VirtualBox

Ignore:
Timestamp:
Oct 28, 2015 8:17:18 PM (9 years ago)
Author:
vboxsync
svn:sync-xref-src-repo-rev:
103761
Message:

EFI/Firmware: 'svn merge /vendor/edk2/UDK2010.SR1 /vendor/edk2/current .', reverting and removing files+dirs listed in ReadMe.vbox, resolving conflicts with help from ../UDK2014.SP1/. This is a raw untested merge.

Location:
trunk/src/VBox/Devices/EFI/Firmware
Files:
3 edited

Legend:

Unmodified
Added
Removed
  • trunk/src/VBox/Devices/EFI/Firmware

  • trunk/src/VBox/Devices/EFI/Firmware/UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume.c

    r48674 r58459  
    11/** @file
    2   This module produces the EFI_PEI_S3_RESUME_PPI.
     2  This module produces the EFI_PEI_S3_RESUME2_PPI.
    33  This module works with StandAloneBootScriptExecutor to S3 resume to OS.
    44  This module will excute the boot script saved during last boot and after that,
    55  control is passed to OS waking up handler.
    66
    7   Copyright (c) 2006 - 2011, Intel Corporation. All rights reserved.<BR>
     7  Copyright (c) 2006 - 2014, Intel Corporation. All rights reserved.<BR>
    88
    99  This program and the accompanying materials
     
    4848#include <Library/LockBoxLib.h>
    4949#include <IndustryStandard/Acpi.h>
     50
     51/**
     52  This macro aligns the address of a variable with auto storage
     53  duration down to CPU_STACK_ALIGNMENT.
     54
     55  Since the stack grows downward, the result preserves more of the
     56  stack than the original address (or the same amount), not less.
     57**/
     58#define STACK_ALIGN_DOWN(Ptr) \
     59          ((UINTN)(Ptr) & ~(UINTN)(CPU_STACK_ALIGNMENT - 1))
    5060
    5161#pragma pack(1)
     
    194204  );
    195205
     206/**
     207  Set data segment selectors value including DS/ES/FS/GS/SS.
     208
     209  @param[in]  SelectorValue      Segment selector value to be set.
     210
     211**/
     212VOID
     213EFIAPI
     214AsmSetDataSelectors (
     215  IN UINT16   SelectorValue
     216  );
     217
    196218//
    197219// Globals
     
    232254/* 0x40 */  {{0,      0,  0,  0,    0,  0,  0,  0,    0,  0, 0,  0,  0}},
    233255};
     256
     257#define DATA_SEGEMENT_SELECTOR        0x18
    234258
    235259//
     
    285309             (VOID **) &VariableServices
    286310             );
    287   ASSERT_EFI_ERROR (Status);
     311  if (EFI_ERROR (Status)) {
     312    return;
     313  }
    288314
    289315  VarSize   = sizeof (EFI_PHYSICAL_ADDRESS);
     
    342368      } else {
    343369        AsciiStrnCpy (PerfData->Token, Token, PERF_TOKEN_LENGTH);
     370        PerfData->Token[PERF_TOKEN_LENGTH] = '\0';
    344371      }
    345372      if (StartTicker == 1) {
     
    364391  }
    365392  PerfHeader->S3EntryNum = (UINT32) Index;
     393}
     394
     395/**
     396  The function will check if current waking vector is long mode.
     397
     398  @param  AcpiS3Context                 a pointer to a structure of ACPI_S3_CONTEXT
     399
     400  @retval TRUE   Current context need long mode waking vector.
     401  @retval FALSE  Current context need not long mode waking vector.
     402**/
     403BOOLEAN
     404IsLongModeWakingVector (
     405  IN ACPI_S3_CONTEXT                *AcpiS3Context
     406  )
     407{
     408  EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE  *Facs;
     409
     410  Facs = (EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE *) ((UINTN) (AcpiS3Context->AcpiFacsTable));
     411  if ((Facs == NULL) ||
     412      (Facs->Signature != EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE_SIGNATURE) ||
     413      ((Facs->FirmwareWakingVector == 0) && (Facs->XFirmwareWakingVector == 0)) ) {
     414    // Something wrong with FACS
     415    return FALSE;
     416  }
     417  if (Facs->XFirmwareWakingVector != 0) {
     418    if ((Facs->Version == EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE_VERSION) &&
     419        ((Facs->Flags & EFI_ACPI_4_0_64BIT_WAKE_SUPPORTED_F) != 0) &&
     420        ((Facs->Flags & EFI_ACPI_4_0_OSPM_64BIT_WAKE__F) != 0)) {
     421      // Both BIOS and OS wants 64bit vector
     422      if (FeaturePcdGet (PcdDxeIplSwitchToLongMode)) {
     423        return TRUE;
     424      }
     425    }
     426  }
     427  return FALSE;
    366428}
    367429
     
