2009-02-24 16:53:05 +01:00
|
|
|
/** @file
|
2009-07-09 14:02:01 +02:00
|
|
|
Platform BDS library definition. A platform can implement
|
|
|
|
instances to support platform-specific behavior.
|
2009-02-24 16:53:05 +01:00
|
|
|
|
2010-03-17 00:34:53 +01:00
|
|
|
Copyright (c) 2008 - 2010, Intel Corporation. All rights reserved<BR>
|
|
|
|
This program and the accompanying materials are licensed and made available under
|
|
|
|
the terms and conditions of the BSD License that accompanies this distribution.
|
|
|
|
The full text of the license may be found at
|
|
|
|
http://opensource.org/licenses/bsd-license.php.
|
|
|
|
|
|
|
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
2009-02-24 16:53:05 +01:00
|
|
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|
|
|
|
|
|
|
**/
|
|
|
|
|
|
|
|
#ifndef __PLATFORM_BDS_LIB_H_
|
|
|
|
#define __PLATFORM_BDS_LIB_H_
|
|
|
|
|
|
|
|
#include <Protocol/GenericMemoryTest.h>
|
2009-02-25 16:35:32 +01:00
|
|
|
#include <Library/GenericBdsLib.h>
|
2009-02-24 16:53:05 +01:00
|
|
|
|
2009-07-13 14:04:24 +02:00
|
|
|
/**
|
|
|
|
Perform the memory test base on the memory test intensive level,
|
|
|
|
and update the memory resource.
|
|
|
|
|
|
|
|
@param Level The memory test intensive level.
|
|
|
|
|
2010-03-17 00:34:53 +01:00
|
|
|
@retval EFI_STATUS Successfully test all the system memory, and update
|
2009-07-13 14:04:24 +02:00
|
|
|
the memory resource
|
|
|
|
|
|
|
|
**/
|
|
|
|
typedef
|
|
|
|
EFI_STATUS
|
|
|
|
(EFIAPI *BASEM_MEMORY_TEST)(
|
|
|
|
IN EXTENDMEM_COVERAGE_LEVEL Level
|
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
This routine is called to see if there are any capsules we need to process.
|
2010-03-17 00:34:53 +01:00
|
|
|
If the boot mode is not UPDATE, then we do nothing. Otherwise, find the
|
2009-07-13 14:04:24 +02:00
|
|
|
capsule HOBS and produce firmware volumes for them via the DXE service.
|
|
|
|
Then call the dispatcher to dispatch drivers from them. Finally, check
|
|
|
|
the status of the updates.
|
|
|
|
|
|
|
|
This function should be called by BDS in case we need to do some
|
|
|
|
sort of processing even if there is no capsule to process. We
|
|
|
|
need to do this if an earlier update went away and we need to
|
|
|
|
clear the capsule variable so on the next reset PEI does not see it and
|
|
|
|
think there is a capsule available.
|
|
|
|
|
2010-03-17 00:34:53 +01:00
|
|
|
@param BootMode The current boot mode
|
2009-07-13 14:04:24 +02:00
|
|
|
|
2010-03-17 00:34:53 +01:00
|
|
|
@retval EFI_INVALID_PARAMETER The boot mode is not correct for an update.
|
|
|
|
@retval EFI_SUCCESS There is no error when processing a capsule.
|
2009-07-13 14:04:24 +02:00
|
|
|
|
|
|
|
**/
|
|
|
|
typedef
|
|
|
|
EFI_STATUS
|
|
|
|
(EFIAPI *PROCESS_CAPSULES)(
|
|
|
|
IN EFI_BOOT_MODE BootMode
|
|
|
|
);
|
|
|
|
|
2009-02-24 16:53:05 +01:00
|
|
|
/**
|
2009-07-09 14:02:01 +02:00
|
|
|
Platform Bds initialization. Includes the platform firmware vendor, revision
|
2009-02-24 16:53:05 +01:00
|
|
|
and so crc check.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformBdsInit (
|
2009-06-07 06:43:19 +02:00
|
|
|
VOID
|
2009-02-24 16:53:05 +01:00
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
The function will excute with as the platform policy, current policy
|
|
|
|
is driven by boot mode. IBV/OEM can customize this code for their specific
|
|
|
|
policy action.
