From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by mx.groups.io with SMTP id smtpd.web10.56628.1643755571912037668 for ; Tue, 01 Feb 2022 14:46:12 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=WWJSB1gJ; spf=pass (domain: intel.com, ip: 192.55.52.136, mailfrom: guo.dong@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1643755571; x=1675291571; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=eBbMxpjqi6pynaEJeJyc/L4lLawhZkQ943tY+Zin7qE=; b=WWJSB1gJQ3TBKiFOYMXx6uIVhI1zOh6JTlEmx7tk+OPGL8tfm2//voP7 90EAnZBf9/3ip5XKjdSEmOXfsC9u0xjqlu/Vl37h6KKwKnCZiWmAU8Cpd VaFQ6z5PEnKSWJbh44sDvsuptot98DSx7vo1idsikD6sadi/+8p9mGjKe JR5Uxojw0DFoya/rm2GFKzkKyYkbcxzVLISbDFd4nmvJ5tTc0niM1j9hC gPwKwoUd9CBSF7rRVJZHNNpxkF7196bsEBvrVPLEggk3kg5dkWc9WB7J9 gBgbfahEtVO7q6IR67ogI8dnajUDhAHEJBTU0WUu/pYiB/r7dSRamiy1n g==; X-IronPort-AV: E=McAfee;i="6200,9189,10245"; a="227780956" X-IronPort-AV: E=Sophos;i="5.88,335,1635231600"; d="scan'208";a="227780956" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Feb 2022 14:46:11 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.88,335,1635231600"; d="scan'208";a="523238513" Received: from orsmsx606.amr.corp.intel.com ([10.22.229.19]) by orsmga007.jf.intel.com with ESMTP; 01 Feb 2022 14:46:10 -0800 Received: from orsmsx606.amr.corp.intel.com (10.22.229.19) by ORSMSX606.amr.corp.intel.com (10.22.229.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.20; Tue, 1 Feb 2022 14:46:10 -0800 Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx606.amr.corp.intel.com (10.22.229.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.20 via Frontend Transport; Tue, 1 Feb 2022 14:46:10 -0800 Received: from NAM12-BN8-obe.outbound.protection.outlook.com (104.47.55.169) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.20; Tue, 1 Feb 2022 14:46:10 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KCybsmvfl0v+p3eU84vT9kXf4T+d51oBrm/VLnGV43vOQozZoHVXJ2kEuAOMNxQ4cFaKn3bI70wD6cTBPgfOXdHWJMdzKTFiZbpof5W36bFm4z3+2wPLgE5ihMGpf6Tjcmp14C3PF4fWMIsXOIsjcITy/KY/xqKq/oh3HlPfK3xp+olQvs+89mJImRnUojwkW5tpsDPzlUwQdRUB5wnM2UxvJP/1cNwtol9DtGl9HHzR7UoGuxhUd7JfZEedRTNMJNtwkZMq26e+ro4heGeZVhVoDEkpWa8Pj+WSsJh/Zl1HfkSXWVeG2elqLgnvpHom9sM2Vmf5z7qYg5xoVY9WKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Uqr0pNlHmXA40RbDFGWERxUJvXacOnwTolKwFkcsrOY=; b=XgedSWClxOFmLwSxsqLHXWbax0wEvc/rigFC1dBtEax1MpwBbonuveMrKwWUD/zOg6BxL6Z8ApyHzo1Vx1VzMv0jL7RVCKK6kRh02pbfEMAHNv75a8opsMyjjT0Jco0iW89T7iO7mQXeSo4vWyyFRk+f/+7Qjv3cCdRm/3Li9z0zXDRbFgaS22v6aeDgFe2FYio6lHa8P0A9JijdPxOEJRXotLHJAOYJDwNJ+tw1p6w91vU+wWVtHe9ET+hiVfj4QxqzrwgH3dFKKtPqGcQ2EGW0a1QZDrKOp2C57/LUEMq9Brqsj8GW3M40IARbxsvQFZVkfSGe0WZa7bdmKha+yA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none Received: from BYAPR11MB3622.namprd11.prod.outlook.com (2603:10b6:a03:fe::30) by BL0PR11MB3475.namprd11.prod.outlook.com (2603:10b6:208:64::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4930.19; Tue, 1 Feb 2022 22:46:08 +0000 Received: from BYAPR11MB3622.namprd11.prod.outlook.com ([fe80::c461:5de1:9cf:23cf]) by BYAPR11MB3622.namprd11.prod.outlook.com ([fe80::c461:5de1:9cf:23cf%7]) with mapi id 15.20.4930.022; Tue, 1 Feb 2022 22:46:08 +0000 From: "Guo Dong" To: "devel@edk2.groups.io" , "Rhodes, Sean" Subject: Re: [edk2-devel] [PATCH 43/43] UefiPayloadPkg: Make Boot Manager Key configurable Thread-Topic: [edk2-devel] [PATCH 43/43] UefiPayloadPkg: Make Boot Manager Key configurable Thread-Index: AQHYFuSYtdsVfwTt30aTiqmHVyC2Lqx/TLRw Date: Tue, 1 Feb 2022 22:46:08 +0000 Message-ID: References: <9dd14fc91c174eae87fd122c7ac70073a363527f.1643662304.git.sean@starlabs.systems> <53aafe973bba20c146ae8a2dc51ee4f37e3f5207.1643662304.git.sean@starlabs.systems> In-Reply-To: <53aafe973bba20c146ae8a2dc51ee4f37e3f5207.1643662304.git.sean@starlabs.systems> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-reaction: no-action dlp-version: 11.6.200.16 authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: d27efde4-bfc7-4179-6773-08d9e5d4a322 x-ms-traffictypediagnostic: BL0PR11MB3475:EE_ x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:5516; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR11MB3622.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66476007)(8936002)(110136005)(6506007)(8676002)(122000001)(33656002)(66446008)(64756008)(66946007)(52536014)(9686003)(7696005)(82960400001)(86362001)(76116006)(38070700005)(66556008)(53546011)(38100700002)(5660300002)(83380400001)(55016003)(508600001)(71200400001)(2906002)(966005)(26005)(186003)(316002);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?26PIWJ70q5cC7ReLLAu6TOh01ijRkj7oia0rU6vZIWZuaT8HFPsyXASqWt0x?= =?us-ascii?Q?b62Lexwj6IwF9TU4exaVtXwcePc+pu4CGLKYlIrRLvuvenHEVFXBKBE9GBA2?= =?us-ascii?Q?85YENaXnlTuOb6IoCRY/ehK62YgpZ6Igwqobdtrs2gSZ+DPUu+8ZiCpQe3QB?= =?us-ascii?Q?eK5AvLc0xoKRwtREiiNH436M7n2z5ENfyB7EQ0nXzr9PFsiK3AjCTLi7Wl22?= =?us-ascii?Q?uuDanHeRoZugX+vX+1dZVnwsCINva/wHkHMgmjgrgMfaPCd7RzXWAbFqZpW5?= =?us-ascii?Q?bgYJhoBbBsf/+FlkfwJ8gdNEnOWp02dLZczQ8mHVxiLfGsgzB7thm8H9rXdm?= =?us-ascii?Q?K5f5FukcbsWrnjib3VOwb29L20SpAntNMScDWIsPnM7cU6uhS0N/T+Q52rDj?= =?us-ascii?Q?kWnR7u2XCrXD35a0UEcfu1+fX7q5s8xejJdW7V5rrjgChdUm/9b5v6JXf1t4?= =?us-ascii?Q?XJ6VMap0cCWs3yFR6xPvHgoTA7Mo+z/YweaLAf+LglTWPibP5Qj4Kmk7j4+k?= =?us-ascii?Q?a5GkyaEAtGGMT1XKgtU8HYmtThDyXf2kzrxjSOaLbgU5VZt0XmLzy5kkuEPv?= =?us-ascii?Q?XejweFHEryLKPmMydxmMY/xZ1oZXlnSFUwxYVZQLaQkdNfKBtVz+ffaR+rgP?= =?us-ascii?Q?l0it0IfNKYV6VjSc/oa1eHsjfPYkBqVmLwL5y8oqRzHkeDRPM+zChdkWilc6?= =?us-ascii?Q?vm99pozVzIuR4BsWDX2krAeHEPXuZqWLhu5ICZPp0KjKPY+U0/oB2KV6Gl8r?= =?us-ascii?Q?YWghllCqpE3QoNHVSZ/IZ/bgjySxXpVqe1vhrBaFwd9FezLGhe+t01OVxh1s?= =?us-ascii?Q?JfEJtayEoI3omel3LH9nIaeks2T1hUWT2qt7c7Iu31sM6X3r2UlIrvklipiv?= =?us-ascii?Q?Zqa/mL2pZTGpe5mBuWu8wyQNWFArSQpK/NHE8VldZVL7e4qoPM0URW+IbrUh?= =?us-ascii?Q?g8HeGzGlpZxABZtE/wtEun6YNRXo5yfZ/QMIRf9s0Bcws9YFyEQBI9NpCfRI?= =?us-ascii?Q?5CrqEv3zCa1roPC7zh3U4XWdMNcRBNMko/0kN9LKzFMl67kNzzib9VwOWY65?= =?us-ascii?Q?vQxDV1UdCyUv94Pt7+cqByW0B0OTCG01KbrTPFWzeiLT9sHUf772YOcUVND9?= =?us-ascii?Q?5e9GqnaWU8vMZFPikuWvp3WWZmJI1VUlpyNH5adgZPbR1em5rKmHnmOPUqDL?= =?us-ascii?Q?zi+pOr6ilWhQbhKy+WQWrBwE2EZAnT+fmXoVV+E70Sa7TJivsJTtvRrW4gCu?= =?us-ascii?Q?TkOyhYClqd+sTFdzdYfQxQbct6klJ98660aoK8v4fqJFryyI1DbVfq7Bd0kB?= =?us-ascii?Q?Clyp88RY6toRhzO0hUfw7bustuIk8AfFNhe3+q60+NmdtNvSwpyoP8nW1Gqe?= =?us-ascii?Q?ummboK3XMUnE6mdDK02/fTkmWM+p8mbxPQM5N9vjo3lvZrDfgyDDWpubjuM8?