Changeset 58459 in vbox for trunk/src/VBox/Devices/EFI/Firmware/UefiCpuPkg/Universal
- Timestamp:
- Oct 28, 2015 8:17:18 PM (9 years ago)
- svn:sync-xref-src-repo-rev:
- 103761
- Location:
- trunk/src/VBox/Devices/EFI/Firmware
- Files:
-
- 3 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/VBox/Devices/EFI/Firmware
-
Property svn:mergeinfo
set to (toggle deleted branches)
/vendor/edk2/current 103735-103757
-
Property svn:mergeinfo
set to (toggle deleted branches)
-
trunk/src/VBox/Devices/EFI/Firmware/UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume.c
r48674 r58459 1 1 /** @file 2 This module produces the EFI_PEI_S3_RESUME _PPI.2 This module produces the EFI_PEI_S3_RESUME2_PPI. 3 3 This module works with StandAloneBootScriptExecutor to S3 resume to OS. 4 4 This module will excute the boot script saved during last boot and after that, 5 5 control is passed to OS waking up handler. 6 6 7 Copyright (c) 2006 - 201 1, Intel Corporation. All rights reserved.<BR>7 Copyright (c) 2006 - 2014, Intel Corporation. All rights reserved.<BR> 8 8 9 9 This program and the accompanying materials … … 48 48 #include <Library/LockBoxLib.h> 49 49 #include <IndustryStandard/Acpi.h> 50 51 /** 52 This macro aligns the address of a variable with auto storage 53 duration down to CPU_STACK_ALIGNMENT. 54 55 Since the stack grows downward, the result preserves more of the 56 stack than the original address (or the same amount), not less. 57 **/ 58 #define STACK_ALIGN_DOWN(Ptr) \ 59 ((UINTN)(Ptr) & ~(UINTN)(CPU_STACK_ALIGNMENT - 1)) 50 60 51 61 #pragma pack(1) … … 194 204 ); 195 205 206 /** 207 Set data segment selectors value including DS/ES/FS/GS/SS. 208 209 @param[in] SelectorValue Segment selector value to be set. 210 211 **/ 212 VOID 213 EFIAPI 214 AsmSetDataSelectors ( 215 IN UINT16 SelectorValue 216 ); 217 196 218 // 197 219 // Globals … … 232 254 /* 0x40 */ {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}}, 233 255 }; 256 257 #define DATA_SEGEMENT_SELECTOR 0x18 234 258 235 259 // … … 285 309 (VOID **) &VariableServices 286 310 ); 287 ASSERT_EFI_ERROR (Status); 311 if (EFI_ERROR (Status)) { 312 return; 313 } 288 314 289 315 VarSize = sizeof (EFI_PHYSICAL_ADDRESS); … … 342 368 } else { 343 369 AsciiStrnCpy (PerfData->Token, Token, PERF_TOKEN_LENGTH); 370 PerfData->Token[PERF_TOKEN_LENGTH] = '\0'; 344 371 } 345 372 if (StartTicker == 1) { … … 364 391 } 365 392 PerfHeader->S3EntryNum = (UINT32) Index; 393 } 394 395 /** 396 The function will check if current waking vector is long mode. 397 398 @param AcpiS3Context a pointer to a structure of ACPI_S3_CONTEXT 399 400 @retval TRUE Current context need long mode waking vector. 401 @retval FALSE Current context need not long mode waking vector. 