]> git.proxmox.com Git - mirror_edk2.git/blob - MdeModulePkg/Core/Dxe/DxeMain.h
Add the DriverFamilyOverride support in DxeCore.
[mirror_edk2.git] / MdeModulePkg / Core / Dxe / DxeMain.h
1 /** @file
2 The internal header file includes the common header files, defines
3 internal structure and functions used by DxeCore module.
4
5 Copyright (c) 2006 - 2011, Intel Corporation. All rights reserved.<BR>
6 This program and the accompanying materials
7 are licensed and made available under the terms and conditions of the BSD License
8 which accompanies this distribution. The full text of the license may be found at
9 http://opensource.org/licenses/bsd-license.php
10
11 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
12 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
13
14 **/
15
16 #ifndef _DXE_MAIN_H_
17 #define _DXE_MAIN_H_
18
19
20
21 #include <PiDxe.h>
22
23 #include <Protocol/LoadedImage.h>
24 #include <Protocol/GuidedSectionExtraction.h>
25 #include <Protocol/DevicePath.h>
26 #include <Protocol/Runtime.h>
27 #include <Protocol/LoadFile.h>
28 #include <Protocol/LoadFile2.h>
29 #include <Protocol/DriverBinding.h>
30 #include <Protocol/VariableWrite.h>
31 #include <Protocol/PlatformDriverOverride.h>
32 #include <Protocol/Variable.h>
33 #include <Protocol/Timer.h>
34 #include <Protocol/SimpleFileSystem.h>
35 #include <Protocol/Bds.h>
36 #include <Protocol/RealTimeClock.h>
37 #include <Protocol/WatchdogTimer.h>
38 #include <Protocol/FirmwareVolume2.h>
39 #include <Protocol/MonotonicCounter.h>
40 #include <Protocol/StatusCode.h>
41 #include <Protocol/Decompress.h>
42 #include <Protocol/LoadPe32Image.h>
43 #include <Protocol/Security.h>
44 #include <Protocol/Ebc.h>
45 #include <Protocol/Reset.h>
46 #include <Protocol/Cpu.h>
47 #include <Protocol/Metronome.h>
48 #include <Protocol/FirmwareVolumeBlock.h>
49 #include <Protocol/Capsule.h>
50 #include <Protocol/BusSpecificDriverOverride.h>
51 #include <Protocol/DriverFamilyOverride.h>
52 #include <Protocol/TcgService.h>
53 #include <Protocol/HiiPackageList.h>
54 #include <Protocol/SmmBase2.h>
55 #include <Guid/MemoryTypeInformation.h>
56 #include <Guid/FirmwareFileSystem2.h>
57 #include <Guid/HobList.h>
58 #include <Guid/DebugImageInfoTable.h>
59 #include <Guid/FileInfo.h>
60 #include <Guid/Apriori.h>
61 #include <Guid/DxeServices.h>
62 #include <Guid/MemoryAllocationHob.h>
63 #include <Guid/EventLegacyBios.h>
64 #include <Guid/EventGroup.h>
65 #include <Guid/LoadModuleAtFixedAddress.h>
66
67 #include <Library/DxeCoreEntryPoint.h>
68 #include <Library/DebugLib.h>
69 #include <Library/UefiLib.h>
70 #include <Library/BaseLib.h>
71 #include <Library/HobLib.h>
72 #include <Library/PerformanceLib.h>
73 #include <Library/UefiDecompressLib.h>
74 #include <Library/ExtractGuidedSectionLib.h>
75 #include <Library/CacheMaintenanceLib.h>
76 #include <Library/BaseMemoryLib.h>
77 #include <Library/PeCoffLib.h>
78 #include <Library/PeCoffGetEntryPointLib.h>
79 #include <Library/PeCoffExtraActionLib.h>
80 #include <Library/PcdLib.h>
81 #include <Library/MemoryAllocationLib.h>
82 #include <Library/DevicePathLib.h>
83 #include <Library/UefiBootServicesTableLib.h>
84 #include <Library/ReportStatusCodeLib.h>
85 #include <Library/TimerLib.h>
86 #include <Library/DxeServicesLib.h>
87 #include <Library/DebugAgentLib.h>
88
89
90 //
91 // attributes for reserved memory before it is promoted to system memory
92 //
93 #define EFI_MEMORY_PRESENT 0x0100000000000000ULL
94 #define EFI_MEMORY_INITIALIZED 0x0200000000000000ULL
95 #define EFI_MEMORY_TESTED 0x0400000000000000ULL
96
97 //
98 // range for memory mapped port I/O on IPF
99 //
100 #define EFI_MEMORY_PORT_IO 0x4000000000000000ULL
101
102
103 ///
104 /// EFI_DEP_REPLACE_TRUE - Used to dynamically patch the dependecy expression
105 /// to save time. A EFI_DEP_PUSH is evauated one an
106 /// replaced with EFI_DEP_REPLACE_TRUE. If PI spec's Vol 2
107 /// Driver Execution Environment Core Interface use 0xff
108 /// as new DEPEX opcode. EFI_DEP_REPLACE_TRUE should be
109 /// defined to a new value that is not conflicting with PI spec.
110 ///
111 #define EFI_DEP_REPLACE_TRUE 0xff
112
113 ///
114 /// Define the initial size of the dependency expression evaluation stack
115 ///
116 #define DEPEX_STACK_SIZE_INCREMENT 0x1000
117
118 typedef struct {
119 EFI_GUID *ProtocolGuid;
120 VOID **Protocol;
121 EFI_EVENT Event;
122 VOID *Registration;
123 BOOLEAN Present;
124 } EFI_CORE_PROTOCOL_NOTIFY_ENTRY;
125
126 //
127 // DXE Dispatcher Data structures
128 //
129
130 #define KNOWN_HANDLE_SIGNATURE SIGNATURE_32('k','n','o','w')
131 typedef struct {
132 UINTN Signature;
133 LIST_ENTRY Link; // mFvHandleList
134 EFI_HANDLE Handle;
135 } KNOWN_HANDLE;
136
137
138 #define EFI_CORE_DRIVER_ENTRY_SIGNATURE SIGNATURE_32('d','r','v','r')
139 typedef struct {
140 UINTN Signature;
141 LIST_ENTRY Link; // mDriverList
142
143 LIST_ENTRY ScheduledLink; // mScheduledQueue
144
145 EFI_HANDLE FvHandle;
146 EFI_GUID FileName;
147 EFI_DEVICE_PATH_PROTOCOL *FvFileDevicePath;
148 EFI_FIRMWARE_VOLUME2_PROTOCOL *Fv;
149
150 VOID *Depex;
151 UINTN DepexSize;
152
153 BOOLEAN Before;
154 BOOLEAN After;
155 EFI_GUID BeforeAfterGuid;
156
157 BOOLEAN Dependent;
158 BOOLEAN Unrequested;
159 BOOLEAN Scheduled;
160 BOOLEAN Untrusted;
161 BOOLEAN Initialized;
162 BOOLEAN DepexProtocolError;
163
164 EFI_HANDLE ImageHandle;
165
166 } EFI_CORE_DRIVER_ENTRY;
167
168 //
169 //The data structure of GCD memory map entry
170 //
171 #define EFI_GCD_MAP_SIGNATURE SIGNATURE_32('g','c','d','m')
172 typedef struct {
173 UINTN Signature;
174 LIST_ENTRY Link;
175 EFI_PHYSICAL_ADDRESS BaseAddress;
176 UINT64 EndAddress;
177 UINT64 Capabilities;
178 UINT64 Attributes;
179 EFI_GCD_MEMORY_TYPE GcdMemoryType;
180 EFI_GCD_IO_TYPE GcdIoType;
181 EFI_HANDLE ImageHandle;
182 EFI_HANDLE DeviceHandle;
183 } EFI_GCD_MAP_ENTRY;
184
185 //
186 // DXE Core Global Variables
187 //
188 extern EFI_SYSTEM_TABLE *gDxeCoreST;
189 extern EFI_RUNTIME_SERVICES *gDxeCoreRT;
190 extern EFI_DXE_SERVICES *gDxeCoreDS;
191 extern EFI_HANDLE gDxeCoreImageHandle;
192
193 extern EFI_DECOMPRESS_PROTOCOL gEfiDecompress;
194
195 extern EFI_RUNTIME_ARCH_PROTOCOL *gRuntime;
196 extern EFI_CPU_ARCH_PROTOCOL *gCpu;
197 extern EFI_WATCHDOG_TIMER_ARCH_PROTOCOL *gWatchdogTimer;
198 extern EFI_METRONOME_ARCH_PROTOCOL *gMetronome;
199 extern EFI_TIMER_ARCH_PROTOCOL *gTimer;
200 extern EFI_SECURITY_ARCH_PROTOCOL *gSecurity;
201 extern EFI_BDS_ARCH_PROTOCOL *gBds;
202 extern EFI_SMM_BASE2_PROTOCOL *gSmmBase2;
203
204 extern EFI_TPL gEfiCurrentTpl;
205
206 extern EFI_GUID *gDxeCoreFileName;
207 extern EFI_LOADED_IMAGE_PROTOCOL *gDxeCoreLoadedImage;
208
209 extern EFI_MEMORY_TYPE_INFORMATION gMemoryTypeInformation[EfiMaxMemoryType + 1];
210
211 extern BOOLEAN gDispatcherRunning;
212 extern EFI_RUNTIME_ARCH_PROTOCOL gRuntimeTemplate;
213
214 extern EFI_LOAD_FIXED_ADDRESS_CONFIGURATION_TABLE gLoadModuleAtFixAddressConfigurationTable;
215 extern BOOLEAN gLoadFixedAddressCodeMemoryReady;
216 //
217 // Service Initialization Functions
218 //
219
220
221
222 /**
223 Called to initialize the pool.
224
225 **/
226 VOID
227 CoreInitializePool (
228 VOID
229 );
230
231
232 /**
233 Called to initialize the memory map and add descriptors to
234 the current descriptor list.
235 The first descriptor that is added must be general usable
236 memory as the addition allocates heap.
237
238 @param Type The type of memory to add
239 @param Start The starting address in the memory range Must be
240 page aligned
241 @param NumberOfPages The number of pages in the range
242 @param Attribute Attributes of the memory to add
243
244 @return None. The range is added to the memory map
245
246 **/
247 VOID
248 CoreAddMemoryDescriptor (
249 IN EFI_MEMORY_TYPE Type,
250 IN EFI_PHYSICAL_ADDRESS Start,
251 IN UINT64 NumberOfPages,
252 IN UINT64 Attribute
253 );
254
255
256 /**
257 Release memory lock on mGcdMemorySpaceLock.
258
259 **/
260 VOID
261 CoreReleaseGcdMemoryLock (
262 VOID
263 );
264
265
266 /**
267 Acquire memory lock on mGcdMemorySpaceLock.
268
269 **/
270 VOID
271 CoreAcquireGcdMemoryLock (
272 VOID
273 );
274
275
276 /**
277 External function. Initializes memory services based on the memory
278 descriptor HOBs. This function is responsible for priming the memory
279 map, so memory allocations and resource allocations can be made.
