From: Leif Lindholm <leif.lindholm@linaro.org>
To: Chris Co <Christopher.Co@microsoft.com>
Cc: "edk2-devel@lists.01.org" <edk2-devel@lists.01.org>,
Ard Biesheuvel <ard.biesheuvel@linaro.org>,
Michael D Kinney <michael.d.kinney@intel.com>
Subject: Re: [PATCH edk2-platforms 24/27] Silicon/NXP: Add i.MX6 common dsc and fdf files
Date: Fri, 14 Dec 2018 23:36:45 +0000 [thread overview]
Message-ID: <20181214233644.eobs4gbimthxrcrv@bivouac.eciton.net> (raw)
In-Reply-To: <20180921082542.35768-25-christopher.co@microsoft.com>
On Fri, Sep 21, 2018 at 08:26:16AM +0000, Chris Co wrote:
> This adds the common dsc and fdf definitions for NXP i.MX6 platforms.
> Platform dsc definitions will define $(BOARD_NAME), $(IMX_FAMILY),
> $(IMX_CHIP_TYPE), $(DRAM_SIZE), and $(BOARD_DIR) to indicate
> i.MX SoC family and board-specific configurations.
>
> Contributed-under: TianoCore Contribution Agreement 1.1
> Signed-off-by: Christopher Co <christopher.co@microsoft.com>
> Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
> Cc: Leif Lindholm <leif.lindholm@linaro.org>
> Cc: Michael D Kinney <michael.d.kinney@intel.com>
> ---
> Silicon/NXP/iMX6Pkg/iMX6CommonDsc.inc | 897 ++++++++++++++++++++
> Silicon/NXP/iMX6Pkg/iMX6CommonFdf.inc | 287 +++++++
> Silicon/NXP/iMX6Pkg/iMX6ConfigDsc.inc | 148 ++++
I would prefer for these to be named .dsc.inc and .fdf.inc.
> 3 files changed, 1332 insertions(+)
>
> diff --git a/Silicon/NXP/iMX6Pkg/iMX6CommonDsc.inc b/Silicon/NXP/iMX6Pkg/iMX6CommonDsc.inc
> new file mode 100644
> index 000000000000..743a022c2b4a
> --- /dev/null
> +++ b/Silicon/NXP/iMX6Pkg/iMX6CommonDsc.inc
> @@ -0,0 +1,897 @@
> +#
> +# iMX6 Quad and Dual SOM platforms common description
> +#
> +# Copyright (c) 2018 Microsoft Corporation. All rights reserved.
> +#
> +# This program and the accompanying materials
> +# are licensed and made available under the terms and conditions of the BSD License
> +# which accompanies this distribution. The full text of the license may be found at
> +# http://opensource.org/licenses/bsd-license.php
> +#
> +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
> +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
> +#
> +
> +################################################################################
> +#
> +# [Defines] Section
> +#
> +################################################################################
> +[Defines]
> + PLATFORM_NAME = iMX6
> + PLATFORM_GUID = F01954EE-8AC4-45BC-80E5-511EAE64C38C
> + PLATFORM_VERSION = 0.1
> + DSC_SPECIFICATION = 0x00010019
> + OUTPUT_DIRECTORY = Build/$(BOARD_NAME)
> + SUPPORTED_ARCHITECTURES = ARM
> + BUILD_TARGETS = DEBUG|RELEASE
Please add NOOPT as well.
> + SKUID_IDENTIFIER = DEFAULT
> +
> +!include Silicon/NXP/iMX6Pkg/iMX6ConfigDsc.inc
> +
> +################################################################################
> +#
> +# [BuildOptions] Section
> +#
> +################################################################################
> +[BuildOptions]
> + GCC:*_*_*_CC_FLAGS = -D$(BOARD_NAME) -DCPU_$(IMX_FAMILY) -DSOCTYPE_$(IMX_CHIP_TYPE) -Wno-unused-local-typedefs
Why the disabled warning?
> + GCC:*_*_*_OBJCOPY_PATH = noop
> + GCC:*_*_*_SYMRENAME_PATH = noop
Hmm?
> + *_*_*_ASL_PATH == asl.exe
> + *_*_*_ASL_FLAGS == /MsftInternal
> + *_*_*_ASL_OUTFLAGS == /Fo=
> +
> +# CPU_* compiler flag is used to select constants for iMX6.h
> +
> +[BuildOptions.common.EDKII.DXE_CORE,BuildOptions.common.EDKII.DXE_DRIVER,BuildOptions.common.EDKII.UEFI_DRIVER,BuildOptions.common.EDKII.UEFI_APPLICATION]
> + GCC:*_*_*_DLINK_FLAGS = -z common-page-size=0x1000
> +
> +[BuildOptions.common.EDKII.DXE_RUNTIME_DRIVER]
> + GCC:*_*_ARM_DLINK_FLAGS = -z common-page-size=0x1000
You can probably drop the common-page-size overrides now, we've
changed the toolchain profiles.
> +
> +################################################################################
> +#
> +# [LibraryClasses] Sections
> +#
> +# When parsing the DSC file, the precedence rules will followed.
> +# 1. If a Library Class Instance (INF) is specified in the EDK II [Components] section
> +# (INF files <LibraryClasses> sub-section,) then it will be used.
> +# 2. If not specified in the [Components] section, then the Library Class Instance that is
> +# defined in the [LibraryClasses.$(ARCH).$(MODULE_TYPE)] section will be used.
> +# 3. If not specified in the [LibraryClasses.$(ARCH).$(MODULE_TYPE)] section, then
> +# the Library Class Instance that is defined in the
> +# [LibraryClasses.Common.$(MODULE_TYPE)] section will be used.
> +# 4. If not specified in the [LibraryClasses.Common.$(MODULE_TYPE)] section, then
> +# the Library Class Instance that is defined in the [LibraryClasses.$(ARCH)] section
> +# will be used.
> +# 5. If not specified in the [LibraryClasses.$(ARCH)] section, then the Library Class
> +# Instance that is defined in the [LibraryClasses] Section or
> +# [LibraryClasses.Common] section will be used.
> +# 6. It is an error if it has not been specified in one of the above sections
> +#
> +################################################################################
> +
> +[LibraryClasses.common]
> + #
> + # CPU and Timing
> + #
> + ArmLib|ArmPkg/Library/ArmLib/ArmBaseLib.inf
> + ArmMmuLib|ArmPkg/Library/ArmMmuLib/ArmMmuBaseLib.inf
> + CpuLib|MdePkg/Library/BaseCpuLib/BaseCpuLib.inf
> + ArmSmcLib|ArmPkg/Library/ArmSmcLib/ArmSmcLib.inf
> + CacheMaintenanceLib|ArmPkg/Library/ArmCacheMaintenanceLib/ArmCacheMaintenanceLib.inf
> + ArmDisassemblerLib|ArmPkg/Library/ArmDisassemblerLib/ArmDisassemblerLib.inf
> + UefiDecompressLib|MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.inf
> + RealTimeClockLib|Silicon/NXP/iMXPlatformPkg/Library/VirtualRealTimeClockLib/VirtualRealTimeClockLib.inf
> + DefaultExceptionHandlerLib|ArmPkg/Library/DefaultExceptionHandlerLib/DefaultExceptionHandlerLib.inf
> + CpuExceptionHandlerLib|ArmPkg/Library/ArmExceptionLib/ArmExceptionLib.inf
> + TimerLib|Silicon/NXP/iMX6Pkg/Library/TimerLib/TimerLib.inf
> +
> + #
> + # Memory
> + #
> + IoLib|MdePkg/Library/BaseIoLibIntrinsic/BaseIoLibIntrinsic.inf
> + MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf
> + MemoryInitPeiLib|ArmPlatformPkg/MemoryInitPei/MemoryInitPeiLib.inf
> + BaseMemoryLib|MdePkg/Library/BaseMemoryLib/BaseMemoryLib.inf
> + DmaLib|EmbeddedPkg/Library/NonCoherentDmaLib/NonCoherentDmaLib.inf
> + HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf
> +
> + #
> + # Platform
> + #
> + BaseLib|MdePkg/Library/BaseLib/BaseLib.inf
> + PrePiLib|EmbeddedPkg/Library/PrePiLib/PrePiLib.inf
> + ArmPlatformStackLib|ArmPlatformPkg/Library/ArmPlatformStackLib/ArmPlatformStackLib.inf
> + EfiResetSystemLib|ArmPkg/Library/ArmPsciResetSystemLib/ArmPsciResetSystemLib.inf
> +
> + #
> + # Peripherals
> + #
> + UefiUsbLib|MdePkg/Library/UefiUsbLib/UefiUsbLib.inf
> + PciLib|MdePkg/Library/BasePciLibCf8/BasePciLibCf8.inf
> + NetLib|MdeModulePkg/Library/DxeNetLib/DxeNetLib.inf
> +
> + #
> + # UEFI Services and Runtime
> + #
> + PcdLib|MdePkg/Library/DxePcdLib/DxePcdLib.inf
> + UefiLib|MdePkg/Library/UefiLib/UefiLib.inf
