From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=104.47.2.75; helo=eur01-db5-obe.outbound.protection.outlook.com; envelope-from=achin.gupta@arm.com; receiver=edk2-devel@lists.01.org Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-db5eur01on0075.outbound.protection.outlook.com [104.47.2.75]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id A6E5E203B8BFE for ; Mon, 30 Apr 2018 12:31:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=GX/LKid2MeLenYnTHx7Y0+1xEHYh+LDyhSJ/+6GudkU=; b=FAT3WSD5iWRcOsQP7HDqtisUrPnj+93yrzSM/pkaoK7AKgpe6hDfzn5MIJ+9VC/QAakeHIefjgkATPy6uH/DgoiaXunLUfANMlYnX0PzTj4PTFVQpm7xIGUUjaCxw/dD6MNZukwxlranRrftEpuYNwEp5b8/6O/dbcXr8GgDx8s= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Achin.Gupta@arm.com; Received: from e104320-lin (217.140.96.140) by DB7PR08MB2987.eurprd08.prod.outlook.com (2603:10a6:5:1c::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.715.23; Mon, 30 Apr 2018 19:30:58 +0000 Date: Mon, 30 Apr 2018 20:32:26 +0100 From: Achin Gupta To: Supreeth Venkatesh Cc: edk2-devel@lists.01.org, michael.d.kinney@intel.com, liming.gao@intel.com, jiewen.yao@intel.com, leif.lindholm@linaro.org, ard.biesheuvel@linaro.org, nd@arm.com Message-ID: <20180430193225.GY663@e104320-lin> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> <20180406144223.10931-15-supreeth.venkatesh@arm.com> MIME-Version: 1.0 In-Reply-To: <20180406144223.10931-15-supreeth.venkatesh@arm.com> User-Agent: Mutt/1.5.21 (2010-09-15) X-Originating-IP: [217.140.96.140] X-ClientProxiedBy: VI1PR0701CA0042.eurprd07.prod.outlook.com (2603:10a6:800:90::28) To DB7PR08MB2987.eurprd08.prod.outlook.com (2603:10a6:5:1c::25) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(2017052603328)(7153060)(7193020); SRVR:DB7PR08MB2987; X-Microsoft-Exchange-Diagnostics: 1; DB7PR08MB2987; 3:ytMC8scAfdJ8sstdftSZ1/Mh2nwOnQdomWSTisCLRn7NveB31GA7Dw4Alo6TOLgOcuxYTA8tPSZuctkx6qxXBpmyOvXimE/UlqYYvaNdbAh+7xx0GV7KmRWr/xSQm9p0RmG+lb9ll0JSetX992T4Q3RLaUhpthRE2Qx96DEOGooKoMVQwV7+e7ViXDOgbR9QrzCSwpyWscUZcbI3aUizc6kawf1UfL3Z2xHwzPTmWhjSzTNE9lIzBsBglOQlt3Lv; 25:ZICc1R9vLA1XanV855vd0AKkvy9Jvn9Se+gQ+MbOhEZH1ZvFv8TKD+mjvXxBkIvPPoZTpctFL24uWWNPM9IcL8lHoRySoN2vIgO8jOYTBdRhgC5xyc4LABjZpuKtOv58myUCcIxM5UGcmr78Ij6YVdp4pJX2YC4l47OFMgAGa9kUIsoAgK6tZ2bhG8HbJBWX+zXY+AABTlFIGifSQT/qVq0HW3pbcGcNpWiRSVQZZNJ3crcn4HJS81sV+VR8SebKEaD9fhFsgzxGExe8AYU2rghifUzJ4tzJEN2qMsQVmSYQE1LhNlHGfuXWAvCSH58bWWM35G3dazcgQkrLRpJA3g==; 31:jIVI8SBvYhMoIwXgd/LOPRlZU0jOyeSqQX5wieZasye7g+/wG2UYjZvxvBeIju+YITEIUwLJUr9moLo544IQkaLB5k1m/A4pv/vdMCDJSD316MoFls0Ui5OBikvfpyLv87LWVCG7LDYHCy008rorEbTSoFzds86P0ToO+wMfZyp30gw+bPn9p8Xf7eHyF0CR3MH5CKWB2tAkKYzwgJ7nfzDUiDruTm01eHfKU+OgDuU= X-MS-TrafficTypeDiagnostic: DB7PR08MB2987: NoDisclaimer: True X-Microsoft-Exchange-Diagnostics: 1; DB7PR08MB2987; 20:3TmVbT4PhVQGsrWKyhh1fjsBmSq81JHwDfqlhLbqPTQ2QcG/y6k1LdErTkDJTpTgh29WNY5pVDv9xwlEOxUtCelDl17cFVek41dmRnVkw7coMYZ/CA9U1aNQnoGxzxL8I7J+SSWVAZFlqfg0N3fCe10uAkOARCGLKEaHM5UhOaEy6cteDduf9xUMykPSyhKG2u4qB3VvUUSJCpLOqZyJScdYsv6Pge00BG1StGvdZp6J6AM1hxeoli9aC664Ayr1; 