]> git.proxmox.com Git - mirror_edk2.git/blob - OvmfPkg/OvmfPkgX64.fdf
aa9a83032d9bd8ca0965a43a02219c803327ecb1
[mirror_edk2.git] / OvmfPkg / OvmfPkgX64.fdf
1 ## @file
2 # Open Virtual Machine Firmware: FDF
3 #
4 # Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
5 # (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
6 #
7 # SPDX-License-Identifier: BSD-2-Clause-Patent
8 #
9 ##
10
11 ################################################################################
12
13 [Defines]
14 !include OvmfPkgDefines.fdf.inc
15
16 #
17 # Build the variable store and the firmware code as one unified flash device
18 # image.
19 #
20 [FD.OVMF]
21 BaseAddress = $(FW_BASE_ADDRESS)
22 Size = $(FW_SIZE)
23 ErasePolarity = 1
24 BlockSize = $(BLOCK_SIZE)
25 NumBlocks = $(FW_BLOCKS)
26
27 !include VarStore.fdf.inc
28
29 $(VARS_SIZE)|$(FVMAIN_SIZE)
30 FV = FVMAIN_COMPACT
31
32 $(SECFV_OFFSET)|$(SECFV_SIZE)
33 FV = SECFV
34
35 #
36 # Build the variable store and the firmware code as separate flash device
37 # images.
38 #
39 [FD.OVMF_VARS]
40 BaseAddress = $(FW_BASE_ADDRESS)
41 Size = $(VARS_SIZE)
42 ErasePolarity = 1
43 BlockSize = $(BLOCK_SIZE)
44 NumBlocks = $(VARS_BLOCKS)
45
46 !include VarStore.fdf.inc
47
48 [FD.OVMF_CODE]
49 BaseAddress = $(CODE_BASE_ADDRESS)
50 Size = $(CODE_SIZE)
51 ErasePolarity = 1
52 BlockSize = $(BLOCK_SIZE)
53 NumBlocks = $(CODE_BLOCKS)
54
55 0x00000000|$(FVMAIN_SIZE)
56 FV = FVMAIN_COMPACT
57
58 $(FVMAIN_SIZE)|$(SECFV_SIZE)
59 FV = SECFV
60
61 ################################################################################
62
63 [FD.MEMFD]
64 BaseAddress = $(MEMFD_BASE_ADDRESS)
65 Size = 0xD00000
66 ErasePolarity = 1
67 BlockSize = 0x10000
68 NumBlocks = 0xD0
69
70 0x000000|0x006000
71 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize
72
73 0x006000|0x001000
74 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageSize
75
76 0x007000|0x001000
77 gEfiMdePkgTokenSpaceGuid.PcdGuidedExtractHandlerTableAddress|gUefiOvmfPkgTokenSpaceGuid.PcdGuidedExtractHandlerTableSize
78
79 0x008000|0x001000
80 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableSize
81
82 0x009000|0x002000
83 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbSize
84
85 0x00B000|0x001000
86 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize
87
88 0x00C000|0x001000
89 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupSize
90
91 0x00D000|0x001000
92 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsSize
93
94 0x00E000|0x001000
95 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidSize
96
97 0x010000|0x010000
98 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize
99
100 0x020000|0x0E0000
101 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvSize
102 FV = PEIFV
103
104 0x100000|0xC00000
105 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvSize
106 FV = DXEFV
107
108 ##########################################################################################
109 # Set the SEV-ES specific work area PCDs
110 #
111 SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaBase = $(MEMFD_BASE_ADDRESS) + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader
112 SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaSize = gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize - gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader
113 ##########################################################################################
114
115 ################################################################################
116
117 [FV.SECFV]
118 FvNameGuid = 763BED0D-DE9F-48F5-81F1-3E90E1B1A015
119 BlockSize = 0x1000
120 FvAlignment = 16
121 ERASE_POLARITY = 1
122 MEMORY_MAPPED = TRUE
123 STICKY_WRITE = TRUE
124 LOCK_CAP = TRUE
125 LOCK_STATUS = TRUE
126 WRITE_DISABLED_CAP = TRUE
127 WRITE_ENABLED_CAP = TRUE
128 WRITE_STATUS = TRUE
129 WRITE_LOCK_CAP = TRUE
130 WRITE_LOCK_STATUS = TRUE
131 READ_DISABLED_CAP = TRUE
132 READ_ENABLED_CAP = TRUE
133 READ_STATUS = TRUE
134 READ_LOCK_CAP = TRUE
135 READ_LOCK_STATUS = TRUE
136
137 #
138 # SEC Phase modules
139 #
140 # The code in this FV handles the initial firmware startup, and
141 # decompresses the PEI and DXE FVs which handles the rest of the boot sequence.
