/** @file This file include all platform action which can be customized by IBV/OEM. Copyright (c) 2004 - 2008, Intel Corporation.
All rights reserved. This program and the accompanying materials are licensed and made available under the terms and conditions of the BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/licenses/bsd-license.php THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. **/ #include "BdsPlatform.h" // // BDS Platform Functions // /** Platform Bds init. Include the platform firmware vendor, revision and so crc check. **/ VOID EFIAPI PlatformBdsInit ( VOID ) { } /** Connect the predefined platform default console device. Always try to find and enable the vga device if have. @param PlatformConsole Predefined platform default console device array. @retval EFI_SUCCESS Success connect at least one ConIn and ConOut device, there must have one ConOut device is active vga device. @return Return the status of BdsLibConnectAllDefaultConsoles () **/ EFI_STATUS PlatformBdsConnectConsole ( IN BDS_CONSOLE_CONNECT_ENTRY *PlatformConsole ) { return EFI_SUCCESS; } /** Connect with predefined platform connect sequence, the OEM/IBV can customize with their own connect sequence. **/ VOID PlatformBdsConnectSequence ( VOID ) { } /** Load the predefined driver option, OEM/IBV can customize this to load their own drivers @param BdsDriverLists - The header of the driver option link list. **/ VOID PlatformBdsGetDriverOption ( IN OUT LIST_ENTRY *BdsDriverLists ) { } /** Perform the platform diagnostic, such like test memory. OEM/IBV also can customize this function to support specific platform diagnostic. @param MemoryTestLevel The memory test intensive level @param QuietBoot Indicate if need to enable the quiet boot **/ VOID PlatformBdsDiagnostics ( IN EXTENDMEM_COVERAGE_LEVEL MemoryTestLevel, IN BOOLEAN QuietBoot ) { } /** The function will execute with as the platform policy, current policy is driven by boot mode. IBV/OEM can customize this code for their specific policy action. @param DriverOptionList The header of the driver option link list @param BootOptionList The header of the boot option link list **/ VOID EFIAPI PlatformBdsPolicyBehavior ( IN LIST_ENTRY *DriverOptionList, IN LIST_ENTRY *BootOptionList ) { } /** Hook point after a boot attempt succeeds. We don't expect a boot option to return, so the UEFI 2.0 specification defines that you will default to an interactive mode and stop processing the BootOrder list in this case. This is also a platform implementation and can be customized by IBV/OEM. @param Option Pointer to Boot Option that succeeded to boot. **/ VOID EFIAPI PlatformBdsBootSuccess ( IN BDS_COMMON_OPTION *Option ) { } /** Hook point after a boot attempt fails. @param Option Pointer to Boot Option that failed to boot. @param Status Status returned from failed boot. @param ExitData Exit data returned from failed boot. @param ExitDataSize Exit data size returned from failed boot. **/ VOID EFIAPI PlatformBdsBootFail ( IN BDS_COMMON_OPTION *Option, IN EFI_STATUS Status, IN CHAR16 *ExitData, IN UINTN ExitDataSize ) { } /** This function is remained for IBV/OEM to do some platform action, if there no console device can be connected. @return EFI_SUCCESS Direct return success now. **/ EFI_STATUS PlatformBdsNoConsoleAction ( VOID ) { return EFI_SUCCESS; } /** This function locks platform flash that is not allowed to be updated during normal boot path. The flash layout is platform specific. **/ VOID EFIAPI PlatformBdsLockNonUpdatableFlash ( VOID ) { return ; } /** Lock the ConsoleIn device in system table. All key presses will be ignored until the Password is typed in. The only way to disable the password is to type it in to a ConIn device. @param Password Password used to lock ConIn device. @retval EFI_SUCCESS lock the Console In Spliter virtual handle successfully. @retval EFI_UNSUPPORTED Password not found **/ EFI_STATUS EFIAPI LockKeyboards ( IN CHAR16 *Password ) { return EFI_UNSUPPORTED; }