]> git.proxmox.com Git - mirror_edk2.git/blob - OvmfPkg/OvmfXen.fdf
UefiCpuPkg: Move AsmRelocateApLoopStart from Mpfuncs.nasm to AmdSev.nasm
[mirror_edk2.git] / OvmfPkg / OvmfXen.fdf
1 ## @file
2 # Open Virtual Machine Firmware: FDF
3 #
4 # Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
5 # (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
6 # Copyright (c) 2019, Citrix Systems, Inc.
7 #
8 # SPDX-License-Identifier: BSD-2-Clause-Patent
9 #
10 ##
11
12 ################################################################################
13
14 [Defines]
15 !include OvmfPkgDefines.fdf.inc
16
17 #
18 # This will allow the flash device image to be recognize as an ELF, with first
19 # an ELF headers, then the firmware code.
20 #
21 [FD.OVMF]
22 BaseAddress = $(FW_BASE_ADDRESS)
23 Size = $(FW_SIZE)
24 ErasePolarity = 1
25 BlockSize = $(BLOCK_SIZE)
26 NumBlocks = $(FW_BLOCKS)
27
28 !if ($(FD_SIZE_IN_KB) == 1024) || ($(FD_SIZE_IN_KB) == 2048)
29 0x00000000|0x0000e000
30 !endif
31 !if $(FD_SIZE_IN_KB) == 4096
32 0x00000000|0x00040000
33 !endif
34 DATA = {
35 #
36 # This hex array have been generated by OvmfPkg/OvmfXenElfHeaderGenerator.c
37 # and copied manually.
38 #
39 # ELF file header
40 0x7f, 0x45, 0x4c, 0x46, # e_ident[0..3]: Magic number
41 0x01, # File class: 32-bit objects
42 0x01, # Data encoding: 2's complement, little endian
43 0x01, # File version
44 0x03, # OS ABI identification: Object uses GNU ELF extensions
45 0x00, # ABI version
46 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, # e_ident[EI_PAD...]
47 0x02, 0x00, # e_type = Executable file
48 0x03, 0x00, # e_machine = Intel 80386
49 0x01, 0x00, 0x00, 0x00, # e_version
50 0xd0, 0xff, 0x2f, 0x00, # e_entry: Entry point virtual address
51 0x34, 0x00, 0x00, 0x00, # e_phoff: Program header table file offset
52 0x00, 0x00, 0x00, 0x00, # e_shoff: Section header table file offset
53 0x00, 0x00, 0x00, 0x00, # e_flags: Processor-specific flags
54 0x34, 0x00, # e_ehsize: ELF header size
55 0x20, 0x00, # e_phentsize: Program header table entry size
56 0x02, 0x00, # e_phnum: Program header table entry count
57 0x00, 0x00, # e_shentsize: Section header table entry size
58 0x00, 0x00, # e_shnum: Section header table entry count
59 0x00, 0x00, # e_shstrndx
60
61 # ELF Program segment headers
62 # - Load segment
63 0x01, 0x00, 0x00, 0x00, # p_type = Loadable program segment
64 0x00, 0x00, 0x00, 0x00, # p_offset
65 0x00, 0x00, 0x10, 0x00, # p_vaddr: Segment virtual address
66 0x00, 0x00, 0x10, 0x00, # p_paddr: Segment physical address
67 0x00, 0x00, 0x20, 0x00, # p_filesz: Segment size in file
68 0x00, 0x00, 0x20, 0x00, # p_memsz: Segment size in memory
69 0x07, 0x00, 0x00, 0x00, # p_flags = Segment is executable | writable | readable
70 0x00, 0x00, 0x00, 0x00, # p_align
71 # - ELFNOTE segment
72 0x04, 0x00, 0x00, 0x00, # p_type = PT_NOTE
73 0x74, 0x00, 0x00, 0x00, # p_offset = point to XEN_ELFNOTE_PHYS32_ENTRY below
74 0x74, 0x00, 0x10, 0x00,
75 0x74, 0x00, 0x10, 0x00,
76 0x14, 0x00, 0x00, 0x00,
77 0x14, 0x00, 0x00, 0x00,
78 0x04, 0x00, 0x00, 0x00, # p_flags = Segment is readable
79 0x00, 0x00, 0x00, 0x00,
80
81 # XEN_ELFNOTE_PHYS32_ENTRY
82 0x04, 0x00, 0x00, 0x00, # name size
83 0x04, 0x00, 0x00, 0x00, # desc size
84 0x12, 0x00, 0x00, 0x00, # type = XEN_ELFNOTE_PHYS32_ENTRY
85 0x58, 0x65, 0x6e, 0x00, # name = "Xen"
86 0xd0, 0xff, 0x2f, 0x00, # desc: PVH entry point
87 0x00
88 }
89
90 !if ($(FD_SIZE_IN_KB) == 1024) || ($(FD_SIZE_IN_KB) == 2048)
91 0x0000e000|0x00001000
92 !endif
