]> git.proxmox.com Git - mirror_edk2.git/blame - Nt32Pkg/Nt32Pkg.fdf
Nt32Pkg: Replace BSD License with BSD+Patent License
[mirror_edk2.git] / Nt32Pkg / Nt32Pkg.fdf
CommitLineData
7b202cb0 1## @file\r
5fd5fcd3 2# This is NT32 FDF file with UEFI HII features enabled\r
a9ce5754 3#\r
2eee9d65 4# Copyright (c) 2007 - 2018, Intel Corporation. All rights reserved.<BR>\r
c4a5d3f1 5# (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>\r
a9ce5754 6#\r
9d2eedba 7# SPDX-License-Identifier: BSD-2-Clause-Patent\r
a9ce5754 8#\r
24491cf6 9\r
f5d74f6d
LG
10################################################################################\r
11#\r
12# FD Section\r
7800ef49 13# The [FD] Section is made up of the definition statements and a\r
14# description of what goes into the Flash Device Image. Each FD section\r
d88bd7a5 15# defines one flash "device" image. A flash device image may be one of\r
7800ef49 16# the following: Removable media bootable image (like a boot floppy\r
d88bd7a5 17# image,) an Option ROM image (that would be "flashed" into an add-in\r
8df425cb 18# card,) a System "Flash" image (that would be burned into a system's\r
d88bd7a5 19# flash) or an Update ("Capsule") image that will be used to update and\r
f5d74f6d
LG
20# existing system flash.\r
21#\r
22################################################################################\r
ae8432d0 23[FD.Nt32]\r
c4a5d3f1 24BaseAddress = 0x0|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFdBaseAddress #The base address of the FLASH Device.\r
c60d751b 25Size = 0x00480000|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFirmwareFdSize #The size in bytes of the FLASH Device\r
24491cf6
LG
26ErasePolarity = 1\r
27BlockSize = 0x10000\r
c60d751b 28NumBlocks = 0x48\r
24491cf6 29\r
f5d74f6d
LG
30################################################################################\r
31#\r
7800ef49 32# Following are lists of FD Region layout which correspond to the locations of different\r
33# images within the flash device.\r
34#\r
f5d74f6d
LG
35# Regions must be defined in ascending order and may not overlap.\r
36#\r
d88bd7a5
LG
37# A Layout Region start with a eight digit hex offset (leading "0x" required) followed by\r
38# the pipe "|" character, followed by the size of the region, also in hex with the leading\r
39# "0x" characters. Like:\r
f5d74f6d
LG
40# Offset|Size\r
41# PcdOffsetCName|PcdSizeCName\r
42# RegionType <FV, DATA, or FILE>\r
43#\r
44################################################################################\r
c60d751b 450x00000000|0x00460000\r
c4396d66 46gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoveryBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoverySize\r
24491cf6
LG
47FV = FvRecovery\r
48\r
c60d751b 490x00460000|0x0000c000\r
c4396d66 50gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize\r
498f4b39 51#NV_VARIABLE_STORE\r
24491cf6 52DATA = {\r
498f4b39
LG
53 ## This is the EFI_FIRMWARE_VOLUME_HEADER\r
54 # ZeroVector []\r
7800ef49 55 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
56 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
498f4b39
LG
57 # FileSystemGuid: gEfiSystemNvDataFvGuid =\r
58 # { 0xFFF12B8D, 0x7696, 0x4C8B, { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }}\r
59 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C,\r
60 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50,\r
61 # FvLength: 0x20000\r
7800ef49 62 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00,\r
498f4b39
LG
63 #Signature "_FVH" #Attributes\r
64 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00,\r
65 #HeaderLength #CheckSum #ExtHeaderOffset #Reserved #Revision\r
66 0x48, 0x00, 0x36, 0x09, 0x00, 0x00, 0x00, 0x02,\r
67 #Blockmap[0]: 2 Blocks * 0x10000 Bytes / Block\r
7800ef49 68 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00,\r
498f4b39 69 #Blockmap[1]: End\r
7800ef49 70 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
498f4b39 71 ## This is the VARIABLE_STORE_HEADER\r
0ff38cbf 72!if $(SECURE_BOOT_ENABLE) == TRUE\r
73 #Signature: gEfiAuthenticatedVariableGuid =\r