> + UefiBootServicesTableLib|MdePkg/Library/UefiBootServicesTableLib/UefiBootServicesTableLib.inf
> + UefiRuntimeServicesTableLib|MdePkg/Library/UefiRuntimeServicesTableLib/UefiRuntimeServicesTableLib.inf
> + DxeServicesTableLib|MdePkg/Library/DxeServicesTableLib/DxeServicesTableLib.inf
> + UefiRuntimeLib|MdePkg/Library/UefiRuntimeLib/UefiRuntimeLib.inf
> + ReportStatusCodeLib|IntelFrameworkModulePkg/Library/DxeReportStatusCodeLibFramework/DxeReportStatusCodeLib.inf
> + DxeServicesLib|MdePkg/Library/DxeServicesLib/DxeServicesLib.inf
> + CapsuleLib|MdeModulePkg/Library/DxeCapsuleLibNull/DxeCapsuleLibNull.inf
> +
> + PeCoffLib|MdePkg/Library/BasePeCoffLib/BasePeCoffLib.inf
> + PeCoffGetEntryPointLib|MdePkg/Library/BasePeCoffGetEntryPointLib/BasePeCoffGetEntryPointLib.inf
> +
> + UefiDriverEntryPoint|MdePkg/Library/UefiDriverEntryPoint/UefiDriverEntryPoint.inf
> + UefiApplicationEntryPoint|MdePkg/Library/UefiApplicationEntryPoint/UefiApplicationEntryPoint.inf
> +
> + DevicePathLib|MdePkg/Library/UefiDevicePathLib/UefiDevicePathLib.inf
> +
> + PerformanceLib|MdePkg/Library/BasePerformanceLibNull/BasePerformanceLibNull.inf
> +
> + #
> + # Human Interface Infrastructure (HII)
> + #
> + HiiLib|MdeModulePkg/Library/UefiHiiLib/UefiHiiLib.inf
> + UefiHiiServicesLib|MdeModulePkg/Library/UefiHiiServicesLib/UefiHiiServicesLib.inf
> +
> + #
> + # BDS
> + #
> + BootLogoLib|MdeModulePkg/Library/BootLogoLib/BootLogoLib.inf
> + UefiBootManagerLib|MdeModulePkg/Library/UefiBootManagerLib/UefiBootManagerLib.inf
> + PlatformBootManagerLib|ArmPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.inf
> + FdtLib|EmbeddedPkg/Library/FdtLib/FdtLib.inf
> + CustomizedDisplayLib|MdeModulePkg/Library/CustomizedDisplayLib/CustomizedDisplayLib.inf
> +
> + #
> + # Shell
> + #
> + ShellLib|ShellPkg/Library/UefiShellLib/UefiShellLib.inf
> + SortLib|MdeModulePkg/Library/UefiSortLib/UefiSortLib.inf
> +
> + #
> + # Serial, Console and Debugging
> + #
> + DebugAgentLib|MdeModulePkg/Library/DebugAgentLibNull/DebugAgentLibNull.inf
> + SerialPortLib|Silicon/NXP/iMXPlatformPkg/Library/UartSerialPortLib/UartSerialPortLib.inf
> + PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf
> +
> + # Enable debug prints in both release and debug builds
> + DebugLib|MdePkg/Library/BaseDebugLibSerialPort/BaseDebugLibSerialPort.inf
> + DebugPrintErrorLevelLib|MdePkg/Library/BaseDebugPrintErrorLevelLib/BaseDebugPrintErrorLevelLib.inf
> + #
> + # The Standard IO window in the debugger will show load and unload events for symbols.
> + #
> +!if $(CONFIG_DUMP_SYMBOL_INFO) == TRUE
> + PeCoffExtraActionLib|Platform/Microsoft/Library/LauterbachPeCoffExtraActionLib/LauterbachPeCoffExtraActionLib.inf
> +!else
> + PeCoffExtraActionLib|MdePkg/Library/BasePeCoffExtraActionLibNull/BasePeCoffExtraActionLibNull.inf
> +!endif
> +
> + #
> + # Display
> + #
> + iMXDisplayLib|Silicon/NXP/iMXPlatformPkg/Library/iMXDisplayLib/iMXDisplayLib.inf
> +
> + #
> + # Security
> + #
> + TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf
> + Tcg2PhysicalPresenceLib|SecurityPkg/Library/DxeTcg2PhysicalPresenceLib/DxeTcg2PhysicalPresenceLib.inf
> + Tcg2PpVendorLib|SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf
> +
> + #
> + # iMX6 Specifics
> + #
> + iMXIoMuxLib|Silicon/NXP/iMX6Pkg/Library/iMX6IoMuxLib/iMX6IoMuxLib.inf
> +!if $(IMX_FAMILY) == IMX6SX
> + iMX6ClkPwrLib|Silicon/NXP/iMX6Pkg/Library/iMX6SxClkPwrLib/iMX6SxClkPwrLib.inf
> +!else
> + iMX6ClkPwrLib|Silicon/NXP/iMX6Pkg/Library/iMX6ClkPwrLib/iMX6ClkPwrLib.inf
> +!endif
> + iMX6UsbPhyLib|Silicon/NXP/iMX6Pkg/Library/iMX6UsbPhyLib/iMX6UsbPhyLib.inf
> +
> +[LibraryClasses.ARM]
> + #
> + # It is not possible to prevent the ARM compiler for generic intrinsic functions.
> + # This library provides the instrinsic functions generate by a given compiler.
> + # [LibraryClasses.ARM] and NULL mean link this library into all ARM images.
> + #
> + NULL|ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf
> + NULL|MdePkg/Library/BaseStackCheckLib/BaseStackCheckLib.inf
> +
> +[LibraryClasses.common.SEC]
> + PcdLib|MdePkg/Library/BasePcdLibNull/BasePcdLibNull.inf
> + ArmGicLib|ArmPkg/Drivers/ArmGic/ArmGicLib.inf
> + ArmGicArchLib|ArmPkg/Library/ArmGicArchSecLib/ArmGicArchSecLib.inf
> + ArmPlatformStackLib|ArmPlatformPkg/Library/ArmPlatformStackLib/ArmPlatformStackLib.inf
> + ExtractGuidedSectionLib|EmbeddedPkg/Library/PrePiExtractGuidedSectionLib/PrePiExtractGuidedSectionLib.inf
> + HobLib|EmbeddedPkg/Library/PrePiHobLib/PrePiHobLib.inf
> + LzmaDecompressLib|MdeModulePkg/Library/LzmaCustomDecompressLib/LzmaCustomDecompressLib.inf
> + MemoryAllocationLib|EmbeddedPkg/Library/PrePiMemoryAllocationLib/PrePiMemoryAllocationLib.inf
> + MemoryInitPeiLib|ArmPlatformPkg/MemoryInitPei/MemoryInitPeiLib.inf
> + PeCoffLib|MdePkg/Library/BasePeCoffLib/BasePeCoffLib.inf
> + PerformanceLib|MdeModulePkg/Library/PeiPerformanceLib/PeiPerformanceLib.inf
> + PlatformPeiLib|ArmPlatformPkg/PlatformPei/PlatformPeiLib.inf
> + PrePiHobListPointerLib|ArmPlatformPkg/Library/PrePiHobListPointerLib/PrePiHobListPointerLib.inf
> + PrePiLib|EmbeddedPkg/Library/PrePiLib/PrePiLib.inf
> + DefaultExceptionHandlerLib|ArmPkg/Library/DefaultExceptionHandlerLib/DefaultExceptionHandlerLibBase.inf
> +
> +[LibraryClasses.common.PEI_CORE]
> + PcdLib|MdePkg/Library/PeiPcdLib/PeiPcdLib.inf
> + ExtractGuidedSectionLib|MdePkg/Library/PeiExtractGuidedSectionLib/PeiExtractGuidedSectionLib.inf
> + MemoryAllocationLib|MdePkg/Library/PeiMemoryAllocationLib/PeiMemoryAllocationLib.inf
> + ReportStatusCodeLib|MdeModulePkg/Library/PeiReportStatusCodeLib/PeiReportStatusCodeLib.inf
> +
> +[LibraryClasses.common.DXE_CORE]
> + DxeCoreEntryPoint|MdePkg/Library/DxeCoreEntryPoint/DxeCoreEntryPoint.inf
> + ExtractGuidedSectionLib|MdePkg/Library/DxeExtractGuidedSectionLib/DxeExtractGuidedSectionLib.inf
> + HobLib|MdePkg/Library/DxeCoreHobLib/DxeCoreHobLib.inf
> + MemoryAllocationLib|MdeModulePkg/Library/DxeCoreMemoryAllocationLib/DxeCoreMemoryAllocationLib.inf
> + PerformanceLib|MdeModulePkg/Library/DxeCorePerformanceLib/DxeCorePerformanceLib.inf
> +
> +[LibraryClasses.common.DXE_DRIVER]
> + ArmGicLib|ArmPkg/Drivers/ArmGic/ArmGicLib.inf
> + ArmGicArchLib|ArmPkg/Library/ArmGicArchLib/ArmGicArchLib.inf
> + CpuLib|MdePkg/Library/BaseCpuLib/BaseCpuLib.inf
> + DmaLib|EmbeddedPkg/Library/NonCoherentDmaLib/NonCoherentDmaLib.inf
> + FileExplorerLib|MdeModulePkg/Library/FileExplorerLib/FileExplorerLib.inf
> + PerformanceLib|MdeModulePkg/Library/DxePerformanceLib/DxePerformanceLib.inf
> + PlatformBootManagerLib|ArmPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.inf
> + SecurityManagementLib|MdeModulePkg/Library/DxeSecurityManagementLib/DxeSecurityManagementLib.inf
> + ArmSoftFloatLib|ArmPkg/Library/ArmSoftFloatLib/ArmSoftFloatLib.inf
> +
> +!if $(CONFIG_OPTEE) == TRUE
> + IntrinsicLib|CryptoPkg/Library/IntrinsicLib/IntrinsicLib.inf
> + OpensslLib|CryptoPkg/Library/OpensslLib/OpensslLib.inf
> + BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf
> + HashLib|SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.inf