93 !if $(FD_SIZE_IN_KB) == 4096
94 0x00040000|0x00001000
95 !endif
96 #NV_EVENT_LOG
97
98 !if ($(FD_SIZE_IN_KB) == 1024) || ($(FD_SIZE_IN_KB) == 2048)
99 0x0000f000|0x00001000
100 !endif
101 !if $(FD_SIZE_IN_KB) == 4096
102 0x00041000|0x00001000
103 !endif
104 #NV_FTW_WORKING
105 DATA = {
106 # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =
107 # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}
108 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,
109 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95,
110 # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved
111 0x2c, 0xaf, 0x2c, 0x64, 0xFE, 0xFF, 0xFF, 0xFF,
112 # WriteQueueSize: UINT64
113 0xE0, 0x0F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
114 }
115
116 !if ($(FD_SIZE_IN_KB) == 1024) || ($(FD_SIZE_IN_KB) == 2048)
117 0x00010000|0x00010000
118 !endif
119 !if $(FD_SIZE_IN_KB) == 4096
120 0x00042000|0x00042000
121 !endif
122 #NV_FTW_SPARE
123
124
125 $(VARS_SIZE)|$(FVMAIN_SIZE)
126 FV = FVMAIN_COMPACT
127
128 $(SECFV_OFFSET)|$(SECFV_SIZE)
129 FV = SECFV
130
131 #
132 # Build the variable store and the firmware code as separate flash device
133 # images.
134 #
135 [FD.OVMF_VARS]
136 BaseAddress = $(FW_BASE_ADDRESS)
137 Size = $(VARS_SIZE)
138 ErasePolarity = 1
139 BlockSize = $(BLOCK_SIZE)
140 NumBlocks = $(VARS_BLOCKS)
141
142 !include VarStore.fdf.inc
143
144 [FD.OVMF_CODE]
145 BaseAddress = $(CODE_BASE_ADDRESS)
146 Size = $(CODE_SIZE)
147 ErasePolarity = 1
148 BlockSize = $(BLOCK_SIZE)
149 NumBlocks = $(CODE_BLOCKS)
150
151 0x00000000|$(FVMAIN_SIZE)
152 FV = FVMAIN_COMPACT
153
154 $(FVMAIN_SIZE)|$(SECFV_SIZE)
155 FV = SECFV
156
157 ################################################################################
158
159 [FD.MEMFD]
160 BaseAddress = $(MEMFD_BASE_ADDRESS)
161 Size = 0xB00000
162 ErasePolarity = 1
163 BlockSize = 0x10000
164 NumBlocks = 0xB0
165
166 0x000000|0x006000
167 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize
168
169 0x006000|0x001000
170 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageSize
171
172 0x007000|0x001000
173 gEfiMdePkgTokenSpaceGuid.PcdGuidedExtractHandlerTableAddress|gUefiOvmfPkgTokenSpaceGuid.PcdGuidedExtractHandlerTableSize
174
175 0x008000|0x001000
176 # Used by XenResetVector to communicate with XenPlatformPei
177 gUefiOvmfPkgTokenSpaceGuid.PcdXenPvhStartOfDayStructPtr|gUefiOvmfPkgTokenSpaceGuid.PcdXenPvhStartOfDayStructPtrSize
178
179 0x010000|0x010000
180 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize
181
182 0x020000|0x0E0000
183 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvSize
184 FV = PEIFV
185
186 0x100000|0xA00000
187 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvSize
188 FV = DXEFV
189
190 ################################################################################
191
192 [FV.SECFV]
193 FvNameGuid = 763BED0D-DE9F-48F5-81F1-3E90E1B1A015
194 BlockSize = 0x1000
195 FvAlignment = 16
196 ERASE_POLARITY = 1
197 MEMORY_MAPPED = TRUE
198 STICKY_WRITE = TRUE
199 LOCK_CAP = TRUE
200 LOCK_STATUS = TRUE
201 WRITE_DISABLED_CAP = TRUE
202 WRITE_ENABLED_CAP = TRUE
203 WRITE_STATUS = TRUE
204 WRITE_LOCK_CAP = TRUE
205 WRITE_LOCK_STATUS = TRUE
206 READ_DISABLED_CAP = TRUE
207 READ_ENABLED_CAP = TRUE
208 READ_STATUS = TRUE
209 READ_LOCK_CAP = TRUE
210 READ_LOCK_STATUS = TRUE
211
212 #
213 # SEC Phase modules
214 #
215 # The code in this FV handles the initial firmware startup, and
216 # decompresses the PEI and DXE FVs which handles the rest of the boot sequence.
