Vishal Bhoj | 82c8071 | 2015-12-15 21:13:33 +0530 | [diff] [blame^] | 1 | /** @file
|
| 2 | EFI SMM Access2 Protocol as defined in the PI 1.2 specification.
|
| 3 |
|
| 4 | This protocol is used to control the visibility of the SMRAM on the platform.
|
| 5 | It abstracts the location and characteristics of SMRAM. The expectation is
|
| 6 | that the north bridge or memory controller would publish this protocol.
|
| 7 |
|
| 8 | The principal functionality found in the memory controller includes the following:
|
| 9 | - Exposing the SMRAM to all non-SMM agents, or the "open" state
|
| 10 | - Shrouding the SMRAM to all but the SMM agents, or the "closed" state
|
| 11 | - Preserving the system integrity, or "locking" the SMRAM, such that the settings cannot be
|
| 12 | perturbed by either boot service or runtime agents
|
| 13 |
|
| 14 | Copyright (c) 2009 - 2010, Intel Corporation. All rights reserved.<BR>
|
| 15 | This program and the accompanying materials
|
| 16 | are licensed and made available under the terms and conditions of the BSD License
|
| 17 | which accompanies this distribution. The full text of the license may be found at
|
| 18 | http://opensource.org/licenses/bsd-license.php
|
| 19 |
|
| 20 | THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
| 21 | WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
| 22 |
|
| 23 | **/
|
| 24 |
|
| 25 | #ifndef _SMM_ACCESS2_H_
|
| 26 | #define _SMM_ACCESS2_H_
|
| 27 |
|
| 28 | #define EFI_SMM_ACCESS2_PROTOCOL_GUID \
|
| 29 | { \
|
| 30 | 0xc2702b74, 0x800c, 0x4131, {0x87, 0x46, 0x8f, 0xb5, 0xb8, 0x9c, 0xe4, 0xac } \
|
| 31 | }
|
| 32 |
|
| 33 |
|
| 34 | typedef struct _EFI_SMM_ACCESS2_PROTOCOL EFI_SMM_ACCESS2_PROTOCOL;
|
| 35 |
|
| 36 | /**
|
| 37 | Opens the SMRAM area to be accessible by a boot-service driver.
|
| 38 |
|
| 39 | This function "opens" SMRAM so that it is visible while not inside of SMM. The function should
|
| 40 | return EFI_UNSUPPORTED if the hardware does not support hiding of SMRAM. The function
|
| 41 | should return EFI_DEVICE_ERROR if the SMRAM configuration is locked.
|
| 42 |
|
| 43 | @param[in] This The EFI_SMM_ACCESS2_PROTOCOL instance.
|
| 44 |
|
| 45 | @retval EFI_SUCCESS The operation was successful.
|
| 46 | @retval EFI_UNSUPPORTED The system does not support opening and closing of SMRAM.
|
| 47 | @retval EFI_DEVICE_ERROR SMRAM cannot be opened, perhaps because it is locked.
|
| 48 | **/
|
| 49 | typedef
|
| 50 | EFI_STATUS
|
| 51 | (EFIAPI *EFI_SMM_OPEN2)(
|
| 52 | IN EFI_SMM_ACCESS2_PROTOCOL *This
|
| 53 | );
|
| 54 |
|
| 55 | /**
|
| 56 | Inhibits access to the SMRAM.
|
| 57 |
|
| 58 | This function "closes" SMRAM so that it is not visible while outside of SMM. The function should
|
| 59 | return EFI_UNSUPPORTED if the hardware does not support hiding of SMRAM.
|
| 60 |
|
| 61 | @param[in] This The EFI_SMM_ACCESS2_PROTOCOL instance.
|
| 62 |
|
| 63 | @retval EFI_SUCCESS The operation was successful.
|
| 64 | @retval EFI_UNSUPPORTED The system does not support opening and closing of SMRAM.
|
| 65 | @retval EFI_DEVICE_ERROR SMRAM cannot be closed.
|
| 66 | **/
|
| 67 | typedef
|
| 68 | EFI_STATUS
|
| 69 | (EFIAPI *EFI_SMM_CLOSE2)(
|
| 70 | IN EFI_SMM_ACCESS2_PROTOCOL *This
|
| 71 | );
|
| 72 |
|
| 73 | /**
|
| 74 | Inhibits access to the SMRAM.
|
| 75 |
|
| 76 | This function prohibits access to the SMRAM region. This function is usually implemented such
|
| 77 | that it is a write-once operation.
|
| 78 |
|
| 79 | @param[in] This The EFI_SMM_ACCESS2_PROTOCOL instance.
|
| 80 |
|
| 81 | @retval EFI_SUCCESS The device was successfully locked.
|
| 82 | @retval EFI_UNSUPPORTED The system does not support locking of SMRAM.
|
| 83 | **/
|
| 84 | typedef
|
| 85 | EFI_STATUS
|
| 86 | (EFIAPI *EFI_SMM_LOCK2)(
|
| 87 | IN EFI_SMM_ACCESS2_PROTOCOL *This
|
| 88 | );
|
| 89 |
|
| 90 | /**
|
| 91 | Queries the memory controller for the possible regions that will support SMRAM.
|
| 92 |
|
| 93 | @param[in] This The EFI_SMM_ACCESS2_PROTOCOL instance.
|
| 94 | @param[in,out] SmramMapSize A pointer to the size, in bytes, of the SmramMemoryMap buffer.
|
| 95 | @param[in,out] SmramMap A pointer to the buffer in which firmware places the current memory map.
|
| 96 |
|
| 97 | @retval EFI_SUCCESS The chipset supported the given resource.
|
| 98 | @retval EFI_BUFFER_TOO_SMALL The SmramMap parameter was too small. The current buffer size
|
| 99 | needed to hold the memory map is returned in SmramMapSize.
|
| 100 | **/
|
| 101 | typedef
|
| 102 | EFI_STATUS
|
| 103 | (EFIAPI *EFI_SMM_CAPABILITIES2)(
|
| 104 | IN CONST EFI_SMM_ACCESS2_PROTOCOL *This,
|
| 105 | IN OUT UINTN *SmramMapSize,
|
| 106 | IN OUT EFI_SMRAM_DESCRIPTOR *SmramMap
|
| 107 | );
|
| 108 |
|
| 109 | ///
|
| 110 | /// EFI SMM Access2 Protocol is used to control the visibility of the SMRAM on the platform.
|
| 111 | /// It abstracts the location and characteristics of SMRAM. The expectation is
|
| 112 | /// that the north bridge or memory controller would publish this protocol.
|
| 113 | ///
|
| 114 | struct _EFI_SMM_ACCESS2_PROTOCOL {
|
| 115 | EFI_SMM_OPEN2 Open;
|
| 116 | EFI_SMM_CLOSE2 Close;
|
| 117 | EFI_SMM_LOCK2 Lock;
|
| 118 | EFI_SMM_CAPABILITIES2 GetCapabilities;
|
| 119 | ///
|
| 120 | /// Indicates the current state of the SMRAM. Set to TRUE if SMRAM is locked.
|
| 121 | ///
|
| 122 | BOOLEAN LockState;
|
| 123 | ///
|
| 124 | /// Indicates the current state of the SMRAM. Set to TRUE if SMRAM is open.
|
| 125 | ///
|
| 126 | BOOLEAN OpenState;
|
| 127 | };
|
| 128 |
|
| 129 | extern EFI_GUID gEfiSmmAccess2ProtocolGuid;
|
| 130 |
|
| 131 | #endif
|
| 132 |
|