]> git.proxmox.com Git - mirror_edk2.git/blame_incremental - OvmfPkg/OvmfPkgX64.fdf
OvmfPkg: Make an Ia32/X64 hybrid build work with SEV
[mirror_edk2.git] / OvmfPkg / OvmfPkgX64.fdf
... / ...
CommitLineData
1## @file\r
2# Open Virtual Machine Firmware: FDF\r
3#\r
4# Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>\r
5# (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>\r
6#\r
7# SPDX-License-Identifier: BSD-2-Clause-Patent\r
8#\r
9##\r
10\r
11################################################################################\r
12\r
13[Defines]\r
14!include OvmfPkgDefines.fdf.inc\r
15\r
16#\r
17# Build the variable store and the firmware code as one unified flash device\r
18# image.\r
19#\r
20[FD.OVMF]\r
21BaseAddress = $(FW_BASE_ADDRESS)\r
22Size = $(FW_SIZE)\r
23ErasePolarity = 1\r
24BlockSize = $(BLOCK_SIZE)\r
25NumBlocks = $(FW_BLOCKS)\r
26\r
27!include VarStore.fdf.inc\r
28\r
29$(VARS_SIZE)|$(FVMAIN_SIZE)\r
30FV = FVMAIN_COMPACT\r
31\r
32$(SECFV_OFFSET)|$(SECFV_SIZE)\r
33FV = SECFV\r
34\r
35#\r
36# Build the variable store and the firmware code as separate flash device\r
37# images.\r
38#\r
39[FD.OVMF_VARS]\r
40BaseAddress = $(FW_BASE_ADDRESS)\r
41Size = $(VARS_SIZE)\r
42ErasePolarity = 1\r
43BlockSize = $(BLOCK_SIZE)\r
44NumBlocks = $(VARS_BLOCKS)\r
45\r
46!include VarStore.fdf.inc\r
47\r
48[FD.OVMF_CODE]\r
49BaseAddress = $(CODE_BASE_ADDRESS)\r
50Size = $(CODE_SIZE)\r
51ErasePolarity = 1\r
52BlockSize = $(BLOCK_SIZE)\r
53NumBlocks = $(CODE_BLOCKS)\r
54\r
550x00000000|$(FVMAIN_SIZE)\r
56FV = FVMAIN_COMPACT\r
57\r
58$(FVMAIN_SIZE)|$(SECFV_SIZE)\r
59FV = SECFV\r
60\r
61################################################################################\r
62\r
63[FD.MEMFD]\r
64BaseAddress = $(MEMFD_BASE_ADDRESS)\r
65Size = 0xD00000\r
66ErasePolarity = 1\r
67BlockSize = 0x10000\r
68NumBlocks = 0xD0\r
69\r
700x000000|0x006000\r
71gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize\r
72\r
730x006000|0x001000\r
74gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageSize\r
75\r
760x007000|0x001000\r
77gEfiMdePkgTokenSpaceGuid.PcdGuidedExtractHandlerTableAddress|gUefiOvmfPkgTokenSpaceGuid.PcdGuidedExtractHandlerTableSize\r
78\r
790x008000|0x001000\r
80gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableSize\r
81\r
820x009000|0x002000\r
83gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbSize\r
84\r
850x00B000|0x001000\r
86gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize\r
87\r
880x00C000|0x001000\r
89gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupSize\r
90\r
910x00D000|0x001000\r
92gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsSize\r
93\r
940x00E000|0x001000\r
95gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidSize\r
96\r
970x010000|0x010000\r
98gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize\r
99\r
1000x020000|0x0E0000\r
101gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvSize\r
102FV = PEIFV\r
103\r
1040x100000|0xC00000\r
105gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvSize\r
106FV = DXEFV\r
107\r
108##########################################################################################\r
109# Set the SEV-ES specific work area PCDs (used for all forms of SEV since the\r
110# the SEV STATUS MSR is now saved in the work area)\r
111#\r
112SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaBase = $(MEMFD_BASE_ADDRESS) + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader\r
113SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaSize = gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize - gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader\r
114##########################################################################################\r
115\r
116################################################################################\r
117\r
118[FV.SECFV]\r
119FvNameGuid = 763BED0D-DE9F-48F5-81F1-3E90E1B1A015\r
120BlockSize = 0x1000\r
121FvAlignment = 16\r
