]> git.proxmox.com Git - mirror_edk2.git/blob - OvmfPkg/OvmfPkgX64.fdf
UefiCpuPkg: Move AsmRelocateApLoopStart from Mpfuncs.nasm to AmdSev.nasm
[mirror_edk2.git] / OvmfPkg / OvmfPkgX64.fdf
1 ## @file
2 # Open Virtual Machine Firmware: FDF
3 #
4 # Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
5 # (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
6 #
7 # SPDX-License-Identifier: BSD-2-Clause-Patent
8 #
9 ##
10
11 ################################################################################
12
13 [Defines]
14 !include OvmfPkgDefines.fdf.inc
15
16 #
17 # Build the variable store and the firmware code as one unified flash device
18 # image.
19 #
20 [FD.OVMF]
21 BaseAddress = $(FW_BASE_ADDRESS)
22 Size = $(FW_SIZE)
23 ErasePolarity = 1
24 BlockSize = $(BLOCK_SIZE)
25 NumBlocks = $(FW_BLOCKS)
26
27 !include VarStore.fdf.inc
28
29 $(VARS_SIZE)|$(FVMAIN_SIZE)
30 FV = FVMAIN_COMPACT
31
32 $(SECFV_OFFSET)|$(SECFV_SIZE)
33 FV = SECFV
34
35 #
36 # Build the variable store and the firmware code as separate flash device
37 # images.
38 #
39 [FD.OVMF_VARS]
40 BaseAddress = $(FW_BASE_ADDRESS)
41 Size = $(VARS_SIZE)
42 ErasePolarity = 1
43 BlockSize = $(BLOCK_SIZE)
44 NumBlocks = $(VARS_BLOCKS)
45
46 !include VarStore.fdf.inc
47
48 [FD.OVMF_CODE]
49 BaseAddress = $(CODE_BASE_ADDRESS)
50 Size = $(CODE_SIZE)
51 ErasePolarity = 1
52 BlockSize = $(BLOCK_SIZE)
53 NumBlocks = $(CODE_BLOCKS)
54
55 0x00000000|$(FVMAIN_SIZE)
56 FV = FVMAIN_COMPACT
57
58 $(FVMAIN_SIZE)|$(SECFV_SIZE)
59 FV = SECFV
60
61 ################################################################################
62
63 [FD.MEMFD]
64 BaseAddress = $(MEMFD_BASE_ADDRESS)
65 Size = 0xD00000
66 ErasePolarity = 1
67 BlockSize = 0x10000
68 NumBlocks = 0xD0
69
70 0x000000|0x006000
71 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize
72
73 0x006000|0x001000
74 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageSize
75
76 0x007000|0x001000
77 gEfiMdePkgTokenSpaceGuid.PcdGuidedExtractHandlerTableAddress|gUefiOvmfPkgTokenSpaceGuid.PcdGuidedExtractHandlerTableSize
78
79 0x008000|0x001000
80 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableSize
81
82 0x009000|0x002000
83 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbSize
84
85 0x00B000|0x001000
86 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize
87
88 0x00C000|0x001000
89 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupSize
90
91 0x00D000|0x001000
92 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsSize
93
94 0x00E000|0x001000
95 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidSize
96
97 0x010000|0x010000
98 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize
99
100 0x020000|0x0E0000
101 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvSize
102 FV = PEIFV
103
104 0x100000|0xC00000
105 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvSize
106 FV = DXEFV
107
108 ##########################################################################################
109 # Set the SEV-ES specific work area PCDs (used for all forms of SEV since the
110 # the SEV STATUS MSR is now saved in the work area)
111 #
112 SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaBase = $(MEMFD_BASE_ADDRESS) + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader
113 SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaSize = gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize - gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader
114 ##########################################################################################
115
116 ################################################################################
117
118 [FV.SECFV]
119 FvNameGuid = 763BED0D-DE9F-48F5-81F1-3E90E1B1A015
120 BlockSize = 0x1000
121 FvAlignment = 16
122 ERASE_POLARITY = 1
123 MEMORY_MAPPED = TRUE
124 STICKY_WRITE = TRUE
125 LOCK_CAP = TRUE
126 LOCK_STATUS = TRUE
127 WRITE_DISABLED_CAP = TRUE
128 WRITE_ENABLED_CAP = TRUE
129 WRITE_STATUS = TRUE
130 WRITE_LOCK_CAP = TRUE
131 WRITE_LOCK_STATUS = TRUE
132 READ_DISABLED_CAP = TRUE
133 READ_ENABLED_CAP = TRUE
134 READ_STATUS = TRUE
135 READ_LOCK_CAP = TRUE
136 READ_LOCK_STATUS = TRUE
137
138 #
139 # SEC Phase modules
140 #
141 # The code in this FV handles the initial firmware startup, and
142 # decompresses the PEI and DXE FVs which handles the rest of the boot sequence.
