From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from EUR01-VE1-obe.outbound.protection.outlook.com (EUR01-VE1-obe.outbound.protection.outlook.com [40.107.14.59]) by mx.groups.io with SMTP id smtpd.web10.1338.1590085020213899390 for ; Thu, 21 May 2020 11:17:00 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=G9cVUlCk; spf=pass (domain: arm.com, ip: 40.107.14.59, mailfrom: tomas.pilar@arm.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FRvvrbiW0rzlA7q6LA4wtQshomA+Rh/HHkRL0fDcnfs=; b=G9cVUlCkdxZhZzXNlN5JaYGFdZx6JL6F7CNRUSPHLla5HsPprjZKUnRDhojczUXcF/naPq/PCVqYPgx6n+m+dze5teTGF3pkTt7IfHEB/DEbnET/4L19kHMb66XZuqoQa1IwaJHbba64pukjap76IZfKIYFacZEz1geYqj/IZmU= Received: from AM4PR0501CA0047.eurprd05.prod.outlook.com (2603:10a6:200:68::15) by VI1PR0801MB1679.eurprd08.prod.outlook.com (2603:10a6:800:59::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3021.23; Thu, 21 May 2020 18:16:57 +0000 Received: from AM5EUR03FT054.eop-EUR03.prod.protection.outlook.com (2603:10a6:200:68:cafe::75) by AM4PR0501CA0047.outlook.office365.com (2603:10a6:200:68::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3021.23 via Frontend Transport; Thu, 21 May 2020 18:16:57 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=bestguesspass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT054.mail.protection.outlook.com (10.152.16.212) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3021.23 via Frontend Transport; Thu, 21 May 2020 18:16:57 +0000 Received: ("Tessian outbound 444e8e881ac1:v57"); Thu, 21 May 2020 18:16:57 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 623df706f2d3a6cb X-CR-MTA-TID: 64aa7808 Received: from 77e671c53e2e.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 482BF446-1B04-4277-88D4-5F9FCB8B5E13.1; Thu, 21 May 2020 18:16:51 +0000 Received: from EUR01-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 77e671c53e2e.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 21 May 2020 18:16:51 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=YvwY3XYWNjUnmhyZPYOfo83eui0OIbzLs8M2ThhH2lysnzQjrUDig9VcsC2zDudVOmeeMWsT0/dnEcrSfe9/v53Q4YgyObbqDGrP944I6gr+3vA/DgK4EvdfRMqQPolEzPHIhEatxwBx4c2jPovTYX9cONEGd2S7iZdCk21FB+FeQiQE50nF6B5YDOo0Jgb3DIZaS9fZ3zX/tTIE7f8f6z1f/1m3p6MF5XuW1EhUhAGY+vZdqZ/NTWxi22A5dlJlDTDi7a6lcRJY7OHuPkt2adLRzyzMu82jYg1Yj9vBBpWhVbFHcIw22B7hmRehhA4PZQXm8vZugeucY37HV5bDMQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FRvvrbiW0rzlA7q6LA4wtQshomA+Rh/HHkRL0fDcnfs=; b=dZ+HHR2224XuLNI+JwsI4LhLa7HOCxG97zF2ILOHmbf9Jq64LoUTjF8+ZPgCd2+htVCNPL//jugqbqbMwBm5UbcCR2V1bWaEuv7at3w+EsaD59hsRzVR2eUnfu5s/cwNBlg/qSqydoy0CnGlzlVi7Ff+L4tT96UGqYZPEgw3reZrZ8UNeIt8rE5ZimvwbPqvNZRqjl23bgeXPtsfGLORqoS/oCg/Vpr2LMfUI74mHsbC/C1aGBg1GTYL7KhtFlze7fFLtnNONrnqbIY7iydhBSVACo0giAmUsAXNKSK/vEG2mpoez0JyRqTC7QL7np5R1LjF5V7RkSIe6aIbywVcDA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=bestguesspass action=none header.from=arm.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FRvvrbiW0rzlA7q6LA4wtQshomA+Rh/HHkRL0fDcnfs=; b=G9cVUlCkdxZhZzXNlN5JaYGFdZx6JL6F7CNRUSPHLla5HsPprjZKUnRDhojczUXcF/naPq/PCVqYPgx6n+m+dze5teTGF3pkTt7IfHEB/DEbnET/4L19kHMb66XZuqoQa1IwaJHbba64pukjap76IZfKIYFacZEz1geYqj/IZmU= Received: from AM7PR02CA0030.eurprd02.prod.outlook.com (2603:10a6:20b:100::40) by DB7PR08MB3131.eurprd08.prod.outlook.com (2603:10a6:5:1e::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3021.23; Thu, 21 May 2020 18:16:49 +0000 Received: from AM5EUR03FT014.