]> git.proxmox.com Git - mirror_edk2.git/blame - Vlv2TbltDevicePkg/PlatformPkg.fdf
Vlv2TbltDevicePkg: Use CpuDxe from UefiCpuPkg
[mirror_edk2.git] / Vlv2TbltDevicePkg / PlatformPkg.fdf
CommitLineData
5e752084 1#/** @file\r
2# FDF file of Platform.\r
3#\r
d0274122 4# Copyright (c) 2008 - 2019, Intel Corporation. All rights reserved.<BR>\r
5e752084 5#\r
9dc8036d 6# SPDX-License-Identifier: BSD-2-Clause-Patent\r
5e752084 7#\r
8#\r
9#**/\r
10\r
11[Defines]\r
12DEFINE FLASH_BASE = 0xFFC00000 #The base address of the 4Mb FLASH Device.\r
13DEFINE FLASH_SIZE = 0x00400000 #The flash size in bytes of the 4Mb FLASH Device.\r
14DEFINE FLASH_BLOCK_SIZE = 0x1000 #The block size in bytes of the 4Mb FLASH Device.\r
15DEFINE FLASH_NUM_BLOCKS = 0x400 #The number of blocks in 4Mb FLASH Device.\r
16DEFINE FLASH_AREA_BASE_ADDRESS = 0xFF800000\r
17DEFINE FLASH_AREA_SIZE = 0x00800000\r
18\r
19DEFINE FLASH_REGION_VLVMICROCODE_OFFSET = 0x00000000\r
20DEFINE FLASH_REGION_VLVMICROCODE_SIZE = 0x00040000\r
21DEFINE FLASH_REGION_VLVMICROCODE_BASE = 0xFFC00000\r
22\r
988715a3 23DEFINE FLASH_REGION_VPD_OFFSET = 0x00040000\r
5e752084 24DEFINE FLASH_REGION_VPD_SIZE = 0x0003E000\r
25\r
988715a3 26DEFINE FLASH_REGION_NVSTORAGE_SUBREGION_NV_FTW_WORKING_OFFSET = 0x0007E000\r
5e752084 27DEFINE FLASH_REGION_NVSTORAGE_SUBREGION_NV_FTW_WORKING_SIZE = 0x00002000\r
28\r
29\r
988715a3 30DEFINE FLASH_REGION_NVSTORAGE_SUBREGION_NV_FTW_SPARE_OFFSET = 0x00080000\r
5e752084 31DEFINE FLASH_REGION_NVSTORAGE_SUBREGION_NV_FTW_SPARE_SIZE = 0x00040000\r
32\r
33!if $(MINNOW2_FSP_BUILD) == TRUE\r
988715a3 34DEFINE FLASH_REGION_FSPBIN_OFFSET = 0x000C0000\r
5e752084 35DEFINE FLASH_REGION_FSPBIN_SIZE = 0x00048000\r
988715a3 36DEFINE FLASH_REGION_FSPBIN_BASE = 0xFFCC0000\r
5e752084 37\r
988715a3 38DEFINE FLASH_REGION_AZALIABIN_OFFSET = 0x00108000\r
5e752084 39DEFINE FLASH_REGION_AZALIABIN_SIZE = 0x00008000\r
988715a3 40DEFINE FLASH_REGION_AZALIABIN_BASE = 0xFFD08000\r
5e752084 41\r
42!endif\r
43\r
988715a3 44DEFINE FLASH_REGION_FVMAIN_OFFSET = 0x00110000\r
45DEFINE FLASH_REGION_FVMAIN_SIZE = 0x00210000\r
5e752084 46\r
988715a3 47DEFINE FLASH_REGION_FV_RECOVERY2_OFFSET = 0x00320000\r
48DEFINE FLASH_REGION_FV_RECOVERY2_SIZE = 0x00070000\r
5e752084 49\r
988715a3 50DEFINE FLASH_REGION_FV_RECOVERY_OFFSET = 0x00390000\r
51DEFINE FLASH_REGION_FV_RECOVERY_SIZE = 0x00070000\r
5e752084 52\r
53################################################################################\r
54#\r
55# FD Section\r
56# The [FD] Section is made up of the definition statements and a\r
57# description of what goes into the Flash Device Image. Each FD section\r
58# defines one flash "device" image. A flash device image may be one of\r
59# the following: Removable media bootable image (like a boot floppy\r
60# image,) an Option ROM image (that would be "flashed" into an add-in\r
61# card,) a System "Flash" image (that would be burned into a system's\r
62# flash) or an Update ("Capsule") image that will be used to update and\r
63# existing system flash.\r
64#\r
65################################################################################\r
66[FD.Vlv]\r
67BaseAddress = $(FLASH_BASE)|gPlatformModuleTokenSpaceGuid.PcdFlashAreaBaseAddress #The base address of the 3Mb FLASH Device.\r
68Size = $(FLASH_SIZE)|gPlatformModuleTokenSpaceGuid.PcdFlashAreaSize #The flash size in bytes of the 3Mb FLASH Device.\r
69ErasePolarity = 1\r
70BlockSize = $(FLASH_BLOCK_SIZE) #The block size in bytes of the 3Mb FLASH Device.\r
71NumBlocks = $(FLASH_NUM_BLOCKS) #The number of blocks in 3Mb FLASH Device.\r
72\r
73#\r
74#Flash location override based on actual flash map\r
75#\r
76SET gPlatformModuleTokenSpaceGuid.PcdFlashAreaBaseAddress = $(FLASH_AREA_BASE_ADDRESS)\r
77SET gPlatformModuleTokenSpaceGuid.PcdFlashAreaSize = $(FLASH_AREA_SIZE)\r
78\r
c5a59080
JY
79SET gUefiCpuPkgTokenSpaceGuid.PcdCpuMicrocodePatchAddress = $(FLASH_REGION_VLVMICROCODE_BASE) + 0x60\r
80SET gUefiCpuPkgTokenSpaceGuid.PcdCpuMicrocodePatchRegionSize = $(FLASH_REGION_VLVMICROCODE_SIZE) - 0x60\r
81\r
5e752084 82!if $(MINNOW2_FSP_BUILD) == TRUE\r
83# put below PCD value setting into dsc file\r
84#SET gFspWrapperTokenSpaceGuid.PcdCpuMicrocodePatchAddress = $(FLASH_REGION_VLVMICROCODE_BASE)\r
85#SET gFspWrapperTokenSpaceGuid.PcdCpuMicrocodePatchRegionSize = $(FLASH_REGION_VLVMICROCODE_SIZE)\r
86#SET gFspWrapperTokenSpaceGuid.PcdFlashMicroCodeOffset = 0x60\r
87#SET gFspWrapperTokenSpaceGuid.PcdFlashCodeCacheAddress = $(FLASH_AREA_BASE_ADDRESS)\r
88#SET gFspWrapperTokenSpaceGuid.PcdFlashCodeCacheSize = $(FLASH_AREA_SIZE)\r
89#SET gFspWrapperTokenSpaceGuid.PcdFlashFvFspBase = $(FLASH_REGION_FSPBIN_BASE)\r
90#SET gFspWrapperTokenSpaceGuid.PcdFlashFvFspSize = $(FLASH_REGION_FSPBIN_SIZE)\r
91\r
92!endif\r
93################################################################################\r
94#\r
95# Following are lists of FD Region layout which correspond to the locations of different\r
96# images within the flash device.\r
97#\r
98# Regions must be defined in ascending order and may not overlap.\r
99#\r
100# A Layout Region start with a eight digit hex offset (leading "0x" required) followed by\r
101# the pipe "|" character, followed by the size of the region, also in hex with the leading\r
102# "0x" characters. Like:\r