143 #
144 INF OvmfPkg/Sec/SecMain.inf
145
146 INF RuleOverride=RESET_VECTOR OvmfPkg/ResetVector/ResetVector.inf
147
148 ################################################################################
149 [FV.PEIFV]
150 FvNameGuid = 6938079B-B503-4E3D-9D24-B28337A25806
151 BlockSize = 0x10000
152 FvAlignment = 16
153 ERASE_POLARITY = 1
154 MEMORY_MAPPED = TRUE
155 STICKY_WRITE = TRUE
156 LOCK_CAP = TRUE
157 LOCK_STATUS = TRUE
158 WRITE_DISABLED_CAP = TRUE
159 WRITE_ENABLED_CAP = TRUE
160 WRITE_STATUS = TRUE
161 WRITE_LOCK_CAP = TRUE
162 WRITE_LOCK_STATUS = TRUE
163 READ_DISABLED_CAP = TRUE
164 READ_ENABLED_CAP = TRUE
165 READ_STATUS = TRUE
166 READ_LOCK_CAP = TRUE
167 READ_LOCK_STATUS = TRUE
168
169 APRIORI PEI {
170 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
171 }
172
173 #
174 # PEI Phase modules
175 #
176 INF MdeModulePkg/Core/Pei/PeiMain.inf
177 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
178 INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf
179 INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf
180 INF OvmfPkg/PlatformPei/PlatformPei.inf
181 INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
182 INF UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf
183 !if $(SMM_REQUIRE) == TRUE
184 INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf
185 INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf
186 INF OvmfPkg/SmmAccess/SmmAccessPei.inf
187 !endif
188 INF UefiCpuPkg/CpuMpPei/CpuMpPei.inf
189 INF FILE_GUID = $(UP_CPU_PEI_GUID) UefiCpuPkg/CpuMpPei/CpuMpPei.inf
190
191 !include OvmfPkg/OvmfTpmPei.fdf.inc
192
193 ################################################################################
194
195 [FV.DXEFV]
196 FvForceRebase = FALSE
197 FvNameGuid = 7CB8BDC9-F8EB-4F34-AAEA-3EE4AF6516A1
198 BlockSize = 0x10000
199 FvAlignment = 16
200 ERASE_POLARITY = 1
201 MEMORY_MAPPED = TRUE
202 STICKY_WRITE = TRUE
203 LOCK_CAP = TRUE
204 LOCK_STATUS = TRUE
205 WRITE_DISABLED_CAP = TRUE
206 WRITE_ENABLED_CAP = TRUE
207 WRITE_STATUS = TRUE
208 WRITE_LOCK_CAP = TRUE
209 WRITE_LOCK_STATUS = TRUE
210 READ_DISABLED_CAP = TRUE
211 READ_ENABLED_CAP = TRUE
212 READ_STATUS = TRUE
213 READ_LOCK_CAP = TRUE
214 READ_LOCK_STATUS = TRUE
215
216 APRIORI DXE {
217 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
218 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
219 # AmdSevDxe must be loaded before TdxDxe. Because in SEV guest AmdSevDxe
220 # driver performs a MemEncryptSevClearMmioPageEncMask() call against the
221 # PcdPciExpressBaseAddress range to mark it shared/unencrypted.
