]> git.proxmox.com Git - mirror_edk2.git/blob - OvmfPkg/OvmfPkgX64.fdf
OvmfPkg: Make the VirtIo devices use the new VIRTIO_DEVICE_PROTOCOL
[mirror_edk2.git] / OvmfPkg / OvmfPkgX64.fdf
1 ## @file
2 # Open Virtual Machine Firmware: FDF
3 #
4 # Copyright (c) 2006 - 2013, Intel Corporation. All rights reserved.<BR>
5 #
6 # This program and the accompanying materials
7 # are licensed and made available under the terms and conditions of the BSD License
8 # which accompanies this distribution. The full text of the license may be found at
9 # http://opensource.org/licenses/bsd-license.php
10 #
11 # THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
12 # WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
13 #
14 ##
15
16 ################################################################################
17
18 #
19 # Default flash size for DEBUG build is 2MB. For RELEASE it is 1MB.
20 #
21 # Defining FD_SIZE_1MB or FD_SIZE_2MB on the build command line can
22 # override this.
23 #
24 [Defines]
25 !if $(TARGET) == RELEASE
26 !ifndef $(FD_SIZE_2MB)
27 DEFINE FD_SIZE_1MB=
28 !endif
29 !endif
30
31 !ifdef $(FD_SIZE_1MB)
32 [FD.OVMF]
33 BaseAddress = 0xFFF00000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFdBaseAddress
34 Size = 0x00100000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareFdSize
35 ErasePolarity = 1
36 BlockSize = 0x1000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareBlockSize
37 NumBlocks = 0x100
38 !else
39 [FD.OVMF]
40 BaseAddress = 0xFFE00000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFdBaseAddress
41 Size = 0x00200000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareFdSize
42 ErasePolarity = 1
43 BlockSize = 0x1000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareBlockSize
44 NumBlocks = 0x200
45 !endif
46
47 0x00000000|0x0000e000
48 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize
49 #NV_VARIABLE_STORE
50 DATA = {
51 ## This is the EFI_FIRMWARE_VOLUME_HEADER
52 # ZeroVector []
53 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
54 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
55 # FileSystemGuid: gEfiSystemNvDataFvGuid =
56 # { 0xFFF12B8D, 0x7696, 0x4C8B,
57 # { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }}
58 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C,
59 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50,
60 # FvLength: 0x20000
61 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00,
62 # Signature "_FVH" # Attributes
63 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00,
64 # HeaderLength # CheckSum # ExtHeaderOffset #Reserved #Revision
65 0x48, 0x00, 0x19, 0xF9, 0x00, 0x00, 0x00, 0x02,
66 # Blockmap[0]: 0x20 Blocks * 0x1000 Bytes / Block
67 0x20, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00,
68 # Blockmap[1]: End
69 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
70 ## This is the VARIABLE_STORE_HEADER
71 !if $(SECURE_BOOT_ENABLE) == TRUE
72 # Signature: gEfiAuthenticatedVariableGuid =
73 # { 0xaaf32c78, 0x947b, 0x439a,
74 # { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }}
75 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43,
76 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92,
77 !else
78 # Signature: gEfiVariableGuid =
79 # { 0xddcf3616, 0x3275, 0x4164,
80 # { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }}
81 0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41,
82 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d,
83 !endif
84 # Size: 0xe000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) -
85 # 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0xdfb8
86 # This can speed up the Variable Dispatch a bit.
