From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (NAM12-MW2-obe.outbound.protection.outlook.com [40.107.244.115]) by mx.groups.io with SMTP id smtpd.web08.31256.1630986019755729733 for ; Mon, 06 Sep 2021 20:40:20 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@os.amperecomputing.com header.s=selector2 header.b=sO/xuZEB; spf=pass (domain: os.amperecomputing.com, ip: 40.107.244.115, mailfrom: nhi@os.amperecomputing.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HNPKIeU1E/kPPeLH4SFGSJfR9D9er5OGGQPAR8IYgJOMCSYTWva5pCLms9enf+jT3azFhH/7rgW+q8wjNPPH6+EaIY6RKr61IXsJpvrV1IslT2DLhSdCtfDDLwTcTtont4b/FUSKBZZGzZtx4so8matxrjIxqzvLLXm+na/z2KvCF3oPfG8qi5y1yRU3WH8HBLUWMcW0xW91Ily+RX5DIE33nee9jgO35iKxZ6ocsajH9IO0HM8YifKQ346uN0CVYPCA6kyzddFXy7rIc7q7Iy0rU5nAAo+Gecjr0dJ6a5EVkDqd6kcKA0WfRyo9JAcp/GU3K6pwM/9uvAytS/mzsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=kUM9vBU3jepj5qA+o9fgrvi65mFMUVybV3TKQLMv2N4=; b=hBui9kYc0UkD6zm8mcF5cqyD25J8UkOvfg0N8VbH8UbVmXKBF3Rgp/F6d5CsTRt6nZab+1jNAKJlNiOez+4ggAVDJw0BUEebe5hm8EJ1BnPC//CerSL9D4DxRJNr/4d043ZgmEu/2KxBB6AGSmviRt9Jfe6XJ4IXSAyWz8MF4bI01Al4YWXy6qbNgQSFKxRkQhWR7BNqF2ckiY2H/JaA48RMSN4JbmTwCx3jJC1nVlwbfmZGXMosy5j0ZJPJj8qKArSyxFBb/1f/h+udDZpQ0GUeW+bjormxISGbuS5lTgVOiMi6s2Qd/n31SrUFPa9x05SjttNuSYLQLGMx+rw0Zw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=os.amperecomputing.com; dmarc=pass action=none header.from=os.amperecomputing.com; dkim=pass header.d=os.amperecomputing.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=os.amperecomputing.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kUM9vBU3jepj5qA+o9fgrvi65mFMUVybV3TKQLMv2N4=; b=sO/xuZEBTKYndEOFRzIx8eL47B3/DHgU8vYR9pUJFwcSUBzPEE5kLg0yvLjBrWx0XyqcyWxyUaCuHoaFyeCjy6Q79ynWmhTEoLxUc9bQz/xXiY9q/V4kfVcyKkkM+yVQJyStRdRyjdQmWBGQrp+8Lb1u5Uolj3TG7zZQfWq0KGQ= Authentication-Results: edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=none action=none header.from=os.amperecomputing.com; Received: from DM6PR01MB5849.prod.exchangelabs.com (2603:10b6:5:205::20) by DM6PR01MB4057.prod.exchangelabs.com (2603:10b6:5:2e::30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4478.19; Tue, 7 Sep 2021 03:40:16 +0000 Received: from DM6PR01MB5849.prod.exchangelabs.com ([fe80::8eb:704f:2ba7:9bc3]) by DM6PR01MB5849.prod.exchangelabs.com ([fe80::8eb:704f:2ba7:9bc3%4]) with mapi id 15.20.4478.025; Tue, 7 Sep 2021 03:40:16 +0000 From: "Nhi Pham" To: devel@edk2.groups.io