]> git.proxmox.com Git - mirror_edk2.git/blob - OvmfPkg/CloudHv/CloudHvX64.fdf
UefiCpuPkg: Move AsmRelocateApLoopStart from Mpfuncs.nasm to AmdSev.nasm
[mirror_edk2.git] / OvmfPkg / CloudHv / CloudHvX64.fdf
1 ## @file
2 # Open Virtual Machine Firmware: FDF
3 #
4 # Copyright (c) 2006 - 2022, Intel Corporation. All rights reserved.<BR>
5 # (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
6 #
7 # SPDX-License-Identifier: BSD-2-Clause-Patent
8 #
9 ##
10
11 ################################################################################
12
13 [Defines]
14 !include CloudHvDefines.fdf.inc
15
16 #
17 # This will allow the flash device image to be recognize as an ELF, with first
18 # an ELF headers, then the firmware code.
19 #
20 [FD.CLOUDHV]
21 BaseAddress = $(FW_BASE_ADDRESS)
22 Size = $(FW_SIZE)
23 ErasePolarity = 1
24 BlockSize = $(BLOCK_SIZE)
25 NumBlocks = $(FW_BLOCKS)
26
27 #
28 # Leaving 4kiB for the PVH ELF header. This is more than enough.
29 #
30 0x00000000|0x00001000
31
32 !include CloudHvElfHeader.fdf.inc
33
34 0x00001000|$(FVMAIN_SIZE)
35 FV = FVMAIN_COMPACT
36
37 $(SECFV_OFFSET)|$(SECFV_SIZE)
38 FV = SECFV
39
40 ################################################################################
41
42 [FD.MEMFD]
43 BaseAddress = $(MEMFD_BASE_ADDRESS)
44 Size = 0xD00000
45 ErasePolarity = 1
46 BlockSize = 0x10000
47 NumBlocks = 0xD0
48
49 0x000000|0x006000
50 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize
51
52 0x006000|0x001000
53 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageSize
54
55 0x007000|0x001000
56 gEfiMdePkgTokenSpaceGuid.PcdGuidedExtractHandlerTableAddress|gUefiOvmfPkgTokenSpaceGuid.PcdGuidedExtractHandlerTableSize
57
58 0x008000|0x001000
59 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableSize
60
61 0x009000|0x002000
62 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbSize
63
64 0x00B000|0x001000
65 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize
66
67 0x00C000|0x001000
68 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupSize
69
70 0x00D000|0x001000
71 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsSize
72
73 0x00E000|0x001000
74 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidSize
75
76 0x00F000|0x001000
77 gUefiOvmfPkgTokenSpaceGuid.PcdXenPvhStartOfDayStructPtr|gUefiOvmfPkgTokenSpaceGuid.PcdXenPvhStartOfDayStructPtrSize
78
79 0x010000|0x010000
80 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize
81
82 0x020000|0x0E0000
83 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvSize
84 FV = PEIFV
85
86 0x100000|0xC00000
87 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvSize
88 FV = DXEFV
89
90 ##########################################################################################
91 # Set the SEV-ES specific work area PCDs
92 #
93 SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaBase = $(MEMFD_BASE_ADDRESS) + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader
94 SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaSize = gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize - gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader
95 ##########################################################################################
96
97 ################################################################################
98
99 [FV.SECFV]
100 FvNameGuid = 763BED0D-DE9F-48F5-81F1-3E90E1B1A015
101 BlockSize = 0x1000
102 FvAlignment = 16
103 ERASE_POLARITY = 1
104 MEMORY_MAPPED = TRUE
105 STICKY_WRITE = TRUE
106 LOCK_CAP = TRUE
107 LOCK_STATUS = TRUE
108 WRITE_DISABLED_CAP = TRUE
109 WRITE_ENABLED_CAP = TRUE
110 WRITE_STATUS = TRUE
111 WRITE_LOCK_CAP = TRUE
112 WRITE_LOCK_STATUS = TRUE
113 READ_DISABLED_CAP = TRUE
114 READ_ENABLED_CAP = TRUE
115 READ_STATUS = TRUE
116 READ_LOCK_CAP = TRUE
117 READ_LOCK_STATUS = TRUE
118
119 #
120 # SEC Phase modules
121 #
122 # The code in this FV handles the initial firmware startup, and
123 # decompresses the PEI and DXE FVs which handles the rest of the boot sequence.
