OvmfXen.fdf 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540
  1. ## @file
  2. # Open Virtual Machine Firmware: FDF
  3. #
  4. # Copyright (c) 2006 - 2019, Intel Corporation. All rights reserved.<BR>
  5. # (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
  6. # Copyright (c) 2019, Citrix Systems, Inc.
  7. #
  8. # SPDX-License-Identifier: BSD-2-Clause-Patent
  9. #
  10. ##
  11. ################################################################################
  12. [Defines]
  13. !include OvmfPkgDefines.fdf.inc
  14. #
  15. # This will allow the flash device image to be recognize as an ELF, with first
  16. # an ELF headers, then the firmware code.
  17. #
  18. [FD.OVMF]
  19. BaseAddress = $(FW_BASE_ADDRESS)
  20. Size = $(FW_SIZE)
  21. ErasePolarity = 1
  22. BlockSize = $(BLOCK_SIZE)
  23. NumBlocks = $(FW_BLOCKS)
  24. !if ($(FD_SIZE_IN_KB) == 1024) || ($(FD_SIZE_IN_KB) == 2048)
  25. 0x00000000|0x0000e000
  26. !endif
  27. !if $(FD_SIZE_IN_KB) == 4096
  28. 0x00000000|0x00040000
  29. !endif
  30. DATA = {
  31. #
  32. # This hex array have been generated by OvmfPkg/OvmfXenElfHeaderGenerator.c
  33. # and copied manually.
  34. #
  35. # ELF file header
  36. 0x7f, 0x45, 0x4c, 0x46, # e_ident[0..3]: Magic number
  37. 0x01, # File class: 32-bit objects
  38. 0x01, # Data encoding: 2's complement, little endian
  39. 0x01, # File version
  40. 0x03, # OS ABI identification: Object uses GNU ELF extensions
  41. 0x00, # ABI version
  42. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, # e_ident[EI_PAD...]
  43. 0x02, 0x00, # e_type = Executable file
  44. 0x03, 0x00, # e_machine = Intel 80386
  45. 0x01, 0x00, 0x00, 0x00, # e_version
  46. 0xd0, 0xff, 0x2f, 0x00, # e_entry: Entry point virtual address
  47. 0x34, 0x00, 0x00, 0x00, # e_phoff: Program header table file offset
  48. 0x00, 0x00, 0x00, 0x00, # e_shoff: Section header table file offset
  49. 0x00, 0x00, 0x00, 0x00, # e_flags: Processor-specific flags
  50. 0x34, 0x00, # e_ehsize: ELF header size
  51. 0x20, 0x00, # e_phentsize: Program header table entry size
  52. 0x02, 0x00, # e_phnum: Program header table entry count
  53. 0x00, 0x00, # e_shentsize: Section header table entry size
  54. 0x00, 0x00, # e_shnum: Section header table entry count
  55. 0x00, 0x00, # e_shstrndx
  56. # ELF Program segment headers
  57. # - Load segment
  58. 0x01, 0x00, 0x00, 0x00, # p_type = Loadable program segment
  59. 0x00, 0x00, 0x00, 0x00, # p_offset
  60. 0x00, 0x00, 0x10, 0x00, # p_vaddr: Segment virtual address
  61. 0x00, 0x00, 0x10, 0x00, # p_paddr: Segment physical address
  62. 0x00, 0x00, 0x20, 0x00, # p_filesz: Segment size in file
  63. 0x00, 0x00, 0x20, 0x00, # p_memsz: Segment size in memory
  64. 0x07, 0x00, 0x00, 0x00, # p_flags = Segment is executable | writable | readable
  65. 0x00, 0x00, 0x00, 0x00, # p_align
  66. # - ELFNOTE segment
  67. 0x04, 0x00, 0x00, 0x00, # p_type = PT_NOTE
  68. 0x74, 0x00, 0x00, 0x00, # p_offset = point to XEN_ELFNOTE_PHYS32_ENTRY below
  69. 0x74, 0x00, 0x10, 0x00,
  70. 0x74, 0x00, 0x10, 0x00,
  71. 0x14, 0x00, 0x00, 0x00,
  72. 0x14, 0x00, 0x00, 0x00,
  73. 0x04, 0x00, 0x00, 0x00, # p_flags = Segment is readable
  74. 0x00, 0x00, 0x00, 0x00,
  75. # XEN_ELFNOTE_PHYS32_ENTRY
