]> git.proxmox.com Git - mirror_edk2.git/blame_incremental - OvmfPkg/OvmfPkgX64.fdf
OvmfPkg: PlatformPei: protect SEC's GUIDed section handler table thru S3
[mirror_edk2.git] / OvmfPkg / OvmfPkgX64.fdf
... / ...
CommitLineData
1## @file\r
2# Open Virtual Machine Firmware: FDF\r
3#\r
4# Copyright (c) 2006 - 2013, Intel Corporation. All rights reserved.<BR>\r
5#\r
6# This program and the accompanying materials\r
7# are licensed and made available under the terms and conditions of the BSD License\r
8# which accompanies this distribution. The full text of the license may be found at\r
9# http://opensource.org/licenses/bsd-license.php\r
10#\r
11# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
12# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
13#\r
14##\r
15\r
16################################################################################\r
17\r
18#\r
19# Default flash size for DEBUG build is 2MB. For RELEASE it is 1MB.\r
20#\r
21# Defining FD_SIZE_1MB or FD_SIZE_2MB on the build command line can\r
22# override this.\r
23#\r
24[Defines]\r
25!if $(TARGET) == RELEASE\r
26!ifndef $(FD_SIZE_2MB)\r
27DEFINE FD_SIZE_1MB=\r
28!endif\r
29!endif\r
30\r
31!ifdef $(FD_SIZE_1MB)\r
32[FD.OVMF]\r
33BaseAddress = 0xFFF00000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFdBaseAddress\r
34Size = 0x00100000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareFdSize\r
35ErasePolarity = 1\r
36BlockSize = 0x1000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareBlockSize\r
37NumBlocks = 0x100\r
38!else\r
39[FD.OVMF]\r
40BaseAddress = 0xFFE00000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFdBaseAddress\r
41Size = 0x00200000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareFdSize\r
42ErasePolarity = 1\r
43BlockSize = 0x1000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareBlockSize\r
44NumBlocks = 0x200\r
45!endif\r
46\r
470x00000000|0x0000e000\r
48gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize\r
49#NV_VARIABLE_STORE\r
50DATA = {\r
51 ## This is the EFI_FIRMWARE_VOLUME_HEADER\r
52 # ZeroVector []\r
53 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
54 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
55 # FileSystemGuid: gEfiSystemNvDataFvGuid =\r
56 # { 0xFFF12B8D, 0x7696, 0x4C8B,\r
57 # { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }}\r
58 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C,\r
59 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50,\r
60 # FvLength: 0x20000\r
61 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00,\r
62 # Signature "_FVH" # Attributes\r
63 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00,\r
64 # HeaderLength # CheckSum # ExtHeaderOffset #Reserved #Revision\r
65 0x48, 0x00, 0x19, 0xF9, 0x00, 0x00, 0x00, 0x02,\r
66 # Blockmap[0]: 0x20 Blocks * 0x1000 Bytes / Block\r
67 0x20, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00,\r
68 # Blockmap[1]: End\r
69 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
70 ## This is the VARIABLE_STORE_HEADER\r
71!if $(SECURE_BOOT_ENABLE) == TRUE\r
72 # Signature: gEfiAuthenticatedVariableGuid =\r
73 # { 0xaaf32c78, 0x947b, 0x439a,\r
74 # { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }}\r
75 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43,\r
76 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92,\r
77!else\r
78 # Signature: gEfiVariableGuid =\r
79 # { 0xddcf3616, 0x3275, 0x4164,\r
80 # { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }}\r
81 0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41,\r
82 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d,\r
83!endif\r
84 # Size: 0xe000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) -\r
85 # 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0xdfb8\r
86 # This can speed up the Variable Dispatch a bit.\r
