From nobody Sun May 5 10:36:37 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+71629+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1613125437813854.299872280253; Fri, 12 Feb 2021 02:23:57 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id Ft9QYY1788612xZfwTtHTTaA; Fri, 12 Feb 2021 02:23:57 -0800 X-Received: from EUR05-AM6-obe.outbound.protection.outlook.com (EUR05-AM6-obe.outbound.protection.outlook.com [40.107.22.59]) by mx.groups.io with SMTP id smtpd.web09.1978.1613125436110872314 for ; Fri, 12 Feb 2021 02:23:57 -0800 X-Received: from AM6PR08CA0032.eurprd08.prod.outlook.com (2603:10a6:20b:c0::20) by AM5PR0802MB2515.eurprd08.prod.outlook.com (2603:10a6:203:9f::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27; Fri, 12 Feb 2021 10:23:53 +0000 X-Received: from VE1EUR03FT023.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:c0:cafe::d5) by AM6PR08CA0032.outlook.office365.com (2603:10a6:20b:c0::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:53 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+71629+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT023.mail.protection.outlook.com (10.152.18.133) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:52 +0000 X-Received: ("Tessian outbound e989e14f9207:v71"); Fri, 12 Feb 2021 10:23:52 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 82f350addbeaf662 X-CR-MTA-TID: 64aa7808 X-Received: from cdb68a109940.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 2816FF1D-BCF6-4129-94C7-C8DE526AB4AA.1; Fri, 12 Feb 2021 10:23:47 +0000 X-Received: from EUR05-AM6-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id cdb68a109940.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 12 Feb 2021 10:23:47 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=c0oeAM7I0sCUTBxq4mjKIn18X0HtyC7+Ywak6QWDHMqucWe1QUAFxqYUsAGeyLTR8lDBhUbCHY6jxjBhp2PgP4XwI+T6E5kXewzcnf7y4c0My8gvhOcAZSaSWlpFw/4lErD+/UXoYAL8ZBuQrJ85BWcT1n3UgY57aOMEjBwFet44Ywm5ggqvzzxDETXvRTfVgokfrMteyyVUiI3RqEsSpG48Nqx7+Ft1k+zprZMoC7X6fOdFTHgVuuagn6NY8xysFhqivWy/OsvhabDus2T8nIVNtQMHBF6owdXpIb9uBjdPjDpknRW/rQ5OLoM908prJui2JAshy3hoAMTO6Qs9lg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ofq1ohopCIFKxnfGKBIYncXWpFi1IKtYGPngeJw+vBo=; b=hVRhX14Gux0hujmT5I1tpkHMbEZFrm806wascia0uF1RXcG1AWZdD5+e02S47v854ev8kxnzoYEldi94i8j/+3FNaKrx+hi9Of4HDOa2DHazHFwW9AuVz634BUUOsh8IffjsTzwieOcKWLPpLdNVF20j3CcE83XEgW3dteH2bwFhtoujh1oRjnFgd2AYYTtHHmRE6wm1hpxX9B4wHkCsp+Nzujx7QeTniYaQmnQgHNis421ZLd+uRo2jzOJmEMkrFrZWRi3oEgGjYRyz+bS6xUCtuhYJ96Dezr15kAIDJg8IBWphvBHV8TxzpOBFNtx6ft8dQmJvO6IzdXhwsp1iZQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from DB6P191CA0009.EURP191.PROD.OUTLOOK.COM (2603:10a6:6:28::19) by HE1PR0802MB2361.eurprd08.prod.outlook.com (2603:10a6:3:c2::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.25; Fri, 12 Feb 2021 10:23:45 +0000 X-Received: from DB5EUR03FT032.eop-EUR03.prod.protection.outlook.com (2603:10a6:6:28:cafe::2b) by DB6P191CA0009.outlook.office365.com (2603:10a6:6:28::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:45 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT032.mail.protection.outlook.com (10.152.20.162) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:45 +0000 X-Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2044.4; Fri, 12 Feb 2021 10:23:43 +0000 X-Received: from E107187.Arm.com (10.57.49.120) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Fri, 12 Feb 2021 10:23:43 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , Subject: [edk2-devel] [PATCH edk2-platforms v1 01/12] Platform/ARM/VExpressPkg: FVP RevC SysID.Rev defintion Date: Fri, 12 Feb 2021 10:23:30 +0000 Message-ID: <20210212102341.24056-2-sami.mujawar@arm.com> In-Reply-To: <20210212102341.24056-1-sami.mujawar@arm.com> References: <20210212102341.24056-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: d7815210-daa7-4275-de54-08d8cf404bde X-MS-TrafficTypeDiagnostic: HE1PR0802MB2361:|AM5PR0802MB2515: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:2512;OLM:2512; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(346002)(396003)(376002)(39860400002)(136003)(46966006)(36840700001)(82310400003)(36860700001)(54906003)(70206006)(83380400001)(186003)(1076003)(5660300002)(478600001)(26005)(7696005)(8936002)(2616005)(356005)(44832011)(6666004)(8676002)(4326008)(2906002)(82740400003)(86362001)(6916009)(47076005)(36756003)(426003)(336012)(81166007)(316002)(70586007)(36900700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0802MB2361 X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT023.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: f8bd6a52-1238-49f2-5bf5-08d8cf404712 X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Feb 2021 10:23:52.9359 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: d7815210-daa7-4275-de54-08d8cf404bde X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: VE1EUR03FT023.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0802MB2515 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: zT7HN2L8RsDytVHc5SSjoGW0x1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1613125437; bh=3VoAV38hCYG5A6s73HKOBn7fKHqv5YNYEAumcGy07Yc=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=Kkw7TzHae1Br4h0UK3g8ouBpvcZxhtTwQk7kt7ip0ZjvT5dwjorwacCm5gMMJSEmEzg H6FS5c2YrvbahwmmBiOhrmLsvjkDipuED5Me6yeGQs0RSj3kjHUfKu3nB3/F6+wFW2LMi PFM2xmNRbgUxEjsqmtgSGwi+oYwI+gOx6fU= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The Base Platform RevC model is a configuration of the Base Platform that includes a PCIe subsystem. It also includes system IP like SMMUv3. The Base Platform FVP model and the Base Platform RevC FVP model can be differentiated by examining the System ID register. For the FVP RevC model the SysID.Rev is 0x2. Therefore, add this definition so that software can read the System ID register to detect a FVP RevC model. Signed-off-by: Sami Mujawar Reviewed-by: Ard Biesheuvel --- Platform/ARM/VExpressPkg/Include/VExpressMotherBoard.h | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/Platform/ARM/VExpressPkg/Include/VExpressMotherBoard.h b/Platf= orm/ARM/VExpressPkg/Include/VExpressMotherBoard.h index c06adb159ec5532b1c77429ee0a4f6f3f4c018e3..1fe13809d6f77936abb3e13a1eb= 30c5cfb54d23f 100644 --- a/Platform/ARM/VExpressPkg/Include/VExpressMotherBoard.h +++ b/Platform/ARM/VExpressPkg/Include/VExpressMotherBoard.h @@ -1,7 +1,7 @@ /** @file * Header defining Versatile Express constants (Base addresses, sizes, fla= gs) * -* Copyright (c) 2011-2015, ARM Limited. All rights reserved. +* Copyright (c) 2011-2021, Arm Limited. All rights reserved. * * SPDX-License-Identifier: BSD-2-Clause-Patent * @@ -131,4 +131,7 @@ #define ARM_FVP_BASE_SYS_ID (ARM_FVP_BASE_BOARD_SYS_ID | ARM_FV= P_GIC_BASE_MMAP) #define ARM_FVP_FOUNDATION_SYS_ID (ARM_FVP_FOUNDATION_BOARD_SYS_ID | = ARM_FVP_GIC_BASE_MMAP) =20 +// FVP RevC model revision. +#define ARM_FVP_BASE_REVC_REV (UINT32)(0x2UL << 28) + #endif /* VEXPRESSMOTHERBOARD_H_ */ --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#71629): https://edk2.groups.io/g/devel/message/71629 Mute This Topic: https://groups.io/mt/80580203/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sun May 5 10:36:37 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+71636+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1613125452704433.2438400222128; Fri, 12 Feb 2021 02:24:12 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id tom4YY1788612xQtC7Ed8EQ5; Fri, 12 Feb 2021 02:24:12 -0800 X-Received: from EUR05-AM6-obe.outbound.protection.outlook.com (EUR05-AM6-obe.outbound.protection.outlook.com [40.107.22.69]) by mx.groups.io with SMTP id smtpd.web10.1905.1613125451403033700 for ; Fri, 12 Feb 2021 02:24:11 -0800 X-Received: from DU2PR04CA0211.eurprd04.prod.outlook.com (2603:10a6:10:2b1::6) by AM0PR08MB3153.eurprd08.prod.outlook.com (2603:10a6:208:59::32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.26; Fri, 12 Feb 2021 10:24:07 +0000 X-Received: from DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:2b1:cafe::8d) by DU2PR04CA0211.outlook.office365.com (2603:10a6:10:2b1::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27 via Frontend Transport; Fri, 12 Feb 2021 10:24:07 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+71636+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT019.mail.protection.outlook.com (10.152.20.163) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:07 +0000 X-Received: ("Tessian outbound 8418c949a3fa:v71"); Fri, 12 Feb 2021 10:24:07 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 8e52d33856e7ffc6 X-CR-MTA-TID: 64aa7808 X-Received: from 9a23eea08b42.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id EA1CD7B1-60E3-41A2-BFD7-2D6A3279856C.1; Fri, 12 Feb 2021 10:23:48 +0000 X-Received: from EUR03-AM5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 9a23eea08b42.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 12 Feb 2021 10:23:48 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AWWVKpB4BiZ8lLMRsHTDV03znLm8fJzez6CxMZBXO+kpmpA4tganrDnIeXEyy9sEK5MVSTK6hWyod1OTn3RJF5I3bQ0kIY2LvITqe9Qxy8O+1pQ91HPGZ+FoHcuUUhRnO01IpD8v2mrJaF0B9B6/8qKE1WKCfgInkJgPFr8mrxAVg6McQJzXG22Xb2Mmno4ztalpcqzOKy712Abo2r3MA5apSEef31PU8se8d6PKDIZktz+0Fc6AFRjBpWglHcsG8Uq1rcwg65KHs0WIfN102qUtQZDBnZdU3b+7xs1F28nHIwW2gYoXYvg2P6QvQ2jHLcJhC9yownFu7BsXG44fJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7SquzAohMrJ2uIKP4BIjKkuB8zKtAjILlJ3HFOr1584=; b=iTI1VegqOIr3WnCjMvm2UYhHB8PjWFAlYorFPdwRqc+/FRwOnCAd1PqXupG/60NeHH9cAm7cIdYSE9xbGiUAZ8ui2UUNILfqI7uPGjmURveNnXG949xRbp1wMmbm1wZqW5RiPWiX4uerXOGkozQ/MwOJ9GBflY17y+iw4OkQjzhAO5EA604QEHOVznLneNZ4NeCaPAStoQkc54GvIxk+QvT4ou+o/HSGr8tXwv3Xl6F9PwLTcY0QCmmdlfXfRkXNImdwWNhYt7A/x0R2x+A44O5p8u6zsF1Eos8pit7EACK+lowkJPrTLE7d6O9y6lYJbJg4i3iVJ1MQgNICWdraAg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from DB6PR0601CA0012.eurprd06.prod.outlook.com (2603:10a6:4:7b::22) by AM0PR08MB5508.eurprd08.prod.outlook.com (2603:10a6:208:186::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27; Fri, 12 Feb 2021 10:23:47 +0000 X-Received: from DB5EUR03FT037.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:7b:cafe::5a) by DB6PR0601CA0012.outlook.office365.com (2603:10a6:4:7b::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:47 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT037.mail.protection.outlook.com (10.152.20.215) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:47 +0000 X-Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2044.4; Fri, 12 Feb 2021 10:23:44 +0000 X-Received: from E107187.Arm.com (10.57.49.120) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Fri, 12 Feb 2021 10:23:43 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , Subject: [edk2-devel] [PATCH edk2-platforms v1 02/12] Platform/ARM/VExpressPkg: Add PCIe Host Bridge lib for FVP Date: Fri, 12 Feb 2021 10:23:31 +0000 Message-ID: <20210212102341.24056-3-sami.mujawar@arm.com> In-Reply-To: <20210212102341.24056-1-sami.mujawar@arm.com> References: <20210212102341.24056-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 1224e19c-9a45-4b89-bb07-08d8cf405486 X-MS-TrafficTypeDiagnostic: AM0PR08MB5508:|AM0PR08MB3153: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:1388;OLM:1388; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: Q7i+j97OcdCI0ctt8ciNmrQ9xkJ2SwU5gJkBMEFWLMLhNAf4vn10tPZJgFQzdH7flLPUDo+i/8HpQ3Bf58heV5Oq4/9GkMBojUKIyKu/8vZ6RNcihhyiOPvxvPMx5H9HZADoHhXdD30wBFJwQ8ifRxshKes65JJMv4gzsV5TrzHDx0NY/la3QvHgZG7kd6vrBaEVcfGbNL/endJstQpxQaNnCLaThjPdW9/8oQa86iA8Sjeb1KGg/sifM6G4q6B/QC5cMLrH4B9O0XZibZBaQPVCUKIOODZsJUqMO5E/wy1P5n+vgVBeYtZXPmnlTY3rskkNAcNzddOzcAulZv7WG2A1y8Z2URWpcp6ClgTATXCnLo4h+ZxT8mVn/eswB/WzqsaNvI2iRB22+cJ+acUyFTf8wKJbrkiijS6ETBUEX5m+KDfwhm73Sk3AXWLWsNSzp0TKvELfyIDh33cxqtqNbgJnL+9KHQ0QIgtEXDbanAL5yK/wwaUhn0wDWQg3amaOX14V9A1GvvKdh049yjN3TdlMFaoEmeOr5Cc6aga0HQRC2Pk+cdXunr8Sq3OcF/cpAzDGZnMIMKpDBXRxTYwCZwcTzvgAsbZ7wyx4SsF/7RsiYY6uejyjE4rAvCTwCOLb4SXj9C40VDbmVrGl7NMZQMsyYsh0KC6oWedRuc9TsJiUIK+8ruJQET+73Y84yhc3 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(376002)(39860400002)(346002)(396003)(136003)(36840700001)(46966006)(70206006)(8676002)(6666004)(47076005)(2906002)(4326008)(356005)(54906003)(44832011)(82740400003)(82310400003)(8936002)(426003)(336012)(2616005)(7696005)(5660300002)(26005)(86362001)(186003)(6916009)(316002)(1076003)(81166007)(70586007)(36860700001)(478600001)(19627235002)(36756003)(36900700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB5508 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 8855951f-cca0-458b-ada2-08d8cf404850 X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Feb 2021 10:24:07.5817 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 1224e19c-9a45-4b89-bb07-08d8cf405486 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3153 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: owxxIOtbzhiVCNxVLrFUMJFGx1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1613125452; bh=ugcT7J9Ne1e6ixudq88WYLzUYUSeDNFNTuQgM/lQgHU=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=NUCVx22vRR1XPXdWfKvNnth8e7dZwyimh3eYuvGBBLoS2XgzZg1OFhq4seAeZVIrxuj lArWbL7OZ65X7bNdr92ImSa0M/Qv3uJLmtFsOxTdEHq2TdOZe/9SaASmZMQJPDBFWw4Qq u1SSrcHiULrKxABsiAY7wOAsbfppPKbnIpw= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The Base Platform RevC (FVP_Base_RevC-2xAEMv8A model) includes a PCI subsystem. It has a PCIe config region and two PCIe memory regions. To enable PCIe support for the FVP RevC model add an instance of the PCIe Host Bridge library. Signed-off-by: Sami Mujawar Reviewed-by: Ard Biesheuvel --- Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/ArmVExpressPc= iHostBridgeLib.c | 208 ++++++++++++++++++++ Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/ArmVExpressPc= iHostBridgeLib.inf | 48 +++++ Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/ArmVExpressPc= iHostBridgeLib.uni | 14 ++ 3 files changed, 270 insertions(+) diff --git a/Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/A= rmVExpressPciHostBridgeLib.c b/Platform/ARM/VExpressPkg/Library/ArmVExpress= PciHostBridgeLib/ArmVExpressPciHostBridgeLib.c new file mode 100644 index 0000000000000000000000000000000000000000..54add33b8912db93aaa634907c6= 25a032436f106 --- /dev/null +++ b/Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/ArmVExpr= essPciHostBridgeLib.c @@ -0,0 +1,208 @@ +/** @file + PCI Host Bridge Library instance for ARM FVP Model + + Copyright (c) 2021, Arm Ltd. All rights reserved.
+ + SPDX-License-Identifier: BSD-2-Clause-Patent +**/ +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#pragma pack(1) + +/** A structure describing the PCI root bridge device path. +*/ +typedef struct { + /// ACPI Device path. + ACPI_HID_DEVICE_PATH AcpiDevicePath; + /// END Device Path tag. + EFI_DEVICE_PATH_PROTOCOL EndDevicePath; +} EFI_PCI_ROOT_BRIDGE_DEVICE_PATH; + +#pragma pack () + +STATIC EFI_PCI_ROOT_BRIDGE_DEVICE_PATH mEfiPciRootBridgeDevicePath =3D { + // ACPI device path + { + { + ACPI_DEVICE_PATH, + ACPI_DP, + { + (UINT8)(sizeof (ACPI_HID_DEVICE_PATH)), + (UINT8)((sizeof (ACPI_HID_DEVICE_PATH)) >> 8) + } + }, + EISA_PNP_ID (0x0A08), // PCIe + 0 + }, + // End device path tag + { + END_DEVICE_PATH_TYPE, + END_ENTIRE_DEVICE_PATH_SUBTYPE, + { + END_DEVICE_PATH_LENGTH, + 0 + } + } +}; + +STATIC PCI_ROOT_BRIDGE mRootBridge =3D { + 0, // Segment + 0, // Supports + 0, // Attributes + FALSE, // DmaAbove4G + FALSE, // NoExtendedConfigSpace + FALSE, // ResourceAssigned + EFI_PCI_HOST_BRIDGE_COMBINE_MEM_PMEM | // AllocationAttributes + EFI_PCI_HOST_BRIDGE_MEM64_DECODE, + { + // Bus + FixedPcdGet32 (PcdPciBusMin), + FixedPcdGet32 (PcdPciBusMax) + }, + { + // Io + FixedPcdGet64 (PcdPciIoBase), + FixedPcdGet64 (PcdPciIoBase) + FixedPcdGet64 (PcdPciIoSize) - 1 + }, + { + // Mem + FixedPcdGet32 (PcdPciMmio32Base), + FixedPcdGet32 (PcdPciMmio32Base) + FixedPcdGet32 (PcdPciMmio32Size) - 1 + }, + { + // MemAbove4G + FixedPcdGet64 (PcdPciMmio64Base), + FixedPcdGet64 (PcdPciMmio64Base) + FixedPcdGet64 (PcdPciMmio64Size) - 1 + }, + { + // PMem + MAX_UINT64, + 0 + }, + { + // PMemAbove4G + MAX_UINT64, + 0 + }, + (EFI_DEVICE_PATH_PROTOCOL *)&mEfiPciRootBridgeDevicePath +}; + +#ifndef MDEPKG_NDEBUG +STATIC CONST CHAR16 mAcpiAddrSpaceTypeStr[][4] =3D { + L"Mem", L"I/O", L"Bus" +}; +#endif + +/** + Return all the root bridge instances in an array. + + @param [out] Count Return the count of root bridge instances. + + @returns All the root bridge instances in an array. + The array should be passed into PciHostBridgeFreeRootBridges() + when it's not used. +**/ +PCI_ROOT_BRIDGE * +EFIAPI +PciHostBridgeGetRootBridges ( + OUT UINTN *Count + ) +{ + UINT32 SysId; + + // Check if the platform is FVP RevC + SysId =3D MmioRead32 (ARM_VE_SYS_ID_REG); + if ((SysId & ARM_FVP_SYS_ID_REV_MASK) =3D=3D ARM_FVP_BASE_REVC_REV) { + // There is a single Root Bridge instance on the FVP RevC Model + *Count =3D 1; + return &mRootBridge; + } + + // Other FVP models do not have PCIe + *Count =3D 0; + return NULL; +} + +/** + Free the root bridge instances array returned + from PciHostBridgeGetRootBridges(). + + @param [in] Bridges The root bridge instances array. + @param [in] Count The count of the array. +**/ +VOID +EFIAPI +PciHostBridgeFreeRootBridges ( + IN PCI_ROOT_BRIDGE *Bridges, + IN UINTN Count + ) +{ +} + +/** + Inform the platform that the resource conflict happens. + + @param [in] HostBridgeHandle Handle of the Host Bridge. + @param [in] Configuration Pointer to PCI I/O and PCI memory resource + descriptors. The Configuration contains the + resources for all the root bridges. The + resource for each root bridge is terminated + with END descriptor and an additional END = is + appended indicating the end of the entire + resources. The resource descriptor field + values follow the description in + EFI_PCI_HOST_BRIDGE_RESOURCE_ALLOCATION_PR= OTOCOL + .SubmitResources(). +**/ +VOID +EFIAPI +PciHostBridgeResourceConflict ( + IN EFI_HANDLE HostBridgeHandle, + IN VOID *Configuration + ) +{ + EFI_ACPI_ADDRESS_SPACE_DESCRIPTOR *Descriptor; + UINTN RootBridgeIndex; + + DEBUG ((DEBUG_ERROR, "PciHostBridge: Resource conflict happens!\n")); + + RootBridgeIndex =3D 0; + Descriptor =3D (EFI_ACPI_ADDRESS_SPACE_DESCRIPTOR *) Configuration; + while (Descriptor->Desc =3D=3D ACPI_ADDRESS_SPACE_DESCRIPTOR) { + DEBUG ((DEBUG_ERROR, "RootBridge[%d]:\n", RootBridgeIndex++)); + for (; Descriptor->Desc =3D=3D ACPI_ADDRESS_SPACE_DESCRIPTOR; Descript= or++) { + ASSERT (Descriptor->ResType < ARRAY_SIZE (mAcpiAddrSpaceTypeStr)); + DEBUG (( + DEBUG_ERROR, + " %s: Length/Alignment =3D 0x%lx / 0x%lx\n", + mAcpiAddrSpaceTypeStr[Descriptor->ResType], + Descriptor->AddrLen, Descriptor->AddrRangeMax + )); + if (Descriptor->ResType =3D=3D ACPI_ADDRESS_SPACE_TYPE_MEM) { + DEBUG (( + DEBUG_ERROR, + " Granularity/SpecificFlag =3D %ld / %02x%s\n", + Descriptor->AddrSpaceGranularity, + Descriptor->SpecificFlag, + ((Descriptor->SpecificFlag & + EFI_ACPI_MEMORY_RESOURCE_SPECIFIC_FLAG_CACHEABLE_PREFETCHABLE + ) !=3D 0) ? L" (Prefetchable)" : L"" + )); + } + } + + // Skip the END descriptor for root bridge + ASSERT (Descriptor->Desc =3D=3D ACPI_END_TAG_DESCRIPTOR); + Descriptor =3D (EFI_ACPI_ADDRESS_SPACE_DESCRIPTOR *)( + (EFI_ACPI_END_TAG_DESCRIPTOR *)Descriptor + 1 + ); + } +} diff --git a/Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/A= rmVExpressPciHostBridgeLib.inf b/Platform/ARM/VExpressPkg/Library/ArmVExpre= ssPciHostBridgeLib/ArmVExpressPciHostBridgeLib.inf new file mode 100644 index 0000000000000000000000000000000000000000..e5080074e2e96f258b004a086ec= 61af8cc263fd6 --- /dev/null +++ b/Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/ArmVExpr= essPciHostBridgeLib.inf @@ -0,0 +1,48 @@ +## @file +# PCI Host Bridge Library instance for ARM FVP Model +# +# Copyright (c) 2021, Arm Ltd. All rights reserved.