Cc: patches@amperecomputing.com, Nhi Pham , Leif Lindholm , Ard Biesheuvel Subject: [PATCH v2 1/1] ArmPkg: Implement PlatformBootManagerLib for LinuxBoot Date: Tue, 7 Sep 2021 10:38:57 +0700 Message-Id: <20210907033857.18848-1-nhi@os.amperecomputing.com> X-Mailer: git-send-email 2.17.1 X-ClientProxiedBy: HK2PR02CA0139.apcprd02.prod.outlook.com (2603:1096:202:16::23) To DM6PR01MB5849.prod.exchangelabs.com (2603:10b6:5:205::20) Return-Path: nhi@os.amperecomputing.com MIME-Version: 1.0 Received: from sw004.amperecomputing.com (118.69.219.201) by HK2PR02CA0139.apcprd02.prod.outlook.com (2603:1096:202:16::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4478.19 via Frontend Transport; Tue, 7 Sep 2021 03:40:14 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: f78098b9-2868-4820-3eb5-08d971b134d4 X-MS-TrafficTypeDiagnostic: DM6PR01MB4057: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:9508; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: G36zVkVvW5NzEAL8sBXUHDaBKbGgYcIXXD5VwMGcRw3pPns5ZG3n4VCXTJgTtpwoQ3b3ZlvVXJqwy67bxtIBbNwn2mWYarBmE2j/k9xd36JM6uc9gqy2uLhu2/2pynnTtex9K7o8StLl5twD562u98rrHrq9f2TM8PMqRBhuYG1FnufgRZPLqRqIlKg4nQKS/yCXil1yjU0hfdlHVqSybXbgCtPbsNIQ6XNbzg4CRhZO2WQ9tmd8TZF9RHT3iB7jy6Of2b22u9pcfcmYLm/iPw5KuHKtB3yWQNNyVhoSe5zD8QYH4FlxxFVH4cuJ1Fynz0JKaKvO32q/C3EZKPGpl7mipsKAN2h1KkSGcaCNkXOrm9PrD124bwzU8afT6QQLdJqnvxMXM1OwG6XJRuGdLvUAoqiXyWjcVD/bP/5VPWlgW3Ckl7B5gE9hlKJDChqEpPfvNHb4hc9w4/+/lEXoTLNpIsL+NSn6t8DZMCNPY68056nXe8YHE2KdYP4udP+xMARgHacF+fn0M4KFsTAGZl9r9bp+jx9kNEjLgHqzqYjM+D1BDb6g6ISlawuZ/XPjiA7WlTyzSPK8PCz6XDbM3dTeB3a9uBKDQoqXiNIGCNIOaskXfoq3/jDPWdWfEQyUUFayc/lAcN4D9RLGJziThq/rj54Q1lCnYI2GPM+Ecw9Yl6cZ15QM7zyT5io/a3qnqGPaU89/1tPNrN1+kZTxBg== X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM6PR01MB5849.prod.exchangelabs.com;PTR:;CAT:NONE;SFS:(4636009)(136003)(366004)(346002)(376002)(396003)(39840400004)(8676002)(52116002)(4326008)(6506007)(316002)(6916009)(66946007)(66476007)(5660300002)(2616005)(66556008)(6512007)(8936002)(45080400002)(2906002)(6486002)(6666004)(54906003)(186003)(26005)(478600001)(83380400001)(38100700002)(956004)(38350700002)(86362001)(1076003);DIR:OUT;SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?p5ZR6fQFcs8xRVTyhDVkFkMinrvnU1yXDJg/j/tcsVXWjkv1eUAlhWGawZN9?= =?us-ascii?Q?gYuLNvOcaS6EZJi+KH4SLseJm9EAd1mmN68Rl2OCjtsklASY5aVg4Vfrma3n?= =?us-ascii?Q?ITtnggsin0I5iCX79jtFnXj86ZHuLVYxNL8vkxE1n2ReQXAUoYUk+kDTTKIF?