From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from EUR01-HE1-obe.outbound.protection.outlook.com (EUR01-HE1-obe.outbound.protection.outlook.com [40.107.13.45]) by mx.groups.io with SMTP id smtpd.web10.1869.1590086696850385080 for ; Thu, 21 May 2020 11:44:57 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="body hash did not verify" header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=hVi+shfj; spf=pass (domain: arm.com, ip: 40.107.13.45, mailfrom: tomas.pilar@arm.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tautk+VPoX1HpLhkD1NDHdoM1pEonD8Ho+IdR7Kf4As=; b=hVi+shfjZWAtbXosfQ/8QvbIangwvzteNj9kiHgiB8Yz1HlxgwpYu1V5lhtN89Ghl9JmgJFae0ZMSBr4E3oMQ8kGmNANOQLqm8YG0Ke7xSFb/Hmw360UdEmYRMKU/iHLApkq+6tolFGRjAlJjeCBUpC9g/HL52h5YtHbRZFAJm4= Received: from MRXP264CA0005.FRAP264.PROD.OUTLOOK.COM (2603:10a6:500:15::17) by VI1PR08MB3679.eurprd08.prod.outlook.com (2603:10a6:803:85::30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3021.23; Thu, 21 May 2020 18:44:52 +0000 Received: from VE1EUR03FT021.eop-EUR03.prod.protection.outlook.com (2603:10a6:500:15:cafe::e1) by MRXP264CA0005.outlook.office365.com (2603:10a6:500:15::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3021.23 via Frontend Transport; Thu, 21 May 2020 18:44:52 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=bestguesspass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT021.mail.protection.outlook.com (10.152.18.117) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3021.23 via Frontend Transport; Thu, 21 May 2020 18:44:52 +0000 Received: ("Tessian outbound facc38080784:v57"); Thu, 21 May 2020 18:44:52 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 1011952b7ab1a404 X-CR-MTA-TID: 64aa7808 Received: from 0708b08cb58a.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 2AB6AA8F-4697-4A8F-80A9-AC703234CED4.1; Thu, 21 May 2020 18:44:47 +0000 Received: from EUR05-AM6-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 0708b08cb58a.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 21 May 2020 18:44:47 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RhAji4sptit1GaY/8x63TdSYTQu6hUL2Uw4BliPGoSoEuA/FBY5BscbK36VI+x7Vp3cYSpq9xAZ4/qIxUwCrMNSUw7sOZoTbjW+PTTd4f+9FsKbXnUWbcVYnrXHxuAxBbyFJaBZUo/Q0wDDfBjLTzOpderOIn09M9xjt3gTlh5D7HTvcI99ZuKC9TJZLsNIgONQB+10ivS8q5Efn+srZmNBsns/CW+u8De/qWsPT8gzFbPMthaFOEOoGEMgyoSwGxmr/e78bpBF7+s551wuiHXFnAw60TS4mVPLyCr8iu5IgZ+4QQO4mJJkFPJhwikuZ+r7LrM2zrDxgH0eRAcL75A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tautk+VPoX1HpLhkD1NDHdoM1pEonD8Ho+IdR7Kf4As=; b=BFNEaFKuDcxb09SaQOtqL4xWt0fW2Izg5Pb5MFuEhG/itkuXVsGo78k39TUgk0jFsrNDzr1tBnIWC8HHKv7TWIHBmeueGcQTEg4/QGrBfqlzQ0Eal1cHpWFdqHWlXv2Jr79PIlXHzx7LwQfMfYbTN+eG/8cNm1mFxm781Iur71+TZ1EAq5RdUYZYqajqo0w1kYmqjb7jNjktvHvXafQiIE8kGYUtCL3KYrOeJz3gUuAS2KPZO+ofWdAWic4YEtzfy0yzU57mEWNE6GloGJIvI0zX7r0tjF9N0Gm6kCoMLIMe/ay23KvT7iVzEsBPLULUCzjNSrrHxJYVbGXfkj4X7Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=bestguesspass action=none header.from=arm.