]> git.proxmox.com Git - mirror_edk2.git/blob - OvmfPkg/AmdSev/AmdSevX64.fdf
OvmfPkg/AmdSev: update the fdf to use new workarea PCD
[mirror_edk2.git] / OvmfPkg / AmdSev / AmdSevX64.fdf
1 ## @file
2 # Open Virtual Machine Firmware: FDF
3 #
4 # Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
5 # (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
6 #
7 # SPDX-License-Identifier: BSD-2-Clause-Patent
8 #
9 ##
10
11 ################################################################################
12
13 [Defines]
14 !include OvmfPkg/OvmfPkgDefines.fdf.inc
15
16 #
17 # Build the variable store and the firmware code as one unified flash device
18 # image.
19 #
20 [FD.OVMF]
21 BaseAddress = $(FW_BASE_ADDRESS)
22 Size = $(FW_SIZE)
23 ErasePolarity = 1
24 BlockSize = $(BLOCK_SIZE)
25 NumBlocks = $(FW_BLOCKS)
26
27 !include OvmfPkg/VarStore.fdf.inc
28
29 $(VARS_SIZE)|$(FVMAIN_SIZE)
30 FV = FVMAIN_COMPACT
31
32 $(SECFV_OFFSET)|$(SECFV_SIZE)
33 FV = SECFV
34
35 ################################################################################
36
37 [FD.MEMFD]
38 BaseAddress = $(MEMFD_BASE_ADDRESS)
39 Size = 0xD00000
40 ErasePolarity = 1
41 BlockSize = 0x10000
42 NumBlocks = 0xD0
43
44 0x000000|0x006000
45 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize
46
47 0x006000|0x001000
48 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageSize
49
50 0x007000|0x001000
51 gEfiMdePkgTokenSpaceGuid.PcdGuidedExtractHandlerTableAddress|gUefiOvmfPkgTokenSpaceGuid.PcdGuidedExtractHandlerTableSize
52
53 0x008000|0x001000
54 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableSize
55
56 0x009000|0x002000
57 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbSize
58
59 0x00B000|0x001000
60 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize
61
62 0x00C000|0x000C00
63 gUefiOvmfPkgTokenSpaceGuid.PcdSevLaunchSecretBase|gUefiOvmfPkgTokenSpaceGuid.PcdSevLaunchSecretSize
64
65 0x00CC00|0x000400
66 gUefiOvmfPkgTokenSpaceGuid.PcdQemuHashTableBase|gUefiOvmfPkgTokenSpaceGuid.PcdQemuHashTableSize
67
68 0x00D000|0x001000
69 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupSize
70
71 0x010000|0x010000
72 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize
73
74 0x020000|0x0E0000
75 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvSize
76 FV = PEIFV
77
78 0x100000|0xC00000
79 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvSize
80 FV = DXEFV
81
82 ##########################################################################################
83 # Set the SEV-ES specific work area PCDs
84 #
85 SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaBase = $(MEMFD_BASE_ADDRESS) + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader
86 SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaSize = gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize - gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader
87 ##########################################################################################
88
89 ################################################################################
90
91 [FV.SECFV]
92 FvNameGuid = 763BED0D-DE9F-48F5-81F1-3E90E1B1A015
93 BlockSize = 0x1000
94 FvAlignment = 16
95 ERASE_POLARITY = 1
96 MEMORY_MAPPED = TRUE
97 STICKY_WRITE = TRUE
98 LOCK_CAP = TRUE
99 LOCK_STATUS = TRUE
100 WRITE_DISABLED_CAP = TRUE
101 WRITE_ENABLED_CAP = TRUE
102 WRITE_STATUS = TRUE
103 WRITE_LOCK_CAP = TRUE
104 WRITE_LOCK_STATUS = TRUE
105 READ_DISABLED_CAP = TRUE
106 READ_ENABLED_CAP = TRUE
107 READ_STATUS = TRUE
108 READ_LOCK_CAP = TRUE
109 READ_LOCK_STATUS = TRUE
110
111 #
112 # SEC Phase modules
113 #
114 # The code in this FV handles the initial firmware startup, and
115 # decompresses the PEI and DXE FVs which handles the rest of the boot sequence.
