From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from EUR04-VI1-obe.outbound.protection.outlook.com (EUR04-VI1-obe.outbound.protection.outlook.com [40.107.8.45]) by mx.groups.io with SMTP id smtpd.web11.7819.1585129187912260284 for ; Wed, 25 Mar 2020 02:39:48 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=w3ExvLis; spf=pass (domain: arm.com, ip: 40.107.8.45, mailfrom: krzysztof.koch@arm.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=v+f4nuh0NLUKD7f1Z8JCWoIp9MqCMq7huNpipMq5f+s=; b=w3ExvLisCT8I0V0OkWeFaM1UNKifYKqsNsTCFqDdi7T3gXuHvV10N4ajqxHAZC4dwKuK2X5EL8WgAi6DAlqGXZ+8dZKO5Ac/ph98Z/16czxBd/eLgTjahEHbN0aXJwa6DhnL3eDPRMOQr9bjbOw5sJzL7lrLpgeVYmuDr9aKJSM= Received: from VI1PR08CA0204.eurprd08.prod.outlook.com (2603:10a6:800:d2::34) by AM5PR0802MB2468.eurprd08.prod.outlook.com (2603:10a6:203:a1::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2835.22; Wed, 25 Mar 2020 09:39:45 +0000 Received: from VE1EUR03FT060.eop-EUR03.prod.protection.outlook.com (2603:10a6:800:d2:cafe::5d) by VI1PR08CA0204.outlook.office365.com (2603:10a6:800:d2::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2835.20 via Frontend Transport; Wed, 25 Mar 2020 09:39:45 +0000 Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=bestguesspass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT060.mail.protection.outlook.com (10.152.19.187) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2856.17 via Frontend Transport; Wed, 25 Mar 2020 09:39:44 +0000 Received: ("Tessian outbound 8f06d475fc37:v48"); Wed, 25 Mar 2020 09:39:44 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: f81a2940ae12d812 X-CR-MTA-TID: 64aa7808 Received: from b77a73132834.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id BDA3FE3D-8576-4079-9CE0-4DD5EB6570FC.1; Wed, 25 Mar 2020 09:39:38 +0000 Received: from EUR03-DB5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id b77a73132834.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 25 Mar 2020 09:39:38 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GyKse8WDcqiPgl47frQwGuSK8tLj2XBXvg5WJX28Yj61iPLFWbEkLS7kPHQxI3f3MsI6ZBNYcwddRPovo0Hbrey+B6mDwU5D6NYKspmrpFTcZsgb1wYe+kRHbrfJt4kXlgTtGLKDihhj5WL7OVlLrXLtZIOu2SYS5OXrcDFqKWIFcguund5Q8xSaSzUrriOycBOugAEN+n3XNOULRaTdiJ89JwbvL5cFS80bWyCQmhPtTW9vdKjw00B+XSP6p9ZxKFicN7UKUeyHMdWVJZXlDJGARAxCSDV5EwNds1ciu2PdKtVqPiOwkcXyLRg6u9Da8ExYZVUjK65pzGIr2Y8Lfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=v+f4nuh0NLUKD7f1Z8JCWoIp9MqCMq7huNpipMq5f+s=; b=NBvH/0v8oofw5c98Z4FFVDruPpHVHwYkDW2jBD2JWGR/h9zgX9omHUBn/zTb17FHfxTk4M+i2/aHWReco8VuNfA4ANwuP8PqQG9Tf+okOTS9XRaGB/Kt2gUdwlD7TCzDQ8oFcDym2BqUWbGwl4y8g3xLiia2eqRtESXO7xglwr6Ed13W6WMcOPJnGtHqDY9Va+pRf0YdsGbUD32rxyo2xN6YmPCWxTf/jrzkUhZKhuHLgSZagU6Ic425D4oqlvSZfDv5BpuVBDqv1YuMZP7YTMthl5bkZYFKqnvc2S0NV1+5ieeVdGOyt/ncUfvxkUvHrN7o227MLaUACUpkUshvvA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=bestguesspass action=none header.from=arm.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=v+f4nuh0NLUKD7f1Z8JCWoIp9MqCMq7huNpipMq5f+s=; b=w3ExvLisCT8I0V0OkWeFaM1UNKifYKqsNsTCFqDdi7T3gXuHvV10N4ajqxHAZC4dwKuK2X5EL8WgAi6DAlqGXZ+8dZKO5Ac/ph98Z/16czxBd/eLgTjahEHbN0aXJwa6DhnL3eDPRMOQr9bjbOw5sJzL7lrLpgeVYmuDr9aKJSM= Received: from AM0PR10CA0028.