123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554 |
- ## @file
- # Open Virtual Machine Firmware: FDF
- #
- # Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
- # (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
- #
- # SPDX-License-Identifier: BSD-2-Clause-Patent
- #
- ##
- ################################################################################
- [Defines]
- !include OvmfPkg/Include/Fdf/OvmfPkgDefines.fdf.inc
- #
- # Build the variable store and the firmware code as one unified flash device
- # image.
- #
- [FD.OVMF]
- BaseAddress = $(FW_BASE_ADDRESS)
- Size = $(FW_SIZE)
- ErasePolarity = 1
- BlockSize = $(BLOCK_SIZE)
- NumBlocks = $(FW_BLOCKS)
- !include OvmfPkg/Include/Fdf/VarStore.fdf.inc
- $(VARS_SIZE)|$(FVMAIN_SIZE)
- FV = FVMAIN_COMPACT
- $(SECFV_OFFSET)|$(SECFV_SIZE)
- FV = SECFV
- #
- # Build the variable store and the firmware code as separate flash device
- # images.
- #
- [FD.OVMF_VARS]
- BaseAddress = $(FW_BASE_ADDRESS)
- Size = $(VARS_SIZE)
- ErasePolarity = 1
- BlockSize = $(BLOCK_SIZE)
- NumBlocks = $(VARS_BLOCKS)
- !include OvmfPkg/Include/Fdf/VarStore.fdf.inc
- [FD.OVMF_CODE]
- BaseAddress = $(CODE_BASE_ADDRESS)
- Size = $(CODE_SIZE)
- ErasePolarity = 1
- BlockSize = $(BLOCK_SIZE)
- NumBlocks = $(CODE_BLOCKS)
- 0x00000000|$(FVMAIN_SIZE)
- FV = FVMAIN_COMPACT
- $(FVMAIN_SIZE)|$(SECFV_SIZE)
- FV = SECFV
- ################################################################################
- [FD.MEMFD]
- BaseAddress = $(MEMFD_BASE_ADDRESS)
- Size = 0xE00000
- ErasePolarity = 1
- BlockSize = 0x10000
- NumBlocks = 0xE0
- 0x000000|0x006000
- gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize
- 0x006000|0x001000
- gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageSize
- 0x007000|0x001000
- gEfiMdePkgTokenSpaceGuid.PcdGuidedExtractHandlerTableAddress|gUefiOvmfPkgTokenSpaceGuid.PcdGuidedExtractHandlerTableSize
- 0x008000|0x001000
- gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbPageTableSize
- 0x009000|0x002000
- gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbSize
- 0x00B000|0x001000
- gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize
- 0x00C000|0x001000
- gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBackupSize
- 0x00D000|0x001000
- gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsSize
- 0x00E000|0x001000
- gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidSize
- 0x010000|0x010000
- gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize
- 0x020000|0x0E0000
- gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvSize
- FV = PEIFV
- 0x100000|0xD00000
- gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvSize
- FV = DXEFV
- ##########################################################################################
- # Set the SEV-ES specific work area PCDs (used for all forms of SEV since the
- # the SEV STATUS MSR is now saved in the work area)
- #
- SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaBase = $(MEMFD_BASE_ADDRESS) + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaBase + gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader
- SET gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaSize = gUefiOvmfPkgTokenSpaceGuid.PcdOvmfWorkAreaSize - gUefiOvmfPkgTokenSpaceGuid.PcdOvmfConfidentialComputingWorkAreaHeader
- ##########################################################################################
- ################################################################################
- [FV.SECFV]
- FvNameGuid = 763BED0D-DE9F-48F5-81F1-3E90E1B1A015
- BlockSize = 0x1000
- FvAlignment = 16
- ERASE_POLARITY = 1
- MEMORY_MAPPED = TRUE
- STICKY_WRITE = TRUE
- LOCK_CAP = TRUE
- LOCK_STATUS = TRUE
- WRITE_DISABLED_CAP = TRUE
- WRITE_ENABLED_CAP = TRUE
- WRITE_STATUS = TRUE
- WRITE_LOCK_CAP = TRUE
- WRITE_LOCK_STATUS = TRUE
- READ_DISABLED_CAP = TRUE
- READ_ENABLED_CAP = TRUE
- READ_STATUS = TRUE
- READ_LOCK_CAP = TRUE
- READ_LOCK_STATUS = TRUE
- #
- # SEC Phase modules
- #
- # The code in this FV handles the initial firmware startup, and
- # decompresses the PEI and DXE FVs which handles the rest of the boot sequence.
