]> git.proxmox.com Git - mirror_edk2.git/blame - OvmfPkg/CloudHv/CloudHvX64.fdf
OvmfPkg: CloudHv: Remove VARS and CODE sections
[mirror_edk2.git] / OvmfPkg / CloudHv / CloudHvX64.fdf
CommitLineData
c712ce2b
SB
1## @file\r
2# Open Virtual Machine Firmware: FDF\r
3#\r
4# Copyright (c) 2006 - 2022, Intel Corporation. All rights reserved.<BR>\r
5# (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>\r
6#\r
7# SPDX-License-Identifier: BSD-2-Clause-Patent\r
8#\r
9##\r
10\r
11################################################################################\r
12\r
13[Defines]\r
14!include OvmfPkg/OvmfPkgDefines.fdf.inc\r
15\r
16#\r
17# Build the variable store and the firmware code as one unified flash device\r
18# image.\r
19#\r
20[FD.CLOUDHV]\r
21BaseAddress = $(FW_BASE_ADDRESS)\r
22Size = $(FW_SIZE)\r
23ErasePolarity = 1\r
24BlockSize = $(BLOCK_SIZE)\r
25NumBlocks = $(FW_BLOCKS)\r
26\r
c712ce2b
SB
270x00000000|$(FVMAIN_SIZE)\r
28FV = FVMAIN_COMPACT\r
29\r
9ac8c85d 30$(SECFV_OFFSET)|$(SECFV_SIZE)\r
c712ce2b
SB
31FV = SECFV\r
32\r
33################################################################################\r
34\r
35[FD.MEMFD]\r
36BaseAddress = $(MEMFD_BASE_ADDRESS)\r
37Size = 0xD00000\r
38ErasePolarity = 1\r
39BlockSize = 0x10000\r
40NumBlocks = 0xD0\r
41\r
420x000000|0x006000\r
43gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize\r
44\r
450x006000|0x001000\r
46gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageSize\r
47\r
480x007000|0x001000\r
49gEfiMdePkgTokenSpaceGuid.PcdGuidedExtractHandlerTableAddress|gUefiOvmfPkgTokenSpaceGuid.PcdGuidedExtractHandlerTableSize\r
50\r
510x008000|0x001000\r
52gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableSize\r
53\r
540x009000|0x002000\r
55gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbSize\r
56\r
570x00B000|0x001000\r
58gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize\r
59\r
600x00C000|0x001000\r
61gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupSize\r
62\r
630x00D000|0x001000\r
64gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsSize\r
65\r
660x00E000|0x001000\r
67gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidSize\r
68\r
690x010000|0x010000\r
70gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize\r
71\r
720x020000|0x0E0000\r
73gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvSize\r
74FV = PEIFV\r
75\r
760x100000|0xC00000\r
77gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvSize\r
78FV = DXEFV\r
79\r
80##########################################################################################\r
81# Set the SEV-ES specific work area PCDs\r
82#\r
83SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaBase = $(MEMFD_BASE_ADDRESS) + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader\r
84SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaSize = gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize - gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader\r
85##########################################################################################\r
86\r
87################################################################################\r
88\r
89[FV.SECFV]\r
90FvNameGuid = 763BED0D-DE9F-48F5-81F1-3E90E1B1A015\r
91BlockSize = 0x1000\r
92FvAlignment = 16\r
93ERASE_POLARITY = 1\r
94MEMORY_MAPPED = TRUE\r
95STICKY_WRITE = TRUE\r
96LOCK_CAP = TRUE\r
97LOCK_STATUS = TRUE\r
98WRITE_DISABLED_CAP = TRUE\r
99WRITE_ENABLED_CAP = TRUE\r
100WRITE_STATUS = TRUE\r
101WRITE_LOCK_CAP = TRUE\r
102WRITE_LOCK_STATUS = TRUE\r
103READ_DISABLED_CAP = TRUE\r
104READ_ENABLED_CAP = TRUE\r
105READ_STATUS = TRUE\r
106READ_LOCK_CAP = TRUE\r
107READ_LOCK_STATUS = TRUE\r
108\r
109#\r
110# SEC Phase modules\r
111#\r
112# The code in this FV handles the initial firmware startup, and\r
113# decompresses the PEI and DXE FVs which handles the rest of the boot sequence.\r
114#\r
115INF OvmfPkg/Sec/SecMain.inf\r
116\r
117INF RuleOverride=RESET_VECTOR OvmfPkg/ResetVector/ResetVector.inf\r
118\r
119################################################################################\r
120[FV.PEIFV]\r
121FvNameGuid = 6938079B-B503-4E3D-9D24-B28337A25806\r
122BlockSize = 0x10000\r
123FvAlignment = 16\r
124ERASE_POLARITY = 1\r
125MEMORY_MAPPED = TRUE\r
126STICKY_WRITE = TRUE\r
127LOCK_CAP = TRUE\r
128LOCK_STATUS = TRUE\r
129WRITE_DISABLED_CAP = TRUE\r
