From nobody Tue Feb 10 11:15:49 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+56266+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one) Received: from web01.groups.io (web01.groups.io [66.175.222.12]) by mx.zohomail.com with SMTPS id 1585129189642373.7048990104049; Wed, 25 Mar 2020 02:39:49 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id TksFYY1788612xp4jaiMse6c; Wed, 25 Mar 2020 02:39:49 -0700 X-Received: from EUR04-VI1-obe.outbound.protection.outlook.com (EUR04-VI1-obe.outbound.protection.outlook.com [40.107.8.45]) by mx.groups.io with SMTP id smtpd.web11.7819.1585129187912260284 for ; Wed, 25 Mar 2020 02:39:48 -0700 X-Received: from VI1PR08CA0204.eurprd08.prod.outlook.com (2603:10a6:800:d2::34) by AM5PR0802MB2468.eurprd08.prod.outlook.com (2603:10a6:203:a1::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2835.22; Wed, 25 Mar 2020 09:39:45 +0000 X-Received: from VE1EUR03FT060.eop-EUR03.prod.protection.outlook.com (2603:10a6:800:d2:cafe::5d) by VI1PR08CA0204.outlook.office365.com (2603:10a6:800:d2::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2835.20 via Frontend Transport; Wed, 25 Mar 2020 09:39:45 +0000 Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) client-ip=66.175.222.12; envelope-from=bounce+27952+56266+1787277+3901457@groups.io; helo=web01.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT060.mail.protection.outlook.com (10.152.19.187) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2856.17 via Frontend Transport; Wed, 25 Mar 2020 09:39:44 +0000 X-Received: ("Tessian outbound 8f06d475fc37:v48"); Wed, 25 Mar 2020 09:39:44 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: f81a2940ae12d812 X-CR-MTA-TID: 64aa7808 X-Received: from b77a73132834.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id BDA3FE3D-8576-4079-9CE0-4DD5EB6570FC.1; Wed, 25 Mar 2020 09:39:38 +0000 X-Received: from EUR03-DB5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id b77a73132834.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 25 Mar 2020 09:39:38 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GyKse8WDcqiPgl47frQwGuSK8tLj2XBXvg5WJX28Yj61iPLFWbEkLS7kPHQxI3f3MsI6ZBNYcwddRPovo0Hbrey+B6mDwU5D6NYKspmrpFTcZsgb1wYe+kRHbrfJt4kXlgTtGLKDihhj5WL7OVlLrXLtZIOu2SYS5OXrcDFqKWIFcguund5Q8xSaSzUrriOycBOugAEN+n3XNOULRaTdiJ89JwbvL5cFS80bWyCQmhPtTW9vdKjw00B+XSP6p9ZxKFicN7UKUeyHMdWVJZXlDJGARAxCSDV5EwNds1ciu2PdKtVqPiOwkcXyLRg6u9Da8ExYZVUjK65pzGIr2Y8Lfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=v+f4nuh0NLUKD7f1Z8JCWoIp9MqCMq7huNpipMq5f+s=; b=NBvH/0v8oofw5c98Z4FFVDruPpHVHwYkDW2jBD2JWGR/h9zgX9omHUBn/zTb17FHfxTk4M+i2/aHWReco8VuNfA4ANwuP8PqQG9Tf+okOTS9XRaGB/Kt2gUdwlD7TCzDQ8oFcDym2BqUWbGwl4y8g3xLiia2eqRtESXO7xglwr6Ed13W6WMcOPJnGtHqDY9Va+pRf0YdsGbUD32rxyo2xN6YmPCWxTf/jrzkUhZKhuHLgSZagU6Ic425D4oqlvSZfDv5BpuVBDqv1YuMZP7YTMthl5bkZYFKqnvc2S0NV1+5ieeVdGOyt/ncUfvxkUvHrN7o227MLaUACUpkUshvvA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=bestguesspass action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from AM0PR10CA0028.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:17c::38) by AM6PR08MB3798.eurprd08.prod.outlook.com (2603:10a6:20b:82::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2835.22; Wed, 25 Mar 2020 09:39:36 +0000 X-Received: from VE1EUR03FT055.eop-EUR03.prod.protection.outlook.com (2603:10a6:208:17c:cafe::e8) by AM0PR10CA0028.outlook.office365.com (2603:10a6:208:17c::38) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2835.20 via Frontend Transport; Wed, 25 Mar 2020 09:39:36 +0000 Authentication-Results-Original: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=bestguesspass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by VE1EUR03FT055.mail.protection.outlook.com (10.152.19.158) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.2856.17 via Frontend Transport; Wed, 25 Mar 2020 09:39:36 +0000 X-Received: from AZ-NEU-EX03.Arm.com (10.251.24.31) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1415.2; Wed, 25 Mar 2020 09:39:26 +0000 X-Received: from E119924.Arm.com (10.57.55.133) by mail.arm.com (10.251.24.31) with Microsoft SMTP Server id 15.1.1415.2 via Frontend Transport; Wed, 25 Mar 2020 09:39:25 +0000 From: "Krzysztof Koch" To: CC: , , , , , Subject: [edk2-devel] [PATCH v1 1/3] ShellPkg: acpiview: Add -r parameter for table requirements validation Date: Wed, 25 Mar 2020 09:39:22 +0000 Message-ID: <20200325093924.22884-2-krzysztof.koch@arm.com> In-Reply-To: <20200325093924.22884-1-krzysztof.koch@arm.com> References: <20200325093924.22884-1-krzysztof.koch@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;IPV:;CTRY:IE;EFV:NLI;SFV:NSPM;SFS:(10009020)(4636009)(346002)(136003)(39860400002)(376002)(396003)(46966005)(6916009)(6666004)(36756003)(8936002)(356004)(8676002)(81156014)(81166006)(186003)(26005)(7696005)(478600001)(2616005)(44832011)(336012)(426003)(5660300002)(4326008)(86362001)(54906003)(2906002)(316002)(47076004)(1076003)(70586007)(82740400003)(70206006);DIR:OUT;SFP:1101;SCL:1;SRVR:AM6PR08MB3798;H:nebula.arm.com;FPR:;SPF:Pass;LANG:en;PTR:InfoDomainNonexistent; X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: a7020a11-1f10-4dcf-ee90-08d7d0a07373 X-MS-TrafficTypeDiagnostic: AM6PR08MB3798:|AM5PR0802MB2468: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:2331;OLM:2331; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3798 Original-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=bestguesspass action=none header.from=arm.com; X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT060.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 187f9a1c-7cd5-4422-f1f6-08d7d0a06e83 X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2020 09:39:44.5115 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: a7020a11-1f10-4dcf-ee90-08d7d0a07373 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0802MB2468 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,krzysztof.koch@arm.com X-Gm-Message-State: xF5Jc56ur0oxbGJ6SdFNH2wax1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1585129189; bh=s4rFHqORs7cwAA4DaDVekzLRyekM0xa1z5R5KzHju5Y=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=Ph8VPjpgAZ2DJLn+druGmpJ4VNxFLstu7G613XEiWHr6JFhEtpUoAEUVCN442xenCSj w2M4DkAEGwt0g+kUOMg+c5wHnJ7UMMxpqq6+nY9wwuX4S3n1EcAlFad0ga2wWAakFl+Y5 5smKW/+WdT4fi+p2SMAg4TxaoN1CYarMOGA= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Define a new command line parameter '-r' to enable checking if all mandatory ACPI tables listed in a specification are present. The -r parameter takes an integer value to specify which specification the validation should be performed against. The parameter is used to set two Acpiview variables. An interface to access these variables is implemented in this patch. The new functionality is aimed at Arm-based platforms, however, there are no restriction on extending it to other architectures. For the 32-bit and 64-bit Arm architectures, the possible values for the -r parameter are: 0: Arm Server Base Boot Requirements 1.0, March 2016 1: Arm Server Base Boot Requirements 1.1, May 2018 2: Arm Server Base Boot Requirements 1.2, September 2019 Signed-off-by: Krzysztof Koch --- Notes: v1: - add '-r' parameter for table requirements validaiton [Krzysztof] ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.c = | 82 +++++++++++++++++++- ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.h = | 44 ++++++++++- ShellPkg/Library/UefiShellAcpiViewCommandLib/UefiShellAcpiViewCommandLib.u= ni | 14 +++- 3 files changed, 136 insertions(+), 4 deletions(-) diff --git a/ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.c b/Shel= lPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.c index de0851dd5fbae51308def95bd4964f792fb9e680..49c2e87c430d7fb57793f6405eb= ee91cb8f6cbaa 100644 --- a/ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.c +++ b/ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.c @@ -1,6 +1,6 @@ /** @file =20 - Copyright (c) 2016 - 2019, ARM Limited. All rights reserved. + Copyright (c) 2016 - 2020, ARM Limited. All rights reserved. SPDX-License-Identifier: BSD-2-Clause-Patent **/ =20 @@ -27,6 +27,8 @@ STATIC UINT32 mTableCount; STATIC UINT32 mBinTableCount; STATIC BOOLEAN mConsistencyCheck; STATIC BOOLEAN mColourHighlighting; +STATIC BOOLEAN mMandatoryTableValidate; +STATIC UINTN mMandatoryTableSpec; =20 /** An array of acpiview command line parameters. @@ -37,6 +39,7 @@ STATIC CONST SHELL_PARAM_ITEM ParamList[] =3D { {L"-h", TypeFlag}, {L"-l", TypeFlag}, {L"-s", TypeValue}, + {L"-r", TypeValue}, {NULL, TypeMax} }; =20 @@ -94,6 +97,60 @@ SetConsistencyChecking ( mConsistencyCheck =3D ConsistencyChecking; } =20 +/** + This function returns the ACPI table requirements validation flag. + + @retval TRUE if check for mandatory table presence should be performed. +**/ +BOOLEAN +GetMandatoryTableValidate ( + VOID + ) +{ + return mMandatoryTableValidate; +} + +/** + This function sets the ACPI table requirements validation flag. + + @param Validate Enable/Disable ACPI table requirements validation. +**/ +VOID +SetMandatoryTableValidate ( + BOOLEAN Validate + ) +{ + mMandatoryTableValidate =3D Validate; +} + +/** + This function returns the identifier of specification to validate ACPI t= able + requirements against. + + @return ID of specification listing mandatory tables. +**/ +UINTN +GetMandatoryTableSpec ( + VOID + ) +{ + return mMandatoryTableSpec; +} + +/** + This function sets the identifier of specification to validate ACPI table + requirements against. + + @param Spec ID of specification listing mandatory tables. +**/ +VOID +SetMandatoryTableSpec ( + UINTN Spec + ) +{ + mMandatoryTableSpec =3D Spec; +} + /** This function returns the report options. =20 @@ -470,6 +527,7 @@ ShellCommandRunAcpiView ( LIST_ENTRY* Package; CHAR16* ProblemParam; SHELL_FILE_HANDLE TmpDumpFileHandle; + CONST CHAR16* MandatoryTableSpecStr; =20 // Set Defaults mReportType =3D ReportAll; @@ -479,6 +537,8 @@ ShellCommandRunAcpiView ( mSelectedAcpiTableName =3D NULL; mSelectedAcpiTableFound =3D FALSE; mConsistencyCheck =3D TRUE; + mMandatoryTableValidate =3D FALSE; + mMandatoryTableSpec =3D 0; =20 ShellStatus =3D SHELL_SUCCESS; Package =3D NULL; @@ -537,6 +597,18 @@ ShellCommandRunAcpiView ( L"-s" ); ShellStatus =3D SHELL_INVALID_PARAMETER; + } else if (ShellCommandLineGetFlag (Package, L"-r") && + ShellCommandLineGetValue (Package, L"-r") =3D=3D NULL) { + ShellPrintHiiEx ( + -1, + -1, + NULL, + STRING_TOKEN (STR_GEN_NO_VALUE), + gShellAcpiViewHiiHandle, + L"acpiview", + L"-r" + ); + ShellStatus =3D SHELL_INVALID_PARAMETER; } else if ((ShellCommandLineGetFlag (Package, L"-s") && ShellCommandLineGetFlag (Package, L"-l"))) { ShellPrintHiiEx ( @@ -568,6 +640,14 @@ ShellCommandRunAcpiView ( // Surpress consistency checking if requested SetConsistencyChecking (!ShellCommandLineGetFlag (Package, L"-q")); =20 + // Evaluate the parameters for mandatory ACPI table presence checks + SetMandatoryTableValidate (ShellCommandLineGetFlag (Package, L"-r")); + MandatoryTableSpecStr =3D ShellCommandLineGetValue (Package, L"-r"); + + if (MandatoryTableSpecStr !