From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by mx.groups.io with SMTP id smtpd.web12.1695.1643843244784677529 for ; Wed, 02 Feb 2022 15:07:26 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=QKbfzRpF; spf=pass (domain: intel.com, ip: 134.134.136.65, mailfrom: guo.dong@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1643843244; x=1675379244; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=mcACmmh9FrrjwLuTi0vjwe+Pxc8wtrpKW+gA5NJRTM8=; b=QKbfzRpFn9HkNsJxU8eg4fzaLZ6j5XUyjSn4JFFv6zWL7MnAxQzxDlQx KqNehl7l/X84gFJfFb9Qge4IvXkHoY8/f21fYuDewWbzq8iDhV3gfyPe8 J1oDiZeauhZs2Xi6nuXzk8AGQsKuOmSHvqRcxIDf/EcUlI/3rsNWNQus2 4TcOa7Ogu5G/RlhOywYE2crRVAnyBx1GIrMT1LA6llI7V5biX5xgU7GSf XAlRFVUHDcLmL+q6ZmKksw6iWAjuBTSgPNQx/6s0uVpg6ymQH1cK/8pPU +vilv+mdtNMZeNSSh4+Okip6QiJYmYvnUNgBIOMsiv0BrdV3CnxAH523c w==; X-IronPort-AV: E=McAfee;i="6200,9189,10246"; a="247990728" X-IronPort-AV: E=Sophos;i="5.88,338,1635231600"; d="scan'208";a="247990728" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Feb 2022 15:07:23 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.88,338,1635231600"; d="scan'208";a="627242820" Received: from orsmsx605.amr.corp.intel.com ([10.22.229.18]) by fmsmga002.fm.intel.com with ESMTP; 02 Feb 2022 15:07:23 -0800 Received: from orsmsx609.amr.corp.intel.com (10.22.229.22) by ORSMSX605.amr.corp.intel.com (10.22.229.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.20; Wed, 2 Feb 2022 15:07:23 -0800 Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by orsmsx609.amr.corp.intel.com (10.22.229.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.20 via Frontend Transport; Wed, 2 Feb 2022 15:07:23 -0800 Received: from NAM10-MW2-obe.outbound.protection.outlook.com (104.47.55.101) by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.20; Wed, 2 Feb 2022 15:07:23 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Iu4X84niRcMgPU5FF587/Nq2cmKDjMZKznwLA+BTwFbUnCjT50ZIO7HSzdsUcg4WrH/5NFreQcqUkKfBNU95fOi/eiAU4oF92Lb24mlz3IuxccjMbbA+OuPmJjC9yKRnV3JAon1LMVYaWsZkio5lNbq1CUkRyh1Y7jXz3byWtp5URHI462YSJen5t3BFtAl7Gv+dt7SccNJwa8NjaxzluJ9BJsmlIba+mdrHipuAnVDqTVDaOTd8eQ9VJ9rppQ1xxcsp2r/Mp3vlXW6Dhb1gl4p7ns7VidJ84RNwvvp1Yb6ft+w+Y7R5fyCqEzpnYh43fdP7oh02bdGg4W/7a/Cc3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=lpzRG8xBSJrJQOsXxDPUpxP9Zm/gc2wHWFRP9gE65PY=; b=j0KPGgMQHDoS719HkBTbW2l5Odja6EUUxU0JfnP9Q8zujmlbtbbirAPVXFRFCt0LeqJ2SDJd0PuwHVmwJjvxxUGKzaKsG8gWtfCGAUurjd8LNiJD+lVugJ5ydTlsH+IFotGKw0JVsBaiD5aq2deemj+aiO2Dnwsujy0gmJMEJeU3arH39IiRQFcED6PuVvadGeCUrQBYFtpwdAWxGOBHmc8DsbioFnrcMExdWyoKHrDKKzCnhNnd2GCkxZAcoLAZTStaPWUry4Y9lJ+BZl1YdqUBfy7+TGh0dcEJu917NRWL7fzKIKQVoXuq/Q+z/BtTb38tCsGwbZlcv+pE8dVkGg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none Received: from BYAPR11MB3622.namprd11.prod.outlook.com (2603:10b6:a03:fe::30) by DM6PR11MB2924.namprd11.prod.outlook.com (2603:10b6:5:66::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4930.19; Wed, 2 Feb 2022 23:07:19 +0000 Received: from BYAPR11MB3622.namprd11.prod.outlook.com ([fe80::c461:5de1:9cf:23cf]) by