= =?us-ascii?Q?E1WvaYUdzf3ceMsgKR08NcFdnMUVB80dpvjMG9xdUFPK1GRoiY2vUCGwBJ9l?= =?us-ascii?Q?HeLBg0Qeyg2wCpCLq5KWYyrwFhfeZflIawyQ/jn1EyNR0YOlXY7305POlyWb?= =?us-ascii?Q?Y74KC/al5s2ePXpxSWhZkyYRs6Lrabl0/91i9juiKI85NrcDd2zUFxfmpTvz?= =?us-ascii?Q?kkkNB7zBcZdzt6F+S2Q5BsMDoA/ZusUdhTXg5S3c6N7nTaBu/SLevEdHYHbC?= =?us-ascii?Q?0JVXmGWw5L/wt1I7aJqrWNitm2wMRnaP4tstfecw+Chi75PFZ7sutGqpvupC?= =?us-ascii?Q?v8HcluPqIwpqx5elZO778UjaVZfV6GkMW/eNQCG+wjLDkecJD5r8yc9jyhpM?= =?us-ascii?Q?WbRHWAEF2aKZHg8Bda5zTxPuGdp5T/NJtLwK73NoM+8jnD02c+HUMNvjqtoH?= =?us-ascii?Q?T1uwz+KHbnVpCDdRbfpw5mlrvGbB4I2RPWk9cQSaukqSJi8TjiliNUcTataI?= =?us-ascii?Q?rzfDxalAeRRAA/cvUF2ZpMe7e1lG9Ot8aTEN2egqiSI+eFJTgjgOO8NcHQe5?= =?us-ascii?Q?MuVHWzzQSmSYx2aWVCnFhSzlPWZk4/MbCC86/PUrFGe+ziTT7nT+welHvzqz?= =?us-ascii?Q?pxTKZkoUcumReFdmKRT4wC/vTL/Jj8Bsyt1KlEx4Yx5HP/mYaqxhMw7eYtcB?= =?us-ascii?Q?xc2y0+K6P/mSvzwOJslHicKlEYUfPM1kRXILYoJXa6KCuXWuozW0j3rGruc1?= =?us-ascii?Q?D0K1mjG53/Jidbp2NJqhvW+1bFDbufAeZ0zHyahaubt+HAFJR6jRobdMf/gP?= =?us-ascii?Q?SXiBbKMiJNEgFF3qFqouPm9Hto4qQzytFbO8wKYbzKilIRmKrL3E2kIxgDkp?= =?us-ascii?Q?jMma1uMolou55V9ZBHPQgSXuf1DrFmrJCQwqrNFA0WqJfSBuf5NDLgyCW4gm?= =?us-ascii?Q?Aal+aAyWe9HsqwkQWHH73TB1L4C0MTn+T39Jjg0t1ReDNfSLyyEf+/BBb70g?= =?us-ascii?Q?aetE+eR48yOk+yguBAtD6NJomcu8k+aE6yL0kx7wUMziEkHjo+spR8jpAxfR?= =?us-ascii?Q?XY/MvmeWaXWiHuZNm1mLjQ07DEzVyThwVUjqcljT44pcTBSiXt1fW6vuic15?= =?us-ascii?Q?IiYXK0P/ORHIIdcPNoQTZJHM+uYJY161KfzauBhi2CGliktr3gp0SQKFjVlq?= =?us-ascii?Q?e7iDJ0ndSm5KCVUnWy7pshSH?= X-OriginatorOrg: os.amperecomputing.com X-MS-Exchange-CrossTenant-Network-Message-Id: f78098b9-2868-4820-3eb5-08d971b134d4 X-MS-Exchange-CrossTenant-AuthSource: DM6PR01MB5849.prod.exchangelabs.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Sep 2021 03:40:16.2828 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3bc2b170-fd94-476d-b0ce-4229bdc904a7 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: lHMCXu0ehwnjcT128mWnGooJeQd0i3XYyaRREX2xMgElzoVRfKE8wiVuXUIwhg7+/Y2NAwAAMUgta3KSWQa3i2g8v5WNk9tWMxgvr/LA3oI= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR01MB4057 Content-Type: text/plain LinuxBoot is a firmware that replaces specific firmware functionality like the UEFI DXE phase with a Linux kernel and runtime. It is built-in UEFI image like an application, which is executed at the end of DXE phase. To achieve the LinuxBoot boot flow "SEC->PEI->DXE->BDS->LinuxBoot", today we use the