124 #
125 INF OvmfPkg/Sec/SecMain.inf
126
127 INF RuleOverride=RESET_VECTOR OvmfPkg/XenResetVector/XenResetVector.inf
128
129 ################################################################################
130 [FV.PEIFV]
131 FvNameGuid = 6938079B-B503-4E3D-9D24-B28337A25806
132 BlockSize = 0x10000
133 FvAlignment = 16
134 ERASE_POLARITY = 1
135 MEMORY_MAPPED = TRUE
136 STICKY_WRITE = TRUE
137 LOCK_CAP = TRUE
138 LOCK_STATUS = TRUE
139 WRITE_DISABLED_CAP = TRUE
140 WRITE_ENABLED_CAP = TRUE
141 WRITE_STATUS = TRUE
142 WRITE_LOCK_CAP = TRUE
143 WRITE_LOCK_STATUS = TRUE
144 READ_DISABLED_CAP = TRUE
145 READ_ENABLED_CAP = TRUE
146 READ_STATUS = TRUE
147 READ_LOCK_CAP = TRUE
148 READ_LOCK_STATUS = TRUE
149
150 APRIORI PEI {
151 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
152 }
153
154 #
155 # PEI Phase modules
156 #
157 INF MdeModulePkg/Core/Pei/PeiMain.inf
158 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
159 INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf
160 INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf
161 INF OvmfPkg/PlatformPei/PlatformPei.inf
162 INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
163 INF UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf
164 !if $(SMM_REQUIRE) == TRUE
165 INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf
166 INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf
167 INF OvmfPkg/SmmAccess/SmmAccessPei.inf
168 !endif
169 INF UefiCpuPkg/CpuMpPei/CpuMpPei.inf
170
171 !include OvmfPkg/OvmfTpmPei.fdf.inc
172
173 ################################################################################
174
175 [FV.DXEFV]
176 FvForceRebase = FALSE
177 FvNameGuid = 7CB8BDC9-F8EB-4F34-AAEA-3EE4AF6516A1
178 BlockSize = 0x10000
179 FvAlignment = 16
180 ERASE_POLARITY = 1
181 MEMORY_MAPPED = TRUE
182 STICKY_WRITE = TRUE
183 LOCK_CAP = TRUE
184 LOCK_STATUS = TRUE
185 WRITE_DISABLED_CAP = TRUE
186 WRITE_ENABLED_CAP = TRUE
187 WRITE_STATUS = TRUE
188 WRITE_LOCK_CAP = TRUE
189 WRITE_LOCK_STATUS = TRUE
190 READ_DISABLED_CAP = TRUE
191 READ_ENABLED_CAP = TRUE
192 READ_STATUS = TRUE
193 READ_LOCK_CAP = TRUE
194 READ_LOCK_STATUS = TRUE
195
196 APRIORI DXE {
197 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
198 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
199 INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf
200 !if $(SMM_REQUIRE) == FALSE
201 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
202 !endif
203 }
204
205 #
206 # DXE Phase modules
207 #
208 INF MdeModulePkg/Core/Dxe/DxeMain.inf
209
210 INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf
211 INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf
212 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
213
214 INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
215 INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
216 INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
217 INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf
218 INF UefiCpuPkg/CpuDxe/CpuDxe.inf
219 INF OvmfPkg/LocalApicTimerDxe/LocalApicTimerDxe.inf
220 INF OvmfPkg/IncompatiblePciDeviceSupportDxe/IncompatiblePciDeviceSupport.inf
221 INF OvmfPkg/PciHotPlugInitDxe/PciHotPlugInit.inf
222 INF MdeModulePkg/Bus/Pci/PciHostBridgeDxe/PciHostBridgeDxe.inf
223 INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf
224 INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf
225 INF MdeModulePkg/Universal/Metronome/Metronome.inf
226 INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf
227
228 INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf
229 INF OvmfPkg/Virtio10Dxe/Virtio10.inf
230 INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf
231 INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf
232 INF OvmfPkg/VirtioRngDxe/VirtioRng.inf
233 !if $(PVSCSI_ENABLE) == TRUE
234 INF OvmfPkg/PvScsiDxe/PvScsiDxe.inf
235 !endif
236 !if $(MPT_SCSI_ENABLE) == TRUE
237 INF OvmfPkg/MptScsiDxe/MptScsiDxe.inf
238 !endif
239 !if $(LSI_SCSI_ENABLE) == TRUE
240 INF OvmfPkg/LsiScsiDxe/LsiScsiDxe.inf
241 !endif
242
243 !if $(SECURE_BOOT_ENABLE) == TRUE
244 INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
245 !endif
246
247 INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
248 INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
249 INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
250 INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
251 INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
252 INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
253 INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
254 INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
255 INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
