From nobody Mon Feb 9 00:37:31 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of groups.io designates 66.175.222.12 as permitted sender) client-ip=66.175.222.12; envelope-from=bounce+27952+43070+1787277+3901457@groups.io; helo=web01.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zoho.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+43070+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=intel.com ARC-Seal: i=1; a=rsa-sha256; t=1561949770; cv=none; d=zoho.com; s=zohoarc; b=XPH7GJ4jURc36yCq3HDxWoGcxKUFu4W0CnaO4m55v4wUgRP1cEfJ3Mg1/7KClOgq/rHbBjsHLWcYCiDVopIAeCrSg/Pup0UYBTackkiuLuBvqusPyvoglRQh1//xcdjRAtwTZGmSQXxo8hG0uXGioVpJMVQ357LuNVozGqpKLxg= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1561949770; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Id:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To:ARC-Authentication-Results; bh=6g4eA+0kF48csxHDVcfP7aIFQpZYY3cMo+xyTxLQOMY=; b=hn69fCIJgkOzF/9ndesr/abJGF4U3fGmFQuJUo53CbkrRj0Cw3QRqDUCw3wv/fFT6JuSKRnp9CCGq2ix3vQTu/R4s63J2DRMy47PeyrgSYeOB5fNhPrJ7OlIGJIYQA5017NQkslcVNA/vriXwtOCuafXEOkLUerKZtgD5fnbXXA= ARC-Authentication-Results: i=1; mx.zoho.com; dkim=pass; spf=pass (zoho.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+43070+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) header.from= Received: from web01.groups.io (web01.groups.io [66.175.222.12]) by mx.zohomail.com with SMTPS id 156194977033919.3416288218167; Sun, 30 Jun 2019 19:56:10 -0700 (PDT) Return-Path: X-Received: from mga18.intel.com (mga18.intel.com []) by groups.io with SMTP; Sun, 30 Jun 2019 19:56:09 -0700 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False X-Received: from orsmga005.jf.intel.com ([10.7.209.41]) by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 30 Jun 2019 19:56:08 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.63,437,1557212400"; d="scan'208";a="338480245" X-Received: from mdkinney-mobl2.amr.corp.intel.com ([10.251.143.61]) by orsmga005.jf.intel.com with ESMTP; 30 Jun 2019 19:56:07 -0700 From: "Michael D Kinney" To: devel@edk2.groups.io Cc: Zailiang Sun , Yi Qian Subject: [edk2-devel] [edk2-platforms Patch 11/14] Vlv2TbltDevicePkg: Update boot mode/state behaviors Date: Sun, 30 Jun 2019 19:55:50 -0700 Message-Id: <20190701025553.18596-12-michael.d.kinney@intel.com> In-Reply-To: <20190701025553.18596-1-michael.d.kinney@intel.com> References: <20190701025553.18596-1-michael.d.kinney@intel.com> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,michael.d.kinney@intel.com Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1561949769; bh=tRDvc0okZged8z5B8fjDnu+qzqy7Hy5qXlpvcStqjwg=; h=Cc:Date:From:Reply-To:Subject:To; b=dC0pyEz5xkyxmH+pLFuNI4LAbqig1Gvst1N32NqaCT9W/tGcYKOdNfk4fB7cOIAeZTG x47N7bdAhpGXRbGsGUKzKcPF1a9lOe8xJXDH7e10l2r9HnzD9yrHfffaa7nOlAdk4VH69 9i/x8ZWUbTpTmXCh9XOcYAx2IMBwxugH/gE= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Type: text/plain; charset="utf-8" * Add platform specific PcdBootState PCD to remove Intel Framework