]> git.proxmox.com Git - mirror_edk2.git/blame - ArmVirtPkg/ArmVirtCloudHv.fdf
Maintainers.txt: Update email address
[mirror_edk2.git] / ArmVirtPkg / ArmVirtCloudHv.fdf
CommitLineData
0e3b6bd0
JW
1#\r
2# Copyright (c) 2021, ARM Limited. All rights reserved.\r
3#\r
4# SPDX-License-Identifier: BSD-2-Clause-Patent\r
5#\r
6\r
7################################################################################\r
8#\r
9# FD Section\r
10# The [FD] Section is made up of the definition statements and a\r
11# description of what goes into the Flash Device Image. Each FD section\r
12# defines one flash "device" image. A flash device image may be one of\r
13# the following: Removable media bootable image (like a boot floppy\r
14# image,) an Option ROM image (that would be "flashed" into an add-in\r
15# card,) a System "Flash" image (that would be burned into a system's\r
16# flash) or an Update ("Capsule") image that will be used to update and\r
17# existing system flash.\r
18#\r
19################################################################################\r
20\r
21[Defines]\r
22!if $(FD_SIZE_IN_MB) == 2\r
23 DEFINE FVMAIN_COMPACT_SIZE = 0x1ff000\r
24!endif\r
25!if $(FD_SIZE_IN_MB) == 3\r
26 DEFINE FVMAIN_COMPACT_SIZE = 0x2ff000\r
27!endif\r
28\r
29[FD.CLOUDHV_EFI]\r
30BaseAddress = 0x00000000|gArmTokenSpaceGuid.PcdFdBaseAddress # cloud-hypervisor assigns 0 - 0x8000000 for a BootROM\r
31Size = $(FD_SIZE)|gArmTokenSpaceGuid.PcdFdSize # The size in bytes of the FLASH Device\r
32ErasePolarity = 1\r
33\r
34# This one is tricky, it must be: BlockSize * NumBlocks = Size\r
35BlockSize = 0x00001000\r
36NumBlocks = $(FD_NUM_BLOCKS)\r
37\r
38################################################################################\r
39#\r
40# Following are lists of FD Region layout which correspond to the locations of different\r
41# images within the flash device.\r
42#\r
43# Regions must be defined in ascending order and may not overlap.\r
44#\r
45# A Layout Region start with a eight digit hex offset (leading "0x" required) followed by\r
46# the pipe "|" character, followed by the size of the region, also in hex with the leading\r
47# "0x" characters. Like:\r
48# Offset|Size\r
49# PcdOffsetCName|PcdSizeCName\r
50# RegionType <FV, DATA, or FILE>\r
51#\r
52################################################################################\r
53\r
54#\r
55# UEFI has trouble dealing with FVs that reside at physical address 0x0.\r
56# So instead, put a hardcoded 'jump to 0x1000' at offset 0x0, and put the\r
57# real FV at offset 0x1000\r
58#\r
590x00000000|0x00001000\r
60DATA = {\r
61!if $(ARCH) == AARCH64\r
62 0x00, 0x04, 0x00, 0x14 # 'b 0x1000' in AArch64 ASM\r
63!else\r
64 0xfe, 0x03, 0x00, 0xea # 'b 0x1000' in AArch32 ASM\r
65!endif\r
66}\r
67\r
680x00001000|$(FVMAIN_COMPACT_SIZE)\r
69gArmTokenSpaceGuid.PcdFvBaseAddress|gArmTokenSpaceGuid.PcdFvSize\r
70FV = FVMAIN_COMPACT\r
71\r
72!include VarStore.fdf.inc\r
73\r
74################################################################################\r
75#\r
76# FV Section\r
77#\r
78# [FV] section is used to define what components or modules are placed within a flash\r
79# device file. This section also defines order the components and modules are positioned\r
80# within the image. The [FV] section consists of define statements, set statements and\r
81# module statements.\r
82#\r
83################################################################################\r
84\r
85[FV.FvMain]\r
86FvNameGuid = 2A88A00E-E267-C8BF-0E80-AE1BD504ED90\r
87BlockSize = 0x40\r
88NumBlocks = 0 # This FV gets compressed so make it just big enough\r
89FvAlignment = 16 # FV alignment and FV attributes setting.\r
90ERASE_POLARITY = 1\r
91MEMORY_MAPPED = TRUE\r
92STICKY_WRITE = TRUE\r
93LOCK_CAP = TRUE\r
94LOCK_STATUS = TRUE\r
95WRITE_DISABLED_CAP = TRUE\r
96WRITE_ENABLED_CAP = TRUE\r
97WRITE_STATUS = TRUE\r
98WRITE_LOCK_CAP = TRUE\r
99WRITE_LOCK_STATUS = TRUE\r
100READ_DISABLED_CAP = TRUE\r
101READ_ENABLED_CAP = TRUE\r
102READ_STATUS = TRUE\r
103READ_LOCK_CAP = TRUE\r
104READ_LOCK_STATUS = TRUE\r
105\r
106 INF MdeModulePkg/Core/Dxe/DxeMain.inf\r
107 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
e0c23cba 108 INF OvmfPkg/Fdt/VirtioFdtDxe/VirtioFdtDxe.inf\r
e40fefaf 109 INF EmbeddedPkg/Drivers/FdtClientDxe/FdtClientDxe.inf\r
d881c6dd 110 INF OvmfPkg/Fdt/HighMemDxe/HighMemDxe.inf\r
0e3b6bd0
JW
111\r
112 #\r
113 # PI DXE Drivers producing Architectural Protocols (EFI Services)\r
114 #\r
115 INF ArmPkg/Drivers/CpuDxe/CpuDxe.inf\r
116 INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf\r
117 INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf\r
118 INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf\r
119 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf\r
120 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf\r
121!if $(SECURE_BOOT_ENABLE) == TRUE\r