256 INF MdeModulePkg/Application/UiApp/UiApp.inf
257 INF OvmfPkg/QemuKernelLoaderFsDxe/QemuKernelLoaderFsDxe.inf
258 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
259 INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
260 INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
261 INF MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskDxe.inf
262 INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
263 INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
264 INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
265 INF OvmfPkg/SataControllerDxe/SataControllerDxe.inf
266 INF MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf
267 INF MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf
268 INF MdeModulePkg/Bus/Pci/NvmExpressDxe/NvmExpressDxe.inf
269 INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
270 INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
271 INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
272 INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
273
274 INF MdeModulePkg/Universal/SerialDxe/SerialDxe.inf
275
276 INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf
277 INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf
278
279 INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf
280 INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf
281 INF MdeModulePkg/Universal/Acpi/S3SaveStateDxe/S3SaveStateDxe.inf
282 INF MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe/BootScriptExecutorDxe.inf
283 INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResourceTableDxe.inf
284
285 INF FatPkg/EnhancedFatDxe/Fat.inf
286 INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
287 INF OvmfPkg/VirtioFsDxe/VirtioFsDxe.inf
288
289 !if $(TOOL_CHAIN_TAG) != "XCODE5"
290 INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
291 INF ShellPkg/DynamicCommand/HttpDynamicCommand/HttpDynamicCommand.inf
292 INF OvmfPkg/LinuxInitrdDynamicShellCommand/LinuxInitrdDynamicShellCommand.inf
293 !endif
294 INF ShellPkg/Application/Shell/Shell.inf
295
296 INF MdeModulePkg/Logo/LogoDxe.inf
297
298 #
299 # Network modules
300 #
301 !if $(E1000_ENABLE)
302 FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {
303 SECTION PE32 = Intel3.5/EFIX64/E3522X2.EFI
304 }
305 !endif
306 !include NetworkPkg/Network.fdf.inc
307 INF OvmfPkg/VirtioNetDxe/VirtioNet.inf
308
309 INF OvmfPkg/PlatformDxe/Platform.inf
310 INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf
311 INF OvmfPkg/IoMmuDxe/IoMmuDxe.inf
312
313 !if $(SMM_REQUIRE) == TRUE
314 INF OvmfPkg/SmmAccess/SmmAccess2Dxe.inf
315 INF OvmfPkg/SmmControl2Dxe/SmmControl2Dxe.inf
316 INF OvmfPkg/CpuS3DataDxe/CpuS3DataDxe.inf
317 INF MdeModulePkg/Core/PiSmmCore/PiSmmIpl.inf
318 INF MdeModulePkg/Core/PiSmmCore/PiSmmCore.inf
319 INF OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf
320 INF UefiCpuPkg/CpuIo2Smm/CpuIo2Smm.inf
321 INF MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBox.inf
322 INF UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf
323
324 #
325 # Variable driver stack (SMM)
326 #
327 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesSmm.inf
328 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteSmm.inf
329 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmm.inf
330 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmmRuntimeDxe.inf
331
332 !else
333
334 #
335 # Variable driver stack (non-SMM)
336 #
337 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
338 INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf
339 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
340 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
341 !endif
342
343 #
344 # TPM support
345 #
346 !include OvmfPkg/OvmfTpmDxe.fdf.inc
347
348 ################################################################################
349
350 [FV.FVMAIN_COMPACT]
351 FvNameGuid = 48DB5E17-707C-472D-91CD-1613E7EF51B0
352 FvAlignment = 16
353 ERASE_POLARITY = 1
354 MEMORY_MAPPED = TRUE
355 STICKY_WRITE = TRUE
356 LOCK_CAP = TRUE
357 LOCK_STATUS = TRUE
358 WRITE_DISABLED_CAP = TRUE
359 WRITE_ENABLED_CAP = TRUE
360 WRITE_STATUS = TRUE
361 WRITE_LOCK_CAP = TRUE
362 WRITE_LOCK_STATUS = TRUE
363 READ_DISABLED_CAP = TRUE
364 READ_ENABLED_CAP = TRUE
365 READ_STATUS = TRUE
366 READ_LOCK_CAP = TRUE
367 READ_LOCK_STATUS = TRUE
368
369 FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {
370 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {
371 #
372 # These firmware volumes will have files placed in them uncompressed,
373 # and then both firmware volumes will be compressed in a single
374 # compression operation in order to achieve better overall compression.
