]> git.proxmox.com Git - mirror_edk2.git/blob - OvmfPkg/OvmfPkgIa32.fdf
OvmfPkg: Split MAINFV into a separate PEI and DXE FVs
[mirror_edk2.git] / OvmfPkg / OvmfPkgIa32.fdf
1 ## @file
2 # Open Virtual Machine Firmware: FDF
3 #
4 # Copyright (c) 2006 - 2013, Intel Corporation. All rights reserved.<BR>
5 #
6 # This program and the accompanying materials
7 # are licensed and made available under the terms and conditions of the BSD License
8 # which accompanies this distribution. The full text of the license may be found at
9 # http://opensource.org/licenses/bsd-license.php
10 #
11 # THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
12 # WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
13 #
14 ##
15
16 ################################################################################
17
18 #
19 # Default flash size for DEBUG build is 2MB. For RELEASE it is 1MB.
20 #
21 # Defining FD_SIZE_1MB or FD_SIZE_2MB on the build command line can
22 # override this.
23 #
24 [Defines]
25 !if $(TARGET) == RELEASE
26 !ifndef $(FD_SIZE_2MB)
27 DEFINE FD_SIZE_1MB=
28 !endif
29 !endif
30
31 !ifdef $(FD_SIZE_1MB)
32 [FD.OVMF]
33 BaseAddress = 0xFFF00000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFdBaseAddress
34 Size = 0x00100000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareFdSize
35 ErasePolarity = 1
36 BlockSize = 0x1000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareBlockSize
37 NumBlocks = 0x100
38 !else
39 [FD.OVMF]
40 BaseAddress = 0xFFE00000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFdBaseAddress
41 Size = 0x00200000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareFdSize
42 ErasePolarity = 1
43 BlockSize = 0x1000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareBlockSize
44 NumBlocks = 0x200
45 !endif
46
47 0x00000000|0x0000e000
48 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize
49 #NV_VARIABLE_STORE
50 DATA = {
51 ## This is the EFI_FIRMWARE_VOLUME_HEADER
52 # ZeroVector []
53 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
54 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
55 # FileSystemGuid: gEfiSystemNvDataFvGuid =
56 # { 0xFFF12B8D, 0x7696, 0x4C8B,
57 # { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }}
58 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C,
59 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50,
60 # FvLength: 0x20000
61 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00,
62 # Signature "_FVH" # Attributes
63 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00,
64 # HeaderLength # CheckSum # ExtHeaderOffset #Reserved #Revision
65 0x48, 0x00, 0x19, 0xF9, 0x00, 0x00, 0x00, 0x02,
66 # Blockmap[0]: 0x20 Blocks * 0x1000 Bytes / Block
67 0x20, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00,
68 # Blockmap[1]: End
69 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
70 ## This is the VARIABLE_STORE_HEADER
71 !if $(SECURE_BOOT_ENABLE) == TRUE
72 # Signature: gEfiAuthenticatedVariableGuid =
73 # { 0xaaf32c78, 0x947b, 0x439a,
74 # { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }}
75 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43,
76 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92,
77 !else
78 # Signature: gEfiVariableGuid =
79 # { 0xddcf3616, 0x3275, 0x4164,
80 # { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }}
81 0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41,
82 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d,
83 !endif
84 # Size: 0xe000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) -
85 # 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0xdfb8
86 # This can speed up the Variable Dispatch a bit.
