From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=104.47.38.112; helo=nam02-bl2-obe.outbound.protection.outlook.com; envelope-from=christopher.co@microsoft.com; receiver=edk2-devel@lists.01.org Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-bl2nam02on0112.outbound.protection.outlook.com [104.47.38.112]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 6D42B210F93EF for ; Fri, 21 Sep 2018 01:26:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SxPgXIa5/UDOH5o1v1Tibr0cxHzukHHL5e1OyIwi/3w=; b=B2gAzXsGE9dIt71VeQ/lnLNZwzOg19STuZDHYkcG1ktmvktizHuWIVTMCgRbD/W0x7EfLmlGcJsuM/i3VW/pMm8pT5j2XqqrcsgR+juNQzqPkrJsVWUE+bSmjq5Z9EhQGRJLXPyThziX4zMe1ATLNSKAUUnJN3P9zhB1IeG/my0= Received: from DM5PR2101MB1128.namprd21.prod.outlook.com (52.132.133.20) by DM5PR2101MB0727.namprd21.prod.outlook.com (10.167.110.39) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1185.6; Fri, 21 Sep 2018 08:26:18 +0000 Received: from DM5PR2101MB1128.namprd21.prod.outlook.com ([fe80::81f8:300e:d90:d49]) by DM5PR2101MB1128.namprd21.prod.outlook.com ([fe80::81f8:300e:d90:d49%3]) with mapi id 15.20.1164.008; Fri, 21 Sep 2018 08:26:18 +0000 From: Chris Co To: "edk2-devel@lists.01.org" CC: Ard Biesheuvel , Leif Lindholm , Michael D Kinney Thread-Topic: [PATCH edk2-platforms 24/27] Silicon/NXP: Add i.MX6 common dsc and fdf files Thread-Index: AQHUUYTEuDmvkQSjWUam/wgtzLeieA== Date: Fri, 21 Sep 2018 08:26:16 +0000 Message-ID: <20180921082542.35768-25-christopher.co@microsoft.com> References: <20180921082542.35768-1-christopher.co@microsoft.com> In-Reply-To: <20180921082542.35768-1-christopher.co@microsoft.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: MWHPR17CA0054.namprd17.prod.outlook.com (2603:10b6:300:93::16) To DM5PR2101MB1128.namprd21.prod.outlook.com (2603:10b6:4:a8::20) x-ms-exchange-messagesentrepresentingtype: 1 x-originating-ip: [2001:4898:80e8:8:388a:edc9:7085:c18] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1; DM5PR2101MB0727; 6:0aBKMdvojT2K46SnRVEHKkLQx7E0OT5iFnSn+moP+/edcOwey3omGeIra0N8gCsBTO0XbkI8Mdn18FanQOfD/D2TScNbTt2Jbd8N/WpZfOVy4ubj2Eaqe0CebvHbzaD/zkQp8azuBHWcil37ROjGrhjjIgoiJk6iwB0fNoS/ikEOvall3a0kqEVRuGuxBBrk5tRSUL/t7ymvNr0XeEbseU2Voa8tl90AKk/tE0mk9aleqygT2RVnqv+Vc7mCZH5ZOIJXqb09nXJG/4q4ocEpHcgBX0AVeOp6gdTvPZorTywaSyPONcg5Ipb2t2ETF9/flWe8ICiy3/s3O/J/fikIVkMxM6v9+DzPcMe8NrqtL2xqQUJiISuWqdTfqIrt4bv7KZK93UDWfQaEIBAo9w9P34AUk2A435xLWfusY08DbXcLG3bXxr4iu0O25zKz5rM4a4Lboii3OSkLoZJtmr5bww==; 5:63MTQ0iasOfjzDYg9XDsOY11hdeoBUTGwZdTDG9cjcRPKQqi6rEbZ0zc0SuSaE8JL0M+6+n/Xv+gP2VI4eqv3qfx8dghRicPi2U151SrB3hJhLiFVkHug5ev5u0JV7jz5v1HfypZz5ndgBINkNpVx3uXj1kBUUm8sZHkXuMUHco=; 7:0o5ws6Xrco0Y1zO69mkKjvH0Sf5JBrzUQJAsX4+dksOglou1H38aFiB25A5TYbOa3quqyUzsxCr8qJMVKGBwAQbptrxoheNTVNfEFU5tgLonOh9/36LNCxBUi1xGIACy4iNDXiCb+K+c4fVlNJLZIfWzXwhZ7gI6fkdqUwUSzhh01B/29MaujJ10HDSbFiId0r9w/1gB6mzzadJhwH3jke8BAKiaF6FDzSq479tAs1w3uKTfCSxuMha/z9reMjFi x-ms-office365-filtering-correlation-id: 80770a1d-ff0d-44bc-dbd7-08d61f9be656 x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989299)(4534165)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7193020); SRVR:DM5PR2101MB0727; x-ms-traffictypediagnostic: DM5PR2101MB0727: x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(192374486261705)(278428928389397)(788757137089)(28532068793085)(89211679590171)(12401385986421)(228905959029699); x-ms-exchange-senderadcheck: 1 x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3231355)(2280164)(944501410)(52105095)(2018427008)(93006095)(93001095)(3002001)(10201501046)(6055026)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123560045)(20161123564045)(20161123558120)(201708071742011)(7699051)(76991041); SRVR:DM5PR2101MB0727; BCL:0; PCL:0; RULEID:; SRVR:DM5PR2101MB0727; x-forefront-prvs: 0802ADD973 x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(1496009)(39860400002)(396003)(136003)(376002)(366004)(346002)(199004)(189003)(8676002)(81156014)(25786009)(446003)(2900100001)(102836004)(46003)(52116002)(6346003)(81166006)(11346002)(105586002)(2351001)(8936002)(386003)(4326008)(76176011)(6506007)(10090500001)(5250100002)(7736002)(2616005)(486006)(305945005)(53376002)(6116002)(186003)(16799955002)(1076002)(2501003)(476003)(6916009)(99286004)(22452003)(97736004)(45954006)(71200400001)(71190400001)(72206003)(478600001)(966005)(6306002)(10290500003)(5640700003)(14454004)(36756003)(86362001)(19627235002)(575784001)(6436002)(16200700003)(15188155005)(2906002)(53946003)(86612001)(106356001)(54906003)(316002)(6486002)(256004)(6512007)(14444005)(68736007)(5660300001)(53936002)(60540400001)(579004)(569006); DIR:OUT; SFP:1102; SCL:1; SRVR:DM5PR2101MB0727; H:DM5PR2101MB1128.namprd21.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts) authentication-results: spf=none (sender IP is ) smtp.mailfrom=Christopher.Co@microsoft.com; x-microsoft-antispam-message-info: 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 spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM MIME-Version: 1.0 X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-Network-Message-Id: 80770a1d-ff0d-44bc-dbd7-08d61f9be656 X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Sep 2018 08:26:16.8879 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR2101MB0727 Subject: [PATCH edk2-platforms 24/27] Silicon/NXP: Add i.MX6 common dsc and fdf files X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 21 Sep 2018 08:26:21 -0000 Content-Language: en-US Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable This adds the common dsc and fdf definitions for NXP i.MX6 platforms. Platform dsc definitions will define $(BOARD_NAME), $(IMX_FAMILY), $(IMX_CHIP_TYPE), $(DRAM_SIZE), and $(BOARD_DIR) to indicate i.MX SoC family and board-specific configurations. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Christopher Co Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Michael D Kinney --- Silicon/NXP/iMX6Pkg/iMX6CommonDsc.inc | 897 ++++++++++++++++++++ Silicon/NXP/iMX6Pkg/iMX6CommonFdf.inc | 287 +++++++ Silicon/NXP/iMX6Pkg/iMX6ConfigDsc.inc | 148 ++++ 3 files changed, 1332 insertions(+) diff --git a/Silicon/NXP/iMX6Pkg/iMX6CommonDsc.inc b/Silicon/NXP/iMX6Pkg/iM= X6CommonDsc.inc new file mode 100644 index 000000000000..743a022c2b4a --- /dev/null +++ b/Silicon/NXP/iMX6Pkg/iMX6CommonDsc.inc @@ -0,0 +1,897 @@ +# +# iMX6 Quad and Dual SOM platforms common description +# +# Copyright (c) 2018 Microsoft Corporation. All rights reserved. +# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the B= SD License +# which accompanies this distribution. The full text of the license may = be found at +# http://opensource.org/licenses/bsd-license.php +# +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +# + +##########################################################################= ###### +# +# [Defines] Section +# +##########################################################################= ###### +[Defines] + PLATFORM_NAME =3D iMX6 + PLATFORM_GUID =3D F01954EE-8AC4-45BC-80E5-511EAE64C38C + PLATFORM_VERSION =3D 0.1 + DSC_SPECIFICATION =3D 0x00010019 + OUTPUT_DIRECTORY =3D Build/$(BOARD_NAME) + SUPPORTED_ARCHITECTURES =3D ARM + BUILD_TARGETS =3D DEBUG|RELEASE + SKUID_IDENTIFIER =3D DEFAULT + +!include Silicon/NXP/iMX6Pkg/iMX6ConfigDsc.inc + +##########################################################################= ###### +# +# [BuildOptions] Section +# +##########################################################################= ###### +[BuildOptions] + GCC:*_*_*_CC_FLAGS =3D -D$(BOARD_NAME) -DCPU_$(IMX_FAMILY) -DSOCTYPE_$(I= MX_CHIP_TYPE) -Wno-unused-local-typedefs + GCC:*_*_*_OBJCOPY_PATH =3D noop + GCC:*_*_*_SYMRENAME_PATH =3D noop + *_*_*_ASL_PATH =3D=3D asl.exe + *_*_*_ASL_FLAGS =3D=3D /MsftInternal + *_*_*_ASL_OUTFLAGS =3D=3D /Fo=3D + +# CPU_* compiler flag is used to select constants for iMX6.h + +[BuildOptions.common.EDKII.DXE_CORE,BuildOptions.common.EDKII.DXE_DRIVER,B= uildOptions.common.EDKII.UEFI_DRIVER,BuildOptions.common.EDKII.UEFI_APPLICA= TION] + GCC:*_*_*_DLINK_FLAGS =3D -z common-page-size=3D0x1000 + +[BuildOptions.common.EDKII.DXE_RUNTIME_DRIVER] + GCC:*_*_ARM_DLINK_FLAGS =3D -z common-page-size=3D0x1000 + +##########################################################################= ###### +# +# [LibraryClasses] Sections +# +# When parsing the DSC file, the precedence rules will followed. +# 1. If a Library Class Instance (INF) is specified in the EDK II [Compon= ents] section +# (INF files sub-section,) then it will be used. +# 2. If not specified in the [Components] section, then the Library Class= Instance that is +# defined in the [LibraryClasses.$(ARCH).$(MODULE_TYPE)] section will = be used. +# 3. If not specified in the [LibraryClasses.$(ARCH).$(MODULE_TYPE)] sect= ion, then +# the Library Class Instance that is defined in the +# [LibraryClasses.Common.$(MODULE_TYPE)] section will be used. +# 4. If not specified in the [LibraryClasses.Common.$(MODULE_TYPE)] secti= on, then +# the Library Class Instance that is defined in the [LibraryClasses.$(= ARCH)] section +# will be used. +# 5. If not specified in the [LibraryClasses.$(ARCH)] section, then the L= ibrary Class +# Instance that is defined in the [LibraryClasses] Section or +# [LibraryClasses.Common] section will be used. +# 6. It is an error if it has not been specified in one of the above sect= ions +# +##########################################################################= ###### + +[LibraryClasses.common] + # + # CPU and Timing + # + ArmLib|ArmPkg/Library/ArmLib/ArmBaseLib.inf + ArmMmuLib|ArmPkg/Library/ArmMmuLib/ArmMmuBaseLib.inf + CpuLib|MdePkg/Library/BaseCpuLib/BaseCpuLib.inf + ArmSmcLib|ArmPkg/Library/ArmSmcLib/ArmSmcLib.inf + CacheMaintenanceLib|ArmPkg/Library/ArmCacheMaintenanceLib/ArmCacheMainte= nanceLib.inf + ArmDisassemblerLib|ArmPkg/Library/ArmDisassemblerLib/ArmDisassemblerLib.= inf + UefiDecompressLib|MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompres= sLib.inf + RealTimeClockLib|Silicon/NXP/iMXPlatformPkg/Library/VirtualRealTimeClock= Lib/VirtualRealTimeClockLib.inf + DefaultExceptionHandlerLib|ArmPkg/Library/DefaultExceptionHandlerLib/Def= aultExceptionHandlerLib.inf + CpuExceptionHandlerLib|ArmPkg/Library/ArmExceptionLib/ArmExceptionLib.in= f + TimerLib|Silicon/NXP/iMX6Pkg/Library/TimerLib/TimerLib.inf + + # + # Memory + # + IoLib|MdePkg/Library/BaseIoLibIntrinsic/BaseIoLibIntrinsic.inf + MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAll= ocationLib.inf + MemoryInitPeiLib|ArmPlatformPkg/MemoryInitPei/MemoryInitPeiLib.inf + BaseMemoryLib|MdePkg/Library/BaseMemoryLib/BaseMemoryLib.inf + DmaLib|EmbeddedPkg/Library/NonCoherentDmaLib/NonCoherentDmaLib.inf + HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf + + # + # Platform + # + BaseLib|MdePkg/Library/BaseLib/BaseLib.inf + PrePiLib|EmbeddedPkg/Library/PrePiLib/PrePiLib.inf + ArmPlatformStackLib|ArmPlatformPkg/Library/ArmPlatformStackLib/ArmPlatfo= rmStackLib.inf + EfiResetSystemLib|ArmPkg/Library/ArmPsciResetSystemLib/ArmPsciResetSyste= mLib.inf + + # + # Peripherals + # + UefiUsbLib|MdePkg/Library/UefiUsbLib/UefiUsbLib.inf + PciLib|MdePkg/Library/BasePciLibCf8/BasePciLibCf8.inf + NetLib|MdeModulePkg/Library/DxeNetLib/DxeNetLib.inf + + # + # UEFI Services and Runtime + # + PcdLib|MdePkg/Library/DxePcdLib/DxePcdLib.inf + UefiLib|MdePkg/Library/UefiLib/UefiLib.inf + UefiBootServicesTableLib|MdePkg/Library/UefiBootServicesTableLib/UefiBoo= tServicesTableLib.inf + UefiRuntimeServicesTableLib|MdePkg/Library/UefiRuntimeServicesTableLib/U= efiRuntimeServicesTableLib.inf + DxeServicesTableLib|MdePkg/Library/DxeServicesTableLib/DxeServicesTableL= ib.inf + UefiRuntimeLib|MdePkg/Library/UefiRuntimeLib/UefiRuntimeLib.inf + ReportStatusCodeLib|IntelFrameworkModulePkg/Library/DxeReportStatusCodeL= ibFramework/DxeReportStatusCodeLib.inf + DxeServicesLib|MdePkg/Library/DxeServicesLib/DxeServicesLib.inf + CapsuleLib|MdeModulePkg/Library/DxeCapsuleLibNull/DxeCapsuleLibNull.inf + + PeCoffLib|MdePkg/Library/BasePeCoffLib/BasePeCoffLib.inf + PeCoffGetEntryPointLib|MdePkg/Library/BasePeCoffGetEntryPointLib/BasePeC= offGetEntryPointLib.inf + + UefiDriverEntryPoint|MdePkg/Library/UefiDriverEntryPoint/UefiDriverEntry= Point.inf + UefiApplicationEntryPoint|MdePkg/Library/UefiApplicationEntryPoint/UefiA= pplicationEntryPoint.inf + + DevicePathLib|MdePkg/Library/UefiDevicePathLib/UefiDevicePathLib.inf + + PerformanceLib|MdePkg/Library/BasePerformanceLibNull/BasePerformanceLibN= ull.inf + + # + # Human Interface Infrastructure (HII) + # + HiiLib|MdeModulePkg/Library/UefiHiiLib/UefiHiiLib.inf + UefiHiiServicesLib|MdeModulePkg/Library/UefiHiiServicesLib/UefiHiiServic= esLib.inf + + # + # BDS + # + BootLogoLib|MdeModulePkg/Library/BootLogoLib/BootLogoLib.inf + UefiBootManagerLib|MdeModulePkg/Library/UefiBootManagerLib/UefiBootManag= erLib.inf + PlatformBootManagerLib|ArmPkg/Library/PlatformBootManagerLib/PlatformBoo= tManagerLib.inf + FdtLib|EmbeddedPkg/Library/FdtLib/FdtLib.inf + CustomizedDisplayLib|MdeModulePkg/Library/CustomizedDisplayLib/Customize= dDisplayLib.inf + + # + # Shell + # + ShellLib|ShellPkg/Library/UefiShellLib/UefiShellLib.inf + SortLib|MdeModulePkg/Library/UefiSortLib/UefiSortLib.inf + + # + # Serial, Console and Debugging + # + DebugAgentLib|MdeModulePkg/Library/DebugAgentLibNull/DebugAgentLibNull.i= nf + SerialPortLib|Silicon/NXP/iMXPlatformPkg/Library/UartSerialPortLib/UartS= erialPortLib.inf + PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf + + # Enable debug prints in both release and debug builds + DebugLib|MdePkg/Library/BaseDebugLibSerialPort/BaseDebugLibSerialPort.in= f + DebugPrintErrorLevelLib|MdePkg/Library/BaseDebugPrintErrorLevelLib/BaseD= ebugPrintErrorLevelLib.inf + # + # The Standard IO window in the debugger will show load