]> git.proxmox.com Git - mirror_edk2.git/blame - ArmPlatformPkg/ArmVExpressPkg/ArmVExpress-CTA9x4.fdf
ArmPlatformPkg: Clean DSC files
[mirror_edk2.git] / ArmPlatformPkg / ArmVExpressPkg / ArmVExpress-CTA9x4.fdf
CommitLineData
1d5d0ae9 1# FLASH layout file for ARM VE.
2#
3# Copyright (c) 2011, ARM Limited. All rights reserved.
4#
5# This program and the accompanying materials
6# are licensed and made available under the terms and conditions of the BSD License
7# which accompanies this distribution. The full text of the license may be found at
8# http://opensource.org/licenses/bsd-license.php
9#
10# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
11# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
12#
13
14################################################################################
15#
16# FD Section
17# The [FD] Section is made up of the definition statements and a
18# description of what goes into the Flash Device Image. Each FD section
19# defines one flash "device" image. A flash device image may be one of
20# the following: Removable media bootable image (like a boot floppy
21# image,) an Option ROM image (that would be "flashed" into an add-in
22# card,) a System "Flash" image (that would be burned into a system's
23# flash) or an Update ("Capsule") image that will be used to update and
24# existing system flash.
25#
26################################################################################
27
28[FD.Sec_ArmVExpress_EFI]
29BaseAddress = 0x44000000|gArmTokenSpaceGuid.PcdSecureFdBaseAddress #The base address of the Secure FLASH Device.
30Size = 0x00200000|gArmTokenSpaceGuid.PcdSecureFdSize #The size in bytes of the Secure FLASH Device
31ErasePolarity = 1
32BlockSize = 0x00001000
33NumBlocks = 0x200
34
35################################################################################
36#
37# Following are lists of FD Region layout which correspond to the locations of different
38# images within the flash device.
39#
40# Regions must be defined in ascending order and may not overlap.
41#
42# A Layout Region start with a eight digit hex offset (leading "0x" required) followed by
43# the pipe "|" character, followed by the size of the region, also in hex with the leading
44# "0x" characters. Like:
45# Offset|Size
46# PcdOffsetCName|PcdSizeCName
47# RegionType <FV, DATA, or FILE>
48#
49################################################################################
50
510x00000000|0x00200000
52gEmbeddedTokenSpaceGuid.PcdFlashFvSecBase|gEmbeddedTokenSpaceGuid.PcdFlashFvSecSize
53FV = FVMAIN_SEC
54
55
56[FD.ArmVExpress_EFI]
57!if $(EDK2_ARMVE_STANDALONE) == 1
262a9b04 58BaseAddress = 0x45000000|gArmTokenSpaceGuid.PcdNormalFdBaseAddress # The base address of the Firmware in NOR Flash.
1d5d0ae9 59!else
262a9b04 60BaseAddress = 0x80000000|gArmTokenSpaceGuid.PcdNormalFdBaseAddress # The base address of the Firmware in remapped DRAM.
1d5d0ae9 61!endif
262a9b04 62Size = 0x00200000|gArmTokenSpaceGuid.PcdNormalFdSize # The size in bytes of the FLASH Device
1d5d0ae9 63ErasePolarity = 1
64
65# This one is tricky, it must be: BlockSize * NumBlocks = Size
66BlockSize = 0x00001000
67NumBlocks = 0x200
68
69################################################################################
70#
71# Following are lists of FD Region layout which correspond to the locations of different
72# images within the flash device.
73#
74# Regions must be defined in ascending order and may not overlap.
75#
76# A Layout Region start with a eight digit hex offset (leading "0x" required) followed by
77# the pipe "|" character, followed by the size of the region, also in hex with the leading
78# "0x" characters. Like:
79# Offset|Size
80# PcdOffsetCName|PcdSizeCName
81# RegionType <FV, DATA, or FILE>
82#
83################################################################################
84
850x00000000|0x00200000
86gEmbeddedTokenSpaceGuid.PcdFlashFvMainBase|gEmbeddedTokenSpaceGuid.PcdFlashFvMainSize
87FV = FVMAIN_COMPACT
88
89
1d5d0ae9 90################################################################################
91#
92# FV Section
93#
94# [FV] section is used to define what components or modules are placed within a flash
95# device file. This section also defines order the components and modules are positioned
96# within the image. The [FV] section consists of define statements, set statements and
97# module statements.