280 The first part of this function can not depend on any memory services
281 until at least one memory descriptor is provided to the memory services.
282
283 @param HobStart The start address of the HOB.
284 @param MemoryBaseAddress Start address of memory region found to init DXE
285 core.
286 @param MemoryLength Length of memory region found to init DXE core.
287
288 @retval EFI_SUCCESS Memory services successfully initialized.
289
290 **/
291 EFI_STATUS
292 CoreInitializeMemoryServices (
293 IN VOID **HobStart,
294 OUT EFI_PHYSICAL_ADDRESS *MemoryBaseAddress,
295 OUT UINT64 *MemoryLength
296 );
297
298
299
300 /**
301 External function. Initializes the GCD and memory services based on the memory
302 descriptor HOBs. This function is responsible for priming the GCD map and the
303 memory map, so memory allocations and resource allocations can be made. The
304 HobStart will be relocated to a pool buffer.
305
306 @param HobStart The start address of the HOB
307 @param MemoryBaseAddress Start address of memory region found to init DXE
308 core.
309 @param MemoryLength Length of memory region found to init DXE core.
310
311 @retval EFI_SUCCESS GCD services successfully initialized.
312
313 **/
314 EFI_STATUS
315 CoreInitializeGcdServices (
316 IN OUT VOID **HobStart,
317 IN EFI_PHYSICAL_ADDRESS MemoryBaseAddress,
318 IN UINT64 MemoryLength
319 );
320
321
322 /**
323 Initializes "event" support.
324
325 @retval EFI_SUCCESS Always return success
326
327 **/
328 EFI_STATUS
329 CoreInitializeEventServices (
330 VOID
331 );
332
333
334 /**
335 Add the Image Services to EFI Boot Services Table and install the protocol
336 interfaces for this image.
337
338 @param HobStart The HOB to initialize
339
340 @return Status code.
341
342 **/
343 EFI_STATUS
344 CoreInitializeImageServices (
345 IN VOID *HobStart
346 );
347
348
349 /**
350 Creates an event that is fired everytime a Protocol of a specific type is installed.
351
352 **/
353 VOID
354 CoreNotifyOnProtocolInstallation (
355 VOID
356 );
357
358
359 /**
360 Return TRUE if all AP services are availible.
361
362 @retval EFI_SUCCESS All AP services are available
363 @retval EFI_NOT_FOUND At least one AP service is not available
364
365 **/
366 EFI_STATUS
367 CoreAllEfiServicesAvailable (
368 VOID
369 );
370
371
372 /**
373 Calcualte the 32-bit CRC in a EFI table using the service provided by the
374 gRuntime service.
375
376 @param Hdr Pointer to an EFI standard header
377
378 **/
379 VOID
380 CalculateEfiHdrCrc (
381 IN OUT EFI_TABLE_HEADER *Hdr
382 );
383
384
385 /**
386 Called by the platform code to process a tick.
387
388 @param Duration The number of 100ns elasped since the last call
389 to TimerTick
390
391 **/
392 VOID
393 EFIAPI
394 CoreTimerTick (
395 IN UINT64 Duration
396 );
397
398
399 /**
400 Initialize the dispatcher. Initialize the notification function that runs when
401 an FV2 protocol is added to the system.
402
403 **/
404 VOID
405 CoreInitializeDispatcher (
406 VOID
407 );
408
409
410 /**
411 This is the POSTFIX version of the dependency evaluator. This code does
412 not need to handle Before or After, as it is not valid to call this
413 routine in this case. The SOR is just ignored and is a nop in the grammer.
414 POSTFIX means all the math is done on top of the stack.
415
416 @param DriverEntry DriverEntry element to update.
417
418 @retval TRUE If driver is ready to run.
419 @retval FALSE If driver is not ready to run or some fatal error
420 was found.
421
422 **/
423 BOOLEAN
424 CoreIsSchedulable (
425 IN EFI_CORE_DRIVER_ENTRY *DriverEntry
426 );
427
428
429 /**
430 Preprocess dependency expression and update DriverEntry to reflect the
431 state of Before, After, and SOR dependencies. If DriverEntry->Before
432 or DriverEntry->After is set it will never be cleared. If SOR is set
433 it will be cleared by CoreSchedule(), and then the driver can be
434 dispatched.
435
436 @param DriverEntry DriverEntry element to update .
437
438 @retval EFI_SUCCESS It always works.
439
440 **/
441 EFI_STATUS
442 CorePreProcessDepex (
443 IN EFI_CORE_DRIVER_ENTRY *DriverEntry
444 );
445
446
447
448 /**
449 Terminates all boot services.
450
451 @param ImageHandle Handle that identifies the exiting image.
452 @param MapKey Key to the latest memory map.
453
454 @retval EFI_SUCCESS Boot Services terminated
455 @retval EFI_INVALID_PARAMETER MapKey is incorrect.
456
457 **/
458 EFI_STATUS
459 EFIAPI
460 CoreExitBootServices (
461 IN EFI_HANDLE ImageHandle,
462 IN UINTN MapKey
463 );
464
465
466 /**
467 Make sure the memory map is following all the construction rules,
468 it is the last time to check memory map error before exit boot services.
469
470 @param MapKey Memory map key
471
472 @retval EFI_INVALID_PARAMETER Memory map not consistent with construction
473 rules.
474 @retval EFI_SUCCESS Valid memory map.
475
476 **/
477 EFI_STATUS
478 CoreTerminateMemoryMap (
479 IN UINTN MapKey
480 );
481
482
483 /**
484 Signals all events in the EventGroup.
485
486 @param EventGroup The list to signal
487
488 **/
489 VOID
490 CoreNotifySignalList (
491 IN EFI_GUID *EventGroup
492 );
493
494
495
496 /**
497 Boot Service called to add, modify, or remove a system configuration table from
498 the EFI System Table.
499
500 @param Guid Pointer to the GUID for the entry to add, update, or
501 remove
502 @param Table Pointer to the configuration table for the entry to add,
503 update, or remove, may be NULL.
504
505 @return EFI_SUCCESS Guid, Table pair added, updated, or removed.
506 @return EFI_INVALID_PARAMETER Input GUID not valid.
507 @return EFI_NOT_FOUND Attempted to delete non-existant entry
508 @return EFI_OUT_OF_RESOURCES Not enough memory available
509
510 **/
511 EFI_STATUS
512 EFIAPI
513 CoreInstallConfigurationTable (
514 IN EFI_GUID *Guid,
515 IN VOID *Table
516 );
517
518
519
520 /**
521 Raise the task priority level to the new level.
522 High level is implemented by disabling processor interrupts.
523
524 @param NewTpl New task priority level
525
526 @return The previous task priority level
527
528 **/
529 EFI_TPL
530 EFIAPI
531 CoreRaiseTpl (
532 IN EFI_TPL NewTpl
533 );
534
535
536
537 /**
538 Lowers the task priority to the previous value. If the new
539 priority unmasks events at a higher priority, they are dispatched.
540
541 @param NewTpl New, lower, task priority
542
543 **/
544 VOID
545 EFIAPI
546 CoreRestoreTpl (
547 IN EFI_TPL NewTpl
548 );
549
550
551
552 /**
553 Introduces a fine-grained stall.
554
555 @param Microseconds The number of microseconds to stall execution.
556
557 @retval EFI_SUCCESS Execution was stalled for at least the requested
558 amount of microseconds.
559 @retval EFI_NOT_AVAILABLE_YET gMetronome is not available yet
560
561 **/
562 EFI_STATUS
563 EFIAPI
564 CoreStall (
565 IN UINTN Microseconds
566 );
567
568
569
570 /**
571 Sets the system's watchdog timer.
572
573 @param Timeout The number of seconds to set the watchdog timer to.
574 A value of zero disables the timer.
575 @param WatchdogCode The numeric code to log on a watchdog timer timeout
576 event. The firmware reserves codes 0x0000 to 0xFFFF.
577 Loaders and operating systems may use other timeout
578 codes.
579 @param DataSize The size, in bytes, of WatchdogData.
580 @param WatchdogData A data buffer that includes a Null-terminated Unicode
581 string, optionally followed by additional binary data.
582 The string is a description that the call may use to
583 further indicate the reason to be logged with a
584 watchdog event.
585
586 @return EFI_SUCCESS Timeout has been set
587 @return EFI_NOT_AVAILABLE_YET WatchdogTimer is not available yet
588 @return EFI_UNSUPPORTED System does not have a timer (currently not used)
589 @return EFI_DEVICE_ERROR Could not complete due to hardware error
590
591 **/
592 EFI_STATUS
593 EFIAPI
594 CoreSetWatchdogTimer (
595 IN UINTN Timeout,
596 IN UINT64 WatchdogCode,
597 IN UINTN DataSize,
598 IN CHAR16 *WatchdogData OPTIONAL
599 );
600
601
602
603 /**
604 Wrapper function to CoreInstallProtocolInterfaceNotify. This is the public API which
605 Calls the private one which contains a BOOLEAN parameter for notifications
606
607 @param UserHandle The handle to install the protocol handler on,
608 or NULL if a new handle is to be allocated
609 @param Protocol The protocol to add to the handle
610 @param InterfaceType Indicates whether Interface is supplied in
611 native form.
612 @param Interface The interface for the protocol being added
613
614 @return Status code
615
616 **/
617 EFI_STATUS
618 EFIAPI
619 CoreInstallProtocolInterface (
620 IN OUT EFI_HANDLE *UserHandle,
621 IN EFI_GUID *Protocol,
622 IN EFI_INTERFACE_TYPE InterfaceType,
623 IN VOID *Interface
624 );
625
626
627 /**
628 Installs a protocol interface into the boot services environment.
629
630 @param UserHandle The handle to install the protocol handler on,
631 or NULL if a new handle is to be allocated
632 @param Protocol The protocol to add to the handle
633 @param InterfaceType Indicates whether Interface is supplied in
634 native form.