+# +# SPDX-License-Identifier: BSD-2-Clause-Patent +## + +[Defines] + INF_VERSION =3D 0x0001001B + BASE_NAME =3D ArmVExpressPciHostBridgeLib + MODULE_UNI_FILE =3D ArmVExpressPciHostBridgeLib.uni + FILE_GUID =3D 4226FB49-3049-4A60-AF7A-90B6DBD4BF26 + MODULE_TYPE =3D DXE_DRIVER + VERSION_STRING =3D 1.0 + LIBRARY_CLASS =3D PciHostBridgeLib + +# +# The following information is for reference only and not required by the = build +# tools. +# +# VALID_ARCHITECTURES =3D AARCH64 ARM +# + +[Sources] + ArmVExpressPciHostBridgeLib.c + +[Packages] + ArmPkg/ArmPkg.dec + MdeModulePkg/MdeModulePkg.dec + MdePkg/MdePkg.dec + Platform/ARM/VExpressPkg/ArmVExpressPkg.dec + +[LibraryClasses] + IoLib + +[FixedPcd] + gArmTokenSpaceGuid.PcdPciBusMin + gArmTokenSpaceGuid.PcdPciBusMax + + gArmTokenSpaceGuid.PcdPciIoBase + gArmTokenSpaceGuid.PcdPciIoSize + + gArmTokenSpaceGuid.PcdPciMmio32Base + gArmTokenSpaceGuid.PcdPciMmio32Size + + gArmTokenSpaceGuid.PcdPciMmio64Base + gArmTokenSpaceGuid.PcdPciMmio64Size diff --git a/Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/A= rmVExpressPciHostBridgeLib.uni b/Platform/ARM/VExpressPkg/Library/ArmVExpre= ssPciHostBridgeLib/ArmVExpressPciHostBridgeLib.uni new file mode 100644 index 0000000000000000000000000000000000000000..8913c7fea0d825dabc436eb3b70= 29e84bf08167f --- /dev/null +++ b/Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/ArmVExpr= essPciHostBridgeLib.uni @@ -0,0 +1,14 @@ +// /** @file +// Instance of PCI Host Bridge Library for FVP Platform. +// +// Copyright (c) 2021, Arm Ltd. All rights reserved.
+// +// SPDX-License-Identifier: BSD-2-Clause-Patent +// +// **/ + +#langdef en-US "English" + +#string STR_MODULE_ABSTRACT #language en-US "Instance of PCI Host Brid= ge Library for FVP Platform." + +#string STR_MODULE_DESCRIPTION #language en-US "Instance of PCI Host Brid= ge Library for FVP Platform." --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#71636): https://edk2.groups.io/g/devel/message/71636 Mute This Topic: https://groups.io/mt/80580212/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sun May 5 10:36:37 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+71635+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 161312545609455.39253151001617; Fri, 12 Feb 2021 02:24:16 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id jaVLYY1788612xUbhHqaVtjI; Fri, 12 Feb 2021 02:24:15 -0800 X-Received: from EUR05-VI1-obe.outbound.protection.outlook.com (EUR05-VI1-obe.outbound.protection.outlook.com [40.107.21.40]) by mx.groups.io with SMTP id smtpd.web09.1981.1613125449553224658 for ; Fri, 12 Feb 2021 02:24:10 -0800 X-Received: from AM6PR08CA0009.eurprd08.prod.outlook.com (2603:10a6:20b:b2::21) by DB7PR08MB3561.eurprd08.prod.outlook.com (2603:10a6:10:42::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25; Fri, 12 Feb 2021 10:24:01 +0000 X-Received: from AM5EUR03FT027.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:b2:cafe::e0) by AM6PR08CA0009.outlook.office365.com (2603:10a6:20b:b2::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:01 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+71635+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT027.mail.protection.outlook.com (10.152.16.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:01 +0000 X-Received: ("Tessian outbound 4d8113405d55:v71"); Fri, 12 Feb 2021 10:24:01 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: a6bc6749752fbd22 X-CR-MTA-TID: 64aa7808 X-Received: from 8ad3b5d4472c.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 06EA691E-8A0F-4729-A798-BC6A89FA4931.1; Fri, 12 Feb 2021 10:23:55 +0000 X-Received: from EUR05-AM6-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 8ad3b5d4472c.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 12 Feb 2021 10:23:55 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=J5ZM6CEg6Z/8yJ8ymwqwakmbyId3MV+73nnOiuJm7ww2zssDkqZJ66Lc27kvzbxAca2hHAZi3ggTtJ8vtW2nKVqUaQlUAiNQijvFIbhGkzsupdbFOk/GGToOIkRYG6/X2UV+99LUb+0hRSHZ92jtwDkig3Wp9G8S5frYlv9SWFsJEP9pMJIIcQOnKiScWKbPy8ILiWV8UKFd8vfHjfzzL14xkLlLEEla5ynBc1zqJKm7qUNdDueF22Sb/8piuZ62zRtdbQcpGh7WxADSvu33CAMhzO5u8dOy2MB3cPsy6oUT4sIZz/dYbCRaMkM8R11zBs/oMhZU+50L4kEu6T2DEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ukVanBIGptsYu4ST8diuoKIiJvbf5rPnlIttXWz5VFg=; b=WSnYwHIFCuDpmqzz84vX8aqAjeejASFZ9fJyASzU1yywX1V+CiANR9Al/M9SrX671zHyG2/LIp1d9LElyk7mrRkGC/D4P7/zA0jW1THosa4M6+SEEnmi9ses/mtJgPxwIgsR5ES1C7T56Zgb2KjW+u5PlPy3Pxdwg3UVoxUIx3Q4wZkTbvJWHlPGIT7tDiR2+TYuQrGRyFLWQatmNig1MHXoGRCS46mlD3cMnT3qDRWzs/tASZcpUBRH8CgsuGb/2wd+NIIHiw07X4sKau6ImYAwGpQkvweAqk93VDY5vWOHYC5LXA4UqZQQvkstJoW/XB409yH12Xtmgc51S18hQg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from DB6PR0601CA0006.eurprd06.prod.outlook.com (2603:10a6:4:7b::16) by AM7PR08MB5527.eurprd08.prod.outlook.com (2603:10a6:20b:de::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.29; Fri, 12 Feb 2021 10:23:54 +0000 X-Received: from DB5EUR03FT037.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:7b:cafe::29) by DB6PR0601CA0006.outlook.office365.com (2603:10a6:4:7b::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27 via Frontend Transport; Fri, 12 Feb 2021 10:23:54 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT037.mail.protection.outlook.com (10.152.20.215) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:54 +0000 X-Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2044.4; Fri, 12 Feb 2021 10:23:44 +0000 X-Received: from E107187.Arm.com (10.57.49.120) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Fri, 12 Feb 2021 10:23:44 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , Subject: [edk2-devel] [PATCH edk2-platforms v1 03/12] Platform/ARM/VExpressPkg: Memory map for FVP RevC model Date: Fri, 12 Feb 2021 10:23:32 +0000 Message-ID: <20210212102341.24056-4-sami.mujawar@arm.com> In-Reply-To: <20210212102341.24056-1-sami.mujawar@arm.com> References: <20210212102341.24056-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 8f08c079-0706-4e56-580e-08d8cf4050c9 X-MS-TrafficTypeDiagnostic: AM7PR08MB5527:|DB7PR08MB3561: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:2201;OLM:2201; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(396003)(39860400002)(376002)(136003)(346002)(36840700001)(46966006)(1076003)(83380400001)(26005)(81166007)(4326008)(36860700001)(6916009)(82740400003)(186003)(316002)(478600001)(47076005)(7696005)(2906002)(2616005)(36756003)(8676002)(6666004)(44832011)(19627235002)(82310400003)(426003)(54906003)(86362001)(8936002)(5660300002)(70206006)(356005)(70586007)(336012)(36900700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM7PR08MB5527 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT027.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: a54df073-46dc-484a-b8c0-08d8cf404cc6 X-Microsoft-Antispam-Message-Info: pAjMNbXVItr6elIKl2IlrscnbMDftk0FLByHpd+wn+J5NCmtR2C0kdLWUL03zjtwWEWv0ui0JQ6+CDMlRPskuLCcJtMlh9yFnbmfZFo0kng8JdZxRex0PxdYG1q3E3Jbn/Fo3Yj54noxyMW3xpa+zbGclp0H/BJZXMCpLOvotATrmTCfGvyvsReAMtF6X4l8+r8Ok7BYA0jjFb8Df8rD8PEJh7Pob74Kj/+dMxXsgLAdkAZ/ri+68+xhW644TUSnb+Ih4XkgNXo5WJojkhd3jZRLDRrvil1HnbVb5nq2Mt3coEOEV1iUdcKyTOzO/gTPfHCDL2fmc6kkx57V8wB9Vd9hVlN9UJUbEbX/ep8BKiymrY3JeCJQYX4O41tWcPAkXk3qd+pACjLoJCI1WdtHNyD9/l/VUPOWIIeri4nn9KtyO8QOZknPMFwaUScnLCl6MHG7IAGP093bMm9o3UlAh6XeZA6FQK5OY9eRoiMt2/0eEmY+pM5yuSEm8W/ejyxODhja+T6AtLs9j1/qWtAD9nT7Bu0uluGE5NI4jS7yGzeORm1ngCzcyv4um9zA6oToMPsxLBTnaFeDGMlzzCtQJ1Hj7NzvDOQAqafMNIeud5pP62979Lm56Rr1PYcAjkhAV9CvDVk5kjdXZ5L7SJj6fz15t6K4HHAuBBTAOIqbpbY= X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Feb 2021 10:24:01.2584 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 8f08c079-0706-4e56-580e-08d8cf4050c9 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT027.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB3561 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: QnFgyAil1Cx1rlquk7QuPyNOx1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1613125455; bh=J2R6Jec/e9TGUjHoE/XXu6CsbL+PRDdZTW+HbIsTWg0=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=hbjy1OJe2cTTX83tQDMPyx8uGm+sAvSctttRxWSsUKl/Z2+1myX5zXbH+iNUkfaQcvS /slOGkjmY1bTxfTQvgzOs6I4NCJBoQZAo9hZYaHMjjtxnkOI7/WSOHgGPBzJCmy1ZMeiQ elFwUa7jYWg5uVmEcoB1JlAafj81i6UomQs= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" FVP Base Platform RevC is a configuration of the Base Platform that includes a SMMUv3 and a PCIe subsystem. The PCIe subsystem has a PCIe config region (ECAM) and two PCIe memory regions. Add the SMMUv3 and PCIe config and memory regions to the memory map so that the firmware can access and configure these components. Signed-off-by: Sami Mujawar Reviewed-by: Ard Biesheuvel --- Platform/ARM/VExpressPkg/Include/Platform/RTSM/ArmPlatform.h | = 6 +++- Platform/ARM/VExpressPkg/Library/ArmVExpressLibRTSM/ArmVExpressLib.inf | 1= 2 +++++++- Platform/ARM/VExpressPkg/Library/ArmVExpressLibRTSM/RTSMMem.c | 3= 1 ++++++++++++++++++-- 3 files changed, 45 insertions(+), 4 deletions(-) diff --git a/Platform/ARM/VExpressPkg/Include/Platform/RTSM/ArmPlatform.h b= /Platform/ARM/VExpressPkg/Include/Platform/RTSM/ArmPlatform.h index 499f62b2dc405c777e2266f4cbdaba963f5d26a2..96cc131dac91e428881f2506d27= 7222490b649cb 100644 --- a/Platform/ARM/VExpressPkg/Include/Platform/RTSM/ArmPlatform.h +++ b/Platform/ARM/VExpressPkg/Include/Platform/RTSM/ArmPlatform.h @@ -1,7 +1,7 @@ /** @file * Header defining Versatile Express constants (Base addresses, sizes, fla= gs) * -* Copyright (c) 2011, ARM Limited. All rights reserved. +* Copyright (c) 2011 - 2021, Arm Limited. All rights reserved. * * SPDX-License-Identifier: BSD-2-Clause-Patent * @@ -73,4 +73,8 @@ #define SBSA_WATCHDOG_BASE 0x2a440000 #define SBSA_WATCHDOG_SIZE (2 * SIZE_64KB) =20 +// SMMUv3 - FVP RevC +#define FVP_REVC_SMMUV3_BASE 0x2B400000 +#define FVP_REVC_SMMUV3_SIZE SIZE_1MB + #endif diff --git a/Platform/ARM/VExpressPkg/Library/ArmVExpressLibRTSM/ArmVExpres= sLib.inf b/Platform/ARM/VExpressPkg/Library/ArmVExpressLibRTSM/ArmVExpressL= ib.inf index d3441b0852c67b697067191f6b46f3ac6dce7707..929dadc28a84cdb2ca6c6a733b7= 5a5c352922112 100644 --- a/Platform/ARM/VExpressPkg/Library/ArmVExpressLibRTSM/ArmVExpressLib.inf +++ b/Platform/ARM/VExpressPkg/Library/ArmVExpressLibRTSM/ArmVExpressLib.inf @@ -1,5 +1,5 @@ #/* @file -# Copyright (c) 2011-2018, ARM Limited. All rights reserved. +# Copyright (c) 2011-2021, Arm Limited. All rights reserved. # # SPDX-License-Identifier: BSD-2-Clause-Patent # @@ -54,5 +54,15 @@ [FixedPcd] gArmPlatformTokenSpaceGuid.PcdArmMaliDpBase gArmPlatformTokenSpaceGuid.PcdArmMaliDpMemoryRegionLength =20 + # PCI Configuration space + gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress + gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseSize + + gArmTokenSpaceGuid.PcdPciMmio32Base + gArmTokenSpaceGuid.PcdPciMmio32Size + + gArmTokenSpaceGuid.PcdPciMmio64Base + gArmTokenSpaceGuid.PcdPciMmio64Size + [Ppis] gArmMpCoreInfoPpiGuid diff --git a/Platform/ARM/VExpressPkg/Library/ArmVExpressLibRTSM/RTSMMem.c = b/Platform/ARM/VExpressPkg/Library/ArmVExpressLibRTSM/RTSMMem.c index 21ffd64fb6350608b661298e4f336493696081df..13f181834ba8a3a8225a18147cb= dbbde3807eb53 100644 --- a/Platform/ARM/VExpressPkg/Library/ArmVExpressLibRTSM/RTSMMem.c +++ b/Platform/ARM/VExpressPkg/Library/ArmVExpressLibRTSM/RTSMMem.c @@ -1,6 +1,6 @@ /** @file * -* Copyright (c) 2011-2018, ARM Limited. All rights reserved. +* Copyright (c) 2011-2021, Arm Limited. All rights reserved. * * SPDX-License-Identifier: BSD-2-Clause-Patent * @@ -17,7 +17,7 @@ #define DP_BASE_DESCRIPTOR ((FixedPcdGet64 (PcdArmMaliDpBase) !=3D 0)= ? 1 : 0) =20 // Number of Virtual Memory Map Descriptors -#define MAX_VIRTUAL_MEMORY_MAP_DESCRIPTORS (10 + DP_BASE_DESCRIPTOR) +#define MAX_VIRTUAL_MEMORY_MAP_DESCRIPTORS (14 + DP_BASE_DESCRIPTOR) =20 // DDR attributes #define DDR_ATTRIBUTES_CACHED ARM_MEMORY_REGION_ATTRIBUTE_WRITE_BACK @@ -161,6 +161,33 @@ ArmPlatformGetVirtualMemoryMap ( VirtualMemoryTable[Index].Attributes =3D ARM_MEMORY_REGION_ATTRIBUTE_D= EVICE; } =20 + // Map the PCI configration and memory space if the platform is FVP RevC. + if ((SysId & ARM_FVP_SYS_ID_REV_MASK) =3D=3D ARM_FVP_BASE_REVC_REV) { + // SMMUv3 + VirtualMemoryTable[++Index].PhysicalBase =3D FVP_REVC_SMMUV3_BASE; + VirtualMemoryTable[Index].VirtualBase =3D FVP_REVC_SMMUV3_BASE; + VirtualMemoryTable[Index].Length =3D FVP_REVC_SMMUV3_SIZE; + VirtualMemoryTable[Index].Attributes =3D ARM_MEMORY_REGION_ATTRIB= UTE_DEVICE; + + // PCI Configuration Space + VirtualMemoryTable[++Index].PhysicalBase =3D FixedPcdGet64 (PcdPciExp= ressBaseAddress); + VirtualMemoryTable[Index].VirtualBase =3D FixedPcdGet64 (PcdPciExp= ressBaseAddress); + VirtualMemoryTable[Index].Length =3D FixedPcdGet64 (PcdPciExp= ressBaseSize); + VirtualMemoryTable[Index].Attributes =3D ARM_MEMORY_REGION_ATTRIB= UTE_DEVICE; + + // PCI Memory Space + VirtualMemoryTable[++Index].PhysicalBase =3D FixedPcdGet32 (PcdPciMmi= o32Base); + VirtualMemoryTable[Index].VirtualBase =3D FixedPcdGet32 (PcdPciMmi= o32Base); + VirtualMemoryTable[Index].Length =3D FixedPcdGet32 (PcdPciMmi= o32Size); + VirtualMemoryTable[Index].Attributes =3D ARM_MEMORY_REGION_ATTRIB= UTE_DEVICE; + + // 64-bit PCI Memory Space + VirtualMemoryTable[++Index].PhysicalBase =3D FixedPcdGet64 (PcdPciMmi= o64Base); + VirtualMemoryTable[Index].VirtualBase =3D FixedPcdGet64 (PcdPciMmi= o64Base); + VirtualMemoryTable[Index].Length =3D FixedPcdGet64 (PcdPciMmi= o64Size); + VirtualMemoryTable[Index].Attributes =3D ARM_MEMORY_REGION_ATTRIB= UTE_DEVICE; + } + // Map sparse memory region if present if (HasSparseMemory) { VirtualMemoryTable[++Index].PhysicalBase =3D SparseMemoryBase; --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#71635): https://edk2.groups.io/g/devel/message/71635 Mute This Topic: https://groups.io/mt/80580211/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sun May 5 10:36:37 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+71630+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1613125446949861.4156804644076; Fri, 12 Feb 2021 02:24:06 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id 1xHpYY1788612xGJLIEMqXmL; Fri, 12 Feb 2021 02:24:06 -0800 X-Received: from EUR05-AM6-obe.outbound.protection.outlook.com (EUR05-AM6-obe.outbound.protection.outlook.com [40.107.22.59]) by mx.groups.io with SMTP id smtpd.web10.1904.1613125445746204530 for ; Fri, 12 Feb 2021 02:24:06 -0800 X-Received: from DU2PR04CA0148.eurprd04.prod.outlook.com (2603:10a6:10:231::33) by AS8PR08MB6247.eurprd08.prod.outlook.com (2603:10a6:20b:29c::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.19; Fri, 12 Feb 2021 10:24:03 +0000 X-Received: from DB5EUR03FT064.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:231:cafe::14) by DU2PR04CA0148.outlook.office365.com (2603:10a6:10:231::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:03 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+71630+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT064.mail.protection.outlook.com (10.152.21.199) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:03 +0000 X-Received: ("Tessian outbound af289585f0f4:v71"); Fri, 12 Feb 2021 10:24:02 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 830ee3fa73fcb373 X-CR-MTA-TID: 64aa7808 X-Received: from b99d8f453d02.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 034BB99A-4EBB-47AB-A870-09856DDE0C2F.1; Fri, 12 Feb 2021 10:23:57 +0000 X-Received: from EUR02-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id b99d8f453d02.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 12 Feb 2021 10:23:57 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hGPbpFcKwP/DkLxzHEzQ7nSqWN3VaZQDrHLSFdlK9HqGQNBofYYjz0EDWShMcFuAfbNwOVwQCJAqT94vYo3Y27z2LfD1I52ZlgElvN83U3bhfxK/Ko+Mimp4rN0Yfmrey+deiAEar+ENP2EjMPCc5KXRKzng5n3MovITzRikt65pI+PtJ6RegIuh0fvJrBNtqUdEGC7PS0iI2AUsmeio32QGqxPM+CwIR94QYaTzHw1C8xaVVOGxpe9nh6o5L26TmwkaHZbIduU7OE46JV6E7fFTyYQRgmO1LYcuP2RvXXLC5zd+AMJCbzcfhum5Sa02bHDj7pB5IKpHTs1g7BfPRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=68Y069PJnj1YQgchSuCY9M/obdXR0InLw9ldv2+PjCg=; b=dmE/IcUI9lnN9pkoATJO3f+jj1qq8P4i9pYkczSxhiwTohCJ8275lklDbGbg23cgyEY0FDKENAjjQpbDwiu8NaVRtIvDAfrwXCf1jjWh0vSysAAjitLyrAWgQHAopIGnwf6Z/SbMCXBOea0uxO+85yF3kViem7WBWGvTUh6s5Un7geK7J2CrA01T2iBax2yT0AnwZLmDLVMh6ij8vXDnQ9LWTxQe2y/rh6ejHlcGTKojaR+ZkgmK2ITGfi9pfA6ZO6yjnlZbAeM5zROThqa6coi/GLqI6Tlw59TX/5RAef+eJoL7cKy+g7k6j32nNro12CJB+T2R60b3CABBI4myrw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from DB6PR0601CA0009.eurprd06.prod.outlook.com (2603:10a6:4:7b::19) by AM6PR08MB4965.eurprd08.prod.outlook.com (2603:10a6:20b:e5::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.29; Fri, 12 Feb 2021 10:23:55 +0000 X-Received: from DB5EUR03FT037.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:7b:cafe::e0) by DB6PR0601CA0009.outlook.office365.com (2603:10a6:4:7b::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:55 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT037.mail.protection.outlook.com (10.152.20.215) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:55 +0000 X-Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2044.4; Fri, 12 Feb 2021 10:23:45 +0000 X-Received: from E107187.Arm.com (10.57.49.120) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Fri, 12 Feb 2021 10:23:45 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , Subject: [edk2-devel] [PATCH edk2-platforms v1 04/12] Platform/ARM/VExpressPkg: Configure SMMUv3 for FVP RevC Date: Fri, 12 Feb 2021 10:23:33 +0000 Message-ID: <20210212102341.24056-5-sami.mujawar@arm.com> In-Reply-To: <20210212102341.24056-1-sami.mujawar@arm.com> References: <20210212102341.24056-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 61ddc02e-6eac-46ed-87e8-08d8cf4051d5 X-MS-TrafficTypeDiagnostic: AM6PR08MB4965:|AS8PR08MB6247: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:8273;OLM:8273; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: BBgw5TUONERvQX+QrVSEucrLGyuaha3cAKmLVS3NH67wrK63dLqSQykpLW8dHd5MbfNHPeTo53BTQEpJH4/Q9jdAIxPIvVc9C9Z4Y4bGSPVEReMdZOB9Ja1wmh8xoEm5q3vniY4NEnI0Z9y8ix20kU3kU9r7Y0u30jXzkVhW5lXCNLPhud7LJLzWL1G7fjQ3KZT3JvW5JjObFRZ7qA+jdoaX1vAS+zEM4WK/Ny6RIyLwSdjElwuAcNAs0la+s8akOpZYrHgyBc+k6nm8i7cYH2+63bODB4GeDzpsJn/oseUoKqnnIZmkqAJsv4UKdNk0Hl1JAIUPsEhFp0UX1oPJulG45FUxAP2LgQB4dEPvfNngOWWkXKHViUlAcgAn1U+TmSy+wzpfL+XgjXuTFEQujEF+cjGm3J5yLk2e8q49GnS0cua53GADNGyVeqEVGrZR7/gcURjGWL0NRVSUmTPr9cH6gKwhKwEwtwe13/51S5LQ8aQ3us7s/K1Lx0dVcBDT89iEofPqnu/6+t4Bk457boqRYWvutPXV5wqltIFuNDQHQwHkhYUuDts1a4vlw4tZWh+ObURWfy6bIbCbCbm7SxsevH+KJ7CsUQJ6cxvl/JGnT2Emuz1cVYmOYNAkHLJXxbN0O07wWyXnjp1Ve8VULBfo1++s7uqY2+56+hLI+gFXiX3onj7x0Y6Ns5sMa0sX X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(136003)(39860400002)(346002)(376002)(396003)(36840700001)(46966006)(1076003)(81166007)(2616005)(7696005)(186003)(5660300002)(70206006)(6916009)(47076005)(316002)(478600001)(8676002)(6666004)(70586007)(356005)(8936002)(44832011)(83380400001)(54906003)(426003)(36756003)(82740400003)(4326008)(336012)(86362001)(2906002)(26005)(82310400003)(36860700001)(36900700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4965 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT064.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 7e87f5a5-ab65-4ae0-7614-08d8cf404d4e X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Feb 2021 10:24:03.0650 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 61ddc02e-6eac-46ed-87e8-08d8cf4051d5 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT064.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR08MB6247 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: TglyLaVr7ibGddaJPR0PsvB4x1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1613125446; bh=xz5MCQyzQ/4mXpfyDPs/d9k4sgGFPIoOvACNQRFIARA=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=CXlIKXYW7O12fxz7TcES7JrEM28PkL4KLcErchcmBiXLdri5UXONYE4rnETgSOm1eGi bo80u7L8NDOVUUNQU286EM33x5p2fTPKwD/HEHRt4TcrCyUJJHD439CenSZiK5QhWUU35 DTu36KXuogQEYUDe2hq5oK+ORiEmOAZSiT8= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Base Platform RevC is a configuration of the Base Platform that includes a SMMUv3. TF-A configures the SMMUv3 to 'Abort all incoming transactions in order to implement a default deny policy on reset'. This prevents the firmware from using the AHCI-SATA disk that is available as a PCIe device. According to Server Base System Architecture (SBSA) 6.1, Section A Level 3 - firmware, Sub-section A.1 Memory map, 'All Non-secure on-chip masters in a base server system that are expected to be used by the platform firmware must be capable of addressing all of the Non-secure address space. If the master goes through a SMMU then the master must be capable of addressing all of the Non-secure address space even when the SMMU is off.' Therefore, configure the SMMUv3 to set Non-secure streams to bypass the SMMU. On firmware hand-off the OS is expected to reconfigure the SMMU. Signed-off-by: Sami Mujawar Reviewed-by: Ard Biesheuvel --- Platform/ARM/VExpressPkg/Drivers/ArmVExpressDxe/ArmFvpDxe.c | 110 ++++++= +++++++++++++- Platform/ARM/VExpressPkg/Drivers/ArmVExpressDxe/ArmFvpDxe.inf | 4 +- 2 files changed, 112 insertions(+), 2 deletions(-) diff --git a/Platform/ARM/VExpressPkg/Drivers/ArmVExpressDxe/ArmFvpDxe.c b/= Platform/ARM/VExpressPkg/Drivers/ArmVExpressDxe/ArmFvpDxe.c index 189069484b57533ce43bcdccb30c85c882fc7ffb..1f1dfd3de5b9aedc1515d55a159= 63df75a295326 100644 --- a/Platform/ARM/VExpressPkg/Drivers/ArmVExpressDxe/ArmFvpDxe.c +++ b/Platform/ARM/VExpressPkg/Drivers/ArmVExpressDxe/ArmFvpDxe.c @@ -1,6 +1,6 @@ /** @file =20 - Copyright (c) 2013-2015, ARM Ltd. All rights reserved.
