]> git.proxmox.com Git - mirror_edk2.git/blame_incremental - MdePkg/Include/Uefi/UefiSpec.h
Fix coding style issues for Tcp4Dxe driver.
[mirror_edk2.git] / MdePkg / Include / Uefi / UefiSpec.h
... / ...
CommitLineData
1/** @file\r
2 Include file that supports UEFI.\r
3\r
4 This include file must only contain things defined in the UEFI 2.1 specification.\r
5 If a code construct is defined in the UEFI 2.1 specification it must be included\r
6 by this include file.\r
7\r
8 Copyright (c) 2006 - 2008, Intel Corporation\r
9 All rights reserved. This program and the accompanying materials\r
10 are licensed and made available under the terms and conditions of the BSD License\r
11 which accompanies this distribution. The full text of the license may be found at\r
12 http://opensource.org/licenses/bsd-license.php\r
13\r
14 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
15 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
16\r
17**/\r
18\r
19#ifndef __UEFI_SPEC_H__\r
20#define __UEFI_SPEC_H__\r
21\r
22#include <Uefi/UefiMultiPhase.h>\r
23\r
24#include <Protocol/DevicePath.h>\r
25#include <Protocol/SimpleTextIn.h>\r
26#include <Protocol/SimpleTextOut.h>\r
27\r
28///\r
29/// Enumeration of memory allocation.\r
30///\r
31typedef enum {\r
32 AllocateAnyPages,\r
33 AllocateMaxAddress,\r
34 AllocateAddress,\r
35 MaxAllocateType\r
36} EFI_ALLOCATE_TYPE;\r
37\r
38//\r
39// Bit definitions for EFI_TIME.Daylight\r
40//\r
41#define EFI_TIME_ADJUST_DAYLIGHT 0x01\r
42#define EFI_TIME_IN_DAYLIGHT 0x02\r
43\r
44///\r
45/// Value definition for EFI_TIME.TimeZone\r
46///\r
47#define EFI_UNSPECIFIED_TIMEZONE 0x07FF\r
48\r
49//\r
50// Memory cacheability attributes\r
51//\r
52#define EFI_MEMORY_UC 0x0000000000000001ULL\r
53#define EFI_MEMORY_WC 0x0000000000000002ULL\r
54#define EFI_MEMORY_WT 0x0000000000000004ULL\r
55#define EFI_MEMORY_WB 0x0000000000000008ULL\r
56#define EFI_MEMORY_UCE 0x0000000000000010ULL\r
57//\r
58// Physical memory protection attributes\r
59//\r
60#define EFI_MEMORY_WP 0x0000000000001000ULL\r
61#define EFI_MEMORY_RP 0x0000000000002000ULL\r
62#define EFI_MEMORY_XP 0x0000000000004000ULL\r
63//\r
64// Runtime memory attribute\r
65//\r
66#define EFI_MEMORY_RUNTIME 0x8000000000000000ULL\r
67\r
68///\r
69/// Memory descriptor version number\r
70///\r
71#define EFI_MEMORY_DESCRIPTOR_VERSION 1\r
72\r
73///\r
74/// Definition of memory descriptor\r
75///\r
76typedef struct {\r
77 UINT32 Type;\r
78 EFI_PHYSICAL_ADDRESS PhysicalStart;\r
79 EFI_VIRTUAL_ADDRESS VirtualStart;\r
80 UINT64 NumberOfPages;\r
81 UINT64 Attribute;\r
82} EFI_MEMORY_DESCRIPTOR;\r
83\r
84///\r
85/// Build macros to find next EFI_MEMORY_DESCRIPTOR.\r
86///\r
87#define NEXT_MEMORY_DESCRIPTOR(_Ptr, _Size) ((EFI_MEMORY_DESCRIPTOR *) (((UINT8 *) (_Ptr)) + (_Size)))\r
88\r
89///\r
90/// Declare forward referenced data structures\r
91///\r
92typedef struct _EFI_SYSTEM_TABLE EFI_SYSTEM_TABLE;\r
93\r
94/**\r
95 Allocates memory pages from the system.\r
96\r
97 @param Type The type of allocation to perform.\r
98 @param MemoryType The type of memory to allocate.\r
99 @param Pages The number of contiguous 4 KB pages to allocate.\r
100 @param Memory Pointer to a physical address. On input, the way in which the address is\r
101 used depends on the value of Type.\r
102\r
103 @retval EFI_SUCCESS The requested pages were allocated.\r
104 @retval EFI_INVALID_PARAMETER 1) Type is not AllocateAnyPages or\r
105 AllocateMaxAddress or AllocateAddress.\r
106 2) MemoryType is in the range\r
107 EfiMaxMemoryType..0x7FFFFFFF.\r
108 @retval EFI_OUT_OF_RESOURCES The pages could not be allocated.\r
109 @retval EFI_NOT_FOUND The requested pages could not be found.\r
110\r
111**/\r
112typedef\r
113EFI_STATUS\r
114(EFIAPI *EFI_ALLOCATE_PAGES)(\r
115 IN EFI_ALLOCATE_TYPE Type,\r
116 IN EFI_MEMORY_TYPE MemoryType,\r
117 IN UINTN Pages,\r
118 IN OUT EFI_PHYSICAL_ADDRESS *Memory\r
119 );\r
120\r
121/**\r
122 Frees memory pages.\r
123\r
124 @param Memory The base physical address of the pages to be freed.\r
125 @param Pages The number of contiguous 4 KB pages to free.\r
126\r
127 @retval EFI_SUCCESS The requested pages were freed.\r
128 @retval EFI_INVALID_PARAMETER Memory is not a page-aligned address or Pages is invalid.\r
129 @retval EFI_NOT_FOUND The requested memory pages were not allocated with\r
130 AllocatePages().\r
131\r
132**/\r
133typedef\r
134EFI_STATUS\r
135(EFIAPI *EFI_FREE_PAGES)(\r
136 IN EFI_PHYSICAL_ADDRESS Memory,\r
137 IN UINTN Pages\r
138 );\r
139\r
140/**\r
141 Returns the current memory map.\r
142\r
143 @param MemoryMapSize A pointer to the size, in bytes, of the MemoryMap buffer.\r
144 On input, this is the size of the buffer allocated by the caller.\r
145 On output, it is the size of the buffer returned by the firmware if\r
146 the buffer was large enough, or the size of the buffer needed to contain\r
147 the map if the buffer was too small.\r
148 @param MemoryMap A pointer to the buffer in which firmware places the current memory\r
149 map.\r
150 @param MapKey A pointer to the location in which firmware returns the key for the\r
151 current memory map.\r
152 @param DescriptorSize A pointer to the location in which firmware returns the size, in bytes, of\r
153 an individual EFI_MEMORY_DESCRIPTOR.\r
154 @param DescriptorVersion A pointer to the location in which firmware returns the version number\r
155 associated with the EFI_MEMORY_DESCRIPTOR.\r
156\r
157 @retval EFI_SUCCESS The memory map was returned in the MemoryMap buffer.\r
158 @retval EFI_BUFFER_TOO_SMALL The MemoryMap buffer was too small. The current buffer size\r
159 needed to hold the memory map is returned in MemoryMapSize.\r
160 @retval EFI_INVALID_PARAMETER 1) MemoryMapSize is NULL.\r
161 2) The MemoryMap buffer is not too small and MemoryMap is\r
162 NULL.\r
163\r
164**/\r
165typedef\r
166EFI_STATUS\r
167(EFIAPI *EFI_GET_MEMORY_MAP)(\r
168 IN OUT UINTN *MemoryMapSize,\r
169 IN OUT EFI_MEMORY_DESCRIPTOR *MemoryMap,\r
170 OUT UINTN *MapKey,\r
171 OUT UINTN *DescriptorSize,\r
172 OUT UINT32 *DescriptorVersion\r
173 );\r
174\r
175/**\r
176 Allocates pool memory.\r
177\r
178 @param PoolType The type of pool to allocate.\r
179 @param Size The number of bytes to allocate from the pool.\r
180 @param Buffer A pointer to a pointer to the allocated buffer if the call succeeds;\r
181 undefined otherwise.\r
182\r
183 @retval EFI_SUCCESS The requested number of bytes was allocated.\r
184 @retval EFI_OUT_OF_RESOURCES The pool requested could not be allocated.\r
185 @retval EFI_INVALID_PARAMETER PoolType was invalid.\r
186\r
187**/\r
188typedef\r
189EFI_STATUS\r
190(EFIAPI *EFI_ALLOCATE_POOL)(\r
191 IN EFI_MEMORY_TYPE PoolType,\r
192 IN UINTN Size,\r
193 OUT VOID **Buffer\r
194 );\r
195\r
196/**\r
197 Returns pool memory to the system.\r
198\r
199 @param Buffer Pointer to the buffer to free.\r
200\r
201 @retval EFI_SUCCESS The memory was returned to the system.\r
202 @retval EFI_INVALID_PARAMETER Buffer was invalid.\r
203\r
204**/\r
205typedef\r
206EFI_STATUS\r
207(EFIAPI *EFI_FREE_POOL)(\r
208 IN VOID *Buffer\r
209 );\r
210\r
211/**\r
212 Changes the runtime addressing mode of EFI firmware from physical to virtual.\r
213\r
214 @param MemoryMapSize The size in bytes of VirtualMap.\r
215 @param DescriptorSize The size in bytes of an entry in the VirtualMap.\r
216 @param DescriptorVersion The version of the structure entries in VirtualMap.\r
217 @param VirtualMap An array of memory descriptors which contain new virtual\r
218 address mapping information for all runtime ranges.\r
219\r
220 @retval EFI_SUCCESS The virtual address map has been applied.\r
221 @retval EFI_UNSUPPORTED EFI firmware is not at runtime, or the EFI firmware is already in\r
222 virtual address mapped mode.\r
223 @retval EFI_INVALID_PARAMETER DescriptorSize or DescriptorVersion is invalid.\r
224 @retval EFI_NO_MAPPING A virtual address was not supplied for a range in the memory\r
225 map that requires a mapping.\r
226 @retval EFI_NOT_FOUND A virtual address was supplied for an address that is not found\r
227 in the memory map.\r
228\r
229**/\r
230typedef\r
231EFI_STATUS\r
232(EFIAPI *EFI_SET_VIRTUAL_ADDRESS_MAP)(\r
233 IN UINTN MemoryMapSize,\r
234 IN UINTN DescriptorSize,\r
235 IN UINT32 DescriptorVersion,\r
236 IN EFI_MEMORY_DESCRIPTOR *VirtualMap\r
237 );\r
238\r
239/**\r
240 Connects one or more drivers to a controller.\r
241\r
242 @param ControllerHandle The handle of the controller to which driver(s) are to be connected.\r
243 @param DriverImageHandle A pointer to an ordered list handles that support the\r
244 EFI_DRIVER_BINDING_PROTOCOL.\r
245 @param RemainingDevicePath A pointer to the device path that specifies a child of the\r
