From nobody Fri Dec 19 20:14:34 2025 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+71636+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=arm.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1613125452704433.2438400222128; Fri, 12 Feb 2021 02:24:12 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id tom4YY1788612xQtC7Ed8EQ5; Fri, 12 Feb 2021 02:24:12 -0800 X-Received: from EUR05-AM6-obe.outbound.protection.outlook.com (EUR05-AM6-obe.outbound.protection.outlook.com [40.107.22.69]) by mx.groups.io with SMTP id smtpd.web10.1905.1613125451403033700 for ; Fri, 12 Feb 2021 02:24:11 -0800 X-Received: from DU2PR04CA0211.eurprd04.prod.outlook.com (2603:10a6:10:2b1::6) by AM0PR08MB3153.eurprd08.prod.outlook.com (2603:10a6:208:59::32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.26; Fri, 12 Feb 2021 10:24:07 +0000 X-Received: from DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:2b1:cafe::8d) by DU2PR04CA0211.outlook.office365.com (2603:10a6:10:2b1::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27 via Frontend Transport; Fri, 12 Feb 2021 10:24:07 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; edk2.groups.io; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+71636+1787277+3901457@groups.io; helo=mail02.groups.io; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; X-Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT019.mail.protection.outlook.com (10.152.20.163) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:24:07 +0000 X-Received: ("Tessian outbound 8418c949a3fa:v71"); Fri, 12 Feb 2021 10:24:07 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 8e52d33856e7ffc6 X-CR-MTA-TID: 64aa7808 X-Received: from 9a23eea08b42.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id EA1CD7B1-60E3-41A2-BFD7-2D6A3279856C.1; Fri, 12 Feb 2021 10:23:48 +0000 X-Received: from EUR03-AM5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 9a23eea08b42.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 12 Feb 2021 10:23:48 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AWWVKpB4BiZ8lLMRsHTDV03znLm8fJzez6CxMZBXO+kpmpA4tganrDnIeXEyy9sEK5MVSTK6hWyod1OTn3RJF5I3bQ0kIY2LvITqe9Qxy8O+1pQ91HPGZ+FoHcuUUhRnO01IpD8v2mrJaF0B9B6/8qKE1WKCfgInkJgPFr8mrxAVg6McQJzXG22Xb2Mmno4ztalpcqzOKy712Abo2r3MA5apSEef31PU8se8d6PKDIZktz+0Fc6AFRjBpWglHcsG8Uq1rcwg65KHs0WIfN102qUtQZDBnZdU3b+7xs1F28nHIwW2gYoXYvg2P6QvQ2jHLcJhC9yownFu7BsXG44fJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7SquzAohMrJ2uIKP4BIjKkuB8zKtAjILlJ3HFOr1584=; b=iTI1VegqOIr3WnCjMvm2UYhHB8PjWFAlYorFPdwRqc+/FRwOnCAd1PqXupG/60NeHH9cAm7cIdYSE9xbGiUAZ8ui2UUNILfqI7uPGjmURveNnXG949xRbp1wMmbm1wZqW5RiPWiX4uerXOGkozQ/MwOJ9GBflY17y+iw4OkQjzhAO5EA604QEHOVznLneNZ4NeCaPAStoQkc54GvIxk+QvT4ou+o/HSGr8tXwv3Xl6F9PwLTcY0QCmmdlfXfRkXNImdwWNhYt7A/x0R2x+A44O5p8u6zsF1Eos8pit7EACK+lowkJPrTLE7d6O9y6lYJbJg4i3iVJ1MQgNICWdraAg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none X-Received: from DB6PR0601CA0012.eurprd06.prod.outlook.com (2603:10a6:4:7b::22) by AM0PR08MB5508.eurprd08.prod.outlook.com (2603:10a6:208:186::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27; Fri, 12 Feb 2021 10:23:47 +0000 X-Received: from DB5EUR03FT037.