Move to the new definition of UefiShellFileGuid, which is defined in the ShellPkg package declaration file rather than hardcoded in this module. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Reviewed-by: Michael Kinney <michael.d.kinney@intel.com>
		
			
				
	
	
		
			468 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			468 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /** @file
 | |
| This file include all platform action which can be customized
 | |
| by IBV/OEM.
 | |
| 
 | |
| Copyright (c) 2015 - 2016, Intel Corporation. All rights reserved.<BR>
 | |
| This program and the accompanying materials
 | |
| are licensed and made available under the terms and conditions of the BSD License
 | |
| which accompanies this distribution.  The full text of the license may be found at
 | |
| http://opensource.org/licenses/bsd-license.php
 | |
| 
 | |
| THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
 | |
| 
 | |
| **/
 | |
| 
 | |
| #include "PlatformBootManager.h"
 | |
| 
 | |
| /**
 | |
|   Return the index of the load option in the load option array.
 | |
| 
 | |
|   The function consider two load options are equal when the
 | |
|   OptionType, Attributes, Description, FilePath and OptionalData are equal.
 | |
| 
 | |
|   @param Key    Pointer to the load option to be found.
 | |
|   @param Array  Pointer to the array of load options to be found.
 | |
|   @param Count  Number of entries in the Array.
 | |
| 
 | |
|   @retval -1          Key wasn't found in the Array.
 | |
|   @retval 0 ~ Count-1 The index of the Key in the Array.
 | |
| **/
 | |
| INTN
 | |
| PlatformFindLoadOption (
 | |
|   IN CONST EFI_BOOT_MANAGER_LOAD_OPTION *Key,
 | |
|   IN CONST EFI_BOOT_MANAGER_LOAD_OPTION *Array,
 | |
|   IN UINTN                              Count
 | |
|   )
 | |
| {
 | |
|   UINTN                             Index;
 | |
| 
 | |
|   for (Index = 0; Index < Count; Index++) {
 | |
|     if ((Key->OptionType == Array[Index].OptionType) &&
 | |
|         (Key->Attributes == Array[Index].Attributes) &&
 | |
|         (StrCmp (Key->Description, Array[Index].Description) == 0) &&
 | |
|         (CompareMem (Key->FilePath, Array[Index].FilePath, GetDevicePathSize (Key->FilePath)) == 0) &&
 | |
|         (Key->OptionalDataSize == Array[Index].OptionalDataSize) &&
 | |
|         (CompareMem (Key->OptionalData, Array[Index].OptionalData, Key->OptionalDataSize) == 0)) {
 | |
|       return (INTN) Index;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   return -1;
 | |
| }
 | |
| 
 | |
| VOID
 | |
| PlatformRegisterFvBootOption (
 | |
|   EFI_GUID  *FileGuid,
 | |
|   CHAR16    *Description,
 | |
|   UINT32    Attributes
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                        Status;
 | |
|   EFI_HANDLE                        *HandleBuffer;
 | |
|   UINTN                             HandleCount;
 | |
|   UINTN                             IndexFv;
 | |
|   EFI_FIRMWARE_VOLUME2_PROTOCOL     *Fv;
 | |
|   CHAR16                            *UiSection;
 | |
|   UINTN                             UiSectionLength;
 | |
|   UINT32                            AuthenticationStatus;
 | |
|   EFI_HANDLE                        FvHandle;
 | |
|   MEDIA_FW_VOL_FILEPATH_DEVICE_PATH FileNode;
 | |
|   EFI_DEVICE_PATH_PROTOCOL          *DevicePath;
 | |
|   EFI_BOOT_MANAGER_LOAD_OPTION      *BootOptions;
 | |
|   UINTN                             BootOptionCount;
 | |
|   UINTN                             OptionIndex;
 | |
|   EFI_BOOT_MANAGER_LOAD_OPTION      NewOption;
 | |
| 
 | |
|   //
 | |
|   // Locate all available FVs.