  76. 0x04, 0x00, 0x00, 0x00, # name size
  77. 0x04, 0x00, 0x00, 0x00, # desc size
  78. 0x12, 0x00, 0x00, 0x00, # type = XEN_ELFNOTE_PHYS32_ENTRY
  79. 0x58, 0x65, 0x6e, 0x00, # name = "Xen"
  80. 0xd0, 0xff, 0x2f, 0x00, # desc: PVH entry point
  81. 0x00
  82. }
  83. !if ($(FD_SIZE_IN_KB) == 1024) || ($(FD_SIZE_IN_KB) == 2048)
  84. 0x0000e000|0x00001000
  85. !endif
  86. !if $(FD_SIZE_IN_KB) == 4096
  87. 0x00040000|0x00001000
  88. !endif
  89. #NV_EVENT_LOG
  90. !if ($(FD_SIZE_IN_KB) == 1024) || ($(FD_SIZE_IN_KB) == 2048)
  91. 0x0000f000|0x00001000
  92. !endif
  93. !if $(FD_SIZE_IN_KB) == 4096
  94. 0x00041000|0x00001000
  95. !endif
  96. #NV_FTW_WORKING
  97. DATA = {
  98. # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =
  99. # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}
  100. 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,
  101. 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95,
  102. # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved
  103. 0x2c, 0xaf, 0x2c, 0x64, 0xFE, 0xFF, 0xFF, 0xFF,
  104. # WriteQueueSize: UINT64
  105. 0xE0, 0x0F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
  106. }
  107. !if ($(FD_SIZE_IN_KB) == 1024) || ($(FD_SIZE_IN_KB) == 2048)
  108. 0x00010000|0x00010000
  109. !endif
  110. !if $(FD_SIZE_IN_KB) == 4096
  111. 0x00042000|0x00042000
  112. !endif
  113. #NV_FTW_SPARE
  114. $(VARS_SIZE)|$(FVMAIN_SIZE)
  115. FV = FVMAIN_COMPACT
  116. $(SECFV_OFFSET)|$(SECFV_SIZE)
  117. FV = SECFV
  118. #
  119. # Build the variable store and the firmware code as separate flash device
  120. # images.
  121. #
  122. [FD.OVMF_VARS]
  123. BaseAddress = $(FW_BASE_ADDRESS)
  124. Size = $(VARS_SIZE)
  125. ErasePolarity = 1
  126. BlockSize = $(BLOCK_SIZE)
  127. NumBlocks = $(VARS_BLOCKS)
  128. !include VarStore.fdf.inc
  129. [FD.OVMF_CODE]
  130. BaseAddress = $(CODE_BASE_ADDRESS)
  131. Size = $(CODE_SIZE)
  132. ErasePolarity = 1
  133. BlockSize = $(BLOCK_SIZE)
  134. NumBlocks = $(CODE_BLOCKS)
  135. 0x00000000|$(FVMAIN_SIZE)
  136. FV = FVMAIN_COMPACT
  137. $(FVMAIN_SIZE)|$(SECFV_SIZE)
  138. FV = SECFV
  139. ################################################################################
  140. [FD.MEMFD]
  141. BaseAddress = $(MEMFD_BASE_ADDRESS)
  142. Size = 0xB00000
  143. ErasePolarity = 1
  144. BlockSize = 0x10000
  145. NumBlocks = 0xB0
  146. 0x000000|0x006000
  147. gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize
  148. 0x006000|0x001000
  149. gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfLockBoxStorageSize
  150. 0x007000|0x001000
  151. gEfiMdePkgTokenSpaceGuid.PcdGuidedExtractHandlerTableAddress|gUefiOvmfPkgTokenSpaceGuid.PcdGuidedExtractHandlerTableSize
  152. 0x008000|0x001000
  153. # Used by XenResetVector to communicate with XenPlatformPei
  154. gUefiOvmfPkgTokenSpaceGuid.PcdXenPvhStartOfDayStructPtr|gUefiOvmfPkgTokenSpaceGuid.PcdXenPvhStartOfDayStructPtrSize
  155. 0x010000|0x010000
  156. gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize
  157. 0x020000|0x0E0000
  158. gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfPeiMemFvSize
  159. FV = PEIFV
  160. 0x100000|0xA00000
  161. gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfDxeMemFvSize
  162. FV = DXEFV
  163. ################################################################################
  164. [FV.SECFV]
  165. FvNameGuid = 763BED0D-DE9F-48F5-81F1-3E90E1B1A015
  166. BlockSize = 0x1000
  167. FvAlignment = 16
  168. ERASE_POLARITY = 1
  169. MEMORY_MAPPED = TRUE
  170. STICKY_WRITE = TRUE
  171. LOCK_CAP = TRUE
  172. LOCK_STATUS = TRUE
  173. WRITE_DISABLED_CAP = TRUE
  174. WRITE_ENABLED_CAP = TRUE
  175. WRITE_STATUS = TRUE
  176. WRITE_LOCK_CAP = TRUE
  177. WRITE_LOCK_STATUS = TRUE
  178. READ_DISABLED_CAP = TRUE
  179. READ_ENABLED_CAP = TRUE
  180. READ_STATUS = TRUE
  181. READ_LOCK_CAP = TRUE
  182. READ_LOCK_STATUS = TRUE
  183. #
  184. # SEC Phase modules
  185. #
  186. # The code in this FV handles the initial firmware startup, and
  187. # decompresses the PEI and DXE FVs which handles the rest of the boot sequence.
  188. #
  189. INF OvmfPkg/Sec/SecMain.inf
  190. INF RuleOverride=RESET_VECTOR OvmfPkg/XenResetVector/XenResetVector.inf
  191. ################################################################################
  192. [FV.PEIFV]
  193. FvNameGuid = 6938079B-B503-4E3D-9D24-B28337A25806
  194. BlockSize = 0x10000
  195. FvAlignment = 16
  196. ERASE_POLARITY = 1
  197. MEMORY_MAPPED = TRUE
  198. STICKY_WRITE = TRUE
  199. LOCK_CAP = TRUE
  200. LOCK_STATUS = TRUE
  201. WRITE_DISABLED_CAP = TRUE
  202. WRITE_ENABLED_CAP = TRUE
  203. WRITE_STATUS = TRUE
  204. WRITE_LOCK_CAP = TRUE
  205. WRITE_LOCK_STATUS = TRUE
  206. READ_DISABLED_CAP = TRUE
  207. READ_ENABLED_CAP = TRUE
  208. READ_STATUS = TRUE
  209. READ_LOCK_CAP = TRUE
  210. READ_LOCK_STATUS = TRUE
  211. APRIORI PEI {
  212. INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
  213. }
  214. #
  215. # PEI Phase modules
  216. #
  217. INF MdeModulePkg/Core/Pei/PeiMain.inf
  218. INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
  219. INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf
  220. INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf
  221. INF OvmfPkg/XenPlatformPei/XenPlatformPei.inf
  222. INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
  223. INF UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf
  224. INF UefiCpuPkg/CpuMpPei/CpuMpPei.inf
  225. ################################################################################
  226. [FV.DXEFV]
  227. FvForceRebase = FALSE
  228. FvNameGuid = 7CB8BDC9-F8EB-4F34-AAEA-3EE4AF6516A1
  229. BlockSize = 0x10000
  230. FvAlignment = 16
  231. ERASE_POLARITY = 1
  232. MEMORY_MAPPED = TRUE
  233. STICKY_WRITE = TRUE
  234. LOCK_CAP = TRUE
  235. LOCK_STATUS = TRUE
  236. WRITE_DISABLED_CAP = TRUE
  237. WRITE_ENABLED_CAP = TRUE
  238. WRITE_STATUS = TRUE
  239. WRITE_LOCK_CAP = TRUE
  240. WRITE_LOCK_STATUS = TRUE
  241. READ_DISABLED_CAP = TRUE
  242. READ_ENABLED_CAP = TRUE
  243. READ_STATUS = TRUE
  244. READ_LOCK_CAP = TRUE
  245. READ_LOCK_STATUS = TRUE
  246. APRIORI DXE {
  247. INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
  248. INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
  249. INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf
  250. INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
  251. }
  252. #
  253. # DXE Phase modules
  254. #