4:nQ9jvvRJQ2cA7ttu45uiTqtuMUJKccY0ZShhkJVyPNmgUEHAOJWbgLml+vVmtOHV5aUguSNWwEI6nv1M6w7TAn7yKBGg325hTiNu5U+YjrSfsh2Selw5Rjw1/53Lat7Q6e2bMUI4cjn/OSLQlqMWqK9U0C8cKySQ2D8n3Cs/xN0x3ap8OlEFmLRMnNFwv8T4zdV1D6f4tseN/iP0NrGaMdNhhW16kYIK2ypB04iqGOiSPTWhF8XK9BtZzK4QSvS46nvYL8MpbEZb60lIAv6mJgMIAxexYaIpqC+A4Blm8BjF4tWKVGU3IrSbq9FsqSBf X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(180628864354917); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3002001)(10201501046)(3231254)(944501410)(52105095)(93006095)(93001095)(6055026)(6041310)(20161123558120)(20161123562045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(6072148)(201708071742011); SRVR:DB7PR08MB2987; BCL:0; PCL:0; RULEID:; SRVR:DB7PR08MB2987; X-Forefront-PRVS: 0658BAF71F X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(6029001)(346002)(39860400002)(396003)(376002)(39380400002)(366004)(189003)(199004)(16799955002)(11346002)(8676002)(81156014)(81166006)(33656002)(4326008)(8936002)(97736004)(66066001)(68736007)(6246003)(47776003)(6862004)(53376002)(486006)(956004)(53936002)(6306002)(9686003)(446003)(386003)(305945005)(6636002)(26005)(6666003)(476003)(58126008)(229853002)(7736002)(25786009)(316002)(16586007)(6496006)(16526019)(3846002)(33716001)(575784001)(55016002)(6116002)(2906002)(15188155005)(966005)(23726003)(1076002)(50466002)(33896004)(44832011)(76176011)(105586002)(86362001)(478600001)(59450400001)(106356001)(5660300001)(72206003)(52116002)(18370500001)(107986001); DIR:OUT; SFP:1101; SCL:1; SRVR:DB7PR08MB2987; H:e104320-lin; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; Received-SPF: None (protection.outlook.com: arm.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; DB7PR08MB2987; 23:ixVKOMCL76Dy2F4Q/uzd6TnKtxFzlL/sOD5342IxN?= =?us-ascii?Q?222Y84q6KrlmrlnvFQYklNjneFl1FKrfNjRedK/y7xBCPQCwhvNAfJkMsmKD?= =?us-ascii?Q?EKsI1i6Hbif3zHnpn0geOCS9s3N9xypT3uc1qrnPF7zhnln+aRHKYChxn4Kl?= =?us-ascii?Q?ikBF8zAcHFuTC/NY3O1O6AZ6jgrzoYCK/S2CGo9nBpID1Cdkv9F579uU+9oK?= =?us-ascii?Q?m9E1hXcXJrgmANVEHgfXJ8iwwKPYkRHVa65WnGG54095qwBS/77KNZxZg4Kk?= =?us-ascii?Q?8qeO66dU4OBBMsRDvNJbwYEz0/MmuxXWt1rxYe7sIOL+hH3xgg/DNdc7rsOO?= =?us-ascii?Q?qfYrZCVNiB7tcrLheVtitS27vWJmO7cJ3hJIfJimewY7K+gAvDBxiqSWDcjQ?= =?us-ascii?Q?X0U/sGqJnuzlvEyXJ2hYM7LoyhejBsHYesmUGkt7VS7PWedOzReMq3fO0s72?= =?us-ascii?Q?Y3KDA6CXUOZRID4JzK1OBxv2RQQ4PHRyB1c7spi6FXdZfNFJekORrJLrESxp?= =?us-ascii?Q?C8a+zbPPr7sN6GVOpeU8wgFhRZ3D32JGE9/u6J1xBzj8JZKIkFgfgoOgwu6j?= =?us-ascii?Q?q8YiY5UmIw5izx9DAvwqgDla74lNV/DSMQorNhLa35vu/UAW3voVkCxf3IeU?= =?us-ascii?Q?3p13ixgBH4dAWfGfGDlA5rVTrkm2fTOM2A+8XcPOdyBeixmTpv8z/SgAyt5K?= =?us-ascii?Q?Om/tgiknjFuyfpNGCBBafNmPdDFgNxYNXyYGNZOKAmdG+iQG+01jlSDRkf1Q?= =?us-ascii?Q?/Lups80scmprU9Qf6Jz5TLnrh+A4uPjurcLi1MpH8QEHDxUW6/OarOLF7TER?= =?us-ascii?Q?ybdej6QqMe153u2pDZDRGVWpduD3Co7JZ6kikWG7AqdUQ+imFwbK98KJQjzs?= =?us-ascii?Q?s1EI9dytGGpLSQg9x1smWxIlJdghQKJmzSARENXHrWWpXbFu16nfmcJBaLq0?= =?us-ascii?Q?FXu9ogTBsAyy82MWeoXS3E49J3jwkyTk1+K+dIVdsHjTu2+3stX2EPRc3/9P?= =?us-ascii?Q?r50yn3aBPXhRvAWMX3802J+xUrpb2eFIa49N/Lh9hV9Xx7dR8Umod0+Ix5Lb?= =?us-ascii?Q?9ozftEAnUuQ99LL7bcJcOYazIUf+m4zuZErl03uhDREkN1HTnX+HXJJc/9NN?= =?us-ascii?Q?QaVTkUacwq3baJLJJU3h0eEaH5cdTFuh6zPcmn80unsXCRIqZH/Gr38/r1Rj?