217 #
218 INF OvmfPkg/Sec/SecMain.inf
219
220 INF RuleOverride=RESET_VECTOR OvmfPkg/XenResetVector/XenResetVector.inf
221
222 ################################################################################
223 [FV.PEIFV]
224 FvNameGuid = 6938079B-B503-4E3D-9D24-B28337A25806
225 BlockSize = 0x10000
226 FvAlignment = 16
227 ERASE_POLARITY = 1
228 MEMORY_MAPPED = TRUE
229 STICKY_WRITE = TRUE
230 LOCK_CAP = TRUE
231 LOCK_STATUS = TRUE
232 WRITE_DISABLED_CAP = TRUE
233 WRITE_ENABLED_CAP = TRUE
234 WRITE_STATUS = TRUE
235 WRITE_LOCK_CAP = TRUE
236 WRITE_LOCK_STATUS = TRUE
237 READ_DISABLED_CAP = TRUE
238 READ_ENABLED_CAP = TRUE
239 READ_STATUS = TRUE
240 READ_LOCK_CAP = TRUE
241 READ_LOCK_STATUS = TRUE
242
243 APRIORI PEI {
244 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
245 }
246
247 #
248 # PEI Phase modules
249 #
250 INF MdeModulePkg/Core/Pei/PeiMain.inf
251 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
252 INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf
253 INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf
254 INF OvmfPkg/XenPlatformPei/XenPlatformPei.inf
255 INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
256 INF UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf
257 INF UefiCpuPkg/CpuMpPei/CpuMpPei.inf
258
259 ################################################################################
260
261 [FV.DXEFV]
262 FvForceRebase = FALSE
263 FvNameGuid = 7CB8BDC9-F8EB-4F34-AAEA-3EE4AF6516A1
264 BlockSize = 0x10000
265 FvAlignment = 16
266 ERASE_POLARITY = 1
267 MEMORY_MAPPED = TRUE
268 STICKY_WRITE = TRUE
269 LOCK_CAP = TRUE
270 LOCK_STATUS = TRUE
271 WRITE_DISABLED_CAP = TRUE
272 WRITE_ENABLED_CAP = TRUE
273 WRITE_STATUS = TRUE
274 WRITE_LOCK_CAP = TRUE
275 WRITE_LOCK_STATUS = TRUE
276 READ_DISABLED_CAP = TRUE
277 READ_ENABLED_CAP = TRUE
278 READ_STATUS = TRUE
279 READ_LOCK_CAP = TRUE
280 READ_LOCK_STATUS = TRUE
281
282 APRIORI DXE {
283 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
284 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
285 INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf
286 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
287 }
288
289 #
290 # DXE Phase modules
291 #
292 INF MdeModulePkg/Core/Dxe/DxeMain.inf
293
294 INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf
295 INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf
296 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
297
298 INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
299 INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
300 INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
301 INF OvmfPkg/XenTimerDxe/XenTimerDxe.inf
302 INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf
303 INF UefiCpuPkg/CpuDxe/CpuDxe.inf
304 INF OvmfPkg/IncompatiblePciDeviceSupportDxe/IncompatiblePciDeviceSupport.inf
305 INF OvmfPkg/PciHotPlugInitDxe/PciHotPlugInit.inf
306 INF MdeModulePkg/Bus/Pci/PciHostBridgeDxe/PciHostBridgeDxe.inf
307 INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf
308 INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf
309 INF MdeModulePkg/Universal/Metronome/Metronome.inf
310 INF EmbeddedPkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf
311
312 INF OvmfPkg/XenIoPvhDxe/XenIoPvhDxe.inf
313 INF OvmfPkg/XenIoPciDxe/XenIoPciDxe.inf
314 INF OvmfPkg/XenBusDxe/XenBusDxe.inf
315 INF OvmfPkg/XenPvBlkDxe/XenPvBlkDxe.inf
316 INF MdeModulePkg/Universal/SerialDxe/SerialDxe.inf
317
318 INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
319 INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
320 INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
321 INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
322 INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
323 INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
324 INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
325 INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
326 INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
327 INF MdeModulePkg/Application/UiApp/UiApp.inf
328 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
329 INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf
330 INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
331 INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