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:7b:cafe::5a) by DB6PR0601CA0012.outlook.office365.com (2603:10a6:4:7b::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:47 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; X-Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT037.mail.protection.outlook.com (10.152.20.215) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3846.25 via Frontend Transport; Fri, 12 Feb 2021 10:23:47 +0000 X-Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2044.4; Fri, 12 Feb 2021 10:23:44 +0000 X-Received: from E107187.Arm.com (10.57.49.120) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server id 15.1.2044.4 via Frontend Transport; Fri, 12 Feb 2021 10:23:43 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , Subject: [edk2-devel] [PATCH edk2-platforms v1 02/12] Platform/ARM/VExpressPkg: Add PCIe Host Bridge lib for FVP Date: Fri, 12 Feb 2021 10:23:31 +0000 Message-ID: <20210212102341.24056-3-sami.mujawar@arm.com> In-Reply-To: <20210212102341.24056-1-sami.mujawar@arm.com> References: <20210212102341.24056-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-Office365-Filtering-HT: Tenant X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 1224e19c-9a45-4b89-bb07-08d8cf405486 X-MS-TrafficTypeDiagnostic: AM0PR08MB5508:|AM0PR08MB3153: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:1388;OLM:1388; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(376002)(39860400002)(346002)(396003)(136003)(36840700001)(46966006)(70206006)(8676002)(6666004)(47076005)(2906002)(4326008)(356005)(54906003)(44832011)(82740400003)(82310400003)(8936002)(426003)(336012)(2616005)(7696005)(5660300002)(26005)(86362001)(186003)(6916009)(316002)(1076003)(81166007)(70586007)(36860700001)(478600001)(19627235002)(36756003)(36900700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB5508 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: 8855951f-cca0-458b-ada2-08d8cf404850 X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Feb 2021 10:24:07.5817 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 1224e19c-9a45-4b89-bb07-08d8cf405486 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3153 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,sami.mujawar@arm.com X-Gm-Message-State: owxxIOtbzhiVCNxVLrFUMJFGx1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1613125452; bh=ugcT7J9Ne1e6ixudq88WYLzUYUSeDNFNTuQgM/lQgHU=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=NUCVx22vRR1XPXdWfKvNnth8e7dZwyimh3eYuvGBBLoS2XgzZg1OFhq4seAeZVIrxuj lArWbL7OZ65X7bNdr92ImSa0M/Qv3uJLmtFsOxTdEHq2TdOZe/9SaASmZMQJPDBFWw4Qq u1SSrcHiULrKxABsiAY7wOAsbfppPKbnIpw= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The Base Platform RevC (FVP_Base_RevC-2xAEMv8A model) includes a PCI subsystem. It has a PCIe config region and two PCIe memory regions. To enable PCIe support for the FVP RevC model add an instance of the PCIe Host Bridge library. Signed-off-by: Sami Mujawar --- Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/ArmVExpressPc= iHostBridgeLib.c | 208 ++++++++++++++++++++ Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/ArmVExpressPc= iHostBridgeLib.inf | 48 +++++ Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/ArmVExpressPc= iHostBridgeLib.uni | 14 ++ 3 files changed, 270 insertions(+) diff --git a/Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/A= rmVExpressPciHostBridgeLib.c b/Platform/ARM/VExpressPkg/Library/ArmVExpress= PciHostBridgeLib/ArmVExpressPciHostBridgeLib.c new file mode 100644 index 0000000000000000000000000000000000000000..54add33b8912db93aaa634907c6= 25a032436f106 --- /dev/null +++ b/Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/ArmVExpr= essPciHostBridgeLib.c @@ -0,0 +1,208 @@ +/** @file + PCI Host Bridge Library instance for ARM FVP Model + + Copyright (c) 2021, Arm Ltd. All rights reserved.