103# Offset|Size\r
104# PcdOffsetCName|PcdSizeCName\r
105# RegionType <FV, DATA, or FILE>\r
106# Fv Size can be adjusted; FVMAIN_COMPACT can be reduced to 0x120000, and FV_RECOVERY can be enlarged to 0x80000\r
107#\r
108################################################################################\r
109 #\r
110 # CPU Microcodes\r
111 #\r
112\r
113$(FLASH_REGION_VLVMICROCODE_OFFSET)|$(FLASH_REGION_VLVMICROCODE_SIZE)\r
114gPlatformModuleTokenSpaceGuid.PcdFlashMicroCodeAddress|gPlatformModuleTokenSpaceGuid.PcdFlashMicroCodeSize\r
115FV = MICROCODE_FV\r
116$(FLASH_REGION_VPD_OFFSET)|$(FLASH_REGION_VPD_SIZE)\r
117gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize\r
118#NV_VARIABLE_STORE\r
119DATA = {\r
120 ## This is the EFI_FIRMWARE_VOLUME_HEADER\r
121 # ZeroVector []\r
122 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
123 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
124 # FileSystemGuid: gEfiSystemNvDataFvGuid =\r
125 # { 0xFFF12B8D, 0x7696, 0x4C8B, { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }}\r
126 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C,\r
127 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50,\r
128 # FvLength: 0x80000\r
129 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00,\r
130 #Signature "_FVH" #Attributes\r
131 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00,\r
132 #HeaderLength #CheckSum #ExtHeaderOffset #Reserved #Revision\r
133 0x48, 0x00, 0x2A, 0x09, 0x00, 0x00, 0x00, 0x02,\r
134 #Blockmap[0]: 7 Blocks * 0x10000 Bytes / Block\r
135 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00,\r
136 #Blockmap[1]: End\r
137 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
138 ## This is the VARIABLE_STORE_HEADER\r
139!if $(SECURE_BOOT_ENABLE) == TRUE\r
140 #Signature: gEfiAuthenticatedVariableGuid =\r
141 # { 0xaaf32c78, 0x947b, 0x439a, { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }}\r
142 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43,\r
143 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92,\r
144!else\r
145 #Signature: gEfiVariableGuid =\r
146 # { 0xddcf3616, 0x3275, 0x4164, { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }}\r
147 0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41,\r
148 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d,\r
149!endif\r
150 #Size: 0x3E000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) - 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0x03DFB8\r
151 # This can speed up the Variable Dispatch a bit.\r
152 0xB8, 0xDF, 0x03, 0x00,\r
153 #FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32\r
154 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r
155}\r
156\r
157\r
158$(FLASH_REGION_NVSTORAGE_SUBREGION_NV_FTW_WORKING_OFFSET)|$(FLASH_REGION_NVSTORAGE_SUBREGION_NV_FTW_WORKING_SIZE)\r
159gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize\r
160#NV_FTW_WORKING\r
161DATA = {\r
162 # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =\r
163 # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}\r
164 0x2B, 0x29, 0x58, 0x9E, 0x68, 0x7C, 0x7D, 0x49,\r
165 0xA0, 0xCE, 0x65, 0x0, 0xFD, 0x9F, 0x1B, 0x95,\r
166\r
167 # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved\r
168 0xE2, 0x33, 0xF2, 0x3, 0xFE, 0xFF, 0xFF, 0xFF,\r
169 # WriteQueueSize: UINT64 #Size: 0x2000 - 0x20 (FTW_WORKING_HEADER) = 0x1FE0\r
170 0xE0, 0x1F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r
171}\r
172\r
173$(FLASH_REGION_NVSTORAGE_SUBREGION_NV_FTW_SPARE_OFFSET)|$(FLASH_REGION_NVSTORAGE_SUBREGION_NV_FTW_SPARE_SIZE)\r
174gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize\r
175\r
176!if $(MINNOW2_FSP_BUILD) == TRUE\r
177\r
178 $(FLASH_REGION_FSPBIN_OFFSET)|$(FLASH_REGION_FSPBIN_SIZE)\r
179 gFspWrapperTokenSpaceGuid.PcdFlashFvFspBase|gFspWrapperTokenSpaceGuid.PcdFlashFvFspSize\r
46002a4a 180 FILE = Vlv2SocBinPkg/FspBinary/FvFsp.bin\r
5e752084 181\r
182\r
183 $(FLASH_REGION_AZALIABIN_OFFSET)|$(FLASH_REGION_AZALIABIN_SIZE)\r
184 FILE = Vlv2TbltDevicePkg/FspAzaliaConfigData/AzaliaConfig.bin\r
185\r
186!endif\r
187\r
188 #\r
189 # Main Block\r
190 #\r
191$(FLASH_REGION_FVMAIN_OFFSET)|$(FLASH_REGION_FVMAIN_SIZE)\r
192gPlatformModuleTokenSpaceGuid.PcdFlashFvMainBase|gPlatformModuleTokenSpaceGuid.PcdFlashFvMainSize\r
193FV = FVMAIN_COMPACT\r
194\r
195 #\r
196 # FV Recovery#2\r
197 #\r
198$(FLASH_REGION_FV_RECOVERY2_OFFSET)|$(FLASH_REGION_FV_RECOVERY2_SIZE)\r
199gPlatformModuleTokenSpaceGuid.PcdFlashFvRecovery2Base|gPlatformModuleTokenSpaceGuid.PcdFlashFvRecovery2Size\r
200FV = FVRECOVERY2\r
201\r
202 #\r
203 # FV Recovery\r
204 #\r
205$(FLASH_REGION_FV_RECOVERY_OFFSET)|$(FLASH_REGION_FV_RECOVERY_SIZE)\r
206gPlatformModuleTokenSpaceGuid.PcdFlashFvRecoveryBase|gPlatformModuleTokenSpaceGuid.PcdFlashFvRecoverySize\r
207FV = FVRECOVERY\r
208\r
209################################################################################\r
210#\r
211# FV Section\r
212#\r
213# [FV] section is used to define what components or modules are placed within a flash\r
214# device file. This section also defines order the components and modules are positioned\r
215# within the image. The [FV] section consists of define statements, set statements and\r
216# module statements.\r
217#\r
218################################################################################\r