246 controller specified by ControllerHandle.\r
247 @param Recursive If TRUE, then ConnectController() is called recursively\r
248 until the entire tree of controllers below the controller specified\r
249 by ControllerHandle have been created. If FALSE, then\r
250 the tree of controllers is only expanded one level.\r
251\r
252 @retval EFI_SUCCESS 1) One or more drivers were connected to ControllerHandle.\r
253 2) No drivers were connected to ControllerHandle, but\r
254 RemainingDevicePath is not NULL, and it is an End Device\r
255 Path Node.\r
256 @retval EFI_INVALID_PARAMETER ControllerHandle is not a valid EFI_HANDLE.\r
257 @retval EFI_NOT_FOUND 1) There are no EFI_DRIVER_BINDING_PROTOCOL instances\r
258 present in the system.\r
259 2) No drivers were connected to ControllerHandle.\r
260\r
261**/\r
262typedef\r
263EFI_STATUS\r
264(EFIAPI *EFI_CONNECT_CONTROLLER)(\r
265 IN EFI_HANDLE ControllerHandle,\r
266 IN EFI_HANDLE *DriverImageHandle, OPTIONAL\r
267 IN EFI_DEVICE_PATH_PROTOCOL *RemainingDevicePath, OPTIONAL\r
268 IN BOOLEAN Recursive\r
269 );\r
270\r
271/**\r
272 Disconnects one or more drivers from a controller.\r
273\r
274 @param ControllerHandle The handle of the controller from which driver(s) are to be disconnected.\r
275 @param DriverImageHandle The driver to disconnect from ControllerHandle.\r
276 If DriverImageHandle is NULL, then all the drivers currently managing\r
277 ControllerHandle are disconnected from ControllerHandle.\r
278 @param ChildHandle The handle of the child to destroy.\r
279 If ChildHandle is NULL, then all the children of ControllerHandle are\r
280 destroyed before the drivers are disconnected from ControllerHandle.\r
281\r
282 @retval EFI_SUCCESS 1) One or more drivers were disconnected from the controller.\r
283 2) On entry, no drivers are managing ControllerHandle.\r
284 3) DriverImageHandle is not NULL, and on entry\r
285 DriverImageHandle is not managing ControllerHandle.\r
286 @retval EFI_INVALID_PARAMETER 1) ControllerHandle is not a valid EFI_HANDLE.\r
287 2) DriverImageHandle is not NULL, and it is not a valid EFI_HANDLE.\r
288 3) ChildHandle is not NULL, and it is not a valid EFI_HANDLE.\r
289 4) DriverImageHandle does not support the EFI_DRIVER_BINDING_PROTOCOL.\r
290 @retval EFI_OUT_OF_RESOURCES There are not enough resources available to disconnect any drivers from\r
291 ControllerHandle.\r
292 @retval EFI_DEVICE_ERROR The controller could not be disconnected because of a device error.\r
293\r
294**/\r
295typedef\r
296EFI_STATUS\r
297(EFIAPI *EFI_DISCONNECT_CONTROLLER)(\r
298 IN EFI_HANDLE ControllerHandle,\r
299 IN EFI_HANDLE DriverImageHandle, OPTIONAL\r
300 IN EFI_HANDLE ChildHandle OPTIONAL\r
301 );\r
302\r
303\r
304\r
305//\r
306// ConvertPointer DebugDisposition type.\r
307//\r
308#define EFI_OPTIONAL_PTR 0x00000001\r
309#define EFI_OPTIONAL_POINTER EFI_OPTIONAL_PTR\r
310\r
311/**\r
312 Determines the new virtual address that is to be used on subsequent memory accesses.\r
313\r
314 @param DebugDisposition Supplies type information for the pointer being converted.\r
315 @param Address A pointer to a pointer that is to be fixed to be the value needed\r
316 for the new virtual address mappings being applied.\r
317\r
318 @retval EFI_SUCCESS The pointer pointed to by Address was modified.\r
319 @retval EFI_INVALID_PARAMETER 1) Address is NULL.\r
320 2) *Address is NULL and DebugDisposition does\r
321 not have the EFI_OPTIONAL_PTR bit set.\r
322 @retval EFI_NOT_FOUND The pointer pointed to by Address was not found to be part\r
323 of the current memory map. This is normally fatal.\r
324\r
325**/\r
326typedef\r
327EFI_STATUS\r
328(EFIAPI *EFI_CONVERT_POINTER)(\r
329 IN UINTN DebugDisposition,\r
330 IN OUT VOID **Address\r
331 );\r
332\r
333\r
334//\r
335// These types can be ORed together as needed - for example,\r
336// EVT_TIMER might be Ored with EVT_NOTIFY_WAIT or\r
337// EVT_NOTIFY_SIGNAL.\r
338//\r
339#define EVT_TIMER 0x80000000\r
340#define EVT_RUNTIME 0x40000000\r
341#define EVT_NOTIFY_WAIT 0x00000100\r
342#define EVT_NOTIFY_SIGNAL 0x00000200\r
343\r
344#define EVT_SIGNAL_EXIT_BOOT_SERVICES 0x00000201\r
345#define EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE 0x60000202\r
346\r
347//\r
348// The event's NotifyContext pointer points to a runtime memory\r
349// address.\r
350// The event is deprecated in UEFI2.0 and later specifications.\r
351//\r
352#define EVT_RUNTIME_CONTEXT 0x20000000\r
353\r
354\r
355/**\r
356 Invoke a notification event\r
357\r
358 @param Event Event whose notification function is being invoked.\r
359 @param Context Pointer to the notification function's context,\r
360 which is implementation-dependent.\r
361\r
362**/\r
363typedef\r
364VOID\r
365(EFIAPI *EFI_EVENT_NOTIFY)(\r
366 IN EFI_EVENT Event,\r
367 IN VOID *Context\r
368 );\r
369\r
370/**\r
371 Creates an event.\r
372\r
373 @param Type The type of event to create and its mode and attributes.\r
374 @param NotifyTpl The task priority level of event notifications, if needed.\r
375 @param NotifyFunction Pointer to the event's notification function, if any.\r
376 @param NotifyContext Pointer to the notification function's context; corresponds to parameter\r
377 Context in the notification function.\r
378 @param Event Pointer to the newly created event if the call succeeds; undefined\r
379 otherwise.\r
380\r
381 @retval EFI_SUCCESS The event structure was created.\r
382 @retval EFI_INVALID_PARAMETER One or more parameters are invalid.\r
383 @retval EFI_OUT_OF_RESOURCES The event could not be allocated.\r
384\r
385**/\r
386typedef\r
387EFI_STATUS\r
388(EFIAPI *EFI_CREATE_EVENT)(\r
389 IN UINT32 Type,\r
390 IN EFI_TPL NotifyTpl,\r
391 IN EFI_EVENT_NOTIFY NotifyFunction,\r
392 IN VOID *NotifyContext,\r
393 OUT EFI_EVENT *Event\r
394 );\r
395\r
396/**\r
397 Creates an event in a group.\r
398\r
399 @param Type The type of event to create and its mode and attributes.\r
400 @param NotifyTpl The task priority level of event notifications,if needed.\r
401 @param NotifyFunction Pointer to the event's notification function, if any.\r
402 @param NotifyContext Pointer to the notification function's context; corresponds to parameter\r
403 Context in the notification function.\r
404 @param EventGroup Pointer to the unique identifier of the group to which this event belongs.\r
405 If this is NULL, then the function behaves as if the parameters were passed\r
406 to CreateEvent.\r
407 @param Event Pointer to the newly created event if the call succeeds; undefined\r
408 otherwise.\r
409\r
410 @retval EFI_SUCCESS The event structure was created.\r
411 @retval EFI_INVALID_PARAMETER One or more parameters are invalid.\r
412 @retval EFI_OUT_OF_RESOURCES The event could not be allocated.\r
413\r
414**/\r
415typedef\r
416EFI_STATUS\r
417(EFIAPI *EFI_CREATE_EVENT_EX)(\r
418 IN UINT32 Type,\r
419 IN EFI_TPL NotifyTpl,\r
420 IN EFI_EVENT_NOTIFY NotifyFunction OPTIONAL,\r
421 IN CONST VOID *NotifyContext OPTIONAL,\r
422 IN CONST EFI_GUID *EventGroup OPTIONAL,\r
423 OUT EFI_EVENT *Event\r
424 );\r
425\r
426///\r
427/// Timer delay types\r
428///\r
429typedef enum {\r
430 TimerCancel,\r
431 TimerPeriodic,\r
432 TimerRelative\r
433} EFI_TIMER_DELAY;\r
434\r
435/**\r
436 Sets the type of timer and the trigger time for a timer event.\r
437\r
438 @param Event The timer event that is to be signaled at the specified time.\r
439 @param Type The type of time that is specified in TriggerTime.\r
440 @param TriggerTime The number of 100ns units until the timer expires.\r
441 A TriggerTime of 0 is legal.\r
442 If Type is TimerRelative and TriggerTime is 0, then the timer\r
443 event will be signaled on the next timer tick.\r
444 If Type is TimerPeriodic and TriggerTime is 0, then the timer\r
445 event will be signaled on every timer tick.\r
446\r
447 @retval EFI_SUCCESS The event has been set to be signaled at the requested time.\r
448 @retval EFI_INVALID_PARAMETER Event or Type is not valid.\r
449\r
450**/\r
451typedef\r
452EFI_STATUS\r
453(EFIAPI *EFI_SET_TIMER)(\r
454 IN EFI_EVENT Event,\r
455 IN EFI_TIMER_DELAY Type,\r
456 IN UINT64 TriggerTime\r
457 );\r
458\r
459/**\r
460 Signals an event.\r
461\r
462 @param Event The event to signal.\r
463\r
464 @retval EFI_SUCCESS The event has been signaled.\r
465\r
466**/\r
467typedef\r
468EFI_STATUS\r
469(EFIAPI *EFI_SIGNAL_EVENT)(\r
470 IN EFI_EVENT Event\r
471 );\r
472\r
473/**\r
474 Stops execution until an event is signaled.\r
475\r
476 @param NumberOfEvents The number of events in the Event array.\r
477 @param Event An array of EFI_EVENT.\r
478 @param Index Pointer to the index of the event which satisfied the wait condition.\r
479\r