= =?us-ascii?Q?oA4DImQivFuYsNwEAKM4LTQiR5eyZXzXhrN8kq1Q3VBAG9G5fRTKgZykajaf?= =?us-ascii?Q?v9XqElAkY3ddUHe913vs+gvcblKvUEVbPBZVgEmVy5vgexO6bX/hyOV+mycV?= =?us-ascii?Q?ZlKJzr43YxavWYZw9gkEwLT7TWbARa3z5VStOu4igUlSXRojt9XoHaf9FeSo?= =?us-ascii?Q?5w=3D=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB3622.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: d27efde4-bfc7-4179-6773-08d9e5d4a322 X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Feb 2022 22:46:08.1466 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: jMO32pJo2Y8ladfJjzNcB7HK+8uMXGO27+i7FIo3qUljCX/VPi7/IWXTd+wBFPkBtcqkxT20TGzdJU6NpDRjVg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR11MB3475 Return-Path: guo.dong@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Better change to: gUefiPayloadPkgTokenSpaceGuid.PcdBootManagerEscape|$(BOOT_MANAGER_ESCAPE) for this change: +!if $(BOOT_MANAGER_ESCAPE) =3D=3D TRUE + gUefiPayloadPkgTokenSpaceGuid.PcdBootManagerEscape|TRUE +!else + gUefiPayloadPkgTokenSpaceGuid.PcdBootManagerEscape|FALSE +!endif + Thanks, Guo -----Original Message----- From: devel@edk2.groups.io On Behalf Of Sean Rhodes Sent: Monday, January 31, 2022 1:52 PM To: devel@edk2.groups.io Cc: Rhodes, Sean Subject: [edk2-devel] [PATCH 43/43] UefiPayloadPkg: Make Boot Manager Key c= onfigurable Provide a build option to use [Esc] instead of [F2] for devices such as Chr= omebooks that don't have F-keys. Signed-off-by: Sean Rhodes --- .../PlatformBootManager.c | 43 +++++++++++++------ .../PlatformBootManagerLib.inf | 1 + UefiPayloadPkg/UefiPayloadPkg.dec | 3 ++ UefiPayloadPkg/UefiPayloadPkg.dsc | 8 ++++ 4 files changed, 42 insertions(+), 13 deletions(-) diff --git a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootMana= ger.c b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c index a8ead775ea..6163e776c4 100644 --- a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c +++ b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager. +++ c @@ -164,7 +164,7 @@ PlatformBootManagerBeforeConsole ( ) { EFI_INPUT_KEY Enter;- EFI_INPUT_KEY = F2;+ EFI_INPUT_KEY CustomKey; EFI_INPUT_KEY = Down; EFI_BOOT_MANAGER_LOAD_OPTION BootOption; EFI_STATUS = Status;@@ -186,13 +186,21 @@ PlatformBootManagerBeforeConsole= ( Enter.UnicodeChar =3D CHAR_CARRIAGE_RETURN; EfiBootManagerRegisterCont= inueKeyOption (0, &Enter, NULL); - //- // Map F2 to Boot Manager Menu- /= /- F2.ScanCode =3D SCAN_F2;- F2.UnicodeChar =3D CHAR_NULL;+ if (Fixed= PcdGetBool (PcdBootManagerEscape) ) {+ //+ // Map Esc to Boot Manager= Menu+ //+ CustomKey.ScanCode =3D SCAN_ESC;+ CustomKey.Unic= odeChar =3D CHAR_NULL;+ } else {+ //+ // Map Esc to Boot Manager= Menu+ //+ CustomKey.ScanCode =3D SCAN_F2;+ CustomKey.UnicodeCh= ar =3D CHAR_NULL;+ } EfiBootManagerGetBootManagerMenu (&BootOption);- E= fiBootManagerAddKeyOptionVariable (NULL, (UINT16)BootOption.OptionNumber, 0= , &F2, NULL);+ EfiBootManagerAddKeyOptionVariable (NULL, (UINT16) BootOpti= on.OptionNumber, 0, &CustomKey, NULL); // // Also add Down key to Boot= Manager Menu since some serial terminals don't support F2 key.