    391453  AsmWriteIdtr (&PeiS3ResumeState->Idtr);
    392454
     455  if (PeiS3ResumeState->ReturnStatus != EFI_SUCCESS) {
     456    //
     457    // Report Status code that boot script execution is failed
     458    //
     459    REPORT_STATUS_CODE (
     460      EFI_ERROR_CODE | EFI_ERROR_MINOR,
     461      (EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_EC_S3_BOOT_SCRIPT_ERROR)
     462      );
     463  }
     464
     465  //
     466  // NOTE: Because Debug Timer interrupt and system interrupts will be disabled
     467  // in BootScriptExecuteDxe, the rest code in S3ResumeBootOs() cannot be halted
     468  // by soft debugger.
     469  //
     470
     471  PERF_END (NULL, "ScriptExec", NULL, 0);
     472
    393473  //
    394474  // Install BootScriptDonePpi
     
    405485      (Facs->Signature != EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE_SIGNATURE) ||
    406486      ((Facs->FirmwareWakingVector == 0) && (Facs->XFirmwareWakingVector == 0)) ) {
     487    //
     488    // Report Status code that no valid vector is found
     489    //
     490    REPORT_STATUS_CODE (
     491      EFI_ERROR_CODE | EFI_ERROR_MAJOR,
     492      (EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_EC_S3_OS_WAKE_ERROR)
     493      );
    407494    CpuDeadLoop ();
    408495    return ;
     
    410497
    411498  //
    412   // report status code on S3 resume
    413   //
    414   REPORT_STATUS_CODE (EFI_PROGRESS_CODE, EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_PC_OS_WAKE);
    415 
    416   //
    417499  // Install EndOfPeiPpi
    418500  //
    419501  Status = PeiServicesInstallPpi (&mPpiListEndOfPeiTable);
    420502  ASSERT_EFI_ERROR (Status);
     503
     504  //
     505  // report status code on S3 resume
     506  //
     507  REPORT_STATUS_CODE (EFI_PROGRESS_CODE, EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_PC_OS_WAKE);
    421508
    422509  PERF_CODE (
     
    446533          );
    447534      } else {
     535        //
     536        // Report Status code that no valid waking vector is found
     537        //
     538        REPORT_STATUS_CODE (
     539          EFI_ERROR_CODE | EFI_ERROR_MAJOR,
     540          (EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_EC_S3_OS_WAKE_ERROR)
     541          );
    448542        DEBUG (( EFI_D_ERROR, "Unsupported for 32bit DXE transfer to 64bit OS waking vector!\r\n"));
    449543        ASSERT (FALSE);
     544        CpuDeadLoop ();
     545        return ;
    450546      }
    451547    } else {
     
    470566
    471567  //
     568  // Report Status code the failure of S3Resume
     569  //
     570  REPORT_STATUS_CODE (
     571    EFI_ERROR_CODE | EFI_ERROR_MAJOR,
     572    (EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_EC_S3_OS_WAKE_ERROR)
     573    );
     574
     575  //
    472576  // Never run to here
    473577  //
     
    480584
    481585  @param S3NvsPageTableAddress   PageTableAddress in ACPINvs
     586  @param Build4GPageTableOnly    If BIOS just build 4G page table only
    482587**/
    483588VOID
    484589RestoreS3PageTables (
    485   IN UINTN                                         S3NvsPageTableAddress
     590  IN UINTN                                         S3NvsPageTableAddress,
     591  IN BOOLEAN                                       Build4GPageTableOnly
    486592  )
    487593{
     
    510616    // The assumption is : whole page table is allocated in CONTINOUS memory and CR3 points to TOP page.
    511617    //
    512     DEBUG ((EFI_D_ERROR, "S3NvsPageTableAddress - %x\n", S3NvsPageTableAddress));
     618    DEBUG ((EFI_D_ERROR, "S3NvsPageTableAddress - %x (%x)\n", (UINTN)S3NvsPageTableAddress, (UINTN)Build4GPageTableOnly));
    513619
    514620    //
     
    553659    }
    554660
     661    //
     662    // NOTE: In order to save time to create full page table, we just create 4G page table by default.
     663    // And let PF handler in BootScript driver to create more on request.
     664    //
     665    if (Build4GPageTableOnly) {
     666      PhysicalAddressBits = 32;
     667      ZeroMem (PageMap, EFI_PAGES_TO_SIZE(2));
     668    }
    555669    //
    556670    // Calculate the table entries needed.
     