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:17c::38) by AM6PR08MB3798.eurprd08.prod.outlook.com (2603:10a6:20b:82::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2835.22; Wed, 25 Mar 2020 09:39:36 +0000 Received: from VE1EUR03FT055.eop-EUR03.prod.protection.outlook.com (2603:10a6:208:17c:cafe::e8) by AM0PR10CA0028.outlook.office365.com (2603:10a6:208:17c::38) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2835.20 via Frontend Transport; Wed, 25 Mar 2020 09:39:36 +0000 Authentication-Results-Original: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=bestguesspass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; Received: from nebula.arm.com (40.67.248.234) by VE1EUR03FT055.mail.protection.outlook.com (10.152.19.158) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.2856.17 via Frontend Transport; Wed, 25 Mar 2020 09:39:36 +0000 Received: from AZ-NEU-EX03.Arm.com (10.251.24.31) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1415.2; Wed, 25 Mar 2020 09:39:26 +0000 Received: from E119924.Arm.com (10.57.55.133) by mail.arm.com (10.251.24.31) with Microsoft SMTP Server id 15.1.1415.2 via Frontend Transport; Wed, 25 Mar 2020 09:39:25 +0000 From: "Krzysztof Koch" To: CC: , , , , , Subject: [PATCH v1 1/3] ShellPkg: acpiview: Add -r parameter for table requirements validation Date: Wed, 25 Mar 2020 09:39:22 +0000 Message-ID: <20200325093924.22884-2-krzysztof.koch@arm.com> X-Mailer: git-send-email 2.16.2.windows.1 In-Reply-To: <20200325093924.22884-1-krzysztof.koch@arm.com> References: <20200325093924.22884-1-krzysztof.koch@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;IPV:;CTRY:IE;EFV:NLI;SFV:NSPM;SFS:(10009020)(4636009)(346002)(136003)(39860400002)(376002)(396003)(46966005)(6916009)(6666004)(36756003)(8936002)(356004)(8676002)(81156014)(81166006)(186003)(26005)(7696005)(478600001)(2616005)(44832011)(336012)(426003)(5660300002)(4326008)(86362001)(54906003)(2906002)(316002)(47076004)(1076003)(70586007)(82740400003)(70206006);DIR:OUT;SFP:1101;SCL:1;SRVR:AM6PR08MB3798;H:nebula.arm.com;FPR:;SPF:Pass;LANG:en;PTR:InfoDomainNonexistent; X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: a7020a11-1f10-4dcf-ee90-08d7d0a07373 X-MS-TrafficTypeDiagnostic: AM6PR08MB3798:|AM5PR0802MB2468: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:2331;OLM:2331; X-Forefront-PRVS: 0353563E2B X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3798 Original-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=bestguesspass action=none header.from=arm.com; Return-Path: Krzysztof.Koch@arm.com X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT060.eop-EUR03.prod.protection.outlook.com X-Forefront-Antispam-Report: CIP:63.35.35.123;IPV:CAL;SCL:-1;CTRY:IE;EFV:NLI;SFV:NSPM;SFS:(10009020)(4636009)(396003)(39860400002)(376002)(346002)(136003)(46966005)(47076004)(336012)(316002)(54906003)(81156014)(426003)(186003)(70206006)(81166006)(8676002)(26005)(7696005)(36906005)(70586007)(8936002)(6666004)(86362001)(2906002)(82740400003)(5660300002)(36756003)(478600001)(26826003)(2616005)(4326008)(6916009)(1076003)(44832011);DIR:OUT;SFP:1101;SCL:1;SRVR:AM5PR0802MB2468;H:64aa7808-outbound-1.mta.getcheckrecipient.com;FPR:;SPF:Pass;LANG:en;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; X-MS-Office365-Filtering-Correlation-Id-Prvs: 