122ERASE_POLARITY = 1\r
123MEMORY_MAPPED = TRUE\r
124STICKY_WRITE = TRUE\r
125LOCK_CAP = TRUE\r
126LOCK_STATUS = TRUE\r
127WRITE_DISABLED_CAP = TRUE\r
128WRITE_ENABLED_CAP = TRUE\r
129WRITE_STATUS = TRUE\r
130WRITE_LOCK_CAP = TRUE\r
131WRITE_LOCK_STATUS = TRUE\r
132READ_DISABLED_CAP = TRUE\r
133READ_ENABLED_CAP = TRUE\r
134READ_STATUS = TRUE\r
135READ_LOCK_CAP = TRUE\r
136READ_LOCK_STATUS = TRUE\r
137\r
138#\r
139# SEC Phase modules\r
140#\r
141# The code in this FV handles the initial firmware startup, and\r
142# decompresses the PEI and DXE FVs which handles the rest of the boot sequence.\r
143#\r
144INF OvmfPkg/Sec/SecMain.inf\r
145\r
146INF RuleOverride=RESET_VECTOR OvmfPkg/ResetVector/ResetVector.inf\r
147\r
148################################################################################\r
149[FV.PEIFV]\r
150FvNameGuid = 6938079B-B503-4E3D-9D24-B28337A25806\r
151BlockSize = 0x10000\r
152FvAlignment = 16\r
153ERASE_POLARITY = 1\r
154MEMORY_MAPPED = TRUE\r
155STICKY_WRITE = TRUE\r
156LOCK_CAP = TRUE\r
157LOCK_STATUS = TRUE\r
158WRITE_DISABLED_CAP = TRUE\r
159WRITE_ENABLED_CAP = TRUE\r
160WRITE_STATUS = TRUE\r
161WRITE_LOCK_CAP = TRUE\r
162WRITE_LOCK_STATUS = TRUE\r
163READ_DISABLED_CAP = TRUE\r
164READ_ENABLED_CAP = TRUE\r
165READ_STATUS = TRUE\r
166READ_LOCK_CAP = TRUE\r
167READ_LOCK_STATUS = TRUE\r
168\r
169APRIORI PEI {\r
170 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
171}\r
172\r
173#\r
174# PEI Phase modules\r
175#\r
176INF MdeModulePkg/Core/Pei/PeiMain.inf\r
177INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
178INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf\r
179INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf\r
180INF OvmfPkg/PlatformPei/PlatformPei.inf\r
181INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf\r
182INF UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf\r
183!if $(SMM_REQUIRE) == TRUE\r
184INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf\r
185INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf\r
186INF OvmfPkg/SmmAccess/SmmAccessPei.inf\r
187!endif\r
188INF UefiCpuPkg/CpuMpPei/CpuMpPei.inf\r
189INF FILE_GUID = $(UP_CPU_PEI_GUID) UefiCpuPkg/CpuMpPei/CpuMpPei.inf\r
190\r
191!include OvmfPkg/OvmfTpmPei.fdf.inc\r
192\r
193################################################################################\r
194\r
195[FV.DXEFV]\r
196FvForceRebase = FALSE\r
197FvNameGuid = 7CB8BDC9-F8EB-4F34-AAEA-3EE4AF6516A1\r
198BlockSize = 0x10000\r
199FvAlignment = 16\r
200ERASE_POLARITY = 1\r
201MEMORY_MAPPED = TRUE\r
202STICKY_WRITE = TRUE\r
203LOCK_CAP = TRUE\r
204LOCK_STATUS = TRUE\r
205WRITE_DISABLED_CAP = TRUE\r
206WRITE_ENABLED_CAP = TRUE\r
207WRITE_STATUS = TRUE\r
208WRITE_LOCK_CAP = TRUE\r
209WRITE_LOCK_STATUS = TRUE\r
210READ_DISABLED_CAP = TRUE\r
211READ_ENABLED_CAP = TRUE\r
212READ_STATUS = TRUE\r
213READ_LOCK_CAP = TRUE\r
214READ_LOCK_STATUS = TRUE\r
215\r
216APRIORI DXE {\r
217 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
218 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
219 # AmdSevDxe must be loaded before TdxDxe. Because in SEV guest AmdSevDxe\r
220 # driver performs a MemEncryptSevClearMmioPageEncMask() call against the\r
221 # PcdPciExpressBaseAddress range to mark it shared/unencrypted.\r
222 # Otherwise #VC handler terminates the guest for trying to do MMIO to an\r
223 # encrypted region (Since the range has not been marked shared/unencrypted).\r
224 INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf\r
225 INF OvmfPkg/TdxDxe/TdxDxe.inf\r
226!if $(SMM_REQUIRE) == FALSE\r
227 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf\r
228!endif\r
229}\r
230\r
231#\r
232# DXE Phase modules\r
233#\r
234INF MdeModulePkg/Core/Dxe/DxeMain.inf\r
235\r
236INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf\r
237INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf\r
238INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
239\r
240INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf\r
241INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf\r
242INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf\r
243INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf\r
244\r
245INF UefiCpuPkg/CpuDxe/CpuDxe.inf\r
246INF FILE_GUID = $(UP_CPU_DXE_GUID) UefiCpuPkg/CpuDxe/CpuDxe.inf\r
247\r
248!ifdef $(CSM_ENABLE)\r
249 INF OvmfPkg/8259InterruptControllerDxe/8259.inf\r
250 INF OvmfPkg/8254TimerDxe/8254Timer.inf\r
251!else\r
252 INF OvmfPkg/LocalApicTimerDxe/LocalApicTimerDxe.inf\r
253!endif\r
254INF OvmfPkg/IncompatiblePciDeviceSupportDxe/IncompatiblePciDeviceSupport.inf\r
255INF OvmfPkg/PciHotPlugInitDxe/PciHotPlugInit.inf\r
256INF MdeModulePkg/Bus/Pci/PciHostBridgeDxe/PciHostBridgeDxe.inf\r
257INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf\r
258INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf\r
259INF MdeModulePkg/Universal/Metronome/Metronome.inf\r
260INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf\r
261\r
262INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf\r
263INF OvmfPkg/Virtio10Dxe/Virtio10.inf\r
264INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf\r
265INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf\r
266INF OvmfPkg/VirtioRngDxe/VirtioRng.inf\r
267!if $(PVSCSI_ENABLE) == TRUE\r
268INF OvmfPkg/PvScsiDxe/PvScsiDxe.inf\r
269!endif\r
270!if $(MPT_SCSI_ENABLE) == TRUE\r
271INF OvmfPkg/MptScsiDxe/MptScsiDxe.inf\r
272!endif\r
273!if $(LSI_SCSI_ENABLE) == TRUE\r
274INF OvmfPkg/LsiScsiDxe/LsiScsiDxe.inf\r
275!endif\r
276\r
277!if $(SECURE_BOOT_ENABLE) == TRUE\r
278 INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf\r
279!endif\r
280\r
281INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf\r
282INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf\r
283INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf\r
284INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf\r
285INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf\r
286INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf\r
287INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf\r
288INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf\r
289INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf\r
290INF MdeModulePkg/Application/UiApp/UiApp.inf\r
291INF OvmfPkg/QemuKernelLoaderFsDxe/QemuKernelLoaderFsDxe.inf\r
292INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
293INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf\r
294INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf\r
295INF MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskDxe.inf\r
296INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf\r
297INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf\r
298INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf\r
299INF OvmfPkg/SataControllerDxe/SataControllerDxe.inf\r
300INF MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf\r
301INF MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf\r
302INF MdeModulePkg/Bus/Pci/NvmExpressDxe/NvmExpressDxe.inf\r
303INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf\r
304INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf\r
305INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf\r
306INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf\r
307\r
308INF OvmfPkg/SioBusDxe/SioBusDxe.inf\r
309!if $(SOURCE_DEBUG_ENABLE) == FALSE\r
310INF MdeModulePkg/Bus/Pci/PciSioSerialDxe/PciSioSerialDxe.inf\r
311!endif\r
312INF MdeModulePkg/Bus/Isa/Ps2KeyboardDxe/Ps2KeyboardDxe.inf\r
313\r
314INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf\r
315INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf\r
316\r
317INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf\r
318INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf\r
319INF MdeModulePkg/Universal/Acpi/S3SaveStateDxe/S3SaveStateDxe.inf\r
320INF MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe/BootScriptExecutorDxe.inf\r
321INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResourceTableDxe.inf\r
322\r
323INF FatPkg/EnhancedFatDxe/Fat.inf\r
324INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf\r
325INF OvmfPkg/VirtioFsDxe/VirtioFsDxe.inf\r
326\r
327!if $(TOOL_CHAIN_TAG) != "XCODE5"\r
328INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf\r
329INF ShellPkg/DynamicCommand/HttpDynamicCommand/HttpDynamicCommand.inf\r
330INF OvmfPkg/LinuxInitrdDynamicShellCommand/LinuxInitrdDynamicShellCommand.inf\r
331!endif\r
332INF ShellPkg/Application/Shell/Shell.inf\r
333\r
334INF MdeModulePkg/Logo/LogoDxe.inf\r
335\r
336INF OvmfPkg/TdxDxe/TdxDxe.inf\r
337\r
338#\r
339# Network modules\r
340#\r
341!if $(E1000_ENABLE)\r
342 FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {\r
343 SECTION PE32 = Intel3.5/EFIX64/E3522X2.EFI\r
344 }\r
345!endif\r
346!include NetworkPkg/Network.fdf.inc\r
347 INF OvmfPkg/VirtioNetDxe/VirtioNet.inf\r
348\r
349#\r
350# Usb Support\r
351#\r
352INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf\r
353INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf\r
354INF MdeModulePkg/Bus/Pci/XhciDxe/XhciDxe.inf\r
355INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf\r
356INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf\r
357INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf\r
358\r
359!ifdef $(CSM_ENABLE)\r
360INF OvmfPkg/Csm/BiosThunk/VideoDxe/VideoDxe.inf\r
361INF OvmfPkg/Csm/LegacyBiosDxe/LegacyBiosDxe.inf\r
362INF RuleOverride=CSM OvmfPkg/Csm/Csm16/Csm16.inf\r
363!else\r
364INF OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf\r
365!endif\r
366\r
367INF OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf\r
368INF OvmfPkg/VirtioGpuDxe/VirtioGpu.inf\r
369INF OvmfPkg/PlatformDxe/Platform.inf\r
370INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf\r
371INF OvmfPkg/IoMmuDxe/IoMmuDxe.inf\r
372\r
373!if $(SMM_REQUIRE) == TRUE\r
374INF OvmfPkg/SmmAccess/SmmAccess2Dxe.inf\r
375INF OvmfPkg/SmmControl2Dxe/SmmControl2Dxe.inf\r
376INF OvmfPkg/CpuS3DataDxe/CpuS3DataDxe.inf\r
377INF MdeModulePkg/Core/PiSmmCore/PiSmmIpl.inf\r
378INF MdeModulePkg/Core/PiSmmCore/PiSmmCore.inf\r
379INF OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf\r
380INF UefiCpuPkg/CpuIo2Smm/CpuIo2Smm.inf\r
381INF MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBox.inf\r
382INF UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf\r
383\r
384#\r
385# Variable driver stack (SMM)\r
386#\r
387INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesSmm.inf\r
388INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteSmm.inf\r
389INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmm.inf\r
390INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmmRuntimeDxe.inf\r
391\r
392!else\r
393\r
394#\r
395# Variable driver stack (non-SMM)\r
396#\r
397INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf\r
398INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf\r
399INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf\r
400INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf\r
401!endif\r
402\r
403#\r
404# TPM support\r
405#\r
406!include OvmfPkg/OvmfTpmDxe.fdf.inc\r
407\r
408################################################################################\r
409\r
410[FV.FVMAIN_COMPACT]\r
411FvNameGuid = 48DB5E17-707C-472D-91CD-1613E7EF51B0\r
412FvAlignment = 16\r
413ERASE_POLARITY = 1\r
414MEMORY_MAPPED = TRUE\r
415STICKY_WRITE = TRUE\r
416LOCK_CAP = TRUE\r
417LOCK_STATUS = TRUE\r
418WRITE_DISABLED_CAP = TRUE\r
419WRITE_ENABLED_CAP = TRUE\r
420WRITE_STATUS = TRUE\r
421WRITE_LOCK_CAP = TRUE\r
422WRITE_LOCK_STATUS = TRUE\r
423READ_DISABLED_CAP = TRUE\r
424READ_ENABLED_CAP = TRUE\r
425READ_STATUS = TRUE\r
426READ_LOCK_CAP = TRUE\r
427READ_LOCK_STATUS = TRUE\r
428\r
429FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {\r
430 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {\r
