]> git.proxmox.com Git - mirror_edk2.git/blob - OvmfPkg/OvmfPkgX64.fdf
OvmfPkg X64 ResetVector: Move page tables from 512KB to 8MB
[mirror_edk2.git] / OvmfPkg / OvmfPkgX64.fdf
1 ## @file
2 # Open Virtual Machine Firmware: FDF
3 #
4 # Copyright (c) 2006 - 2013, Intel Corporation. All rights reserved.<BR>
5 #
6 # This program and the accompanying materials
7 # are licensed and made available under the terms and conditions of the BSD License
8 # which accompanies this distribution. The full text of the license may be found at
9 # http://opensource.org/licenses/bsd-license.php
10 #
11 # THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
12 # WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
13 #
14 ##
15
16 ################################################################################
17
18 #
19 # Default flash size for DEBUG build is 2MB. For RELEASE it is 1MB.
20 #
21 # Defining FD_SIZE_1MB or FD_SIZE_2MB on the build command line can
22 # override this.
23 #
24 [Defines]
25 !if $(TARGET) == RELEASE
26 !ifndef $(FD_SIZE_2MB)
27 DEFINE FD_SIZE_1MB=
28 !endif
29 !endif
30
31 !ifdef $(FD_SIZE_1MB)
32 [FD.OVMF]
33 BaseAddress = 0xFFF00000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFdBaseAddress
34 Size = 0x00100000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareFdSize
35 ErasePolarity = 1
36 BlockSize = 0x1000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareBlockSize
37 NumBlocks = 0x100
38 !else
39 [FD.OVMF]
40 BaseAddress = 0xFFE00000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFdBaseAddress
41 Size = 0x00200000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareFdSize
42 ErasePolarity = 1
43 BlockSize = 0x1000|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareBlockSize
44 NumBlocks = 0x200
45 !endif
46
47 0x00000000|0x0000e000
48 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize
49 #NV_VARIABLE_STORE
50 DATA = {
51 ## This is the EFI_FIRMWARE_VOLUME_HEADER
52 # ZeroVector []
53 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
54 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
55 # FileSystemGuid: gEfiSystemNvDataFvGuid =
56 # { 0xFFF12B8D, 0x7696, 0x4C8B,
57 # { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }}
58 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C,
59 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50,
60 # FvLength: 0x20000
61 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00,
62 # Signature "_FVH" # Attributes
63 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00,
64 # HeaderLength # CheckSum # ExtHeaderOffset #Reserved #Revision
65 0x48, 0x00, 0x19, 0xF9, 0x00, 0x00, 0x00, 0x02,
66 # Blockmap[0]: 0x20 Blocks * 0x1000 Bytes / Block
67 0x20, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00,
68 # Blockmap[1]: End
69 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
70 ## This is the VARIABLE_STORE_HEADER
71 !if $(SECURE_BOOT_ENABLE) == TRUE
72 # Signature: gEfiAuthenticatedVariableGuid =
73 # { 0xaaf32c78, 0x947b, 0x439a,
74 # { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }}
75 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43,
76 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92,
77 !else
78 # Signature: gEfiVariableGuid =
79 # { 0xddcf3616, 0x3275, 0x4164,
80 # { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }}
81 0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41,
82 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d,
83 !endif
84 # Size: 0xe000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) -
85 # 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0xdfb8
86 # This can speed up the Variable Dispatch a bit.