116 #
117 INF OvmfPkg/Sec/SecMain.inf
118
119 INF RuleOverride=RESET_VECTOR OvmfPkg/ResetVector/ResetVector.inf
120
121 ################################################################################
122 [FV.PEIFV]
123 FvNameGuid = 6938079B-B503-4E3D-9D24-B28337A25806
124 BlockSize = 0x10000
125 FvAlignment = 16
126 ERASE_POLARITY = 1
127 MEMORY_MAPPED = TRUE
128 STICKY_WRITE = TRUE
129 LOCK_CAP = TRUE
130 LOCK_STATUS = TRUE
131 WRITE_DISABLED_CAP = TRUE
132 WRITE_ENABLED_CAP = TRUE
133 WRITE_STATUS = TRUE
134 WRITE_LOCK_CAP = TRUE
135 WRITE_LOCK_STATUS = TRUE
136 READ_DISABLED_CAP = TRUE
137 READ_ENABLED_CAP = TRUE
138 READ_STATUS = TRUE
139 READ_LOCK_CAP = TRUE
140 READ_LOCK_STATUS = TRUE
141
142 APRIORI PEI {
143 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
144 }
145
146 #
147 # PEI Phase modules
148 #
149 INF MdeModulePkg/Core/Pei/PeiMain.inf
150 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
151 INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf
152 INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf
153 INF OvmfPkg/PlatformPei/PlatformPei.inf
154 INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
155 INF UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf
156 INF UefiCpuPkg/CpuMpPei/CpuMpPei.inf
157 INF OvmfPkg/AmdSev/SecretPei/SecretPei.inf
158
159 !if $(TPM_ENABLE) == TRUE
160 INF OvmfPkg/Tcg/TpmMmioSevDecryptPei/TpmMmioSevDecryptPei.inf
161 INF OvmfPkg/Tcg/Tcg2Config/Tcg2ConfigPei.inf
162 INF SecurityPkg/Tcg/TcgPei/TcgPei.inf
163 INF SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.inf
164 INF SecurityPkg/Tcg/Tcg2PlatformPei/Tcg2PlatformPei.inf
165 !endif
166
167 ################################################################################
168
169 [FV.DXEFV]
170 FvForceRebase = FALSE
171 FvNameGuid = 7CB8BDC9-F8EB-4F34-AAEA-3EE4AF6516A1
172 BlockSize = 0x10000
173 FvAlignment = 16
174 ERASE_POLARITY = 1
175 MEMORY_MAPPED = TRUE
176 STICKY_WRITE = TRUE
177 LOCK_CAP = TRUE
178 LOCK_STATUS = TRUE
179 WRITE_DISABLED_CAP = TRUE
180 WRITE_ENABLED_CAP = TRUE
181 WRITE_STATUS = TRUE
182 WRITE_LOCK_CAP = TRUE
183 WRITE_LOCK_STATUS = TRUE
184 READ_DISABLED_CAP = TRUE
185 READ_ENABLED_CAP = TRUE
186 READ_STATUS = TRUE
187 READ_LOCK_CAP = TRUE
188 READ_LOCK_STATUS = TRUE
189
190 APRIORI DXE {
191 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
192 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
193 INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf
194 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
195 }
196
197 #
198 # DXE Phase modules
199 #
200 INF MdeModulePkg/Core/Dxe/DxeMain.inf
201
202 INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf
203 INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf
204 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
205
206 INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
207 INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
208 INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
209 INF OvmfPkg/8259InterruptControllerDxe/8259.inf
210 INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf
211 INF UefiCpuPkg/CpuDxe/CpuDxe.inf
212 INF OvmfPkg/8254TimerDxe/8254Timer.inf
213 INF OvmfPkg/IncompatiblePciDeviceSupportDxe/IncompatiblePciDeviceSupport.inf
214 INF OvmfPkg/PciHotPlugInitDxe/PciHotPlugInit.inf
215 INF MdeModulePkg/Bus/Pci/PciHostBridgeDxe/PciHostBridgeDxe.inf
216 INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf
217 INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf
218 INF MdeModulePkg/Universal/Metronome/Metronome.inf
219 INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf
220
221 INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf
222 INF OvmfPkg/Virtio10Dxe/Virtio10.inf
223 INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf
224 INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf
225 INF OvmfPkg/VirtioRngDxe/VirtioRng.inf
226 !if $(PVSCSI_ENABLE) == TRUE
227 INF OvmfPkg/PvScsiDxe/PvScsiDxe.inf
228 !endif
229 !if $(MPT_SCSI_ENABLE) == TRUE
230 INF OvmfPkg/MptScsiDxe/MptScsiDxe.inf
231 !endif
232 !if $(LSI_SCSI_ENABLE) == TRUE
233 INF OvmfPkg/LsiScsiDxe/LsiScsiDxe.inf
234 !endif
235
236 INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
237 INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
238 INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
239 INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
240 INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
241 INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
242 INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