|
|
|
|
|
|
|
|
@param DriverOptionList The header of the driver option link list
|
|
|
|
@param BootOptionList The header of the boot option link list
|
2009-07-13 14:04:24 +02:00
|
|
|
@param ProcessCapsules A pointer to ProcessCapsules()
|
|
|
|
@param BaseMemoryTest A pointer to BaseMemoryTest()
|
2009-02-24 16:53:05 +01:00
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformBdsPolicyBehavior (
|
|
|
|
IN LIST_ENTRY *DriverOptionList,
|
2009-07-13 14:04:24 +02:00
|
|
|
IN LIST_ENTRY *BootOptionList,
|
|
|
|
IN PROCESS_CAPSULES ProcessCapsules,
|
|
|
|
IN BASEM_MEMORY_TEST BaseMemoryTest
|
2009-02-24 16:53:05 +01:00
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
2009-07-15 15:32:34 +02:00
|
|
|
Hook point for a user-provided function, for after a boot attempt fails.
|
2009-02-24 16:53:05 +01:00
|
|
|
|
2010-03-17 00:34:53 +01:00
|
|
|
@param Option A pointer to Boot Option that failed to boot.
|
|
|
|
@param Status The status returned from failed boot.
|
|
|
|
@param ExitData The exit data returned from failed boot.
|
|
|
|
@param ExitDataSize The exit data size returned from failed boot.
|
2009-02-24 16:53:05 +01:00
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformBdsBootFail (
|
|
|
|
IN BDS_COMMON_OPTION *Option,
|
|
|
|
IN EFI_STATUS Status,
|
|
|
|
IN CHAR16 *ExitData,
|
|
|
|
IN UINTN ExitDataSize
|
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
Hook point after a boot attempt succeeds. We don't expect a boot option to
|
|
|
|
return, so the UEFI 2.0 specification defines that you will default to an
|
|
|
|
interactive mode and stop processing the BootOrder list in this case. This
|
2009-07-09 14:02:01 +02:00
|
|
|
is also a platform implementation, and can be customized by an IBV/OEM.
|
2009-02-24 16:53:05 +01:00
|
|
|
|
2010-03-17 00:34:53 +01:00
|
|
|
@param Option A pointer to the Boot Option that successfully booted.
|
2009-02-24 16:53:05 +01:00
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformBdsBootSuccess (
|
2009-07-11 01:55:52 +02:00
|
|
|
IN BDS_COMMON_OPTION *Option
|
2009-02-24 16:53:05 +01:00
|
|
|
);
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
This function locks platform flash that is not allowed to be updated during normal boot path.
|
|
|
|
The flash layout is platform specific.
|
|
|
|
|
2009-07-10 05:26:52 +02:00
|
|
|
**/
|
|
|
|
VOID
|
2009-02-24 16:53:05 +01:00
|
|
|
EFIAPI
|
|
|
|
PlatformBdsLockNonUpdatableFlash (
|
|
|
|
VOID
|
|
|
|
);
|
2009-07-10 05:26:52 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
Lock the ConsoleIn device in system table. All key
|
|
|
|
presses will be ignored until the Password is typed in. The only way to
|
|
|
|
disable the password is to type it in to a ConIn device.
|
|
|
|
|
2010-03-17 00:34:53 +01:00
|
|
|
@param Password The password used to lock ConIn device.
|
2009-07-10 05:26:52 +02:00
|
|
|
|
2010-03-17 00:34:53 +01:00
|
|
|
@retval EFI_SUCCESS Lock the Console In Spliter virtual handle successfully.
|
|
|
|
@retval EFI_UNSUPPORTED Password not found.
|
2009-07-10 05:26:52 +02:00
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
LockKeyboards (
|
|
|
|
IN CHAR16 *Password
|
|
|
|
);
|
|
|
|
|
2009-02-24 16:53:05 +01:00
|
|
|
#endif
|