635 @param Interface The interface for the protocol being added
636 @param Notify indicates whether notify the notification list
637 for this protocol
638
639 @retval EFI_INVALID_PARAMETER Invalid parameter
640 @retval EFI_OUT_OF_RESOURCES No enough buffer to allocate
641 @retval EFI_SUCCESS Protocol interface successfully installed
642
643 **/
644 EFI_STATUS
645 CoreInstallProtocolInterfaceNotify (
646 IN OUT EFI_HANDLE *UserHandle,
647 IN EFI_GUID *Protocol,
648 IN EFI_INTERFACE_TYPE InterfaceType,
649 IN VOID *Interface,
650 IN BOOLEAN Notify
651 );
652
653
654
655 /**
656 Installs a list of protocol interface into the boot services environment.
657 This function calls InstallProtocolInterface() in a loop. If any error
658 occures all the protocols added by this function are removed. This is
659 basically a lib function to save space.
660
661 @param Handle The handle to install the protocol handlers on,
662 or NULL if a new handle is to be allocated
663 @param ... EFI_GUID followed by protocol instance. A NULL
664 terminates the list. The pairs are the
665 arguments to InstallProtocolInterface(). All the
666 protocols are added to Handle.
667
668 @retval EFI_INVALID_PARAMETER Handle is NULL.
669 @retval EFI_SUCCESS Protocol interfaces successfully installed.
670
671 **/
672 EFI_STATUS
673 EFIAPI
674 CoreInstallMultipleProtocolInterfaces (
675 IN OUT EFI_HANDLE *Handle,
676 ...
677 );
678
679
680
681 /**
682 Uninstalls a list of protocol interface in the boot services environment.
683 This function calls UnisatllProtocolInterface() in a loop. This is
684 basically a lib function to save space.
685
686 @param Handle The handle to uninstall the protocol
687 @param ... EFI_GUID followed by protocol instance. A NULL
688 terminates the list. The pairs are the
689 arguments to UninstallProtocolInterface(). All
690 the protocols are added to Handle.
691
692 @return Status code
693
694 **/
695 EFI_STATUS
696 EFIAPI
697 CoreUninstallMultipleProtocolInterfaces (
698 IN EFI_HANDLE Handle,
699 ...
700 );
701
702
703
704 /**
705 Reinstall a protocol interface on a device handle. The OldInterface for Protocol is replaced by the NewInterface.
706
707 @param UserHandle Handle on which the interface is to be
708 reinstalled
709 @param Protocol The numeric ID of the interface
710 @param OldInterface A pointer to the old interface
711 @param NewInterface A pointer to the new interface
712
713 @retval EFI_SUCCESS The protocol interface was installed
714 @retval EFI_NOT_FOUND The OldInterface on the handle was not found
715 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value
716
717 **/
718 EFI_STATUS
719 EFIAPI
720 CoreReinstallProtocolInterface (
721 IN EFI_HANDLE UserHandle,
722 IN EFI_GUID *Protocol,
723 IN VOID *OldInterface,
724 IN VOID *NewInterface
725 );
726
727
728
729 /**
730 Uninstalls all instances of a protocol:interfacer from a handle.
731 If the last protocol interface is remove from the handle, the
732 handle is freed.
733
734 @param UserHandle The handle to remove the protocol handler from
735 @param Protocol The protocol, of protocol:interface, to remove
736 @param Interface The interface, of protocol:interface, to remove
737
738 @retval EFI_INVALID_PARAMETER Protocol is NULL.
739 @retval EFI_SUCCESS Protocol interface successfully uninstalled.
740
741 **/
742 EFI_STATUS
743 EFIAPI
744 CoreUninstallProtocolInterface (
745 IN EFI_HANDLE UserHandle,
746 IN EFI_GUID *Protocol,
747 IN VOID *Interface
748 );
749
750
751
752 /**
753 Queries a handle to determine if it supports a specified protocol.
754
755 @param UserHandle The handle being queried.
756 @param Protocol The published unique identifier of the protocol.
757 @param Interface Supplies the address where a pointer to the
758 corresponding Protocol Interface is returned.
759
760 @return The requested protocol interface for the handle
761
762 **/
763 EFI_STATUS
764 EFIAPI
765 CoreHandleProtocol (
766 IN EFI_HANDLE UserHandle,
767 IN EFI_GUID *Protocol,
768 OUT VOID **Interface
769 );
770
771
772
773 /**
774 Locates the installed protocol handler for the handle, and
775 invokes it to obtain the protocol interface. Usage information
776 is registered in the protocol data base.
777
778 @param UserHandle The handle to obtain the protocol interface on
779 @param Protocol The ID of the protocol
780 @param Interface The location to return the protocol interface
781 @param ImageHandle The handle of the Image that is opening the
782 protocol interface specified by Protocol and
783 Interface.
784 @param ControllerHandle The controller handle that is requiring this
785 interface.
786 @param Attributes The open mode of the protocol interface
787 specified by Handle and Protocol.
788
789 @retval EFI_INVALID_PARAMETER Protocol is NULL.
790 @retval EFI_SUCCESS Get the protocol interface.
791
792 **/
793 EFI_STATUS
794 EFIAPI
795 CoreOpenProtocol (
796 IN EFI_HANDLE UserHandle,
797 IN EFI_GUID *Protocol,
798 OUT VOID **Interface OPTIONAL,
799 IN EFI_HANDLE ImageHandle,
800 IN EFI_HANDLE ControllerHandle,
801 IN UINT32 Attributes
802 );
803
804
805
806 /**
807 Return information about Opened protocols in the system
808
809 @param UserHandle The handle to close the protocol interface on
810 @param Protocol The ID of the protocol
811 @param EntryBuffer A pointer to a buffer of open protocol
812 information in the form of
813 EFI_OPEN_PROTOCOL_INFORMATION_ENTRY structures.
814 @param EntryCount Number of EntryBuffer entries
815
816 **/
817 EFI_STATUS
818 EFIAPI
819 CoreOpenProtocolInformation (
820 IN EFI_HANDLE UserHandle,
821 IN EFI_GUID *Protocol,
822 OUT EFI_OPEN_PROTOCOL_INFORMATION_ENTRY **EntryBuffer,
823 OUT UINTN *EntryCount
824 );
825
826
827
828 /**
829 Closes a protocol on a handle that was opened using OpenProtocol().
830
831 @param UserHandle The handle for the protocol interface that was
832 previously opened with OpenProtocol(), and is
833 now being closed.
834 @param Protocol The published unique identifier of the protocol.
835 It is the caller's responsibility to pass in a
836 valid GUID.
837 @param AgentHandle The handle of the agent that is closing the
838 protocol interface.
839 @param ControllerHandle If the agent that opened a protocol is a driver
840 that follows the EFI Driver Model, then this
841 parameter is the controller handle that required
842 the protocol interface. If the agent does not
843 follow the EFI Driver Model, then this parameter
844 is optional and may be NULL.
845
846 @retval EFI_SUCCESS The protocol instance was closed.
847 @retval EFI_INVALID_PARAMETER Handle, AgentHandle or ControllerHandle is not a
848 valid EFI_HANDLE.
849 @retval EFI_NOT_FOUND Can not find the specified protocol or
850 AgentHandle.
851
852 **/
853 EFI_STATUS
854 EFIAPI
855 CoreCloseProtocol (
856 IN EFI_HANDLE UserHandle,
857 IN EFI_GUID *Protocol,
858 IN EFI_HANDLE AgentHandle,
859 IN EFI_HANDLE ControllerHandle
860 );
861
862
863
864 /**
865 Retrieves the list of protocol interface GUIDs that are installed on a handle in a buffer allocated
866 from pool.
867
868 @param UserHandle The handle from which to retrieve the list of
869 protocol interface GUIDs.
870 @param ProtocolBuffer A pointer to the list of protocol interface GUID
871 pointers that are installed on Handle.
872 @param ProtocolBufferCount A pointer to the number of GUID pointers present
873 in ProtocolBuffer.
874
875 @retval EFI_SUCCESS The list of protocol interface GUIDs installed
876 on Handle was returned in ProtocolBuffer. The
877 number of protocol interface GUIDs was returned
878 in ProtocolBufferCount.
879 @retval EFI_INVALID_PARAMETER Handle is NULL.
880 @retval EFI_INVALID_PARAMETER Handle is not a valid EFI_HANDLE.
881 @retval EFI_INVALID_PARAMETER ProtocolBuffer is NULL.
882 @retval EFI_INVALID_PARAMETER ProtocolBufferCount is NULL.
883 @retval EFI_OUT_OF_RESOURCES There is not enough pool memory to store the
884 results.
885
886 **/
887 EFI_STATUS
888 EFIAPI
889 CoreProtocolsPerHandle (
890 IN EFI_HANDLE UserHandle,
891 OUT EFI_GUID ***ProtocolBuffer,
892 OUT UINTN *ProtocolBufferCount
893 );
894
895
896
897 /**
898 Add a new protocol notification record for the request protocol.
899
900 @param Protocol The requested protocol to add the notify
901 registration
902 @param Event The event to signal
903 @param Registration Returns the registration record
904
905 @retval EFI_INVALID_PARAMETER Invalid parameter
906 @retval EFI_SUCCESS Successfully returned the registration record
907 that has been added
908
909 **/
910 EFI_STATUS
911 EFIAPI
912 CoreRegisterProtocolNotify (
913 IN EFI_GUID *Protocol,
914 IN EFI_EVENT Event,
915 OUT VOID **Registration
916 );
917
918
919 /**
920 Removes all the events in the protocol database that match Event.
921
922 @param Event The event to search for in the protocol
923 database.
924
925 @return EFI_SUCCESS when done searching the entire database.
926
927 **/
928 EFI_STATUS
929 CoreUnregisterProtocolNotify (
930 IN EFI_EVENT Event
931 );
932
933
934 /**
935 Locates the requested handle(s) and returns them in Buffer.
936
937 @param SearchType The type of search to perform to locate the
938 handles
939 @param Protocol The protocol to search for
940 @param SearchKey Dependant on SearchType
941 @param BufferSize On input the size of Buffer. On output the
942 size of data returned.
943 @param Buffer The buffer to return the results in
944
945 @retval EFI_BUFFER_TOO_SMALL Buffer too small, required buffer size is
946 returned in BufferSize.
947 @retval EFI_INVALID_PARAMETER Invalid parameter
948 @retval EFI_SUCCESS Successfully found the requested handle(s) and
949 returns them in Buffer.
950
951 **/
952 EFI_STATUS
953 EFIAPI
954 CoreLocateHandle (
955 IN EFI_LOCATE_SEARCH_TYPE SearchType,
956 IN EFI_GUID *Protocol OPTIONAL,
957 IN VOID *SearchKey OPTIONAL,
958 IN OUT UINTN *BufferSize,
959 OUT EFI_HANDLE *Buffer
960 );
961
962
963
964 /**
965 Locates the handle to a device on the device path that best matches the specified protocol.
966
967 @param Protocol The protocol to search for.