87 0xB8, 0xDF, 0x00, 0x00,
88 # FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32
89 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
90 }
91
92 0x0000e000|0x00001000
93 #NV_EVENT_LOG
94 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageEventLogBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageEventLogSize
95
96 0x0000f000|0x00001000
97 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize
98 #NV_FTW_WORKING
99 DATA = {
100 # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =
101 # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}
102 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,
103 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95,
104 # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved
105 0x2c, 0xaf, 0x2c, 0x64, 0xFE, 0xFF, 0xFF, 0xFF,
106 # WriteQueueSize: UINT64
107 0xE0, 0x0F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
108 }
109
110 0x00010000|0x00010000
111 #NV_FTW_SPARE
112 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize
113
114 !ifdef $(FD_SIZE_1MB)
115 0x00020000|0x000CC000
116 FV = FVMAIN_COMPACT
117
118 0x000EC000|0x14000
119 FV = SECFV
120
121 !else
122 0x00020000|0x001AC000
123 FV = FVMAIN_COMPACT
124
125 0x001CC000|0x34000
126 FV = SECFV
127 !endif
128
129 ################################################################################
130
131 [FD.MEMFD]
132 BaseAddress = 0x800000
133 Size = 0x800000
134 ErasePolarity = 1
135 BlockSize = 0x10000
136 NumBlocks = 0x80
137
138 0x000000|0x006000
139 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize
140
141 0x010000|0x008000
142 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize
143
144 0x020000|0x0E0000
145 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvSize
146 FV = PEIFV
147
148 0x100000|0x700000
149 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvSize
150 FV = DXEFV
151
152 ################################################################################
153
154 [FV.SECFV]
155 BlockSize = 0x1000
156 FvAlignment = 16
157 ERASE_POLARITY = 1
158 MEMORY_MAPPED = TRUE
159 STICKY_WRITE = TRUE
160 LOCK_CAP = TRUE
161 LOCK_STATUS = TRUE
162 WRITE_DISABLED_CAP = TRUE
163 WRITE_ENABLED_CAP = TRUE
164 WRITE_STATUS = TRUE
165 WRITE_LOCK_CAP = TRUE
166 WRITE_LOCK_STATUS = TRUE
167 READ_DISABLED_CAP = TRUE
168 READ_ENABLED_CAP = TRUE
169 READ_STATUS = TRUE
170 READ_LOCK_CAP = TRUE
171 READ_LOCK_STATUS = TRUE
172
173 #
174 # SEC Phase modules
175 #
176 # The code in this FV handles the initial firmware startup, and
177 # decompresses the PEI and DXE FVs which handles the rest of the boot sequence.
178 #
179 INF OvmfPkg/Sec/SecMain.inf
180
181 INF RuleOverride=RESET_VECTOR UefiCpuPkg/ResetVector/Vtf0/Bin/ResetVector.inf
182
183 ################################################################################
184 [FV.PEIFV]
185 BlockSize = 0x10000
186 FvAlignment = 16
187 ERASE_POLARITY = 1
188 MEMORY_MAPPED = TRUE
189 STICKY_WRITE = TRUE
190 LOCK_CAP = TRUE
191 LOCK_STATUS = TRUE
192 WRITE_DISABLED_CAP = TRUE
193 WRITE_ENABLED_CAP = TRUE
194 WRITE_STATUS = TRUE
195 WRITE_LOCK_CAP = TRUE
196 WRITE_LOCK_STATUS = TRUE
197 READ_DISABLED_CAP = TRUE
198 READ_ENABLED_CAP = TRUE
199 READ_STATUS = TRUE
200 READ_LOCK_CAP = TRUE
201 READ_LOCK_STATUS = TRUE
202
203 APRIORI PEI {
204 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
205 }
206
207 #
208 # PEI Phase modules
209 #
210 INF MdeModulePkg/Core/Pei/PeiMain.inf
211 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
212 INF IntelFrameworkModulePkg/Universal/StatusCode/Pei/StatusCodePei.inf
213 INF OvmfPkg/PlatformPei/PlatformPei.inf
214 INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
215
216 ################################################################################
217
218 [FV.DXEFV]
219 BlockSize = 0x10000
220 FvAlignment = 16
221 ERASE_POLARITY = 1
222 MEMORY_MAPPED = TRUE
223 STICKY_WRITE = TRUE
224 LOCK_CAP = TRUE
225 LOCK_STATUS = TRUE
226 WRITE_DISABLED_CAP = TRUE
227 WRITE_ENABLED_CAP = TRUE
228 WRITE_STATUS = TRUE
229 WRITE_LOCK_CAP = TRUE
230 WRITE_LOCK_STATUS = TRUE
231 READ_DISABLED_CAP = TRUE
232 READ_ENABLED_CAP = TRUE
233 READ_STATUS = TRUE
234 READ_LOCK_CAP = TRUE
235 READ_LOCK_STATUS = TRUE
236
237 APRIORI DXE {
238 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
239 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
240 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
241 }
242
243 #
244 # DXE Phase modules
245 #
246 INF MdeModulePkg/Core/Dxe/DxeMain.inf
247
248 INF IntelFrameworkModulePkg/Universal/StatusCode/RuntimeDxe/StatusCodeRuntimeDxe.inf
249 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
250
251 INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
252 INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
253 INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
254 INF PcAtChipsetPkg/8259InterruptControllerDxe/8259.inf
255 INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf
256 INF UefiCpuPkg/CpuDxe/CpuDxe.inf
257 INF PcAtChipsetPkg/8254TimerDxe/8254Timer.inf
258 INF PcAtChipsetPkg/PciHostBridgeDxe/PciHostBridgeDxe.inf
259 INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf
260 INF PcAtChipsetPkg/KbcResetDxe/Reset.inf
261 INF MdeModulePkg/Universal/Metronome/Metronome.inf
262 INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf
263
264 INF OvmfPkg/BlockMmioToBlockIoDxe/BlockIo.inf
265 INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf
266 INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf
267 INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf
268 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
269 INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf
270 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
271
272 !if $(SECURE_BOOT_ENABLE) == TRUE
273 INF SecurityPkg/VariableAuthenticated/RuntimeDxe/VariableRuntimeDxe.inf
274 INF OvmfPkg/SecureBootConfigDxe/SecureBootConfigDxe.inf
275 !else
276 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
277 !endif
278
279 INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
280 INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
281 INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
282 INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
283 INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
284 INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
285 INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
286 INF IntelFrameworkModulePkg/Universal/BdsDxe/BdsDxe.inf
287 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
288 INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf
289 INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
290 INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
291 INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
292 INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
293 INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
294 INF IntelFrameworkModulePkg/Bus/Pci/IdeBusDxe/IdeBusDxe.inf
295 INF PcAtChipsetPkg/Bus/Pci/IdeControllerDxe/IdeControllerDxe.inf
296 INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
297 INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
298 INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
299 INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
300
301 INF PcAtChipsetPkg/IsaAcpiDxe/IsaAcpi.inf
302 INF IntelFrameworkModulePkg/Bus/Isa/IsaBusDxe/IsaBusDxe.inf
303
304 !ifndef $(SOURCE_DEBUG_ENABLE)
305 INF IntelFrameworkModulePkg/Bus/Isa/IsaSerialDxe/IsaSerialDxe.inf
306 !endif
307
308 INF IntelFrameworkModulePkg/Bus/Isa/Ps2KeyboardDxe/Ps2keyboardDxe.inf
309 INF IntelFrameworkModulePkg/Bus/Isa/IsaFloppyDxe/IsaFloppyDxe.inf
310
311 INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf
312 INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf
313
314 INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf
315 INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf
316 INF RuleOverride=ACPITABLE OvmfPkg/AcpiTables/AcpiTables.inf
317
318 INF RuleOverride = BINARY FatBinPkg/EnhancedFatDxe/Fat.inf
319
320 !ifndef $(USE_OLD_SHELL)
321 INF ShellPkg/Application/Shell/Shell.inf
322 !else
323 INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf
324 !endif
325
326 FILE FREEFORM = PCD(gEfiIntelFrameworkModulePkgTokenSpaceGuid.PcdLogoFile) {
327 SECTION RAW = MdeModulePkg/Logo/Logo.bmp
328 }
329
330 #
331 # Network modules
332 #
333 !if $(E1000_ENABLE)
334 FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {
335 SECTION PE32 = Intel3.5/EFI32/E3507E2.EFI
336 }
337 !endif
338 INF MdeModulePkg/Universal/Network/SnpDxe/SnpDxe.inf
339 INF MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf
340 INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf
341 INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf
342 INF MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf
343 INF MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf
344 INF MdeModulePkg/Universal/Network/Ip4ConfigDxe/Ip4ConfigDxe.inf
345 INF MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf
346 INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf
347 INF MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
348 INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf
349 INF MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf
350 INF MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf
351 INF OvmfPkg/VirtioNetDxe/VirtioNet.inf
352
353 #
354 # Usb Support
355 #
356 INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf
357 INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf
358 INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf
359 INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf
360 INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf
361
362 !ifdef $(CSM_ENABLE)
363 INF IntelFrameworkModulePkg/Csm/BiosThunk/VideoDxe/VideoDxe.inf
364 INF IntelFrameworkModulePkg/Csm/LegacyBiosDxe/LegacyBiosDxe.inf
365 INF RuleOverride=CSM OvmfPkg/Csm/Csm16/Csm16.inf
366 !endif
367
368 INF OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
369
370 ################################################################################
371
372 [FV.FVMAIN_COMPACT]
373 FvAlignment = 16
374 ERASE_POLARITY = 1
375 MEMORY_MAPPED = TRUE
376 STICKY_WRITE = TRUE
377 LOCK_CAP = TRUE
378 LOCK_STATUS = TRUE
379 WRITE_DISABLED_CAP = TRUE
380 WRITE_ENABLED_CAP = TRUE
381 WRITE_STATUS = TRUE
382 WRITE_LOCK_CAP = TRUE
383 WRITE_LOCK_STATUS = TRUE
384 READ_DISABLED_CAP = TRUE
385 READ_ENABLED_CAP = TRUE
386 READ_STATUS = TRUE
387 READ_LOCK_CAP = TRUE
388 READ_LOCK_STATUS = TRUE
389
390 FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {
391 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {
392 #
393 # These firmware volumes will have files placed in them uncompressed,
394 # and then both firmware volumes will be compressed in a single
395 # compression operation in order to achieve better overall compression.