222 # Otherwise #VC handler terminates the guest for trying to do MMIO to an
223 # encrypted region (Since the range has not been marked shared/unencrypted).
224 INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf
225 INF OvmfPkg/TdxDxe/TdxDxe.inf
226 !if $(SMM_REQUIRE) == FALSE
227 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
228 !endif
229 }
230
231 #
232 # DXE Phase modules
233 #
234 INF MdeModulePkg/Core/Dxe/DxeMain.inf
235
236 INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf
237 INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf
238 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
239
240 INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
241 INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
242 INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
243 INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf
244
245 INF UefiCpuPkg/CpuDxe/CpuDxe.inf
246 INF FILE_GUID = $(UP_CPU_DXE_GUID) UefiCpuPkg/CpuDxe/CpuDxe.inf
247
248 !ifdef $(CSM_ENABLE)
249 INF OvmfPkg/8259InterruptControllerDxe/8259.inf
250 INF OvmfPkg/8254TimerDxe/8254Timer.inf
251 !else
252 INF OvmfPkg/LocalApicTimerDxe/LocalApicTimerDxe.inf
253 !endif
254 INF OvmfPkg/IncompatiblePciDeviceSupportDxe/IncompatiblePciDeviceSupport.inf
255 INF OvmfPkg/PciHotPlugInitDxe/PciHotPlugInit.inf
256 INF MdeModulePkg/Bus/Pci/PciHostBridgeDxe/PciHostBridgeDxe.inf
257 INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf
258 INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf
259 INF MdeModulePkg/Universal/Metronome/Metronome.inf
260 INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf
261
262 INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf
263 INF OvmfPkg/Virtio10Dxe/Virtio10.inf
264 INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf
265 INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf
266 INF OvmfPkg/VirtioRngDxe/VirtioRng.inf
267 !if $(PVSCSI_ENABLE) == TRUE
268 INF OvmfPkg/PvScsiDxe/PvScsiDxe.inf
269 !endif
270 !if $(MPT_SCSI_ENABLE) == TRUE
271 INF OvmfPkg/MptScsiDxe/MptScsiDxe.inf
272 !endif
273 !if $(LSI_SCSI_ENABLE) == TRUE
274 INF OvmfPkg/LsiScsiDxe/LsiScsiDxe.inf
275 !endif
276
277 !if $(SECURE_BOOT_ENABLE) == TRUE
278 INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
279 !endif
280
281 INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
282 INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
283 INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
284 INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
285 INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
286 INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
287 INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
288 INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
289 INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
290 INF MdeModulePkg/Application/UiApp/UiApp.inf
291 INF OvmfPkg/QemuKernelLoaderFsDxe/QemuKernelLoaderFsDxe.inf
292 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
293 INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
294 INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
295 INF MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskDxe.inf
296 INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
297 INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
298 INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
299 INF OvmfPkg/SataControllerDxe/SataControllerDxe.inf
300 INF MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf
301 INF MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf
302 INF MdeModulePkg/Bus/Pci/NvmExpressDxe/NvmExpressDxe.inf
303 INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
304 INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
305 INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
306 INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
307
308 INF OvmfPkg/SioBusDxe/SioBusDxe.inf
309 !if $(SOURCE_DEBUG_ENABLE) == FALSE
310 INF MdeModulePkg/Bus/Pci/PciSioSerialDxe/PciSioSerialDxe.inf
311 !endif
312 INF MdeModulePkg/Bus/Isa/Ps2KeyboardDxe/Ps2KeyboardDxe.inf
313
314 INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf
315 INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf
316