142 #
143 INF OvmfPkg/Sec/SecMain.inf
144
145 INF RuleOverride=RESET_VECTOR OvmfPkg/ResetVector/ResetVector.inf
146
147 ################################################################################
148 [FV.PEIFV]
149 FvNameGuid = 6938079B-B503-4E3D-9D24-B28337A25806
150 BlockSize = 0x10000
151 FvAlignment = 16
152 ERASE_POLARITY = 1
153 MEMORY_MAPPED = TRUE
154 STICKY_WRITE = TRUE
155 LOCK_CAP = TRUE
156 LOCK_STATUS = TRUE
157 WRITE_DISABLED_CAP = TRUE
158 WRITE_ENABLED_CAP = TRUE
159 WRITE_STATUS = TRUE
160 WRITE_LOCK_CAP = TRUE
161 WRITE_LOCK_STATUS = TRUE
162 READ_DISABLED_CAP = TRUE
163 READ_ENABLED_CAP = TRUE
164 READ_STATUS = TRUE
165 READ_LOCK_CAP = TRUE
166 READ_LOCK_STATUS = TRUE
167
168 APRIORI PEI {
169 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
170 }
171
172 #
173 # PEI Phase modules
174 #
175 INF MdeModulePkg/Core/Pei/PeiMain.inf
176 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
177 INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf
178 INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf
179 INF OvmfPkg/PlatformPei/PlatformPei.inf
180 INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
181 INF UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf
182 !if $(SMM_REQUIRE) == TRUE
183 INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf
184 INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf
185 INF OvmfPkg/SmmAccess/SmmAccessPei.inf
186 !endif
187 INF UefiCpuPkg/CpuMpPei/CpuMpPei.inf
188 INF FILE_GUID = $(UP_CPU_PEI_GUID) UefiCpuPkg/CpuMpPei/CpuMpPei.inf
189
190 !include OvmfPkg/OvmfTpmPei.fdf.inc
191
192 ################################################################################
193
194 [FV.DXEFV]
195 FvForceRebase = FALSE
196 FvNameGuid = 7CB8BDC9-F8EB-4F34-AAEA-3EE4AF6516A1
197 BlockSize = 0x10000
198 FvAlignment = 16
199 ERASE_POLARITY = 1
200 MEMORY_MAPPED = TRUE
201 STICKY_WRITE = TRUE
202 LOCK_CAP = TRUE
203 LOCK_STATUS = TRUE
204 WRITE_DISABLED_CAP = TRUE
205 WRITE_ENABLED_CAP = TRUE
206 WRITE_STATUS = TRUE
207 WRITE_LOCK_CAP = TRUE
208 WRITE_LOCK_STATUS = TRUE
209 READ_DISABLED_CAP = TRUE
210 READ_ENABLED_CAP = TRUE
211 READ_STATUS = TRUE
212 READ_LOCK_CAP = TRUE
213 READ_LOCK_STATUS = TRUE
214
215 APRIORI DXE {
216 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
217 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
218 # AmdSevDxe must be loaded before TdxDxe. Because in SEV guest AmdSevDxe
219 # driver performs a MemEncryptSevClearMmioPageEncMask() call against the
220 # PcdPciExpressBaseAddress range to mark it shared/unencrypted.