332 INF MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskDxe.inf
333 INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
334 INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
335 INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
336 INF OvmfPkg/SataControllerDxe/SataControllerDxe.inf
337 INF MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf
338 INF MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf
339 INF MdeModulePkg/Bus/Pci/NvmExpressDxe/NvmExpressDxe.inf
340 INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
341 INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
342 INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
343 INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
344
345 INF OvmfPkg/SioBusDxe/SioBusDxe.inf
346 !if $(SOURCE_DEBUG_ENABLE) == FALSE
347 INF MdeModulePkg/Bus/Pci/PciSioSerialDxe/PciSioSerialDxe.inf
348 !endif
349 INF MdeModulePkg/Bus/Isa/Ps2KeyboardDxe/Ps2KeyboardDxe.inf
350
351 INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf
352 INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf
353
354 INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf
355 INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf
356 INF RuleOverride=ACPITABLE OvmfPkg/AcpiTables/AcpiTables.inf
357 INF MdeModulePkg/Universal/Acpi/S3SaveStateDxe/S3SaveStateDxe.inf
358 INF MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe/BootScriptExecutorDxe.inf
359 INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResourceTableDxe.inf
360
361 INF FatPkg/EnhancedFatDxe/Fat.inf
362 INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
363
364 !if $(TOOL_CHAIN_TAG) != "XCODE5"
365 INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
366 INF OvmfPkg/LinuxInitrdDynamicShellCommand/LinuxInitrdDynamicShellCommand.inf
367 !endif
368 INF ShellPkg/Application/Shell/Shell.inf
369
370 INF MdeModulePkg/Logo/LogoDxe.inf
371
372 #
373 # Network modules
374 #
375 !if $(E1000_ENABLE)
376 FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {
377 SECTION PE32 = Intel3.5/EFIX64/E3522X2.EFI
378 }
379 !endif
380 !include NetworkPkg/Network.fdf.inc
381
382 #
383 # Usb Support
384 #
385 INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf
386 INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf
387 INF MdeModulePkg/Bus/Pci/XhciDxe/XhciDxe.inf
388 INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf
389 INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf
390 INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf
391
392 !ifdef $(CSM_ENABLE)
393 INF OvmfPkg/Csm/BiosThunk/VideoDxe/VideoDxe.inf
394 INF OvmfPkg/Csm/LegacyBiosDxe/LegacyBiosDxe.inf
395 INF RuleOverride=CSM OvmfPkg/Csm/Csm16/Csm16.inf
396 !endif
397
398 INF OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
399 INF OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
400 INF OvmfPkg/PlatformDxe/Platform.inf
401 INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf
402 INF OvmfPkg/IoMmuDxe/IoMmuDxe.inf
403
404 #
405 # Variable driver stack (non-SMM)
406 #
407 INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
408 INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf
409 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
410 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
411
412 ################################################################################
413
414 [FV.FVMAIN_COMPACT]
415 FvNameGuid = 48DB5E17-707C-472D-91CD-1613E7EF51B0
416 FvAlignment = 16
417 ERASE_POLARITY = 1
418 MEMORY_MAPPED = TRUE
419 STICKY_WRITE = TRUE
420 LOCK_CAP = TRUE
421 LOCK_STATUS = TRUE
422 WRITE_DISABLED_CAP = TRUE
423 WRITE_ENABLED_CAP = TRUE
424 WRITE_STATUS = TRUE
425 WRITE_LOCK_CAP = TRUE
426 WRITE_LOCK_STATUS = TRUE
427 READ_DISABLED_CAP = TRUE
428 READ_ENABLED_CAP = TRUE
429 READ_STATUS = TRUE
430 READ_LOCK_CAP = TRUE
431 READ_LOCK_STATUS = TRUE
432
433 FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {
434 SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {
435 #
436 # These firmware volumes will have files placed in them uncompressed,
437 # and then both firmware volumes will be compressed in a single
438 # compression operation in order to achieve better overall compression.