968 @param DevicePath On input, a pointer to a pointer to the device
969 path. On output, the device path pointer is
970 modified to point to the remaining part of the
971 devicepath.
972 @param Device A pointer to the returned device handle.
973
974 @retval EFI_SUCCESS The resulting handle was returned.
975 @retval EFI_NOT_FOUND No handles matched the search.
976 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
977
978 **/
979 EFI_STATUS
980 EFIAPI
981 CoreLocateDevicePath (
982 IN EFI_GUID *Protocol,
983 IN OUT EFI_DEVICE_PATH_PROTOCOL **DevicePath,
984 OUT EFI_HANDLE *Device
985 );
986
987
988
989 /**
990 Function returns an array of handles that support the requested protocol
991 in a buffer allocated from pool. This is a version of CoreLocateHandle()
992 that allocates a buffer for the caller.
993
994 @param SearchType Specifies which handle(s) are to be returned.
995 @param Protocol Provides the protocol to search by. This
996 parameter is only valid for SearchType
997 ByProtocol.
998 @param SearchKey Supplies the search key depending on the
999 SearchType.
1000 @param NumberHandles The number of handles returned in Buffer.
1001 @param Buffer A pointer to the buffer to return the requested
1002 array of handles that support Protocol.
1003
1004 @retval EFI_SUCCESS The result array of handles was returned.
1005 @retval EFI_NOT_FOUND No handles match the search.
1006 @retval EFI_OUT_OF_RESOURCES There is not enough pool memory to store the
1007 matching results.
1008 @retval EFI_INVALID_PARAMETER One or more paramters are not valid.
1009
1010 **/
1011 EFI_STATUS
1012 EFIAPI
1013 CoreLocateHandleBuffer (
1014 IN EFI_LOCATE_SEARCH_TYPE SearchType,
1015 IN EFI_GUID *Protocol OPTIONAL,
1016 IN VOID *SearchKey OPTIONAL,
1017 IN OUT UINTN *NumberHandles,
1018 OUT EFI_HANDLE **Buffer
1019 );
1020
1021
1022
1023 /**
1024 Return the first Protocol Interface that matches the Protocol GUID. If
1025 Registration is passed in, return a Protocol Instance that was just add
1026 to the system. If Registration is NULL return the first Protocol Interface
1027 you find.
1028
1029 @param Protocol The protocol to search for
1030 @param Registration Optional Registration Key returned from
1031 RegisterProtocolNotify()
1032 @param Interface Return the Protocol interface (instance).
1033
1034 @retval EFI_SUCCESS If a valid Interface is returned
1035 @retval EFI_INVALID_PARAMETER Invalid parameter
1036 @retval EFI_NOT_FOUND Protocol interface not found
1037
1038 **/
1039 EFI_STATUS
1040 EFIAPI
1041 CoreLocateProtocol (
1042 IN EFI_GUID *Protocol,
1043 IN VOID *Registration OPTIONAL,
1044 OUT VOID **Interface
1045 );
1046
1047
1048 /**
1049 return handle database key.
1050
1051
1052 @return Handle database key.
1053
1054 **/
1055 UINT64
1056 CoreGetHandleDatabaseKey (
1057 VOID
1058 );
1059
1060
1061 /**
1062 Go connect any handles that were created or modified while a image executed.
1063
1064 @param Key The Key to show that the handle has been
1065 created/modified
1066
1067 **/
1068 VOID
1069 CoreConnectHandlesByKey (
1070 UINT64 Key
1071 );
1072
1073
1074
1075 /**
1076 Connects one or more drivers to a controller.
1077
1078 @param ControllerHandle Handle of the controller to be
1079 connected.
1080 @param DriverImageHandle DriverImageHandle A pointer to an
1081 ordered list of driver image
1082 handles.
1083 @param RemainingDevicePath RemainingDevicePath A pointer to
1084 the device path that specifies a
1085 child of the controller specified
1086 by ControllerHandle.
1087 @param Recursive Whether the function would be
1088 called recursively or not.
1089
1090 @return Status code.
1091
1092 **/
1093 EFI_STATUS
1094 EFIAPI
1095 CoreConnectController (
1096 IN EFI_HANDLE ControllerHandle,
1097 IN EFI_HANDLE *DriverImageHandle OPTIONAL,
1098 IN EFI_DEVICE_PATH_PROTOCOL *RemainingDevicePath OPTIONAL,
1099 IN BOOLEAN Recursive
1100 );
1101
1102
1103
1104 /**
1105 Disonnects a controller from a driver
1106
1107 @param ControllerHandle ControllerHandle The handle of
1108 the controller from which
1109 driver(s) are to be
1110 disconnected.
1111 @param DriverImageHandle DriverImageHandle The driver to
1112 disconnect from ControllerHandle.
1113 @param ChildHandle ChildHandle The handle of the
1114 child to destroy.
1115
1116 @retval EFI_SUCCESS One or more drivers were
1117 disconnected from the controller.
1118 @retval EFI_SUCCESS On entry, no drivers are managing
1119 ControllerHandle.
1120 @retval EFI_SUCCESS DriverImageHandle is not NULL,
1121 and on entry DriverImageHandle is
1122 not managing ControllerHandle.
1123 @retval EFI_INVALID_PARAMETER ControllerHandle is not a valid
1124 EFI_HANDLE.
1125 @retval EFI_INVALID_PARAMETER DriverImageHandle is not NULL,
1126 and it is not a valid EFI_HANDLE.
1127 @retval EFI_INVALID_PARAMETER ChildHandle is not NULL, and it
1128 is not a valid EFI_HANDLE.
1129 @retval EFI_OUT_OF_RESOURCES There are not enough resources
1130 available to disconnect any
1131 drivers from ControllerHandle.
1132 @retval EFI_DEVICE_ERROR The controller could not be
1133 disconnected because of a device
1134 error.
1135
1136 **/
1137 EFI_STATUS
1138 EFIAPI
1139 CoreDisconnectController (
1140 IN EFI_HANDLE ControllerHandle,
1141 IN EFI_HANDLE DriverImageHandle OPTIONAL,
1142 IN EFI_HANDLE ChildHandle OPTIONAL
1143 );
1144
1145
1146
1147 /**
1148 Allocates pages from the memory map.
1149
1150 @param Type The type of allocation to perform
1151 @param MemoryType The type of memory to turn the allocated pages
1152 into
1153 @param NumberOfPages The number of pages to allocate
1154 @param Memory A pointer to receive the base allocated memory
1155 address
1156
1157 @return Status. On success, Memory is filled in with the base address allocated
1158 @retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in
1159 spec.
1160 @retval EFI_NOT_FOUND Could not allocate pages match the requirement.
1161 @retval EFI_OUT_OF_RESOURCES No enough pages to allocate.
1162 @retval EFI_SUCCESS Pages successfully allocated.
1163
1164 **/
1165 EFI_STATUS
1166 EFIAPI
1167 CoreAllocatePages (
1168 IN EFI_ALLOCATE_TYPE Type,
1169 IN EFI_MEMORY_TYPE MemoryType,
1170 IN UINTN NumberOfPages,
1171 IN OUT EFI_PHYSICAL_ADDRESS *Memory
1172 );
1173
1174
1175
1176 /**
1177 Frees previous allocated pages.
1178
1179 @param Memory Base address of memory being freed
1180 @param NumberOfPages The number of pages to free
1181
1182 @retval EFI_NOT_FOUND Could not find the entry that covers the range
1183 @retval EFI_INVALID_PARAMETER Address not aligned
1184 @return EFI_SUCCESS -Pages successfully freed.
1185
1186 **/
1187 EFI_STATUS
1188 EFIAPI
1189 CoreFreePages (
1190 IN EFI_PHYSICAL_ADDRESS Memory,
1191 IN UINTN NumberOfPages
1192 );
1193
1194
1195
1196 /**
1197 This function returns a copy of the current memory map. The map is an array of
1198 memory descriptors, each of which describes a contiguous block of memory.
1199
1200 @param MemoryMapSize A pointer to the size, in bytes, of the
1201 MemoryMap buffer. On input, this is the size of
1202 the buffer allocated by the caller. On output,
1203 it is the size of the buffer returned by the
1204 firmware if the buffer was large enough, or the
1205 size of the buffer needed to contain the map if
1206 the buffer was too small.
1207 @param MemoryMap A pointer to the buffer in which firmware places
1208 the current memory map.
1209 @param MapKey A pointer to the location in which firmware
1210 returns the key for the current memory map.
1211 @param DescriptorSize A pointer to the location in which firmware
1212 returns the size, in bytes, of an individual
1213 EFI_MEMORY_DESCRIPTOR.
1214 @param DescriptorVersion A pointer to the location in which firmware
1215 returns the version number associated with the
1216 EFI_MEMORY_DESCRIPTOR.
1217
1218 @retval EFI_SUCCESS The memory map was returned in the MemoryMap
1219 buffer.
1220 @retval EFI_BUFFER_TOO_SMALL The MemoryMap buffer was too small. The current
1221 buffer size needed to hold the memory map is
1222 returned in MemoryMapSize.
1223 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
1224
1225 **/
1226 EFI_STATUS
1227 EFIAPI
1228 CoreGetMemoryMap (
1229 IN OUT UINTN *MemoryMapSize,
1230 IN OUT EFI_MEMORY_DESCRIPTOR *MemoryMap,
1231 OUT UINTN *MapKey,
1232 OUT UINTN *DescriptorSize,
1233 OUT UINT32 *DescriptorVersion
1234 );
1235
1236
1237
1238 /**
1239 Allocate pool of a particular type.
1240
1241 @param PoolType Type of pool to allocate
1242 @param Size The amount of pool to allocate
1243 @param Buffer The address to return a pointer to the allocated
1244 pool
1245
1246 @retval EFI_INVALID_PARAMETER PoolType not valid
1247 @retval EFI_OUT_OF_RESOURCES Size exceeds max pool size or allocation failed.
1248 @retval EFI_SUCCESS Pool successfully allocated.
1249
1250 **/
1251 EFI_STATUS
1252 EFIAPI
1253 CoreAllocatePool (
1254 IN EFI_MEMORY_TYPE PoolType,
1255 IN UINTN Size,
1256 OUT VOID **Buffer
1257 );
1258
1259
1260
1261 /**
1262 Frees pool.
1263
1264 @param Buffer The allocated pool entry to free
1265
1266 @retval EFI_INVALID_PARAMETER Buffer is not a valid value.
