]> git.proxmox.com Git - mirror_edk2.git/blob - MdePkg/Include/Uefi/UefiSpec.h
MdePkg-UefiSpec.h: Add UEFI 2.8 new memory attributes
[mirror_edk2.git] / MdePkg / Include / Uefi / UefiSpec.h
1 /** @file
2 Include file that supports UEFI.
3
4 This include file must contain things defined in the UEFI 2.7 specification.
5 If a code construct is defined in the UEFI 2.7 specification it must be included
6 by this include file.
7
8 Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
9 SPDX-License-Identifier: BSD-2-Clause-Patent
10
11 **/
12
13 #ifndef __UEFI_SPEC_H__
14 #define __UEFI_SPEC_H__
15
16 #include <Uefi/UefiMultiPhase.h>
17
18 #include <Protocol/DevicePath.h>
19 #include <Protocol/SimpleTextIn.h>
20 #include <Protocol/SimpleTextInEx.h>
21 #include <Protocol/SimpleTextOut.h>
22
23 ///
24 /// Enumeration of EFI memory allocation types.
25 ///
26 typedef enum {
27 ///
28 /// Allocate any available range of pages that satisfies the request.
29 ///
30 AllocateAnyPages,
31 ///
32 /// Allocate any available range of pages whose uppermost address is less than
33 /// or equal to a specified maximum address.
34 ///
35 AllocateMaxAddress,
36 ///
37 /// Allocate pages at a specified address.
38 ///
39 AllocateAddress,
40 ///
41 /// Maximum enumeration value that may be used for bounds checking.
42 ///
43 MaxAllocateType
44 } EFI_ALLOCATE_TYPE;
45
46 //
47 // Bit definitions for EFI_TIME.Daylight
48 //
49 #define EFI_TIME_ADJUST_DAYLIGHT 0x01
50 #define EFI_TIME_IN_DAYLIGHT 0x02
51
52 ///
53 /// Value definition for EFI_TIME.TimeZone.
54 ///
55 #define EFI_UNSPECIFIED_TIMEZONE 0x07FF
56
57 //
58 // Memory cacheability attributes
59 //
60 #define EFI_MEMORY_UC 0x0000000000000001ULL
61 #define EFI_MEMORY_WC 0x0000000000000002ULL
62 #define EFI_MEMORY_WT 0x0000000000000004ULL
63 #define EFI_MEMORY_WB 0x0000000000000008ULL
64 #define EFI_MEMORY_UCE 0x0000000000000010ULL
65 //
66 // Physical memory protection attributes
67 //
68 // Note: UEFI spec 2.5 and following: use EFI_MEMORY_RO as write-protected physical memory
69 // protection attribute. Also, EFI_MEMORY_WP means cacheability attribute.
70 //
71 #define EFI_MEMORY_WP 0x0000000000001000ULL
72 #define EFI_MEMORY_RP 0x0000000000002000ULL
73 #define EFI_MEMORY_XP 0x0000000000004000ULL
74 #define EFI_MEMORY_RO 0x0000000000020000ULL
75 //
76 // Physical memory persistence attribute.
77 // The memory region supports byte-addressable non-volatility.
78 //
79 #define EFI_MEMORY_NV 0x0000000000008000ULL
80 //
81 // The memory region provides higher reliability relative to other memory in the system.
82 // If all memory has the same reliability, then this bit is not used.
83 //
84 #define EFI_MEMORY_MORE_RELIABLE 0x0000000000010000ULL
85
86 //
87 // Note: UEFI spec 2.8 and following:
88 //
89 // Specific-purpose memory (SPM). The memory is earmarked for
90 // specific purposes such as for specific device drivers or applications.
91 // The SPM attribute serves as a hint to the OS to avoid allocating this
92 // memory for core OS data or code that can not be relocated.
93 //
94 #define EFI_MEMORY_SP 0x0000000000040000ULL
95 //
96 // If this flag is set, the memory region is capable of being
97 // protected with the CPU?s memory cryptographic
98 // capabilities. If this flag is clear, the memory region is not
99 // capable of being protected with the CPU?s memory
100 // cryptographic capabilities or the CPU does not support CPU
101 // memory cryptographic capabilities.
102 //
103 #define EFI_MEMORY_CPU_CRYPTO 0x0000000000080000ULL
104
105 //
106 // Runtime memory attribute
107 //
108 #define EFI_MEMORY_RUNTIME 0x8000000000000000ULL
109
110 ///
111 /// Memory descriptor version number.
112 ///
113 #define EFI_MEMORY_DESCRIPTOR_VERSION 1
114
115 ///
116 /// Definition of an EFI memory descriptor.
117 ///
118 typedef struct {
119 ///
120 /// Type of the memory region.
121 /// Type EFI_MEMORY_TYPE is defined in the
122 /// AllocatePages() function description.
123 ///
124 UINT32 Type;
125 ///
126 /// Physical address of the first byte in the memory region. PhysicalStart must be
127 /// aligned on a 4 KiB boundary, and must not be above 0xfffffffffffff000. Type
128 /// EFI_PHYSICAL_ADDRESS is defined in the AllocatePages() function description
129 ///
130 EFI_PHYSICAL_ADDRESS PhysicalStart;
131 ///
132 /// Virtual address of the first byte in the memory region.
133 /// VirtualStart must be aligned on a 4 KiB boundary,
134 /// and must not be above 0xfffffffffffff000.
135 ///
136 EFI_VIRTUAL_ADDRESS VirtualStart;
137 ///
138 /// NumberOfPagesNumber of 4 KiB pages in the memory region.
139 /// NumberOfPages must not be 0, and must not be any value
140 /// that would represent a memory page with a start address,
141 /// either physical or virtual, above 0xfffffffffffff000.
142 ///
143 UINT64 NumberOfPages;
144 ///
145 /// Attributes of the memory region that describe the bit mask of capabilities
146 /// for that memory region, and not necessarily the current settings for that
147 /// memory region.
148 ///
149 UINT64 Attribute;
150 } EFI_MEMORY_DESCRIPTOR;
151
152 /**
153 Allocates memory pages from the system.
154
155 @param[in] Type The type of allocation to perform.
156 @param[in] MemoryType The type of memory to allocate.
157 MemoryType values in the range 0x70000000..0x7FFFFFFF
158 are reserved for OEM use. MemoryType values in the range
159 0x80000000..0xFFFFFFFF are reserved for use by UEFI OS loaders
160 that are provided by operating system vendors.
161 @param[in] Pages The number of contiguous 4 KB pages to allocate.
162 @param[in, out] Memory The pointer to a physical address. On input, the way in which the address is
163 used depends on the value of Type.
164
165 @retval EFI_SUCCESS The requested pages were allocated.
166 @retval EFI_INVALID_PARAMETER 1) Type is not AllocateAnyPages or
167 AllocateMaxAddress or AllocateAddress.
168 2) MemoryType is in the range
169 EfiMaxMemoryType..0x6FFFFFFF.
170 3) Memory is NULL.
171 4) MemoryType is EfiPersistentMemory.
172 @retval EFI_OUT_OF_RESOURCES The pages could not be allocated.
173 @retval EFI_NOT_FOUND The requested pages could not be found.
174
175 **/
176 typedef
177 EFI_STATUS
178 (EFIAPI *EFI_ALLOCATE_PAGES)(
179 IN EFI_ALLOCATE_TYPE Type,
180 IN EFI_MEMORY_TYPE MemoryType,
181 IN UINTN Pages,
182 IN OUT EFI_PHYSICAL_ADDRESS *Memory
183 );
184
185 /**
186 Frees memory pages.
187
188 @param[in] Memory The base physical address of the pages to be freed.
189 @param[in] Pages The number of contiguous 4 KB pages to free.
190
191 @retval EFI_SUCCESS The requested pages were freed.
192 @retval EFI_INVALID_PARAMETER Memory is not a page-aligned address or Pages is invalid.
193 @retval EFI_NOT_FOUND The requested memory pages were not allocated with
194 AllocatePages().
195
196 **/
197 typedef
198 EFI_STATUS
199 (EFIAPI *EFI_FREE_PAGES)(
200 IN EFI_PHYSICAL_ADDRESS Memory,
201 IN UINTN Pages
202 );
203
204 /**
205 Returns the current memory map.
206
207 @param[in, out] MemoryMapSize A pointer to the size, in bytes, of the MemoryMap buffer.
208 On input, this is the size of the buffer allocated by the caller.
209 On output, it is the size of the buffer returned by the firmware if
210 the buffer was large enough, or the size of the buffer needed to contain
211 the map if the buffer was too small.
212 @param[in, out] MemoryMap A pointer to the buffer in which firmware places the current memory
213 map.
214 @param[out] MapKey A pointer to the location in which firmware returns the key for the
215 current memory map.
216 @param[out] DescriptorSize A pointer to the location in which firmware returns the size, in bytes, of
217 an individual EFI_MEMORY_DESCRIPTOR.
218 @param[out] DescriptorVersion A pointer to the location in which firmware returns the version number
219 associated with the EFI_MEMORY_DESCRIPTOR.
220
221 @retval EFI_SUCCESS The memory map was returned in the MemoryMap buffer.
222 @retval EFI_BUFFER_TOO_SMALL The MemoryMap buffer was too small. The current buffer size
223 needed to hold the memory map is returned in MemoryMapSize.
224 @retval EFI_INVALID_PARAMETER 1) MemoryMapSize is NULL.
225 2) The MemoryMap buffer is not too small and MemoryMap is
226 NULL.
227
228 **/
229 typedef
230 EFI_STATUS
231 (EFIAPI *EFI_GET_MEMORY_MAP)(
232 IN OUT UINTN *MemoryMapSize,
233 IN OUT EFI_MEMORY_DESCRIPTOR *MemoryMap,
234 OUT UINTN *MapKey,
235 OUT UINTN *DescriptorSize,
236 OUT UINT32 *DescriptorVersion
237 );
238
239 /**
240 Allocates pool memory.
241
242 @param[in] PoolType The type of pool to allocate.
243 MemoryType values in the range 0x70000000..0x7FFFFFFF
244 are reserved for OEM use. MemoryType values in the range
245 0x80000000..0xFFFFFFFF are reserved for use by UEFI OS loaders
246 that are provided by operating system vendors.
247 @param[in] Size The number of bytes to allocate from the pool.
248 @param[out] Buffer A pointer to a pointer to the allocated buffer if the call succeeds;
249 undefined otherwise.
250
251 @retval EFI_SUCCESS The requested number of bytes was allocated.
252 @retval EFI_OUT_OF_RESOURCES The pool requested could not be allocated.
253 @retval EFI_INVALID_PARAMETER Buffer is NULL.
254 PoolType is in the range EfiMaxMemoryType..0x6FFFFFFF.
255 PoolType is EfiPersistentMemory.
256
257 **/
258 typedef
259 EFI_STATUS
260 (EFIAPI *EFI_ALLOCATE_POOL)(
261 IN EFI_MEMORY_TYPE PoolType,
262 IN UINTN Size,
263 OUT VOID **Buffer
264 );
265
266 /**
267 Returns pool memory to the system.
268
269 @param[in] Buffer The pointer to the buffer to free.
270
271 @retval EFI_SUCCESS The memory was returned to the system.
272 @retval EFI_INVALID_PARAMETER Buffer was invalid.
273
274 **/
275 typedef
276 EFI_STATUS
277 (EFIAPI *EFI_FREE_POOL)(
278 IN VOID *Buffer
279 );
280
281 /**
282 Changes the runtime addressing mode of EFI firmware from physical to virtual.
283
284 @param[in] MemoryMapSize The size in bytes of VirtualMap.
285 @param[in] DescriptorSize The size in bytes of an entry in the VirtualMap.
286 @param[in] DescriptorVersion The version of the structure entries in VirtualMap.
287 @param[in] VirtualMap An array of memory descriptors which contain new virtual
288 address mapping information for all runtime ranges.
289
290 @retval EFI_SUCCESS The virtual address map has been applied.
291 @retval EFI_UNSUPPORTED EFI firmware is not at runtime, or the EFI firmware is already in
292 virtual address mapped mode.
293 @retval EFI_INVALID_PARAMETER DescriptorSize or DescriptorVersion is invalid.