+ Copyright (c) 2013-2021, Arm Ltd. All rights reserved.
=20 SPDX-License-Identifier: BSD-2-Clause-Patent =20 @@ -11,6 +11,8 @@ #include #include #include +#include +#include #include #include =20 @@ -18,6 +20,13 @@ =20 #define ARM_FVP_BASE_VIRTIO_BLOCK_BASE 0x1c130000 =20 +// SMMUv3 Global Bypass Attribute (GBPA) register offset. +#define SMMU_GBPA 0x0044 + +// SMMU_GBPA register fields. +#define SMMU_GBPA_UPDATE BIT31 +#define SMMU_GBPA_ABORT BIT20 + #pragma pack(1) typedef struct { VENDOR_DEVICE_PATH Vendor; @@ -49,6 +58,92 @@ VIRTIO_BLK_DEVICE_PATH mVirtioBlockDevicePath =3D }; =20 /** + Poll the SMMU register and test the value based on the mask. + + @param [in] SmmuReg Base address of the SMMU register. + @param [in] Mask Mask of register bits to monitor. + @param [in] Value Expected value. + + @retval EFI_SUCCESS Success. + @retval EFI_TIMEOUT Timeout. +**/ +STATIC +EFI_STATUS +EFIAPI +SmmuV3Poll ( + IN UINT64 SmmuReg, + IN UINT32 Mask, + IN UINT32 Value + ) +{ + UINT32 RegVal; + UINTN Count; + + // Set 1ms timeout value. + Count =3D 10; + do { + RegVal =3D MmioRead32 (SmmuReg); + if ((RegVal & Mask) =3D=3D Value) { + return EFI_SUCCESS; + } + MicroSecondDelay (100); + } while ((--Count) > 0); + + DEBUG ((DEBUG_ERROR, "Timeout polling SMMUv3 register @%p\n", SmmuReg)); + DEBUG (( + DEBUG_ERROR, + "Read value 0x%x, expected 0x%x\n", + RegVal, + ((Value =3D=3D 0) ? (RegVal & ~Mask) : (RegVal | Mask)) + )); + return EFI_TIMEOUT; +} + +/** + Initialise the SMMUv3 to set Non-secure streams to bypass the SMMU. + + @param [in] SmmuReg Base address of the SMMUv3. + + @retval EFI_SUCCESS Success. + @retval EFI_TIMEOUT Timeout. +**/ +STATIC +EFI_STATUS +EFIAPI +SmmuV3Init ( + IN UINT64 SmmuBase + ) +{ + EFI_STATUS Status; + UINT32 RegVal; + + // Attribute update has completed when SMMU_(S)_GBPA.Update bit is 0. + Status =3D SmmuV3Poll (SmmuBase + SMMU_GBPA, SMMU_GBPA_UPDATE, 0); + if (EFI_ERROR (Status)) { + return Status; + } + + // SMMU_(S)_CR0 resets to zero with all streams bypassing the SMMU, + // so just abort all incoming transactions. + RegVal =3D MmioRead32 (SmmuBase + SMMU_GBPA); + + // TF-A configures the SMMUv3 to abort all incoming transactions. + // Clear the SMMU_GBPA.ABORT to allow Non-secure streams to bypass + // the SMMU. + RegVal &=3D ~SMMU_GBPA_ABORT; + RegVal |=3D SMMU_GBPA_UPDATE; + + MmioWrite32 (SmmuBase + SMMU_GBPA, RegVal); + + Status =3D SmmuV3Poll (SmmuBase + SMMU_GBPA, SMMU_GBPA_UPDATE, 0); + if (EFI_ERROR (Status)) { + return Status; + } + + return EFI_SUCCESS; +} + +/** * Generic UEFI Entrypoint for 'ArmFvpDxe' driver * See UEFI specification for the details of the parameters */ @@ -60,6 +155,7 @@ ArmFvpInitialise ( ) { EFI_STATUS Status; + UINT32 SysId; =20 Status =3D gBS->InstallProtocolInterface (&ImageHandle, &gEfiDevicePathProtocolGuid, EFI_NATIVE_INTERFACE, @@ -80,5 +176,17 @@ ArmFvpInitialise ( DEBUG ((EFI_D_ERROR, "ArmFvpDxe: Failed to install ShellDynCmdRunAxf\n= ")); } =20 + // If FVP RevC - Configure SMMUv3 to set NS transactions in bypass mode. + SysId =3D MmioRead32 (ARM_VE_SYS_ID_REG); + if ((SysId & ARM_FVP_SYS_ID_REV_MASK) =3D=3D ARM_FVP_BASE_REVC_REV) { + Status =3D SmmuV3Init (FVP_REVC_SMMUV3_BASE); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + "ArmFvpDxe: Failed to initialise SMMUv3 in bypass mode.\n" + )); + } + } + return Status; } diff --git a/Platform/ARM/VExpressPkg/Drivers/ArmVExpressDxe/ArmFvpDxe.inf = b/Platform/ARM/VExpressPkg/Drivers/ArmVExpressDxe/ArmFvpDxe.inf index a4021c2d9e241845736eea428a479a4abddd6413..c5f41795310141ae9d7c175c26d= 5694590a0a08a 100644 --- a/Platform/ARM/VExpressPkg/Drivers/ArmVExpressDxe/ArmFvpDxe.inf +++ b/Platform/ARM/VExpressPkg/Drivers/ArmVExpressDxe/ArmFvpDxe.inf @@ -1,6 +1,6 @@ #/** @file # -# Copyright (c) 2013-2015, ARM Ltd. All rights reserved.
+# Copyright (c) 2013-2021, Arm Ltd. All rights reserved.
# # SPDX-License-Identifier: BSD-2-Clause-Patent # @@ -28,6 +28,8 @@ [Packages] [LibraryClasses] ArmShellCmdRunAxfLib BaseMemoryLib + IoLib + TimerLib UefiDriverEntryPoint UefiBootServicesTableLib VirtioMmioDeviceLib --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#71630): https://edk2.groups.io/g/devel/message/71630 Mute This Topic: https://groups.io/mt/80580205/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sun May 5 10:36:37 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+71631+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1613125448449824.3656643534779; Fri, 12 Feb 2021 02:24:08 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id 0iwHYY1788612xhfFy8VW1FG; Fri, 12 Feb 2021 02:24:08 -0800 X-Received: from EUR01-VE1-obe.outbound.protection.outlook.com (EUR01-VE1-obe.outbound.protection.outlook.com [40.107.14.42]) by mx.groups.io with SMTP id smtpd.web11.1982.1613125447075048374 for ; Fri, 12 Feb 2021 02:24:07 -0800 X-Received: from AS8PR04CA0027.eurprd04.prod.outlook.com (2603:10a6:20b:310::32) by VI1PR08MB5293.eurprd08.prod.outlook.com (2603:10a6:803:df::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.28; Fri, 12 Feb 2021 10:24:03 +0000 X-Received: from AM5EUR03FT023.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:310:cafe::62) by AS8PR04CA0027.outlook.office365.com (2603:10a6:20b:310::32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:03 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+71631+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT023.mail.protection.outlook.com (10.152.16.169) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:03 +0000 X-Received: ("Tessian outbound f362b81824dc:v71"); Fri, 12 Feb 2021 10:24:02 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 6fe5fc95d37b467c X-CR-MTA-TID: 64aa7808 X-Received: from 2062990c38da.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 0686FDB6-AAD2-43D1-AD05-DED858883192.1; Fri, 12 Feb 2021 10:23:57 +0000 X-Received: from EUR05-DB8-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 2062990c38da.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 12 Feb 2021 10:23:57 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=V1IZkjluDF3bHaS8Y7LQ3qDEMJ29sLx3mktaM51gHclXvGRTeJEjlBe2CugAMb/V8GiylZw9QLhL+tcaoEXiKcLjfk8mrf+gCLbzwwGaid/9NEv49woc/F2KfS5zXocK4L9rMtDidRr/Bgz/eF0sdP6KodxrGVje+oFUWawXW/z2rnmGdkDAu1gEOcz1fNdjQadddmUrwPH9tWkIdgQICtjs3HmHLQkGnk/u3d0PECToegVoxiJwrFwI0SLMbA9sYXYUbfONwln/59VcXebIbZu6bWWaSiBBfstoeJ8txGl8xuKq7x864pU/m4N32kv7FCVi32xpUp6Hd1Yd+SkV9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=b2aGzheUAFjanVZSjO32Ir91IxQpTPzrwObfJezrYsQ=; b=EymIbGGbWM3nQrVVyLM/YRqUNDb7G7TsiVISP3i0M0sFbNh0YW0cUecoBDMHNV/fm5Xse4IKVJrfZSb54KU4MWQEzTLv3urxic4o5RnDnxJHeYOIE3MtgUVa2IMsJUB34GGvMGBpPJUlFyCwoCvyozByUmfe7hRZ9j6o8RSmtdQgrAVjVc83uXZTZOZHjX6DGEEDXioSdx90PoWmM2URzz8hJJf2kH+eLQe3piJ9QHk1X5wY9qbDDsIKo2qA90200h6Yu0GWI3mqBP6nQz6L7AYMOBN+JA29Pa4B3E2DuaZ9UHyNjeQzhHzwrErRLmJTmUlaBKwqez6RK7sHNUM7Uw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from DB6PR0601CA0011.eurprd06.prod.outlook.com (2603:10a6:4:7b::21) by VI1PR0801MB1904.eurprd08.prod.outlook.com (2603:10a6:800:81::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.26; Fri, 12 Feb 2021 10:23:55 +0000 X-Received: from DB5EUR03FT037.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:7b:cafe::9e) by DB6PR0601CA0011.outlook.office365.com (2603:10a6:4:7b::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:55 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT037.mail.protection.outlook.com (10.152.20.215) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:55 +0000 X-Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2044.4; Fri, 12 Feb 2021 10:23:46 +0000 X-Received: from E107187.Arm.com (10.57.49.120) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Fri, 12 Feb 2021 10:23:45 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , Subject: [edk2-devel] [PATCH edk2-platforms v1 05/12] Platform/ARM/VExpressPkg: Helper macro to map reference token Date: Fri, 12 Feb 2021 10:23:34 +0000 Message-ID: <20210212102341.24056-6-sami.mujawar@arm.com> In-Reply-To: <20210212102341.24056-1-sami.mujawar@arm.com> References: <20210212102341.24056-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 66625b05-b0fc-45f8-d659-08d8cf4051d4 X-MS-TrafficTypeDiagnostic: VI1PR0801MB1904:|VI1PR08MB5293: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:6430;OLM:6430; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: O7Y3iLEvbx/t51Vd3E0DGUWA5Uo2uax0KHltkjG9uxBseLzRR8RoFmILWwTs9bRssliROCQrIvxDGMUu3P7Pvc5Nq7O+bkkXY95u/YOhiS+4/klwbeWfteA71t34DOQUko3RoRZiPBa/V6TDwzquR0AwMmAtoLcD5m+QIvNtv9GToIoEDgIDL3mP0QiF9rk91+6CI97zRp6xpY2Z7lysmahPs7zo25TF7rZPNshxj9976Ea4Rq91lQd5rcLl8eSY3xbzl7BDsfCrK4Ov5GbM1Xq+rPVUx5pXhLlAEYUaigmhQ6/0pqpKdd252iWLmOLbbd910n6SQoBq96as/LbkaBwBGt/3IKjdgybYLDDSQOfgcm0iR4muYXJh2qfkeA+C5OgxIHex7YBTlkk71EjLleqW7JPUuhsggDPFQOPzMJ1Cg38zzK2EcoeONcZn6bzz7SjoOj0GhUaVkEiarBh/0VEHErVS3ulfo5QOuXG9pGw0aaYoA/Bpx6LZ66mbjGSaka962lpHv/vEvSLUM9v/Zb1E7kizUAQFIFoeAw8lz/oxii5+qIWMViXBp9ppmuG2QREPnIPqpGmoeY+6998dxK1CTG8yoSQ6BkZkl6OtBDzDx1DRFKCXoOZNCWIdOSa89ZylBsxnWZhIc1MJRA9R2d3rWa5pPUoI5FLVqDzNPJp5vlWNczTNPNh7Uc78i8Ym X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(396003)(136003)(376002)(346002)(39860400002)(46966006)(36840700001)(4326008)(7696005)(186003)(36860700001)(83380400001)(316002)(54906003)(81166007)(44832011)(356005)(2616005)(36756003)(82740400003)(6916009)(478600001)(70586007)(1076003)(426003)(5660300002)(70206006)(26005)(6666004)(336012)(8936002)(2906002)(82310400003)(8676002)(47076005)(86362001)(36900700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1904 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT023.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 85dc1f2c-6d49-4268-f686-08d8cf404d75 X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Feb 2021 10:24:03.0095 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 66625b05-b0fc-45f8-d659-08d8cf4051d4 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT023.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB5293 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: rJziUbWeXVt4Otd1rGvNlaZax1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1613125448; bh=rHlj6zkOTIXCjK3102BqnwKyxSZPslTvRxFWyr7zb+k=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=ia8AKtsxZdoQ8dzlNyqt/7RKStlKYngAWxSh+qb2sW5yk28GdY8F8/eyCrAlulOKN3D boljrT6Ef1FgkwAJ1ZMeQDZ6cg7WerJeV13KhhelGzysv87yBDJRUQ/qhrkmFYrTNfJjo 0xdvSKVpWwGeywwmvLvXJeq8TS3W2VH9lVU= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Introduce helper macro REFERENCE_TOKEN() to map reference tokens. Signed-off-by: Sami Mujawar Reviewed-by: Ard Biesheuvel --- Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/Conf= igurationManager.c | 3 +-- Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/Conf= igurationManager.h | 6 ++++++ 2 files changed, 7 insertions(+), 2 deletions(-) diff --git a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationMan= agerDxe/ConfigurationManager.c b/Platform/ARM/VExpressPkg/ConfigurationMana= ger/ConfigurationManagerDxe/ConfigurationManager.c index 3298f9f9f79a2b23f181d3e961298f1c366976ee..49aa16184a2da587471239a7c90= ed864f963896c 100644 --- a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /ConfigurationManager.c +++ b/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /ConfigurationManager.c @@ -150,8 +150,7 @@ EDKII_PLATFORM_REPOSITORY_INFO VExpressPlatRepositoryIn= fo =3D { // The number of timer frames implemented in the GT Block FVP_TIMER_FRAMES_COUNT, // Reference token for the GT Block timer frame list - (CM_OBJECT_TOKEN)((UINT8*)&VExpressPlatRepositoryInfo + - OFFSET_OF (EDKII_PLATFORM_REPOSITORY_INFO, GTBlock0TimerInfo)) + REFERENCE_TOKEN (GTBlock0TimerInfo) } }, =20 diff --git a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationMan= agerDxe/ConfigurationManager.h b/Platform/ARM/VExpressPkg/ConfigurationMana= ger/ConfigurationManagerDxe/ConfigurationManager.h index c25ba9fac52fe049236948185dfc052c44a71e4b..c21f160dd082bddb9e8e1ab6661= 43887d67869cd 100644 --- a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /ConfigurationManager.h +++ b/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /ConfigurationManager.h @@ -71,6 +71,12 @@ typedef EFI_STATUS (*CM_OBJECT_HANDLER_PROC) ( IN OUT CM_OBJ_DESCRIPTOR * CONST CmObject ); =20 +/** A helper macro for mapping a reference token. +*/ +#define REFERENCE_TOKEN(Field) \ + (CM_OBJECT_TOKEN)((UINT8*)&VExpressPlatRepositoryInfo + \ + OFFSET_OF (EDKII_PLATFORM_REPOSITORY_INFO, Field)) + /** The number of CPUs */ #define PLAT_CPU_COUNT 8 --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#71631): https://edk2.groups.io/g/devel/message/71631 Mute This Topic: https://groups.io/mt/80580207/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sun May 5 10:36:37 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+71641+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1613125588596166.09109033146933; Fri, 12 Feb 2021 02:26:28 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id vOBGYY1788612x1gFJF9oysq; Fri, 12 Feb 2021 02:26:28 -0800 X-Received: from EUR01-HE1-obe.outbound.protection.outlook.com (EUR01-HE1-obe.outbound.protection.outlook.com [40.107.13.77]) by mx.groups.io with SMTP id smtpd.web12.2014.1613125582238480723 for ; Fri, 12 Feb 2021 02:26:22 -0800 X-Received: from AM6PR08CA0013.eurprd08.prod.outlook.com (2603:10a6:20b:b2::25) by AM5PR0802MB2483.eurprd08.prod.outlook.com (2603:10a6:203:9b::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.31; Fri, 12 Feb 2021 10:26:14 +0000 X-Received: from VE1EUR03FT021.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:b2:cafe::dc) by AM6PR08CA0013.outlook.office365.com (2603:10a6:20b:b2::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.26 via Frontend Transport; Fri, 12 Feb 2021 10:26:14 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+71641+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT021.mail.protection.outlook.com (10.152.18.117) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:26:13 +0000 X-Received: ("Tessian outbound 587c3d093005:v71"); Fri, 12 Feb 2021 10:26:13 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 340d7aaeea1fef7f X-CR-MTA-TID: 64aa7808 X-Received: from 48956fc437de.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 6BC13822-0EF4-4479-B612-D05D69D4265C.1; Fri, 12 Feb 2021 10:26:07 +0000 X-Received: from EUR04-DB3-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 48956fc437de.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 12 Feb 2021 10:26:07 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BbdjD7nO74Oym2Esvwl2Cpk2cFbWpj7E3t7gOz08mJocFa7pLr3YkpqiLQ+xRuVyv/ltNDPwizyElxo9OK5EKdnUKXtnvoq3SM+axIF7NOvT277zbXvStH6IfrdEahrON79Mkg4BmesITj9X140G/SsEKuVpZ8rbbfOaj1kCpYGfX6oZPIoDh/wk759uqvbIThryBZK4gQr69S/Rmd8xGXYQjtj1lto3S8RbwNDo50OebGRix4mt3qd8ivBfRzlVK7cpZrjj2byfaPvKU5HgaQrhDQOtqaBi/jvb/LlbZFe2zJdEjCcCvyRdjtZuqQfN0TzKvTn6iNNk+JZpMOM0dQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EW8wvJHgPt2mXdrfXAqAtZ3ESmq9xvhpVV2PGIC9lxE=; b=kNm7uN34eVnxPXfu01mGv+bHds++/YPleXZYhXfbsaZvt8AbCqROk38YcAsNg5TFOfWICeI4pVQwbNRy4t1UC/Z68N44jiLZkkaHPSfy0X6Awy+rykC/5ZFAvi+GIZ1UNJFUlyhbDpZ0UrdE5pHMKUEArUegdRsrNUTNrOf0OmZt0THrA7Vo8cuai5IyboY2ZMwG+Evc/KEM60QzBxtzq7sc17gzPnKTP3RPr3W+fL6vD9IM2hA3IyShRvzeNKMoY3uBF+NcsESaPzzCvnnedMKT8BkxhutDuqaWwQ4AJZHvprsphVoIqSscFG1ICBEp08x0HZTvEAR6itrK2toTFA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from DB6PR0601CA0005.eurprd06.prod.outlook.com (2603:10a6:4:7b::15) by DB8PR08MB3980.eurprd08.prod.outlook.com (2603:10a6:10:b1::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27; Fri, 12 Feb 2021 10:23:56 +0000 X-Received: from DB5EUR03FT037.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:7b:cafe::e6) by DB6PR0601CA0005.outlook.office365.com (2603:10a6:4:7b::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27 via Frontend Transport; Fri, 12 Feb 2021 10:23:56 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT037.mail.protection.outlook.com (10.152.20.215) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:56 +0000 X-Received: from AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.2044.4; Fri, 12 Feb 2021 10:23:48 +0000 X-Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1779.2; Fri, 12 Feb 2021 10:23:46 +0000 X-Received: from E107187.Arm.com (10.57.49.120) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Fri, 12 Feb 2021 10:23:46 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , Subject: [edk2-devel] [PATCH edk2-platforms v1 06/12] Platform/ARM/VExpressPkg: ACPI support for FVP RevC model Date: Fri, 12 Feb 2021 10:23:35 +0000 Message-ID: <20210212102341.24056-7-sami.mujawar@arm.com> In-Reply-To: <20210212102341.24056-1-sami.mujawar@arm.com> References: <20210212102341.24056-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: eacc485f-c295-4320-c6f5-08d8cf409fd3 X-MS-TrafficTypeDiagnostic: DB8PR08MB3980:|AM5PR0802MB2483: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:9508;OLM:9508; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(36840700001)(46966006)(7696005)(82310400003)(6666004)(83380400001)(336012)(36756003)(356005)(19627235002)(47076005)(70586007)(5660300002)(81166007)(498600001)(86362001)(36860700001)(8936002)(426003)(44832011)(2616005)(26005)(8676002)(30864003)(2906002)(1076003)(186003)(70206006)(54906003)(4326008)(6916009)(36900700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB3980 X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT021.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 8a65bb8b-e74a-4575-5942-08d8cf404df1 X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Feb 2021 10:26:13.7529 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: eacc485f-c295-4320-c6f5-08d8cf409fd3 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: VE1EUR03FT021.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0802MB2483 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: s3pImi9K0jmxGTJTQRyWWCrbx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1613125588; bh=vRLQHCgOqKyBMCWI+t45w5kFkevBNX6NB2sDvZAyFsQ=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=GSDTyudiIHaajWcszu/RAzpCcqBIikeZ9udkCVFN4paNAdWzFcmkPkhgNN+gfXaxtc8 ZGaZXAUvx7YaGKPh34g/6LdZGvk8xH5LAxDE/e7b4Mcr7vWi52OchWdA3g/RbSBEfVnwl 0gQBOI8YPgWTB6c++9D9MPH0nyyH/3AFamA= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Type: text/plain; charset="utf-8" Base Platform RevC is a configuration of the Base Platform that includes a PCIe subsystem and a SMMUv3. It also has an AHCI-SATA disk controller as a device on the PCIe bus. To enable an OS to use these features add the following ACPI tables: - IORT - MCFG - SSDT PCIe Also add checks such that these additional tables are only installed if the FVP model is RevC. This allows a unified firmware for use with both the FVP_Base_AEMv8A-AEMv8A model and the FVP_Base_RevC-2xAEMv8A model. Note: The CPU affinities are shifted in the FVP_Base_RevC-2xAEMv8A model and this is adjusted in InitializePlatformRepository(). Signed-off-by: Sami Mujawar Reviewed-by: Ard Biesheuvel --- Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/AslT= ables/SsdtPci.asl | 204 ++++++++++++ Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/Conf= igurationManager.c | 349 +++++++++++++++++++- Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/Conf= igurationManager.h | 30 +- Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/Conf= igurationManagerDxe.inf | 10 +- 4 files changed, 588 insertions(+), 5 deletions(-) diff --git a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationMan= agerDxe/AslTables/SsdtPci.asl b/Platform/ARM/VExpressPkg/ConfigurationManag= er/ConfigurationManagerDxe/AslTables/SsdtPci.asl new file mode 100644 index 0000000000000000000000000000000000000000..e4b5a02cc9571743c4a0300a065= 7f090ae996326 --- /dev/null +++ b/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /AslTables/SsdtPci.asl @@ -0,0 +1,204 @@ +/** @file + SSDT for FVP PCIe + + Copyright (c) 2017 - 2021, Arm Ltd. All rights reserved.
+ + SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#include "ArmPlatform.h" + +/* + See ACPI 6.1 Section 6.2.13 + + There are two ways that _PRT can be used. + + In the first model, a PCI Link device is used to provide additional + configuration information such as whether the interrupt is Level or + Edge triggered, it is active High or Low, Shared or Exclusive, etc. + + In the second model, the PCI interrupts are hardwired to specific + interrupt inputs on the interrupt controller and are not + configurable. In this case, the Source field in _PRT does not + reference a device, but instead contains the value zero, and the + Source Index field contains the global system interrupt to which the + PCI interrupt is hardwired. + + We use the first model with link indirection to set the correct + interrupt type as PCI defaults (Level Triggered, Active Low) are not + compatible with GICv2. +*/ +#define LNK_DEVICE(Unique_Id, Link_Name, irq) \ + Device (Link_Name) { \ + Name (_HID, EISAID("PNP0C0F")) \ + Name (_UID, Unique_Id) \ + Name (_PRS, ResourceTemplate() { \ + Interrupt (ResourceProducer, Level, ActiveHigh, Exclusive) { irq } \ + }) \ + Method (_CRS, 0) { Return (_PRS) } \ + Method (_SRS, 1) { } \ + Method (_DIS) { } \ +} + +#define PRT_ENTRY(Address, Pin, Link) = \ + Package (4) { = \ + Address, /* uses the same format as _ADR */ = \ + Pin, /* The PCI pin number of the device (0-INTA, 1-INTB, 2-INTC,= 3-INTD) */ \ + Link, /* Interrupt allocated via Link device */ = \ + Zero /* global system interrupt number (no used) */ = \ +} + +/* + See Reference [1] 6.1.1 + "High word=EF=BF=BDDevice #, Low word=EF=BF=BDFunction #. (for example, = device 3, + function 2 is 0x00030002). To refer to all the functions on a device #, + use a function number of FFFF)." +*/ +#define ROOT_PRT_ENTRY(Pin, Link) PRT_ENTRY (0x0000FFFF, Pin, Link) // = Device 0 for Bridge. + +DefinitionBlock ("SsdtPci.aml", "SSDT", 2, "ARMLTD", "FVP-REVC", 1) { + Scope(_SB) { + // + // PCI Root Complex + // + LNK_DEVICE (1, LNKA, 168) + LNK_DEVICE (2, LNKB, 169) + LNK_DEVICE (3, LNKC, 170) + LNK_DEVICE (4, LNKD, 171) + + Device(PCI0) + { + Name (_HID, EISAID ("PNP0A08")) // PCI Express Root Bridge + Name (_CID, EISAID ("PNP0A03")) // Compatible PCI Root Bridge + Name (_SEG, Zero) // PCI Segment Group number + Name (_BBN, Zero) // PCI Base Bus Number + Name (_CCA, 1) // Initially mark the PCI coherent + + // Root Complex 0 + Device (RP0) { + Name (_ADR, 0xF0000000) // Dev 0, Func 0 + } + + // PCI Routing Table + Name (_PRT, Package () { + ROOT_PRT_ENTRY (0, LNKA), // INTA + ROOT_PRT_ENTRY (1, LNKB), // INTB + ROOT_PRT_ENTRY (2, LNKC), // INTC + ROOT_PRT_ENTRY (3, LNKD), // INTD + }) + // Root complex resources + Method (_CRS, 0, Serialized) { + Name (RBUF, ResourceTemplate () { + WordBusNumber ( // Bus numbers assigned to this root + ResourceProducer, + MinFixed, MaxFixed, PosDecode, + 0, // AddressGranularity + 0, // AddressMinimum - Minimum Bus Number + 255, // AddressMaximum - Maximum Bus Number + 0, // AddressTranslation - Set to 0 + 256 // RangeLength - Number of Busses + ) + + DWordMemory ( // 32-bit BAR Windows + ResourceProducer, + PosDecode, + MinFixed, + MaxFixed, + Cacheable, + ReadWrite, + 0x00000000, // Granularity + 0x50000000, // Min Base Address + 0x57FFFFFF, // Max Base Address + 0x00000000, // Translate + 0x08000000 // Length + ) + + QWordMemory ( // 64-bit BAR Windows + ResourceProducer, + PosDecode, + MinFixed, + MaxFixed, + Cacheable, + ReadWrite, + 0x00000000, // Granularity + 0x4000000000, // Min Base Address + 0x40FFFFFFFF, // Max Base Address + 0x00000000, // Translate + 0x100000000 // Length + ) + + DWordIo ( // IO window + ResourceProducer, + MinFixed, + MaxFixed, + PosDecode, + EntireRange, + 0x00000000, // Granularity + 0x00000000, // Min Base Address + 0x007fffff, // Max Base Address + 0x5f800000, // Translate + 0x00800000, // Length + , + , + , + TypeTranslation + ) + }) // Name (RBUF) + + Return (RBUF) + } // Method(_CRS) + + // + // OS Control Handoff + // + Name (SUPP, Zero) // PCI _OSC Support Field value + Name (CTRL, Zero) // PCI _OSC Control Field value + + /* + See [1] 6.2.10, [2] 4.5 + */ + Method (_OSC,4) { + // Check for proper UUID + If(LEqual (Arg0,ToUUID ("33DB4D5B-1FF7-401C-9657-7441C03DD766"))) { + // Create DWord-adressable fields from the Capabilities Buffer + CreateDWordField (Arg3, 0, CDW1) + CreateDWordField (Arg3, 4, CDW2) + CreateDWordField (Arg3, 8, CDW3) + + // Save Capabilities DWord2 & 3 + Store (CDW2, SUPP) + Store (CDW3, CTRL) + + // Only allow native hot plug control if OS supports: + // * ASPM + // * Clock PM + // * MSI/MSI-X + If(LNotEqual (And (SUPP, 0x16), 0x16)) { + And (CTRL, 0x1E, CTRL) // Mask bit 0 (and undefined bits) + } + + // Always allow native PME, AER (no dependencies) + + // Never allow SHPC (no SHPC controller in this system) + And (CTRL, 0x1D, CTRL) + + If(LNotEqual (Arg1, One)) { // Unknown revision + Or (CDW1, 0x08, CDW1) + } + + If(LNotEqual (CDW3, CTRL)) { // Capabilities bits were masked + Or (CDW1, 0x10, CDW1) + } + + // Update DWORD3 in the buffer + Store (CTRL,CDW3) + Return (Arg3) + } Else { + Or (CDW1, 4, CDW1) // Unrecognized UUID + Return (Arg3) + } + } // End _OSC + } // PCI0 + } +} diff --git a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationMan= agerDxe/ConfigurationManager.c b/Platform/ARM/VExpressPkg/ConfigurationMana= ger/ConfigurationManagerDxe/ConfigurationManager.c index 49aa16184a2da587471239a7c90ed864f963896c..273ae35ffcdae2fbe1214676a10= f6a3ca04e4242 100644 --- a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /ConfigurationManager.c +++ b/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /ConfigurationManager.c @@ -12,6 +12,8 @@ =20 #include #include +#include +#include #include #include #include @@ -74,7 +76,30 @@ EDKII_PLATFORM_REPOSITORY_INFO VExpressPlatRepositoryInf= o =3D { EFI_ACPI_DBG2_DEBUG_DEVICE_INFORMATION_STRUCT_REVISION, CREATE_STD_ACPI_TABLE_GEN_ID (EStdAcpiTableIdDbg2), NULL - } + }, + + // Note: The last 3 tables in this list are for FVP RevC only. + // IORT Table - FVP RevC + { + EFI_ACPI_6_2_IO_REMAPPING_TABLE_SIGNATURE, + EFI_ACPI_IO_REMAPPING_TABLE_REVISION, + CREATE_STD_ACPI_TABLE_GEN_ID (EStdAcpiTableIdIort), + NULL + }, + // PCI MCFG Table - FVP RevC + { + EFI_ACPI_6_2_PCI_EXPRESS_MEMORY_MAPPED_CONFIGURATION_SPACE_BASE_ADDR= ESS_DESCRIPTION_TABLE_SIGNATURE, + EFI_ACPI_MEMORY_MAPPED_CONFIGURATION_SPACE_ACCESS_TABLE_REVISION, + CREATE_STD_ACPI_TABLE_GEN_ID (EStdAcpiTableIdMcfg), + NULL + }, + // SSDT table describing the PCI root complex - FVP RevC + { + EFI_ACPI_6_2_SECONDARY_SYSTEM_DESCRIPTION_TABLE_SIGNATURE, + 0, // Unused + CREATE_STD_ACPI_TABLE_GEN_ID (EStdAcpiTableIdSsdt), + (EFI_ACPI_DESCRIPTION_HEADER*)ssdtpci_aml_code + }, }, =20 // Boot architecture information @@ -90,6 +115,8 @@ EDKII_PLATFORM_REPOSITORY_INFO VExpressPlatRepositoryInf= o =3D { =20 /* GIC CPU Interface information GIC_ENTRY (CPUInterfaceNumber, Mpidr, PmuIrq, VGicIrq, EnergyEfficien= cy) + Note: The MPIDR is fixed up in InitializePlatformRepository() if the + platform is FVP RevC. */ { GICC_ENTRY (0, GET_MPID (0, 0), 92, 25, 0), @@ -215,7 +242,121 @@ EDKII_PLATFORM_REPOSITORY_INFO VExpressPlatRepository= Info =3D { 0, // The physical address for the Interrupt Translation Service 0x2f020000 - } + }, + + // SMMUv3 Node + { + // Reference token for this Iort node + REFERENCE_TOKEN (SmmuV3Info), + // Number of ID mappings + 1, + // Reference token for the ID mapping array + REFERENCE_TOKEN (DeviceIdMapping[0]), + + // SMMU Base Address + FVP_REVC_SMMUV3_BASE, + // SMMU flags + EFI_ACPI_IORT_SMMUv3_FLAG_COHAC_OVERRIDE, + // VATOS address + 0, + // Model + EFI_ACPI_IORT_SMMUv3_MODEL_GENERIC, + // GSIV of the Event interrupt if SPI based + 0x6A, + // PRI Interrupt if SPI based + 0x6B, + // GERR interrupt if GSIV based + 0x6F, + // Sync interrupt if GSIV based + 0x6D, + + // Proximity domain flag, ignored in this case + 0, + // Index into the array of ID mapping, ignored as SMMU + // control interrupts are GSIV based + 0 + }, + + // ITS group node + { + // Reference token for this Iort node + REFERENCE_TOKEN (ItsGroupInfo), + // The number of ITS identifiers in the ITS node. + 1, + // Reference token for the ITS identifier array + REFERENCE_TOKEN (ItsIdentifierArray) + }, + // ITS identifier array + { + { + // The ITS Identifier + 0 + } + }, + + // Root Complex node info + { + // Reference token for this Iort node + REFERENCE_TOKEN (RootComplexInfo), + // Number of ID mappings + 1, + // Reference token for the ID mapping array + REFERENCE_TOKEN (DeviceIdMapping[1]), + + // Memory access properties : Cache coherent attributes + EFI_ACPI_IORT_MEM_ACCESS_PROP_CCA, + // Memory access properties : Allocation hints + 0, + // Memory access properties : Memory access flags + 0, + // ATS attributes + EFI_ACPI_IORT_ROOT_COMPLEX_ATS_UNSUPPORTED, + // PCI segment number + 0 + }, + + // Array of Device ID mappings + { + /* Mapping When SMMUv3 is defined + RootComplex -> SMMUv3 -> ITS Group + */ + + // SMMUv3 device ID mapping + { + // Input base + 0x0, + // Number of input IDs + 0x0000FFFF, + // Output Base + 0x0, + // Output reference + REFERENCE_TOKEN (ItsGroupInfo), + // Flags + 0 + }, + // Device ID mapping for Root complex node + { + // Input base + 0x0, + // Number of input IDs + 0x0000FFFF, + // Output Base + 0x0, + // Output reference token for the IORT node + REFERENCE_TOKEN (SmmuV3Info), + // Flags + 0 + } + }, + + // PCI Configuration Space Info + { + FixedPcdGet64 (PcdPciExpressBaseAddress), + // PciSegmentGroupNumber + 0, + FixedPcdGet32 (PcdPciBusMin), + FixedPcdGet32 (PcdPciBusMax) + }, }; =20 /** A helper function for returning the Configuration Manager Objects. @@ -324,6 +465,24 @@ InitializePlatformRepository ( IN CONST EDKII_CONFIGURATION_MANAGER_PROTOCOL * CONST This ) { + EDKII_PLATFORM_REPOSITORY_INFO * PlatformRepo; + + PlatformRepo =3D This->PlatRepoInfo; + + PlatformRepo->SysId =3D MmioRead32 (ARM_VE_SYS_ID_REG); + if ((PlatformRepo->SysId & ARM_FVP_SYS_ID_REV_MASK) =3D=3D + ARM_FVP_BASE_REVC_REV) { + // REVC affinity is shifted, update the MPIDR + PlatformRepo->GicCInfo[0].MPIDR =3D GET_MPID_MT (0, 0, 0); + PlatformRepo->GicCInfo[1].MPIDR =3D GET_MPID_MT (0, 1, 0); + PlatformRepo->GicCInfo[2].MPIDR =3D GET_MPID_MT (0, 2, 0); + PlatformRepo->GicCInfo[3].MPIDR =3D GET_MPID_MT (0, 3, 0); + + PlatformRepo->GicCInfo[4].MPIDR =3D GET_MPID_MT (1, 0, 0); + PlatformRepo->GicCInfo[5].MPIDR =3D GET_MPID_MT (1, 1, 0); + PlatformRepo->GicCInfo[6].MPIDR =3D GET_MPID_MT (1, 2, 0); + PlatformRepo->GicCInfo[7].MPIDR =3D GET_MPID_MT (1, 3, 0); + } return EFI_SUCCESS; } =20 @@ -370,6 +529,91 @@ GetGTBlockTimerFrameInfo ( return EFI_SUCCESS; } =20 +/** Return an ITS identifier array. + + @param [in] This Pointer to the Configuration Manager Protocol. + @param [in] CmObjectId The Configuration Manager Object ID. + @param [in] Token A token for identifying the object + @param [out] CmObject Pointer to the Configuration Manager Object + descriptor describing the requested Object. + + @retval EFI_SUCCESS Success. + @retval EFI_INVALID_PARAMETER A parameter is invalid. + @retval EFI_NOT_FOUND The required object information is not fou= nd. +*/ +EFI_STATUS +EFIAPI +GetItsIdentifierArray ( + IN CONST EDKII_CONFIGURATION_MANAGER_PROTOCOL * CONST This, + IN CONST CM_OBJECT_ID CmObjectId, + IN CONST CM_OBJECT_TOKEN Token, + IN OUT CM_OBJ_DESCRIPTOR * CONST CmObject + ) +{ + EDKII_PLATFORM_REPOSITORY_INFO * PlatformRepo; + + if ((This =3D=3D NULL) || (CmObject =3D=3D NULL)) { + ASSERT (This !=3D NULL); + ASSERT (CmObject !=3D NULL); + return EFI_INVALID_PARAMETER; + } + + PlatformRepo =3D This->PlatRepoInfo; + + if (Token !=3D (CM_OBJECT_TOKEN)&PlatformRepo->ItsIdentifierArray) { + return EFI_NOT_FOUND; + } + + CmObject->ObjectId =3D CmObjectId; + CmObject->Size =3D sizeof (PlatformRepo->ItsIdentifierArray); + CmObject->Data =3D (VOID*)&PlatformRepo->ItsIdentifierArray; + CmObject->Count =3D ARRAY_SIZE (PlatformRepo->ItsIdentifierArray); + return EFI_SUCCESS; +} + +/** Return a device Id mapping array. + + @param [in] This Pointer to the Configuration Manager Protocol. + @param [in] CmObjectId The Configuration Manager Object ID. + @param [in] Token A token for identifying the object + @param [out] CmObject Pointer to the Configuration Manager Object + descriptor describing the requested Object. + + @retval EFI_SUCCESS Success. + @retval EFI_INVALID_PARAMETER A parameter is invalid. + @retval EFI_NOT_FOUND The required object information is not fou= nd. +*/ +EFI_STATUS +EFIAPI +GetDeviceIdMappingArray ( + IN CONST EDKII_CONFIGURATION_MANAGER_PROTOCOL * CONST This, + IN CONST CM_OBJECT_ID CmObjectId, + IN CONST CM_OBJECT_TOKEN Token, + IN OUT CM_OBJ_DESCRIPTOR * CONST CmObject + ) +{ + EDKII_PLATFORM_REPOSITORY_INFO * PlatformRepo; + + if ((This =3D=3D NULL) || (CmObject =3D=3D NULL)) { + ASSERT (This !=3D NULL); + ASSERT (CmObject !=3D NULL); + return EFI_INVALID_PARAMETER; + } + + PlatformRepo =3D This->PlatRepoInfo; + + if ((Token !=3D (CM_OBJECT_TOKEN)&PlatformRepo->DeviceIdMapping[0]) && + (Token !=3D (CM_OBJECT_TOKEN)&PlatformRepo->DeviceIdMapping[1])) { + return EFI_NOT_FOUND; + } + + CmObject->ObjectId =3D CmObjectId; + CmObject->Size =3D sizeof (CM_ARM_ID_MAPPING); + CmObject->Data =3D (VOID*)Token; + CmObject->Count =3D 1; + return EFI_SUCCESS; +} + /** Return a standard namespace object. =20 @param [in] This Pointer to the Configuration Manager Protoc= ol. @@ -394,7 +638,9 @@ GetStandardNameSpaceObject ( { EFI_STATUS Status; EDKII_PLATFORM_REPOSITORY_INFO * PlatformRepo; + UINTN AcpiTableCount; =20 + Status =3D EFI_SUCCESS; if ((This =3D=3D NULL) || (CmObject =3D=3D NULL)) { ASSERT (This !=3D NULL); ASSERT (CmObject !=3D NULL); @@ -402,8 +648,16 @@ GetStandardNameSpaceObject ( } =20 Status =3D EFI_NOT_FOUND; + AcpiTableCount =3D ARRAY_SIZE (PlatformRepo->CmAcpiTableList); PlatformRepo =3D This->PlatRepoInfo; =20 + if ((PlatformRepo->SysId & ARM_FVP_SYS_ID_REV_MASK) !=3D + ARM_FVP_BASE_REVC_REV) { + // The last 3 tables in the ACPI table list are for FVP RevC + // Reduce the count by 3 if the platform is not FVP RevC + AcpiTableCount -=3D 3; + } + switch (GET_CM_OBJECT_ID (CmObjectId)) { case EStdObjCfgMgrInfo: Status =3D HandleCmObject ( @@ -420,7 +674,7 @@ GetStandardNameSpaceObject ( CmObjectId, &PlatformRepo->CmAcpiTableList, sizeof (PlatformRepo->CmAcpiTableList), - ARRAY_SIZE (PlatformRepo->CmAcpiTableList), + AcpiTableCount, CmObject ); break; @@ -464,6 +718,12 @@ GetArmNameSpaceObject ( { EFI_STATUS Status; EDKII_PLATFORM_REPOSITORY_INFO * PlatformRepo; + UINTN Smmuv3Count; + UINTN ItsGroupCount; + UINTN ItsIdentifierArrayCount; + UINTN RootComplexCount; + UINTN DeviceIdMappingArrayCount; + UINTN PciConfigSpaceCount; =20 if ((This =3D=3D NULL) || (CmObject =3D=3D NULL)) { ASSERT (This !=3D NULL); @@ -474,6 +734,23 @@ GetArmNameSpaceObject ( Status =3D EFI_NOT_FOUND; PlatformRepo =3D This->PlatRepoInfo; =20 + if ((PlatformRepo->SysId & ARM_FVP_SYS_ID_REV_MASK) =3D=3D + ARM_FVP_BASE_REVC_REV) { + Smmuv3Count =3D 1; + ItsGroupCount =3D 1; + ItsIdentifierArrayCount =3D ARRAY_SIZE (PlatformRepo->ItsIdentifierArr= ay); + RootComplexCount =3D 1; + DeviceIdMappingArrayCount =3D ARRAY_SIZE (PlatformRepo->DeviceIdMappin= g); + PciConfigSpaceCount =3D 1; + } else { + Smmuv3Count =3D 0; + ItsGroupCount =3D 0; + ItsIdentifierArrayCount =3D 0; + RootComplexCount =3D 0; + DeviceIdMappingArrayCount =3D 0; + PciConfigSpaceCount =3D 0; + } + switch (GET_CM_OBJECT_ID (CmObjectId)) { case EArmObjBootArchInfo: Status =3D HandleCmObject ( @@ -609,6 +886,72 @@ GetArmNameSpaceObject ( ); break; =20 + case EArmObjSmmuV3: + Status =3D HandleCmObject ( + CmObjectId, + &PlatformRepo->SmmuV3Info, + sizeof (PlatformRepo->SmmuV3Info), + Smmuv3Count, + CmObject + ); + break; + + case EArmObjItsGroup: + Status =3D HandleCmObject ( + CmObjectId, + &PlatformRepo->ItsGroupInfo, + sizeof (PlatformRepo->ItsGroupInfo), + ItsGroupCount, + CmObject + ); + break; + + case EArmObjGicItsIdentifierArray: + Status =3D HandleCmObjectRefByToken ( + This, + CmObjectId, + PlatformRepo->ItsIdentifierArray, + sizeof (PlatformRepo->ItsIdentifierArray), + ItsIdentifierArrayCount, + Token, + GetItsIdentifierArray, + CmObject + ); + break; + + case EArmObjRootComplex: + Status =3D HandleCmObject ( + CmObjectId, + &PlatformRepo->RootComplexInfo, + sizeof (PlatformRepo->RootComplexInfo), + 1, + CmObject + ); + break; + + case EArmObjIdMappingArray: + Status =3D HandleCmObjectRefByToken ( + This, + CmObjectId, + PlatformRepo->DeviceIdMapping, + sizeof (PlatformRepo->DeviceIdMapping), + ARRAY_SIZE (PlatformRepo->DeviceIdMapping), + Token, + GetDeviceIdMappingArray, + CmObject + ); + break; + + case EArmObjPciConfigSpaceInfo: + Status =3D HandleCmObject ( + CmObjectId, + &PlatformRepo->PciConfigInfo, + sizeof (PlatformRepo->PciConfigInfo), + PciConfigSpaceCount, + CmObject + ); + break; + default: { Status =3D EFI_NOT_FOUND; DEBUG (( diff --git a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationMan= agerDxe/ConfigurationManager.h b/Platform/ARM/VExpressPkg/ConfigurationMana= ger/ConfigurationManagerDxe/ConfigurationManager.h index c21f160dd082bddb9e8e1ab666143887d67869cd..aebf0a355291df5df5f588e8b70= 76e21eda9a152 100644 --- a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /ConfigurationManager.h +++ b/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /ConfigurationManager.h @@ -17,6 +17,7 @@ containing the AML bytecode array. */ extern CHAR8 dsdt_aml_code[]; +extern CHAR8 ssdtpci_aml_code[]; =20 /** The configuration manager version. */ @@ -77,13 +78,18 @@ typedef EFI_STATUS (*CM_OBJECT_HANDLER_PROC) ( (CM_OBJECT_TOKEN)((UINT8*)&VExpressPlatRepositoryInfo + \ OFFSET_OF (EDKII_PLATFORM_REPOSITORY_INFO, Field)) =20 +/** Macro to return MPIDR for Multi Threaded Cores +*/ +#define GET_MPID_MT(Cluster, Core, Thread) \ + (((Cluster) << 16) | ((Core) << 8) | (Thread)) + /** The number of CPUs */ #define PLAT_CPU_COUNT 8 =20 /** The number of ACPI tables to install */ -#define PLAT_ACPI_TABLE_COUNT 6 +#define PLAT_ACPI_TABLE_COUNT 9 =20 /** The number of platform generic timer blocks */ @@ -145,6 +151,28 @@ typedef struct PlatformRepositoryInfo { =20 /// GIC ITS information CM_ARM_GIC_ITS_INFO GicItsInfo; + + // FVP RevC components + /// SMMUv3 node + CM_ARM_SMMUV3_NODE SmmuV3Info; + + /// ITS Group node + CM_ARM_ITS_GROUP_NODE ItsGroupInfo; + + /// ITS Identifier array + CM_ARM_ITS_IDENTIFIER ItsIdentifierArray[1]; + + /// PCI Root complex node + CM_ARM_ROOT_COMPLEX_NODE RootComplexInfo; + + /// Array of DeviceID mapping + CM_ARM_ID_MAPPING DeviceIdMapping[2]; + + /// PCI configuration space information + CM_ARM_PCI_CONFIG_SPACE_INFO PciConfigInfo; + + /// System ID + UINT32 SysId; } EDKII_PLATFORM_REPOSITORY_INFO; =20 #endif // CONFIGURATION_MANAGER_H__ diff --git a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationMan= agerDxe/ConfigurationManagerDxe.inf b/Platform/ARM/VExpressPkg/Configuratio= nManager/ConfigurationManagerDxe/ConfigurationManagerDxe.inf index c17595b7ec37cdd1c99b258cd32d1bde6c76a5ed..b53daf51d4b1afd45e41d0debb0= b9f084f135f6a 100644 --- a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /ConfigurationManagerDxe.inf +++ b/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /ConfigurationManagerDxe.inf @@ -1,7 +1,7 @@ ## @file # Configuration Manager Dxe # -# Copyright (c) 2017 - 2020, Arm Limited. All rights reserved.
