current alarm setting. Type EFI_TIME is defined in the GetTime()\r
115 function description.\r
116\r
117 @retval EFI_SUCCESS The alarm settings were returned.\r
118 @retval EFI_INVALID_PARAMETER Enabled is NULL.\r
119 @retval EFI_INVALID_PARAMETER Pending is NULL.\r
120 @retval EFI_INVALID_PARAMETER Time is NULL.\r
121 @retval EFI_DEVICE_ERROR The wakeup time could not be retrieved due to a hardware error.\r
122 @retval EFI_UNSUPPORTED A wakeup timer is not supported on this platform.\r
123\r
124**/\r
125EFI_STATUS\r
126EFIAPI\r
127EfiGetWakeupTime (\r
128 OUT BOOLEAN *Enabled,\r
129 OUT BOOLEAN *Pending,\r
130 OUT EFI_TIME *Time\r
131 );\r
132\r
133/**\r
134 This service is a wrapper for the UEFI Runtime Service SetWakeupTime()\r
135\r
136 Setting a system wakeup alarm causes the system to wake up or power on at the set time.\r
137 When the alarm fires, the alarm signal is latched until it is acknowledged by calling SetWakeupTime()\r
138 to disable the alarm. If the alarm fires before the system is put into a sleeping or off state,\r
139 since the alarm signal is latched the system will immediately wake up. If the alarm fires while\r
140 the system is off and there is insufficient power to power on the system, the system is powered\r
141 on when power is restored.\r
142\r
143 @param Enable Enable or disable the wakeup alarm.\r
144 @param Time If Enable is TRUE, the time to set the wakeup alarm for. Type EFI_TIME\r
145 is defined in the GetTime() function description. If Enable is FALSE,\r
146 then this parameter is optional, and may be NULL.\r
147\r
148 @retval EFI_SUCCESS If Enable is TRUE, then the wakeup alarm was enabled.\r
149 If Enable is FALSE, then the wakeup alarm was disabled.\r
150 @retval EFI_INVALID_PARAMETER A time field is out of range.\r
151 @retval EFI_DEVICE_ERROR The wakeup time could not be set due to a hardware error.\r
152 @retval EFI_UNSUPPORTED A wakeup timer is not supported on this platform.\r
153\r
154**/\r
155EFI_STATUS\r
156EFIAPI\r
157EfiSetWakeupTime (\r
158 IN BOOLEAN Enable,\r
159 IN EFI_TIME *Time OPTIONAL\r
160 );\r
161\r
162/**\r
163 This service is a wrapper for the UEFI Runtime Service GetVariable().\r
164\r
165 Each vendor may create and manage its own variables without the risk of name conflicts by\r
166 using a unique VendorGuid. When a variable is set, its Attributes are supplied to indicate\r
167 how the data variable should be stored and maintained by the system. The attributes affect\r
168 when the variable may be accessed and volatility of the data. Any attempts to access a variable\r
169 that does not have the attribute set for runtime access will yield the EFI_NOT_FOUND error.\r
170 If the Data buffer is too small to hold the contents of the variable, the error EFI_BUFFER_TOO_SMALL\r
171 is returned and DataSize is set to the required buffer size to obtain the data.\r
172\r
173 @param VariableName the name of the vendor's variable, it's a Null-Terminated Unicode String\r
174 @param VendorGuid Unify identifier for vendor.\r
175 @param Attributes Point to memory location to return the attributes of variable. If the point\r
176 is NULL, the parameter would be ignored.\r
177 @param DataSize As input, point to the maximum size of return Data-Buffer.\r
178 As output, point to the actual size of the returned Data-Buffer.\r
179 @param Data Point to return Data-Buffer.\r
180\r
181 @retval EFI_SUCCESS The function completed successfully.\r
182 @retval EFI_NOT_FOUND The variable was not found.\r
183 @retval EFI_BUFFER_TOO_SMALL The DataSize is too small for the result. DataSize has\r
184 been updated with the size needed to complete the request.\r
185 @retval EFI_INVALID_PARAMETER VariableName is NULL.\r
186 @retval EFI_INVALID_PARAMETER VendorGuid is NULL.\r
187 @retval EFI_INVALID_PARAMETER DataSize is NULL.\r
