]> git.proxmox.com Git - mirror_edk2.git/blame - OvmfPkg/CloudHv/CloudHvX64.fdf
UefiCpuPkg: Move AsmRelocateApLoopStart from Mpfuncs.nasm to AmdSev.nasm
[mirror_edk2.git] / OvmfPkg / CloudHv / CloudHvX64.fdf
CommitLineData
c712ce2b
SB
1## @file\r
2# Open Virtual Machine Firmware: FDF\r
3#\r
4# Copyright (c) 2006 - 2022, Intel Corporation. All rights reserved.<BR>\r
5# (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>\r
6#\r
7# SPDX-License-Identifier: BSD-2-Clause-Patent\r
8#\r
9##\r
10\r
11################################################################################\r
12\r
13[Defines]\r
5c9f151e 14!include CloudHvDefines.fdf.inc\r
c712ce2b
SB
15\r
16#\r
e1c7f9b4
SB
17# This will allow the flash device image to be recognize as an ELF, with first\r
18# an ELF headers, then the firmware code.\r
c712ce2b
SB
19#\r
20[FD.CLOUDHV]\r
21BaseAddress = $(FW_BASE_ADDRESS)\r
22Size = $(FW_SIZE)\r
23ErasePolarity = 1\r
24BlockSize = $(BLOCK_SIZE)\r
25NumBlocks = $(FW_BLOCKS)\r
26\r
e1c7f9b4
SB
27#\r
28# Leaving 4kiB for the PVH ELF header. This is more than enough.\r
29#\r
300x00000000|0x00001000\r
31\r
32!include CloudHvElfHeader.fdf.inc\r
33\r
340x00001000|$(FVMAIN_SIZE)\r
c712ce2b
SB
35FV = FVMAIN_COMPACT\r
36\r
9ac8c85d 37$(SECFV_OFFSET)|$(SECFV_SIZE)\r
c712ce2b
SB
38FV = SECFV\r
39\r
40################################################################################\r
41\r
42[FD.MEMFD]\r
43BaseAddress = $(MEMFD_BASE_ADDRESS)\r
44Size = 0xD00000\r
45ErasePolarity = 1\r
46BlockSize = 0x10000\r
47NumBlocks = 0xD0\r
48\r
490x000000|0x006000\r
50gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize\r
51\r
520x006000|0x001000\r
53gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageSize\r
54\r
550x007000|0x001000\r
56gEfiMdePkgTokenSpaceGuid.PcdGuidedExtractHandlerTableAddress|gUefiOvmfPkgTokenSpaceGuid.PcdGuidedExtractHandlerTableSize\r
57\r
580x008000|0x001000\r
59gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableSize\r
60\r
610x009000|0x002000\r
62gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbSize\r
63\r
640x00B000|0x001000\r
65gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize\r
66\r
670x00C000|0x001000\r
68gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupSize\r
69\r
700x00D000|0x001000\r
71gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsSize\r
72\r
730x00E000|0x001000\r
74gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidSize\r
75\r
d50d9e55
SB
760x00F000|0x001000\r
77gUefiOvmfPkgTokenSpaceGuid.PcdXenPvhStartOfDayStructPtr|gUefiOvmfPkgTokenSpaceGuid.PcdXenPvhStartOfDayStructPtrSize\r
78\r
c712ce2b
SB
790x010000|0x010000\r
80gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize\r
81\r
820x020000|0x0E0000\r
83gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvSize\r
84FV = PEIFV\r
85\r
860x100000|0xC00000\r
87gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvSize\r
88FV = DXEFV\r
89\r
90##########################################################################################\r
91# Set the SEV-ES specific work area PCDs\r
92#\r
93SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaBase = $(MEMFD_BASE_ADDRESS) + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader\r
94SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaSize = gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize - gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader\r
95##########################################################################################\r
96\r
97################################################################################\r
98\r
99[FV.SECFV]\r
100FvNameGuid = 763BED0D-DE9F-48F5-81F1-3E90E1B1A015\r
101BlockSize = 0x1000\r
102FvAlignment = 16\r
103ERASE_POLARITY = 1\r
104MEMORY_MAPPED = TRUE\r
105STICKY_WRITE = TRUE\r
106LOCK_CAP = TRUE\r
107LOCK_STATUS = TRUE\r
108WRITE_DISABLED_CAP = TRUE\r
109WRITE_ENABLED_CAP = TRUE\r
110WRITE_STATUS = TRUE\r
111WRITE_LOCK_CAP = TRUE\r
112WRITE_LOCK_STATUS = TRUE\r
113READ_DISABLED_CAP = TRUE\r
114READ_ENABLED_CAP = TRUE\r
115READ_STATUS = TRUE\r
116READ_LOCK_CAP = TRUE\r
117READ_LOCK_STATUS = TRUE\r
118\r
119#\r
120# SEC Phase modules\r
121#\r
122# The code in this FV handles the initial firmware startup, and\r
123# decompresses the PEI and DXE FVs which handles the rest of the boot sequence.\r
124#\r
125INF OvmfPkg/Sec/SecMain.inf\r
126\r
e1c7f9b4 127INF RuleOverride=RESET_VECTOR OvmfPkg/XenResetVector/XenResetVector.inf\r
c712ce2b
SB
128\r