221 # Otherwise #VC handler terminates the guest for trying to do MMIO to an
222 # encrypted region (Since the range has not been marked shared/unencrypted).
223 INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf
224 INF OvmfPkg/TdxDxe/TdxDxe.inf
225 !if $(SMM_REQUIRE) == FALSE
226 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
227 !endif
228 }
229
230 #
231 # DXE Phase modules
232 #
233 INF MdeModulePkg/Core/Dxe/DxeMain.inf
234
235 INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf
236 INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf
237 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
238
239 INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
240 INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
241 INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
242 INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf
243
244 INF UefiCpuPkg/CpuDxe/CpuDxe.inf
245 INF FILE_GUID = $(UP_CPU_DXE_GUID) UefiCpuPkg/CpuDxe/CpuDxe.inf
246
247 !ifdef $(CSM_ENABLE)
248 INF OvmfPkg/8259InterruptControllerDxe/8259.inf
249 INF OvmfPkg/8254TimerDxe/8254Timer.inf
250 !else
251 INF OvmfPkg/LocalApicTimerDxe/LocalApicTimerDxe.inf
252 !endif
253 INF OvmfPkg/IncompatiblePciDeviceSupportDxe/IncompatiblePciDeviceSupport.inf
254 INF OvmfPkg/PciHotPlugInitDxe/PciHotPlugInit.inf
255 INF MdeModulePkg/Bus/Pci/PciHostBridgeDxe/PciHostBridgeDxe.inf
256 INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf
257 INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf
258 INF MdeModulePkg/Universal/Metronome/Metronome.inf
259 INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf
260
261 INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf
262 INF OvmfPkg/Virtio10Dxe/Virtio10.inf
263 INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf
264 INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf
265 INF OvmfPkg/VirtioRngDxe/VirtioRng.inf
266 !if $(PVSCSI_ENABLE) == TRUE
267 INF OvmfPkg/PvScsiDxe/PvScsiDxe.inf
268 !endif
269 !if $(MPT_SCSI_ENABLE) == TRUE
270 INF OvmfPkg/MptScsiDxe/MptScsiDxe.inf
271 !endif
272 !if $(LSI_SCSI_ENABLE) == TRUE
273 INF OvmfPkg/LsiScsiDxe/LsiScsiDxe.inf
274 !endif
275
276 !if $(SECURE_BOOT_ENABLE) == TRUE
277 INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
278 !endif
279
280 INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
281 INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
282 INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
283 INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
284 INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
285 INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
286 INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
287 INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
288 INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
289 INF MdeModulePkg/Application/UiApp/UiApp.inf
290 INF OvmfPkg/QemuKernelLoaderFsDxe/QemuKernelLoaderFsDxe.inf
291 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
292 INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
293 INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
294 INF MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskDxe.inf
295 INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
296 INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
297 INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
298 INF OvmfPkg/SataControllerDxe/SataControllerDxe.inf
299 INF MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf
300 INF MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf
301 INF MdeModulePkg/Bus/Pci/NvmExpressDxe/NvmExpressDxe.inf
302 INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
303 INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
304 INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
305 INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
306
307 INF OvmfPkg/SioBusDxe/SioBusDxe.inf
308 !if $(SOURCE_DEBUG_ENABLE) == FALSE
309 INF MdeModulePkg/Bus/Pci/PciSioSerialDxe/PciSioSerialDxe.inf
310 !endif
311 INF MdeModulePkg/Bus/Isa/Ps2KeyboardDxe/Ps2KeyboardDxe.inf
312
313 INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf
314 INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf
315