219[FV.MICROCODE_FV]\r
220BlockSize = $(FLASH_BLOCK_SIZE)\r
221FvAlignment = 16\r
222ERASE_POLARITY = 1\r
223MEMORY_MAPPED = TRUE\r
224STICKY_WRITE = TRUE\r
225LOCK_CAP = TRUE\r
226LOCK_STATUS = FALSE\r
227WRITE_DISABLED_CAP = TRUE\r
228WRITE_ENABLED_CAP = TRUE\r
229WRITE_STATUS = TRUE\r
230WRITE_LOCK_CAP = TRUE\r
231WRITE_LOCK_STATUS = TRUE\r
232READ_DISABLED_CAP = TRUE\r
233READ_ENABLED_CAP = TRUE\r
234READ_STATUS = TRUE\r
235READ_LOCK_CAP = TRUE\r
236READ_LOCK_STATUS = TRUE\r
237\r
238FILE RAW = 197DB236-F856-4924-90F8-CDF12FB875F3 {\r
1aa9314e 239 $(OUTPUT_DIRECTORY)/$(TARGET)_$(TOOL_CHAIN_TAG)/$(DXE_ARCHITECTURE)/MicrocodeUpdates.bin\r
5e752084 240}\r
241\r
c5a59080
JY
242!if $(RECOVERY_ENABLE)\r
243[FV.FVRECOVERY_COMPONENTS]\r
244FvAlignment = 16 #FV alignment and FV attributes setting.\r
245ERASE_POLARITY = 1\r
246MEMORY_MAPPED = TRUE\r
247STICKY_WRITE = TRUE\r
248LOCK_CAP = TRUE\r
249LOCK_STATUS = TRUE\r
250WRITE_DISABLED_CAP = TRUE\r
251WRITE_ENABLED_CAP = TRUE\r
252WRITE_STATUS = TRUE\r
253WRITE_LOCK_CAP = TRUE\r
254WRITE_LOCK_STATUS = TRUE\r
255READ_DISABLED_CAP = TRUE\r
256READ_ENABLED_CAP = TRUE\r
257READ_STATUS = TRUE\r
258READ_LOCK_CAP = TRUE\r
259READ_LOCK_STATUS = TRUE\r
260\r
261INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/PchUsb.inf\r
262INF MdeModulePkg/Bus/Pci/EhciPei/EhciPei.inf\r
263INF MdeModulePkg/Bus/Usb/UsbBusPei/UsbBusPei.inf\r
264INF MdeModulePkg/Bus/Usb/UsbBotPei/UsbBotPei.inf\r
265INF FatPkg/FatPei/FatPei.inf\r
266INF MdeModulePkg/Universal/Disk/CdExpressPei/CdExpressPei.inf\r
267INF SignedCapsulePkg/Universal/RecoveryModuleLoadPei/RecoveryModuleLoadPei.inf\r
268!endif\r
269\r
5e752084 270################################################################################\r
271#\r
272# FV Section\r
273#\r
274# [FV] section is used to define what components or modules are placed within a flash\r
275# device file. This section also defines order the components and modules are positioned\r
276# within the image. The [FV] section consists of define statements, set statements and\r
277# module statements.\r
278#\r
279################################################################################\r
280[FV.FVRECOVERY2]\r
281BlockSize = $(FLASH_BLOCK_SIZE)\r
282FvAlignment = 16 #FV alignment and FV attributes setting.\r
283ERASE_POLARITY = 1\r
284MEMORY_MAPPED = TRUE\r
285STICKY_WRITE = TRUE\r
286LOCK_CAP = TRUE\r
287LOCK_STATUS = TRUE\r
288WRITE_DISABLED_CAP = TRUE\r
289WRITE_ENABLED_CAP = TRUE\r
290WRITE_STATUS = TRUE\r
291WRITE_LOCK_CAP = TRUE\r
292WRITE_LOCK_STATUS = TRUE\r
293READ_DISABLED_CAP = TRUE\r
294READ_ENABLED_CAP = TRUE\r
295READ_STATUS = TRUE\r
296READ_LOCK_CAP = TRUE\r
297READ_LOCK_STATUS = TRUE\r
298FvNameGuid = B73FE497-B92E-416e-8326-45AD0D270092\r
299\r
300\r
301\r
302INF $(PLATFORM_PACKAGE)/PlatformInitPei/PlatformInitPei.inf\r
303\r
304!if $(MINNOW2_FSP_BUILD) == FALSE\r
305INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/PchSmbusArpDisabled.inf\r
306INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/VlvInitPeim.inf\r
307INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/PchInitPeim.inf\r
308INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/PchSpiPeim.inf\r
309INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/PeiSmmAccess.inf\r
310INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/PeiSmmControl.inf\r
311INF UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf\r
312INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/MpS3.inf\r
5e752084 313!endif\r
314\r
98a88a76 315# INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/PiSmmCommunicationPei.inf\r
5e752084 316!if $(TPM_ENABLED) == TRUE\r
2e886a2e 317INF SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf\r
5e752084 318INF SecurityPkg/Tcg/TcgPei/TcgPei.inf\r
319INF SecurityPkg/Tcg/PhysicalPresencePei/PhysicalPresencePei.inf\r
320!endif\r
321!if $(FTPM_ENABLE) == TRUE\r
2e886a2e 322INF SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf #use PCD config\r
5e752084 323!endif\r
324INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf\r
325\r
326!if $(ACPI50_ENABLE) == TRUE\r
327 INF MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTablePei/FirmwarePerformancePei.inf\r
328!endif\r
329!if $(PERFORMANCE_ENABLE) == TRUE\r
330INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf\r
331!endif\r
332\r
c5a59080
JY
333!if $(RECOVERY_ENABLE)\r
334FILE FV_IMAGE = 1E9D7604-EF45-46a0-BD8A-71AC78C17AC1 {\r
335 SECTION PEI_DEPEX_EXP = {gEfiPeiMemoryDiscoveredPpiGuid AND gEfiPeiBootInRecoveryModePpiGuid}\r
336 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF { # LZMA COMPRESS GUID\r
337 SECTION FV_IMAGE = FVRECOVERY_COMPONENTS\r
338 }\r
339}\r
340!endif\r
341\r
5e752084 342[FV.FVRECOVERY]\r
343BlockSize = $(FLASH_BLOCK_SIZE)\r
344FvAlignment = 16 #FV alignment and FV attributes setting.\r
345ERASE_POLARITY = 1\r
346MEMORY_MAPPED = TRUE\r
347STICKY_WRITE = TRUE\r
348LOCK_CAP = TRUE\r
349LOCK_STATUS = TRUE\r
350WRITE_DISABLED_CAP = TRUE\r
351WRITE_ENABLED_CAP = TRUE\r
352WRITE_STATUS = TRUE\r
353WRITE_LOCK_CAP = TRUE\r
354WRITE_LOCK_STATUS = TRUE\r
355READ_DISABLED_CAP = TRUE\r
356READ_ENABLED_CAP = TRUE\r
357READ_STATUS = TRUE\r
358READ_LOCK_CAP = TRUE\r
359READ_LOCK_STATUS = TRUE\r