74 # { 0xaaf32c78, 0x947b, 0x439a, { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }}\r
75 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43,\r
76 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92,\r
77!else\r
3709c4cd 78 #Signature: gEfiVariableGuid =\r
79 # { 0xddcf3616, 0x3275, 0x4164, { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }}\r
80 0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41,\r
81 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d,\r
0ff38cbf 82!endif\r
3709c4cd 83 #Size: 0xc000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) - 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0xBFB8\r
84 # This can speed up the Variable Dispatch a bit.\r
85 0xB8, 0xBF, 0x00, 0x00,\r
498f4b39
LG
86 #FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32\r
87 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r
24491cf6
LG
88}\r
89\r
c60d751b 900x0046c000|0x00002000\r
498f4b39 91#NV_EVENT_LOG\r
c4396d66 92gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogSize\r
24491cf6 93\r
c60d751b 940x0046e000|0x00002000\r
c4396d66 95gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize\r
498f4b39 96#NV_FTW_WORKING\r
7800ef49 97DATA = {\r
71e9d09e
SZ
98 # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =\r
99 # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}\r
100 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,\r
101 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95,\r
498f4b39 102 # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved\r
71e9d09e 103 0xE2, 0x33, 0xF2, 0x03, 0xFE, 0xFF, 0xFF, 0xFF,\r
2a958a00
LG
104 # WriteQueueSize: UINT64\r
105 0xE0, 0x1F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r
24491cf6
LG
106}\r
107\r
c60d751b 1080x00470000|0x00010000\r
498f4b39 109#NV_FTW_SPARE\r
c4396d66 110gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize\r
24491cf6 111\r
f5d74f6d
LG
112################################################################################\r
113#\r
114# FV Section\r
115#\r
116# [FV] section is used to define what components or modules are placed within a flash\r
117# device file. This section also defines order the components and modules are positioned\r
118# within the image. The [FV] section consists of define statements, set statements and\r
119# module statements.\r
120#\r
121################################################################################\r
c47eca1a 122[FV.FvRecovery]\r
7800ef49 123FvAlignment = 16 #FV alignment and FV attributes setting.\r
24491cf6
LG
124ERASE_POLARITY = 1\r
125MEMORY_MAPPED = TRUE\r
126STICKY_WRITE = TRUE\r
127LOCK_CAP = TRUE\r
128LOCK_STATUS = TRUE\r
129WRITE_DISABLED_CAP = TRUE\r
130WRITE_ENABLED_CAP = TRUE\r
131WRITE_STATUS = TRUE\r
132WRITE_LOCK_CAP = TRUE\r
133WRITE_LOCK_STATUS = TRUE\r
134READ_DISABLED_CAP = TRUE\r
135READ_ENABLED_CAP = TRUE\r
136READ_STATUS = TRUE\r
137READ_LOCK_CAP = TRUE\r
138READ_LOCK_STATUS = TRUE\r
eb920364 139FvNameGuid = 6D99E806-3D38-42c2-A095-5F4300BFD7DC\r
24491cf6 140\r
c47eca1a
LG
141################################################################################\r
142#\r
143# The INF statements point to EDK component and EDK II module INF files, which will be placed into this FV image.\r
144# Parsing tools will scan the INF file to determine the type of component or module.\r
145# The component or module type is used to reference the standard rules\r
146# defined elsewhere in the FDF file.\r
147#\r
148# The format for INF statements is:\r
149# INF $(PathAndInfFileName)\r
150#\r
151################################################################################\r
152 ##\r
153 # PEI Phase modules\r
154 ##\r
155 ##\r
156 # PEI Apriori file example, more PEIM module added later.\r
157 ##\r
158APRIORI PEI {\r
159 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
25126a05 160 INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf\r
164393a0 161 INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf\r
25126a05 162 INF Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf\r
9c7aa186 163 }\r