122 INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf\r
123!endif\r
124 INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf\r
125 INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf\r
126 INF EmbeddedPkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf\r
127 INF EmbeddedPkg/MetronomeDxe/MetronomeDxe.inf\r
128 INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf\r
129\r
130 #\r
131 # Multiple Console IO support\r
132 #\r
133 INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf\r
134 INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf\r
135 INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf\r
136 INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf\r
137 INF MdeModulePkg/Universal/SerialDxe/SerialDxe.inf\r
138\r
139 INF ArmPkg/Drivers/ArmGic/ArmGicDxe.inf\r
140 INF ArmPkg/Drivers/TimerDxe/TimerDxe.inf\r
141 INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf\r
142\r
143 #\r
144 # FAT filesystem + GPT/MBR partitioning + UDF filesystem + virtio-fs\r
145 #\r
146 INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf\r
147 INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf\r
148 INF FatPkg/EnhancedFatDxe/Fat.inf\r
149 INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf\r
150 INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf\r
151 INF OvmfPkg/VirtioFsDxe/VirtioFsDxe.inf\r
152\r
153 #\r
154 # Status Code Routing\r
155 #\r
156 INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf\r
157\r
158 #\r
159 # Platform Driver\r
160 #\r
161 INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf\r
162 INF OvmfPkg/VirtioNetDxe/VirtioNet.inf\r
163 INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf\r
164 INF OvmfPkg/VirtioRngDxe/VirtioRng.inf\r
165\r
166 #\r
167 # UEFI application (Shell Embedded Boot Loader)\r
168 #\r
169 INF ShellPkg/Application/Shell/Shell.inf\r
170 INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf\r
171 INF ShellPkg/DynamicCommand/HttpDynamicCommand/HttpDynamicCommand.inf\r
172 INF OvmfPkg/LinuxInitrdDynamicShellCommand/LinuxInitrdDynamicShellCommand.inf\r
173\r
174 #\r
175 # Bds\r
176 #\r
177 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
178 INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf\r
179 INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf\r
180 INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf\r
181 INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf\r
182 INF MdeModulePkg/Application/UiApp/UiApp.inf\r
183\r
184 #\r
185 # SCSI Bus and Disk Driver\r
186 #\r
187 INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf\r
188 INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf\r
189\r
190 #\r
191 # ACPI Support\r
192 #\r
193 INF ArmVirtPkg/CloudHvPlatformHasAcpiDtDxe/CloudHvHasAcpiDtDxe.inf\r
194!if $(ARCH) == AARCH64\r
195 INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf\r
196 INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResourceTableDxe.inf\r
197 INF ArmVirtPkg/CloudHvAcpiPlatformDxe/CloudHvAcpiPlatformDxe.inf\r
198\r
199 #\r
200 # EBC support\r
201 #\r
202 INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf\r
203!endif\r
204\r
205 #\r
206 # PCI support\r
207 #\r
208 INF ArmPkg/Drivers/ArmPciCpuIo2Dxe/ArmPciCpuIo2Dxe.inf\r
209 INF MdeModulePkg/Bus/Pci/PciHostBridgeDxe/PciHostBridgeDxe.inf\r
210 INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf\r
211 INF OvmfPkg/PciHotPlugInitDxe/PciHotPlugInit.inf\r
212 INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf\r
213 INF OvmfPkg/Virtio10Dxe/Virtio10.inf\r
214\r
215 #\r
216 # TianoCore logo (splash screen)\r
217 #\r
218 INF MdeModulePkg/Logo/LogoDxe.inf\r
219\r
220 #\r
221 # Ramdisk support\r
222 #\r
223 INF MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskDxe.inf\r
224\r
225[FV.FVMAIN_COMPACT]\r
226FvAlignment = 16\r
227ERASE_POLARITY = 1\r
228MEMORY_MAPPED = TRUE\r
229STICKY_WRITE = TRUE\r
230LOCK_CAP = TRUE\r
231LOCK_STATUS = TRUE\r
232WRITE_DISABLED_CAP = TRUE\r
233WRITE_ENABLED_CAP = TRUE\r
234WRITE_STATUS = TRUE\r
235WRITE_LOCK_CAP = TRUE\r
236WRITE_LOCK_STATUS = TRUE\r
237READ_DISABLED_CAP = TRUE\r
238READ_ENABLED_CAP = TRUE\r
239READ_STATUS = TRUE\r
240READ_LOCK_CAP = TRUE\r
241READ_LOCK_STATUS = TRUE\r
242\r
243 INF ArmPlatformPkg/PrePeiCore/PrePeiCoreUniCore.inf\r
244 INF MdeModulePkg/Core/Pei/PeiMain.inf\r
245 INF ArmPlatformPkg/PlatformPei/PlatformPeim.inf\r
246 INF ArmPlatformPkg/MemoryInitPei/MemoryInitPeim.inf\r
247 INF ArmPkg/Drivers/CpuPei/CpuPei.inf\r
248 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
249 INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf\r
250 INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf\r
251\r
252 FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {\r
253 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {\r
254 SECTION FV_IMAGE = FVMAIN\r
255 }\r
256 }\r
257\r
258!include ArmVirtRules.fdf.inc\r