]> git.proxmox.com Git - mirror_edk2.git/blame_incremental - OvmfPkg/OvmfPkgX64.fdf
OvmfPkg: Add section of memory to use for PEI on S3 resume
[mirror_edk2.git] / OvmfPkg / OvmfPkgX64.fdf
... / ...
CommitLineData
1## @file\r
2# Open Virtual Machine Firmware: FDF\r
3#\r
4# Copyright (c) 2006 - 2013, Intel Corporation. All rights reserved.<BR>\r
5#\r
6# This program and the accompanying materials\r
7# are licensed and made available under the terms and conditions of the BSD License\r
8# which accompanies this distribution. The full text of the license may be found at\r
9# http://opensource.org/licenses/bsd-license.php\r
10#\r
11# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
12# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
13#\r
14##\r
15\r
16################################################################################\r
17\r
18#\r
19# Default flash size for DEBUG build is 2MB. For RELEASE it is 1MB.\r
20#\r
21# Defining FD_SIZE_1MB or FD_SIZE_2MB on the build command line can\r
22# override this.\r
23#\r
24[Defines]\r
25!if $(TARGET) == RELEASE\r
26!ifndef $(FD_SIZE_2MB)\r
27DEFINE FD_SIZE_1MB=\r
28!endif\r
29!endif\r
30\r
31!ifdef $(FD_SIZE_1MB)\r
32[FD.OVMF]\r
33BaseAddress = 0xFFF00000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFdBaseAddress\r
34Size = 0x00100000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareFdSize\r
35ErasePolarity = 1\r
36BlockSize = 0x1000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareBlockSize\r
37NumBlocks = 0x100\r
38!else\r
39[FD.OVMF]\r
40BaseAddress = 0xFFE00000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFdBaseAddress\r
41Size = 0x00200000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareFdSize\r
42ErasePolarity = 1\r
43BlockSize = 0x1000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareBlockSize\r
44NumBlocks = 0x200\r
45!endif\r
46\r
470x00000000|0x0000e000\r
48gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize\r
49#NV_VARIABLE_STORE\r
50DATA = {\r
51 ## This is the EFI_FIRMWARE_VOLUME_HEADER\r
52 # ZeroVector []\r
53 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
54 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
55 # FileSystemGuid: gEfiSystemNvDataFvGuid =\r
56 # { 0xFFF12B8D, 0x7696, 0x4C8B,\r
57 # { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }}\r
58 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C,\r
59 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50,\r
60 # FvLength: 0x20000\r
61 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00,\r
62 # Signature "_FVH" # Attributes\r
63 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00,\r
64 # HeaderLength # CheckSum # ExtHeaderOffset #Reserved #Revision\r
65 0x48, 0x00, 0x19, 0xF9, 0x00, 0x00, 0x00, 0x02,\r
66 # Blockmap[0]: 0x20 Blocks * 0x1000 Bytes / Block\r
67 0x20, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00,\r
68 # Blockmap[1]: End\r
69 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
70 ## This is the VARIABLE_STORE_HEADER\r
71!if $(SECURE_BOOT_ENABLE) == TRUE\r
72 # Signature: gEfiAuthenticatedVariableGuid =\r
73 # { 0xaaf32c78, 0x947b, 0x439a,\r
74 # { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }}\r
75 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43,\r
76 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92,\r
77!else\r
78 # Signature: gEfiVariableGuid =\r
79 # { 0xddcf3616, 0x3275, 0x4164,\r
80 # { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }}\r
81 0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41,\r
82 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d,\r
83!endif\r
84 # Size: 0xe000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) -\r
85 # 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0xdfb8\r
86 # This can speed up the Variable Dispatch a bit.\r
87 0xB8, 0xDF, 0x00, 0x00,\r
88 # FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32\r
89 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r
90}\r
91\r
920x0000e000|0x00001000\r
93#NV_EVENT_LOG\r
94gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageEventLogBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageEventLogSize\r
95\r
960x0000f000|0x00001000\r
97gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize\r
98#NV_FTW_WORKING\r
99DATA = {\r
100 # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =\r
101 # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}\r
102 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,\r
103 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95,\r
104 # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved\r
105 0x2c, 0xaf, 0x2c, 0x64, 0xFE, 0xFF, 0xFF, 0xFF,\r