- #
- INF OvmfPkg/Sec/SecMain.inf
- INF RuleOverride=RESET_VECTOR OvmfPkg/ResetVector/ResetVector.inf
- ################################################################################
- [FV.PEIFV]
- FvNameGuid = 6938079B-B503-4E3D-9D24-B28337A25806
- BlockSize = 0x10000
- FvAlignment = 16
- ERASE_POLARITY = 1
- MEMORY_MAPPED = TRUE
- STICKY_WRITE = TRUE
- LOCK_CAP = TRUE
- LOCK_STATUS = TRUE
- WRITE_DISABLED_CAP = TRUE
- WRITE_ENABLED_CAP = TRUE
- WRITE_STATUS = TRUE
- WRITE_LOCK_CAP = TRUE
- WRITE_LOCK_STATUS = TRUE
- READ_DISABLED_CAP = TRUE
- READ_ENABLED_CAP = TRUE
- READ_STATUS = TRUE
- READ_LOCK_CAP = TRUE
- READ_LOCK_STATUS = TRUE
- APRIORI PEI {
- INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
- }
- #
- # PEI Phase modules
- #
- INF MdeModulePkg/Core/Pei/PeiMain.inf
- INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
- INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf
- INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf
- INF OvmfPkg/PlatformPei/PlatformPei.inf
- INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
- INF UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf
- !if $(SMM_REQUIRE) == TRUE
- INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf
- INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf
- INF OvmfPkg/SmmAccess/SmmAccessPei.inf
- !endif
- INF UefiCpuPkg/CpuMpPei/CpuMpPei.inf
- INF FILE_GUID = $(UP_CPU_PEI_GUID) UefiCpuPkg/CpuMpPei/CpuMpPei.inf
- !include OvmfPkg/OvmfTpmPei.fdf.inc
- ################################################################################
- [FV.DXEFV]
- FvForceRebase = FALSE
- FvNameGuid = 7CB8BDC9-F8EB-4F34-AAEA-3EE4AF6516A1
- BlockSize = 0x10000
- FvAlignment = 16
- ERASE_POLARITY = 1
- MEMORY_MAPPED = TRUE
- STICKY_WRITE = TRUE
- LOCK_CAP = TRUE
- LOCK_STATUS = TRUE
- WRITE_DISABLED_CAP = TRUE
- WRITE_ENABLED_CAP = TRUE
- WRITE_STATUS = TRUE
- WRITE_LOCK_CAP = TRUE
- WRITE_LOCK_STATUS = TRUE
- READ_DISABLED_CAP = TRUE
- READ_ENABLED_CAP = TRUE
- READ_STATUS = TRUE
- READ_LOCK_CAP = TRUE
- READ_LOCK_STATUS = TRUE
- APRIORI DXE {
- INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
- INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
- # AmdSevDxe must be loaded before TdxDxe. Because in SEV guest AmdSevDxe
- # driver performs a MemEncryptSevClearMmioPageEncMask() call against the
- # PcdPciExpressBaseAddress range to mark it shared/unencrypted.
- # Otherwise #VC handler terminates the guest for trying to do MMIO to an
- # encrypted region (Since the range has not been marked shared/unencrypted).
- INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf
- INF OvmfPkg/TdxDxe/TdxDxe.inf
- !if $(SMM_REQUIRE) == FALSE
- INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
- !endif
- }
- #
- # DXE Phase modules
- #
- INF MdeModulePkg/Core/Dxe/DxeMain.inf
- INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf
- INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf
- INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
- INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
- INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
- INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
- INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf
- INF UefiCpuPkg/CpuDxe/CpuDxe.inf
- INF FILE_GUID = $(UP_CPU_DXE_GUID) UefiCpuPkg/CpuDxe/CpuDxe.inf
- !ifdef $(CSM_ENABLE)
- INF OvmfPkg/8259InterruptControllerDxe/8259.inf
- INF OvmfPkg/8254TimerDxe/8254Timer.inf
- !else
- INF OvmfPkg/LocalApicTimerDxe/LocalApicTimerDxe.inf
- !endif
- INF OvmfPkg/IncompatiblePciDeviceSupportDxe/IncompatiblePciDeviceSupport.inf
- INF OvmfPkg/PciHotPlugInitDxe/PciHotPlugInit.inf
- INF MdeModulePkg/Bus/Pci/PciHostBridgeDxe/PciHostBridgeDxe.inf
- INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf
- INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf
- INF MdeModulePkg/Universal/Metronome/Metronome.inf
- INF PcAtChipsetPkg/PcatRealTimeClockRuntimeDxe/PcatRealTimeClockRuntimeDxe.inf
- INF OvmfPkg/VirtioPciDeviceDxe/VirtioPciDeviceDxe.inf
- INF OvmfPkg/Virtio10Dxe/Virtio10.inf
- INF OvmfPkg/VirtioBlkDxe/VirtioBlk.inf
- INF OvmfPkg/VirtioScsiDxe/VirtioScsi.inf
- INF OvmfPkg/VirtioRngDxe/VirtioRng.inf
- !if $(PVSCSI_ENABLE) == TRUE
- INF OvmfPkg/PvScsiDxe/PvScsiDxe.inf
- !endif
- !if $(MPT_SCSI_ENABLE) == TRUE
- INF OvmfPkg/MptScsiDxe/MptScsiDxe.inf
- !endif
- !if $(LSI_SCSI_ENABLE) == TRUE
- INF OvmfPkg/LsiScsiDxe/LsiScsiDxe.inf
- !endif
- !if $(SECURE_BOOT_ENABLE) == TRUE
- INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
- !endif
- INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
- INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
- INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
- INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
- INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
- INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
- INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
- INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
- INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
- INF MdeModulePkg/Application/UiApp/UiApp.inf
- INF OvmfPkg/QemuKernelLoaderFsDxe/QemuKernelLoaderFsDxe.inf
- INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
- INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
- INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
- INF MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskDxe.inf
- INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
- INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
- INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
- INF OvmfPkg/SataControllerDxe/SataControllerDxe.inf
- INF MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf
- INF MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf
- INF MdeModulePkg/Bus/Pci/NvmExpressDxe/NvmExpressDxe.inf
- INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
- INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
- INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
- INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
- INF OvmfPkg/SioBusDxe/SioBusDxe.inf
- !if $(SOURCE_DEBUG_ENABLE) == FALSE
- INF MdeModulePkg/Bus/Pci/PciSioSerialDxe/PciSioSerialDxe.inf
- !endif
- INF MdeModulePkg/Bus/Isa/Ps2KeyboardDxe/Ps2KeyboardDxe.inf
- INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf
- INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf
- INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf
- INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf
- INF MdeModulePkg/Universal/Acpi/S3SaveStateDxe/S3SaveStateDxe.inf
- INF MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe/BootScriptExecutorDxe.inf
- INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResourceTableDxe.inf
- INF FatPkg/EnhancedFatDxe/Fat.inf
- INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
- INF OvmfPkg/VirtioFsDxe/VirtioFsDxe.inf
- !if $(BUILD_SHELL) == TRUE && $(TOOL_CHAIN_TAG) != "XCODE5"
- INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
- INF ShellPkg/DynamicCommand/HttpDynamicCommand/HttpDynamicCommand.inf
- INF OvmfPkg/LinuxInitrdDynamicShellCommand/LinuxInitrdDynamicShellCommand.inf
- !endif
- !if $(BUILD_SHELL) == TRUE
- INF ShellPkg/Application/Shell/Shell.inf
- !endif
- INF MdeModulePkg/Logo/LogoDxe.inf
- INF OvmfPkg/TdxDxe/TdxDxe.inf
- #
- # Network modules
- #
- !if $(E1000_ENABLE)
- FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {
- SECTION PE32 = Intel3.5/EFIX64/E3522X2.EFI
- }
- !endif
- !include NetworkPkg/Network.fdf.inc
- INF OvmfPkg/VirtioNetDxe/VirtioNet.inf
- #
- # Usb Support
- #
- INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf
- INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf
- INF MdeModulePkg/Bus/Pci/XhciDxe/XhciDxe.inf
- INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf
- INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf
- INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf
- !ifdef $(CSM_ENABLE)
- INF OvmfPkg/Csm/BiosThunk/VideoDxe/VideoDxe.inf
- INF OvmfPkg/Csm/LegacyBiosDxe/LegacyBiosDxe.inf
- INF RuleOverride=CSM OvmfPkg/Csm/Csm16/Csm16.inf
- !else
- INF OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
- !endif
- INF OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
- INF OvmfPkg/VirtioGpuDxe/VirtioGpu.inf
- INF OvmfPkg/PlatformDxe/Platform.inf
- INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf
- INF OvmfPkg/IoMmuDxe/IoMmuDxe.inf
- !if $(SMM_REQUIRE) == TRUE
- INF OvmfPkg/SmmAccess/SmmAccess2Dxe.inf
- INF OvmfPkg/SmmControl2Dxe/SmmControl2Dxe.inf
- INF OvmfPkg/CpuS3DataDxe/CpuS3DataDxe.inf
- INF MdeModulePkg/Core/PiSmmCore/PiSmmIpl.inf
- INF MdeModulePkg/Core/PiSmmCore/PiSmmCore.inf
- INF OvmfPkg/CpuHotplugSmm/CpuHotplugSmm.inf
- INF UefiCpuPkg/CpuIo2Smm/CpuIo2Smm.inf
- INF MdeModulePkg/Universal/LockBox/SmmLockBox/SmmLockBox.inf
- INF UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf
- #
- # Variable driver stack (SMM)
- #
- INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesSmm.inf
- INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteSmm.inf
- INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmm.inf
- INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableSmmRuntimeDxe.inf
- !else
- #
- # Variable driver stack (non-SMM)
- #
- INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
- INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf
- INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
- INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
- !endif
- #
- # EFI_CC_MEASUREMENT_PROTOCOL
- #
- !if $(CC_MEASUREMENT_ENABLE) == TRUE
- INF SecurityPkg/Tcg/TdTcg2Dxe/TdTcg2Dxe.inf
- !endif
- #
- # TPM support
- #
- !include OvmfPkg/OvmfTpmDxe.fdf.inc
- ################################################################################
- [FV.FVMAIN_COMPACT]
- FvNameGuid = 48DB5E17-707C-472D-91CD-1613E7EF51B0
- FvAlignment = 16
- ERASE_POLARITY = 1
- MEMORY_MAPPED = TRUE
- STICKY_WRITE = TRUE
- LOCK_CAP = TRUE
- LOCK_STATUS = TRUE
- WRITE_DISABLED_CAP = TRUE
- WRITE_ENABLED_CAP = TRUE
- WRITE_STATUS = TRUE
- WRITE_LOCK_CAP = TRUE
- WRITE_LOCK_STATUS = TRUE
- READ_DISABLED_CAP = TRUE
- READ_ENABLED_CAP = TRUE
- READ_STATUS = TRUE
- READ_LOCK_CAP = TRUE
- READ_LOCK_STATUS = TRUE
- FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {
- SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {
- #
- # These firmware volumes will have files placed in them uncompressed,
- # and then both firmware volumes will be compressed in a single
- # compression operation in order to achieve better overall compression.
- #
- SECTION FV_IMAGE = PEIFV
- SECTION FV_IMAGE = DXEFV
- }
- }
- !include OvmfPkg/Include/Fdf/FvmainCompactScratchEnd.fdf.inc
- ################################################################################
- [Rule.Common.SEC]
- FILE SEC = $(NAMED_GUID) {
- PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
- UI STRING ="$(MODULE_NAME)" Optional
- VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
- }
- [Rule.Common.PEI_CORE]
- FILE PEI_CORE = $(NAMED_GUID) {
- PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi
- UI STRING ="$(MODULE_NAME)" Optional
- VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
- }
- [Rule.Common.PEIM]
- FILE PEIM = $(NAMED_GUID) {
- PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
- PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi
- UI STRING="$(MODULE_NAME)" Optional
- VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
- }
- [Rule.Common.DXE_CORE]
- FILE DXE_CORE = $(NAMED_GUID) {
- PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
- UI STRING="$(MODULE_NAME)" Optional
- VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
- }
- [Rule.Common.DXE_DRIVER]
- FILE DRIVER = $(NAMED_GUID) {
- DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
- PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
- UI STRING="$(MODULE_NAME)" Optional
- VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
- RAW ACPI Optional |.acpi
- RAW ASL Optional |.aml
- }
- [Rule.Common.DXE_RUNTIME_DRIVER]
- FILE DRIVER = $(NAMED_GUID) {
- DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
- PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
- UI STRING="$(MODULE_NAME)" Optional
- VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
- }
- [Rule.Common.UEFI_DRIVER]
- FILE DRIVER = $(NAMED_GUID) {
- DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
- PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
- UI STRING="$(MODULE_NAME)" Optional
- VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
- }
- [Rule.Common.UEFI_DRIVER.BINARY]
- FILE DRIVER = $(NAMED_GUID) {
- DXE_DEPEX DXE_DEPEX Optional |.depex
- PE32 PE32 |.efi
- UI STRING="$(MODULE_NAME)" Optional
- VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
- }
- [Rule.Common.UEFI_APPLICATION]
- FILE APPLICATION = $(NAMED_GUID) {
- PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
- UI STRING="$(MODULE_NAME)" Optional
- VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
- }
- [Rule.Common.UEFI_APPLICATION.BINARY]
- FILE APPLICATION = $(NAMED_GUID) {
- PE32 PE32 |.efi
- UI STRING="$(MODULE_NAME)" Optional
- VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
- }
- [Rule.Common.USER_DEFINED.CSM]
- FILE FREEFORM = $(NAMED_GUID) {
- RAW BIN |.bin
- }
- [Rule.Common.SEC.RESET_VECTOR]
- FILE RAW = $(NAMED_GUID) {
- RAW BIN Align = 16 |.bin
- }
- [Rule.Common.SMM_CORE]
- FILE SMM_CORE = $(NAMED_GUID) {
- PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
- UI STRING="$(MODULE_NAME)" Optional
- VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
- }
- [Rule.Common.DXE_SMM_DRIVER]
- FILE SMM = $(NAMED_GUID) {
- SMM_DEPEX SMM_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
- PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
- UI STRING="$(MODULE_NAME)" Optional
- VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
- }
|