]> git.proxmox.com Git - mirror_edk2.git/blob - OvmfPkg/OvmfPkgX64.fdf
OvmfPkg: Add section of memory to use for PEI on S3 resume
[mirror_edk2.git] / OvmfPkg / OvmfPkgX64.fdf
1 ## @file
2 # Open Virtual Machine Firmware: FDF
3 #
4 # Copyright (c) 2006 - 2013, Intel Corporation. All rights reserved.<BR>
5 #
6 # This program and the accompanying materials
7 # are licensed and made available under the terms and conditions of the BSD License
8 # which accompanies this distribution. The full text of the license may be found at
9 # http://opensource.org/licenses/bsd-license.php
10 #
11 # THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
12 # WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
13 #
14 ##
15
16 ################################################################################
17
18 #
19 # Default flash size for DEBUG build is 2MB. For RELEASE it is 1MB.
20 #
21 # Defining FD_SIZE_1MB or FD_SIZE_2MB on the build command line can
22 # override this.
23 #
24 [Defines]
25 !if $(TARGET) == RELEASE
26 !ifndef $(FD_SIZE_2MB)
27 DEFINE FD_SIZE_1MB=
28 !endif
29 !endif
30
31 !ifdef $(FD_SIZE_1MB)
32 [FD.OVMF]
33 BaseAddress = 0xFFF00000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFdBaseAddress
34 Size = 0x00100000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareFdSize
35 ErasePolarity = 1
36 BlockSize = 0x1000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareBlockSize
37 NumBlocks = 0x100
38 !else
39 [FD.OVMF]
40 BaseAddress = 0xFFE00000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFdBaseAddress
41 Size = 0x00200000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareFdSize
42 ErasePolarity = 1
43 BlockSize = 0x1000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareBlockSize
44 NumBlocks = 0x200
45 !endif
46
47 0x00000000|0x0000e000
48 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize
49 #NV_VARIABLE_STORE
50 DATA = {
51 ## This is the EFI_FIRMWARE_VOLUME_HEADER
52 # ZeroVector []
53 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
54 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
55 # FileSystemGuid: gEfiSystemNvDataFvGuid =
56 # { 0xFFF12B8D, 0x7696, 0x4C8B,
57 # { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }}
58 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C,
59 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50,
60 # FvLength: 0x20000
61 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00,
62 # Signature "_FVH" # Attributes
63 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00,
64 # HeaderLength # CheckSum # ExtHeaderOffset #Reserved #Revision
65 0x48, 0x00, 0x19, 0xF9, 0x00, 0x00, 0x00, 0x02,
66 # Blockmap[0]: 0x20 Blocks * 0x1000 Bytes / Block
67 0x20, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00,
68 # Blockmap[1]: End
69 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
70 ## This is the VARIABLE_STORE_HEADER
71 !if $(SECURE_BOOT_ENABLE) == TRUE
72 # Signature: gEfiAuthenticatedVariableGuid =
73 # { 0xaaf32c78, 0x947b, 0x439a,
74 # { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }}
75 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43,
76 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92,
77 !else
78 # Signature: gEfiVariableGuid =
79 # { 0xddcf3616, 0x3275, 0x4164,
80 # { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }}
81 0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41,
82 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d,
83 !endif
84 # Size: 0xe000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) -
85 # 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0xdfb8
86 # This can speed up the Variable Dispatch a bit.
