]> git.proxmox.com Git - mirror_edk2.git/blob - OvmfPkg/OvmfPkgX64.fdf
6e72cdf3453e2484bd4ed010d8dc021496160030
[mirror_edk2.git] / OvmfPkg / OvmfPkgX64.fdf
1 ## @file
2 # Open Virtual Machine Firmware: FDF
3 #
4 # Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
5 # (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
6 #
7 # SPDX-License-Identifier: BSD-2-Clause-Patent
8 #
9 ##
10
11 ################################################################################
12
13 [Defines]
14 !include OvmfPkgDefines.fdf.inc
15
16 #
17 # Build the variable store and the firmware code as one unified flash device
18 # image.
19 #
20 [FD.OVMF]
21 BaseAddress = $(FW_BASE_ADDRESS)
22 Size = $(FW_SIZE)
23 ErasePolarity = 1
24 BlockSize = $(BLOCK_SIZE)
25 NumBlocks = $(FW_BLOCKS)
26
27 !include VarStore.fdf.inc
28
29 $(VARS_SIZE)|$(FVMAIN_SIZE)
30 FV = FVMAIN_COMPACT
31
32 $(SECFV_OFFSET)|$(SECFV_SIZE)
33 FV = SECFV
34
35 #
36 # Build the variable store and the firmware code as separate flash device
37 # images.
38 #
39 [FD.OVMF_VARS]
40 BaseAddress = $(FW_BASE_ADDRESS)
41 Size = $(VARS_SIZE)
42 ErasePolarity = 1
43 BlockSize = $(BLOCK_SIZE)
44 NumBlocks = $(VARS_BLOCKS)
45
46 !include VarStore.fdf.inc
47
48 [FD.OVMF_CODE]
49 BaseAddress = $(CODE_BASE_ADDRESS)
50 Size = $(CODE_SIZE)
51 ErasePolarity = 1
52 BlockSize = $(BLOCK_SIZE)
53 NumBlocks = $(CODE_BLOCKS)
54
55 0x00000000|$(FVMAIN_SIZE)
56 FV = FVMAIN_COMPACT
57
58 $(FVMAIN_SIZE)|$(SECFV_SIZE)
59 FV = SECFV
60
61 ################################################################################
62
63 [FD.MEMFD]
64 BaseAddress = $(MEMFD_BASE_ADDRESS)
65 Size = 0xD00000
66 ErasePolarity = 1
67 BlockSize = 0x10000
68 NumBlocks = 0xD0
69
70 0x000000|0x006000
71 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize
72
73 0x006000|0x001000
74 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageSize
75
76 0x007000|0x001000
77 gEfiMdePkgTokenSpaceGuid.PcdGuidedExtractHandlerTableAddress|gUefiOvmfPkgTokenSpaceGuid.PcdGuidedExtractHandlerTableSize
78
79 0x008000|0x001000
80 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableSize
81
82 0x009000|0x002000
83 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbSize
84
85 0x00B000|0x001000
86 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize
87
88 0x00C000|0x001000
89 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupSize
90
91 0x00D000|0x001000
92 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsSize
93
94 0x00E000|0x001000
95 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidSize
96
97 0x010000|0x010000
98 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize
99
100 0x020000|0x0E0000
101 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvSize
102 FV = PEIFV
103
104 0x100000|0xC00000
105 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvSize
106 FV = DXEFV
107
108 ##########################################################################################
109 # Set the SEV-ES specific work area PCDs
110 #
111 SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaBase = $(MEMFD_BASE_ADDRESS) + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader
112 SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaSize = gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize - gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader
113 ##########################################################################################
114
115 ################################################################################
116
117 [FV.SECFV]
118 FvNameGuid = 763BED0D-DE9F-48F5-81F1-3E90E1B1A015
119 BlockSize = 0x1000
120 FvAlignment = 16
121 ERASE_POLARITY = 1
122 MEMORY_MAPPED = TRUE
123 STICKY_WRITE = TRUE
124 LOCK_CAP = TRUE
125 LOCK_STATUS = TRUE
126 WRITE_DISABLED_CAP = TRUE
127 WRITE_ENABLED_CAP = TRUE
128 WRITE_STATUS = TRUE
129 WRITE_LOCK_CAP = TRUE
130 WRITE_LOCK_STATUS = TRUE
131 READ_DISABLED_CAP = TRUE
132 READ_ENABLED_CAP = TRUE
133 READ_STATUS = TRUE
134 READ_LOCK_CAP = TRUE
135 READ_LOCK_STATUS = TRUE
136
137 #
138 # SEC Phase modules
139 #
140 # The code in this FV handles the initial firmware startup, and
141 # decompresses the PEI and DXE FVs which handles the rest of the boot sequence.
