From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=2a00:1450:4864:20::444; helo=mail-wr1-x444.google.com; envelope-from=leif.lindholm@linaro.org; receiver=edk2-devel@lists.01.org Received: from mail-wr1-x444.google.com (mail-wr1-x444.google.com [IPv6:2a00:1450:4864:20::444]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id DC40321959CB2 for ; Tue, 18 Dec 2018 10:38:49 -0800 (PST) Received: by mail-wr1-x444.google.com with SMTP id c14so16993763wrr.0 for ; Tue, 18 Dec 2018 10:38:49 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id; bh=JlFME0Lm7JuSp+2dUq2d4COEpsOe+OVrBrMFmEViqZI=; b=AX2+3CtXcwYlo4R02on8pYrN+KuCeX3I20dmKRBZ6svdCDbFMMZ7yj1oZR76l/BCAN 88sHOD8j3tRVdKxc5Lnye+dDtAmYbH9hgdRZL08w0xj8EsFlfv+zMgY5jucDwM25V8BV Wfv116WAePP54093tQg9S0tU4O/OGSmz80HKc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=JlFME0Lm7JuSp+2dUq2d4COEpsOe+OVrBrMFmEViqZI=; b=ZS/9RkK7MVytCf2U6klyqN1jRpYcqUJ4i6d2f6OqGOtbCy+HPO54IYg0mTegjtFzup SUFbIikvtKZp63EfwI6EoMxVsRzPOZaR3PhxRGY5NA407CRvCaVH8GyziWIVtK5FjYv1 sO83Sq0DkKk46ZmeMHU+bv1FjMbP1FactdPwwt3enXG9TtSYxqznCHIRQoE9/dtYAFLB 1wXOfLuoAOiQQgXT9Me0+nNMsF8Ey4rGiCZt712k2R9mQ6sUA9Yn9SR+WuuA8fj5RlAQ zXWCrfB+ZAzAivW130c3prEr9Jo+otGN54uwdLZWuA4mmkI+xNu0j5Zy6pG9CjDP0N68 N5qw== X-Gm-Message-State: AA+aEWbIUi+byjVmvS9fiaECy9p+VA/OSxKLvvmR+C0XXkMtFx3BbYHq sCl+RAtq6OYjwB8OBsFyKmsscG+hHic= X-Google-Smtp-Source: AFSGD/UmpsWNERJvCe1ojw4VEYYDLWOsDwFkkBLIizxvkIuf9g0mym3QP17PXmUY9fL7z7f0QDrX9w== X-Received: by 2002:adf:a357:: with SMTP id d23mr16336748wrb.195.1545158327971; Tue, 18 Dec 2018 10:38:47 -0800 (PST) Received: from vanye.hemma.eciton.net (cpc92302-cmbg19-2-0-cust304.5-4.cable.virginm.net. [82.1.209.49]) by smtp.gmail.com with ESMTPSA id z206sm3619724wmc.18.2018.12.18.10.38.47 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 18 Dec 2018 10:38:47 -0800 (PST) From: Leif Lindholm To: edk2-devel@lists.01.org Date: Tue, 18 Dec 2018 18:38:46 +0000 Message-Id: <20181218183846.31999-1-leif.lindholm@linaro.org> X-Mailer: git-send-email 2.11.0 Subject: [PATCH] ArmPkg: drop ArmBds remnant Pcds from .dec X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 18 Dec 2018 18:38:50 -0000 The following Pcds - gArmTokenSpaceGuid.PcdArmLinuxSpinTable - gArmTokenSpaceGuid.PcdArmLinuxAtagMaxOffset - gArmTokenSpaceGuid.PcdArmLinuxFdtMaxOffset - gArmTokenSpaceGuid.PcdArmLinuxFdtAlignment remained defined, without actual users. So get rid of them. One reference to be deleted separately from edk2-platforms. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Leif Lindholm --- ArmPkg/ArmPkg.dec | 20 -------------------- 1 file changed, 20 deletions(-) diff --git a/ArmPkg/ArmPkg.dec b/ArmPkg/ArmPkg.dec index d99eb6769f..0ec5e8efd6 100644 --- a/ArmPkg/ArmPkg.dec +++ b/ArmPkg/ArmPkg.dec @@ -80,10 +80,6 @@ [PcdsFeatureFlag.common] # it has been configured by the CPU DXE gArmTokenSpaceGuid.PcdDebuggerExceptionSupport|FALSE|BOOLEAN|0x00000032 - # Define if the spin-table mechanism is used by the secondary cores when booting - # Linux (instead of PSCI) - gArmTokenSpaceGuid.PcdArmLinuxSpinTable|FALSE|BOOLEAN|0x00000033 - # Define if the GICv3 controller should use the GICv2 legacy gArmTokenSpaceGuid.PcdArmGicV3WithV2Legacy|FALSE|BOOLEAN|0x00000042 @@ -173,16 +169,6 @@ [PcdsFixedAtBuild.ARM] # By default we do not do a transition to non-secure mode gArmTokenSpaceGuid.PcdArmNonSecModeTransition|0x0|UINT32|0x0000003E - # The Linux ATAGs are expected to be under 0x4000 (16KB) from the beginning of the System Memory - gArmTokenSpaceGuid.PcdArmLinuxAtagMaxOffset|0x4000|UINT32|0x00000020 - - # If the fixed FDT address is not available, then it should be loaded below the kernel. - # The recommendation from the Linux kernel is to have the FDT below 16KB. - # (see the kernel doc: Documentation/arm/Booting) - gArmTokenSpaceGuid.PcdArmLinuxFdtMaxOffset|0x4000|UINT32|0x00000023 - # The FDT blob must be loaded at a 64bit aligned address. - gArmTokenSpaceGuid.PcdArmLinuxFdtAlignment|0x8|UINT32|0x00000026 - # Non Secure Access Control Register # - BIT15 : NSASEDIS - Disable Non-secure Advanced SIMD functionality # - BIT14 : NSD32DIS - Disable Non-secure use of D16-D31 @@ -221,12 +207,6 @@ [PcdsFixedAtBuild.AARCH64] # Other modes include using SP0 or switching to Aarch32, but these are # not currently supported. gArmTokenSpaceGuid.PcdArmNonSecModeTransition|0x3c9|UINT32|0x0000003E - # If the fixed FDT address is not available, then it should be loaded above the kernel. - # The recommendation from the AArch64 Linux kernel is to have the FDT below 512MB. - # (see the kernel doc: Documentation/arm64/booting.txt) - gArmTokenSpaceGuid.PcdArmLinuxFdtMaxOffset|0x20000000|UINT32|0x00000023 - # The FDT blob must be loaded at a 2MB aligned address. - gArmTokenSpaceGuid.PcdArmLinuxFdtAlignment|0x00200000|UINT32|0x00000026 # -- 2.11.0