294 @retval EFI_NO_MAPPING A virtual address was not supplied for a range in the memory
295 map that requires a mapping.
296 @retval EFI_NOT_FOUND A virtual address was supplied for an address that is not found
297 in the memory map.
298
299 **/
300 typedef
301 EFI_STATUS
302 (EFIAPI *EFI_SET_VIRTUAL_ADDRESS_MAP)(
303 IN UINTN MemoryMapSize,
304 IN UINTN DescriptorSize,
305 IN UINT32 DescriptorVersion,
306 IN EFI_MEMORY_DESCRIPTOR *VirtualMap
307 );
308
309 /**
310 Connects one or more drivers to a controller.
311
312 @param[in] ControllerHandle The handle of the controller to which driver(s) are to be connected.
313 @param[in] DriverImageHandle A pointer to an ordered list handles that support the
314 EFI_DRIVER_BINDING_PROTOCOL.
315 @param[in] RemainingDevicePath A pointer to the device path that specifies a child of the
316 controller specified by ControllerHandle.
317 @param[in] Recursive If TRUE, then ConnectController() is called recursively
318 until the entire tree of controllers below the controller specified
319 by ControllerHandle have been created. If FALSE, then
320 the tree of controllers is only expanded one level.
321
322 @retval EFI_SUCCESS 1) One or more drivers were connected to ControllerHandle.
323 2) No drivers were connected to ControllerHandle, but
324 RemainingDevicePath is not NULL, and it is an End Device
325 Path Node.
326 @retval EFI_INVALID_PARAMETER ControllerHandle is NULL.
327 @retval EFI_NOT_FOUND 1) There are no EFI_DRIVER_BINDING_PROTOCOL instances
328 present in the system.
329 2) No drivers were connected to ControllerHandle.
330 @retval EFI_SECURITY_VIOLATION
331 The user has no permission to start UEFI device drivers on the device path
332 associated with the ControllerHandle or specified by the RemainingDevicePath.
333 **/
334 typedef
335 EFI_STATUS
336 (EFIAPI *EFI_CONNECT_CONTROLLER)(
337 IN EFI_HANDLE ControllerHandle,
338 IN EFI_HANDLE *DriverImageHandle, OPTIONAL
339 IN EFI_DEVICE_PATH_PROTOCOL *RemainingDevicePath, OPTIONAL
340 IN BOOLEAN Recursive
341 );
342
343 /**
344 Disconnects one or more drivers from a controller.
345
346 @param[in] ControllerHandle The handle of the controller from which driver(s) are to be disconnected.
347 @param[in] DriverImageHandle The driver to disconnect from ControllerHandle.
348 If DriverImageHandle is NULL, then all the drivers currently managing
349 ControllerHandle are disconnected from ControllerHandle.
350 @param[in] ChildHandle The handle of the child to destroy.
351 If ChildHandle is NULL, then all the children of ControllerHandle are
352 destroyed before the drivers are disconnected from ControllerHandle.
353
354 @retval EFI_SUCCESS 1) One or more drivers were disconnected from the controller.
355 2) On entry, no drivers are managing ControllerHandle.
356 3) DriverImageHandle is not NULL, and on entry
357 DriverImageHandle is not managing ControllerHandle.
358 @retval EFI_INVALID_PARAMETER 1) ControllerHandle is NULL.
359 2) DriverImageHandle is not NULL, and it is not a valid EFI_HANDLE.
360 3) ChildHandle is not NULL, and it is not a valid EFI_HANDLE.
361 4) DriverImageHandle does not support the EFI_DRIVER_BINDING_PROTOCOL.
362 @retval EFI_OUT_OF_RESOURCES There are not enough resources available to disconnect any drivers from
363 ControllerHandle.
364 @retval EFI_DEVICE_ERROR The controller could not be disconnected because of a device error.
365
366 **/
367 typedef
368 EFI_STATUS
369 (EFIAPI *EFI_DISCONNECT_CONTROLLER)(
370 IN EFI_HANDLE ControllerHandle,
371 IN EFI_HANDLE DriverImageHandle, OPTIONAL
372 IN EFI_HANDLE ChildHandle OPTIONAL
373 );
374
375
376
377 //
378 // ConvertPointer DebugDisposition type.
379 //
380 #define EFI_OPTIONAL_PTR 0x00000001
381
382 /**
383 Determines the new virtual address that is to be used on subsequent memory accesses.
384
385 @param[in] DebugDisposition Supplies type information for the pointer being converted.
386 @param[in, out] Address A pointer to a pointer that is to be fixed to be the value needed
387 for the new virtual address mappings being applied.
388
389 @retval EFI_SUCCESS The pointer pointed to by Address was modified.
390 @retval EFI_INVALID_PARAMETER 1) Address is NULL.
391 2) *Address is NULL and DebugDisposition does
392 not have the EFI_OPTIONAL_PTR bit set.
393 @retval EFI_NOT_FOUND The pointer pointed to by Address was not found to be part
394 of the current memory map. This is normally fatal.
395
396 **/
397 typedef
398 EFI_STATUS
399 (EFIAPI *EFI_CONVERT_POINTER)(
400 IN UINTN DebugDisposition,
401 IN OUT VOID **Address
402 );
403
404
405 //
406 // These types can be ORed together as needed - for example,
407 // EVT_TIMER might be Ored with EVT_NOTIFY_WAIT or
408 // EVT_NOTIFY_SIGNAL.
409 //
410 #define EVT_TIMER 0x80000000
411 #define EVT_RUNTIME 0x40000000
412 #define EVT_NOTIFY_WAIT 0x00000100
413 #define EVT_NOTIFY_SIGNAL 0x00000200
414
415 #define EVT_SIGNAL_EXIT_BOOT_SERVICES 0x00000201
416 #define EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE 0x60000202
417
418 //
419 // The event's NotifyContext pointer points to a runtime memory
420 // address.
421 // The event is deprecated in UEFI2.0 and later specifications.
422 //
423 #define EVT_RUNTIME_CONTEXT 0x20000000
424
425
426 /**
427 Invoke a notification event
428
429 @param[in] Event Event whose notification function is being invoked.
430 @param[in] Context The pointer to the notification function's context,
431 which is implementation-dependent.
432
433 **/
434 typedef
435 VOID
436 (EFIAPI *EFI_EVENT_NOTIFY)(
437 IN EFI_EVENT Event,
438 IN VOID *Context
439 );
440
441 /**
442 Creates an event.
443
444 @param[in] Type The type of event to create and its mode and attributes.
445 @param[in] NotifyTpl The task priority level of event notifications, if needed.
446 @param[in] NotifyFunction The pointer to the event's notification function, if any.
447 @param[in] NotifyContext The pointer to the notification function's context; corresponds to parameter
448 Context in the notification function.
449 @param[out] Event The pointer to the newly created event if the call succeeds; undefined
450 otherwise.
451
452 @retval EFI_SUCCESS The event structure was created.
453 @retval EFI_INVALID_PARAMETER One or more parameters are invalid.
454 @retval EFI_OUT_OF_RESOURCES The event could not be allocated.
455
456 **/
457 typedef
458 EFI_STATUS
459 (EFIAPI *EFI_CREATE_EVENT)(
460 IN UINT32 Type,
461 IN EFI_TPL NotifyTpl,
462 IN EFI_EVENT_NOTIFY NotifyFunction,
463 IN VOID *NotifyContext,
464 OUT EFI_EVENT *Event
465 );
466
467 /**
468 Creates an event in a group.
469
470 @param[in] Type The type of event to create and its mode and attributes.
471 @param[in] NotifyTpl The task priority level of event notifications,if needed.
472 @param[in] NotifyFunction The pointer to the event's notification function, if any.
473 @param[in] NotifyContext The pointer to the notification function's context; corresponds to parameter
474 Context in the notification function.
475 @param[in] EventGroup The pointer to the unique identifier of the group to which this event belongs.
476 If this is NULL, then the function behaves as if the parameters were passed
477 to CreateEvent.
478 @param[out] Event The pointer to the newly created event if the call succeeds; undefined
479 otherwise.
480
481 @retval EFI_SUCCESS The event structure was created.
482 @retval EFI_INVALID_PARAMETER One or more parameters are invalid.
483 @retval EFI_OUT_OF_RESOURCES The event could not be allocated.
484
485 **/
486 typedef
487 EFI_STATUS
488 (EFIAPI *EFI_CREATE_EVENT_EX)(
489 IN UINT32 Type,
490 IN EFI_TPL NotifyTpl,
491 IN EFI_EVENT_NOTIFY NotifyFunction OPTIONAL,
492 IN CONST VOID *NotifyContext OPTIONAL,
493 IN CONST EFI_GUID *EventGroup OPTIONAL,
494 OUT EFI_EVENT *Event
495 );
496
497 ///
498 /// Timer delay types
499 ///
500 typedef enum {
501 ///
502 /// An event's timer settings is to be cancelled and not trigger time is to be set/
503 ///
504 TimerCancel,
505 ///
506 /// An event is to be signaled periodically at a specified interval from the current time.
507 ///
508 TimerPeriodic,
509 ///
510 /// An event is to be signaled once at a specified interval from the current time.
511 ///
512 TimerRelative
513 } EFI_TIMER_DELAY;
514
515 /**
516 Sets the type of timer and the trigger time for a timer event.
517
518 @param[in] Event The timer event that is to be signaled at the specified time.
519 @param[in] Type The type of time that is specified in TriggerTime.
520 @param[in] TriggerTime The number of 100ns units until the timer expires.
521 A TriggerTime of 0 is legal.
522 If Type is TimerRelative and TriggerTime is 0, then the timer
523 event will be signaled on the next timer tick.
524 If Type is TimerPeriodic and TriggerTime is 0, then the timer
525 event will be signaled on every timer tick.
526
527 @retval EFI_SUCCESS The event has been set to be signaled at the requested time.
528 @retval EFI_INVALID_PARAMETER Event or Type is not valid.
529
530 **/
531 typedef
532 EFI_STATUS
533 (EFIAPI *EFI_SET_TIMER)(
534 IN EFI_EVENT Event,
535 IN EFI_TIMER_DELAY Type,
536 IN UINT64 TriggerTime
537 );
538
539 /**
540 Signals an event.
541
542 @param[in] Event The event to signal.
543
544 @retval EFI_SUCCESS The event has been signaled.
545
546 **/
547 typedef
548 EFI_STATUS
549 (EFIAPI *EFI_SIGNAL_EVENT)(
550 IN EFI_EVENT Event
551 );
552
553 /**
554 Stops execution until an event is signaled.
555
556 @param[in] NumberOfEvents The number of events in the Event array.
557 @param[in] Event An array of EFI_EVENT.
558 @param[out] Index The pointer to the index of the event which satisfied the wait condition.
559
560 @retval EFI_SUCCESS The event indicated by Index was signaled.
561 @retval EFI_INVALID_PARAMETER 1) NumberOfEvents is 0.
562 2) The event indicated by Index is of type
563 EVT_NOTIFY_SIGNAL.
564 @retval EFI_UNSUPPORTED The current TPL is not TPL_APPLICATION.
565
566 **/
567 typedef
568 EFI_STATUS
569 (EFIAPI *EFI_WAIT_FOR_EVENT)(
570 IN UINTN NumberOfEvents,
571 IN EFI_EVENT *Event,
572 OUT UINTN *Index
573 );
574
575 /**
576 Closes an event.
577
578 @param[in] Event The event to close.
579
580 @retval EFI_SUCCESS The event has been closed.
581
582 **/
583 typedef
584 EFI_STATUS
585 (EFIAPI *EFI_CLOSE_EVENT)(
586 IN EFI_EVENT Event
587 );
588
589 /**
590 Checks whether an event is in the signaled state.
591
592 @param[in] Event The event to check.
593
594 @retval EFI_SUCCESS The event is in the signaled state.
595 @retval EFI_NOT_READY The event is not in the signaled state.
596 @retval EFI_INVALID_PARAMETER Event is of type EVT_NOTIFY_SIGNAL.