1267 @retval EFI_SUCCESS Pool successfully freed.
1268
1269 **/
1270 EFI_STATUS
1271 EFIAPI
1272 CoreFreePool (
1273 IN VOID *Buffer
1274 );
1275
1276
1277
1278 /**
1279 Loads an EFI image into memory and returns a handle to the image.
1280
1281 @param BootPolicy If TRUE, indicates that the request originates
1282 from the boot manager, and that the boot
1283 manager is attempting to load FilePath as a
1284 boot selection.
1285 @param ParentImageHandle The caller's image handle.
1286 @param FilePath The specific file path from which the image is
1287 loaded.
1288 @param SourceBuffer If not NULL, a pointer to the memory location
1289 containing a copy of the image to be loaded.
1290 @param SourceSize The size in bytes of SourceBuffer.
1291 @param ImageHandle Pointer to the returned image handle that is
1292 created when the image is successfully loaded.
1293
1294 @retval EFI_SUCCESS The image was loaded into memory.
1295 @retval EFI_NOT_FOUND The FilePath was not found.
1296 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.
1297 @retval EFI_UNSUPPORTED The image type is not supported, or the device
1298 path cannot be parsed to locate the proper
1299 protocol for loading the file.
1300 @retval EFI_OUT_OF_RESOURCES Image was not loaded due to insufficient
1301 resources.
1302 @retval EFI_LOAD_ERROR Image was not loaded because the image format was corrupt or not
1303 understood.
1304 @retval EFI_DEVICE_ERROR Image was not loaded because the device returned a read error.
1305 @retval EFI_ACCESS_DENIED Image was not loaded because the platform policy prohibits the
1306 image from being loaded. NULL is returned in *ImageHandle.
1307 @retval EFI_SECURITY_VIOLATION Image was loaded and an ImageHandle was created with a
1308 valid EFI_LOADED_IMAGE_PROTOCOL. However, the current
1309 platform policy specifies that the image should not be started.
1310
1311 **/
1312 EFI_STATUS
1313 EFIAPI
1314 CoreLoadImage (
1315 IN BOOLEAN BootPolicy,
1316 IN EFI_HANDLE ParentImageHandle,
1317 IN EFI_DEVICE_PATH_PROTOCOL *FilePath,
1318 IN VOID *SourceBuffer OPTIONAL,
1319 IN UINTN SourceSize,
1320 OUT EFI_HANDLE *ImageHandle
1321 );
1322
1323
1324
1325 /**
1326 Unloads an image.
1327
1328 @param ImageHandle Handle that identifies the image to be
1329 unloaded.
1330
1331 @retval EFI_SUCCESS The image has been unloaded.
1332 @retval EFI_UNSUPPORTED The image has been sarted, and does not support
1333 unload.
1334 @retval EFI_INVALID_PARAMPETER ImageHandle is not a valid image handle.
1335
1336 **/
1337 EFI_STATUS
1338 EFIAPI
1339 CoreUnloadImage (
1340 IN EFI_HANDLE ImageHandle
1341 );
1342
1343
1344
1345 /**
1346 Transfer control to a loaded image's entry point.
1347
1348 @param ImageHandle Handle of image to be started.
1349 @param ExitDataSize Pointer of the size to ExitData
1350 @param ExitData Pointer to a pointer to a data buffer that
1351 includes a Null-terminated string,
1352 optionally followed by additional binary data.
1353 The string is a description that the caller may
1354 use to further indicate the reason for the
1355 image's exit.
1356
1357 @retval EFI_INVALID_PARAMETER Invalid parameter
1358 @retval EFI_OUT_OF_RESOURCES No enough buffer to allocate
1359 @retval EFI_SUCCESS Successfully transfer control to the image's
1360 entry point.
1361
1362 **/
1363 EFI_STATUS
1364 EFIAPI
1365 CoreStartImage (
1366 IN EFI_HANDLE ImageHandle,
1367 OUT UINTN *ExitDataSize,
1368 OUT CHAR16 **ExitData OPTIONAL
1369 );
1370
1371
1372
1373 /**
1374 Terminates the currently loaded EFI image and returns control to boot services.
1375
1376 @param ImageHandle Handle that identifies the image. This
1377 parameter is passed to the image on entry.
1378 @param Status The image's exit code.
1379 @param ExitDataSize The size, in bytes, of ExitData. Ignored if
1380 ExitStatus is EFI_SUCCESS.
1381 @param ExitData Pointer to a data buffer that includes a
1382 Null-terminated Unicode string, optionally
1383 followed by additional binary data. The string
1384 is a description that the caller may use to
1385 further indicate the reason for the image's
1386 exit.
1387
1388 @retval EFI_INVALID_PARAMETER Image handle is NULL or it is not current
1389 image.
1390 @retval EFI_SUCCESS Successfully terminates the currently loaded
1391 EFI image.
1392 @retval EFI_ACCESS_DENIED Should never reach there.
1393 @retval EFI_OUT_OF_RESOURCES Could not allocate pool
1394
1395 **/
1396 EFI_STATUS
1397 EFIAPI
1398 CoreExit (
1399 IN EFI_HANDLE ImageHandle,
1400 IN EFI_STATUS Status,
1401 IN UINTN ExitDataSize,
1402 IN CHAR16 *ExitData OPTIONAL
1403 );
1404
1405
1406
1407 /**
1408 Creates a general-purpose event structure.
1409
1410 @param Type The type of event to create and its mode and
1411 attributes
1412 @param NotifyTpl The task priority level of event notifications
1413 @param NotifyFunction Pointer to the events notification function
1414 @param NotifyContext Pointer to the notification functions context;
1415 corresponds to parameter "Context" in the
1416 notification function
1417 @param Event Pointer to the newly created event if the call
1418 succeeds; undefined otherwise
1419
1420 @retval EFI_SUCCESS The event structure was created
1421 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value
1422 @retval EFI_OUT_OF_RESOURCES The event could not be allocated
1423
1424 **/
1425 EFI_STATUS
1426 EFIAPI
1427 CoreCreateEvent (
1428 IN UINT32 Type,
1429 IN EFI_TPL NotifyTpl,
1430 IN EFI_EVENT_NOTIFY NotifyFunction, OPTIONAL
1431 IN VOID *NotifyContext, OPTIONAL
1432 OUT EFI_EVENT *Event
1433 );
1434
1435
1436
1437 /**
1438 Creates a general-purpose event structure
1439
1440 @param Type The type of event to create and its mode and
1441 attributes
1442 @param NotifyTpl The task priority level of event notifications
1443 @param NotifyFunction Pointer to the events notification function
1444 @param NotifyContext Pointer to the notification functions context;
1445 corresponds to parameter "Context" in the
1446 notification function
1447 @param EventGroup GUID for EventGroup if NULL act the same as
1448 gBS->CreateEvent().
1449 @param Event Pointer to the newly created event if the call
1450 succeeds; undefined otherwise
1451
1452 @retval EFI_SUCCESS The event structure was created
1453 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value
1454 @retval EFI_OUT_OF_RESOURCES The event could not be allocated
1455
1456 **/
1457 EFI_STATUS
1458 EFIAPI
1459 CoreCreateEventEx (
1460 IN UINT32 Type,
1461 IN EFI_TPL NotifyTpl,
1462 IN EFI_EVENT_NOTIFY NotifyFunction, OPTIONAL
1463 IN CONST VOID *NotifyContext, OPTIONAL
1464 IN CONST EFI_GUID *EventGroup, OPTIONAL
1465 OUT EFI_EVENT *Event
1466 );
1467
1468
1469
1470 /**
1471 Sets the type of timer and the trigger time for a timer event.
1472
1473 @param UserEvent The timer event that is to be signaled at the
1474 specified time
1475 @param Type The type of time that is specified in
1476 TriggerTime
1477 @param TriggerTime The number of 100ns units until the timer
1478 expires
1479
1480 @retval EFI_SUCCESS The event has been set to be signaled at the
1481 requested time
1482 @retval EFI_INVALID_PARAMETER Event or Type is not valid
1483
1484 **/
1485 EFI_STATUS
1486 EFIAPI
1487 CoreSetTimer (
1488 IN EFI_EVENT UserEvent,
1489 IN EFI_TIMER_DELAY Type,
1490 IN UINT64 TriggerTime
1491 );
1492
1493
1494
1495 /**
1496 Signals the event. Queues the event to be notified if needed.
1497
1498 @param UserEvent The event to signal .
1499
1500 @retval EFI_INVALID_PARAMETER Parameters are not valid.
1501 @retval EFI_SUCCESS The event was signaled.
1502
1503 **/
1504 EFI_STATUS
1505 EFIAPI
1506 CoreSignalEvent (
1507 IN EFI_EVENT UserEvent
1508 );
1509
1510
1511
1512 /**
1513 Stops execution until an event is signaled.
1514
1515 @param NumberOfEvents The number of events in the UserEvents array
1516 @param UserEvents An array of EFI_EVENT
1517 @param UserIndex Pointer to the index of the event which
1518 satisfied the wait condition
1519
1520 @retval EFI_SUCCESS The event indicated by Index was signaled.
1521 @retval EFI_INVALID_PARAMETER The event indicated by Index has a notification
1522 function or Event was not a valid type
1523 @retval EFI_UNSUPPORTED The current TPL is not TPL_APPLICATION
1524
1525 **/
1526 EFI_STATUS
1527 EFIAPI
1528 CoreWaitForEvent (
1529 IN UINTN NumberOfEvents,
1530 IN EFI_EVENT *UserEvents,
1531 OUT UINTN *UserIndex
1532 );
1533
1534
1535
1536 /**
1537 Closes an event and frees the event structure.
1538
1539 @param UserEvent Event to close
1540
1541 @retval EFI_INVALID_PARAMETER Parameters are not valid.
1542 @retval EFI_SUCCESS The event has been closed
1543
1544 **/
1545 EFI_STATUS
1546 EFIAPI
1547 CoreCloseEvent (
1548 IN EFI_EVENT UserEvent
1549 );
1550
1551
1552
1553 /**
1554 Check the status of an event.
1555
1556 @param UserEvent The event to check
1557
1558 @retval EFI_SUCCESS The event is in the signaled state
1559 @retval EFI_NOT_READY The event is not in the signaled state
1560 @retval EFI_INVALID_PARAMETER Event is of type EVT_NOTIFY_SIGNAL
1561
1562 **/
1563 EFI_STATUS
1564 EFIAPI
1565 CoreCheckEvent (
1566 IN EFI_EVENT UserEvent
1567 );
1568
1569
1570 /**
1571 Adds reserved memory, system memory, or memory-mapped I/O resources to the
1572 global coherency domain of the processor.