= =?us-ascii?Q?zb7Xb1fQEjfnZ5zGZg1BBVJOAeNv2RleGeq8IIQBqvijXaixC3NzlNbMBEOq?= =?us-ascii?Q?S/o0XvhzO4w3JUpQ/pxlCjrpvBpKfB1ip9eNgq9QVXgXMY0paRq5Vq8cqgaY?= =?us-ascii?Q?jJuCYx5F9PTj2nDhVwQUY3OmPdA6lPnLXjPPKJ9eiPw0iNx/GxO8Jsq/3Ug1?= =?us-ascii?Q?0qP1cCKMsH5k/BjVkHK+5MQPubxPEu9dwpiLAaupBe1lhthR5Sipyyk377AE?= =?us-ascii?Q?ElaoBp7ReZF9b3fSonAHuvozguYUqT567LMx4Ga4Z3fXHOhxauIBDAcaOh+t?= =?us-ascii?Q?9aGGzOtQHc54yiO65UH9Z8YSMeiefIGcofgiboorFDT46f6dFOuIDCT?= X-Microsoft-Antispam-Message-Info: JSbxxaZKjXhvx9cZy2pUVVN5Go1+4YyaljoFsnakFso8wRm8kau90mShjNEf9Yrdfa1H/PmHf97uPot9h3DPCLv2rao7t5eFK5p5lCKAuFAKVYx7ZJD+N05Y4mBsXQM0c/H6vlAsxziwUJy6iE8+X8PHLeEVk2rBt0agPsrmW4rL3bx/nyQZdK8nou0D/mDS X-Microsoft-Exchange-Diagnostics: 1; DB7PR08MB2987; 6:LhPQS2ntM/yMx1hjZcWmF/EseJ+aJiCTI0fO7syVB3B/kMSsbgzWBlsSkcTxezf0KSJqf2vZp7rN+feaFUxLWMIaZKG9zvTokylre3Ab0xn9pgpRa74IXEf2K41Nnk/yKxv7TEvzBpH2TwiHMXjB+dlvk+uSZCWGmy895phVV/xJcVjOwKzzSjs3CGg/IQn+xpcUGUkcif8srG4EPQcaNLLcpUCcn6XlCXQMuxKf4El8H26ux6thIdYhLM5ee9RakIxy37RlcNR7FGKikz10hTJxUEwyWad03uU+oyJSB/fUBT8iJwsn7iZzZSyHK385RNyxnblyFisTwTYAIv80h7e2DZRtkFTKZurvgnXPhnZSsP0+iRWW9JOJ/kxza0NEwpxJmxoaKUFzG7+cuOcbw9NOTNgTCzYB5RMfAZ1eOxVO3UmOh7myHrQAF48l03OZMPlCXEN8ol/tMjfTBowoZg==; 5:7ChfmfDuC5jBi3H1B+JkV5S4GkmYrnEeg6ftBei60lEs+CSaotp8LHJXdOODR3GqpT90BLVLEfCeJXrdgt3YKRLtGsq/7DFEFbpMaoRJ5k6x31i3+tO+UtKRy+zip8n8jJSaS3A0lcDmr9INc9zEfiE4uMSS5pTzm9eqLiZfvgg=; 24:p9LoSMl5cpTrvGhu6SID4APxWQuIa0Jc8N6LRqevFQD5jZTzOq8gc84EhTFk7fp8Ylq5MAUoNVavyTnQQ4NsPG2uknx7yHXE3K5OdUvhSmY= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; DB7PR08MB2987; 7:aCnARPl+M+r0HGU5FjpDRK53J3sY1GbA3S2Aic/7aR4t7/5+2aZ/kpPTAPSiz/CSUbY+MTknbF9AydNJ9xxVNP1obP4ZLGGQ0cGoavdnIBChVwCmIv/R+C/MiUC2oIlgN2up7HNJSeINCKXFgIVRtol0vPLzRWzYUn+fiwalWvQDkcMJ8336F0v8KaaSfrtjAVdglnQHYtg9mJP9wTppRp4vyPrTcc9FHdGO+1RwJN63ZAGDmPfRTVWUb8nrT62S X-MS-Office365-Filtering-Correlation-Id: 3d76873f-aaf2-407f-dfc7-08d5aed0e700 X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Apr 2018 19:30:58.7942 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 3d76873f-aaf2-407f-dfc7-08d5aed0e700 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB2987 Subject: Re: [PATCH v1 14/18] StandaloneMmPkg: Describe the declaration, definition and fdf files. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Apr 2018 19:31:03 -0000 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Hi Supreeth, One CIL. On Fri, Apr 06, 2018 at 03:42:19PM +0100, Supreeth Venkatesh wrote: > This patch describes the package declarations, definitions and firmware > device files for creating standalone management mode image with > core/foundation and drivers. > > Contributed-under: TianoCore Contribution Agreement 1.1 > Signed-off-by: Achin Gupta > Signed-off-by: Supreeth Venkatesh > --- > StandaloneMmPkg/StandaloneMmPkg.dec | 47 +++++++++ > StandaloneMmPkg/StandaloneMmPkg.dsc | 132 ++++++++++++++++++++++++++ > StandaloneMmPkg/StandaloneMmPkg.fdf | 184 ++++++++++++++++++++++++++++++++++++ > 3 files changed, 363 insertions(+) > create mode 100644 StandaloneMmPkg/StandaloneMmPkg.dec > create mode 100644 StandaloneMmPkg/StandaloneMmPkg.dsc > create mode 100644 StandaloneMmPkg/StandaloneMmPkg.fdf > > diff --git a/StandaloneMmPkg/StandaloneMmPkg.dec b/StandaloneMmPkg/StandaloneMmPkg.dec > new file mode 100644 > index 0000000000..36521bb039 > --- /dev/null > +++ b/StandaloneMmPkg/StandaloneMmPkg.dec > @@ -0,0 +1,47 @@ > +## @file > +# This package is a platform package that provide platform module/library > +# required by Standalone MM platform. > +# > +# Copyright (c) 2016-2017, ARM Ltd. All rights reserved.