@@ -251,12 += 259,21 @@ PlatformBootManagerAfterConsole ( // PlatformRegisterFvBootOption (PcdGetPtr (PcdShellFile), L"UEFI Shel= l", LOAD_OPTION_ACTIVE); - Print (- L"\n"- L"F2 or Down to ente= r Boot Manager Menu.\n"- L"ENTER to boot directly.\n"- L"\n= "- );+ if (FixedPcdGetBool (PcdBootManagerEscape) ) {+ Print (+ = L"\n"+ L"Esc or Down to enter Boot Manager Menu.\n"+ L"ENTE= R to boot directly.\n"+ L"\n"+ );+ } else {+ Print = (+ L"\n"+ L"F2 or Down to enter Boot Manager Menu.\n"+ = L"ENTER to boot directly.\n"+ L"\n"+ );+ } } /**diff = --git a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLi= b.inf b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLi= b.inf index 9c4a9da943..80390e0d98 100644 --- a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.= inf +++ b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerL +++ ib.inf @@ -73,3 +73,4 @@ gEfiMdePkgTokenSpaceGuid.PcdUartDefaultParity gEfiMdePkgTokenSpaceGuid= .PcdUartDefaultStopBits gEfiMdeModulePkgTokenSpaceGuid.PcdBootManagerMenu= File+ gUefiPayloadPkgTokenSpaceGuid.PcdBootManagerEscapediff --git a/UefiP= ayloadPkg/UefiPayloadPkg.dec b/UefiPayloadPkg/UefiPayloadPkg.dec index 551f0a4915..7246c3495b 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.dec +++ b/UefiPayloadPkg/UefiPayloadPkg.dec @@ -83,6 +83,9 @@ gUefiPayloadPkgTokenSpaceGuid.PcdSystemMemoryUefiRegionSi= ze|0x04000000|UINT32|0x gUefiPayloadPkgTokenSpaceGuid.PcdPcdDriverFile|{ 0x57, 0x72, 0xcf, 0x80, = 0xab, 0x87, 0xf9, 0x47, 0xa3, 0xfe, 0xD5, 0x0B, 0x76, 0xd8, 0x95, 0x41 }|VO= ID*|0x00000018 +# Boot Manager Key+gUefiPayloadPkgTokenSpaceGuid.PcdBootMan= agerEscape|TRUE|BOOLEAN|0x00000020+ ## FFS filename to find the default var= iable initial data file. # @Prompt FFS Name of variable initial data file = gUefiPayloadPkgTokenSpaceGuid.PcdNvsDataFile |{ 0x1a, 0xf1, 0xb1, 0xae, 0x4= 2, 0xcc, 0xcf, 0x4e, 0xac, 0x60, 0xdb, 0xab, 0xf6, 0xca, 0x69, 0xe6 }|VOID*= |0x00000025diff --git a/UefiPayloadPkg/UefiPayloadPkg.dsc b/UefiPayloadPkg/= UefiPayloadPkg.dsc index 1ce96a51c1..3d7c7a6baf 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.dsc +++ b/UefiPayloadPkg/UefiPayloadPkg.dsc @@ -33,6 +33,8 @@ DEFINE UNIVERSAL_PAYLOAD =3D FALSE DEFINE SECURITY_STUB_ENA= BLE =3D TRUE DEFINE SMM_SUPPORT =3D FALSE+ DEFI= NE BOOT_MANAGER_ESCAPE =3D FALSE+ DEFINE PLATFORM_BOOT_TIMEOUT = =3D 3 # # SBL: UEFI payload for Slim Bootloader # COREBOOT:= UEFI payload for coreboot@@ -399,6 +401,12 @@ gEfiMdePkgTokenSpaceGuid.PcdPerformanceLibraryPropertyMask | 0x1 != endif +!if $(BOOT_MANAGER_ESCAPE) =3D=3D TRUE+ gUefiPayloadPkgTokenSpaceGu= id.PcdBootManagerEscape|TRUE+!else+ gUefiPayloadPkgTokenSpaceGuid.PcdBootM= anagerEscape|FALSE+!endif+ [PcdsPatchableInModule.X64] gPcAtChipsetPkgTok= enSpaceGuid.PcdRtcIndexRegister|$(RTC_INDEX_REGISTER) gPcAtChipsetPkgToke= nSpaceGuid.PcdRtcTargetRegister|$(RTC_TARGET_REGISTER)--=20 2.32.0 -=3D-=3D-=3D-=3D-=3D-=3D Groups.io Links: You receive all messages sent to this group. View/Reply Online (#86262): https://edk2.groups.io/g/devel/message/86262 Mute This Topic: https://groups.io/mt/88817968/1781375 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [guo.dong@intel.com] -=3D= -=3D-=3D-=3D-=3D-=3D