> + Tpm2CommandLib|SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.inf
> +!endif
> +
> +[LibraryClasses.common.UEFI_APPLICATION]
> + PcdLib|MdePkg/Library/DxePcdLib/DxePcdLib.inf
> + FileExplorerLib|MdeModulePkg/Library/FileExplorerLib/FileExplorerLib.inf
> + ReportStatusCodeLib|IntelFrameworkModulePkg/Library/DxeReportStatusCodeLibFramework/DxeReportStatusCodeLib.inf
> + UefiDecompressLib|IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.inf
> + PerformanceLib|MdeModulePkg/Library/DxePerformanceLib/DxePerformanceLib.inf
> + HiiLib|MdeModulePkg/Library/UefiHiiLib/UefiHiiLib.inf
> + IntrinsicLib|CryptoPkg/Library/IntrinsicLib/IntrinsicLib.inf
> + DxeServicesLib|MdePkg/Library/DxeServicesLib/DxeServicesLib.inf
> + ArmSoftFloatLib|ArmPkg/Library/ArmSoftFloatLib/ArmSoftFloatLib.inf
> +
> +!if $(CONFIG_OPTEE) == TRUE
> + BaseCryptLib|CryptoPkg/Library/BaseCryptLib/BaseCryptLib.inf
> + OpensslLib|CryptoPkg/Library/OpensslLib/OpensslLib.inf
> +!endif
> +
> +[LibraryClasses.common.UEFI_DRIVER]
> + ReportStatusCodeLib|IntelFrameworkModulePkg/Library/DxeReportStatusCodeLibFramework/DxeReportStatusCodeLib.inf
> + UefiDecompressLib|IntelFrameworkModulePkg/Library/BaseUefiTianoCustomDecompressLib/BaseUefiTianoCustomDecompressLib.inf
> + ExtractGuidedSectionLib|MdePkg/Library/DxeExtractGuidedSectionLib/DxeExtractGuidedSectionLib.inf
> + PerformanceLib|MdeModulePkg/Library/DxePerformanceLib/DxePerformanceLib.inf
> + DxeServicesLib|MdePkg/Library/DxeServicesLib/DxeServicesLib.inf
> +
> +[LibraryClasses.common.DXE_RUNTIME_DRIVER]
> + HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf
> + MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf
> + ReportStatusCodeLib|IntelFrameworkModulePkg/Library/DxeReportStatusCodeLibFramework/DxeReportStatusCodeLib.inf
> + CapsuleLib|MdeModulePkg/Library/DxeCapsuleLibNull/DxeCapsuleLibNull.inf
> + PeCoffLib|MdePkg/Library/BasePeCoffLib/BasePeCoffLib.inf
> + DxeServicesLib|MdePkg/Library/DxeServicesLib/DxeServicesLib.inf
> + PerformanceLib|MdeModulePkg/Library/DxePerformanceLib/DxePerformanceLib.inf
> +
> +!if $(CONFIG_OPTEE) == TRUE
> +!if $(CONFIG_MEASURED_BOOT) == TRUE
> + TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf
> +!endif
> +!endif
> +
> +################################################################################
> +#
> +# PCD Sections
> +#
> +################################################################################
> +
> +########################
> +#
> +# ArmPkg PCDs
> +#
> +########################
> +[PcdsFeatureFlag.common]
> + #
> + # Use the Vector Table location in CpuDxe. We will not copy the Vector Table at
> + # PcdCpuVectorBaseAddress
> + #
> + gArmTokenSpaceGuid.PcdRelocateVectorTable|FALSE
Don't think that one does anything anymore.
> +
> +[PcdsFixedAtBuild.common]
> + gArmTokenSpaceGuid.PcdTrustzoneSupport|FALSE
Nor that one.
> + gArmTokenSpaceGuid.PcdVFPEnabled|1
> +
> + #
> + # ARM General Interrupt Controller settings
> + #
> + gArmTokenSpaceGuid.PcdGicDistributorBase|0x00A01000
> + gArmTokenSpaceGuid.PcdGicInterruptInterfaceBase|0x00A00100
> + gArmTokenSpaceGuid.PcdArmPrimaryCore|0x000
> +
> + #
> + # ARM L2x0 PCDs
> + #
> + #gArmTokenSpaceGuid.PcdL2x0ControllerBase|0x00A02000
Blimey, there's a blast from the past.
Please just delete rather than commenting out.
> +
> + #
> + # GPT Timer Frequency
> + # Set to 1KHz, which equals to 1us resolution
> + #
> + gArmTokenSpaceGuid.PcdArmArchTimerFreqInHz|1000000
> +
> +########################
> +#
> +# ArmPlatformPkg PCDs
> +#
> +########################
> +[PcdsFixedAtBuild.common]
> + # Size of the region used by UEFI in permanent memory (Reserved 16MB)
> + gArmPlatformTokenSpaceGuid.PcdSystemMemoryUefiRegionSize|0x01000000
> +
> +!if $(IMX_FAMILY) == IMX6SX
> + #
> + # Refer to the detailed memory map at OpteeClientPkg PCDs section below
> + #
> + giMX6TokenSpaceGuid.PcdMemoryStartAddress|0x80000000
> + gArmTokenSpaceGuid.PcdSystemMemoryBase|0x829D4000
> + !if $(DRAM_SIZE) == DRAM_512MB
> + #
> + # Board DDR starts at 0x80000000 and ends 0x9FFF0000 (512MB)
> + # SystemMemorySize is 0x9FFF0000 - PcdSystemMemoryBase
> + #
> + giMX6TokenSpaceGuid.PcdMemoryEndAddress|0x9FFF0000
> + gArmTokenSpaceGuid.PcdSystemMemorySize|0x1D61C000
> + !elseif $(DRAM_SIZE) == DRAM_1GB
> + #
> + # Board DDR starts at 0x80000000 and ends 0xBFFF0000 (1GB)
> + # SystemMemorySize is 0xBFFF0000 - PcdSystemMemoryBase
> + #
> + giMX6TokenSpaceGuid.PcdMemoryEndAddress|0xBFFF0000
> + gArmTokenSpaceGuid.PcdSystemMemorySize|0x3D61C000
> + !else
> + #
> + # Board DDR starts at 0x80000000 and ends 0xFFFF0000 (2GB)
> + # SystemMemorySize is 0xFFFF0000 - PcdSystemMemoryBase
> + #
> + giMX6TokenSpaceGuid.PcdMemoryEndAddress|0xFFFF0000
> + gArmTokenSpaceGuid.PcdSystemMemorySize|0x7D61C000
> + !endif
> +!else
> + giMX6TokenSpaceGuid.PcdMemoryStartAddress|0x10000000
> + gArmTokenSpaceGuid.PcdSystemMemoryBase|0x12A00000
> +
> + !if $(DRAM_SIZE) == DRAM_512MB
> + #
> + # Board DDR starts at 0x10000000 and ends 0x2FFF0000 (512MB)
> + # SystemMemorySize is 0x2FFF0000 - PcdSystemMemoryBase
> + #
> + giMX6TokenSpaceGuid.PcdMemoryEndAddress|0x2FFF0000
> + gArmTokenSpaceGuid.PcdSystemMemorySize|0x1D5F0000
> + !elseif $(DRAM_SIZE) == DRAM_1GB
> + #
> + # Board DDR starts at 0x10000000 and ends 0x4FFF0000 (1GB)
> + # SystemMemorySize is 0x4FFF0000 - PcdSystemMemoryBase
> + #
> + giMX6TokenSpaceGuid.PcdMemoryEndAddress|0x4FFF0000
> + gArmTokenSpaceGuid.PcdSystemMemorySize|0x3D5F0000
> + !else
> + #
> + # Board DDR starts at 0x10000000 and ends 0x8FFF0000 (2GB)
> + # SystemMemorySize is 0x8FFF0000 - PcdSystemMemoryBase
> + #
> + giMX6TokenSpaceGuid.PcdMemoryEndAddress|0x8FFF0000
> + gArmTokenSpaceGuid.PcdSystemMemorySize|0x7D5F0000
> + !endif
> +!endif
> +
> +!if $(CONFIG_MPCORE) == TRUE
> + !if (($(IMX_CHIP_TYPE) == QUAD) || ($(IMX_CHIP_TYPE) == QUADPLUS))
> + gArmPlatformTokenSpaceGuid.PcdCoreCount|4
> + !elseif (($(IMX_CHIP_TYPE) == DUAL) || ($(IMX_CHIP_TYPE) == DUALLITE))
> + gArmPlatformTokenSpaceGuid.PcdCoreCount|2
> + !else
> + gArmPlatformTokenSpaceGuid.PcdCoreCount|1
> + !endif
> +!else
> + gArmPlatformTokenSpaceGuid.PcdCoreCount|1
> +!endif
> +
> +########################
> +#
> +# MdePkg PCDs
> +#
> +########################
> +[PcdsFeatureFlag.common]
> + gEfiMdePkgTokenSpaceGuid.PcdComponentNameDisable|TRUE
> + gEfiMdePkgTokenSpaceGuid.PcdDriverDiagnosticsDisable|TRUE
> + gEfiMdePkgTokenSpaceGuid.PcdComponentName2Disable|TRUE
> + gEfiMdePkgTokenSpaceGuid.PcdDriverDiagnostics2Disable|TRUE
> +
> +[PcdsFixedAtBuild.common]
> + gEfiMdePkgTokenSpaceGuid.PcdMaximumUnicodeStringLength|1000000
> + gEfiMdePkgTokenSpaceGuid.PcdMaximumAsciiStringLength|1000000
> + gEfiMdePkgTokenSpaceGuid.PcdMaximumLinkedListLength|1000000
> + gEfiMdePkgTokenSpaceGuid.PcdSpinLockTimeout|10000000
> + gEfiMdePkgTokenSpaceGuid.PcdDebugClearMemoryValue|0xAF
> + gEfiMdePkgTokenSpaceGuid.PcdPostCodePropertyMask|0
> + gEfiMdePkgTokenSpaceGuid.PcdUefiLibMaxPrintBufferSize|320
> + gEfiMdePkgTokenSpaceGuid.PcdPerformanceLibraryPropertyMask|1
> +
> + #
> + # DEBUG_ASSERT_ENABLED 0x01