316 INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf
317 INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf
318 INF MdeModulePkg/Universal/Acpi/S3SaveStateDxe/S3SaveStateDxe.inf
319 INF MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe/BootScriptExecutorDxe.inf
320 INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResourceTableDxe.inf
321
322 INF FatPkg/EnhancedFatDxe/Fat.inf
323 INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
324 INF OvmfPkg/VirtioFsDxe/VirtioFsDxe.inf
325
326 !if $(TOOL_CHAIN_TAG) != "XCODE5"
327 INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
328 INF ShellPkg/DynamicCommand/HttpDynamicCommand/HttpDynamicCommand.inf
329 INF OvmfPkg/LinuxInitrdDynamicShellCommand/LinuxInitrdDynamicShellCommand.inf
330 !endif
331 INF ShellPkg/Application/Shell/Shell.inf
332
333 INF MdeModulePkg/Logo/LogoDxe.inf
334
335 INF OvmfPkg/TdxDxe/TdxDxe.inf
336
337 #
338 # Network modules
339 #
340 !if $(E1000_ENABLE)
341 FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {
342 SECTION PE32 = Intel3.5/EFIX64/E3522X2.EFI
343 }
344 !endif
345 !include NetworkPkg/Network.fdf.inc
346 INF OvmfPkg/VirtioNetDxe/VirtioNet.inf
347
348 #
349 # Usb Support
350 #
351 INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf
352 INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf
353 INF MdeModulePkg/Bus/Pci/XhciDxe/XhciDxe.inf
354 INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf
355 INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf
356 INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf
357
358 !ifdef $(CSM_ENABLE)
359 INF OvmfPkg/Csm/BiosThunk/VideoDxe/VideoDxe.inf
360 INF OvmfPkg/Csm/LegacyBiosDxe/LegacyBiosDxe.inf
361 INF RuleOverride=CSM OvmfPkg/Csm/Csm16/Csm16.inf
362 !else
363 INF OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
364 !endif
365
366 INF OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
367 INF OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
368 INF OvmfPkg/PlatformDxe/Platform.inf
369 INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf
370 INF OvmfPkg/IoMmuDxe/IoMmuDxe.inf
371
372 !if $(SMM_REQUIRE) == TRUE
373 INF OvmfPkg/SmmAccess/SmmAccess2Dxe.inf
374 INF OvmfPkg/SmmControl2Dxe/SmmControl2Dxe.inf
375 INF OvmfPkg/CpuS3DataDxe/CpuS3DataDxe.inf
376 INF MdeModulePkg/Core/PiSmmCore/PiSmmIpl.inf
377 INF MdeModulePkg/Core/PiSmmCore/PiSmmCore.inf
378 INF OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf
379 INF UefiCpuPkg/CpuIo2Smm/CpuIo2Smm.inf
380 INF MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBox.inf
381 INF UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf
382
383 #
384 # Variable driver stack (SMM)
385 #
386 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesSmm.inf
387 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteSmm.inf
388 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmm.inf
389 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmmRuntimeDxe.inf
390
391 !else
392
393 #
394 # Variable driver stack (non-SMM)
395 #
396 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
397 INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf
398 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
399 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
400 !endif
401
402 #
403 # TPM support
404 #
405 !include OvmfPkg/OvmfTpmDxe.fdf.inc
406
407 ################################################################################
408
409 [FV.FVMAIN_COMPACT]
410 FvNameGuid = 48DB5E17-707C-472D-91CD-1613E7EF51B0
411 FvAlignment = 16
412 ERASE_POLARITY = 1
413 MEMORY_MAPPED = TRUE
414 STICKY_WRITE = TRUE
415 LOCK_CAP = TRUE
416 LOCK_STATUS = TRUE
417 WRITE_DISABLED_CAP = TRUE
418 WRITE_ENABLED_CAP = TRUE
419 WRITE_STATUS = TRUE
420 WRITE_LOCK_CAP = TRUE
421 WRITE_LOCK_STATUS = TRUE
422 READ_DISABLED_CAP = TRUE
423 READ_ENABLED_CAP = TRUE
424 READ_STATUS = TRUE
425 READ_LOCK_CAP = TRUE
426 READ_LOCK_STATUS = TRUE
427
428 FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {
429 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {
430 #
431 # These firmware volumes will have files placed in them uncompressed,
432 # and then both firmware volumes will be compressed in a single
433 # compression operation in order to achieve better overall compression.