431 #\r
432 # These firmware volumes will have files placed in them uncompressed,\r
433 # and then both firmware volumes will be compressed in a single\r
434 # compression operation in order to achieve better overall compression.\r
435 #\r
436 SECTION FV_IMAGE = PEIFV\r
437 SECTION FV_IMAGE = DXEFV\r
438 }\r
439 }\r
440\r
441!include FvmainCompactScratchEnd.fdf.inc\r
442\r
443################################################################################\r
444\r
445[Rule.Common.SEC]\r
446 FILE SEC = $(NAMED_GUID) {\r
447 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
448 UI STRING ="$(MODULE_NAME)" Optional\r
449 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
450 }\r
451\r
452[Rule.Common.PEI_CORE]\r
453 FILE PEI_CORE = $(NAMED_GUID) {\r
454 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi\r
455 UI STRING ="$(MODULE_NAME)" Optional\r
456 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
457 }\r
458\r
459[Rule.Common.PEIM]\r
460 FILE PEIM = $(NAMED_GUID) {\r
461 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
462 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi\r
463 UI STRING="$(MODULE_NAME)" Optional\r
464 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
465 }\r
466\r
467[Rule.Common.DXE_CORE]\r
468 FILE DXE_CORE = $(NAMED_GUID) {\r
469 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
470 UI STRING="$(MODULE_NAME)" Optional\r
471 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
472 }\r
473\r
474[Rule.Common.DXE_DRIVER]\r
475 FILE DRIVER = $(NAMED_GUID) {\r
476 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
477 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
478 UI STRING="$(MODULE_NAME)" Optional\r
479 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
480 RAW ACPI Optional |.acpi\r
481 RAW ASL Optional |.aml\r
482 }\r
483\r
484[Rule.Common.DXE_RUNTIME_DRIVER]\r
485 FILE DRIVER = $(NAMED_GUID) {\r
486 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
487 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
488 UI STRING="$(MODULE_NAME)" Optional\r
489 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
490 }\r
491\r
492[Rule.Common.UEFI_DRIVER]\r
493 FILE DRIVER = $(NAMED_GUID) {\r
494 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
495 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
496 UI STRING="$(MODULE_NAME)" Optional\r
497 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
498 }\r
499\r
500[Rule.Common.UEFI_DRIVER.BINARY]\r
501 FILE DRIVER = $(NAMED_GUID) {\r
502 DXE_DEPEX DXE_DEPEX Optional |.depex\r
503 PE32 PE32 |.efi\r
504 UI STRING="$(MODULE_NAME)" Optional\r
505 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
506 }\r
507\r
508[Rule.Common.UEFI_APPLICATION]\r
509 FILE APPLICATION = $(NAMED_GUID) {\r
510 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
511 UI STRING="$(MODULE_NAME)" Optional\r
512 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
513 }\r
514\r
515[Rule.Common.UEFI_APPLICATION.BINARY]\r
516 FILE APPLICATION = $(NAMED_GUID) {\r
517 PE32 PE32 |.efi\r
518 UI STRING="$(MODULE_NAME)" Optional\r
519 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
520 }\r
521\r
522[Rule.Common.USER_DEFINED.CSM]\r
523 FILE FREEFORM = $(NAMED_GUID) {\r
524 RAW BIN |.bin\r
525 }\r
526\r
527[Rule.Common.SEC.RESET_VECTOR]\r
528 FILE RAW = $(NAMED_GUID) {\r
529 RAW BIN Align = 16 |.bin\r
530 }\r
531\r
532[Rule.Common.SMM_CORE]\r
533 FILE SMM_CORE = $(NAMED_GUID) {\r
534 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
535 UI STRING="$(MODULE_NAME)" Optional\r
536 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
537 }\r
538\r
539[Rule.Common.DXE_SMM_DRIVER]\r
540 FILE SMM = $(NAMED_GUID) {\r
541 SMM_DEPEX SMM_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
542 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
543 UI STRING="$(MODULE_NAME)" Optional\r
544 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
545 }\r