188 @retval EFI_INVALID_PARAMETER The DataSize is not too small and Data is NULL.\r
189 @retval EFI_DEVICE_ERROR The variable could not be retrieved due to a hardware error.\r
190 @retval EFI_SECURITY_VIOLATION The variable could not be retrieved due to an authentication failure.\r
191**/\r
192EFI_STATUS\r
193EFIAPI\r
194EfiGetVariable (\r
195 IN CHAR16 *VariableName,\r
196 IN EFI_GUID *VendorGuid,\r
197 OUT UINT32 *Attributes OPTIONAL,\r
198 IN OUT UINTN *DataSize,\r
199 OUT VOID *Data\r
200 );\r
201\r
202/**\r
203 This service is a wrapper for the UEFI Runtime Service GetNextVariableName().\r
204\r
205 GetNextVariableName() is called multiple times to retrieve the VariableName and VendorGuid of\r
206 all variables currently available in the system. On each call to GetNextVariableName() the\r
207 previous results are passed into the interface, and on output the interface returns the next\r
208 variable name data. When the entire variable list has been returned, the error EFI_NOT_FOUND\r
209 is returned.\r
210\r
211 @param VariableNameSize As input, point to maximum size of variable name.\r
212 As output, point to actual size of variable name.\r
213 @param VariableName As input, supplies the last VariableName that was returned by\r
214 GetNextVariableName().\r
215 As output, returns the name of variable. The name\r
216 string is Null-Terminated Unicode string.\r
217 @param VendorGuid As input, supplies the last VendorGuid that was returned by\r
218 GetNextVriableName().\r
219 As output, returns the VendorGuid of the current variable.\r
220\r
221 @retval EFI_SUCCESS The function completed successfully.\r
222 @retval EFI_NOT_FOUND The next variable was not found.\r
223 @retval EFI_BUFFER_TOO_SMALL The VariableNameSize is too small for the result.\r
224 VariableNameSize has been updated with the size needed\r
225 to complete the request.\r
226 @retval EFI_INVALID_PARAMETER VariableNameSize is NULL.\r
227 @retval EFI_INVALID_PARAMETER VariableName is NULL.\r
228 @retval EFI_INVALID_PARAMETER VendorGuid is NULL.\r
229 @retval EFI_DEVICE_ERROR The variable name could not be retrieved due to a hardware error.\r
230\r
231**/\r
232EFI_STATUS\r
233EFIAPI\r
234EfiGetNextVariableName (\r
235 IN OUT UINTN *VariableNameSize,\r
236 IN OUT CHAR16 *VariableName,\r
237 IN OUT EFI_GUID *VendorGuid\r
238 );\r
239\r
240/**\r
241 This service is a wrapper for the UEFI Runtime Service GetNextVariableName()\r
242\r
243 Variables are stored by the firmware and may maintain their values across power cycles. Each vendor\r
244 may create and manage its own variables without the risk of name conflicts by using a unique VendorGuid.\r
245\r
246 @param VariableName the name of the vendor's variable, as a\r
247 Null-Terminated Unicode String\r
248 @param VendorGuid Unify identifier for vendor.\r
249 @param Attributes Point to memory location to return the attributes of variable. If the point\r
250 is NULL, the parameter would be ignored.\r
251 @param DataSize The size in bytes of Data-Buffer.\r
252 @param Data Point to the content of the variable.\r
253\r
254 @retval EFI_SUCCESS The firmware has successfully stored the variable and its data as\r
255 defined by the Attributes.\r
256 @retval EFI_INVALID_PARAMETER An invalid combination of attribute bits was supplied, or the\r
257 DataSize exceeds the maximum allowed.\r
258 @retval EFI_INVALID_PARAMETER VariableName is an empty Unicode string.\r
259 @retval EFI_OUT_OF_RESOURCES Not enough storage is available to hold the variable and its data.\r
260 @retval EFI_DEVICE_ERROR The variable could not be saved due to a hardware failure.\r
261 @retval EFI_WRITE_PROTECTED The variable in question is read-only.\r
262 @retval EFI_WRITE_PROTECTED The variable in question cannot be deleted.\r
263 @retval EFI_SECURITY_VIOLATION The variable could not be written due to EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS\r