317 INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf
318 INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf
319 INF MdeModulePkg/Universal/Acpi/S3SaveStateDxe/S3SaveStateDxe.inf
320 INF MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe/BootScriptExecutorDxe.inf
321 INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResourceTableDxe.inf
322
323 INF FatPkg/EnhancedFatDxe/Fat.inf
324 INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
325 INF OvmfPkg/VirtioFsDxe/VirtioFsDxe.inf
326
327 !if $(TOOL_CHAIN_TAG) != "XCODE5"
328 INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
329 INF ShellPkg/DynamicCommand/HttpDynamicCommand/HttpDynamicCommand.inf
330 INF OvmfPkg/LinuxInitrdDynamicShellCommand/LinuxInitrdDynamicShellCommand.inf
331 !endif
332 INF ShellPkg/Application/Shell/Shell.inf
333
334 INF MdeModulePkg/Logo/LogoDxe.inf
335
336 INF OvmfPkg/TdxDxe/TdxDxe.inf
337
338 #
339 # Network modules
340 #
341 !if $(E1000_ENABLE)
342 FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {
343 SECTION PE32 = Intel3.5/EFIX64/E3522X2.EFI
344 }
345 !endif
346 !include NetworkPkg/Network.fdf.inc
347 INF OvmfPkg/VirtioNetDxe/VirtioNet.inf
348
349 #
350 # Usb Support
351 #
352 INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf
353 INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf
354 INF MdeModulePkg/Bus/Pci/XhciDxe/XhciDxe.inf
355 INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf
356 INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf
357 INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf
358
359 !ifdef $(CSM_ENABLE)
360 INF OvmfPkg/Csm/BiosThunk/VideoDxe/VideoDxe.inf
361 INF OvmfPkg/Csm/LegacyBiosDxe/LegacyBiosDxe.inf
362 INF RuleOverride=CSM OvmfPkg/Csm/Csm16/Csm16.inf
363 !else
364 INF OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
365 !endif
366
367 INF OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
368 INF OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
369 INF OvmfPkg/PlatformDxe/Platform.inf
370 INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf
371 INF OvmfPkg/IoMmuDxe/IoMmuDxe.inf
372
373 !if $(SMM_REQUIRE) == TRUE
374 INF OvmfPkg/SmmAccess/SmmAccess2Dxe.inf
375 INF OvmfPkg/SmmControl2Dxe/SmmControl2Dxe.inf
376 INF OvmfPkg/CpuS3DataDxe/CpuS3DataDxe.inf
377 INF MdeModulePkg/Core/PiSmmCore/PiSmmIpl.inf
378 INF MdeModulePkg/Core/PiSmmCore/PiSmmCore.inf
379 INF OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf
380 INF UefiCpuPkg/CpuIo2Smm/CpuIo2Smm.inf
381 INF MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBox.inf
382 INF UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf
383
384 #
385 # Variable driver stack (SMM)
386 #
387 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesSmm.inf
388 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteSmm.inf
389 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmm.inf
390 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmmRuntimeDxe.inf
391
392 !else
393
394 #
395 # Variable driver stack (non-SMM)
396 #
397 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
398 INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf
399 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
400 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
401 !endif
402
403 #
404 # TPM support
405 #
406 !include OvmfPkg/OvmfTpmDxe.fdf.inc
407
408 ################################################################################
409
410 [FV.FVMAIN_COMPACT]
411 FvNameGuid = 48DB5E17-707C-472D-91CD-1613E7EF51B0
412 FvAlignment = 16
413 ERASE_POLARITY = 1
414 MEMORY_MAPPED = TRUE
415 STICKY_WRITE = TRUE
416 LOCK_CAP = TRUE
417 LOCK_STATUS = TRUE
418 WRITE_DISABLED_CAP = TRUE
419 WRITE_ENABLED_CAP = TRUE
420 WRITE_STATUS = TRUE
421 WRITE_LOCK_CAP = TRUE
422 WRITE_LOCK_STATUS = TRUE
423 READ_DISABLED_CAP = TRUE
424 READ_ENABLED_CAP = TRUE
425 READ_STATUS = TRUE
426 READ_LOCK_CAP = TRUE
427 READ_LOCK_STATUS = TRUE
428
429 FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {
430 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {
431 #
432 # These firmware volumes will have files placed in them uncompressed,
433 # and then both firmware volumes will be compressed in a single
434 # compression operation in order to achieve better overall compression.