597
598 **/
599 typedef
600 EFI_STATUS
601 (EFIAPI *EFI_CHECK_EVENT)(
602 IN EFI_EVENT Event
603 );
604
605
606 //
607 // Task priority level
608 //
609 #define TPL_APPLICATION 4
610 #define TPL_CALLBACK 8
611 #define TPL_NOTIFY 16
612 #define TPL_HIGH_LEVEL 31
613
614
615 /**
616 Raises a task's priority level and returns its previous level.
617
618 @param[in] NewTpl The new task priority level.
619
620 @return Previous task priority level
621
622 **/
623 typedef
624 EFI_TPL
625 (EFIAPI *EFI_RAISE_TPL)(
626 IN EFI_TPL NewTpl
627 );
628
629 /**
630 Restores a task's priority level to its previous value.
631
632 @param[in] OldTpl The previous task priority level to restore.
633
634 **/
635 typedef
636 VOID
637 (EFIAPI *EFI_RESTORE_TPL)(
638 IN EFI_TPL OldTpl
639 );
640
641 /**
642 Returns the value of a variable.
643
644 @param[in] VariableName A Null-terminated string that is the name of the vendor's
645 variable.
646 @param[in] VendorGuid A unique identifier for the vendor.
647 @param[out] Attributes If not NULL, a pointer to the memory location to return the
648 attributes bitmask for the variable.
649 @param[in, out] DataSize On input, the size in bytes of the return Data buffer.
650 On output the size of data returned in Data.
651 @param[out] Data The buffer to return the contents of the variable. May be NULL
652 with a zero DataSize in order to determine the size buffer needed.
653
654 @retval EFI_SUCCESS The function completed successfully.
655 @retval EFI_NOT_FOUND The variable was not found.
656 @retval EFI_BUFFER_TOO_SMALL The DataSize is too small for the result.
657 @retval EFI_INVALID_PARAMETER VariableName is NULL.
658 @retval EFI_INVALID_PARAMETER VendorGuid is NULL.
659 @retval EFI_INVALID_PARAMETER DataSize is NULL.
660 @retval EFI_INVALID_PARAMETER The DataSize is not too small and Data is NULL.
661 @retval EFI_DEVICE_ERROR The variable could not be retrieved due to a hardware error.
662 @retval EFI_SECURITY_VIOLATION The variable could not be retrieved due to an authentication failure.
663
664 **/
665 typedef
666 EFI_STATUS
667 (EFIAPI *EFI_GET_VARIABLE)(
668 IN CHAR16 *VariableName,
669 IN EFI_GUID *VendorGuid,
670 OUT UINT32 *Attributes, OPTIONAL
671 IN OUT UINTN *DataSize,
672 OUT VOID *Data OPTIONAL
673 );
674
675 /**
676 Enumerates the current variable names.
677
678 @param[in, out] VariableNameSize The size of the VariableName buffer. The size must be large
679 enough to fit input string supplied in VariableName buffer.
680 @param[in, out] VariableName On input, supplies the last VariableName that was returned
681 by GetNextVariableName(). On output, returns the Nullterminated
682 string of the current variable.
683 @param[in, out] VendorGuid On input, supplies the last VendorGuid that was returned by
684 GetNextVariableName(). On output, returns the
685 VendorGuid of the current variable.
686
687 @retval EFI_SUCCESS The function completed successfully.
688 @retval EFI_NOT_FOUND The next variable was not found.
689 @retval EFI_BUFFER_TOO_SMALL The VariableNameSize is too small for the result.
690 VariableNameSize has been updated with the size needed to complete the request.
691 @retval EFI_INVALID_PARAMETER VariableNameSize is NULL.
692 @retval EFI_INVALID_PARAMETER VariableName is NULL.
693 @retval EFI_INVALID_PARAMETER VendorGuid is NULL.
694 @retval EFI_INVALID_PARAMETER The input values of VariableName and VendorGuid are not a name and
695 GUID of an existing variable.
696 @retval EFI_INVALID_PARAMETER Null-terminator is not found in the first VariableNameSize bytes of
697 the input VariableName buffer.
698 @retval EFI_DEVICE_ERROR The variable could not be retrieved due to a hardware error.
699
700 **/
701 typedef
702 EFI_STATUS
703 (EFIAPI *EFI_GET_NEXT_VARIABLE_NAME)(
704 IN OUT UINTN *VariableNameSize,
705 IN OUT CHAR16 *VariableName,
706 IN OUT EFI_GUID *VendorGuid
707 );
708
709 /**
710 Sets the value of a variable.
711
712 @param[in] VariableName A Null-terminated string that is the name of the vendor's variable.
713 Each VariableName is unique for each VendorGuid. VariableName must
714 contain 1 or more characters. If VariableName is an empty string,
715 then EFI_INVALID_PARAMETER is returned.
716 @param[in] VendorGuid A unique identifier for the vendor.
717 @param[in] Attributes Attributes bitmask to set for the variable.
718 @param[in] DataSize The size in bytes of the Data buffer. Unless the EFI_VARIABLE_APPEND_WRITE or
719 EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS attribute is set, a size of zero
720 causes the variable to be deleted. When the EFI_VARIABLE_APPEND_WRITE attribute is
721 set, then a SetVariable() call with a DataSize of zero will not cause any change to
722 the variable value (the timestamp associated with the variable may be updated however
723 even if no new data value is provided,see the description of the
724 EFI_VARIABLE_AUTHENTICATION_2 descriptor below. In this case the DataSize will not
725 be zero since the EFI_VARIABLE_AUTHENTICATION_2 descriptor will be populated).
726 @param[in] Data The contents for the variable.
727
728 @retval EFI_SUCCESS The firmware has successfully stored the variable and its data as
729 defined by the Attributes.
730 @retval EFI_INVALID_PARAMETER An invalid combination of attribute bits, name, and GUID was supplied, or the
731 DataSize exceeds the maximum allowed.
732 @retval EFI_INVALID_PARAMETER VariableName is an empty string.
733 @retval EFI_OUT_OF_RESOURCES Not enough storage is available to hold the variable and its data.
734 @retval EFI_DEVICE_ERROR The variable could not be retrieved due to a hardware error.
735 @retval EFI_WRITE_PROTECTED The variable in question is read-only.
736 @retval EFI_WRITE_PROTECTED The variable in question cannot be deleted.
737 @retval EFI_SECURITY_VIOLATION The variable could not be written due to EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACESS being set,
738 but the AuthInfo does NOT pass the validation check carried out by the firmware.
739
740 @retval EFI_NOT_FOUND The variable trying to be updated or deleted was not found.
741
742 **/
743 typedef
744 EFI_STATUS
745 (EFIAPI *EFI_SET_VARIABLE)(
746 IN CHAR16 *VariableName,
747 IN EFI_GUID *VendorGuid,
748 IN UINT32 Attributes,
749 IN UINTN DataSize,
750 IN VOID *Data
751 );
752
753
754 ///
755 /// This provides the capabilities of the
756 /// real time clock device as exposed through the EFI interfaces.
757 ///
758 typedef struct {
759 ///
760 /// Provides the reporting resolution of the real-time clock device in
761 /// counts per second. For a normal PC-AT CMOS RTC device, this
762 /// value would be 1 Hz, or 1, to indicate that the device only reports
763 /// the time to the resolution of 1 second.
764 ///
765 UINT32 Resolution;
766 ///
767 /// Provides the timekeeping accuracy of the real-time clock in an
768 /// error rate of 1E-6 parts per million. For a clock with an accuracy
769 /// of 50 parts per million, the value in this field would be
770 /// 50,000,000.
771 ///
772 UINT32 Accuracy;
773 ///
774 /// A TRUE indicates that a time set operation clears the device's
775 /// time below the Resolution reporting level. A FALSE
776 /// indicates that the state below the Resolution level of the
777 /// device is not cleared when the time is set. Normal PC-AT CMOS
778 /// RTC devices set this value to FALSE.
779 ///
780 BOOLEAN SetsToZero;
781 } EFI_TIME_CAPABILITIES;
782
783 /**
784 Returns the current time and date information, and the time-keeping capabilities
785 of the hardware platform.
786
787 @param[out] Time A pointer to storage to receive a snapshot of the current time.
788 @param[out] Capabilities An optional pointer to a buffer to receive the real time clock
789 device's capabilities.
790
791 @retval EFI_SUCCESS The operation completed successfully.
792 @retval EFI_INVALID_PARAMETER Time is NULL.
793 @retval EFI_DEVICE_ERROR The time could not be retrieved due to hardware error.
794
795 **/
796 typedef
797 EFI_STATUS
798 (EFIAPI *EFI_GET_TIME)(
799 OUT EFI_TIME *Time,
800 OUT EFI_TIME_CAPABILITIES *Capabilities OPTIONAL
801 );
802
803 /**
804 Sets the current local time and date information.
805
806 @param[in] Time A pointer to the current time.
807
808 @retval EFI_SUCCESS The operation completed successfully.
809 @retval EFI_INVALID_PARAMETER A time field is out of range.
810 @retval EFI_DEVICE_ERROR The time could not be set due due to hardware error.
811
812 **/
813 typedef
814 EFI_STATUS
815 (EFIAPI *EFI_SET_TIME)(
816 IN EFI_TIME *Time
817 );
818
819 /**
820 Returns the current wakeup alarm clock setting.
821
822 @param[out] Enabled Indicates if the alarm is currently enabled or disabled.
823 @param[out] Pending Indicates if the alarm signal is pending and requires acknowledgement.
824 @param[out] Time The current alarm setting.
825
826 @retval EFI_SUCCESS The alarm settings were returned.
827 @retval EFI_INVALID_PARAMETER Enabled is NULL.
828 @retval EFI_INVALID_PARAMETER Pending is NULL.
829 @retval EFI_INVALID_PARAMETER Time is NULL.
830 @retval EFI_DEVICE_ERROR The wakeup time could not be retrieved due to a hardware error.
831 @retval EFI_UNSUPPORTED A wakeup timer is not supported on this platform.
832
833 **/
834 typedef
835 EFI_STATUS
836 (EFIAPI *EFI_GET_WAKEUP_TIME)(
837 OUT BOOLEAN *Enabled,
838 OUT BOOLEAN *Pending,
839 OUT EFI_TIME *Time
840 );
841
842 /**
843 Sets the system wakeup alarm clock time.
844
845 @param[in] Enable Enable or disable the wakeup alarm.
846 @param[in] Time If Enable is TRUE, the time to set the wakeup alarm for.
847 If Enable is FALSE, then this parameter is optional, and may be NULL.
848
849 @retval EFI_SUCCESS If Enable is TRUE, then the wakeup alarm was enabled. If
850 Enable is FALSE, then the wakeup alarm was disabled.
851 @retval EFI_INVALID_PARAMETER A time field is out of range.
852 @retval EFI_DEVICE_ERROR The wakeup time could not be set due to a hardware error.
853 @retval EFI_UNSUPPORTED A wakeup timer is not supported on this platform.
854
855 **/
856 typedef
857 EFI_STATUS
858 (EFIAPI *EFI_SET_WAKEUP_TIME)(
859 IN BOOLEAN Enable,
860 IN EFI_TIME *Time OPTIONAL
861 );
862
863 /**
864 Loads an EFI image into memory.
865
866 @param[in] BootPolicy If TRUE, indicates that the request originates from the boot
867 manager, and that the boot manager is attempting to load
868 FilePath as a boot selection. Ignored if SourceBuffer is
869 not NULL.
870 @param[in] ParentImageHandle The caller's image handle.
871 @param[in] DevicePath The DeviceHandle specific file path from which the image is
872 loaded.
873 @param[in] SourceBuffer If not NULL, a pointer to the memory location containing a copy
874 of the image to be loaded.
875 @param[in] SourceSize The size in bytes of SourceBuffer. Ignored if SourceBuffer is NULL.
876 @param[out] ImageHandle The pointer to the returned image handle that is created when the
877 image is successfully loaded.
878
879 @retval EFI_SUCCESS Image was loaded into memory correctly.
880 @retval EFI_NOT_FOUND Both SourceBuffer and DevicePath are NULL.
881 @retval EFI_INVALID_PARAMETER One or more parametes are invalid.
882 @retval EFI_UNSUPPORTED The image type is not supported.
883 @retval EFI_OUT_OF_RESOURCES Image was not loaded due to insufficient resources.
884 @retval EFI_LOAD_ERROR Image was not loaded because the image format was corrupt or not
885 understood.