402 **/ 403 BOOLEAN 404 IsLongModeWakingVector ( 405 IN ACPI_S3_CONTEXT *AcpiS3Context 406 ) 407 { 408 EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE *Facs; 409 410 Facs = (EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE *) ((UINTN) (AcpiS3Context->AcpiFacsTable)); 411 if ((Facs == NULL) || 412 (Facs->Signature != EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE_SIGNATURE) || 413 ((Facs->FirmwareWakingVector == 0) && (Facs->XFirmwareWakingVector == 0)) ) { 414 // Something wrong with FACS 415 return FALSE; 416 } 417 if (Facs->XFirmwareWakingVector != 0) { 418 if ((Facs->Version == EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE_VERSION) && 419 ((Facs->Flags & EFI_ACPI_4_0_64BIT_WAKE_SUPPORTED_F) != 0) && 420 ((Facs->Flags & EFI_ACPI_4_0_OSPM_64BIT_WAKE__F) != 0)) { 421 // Both BIOS and OS wants 64bit vector 422 if (FeaturePcdGet (PcdDxeIplSwitchToLongMode)) { 423 return TRUE; 424 } 425 } 426 } 427 return FALSE; 366 428 } 367 429 … … 391 453 AsmWriteIdtr (&PeiS3ResumeState->Idtr); 392 454 455 if (PeiS3ResumeState->ReturnStatus != EFI_SUCCESS) { 456 // 457 // Report Status code that boot script execution is failed 458 // 459 REPORT_STATUS_CODE ( 460 EFI_ERROR_CODE | EFI_ERROR_MINOR, 461 (EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_EC_S3_BOOT_SCRIPT_ERROR) 462 ); 463 } 464 465 // 466 // NOTE: Because Debug Timer interrupt and system interrupts will be disabled 467 // in BootScriptExecuteDxe, the rest code in S3ResumeBootOs() cannot be halted 468 // by soft debugger. 469 // 470 471 PERF_END (NULL, "ScriptExec", NULL, 0); 472 393 473 // 394 474 // Install BootScriptDonePpi … … 405 485 (Facs->Signature != EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE_SIGNATURE) || 406 486 ((Facs->FirmwareWakingVector == 0) && (Facs->XFirmwareWakingVector == 0)) ) { 487 // 488 // Report Status code that no valid vector is found 489 // 490 REPORT_STATUS_CODE ( 491 EFI_ERROR_CODE | EFI_ERROR_MAJOR, 492 (EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_EC_S3_OS_WAKE_ERROR) 493 ); 407 494 CpuDeadLoop (); 408 495 return ; … … 410 497 411 498 // 412 // report status code on S3 resume413 //414 REPORT_STATUS_CODE (EFI_PROGRESS_CODE, EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_PC_OS_WAKE);415 416 //417 499 // Install EndOfPeiPpi 418 500 // 419 501 Status = PeiServicesInstallPpi (&mPpiListEndOfPeiTable); 420 502 ASSERT_EFI_ERROR (Status); 503 504 // 505 // report status code on S3 resume 506 // 507 REPORT_STATUS_CODE (EFI_PROGRESS_CODE, EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_PC_OS_WAKE); 421 508 422 509 PERF_CODE ( … … 446 533 ); 447 534 } else { 535 // 536 // Report Status code that no valid waking vector is found 537 // 538 REPORT_STATUS_CODE ( 539 EFI_ERROR_CODE | EFI_ERROR_MAJOR, 540 (EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_EC_S3_OS_WAKE_ERROR) 541 ); 448 542 DEBUG (( EFI_D_ERROR, "Unsupported for 32bit DXE transfer to 64bit OS waking vector!