2009-05-27 23:10:18 +02:00
|
|
|
/** @file
|
|
|
|
Platform BDS customizations include file.
|
|
|
|
|
2010-04-28 14:43:04 +02:00
|
|
|
Copyright (c) 2006 - 2007, Intel Corporation. All rights reserved.<BR>
|
|
|
|
This program and the accompanying materials
|
2009-05-27 23:10:18 +02:00
|
|
|
are licensed and made available under the terms and conditions of the BSD License
|
|
|
|
which accompanies this distribution. The full text of the license may be found at
|
|
|
|
http://opensource.org/licenses/bsd-license.php
|
|
|
|
|
|
|
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|
|
|
|
|
|
|
Module Name:
|
|
|
|
|
|
|
|
BdsPlatform.h
|
|
|
|
|
|
|
|
Abstract:
|
|
|
|
|
|
|
|
Head file for BDS Platform specific code
|
|
|
|
|
|
|
|
**/
|
|
|
|
|
|
|
|
#ifndef _PLATFORM_SPECIFIC_BDS_PLATFORM_H_
|
|
|
|
#define _PLATFORM_SPECIFIC_BDS_PLATFORM_H_
|
|
|
|
|
|
|
|
|
|
|
|
#include <PiDxe.h>
|
|
|
|
|
|
|
|
#include <IndustryStandard/Pci.h>
|
|
|
|
#include <IndustryStandard/Acpi.h>
|
|
|
|
#include <IndustryStandard/SmBios.h>
|
2009-07-15 01:32:32 +02:00
|
|
|
#include <IndustryStandard/PeImage.h>
|
2009-05-27 23:10:18 +02:00
|
|
|
|
|
|
|
#include <Library/DebugLib.h>
|
|
|
|
#include <Library/BaseMemoryLib.h>
|
|
|
|
#include <Library/UefiBootServicesTableLib.h>
|
|
|
|
#include <Library/UefiRuntimeServicesTableLib.h>
|
|
|
|
#include <Library/MemoryAllocationLib.h>
|
|
|
|
#include <Library/BaseLib.h>
|
|
|
|
#include <Library/PcdLib.h>
|
|
|
|
#include <Library/PciLib.h>
|
|
|
|
#include <Library/GenericBdsLib.h>
|
|
|
|
#include <Library/PlatformBdsLib.h>
|
|
|
|
#include <Library/HobLib.h>
|
|
|
|
#include <Library/UefiLib.h>
|
|
|
|
#include <Library/DxeServicesTableLib.h>
|
|
|
|
#include <Library/DevicePathLib.h>
|
|
|
|
#include <Library/IoLib.h>
|
2009-09-16 18:29:03 +02:00
|
|
|
#include <Library/NvVarsFileLib.h>
|
OvmfPkg: install DxeSmmReadyToLock in PlatformBdsLib
Currently we have the following call chain in OVMF:
PlatformBdsPolicyBehavior()
[OvmfPkg/Library/PlatformBdsLib/BdsPlatform.c]
//
// signals End-of-Dxe
//
OnEndOfDxe() [OvmfPkg/AcpiS3SaveDxe/AcpiS3Save.c]
S3Ready() [OvmfPkg/AcpiS3SaveDxe/AcpiS3Save.c]
//
// 1. saves S3 state
//
SaveS3BootScript() [OvmfPkg/AcpiS3SaveDxe/AcpiS3Save.c]
//
// 2. saves INFO opcode in S3 boot script
// 3. installs DxeSmmReadyToLockProtocol
//
The bottom of this call chain was introduced in git commit 5a217a06 (SVN
r15305, "OvmfPkg: S3 Suspend: save boot script after ACPI context"). That
patch was necessary because there was no other way, due to GenericBdsLib
calling S3Save() from BdsLibBootViaBootOption(), to perform the necessary
steps in the right order:
- save S3 system information,
- save a final (well, only) boot script opcode,
- signal DxeSmmReadyToLock, closing the boot script, and locking down
LockBox and SMM.
The GenericBdsLib bug has been fixed in the previous patch -- the call in
BdsLibBootViaBootOption() has been eliminated.