480 @retval EFI_SUCCESS The event indicated by Index was signaled.\r
481 @retval EFI_INVALID_PARAMETER 1) NumberOfEvents is 0.\r
482 2) The event indicated by Index is of type\r
483 EVT_NOTIFY_SIGNAL.\r
484 @retval EFI_UNSUPPORTED The current TPL is not TPL_APPLICATION.\r
485\r
486**/\r
487typedef\r
488EFI_STATUS\r
489(EFIAPI *EFI_WAIT_FOR_EVENT)(\r
490 IN UINTN NumberOfEvents,\r
491 IN EFI_EVENT *Event,\r
492 OUT UINTN *Index\r
493 );\r
494\r
495/**\r
496 Closes an event.\r
497\r
498 @param Event The event to close.\r
499\r
500 @retval EFI_SUCCESS The event has been closed.\r
501\r
502**/\r
503typedef\r
504EFI_STATUS\r
505(EFIAPI *EFI_CLOSE_EVENT)(\r
506 IN EFI_EVENT Event\r
507 );\r
508\r
509/**\r
510 Checks whether an event is in the signaled state.\r
511\r
512 @param Event The event to check.\r
513\r
514 @retval EFI_SUCCESS The event is in the signaled state.\r
515 @retval EFI_NOT_READY The event is not in the signaled state.\r
516 @retval EFI_INVALID_PARAMETER Event is of type EVT_NOTIFY_SIGNAL.\r
517\r
518**/\r
519typedef\r
520EFI_STATUS\r
521(EFIAPI *EFI_CHECK_EVENT)(\r
522 IN EFI_EVENT Event\r
523 );\r
524\r
525\r
526//\r
527// Task priority level\r
528//\r
529#define TPL_APPLICATION 4\r
530#define TPL_CALLBACK 8\r
531#define TPL_NOTIFY 16\r
532#define TPL_HIGH_LEVEL 31\r
533\r
534\r
535/**\r
536 Raises a task's priority level and returns its previous level.\r
537\r
538 @param NewTpl The new task priority level.\r
539\r
540 @return Previous task priority level\r
541\r
542**/\r
543typedef\r
544EFI_TPL\r
545(EFIAPI *EFI_RAISE_TPL)(\r
546 IN EFI_TPL NewTpl\r
547 );\r
548\r
549/**\r
550 Restores a task's priority level to its previous value.\r
551\r
552 @param OldTpl The previous task priority level to restore.\r
553\r
554**/\r
555typedef\r
556VOID\r
557(EFIAPI *EFI_RESTORE_TPL)(\r
558 IN EFI_TPL OldTpl\r
559 );\r
560\r
561/**\r
562 Returns the value of a variable.\r
563\r
564 @param VariableName A Null-terminated Unicode string that is the name of the\r
565 vendor's variable.\r
566 @param VendorGuid A unique identifier for the vendor.\r
567 @param Attributes If not NULL, a pointer to the memory location to return the\r
568 attributes bitmask for the variable.\r
569 @param DataSize On input, the size in bytes of the return Data buffer.\r
570 On output the size of data returned in Data.\r
571 @param Data The buffer to return the contents of the variable.\r
572\r
573 @retval EFI_SUCCESS The function completed successfully.\r
574 @retval EFI_NOT_FOUND The variable was not found.\r
575 @retval EFI_BUFFER_TOO_SMALL The DataSize is too small for the result.\r
576 @retval EFI_INVALID_PARAMETER VariableName is NULL.\r
577 @retval EFI_INVALID_PARAMETER VendorGuid is NULL.\r
578 @retval EFI_INVALID_PARAMETER DataSize is NULL.\r
579 @retval EFI_INVALID_PARAMETER The DataSize is not too small and Data is NULL.\r
580 @retval EFI_DEVICE_ERROR The variable could not be retrieved due to a hardware error.\r
581 @retval EFI_SECURITY_VIOLATION The variable could not be retrieved due to an authentication failure.\r
582\r
583**/\r
584typedef\r
585EFI_STATUS\r
586(EFIAPI *EFI_GET_VARIABLE)(\r
587 IN CHAR16 *VariableName,\r
588 IN EFI_GUID *VendorGuid,\r
589 OUT UINT32 *Attributes, OPTIONAL\r
590 IN OUT UINTN *DataSize,\r
591 OUT VOID *Data\r
592 );\r
593\r
594/**\r
595 Enumerates the current variable names.\r
596\r
597 @param VariableNameSize The size of the VariableName buffer.\r
598 @param VariableName On input, supplies the last VariableName that was returned\r
599 by GetNextVariableName(). On output, returns the Nullterminated\r
600 Unicode string of the current variable.\r
601 @param VendorGuid On input, supplies the last VendorGuid that was returned by\r
602 GetNextVariableName(). On output, returns the\r
603 VendorGuid of the current variable.\r
604\r
605 @retval EFI_SUCCESS The function completed successfully.\r
606 @retval EFI_NOT_FOUND The next variable was not found.\r
607 @retval EFI_BUFFER_TOO_SMALL The VariableNameSize is too small for the result.\r
608 @retval EFI_INVALID_PARAMETER VariableNameSize is NULL.\r
609 @retval EFI_INVALID_PARAMETER VariableName is NULL.\r
610 @retval EFI_INVALID_PARAMETER VendorGuid is NULL.\r
611 @retval EFI_DEVICE_ERROR The variable could not be retrieved due to a hardware error.\r
612\r
613**/\r
614typedef\r
615EFI_STATUS\r
616(EFIAPI *EFI_GET_NEXT_VARIABLE_NAME)(\r
617 IN OUT UINTN *VariableNameSize,\r
618 IN OUT CHAR16 *VariableName,\r
619 IN OUT EFI_GUID *VendorGuid\r
620 );\r
621\r
622/**\r
623 Sets the value of a variable.\r
624\r
625 @param VariableName A Null-terminated Unicode string that is the name of the\r
626 vendor's variable.\r
627 @param VendorGuid A unique identifier for the vendor.\r
628 @param Attributes Attributes bitmask to set for the variable.\r
629 @param DataSize The size in bytes of the Data buffer.\r
630 @param Data The contents for the variable.\r
631\r
632 @retval EFI_SUCCESS The firmware has successfully stored the variable and its data as\r
633 defined by the Attributes.\r
634 @retval EFI_INVALID_PARAMETER An invalid combination of attribute bits was supplied, or the\r
635 DataSize exceeds the maximum allowed.\r
636 @retval EFI_INVALID_PARAMETER VariableName is an empty Unicode string.\r
637 @retval EFI_OUT_OF_RESOURCES Not enough storage is available to hold the variable and its data.\r
638 @retval EFI_DEVICE_ERROR The variable could not be retrieved due to a hardware error.\r
639 @retval EFI_WRITE_PROTECTED The variable in question is read-only.\r
640 @retval EFI_WRITE_PROTECTED The variable in question cannot be deleted.\r
641 @retval EFI_SECURITY_VIOLATION The variable could not be retrieved due to an authentication failure.\r
642 @retval EFI_NOT_FOUND The variable trying to be updated or deleted was not found.\r
643\r
644**/\r
645typedef\r
646EFI_STATUS\r
647(EFIAPI *EFI_SET_VARIABLE)(\r
648 IN CHAR16 *VariableName,\r
649 IN EFI_GUID *VendorGuid,\r
650 IN UINT32 Attributes,\r
651 IN UINTN DataSize,\r
652 IN VOID *Data\r
653 );\r
654\r
655\r
656///\r
657/// This provides the capabilities of the\r
658/// real time clock device as exposed through the EFI interfaces.\r
659///\r
660typedef struct {\r
661 UINT32 Resolution;\r
662 UINT32 Accuracy;\r
663 BOOLEAN SetsToZero;\r
664} EFI_TIME_CAPABILITIES;\r
665\r
666/**\r
667 Returns the current time and date information, and the time-keeping capabilities\r
668 of the hardware platform.\r
669\r
670 @param Time A pointer to storage to receive a snapshot of the current time.\r
671 @param Capabilities An optional pointer to a buffer to receive the real time clock\r
672 device's capabilities.\r
673\r
674 @retval EFI_SUCCESS The operation completed successfully.\r
675 @retval EFI_INVALID_PARAMETER Time is NULL.\r
676 @retval EFI_DEVICE_ERROR The time could not be retrieved due to hardware error.\r
677\r
678**/\r
679typedef\r
680EFI_STATUS\r
681(EFIAPI *EFI_GET_TIME)(\r
682 OUT EFI_TIME *Time,\r
683 OUT EFI_TIME_CAPABILITIES *Capabilities OPTIONAL\r
684 );\r
685\r
686/**\r
687 Sets the current local time and date information.\r
688\r
689 @param Time A pointer to the current time.\r
690\r
691 @retval EFI_SUCCESS The operation completed successfully.\r
692 @retval EFI_INVALID_PARAMETER A time field is out of range.\r
693 @retval EFI_DEVICE_ERROR The time could not be set due due to hardware error.\r
694\r
695**/\r
696typedef\r
697EFI_STATUS\r
698(EFIAPI *EFI_SET_TIME)(\r
699 IN EFI_TIME *Time\r
700 );\r
701\r
702/**\r
703 Returns the current wakeup alarm clock setting.\r
704\r
705 @param Enabled Indicates if the alarm is currently enabled or disabled.\r
706 @param Pending Indicates if the alarm signal is pending and requires acknowledgement.\r
707 @param Time The current alarm setting.\r
708\r
709 @retval EFI_SUCCESS The alarm settings were returned.\r
710 @retval EFI_INVALID_PARAMETER Enabled is NULL.\r
711 @retval EFI_INVALID_PARAMETER Pending is NULL.\r
712 @retval EFI_INVALID_PARAMETER Time is NULL.\r
713 @retval EFI_DEVICE_ERROR The wakeup time could not be retrieved due to a hardware error.\r
714 @retval EFI_UNSUPPORTED A wakeup timer is not supported on this platform.\r
715\r
716**/\r
717typedef\r
718EFI_STATUS\r
719(EFIAPI *EFI_GET_WAKEUP_TIME)(\r
720 OUT BOOLEAN *Enabled,\r
721 OUT BOOLEAN *Pending,\r
722 OUT EFI_TIME *Time\r
723 );\r
724\r
725/**\r
726 Sets the system wakeup alarm clock time.\r
727\r
728 @param Enabled Enable or disable the wakeup alarm.\r
729 @param Time If Enable is TRUE, the time to set the wakeup alarm for.\r
730 If Enable is FALSE, then this parameter is optional, and may be NULL.\r
731\r
732 @retval EFI_SUCCESS If Enable is TRUE, then the wakeup alarm was enabled. If\r