130WRITE_ENABLED_CAP = TRUE\r
131WRITE_STATUS = TRUE\r
132WRITE_LOCK_CAP = TRUE\r
133WRITE_LOCK_STATUS = TRUE\r
134READ_DISABLED_CAP = TRUE\r
135READ_ENABLED_CAP = TRUE\r
136READ_STATUS = TRUE\r
137READ_LOCK_CAP = TRUE\r
138READ_LOCK_STATUS = TRUE\r
139\r
140APRIORI PEI {\r
141 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
142}\r
143\r
144#\r
145# PEI Phase modules\r
146#\r
147INF MdeModulePkg/Core/Pei/PeiMain.inf\r
148INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
149INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf\r
150INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf\r
151INF OvmfPkg/PlatformPei/PlatformPei.inf\r
152INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf\r
153INF UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf\r
154!if $(SMM_REQUIRE) == TRUE\r
155INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf\r
156INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf\r
157INF OvmfPkg/SmmAccess/SmmAccessPei.inf\r
158!endif\r
159INF UefiCpuPkg/CpuMpPei/CpuMpPei.inf\r
160\r
161!include OvmfPkg/OvmfTpmPei.fdf.inc\r
162\r
163################################################################################\r
164\r
165[FV.DXEFV]\r
166FvForceRebase = FALSE\r
167FvNameGuid = 7CB8BDC9-F8EB-4F34-AAEA-3EE4AF6516A1\r
168BlockSize = 0x10000\r
169FvAlignment = 16\r
170ERASE_POLARITY = 1\r
171MEMORY_MAPPED = TRUE\r
172STICKY_WRITE = TRUE\r
173LOCK_CAP = TRUE\r
174LOCK_STATUS = TRUE\r
175WRITE_DISABLED_CAP = TRUE\r
176WRITE_ENABLED_CAP = TRUE\r
177WRITE_STATUS = TRUE\r
178WRITE_LOCK_CAP = TRUE\r
179WRITE_LOCK_STATUS = TRUE\r
180READ_DISABLED_CAP = TRUE\r
181READ_ENABLED_CAP = TRUE\r
182READ_STATUS = TRUE\r
183READ_LOCK_CAP = TRUE\r
184READ_LOCK_STATUS = TRUE\r
185\r
186APRIORI DXE {\r
187 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
188 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
189 INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf\r
190!if $(SMM_REQUIRE) == FALSE\r
191 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf\r
192!endif\r
193}\r
194\r
195#\r
196# DXE Phase modules\r
197#\r
198INF MdeModulePkg/Core/Dxe/DxeMain.inf\r
199\r
200INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf\r
201INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf\r
202INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
203\r
204INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf\r
205INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf\r
206INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf\r
c712ce2b
SB
207INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf\r
208INF UefiCpuPkg/CpuDxe/CpuDxe.inf\r
a2da72b2 209INF OvmfPkg/XenTimerDxe/XenTimerDxe.inf\r
c712ce2b
SB
210INF OvmfPkg/IncompatiblePciDeviceSupportDxe/IncompatiblePciDeviceSupport.inf\r
211INF OvmfPkg/PciHotPlugInitDxe/PciHotPlugInit.inf\r
212INF MdeModulePkg/Bus/Pci/PciHostBridgeDxe/PciHostBridgeDxe.inf\r
213INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf\r
214INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf\r
215INF MdeModulePkg/Universal/Metronome/Metronome.inf\r
216INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf\r
217\r
218INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf\r
219INF OvmfPkg/Virtio10Dxe/Virtio10.inf\r
220INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf\r
221INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf\r
222INF OvmfPkg/VirtioRngDxe/VirtioRng.inf\r
223!if $(PVSCSI_ENABLE) == TRUE\r
224INF OvmfPkg/PvScsiDxe/PvScsiDxe.inf\r
225!endif\r
226!if $(MPT_SCSI_ENABLE) == TRUE\r
227INF OvmfPkg/MptScsiDxe/MptScsiDxe.inf\r
228!endif\r
229!if $(LSI_SCSI_ENABLE) == TRUE\r
230INF OvmfPkg/LsiScsiDxe/LsiScsiDxe.inf\r
231!endif\r
232\r
233!if $(SECURE_BOOT_ENABLE) == TRUE\r
234 INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf\r
235!endif\r
236\r
237INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf\r
238INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf\r
239INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf\r
240INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf\r
241INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf\r
242INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf\r
243INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf\r
244INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf\r
245INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf\r
246INF MdeModulePkg/Application/UiApp/UiApp.inf\r
247INF OvmfPkg/QemuKernelLoaderFsDxe/QemuKernelLoaderFsDxe.inf\r
248INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
249INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf\r
250INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf\r
251INF MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskDxe.inf\r
252INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf\r
253INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf\r
254INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf\r
255INF OvmfPkg/SataControllerDxe/SataControllerDxe.inf\r
256INF MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf\r
257INF MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf\r
258INF MdeModulePkg/Bus/Pci/NvmExpressDxe/NvmExpressDxe.inf\r
259INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf\r
260INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf\r
261INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf\r
262INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf\r
263\r
6ecdda71 264INF MdeModulePkg/Universal/SerialDxe/SerialDxe.inf\r
c712ce2b
SB
265\r
266INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf\r
267INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf\r
268\r
269INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf\r
270INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf\r
271INF MdeModulePkg/Universal/Acpi/S3SaveStateDxe/S3SaveStateDxe.inf\r
272INF MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe/BootScriptExecutorDxe.inf\r
273INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResourceTableDxe.inf\r
274\r
275INF FatPkg/EnhancedFatDxe/Fat.inf\r
276INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf\r
277INF OvmfPkg/VirtioFsDxe/VirtioFsDxe.inf\r
278\r
279!if $(TOOL_CHAIN_TAG) != "XCODE5"\r
280INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf\r
281INF ShellPkg/DynamicCommand/HttpDynamicCommand/HttpDynamicCommand.inf\r
282INF OvmfPkg/LinuxInitrdDynamicShellCommand/LinuxInitrdDynamicShellCommand.inf\r
283!endif\r
284INF ShellPkg/Application/Shell/Shell.inf\r
285\r
286INF MdeModulePkg/Logo/LogoDxe.inf\r
287\r
288#\r
289# Network modules\r
290#\r
291!if $(E1000_ENABLE)\r
292 FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {\r
293 SECTION PE32 = Intel3.5/EFIX64/E3522X2.EFI\r
294 }\r
295!endif\r
296!include NetworkPkg/Network.fdf.inc\r
297 INF OvmfPkg/VirtioNetDxe/VirtioNet.inf\r
298\r
c712ce2b
SB
299INF OvmfPkg/PlatformDxe/Platform.inf\r
300INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf\r
301INF OvmfPkg/IoMmuDxe/IoMmuDxe.inf\r
302\r
303!if $(SMM_REQUIRE) == TRUE\r
304INF OvmfPkg/SmmAccess/SmmAccess2Dxe.inf\r
305INF OvmfPkg/SmmControl2Dxe/SmmControl2Dxe.inf\r
306INF OvmfPkg/CpuS3DataDxe/CpuS3DataDxe.inf\r
307INF MdeModulePkg/Core/PiSmmCore/PiSmmIpl.inf\r
308INF MdeModulePkg/Core/PiSmmCore/PiSmmCore.inf\r
309INF OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf\r
310INF UefiCpuPkg/CpuIo2Smm/CpuIo2Smm.inf\r
311INF MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBox.inf\r
312INF UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf\r
313\r
314#\r
315# Variable driver stack (SMM)\r
316#\r
317INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesSmm.inf\r
318INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteSmm.inf\r
319INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmm.inf\r
320INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmmRuntimeDxe.inf\r
321\r
322!else\r
323\r
324#\r
325# Variable driver stack (non-SMM)\r
326#\r
327INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf\r
328INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf\r
329INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf\r
330INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf\r
331!endif\r
332\r
333#\r
334# TPM support\r
335#\r
336!include OvmfPkg/OvmfTpmDxe.fdf.inc\r
337\r
338################################################################################\r
339\r
340[FV.FVMAIN_COMPACT]\r
341FvNameGuid = 48DB5E17-707C-472D-91CD-1613E7EF51B0\r
342FvAlignment = 16\r
343ERASE_POLARITY = 1\r
344MEMORY_MAPPED = TRUE\r
345STICKY_WRITE = TRUE\r
346LOCK_CAP = TRUE\r
347LOCK_STATUS = TRUE\r
348WRITE_DISABLED_CAP = TRUE\r