243 INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
244 INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
245 INF MdeModulePkg/Application/UiApp/UiApp.inf
246 INF OvmfPkg/QemuKernelLoaderFsDxe/QemuKernelLoaderFsDxe.inf
247 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
248 INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf
249 INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
250 INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
251 INF MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskDxe.inf
252 INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
253 INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
254 INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
255 INF OvmfPkg/SataControllerDxe/SataControllerDxe.inf
256 INF MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf
257 INF MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf
258 INF MdeModulePkg/Bus/Pci/NvmExpressDxe/NvmExpressDxe.inf
259 INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
260 INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
261 INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
262 INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
263
264 INF OvmfPkg/SioBusDxe/SioBusDxe.inf
265 !if $(SOURCE_DEBUG_ENABLE) == FALSE
266 INF MdeModulePkg/Bus/Pci/PciSioSerialDxe/PciSioSerialDxe.inf
267 !endif
268 INF MdeModulePkg/Bus/Isa/Ps2KeyboardDxe/Ps2KeyboardDxe.inf
269
270 INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf
271 INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf
272
273 INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf
274 INF OvmfPkg/AcpiPlatformDxe/QemuFwCfgAcpiPlatformDxe.inf
275 INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResourceTableDxe.inf
276
277 INF FatPkg/EnhancedFatDxe/Fat.inf
278 INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
279
280 !if $(TOOL_CHAIN_TAG) != "XCODE5" && $(BUILD_SHELL) == TRUE
281 INF OvmfPkg/LinuxInitrdDynamicShellCommand/LinuxInitrdDynamicShellCommand.inf
282 !endif
283 INF OvmfPkg/AmdSev/SecretDxe/SecretDxe.inf
284 INF OvmfPkg/AmdSev/Grub/Grub.inf
285 !if $(BUILD_SHELL) == TRUE
286 INF ShellPkg/Application/Shell/Shell.inf
287 !endif
288
289 INF MdeModulePkg/Logo/LogoDxe.inf
290
291 #
292 # Usb Support
293 #
294 INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf
295 INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf
296 INF MdeModulePkg/Bus/Pci/XhciDxe/XhciDxe.inf
297 INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf
298 INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf
299 INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf
300
301 INF OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
302
303 INF OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
304 INF OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
305 INF OvmfPkg/PlatformDxe/Platform.inf
306 INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf
307 INF OvmfPkg/IoMmuDxe/IoMmuDxe.inf
308
309
310 #
311 # Variable driver stack (non-SMM)
312 #
313 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
314 INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf
315 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
316 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
317
318 #
319 # TPM support
320 #
321 !if $(TPM_ENABLE) == TRUE
322 INF SecurityPkg/Tcg/TcgDxe/TcgDxe.inf
323 INF SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.inf
324 INF SecurityPkg/Tcg/Tcg2PlatformDxe/Tcg2PlatformDxe.inf
325 !if $(TPM_CONFIG_ENABLE) == TRUE
326 INF SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDxe.inf
327 !endif
328 !endif
329
330 ################################################################################
331
332 [FV.FVMAIN_COMPACT]
333 FvNameGuid = 48DB5E17-707C-472D-91CD-1613E7EF51B0
334 FvAlignment = 16
335 ERASE_POLARITY = 1
336 MEMORY_MAPPED = TRUE
337 STICKY_WRITE = TRUE
338 LOCK_CAP = TRUE
339 LOCK_STATUS = TRUE
340 WRITE_DISABLED_CAP = TRUE
341 WRITE_ENABLED_CAP = TRUE
342 WRITE_STATUS = TRUE
343 WRITE_LOCK_CAP = TRUE
344 WRITE_LOCK_STATUS = TRUE
345 READ_DISABLED_CAP = TRUE
346 READ_ENABLED_CAP = TRUE
347 READ_STATUS = TRUE
348 READ_LOCK_CAP = TRUE
349 READ_LOCK_STATUS = TRUE
350
351 FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {
352 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {
353 #
354 # These firmware volumes will have files placed in them uncompressed,
355 # and then both firmware volumes will be compressed in a single
356 # compression operation in order to achieve better overall compression.