733 Enable is FALSE, then the wakeup alarm was disabled.\r
734 @retval EFI_INVALID_PARAMETER A time field is out of range.\r
735 @retval EFI_DEVICE_ERROR The wakeup time could not be set due to a hardware error.\r
736 @retval EFI_UNSUPPORTED A wakeup timer is not supported on this platform.\r
737\r
738**/\r
739typedef\r
740EFI_STATUS\r
741(EFIAPI *EFI_SET_WAKEUP_TIME)(\r
742 IN BOOLEAN Enable,\r
743 IN EFI_TIME *Time OPTIONAL\r
744 );\r
745\r
746/**\r
747 This is the declaration of an EFI image entry point. This entry point is\r
748 the same for UEFI Applications, UEFI OS Loaders, and UEFI Drivers including\r
749 both device drivers and bus drivers.\r
750\r
751 @param ImageHandle The firmware allocated handle for the UEFI image.\r
752 @param SystemTable A pointer to the EFI System Table.\r
753\r
754 @retval EFI_SUCCESS The operation completed successfully.\r
755 @retval EFI_OUT_OF_RESOURCES The request could not be completed due to a lack of resources.\r
756\r
757**/\r
758typedef\r
759EFI_STATUS\r
760(EFIAPI *EFI_IMAGE_ENTRY_POINT)(\r
761 IN EFI_HANDLE ImageHandle,\r
762 IN EFI_SYSTEM_TABLE *SystemTable\r
763 );\r
764\r
765/**\r
766 Loads an EFI image into memory.\r
767\r
768 @param BootPolicy If TRUE, indicates that the request originates from the boot\r
769 manager, and that the boot manager is attempting to load\r
770 FilePath as a boot selection. Ignored if SourceBuffer is\r
771 not NULL.\r
772 @param ParentImageHandle The caller's image handle.\r
773 @param DevicePath The DeviceHandle specific file path from which the image is\r
774 loaded.\r
775 @param SourceBuffer If not NULL, a pointer to the memory location containing a copy\r
776 of the image to be loaded.\r
777 @param SourceSize The size in bytes of SourceBuffer. Ignored if SourceBuffer is NULL.\r
778 @param ImageHandle Pointer to the returned image handle that is created when the\r
779 image is successfully loaded.\r
780\r
781 @retval EFI_SUCCESS Image was loaded into memory correctly.\r
782 @retval EFI_NOT_FOUND Both SourceBuffer and DevicePath are NULL.\r
783 @retval EFI_INVALID_PARAMETER One or more parametes are invalid.\r
784 @retval EFI_UNSUPPORTED The image type is not supported.\r
785 @retval EFI_OUT_OF_RESOURCES Image was not loaded due to insufficient resources.\r
786 @retval EFI_LOAD_ERROR Image was not loaded because the image format was corrupt or not\r
787 understood.\r
788 @retval EFI_DEVICE_ERROR Image was not loaded because the device returned a read error.\r
789\r
790**/\r
791typedef\r
792EFI_STATUS\r
793(EFIAPI *EFI_IMAGE_LOAD)(\r
794 IN BOOLEAN BootPolicy,\r
795 IN EFI_HANDLE ParentImageHandle,\r
796 IN EFI_DEVICE_PATH_PROTOCOL *DevicePath,\r
797 IN VOID *SourceBuffer OPTIONAL,\r
798 IN UINTN SourceSize,\r
799 OUT EFI_HANDLE *ImageHandle\r
800 );\r
801\r
802/**\r
803 Transfers control to a loaded image's entry point.\r
804\r
805 @param ImageHandle Handle of image to be started.\r
806 @param ExitDataSize Pointer to the size, in bytes, of ExitData.\r
807 @param ExitData Pointer to a pointer to a data buffer that includes a Null-terminated\r
808 Unicode string, optionally followed by additional binary data.\r
809\r
810 @retval EFI_INVALID_PARAMETER ImageHandle is either an invalid image handle or the image\r
811 has already been initialized with StartImage\r
812 @return Exit code from image\r
813\r
814**/\r
815typedef\r
816EFI_STATUS\r
817(EFIAPI *EFI_IMAGE_START)(\r
818 IN EFI_HANDLE ImageHandle,\r
819 OUT UINTN *ExitDataSize,\r
820 OUT CHAR16 **ExitData OPTIONAL\r
821 );\r
822\r
823/**\r
824 Terminates a loaded EFI image and returns control to boot services.\r
825\r
826 @param ImageHandle Handle that identifies the image.\r
827 @param ExitStatus The image's exit code.\r
828 @param ExitDataSize The size, in bytes, of ExitData.\r
829 @param ExitData Pointer to a data buffer that includes a Null-terminated Unicode string,\r
830 optionally followed by additional binary data.\r
831\r
832 @retval EFI_SUCCESS The image specified by ImageHandle was unloaded.\r
833 @retval EFI_INVALID_PARAMETER The image specified by ImageHandle has been loaded and\r
834 started with LoadImage() and StartImage(), but the\r
835 image is not the currently executing image.\r
836\r
837**/\r
838typedef\r
839EFI_STATUS\r
840(EFIAPI *EFI_EXIT)(\r
841 IN EFI_HANDLE ImageHandle,\r
842 IN EFI_STATUS ExitStatus,\r
843 IN UINTN ExitDataSize,\r
844 IN CHAR16 *ExitData OPTIONAL\r
845 );\r
846\r
847/**\r
848 Unloads an image.\r
849\r
850 @param ImageHandle Handle that identifies the image to be unloaded.\r
851\r
852 @retval EFI_SUCCESS The image has been unloaded.\r
853 @retval EFI_INVALID_PARAMETER ImageHandle is not a valid image handle.\r
854 @retval EFI_UNSUPPORTED The image has been started, and does not support unload.\r
855 @return Exit code from the image's unload handler\r
856\r
857**/\r
858typedef\r
859EFI_STATUS\r
860(EFIAPI *EFI_IMAGE_UNLOAD)(\r
861 IN EFI_HANDLE ImageHandle\r
862 );\r
863\r
864/**\r
865 Terminates all boot services.\r
866\r
867 @param ImageHandle Handle that identifies the exiting image.\r
868 @param MapKey Key to the latest memory map.\r
869\r
870 @retval EFI_SUCCESS Boot services have been terminated.\r
871 @retval EFI_INVALID_PARAMETER MapKey is incorrect.\r
872\r
873**/\r
874typedef\r
875EFI_STATUS\r
876(EFIAPI *EFI_EXIT_BOOT_SERVICES)(\r
877 IN EFI_HANDLE ImageHandle,\r
878 IN UINTN MapKey\r
879 );\r
880\r
881/**\r
882 Induces a fine-grained stall.\r
883\r
884 @param Microseconds The number of microseconds to stall execution.\r
885\r
886 @retval EFI_SUCCESS Execution was stalled at least the requested number of\r
887 Microseconds.\r
888\r
889**/\r
890typedef\r
891EFI_STATUS\r
892(EFIAPI *EFI_STALL)(\r
893 IN UINTN Microseconds\r
894 );\r
895\r
896/**\r
897 Sets the system's watchdog timer.\r
898\r
899 @param Timeout The number of seconds to set the watchdog timer to.\r
900 @param WatchdogCode The numeric code to log on a watchdog timer timeout event.\r
901 @param DataSize The size, in bytes, of WatchdogData.\r
902 @param WatchdogData A data buffer that includes a Null-terminated Unicode string, optionally\r
903 followed by additional binary data.\r
904\r
905 @retval EFI_SUCCESS The timeout has been set.\r
906 @retval EFI_INVALID_PARAMETER The supplied WatchdogCode is invalid.\r
907 @retval EFI_UNSUPPORTED The system does not have a watchdog timer.\r
908 @retval EFI_DEVICE_ERROR The watch dog timer could not be programmed due to a hardware\r
909 error.\r
910\r
911**/\r
912typedef\r
913EFI_STATUS\r
914(EFIAPI *EFI_SET_WATCHDOG_TIMER)(\r
915 IN UINTN Timeout,\r
916 IN UINT64 WatchdogCode,\r
917 IN UINTN DataSize,\r
918 IN CHAR16 *WatchdogData OPTIONAL\r
919 );\r
920\r
921///\r
922/// Enumeration of reset types.\r
923///\r
924typedef enum {\r
925 EfiResetCold,\r
926 EfiResetWarm,\r
927 EfiResetShutdown,\r
928 EfiResetUpdate\r
929} EFI_RESET_TYPE;\r
930\r
931/**\r
932 Resets the entire platform.\r
933\r
934 @param ResetType The type of reset to perform.\r
935 @param ResetStatus The status code for the reset.\r
936 @param DataSize The size, in bytes, of WatchdogData.\r
937 @param ResetData For a ResetType of EfiResetCold, EfiResetWarm, or\r
938 EfiResetShutdown the data buffer starts with a Null-terminated\r
939 Unicode string, optionally followed by additional binary data.\r
940\r
941**/\r
942typedef\r
943VOID\r
944(EFIAPI *EFI_RESET_SYSTEM)(\r
945 IN EFI_RESET_TYPE ResetType,\r
946 IN EFI_STATUS ResetStatus,\r
947 IN UINTN DataSize,\r
948 IN CHAR16 *ResetData OPTIONAL\r
949 );\r
950\r
951/**\r
952 Returns a monotonically increasing count for the platform.\r
953\r
954 @param Count Pointer to returned value.\r
955\r
956 @retval EFI_SUCCESS The next monotonic count was returned.\r
957 @retval EFI_INVALID_PARAMETER Count is NULL.\r
958 @retval EFI_DEVICE_ERROR The device is not functioning properly.\r
959\r
960**/\r
961typedef\r
962EFI_STATUS\r
963(EFIAPI *EFI_GET_NEXT_MONOTONIC_COUNT)(\r
964 OUT UINT64 *Count\r
965 );\r
966\r
967/**\r
968 Returns the next high 32 bits of the platform's monotonic counter.\r
969\r
970 @param HighCount Pointer to returned value.\r
971\r
972 @retval EFI_SUCCESS The next high monotonic count was returned.\r
973 @retval EFI_INVALID_PARAMETER HighCount is NULL.\r
974 @retval EFI_DEVICE_ERROR The device is not functioning properly.\r
975\r
976**/\r
977typedef\r
978EFI_STATUS\r
979(EFIAPI *EFI_GET_NEXT_HIGH_MONO_COUNT)(\r
980 OUT UINT32 *HighCount\r
981 );\r
982\r
983/**\r
984 Computes and returns a 32-bit CRC for a data buffer.\r
985\r
986 @param Data A pointer to the buffer on which the 32-bit CRC is to be computed.\r
987 @param DataSize The number of bytes in the buffer Data.\r