Therefore, hoist the SaveS3BootScript() code, and call, from
OvmfPkg/AcpiS3SaveDxe, to PlatformBdsLib:
PlatformBdsPolicyBehavior()
[OvmfPkg/Library/PlatformBdsLib/BdsPlatform.c]
//
// signals End-of-Dxe
//
OnEndOfDxe() [OvmfPkg/AcpiS3SaveDxe/AcpiS3Save.c]
S3Ready() [OvmfPkg/AcpiS3SaveDxe/AcpiS3Save.c]
//
// 1. saves S3 state
//
<---
SaveS3BootScript() [OvmfPkg/Library/PlatformBdsLib/BdsPlatform.c]
//
// 2. saves INFO opcode in S3 boot script
// 3. installs DxeSmmReadyToLockProtocol
//
The installation of DxeSmmReadyToLockProtocol belongs with Platform BDS,
not AcpiS3SaveDxe, and we can now undo the hack in SVN r15305, without
upsetting the relative order of the steps.
Cc: Jordan Justen <jordan.l.justen@intel.com>
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Jordan Justen <jordan.l.justen@intel.com>
git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@18037 6f19259b-4bc3-4df7-8a09-765794883524
2015-07-26 10:02:24 +02:00
|
|
|
#include <Library/QemuFwCfgLib.h>
|
2009-05-27 23:10:18 +02:00
|
|
|
|
2009-07-15 01:32:32 +02:00
|
|
|
#include <Protocol/Decompress.h>
|
2009-05-27 23:10:18 +02:00
|
|
|
#include <Protocol/PciIo.h>
|
|
|
|
#include <Protocol/FirmwareVolume2.h>
|
2009-09-16 18:29:03 +02:00
|
|
|
#include <Protocol/SimpleFileSystem.h>
|
2015-07-14 14:01:52 +02:00
|
|
|
#include <Protocol/PciRootBridgeIo.h>
|
OvmfPkg: install DxeSmmReadyToLock in PlatformBdsLib
Currently we have the following call chain in OVMF:
PlatformBdsPolicyBehavior()
[OvmfPkg/Library/PlatformBdsLib/BdsPlatform.c]
//
// signals End-of-Dxe
//
OnEndOfDxe() [OvmfPkg/AcpiS3SaveDxe/AcpiS3Save.c]
S3Ready() [OvmfPkg/AcpiS3SaveDxe/AcpiS3Save.c]
//
// 1. saves S3 state
//
SaveS3BootScript() [OvmfPkg/AcpiS3SaveDxe/AcpiS3Save.c]
//
// 2. saves INFO opcode in S3 boot script
// 3. installs DxeSmmReadyToLockProtocol
//
The bottom of this call chain was introduced in git commit 5a217a06 (SVN
r15305, "OvmfPkg: S3 Suspend: save boot script after ACPI context"). That
patch was necessary because there was no other way, due to GenericBdsLib
calling S3Save() from BdsLibBootViaBootOption(), to perform the necessary
steps in the right order:
- save S3 system information,
- save a final (well, only) boot script opcode,
- signal DxeSmmReadyToLock, closing the boot script, and locking down
LockBox and SMM.
The GenericBdsLib bug has been fixed in the previous patch -- the call in
BdsLibBootViaBootOption() has been eliminated.
Therefore, hoist the SaveS3BootScript() code, and call, from
OvmfPkg/AcpiS3SaveDxe, to PlatformBdsLib:
PlatformBdsPolicyBehavior()
[OvmfPkg/Library/PlatformBdsLib/BdsPlatform.c]
//
// signals End-of-Dxe
//
OnEndOfDxe() [OvmfPkg/AcpiS3SaveDxe/AcpiS3Save.c]
S3Ready() [OvmfPkg/AcpiS3SaveDxe/AcpiS3Save.c]
//
// 1. saves S3 state
//
<---
SaveS3BootScript() [OvmfPkg/Library/PlatformBdsLib/BdsPlatform.c]
//
// 2. saves INFO opcode in S3 boot script
// 3. installs DxeSmmReadyToLockProtocol
//
The installation of DxeSmmReadyToLockProtocol belongs with Platform BDS,
not AcpiS3SaveDxe, and we can now undo the hack in SVN r15305, without
upsetting the relative order of the steps.
Cc: Jordan Justen <jordan.l.justen@intel.com>
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Jordan Justen <jordan.l.justen@intel.com>
git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@18037 6f19259b-4bc3-4df7-8a09-765794883524
2015-07-26 10:02:24 +02:00
|
|
|
#include <Protocol/S3SaveState.h>
|
|
|
|
#include <Protocol/DxeSmmReadyToLock.h>
|
2009-05-27 23:10:18 +02:00
|
|
|
|
|
|
|
#include <Guid/Acpi.h>
|
|
|
|
#include <Guid/SmBios.h>
|
|
|
|
#include <Guid/Mps.h>
|
|
|
|
#include <Guid/HobList.h>
|
|
|
|
#include <Guid/GlobalVariable.h>
|
OvmfPkg: PlatformBdsLib: signal End-of-Dxe event group
(Paraphrasing git commit 9cd7d3c5 / SVN r17713:)
Currently, OvmfPkg fails to signal the End-of-Dxe event group when
entering the BDS phase, which results in some loss of functionality, eg.
variable reclaim in the variable driver, and the memory region splitting
in the DXE core that belongs to the properties table feature specified in
UEFI-2.5.