375 #
376 SECTION FV_IMAGE = PEIFV
377 SECTION FV_IMAGE = DXEFV
378 }
379 }
380
381 !include OvmfPkg/FvmainCompactScratchEnd.fdf.inc
382
383 ################################################################################
384
385 [Rule.Common.SEC]
386 FILE SEC = $(NAMED_GUID) {
387 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
388 UI STRING ="$(MODULE_NAME)" Optional
389 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
390 }
391
392 [Rule.Common.PEI_CORE]
393 FILE PEI_CORE = $(NAMED_GUID) {
394 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi
395 UI STRING ="$(MODULE_NAME)" Optional
396 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
397 }
398
399 [Rule.Common.PEIM]
400 FILE PEIM = $(NAMED_GUID) {
401 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
402 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi
403 UI STRING="$(MODULE_NAME)" Optional
404 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
405 }
406
407 [Rule.Common.DXE_CORE]
408 FILE DXE_CORE = $(NAMED_GUID) {
409 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
410 UI STRING="$(MODULE_NAME)" Optional
411 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
412 }
413
414 [Rule.Common.DXE_DRIVER]
415 FILE DRIVER = $(NAMED_GUID) {
416 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
417 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
418 UI STRING="$(MODULE_NAME)" Optional
419 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
420 RAW ACPI Optional |.acpi
421 RAW ASL Optional |.aml
422 }
423
424 [Rule.Common.DXE_RUNTIME_DRIVER]
425 FILE DRIVER = $(NAMED_GUID) {
426 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
427 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
428 UI STRING="$(MODULE_NAME)" Optional
429 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
430 }
431
432 [Rule.Common.UEFI_DRIVER]
433 FILE DRIVER = $(NAMED_GUID) {
434 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
435 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
436 UI STRING="$(MODULE_NAME)" Optional
437 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
438 }
439
440 [Rule.Common.UEFI_DRIVER.BINARY]
441 FILE DRIVER = $(NAMED_GUID) {
442 DXE_DEPEX DXE_DEPEX Optional |.depex
443 PE32 PE32 |.efi
444 UI STRING="$(MODULE_NAME)" Optional
445 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
446 }
447
448 [Rule.Common.UEFI_APPLICATION]
449 FILE APPLICATION = $(NAMED_GUID) {
450 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
451 UI STRING="$(MODULE_NAME)" Optional
452 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
453 }
454
455 [Rule.Common.UEFI_APPLICATION.BINARY]
456 FILE APPLICATION = $(NAMED_GUID) {
457 PE32 PE32 |.efi
458 UI STRING="$(MODULE_NAME)" Optional
459 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
460 }
461
462 [Rule.Common.USER_DEFINED.CSM]
463 FILE FREEFORM = $(NAMED_GUID) {
464 RAW BIN |.bin
465 }
466
467 [Rule.Common.SEC.RESET_VECTOR]
468 FILE RAW = $(NAMED_GUID) {
469 RAW BIN Align = 16 |.bin
470 }
471
472 [Rule.Common.SMM_CORE]
473 FILE SMM_CORE = $(NAMED_GUID) {
474 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
475 UI STRING="$(MODULE_NAME)" Optional
476 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
477 }
478
479 [Rule.Common.DXE_SMM_DRIVER]
480 FILE SMM = $(NAMED_GUID) {
481 SMM_DEPEX SMM_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
482 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
483 UI STRING="$(MODULE_NAME)" Optional
484 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
485 }