> + # DEBUG_PRINT_ENABLED 0x02
> + # DEBUG_CODE_ENABLED 0x04
> + # CLEAR_MEMORY_ENABLED 0x08
> + # ASSERT_BREAKPOINT_ENABLED 0x10
> + # ASSERT_DEADLOOP_ENABLED 0x20
> + #
> + !if $(TARGET) == RELEASE
> + gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0x23
> + !else
> + gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0x2f
> + !endif
> +
> + #
> + # Debug Flags as defined in DebugLib.h
> + #
> + # DEBUG_INIT 0x00000001 // Initialization
> + # DEBUG_WARN 0x00000002 // Warnings
> + # DEBUG_LOAD 0x00000004 // Load events
> + # DEBUG_FS 0x00000008 // EFI File system
> + # DEBUG_POOL 0x00000010 // Alloc & Free (pool)
> + # DEBUG_PAGE 0x00000020 // Alloc & Free (page)
> + # DEBUG_INFO 0x00000040 // Informational debug messages
> + # DEBUG_DISPATCH 0x00000080 // PEI/DXE/SMM Dispatchers
> + # DEBUG_VARIABLE 0x00000100 // Variable
> + # DEBUG_BM 0x00000400 // Boot Manager
> + # DEBUG_BLKIO 0x00001000 // BlkIo Driver
> + # DEBUG_NET 0x00004000 // Network Io Driver
> + # DEBUG_UNDI 0x00010000 // UNDI Driver
> + # DEBUG_LOADFILE 0x00020000 // LoadFile
> + # DEBUG_TEEC 0x00040000 // TEE Client Tracings
> + # DEBUG_EVENT 0x00080000 // Event messages
> + # DEBUG_GCD 0x00100000 // Global Coherency Database changes
> + # DEBUG_CACHE 0x00200000 // Memory range cachability changes
> + # DEBUG_VERBOSE 0x00400000 // Detailed debug messages that may
> + # // significantly impact boot performance
> + # DEBUG_ERROR 0x80000000 // Error
> + #
> + # By default only enable init, error, warning and load debug prints to minimize
> + # debug messages. Use "0x8FEF4DCF" for detailed debugging purposes.
> + #
> +!if $(TARGET) == RELEASE
> + #
> + # In release builds enable error, warning, and load (base and entry point)
> + #
> + gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel| 0x80000006
> +!else
> + #
> + # In debug builds enable error, cache, info, load, warn, and init
> + #
> + gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel| 0x80000047
> +!endif
> + gEfiMdePkgTokenSpaceGuid.PcdReportStatusCodePropertyMask|0x07
> + gEfiMdePkgTokenSpaceGuid.PcdPlatformBootTimeOut|0
> +
> +########################
> +#
> +# MdeModulePkg PCDs
> +#
> +########################
> +[PcdsFeatureFlag.common]
> + gEfiMdeModulePkgTokenSpaceGuid.PcdTurnOffUsbLegacySupport|TRUE
> +
> + ## If TRUE, Graphics Output Protocol will be installed on virtual handle created by ConsplitterDxe.
> + # It could be set FALSE to save size.
> + gEfiMdeModulePkgTokenSpaceGuid.PcdConOutGopSupport|TRUE
> +
> +[PcdsFixedAtBuild.common]
> + gEfiMdeModulePkgTokenSpaceGuid.PcdMaxVariableSize|0x2000
> + gEfiMdePkgTokenSpaceGuid.PcdDefaultTerminalType|4
> + gEfiMdeModulePkgTokenSpaceGuid.PcdResetOnMemoryTypeInformationChange|FALSE
> + # GUID of the UI app
> + gEfiMdeModulePkgTokenSpaceGuid.PcdBootManagerMenuFile|{ 0x21, 0xaa, 0x2c, 0x46, 0x14, 0x76, 0x03, 0x45, 0x83, 0x6e, 0x8a, 0xb6, 0xf4, 0x66, 0x23, 0x31 }
> +
> +[PcdsPatchableInModule]
> + # Console Resolution
> + gEfiMdeModulePkgTokenSpaceGuid.PcdVideoHorizontalResolution|1920
> + gEfiMdeModulePkgTokenSpaceGuid.PcdVideoVerticalResolution|1080
> +
> +########################
> +#
> +# EmbeddedPkg PCDs
> +#
> +########################
> +[PcdsFeatureFlag.common]
> + gEmbeddedTokenSpaceGuid.PcdPrePiProduceMemoryTypeInformationHob|TRUE
> +
> +[PcdsFixedAtBuild.common]
> + #
> + # Optional feature to help prevent EFI memory map fragments
> + # Turned on and off via: PcdPrePiProduceMemoryTypeInformationHob
> + # Values are in EFI Pages (4K). DXE Core will make sure that
> + # at least this much of each type of memory can be allocated
> + # from a single memory range. This way you only end up with
> + # maximum of two fragements for each type in the memory map
> + # (the memory used, and the free memory that was prereserved
> + # but not used).
> + #
> + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiACPIReclaimMemory|0
> + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiACPIMemoryNVS|0
> + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiReservedMemoryType|0
> + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiRuntimeServicesData|80
> + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiRuntimeServicesCode|40
> + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiBootServicesCode|400
> + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiBootServicesData|3000
> + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiLoaderCode|10
> + gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiLoaderData|0
> +
> + #
> + # Timer Configuration
> + #
> + # The timer period is configured in units of 100ns. We configure it for 10ms
> + # timer ticks which will be used mainly by DXE Core to keep track of system
> + # time and hence keep track of all events.
> + #
> + gEmbeddedTokenSpaceGuid.PcdTimerPeriod|100000
> +
> +########################
> +#
> +# IntelFrameworkModulePkg PCDs
> +#
> +########################
> +[PcdsFixedAtBuild.common]
> + # GUID of the UEFI Shell
> + gEfiIntelFrameworkModulePkgTokenSpaceGuid.PcdShellFile|{ 0x83, 0xA5, 0x04, 0x7C, 0x3E, 0x9E, 0x1C, 0x4F, 0xAD, 0x65, 0xE0, 0x52, 0x68, 0xD0, 0xB4, 0xD1 }
> +
> +########################
> +#
> +# OpteeClientPkg PCDs
> +#
> +########################
> +[PcdsFixedAtBuild.common]
> +!if $(IMX_FAMILY) == IMX6SX
> + #
> + # Reserved for TPM2 ACPI
> + # 0x82000000 - 0x82002FFF
> + #
> + gOpteeClientPkgTokenSpaceGuid.PcdTpm2AcpiBufferBase|0x82000000
> + gOpteeClientPkgTokenSpaceGuid.PcdTpm2AcpiBufferSize|0x3000
> +
> + #
> + # iMX Plaform Memory Layout
> + #
> + # +-------------------+===> (0x80000000) PcdTrustZonePrivateMemoryBase (OPTEE image base address)
> + # | TZ Private Memory | ^
> + # | (OPTEE) | | (0x01E00000) PcdTrustZonePrivateMemorySize 30MB
> + # | | v
> + # +-------------------+===> (0x81E00000) PcdTrustZoneSharedMemoryBase (includes mobj bookkeeping page)
> + # | TZ Shared Memory | ^
> + # | | | (0x00200000) PcdTrustZoneSharedMemorySize 2MB
> + # | | v
> + # +-------------------|===> (0x82000000) PcdTpm2AcpiBufferBase
> + # | TPM2 Control Area | ^
> + # | | | (0x00003000) PcdTpm2AcpiBufferSize 12KB
> + # | | v
> + # +-------------------+===> (0x82003000) PcdGlobalDataBaseAddress
> + # | Global Data | ^
> + # | | | (0x00001000) PcdGlobalDataSize 4KB
> + # | | v
> + # +-------------------+===> (0x82004000) PcdFdBaseAddress (UEFI Load Address)
> + # | UEFI | ^
> + # | | | (0x001D0000) PcdFdSize 1856KB
> + # | | v
> + # +-------------------+===> (0x821D4000) PcdFrameBufferBase
> + # | FrameBuffer | ^
> + # | | | (0x00800000) PcdFrameBufferSize 8MB
> + # | | v
> + # +-------------------+===> (0x829D4000) PcdSystemMemoryBase
> + # | Operating System | ^
> + # | Memory | |
> + # | | |
> + # | | v
> + # +------------------ +===>
> +
> + DEFINE GLOBAL_DATA_BASE_ADDRESS = 0x82003000
> +
> + gOpteeClientPkgTokenSpaceGuid.PcdTrustZonePrivateMemoryBase|0x80000000
> + gOpteeClientPkgTokenSpaceGuid.PcdTrustZonePrivateMemorySize|0x01E00000
> +
> + #
> + # TrustZone shared memory (2Mb)
> + # This memory is managed by the normal world but shared with the OpTEE OS.