87 0xB8, 0xDF, 0x00, 0x00,
88 # FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32
89 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
90 }
91
92 0x0000e000|0x00001000
93 #NV_EVENT_LOG
94 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageEventLogBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageEventLogSize
95
96 0x0000f000|0x00001000
97 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize
98 #NV_FTW_WORKING
99 DATA = {
100 # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =
101 # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}
102 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,
103 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95,
104 # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved
105 0x2c, 0xaf, 0x2c, 0x64, 0xFE, 0xFF, 0xFF, 0xFF,
106 # WriteQueueSize: UINT64
107 0xE0, 0x0F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
108 }
109
110 0x00010000|0x00010000
111 #NV_FTW_SPARE
112 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize
113
114 !ifdef $(FD_SIZE_1MB)
115 0x00020000|0x000CC000
116 FV = FVMAIN_COMPACT
117
118 0x000EC000|0x14000
119 FV = SECFV
120
121 !else
122 0x00020000|0x001AC000
123 FV = FVMAIN_COMPACT
124
125 0x001CC000|0x34000
126 FV = SECFV
127 !endif
128
129 ################################################################################
130
131 [FD.MEMFD]
132 BaseAddress = 0x800000
133 Size = 0x800000
134 ErasePolarity = 1
135 BlockSize = 0x10000
136 NumBlocks = 0x80
137
138 0x000000|0x006000
139 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize
140
141 0x010000|0x008000
142 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize
143
144 0x018000|0x008000
145 gUefiOvmfPkgTokenSpaceGuid.PcdS3AcpiReservedMemoryBase|gEfiIntelFrameworkModulePkgTokenSpaceGuid.PcdS3AcpiReservedMemorySize
146
147 0x020000|0x0E0000
148 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvSize
149 FV = PEIFV
150
151 0x100000|0x700000
152 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvSize
153 FV = DXEFV
154
155 ################################################################################
156
157 [FV.SECFV]
158 BlockSize = 0x1000
159 FvAlignment = 16
160 ERASE_POLARITY = 1
161 MEMORY_MAPPED = TRUE
162 STICKY_WRITE = TRUE
163 LOCK_CAP = TRUE
164 LOCK_STATUS = TRUE
165 WRITE_DISABLED_CAP = TRUE
166 WRITE_ENABLED_CAP = TRUE
167 WRITE_STATUS = TRUE
168 WRITE_LOCK_CAP = TRUE
169 WRITE_LOCK_STATUS = TRUE
170 READ_DISABLED_CAP = TRUE
171 READ_ENABLED_CAP = TRUE
172 READ_STATUS = TRUE
173 READ_LOCK_CAP = TRUE
174 READ_LOCK_STATUS = TRUE
175
176 #
177 # SEC Phase modules
178 #
179 # The code in this FV handles the initial firmware startup, and
180 # decompresses the PEI and DXE FVs which handles the rest of the boot sequence.
181 #
182 INF OvmfPkg/Sec/SecMain.inf
183
184 INF RuleOverride=RESET_VECTOR OvmfPkg/ResetVector/Bin/ResetVector.inf
185
186 ################################################################################
187 [FV.PEIFV]
188 BlockSize = 0x10000
189 FvAlignment = 16
190 ERASE_POLARITY = 1
191 MEMORY_MAPPED = TRUE
192 STICKY_WRITE = TRUE
193 LOCK_CAP = TRUE
194 LOCK_STATUS = TRUE
195 WRITE_DISABLED_CAP = TRUE
196 WRITE_ENABLED_CAP = TRUE
197 WRITE_STATUS = TRUE
198 WRITE_LOCK_CAP = TRUE
199 WRITE_LOCK_STATUS = TRUE
200 READ_DISABLED_CAP = TRUE
201 READ_ENABLED_CAP = TRUE
202 READ_STATUS = TRUE
203 READ_LOCK_CAP = TRUE
204 READ_LOCK_STATUS = TRUE
205
206 APRIORI PEI {
207 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
208 }
209
210 #
211 # PEI Phase modules
212 #
213 INF MdeModulePkg/Core/Pei/PeiMain.inf
214 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
215 INF IntelFrameworkModulePkg/Universal/StatusCode/Pei/StatusCodePei.inf
216 INF OvmfPkg/PlatformPei/PlatformPei.inf
217 INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
218
219 ################################################################################
220
221 [FV.DXEFV]
222 BlockSize = 0x10000
223 FvAlignment = 16
224 ERASE_POLARITY = 1
225 MEMORY_MAPPED = TRUE
226 STICKY_WRITE = TRUE
227 LOCK_CAP = TRUE
228 LOCK_STATUS = TRUE
229 WRITE_DISABLED_CAP = TRUE
230 WRITE_ENABLED_CAP = TRUE
231 WRITE_STATUS = TRUE
232 WRITE_LOCK_CAP = TRUE
233 WRITE_LOCK_STATUS = TRUE
234 READ_DISABLED_CAP = TRUE
235 READ_ENABLED_CAP = TRUE
236 READ_STATUS = TRUE
237 READ_LOCK_CAP = TRUE
238 READ_LOCK_STATUS = TRUE
239
240 APRIORI DXE {
241 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
242 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
243 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
244 }
245
246 #
247 # DXE Phase modules
248 #
249 INF MdeModulePkg/Core/Dxe/DxeMain.inf
250
251 INF IntelFrameworkModulePkg/Universal/StatusCode/RuntimeDxe/StatusCodeRuntimeDxe.inf
252 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
253
254 INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
255 INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
256 INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
257 INF PcAtChipsetPkg/8259InterruptControllerDxe/8259.inf
258 INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf
259 INF UefiCpuPkg/CpuDxe/CpuDxe.inf
260 INF PcAtChipsetPkg/8254TimerDxe/8254Timer.inf
261 INF PcAtChipsetPkg/PciHostBridgeDxe/PciHostBridgeDxe.inf
262 INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf
263 INF PcAtChipsetPkg/KbcResetDxe/Reset.inf
264 INF MdeModulePkg/Universal/Metronome/Metronome.inf
265 INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf
266
267 INF OvmfPkg/BlockMmioToBlockIoDxe/BlockIo.inf