  255. INF MdeModulePkg/Core/Dxe/DxeMain.inf
  256. INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf
  257. INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf
  258. INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
  259. INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
  260. INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
  261. INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
  262. INF OvmfPkg/XenTimerDxe/XenTimerDxe.inf
  263. INF UefiCpuPkg/CpuIo2Dxe/CpuIo2Dxe.inf
  264. INF UefiCpuPkg/CpuDxe/CpuDxe.inf
  265. INF OvmfPkg/IncompatiblePciDeviceSupportDxe/IncompatiblePciDeviceSupport.inf
  266. INF OvmfPkg/PciHotPlugInitDxe/PciHotPlugInit.inf
  267. INF MdeModulePkg/Bus/Pci/PciHostBridgeDxe/PciHostBridgeDxe.inf
  268. INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf
  269. INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf
  270. INF MdeModulePkg/Universal/Metronome/Metronome.inf
  271. INF EmbeddedPkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf
  272. INF OvmfPkg/XenIoPvhDxe/XenIoPvhDxe.inf
  273. INF OvmfPkg/XenIoPciDxe/XenIoPciDxe.inf
  274. INF OvmfPkg/XenBusDxe/XenBusDxe.inf
  275. INF OvmfPkg/XenPvBlkDxe/XenPvBlkDxe.inf
  276. INF MdeModulePkg/Universal/SerialDxe/SerialDxe.inf
  277. INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
  278. INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
  279. INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
  280. INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
  281. INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
  282. INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
  283. INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
  284. INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
  285. INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
  286. INF MdeModulePkg/Application/UiApp/UiApp.inf
  287. INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
  288. INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf
  289. INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
  290. INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
  291. INF MdeModulePkg/Universal/Disk/RamDiskDxe/RamDiskDxe.inf
  292. INF MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
  293. INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
  294. INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
  295. INF OvmfPkg/SataControllerDxe/SataControllerDxe.inf
  296. INF MdeModulePkg/Bus/Ata/AtaAtapiPassThru/AtaAtapiPassThru.inf
  297. INF MdeModulePkg/Bus/Ata/AtaBusDxe/AtaBusDxe.inf
  298. INF MdeModulePkg/Bus/Pci/NvmExpressDxe/NvmExpressDxe.inf
  299. INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
  300. INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
  301. INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
  302. INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
  303. INF OvmfPkg/SioBusDxe/SioBusDxe.inf
  304. !if $(SOURCE_DEBUG_ENABLE) == FALSE
  305. INF MdeModulePkg/Bus/Pci/PciSioSerialDxe/PciSioSerialDxe.inf
  306. !endif
  307. INF MdeModulePkg/Bus/Isa/Ps2KeyboardDxe/Ps2KeyboardDxe.inf
  308. INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf
  309. INF OvmfPkg/SmbiosPlatformDxe/SmbiosPlatformDxe.inf