106 # WriteQueueSize: UINT64\r
107 0xE0, 0x0F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r
108}\r
109\r
1100x00010000|0x00010000\r
111#NV_FTW_SPARE\r
112gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize\r
113\r
114!ifdef $(FD_SIZE_1MB)\r
1150x00020000|0x000CC000\r
116FV = FVMAIN_COMPACT\r
117\r
1180x000EC000|0x14000\r
119FV = SECFV\r
120\r
121!else\r
1220x00020000|0x001AC000\r
123FV = FVMAIN_COMPACT\r
124\r
1250x001CC000|0x34000\r
126FV = SECFV\r
127!endif\r
128\r
129################################################################################\r
130\r
131[FD.MEMFD]\r
132BaseAddress = 0x800000\r
133Size = 0x800000\r
134ErasePolarity = 1\r
135BlockSize = 0x10000\r
136NumBlocks = 0x80\r
137\r
1380x000000|0x006000\r
139gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize\r
140\r
1410x010000|0x008000\r
142gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize\r
143\r
1440x018000|0x008000\r
145gUefiOvmfPkgTokenSpaceGuid.PcdS3AcpiReservedMemoryBase|gEfiIntelFrameworkModulePkgTokenSpaceGuid.PcdS3AcpiReservedMemorySize\r
146\r
1470x020000|0x0E0000\r
148gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvSize\r
149FV = PEIFV\r
150\r
1510x100000|0x700000\r
152gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvSize\r
153FV = DXEFV\r
154\r
155################################################################################\r
156\r
157[FV.SECFV]\r
158BlockSize = 0x1000\r
159FvAlignment = 16\r
160ERASE_POLARITY = 1\r
161MEMORY_MAPPED = TRUE\r
162STICKY_WRITE = TRUE\r
163LOCK_CAP = TRUE\r
164LOCK_STATUS = TRUE\r
165WRITE_DISABLED_CAP = TRUE\r
166WRITE_ENABLED_CAP = TRUE\r
167WRITE_STATUS = TRUE\r
168WRITE_LOCK_CAP = TRUE\r
169WRITE_LOCK_STATUS = TRUE\r
170READ_DISABLED_CAP = TRUE\r
171READ_ENABLED_CAP = TRUE\r
172READ_STATUS = TRUE\r
173READ_LOCK_CAP = TRUE\r
174READ_LOCK_STATUS = TRUE\r
175\r
176#\r
177# SEC Phase modules\r
178#\r
179# The code in this FV handles the initial firmware startup, and\r
180# decompresses the PEI and DXE FVs which handles the rest of the boot sequence.\r
181#\r
182INF OvmfPkg/Sec/SecMain.inf\r
183\r
184INF RuleOverride=RESET_VECTOR OvmfPkg/ResetVector/Bin/ResetVector.inf\r
185\r
186################################################################################\r
187[FV.PEIFV]\r
188BlockSize = 0x10000\r
189FvAlignment = 16\r
190ERASE_POLARITY = 1\r
191MEMORY_MAPPED = TRUE\r
192STICKY_WRITE = TRUE\r
193LOCK_CAP = TRUE\r
194LOCK_STATUS = TRUE\r
195WRITE_DISABLED_CAP = TRUE\r
196WRITE_ENABLED_CAP = TRUE\r
197WRITE_STATUS = TRUE\r
198WRITE_LOCK_CAP = TRUE\r
199WRITE_LOCK_STATUS = TRUE\r
200READ_DISABLED_CAP = TRUE\r
201READ_ENABLED_CAP = TRUE\r
202READ_STATUS = TRUE\r
203READ_LOCK_CAP = TRUE\r
204READ_LOCK_STATUS = TRUE\r
205\r
206APRIORI PEI {\r
207 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
208}\r
209\r
210#\r
211# PEI Phase modules\r
212#\r
213INF MdeModulePkg/Core/Pei/PeiMain.inf\r
214INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
215INF IntelFrameworkModulePkg/Universal/StatusCode/Pei/StatusCodePei.inf\r
216INF OvmfPkg/PlatformPei/PlatformPei.inf\r
217INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf\r
218\r
219################################################################################\r
220\r
221[FV.DXEFV]\r
222BlockSize = 0x10000\r
223FvAlignment = 16\r
224ERASE_POLARITY = 1\r
225MEMORY_MAPPED = TRUE\r
226STICKY_WRITE = TRUE\r
227LOCK_CAP = TRUE\r
228LOCK_STATUS = TRUE\r
229WRITE_DISABLED_CAP = TRUE\r
230WRITE_ENABLED_CAP = TRUE\r
231WRITE_STATUS = TRUE\r
232WRITE_LOCK_CAP = TRUE\r
233WRITE_LOCK_STATUS = TRUE\r
234READ_DISABLED_CAP = TRUE\r
235READ_ENABLED_CAP = TRUE\r
236READ_STATUS = TRUE\r
237READ_LOCK_CAP = TRUE\r
238READ_LOCK_STATUS = TRUE\r
239\r
240APRIORI DXE {\r
241 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
242 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
243 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf\r
244}\r
245\r
246#\r
247# DXE Phase modules\r
248#\r
249INF MdeModulePkg/Core/Dxe/DxeMain.inf\r
250\r
251INF IntelFrameworkModulePkg/Universal/StatusCode/RuntimeDxe/StatusCodeRuntimeDxe.inf\r
252INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
253\r
254INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf\r
255INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf\r
256INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf\r
257INF PcAtChipsetPkg/8259InterruptControllerDxe/8259.inf\r
258INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf\r
259INF UefiCpuPkg/CpuDxe/CpuDxe.inf\r
260INF PcAtChipsetPkg/8254TimerDxe/8254Timer.inf\r