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tautk+VPoX1HpLhkD1NDHdoM1pEonD8Ho+IdR7Kf4As=; b=hVi+shfjZWAtbXosfQ/8QvbIangwvzteNj9kiHgiB8Yz1HlxgwpYu1V5lhtN89Ghl9JmgJFae0ZMSBr4E3oMQ8kGmNANOQLqm8YG0Ke7xSFb/Hmw360UdEmYRMKU/iHLApkq+6tolFGRjAlJjeCBUpC9g/HL52h5YtHbRZFAJm4= Received: from AM3PR05CA0155.eurprd05.prod.outlook.com (2603:10a6:207:3::33) by AM5PR0802MB2404.eurprd08.prod.outlook.com (2603:10a6:203:a0::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3021.24; Thu, 21 May 2020 18:44:46 +0000 Received: from AM5EUR03FT059.eop-EUR03.prod.protection.outlook.com (2603:10a6:207:3:cafe::3c) by AM3PR05CA0155.outlook.office365.com (2603:10a6:207:3::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3021.23 via Frontend Transport; Thu, 21 May 2020 18:44:45 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=bestguesspass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; Received: from nebula.arm.com (40.67.248.234) by AM5EUR03FT059.mail.protection.outlook.com (10.152.17.193) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3021.23 via Frontend Transport; Thu, 21 May 2020 18:44:45 +0000 Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1415.2; Thu, 21 May 2020 18:44:40 +0000 Received: from localhost.localdomain (10.57.25.130) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.1415.2 via Frontend Transport; Thu, 21 May 2020 18:44:40 +0000 From: "Tomas Pilar (tpilar)" To: CC: , Ray Ni , Zhichao Gao Subject: [PATCH v2 6/6] ShellPkg/AcpiView: Add application wrapper Date: Thu, 21 May 2020 19:44:21 +0100 Message-ID: <20200521184421.2222-7-Tomas.Pilar@arm.com> X-Mailer: git-send-email 2.24.1.windows.2 In-Reply-To: <20200521184421.2222-1-Tomas.Pilar@arm.com> References: <20200521184421.2222-1-Tomas.Pilar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFTY:;SFS:(4636009)(346002)(136003)(376002)(396003)(39860400002)(46966005)(8936002)(54906003)(316002)(2906002)(70206006)(36756003)(70586007)(8676002)(336012)(86362001)(2616005)(426003)(6916009)(4326008)(26005)(478600001)(81166007)(6666004)(1076003)(356005)(82740400003)(47076004)(82310400002)(5660300002)(186003);DIR:OUT;SFP:1101; X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 475dde50-b99a-4265-2132-08d7fdb70c73 X-MS-TrafficTypeDiagnostic: AM5PR0802MB2404:|VI1PR08MB3679: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:2887;OLM:2887; X-Forefront-PRVS: 041032FF37 X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: J4XT3bIKT4vhtLODZSjTHDtPbyaJbkI1TuLPe0a2CHmovd6Rx5K034hfFf8BkfNHs2fxoGohbnIg3+Np2zHu5n/mMyWv97n54LpBqFAr+UN0Dyo1XSMjjng0Akdtf6VXpIfLtQAL3+WYCkZHlTlfWdr9iMZUHq2xieagEyuuJH3nfbMgDMELQiwlzo2j4mKz8BVKgmwnQmz1B34vP3boM0i9fk/FBBPVkTgq/UVoZz0mi1Qtbnte8iT+OSeGDB/hPZH/wN0JZALaemGYCKXfHPblKkCCu+LY3lQHIZF3Br1NcbRSa7VCRf6k2tn07Q26qHvS3KAnHNhqiv1fBunQPlL4nasuV98I4JNTWc7RxhmDn162kQwSWfBHaLRjMx6ruE7M6qQXCsZhK/1pjm5TYM0If/FI9/hE/cwybCZGkW5E7LcJwYDisyVgvgN+7IjysFOb8w4AeTZ/+8UDOUoqk7qt4+0Gj7jjxqehRlIXBGU= X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0802MB2404 