\r\n")); 449 543 ASSERT (FALSE); 544 CpuDeadLoop (); 545 return ; 450 546 } 451 547 } else { … … 470 566 471 567 // 568 // Report Status code the failure of S3Resume 569 // 570 REPORT_STATUS_CODE ( 571 EFI_ERROR_CODE | EFI_ERROR_MAJOR, 572 (EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_EC_S3_OS_WAKE_ERROR) 573 ); 574 575 // 472 576 // Never run to here 473 577 // … … 480 584 481 585 @param S3NvsPageTableAddress PageTableAddress in ACPINvs 586 @param Build4GPageTableOnly If BIOS just build 4G page table only 482 587 **/ 483 588 VOID 484 589 RestoreS3PageTables ( 485 IN UINTN S3NvsPageTableAddress 590 IN UINTN S3NvsPageTableAddress, 591 IN BOOLEAN Build4GPageTableOnly 486 592 ) 487 593 { … … 510 616 // The assumption is : whole page table is allocated in CONTINOUS memory and CR3 points to TOP page. 511 617 // 512 DEBUG ((EFI_D_ERROR, "S3NvsPageTableAddress - %x \n", S3NvsPageTableAddress));618 DEBUG ((EFI_D_ERROR, "S3NvsPageTableAddress - %x (%x)\n", (UINTN)S3NvsPageTableAddress, (UINTN)Build4GPageTableOnly)); 513 619 514 620 // … … 553 659 } 554 660 661 // 662 // NOTE: In order to save time to create full page table, we just create 4G page table by default. 663 // And let PF handler in BootScript driver to create more on request. 664 // 665 if (Build4GPageTableOnly) { 666 PhysicalAddressBits = 32; 667 ZeroMem (PageMap, EFI_PAGES_TO_SIZE(2)); 668 } 555 669 // 556 670 // Calculate the table entries needed. … … 653 767 VOID *IdtBuffer; 654 768 PEI_S3_RESUME_STATE *PeiS3ResumeState; 769 BOOLEAN InterruptStatus; 655 770 656 771 DEBUG ((EFI_D_ERROR, "S3ResumeExecuteBootScript()\n")); … … 680 795 (VOID **) &SmmAccess 681 796 ); 682 683 DEBUG ((EFI_D_ERROR, "Close all SMRAM regions before executing boot script\n")); 684 685 for (Index = 0, Status = EFI_SUCCESS; !EFI_ERROR (Status); Index++) { 686 Status = SmmAccess->Close ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index); 687 } 688 689 DEBUG ((EFI_D_ERROR, "Lock all SMRAM regions before executing boot script\n")); 690 691 for (Index = 0, Status = EFI_SUCCESS; !EFI_ERROR (Status); Index++) { 692 Status = SmmAccess->Lock ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index); 797 if (!EFI_ERROR (Status)) { 798 DEBUG ((EFI_D_ERROR, "Close all SMRAM regions before executing boot script\n")); 799 800 for (Index = 0, Status = EFI_SUCCESS; !EFI_ERROR (Status); Index++) { 801 Status = SmmAccess->Close ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index); 802 } 803 804 DEBUG ((EFI_D_ERROR, "Lock all SMRAM regions before executing boot script\n")); 805 806 for (Index = 0, Status = EFI_SUCCESS; !EFI_ERROR (Status); Index++) { 807 Status = SmmAccess->Lock ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index); 808 } 693 809 } 694 810 } … … 709 825 IdtBuffer = AllocatePages (EFI_SIZE_TO_PAGES((IdtDescriptor->Limit + 1) + 16)); 710 826 ASSERT (IdtBuffer != NULL); 827 // 828 // Additional 16 bytes allocated to save IA32 IDT descriptor and Pei Service Table Pointer 829 // IA32 IDT descriptor will be used to setup IA32 IDT table for 32-bit Framework Boot Script code 830 // 831 ZeroMem (IdtBuffer, 16); 832 AsmReadIdtr ((IA32_DESCRIPTOR *)IdtBuffer); 711 833 CopyMem ((VOID*)((UINT8*)IdtBuffer + 16),(VOID*)(IdtDescriptor->Base), (IdtDescriptor->Limit + 1)); 712 834 IdtDescriptor->Base = (UINTN)((UINT8*)IdtBuffer + 16); … … 714 836 } 715 837 838 InterruptStatus = SaveAndDisableInterrupts (); 716 839 // 717 840 // Need to make sure the GDT is loaded with values that support long mode and real mode. 718 841 // 719 842 AsmWriteGdtr (&mGdt); 843 // 844 // update segment selectors per the new GDT. 845 // 846 AsmSetDataSelectors (DATA_SEGEMENT_SELECTOR); 847 // 848 // Restore interrupt state. 