+ + SPDX-License-Identifier: BSD-2-Clause-Patent +**/ +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#pragma pack(1) + +/** A structure describing the PCI root bridge device path. +*/ +typedef struct { + /// ACPI Device path. + ACPI_HID_DEVICE_PATH AcpiDevicePath; + /// END Device Path tag. + EFI_DEVICE_PATH_PROTOCOL EndDevicePath; +} EFI_PCI_ROOT_BRIDGE_DEVICE_PATH; + +#pragma pack () + +STATIC EFI_PCI_ROOT_BRIDGE_DEVICE_PATH mEfiPciRootBridgeDevicePath =3D { + // ACPI device path + { + { + ACPI_DEVICE_PATH, + ACPI_DP, + { + (UINT8)(sizeof (ACPI_HID_DEVICE_PATH)), + (UINT8)((sizeof (ACPI_HID_DEVICE_PATH)) >> 8) + } + }, + EISA_PNP_ID (0x0A08), // PCIe + 0 + }, + // End device path tag + { + END_DEVICE_PATH_TYPE, + END_ENTIRE_DEVICE_PATH_SUBTYPE, + { + END_DEVICE_PATH_LENGTH, + 0 + } + } +}; + +STATIC PCI_ROOT_BRIDGE mRootBridge =3D { + 0, // Segment + 0, // Supports + 0, // Attributes + FALSE, // DmaAbove4G + FALSE, // NoExtendedConfigSpace + FALSE, // ResourceAssigned + EFI_PCI_HOST_BRIDGE_COMBINE_MEM_PMEM | // AllocationAttributes + EFI_PCI_HOST_BRIDGE_MEM64_DECODE, + { + // Bus + FixedPcdGet32 (PcdPciBusMin), + FixedPcdGet32 (PcdPciBusMax) + }, + { + // Io + FixedPcdGet64 (PcdPciIoBase), + FixedPcdGet64 (PcdPciIoBase) + FixedPcdGet64 (PcdPciIoSize) - 1 + }, + { + // Mem + FixedPcdGet32 (PcdPciMmio32Base), + FixedPcdGet32 (PcdPciMmio32Base) + FixedPcdGet32 (PcdPciMmio32Size) - 1 + }, + { + // MemAbove4G + FixedPcdGet64 (PcdPciMmio64Base), + FixedPcdGet64 (PcdPciMmio64Base) + FixedPcdGet64 (PcdPciMmio64Size) - 1 + }, + { + // PMem + MAX_UINT64, + 0 + }, + { + // PMemAbove4G + MAX_UINT64, + 0 + }, + (EFI_DEVICE_PATH_PROTOCOL *)&mEfiPciRootBridgeDevicePath +}; + +#ifndef MDEPKG_NDEBUG +STATIC CONST CHAR16 mAcpiAddrSpaceTypeStr[][4] =3D { + L"Mem", L"I/O", L"Bus" +}; +#endif + +/** + Return all the root bridge instances in an array. + + @param [out] Count Return the count of root bridge instances. + + @returns All the root bridge instances in an array. + The array should be passed into PciHostBridgeFreeRootBridges() + when it's not used. +**/ +PCI_ROOT_BRIDGE * +EFIAPI +PciHostBridgeGetRootBridges ( + OUT UINTN *Count + ) +{ + UINT32 SysId; + + // Check if the platform is FVP RevC + SysId =3D MmioRead32 (ARM_VE_SYS_ID_REG); + if ((SysId & ARM_FVP_SYS_ID_REV_MASK) =3D=3D ARM_FVP_BASE_REVC_REV) { + // There is a single Root Bridge instance on the FVP RevC Model + *Count =3D 1; + return &mRootBridge; + } + + // Other FVP models do not have PCIe + *Count =3D 0; + return NULL; +} + +/** + Free the root bridge instances array returned + from PciHostBridgeGetRootBridges(). + + @param [in] Bridges The root bridge instances array. + @param [in] Count The count of the array. +**/ +VOID +EFIAPI +PciHostBridgeFreeRootBridges ( + IN PCI_ROOT_BRIDGE *Bridges, + IN UINTN Count + ) +{ +} + +/** + Inform the platform that the resource conflict happens. + + @param [in] HostBridgeHandle Handle of the Host Bridge. + @param [in] Configuration Pointer to PCI I/O and PCI memory resource + descriptors. The Configuration contains the + resources for all the root bridges. The + resource for each root bridge is terminated + with END descriptor and an additional END = is + appended indicating the end of the entire + resources. The resource descriptor field + values follow the description in + EFI_PCI_HOST_BRIDGE_RESOURCE_ALLOCATION_PR= OTOCOL + .SubmitResources(). +**/ +VOID +EFIAPI +PciHostBridgeResourceConflict ( + IN EFI_HANDLE HostBridgeHandle, + IN VOID *Configuration + ) +{ + EFI_ACPI_ADDRESS_SPACE_DESCRIPTOR *Descriptor; + UINTN RootBridgeIndex; + + DEBUG ((DEBUG_ERROR, "PciHostBridge: Resource conflict happens!