c47eca1a 164APRIORI DXE {\r
863986b3 165 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
c47eca1a
LG
166 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
167 INF Nt32Pkg/MetronomeDxe/MetronomeDxe.inf\r
70420e31
LG
168 INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf\r
169 INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf\r
170 INF Nt32Pkg/WinNtOemHookStatusCodeHandlerDxe/WinNtOemHookStatusCodeHandlerDxe.inf\r
00b7321e 171 }\r
9c7aa186 172\r
c47eca1a
LG
173INF MdeModulePkg/Core/Pei/PeiMain.inf\r
174INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
25126a05 175INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf\r
164393a0 176INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf\r
25126a05 177INF Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf\r
c47eca1a 178INF Nt32Pkg/BootModePei/BootModePei.inf\r
ba82cb67 179INF Nt32Pkg/StallPei/StallPei.inf\r
c47eca1a 180INF Nt32Pkg/WinNtFlashMapPei/WinNtFlashMapPei.inf\r
c47eca1a
LG
181INF Nt32Pkg/WinNtAutoScanPei/WinNtAutoScanPei.inf\r
182INF Nt32Pkg/WinNtFirmwareVolumePei/WinNtFirmwareVolumePei.inf\r
0ff38cbf 183\r
71e9d09e 184INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf\r
58dcdada 185INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf\r
0ff38cbf 186\r
c47eca1a
LG
187INF Nt32Pkg/WinNtThunkPPIToProtocolPei/WinNtThunkPPIToProtocolPei.inf\r
188INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf\r
7800ef49 189\r
c47eca1a
LG
190 ##\r
191 # DXE Phase modules\r
192 ##\r
193INF MdeModulePkg/Core/Dxe/DxeMain.inf\r
a5b8a503 194INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
195INF Nt32Pkg/MetronomeDxe/MetronomeDxe.inf\r
196INF Nt32Pkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf\r
00beb2ab 197INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf\r
a5b8a503 198INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf\r
199INF Nt32Pkg/FvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf\r
200INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf\r
1fdd39d3 201INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf\r
a5b8a503 202INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf\r
203INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf\r
5fd5fcd3 204INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf\r
a5b8a503 205INF Nt32Pkg/WinNtThunkDxe/WinNtThunkDxe.inf\r
a5b8a503 206INF Nt32Pkg/CpuRuntimeDxe/CpuRuntimeDxe.inf\r
811e73ac 207INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf\r
f2993c02 208INF MdeModulePkg/Application/UiApp/UiApp.inf\r
811e73ac 209INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf\r
eba3ff4c 210INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf\r
a5b8a503 211INF Nt32Pkg/MiscSubClassPlatformDxe/MiscSubClassPlatformDxe.inf\r
212INF Nt32Pkg/TimerDxe/TimerDxe.inf\r
25126a05 213INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf\r
164393a0 214INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf\r
25126a05 215INF Nt32Pkg/WinNtOemHookStatusCodeHandlerDxe/WinNtOemHookStatusCodeHandlerDxe.inf\r
6f88fb20 216INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf\r
0ff38cbf 217!if $(SECURE_BOOT_ENABLE) == TRUE\r
0ff38cbf 218INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf\r
0ff38cbf 219!endif\r
9efcf13f 220INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf\r
a5b8a503 221INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf\r
222INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf\r
223INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf\r
224INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf\r
225INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf\r
226INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf\r
227INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
228INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf\r
229INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf\r
6b1ac444 230INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf\r
5fd5fcd3 231INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf\r
fcf24bad 232INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf\r