264 set but the AuthInfo does NOT pass the validation check carried\r
265 out by the firmware.\r
266 @retval EFI_NOT_FOUND The variable trying to be updated or deleted was not found.\r
267\r
268**/\r
269EFI_STATUS\r
270EFIAPI\r
271EfiSetVariable (\r
272 IN CHAR16 *VariableName,\r
273 IN EFI_GUID *VendorGuid,\r
274 IN UINT32 Attributes,\r
275 IN UINTN DataSize,\r
276 IN VOID *Data\r
277 );\r
278\r
279/**\r
280 This service is a wrapper for the UEFI Runtime Service GetNextHighMonotonicCount().\r
281\r
282 The platform's monotonic counter is comprised of two 32-bit quantities: the high 32 bits and\r
283 the low 32 bits. During boot service time the low 32-bit value is volatile: it is reset to zero\r
284 on every system reset and is increased by 1 on every call to GetNextMonotonicCount(). The high\r
285 32-bit value is nonvolatile and is increased by 1 whenever the system resets or whenever the low\r
286 32-bit count (returned by GetNextMonoticCount()) overflows.\r
287\r
288 @param HighCount Pointer to returned value.\r
289\r
290 @retval EFI_SUCCESS The next high monotonic count was returned.\r
291 @retval EFI_DEVICE_ERROR The device is not functioning properly.\r
292 @retval EFI_INVALID_PARAMETER HighCount is NULL.\r
293\r
294**/\r
295EFI_STATUS\r
296EFIAPI\r
297EfiGetNextHighMonotonicCount (\r
298 OUT UINT32 *HighCount\r
299 );\r
300\r
301/**\r
302 This service is a wrapper for the UEFI Runtime Service ResetSystem().\r
303\r
304 The ResetSystem()function resets the entire platform, including all processors and devices,and reboots the system.\r
305 Calling this interface with ResetType of EfiResetCold causes a system-wide reset. This sets all circuitry within\r
306 the system to its initial state. This type of reset is asynchronous to system operation and operates without regard\r
307 to cycle boundaries. EfiResetCold is tantamount to a system power cycle.\r
308 Calling this interface with ResetType of EfiResetWarm causes a system-wide initialization. The processors are set to\r
309 their initial state, and pending cycles are not corrupted. If the system does not support this reset type, then an\r
310 EfiResetCold must be performed.\r
311 Calling this interface with ResetType of EfiResetShutdown causes the system to enter a power state equivalent to the\r
312 ACPI G2/S5 or G3 states. If the system does not support this reset type, then when the system is rebooted, it should\r
313 exhibit the EfiResetCold attributes.\r
314 The platform may optionally log the parameters from any non-normal reset that occurs.\r
315 The ResetSystem() function does not return.\r
316\r
317 @param ResetType The type of reset to perform.\r
318 @param ResetStatus The status code for the reset. If the system reset is part of a normal operation, the status code\r
319 would be EFI_SUCCESS. If the system reset is due to some type of failure the most appropriate EFI\r
320 Status code would be used.\r
321 @param DataSizeThe size, in bytes, of ResetData.\r
322 @param ResetData For a ResetType of EfiResetCold, EfiResetWarm, or EfiResetShutdown the data buffer starts with a\r
323 Null-terminated Unicode string, optionally followed by additional binary data. The string is a\r
324 description that the caller may use to further indicate the reason for the system reset. ResetData\r
325 is only valid if ResetStatus is something other then EFI_SUCCESS. This pointer must be a physical\r
326 address. For a ResetType of EfiResetPlatformSpecific the data buffer also starts with a Null-terminated\r
327 string that is followed by an EFI_GUID that describes the specific type of reset to perform.\r
328**/\r
329VOID\r
330EFIAPI\r
331EfiResetSystem (\r
332 IN EFI_RESET_TYPE ResetType,\r
333 IN EFI_STATUS ResetStatus,\r
334 IN UINTN DataSize,\r
335 IN VOID *ResetData OPTIONAL\r
336 );\r
337\r
338/**\r