\n")); + + RootBridgeIndex =3D 0; + Descriptor =3D (EFI_ACPI_ADDRESS_SPACE_DESCRIPTOR *) Configuration; + while (Descriptor->Desc =3D=3D ACPI_ADDRESS_SPACE_DESCRIPTOR) { + DEBUG ((DEBUG_ERROR, "RootBridge[%d]:\n", RootBridgeIndex++)); + for (; Descriptor->Desc =3D=3D ACPI_ADDRESS_SPACE_DESCRIPTOR; Descript= or++) { + ASSERT (Descriptor->ResType < ARRAY_SIZE (mAcpiAddrSpaceTypeStr)); + DEBUG (( + DEBUG_ERROR, + " %s: Length/Alignment =3D 0x%lx / 0x%lx\n", + mAcpiAddrSpaceTypeStr[Descriptor->ResType], + Descriptor->AddrLen, Descriptor->AddrRangeMax + )); + if (Descriptor->ResType =3D=3D ACPI_ADDRESS_SPACE_TYPE_MEM) { + DEBUG (( + DEBUG_ERROR, + " Granularity/SpecificFlag =3D %ld / %02x%s\n", + Descriptor->AddrSpaceGranularity, + Descriptor->SpecificFlag, + ((Descriptor->SpecificFlag & + EFI_ACPI_MEMORY_RESOURCE_SPECIFIC_FLAG_CACHEABLE_PREFETCHABLE + ) !=3D 0) ? L" (Prefetchable)" : L"" + )); + } + } + + // Skip the END descriptor for root bridge + ASSERT (Descriptor->Desc =3D=3D ACPI_END_TAG_DESCRIPTOR); + Descriptor =3D (EFI_ACPI_ADDRESS_SPACE_DESCRIPTOR *)( + (EFI_ACPI_END_TAG_DESCRIPTOR *)Descriptor + 1 + ); + } +} diff --git a/Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/A= rmVExpressPciHostBridgeLib.inf b/Platform/ARM/VExpressPkg/Library/ArmVExpre= ssPciHostBridgeLib/ArmVExpressPciHostBridgeLib.inf new file mode 100644 index 0000000000000000000000000000000000000000..e5080074e2e96f258b004a086ec= 61af8cc263fd6 --- /dev/null +++ b/Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/ArmVExpr= essPciHostBridgeLib.inf @@ -0,0 +1,48 @@ +## @file +# PCI Host Bridge Library instance for ARM FVP Model +# +# Copyright (c) 2021, Arm Ltd. All rights reserved.
+# +# SPDX-License-Identifier: BSD-2-Clause-Patent +## + +[Defines] + INF_VERSION =3D 0x0001001B + BASE_NAME =3D ArmVExpressPciHostBridgeLib + MODULE_UNI_FILE =3D ArmVExpressPciHostBridgeLib.uni + FILE_GUID =3D 4226FB49-3049-4A60-AF7A-90B6DBD4BF26 + MODULE_TYPE =3D DXE_DRIVER + VERSION_STRING =3D 1.0 + LIBRARY_CLASS =3D PciHostBridgeLib + +# +# The following information is for reference only and not required by the = build +# tools. +# +# VALID_ARCHITECTURES =3D AARCH64 ARM +# + +[Sources] + ArmVExpressPciHostBridgeLib.c + +[Packages] + ArmPkg/ArmPkg.dec + MdeModulePkg/MdeModulePkg.dec + MdePkg/MdePkg.dec + Platform/ARM/VExpressPkg/ArmVExpressPkg.dec + +[LibraryClasses] + IoLib + +[FixedPcd] + gArmTokenSpaceGuid.PcdPciBusMin + gArmTokenSpaceGuid.PcdPciBusMax + + gArmTokenSpaceGuid.PcdPciIoBase + gArmTokenSpaceGuid.PcdPciIoSize + + gArmTokenSpaceGuid.PcdPciMmio32Base + gArmTokenSpaceGuid.PcdPciMmio32Size + + gArmTokenSpaceGuid.PcdPciMmio64Base + gArmTokenSpaceGuid.PcdPciMmio64Size diff --git a/Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/A= rmVExpressPciHostBridgeLib.uni b/Platform/ARM/VExpressPkg/Library/ArmVExpre= ssPciHostBridgeLib/ArmVExpressPciHostBridgeLib.uni new file mode 100644 index 0000000000000000000000000000000000000000..8913c7fea0d825dabc436eb3b70= 29e84bf08167f --- /dev/null +++ b/Platform/ARM/VExpressPkg/Library/ArmVExpressPciHostBridgeLib/ArmVExpr= essPciHostBridgeLib.uni @@ -0,0 +1,14 @@ +// /** @file +// Instance of PCI Host Bridge Library for FVP Platform. +// +// Copyright (c) 2021, Arm Ltd. All rights reserved.
+// +// SPDX-License-Identifier: BSD-2-Clause-Patent +// +// **/ + +#langdef en-US "English" + +#string STR_MODULE_ABSTRACT #language en-US "Instance of PCI Host Brid= ge Library for FVP Platform." + +#string STR_MODULE_DESCRIPTION #language en-US "Instance of PCI Host Brid= ge Library for FVP Platform." --=20 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)' -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#71636): https://edk2.groups.io/g/devel/message/71636 Mute This Topic: https://groups.io/mt/80580212/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-