886 @retval EFI_DEVICE_ERROR Image was not loaded because the device returned a read error.
887 @retval EFI_ACCESS_DENIED Image was not loaded because the platform policy prohibits the
888 image from being loaded. NULL is returned in *ImageHandle.
889 @retval EFI_SECURITY_VIOLATION Image was loaded and an ImageHandle was created with a
890 valid EFI_LOADED_IMAGE_PROTOCOL. However, the current
891 platform policy specifies that the image should not be started.
892 **/
893 typedef
894 EFI_STATUS
895 (EFIAPI *EFI_IMAGE_LOAD)(
896 IN BOOLEAN BootPolicy,
897 IN EFI_HANDLE ParentImageHandle,
898 IN EFI_DEVICE_PATH_PROTOCOL *DevicePath,
899 IN VOID *SourceBuffer OPTIONAL,
900 IN UINTN SourceSize,
901 OUT EFI_HANDLE *ImageHandle
902 );
903
904 /**
905 Transfers control to a loaded image's entry point.
906
907 @param[in] ImageHandle Handle of image to be started.
908 @param[out] ExitDataSize The pointer to the size, in bytes, of ExitData.
909 @param[out] ExitData The pointer to a pointer to a data buffer that includes a Null-terminated
910 string, optionally followed by additional binary data.
911
912 @retval EFI_INVALID_PARAMETER ImageHandle is either an invalid image handle or the image
913 has already been initialized with StartImage.
914 @retval EFI_SECURITY_VIOLATION The current platform policy specifies that the image should not be started.
915 @return Exit code from image
916
917 **/
918 typedef
919 EFI_STATUS
920 (EFIAPI *EFI_IMAGE_START)(
921 IN EFI_HANDLE ImageHandle,
922 OUT UINTN *ExitDataSize,
923 OUT CHAR16 **ExitData OPTIONAL
924 );
925
926 /**
927 Terminates a loaded EFI image and returns control to boot services.
928
929 @param[in] ImageHandle Handle that identifies the image. This parameter is passed to the
930 image on entry.
931 @param[in] ExitStatus The image's exit code.
932 @param[in] ExitDataSize The size, in bytes, of ExitData. Ignored if ExitStatus is EFI_SUCCESS.
933 @param[in] ExitData The pointer to a data buffer that includes a Null-terminated string,
934 optionally followed by additional binary data. The string is a
935 description that the caller may use to further indicate the reason
936 for the image's exit. ExitData is only valid if ExitStatus
937 is something other than EFI_SUCCESS. The ExitData buffer
938 must be allocated by calling AllocatePool().
939
940 @retval EFI_SUCCESS The image specified by ImageHandle was unloaded.
941 @retval EFI_INVALID_PARAMETER The image specified by ImageHandle has been loaded and
942 started with LoadImage() and StartImage(), but the
943 image is not the currently executing image.
944
945 **/
946 typedef
947 EFI_STATUS
948 (EFIAPI *EFI_EXIT)(
949 IN EFI_HANDLE ImageHandle,
950 IN EFI_STATUS ExitStatus,
951 IN UINTN ExitDataSize,
952 IN CHAR16 *ExitData OPTIONAL
953 );
954
955 /**
956 Unloads an image.
957
958 @param[in] ImageHandle Handle that identifies the image to be unloaded.
959
960 @retval EFI_SUCCESS The image has been unloaded.
961 @retval EFI_INVALID_PARAMETER ImageHandle is not a valid image handle.
962
963 **/
964 typedef
965 EFI_STATUS
966 (EFIAPI *EFI_IMAGE_UNLOAD)(
967 IN EFI_HANDLE ImageHandle
968 );
969
970 /**
971 Terminates all boot services.
972
973 @param[in] ImageHandle Handle that identifies the exiting image.
974 @param[in] MapKey Key to the latest memory map.
975
976 @retval EFI_SUCCESS Boot services have been terminated.
977 @retval EFI_INVALID_PARAMETER MapKey is incorrect.
978
979 **/
980 typedef
981 EFI_STATUS
982 (EFIAPI *EFI_EXIT_BOOT_SERVICES)(
983 IN EFI_HANDLE ImageHandle,
984 IN UINTN MapKey
985 );
986
987 /**
988 Induces a fine-grained stall.
989
990 @param[in] Microseconds The number of microseconds to stall execution.
991
992 @retval EFI_SUCCESS Execution was stalled at least the requested number of
993 Microseconds.
994
995 **/
996 typedef
997 EFI_STATUS
998 (EFIAPI *EFI_STALL)(
999 IN UINTN Microseconds
1000 );
1001
1002 /**
1003 Sets the system's watchdog timer.
1004
1005 @param[in] Timeout The number of seconds to set the watchdog timer to.
1006 @param[in] WatchdogCode The numeric code to log on a watchdog timer timeout event.
1007 @param[in] DataSize The size, in bytes, of WatchdogData.
1008 @param[in] WatchdogData A data buffer that includes a Null-terminated string, optionally
1009 followed by additional binary data.
1010
1011 @retval EFI_SUCCESS The timeout has been set.
1012 @retval EFI_INVALID_PARAMETER The supplied WatchdogCode is invalid.
1013 @retval EFI_UNSUPPORTED The system does not have a watchdog timer.
1014 @retval EFI_DEVICE_ERROR The watchdog timer could not be programmed due to a hardware
1015 error.
1016
1017 **/
1018 typedef
1019 EFI_STATUS
1020 (EFIAPI *EFI_SET_WATCHDOG_TIMER)(
1021 IN UINTN Timeout,
1022 IN UINT64 WatchdogCode,
1023 IN UINTN DataSize,
1024 IN CHAR16 *WatchdogData OPTIONAL
1025 );
1026
1027 /**
1028 Resets the entire platform.
1029
1030 @param[in] ResetType The type of reset to perform.
1031 @param[in] ResetStatus The status code for the reset.
1032 @param[in] DataSize The size, in bytes, of ResetData.
1033 @param[in] ResetData For a ResetType of EfiResetCold, EfiResetWarm, or
1034 EfiResetShutdown the data buffer starts with a Null-terminated
1035 string, optionally followed by additional binary data.
1036 The string is a description that the caller may use to further
1037 indicate the reason for the system reset.
1038 For a ResetType of EfiResetPlatformSpecific the data buffer
1039 also starts with a Null-terminated string that is followed
1040 by an EFI_GUID that describes the specific type of reset to perform.
1041 **/
1042 typedef
1043 VOID
1044 (EFIAPI *EFI_RESET_SYSTEM)(
1045 IN EFI_RESET_TYPE ResetType,
1046 IN EFI_STATUS ResetStatus,
1047 IN UINTN DataSize,
1048 IN VOID *ResetData OPTIONAL
1049 );
1050
1051 /**
1052 Returns a monotonically increasing count for the platform.
1053
1054 @param[out] Count The pointer to returned value.
1055
1056 @retval EFI_SUCCESS The next monotonic count was returned.
1057 @retval EFI_INVALID_PARAMETER Count is NULL.
1058 @retval EFI_DEVICE_ERROR The device is not functioning properly.
1059
1060 **/
1061 typedef
1062 EFI_STATUS
1063 (EFIAPI *EFI_GET_NEXT_MONOTONIC_COUNT)(
1064 OUT UINT64 *Count
1065 );
1066
1067 /**
1068 Returns the next high 32 bits of the platform's monotonic counter.
1069
1070 @param[out] HighCount The pointer to returned value.
1071
1072 @retval EFI_SUCCESS The next high monotonic count was returned.
1073 @retval EFI_INVALID_PARAMETER HighCount is NULL.
1074 @retval EFI_DEVICE_ERROR The device is not functioning properly.
1075
1076 **/
1077 typedef
1078 EFI_STATUS
1079 (EFIAPI *EFI_GET_NEXT_HIGH_MONO_COUNT)(
1080 OUT UINT32 *HighCount
1081 );
1082
1083 /**
1084 Computes and returns a 32-bit CRC for a data buffer.
1085
1086 @param[in] Data A pointer to the buffer on which the 32-bit CRC is to be computed.
1087 @param[in] DataSize The number of bytes in the buffer Data.
1088 @param[out] Crc32 The 32-bit CRC that was computed for the data buffer specified by Data
1089 and DataSize.
1090
1091 @retval EFI_SUCCESS The 32-bit CRC was computed for the data buffer and returned in
1092 Crc32.
1093 @retval EFI_INVALID_PARAMETER Data is NULL.
1094 @retval EFI_INVALID_PARAMETER Crc32 is NULL.
1095 @retval EFI_INVALID_PARAMETER DataSize is 0.
1096
1097 **/
1098 typedef
1099 EFI_STATUS
1100 (EFIAPI *EFI_CALCULATE_CRC32)(
1101 IN VOID *Data,
1102 IN UINTN DataSize,
1103 OUT UINT32 *Crc32
1104 );
1105
1106 /**
1107 Copies the contents of one buffer to another buffer.
1108
1109 @param[in] Destination The pointer to the destination buffer of the memory copy.
1110 @param[in] Source The pointer to the source buffer of the memory copy.
1111 @param[in] Length Number of bytes to copy from Source to Destination.
1112
1113 **/
1114 typedef
1115 VOID
1116 (EFIAPI *EFI_COPY_MEM)(
1117 IN VOID *Destination,
1118 IN VOID *Source,
1119 IN UINTN Length
1120 );
1121
1122 /**
1123 The SetMem() function fills a buffer with a specified value.
1124
1125 @param[in] Buffer The pointer to the buffer to fill.
1126 @param[in] Size Number of bytes in Buffer to fill.
1127 @param[in] Value Value to fill Buffer with.
1128
1129 **/
1130 typedef
1131 VOID
1132 (EFIAPI *EFI_SET_MEM)(
1133 IN VOID *Buffer,
1134 IN UINTN Size,
1135 IN UINT8 Value
1136 );
1137
1138 ///
1139 /// Enumeration of EFI Interface Types
1140 ///
1141 typedef enum {
1142 ///
1143 /// Indicates that the supplied protocol interface is supplied in native form.
1144 ///
1145 EFI_NATIVE_INTERFACE
1146 } EFI_INTERFACE_TYPE;
1147
1148 /**
1149 Installs a protocol interface on a device handle. If the handle does not exist, it is created and added
1150 to the list of handles in the system. InstallMultipleProtocolInterfaces() performs
1151 more error checking than InstallProtocolInterface(), so it is recommended that
1152 InstallMultipleProtocolInterfaces() be used in place of
1153 InstallProtocolInterface()
1154
1155 @param[in, out] Handle A pointer to the EFI_HANDLE on which the interface is to be installed.
1156 @param[in] Protocol The numeric ID of the protocol interface.
1157 @param[in] InterfaceType Indicates whether Interface is supplied in native form.
1158 @param[in] Interface A pointer to the protocol interface.
1159
1160 @retval EFI_SUCCESS The protocol interface was installed.
1161 @retval EFI_OUT_OF_RESOURCES Space for a new handle could not be allocated.
1162 @retval EFI_INVALID_PARAMETER Handle is NULL.
1163 @retval EFI_INVALID_PARAMETER Protocol is NULL.
1164 @retval EFI_INVALID_PARAMETER InterfaceType is not EFI_NATIVE_INTERFACE.
1165 @retval EFI_INVALID_PARAMETER Protocol is already installed on the handle specified by Handle.
1166
1167 **/
1168 typedef
1169 EFI_STATUS
1170 (EFIAPI *EFI_INSTALL_PROTOCOL_INTERFACE)(
1171 IN OUT EFI_HANDLE *Handle,
1172 IN EFI_GUID *Protocol,
1173 IN EFI_INTERFACE_TYPE InterfaceType,
1174 IN VOID *Interface
1175 );
1176
1177 /**
1178 Installs one or more protocol interfaces into the boot services environment.
1179
1180 @param[in, out] Handle The pointer to a handle to install the new protocol interfaces on,
1181 or a pointer to NULL if a new handle is to be allocated.
1182 @param ... A variable argument list containing pairs of protocol GUIDs and protocol
1183 interfaces.
1184
1185 @retval EFI_SUCCESS All the protocol interface was installed.
1186 @retval EFI_OUT_OF_RESOURCES There was not enough memory in pool to install all the protocols.