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:100:cafe::82) by AM7PR02CA0030.outlook.office365.com (2603:10a6:20b:100::40) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3021.23 via Frontend Transport; Thu, 21 May 2020 18:16:49 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=bestguesspass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; Received: from nebula.arm.com (40.67.248.234) by AM5EUR03FT014.mail.protection.outlook.com (10.152.16.130) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3021.23 via Frontend Transport; Thu, 21 May 2020 18:16:48 +0000 Received: from AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.1415.2; Thu, 21 May 2020 18:16:48 +0000 Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1779.2; Thu, 21 May 2020 18:16:48 +0000 Received: from localhost.localdomain (10.57.25.130) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.1415.2 via Frontend Transport; Thu, 21 May 2020 18:16:48 +0000 From: "Tomas Pilar (tpilar)" To: CC: Ray Ni , Zhichao Gao Subject: [PATCH v1 6/6] ShellPkg/AcpiView: Add application wrapper Date: Thu, 21 May 2020 19:16:29 +0100 Message-ID: <20200521181629.79-7-Tomas.Pilar@arm.com> X-Mailer: git-send-email 2.24.1.windows.2 In-Reply-To: <20200521181629.79-1-Tomas.Pilar@arm.com> References: <20200521181629.79-1-Tomas.Pilar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFTY:;SFS:(4636009)(136003)(396003)(346002)(39860400002)(376002)(46966005)(26005)(6666004)(8936002)(86362001)(478600001)(5660300002)(2616005)(54906003)(336012)(1076003)(81166007)(356005)(8676002)(426003)(82740400003)(70206006)(36756003)(70586007)(47076004)(316002)(6916009)(4326008)(82310400002)(2906002)(186003);DIR:OUT;SFP:1101; X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: fa2a3d75-0a3b-42a9-fefe-08d7fdb325e7 X-MS-TrafficTypeDiagnostic: DB7PR08MB3131:|VI1PR0801MB1679: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:2887;OLM:4714; X-Forefront-PRVS: 041032FF37 X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: JMyFHvzJ59NSz8pzloE651f+E/3OktlDhxZ9/kaEWlnSc6sAvbYL4VpUTaGmbv7k+60+e7VQ4MUW834cn95jAE25k9VaVUL2O27uptZEyNWupkRbOsRHJiG+witxVQGwszGsqTgQcws4Ari5nFsJJFundX1fpD/SoaG1oBGkT854CASeKgk4ByPMOa5kVoG1/sVFjrC9ajoED09ZXTvJFb0zfrrRn7kEpJdcpGq3KBPP9M13yo+q4EYVCjdhHszAb/Z7xGnouRncyjgk9qdqdZoVSBWFQOCWx20zQADuxgKNQKtclRZFBb2T/M28ePQJ1rk8P2A681BficWnONhAIbUqZISQ8y6EMVZd0J+NKIPmZAsHi6Ajn2wqbbOdSLK7JxFclCMvr6gGxCKRas4YctUvoCzpUPkAyLh1CuiKjBefEqlL4c9LxX3+PgCjp86l1v8qdptA49M9SiOvb8TV19xoVSrXJg5DBavasJ3Bx9c= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB3131 Return-Path: Tomas.Pilar@arm.com X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT054.eop-EUR03.prod.protection.outlook.com X-Forefront-Antispam-Report: CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFTY:;SFS:(4636009)(376002)(396003)(346002)(136003)(39860400002)(46966005)(82740400003)(54906003)(47076004)(70206006)(2906002)(36756003)(316002)(36906005)(8936002)(8676002)(70586007)(6916009)(186003)(81166007)(5660300002)(426003)(107886003)(26005)(2616005)(4326008)(478600001)(86362001)(1076003)(6666004)(336012)(82310400002);DIR:OUT;SFP:1101; X-MS-Office365-Filtering-Correlation-Id-Prvs: 580a2314-5393-4105-1ba5-08d7fdb320ec X-Forefront-PRVS: 041032FF37 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: BC2m+0sIL0MWjiJrekhMwm2UtG9zCW3fK6J0ma2hGgBnAN+Fn/djtwJ664jFEM0ch+H/Za/Rbu3VgszreVkjs/2xF1xqWFPfPrORDYew/lB0GGd1QL88yXdnJw9SDzV1jxFomDnMLEIq/Q52pofeRYb9O+OE5Q+J1Go/OJJpU79xrr63elC+FifR5qRppHzRfekxwj+VhKSaO85UFdhHxTU0keAKn6rh+L1gxDqRvm7fCQUctujzhMGqwAzEhGqFvYuEx+5gQpaKN0Ur1nnovDOqqsJhjWZAikR2EI09J/WMLEgHI593+pxDH1oorVCFDrHwbfh0/WsFqC4OuKAQ9ki5ehrfuk2jJF+++eJWXpXUkVVRZsTVaf1KYMuOxTht56OJhqsZD/GZfBw4xbab7eWYhgWBmiEIHdDWONgIJwjmAortIsdKiujtuu2kIHpXjclTNd46RknfJ9ii9v+WZmBEMhqpgrwu0jHt+HdJXwA= X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 May 2020 18:16:57.2339 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: fa2a3d75-0a3b-42a9-fefe-08d7fdb325e7 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1679 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain Simple application wrapper that invokes the shell command wrapper for acpiview. This allows the AcpiView functionality to be used on platforms with older specifications of the UEFI shell or where the 'acpiview' command is not built in due to platform build configuration. Furthermore, this app can be integrated into more comprehensive testing frameworks as a single component of a more thorough specification compliance validation strategy. Cc: Ray Ni Cc: Zhichao Gao Signed-off-by: Tomas Pilar --- ShellPkg/Application/AcpiViewApp/AcpiViewApp.c | 189 +++++++++++++++++++= +++++++++++++++++++++++++++++++++++++++++++++++++++ ShellPkg/Application/AcpiViewApp/AcpiViewApp.inf | 31 ++++++++++++ ShellPkg/ShellPkg.dsc | 6 ++- 3 files changed, 225 insertions(+), 1 deletion(-) diff --git a/ShellPkg/Application/AcpiViewApp/AcpiViewApp.c b/ShellPkg/Appl= ication/AcpiViewApp/AcpiViewApp.c new file mode 100644 index 000000000000..f83111629c21 --- /dev/null +++ b/ShellPkg/Application/AcpiViewApp/AcpiViewApp.c @@ -0,0 +1,189 @@ +/** @file + Main file for AcpiViewApp application + + Copyright (c) 2020, ARM Limited. All rights reserved.
+ SPDX-License-Identifier: BSD-2-Clause-Patent +**/ + +#include +#include +#include + +#include + +/** + Execute the AcpiView command from UefiShellAcpiViewCommandLib. + This function is pulled in directly from the library source. +**/ +SHELL_STATUS +EFIAPI +ShellCommandRunAcpiView ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE* SystemTable + ); + +CHAR16 mAcpiViewAppHelp[] =3D + u"\r\n" + "Display ACPI Table information.\r\n" + "\r\n" + "AcpiViewApp.efi [[-?] | [[-l] | [-s AcpiTable [-d]]] [-q] [-h]]\r\n" + " \r\n" + " -l - Display list of installed ACPI Tables.\r\n" + " -s - Display only the specified AcpiTable type and only support singl= e\r\n" + " invocation option.\r\n" + " AcpiTable : The required ACPI Table type.\r\n" + " -d - Generate a binary file dump of the specified AcpiTable.\r\n" + " -q - Quiet. Suppress errors and warnings. Disables consistency checks= .\r\n" + " -h - Enable colour highlighting.\r\n" + " -? - Show help.\r\n" + " \r\n" + " This program is provided to allow examination of ACPI table values fr= om " + "the\r\n" + " UEFI Shell. This can help with investigations, especially at that " + "stage\r\n" + " where the tables are not enabling an OS to boot.\r\n" + " The program is not exhaustive, and only encapsulates detailed knowled= ge " + "of a\r\n" + " limited number of table types.\r\n" + " \r\n" + " Default behaviour is to display the content of all tables installed.