1573
1574 @param GcdMemoryType Memory type of the memory space.
1575 @param BaseAddress Base address of the memory space.
1576 @param Length Length of the memory space.
1577 @param Capabilities alterable attributes of the memory space.
1578
1579 @retval EFI_SUCCESS Merged this memory space into GCD map.
1580
1581 **/
1582 EFI_STATUS
1583 EFIAPI
1584 CoreAddMemorySpace (
1585 IN EFI_GCD_MEMORY_TYPE GcdMemoryType,
1586 IN EFI_PHYSICAL_ADDRESS BaseAddress,
1587 IN UINT64 Length,
1588 IN UINT64 Capabilities
1589 );
1590
1591
1592 /**
1593 Allocates nonexistent memory, reserved memory, system memory, or memorymapped
1594 I/O resources from the global coherency domain of the processor.
1595
1596 @param GcdAllocateType The type of allocate operation
1597 @param GcdMemoryType The desired memory type
1598 @param Alignment Align with 2^Alignment
1599 @param Length Length to allocate
1600 @param BaseAddress Base address to allocate
1601 @param ImageHandle The image handle consume the allocated space.
1602 @param DeviceHandle The device handle consume the allocated space.
1603
1604 @retval EFI_INVALID_PARAMETER Invalid parameter.
1605 @retval EFI_NOT_FOUND No descriptor contains the desired space.
1606 @retval EFI_SUCCESS Memory space successfully allocated.
1607
1608 **/
1609 EFI_STATUS
1610 EFIAPI
1611 CoreAllocateMemorySpace (
1612 IN EFI_GCD_ALLOCATE_TYPE GcdAllocateType,
1613 IN EFI_GCD_MEMORY_TYPE GcdMemoryType,
1614 IN UINTN Alignment,
1615 IN UINT64 Length,
1616 IN OUT EFI_PHYSICAL_ADDRESS *BaseAddress,
1617 IN EFI_HANDLE ImageHandle,
1618 IN EFI_HANDLE DeviceHandle OPTIONAL
1619 );
1620
1621
1622 /**
1623 Frees nonexistent memory, reserved memory, system memory, or memory-mapped
1624 I/O resources from the global coherency domain of the processor.
1625
1626 @param BaseAddress Base address of the memory space.
1627 @param Length Length of the memory space.
1628
1629 @retval EFI_SUCCESS Space successfully freed.
1630
1631 **/
1632 EFI_STATUS
1633 EFIAPI
1634 CoreFreeMemorySpace (
1635 IN EFI_PHYSICAL_ADDRESS BaseAddress,
1636 IN UINT64 Length
1637 );
1638
1639
1640 /**
1641 Removes reserved memory, system memory, or memory-mapped I/O resources from
1642 the global coherency domain of the processor.
1643
1644 @param BaseAddress Base address of the memory space.
1645 @param Length Length of the memory space.
1646
1647 @retval EFI_SUCCESS Successfully remove a segment of memory space.
1648
1649 **/
1650 EFI_STATUS
1651 EFIAPI
1652 CoreRemoveMemorySpace (
1653 IN EFI_PHYSICAL_ADDRESS BaseAddress,
1654 IN UINT64 Length
1655 );
1656
1657
1658 /**
1659 Retrieves the descriptor for a memory region containing a specified address.
1660
1661 @param BaseAddress Specified start address
1662 @param Descriptor Specified length
1663
1664 @retval EFI_INVALID_PARAMETER Invalid parameter
1665 @retval EFI_SUCCESS Successfully get memory space descriptor.
1666
1667 **/
1668 EFI_STATUS
1669 EFIAPI
1670 CoreGetMemorySpaceDescriptor (
1671 IN EFI_PHYSICAL_ADDRESS BaseAddress,
1672 OUT EFI_GCD_MEMORY_SPACE_DESCRIPTOR *Descriptor
1673 );
1674
1675
1676 /**
1677 Modifies the attributes for a memory region in the global coherency domain of the
1678 processor.
1679
1680 @param BaseAddress Specified start address
1681 @param Length Specified length
1682 @param Attributes Specified attributes
1683
1684 @retval EFI_SUCCESS Successfully set attribute of a segment of
1685 memory space.
1686
1687 **/
1688 EFI_STATUS
1689 EFIAPI
1690 CoreSetMemorySpaceAttributes (
1691 IN EFI_PHYSICAL_ADDRESS BaseAddress,
1692 IN UINT64 Length,
1693 IN UINT64 Attributes
1694 );
1695
1696
1697 /**
1698 Returns a map of the memory resources in the global coherency domain of the
1699 processor.
1700
1701 @param NumberOfDescriptors Number of descriptors.
1702 @param MemorySpaceMap Descriptor array
1703
1704 @retval EFI_INVALID_PARAMETER Invalid parameter
1705 @retval EFI_OUT_OF_RESOURCES No enough buffer to allocate
1706 @retval EFI_SUCCESS Successfully get memory space map.
1707
1708 **/
1709 EFI_STATUS
1710 EFIAPI
1711 CoreGetMemorySpaceMap (
1712 OUT UINTN *NumberOfDescriptors,
1713 OUT EFI_GCD_MEMORY_SPACE_DESCRIPTOR **MemorySpaceMap
1714 );
1715
1716
1717 /**
1718 Adds reserved I/O or I/O resources to the global coherency domain of the processor.
1719
1720 @param GcdIoType IO type of the segment.
1721 @param BaseAddress Base address of the segment.
1722 @param Length Length of the segment.
1723
1724 @retval EFI_SUCCESS Merged this segment into GCD map.
1725 @retval EFI_INVALID_PARAMETER Parameter not valid
1726
1727 **/
1728 EFI_STATUS
1729 EFIAPI
1730 CoreAddIoSpace (
1731 IN EFI_GCD_IO_TYPE GcdIoType,
1732 IN EFI_PHYSICAL_ADDRESS BaseAddress,
1733 IN UINT64 Length
1734 );
1735
1736
1737 /**
1738 Allocates nonexistent I/O, reserved I/O, or I/O resources from the global coherency
1739 domain of the processor.
1740
1741 @param GcdAllocateType The type of allocate operation
1742 @param GcdIoType The desired IO type
1743 @param Alignment Align with 2^Alignment
1744 @param Length Length to allocate
1745 @param BaseAddress Base address to allocate
1746 @param ImageHandle The image handle consume the allocated space.
1747 @param DeviceHandle The device handle consume the allocated space.
1748
1749 @retval EFI_INVALID_PARAMETER Invalid parameter.
1750 @retval EFI_NOT_FOUND No descriptor contains the desired space.
1751 @retval EFI_SUCCESS IO space successfully allocated.
1752
1753 **/
1754 EFI_STATUS
1755 EFIAPI
1756 CoreAllocateIoSpace (
1757 IN EFI_GCD_ALLOCATE_TYPE GcdAllocateType,
1758 IN EFI_GCD_IO_TYPE GcdIoType,
1759 IN UINTN Alignment,
1760 IN UINT64 Length,
1761 IN OUT EFI_PHYSICAL_ADDRESS *BaseAddress,
1762 IN EFI_HANDLE ImageHandle,
1763 IN EFI_HANDLE DeviceHandle OPTIONAL
1764 );
1765
1766
1767 /**
1768 Frees nonexistent I/O, reserved I/O, or I/O resources from the global coherency
1769 domain of the processor.
1770
1771 @param BaseAddress Base address of the segment.
1772 @param Length Length of the segment.
1773
1774 @retval EFI_SUCCESS Space successfully freed.
1775
1776 **/
1777 EFI_STATUS
1778 EFIAPI
1779 CoreFreeIoSpace (
1780 IN EFI_PHYSICAL_ADDRESS BaseAddress,
1781 IN UINT64 Length
1782 );
1783
1784
1785 /**
1786 Removes reserved I/O or I/O resources from the global coherency domain of the
1787 processor.
1788
1789 @param BaseAddress Base address of the segment.
1790 @param Length Length of the segment.
1791
1792 @retval EFI_SUCCESS Successfully removed a segment of IO space.
1793
1794 **/
1795 EFI_STATUS
1796 EFIAPI
1797 CoreRemoveIoSpace (
1798 IN EFI_PHYSICAL_ADDRESS BaseAddress,
1799 IN UINT64 Length
1800 );
1801
1802
1803 /**
1804 Retrieves the descriptor for an I/O region containing a specified address.
1805
1806 @param BaseAddress Specified start address
1807 @param Descriptor Specified length
1808
1809 @retval EFI_INVALID_PARAMETER Descriptor is NULL.
1810 @retval EFI_SUCCESS Successfully get the IO space descriptor.
1811
1812 **/
1813 EFI_STATUS
1814 EFIAPI
1815 CoreGetIoSpaceDescriptor (
1816 IN EFI_PHYSICAL_ADDRESS BaseAddress,
1817 OUT EFI_GCD_IO_SPACE_DESCRIPTOR *Descriptor
1818 );
1819
1820
1821 /**
1822 Returns a map of the I/O resources in the global coherency domain of the processor.
1823
1824 @param NumberOfDescriptors Number of descriptors.
1825 @param IoSpaceMap Descriptor array
1826
1827 @retval EFI_INVALID_PARAMETER Invalid parameter
1828 @retval EFI_OUT_OF_RESOURCES No enough buffer to allocate
1829 @retval EFI_SUCCESS Successfully get IO space map.
1830
1831 **/
1832 EFI_STATUS
1833 EFIAPI
1834 CoreGetIoSpaceMap (
1835 OUT UINTN *NumberOfDescriptors,
1836 OUT EFI_GCD_IO_SPACE_DESCRIPTOR **IoSpaceMap
1837 );
1838
1839
1840 /**
1841 This is the main Dispatcher for DXE and it exits when there are no more
1842 drivers to run. Drain the mScheduledQueue and load and start a PE
1843 image for each driver. Search the mDiscoveredList to see if any driver can
1844 be placed on the mScheduledQueue. If no drivers are placed on the
1845 mScheduledQueue exit the function. On exit it is assumed the Bds()
1846 will be called, and when the Bds() exits the Dispatcher will be called
1847 again.
1848
1849 @retval EFI_ALREADY_STARTED The DXE Dispatcher is already running
1850 @retval EFI_NOT_FOUND No DXE Drivers were dispatched
1851 @retval EFI_SUCCESS One or more DXE Drivers were dispatched
1852
1853 **/
1854 EFI_STATUS
1855 EFIAPI
1856 CoreDispatcher (
1857 VOID
1858 );
1859
1860 /**
1861 Check every driver and locate a matching one. If the driver is found, the Unrequested
1862 state flag is cleared.