142 #
143 INF OvmfPkg/Sec/SecMain.inf
144
145 INF RuleOverride=RESET_VECTOR OvmfPkg/ResetVector/ResetVector.inf
146
147 ################################################################################
148 [FV.PEIFV]
149 FvNameGuid = 6938079B-B503-4E3D-9D24-B28337A25806
150 BlockSize = 0x10000
151 FvAlignment = 16
152 ERASE_POLARITY = 1
153 MEMORY_MAPPED = TRUE
154 STICKY_WRITE = TRUE
155 LOCK_CAP = TRUE
156 LOCK_STATUS = TRUE
157 WRITE_DISABLED_CAP = TRUE
158 WRITE_ENABLED_CAP = TRUE
159 WRITE_STATUS = TRUE
160 WRITE_LOCK_CAP = TRUE
161 WRITE_LOCK_STATUS = TRUE
162 READ_DISABLED_CAP = TRUE
163 READ_ENABLED_CAP = TRUE
164 READ_STATUS = TRUE
165 READ_LOCK_CAP = TRUE
166 READ_LOCK_STATUS = TRUE
167
168 APRIORI PEI {
169 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
170 }
171
172 #
173 # PEI Phase modules
174 #
175 INF MdeModulePkg/Core/Pei/PeiMain.inf
176 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
177 INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf
178 INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf
179 INF OvmfPkg/PlatformPei/PlatformPei.inf
180 INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
181 INF UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf
182 !if $(SMM_REQUIRE) == TRUE
183 INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf
184 INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf
185 INF OvmfPkg/SmmAccess/SmmAccessPei.inf
186 !endif
187 INF UefiCpuPkg/CpuMpPei/CpuMpPei.inf
188
189 !include OvmfPkg/OvmfTpmPei.fdf.inc
190
191 ################################################################################
192
193 [FV.DXEFV]
194 FvForceRebase = FALSE
195 FvNameGuid = 7CB8BDC9-F8EB-4F34-AAEA-3EE4AF6516A1
196 BlockSize = 0x10000
197 FvAlignment = 16
198 ERASE_POLARITY = 1
199 MEMORY_MAPPED = TRUE
200 STICKY_WRITE = TRUE
201 LOCK_CAP = TRUE
202 LOCK_STATUS = TRUE
203 WRITE_DISABLED_CAP = TRUE
204 WRITE_ENABLED_CAP = TRUE
205 WRITE_STATUS = TRUE
206 WRITE_LOCK_CAP = TRUE
207 WRITE_LOCK_STATUS = TRUE
208 READ_DISABLED_CAP = TRUE
209 READ_ENABLED_CAP = TRUE
210 READ_STATUS = TRUE
211 READ_LOCK_CAP = TRUE
212 READ_LOCK_STATUS = TRUE
213
214 APRIORI DXE {
215 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
216 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
217 # AmdSevDxe must be loaded before TdxDxe. Because in SEV guest AmdSevDxe
218 # driver performs a MemEncryptSevClearMmioPageEncMask() call against the
219 # PcdPciExpressBaseAddress range to mark it shared/unencrypted.
220 # Otherwise #VC handler terminates the guest for trying to do MMIO to an
221 # encrypted region (Since the range has not been marked shared/unencrypted).
222 INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf
223 INF OvmfPkg/TdxDxe/TdxDxe.inf
224 !if $(SMM_REQUIRE) == FALSE
225 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
226 !endif
227 }
228
229 #
230 # DXE Phase modules
231 #
232 INF MdeModulePkg/Core/Dxe/DxeMain.inf
233
234 INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf
235 INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf
236 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
237
238 INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
239 INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
240 INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
241 INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf
242 INF UefiCpuPkg/CpuDxe/CpuDxe.inf
243 !ifdef $(CSM_ENABLE)
244 INF OvmfPkg/8259InterruptControllerDxe/8259.inf
245 INF OvmfPkg/8254TimerDxe/8254Timer.inf
246 !else
247 INF OvmfPkg/LocalApicTimerDxe/LocalApicTimerDxe.inf
248 !endif
249 INF OvmfPkg/IncompatiblePciDeviceSupportDxe/IncompatiblePciDeviceSupport.inf
250 INF OvmfPkg/PciHotPlugInitDxe/PciHotPlugInit.inf
251 INF MdeModulePkg/Bus/Pci/PciHostBridgeDxe/PciHostBridgeDxe.inf
252 INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf
253 INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf
254 INF MdeModulePkg/Universal/Metronome/Metronome.inf
255 INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf
256
257 INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf
258 INF OvmfPkg/Virtio10Dxe/Virtio10.inf
259 INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf
260 INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf
261 INF OvmfPkg/VirtioRngDxe/VirtioRng.inf
262 !if $(PVSCSI_ENABLE) == TRUE
263 INF OvmfPkg/PvScsiDxe/PvScsiDxe.inf
264 !endif
265 !if $(MPT_SCSI_ENABLE) == TRUE
266 INF OvmfPkg/MptScsiDxe/MptScsiDxe.inf
267 !endif
268 !if $(LSI_SCSI_ENABLE) == TRUE
269 INF OvmfPkg/LsiScsiDxe/LsiScsiDxe.inf
270 !endif
271
272 !if $(SECURE_BOOT_ENABLE) == TRUE
273 INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
274 !endif
275
276 INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
277 INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
278 INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
279 INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
280 INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
281 INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
282 INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
283 INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
284 INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
285 INF MdeModulePkg/Application/UiApp/UiApp.inf
286 INF OvmfPkg/QemuKernelLoaderFsDxe/QemuKernelLoaderFsDxe.inf
287 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
288 INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
