blob: e0142710efcad327091944740a688f0edba09e0a [file] [log] [blame]
yshang1959ccb22007-06-08 11:31:52 +00001/** @file
AJFISH00edb212007-06-18 20:28:02 +00002 This includes some definitions introduced in UEFI that will be used in both PEI and DXE phases.
yshang1959ccb22007-06-08 11:31:52 +00003
hhuan13ab0eece2011-08-16 07:16:02 +00004Copyright (c) 2006 - 2011, Intel Corporation. All rights reserved.<BR>
myronporteraf2dc6a2010-03-12 22:19:12 +00005This program and the accompanying materials are licensed and made available under
6the terms and conditions of the BSD License that accompanies this distribution.
7The full text of the license may be found at
8http://opensource.org/licenses/bsd-license.php.
9
10THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
11WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
yshang1959ccb22007-06-08 11:31:52 +000012
yshang1959ccb22007-06-08 11:31:52 +000013**/
14
15#ifndef __UEFI_MULTIPHASE_H__
16#define __UEFI_MULTIPHASE_H__
17
lgao4bd86cb02009-09-02 09:23:28 +000018#include <Guid/WinCertificate.h>
klu28b132292008-06-24 07:14:18 +000019///
20/// Enumeration of memory types introduced in UEFI.
21///
yshang1959ccb22007-06-08 11:31:52 +000022typedef enum {
lgao41bf79372008-12-10 08:22:03 +000023 ///
24 /// Not used.
25 ///
AJFISH00edb212007-06-18 20:28:02 +000026 EfiReservedMemoryType,
lgao41bf79372008-12-10 08:22:03 +000027 ///
28 /// The code portions of a loaded application.
29 /// (Note that UEFI OS loaders are UEFI applications.)
30 ///
AJFISH00edb212007-06-18 20:28:02 +000031 EfiLoaderCode,
lgao41bf79372008-12-10 08:22:03 +000032 ///
33 /// The data portions of a loaded application and the default data allocation
34 /// type used by an application to allocate pool memory.
35 ///
AJFISH00edb212007-06-18 20:28:02 +000036 EfiLoaderData,
lgao41bf79372008-12-10 08:22:03 +000037 ///
myronporteraf2dc6a2010-03-12 22:19:12 +000038 /// The code portions of a loaded Boot Services Driver.
lgao41bf79372008-12-10 08:22:03 +000039 ///
AJFISH00edb212007-06-18 20:28:02 +000040 EfiBootServicesCode,
lgao41bf79372008-12-10 08:22:03 +000041 ///
42 /// The data portions of a loaded Boot Serves Driver, and the default data
43 /// allocation type used by a Boot Services Driver to allocate pool memory.
44 ///
AJFISH00edb212007-06-18 20:28:02 +000045 EfiBootServicesData,
lgao41bf79372008-12-10 08:22:03 +000046 ///
47 /// The code portions of a loaded Runtime Services Driver.
48 ///
AJFISH00edb212007-06-18 20:28:02 +000049 EfiRuntimeServicesCode,
lgao41bf79372008-12-10 08:22:03 +000050 ///
51 /// The data portions of a loaded Runtime Services Driver and the default
52 /// data allocation type used by a Runtime Services Driver to allocate pool memory.
53 ///
AJFISH00edb212007-06-18 20:28:02 +000054 EfiRuntimeServicesData,
lgao41bf79372008-12-10 08:22:03 +000055 ///
56 /// Free (unallocated) memory.
57 ///
AJFISH00edb212007-06-18 20:28:02 +000058 EfiConventionalMemory,
lgao41bf79372008-12-10 08:22:03 +000059 ///
60 /// Memory in which errors have been detected.
61 ///
AJFISH00edb212007-06-18 20:28:02 +000062 EfiUnusableMemory,
lgao41bf79372008-12-10 08:22:03 +000063 ///
64 /// Memory that holds the ACPI tables.
65 ///
AJFISH00edb212007-06-18 20:28:02 +000066 EfiACPIReclaimMemory,
lgao41bf79372008-12-10 08:22:03 +000067 ///
68 /// Address space reserved for use by the firmware.
69 ///
AJFISH00edb212007-06-18 20:28:02 +000070 EfiACPIMemoryNVS,
lgao41bf79372008-12-10 08:22:03 +000071 ///
72 /// Used by system firmware to request that a memory-mapped IO region
73 /// be mapped by the OS to a virtual address so it can be accessed by EFI runtime services.
74 ///
AJFISH00edb212007-06-18 20:28:02 +000075 EfiMemoryMappedIO,
lgao41bf79372008-12-10 08:22:03 +000076 ///
77 /// System memory-mapped IO region that is used to translate memory
78 /// cycles to IO cycles by the processor.
79 ///
AJFISH00edb212007-06-18 20:28:02 +000080 EfiMemoryMappedIOPortSpace,
lgao41bf79372008-12-10 08:22:03 +000081 ///
82 /// Address space reserved by the firmware for code that is part of the processor.
83 ///
AJFISH00edb212007-06-18 20:28:02 +000084 EfiPalCode,
85 EfiMaxMemoryType
yshang1959ccb22007-06-08 11:31:52 +000086} EFI_MEMORY_TYPE;
87
klu28b132292008-06-24 07:14:18 +000088///
89/// Data structure that precedes all of the standard EFI table types.
90///
yshang1959ccb22007-06-08 11:31:52 +000091typedef struct {
lgao41bf79372008-12-10 08:22:03 +000092 ///
93 /// A 64-bit signature that identifies the type of table that follows.
94 /// Unique signatures have been generated for the EFI System Table,
95 /// the EFI Boot Services Table, and the EFI Runtime Services Table.