268 INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf
269 INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf
270 INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf
271 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
272 INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf
273 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
274
275 !if $(SECURE_BOOT_ENABLE) == TRUE
276 INF SecurityPkg/VariableAuthenticated/RuntimeDxe/VariableRuntimeDxe.inf
277 INF OvmfPkg/SecureBootConfigDxe/SecureBootConfigDxe.inf
278 !else
279 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
280 !endif
281
282 INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
283 INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
284 INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
285 INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
286 INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
287 INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
288 INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
289 INF IntelFrameworkModulePkg/Universal/BdsDxe/BdsDxe.inf
290 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
291 INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf
292 INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
293 INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
294 INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
295 INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
296 INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
297 INF IntelFrameworkModulePkg/Bus/Pci/IdeBusDxe/IdeBusDxe.inf
298 INF PcAtChipsetPkg/Bus/Pci/IdeControllerDxe/IdeControllerDxe.inf
299 INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
300 INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
301 INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
302 INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
303
304 INF PcAtChipsetPkg/IsaAcpiDxe/IsaAcpi.inf
305 INF IntelFrameworkModulePkg/Bus/Isa/IsaBusDxe/IsaBusDxe.inf
306
307 !ifndef $(SOURCE_DEBUG_ENABLE)
308 INF IntelFrameworkModulePkg/Bus/Isa/IsaSerialDxe/IsaSerialDxe.inf
309 !endif
310
311 INF IntelFrameworkModulePkg/Bus/Isa/Ps2KeyboardDxe/Ps2keyboardDxe.inf
312 INF IntelFrameworkModulePkg/Bus/Isa/IsaFloppyDxe/IsaFloppyDxe.inf
313
314 INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf
315 INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf
316
317 INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf
318 INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf
319 INF RuleOverride=ACPITABLE OvmfPkg/AcpiTables/AcpiTables.inf
320
321 INF RuleOverride = BINARY FatBinPkg/EnhancedFatDxe/Fat.inf
322
323 !ifndef $(USE_OLD_SHELL)
324 INF ShellPkg/Application/Shell/Shell.inf
325 !else
326 INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf
327 !endif
328
329 FILE FREEFORM = PCD(gEfiIntelFrameworkModulePkgTokenSpaceGuid.PcdLogoFile) {
330 SECTION RAW = MdeModulePkg/Logo/Logo.bmp
331 }
332
333 #
334 # Network modules
335 #
336 !if $(E1000_ENABLE)
337 FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {
338 SECTION PE32 = Intel3.5/EFIX64/E3507X2.EFI
339 }
340 !endif
341 INF MdeModulePkg/Universal/Network/SnpDxe/SnpDxe.inf
342 INF MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf
343 INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf
344 INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf
345 INF MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf
346 INF MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf
347 INF MdeModulePkg/Universal/Network/Ip4ConfigDxe/Ip4ConfigDxe.inf
348 INF MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf
349 INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf
350 INF MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
351 INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf
352 INF MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf
353 INF MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf
354 INF OvmfPkg/VirtioNetDxe/VirtioNet.inf
355
356 #
357 # Usb Support
358 #
359 INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf
360 INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf
361 INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf
362 INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf
363 INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf
364
365 !ifdef $(CSM_ENABLE)
366 INF IntelFrameworkModulePkg/Csm/BiosThunk/VideoDxe/VideoDxe.inf
367 INF IntelFrameworkModulePkg/Csm/LegacyBiosDxe/LegacyBiosDxe.inf
368 INF RuleOverride=CSM OvmfPkg/Csm/Csm16/Csm16.inf
369 !endif
370
371 INF OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
372
373 ################################################################################
374
375 [FV.FVMAIN_COMPACT]
376 FvAlignment = 16
377 ERASE_POLARITY = 1
378 MEMORY_MAPPED = TRUE
379 STICKY_WRITE = TRUE
380 LOCK_CAP = TRUE
381 LOCK_STATUS = TRUE
382 WRITE_DISABLED_CAP = TRUE
383 WRITE_ENABLED_CAP = TRUE
384 WRITE_STATUS = TRUE
385 WRITE_LOCK_CAP = TRUE
386 WRITE_LOCK_STATUS = TRUE
387 READ_DISABLED_CAP = TRUE
388 READ_ENABLED_CAP = TRUE
389 READ_STATUS = TRUE
390 READ_LOCK_CAP = TRUE
391 READ_LOCK_STATUS = TRUE
392
393 FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {
394 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {
395 #
396 # These firmware volumes will have files placed in them uncompressed,
397 # and then both firmware volumes will be compressed in a single
398 # compression operation in order to achieve better overall compression.
399 #
400 SECTION FV_IMAGE = PEIFV
401 SECTION FV_IMAGE = DXEFV
402 }
403 }
404
405 ################################################################################
406
407 [Rule.Common.SEC]
408 FILE SEC = $(NAMED_GUID) {
409 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
410 UI STRING ="$(MODULE_NAME)" Optional
411 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
412 }
413
414 [Rule.Common.PEI_CORE]
415 FILE PEI_CORE = $(NAMED_GUID) {
416 PE32 PE32 Align=32 $(INF_OUTPUT)/$(MODULE_NAME).efi
417 UI STRING ="$(MODULE_NAME)" Optional
418 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
419 }
420
421 [Rule.Common.PEIM]
422 FILE PEIM = $(NAMED_GUID) {
423 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
424 PE32 PE32 Align=32 $(INF_OUTPUT)/$(MODULE_NAME).efi
425 UI STRING="$(MODULE_NAME)" Optional
426 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
427 }
428
429 [Rule.Common.DXE_CORE]
430 FILE DXE_CORE = $(NAMED_GUID) {
431 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
432 UI STRING="$(MODULE_NAME)" Optional
433 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
434 }
435
436 [Rule.Common.DXE_DRIVER]
437 FILE DRIVER = $(NAMED_GUID) {
438 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
439 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
440 UI STRING="$(MODULE_NAME)" Optional
441 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
442 }
443
444 [Rule.Common.DXE_RUNTIME_DRIVER]
445 FILE DRIVER = $(NAMED_GUID) {
446 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
447 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
448 UI STRING="$(MODULE_NAME)" Optional
449 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
450 }
451
452 [Rule.Common.UEFI_DRIVER]
453 FILE DRIVER = $(NAMED_GUID) {
454 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
455 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
456 UI STRING="$(MODULE_NAME)" Optional
457 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
458 }
459
460 [Rule.Common.UEFI_DRIVER.BINARY]
461 FILE DRIVER = $(NAMED_GUID) {
462 DXE_DEPEX DXE_DEPEX Optional |.depex
463 PE32 PE32 |.efi
464 UI STRING="$(MODULE_NAME)" Optional
465 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
466 }
467
468 [Rule.Common.UEFI_APPLICATION]
469 FILE APPLICATION = $(NAMED_GUID) {
470 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
471 UI STRING="$(MODULE_NAME)" Optional
472 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
473 }
474
475 [Rule.Common.UEFI_APPLICATION.BINARY]
476 FILE APPLICATION = $(NAMED_GUID) {
477 PE32 PE32 |.efi
478 UI STRING="$(MODULE_NAME)" Optional
479 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
480 }
481
482 [Rule.Common.USER_DEFINED.ACPITABLE]
483 FILE FREEFORM = $(NAMED_GUID) {
484 RAW ACPI |.acpi
485 RAW ASL |.aml
486 }
487
488 [Rule.Common.USER_DEFINED.CSM]
489 FILE FREEFORM = $(NAMED_GUID) {
490 RAW BIN |.bin
491 }
492
493 [Rule.Common.SEC.RESET_VECTOR]
494 FILE RAW = $(NAMED_GUID) {
495 RAW RAW |.raw
496 }