1187 @retval EFI_ALREADY_STARTED A Device Path Protocol instance was passed in that is already present in
1188 the handle database.
1189 @retval EFI_INVALID_PARAMETER Handle is NULL.
1190 @retval EFI_INVALID_PARAMETER Protocol is already installed on the handle specified by Handle.
1191
1192 **/
1193 typedef
1194 EFI_STATUS
1195 (EFIAPI *EFI_INSTALL_MULTIPLE_PROTOCOL_INTERFACES)(
1196 IN OUT EFI_HANDLE *Handle,
1197 ...
1198 );
1199
1200 /**
1201 Reinstalls a protocol interface on a device handle.
1202
1203 @param[in] Handle Handle on which the interface is to be reinstalled.
1204 @param[in] Protocol The numeric ID of the interface.
1205 @param[in] OldInterface A pointer to the old interface. NULL can be used if a structure is not
1206 associated with Protocol.
1207 @param[in] NewInterface A pointer to the new interface.
1208
1209 @retval EFI_SUCCESS The protocol interface was reinstalled.
1210 @retval EFI_NOT_FOUND The OldInterface on the handle was not found.
1211 @retval EFI_ACCESS_DENIED The protocol interface could not be reinstalled,
1212 because OldInterface is still being used by a
1213 driver that will not release it.
1214 @retval EFI_INVALID_PARAMETER Handle is NULL.
1215 @retval EFI_INVALID_PARAMETER Protocol is NULL.
1216
1217 **/
1218 typedef
1219 EFI_STATUS
1220 (EFIAPI *EFI_REINSTALL_PROTOCOL_INTERFACE)(
1221 IN EFI_HANDLE Handle,
1222 IN EFI_GUID *Protocol,
1223 IN VOID *OldInterface,
1224 IN VOID *NewInterface
1225 );
1226
1227 /**
1228 Removes a protocol interface from a device handle. It is recommended that
1229 UninstallMultipleProtocolInterfaces() be used in place of
1230 UninstallProtocolInterface().
1231
1232 @param[in] Handle The handle on which the interface was installed.
1233 @param[in] Protocol The numeric ID of the interface.
1234 @param[in] Interface A pointer to the interface.
1235
1236 @retval EFI_SUCCESS The interface was removed.
1237 @retval EFI_NOT_FOUND The interface was not found.
1238 @retval EFI_ACCESS_DENIED The interface was not removed because the interface
1239 is still being used by a driver.
1240 @retval EFI_INVALID_PARAMETER Handle is NULL.
1241 @retval EFI_INVALID_PARAMETER Protocol is NULL.
1242
1243 **/
1244 typedef
1245 EFI_STATUS
1246 (EFIAPI *EFI_UNINSTALL_PROTOCOL_INTERFACE)(
1247 IN EFI_HANDLE Handle,
1248 IN EFI_GUID *Protocol,
1249 IN VOID *Interface
1250 );
1251
1252 /**
1253 Removes one or more protocol interfaces into the boot services environment.
1254
1255 @param[in] Handle The handle to remove the protocol interfaces from.
1256 @param ... A variable argument list containing pairs of protocol GUIDs and
1257 protocol interfaces.
1258
1259 @retval EFI_SUCCESS All the protocol interfaces were removed.
1260 @retval EFI_INVALID_PARAMETER One of the protocol interfaces was not previously installed on Handle.
1261
1262 **/
1263 typedef
1264 EFI_STATUS
1265 (EFIAPI *EFI_UNINSTALL_MULTIPLE_PROTOCOL_INTERFACES)(
1266 IN EFI_HANDLE Handle,
1267 ...
1268 );
1269
1270 /**
1271 Queries a handle to determine if it supports a specified protocol.
1272
1273 @param[in] Handle The handle being queried.
1274 @param[in] Protocol The published unique identifier of the protocol.
1275 @param[out] Interface Supplies the address where a pointer to the corresponding Protocol
1276 Interface is returned.
1277
1278 @retval EFI_SUCCESS The interface information for the specified protocol was returned.
1279 @retval EFI_UNSUPPORTED The device does not support the specified protocol.
1280 @retval EFI_INVALID_PARAMETER Handle is NULL.
1281 @retval EFI_INVALID_PARAMETER Protocol is NULL.
1282 @retval EFI_INVALID_PARAMETER Interface is NULL.
1283
1284 **/
1285 typedef
1286 EFI_STATUS
1287 (EFIAPI *EFI_HANDLE_PROTOCOL)(
1288 IN EFI_HANDLE Handle,
1289 IN EFI_GUID *Protocol,
1290 OUT VOID **Interface
1291 );
1292
1293 #define EFI_OPEN_PROTOCOL_BY_HANDLE_PROTOCOL 0x00000001
1294 #define EFI_OPEN_PROTOCOL_GET_PROTOCOL 0x00000002
1295 #define EFI_OPEN_PROTOCOL_TEST_PROTOCOL 0x00000004
1296 #define EFI_OPEN_PROTOCOL_BY_CHILD_CONTROLLER 0x00000008
1297 #define EFI_OPEN_PROTOCOL_BY_DRIVER 0x00000010
1298 #define EFI_OPEN_PROTOCOL_EXCLUSIVE 0x00000020
1299
1300 /**
1301 Queries a handle to determine if it supports a specified protocol. If the protocol is supported by the
1302 handle, it opens the protocol on behalf of the calling agent.
1303
1304 @param[in] Handle The handle for the protocol interface that is being opened.
1305 @param[in] Protocol The published unique identifier of the protocol.
1306 @param[out] Interface Supplies the address where a pointer to the corresponding Protocol
1307 Interface is returned.
1308 @param[in] AgentHandle The handle of the agent that is opening the protocol interface
1309 specified by Protocol and Interface.
1310 @param[in] ControllerHandle If the agent that is opening a protocol is a driver that follows the
1311 UEFI Driver Model, then this parameter is the controller handle
1312 that requires the protocol interface. If the agent does not follow
1313 the UEFI Driver Model, then this parameter is optional and may
1314 be NULL.
1315 @param[in] Attributes The open mode of the protocol interface specified by Handle
1316 and Protocol.
1317
1318 @retval EFI_SUCCESS An item was added to the open list for the protocol interface, and the
1319 protocol interface was returned in Interface.
1320 @retval EFI_UNSUPPORTED Handle does not support Protocol.
1321 @retval EFI_INVALID_PARAMETER One or more parameters are invalid.
1322 @retval EFI_ACCESS_DENIED Required attributes can't be supported in current environment.
1323 @retval EFI_ALREADY_STARTED Item on the open list already has requierd attributes whose agent
1324 handle is the same as AgentHandle.
1325
1326 **/
1327 typedef
1328 EFI_STATUS
1329 (EFIAPI *EFI_OPEN_PROTOCOL)(
1330 IN EFI_HANDLE Handle,
1331 IN EFI_GUID *Protocol,
1332 OUT VOID **Interface, OPTIONAL
1333 IN EFI_HANDLE AgentHandle,
1334 IN EFI_HANDLE ControllerHandle,
1335 IN UINT32 Attributes
1336 );
1337
1338
1339 /**
1340 Closes a protocol on a handle that was opened using OpenProtocol().
1341
1342 @param[in] Handle The handle for the protocol interface that was previously opened
1343 with OpenProtocol(), and is now being closed.
1344 @param[in] Protocol The published unique identifier of the protocol.
1345 @param[in] AgentHandle The handle of the agent that is closing the protocol interface.
1346 @param[in] ControllerHandle If the agent that opened a protocol is a driver that follows the
1347 UEFI Driver Model, then this parameter is the controller handle
1348 that required the protocol interface.
1349
1350 @retval EFI_SUCCESS The protocol instance was closed.
1351 @retval EFI_INVALID_PARAMETER 1) Handle is NULL.
1352 2) AgentHandle is NULL.
1353 3) ControllerHandle is not NULL and ControllerHandle is not a valid EFI_HANDLE.
1354 4) Protocol is NULL.
1355 @retval EFI_NOT_FOUND 1) Handle does not support the protocol specified by Protocol.
1356 2) The protocol interface specified by Handle and Protocol is not
1357 currently open by AgentHandle and ControllerHandle.
1358
1359 **/
1360 typedef
1361 EFI_STATUS
1362 (EFIAPI *EFI_CLOSE_PROTOCOL)(
1363 IN EFI_HANDLE Handle,
1364 IN EFI_GUID *Protocol,
1365 IN EFI_HANDLE AgentHandle,
1366 IN EFI_HANDLE ControllerHandle
1367 );
1368
1369 ///
1370 /// EFI Oprn Protocol Information Entry
1371 ///
1372 typedef struct {
1373 EFI_HANDLE AgentHandle;
1374 EFI_HANDLE ControllerHandle;
1375 UINT32 Attributes;
1376 UINT32 OpenCount;
1377 } EFI_OPEN_PROTOCOL_INFORMATION_ENTRY;
1378
1379 /**
1380 Retrieves the list of agents that currently have a protocol interface opened.
1381
1382 @param[in] Handle The handle for the protocol interface that is being queried.
1383 @param[in] Protocol The published unique identifier of the protocol.
1384 @param[out] EntryBuffer A pointer to a buffer of open protocol information in the form of
1385 EFI_OPEN_PROTOCOL_INFORMATION_ENTRY structures.
1386 @param[out] EntryCount A pointer to the number of entries in EntryBuffer.
1387
1388 @retval EFI_SUCCESS The open protocol information was returned in EntryBuffer, and the
1389 number of entries was returned EntryCount.
1390 @retval EFI_OUT_OF_RESOURCES There are not enough resources available to allocate EntryBuffer.
1391 @retval EFI_NOT_FOUND Handle does not support the protocol specified by Protocol.
1392
1393 **/
1394 typedef
1395 EFI_STATUS
1396 (EFIAPI *EFI_OPEN_PROTOCOL_INFORMATION)(
1397 IN EFI_HANDLE Handle,
1398 IN EFI_GUID *Protocol,
1399 OUT EFI_OPEN_PROTOCOL_INFORMATION_ENTRY **EntryBuffer,
1400 OUT UINTN *EntryCount
1401 );
1402
1403 /**
1404 Retrieves the list of protocol interface GUIDs that are installed on a handle in a buffer allocated
1405 from pool.
1406
1407 @param[in] Handle The handle from which to retrieve the list of protocol interface
1408 GUIDs.
1409 @param[out] ProtocolBuffer A pointer to the list of protocol interface GUID pointers that are
1410 installed on Handle.
1411 @param[out] ProtocolBufferCount A pointer to the number of GUID pointers present in
1412 ProtocolBuffer.
1413
1414 @retval EFI_SUCCESS The list of protocol interface GUIDs installed on Handle was returned in
1415 ProtocolBuffer. The number of protocol interface GUIDs was
1416 returned in ProtocolBufferCount.
1417 @retval EFI_OUT_OF_RESOURCES There is not enough pool memory to store the results.
1418 @retval EFI_INVALID_PARAMETER Handle is NULL.
1419 @retval EFI_INVALID_PARAMETER Handle is not a valid EFI_HANDLE.
1420 @retval EFI_INVALID_PARAMETER ProtocolBuffer is NULL.
1421 @retval EFI_INVALID_PARAMETER ProtocolBufferCount is NULL.
1422
1423 **/
1424 typedef
1425 EFI_STATUS
1426 (EFIAPI *EFI_PROTOCOLS_PER_HANDLE)(
1427 IN EFI_HANDLE Handle,
1428 OUT EFI_GUID ***ProtocolBuffer,
1429 OUT UINTN *ProtocolBufferCount
1430 );
1431
1432 /**
1433 Creates an event that is to be signaled whenever an interface is installed for a specified protocol.
1434
1435 @param[in] Protocol The numeric ID of the protocol for which the event is to be registered.
1436 @param[in] Event Event that is to be signaled whenever a protocol interface is registered
1437 for Protocol.
1438 @param[out] Registration A pointer to a memory location to receive the registration value.
1439
1440 @retval EFI_SUCCESS The notification event has been registered.
1441 @retval EFI_OUT_OF_RESOURCES Space for the notification event could not be allocated.
1442 @retval EFI_INVALID_PARAMETER Protocol is NULL.