BYAPR11MB3622.namprd11.prod.outlook.com ([fe80::c461:5de1:9cf:23cf%7]) with mapi id 15.20.4930.022; Wed, 2 Feb 2022 23:07:19 +0000 From: "Guo Dong" To: "devel@edk2.groups.io" , "Rhodes, Sean" Subject: Re: [edk2-devel] [PATCH] UefiPayloadPkg: Make Boot Manager Key configurable Thread-Topic: [edk2-devel] [PATCH] UefiPayloadPkg: Make Boot Manager Key configurable Thread-Index: AQHYGATbdgXZAz2BAEeSGeVP0O6ql6yA4oPQ Date: Wed, 2 Feb 2022 23:07:19 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-reaction: no-action dlp-version: 11.6.200.16 authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 8a5a9307-9098-487f-c4c2-08d9e6a0c34d x-ms-traffictypediagnostic: DM6PR11MB2924:EE_ x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:3513; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR11MB3622.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(186003)(2906002)(55016003)(82960400001)(33656002)(38070700005)(83380400001)(52536014)(7696005)(316002)(71200400001)(6506007)(76116006)(122000001)(86362001)(66946007)(38100700002)(66556008)(64756008)(66446008)(8676002)(66476007)(8936002)(110136005)(9686003)(53546011)(508600001)(966005)(5660300002);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?VcgEb91eZVYzIegRZQVWlMXxjnNG0CUijv8BlD5PZS0NtJigw/Mb0lDZNCIR?= =?us-ascii?Q?FDwhssZXlWGVxyM3DwpgtlIA3ZebmewSHfCHiedlLUuOidm1wdCd9JukSZJz?= =?us-ascii?Q?XsCm0Qp52MRO8quRp6N1/vY2CIFBHRrBJv+4hPHh8ZI3r2NLtrglzMIKPHrT?= =?us-ascii?Q?ySS3M1prcAIMi2zCo4DL376ZZy0dCq8z/wIdG99RRnOrwTVrl+QRcSdMDgWd?= =?us-ascii?Q?6EAUiNgVNHUKOJxG3cievaeoXWESLpSKMpP+STCv8Lsz/zpOPjgP9NvAEGbE?= =?us-ascii?Q?K58+JsMtgMD7UwFBD8ej78kWvF6uoMcIyOp76YrRNCZLUTptfz+QR3EBRelY?= =?us-ascii?Q?MmWQnNrLBZwrYDENB9DUv/ccJdxSLn1z8EIzY8+XWJUp3yJ/fB0ApEnDiNPE?= =?us-ascii?Q?/vGNr2MVXyvTC3WafntW9IVZelfkFWMPmDN39vb7ICD/w3N3h3SqNr3PhHH/?= =?us-ascii?Q?qf1SbMKKwUwg5Ql51cWJx6p5pCMfA169TH8DNHqZWvqQej5OGTAPwDX7/+en?= =?us-ascii?Q?++yK8obVwCHk0VyEm8IYzmRXnyF7/WNSxhnRDsNts/mmqJmv2gge/kcIvPMZ?= =?us-ascii?Q?KYXP6QNA4gpg3YUerWEMaavBlx61DeNewdf1F4+3EQg+Uy0qwOyvUaOjiq+f?= =?us-ascii?Q?cXMafoDUZnNlqsVjCJ77EnLs4ZtHIWoQjktF0rwTmp2u56pRC4BZK8Phs2Hb?= =?us-ascii?Q?wHSSCh/cuxRu7z41hqWpDBkac9wt/wchUWlLLKBdsleTgsBarLbKnPc2NX4d?= =?us-ascii?Q?dzKLmu3SGoLdgLlQ5bwcOi4m/YuAcTz7KS2S2h6zdr3IJ1RMd2pNldaWQplm?= =?us-ascii?Q?04Kt4hQdKI3a7UAX3ORRgN75RjrPeo+ma7p1bh+xpKEZWOj1i0malw50sZbs?= =?us-ascii?Q?RukUGXEYbhVh/NDbVR3qG41nR5jGngBka7kFd8NK66/m0uApZhN4jZ1hQBEu?= =?us-ascii?Q?N5DnQtwFutkf8wx8mX47FNTWqku8fL7ZTH/1zrNHjxji5qsZWDaXzD1fZ1xz?= =?us-ascii?Q?FHbV+Wzgixq65KjwXgKaX13dKE0myDjK7MBN0wbj9jY8GsO+rIuT7Xwf9rxp?= =?us-ascii?Q?OqrzCTw6KU7PY3FlQ9K1rVTKwBECnCklVAv60LlD6FuFZuUzExqxSNR4axpN?= =?us-ascii?Q?zqkYXFk5/pf4LwLXAsm8AJXfuKTbP0ZjvuZHdTtHLj4AoGVJIow5+MATanvN?= =?us-ascii?Q?4jEWt9jc3SQ0QGW4eQUYhftfc+iqDVvLO8RliTX1827kMLZhNFh9gb0rMjRy?= =?us-ascii?Q?pLx3DzDRnhoF7VX7AGZhvqW+mXIeUKvzXiWf2Pc3I7g4nhsCgRRWsYg63IQy?= =?us-ascii?Q?gNNGXT7nCgQ/bCoaxv1bSLRExZtjHepuH/RqX39jW0dPFVF8epuHwSSUqrBP?= =?us-ascii?Q?jP5ylW2XXC1acHy+LIeOQcy3sKemnmh7yvb3+PhArvbyAdlbuw034x0w0nfy?