129################################################################################\r
130[FV.PEIFV]\r
131FvNameGuid = 6938079B-B503-4E3D-9D24-B28337A25806\r
132BlockSize = 0x10000\r
133FvAlignment = 16\r
134ERASE_POLARITY = 1\r
135MEMORY_MAPPED = TRUE\r
136STICKY_WRITE = TRUE\r
137LOCK_CAP = TRUE\r
138LOCK_STATUS = TRUE\r
139WRITE_DISABLED_CAP = TRUE\r
140WRITE_ENABLED_CAP = TRUE\r
141WRITE_STATUS = TRUE\r
142WRITE_LOCK_CAP = TRUE\r
143WRITE_LOCK_STATUS = TRUE\r
144READ_DISABLED_CAP = TRUE\r
145READ_ENABLED_CAP = TRUE\r
146READ_STATUS = TRUE\r
147READ_LOCK_CAP = TRUE\r
148READ_LOCK_STATUS = TRUE\r
149\r
150APRIORI PEI {\r
151 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
152}\r
153\r
154#\r
155# PEI Phase modules\r
156#\r
157INF MdeModulePkg/Core/Pei/PeiMain.inf\r
158INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
159INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf\r
160INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf\r
161INF OvmfPkg/PlatformPei/PlatformPei.inf\r
162INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf\r
163INF UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf\r
164!if $(SMM_REQUIRE) == TRUE\r
165INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf\r
166INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf\r
167INF OvmfPkg/SmmAccess/SmmAccessPei.inf\r
168!endif\r
169INF UefiCpuPkg/CpuMpPei/CpuMpPei.inf\r
170\r
171!include OvmfPkg/OvmfTpmPei.fdf.inc\r
172\r
173################################################################################\r
174\r
175[FV.DXEFV]\r
176FvForceRebase = FALSE\r
177FvNameGuid = 7CB8BDC9-F8EB-4F34-AAEA-3EE4AF6516A1\r
178BlockSize = 0x10000\r
179FvAlignment = 16\r
180ERASE_POLARITY = 1\r
181MEMORY_MAPPED = TRUE\r
182STICKY_WRITE = TRUE\r
183LOCK_CAP = TRUE\r
184LOCK_STATUS = TRUE\r
185WRITE_DISABLED_CAP = TRUE\r
186WRITE_ENABLED_CAP = TRUE\r
187WRITE_STATUS = TRUE\r
188WRITE_LOCK_CAP = TRUE\r
189WRITE_LOCK_STATUS = TRUE\r
190READ_DISABLED_CAP = TRUE\r
191READ_ENABLED_CAP = TRUE\r
192READ_STATUS = TRUE\r
193READ_LOCK_CAP = TRUE\r
194READ_LOCK_STATUS = TRUE\r
195\r
196APRIORI DXE {\r
197 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
198 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
199 INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf\r
200!if $(SMM_REQUIRE) == FALSE\r
201 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf\r
202!endif\r
203}\r
204\r
205#\r
206# DXE Phase modules\r
207#\r
208INF MdeModulePkg/Core/Dxe/DxeMain.inf\r
209\r
210INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf\r
211INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf\r
212INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
213\r
214INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf\r
215INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf\r
216INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf\r
c712ce2b
SB
217INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf\r
218INF UefiCpuPkg/CpuDxe/CpuDxe.inf\r
c2e7be40 219INF OvmfPkg/LocalApicTimerDxe/LocalApicTimerDxe.inf\r
c712ce2b
SB
220INF OvmfPkg/IncompatiblePciDeviceSupportDxe/IncompatiblePciDeviceSupport.inf\r
221INF OvmfPkg/PciHotPlugInitDxe/PciHotPlugInit.inf\r
222INF MdeModulePkg/Bus/Pci/PciHostBridgeDxe/PciHostBridgeDxe.inf\r
223INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf\r
224INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf\r
225INF MdeModulePkg/Universal/Metronome/Metronome.inf\r
226INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf\r
227\r
228INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf\r
229INF OvmfPkg/Virtio10Dxe/Virtio10.inf\r
230INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf\r
231INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf\r
232INF OvmfPkg/VirtioRngDxe/VirtioRng.inf\r
233!if $(PVSCSI_ENABLE) == TRUE\r
234INF OvmfPkg/PvScsiDxe/PvScsiDxe.inf\r
235!endif\r
236!if $(MPT_SCSI_ENABLE) == TRUE\r
237INF OvmfPkg/MptScsiDxe/MptScsiDxe.inf\r
238!endif\r
239!if $(LSI_SCSI_ENABLE) == TRUE\r
240INF OvmfPkg/LsiScsiDxe/LsiScsiDxe.inf\r
241!endif\r
242\r
243!if $(SECURE_BOOT_ENABLE) == TRUE\r
244 INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf\r
245!endif\r
246\r
247INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf\r
248INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf\r
249INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf\r
250INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf\r
251INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf\r
252INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf\r
253INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf\r
254INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf\r
255INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf\r
256INF MdeModulePkg/Application/UiApp/UiApp.inf\r
257INF OvmfPkg/QemuKernelLoaderFsDxe/QemuKernelLoaderFsDxe.inf\r
258INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
259INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf\r
260INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf\r
261INF MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskDxe.inf\r
262INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf\r
263INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf\r
264INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf\r
265INF OvmfPkg/SataControllerDxe/SataControllerDxe.inf\r
266INF MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf\r
267INF MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf\r
268INF MdeModulePkg/Bus/Pci/NvmExpressDxe/NvmExpressDxe.inf\r
269INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf\r
270INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf\r
271INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf\r
272INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf\r
273\r
6ecdda71 274INF MdeModulePkg/Universal/SerialDxe/SerialDxe.inf\r
c712ce2b
SB
275\r
276INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf\r
277INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf\r
278\r
279INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf\r
280INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf\r
281INF MdeModulePkg/Universal/Acpi/S3SaveStateDxe/S3SaveStateDxe.inf\r
282INF MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe/BootScriptExecutorDxe.inf\r
283INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResourceTableDxe.inf\r
284\r
285INF FatPkg/EnhancedFatDxe/Fat.inf\r
286INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf\r
287INF OvmfPkg/VirtioFsDxe/VirtioFsDxe.inf\r
288\r
289!if $(TOOL_CHAIN_TAG) != "XCODE5"\r
290INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf\r
291INF ShellPkg/DynamicCommand/HttpDynamicCommand/HttpDynamicCommand.inf\r
292INF OvmfPkg/LinuxInitrdDynamicShellCommand/LinuxInitrdDynamicShellCommand.inf\r
293!endif\r
294INF ShellPkg/Application/Shell/Shell.inf\r
295\r
296INF MdeModulePkg/Logo/LogoDxe.inf\r
297\r
298#\r
299# Network modules\r
300#\r
301!if $(E1000_ENABLE)\r
302 FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {\r
303 SECTION PE32 = Intel3.5/EFIX64/E3522X2.EFI\r
304 }\r
305!endif\r
306!include NetworkPkg/Network.fdf.inc\r
307 INF OvmfPkg/VirtioNetDxe/VirtioNet.inf\r
308\r
c712ce2b
SB
309INF OvmfPkg/PlatformDxe/Platform.inf\r
310INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf\r
311INF OvmfPkg/IoMmuDxe/IoMmuDxe.inf\r
312\r
313!if $(SMM_REQUIRE) == TRUE\r
314INF OvmfPkg/SmmAccess/SmmAccess2Dxe.inf\r
315INF OvmfPkg/SmmControl2Dxe/SmmControl2Dxe.inf\r
316INF OvmfPkg/CpuS3DataDxe/CpuS3DataDxe.inf\r
317INF MdeModulePkg/Core/PiSmmCore/PiSmmIpl.inf\r
318INF MdeModulePkg/Core/PiSmmCore/PiSmmCore.inf\r
319INF OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf\r
320INF UefiCpuPkg/CpuIo2Smm/CpuIo2Smm.inf\r
321INF MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBox.inf\r
322INF UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf\r
323\r
324#\r
325# Variable driver stack (SMM)\r
326#\r
327INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesSmm.inf\r
328INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteSmm.inf\r
329INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmm.inf\r
330INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmmRuntimeDxe.inf\r
331\r
332!else\r
333\r
334#\r
335# Variable driver stack (non-SMM)\r
336#\r
337INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf\r
338INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf\r
339INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf\r
340INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf\r
341!endif\r
342\r
343#\r
344# TPM support\r
345#\r
346!include OvmfPkg/OvmfTpmDxe.fdf.inc\r
347\r
348################################################################################\r
349\r
350[FV.FVMAIN_COMPACT]\r
351FvNameGuid = 48DB5E17-707C-472D-91CD-1613E7EF51B0\r
352FvAlignment = 16\r
353ERASE_POLARITY = 1\r
354MEMORY_MAPPED = TRUE\r