87 0xB8, 0xDF, 0x00, 0x00,\r
88 # FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32\r
89 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r
90}\r
91\r
920x0000e000|0x00001000\r
93#NV_EVENT_LOG\r
94gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageEventLogBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageEventLogSize\r
95\r
960x0000f000|0x00001000\r
97gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize\r
98#NV_FTW_WORKING\r
99DATA = {\r
100 # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =\r
101 # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}\r
102 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,\r
103 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95,\r
104 # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved\r
105 0x2c, 0xaf, 0x2c, 0x64, 0xFE, 0xFF, 0xFF, 0xFF,\r
106 # WriteQueueSize: UINT64\r
107 0xE0, 0x0F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r
108}\r
109\r
1100x00010000|0x00010000\r
111#NV_FTW_SPARE\r
112gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize\r
113\r
114!ifdef $(FD_SIZE_1MB)\r
1150x00020000|0x000CC000\r
116FV = FVMAIN_COMPACT\r
117\r
1180x000EC000|0x14000\r
119FV = SECFV\r
120\r
121!else\r
1220x00020000|0x001AC000\r
123FV = FVMAIN_COMPACT\r
124\r
1250x001CC000|0x34000\r
126FV = SECFV\r
127!endif\r
128\r
129################################################################################\r
130\r
131[FD.MEMFD]\r
132BaseAddress = 0x800000\r
133Size = 0x900000\r
134ErasePolarity = 1\r
135BlockSize = 0x10000\r
136NumBlocks = 0x90\r
137\r
1380x000000|0x006000\r
139gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize\r
140\r
1410x006000|0x001000\r
142gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageSize\r
143\r
1440x007000|0x001000\r
145gEfiMdePkgTokenSpaceGuid.PcdGuidedExtractHandlerTableAddress|gUefiOvmfPkgTokenSpaceGuid.PcdGuidedExtractHandlerTableSize\r
146\r
1470x010000|0x008000\r
148gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize\r
149\r
1500x018000|0x008000\r
151gUefiOvmfPkgTokenSpaceGuid.PcdS3AcpiReservedMemoryBase|gEfiIntelFrameworkModulePkgTokenSpaceGuid.PcdS3AcpiReservedMemorySize\r
152\r
1530x020000|0x0E0000\r
154gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvSize\r
155FV = PEIFV\r
156\r
1570x100000|0x800000\r
158gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvSize\r
159FV = DXEFV\r
160\r
161################################################################################\r
162\r
163[FV.SECFV]\r
164BlockSize = 0x1000\r
165FvAlignment = 16\r
166ERASE_POLARITY = 1\r
167MEMORY_MAPPED = TRUE\r
168STICKY_WRITE = TRUE\r
169LOCK_CAP = TRUE\r
170LOCK_STATUS = TRUE\r
171WRITE_DISABLED_CAP = TRUE\r
172WRITE_ENABLED_CAP = TRUE\r
173WRITE_STATUS = TRUE\r
174WRITE_LOCK_CAP = TRUE\r
175WRITE_LOCK_STATUS = TRUE\r
176READ_DISABLED_CAP = TRUE\r
177READ_ENABLED_CAP = TRUE\r
178READ_STATUS = TRUE\r
179READ_LOCK_CAP = TRUE\r
180READ_LOCK_STATUS = TRUE\r
181\r
182#\r
183# SEC Phase modules\r
184#\r
185# The code in this FV handles the initial firmware startup, and\r
186# decompresses the PEI and DXE FVs which handles the rest of the boot sequence.\r
187#\r
188INF OvmfPkg/Sec/SecMain.inf\r
189\r
190INF RuleOverride=RESET_VECTOR OvmfPkg/ResetVector/Bin/ResetVector.inf\r
191\r
192################################################################################\r
193[FV.PEIFV]\r
194BlockSize = 0x10000\r
195FvAlignment = 16\r
196ERASE_POLARITY = 1\r
197MEMORY_MAPPED = TRUE\r
198STICKY_WRITE = TRUE\r
199LOCK_CAP = TRUE\r
200LOCK_STATUS = TRUE\r
201WRITE_DISABLED_CAP = TRUE\r
202WRITE_ENABLED_CAP = TRUE\r
203WRITE_STATUS = TRUE\r
204WRITE_LOCK_CAP = TRUE\r
205WRITE_LOCK_STATUS = TRUE\r
206READ_DISABLED_CAP = TRUE\r
207READ_ENABLED_CAP = TRUE\r
208READ_STATUS = TRUE\r
209READ_LOCK_CAP = TRUE\r
210READ_LOCK_STATUS = TRUE\r