1443 @retval EFI_INVALID_PARAMETER Event is NULL.
1444 @retval EFI_INVALID_PARAMETER Registration is NULL.
1445
1446 **/
1447 typedef
1448 EFI_STATUS
1449 (EFIAPI *EFI_REGISTER_PROTOCOL_NOTIFY)(
1450 IN EFI_GUID *Protocol,
1451 IN EFI_EVENT Event,
1452 OUT VOID **Registration
1453 );
1454
1455 ///
1456 /// Enumeration of EFI Locate Search Types
1457 ///
1458 typedef enum {
1459 ///
1460 /// Retrieve all the handles in the handle database.
1461 ///
1462 AllHandles,
1463 ///
1464 /// Retrieve the next handle fron a RegisterProtocolNotify() event.
1465 ///
1466 ByRegisterNotify,
1467 ///
1468 /// Retrieve the set of handles from the handle database that support a
1469 /// specified protocol.
1470 ///
1471 ByProtocol
1472 } EFI_LOCATE_SEARCH_TYPE;
1473
1474 /**
1475 Returns an array of handles that support a specified protocol.
1476
1477 @param[in] SearchType Specifies which handle(s) are to be returned.
1478 @param[in] Protocol Specifies the protocol to search by.
1479 @param[in] SearchKey Specifies the search key.
1480 @param[in, out] BufferSize On input, the size in bytes of Buffer. On output, the size in bytes of
1481 the array returned in Buffer (if the buffer was large enough) or the
1482 size, in bytes, of the buffer needed to obtain the array (if the buffer was
1483 not large enough).
1484 @param[out] Buffer The buffer in which the array is returned.
1485
1486 @retval EFI_SUCCESS The array of handles was returned.
1487 @retval EFI_NOT_FOUND No handles match the search.
1488 @retval EFI_BUFFER_TOO_SMALL The BufferSize is too small for the result.
1489 @retval EFI_INVALID_PARAMETER SearchType is not a member of EFI_LOCATE_SEARCH_TYPE.
1490 @retval EFI_INVALID_PARAMETER SearchType is ByRegisterNotify and SearchKey is NULL.
1491 @retval EFI_INVALID_PARAMETER SearchType is ByProtocol and Protocol is NULL.
1492 @retval EFI_INVALID_PARAMETER One or more matches are found and BufferSize is NULL.
1493 @retval EFI_INVALID_PARAMETER BufferSize is large enough for the result and Buffer is NULL.
1494
1495 **/
1496 typedef
1497 EFI_STATUS
1498 (EFIAPI *EFI_LOCATE_HANDLE)(
1499 IN EFI_LOCATE_SEARCH_TYPE SearchType,
1500 IN EFI_GUID *Protocol, OPTIONAL
1501 IN VOID *SearchKey, OPTIONAL
1502 IN OUT UINTN *BufferSize,
1503 OUT EFI_HANDLE *Buffer
1504 );
1505
1506 /**
1507 Locates the handle to a device on the device path that supports the specified protocol.
1508
1509 @param[in] Protocol Specifies the protocol to search for.
1510 @param[in, out] DevicePath On input, a pointer to a pointer to the device path. On output, the device
1511 path pointer is modified to point to the remaining part of the device
1512 path.
1513 @param[out] Device A pointer to the returned device handle.
1514
1515 @retval EFI_SUCCESS The resulting handle was returned.
1516 @retval EFI_NOT_FOUND No handles match the search.
1517 @retval EFI_INVALID_PARAMETER Protocol is NULL.
1518 @retval EFI_INVALID_PARAMETER DevicePath is NULL.
1519 @retval EFI_INVALID_PARAMETER A handle matched the search and Device is NULL.
1520
1521 **/
1522 typedef
1523 EFI_STATUS
1524 (EFIAPI *EFI_LOCATE_DEVICE_PATH)(
1525 IN EFI_GUID *Protocol,
1526 IN OUT EFI_DEVICE_PATH_PROTOCOL **DevicePath,
1527 OUT EFI_HANDLE *Device
1528 );
1529
1530 /**
1531 Adds, updates, or removes a configuration table entry from the EFI System Table.
1532
1533 @param[in] Guid A pointer to the GUID for the entry to add, update, or remove.
1534 @param[in] Table A pointer to the configuration table for the entry to add, update, or
1535 remove. May be NULL.
1536
1537 @retval EFI_SUCCESS The (Guid, Table) pair was added, updated, or removed.
1538 @retval EFI_NOT_FOUND An attempt was made to delete a nonexistent entry.
1539 @retval EFI_INVALID_PARAMETER Guid is NULL.
1540 @retval EFI_OUT_OF_RESOURCES There is not enough memory available to complete the operation.
1541
1542 **/
1543 typedef
1544 EFI_STATUS
1545 (EFIAPI *EFI_INSTALL_CONFIGURATION_TABLE)(
1546 IN EFI_GUID *Guid,
1547 IN VOID *Table
1548 );
1549
1550 /**
1551 Returns an array of handles that support the requested protocol in a buffer allocated from pool.
1552
1553 @param[in] SearchType Specifies which handle(s) are to be returned.
1554 @param[in] Protocol Provides the protocol to search by.
1555 This parameter is only valid for a SearchType of ByProtocol.
1556 @param[in] SearchKey Supplies the search key depending on the SearchType.
1557 @param[in, out] NoHandles The number of handles returned in Buffer.
1558 @param[out] Buffer A pointer to the buffer to return the requested array of handles that
1559 support Protocol.
1560
1561 @retval EFI_SUCCESS The array of handles was returned in Buffer, and the number of
1562 handles in Buffer was returned in NoHandles.
1563 @retval EFI_NOT_FOUND No handles match the search.
1564 @retval EFI_OUT_OF_RESOURCES There is not enough pool memory to store the matching results.
1565 @retval EFI_INVALID_PARAMETER NoHandles is NULL.
1566 @retval EFI_INVALID_PARAMETER Buffer is NULL.
1567
1568 **/
1569 typedef
1570 EFI_STATUS
1571 (EFIAPI *EFI_LOCATE_HANDLE_BUFFER)(
1572 IN EFI_LOCATE_SEARCH_TYPE SearchType,
1573 IN EFI_GUID *Protocol, OPTIONAL
1574 IN VOID *SearchKey, OPTIONAL
1575 IN OUT UINTN *NoHandles,
1576 OUT EFI_HANDLE **Buffer
1577 );
1578
1579 /**
1580 Returns the first protocol instance that matches the given protocol.
1581
1582 @param[in] Protocol Provides the protocol to search for.
1583 @param[in] Registration Optional registration key returned from
1584 RegisterProtocolNotify().
1585 @param[out] Interface On return, a pointer to the first interface that matches Protocol and
1586 Registration.
1587
1588 @retval EFI_SUCCESS A protocol instance matching Protocol was found and returned in
1589 Interface.
1590 @retval EFI_NOT_FOUND No protocol instances were found that match Protocol and
1591 Registration.
1592 @retval EFI_INVALID_PARAMETER Interface is NULL.
1593 Protocol is NULL.
1594
1595 **/
1596 typedef
1597 EFI_STATUS
1598 (EFIAPI *EFI_LOCATE_PROTOCOL)(
1599 IN EFI_GUID *Protocol,
1600 IN VOID *Registration, OPTIONAL
1601 OUT VOID **Interface
1602 );
1603
1604 ///
1605 /// EFI Capsule Block Descriptor
1606 ///
1607 typedef struct {
1608 ///
1609 /// Length in bytes of the data pointed to by DataBlock/ContinuationPointer.
1610 ///
1611 UINT64 Length;
1612 union {
1613 ///
1614 /// Physical address of the data block. This member of the union is
1615 /// used if Length is not equal to zero.
1616 ///
1617 EFI_PHYSICAL_ADDRESS DataBlock;
1618 ///
1619 /// Physical address of another block of
1620 /// EFI_CAPSULE_BLOCK_DESCRIPTOR structures. This
1621 /// member of the union is used if Length is equal to zero. If
1622 /// ContinuationPointer is zero this entry represents the end of the list.
1623 ///
1624 EFI_PHYSICAL_ADDRESS ContinuationPointer;
1625 } Union;
1626 } EFI_CAPSULE_BLOCK_DESCRIPTOR;
1627
1628 ///
1629 /// EFI Capsule Header.
1630 ///
1631 typedef struct {
1632 ///
1633 /// A GUID that defines the contents of a capsule.
1634 ///
1635 EFI_GUID CapsuleGuid;
1636 ///
1637 /// The size of the capsule header. This may be larger than the size of
1638 /// the EFI_CAPSULE_HEADER since CapsuleGuid may imply
1639 /// extended header entries
1640 ///
1641 UINT32 HeaderSize;
1642 ///
1643 /// Bit-mapped list describing the capsule attributes. The Flag values
1644 /// of 0x0000 - 0xFFFF are defined by CapsuleGuid. Flag values
1645 /// of 0x10000 - 0xFFFFFFFF are defined by this specification
1646 ///
1647 UINT32 Flags;
1648 ///
1649 /// Size in bytes of the capsule.
1650 ///
1651 UINT32 CapsuleImageSize;
1652 } EFI_CAPSULE_HEADER;
1653
1654 ///
1655 /// The EFI System Table entry must point to an array of capsules
1656 /// that contain the same CapsuleGuid value. The array must be
1657 /// prefixed by a UINT32 that represents the size of the array of capsules.
1658 ///
1659 typedef struct {
1660 ///
1661 /// the size of the array of capsules.
1662 ///
1663 UINT32 CapsuleArrayNumber;
1664 ///
1665 /// Point to an array of capsules that contain the same CapsuleGuid value.
1666 ///
1667 VOID* CapsulePtr[1];
1668 } EFI_CAPSULE_TABLE;
1669
1670 #define CAPSULE_FLAGS_PERSIST_ACROSS_RESET 0x00010000
1671 #define CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE 0x00020000
1672 #define CAPSULE_FLAGS_INITIATE_RESET 0x00040000
1673
1674 /**
1675 Passes capsules to the firmware with both virtual and physical mapping. Depending on the intended
1676 consumption, the firmware may process the capsule immediately. If the payload should persist
1677 across a system reset, the reset value returned from EFI_QueryCapsuleCapabilities must
1678 be passed into ResetSystem() and will cause the capsule to be processed by the firmware as
1679 part of the reset process.
1680
1681 @param[in] CapsuleHeaderArray Virtual pointer to an array of virtual pointers to the capsules
1682 being passed into update capsule.
1683 @param[in] CapsuleCount Number of pointers to EFI_CAPSULE_HEADER in
1684 CaspuleHeaderArray.
1685 @param[in] ScatterGatherList Physical pointer to a set of
1686 EFI_CAPSULE_BLOCK_DESCRIPTOR that describes the
1687 location in physical memory of a set of capsules.
1688
1689 @retval EFI_SUCCESS Valid capsule was passed. If
1690 CAPSULE_FLAGS_PERSIT_ACROSS_RESET is not set, the
1691 capsule has been successfully processed by the firmware.
1692 @retval EFI_INVALID_PARAMETER CapsuleSize is NULL, or an incompatible set of flags were
1693 set in the capsule header.
1694 @retval EFI_INVALID_PARAMETER CapsuleCount is 0.
1695 @retval EFI_DEVICE_ERROR The capsule update was started, but failed due to a device error.
1696 @retval EFI_UNSUPPORTED The capsule type is not supported on this platform.
1697 @retval EFI_OUT_OF_RESOURCES When ExitBootServices() has been previously called this error indicates the capsule
1698 is compatible with this platform but is not capable of being submitted or processed
1699 in runtime. The caller may resubmit the capsule prior to ExitBootServices().
1700 @retval EFI_OUT_OF_RESOURCES When ExitBootServices() has not been previously called then this error indicates
1701 the capsule is compatible with this platform but there are insufficient resources to process.
1702
1703 **/
1704 typedef
1705 EFI_STATUS
1706 (EFIAPI *EFI_UPDATE_CAPSULE)(
1707 IN EFI_CAPSULE_HEADER **CapsuleHeaderArray,
1708 IN UINTN CapsuleCount,
1709 IN EFI_PHYSICAL_ADDRESS ScatterGatherList OPTIONAL
1710 );
1711
1712 /**
1713 Returns if the capsule can be supported via UpdateCapsule().
1714
1715 @param[in] CapsuleHeaderArray Virtual pointer to an array of virtual pointers to the capsules
1716 being passed into update capsule.