As discussed on the edk2-devel mailing list here:
http://thread.gmane.org/gmane.comp.bios.tianocore.devel/16088/focus=16109
it is up to the platform BDS to signal End-of-Dxe, since there may be
platform specific ordering constraints with respect to the signalling of
the event that are difficult to honor at the generic level.
(OvmfPkg specifics:)
(1) In OvmfPkg, we can't signal End-of-Dxe before PCI enumeration
completes. According to the previous patch, that would trigger
OvmfPkg/AcpiS3SaveDxe to save S3 state *before* the following chain of
action happened:
- PCI enumeration completes
- ACPI tables are installed by OvmfPkg/AcpiPlatformDxe
- the FACS table becomes available
Since OvmfPkg/AcpiS3SaveDxe can only save S3 state once the FACS table
is available, we must delay the End-of-Dxe signal until after PCI
enumeration completes (ie. root bridges are connected).
(2) Pre-patch, S3Ready() in OvmfPkg/AcpiS3SaveDxe is entered from
BdsLibBootViaBootOption()
[IntelFrameworkModulePkg/Library/GenericBdsLib/BdsBoot.c].
After the patch, we enter S3Ready() earlier than that, by signaling
End-of-Dxe in PlatformBdsPolicyBehavior(). The timing / location of
this new call is correct as well, and the original call (that now
becomes the chronologically second call) becomes a no-op: S3Ready() is
protected against 2nd and later entries.
Cc: Jordan Justen <jordan.l.justen@intel.com>
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Jordan Justen <jordan.l.justen@intel.com>
git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@18035 6f19259b-4bc3-4df7-8a09-765794883524
2015-07-26 10:02:13 +02:00
|
|
|
#include <Guid/EventGroup.h>
|
2009-05-27 23:10:18 +02:00
|
|
|
|
2014-11-14 01:39:04 +01:00
|
|
|
#include <OvmfPlatforms.h>
|
|
|
|
|
2009-05-27 23:10:18 +02:00
|
|
|
extern BDS_CONSOLE_CONNECT_ENTRY gPlatformConsole[];
|
|
|
|
extern EFI_DEVICE_PATH_PROTOCOL *gPlatformConnectSequence[];
|
|
|
|
extern EFI_DEVICE_PATH_PROTOCOL *gPlatformDriverOption[];
|
|
|
|
extern ACPI_HID_DEVICE_PATH gPnpPs2KeyboardDeviceNode;
|
|
|
|
extern ACPI_HID_DEVICE_PATH gPnp16550ComPortDeviceNode;
|
|
|
|
extern UART_DEVICE_PATH gUartDeviceNode;
|
|
|
|
extern VENDOR_DEVICE_PATH gTerminalTypeDeviceNode;
|
|
|
|
//
|
|
|
|
//
|
|
|
|
//
|
|
|
|
#define VarConsoleInpDev L"ConInDev"
|
|
|
|
#define VarConsoleInp L"ConIn"
|
|
|
|
#define VarConsoleOutDev L"ConOutDev"
|
|
|
|
#define VarConsoleOut L"ConOut"
|
|
|
|
#define VarErrorOutDev L"ErrOutDev"
|
|
|
|
#define VarErrorOut L"ErrOut"
|
|
|
|
|
|
|
|
#define PCI_DEVICE_PATH_NODE(Func, Dev) \
|
|
|
|
{ \
|
2009-11-18 07:11:21 +01:00
|
|
|
{ \
|
|
|
|
HARDWARE_DEVICE_PATH, \
|
|
|
|
HW_PCI_DP, \
|
|
|
|
{ \
|
|
|
|
(UINT8) (sizeof (PCI_DEVICE_PATH)), \
|
|
|
|
(UINT8) ((sizeof (PCI_DEVICE_PATH)) >> 8) \
|
|
|