\= r\n" + " 'Known' table types (listed in NOTES below) will be parsed and " + "displayed\r\n" + " with descriptions and field values. Where appropriate a degree of\r\n= " + " consistency checking is done and errors may be reported in the output= .\r\n" + " Other table types will be displayed as an array of Hexadecimal bytes.= \r\n" + " \r\n" + " To facilitate debugging, the -s and -d options can be used to generat= e " + "a\r\n" + " binary file image of a table that can be copied elsewhere for " + "investigation\r\n" + " using tools such as those provided by acpica.org. This is especially\= r\n" + " relevant for AML type tables like DSDT and SSDT.\r\n" + " \r\n" + "NOTES:\r\n" + " 1. The AcpiTable parameter can match any installed table type.\r\n" + " Tables without specific handling will be displayed as a raw hex du= mp " + "(or\r\n" + " dumped to a file if -d is used).\r\n" + " 2. -s option supports to display the specified AcpiTable type that is= " + "present\r\n" + " in the system. For normal type AcpiTable, it would display the dat= a of " + "the\r\n" + " AcpiTable and AcpiTable header. The following type may contain hea= der " + "type\r\n" + " other than AcpiTable header. The actual header can refer to the AC= PI " + "spec\r\n" + " 6.3\r\n" + " Extra A. Particular types:\r\n" + " APIC - Multiple APIC Description Table (MADT)\r\n" + " BGRT - Boot Graphics Resource Table\r\n" + " DBG2 - Debug Port Table 2\r\n" + " DSDT - Differentiated System Description Table\r\n" + " FACP - Fixed ACPI Description Table (FADT)\r\n" + " GTDT - Generic Timer Description Table\r\n" + " IORT - IO Remapping Table\r\n" + " MCFG - Memory Mapped Config Space Base Address Description Tabl= e\r\n" + " PPTT - Processor Properties Topology Table\r\n" + " RSDP - Root System Description Pointer\r\n" + " SLIT - System Locality Information Table\r\n" + " SPCR - Serial Port Console Redirection Table\r\n" + " SRAT - System Resource Affinity Table\r\n" + " SSDT - Secondary SystemDescription Table\r\n" + " XSDT - Extended System Description Table\r\n" + " \r\n" + " Table details correspond to those in 'Advanced Configuration and Powe= r\r\n" + " Interface Specification' Version 6.3 [January 2019]\r\n" + " (https://uefi.org/specifications)\r\n" + " " + " \r\n" + " NOTE: The nature of the ACPI standard means that almost all tables in= " + "6.1\r\n" + " will be 'backwards compatible' with prior version of the " + "specification\r\n" + " in terms of structure, so formatted output should be correct. T= he " + "main\r\n" + " exception will be that previously 'reserved' fields will be " + "reported\r\n" + " with new names, where they have been added in later versions of= " + "the\r\n" + " specification.\r\n" + " \r\n" + " \r\n" + "EXAMPLES:\r\n" + " * To display a list of the installed table types:\r\n" + " fs0:\\> AcpiViewApp.efi -l\r\n" + " \r\n" + " * To parse and display a specific table type:\r\n" + " fs0:\\> AcpiViewApp.efi -s GTDT\r\n" + " \r\n" + " * To save a binary dump of the contents of a table to a file\r\n" + " in the current working directory:\r\n" + " fs0:\\> AcpiViewApp.efi -s DSDT -d\r\n" + " \r\n" + " * To display contents of all ACPI tables:\r\n" + " fs0:\\> AcpiViewApp.efi\r\n" + " \r\n"; + +/** + Determine if the user wants to display by checking for presence + of '/?' or '--help' on command line. We cannot override '-?' shell + command line handling. + + @retval EFI_SUCCESS No help was printed + @retval EFI_INVALID_PARAMETER Help was printed +**/ +STATIC +EFI_STATUS +CheckForHelpRequest ( + EFI_HANDLE ImageHandle + ) +{ + EFI_STATUS Status; + EFI_SHELL_PARAMETERS_PROTOCOL *ShellParameters; + UINTN Index; + + Status =3D gBS->HandleProtocol ( + ImageHandle, + &gEfiShellParametersProtocolGuid, + (VOID **)&ShellParameters + ); + if (EFI_ERROR(Status)) { + return Status; + } + + for (Index =3D 1; Index < ShellParameters->Argc; Index++) { + if ((StrCmp (ShellParameters->Argv[Index], L"/?") =3D=3D 0) || + (StrCmp (ShellParameters->Argv[Index], L"--help") =3D=3D 0)) { + Print (mAcpiViewAppHelp); + return EFI_INVALID_PARAMETER; + } + } + + return EFI_SUCCESS; +} + + +/** + Application Entry Point wrapper around the shell command + + @param[in] ImageHandle Handle to the Image (NULL if internal). + @param[in] SystemTable Pointer to the System Table (NULL if internal). +**/ +EFI_STATUS +EFIAPI +AcpiViewAppMain ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE *SystemTable + ) +{ + EFI_STATUS Status; + + Status =3D CheckForHelpRequest (ImageHandle); + + // Do not run code if help was printed + if (Status !=3D EFI_INVALID_PARAMETER) { + Status =3D ShellCommandRunAcpiView (gImageHandle, SystemTable); + } + + return Status; +} diff --git a/ShellPkg/Application/AcpiViewApp/AcpiViewApp.inf b/ShellPkg/Ap= plication/AcpiViewApp/AcpiViewApp.inf new file mode 100644 index 000000000000..28e724fa1909 --- /dev/null +++ b/ShellPkg/Application/AcpiViewApp/AcpiViewApp.inf @@ -0,0 +1,31 @@ +## @file +# EFI application that displays and verifies ACPI tables +# +# Copyright (c) 2020, ARM Limited. All rights reserved.
+# +# SPDX-License-Identifier: BSD-2-Clause-Patent +# +# +## + +[Defines] + INF_VERSION =3D 0x0001001B + BASE_NAME =3D AcpiViewApp + FILE_GUID =3D 46361B5B-AF17-41FF-95F9-E1BCE08435B9 + MODULE_TYPE =3D UEFI_APPLICATION + VERSION_STRING =3D 1.0 + ENTRY_POINT =3D AcpiViewAppMain + +[Sources.common] + AcpiViewApp.c + +[Packages] + MdeModulePkg/MdeModulePkg.dec + MdePkg/MdePkg.dec + ShellPkg/ShellPkg.dec + +[LibraryClasses] + UefiBootServicesTableLib + UefiLib + BaseLib + UefiApplicationEntryPoint diff --git a/ShellPkg/ShellPkg.dsc b/ShellPkg/ShellPkg.dsc index b7ee856b3a16..1ed82ee7aca3 100644 --- a/ShellPkg/ShellPkg.dsc +++ b/ShellPkg/ShellPkg.dsc @@ -2,7 +2,7 @@ # Shell Package # # Copyright (c) 2007 - 2019, Intel Corporation. All rights reserved.
-# Copyright (c) 2018, Arm Limited. All rights reserved.
+# Copyright (c) 2018 - 2020, Arm Limited. All rights reserved.
# Copyright (c) 2020, Hewlett Packard Enterprise Development LP. All right= s reserved.
# # SPDX-License-Identifier: BSD-2-Clause-Patent @@ -143,6 +143,10 @@ [Components] gEfiShellPkgTokenSpaceGuid.PcdShellLibAutoInitialize|FALSE } ShellPkg/DynamicCommand/DpDynamicCommand/DpApp.inf + ShellPkg/Application/AcpiViewApp/AcpiViewApp.inf { + + NULL|ShellPkg/Library/UefiShellAcpiViewCommandLib/UefiShellAcpiViewC= ommandLib.inf + } [BuildOptions] *_*_*_CC_FLAGS =3D -D DISABLE_NEW_DEPRECATED_INTERFACES -- 2.24.1.windows.2 IMPORTANT NOTICE: The contents of this email and any attachments are confid= ential and may also be privileged. If you are not the intended recipient, p= lease notify the sender immediately and do not disclose the contents to any= other person, use it for any purpose, or store or copy the information in = any medium. Thank you.