dependency * Set PcdUserPhysicalPresence to TRUE to Enable UEFI Secure Boot Setup Menus * Remove unused code when NOCS_S3_SUPPORT is not set * Update PlatformBootManagerLib to not perform a connect all when FastBoot is enabled. * Add support for BOOT_ON_FLASH_UPDATE * Remove logic in CheckSystemConfigSave() that was generating an ASSERT() when setup changes were saved. Cc: Zailiang Sun Cc: Yi Qian Signed-off-by: Michael D Kinney --- .../DxePlatformBootManagerLib/BdsPlatform.c | 33 ++++++- .../DxePlatformBootManagerLib.inf | 4 +- .../PlatformDxe/PlatformDxe.inf | 1 - .../Vlv2TbltDevicePkg/PlatformPei/BootMode.c | 99 +------------------ .../Vlv2TbltDevicePkg/PlatformPei/Platform.c | 8 -- .../Vlv2TbltDevicePkg/PlatformPei/Platform.h | 27 +---- .../Intel/Vlv2TbltDevicePkg/PlatformPkg.dec | 8 ++ .../Vlv2TbltDevicePkg/PlatformPkgGccX64.dsc | 2 + .../Vlv2TbltDevicePkg/PlatformPkgIA32.dsc | 2 + .../Vlv2TbltDevicePkg/PlatformPkgX64.dsc | 2 + .../PlatformSetupDxe/PlatformSetupDxe.inf | 1 - .../PlatformSetupDxe/SetupInfoRecords.c | 51 ---------- 12 files changed, 51 insertions(+), 187 deletions(-) diff --git a/Platform/Intel/Vlv2TbltDevicePkg/Library/DxePlatformBootManage= rLib/BdsPlatform.c b/Platform/Intel/Vlv2TbltDevicePkg/Library/DxePlatformBo= otManagerLib/BdsPlatform.c index 4dd3827a6e..7fbbf281c6 100644 --- a/Platform/Intel/Vlv2TbltDevicePkg/Library/DxePlatformBootManagerLib/Bd= sPlatform.c +++ b/Platform/Intel/Vlv2TbltDevicePkg/Library/DxePlatformBootManagerLib/Bd= sPlatform.c @@ -1,7 +1,7 @@ /** @file This file include all platform action which can be customized by IBV/OEM. =20 -Copyright (c) 2017, Intel Corporation. All rights reserved.
+Copyright (c) 2017 - 2019, Intel Corporation. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ @@ -1164,7 +1164,7 @@ PlatformBootManagerBeforeConsole ( // Fill ConIn/ConOut in Full Configuration boot mode // gBootMode =3D GetBootModeHob(); - DEBUG ((DEBUG_INFO, "PlatformBootManagerInit - %x\n", gBootMode)); + DEBUG ((DEBUG_INFO, "PlatformBootManagerBeforeConsole: BootMode =3D %x\n= ", gBootMode)); =20 if (gBootMode =3D=3D BOOT_WITH_FULL_CONFIGURATION || gBootMode =3D=3D BOOT_WITH_DEFAULT_SETTINGS || @@ -1263,7 +1263,18 @@ ConnectSequence ( IN EFI_BOOT_MODE BootMode ) { - EfiBootManagerConnectAll (); + switch (BootMode) { + case BOOT_ASSUMING_NO_CONFIGURATION_CHANGES: + case BOOT_WITH_MINIMAL_CONFIGURATION: + case BOOT_ON_S4_RESUME: + break; + case BOOT_WITH_FULL_CONFIGURATION: + case BOOT_WITH_FULL_CONFIGURATION_PLUS_DIAGNOSTICS: + case BOOT_WITH_DEFAULT_SETTINGS: + default: + EfiBootManagerConnectAll (); + break; + } } =20 /** @@ -1311,6 +1322,7 @@ PlatformBootManagerAfterConsole ( VOID ) { + EFI_STATUS Status; EFI_BOOT_MODE LocalBootMode; =20 DEBUG ((DEBUG_INFO, "PlatformBootManagerAfterConsole\n")); @@ -1319,7 +1331,7 @@ PlatformBootManagerAfterConsole ( // Get current Boot Mode // LocalBootMode =3D gBootMode; - DEBUG ((DEBUG_INFO, "Current local bootmode - %x\n", LocalBootMode)); + DEBUG ((DEBUG_INFO, "PlatformBootManagerAfterConsole: BootMode =3D %x\n"= , gBootMode)); =20 // // Logo show @@ -1372,6 +1384,19 @@ PlatformBootManagerAfterConsole ( break; } =20 + // + // Use a DynamicHii type pcd to save the boot status, which is used to + // control configuration mode, such as FULL/MINIMAL/NO_CHANGES configura= tion. + // + DEBUG ((DEBUG_INFO, "PcdBootState =3D %d\n", PcdGetBool(PcdBootState))); + if (PcdGetBool(PcdBootState)) { + Status =3D PcdSetBoolS(PcdBootState, FALSE); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "Set PcdBootState to FALSE failed.\n")); + } + DEBUG ((DEBUG_INFO, "PcdBootState =3D %d\n", PcdGetBool(PcdBootState))= ); + } + Print (L"Press F7 for BootMenu!\n"); =20 EfiBootManagerRefreshAllBootOption (); diff --git a/Platform/Intel/Vlv2TbltDevicePkg/Library/DxePlatformBootManage= rLib/DxePlatformBootManagerLib.inf b/Platform/Intel/Vlv2TbltDevicePkg/Libra= ry/DxePlatformBootManagerLib/DxePlatformBootManagerLib.inf index b04169ad33..0579a18660 100644 --- a/Platform/Intel/Vlv2TbltDevicePkg/Library/DxePlatformBootManagerLib/Dx= ePlatformBootManagerLib.inf +++ b/Platform/Intel/Vlv2TbltDevicePkg/Library/DxePlatformBootManagerLib/Dx= ePlatformBootManagerLib.inf @@ -1,7 +1,7 @@ ### @file # Component name for module DxePlatformBootManagerLib # -# Copyright (c) 2017, Intel Corporation. All rights reserved.
+# Copyright (c) 2017 - 2019, Intel Corporation. All rights reserved.
# # SPDX-License-Identifier: BSD-2-Clause-Patent # @@ -48,6 +48,7 @@ [Packages] MdeModulePkg/MdeModulePkg.dec SecurityPkg/SecurityPkg.dec MinPlatformPkg/MinPlatformPkg.dec + Vlv2TbltDevicePkg/PlatformPkg.dec =20 [Pcd] gMinPlatformPkgTokenSpaceGuid.PcdTpm2Enable ## CONSUM= ES @@ -66,6 +67,7 @@ [Pcd] gMinPlatformPkgTokenSpaceGuid.PcdTrustedConsoleInputDevicePath ## CONSU= MES gMinPlatformPkgTokenSpaceGuid.PcdTrustedConsoleOutputDevicePath ## CONSU= MES gMinPlatformPkgTokenSpaceGuid.PcdTrustedStorageDevicePath ## CONSU= MES + gPlatformModuleTokenSpaceGuid.PcdBootState =20 [Sources] BdsPlatform.c diff --git a/Platform/Intel/Vlv2TbltDevicePkg/PlatformDxe/PlatformDxe.inf b= /Platform/Intel/Vlv2TbltDevicePkg/PlatformDxe/PlatformDxe.inf index a9ef744ef7..9fee691365 100644 --- a/Platform/Intel/Vlv2TbltDevicePkg/PlatformDxe/PlatformDxe.inf +++ b/Platform/Intel/Vlv2TbltDevicePkg/PlatformDxe/PlatformDxe.inf @@ -84,7 +84,6 @@ [Guids] gEfiGlobalVariableGuid gEfiEventExitBootServicesGuid gEfiVlv2VariableGuid - gEfiSecureBootEnableDisableGuid gEfiEndOfDxeEventGroupGuid =20 [Protocols] diff --git a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPei/BootMode.c b/Plat= form/Intel/Vlv2TbltDevicePkg/PlatformPei/BootMode.c index 9fdcb620a3..5269b1ed39 100644 --- a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPei/BootMode.c +++ b/Platform/Intel/Vlv2TbltDevicePkg/PlatformPei/BootMode.c @@ -1,11 +1,9 @@ /** @file =20 - Copyright (c) 2004 - 2018, Intel Corporation. All rights reserved.
- = =20 + Copyright (c) 2004 - 2019, Intel Corporation. All rights reserved.