    653767  VOID                       *IdtBuffer;
    654768  PEI_S3_RESUME_STATE        *PeiS3ResumeState;
     769  BOOLEAN                    InterruptStatus;
    655770
    656771  DEBUG ((EFI_D_ERROR, "S3ResumeExecuteBootScript()\n"));
     
    680795                              (VOID **) &SmmAccess
    681796                              );
    682 
    683     DEBUG ((EFI_D_ERROR, "Close all SMRAM regions before executing boot script\n"));
    684 
    685     for (Index = 0, Status = EFI_SUCCESS; !EFI_ERROR (Status); Index++) {
    686       Status = SmmAccess->Close ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index);
    687     }
    688 
    689     DEBUG ((EFI_D_ERROR, "Lock all SMRAM regions before executing boot script\n"));
    690 
    691     for (Index = 0, Status = EFI_SUCCESS; !EFI_ERROR (Status); Index++) {
    692       Status = SmmAccess->Lock ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index);
     797    if (!EFI_ERROR (Status)) {
     798      DEBUG ((EFI_D_ERROR, "Close all SMRAM regions before executing boot script\n"));
     799 
     800      for (Index = 0, Status = EFI_SUCCESS; !EFI_ERROR (Status); Index++) {
     801        Status = SmmAccess->Close ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index);
     802      }
     803
     804      DEBUG ((EFI_D_ERROR, "Lock all SMRAM regions before executing boot script\n"));
     805 
     806      for (Index = 0, Status = EFI_SUCCESS; !EFI_ERROR (Status); Index++) {
     807        Status = SmmAccess->Lock ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index);
     808      }
    693809    }
    694810  }
     
    709825    IdtBuffer = AllocatePages (EFI_SIZE_TO_PAGES((IdtDescriptor->Limit + 1) + 16));
    710826    ASSERT (IdtBuffer != NULL);
     827    //
     828    // Additional 16 bytes allocated to save IA32 IDT descriptor and Pei Service Table Pointer
     829    // IA32 IDT descriptor will be used to setup IA32 IDT table for 32-bit Framework Boot Script code
     830    //
     831    ZeroMem (IdtBuffer, 16);
     832    AsmReadIdtr ((IA32_DESCRIPTOR *)IdtBuffer);
    711833    CopyMem ((VOID*)((UINT8*)IdtBuffer + 16),(VOID*)(IdtDescriptor->Base), (IdtDescriptor->Limit + 1));
    712834    IdtDescriptor->Base = (UINTN)((UINT8*)IdtBuffer + 16);
     
    714836  }
    715837
     838  InterruptStatus = SaveAndDisableInterrupts ();
    716839  //
    717840  // Need to make sure the GDT is loaded with values that support long mode and real mode.
    718841  //
    719842  AsmWriteGdtr (&mGdt);
     843  //
     844  // update segment selectors per the new GDT.
     845  //
     846  AsmSetDataSelectors (DATA_SEGEMENT_SELECTOR);
     847  //
     848  // Restore interrupt state.
     849  //
     850  SetInterruptState (InterruptStatus);
    720851
    721852  //
     
    727858  PeiS3ResumeState->ReturnCs           = 0x10;
    728859  PeiS3ResumeState->ReturnEntryPoint   = (EFI_PHYSICAL_ADDRESS)(UINTN)S3ResumeBootOs;
    729   PeiS3ResumeState->ReturnStackPointer = (EFI_PHYSICAL_ADDRESS)(UINTN)&Status;
     860  PeiS3ResumeState->ReturnStackPointer = (EFI_PHYSICAL_ADDRESS)STACK_ALIGN_DOWN (&Status);
    730861  //
    731862  // Save IDT
    732863  //
    733864  AsmReadIdtr (&PeiS3ResumeState->Idtr);
     865 
     866  //
     867  // Report Status Code to indicate S3 boot script execution
     868  //
     869  REPORT_STATUS_CODE (EFI_PROGRESS_CODE, EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_PC_S3_BOOT_SCRIPT);
     870
     871  PERF_START (NULL, "ScriptExec", NULL, 0);
    734872
    735873  if (FeaturePcdGet (PcdDxeIplSwitchToLongMode)) {
     