+# Copyright (c) 2017 - 2021, Arm Limited. All rights reserved.
# # SPDX-License-Identifier: BSD-2-Clause-Patent ## @@ -23,6 +23,7 @@ [Defines] [Sources] ConfigurationManager.c AslTables/Dsdt.asl + AslTables/SsdtPci.asl =20 [Packages] ArmPkg/ArmPkg.dec @@ -68,6 +69,13 @@ [FixedPcd] gEfiMdeModulePkgTokenSpaceGuid.PcdSerialRegisterBase gEfiMdePkgTokenSpaceGuid.PcdUartDefaultBaudRate =20 + # PCI Root complex specific PCDs + gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress + gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseSize + + gArmTokenSpaceGuid.PcdPciBusMin + gArmTokenSpaceGuid.PcdPciBusMax + [Pcd] =20 [Depex] --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#71641): https://edk2.groups.io/g/devel/message/71641 Mute This Topic: https://groups.io/mt/80580226/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sun May 5 10:36:37 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+71632+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1613125449597549.5888633473124; Fri, 12 Feb 2021 02:24:09 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id v0nFYY1788612xD9NRdCd4wQ; Fri, 12 Feb 2021 02:24:09 -0800 X-Received: from EUR05-VI1-obe.outbound.protection.outlook.com (EUR05-VI1-obe.outbound.protection.outlook.com [40.107.21.61]) by mx.groups.io with SMTP id smtpd.web09.1980.1613125448291884284 for ; Fri, 12 Feb 2021 02:24:08 -0800 X-Received: from AM6PR10CA0107.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:209:8c::48) by AM6PR08MB3208.eurprd08.prod.outlook.com (2603:10a6:209:4b::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25; Fri, 12 Feb 2021 10:24:05 +0000 X-Received: from AM5EUR03FT056.eop-EUR03.prod.protection.outlook.com (2603:10a6:209:8c:cafe::3c) by AM6PR10CA0107.outlook.office365.com (2603:10a6:209:8c::48) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:05 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+71632+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT056.mail.protection.outlook.com (10.152.17.224) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:04 +0000 X-Received: ("Tessian outbound f362b81824dc:v71"); Fri, 12 Feb 2021 10:24:04 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: f376613d1b9935f3 X-CR-MTA-TID: 64aa7808 X-Received: from e4ed16f3ef22.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id C2757C3D-A722-40ED-A1C9-11B9574618E2.1; Fri, 12 Feb 2021 10:23:58 +0000 X-Received: from EUR02-VE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id e4ed16f3ef22.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 12 Feb 2021 10:23:58 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cc+3kBI3Yg4Qd2lU8RhRSm9hPDx2Xj3hK86njarSTDsHvtB3xfdqT7BRms6mnp+kP3+iY52eWQfIibWzahRnEDEuNwvdnKxy96i/Sppo+eKE8jGpCQWzSMThE8g5/H6Das6hWAD6TEC/YEN3bIf/m8lxFOZ3gefceLKmKYxIctRG5BLstjl7JAwDJ9oo97dFh7KnJBgB3xDXeD9ohjb9FoCAzD4LAa3f3bJFyjqcVqx0dpad1sMHrVhldncJrotmIhszBIy02bvMGT6f80QjhQZmhp+f4wBhpJ0XBxlYc4XQQPmM5zDYAvKr3Dd3p99iqsCOYvbttb+kzCdX3j2oag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DuLfsY9svjZhFeQh+/ZjzgD8NsryD8Fw+kSlbimawTc=; b=QeU1Owt2csnXFO9kHxOHUsYWGX12TD5JNXcGGSb6qg7WZbZzDWU9a1bn6oIJmk7vm4veWs/HsKfUNUSCpkVAGNhroXFmrZtpbMZj287S5+GlCxRypvdBTSGoUHEV4/cE4nZwupOOLGUICbE3ZvpKLHFRR6T/MKCRdvnf+YYGG3soyvvTalJr8umBi5kPQfkIIfN6+IDShRT3iWUs/0V+TRViJ3OSWy6uMWZ2/807cQUm+7WuQvqjxW4n0XjNoMjEfqKEWKiIiPP0qgieLvVqeiCmAyC6mt8d02M9jqBno7++Jrh4O8SHYAZnW1iVO+tGRS6hcvJwjrCeTX2zIqtf5Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from DU2PR04CA0144.eurprd04.prod.outlook.com (2603:10a6:10:231::29) by AS8PR08MB6053.eurprd08.prod.outlook.com (2603:10a6:20b:292::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.26; Fri, 12 Feb 2021 10:23:57 +0000 X-Received: from DB5EUR03FT064.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:231:cafe::86) by DU2PR04CA0144.outlook.office365.com (2603:10a6:10:231::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:57 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT064.mail.protection.outlook.com (10.152.21.199) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:56 +0000 X-Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2044.4; Fri, 12 Feb 2021 10:23:48 +0000 X-Received: from E107187.Arm.com (10.57.49.120) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Fri, 12 Feb 2021 10:23:47 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , Subject: [edk2-devel] [PATCH edk2-platforms v1 07/12] Platform/ARM/VExpressPkg: Add support for FVP RevC model Date: Fri, 12 Feb 2021 10:23:36 +0000 Message-ID: <20210212102341.24056-8-sami.mujawar@arm.com> In-Reply-To: <20210212102341.24056-1-sami.mujawar@arm.com> References: <20210212102341.24056-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 773b0e06-ddd8-4d7b-2561-08d8cf4052b4 X-MS-TrafficTypeDiagnostic: AS8PR08MB6053:|AM6PR08MB3208: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:8273;OLM:8273; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(39860400002)(136003)(376002)(396003)(346002)(36840700001)(46966006)(1076003)(70206006)(86362001)(54906003)(5660300002)(7696005)(316002)(70586007)(19627235002)(2906002)(4326008)(186003)(36860700001)(8676002)(82740400003)(44832011)(82310400003)(2616005)(478600001)(336012)(356005)(8936002)(83380400001)(36756003)(81166007)(47076005)(426003)(6666004)(26005)(6916009)(36900700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR08MB6053 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT056.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: c237f3d6-4108-4d7b-56e8-08d8cf404e2a X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Feb 2021 10:24:04.4729 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 773b0e06-ddd8-4d7b-2561-08d8cf4052b4 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT056.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3208 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: aALQFPtEezExaZz7SVzyNac9x1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1613125449; bh=gCh0N9S8smavWVG7+Ip7Q5WbS7zb2ztaUYxWqwGLznQ=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=qURTEbONw5f81LXhFwZWtsGtrLUcpzPdOI0HHQUskJOx7/wbRdTB9AWgoL0M0rcEQXc +U2tQehMAUa2Qf5Znavv4G6DA8M7BTQtG2n/dvM6EwW4ADUL8gWGymALU/idv4UF3NPJc LNCIkGHCgPsS30B/SAI9UXtBibfZoqN78Hc= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Base Platform RevC is a configuration of the Base Platform that includes a PCIe subsystem and a SMMUv3. It also has an AHCI-SATA disk controller as a device on the PCIe bus. Add firmware support for the FVP RevC model as it provides a standard boot environment using a SATA disk. Note: Checks have been added in appropriate places so that a common firmware can be used for both the FVP_Base_AEMv8A-AEMv8A model and the FVP_Base_RevC-2xAEMv8A model. However, this unified firmware is only available if the firmware is built using Dynamic Firmware Tables support. This feature can be enabled by building the firmware using the command line build option '-D DYNAMIC_TABLES_FRAMEWORK'. Signed-off-by: Sami Mujawar Reviewed-by: Ard Biesheuvel --- Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.dsc | 40 ++++++++++++++++= +++- Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.fdf | 20 +++++++++- 2 files changed, 58 insertions(+), 2 deletions(-) diff --git a/Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.dsc b/Platfor= m/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.dsc index f8c703c4b22b2a26028ba0562e0eae5948c3292d..d01e549f945f2593e6b62a58b20= 4737aff104a40 100644 --- a/Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.dsc +++ b/Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.dsc @@ -1,5 +1,5 @@ # -# Copyright (c) 2011-2021, ARM Limited. All rights reserved. +# Copyright (c) 2011-2021, Arm Limited. All rights reserved. # # SPDX-License-Identifier: BSD-2-Clause-Patent # @@ -65,6 +65,11 @@ [LibraryClasses.common.SEC] [LibraryClasses.common.UEFI_DRIVER, LibraryClasses.common.UEFI_APPLICATION= , LibraryClasses.common.DXE_RUNTIME_DRIVER, LibraryClasses.common.DXE_DRIVE= R] PcdLib|MdePkg/Library/DxePcdLib/DxePcdLib.inf =20 + PciExpressLib|MdePkg/Library/BasePciExpressLib/BasePciExpressLib.inf + PciHostBridgeLib|Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBrid= geLib/ArmVExpressPciHostBridgeLib.inf + PciLib|MdePkg/Library/BasePciLibPciExpress/BasePciLibPciExpress.inf + PciSegmentLib|MdePkg/Library/BasePciSegmentLibPci/BasePciSegmentLibPci.i= nf + [BuildOptions] GCC:*_*_AARCH64_PLATFORM_FLAGS =3D=3D -I$(WORKSPACE)/Platform/ARM/VExpre= ssPkg/Include/Platform/RTSM =20 @@ -161,6 +166,21 @@ [PcdsFixedAtBuild.common] gArmTokenSpaceGuid.PcdGicInterruptInterfaceBase|0x2C000000 =20 # + # PCI Root Complex + # + gArmTokenSpaceGuid.PcdPciBusMin|0 + gArmTokenSpaceGuid.PcdPciBusMax|255 + + gArmTokenSpaceGuid.PcdPciMmio32Base|0x50000000 + gArmTokenSpaceGuid.PcdPciMmio32Size|0x10000000 + + gArmTokenSpaceGuid.PcdPciMmio64Base|0x4000000000 + gArmTokenSpaceGuid.PcdPciMmio64Size|0x4000000000 + + gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress|0x40000000 + gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseSize|0x10000000 + + # # ARM Architectural Timer Frequency # # Set tick frequency value to 100Mhz @@ -331,3 +351,21 @@ [Components.common] # EmbeddedPkg/Drivers/DtPlatformDxe/DtPlatformDxe.inf !endif + + # + # PCI Support + # + ArmPkg/Drivers/ArmPciCpuIo2Dxe/ArmPciCpuIo2Dxe.inf + MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf + MdeModulePkg/Bus/Pci/PciHostBridgeDxe/PciHostBridgeDxe.inf + + # + # AHCI Support + # + MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf + MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf + + # + # SATA Controller + # + MdeModulePkg/Bus/Pci/SataControllerDxe/SataControllerDxe.inf diff --git a/Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.fdf b/Platfor= m/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.fdf index 513054dbcbc5fd301816400a0471f66673a5aefb..418566673981a9655fbc7a83494= 2443a2005c403 100644 --- a/Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.fdf +++ b/Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.fdf @@ -1,5 +1,5 @@ # -# Copyright (c) 2011 - 2018, ARM Limited. All rights reserved. +# Copyright (c) 2011 - 2021, Arm Limited. All rights reserved. # # SPDX-License-Identifier: BSD-2-Clause-Patent # @@ -171,6 +171,24 @@ [FV.FvMain] INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf INF MdeModulePkg/Application/UiApp/UiApp.inf =20 + + # + # PCI Support + # + INF ArmPkg/Drivers/ArmPciCpuIo2Dxe/ArmPciCpuIo2Dxe.inf + INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf + INF MdeModulePkg/Bus/Pci/PciHostBridgeDxe/PciHostBridgeDxe.inf + # + # AHCI Support + # + INF MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf + INF MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf + + # + # SATA Controller + # + INF MdeModulePkg/Bus/Pci/SataControllerDxe/SataControllerDxe.inf + # FV Filesystem INF MdeModulePkg/Universal/FvSimpleFileSystemDxe/FvSimpleFileSystemDxe.i= nf =20 --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#71632): https://edk2.groups.io/g/devel/message/71632 Mute This Topic: https://groups.io/mt/80580208/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sun May 5 10:36:37 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+71633+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1613125454998814.9085243511652; Fri, 12 Feb 2021 02:24:14 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id 7grSYY1788612xhgbmfCvL5x; Fri, 12 Feb 2021 02:24:14 -0800 X-Received: from EUR05-VI1-obe.outbound.protection.outlook.com (EUR05-VI1-obe.outbound.protection.outlook.com [40.107.21.57]) by mx.groups.io with SMTP id smtpd.web12.1997.1613125448739884264 for ; Fri, 12 Feb 2021 02:24:09 -0800 X-Received: from AM6P195CA0088.EURP195.PROD.OUTLOOK.COM (2603:10a6:209:86::29) by AM8PR08MB6610.eurprd08.prod.outlook.com (2603:10a6:20b:36a::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.29; Fri, 12 Feb 2021 10:24:06 +0000 X-Received: from AM5EUR03FT058.eop-EUR03.prod.protection.outlook.com (2603:10a6:209:86:cafe::3a) by AM6P195CA0088.outlook.office365.com (2603:10a6:209:86::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27 via Frontend Transport; Fri, 12 Feb 2021 10:24:06 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+71633+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT058.mail.protection.outlook.com (10.152.17.48) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:05 +0000 X-Received: ("Tessian outbound 28c96a6c9d2e:v71"); Fri, 12 Feb 2021 10:24:05 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 33253cbf2f57de36 X-CR-MTA-TID: 64aa7808 X-Received: from fb75f028e532.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 018573E1-0EE2-4DF3-BD3F-DB9CF1685D11.1; Fri, 12 Feb 2021 10:23:59 +0000 X-Received: from EUR04-DB3-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id fb75f028e532.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 12 Feb 2021 10:23:59 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SGmimXV7CUtPwCGCZzSv7crWcpiq0wVCZsSFDviqRNpzl7RZsZ1Oh+B/aabMVgXTgmAYvKwtkl/PBuXHN4XZHbex/AoNmBkWj+QQc84QypGNzfH4qD1jky9z2tJLDfBKo+BciwLwsLbk6OlA1vulsKihTZZa9z4JnK0onQP5tcoQhup6I6lhOogK79W6xZR2+2L3rXyfJRr+wg7IVglc7+LAW66wBRf8n+Jdh3cmxlKZHO05kgE+B6wdHOVtR0cf2ly1b6ti+i9b6G3jPYvFs/1YWSHCQXk0kBy819E3+wAlUT/AwGxE+enKW47tUaI4zMJX4BkReeCxq2iKn2k9bg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=yyJndVlv/ubEhp+ZFzp1lvnBlKHhyMT1yp4gLlw+Ix8=; b=PcnvS/eHImeIbo7+wqa4/p/R8lwbEnTGfeArs9+LYJ4n3oHvf/aF2C2w4bKKD/mh6/kYe/AP2mk9EuzZ2SyKnomrayLpaoRgArj0yEEv8O3esnhypmuMY2Gb91TSBpQ7vaksgZTTuMEB2ncYzP9K/xpnpanIWU64uP4lr/AudAJEcOxEJGg8JRNmixdGRUTg1TvC4Xc+V6SV4e+NUWKM5m76eEka35hXJf2ov9I4bvTBvDL21lDOjR36mNys3j6AqYtarP+kPoYEK1RMrqzI8R14c8uQr0hKlTJKLLz4OjGxOjZEyU8CGqTPwHYjIq4jTrY+j3DynWLj/gapJ5F20g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from DU2PR04CA0144.eurprd04.prod.outlook.com (2603:10a6:10:231::29) by AM0PR08MB4017.eurprd08.prod.outlook.com (2603:10a6:208:12a::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27; Fri, 12 Feb 2021 10:23:58 +0000 X-Received: from DB5EUR03FT064.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:231:cafe::86) by DU2PR04CA0144.outlook.office365.com (2603:10a6:10:231::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:58 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT064.mail.protection.outlook.com (10.152.21.199) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:58 +0000 X-Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2044.4; Fri, 12 Feb 2021 10:23:48 +0000 X-Received: from E107187.Arm.com (10.57.49.120) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Fri, 12 Feb 2021 10:23:48 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , Subject: [edk2-devel] [PATCH edk2-platforms v1 08/12] Platform/ARM/VExpressPkg: Update ACPI Revision to 6.3 Date: Fri, 12 Feb 2021 10:23:37 +0000 Message-ID: <20210212102341.24056-9-sami.mujawar@arm.com> In-Reply-To: <20210212102341.24056-1-sami.mujawar@arm.com> References: <20210212102341.24056-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 38390c3a-17df-4f18-0778-08d8cf40535d X-MS-TrafficTypeDiagnostic: AM0PR08MB4017:|AM8PR08MB6610: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:7691;OLM:7691; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 7xrBG2ZMykyw2c4QvPukXQy1KRjwN/MZjRfZAqgdkLwZM66x+LKJgFlHTtygXZC5Pss4pC5Ye8qi9T5//9LUxMj+4oc1ZRK2eyuPPTjQbcztEVOg6avPcSw1jXHrzStQXq1MlhAldMSQ9BOlZMytxl9BtbEnqGkJgSWONOTSeVff2wjnNDr8kz+UL97ol+LcnIt9lD4D0m4fowKncft0bgbkf2lBI+vbW9s36WbWbwiPhtNjZsDEOZXK4K0ZL/7FuAPxcLHwJI/etZjCNfciuJ98MpysOF1S63vA+fSwJ9NUAY/XUpMSr/bgx6oxoYZKCy8tyhL6gIflUHBen50E14nYajaOgojICKYTdIFFldYUXjUEJggnBhAirzbta5r6nI2RcoQ8TKhyHx/i9Hxf16+cAby3l2ggZENIZwpE183NjEF5J7S7jbAe3RtHKU1zDv0oI2qv/VNsJWhU2Vfskrkn1zcRP/Ow5oFvptRRUvQKgp2uLYehptAdCAA3ysiwZjHIREf/d8zYGdKK3BVnDqpBvxwdCM5Wjh0wSOX06BbQ1gOJRJJWguGFwv6uIWj1mDBKV962ZpjbF38HpP9gCpP77O6z9jvyqW9iNboIVNW7dhfD1dAESF74oaRy1UulHblA6q1Ai8xQoBNYMNNcHeqQLwB1ndYcgdbyUD6CbiaOwAiq5EDuuwTaQqxfqttk X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(396003)(39860400002)(376002)(346002)(136003)(36840700001)(46966006)(7696005)(86362001)(478600001)(5660300002)(26005)(186003)(2616005)(1076003)(336012)(36860700001)(15650500001)(6916009)(8936002)(36756003)(44832011)(81166007)(316002)(426003)(70206006)(70586007)(2906002)(8676002)(47076005)(4326008)(54906003)(356005)(82740400003)(6666004)(82310400003)(83380400001)(36900700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB4017 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT058.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 87dfa94b-0446-41b8-b1da-08d8cf404eef X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Feb 2021 10:24:05.5857 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 38390c3a-17df-4f18-0778-08d8cf40535d X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT058.