435 #
436 SECTION FV_IMAGE = PEIFV
437 SECTION FV_IMAGE = DXEFV
438 }
439 }
440
441 !include FvmainCompactScratchEnd.fdf.inc
442
443 ################################################################################
444
445 [Rule.Common.SEC]
446 FILE SEC = $(NAMED_GUID) {
447 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
448 UI STRING ="$(MODULE_NAME)" Optional
449 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
450 }
451
452 [Rule.Common.PEI_CORE]
453 FILE PEI_CORE = $(NAMED_GUID) {
454 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi
455 UI STRING ="$(MODULE_NAME)" Optional
456 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
457 }
458
459 [Rule.Common.PEIM]
460 FILE PEIM = $(NAMED_GUID) {
461 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
462 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi
463 UI STRING="$(MODULE_NAME)" Optional
464 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
465 }
466
467 [Rule.Common.DXE_CORE]
468 FILE DXE_CORE = $(NAMED_GUID) {
469 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
470 UI STRING="$(MODULE_NAME)" Optional
471 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
472 }
473
474 [Rule.Common.DXE_DRIVER]
475 FILE DRIVER = $(NAMED_GUID) {
476 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
477 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
478 UI STRING="$(MODULE_NAME)" Optional
479 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
480 RAW ACPI Optional |.acpi
481 RAW ASL Optional |.aml
482 }
483
484 [Rule.Common.DXE_RUNTIME_DRIVER]
485 FILE DRIVER = $(NAMED_GUID) {
486 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
487 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
488 UI STRING="$(MODULE_NAME)" Optional
489 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
490 }
491
492 [Rule.Common.UEFI_DRIVER]
493 FILE DRIVER = $(NAMED_GUID) {
494 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
495 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
496 UI STRING="$(MODULE_NAME)" Optional
497 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
498 }
499
500 [Rule.Common.UEFI_DRIVER.BINARY]
501 FILE DRIVER = $(NAMED_GUID) {
502 DXE_DEPEX DXE_DEPEX Optional |.depex
503 PE32 PE32 |.efi
504 UI STRING="$(MODULE_NAME)" Optional
505 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
506 }
507
508 [Rule.Common.UEFI_APPLICATION]
509 FILE APPLICATION = $(NAMED_GUID) {
510 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
511 UI STRING="$(MODULE_NAME)" Optional
512 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
513 }
514
515 [Rule.Common.UEFI_APPLICATION.BINARY]
516 FILE APPLICATION = $(NAMED_GUID) {
517 PE32 PE32 |.efi
518 UI STRING="$(MODULE_NAME)" Optional
519 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
520 }
521
522 [Rule.Common.USER_DEFINED.CSM]
523 FILE FREEFORM = $(NAMED_GUID) {
524 RAW BIN |.bin
525 }
526
527 [Rule.Common.SEC.RESET_VECTOR]
528 FILE RAW = $(NAMED_GUID) {
529 RAW BIN Align = 16 |.bin
530 }
531
532 [Rule.Common.SMM_CORE]
533 FILE SMM_CORE = $(NAMED_GUID) {
534 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
535 UI STRING="$(MODULE_NAME)" Optional
536 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
537 }
538
539 [Rule.Common.DXE_SMM_DRIVER]
540 FILE SMM = $(NAMED_GUID) {
541 SMM_DEPEX SMM_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
542 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
543 UI STRING="$(MODULE_NAME)" Optional
544 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
545 }