    808946  UINTN                                         Index;
    809947  ACPI_S3_CONTEXT                               *AcpiS3Context;
    810   EFI_PEI_READ_ONLY_VARIABLE2_PPI               *VariableServices;
    811948  EFI_PHYSICAL_ADDRESS                          TempEfiBootScriptExecutorVariable;
    812949  EFI_PHYSICAL_ADDRESS                          TempAcpiS3Context;
     
    816953  SMM_S3_RESUME_STATE                           *SmmS3ResumeState;
    817954  VOID                                          *GuidHob;
     955  BOOLEAN                                       Build4GPageTableOnly;
     956  BOOLEAN                                       InterruptStatus;
     957
     958  TempAcpiS3Context = 0;
     959  TempEfiBootScriptExecutorVariable = 0;
    818960
    819961  DEBUG ((EFI_D_ERROR, "Enter S3 PEIM\r\n"));
    820 
    821   Status = PeiServicesLocatePpi (
    822                             &gPeiSmmAccessPpiGuid,
    823                             0,
    824                             NULL,
    825                             (VOID **) &SmmAccess
    826                             );
    827   for (Index = 0; !EFI_ERROR (Status); Index++) {
    828     Status = SmmAccess->Open ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index);
    829   }
    830 
    831   Status = PeiServicesLocatePpi (
    832                             &gEfiPeiReadOnlyVariable2PpiGuid,
    833                             0,
    834                             NULL,
    835                             (VOID **) &VariableServices
    836                             );
    837   if (EFI_ERROR (Status)) {
    838     return Status;
    839   }
    840962
    841963  VarSize = sizeof (EFI_PHYSICAL_ADDRESS);
     
    847969  ASSERT_EFI_ERROR (Status);
    848970
    849   AcpiS3Context = (ACPI_S3_CONTEXT *)(UINTN)TempAcpiS3Context;
    850   ASSERT (AcpiS3Context != NULL);
    851 
    852971  Status = RestoreLockBox (
    853972             &gEfiAcpiS3ContextGuid,
     
    857976  ASSERT_EFI_ERROR (Status);
    858977
    859   VarSize   = sizeof (TempEfiBootScriptExecutorVariable);
     978  AcpiS3Context = (ACPI_S3_CONTEXT *)(UINTN)TempAcpiS3Context;
     979  ASSERT (AcpiS3Context != NULL);
     980
     981  VarSize   = sizeof (EFI_PHYSICAL_ADDRESS);
    860982  Status = RestoreLockBox (
    861983             &gEfiBootScriptExecutorVariableGuid,
     
    873995
    874996  EfiBootScriptExecutorVariable = (BOOT_SCRIPT_EXECUTOR_VARIABLE *) (UINTN) TempEfiBootScriptExecutorVariable;
     997  ASSERT (EfiBootScriptExecutorVariable != NULL);
    875998
    876999  DEBUG (( EFI_D_ERROR, "AcpiS3Context = %x\n", AcpiS3Context));
    8771000  DEBUG (( EFI_D_ERROR, "Waking Vector = %x\n", ((EFI_ACPI_2_0_FIRMWARE_ACPI_CONTROL_STRUCTURE *) ((UINTN) (AcpiS3Context->AcpiFacsTable)))->FirmwareWakingVector));
    8781001  DEBUG (( EFI_D_ERROR, "AcpiS3Context->AcpiFacsTable = %x\n", AcpiS3Context->AcpiFacsTable));
     1002  DEBUG (( EFI_D_ERROR, "AcpiS3Context->IdtrProfile = %x\n", AcpiS3Context->IdtrProfile)); 
    8791003  DEBUG (( EFI_D_ERROR, "AcpiS3Context->S3NvsPageTableAddress = %x\n", AcpiS3Context->S3NvsPageTableAddress));
    8801004  DEBUG (( EFI_D_ERROR, "AcpiS3Context->S3DebugBufferAddress = %x\n", AcpiS3Context->S3DebugBufferAddress));
     1005  DEBUG (( EFI_D_ERROR, "AcpiS3Context->BootScriptStackBase = %x\n", AcpiS3Context->BootScriptStackBase));
     1006  DEBUG (( EFI_D_ERROR, "AcpiS3Context->BootScriptStackSize = %x\n", AcpiS3Context->BootScriptStackSize));
    8811007  DEBUG (( EFI_D_ERROR, "EfiBootScriptExecutorVariable->BootScriptExecutorEntrypoint = %x\n", EfiBootScriptExecutorVariable->BootScriptExecutorEntrypoint));
    8821008
     