355STICKY_WRITE = TRUE\r
356LOCK_CAP = TRUE\r
357LOCK_STATUS = TRUE\r
358WRITE_DISABLED_CAP = TRUE\r
359WRITE_ENABLED_CAP = TRUE\r
360WRITE_STATUS = TRUE\r
361WRITE_LOCK_CAP = TRUE\r
362WRITE_LOCK_STATUS = TRUE\r
363READ_DISABLED_CAP = TRUE\r
364READ_ENABLED_CAP = TRUE\r
365READ_STATUS = TRUE\r
366READ_LOCK_CAP = TRUE\r
367READ_LOCK_STATUS = TRUE\r
368\r
369FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {\r
370 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {\r
371 #\r
372 # These firmware volumes will have files placed in them uncompressed,\r
373 # and then both firmware volumes will be compressed in a single\r
374 # compression operation in order to achieve better overall compression.\r
375 #\r
376 SECTION FV_IMAGE = PEIFV\r
377 SECTION FV_IMAGE = DXEFV\r
378 }\r
379 }\r
380\r
1ef86f12 381!include OvmfPkg/Include/Fdf/FvmainCompactScratchEnd.fdf.inc\r
c712ce2b
SB
382\r
383################################################################################\r
384\r
385[Rule.Common.SEC]\r
386 FILE SEC = $(NAMED_GUID) {\r
387 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
388 UI STRING ="$(MODULE_NAME)" Optional\r
389 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
390 }\r
391\r
392[Rule.Common.PEI_CORE]\r
393 FILE PEI_CORE = $(NAMED_GUID) {\r
394 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi\r
395 UI STRING ="$(MODULE_NAME)" Optional\r
396 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
397 }\r
398\r
399[Rule.Common.PEIM]\r
400 FILE PEIM = $(NAMED_GUID) {\r
401 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
402 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi\r
403 UI STRING="$(MODULE_NAME)" Optional\r
404 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
405 }\r
406\r
407[Rule.Common.DXE_CORE]\r
408 FILE DXE_CORE = $(NAMED_GUID) {\r
409 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
410 UI STRING="$(MODULE_NAME)" Optional\r
411 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
412 }\r
413\r
414[Rule.Common.DXE_DRIVER]\r
415 FILE DRIVER = $(NAMED_GUID) {\r
416 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
417 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
418 UI STRING="$(MODULE_NAME)" Optional\r
419 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
420 RAW ACPI Optional |.acpi\r
421 RAW ASL Optional |.aml\r
422 }\r
423\r
424[Rule.Common.DXE_RUNTIME_DRIVER]\r
425 FILE DRIVER = $(NAMED_GUID) {\r
426 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
427 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
428 UI STRING="$(MODULE_NAME)" Optional\r
429 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
430 }\r
431\r
432[Rule.Common.UEFI_DRIVER]\r
433 FILE DRIVER = $(NAMED_GUID) {\r
434 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
435 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
436 UI STRING="$(MODULE_NAME)" Optional\r
437 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
438 }\r
439\r
440[Rule.Common.UEFI_DRIVER.BINARY]\r
441 FILE DRIVER = $(NAMED_GUID) {\r
442 DXE_DEPEX DXE_DEPEX Optional |.depex\r
443 PE32 PE32 |.efi\r
444 UI STRING="$(MODULE_NAME)" Optional\r
445 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
446 }\r
447\r
448[Rule.Common.UEFI_APPLICATION]\r
449 FILE APPLICATION = $(NAMED_GUID) {\r
450 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
451 UI STRING="$(MODULE_NAME)" Optional\r
452 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
453 }\r
454\r
455[Rule.Common.UEFI_APPLICATION.BINARY]\r
456 FILE APPLICATION = $(NAMED_GUID) {\r
457 PE32 PE32 |.efi\r
458 UI STRING="$(MODULE_NAME)" Optional\r
459 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
460 }\r
461\r
462[Rule.Common.USER_DEFINED.CSM]\r
463 FILE FREEFORM = $(NAMED_GUID) {\r
464 RAW BIN |.bin\r
465 }\r
466\r
467[Rule.Common.SEC.RESET_VECTOR]\r
468 FILE RAW = $(NAMED_GUID) {\r
469 RAW BIN Align = 16 |.bin\r
470 }\r
471\r
472[Rule.Common.SMM_CORE]\r
473 FILE SMM_CORE = $(NAMED_GUID) {\r
474 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
475 UI STRING="$(MODULE_NAME)" Optional\r
476 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
477 }\r
478\r
479[Rule.Common.DXE_SMM_DRIVER]\r
480 FILE SMM = $(NAMED_GUID) {\r
481 SMM_DEPEX SMM_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
482 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
483 UI STRING="$(MODULE_NAME)" Optional\r
484 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
485 }\r