> + # It must match OpTEE optee_os/core/arch/arm/plat-imx/platform_config.h:
> + # CFG_SHMEM_START & CFG_SHMEM_SIZE
> + # NOTE: The first page of the SHMEM is owned by OPTEE for mobj bookkeeping
> + # and we should not touch it. We will skip the first 4K of SHMEM and take that
> + # into account for SHMEM size in PcdTrustZoneSharedMemorySize.
> + #
> + gOpteeClientPkgTokenSpaceGuid.PcdTrustZoneSharedMemoryBase|0x81E00000
> + gOpteeClientPkgTokenSpaceGuid.PcdTrustZoneSharedMemorySize|0x00200000
> +
> + giMX6TokenSpaceGuid.PcdFrameBufferBase|0x821D4000
> +
> +!else
> + #
> + # Reserved for TPM2 ACPI
> + # 0x10814000 - 0x10816FFF
> + #
> + gOpteeClientPkgTokenSpaceGuid.PcdTpm2AcpiBufferBase|0x10814000
> + gOpteeClientPkgTokenSpaceGuid.PcdTpm2AcpiBufferSize|0x3000
> +
> + #
> + # iMX Plaform Memory Layout
> + #
> + # +-------------------+===> (0x10000000) PcdFrameBufferBase (DDR Start Address)
> + # |Frame Buffer | ^
> + # | | | (0x00800000) PcdFrameBufferSize 8MB
> + # | | v
> + # +-------------------+===
> + # | | Gap
> + # +-------------------|===> (0x10814000) PcdTpm2AcpiBufferBase
> + # |TPM2 Control Area | ^
> + # | | | (0x3000) 12KB
> + # | | v
> + # +-------------------+===> (0x10817000) PcdGlobalDataBaseAddress
> + # | Global Data | ^
> + # | | | (0x1000) PcdGlobalDataSize 4KB
> + # | | v
> + # +-------------------+===
> + # | Gap |
> + # +-------------------+===> (0x10820000) UEFI Load Address
> + # | UEFI | ^
> + # | | | (0x1D0000) 1920KB
> + # | | v
> + # +-------------------+===> (0x10A00000) PcdTrustZonePrivateMemoryBase (OPTEE image base address)
> + # | TZ Private Memory | ^
> + # | (OPTEE) | | (0x1E00000) 30MB
> + # | | v
> + # +-------------------+===> (0x12800000) PcdTrustZoneSharedMemoryBase (includes mobj bookkeeping page)
> + # | TZ Shared Memory | ^
> + # | | | (0x200000) 2MB
> + # | | v
> + # +-------------------+===> (0x12A00000) PcdSystemMemoryBase
> + # | Operating System | ^
> + # | Memory | | (0x3D5F0000) 982MB for 1GB DRAM OR
> + # | | | (0x7D5F0000) 2005MB for 2GB DRAM
> + # | | v
> + # +------------------ +===
> + #
> + # Reserved for Optee private memory (31M)
> + # 0x10A00000 - 0x127FFFFF
> + #
> + # TrustZone private memory (?Mb OPTEE + ?Mb PSCI)
> + # 0x8E000000 - 8FEFFFFF
> + # This memory is managed privately by the OpTEE OS.
> + # CFG_DDR_TEETZ_RESERVED_START & CFG_DDR_TEETZ_RESERVED_START
> + #
> +
> + DEFINE GLOBAL_DATA_BASE_ADDRESS = 0x10817000
> +
> + gOpteeClientPkgTokenSpaceGuid.PcdTrustZonePrivateMemoryBase|0x10A00000
> + gOpteeClientPkgTokenSpaceGuid.PcdTrustZonePrivateMemorySize|0x01E00000
> +
> + #
> + # TrustZone shared memory (2Mb)
> + # 0x12800000 - 0x129FFFFF
> + # This memory is managed by the normal world but shared with the OpTEE OS.
> + # It must match OpTEE optee_os/core/arch/arm/plat-imx/platform_config.h:
> + # CFG_SHMEM_START & CFG_SHMEM_SIZE
> + # NOTE: The first page of the SHMEM is owned by OPTEE for mobj bookkeeping
> + # and we should not touch it. We will skip the first 4K of SHMEM and take that
> + # into account for SHMEM size in PcdTrustZoneSharedMemorySize.
> + #
> + gOpteeClientPkgTokenSpaceGuid.PcdTrustZoneSharedMemoryBase|0x12800000
> + gOpteeClientPkgTokenSpaceGuid.PcdTrustZoneSharedMemorySize|0x00200000
> +
> + giMX6TokenSpaceGuid.PcdFrameBufferBase|0x10000000
> +
> +!endif
> +########################
> +#
> +# SecurityPkg PCDs
> +#
> +########################
> +[PcdsFixedAtBuild.common]
> + #
> + # override the default values from SecurityPkg to ensure images from all sources are verified in secure boot
> + #
> + gEfiSecurityPkgTokenSpaceGuid.PcdOptionRomImageVerificationPolicy|0x04
> + gEfiSecurityPkgTokenSpaceGuid.PcdFixedMediaImageVerificationPolicy|0x04
> + gEfiSecurityPkgTokenSpaceGuid.PcdRemovableMediaImageVerificationPolicy|0x04
> +
> + #
> + # PcdTpmInstanceGuid tells the Tcg2 Driver which TPM version is being used.
> + # The below GUID is TPMv2 GUID.
> + #
> + gEfiSecurityPkgTokenSpaceGuid.PcdTpmInstanceGuid|{ 0x5a, 0xf2, 0x6b, 0x28, 0xc3, 0xc2, 0x8c, 0x40, 0xb3, 0xb4, 0x25, 0xe6, 0x75, 0x8b, 0x73, 0x17 }
> +
> + ## Sets the default Physical Presence flags that are consumed by the PP TrEE library.
> + #
> + # Options are defined in TrEEPhysicalPresenceData.h
> + # Current setting:
> + # TREE_FLAG_NO_PPI_CLEAR
> + #
> + #gEfiSecurityPkgTokenSpaceGuid.PcdPPDefaultTrEEFlags|0x02
> +
> + ## Indicates whether or not the Tcg2Dxe should measure CRTM instead of PEI.
> + # TRUE means the Tcg2Dxe will measure CRTM.
> + #
> + #gEfiSecurityPkgTokenSpaceGuid.PcdLateMeasureCRTM|TRUE
> +
> +[PcdsDynamicExDefault.common.DEFAULT]
> + gEfiSecurityPkgTokenSpaceGuid.PcdTcg2HashAlgorithmBitmap|0x0
> +
> +########################
> +#
> +# MsPkg PCDs
> +#
> +########################
> +[PcdsFixedAtBuild.common]
> +
> + #
> + # SD first FAT partition device path:
> + # VenHw(AAFB8DAA-7340-43AC-8D49-0CCE14812489,03000000)/SD(0x0)/HD(1,MBR,0xAE420040,0x1000,0x20000)
> + #
> + # eMMC first FAT partition device path:
> + # VenHw(AAFB8DAA-7340-43AC-8D49-0CCE14812489,04000000)/eMMC(0x0)/HD(1,MBR,0xAE420040,0x1000,0x20000)
> + #
> + # Use the SDCard first fat partition for logging and misc storage.
> + #
> + gMsPkgTokenSpaceGuid.PcdStorageMediaPartitionDevicePath|L"VenHw(AAFB8DAA-7340-43AC-8D49-0CCE14812489,03000000)/SD(0x0)/HD(1,MBR,0xAE420040,0x1000,0x20000)"
> +
> +!if $(CONFIG_SECURE_BOOT) == TRUE
> + gMsPkgTokenSpaceGuid.PcdSecureBootEnable|TRUE
> +!else
> + gMsPkgTokenSpaceGuid.PcdSecureBootEnable|FALSE
> +!endif
What is this Pcd used for?