and unload event= s for symbols. + # +!if $(CONFIG_DUMP_SYMBOL_INFO) =3D=3D TRUE + PeCoffExtraActionLib|Platform/Microsoft/Library/LauterbachPeCoffExtraAct= ionLib/LauterbachPeCoffExtraActionLib.inf +!else + PeCoffExtraActionLib|MdePkg/Library/BasePeCoffExtraActionLibNull/BasePeC= offExtraActionLibNull.inf +!endif + + # + # Display + # + iMXDisplayLib|Silicon/NXP/iMXPlatformPkg/Library/iMXDisplayLib/iMXDispla= yLib.inf + + # + # Security + # + TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasure= mentLib.inf + Tcg2PhysicalPresenceLib|SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/D= xeTcg2PhysicalPresenceLib.inf + Tcg2PpVendorLib|SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibN= ull.inf + + # + # iMX6 Specifics + # + iMXIoMuxLib|Silicon/NXP/iMX6Pkg/Library/iMX6IoMuxLib/iMX6IoMuxLib.inf +!if $(IMX_FAMILY) =3D=3D IMX6SX + iMX6ClkPwrLib|Silicon/NXP/iMX6Pkg/Library/iMX6SxClkPwrLib/iMX6SxClkPwrLi= b.inf +!else + iMX6ClkPwrLib|Silicon/NXP/iMX6Pkg/Library/iMX6ClkPwrLib/iMX6ClkPwrLib.in= f +!endif + iMX6UsbPhyLib|Silicon/NXP/iMX6Pkg/Library/iMX6UsbPhyLib/iMX6UsbPhyLib.in= f + +[LibraryClasses.ARM] + # + # It is not possible to prevent the ARM compiler for generic intrinsic f= unctions. + # This library provides the instrinsic functions generate by a given com= piler. + # [LibraryClasses.ARM] and NULL mean link this library into all ARM imag= es. + # + NULL|ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf + NULL|MdePkg/Library/BaseStackCheckLib/BaseStackCheckLib.inf + +[LibraryClasses.common.SEC] + PcdLib|MdePkg/Library/BasePcdLibNull/BasePcdLibNull.inf + ArmGicLib|ArmPkg/Drivers/ArmGic/ArmGicLib.inf + ArmGicArchLib|ArmPkg/Library/ArmGicArchSecLib/ArmGicArchSecLib.inf + ArmPlatformStackLib|ArmPlatformPkg/Library/ArmPlatformStackLib/ArmPlatfo= rmStackLib.inf + ExtractGuidedSectionLib|EmbeddedPkg/Library/PrePiExtractGuidedSectionLib= /PrePiExtractGuidedSectionLib.inf + HobLib|EmbeddedPkg/Library/PrePiHobLib/PrePiHobLib.inf + LzmaDecompressLib|MdeModulePkg/Library/LzmaCustomDecompressLib/LzmaCusto= mDecompressLib.inf + MemoryAllocationLib|EmbeddedPkg/Library/PrePiMemoryAllocationLib/PrePiMe= moryAllocationLib.inf + MemoryInitPeiLib|ArmPlatformPkg/MemoryInitPei/MemoryInitPeiLib.inf + PeCoffLib|MdePkg/Library/BasePeCoffLib/BasePeCoffLib.inf + PerformanceLib|MdeModulePkg/Library/PeiPerformanceLib/PeiPerformanceLib.= inf + PlatformPeiLib|ArmPlatformPkg/PlatformPei/PlatformPeiLib.inf + PrePiHobListPointerLib|ArmPlatformPkg/Library/PrePiHobListPointerLib/Pre= PiHobListPointerLib.inf + PrePiLib|EmbeddedPkg/Library/PrePiLib/PrePiLib.inf + DefaultExceptionHandlerLib|ArmPkg/Library/DefaultExceptionHandlerLib/Def= aultExceptionHandlerLibBase.inf + +[LibraryClasses.common.PEI_CORE] + PcdLib|MdePkg/Library/PeiPcdLib/PeiPcdLib.inf + ExtractGuidedSectionLib|MdePkg/Library/PeiExtractGuidedSectionLib/PeiExt= ractGuidedSectionLib.inf + MemoryAllocationLib|MdePkg/Library/PeiMemoryAllocationLib/PeiMemoryAlloc= ationLib.inf + ReportStatusCodeLib|MdeModulePkg/Library/PeiReportStatusCodeLib/PeiRepor= tStatusCodeLib.inf + +[LibraryClasses.common.DXE_CORE] + DxeCoreEntryPoint|MdePkg/Library/DxeCoreEntryPoint/DxeCoreEntryPoint.inf + ExtractGuidedSectionLib|MdePkg/Library/DxeExtractGuidedSectionLib/DxeExt= ractGuidedSectionLib.inf + HobLib|MdePkg/Library/DxeCoreHobLib/DxeCoreHobLib.inf + MemoryAllocationLib|MdeModulePkg/Library/DxeCoreMemoryAllocationLib/DxeC= oreMemoryAllocationLib.inf + PerformanceLib|MdeModulePkg/Library/DxeCorePerformanceLib/DxeCorePerform= anceLib.inf + +[LibraryClasses.common.DXE_DRIVER] + ArmGicLib|ArmPkg/Drivers/ArmGic/ArmGicLib.inf + ArmGicArchLib|ArmPkg/Library/ArmGicArchLib/ArmGicArchLib.inf + CpuLib|MdePkg/Library/BaseCpuLib/BaseCpuLib.inf + DmaLib|EmbeddedPkg/Library/NonCoherentDmaLib/NonCoherentDmaLib.inf + FileExplorerLib|MdeModulePkg/Library/FileExplorerLib/FileExplorerLib.inf + PerformanceLib|MdeModulePkg/Library/DxePerformanceLib/DxePerformanceLib.= inf + PlatformBootManagerLib|ArmPkg/Library/PlatformBootManagerLib/PlatformBoo= tManagerLib.inf + SecurityManagementLib|MdeModulePkg/Library/DxeSecurityManagementLib/DxeS= ecurityManagementLib.inf + ArmSoftFloatLib|ArmPkg/Library/ArmSoftFloatLib/ArmSoftFloatLib.inf + +!if $(CONFIG_OPTEE) =3D=3D TRUE + IntrinsicLib|CryptoPkg/Library/IntrinsicLib/IntrinsicLib.inf + OpensslLib|CryptoPkg/Library/OpensslLib/OpensslLib.inf + BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf + HashLib|SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRou= terDxe.inf + Tpm2CommandLib|SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.inf +!endif + +[LibraryClasses.common.UEFI_APPLICATION] + PcdLib|MdePkg/Library/DxePcdLib/DxePcdLib.inf + FileExplorerLib|MdeModulePkg/Library/FileExplorerLib/FileExplorerLib.inf + ReportStatusCodeLib|IntelFrameworkModulePkg/Library/DxeReportStatusCodeL= ibFramework/DxeReportStatusCodeLib.inf + UefiDecompressLib|IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDec= ompressLib/BaseUefiTianoCustomDecompressLib.inf + PerformanceLib|MdeModulePkg/Library/DxePerformanceLib/DxePerformanceLib.= inf + HiiLib|MdeModulePkg/Library/UefiHiiLib/UefiHiiLib.inf + IntrinsicLib|CryptoPkg/Library/IntrinsicLib/IntrinsicLib.inf + DxeServicesLib|MdePkg/Library/DxeServicesLib/DxeServicesLib.inf + ArmSoftFloatLib|ArmPkg/Library/ArmSoftFloatLib/ArmSoftFloatLib.inf + +!if $(CONFIG_OPTEE) =3D=3D TRUE + BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf + OpensslLib|CryptoPkg/Library/OpensslLib/OpensslLib.inf +!endif + +[LibraryClasses.common.UEFI_DRIVER] + ReportStatusCodeLib|IntelFrameworkModulePkg/Library/DxeReportStatusCodeL= ibFramework/DxeReportStatusCodeLib.inf + UefiDecompressLib|IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDec= ompressLib/BaseUefiTianoCustomDecompressLib.inf + ExtractGuidedSectionLib|MdePkg/Library/DxeExtractGuidedSectionLib/DxeExt= ractGuidedSectionLib.inf + PerformanceLib|MdeModulePkg/Library/DxePerformanceLib/DxePerformanceLib.= inf + DxeServicesLib|MdePkg/Library/DxeServicesLib/DxeServicesLib.inf + +[LibraryClasses.common.DXE_RUNTIME_DRIVER] + HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf + MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAll= ocationLib.inf + ReportStatusCodeLib|IntelFrameworkModulePkg/Library/DxeReportStatusCodeL= ibFramework/DxeReportStatusCodeLib.inf + CapsuleLib|MdeModulePkg/Library/DxeCapsuleLibNull/DxeCapsuleLibNull.inf + PeCoffLib|MdePkg/Library/BasePeCoffLib/BasePeCoffLib.inf + DxeServicesLib|MdePkg/Library/DxeServicesLib/DxeServicesLib.inf + PerformanceLib|MdeModulePkg/Library/DxePerformanceLib/DxePerformanceLib.