|
} \
|
|
|
|
}, \
|
2009-05-27 23:10:18 +02:00
|
|
|
(Func), \
|
|
|
|
(Dev) \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define PNPID_DEVICE_PATH_NODE(PnpId) \
|
|
|
|
{ \
|
2009-11-18 07:11:21 +01:00
|
|
|
{ \
|
|
|
|
ACPI_DEVICE_PATH, \
|
|
|
|
ACPI_DP, \
|
|
|
|
{ \
|
|
|
|
(UINT8) (sizeof (ACPI_HID_DEVICE_PATH)), \
|
|
|
|
(UINT8) ((sizeof (ACPI_HID_DEVICE_PATH)) >> 8) \
|
|
|
|
}, \
|
|
|
|
}, \
|
2009-05-27 23:10:18 +02:00
|
|
|
EISA_PNP_ID((PnpId)), \
|
|
|
|
0 \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define gPciIsaBridge \
|
|
|
|
PCI_DEVICE_PATH_NODE(0, 0x1f)
|
|
|
|
|
|
|
|
#define gP2PBridge \
|
|
|
|
PCI_DEVICE_PATH_NODE(0, 0x1e)
|
|
|
|
|
|
|
|
#define gPnpPs2Keyboard \
|
|
|
|
PNPID_DEVICE_PATH_NODE(0x0303)
|
|
|
|
|
|
|
|
#define gPnp16550ComPort \
|
|
|
|
PNPID_DEVICE_PATH_NODE(0x0501)
|
|
|
|
|
|
|
|
#define gUart \
|
|
|
|
{ \
|
2009-11-18 07:11:21 +01:00
|
|
|
{ \
|
|
|
|
MESSAGING_DEVICE_PATH, \
|
|
|
|
MSG_UART_DP, \
|
|
|
|
{ \
|
|
|
|
(UINT8) (sizeof (UART_DEVICE_PATH)), \
|
|
|
|
(UINT8) ((sizeof (UART_DEVICE_PATH)) >> 8) \
|
|
|
|
} \
|
|
|
|
}, \
|
2009-05-27 23:10:18 +02:00
|
|
|
0, \
|
|
|
|
115200, \
|
|
|
|
8, \
|
|
|
|
1, \
|
|
|
|
1 \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define gPcAnsiTerminal \
|
|
|
|
{ \
|
2009-11-18 07:11:21 +01:00
|
|
|
{ \
|
|
|
|
MESSAGING_DEVICE_PATH, \
|
|
|
|
MSG_VENDOR_DP, \
|
|
|
|
{ \
|
|
|
|
(UINT8) (sizeof (VENDOR_DEVICE_PATH)), \
|
|
|
|
(UINT8) ((sizeof (VENDOR_DEVICE_PATH)) >> 8) \
|
|
|
|
} \
|
|
|
|
}, \
|
2009-05-27 23:10:18 +02:00
|
|
|
DEVICE_PATH_MESSAGING_PC_ANSI \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define PCI_CLASS_SCC 0x07
|
|
|
|
#define PCI_SUBCLASS_SERIAL 0x00
|
|
|
|
#define PCI_IF_16550 0x02
|
|
|
|
#define IS_PCI_16550SERIAL(_p) IS_CLASS3 (_p, PCI_CLASS_SCC, PCI_SUBCLASS_SERIAL, PCI_IF_16550)
|
|
|
|
|
|
|
|
#define EFI_SYSTEM_TABLE_MAX_ADDRESS 0xFFFFFFFF
|
|
|
|
#define SYS_TABLE_PAD(ptr) (((~ptr) +1) & 0x07 )
|
|
|
|
|
|
|
|
#define IS_PCI_ISA_PDECODE(_p) IS_CLASS3 (_p, PCI_CLASS_BRIDGE, PCI_CLASS_BRIDGE_ISA_PDECODE, 0)
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
ACPI_HID_DEVICE_PATH PciRootBridge;
|
|
|
|
PCI_DEVICE_PATH IsaBridge;
|
|
|
|
ACPI_HID_DEVICE_PATH Keyboard;
|
|
|
|
EFI_DEVICE_PATH_PROTOCOL End;
|
|
|
|
} PLATFORM_DUMMY_ISA_KEYBOARD_DEVICE_PATH;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
ACPI_HID_DEVICE_PATH PciRootBridge;
|
|
|
|
PCI_DEVICE_PATH IsaBridge;
|
|
|
|
ACPI_HID_DEVICE_PATH IsaSerial;
|
|
|
|
UART_DEVICE_PATH Uart;
|
|
|
|
VENDOR_DEVICE_PATH TerminalType;
|
|
|
|
EFI_DEVICE_PATH_PROTOCOL End;
|
|
|
|
} PLATFORM_DUMMY_ISA_SERIAL_DEVICE_PATH;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
ACPI_HID_DEVICE_PATH PciRootBridge;
|
|
|
|