  310. INF MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf
  311. INF OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf
  312. INF RuleOverride=ACPITABLE OvmfPkg/AcpiTables/AcpiTables.inf
  313. INF MdeModulePkg/Universal/Acpi/S3SaveStateDxe/S3SaveStateDxe.inf
  314. INF MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe/BootScriptExecutorDxe.inf
  315. INF MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResourceTableDxe.inf
  316. INF FatPkg/EnhancedFatDxe/Fat.inf
  317. INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
  318. !if $(TOOL_CHAIN_TAG) != "XCODE5"
  319. INF ShellPkg/DynamicCommand/TftpDynamicCommand/TftpDynamicCommand.inf
  320. INF OvmfPkg/LinuxInitrdDynamicShellCommand/LinuxInitrdDynamicShellCommand.inf
  321. !endif
  322. INF ShellPkg/Application/Shell/Shell.inf
  323. INF MdeModulePkg/Logo/LogoDxe.inf
  324. #
  325. # Network modules
  326. #
  327. !if $(E1000_ENABLE)
  328. FILE DRIVER = 5D695E11-9B3F-4b83-B25F-4A8D5D69BE07 {
  329. SECTION PE32 = Intel3.5/EFIX64/E3522X2.EFI
  330. }
  331. !endif
  332. !include NetworkPkg/Network.fdf.inc
  333. #
  334. # Usb Support
  335. #
  336. INF MdeModulePkg/Bus/Pci/UhciDxe/UhciDxe.inf
  337. INF MdeModulePkg/Bus/Pci/EhciDxe/EhciDxe.inf
  338. INF MdeModulePkg/Bus/Pci/XhciDxe/XhciDxe.inf
  339. INF MdeModulePkg/Bus/Usb/UsbBusDxe/UsbBusDxe.inf
  340. INF MdeModulePkg/Bus/Usb/UsbKbDxe/UsbKbDxe.inf
  341. INF MdeModulePkg/Bus/Usb/UsbMassStorageDxe/UsbMassStorageDxe.inf
  342. !ifdef $(CSM_ENABLE)
  343. INF OvmfPkg/Csm/BiosThunk/VideoDxe/VideoDxe.inf
  344. INF OvmfPkg/Csm/LegacyBiosDxe/LegacyBiosDxe.inf
  345. INF RuleOverride=CSM OvmfPkg/Csm/Csm16/Csm16.inf
  346. !endif
  347. INF OvmfPkg/QemuVideoDxe/QemuVideoDxe.inf
  348. INF OvmfPkg/QemuRamfbDxe/QemuRamfbDxe.inf
  349. INF OvmfPkg/PlatformDxe/Platform.inf
  350. INF OvmfPkg/AmdSevDxe/AmdSevDxe.inf
  351. INF OvmfPkg/IoMmuDxe/IoMmuDxe.inf
  352. #
  353. # Variable driver stack (non-SMM)
  354. #
  355. INF OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
  356. INF OvmfPkg/EmuVariableFvbRuntimeDxe/Fvb.inf
  357. INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
  358. INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
  359. ################################################################################
  360. [FV.FVMAIN_COMPACT]
  361. FvNameGuid = 48DB5E17-707C-472D-91CD-1613E7EF51B0
  362. FvAlignment = 16
  363. ERASE_POLARITY = 1
  364. MEMORY_MAPPED = TRUE
  365. STICKY_WRITE = TRUE
  366. LOCK_CAP = TRUE
  367. LOCK_STATUS = TRUE
  368. WRITE_DISABLED_CAP = TRUE
  369. WRITE_ENABLED_CAP = TRUE
  370. WRITE_STATUS = TRUE
  371. WRITE_LOCK_CAP = TRUE
  372. WRITE_LOCK_STATUS = TRUE
  373. READ_DISABLED_CAP = TRUE
  374. READ_ENABLED_CAP = TRUE
  375. READ_STATUS = TRUE
  376. READ_LOCK_CAP = TRUE
  377. READ_LOCK_STATUS = TRUE
  378. FILE FV_IMAGE = 9E21FD93-9C72-4c15-8C4B-E77F1DB2D792 {
  379. SECTION GUIDED EE4E5898-3914-4259-9D6E-DC7BD79403CF PROCESSING_REQUIRED = TRUE {
  380. #
  381. # These firmware volumes will have files placed in them uncompressed,
  382. # and then both firmware volumes will be compressed in a single
  383. # compression operation in order to achieve better overall compression.