97ef8cff 233INF RuleOverride = TIANOCOMPRESSED MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf\r
061b1c20 234INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf\r
d46f3632
LG
235INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf\r
236INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf\r
a5b8a503 237INF IntelFrameworkModulePkg/Bus/Pci/IdeBusDxe/IdeBusDxe.inf\r
238INF Nt32Pkg/WinNtBusDriverDxe/WinNtBusDriverDxe.inf\r
239INF Nt32Pkg/WinNtBlockIoDxe/WinNtBlockIoDxe.inf\r
a5b8a503 240INF Nt32Pkg/WinNtSerialIoDxe/WinNtSerialIoDxe.inf\r
241INF Nt32Pkg/WinNtGopDxe/WinNtGopDxe.inf\r
242INF Nt32Pkg/WinNtSimpleFileSystemDxe/WinNtSimpleFileSystemDxe.inf\r
27431725 243INF MdeModulePkg/Universal/PlatformDriOverrideDxe/PlatformDriOverrideDxe.inf\r
785a1214 244INF MdeModulePkg/Universal/DriverSampleDxe/DriverSampleDxe.inf\r
f5d74f6d 245\r
3709c4cd 246INF MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf\r
247INF MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf\r
248INF MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf\r
3709c4cd 249INF MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf\r
250INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf\r
1b14ec40 251INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf\r
3709c4cd 252INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf\r
3709c4cd 253INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf\r
2eee9d65
FS
254INF NetworkPkg/UefiPxeBcDxe/UefiPxeBcDxe.inf\r
255INF NetworkPkg/TcpDxe/TcpDxe.inf\r
256INF NetworkPkg/IScsiDxe/IScsiDxe.inf\r
3709c4cd 257INF Nt32Pkg/SnpNt32Dxe/SnpNt32Dxe.inf\r
c628d65d
FS
258!if $(NETWORK_IP6_ENABLE) == TRUE\r
259INF NetworkPkg/Ip6Dxe/Ip6Dxe.inf\r
260INF NetworkPkg/Dhcp6Dxe/Dhcp6Dxe.inf\r
261INF NetworkPkg/Udp6Dxe/Udp6Dxe.inf\r
262INF NetworkPkg/Mtftp6Dxe/Mtftp6Dxe.inf\r
c628d65d 263!endif\r
24662805
FS
264INF NetworkPkg/HttpBootDxe/HttpBootDxe.inf\r
265INF NetworkPkg/DnsDxe/DnsDxe.inf\r
266INF NetworkPkg/HttpDxe/HttpDxe.inf\r
4018f205 267INF NetworkPkg/HttpUtilitiesDxe/HttpUtilitiesDxe.inf\r
c9b78304
JW
268!if $(TLS_ENABLE) == TRUE\r
269INF NetworkPkg/TlsDxe/TlsDxe.inf\r
270INF NetworkPkg/TlsAuthConfigDxe/TlsAuthConfigDxe.inf\r
271!endif\r
0b6dc68d 272INF MdeModulePkg/Application/BootManagerMenuApp/BootManagerMenuApp.inf\r
f5d74f6d
LG
273################################################################################\r
274#\r
7800ef49 275# FILE statements are provided so that a platform integrator can include\r
276# complete EFI FFS files, as well as a method for constructing FFS files\r
277# using curly "{}" brace scoping. The following three FILEs are\r
f5d74f6d
LG
278# for binary shell, binary fat and logo module.\r
279#\r
280################################################################################\r
46d5189b 281INF ShellPkg/Application/Shell/Shell.inf\r
ae8432d0 282\r
70dc0b80 283INF FatPkg/EnhancedFatDxe/Fat.inf\r
b696c64d 284INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf\r
ae8432d0 285\r
67ce479a 286INF MdeModulePkg/Logo/LogoDxe.inf\r
e2e9b3b4 287INF MdeModulePkg/Universal/LoadFileOnFv2/LoadFileOnFv2.inf\r
f5d74f6d
LG
288################################################################################\r
289#\r
8df425cb 290# Rules are use with the [FV] section's module INF type to define\r
f5d74f6d
LG
291# how an FFS file is created for a given INF file. The following Rule are the default\r
292# rules for the different module type. User can add the customized rules to define the\r
293# content of the FFS file.\r
294#\r
295################################################################################\r
29c3622c 296\r
297\r
298############################################################################\r
299# Example of a DXE_DRIVER FFS file with a Checksum encapsulation section # \r
300############################################################################\r
301#\r
302#[Rule.Common.DXE_DRIVER]\r
c4396d66 303# FILE DRIVER = $(NAMED_GUID) {\r
2014a81a 304# DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