Return-Path: Tomas.Pilar@arm.com X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT021.eop-EUR03.prod.protection.outlook.com X-Forefront-Antispam-Report: CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFTY:;SFS:(4636009)(376002)(346002)(39860400002)(396003)(136003)(46966005)(4326008)(8676002)(86362001)(8936002)(2616005)(186003)(70206006)(2906002)(54906003)(26005)(316002)(70586007)(36756003)(82740400003)(336012)(426003)(36906005)(5660300002)(478600001)(81166007)(82310400002)(6916009)(6666004)(1076003)(47076004)(107886003);DIR:OUT;SFP:1101; X-MS-Office365-Filtering-Correlation-Id-Prvs: 34a4470a-ed20-4365-8416-08d7fdb70875 X-Forefront-PRVS: 041032FF37 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: vbSLMULhk8Cb34b43F7yJDz6QIGl2BeMrusEkrNjM9L03nB0W8UZnb4Jg3p3Ipm9Vav5za3056YRIUqnYEE6kvpVR5Htxb9xoV46jWPEVn3+2NAOYYROycJk3j9serjnj/e3Pi36kpKwD5NQEfgyi+7dLypmhtRi0xJsdkuCllMX3s62OhUKjFisckiShqzsCzMcFfgwiONBmQK/kD9vw7Dy5H+hzlqXgmijDodKStfeF6oQ279vFHovHNQIJaeMuMGv/9LrpJ6SrRWs9WHO2/oWxFiEN4Pr4QHbY9OhXZGitfyQuI3xu1dbji3mxRh9CxlWoWBch1t6UexpQNBBxHtxV785gxzbXbAE+Kju6WfOAmbcA2faUKHqXlGYBwvx4APoWgenWPsxgiz8snhNrDIYRFcgGeUPKUr2wRvdL8+Venb8Ho7CJC6AH9S+KQUMQxY4HUtj19rh3jedHg8JS359zvRKH99I5Nf2Xsb4as0= X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 May 2020 18:44:52.4549 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 475dde50-b99a-4265-2132-08d7fdb70c73 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3679 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain Simple application wrapper that invokes the shell command wrapper for acpiview. This allows the AcpiView functionality to be used on platforms with older specifications of the UEFI shell or where the 'acpiview' command is not built in due to platform build configuration. Furthermore, this app can be integrated into more comprehensive testing frameworks as a single component of a more thorough specification compliance validation strategy. Cc: Ray Ni Cc: Zhichao Gao Signed-off-by: Tomas Pilar --- ShellPkg/Application/AcpiViewApp/AcpiViewApp.c | 189 +++++++++++++++++++= +++++++++++++++++++++++++++++++++++++++++++++++++++ ShellPkg/Application/AcpiViewApp/AcpiViewApp.inf | 31 ++++++++++++ ShellPkg/ShellPkg.dsc | 6 ++- 3 files changed, 225 insertions(+), 1 deletion(-) diff --git a/ShellPkg/Application/AcpiViewApp/AcpiViewApp.c b/ShellPkg/Appl= ication/AcpiViewApp/AcpiViewApp.c new file mode 100644 index 000000000000..f83111629c21 --- /dev/null +++ b/ShellPkg/Application/AcpiViewApp/AcpiViewApp.c @@ -0,0 +1,189 @@ +/** @file + Main file for AcpiViewApp application + + Copyright (c) 2020, ARM Limited. All rights reserved.
+ SPDX-License-Identifier: BSD-2-Clause-Patent +**/ + +#include +#include +#include + +#include + +/** + Execute the AcpiView command from UefiShellAcpiViewCommandLib. + This function is pulled in directly from the library source. +**/ +SHELL_STATUS +EFIAPI +ShellCommandRunAcpiView ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE* SystemTable + ); + +CHAR16 mAcpiViewAppHelp[] =3D + u"\r\n" + "Display ACPI Table information.\r\n" + "\r\n" + "AcpiViewApp.efi [[-?] | [[-l] | [-s AcpiTable [-d]]] [-q] [-h]]\r\n" + " \r\n" + " -l - Display list of installed ACPI Tables.\r\n" + " -s - Display only the specified AcpiTable type and only support singl= e\r\n" + " invocation option.\r\n" + " AcpiTable : The required ACPI Table type.\r\n" + " -d - Generate a binary file dump of the specified AcpiTable.\r\n" + " -q - Quiet. Suppress errors and warnings. Disables consistency checks= .\r\n" + " -h - Enable colour highlighting.\r\n" + " -? - Show help.\r\n" + " \r\n" + " This program is provided to allow examination of ACPI table values fr= om " + "the\r\n" + " UEFI Shell. This can help with investigations, especially at that " + "stage\r\n" + " where the tables are not enabling an OS to boot.\r\n" + " The program is not exhaustive, and only encapsulates detailed knowled= ge " + "of a\r\n" + " limited number of table types.\r\n" + " \r\n" + " Default behaviour is to display the content of all tables installed.\= r\n" + " 'Known' table types (listed in NOTES below) will be parsed and " + "displayed\r\n" + " with descriptions and field values. Where appropriate a degree of\r\n= " + " consistency checking is done and errors may be reported in the output= .\r\n" + " Other table types will be displayed as an array of Hexadecimal bytes.= \r\n" + " \r\n" + " To facilitate debugging, the -s and -d options can be used to generat= e " + "a\r\n" + " binary file image of a table that can be copied elsewhere for " + "investigation\r\n" + " using tools such as those provided by acpica.org. This is especially\= r\n" + " relevant for AML type tables like DSDT and SSDT.\r\n" + " \r\n" + "NOTES:\r\n" + " 1. The AcpiTable parameter can match any installed table type.\r\n" + " Tables without specific handling will be displayed as a raw hex du= mp " + "(or\r\n" + " dumped to a file if -d is used).\r\n" + " 2. -s option supports to display the specified AcpiTable type that is= " + "present\r\n" + " in the system. For normal type AcpiTable, it would display the dat= a of " + "the\r\n" + " AcpiTable and AcpiTable header. The following type may contain hea= der " + "type\r\n" + " other than AcpiTable header. The actual header can refer to the AC= PI " + "spec\r\n" + " 6.3\r\n" + " Extra A. Particular types:\r\n" + " APIC - Multiple APIC Description Table (MADT)\r\n" + " BGRT - Boot Graphics Resource Table\r\n" + " DBG2 - Debug Port Table 2\r\n" + " DSDT - Differentiated System Description Table\r\n" + " FACP - Fixed ACPI Description Table (FADT)\r\n" + " GTDT - Generic Timer Description Table\r\n" + " IORT - IO Remapping Table\r\n" + " MCFG - Memory Mapped Config Space Base Address Description Tabl= e\r\n" + " PPTT - Processor Properties Topology Table\r\n" + " RSDP - Root System Description Pointer\r\n" + " SLIT - System Locality Information Table\r\n" + " SPCR - Serial Port Console Redirection Table\r\n" + " SRAT - System Resource Affinity Table\r\n" + " SSDT - Secondary SystemDescription Table\r\n" + " XSDT - Extended System Description Table\r\n" + " \r\n" + " Table details correspond to those in 'Advanced Configuration and Powe= r\r\n" + " Interface Specification' Version 6.3 [January 2019]\r\n" + " (https://uefi.org/specifications)\r\n" + " " + " \r\n" + " NOTE: The nature of the ACPI standard means that almost all tables in= " + "6.1\r\n" + " will be 'backwards compatible' with prior version of the " + "specification\r\n" + " in terms of structure, so formatted output should be correct. T= he " + "main\r\n" + " exception will be that previously 'reserved' fields will be " + "reported\r\n" + " with new names, where they have been added in later versions of= " + "the\r\n" + " specification.\r\n" + " \r\n" + " \r\n" + "EXAMPLES:\r\n" + " * To display a list of the installed table types:\r\n" + " fs0:\\> AcpiViewApp.efi -l\r\n" + " \r\n" + " * To parse and display a specific table type:\r\n" + " fs0:\\> AcpiViewApp.efi -s GTDT\r\n" + " \r\n" + " * To save a binary dump of the contents of a table to a file\r\n" + " in the current working directory:\r\n" + " fs0:\\> AcpiViewApp.efi -s DSDT -d\r\n" + " \r\n" + " * To display contents of all ACPI tables:\r\n" + " fs0:\\> AcpiViewApp.efi\r\n" + " \r\n"; + +/** + Determine if the user wants to display by checking for presence + of '/?' or '--help' on command line. We cannot override '-?' shell + command line handling. + + @retval EFI_SUCCESS No help was printed + @retval EFI_INVALID_PARAMETER Help was printed +**/ +STATIC +EFI_STATUS +CheckForHelpRequest ( + EFI_HANDLE ImageHandle + ) +{ + EFI_STATUS Status; + EFI_SHELL_PARAMETERS_PROTOCOL *ShellParameters; + UINTN Index; + + Status =3D gBS->HandleProtocol ( + ImageHandle,=20 + &gEfiShellParametersProtocolGuid, + (VOID **)&ShellParameters + ); + if (EFI_ERROR(Status)) { + return Status; + } + + for (Index =3D 1; Index < ShellParameters->Argc; Index++) { + if ((StrCmp (ShellParameters->Argv[Index], L"/?") =3D=3D 0) || + (StrCmp (ShellParameters->Argv[Index], L"--help") =3D=3D 0)) { + Print (mAcpiViewAppHelp); + return EFI_INVALID_PARAMETER; + } + } + + return EFI_SUCCESS; +} + + +/** + Application Entry Point wrapper around the shell command + + @param[in] ImageHandle Handle to the Image (NULL if internal). + @param[in] SystemTable Pointer to the System Table (NULL if internal). +**/ +EFI_STATUS +EFIAPI +AcpiViewAppMain ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE *SystemTable + ) +{ + EFI_STATUS Status; + + Status =3D CheckForHelpRequest (ImageHandle); + + // Do not run code if help was printed + if (Status !=3D EFI_INVALID_PARAMETER) { + Status =3D ShellCommandRunAcpiView (gImageHandle, SystemTable); + } + + return Status; +} diff --git a/ShellPkg/Application/AcpiViewApp/AcpiViewApp.inf b/ShellPkg/Ap= plication/AcpiViewApp/AcpiViewApp.inf new file mode 100644 index 000000000000..28e724fa1909 --- /dev/null +++ b/ShellPkg/Application/AcpiViewApp/AcpiViewApp.inf @@ -0,0 +1,31 @@ +## @file +# EFI application that displays and verifies ACPI tables +# +# Copyright (c) 2020, ARM Limited. All rights reserved.
+# +# SPDX-License-Identifier: BSD-2-Clause-Patent +# +# +## + +[Defines] + INF_VERSION =3D 0x0001001B + BASE_NAME =3D AcpiViewApp + FILE_GUID =3D 46361B5B-AF17-41FF-95F9-E1BCE08435B9 + MODULE_TYPE =3D UEFI_APPLICATION + VERSION_STRING =3D 1.0 + ENTRY_POINT =3D AcpiViewAppMain + +[Sources.common] + AcpiViewApp.c + +[Packages] + MdeModulePkg/MdeModulePkg.dec + MdePkg/MdePkg.dec + ShellPkg/ShellPkg.dec + +[LibraryClasses] + UefiBootServicesTableLib + UefiLib + BaseLib + UefiApplicationEntryPoint diff --git a/ShellPkg/ShellPkg.dsc b/ShellPkg/ShellPkg.dsc index b7ee856b3a16..1ed82ee7aca3 100644 --- a/ShellPkg/ShellPkg.dsc +++ b/ShellPkg/ShellPkg.dsc @@ -2,7 +2,7 @@ # Shell Package # # Copyright (c) 2007 - 2019, Intel Corporation. All rights reserved.
-# Copyright (c) 2018, Arm Limited. All rights reserved.
+# Copyright (c) 2018 - 2020, Arm Limited. All rights reserved.
# Copyright (c) 2020, Hewlett Packard Enterprise Development LP. All right= s reserved.
# # SPDX-License-Identifier: BSD-2-Clause-Patent @@ -143,6 +143,10 @@ [Components] gEfiShellPkgTokenSpaceGuid.PcdShellLibAutoInitialize|FALSE } ShellPkg/DynamicCommand/DpDynamicCommand/DpApp.inf + ShellPkg/Application/AcpiViewApp/AcpiViewApp.inf { + + NULL|ShellPkg/Library/UefiShellAcpiViewCommandLib/UefiShellAcpiViewC= ommandLib.inf + } =20 [BuildOptions] *_*_*_CC_FLAGS =3D -D DISABLE_NEW_DEPRECATED_INTERFACES --=20 2.24.1.windows.2