261INF PcAtChipsetPkg/PciHostBridgeDxe/PciHostBridgeDxe.inf\r
262INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf\r
263INF PcAtChipsetPkg/KbcResetDxe/Reset.inf\r
264INF MdeModulePkg/Universal/Metronome/Metronome.inf\r
265INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf\r
266\r
267INF OvmfPkg/BlockMmioToBlockIoDxe/BlockIo.inf\r
268INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf\r
269INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf\r
270INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf\r
271INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf\r
272INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf\r
273INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf\r
274\r
275!if $(SECURE_BOOT_ENABLE) == TRUE\r
276 INF SecurityPkg/VariableAuthenticated/RuntimeDxe/VariableRuntimeDxe.inf\r
277 INF OvmfPkg/SecureBootConfigDxe/SecureBootConfigDxe.inf\r
278!else\r
279 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf\r
280!endif\r
281\r
282INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf\r
283INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf\r
284INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf\r
285INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf\r
286INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf\r
287INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf\r
288INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf\r
289INF IntelFrameworkModulePkg/Universal/BdsDxe/BdsDxe.inf\r
290INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
291INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf\r
292INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf\r
293INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf\r
294INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf\r
295INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf\r
296INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf\r
297INF IntelFrameworkModulePkg/Bus/Pci/IdeBusDxe/IdeBusDxe.inf\r
298INF PcAtChipsetPkg/Bus/Pci/IdeControllerDxe/IdeControllerDxe.inf\r
299INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf\r
300INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf\r
301INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf\r
302INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf\r
303\r
304INF PcAtChipsetPkg/IsaAcpiDxe/IsaAcpi.inf\r
305INF IntelFrameworkModulePkg/Bus/Isa/IsaBusDxe/IsaBusDxe.inf\r
306\r
307!ifndef $(SOURCE_DEBUG_ENABLE)\r
308INF IntelFrameworkModulePkg/Bus/Isa/IsaSerialDxe/IsaSerialDxe.inf\r
309!endif\r
310\r
311INF IntelFrameworkModulePkg/Bus/Isa/Ps2KeyboardDxe/Ps2keyboardDxe.inf\r
312INF IntelFrameworkModulePkg/Bus/Isa/IsaFloppyDxe/IsaFloppyDxe.inf\r
313\r
314INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf\r
315INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf\r
316\r
317INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf\r
318INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf\r
319INF RuleOverride=ACPITABLE OvmfPkg/AcpiTables/AcpiTables.inf\r
320\r
321INF RuleOverride = BINARY FatBinPkg/EnhancedFatDxe/Fat.inf\r
322\r
323!ifndef $(USE_OLD_SHELL)\r
324INF ShellPkg/Application/Shell/Shell.inf\r
325!else\r
326INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf\r
327!endif\r
328\r
329FILE FREEFORM = PCD(gEfiIntelFrameworkModulePkgTokenSpaceGuid.PcdLogoFile) {\r
330 SECTION RAW = MdeModulePkg/Logo/Logo.bmp\r
331}\r
332\r
333#\r
334# Network modules\r
335#\r
336!if $(E1000_ENABLE)\r
337 FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {\r
338 SECTION PE32 = Intel3.5/EFIX64/E3507X2.EFI\r
339 }\r
340!endif\r
341 INF MdeModulePkg/Universal/Network/SnpDxe/SnpDxe.inf\r
342 INF MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf\r
343 INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf\r
344 INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf\r
345 INF MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf\r
346 INF MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf\r
347 INF MdeModulePkg/Universal/Network/Ip4ConfigDxe/Ip4ConfigDxe.inf\r
348 INF MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf\r
349 INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf\r
350 INF MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf\r
351 INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf\r
352 INF MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf\r
353 INF MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf\r
354 INF OvmfPkg/VirtioNetDxe/VirtioNet.inf\r
355\r
356#\r
357# Usb Support\r
358#\r
359INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf\r
360INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf\r
361INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf\r
362INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf\r
363INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf\r
364\r
365!ifdef $(CSM_ENABLE)\r
366INF IntelFrameworkModulePkg/Csm/BiosThunk/VideoDxe/VideoDxe.inf\r
367INF IntelFrameworkModulePkg/Csm/LegacyBiosDxe/LegacyBiosDxe.inf\r
368INF RuleOverride=CSM OvmfPkg/Csm/Csm16/Csm16.inf\r
369!endif\r
370\r
371INF OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf\r
372\r
373################################################################################\r
374\r
375[FV.FVMAIN_COMPACT]\r
376FvAlignment = 16\r
377ERASE_POLARITY = 1\r
378MEMORY_MAPPED = TRUE\r
379STICKY_WRITE = TRUE\r
380LOCK_CAP = TRUE\r
381LOCK_STATUS = TRUE\r
382WRITE_DISABLED_CAP = TRUE\r
383WRITE_ENABLED_CAP = TRUE\r
384WRITE_STATUS = TRUE\r
385WRITE_LOCK_CAP = TRUE\r
386WRITE_LOCK_STATUS = TRUE\r
387READ_DISABLED_CAP = TRUE\r
388READ_ENABLED_CAP = TRUE\r
389READ_STATUS = TRUE\r
390READ_LOCK_CAP = TRUE\r
391READ_LOCK_STATUS = TRUE\r
392\r
393FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {\r
394 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {\r
395 #\r
396 # These firmware volumes will have files placed in them uncompressed,\r
397 # and then both firmware volumes will be compressed in a single\r
398 # compression operation in order to achieve better overall compression.\r
399 #\r
400 SECTION FV_IMAGE = PEIFV\r
401 SECTION FV_IMAGE = DXEFV\r
402 }\r
403 }\r
404\r
405################################################################################\r
406\r
407[Rule.Common.SEC]\r
408 FILE SEC = $(NAMED_GUID) {\r
409 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
410 UI STRING ="$(MODULE_NAME)" Optional\r
411 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
412 }\r
413\r
414[Rule.Common.PEI_CORE]\r
415 FILE PEI_CORE = $(NAMED_GUID) {\r
416 PE32 PE32 Align=32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
417 UI STRING ="$(MODULE_NAME)" Optional\r
418 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
419 }\r
420\r
421[Rule.Common.PEIM]\r
422 FILE PEIM = $(NAMED_GUID) {\r
423 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
424 PE32 PE32 Align=32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
425 UI STRING="$(MODULE_NAME)" Optional\r
426 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
427 }\r
428\r
429[Rule.Common.DXE_CORE]\r
430 FILE DXE_CORE = $(NAMED_GUID) {\r
431 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
432 UI STRING="$(MODULE_NAME)" Optional\r
433 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
434 }\r
435\r
436[Rule.Common.DXE_DRIVER]\r
437 FILE DRIVER = $(NAMED_GUID) {\r
438 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
439 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
440 UI STRING="$(MODULE_NAME)" Optional\r
441 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
442 }\r
443\r
444[Rule.Common.DXE_RUNTIME_DRIVER]\r
445 FILE DRIVER = $(NAMED_GUID) {\r
446 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
447 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
448 UI STRING="$(MODULE_NAME)" Optional\r
449 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
450 }\r
451\r
452[Rule.Common.UEFI_DRIVER]\r
453 FILE DRIVER = $(NAMED_GUID) {\r
454 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
455 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
456 UI STRING="$(MODULE_NAME)" Optional\r
457 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
458 }\r
459\r
460[Rule.Common.UEFI_DRIVER.BINARY]\r
461 FILE DRIVER = $(NAMED_GUID) {\r
462 DXE_DEPEX DXE_DEPEX Optional |.depex\r
463 PE32 PE32 |.efi\r
464 UI STRING="$(MODULE_NAME)" Optional\r
465 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
466 }\r
467\r
468[Rule.Common.UEFI_APPLICATION]\r
469 FILE APPLICATION = $(NAMED_GUID) {\r
470 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
471 UI STRING="$(MODULE_NAME)" Optional\r
472 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
473 }\r
474\r
475[Rule.Common.UEFI_APPLICATION.BINARY]\r
476 FILE APPLICATION = $(NAMED_GUID) {\r
477 PE32 PE32 |.efi\r
478 UI STRING="$(MODULE_NAME)" Optional\r
479 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
480 }\r
481\r
482[Rule.Common.USER_DEFINED.ACPITABLE]\r
483 FILE FREEFORM = $(NAMED_GUID) {\r
484 RAW ACPI |.acpi\r
485 RAW ASL |.aml\r
486 }\r
487\r
488[Rule.Common.USER_DEFINED.CSM]\r
489 FILE FREEFORM = $(NAMED_GUID) {\r
490 RAW BIN |.bin\r
491 }\r
492\r
493[Rule.Common.SEC.RESET_VECTOR]\r
494 FILE RAW = $(NAMED_GUID) {\r
495 RAW RAW |.raw\r
496 }\r