common well-known GUID of UEFI Shell for LinuxBoot payload, so LinuxBoot developers can effortlessly find the UEFI Shell Application and replace it with the LinuxBoot payload without recompiling platform EDK2 (There might be an issue with a few systems that don't have a UEFI Shell). Also, we have a hard requirement to force the BDS to boot into the LinuxBoot as it is essentially required that only the LinuxBoot boot option is permissible and UEFI is an intermediate bootstrap phase. Considering all the above, it is reasonable to just have a new GUID for LinuxBoot and require a LinuxBoot specific BDS implementation. In addition, with making the BDS implementation simpler, we can reduce many DXE drivers which we think it is not necessary for LinuxBoot booting. This patch adds a new PlatformBootManagerLib implementation which registers only the gArmTokenSpaceGuid.PcdLinuxBootFileGuid for LinuxBoot payload as an active boot option. It allows BDS to jump to the LinuxBoot quickly by skipping the UiApp and UEFI Shell. The PlatformBootManagerLib library derived from ArmPkg/Library/PlatformBootManagerLib. Cc: Leif Lindholm Cc: Ard Biesheuvel Signed-off-by: Nhi Pham --- ArmPkg/ArmPkg.dec | 8 + ArmPkg/ArmPkg.dsc | 2 + ArmPkg/Library/LinuxBootBootManagerLib/LinuxBootBootManagerLib.inf | 58 +++++++ ArmPkg/Library/LinuxBootBootManagerLib/LinuxBootBm.c | 178 ++++++++++++++++++++ 4 files changed, 246 insertions(+) diff --git a/ArmPkg/ArmPkg.dec b/ArmPkg/ArmPkg.dec index 214b2f589217..f68e6ee00860 100644 --- a/ArmPkg/ArmPkg.dec +++ b/ArmPkg/ArmPkg.dec @@ -3,6 +3,7 @@ # # Copyright (c) 2009 - 2010, Apple Inc. All rights reserved.
# Copyright (c) 2011 - 2021, ARM Limited. All rights reserved. +# Copyright (c) 2021, Ampere Computing LLC. All rights reserved. # # SPDX-License-Identifier: BSD-2-Clause-Patent # @@ -382,3 +383,10 @@ [PcdsFixedAtBuild.common, PcdsDynamic.common] # gArmTokenSpaceGuid.PcdPciBusMin|0x0|UINT32|0x00000059 gArmTokenSpaceGuid.PcdPciBusMax|0x0|UINT32|0x0000005A + +[PcdsDynamicEx] + # + # This dynamic PCD hold the GUID of a firmware FFS which contains + # the LinuxBoot payload. + # + gArmTokenSpaceGuid.PcdLinuxBootFileGuid|{0x0}|VOID*|0x0000005C diff --git a/ArmPkg/ArmPkg.dsc b/ArmPkg/ArmPkg.dsc index 926986cf7fbb..ffb1c261861e 100644 --- a/ArmPkg/ArmPkg.dsc +++ b/ArmPkg/ArmPkg.dsc @@ -5,6 +5,7 @@ # Copyright (c) 2011 - 2021, Arm Limited. All rights reserved.