= inf + +!if $(CONFIG_OPTEE) =3D=3D TRUE +!if $(CONFIG_MEASURED_BOOT) =3D=3D TRUE + TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasure= mentLib.inf +!endif +!endif + +##########################################################################= ###### +# +# PCD Sections +# +##########################################################################= ###### + +######################## +# +# ArmPkg PCDs +# +######################## +[PcdsFeatureFlag.common] + # + # Use the Vector Table location in CpuDxe. We will not copy the Vector T= able at + # PcdCpuVectorBaseAddress + # + gArmTokenSpaceGuid.PcdRelocateVectorTable|FALSE + +[PcdsFixedAtBuild.common] + gArmTokenSpaceGuid.PcdTrustzoneSupport|FALSE + gArmTokenSpaceGuid.PcdVFPEnabled|1 + + # + # ARM General Interrupt Controller settings + # + gArmTokenSpaceGuid.PcdGicDistributorBase|0x00A01000 + gArmTokenSpaceGuid.PcdGicInterruptInterfaceBase|0x00A00100 + gArmTokenSpaceGuid.PcdArmPrimaryCore|0x000 + + # + # ARM L2x0 PCDs + # + #gArmTokenSpaceGuid.PcdL2x0ControllerBase|0x00A02000 + + # + # GPT Timer Frequency + # Set to 1KHz, which equals to 1us resolution + # + gArmTokenSpaceGuid.PcdArmArchTimerFreqInHz|1000000 + +######################## +# +# ArmPlatformPkg PCDs +# +######################## +[PcdsFixedAtBuild.common] + # Size of the region used by UEFI in permanent memory (Reserved 16MB) + gArmPlatformTokenSpaceGuid.PcdSystemMemoryUefiRegionSize|0x01000000 + +!if $(IMX_FAMILY) =3D=3D IMX6SX + # + # Refer to the detailed memory map at OpteeClientPkg PCDs section below + # + giMX6TokenSpaceGuid.PcdMemoryStartAddress|0x80000000 + gArmTokenSpaceGuid.PcdSystemMemoryBase|0x829D4000 + !if $(DRAM_SIZE) =3D=3D DRAM_512MB + # + # Board DDR starts at 0x80000000 and ends 0x9FFF0000 (512MB) + # SystemMemorySize is 0x9FFF0000 - PcdSystemMemoryBase + # + giMX6TokenSpaceGuid.PcdMemoryEndAddress|0x9FFF0000 + gArmTokenSpaceGuid.PcdSystemMemorySize|0x1D61C000 + !elseif $(DRAM_SIZE) =3D=3D DRAM_1GB + # + # Board DDR starts at 0x80000000 and ends 0xBFFF0000 (1GB) + # SystemMemorySize is 0xBFFF0000 - PcdSystemMemoryBase + # + giMX6TokenSpaceGuid.PcdMemoryEndAddress|0xBFFF0000 + gArmTokenSpaceGuid.PcdSystemMemorySize|0x3D61C000 + !else + # + # Board DDR starts at 0x80000000 and ends 0xFFFF0000 (2GB) + # SystemMemorySize is 0xFFFF0000 - PcdSystemMemoryBase + # + giMX6TokenSpaceGuid.PcdMemoryEndAddress|0xFFFF0000 + gArmTokenSpaceGuid.PcdSystemMemorySize|0x7D61C000 + !endif +!else + giMX6TokenSpaceGuid.PcdMemoryStartAddress|0x10000000 + gArmTokenSpaceGuid.PcdSystemMemoryBase|0x12A00000 + + !if $(DRAM_SIZE) =3D=3D DRAM_512MB + # + # Board DDR starts at 0x10000000 and ends 0x2FFF0000 (512MB) + # SystemMemorySize is 0x2FFF0000 - PcdSystemMemoryBase + # + giMX6TokenSpaceGuid.PcdMemoryEndAddress|0x2FFF0000 + gArmTokenSpaceGuid.PcdSystemMemorySize|0x1D5F0000 + !elseif $(DRAM_SIZE) =3D=3D DRAM_1GB + # + # Board DDR starts at 0x10000000 and ends 0x4FFF0000 (1GB) + # SystemMemorySize is 0x4FFF0000 - PcdSystemMemoryBase + # + giMX6TokenSpaceGuid.PcdMemoryEndAddress|0x4FFF0000 + gArmTokenSpaceGuid.PcdSystemMemorySize|0x3D5F0000 + !else + # + # Board DDR starts at 0x10000000 and ends 0x8FFF0000 (2GB) + # SystemMemorySize is 0x8FFF0000 - PcdSystemMemoryBase + # + giMX6TokenSpaceGuid.PcdMemoryEndAddress|0x8FFF0000 + gArmTokenSpaceGuid.PcdSystemMemorySize|0x7D5F0000 + !endif +!endif + +!if $(CONFIG_MPCORE) =3D=3D TRUE + !if (($(IMX_CHIP_TYPE) =3D=3D QUAD) || ($(IMX_CHIP_TYPE) =3D=3D QUADPLUS= )) + gArmPlatformTokenSpaceGuid.PcdCoreCount|4 + !elseif (($(IMX_CHIP_TYPE) =3D=3D DUAL) || ($(IMX_CHIP_TYPE) =3D=3D DUAL= LITE)) + gArmPlatformTokenSpaceGuid.PcdCoreCount|2 + !else + gArmPlatformTokenSpaceGuid.PcdCoreCount|1 + !endif +!else + gArmPlatformTokenSpaceGuid.PcdCoreCount|1 +!endif + +######################## +# +# MdePkg PCDs +# +######################## +[PcdsFeatureFlag.common] + gEfiMdePkgTokenSpaceGuid.PcdComponentNameDisable|TRUE + gEfiMdePkgTokenSpaceGuid.PcdDriverDiagnosticsDisable|TRUE + gEfiMdePkgTokenSpaceGuid.PcdComponentName2Disable|TRUE + gEfiMdePkgTokenSpaceGuid.PcdDriverDiagnostics2Disable|TRUE + +[PcdsFixedAtBuild.common] + gEfiMdePkgTokenSpaceGuid.PcdMaximumUnicodeStringLength|1000000 + gEfiMdePkgTokenSpaceGuid.PcdMaximumAsciiStringLength|1000000 + gEfiMdePkgTokenSpaceGuid.PcdMaximumLinkedListLength|1000000 + gEfiMdePkgTokenSpaceGuid.PcdSpinLockTimeout|10000000 + gEfiMdePkgTokenSpaceGuid.PcdDebugClearMemoryValue|0xAF + gEfiMdePkgTokenSpaceGuid.PcdPostCodePropertyMask|0 + gEfiMdePkgTokenSpaceGuid.PcdUefiLibMaxPrintBufferSize|320 + gEfiMdePkgTokenSpaceGuid.PcdPerformanceLibraryPropertyMask|1 + + # + # DEBUG_ASSERT_ENABLED 0x01 + # DEBUG_PRINT_ENABLED 0x02 + # DEBUG_CODE_ENABLED 0x04 + # CLEAR_MEMORY_ENABLED 0x08 + # ASSERT_BREAKPOINT_ENABLED 0x10 + # ASSERT_DEADLOOP_ENABLED 0x20 + # + !if $(TARGET) =3D=3D RELEASE + gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0x23 + !else + gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0x2f + !endif + + # + # Debug Flags as defined in DebugLib.h + # + # DEBUG_INIT 0x00000001 // Initialization + # DEBUG_WARN 0x00000002 // Warnings + # DEBUG_LOAD 0x00000004 // Load events + # DEBUG_FS 0x00000008 // EFI File system + # DEBUG_POOL 0x00000010 // Alloc & Free (pool) + # DEBUG_PAGE 0x00000020 // Alloc & Free (page) + # DEBUG_INFO 0x00000040 // Informational debug messages + # DEBUG_DISPATCH 0x00000080 // PEI/DXE/SMM Dispatchers + # DEBUG_VARIABLE 0x00000100 // Variable + # DEBUG_BM 0x00000400 // Boot Manager + # DEBUG_BLKIO 0x00001000 // BlkIo Driver + # DEBUG_NET 0x00004000 // Network Io Driver + # DEBUG_UNDI 0x00010000 // UNDI Driver + # DEBUG_LOADFILE 0x00020000 // LoadFile + # DEBUG_TEEC 0x00040000 // TEE Client Tracings + # DEBUG_EVENT 0x00080000 // Event messages + # DEBUG_GCD 0x00100000 // Global Coherency Database changes + # DEBUG_CACHE 0x00200000 // Memory range cachability changes + # DEBUG_VERBOSE 0x00400000 // Detailed debug messages that may + # // significantly impact boot performance + # DEBUG_ERROR 0x80000000 // Error + # + # By default only enable init, error, warning and load debug prints to m= inimize + # debug messages. Use "0x8FEF4DCF" for detailed debugging purposes. + # +!if $(TARGET) =3D=3D RELEASE + # + # In release builds enable error, warning, and load (base and entry poin= t) + # + gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel| 0x80000006 +!else + # + # In debug builds enable error, cache, info, load, warn, and init + # + gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel| 0x80000047 +!endif + gEfiMdePkgTokenSpaceGuid.PcdReportStatusCodePropertyMask|0x07 + gEfiMdePkgTokenSpaceGuid.PcdPlatformBootTimeOut|0 + +######################## +# +# MdeModulePkg PCDs +# +######################## +[PcdsFeatureFlag.common] + gEfiMdeModulePkgTokenSpaceGuid.PcdTurnOffUsbLegacySupport|TRUE + + ## If TRUE, Graphics Output Protocol will be installed on virtual handle= created by ConsplitterDxe. + # It could be set FALSE to save size. + gEfiMdeModulePkgTokenSpaceGuid.PcdConOutGopSupport|TRUE + +[PcdsFixedAtBuild.common] + gEfiMdeModulePkgTokenSpaceGuid.PcdMaxVariableSize|0x2000 + gEfiMdePkgTokenSpaceGuid.PcdDefaultTerminalType|4 + gEfiMdeModulePkgTokenSpaceGuid.PcdResetOnMemoryTypeInformationChange|FAL= SE + # GUID of the UI app + gEfiMdeModulePkgTokenSpaceGuid.PcdBootManagerMenuFile|{ 0x21, 0xaa, 0x2c= , 0x46, 0x14, 0x76, 0x03, 0x45, 0x83, 0x6e, 0x8a, 0xb6, 0xf4, 0x66, 0x23, 0= x31 } + +[PcdsPatchableInModule] + # Console Resolution + gEfiMdeModulePkgTokenSpaceGuid.PcdVideoHorizontalResolution|1920 + gEfiMdeModulePkgTokenSpaceGuid.PcdVideoVerticalResolution|1080 + +######################## +# +# EmbeddedPkg PCDs +# +######################## +[PcdsFeatureFlag.common] + gEmbeddedTokenSpaceGuid.PcdPrePiProduceMemoryTypeInformationHob|TRUE + +[PcdsFixedAtBuild.common] + # + # Optional feature to help prevent EFI memory map fragments + # Turned on and off via: PcdPrePiProduceMemoryTypeInformationHob + # Values are in EFI Pages (4K). DXE Core will make sure that + # at least this much of each type of memory can be allocated + # from a single memory range. This way you only end up with + # maximum of two fragements for each type in the memory map + # (the memory used, and the free memory that was prereserved + # but not used). + # + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiACPIReclaimMemory|0 + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiACPIMemoryNVS|0 + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiReservedMemoryType|0 + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiRuntimeServicesData|80 + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiRuntimeServicesCode|40 + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiBootServicesCode|400 + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiBootServicesData|3000 + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiLoaderCode|10 + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiLoaderData|0 + + # + # Timer Configuration + # + # The timer period is configured in units of 100ns. We configure it for = 10ms + # timer ticks which will be used mainly by DXE Core to keep track of sys= tem + # time and hence keep track of all events. + # + gEmbeddedTokenSpaceGuid.PcdTimerPeriod|100000 + +######################## +# +# IntelFrameworkModulePkg PCDs +# +######################## +[PcdsFixedAtBuild.common] + # GUID of the UEFI Shell + gEfiIntelFrameworkModulePkgTokenSpaceGuid.PcdShellFile|{ 0x83, 0xA5, 0x0= 4, 0x7C, 0x3E, 0x9E, 0x1C, 0x4F, 0xAD, 0x65, 0xE0, 0x52, 0x68, 0xD0, 0xB4, = 0xD1 } + +######################## +# +# OpteeClientPkg PCDs +# +######################## +[PcdsFixedAtBuild.common] +!if $(IMX_FAMILY) =3D=3D IMX6SX + # + # Reserved for TPM2 ACPI + # 0x82000000 - 0x82002FFF + # + gOpteeClientPkgTokenSpaceGuid.PcdTpm2AcpiBufferBase|0x82000000 + gOpteeClientPkgTokenSpaceGuid.PcdTpm2AcpiBufferSize|0x3000 + + # + # iMX Plaform Memory Layout + # + # +-------------------+=3D=3D=3D> (0x80000000) PcdTrustZonePrivateMemory= Base (OPTEE image base address) + # | TZ Private Memory | ^ + # | (OPTEE) | | (0x01E00000) PcdTrustZonePrivateMemorySize 3= 0MB + # | | v + # +-------------------+=3D=3D=3D> (0x81E00000) PcdTrustZoneSharedMemoryB= ase (includes mobj bookkeeping page) + # | TZ Shared Memory | ^ + # | | | (0x00200000) PcdTrustZoneSharedMemorySize 2M= B + # | | v + # +-------------------|=3D=3D=3D> (0x82000000) PcdTpm2AcpiBufferBase + # | TPM2 Control Area | ^ + # | | | (0x00003000) PcdTpm2AcpiBufferSize 12KB + # | | v + # +-------------------+=3D=3D=3D> (0x82003000) PcdGlobalDataBaseAddress + # | Global Data | ^ + # | | | (0x00001000) PcdGlobalDataSize 4KB + # | | v + # +-------------------+=3D=3D=3D> (0x82004000) PcdFdBaseAddress (UEFI Lo= ad Address) + # | UEFI | ^ + # | | | (0x001D0000) PcdFdSize 1856KB + # | | v + # +-------------------+=3D=3D=3D> (0x821D4000) PcdFrameBufferBase + # | FrameBuffer | ^ + # | | | (0x00800000) PcdFrameBufferSize 8MB + # | | v + # +-------------------+=3D=3D=3D> (0x829D4000) PcdSystemMemoryBase + # | Operating System | ^ + # | Memory | | + # | | | + # | | v + # +------------------ +=3D=3D=3D> + + DEFINE GLOBAL_DATA_BASE_ADDRESS =3D 0x82003000 + + gOpteeClientPkgTokenSpaceGuid.PcdTrustZonePrivateMemoryBase|0x80000000 + gOpteeClientPkgTokenSpaceGuid.PcdTrustZonePrivateMemorySize|0x01E00000 + + # + # TrustZone shared memory (2Mb) + # This memory is managed by the normal world but shared with the OpTEE O= S. + # It must match OpTEE optee_os/core/arch/arm/plat-imx/platform_config.h: + # CFG_SHMEM_START & CFG_SHMEM_SIZE + # NOTE: The first page of the SHMEM is owned by OPTEE for mobj bookkeepi= ng + # and we should not touch it. We will skip the first 4K of SHMEM and tak= e that + # into account for SHMEM size in PcdTrustZoneSharedMemorySize. + # + gOpteeClientPkgTokenSpaceGuid.PcdTrustZoneSharedMemoryBase|0x81E00000 + gOpteeClientPkgTokenSpaceGuid.PcdTrustZoneSharedMemorySize|0x00200000 + + giMX6TokenSpaceGuid.PcdFrameBufferBase|0x821D4000 + +!else + # + # Reserved for TPM2 ACPI + # 0x10814000 - 0x10816FFF + # + gOpteeClientPkgTokenSpaceGuid.PcdTpm2AcpiBufferBase|0x10814000 + gOpteeClientPkgTokenSpaceGuid.PcdTpm2AcpiBufferSize|0x3000 + + # + # iMX Plaform Memory Layout + # + # +-------------------+=3D=3D=3D> (0x10000000) PcdFrameBufferBase (DDR S= tart Address) + # |Frame Buffer | ^ + # | | | (0x00800000) PcdFrameBufferSize 8MB + # | | v + # +-------------------+=3D=3D=3D + # | | Gap + # +-------------------|=3D=3D=3D> (0x10814000) PcdTpm2AcpiBufferBase + # |TPM2 Control Area | ^ + # | | | (0x3000) 12KB + # | | v + # +-------------------+=3D=3D=3D> (0x10817000) PcdGlobalDataBaseAddress + # | Global Data | ^ + # | | | (0x1000) PcdGlobalDataSize 4KB + # | | v + # +-------------------+=3D=3D=3D + # | Gap | + # +-------------------+=3D=3D=3D> (0x10820000) UEFI Load Address + # | UEFI | ^ + # | | | (0x1D0000) 1920KB + # | | v + # +-------------------+=3D=3D=3D> (0x10A00000) PcdTrustZonePrivateMemory= Base (OPTEE image base address) + # | TZ Private Memory | ^ + # | (OPTEE) | | (0x1E00000) 30MB + # | | v + # +-------------------+=3D=3D=3D> (0x12800000) PcdTrustZoneSharedMemoryB= ase (includes mobj bookkeeping page) + # | TZ Shared Memory | ^ + # | | | (0x200000) 2MB + # | | v + # +-------------------+=3D=3D=3D> (0x12A00000) PcdSystemMemoryBase + # | Operating System | ^ + # | Memory | | (0x3D5F0000) 982MB for 1GB DRAM OR + # | | | (0x7D5F0000) 2005MB for 2GB DRAM + # | | v + # +------------------ +=3D=3D=3D + # + # Reserved for Optee private memory (31M) + # 0x10A00000 - 0x127FFFFF + # + # TrustZone private memory (?Mb OPTEE + ?Mb PSCI) + # 0x8E000000 - 8FEFFFFF + # This memory is managed privately by the OpTEE OS. + # CFG_DDR_TEETZ_RESERVED_START & CFG_DDR_TEETZ_RESERVED_START + # + + DEFINE GLOBAL_DATA_BASE_ADDRESS =3D 0x10817000 + + gOpteeClientPkgTokenSpaceGuid.PcdTrustZonePrivateMemoryBase|0x10A00000 + gOpteeClientPkgTokenSpaceGuid.PcdTrustZonePrivateMemorySize|0x01E00000 + + # + # TrustZone shared memory (2Mb) + # 0x12800000 - 0x129FFFFF + # This memory is managed by the normal world but shared with the OpTEE O= S. + # It must match OpTEE optee_os/core/arch/arm/plat-imx/platform_config.h: + # CFG_SHMEM_START & CFG_SHMEM_SIZE + # NOTE: The first page of the SHMEM is owned by OPTEE for mobj bookkeepi= ng + # and we should not touch it. We will skip the first 4K of SHMEM and tak= e that + # into account for SHMEM size in PcdTrustZoneSharedMemorySize. + # + gOpteeClientPkgTokenSpaceGuid.PcdTrustZoneSharedMemoryBase|0x12800000 + gOpteeClientPkgTokenSpaceGuid.PcdTrustZoneSharedMemorySize|0x00200000 + + giMX6TokenSpaceGuid.PcdFrameBufferBase|0x10000000 + +!endif +######################## +# +# SecurityPkg PCDs +# +######################## +[PcdsFixedAtBuild.common] + # + # override the default values from SecurityPkg to ensure images from all= sources are verified in secure boot + # + gEfiSecurityPkgTokenSpaceGuid.PcdOptionRomImageVerificationPolicy|0x04 + gEfiSecurityPkgTokenSpaceGuid.PcdFixedMediaImageVerificationPolicy|0x04 + gEfiSecurityPkgTokenSpaceGuid.PcdRemovableMediaImageVerificationPolicy|0= x04 + + # + # PcdTpmInstanceGuid tells the Tcg2 Driver which TPM version is being us= ed. + # The below GUID is TPMv2 GUID. + # + gEfiSecurityPkgTokenSpaceGuid.PcdTpmInstanceGuid|{ 0x5a, 0xf2, 0x6b, 0x2= 8, 0xc3, 0xc2, 0x8c, 0x40, 0xb3, 0xb4, 0x25, 0xe6, 0x75, 0x8b, 0x73, 0x17 } + + ## Sets the default Physical Presence flags that are consumed by the PP = TrEE library. + # + # Options are defined in TrEEPhysicalPresenceData.h + # Current setting: + # TREE_FLAG_NO_PPI_CLEAR + # + #gEfiSecurityPkgTokenSpaceGuid.PcdPPDefaultTrEEFlags|0x02 + + ## Indicates whether or not the Tcg2Dxe should measure CRTM instead of P= EI. + # TRUE means the Tcg2Dxe will measure CRTM. + # + #gEfiSecurityPkgTokenSpaceGuid.PcdLateMeasureCRTM|TRUE + +[PcdsDynamicExDefault.common.DEFAULT] + gEfiSecurityPkgTokenSpaceGuid.PcdTcg2HashAlgorithmBitmap|0x0 + +######################## +# +# MsPkg PCDs +# +######################## +[PcdsFixedAtBuild.common] + + # + # SD first FAT partition device path: + # VenHw(AAFB8DAA-7340-43AC-8D49-0CCE14812489,03000000)/SD(0x0)/HD(1,MBR,= 0xAE420040,0x1000,0x20000) + # + # eMMC first FAT partition device path: + # VenHw(AAFB8DAA-7340-43AC-8D49-0CCE14812489,04000000)/eMMC(0x0)/HD(1,MB= R,0xAE420040,0x1000,0x20000) + # + # Use the SDCard first fat partition for logging and misc storage. + # + gMsPkgTokenSpaceGuid.PcdStorageMediaPartitionDevicePath|L"VenHw(AAFB8DAA= -7340-43AC-8D49-0CCE14812489,03000000)/SD(0x0)/HD(1,MBR,0xAE420040,0x1000,0= x20000)" + +!if $(CONFIG_SECURE_BOOT) =3D=3D TRUE + gMsPkgTokenSpaceGuid.PcdSecureBootEnable|TRUE +!else + gMsPkgTokenSpaceGuid.PcdSecureBootEnable|FALSE +!endif + +######################## +# +# iMXPlatformPkg PCDs +# +######################## +[PcdsFixedAtBuild.common] + + # Global data area + giMXPlatformTokenSpaceGuid.PcdGlobalDataBaseAddress|$(GLOBAL_DATA_BASE_A= DDRESS) + giMXPlatformTokenSpaceGuid.PcdGlobalDataSize|0x1000 + +##########################################################################= ###### +# +# [Components] Section +# +##########################################################################= ###### +[Components.common] + + # + # SEC (PrePi) + # + ArmPlatformPkg/PrePi/PeiMPCore.inf + + # + # DXE Core + # + MdeModulePkg/Core/Dxe/DxeMain.inf { + + NULL|MdeModulePkg/Library/DxeCrc32GuidedSectionExtractLib/DxeCrc32Gu= idedSectionExtractLib.inf + } + MdeModulePkg/Universal/PCD/Dxe/Pcd.inf { + + PcdLib|MdePkg/Library/BasePcdLibNull/BasePcdLibNull.inf + } + + # + # DXE required Architectural Protocols as defined by UEFI 2.6 specs + # + # BDS Arch Protocol + # CPU Arch Protocol + # Metronome Arch Protocol + # Real Time Clock Arch Protocol + # Reset Arch Protocol + # Runtime Arch Protocol + # Security Arch Protocol + # Timer Arch Protocol + # Variable Arch Protocol + # Variable Write Arch Protocol + # EFI Capsule Arch Protocol + # Watchdog Timer Arch Protocol + # + + ArmPkg/Drivers/CpuDxe/CpuDxe.inf + EmbeddedPkg/MetronomeDxe/MetronomeDxe.inf + EmbeddedPkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf + EmbeddedPkg/ResetRuntimeDxe/ResetRuntimeDxe.inf + MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf + MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf { + + NULL|SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificatio= nLib.inf + NULL|SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib= .inf + } + Silicon/NXP/iMX6Pkg/Drivers/TimerDxe/TimerDxe.inf + MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf + MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf + ArmPkg/Drivers/ArmGic/ArmGicDxe.inf + MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntim= eDxe.inf + + # + # Serial Console + # + MdeModulePkg/Universal/SerialDxe/SerialDxe.inf + EmbeddedPkg/SimpleTextInOutSerial/SimpleTextInOutSerial.inf + MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf + + # + # Filesystem Stack + # + MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf + MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf + MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf + FatPkg/EnhancedFatDxe/Fat.inf + Platform/Microsoft/Drivers/SdMmcDxe/SdMmcDxe.inf + Silicon/NXP/iMXPlatformPkg/Drivers/SdhcDxe/SdhcDxe.inf + + # PCIe support + Silicon/NXP/iMX6Pkg/Drivers/PciExpress/iMX6PciExpress.inf + + # + # Generic Bds (Not Intel's) + # + MdeModulePkg/Universal/BdsDxe/BdsDxe.inf + MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf + MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf + MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf + MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf + MdeModulePkg/Application/UiApp/UiApp.inf { + + NULL|MdeModulePkg/Library/DeviceManagerUiLib/DeviceManagerUiLib.inf + NULL|MdeModulePkg/Library/BootManagerUiLib/BootManagerUiLib.inf + NULL|MdeModulePkg/Library/BootMaintenanceManagerUiLib/BootMaintenanc= eManagerUiLib.inf + } + + # + # Shell + # + ShellPkg/Application/Shell/Shell.inf { + + ShellCommandLib|ShellPkg/Library/UefiShellCommandLib/UefiShellComman= dLib.inf + BcfgCommandLib|ShellPkg/Library/UefiShellBcfgCommandLib/UefiShellBcf= gCommandLib.inf + HandleParsingLib|ShellPkg/Library/UefiHandleParsingLib/UefiHandlePar= singLib.inf + NULL|ShellPkg/Library/UefiShellDebug1CommandsLib/UefiShellDebug1Comm= andsLib.inf + NULL|ShellPkg/Library/UefiShellDriver1CommandsLib/UefiShellDriver1Co= mmandsLib.inf + NULL|ShellPkg/Library/UefiShellInstall1CommandsLib/UefiShellInstall1= CommandsLib.inf + NULL|ShellPkg/Library/UefiShellLevel1CommandsLib/UefiShellLevel1Comm= andsLib.inf + NULL|ShellPkg/Library/UefiShellLevel2CommandsLib/UefiShellLevel2Comm= andsLib.inf + NULL|ShellPkg/Library/UefiShellLevel3CommandsLib/UefiShellLevel3Comm= andsLib.inf + NULL|ShellPkg/Library/UefiShellNetwork1CommandsLib/UefiShellNetwork1= CommandsLib.inf + PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf + + + gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0xFF + gEfiShellPkgTokenSpaceGuid.PcdShellLibAutoInitialize|FALSE + gEfiMdePkgTokenSpaceGuid.PcdUefiLibMaxPrintBufferSize|8000 + } + +MdeModulePkg/Universal/Variable/EmuRuntimeDxe/EmuVariableRuntimeDxe.inf + +# +# Boilerplate for compiling UEFI applications and UEFI drivers with the +# standard library. +# +!include StdLib/StdLib.inc diff --git a/Silicon/NXP/iMX6Pkg/iMX6CommonFdf.inc b/Silicon/NXP/iMX6Pkg/iM= X6CommonFdf.inc new file mode 100644 index 000000000000..877f575d7999 --- /dev/null +++ b/Silicon/NXP/iMX6Pkg/iMX6CommonFdf.inc @@ -0,0 +1,287 @@ +# +# FLASH layout file for iMX6 Quad and Dual SOM boards. +# +# Copyright (c) 2018 Microsoft Corporation. All rights reserved. +# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the B= SD License +# which accompanies this distribution. The full text of the license may = be found at +# http://opensource.org/licenses/bsd-license.php +# +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +# + +# Continuation of [FV.FvMain] + INF MdeModulePkg/Core/Dxe/DxeMain.inf + INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf + + # + # PI DXE Drivers producing Architectural Protocols (EFI Services) + # + INF ArmPkg/Drivers/CpuDxe/CpuDxe.inf + + INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf + INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf + INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf + INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf + INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRu= ntimeDxe.inf + + INF ArmPkg/Drivers/ArmGic/ArmGicDxe.inf + # Timers + INF Silicon/NXP/iMX6Pkg/Drivers/TimerDxe/TimerDxe.inf + + INF MdeModulePkg/Universal/SerialDxe/SerialDxe.inf + INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf + INF EmbeddedPkg/SimpleTextInOutSerial/SimpleTextInOutSerial.inf + + INF EmbeddedPkg/ResetRuntimeDxe/ResetRuntimeDxe.inf + INF EmbeddedPkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf + INF EmbeddedPkg/MetronomeDxe/MetronomeDxe.inf + + # + # Filesystem Stack + # + INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf + INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf + INF FatBinPkg/EnhancedFatDxe/Fat.inf + INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.i= nf + INF Platform/Microsoft/Drivers/SdMmcDxe/SdMmcDxe.inf + INF Silicon/NXP/iMXPlatformPkg/Drivers/SdhcDxe/SdhcDxe.inf + + # + # PCIe + # + INF Silicon/NXP/iMX6Pkg/Drivers/PciExpress/iMX6PciExpress.inf + + # + # Bds + # + INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf + INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf + INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf + INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf + INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf + INF MdeModulePkg/Application/UiApp/UiApp.inf + + # + # UEFI application (Shell Embedded Boot Loader) + # + INF ShellPkg/Application/Shell/Shell.inf + +INF MdeModulePkg/Universal/Variable/EmuRuntimeDxe/EmuVariableRuntimeDxe.in= f + +[FV.FVMAIN_COMPACT] +FvAlignment =3D 8 +ERASE_POLARITY =3D 1 +MEMORY_MAPPED =3D TRUE +STICKY_WRITE =3D TRUE +LOCK_CAP =3D TRUE +LOCK_STATUS =3D TRUE +WRITE_DISABLED_CAP =3D TRUE +WRITE_ENABLED_CAP =3D TRUE +WRITE_STATUS =3D TRUE +WRITE_LOCK_CAP =3D TRUE +WRITE_LOCK_STATUS =3D TRUE +READ_DISABLED_CAP =3D TRUE +READ_ENABLED_CAP =3D TRUE +READ_STATUS =3D TRUE +READ_LOCK_CAP =3D TRUE +READ_LOCK_STATUS =3D TRUE + + INF ArmPlatformPkg/PrePi/PeiMPCore.inf + + FILE FV_IMAGE =3D 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 { + SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRE= D =3D TRUE { + SECTION FV_IMAGE =3D FVMAIN + } + } + + +##########################################################################= ###### +# +# Rules are use with the [FV] section's module INF type to define +# how an FFS file is created for a given INF file. The following Rule are = the default +# rules for the different module type. User can add the customized rules t= o define the +# content of the FFS file. +# +##########################################################################= ###### + + +##########################################################################= ## +# Example of a DXE_DRIVER FFS file with a Checksum encapsulation section = # +##########################################################################= ## +# +#[Rule.Common.DXE_DRIVER] +# FILE DRIVER =3D $(NAMED_GUID) { +# DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_= NAME).depex +# COMPRESS PI_STD { +# GUIDED { +# PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi +# UI STRING=3D"$(MODULE_NAME)" Optional +# VERSION STRING=3D"$(INF_VERSION)" Optional BUILD_NUM=3D$(BUILD_N= UMBER) +# } +# } +# } +# +##########################################################################= ## +!if 0 +[Rule.Common.SEC] + FILE SEC =3D $(NAMED_GUID) RELOCS_STRIPPED { + TE TE Align =3D 32 $(INF_OUTPUT)/$(MODULE_NAME).efi + } + +[Rule.Common.PEI_CORE] + FILE PEI_CORE =3D $(NAMED_GUID) { + TE TE $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING =3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.PEIM] + FILE PEIM =3D $(NAMED_GUID) { + PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.PEIM.TIANOCOMPRESSED] + FILE PEIM =3D $(NAMED_GUID) DEBUG_MYTOOLS_IA32 { + PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex + GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED =3D TR= UE { + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + } + +[Rule.Common.DXE_CORE] + FILE DXE_CORE =3D $(NAMED_GUID) { + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + + +[Rule.Common.UEFI_DRIVER] + FILE DRIVER =3D $(NAMED_GUID) { + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NA= ME).depex + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.DXE_DRIVER] + FILE DRIVER =3D $(NAMED_GUID) { + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NA= ME).depex + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.DXE_RUNTIME_DRIVER] + FILE DRIVER =3D $(NAMED_GUID) { + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NA= ME).depex + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.UEFI_APPLICATION] + FILE APPLICATION =3D $(NAMED_GUID) { + UI STRING =3D"$(MODULE_NAME)" Optional + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + } + +[Rule.Common.UEFI_DRIVER.BINARY] + FILE DRIVER =3D $(NAMED_GUID) { + DXE_DEPEX DXE_DEPEX Optional |.depex + PE32 PE32 |.efi + UI STRING=3D"$(MODULE_NAME)" Optional + VERSION STRING=3D"$(INF_VERSION)" Optional BUILD_NUM=3D$(BUILD_NUMBE= R) + } + +[Rule.Common.UEFI_APPLICATION.BINARY] + FILE APPLICATION =3D $(NAMED_GUID) { + PE32 PE32 |.efi + UI STRING=3D"$(MODULE_NAME)" Optional + VERSION STRING=3D"$(INF_VERSION)" Optional BUILD_NUM=3D$(BUILD_NUMBE= R) + } +!endif + +[Rule.Common.SEC] + FILE SEC =3D $(NAMED_GUID) RELOCS_STRIPPED { + TE TE Align =3D 32 $(INF_OUTPUT)/$(MODULE_NAME).efi + } + +[Rule.Common.PEI_CORE] + FILE PEI_CORE =3D $(NAMED_GUID) { + TE TE $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING =3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.PEIM] + FILE PEIM =3D $(NAMED_GUID) { + PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.PEIM.TIANOCOMPRESSED] + FILE PEIM =3D $(NAMED_GUID) DEBUG_MYTOOLS_IA32 { + PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex + GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED =3D TR= UE { + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + } + +[Rule.Common.DXE_CORE] + FILE DXE_CORE =3D $(NAMED_GUID) { + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + + +[Rule.Common.UEFI_DRIVER] + FILE DRIVER =3D $(NAMED_GUID) { + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NA= ME).depex + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.DXE_DRIVER] + FILE DRIVER =3D $(NAMED_GUID) { + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NA= ME).depex + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.DXE_RUNTIME_DRIVER] + FILE DRIVER =3D $(NAMED_GUID) { + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NA= ME).depex + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + UI STRING=3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.UEFI_APPLICATION] + FILE APPLICATION =3D $(NAMED_GUID) { + UI STRING =3D"$(MODULE_NAME)" Optional + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi + } + +[Rule.Common.USER_DEFINED.ACPITABLE] + FILE FREEFORM =3D $(NAMED_GUID) { + RAW ACPI |.acpi + RAW ASL Optional |.aml + UI STRING=3D"$(MODULE_NAME)" Optional + } + +[Rule.Common.UEFI_DRIVER.BINARY] + FILE DRIVER =3D $(NAMED_GUID) { + DXE_DEPEX DXE_DEPEX Optional |.depex + PE32 PE32 |.efi + UI STRING=3D"$(MODULE_NAME)" Optional + VERSION STRING=3D"$(INF_VERSION)" Optional BUILD_NUM=3D$(BUILD_NUMBE= R) + } + +[Rule.Common.UEFI_APPLICATION.BINARY] + FILE APPLICATION =3D $(NAMED_GUID) { + PE32 PE32 |.efi + UI STRING=3D"$(MODULE_NAME)" Optional + VERSION STRING=3D"$(INF_VERSION)" Optional BUILD_NUM=3D$(BUILD_NUMBE= R) + } diff --git a/Silicon/NXP/iMX6Pkg/iMX6ConfigDsc.inc b/Silicon/NXP/iMX6Pkg/iM= X6ConfigDsc.inc new file mode 100644 index 000000000000..cf3b68556a4e --- /dev/null +++ b/Silicon/NXP/iMX6Pkg/iMX6ConfigDsc.inc @@ -0,0 +1,148 @@ +# +# iMX6 Common Configurations Definition +# +# Copyright (c) 2018 Microsoft Corporation. All rights reserved. +# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the B= SD License +# which accompanies this distribution. The full text of the license may = be found at +# http://opensource.org/licenses/bsd-license.php +# +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +# + +[Defines] + + # Display surface will not be drawn to. +!ifndef CONFIG_HEADLESS + DEFINE CONFIG_HEADLESS =3D FALSE +!endif + + # Useful if working with Lauterbach JTAG. Will dump to console the compl= ete + # command to copy and past into the Lauterbach command line to load symb= ols + # for each module. + # Use in conjution with Informational debug messages: + # DEBUG_INFO 0x00000040 +!ifndef CONFIG_DUMP_SYMBOL_INFO + DEFINE CONFIG_DUMP_SYMBOL_INFO =3D FALSE +!endif + + # Enable if PSCI is implemented. +!ifndef CONFIG_MPCORE + DEFINE CONFIG_MPCORE =3D TRUE +!endif + + # Disable the PCIexpress stack by default. Enable on demand. +!ifndef CONFIG_PCIE + DEFINE CONFIG_PCIE =3D FALSE +!endif + + # States whether OPTEE boot flow is in effect or not. This has the follo= wing + # implications: + # - OPTEE owns the SecureWorld and UEFI has to run in NormalWorld. + # - Specific memory layout that is defined in the platform .dsc file. + # - Temp: Running in single-core until PSCI is enabled. + # WARNING: Don't set this to FALSE unless you know what you are doing. R= unning + # UEFI in SecureWorld will most likely result in boot failure due to lac= k of + # proper CPU sec configuration. That is by UEFI design. +!ifndef CONFIG_OPTEE + DEFINE CONFIG_OPTEE =3D TRUE +!endif + + # Allow collecting performance tracing from OPTEE hot code paths + # Performance summary results can be inspected with the shell app Dp.efi +!ifndef CONFIG_OPTEE_PROFILE + DEFINE CONFIG_OPTEE_PROFILE =3D FALSE +!endif + + # Call build with -D CONFIG_SECURE_UEFI=3D1 to enable the follwing secur= ity features +!if $(CONFIG_SECURE_UEFI) =3D=3D TRUE + + # UEFI authenticated variable runtime services +!ifndef CONFIG_AUTH_VAR + DEFINE CONFIG_AUTH_VAR =3D TRUE +!endif + + # TPM stack for the fTPM +!ifndef CONFIG_MEASURED_BOOT + DEFINE CONFIG_MEASURED_BOOT =3D TRUE +!endif + + # If Platform Key (PK) is provisioned, then SecureBoot variables will ge= t + # updated to reflect that SecureBoot is enabled. Otherwise, SecureBoot + # variables will indicate that the feature is disabled, and the OS will + # not boot apply SecureBoot policies +!ifndef CONFIG_SECURE_BOOT + DEFINE CONFIG_SECURE_BOOT =3D TRUE +!endif + + # Provison SecureBoot with MS test certs and keys that are baked into th= e FV + # on first UEFI boot if SecureBoot found to be not provisioned + DEFINE CONFIG_SECURE_BOOT_AUTO_CONFIG =3D TRUE +!else + +!ifndef CONFIG_AUTH_VAR + DEFINE CONFIG_AUTH_VAR =3D FALSE +!endif + +!ifndef CONFIG_MEASURED_BOOT + DEFINE CONFIG_MEASURED_BOOT =3D FALSE +!endif + +!ifndef CONFIG_SECURE_BOOT + DEFINE CONFIG_SECURE_BOOT =3D FALSE +!endif + +!endif + +[BuildOptions] +# +# For each enabled CONFIG_* flag in the dsc files, define that flag in C c= ode. +# Description of each CONFIG_* flag exist in iMX6DefaultConfigDsc.inc +# Note: The =3D sign in BuildOptions section appends to the existing macro= , while +# =3D=3D can be used to replace its value. See the EDK2 DSC specs. +# +!if $(CONFIG_HEADLESS) =3D=3D TRUE + GCC:*_*_*_CC_FLAGS =3D -DCONFIG_HEADLESS=3D1 +!endif + +!if $(CONFIG_DUMP_SYMBOL_INFO) =3D=3D TRUE + GCC:*_*_*_CC_FLAGS =3D -DCONFIG_DUMP_SYMBOL_INFO=3D1 +!endif + +!if $(CONFIG_MPCORE) =3D=3D TRUE + GCC:*_*_*_CC_FLAGS =3D -DCONFIG_MPCORE=3D1 +!endif + +!if $(CONFIG_USB) =3D=3D TRUE + GCC:*_*_*_CC_FLAGS =3D -DCONFIG_USB=3D1 +!endif + +!if $(CONFIG_PCIE) =3D=3D TRUE + GCC:*_*_*_CC_FLAGS =3D -DCONFIG_PCIE=3D1 +!endif + +!if $(CONFIG_OPTEE) =3D=3D TRUE + GCC:*_*_*_CC_FLAGS =3D -DCONFIG_OPTEE=3D1 +!endif + +!if $(CONFIG_OPTEE_PROFILE) =3D=3D TRUE + GCC:*_*_*_CC_FLAGS =3D -DOPTEE_PROFILE=3D1 +!endif + +!if $(CONFIG_AUTH_VAR) =3D=3D TRUE + GCC:*_*_*_CC_FLAGS =3D -DCONFIG_AUTH_VAR=3D1 +!endif + +!if $(CONFIG_MEASURED_BOOT) =3D=3D TRUE + GCC:*_*_*_CC_FLAGS =3D -DCONFIG_MEASURED_BOOT=3D1 +!endif + +!if $(CONFIG_SECURE_BOOT) =3D=3D TRUE + GCC:*_*_*_CC_FLAGS =3D -DCONFIG_SECURE_BOOT=3D1 +!endif + +!if $(CONFIG_SECURE_BOOT_AUTO_CONFIG) =3D=3D TRUE + GCC:*_*_*_CC_FLAGS =3D -DCONFIG_SECURE_BOOT_AUTO_CONFIG=3D1 +!endif --=20 2.16.2.gvfs.1.33.gf5370f1