96 ///
AJFISH00edb212007-06-18 20:28:02 +000097 UINT64 Signature;
lgao41bf79372008-12-10 08:22:03 +000098 ///
99 /// The revision of the EFI Specification to which this table
100 /// conforms. The upper 16 bits of this field contain the major
101 /// revision value, and the lower 16 bits contain the minor revision
102 /// value. The minor revision values are limited to the range of 00..99.
103 ///
AJFISH00edb212007-06-18 20:28:02 +0000104 UINT32 Revision;
lgao41bf79372008-12-10 08:22:03 +0000105 ///
106 /// The size, in bytes, of the entire table including the EFI_TABLE_HEADER.
107 ///
AJFISH00edb212007-06-18 20:28:02 +0000108 UINT32 HeaderSize;
lgao41bf79372008-12-10 08:22:03 +0000109 ///
110 /// The 32-bit CRC for the entire table. This value is computed by
111 /// setting this field to 0, and computing the 32-bit CRC for HeaderSize bytes.
112 ///
AJFISH00edb212007-06-18 20:28:02 +0000113 UINT32 CRC32;
lgao41bf79372008-12-10 08:22:03 +0000114 ///
115 /// Reserved field that must be set to 0.
116 ///
AJFISH00edb212007-06-18 20:28:02 +0000117 UINT32 Reserved;
yshang1959ccb22007-06-08 11:31:52 +0000118} EFI_TABLE_HEADER;
119
klu28b132292008-06-24 07:14:18 +0000120///
121/// Attributes of variable.
122///
hhuan13ab0eece2011-08-16 07:16:02 +0000123#define EFI_VARIABLE_NON_VOLATILE 0x00000001
124#define EFI_VARIABLE_BOOTSERVICE_ACCESS 0x00000002
125#define EFI_VARIABLE_RUNTIME_ACCESS 0x00000004
klu28b132292008-06-24 07:14:18 +0000126///
127/// This attribute is identified by the mnemonic 'HR'
128/// elsewhere in this specification.
129///
hhuan13ab0eece2011-08-16 07:16:02 +0000130#define EFI_VARIABLE_HARDWARE_ERROR_RECORD 0x00000008
131///
132/// Attributes of Authenticated Variable
133///
134#define EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS 0x00000010
135#define EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS 0x00000020
136#define EFI_VARIABLE_APPEND_WRITE 0x00000040
137
yshang1959ccb22007-06-08 11:31:52 +0000138
vanjeff3ed785e2008-10-22 09:27:42 +0000139///
140/// AuthInfo is a WIN_CERTIFICATE using the wCertificateType
141/// WIN_CERTIFICATE_UEFI_GUID and the CertType
sfu585560912011-12-09 07:22:59 +0000142/// EFI_CERT_TYPE_RSA2048_SHA256_GUID. If the attribute specifies
vanjeff3ed785e2008-10-22 09:27:42 +0000143/// authenticated access, then the Data buffer should begin with an
144/// authentication descriptor prior to the data payload and DataSize
145/// should reflect the the data.and descriptor size. The caller
146/// shall digest the Monotonic Count value and the associated data
147/// for the variable update using the SHA-256 1-way hash algorithm.
148/// The ensuing the 32-byte digest will be signed using the private
149/// key associated w/ the public/private 2048-bit RSA key-pair. The
150/// WIN_CERTIFICATE shall be used to describe the signature of the
151/// Variable data *Data. In addition, the signature will also
myronporteraf2dc6a2010-03-12 22:19:12 +0000152/// include the MonotonicCount value to guard against replay attacks.
vanjeff3ed785e2008-10-22 09:27:42 +0000153///
yshang1959ccb22007-06-08 11:31:52 +0000154typedef struct {
vanjeff3ed785e2008-10-22 09:27:42 +0000155 ///
156 /// Included in the signature of
157 /// AuthInfo.Used to ensure freshness/no
158 /// replay. Incremented during each
159 /// "Write" access.
160 ///
AJFISH00edb212007-06-18 20:28:02 +0000161 UINT64 MonotonicCount;
vanjeff3ed785e2008-10-22 09:27:42 +0000162 ///
163 /// Provides the authorization for the variable
164 /// access. It is a signature across the
165 /// variable data and the Monotonic Count
166 /// value. Caller uses Private key that is
167 /// associated with a public key that has been
168 /// provisioned via the key exchange.
169 ///
AJFISH00edb212007-06-18 20:28:02 +0000170 WIN_CERTIFICATE_UEFI_GUID AuthInfo;
yshang1959ccb22007-06-08 11:31:52 +0000171} EFI_VARIABLE_AUTHENTICATION;
172
hhuan13ab0eece2011-08-16 07:16:02 +0000173///
174/// When the attribute EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS is
175/// set, then the Data buffer shall begin with an instance of a complete (and serialized)
176/// EFI_VARIABLE_AUTHENTICATION_2 descriptor. The descriptor shall be followed by the new
177/// variable value and DataSize shall reflect the combined size of the descriptor and the new
178/// variable value. The authentication descriptor is not part of the variable data and is not
179/// returned by subsequent calls to GetVariable().
180///
181typedef struct {
182 ///
183 /// For the TimeStamp value, components Pad1, Nanosecond, TimeZone, Daylight and
184 /// Pad2 shall be set to 0. This means that the time shall always be expressed in GMT.
185 ///
186 EFI_TIME TimeStamp;
187 ///
188 /// Only a CertType of EFI_CERT_TYPE_PKCS7_GUID is accepted.
189 ///
190 WIN_CERTIFICATE_UEFI_GUID AuthInfo;
191 } EFI_VARIABLE_AUTHENTICATION_2;
yshang1959ccb22007-06-08 11:31:52 +0000192
hhuan13ab0eece2011-08-16 07:16:02 +0000193#endif