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR08MB6610 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: PpH4N6Z0uqaj5iMvLJVa9Jz7x1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1613125454; bh=F6YCIogvmPmKvz7h1QqamquMYs7ccFz8LqUQj8ZyL/g=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=iKtT+Q1clQLH8ypzmJA2BMv9arkmpx7KgrVu7Dv99giyyeNfqtZy65U7pcHxXyOdIEU +S/8V6E4CM6Xe4HgLiNu7ipiz4JUXsfdfQ5g2xeJBAaFMSGbfCVDZ6SeKQYWvq842wDVM rrBcGWVAkR4lzZMyTbqH3+iXk0IukTvH/IQ= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Update the revision of the ACPI tables generated by Dynamic Tables Framework so that the ACPI 6.3 features can be utilised. Signed-off-by: Sami Mujawar Reviewed-by: Ard Biesheuvel --- Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/Conf= igurationManager.c | 30 ++++++++++---------- 1 file changed, 15 insertions(+), 15 deletions(-) diff --git a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationMan= agerDxe/ConfigurationManager.c b/Platform/ARM/VExpressPkg/ConfigurationMana= ger/ConfigurationManagerDxe/ConfigurationManager.c index 273ae35ffcdae2fbe1214676a10f6a3ca04e4242..e99fbb654f5109321e32905af37= 63233dffdbc3e 100644 --- a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /ConfigurationManager.c +++ b/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /ConfigurationManager.c @@ -37,42 +37,42 @@ EDKII_PLATFORM_REPOSITORY_INFO VExpressPlatRepositoryIn= fo =3D { { // FADT Table { - EFI_ACPI_6_2_FIXED_ACPI_DESCRIPTION_TABLE_SIGNATURE, - EFI_ACPI_6_2_FIXED_ACPI_DESCRIPTION_TABLE_REVISION, + EFI_ACPI_6_3_FIXED_ACPI_DESCRIPTION_TABLE_SIGNATURE, + EFI_ACPI_6_3_FIXED_ACPI_DESCRIPTION_TABLE_REVISION, CREATE_STD_ACPI_TABLE_GEN_ID (EStdAcpiTableIdFadt), NULL }, // GTDT Table { - EFI_ACPI_6_2_GENERIC_TIMER_DESCRIPTION_TABLE_SIGNATURE, - EFI_ACPI_6_2_GENERIC_TIMER_DESCRIPTION_TABLE_REVISION, + EFI_ACPI_6_3_GENERIC_TIMER_DESCRIPTION_TABLE_SIGNATURE, + EFI_ACPI_6_3_GENERIC_TIMER_DESCRIPTION_TABLE_REVISION, CREATE_STD_ACPI_TABLE_GEN_ID (EStdAcpiTableIdGtdt), NULL }, // MADT Table { - EFI_ACPI_6_2_MULTIPLE_APIC_DESCRIPTION_TABLE_SIGNATURE, - EFI_ACPI_6_2_MULTIPLE_APIC_DESCRIPTION_TABLE_REVISION, + EFI_ACPI_6_3_MULTIPLE_APIC_DESCRIPTION_TABLE_SIGNATURE, + EFI_ACPI_6_3_MULTIPLE_APIC_DESCRIPTION_TABLE_REVISION, CREATE_STD_ACPI_TABLE_GEN_ID (EStdAcpiTableIdMadt), NULL }, // SPCR Table { - EFI_ACPI_6_2_SERIAL_PORT_CONSOLE_REDIRECTION_TABLE_SIGNATURE, + EFI_ACPI_6_3_SERIAL_PORT_CONSOLE_REDIRECTION_TABLE_SIGNATURE, EFI_ACPI_SERIAL_PORT_CONSOLE_REDIRECTION_TABLE_REVISION, CREATE_STD_ACPI_TABLE_GEN_ID (EStdAcpiTableIdSpcr), NULL }, // DSDT Table { - EFI_ACPI_6_2_DIFFERENTIATED_SYSTEM_DESCRIPTION_TABLE_SIGNATURE, + EFI_ACPI_6_3_DIFFERENTIATED_SYSTEM_DESCRIPTION_TABLE_SIGNATURE, 0, // Unused CREATE_STD_ACPI_TABLE_GEN_ID (EStdAcpiTableIdDsdt), (EFI_ACPI_DESCRIPTION_HEADER*)dsdt_aml_code }, // DBG2 Table { - EFI_ACPI_6_2_DEBUG_PORT_2_TABLE_SIGNATURE, + EFI_ACPI_6_3_DEBUG_PORT_2_TABLE_SIGNATURE, EFI_ACPI_DBG2_DEBUG_DEVICE_INFORMATION_STRUCT_REVISION, CREATE_STD_ACPI_TABLE_GEN_ID (EStdAcpiTableIdDbg2), NULL @@ -81,21 +81,21 @@ EDKII_PLATFORM_REPOSITORY_INFO VExpressPlatRepositoryIn= fo =3D { // Note: The last 3 tables in this list are for FVP RevC only. // IORT Table - FVP RevC { - EFI_ACPI_6_2_IO_REMAPPING_TABLE_SIGNATURE, + EFI_ACPI_6_3_IO_REMAPPING_TABLE_SIGNATURE, EFI_ACPI_IO_REMAPPING_TABLE_REVISION, CREATE_STD_ACPI_TABLE_GEN_ID (EStdAcpiTableIdIort), NULL }, // PCI MCFG Table - FVP RevC { - EFI_ACPI_6_2_PCI_EXPRESS_MEMORY_MAPPED_CONFIGURATION_SPACE_BASE_ADDR= ESS_DESCRIPTION_TABLE_SIGNATURE, + EFI_ACPI_6_3_PCI_EXPRESS_MEMORY_MAPPED_CONFIGURATION_SPACE_BASE_ADDR= ESS_DESCRIPTION_TABLE_SIGNATURE, EFI_ACPI_MEMORY_MAPPED_CONFIGURATION_SPACE_ACCESS_TABLE_REVISION, CREATE_STD_ACPI_TABLE_GEN_ID (EStdAcpiTableIdMcfg), NULL }, // SSDT table describing the PCI root complex - FVP RevC { - EFI_ACPI_6_2_SECONDARY_SYSTEM_DESCRIPTION_TABLE_SIGNATURE, + EFI_ACPI_6_3_SECONDARY_SYSTEM_DESCRIPTION_TABLE_SIGNATURE, 0, // Unused CREATE_STD_ACPI_TABLE_GEN_ID (EStdAcpiTableIdSsdt), (EFI_ACPI_DESCRIPTION_HEADER*)ssdtpci_aml_code @@ -103,15 +103,15 @@ EDKII_PLATFORM_REPOSITORY_INFO VExpressPlatRepository= Info =3D { }, =20 // Boot architecture information - { EFI_ACPI_6_2_ARM_PSCI_COMPLIANT }, // BootArchFlags + { EFI_ACPI_6_3_ARM_PSCI_COMPLIANT }, // BootArchFlags =20 #ifdef HEADLESS_PLATFORM // Fixed feature flag information - { EFI_ACPI_6_2_HEADLESS }, // Fixed feature flags + { EFI_ACPI_6_3_HEADLESS }, // Fixed feature flags #endif =20 // Power management profile information - { EFI_ACPI_6_2_PM_PROFILE_ENTERPRISE_SERVER }, // PowerManagement Pro= file + { EFI_ACPI_6_3_PM_PROFILE_ENTERPRISE_SERVER }, // PowerManagement Pro= file =20 /* GIC CPU Interface information GIC_ENTRY (CPUInterfaceNumber, Mpidr, PmuIrq, VGicIrq, EnergyEfficien= cy) --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#71633): https://edk2.groups.io/g/devel/message/71633 Mute This Topic: https://groups.io/mt/80580209/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sun May 5 10:36:37 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+71639+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1613125493750554.3382991781458; Fri, 12 Feb 2021 02:24:53 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id uR7lYY1788612xYAaJI2hoyZ; Fri, 12 Feb 2021 02:24:53 -0800 X-Received: from EUR04-HE1-obe.outbound.protection.outlook.com (EUR04-HE1-obe.outbound.protection.outlook.com [40.107.7.78]) by mx.groups.io with SMTP id smtpd.web08.1973.1613125487355051325 for ; Fri, 12 Feb 2021 02:24:48 -0800 X-Received: from MR2P264CA0168.FRAP264.PROD.OUTLOOK.COM (2603:10a6:501:1::31) by DBBPR08MB4726.eurprd08.prod.outlook.com (2603:10a6:10:f0::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27; Fri, 12 Feb 2021 10:24:30 +0000 X-Received: from VE1EUR03FT016.eop-EUR03.prod.protection.outlook.com (2603:10a6:501:1:cafe::ba) by MR2P264CA0168.outlook.office365.com (2603:10a6:501:1::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.27 via Frontend Transport; Fri, 12 Feb 2021 10:24:30 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+71639+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT016.mail.protection.outlook.com (10.152.18.115) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:29 +0000 X-Received: ("Tessian outbound e989e14f9207:v71"); Fri, 12 Feb 2021 10:24:29 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 2bdfb50a1f1662c5 X-CR-MTA-TID: 64aa7808 X-Received: from 23f2f6961677.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 1B5FB480-954D-44D2-9974-27EAB3EBDDCE.1; Fri, 12 Feb 2021 10:24:14 +0000 X-Received: from EUR05-DB8-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 23f2f6961677.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 12 Feb 2021 10:24:14 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=TZ/J10KBe7XrGllVH0MY57YxWKM72PjdQMDrrY/J1oGrAeA64/g8N7vtVYhWAYu+NzL7/nuBL3+E0BFIS8qRAUBNXFHpZZrFNbOC4IzGbRnNrEWTa4b2j22f2AIexvyDuUHY/LUe8JlCQZd53HqUu8W2nee7kX/FgRY7y4q7HqDoXpEX7Z/w3G1nIPn5l0ZD23DUjwHAXSpZlu3yUHK9ShMHxatQqTua2MtXPjw3FxkY9HxgcxzwXlqqIGz4nk41QWKxBbWZED60O/Nu0rJyx40rlf18adjpOVdWAabxKSF1aRwuZdJKRmOcZSnqGWRysXoyQ5aLHvfOJPZkfIep6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BC9KEGphI+3UG8iKR234d9rTbWJ/VhAQKtzhez9eMu0=; b=ZSSkCH05P1SL78W3I1V0EnVJRKvfrplbG9vbHJOAZouWvVuMRJmEsORykshE4r9xwUChVUCENgWxcS31ijhZg9Y+JHDSkcSlorVgzsMEzFLINadcW6oFjV6suGne4AhAU7iKworPEoxDPU6iEhhJI7tT6oQAim5DmTKFIBzhKnUQ7x2WO/znkMIYJJybLpJJrAibzYCdprye4ZBfeBuWHnhDGA74PqmMZh2etktGMvGUraMu9h++dXPendgt4z9mpKcP0vF0IxW8FgJPgBK567PJIKFB3bT+AfXMrD9T1PStZUeTvFVDZlaM8iKpLoEIfbMmMR5XNjC6+IPFqQ0TbA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from DB6P192CA0007.EURP192.PROD.OUTLOOK.COM (2603:10a6:4:b8::17) by DB6PR0802MB2151.eurprd08.prod.outlook.com (2603:10a6:4:84::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.19; Fri, 12 Feb 2021 10:24:11 +0000 X-Received: from DB5EUR03FT020.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:b8:cafe::6e) by DB6P192CA0007.outlook.office365.com (2603:10a6:4:b8::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27 via Frontend Transport; Fri, 12 Feb 2021 10:24:11 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT020.mail.protection.outlook.com (10.152.20.134) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:11 +0000 X-Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2044.4; Fri, 12 Feb 2021 10:23:49 +0000 X-Received: from E107187.Arm.com (10.57.49.120) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Fri, 12 Feb 2021 10:23:48 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , Subject: [edk2-devel] [PATCH edk2-platforms v1 09/12] Platform/ARM/VExpressPkg: Add SMC91x device description Date: Fri, 12 Feb 2021 10:23:38 +0000 Message-ID: <20210212102341.24056-10-sami.mujawar@arm.com> In-Reply-To: <20210212102341.24056-1-sami.mujawar@arm.com> References: <20210212102341.24056-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 967238fc-a74c-4572-f364-08d8cf4061b6 X-MS-TrafficTypeDiagnostic: DB6PR0802MB2151:|DBBPR08MB4726: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:3513;OLM:3513; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(136003)(346002)(376002)(396003)(39860400002)(46966006)(36840700001)(54906003)(44832011)(426003)(8676002)(186003)(36860700001)(86362001)(336012)(1076003)(36756003)(478600001)(2906002)(6916009)(82740400003)(81166007)(5660300002)(82310400003)(26005)(356005)(83380400001)(316002)(6666004)(7696005)(70206006)(4326008)(70586007)(8936002)(47076005)(2616005)(36900700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0802MB2151 X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT016.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 5600560d-91ba-44cc-976b-08d8cf4056a8 X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Feb 2021 10:24:29.5872 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 967238fc-a74c-4572-f364-08d8cf4061b6 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: VE1EUR03FT016.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4726 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: fzbYLm2nYY7WDWRgoFzM6Ragx1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1613125493; bh=cVP5txDoypWu/U//RFCugFoBJfIjL4JNPsFFRe/4yWA=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=OhyJ6wS8Jthpg1CO+7GHTFN5BrYAeLIwcZRJiyyB8shSzAPzcS7O5/Dk0m/bCToZKlc WfGnsUx9xuDBbMhFU8vwyvWY5GZQ+8kjqIWz3UhtPy8MstUiwZVt3VoLz4MxHWQ2sbpI+ xceTkBZPTon0Tsspl1hQLeJs/zDrnQHU7hU= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The FVP model implements a SMSC 91C111 ethernet controller that can be configured for network access. Therefore, add description for a SMSC 91C111 device in the DSDT. Signed-off-by: Sami Mujawar Reviewed-by: Ard Biesheuvel --- Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/AslT= ables/Dsdt.asl | 16 +++++++++++++++- 1 file changed, 15 insertions(+), 1 deletion(-) diff --git a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationMan= agerDxe/AslTables/Dsdt.asl b/Platform/ARM/VExpressPkg/ConfigurationManager/= ConfigurationManagerDxe/AslTables/Dsdt.asl index eb5466229d1f10f465ca417166de5c1c1ea212e8..64d697e344ffb5b5b6c4ef31b82= 45f10a1a18c76 100644 --- a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /AslTables/Dsdt.asl +++ b/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /AslTables/Dsdt.asl @@ -2,7 +2,10 @@ Differentiated System Description Table Fields (DSDT) =20 Copyright (c) 2014-2021, ARM Ltd. All rights reserved.
- SPDX-License-Identifier: BSD-2-Clause-Patent + Copyright (c) 2013, Al Stone + All rights reserved. + + SPDX-License-Identifier: BSD-2-Clause-Patent =20 **/ =20 @@ -43,5 +46,16 @@ DefinitionBlock("DsdtTable.aml", "DSDT", 1, "ARMLTD", "A= RM-VEXP", 1) { Name(_HID, "ACPI0007") Name(_UID, 7) } + + // SMC91X + Device (NET0) { + Name (_HID, "LNRO0003") + Name (_UID, 0) + + Name (_CRS, ResourceTemplate () { + Memory32Fixed (ReadWrite, 0x1a000000, 0x00010000) + Interrupt (ResourceConsumer, Level, ActiveHigh, Exclusive) {0x2F} + }) + } } // Scope(_SB) } --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#71639): https://edk2.groups.io/g/devel/message/71639 Mute This Topic: https://groups.io/mt/80580219/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sun May 5 10:36:37 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+71640+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1613125489109841.2771283119049; Fri, 12 Feb 2021 02:24:49 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id UPedYY1788612xiWq3BSPpp0; Fri, 12 Feb 2021 02:24:48 -0800 X-Received: from EUR05-VI1-obe.outbound.protection.outlook.com (EUR05-VI1-obe.outbound.protection.outlook.com [40.107.21.48]) by mx.groups.io with SMTP id smtpd.web10.1913.1613125487679387389 for ; Fri, 12 Feb 2021 02:24:48 -0800 X-Received: from DB6PR0301CA0032.eurprd03.prod.outlook.com (2603:10a6:4:3e::42) by AM8PR08MB5827.eurprd08.prod.outlook.com (2603:10a6:20b:1da::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27; Fri, 12 Feb 2021 10:24:44 +0000 X-Received: from DB5EUR03FT050.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:3e:cafe::49) by DB6PR0301CA0032.outlook.office365.com (2603:10a6:4:3e::42) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.26 via Frontend Transport; Fri, 12 Feb 2021 10:24:44 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+71640+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT050.mail.protection.outlook.com (10.152.21.128) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:44 +0000 X-Received: ("Tessian outbound 28c96a6c9d2e:v71"); Fri, 12 Feb 2021 10:24:44 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 5504a1b568e4a5b4 X-CR-MTA-TID: 64aa7808 X-Received: from 8f4adf70eb2b.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 22C9ACBC-F8C7-4E29-81AD-1002987743E0.1; Fri, 12 Feb 2021 10:24:18 +0000 X-Received: from EUR04-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 8f4adf70eb2b.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 12 Feb 2021 10:24:18 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=H+V8l4yFYoWoz2ZFtHPzv+1T7ZVBQoEhs3/W78JxTm4NskOYAeRlOJcjM+e4j6G1FuzGpmyHY2Dx42Wrz3UTp7eWHRL5oXa7ZzWbkBNhPjjzdKxDP79Cg9SNGBZcASj8hPN4TWubzP4aLz9vI0wV4jY4x7tvAM6unhOiad253ishd3dpZfpiYuGYAbMXl5RnIXyBoD9B6KkWbbCC/7UllHnEhddehzLVjiMAn+BUx4fEEWhEJ4PHuXs+s3BntLdIwTahxO4B/4mFf9dSgt2/AnbLIVK3GFrbih9WceIGQFsA0x6ulVeKHoVgEhtxtPMcseVwj1wHScMeInvQVNQ9Ow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ltj4EhC5/eyLgQJ2HsLAmlWlBufBTxICXpjVSB/9of4=; b=Y3FTbwW0UNXHPA9nSOucqEB/S/drqRcFf8LWnLHEVoU6OaeBoTJA1y59SSNXxNs0NGl4rFyx8QrnqbHyYRAIVNOcfs6B7b5kFSTOF+5NWZBv1HIr+49MaZLBl0eGfoiuchyE1bojJjOOupwXmOUrDD++BL0CpwjVOhwKl1iH1SiKn8BLyH4bVfolOOnJJfBbDPd7ixgXevQb2aVJXyVfVdYT2uCdk9CiMBvyMJ6wI1nbmvDDpRZzO6bBmXTNEtkrSO0yEibDGYqnK3x/E79olkC1Gz988hcDPoA9zDKlFhVSaO6U2uLjgrheFY9soE4VICOhDFjlY08ppiQosPYPag== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from DB6PR0301CA0047.eurprd03.prod.outlook.com (2603:10a6:4:54::15) by AM6PR08MB3640.eurprd08.prod.outlook.com (2603:10a6:20b:4c::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27; Fri, 12 Feb 2021 10:24:16 +0000 X-Received: from DB5EUR03FT062.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:54:cafe::ce) by DB6PR0301CA0047.outlook.office365.com (2603:10a6:4:54::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27 via Frontend Transport; Fri, 12 Feb 2021 10:24:16 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT062.mail.protection.outlook.com (10.152.20.197) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:15 +0000 X-Received: from AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.2044.4; Fri, 12 Feb 2021 10:23:50 +0000 X-Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1779.2; Fri, 12 Feb 2021 10:23:49 +0000 X-Received: from E107187.Arm.com (10.57.49.120) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Fri, 12 Feb 2021 10:23:49 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , Subject: [edk2-devel] [PATCH edk2-platforms v1 10/12] Platform/ARM/VExpressPkg: Add Virtio Block Device description Date: Fri, 12 Feb 2021 10:23:39 +0000 Message-ID: <20210212102341.24056-11-sami.mujawar@arm.com> In-Reply-To: <20210212102341.24056-1-sami.mujawar@arm.com> References: <20210212102341.24056-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 5726988c-e8a4-43cf-cd67-08d8cf406a8d X-MS-TrafficTypeDiagnostic: AM6PR08MB3640:|AM8PR08MB5827: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:7691;OLM:7691; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(396003)(136003)(346002)(39860400002)(376002)(46966006)(36840700001)(2616005)(426003)(36756003)(7696005)(336012)(44832011)(1076003)(6916009)(8936002)(186003)(26005)(47076005)(36860700001)(54906003)(70586007)(316002)(2906002)(82740400003)(83380400001)(6666004)(356005)(478600001)(81166007)(86362001)(5660300002)(82310400003)(70206006)(4326008)(8676002)(36900700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3640 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT050.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: daef8a73-a5a0-419e-5f31-08d8cf40597d X-Microsoft-Antispam-Message-Info: 9OAb0Le5Vgec6O2EvCslbIdOPLvCuWI3WaC8N1F/TtF4lXNbrX/9XgZIYWXFYNgPICzT+RVqurpCJT00D/7xtYMB8xKAJfrhkSihs6+JUgGxhCNOIWBF1TBh5i2F6tUUYzYowmoWaj3MzhFd1o0Kliqa5BR+TEAry+jE+JwC/LXsWhkuY+/Y/WYPwlT/2j7ue0T08OgiKQwCiwnG6Pxrnf96VodmzjTSWLkWbTWnt01B0zoy52NNK4gge14ZlmqETT95uAnSLDlw2K9FUJBoefz8dHzgmFMocgVRWCCHCoJAFBQk5jssdm/Cjfoiab4W1lmpOL7pWfhj8pO/GMM5Xsj2oJcmYUUBEwwUcSZ39M+mar1pQM5PyhF0zVpBFi96GlBprACGmr9aIdQUHYdvERJ7ixSEVjhg5rxGL6JMWOEfPu8f/PBvmpPp3YemySTGeUk+X8vhnP9oqg7olUZ81XWXV50sEZhEHBrqLyJWKQd6GGXBrPSWRIrf7UPagQClypfG6ic0al6nlw6Hqc0cqBiNbJfu/6ZPPFkaGe3/tjL7jcpmG4iZ6oKi/g4rm6YjcfXwQQllW1CPnTtms6aBKh/bw7ZtEsGS8mMMQcYhmuoEpcTi3E6kNMjAUxB5xFEvBP0XFtR7qSWj2QWOf0uAiBof0Tg9OE59RGnjqJCnxxE= X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Feb 2021 10:24:44.5389 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 5726988c-e8a4-43cf-cd67-08d8cf406a8d X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT050.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR08MB5827 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: S7sgv4wqduzKNFnUkTNYPNq3x1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1613125488; bh=Zk5iNjzMH8g3BeXFT9rAr5H7EZb2xu1e2XNn98AboA0=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=FwWt939J9E3k65kpA/MLpJYsew75ljE0d0yq2y3hFGSLyuRrqG56fpDodSOpZogJk+n vFA7ffc8qNXmg1DeXBdmtJ0ATCGFTZHTLIC+SizgcIPXtskLq8gb7Eo3/EmfSS1mNoscB Ev5CyQsJ26byKaOO+KMZwDtX+u5IcxqOVR8= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The FVP model implements a Virtio block device that can be accessed from a Guest OS if it has an appropriate driver. It is targeted primarily at Linux, which has a built-in Virtio block driver. VirtioBlockDevice allows to use a file on the host that is specified using the models image_path parameter, as a hard drive in the Guest OS. Therefore, add the Virtio block device description to the DSDT. Signed-off-by: Sami Mujawar Reviewed-by: Ard Biesheuvel --- Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/AslT= ables/Dsdt.asl | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationMan= agerDxe/AslTables/Dsdt.asl b/Platform/ARM/VExpressPkg/ConfigurationManager/= ConfigurationManagerDxe/AslTables/Dsdt.asl index 64d697e344ffb5b5b6c4ef31b8245f10a1a18c76..e04003d562ddc410d4981d7e452= 7ecc78c440440 100644 --- a/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /AslTables/Dsdt.asl +++ b/Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe= /AslTables/Dsdt.asl @@ -57,5 +57,16 @@ DefinitionBlock("DsdtTable.aml", "DSDT", 1, "ARMLTD", "A= RM-VEXP", 1) { Interrupt (ResourceConsumer, Level, ActiveHigh, Exclusive) {0x2F} }) } + + // VIRTIO block device + Device (VIRT) { + Name (_HID, "LNRO0005") + Name (_UID, 0) + + Name (_CRS, ResourceTemplate() { + Memory32Fixed (ReadWrite, 0x1c130000, 0x1000) + Interrupt (ResourceConsumer, Level, ActiveHigh, Exclusive) {0x4A} + }) + } } // Scope(_SB) } --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#71640): https://edk2.groups.io/g/devel/message/71640 Mute This Topic: https://groups.io/mt/80580220/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sun May 5 10:36:37 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+71637+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1613125469625193.33080159354483; Fri, 12 Feb 2021 02:24:29 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id 5JZqYY1788612x0rogGWyBE0; Fri, 12 Feb 2021 02:24:29 -0800 X-Received: from EUR03-DB5-obe.outbound.protection.outlook.com (EUR03-DB5-obe.outbound.protection.outlook.com [40.107.4.56]) by mx.groups.io with SMTP id smtpd.web10.1911.1613125468588634357 for ; Fri, 12 Feb 2021 02:24:28 -0800 X-Received: from AM6PR10CA0052.