= =?us-ascii?Q?B68yOOk4wKEdc1tGTqVYfEQsZMmaLBuvNm8Fw02Z7iF75WCtD1QJjC5fh+7q?= =?us-ascii?Q?qy9/S7OYJ9yMz6+74Ly88pQ2EWVvBpCw210LDHcxqlAMvj1CmfK8fKzw5ccb?= =?us-ascii?Q?2xWGu7wE583tAFYsVXt5u7l9GomYSKeFhj8iW133xjsyp2Qj3ASD4IPd6aNy?= =?us-ascii?Q?djQ6LJD/O10u62voX5Qje+FhswJTD+pV+3gVZmAoYN9zodS8DJlWSK7g0I+r?= =?us-ascii?Q?kAHJShQJnHV3CnHFwDfHU0mZqsE=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB3622.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8a5a9307-9098-487f-c4c2-08d9e6a0c34d X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Feb 2022 23:07:19.4351 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: jNkTcWpKdiRZuwY4W78s9eI3nuby3Yk8G/eHiUnGzDFq4G0Y7+1KRyJj1ohSNNlZ5M5WZYwUbvjzxUBonFeICA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB2924 Return-Path: guo.dong@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable + DEFINE PLATFORM_BOOT_TIMEOUT =3D 3 It looks you missed the change to gEfiMdePkgTokenSpaceGuid using PLATFORM_B= OOT_TIMEOUT. Thanks, Guo -----Original Message----- From: devel@edk2.groups.io On Behalf Of Sean Rhodes Sent: Wednesday, February 2, 2022 12:16 AM To: devel@edk2.groups.io Cc: Dong, Guo ; Rhodes, Sean Subject: [edk2-devel] [PATCH] UefiPayloadPkg: Make Boot Manager Key configu= rable Provide a build option to use [Esc] instead of [F2] for devices such as Chr= omebooks that don't have F-keys. Signed-off-by: Sean Rhodes --- .../PlatformBootManager.c | 44 +++++++++++++------ .../PlatformBootManagerLib.inf | 1 + UefiPayloadPkg/UefiPayloadPkg.dec | 3 ++ UefiPayloadPkg/UefiPayloadPkg.dsc | 4 ++ 4 files changed, 39 insertions(+), 13 deletions(-) diff --git a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootMana= ger.c b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c index a8ead775ea..0eb577313a 100644 --- a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c +++ b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager. +++ c @@ -164,7 +164,7 @@ PlatformBootManagerBeforeConsole ( ) { EFI_INPUT_KEY Enter;- EFI_INPUT_KEY = F2;+ EFI_INPUT_KEY CustomKey; EFI_INPUT_KEY = Down; EFI_BOOT_MANAGER_LOAD_OPTION BootOption; EFI_STATUS = Status;@@ -186,13 +186,22 @@ PlatformBootManagerBeforeConsole= ( Enter.UnicodeChar =3D CHAR_CARRIAGE_RETURN; EfiBootManagerRegisterCont= inueKeyOption (0, &Enter, NULL); - //- // Map F2 to Boot Manager Menu- /= /- F2.ScanCode =3D SCAN_F2;- F2.UnicodeChar =3D CHAR_NULL;+ if (Fixed= PcdGetBool (PcdBootManagerEscape)) {+ //+ // Map Esc to Boot Manager = Menu+ //+ CustomKey.ScanCode =3D SCAN_ESC;+ CustomKey.UnicodeCh= ar =3D CHAR_NULL;+ } else {+ //+ // Map Esc to Boot Manager Menu+ = //+ CustomKey.ScanCode =3D SCAN_F2;+ CustomKey.UnicodeChar =3D CH= AR_NULL;+ }+ EfiBootManagerGetBootManagerMenu (&BootOption);- EfiBootMa= nagerAddKeyOptionVariable (NULL, (UINT16)BootOption.OptionNumber, 0, &F2, N= ULL);+ EfiBootManagerAddKeyOptionVariable (NULL, (UINT16)BootOption.Option= Number, 0, &CustomKey, NULL); // // Also add Down key to Boot Manager = Menu since some serial terminals don't support F2 key.