289 INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
290 INF MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskDxe.inf
291 INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
292 INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
293 INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
294 INF OvmfPkg/SataControllerDxe/SataControllerDxe.inf
295 INF MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf
296 INF MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf
297 INF MdeModulePkg/Bus/Pci/NvmExpressDxe/NvmExpressDxe.inf
298 INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
299 INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
300 INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
301 INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
302
303 INF OvmfPkg/SioBusDxe/SioBusDxe.inf
304 !if $(SOURCE_DEBUG_ENABLE) == FALSE
305 INF MdeModulePkg/Bus/Pci/PciSioSerialDxe/PciSioSerialDxe.inf
306 !endif
307 INF MdeModulePkg/Bus/Isa/Ps2KeyboardDxe/Ps2KeyboardDxe.inf
308
309 INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf
310 INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf
311
312 INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf
313 INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf
314 INF MdeModulePkg/Universal/Acpi/S3SaveStateDxe/S3SaveStateDxe.inf
315 INF MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe/BootScriptExecutorDxe.inf
316 INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResourceTableDxe.inf
317
318 INF FatPkg/EnhancedFatDxe/Fat.inf
319 INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
320 INF OvmfPkg/VirtioFsDxe/VirtioFsDxe.inf
321
322 !if $(TOOL_CHAIN_TAG) != "XCODE5"
323 INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
324 INF ShellPkg/DynamicCommand/HttpDynamicCommand/HttpDynamicCommand.inf
325 INF OvmfPkg/LinuxInitrdDynamicShellCommand/LinuxInitrdDynamicShellCommand.inf
326 !endif
327 INF ShellPkg/Application/Shell/Shell.inf
328
329 INF MdeModulePkg/Logo/LogoDxe.inf
330
331 INF OvmfPkg/TdxDxe/TdxDxe.inf
332
333 #
334 # Network modules
335 #
336 !if $(E1000_ENABLE)
337 FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {
338 SECTION PE32 = Intel3.5/EFIX64/E3522X2.EFI
339 }
340 !endif
341 !include NetworkPkg/Network.fdf.inc
342 INF OvmfPkg/VirtioNetDxe/VirtioNet.inf
343
344 #
345 # Usb Support
346 #
347 INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf
348 INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf
349 INF MdeModulePkg/Bus/Pci/XhciDxe/XhciDxe.inf
350 INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf
351 INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf
352 INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf
353
354 !ifdef $(CSM_ENABLE)
355 INF OvmfPkg/Csm/BiosThunk/VideoDxe/VideoDxe.inf
356 INF OvmfPkg/Csm/LegacyBiosDxe/LegacyBiosDxe.inf
357 INF RuleOverride=CSM OvmfPkg/Csm/Csm16/Csm16.inf
358 !else
359 INF OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
360 !endif
361
362 INF OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
363 INF OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
364 INF OvmfPkg/PlatformDxe/Platform.inf
365 INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf
366 INF OvmfPkg/IoMmuDxe/IoMmuDxe.inf
367
368 !if $(SMM_REQUIRE) == TRUE
369 INF OvmfPkg/SmmAccess/SmmAccess2Dxe.inf
370 INF OvmfPkg/SmmControl2Dxe/SmmControl2Dxe.inf
371 INF OvmfPkg/CpuS3DataDxe/CpuS3DataDxe.inf
372 INF MdeModulePkg/Core/PiSmmCore/PiSmmIpl.inf
373 INF MdeModulePkg/Core/PiSmmCore/PiSmmCore.inf
374 INF OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf
375 INF UefiCpuPkg/CpuIo2Smm/CpuIo2Smm.inf
376 INF MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBox.inf
377 INF UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf
378
379 #
380 # Variable driver stack (SMM)
381 #
382 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesSmm.inf
383 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteSmm.inf
384 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmm.inf
385 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmmRuntimeDxe.inf
386
387 !else
388
389 #
390 # Variable driver stack (non-SMM)
391 #
392 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
393 INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf
394 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
395 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
396 !endif
397
398 #
399 # TPM support
400 #
401 !include OvmfPkg/OvmfTpmDxe.fdf.inc
402
403 ################################################################################
404
405 [FV.FVMAIN_COMPACT]
406 FvNameGuid = 48DB5E17-707C-472D-91CD-1613E7EF51B0
407 FvAlignment = 16
408 ERASE_POLARITY = 1
409 MEMORY_MAPPED = TRUE
410 STICKY_WRITE = TRUE
411 LOCK_CAP = TRUE
412 LOCK_STATUS = TRUE
413 WRITE_DISABLED_CAP = TRUE
414 WRITE_ENABLED_CAP = TRUE
415 WRITE_STATUS = TRUE
416 WRITE_LOCK_CAP = TRUE
417 WRITE_LOCK_STATUS = TRUE
418 READ_DISABLED_CAP = TRUE
419 READ_ENABLED_CAP = TRUE
420 READ_STATUS = TRUE
421 READ_LOCK_CAP = TRUE
422 READ_LOCK_STATUS = TRUE
423
424 FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {
425 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {
426 #
427 # These firmware volumes will have files placed in them uncompressed,
428 # and then both firmware volumes will be compressed in a single
429 # compression operation in order to achieve better overall compression.