434 #
435 SECTION FV_IMAGE = PEIFV
436 SECTION FV_IMAGE = DXEFV
437 }
438 }
439
440 !include FvmainCompactScratchEnd.fdf.inc
441
442 ################################################################################
443
444 [Rule.Common.SEC]
445 FILE SEC = $(NAMED_GUID) {
446 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
447 UI STRING ="$(MODULE_NAME)" Optional
448 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
449 }
450
451 [Rule.Common.PEI_CORE]
452 FILE PEI_CORE = $(NAMED_GUID) {
453 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi
454 UI STRING ="$(MODULE_NAME)" Optional
455 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
456 }
457
458 [Rule.Common.PEIM]
459 FILE PEIM = $(NAMED_GUID) {
460 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
461 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi
462 UI STRING="$(MODULE_NAME)" Optional
463 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
464 }
465
466 [Rule.Common.DXE_CORE]
467 FILE DXE_CORE = $(NAMED_GUID) {
468 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
469 UI STRING="$(MODULE_NAME)" Optional
470 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
471 }
472
473 [Rule.Common.DXE_DRIVER]
474 FILE DRIVER = $(NAMED_GUID) {
475 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
476 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
477 UI STRING="$(MODULE_NAME)" Optional
478 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
479 RAW ACPI Optional |.acpi
480 RAW ASL Optional |.aml
481 }
482
483 [Rule.Common.DXE_RUNTIME_DRIVER]
484 FILE DRIVER = $(NAMED_GUID) {
485 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
486 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
487 UI STRING="$(MODULE_NAME)" Optional
488 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
489 }
490
491 [Rule.Common.UEFI_DRIVER]
492 FILE DRIVER = $(NAMED_GUID) {
493 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
494 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
495 UI STRING="$(MODULE_NAME)" Optional
496 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
497 }
498
499 [Rule.Common.UEFI_DRIVER.BINARY]
500 FILE DRIVER = $(NAMED_GUID) {
501 DXE_DEPEX DXE_DEPEX Optional |.depex
502 PE32 PE32 |.efi
503 UI STRING="$(MODULE_NAME)" Optional
504 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
505 }
506
507 [Rule.Common.UEFI_APPLICATION]
508 FILE APPLICATION = $(NAMED_GUID) {
509 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
510 UI STRING="$(MODULE_NAME)" Optional
511 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
512 }
513
514 [Rule.Common.UEFI_APPLICATION.BINARY]
515 FILE APPLICATION = $(NAMED_GUID) {
516 PE32 PE32 |.efi
517 UI STRING="$(MODULE_NAME)" Optional
518 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
519 }
520
521 [Rule.Common.USER_DEFINED.CSM]
522 FILE FREEFORM = $(NAMED_GUID) {
523 RAW BIN |.bin
524 }
525
526 [Rule.Common.SEC.RESET_VECTOR]
527 FILE RAW = $(NAMED_GUID) {
528 RAW BIN Align = 16 |.bin
529 }
530
531 [Rule.Common.SMM_CORE]
532 FILE SMM_CORE = $(NAMED_GUID) {
533 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
534 UI STRING="$(MODULE_NAME)" Optional
535 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
536 }
537
538 [Rule.Common.DXE_SMM_DRIVER]
539 FILE SMM = $(NAMED_GUID) {
540 SMM_DEPEX SMM_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
541 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
542 UI STRING="$(MODULE_NAME)" Optional
543 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
544 }