339 This service is a wrapper for the UEFI Runtime Service ConvertPointer().\r
340\r
341 The ConvertPointer() function is used by an EFI component during the SetVirtualAddressMap() operation.\r
342 ConvertPointer()must be called using physical address pointers during the execution of SetVirtualAddressMap().\r
343\r
344 @param DebugDisposition Supplies type information for the pointer being converted.\r
345 @param Address The pointer to a pointer that is to be fixed to be the\r
346 value needed for the new virtual address mapping being\r
347 applied.\r
348\r
349 @retval EFI_SUCCESS The pointer pointed to by Address was modified.\r
350 @retval EFI_NOT_FOUND The pointer pointed to by Address was not found to be part of\r
351 the current memory map. This is normally fatal.\r
352 @retval EFI_INVALID_PARAMETER Address is NULL.\r
353 @retval EFI_INVALID_PARAMETER *Address is NULL and DebugDispositio\r
354\r
355**/\r
356EFI_STATUS\r
357EFIAPI\r
358EfiConvertPointer (\r
359 IN UINTN DebugDisposition,\r
360 IN OUT VOID **Address\r
361 );\r
362\r
363/**\r
364 Determines the new virtual address that is to be used on subsequent memory accesses.\r
365\r
366 For IA32, x64, and EBC, this service is a wrapper for the UEFI Runtime Service\r
367 ConvertPointer(). See the UEFI Specification for details.\r
368 For IPF, this function interprets Address as a pointer to an EFI_PLABEL structure\r
369 and both the EntryPoint and GP fields of an EFI_PLABEL are converted from physical\r
370 to virtiual addressing. Since IPF allows the GP to point to an address outside\r
371 a PE/COFF image, the physical to virtual offset for the EntryPoint field is used\r
372 to adjust the GP field. The UEFI Runtime Service ConvertPointer() is used to convert\r
373 EntryPoint and the status code for this conversion is always returned. If the convertion\r
374 of EntryPoint fails, then neither EntryPoint nor GP are modified. See the UEFI\r
375 Specification for details on the UEFI Runtime Service ConvertPointer().\r
376\r
377 @param DebugDisposition Supplies type information for the pointer being converted.\r
378 @param Address The pointer to a pointer that is to be fixed to be the\r
379 value needed for the new virtual address mapping being\r
380 applied.\r
381\r
382 @return EFI_STATUS value from EfiConvertPointer().\r
383\r
384**/\r
385EFI_STATUS\r
386EFIAPI\r
387EfiConvertFunctionPointer (\r
388 IN UINTN DebugDisposition,\r
389 IN OUT VOID **Address\r
390 );\r
391\r
392/**\r
393 This service is a wrapper for the UEFI Runtime Service SetVirtualAddressMap().\r
394\r
395 The SetVirtualAddressMap() function is used by the OS loader. The function can only be called\r
396 at runtime, and is called by the owner of the system's memory map. I.e., the component which\r
397 called ExitBootServices(). All events of type EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE must be signaled\r
398 before SetVirtualAddressMap() returns.\r
399\r
400 @param MemoryMapSize The size in bytes of VirtualMap.\r
401 @param DescriptorSize The size in bytes of an entry in the VirtualMap.\r
402 @param DescriptorVersion The version of the structure entries in VirtualMap.\r
403 @param VirtualMap An array of memory descriptors which contain new virtual\r
404 address mapping information for all runtime ranges. Type\r
405 EFI_MEMORY_DESCRIPTOR is defined in the\r
406 GetMemoryMap() function description.\r
407\r
408 @retval EFI_SUCCESS The virtual address map has been applied.\r
409 @retval EFI_UNSUPPORTED EFI firmware is not at runtime, or the EFI firmware is already in\r
410 virtual address mapped mode.\r
411 @retval EFI_INVALID_PARAMETER DescriptorSize or DescriptorVersion is\r
412 invalid.\r
413 @retval EFI_NO_MAPPING A virtual address was not supplied for a range in the memory\r
414 map that requires a mapping.\r
415 @retval EFI_NOT_FOUND A virtual address was supplied for an address that is not found\r
416 in the memory map.\r
417**/\r
418EFI_STATUS\r
419EFIAPI\r
420EfiSetVirtualAddressMap (\r
421 IN UINTN MemoryMapSize,\r
422 IN UINTN DescriptorSize,\r
423 IN UINT32 DescriptorVersion,\r
424 IN CONST EFI_MEMORY_DESCRIPTOR *VirtualMap\r
425 );\r
426\r
427/**\r
428 Convert the standard Lib double linked list to a virtual mapping.\r
429\r
430 This service uses EfiConvertPointer() to walk a double linked list and convert all the link\r
431 pointers to their virtual mappings. This function is only guaranteed to work during the\r
432 EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event and calling it at other times has undefined results.\r
433\r
434 @param DebugDisposition Supplies type information for the pointer being converted.\r
435 @param ListHead Head of linked list to convert.\r
436\r
437 @retval EFI_SUCCESS Successfully executed the function.\r
438 @retval !EFI_SUCCESS Failed to execute the function.\r
439\r
440**/\r
441EFI_STATUS\r
442EFIAPI\r
443EfiConvertList (\r
444 IN UINTN DebugDisposition,\r
445 IN OUT LIST_ENTRY *ListHead\r
446 );\r
447\r
448/**\r
449 This service is a wrapper for the UEFI Runtime Service UpdateCapsule().\r
450\r
451 Passes capsules to the firmware with both virtual and physical mapping. Depending on the intended\r
452 consumption, the firmware may process the capsule immediately. If the payload should persist across a\r
453 system reset, the reset value returned from EFI_QueryCapsuleCapabilities must be passed into ResetSystem()\r
454 and will cause the capsule to be processed by the firmware as part of the reset process.\r
455\r
456 @param CapsuleHeaderArray Virtual pointer to an array of virtual pointers to the capsules\r
457 being passed into update capsule. Each capsules is assumed to\r
458 stored in contiguous virtual memory. The capsules in the\r
459 CapsuleHeaderArray must be the same capsules as the\r
460 ScatterGatherList. The CapsuleHeaderArray must\r
461 have the capsules in the same order as the ScatterGatherList.\r
462 @param CapsuleCount Number of pointers to EFI_CAPSULE_HEADER in\r
463 CaspuleHeaderArray.\r
464 @param ScatterGatherList Physical pointer to a set of\r
465 EFI_CAPSULE_BLOCK_DESCRIPTOR that describes the\r
466 location in physical memory of a set of capsules. See Related\r
467 Definitions for an explanation of how more than one capsule is\r
468 passed via this interface. The capsules in the\r
469 ScatterGatherList must be in the same order as the\r
470 CapsuleHeaderArray. This parameter is only referenced if\r
471 the capsules are defined to persist across system reset.\r
472\r
473 @retval EFI_SUCCESS A valid capsule was passed. If CAPSULE_FLAGS_PERSIT_ACROSS_RESET is not set,\r
474 the capsule has been successfully processed by the firmware.\r
475 @retval EFI_INVALID_PARAMETER CapsuleSize is NULL, or an incompatible set of flags were\r
476 set in the capsule header.\r
477 @retval EFI_INVALID_PARAMETER CapsuleCount is 0\r
478 @retval EFI_DEVICE_ERROR The capsule update was started, but failed due to a device error.\r
479 @retval EFI_UNSUPPORTED The capsule type is not supported on this platform.\r
480 @retval EFI_OUT_OF_RESOURCES There were insufficient resources to process the capsule.\r
481\r
482**/\r
483EFI_STATUS\r
484EFIAPI\r
485EfiUpdateCapsule (\r
486 IN EFI_CAPSULE_HEADER **CapsuleHeaderArray,\r
487 IN UINTN CapsuleCount,\r
488 IN EFI_PHYSICAL_ADDRESS ScatterGatherList OPTIONAL\r
489 );\r
490\r
491/**\r
492 This service is a wrapper for the UEFI Runtime Service QueryCapsuleCapabilities().\r
493\r
494 The QueryCapsuleCapabilities() function allows a caller to test to see if a capsule or\r
495 capsules can be updated via UpdateCapsule(). The Flags values in the capsule header and\r
496 size of the entire capsule is checked.\r