  384. #
  385. SECTION FV_IMAGE = PEIFV
  386. SECTION FV_IMAGE = DXEFV
  387. }
  388. }
  389. !include FvmainCompactScratchEnd.fdf.inc
  390. ################################################################################
  391. [Rule.Common.SEC]
  392. FILE SEC = $(NAMED_GUID) {
  393. PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
  394. UI STRING ="$(MODULE_NAME)" Optional
  395. VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  396. }
  397. [Rule.Common.PEI_CORE]
  398. FILE PEI_CORE = $(NAMED_GUID) {
  399. PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi
  400. UI STRING ="$(MODULE_NAME)" Optional
  401. VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  402. }
  403. [Rule.Common.PEIM]
  404. FILE PEIM = $(NAMED_GUID) {
  405. PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
  406. PE32 PE32 Align=Auto $(INF_OUTPUT)/$(MODULE_NAME).efi
  407. UI STRING="$(MODULE_NAME)" Optional
  408. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  409. }
  410. [Rule.Common.DXE_CORE]
  411. FILE DXE_CORE = $(NAMED_GUID) {
  412. PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
  413. UI STRING="$(MODULE_NAME)" Optional
  414. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  415. }
  416. [Rule.Common.DXE_DRIVER]
  417. FILE DRIVER = $(NAMED_GUID) {
  418. DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
  419. PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
  420. UI STRING="$(MODULE_NAME)" Optional
  421. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  422. RAW ACPI Optional |.acpi
  423. RAW ASL Optional |.aml
  424. }
  425. [Rule.Common.DXE_RUNTIME_DRIVER]
  426. FILE DRIVER = $(NAMED_GUID) {
  427. DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
  428. PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
  429. UI STRING="$(MODULE_NAME)" Optional
  430. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  431. }
  432. [Rule.Common.UEFI_DRIVER]
  433. FILE DRIVER = $(NAMED_GUID) {
  434. DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
  435. PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
  436. UI STRING="$(MODULE_NAME)" Optional
  437. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  438. }
  439. [Rule.Common.UEFI_DRIVER.BINARY]
  440. FILE DRIVER = $(NAMED_GUID) {
  441. DXE_DEPEX DXE_DEPEX Optional |.depex
  442. PE32 PE32 |.efi
  443. UI STRING="$(MODULE_NAME)" Optional
  444. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  445. }
  446. [Rule.Common.UEFI_APPLICATION]
  447. FILE APPLICATION = $(NAMED_GUID) {
  448. PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
  449. UI STRING="$(MODULE_NAME)" Optional
  450. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  451. }
  452. [Rule.Common.UEFI_APPLICATION.BINARY]
  453. FILE APPLICATION = $(NAMED_GUID) {
  454. PE32 PE32 |.efi
  455. UI STRING="$(MODULE_NAME)" Optional
  456. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  457. }
  458. [Rule.Common.USER_DEFINED.ACPITABLE]
  459. FILE FREEFORM = $(NAMED_GUID) {
  460. RAW ACPI |.acpi
  461. RAW ASL |.aml
  462. }
  463. [Rule.Common.USER_DEFINED.CSM]
  464. FILE FREEFORM = $(NAMED_GUID) {
  465. RAW BIN |.bin
  466. }
  467. [Rule.Common.SEC.RESET_VECTOR]
  468. FILE RAW = $(NAMED_GUID) {
  469. RAW BIN Align = 16 |.bin
  470. }