    8971023    // Need reconstruct page table here, since we do not trust ACPINvs.
    8981024    //
    899     RestoreS3PageTables ((UINTN)AcpiS3Context->S3NvsPageTableAddress);
     1025    if (IsLongModeWakingVector (AcpiS3Context)) {
     1026      Build4GPageTableOnly = FALSE;
     1027    } else {
     1028      Build4GPageTableOnly = TRUE;
     1029    }
     1030    RestoreS3PageTables ((UINTN)AcpiS3Context->S3NvsPageTableAddress, Build4GPageTableOnly);
    9001031  }
    9011032
     
    9051036  GuidHob = GetFirstGuidHob (&gEfiAcpiVariableGuid);
    9061037  if (GuidHob != NULL) {
     1038    Status = PeiServicesLocatePpi (
     1039                              &gPeiSmmAccessPpiGuid,
     1040                              0,
     1041                              NULL,
     1042                              (VOID **) &SmmAccess
     1043                              );
     1044    for (Index = 0; !EFI_ERROR (Status); Index++) {
     1045      Status = SmmAccess->Open ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index);
     1046    }
     1047
    9071048    SmramDescriptor = (EFI_SMRAM_DESCRIPTOR *) GET_GUID_HOB_DATA (GuidHob);
    9081049    SmmS3ResumeState = (SMM_S3_RESUME_STATE *)(UINTN)SmramDescriptor->CpuStart;
     
    9121053    SmmS3ResumeState->ReturnContext1     = (EFI_PHYSICAL_ADDRESS)(UINTN)AcpiS3Context;
    9131054    SmmS3ResumeState->ReturnContext2     = (EFI_PHYSICAL_ADDRESS)(UINTN)EfiBootScriptExecutorVariable;
    914     SmmS3ResumeState->ReturnStackPointer = (EFI_PHYSICAL_ADDRESS)(UINTN)&Status;
     1055    SmmS3ResumeState->ReturnStackPointer = (EFI_PHYSICAL_ADDRESS)STACK_ALIGN_DOWN (&Status);
    9151056
    9161057    DEBUG (( EFI_D_ERROR, "SMM S3 Signature                = %x\n", SmmS3ResumeState->Signature));
     
    9281069    DEBUG (( EFI_D_ERROR, "SMM S3 Smst                     = %x\n", SmmS3ResumeState->Smst));
    9291070
    930     //
    931     // Disable interrupt of Debug timer.
    932     //
    933     SaveAndSetDebugTimerInterrupt (FALSE);
    934 
    9351071    if (SmmS3ResumeState->Signature == SMM_S3_RESUME_SMM_32) {
    9361072      SwitchStack (
     
    9461082      //
    9471083
     1084      InterruptStatus = SaveAndDisableInterrupts ();
    9481085      //
    9491086      // Need to make sure the GDT is loaded with values that support long mode and real mode.
    9501087      //
    9511088      AsmWriteGdtr (&mGdt);
     1089      //
     1090      // update segment selectors per the new GDT.
     1091      //     
     1092      AsmSetDataSelectors (DATA_SEGEMENT_SELECTOR);
     1093      //
     1094      // Restore interrupt state.
     1095      //
     1096      SetInterruptState (InterruptStatus);
     1097
    9521098      AsmWriteCr3 ((UINTN)SmmS3ResumeState->SmmS3Cr3);
     1099
     1100      //
     1101      // Disable interrupt of Debug timer, since IDT table cannot work in long mode.
     1102      // NOTE: On x64 platforms, because DisablePaging64() will disable interrupts,
     1103      // the code in S3ResumeExecuteBootScript() cannot be halted by soft debugger.
     1104      //
     1105      SaveAndSetDebugTimerInterrupt (FALSE);
     1106
    9531107      AsmEnablePaging64 (
    9541108        0x38,
  • trunk/src/VBox/Devices/EFI/Firmware/UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf

    r48674 r58459  
    11## @file
    2 # S3 Resume Module:
     2# S3 Resume Module installs EFI_PEI_S3_RESUME2_PPI.
     3#
    34# This module works with StandAloneBootScriptExecutor to S3 resume to OS.
    45# This module will excute the boot script saved during last boot and after that,
    56# control is passed to OS waking up handler.
    67#
    7 # Copyright (c) 2010 - 2011, Intel Corporation. All rights reserved.<BR>
     8# Copyright (c) 2010 - 2014, Intel Corporation. All rights reserved.<BR>
    89#
    910# This program and the accompanying materials are
     