1863
1864 @param FirmwareVolumeHandle The handle of the Firmware Volume that contains
1865 the firmware file specified by DriverName.
1866 @param DriverName The Driver name to put in the Dependent state.
1867
1868 @retval EFI_SUCCESS The DriverName was found and it's SOR bit was
1869 cleared
1870 @retval EFI_NOT_FOUND The DriverName does not exist or it's SOR bit was
1871 not set.
1872
1873 **/
1874 EFI_STATUS
1875 EFIAPI
1876 CoreSchedule (
1877 IN EFI_HANDLE FirmwareVolumeHandle,
1878 IN EFI_GUID *DriverName
1879 );
1880
1881
1882 /**
1883 Convert a driver from the Untrused back to the Scheduled state.
1884
1885 @param FirmwareVolumeHandle The handle of the Firmware Volume that contains
1886 the firmware file specified by DriverName.
1887 @param DriverName The Driver name to put in the Scheduled state
1888
1889 @retval EFI_SUCCESS The file was found in the untrusted state, and it
1890 was promoted to the trusted state.
1891 @retval EFI_NOT_FOUND The file was not found in the untrusted state.
1892
1893 **/
1894 EFI_STATUS
1895 EFIAPI
1896 CoreTrust (
1897 IN EFI_HANDLE FirmwareVolumeHandle,
1898 IN EFI_GUID *DriverName
1899 );
1900
1901
1902 /**
1903 This routine is the driver initialization entry point. It initializes the
1904 libraries, and registers two notification functions. These notification
1905 functions are responsible for building the FV stack dynamically.
1906
1907 @param ImageHandle The image handle.
1908 @param SystemTable The system table.
1909
1910 @retval EFI_SUCCESS Function successfully returned.
1911
1912 **/
1913 EFI_STATUS
1914 EFIAPI
1915 FwVolDriverInit (
1916 IN EFI_HANDLE ImageHandle,
1917 IN EFI_SYSTEM_TABLE *SystemTable
1918 );
1919
1920
1921 /**
1922 Entry point of the section extraction code. Initializes an instance of the
1923 section extraction interface and installs it on a new handle.
1924
1925 @param ImageHandle A handle for the image that is initializing this driver
1926 @param SystemTable A pointer to the EFI system table
1927
1928 @retval EFI_SUCCESS Driver initialized successfully
1929 @retval EFI_OUT_OF_RESOURCES Could not allocate needed resources
1930
1931 **/
1932 EFI_STATUS
1933 EFIAPI
1934 InitializeSectionExtraction (
1935 IN EFI_HANDLE ImageHandle,
1936 IN EFI_SYSTEM_TABLE *SystemTable
1937 );
1938
1939
1940 /**
1941 This DXE service routine is used to process a firmware volume. In
1942 particular, it can be called by BDS to process a single firmware
1943 volume found in a capsule.
1944
1945 @param FvHeader pointer to a firmware volume header
1946 @param Size the size of the buffer pointed to by FvHeader
1947 @param FVProtocolHandle the handle on which a firmware volume protocol
1948 was produced for the firmware volume passed in.
1949
1950 @retval EFI_OUT_OF_RESOURCES if an FVB could not be produced due to lack of
1951 system resources
1952 @retval EFI_VOLUME_CORRUPTED if the volume was corrupted
1953 @retval EFI_SUCCESS a firmware volume protocol was produced for the
1954 firmware volume
1955
1956 **/
1957 EFI_STATUS
1958 EFIAPI
1959 CoreProcessFirmwareVolume (
1960 IN VOID *FvHeader,
1961 IN UINTN Size,
1962 OUT EFI_HANDLE *FVProtocolHandle
1963 );
1964
1965 //
1966 //Functions used during debug buils
1967 //
1968
1969 /**
1970 Displays Architectural protocols that were not loaded and are required for DXE
1971 core to function. Only used in Debug Builds.
1972
1973 **/
1974 VOID
1975 CoreDisplayMissingArchProtocols (
1976 VOID
1977 );
1978
1979
1980 /**
1981 Traverse the discovered list for any drivers that were discovered but not loaded
1982 because the dependency experessions evaluated to false.
1983
1984 **/
1985 VOID
1986 CoreDisplayDiscoveredNotDispatched (
1987 VOID
1988 );
1989
1990
1991 /**
1992 Place holder function until all the Boot Services and Runtime Services are
1993 available.
1994
1995 @return EFI_NOT_AVAILABLE_YET
1996
1997 **/
1998 EFI_STATUS
1999 EFIAPI
2000 CoreEfiNotAvailableYetArg0 (
2001 VOID
2002 );
2003
2004
2005 /**
2006 Place holder function until all the Boot Services and Runtime Services are
2007 available.
2008
2009 @param Arg1 Undefined
2010
2011 @return EFI_NOT_AVAILABLE_YET
2012
2013 **/
2014 EFI_STATUS
2015 EFIAPI
2016 CoreEfiNotAvailableYetArg1 (
2017 UINTN Arg1
2018 );
2019
2020
2021 /**
2022 Place holder function until all the Boot Services and Runtime Services are available.
2023
2024 @param Arg1 Undefined
2025 @param Arg2 Undefined
2026
2027 @return EFI_NOT_AVAILABLE_YET
2028
2029 **/
2030 EFI_STATUS
2031 EFIAPI
2032 CoreEfiNotAvailableYetArg2 (
2033 UINTN Arg1,
2034 UINTN Arg2
2035 );
2036
2037
2038 /**
2039 Place holder function until all the Boot Services and Runtime Services are available.
2040
2041 @param Arg1 Undefined
2042 @param Arg2 Undefined
2043 @param Arg3 Undefined
2044
2045 @return EFI_NOT_AVAILABLE_YET
2046
2047 **/
2048 EFI_STATUS
2049 EFIAPI
2050 CoreEfiNotAvailableYetArg3 (
2051 UINTN Arg1,
2052 UINTN Arg2,
2053 UINTN Arg3
2054 );
2055
2056
2057 /**
2058 Place holder function until all the Boot Services and Runtime Services are available.
2059
2060 @param Arg1 Undefined
2061 @param Arg2 Undefined
2062 @param Arg3 Undefined
2063 @param Arg4 Undefined
2064
2065 @return EFI_NOT_AVAILABLE_YET
2066
2067 **/
2068 EFI_STATUS
2069 EFIAPI
2070 CoreEfiNotAvailableYetArg4 (
2071 UINTN Arg1,
2072 UINTN Arg2,
2073 UINTN Arg3,
2074 UINTN Arg4
2075 );
2076
2077
2078 /**
2079 Place holder function until all the Boot Services and Runtime Services are available.
2080
2081 @param Arg1 Undefined
2082 @param Arg2 Undefined
2083 @param Arg3 Undefined
2084 @param Arg4 Undefined
2085 @param Arg5 Undefined
2086
2087 @return EFI_NOT_AVAILABLE_YET
2088
2089 **/
2090 EFI_STATUS
2091 EFIAPI
2092 CoreEfiNotAvailableYetArg5 (
2093 UINTN Arg1,
2094 UINTN Arg2,
2095 UINTN Arg3,
2096 UINTN Arg4,
2097 UINTN Arg5
2098 );
2099
2100
2101 /**
2102 Given a compressed source buffer, this function retrieves the size of the
2103 uncompressed buffer and the size of the scratch buffer required to decompress
2104 the compressed source buffer.
2105
2106 The GetInfo() function retrieves the size of the uncompressed buffer and the
2107 temporary scratch buffer required to decompress the buffer specified by Source
2108 and SourceSize. If the size of the uncompressed buffer or the size of the
2109 scratch buffer cannot be determined from the compressed data specified by
2110 Source and SourceData, then EFI_INVALID_PARAMETER is returned. Otherwise, the
2111 size of the uncompressed buffer is returned in DestinationSize, the size of
2112 the scratch buffer is returned in ScratchSize, and EFI_SUCCESS is returned.
2113 The GetInfo() function does not have scratch buffer available to perform a
2114 thorough checking of the validity of the source data. It just retrieves the
2115 "Original Size" field from the beginning bytes of the source data and output
2116 it as DestinationSize. And ScratchSize is specific to the decompression
2117 implementation.
2118
2119 @param This A pointer to the EFI_DECOMPRESS_PROTOCOL instance.
2120 @param Source The source buffer containing the compressed data.
2121 @param SourceSize The size, in bytes, of the source buffer.
2122 @param DestinationSize A pointer to the size, in bytes, of the
2123 uncompressed buffer that will be generated when the
2124 compressed buffer specified by Source and
2125 SourceSize is decompressed.
2126 @param ScratchSize A pointer to the size, in bytes, of the scratch
2127 buffer that is required to decompress the
2128 compressed buffer specified by Source and
2129 SourceSize.
2130
2131 @retval EFI_SUCCESS The size of the uncompressed data was returned in
2132 DestinationSize and the size of the scratch buffer
2133 was returned in ScratchSize.
2134 @retval EFI_INVALID_PARAMETER The size of the uncompressed data or the size of
2135 the scratch buffer cannot be determined from the
2136 compressed data specified by Source and
2137 SourceSize.
2138
2139 **/
2140 EFI_STATUS
2141 EFIAPI
2142 DxeMainUefiDecompressGetInfo (
2143 IN EFI_DECOMPRESS_PROTOCOL *This,
2144 IN VOID *Source,
2145 IN UINT32 SourceSize,
2146 OUT UINT32 *DestinationSize,
2147 OUT UINT32 *ScratchSize
2148 );
2149
2150
2151 /**
2152 Decompresses a compressed source buffer.
2153
2154 The Decompress() function extracts decompressed data to its original form.
2155 This protocol is designed so that the decompression algorithm can be
2156 implemented without using any memory services. As a result, the Decompress()
2157 Function is not allowed to call AllocatePool() or AllocatePages() in its
2158 implementation. It is the caller's responsibility to allocate and free the
2159 Destination and Scratch buffers.
2160 If the compressed source data specified by Source and SourceSize is
2161 sucessfully decompressed into Destination, then EFI_SUCCESS is returned. If
2162 the compressed source data specified by Source and SourceSize is not in a
2163 valid compressed data format, then EFI_INVALID_PARAMETER is returned.
2164
2165 @param This A pointer to the EFI_DECOMPRESS_PROTOCOL instance.
2166 @param Source The source buffer containing the compressed data.
2167 @param SourceSize SourceSizeThe size of source data.
2168 @param Destination On output, the destination buffer that contains
2169 the uncompressed data.