 | |
|   //
 | |
|   HandleBuffer = NULL;
 | |
|   Status = gBS->LocateHandleBuffer (
 | |
|                   ByProtocol,
 | |
|                   &gEfiFirmwareVolume2ProtocolGuid,
 | |
|                   NULL,
 | |
|                   &HandleCount,
 | |
|                   &HandleBuffer
 | |
|                   );
 | |
|   if (EFI_ERROR (Status)) {
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Go through FVs one by one to find the required FFS file
 | |
|   //
 | |
|   for (IndexFv = 0, FvHandle = NULL; IndexFv < HandleCount && FvHandle == NULL; IndexFv++) {
 | |
|     Status = gBS->HandleProtocol (
 | |
|                     HandleBuffer[IndexFv],
 | |
|                     &gEfiFirmwareVolume2ProtocolGuid,
 | |
|                     (VOID **)&Fv
 | |
|                     );
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       continue;
 | |
|     }
 | |
| 
 | |
|     //
 | |
|     // Attempt to read a EFI_SECTION_USER_INTERFACE section from the required FFS file
 | |
|     //
 | |
|     UiSection = NULL;
 | |
|     Status = Fv->ReadSection (
 | |
|                    Fv,
 | |
|                    FileGuid,
 | |
|                    EFI_SECTION_USER_INTERFACE,
 | |
|                    0,
 | |
|                    (VOID **) &UiSection,
 | |
|                    &UiSectionLength,
 | |
|                    &AuthenticationStatus
 | |
|                    );
 | |
|     if (EFI_ERROR (Status)) {
 | |
|       continue;
 | |
|     }
 | |
|     FreePool (UiSection);
 | |
| 
 | |
|     //
 | |
|     // Save the handle of the FV where the FFS file was found
 | |
|     //
 | |
|     FvHandle = HandleBuffer[IndexFv];
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Free the buffer of FV handles
 | |
|   //
 | |
|   FreePool (HandleBuffer);
 | |
| 
 | |
|   //
 | |
|   // If the FFS file was not found, then return
 | |
|   //
 | |
|   if (FvHandle == NULL) {
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Create a device path for the FFS file that was found
 | |
|   //
 | |
|   EfiInitializeFwVolDevicepathNode (&FileNode, FileGuid);
 | |
|   DevicePath = AppendDevicePathNode (
 | |
|                  DevicePathFromHandle (FvHandle),
 | |
|                  (EFI_DEVICE_PATH_PROTOCOL *) &FileNode
 | |
|                  );
 | |
| 
 | |
|   //
 | |
|   // Create and add a new load option for the FFS file that was found
 | |
|   //
 | |
|   Status = EfiBootManagerInitializeLoadOption (
 | |
|              &NewOption,
 | |
|              LoadOptionNumberUnassigned,
 | |
|              LoadOptionTypeBoot,
 | |
|              Attributes,
 | |
|              Description,
 | |
|              DevicePath,
 | |
|              NULL,
 | |
|              0
 | |
|              );
 | |
|   if (!EFI_ERROR (Status)) {
 | |
|     BootOptions = EfiBootManagerGetLoadOptions (&BootOptionCount, LoadOptionTypeBoot);
 | |
| 
 | |
|     OptionIndex = PlatformFindLoadOption (&NewOption, BootOptions, BootOptionCount);
 | |
| 
 | |
|     if (OptionIndex == -1) {
 | |
|       Status = EfiBootManagerAddLoadOptionVariable (&NewOption, (UINTN) -1);
 | |
|       ASSERT_EFI_ERROR (Status);
 | |
|     }
 | |
|     EfiBootManagerFreeLoadOption (&NewOption);
 | |
|     EfiBootManagerFreeLoadOptions (BootOptions, BootOptionCount);
 | |
|   }
 | |
| }
 | |
| 
 | |
| VOID
 | |
| EFIAPI
 | |
| InternalBdsEmptyCallbackFuntion (
 | |
|   IN EFI_EVENT  Event,
 | |
|   IN VOID       *Context
 | |
|   )
 | |
| {
 | |
|   return;
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Do the platform specific action before the console is connected.
 | |
| 
 | |
|   Such as:
 | |
|     Update console variable;
 | |
|     Register new Driver#### or Boot####;
 | |
|     Signal ReadyToLock event.