+ SPDX-License-Identifier: BSD-2-Clause-Patent =20 - = =20 - Module Name: =20 =20 @@ -84,6 +82,7 @@ CapsulePpiNotifyCallback ( if (Status =3D=3D EFI_SUCCESS) { if (Capsule->CheckCapsuleUpdate ((EFI_PEI_SERVICES**)PeiServices) = =3D=3D EFI_SUCCESS) { BootMode =3D BOOT_ON_FLASH_UPDATE; + DEBUG ((EFI_D_ERROR, "Setting BootMode to BOOT_ON_FLASH_UPDATE\n")= ); Status =3D (*PeiServices)->SetBootMode((const EFI_PEI_SERVICES **)= PeiServices, BootMode); ASSERT_EFI_ERROR (Status); } @@ -93,98 +92,6 @@ CapsulePpiNotifyCallback ( return Status; } =20 -#ifdef NOCS_S3_SUPPORT -EFI_STATUS -UpdateBootMode ( - IN CONST EFI_PEI_SERVICES **PeiServices - ) -{ - EFI_STATUS Status; - EFI_BOOT_MODE BootMode; - UINT16 SleepType; - CHAR16 *strBootMode; - - Status =3D (*PeiServices)->GetBootMode(PeiServices, &BootMode); - ASSERT_EFI_ERROR (Status); - if (BootMode =3D=3D BOOT_IN_RECOVERY_MODE){ - return Status; - } - - // - // Let's assume things are OK if not told otherwise - // - BootMode =3D BOOT_WITH_FULL_CONFIGURATION; - - if (GetSleepTypeAfterWakeup (PeiServices, &SleepType)) { - switch (SleepType) { - case V_PCH_ACPI_PM1_CNT_S3: - BootMode =3D BOOT_ON_S3_RESUME; - Status =3D (*PeiServices)->NotifyPpi (PeiServices, &mCapsuleNotify= List[0]); - ASSERT_EFI_ERROR (Status); - break; - - case V_PCH_ACPI_PM1_CNT_S4: - BootMode =3D BOOT_ON_S4_RESUME; - break; - - case V_PCH_ACPI_PM1_CNT_S5: - BootMode =3D BOOT_ON_S5_RESUME; - break; - } // switch (SleepType) - } - - if (IsFastBootEnabled (PeiServices)) { - DEBUG ((EFI_D_INFO, "Prioritizing Boot mode to BOOT_WITH_MINIMAL_CONFI= GURATION\n")); - PrioritizeBootMode (&BootMode, BOOT_WITH_MINIMAL_CONFIGURATION); - } - - switch (BootMode) { - case BOOT_WITH_FULL_CONFIGURATION: - strBootMode =3D L"BOOT_WITH_FULL_CONFIGURATION"; - break; - case BOOT_WITH_MINIMAL_CONFIGURATION: - strBootMode =3D L"BOOT_WITH_MINIMAL_CONFIGURATION"; - break; - case BOOT_ASSUMING_NO_CONFIGURATION_CHANGES: - strBootMode =3D L"BOOT_ASSUMING_NO_CONFIGURATION_CHANGES"; - break; - case BOOT_WITH_FULL_CONFIGURATION_PLUS_DIAGNOSTICS: - strBootMode =3D L"BOOT_WITH_FULL_CONFIGURATION_PLUS_DIAGNOSTICS"; - break; - case BOOT_WITH_DEFAULT_SETTINGS: - strBootMode =3D L"BOOT_WITH_DEFAULT_SETTINGS"; - break; - case BOOT_ON_S4_RESUME: - strBootMode =3D L"BOOT_ON_S4_RESUME"; - break; - case BOOT_ON_S5_RESUME: - strBootMode =3D L"BOOT_ON_S5_RESUME"; - break; - case BOOT_ON_S2_RESUME: - strBootMode =3D L"BOOT_ON_S2_RESUME"; - break; - case BOOT_ON_S3_RESUME: - strBootMode =3D L"BOOT_ON_S3_RESUME"; - - break; - case BOOT_ON_FLASH_UPDATE: - strBootMode =3D L"BOOT_ON_FLASH_UPDATE"; - break; - case BOOT_IN_RECOVERY_MODE: - strBootMode =3D L"BOOT_IN_RECOVERY_MODE"; - break; - default: - strBootMode =3D L"Unknown boot mode"; - } // switch (BootMode) - - DEBUG ((EFI_D_ERROR, "Setting BootMode to %s\n", strBootMode)); - Status =3D (*PeiServices)->SetBootMode(PeiServices, BootMode); - ASSERT_EFI_ERROR (Status); - - return Status; -} -#endif - /** Get sleep type after wakeup =20 diff --git a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPei/Platform.c b/Plat= form/Intel/Vlv2TbltDevicePkg/PlatformPei/Platform.c index aa03f6ea95..90998871dc 100644 --- a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPei/Platform.c +++ b/Platform/Intel/Vlv2TbltDevicePkg/PlatformPei/Platform.c @@ -813,14 +813,6 @@ PeiInitPlatform ( sizeof (EFI_PLATFORM_INFO_HOB) ); =20 - // - // Set the new boot mode for MRC - // -#ifdef NOCS_S3_SUPPORT - Status =3D UpdateBootMode (PeiServices); - ASSERT_EFI_ERROR (Status); -#endif - DEBUG((EFI_D_INFO, "Setup MMIO size ... \n\n")); =20 // diff --git a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPei/Platform.h b/Plat= form/Intel/Vlv2TbltDevicePkg/PlatformPei/Platform.h index e1817b28c6..4f71e519e0 100644 --- a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPei/Platform.h +++ b/Platform/Intel/Vlv2TbltDevicePkg/PlatformPei/Platform.h @@ -1,12 +1,9 @@ /*++ =20 - Copyright (c) 2004 - 2014, Intel Corporation. All rights reserved.
- = =20 + Copyright (c) 2004 - 2019, Intel Corporation. All rights reserved.
+ SPDX-License-Identifier: BSD-2-Clause-Patent =20 - = =20 - - **/ =20 =20 @@ -24,26 +21,6 @@ typedef struct { =20 #define STALL_PEIM_FROM_THIS(a) CR (a, STALL_CALLBACK_STATE_INFORMATION, S= tallNotify, STALL_PEIM_SIGNATURE) =20 -#ifdef NOCS_S3_SUPPORT - -/** - Peform the boot mode determination logic - If the box is closed, then - 1. If it's first time to boot, it's boot with full config . - 2. If the ChassisIntrution is selected, force to be a boot with full con= fig - 3. Otherwise it's boot with no change. - - @param PeiServices General purpose services available to every PEIM. - @param BootMode The detected boot mode. - - @retval EFI_SUCCESS if the boot mode could be set -**/ -EFI_STATUS -UpdateBootMode ( - IN CONST EFI_PEI_SERVICES **PeiServices - ); -#endif - /** This function reset the entire platform, including all processor and dev= ices, and reboots the system. diff --git a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkg.dec b/Platform/In= tel/Vlv2TbltDevicePkg/PlatformPkg.dec index 5b255f4b05..a5c7062cbb 100644 --- a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkg.dec +++ b/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkg.dec @@ -161,6 +161,14 @@ [PcdsDynamic,PcdsDynamicEx] gPlatformModuleTokenSpaceGuid.PcdInConfigMode|FALSE|BOOLEAN|0x80000001 gPlatformModuleTokenSpaceGuid.PcdConnectUSBKeyboardonWaitForKeyStroke|FA= LSE|BOOLEAN|0x80000002 gPlatformModuleTokenSpaceGuid.PcdEnableWatchdogSwSmiInputValue|0|UINT8|0= x80000003 + + ## Indicates if the machine has completed one boot cycle before. + # After the complete boot, BootState will be set to FALSE.

+ # TRUE - The complete boot cycle has not happened before.
+ # FALSE - The complete boot cycle has happened before.
