mirror of
				https://git.proxmox.com/git/mirror_edk2
				synced 2025-11-04 02:19:12 +00:00 
			
		
		
		
	git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@10105 6f19259b-4bc3-4df7-8a09-765794883524
		
			
				
	
	
		
			144 lines
		
	
	
		
			5.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			144 lines
		
	
	
		
			5.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/** @file
 | 
						|
  EFI SMM Access2 Protocol as defined in the PI 1.2 specification.
 | 
						|
 | 
						|
  This protocol is used to control the visibility of the SMRAM on the platform.
 | 
						|
  It abstracts the location and characteristics of SMRAM.  The expectation is
 | 
						|
  that the north bridge or memory controller would publish this protocol.
 | 
						|
 | 
						|
  The principal functionality found in the memory controller includes the following: 
 | 
						|
  - Exposing the SMRAM to all non-SMM agents, or the "open" state
 | 
						|
  - Shrouding the SMRAM to all but the SMM agents, or the "closed" state
 | 
						|
  - Preserving the system integrity, or "locking" the SMRAM, such that the settings cannot be 
 | 
						|
    perturbed by either boot service or runtime agents 
 | 
						|
 | 
						|
  Copyright (c) 2009 - 2010, Intel Corporation                                                         
 | 
						|
  All rights reserved. This program and the accompanying materials                          
 | 
						|
  are licensed and made available under the terms and conditions of the BSD License         
 | 
						|
  which accompanies this distribution.  The full text of the license may be found at        
 | 
						|
  http://opensource.org/licenses/bsd-license.php                                            
 | 
						|
 | 
						|
  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,                     
 | 
						|
  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.             
 | 
						|
 | 
						|
**/
 | 
						|
 | 
						|
#ifndef _SMM_ACCESS2_H_
 | 
						|
#define _SMM_ACCESS2_H_
 | 
						|
 | 
						|
///
 | 
						|
/// Note:
 | 
						|
///   To avoid name conflict between PI and Framework SMM spec, the following names defined
 | 
						|
///   in PI 1.2 SMM spec are renamed. These renamings are not yet in a public PI spec and errta.
 | 
						|
///
 | 
						|
///   EFI_SMM_OPEN         -> EFI_SMM_OPEN2
 | 
						|
///   EFI_SMM_CLOSE        -> EFI_SMM_CLOSE2
 | 
						|
///   EFI_SMM_LOCK         -> EFI_SMM_LOCK2
 | 
						|
///   EFI_SMM_CAPABILITIES -> EFI_SMM_CAPABILITIES2
 | 
						|
///
 | 
						|
 | 
						|
#define EFI_SMM_ACCESS2_PROTOCOL_GUID \
 | 
						|
  { \
 | 
						|
     0xc2702b74, 0x800c, 0x4131, {0x87, 0x46, 0x8f, 0xb5, 0xb8, 0x9c, 0xe4, 0xac } \
 | 
						|
  }
 | 
						|
 | 
						|
 | 
						|
typedef struct _EFI_SMM_ACCESS2_PROTOCOL  EFI_SMM_ACCESS2_PROTOCOL;
 | 
						|
 | 
						|
/**
 | 
						|
  Opens the SMRAM area to be accessible by a boot-service driver.
 | 
						|
 | 
						|
  This function "opens" SMRAM so that it is visible while not inside of SMM. The function should 
 | 
						|
  return EFI_UNSUPPORTED if the hardware does not support hiding of SMRAM. The function 
 | 
						|
  should return EFI_DEVICE_ERROR if the SMRAM configuration is locked.
 | 
						|
 | 
						|
  @param[in] This           The EFI_SMM_ACCESS2_PROTOCOL instance.
 | 
						|
 | 
						|
  @retval EFI_SUCCESS       The operation was successful.
 | 
						|
  @retval EFI_UNSUPPORTED   The system does not support opening and closing of SMRAM.
 | 
						|
  @retval EFI_DEVICE_ERROR  SMRAM cannot be opened, perhaps because it is locked.
 | 
						|
**/
 | 
						|
typedef
 | 
						|
EFI_STATUS
 | 
						|
(EFIAPI *EFI_SMM_OPEN2)(
 | 
						|
  IN EFI_SMM_ACCESS2_PROTOCOL  *This
 | 
						|
  );
 | 
						|
 | 
						|
/**
 | 
						|
  Inhibits access to the SMRAM.
 | 
						|
 | 
						|
  This function "closes" SMRAM so that it is not visible while outside of SMM. The function should 
 | 
						|
  return EFI_UNSUPPORTED if the hardware does not support hiding of SMRAM.
 | 
						|
 | 
						|
  @param[in] This           The EFI_SMM_ACCESS2_PROTOCOL instance.
 | 
						|
 | 
						|
  @retval EFI_SUCCESS       The operation was successful.
 | 
						|
  @retval EFI_UNSUPPORTED   The system does not support opening and closing of SMRAM.
 | 
						|
  @retval EFI_DEVICE_ERROR  SMRAM cannot be closed.
 | 
						|
**/
 | 
						|
typedef
 | 
						|
EFI_STATUS
 | 
						|
(EFIAPI *EFI_SMM_CLOSE2)(
 | 
						|
  IN EFI_SMM_ACCESS2_PROTOCOL  *This
 | 
						|
  );
 | 
						|
 | 
						|
/**
 | 
						|
  Inhibits access to the SMRAM.
 | 
						|
 | 
						|
  This function prohibits access to the SMRAM region.  This function is usually implemented such 
 | 
						|
  that it is a write-once operation. 
 | 
						|
 | 
						|
  @param[in] This          The EFI_SMM_ACCESS2_PROTOCOL instance.
 | 
						|
 | 
						|
  @retval EFI_SUCCESS      The device was successfully locked.
 | 
						|
  @retval EFI_UNSUPPORTED  The system does not support locking of SMRAM.
 | 
						|
**/
 | 
						|
typedef
 | 
						|
EFI_STATUS
 | 
						|
(EFIAPI *EFI_SMM_LOCK2)(
 | 
						|
  IN EFI_SMM_ACCESS2_PROTOCOL  *This
 | 
						|
  );
 | 
						|
 | 
						|
/**
 | 
						|
  Queries the memory controller for the possible regions that will support SMRAM.
 | 
						|
 | 
						|
  @param[in]     This           The EFI_SMM_ACCESS2_PROTOCOL instance.
 | 
						|
  @param[in,out] SmramMapSize   A pointer to the size, in bytes, of the SmramMemoryMap buffer.
 | 
						|
  @param[in,out] SmramMap       A pointer to the buffer in which firmware places the current memory map.
 | 
						|
 | 
						|
  @retval EFI_SUCCESS           The chipset supported the given resource.
 | 
						|
  @retval EFI_BUFFER_TOO_SMALL  The SmramMap parameter was too small.  The current buffer size 
 | 
						|
                                needed to hold the memory map is returned in SmramMapSize.
 | 
						|
**/
 | 
						|
typedef
 | 
						|
EFI_STATUS
 | 
						|
(EFIAPI *EFI_SMM_CAPABILITIES2)(
 | 
						|
  IN CONST EFI_SMM_ACCESS2_PROTOCOL  *This,
 | 
						|
  IN OUT UINTN                       *SmramMapSize,
 | 
						|
  IN OUT EFI_SMRAM_DESCRIPTOR        *SmramMap
 | 
						|
  );
 | 
						|
 | 
						|
///
 | 
						|
///  EFI SMM Access2 Protocol is used to control the visibility of the SMRAM on the platform.
 | 
						|
///  It abstracts the location and characteristics of SMRAM.  The expectation is
 | 
						|
///  that the north bridge or memory controller would publish this protocol.
 | 
						|
/// 
 | 
						|
struct _EFI_SMM_ACCESS2_PROTOCOL {
 | 
						|
  EFI_SMM_OPEN2          Open;
 | 
						|
  EFI_SMM_CLOSE2         Close;
 | 
						|
  EFI_SMM_LOCK2          Lock;
 | 
						|
  EFI_SMM_CAPABILITIES2  GetCapabilities;
 | 
						|
  ///
 | 
						|
  /// Indicates the current state of the SMRAM. Set to TRUE if SMRAM is locked.
 | 
						|
  ///
 | 
						|
  BOOLEAN               LockState;
 | 
						|
  ///
 | 
						|
  /// Indicates the current state of the SMRAM. Set to TRUE if SMRAM is open.
 | 
						|
  ///
 | 
						|
  BOOLEAN               OpenState;
 | 
						|
};
 | 
						|
 | 
						|
extern EFI_GUID gEfiSmmAccess2ProtocolGuid;
 | 
						|
 | 
						|
#endif
 | 
						|
 |