360FvNameGuid = B73FE497-B92E-416e-8326-45AD0D270091\r
361\r
362\r
363!if $(MINNOW2_FSP_BUILD) == TRUE\r
364INF IntelFspWrapperPkg/FspWrapperSecCore/FspWrapperSecCore.inf\r
365!else\r
366INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/SecCore.inf\r
367!endif\r
368\r
369INF MdeModulePkg/Core/Pei/PeiMain.inf\r
370!if $(MINNOW2_FSP_BUILD) == TRUE\r
371INF Vlv2TbltDevicePkg/FspSupport/BootModePei/BootModePei.inf\r
372INF IntelFspWrapperPkg/FspInitPei/FspInitPei.inf\r
373!endif\r
374INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/CpuPeim.inf\r
375INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf\r
376INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf\r
377\r
378INF $(PLATFORM_PACKAGE)/PlatformPei/PlatformPei.inf\r
379\r
380!if $(MINNOW2_FSP_BUILD) == FALSE\r
381INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/SeCUma.inf\r
382!endif\r
383\r
384!if $(FTPM_ENABLE) == TRUE\r
385INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/fTPMInitPeim.inf\r
386!endif\r
387\r
388!if $(SOURCE_DEBUG_ENABLE) == TRUE\r
389 INF SourceLevelDebugPkg/DebugAgentPei/DebugAgentPei.inf\r
390!endif\r
391\r
392\r
393!if $(CAPSULE_ENABLE) == TRUE\r
394INF MdeModulePkg/Universal/CapsulePei/CapsulePei.inf\r
395!if $(DXE_ARCHITECTURE) == "X64"\r
396INF MdeModulePkg/Universal/CapsulePei/CapsuleX64.inf\r
397!endif\r
398!endif\r
399\r
400!if $(MINNOW2_FSP_BUILD) == FALSE\r
401!if $(PCIESC_ENABLE) == TRUE\r
402INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/PchEarlyInitPeim.inf\r
403!endif\r
404INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/MemoryInit.inf\r
405!endif\r
406\r
407INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
408\r
409[FV.FVMAIN]\r
410BlockSize = $(FLASH_BLOCK_SIZE)\r
411FvAlignment = 16\r
412ERASE_POLARITY = 1\r
413MEMORY_MAPPED = TRUE\r
414STICKY_WRITE = TRUE\r
415LOCK_CAP = TRUE\r
416LOCK_STATUS = TRUE\r
417WRITE_DISABLED_CAP = TRUE\r
418WRITE_ENABLED_CAP = TRUE\r
419WRITE_STATUS = TRUE\r
420WRITE_LOCK_CAP = TRUE\r
421WRITE_LOCK_STATUS = TRUE\r
422READ_DISABLED_CAP = TRUE\r
423READ_ENABLED_CAP = TRUE\r
424READ_STATUS = TRUE\r
425READ_LOCK_CAP = TRUE\r
426READ_LOCK_STATUS = TRUE\r
427FvNameGuid = A881D567-6CB0-4eee-8435-2E72D33E45B5\r
428\r
429APRIORI DXE {\r
430 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
431 INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf\r
432 INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf\r
433 }\r
434\r
435FILE FREEFORM = C3E36D09-8294-4b97-A857-D5288FE33E28 {\r
436 SECTION RAW = $(OUTPUT_DIRECTORY)/$(TARGET)_$(TOOL_CHAIN_TAG)/$(DXE_ARCHITECTURE)/BiosId.bin\r
437 }\r
438\r
439 #\r
440 # EDK II Related Platform codes\r
441 #\r
442\r
443 !if $(MINNOW2_FSP_BUILD) == TRUE\r
444 INF IntelFspWrapperPkg/FspNotifyDxe/FspNotifyDxe.inf\r
445 !endif\r
446\r
447INF MdeModulePkg/Core/Dxe/DxeMain.inf\r
448INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
449!if $(ACPI50_ENABLE) == TRUE\r
450INF MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTableDxe/FirmwarePerformanceDxe.inf\r
451INF MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTableSmm/FirmwarePerformanceSmm.inf\r
452!endif\r
453\r
454\r
455INF IntelFrameworkModulePkg/Universal/CpuIoDxe/CpuIoDxe.inf\r
456INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf\r
457INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf\r
458INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf\r
459INF MdeModulePkg/Universal/ReportStatusCodeRouter/Smm/ReportStatusCodeRouterSmm.inf\r
460INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf\r
86be1a2e 461INF UefiCpuPkg/CpuDxe/CpuDxe.inf\r
5e752084 462INF $(PLATFORM_PACKAGE)/Metronome/Metronome.inf\r
463INF IntelFrameworkModulePkg/Universal/BdsDxe/BdsDxe.inf\r
2cb2b6d6
ZS
464!if $(ARCH) == IA32\r
465INF USE=IA32 MdeModulePkg/Logo/Logo.inf\r
466!else\r
98a88a76 467INF USE=X64 MdeModulePkg/Logo/Logo.inf\r
2cb2b6d6 468!endif\r
5e752084 469INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf\r
470INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf\r
471INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf\r
472INF IntelFrameworkModulePkg/Universal/Acpi/AcpiS3SaveDxe/AcpiS3SaveDxe.inf\r
473\r
474INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmmRuntimeDxe.inf\r
475INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmm.inf\r
476INF $(PLATFORM_PACKAGE)/FvbRuntimeDxe/FvbSmm.inf\r
477INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteSmm.inf\r
478INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchSpiSmm.inf\r
479!if $(SECURE_BOOT_ENABLE)\r
480INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf\r
481!endif\r
482\r
483INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf\r
484\r
485INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf\r
486INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf\r
487INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
488INF $(PLATFORM_PACKAGE)/FvbRuntimeDxe/FvbRuntimeDxe.inf\r
489\r
490\r
491INF $(PLATFORM_PACKAGE)/PlatformSetupDxe/PlatformSetupDxe.inf\r
492\r
493!if $(DATAHUB_ENABLE) == TRUE\r
494INF IntelFrameworkModulePkg/Universal/DataHubDxe/DataHubDxe.inf\r
495!endif\r
496INF IntelFrameworkModulePkg/Universal/StatusCode/DatahubStatusCodeHandlerDxe/DatahubStatusCodeHandlerDxe.inf\r
497INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf\r
498\r
499INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/Dptf.inf\r
500\r
501 #\r
502 # EDK II Related Silicon codes\r
503 #\r
504INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchS3SupportDxe.inf\r
505\r
506!if $(USE_HPET_TIMER) == TRUE\r
507INF PcAtChipsetPkg/HpetTimerDxe/HpetTimerDxe.inf\r
508!else\r
509INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/SmartTimer.inf\r
510!endif\r
511INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/SmmControl.inf\r
512\r
513INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchSmbusDxe.inf\r
514\r
515INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/IntelPchLegacyInterrupt.inf\r
516INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchReset.inf\r
517\r
518!if $(MINNOW2_FSP_BUILD) == FALSE\r
519INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchInitDxe.inf\r
520!endif\r
521INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchSmiDispatcher.inf\r
522!if $(PCIESC_ENABLE) == TRUE\r
523INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchPcieSmm.inf\r
524!endif\r
525\r
526INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchSpiRuntime.inf\r
527INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchPolicyInitDxe.inf\r
528INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PchBiosWriteProtect.inf\r
529INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/SmmAccess.inf\r
530INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PciHostBridge.inf\r
531!if $(MINNOW2_FSP_BUILD) == FALSE\r
532INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/VlvInitDxe.inf\r
533!else\r
534INF IntelFrameworkModulePkg/Universal/LegacyRegionDxe/LegacyRegionDxe.inf\r
535INF Vlv2TbltDevicePkg/VlvPlatformInitDxe/VlvPlatformInitDxe.inf\r
536!endif\r
537!if $(MINNOW2_FSP_BUILD) == FALSE\r
538 !if $(SEC_ENABLE) == TRUE\r
539 INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/HeciDrv.inf\r
540 INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/SeCPolicyInitDxe.inf\r
541 !endif\r
542!endif\r
543!if $(TPM_ENABLED) == TRUE\r
544INF SecurityPkg/Tcg/TcgConfigDxe/TcgConfigDxe.inf\r
545INF SecurityPkg/Tcg/TcgDxe/TcgDxe.inf\r
546INF RuleOverride = DRIVER_ACPITABLE SecurityPkg/Tcg/TcgSmm/TcgSmm.inf\r
547!endif\r
548!if $(FTPM_ENABLE) == TRUE\r
549INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/IA32/Tpm2DeviceSeCPei.inf\r
550INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/Tpm2DeviceSeCDxe.inf\r
551INF SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.inf\r
2e886a2e 552INF SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf\r
5e752084 553INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/FtpmSmm.inf\r
554!endif\r
555\r
556#\r
557# EDK II Related Platform codes\r
558#\r
559INF $(PLATFORM_PACKAGE)/PlatformSmm/PlatformSmm.inf\r
560INF $(PLATFORM_PACKAGE)/PlatformInfoDxe/PlatformInfoDxe.inf\r
561INF $(PLATFORM_PACKAGE)/PlatformCpuInfoDxe/PlatformCpuInfoDxe.inf\r
562INF $(PLATFORM_PACKAGE)/PlatformDxe/PlatformDxe.inf\r
563INF $(PLATFORM_PACKAGE)/PciPlatform/PciPlatform.inf\r
564INF $(PLATFORM_PACKAGE)/SaveMemoryConfig/SaveMemoryConfig.inf\r
565INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PlatformCpuPolicy.inf\r
566INF $(PLATFORM_PACKAGE)/PpmPolicy/PpmPolicy.inf\r
567INF $(PLATFORM_PACKAGE)/SmramSaveInfoHandlerSmm/SmramSaveInfoHandlerSmm.inf\r
568!if $(GOP_DRIVER_ENABLE) == TRUE\r
569 INF $(PLATFORM_PACKAGE)/PlatformGopPolicy/PlatformGopPolicy.inf\r
570 FILE DRIVER = FF0C8745-3270-4439-B74F-3E45F8C77064 {\r
571 SECTION DXE_DEPEX_EXP = {gPlatformGOPPolicyGuid}\r
46002a4a 572 SECTION PE32 = Vlv2SocBinPkg/GOP/7.2.1011/RELEASE_VS2008x86/$(DXE_ARCHITECTURE)/IntelGopDriver.efi\r
5e752084 573 SECTION UI = "IntelGopDriver"\r
574}\r
575!endif\r
576\r
577INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PnpDxe.inf\r
578 #\r
579 # SMM\r
580 #\r
581INF MdeModulePkg/Core/PiSmmCore/PiSmmIpl.inf\r
582INF MdeModulePkg/Core/PiSmmCore/PiSmmCore.inf\r
f2ae1ef7 583INF UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf\r
5e752084 584\r
585INF UefiCpuPkg/CpuIo2Smm/CpuIo2Smm.inf\r
586INF MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBox.inf\r
f2ae1ef7 587INF UefiCpuPkg/PiSmmCommunication/PiSmmCommunicationSmm.inf\r
5e752084 588INF $(PLATFORM_PACKAGE)/SmmSwDispatch2OnSmmSwDispatchThunk/SmmSwDispatch2OnSmmSwDispatchThunk.inf\r
97e862bb
MK
589\r
590#\r
591# Remove the following two SMM binary modules that prevent platform from booting to UEFI Shell\r
592#\r
593#INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/PowerManagement2.inf\r
594#INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/DigitalThermalSensor.inf\r
595\r
5e752084 596 #\r
597 # ACPI\r
598 #\r
599INF MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe/BootScriptExecutorDxe.inf\r
600INF $(PLATFORM_PACKAGE)/BootScriptSaveDxe/BootScriptSaveDxe.inf\r
601INF IntelFrameworkModulePkg/Universal/Acpi/AcpiSupportDxe/AcpiSupportDxe.inf\r
602INF RuleOverride = ACPITABLE2 Vlv2DeviceRefCodePkg/ValleyView2Soc/CPU/PowerManagement/AcpiTables/PowerManagementAcpiTables.inf\r
603\r
604INF RuleOverride = ACPITABLE $(PLATFORM_RC_PACKAGE)/AcpiTablesPCAT/AcpiTables.inf\r
605\r
606INF $(PLATFORM_PACKAGE)/AcpiPlatform/AcpiPlatform.inf\r
607\r
98a88a76
KM
608INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResourceTableDxe.inf\r
609\r
5e752084 610 #\r
611 # PCI\r
612 #\r
613INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf\r
614\r
615INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/ISPDxe.inf\r
616\r
617\r
618#\r
619# ISA\r
620#\r
621INF $(PLATFORM_PACKAGE)/Wpce791/Wpce791.inf\r
622INF IntelFrameworkModulePkg/Bus/Isa/IsaBusDxe/IsaBusDxe.inf\r
623INF IntelFrameworkModulePkg/Bus/Isa/IsaIoDxe/IsaIoDxe.inf\r
624!if $(SOURCE_DEBUG_ENABLE) != TRUE\r
625INF IntelFrameworkModulePkg/Bus/Isa/IsaSerialDxe/IsaSerialDxe.inf\r
626!endif\r
627#INF IntelFrameworkModulePkg/Bus/Isa/Ps2MouseDxe/Ps2MouseDxe.inf\r
628#INF IntelFrameworkModulePkg/Bus/Isa/Ps2KeyboardDxe/Ps2keyboardDxe.inf\r
629\r
630#\r
631# SDIO\r
632#\r
98a88a76
KM
633#INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/MmcHost.inf\r
634#INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/MmcMediaDevice.inf\r
5e752084 635#\r
636# IDE/SCSI/AHCI\r
637#\r
638INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf\r
639\r
640INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf\r
641\r
642INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf\r
643!if $(SATA_ENABLE) == TRUE\r
644INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/SataController.inf\r
645#\r
646\r
647#\r
648INF MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf\r
649INF MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf\r
650!if $(SCSI_ENABLE) == TRUE\r
651INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf\r
652INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf\r
653!endif\r
654#\r
655!endif\r
656# Console\r
657#\r
658INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf\r
659INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf\r
660INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf\r
661INF IntelFrameworkModulePkg/Universal/Console/VgaClassDxe/VgaClassDxe.inf\r
662INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf\r
663INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf\r
664INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf\r
665INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf\r
666 #\r
667 # USB\r
668 #\r
669!if $(USB_ENABLE) == TRUE\r
670INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf\r
671INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf\r
672INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf\r
673INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf\r
674INF MdeModulePkg/Bus/Usb/UsbMouseDxe/UsbMouseDxe.inf\r
675INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf\r
676INF MdeModulePkg/Bus/Pci/XhciDxe/XhciDxe.inf\r
677!endif\r
678\r
a4712bea 679\r
5e752084 680 #\r
681 # SMBIOS\r
682 #\r
683INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf\r
684INF $(PLATFORM_PACKAGE)/SmBiosMiscDxe/SmBiosMiscDxe.inf\r
685\r
686INF RuleOverride = BINARY $(PLATFORM_BINARY_PACKAGE)/$(DXE_ARCHITECTURE)$(TARGET)/$(DXE_ARCHITECTURE)/SmbiosMemory.inf\r
687\r
5e752084 688\r
689#\r
690# FAT file system\r
691#\r
692INF FatPkg/EnhancedFatDxe/Fat.inf\r
693\r
694#\r
695# UEFI Shell\r
696#\r
2840bb51 697INF ShellPkg/Application/Shell/Shell.inf\r
5e752084 698\r
7a0e4f8e
RN
699#\r
700# dp command\r
701#\r
702!if $(PERFORMANCE_ENABLE) == TRUE\r
703INF ShellPkg/DynamicCommand/DpDynamicCommand/DpDynamicCommand.inf\r
704!endif\r
5e752084 705\r
706!if $(GOP_DRIVER_ENABLE) == TRUE\r
707FILE FREEFORM = 878AC2CC-5343-46F2-B563-51F89DAF56BA {\r
46002a4a 708 SECTION RAW = Vlv2SocBinPkg/GOP/7.2.1011/VBT/MNW2/Vbt.bin\r
5e752084 709 SECTION UI = "IntelGopVbt"\r
710}\r
711!endif\r
712\r
713#\r
714# Network Modules\r
715#\r
716!if $(NETWORK_ENABLE) == TRUE\r
717 FILE DRIVER = 22DE1691-D65D-456a-993E-A253DD1F308C {\r
46002a4a 718 SECTION PE32 = Vlv2SocBinPkg/UNDI/RtkUndiDxe/$(DXE_ARCHITECTURE)/RtkUndiDxe.efi\r
5e752084 719 SECTION UI = "UNDI"\r
720 }\r
721 INF MdeModulePkg/Universal/Network/SnpDxe/SnpDxe.inf\r
722 INF MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf\r
723 INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf\r
724 INF MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf\r
725 INF MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf\r
726 INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf\r
727 INF MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf\r
728 INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf\r
5f137127
FS
729 INF NetworkPkg/UefiPxeBcDxe/UefiPxeBcDxe.inf\r
730 INF NetworkPkg/TcpDxe/TcpDxe.inf\r
5e752084 731 !if $(NETWORK_IP6_ENABLE) == TRUE\r
732 INF NetworkPkg/Ip6Dxe/Ip6Dxe.inf\r
733 INF NetworkPkg/Dhcp6Dxe/Dhcp6Dxe.inf\r
5e752084 734 INF NetworkPkg/Udp6Dxe/Udp6Dxe.inf\r
735 INF NetworkPkg/Mtftp6Dxe/Mtftp6Dxe.inf\r
736 !endif\r
5e752084 737 !if $(NETWORK_VLAN_ENABLE) == TRUE\r
738 INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf\r
739 !endif\r
740 !if $(NETWORK_ISCSI_ENABLE) == TRUE\r
5e752084 741 INF NetworkPkg/IScsiDxe/IScsiDxe.inf\r
5e752084 742 !endif\r
743!endif\r
744\r
c5a59080 745!if $(CAPSULE_ENABLE)\r
1aa9314e
MK
746INF MdeModulePkg/Universal/EsrtFmpDxe/EsrtFmpDxe.inf\r
747\r
748#\r
749# Minnow Max System Firmware FMP\r
750#\r
751INF FILE_GUID = $(FMP_MINNOW_MAX_SYSTEM) FmpDevicePkg/FmpDxe/FmpDxe.inf\r
752\r
753#\r
754# Sample Device FMP\r
755#\r
756INF FILE_GUID = $(FMP_GREEN_SAMPLE_DEVICE) FmpDevicePkg/FmpDxe/FmpDxe.inf\r
757INF FILE_GUID = $(FMP_BLUE_SAMPLE_DEVICE) FmpDevicePkg/FmpDxe/FmpDxe.inf\r
758INF FILE_GUID = $(FMP_RED_SAMPLE_DEVICE) FmpDevicePkg/FmpDxe/FmpDxe.inf\r
759\r
c5a59080 760!endif\r
1aa9314e 761\r
c5a59080 762!if $(MICOCODE_CAPSULE_ENABLE)\r
1aa9314e 763INF IntelSiliconPkg/Feature/Capsule/MicrocodeUpdateDxe/MicrocodeUpdateDxe.inf\r
c5a59080
JY
764!endif\r
765\r
766!if $(RECOVERY_ENABLE)\r
767FILE FREEFORM = PCD(gEfiSignedCapsulePkgTokenSpaceGuid.PcdEdkiiRsa2048Sha256TestPublicKeyFileGuid) {\r
768 SECTION RAW = BaseTools/Source/Python/Rsa2048Sha256Sign/TestSigningPublicKey.bin\r
769 SECTION UI = "Rsa2048Sha256TestSigningPublicKey"\r
770 }\r
771!endif\r
772\r
5e752084 773[FV.FVMAIN_COMPACT]\r
774BlockSize = $(FLASH_BLOCK_SIZE)\r
775FvAlignment = 16\r
776ERASE_POLARITY = 1\r
777MEMORY_MAPPED = TRUE\r
778STICKY_WRITE = TRUE\r
779LOCK_CAP = TRUE\r
780LOCK_STATUS = TRUE\r
781WRITE_DISABLED_CAP = TRUE\r
782WRITE_ENABLED_CAP = TRUE\r
783WRITE_STATUS = TRUE\r
784WRITE_LOCK_CAP = TRUE\r
785WRITE_LOCK_STATUS = TRUE\r
786READ_DISABLED_CAP = TRUE\r
787READ_ENABLED_CAP = TRUE\r
788READ_STATUS = TRUE\r
789READ_LOCK_CAP = TRUE\r
790READ_LOCK_STATUS = TRUE\r
791\r
792\r
793\r
794FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {\r
795!if $(LZMA_ENABLE) == TRUE\r
796# LZMA Compress\r
797 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {\r
798 SECTION FV_IMAGE = FVMAIN\r
799 }\r
800!else\r
801!if $(DXE_COMPRESS_ENABLE) == TRUE\r
802# Tiano Compress\r
803 SECTION GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED = TRUE {\r
804 SECTION FV_IMAGE = FVMAIN\r
805 }\r
806!else\r
807# No Compress\r
808 SECTION COMPRESS PI_NONE {\r
809 SECTION FV_IMAGE = FVMAIN\r
810 }\r
811!endif\r
812!endif\r
813 }\r
814\r
815[FV.SETUP_DATA]\r
816BlockSize = $(FLASH_BLOCK_SIZE)\r
817#NumBlocks = 0x10\r
818FvAlignment = 16\r
819ERASE_POLARITY = 1\r
820MEMORY_MAPPED = TRUE\r
821STICKY_WRITE = TRUE\r
822LOCK_CAP = TRUE\r
823LOCK_STATUS = TRUE\r
824WRITE_DISABLED_CAP = TRUE\r
825WRITE_ENABLED_CAP = TRUE\r
826WRITE_STATUS = TRUE\r
827WRITE_LOCK_CAP = TRUE\r
828WRITE_LOCK_STATUS = TRUE\r
829READ_DISABLED_CAP = TRUE\r
830READ_ENABLED_CAP = TRUE\r
831READ_STATUS = TRUE\r
832READ_LOCK_CAP = TRUE\r
833READ_LOCK_STATUS = TRUE\r
834\r
5e752084 835################################################################################\r
836#\r
837# Rules are use with the [FV] section's module INF type to define\r
838# how an FFS file is created for a given INF file. The following Rule are the default\r
839# rules for the different module type. User can add the customized rules to define the\r
840# content of the FFS file.\r
841#\r
842################################################################################\r
843[Rule.Common.SEC]\r
844 FILE SEC = $(NAMED_GUID) RELOCS_STRIPPED {\r
845 PE32 PE32 Align = 8 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
846 RAW BIN Align = 16 |.com\r
847 }\r
848\r
849[Rule.Common.SEC.BINARY]\r
850 FILE SEC = $(NAMED_GUID) RELOCS_STRIPPED {\r
851 PE32 PE32 Align = 8 |.efi\r
852 RAW BIN Align = 16 |.com\r
853 }\r
854\r
855[Rule.Common.PEI_CORE]\r
856 FILE PEI_CORE = $(NAMED_GUID) {\r
857 PE32 PE32 Align = Auto $(INF_OUTPUT)/$(MODULE_NAME).efi\r
858 UI STRING="$(MODULE_NAME)" Optional\r
859 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
860 }\r
861\r
862[Rule.Common.PEIM]\r
863 FILE PEIM = $(NAMED_GUID) {\r
864 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
865 PE32 PE32 Align = Auto $(INF_OUTPUT)/$(MODULE_NAME).efi\r
866 UI STRING="$(MODULE_NAME)" Optional\r
867 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
868 }\r
869\r
870[Rule.Common.PEIM.BINARY]\r
871 FILE PEIM = $(NAMED_GUID) {\r
872 PEI_DEPEX PEI_DEPEX Optional |.depex\r
873 PE32 PE32 Align = Auto |.efi\r
874 UI STRING="$(MODULE_NAME)" Optional\r
875 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
876 }\r
877\r
878[Rule.Common.PEIM.BIOSID]\r
879 FILE PEIM = $(NAMED_GUID) {\r
880 RAW BIN BiosId.bin\r
881 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
882 PE32 PE32 Align = Auto $(INF_OUTPUT)/$(MODULE_NAME).efi\r
883 UI STRING="$(MODULE_NAME)" Optional\r
884 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
885 }\r
886\r
887[Rule.Common.USER_DEFINED.APINIT]\r
888 FILE RAW = $(NAMED_GUID) Fixed Align=4K {\r
889 RAW SEC_BIN |.com\r
890 }\r
891#cjia 2011-07-21\r
892[Rule.Common.USER_DEFINED.LEGACY16]\r
893 FILE FREEFORM = $(NAMED_GUID) {\r
894 UI STRING="$(MODULE_NAME)" Optional\r
895 RAW BIN |.bin\r
896 }\r
897#cjia\r
898\r
899[Rule.Common.USER_DEFINED.ASM16]\r
900 FILE FREEFORM = $(NAMED_GUID) {\r
901 UI STRING="$(MODULE_NAME)" Optional\r
902 RAW BIN |.com\r
903 }\r
904\r
905[Rule.Common.DXE_CORE]\r
906 FILE DXE_CORE = $(NAMED_GUID) {\r
907 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
908 UI STRING="$(MODULE_NAME)" Optional\r
909 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
910 }\r
911\r
912[Rule.Common.UEFI_DRIVER]\r
913 FILE DRIVER = $(NAMED_GUID) {\r
914 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
915 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
916 UI STRING="$(MODULE_NAME)" Optional\r
917 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
918 }\r
919\r
920[Rule.Common.UEFI_DRIVER.BINARY]\r
921 FILE DRIVER = $(NAMED_GUID) {\r
922 DXE_DEPEX DXE_DEPEX Optional |.depex\r
923 PE32 PE32 |.efi\r
924 UI STRING="$(MODULE_NAME)" Optional\r
925 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
926 }\r
927\r
928[Rule.Common.UEFI_DRIVER.NATIVE_BINARY]\r
929 FILE DRIVER = $(NAMED_GUID) {\r
930 DXE_DEPEX DXE_DEPEX Optional $(WORKSPACE)/$(PLATFORM_PACKAGE)/IntelGopDepex/IntelGopDriver.depex\r
931 PE32 PE32 |.efi\r
932 UI STRING="$(MODULE_NAME)" Optional\r
933 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
934 }\r
935\r
936[Rule.Common.DXE_DRIVER]\r
937 FILE DRIVER = $(NAMED_GUID) {\r
938 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
939 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
940 UI STRING="$(MODULE_NAME)" Optional\r
941 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
942 }\r
943\r
944[Rule.Common.DXE_DRIVER.BINARY]\r
945 FILE DRIVER = $(NAMED_GUID) {\r
946 DXE_DEPEX DXE_DEPEX Optional |.depex\r
947 PE32 PE32 |.efi\r
948 UI STRING="$(MODULE_NAME)" Optional\r
949 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
950 }\r
951\r
952[Rule.Common.DXE_DRIVER.DRIVER_ACPITABLE]\r
953 FILE DRIVER = $(NAMED_GUID) {\r
954 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
955 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
956 UI STRING="$(MODULE_NAME)" Optional\r
957 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
958 RAW ACPI Optional |.acpi\r
959 RAW ASL Optional |.aml\r
960 }\r
961\r
962[Rule.Common.DXE_RUNTIME_DRIVER]\r
963 FILE DRIVER = $(NAMED_GUID) {\r
964 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
965 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
966 UI STRING="$(MODULE_NAME)" Optional\r
967 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
968 }\r
969\r
970[Rule.Common.DXE_RUNTIME_DRIVER.BINARY]\r
971 FILE DRIVER = $(NAMED_GUID) {\r
972 DXE_DEPEX DXE_DEPEX Optional |.depex\r
973 PE32 PE32 |.efi\r
974 UI STRING="$(MODULE_NAME)" Optional\r
975 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
976 }\r
977\r
978[Rule.Common.DXE_SMM_DRIVER]\r
979 FILE SMM = $(NAMED_GUID) {\r
980 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
981 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
982 UI STRING="$(MODULE_NAME)" Optional\r
983 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
984 }\r
985\r
986[Rule.Common.DXE_SMM_DRIVER.BINARY]\r
987 FILE SMM = $(NAMED_GUID) {\r
988 SMM_DEPEX SMM_DEPEX |.depex\r
989 PE32 PE32 |.efi\r
990 RAW BIN Optional |.aml\r
991 UI STRING="$(MODULE_NAME)" Optional\r
992 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
993 }\r
994\r
995[Rule.Common.DXE_SMM_DRIVER.DRIVER_ACPITABLE]\r
996 FILE SMM = $(NAMED_GUID) {\r
997 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
998 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
999 UI STRING="$(MODULE_NAME)" Optional\r
1000 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
1001 RAW ACPI Optional |.acpi\r
1002 RAW ASL Optional |.aml\r
1003 }\r
1004\r
1005[Rule.Common.SMM_CORE]\r
1006 FILE SMM_CORE = $(NAMED_GUID) {\r
1007 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
1008 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
1009 UI STRING="$(MODULE_NAME)" Optional\r
1010 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
1011 }\r
1012\r
1013[Rule.Common.SMM_CORE.BINARY]\r
1014 FILE SMM_CORE = $(NAMED_GUID) {\r
1015 DXE_DEPEX DXE_DEPEX Optional |.depex\r
1016 PE32 PE32 |.efi\r
1017 UI STRING="$(MODULE_NAME)" Optional\r
1018 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
1019 }\r
1020\r
1021[Rule.Common.UEFI_APPLICATION]\r
1022 FILE APPLICATION = $(NAMED_GUID) {\r
1023 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
1024 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
1025 UI STRING="$(MODULE_NAME)" Optional\r
1026 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
1027 }\r
1028\r
1029[Rule.Common.UEFI_APPLICATION.UI]\r
1030 FILE APPLICATION = $(NAMED_GUID) {\r
1031 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
1032 UI STRING="Enter Setup"\r
1033 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
1034 }\r
1035\r
1036[Rule.Common.USER_DEFINED]\r
1037 FILE FREEFORM = $(NAMED_GUID) {\r
1038 UI STRING="$(MODULE_NAME)" Optional\r
1039 RAW BIN |.bin\r
1040 }\r
1041\r
98a88a76
KM
1042[Rule.Common.USER_DEFINED.BINARY]\r
1043 FILE FREEFORM = $(NAMED_GUID) {\r
1044 UI STRING="$(MODULE_NAME)" Optional\r
1045 RAW BIN |.bin\r
1046 }\r
1047\r
5e752084 1048[Rule.Common.USER_DEFINED.ACPITABLE]\r
1049 FILE FREEFORM = $(NAMED_GUID) {\r
1050 RAW ACPI Optional |.acpi\r
1051 RAW ASL Optional |.aml\r
1052 }\r
1053\r
1054[Rule.Common.USER_DEFINED.ACPITABLE2]\r
1055 FILE FREEFORM = $(NAMED_GUID) {\r
1056 RAW ASL Optional |.aml\r
1057 }\r
1058\r
1059[Rule.Common.ACPITABLE]\r
1060 FILE FREEFORM = $(NAMED_GUID) {\r
1061 RAW ACPI Optional |.acpi\r
1062 RAW ASL Optional |.aml\r
1063 }\r
1064\r
c5a59080
JY
1065[Rule.Common.PEIM.FMP_IMAGE_DESC]\r
1066 FILE PEIM = $(NAMED_GUID) {\r
1067 RAW BIN |.acpi\r
1068 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
1069 PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi\r
1070 UI STRING="$(MODULE_NAME)" Optional\r
1071 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
1072 }\r