From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=2a00:1450:400c:c0c::242; helo=mail-wr0-x242.google.com; envelope-from=ard.biesheuvel@linaro.org; receiver=edk2-devel@lists.01.org Received: from mail-wr0-x242.google.com (mail-wr0-x242.google.com [IPv6:2a00:1450:400c:c0c::242]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 1852C208F79FF for ; Thu, 31 May 2018 03:46:41 -0700 (PDT) Received: by mail-wr0-x242.google.com with SMTP id d2-v6so17071773wrm.10 for ; Thu, 31 May 2018 03:46:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=+KSqZFkTSMW/A5mOk8ykue7LgQCK7Jqny1gm585IB9I=; b=UG/u4Cmy0a24o3ESQOGyVZxoyX+ZDB1oZZFLua7qfBagG9urKrS06B2l0Q+4+0Josn TcBL1Ek2pHg2A0BRT7mmFf/WvnQJAkDgiJGtMtU6beipssSpZTSpnhSeNJZLCcSoYE4Y 7qlTGPBNA8AGae47e9c5/7+QYr3xepg1y+CJQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=+KSqZFkTSMW/A5mOk8ykue7LgQCK7Jqny1gm585IB9I=; b=NAQcrcXjwXf27HDJX25zcIkERXDVR9euFBVS0QS0yQUq71neGzZzn4cI/M04Ybm2Sa FqHvNg4WHKfWkE52uED0chtNx1gGk7kOEKsceTag9t6mfDJx8JHOzec2SOR9lSBxdG3D V5BBUmpuepOUabMKh351tdW2vC2/xbpkgt/dT3K5jUzS02OY9jHEl3hFPUY6j4pNVDMU D9/KCpuC9TiwTZFPDYZYNg4A+1QyCtVNpjWVa9nx01WOd6zETDx+3BB+AMwxSWa3k96F 34mh6kLORcrk2vpq4TLKWipHTsUZGDA49QQKx3LwGt7N2C0YHpwfNY1rrxvUKja9Sx50 oVxA== X-Gm-Message-State: ALKqPwcFu8mSYR0dQU8+jGB8tm6rgl9mEDj1L5JvR9cUf9fQQmXlAH2m RD/uUmSLS8T2I5mVZfNmX5aUI71pWNA= X-Google-Smtp-Source: ADUXVKJemBuW/UFjrCA1MO3/3kZ0B2AVsR6F4zu2G1YLJ5EpUMEw9lpLWG8F0bw9DyonCH1CGVPkRA== X-Received: by 2002:adf:88b2:: with SMTP id f47-v6mr4700095wrf.55.1527763600348; Thu, 31 May 2018 03:46:40 -0700 (PDT) Received: from localhost.localdomain ([2a01:e35:3995:5470:200:1aff:fe1b:b328]) by smtp.gmail.com with ESMTPSA id 19-v6sm48393614wrz.7.2018.05.31.03.46.39 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 31 May 2018 03:46:39 -0700 (PDT) From: Ard Biesheuvel To: edk2-devel@lists.01.org Cc: leif.lindholm@linaro.org, graeme.gregory@linaro.org, Ard Biesheuvel Date: Thu, 31 May 2018 12:46:33 +0200 Message-Id: <20180531104634.23215-2-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180531104634.23215-1-ard.biesheuvel@linaro.org> References: <20180531104634.23215-1-ard.biesheuvel@linaro.org> Subject: [PATCH edk2-platforms 1/2] Platform/DeveloperBox: wire up status code reporting for DXE phase X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 May 2018 10:46:42 -0000 Wire up minimal support for status code reporting in the DXE phase, to the extent required for supporting the FPDT ACPI table, which we will enable in a subsequent patch. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ard Biesheuvel --- Platform/Socionext/DeveloperBox/DeveloperBox.dsc | 10 ++++++++++ Platform/Socionext/DeveloperBox/DeveloperBox.fdf | 1 + 2 files changed, 11 insertions(+) diff --git a/Platform/Socionext/DeveloperBox/DeveloperBox.dsc b/Platform/Socionext/DeveloperBox/DeveloperBox.dsc index 3decc22e25b1..1d501e89290d 100644 --- a/Platform/Socionext/DeveloperBox/DeveloperBox.dsc +++ b/Platform/Socionext/DeveloperBox/DeveloperBox.dsc @@ -101,6 +101,7 @@ [LibraryClasses.common] HiiLib|MdeModulePkg/Library/UefiHiiLib/UefiHiiLib.inf UefiHiiServicesLib|MdeModulePkg/Library/UefiHiiServicesLib/UefiHiiServicesLib.inf ReportStatusCodeLib|MdePkg/Library/BaseReportStatusCodeLibNull/BaseReportStatusCodeLibNull.inf + OemHookStatusCodeLib|MdeModulePkg/Library/OemHookStatusCodeLibNull/OemHookStatusCodeLibNull.inf UefiRuntimeLib|MdePkg/Library/UefiRuntimeLib/UefiRuntimeLib.inf MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf DxeServicesLib|MdePkg/Library/DxeServicesLib/DxeServicesLib.inf @@ -163,12 +164,14 @@ [LibraryClasses.common.DXE_CORE] DxeCoreEntryPoint|MdePkg/Library/DxeCoreEntryPoint/DxeCoreEntryPoint.inf ExtractGuidedSectionLib|MdePkg/Library/DxeExtractGuidedSectionLib/DxeExtractGuidedSectionLib.inf PerformanceLib|MdeModulePkg/Library/DxeCorePerformanceLib/DxeCorePerformanceLib.inf + ReportStatusCodeLib|MdeModulePkg/Library/DxeReportStatusCodeLib/DxeReportStatusCodeLib.inf [LibraryClasses.common.DXE_DRIVER] DtPlatformDtbLoaderLib|Silicon/Socionext/SynQuacer/Library/SynQuacerDtbLoaderLib/SynQuacerDtbLoaderLib.inf FdtLib|EmbeddedPkg/Library/FdtLib/FdtLib.inf SecurityManagementLib|MdeModulePkg/Library/DxeSecurityManagementLib/DxeSecurityManagementLib.inf PerformanceLib|MdeModulePkg/Library/DxePerformanceLib/DxePerformanceLib.inf + ReportStatusCodeLib|MdeModulePkg/Library/DxeReportStatusCodeLib/DxeReportStatusCodeLib.inf # # Firmware update @@ -186,6 +189,9 @@ [LibraryClasses.common.DXE_DRIVER] PciHostBridgeLib|Silicon/Socionext/SynQuacer/Library/SynQuacerPciHostBridgeLib/SynQuacerPciHostBridgeLib.inf NonDiscoverableDeviceRegistrationLib|MdeModulePkg/Library/NonDiscoverableDeviceRegistrationLib/NonDiscoverableDeviceRegistrationLib.inf +[LibraryClasses.common.UEFI_DRIVER] + ReportStatusCodeLib|MdeModulePkg/Library/DxeReportStatusCodeLib/DxeReportStatusCodeLib.inf + [LibraryClasses.common.UEFI_APPLICATION] PerformanceLib|MdeModulePkg/Library/DxePerformanceLib/DxePerformanceLib.inf HiiLib|MdeModulePkg/Library/UefiHiiLib/UefiHiiLib.inf @@ -209,6 +215,7 @@ [LibraryClasses.common.DXE_RUNTIME_DRIVER] !if $(TARGET) != RELEASE DebugLib|MdePkg/Library/DxeRuntimeDebugLibSerialPort/DxeRuntimeDebugLibSerialPort.inf !endif + ReportStatusCodeLib|MdeModulePkg/Library/RuntimeDxeReportStatusCodeLib/RuntimeDxeReportStatusCodeLib.inf ################################################################################ # @@ -330,6 +337,8 @@ [PcdsFixedAtBuild.common] # DEBUG_ERROR 0x80000000 // Error gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x8000004F + gEfiMdePkgTokenSpaceGuid.PcdReportStatusCodePropertyMask|0x7 + # # Optional feature to help prevent EFI memory map fragments # Turned on and off via: PcdPrePiProduceMemoryTypeInformationHob @@ -497,6 +506,7 @@ [Components.common] ArmPkg/Drivers/TimerDxe/TimerDxe.inf ArmPkg/Drivers/GenericWatchdogDxe/GenericWatchdogDxe.inf MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf + MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf { diff --git a/Platform/Socionext/DeveloperBox/DeveloperBox.fdf b/Platform/Socionext/DeveloperBox/DeveloperBox.fdf index c36104da3b46..b8a4a1955674 100644 --- a/Platform/Socionext/DeveloperBox/DeveloperBox.fdf +++ b/Platform/Socionext/DeveloperBox/DeveloperBox.fdf @@ -108,6 +108,7 @@ [FV.FvMain] INF ArmPkg/Drivers/TimerDxe/TimerDxe.inf INF ArmPkg/Drivers/GenericWatchdogDxe/GenericWatchdogDxe.inf INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf + INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf -- 2.17.0