+ # @Prompt Boot State Flag + gPlatformModuleTokenSpaceGuid.PcdBootState|TRUE|BOOLEAN|0x80000004 + # #device firmware update support # diff --git a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgGccX64.dsc b/Platf= orm/Intel/Vlv2TbltDevicePkg/PlatformPkgGccX64.dsc index e4c6750c70..2123745ccd 100644 --- a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgGccX64.dsc +++ b/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgGccX64.dsc @@ -680,6 +680,7 @@ [PcdsPatchableInModule.common] [PcdsDynamicHii.common.DEFAULT] gEfiMdePkgTokenSpaceGuid.PcdPlatformBootTimeOut|L"Timeout"|gEfiGlobalVar= iableGuid|0x0|5 # Variable: L"Timeout" gEfiMdePkgTokenSpaceGuid.PcdHardwareErrorRecordLevel|L"HwErrRecSupport"|= gEfiGlobalVariableGuid|0x0|1 # Variable: L"HwErrRecSupport" + gPlatformModuleTokenSpaceGuid.PcdBootState|L"BootState"|gPlatformModuleT= okenSpaceGuid|0x0|TRUE =20 [PcdsDynamicDefault.common.DEFAULT] gEfiMdeModulePkgTokenSpaceGuid.PcdS3BootScriptTablePrivateDataPtr|0x0 @@ -733,6 +734,7 @@ [PcdsDynamicExDefault.common.DEFAULT] gEfiVLVTokenSpaceGuid.PcdCpuLockBoxDataAddress|0 gEfiVLVTokenSpaceGuid.PcdCpuSmramCpuDataAddress|0 gEfiVLVTokenSpaceGuid.PcdCpuLockBoxSize|0 + gEfiSecurityPkgTokenSpaceGuid.PcdUserPhysicalPresence|TRUE =20 [PcdsDynamicExDefault.X64.DEFAULT] !if $(RECOVERY_ENABLE) diff --git a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc b/Platfor= m/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc index f5795e5ab0..086668d570 100644 --- a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc +++ b/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgIA32.dsc @@ -677,6 +677,7 @@ [PcdsPatchableInModule.common] [PcdsDynamicHii.common.DEFAULT] gEfiMdePkgTokenSpaceGuid.PcdPlatformBootTimeOut|L"Timeout"|gEfiGlobalVar= iableGuid|0x0|5 # Variable: L"Timeout" gEfiMdePkgTokenSpaceGuid.PcdHardwareErrorRecordLevel|L"HwErrRecSupport"|= gEfiGlobalVariableGuid|0x0|1 # Variable: L"HwErrRecSupport" + gPlatformModuleTokenSpaceGuid.PcdBootState|L"BootState"|gPlatformModuleT= okenSpaceGuid|0x0|TRUE =20 [PcdsDynamicDefault.common.DEFAULT] gEfiMdeModulePkgTokenSpaceGuid.PcdS3BootScriptTablePrivateDataPtr|0x0 @@ -730,6 +731,7 @@ [PcdsDynamicExDefault.common.DEFAULT] gEfiVLVTokenSpaceGuid.PcdCpuLockBoxDataAddress|0 gEfiVLVTokenSpaceGuid.PcdCpuSmramCpuDataAddress|0 gEfiVLVTokenSpaceGuid.PcdCpuLockBoxSize|0 + gEfiSecurityPkgTokenSpaceGuid.PcdUserPhysicalPresence|TRUE =20 [PcdsDynamicExDefault.X64.DEFAULT] !if $(RECOVERY_ENABLE) diff --git a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc b/Platform= /Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc index a930a85a35..5f2dd65ec8 100644 --- a/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc +++ b/Platform/Intel/Vlv2TbltDevicePkg/PlatformPkgX64.dsc @@ -679,6 +679,7 @@ [PcdsPatchableInModule.common] [PcdsDynamicHii.common.DEFAULT] gEfiMdePkgTokenSpaceGuid.PcdPlatformBootTimeOut|L"Timeout"|gEfiGlobalVar= iableGuid|0x0|5 # Variable: L"Timeout" gEfiMdePkgTokenSpaceGuid.PcdHardwareErrorRecordLevel|L"HwErrRecSupport"|= gEfiGlobalVariableGuid|0x0|1 # Variable: L"HwErrRecSupport" + gPlatformModuleTokenSpaceGuid.PcdBootState|L"BootState"|gPlatformModuleT= okenSpaceGuid|0x0|TRUE =20 [PcdsDynamicDefault.common.DEFAULT] gEfiMdeModulePkgTokenSpaceGuid.PcdS3BootScriptTablePrivateDataPtr|0x0 @@ -732,6 +733,7 @@ [PcdsDynamicExDefault.common.DEFAULT] gEfiVLVTokenSpaceGuid.PcdCpuLockBoxDataAddress|0 gEfiVLVTokenSpaceGuid.PcdCpuSmramCpuDataAddress|0 gEfiVLVTokenSpaceGuid.PcdCpuLockBoxSize|0 + gEfiSecurityPkgTokenSpaceGuid.PcdUserPhysicalPresence|TRUE =20 [PcdsDynamicExDefault.X64.DEFAULT] !if $(RECOVERY_ENABLE) diff --git a/Platform/Intel/Vlv2TbltDevicePkg/PlatformSetupDxe/PlatformSetu= pDxe.inf b/Platform/Intel/Vlv2TbltDevicePkg/PlatformSetupDxe/PlatformSetupD= xe.inf index b745574421..85e8b1e8d6 100644 --- a/Platform/Intel/Vlv2TbltDevicePkg/PlatformSetupDxe/PlatformSetupDxe.inf +++ b/Platform/Intel/Vlv2TbltDevicePkg/PlatformSetupDxe/PlatformSetupDxe.inf @@ -93,7 +93,6 @@ [Guids] gEfiIfrTianoGuid ## CONSUMES ## Guid gEfiPlatformInfoGuid gEfiNormalSetupGuid - gEfiSecureBootEnableDisableGuid gOsSelectionVariableGuid gEfiGlobalVariableGuid =20 diff --git a/Platform/Intel/Vlv2TbltDevicePkg/PlatformSetupDxe/SetupInfoRec= ords.c b/Platform/Intel/Vlv2TbltDevicePkg/PlatformSetupDxe/SetupInfoRecords= .c index efd4a723e1..be99356d0f 100644 --- a/Platform/Intel/Vlv2TbltDevicePkg/PlatformSetupDxe/SetupInfoRecords.c +++ b/Platform/Intel/Vlv2TbltDevicePkg/PlatformSetupDxe/SetupInfoRecords.c @@ -1448,60 +1448,9 @@ CheckSystemConfigLoad(SYSTEM_CONFIGURATION *SystemCo= nfigPtr) } } =20 - -// -// "SecureBootEnable" variable for the Secure boot feature enable/disable. -// -#define EFI_SECURE_BOOT_ENABLE_NAME L"SecureBootEnable" -extern EFI_GUID gEfiSecureBootEnableDisableGuid; - - VOID CheckSystemConfigSave(SYSTEM_CONFIGURATION *SystemConfigPtr) { - EFI_STATUS Status; - UINT8 SecureBootCfg; - BOOLEAN SecureBootNotFound; - UINTN DataSize; - - - // - // Secure Boot configuration changes - // - DataSize =3D sizeof(SecureBootCfg); - SecureBootNotFound =3D FALSE; - Status =3D gRT->GetVariable ( - EFI_SECURE_BOOT_ENABLE_NAME, - &gEfiSecureBootEnableDisableGuid, - NULL, - &DataSize, - &SecureBootCfg - ); - - if (EFI_ERROR(Status)) { - SecureBootNotFound =3D TRUE; - } - if (SecureBootNotFound) { - Status =3D gRT->GetVariable ( - EFI_SECURE_BOOT_ENABLE_NAME, - &gEfiSecureBootEnableDisableGuid, - NULL, - &DataSize, - &SecureBootCfg - ); - ASSERT_EFI_ERROR(Status); - } - if ((SecureBootCfg) !=3D SystemConfigPtr->SecureBoot) { - SecureBootCfg =3D !SecureBootCfg; - Status =3D gRT->SetVariable ( - EFI_SECURE_BOOT_ENABLE_NAME, - &gEfiSecureBootEnableDisableGuid, - EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE= _ACCESS, - sizeof (UINT8), - &SecureBootCfg - ); - } - } =20 VOID --=20 2.21.0.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#43070): https://edk2.groups.io/g/devel/message/43070 Mute This Topic: https://groups.io/mt/32267626/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-