> +# > +# This program and the accompanying materials > +# are licensed and made available under the terms and conditions of the BSD License > +# which accompanies this distribution. The full text of the license may be found at > +# http://opensource.org/licenses/bsd-license.php > +# > +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, > +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. > +# > +# > + > +[Defines] > + DEC_SPECIFICATION = 0x0001001A > + PACKAGE_NAME = StandaloneMmPkg > + PACKAGE_GUID = 2AE82968-7769-4A85-A5BC-A0954CE54A5C > + PACKAGE_VERSION = 1.0 > + > +[Includes] > + Include > + > +[LibraryClasses] > + > +[Guids] > + gStandaloneMmPkgTokenSpaceGuid = { 0x18fe7632, 0xf5c8, 0x4e63, { 0x8d, 0xe8, 0x17, 0xa5, 0x5c, 0x59, 0x13, 0xbd }} > + gMpInformationHobGuid = { 0xba33f15d, 0x4000, 0x45c1, { 0x8e, 0x88, 0xf9, 0x16, 0x92, 0xd4, 0x57, 0xe3 }} > + gMmFvDispatchGuid = { 0xb65694cc, 0x09e3, 0x4c3b, { 0xb5, 0xcd, 0x05, 0xf4, 0x4d, 0x3c, 0xdb, 0xff }} > + > + ## Include/Guid/MmCoreData.h > + gMmCoreDataHobGuid = { 0xa160bf99, 0x2aa4, 0x4d7d, { 0x99, 0x93, 0x89, 0x9c, 0xb1, 0x2d, 0xf3, 0x76 }} > + > + ## Include/Guid/MmramMemoryReserve.h > + gEfiMmPeiMmramMemoryReserveGuid = { 0x0703f912, 0xbf8d, 0x4e2a, { 0xbe, 0x07, 0xab, 0x27, 0x25, 0x25, 0xc5, 0x92 }} > + > + gEfiStandaloneMmNonSecureBufferGuid = { 0xf00497e3, 0xbfa2, 0x41a1, { 0x9d, 0x29, 0x54, 0xc2, 0xe9, 0x37, 0x21, 0xc5 }} > + gEfiArmTfCpuDriverEpDescriptorGuid = { 0x6ecbd5a1, 0xc0f8, 0x4702, { 0x83, 0x01, 0x4f, 0xc2, 0xc5, 0x47, 0x0a, 0x51 }} > + > +[PcdsFeatureFlag] > + gStandaloneMmPkgTokenSpaceGuid.PcdStandaloneMmEnable|FALSE|BOOLEAN|0x00000001 > + > +[Protocols] > + gEfiMmConfigurationProtocolGuid = { 0xc109319, 0xc149, 0x450e, { 0xa3, 0xe3, 0xb9, 0xba, 0xdd, 0x9d, 0xc3, 0xa4 }} > + > diff --git a/StandaloneMmPkg/StandaloneMmPkg.dsc b/StandaloneMmPkg/StandaloneMmPkg.dsc > new file mode 100644 > index 0000000000..8cc996f6b0 > --- /dev/null > +++ b/StandaloneMmPkg/StandaloneMmPkg.dsc > @@ -0,0 +1,132 @@ > +## @file > +# Standalone MM Platform. > +# > +# Copyright (c) 2015, Intel Corporation. All rights reserved.
> +# Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.
> +# > +# This program and the accompanying materials > +# are licensed and made available under the terms and conditions of the BSD License > +# which accompanies this distribution. The full text of the license may be found at > +# http://opensource.org/licenses/bsd-license.php > +# > +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, > +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. > +# > +## > + > +################################################################################ > +# > +# Defines Section - statements that will be processed to create a Makefile. > +# > +################################################################################ > +[Defines] > + PLATFORM_NAME = StandaloneMm > + PLATFORM_GUID = 9A4BBA60-B4F9-47C7-9258-3BD77CAE9322 > + PLATFORM_VERSION = 1.0 > + DSC_SPECIFICATION = 0x00010011 > + OUTPUT_DIRECTORY = Build/StandaloneMmPkg > + SUPPORTED_ARCHITECTURES = IA32|X64|AARCH64 > + BUILD_TARGETS = DEBUG|RELEASE > + SKUID_IDENTIFIER = DEFAULT > + FLASH_DEFINITION = StandaloneMmPkg/StandaloneMmPkg.fdf > + DEFINE DEBUG_MESSAGE = TRUE > + > + # LzmaF86 > + DEFINE COMPRESSION_TOOL_GUID = D42AE6BD-1352-4bfb-909A-CA72A6EAE889 > + > +################################################################################ > +# > +# Library Class section - list of all Library Classes needed by this Platform. > +# > +################################################################################ > +[LibraryClasses] > + # > + # Basic > + # > + BaseLib|MdePkg/Library/BaseLib/BaseLib.inf > + BaseMemoryLib|MdePkg/Library/BaseMemoryLib/BaseMemoryLib.inf > + DebugLib|MdePkg/Library/BaseDebugLibSerialPort/BaseDebugLibSerialPort.inf > + DebugPrintErrorLevelLib|MdePkg/Library/BaseDebugPrintErrorLevelLib/BaseDebugPrintErrorLevelLib.inf > + FvLib|StandaloneMmPkg/Library/FvLib/FvLib.inf > + IoLib|MdePkg/Library/BaseIoLibIntrinsic/BaseIoLibIntrinsic.inf > + MemoryAllocationLib|StandaloneMmPkg/Library/MemoryAllocationLib/MemoryAllocationLib.inf > + PcdLib|MdePkg/Library/BasePcdLibNull/BasePcdLibNull.inf > + PeCoffLib|MdePkg/Library/BasePeCoffLib/BasePeCoffLib.inf > + PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf > + ReportStatusCodeLib|MdePkg/Library/BaseReportStatusCodeLibNull/BaseReportStatusCodeLibNull.inf > + > + # > + # Entry point > + # > + StandaloneMmDriverEntryPoint|StandaloneMmPkg/Library/StandaloneMmDriverEntryPoint/StandaloneMmDriverEntryPoint.inf > + > +[LibraryClasses.AARCH64] > + ArmLib|ArmPkg/Library/ArmLib/ArmBaseLib.inf > + ArmMmuLib|ArmPkg/Library/ArmMmuLib/ArmMmuSecLib.inf > + ArmSvcLib|ArmPkg/Library/ArmSvcLib/ArmSvcLib.inf > + CacheMaintenanceLib|ArmPkg/Library/ArmCacheMaintenanceLib/ArmCacheMaintenanceLib.inf > + HobLib|StandaloneMmPkg/Library/HobLib/HobLib.inf > + MemLib|StandaloneMmPkg/Library/MemLib/MemLib.inf > + PeCoffExtraActionLib|ArmPkg/Library/DebugPeCoffExtraActionLib/DebugPeCoffExtraActionLib.inf > + PL011UartLib|ArmPlatformPkg/Library/PL011UartLib/PL011UartLib.inf > + # ARM PL011 UART Driver > + SerialPortLib|ArmPlatformPkg/Library/PL011SerialPortLib/PL011SerialPortLib.inf > + > + StandaloneMmCoreEntryPoint|StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/StandaloneMmCoreEntryPoint.inf > + > +################################################################################ > +# > +# Pcd Section - list of all EDK II PCD Entries defined by this Platform > +# > +################################################################################ > +[PcdsFeatureFlag] > + gStandaloneMmPkgTokenSpaceGuid.PcdStandaloneMmEnable|TRUE > + > +[PcdsFixedAtBuild] > + gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x800000CF > + gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0xff > + gEfiMdePkgTokenSpaceGuid.PcdReportStatusCodePropertyMask|0x0f > + > +[PcdsFixedAtBuild.AARCH64] > + ## PL011 - Serial Terminal > + gEfiMdeModulePkgTokenSpaceGuid.PcdSerialRegisterBase|0x1c0b0000 > + gEfiMdePkgTokenSpaceGuid.PcdUartDefaultBaudRate|115200 > + > +################################################################################################### > +# > +# Components Section - list of the modules and components that will be processed by compilation > +# tools and the EDK II tools to generate PE32/PE32+/Coff image files. > +# > +# Note: The EDK II DSC file is not used to specify how compiled binary images get placed > +# into firmware volume images. This section is just a list of modules to compile from > +# source into UEFI-compliant binaries. > +# It is the FDF file that contains information on combining binary files into firmware > +# volume images, whose concept is beyond UEFI and is described in PI specification. > +# Binary modules do not need to be listed in this section, as they should be > +# specified in the FDF file. For example: Shell binary (Shell_Full.efi), FAT binary (Fat.efi), > +# Logo (Logo.bmp), and etc. > +# There may also be modules listed in this section that are not required in the FDF file, > +# When a module listed here is excluded from FDF file, then UEFI-compliant binary will be > +# generated for it, but the binary will not be put into any firmware volume. > +# > +################################################################################################### > +[Components.common] > + # > + # MM Core > + # > + StandaloneMmPkg/Core/StandaloneMmCore.inf > + > +[Components.AARCH64] > + StandaloneMmPkg/Drivers/CpuMm/Arm/PiMmStandloneArmTfCpuDriver.inf > + > +################################################################################################### > +# > +# BuildOptions Section - Define the module specific tool chain flags that should be used as > +# the default flags for a module. These flags are appended to any > +# standard flags that are defined by the build process. They can be > +# applied for any modules or only those modules with the specific > +# module style (EDK or EDKII) specified in [Components] section. > +# > +################################################################################################### > +[BuildOptions.Common] > +GCC:*_*_*_DLINK_FLAGS = -z common-page-size=0x1000 I think these must be AArch64 specific build options. Also as discussed, use of FP/SIMD must be disabled here. cheers, Achin > diff --git a/StandaloneMmPkg/StandaloneMmPkg.fdf b/StandaloneMmPkg/StandaloneMmPkg.fdf > new file mode 100644 > index 0000000000..7a22a51b4c > --- /dev/null > +++ b/StandaloneMmPkg/StandaloneMmPkg.fdf > @@ -0,0 +1,184 @@ > +# > +# Copyright (c) 2011 - 2017, ARM Limited. All rights reserved. > +# > +# This program and the accompanying materials > +# are licensed and made available under the terms and conditions of the BSD License > +# which accompanies this distribution. The