349WRITE_ENABLED_CAP = TRUE\r
350WRITE_STATUS = TRUE\r
351WRITE_LOCK_CAP = TRUE\r
352WRITE_LOCK_STATUS = TRUE\r
353READ_DISABLED_CAP = TRUE\r
354READ_ENABLED_CAP = TRUE\r
355READ_STATUS = TRUE\r
356READ_LOCK_CAP = TRUE\r
357READ_LOCK_STATUS = TRUE\r
358\r
359FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {\r
360 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {\r
361 #\r
362 # These firmware volumes will have files placed in them uncompressed,\r
363 # and then both firmware volumes will be compressed in a single\r
364 # compression operation in order to achieve better overall compression.\r
365 #\r
366 SECTION FV_IMAGE = PEIFV\r
367 SECTION FV_IMAGE = DXEFV\r
368 }\r
369 }\r
370\r
371!include OvmfPkg/FvmainCompactScratchEnd.fdf.inc\r
372\r
373################################################################################\r
374\r
375[Rule.Common.SEC]\r
376 FILE SEC = $(NAMED_GUID) {\r
377 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
378 UI STRING ="$(MODULE_NAME)" Optional\r
379 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
380 }\r
381\r
382[Rule.Common.PEI_CORE]\r
383 FILE PEI_CORE = $(NAMED_GUID) {\r
384 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi\r
385 UI STRING ="$(MODULE_NAME)" Optional\r
386 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
387 }\r
388\r
389[Rule.Common.PEIM]\r
390 FILE PEIM = $(NAMED_GUID) {\r
391 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
392 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi\r
393 UI STRING="$(MODULE_NAME)" Optional\r
394 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
395 }\r
396\r
397[Rule.Common.DXE_CORE]\r
398 FILE DXE_CORE = $(NAMED_GUID) {\r
399 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
400 UI STRING="$(MODULE_NAME)" Optional\r
401 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
402 }\r
403\r
404[Rule.Common.DXE_DRIVER]\r
405 FILE DRIVER = $(NAMED_GUID) {\r
406 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
407 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
408 UI STRING="$(MODULE_NAME)" Optional\r
409 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
410 RAW ACPI Optional |.acpi\r
411 RAW ASL Optional |.aml\r
412 }\r
413\r
414[Rule.Common.DXE_RUNTIME_DRIVER]\r
415 FILE DRIVER = $(NAMED_GUID) {\r
416 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
417 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
418 UI STRING="$(MODULE_NAME)" Optional\r
419 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
420 }\r
421\r
422[Rule.Common.UEFI_DRIVER]\r
423 FILE DRIVER = $(NAMED_GUID) {\r
424 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
425 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
426 UI STRING="$(MODULE_NAME)" Optional\r
427 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
428 }\r
429\r
430[Rule.Common.UEFI_DRIVER.BINARY]\r
431 FILE DRIVER = $(NAMED_GUID) {\r
432 DXE_DEPEX DXE_DEPEX Optional |.depex\r
433 PE32 PE32 |.efi\r
434 UI STRING="$(MODULE_NAME)" Optional\r
435 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
436 }\r
437\r
438[Rule.Common.UEFI_APPLICATION]\r
439 FILE APPLICATION = $(NAMED_GUID) {\r
440 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
441 UI STRING="$(MODULE_NAME)" Optional\r
442 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
443 }\r
444\r
445[Rule.Common.UEFI_APPLICATION.BINARY]\r
446 FILE APPLICATION = $(NAMED_GUID) {\r
447 PE32 PE32 |.efi\r
448 UI STRING="$(MODULE_NAME)" Optional\r
449 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
450 }\r
451\r
452[Rule.Common.USER_DEFINED.CSM]\r
453 FILE FREEFORM = $(NAMED_GUID) {\r
454 RAW BIN |.bin\r
455 }\r
456\r
457[Rule.Common.SEC.RESET_VECTOR]\r
458 FILE RAW = $(NAMED_GUID) {\r
459 RAW BIN Align = 16 |.bin\r
460 }\r
461\r
462[Rule.Common.SMM_CORE]\r
463 FILE SMM_CORE = $(NAMED_GUID) {\r
464 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
465 UI STRING="$(MODULE_NAME)" Optional\r
466 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
467 }\r
468\r
469[Rule.Common.DXE_SMM_DRIVER]\r
470 FILE SMM = $(NAMED_GUID) {\r
471 SMM_DEPEX SMM_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
472 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
473 UI STRING="$(MODULE_NAME)" Optional\r
474 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
475 }\r