@@ -251,12 +260,21 @@= PlatformBootManagerAfterConsole ( // PlatformRegisterFvBootOption (PcdGetPtr (PcdShellFile), L"UEFI Shel= l", LOAD_OPTION_ACTIVE); - Print (- L"\n"- L"F2 or Down to ente= r Boot Manager Menu.\n"- L"ENTER to boot directly.\n"- L"\n= "- );+ if (FixedPcdGetBool (PcdBootManagerEscape)) {+ Print (+ = L"\n"+ L"Esc or Down to enter Boot Manager Menu.\n"+ L"ENTER= to boot directly.\n"+ L"\n"+ );+ } else {+ Print (= + L"\n"+ L"F2 or Down to enter Boot Manager Menu.\n"+ L= "ENTER to boot directly.\n"+ L"\n"+ );+ } } /**diff -= -git a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib= .inf b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib= .inf index 9c4a9da943..80390e0d98 100644 --- a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.= inf +++ b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerL +++ ib.inf @@ -73,3 +73,4 @@ gEfiMdePkgTokenSpaceGuid.PcdUartDefaultParity gEfiMdePkgTokenSpaceGuid= .PcdUartDefaultStopBits gEfiMdeModulePkgTokenSpaceGuid.PcdBootManagerMenu= File+ gUefiPayloadPkgTokenSpaceGuid.PcdBootManagerEscapediff --git a/UefiP= ayloadPkg/UefiPayloadPkg.dec b/UefiPayloadPkg/UefiPayloadPkg.dec index 551f0a4915..f2fcdf6a74 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.dec +++ b/UefiPayloadPkg/UefiPayloadPkg.dec @@ -83,6 +83,9 @@ gUefiPayloadPkgTokenSpaceGuid.PcdSystemMemoryUefiRegionSi= ze|0x04000000|UINT32|0x gUefiPayloadPkgTokenSpaceGuid.PcdPcdDriverFile|{ 0x57, 0x72, 0xcf, 0x80, = 0xab, 0x87, 0xf9, 0x47, 0xa3, 0xfe, 0xD5, 0x0B, 0x76, 0xd8, 0x95, 0x41 }|VO= ID*|0x00000018 +# Boot Manager Key+gUefiPayloadPkgTokenSpaceGuid.PcdBootMan= agerEscape|FALSE|BOOLEAN|0x00000020+ ## FFS filename to find the default va= riable initial data file. # @Prompt FFS Name of variable initial data file = gUefiPayloadPkgTokenSpaceGuid.PcdNvsDataFile |{ 0x1a, 0xf1, 0xb1, 0xae, 0x= 42, 0xcc, 0xcf, 0x4e, 0xac, 0x60, 0xdb, 0xab, 0xf6, 0xca, 0x69, 0xe6 }|VOID= *|0x00000025diff --git a/UefiPayloadPkg/UefiPayloadPkg.dsc b/UefiPayloadPkg= /UefiPayloadPkg.dsc index 1ce96a51c1..5e1892458e 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.dsc +++ b/UefiPayloadPkg/UefiPayloadPkg.dsc @@ -33,6 +33,8 @@ DEFINE UNIVERSAL_PAYLOAD =3D FALSE DEFINE SECURITY_STUB_ENA= BLE =3D TRUE DEFINE SMM_SUPPORT =3D FALSE+ DEFI= NE BOOT_MANAGER_ESCAPE =3D FALSE+ DEFINE PLATFORM_BOOT_TIMEOUT = =3D 3 # # SBL: UEFI payload for Slim Bootloader # COREBOOT:= UEFI payload for coreboot@@ -399,6 +401,8 @@ gEfiMdePkgTokenSpaceGuid.PcdPerformanceLibraryPropertyMask | 0x1 != endif + gUefiPayloadPkgTokenSpaceGuid.PcdBootManagerEscape|$(BOOT_MANAGER_= ESCAPE)+ [PcdsPatchableInModule.X64] gPcAtChipsetPkgTokenSpaceGuid.PcdRtc= IndexRegister|$(RTC_INDEX_REGISTER) gPcAtChipsetPkgTokenSpaceGuid.PcdRtcT= argetRegister|$(RTC_TARGET_REGISTER)--=20 2.32.0 -=3D-=3D-=3D-=3D-=3D-=3D Groups.io Links: You receive all messages sent to this group. View/Reply Online (#86327): https://edk2.groups.io/g/devel/message/86327 Mute This Topic: https://groups.io/mt/88853648/1781375 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [guo.dong@intel.com] -=3D= -=3D-=3D-=3D-=3D-=3D