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:209:80::29) by VI1PR0801MB2064.eurprd08.prod.outlook.com (2603:10a6:800:8b::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25; Fri, 12 Feb 2021 10:24:25 +0000 X-Received: from VE1EUR03FT056.eop-EUR03.prod.protection.outlook.com (2603:10a6:209:80:cafe::5d) by AM6PR10CA0052.outlook.office365.com (2603:10a6:209:80::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27 via Frontend Transport; Fri, 12 Feb 2021 10:24:25 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+71637+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT056.mail.protection.outlook.com (10.152.19.28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:24 +0000 X-Received: ("Tessian outbound 587c3d093005:v71"); Fri, 12 Feb 2021 10:24:24 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: c6c904dc01eef0e8 X-CR-MTA-TID: 64aa7808 X-Received: from fb798a0c8fbb.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 855EADF4-8B5D-4047-B2F7-1B0C374B0607.1; Fri, 12 Feb 2021 10:24:18 +0000 X-Received: from EUR04-DB3-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id fb798a0c8fbb.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 12 Feb 2021 10:24:18 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=F9BHFzlK4qXntF4AkczV7kD6MtA8CgnShD3nJXyr/SyEW5sB+Ipc0cUPxvwhKxHGpInKCJc/85nC+JYRjl7wtaJIPRijrHldWUlqOb3aJcSQvUxLvvF+/oYCme9IqQ7q2OvCcn5RZWAcJYlusDg5FARXyt/Nzxi1ngO06GneXqqi7zEnefxnw9PjSQZj1tIXQi1aiTYGQOI7OiKXFcaypN0Lm1Ga/uUcujKoLclZBhvD7sUCVujLjBTcinqVLCbmnz3A03cxd+nS7GdPqFRw4wfO3vCmpkfqgWeg3pzqTQjJEUR9BJ4Jv15X2NxpAxbUDW339PLjUy5CGs0R2Nfvyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Yl44HnkPkiC3a0ZEYAY06BmxhDA3iO+70SEjM9Hc2GE=; b=PNuxvI2Aj847PEnuikxJxkadLGTA6CfGKNzFLuTL4i4PbwRo30JHNQB+DtZf7YDWWjS/OTTvDVtf0pHcGIbalnHX5iH9kbhwFKmxTOgpaBcQ4HM3DYMtQHF6U8NFkZPX4zXX8lTiRYbJ/Uzs9AsmkXTVeC8m0cefY3JxmQWUzxDuX8yx3euQNVTPdeFvxlGRJtpJ3tTZfSvnBLzl4SPdXxSmHln+95o0wt3+Ly9UYXLV+6bkriXb95O7XNn6IUZc9eUD/XyKazqCpzD2GNmAVbf5KWhBOlQdvKG/Om/ol1cX4k8t4KtyuqgjMa9jsCYGOtybhXmbukgKoMCYu1ZlWw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from DU2PR04CA0124.eurprd04.prod.outlook.com (2603:10a6:10:231::9) by AM5PR0801MB1731.eurprd08.prod.outlook.com (2603:10a6:203:3c::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25; Fri, 12 Feb 2021 10:24:17 +0000 X-Received: from DB5EUR03FT064.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:231:cafe::1d) by DU2PR04CA0124.outlook.office365.com (2603:10a6:10:231::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.26 via Frontend Transport; Fri, 12 Feb 2021 10:24:17 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT064.mail.protection.outlook.com (10.152.21.199) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:17 +0000 X-Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2044.4; Fri, 12 Feb 2021 10:23:50 +0000 X-Received: from E107187.Arm.com (10.57.49.120) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Fri, 12 Feb 2021 10:23:49 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , Subject: [edk2-devel] [PATCH edk2-platforms v1 11/12] Platform/ARM/VExpressPkg: Make Dynamic Tables Framework default Date: Fri, 12 Feb 2021 10:23:40 +0000 Message-ID: <20210212102341.24056-12-sami.mujawar@arm.com> In-Reply-To: <20210212102341.24056-1-sami.mujawar@arm.com> References: <20210212102341.24056-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: d421cfb6-c078-4f94-2297-08d8cf405ef7 X-MS-TrafficTypeDiagnostic: AM5PR0801MB1731:|VI1PR0801MB2064: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:4714;OLM:4714; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(376002)(39860400002)(396003)(136003)(346002)(36840700001)(46966006)(70586007)(70206006)(5660300002)(7696005)(8676002)(6666004)(4326008)(6916009)(47076005)(8936002)(316002)(36860700001)(19627235002)(82740400003)(356005)(86362001)(82310400003)(26005)(2616005)(336012)(1076003)(54906003)(2906002)(478600001)(4744005)(426003)(186003)(44832011)(81166007)(36756003)(36900700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0801MB1731 X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT056.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: a3bec296-2da6-4c23-53e2-08d8cf405a28 X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Feb 2021 10:24:24.9763 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: d421cfb6-c078-4f94-2297-08d8cf405ef7 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: VE1EUR03FT056.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB2064 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: RQsIzoKjWFKVrY73NLBIrLsax1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1613125469; bh=Rgq6R/Kc05VOKicOPoMIqHjC/n8WqGEhseSPqOg3LAE=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=r2YAJ1OhGxp/qBqRK2ZXN6eEEvPegzZBkbd7E/5f3ipH+rwDhFyZ91J92HBDoxp2xwc fR1Q69E0AHrSsM1Rip/zArs59B/UBmLBptBTrEyV9pQ7GwmTZ0Frwb4VObMd1sjTteBET ONuO/3/pBzWfwnaOiAN6WJAb/YOPuKbD+3U= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The Dynamic Tables Framework enables unification of the firmware for FVP_Base_AEMv8A-AEMv8A and FVP_Base_RevC-2xAEMv8A models such that the same firmware binary can be used by these models. Therefore, make Dynamic Tables Framework the default option for building ACPI tables. Signed-off-by: Sami Mujawar Reviewed-by: Ard Biesheuvel --- Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.dsc | 1 + 1 file changed, 1 insertion(+) diff --git a/Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.dsc b/Platfor= m/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.dsc index d01e549f945f2593e6b62a58b204737aff104a40..12562ceafd8ab020d61d4ba70fd= d6c8c128da6a2 100644 --- a/Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.dsc +++ b/Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.dsc @@ -30,6 +30,7 @@ [Defines] !endif =20 DT_SUPPORT =3D FALSE + DYNAMIC_TABLES_FRAMEWORK =3D TRUE =20 !include Platform/ARM/VExpressPkg/ArmVExpress.dsc.inc !ifdef DYNAMIC_TABLES_FRAMEWORK --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#71637): https://edk2.groups.io/g/devel/message/71637 Mute This Topic: https://groups.io/mt/80580215/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sun May 5 10:36:37 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+71638+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1613125475847876.9591338886613; Fri, 12 Feb 2021 02:24:35 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id 452fYY1788612xsCwdCt4fSR; Fri, 12 Feb 2021 02:24:35 -0800 X-Received: from EUR04-VI1-obe.outbound.protection.outlook.com (EUR04-VI1-obe.outbound.protection.outlook.com [40.107.8.78]) by mx.groups.io with SMTP id smtpd.web11.1985.1613125469231436985 for ; Fri, 12 Feb 2021 02:24:30 -0800 X-Received: from AM5PR0601CA0064.eurprd06.prod.outlook.com (2603:10a6:206::29) by AM5PR0801MB2081.eurprd08.prod.outlook.com (2603:10a6:203:4c::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.26; Fri, 12 Feb 2021 10:24:25 +0000 X-Received: from VE1EUR03FT018.eop-EUR03.prod.protection.outlook.com (2603:10a6:206:0:cafe::97) by AM5PR0601CA0064.outlook.office365.com (2603:10a6:206::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:25 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+71638+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT018.mail.protection.outlook.com (10.152.18.135) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:25 +0000 X-Received: ("Tessian outbound 28c96a6c9d2e:v71"); Fri, 12 Feb 2021 10:24:24 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 1d66cd07a2c42ffa X-CR-MTA-TID: 64aa7808 X-Received: from b900e4d4b586.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 1F01AAA4-2EFC-472A-B747-A0CF347FDA4F.1; Fri, 12 Feb 2021 10:24:19 +0000 X-Received: from EUR03-AM5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id b900e4d4b586.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 12 Feb 2021 10:24:19 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NPu3biaOuj2gXXeIs21yG1IdTh5pBVhlFNKdu6OnZHBeXX2X6AxACDU4I5XFA4w8fPO2dYAKBYmZqcfmhEL9gQkiD2PskU85k37Lt/lhruTJBSYICX6SvVBGnoPfcpcLe/xtkJTRSOm4WnCqcekvPIY/YEvPQ/s4enCi1AvTxkYIBybOxzX7ODCdoo5BOGMas2fhpAl6MjWgtg+NK0ht3J2RUSeIsQFxuUaaT6Vcecdr3iiHNppeHRTOSy5+7+E6Ps/E+5etutm83WUwyPNDYKEvP5TYpYanBlFQqopxcpiaVBqxagt/92Y8Jsy0HEXcxfMFNlo/1hYQJ/7IrY7ftg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=paX+taDFdH/sJlcX5N7JijDkfvMcrq8IadXDUFyv4KI=; b=Kw/ridXks20/f/Mad7R0uGdjUm8in0k9SEeUvSDBw3z0z7sKHNDRuMtoRnrC33yOf/ReGtcDeqqGjQSld/eJSA6h1f+3y0fs5Me1kOJuEUuqK95Idun/gt/jY5+uydO2u+l0oj+tysa4x6l0EBiJEPQGggTYdeOY7Tx8TDotV+xUdukn/+ZqrTyMQ9+e7EFiFgOJslQ5nLhvYWrtgIGu1Iw6d7MHw8v+YtCGsngPtJ29881h3ys40KHCciosB8JoWuz+aEjJUWVuCs1kr2vlZYKhr5CjK98m1b9JzgXO1+XAdSQGjC+I4A9GgbCs+/qCP19/y1p82bEtkj1kaMIvTQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from DB6PR0301CA0057.eurprd03.prod.outlook.com (2603:10a6:4:54::25) by VI1PR08MB5470.eurprd08.prod.outlook.com (2603:10a6:803:136::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.26; Fri, 12 Feb 2021 10:24:17 +0000 X-Received: from DB5EUR03FT062.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:54:cafe::c7) by DB6PR0301CA0057.outlook.office365.com (2603:10a6:4:54::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:17 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT062.mail.protection.outlook.com (10.152.20.197) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:17 +0000 X-Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2044.4; Fri, 12 Feb 2021 10:23:50 +0000 X-Received: from E107187.Arm.com (10.57.49.120) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Fri, 12 Feb 2021 10:23:50 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , Subject: [edk2-devel] [PATCH edk2-platforms v1 12/12] Platform/ARM/VExpressPkg: Remove redundant traditional ACPI support Date: Fri, 12 Feb 2021 10:23:41 +0000 Message-ID: <20210212102341.24056-13-sami.mujawar@arm.com> In-Reply-To: <20210212102341.24056-1-sami.mujawar@arm.com> References: <20210212102341.24056-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: ef0e9381-b5e9-42fc-ca69-08d8cf405f06 X-MS-TrafficTypeDiagnostic: VI1PR08MB5470:|AM5PR0801MB2081: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:4303;OLM:4303; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 2GhD3mPqGRP6w56byca4phu7vfX2ubz/HkvhbWWTrlO+wJwdqF6sFRByDR/VqHcWjw7OPgvphF/tgmmdyvjIP9H/3EC27Do8wMjqY5r6ibacsQtoxVY9m0oezU+vXa25OAptHY+kM7UK2CghALMo8Q5WxoWWkL3S99GChcZstQrt6xltzGmFVsPnLgiesvnVz9wn70Ad8PEk4hvaQaXKqH67nuxe6fjm9duu/0ZgUcBBz9AOrdcSNpj1s3acGQ2IfMd+hNFbqvHfPkHNvttoi88wCm7PTsvNv0DQ2DalqPrOJI5xLdTuBG8z09ugIj/Fx4nQFani+ZSOyMOVa/4w7Ed/z19+9u7Yq2qZJwg9vHeby/nsxoQx3FLXRjPgEA1FxkKAIFx9MUL3RRtgenI9iHdCoefnEYYWfHMOs7KIEoLQhq6XjON0j+L7oxuQdET3IdLE3ShGwNwWDd8/PnHUHu/PYBCEvWX9YaGjN3V/1FyX3NuQQigLf8zr2U5SAhgg1R3CS3KAvX+Uw1bjNZLOaARYDFecyBmgwLm/RQmEavmu234CY24iJ9ZqxLbpg7lRSRK82EeFdb0Tmsy9D97YSi4NSAtB6BBiy4ModKe6tD0Gt0iFou/OyKQU5I/OUgcU6MeprEaq1wCuGe9l/79ri1KWd45f8wtE5a6o+SOeuXCPLzTgPeDSuJBWJyj6B03/ X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(136003)(376002)(396003)(346002)(39860400002)(46966006)(36840700001)(5660300002)(8936002)(478600001)(356005)(86362001)(82740400003)(81166007)(336012)(47076005)(36860700001)(1076003)(36756003)(70586007)(8676002)(70206006)(2906002)(316002)(4326008)(30864003)(19627235002)(26005)(83380400001)(186003)(426003)(7696005)(2616005)(6916009)(82310400003)(44832011)(6666004)(54906003)(36900700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB5470 X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT018.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 94e0e7ca-19d8-42e8-3d5b-08d8cf405a4f X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Feb 2021 10:24:25.0313 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: ef0e9381-b5e9-42fc-ca69-08d8cf405f06 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: VE1EUR03FT018.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0801MB2081 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: 2cFxjtkksd8bKoisS75NnVzhx1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1613125475; bh=e1KelvAMoIvWMq3n/QsUdJDpYoaiWcdMhD1/Y/q2WVE=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=oSygT7gFx8mgrS2PdfSFZPttF8nUiLSpcU751xG8lJqMi+2trf1HNbRotZkSrDyZPAO FyBX/HFWjXUaFJ4e0hETMXLHkQbNT2r+jGDMw6/i6E37bhm9Zrz5cLTM3Kh9Vr6Q8Z+Er FV1fuP94dmDWh9Gt1FvED9bGHLcIBzzbRlc= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Dynamic Tables Framework enables unification of the firmware for FVP_Base_AEMv8A-AEMv8A and FVP_Base_RevC-2xAEMv8A models such that the same firmware binary can be used by both models. A single firmware binary cannot be supported using the traditional ACPI tables. Therefore, remove support for the now redundant traditional ACPI tables. Signed-off-by: Sami Mujawar Reviewed-by: Ard Biesheuvel --- Platform/ARM/VExpressPkg/AcpiTables/AcpiTables.inf | 38 ----- Platform/ARM/VExpressPkg/AcpiTables/Dsdt.asl | 123 -------------- Platform/ARM/VExpressPkg/AcpiTables/Fadt.aslc | 80 --------- Platform/ARM/VExpressPkg/AcpiTables/FvpPlatform.h | 40 ----- Platform/ARM/VExpressPkg/AcpiTables/Gtdt.aslc | 169 ---------------= ----- Platform/ARM/VExpressPkg/AcpiTables/Madt.aslc | 85 ---------- Platform/ARM/VExpressPkg/AcpiTables/Spcr.aslc | 82 ---------- Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.dsc | 10 +- Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.fdf | 13 +- 9 files changed, 2 insertions(+), 638 deletions(-) diff --git a/Platform/ARM/VExpressPkg/AcpiTables/AcpiTables.inf b/Platform/= ARM/VExpressPkg/AcpiTables/AcpiTables.inf deleted file mode 100644 index bca1d21de704368caf5e5a290670ddcfcdd5fb80..000000000000000000000000000= 0000000000000 --- a/Platform/ARM/VExpressPkg/AcpiTables/AcpiTables.inf +++ /dev/null @@ -1,38 +0,0 @@ -## @file -# -# ACPI table data and ASL sources required to boot the platform. -# -# Copyright (c) 2014-2017, ARM Ltd. All rights reserved. -# -# SPDX-License-Identifier: BSD-2-Clause-Patent -# -## - -[Defines] - INF_VERSION =3D 0x00010005 - BASE_NAME =3D FvpAcpiTables - FILE_GUID =3D 7E374E25-8E01-4FEE-87F2-390C23C606CD - MODULE_TYPE =3D USER_DEFINED - VERSION_STRING =3D 1.0 - -[Sources] - Dsdt.asl - Spcr.aslc - Fadt.aslc - Gtdt.aslc - Madt.aslc - -[Packages] - ArmPkg/ArmPkg.dec - ArmPlatformPkg/ArmPlatformPkg.dec - EmbeddedPkg/EmbeddedPkg.dec - MdePkg/MdePkg.dec - MdeModulePkg/MdeModulePkg.dec - Platform/ARM/VExpressPkg/ArmVExpressPkg.dec - -[FixedPcd] - gArmTokenSpaceGuid.PcdGicDistributorBase - gArmTokenSpaceGuid.PcdGicInterruptInterfaceBase - gArmTokenSpaceGuid.PcdGicRedistributorsBase - - gArmPlatformTokenSpaceGuid.PcdWatchdogCount diff --git a/Platform/ARM/VExpressPkg/AcpiTables/Dsdt.asl b/Platform/ARM/VE= xpressPkg/AcpiTables/Dsdt.asl deleted file mode 100644 index f9b44bb25f723bf002b7fc82c65fa2d300c4bf05..000000000000000000000000000= 0000000000000 --- a/Platform/ARM/VExpressPkg/AcpiTables/Dsdt.asl +++ /dev/null @@ -1,123 +0,0 @@ -/* -* Copyright (c) 2013, Al Stone -* All rights reserved. -* -* SPDX-License-Identifier: BSD-2-Clause-Patent -* -* -* NB: This License is also known as the "BSD 2-Clause License". -* -* -* [DSDT] Description of the armv8 VE Model -* -*/ - -DefinitionBlock ( - "dsdt.aml", // output filename - "DSDT", // table signature - 2, // DSDT compliance revision - "LINARO", // OEM ID - "RTSMVEV8", // table ID - 0x00000004) // OEM revision -{ - Scope (\_SB) - { - Method (_OSC, 4, NotSerialized) - { - /* Platform-Wide OSPM Capabilities */ - If(LEqual(Arg0,ToUUID("0811B06E-4A27-44F9-8D60-3CBBC22E7B48"))) - { - /* APEI support unconditionally */ - Return (Arg3) - } Else { - CreateDWordField (Arg3, Zero, CDW1) - /* Set invalid UUID error bit */ - Or (CDW1, 0x04, CDW1) - Return (Arg3) - } - } - - // - // Two Emulated aarch64 CPUs each with 4 cores - // - Device(CPU0) { // Cluster 0, Cpu 0 - Name(_HID, "ACPI0007") - Name(_UID, 0) - } - Device(CPU1) { // Cluster 0, Cpu 1 - Name(_HID, "ACPI0007") - Name(_UID, 1) - } - Device(CPU2) { // Cluster 0, Cpu 2 - Name(_HID, "ACPI0007") - Name(_UID, 2) - } - Device(CPU3) { // Cluster 0, Cpu 3 - Name(_HID, "ACPI0007") - Name(_UID, 3) - } - Device(CPU4) { // Cluster 1, Cpu 0 - Name(_HID, "ACPI0007") - Name(_UID, 4) - } - Device(CPU5) { // Cluster 1, Cpu 1 - Name(_HID, "ACPI0007") - Name(_UID, 5) - } - Device(CPU6) { // Cluster 1, Cpu 2 - Name(_HID, "ACPI0007") - Name(_UID, 6) - } - Device(CPU7) { // Cluster 1, Cpu 3 - Name(_HID, "ACPI0007") - Name(_UID, 7) - } - - // SMC91X - Device (NET0) { - Name (_HID, "LNRO0003") - Name (_UID, 0) - - Name (_CRS, ResourceTemplate () { - Memory32Fixed (ReadWrite, 0x1a000000, 0x00010000) - Interrupt (ResourceConsumer, Level, ActiveHigh, Exclusive, , , ) {= 0x2F} - }) - } - - // SYSREG - Device (SREG) { - Name (_HID, "LNRO0009") - Name (_UID, 0) - - Method (_CRS, 0x0, Serialized) { - Name (RBUF, ResourceTemplate() { - Memory32Fixed (ReadWrite, 0x1c010000, 0x1000) - }) - Return (RBUF) - } - } - - // VIRTIO - Device (VIRT) { - Name (_HID, "LNRO0005") - Name (_UID, 0) - - Name (_CRS, ResourceTemplate() { - Memory32Fixed (ReadWrite, 0x1c130000, 0x1000) - Interrupt (ResourceConsumer, Level, ActiveHigh, Exclusive) {0x4A} - }) - } - - // UART PL011 - Device(COM0) { - Name(_HID, "ARMH0011") - Name(_CID, "PL011") - Name(_UID, Zero) - - Name(_CRS, ResourceTemplate() { - Memory32Fixed(ReadWrite, 0x1c090000, 0x1000) - Interrupt(ResourceConsumer, Level, ActiveHigh, Exclusive) { 0x25 } - }) - } - } -} diff --git a/Platform/ARM/VExpressPkg/AcpiTables/Fadt.aslc b/Platform/ARM/V= ExpressPkg/AcpiTables/Fadt.aslc deleted file mode 100644 index 4eaec61b32605a992bec09e71021e98ed89d3759..000000000000000000000000000= 0000000000000 --- a/Platform/ARM/VExpressPkg/AcpiTables/Fadt.aslc +++ /dev/null @@ -1,80 +0,0 @@ -/** @file -* Fixed ACPI Description Table (FADT) -* -* Copyright (c) 2012 - 2016, ARM Limited. All rights reserved. -* -* SPDX-License-Identifier: BSD-2-Clause-Patent -* -**/ - -#include "FvpPlatform.h" -#include -#include - -EFI_ACPI_6_1_FIXED_ACPI_DESCRIPTION_TABLE Fadt =3D { - ARM_ACPI_HEADER ( - EFI_ACPI_6_1_FIXED_ACPI_DESCRIPTION_TABLE_SIGNATURE, - EFI_ACPI_6_1_FIXED_ACPI_DESCRIPTION_TABLE, - EFI_ACPI_6_1_FIXED_ACPI_DESCRIPTION_TABLE_REVISION - ), - 0, = // UINT32 FirmwareCtrl - 0, = // UINT32 Dsdt - EFI_ACPI_RESERVED_BYTE, = // UINT8 Reserved0 - EFI_ACPI_6_1_PM_PROFILE_UNSPECIFIED, = // UINT8 PreferredPmProfile - 0, = // UINT16 SciInt - 0, = // UINT32 SmiCmd - 0, = // UINT8 AcpiEnable - 0, = // UINT8 AcpiDisable - 0, = // UINT8 S4BiosReq - 0, = // UINT8 PstateCnt - 0, = // UINT32 Pm1aEvtBlk - 0, = // UINT32 Pm1bEvtBlk - 0, = // UINT32 Pm1aCntBlk - 0, = // UINT32 Pm1bCntBlk - 0, = // UINT32 Pm2CntBlk - 0, = // UINT32 PmTmrBlk - 0, = // UINT32 Gpe0Blk - 0, = // UINT32 Gpe1Blk - 0, = // UINT8 Pm1EvtLen - 0, = // UINT8 Pm1CntLen - 0, = // UINT8 Pm2CntLen - 