187f9a1c-7cd5-4422-f1f6-08d7d0a06e83 X-Forefront-PRVS: 0353563E2B X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: fMLVWH1OT6A1j35S2OjFymdlu95cisZpg4U6IqIrqbEOjiMdXVaCJ9ens6A8sAk/aArYzwqYp1z+sLvbi2ihRAWoHtXf32CUObuJzzggIfNl99jl6b55Utb7bmwZ+KvMBhilPS9HckSu9yOtaUUrizP1tvY/XHHlxNFGeRgXbDpQegM22CgcK7FoWSg2SM8tpVWhXLV2vYWMkGF+2yK3L66wtdY6ZMI9j2pwsrfempX+hCOZcp9Uu/bA9Cx2bxW21atd20LvCBgKlaUT2Ohr3eCZfAI4+oHQuWaBQBZ80Sf7IzsP1YGeYc3O7fg7+iQr2tlU8FVysX10SBaOS5FbXPMigIn7wfgljcH88sZn4/96rEWuC3LotmbsV4amnqDqQsHUbsUq4kLnQ6/n6hyu45Mm9QX5dlkG4JEyP9yfq+qdVjJ3TTmnGP+gEHCwBe3tleMl6wnwmkzscj0WDXk+xFvHz+D90WX6lYNscKm6kUig/MxhKnl+bmoiADB/k0VZClbdo8OzTrvDpITnvblGsw== X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2020 09:39:44.5115 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: a7020a11-1f10-4dcf-ee90-08d7d0a07373 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0802MB2468 Content-Type: text/plain Define a new command line parameter '-r' to enable checking if all mandatory ACPI tables listed in a specification are present. The -r parameter takes an integer value to specify which specification the validation should be performed against. The parameter is used to set two Acpiview variables. An interface to access these variables is implemented in this patch. The new functionality is aimed at Arm-based platforms, however, there are no restriction on extending it to other architectures. For the 32-bit and 64-bit Arm architectures, the possible values for the -r parameter are: 0: Arm Server Base Boot Requirements 1.0, March 2016 1: Arm Server Base Boot Requirements 1.1, May 2018 2: Arm Server Base Boot Requirements 1.2, September 2019 Signed-off-by: Krzysztof Koch --- Notes: v1: - add '-r' parameter for table requirements validaiton [Krzysztof] ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.c | 82 +++++++++++++++++++- ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.h | 44 ++++++++++- ShellPkg/Library/UefiShellAcpiViewCommandLib/UefiShellAcpiViewCommandLib.uni | 14 +++- 3 files changed, 136 insertions(+), 4 deletions(-) diff --git a/ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.c b/ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.c index de0851dd5fbae51308def95bd4964f792fb9e680..49c2e87c430d7fb57793f6405ebee91cb8f6cbaa 100644 --- a/ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.c +++ b/ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.c @@ -1,6 +1,6 @@ /** @file - Copyright (c) 2016 - 2019, ARM Limited. All rights reserved. + Copyright (c) 2016 - 2020, ARM Limited. All rights reserved. SPDX-License-Identifier: BSD-2-Clause-Patent **/ @@ -27,6 +27,8 @@ STATIC UINT32 mTableCount; STATIC UINT32 mBinTableCount; STATIC BOOLEAN mConsistencyCheck; STATIC BOOLEAN mColourHighlighting; +STATIC BOOLEAN mMandatoryTableValidate; +STATIC UINTN mMandatoryTableSpec; /** An array of acpiview command line parameters. @@ -37,6 +39,7 @@ STATIC CONST SHELL_PARAM_ITEM ParamList[] = { {L"-h", TypeFlag}, {L"-l", TypeFlag}, {L"-s", TypeValue}, + {L"-r", TypeValue}, {NULL, TypeMax} }; @@ -94,6 +97,60 @@ SetConsistencyChecking ( mConsistencyCheck = ConsistencyChecking; } +/** + This function returns the ACPI table requirements validation flag. + + @retval TRUE if check for mandatory table presence should be performed. +**/ +BOOLEAN +GetMandatoryTableValidate ( + VOID + ) +{ + return mMandatoryTableValidate; +} + +/** + This function sets the ACPI table requirements validation flag. + + @param Validate Enable/Disable ACPI table requirements validation. +**/ +VOID +SetMandatoryTableValidate ( + BOOLEAN Validate + ) +{ + mMandatoryTableValidate = Validate; +} + +/** + This function returns the identifier of specification to validate ACPI table + requirements against. + + @return ID of specification listing mandatory tables. +**/ +UINTN +GetMandatoryTableSpec ( + VOID + ) +{ + return mMandatoryTableSpec; +} + +/** + This function sets the identifier of specification to validate ACPI table + requirements against. + + @param Spec ID of specification listing mandatory tables. +**/ +VOID +SetMandatoryTableSpec ( + UINTN Spec + ) +{ + mMandatoryTableSpec = Spec; +} + /** This function returns the report options. @@ -470,6 +527,7 @@ ShellCommandRunAcpiView ( LIST_ENTRY* Package; CHAR16* ProblemParam; SHELL_FILE_HANDLE TmpDumpFileHandle; + CONST CHAR16* MandatoryTableSpecStr; // Set Defaults mReportType = ReportAll; @@ -479,6 +537,8 @@ ShellCommandRunAcpiView ( mSelectedAcpiTableName = NULL; mSelectedAcpiTableFound = FALSE; mConsistencyCheck = TRUE; + mMandatoryTableValidate = FALSE; + mMandatoryTableSpec = 0; ShellStatus = SHELL_SUCCESS; Package = NULL; @@ -537,6 +597,18 @@ ShellCommandRunAcpiView ( L"-s" ); ShellStatus = SHELL_INVALID_PARAMETER; + } else if (ShellCommandLineGetFlag (Package, L"-r") && + ShellCommandLineGetValue (Package, L"-r") == NULL) { + ShellPrintHiiEx ( + -1, + -1, + NULL, + STRING_TOKEN (STR_GEN_NO_VALUE), + gShellAcpiViewHiiHandle, + L"acpiview", + L"-r" + ); + ShellStatus = SHELL_INVALID_PARAMETER; } else if ((ShellCommandLineGetFlag (Package, L"-s") && ShellCommandLineGetFlag (Package, L"-l"))) { ShellPrintHiiEx ( @@ -568,6 +640,14 @@ ShellCommandRunAcpiView ( // Surpress consistency checking if requested SetConsistencyChecking (!ShellCommandLineGetFlag (Package, L"-q")); + // Evaluate the parameters for mandatory ACPI table presence checks + SetMandatoryTableValidate (ShellCommandLineGetFlag (Package, L"-r")); + MandatoryTableSpecStr = ShellCommandLineGetValue (Package, L"-r"); + + if (MandatoryTableSpecStr != NULL) { + SetMandatoryTableSpec (ShellHexStrToUintn (MandatoryTableSpecStr)); + } + if (ShellCommandLineGetFlag (Package, L"-l")) { mReportType = ReportTableList; } else { diff --git a/ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.h b/ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.h index b5cb274ecbf77f7ccb81d78f852caa0f50854312..be65564c86a67a03e71b11f3b2ecde7a21016736 100644 --- a/ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.h +++ b/ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.h @@ -1,7 +1,7 @@ /** @file Header file for AcpiView - Copyright (c) 2016 - 2019, ARM Limited. All rights reserved. + Copyright (c) 2016 - 2020, ARM Limited. All rights reserved. SPDX-License-Identifier: BSD-2-Clause-Patent **/ @@ -112,6 +112,48 @@ SetConsistencyChecking ( BOOLEAN ConsistencyChecking ); +/** + This function returns the ACPI table requirements validation flag. + + @retval TRUE if check for mandatory table presence should be performed. +**/ +BOOLEAN +GetMandatoryTableValidate ( + VOID + ); + +/** + This function sets the ACPI table requirements validation flag. + + @param Validate Enable/Disable ACPI table requirements validation. +**/ +VOID +SetMandatoryTableValidate ( + BOOLEAN Validate + ); + +/** + This function returns the identifier of specification to validate ACPI table + requirements against. + + @return ID of specification listing mandatory tables. +**/ +UINTN +GetMandatoryTableSpec ( + VOID + ); + +/** + This function sets the identifier of specification to validate ACPI table + requirements against. + + @param Spec ID of specification listing mandatory tables. +**/ +VOID +SetMandatoryTableSpec ( + UINTN Spec + ); + /** This function processes the table reporting options for the ACPI table. diff --git a/ShellPkg/Library/UefiShellAcpiViewCommandLib/UefiShellAcpiViewCommandLib.uni b/ShellPkg/Library/UefiShellAcpiViewCommandLib/UefiShellAcpiViewCommandLib.uni index 1f07b7ae20d474be67a433ff3774a508a5289318..7cd43d0518fd0a23dc547a5cab0d08b62602a113 100644 --- a/ShellPkg/Library/UefiShellAcpiViewCommandLib/UefiShellAcpiViewCommandLib.uni +++ b/ShellPkg/Library/UefiShellAcpiViewCommandLib/UefiShellAcpiViewCommandLib.uni @@ -1,6 +1,6 @@ // /** // -// Copyright (c) 2016 - 2019, ARM Limited. All rights reserved.
+// Copyright (c) 2016 - 2020, ARM Limited. All rights reserved.
// SPDX-License-Identifier: BSD-2-Clause-Patent // // Module Name: @@ -30,7 +30,7 @@ "Display ACPI Table information.\r\n" ".SH SYNOPSIS\r\n" " \r\n" -"ACPIVIEW [[-?] | [[-l] | [-s AcpiTable [-d]]] [-q] [-h]]\r\n" +"ACPIVIEW [[-?] | [[[[-l] | [-s AcpiTable [-d]]] [-q] [-h]] [-r Spec]]]\r\n" " \r\n" ".SH OPTIONS\r\n" " \r\n" @@ -41,6 +41,12 @@ " -d - Generate a binary file dump of the specified AcpiTable.\r\n" " -q - Quiet. Suppress errors and warnings. Disables consistency checks.\r\n" " -h - Enable colour highlighting.\r\n" +" -r - Validate that all required ACPI tables are installed\r\n" +" Spec : Specification to validate against.\r\n" +" For Arm, the possible values are:\r\n" +" 0 - Server Base Boot Requirements v1.0\r\n" +" 1 - Server Base Boot Requirements v1.1\r\n" +" 2 - Server Base Boot Requirements v1.2\r\n" " -? - Show help.\r\n" " \r\n" ".SH DESCRIPTION\r\n" @@ -118,6 +124,10 @@ " * To display contents of all ACPI tables:\r\n" " fs0:\> acpiview\r\n" " \r\n" +" * To check if all Server Base Boot Requirements (SBBR) v1.2 mandatory\r\n" +" ACPI tables are installed (Arm only):\r\n" +" fs0:\> acpiview -r 2\r\n" +" \r\n" ".SH RETURNVALUES\r\n" " \r\n" "RETURN VALUES:\r\n" -- 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)'