=3D NULL) { + SetMandatoryTableSpec (ShellHexStrToUintn (MandatoryTableSpecStr)); + } + if (ShellCommandLineGetFlag (Package, L"-l")) { mReportType =3D ReportTableList; } else { diff --git a/ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.h b/Shel= lPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.h index b5cb274ecbf77f7ccb81d78f852caa0f50854312..be65564c86a67a03e71b11f3b2e= cde7a21016736 100644 --- a/ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.h +++ b/ShellPkg/Library/UefiShellAcpiViewCommandLib/AcpiView.h @@ -1,7 +1,7 @@ /** @file Header file for AcpiView =20 - Copyright (c) 2016 - 2019, ARM Limited. All rights reserved. + Copyright (c) 2016 - 2020, ARM Limited. All rights reserved. SPDX-License-Identifier: BSD-2-Clause-Patent **/ =20 @@ -112,6 +112,48 @@ SetConsistencyChecking ( BOOLEAN ConsistencyChecking ); =20 +/** + This function returns the ACPI table requirements validation flag. + + @retval TRUE if check for mandatory table presence should be performed. +**/ +BOOLEAN +GetMandatoryTableValidate ( + VOID + ); + +/** + This function sets the ACPI table requirements validation flag. + + @param Validate Enable/Disable ACPI table requirements validation. +**/ +VOID +SetMandatoryTableValidate ( + BOOLEAN Validate + ); + +/** + This function returns the identifier of specification to validate ACPI t= able + requirements against. + + @return ID of specification listing mandatory tables. +**/ +UINTN +GetMandatoryTableSpec ( + VOID + ); + +/** + This function sets the identifier of specification to validate ACPI table + requirements against. + + @param Spec ID of specification listing mandatory tables. +**/ +VOID +SetMandatoryTableSpec ( + UINTN Spec + ); + /** This function processes the table reporting options for the ACPI table. =20 diff --git a/ShellPkg/Library/UefiShellAcpiViewCommandLib/UefiShellAcpiView= CommandLib.uni b/ShellPkg/Library/UefiShellAcpiViewCommandLib/UefiShellAcpi= ViewCommandLib.uni index 1f07b7ae20d474be67a433ff3774a508a5289318..7cd43d0518fd0a23dc547a5cab0= d08b62602a113 100644 --- a/ShellPkg/Library/UefiShellAcpiViewCommandLib/UefiShellAcpiViewCommand= Lib.uni +++ b/ShellPkg/Library/UefiShellAcpiViewCommandLib/UefiShellAcpiViewCommand= Lib.uni @@ -1,6 +1,6 @@ // /** // -// Copyright (c) 2016 - 2019, ARM Limited. All rights reserved.
+// Copyright (c) 2016 - 2020, ARM Limited. All rights reserved.
// SPDX-License-Identifier: BSD-2-Clause-Patent // // Module Name: @@ -30,7 +30,7 @@ "Display ACPI Table information.\r\n" ".SH SYNOPSIS\r\n" " \r\n" -"ACPIVIEW [[-?] | [[-l] | [-s AcpiTable [-d]]] [-q] [-h]]\r\n" +"ACPIVIEW [[-?] | [[[[-l] | [-s AcpiTable [-d]]] [-q] [-h]] [-r Spec]]]\r\= n" " \r\n" ".SH OPTIONS\r\n" " \r\n" @@ -41,6 +41,12 @@ " -d - Generate a binary file dump of the specified AcpiTable.\r\n" " -q - Quiet. Suppress errors and warnings. Disables consistency checks.\= r\n" " -h - Enable colour highlighting.\r\n" +" -r - Validate that all required ACPI tables are installed\r\n" +" Spec : Specification to validate against.\r\n" +" For Arm, the possible values are:\r\n" +" 0 - Server Base Boot Requirements v1.0\r\n" +" 1 - Server Base Boot Requirements v1.1\r\n" +" 2 - Server Base Boot Requirements v1.2\r\n" " -? - Show help.\r\n" " \r\n" ".SH DESCRIPTION\r\n" @@ -118,6 +124,10 @@ " * To display contents of all ACPI tables:\r\n" " fs0:\> acpiview\r\n" " \r\n" +" * To check if all Server Base Boot Requirements (SBBR) v1.2 mandatory\r= \n" +" ACPI tables are installed (Arm only):\r\n" +" fs0:\> acpiview -r 2\r\n" +" \r\n" ".SH RETURNVALUES\r\n" " \r\n" "RETURN VALUES:\r\n" -- 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#56266): https://edk2.groups.io/g/devel/message/56266 Mute This Topic: https://groups.io/mt/72537309/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-