full text of the license may be found at > +# http://opensource.org/licenses/bsd-license.php > +# > +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, > +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. > +# > + > +################################################################################ > +# > +# FD Section > +# The [FD] Section is made up of the definition statements and a > +# description of what goes into the Flash Device Image. Each FD section > +# defines one flash "device" image. A flash device image may be one of > +# the following: Removable media bootable image (like a boot floppy > +# image,) an Option ROM image (that would be "flashed" into an add-in > +# card,) a System "Flash" image (that would be burned into a system's > +# flash) or an Update ("Capsule") image that will be used to update and > +# existing system flash. > +# > +################################################################################ > + > +[FD.] > +!ifdef ARM_FVP_RUN_NORFLASH > +BaseAddress = 0x08000000|gArmTokenSpaceGuid.PcdFdBaseAddress # The base address of the Firmware in Flash0. > +!else > +BaseAddress = 0xff200000|gArmTokenSpaceGuid.PcdFdBaseAddress # UEFI in DRAM + 128MB. > +!endif > +Size = 0x00e00000|gArmTokenSpaceGuid.PcdFdSize # The size in bytes of the device (64MiB). > +ErasePolarity = 1 > + > +# This one is tricky, it must be: BlockSize * NumBlocks = Size > +BlockSize = 0x00001000 > +NumBlocks = 0x0e00 > + > +0x00000000|0x00280000 > +gArmTokenSpaceGuid.PcdFvBaseAddress|gArmTokenSpaceGuid.PcdFvSize > +FV = FVMAIN_COMPACT > + > +[FV.FVMAIN_COMPACT] > +FvAlignment = 16 > +ERASE_POLARITY = 1 > +MEMORY_MAPPED = TRUE > +STICKY_WRITE = TRUE > +LOCK_CAP = TRUE > +LOCK_STATUS = TRUE > +WRITE_DISABLED_CAP = TRUE > +WRITE_ENABLED_CAP = TRUE > +WRITE_STATUS = TRUE > +WRITE_LOCK_CAP = TRUE > +WRITE_LOCK_STATUS = TRUE > +READ_DISABLED_CAP = TRUE > +READ_ENABLED_CAP = TRUE > +READ_STATUS = TRUE > +READ_LOCK_CAP = TRUE > +READ_LOCK_STATUS = TRUE > + > +INF StandaloneMmPkg/Core/StandaloneMmCore.inf > +INF StandaloneMmPkg/Drivers/CpuMm/Arm/PiMmStandloneArmTfCpuDriver.inf > + > +################################################################################ > +# > +# Rules are use with the [FV] section's module INF type to define > +# how an FFS file is created for a given INF file. The following Rule are the default > +# rules for the different module type. User can add the customized rules to define the > +# content of the FFS file. > +# > +################################################################################ > + > + > +############################################################################ > +# Example of a DXE_DRIVER FFS file with a Checksum encapsulation section # > +############################################################################ > +# > +#[Rule.Common.DXE_DRIVER] > +# FILE DRIVER = $(NAMED_GUID) { > +# DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex > +# COMPRESS PI_STD { > +# GUIDED { > +# PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi > +# UI STRING="$(MODULE_NAME)" Optional > +# VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) > +# } > +# } > +# } > +# > +############################################################################ > + > +[Rule.Common.SEC] > + FILE SEC = $(NAMED_GUID) RELOCS_STRIPPED FIXED { > + TE TE Align = Auto $(INF_OUTPUT)/$(MODULE_NAME).efi > + } > + > +[Rule.Common.MM_CORE_STANDALONE] > + FILE SEC = $(NAMED_GUID) RELOCS_STRIPPED FIXED { > + PE32 PE32 Align = Auto $(INF_OUTPUT)/$(MODULE_NAME).efi > + } > + > +[Rule.Common.MM_STANDALONE] > + FILE MM_STANDALONE = $(NAMED_GUID) { > + SMM_DEPEX SMM_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex > + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi > + UI STRING="$(MODULE_NAME)" Optional > + VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) > + } > + > +[Rule.Common.PEI_CORE] > + FILE PEI_CORE = $(NAMED_GUID) FIXED { > + TE TE Align = Auto $(INF_OUTPUT)/$(MODULE_NAME).efi > + UI STRING ="$(MODULE_NAME)" Optional > + } > + > +[Rule.Common.PEIM] > + FILE PEIM = $(NAMED_GUID) FIXED { > + PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex > + TE TE Align = Auto $(INF_OUTPUT)/$(MODULE_NAME).efi > + UI STRING="$(MODULE_NAME)" Optional > + } > + > +[Rule.Common.PEIM.TIANOCOMPRESSED] > + FILE PEIM = $(NAMED_GUID) DEBUG_MYTOOLS_IA32 { > + PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex > + GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED = TRUE { > + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi > + UI STRING="$(MODULE_NAME)" Optional > + } > + } > + > +[Rule.Common.DXE_CORE] > + FILE DXE_CORE = $(NAMED_GUID) { > + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi > + UI STRING="$(MODULE_NAME)" Optional > + } > + > +[Rule.Common.UEFI_DRIVER] > + FILE DRIVER = $(NAMED_GUID) { > + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex > + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi > + UI STRING="$(MODULE_NAME)" Optional > + } > + > +[Rule.Common.DXE_DRIVER] > + FILE DRIVER = $(NAMED_GUID) { > + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex > + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi > + UI STRING="$(MODULE_NAME)" Optional > + } > + > +[Rule.Common.DXE_RUNTIME_DRIVER] > + FILE DRIVER = $(NAMED_GUID) { > + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex > + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi > + UI STRING="$(MODULE_NAME)" Optional > + } > + > +[Rule.Common.UEFI_APPLICATION] > + FILE APPLICATION = $(NAMED_GUID) { > + UI STRING ="$(MODULE_NAME)" Optional > + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi > + } > + > +[Rule.Common.UEFI_DRIVER.BINARY] > + FILE DRIVER = $(NAMED_GUID) { > + DXE_DEPEX DXE_DEPEX Optional |.depex > + PE32 PE32 |.efi > + UI STRING="$(MODULE_NAME)" Optional > + VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) > + } > + > +[Rule.Common.UEFI_APPLICATION.BINARY] > + FILE APPLICATION = $(NAMED_GUID) { > + PE32 PE32 |.efi > + UI STRING="$(MODULE_NAME)" Optional > + VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) > + } > + > +[Rule.Common.USER_DEFINED.ACPITABLE] > + FILE FREEFORM = $(NAMED_GUID) { > + RAW ASL |.aml > + } > -- > 2.16.2 >