988 @param Crc32 The 32-bit CRC that was computed for the data buffer specified by Data\r
989 and DataSize.\r
990\r
991 @retval EFI_SUCCESS The 32-bit CRC was computed for the data buffer and returned in\r
992 Crc32.\r
993 @retval EFI_INVALID_PARAMETER Data is NULL.\r
994 @retval EFI_INVALID_PARAMETER Crc32 is NULL.\r
995 @retval EFI_INVALID_PARAMETER DataSize is 0.\r
996\r
997**/\r
998typedef\r
999EFI_STATUS\r
1000(EFIAPI *EFI_CALCULATE_CRC32)(\r
1001 IN VOID *Data,\r
1002 IN UINTN DataSize,\r
1003 OUT UINT32 *Crc32\r
1004 );\r
1005\r
1006/**\r
1007 Copies the contents of one buffer to another buffer.\r
1008\r
1009 @param Destination Pointer to the destination buffer of the memory copy.\r
1010 @param Source Pointer to the source buffer of the memory copy.\r
1011 @param Length Number of bytes to copy from Source to Destination.\r
1012\r
1013**/\r
1014typedef\r
1015VOID\r
1016(EFIAPI *EFI_COPY_MEM)(\r
1017 IN VOID *Destination,\r
1018 IN VOID *Source,\r
1019 IN UINTN Length\r
1020 );\r
1021\r
1022/**\r
1023 The SetMem() function fills a buffer with a specified value.\r
1024\r
1025 @param Buffer Pointer to the buffer to fill.\r
1026 @param Size Number of bytes in Buffer to fill.\r
1027 @param Value Value to fill Buffer with.\r
1028\r
1029**/\r
1030typedef\r
1031VOID\r
1032(EFIAPI *EFI_SET_MEM)(\r
1033 IN VOID *Buffer,\r
1034 IN UINTN Size,\r
1035 IN UINT8 Value\r
1036 );\r
1037\r
1038\r
1039//\r
1040// Protocol handler functions\r
1041//\r
1042typedef enum {\r
1043 EFI_NATIVE_INTERFACE\r
1044} EFI_INTERFACE_TYPE;\r
1045\r
1046/**\r
1047 Installs a protocol interface on a device handle. If the handle does not exist, it is created and added\r
1048 to the list of handles in the system. InstallMultipleProtocolInterfaces() performs\r
1049 more error checking than InstallProtocolInterface(), so it is recommended that\r
1050 InstallMultipleProtocolInterfaces() be used in place of\r
1051 InstallProtocolInterface()\r
1052\r
1053 @param Handle A pointer to the EFI_HANDLE on which the interface is to be installed.\r
1054 @param Protocol The numeric ID of the protocol interface.\r
1055 @param InterfaceType Indicates whether Interface is supplied in native form.\r
1056 @param Interface A pointer to the protocol interface.\r
1057\r
1058 @retval EFI_SUCCESS The protocol interface was installed.\r
1059 @retval EFI_OUT_OF_RESOURCES Space for a new handle could not be allocated.\r
1060 @retval EFI_INVALID_PARAMETER Handle is NULL.\r
1061 @retval EFI_INVALID_PARAMETER Protocol is NULL.\r
1062 @retval EFI_INVALID_PARAMETER InterfaceType is not EFI_NATIVE_INTERFACE.\r
1063 @retval EFI_INVALID_PARAMETER Protocol is already installed on the handle specified by Handle.\r
1064\r
1065**/\r
1066typedef\r
1067EFI_STATUS\r
1068(EFIAPI *EFI_INSTALL_PROTOCOL_INTERFACE)(\r
1069 IN OUT EFI_HANDLE *Handle,\r
1070 IN EFI_GUID *Protocol,\r
1071 IN EFI_INTERFACE_TYPE InterfaceType,\r
1072 IN VOID *Interface\r
1073 );\r
1074\r
1075/**\r
1076 Installs one or more protocol interfaces into the boot services environment.\r
1077\r
1078 @param Handle The handle to install the new protocol interfaces on, or NULL if a new\r
1079 handle is to be allocated.\r
1080 @param ... A variable argument list containing pairs of protocol GUIDs and protocol\r
1081 interfaces.\r
1082\r
1083 @retval EFI_SUCCESS All the protocol interface was installed.\r
1084 @retval EFI_OUT_OF_RESOURCES There was not enough memory in pool to install all the protocols.\r
1085 @retval EFI_ALREADY_STARTED A Device Path Protocol instance was passed in that is already present in\r
1086 the handle database.\r
1087\r
1088**/\r
1089typedef\r
1090EFI_STATUS\r
1091(EFIAPI *EFI_INSTALL_MULTIPLE_PROTOCOL_INTERFACES)(\r
1092 IN OUT EFI_HANDLE *Handle,\r
1093 ...\r
1094 );\r
1095\r
1096/**\r
1097 Reinstalls a protocol interface on a device handle.\r
1098\r
1099 @param Handle Handle on which the interface is to be reinstalled.\r
1100 @param Protocol The numeric ID of the interface.\r
1101 @param OldInterface A pointer to the old interface. NULL can be used if a structure is not\r
1102 associated with Protocol.\r
1103 @param NewInterface A pointer to the new interface.\r
1104\r
1105 @retval EFI_SUCCESS The protocol interface was reinstalled.\r
1106 @retval EFI_NOT_FOUND The OldInterface on the handle was not found.\r
1107 @retval EFI_ACCESS_DENIED The protocol interface could not be reinstalled,\r
1108 because OldInterface is still being used by a\r
1109 driver that will not release it.\r
1110 @retval EFI_INVALID_PARAMETER Handle is not a valid EFI_HANDLE.\r
1111 @retval EFI_INVALID_PARAMETER Protocol is NULL.\r
1112\r
1113**/\r
1114typedef\r
1115EFI_STATUS\r
1116(EFIAPI *EFI_REINSTALL_PROTOCOL_INTERFACE)(\r
1117 IN EFI_HANDLE Handle,\r
1118 IN EFI_GUID *Protocol,\r
1119 IN VOID *OldInterface,\r
1120 IN VOID *NewInterface\r
1121 );\r
1122\r
1123/**\r
1124 Removes a protocol interface from a device handle. It is recommended that\r
1125 UninstallMultipleProtocolInterfaces() be used in place of\r
1126 UninstallProtocolInterface().\r
1127\r
1128 @param Handle The handle on which the interface was installed.\r
1129 @param Protocol The numeric ID of the interface.\r
1130 @param Interface A pointer to the interface.\r
1131\r
1132 @retval EFI_SUCCESS The interface was removed.\r
1133 @retval EFI_NOT_FOUND The interface was not found.\r
1134 @retval EFI_ACCESS_DENIED The interface was not removed because the interface\r
1135 is still being used by a driver.\r
1136 @retval EFI_INVALID_PARAMETER Handle is not a valid EFI_HANDLE.\r
1137 @retval EFI_INVALID_PARAMETER Protocol is NULL.\r
1138\r
1139**/\r
1140typedef\r
1141EFI_STATUS\r
1142(EFIAPI *EFI_UNINSTALL_PROTOCOL_INTERFACE)(\r
1143 IN EFI_HANDLE Handle,\r
1144 IN EFI_GUID *Protocol,\r
1145 IN VOID *Interface\r
1146 );\r
1147\r
1148/**\r
1149 Removes one or more protocol interfaces into the boot services environment.\r
1150\r
1151 @param Handle The handle to remove the protocol interfaces from.\r
1152 @param ... A variable argument list containing pairs of protocol GUIDs and\r
1153 protocol interfaces.\r
1154\r
1155 @retval EFI_SUCCESS All the protocol interfaces were removed.\r
1156 @retval EFI_INVALID_PARAMETER One of the protocol interfaces was not previously installed on Handle.\r
1157\r
1158**/\r
1159typedef\r
1160EFI_STATUS\r
1161(EFIAPI *EFI_UNINSTALL_MULTIPLE_PROTOCOL_INTERFACES)(\r
1162 IN EFI_HANDLE Handle,\r
1163 ...\r
1164 );\r
1165\r
1166/**\r
1167 Queries a handle to determine if it supports a specified protocol.\r
1168\r
1169 @param Handle The handle being queried.\r
1170 @param Protocol The published unique identifier of the protocol.\r
1171 @param Interface Supplies the address where a pointer to the corresponding Protocol\r
1172 Interface is returned.\r
1173\r
1174 @retval EFI_SUCCESS The interface information for the specified protocol was returned.\r
1175 @retval EFI_UNSUPPORTED The device does not support the specified protocol.\r
1176 @retval EFI_INVALID_PARAMETER Handle is not a valid EFI_HANDLE.\r
1177 @retval EFI_INVALID_PARAMETER Protocol is NULL.\r
1178 @retval EFI_INVALID_PARAMETER Interface is NULL.\r
1179\r
1180**/\r
1181typedef\r
1182EFI_STATUS\r
1183(EFIAPI *EFI_HANDLE_PROTOCOL)(\r
1184 IN EFI_HANDLE Handle,\r
1185 IN EFI_GUID *Protocol,\r
1186 OUT VOID **Interface\r
1187 );\r
1188\r
1189#define EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL 0x00000001\r
1190#define EFI_OPEN_PROTOCOL_GET_PROTOCOL 0x00000002\r
1191#define EFI_OPEN_PROTOCOL_TEST_PROTOCOL 0x00000004\r
1192#define EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER 0x00000008\r
1193#define EFI_OPEN_PROTOCOL_BY_DRIVER 0x00000010\r
1194#define EFI_OPEN_PROTOCOL_EXCLUSIVE 0x00000020\r
1195\r
1196/**\r
1197 Queries a handle to determine if it supports a specified protocol. If the protocol is supported by the\r
1198 handle, it opens the protocol on behalf of the calling agent.\r
1199\r
1200 @param Handle The handle for the protocol interface that is being opened.\r
1201 @param Protocol The published unique identifier of the protocol.\r
1202 @param Interface Supplies the address where a pointer to the corresponding Protocol\r
1203 Interface is returned.\r
1204 @param AgentHandle The handle of the agent that is opening the protocol interface\r
1205 specified by Protocol and Interface.\r
1206 @param ControllerHandle If the agent that is opening a protocol is a driver that follows the\r
1207 UEFI Driver Model, then this parameter is the controller handle\r
1208 that requires the protocol interface. If the agent does not follow\r
1209 the UEFI Driver Model, then this parameter is optional and may\r
1210 be NULL.\r
1211 @param Attributes The open mode of the protocol interface specified by Handle\r
1212 and Protocol.\r
1213\r
1214 @retval EFI_SUCCESS An item was added to the open list for the protocol interface, and the\r
1215 protocol interface was returned in Interface.\r
1216 @retval EFI_UNSUPPORTED Handle does not support Protocol.\r
1217 @retval EFI_INVALID_PARAMETER One or more parameters are invalid.\r
1218 @retval EFI_ACCESS_DENIED Required attributes can't be supported in current environment.\r
1219 @retval EFI_ALREADY_STARTED Item on the open list already has requierd attributes whose agent\r
1220 handle is the same as AgentHandle.\r
1221\r
1222**/\r
1223typedef\r
1224EFI_STATUS\r
1225(EFIAPI *EFI_OPEN_PROTOCOL)(\r
1226 IN EFI_HANDLE Handle,\r
1227 IN EFI_GUID *Protocol,\r
1228 OUT VOID **Interface, OPTIONAL\r
1229 IN EFI_HANDLE AgentHandle,\r
1230 IN EFI_HANDLE ControllerHandle,\r
1231 IN UINT32 Attributes\r
1232 );\r
1233\r
1234\r
1235/**\r
1236 Closes a protocol on a handle that was opened using OpenProtocol().\r
1237\r
1238 @param Handle The handle for the protocol interface that was previously opened\r
1239 with OpenProtocol(), and is now being closed.\r
1240 @param Protocol The published unique identifier of the protocol.\r
1241 @param AgentHandle The handle of the agent that is closing the protocol interface.\r
1242 @param ControllerHandle If the agent that opened a protocol is a driver that follows the\r
1243 UEFI Driver Model, then this parameter is the controller handle\r
1244 that required the protocol interface.\r
1245\r
1246 @retval EFI_SUCCESS The protocol instance was closed.\r
1247 @retval EFI_INVALID_PARAMETER 1) Handle is not a valid EFI_HANDLE.\r
1248 2) AgentHandle is not a valid EFI_HANDLE.\r
1249 3) ControllerHandle is not NULL and ControllerHandle is not a valid EFI_HANDLE.\r
1250 4) Protocol is NULL.\r
1251 @retval EFI_NOT_FOUND 1) Handle does not support the protocol specified by Protocol.\r
1252 2) The protocol interface specified by Handle and Protocol is not\r
1253 currently open by AgentHandle and ControllerHandle.\r
1254\r
1255**/\r
1256typedef\r
1257EFI_STATUS\r
1258(EFIAPI *EFI_CLOSE_PROTOCOL)(\r
1259 IN EFI_HANDLE Handle,\r
1260 IN EFI_GUID *Protocol,\r
1261 IN EFI_HANDLE AgentHandle,\r
1262 IN EFI_HANDLE ControllerHandle\r
1263 );\r
1264\r
1265\r
1266typedef struct {\r
1267 EFI_HANDLE AgentHandle;\r
1268 EFI_HANDLE ControllerHandle;\r
1269 UINT32 Attributes;\r
1270 UINT32 OpenCount;\r
1271} EFI_OPEN_PROTOCOL_INFORMATION_ENTRY;\r
1272\r
1273/**\r
1274 Retrieves the list of agents that currently have a protocol interface opened.\r
1275\r
1276 @param Handle The handle for the protocol interface that is being queried.\r
1277 @param Protocol The published unique identifier of the protocol.\r
1278 @param EntryBuffer A pointer to a buffer of open protocol information in the form of\r
1279 EFI_OPEN_PROTOCOL_INFORMATION_ENTRY structures.\r
1280 @param EntryCount A pointer to the number of entries in EntryBuffer.\r
1281\r
1282 @retval EFI_SUCCESS The open protocol information was returned in EntryBuffer, and the\r
1283 number of entries was returned EntryCount.\r
1284 @retval EFI_OUT_OF_RESOURCES There are not enough resources available to allocate EntryBuffer.\r
1285 @retval EFI_NOT_FOUND Handle does not support the protocol specified by Protocol.\r
1286\r
1287**/\r
1288typedef\r
1289EFI_STATUS\r
1290(EFIAPI *EFI_OPEN_PROTOCOL_INFORMATION)(\r
1291 IN EFI_HANDLE Handle,\r
1292 IN EFI_GUID *Protocol,\r
1293 OUT EFI_OPEN_PROTOCOL_INFORMATION_ENTRY **EntryBuffer,\r
1294 OUT UINTN *EntryCount\r
1295 );\r
1296\r
1297/**\r
1298 Retrieves the list of protocol interface GUIDs that are installed on a handle in a buffer allocated\r
1299 from pool.\r
1300\r
1301 @param Handle The handle from which to retrieve the list of protocol interface\r
1302 GUIDs.\r
1303 @param ProtocolBuffer A pointer to the list of protocol interface GUID pointers that are\r
1304 installed on Handle.\r
1305 @param ProtocolBufferCount A pointer to the number of GUID pointers present in\r
1306 ProtocolBuffer.\r
1307\r
1308 @retval EFI_SUCCESS The list of protocol interface GUIDs installed on Handle was returned in\r
1309 ProtocolBuffer. The number of protocol interface GUIDs was\r
1310 returned in ProtocolBufferCount.\r
1311 @retval EFI_OUT_OF_RESOURCES There is not enough pool memory to store the results.\r
1312 @retval EFI_INVALID_PARAMETER Handle is NULL.\r
1313 @retval EFI_INVALID_PARAMETER Handle is not a valid EFI_HANDLE.\r
1314 @retval EFI_INVALID_PARAMETER ProtocolBuffer is NULL.\r
1315 @retval EFI_INVALID_PARAMETER ProtocolBufferCount is NULL.\r
1316\r
1317**/\r
1318typedef\r
1319EFI_STATUS\r
1320(EFIAPI *EFI_PROTOCOLS_PER_HANDLE)(\r
1321 IN EFI_HANDLE Handle,\r
1322 OUT EFI_GUID ***ProtocolBuffer,\r
1323 OUT UINTN *ProtocolBufferCount\r
1324 );\r
1325\r
1326/**\r
1327 Creates an event that is to be signaled whenever an interface is installed for a specified protocol.\r
1328\r
1329 @param Protocol The numeric ID of the protocol for which the event is to be registered.\r
1330 @param Event Event that is to be signaled whenever a protocol interface is registered\r
1331 for Protocol.\r
1332 @param Registration A pointer to a memory location to receive the registration value.\r
1333\r
1334 @retval EFI_SUCCESS The notification event has been registered.\r
1335 @retval EFI_OUT_OF_RESOURCES Space for the notification event could not be allocated.\r
1336 @retval EFI_INVALID_PARAMETER Protocol is NULL.\r
1337 @retval EFI_INVALID_PARAMETER Event is NULL.\r
1338 @retval EFI_INVALID_PARAMETER Registration is NULL.\r
1339\r
1340**/\r
1341typedef\r
1342EFI_STATUS\r
1343(EFIAPI *EFI_REGISTER_PROTOCOL_NOTIFY)(\r
1344 IN EFI_GUID *Protocol,\r
1345 IN EFI_EVENT Event,\r
1346 OUT VOID **Registration\r
1347 );\r
1348\r
1349\r
1350typedef enum {\r
1351 AllHandles,\r
1352 ByRegisterNotify,\r
1353 ByProtocol\r
1354} EFI_LOCATE_SEARCH_TYPE;\r
1355\r
1356/**\r
1357 Returns an array of handles that support a specified protocol.\r
1358\r
1359 @param SearchType Specifies which handle(s) are to be returned.\r
1360 @param Protocol Specifies the protocol to search by.\r
1361 @param SearchKey Specifies the search key.\r
1362 @param BufferSize On input, the size in bytes of Buffer. On output, the size in bytes of\r
1363 the array returned in Buffer (if the buffer was large enough) or the\r
1364 size, in bytes, of the buffer needed to obtain the array (if the buffer was\r
1365 not large enough).\r
1366 @param Buffer The buffer in which the array is returned.\r
1367\r
1368 @retval EFI_SUCCESS The array of handles was returned.\r
1369 @retval EFI_NOT_FOUND No handles match the search.\r
1370 @retval EFI_BUFFER_TOO_SMALL The BufferSize is too small for the result.\r
1371 @retval EFI_INVALID_PARAMETER SearchType is not a member of EFI_LOCATE_SEARCH_TYPE.\r
1372 @retval EFI_INVALID_PARAMETER SearchType is ByRegisterNotify and SearchKey is NULL.\r
1373 @retval EFI_INVALID_PARAMETER SearchType is ByProtocol and Protocol is NULL.\r
1374 @retval EFI_INVALID_PARAMETER One or more matches are found and BufferSize is NULL.\r
1375 @retval EFI_INVALID_PARAMETER BufferSize is large enough for the result and Buffer is NULL.\r
1376\r
1377**/\r
1378typedef\r
1379EFI_STATUS\r
1380(EFIAPI *EFI_LOCATE_HANDLE)(\r
1381 IN EFI_LOCATE_SEARCH_TYPE SearchType,\r
1382 IN EFI_GUID *Protocol, OPTIONAL\r
1383 IN VOID *SearchKey, OPTIONAL\r
1384 IN OUT UINTN *BufferSize,\r
1385 OUT EFI_HANDLE *Buffer\r
1386 );\r
1387\r
1388/**\r
1389 Locates the handle to a device on the device path that supports the specified protocol.\r
1390\r
1391 @param Protocol Specifies the protocol to search for.\r
1392 @param DevicePath On input, a pointer to a pointer to the device path. On output, the device\r
1393 path pointer is modified to point to the remaining part of the device\r
1394 path.\r
1395 @param Device A pointer to the returned device handle.\r
1396\r
1397 @retval EFI_SUCCESS The resulting handle was returned.\r
1398 @retval EFI_NOT_FOUND No handles match the search.\r
1399 @retval EFI_INVALID_PARAMETER Protocol is NULL.\r
1400 @retval EFI_INVALID_PARAMETER DevicePath is NULL.\r
1401 @retval EFI_INVALID_PARAMETER A handle matched the search and Device is NULL.\r
1402\r
1403**/\r
1404typedef\r
1405EFI_STATUS\r
1406(EFIAPI *EFI_LOCATE_DEVICE_PATH)(\r
1407 IN EFI_GUID *Protocol,\r
1408 IN OUT EFI_DEVICE_PATH_PROTOCOL **DevicePath,\r
1409 OUT EFI_HANDLE *Device\r
1410 );\r
1411\r
1412/**\r
1413 Adds, updates, or removes a configuration table entry from the EFI System Table.\r
1414\r
1415 @param Guid A pointer to the GUID for the entry to add, update, or remove.\r
1416 @param Table A pointer to the configuration table for the entry to add, update, or\r
1417 remove. May be NULL.\r
1418\r
1419 @retval EFI_SUCCESS The (Guid, Table) pair was added, updated, or removed.\r
1420 @retval EFI_NOT_FOUND An attempt was made to delete a nonexistent entry.\r
1421 @retval EFI_INVALID_PARAMETER Guid is not valid.\r
1422 @retval EFI_OUT_OF_RESOURCES There is not enough memory available to complete the operation.\r
1423\r
1424**/\r
1425typedef\r
1426EFI_STATUS\r
1427(EFIAPI *EFI_INSTALL_CONFIGURATION_TABLE)(\r
1428 IN EFI_GUID *Guid,\r
1429 IN VOID *Table\r
1430 );\r
1431\r
1432\r
1433/**\r
1434 Returns an array of handles that support the requested protocol in a buffer allocated from pool.\r
1435\r
1436 @param SearchType Specifies which handle(s) are to be returned.\r
1437 @param Protocol Provides the protocol to search by.\r
1438 This parameter is only valid for a SearchType of ByProtocol.\r
1439 @param SearchKey Supplies the search key depending on the SearchType.\r
1440 @param NoHandles The number of handles returned in Buffer.\r
1441 @param Buffer A pointer to the buffer to return the requested array of handles that\r
1442 support Protocol.\r
1443\r
1444 @retval EFI_SUCCESS The array of handles was returned in Buffer, and the number of\r
1445 handles in Buffer was returned in NoHandles.\r
1446 @retval EFI_NOT_FOUND No handles match the search.\r
1447 @retval EFI_OUT_OF_RESOURCES There is not enough pool memory to store the matching results.\r
1448 @retval EFI_INVALID_PARAMETER NoHandles is NULL.\r
1449 @retval EFI_INVALID_PARAMETER Buffer is NULL.\r
1450\r
1451**/\r
1452typedef\r
1453EFI_STATUS\r
1454(EFIAPI *EFI_LOCATE_HANDLE_BUFFER)(\r
1455 IN EFI_LOCATE_SEARCH_TYPE SearchType,\r
1456 IN EFI_GUID *Protocol, OPTIONAL\r
1457 IN VOID *SearchKey, OPTIONAL\r
1458 IN OUT UINTN *NoHandles,\r
1459 OUT EFI_HANDLE **Buffer\r
1460 );\r
1461\r
1462/**\r
1463 Returns the first protocol instance that matches the given protocol.\r
1464\r
1465 @param Protocol Provides the protocol to search for.\r
1466 @param Registration Optional registration key returned from\r
1467 RegisterProtocolNotify().\r
1468 @param Interface On return, a pointer to the first interface that matches Protocol and\r
1469 Registration.\r
1470\r
1471 @retval EFI_SUCCESS A protocol instance matching Protocol was found and returned in\r
1472 Interface.\r
1473 @retval EFI_NOT_FOUND No protocol instances were found that match Protocol and\r
1474 Registration.\r
1475 @retval EFI_INVALID_PARAMETER Interface is NULL.\r
1476\r
1477**/\r
1478typedef\r
1479EFI_STATUS\r
1480(EFIAPI *EFI_LOCATE_PROTOCOL)(\r
1481 IN EFI_GUID *Protocol,\r
1482 IN VOID *Registration, OPTIONAL\r
1483 OUT VOID **Interface\r
1484 );\r
1485\r
1486typedef struct {\r
1487 UINT64 Length;\r
1488 union {\r
1489 EFI_PHYSICAL_ADDRESS DataBlock;\r
1490 EFI_PHYSICAL_ADDRESS ContinuationPointer;\r
1491 } Union;\r
1492} EFI_CAPSULE_BLOCK_DESCRIPTOR;\r
1493\r
1494typedef struct {\r
1495 EFI_GUID CapsuleGuid;\r
1496 UINT32 HeaderSize;\r
1497 UINT32 Flags;\r
1498 UINT32 CapsuleImageSize;\r
1499} EFI_CAPSULE_HEADER;\r
1500\r
1501//\r
1502// The EFI System Table entry must point to an array of capsules\r
1503// that contain the same CapsuleGuid value. The array must be\r
1504// prefixed by a UINT32 that represents the size of the array of capsules.\r
1505//\r
1506typedef struct {\r
1507 UINT32 CapsuleArrayNumber;\r
1508 VOID* CapsulePtr[1];\r
1509} EFI_CAPSULE_TABLE;\r
1510\r
1511#define CAPSULE_FLAGS_PERSIST_ACROSS_RESET 0x00010000\r
1512#define CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE 0x00020000\r
1513\r
1514/**\r
1515 Passes capsules to the firmware with both virtual and physical mapping. Depending on the intended\r
1516 consumption, the firmware may process the capsule immediately. If the payload should persist\r
1517 across a system reset, the reset value returned from EFI_QueryCapsuleCapabilities must\r
1518 be passed into ResetSystem() and will cause the capsule to be processed by the firmware as\r
1519 part of the reset process.\r
1520\r
1521 @param CapsuleHeaderArray Virtual pointer to an array of virtual pointers to the capsules\r
1522 being passed into update capsule.\r
1523 @param CapsuleCount Number of pointers to EFI_CAPSULE_HEADER in\r
1524 CaspuleHeaderArray.\r
1525 @param ScatterGatherList Physical pointer to a set of\r
1526 EFI_CAPSULE_BLOCK_DESCRIPTOR that describes the\r
1527 location in physical memory of a set of capsules.\r
1528\r
1529 @retval EFI_SUCCESS Valid capsule was passed. If\r
1530 CAPSULE_FLAGS_PERSIT_ACROSS_RESET is not set, the\r
1531 capsule has been successfully processed by the firmware.\r
1532 @retval EFI_DEVICE_ERROR The capsule update was started, but failed due to a device error.\r
1533 @retval EFI_INVALID_PARAMETER CapsuleSize is NULL.\r
1534 @retval EFI_UNSUPPORTED The capsule type is not supported on this platform.\r
1535 @retval EFI_OUT_OF_RESOURCES There were insufficient resources to process the capsule.\r
1536\r
1537**/\r
1538typedef\r
1539EFI_STATUS\r
1540(EFIAPI *EFI_UPDATE_CAPSULE)(\r
1541 IN EFI_CAPSULE_HEADER **CapsuleHeaderArray,\r
1542 IN UINTN CapsuleCount,\r
1543 IN EFI_PHYSICAL_ADDRESS ScatterGatherList OPTIONAL\r
1544 );\r
1545\r
1546/**\r
1547 Returns if the capsule can be supported via UpdateCapsule().\r
1548\r
1549 @param CapsuleHeaderArray Virtual pointer to an array of virtual pointers to the capsules\r
1550 being passed into update capsule.\r
1551 @param CapsuleCount Number of pointers to EFI_CAPSULE_HEADER in\r
1552 CaspuleHeaderArray.\r
1553 @param MaxiumCapsuleSize On output the maximum size that UpdateCapsule() can\r
1554 support as an argument to UpdateCapsule() via\r
1555 CapsuleHeaderArray and ScatterGatherList.\r
1556 @param ResetType Returns the type of reset required for the capsule update.\r
1557\r
1558 @retval EFI_SUCCESS Valid answer returned.\r
1559 @retval EFI_UNSUPPORTED The capsule type is not supported on this platform, and\r
1560 MaximumCapsuleSize and ResetType are undefined.\r
1561 @retval EFI_INVALID_PARAMETER MaximumCapsuleSize is NULL.\r
1562 @retval EFI_OUT_OF_RESOURCES There were insufficient resources to process the query request.\r
1563\r
1564**/\r
1565typedef\r
1566EFI_STATUS\r
1567(EFIAPI *EFI_QUERY_CAPSULE_CAPABILITIES)(\r
1568 IN EFI_CAPSULE_HEADER **CapsuleHeaderArray,\r
1569 IN UINTN CapsuleCount,\r
1570 OUT UINT64 *MaximumCapsuleSize,\r
1571 OUT EFI_RESET_TYPE *ResetType\r
1572 );\r
1573\r
1574/**\r
1575 Returns information about the EFI variables.\r
1576\r
1577 @param Attributes Attributes bitmask to specify the type of variables on\r
1578 which to return information.\r
1579 @param MaximumVariableStorageSize On output the maximum size of the storage space\r
1580 available for the EFI variables associated with the\r
1581 attributes specified.\r
1582 @param RemainingVariableStorageSize Returns the remaining size of the storage space\r
1583 available for the EFI variables associated with the\r
1584 attributes specified.\r
1585 @param MaximumVariableSize Returns the maximum size of the individual EFI\r
1586 variables associated with the attributes specified.\r
1587\r
1588 @retval EFI_SUCCESS Valid answer returned.\r
1589 @retval EFI_INVALID_PARAMETER An invalid combination of attribute bits was supplied\r
1590 @retval EFI_UNSUPPORTED The attribute is not supported on this platform, and the\r
1591 MaximumVariableStorageSize,\r
1592 RemainingVariableStorageSize, MaximumVariableSize\r
1593 are undefined.\r
1594\r
1595**/\r
1596typedef\r
1597EFI_STATUS\r
1598(EFIAPI *EFI_QUERY_VARIABLE_INFO)(\r
1599 IN UINT32 Attributes,\r
1600 OUT UINT64 *MaximumVariableStorageSize,\r
1601 OUT UINT64 *RemainingVariableStorageSize,\r
1602 OUT UINT64 *MaximumVariableSize\r
1603 );\r
1604\r
1605\r
1606//\r
1607// EFI Runtime Services Table\r
1608//\r
1609#define EFI_SYSTEM_TABLE_SIGNATURE 0x5453595320494249ULL\r
1610#define EFI_SYSTEM_TABLE_REVISION ((2<<16) | (10))\r
1611#define EFI_2_10_SYSTEM_TABLE_REVISION ((2<<16) | (10))\r
1612#define EFI_2_00_SYSTEM_TABLE_REVISION ((2<<16) | (00))\r
1613#define EFI_1_10_SYSTEM_TABLE_REVISION ((1<<16) | (10))\r
1614#define EFI_1_02_SYSTEM_TABLE_REVISION ((1<<16) | (02))\r
1615\r
1616#define EFI_RUNTIME_SERVICES_SIGNATURE 0x56524553544e5552ULL\r
1617#define EFI_RUNTIME_SERVICES_REVISION EFI_2_10_SYSTEM_TABLE_REVISION\r
1618\r
1619///\r
1620/// EFI Runtime Services Table\r
1621///\r
1622typedef struct {\r
1623 ///\r
1624 /// The table header for the EFI Runtime Services Table.\r
1625 ///\r
1626 EFI_TABLE_HEADER Hdr;\r
1627\r
1628 //\r
1629 // Time Services\r
1630 //\r
1631 EFI_GET_TIME GetTime;\r
1632 EFI_SET_TIME SetTime;\r
1633 EFI_GET_WAKEUP_TIME GetWakeupTime;\r
1634 EFI_SET_WAKEUP_TIME SetWakeupTime;\r
1635\r
1636 //\r