87 0xB8, 0xDF, 0x00, 0x00,
88 # FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32
89 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
90 }
91
92 0x0000e000|0x00001000
93 #NV_EVENT_LOG
94 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageEventLogBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageEventLogSize
95
96 0x0000f000|0x00001000
97 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize
98 #NV_FTW_WORKING
99 DATA = {
100 # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =
101 # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}
102 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,
103 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95,
104 # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved
105 0x2c, 0xaf, 0x2c, 0x64, 0xFE, 0xFF, 0xFF, 0xFF,
106 # WriteQueueSize: UINT64
107 0xE0, 0x0F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
108 }
109
110 0x00010000|0x00010000
111 #NV_FTW_SPARE
112 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize
113
114 !ifdef $(FD_SIZE_1MB)
115 0x00020000|0x000CC000
116 FV = FVMAIN_COMPACT
117
118 0x000EC000|0x14000
119 FV = SECFV
120
121 !else
122 0x00020000|0x001AC000
123 FV = FVMAIN_COMPACT
124
125 0x001CC000|0x34000
126 FV = SECFV
127 !endif
128
129 ################################################################################
130
131 [FD.MEMFD]
132 BaseAddress = 0x800000
133 Size = 0x800000
134 ErasePolarity = 1
135 BlockSize = 0x10000
136 NumBlocks = 0x80
137
138 0x000000|0x006000
139 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize
140
141 0x020000|0x7E0000
142 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfMemFvSize
143 FV = MAINFV
144
145 ################################################################################
146
147 [FV.SECFV]
148 BlockSize = 0x1000
149 FvAlignment = 16
150 ERASE_POLARITY = 1
151 MEMORY_MAPPED = TRUE
152 STICKY_WRITE = TRUE
153 LOCK_CAP = TRUE
154 LOCK_STATUS = TRUE
155 WRITE_DISABLED_CAP = TRUE
156 WRITE_ENABLED_CAP = TRUE
157 WRITE_STATUS = TRUE
158 WRITE_LOCK_CAP = TRUE
159 WRITE_LOCK_STATUS = TRUE
160 READ_DISABLED_CAP = TRUE
161 READ_ENABLED_CAP = TRUE
162 READ_STATUS = TRUE
163 READ_LOCK_CAP = TRUE
164 READ_LOCK_STATUS = TRUE
165
166 #
167 # SEC Phase modules
168 #
169 # The code in this FV handles the initial firmware startup, and
170 # decompresses the MAINFV which handles the majority of the boot sequence.
171 #
172 INF OvmfPkg/Sec/SecMain.inf
173
174 INF RuleOverride=RESET_VECTOR OvmfPkg/ResetVector/Bin/ResetVector.inf
175
176 ################################################################################
177 [FV.MAINFV]
178 BlockSize = 0x10000
179 FvAlignment = 16
180 ERASE_POLARITY = 1
181 MEMORY_MAPPED = TRUE
182 STICKY_WRITE = TRUE
183 LOCK_CAP = TRUE
184 LOCK_STATUS = TRUE
185 WRITE_DISABLED_CAP = TRUE
186 WRITE_ENABLED_CAP = TRUE
187 WRITE_STATUS = TRUE
188 WRITE_LOCK_CAP = TRUE
189 WRITE_LOCK_STATUS = TRUE
190 READ_DISABLED_CAP = TRUE
191 READ_ENABLED_CAP = TRUE
192 READ_STATUS = TRUE
193 READ_LOCK_CAP = TRUE
194 READ_LOCK_STATUS = TRUE
195
196 #
197 # Files to be placed in MAIN FV
198 #
199 # This firmware volume will have files placed in it uncompressed,
200 # and then then entire firmware volume will be compressed in a
201 # single compression operation in order to achieve better
202 # overall compression.
203 #
204
205 APRIORI PEI {
206 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
207 }
208
209 #
210 # PEI Phase modules
211 #
212 INF MdeModulePkg/Core/Pei/PeiMain.inf
213 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
214 INF IntelFrameworkModulePkg/Universal/StatusCode/Pei/StatusCodePei.inf
215 INF OvmfPkg/PlatformPei/PlatformPei.inf
216 INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
217
218 FILE FV_IMAGE = A4EF5A93-3F1B-4232-A1C4-F0910E6D1D9C {
219 SECTION COMPRESS PI_NONE {
220 SECTION FV_IMAGE = DXEFV
221 }
222 }
223
224 ################################################################################
225
226 [FV.DXEFV]
227 BlockSize = 0x10000
228 FvAlignment = 16
229 ERASE_POLARITY = 1
230 MEMORY_MAPPED = TRUE
231 STICKY_WRITE = TRUE
232 LOCK_CAP = TRUE
233 LOCK_STATUS = TRUE
234 WRITE_DISABLED_CAP = TRUE
235 WRITE_ENABLED_CAP = TRUE
236 WRITE_STATUS = TRUE
237 WRITE_LOCK_CAP = TRUE
238 WRITE_LOCK_STATUS = TRUE
239 READ_DISABLED_CAP = TRUE
240 READ_ENABLED_CAP = TRUE
241 READ_STATUS = TRUE
242 READ_LOCK_CAP = TRUE
243 READ_LOCK_STATUS = TRUE
244
245 APRIORI DXE {
246 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
247 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
248 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
