]> git.proxmox.com Git - mirror_edk2.git/blame - OvmfPkg/Microvm/MicrovmX64.fdf
mv OvmfPkg: move fdf include snippets to Include/Fdf
[mirror_edk2.git] / OvmfPkg / Microvm / MicrovmX64.fdf
CommitLineData
606340fb
GH
1## @file\r
2# Open Virtual Machine Firmware: FDF\r
3#\r
4# Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>\r
5# (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>\r
6#\r
7# SPDX-License-Identifier: BSD-2-Clause-Patent\r
8#\r
9##\r
10\r
11################################################################################\r
12\r
13[Defines]\r
1ef86f12 14!include OvmfPkg/Include/Fdf/OvmfPkgDefines.fdf.inc\r
606340fb
GH
15\r
16#\r
17# Build the variable store and the firmware code as one unified flash device\r
18# image.\r
19#\r
4932f05a 20[FD.MICROVM]\r
606340fb
GH
21BaseAddress = $(FW_BASE_ADDRESS)\r
22Size = $(FW_SIZE)\r
23ErasePolarity = 1\r
24BlockSize = $(BLOCK_SIZE)\r
25NumBlocks = $(FW_BLOCKS)\r
26\r
1ef86f12 27!include OvmfPkg/Include/Fdf/VarStore.fdf.inc\r
606340fb
GH
28\r
29$(VARS_SIZE)|$(FVMAIN_SIZE)\r
30FV = FVMAIN_COMPACT\r
31\r
32$(SECFV_OFFSET)|$(SECFV_SIZE)\r
33FV = SECFV\r
34\r
606340fb
GH
35################################################################################\r
36\r
37[FD.MEMFD]\r
38BaseAddress = $(MEMFD_BASE_ADDRESS)\r
39Size = 0xD00000\r
40ErasePolarity = 1\r
41BlockSize = 0x10000\r
42NumBlocks = 0xD0\r
43\r
440x000000|0x006000\r
45gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize\r
46\r
470x006000|0x001000\r
48gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageSize\r
49\r
500x007000|0x001000\r
51gEfiMdePkgTokenSpaceGuid.PcdGuidedExtractHandlerTableAddress|gUefiOvmfPkgTokenSpaceGuid.PcdGuidedExtractHandlerTableSize\r
52\r
530x008000|0x001000\r
54gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableSize\r
55\r
560x009000|0x002000\r
57gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbSize\r
58\r
590x00B000|0x001000\r
60gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize\r
61\r
620x00C000|0x001000\r
63gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupSize\r
64\r
650x010000|0x010000\r
66gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize\r
67\r
680x020000|0x0E0000\r
69gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvSize\r
70FV = PEIFV\r
71\r
720x100000|0xC00000\r
73gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvSize\r
74FV = DXEFV\r
75\r
76##########################################################################################\r
77# Set the SEV-ES specific work area PCDs\r
78#\r
79SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaBase = $(MEMFD_BASE_ADDRESS) + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader\r
80SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaSize = gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize - gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader\r
81##########################################################################################\r
82\r
83################################################################################\r
84\r
85[FV.SECFV]\r
86FvNameGuid = 763BED0D-DE9F-48F5-81F1-3E90E1B1A015\r
87BlockSize = 0x1000\r
88FvAlignment = 16\r
89ERASE_POLARITY = 1\r
90MEMORY_MAPPED = TRUE\r
91STICKY_WRITE = TRUE\r
92LOCK_CAP = TRUE\r
93LOCK_STATUS = TRUE\r
94WRITE_DISABLED_CAP = TRUE\r
95WRITE_ENABLED_CAP = TRUE\r
96WRITE_STATUS = TRUE\r
97WRITE_LOCK_CAP = TRUE\r
98WRITE_LOCK_STATUS = TRUE\r
99READ_DISABLED_CAP = TRUE\r
100READ_ENABLED_CAP = TRUE\r
101READ_STATUS = TRUE\r
102READ_LOCK_CAP = TRUE\r
103READ_LOCK_STATUS = TRUE\r
104\r
105#\r
106# SEC Phase modules\r
107#\r
108# The code in this FV handles the initial firmware startup, and\r
109# decompresses the PEI and DXE FVs which handles the rest of the boot sequence.\r
110#\r
111INF OvmfPkg/Sec/SecMain.inf\r
112\r
113INF RuleOverride=RESET_VECTOR OvmfPkg/ResetVector/ResetVector.inf\r
114\r
115################################################################################\r
116[FV.PEIFV]\r
117FvNameGuid = 6938079B-B503-4E3D-9D24-B28337A25806\r
118BlockSize = 0x10000\r
119FvAlignment = 16\r
120ERASE_POLARITY = 1\r