 | |
| **/
 | |
| VOID
 | |
| EFIAPI
 | |
| PlatformBootManagerBeforeConsole (
 | |
|   VOID
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                    Status;
 | |
|   UINTN                         Index;
 | |
|   EFI_INPUT_KEY                 Enter;
 | |
|   EFI_INPUT_KEY                 F2;
 | |
|   EFI_BOOT_MANAGER_LOAD_OPTION  BootOption;
 | |
|   ESRT_MANAGEMENT_PROTOCOL      *EsrtManagement;
 | |
|   EFI_BOOT_MODE                 BootMode;
 | |
|   EFI_ACPI_S3_SAVE_PROTOCOL     *AcpiS3Save;
 | |
|   EFI_HANDLE                    Handle;
 | |
|   EFI_EVENT                     EndOfDxeEvent;
 | |
| 
 | |
|   //
 | |
|   // Update the console variables.
 | |
|   //
 | |
|   for (Index = 0; gPlatformConsole[Index].DevicePath != NULL; Index++) {
 | |
|     if ((gPlatformConsole[Index].ConnectType & CONSOLE_IN) == CONSOLE_IN) {
 | |
|       EfiBootManagerUpdateConsoleVariable (ConIn, gPlatformConsole[Index].DevicePath, NULL);
 | |
|     }
 | |
| 
 | |
|     if ((gPlatformConsole[Index].ConnectType & CONSOLE_OUT) == CONSOLE_OUT) {
 | |
|       EfiBootManagerUpdateConsoleVariable (ConOut, gPlatformConsole[Index].DevicePath, NULL);
 | |
|     }
 | |
| 
 | |
|     if ((gPlatformConsole[Index].ConnectType & STD_ERROR) == STD_ERROR) {
 | |
|       EfiBootManagerUpdateConsoleVariable (ErrOut, gPlatformConsole[Index].DevicePath, NULL);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Register ENTER as CONTINUE key
 | |
|   //
 | |
|   Enter.ScanCode    = SCAN_NULL;
 | |
|   Enter.UnicodeChar = CHAR_CARRIAGE_RETURN;
 | |
|   EfiBootManagerRegisterContinueKeyOption (0, &Enter, NULL);
 | |
| 
 | |
|   //
 | |
|   // Map F2 to Boot Manager Menu
 | |
|   //
 | |
|   F2.ScanCode    = SCAN_F2;
 | |
|   F2.UnicodeChar = CHAR_NULL;
 | |
|   EfiBootManagerGetBootManagerMenu (&BootOption);
 | |
|   EfiBootManagerAddKeyOptionVariable (NULL, (UINT16) BootOption.OptionNumber, 0, &F2, NULL);
 | |
| 
 | |
|   //
 | |
|   // Register UEFI Shell
 | |
|   //
 | |
|   PlatformRegisterFvBootOption (&gUefiShellFileGuid, L"UEFI Shell", LOAD_OPTION_ACTIVE);
 | |
| 
 | |
|   Status = gBS->LocateProtocol(&gEsrtManagementProtocolGuid, NULL, (VOID **)&EsrtManagement);
 | |
|   if (EFI_ERROR(Status)) {
 | |
|     EsrtManagement = NULL;
 | |
|   }
 | |
| 
 | |
|   BootMode = GetBootModeHob();
 | |
|   switch (BootMode) {
 | |
|   case BOOT_ON_FLASH_UPDATE:
 | |
|     DEBUG((DEBUG_INFO, "ProcessCapsules Before EndOfDxe ......\n"));
 | |
|     Status = ProcessCapsules ();
 | |
|     DEBUG((DEBUG_INFO, "ProcessCapsules %r\n", Status));
 | |
|     break;
 | |
|   case BOOT_IN_RECOVERY_MODE:
 | |
|     break;
 | |
|   case BOOT_ASSUMING_NO_CONFIGURATION_CHANGES:
 | |
|   case BOOT_WITH_MINIMAL_CONFIGURATION:
 | |
|   case BOOT_ON_S4_RESUME:
 | |
|     if (EsrtManagement != NULL) {
 | |
|       //
 | |
|       // Lock ESRT cache repository before EndofDxe if ESRT sync is not needed
 | |
|       //
 | |
|       EsrtManagement->LockEsrtRepository();
 | |
|     }
 | |
|     break;
 | |
|   default:
 | |
|     //
 | |
|     // Require to sync ESRT from FMP in a new boot
 | |
|     //
 | |
|     if (EsrtManagement != NULL) {
 | |
|       EsrtManagement->SyncEsrtFmp();
 | |
|     }
 | |
|     break;
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Prepare for S3