430 #
431 SECTION FV_IMAGE = PEIFV
432 SECTION FV_IMAGE = DXEFV
433 }
434 }
435
436 !include FvmainCompactScratchEnd.fdf.inc
437
438 ################################################################################
439
440 [Rule.Common.SEC]
441 FILE SEC = $(NAMED_GUID) {
442 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
443 UI STRING ="$(MODULE_NAME)" Optional
444 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
445 }
446
447 [Rule.Common.PEI_CORE]
448 FILE PEI_CORE = $(NAMED_GUID) {
449 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi
450 UI STRING ="$(MODULE_NAME)" Optional
451 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
452 }
453
454 [Rule.Common.PEIM]
455 FILE PEIM = $(NAMED_GUID) {
456 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
457 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi
458 UI STRING="$(MODULE_NAME)" Optional
459 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
460 }
461
462 [Rule.Common.DXE_CORE]
463 FILE DXE_CORE = $(NAMED_GUID) {
464 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
465 UI STRING="$(MODULE_NAME)" Optional
466 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
467 }
468
469 [Rule.Common.DXE_DRIVER]
470 FILE DRIVER = $(NAMED_GUID) {
471 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
472 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
473 UI STRING="$(MODULE_NAME)" Optional
474 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
475 RAW ACPI Optional |.acpi
476 RAW ASL Optional |.aml
477 }
478
479 [Rule.Common.DXE_RUNTIME_DRIVER]
480 FILE DRIVER = $(NAMED_GUID) {
481 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
482 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
483 UI STRING="$(MODULE_NAME)" Optional
484 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
485 }
486
487 [Rule.Common.UEFI_DRIVER]
488 FILE DRIVER = $(NAMED_GUID) {
489 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
490 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
491 UI STRING="$(MODULE_NAME)" Optional
492 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
493 }
494
495 [Rule.Common.UEFI_DRIVER.BINARY]
496 FILE DRIVER = $(NAMED_GUID) {
497 DXE_DEPEX DXE_DEPEX Optional |.depex
498 PE32 PE32 |.efi
499 UI STRING="$(MODULE_NAME)" Optional
500 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
501 }
502
503 [Rule.Common.UEFI_APPLICATION]
504 FILE APPLICATION = $(NAMED_GUID) {
505 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
506 UI STRING="$(MODULE_NAME)" Optional
507 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
508 }
509
510 [Rule.Common.UEFI_APPLICATION.BINARY]
511 FILE APPLICATION = $(NAMED_GUID) {
512 PE32 PE32 |.efi
513 UI STRING="$(MODULE_NAME)" Optional
514 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
515 }
516
517 [Rule.Common.USER_DEFINED.CSM]
518 FILE FREEFORM = $(NAMED_GUID) {
519 RAW BIN |.bin
520 }
521
522 [Rule.Common.SEC.RESET_VECTOR]
523 FILE RAW = $(NAMED_GUID) {
524 RAW BIN Align = 16 |.bin
525 }
526
527 [Rule.Common.SMM_CORE]
528 FILE SMM_CORE = $(NAMED_GUID) {
529 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
530 UI STRING="$(MODULE_NAME)" Optional
531 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
532 }
533
534 [Rule.Common.DXE_SMM_DRIVER]
535 FILE SMM = $(NAMED_GUID) {
536 SMM_DEPEX SMM_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
537 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
538 UI STRING="$(MODULE_NAME)" Optional
539 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
540 }