121MEMORY_MAPPED = TRUE\r
122STICKY_WRITE = TRUE\r
123LOCK_CAP = TRUE\r
124LOCK_STATUS = TRUE\r
125WRITE_DISABLED_CAP = TRUE\r
126WRITE_ENABLED_CAP = TRUE\r
127WRITE_STATUS = TRUE\r
128WRITE_LOCK_CAP = TRUE\r
129WRITE_LOCK_STATUS = TRUE\r
130READ_DISABLED_CAP = TRUE\r
131READ_ENABLED_CAP = TRUE\r
132READ_STATUS = TRUE\r
133READ_LOCK_CAP = TRUE\r
134READ_LOCK_STATUS = TRUE\r
135\r
136APRIORI PEI {\r
137 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
138}\r
139\r
140#\r
141# PEI Phase modules\r
142#\r
143INF MdeModulePkg/Core/Pei/PeiMain.inf\r
144INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
145INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf\r
146INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf\r
147INF OvmfPkg/PlatformPei/PlatformPei.inf\r
148INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf\r
149INF UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf\r
606340fb
GH
150INF UefiCpuPkg/CpuMpPei/CpuMpPei.inf\r
151\r
606340fb
GH
152################################################################################\r
153\r
154[FV.DXEFV]\r
155FvForceRebase = FALSE\r
156FvNameGuid = 7CB8BDC9-F8EB-4F34-AAEA-3EE4AF6516A1\r
157BlockSize = 0x10000\r
158FvAlignment = 16\r
159ERASE_POLARITY = 1\r
160MEMORY_MAPPED = TRUE\r
161STICKY_WRITE = TRUE\r
162LOCK_CAP = TRUE\r
163LOCK_STATUS = TRUE\r
164WRITE_DISABLED_CAP = TRUE\r
165WRITE_ENABLED_CAP = TRUE\r
166WRITE_STATUS = TRUE\r
167WRITE_LOCK_CAP = TRUE\r
168WRITE_LOCK_STATUS = TRUE\r
169READ_DISABLED_CAP = TRUE\r
170READ_ENABLED_CAP = TRUE\r
171READ_STATUS = TRUE\r
172READ_LOCK_CAP = TRUE\r
173READ_LOCK_STATUS = TRUE\r
174\r
175APRIORI DXE {\r
176 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
177 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
606340fb
GH
178}\r
179\r
180#\r
181# DXE Phase modules\r
182#\r
183INF MdeModulePkg/Core/Dxe/DxeMain.inf\r
184\r
185INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf\r
186INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf\r
187INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
188\r
189INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf\r
190INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf\r
191INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf\r
c2e7be40 192INF OvmfPkg/LocalApicTimerDxe/LocalApicTimerDxe.inf\r
606340fb
GH
193INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf\r
194INF UefiCpuPkg/CpuDxe/CpuDxe.inf\r
606340fb
GH
195INF OvmfPkg/IncompatiblePciDeviceSupportDxe/IncompatiblePciDeviceSupport.inf\r
196INF OvmfPkg/PciHotPlugInitDxe/PciHotPlugInit.inf\r
197INF MdeModulePkg/Bus/Pci/PciHostBridgeDxe/PciHostBridgeDxe.inf\r
198INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf\r
199INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf\r
200INF MdeModulePkg/Universal/Metronome/Metronome.inf\r
201INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf\r
202\r
203INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf\r
204INF OvmfPkg/Virtio10Dxe/Virtio10.inf\r
205INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf\r
206INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf\r
207INF OvmfPkg/VirtioRngDxe/VirtioRng.inf\r
606340fb 208\r
33613366
GH
209!if $(SECURE_BOOT_ENABLE) == TRUE\r
210 INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf\r
211!endif\r
212\r
606340fb
GH
213INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf\r
214INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf\r
215INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf\r
216INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf\r
217INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf\r
218INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf\r
219INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf\r
220INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf\r
221INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf\r
222INF MdeModulePkg/Application/UiApp/UiApp.inf\r
223INF OvmfPkg/QemuKernelLoaderFsDxe/QemuKernelLoaderFsDxe.inf\r
224INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
606340fb
GH
225INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf\r
226INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf\r
227INF MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskDxe.inf\r
228INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf\r
229INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf\r
230INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf\r
231INF OvmfPkg/SataControllerDxe/SataControllerDxe.inf\r
232INF MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf\r
233INF MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf\r
234INF MdeModulePkg/Bus/Pci/NvmExpressDxe/NvmExpressDxe.inf\r
235INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf\r
236INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf\r
237INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf\r
238INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf\r
239\r
606340fb 240!if $(SOURCE_DEBUG_ENABLE) == FALSE\r
55f47d22 241INF MdeModulePkg/Universal/SerialDxe/SerialDxe.inf\r
606340fb 242!endif\r
606340fb
GH
243\r
244INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf\r
245INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf\r
246\r
247INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf\r
66bce05f 248INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf\r
606340fb
GH
249INF MdeModulePkg/Universal/Acpi/S3SaveStateDxe/S3SaveStateDxe.inf\r
250INF MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe/BootScriptExecutorDxe.inf\r
251INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResourceTableDxe.inf\r
252\r
253INF FatPkg/EnhancedFatDxe/Fat.inf\r
254INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf\r
255INF OvmfPkg/VirtioFsDxe/VirtioFsDxe.inf\r
256\r
64ef0dd1 257INF EmbeddedPkg/Drivers/FdtClientDxe/FdtClientDxe.inf\r
2a68abf6 258INF OvmfPkg/Fdt/VirtioFdtDxe/VirtioFdtDxe.inf\r
64ef0dd1 259\r
606340fb
GH
260!if $(TOOL_CHAIN_TAG) != "XCODE5"\r
261INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf\r
262INF ShellPkg/DynamicCommand/HttpDynamicCommand/HttpDynamicCommand.inf\r
263INF OvmfPkg/LinuxInitrdDynamicShellCommand/LinuxInitrdDynamicShellCommand.inf\r
264!endif\r
265INF ShellPkg/Application/Shell/Shell.inf\r
266\r
267INF MdeModulePkg/Logo/LogoDxe.inf\r
268\r
269#\r
270# Network modules\r
271#\r
272!if $(E1000_ENABLE)\r
273 FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {\r
274 SECTION PE32 = Intel3.5/EFIX64/E3522X2.EFI\r
275 }\r
276!endif\r
277!include NetworkPkg/Network.fdf.inc\r
278 INF OvmfPkg/VirtioNetDxe/VirtioNet.inf\r
279\r
280#\r
281# Usb Support\r
282#\r
283INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf\r
284INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf\r
285INF MdeModulePkg/Bus/Pci/XhciDxe/XhciDxe.inf\r
286INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf\r
287INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf\r
288INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf\r
289\r
606340fb 290INF OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf\r
606340fb
GH
291\r
292INF OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf\r
293INF OvmfPkg/VirtioGpuDxe/VirtioGpu.inf\r
294INF OvmfPkg/PlatformDxe/Platform.inf\r
606340fb
GH
295INF OvmfPkg/IoMmuDxe/IoMmuDxe.inf\r
296\r
606340fb
GH
297#\r
298# Variable driver stack (non-SMM)\r
299#\r
300INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf\r
301INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf\r
302INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf\r
303INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf\r
606340fb 304\r
606340fb
GH
305################################################################################\r
306\r
307[FV.FVMAIN_COMPACT]\r
308FvNameGuid = 48DB5E17-707C-472D-91CD-1613E7EF51B0\r
309FvAlignment = 16\r
310ERASE_POLARITY = 1\r
311MEMORY_MAPPED = TRUE\r
312STICKY_WRITE = TRUE\r
313LOCK_CAP = TRUE\r
314LOCK_STATUS = TRUE\r
315WRITE_DISABLED_CAP = TRUE\r
316WRITE_ENABLED_CAP = TRUE\r
317WRITE_STATUS = TRUE\r
318WRITE_LOCK_CAP = TRUE\r
319WRITE_LOCK_STATUS = TRUE\r
320READ_DISABLED_CAP = TRUE\r
321READ_ENABLED_CAP = TRUE\r
322READ_STATUS = TRUE\r
323READ_LOCK_CAP = TRUE\r