1717 @param[in] CapsuleCount Number of pointers to EFI_CAPSULE_HEADER in
1718 CaspuleHeaderArray.
1719 @param[out] MaxiumCapsuleSize On output the maximum size that UpdateCapsule() can
1720 support as an argument to UpdateCapsule() via
1721 CapsuleHeaderArray and ScatterGatherList.
1722 @param[out] ResetType Returns the type of reset required for the capsule update.
1723
1724 @retval EFI_SUCCESS Valid answer returned.
1725 @retval EFI_UNSUPPORTED The capsule type is not supported on this platform, and
1726 MaximumCapsuleSize and ResetType are undefined.
1727 @retval EFI_INVALID_PARAMETER MaximumCapsuleSize is NULL.
1728 @retval EFI_OUT_OF_RESOURCES When ExitBootServices() has been previously called this error indicates the capsule
1729 is compatible with this platform but is not capable of being submitted or processed
1730 in runtime. The caller may resubmit the capsule prior to ExitBootServices().
1731 @retval EFI_OUT_OF_RESOURCES When ExitBootServices() has not been previously called then this error indicates
1732 the capsule is compatible with this platform but there are insufficient resources to process.
1733
1734 **/
1735 typedef
1736 EFI_STATUS
1737 (EFIAPI *EFI_QUERY_CAPSULE_CAPABILITIES)(
1738 IN EFI_CAPSULE_HEADER **CapsuleHeaderArray,
1739 IN UINTN CapsuleCount,
1740 OUT UINT64 *MaximumCapsuleSize,
1741 OUT EFI_RESET_TYPE *ResetType
1742 );
1743
1744 /**
1745 Returns information about the EFI variables.
1746
1747 @param[in] Attributes Attributes bitmask to specify the type of variables on
1748 which to return information.
1749 @param[out] MaximumVariableStorageSize On output the maximum size of the storage space
1750 available for the EFI variables associated with the
1751 attributes specified.
1752 @param[out] RemainingVariableStorageSize Returns the remaining size of the storage space
1753 available for the EFI variables associated with the
1754 attributes specified.
1755 @param[out] MaximumVariableSize Returns the maximum size of the individual EFI
1756 variables associated with the attributes specified.
1757
1758 @retval EFI_SUCCESS Valid answer returned.
1759 @retval EFI_INVALID_PARAMETER An invalid combination of attribute bits was supplied
1760 @retval EFI_UNSUPPORTED The attribute is not supported on this platform, and the
1761 MaximumVariableStorageSize,
1762 RemainingVariableStorageSize, MaximumVariableSize
1763 are undefined.
1764
1765 **/
1766 typedef
1767 EFI_STATUS
1768 (EFIAPI *EFI_QUERY_VARIABLE_INFO)(
1769 IN UINT32 Attributes,
1770 OUT UINT64 *MaximumVariableStorageSize,
1771 OUT UINT64 *RemainingVariableStorageSize,
1772 OUT UINT64 *MaximumVariableSize
1773 );
1774
1775 //
1776 // Firmware should stop at a firmware user interface on next boot
1777 //
1778 #define EFI_OS_INDICATIONS_BOOT_TO_FW_UI 0x0000000000000001
1779 #define EFI_OS_INDICATIONS_TIMESTAMP_REVOCATION 0x0000000000000002
1780 #define EFI_OS_INDICATIONS_FILE_CAPSULE_DELIVERY_SUPPORTED 0x0000000000000004
1781 #define EFI_OS_INDICATIONS_FMP_CAPSULE_SUPPORTED 0x0000000000000008
1782 #define EFI_OS_INDICATIONS_CAPSULE_RESULT_VAR_SUPPORTED 0x0000000000000010
1783 #define EFI_OS_INDICATIONS_START_PLATFORM_RECOVERY 0x0000000000000040
1784
1785 //
1786 // EFI Runtime Services Table
1787 //
1788 #define EFI_SYSTEM_TABLE_SIGNATURE SIGNATURE_64 ('I','B','I',' ','S','Y','S','T')
1789 #define EFI_2_70_SYSTEM_TABLE_REVISION ((2 << 16) | (70))
1790 #define EFI_2_60_SYSTEM_TABLE_REVISION ((2 << 16) | (60))
1791 #define EFI_2_50_SYSTEM_TABLE_REVISION ((2 << 16) | (50))
1792 #define EFI_2_40_SYSTEM_TABLE_REVISION ((2 << 16) | (40))
1793 #define EFI_2_31_SYSTEM_TABLE_REVISION ((2 << 16) | (31))
1794 #define EFI_2_30_SYSTEM_TABLE_REVISION ((2 << 16) | (30))
1795 #define EFI_2_20_SYSTEM_TABLE_REVISION ((2 << 16) | (20))
1796 #define EFI_2_10_SYSTEM_TABLE_REVISION ((2 << 16) | (10))
1797 #define EFI_2_00_SYSTEM_TABLE_REVISION ((2 << 16) | (00))
1798 #define EFI_1_10_SYSTEM_TABLE_REVISION ((1 << 16) | (10))
1799 #define EFI_1_02_SYSTEM_TABLE_REVISION ((1 << 16) | (02))
1800 #define EFI_SYSTEM_TABLE_REVISION EFI_2_70_SYSTEM_TABLE_REVISION
1801 #define EFI_SPECIFICATION_VERSION EFI_SYSTEM_TABLE_REVISION
1802
1803 #define EFI_RUNTIME_SERVICES_SIGNATURE SIGNATURE_64 ('R','U','N','T','S','E','R','V')
1804 #define EFI_RUNTIME_SERVICES_REVISION EFI_SPECIFICATION_VERSION
1805
1806 ///
1807 /// EFI Runtime Services Table.
1808 ///
1809 typedef struct {
1810 ///
1811 /// The table header for the EFI Runtime Services Table.
1812 ///
1813 EFI_TABLE_HEADER Hdr;
1814
1815 //
1816 // Time Services
1817 //
1818 EFI_GET_TIME GetTime;
1819 EFI_SET_TIME SetTime;
1820 EFI_GET_WAKEUP_TIME GetWakeupTime;
1821 EFI_SET_WAKEUP_TIME SetWakeupTime;
1822
1823 //
1824 // Virtual Memory Services
1825 //
1826 EFI_SET_VIRTUAL_ADDRESS_MAP SetVirtualAddressMap;
1827 EFI_CONVERT_POINTER ConvertPointer;
1828
1829 //
1830 // Variable Services
1831 //
1832 EFI_GET_VARIABLE GetVariable;
1833 EFI_GET_NEXT_VARIABLE_NAME GetNextVariableName;
1834 EFI_SET_VARIABLE SetVariable;
1835
1836 //
1837 // Miscellaneous Services
1838 //
1839 EFI_GET_NEXT_HIGH_MONO_COUNT GetNextHighMonotonicCount;
1840 EFI_RESET_SYSTEM ResetSystem;
1841
1842 //
1843 // UEFI 2.0 Capsule Services
1844 //
1845 EFI_UPDATE_CAPSULE UpdateCapsule;
1846 EFI_QUERY_CAPSULE_CAPABILITIES QueryCapsuleCapabilities;
1847
1848 //
1849 // Miscellaneous UEFI 2.0 Service
1850 //
1851 EFI_QUERY_VARIABLE_INFO QueryVariableInfo;
1852 } EFI_RUNTIME_SERVICES;
1853
1854
1855 #define EFI_BOOT_SERVICES_SIGNATURE SIGNATURE_64 ('B','O','O','T','S','E','R','V')
1856 #define EFI_BOOT_SERVICES_REVISION EFI_SPECIFICATION_VERSION
1857
1858 ///
1859 /// EFI Boot Services Table.
1860 ///
1861 typedef struct {
1862 ///
1863 /// The table header for the EFI Boot Services Table.
1864 ///
1865 EFI_TABLE_HEADER Hdr;
1866
1867 //
1868 // Task Priority Services
1869 //
1870 EFI_RAISE_TPL RaiseTPL;
1871 EFI_RESTORE_TPL RestoreTPL;
1872
1873 //
1874 // Memory Services
1875 //
1876 EFI_ALLOCATE_PAGES AllocatePages;
1877 EFI_FREE_PAGES FreePages;
1878 EFI_GET_MEMORY_MAP GetMemoryMap;
1879 EFI_ALLOCATE_POOL AllocatePool;
1880 EFI_FREE_POOL FreePool;
1881
1882 //
1883 // Event & Timer Services
1884 //
1885 EFI_CREATE_EVENT CreateEvent;
1886 EFI_SET_TIMER SetTimer;
1887 EFI_WAIT_FOR_EVENT WaitForEvent;
1888 EFI_SIGNAL_EVENT SignalEvent;
1889 EFI_CLOSE_EVENT CloseEvent;
1890 EFI_CHECK_EVENT CheckEvent;
1891
1892 //
1893 // Protocol Handler Services
1894 //
1895 EFI_INSTALL_PROTOCOL_INTERFACE InstallProtocolInterface;
1896 EFI_REINSTALL_PROTOCOL_INTERFACE ReinstallProtocolInterface;
1897 EFI_UNINSTALL_PROTOCOL_INTERFACE UninstallProtocolInterface;
1898 EFI_HANDLE_PROTOCOL HandleProtocol;
1899 VOID *Reserved;
1900 EFI_REGISTER_PROTOCOL_NOTIFY RegisterProtocolNotify;
1901 EFI_LOCATE_HANDLE LocateHandle;
1902 EFI_LOCATE_DEVICE_PATH LocateDevicePath;
1903 EFI_INSTALL_CONFIGURATION_TABLE InstallConfigurationTable;
1904
1905 //
1906 // Image Services
1907 //
1908 EFI_IMAGE_LOAD LoadImage;
1909 EFI_IMAGE_START StartImage;
1910 EFI_EXIT Exit;
1911 EFI_IMAGE_UNLOAD UnloadImage;
1912 EFI_EXIT_BOOT_SERVICES ExitBootServices;
1913
1914 //
1915 // Miscellaneous Services
1916 //
1917 EFI_GET_NEXT_MONOTONIC_COUNT GetNextMonotonicCount;
1918 EFI_STALL Stall;
1919 EFI_SET_WATCHDOG_TIMER SetWatchdogTimer;
1920
1921 //
1922 // DriverSupport Services
1923 //
1924 EFI_CONNECT_CONTROLLER ConnectController;
1925 EFI_DISCONNECT_CONTROLLER DisconnectController;
1926
1927 //
1928 // Open and Close Protocol Services
1929 //
1930 EFI_OPEN_PROTOCOL OpenProtocol;
1931 EFI_CLOSE_PROTOCOL CloseProtocol;
1932 EFI_OPEN_PROTOCOL_INFORMATION OpenProtocolInformation;
1933
1934 //
1935 // Library Services
1936 //
1937 EFI_PROTOCOLS_PER_HANDLE ProtocolsPerHandle;
1938 EFI_LOCATE_HANDLE_BUFFER LocateHandleBuffer;
1939 EFI_LOCATE_PROTOCOL LocateProtocol;
1940 EFI_INSTALL_MULTIPLE_PROTOCOL_INTERFACES InstallMultipleProtocolInterfaces;
1941 EFI_UNINSTALL_MULTIPLE_PROTOCOL_INTERFACES UninstallMultipleProtocolInterfaces;
1942
1943 //
1944 // 32-bit CRC Services
1945 //
1946 EFI_CALCULATE_CRC32 CalculateCrc32;
1947
1948 //
1949 // Miscellaneous Services
1950 //
1951 EFI_COPY_MEM CopyMem;
1952 EFI_SET_MEM SetMem;
1953 EFI_CREATE_EVENT_EX CreateEventEx;
1954 } EFI_BOOT_SERVICES;
1955
1956 ///
1957 /// Contains a set of GUID/pointer pairs comprised of the ConfigurationTable field in the
1958 /// EFI System Table.
1959 ///
1960 typedef struct {
1961 ///
1962 /// The 128-bit GUID value that uniquely identifies the system configuration table.