98#
99################################################################################
100
101[FV.FVMAIN_SEC]
102FvAlignment = 8
103ERASE_POLARITY = 1
104MEMORY_MAPPED = TRUE
105STICKY_WRITE = TRUE
106LOCK_CAP = TRUE
107LOCK_STATUS = TRUE
108WRITE_DISABLED_CAP = TRUE
109WRITE_ENABLED_CAP = TRUE
110WRITE_STATUS = TRUE
111WRITE_LOCK_CAP = TRUE
112WRITE_LOCK_STATUS = TRUE
113READ_DISABLED_CAP = TRUE
114READ_ENABLED_CAP = TRUE
115READ_STATUS = TRUE
116READ_LOCK_CAP = TRUE
117READ_LOCK_STATUS = TRUE
118
119 INF ArmPlatformPkg/Sec/Sec.inf
120
121
122[FV.FvMain]
123BlockSize = 0x40
124NumBlocks = 0 # This FV gets compressed so make it just big enough
125FvAlignment = 8 # FV alignment and FV attributes setting.
126ERASE_POLARITY = 1
127MEMORY_MAPPED = TRUE
128STICKY_WRITE = TRUE
129LOCK_CAP = TRUE
130LOCK_STATUS = TRUE
131WRITE_DISABLED_CAP = TRUE
132WRITE_ENABLED_CAP = TRUE
133WRITE_STATUS = TRUE
134WRITE_LOCK_CAP = TRUE
135WRITE_LOCK_STATUS = TRUE
136READ_DISABLED_CAP = TRUE
137READ_ENABLED_CAP = TRUE
138READ_STATUS = TRUE
139READ_LOCK_CAP = TRUE
140READ_LOCK_STATUS = TRUE
141
142 INF MdeModulePkg/Core/Dxe/DxeMain.inf
143
144 #
145 # PI DXE Drivers producing Architectural Protocols (EFI Services)
146 #
147 INF ArmPkg/Drivers/CpuDxe/CpuDxe.inf
148 INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
149 INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
150 INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
151 INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
152 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
153 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
154 INF EmbeddedPkg/EmbeddedMonotonicCounter/EmbeddedMonotonicCounter.inf
155 INF EmbeddedPkg/ResetRuntimeDxe/ResetRuntimeDxe.inf
156 INF EmbeddedPkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf
157 INF EmbeddedPkg/MetronomeDxe/MetronomeDxe.inf
936eff09 158
159 #
160 # Multiple Console IO support
161 #
162 INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
163 INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
164 INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
165 INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
166 INF EmbeddedPkg/SerialDxe/SerialDxe.inf
1d5d0ae9 167
168 INF ArmPkg/Drivers/PL390Gic/PL390GicDxe.inf
169 INF ArmPlatformPkg/Drivers/SP804TimerDxe/SP804TimerDxe.inf
d5e12da4 170 INF ArmPlatformPkg/Drivers/NorFlashDxe/NorFlashDxe.inf
7d0f2f23 171 INF ArmPlatformPkg/Drivers/LcdGraphicsOutputDxe/PL111LcdGraphicsOutputDxe.inf
33e7c2ab 172 INF ArmPlatformPkg/Drivers/SP805WatchdogDxe/SP805WatchdogDxe.inf
1d5d0ae9 173
174 #
175 # Semi-hosting filesystem
176 #
177 INF ArmPkg/Filesystem/SemihostFs/SemihostFs.inf
178
179 #
180 # FAT filesystem + GPT/MBR partitioning
181 #
182 INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
183 INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
184 INF FatPkg/EnhancedFatDxe/Fat.inf
185 INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
186
187 #
188 # Multimedia Card Interface
189 #
ce73d60a 190 INF EmbeddedPkg/Universal/MmcDxe/MmcDxe.inf
1d5d0ae9 191 INF ArmPkg/Drivers/PL180MciDxe/PL180MciDxe.inf
192
193 #
194 # UEFI application (Shell Embedded Boot Loader)
195 #
196 INF EmbeddedPkg/Ebl/Ebl.inf
197
198 #
199 # Bds
200 #
201 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
202 INF ArmPlatformPkg/Bds/Bds.inf
203
204
205[FV.FVMAIN_COMPACT]
206FvAlignment = 8
207ERASE_POLARITY = 1
208MEMORY_MAPPED = TRUE
209STICKY_WRITE = TRUE
210LOCK_CAP = TRUE