    2021  INF_VERSION                    = 0x00010005
    2122  BASE_NAME                      = S3Resume2Pei
     23  MODULE_UNI_FILE                = S3Resume2Pei.uni
    2224  FILE_GUID                      = 89E549B0-7CFE-449d-9BA3-10D8B2312D71
    2325  MODULE_TYPE                    = PEIM
     
    3335[Sources]
    3436  S3Resume.c
     37
     38[Sources.IA32]
     39  Ia32/AsmFuncs.asm
     40  Ia32/AsmFuncs.S    | GCC
     41
     42[Sources.X64]
     43  X64/AsmFuncs.asm
     44  X64/AsmFuncs.S     | GCC
    3545
    3646[Packages]
     
    5969
    6070[Guids]
    61   gEfiBootScriptExecutorVariableGuid            # SOMETIMES_CONSUMED
    62   gEfiBootScriptExecutorContextGuid             # SOMETIMES_CONSUMED
    63   gPerformanceProtocolGuid                      # ALWAYS_CONSUMED L"PerfDataMemAddr"
    64   gEfiAcpiVariableGuid                          # ALWAYS_CONSUMED  Hob: GUID_EXTENSION
    65   gEfiAcpiS3ContextGuid                         # ALWAYS_CONSUMED
     71  gEfiBootScriptExecutorVariableGuid            ## SOMETIMES_CONSUMES ## UNDEFINED # LockBox
     72  gEfiBootScriptExecutorContextGuid             ## SOMETIMES_CONSUMES ## UNDEFINED # LockBox
     73  gPerformanceProtocolGuid                      ## SOMETIMES_CONSUMES ## Variable:L"PerfDataMemAddr"
     74  ## SOMETIMES_CONSUMES ## HOB
     75  ## SOMETIMES_CONSUMES ## UNDEFINED # LockBox
     76  gEfiAcpiVariableGuid
     77  gEfiAcpiS3ContextGuid                         ## SOMETIMES_CONSUMES ## UNDEFINED # LockBox
    6678
    6779[Ppis]
    68   gEfiPeiReadOnlyVariable2PpiGuid                # PPI ALWAYS_CONSUMED
    69   gEfiPeiS3Resume2PpiGuid                        # PPI ALWAYS_PRODUCED
    70   gPeiSmmAccessPpiGuid                           # PPI ALWAYS_CONSUMED
    71   gPeiPostScriptTablePpiGuid                     # PPI ALWAYS_PRODUCED
    72   gEfiEndOfPeiSignalPpiGuid                      # PPI ALWAYS_PRODUCED
     80  gEfiPeiReadOnlyVariable2PpiGuid               ## CONSUMES
     81  gEfiPeiS3Resume2PpiGuid                       ## PRODUCES
     82  gPeiSmmAccessPpiGuid                          ## SOMETIMES_CONSUMES
     83  gPeiPostScriptTablePpiGuid                    ## SOMETIMES_PRODUCES
     84  gEfiEndOfPeiSignalPpiGuid                     ## SOMETIMES_PRODUCES
    7385
    7486[FeaturePcd]
    75   gEfiMdeModulePkgTokenSpaceGuid.PcdDxeIplSwitchToLongMode
    76   gEfiMdeModulePkgTokenSpaceGuid.PcdFrameworkCompatibilitySupport
     87  gEfiMdeModulePkgTokenSpaceGuid.PcdDxeIplSwitchToLongMode         ## CONSUMES
     88  gEfiMdeModulePkgTokenSpaceGuid.PcdFrameworkCompatibilitySupport  ## CONSUMES
    7789
    7890[Pcd]
    79   gEfiMdeModulePkgTokenSpaceGuid.PcdUse1GPageTable
     91  gEfiMdeModulePkgTokenSpaceGuid.PcdUse1GPageTable  ## SOMETIMES_CONSUMES
    8092
    8193[Depex]
    82   gEfiPeiReadOnlyVariable2PpiGuid
     94  TRUE
     95
     96[UserExtensions.TianoCore."ExtraFiles"]
     97  S3Resume2PeiExtra.uni
Note: See TracChangeset for help on using the changeset viewer.

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette