]>
Commit | Line | Data |
---|---|---|
1 | ## @file\r | |
2 | # This is NT32 FDF file with UEFI HII features enabled\r | |
3 | #\r | |
4 | # Copyright (c) 2007 - 2018, Intel Corporation. All rights reserved.<BR>\r | |
5 | # (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>\r | |
6 | #\r | |
7 | # This program and the accompanying materials\r | |
8 | # are licensed and made available under the terms and conditions of the BSD License\r | |
9 | # which accompanies this distribution. The full text of the license may be found at\r | |
10 | # http://opensource.org/licenses/bsd-license.php\r | |
11 | #\r | |
12 | # THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r | |
13 | # WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r | |
14 | #\r | |
15 | \r | |
16 | ################################################################################\r | |
17 | #\r | |
18 | # FD Section\r | |
19 | # The [FD] Section is made up of the definition statements and a\r | |
20 | # description of what goes into the Flash Device Image. Each FD section\r | |
21 | # defines one flash "device" image. A flash device image may be one of\r | |
22 | # the following: Removable media bootable image (like a boot floppy\r | |
23 | # image,) an Option ROM image (that would be "flashed" into an add-in\r | |
24 | # card,) a System "Flash" image (that would be burned into a system's\r | |
25 | # flash) or an Update ("Capsule") image that will be used to update and\r | |
26 | # existing system flash.\r | |
27 | #\r | |
28 | ################################################################################\r | |
29 | [FD.Nt32]\r | |
30 | BaseAddress = 0x0|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFdBaseAddress #The base address of the FLASH Device.\r | |
31 | Size = 0x00480000|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFirmwareFdSize #The size in bytes of the FLASH Device\r | |
32 | ErasePolarity = 1\r | |
33 | BlockSize = 0x10000\r | |
34 | NumBlocks = 0x48\r | |
35 | \r | |
36 | ################################################################################\r | |
37 | #\r | |
38 | # Following are lists of FD Region layout which correspond to the locations of different\r | |
39 | # images within the flash device.\r | |
40 | #\r | |
41 | # Regions must be defined in ascending order and may not overlap.\r | |
42 | #\r | |
43 | # A Layout Region start with a eight digit hex offset (leading "0x" required) followed by\r | |
44 | # the pipe "|" character, followed by the size of the region, also in hex with the leading\r | |
45 | # "0x" characters. Like:\r | |
46 | # Offset|Size\r | |
47 | # PcdOffsetCName|PcdSizeCName\r | |
48 | # RegionType <FV, DATA, or FILE>\r | |
49 | #\r | |
50 | ################################################################################\r | |
51 | 0x00000000|0x00460000\r | |
52 | gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoveryBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoverySize\r | |
53 | FV = FvRecovery\r | |
54 | \r | |
55 | 0x00460000|0x0000c000\r | |
56 | gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize\r | |
57 | #NV_VARIABLE_STORE\r | |
58 | DATA = {\r | |
59 | ## This is the EFI_FIRMWARE_VOLUME_HEADER\r | |
60 | # ZeroVector []\r | |
61 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r | |
62 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r | |
63 | # FileSystemGuid: gEfiSystemNvDataFvGuid =\r | |
64 | # { 0xFFF12B8D, 0x7696, 0x4C8B, { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }}\r | |
65 | 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C,\r | |
66 | 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50,\r | |
67 | # FvLength: 0x20000\r | |
68 | 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00,\r | |
69 | #Signature "_FVH" #Attributes\r | |
70 | 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00,\r | |
71 | #HeaderLength #CheckSum #ExtHeaderOffset #Reserved #Revision\r | |
72 | 0x48, 0x00, 0x36, 0x09, 0x00, 0x00, 0x00, 0x02,\r | |
73 | #Blockmap[0]: 2 Blocks * 0x10000 Bytes / Block\r | |
74 | 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00,\r | |
75 | #Blockmap[1]: End\r | |
76 | 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r | |
77 | ## This is the VARIABLE_STORE_HEADER\r | |
78 | !if $(SECURE_BOOT_ENABLE) == TRUE\r | |
79 | #Signature: gEfiAuthenticatedVariableGuid =\r | |
80 | # { 0xaaf32c78, 0x947b, 0x439a, { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }}\r | |
81 | 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43,\r | |
82 | 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92,\r | |
83 | !else\r | |
84 | #Signature: gEfiVariableGuid =\r | |
85 | # { 0xddcf3616, 0x3275, 0x4164, { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }}\r | |
86 | 0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41,\r | |
87 | 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d,\r | |
88 | !endif\r | |
89 | #Size: 0xc000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) - 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0xBFB8\r | |
90 | # This can speed up the Variable Dispatch a bit.\r | |
91 | 0xB8, 0xBF, 0x00, 0x00,\r | |
92 | #FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32\r | |
93 | 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r | |
94 | }\r | |
95 | \r | |
96 | 0x0046c000|0x00002000\r | |
97 | #NV_EVENT_LOG\r | |
98 | gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogSize\r | |
99 | \r | |
100 | 0x0046e000|0x00002000\r | |
101 | gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize\r | |
102 | #NV_FTW_WORKING\r | |
103 | DATA = {\r | |
104 | # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =\r | |
105 | # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}\r | |
106 | 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,\r | |
107 | 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95,\r | |
108 | # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved\r | |
109 | 0xE2, 0x33, 0xF2, 0x03, 0xFE, 0xFF, 0xFF, 0xFF,\r | |
110 | # WriteQueueSize: UINT64\r | |
111 | 0xE0, 0x1F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r | |
112 | }\r | |
113 | \r | |
114 | 0x00470000|0x00010000\r | |
115 | #NV_FTW_SPARE\r | |
116 | gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize\r | |
117 | \r | |
118 | ################################################################################\r | |
119 | #\r | |
120 | # FV Section\r | |
121 | #\r | |
122 | # [FV] section is used to define what components or modules are placed within a flash\r | |
123 | # device file. This section also defines order the components and modules are positioned\r | |
124 | # within the image. The [FV] section consists of define statements, set statements and\r | |
125 | # module statements.\r | |
126 | #\r | |
127 | ################################################################################\r | |
128 | [FV.FvRecovery]\r | |
129 | FvAlignment = 16 #FV alignment and FV attributes setting.\r | |
130 | ERASE_POLARITY = 1\r | |
131 | MEMORY_MAPPED = TRUE\r | |
132 | STICKY_WRITE = TRUE\r | |
133 | LOCK_CAP = TRUE\r | |
134 | LOCK_STATUS = TRUE\r | |
135 | WRITE_DISABLED_CAP = TRUE\r | |
136 | WRITE_ENABLED_CAP = TRUE\r | |
137 | WRITE_STATUS = TRUE\r | |
138 | WRITE_LOCK_CAP = TRUE\r | |
139 | WRITE_LOCK_STATUS = TRUE\r | |
140 | READ_DISABLED_CAP = TRUE\r | |
141 | READ_ENABLED_CAP = TRUE\r | |
142 | READ_STATUS = TRUE\r | |
143 | READ_LOCK_CAP = TRUE\r | |
144 | READ_LOCK_STATUS = TRUE\r | |
145 | FvNameGuid = 6D99E806-3D38-42c2-A095-5F4300BFD7DC\r | |
146 | \r | |
147 | ################################################################################\r | |
148 | #\r | |
149 | # The INF statements point to EDK component and EDK II module INF files, which will be placed into this FV image.\r | |
150 | # Parsing tools will scan the INF file to determine the type of component or module.\r | |
151 | # The component or module type is used to reference the standard rules\r | |
152 | # defined elsewhere in the FDF file.\r | |
153 | #\r | |
154 | # The format for INF statements is:\r | |
155 | # INF $(PathAndInfFileName)\r | |
156 | #\r | |
157 | ################################################################################\r | |
158 | ##\r | |
159 | # PEI Phase modules\r | |
160 | ##\r | |
161 | ##\r | |
162 | # PEI Apriori file example, more PEIM module added later.\r | |
163 | ##\r | |
164 | APRIORI PEI {\r | |
165 | INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r | |
166 | INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf\r | |
167 | INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf\r | |
168 | INF Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf\r | |
169 | }\r | |
170 | APRIORI DXE {\r | |
171 | INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r | |
172 | INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r | |
173 | INF Nt32Pkg/MetronomeDxe/MetronomeDxe.inf\r | |
174 | INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf\r | |
175 | INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf\r | |
176 | INF Nt32Pkg/WinNtOemHookStatusCodeHandlerDxe/WinNtOemHookStatusCodeHandlerDxe.inf\r | |
177 | }\r | |
178 | \r | |
179 | INF MdeModulePkg/Core/Pei/PeiMain.inf\r | |
180 | INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r | |
181 | INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf\r | |
182 | INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf\r | |
183 | INF Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf\r | |
184 | INF Nt32Pkg/BootModePei/BootModePei.inf\r | |
185 | INF Nt32Pkg/StallPei/StallPei.inf\r | |
186 | INF Nt32Pkg/WinNtFlashMapPei/WinNtFlashMapPei.inf\r | |
187 | INF Nt32Pkg/WinNtAutoScanPei/WinNtAutoScanPei.inf\r | |
188 | INF Nt32Pkg/WinNtFirmwareVolumePei/WinNtFirmwareVolumePei.inf\r | |
189 | \r | |
190 | INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf\r | |
191 | INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf\r | |
192 | \r | |
193 | INF Nt32Pkg/WinNtThunkPPIToProtocolPei/WinNtThunkPPIToProtocolPei.inf\r | |
194 | INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf\r | |
195 | \r | |
196 | ##\r | |
197 | # DXE Phase modules\r | |
198 | ##\r | |
199 | INF MdeModulePkg/Core/Dxe/DxeMain.inf\r | |
200 | INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r | |
201 | INF Nt32Pkg/MetronomeDxe/MetronomeDxe.inf\r | |
202 | INF Nt32Pkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf\r | |
203 | INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf\r | |
204 | INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf\r | |
205 | INF Nt32Pkg/FvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf\r | |
206 | INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf\r | |
207 | INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf\r | |
208 | INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf\r | |
209 | INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf\r | |
210 | INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf\r | |
211 | INF Nt32Pkg/WinNtThunkDxe/WinNtThunkDxe.inf\r | |
212 | INF Nt32Pkg/CpuRuntimeDxe/CpuRuntimeDxe.inf\r | |
213 | INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf\r | |
214 | INF MdeModulePkg/Application/UiApp/UiApp.inf\r | |
215 | INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf\r | |
216 | INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf\r | |
217 | INF Nt32Pkg/MiscSubClassPlatformDxe/MiscSubClassPlatformDxe.inf\r | |
218 | INF Nt32Pkg/TimerDxe/TimerDxe.inf\r | |
219 | INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf\r | |
220 | INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf\r | |
221 | INF Nt32Pkg/WinNtOemHookStatusCodeHandlerDxe/WinNtOemHookStatusCodeHandlerDxe.inf\r | |
222 | INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf\r | |
223 | !if $(SECURE_BOOT_ENABLE) == TRUE\r | |
224 | INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf\r | |
225 | !endif\r | |
226 | INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf\r | |
227 | INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf\r | |
228 | INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf\r | |
229 | INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf\r | |
230 | INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf\r | |
231 | INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf\r | |
232 | INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf\r | |
233 | INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r | |
234 | INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf\r | |
235 | INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf\r | |
236 | INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf\r | |
237 | INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf\r | |
238 | INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf\r | |
239 | INF RuleOverride = TIANOCOMPRESSED MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf\r | |
240 | INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf\r | |
241 | INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf\r | |
242 | INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf\r | |
243 | INF IntelFrameworkModulePkg/Bus/Pci/IdeBusDxe/IdeBusDxe.inf\r | |
244 | INF Nt32Pkg/WinNtBusDriverDxe/WinNtBusDriverDxe.inf\r | |
245 | INF Nt32Pkg/WinNtBlockIoDxe/WinNtBlockIoDxe.inf\r | |
246 | INF Nt32Pkg/WinNtSerialIoDxe/WinNtSerialIoDxe.inf\r | |
247 | INF Nt32Pkg/WinNtGopDxe/WinNtGopDxe.inf\r | |
248 | INF Nt32Pkg/WinNtSimpleFileSystemDxe/WinNtSimpleFileSystemDxe.inf\r | |
249 | INF MdeModulePkg/Universal/PlatformDriOverrideDxe/PlatformDriOverrideDxe.inf\r | |
250 | INF MdeModulePkg/Universal/DriverSampleDxe/DriverSampleDxe.inf\r | |
251 | \r | |
252 | INF MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf\r | |
253 | INF MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf\r | |
254 | INF MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf\r | |
255 | INF MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf\r | |
256 | INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf\r | |
257 | INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf\r | |
258 | INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf\r | |
259 | INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf\r | |
260 | INF NetworkPkg/UefiPxeBcDxe/UefiPxeBcDxe.inf\r | |
261 | INF NetworkPkg/TcpDxe/TcpDxe.inf\r | |
262 | INF NetworkPkg/IScsiDxe/IScsiDxe.inf\r | |
263 | INF Nt32Pkg/SnpNt32Dxe/SnpNt32Dxe.inf\r | |
264 | !if $(NETWORK_IP6_ENABLE) == TRUE\r | |
265 | INF NetworkPkg/Ip6Dxe/Ip6Dxe.inf\r | |
266 | INF NetworkPkg/Dhcp6Dxe/Dhcp6Dxe.inf\r | |
267 | INF NetworkPkg/Udp6Dxe/Udp6Dxe.inf\r | |
268 | INF NetworkPkg/Mtftp6Dxe/Mtftp6Dxe.inf\r | |
269 | !endif\r | |
270 | INF NetworkPkg/HttpBootDxe/HttpBootDxe.inf\r | |
271 | INF NetworkPkg/DnsDxe/DnsDxe.inf\r | |
272 | INF NetworkPkg/HttpDxe/HttpDxe.inf\r | |
273 | INF NetworkPkg/HttpUtilitiesDxe/HttpUtilitiesDxe.inf\r | |
274 | !if $(TLS_ENABLE) == TRUE\r | |
275 | INF NetworkPkg/TlsDxe/TlsDxe.inf\r | |
276 | INF NetworkPkg/TlsAuthConfigDxe/TlsAuthConfigDxe.inf\r | |
277 | !endif\r | |
278 | INF MdeModulePkg/Application/BootManagerMenuApp/BootManagerMenuApp.inf\r | |
279 | ################################################################################\r | |
280 | #\r | |
281 | # FILE statements are provided so that a platform integrator can include\r | |
282 | # complete EFI FFS files, as well as a method for constructing FFS files\r | |
283 | # using curly "{}" brace scoping. The following three FILEs are\r | |
284 | # for binary shell, binary fat and logo module.\r | |
285 | #\r | |
286 | ################################################################################\r | |
287 | INF ShellPkg/Application/Shell/Shell.inf\r | |
288 | \r | |
289 | INF FatPkg/EnhancedFatDxe/Fat.inf\r | |
290 | INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf\r | |
291 | \r | |
292 | INF MdeModulePkg/Logo/LogoDxe.inf\r | |
293 | INF MdeModulePkg/Universal/LoadFileOnFv2/LoadFileOnFv2.inf\r | |
294 | ################################################################################\r | |
295 | #\r | |
296 | # Rules are use with the [FV] section's module INF type to define\r | |
297 | # how an FFS file is created for a given INF file. The following Rule are the default\r | |
298 | # rules for the different module type. User can add the customized rules to define the\r | |
299 | # content of the FFS file.\r | |
300 | #\r | |
301 | ################################################################################\r | |
302 | \r | |
303 | \r | |
304 | ############################################################################\r | |
305 | # Example of a DXE_DRIVER FFS file with a Checksum encapsulation section # \r | |
306 | ############################################################################\r | |
307 | #\r | |
308 | #[Rule.Common.DXE_DRIVER]\r | |
309 | # FILE DRIVER = $(NAMED_GUID) {\r | |
310 | # DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r | |
311 | # COMPRESS PI_STD {\r | |
312 | # GUIDED {\r | |
313 | # PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r | |
314 | # UI STRING="$(MODULE_NAME)" Optional\r | |
315 | # VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r | |
316 | # }\r | |
317 | # }\r | |
318 | # }\r | |
319 | #\r | |
320 | ############################################################################\r | |
321 | \r | |
322 | [Rule.Common.PEI_CORE]\r | |
323 | FILE PEI_CORE = $(NAMED_GUID) {\r | |
324 | PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi\r | |
325 | UI STRING ="$(MODULE_NAME)" Optional \r | |
326 | VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) \r | |
327 | }\r | |
328 | \r | |
329 | [Rule.Common.PEIM]\r | |
330 | FILE PEIM = $(NAMED_GUID) {\r | |
331 | PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r | |
332 | PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi\r | |
333 | UI STRING="$(MODULE_NAME)" Optional \r | |
334 | VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) \r | |
335 | }\r | |
336 | \r | |
337 | [Rule.Common.DXE_CORE]\r | |
338 | FILE DXE_CORE = $(NAMED_GUID) {\r | |
339 | COMPRESS PI_STD {\r | |
340 | PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r | |
341 | UI STRING="$(MODULE_NAME)" Optional\r | |
342 | VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r | |
343 | }\r | |
344 | }\r | |
345 | \r | |
346 | [Rule.Common.UEFI_DRIVER]\r | |
347 | FILE DRIVER = $(NAMED_GUID) {\r | |
348 | DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r | |
349 | COMPRESS PI_STD {\r | |
350 | GUIDED {\r | |
351 | PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r | |
352 | UI STRING="$(MODULE_NAME)" Optional\r | |
353 | VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r | |
354 | }\r | |
355 | }\r | |
356 | }\r | |
357 | \r | |
358 | [Rule.Common.UEFI_DRIVER.TIANOCOMPRESSED]\r | |
359 | FILE DRIVER = $(NAMED_GUID) {\r | |
360 | DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r | |
361 | GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED = TRUE {\r | |
362 | PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r | |
363 | UI STRING="$(MODULE_NAME)" Optional\r | |
364 | VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r | |
365 | }\r | |
366 | }\r | |
367 | \r | |
368 | [Rule.Common.DXE_DRIVER]\r | |
369 | FILE DRIVER = $(NAMED_GUID) {\r | |
370 | DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r | |
371 | COMPRESS PI_STD {\r | |
372 | GUIDED {\r | |
373 | PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r | |
374 | UI STRING="$(MODULE_NAME)" Optional\r | |
375 | VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r | |
376 | }\r | |
377 | }\r | |
378 | }\r | |
379 | \r | |
380 | [Rule.Common.DXE_RUNTIME_DRIVER]\r | |
381 | FILE DRIVER = $(NAMED_GUID) {\r | |
382 | DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r | |
383 | COMPRESS PI_STD {\r | |
384 | GUIDED {\r | |
385 | PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r | |
386 | UI STRING="$(MODULE_NAME)" Optional\r | |
387 | VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r | |
388 | }\r | |
389 | }\r | |
390 | }\r | |
391 | \r | |
392 | [Rule.Common.UEFI_APPLICATION]\r | |
393 | FILE APPLICATION = $(NAMED_GUID) {\r | |
394 | COMPRESS PI_STD {\r | |
395 | GUIDED {\r | |
396 | PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r | |
397 | UI STRING="$(MODULE_NAME)" Optional\r | |
398 | VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r | |
399 | }\r | |
400 | }\r | |
401 | }\r | |
402 | \r | |
403 | [Rule.Common.UEFI_APPLICATION.BINARY]\r | |
404 | FILE APPLICATION = $(NAMED_GUID) {\r | |
405 | COMPRESS PI_STD {\r | |
406 | GUIDED {\r | |
407 | PE32 PE32 |.efi\r | |
408 | UI STRING="$(MODULE_NAME)" Optional\r | |
409 | VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r | |
410 | }\r | |
411 | }\r | |
412 | }\r | |
413 | \r | |
414 | [Rule.Common.UEFI_DRIVER.BINARY]\r | |
415 | FILE DRIVER = $(NAMED_GUID) {\r | |
416 | DXE_DEPEX DXE_DEPEX Optional |.depex\r | |
417 | COMPRESS PI_STD {\r | |
418 | GUIDED {\r | |
419 | PE32 PE32 |.efi\r | |
420 | UI STRING="$(MODULE_NAME)" Optional\r | |
421 | VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r | |
422 | }\r | |
423 | }\r | |
424 | }\r |