497 If the caller needs to query for generic capsule capability a fake EFI_CAPSULE_HEADER can be\r
498 constructed where CapsuleImageSize is equal to HeaderSize that is equal to sizeof\r
499 (EFI_CAPSULE_HEADER). To determine reset requirements,\r
500 CAPSULE_FLAGS_PERSIST_ACROSS_RESET should be set in the Flags field of the\r
501 EFI_CAPSULE_HEADER.\r
502 The firmware must support any capsule that has the\r
503 CAPSULE_FLAGS_PERSIST_ACROSS_RESET flag set in EFI_CAPSULE_HEADER. The\r
504 firmware sets the policy for what capsules are supported that do not have the\r
505 CAPSULE_FLAGS_PERSIST_ACROSS_RESET flag set.\r
506\r
507 @param CapsuleHeaderArray Virtual pointer to an array of virtual pointers to the capsules\r
508 being passed into update capsule. The capsules are assumed to\r
509 stored in contiguous virtual memory.\r
510 @param CapsuleCount Number of pointers to EFI_CAPSULE_HEADER in\r
511 CaspuleHeaderArray.\r
512 @param MaximumCapsuleSize On output the maximum size that UpdateCapsule() can\r
513 support as an argument to UpdateCapsule() via\r
514 CapsuleHeaderArray and ScatterGatherList.\r
515 Undefined on input.\r
516 @param ResetType Returns the type of reset required for the capsule update.\r
517\r
518 @retval EFI_SUCCESS A valid answer was returned.\r
519 @retval EFI_INVALID_PARAMETER MaximumCapsuleSize is NULL.\r
520 @retval EFI_UNSUPPORTED The capsule type is not supported on this platform, and\r
521 MaximumCapsuleSize and ResetType are undefined.\r
522 @retval EFI_OUT_OF_RESOURCES There were insufficient resources to process the query request.\r
523\r
524**/\r
525EFI_STATUS\r
526EFIAPI\r
527EfiQueryCapsuleCapabilities (\r
528 IN EFI_CAPSULE_HEADER **CapsuleHeaderArray,\r
529 IN UINTN CapsuleCount,\r
530 OUT UINT64 *MaximumCapsuleSize,\r
531 OUT EFI_RESET_TYPE *ResetType\r
532 );\r
533\r
534/**\r
535 This service is a wrapper for the UEFI Runtime Service QueryVariableInfo().\r
536\r
537 The QueryVariableInfo() function allows a caller to obtain the information about the\r
538 maximum size of the storage space available for the EFI variables, the remaining size of the storage\r
539 space available for the EFI variables and the maximum size of each individual EFI variable,\r
540 associated with the attributes specified.\r
541 The returned MaximumVariableStorageSize, RemainingVariableStorageSize,\r
542 MaximumVariableSize information may change immediately after the call based on other\r
543 runtime activities including asynchronous error events. Also, these values associated with different\r
544 attributes are not additive in nature.\r
545\r
546 @param Attributes Attributes bitmask to specify the type of variables on\r
547 which to return information. Refer to the\r
548 GetVariable() function description.\r
549 @param MaximumVariableStorageSize\r
550 On output the maximum size of the storage space\r
551 available for the EFI variables associated with the\r
552 attributes specified.\r
553 @param RemainingVariableStorageSize\r
554 Returns the remaining size of the storage space\r
555 available for the EFI variables associated with the\r
556 attributes specified.\r
557 @param MaximumVariableSize Returns the maximum size of the individual EFI\r
558 variables associated with the attributes specified.\r
559\r
560 @retval EFI_SUCCESS A valid answer was returned.\r
561 @retval EFI_INVALID_PARAMETER An invalid combination of attribute bits was supplied.\r
562 @retval EFI_UNSUPPORTED EFI_UNSUPPORTED The attribute is not supported on this platform, and the\r
563 MaximumVariableStorageSize,\r
564 RemainingVariableStorageSize, MaximumVariableSize\r
565 are undefined.\r
566\r
567**/\r
568EFI_STATUS\r
569EFIAPI\r
570EfiQueryVariableInfo (\r
571 IN UINT32 Attributes,\r
572 OUT UINT64 *MaximumVariableStorageSize,\r
573 OUT UINT64 *RemainingVariableStorageSize,\r
574 OUT UINT64 *MaximumVariableSize\r
575 );\r
576\r
577#endif\r