87 0xB8, 0xDF, 0x00, 0x00,
88 # FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32
89 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
90 }
91
92 0x0000e000|0x00001000
93 #NV_EVENT_LOG
94 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageEventLogBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageEventLogSize
95
96 0x0000f000|0x00001000
97 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize
98 #NV_FTW_WORKING
99 DATA = {
100 # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =
101 # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}
102 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,
103 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95,
104 # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved
105 0x2c, 0xaf, 0x2c, 0x64, 0xFE, 0xFF, 0xFF, 0xFF,
106 # WriteQueueSize: UINT64
107 0xE0, 0x0F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
108 }
109
110 0x00010000|0x00010000
111 #NV_FTW_SPARE
112 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize
113
114 !ifdef $(FD_SIZE_1MB)
115 0x00020000|0x000CC000
116 FV = FVMAIN_COMPACT
117
118 0x000EC000|0x14000
119 FV = SECFV
120
121 !else
122 0x00020000|0x001AC000
123 FV = FVMAIN_COMPACT
124
125 0x001CC000|0x34000
126 FV = SECFV
127 !endif
128
129 ################################################################################
130
131 [FD.MEMFD]
132 BaseAddress = 0x800000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfMemFvBase
133 Size = 0x800000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfMemFvSize
134 ErasePolarity = 1
135 BlockSize = 0x10000
136 NumBlocks = 0x80
137
138 0x0|0x800000
139 FV = MAINFV
140
141 ################################################################################
142
143 [FV.SECFV]
144 BlockSize = 0x1000
145 FvAlignment = 16
146 ERASE_POLARITY = 1
147 MEMORY_MAPPED = TRUE
148 STICKY_WRITE = TRUE
149 LOCK_CAP = TRUE
150 LOCK_STATUS = TRUE
151 WRITE_DISABLED_CAP = TRUE
152 WRITE_ENABLED_CAP = TRUE
153 WRITE_STATUS = TRUE
154 WRITE_LOCK_CAP = TRUE
155 WRITE_LOCK_STATUS = TRUE
156 READ_DISABLED_CAP = TRUE
157 READ_ENABLED_CAP = TRUE
158 READ_STATUS = TRUE
159 READ_LOCK_CAP = TRUE
160 READ_LOCK_STATUS = TRUE
161
162 #
163 # SEC Phase modules
164 #
165 # The code in this FV handles the initial firmware startup, and
166 # decompresses the MAINFV which handles the majority of the boot sequence.
167 #
168 INF OvmfPkg/Sec/SecMain.inf
169
170 INF RuleOverride=RESET_VECTOR OvmfPkg/ResetVector/Bin/ResetVector.inf
171
172 ################################################################################
173 [FV.MAINFV]
174 BlockSize = 0x10000
175 FvAlignment = 16
176 ERASE_POLARITY = 1
177 MEMORY_MAPPED = TRUE
178 STICKY_WRITE = TRUE
179 LOCK_CAP = TRUE
180 LOCK_STATUS = TRUE
181 WRITE_DISABLED_CAP = TRUE
182 WRITE_ENABLED_CAP = TRUE
183 WRITE_STATUS = TRUE
184 WRITE_LOCK_CAP = TRUE
185 WRITE_LOCK_STATUS = TRUE
186 READ_DISABLED_CAP = TRUE
187 READ_ENABLED_CAP = TRUE
188 READ_STATUS = TRUE
189 READ_LOCK_CAP = TRUE
190 READ_LOCK_STATUS = TRUE
191
192 #
193 # Files to be placed in MAIN FV
194 #
195 # This firmware volume will have files placed in it uncompressed,
196 # and then then entire firmware volume will be compressed in a
197 # single compression operation in order to achieve better
198 # overall compression.
199 #
200
201 APRIORI PEI {
202 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
203 }
204
205 #
206 # PEI Phase modules
207 #
208 INF MdeModulePkg/Core/Pei/PeiMain.inf
209 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
210 INF IntelFrameworkModulePkg/Universal/StatusCode/Pei/StatusCodePei.inf
211 INF OvmfPkg/PlatformPei/PlatformPei.inf
212 INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
213
214 FILE FV_IMAGE = A4EF5A93-3F1B-4232-A1C4-F0910E6D1D9C {
215 SECTION COMPRESS PI_NONE {
216 SECTION FV_IMAGE = DXEFV
217 }
218 }
219
220 ################################################################################
221
222 [FV.DXEFV]
223 BlockSize = 0x10000
224 FvAlignment = 16
225 ERASE_POLARITY = 1
226 MEMORY_MAPPED = TRUE
227 STICKY_WRITE = TRUE
228 LOCK_CAP = TRUE
229 LOCK_STATUS = TRUE
230 WRITE_DISABLED_CAP = TRUE
231 WRITE_ENABLED_CAP = TRUE
232 WRITE_STATUS = TRUE
233 WRITE_LOCK_CAP = TRUE
234 WRITE_LOCK_STATUS = TRUE
235 READ_DISABLED_CAP = TRUE
236 READ_ENABLED_CAP = TRUE
237 READ_STATUS = TRUE
238 READ_LOCK_CAP = TRUE
239 READ_LOCK_STATUS = TRUE
240
241 APRIORI DXE {
242 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
243 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
244 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
245 }
246
247 #