396 #
397 SECTION FV_IMAGE = PEIFV
398 SECTION FV_IMAGE = DXEFV
399 }
400 }
401
402 ################################################################################
403
404 [Rule.Common.SEC]
405 FILE SEC = $(NAMED_GUID) {
406 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
407 UI STRING ="$(MODULE_NAME)" Optional
408 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
409 }
410
411 [Rule.Common.PEI_CORE]
412 FILE PEI_CORE = $(NAMED_GUID) {
413 PE32 PE32 Align=32 $(INF_OUTPUT)/$(MODULE_NAME).efi
414 UI STRING ="$(MODULE_NAME)" Optional
415 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
416 }
417
418 [Rule.Common.PEIM]
419 FILE PEIM = $(NAMED_GUID) {
420 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
421 PE32 PE32 Align=32 $(INF_OUTPUT)/$(MODULE_NAME).efi
422 UI STRING="$(MODULE_NAME)" Optional
423 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
424 }
425
426 [Rule.Common.DXE_CORE]
427 FILE DXE_CORE = $(NAMED_GUID) {
428 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
429 UI STRING="$(MODULE_NAME)" Optional
430 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
431 }
432
433 [Rule.Common.DXE_DRIVER]
434 FILE DRIVER = $(NAMED_GUID) {
435 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
436 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
437 UI STRING="$(MODULE_NAME)" Optional
438 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
439 }
440
441 [Rule.Common.DXE_RUNTIME_DRIVER]
442 FILE DRIVER = $(NAMED_GUID) {
443 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
444 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
445 UI STRING="$(MODULE_NAME)" Optional
446 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
447 }
448
449 [Rule.Common.UEFI_DRIVER]
450 FILE DRIVER = $(NAMED_GUID) {
451 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
452 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
453 UI STRING="$(MODULE_NAME)" Optional
454 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
455 }
456
457 [Rule.Common.UEFI_DRIVER.BINARY]
458 FILE DRIVER = $(NAMED_GUID) {
459 DXE_DEPEX DXE_DEPEX Optional |.depex
460 PE32 PE32 |.efi
461 UI STRING="$(MODULE_NAME)" Optional
462 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
463 }
464
465 [Rule.Common.UEFI_APPLICATION]
466 FILE APPLICATION = $(NAMED_GUID) {
467 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
468 UI STRING="$(MODULE_NAME)" Optional
469 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
470 }
471
472 [Rule.Common.UEFI_APPLICATION.BINARY]
473 FILE APPLICATION = $(NAMED_GUID) {
474 PE32 PE32 |.efi
475 UI STRING="$(MODULE_NAME)" Optional
476 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
477 }
478
479 [Rule.Common.USER_DEFINED.ACPITABLE]
480 FILE FREEFORM = $(NAMED_GUID) {
481 RAW ACPI |.acpi
482 RAW ASL |.aml
483 }
484
485 [Rule.Common.USER_DEFINED.CSM]
486 FILE FREEFORM = $(NAMED_GUID) {
487 RAW BIN |.bin
488 }
489
490 [Rule.Common.SEC.RESET_VECTOR]
491 FILE RAW = $(NAMED_GUID) {
492 RAW RAW |.raw
493 }