> +
> +########################
> +#
> +# iMXPlatformPkg PCDs
> +#
> +########################
> +[PcdsFixedAtBuild.common]
> +
> + # Global data area
> + giMXPlatformTokenSpaceGuid.PcdGlobalDataBaseAddress|$(GLOBAL_DATA_BASE_ADDRESS)
> + giMXPlatformTokenSpaceGuid.PcdGlobalDataSize|0x1000
> +
> +################################################################################
> +#
> +# [Components] Section
> +#
> +################################################################################
> +[Components.common]
> +
> + #
> + # SEC (PrePi)
> + #
> + ArmPlatformPkg/PrePi/PeiMPCore.inf
> +
> + #
> + # DXE Core
> + #
> + MdeModulePkg/Core/Dxe/DxeMain.inf {
> + <LibraryClasses>
> + NULL|MdeModulePkg/Library/DxeCrc32GuidedSectionExtractLib/DxeCrc32GuidedSectionExtractLib.inf
> + }
> + MdeModulePkg/Universal/PCD/Dxe/Pcd.inf {
> + <LibraryClasses>
> + PcdLib|MdePkg/Library/BasePcdLibNull/BasePcdLibNull.inf
> + }
> +
> + #
> + # DXE required Architectural Protocols as defined by UEFI 2.6 specs
> + #
> + # BDS Arch Protocol
> + # CPU Arch Protocol
> + # Metronome Arch Protocol
> + # Real Time Clock Arch Protocol
> + # Reset Arch Protocol
> + # Runtime Arch Protocol
> + # Security Arch Protocol
> + # Timer Arch Protocol
> + # Variable Arch Protocol
> + # Variable Write Arch Protocol
> + # EFI Capsule Arch Protocol
> + # Watchdog Timer Arch Protocol
> + #
> +
> + ArmPkg/Drivers/CpuDxe/CpuDxe.inf
> + EmbeddedPkg/MetronomeDxe/MetronomeDxe.inf
> + EmbeddedPkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf
> + EmbeddedPkg/ResetRuntimeDxe/ResetRuntimeDxe.inf
> + MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
> + MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf {
> + <LibraryClasses>
> + NULL|SecurityPkg/Library/DxeImageVerificationLib/DxeImageVerificationLib.inf
> + NULL|SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.inf
> + }
> + Silicon/NXP/iMX6Pkg/Drivers/TimerDxe/TimerDxe.inf
> + MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
> + MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
> + ArmPkg/Drivers/ArmGic/ArmGicDxe.inf
> + MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
> +
> + #
> + # Serial Console
> + #
> + MdeModulePkg/Universal/SerialDxe/SerialDxe.inf
> + EmbeddedPkg/SimpleTextInOutSerial/SimpleTextInOutSerial.inf
> + MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
> +
> + #
> + # Filesystem Stack
> + #
> + MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
> + MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
> + MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
> + FatPkg/EnhancedFatDxe/Fat.inf
> + Platform/Microsoft/Drivers/SdMmcDxe/SdMmcDxe.inf
> + Silicon/NXP/iMXPlatformPkg/Drivers/SdhcDxe/SdhcDxe.inf
> +
> + # PCIe support
> + Silicon/NXP/iMX6Pkg/Drivers/PciExpress/iMX6PciExpress.inf
> +
> + #
> + # Generic Bds (Not Intel's)
> + #
> + MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
> + MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
> + MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
> + MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
> + MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
> + MdeModulePkg/Application/UiApp/UiApp.inf {
> + <LibraryClasses>
> + NULL|MdeModulePkg/Library/DeviceManagerUiLib/DeviceManagerUiLib.inf
> + NULL|MdeModulePkg/Library/BootManagerUiLib/BootManagerUiLib.inf
> + NULL|MdeModulePkg/Library/BootMaintenanceManagerUiLib/BootMaintenanceManagerUiLib.inf
> + }
> +
> + #
> + # Shell
> + #
> + ShellPkg/Application/Shell/Shell.inf {
> + <LibraryClasses>
> + ShellCommandLib|ShellPkg/Library/UefiShellCommandLib/UefiShellCommandLib.inf
> + BcfgCommandLib|ShellPkg/Library/UefiShellBcfgCommandLib/UefiShellBcfgCommandLib.inf
> + HandleParsingLib|ShellPkg/Library/UefiHandleParsingLib/UefiHandleParsingLib.inf
> + NULL|ShellPkg/Library/UefiShellDebug1CommandsLib/UefiShellDebug1CommandsLib.inf
> + NULL|ShellPkg/Library/UefiShellDriver1CommandsLib/UefiShellDriver1CommandsLib.inf
> + NULL|ShellPkg/Library/UefiShellInstall1CommandsLib/UefiShellInstall1CommandsLib.inf
> + NULL|ShellPkg/Library/UefiShellLevel1CommandsLib/UefiShellLevel1CommandsLib.inf
> + NULL|ShellPkg/Library/UefiShellLevel2CommandsLib/UefiShellLevel2CommandsLib.inf
> + NULL|ShellPkg/Library/UefiShellLevel3CommandsLib/UefiShellLevel3CommandsLib.inf
> + NULL|ShellPkg/Library/UefiShellNetwork1CommandsLib/UefiShellNetwork1CommandsLib.inf
> + PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf
> +
> + <PcdsFixedAtBuild>
> + gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0xFF
> + gEfiShellPkgTokenSpaceGuid.PcdShellLibAutoInitialize|FALSE
> + gEfiMdePkgTokenSpaceGuid.PcdUefiLibMaxPrintBufferSize|8000
> + }
> +
> +MdeModulePkg/Universal/Variable/EmuRuntimeDxe/EmuVariableRuntimeDxe.inf
> +
> +#
> +# Boilerplate for compiling UEFI applications and UEFI drivers with the
> +# standard library.
> +#
> +!include StdLib/StdLib.inc
Wait, what?
Please tell me we're not actually using that?
/
Leif
> diff --git a/Silicon/NXP/iMX6Pkg/iMX6CommonFdf.inc b/Silicon/NXP/iMX6Pkg/iMX6CommonFdf.inc
> new file mode 100644
> index 000000000000..877f575d7999
> --- /dev/null
> +++ b/Silicon/NXP/iMX6Pkg/iMX6CommonFdf.inc
> @@ -0,0 +1,287 @@
> +#
> +# FLASH layout file for iMX6 Quad and Dual SOM boards.
> +#
> +# Copyright (c) 2018 Microsoft Corporation. All rights reserved.
> +#
> +# This program and the accompanying materials
> +# are licensed and made available under the terms and conditions of the BSD License
> +# which accompanies this distribution. The full text of the license may be found at
> +# http://opensource.org/licenses/bsd-license.php
> +#
> +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
> +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
> +#
> +
> +# Continuation of [FV.FvMain]
> + INF MdeModulePkg/Core/Dxe/DxeMain.inf
> + INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
> +
> + #
> + # PI DXE Drivers producing Architectural Protocols (EFI Services)
> + #
> + INF ArmPkg/Drivers/CpuDxe/CpuDxe.inf
> +
> + INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
> + INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
> + INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
> + INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
> + INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
> +
> + INF ArmPkg/Drivers/ArmGic/ArmGicDxe.inf
> + # Timers
> + INF Silicon/NXP/iMX6Pkg/Drivers/TimerDxe/TimerDxe.inf
> +
> + INF MdeModulePkg/Universal/SerialDxe/SerialDxe.inf
> + INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
> + INF EmbeddedPkg/SimpleTextInOutSerial/SimpleTextInOutSerial.inf
> +
> + INF EmbeddedPkg/ResetRuntimeDxe/ResetRuntimeDxe.inf
> + INF EmbeddedPkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf
> + INF EmbeddedPkg/MetronomeDxe/MetronomeDxe.inf
> +
> + #
> + # Filesystem Stack
> + #
> + INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
> + INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
> + INF FatBinPkg/EnhancedFatDxe/Fat.inf
> + INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
> + INF Platform/Microsoft/Drivers/SdMmcDxe/SdMmcDxe.inf
> + INF Silicon/NXP/iMXPlatformPkg/Drivers/SdhcDxe/SdhcDxe.inf
> +
> + #
> + # PCIe
> + #
> + INF Silicon/NXP/iMX6Pkg/Drivers/PciExpress/iMX6PciExpress.inf
> +
> + #
> + # Bds
> + #
> + INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
> + INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
> + INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
> + INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
> + INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
> + INF MdeModulePkg/Application/UiApp/UiApp.inf
> +
> + #
> + # UEFI application (Shell Embedded Boot Loader)
> + #
> + INF ShellPkg/Application/Shell/Shell.inf
> +
> +INF MdeModulePkg/Universal/Variable/EmuRuntimeDxe/EmuVariableRuntimeDxe.inf
> +
> +[FV.FVMAIN_COMPACT]
> +FvAlignment = 8
> +ERASE_POLARITY = 1
> +MEMORY_MAPPED = TRUE
> +STICKY_WRITE = TRUE
> +LOCK_CAP = TRUE
> +LOCK_STATUS = TRUE
> +WRITE_DISABLED_CAP = TRUE
> +WRITE_ENABLED_CAP = TRUE
> +WRITE_STATUS = TRUE
> +WRITE_LOCK_CAP = TRUE
> +WRITE_LOCK_STATUS = TRUE
> +READ_DISABLED_CAP = TRUE
> +READ_ENABLED_CAP = TRUE
> +READ_STATUS = TRUE
> +READ_LOCK_CAP = TRUE
> +READ_LOCK_STATUS = TRUE
> +
> + INF ArmPlatformPkg/PrePi/PeiMPCore.inf
> +
> + FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {
> + SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {
> + SECTION FV_IMAGE = FVMAIN
> + }
> + }
> +
> +
> +################################################################################
> +#
> +# Rules are use with the [FV] section's module INF type to define
> +# how an FFS file is created for a given INF file. The following Rule are the default
> +# rules for the different module type. User can add the customized rules to define the
> +# content of the FFS file.