248 # DXE Phase modules
249 #
250 INF MdeModulePkg/Core/Dxe/DxeMain.inf
251
252 INF IntelFrameworkModulePkg/Universal/StatusCode/RuntimeDxe/StatusCodeRuntimeDxe.inf
253 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
254
255 INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
256 INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
257 INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
258 INF PcAtChipsetPkg/8259InterruptControllerDxe/8259.inf
259 INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf
260 INF UefiCpuPkg/CpuDxe/CpuDxe.inf
261 INF PcAtChipsetPkg/8254TimerDxe/8254Timer.inf
262 INF PcAtChipsetPkg/PciHostBridgeDxe/PciHostBridgeDxe.inf
263 INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf
264 INF PcAtChipsetPkg/KbcResetDxe/Reset.inf
265 INF MdeModulePkg/Universal/Metronome/Metronome.inf
266 INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf
267
268 INF OvmfPkg/BlockMmioToBlockIoDxe/BlockIo.inf
269 INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf
270 INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf
271 INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf
272 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
273 INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf
274 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
275
276 !if $(SECURE_BOOT_ENABLE) == TRUE
277 INF SecurityPkg/VariableAuthenticated/RuntimeDxe/VariableRuntimeDxe.inf
278 INF OvmfPkg/SecureBootConfigDxe/SecureBootConfigDxe.inf
279 !else
280 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
281 !endif
282
283 INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
284 INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
285 INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
286 INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
287 INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
288 INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
289 INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
290 INF IntelFrameworkModulePkg/Universal/BdsDxe/BdsDxe.inf
291 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
292 INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf
293 INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
294 INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
295 INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
296 INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
297 INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
298 INF IntelFrameworkModulePkg/Bus/Pci/IdeBusDxe/IdeBusDxe.inf
299 INF PcAtChipsetPkg/Bus/Pci/IdeControllerDxe/IdeControllerDxe.inf
300 INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
301 INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
302 INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
303 INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
304
305 INF PcAtChipsetPkg/IsaAcpiDxe/IsaAcpi.inf
306 INF IntelFrameworkModulePkg/Bus/Isa/IsaBusDxe/IsaBusDxe.inf
307
308 !ifndef $(SOURCE_DEBUG_ENABLE)
309 INF IntelFrameworkModulePkg/Bus/Isa/IsaSerialDxe/IsaSerialDxe.inf
310 !endif
311
312 INF IntelFrameworkModulePkg/Bus/Isa/Ps2KeyboardDxe/Ps2keyboardDxe.inf
313 INF IntelFrameworkModulePkg/Bus/Isa/IsaFloppyDxe/IsaFloppyDxe.inf
314
315 INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf
316 INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf
317
318 INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf
319 INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf
320 INF RuleOverride=ACPITABLE OvmfPkg/AcpiTables/AcpiTables.inf
321
322 INF RuleOverride = BINARY FatBinPkg/EnhancedFatDxe/Fat.inf
323
324 !ifndef $(USE_OLD_SHELL)
325 INF ShellPkg/Application/Shell/Shell.inf
326 !else
327 INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf
328 !endif
329
330 FILE FREEFORM = PCD(gEfiIntelFrameworkModulePkgTokenSpaceGuid.PcdLogoFile) {
331 SECTION RAW = MdeModulePkg/Logo/Logo.bmp
332 }
333
334 #
335 # Network modules
336 #
337 !if $(E1000_ENABLE)
338 FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {
339 SECTION PE32 = Intel3.5/EFIX64/E3507X2.EFI
340 }
341 !endif
342 INF MdeModulePkg/Universal/Network/SnpDxe/SnpDxe.inf
343 INF MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf
344 INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf
345 INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf
346 INF MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf
347 INF MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf
348 INF MdeModulePkg/Universal/Network/Ip4ConfigDxe/Ip4ConfigDxe.inf
349 INF MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf
350 INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf
351 INF MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
352 INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf
353 INF MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf
354 INF MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf
355 INF OvmfPkg/VirtioNetDxe/VirtioNet.inf
356
357 #
358 # Usb Support
359 #
360 INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf
361 INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf
362 INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf
363 INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf
364 INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf
365
366 !ifdef $(CSM_ENABLE)
367 INF IntelFrameworkModulePkg/Csm/BiosThunk/VideoDxe/VideoDxe.inf
368 INF IntelFrameworkModulePkg/Csm/LegacyBiosDxe/LegacyBiosDxe.inf
369 INF RuleOverride=CSM OvmfPkg/Csm/Csm16/Csm16.inf
370 !endif
371
372 INF OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
373
374 ################################################################################
375
376 [FV.FVMAIN_COMPACT]
377 FvAlignment = 16
378 ERASE_POLARITY = 1
379 MEMORY_MAPPED = TRUE
380 STICKY_WRITE = TRUE
381 LOCK_CAP = TRUE
382 LOCK_STATUS = TRUE
383 WRITE_DISABLED_CAP = TRUE
384 WRITE_ENABLED_CAP = TRUE
385 WRITE_STATUS = TRUE
386 WRITE_LOCK_CAP = TRUE
387 WRITE_LOCK_STATUS = TRUE
388 READ_DISABLED_CAP = TRUE
389 READ_ENABLED_CAP = TRUE
390 READ_STATUS = TRUE
391 READ_LOCK_CAP = TRUE
392 READ_LOCK_STATUS = TRUE
393
394 FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {
395 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {
396 SECTION FV_IMAGE = MAINFV
397 }
398 }
399
400 ################################################################################
401
402 [Rule.Common.SEC]
403 FILE SEC = $(NAMED_GUID) {
404 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
405 UI STRING ="$(MODULE_NAME)" Optional
406 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
407 }
408
409 [Rule.Common.PEI_CORE]
410 FILE PEI_CORE = $(NAMED_GUID) {
411 PE32 PE32 Align=32 $(INF_OUTPUT)/$(MODULE_NAME).efi
412 UI STRING ="$(MODULE_NAME)" Optional
413 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
414 }
415
416 [Rule.Common.PEIM]
417 FILE PEIM = $(NAMED_GUID) {
418 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
419 PE32 PE32 Align=32 $(INF_OUTPUT)/$(MODULE_NAME).efi
420 UI STRING="$(MODULE_NAME)" Optional
421 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
422 }
423
424 [Rule.Common.DXE_CORE]
425 FILE DXE_CORE = $(NAMED_GUID) {
426 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
427 UI STRING="$(MODULE_NAME)" Optional
428 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
429 }
430
431 [Rule.Common.DXE_DRIVER]
432 FILE DRIVER = $(NAMED_GUID) {
433 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
434 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
435 UI STRING="$(MODULE_NAME)" Optional
436 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
437 }
438
439 [Rule.Common.DXE_RUNTIME_DRIVER]
440 FILE DRIVER = $(NAMED_GUID) {
441 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
442 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
443 UI STRING="$(MODULE_NAME)" Optional
444 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
445 }
446
447 [Rule.Common.UEFI_DRIVER]
448 FILE DRIVER = $(NAMED_GUID) {
449 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
450 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
451 UI STRING="$(MODULE_NAME)" Optional
452 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
453 }
454
455 [Rule.Common.UEFI_DRIVER.BINARY]
456 FILE DRIVER = $(NAMED_GUID) {
457 DXE_DEPEX DXE_DEPEX Optional |.depex
458 PE32 PE32 |.efi
459 UI STRING="$(MODULE_NAME)" Optional
460 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
461 }
462
463 [Rule.Common.UEFI_APPLICATION]
464 FILE APPLICATION = $(NAMED_GUID) {
465 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
466 UI STRING="$(MODULE_NAME)" Optional
467 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
468 }
469
470 [Rule.Common.UEFI_APPLICATION.BINARY]
471 FILE APPLICATION = $(NAMED_GUID) {
472 PE32 PE32 |.efi
473 UI STRING="$(MODULE_NAME)" Optional
474 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
475 }
476
477 [Rule.Common.USER_DEFINED.ACPITABLE]
478 FILE FREEFORM = $(NAMED_GUID) {
479 RAW ACPI |.acpi
480 RAW ASL |.aml
481 }
482
483 [Rule.Common.USER_DEFINED.CSM]
484 FILE FREEFORM = $(NAMED_GUID) {
485 RAW BIN |.bin
486 }
487
488 [Rule.Common.SEC.RESET_VECTOR]
489 FILE RAW = $(NAMED_GUID) {
490 RAW RAW |.raw
491 }