 | |
|   //
 | |
|   Status = gBS->LocateProtocol (&gEfiAcpiS3SaveProtocolGuid, NULL, (VOID **)&AcpiS3Save);
 | |
|   if (!EFI_ERROR (Status)) {
 | |
|     AcpiS3Save->S3Save (AcpiS3Save, NULL);
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Inform PI SMM drivers that BDS may run 3rd party code
 | |
|   // Create and signal End of DXE event group
 | |
|   //
 | |
|   Status = gBS->CreateEventEx (
 | |
|                   EVT_NOTIFY_SIGNAL,
 | |
|                   TPL_CALLBACK,
 | |
|                   InternalBdsEmptyCallbackFuntion,
 | |
|                   NULL,
 | |
|                   &gEfiEndOfDxeEventGroupGuid,
 | |
|                   &EndOfDxeEvent
 | |
|                   );
 | |
|   ASSERT_EFI_ERROR (Status);
 | |
|   gBS->SignalEvent (EndOfDxeEvent);
 | |
|   gBS->CloseEvent (EndOfDxeEvent);
 | |
| 
 | |
|   DEBUG((EFI_D_INFO,"All EndOfDxe callbacks have returned successfully\n"));
 | |
| 
 | |
|   //
 | |
|   // Install SMM Ready To Lock protocol so all resources can be locked down
 | |
|   // before BDS runs 3rd party code.  This action must be done last so all
 | |
|   // other SMM driver signals are processed before this final lock down action.
 | |
|   //
 | |
|   Handle = NULL;
 | |
|   Status = gBS->InstallProtocolInterface (
 | |
|                   &Handle,
 | |
|                   &gEfiDxeSmmReadyToLockProtocolGuid,
 | |
|                   EFI_NATIVE_INTERFACE,
 | |
|                   NULL
 | |
|                   );
 | |
|   ASSERT_EFI_ERROR (Status);
 | |
| 
 | |
|   //
 | |
|   // Dispatch deferred images after EndOfDxe event and ReadyToLock installation.
 | |
|   //
 | |
|   EfiBootManagerDispatchDeferredImages ();
 | |
| }
 | |
| 
 | |
| /**
 | |
|   Do the platform specific action after the console is connected.
 | |
| 
 | |
|   Such as:
 | |
|     Dynamically switch output mode;
 | |
|     Signal console ready platform customized event;
 | |
|     Run diagnostics like memory testing;
 | |
|     Connect certain devices;
 | |
|     Dispatch additional option ROMs
 | |
| **/
 | |
| VOID
 | |
| EFIAPI
 | |
| PlatformBootManagerAfterConsole (
 | |
|   VOID
 | |
|   )
 | |
| {
 | |
|   EFI_STATUS                     Status;
 | |
|   EFI_BOOT_MODE                  BootMode;
 | |
|   ESRT_MANAGEMENT_PROTOCOL       *EsrtManagement;
 | |
|   VOID                           *Buffer;
 | |
|   UINTN                          Size;
 | |
| 
 | |
|   Status = gBS->LocateProtocol(&gEsrtManagementProtocolGuid, NULL, (VOID **)&EsrtManagement);
 | |
|   if (EFI_ERROR(Status)) {
 | |
|     EsrtManagement = NULL;
 | |
|   }
 | |
| 
 | |
|   BootMode = GetBootModeHob();
 | |
|   switch (BootMode) {
 | |
|   case BOOT_ON_FLASH_UPDATE:
 | |
|     DEBUG((DEBUG_INFO, "Capsule Mode detected\n"));
 | |
|     if (FeaturePcdGet(PcdSupportUpdateCapsuleReset)) {
 | |
|       EfiBootManagerConnectAll ();
 | |
|       EfiBootManagerRefreshAllBootOption ();
 | |
| 
 | |
|       //
 | |
|       // Always sync ESRT Cache from FMP Instances after connect all and before capsule process
 | |
|       //
 | |
|       if (EsrtManagement != NULL) {
 | |
|         EsrtManagement->SyncEsrtFmp();
 | |
|       }
 | |
| 
 | |
|       DEBUG((DEBUG_INFO, "ProcessCapsules After ConnectAll ......\n"));
 | |