2170 @param DestinationSize The size of the destination buffer. The size of
2171 the destination buffer needed is obtained from
2172 EFI_DECOMPRESS_PROTOCOL.GetInfo().
2173 @param Scratch A temporary scratch buffer that is used to perform
2174 the decompression.
2175 @param ScratchSize The size of scratch buffer. The size of the
2176 scratch buffer needed is obtained from GetInfo().
2177
2178 @retval EFI_SUCCESS Decompression completed successfully, and the
2179 uncompressed buffer is returned in Destination.
2180 @retval EFI_INVALID_PARAMETER The source buffer specified by Source and
2181 SourceSize is corrupted (not in a valid
2182 compressed format).
2183
2184 **/
2185 EFI_STATUS
2186 EFIAPI
2187 DxeMainUefiDecompress (
2188 IN EFI_DECOMPRESS_PROTOCOL *This,
2189 IN VOID *Source,
2190 IN UINT32 SourceSize,
2191 IN OUT VOID *Destination,
2192 IN UINT32 DestinationSize,
2193 IN OUT VOID *Scratch,
2194 IN UINT32 ScratchSize
2195 );
2196
2197 /**
2198 SEP member function. This function creates and returns a new section stream
2199 handle to represent the new section stream.
2200
2201 @param SectionStreamLength Size in bytes of the section stream.
2202 @param SectionStream Buffer containing the new section stream.
2203 @param SectionStreamHandle A pointer to a caller allocated UINTN that on
2204 output contains the new section stream handle.
2205
2206 @retval EFI_SUCCESS The section stream is created successfully.
2207 @retval EFI_OUT_OF_RESOURCES memory allocation failed.
2208 @retval EFI_INVALID_PARAMETER Section stream does not end concident with end
2209 of last section.
2210
2211 **/
2212 EFI_STATUS
2213 EFIAPI
2214 OpenSectionStream (
2215 IN UINTN SectionStreamLength,
2216 IN VOID *SectionStream,
2217 OUT UINTN *SectionStreamHandle
2218 );
2219
2220
2221
2222 /**
2223 SEP member function. Retrieves requested section from section stream.
2224
2225 @param SectionStreamHandle The section stream from which to extract the
2226 requested section.
2227 @param SectionType A pointer to the type of section to search for.
2228 @param SectionDefinitionGuid If the section type is EFI_SECTION_GUID_DEFINED,
2229 then SectionDefinitionGuid indicates which of
2230 these types of sections to search for.
2231 @param SectionInstance Indicates which instance of the requested
2232 section to return.
2233 @param Buffer Double indirection to buffer. If *Buffer is
2234 non-null on input, then the buffer is caller
2235 allocated. If Buffer is NULL, then the buffer
2236 is callee allocated. In either case, the
2237 requried buffer size is returned in *BufferSize.
2238 @param BufferSize On input, indicates the size of *Buffer if
2239 *Buffer is non-null on input. On output,
2240 indicates the required size (allocated size if
2241 callee allocated) of *Buffer.
2242 @param AuthenticationStatus A pointer to a caller-allocated UINT32 that
2243 indicates the authentication status of the
2244 output buffer. If the input section's
2245 GuidedSectionHeader.Attributes field
2246 has the EFI_GUIDED_SECTION_AUTH_STATUS_VALID
2247 bit as clear, AuthenticationStatus must return
2248 zero. Both local bits (19:16) and aggregate
2249 bits (3:0) in AuthenticationStatus are returned
2250 by ExtractSection(). These bits reflect the
2251 status of the extraction operation. The bit
2252 pattern in both regions must be the same, as
2253 the local and aggregate authentication statuses
2254 have equivalent meaning at this level. If the
2255 function returns anything other than
2256 EFI_SUCCESS, the value of *AuthenticationStatus
2257 is undefined.
2258
2259 @retval EFI_SUCCESS Section was retrieved successfully
2260 @retval EFI_PROTOCOL_ERROR A GUID defined section was encountered in the
2261 section stream with its
2262 EFI_GUIDED_SECTION_PROCESSING_REQUIRED bit set,
2263 but there was no corresponding GUIDed Section
2264 Extraction Protocol in the handle database.
2265 *Buffer is unmodified.
2266 @retval EFI_NOT_FOUND An error was encountered when parsing the
2267 SectionStream. This indicates the SectionStream
2268 is not correctly formatted.
2269 @retval EFI_NOT_FOUND The requested section does not exist.
2270 @retval EFI_OUT_OF_RESOURCES The system has insufficient resources to process
2271 the request.
2272 @retval EFI_INVALID_PARAMETER The SectionStreamHandle does not exist.
2273 @retval EFI_WARN_TOO_SMALL The size of the caller allocated input buffer is
2274 insufficient to contain the requested section.
2275 The input buffer is filled and section contents
2276 are truncated.
2277
2278 **/
2279 EFI_STATUS
2280 EFIAPI
2281 GetSection (
2282 IN UINTN SectionStreamHandle,
2283 IN EFI_SECTION_TYPE *SectionType,
2284 IN EFI_GUID *SectionDefinitionGuid,
2285 IN UINTN SectionInstance,
2286 IN VOID **Buffer,
2287 IN OUT UINTN *BufferSize,
2288 OUT UINT32 *AuthenticationStatus
2289 );
2290
2291
2292 /**
2293 SEP member function. Deletes an existing section stream
2294
2295 @param StreamHandleToClose Indicates the stream to close
2296
2297 @retval EFI_SUCCESS The section stream is closed sucessfully.
2298 @retval EFI_OUT_OF_RESOURCES Memory allocation failed.
2299 @retval EFI_INVALID_PARAMETER Section stream does not end concident with end
2300 of last section.
2301
2302 **/
2303 EFI_STATUS
2304 EFIAPI
2305 CloseSectionStream (
2306 IN UINTN StreamHandleToClose
2307 );
2308
2309 /**
2310 Creates and initializes the DebugImageInfo Table. Also creates the configuration
2311 table and registers it into the system table.
2312
2313 Note:
2314 This function allocates memory, frees it, and then allocates memory at an
2315 address within the initial allocation. Since this function is called early
2316 in DXE core initialization (before drivers are dispatched), this should not
2317 be a problem.
2318
2319 **/
2320 VOID
2321 CoreInitializeDebugImageInfoTable (
2322 VOID
2323 );
2324
2325
2326 /**
2327 Update the CRC32 in the Debug Table.
2328 Since the CRC32 service is made available by the Runtime driver, we have to
2329 wait for the Runtime Driver to be installed before the CRC32 can be computed.
2330 This function is called elsewhere by the core when the runtime architectural
2331 protocol is produced.
2332
2333 **/
2334 VOID
2335 CoreUpdateDebugTableCrc32 (
2336 VOID
2337 );
2338
2339
2340 /**
2341 Adds a new DebugImageInfo structure to the DebugImageInfo Table. Re-Allocates
2342 the table if it's not large enough to accomidate another entry.
2343
2344 @param ImageInfoType type of debug image information
2345 @param LoadedImage pointer to the loaded image protocol for the image being
2346 loaded
2347 @param ImageHandle image handle for the image being loaded
2348
2349 **/
2350 VOID
2351 CoreNewDebugImageInfoEntry (
2352 IN UINT32 ImageInfoType,
2353 IN EFI_LOADED_IMAGE_PROTOCOL *LoadedImage,
2354 IN EFI_HANDLE ImageHandle
2355 );
2356
2357
2358 /**
2359 Removes and frees an entry from the DebugImageInfo Table.
2360
2361 @param ImageHandle image handle for the image being unloaded
2362
2363 **/
2364 VOID
2365 CoreRemoveDebugImageInfoEntry (
2366 EFI_HANDLE ImageHandle
2367 );
2368
2369
2370 /**
2371 This routine consumes FV hobs and produces instances of FW_VOL_BLOCK_PROTOCOL as appropriate.
2372
2373 @param ImageHandle The image handle.
2374 @param SystemTable The system table.
2375
2376 @retval EFI_SUCCESS Successfully initialized firmware volume block
2377 driver.
2378
2379 **/
2380 EFI_STATUS
2381 EFIAPI
2382 FwVolBlockDriverInit (
2383 IN EFI_HANDLE ImageHandle,
2384 IN EFI_SYSTEM_TABLE *SystemTable
2385 );
2386
2387
2388 /**
2389 This routine produces a firmware volume block protocol on a given
2390 buffer.
2391
2392 @param BaseAddress base address of the firmware volume image
2393 @param Length length of the firmware volume image
2394 @param ParentHandle handle of parent firmware volume, if this image
2395 came from an FV image file in another firmware
2396 volume (ala capsules)
2397 @param FvProtocol Firmware volume block protocol produced.
2398
2399 @retval EFI_VOLUME_CORRUPTED Volume corrupted.
2400 @retval EFI_OUT_OF_RESOURCES No enough buffer to be allocated.
2401 @retval EFI_SUCCESS Successfully produced a FVB protocol on given
2402 buffer.
2403
2404 **/
2405 EFI_STATUS
2406 ProduceFVBProtocolOnBuffer (
2407 IN EFI_PHYSICAL_ADDRESS BaseAddress,
2408 IN UINT64 Length,
2409 IN EFI_HANDLE ParentHandle,
2410 OUT EFI_HANDLE *FvProtocol OPTIONAL
2411 );
2412
2413
2414 /**
2415 Raising to the task priority level of the mutual exclusion
2416 lock, and then acquires ownership of the lock.
2417
2418 @param Lock The lock to acquire
2419
2420 @return Lock owned
2421
2422 **/
2423 VOID
2424 CoreAcquireLock (
2425 IN EFI_LOCK *Lock
2426 );
2427
2428
2429 /**
2430 Initialize a basic mutual exclusion lock. Each lock
2431 provides mutual exclusion access at it's task priority
2432 level. Since there is no-premption (at any TPL) or
2433 multiprocessor support, acquiring the lock only consists
2434 of raising to the locks TPL.
2435
2436 @param Lock The EFI_LOCK structure to initialize
2437
2438 @retval EFI_SUCCESS Lock Owned.
2439 @retval EFI_ACCESS_DENIED Reentrant Lock Acquisition, Lock not Owned.
2440
2441 **/
2442 EFI_STATUS
2443 CoreAcquireLockOrFail (
2444 IN EFI_LOCK *Lock
2445 );
2446
2447
2448 /**
2449 Releases ownership of the mutual exclusion lock, and
2450 restores the previous task priority level.
2451
2452 @param Lock The lock to release
2453
2454 @return Lock unowned
2455
2456 **/
2457 VOID
2458 CoreReleaseLock (
2459 IN EFI_LOCK *Lock
2460 );
2461
2462 #endif