From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=2a00:1450:4864:20::441; helo=mail-wr1-x441.google.com; envelope-from=leif.lindholm@linaro.org; receiver=edk2-devel@lists.01.org Received: from mail-wr1-x441.google.com (mail-wr1-x441.google.com [IPv6:2a00:1450:4864:20::441]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 404A2210DC1AF for ; Tue, 7 Aug 2018 13:51:17 -0700 (PDT) Received: by mail-wr1-x441.google.com with SMTP id r16-v6so16975751wrt.11 for ; Tue, 07 Aug 2018 13:51:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id; bh=cdGiccaB/ISLzhbkqrwpDfRdPbd18TE+71d0ktITiOY=; b=ceofqtr1PGpzyTxNOgmUKAiGfD8OQp232r9mWfGDCi1rg9As8BdrKSQdTtSyMYBN6f BG4/TO9qaugKbQgWvXC0n3EABrjOyDX/I3W4ZmOLIn+EC7Ei4Zmg+eomzK2lILmGASIo O3rcDVcfKSasBOjjVv/aCWWE4/yjN0rLzjupQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=cdGiccaB/ISLzhbkqrwpDfRdPbd18TE+71d0ktITiOY=; b=NJ6G+wd28gqNwGNZbbtXQPyXjPKA1D5zsbIfujBYKNtckjpHpIGL91n2mFi8qRxyzv sxpUJfy+D62+1Um/Xhk6f+vuZniiZBUM4V5IFvWOmHpkEE42fBv/gpRi1Cj5XLXL41ng lVmgXerfI5qF93jyXM3PMtqhH4CGs5NpHzuSxGmWs0Sfxvi7FLGXn9INaIlfxK0pGNK2 ps7tXqS2miRHOnl2KUvmq7echLiFmgHYOvYVcXZ8so1/HgfViIZyPU+6NU86WDsrMf/0 VSpRzj6faoados403vxzyq3KOVHA7Q7rZd1XomN8HgDetJi7FLCNHlSz708sVQR603Nx WpCA== X-Gm-Message-State: AOUpUlFFuNqBsDhpmGAh/gdnQu4F/O/HgwY2WuxAHDW12yNywrKmf5r4 GWiUzLLmazU2KcJG6NE/N5KrNpK2T4s= X-Google-Smtp-Source: AA+uWPw8dH29EBlShSqbNDlXw1MSErRkgY/RQApqLSmijv5v3qjD5I3JvCJslUWpzVpstzPWHetAOw== X-Received: by 2002:adf:fac1:: with SMTP id a1-v6mr21247wrs.74.1533675075550; Tue, 07 Aug 2018 13:51:15 -0700 (PDT) Received: from vanye.hemma.eciton.net (cpc92302-cmbg19-2-0-cust304.5-4.cable.virginm.net. [82.1.209.49]) by smtp.gmail.com with ESMTPSA id o14-v6sm4519589wmd.35.2018.08.07.13.51.13 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 07 Aug 2018 13:51:14 -0700 (PDT) From: Leif Lindholm To: edk2-devel@lists.01.org Date: Tue, 7 Aug 2018 21:51:12 +0100 Message-Id: <20180807205112.2008-1-leif.lindholm@linaro.org> X-Mailer: git-send-email 2.11.0 Subject: [PATCH edk2-platforms] Silicon/Hisilicon: add PlatformBootManagerUnableToBoot() to PlatformBm X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Aug 2018 20:51:18 -0000 edk2 commit 1010873becc5, ("MdeModulePkg/BdsDxe: Call PlatformBootManagerUnableToBoot()") broke the d0x build, since they use their own PlatformBootManagerLib, which did not include this function. Implement a trivial one, that just returns. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Leif Lindholm --- NOTE: The upstream build is currently broken. This failure needs to be addressed before d02 deletion and d03 fix can go in. Silicon/Hisilicon/Library/PlatformBootManagerLib/PlatformBm.c | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/Silicon/Hisilicon/Library/PlatformBootManagerLib/PlatformBm.c b/Silicon/Hisilicon/Library/PlatformBootManagerLib/PlatformBm.c index 7dd5ba615c..aa6db929ca 100644 --- a/Silicon/Hisilicon/Library/PlatformBootManagerLib/PlatformBm.c +++ b/Silicon/Hisilicon/Library/PlatformBootManagerLib/PlatformBm.c @@ -641,3 +641,19 @@ PlatformBootManagerWaitCallback ( 0 ); } + +/** + The function is called when no boot option could be launched, + including platform recovery options and options pointing to applications + built into firmware volumes. + + If this function returns, BDS attempts to enter an infinite loop. +**/ +VOID +EFIAPI +PlatformBootManagerUnableToBoot ( + VOID + ) +{ + return; +} -- 2.11.0