|       Status = ProcessCapsules();
 | |
|       DEBUG((DEBUG_INFO, "ProcessCapsules %r\n", Status));
 | |
|     }
 | |
|     break;
 | |
| 
 | |
|   case BOOT_IN_RECOVERY_MODE:
 | |
|     DEBUG((DEBUG_INFO, "Recovery Mode detected\n"));
 | |
|     // Passthrough
 | |
| 
 | |
|   case BOOT_ASSUMING_NO_CONFIGURATION_CHANGES:
 | |
|   case BOOT_WITH_MINIMAL_CONFIGURATION:
 | |
|   case BOOT_WITH_FULL_CONFIGURATION:
 | |
|   case BOOT_WITH_FULL_CONFIGURATION_PLUS_DIAGNOSTICS:
 | |
|   case BOOT_WITH_DEFAULT_SETTINGS:
 | |
|   default:
 | |
|     EfiBootManagerConnectAll ();
 | |
|     EfiBootManagerRefreshAllBootOption ();
 | |
| 
 | |
|     //
 | |
|     // Sync ESRT Cache from FMP Instance on demand after Connect All
 | |
|     //
 | |
|     if ((BootMode != BOOT_ASSUMING_NO_CONFIGURATION_CHANGES) &&
 | |
|         (BootMode != BOOT_WITH_MINIMAL_CONFIGURATION) &&
 | |
|         (BootMode != BOOT_ON_S4_RESUME)) {
 | |
|       if (EsrtManagement != NULL) {
 | |
|         EsrtManagement->SyncEsrtFmp();
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     break;
 | |
|   }
 | |
| 
 | |
|   Print (
 | |
|     L"\n"
 | |
|     L"F2      to enter Boot Manager Menu.\n"
 | |
|     L"ENTER   to boot directly.\n"
 | |
|     L"\n"
 | |
|     );
 | |
| 
 | |
|   //
 | |
|   // Check if the platform is using test key.
 | |
|   //
 | |
|   Status = GetSectionFromAnyFv(
 | |
|              PcdGetPtr(PcdEdkiiRsa2048Sha256TestPublicKeyFileGuid),
 | |
|              EFI_SECTION_RAW,
 | |
|              0,
 | |
|              &Buffer,
 | |
|              &Size
 | |
|              );
 | |
|   if (!EFI_ERROR(Status)) {
 | |
|     if ((Size == PcdGetSize(PcdRsa2048Sha256PublicKeyBuffer)) &&
 | |
|         (CompareMem(Buffer, PcdGetPtr(PcdRsa2048Sha256PublicKeyBuffer), Size) == 0)) {
 | |
|       Print(L"WARNING: Recovery Test Key is used.\n");
 | |
|       PcdSetBoolS(PcdTestKeyUsed, TRUE);
 | |
|     }
 | |
|     FreePool(Buffer);
 | |
|   }
 | |
|   Status = GetSectionFromAnyFv(
 | |
|              PcdGetPtr(PcdEdkiiPkcs7TestPublicKeyFileGuid),
 | |
|              EFI_SECTION_RAW,
 | |
|              0,
 | |
|              &Buffer,
 | |
|              &Size
 | |
|              );
 | |
|   if (!EFI_ERROR(Status)) {
 | |
|     if ((Size == PcdGetSize(PcdPkcs7CertBuffer)) &&
 | |
|         (CompareMem(Buffer, PcdGetPtr(PcdPkcs7CertBuffer), Size) == 0)) {
 | |
|       Print(L"WARNING: Capsule Test Key is used.\n");
 | |
|       PcdSetBoolS(PcdTestKeyUsed, TRUE);
 | |
|     }
 | |
|     FreePool(Buffer);
 | |
|   }
 | |
| 
 | |
|   //
 | |
|   // Use a DynamicHii type pcd to save the boot status, which is used to
 | |
|   // control configuration mode, such as FULL/MINIMAL/NO_CHANGES configuration.
 | |
|   //
 | |
|   if (PcdGetBool(PcdBootState)) {
 | |
|     Status = PcdSetBoolS (PcdBootState, FALSE);
 | |
|     ASSERT_EFI_ERROR (Status);
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
|   This function is called each second during the boot manager waits the timeout.
 | |
| 
 | |
|   @param TimeoutRemain  The remaining timeout.
 | |
| **/
 | |
| VOID
 | |
| EFIAPI
 | |
| PlatformBootManagerWaitCallback (
 | |
|   UINT16  TimeoutRemain
 | |
|   )
 | |
| {
 | |
|   Print (L"\r%-2d seconds remained...", TimeoutRemain);
 | |
| }
 |