> +#
> +################################################################################
> +
> +
> +############################################################################
> +# Example of a DXE_DRIVER FFS file with a Checksum encapsulation section #
> +############################################################################
> +#
> +#[Rule.Common.DXE_DRIVER]
> +# FILE DRIVER = $(NAMED_GUID) {
> +# DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
> +# COMPRESS PI_STD {
> +# GUIDED {
> +# PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> +# UI STRING="$(MODULE_NAME)" Optional
> +# VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
> +# }
> +# }
> +# }
> +#
> +############################################################################
> +!if 0
> +[Rule.Common.SEC]
> + FILE SEC = $(NAMED_GUID) RELOCS_STRIPPED {
> + TE TE Align = 32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> + }
> +
> +[Rule.Common.PEI_CORE]
> + FILE PEI_CORE = $(NAMED_GUID) {
> + TE TE $(INF_OUTPUT)/$(MODULE_NAME).efi
> + UI STRING ="$(MODULE_NAME)" Optional
> + }
> +
> +[Rule.Common.PEIM]
> + FILE PEIM = $(NAMED_GUID) {
> + PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
> + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> + UI STRING="$(MODULE_NAME)" Optional
> + }
> +
> +[Rule.Common.PEIM.TIANOCOMPRESSED]
> + FILE PEIM = $(NAMED_GUID) DEBUG_MYTOOLS_IA32 {
> + PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
> + GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED = TRUE {
> + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> + UI STRING="$(MODULE_NAME)" Optional
> + }
> + }
> +
> +[Rule.Common.DXE_CORE]
> + FILE DXE_CORE = $(NAMED_GUID) {
> + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> + UI STRING="$(MODULE_NAME)" Optional
> + }
> +
> +
> +[Rule.Common.UEFI_DRIVER]
> + FILE DRIVER = $(NAMED_GUID) {
> + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
> + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> + UI STRING="$(MODULE_NAME)" Optional
> + }
> +
> +[Rule.Common.DXE_DRIVER]
> + FILE DRIVER = $(NAMED_GUID) {
> + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
> + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> + UI STRING="$(MODULE_NAME)" Optional
> + }
> +
> +[Rule.Common.DXE_RUNTIME_DRIVER]
> + FILE DRIVER = $(NAMED_GUID) {
> + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
> + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> + UI STRING="$(MODULE_NAME)" Optional
> + }
> +
> +[Rule.Common.UEFI_APPLICATION]
> + FILE APPLICATION = $(NAMED_GUID) {
> + UI STRING ="$(MODULE_NAME)" Optional
> + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> + }
> +
> +[Rule.Common.UEFI_DRIVER.BINARY]
> + FILE DRIVER = $(NAMED_GUID) {
> + DXE_DEPEX DXE_DEPEX Optional |.depex
> + PE32 PE32 |.efi
> + UI STRING="$(MODULE_NAME)" Optional
> + VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
> + }
> +
> +[Rule.Common.UEFI_APPLICATION.BINARY]
> + FILE APPLICATION = $(NAMED_GUID) {
> + PE32 PE32 |.efi
> + UI STRING="$(MODULE_NAME)" Optional
> + VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
> + }
> +!endif
> +
> +[Rule.Common.SEC]
> + FILE SEC = $(NAMED_GUID) RELOCS_STRIPPED {
> + TE TE Align = 32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> + }
> +
> +[Rule.Common.PEI_CORE]
> + FILE PEI_CORE = $(NAMED_GUID) {
> + TE TE $(INF_OUTPUT)/$(MODULE_NAME).efi
> + UI STRING ="$(MODULE_NAME)" Optional
> + }
> +
> +[Rule.Common.PEIM]
> + FILE PEIM = $(NAMED_GUID) {
> + PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
> + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> + UI STRING="$(MODULE_NAME)" Optional
> + }
> +
> +[Rule.Common.PEIM.TIANOCOMPRESSED]
> + FILE PEIM = $(NAMED_GUID) DEBUG_MYTOOLS_IA32 {
> + PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
> + GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED = TRUE {
> + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> + UI STRING="$(MODULE_NAME)" Optional
> + }
> + }
> +
> +[Rule.Common.DXE_CORE]
> + FILE DXE_CORE = $(NAMED_GUID) {
> + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> + UI STRING="$(MODULE_NAME)" Optional
> + }
> +
> +
> +[Rule.Common.UEFI_DRIVER]
> + FILE DRIVER = $(NAMED_GUID) {
> + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
> + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> + UI STRING="$(MODULE_NAME)" Optional
> + }
> +
> +[Rule.Common.DXE_DRIVER]
> + FILE DRIVER = $(NAMED_GUID) {
> + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
> + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> + UI STRING="$(MODULE_NAME)" Optional
> + }
> +
> +[Rule.Common.DXE_RUNTIME_DRIVER]
> + FILE DRIVER = $(NAMED_GUID) {
> + DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
> + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> + UI STRING="$(MODULE_NAME)" Optional
> + }
> +
> +[Rule.Common.UEFI_APPLICATION]
> + FILE APPLICATION = $(NAMED_GUID) {
> + UI STRING ="$(MODULE_NAME)" Optional
> + PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
> + }
> +
> +[Rule.Common.USER_DEFINED.ACPITABLE]
> + FILE FREEFORM = $(NAMED_GUID) {
> + RAW ACPI |.acpi
> + RAW ASL Optional |.aml
> + UI STRING="$(MODULE_NAME)" Optional
> + }
> +
> +[Rule.Common.UEFI_DRIVER.BINARY]
> + FILE DRIVER = $(NAMED_GUID) {
> + DXE_DEPEX DXE_DEPEX Optional |.depex
> + PE32 PE32 |.efi
> + UI STRING="$(MODULE_NAME)" Optional
> + VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
> + }
> +
> +[Rule.Common.UEFI_APPLICATION.BINARY]
> + FILE APPLICATION = $(NAMED_GUID) {
> + PE32 PE32 |.efi
> + UI STRING="$(MODULE_NAME)" Optional
> + VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
> + }
> diff --git a/Silicon/NXP/iMX6Pkg/iMX6ConfigDsc.inc b/Silicon/NXP/iMX6Pkg/iMX6ConfigDsc.inc
> new file mode 100644
> index 000000000000..cf3b68556a4e
> --- /dev/null
> +++ b/Silicon/NXP/iMX6Pkg/iMX6ConfigDsc.inc
> @@ -0,0 +1,148 @@
> +#
> +# iMX6 Common Configurations Definition
> +#
> +# Copyright (c) 2018 Microsoft Corporation. All rights reserved.
> +#
> +# This program and the accompanying materials
> +# are licensed and made available under the terms and conditions of the BSD License
> +# which accompanies this distribution. The full text of the license may be found at
> +# http://opensource.org/licenses/bsd-license.php
> +#
> +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
> +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
> +#
> +
> +[Defines]
> +
> + # Display surface will not be drawn to.
> +!ifndef CONFIG_HEADLESS
> + DEFINE CONFIG_HEADLESS = FALSE
> +!endif
> +
> + # Useful if working with Lauterbach JTAG. Will dump to console the complete
> + # command to copy and past into the Lauterbach command line to load symbols
> + # for each module.
> + # Use in conjution with Informational debug messages:
> + # DEBUG_INFO 0x00000040
> +!ifndef CONFIG_DUMP_SYMBOL_INFO
> + DEFINE CONFIG_DUMP_SYMBOL_INFO = FALSE
> +!endif
> +
> + # Enable if PSCI is implemented.
> +!ifndef CONFIG_MPCORE
> + DEFINE CONFIG_MPCORE = TRUE
> +!endif
> +
> + # Disable the PCIexpress stack by default. Enable on demand.
> +!ifndef CONFIG_PCIE
> + DEFINE CONFIG_PCIE = FALSE
> +!endif
> +
> + # States whether OPTEE boot flow is in effect or not. This has the following
> + # implications:
> + # - OPTEE owns the SecureWorld and UEFI has to run in NormalWorld.
> + # - Specific memory layout that is defined in the platform .dsc file.
> + # - Temp: Running in single-core until PSCI is enabled.
> + # WARNING: Don't set this to FALSE unless you know what you are doing. Running
> + # UEFI in SecureWorld will most likely result in boot failure due to lack of
> + # proper CPU sec configuration. That is by UEFI design.
> +!ifndef CONFIG_OPTEE
> + DEFINE CONFIG_OPTEE = TRUE
> +!endif
> +
> + # Allow collecting performance tracing from OPTEE hot code paths
> + # Performance summary results can be inspected with the shell app Dp.efi
> +!ifndef CONFIG_OPTEE_PROFILE
> + DEFINE CONFIG_OPTEE_PROFILE = FALSE
> +!endif
> +
> + # Call build with -D CONFIG_SECURE_UEFI=1 to enable the follwing security features
> +!if $(CONFIG_SECURE_UEFI) == TRUE
> +
> + # UEFI authenticated variable runtime services
> +!ifndef CONFIG_AUTH_VAR
> + DEFINE CONFIG_AUTH_VAR = TRUE
> +!endif
> +
> + # TPM stack for the fTPM
> +!ifndef CONFIG_MEASURED_BOOT
> + DEFINE CONFIG_MEASURED_BOOT = TRUE
> +!endif
> +
> + # If Platform Key (PK) is provisioned, then SecureBoot variables will get
> + # updated to reflect that SecureBoot is enabled. Otherwise, SecureBoot
> + # variables will indicate that the feature is disabled, and the OS will
> + # not boot apply SecureBoot policies
> +!ifndef CONFIG_SECURE_BOOT
> + DEFINE CONFIG_SECURE_BOOT = TRUE
> +!endif
> +
> + # Provison SecureBoot with MS test certs and keys that are baked into the FV
> + # on first UEFI boot if SecureBoot found to be not provisioned
> + DEFINE CONFIG_SECURE_BOOT_AUTO_CONFIG = TRUE
> +!else
> +
> +!ifndef CONFIG_AUTH_VAR
> + DEFINE CONFIG_AUTH_VAR = FALSE
> +!endif
> +
> +!ifndef CONFIG_MEASURED_BOOT
> + DEFINE CONFIG_MEASURED_BOOT = FALSE
> +!endif
> +
> +!ifndef CONFIG_SECURE_BOOT
> + DEFINE CONFIG_SECURE_BOOT = FALSE
> +!endif
> +
> +!endif
> +
> +[BuildOptions]
> +#
> +# For each enabled CONFIG_* flag in the dsc files, define that flag in C code.