211\r
212APRIORI PEI {\r
213 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
214}\r
215\r
216#\r
217# PEI Phase modules\r
218#\r
219INF MdeModulePkg/Core/Pei/PeiMain.inf\r
220INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
221INF IntelFrameworkModulePkg/Universal/StatusCode/Pei/StatusCodePei.inf\r
222INF OvmfPkg/PlatformPei/PlatformPei.inf\r
223INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf\r
224INF UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf\r
225\r
226################################################################################\r
227\r
228[FV.DXEFV]\r
229BlockSize = 0x10000\r
230FvAlignment = 16\r
231ERASE_POLARITY = 1\r
232MEMORY_MAPPED = TRUE\r
233STICKY_WRITE = TRUE\r
234LOCK_CAP = TRUE\r
235LOCK_STATUS = TRUE\r
236WRITE_DISABLED_CAP = TRUE\r
237WRITE_ENABLED_CAP = TRUE\r
238WRITE_STATUS = TRUE\r
239WRITE_LOCK_CAP = TRUE\r
240WRITE_LOCK_STATUS = TRUE\r
241READ_DISABLED_CAP = TRUE\r
242READ_ENABLED_CAP = TRUE\r
243READ_STATUS = TRUE\r
244READ_LOCK_CAP = TRUE\r
245READ_LOCK_STATUS = TRUE\r
246\r
247APRIORI DXE {\r
248 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
249 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
250 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf\r
251}\r
252\r
253#\r
254# DXE Phase modules\r
255#\r
256INF MdeModulePkg/Core/Dxe/DxeMain.inf\r
257\r
258INF IntelFrameworkModulePkg/Universal/StatusCode/RuntimeDxe/StatusCodeRuntimeDxe.inf\r
259INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
260\r
261INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf\r
262INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf\r
263INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf\r
264INF PcAtChipsetPkg/8259InterruptControllerDxe/8259.inf\r
265INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf\r
266INF UefiCpuPkg/CpuDxe/CpuDxe.inf\r
267INF PcAtChipsetPkg/8254TimerDxe/8254Timer.inf\r
268INF PcAtChipsetPkg/PciHostBridgeDxe/PciHostBridgeDxe.inf\r
269INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf\r
270INF PcAtChipsetPkg/KbcResetDxe/Reset.inf\r
271INF MdeModulePkg/Universal/Metronome/Metronome.inf\r
272INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf\r
273\r
274INF OvmfPkg/BlockMmioToBlockIoDxe/BlockIo.inf\r
275INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf\r
276INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf\r
277INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf\r
278INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf\r
279INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf\r
280INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf\r
281\r
282!if $(SECURE_BOOT_ENABLE) == TRUE\r
283 INF SecurityPkg/VariableAuthenticated/RuntimeDxe/VariableRuntimeDxe.inf\r
284 INF OvmfPkg/SecureBootConfigDxe/SecureBootConfigDxe.inf\r
285!else\r
286 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf\r
287!endif\r
288\r
289INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf\r
290INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf\r
291INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf\r
292INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf\r
293INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf\r
294INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf\r
295INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf\r
296INF IntelFrameworkModulePkg/Universal/BdsDxe/BdsDxe.inf\r
297INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
298INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf\r
299INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf\r
300INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf\r
301INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf\r
302INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf\r
303INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf\r
304INF IntelFrameworkModulePkg/Bus/Pci/IdeBusDxe/IdeBusDxe.inf\r
305INF PcAtChipsetPkg/Bus/Pci/IdeControllerDxe/IdeControllerDxe.inf\r
306INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf\r
307INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf\r
308INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf\r
309INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf\r
310\r
311INF PcAtChipsetPkg/IsaAcpiDxe/IsaAcpi.inf\r
312INF IntelFrameworkModulePkg/Bus/Isa/IsaBusDxe/IsaBusDxe.inf\r
313\r
314!ifndef $(SOURCE_DEBUG_ENABLE)\r
315INF IntelFrameworkModulePkg/Bus/Isa/IsaSerialDxe/IsaSerialDxe.inf\r
316!endif\r
317\r
318INF IntelFrameworkModulePkg/Bus/Isa/Ps2KeyboardDxe/Ps2keyboardDxe.inf\r
319INF IntelFrameworkModulePkg/Bus/Isa/IsaFloppyDxe/IsaFloppyDxe.inf\r
320\r
321INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf\r
322INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf\r
323\r
324INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf\r
325INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf\r
326INF RuleOverride=ACPITABLE OvmfPkg/AcpiTables/AcpiTables.inf\r
327INF OvmfPkg/AcpiS3SaveDxe/AcpiS3SaveDxe.inf\r
328INF MdeModulePkg/Universal/Acpi/S3SaveStateDxe/S3SaveStateDxe.inf\r
329INF MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe/BootScriptExecutorDxe.inf\r
330\r
331INF RuleOverride = BINARY FatBinPkg/EnhancedFatDxe/Fat.inf\r
332\r
333!ifndef $(USE_OLD_SHELL)\r
334INF ShellPkg/Application/Shell/Shell.inf\r
335!else\r
336INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf\r
337!endif\r
338\r
339FILE FREEFORM = PCD(gEfiIntelFrameworkModulePkgTokenSpaceGuid.PcdLogoFile) {\r
340 SECTION RAW = MdeModulePkg/Logo/Logo.bmp\r
341}\r
342\r
343#\r
344# Network modules\r
345#\r
346!if $(E1000_ENABLE)\r
347 FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {\r
348 SECTION PE32 = Intel3.5/EFIX64/E3507X2.EFI\r
349 }\r
350!endif\r
351 INF MdeModulePkg/Universal/Network/SnpDxe/SnpDxe.inf\r
352 INF MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf\r
353 INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf\r
354 INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf\r
355 INF MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf\r
356 INF MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf\r
357 INF MdeModulePkg/Universal/Network/Ip4ConfigDxe/Ip4ConfigDxe.inf\r
358 INF MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf\r
359 INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf\r
360 INF MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf\r
361 INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf\r
362 INF MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf\r
363 INF MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf\r
364 INF OvmfPkg/VirtioNetDxe/VirtioNet.inf\r
365\r
366#\r
367# Usb Support\r
368#\r
369INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf\r
370INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf\r
371INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf\r
372INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf\r
373INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf\r
374\r
375!ifdef $(CSM_ENABLE)\r
376INF IntelFrameworkModulePkg/Csm/BiosThunk/VideoDxe/VideoDxe.inf\r
377INF IntelFrameworkModulePkg/Csm/LegacyBiosDxe/LegacyBiosDxe.inf\r
378INF RuleOverride=CSM OvmfPkg/Csm/Csm16/Csm16.inf\r
379!endif\r
380\r
381INF OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf\r
382INF OvmfPkg/PlatformDxe/Platform.inf\r
383\r
384################################################################################\r
385\r
386[FV.FVMAIN_COMPACT]\r
387FvAlignment = 16\r
388ERASE_POLARITY = 1\r
389MEMORY_MAPPED = TRUE\r
390STICKY_WRITE = TRUE\r
391LOCK_CAP = TRUE\r
392LOCK_STATUS = TRUE\r
393WRITE_DISABLED_CAP = TRUE\r
