X-Git-Url: https://git.proxmox.com/?a=blobdiff_plain;f=Nt32Pkg%2FLibrary%2FNt32BdsLib%2FBdsPlatform.c;h=0055223d8310d0d70d417981b6fa5be20ee9a6a7;hb=8e01b449de91cfcd1bdf473ae1bc766c22eb616e;hp=73d96e75e2d43feade83bf15905e6a6e91329816;hpb=83c4704cf91e8de240bf2aff8223e2b0ec80b0cc;p=mirror_edk2.git diff --git a/Nt32Pkg/Library/Nt32BdsLib/BdsPlatform.c b/Nt32Pkg/Library/Nt32BdsLib/BdsPlatform.c index 73d96e75e2..0055223d83 100644 --- a/Nt32Pkg/Library/Nt32BdsLib/BdsPlatform.c +++ b/Nt32Pkg/Library/Nt32BdsLib/BdsPlatform.c @@ -1,7 +1,7 @@ /**@file -Copyright (c) 2004 - 2006, Intel Corporation -All rights reserved. This program and the accompanying materials +Copyright (c) 2004 - 2006, Intel Corporation. All rights reserved.
+This program and the accompanying materials are licensed and made available under the terms and conditions of the BSD License which accompanies this distribution. The full text of the license may be found at http://opensource.org/licenses/bsd-license.php @@ -84,6 +84,7 @@ Returns: --*/ { + BdsLibSaveMemoryTypeInformation (); SetupVariableInit (); } @@ -235,7 +236,8 @@ Returns: VOID PlatformBdsDiagnostics ( IN EXTENDMEM_COVERAGE_LEVEL MemoryTestLevel, - IN BOOLEAN QuietBoot + IN BOOLEAN QuietBoot, + IN BASEM_MEMORY_TEST BaseMemoryTest ) /*++ @@ -249,7 +251,9 @@ Arguments: MemoryTestLevel - The memory test intensive level QuietBoot - Indicate if need to enable the quiet boot - + + BaseMemoryTest - A pointer to BdsMemoryTest() + Returns: None. @@ -269,7 +273,7 @@ Returns: // // Perform system diagnostic // - Status = BdsMemoryTest (MemoryTestLevel); + Status = BaseMemoryTest (MemoryTestLevel); if (EFI_ERROR (Status)) { DisableQuietBoot (); } @@ -279,34 +283,28 @@ Returns: // // Perform system diagnostic // - Status = BdsMemoryTest (MemoryTestLevel); + Status = BaseMemoryTest (MemoryTestLevel); } -VOID -EFIAPI -PlatformBdsPolicyBehavior ( - IN OUT LIST_ENTRY *DriverOptionList, - IN OUT LIST_ENTRY *BootOptionList - ) -/*++ - -Routine Description: - +/** The function will excute with as the platform policy, current policy is driven by boot mode. IBV/OEM can customize this code for their specific policy action. - -Arguments: - DriverOptionList - The header of the driver option link list - - BootOptionList - The header of the boot option link list - -Returns: + @param DriverOptionList The header of the driver option link list + @param BootOptionList The header of the boot option link list + @param ProcessCapsules A pointer to ProcessCapsules() + @param BaseMemoryTest A pointer to BaseMemoryTest() - None. - ---*/ +**/ +VOID +EFIAPI +PlatformBdsPolicyBehavior ( + IN OUT LIST_ENTRY *DriverOptionList, + IN OUT LIST_ENTRY *BootOptionList, + IN PROCESS_CAPSULES ProcessCapsules, + IN BASEM_MEMORY_TEST BaseMemoryTest + ) { EFI_STATUS Status; UINT16 Timeout; @@ -340,7 +338,7 @@ Returns: // console directly. // BdsLibConnectAllDefaultConsoles (); - PlatformBdsDiagnostics ((EXTENDMEM_COVERAGE_LEVEL)IGNORE, TRUE); + PlatformBdsDiagnostics ((EXTENDMEM_COVERAGE_LEVEL)IGNORE, TRUE, BaseMemoryTest); // // Perform some platform specific connect sequence @@ -364,7 +362,7 @@ Returns: // Boot with the specific configuration // PlatformBdsConnectConsole (gPlatformConsole); - PlatformBdsDiagnostics (EXTENSIVE, FALSE); + PlatformBdsDiagnostics (EXTENSIVE, FALSE, BaseMemoryTest); BdsLibConnectAll (); ProcessCapsules (BOOT_ON_FLASH_UPDATE); break; @@ -375,7 +373,7 @@ Returns: // and show up the front page // PlatformBdsConnectConsole (gPlatformConsole); - PlatformBdsDiagnostics (EXTENSIVE, FALSE); + PlatformBdsDiagnostics (EXTENSIVE, FALSE, BaseMemoryTest); // // In recovery boot mode, we still enter to the @@ -399,7 +397,7 @@ Returns: PlatformBdsNoConsoleAction (); } - PlatformBdsDiagnostics ((EXTENDMEM_COVERAGE_LEVEL)IGNORE, TRUE); + PlatformBdsDiagnostics ((EXTENDMEM_COVERAGE_LEVEL)IGNORE, TRUE, BaseMemoryTest); // // Perform some platform specific connect sequence @@ -528,11 +526,36 @@ Returns: return EFI_SUCCESS; } -EFI_STATUS +/** + This function locks platform flash that is not allowed to be updated during normal boot path. + The flash layout is platform specific. + + **/ +VOID EFIAPI PlatformBdsLockNonUpdatableFlash ( VOID ) { - return EFI_SUCCESS; + return; +} + +/** + Lock the ConsoleIn device in system table. All key + presses will be ignored until the Password is typed in. The only way to + disable the password is to type it in to a ConIn device. + + @param Password Password used to lock ConIn device. + + @retval EFI_SUCCESS lock the Console In Spliter virtual handle successfully. + @retval EFI_UNSUPPORTED Password not found + +**/ +EFI_STATUS +EFIAPI +LockKeyboards ( + IN CHAR16 *Password + ) +{ + return EFI_UNSUPPORTED; }