357 #
358 SECTION FV_IMAGE = PEIFV
359 SECTION FV_IMAGE = DXEFV
360 }
361 }
362
363 !include OvmfPkg/FvmainCompactScratchEnd.fdf.inc
364
365 ################################################################################
366
367 [Rule.Common.SEC]
368 FILE SEC = $(NAMED_GUID) {
369 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
370 UI STRING ="$(MODULE_NAME)" Optional
371 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
372 }
373
374 [Rule.Common.PEI_CORE]
375 FILE PEI_CORE = $(NAMED_GUID) {
376 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi
377 UI STRING ="$(MODULE_NAME)" Optional
378 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
379 }
380
381 [Rule.Common.PEIM]
382 FILE PEIM = $(NAMED_GUID) {
383 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
384 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi
385 UI STRING="$(MODULE_NAME)" Optional
386 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
387 }
388
389 [Rule.Common.DXE_CORE]
390 FILE DXE_CORE = $(NAMED_GUID) {
391 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
392 UI STRING="$(MODULE_NAME)" Optional
393 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
394 }
395
396 [Rule.Common.DXE_DRIVER]
397 FILE DRIVER = $(NAMED_GUID) {
398 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
399 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
400 UI STRING="$(MODULE_NAME)" Optional
401 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
402 RAW ACPI Optional |.acpi
403 RAW ASL Optional |.aml
404 }
405
406 [Rule.Common.DXE_RUNTIME_DRIVER]
407 FILE DRIVER = $(NAMED_GUID) {
408 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
409 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
410 UI STRING="$(MODULE_NAME)" Optional
411 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
412 }
413
414 [Rule.Common.UEFI_DRIVER]
415 FILE DRIVER = $(NAMED_GUID) {
416 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
417 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
418 UI STRING="$(MODULE_NAME)" Optional
419 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
420 }
421
422 [Rule.Common.UEFI_DRIVER.BINARY]
423 FILE DRIVER = $(NAMED_GUID) {
424 DXE_DEPEX DXE_DEPEX Optional |.depex
425 PE32 PE32 |.efi
426 UI STRING="$(MODULE_NAME)" Optional
427 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
428 }
429
430 [Rule.Common.UEFI_APPLICATION]
431 FILE APPLICATION = $(NAMED_GUID) {
432 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
433 UI STRING="$(MODULE_NAME)" Optional
434 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
435 }
436
437 [Rule.Common.UEFI_APPLICATION.BINARY]
438 FILE APPLICATION = $(NAMED_GUID) {
439 PE32 PE32 |.efi
440 UI STRING="$(MODULE_NAME)" Optional
441 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
442 }
443
444 [Rule.Common.SEC.RESET_VECTOR]
445 FILE RAW = $(NAMED_GUID) {
446 RAW BIN Align = 16 |.bin
447 }
448
449 [Rule.Common.SMM_CORE]
450 FILE SMM_CORE = $(NAMED_GUID) {
451 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
452 UI STRING="$(MODULE_NAME)" Optional
453 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
454 }
455
456 [Rule.Common.DXE_SMM_DRIVER]
457 FILE SMM = $(NAMED_GUID) {
458 SMM_DEPEX SMM_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
459 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
460 UI STRING="$(MODULE_NAME)" Optional
461 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
462 }