394WRITE_ENABLED_CAP = TRUE\r
395WRITE_STATUS = TRUE\r
396WRITE_LOCK_CAP = TRUE\r
397WRITE_LOCK_STATUS = TRUE\r
398READ_DISABLED_CAP = TRUE\r
399READ_ENABLED_CAP = TRUE\r
400READ_STATUS = TRUE\r
401READ_LOCK_CAP = TRUE\r
402READ_LOCK_STATUS = TRUE\r
403\r
404FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {\r
405 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {\r
406 #\r
407 # These firmware volumes will have files placed in them uncompressed,\r
408 # and then both firmware volumes will be compressed in a single\r
409 # compression operation in order to achieve better overall compression.\r
410 #\r
411 SECTION FV_IMAGE = PEIFV\r
412 SECTION FV_IMAGE = DXEFV\r
413 }\r
414 }\r
415\r
416################################################################################\r
417\r
418[Rule.Common.SEC]\r
419 FILE SEC = $(NAMED_GUID) {\r
420 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
421 UI STRING ="$(MODULE_NAME)" Optional\r
422 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
423 }\r
424\r
425[Rule.Common.PEI_CORE]\r
426 FILE PEI_CORE = $(NAMED_GUID) {\r
427 PE32 PE32 Align=32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
428 UI STRING ="$(MODULE_NAME)" Optional\r
429 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
430 }\r
431\r
432[Rule.Common.PEIM]\r
433 FILE PEIM = $(NAMED_GUID) {\r
434 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
435 PE32 PE32 Align=32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
436 UI STRING="$(MODULE_NAME)" Optional\r
437 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
438 }\r
439\r
440[Rule.Common.DXE_CORE]\r
441 FILE DXE_CORE = $(NAMED_GUID) {\r
442 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
443 UI STRING="$(MODULE_NAME)" Optional\r
444 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
445 }\r
446\r
447[Rule.Common.DXE_DRIVER]\r
448 FILE DRIVER = $(NAMED_GUID) {\r
449 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
450 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
451 UI STRING="$(MODULE_NAME)" Optional\r
452 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
453 }\r
454\r
455[Rule.Common.DXE_RUNTIME_DRIVER]\r
456 FILE DRIVER = $(NAMED_GUID) {\r
457 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
458 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
459 UI STRING="$(MODULE_NAME)" Optional\r
460 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
461 }\r
462\r
463[Rule.Common.UEFI_DRIVER]\r
464 FILE DRIVER = $(NAMED_GUID) {\r
465 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
466 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
467 UI STRING="$(MODULE_NAME)" Optional\r
468 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
469 }\r
470\r
471[Rule.Common.UEFI_DRIVER.BINARY]\r
472 FILE DRIVER = $(NAMED_GUID) {\r
473 DXE_DEPEX DXE_DEPEX Optional |.depex\r
474 PE32 PE32 |.efi\r
475 UI STRING="$(MODULE_NAME)" Optional\r
476 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
477 }\r
478\r
479[Rule.Common.UEFI_APPLICATION]\r
480 FILE APPLICATION = $(NAMED_GUID) {\r
481 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
482 UI STRING="$(MODULE_NAME)" Optional\r
483 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
484 }\r
485\r
486[Rule.Common.UEFI_APPLICATION.BINARY]\r
487 FILE APPLICATION = $(NAMED_GUID) {\r
488 PE32 PE32 |.efi\r
489 UI STRING="$(MODULE_NAME)" Optional\r
490 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
491 }\r
492\r
493[Rule.Common.USER_DEFINED.ACPITABLE]\r
494 FILE FREEFORM = $(NAMED_GUID) {\r
495 RAW ACPI |.acpi\r
496 RAW ASL |.aml\r
497 }\r
498\r
499[Rule.Common.USER_DEFINED.CSM]\r
500 FILE FREEFORM = $(NAMED_GUID) {\r
501 RAW BIN |.bin\r
502 }\r
503\r
504[Rule.Common.SEC.RESET_VECTOR]\r
505 FILE RAW = $(NAMED_GUID) {\r
506 RAW RAW |.raw\r
507 }\r