324READ_LOCK_STATUS = TRUE\r
325\r
326FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {\r
327 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {\r
328 #\r
329 # These firmware volumes will have files placed in them uncompressed,\r
330 # and then both firmware volumes will be compressed in a single\r
331 # compression operation in order to achieve better overall compression.\r
332 #\r
333 SECTION FV_IMAGE = PEIFV\r
334 SECTION FV_IMAGE = DXEFV\r
335 }\r
336 }\r
337\r
1ef86f12 338!include OvmfPkg/Include/Fdf/FvmainCompactScratchEnd.fdf.inc\r
606340fb
GH
339\r
340################################################################################\r
341\r
342[Rule.Common.SEC]\r
343 FILE SEC = $(NAMED_GUID) {\r
344 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
345 UI STRING ="$(MODULE_NAME)" Optional\r
346 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
347 }\r
348\r
349[Rule.Common.PEI_CORE]\r
350 FILE PEI_CORE = $(NAMED_GUID) {\r
351 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi\r
352 UI STRING ="$(MODULE_NAME)" Optional\r
353 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
354 }\r
355\r
356[Rule.Common.PEIM]\r
357 FILE PEIM = $(NAMED_GUID) {\r
358 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
359 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi\r
360 UI STRING="$(MODULE_NAME)" Optional\r
361 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
362 }\r
363\r
364[Rule.Common.DXE_CORE]\r
365 FILE DXE_CORE = $(NAMED_GUID) {\r
366 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
367 UI STRING="$(MODULE_NAME)" Optional\r
368 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
369 }\r
370\r
371[Rule.Common.DXE_DRIVER]\r
372 FILE DRIVER = $(NAMED_GUID) {\r
373 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
374 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
375 UI STRING="$(MODULE_NAME)" Optional\r
376 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
377 RAW ACPI Optional |.acpi\r
378 RAW ASL Optional |.aml\r
379 }\r
380\r
381[Rule.Common.DXE_RUNTIME_DRIVER]\r
382 FILE DRIVER = $(NAMED_GUID) {\r
383 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
384 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
385 UI STRING="$(MODULE_NAME)" Optional\r
386 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
387 }\r
388\r
389[Rule.Common.UEFI_DRIVER]\r
390 FILE DRIVER = $(NAMED_GUID) {\r
391 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
392 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
393 UI STRING="$(MODULE_NAME)" Optional\r
394 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
395 }\r
396\r
397[Rule.Common.UEFI_DRIVER.BINARY]\r
398 FILE DRIVER = $(NAMED_GUID) {\r
399 DXE_DEPEX DXE_DEPEX Optional |.depex\r
400 PE32 PE32 |.efi\r
401 UI STRING="$(MODULE_NAME)" Optional\r
402 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
403 }\r
404\r
405[Rule.Common.UEFI_APPLICATION]\r
406 FILE APPLICATION = $(NAMED_GUID) {\r
407 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
408 UI STRING="$(MODULE_NAME)" Optional\r
409 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
410 }\r
411\r
412[Rule.Common.UEFI_APPLICATION.BINARY]\r
413 FILE APPLICATION = $(NAMED_GUID) {\r
414 PE32 PE32 |.efi\r
415 UI STRING="$(MODULE_NAME)" Optional\r
416 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
417 }\r
418\r
419[Rule.Common.USER_DEFINED.CSM]\r
420 FILE FREEFORM = $(NAMED_GUID) {\r
421 RAW BIN |.bin\r
422 }\r
423\r
424[Rule.Common.SEC.RESET_VECTOR]\r
425 FILE RAW = $(NAMED_GUID) {\r
426 RAW BIN Align = 16 |.bin\r
427 }\r
428\r
429[Rule.Common.SMM_CORE]\r
430 FILE SMM_CORE = $(NAMED_GUID) {\r
431 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
432 UI STRING="$(MODULE_NAME)" Optional\r
433 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
434 }\r
435\r
436[Rule.Common.DXE_SMM_DRIVER]\r
437 FILE SMM = $(NAMED_GUID) {\r
438 SMM_DEPEX SMM_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
439 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
440 UI STRING="$(MODULE_NAME)" Optional\r
441 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
442 }\r