PCI_DEVICE_PATH VgaDevice;
|
|
|
|
EFI_DEVICE_PATH_PROTOCOL End;
|
|
|
|
} PLATFORM_DUMMY_PCI_VGA_DEVICE_PATH;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
ACPI_HID_DEVICE_PATH PciRootBridge;
|
|
|
|
PCI_DEVICE_PATH PciBridge;
|
|
|
|
PCI_DEVICE_PATH SerialDevice;
|
|
|
|
UART_DEVICE_PATH Uart;
|
|
|
|
VENDOR_DEVICE_PATH TerminalType;
|
|
|
|
EFI_DEVICE_PATH_PROTOCOL End;
|
|
|
|
} PLATFORM_DUMMY_PCI_SERIAL_DEVICE_PATH;
|
|
|
|
|
|
|
|
//
|
|
|
|
// the short form device path for Usb keyboard
|
|
|
|
//
|
|
|
|
#define CLASS_HID 3
|
|
|
|
#define SUBCLASS_BOOT 1
|
|
|
|
#define PROTOCOL_KEYBOARD 1
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
USB_CLASS_DEVICE_PATH UsbClass;
|
|
|
|
EFI_DEVICE_PATH_PROTOCOL End;
|
|
|
|
} USB_CLASS_FORMAT_DEVICE_PATH;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Platform BDS Functions
|
|
|
|
//
|
|
|
|
|
|
|
|
VOID
|
|
|
|
PlatformBdsGetDriverOption (
|
|
|
|
IN LIST_ENTRY *BdsDriverLists
|
|
|
|
);
|
|
|
|
|
|
|
|
EFI_STATUS
|
|
|
|
BdsMemoryTest (
|
|
|
|
EXTENDMEM_COVERAGE_LEVEL Level
|
|
|
|
);
|
|
|
|
|
|
|
|
EFI_STATUS
|
|
|
|
PlatformBdsShowProgress (
|
|
|
|
EFI_GRAPHICS_OUTPUT_BLT_PIXEL TitleForeground,
|
|
|
|
EFI_GRAPHICS_OUTPUT_BLT_PIXEL TitleBackground,
|
|
|
|
CHAR16 *Title,
|
|
|
|
EFI_GRAPHICS_OUTPUT_BLT_PIXEL ProgressColor,
|
|
|
|
UINTN Progress,
|
|
|
|
UINTN PreviousValue
|
|
|
|
);
|
|
|
|
|
|
|
|
VOID
|
|
|
|
PlatformBdsConnectSequence (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
|
|
|
EFI_STATUS
|
|
|
|
ProcessCapsules (
|
|
|
|
EFI_BOOT_MODE BootMode
|
|
|
|
);
|
|
|
|
|
|
|
|
EFI_STATUS
|
|
|
|
PlatformBdsConnectConsole (
|
|
|
|
IN BDS_CONSOLE_CONNECT_ENTRY *PlatformConsole
|
|
|
|
);
|
|
|
|
|
|
|
|
EFI_STATUS
|
|
|
|
PlatformBdsNoConsoleAction (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
|
|
|
EFI_STATUS
|
|
|
|
ConvertMpsTable (
|
|
|
|
IN OUT VOID **Table
|
|
|
|
);
|
|
|
|
|
|
|
|
EFI_STATUS
|
|
|
|
ConvertSmbiosTable (
|
|
|
|
IN OUT VOID **Table
|
|
|
|
);
|
|
|
|
|
|
|
|
EFI_STATUS
|
|
|
|
ConvertAcpiTable (
|
|
|
|
IN UINTN TableLen,
|
|
|
|
IN OUT VOID **Table
|
|
|
|
);
|
|
|
|
|
|
|
|
EFI_STATUS
|
|
|
|
ConvertSystemTable (
|
|
|
|
IN EFI_GUID *TableGuid,
|
|
|
|
IN OUT VOID **Table
|
|
|
|
);
|
|
|
|
|
|
|
|
VOID
|
|
|
|
PlatformBdsEnterFrontPage (
|
|
|
|
IN UINT16 TimeoutDefault,
|
|
|
|
IN BOOLEAN ConnectAllHappened
|
|
|
|
);
|
|
|
|
|
2012-11-02 19:28:17 +01:00
|
|
|
/**
|
|
|
|
Loads and boots UEFI Linux via the FwCfg interface.
|
|
|
|
|
|
|
|
@retval EFI_NOT_FOUND - The Linux kernel was not found
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
TryRunningQemuKernel (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
2009-05-27 23:10:18 +02:00
|
|
|
#endif // _PLATFORM_SPECIFIC_BDS_PLATFORM_H_
|