29c3622c 305# COMPRESS PI_STD {\r
306# GUIDED {\r
2014a81a 307# PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
c4396d66
LG
308# UI STRING="$(MODULE_NAME)" Optional\r
309# VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
29c3622c 310# }\r
311# }\r
312# }\r
313#\r
314############################################################################\r
315\r
24491cf6 316[Rule.Common.PEI_CORE]\r
29c3622c 317 FILE PEI_CORE = $(NAMED_GUID) {\r
2014a81a 318 PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi\r
c4396d66
LG
319 UI STRING ="$(MODULE_NAME)" Optional \r
320 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) \r
24491cf6
LG
321 }\r
322\r
323[Rule.Common.PEIM]\r
29c3622c 324 FILE PEIM = $(NAMED_GUID) {\r
2014a81a
LG
325 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
326 PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi\r
c4396d66
LG
327 UI STRING="$(MODULE_NAME)" Optional \r
328 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) \r
7800ef49 329 }\r
24491cf6
LG
330\r
331[Rule.Common.DXE_CORE]\r
29c3622c 332 FILE DXE_CORE = $(NAMED_GUID) {\r
24491cf6 333 COMPRESS PI_STD {\r
2014a81a 334 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
c4396d66
LG
335 UI STRING="$(MODULE_NAME)" Optional\r
336 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
7800ef49 337 }\r
24491cf6
LG
338 }\r
339\r
340[Rule.Common.UEFI_DRIVER]\r
29c3622c 341 FILE DRIVER = $(NAMED_GUID) {\r
2014a81a 342 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
24491cf6
LG
343 COMPRESS PI_STD {\r
344 GUIDED {\r
2014a81a 345 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
c4396d66
LG
346 UI STRING="$(MODULE_NAME)" Optional\r
347 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
24491cf6 348 }\r
97ef8cff
LG
349 }\r
350 }\r
351\r
352[Rule.Common.UEFI_DRIVER.TIANOCOMPRESSED]\r
353 FILE DRIVER = $(NAMED_GUID) {\r
2014a81a 354 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
97ef8cff 355 GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED = TRUE {\r
2014a81a 356 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
97ef8cff
LG
357 UI STRING="$(MODULE_NAME)" Optional\r
358 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
24491cf6 359 }\r
7800ef49 360 }\r
24491cf6
LG
361\r
362[Rule.Common.DXE_DRIVER]\r
29c3622c 363 FILE DRIVER = $(NAMED_GUID) {\r
2014a81a 364 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
24491cf6
LG
365 COMPRESS PI_STD {\r
366 GUIDED {\r
2014a81a 367 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
c4396d66
LG
368 UI STRING="$(MODULE_NAME)" Optional\r
369 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
24491cf6
LG
370 }\r
371 }\r
7800ef49 372 }\r
24491cf6
LG
373\r
374[Rule.Common.DXE_RUNTIME_DRIVER]\r
29c3622c 375 FILE DRIVER = $(NAMED_GUID) {\r
2014a81a 376 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
24491cf6
LG
377 COMPRESS PI_STD {\r
378 GUIDED {\r
2014a81a 379 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
c4396d66
LG
380 UI STRING="$(MODULE_NAME)" Optional\r
381 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
24491cf6
LG
382 }\r
383 }\r
7800ef49 384 }\r
24491cf6
LG
385\r
386[Rule.Common.UEFI_APPLICATION]\r
29c3622c 387 FILE APPLICATION = $(NAMED_GUID) {\r
24491cf6
LG
388 COMPRESS PI_STD {\r
389 GUIDED {\r
2014a81a 390 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
c4396d66
LG
391 UI STRING="$(MODULE_NAME)" Optional\r
392 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
24491cf6
LG
393 }\r
394 }\r
7800ef49 395 }\r
f66a43b2
JM
396\r
397[Rule.Common.UEFI_APPLICATION.BINARY]\r
398 FILE APPLICATION = $(NAMED_GUID) {\r
399 COMPRESS PI_STD {\r
400 GUIDED {\r
401 PE32 PE32 |.efi\r
402 UI STRING="$(MODULE_NAME)" Optional\r
403 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
404 }\r
405 }\r
406 }\r
407\r
408[Rule.Common.UEFI_DRIVER.BINARY]\r
409 FILE DRIVER = $(NAMED_GUID) {\r
410 DXE_DEPEX DXE_DEPEX Optional |.depex\r
411 COMPRESS PI_STD {\r
412 GUIDED {\r
413 PE32 PE32 |.efi\r
414 UI STRING="$(MODULE_NAME)" Optional\r
415 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
416 }\r
417 }\r
418 }\r