0, = // UINT8 PmTmrLen - 0, = // UINT8 Gpe0BlkLen - 0, = // UINT8 Gpe1BlkLen - 0, = // UINT8 Gpe1Base - 0, = // UINT8 CstCnt - 0, = // UINT16 PLvl2Lat - 0, = // UINT16 PLvl3Lat - 0, = // UINT16 FlushSize - 0, = // UINT16 FlushStride - 0, = // UINT8 DutyOffset - 0, = // UINT8 DutyWidth - 0, = // UINT8 DayAlrm - 0, = // UINT8 MonAlrm - 0, = // UINT8 Century - 0, = // UINT16 IaPcBootArch - 0, = // UINT8 Reserved1 - EFI_ACPI_6_1_HW_REDUCED_ACPI | EFI_ACPI_6_1_LOW_POWER_S0_IDLE_CAPABLE, = // UINT32 Flags - NULL_GAS, = // EFI_ACPI_5_0_GENERIC_ADDRESS_STRUCTURE ResetReg - 0, = // UINT8 ResetValue - EFI_ACPI_6_1_ARM_PSCI_COMPLIANT, = // UINT16 ArmBootArchFlags - EFI_ACPI_6_1_FIXED_ACPI_DESCRIPTION_TABLE_MINOR_REVISION, = // UINT8 MinorRevision - 0, = // UINT64 XFirmwareCtrl - 0, = // UINT64 XDsdt - NULL_GAS, = // EFI_ACPI_5_0_GENERIC_ADDRESS_STRUCTURE XPm1aEvtBlk - NULL_GAS, = // EFI_ACPI_5_0_GENERIC_ADDRESS_STRUCTURE XPm1bEvtBlk - NULL_GAS, = // EFI_ACPI_5_0_GENERIC_ADDRESS_STRUCTURE XPm1aCntBlk - NULL_GAS, = // EFI_ACPI_5_0_GENERIC_ADDRESS_STRUCTURE XPm1bCntBlk - NULL_GAS, = // EFI_ACPI_5_0_GENERIC_ADDRESS_STRUCTURE XPm2CntBlk - NULL_GAS, = // EFI_ACPI_5_0_GENERIC_ADDRESS_STRUCTURE XPmTmrBlk - NULL_GAS, = // EFI_ACPI_5_0_GENERIC_ADDRESS_STRUCTURE XGpe0Blk - NULL_GAS, = // EFI_ACPI_5_0_GENERIC_ADDRESS_STRUCTURE XGpe1Blk - NULL_GAS, = // EFI_ACPI_5_0_GENERIC_ADDRESS_STRUCTURE SleepControlReg - NULL_GAS = // EFI_ACPI_5_0_GENERIC_ADDRESS_STRUCTURE SleepStatusReg -}; - -// -// Reference the table being generated to prevent the optimizer from remov= ing the -// data structure from the executable -// -VOID* CONST ReferenceAcpiTable =3D &Fadt; diff --git a/Platform/ARM/VExpressPkg/AcpiTables/FvpPlatform.h b/Platform/A= RM/VExpressPkg/AcpiTables/FvpPlatform.h deleted file mode 100644 index 21df93f6eee6f2f0201a08b77369d2955e527d78..000000000000000000000000000= 0000000000000 --- a/Platform/ARM/VExpressPkg/AcpiTables/FvpPlatform.h +++ /dev/null @@ -1,40 +0,0 @@ -/** @file -* -* Copyright (c) 2011-2015, ARM Limited. All rights reserved. -* Copyright (c) 2015, Hisilicon Limited. All rights reserved. -* Copyright (c) 2015, Linaro Limited. All rights reserved. -* -* SPDX-License-Identifier: BSD-2-Clause-Patent -* -* Based on the files under ArmPlatformPkg/ArmJunoPkg/AcpiTables/ -* -**/ - - -#ifndef _FVP_PLATFORM_H_ -#define _FVP_PLATFORM_H_ - -// -// ACPI table information used to initialize tables. -// -#define EFI_ACPI_ARM_OEM_ID 'L','I','N','A','R','O' // OEMID 6= bytes long -#define EFI_ACPI_ARM_OEM_TABLE_ID SIGNATURE_64('R','T','S','M','V','E'= ,'V','8') // OEM table id 8 bytes long -#define EFI_ACPI_ARM_OEM_REVISION 0x00000002 -#define EFI_ACPI_ARM_CREATOR_ID SIGNATURE_32('L','N','R','O') -#define EFI_ACPI_ARM_CREATOR_REVISION 0x00000002 - -// A macro to initialise the common header part of EFI ACPI tables as defi= ned by -// EFI_ACPI_DESCRIPTION_HEADER structure. -#define ARM_ACPI_HEADER(Signature, Type, Revision) { \ - Signature, /* UINT32 Signature */ \ - sizeof (Type), /* UINT32 Length */ \ - Revision, /* UINT8 Revision */ \ - 0, /* UINT8 Checksum */ \ - { EFI_ACPI_ARM_OEM_ID }, /* UINT8 OemId[6] */ \ - EFI_ACPI_ARM_OEM_TABLE_ID, /* UINT64 OemTableId */ \ - EFI_ACPI_ARM_OEM_REVISION, /* UINT32 OemRevision */ \ - EFI_ACPI_ARM_CREATOR_ID, /* UINT32 CreatorId */ \ - EFI_ACPI_ARM_CREATOR_REVISION /* UINT32 CreatorRevision */ \ - } - -#endif diff --git a/Platform/ARM/VExpressPkg/AcpiTables/Gtdt.aslc b/Platform/ARM/V= ExpressPkg/AcpiTables/Gtdt.aslc deleted file mode 100644 index 9007fc936c589295a4cb53ebd25cad3f1ace058e..000000000000000000000000000= 0000000000000 --- a/Platform/ARM/VExpressPkg/AcpiTables/Gtdt.aslc +++ /dev/null @@ -1,169 +0,0 @@ -/** @file -* Generic Timer Description Table (GTDT) -* -* Copyright (c) 2012 - 2018, ARM Limited. All rights reserved. -* Copyright (c) 2016, Linaro Ltd. All rights reserved -* -* SPDX-License-Identifier: BSD-2-Clause-Patent -* -**/ - -#include "FvpPlatform.h" -#include -#include -#include - -#define FVP_SYSTEM_TIMER_BASE_ADDRESS 0x000000002a430000 -#define FVP_CNT_READ_BASE_ADDRESS 0x000000002a800000 - -#define FVP_SECURE_TIMER_EL1_GSIV 0x1D -#define FVP_NON_SECURE_TIMER_EL1_GSIV 0x1E -#define FVP_VIRTUAL_TIMER_GSIV 0x1B -#define FVP_NON_SECURE_EL2_GSIV 0x1A - -#define GTDT_TIMER_EDGE_TRIGGERED EFI_ACPI_6_1_GTDT_TIMER_FLAG_TIMER_INT= ERRUPT_MODE -#define GTDT_TIMER_LEVEL_TRIGGERED 0 -#define GTDT_TIMER_ACTIVE_LOW EFI_ACPI_6_1_GTDT_TIMER_FLAG_TIMER_INT= ERRUPT_POLARITY -#define GTDT_TIMER_ACTIVE_HIGH 0 -#define GTDT_TIMER_SAVE_CONTEXT EFI_ACPI_6_1_GTDT_TIMER_FLAG_ALWAYS_ON= _CAPABILITY -#define GTDT_TIMER_LOSE_CONTEXT 0 - -#define FVP_GTDT_GTIMER_FLAGS (GTDT_TIMER_LOSE_CONTEXT | GTDT_TIMER_= ACTIVE_HIGH | GTDT_TIMER_EDGE_TRIGGERED) - -#define FVP_WATCHDOG_COUNT FixedPcdGet32 (PcdWatchdogCount) -#define FVP_PLATFORM_TIMER_COUNT (FVP_WATCHDOG_COUNT + 1) -#define FVP_TIMER_FRAMES_COUNT 2 - -#define FVP_GT_BLOCK_CTL_BASE 0x000000002A810000 -#define FVP_GT_BLOCK_FRAME0_CTL_BASE 0x000000002A820000 -#define FVP_GT_BLOCK_FRAME0_CTL_EL0_BASE 0xFFFFFFFFFFFFFFFF -#define FVP_GT_BLOCK_FRAME0_GSIV 0x39 - -#define FVP_GT_BLOCK_FRAME1_CTL_BASE 0x000000002A830000 -#define FVP_GT_BLOCK_FRAME1_CTL_EL0_BASE 0xFFFFFFFFFFFFFFFF -#define FVP_GT_BLOCK_FRAME1_GSIV 0x3A - -#define GTX_TIMER_EDGE_TRIGGERED EFI_ACPI_6_1_GTDT_GT_BLOCK_TIMER_FLAG_= TIMER_INTERRUPT_MODE -#define GTX_TIMER_LEVEL_TRIGGERED 0 -#define GTX_TIMER_ACTIVE_LOW EFI_ACPI_6_1_GTDT_GT_BLOCK_TIMER_FLAG_= TIMER_INTERRUPT_POLARITY -#define GTX_TIMER_ACTIVE_HIGH 0 - -#define FVP_GTX_TIMER_FLAGS (GTX_TIMER_ACTIVE_HIGH | GTX_TIMER_LEV= EL_TRIGGERED) - -#define GTX_TIMER_SECURE EFI_ACPI_6_1_GTDT_GT_BLOCK_COMMON_FLAG= _SECURE_TIMER -#define GTX_TIMER_NON_SECURE 0 -#define GTX_TIMER_SAVE_CONTEXT EFI_ACPI_6_1_GTDT_GT_BLOCK_COMMON_FLAG= _ALWAYS_ON_CAPABILITY -#define GTX_TIMER_LOSE_CONTEXT 0 - -#define FVP_GTX_COMMON_FLAGS_S (GTX_TIMER_SAVE_CONTEXT | GTX_TIMER_SE= CURE) -#define FVP_GTX_COMMON_FLAGS_NS (GTX_TIMER_SAVE_CONTEXT | GTX_TIMER_NO= N_SECURE) - -#define FVP_SBSA_WATCHDOG_REFRESH_BASE 0x000000002a450000 -#define FVP_SBSA_WATCHDOG_CONTROL_BASE 0x000000002a440000 -#define FVP_SBSA_WATCHDOG_GSIV 0x3B - -#define SBSA_WATCHDOG_EDGE_TRIGGERED EFI_ACPI_6_1_GTDT_SBSA_GENERIC_WATC= HDOG_FLAG_TIMER_INTERRUPT_MODE -#define SBSA_WATCHDOG_LEVEL_TRIGGERED 0 -#define SBSA_WATCHDOG_ACTIVE_LOW EFI_ACPI_6_1_GTDT_SBSA_GENERIC_WATC= HDOG_FLAG_TIMER_INTERRUPT_POLARITY -#define SBSA_WATCHDOG_ACTIVE_HIGH 0 -#define SBSA_WATCHDOG_SECURE EFI_ACPI_6_1_GTDT_SBSA_GENERIC_WATC= HDOG_FLAG_SECURE_TIMER -#define SBSA_WATCHDOG_NON_SECURE 0 - -#define FVP_SBSA_WATCHDOG_FLAGS (SBSA_WATCHDOG_NON_SECURE | SBS= A_WATCHDOG_ACTIVE_HIGH | SBSA_WATCHDOG_LEVEL_TRIGGERED) - -#pragma pack (1) - -typedef struct { - EFI_ACPI_6_1_GENERIC_TIMER_DESCRIPTION_TABLE Gtdt; - EFI_ACPI_6_1_GTDT_GT_BLOCK_STRUCTURE GtBlock; - EFI_ACPI_6_1_GTDT_GT_BLOCK_TIMER_STRUCTURE Frames[FVP_TIMER_F= RAMES_COUNT]; -#if (FVP_WATCHDOG_COUNT !=3D 0) - EFI_ACPI_6_1_GTDT_SBSA_GENERIC_WATCHDOG_STRUCTURE Watchdogs[FVP_WATC= HDOG_COUNT]; -#endif -} FVP_GENERIC_TIMER_DESCRIPTION_TABLES; - -#pragma pack () - -FVP_GENERIC_TIMER_DESCRIPTION_TABLES Gtdt =3D { - { - ARM_ACPI_HEADER( - EFI_ACPI_6_1_GENERIC_TIMER_DESCRIPTION_TABLE_SIGNATURE, - FVP_GENERIC_TIMER_DESCRIPTION_TABLES, - EFI_ACPI_6_1_GENERIC_TIMER_DESCRIPTION_TABLE_REVISION - ), - FVP_SYSTEM_TIMER_BASE_ADDRESS, // UINT64 Physi= calAddress - EFI_ACPI_RESERVED_DWORD, // UINT32 Reser= ved - FVP_SECURE_TIMER_EL1_GSIV, // UINT32 Secur= ePL1TimerGSIV - FVP_GTDT_GTIMER_FLAGS, // UINT32 Secur= ePL1TimerFlags - FVP_NON_SECURE_TIMER_EL1_GSIV, // UINT32 NonSe= curePL1TimerGSIV - FVP_GTDT_GTIMER_FLAGS, // UINT32 NonSe= curePL1TimerFlags - FVP_VIRTUAL_TIMER_GSIV, // UINT32 Virtu= alTimerGSIV - FVP_GTDT_GTIMER_FLAGS, // UINT32 Virtu= alTimerFlags - FVP_NON_SECURE_EL2_GSIV, // UINT32 NonSe= curePL2TimerGSIV - FVP_GTDT_GTIMER_FLAGS, // UINT32 NonSe= curePL2TimerFlags - FVP_CNT_READ_BASE_ADDRESS, // UINT64 CntRe= adBasePhysicalAddress - FVP_PLATFORM_TIMER_COUNT, // UINT32 Platf= ormTimerCount -#if (FVP_PLATFORM_TIMER_COUNT !=3D 0) - sizeof (EFI_ACPI_6_1_GENERIC_TIMER_DESCRIPTION_TABLE) // UINT32 Platf= romTimerOffset -#else - 0 -#endif - }, - { - EFI_ACPI_6_1_GTDT_GT_BLOCK, // UINT8 Type - sizeof(EFI_ACPI_6_1_GTDT_GT_BLOCK_STRUCTURE) // UINT16 Length - + sizeof(EFI_ACPI_6_1_GTDT_GT_BLOCK_TIMER_STRUCTURE) * - FVP_TIMER_FRAMES_COUNT, - EFI_ACPI_RESERVED_BYTE, // UINT8 Reserved - FVP_GT_BLOCK_CTL_BASE, // UINT64 CntCtl= Base - FVP_TIMER_FRAMES_COUNT, // UINT32 GTBloc= kTimerCount - sizeof(EFI_ACPI_6_1_GTDT_GT_BLOCK_STRUCTURE) // UINT32 GTBloc= kTimerOffset - }, - { - { - 0, // UINT8 GTFra= meNumber - {EFI_ACPI_RESERVED_BYTE, - EFI_ACPI_RESERVED_BYTE, - EFI_ACPI_RESERVED_BYTE}, // UINT8 Reser= ved[3] - FVP_GT_BLOCK_FRAME0_CTL_BASE, // UINT64 CntB= aseX - FVP_GT_BLOCK_FRAME0_CTL_EL0_BASE, // UINT64 CntE= L0BaseX - FVP_GT_BLOCK_FRAME0_GSIV, // UINT32 GTxP= hysicalTimerGSIV - FVP_GTX_TIMER_FLAGS, // UINT32 GTxP= hysicalTimerFlags - 0, // UINT32 GTxV= irtualTimerGSIV - 0, // UINT32 GTxV= irtualTimerFlags - FVP_GTX_COMMON_FLAGS_S // UINT32 GTxC= ommonFlags - }, - { - 1, // UINT8 GTFra= meNumber - {EFI_ACPI_RESERVED_BYTE, - EFI_ACPI_RESERVED_BYTE, - EFI_ACPI_RESERVED_BYTE}, // UINT8 Reser= ved[3] - FVP_GT_BLOCK_FRAME1_CTL_BASE, // UINT64 CntB= aseX - FVP_GT_BLOCK_FRAME1_CTL_EL0_BASE, // UINT64 CntE= L0BaseX - FVP_GT_BLOCK_FRAME1_GSIV, // UINT32 GTxP= hysicalTimerGSIV - FVP_GTX_TIMER_FLAGS, // UINT32 GTxP= hysicalTimerFlags - 0, // UINT32 GTxV= irtualTimerGSIV - 0, // UINT32 GTxV= irtualTimerFlags - FVP_GTX_COMMON_FLAGS_NS // UINT32 GTxC= ommonFlags - } - }, -#if (FVP_WATCHDOG_COUNT !=3D 0) - { - { - EFI_ACPI_6_1_GTDT_SBSA_GENERIC_WATCHDOG, // UINT8 Type - sizeof(EFI_ACPI_6_1_GTDT_SBSA_GENERIC_WATCHDOG_STRUCTURE), // UINT16= Length - EFI_ACPI_RESERVED_BYTE, // UINT8 Res= erved - FVP_SBSA_WATCHDOG_REFRESH_BASE, // UINT64 Re= freshFramePhysicalAddress - FVP_SBSA_WATCHDOG_CONTROL_BASE, // UINT64 Wa= tchdogControlFramePhysicalAddress - FVP_SBSA_WATCHDOG_GSIV, // UINT32 Wa= tchdogTimerGSIV - FVP_SBSA_WATCHDOG_FLAGS // UINT32 Wa= tchdogTimerFlags - } - } -#endif -}; - -// -// Reference the table being generated to prevent the optimizer from remov= ing the -// data structure from the executable -// -VOID* CONST ReferenceAcpiTable =3D &Gtdt; diff --git a/Platform/ARM/VExpressPkg/AcpiTables/Madt.aslc b/Platform/ARM/V= ExpressPkg/AcpiTables/Madt.aslc deleted file mode 100644 index b34422e13f24b6cdf118e80777f2c1763a9fe170..000000000000000000000000000= 0000000000000 --- a/Platform/ARM/VExpressPkg/AcpiTables/Madt.aslc +++ /dev/null @@ -1,85 +0,0 @@ -/** @file -* Multiple APIC Description Table (MADT) -* -* Copyright (c) 2012 - 2015, ARM Limited. All rights reserved. -* Copyright (c) 2016 Linaro Ltd. All rights reserved. -* -* SPDX-License-Identifier: BSD-2-Clause-Patent -* -**/ - -#include "FvpPlatform.h" -#include -#include -#include -#include - -// -// Multiple APIC Description Table -// -#pragma pack (1) - -typedef struct { - EFI_ACPI_6_1_MULTIPLE_APIC_DESCRIPTION_TABLE_HEADER Header; - EFI_ACPI_6_1_GIC_STRUCTURE GicInterfaces[8]; - EFI_ACPI_6_1_GIC_DISTRIBUTOR_STRUCTURE GicDistributor; - EFI_ACPI_6_1_GICR_STRUCTURE Gicr; -} FVP_MULTIPLE_APIC_DESCRIPTION_TABLE; - -#pragma pack () - -FVP_MULTIPLE_APIC_DESCRIPTION_TABLE Madt =3D { - { - ARM_ACPI_HEADER ( - EFI_ACPI_6_1_MULTIPLE_APIC_DESCRIPTION_TABLE_SIGNATURE, - FVP_MULTIPLE_APIC_DESCRIPTION_TABLE, - EFI_ACPI_6_1_MULTIPLE_APIC_DESCRIPTION_TABLE_REVISION - ), - // - // MADT specific fields - // - 0, // LocalApicAddress - 0, // Flags - }, - { - EFI_ACPI_6_0_GICC_STRUCTURE_INIT( - 0, 0, GET_MPID(0, 0), EFI_ACPI_6_0_GIC_ENABLED, 0, FixedPcdGet64 (= PcdGicInterruptInterfaceBase), - 0x2C02F000, 0x2C010000, 0x19, 0, 0), - EFI_ACPI_6_0_GICC_STRUCTURE_INIT( - 1, 1, GET_MPID(0, 1), EFI_ACPI_6_0_GIC_ENABLED, 0, FixedPcdGet64 = (PcdGicInterruptInterfaceBase), - 0x2C02F000, 0x2C010000, 0x19, 0, 0), - EFI_ACPI_6_0_GICC_STRUCTURE_INIT( - 2, 2, GET_MPID(0, 2), EFI_ACPI_6_0_GIC_ENABLED, 0, FixedPcdGet64 = (PcdGicInterruptInterfaceBase), - 0x2C02F000, 0x2C010000, 0x19, 0, 0), - EFI_ACPI_6_0_GICC_STRUCTURE_INIT( - 3, 3, GET_MPID(0, 3), EFI_ACPI_6_0_GIC_ENABLED, 0, FixedPcdGet64 = (PcdGicInterruptInterfaceBase), - 0x2C02F000, 0x2C010000, 0x19, 0, 0), - EFI_ACPI_6_0_GICC_STRUCTURE_INIT( - 4, 4, GET_MPID(1, 0), EFI_ACPI_6_0_GIC_ENABLED, 0, FixedPcdGet64 = (PcdGicInterruptInterfaceBase), - 0x2C02F000, 0x2C010000, 0x19, 0, 0), - EFI_ACPI_6_0_GICC_STRUCTURE_INIT( - 5, 5, GET_MPID(1, 1), EFI_ACPI_6_0_GIC_ENABLED, 0, FixedPcdGet64 = (PcdGicInterruptInterfaceBase), - 0x2C02F000, 0x2C010000, 0x19, 0, 0), - EFI_ACPI_6_0_GICC_STRUCTURE_INIT( - 6, 6, GET_MPID(1, 2), EFI_ACPI_6_0_GIC_ENABLED, 0, FixedPcdGet64 = (PcdGicInterruptInterfaceBase), - 0x2C02F000, 0x2C010000, 0x19, 0, 0), - EFI_ACPI_6_0_GICC_STRUCTURE_INIT( - 7, 7, GET_MPID(1, 3), EFI_ACPI_6_0_GIC_ENABLED, 0, FixedPcdGet64 = (PcdGicInterruptInterfaceBase), - 0x2C02F000, 0x2C010000, 0x19, 0, 0), - }, - EFI_ACPI_6_0_GIC_DISTRIBUTOR_INIT(0, FixedPcdGet64 (PcdGicDistributorBas= e), 0, 3), - /* GIC Redistributor */ - { - EFI_ACPI_6_1_GICR, // UINT8 Type - sizeof(EFI_ACPI_6_1_GICR_STRUCTURE), // UINT8 Length - EFI_ACPI_RESERVED_WORD, // UINT16 Reserved - FixedPcdGet64 (PcdGicRedistributorsBase), // UINT64 DiscoveryRangeBas= eAddress - 0x00200000, // UINT32 DiscoveryRangeLen= gth - } -}; - -// -// Reference the table being generated to prevent the optimizer from remov= ing the -// data structure from the executable -// -VOID* CONST ReferenceAcpiTable =3D &Madt; diff --git a/Platform/ARM/VExpressPkg/AcpiTables/Spcr.aslc b/Platform/ARM/V= ExpressPkg/AcpiTables/Spcr.aslc deleted file mode 100644 index 7a6b635ac7dfcab327b14b0bb057904740aa7b68..000000000000000000000000000= 0000000000000 --- a/Platform/ARM/VExpressPkg/AcpiTables/Spcr.aslc +++ /dev/null @@ -1,82 +0,0 @@ -/** @file -* SPCR Table -* -* Copyright (c) 2014 - 2016, ARM Limited. All rights reserved. -* Copyright (c) 2016, Linaro Ltd. All rights reserved. -* -* SPDX-License-Identifier: BSD-2-Clause-Patent -* -**/ - -#include "FvpPlatform.h" -#include -#include -#include - -/** - * References: - * Serial Port Console Redirection Table Specification Version 1.03 - Augu= st 10, 2015 - **/ - - -/// -/// SPCR Flow Control -/// -#define SPCR_FLOW_CONTROL_NONE 0 - - -STATIC EFI_ACPI_SERIAL_PORT_CONSOLE_REDIRECTION_TABLE Spcr =3D { - ARM_ACPI_HEADER (EFI_ACPI_6_1_SERIAL_PORT_CONSOLE_REDIRECTION_TABLE_SIGN= ATURE, - EFI_ACPI_SERIAL_PORT_CONSOLE_REDIRECTION_TABLE, - EFI_ACPI_SERIAL_PORT_CONSOLE_REDIRECTION_TABLE_REVISI= ON), - // UINT8 InterfaceType; - EFI_ACPI_SERIAL_PORT_CONSOLE_REDIRECTION_TABLE_INTERFACE_TYPE_ARM_PL011_= UART, - // UINT8 Reserved1[3]; - { - EFI_ACPI_RESERVED_BYTE, - EFI_ACPI_RESERVED_BYTE, - EFI_ACPI_RESERVED_BYTE - }, - // EFI_ACPI_5_0_GENERIC_ADDRESS_STRUCTURE BaseAddress; - ARM_GAS32 (0x1C090000), - // UINT8 InterruptType; - EFI_ACPI_SERIAL_PORT_CONSOLE_REDIRECTION_TABLE_INTERRUPT_TYPE_GIC, - // UINT8 Irq; - 0, // Not used on ARM - // UINT32 GlobalSystemInterrupt; - 0x25, - // UINT8 BaudRate; - EFI_ACPI_SERIAL_PORT_CONSOLE_REDIRECTION_TABLE_BAUD_RATE_115200, - // UINT8 Parity; - EFI_ACPI_SERIAL_PORT_CONSOLE_REDIRECTION_TABLE_PARITY_NO_PARITY, - // UINT8 StopBits; - EFI_ACPI_SERIAL_PORT_CONSOLE_REDIRECTION_TABLE_STOP_BITS_1, - // UINT8 FlowControl; - SPCR_FLOW_CONTROL_NONE, - // UINT8 TerminalType; - EFI_ACPI_SERIAL_PORT_CONSOLE_REDIRECTION_TABLE_TERMINAL_TYPE_ANSI, - // UINT8 Reserved2; - EFI_ACPI_RESERVED_BYTE, - // UINT16 PciDeviceId; - 0xFFFF, - // UINT16 PciVendorId; - 0xFFFF, - // UINT8 PciBusNumber; - 0x00, - // UINT8 PciDeviceNumber; - 0x00, - // UINT8 PciFunctionNumber; - 0x00, - // UINT32 PciFlags; - 0x00000000, - // UINT8 PciSegment; - 0x00, - // UINT32 Reserved3; - EFI_ACPI_RESERVED_DWORD -}; - -// -// Reference the table being generated to prevent the optimizer from remov= ing the -// data structure from the executable -// -VOID* CONST ReferenceAcpiTable =3D &Spcr; diff --git a/Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.dsc b/Platfor= m/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.dsc index 12562ceafd8ab020d61d4ba70fdd6c8c128da6a2..ccef0839570cdceb23d7ad68f1c= a022f6276e427 100644 --- a/Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.dsc +++ b/Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.dsc @@ -30,12 +30,9 @@ [Defines] !endif =20 DT_SUPPORT =3D FALSE - DYNAMIC_TABLES_FRAMEWORK =3D TRUE =20 !include Platform/ARM/VExpressPkg/ArmVExpress.dsc.inc -!ifdef DYNAMIC_TABLES_FRAMEWORK - !include DynamicTablesPkg/DynamicTables.dsc.inc -!endif +!include DynamicTablesPkg/DynamicTables.dsc.inc =20 [LibraryClasses.common] ArmLib|ArmPkg/Library/ArmLib/ArmBaseLib.inf @@ -284,16 +281,11 @@ [Components.common] !endif } =20 -!ifndef DYNAMIC_TABLES_FRAMEWORK - MdeModulePkg/Universal/Acpi/AcpiPlatformDxe/AcpiPlatformDxe.inf - Platform/ARM/VExpressPkg/AcpiTables/AcpiTables.inf -!else Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDxe/Co= nfigurationManagerDxe.inf { gEfiMdeModulePkgTokenSpaceGuid.PcdSerialRegisterBase|0x1c090000 gArmPlatformTokenSpaceGuid.PL011UartInterrupt|0x25 } -!endif =20 ArmPkg/Drivers/ArmGic/ArmGicDxe.inf ArmPlatformPkg/Drivers/NorFlashDxe/NorFlashDxe.inf diff --git a/Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.fdf b/Platfor= m/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.fdf index 418566673981a9655fbc7a834942443a2005c403..7635cb7a8406bca4b5ff60ab7ac= 1774db40ee6fc 100644 --- a/Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.fdf +++ b/Platform/ARM/VExpressPkg/ArmVExpress-FVP-AArch64.fdf @@ -92,10 +92,7 @@ [FV.FvMain] # ACPI Support # INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf -!ifndef DYNAMIC_TABLES_FRAMEWORK - INF MdeModulePkg/Universal/Acpi/AcpiPlatformDxe/AcpiPlatformDxe.inf - INF RuleOverride=3DACPITABLE Platform/ARM/VExpressPkg/AcpiTables/AcpiTab= les.inf -!else + # Configuration Manager INF Platform/ARM/VExpressPkg/ConfigurationManager/ConfigurationManagerDx= e/ConfigurationManagerDxe.inf =20 @@ -103,7 +100,6 @@ [FV.FvMain] # Dynamic Table fdf # !include DynamicTablesPkg/DynamicTables.fdf.inc -!endif =20 # # Multiple Console IO support @@ -341,10 +337,3 @@ [Rule.Common.UEFI_APPLICATION.BINARY] VERSION STRING=3D"$(INF_VERSION)" Optional BUILD_NUM=3D$(BUILD_NUMBE= R) } =20 -!ifndef DYNAMIC_TABLES_FRAMEWORK -[Rule.Common.USER_DEFINED.ACPITABLE] - FILE FREEFORM =3D $(NAMED_GUID) { - RAW ACPI |.acpi - RAW ASL |.aml - } -!endif --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#71638): https://edk2.groups.io/g/devel/message/71638 Mute This Topic: https://groups.io/mt/80580216/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-