!include OvmfPkg.fdf.inc\r
\r
#\r
-# Build the variable store and the firmware code as one unified flash device\r
-# image.\r
+# This will allow the flash device image to be recognize as an ELF, with first\r
+# an ELF headers, then the firmware code.\r
#\r
[FD.OVMF]\r
BaseAddress = $(FW_BASE_ADDRESS)\r
BlockSize = $(BLOCK_SIZE)\r
NumBlocks = $(FW_BLOCKS)\r
\r
-!include VarStore.fdf.inc\r
+!if ($(FD_SIZE_IN_KB) == 1024) || ($(FD_SIZE_IN_KB) == 2048)\r
+0x00000000|0x0000e000\r
+!endif\r
+!if $(FD_SIZE_IN_KB) == 4096\r
+0x00000000|0x00040000\r
+!endif\r
+DATA = {\r
+ #\r
+ # This hex array have been generated by OvmfPkg/OvmfXenElfHeaderGenerator.c\r
+ # and copied manually.\r
+ #\r
+ # ELF file header\r
+ 0x7f, 0x45, 0x4c, 0x46, # e_ident[0..3]: Magic number\r
+ 0x01, # File class: 32-bit objects\r
+ 0x01, # Data encoding: 2's complement, little endian\r
+ 0x01, # File version\r
+ 0x03, # OS ABI identification: Object uses GNU ELF extensions\r
+ 0x00, # ABI version\r
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, # e_ident[EI_PAD...]\r
+ 0x02, 0x00, # e_type = Executable file\r
+ 0x03, 0x00, # e_machine = Intel 80386\r
+ 0x01, 0x00, 0x00, 0x00, # e_version\r
+ 0xd0, 0xff, 0x2f, 0x00, # e_entry: Entry point virtual address\r
+ 0x34, 0x00, 0x00, 0x00, # e_phoff: Program header table file offset\r
+ 0x00, 0x00, 0x00, 0x00, # e_shoff: Section header table file offset\r
+ 0x00, 0x00, 0x00, 0x00, # e_flags: Processor-specific flags\r
+ 0x34, 0x00, # e_ehsize: ELF header size\r
+ 0x20, 0x00, # e_phentsize: Program header table entry size\r
+ 0x02, 0x00, # e_phnum: Program header table entry count\r
+ 0x00, 0x00, # e_shentsize: Section header table entry size\r
+ 0x00, 0x00, # e_shnum: Section header table entry count\r
+ 0x00, 0x00, # e_shstrndx\r
+\r
+ # ELF Program segment headers\r
+ # - Load segment\r
+ 0x01, 0x00, 0x00, 0x00, # p_type = Loadable program segment\r
+ 0x00, 0x00, 0x00, 0x00, # p_offset\r
+ 0x00, 0x00, 0x10, 0x00, # p_vaddr: Segment virtual address\r
+ 0x00, 0x00, 0x10, 0x00, # p_paddr: Segment physical address\r
+ 0x00, 0x00, 0x20, 0x00, # p_filesz: Segment size in file\r
+ 0x00, 0x00, 0x20, 0x00, # p_memsz: Segment size in memory\r
+ 0x07, 0x00, 0x00, 0x00, # p_flags = Segment is executable | writable | readable\r
+ 0x00, 0x00, 0x00, 0x00, # p_align\r
+ # - ELFNOTE segment\r
+ 0x04, 0x00, 0x00, 0x00, # p_type = PT_NOTE\r
+ 0x74, 0x00, 0x00, 0x00, # p_offset = point to XEN_ELFNOTE_PHYS32_ENTRY below\r
+ 0x74, 0x00, 0x10, 0x00,\r
+ 0x74, 0x00, 0x10, 0x00,\r
+ 0x14, 0x00, 0x00, 0x00,\r
+ 0x14, 0x00, 0x00, 0x00,\r
+ 0x04, 0x00, 0x00, 0x00, # p_flags = Segment is readable\r
+ 0x00, 0x00, 0x00, 0x00,\r
+\r
+ # XEN_ELFNOTE_PHYS32_ENTRY\r
+ 0x04, 0x00, 0x00, 0x00, # name size\r
+ 0x04, 0x00, 0x00, 0x00, # desc size\r
+ 0x12, 0x00, 0x00, 0x00, # type = XEN_ELFNOTE_PHYS32_ENTRY\r
+ 0x58, 0x65, 0x6e, 0x00, # name = "Xen"\r
+ 0xd0, 0xff, 0x2f, 0x00, # desc: PVH entry point\r
+ 0x00\r
+}\r
+\r
+!if ($(FD_SIZE_IN_KB) == 1024) || ($(FD_SIZE_IN_KB) == 2048)\r
+0x0000e000|0x00001000\r
+!endif\r
+!if $(FD_SIZE_IN_KB) == 4096\r
+0x00040000|0x00001000\r
+!endif\r
+#NV_EVENT_LOG\r
+\r
+!if ($(FD_SIZE_IN_KB) == 1024) || ($(FD_SIZE_IN_KB) == 2048)\r
+0x0000f000|0x00001000\r
+!endif\r
+!if $(FD_SIZE_IN_KB) == 4096\r
+0x00041000|0x00001000\r
+!endif\r
+#NV_FTW_WORKING\r
+DATA = {\r
+ # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =\r
+ # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}\r
+ 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,\r
+ 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95,\r
+ # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved\r
+ 0x2c, 0xaf, 0x2c, 0x64, 0xFE, 0xFF, 0xFF, 0xFF,\r
+ # WriteQueueSize: UINT64\r
+ 0xE0, 0x0F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r
+}\r
+\r
+!if ($(FD_SIZE_IN_KB) == 1024) || ($(FD_SIZE_IN_KB) == 2048)\r
+0x00010000|0x00010000\r
+!endif\r
+!if $(FD_SIZE_IN_KB) == 4096\r
+0x00042000|0x00042000\r
+!endif\r
+#NV_FTW_SPARE\r
+\r
\r
$(VARS_SIZE)|$(FVMAIN_SIZE)\r
FV = FVMAIN_COMPACT\r
0x007000|0x001000\r
gEfiMdePkgTokenSpaceGuid.PcdGuidedExtractHandlerTableAddress|gUefiOvmfPkgTokenSpaceGuid.PcdGuidedExtractHandlerTableSize\r
\r
+0x008000|0x001000\r
+# Used by XenResetVector to communicate with XenPlatformPei\r
+gUefiOvmfPkgTokenSpaceGuid.PcdXenPvhStartOfDayStructPtr|gUefiOvmfPkgTokenSpaceGuid.PcdXenPvhStartOfDayStructPtrSize\r
+\r
0x010000|0x010000\r
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize\r
\r