1637 // Virtual Memory Services\r
1638 //\r
1639 EFI_SET_VIRTUAL_ADDRESS_MAP SetVirtualAddressMap;\r
1640 EFI_CONVERT_POINTER ConvertPointer;\r
1641\r
1642 //\r
1643 // Variable Services\r
1644 //\r
1645 EFI_GET_VARIABLE GetVariable;\r
1646 EFI_GET_NEXT_VARIABLE_NAME GetNextVariableName;\r
1647 EFI_SET_VARIABLE SetVariable;\r
1648\r
1649 //\r
1650 // Miscellaneous Services\r
1651 //\r
1652 EFI_GET_NEXT_HIGH_MONO_COUNT GetNextHighMonotonicCount;\r
1653 EFI_RESET_SYSTEM ResetSystem;\r
1654\r
1655 //\r
1656 // UEFI 2.0 Capsule Services\r
1657 //\r
1658 EFI_UPDATE_CAPSULE UpdateCapsule;\r
1659 EFI_QUERY_CAPSULE_CAPABILITIES QueryCapsuleCapabilities;\r
1660\r
1661 //\r
1662 // Miscellaneous UEFI 2.0 Service\r
1663 //\r
1664 EFI_QUERY_VARIABLE_INFO QueryVariableInfo;\r
1665} EFI_RUNTIME_SERVICES;\r
1666\r
1667\r
1668#define EFI_BOOT_SERVICES_SIGNATURE 0x56524553544f4f42ULL\r
1669#define EFI_BOOT_SERVICES_REVISION EFI_2_10_SYSTEM_TABLE_REVISION\r
1670\r
1671///\r
1672/// EFI Boot Services Table\r
1673///\r
1674typedef struct {\r
1675 ///\r
1676 /// The table header for the EFI Boot Services Table.\r
1677 ///\r
1678 EFI_TABLE_HEADER Hdr;\r
1679\r
1680 //\r
1681 // Task Priority Services\r
1682 //\r
1683 EFI_RAISE_TPL RaiseTPL;\r
1684 EFI_RESTORE_TPL RestoreTPL;\r
1685\r
1686 //\r
1687 // Memory Services\r
1688 //\r
1689 EFI_ALLOCATE_PAGES AllocatePages;\r
1690 EFI_FREE_PAGES FreePages;\r
1691 EFI_GET_MEMORY_MAP GetMemoryMap;\r
1692 EFI_ALLOCATE_POOL AllocatePool;\r
1693 EFI_FREE_POOL FreePool;\r
1694\r
1695 //\r
1696 // Event & Timer Services\r
1697 //\r
1698 EFI_CREATE_EVENT CreateEvent;\r
1699 EFI_SET_TIMER SetTimer;\r
1700 EFI_WAIT_FOR_EVENT WaitForEvent;\r
1701 EFI_SIGNAL_EVENT SignalEvent;\r
1702 EFI_CLOSE_EVENT CloseEvent;\r
1703 EFI_CHECK_EVENT CheckEvent;\r
1704\r
1705 //\r
1706 // Protocol Handler Services\r
1707 //\r
1708 EFI_INSTALL_PROTOCOL_INTERFACE InstallProtocolInterface;\r
1709 EFI_REINSTALL_PROTOCOL_INTERFACE ReinstallProtocolInterface;\r
1710 EFI_UNINSTALL_PROTOCOL_INTERFACE UninstallProtocolInterface;\r
1711 EFI_HANDLE_PROTOCOL HandleProtocol;\r
1712 VOID *Reserved;\r
1713 EFI_REGISTER_PROTOCOL_NOTIFY RegisterProtocolNotify;\r
1714 EFI_LOCATE_HANDLE LocateHandle;\r
1715 EFI_LOCATE_DEVICE_PATH LocateDevicePath;\r
1716 EFI_INSTALL_CONFIGURATION_TABLE InstallConfigurationTable;\r
1717\r
1718 //\r
1719 // Image Services\r
1720 //\r
1721 EFI_IMAGE_LOAD LoadImage;\r
1722 EFI_IMAGE_START StartImage;\r
1723 EFI_EXIT Exit;\r
1724 EFI_IMAGE_UNLOAD UnloadImage;\r
1725 EFI_EXIT_BOOT_SERVICES ExitBootServices;\r
1726\r
1727 //\r
1728 // Miscellaneous Services\r
1729 //\r
1730 EFI_GET_NEXT_MONOTONIC_COUNT GetNextMonotonicCount;\r
1731 EFI_STALL Stall;\r
1732 EFI_SET_WATCHDOG_TIMER SetWatchdogTimer;\r
1733\r
1734 //\r
1735 // DriverSupport Services\r
1736 //\r
1737 EFI_CONNECT_CONTROLLER ConnectController;\r
1738 EFI_DISCONNECT_CONTROLLER DisconnectController;\r
1739\r
1740 //\r
1741 // Open and Close Protocol Services\r
1742 //\r
1743 EFI_OPEN_PROTOCOL OpenProtocol;\r
1744 EFI_CLOSE_PROTOCOL CloseProtocol;\r
1745 EFI_OPEN_PROTOCOL_INFORMATION OpenProtocolInformation;\r
1746\r
1747 //\r
1748 // Library Services\r
1749 //\r
1750 EFI_PROTOCOLS_PER_HANDLE ProtocolsPerHandle;\r
1751 EFI_LOCATE_HANDLE_BUFFER LocateHandleBuffer;\r
1752 EFI_LOCATE_PROTOCOL LocateProtocol;\r
1753 EFI_INSTALL_MULTIPLE_PROTOCOL_INTERFACES InstallMultipleProtocolInterfaces;\r
1754 EFI_UNINSTALL_MULTIPLE_PROTOCOL_INTERFACES UninstallMultipleProtocolInterfaces;\r
1755\r
1756 //\r
1757 // 32-bit CRC Services\r
1758 //\r
1759 EFI_CALCULATE_CRC32 CalculateCrc32;\r
1760\r
1761 //\r
1762 // Miscellaneous Services\r
1763 //\r
1764 EFI_COPY_MEM CopyMem;\r
1765 EFI_SET_MEM SetMem;\r
1766 EFI_CREATE_EVENT_EX CreateEventEx;\r
1767} EFI_BOOT_SERVICES;\r
1768\r
1769///\r
1770/// Contains a set of GUID/pointer pairs comprised of the ConfigurationTable field in the\r
1771/// EFI System Table.\r
1772///\r
1773typedef struct{\r
1774 ///\r
1775 /// The 128-bit GUID value that uniquely identifies the system configuration table.\r
1776 ///\r
1777 EFI_GUID VendorGuid;\r
1778 ///\r
1779 /// A pointer to the table associated with VendorGuid.\r
1780 ///\r
1781 VOID *VendorTable;\r
1782} EFI_CONFIGURATION_TABLE;\r
1783\r
1784///\r
1785/// EFI System Table\r
1786///\r
1787struct _EFI_SYSTEM_TABLE {\r
1788 ///\r
1789 /// The table header for the EFI System Table.\r
1790 ///\r
1791 EFI_TABLE_HEADER Hdr;\r
1792 ///\r
1793 /// A pointer to a null terminated Unicode string that identifies\r
1794 /// the vendor that produces the system firmware for the platform.\r
1795 ///\r
1796 CHAR16 *FirmwareVendor;\r
1797 ///\r
1798 /// A firmware vendor specific value that identifies the revision\r
1799 /// of the system firmware for the platform.\r
1800 ///\r
1801 UINT32 FirmwareRevision;\r
1802 ///\r
1803 /// The handle for the active console input device.\r
1804 ///\r
1805 EFI_HANDLE ConsoleInHandle;\r
1806 ///\r
1807 /// A pointer to the SIMPLE_INPUT_PROTOCOL interface that is\r
1808 /// associated with ConsoleInHandle.\r
1809 ///\r
1810 EFI_SIMPLE_TEXT_INPUT_PROTOCOL *ConIn;\r
1811 ///\r
1812 /// The handle for the active console output device.\r
1813 ///\r
1814 EFI_HANDLE ConsoleOutHandle;\r
1815 ///\r
1816 /// A pointer to the SIMPLE_TEXT_OUTPUT_PROTOCOL interface\r
1817 /// that is associated with ConsoleOutHandle.\r
1818 ///\r
1819 EFI_SIMPLE_TEXT_OUTPUT_PROTOCOL *ConOut;\r
1820 ///\r
1821 /// The handle for the active standard error console device.\r
1822 ///\r
1823 EFI_HANDLE StandardErrorHandle;\r
1824 ///\r
1825 /// A pointer to the SIMPLE_TEXT_OUTPUT_PROTOCOL interface\r
1826 /// that is associated with StandardErrorHandle.\r
1827 ///\r
1828 EFI_SIMPLE_TEXT_OUTPUT_PROTOCOL *StdErr;\r
1829 ///\r
1830 /// A pointer to the EFI Runtime Services Table.\r
1831 ///\r
1832 EFI_RUNTIME_SERVICES *RuntimeServices;\r
1833 ///\r
1834 /// A pointer to the EFI Boot Services Table.\r
1835 ///\r
1836 EFI_BOOT_SERVICES *BootServices;\r
1837 ///\r
1838 /// The number of system configuration tables in the buffer ConfigurationTable.\r
1839 ///\r
1840 UINTN NumberOfTableEntries;\r
1841 ///\r
1842 /// A pointer to the system configuration tables.\r
1843 /// The number of entries in the table is NumberOfTableEntries.\r
1844 ///\r
1845 EFI_CONFIGURATION_TABLE *ConfigurationTable;\r
1846};\r
1847\r
1848//\r
1849// EFI Load Options Attributes\r
1850//\r
1851#define LOAD_OPTION_ACTIVE 0x00000001\r
1852#define LOAD_OPTION_FORCE_RECONNECT 0x00000002\r
1853#define LOAD_OPTION_HIDDEN 0x00000008\r
1854#define LOAD_OPTION_CATEGORY 0x00001F00\r
1855\r
1856#define LOAD_OPTION_CATEGORY_BOOT 0x00000000\r
1857#define LOAD_OPTION_CATEGORY_APP 0x00000100\r
1858\r
1859#define EFI_BOOT_OPTION_SUPPORT_KEY 0x00000001\r
1860#define EFI_BOOT_OPTION_SUPPORT_APP 0x00000002\r
1861#define EFI_BOOT_OPTION_SUPPORT_COUNT 0x00000300\r
1862\r
1863typedef union {\r
1864 struct {\r
1865 UINT32 Revision : 8;\r
1866 UINT32 ShiftPressed : 1;\r
1867 UINT32 ControlPressed : 1;\r
1868 UINT32 AltPressed : 1;\r
1869 UINT32 LogoPressed : 1;\r
1870 UINT32 MenuPressed : 1;\r
1871 UINT32 SysReqPessed : 1;\r
1872 UINT32 Reserved : 16;\r
1873 UINT32 InputKeyCount : 2;\r
1874 } Options;\r
1875 UINT32 PackedValue;\r
1876} HOT_KEY_EFI_KEY_DATA;\r
1877\r
1878typedef struct {\r
1879 HOT_KEY_EFI_KEY_DATA KeyOptions;\r
1880 UINT32 BootOptionCrc;\r
1881 UINT16 BootOption;\r
1882//EFI_INPUT_KEY Keys[];\r
1883} EFI_KEY_OPTION;\r
1884\r
1885#define EFI_KEY_OPTION_SHIFT 0x00000001\r
1886#define EFI_KEY_OPTION_CONTROL 0x00000002\r
1887#define EFI_KEY_OPTION_ALT 0x00000004\r
1888#define EFI_KEY_OPTION_LOGO 0x00000008\r
1889#define EFI_KEY_OPTION_MENU 0x00000010\r
1890#define EFI_KEY_OPTION_SYSREQ 0x00000020\r
1891#define EFI_KEY_CODE_COUNT 0x00000300\r
1892\r
1893\r
1894//\r
1895// EFI File location to boot from on removable media devices\r
1896//\r
1897#define EFI_REMOVABLE_MEDIA_FILE_NAME_IA32 L"\\EFI\\BOOT\\BOOTIA32.EFI"\r
1898#define EFI_REMOVABLE_MEDIA_FILE_NAME_IA64 L"\\EFI\\BOOT\\BOOTIA64.EFI"\r
1899#define EFI_REMOVABLE_MEDIA_FILE_NAME_X64 L"\\EFI\\BOOT\\BOOTX64.EFI"\r
1900\r
1901#if defined (MDE_CPU_IA32)\r
1902 #define EFI_REMOVABLE_MEDIA_FILE_NAME EFI_REMOVABLE_MEDIA_FILE_NAME_IA32\r
1903#elif defined (MDE_CPU_IPF)\r
1904 #define EFI_REMOVABLE_MEDIA_FILE_NAME EFI_REMOVABLE_MEDIA_FILE_NAME_IA64\r
1905#elif defined (MDE_CPU_X64)\r
1906 #define EFI_REMOVABLE_MEDIA_FILE_NAME EFI_REMOVABLE_MEDIA_FILE_NAME_X64\r
1907#elif defined (MDE_CPU_EBC)\r
1908#else\r
1909 #error Unknown Processor Type\r
1910#endif\r
1911\r
1912#include <Uefi/UefiPxe.h>\r
1913#include <Uefi/UefiGpt.h>\r
1914#include <Uefi/UefiInternalFormRepresentation.h>\r
1915\r
1916#endif\r