> +# Description of each CONFIG_* flag exist in iMX6DefaultConfigDsc.inc
> +# Note: The = sign in BuildOptions section appends to the existing macro, while
> +# == can be used to replace its value. See the EDK2 DSC specs.
> +#
> +!if $(CONFIG_HEADLESS) == TRUE
> + GCC:*_*_*_CC_FLAGS = -DCONFIG_HEADLESS=1
> +!endif
> +
> +!if $(CONFIG_DUMP_SYMBOL_INFO) == TRUE
> + GCC:*_*_*_CC_FLAGS = -DCONFIG_DUMP_SYMBOL_INFO=1
> +!endif
> +
> +!if $(CONFIG_MPCORE) == TRUE
> + GCC:*_*_*_CC_FLAGS = -DCONFIG_MPCORE=1
> +!endif
> +
> +!if $(CONFIG_USB) == TRUE
> + GCC:*_*_*_CC_FLAGS = -DCONFIG_USB=1
> +!endif
> +
> +!if $(CONFIG_PCIE) == TRUE
> + GCC:*_*_*_CC_FLAGS = -DCONFIG_PCIE=1
> +!endif
> +
> +!if $(CONFIG_OPTEE) == TRUE
> + GCC:*_*_*_CC_FLAGS = -DCONFIG_OPTEE=1
> +!endif
> +
> +!if $(CONFIG_OPTEE_PROFILE) == TRUE
> + GCC:*_*_*_CC_FLAGS = -DOPTEE_PROFILE=1
> +!endif
> +
> +!if $(CONFIG_AUTH_VAR) == TRUE
> + GCC:*_*_*_CC_FLAGS = -DCONFIG_AUTH_VAR=1
> +!endif
> +
> +!if $(CONFIG_MEASURED_BOOT) == TRUE
> + GCC:*_*_*_CC_FLAGS = -DCONFIG_MEASURED_BOOT=1
> +!endif
> +
> +!if $(CONFIG_SECURE_BOOT) == TRUE
> + GCC:*_*_*_CC_FLAGS = -DCONFIG_SECURE_BOOT=1
> +!endif
> +
> +!if $(CONFIG_SECURE_BOOT_AUTO_CONFIG) == TRUE
> + GCC:*_*_*_CC_FLAGS = -DCONFIG_SECURE_BOOT_AUTO_CONFIG=1
> +!endif
> --
> 2.16.2.gvfs.1.33.gf5370f1
>
next prev parent reply other threads:[~2018-12-14 23:36 UTC|newest]
Thread overview: 75+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-09-21 8:25 [PATCH edk2-platforms 00/27] Import Hummingboard Edge platform for Windows IoT Core Chris Co
2018-09-21 8:25 ` [PATCH edk2-platforms 01/27] Platform/Microsoft: Add OpteeClientPkg dec Chris Co
2018-10-31 20:43 ` Leif Lindholm
2018-11-01 10:55 ` Sumit Garg
2018-11-02 0:41 ` Chris Co
2018-11-02 5:24 ` Sumit Garg
2018-11-02 23:55 ` Chris Co
2018-11-05 10:07 ` Sumit Garg
2018-11-06 1:53 ` Chris Co
2018-11-06 11:09 ` Sumit Garg
2018-09-21 8:25 ` [PATCH edk2-platforms 02/27] Platform/Microsoft: Add SdMmc Dxe Driver Chris Co
2018-09-21 8:25 ` [PATCH edk2-platforms 03/27] Platform/Microsoft: Add MsPkg Chris Co
2018-10-31 21:00 ` Leif Lindholm
2018-09-21 8:25 ` [PATCH edk2-platforms 04/27] Silicon/NXP: Add iMXPlatformPkg dec Chris Co
2018-09-21 8:25 ` [PATCH edk2-platforms 05/27] Silicon/NXP: Add UART library support for i.MX platforms Chris Co
2018-11-01 8:59 ` Leif Lindholm
2018-11-02 1:46 ` Chris Co
2018-09-21 8:25 ` [PATCH edk2-platforms 06/27] Silicon/NXP: Add I2C " Chris Co
2018-11-01 17:53 ` Leif Lindholm
2018-09-21 8:25 ` [PATCH edk2-platforms 07/27] Silicon/NXP: Add i.MX display library support Chris Co
2018-11-01 18:05 ` Leif Lindholm
2018-11-29 0:55 ` Chris Co
2018-09-21 8:25 ` [PATCH edk2-platforms 08/27] Silicon/NXP: Add Virtual RTC support for i.MX platform Chris Co
2018-12-15 13:26 ` Leif Lindholm
2018-09-21 8:26 ` [PATCH edk2-platforms 10/27] Silicon/NXP: Add iMX6Pkg dec Chris Co
2018-11-01 18:25 ` Leif Lindholm
2018-09-21 8:26 ` [PATCH edk2-platforms 09/27] Silicon/NXP: Add headers for SoC-specific i.MX packages to use Chris Co
2018-11-01 18:20 ` Leif Lindholm
2018-12-01 0:22 ` Chris Co
2018-12-03 9:42 ` Leif Lindholm
2018-12-04 1:44 ` Chris Co
2018-12-04 9:33 ` Ard Biesheuvel
2018-12-04 12:22 ` Leif Lindholm
2018-09-21 8:26 ` [PATCH edk2-platforms 11/27] Silicon/NXP: Add i.MX6 SoC header files Chris Co
2018-12-13 17:11 ` Leif Lindholm
2018-09-21 8:26 ` [PATCH edk2-platforms 12/27] Silicon/NXP: Add i.MX6 I/O MUX library Chris Co
2018-11-08 18:00 ` Leif Lindholm
2018-12-04 1:41 ` Chris Co
2018-09-21 8:26 ` [PATCH edk2-platforms 13/27] Silicon/NXP: Add support for iMX SDHC Chris Co
2018-12-05 10:31 ` Leif Lindholm
2018-09-21 8:26 ` [PATCH edk2-platforms 14/27] Silicon/NXP: Add i.MX6 GPT and EPIT timer headers Chris Co
2018-11-08 18:14 ` Leif Lindholm
2018-12-04 2:06 ` Chris Co
2018-12-04 12:58 ` Leif Lindholm
2018-09-21 8:26 ` [PATCH edk2-platforms 15/27] Silicon/NXP: Add i.MX6 GPT Timer library Chris Co
2018-12-13 17:26 ` Leif Lindholm
2018-09-21 8:26 ` [PATCH edk2-platforms 16/27] Silicon/NXP: Add i.MX6 Timer DXE driver Chris Co
2018-12-13 17:33 ` Leif Lindholm
2018-09-21 8:26 ` [PATCH edk2-platforms 17/27] Silicon/NXP: Add i.MX6 USB Phy Library Chris Co
2018-12-14 17:10 ` Leif Lindholm
2018-09-21 8:26 ` [PATCH edk2-platforms 18/27] Silicon/NXP: Add i.MX6 Clock Library Chris Co
2018-12-14 18:12 ` Leif Lindholm
2018-09-21 8:26 ` [PATCH edk2-platforms 20/27] Silicon/NXP: Add i.MX6 Board init library Chris Co
2018-12-14 20:12 ` Leif Lindholm
2018-09-21 8:26 ` [PATCH edk2-platforms 19/27] Silicon/NXP: Add i.MX6 ACPI tables Chris Co
2018-12-14 19:53 ` Leif Lindholm
2018-12-17 11:14 ` Ard Biesheuvel
2019-01-08 21:43 ` Chris Co
2019-01-29 14:09 ` Ard Biesheuvel
2018-09-21 8:26 ` [PATCH edk2-platforms 21/27] Silicon/NXP: Add i.MX6 PCIe DXE driver Chris Co
2018-12-14 21:59 ` Leif Lindholm
2018-09-21 8:26 ` [PATCH edk2-platforms 22/27] Silicon/NXP: Add i.MX6 GOP driver Chris Co
2018-12-14 22:37 ` Leif Lindholm
2018-09-21 8:26 ` [PATCH edk2-platforms 23/27] Silicon/NXP: Add i.MX6 Smbios Driver Chris Co
2018-12-14 23:07 ` Leif Lindholm
2018-09-21 8:26 ` [PATCH edk2-platforms 24/27] Silicon/NXP: Add i.MX6 common dsc and fdf files Chris Co
2018-12-14 23:36 ` Leif Lindholm [this message]
2018-09-21 8:26 ` [PATCH edk2-platforms 25/27] Platform/Solidrun: Add Hummingboard Peripheral Initialization Chris Co
2018-12-15 12:12 ` Leif Lindholm
2018-09-21 8:26 ` [PATCH edk2-platforms 26/27] Platform/SolidRun: Add i.MX 6Quad Hummingboard Edge ACPI tables Chris Co
2018-12-15 12:19 ` Leif Lindholm
2018-09-21 8:26 ` [PATCH edk2-platforms 27/27] Platform/Solidrun: Add i.MX 6Quad Hummingboard Edge dsc and fdf files Chris Co
2018-12-15 12:28 ` Leif Lindholm
2018-12-15 13:32 ` [PATCH edk2-platforms 00/27] Import Hummingboard Edge platform for Windows IoT Core Leif Lindholm
2018-12-19 18:28 ` Chris Co
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20181214233644.eobs4gbimthxrcrv@bivouac.eciton.net \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox