]> git.proxmox.com Git - mirror_edk2.git/commitdiff
Integrate the patch contributed by Andrew Fish to port MdeModulePkg to support ARM.
authorqhuang8 <qhuang8@6f19259b-4bc3-4df7-8a09-765794883524>
Mon, 24 Aug 2009 15:22:14 +0000 (15:22 +0000)
committerqhuang8 <qhuang8@6f19259b-4bc3-4df7-8a09-765794883524>
Mon, 24 Aug 2009 15:22:14 +0000 (15:22 +0000)
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@9174 6f19259b-4bc3-4df7-8a09-765794883524

MdeModulePkg/Core/Dxe/DxeMain/DxeMain.c
MdeModulePkg/Core/DxeIplPeim/Arm/DxeLoadFunc.c [new file with mode: 0644]
MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
MdeModulePkg/MdeModulePkg.dsc
MdeModulePkg/Universal/DebugSupportDxe/X64/AsmFuncs.S
MdeModulePkg/Universal/Network/UefiPxeBcDxe/Arm/PxeArch.h [new file with mode: 0644]
MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf

index 777e1db65ad82c7b3aa9b4fc0faf307cd04eb36f..3d8c00ce786f4209e07baf00cefb871c8d6b38ab 100644 (file)
@@ -307,6 +307,26 @@ DxeMain (
 
   DEBUG ((DEBUG_INFO | DEBUG_LOAD, "HOBLIST address in DXE = 0x%p\n", HobStart));
 
+  DEBUG_CODE_BEGIN ();
+    EFI_PEI_HOB_POINTERS               Hob;
+
+    for (Hob.Raw = HobStart; !END_OF_HOB_LIST(Hob); Hob.Raw = GET_NEXT_HOB(Hob)) {
+      if (GET_HOB_TYPE (Hob) == EFI_HOB_TYPE_MEMORY_ALLOCATION) {
+        DEBUG ((DEBUG_INFO | DEBUG_LOAD, "Memory Allocation %08x %0lx - %0lx\n", \
+          Hob.MemoryAllocation->AllocDescriptor.MemoryBaseAddress,               \
+          Hob.MemoryAllocation->AllocDescriptor.MemoryBaseAddress + Hob.MemoryAllocation->AllocDescriptor.MemoryLength - 1, \
+          Hob.MemoryAllocation->AllocDescriptor.MemoryType));
+      }
+    }
+    for (Hob.Raw = HobStart; !END_OF_HOB_LIST(Hob); Hob.Raw = GET_NEXT_HOB(Hob)) {
+      if (GET_HOB_TYPE (Hob) == EFI_HOB_TYPE_FV2) {
+        DEBUG ((DEBUG_INFO | DEBUG_LOAD, "FV2 Hob           %08x %0lx - %0lx\n", Hob.FirmwareVolume2->BaseAddress, Hob.FirmwareVolume2->BaseAddress + Hob.FirmwareVolume2->Length - 1, Hob.ResourceDescriptor->ResourceType));
+      } else if (GET_HOB_TYPE (Hob) == EFI_HOB_TYPE_FV) {
+        DEBUG ((DEBUG_INFO | DEBUG_LOAD, "FV Hob            %08x %0lx - %0lx\n", Hob.FirmwareVolume->BaseAddress, Hob.FirmwareVolume->BaseAddress + Hob.FirmwareVolume2->Length - 1, Hob.ResourceDescriptor->ResourceType));
+      }
+    }
+  DEBUG_CODE_END ();
+
   //
   // Initialize the Event Services
   //
diff --git a/MdeModulePkg/Core/DxeIplPeim/Arm/DxeLoadFunc.c b/MdeModulePkg/Core/DxeIplPeim/Arm/DxeLoadFunc.c
new file mode 100644 (file)
index 0000000..dd64a35
--- /dev/null
@@ -0,0 +1,70 @@
+/** @file
+  ARM specifc functionality for DxeLoad. 
+  
+Copyright (c) 2006 - 2008, Intel Corporation. <BR>
+Portions copyright (c) 2008-2009 Apple Inc. All rights reserved.<BR>
+
+All rights reserved. This program and the accompanying materials
+are licensed and made available under the terms and conditions of the BSD License
+which accompanies this distribution.  The full text of the license may be found at
+http://opensource.org/licenses/bsd-license.php
+
+THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+
+**/
+
+#include "DxeIpl.h"
+
+/**
+   Transfers control to DxeCore.
+
+   This function performs a CPU architecture specific operations to execute
+   the entry point of DxeCore with the parameters of HobList.
+   It also installs EFI_END_OF_PEI_PPI to signal the end of PEI phase.
+
+   @param DxeCoreEntryPoint         The entry point of DxeCore.
+   @param HobList                   The start of HobList passed to DxeCore.
+
+**/
+VOID
+HandOffToDxeCore (
+  IN EFI_PHYSICAL_ADDRESS   DxeCoreEntryPoint,
+  IN EFI_PEI_HOB_POINTERS   HobList
+  )
+{
+  VOID                *BaseOfStack;
+  VOID                *TopOfStack;
+  EFI_STATUS          Status;
+
+  //
+  // Allocate 128KB for the Stack
+  //
+  BaseOfStack = AllocatePages (EFI_SIZE_TO_PAGES (STACK_SIZE));
+  ASSERT (BaseOfStack != NULL);
+
+  //
+  // Compute the top of the stack we were allocated. Pre-allocate a UINTN
+  // for safety.
+  //
+  TopOfStack = (VOID *) ((UINTN) BaseOfStack + EFI_SIZE_TO_PAGES (STACK_SIZE) * EFI_PAGE_SIZE - CPU_STACK_ALIGNMENT);
+  TopOfStack = ALIGN_POINTER (TopOfStack, CPU_STACK_ALIGNMENT);
+
+  //
+  // End of PEI phase singal
+  //
+  Status = PeiServicesInstallPpi (&gEndOfPeiSignalPpi);
+  ASSERT_EFI_ERROR (Status);
+
+  //
+  // Update the contents of BSP stack HOB to reflect the real stack info passed to DxeCore.
+  //    
+  UpdateStackHob ((EFI_PHYSICAL_ADDRESS)(UINTN) BaseOfStack, STACK_SIZE);
+
+  SwitchStack (
+    (SWITCH_STACK_ENTRY_POINT)(UINTN)DxeCoreEntryPoint,
+    HobList.Raw,
+    NULL,
+    TopOfStack
+    );
+}
index fadf2ebc52b5c6de6cbc83a7a0c1a38db96e1896..a345035f1fa422b6017de4f2ceb728f09dc116db 100644 (file)
-#/** @file\r
-#  Last PEIM executed in PEI phase to load DXE Core from a Firmware Volume.\r
-#  \r
-#  This module produces a special PPI named the DXE Initial Program Load (IPL)\r
-#  PPI to discover and dispatch the DXE Foundation and components that are\r
-#  needed to run the DXE Foundation.\r
-#\r
-#  Copyright (c) 2006 - 2009, Intel Corporation. <BR>\r
-#  All rights reserved. This program and the accompanying materials\r
-#  are licensed and made available under the terms and conditions of the BSD License\r
-#  which accompanies this distribution.  The full text of the license may be found at\r
-#  http://opensource.org/licenses/bsd-license.php\r
-#  \r
-#  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
-#  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
-#  \r
-#**/\r
-\r
-[Defines]\r
-  INF_VERSION                    = 0x00010005\r
-  BASE_NAME                      = DxeIpl\r
-  FILE_GUID                      = 86D70125-BAA3-4296-A62F-602BEBBB9081\r
-  MODULE_TYPE                    = PEIM\r
-  VERSION_STRING                 = 1.0\r
-\r
-  ENTRY_POINT                    = PeimInitializeDxeIpl\r
-\r
-#\r
-# The following information is for reference only and not required by the build tools.\r
-#\r
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC (EBC is for build only)\r
-#\r
-\r
-[Sources.common]\r
-  DxeIpl.h\r
-  DxeLoad.c\r
-\r
-[Sources.Ia32]\r
-  Ia32/VirtualMemory.h ||||PcdDxeIplSwitchToLongMode\r
-  Ia32/VirtualMemory.c ||||PcdDxeIplSwitchToLongMode\r
-  Ia32/DxeLoadFunc.c\r
-  Ia32/IdtVectorAsm.asm||||PcdDxeIplSwitchToLongMode\r
-  Ia32/IdtVectorAsm.S  ||||PcdDxeIplSwitchToLongMode\r
-\r
-[Sources.X64]\r
-  X64/VirtualMemory.h\r
-  X64/VirtualMemory.c\r
-  X64/DxeLoadFunc.c\r
-\r
-[Sources.IPF]\r
-  Ipf/DxeLoadFunc.c\r
-\r
-[Sources.EBC]\r
-  Ebc/DxeLoadFunc.c\r
-\r
-[Packages]\r
-  MdePkg/MdePkg.dec\r
-  MdeModulePkg/MdeModulePkg.dec\r
-\r
-[LibraryClasses]\r
-  PcdLib\r
-  MemoryAllocationLib\r
-  BaseMemoryLib\r
-  ExtractGuidedSectionLib\r
-  UefiDecompressLib\r
-  ReportStatusCodeLib\r
-  PeiServicesLib\r
-  HobLib\r
-  BaseLib\r
-  PeimEntryPoint\r
-  DebugLib\r
-\r
-[Ppis]\r
-  gEfiDxeIplPpiGuid                 ## PRODUCES\r
-  gEfiEndOfPeiSignalPpiGuid         ## SOMETIMES_PRODUCES(Not produced on S3 boot path)\r
-  gEfiPeiDecompressPpiGuid          ## SOMETIMES_PRODUCES\r
-  gEfiPeiReadOnlyVariable2PpiGuid   ## SOMETIMES_CONSUMES\r
-  gEfiPeiLoadFilePpiGuid            ## CONSUMES\r
-  gEfiPeiS3ResumePpiGuid            ## SOMETIMES_CONSUMES(Consumed on S3 boot path)\r
-  gEfiPeiRecoveryModulePpiGuid      ## SOMETIMES_CONSUMES(Consumed on recovery boot path)\r
-\r
-[Guids]\r
-  gEfiMemoryTypeInformationGuid     ## SOMETIMES_CONSUMES ## Variable:L"MemoryTypeInformation"\r
-  gEfiMemoryTypeInformationGuid     ## SOMETIMES_PRODUCES ## HOB\r
-\r
-[FeaturePcd.IA32]\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdDxeIplSwitchToLongMode\r
-\r
-[FeaturePcd.common]\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdDxeIplSupportUefiDecompress\r
-\r
-[FixedPcd.common]\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValuePeiHandoffToDxe\r
-\r
-[Depex]\r
-  gEfiPeiMemoryDiscoveredPpiGuid AND gEfiPeiLoadFilePpiGuid\r
-\r
-#\r
-# [BootMode] \r
-#   S3_RESUME                       ## SOMETIMES_CONSUMES\r
-#   RECOVERY                        ## SOMETIMES_CONSUMES\r
-#\r
-#  \r
-# [Hob]\r
-#   ##\r
-#   # New Stack HoB\r
-#   MEMORY_ALLOCATION               ## PRODUCES\r
-#   ##\r
-#   # Old Stack HOB\r
-#   MEMORY_ALLOCATION               ## CONSUMES\r
-#\r
-# [Hob.IPF]\r
-#   ##\r
-#   # BSP Stack HOB for IPF\r
-#   MEMORY_ALLOCATION               ## PRODUCES\r
-#\r
-# \r
+#/** @file
+#  Last PEIM executed in PEI phase to load DXE Core from a Firmware Volume.
+#  
+#  This module produces a special PPI named the DXE Initial Program Load (IPL)
+#  PPI to discover and dispatch the DXE Foundation and components that are
+#  needed to run the DXE Foundation.
+#
+#  Copyright (c) 2006 - 2009, Intel Corporation. <BR>
+#  All rights reserved. This program and the accompanying materials
+#  are licensed and made available under the terms and conditions of the BSD License
+#  which accompanies this distribution.  The full text of the license may be found at
+#  http://opensource.org/licenses/bsd-license.php
+#  
+#  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+#  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+#  
+#**/
+
+[Defines]
+  INF_VERSION                    = 0x00010005
+  BASE_NAME                      = DxeIpl
+  FILE_GUID                      = 86D70125-BAA3-4296-A62F-602BEBBB9081
+  MODULE_TYPE                    = PEIM
+  VERSION_STRING                 = 1.0
+
+  ENTRY_POINT                    = PeimInitializeDxeIpl
+
+#
+# The following information is for reference only and not required by the build tools.
+#
+#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC (EBC is for build only)
+#
+
+[Sources.common]
+  DxeIpl.h
+  DxeLoad.c
+
+[Sources.Ia32]
+  Ia32/VirtualMemory.h ||||PcdDxeIplSwitchToLongMode
+  Ia32/VirtualMemory.c ||||PcdDxeIplSwitchToLongMode
+  Ia32/DxeLoadFunc.c
+  Ia32/IdtVectorAsm.asm||||PcdDxeIplSwitchToLongMode
+  Ia32/IdtVectorAsm.S  ||||PcdDxeIplSwitchToLongMode
+
+[Sources.X64]
+  X64/VirtualMemory.h
+  X64/VirtualMemory.c
+  X64/DxeLoadFunc.c
+
+[Sources.IPF]
+  Ipf/DxeLoadFunc.c
+
+[Sources.EBC]
+  Ebc/DxeLoadFunc.c
+
+[Sources.ARM]
+  Arm/DxeLoadFunc.c
+
+[Packages]
+  MdePkg/MdePkg.dec
+  MdeModulePkg/MdeModulePkg.dec
+
+[LibraryClasses]
+  PcdLib
+  MemoryAllocationLib
+  BaseMemoryLib
+  ExtractGuidedSectionLib
+  UefiDecompressLib
+  ReportStatusCodeLib
+  PeiServicesLib
+  HobLib
+  BaseLib
+  PeimEntryPoint
+  DebugLib
+
+[Ppis]
+  gEfiDxeIplPpiGuid                 ## PRODUCES
+  gEfiEndOfPeiSignalPpiGuid         ## SOMETIMES_PRODUCES(Not produced on S3 boot path)
+  gEfiPeiDecompressPpiGuid          ## SOMETIMES_PRODUCES
+  gEfiPeiReadOnlyVariable2PpiGuid   ## SOMETIMES_CONSUMES
+  gEfiPeiLoadFilePpiGuid            ## CONSUMES
+  gEfiPeiS3ResumePpiGuid            ## SOMETIMES_CONSUMES(Consumed on S3 boot path)
+  gEfiPeiRecoveryModulePpiGuid      ## SOMETIMES_CONSUMES(Consumed on recovery boot path)
+
+[Guids]
+  gEfiMemoryTypeInformationGuid     ## SOMETIMES_CONSUMES ## Variable:L"MemoryTypeInformation"
+  gEfiMemoryTypeInformationGuid     ## SOMETIMES_PRODUCES ## HOB
+
+[FeaturePcd.IA32]
+  gEfiMdeModulePkgTokenSpaceGuid.PcdDxeIplSwitchToLongMode
+
+[FeaturePcd.common]
+  gEfiMdeModulePkgTokenSpaceGuid.PcdDxeIplSupportUefiDecompress
+
+[FixedPcd.common]
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValuePeiHandoffToDxe
+
+[Depex]
+  gEfiPeiMemoryDiscoveredPpiGuid AND gEfiPeiLoadFilePpiGuid
+
+#
+# [BootMode] 
+#   S3_RESUME                       ## SOMETIMES_CONSUMES
+#   RECOVERY                        ## SOMETIMES_CONSUMES
+#
+#  
+# [Hob]
+#   ##
+#   # New Stack HoB
+#   MEMORY_ALLOCATION               ## PRODUCES
+#   ##
+#   # Old Stack HOB
+#   MEMORY_ALLOCATION               ## CONSUMES
+#
+# [Hob.IPF]
+#   ##
+#   # BSP Stack HOB for IPF
+#   MEMORY_ALLOCATION               ## PRODUCES
+#
+# 
index 0ab0ec7f07367bab9e4f5730eb1bbc15730d3932..8146b85c6e6bc39730d335a713bce0f94e69bf93 100644 (file)
-#/** @file\r
-# EFI/PI Reference Module Package for All Architectures\r
-#\r
-# Copyright (c) 2007 - 2009, Intel Corporation\r
-#\r
-#  All rights reserved. This program and the accompanying materials\r
-#    are licensed and made available under the terms and conditions of the BSD License\r
-#    which accompanies this distribution. The full text of the license may be found at\r
-#    http://opensource.org/licenses/bsd-license.php\r
-#\r
-#    THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
-#    WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
-#\r
-#**/\r
-\r
-[Defines]\r
-  PLATFORM_NAME                  = MdeModule\r
-  PLATFORM_GUID                  = 587CE499-6CBE-43cd-94E2-186218569478\r
-  PLATFORM_VERSION               = 0.90\r
-  DSC_SPECIFICATION              = 0x00010005\r
-  OUTPUT_DIRECTORY               = Build/MdeModule\r
-  SUPPORTED_ARCHITECTURES        = IA32|IPF|X64|EBC\r
-  BUILD_TARGETS                  = DEBUG|RELEASE\r
-  SKUID_IDENTIFIER               = DEFAULT\r
-\r
-\r
-\r
-[LibraryClasses.common]\r
-  CacheMaintenanceLib|MdePkg/Library/BaseCacheMaintenanceLib/BaseCacheMaintenanceLib.inf\r
-  DebugLib|MdePkg/Library/BaseDebugLibNull/BaseDebugLibNull.inf\r
-  BaseLib|MdePkg/Library/BaseLib/BaseLib.inf\r
-  SynchronizationLib|MdePkg/Library/BaseSynchronizationLib/BaseSynchronizationLib.inf\r
-  CpuLib|MdePkg/Library/BaseCpuLib/BaseCpuLib.inf\r
-  BaseMemoryLib|MdePkg/Library/BaseMemoryLib/BaseMemoryLib.inf\r
-  PciCf8Lib|MdePkg/Library/BasePciCf8Lib/BasePciCf8Lib.inf\r
-  PciExpressLib|MdePkg/Library/BasePciExpressLib/BasePciExpressLib.inf\r
-  PciLib|MdePkg/Library/BasePciLibCf8/BasePciLibCf8.inf\r
-  PeCoffGetEntryPointLib|MdePkg/Library/BasePeCoffGetEntryPointLib/BasePeCoffGetEntryPointLib.inf\r
-  PeCoffLib|MdePkg/Library/BasePeCoffLib/BasePeCoffLib.inf\r
-  PeCoffExtraActionLib|MdePkg/Library/BasePeCoffExtraActionLibNull/BasePeCoffExtraActionLibNull.inf\r
-  PerformanceLib|MdePkg/Library/BasePerformanceLibNull/BasePerformanceLibNull.inf\r
-  PostCodeLib|MdePkg/Library/BasePostCodeLibDebug/BasePostCodeLibDebug.inf\r
-  PostCodeLib|MdePkg/Library/BasePostCodeLibPort80/BasePostCodeLibPort80.inf\r
-  PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf\r
-  TimerLib|MdePkg/Library/BaseTimerLibNullTemplate/BaseTimerLibNullTemplate.inf\r
-  UefiDecompressLib|MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.inf\r
-\r
-  PeiCoreEntryPoint|MdePkg/Library/PeiCoreEntryPoint/PeiCoreEntryPoint.inf\r
-  PeimEntryPoint|MdePkg/Library/PeimEntryPoint/PeimEntryPoint.inf\r
-  DxeCoreEntryPoint|MdePkg/Library/DxeCoreEntryPoint/DxeCoreEntryPoint.inf\r
-  UefiDriverEntryPoint|MdePkg/Library/UefiDriverEntryPoint/UefiDriverEntryPoint.inf\r
-  UefiApplicationEntryPoint|MdePkg/Library/UefiApplicationEntryPoint/UefiApplicationEntryPoint.inf\r
-  PeiServicesLib|MdePkg/Library/PeiServicesLib/PeiServicesLib.inf\r
-  PeiServicesTablePointerLib|MdePkg/Library/PeiServicesTablePointerLib/PeiServicesTablePointerLib.inf\r
-  PalLib|MdePkg/Library/BasePalLibNull/BasePalLibNull.inf\r
-  UefiBootServicesTableLib|MdePkg/Library/UefiBootServicesTableLib/UefiBootServicesTableLib.inf\r
-  DevicePathLib|MdePkg/Library/UefiDevicePathLib/UefiDevicePathLib.inf\r
-  UefiLib|MdePkg/Library/UefiLib/UefiLib.inf\r
-  DxeServicesTableLib|MdePkg/Library/DxeServicesTableLib/DxeServicesTableLib.inf\r
-  UefiRuntimeServicesTableLib|MdePkg/Library/UefiRuntimeServicesTableLib/UefiRuntimeServicesTableLib.inf\r
-  UefiRuntimeLib|MdePkg/Library/UefiRuntimeLib/UefiRuntimeLib.inf\r
-  UefiScsiLib|MdePkg/Library/UefiScsiLib/UefiScsiLib.inf\r
-  UefiUsbLib|MdePkg/Library/UefiUsbLib/UefiUsbLib.inf\r
-  NetLib|MdeModulePkg/Library/DxeNetLib/DxeNetLib.inf\r
-  IpIoLib|MdeModulePkg/Library/DxeIpIoLib/DxeIpIoLib.inf\r
-  UdpIoLib|MdeModulePkg/Library/DxeUdpIoLib/DxeUdpIoLib.inf\r
-  DpcLib|MdeModulePkg/Library/DxeDpcLib/DxeDpcLib.inf\r
-  PcdLib|MdePkg/Library/BasePcdLibNull/BasePcdLibNull.inf\r
-  CapsuleLib|MdeModulePkg/Library/DxeCapsuleLibNull/DxeCapsuleLibNull.inf\r
-  DxeServicesLib|MdePkg/Library/DxeServicesLib/DxeServicesLib.inf\r
-  DxeServicesLib|MdePkg/Library/DxeServicesLib/DxeServicesLib.inf\r
-  HiiLib|MdeModulePkg/Library/UefiHiiLib/UefiHiiLib.inf\r
-  ReportStatusCodeLib|MdePkg/Library/BaseReportStatusCodeLibNull/BaseReportStatusCodeLibNull.inf\r
-  UefiHiiServicesLib|MdeModulePkg/Library/UefiHiiServicesLib/UefiHiiServicesLib.inf\r
-\r
-[LibraryClasses.IA32]\r
-  IoLib|MdePkg/Library/BaseIoLibIntrinsic/BaseIoLibIntrinsic.inf\r
-\r
-[LibraryClasses.X64]\r
-  IoLib|MdePkg/Library/BaseIoLibIntrinsic/BaseIoLibIntrinsic.inf\r
-\r
-[LibraryClasses.IPF]\r
-  IoLib|MdePkg/Library/BaseIoLibIntrinsic/BaseIoLibIntrinsic.inf\r
-\r
-[LibraryClasses.EBC.DXE_DRIVER]\r
-  IoLib|IntelFrameworkPkg/Library/DxeIoLibCpuIo/DxeIoLibCpuIo.inf\r
-\r
-[LibraryClasses.EBC.PEIM]\r
-  IoLib|MdePkg/Library/PeiIoLibCpuIo/PeiIoLibCpuIo.inf\r
-\r
-[LibraryClasses.common.PEI_CORE]\r
-  HobLib|MdePkg/Library/PeiHobLib/PeiHobLib.inf\r
-  MemoryAllocationLib|MdePkg/Library/PeiMemoryAllocationLib/PeiMemoryAllocationLib.inf\r
-\r
-[LibraryClasses.common.PEIM]\r
-  HobLib|MdePkg/Library/PeiHobLib/PeiHobLib.inf\r
-  MemoryAllocationLib|MdePkg/Library/PeiMemoryAllocationLib/PeiMemoryAllocationLib.inf\r
-  ExtractGuidedSectionLib|MdePkg/Library/PeiExtractGuidedSectionLib/PeiExtractGuidedSectionLib.inf\r
-\r
-[LibraryClasses.common.DXE_CORE]\r
-  HobLib|MdePkg/Library/DxeCoreHobLib/DxeCoreHobLib.inf\r
-  MemoryAllocationLib|MdeModulePkg/Library/DxeCoreMemoryAllocationLib/DxeCoreMemoryAllocationLib.inf\r
-  ExtractGuidedSectionLib|MdePkg/Library/DxeExtractGuidedSectionLib/DxeExtractGuidedSectionLib.inf\r
-\r
-[LibraryClasses.common.DXE_DRIVER]\r
-  HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf\r
-  MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf\r
-\r
-[LibraryClasses.common.DXE_RUNTIME_DRIVER]\r
-  HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf\r
-  MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf\r
-  SmbusLib|MdePkg/Library/DxeSmbusLib/DxeSmbusLib.inf\r
-  DebugLib|MdePkg/Library/UefiDebugLibConOut/UefiDebugLibConOut.inf\r
-\r
-[LibraryClasses.common.DXE_SAL_DRIVER]\r
-  HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf\r
-  MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf\r
-  SmbusLib|MdePkg/Library/DxeSmbusLib/DxeSmbusLib.inf\r
-  DebugLib|MdePkg/Library/UefiDebugLibConOut/UefiDebugLibConOut.inf\r
-\r
-[LibraryClasses.common.DXE_SMM_DRIVER]\r
-  HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf\r
-  MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf\r
-  SmbusLib|MdePkg/Library/DxeSmbusLib/DxeSmbusLib.inf\r
-  DebugLib|MdePkg/Library/UefiDebugLibConOut/UefiDebugLibConOut.inf\r
-\r
-[LibraryClasses.common.UEFI_DRIVER]\r
-  HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf\r
-  MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf\r
-  DebugLib|MdePkg/Library/UefiDebugLibConOut/UefiDebugLibConOut.inf\r
-\r
-[LibraryClasses.common.UEFI_APPLICATION]\r
-  HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf\r
-  MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf\r
-  DebugLib|MdePkg/Library/UefiDebugLibStdErr/UefiDebugLibStdErr.inf\r
-\r
-[PcdsFeatureFlag.common]\r
-  gEfiMdePkgTokenSpaceGuid.PcdComponentNameDisable|FALSE\r
-  gEfiMdePkgTokenSpaceGuid.PcdDriverDiagnosticsDisable|FALSE\r
-  gEfiMdePkgTokenSpaceGuid.PcdComponentName2Disable|TRUE\r
-  gEfiMdePkgTokenSpaceGuid.PcdDriverDiagnostics2Disable|TRUE\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdDevicePathSupportDevicePathFromText|FALSE\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdDevicePathSupportDevicePathToText|FALSE\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdVariableCollectStatistics|FALSE\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdUnicodeCollationSupport|TRUE\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdUnicodeCollation2Support|TRUE\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdConOutGopSupport|TRUE\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdConOutUgaSupport|TRUE\r
-\r
-[PcdsFeatureFlag.IA32]\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdDxeIplSwitchToLongMode|TRUE\r
-\r
-[PcdsFixedAtBuild.common]\r
-  gEfiMdePkgTokenSpaceGuid.PcdMaximumUnicodeStringLength|1000000\r
-  gEfiMdePkgTokenSpaceGuid.PcdMaximumAsciiStringLength|1000000\r
-  gEfiMdePkgTokenSpaceGuid.PcdMaximumLinkedListLength|1000000\r
-  gEfiMdePkgTokenSpaceGuid.PcdSpinLockTimeout|10000000\r
-  gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0x0f\r
-  gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x80000000\r
-  gEfiMdePkgTokenSpaceGuid.PcdReportStatusCodePropertyMask|0x06\r
-  gEfiMdePkgTokenSpaceGuid.PcdDebugClearMemoryValue|0xAF\r
-  gEfiMdePkgTokenSpaceGuid.PcdPerformanceLibraryPropertyMask|0\r
-  gEfiMdePkgTokenSpaceGuid.PcdPostCodePropertyMask|0\r
-  gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress|0xE0000000\r
-  gEfiMdePkgTokenSpaceGuid.PcdFSBClock|200000000\r
-  gEfiMdePkgTokenSpaceGuid.PcdUefiLibMaxPrintBufferSize|320\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdMaxSizeNonPopulateCapsule|0x0\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdMaxSizePopulateCapsule|0x0\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase|0x0\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize|0x0\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase|0x0\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize|0x0\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableBase|0x0\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize|0x0\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdMaxPeiPerformanceLogEntries|28\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdVpdBaseAddress|0x0\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdMaxPeiPcdCallBackNumberPerPcdEntry|0x08\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueEfiWatchDogTimerExpired|0x00011003   # EFI_COMPUTING_UNIT_HOST_PROCESSOR | EFI_CU_HP_EC_TIMER_EXPIRED\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueMemoryTestStarted|0x00051006         # EFI_SOFTWARE_EFI_BOOT_SERVICE | EFI_SW_RS_PC_SET_VIRTUAL_ADDRESS_MAP\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueSetVirtualAddressMap|0x03101004      # EFI_COMPUTING_UNIT_MEMORY | EFI_CU_MEMORY_PC_TEST\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueUncorrectableMemoryError|0x0005100   # EFI_COMPUTING_UNIT_MEMORY | EFI_CU_MEMORY_EC_UNCORRECTABLE3\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueRemoteConsoleError|0x01040006        # EFI_PERIPHERAL_REMOTE_CONSOLE | EFI_P_EC_CONTROLLER_ERROR\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueRemoteConsoleReset|0x01040001        # EFI_PERIPHERAL_REMOTE_CONSOLE | EFI_P_PC_RESET\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueRemoteConsoleInputError|0x01040007   # EFI_PERIPHERAL_REMOTE_CONSOLE | EFI_P_EC_INPUT_ERROR\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueRemoteConsoleOutputError|0x01040008  # EFI_PERIPHERAL_REMOTE_CONSOLE | EFI_P_EC_OUTPUT_ERROR\r
-\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueMouseInterfaceError|0x01020005       # EFI_PERIPHERAL_MOUSE | EFI_P_EC_INTERFACE_ERROR\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueMouseEnable|0x01020004               # EFI_PERIPHERAL_MOUSE | EFI_P_PC_ENABLE\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueMouseDisable|0x01020002              # EFI_PERIPHERAL_MOUSE | EFI_P_PC_DISABLE\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueKeyboardEnable|0x01010004            # EFI_PERIPHERAL_KEYBOARD | EFI_P_PC_ENABLE\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueKeyboardPresenceDetect|0x01010003    # EFI_PERIPHERAL_KEYBOARD | EFI_P_PC_PRESENCE_DETECT\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueKeyboardDisable|0x01010002           # EFI_PERIPHERAL_KEYBOARD | EFI_P_PC_DISABLE\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueKeyboardReset|0x01010001             # EFI_PERIPHERAL_KEYBOARD | EFI_P_PC_RESET\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueKeyboardClearBuffer|0x01011000       # EFI_PERIPHERAL_KEYBOARD | EFI_P_KEYBOARD_PC_CLEAR_BUFFER\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueKeyboardSelfTest|0x01011001          # EFI_PERIPHERAL_KEYBOARD | EFI_P_KEYBOARD_PC_SELF_TEST\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueKeyboardInterfaceError|0x01010005    # EFI_PERIPHERAL_KEYBOARD | EFI_P_EC_INTERFACE_ERROR\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueKeyboardInputError|0x01010007        # EFI_PERIPHERAL_KEYBOARD | EFI_P_EC_INPUT_ERROR\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueMouseInputError|0x01020007           # EFI_PERIPHERAL_MOUSE | EFI_P_EC_INPUT_ERROR\r
-  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueMouseReset|0x01020001                # EFI_PERIPHERAL_MOUSE | EFI_P_PC_RESET\r
-\r
-  gEfiMdePkgTokenSpaceGuid.PcdUartDefaultBaudRate|115200\r
-  gEfiMdePkgTokenSpaceGuid.PcdUartDefaultDataBits|8\r
-  gEfiMdePkgTokenSpaceGuid.PcdUartDefaultParity|1\r
-  gEfiMdePkgTokenSpaceGuid.PcdUartDefaultStopBits|1\r
-  gEfiMdePkgTokenSpaceGuid.PcdDefaultTerminalType|0\r
-  gEfiMdePkgTokenSpaceGuid.PcdMaximumGuidedExtractHandler|0x10\r
-\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxFvSupported|6\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxPeimPerFv|32\r
-  gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxPeiStackSize|0x20000\r
-\r
-\r
-[PcdsFixedAtBuild.IPF]\r
-  gEfiMdePkgTokenSpaceGuid.PcdIoBlockBaseAddressForIpf|0x0ffffc000000\r
-\r
-###################################################################################################\r
-#\r
-# Components Section - list of the modules and components that will be processed by compilation\r
-#                      tools and the EDK II tools to generate PE32/PE32+/Coff image files.\r
-#\r
-# Note: The EDK II DSC file is not used to specify how compiled binary images get placed\r
-#       into firmware volume images. This section is just a list of modules to compile from\r
-#       source into UEFI-compliant binaries.\r
-#       It is the FDF file that contains information on combining binary files into firmware\r
-#       volume images, whose concept is beyond UEFI and is described in PI specification.\r
-#       Binary modules do not need to be listed in this section, as they should be\r
-#       specified in the FDF file. For example: Shell binary (Shell_Full.efi), FAT binary (Fat.efi),\r
-#       Logo (Logo.bmp), and etc.\r
-#       There may also be modules listed in this section that are not required in the FDF file,\r
-#       When a module listed here is excluded from FDF file, then UEFI-compliant binary will be\r
-#       generated for it, but the binary will not be put into any firmware volume.\r
-#\r
-###################################################################################################\r
-\r
-[Components.common]\r
-  MdeModulePkg/Application/HelloWorld/HelloWorld.inf\r
-\r
-  MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf\r
-  MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf\r
-  MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf\r
-  MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf\r
-  MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf\r
-  MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf\r
-  MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf\r
-  MdeModulePkg/Bus/Usb/UsbMouseAbsolutePointerDxe/UsbMouseAbsolutePointerDxe.inf\r
-  MdeModulePkg/Bus/Usb/UsbMouseDxe/UsbMouseDxe.inf\r
-\r
-  MdeModulePkg/Core/Dxe/DxeMain.inf {\r
-    <LibraryClasses>\r
-      NULL|MdeModulePkg/Library/DxeCrc32GuidedSectionExtractLib/DxeCrc32GuidedSectionExtractLib.inf\r
-  }\r
-  MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf\r
-  MdeModulePkg/Core/Pei/PeiMain.inf\r
-  MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf\r
-\r
-  MdeModulePkg/Library/DxeCapsuleLibNull/DxeCapsuleLibNull.inf\r
-  MdeModulePkg/Library/DxeCoreMemoryAllocationLib/DxeCoreMemoryAllocationLib.inf\r
-  MdeModulePkg/Library/DxeCorePerformanceLib/DxeCorePerformanceLib.inf\r
-  MdeModulePkg/Library/DxeCrc32GuidedSectionExtractLib/DxeCrc32GuidedSectionExtractLib.inf\r
-  MdeModulePkg/Library/DxeDpcLib/DxeDpcLib.inf\r
-  MdeModulePkg/Library/DxeIpIoLib/DxeIpIoLib.inf\r
-  MdeModulePkg/Library/DxeNetLib/DxeNetLib.inf\r
-  MdeModulePkg/Library/DxePerformanceLib/DxePerformanceLib.inf\r
-  MdeModulePkg/Library/DxeUdpIoLib/DxeUdpIoLib.inf\r
-  MdeModulePkg/Library/DxePrintLibPrint2Protocol/DxePrintLibPrint2Protocol.inf\r
-  MdeModulePkg/Library/PeiPerformanceLib/PeiPerformanceLib.inf\r
-  MdeModulePkg/Library/PeiRecoveryLibNull/PeiRecoveryLibNull.inf\r
-  MdeModulePkg/Library/PeiS3LibNull/PeiS3LibNull.inf\r
-  MdeModulePkg/Library/UefiHiiLib/UefiHiiLib.inf\r
-  MdeModulePkg/Library/BaseResetSystemLibNull/BaseResetSystemLibNull.inf\r
-\r
-  MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf\r
-  MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf\r
-  MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf\r
-  MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf\r
-  MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf\r
-  MdeModulePkg/Universal/DebugPortDxe/DebugPortDxe.inf\r
-  MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
-  MdeModulePkg/Universal/PrintDxe/PrintDxe.inf\r
-  MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf\r
-  MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf\r
-  MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf\r
-  MdeModulePkg/Universal/DriverSampleDxe/DriverSampleDxe.inf\r
-  MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf\r
-  MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf\r
-  MdeModulePkg/Universal/Metronome/Metronome.inf\r
-  MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf\r
-\r
-  MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf\r
-  MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf\r
-  MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf\r
-  MdeModulePkg/Universal/Network/Ip4ConfigDxe/Ip4ConfigDxe.inf\r
-  MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf\r
-  MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf\r
-  MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf\r
-  MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf\r
-  MdeModulePkg/Universal/Network/SnpDxe/SnpDxe.inf\r
-  MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf\r
-  MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf\r
-  MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf\r
-\r
-  MdeModulePkg/Universal/PcatSingleSegmentPciCfg2Pei/PcatSingleSegmentPciCfg2Pei.inf\r
-  MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
-  MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
-  MdeModulePkg/Universal/PlatformDriOverrideDxe/PlatformDriOverrideDxe.inf\r
-  MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf\r
-  MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf\r
-  MdeModulePkg/Application/VariableInfo/VariableInfo.inf\r
-  MdeModulePkg/Universal/Variable/Pei/VariablePei.inf\r
-  MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf\r
-  MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf\r
-\r
-  MdeModulePkg/Universal/Acpi/AcpiPlatformDxe/AcpiPlatformDxe.inf\r
-  MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf\r
-\r
-[Components.IA32, Components.X64]\r
-  MdeModulePkg/Universal/DebugSupportDxe/DebugSupportDxe.inf\r
-  MdeModulePkg/Universal/EbcDxe/EbcDxe.inf\r
-  MdeModulePkg/Universal/Variable/EmuRuntimeDxe/EmuVariableRuntimeDxe.inf\r
-  MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf\r
-\r
-\r
-[Components.IPF]\r
-  MdeModulePkg/Universal/DebugSupportDxe/DebugSupportDxe.inf\r
-  MdeModulePkg/Universal/EbcDxe/EbcDxe.inf\r
-\r
-\r
-[Components.EBC]\r
-  MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf\r
-  MdeModulePkg/Universal/Variable/EmuRuntimeDxe/EmuVariableRuntimeDxe.inf\r
+#/** @file
+# EFI/PI Reference Module Package for All Architectures
+#
+# Copyright (c) 2007 - 2009, Intel Corporation
+#
+#  All rights reserved. This program and the accompanying materials
+#    are licensed and made available under the terms and conditions of the BSD License
+#    which accompanies this distribution. The full text of the license may be found at
+#    http://opensource.org/licenses/bsd-license.php
+#
+#    THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+#    WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+#
+#**/
+
+[Defines]
+  PLATFORM_NAME                  = MdeModule
+  PLATFORM_GUID                  = 587CE499-6CBE-43cd-94E2-186218569478
+  PLATFORM_VERSION               = 0.90
+  DSC_SPECIFICATION              = 0x00010005
+  OUTPUT_DIRECTORY               = Build/MdeModule
+  SUPPORTED_ARCHITECTURES        = IA32|IPF|X64|EBC|ARM
+  BUILD_TARGETS                  = DEBUG|RELEASE
+  SKUID_IDENTIFIER               = DEFAULT
+
+
+
+[LibraryClasses.common]
+  CacheMaintenanceLib|MdePkg/Library/BaseCacheMaintenanceLib/BaseCacheMaintenanceLib.inf
+  DebugLib|MdePkg/Library/BaseDebugLibNull/BaseDebugLibNull.inf
+  BaseLib|MdePkg/Library/BaseLib/BaseLib.inf
+  SynchronizationLib|MdePkg/Library/BaseSynchronizationLib/BaseSynchronizationLib.inf
+  CpuLib|MdePkg/Library/BaseCpuLib/BaseCpuLib.inf
+  BaseMemoryLib|MdePkg/Library/BaseMemoryLib/BaseMemoryLib.inf
+  PciCf8Lib|MdePkg/Library/BasePciCf8Lib/BasePciCf8Lib.inf
+  PciExpressLib|MdePkg/Library/BasePciExpressLib/BasePciExpressLib.inf
+  PciLib|MdePkg/Library/BasePciLibCf8/BasePciLibCf8.inf
+  PeCoffGetEntryPointLib|MdePkg/Library/BasePeCoffGetEntryPointLib/BasePeCoffGetEntryPointLib.inf
+  PeCoffLib|MdePkg/Library/BasePeCoffLib/BasePeCoffLib.inf
+  PeCoffExtraActionLib|MdePkg/Library/BasePeCoffExtraActionLibNull/BasePeCoffExtraActionLibNull.inf
+  PerformanceLib|MdePkg/Library/BasePerformanceLibNull/BasePerformanceLibNull.inf
+  PostCodeLib|MdePkg/Library/BasePostCodeLibDebug/BasePostCodeLibDebug.inf
+  PostCodeLib|MdePkg/Library/BasePostCodeLibPort80/BasePostCodeLibPort80.inf
+  PrintLib|MdePkg/Library/BasePrintLib/BasePrintLib.inf
+  TimerLib|MdePkg/Library/BaseTimerLibNullTemplate/BaseTimerLibNullTemplate.inf
+  UefiDecompressLib|MdePkg/Library/BaseUefiDecompressLib/BaseUefiDecompressLib.inf
+
+  PeiCoreEntryPoint|MdePkg/Library/PeiCoreEntryPoint/PeiCoreEntryPoint.inf
+  PeimEntryPoint|MdePkg/Library/PeimEntryPoint/PeimEntryPoint.inf
+  DxeCoreEntryPoint|MdePkg/Library/DxeCoreEntryPoint/DxeCoreEntryPoint.inf
+  UefiDriverEntryPoint|MdePkg/Library/UefiDriverEntryPoint/UefiDriverEntryPoint.inf
+  UefiApplicationEntryPoint|MdePkg/Library/UefiApplicationEntryPoint/UefiApplicationEntryPoint.inf
+  PeiServicesLib|MdePkg/Library/PeiServicesLib/PeiServicesLib.inf
+  PeiServicesTablePointerLib|MdePkg/Library/PeiServicesTablePointerLib/PeiServicesTablePointerLib.inf
+  PalLib|MdePkg/Library/BasePalLibNull/BasePalLibNull.inf
+  UefiBootServicesTableLib|MdePkg/Library/UefiBootServicesTableLib/UefiBootServicesTableLib.inf
+  DevicePathLib|MdePkg/Library/UefiDevicePathLib/UefiDevicePathLib.inf
+  UefiLib|MdePkg/Library/UefiLib/UefiLib.inf
+  DxeServicesTableLib|MdePkg/Library/DxeServicesTableLib/DxeServicesTableLib.inf
+  UefiRuntimeServicesTableLib|MdePkg/Library/UefiRuntimeServicesTableLib/UefiRuntimeServicesTableLib.inf
+  UefiRuntimeLib|MdePkg/Library/UefiRuntimeLib/UefiRuntimeLib.inf
+  UefiScsiLib|MdePkg/Library/UefiScsiLib/UefiScsiLib.inf
+  UefiUsbLib|MdePkg/Library/UefiUsbLib/UefiUsbLib.inf
+  NetLib|MdeModulePkg/Library/DxeNetLib/DxeNetLib.inf
+  IpIoLib|MdeModulePkg/Library/DxeIpIoLib/DxeIpIoLib.inf
+  UdpIoLib|MdeModulePkg/Library/DxeUdpIoLib/DxeUdpIoLib.inf
+  DpcLib|MdeModulePkg/Library/DxeDpcLib/DxeDpcLib.inf
+  PcdLib|MdePkg/Library/BasePcdLibNull/BasePcdLibNull.inf
+  CapsuleLib|MdeModulePkg/Library/DxeCapsuleLibNull/DxeCapsuleLibNull.inf
+  DxeServicesLib|MdePkg/Library/DxeServicesLib/DxeServicesLib.inf
+  DxeServicesLib|MdePkg/Library/DxeServicesLib/DxeServicesLib.inf
+  HiiLib|MdeModulePkg/Library/UefiHiiLib/UefiHiiLib.inf
+  ReportStatusCodeLib|MdePkg/Library/BaseReportStatusCodeLibNull/BaseReportStatusCodeLibNull.inf
+  UefiHiiServicesLib|MdeModulePkg/Library/UefiHiiServicesLib/UefiHiiServicesLib.inf
+
+[LibraryClasses.IA32]
+  IoLib|MdePkg/Library/BaseIoLibIntrinsic/BaseIoLibIntrinsic.inf
+
+[LibraryClasses.X64]
+  IoLib|MdePkg/Library/BaseIoLibIntrinsic/BaseIoLibIntrinsic.inf
+
+[LibraryClasses.IPF]
+  IoLib|MdePkg/Library/BaseIoLibIntrinsic/BaseIoLibIntrinsic.inf
+
+[LibraryClasses.ARM]
+  IoLib|MdePkg/Library/BaseIoLibIntrinsic/BaseIoLibIntrinsic.inf
+
+[LibraryClasses.EBC.DXE_DRIVER]
+  IoLib|IntelFrameworkPkg/Library/DxeIoLibCpuIo/DxeIoLibCpuIo.inf
+
+[LibraryClasses.EBC.PEIM]
+  IoLib|MdePkg/Library/PeiIoLibCpuIo/PeiIoLibCpuIo.inf
+
+[LibraryClasses.common.PEI_CORE]
+  HobLib|MdePkg/Library/PeiHobLib/PeiHobLib.inf
+  MemoryAllocationLib|MdePkg/Library/PeiMemoryAllocationLib/PeiMemoryAllocationLib.inf
+
+[LibraryClasses.common.PEIM]
+  HobLib|MdePkg/Library/PeiHobLib/PeiHobLib.inf
+  MemoryAllocationLib|MdePkg/Library/PeiMemoryAllocationLib/PeiMemoryAllocationLib.inf
+  ExtractGuidedSectionLib|MdePkg/Library/PeiExtractGuidedSectionLib/PeiExtractGuidedSectionLib.inf
+
+[LibraryClasses.common.DXE_CORE]
+  HobLib|MdePkg/Library/DxeCoreHobLib/DxeCoreHobLib.inf
+  MemoryAllocationLib|MdeModulePkg/Library/DxeCoreMemoryAllocationLib/DxeCoreMemoryAllocationLib.inf
+  ExtractGuidedSectionLib|MdePkg/Library/DxeExtractGuidedSectionLib/DxeExtractGuidedSectionLib.inf
+
+[LibraryClasses.common.DXE_DRIVER]
+  HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf
+  MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf
+
+[LibraryClasses.common.DXE_RUNTIME_DRIVER]
+  HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf
+  MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf
+  SmbusLib|MdePkg/Library/DxeSmbusLib/DxeSmbusLib.inf
+  DebugLib|MdePkg/Library/UefiDebugLibConOut/UefiDebugLibConOut.inf
+
+[LibraryClasses.common.DXE_SAL_DRIVER]
+  HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf
+  MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf
+  SmbusLib|MdePkg/Library/DxeSmbusLib/DxeSmbusLib.inf
+  DebugLib|MdePkg/Library/UefiDebugLibConOut/UefiDebugLibConOut.inf
+
+[LibraryClasses.common.DXE_SMM_DRIVER]
+  HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf
+  MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf
+  SmbusLib|MdePkg/Library/DxeSmbusLib/DxeSmbusLib.inf
+  DebugLib|MdePkg/Library/UefiDebugLibConOut/UefiDebugLibConOut.inf
+
+[LibraryClasses.common.UEFI_DRIVER]
+  HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf
+  MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf
+  DebugLib|MdePkg/Library/UefiDebugLibConOut/UefiDebugLibConOut.inf
+
+[LibraryClasses.common.UEFI_APPLICATION]
+  HobLib|MdePkg/Library/DxeHobLib/DxeHobLib.inf
+  MemoryAllocationLib|MdePkg/Library/UefiMemoryAllocationLib/UefiMemoryAllocationLib.inf
+  DebugLib|MdePkg/Library/UefiDebugLibStdErr/UefiDebugLibStdErr.inf
+
+[PcdsFeatureFlag.common]
+  gEfiMdePkgTokenSpaceGuid.PcdComponentNameDisable|FALSE
+  gEfiMdePkgTokenSpaceGuid.PcdDriverDiagnosticsDisable|FALSE
+  gEfiMdePkgTokenSpaceGuid.PcdComponentName2Disable|TRUE
+  gEfiMdePkgTokenSpaceGuid.PcdDriverDiagnostics2Disable|TRUE
+  gEfiMdeModulePkgTokenSpaceGuid.PcdDevicePathSupportDevicePathFromText|FALSE
+  gEfiMdeModulePkgTokenSpaceGuid.PcdDevicePathSupportDevicePathToText|FALSE
+  gEfiMdeModulePkgTokenSpaceGuid.PcdVariableCollectStatistics|FALSE
+  gEfiMdeModulePkgTokenSpaceGuid.PcdUnicodeCollationSupport|TRUE
+  gEfiMdeModulePkgTokenSpaceGuid.PcdUnicodeCollation2Support|TRUE
+  gEfiMdeModulePkgTokenSpaceGuid.PcdConOutGopSupport|TRUE
+  gEfiMdeModulePkgTokenSpaceGuid.PcdConOutUgaSupport|TRUE
+
+[PcdsFeatureFlag.IA32]
+  gEfiMdeModulePkgTokenSpaceGuid.PcdDxeIplSwitchToLongMode|TRUE
+
+[PcdsFixedAtBuild.common]
+  gEfiMdePkgTokenSpaceGuid.PcdMaximumUnicodeStringLength|1000000
+  gEfiMdePkgTokenSpaceGuid.PcdMaximumAsciiStringLength|1000000
+  gEfiMdePkgTokenSpaceGuid.PcdMaximumLinkedListLength|1000000
+  gEfiMdePkgTokenSpaceGuid.PcdSpinLockTimeout|10000000
+  gEfiMdePkgTokenSpaceGuid.PcdDebugPropertyMask|0x0f
+  gEfiMdePkgTokenSpaceGuid.PcdDebugPrintErrorLevel|0x80000000
+  gEfiMdePkgTokenSpaceGuid.PcdReportStatusCodePropertyMask|0x06
+  gEfiMdePkgTokenSpaceGuid.PcdDebugClearMemoryValue|0xAF
+  gEfiMdePkgTokenSpaceGuid.PcdPerformanceLibraryPropertyMask|0
+  gEfiMdePkgTokenSpaceGuid.PcdPostCodePropertyMask|0
+  gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress|0xE0000000
+  gEfiMdePkgTokenSpaceGuid.PcdFSBClock|200000000
+  gEfiMdePkgTokenSpaceGuid.PcdUefiLibMaxPrintBufferSize|320
+  gEfiMdeModulePkgTokenSpaceGuid.PcdMaxSizeNonPopulateCapsule|0x0
+  gEfiMdeModulePkgTokenSpaceGuid.PcdMaxSizePopulateCapsule|0x0
+  gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase|0x0
+  gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize|0x0
+  gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase|0x0
+  gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize|0x0
+  gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableBase|0x0
+  gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize|0x0
+  gEfiMdeModulePkgTokenSpaceGuid.PcdMaxPeiPerformanceLogEntries|28
+  gEfiMdeModulePkgTokenSpaceGuid.PcdVpdBaseAddress|0x0
+  gEfiMdeModulePkgTokenSpaceGuid.PcdMaxPeiPcdCallBackNumberPerPcdEntry|0x08
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueEfiWatchDogTimerExpired|0x00011003   # EFI_COMPUTING_UNIT_HOST_PROCESSOR | EFI_CU_HP_EC_TIMER_EXPIRED
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueMemoryTestStarted|0x00051006         # EFI_SOFTWARE_EFI_BOOT_SERVICE | EFI_SW_RS_PC_SET_VIRTUAL_ADDRESS_MAP
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueSetVirtualAddressMap|0x03101004      # EFI_COMPUTING_UNIT_MEMORY | EFI_CU_MEMORY_PC_TEST
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueUncorrectableMemoryError|0x0005100   # EFI_COMPUTING_UNIT_MEMORY | EFI_CU_MEMORY_EC_UNCORRECTABLE3
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueRemoteConsoleError|0x01040006        # EFI_PERIPHERAL_REMOTE_CONSOLE | EFI_P_EC_CONTROLLER_ERROR
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueRemoteConsoleReset|0x01040001        # EFI_PERIPHERAL_REMOTE_CONSOLE | EFI_P_PC_RESET
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueRemoteConsoleInputError|0x01040007   # EFI_PERIPHERAL_REMOTE_CONSOLE | EFI_P_EC_INPUT_ERROR
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueRemoteConsoleOutputError|0x01040008  # EFI_PERIPHERAL_REMOTE_CONSOLE | EFI_P_EC_OUTPUT_ERROR
+
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueMouseInterfaceError|0x01020005       # EFI_PERIPHERAL_MOUSE | EFI_P_EC_INTERFACE_ERROR
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueMouseEnable|0x01020004               # EFI_PERIPHERAL_MOUSE | EFI_P_PC_ENABLE
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueMouseDisable|0x01020002              # EFI_PERIPHERAL_MOUSE | EFI_P_PC_DISABLE
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueKeyboardEnable|0x01010004            # EFI_PERIPHERAL_KEYBOARD | EFI_P_PC_ENABLE
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueKeyboardPresenceDetect|0x01010003    # EFI_PERIPHERAL_KEYBOARD | EFI_P_PC_PRESENCE_DETECT
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueKeyboardDisable|0x01010002           # EFI_PERIPHERAL_KEYBOARD | EFI_P_PC_DISABLE
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueKeyboardReset|0x01010001             # EFI_PERIPHERAL_KEYBOARD | EFI_P_PC_RESET
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueKeyboardClearBuffer|0x01011000       # EFI_PERIPHERAL_KEYBOARD | EFI_P_KEYBOARD_PC_CLEAR_BUFFER
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueKeyboardSelfTest|0x01011001          # EFI_PERIPHERAL_KEYBOARD | EFI_P_KEYBOARD_PC_SELF_TEST
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueKeyboardInterfaceError|0x01010005    # EFI_PERIPHERAL_KEYBOARD | EFI_P_EC_INTERFACE_ERROR
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueKeyboardInputError|0x01010007        # EFI_PERIPHERAL_KEYBOARD | EFI_P_EC_INPUT_ERROR
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueMouseInputError|0x01020007           # EFI_PERIPHERAL_MOUSE | EFI_P_EC_INPUT_ERROR
+  gEfiMdePkgTokenSpaceGuid.PcdStatusCodeValueMouseReset|0x01020001                # EFI_PERIPHERAL_MOUSE | EFI_P_PC_RESET
+
+  gEfiMdePkgTokenSpaceGuid.PcdUartDefaultBaudRate|115200
+  gEfiMdePkgTokenSpaceGuid.PcdUartDefaultDataBits|8
+  gEfiMdePkgTokenSpaceGuid.PcdUartDefaultParity|1
+  gEfiMdePkgTokenSpaceGuid.PcdUartDefaultStopBits|1
+  gEfiMdePkgTokenSpaceGuid.PcdDefaultTerminalType|0
+  gEfiMdePkgTokenSpaceGuid.PcdMaximumGuidedExtractHandler|0x10
+
+  gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxFvSupported|6
+  gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxPeimPerFv|32
+  gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxPeiStackSize|0x20000
+
+
+[PcdsFixedAtBuild.IPF]
+  gEfiMdePkgTokenSpaceGuid.PcdIoBlockBaseAddressForIpf|0x0ffffc000000
+
+###################################################################################################
+#
+# Components Section - list of the modules and components that will be processed by compilation
+#                      tools and the EDK II tools to generate PE32/PE32+/Coff image files.
+#
+# Note: The EDK II DSC file is not used to specify how compiled binary images get placed
+#       into firmware volume images. This section is just a list of modules to compile from
+#       source into UEFI-compliant binaries.
+#       It is the FDF file that contains information on combining binary files into firmware
+#       volume images, whose concept is beyond UEFI and is described in PI specification.
+#       Binary modules do not need to be listed in this section, as they should be
+#       specified in the FDF file. For example: Shell binary (Shell_Full.efi), FAT binary (Fat.efi),
+#       Logo (Logo.bmp), and etc.
+#       There may also be modules listed in this section that are not required in the FDF file,
+#       When a module listed here is excluded from FDF file, then UEFI-compliant binary will be
+#       generated for it, but the binary will not be put into any firmware volume.
+#
+###################################################################################################
+
+[Components.common]
+  MdeModulePkg/Application/HelloWorld/HelloWorld.inf
+
+  MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf
+  MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf
+  MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
+  MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
+  MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf
+  MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf
+  MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf
+  MdeModulePkg/Bus/Usb/UsbMouseAbsolutePointerDxe/UsbMouseAbsolutePointerDxe.inf
+  MdeModulePkg/Bus/Usb/UsbMouseDxe/UsbMouseDxe.inf
+
+  MdeModulePkg/Core/Dxe/DxeMain.inf {
+    <LibraryClasses>
+      NULL|MdeModulePkg/Library/DxeCrc32GuidedSectionExtractLib/DxeCrc32GuidedSectionExtractLib.inf
+  }
+  MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
+  MdeModulePkg/Core/Pei/PeiMain.inf
+  MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
+
+  MdeModulePkg/Library/DxeCapsuleLibNull/DxeCapsuleLibNull.inf
+  MdeModulePkg/Library/DxeCoreMemoryAllocationLib/DxeCoreMemoryAllocationLib.inf
+  MdeModulePkg/Library/DxeCorePerformanceLib/DxeCorePerformanceLib.inf
+  MdeModulePkg/Library/DxeCrc32GuidedSectionExtractLib/DxeCrc32GuidedSectionExtractLib.inf
+  MdeModulePkg/Library/DxeDpcLib/DxeDpcLib.inf
+  MdeModulePkg/Library/DxeIpIoLib/DxeIpIoLib.inf
+  MdeModulePkg/Library/DxeNetLib/DxeNetLib.inf
+  MdeModulePkg/Library/DxePerformanceLib/DxePerformanceLib.inf
+  MdeModulePkg/Library/DxeUdpIoLib/DxeUdpIoLib.inf
+  MdeModulePkg/Library/DxePrintLibPrint2Protocol/DxePrintLibPrint2Protocol.inf
+  MdeModulePkg/Library/PeiPerformanceLib/PeiPerformanceLib.inf
+  MdeModulePkg/Library/PeiRecoveryLibNull/PeiRecoveryLibNull.inf
+  MdeModulePkg/Library/PeiS3LibNull/PeiS3LibNull.inf
+  MdeModulePkg/Library/UefiHiiLib/UefiHiiLib.inf
+  MdeModulePkg/Library/BaseResetSystemLibNull/BaseResetSystemLibNull.inf
+
+  MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
+  MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
+  MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
+  MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
+  MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
+  MdeModulePkg/Universal/DebugPortDxe/DebugPortDxe.inf
+  MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
+  MdeModulePkg/Universal/PrintDxe/PrintDxe.inf
+  MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
+  MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
+  MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
+  MdeModulePkg/Universal/DriverSampleDxe/DriverSampleDxe.inf
+  MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
+  MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
+  MdeModulePkg/Universal/Metronome/Metronome.inf
+  MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
+
+  MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf
+  MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf
+  MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf
+  MdeModulePkg/Universal/Network/Ip4ConfigDxe/Ip4ConfigDxe.inf
+  MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf
+  MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf
+  MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf
+  MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf
+  MdeModulePkg/Universal/Network/SnpDxe/SnpDxe.inf
+  MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
+  MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf
+  MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf
+
+  MdeModulePkg/Universal/PcatSingleSegmentPciCfg2Pei/PcatSingleSegmentPciCfg2Pei.inf
+  MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
+  MdeModulePkg/Universal/PCD/Pei/Pcd.inf
+  MdeModulePkg/Universal/PlatformDriOverrideDxe/PlatformDriOverrideDxe.inf
+  MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
+  MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
+  MdeModulePkg/Application/VariableInfo/VariableInfo.inf
+  MdeModulePkg/Universal/Variable/Pei/VariablePei.inf
+  MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
+  MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
+
+  MdeModulePkg/Universal/Acpi/AcpiPlatformDxe/AcpiPlatformDxe.inf
+  MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf
+
+[Components.IA32, Components.X64]
+  MdeModulePkg/Universal/DebugSupportDxe/DebugSupportDxe.inf
+  MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
+  MdeModulePkg/Universal/Variable/EmuRuntimeDxe/EmuVariableRuntimeDxe.inf
+  MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
+
+
+[Components.IPF]
+  MdeModulePkg/Universal/DebugSupportDxe/DebugSupportDxe.inf
+  MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
+
+
+[Components.EBC]
+  MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
+  MdeModulePkg/Universal/Variable/EmuRuntimeDxe/EmuVariableRuntimeDxe.inf
index 597d3dced7dfb70d44b4c007749dcb559a9d9d5c..0cc502ab7a7d39c52012a47b1631c6daec0d7303 100644 (file)
-#/**@file\r
-# Low leve x64 specific debug support functions.\r
-#\r
-# Copyright (c) 2006 - 2009, Intel Corporation\r
-# All rights reserved. This program and the accompanying materials\r
-# are licensed and made available under the terms and conditions of the BSD License\r
-# which accompanies this distribution.  The full text of the license may be found at\r
-# http://opensource.org/licenses/bsd-license.php\r
-#\r
-# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
-# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
-#\r
-#**/    \r
-\r
-ASM_GLOBAL ASM_PFX(OrigVector)\r
-ASM_GLOBAL ASM_PFX(InterruptEntryStub)\r
-ASM_GLOBAL ASM_PFX(StubSize)\r
-ASM_GLOBAL ASM_PFX(CommonIdtEntry)\r
-ASM_GLOBAL ASM_PFX(FxStorSupport)\r
-     \r
-.data \r
-\r
-ASM_PFX(StubSize):         .long   ASM_PFX(InterruptEntryStubEnd) - ASM_PFX(InterruptEntryStub)\r
-ASM_PFX(AppRsp):           .long   0x11111111 # ?\r
-                           .long   0x11111111 # ?\r
-ASM_PFX(DebugRsp):         .long   0x22222222 # ?\r
-                           .long   0x22222222 # ?\r
-ASM_PFX(ExtraPush):        .long   0x33333333 # ?\r
-                           .long   0x33333333 # ?\r
-ASM_PFX(ExceptData):       .long   0x44444444 # ?\r
-                           .long   0x44444444 # ?\r
-ASM_PFX(Rflags):           .long   0x55555555 # ?\r
-                           .long   0x55555555 # ?\r
-ASM_PFX(OrigVector):       .long   0x66666666 # ?\r
-                           .long   0x66666666 # ?\r
-\r
-## The declarations below define the memory region that will be used for the debug stack.\r
-## The context record will be built by pushing register values onto this stack.\r
-## It is imparitive that alignment be carefully managed, since the FXSTOR and\r
-## FXRSTOR instructions will GP fault if their memory operand is not 16 byte aligned.\r
-##\r
-## The stub will switch stacks from the application stack to the debuger stack\r
-## and pushes the exception number.\r
-##\r
-## Then we building the context record on the stack. Since the stack grows down,\r
-## we push the fields of the context record from the back to the front.  There\r
-## are 336 bytes of stack used prior allocating the 512 bytes of stack to be\r
-## used as the memory buffer for the fxstor instruction. Therefore address of\r
-## the buffer used for the FXSTOR instruction is &Eax - 336 - 512, which\r
-## must be 16 byte aligned.\r
-##\r
-## We carefully locate the stack to make this happen.\r
-##\r
-## For reference, the context structure looks like this:\r
-##      struct {\r
-##        UINT64            ExceptionData;\r
-##        FX_SAVE_STATE_X64 FxSaveState;    // 512 bytes, must be 16 byte aligned\r
-##        UINT64            Dr0, Dr1, Dr2, Dr3, Dr6, Dr7;\r
-##        UINT64            Cr0, Cr1, Cr2, Cr3, Cr4, Cr8;\r
-##        UINT64            RFlags;\r
-##        UINT64            Ldtr, Tr;\r
-##        UINT64            Gdtr[2], Idtr[2];\r
-##        UINT64            Rip;\r
-##        UINT64            Gs, Fs, Es, Ds, Cs, Ss;\r
-##        UINT64            Rdi, Rsi, Rbp, Rsp, Rbx, Rdx, Rcx, Rax;\r
-##        UINT64            R8, R9, R10, R11, R12, R13, R14, R15;\r
-##      } SYSTEM_CONTEXT_X64;  // 64 bit system context record\r
-\r
-.p2align 4\r
-DebugStackEnd : .ascii     "DbgStkEnd >>>>>>"    # 16 byte long string - must be 16 bytes to preserve alignment\r
-                .fill 0x1ffc, 4, 0x00000000\r
-                                                 # 32K should be enough stack\r
-                                                 #   This allocation is coocked to insure\r
-                                                 #   that the the buffer for the FXSTORE instruction\r
-                                                 #   will be 16 byte aligned also.\r
-                                                 #\r
-ASM_PFX(ExceptionNumber):  .long   0x77777777    # first entry will be the vector number pushed by the stub\r
-                           .long   0x77777777    # ?\r
-\r
-DebugStackBegin : .ascii    "<<<< DbgStkBegin"   # initial debug ESP == DebugStackBegin, set in stub\r
-           \r
-\r
-.text\r
-\r
-#------------------------------------------------------------------------------\r
-# BOOLEAN\r
-# FxStorSupport (\r
-#   void\r
-#   )\r
-#\r
-# Abstract: Returns TRUE if FxStor instructions are supported\r
-#\r
-ASM_GLOBAL ASM_PFX(FxStorSupport)\r
-ASM_PFX(FxStorSupport):  \r
-#\r
-# cpuid corrupts rbx which must be preserved per the C calling convention\r
-#\r
-                pushq   %rbx\r
-                movq    $1, %rax\r
-                cpuid\r
-                movl    %edx, %eax\r
-                andq    $0x01000000, %rax\r
-                shrq    $24, %rax\r
-                popq    %rbx\r
-                ret\r
-#------------------------------------------------------------------------------\r
-# void\r
-# Vect2Desc (\r
-#   IA32_IDT_GATE_DESCRIPTOR * DestDesc,  // rcx\r
-#   void (*Vector) (void)   // rdx\r
-#   )\r
-#\r
-# Abstract: Encodes an IDT descriptor with the given physical address\r
-#\r
-ASM_GLOBAL ASM_PFX(Vect2Desc)\r
-ASM_PFX(Vect2Desc):\r
-                movq    %rdx, %rax\r
-                movw    %ax, (%rcx)                  # write bits 15..0 of offset\r
-                movw    %cs, %dx\r
-                movw    %dx, 2(%rcx)                 # SYS_CODE_SEL from GDT\r
-                movw    $(0x0e00 | 0x8000), 4(%rcx)  # type = 386 interrupt gate, present\r
-                shrq    $16, %rax\r
-                movw    %ax, 6(%rcx)                 # write bits 31..16 of offset\r
-                shrq    $16, %rax\r
-                movl    %eax, 8(%rcx)                # write bits 63..32 of offset\r
-\r
-                ret\r
-\r
-#------------------------------------------------------------------------------\r
-# InterruptEntryStub\r
-#\r
-# Abstract: This code is not a function, but is a small piece of code that is\r
-#               copied and fixed up once for each IDT entry that is hooked.\r
-#\r
-ASM_GLOBAL ASM_PFX(InterruptEntryStub)\r
-ASM_PFX(InterruptEntryStub):\r
-\r
-                pushq  $0                       # push vector number - will be modified before installed\r
-                jmp     ASM_PFX(CommonIdtEntry)\r
-                \r
-ASM_GLOBAL ASM_PFX(InterruptEntryStubEnd)\r
-ASM_PFX(InterruptEntryStubEnd):\r
-\r
-#------------------------------------------------------------------------------\r
-# CommonIdtEntry\r
-#\r
-# Abstract: This code is not a function, but is the common part for all IDT\r
-#               vectors.\r
-#\r
-ASM_GLOBAL ASM_PFX(CommonIdtEntry)\r
-##\r
-## At this point, the stub has saved the current application stack esp into AppRsp\r
-## and switched stacks to the debug stack, where it pushed the vector number\r
-##\r
-## The application stack looks like this:\r
-##\r
-##              ...\r
-##              (last application stack entry)\r
-##              [16 bytes alignment, do not care it]\r
-##              SS from interrupted task\r
-##              RSP from interrupted task\r
-##              rflags from interrupted task\r
-##              CS from interrupted task\r
-##              RIP from interrupted task\r
-##              Error code <-------------------- Only present for some exeption types\r
-##\r
-##              Vector Number <----------------- pushed in our IDT Entry\r
-##\r
-\r
-\r
-## The stub switched us to the debug stack and pushed the interrupt number.\r
-##\r
-## Next, construct the context record.  It will be build on the debug stack by\r
-## pushing the registers in the correct order so as to create the context structure\r
-## on the debug stack.  The context record must be built from the end back to the\r
-## beginning because the stack grows down...\r
-#\r
-## For reference, the context record looks like this:\r
-##\r
-## typedef\r
-## struct {\r
-##   UINT64            ExceptionData;\r
-##   FX_SAVE_STATE_X64 FxSaveState;\r
-##   UINT64            Dr0, Dr1, Dr2, Dr3, Dr6, Dr7;\r
-##   UINT64            Cr0, Cr2, Cr3, Cr4, Cr8;\r
-##   UINT64            RFlags;\r
-##   UINT64            Ldtr, Tr;\r
-##   UINT64            Gdtr[2], Idtr[2];\r
-##   UINT64            Rip;\r
-##   UINT64            Gs, Fs, Es, Ds, Cs, Ss;\r
-##   UINT64            Rdi, Rsi, Rbp, Rsp, Rbx, Rdx, Rcx, Rax;\r
-##   UINT64            R8, R9, R10, R11, R12, R13, R14, R15;\r
-## } SYSTEM_CONTEXT_X64;  // 64\r
-ASM_PFX(CommonIdtEntry):\r
-## NOTE: we save rsp here to prevent compiler put rip reference cause error AppRsp\r
-                pushq   %rax\r
-                movq    (8)(%rsp), %rax                  # save vector number\r
-                movq    %rax, ASM_PFX(ExceptionNumber)   # save vector number\r
-                popq    %rax\r
-                addq    $8, %rsp                         # pop vector number\r
-                movq    %rsp, ASM_PFX(AppRsp)            # save stack top\r
-                movq    DebugStackBegin, %rsp            # switch to debugger stack\r
-                subq    $8, %rsp                         # leave space for vector number\r
-## UINT64  Rdi, Rsi, Rbp, Rsp, Rbx, Rdx, Rcx, Rax;\r
-## UINT64  R8, R9, R10, R11, R12, R13, R14, R15;\r
-                pushq    %r15\r
-                pushq    %r14\r
-                pushq    %r13\r
-                pushq    %r12\r
-                pushq    %r11\r
-                pushq    %r10\r
-                pushq    %r9\r
-                pushq    %r8\r
-                pushq    %rax\r
-                pushq    %rcx\r
-                pushq    %rdx\r
-                pushq    %rbx\r
-                pushq    %rsp\r
-                pushq    %rbp\r
-                pushq    %rsi\r
-                pushq    %rdi\r
-## Save interrupt state rflags register...\r
-                pushfq\r
-                popq    %rax\r
-                movq    %rax, ASM_PFX(Rflags)\r
-## We need to determine if any extra data was pushed by the exception, and if so, save it\r
-## To do this, we check the exception number pushed by the stub, and cache the\r
-## result in a variable since we'll need this again.\r
-                cmpl    $0, ASM_PFX(ExceptionNumber)\r
-                jz      ExtraPushOne\r
-                cmpl    $10, ASM_PFX(ExceptionNumber)\r
-                jz      ExtraPushOne\r
-                cmpl    $11, ASM_PFX(ExceptionNumber)\r
-                jz      ExtraPushOne\r
-                cmpl    $12, ASM_PFX(ExceptionNumber)\r
-                jz      ExtraPushOne\r
-                cmpl    $13, ASM_PFX(ExceptionNumber)\r
-                jz      ExtraPushOne\r
-                cmpl    $14, ASM_PFX(ExceptionNumber)\r
-                jz      ExtraPushOne\r
-                cmpl    $17, ASM_PFX(ExceptionNumber)\r
-                jz      ExtraPushOne\r
-                movl    $0, ASM_PFX(ExtraPush)\r
-                movl    $0, ASM_PFX(ExceptData)\r
-                jmp     ExtraPushDone\r
-ExtraPushOne:\r
-                movl  $1, ASM_PFX(ExtraPush)\r
-\r
-## If there's some extra data, save it also, and modify the saved AppRsp to effectively\r
-## pop this value off the application's stack.\r
-                movq    ASM_PFX(AppRsp), %rax \r
-                movq    (%rax), %rbx\r
-                movq    %rbx, ASM_PFX(ExceptData)\r
-                addq    $8, %rax\r
-                movq    %rax, ASM_PFX(AppRsp)\r
-\r
-ExtraPushDone:\r
-\r
-## The "push" above pushed the debug stack rsp.  Since what we're actually doing\r
-## is building the context record on the debug stack, we need to save the pushed\r
-## debug RSP, and replace it with the application's last stack entry...\r
-                movq    24(%rsp), %rax\r
-                movq    %rax, ASM_PFX(DebugRsp)\r
-                movq    ASM_PFX(AppRsp), %rax \r
-                addq    $40, %rax\r
-                # application stack has ss, rsp, rflags, cs, & rip, so\r
-                # last actual application stack entry is 40 bytes\r
-                # into the application stack.\r
-                movq    %rax, 24(%rsp)\r
-\r
-## continue building context record\r
-## UINT64  Gs, Fs, Es, Ds, Cs, Ss;  insure high 16 bits of each is zero\r
-                movq    %ss, %rax\r
-                pushq   %rax\r
-                # CS from application is one entry back in application stack\r
-                movq    ASM_PFX(AppRsp), %rax\r
-                movzxw  8(%rax), %rax\r
-                pushq   %rax\r
-\r
-                movq    %ds, %rax\r
-                pushq   %rax\r
-                movq    %es, %rax\r
-                pushq   %rax\r
-                movq    %fs, %rax\r
-                pushq   %rax\r
-                movq    %gs, %rax\r
-                pushq   %rax\r
-## UINT64  Rip;\r
-                # Rip from application is on top of application stack\r
-                movq    ASM_PFX(AppRsp), %rax \r
-                pushq   (%rax)\r
-## UINT64  Gdtr[2], Idtr[2];\r
-                push    $0\r
-                push    $0\r
-                sidtq   (%rsp)\r
-                push    $0\r
-                push    $0\r
-                sgdtq   (%rsp)\r
-\r
-## UINT64  Ldtr, Tr;\r
-                xorq    %rax, %rax\r
-                str     %ax\r
-                pushq   %rax\r
-                sldt    %ax\r
-                pushq   %rax\r
-\r
-## UINT64  RFlags;\r
-## Rflags from application is two entries back in application stack\r
-                movq    ASM_PFX(AppRsp), %rax \r
-                pushq   16(%rax)\r
-## UINT64  Cr0, Cr1, Cr2, Cr3, Cr4, Cr8;\r
-## insure FXSAVE/FXRSTOR is enabled in CR4...\r
-## ... while we're at it, make sure DE is also enabled...\r
-                movq    %cr8, %rax\r
-                pushq   %rax\r
-                movq    %cr4, %rax\r
-                orq     $0x208, %rax\r
-                movq    %rax, %cr4\r
-                pushq   %rax\r
-                movq    %cr3, %rax\r
-                pushq   %rax\r
-                movq    %cr2, %rax\r
-                pushq   %rax\r
-                push    $0\r
-                movq    %cr0, %rax\r
-                pushq   %rax\r
-## UINT64  Dr0, Dr1, Dr2, Dr3, Dr6, Dr7;\r
-                movq    %dr7, %rax\r
-                pushq   %rax\r
-## clear Dr7 while executing debugger itself\r
-                xorq    %rax, %rax\r
-                movq    %rax, %dr7\r
-\r
-                movq    %dr6, %rax\r
-                pushq   %rax\r
-## insure all status bits in dr6 are clear...\r
-                xorq    %rax, %rax\r
-                movq    %rax, %dr6\r
-\r
-                movq    %dr3, %rax\r
-                pushq   %rax\r
-                movq    %dr2, %rax\r
-                pushq   %rax\r
-                movq    %dr1, %rax\r
-                pushq   %rax\r
-                movq    %dr0, %rax\r
-                pushq   %rax\r
-\r
-## FX_SAVE_STATE_X64 FxSaveState;\r
-                subq    $512, %rsp\r
-                movq    %rsp, %rdi\r
-                # IMPORTANT!! The debug stack has been carefully constructed to\r
-                # insure that rsp and rdi are 16 byte aligned when we get here.\r
-                # They MUST be.  If they are not, a GP fault will occur.\r
-          \r
-                #     FXSTOR_RDI\r
-                fxsave      (%rdi)\r
-\r
-## UINT64  ExceptionData;\r
-                movq    ASM_PFX(ExceptData),  %rax\r
-                pushq   %rax\r
-\r
-# call to C code which will in turn call registered handler\r
-# pass in the vector number\r
-                movq    %rsp, %rdx\r
-                movq    ASM_PFX(ExceptionNumber), %rcx \r
-                subq    $40, %rsp\r
-                call    ASM_PFX(InterruptDistrubutionHub)\r
-                addq    $40, %rsp\r
-# restore context...\r
-## UINT64  ExceptionData;\r
-                addq    $8, %rsp\r
-\r
-## FX_SAVE_STATE_X64 FxSaveState;\r
-                movq    %rsp, %rsi\r
-            \r
-                #    FXRSTOR_RSI\r
-                fxrstor     (%rsi)\r
-\r
-                addq    $512, %rsp\r
-\r
-## UINT64  Dr0, Dr1, Dr2, Dr3, Dr6, Dr7;\r
-                popq    %rax\r
-                movq    %rax, %dr0\r
-                popq    %rax\r
-                movq    %rax, %dr1\r
-                popq    %rax\r
-                movq    %rax, %dr2\r
-                popq    %rax\r
-                movq    %rax, %dr3\r
-\r
-## skip restore of dr6.  We cleared dr6 during the context save.\r
-                addq    $8, %rsp\r
-                popq    %rax\r
-                movq    %rax, %dr7\r
-\r
-## UINT64  Cr0, Cr1, Cr2, Cr3, Cr4, Cr8;\r
-                popq    %rax\r
-                movq    %rax, %cr0\r
-                addq    $8, %rsp\r
-                popq    %rax\r
-                movq    %rax, %cr2\r
-                popq    %rax\r
-                movq    %rax, %cr3\r
-                popq    %rax\r
-                movq    %rax, %cr4\r
-                popq    %rax\r
-                movq    %rax, %cr8\r
-## UINT64  RFlags;\r
-                movq    ASM_PFX(AppRsp), %rax \r
-                popq    16(%rax)\r
-## UINT64  Ldtr, Tr;\r
-## UINT64  Gdtr[2], Idtr[2];\r
-## Best not let anyone mess with these particular registers...\r
-                addq    $48, %rsp\r
-## UINT64  Rip;\r
-                popq    (%rax)\r
-\r
-## UINT64  Gs, Fs, Es, Ds, Cs, Ss;\r
-## NOTE - modified segment registers could hang the debugger...  We\r
-##        could attempt to insulate ourselves against this possibility,\r
-##        but that poses risks as well.\r
-##\r
-\r
-                popq    %rax\r
-                # movq    %rax, %gs\r
-                popq    %rax\r
-                # movq    %rax, %fs\r
-                popq    %rax\r
-                movq    %rax, %es\r
-                popq    %rax\r
-                movq    %rax, %ds\r
-                movq    ASM_PFX(AppRsp), %rax \r
-                popq    8(%rax)\r
-                popq    %rax\r
-                movq    %rax, %ss\r
-## The next stuff to restore is the general purpose registers that were pushed\r
-## using the "push" instruction.\r
-##\r
-## The value of RSP as stored in the context record is the application RSP\r
-## including the 5 entries on the application stack caused by the exception\r
-## itself. It may have been modified by the debug agent, so we need to\r
-## determine if we need to relocate the application stack.\r
-\r
-                movq    24(%rsp), %rbx  # move the potentially modified AppRsp into rbx\r
-                movq    ASM_PFX(AppRsp), %rax \r
-                addq    $40, %rax\r
-                cmpq    %rax, %rbx\r
-                je      NoAppStackMove\r
-\r
-                movq    ASM_PFX(AppRsp), %rax \r
-                movq    (%rax), %rcx     # RIP\r
-                movq    %rcx, (%rbx)\r
-\r
-                movq    8(%rax), %rcx    # CS\r
-                movq    %rcx, 8(%rbx)\r
-\r
-                movq    16(%rax), %rcx   # RFLAGS\r
-                movq    %rcx, 16(%rbx)\r
-\r
-                movq    24(%rax), %rcx   # RSP\r
-                movq    %rcx, 24(%rbx)\r
-\r
-                movq    32(%rax), %rcx   # SS\r
-                movq    %rcx, 32(%rbx)\r
-\r
-                movq    %rbx, %rax       # modify the saved AppRsp to the new AppRsp\r
-                movq    %rax, ASM_PFX(AppRsp)\r
-NoAppStackMove:\r
-                movq    ASM_PFX(DebugRsp), %rax   # restore the DebugRsp on the debug stack\r
-                                         # so our "pop" will not cause a stack switch\r
-                movq    %rax, 24(%rsp)\r
-\r
-                cmpl    $0x068, ASM_PFX(ExceptionNumber)\r
-                jne     NoChain\r
-\r
-Chain:\r
-\r
-## Restore rflags so when we chain, the flags will be exactly as if we were never here.\r
-## We gin up the stack to do an iretq so we can get ALL the flags.\r
-                movq    ASM_PFX(AppRsp), %rax \r
-                movq    40(%rax), %rbx\r
-                pushq   %rbx\r
-                movq    %ss, %rax\r
-                pushq   %rax\r
-                movq    %rsp, %rax\r
-                addq    $16, %rax\r
-                pushq   %rax\r
-                movq    ASM_PFX(AppRsp), %rax \r
-                movq    16(%rax), %rbx\r
-                andq    $0xfffffffffffffcff, %rbx  # special handling for IF and TF\r
-                pushq   %rbx\r
-                movq    %cs, %rax\r
-                pushq   %rax\r
-                movq    PhonyIretq, %rax \r
-                pushq   %rax\r
-                iretq\r
-PhonyIretq:\r
-\r
-## UINT64  Rdi, Rsi, Rbp, Rsp, Rbx, Rdx, Rcx, Rax;\r
-## UINT64  R8, R9, R10, R11, R12, R13, R14, R15;\r
-                popq    %rdi\r
-                popq    %rsi\r
-                popq    %rbp\r
-                popq    %rsp\r
-                popq    %rbx\r
-                popq    %rdx\r
-                popq    %rcx\r
-                popq    %rax\r
-                popq    %r8\r
-                popq    %r9\r
-                popq    %r10\r
-                popq    %r11\r
-                popq    %r12\r
-                popq    %r13\r
-                popq    %r14\r
-                popq    %r15\r
-\r
-## Switch back to application stack\r
-                movq    ASM_PFX(AppRsp), %rsp \r
-## Jump to original handler\r
-                jmp     ASM_PFX(OrigVector)\r
-NoChain:\r
-## UINT64  Rdi, Rsi, Rbp, Rsp, Rbx, Rdx, Rcx, Rax;\r
-## UINT64  R8, R9, R10, R11, R12, R13, R14, R15;\r
-                popq    %rdi\r
-                popq    %rsi\r
-                popq    %rbp\r
-                popq    %rsp\r
-                popq    %rbx\r
-                popq    %rdx\r
-                popq    %rcx\r
-                popq    %rax\r
-                popq    %r8\r
-                popq    %r9\r
-                popq    %r10\r
-                popq    %r11\r
-                popq    %r12\r
-                popq    %r13\r
-                popq    %r14\r
-                popq    %r15\r
-\r
-## Switch back to application stack\r
-                movq    ASM_PFX(AppRsp), %rsp \r
-\r
-## We're outa here...\r
-                iret\r
+///**@file
+// Low leve x64 specific debug support functions.
+//
+// Copyright (c) 2006 - 2009, Intel Corporation
+// Portions copyright (c) 2008-2009 Apple Inc. All rights reserved.
+// All rights reserved. This program and the accompanying materials
+// are licensed and made available under the terms and conditions of the BSD License
+// which accompanies this distribution.  The full text of the license may be found at
+// http://opensource.org/licenses/bsd-license.php
+//
+// THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+// WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+//
+//**/    
+
+ASM_GLOBAL ASM_PFX(OrigVector)
+ASM_GLOBAL ASM_PFX(InterruptEntryStub)
+ASM_GLOBAL ASM_PFX(StubSize)
+ASM_GLOBAL ASM_PFX(CommonIdtEntry)
+ASM_GLOBAL ASM_PFX(FxStorSupport)
+     
+.data 
+
+ASM_PFX(StubSize):         .long   ASM_PFX(InterruptEntryStubEnd) - ASM_PFX(InterruptEntryStub)
+ASM_PFX(AppRsp):           .long   0x11111111 # ?
+                           .long   0x11111111 # ?
+ASM_PFX(DebugRsp):         .long   0x22222222 # ?
+                           .long   0x22222222 # ?
+ASM_PFX(ExtraPush):        .long   0x33333333 # ?
+                           .long   0x33333333 # ?
+ASM_PFX(ExceptData):       .long   0x44444444 # ?
+                           .long   0x44444444 # ?
+ASM_PFX(Rflags):           .long   0x55555555 # ?
+                           .long   0x55555555 # ?
+ASM_PFX(OrigVector):       .long   0x66666666 # ?
+                           .long   0x66666666 # ?
+
+// The declarations below define the memory region that will be used for the debug stack.
+// The context record will be built by pushing register values onto this stack.
+// It is imparitive that alignment be carefully managed, since the FXSTOR and
+// FXRSTOR instructions will GP fault if their memory operand is not 16 byte aligned.
+//
+// The stub will switch stacks from the application stack to the debuger stack
+// and pushes the exception number.
+//
+// Then we building the context record on the stack. Since the stack grows down,
+// we push the fields of the context record from the back to the front.  There
+// are 336 bytes of stack used prior allocating the 512 bytes of stack to be
+// used as the memory buffer for the fxstor instruction. Therefore address of
+// the buffer used for the FXSTOR instruction is &Eax - 336 - 512, which
+// must be 16 byte aligned.
+//
+// We carefully locate the stack to make this happen.
+//
+// For reference, the context structure looks like this:
+//      struct {
+//        UINT64            ExceptionData;
+//        FX_SAVE_STATE_X64 FxSaveState;    // 512 bytes, must be 16 byte aligned
+//        UINT64            Dr0, Dr1, Dr2, Dr3, Dr6, Dr7;
+//        UINT64            Cr0, Cr1, Cr2, Cr3, Cr4, Cr8;
+//        UINT64            RFlags;
+//        UINT64            Ldtr, Tr;
+//        UINT64            Gdtr[2], Idtr[2];
+//        UINT64            Rip;
+//        UINT64            Gs, Fs, Es, Ds, Cs, Ss;
+//        UINT64            Rdi, Rsi, Rbp, Rsp, Rbx, Rdx, Rcx, Rax;
+//        UINT64            R8, R9, R10, R11, R12, R13, R14, R15;
+//      } SYSTEM_CONTEXT_X64;  // 64 bit system context record
+
+.p2align 4
+DebugStackEnd : .ascii     "DbgStkEnd >>>>>>"    # 16 byte long string - must be 16 bytes to preserve alignment
+                .fill 0x1ffc, 4, 0x00000000
+                                                 # 32K should be enough stack
+                                                 #   This allocation is coocked to insure
+                                                 #   that the the buffer for the FXSTORE instruction
+                                                 #   will be 16 byte aligned also.
+                                                 #
+ASM_PFX(ExceptionNumber):  .long   0x77777777    # first entry will be the vector number pushed by the stub
+                           .long   0x77777777    # ?
+
+DebugStackBegin : .ascii    "<<<< DbgStkBegin"   # initial debug ESP == DebugStackBegin, set in stub
+           
+
+.text
+
+//------------------------------------------------------------------------------
+// BOOLEAN
+// FxStorSupport (
+//   void
+//   )
+//
+// Abstract: Returns TRUE if FxStor instructions are supported
+//
+ASM_GLOBAL ASM_PFX(FxStorSupport)
+ASM_PFX(FxStorSupport):  
+//
+// cpuid corrupts rbx which must be preserved per the C calling convention
+//
+                pushq   %rbx
+                movq    $1, %rax
+                cpuid
+                movl    %edx, %eax
+                andq    $0x01000000, %rax
+                shrq    $24, %rax
+                popq    %rbx
+                ret
+//------------------------------------------------------------------------------
+// void
+// Vect2Desc (
+//   IA32_IDT_GATE_DESCRIPTOR * DestDesc,  // rcx
+//   void (*Vector) (void)   // rdx
+//   )
+//
+// Abstract: Encodes an IDT descriptor with the given physical address
+//
+ASM_GLOBAL ASM_PFX(Vect2Desc)
+ASM_PFX(Vect2Desc):
+                movq    %rdx, %rax
+                movw    %ax, (%rcx)                  # write bits 15..0 of offset
+                movw    %cs, %dx
+                movw    %dx, 2(%rcx)                 # SYS_CODE_SEL from GDT
+                movw    $(0x0e00 | 0x8000), 4(%rcx)  # type = 386 interrupt gate, present
+                shrq    $16, %rax
+                movw    %ax, 6(%rcx)                 # write bits 31..16 of offset
+                shrq    $16, %rax
+                movl    %eax, 8(%rcx)                # write bits 63..32 of offset
+
+                ret
+
+//------------------------------------------------------------------------------
+// InterruptEntryStub
+//
+// Abstract: This code is not a function, but is a small piece of code that is
+//               copied and fixed up once for each IDT entry that is hooked.
+//
+ASM_GLOBAL ASM_PFX(InterruptEntryStub)
+ASM_PFX(InterruptEntryStub):
+
+                pushq  $0                       # push vector number - will be modified before installed
+                jmp     ASM_PFX(CommonIdtEntry)
+                
+ASM_GLOBAL ASM_PFX(InterruptEntryStubEnd)
+ASM_PFX(InterruptEntryStubEnd):
+
+//------------------------------------------------------------------------------
+// CommonIdtEntry
+//
+// Abstract: This code is not a function, but is the common part for all IDT
+//               vectors.
+//
+ASM_GLOBAL ASM_PFX(CommonIdtEntry)
+//
+// At this point, the stub has saved the current application stack esp into AppRsp
+// and switched stacks to the debug stack, where it pushed the vector number
+//
+// The application stack looks like this:
+//
+//              ...
+//              (last application stack entry)
+//              [16 bytes alignment, do not care it]
+//              SS from interrupted task
+//              RSP from interrupted task
+//              rflags from interrupted task
+//              CS from interrupted task
+//              RIP from interrupted task
+//              Error code <-------------------- Only present for some exeption types
+//
+//              Vector Number <----------------- pushed in our IDT Entry
+//
+
+
+// The stub switched us to the debug stack and pushed the interrupt number.
+//
+// Next, construct the context record.  It will be build on the debug stack by
+// pushing the registers in the correct order so as to create the context structure
+// on the debug stack.  The context record must be built from the end back to the
+// beginning because the stack grows down...
+//
+// For reference, the context record looks like this:
+//
+// typedef
+// struct {
+//   UINT64            ExceptionData;
+//   FX_SAVE_STATE_X64 FxSaveState;
+//   UINT64            Dr0, Dr1, Dr2, Dr3, Dr6, Dr7;
+//   UINT64            Cr0, Cr2, Cr3, Cr4, Cr8;
+//   UINT64            RFlags;
+//   UINT64            Ldtr, Tr;
+//   UINT64            Gdtr[2], Idtr[2];
+//   UINT64            Rip;
+//   UINT64            Gs, Fs, Es, Ds, Cs, Ss;
+//   UINT64            Rdi, Rsi, Rbp, Rsp, Rbx, Rdx, Rcx, Rax;
+//   UINT64            R8, R9, R10, R11, R12, R13, R14, R15;
+// } SYSTEM_CONTEXT_X64;  // 64
+ASM_PFX(CommonIdtEntry):
+// NOTE: we save rsp here to prevent compiler put rip reference cause error AppRsp
+                pushq   %rax
+                movq    (8)(%rsp), %rax                  # save vector number
+                movq    %rax, ASM_PFX(ExceptionNumber)(%rip)   # save vector number
+                popq    %rax
+                addq    $8, %rsp                         # pop vector number
+                movq    %rsp, ASM_PFX(AppRsp)(%rip)      # save stack top
+                movq    DebugStackBegin(%rip), %rsp      # switch to debugger stack
+                subq    $8, %rsp                         # leave space for vector number
+// UINT64  Rdi, Rsi, Rbp, Rsp, Rbx, Rdx, Rcx, Rax;
+// UINT64  R8, R9, R10, R11, R12, R13, R14, R15;
+                pushq    %r15
+                pushq    %r14
+                pushq    %r13
+                pushq    %r12
+                pushq    %r11
+                pushq    %r10
+                pushq    %r9
+                pushq    %r8
+                pushq    %rax
+                pushq    %rcx
+                pushq    %rdx
+                pushq    %rbx
+                pushq    %rsp
+                pushq    %rbp
+                pushq    %rsi
+                pushq    %rdi
+// Save interrupt state rflags register...
+                pushfq
+                popq    %rax
+                movq    %rax, ASM_PFX(Rflags)(%rip)
+// We need to determine if any extra data was pushed by the exception, and if so, save it
+// To do this, we check the exception number pushed by the stub, and cache the
+// result in a variable since we'll need this again.
+                cmpl    $0, ASM_PFX(ExceptionNumber)(%rip)
+                jz      ExtraPushOne
+                cmpl    $10, ASM_PFX(ExceptionNumber)(%rip)
+                jz      ExtraPushOne
+                cmpl    $11, ASM_PFX(ExceptionNumber)(%rip)
+                jz      ExtraPushOne
+                cmpl    $12, ASM_PFX(ExceptionNumber)(%rip)
+                jz      ExtraPushOne
+                cmpl    $13, ASM_PFX(ExceptionNumber)(%rip)
+                jz      ExtraPushOne
+                cmpl    $14, ASM_PFX(ExceptionNumber)(%rip)
+                jz      ExtraPushOne
+                cmpl    $17, ASM_PFX(ExceptionNumber)(%rip)
+                jz      ExtraPushOne
+                movl    $0, ASM_PFX(ExtraPush)(%rip)
+                movl    $0, ASM_PFX(ExceptData)(%rip)
+                jmp     ExtraPushDone
+ExtraPushOne:
+                movl  $1, ASM_PFX(ExtraPush)(%rip)
+
+// If there's some extra data, save it also, and modify the saved AppRsp to effectively
+// pop this value off the application's stack.
+                movq    ASM_PFX(AppRsp)(%rip), %rax 
+                movq    (%rax), %rbx
+                movq    %rbx, ASM_PFX(ExceptData)(%rip)
+                addq    $8, %rax
+                movq    %rax, ASM_PFX(AppRsp)(%rip)
+
+ExtraPushDone:
+
+// The "push" above pushed the debug stack rsp.  Since what we're actually doing
+// is building the context record on the debug stack, we need to save the pushed
+// debug RSP, and replace it with the application's last stack entry...
+                movq    24(%rsp), %rax
+                movq    %rax, ASM_PFX(DebugRsp)(%rip)
+                movq    ASM_PFX(AppRsp)(%rip), %rax 
+                addq    $40, %rax
+                # application stack has ss, rsp, rflags, cs, & rip, so
+                # last actual application stack entry is 40 bytes
+                # into the application stack.
+                movq    %rax, 24(%rsp)
+
+// continue building context record
+// UINT64  Gs, Fs, Es, Ds, Cs, Ss;  insure high 16 bits of each is zero
+                mov     %ss, %rax
+                pushq   %rax
+                # CS from application is one entry back in application stack
+                movq    ASM_PFX(AppRsp)(%rip), %rax
+                movzxw  8(%rax), %rax
+                pushq   %rax
+
+                mov     %ds, %rax
+                pushq   %rax
+                movw    %es, %rax
+                pushq   %rax
+                mov     %fs, %rax
+                pushq   %rax
+                mov     %gs, %rax
+                pushq   %rax
+// UINT64  Rip;
+                # Rip from application is on top of application stack
+                movq    ASM_PFX(AppRsp)(%rip), %rax 
+                pushq   (%rax)
+// UINT64  Gdtr[2], Idtr[2];
+                push    $0
+                push    $0
+                sidtq   (%rsp)
+                push    $0
+                push    $0
+                sgdtq   (%rsp)
+
+// UINT64  Ldtr, Tr;
+                xorq    %rax, %rax
+                str     %ax
+                pushq   %rax
+                sldt    %ax
+                pushq   %rax
+
+// UINT64  RFlags;
+// Rflags from application is two entries back in application stack
+                movq    ASM_PFX(AppRsp)(%rip), %rax 
+                pushq   16(%rax)
+// UINT64  Cr0, Cr1, Cr2, Cr3, Cr4, Cr8;
+// insure FXSAVE/FXRSTOR is enabled in CR4...
+// ... while we're at it, make sure DE is also enabled...
+                movq    %cr8, %rax
+                pushq   %rax
+                movq    %cr4, %rax
+                orq     $0x208, %rax
+                movq    %rax, %cr4
+                pushq   %rax
+                movq    %cr3, %rax
+                pushq   %rax
+                movq    %cr2, %rax
+                pushq   %rax
+                push    $0
+                movq    %cr0, %rax
+                pushq   %rax
+// UINT64  Dr0, Dr1, Dr2, Dr3, Dr6, Dr7;
+                movq    %dr7, %rax
+                pushq   %rax
+// clear Dr7 while executing debugger itself
+                xorq    %rax, %rax
+                movq    %rax, %dr7
+
+                movq    %dr6, %rax
+                pushq   %rax
+// insure all status bits in dr6 are clear...
+                xorq    %rax, %rax
+                movq    %rax, %dr6
+
+                movq    %dr3, %rax
+                pushq   %rax
+                movq    %dr2, %rax
+                pushq   %rax
+                movq    %dr1, %rax
+                pushq   %rax
+                movq    %dr0, %rax
+                pushq   %rax
+
+// FX_SAVE_STATE_X64 FxSaveState;
+                subq    $512, %rsp
+                movq    %rsp, %rdi
+                # IMPORTANT!! The debug stack has been carefully constructed to
+                # insure that rsp and rdi are 16 byte aligned when we get here.
+                # They MUST be.  If they are not, a GP fault will occur.
+          
+                #     FXSTOR_RDI
+                fxsave      (%rdi)
+
+// UINT64  ExceptionData;
+                movq    ASM_PFX(ExceptData)(%rip),  %rax
+                pushq   %rax
+
+// call to C code which will in turn call registered handler
+// pass in the vector number
+                movq    %rsp, %rdx
+                movq    ASM_PFX(ExceptionNumber)(%rip), %rcx 
+                subq    $40, %rsp
+                call    ASM_PFX(InterruptDistrubutionHub)
+                addq    $40, %rsp
+// restore context...
+// UINT64  ExceptionData;
+                addq    $8, %rsp
+
+// FX_SAVE_STATE_X64 FxSaveState;
+                movq    %rsp, %rsi
+            
+                #    FXRSTOR_RSI
+                fxrstor     (%rsi)
+
+                addq    $512, %rsp
+
+// UINT64  Dr0, Dr1, Dr2, Dr3, Dr6, Dr7;
+                popq    %rax
+                movq    %rax, %dr0
+                popq    %rax
+                movq    %rax, %dr1
+                popq    %rax
+                movq    %rax, %dr2
+                popq    %rax
+                movq    %rax, %dr3
+
+// skip restore of dr6.  We cleared dr6 during the context save.
+                addq    $8, %rsp
+                popq    %rax
+                movq    %rax, %dr7
+
+// UINT64  Cr0, Cr1, Cr2, Cr3, Cr4, Cr8;
+                popq    %rax
+                movq    %rax, %cr0
+                addq    $8, %rsp
+                popq    %rax
+                movq    %rax, %cr2
+                popq    %rax
+                movq    %rax, %cr3
+                popq    %rax
+                movq    %rax, %cr4
+                popq    %rax
+                movq    %rax, %cr8
+// UINT64  RFlags;
+                movq    ASM_PFX(AppRsp)(%rip), %rax 
+                popq    16(%rax)
+// UINT64  Ldtr, Tr;
+// UINT64  Gdtr[2], Idtr[2];
+// Best not let anyone mess with these particular registers...
+                addq    $48, %rsp
+// UINT64  Rip;
+                popq    (%rax)
+
+// UINT64  Gs, Fs, Es, Ds, Cs, Ss;
+// NOTE - modified segment registers could hang the debugger...  We
+//        could attempt to insulate ourselves against this possibility,
+//        but that poses risks as well.
+//
+
+                popq    %rax
+                # mov     %rax, %gs
+                popq    %rax
+                # mov     %rax, %fs
+                popq    %rax
+                mov     %rax, %es
+                popq    %rax
+                mov     %rax, %ds
+                movq    ASM_PFX(AppRsp)(%rip), %rax 
+                popq    8(%rax)
+                popq    %rax
+                mov     %rax, %ss
+## The next stuff to restore is the general purpose registers that were pushed
+## using the "push" instruction.
+##
+## The value of RSP as stored in the context record is the application RSP
+## including the 5 entries on the application stack caused by the exception
+## itself. It may have been modified by the debug agent, so we need to
+## determine if we need to relocate the application stack.
+
+                movq    24(%rsp), %rbx  # move the potentially modified AppRsp into rbx
+                movq    ASM_PFX(AppRsp)(%rip), %rax 
+                addq    $40, %rax
+                cmpq    %rax, %rbx
+                je      NoAppStackMove
+
+                movq    ASM_PFX(AppRsp)(%rip), %rax 
+                movq    (%rax), %rcx     # RIP
+                movq    %rcx, (%rbx)
+
+                movq    8(%rax), %rcx    # CS
+                movq    %rcx, 8(%rbx)
+
+                movq    16(%rax), %rcx   # RFLAGS
+                movq    %rcx, 16(%rbx)
+
+                movq    24(%rax), %rcx   # RSP
+                movq    %rcx, 24(%rbx)
+
+                movq    32(%rax), %rcx   # SS
+                movq    %rcx, 32(%rbx)
+
+                movq    %rbx, %rax       # modify the saved AppRsp to the new AppRsp
+                movq    %rax, ASM_PFX(AppRsp)(%rip)
+NoAppStackMove:
+                movq    ASM_PFX(DebugRsp)(%rip), %rax   # restore the DebugRsp on the debug stack
+                                         # so our "pop" will not cause a stack switch
+                movq    %rax, 24(%rsp)
+
+                cmpl    $0x068, ASM_PFX(ExceptionNumber)(%rip)
+                jne     NoChain
+
+Chain:
+
+// Restore rflags so when we chain, the flags will be exactly as if we were never here.
+// We gin up the stack to do an iretq so we can get ALL the flags.
+                movq    ASM_PFX(AppRsp)(%rip), %rax 
+                movq    40(%rax), %rbx
+                pushq   %rbx
+                mov     %ss, %rax
+                pushq   %rax
+                movq    %rsp, %rax
+                addq    $16, %rax
+                pushq   %rax
+                movq    ASM_PFX(AppRsp)(%rip), %rax 
+                movq    16(%rax), %rbx
+                andq    $0xfffffffffffffcff, %rbx  # special handling for IF and TF
+                pushq   %rbx
+                mov     %cs, %rax
+                pushq   %rax
+                movq    PhonyIretq(%rip), %rax 
+                pushq   %rax
+                iretq
+PhonyIretq:
+
+// UINT64  Rdi, Rsi, Rbp, Rsp, Rbx, Rdx, Rcx, Rax;
+// UINT64  R8, R9, R10, R11, R12, R13, R14, R15;
+                popq    %rdi
+                popq    %rsi
+                popq    %rbp
+                popq    %rsp
+                popq    %rbx
+                popq    %rdx
+                popq    %rcx
+                popq    %rax
+                popq    %r8
+                popq    %r9
+                popq    %r10
+                popq    %r11
+                popq    %r12
+                popq    %r13
+                popq    %r14
+                popq    %r15
+
+// Switch back to application stack
+                movq    ASM_PFX(AppRsp)(%rip), %rsp 
+// Jump to original handler
+                jmp     ASM_PFX(OrigVector)
+NoChain:
+// UINT64  Rdi, Rsi, Rbp, Rsp, Rbx, Rdx, Rcx, Rax;
+// UINT64  R8, R9, R10, R11, R12, R13, R14, R15;
+                popq    %rdi
+                popq    %rsi
+                popq    %rbp
+                popq    %rsp
+                popq    %rbx
+                popq    %rdx
+                popq    %rcx
+                popq    %rax
+                popq    %r8
+                popq    %r9
+                popq    %r10
+                popq    %r11
+                popq    %r12
+                popq    %r13
+                popq    %r14
+                popq    %r15
+
+// Switch back to application stack
+                movq    ASM_PFX(AppRsp)(%rip), %rsp 
+
+// We're outa here...
+                iret
diff --git a/MdeModulePkg/Universal/Network/UefiPxeBcDxe/Arm/PxeArch.h b/MdeModulePkg/Universal/Network/UefiPxeBcDxe/Arm/PxeArch.h
new file mode 100644 (file)
index 0000000..de40902
--- /dev/null
@@ -0,0 +1,22 @@
+/** @file
+  Defines PXE Arch type.
+  
+Copyright (c) 2006, Intel Corporation.<BR>
+Portions copyright (c) 2008-2009 Apple Inc. All rights reserved.<BR>
+
+All rights reserved. This program and the accompanying materials
+are licensed and made available under the terms and conditions of the BSD License
+which accompanies this distribution.  The full text of the license may be found at
+http://opensource.org/licenses/bsd-license.php
+
+THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+
+**/
+
+#ifndef _EFI_PXE_ARCH_H_
+#define _EFI_PXE_ARCH_H_
+
+#define SYS_ARCH  0x0A
+
+#endif
index 7f8acd73d4f16ea1a64e9418d643d89b0163d3c5..7b4978c96275af6f397d4687594608d340b7ceab 100644 (file)
@@ -1,96 +1,99 @@
-#/** @file\r
-# Component name for module UefiPxeBc\r
-#\r
-# Copyright (c) 2007 - 2009, Intel Corporation. All rights reserved.\r
-#\r
-#  All rights reserved. This program and the accompanying materials\r
-#  are licensed and made available under the terms and conditions of the BSD License\r
-#  which accompanies this distribution. The full text of the license may be found at\r
-#  http://opensource.org/licenses/bsd-license.php\r
-#\r
-#  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
-#  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
-#\r
-#\r
-#**/\r
-\r
-\r
-[Defines]\r
-  INF_VERSION                    = 0x00010005\r
-  BASE_NAME                      = UefiPxeBcDxe\r
-  FILE_GUID                      = 3B1DEAB5-C75D-442e-9238-8E2FFB62B0BB\r
-  MODULE_TYPE                    = UEFI_DRIVER\r
-  VERSION_STRING                 = 1.0\r
-  ENTRY_POINT                    = PxeBcDriverEntryPoint\r
-\r
-#\r
-# The following information is for reference only and not required by the build tools.\r
-#\r
-#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC\r
-#\r
-#  DRIVER_BINDING                =  gPxeBcDriverBinding                        \r
-#  COMPONENT_NAME                =  gPxeBcComponentName\r
-#  COMPONENT_NAME2               =  gPxeBcComponentName2\r
-#\r
-\r
-[Sources.common]\r
-  PxeBcMtftp.c\r
-  PxeBcSupport.h\r
-  PxeBcSupport.c\r
-  PxeBcDriver.c\r
-  PxeBcDhcp.h\r
-  ComponentName.c\r
-  PxeBcImpl.c\r
-  PxeBcImpl.h\r
-  PxeBcDhcp.c\r
-  PxeBcMtftp.h\r
-  PxeBcDriver.h\r
-\r
-[Sources.IA32]\r
-  Ia32/PxeArch.h\r
-\r
-[Sources.X64]\r
-  X64/PxeArch.h\r
-\r
-[Sources.IPF]\r
-  Ipf/PxeArch.h\r
-\r
-[Sources.EBC]\r
-  Ebc/PxeArch.h\r
-  Ebc/PxeArch.c\r
-\r
-[Packages]\r
-  MdePkg/MdePkg.dec\r
-  MdeModulePkg/MdeModulePkg.dec\r
-\r
-\r
-\r
-[LibraryClasses]\r
-  BaseLib\r
-  UefiLib\r
-  UefiBootServicesTableLib\r
-  UefiDriverEntryPoint\r
-  BaseMemoryLib\r
-  MemoryAllocationLib\r
-  DebugLib\r
-  NetLib\r
-  DpcLib\r
-\r
-[Guids]\r
-  gEfiSmbiosTableGuid                              # ALWAYS_CONSUMED\r
-\r
-[Protocols]\r
-  gEfiArpServiceBindingProtocolGuid                # PROTOCOL ALWAYS_CONSUMED\r
-  gEfiArpProtocolGuid                              # PROTOCOL ALWAYS_CONSUMED\r
-  gEfiMtftp4ServiceBindingProtocolGuid             # PROTOCOL ALWAYS_CONSUMED\r
-  gEfiMtftp4ProtocolGuid                           # PROTOCOL ALWAYS_CONSUMED\r
-  gEfiUdp4ServiceBindingProtocolGuid               # PROTOCOL ALWAYS_CONSUMED\r
-  gEfiDhcp4ServiceBindingProtocolGuid              # PROTOCOL ALWAYS_CONSUMED\r
-  gEfiPxeBaseCodeCallbackProtocolGuid              # PROTOCOL ALWAYS_PRODUCED\r
-  gEfiPxeBaseCodeProtocolGuid                      # PROTOCOL ALWAYS_PRODUCED\r
-  gEfiLoadFileProtocolGuid                         # PROTOCOL ALWAYS_PRODUCED\r
-  gEfiDhcp4ProtocolGuid                            # PROTOCOL ALWAYS_CONSUMED\r
-  gEfiUdp4ProtocolGuid                             # PROTOCOL ALWAYS_CONSUMED\r
-  gEfiNetworkInterfaceIdentifierProtocolGuid_31    ## SOMETIMES_CONSUMES\r
-  gEfiIp4ServiceBindingProtocolGuid                # PROTOCOL ALWAYS_CONSUMED\r
-  gEfiIp4ProtocolGuid                              # PROTOCOL ALWAYS_CONSUMED\r
+#/** @file
+# Component name for module UefiPxeBc
+#
+# Copyright (c) 2007 - 2009, Intel Corporation. All rights reserved.
+#
+#  All rights reserved. This program and the accompanying materials
+#  are licensed and made available under the terms and conditions of the BSD License
+#  which accompanies this distribution. The full text of the license may be found at
+#  http://opensource.org/licenses/bsd-license.php
+#
+#  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+#  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+#
+#
+#**/
+
+
+[Defines]
+  INF_VERSION                    = 0x00010005
+  BASE_NAME                      = UefiPxeBcDxe
+  FILE_GUID                      = 3B1DEAB5-C75D-442e-9238-8E2FFB62B0BB
+  MODULE_TYPE                    = UEFI_DRIVER
+  VERSION_STRING                 = 1.0
+  ENTRY_POINT                    = PxeBcDriverEntryPoint
+
+#
+# The following information is for reference only and not required by the build tools.
+#
+#  VALID_ARCHITECTURES           = IA32 X64 IPF EBC
+#
+#  DRIVER_BINDING                =  gPxeBcDriverBinding                        
+#  COMPONENT_NAME                =  gPxeBcComponentName
+#  COMPONENT_NAME2               =  gPxeBcComponentName2
+#
+
+[Sources.common]
+  PxeBcMtftp.c
+  PxeBcSupport.h
+  PxeBcSupport.c
+  PxeBcDriver.c
+  PxeBcDhcp.h
+  ComponentName.c
+  PxeBcImpl.c
+  PxeBcImpl.h
+  PxeBcDhcp.c
+  PxeBcMtftp.h
+  PxeBcDriver.h
+
+[Sources.IA32]
+  Ia32/PxeArch.h
+
+[Sources.X64]
+  X64/PxeArch.h
+
+[Sources.IPF]
+  Ipf/PxeArch.h
+
+[Sources.ARM]
+  Arm/PxeArch.h
+
+[Sources.EBC]
+  Ebc/PxeArch.h
+  Ebc/PxeArch.c
+
+[Packages]
+  MdePkg/MdePkg.dec
+  MdeModulePkg/MdeModulePkg.dec
+
+
+
+[LibraryClasses]
+  BaseLib
+  UefiLib
+  UefiBootServicesTableLib
+  UefiDriverEntryPoint
+  BaseMemoryLib
+  MemoryAllocationLib
+  DebugLib
+  NetLib
+  DpcLib
+
+[Guids]
+  gEfiSmbiosTableGuid                              # ALWAYS_CONSUMED
+
+[Protocols]
+  gEfiArpServiceBindingProtocolGuid                # PROTOCOL ALWAYS_CONSUMED
+  gEfiArpProtocolGuid                              # PROTOCOL ALWAYS_CONSUMED
+  gEfiMtftp4ServiceBindingProtocolGuid             # PROTOCOL ALWAYS_CONSUMED
+  gEfiMtftp4ProtocolGuid                           # PROTOCOL ALWAYS_CONSUMED
+  gEfiUdp4ServiceBindingProtocolGuid               # PROTOCOL ALWAYS_CONSUMED
+  gEfiDhcp4ServiceBindingProtocolGuid              # PROTOCOL ALWAYS_CONSUMED
+  gEfiPxeBaseCodeCallbackProtocolGuid              # PROTOCOL ALWAYS_PRODUCED
+  gEfiPxeBaseCodeProtocolGuid                      # PROTOCOL ALWAYS_PRODUCED
+  gEfiLoadFileProtocolGuid                         # PROTOCOL ALWAYS_PRODUCED
+  gEfiDhcp4ProtocolGuid                            # PROTOCOL ALWAYS_CONSUMED
+  gEfiUdp4ProtocolGuid                             # PROTOCOL ALWAYS_CONSUMED
+  gEfiNetworkInterfaceIdentifierProtocolGuid_31    ## SOMETIMES_CONSUMES
+  gEfiIp4ServiceBindingProtocolGuid                # PROTOCOL ALWAYS_CONSUMED
+  gEfiIp4ProtocolGuid                              # PROTOCOL ALWAYS_CONSUMED