1963 ///
1964 EFI_GUID VendorGuid;
1965 ///
1966 /// A pointer to the table associated with VendorGuid.
1967 ///
1968 VOID *VendorTable;
1969 } EFI_CONFIGURATION_TABLE;
1970
1971 ///
1972 /// EFI System Table
1973 ///
1974 typedef struct {
1975 ///
1976 /// The table header for the EFI System Table.
1977 ///
1978 EFI_TABLE_HEADER Hdr;
1979 ///
1980 /// A pointer to a null terminated string that identifies the vendor
1981 /// that produces the system firmware for the platform.
1982 ///
1983 CHAR16 *FirmwareVendor;
1984 ///
1985 /// A firmware vendor specific value that identifies the revision
1986 /// of the system firmware for the platform.
1987 ///
1988 UINT32 FirmwareRevision;
1989 ///
1990 /// The handle for the active console input device. This handle must support
1991 /// EFI_SIMPLE_TEXT_INPUT_PROTOCOL and EFI_SIMPLE_TEXT_INPUT_EX_PROTOCOL.
1992 ///
1993 EFI_HANDLE ConsoleInHandle;
1994 ///
1995 /// A pointer to the EFI_SIMPLE_TEXT_INPUT_PROTOCOL interface that is
1996 /// associated with ConsoleInHandle.
1997 ///
1998 EFI_SIMPLE_TEXT_INPUT_PROTOCOL *ConIn;
1999 ///
2000 /// The handle for the active console output device.
2001 ///
2002 EFI_HANDLE ConsoleOutHandle;
2003 ///
2004 /// A pointer to the EFI_SIMPLE_TEXT_OUTPUT_PROTOCOL interface
2005 /// that is associated with ConsoleOutHandle.
2006 ///
2007 EFI_SIMPLE_TEXT_OUTPUT_PROTOCOL *ConOut;
2008 ///
2009 /// The handle for the active standard error console device.
2010 /// This handle must support the EFI_SIMPLE_TEXT_OUTPUT_PROTOCOL.
2011 ///
2012 EFI_HANDLE StandardErrorHandle;
2013 ///
2014 /// A pointer to the EFI_SIMPLE_TEXT_OUTPUT_PROTOCOL interface
2015 /// that is associated with StandardErrorHandle.
2016 ///
2017 EFI_SIMPLE_TEXT_OUTPUT_PROTOCOL *StdErr;
2018 ///
2019 /// A pointer to the EFI Runtime Services Table.
2020 ///
2021 EFI_RUNTIME_SERVICES *RuntimeServices;
2022 ///
2023 /// A pointer to the EFI Boot Services Table.
2024 ///
2025 EFI_BOOT_SERVICES *BootServices;
2026 ///
2027 /// The number of system configuration tables in the buffer ConfigurationTable.
2028 ///
2029 UINTN NumberOfTableEntries;
2030 ///
2031 /// A pointer to the system configuration tables.
2032 /// The number of entries in the table is NumberOfTableEntries.
2033 ///
2034 EFI_CONFIGURATION_TABLE *ConfigurationTable;
2035 } EFI_SYSTEM_TABLE;
2036
2037 /**
2038 This is the declaration of an EFI image entry point. This entry point is
2039 the same for UEFI Applications, UEFI OS Loaders, and UEFI Drivers including
2040 both device drivers and bus drivers.
2041
2042 @param[in] ImageHandle The firmware allocated handle for the UEFI image.
2043 @param[in] SystemTable A pointer to the EFI System Table.
2044
2045 @retval EFI_SUCCESS The operation completed successfully.
2046 @retval Others An unexpected error occurred.
2047 **/
2048 typedef
2049 EFI_STATUS
2050 (EFIAPI *EFI_IMAGE_ENTRY_POINT)(
2051 IN EFI_HANDLE ImageHandle,
2052 IN EFI_SYSTEM_TABLE *SystemTable
2053 );
2054
2055 //
2056 // EFI Load Option. This data structure describes format of UEFI boot option variables.
2057 //
2058 // NOTE: EFI Load Option is a byte packed buffer of variable length fields.
2059 // The first two fields have fixed length. They are declared as members of the
2060 // EFI_LOAD_OPTION structure. All the other fields are variable length fields.
2061 // They are listed in the comment block below for reference purposes.
2062 //
2063 #pragma pack(1)
2064 typedef struct _EFI_LOAD_OPTION {
2065 ///
2066 /// The attributes for this load option entry. All unused bits must be zero
2067 /// and are reserved by the UEFI specification for future growth.
2068 ///
2069 UINT32 Attributes;
2070 ///
2071 /// Length in bytes of the FilePathList. OptionalData starts at offset
2072 /// sizeof(UINT32) + sizeof(UINT16) + StrSize(Description) + FilePathListLength
2073 /// of the EFI_LOAD_OPTION descriptor.
2074 ///
2075 UINT16 FilePathListLength;
2076 ///
2077 /// The user readable description for the load option.
2078 /// This field ends with a Null character.
2079 ///
2080 // CHAR16 Description[];
2081 ///
2082 /// A packed array of UEFI device paths. The first element of the array is a
2083 /// device path that describes the device and location of the Image for this
2084 /// load option. The FilePathList[0] is specific to the device type. Other
2085 /// device paths may optionally exist in the FilePathList, but their usage is
2086 /// OSV specific. Each element in the array is variable length, and ends at
2087 /// the device path end structure. Because the size of Description is
2088 /// arbitrary, this data structure is not guaranteed to be aligned on a
2089 /// natural boundary. This data structure may have to be copied to an aligned
2090 /// natural boundary before it is used.
2091 ///
2092 // EFI_DEVICE_PATH_PROTOCOL FilePathList[];
2093 ///
2094 /// The remaining bytes in the load option descriptor are a binary data buffer
2095 /// that is passed to the loaded image. If the field is zero bytes long, a
2096 /// NULL pointer is passed to the loaded image. The number of bytes in
2097 /// OptionalData can be computed by subtracting the starting offset of
2098 /// OptionalData from total size in bytes of the EFI_LOAD_OPTION.
2099 ///
2100 // UINT8 OptionalData[];
2101 } EFI_LOAD_OPTION;
2102 #pragma pack()
2103
2104 //
2105 // EFI Load Options Attributes
2106 //
2107 #define LOAD_OPTION_ACTIVE 0x00000001
2108 #define LOAD_OPTION_FORCE_RECONNECT 0x00000002
2109 #define LOAD_OPTION_HIDDEN 0x00000008
2110 #define LOAD_OPTION_CATEGORY 0x00001F00
2111
2112 #define LOAD_OPTION_CATEGORY_BOOT 0x00000000
2113 #define LOAD_OPTION_CATEGORY_APP 0x00000100
2114
2115 #define EFI_BOOT_OPTION_SUPPORT_KEY 0x00000001
2116 #define EFI_BOOT_OPTION_SUPPORT_APP 0x00000002
2117 #define EFI_BOOT_OPTION_SUPPORT_SYSPREP 0x00000010
2118 #define EFI_BOOT_OPTION_SUPPORT_COUNT 0x00000300
2119
2120 ///
2121 /// EFI Boot Key Data
2122 ///
2123 typedef union {
2124 struct {
2125 ///
2126 /// Indicates the revision of the EFI_KEY_OPTION structure. This revision level should be 0.
2127 ///
2128 UINT32 Revision : 8;
2129 ///
2130 /// Either the left or right Shift keys must be pressed (1) or must not be pressed (0).
2131 ///
2132 UINT32 ShiftPressed : 1;
2133 ///
2134 /// Either the left or right Control keys must be pressed (1) or must not be pressed (0).
2135 ///
2136 UINT32 ControlPressed : 1;
2137 ///
2138 /// Either the left or right Alt keys must be pressed (1) or must not be pressed (0).
2139 ///
2140 UINT32 AltPressed : 1;
2141 ///
2142 /// Either the left or right Logo keys must be pressed (1) or must not be pressed (0).
2143 ///
2144 UINT32 LogoPressed : 1;
2145 ///
2146 /// The Menu key must be pressed (1) or must not be pressed (0).
2147 ///
2148 UINT32 MenuPressed : 1;
2149 ///
2150 /// The SysReq key must be pressed (1) or must not be pressed (0).
2151 ///
2152 UINT32 SysReqPressed : 1;
2153 UINT32 Reserved : 16;
2154 ///
2155 /// Specifies the actual number of entries in EFI_KEY_OPTION.Keys, from 0-3. If
2156 /// zero, then only the shift state is considered. If more than one, then the boot option will
2157 /// only be launched if all of the specified keys are pressed with the same shift state.
2158 ///
2159 UINT32 InputKeyCount : 2;
2160 } Options;
2161 UINT32 PackedValue;
2162 } EFI_BOOT_KEY_DATA;
2163
2164 ///
2165 /// EFI Key Option.
2166 ///
2167 #pragma pack(1)
2168 typedef struct {
2169 ///
2170 /// Specifies options about how the key will be processed.
2171 ///
2172 EFI_BOOT_KEY_DATA KeyData;
2173 ///
2174 /// The CRC-32 which should match the CRC-32 of the entire EFI_LOAD_OPTION to
2175 /// which BootOption refers. If the CRC-32s do not match this value, then this key
2176 /// option is ignored.
2177 ///
2178 UINT32 BootOptionCrc;
2179 ///
2180 /// The Boot#### option which will be invoked if this key is pressed and the boot option
2181 /// is active (LOAD_OPTION_ACTIVE is set).
2182 ///
2183 UINT16 BootOption;
2184 ///
2185 /// The key codes to compare against those returned by the
2186 /// EFI_SIMPLE_TEXT_INPUT and EFI_SIMPLE_TEXT_INPUT_EX protocols.
2187 /// The number of key codes (0-3) is specified by the EFI_KEY_CODE_COUNT field in KeyOptions.
2188 ///
2189 //EFI_INPUT_KEY Keys[];
2190 } EFI_KEY_OPTION;
2191 #pragma pack()
2192
2193 //
2194 // EFI File location to boot from on removable media devices
2195 //
2196 #define EFI_REMOVABLE_MEDIA_FILE_NAME_IA32 L"\\EFI\\BOOT\\BOOTIA32.EFI"
2197 #define EFI_REMOVABLE_MEDIA_FILE_NAME_IA64 L"\\EFI\\BOOT\\BOOTIA64.EFI"
2198 #define EFI_REMOVABLE_MEDIA_FILE_NAME_X64 L"\\EFI\\BOOT\\BOOTX64.EFI"
2199 #define EFI_REMOVABLE_MEDIA_FILE_NAME_ARM L"\\EFI\\BOOT\\BOOTARM.EFI"
2200 #define EFI_REMOVABLE_MEDIA_FILE_NAME_AARCH64 L"\\EFI\\BOOT\\BOOTAA64.EFI"
2201
2202 #if defined (MDE_CPU_IA32)
2203 #define EFI_REMOVABLE_MEDIA_FILE_NAME EFI_REMOVABLE_MEDIA_FILE_NAME_IA32
2204 #elif defined (MDE_CPU_X64)
2205 #define EFI_REMOVABLE_MEDIA_FILE_NAME EFI_REMOVABLE_MEDIA_FILE_NAME_X64
2206 #elif defined (MDE_CPU_EBC)
2207 #elif defined (MDE_CPU_ARM)
2208 #define EFI_REMOVABLE_MEDIA_FILE_NAME EFI_REMOVABLE_MEDIA_FILE_NAME_ARM
2209 #elif defined (MDE_CPU_AARCH64)
2210 #define EFI_REMOVABLE_MEDIA_FILE_NAME EFI_REMOVABLE_MEDIA_FILE_NAME_AARCH64
2211 #else
2212 #error Unknown Processor Type
2213 #endif
2214
2215 //
2216 // The directory within the active EFI System Partition defined for delivery of capsule to firmware
2217 //
2218 #define EFI_CAPSULE_FILE_DIRECTORY L"\\EFI\\UpdateCapsule\\"
2219
2220 #include <Uefi/UefiPxe.h>
2221 #include <Uefi/UefiGpt.h>
2222 #include <Uefi/UefiInternalFormRepresentation.h>
2223
2224 #endif