# Copyright (c) 2016, Linaro Ltd. All rights reserved.
# Copyright (c) Microsoft Corporation.
+# Copyright (c) 2021, Ampere Computing LLC. All rights reserved. # # SPDX-License-Identifier: BSD-2-Clause-Patent # @@ -150,6 +151,7 @@ [Components.common] ArmPkg/Library/ArmSmcPsciResetSystemLib/ArmSmcPsciResetSystemLib.inf ArmPkg/Library/PeiServicesTablePointerLib/PeiServicesTablePointerLib.inf ArmPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.inf + ArmPkg/Library/LinuxBootBootManagerLib/LinuxBootBootManagerLib.inf ArmPkg/Drivers/ArmCrashDumpDxe/ArmCrashDumpDxe.inf ArmPkg/Drivers/ArmScmiDxe/ArmScmiDxe.inf diff --git a/ArmPkg/Library/LinuxBootBootManagerLib/LinuxBootBootManagerLib.inf b/ArmPkg/Library/LinuxBootBootManagerLib/LinuxBootBootManagerLib.inf new file mode 100644 index 000000000000..139b6171990a --- /dev/null +++ b/ArmPkg/Library/LinuxBootBootManagerLib/LinuxBootBootManagerLib.inf @@ -0,0 +1,58 @@ +## @file +# Implementation for PlatformBootManagerLib library class interfaces. +# +# Copyright (C) 2015-2016, Red Hat, Inc. +# Copyright (c) 2014, ARM Ltd. All rights reserved.
+# Copyright (c) 2007 - 2014, Intel Corporation. All rights reserved.
+# Copyright (c) 2016, Linaro Ltd. All rights reserved.
+# Copyright (c) 2020 - 2021, Ampere Computing LLC. All rights reserved.
+# +# SPDX-License-Identifier: BSD-2-Clause-Patent +# +## + +[Defines] + INF_VERSION = 0x0001001B + BASE_NAME = LinuxBootBootManagerLib + FILE_GUID = 1FA91547-DB23-4F6A-8AF8-3B9782A7F917 + MODULE_TYPE = DXE_DRIVER + VERSION_STRING = 1.0 + LIBRARY_CLASS = PlatformBootManagerLib|DXE_DRIVER + +# +# The following information is for reference only and not required by the build tools. +# +# VALID_ARCHITECTURES = ARM AARCH64 +# + +[Sources] + LinuxBootBm.c + +[Packages] + ArmPkg/ArmPkg.dec + MdeModulePkg/MdeModulePkg.dec + MdePkg/MdePkg.dec + ShellPkg/ShellPkg.dec + +[LibraryClasses] + BaseLib + BaseMemoryLib + DebugLib + MemoryAllocationLib + PcdLib + PrintLib + UefiBootManagerLib + UefiBootServicesTableLib + UefiLib + UefiRuntimeServicesTableLib + +[Pcd] + gArmTokenSpaceGuid.PcdLinuxBootFileGuid + +[Guids] + gEfiEndOfDxeEventGroupGuid + gUefiShellFileGuid + gZeroGuid + +[Protocols] + gEfiLoadedImageProtocolGuid diff --git a/ArmPkg/Library/LinuxBootBootManagerLib/LinuxBootBm.c b/ArmPkg/Library/LinuxBootBootManagerLib/LinuxBootBm.c new file mode 100644 index 000000000000..f4941780efcd --- /dev/null +++ b/ArmPkg/Library/LinuxBootBootManagerLib/LinuxBootBm.c @@ -0,0 +1,178 @@ +/** @file + Implementation for PlatformBootManagerLib library class interfaces. + + Copyright (C) 2015-2016, Red Hat, Inc. + Copyright (c) 2014 - 2019, ARM Ltd. All rights reserved.
+ Copyright (c) 2004 - 2018, Intel Corporation. All rights reserved.
+ Copyright (c) 2016, Linaro Ltd. All rights reserved.
+ Copyright (c) 2020 - 2021, Ampere Computing LLC. All rights reserved.
+ + SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#include + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +STATIC +VOID +PlatformRegisterFvBootOption ( + CONST EFI_GUID *FileGuid, + CHAR16 *Description, + UINT32 Attributes + ) +{ + EFI_STATUS Status; + INTN OptionIndex; + EFI_BOOT_MANAGER_LOAD_OPTION NewOption; + EFI_BOOT_MANAGER_LOAD_OPTION *BootOptions; + UINTN BootOptionCount; + MEDIA_FW_VOL_FILEPATH_DEVICE_PATH FileNode; + EFI_LOADED_IMAGE_PROTOCOL *LoadedImage; + EFI_DEVICE_PATH_PROTOCOL *DevicePath; + + Status = gBS->HandleProtocol ( + gImageHandle, + &gEfiLoadedImageProtocolGuid, + (VOID **)&LoadedImage + ); + ASSERT_EFI_ERROR (Status); + + EfiInitializeFwVolDevicepathNode (&FileNode, FileGuid); + DevicePath = DevicePathFromHandle (LoadedImage->DeviceHandle); + ASSERT (DevicePath != NULL); + DevicePath = AppendDevicePathNode ( + DevicePath, + (EFI_DEVICE_PATH_PROTOCOL *)&FileNode + ); + ASSERT (DevicePath != NULL); + + Status = EfiBootManagerInitializeLoadOption ( + &NewOption, + LoadOptionNumberUnassigned, + LoadOptionTypeBoot, + Attributes, + Description, + DevicePath, + NULL, + 0 + ); + ASSERT_EFI_ERROR (Status); + FreePool (DevicePath); + + BootOptions = EfiBootManagerGetLoadOptions ( + &BootOptionCount, + LoadOptionTypeBoot + ); + + OptionIndex = EfiBootManagerFindLoadOption ( + &NewOption, + BootOptions, + BootOptionCount + ); + + if (OptionIndex == -1) { + Status = EfiBootManagerAddLoadOptionVariable (&NewOption, MAX_UINTN); + ASSERT_EFI_ERROR (Status); + } + EfiBootManagerFreeLoadOption (&NewOption); + EfiBootManagerFreeLoadOptions (BootOptions, BootOptionCount); +} + +/** + Do the platform specific action before the console is connected. + + Such as: + Update console variable; + Register new Driver#### or Boot####; + Signal ReadyToLock event. +**/ +VOID +EFIAPI +PlatformBootManagerBeforeConsole ( + VOID + ) +{ + // + // Signal EndOfDxe PI Event + // + EfiEventGroupSignal (&gEfiEndOfDxeEventGroupGuid); +} + +/** + Do the platform specific action after the console is connected. + + Such as: + Dynamically switch output mode; + Signal console ready platform customized event; + Run diagnostics like memory testing; + Connect certain devices; + Dispatch additional option roms. +**/ +VOID +EFIAPI +PlatformBootManagerAfterConsole ( + VOID + ) +{ + EFI_GUID LinuxBootFileGuid; + + CopyGuid (&LinuxBootFileGuid, PcdGetPtr (PcdLinuxBootFileGuid)); + + if (!CompareGuid (&LinuxBootFileGuid, &gZeroGuid)) { + // + // Register LinuxBoot + // + PlatformRegisterFvBootOption ( + &LinuxBootFileGuid, + L"LinuxBoot", + LOAD_OPTION_ACTIVE + ); + } else { + DEBUG ((DEBUG_ERROR, "%a: PcdLinuxBootFileGuid was not set!\n", __FUNCTION__)); + } +} + +/** + This function is called each second during the boot manager waits the + timeout. + + @param TimeoutRemain The remaining timeout. +**/ +VOID +EFIAPI +PlatformBootManagerWaitCallback ( + UINT16 TimeoutRemain + ) +{ + return; +} + +/** + The function is called when no boot option could be launched, + including platform recovery options and options pointing to applications + built into firmware volumes. + + If this function returns, BDS attempts to enter an infinite loop. +**/ +VOID +EFIAPI +PlatformBootManagerUnableToBoot ( + VOID + ) +{ + return; +} -- 2.17.1