211LOCK_STATUS = TRUE
212WRITE_DISABLED_CAP = TRUE
213WRITE_ENABLED_CAP = TRUE
214WRITE_STATUS = TRUE
215WRITE_LOCK_CAP = TRUE
216WRITE_LOCK_STATUS = TRUE
217READ_DISABLED_CAP = TRUE
218READ_ENABLED_CAP = TRUE
219READ_STATUS = TRUE
220READ_LOCK_CAP = TRUE
221READ_LOCK_STATUS = TRUE
222
223 INF ArmPlatformPkg/PrePeiCore/PrePeiCoreMPCore.inf
224 INF MdeModulePkg/Core/Pei/PeiMain.inf
225 INF ArmPlatformPkg/PlatformPei/PlatformPei.inf
226 INF ArmPlatformPkg/MemoryInitPei/MemoryInitPei.inf
227 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
228 INF IntelFrameworkModulePkg/Universal/StatusCode/Pei/StatusCodePei.inf
229 INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf
230 INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
231
232 FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {
233 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {
234 SECTION FV_IMAGE = FVMAIN
235 }
236 }
237
238
239################################################################################
240#
241# Rules are use with the [FV] section's module INF type to define
242# how an FFS file is created for a given INF file. The following Rule are the default
243# rules for the different module type. User can add the customized rules to define the
244# content of the FFS file.
245#
246################################################################################
247
248
249############################################################################
250# Example of a DXE_DRIVER FFS file with a Checksum encapsulation section #
251############################################################################
252#
253#[Rule.Common.DXE_DRIVER]
254# FILE DRIVER = $(NAMED_GUID) {
255# DXE_DEPEX DXE_DEPEX Optional |.depex
256# COMPRESS PI_STD {
257# GUIDED {
258# PE32 PE32 |.efi
259# UI STRING="$(MODULE_NAME)" Optional
260# VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
261# }
262# }
263# }
264#
265############################################################################
266
267[Rule.Common.SEC]
268 FILE SEC = $(NAMED_GUID) RELOCS_STRIPPED {
95650ced 269 TE TE Align = 32 |.efi
1d5d0ae9 270 }
271
272[Rule.Common.PEI_CORE]
273 FILE PEI_CORE = $(NAMED_GUID) {
274 TE TE |.efi
275 UI STRING ="$(MODULE_NAME)" Optional
276 }
277
278[Rule.Common.PEIM]
279 FILE PEIM = $(NAMED_GUID) {
280 PEI_DEPEX PEI_DEPEX Optional |.depex
281 TE TE |.efi
282 UI STRING="$(MODULE_NAME)" Optional
283 }
284
285[Rule.Common.PEIM.TIANOCOMPRESSED]
286 FILE PEIM = $(NAMED_GUID) DEBUG_MYTOOLS_IA32 {
287 PEI_DEPEX PEI_DEPEX Optional |.depex
288 GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED = TRUE {
289 PE32 PE32 |.efi
290 UI STRING="$(MODULE_NAME)" Optional
291 }
292 }
293
294[Rule.Common.DXE_CORE]
295 FILE DXE_CORE = $(NAMED_GUID) {
296 PE32 PE32 |.efi
297 UI STRING="$(MODULE_NAME)" Optional
298 }
299
300[Rule.Common.UEFI_DRIVER]
301 FILE DRIVER = $(NAMED_GUID) {
302 DXE_DEPEX DXE_DEPEX Optional |.depex
303 PE32 PE32 |.efi
304 UI STRING="$(MODULE_NAME)" Optional
305 }
306
307[Rule.Common.DXE_DRIVER]
308 FILE DRIVER = $(NAMED_GUID) {
309 DXE_DEPEX DXE_DEPEX Optional |.depex
310 PE32 PE32 |.efi
311 UI STRING="$(MODULE_NAME)" Optional
312 }
313
314[Rule.Common.DXE_RUNTIME_DRIVER]
315 FILE DRIVER = $(NAMED_GUID) {
316 DXE_DEPEX DXE_DEPEX Optional |.depex
317 PE32 PE32 |.efi
318 UI STRING="$(MODULE_NAME)" Optional
319 }
320
321[Rule.Common.UEFI_APPLICATION]
322 FILE APPLICATION = $(NAMED_GUID) {
323 UI STRING ="$(MODULE_NAME)" Optional
324 PE32 PE32 |.efi
325 }