849 // 850 SetInterruptState (InterruptStatus); 720 851 721 852 // … … 727 858 PeiS3ResumeState->ReturnCs = 0x10; 728 859 PeiS3ResumeState->ReturnEntryPoint = (EFI_PHYSICAL_ADDRESS)(UINTN)S3ResumeBootOs; 729 PeiS3ResumeState->ReturnStackPointer = (EFI_PHYSICAL_ADDRESS) (UINTN)&Status;860 PeiS3ResumeState->ReturnStackPointer = (EFI_PHYSICAL_ADDRESS)STACK_ALIGN_DOWN (&Status); 730 861 // 731 862 // Save IDT 732 863 // 733 864 AsmReadIdtr (&PeiS3ResumeState->Idtr); 865 866 // 867 // Report Status Code to indicate S3 boot script execution 868 // 869 REPORT_STATUS_CODE (EFI_PROGRESS_CODE, EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_PC_S3_BOOT_SCRIPT); 870 871 PERF_START (NULL, "ScriptExec", NULL, 0); 734 872 735 873 if (FeaturePcdGet (PcdDxeIplSwitchToLongMode)) { … … 808 946 UINTN Index; 809 947 ACPI_S3_CONTEXT *AcpiS3Context; 810 EFI_PEI_READ_ONLY_VARIABLE2_PPI *VariableServices;811 948 EFI_PHYSICAL_ADDRESS TempEfiBootScriptExecutorVariable; 812 949 EFI_PHYSICAL_ADDRESS TempAcpiS3Context; … … 816 953 SMM_S3_RESUME_STATE *SmmS3ResumeState; 817 954 VOID *GuidHob; 955 BOOLEAN Build4GPageTableOnly; 956 BOOLEAN InterruptStatus; 957 958 TempAcpiS3Context = 0; 959 TempEfiBootScriptExecutorVariable = 0; 818 960 819 961 DEBUG ((EFI_D_ERROR, "Enter S3 PEIM\r\n")); 820 821 Status = PeiServicesLocatePpi (822 &gPeiSmmAccessPpiGuid,823 0,824 NULL,825 (VOID **) &SmmAccess826 );827 for (Index = 0; !EFI_ERROR (Status); Index++) {828 Status = SmmAccess->Open ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index);829 }830 831 Status = PeiServicesLocatePpi (832 &gEfiPeiReadOnlyVariable2PpiGuid,833 0,834 NULL,835 (VOID **) &VariableServices836 );837 if (EFI_ERROR (Status)) {838 return Status;839 }840 962 841 963 VarSize = sizeof (EFI_PHYSICAL_ADDRESS); … … 847 969 ASSERT_EFI_ERROR (Status); 848 970 849 AcpiS3Context = (ACPI_S3_CONTEXT *)(UINTN)TempAcpiS3Context;850 ASSERT (AcpiS3Context != NULL);851 852 971 Status = RestoreLockBox ( 853 972 &gEfiAcpiS3ContextGuid, … … 857 976 ASSERT_EFI_ERROR (Status); 858 977 859 VarSize = sizeof (TempEfiBootScriptExecutorVariable); 978 AcpiS3Context = (ACPI_S3_CONTEXT *)(UINTN)TempAcpiS3Context; 979 ASSERT (AcpiS3Context != NULL); 980 981 VarSize = sizeof (EFI_PHYSICAL_ADDRESS); 860 982 Status = RestoreLockBox ( 861 983 &gEfiBootScriptExecutorVariableGuid, … … 873 995 874 996 EfiBootScriptExecutorVariable = (BOOT_SCRIPT_EXECUTOR_VARIABLE *) (UINTN) TempEfiBootScriptExecutorVariable; 997 ASSERT (EfiBootScriptExecutorVariable != NULL); 875 998 876 999 DEBUG (( EFI_D_ERROR, "AcpiS3Context = %x\n", AcpiS3Context)); 877 1000 DEBUG (( EFI_D_ERROR, "Waking Vector = %x\n", ((EFI_ACPI_2_0_FIRMWARE_ACPI_CONTROL_STRUCTURE *) ((UINTN) (AcpiS3Context->AcpiFacsTable)))->FirmwareWakingVector)); 878 1001 DEBUG (( EFI_D_ERROR, "AcpiS3Context->AcpiFacsTable = %x\n", AcpiS3Context->AcpiFacsTable)); 1002 DEBUG (( EFI_D_ERROR, "AcpiS3Context->IdtrProfile = %x\n", AcpiS3Context->IdtrProfile)); 879 1003 DEBUG (( EFI_D_ERROR, "AcpiS3Context->S3NvsPageTableAddress = %x\n", AcpiS3Context->S3NvsPageTableAddress)); 880 1004 DEBUG (( EFI_D_ERROR, "AcpiS3Context->S3DebugBufferAddress = %x\n", AcpiS3Context->S3DebugBufferAddress)); 1005 DEBUG (( EFI_D_ERROR, "AcpiS3Context->BootScriptStackBase = %x\n", AcpiS3Context->BootScriptStackBase)); 1006 DEBUG (( EFI_D_ERROR, "AcpiS3Context->BootScriptStackSize = %x\n", AcpiS3Context->BootScriptStackSize)); 881 1007 DEBUG (( EFI_D_ERROR, "EfiBootScriptExecutorVariable->BootScriptExecutorEntrypoint = %x\n", EfiBootScriptExecutorVariable->BootScriptExecutorEntrypoint)); 882 1008 … … 897 1023 // Need reconstruct page table here, since we do not trust ACPINvs. 898 1024 // 899 RestoreS3PageTables ((UINTN)AcpiS3Context->S3NvsPageTableAddress); 1025 if (IsLongModeWakingVector (AcpiS3Context)) { 1026 Build4GPageTableOnly = FALSE; 1027 } else { 1028 Build4GPageTableOnly = TRUE; 1029 } 1030 RestoreS3PageTables ((UINTN)AcpiS3Context->S3NvsPageTableAddress, Build4GPageTableOnly); 900 1031 } 901 1032 … … 905 1036 GuidHob = GetFirstGuidHob (&gEfiAcpiVariableGuid); 906 1037 if (GuidHob != NULL) { 1038 Status = PeiServicesLocatePpi ( 1039 &gPeiSmmAccessPpiGuid, 1040 0, 1041 NULL, 1042 (VOID **) &SmmAccess 1043 ); 1044 for (Index = 0; !EFI_ERROR (Status); Index++) { 1045 Status = SmmAccess->Open ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index); 1046 } 1047 907 1048 SmramDescriptor = (EFI_SMRAM_DESCRIPTOR *) GET_GUID_HOB_DATA (GuidHob); 908 1049 SmmS3ResumeState = (SMM_S3_RESUME_STATE *)(UINTN)SmramDescriptor->CpuStart; … … 912 1053 SmmS3ResumeState->ReturnContext1 = (EFI_PHYSICAL_ADDRESS)(UINTN)AcpiS3Context; 913 1054 SmmS3ResumeState->ReturnContext2 = (EFI_PHYSICAL_ADDRESS)(UINTN)EfiBootScriptExecutorVariable; 914 SmmS3ResumeState->ReturnStackPointer = (EFI_PHYSICAL_ADDRESS) (UINTN)&Status;1055 SmmS3ResumeState->ReturnStackPointer = (EFI_PHYSICAL_ADDRESS)STACK_ALIGN_DOWN (&Status); 915 1056 916 1057 DEBUG (( EFI_D_ERROR, "SMM S3 Signature = %x\n", SmmS3ResumeState->Signature)); … … 928 1069 DEBUG (( EFI_D_ERROR, "SMM S3 Smst = %x\n", SmmS3ResumeState->Smst)); 929 1070 930 //931 // Disable interrupt of Debug timer.932 //933 SaveAndSetDebugTimerInterrupt (FALSE);934 935 1071 if (SmmS3ResumeState->Signature == SMM_S3_RESUME_SMM_32) { 936 1072 SwitchStack ( … … 946 1082 // 947 1083 1084 InterruptStatus = SaveAndDisableInterrupts (); 948 1085 // 949 1086 // Need to make sure the GDT is loaded with values that support long mode and real mode. 950 1087 // 951 1088 AsmWriteGdtr (&mGdt); 1089 // 1090 // update segment selectors per the new GDT. 1091 // 1092 AsmSetDataSelectors (DATA_SEGEMENT_SELECTOR); 1093 // 1094 // Restore interrupt state. 1095 // 1096 SetInterruptState (InterruptStatus); 1097 952 1098 AsmWriteCr3 ((UINTN)SmmS3ResumeState->SmmS3Cr3); 1099 1100 // 1101 // Disable interrupt of Debug timer, since IDT table cannot work in long mode. 1102 // NOTE: On x64 platforms, because DisablePaging64() will disable interrupts, 1103 // the code in S3ResumeExecuteBootScript() cannot be halted by soft debugger. 1104 // 1105 SaveAndSetDebugTimerInterrupt (FALSE); 1106 953 1107 AsmEnablePaging64 ( 954 1108 0x38, -