249 }
250
251 #
252 # DXE Phase modules
253 #
254 INF MdeModulePkg/Core/Dxe/DxeMain.inf
255
256 INF IntelFrameworkModulePkg/Universal/StatusCode/RuntimeDxe/StatusCodeRuntimeDxe.inf
257 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
258
259 INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
260 INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
261 INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
262 INF PcAtChipsetPkg/8259InterruptControllerDxe/8259.inf
263 INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf
264 INF UefiCpuPkg/CpuDxe/CpuDxe.inf
265 INF PcAtChipsetPkg/8254TimerDxe/8254Timer.inf
266 INF PcAtChipsetPkg/PciHostBridgeDxe/PciHostBridgeDxe.inf
267 INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf
268 INF PcAtChipsetPkg/KbcResetDxe/Reset.inf
269 INF MdeModulePkg/Universal/Metronome/Metronome.inf
270 INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf
271
272 INF OvmfPkg/BlockMmioToBlockIoDxe/BlockIo.inf
273 INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf
274 INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf
275 INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf
276 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
277 INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf
278 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
279
280 !if $(SECURE_BOOT_ENABLE) == TRUE
281 INF SecurityPkg/VariableAuthenticated/RuntimeDxe/VariableRuntimeDxe.inf
282 INF OvmfPkg/SecureBootConfigDxe/SecureBootConfigDxe.inf
283 !else
284 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
285 !endif
286
287 INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
288 INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
289 INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
290 INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
291 INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
292 INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
293 INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
294 INF IntelFrameworkModulePkg/Universal/BdsDxe/BdsDxe.inf
295 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
296 INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf
297 INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
298 INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
299 INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
300 INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
301 INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
302 INF IntelFrameworkModulePkg/Bus/Pci/IdeBusDxe/IdeBusDxe.inf
303 INF PcAtChipsetPkg/Bus/Pci/IdeControllerDxe/IdeControllerDxe.inf
304 INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
305 INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
306 INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
307 INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
308
309 INF PcAtChipsetPkg/IsaAcpiDxe/IsaAcpi.inf
310 INF IntelFrameworkModulePkg/Bus/Isa/IsaBusDxe/IsaBusDxe.inf
311
312 !ifndef $(SOURCE_DEBUG_ENABLE)
313 INF IntelFrameworkModulePkg/Bus/Isa/IsaSerialDxe/IsaSerialDxe.inf
314 !endif
315
316 INF IntelFrameworkModulePkg/Bus/Isa/Ps2KeyboardDxe/Ps2keyboardDxe.inf
317 INF IntelFrameworkModulePkg/Bus/Isa/IsaFloppyDxe/IsaFloppyDxe.inf
318
319 INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf
320 INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf
321
322 INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf
323 INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf
324 INF RuleOverride=ACPITABLE OvmfPkg/AcpiTables/AcpiTables.inf
325
326 INF RuleOverride = BINARY FatBinPkg/EnhancedFatDxe/Fat.inf
327
328 !ifndef $(USE_OLD_SHELL)
329 INF ShellPkg/Application/Shell/Shell.inf
330 !else
331 INF RuleOverride = BINARY EdkShellBinPkg/FullShell/FullShell.inf
332 !endif
333
334 FILE FREEFORM = PCD(gEfiIntelFrameworkModulePkgTokenSpaceGuid.PcdLogoFile) {
335 SECTION RAW = MdeModulePkg/Logo/Logo.bmp
336 }
337
338 #
339 # Network modules
340 #
341 !if $(E1000_ENABLE)
342 FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {
343 SECTION PE32 = Intel3.5/EFIX64/E3507X2.EFI
344 }
345 !endif
346 INF MdeModulePkg/Universal/Network/SnpDxe/SnpDxe.inf
347 INF MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf
348 INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf
349 INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf
350 INF MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf
351 INF MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf
352 INF MdeModulePkg/Universal/Network/Ip4ConfigDxe/Ip4ConfigDxe.inf
353 INF MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf
354 INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf
355 INF MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
356 INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf
357 INF MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf
358 INF MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf
359 INF OvmfPkg/VirtioNetDxe/VirtioNet.inf
360
361 #
362 # Usb Support
363 #
364 INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf
365 INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf
366 INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf
367 INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf
368 INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf
369
370 !ifdef $(CSM_ENABLE)
371 INF IntelFrameworkModulePkg/Csm/BiosThunk/VideoDxe/VideoDxe.inf
372 INF IntelFrameworkModulePkg/Csm/LegacyBiosDxe/LegacyBiosDxe.inf
373 INF RuleOverride=CSM OvmfPkg/Csm/Csm16/Csm16.inf
374 !endif
375
376 INF OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
377
378 ################################################################################
379
380 [FV.FVMAIN_COMPACT]
381 FvAlignment = 16
382 ERASE_POLARITY = 1
383 MEMORY_MAPPED = TRUE
384 STICKY_WRITE = TRUE
385 LOCK_CAP = TRUE
386 LOCK_STATUS = TRUE
387 WRITE_DISABLED_CAP = TRUE
388 WRITE_ENABLED_CAP = TRUE
389 WRITE_STATUS = TRUE
390 WRITE_LOCK_CAP = TRUE
391 WRITE_LOCK_STATUS = TRUE
392 READ_DISABLED_CAP = TRUE
393 READ_ENABLED_CAP = TRUE
394 READ_STATUS = TRUE
395 READ_LOCK_CAP = TRUE
396 READ_LOCK_STATUS = TRUE
397
398 FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {
399 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {
400 SECTION FV_IMAGE = MAINFV
401 }
402 }
403
404 ################################################################################
405
406 [Rule.Common.SEC]
407 FILE SEC = $(NAMED_GUID) {
408 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
409 UI STRING ="$(MODULE_NAME)" Optional
410 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
411 }
412
413 [Rule.Common.PEI_CORE]
414 FILE PEI_CORE = $(NAMED_GUID) {
415 PE32 PE32 Align=32 $(INF_OUTPUT)/$(MODULE_NAME).efi
416 UI STRING ="$(MODULE_NAME)" Optional
417 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
418 }
419
420 [Rule.Common.PEIM]
421 FILE PEIM = $(NAMED_GUID) {
422 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
423 PE32 PE32 Align=32 $(INF_OUTPUT)/$(MODULE_NAME).efi
424 UI STRING="$(MODULE_NAME)" Optional
425 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
426 }
427
428 [Rule.Common.DXE_CORE]
429 FILE DXE_CORE = $(NAMED_GUID) {
430 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
431 UI STRING="$(MODULE_NAME)" Optional
432 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
433 }
434
435 [Rule.Common.DXE_DRIVER]
436 FILE DRIVER = $(NAMED_GUID) {
437 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
438 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
439 UI STRING="$(MODULE_NAME)" Optional
440 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
441 }
442
443 [Rule.Common.DXE_RUNTIME_DRIVER]
444 FILE DRIVER = $(NAMED_GUID) {
445 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
446 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
447 UI STRING="$(MODULE_NAME)" Optional
448 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
449 }
450
451 [Rule.Common.UEFI_DRIVER]
452 FILE DRIVER = $(NAMED_GUID) {
453 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
454 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
455 UI STRING="$(MODULE_NAME)" Optional
456 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
457 }
458
459 [Rule.Common.UEFI_DRIVER.BINARY]
460 FILE DRIVER = $(NAMED_GUID) {
461 DXE_DEPEX DXE_DEPEX Optional |.depex
462 PE32 PE32 |.efi
463 UI STRING="$(MODULE_NAME)" Optional
464 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
465 }
466
467 [Rule.Common.UEFI_APPLICATION]
468 FILE APPLICATION = $(NAMED_GUID) {
469 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
470 UI STRING="$(MODULE_NAME)" Optional
471 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
472 }
473
474 [Rule.Common.UEFI_APPLICATION.BINARY]
475 FILE APPLICATION = $(NAMED_GUID) {
476 PE32 PE32 |.efi
477 UI STRING="$(MODULE_NAME)" Optional
478 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
479 }
480
481 [Rule.Common.USER_DEFINED.ACPITABLE]
482 FILE FREEFORM = $(NAMED_GUID) {
483 RAW ACPI |.acpi
484 RAW ASL |.aml
485 }
486
487 [Rule.Common.USER_DEFINED.CSM]
488 FILE FREEFORM = $(NAMED_GUID) {
489 RAW BIN |.bin
490 }
491
492 [Rule.Common.SEC.RESET_VECTOR]
493 FILE RAW = $(NAMED_GUID) {
494 RAW RAW |.raw
495 }