439 #
440 SECTION FV_IMAGE = PEIFV
441 SECTION FV_IMAGE = DXEFV
442 }
443 }
444
445 !include FvmainCompactScratchEnd.fdf.inc
446
447 ################################################################################
448
449 [Rule.Common.SEC]
450 FILE SEC = $(NAMED_GUID) {
451 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
452 UI STRING ="$(MODULE_NAME)" Optional
453 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
454 }
455
456 [Rule.Common.PEI_CORE]
457 FILE PEI_CORE = $(NAMED_GUID) {
458 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi
459 UI STRING ="$(MODULE_NAME)" Optional
460 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
461 }
462
463 [Rule.Common.PEIM]
464 FILE PEIM = $(NAMED_GUID) {
465 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
466 PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi
467 UI STRING="$(MODULE_NAME)" Optional
468 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
469 }
470
471 [Rule.Common.DXE_CORE]
472 FILE DXE_CORE = $(NAMED_GUID) {
473 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
474 UI STRING="$(MODULE_NAME)" Optional
475 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
476 }
477
478 [Rule.Common.DXE_DRIVER]
479 FILE DRIVER = $(NAMED_GUID) {
480 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
481 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
482 UI STRING="$(MODULE_NAME)" Optional
483 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
484 RAW ACPI Optional |.acpi
485 RAW ASL Optional |.aml
486 }
487
488 [Rule.Common.DXE_RUNTIME_DRIVER]
489 FILE DRIVER = $(NAMED_GUID) {
490 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
491 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
492 UI STRING="$(MODULE_NAME)" Optional
493 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
494 }
495
496 [Rule.Common.UEFI_DRIVER]
497 FILE DRIVER = $(NAMED_GUID) {
498 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
499 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
500 UI STRING="$(MODULE_NAME)" Optional
501 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
502 }
503
504 [Rule.Common.UEFI_DRIVER.BINARY]
505 FILE DRIVER = $(NAMED_GUID) {
506 DXE_DEPEX DXE_DEPEX Optional |.depex
507 PE32 PE32 |.efi
508 UI STRING="$(MODULE_NAME)" Optional
509 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
510 }
511
512 [Rule.Common.UEFI_APPLICATION]
513 FILE APPLICATION = $(NAMED_GUID) {
514 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
515 UI STRING="$(MODULE_NAME)" Optional
516 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
517 }
518
519 [Rule.Common.UEFI_APPLICATION.BINARY]
520 FILE APPLICATION = $(NAMED_GUID) {
521 PE32 PE32 |.efi
522 UI STRING="$(MODULE_NAME)" Optional
523 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
524 }
525
526 [Rule.Common.USER_DEFINED.ACPITABLE]
527 FILE FREEFORM = $(NAMED_GUID) {
528 RAW ACPI |.acpi
529 RAW ASL |.aml
530 }
531
532 [Rule.Common.USER_DEFINED.CSM]
533 FILE FREEFORM = $(NAMED_GUID) {
534 RAW BIN |.bin
535 }
536
537 [Rule.Common.SEC.RESET_VECTOR]
538 FILE RAW = $(NAMED_GUID) {
539 RAW BIN Align = 16 |.bin
540 }