trunk/src/VBox/Devices/EFI/Firmware/UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf
r48674 r58459 1 1 ## @file 2 # S3 Resume Module: 2 # S3 Resume Module installs EFI_PEI_S3_RESUME2_PPI. 3 # 3 4 # This module works with StandAloneBootScriptExecutor to S3 resume to OS. 4 5 # This module will excute the boot script saved during last boot and after that, 5 6 # control is passed to OS waking up handler. 6 7 # 7 # Copyright (c) 2010 - 201 1, Intel Corporation. All rights reserved.<BR>8 # Copyright (c) 2010 - 2014, Intel Corporation. All rights reserved.<BR> 8 9 # 9 10 # This program and the accompanying materials are … … 20 21 INF_VERSION = 0x00010005 21 22 BASE_NAME = S3Resume2Pei 23 MODULE_UNI_FILE = S3Resume2Pei.uni 22 24 FILE_GUID = 89E549B0-7CFE-449d-9BA3-10D8B2312D71 23 25 MODULE_TYPE = PEIM … … 33 35 [Sources] 34 36 S3Resume.c 37 38 [Sources.IA32] 39 Ia32/AsmFuncs.asm 40 Ia32/AsmFuncs.S | GCC 41 42 [Sources.X64] 43 X64/AsmFuncs.asm 44 X64/AsmFuncs.S | GCC 35 45 36 46 [Packages] … … 59 69 60 70 [Guids] 61 gEfiBootScriptExecutorVariableGuid # SOMETIMES_CONSUMED 62 gEfiBootScriptExecutorContextGuid # SOMETIMES_CONSUMED 63 gPerformanceProtocolGuid # ALWAYS_CONSUMED L"PerfDataMemAddr" 64 gEfiAcpiVariableGuid # ALWAYS_CONSUMED Hob: GUID_EXTENSION 65 gEfiAcpiS3ContextGuid # ALWAYS_CONSUMED 71 gEfiBootScriptExecutorVariableGuid ## SOMETIMES_CONSUMES ## UNDEFINED # LockBox 72 gEfiBootScriptExecutorContextGuid ## SOMETIMES_CONSUMES ## UNDEFINED # LockBox 73 gPerformanceProtocolGuid ## SOMETIMES_CONSUMES ## Variable:L"PerfDataMemAddr" 74 ## SOMETIMES_CONSUMES ## HOB 75 ## SOMETIMES_CONSUMES ## UNDEFINED # LockBox 76 gEfiAcpiVariableGuid 77 gEfiAcpiS3ContextGuid ## SOMETIMES_CONSUMES ## UNDEFINED # LockBox 66 78 67 79 [Ppis] 68 gEfiPeiReadOnlyVariable2PpiGuid # PPI ALWAYS_CONSUMED69 gEfiPeiS3Resume2PpiGuid # PPI ALWAYS_PRODUCED70 gPeiSmmAccessPpiGuid # PPI ALWAYS_CONSUMED71 gPeiPostScriptTablePpiGuid # PPI ALWAYS_PRODUCED72 gEfiEndOfPeiSignalPpiGuid # PPI ALWAYS_PRODUCED80 gEfiPeiReadOnlyVariable2PpiGuid ## CONSUMES 81 gEfiPeiS3Resume2PpiGuid ## PRODUCES 82 gPeiSmmAccessPpiGuid ## SOMETIMES_CONSUMES 83 gPeiPostScriptTablePpiGuid ## SOMETIMES_PRODUCES 84 gEfiEndOfPeiSignalPpiGuid ## SOMETIMES_PRODUCES 73 85 74 86 [FeaturePcd] 75 gEfiMdeModulePkgTokenSpaceGuid.PcdDxeIplSwitchToLongMode 76 gEfiMdeModulePkgTokenSpaceGuid.PcdFrameworkCompatibilitySupport 87 gEfiMdeModulePkgTokenSpaceGuid.PcdDxeIplSwitchToLongMode ## CONSUMES 88 gEfiMdeModulePkgTokenSpaceGuid.PcdFrameworkCompatibilitySupport ## CONSUMES 77 89 78 90 [Pcd] 79 gEfiMdeModulePkgTokenSpaceGuid.PcdUse1GPageTable 91 gEfiMdeModulePkgTokenSpaceGuid.PcdUse1GPageTable ## SOMETIMES_CONSUMES 80 92 81 93 [Depex] 82 gEfiPeiReadOnlyVariable2PpiGuid 94 TRUE 95 96 [UserExtensions.TianoCore."ExtraFiles"] 97 S3Resume2PeiExtra.uni
Note:
See TracChangeset
for help on using the changeset viewer.