]> git.proxmox.com Git - mirror_edk2.git/blame - Nt32Pkg/Nt32Pkg.fdf
NetworkPkg: Add HTTP utilities driver
[mirror_edk2.git] / Nt32Pkg / Nt32Pkg.fdf
CommitLineData
7b202cb0 1## @file\r
5fd5fcd3 2# This is NT32 FDF file with UEFI HII features enabled\r
a9ce5754 3#\r
811e73ac 4# Copyright (c) 2007 - 2015, Intel Corporation. All rights reserved.<BR>\r
a9ce5754 5#\r
8f2a5f80 6# This program and the accompanying materials\r
a9ce5754 7# are licensed and made available under the terms and conditions of the BSD License\r
8# which accompanies this distribution. The full text of the license may be found at\r
9# http://opensource.org/licenses/bsd-license.php\r
10#\r
11# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
12# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
13#\r
24491cf6 14\r
f5d74f6d
LG
15################################################################################\r
16#\r
17# FD Section\r
7800ef49 18# The [FD] Section is made up of the definition statements and a\r
19# description of what goes into the Flash Device Image. Each FD section\r
d88bd7a5 20# defines one flash "device" image. A flash device image may be one of\r
7800ef49 21# the following: Removable media bootable image (like a boot floppy\r
d88bd7a5 22# image,) an Option ROM image (that would be "flashed" into an add-in\r
8df425cb 23# card,) a System "Flash" image (that would be burned into a system's\r
d88bd7a5 24# flash) or an Update ("Capsule") image that will be used to update and\r
f5d74f6d
LG
25# existing system flash.\r
26#\r
27################################################################################\r
ae8432d0 28[FD.Nt32]\r
c4396d66
LG
29BaseAddress = 0x0|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFdBaseAddress #The base address of the FLASH Device.\r
30Size = 0x002a0000 #The size in bytes of the FLASH Device\r
24491cf6
LG
31ErasePolarity = 1\r
32BlockSize = 0x10000\r
33NumBlocks = 0x2a\r
34\r
f5d74f6d
LG
35################################################################################\r
36#\r
7800ef49 37# Following are lists of FD Region layout which correspond to the locations of different\r
38# images within the flash device.\r
39#\r
f5d74f6d
LG
40# Regions must be defined in ascending order and may not overlap.\r
41#\r
d88bd7a5
LG
42# A Layout Region start with a eight digit hex offset (leading "0x" required) followed by\r
43# the pipe "|" character, followed by the size of the region, also in hex with the leading\r
44# "0x" characters. Like:\r
f5d74f6d
LG
45# Offset|Size\r
46# PcdOffsetCName|PcdSizeCName\r
47# RegionType <FV, DATA, or FILE>\r
48#\r
49################################################################################\r
24491cf6 500x00000000|0x00280000\r
c4396d66 51gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoveryBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoverySize\r
24491cf6
LG
52FV = FvRecovery\r
53\r
540x00280000|0x0000c000\r
c4396d66 55gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize\r
498f4b39 56#NV_VARIABLE_STORE\r
24491cf6 57DATA = {\r
498f4b39
LG
58 ## This is the EFI_FIRMWARE_VOLUME_HEADER\r
59 # ZeroVector []\r
7800ef49 60 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
61 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
498f4b39
LG
62 # FileSystemGuid: gEfiSystemNvDataFvGuid =\r
63 # { 0xFFF12B8D, 0x7696, 0x4C8B, { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }}\r
64 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C,\r
65 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50,\r
66 # FvLength: 0x20000\r
7800ef49 67 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00,\r
498f4b39
LG
68 #Signature "_FVH" #Attributes\r
69 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00,\r
70 #HeaderLength #CheckSum #ExtHeaderOffset #Reserved #Revision\r
71 0x48, 0x00, 0x36, 0x09, 0x00, 0x00, 0x00, 0x02,\r
72 #Blockmap[0]: 2 Blocks * 0x10000 Bytes / Block\r
7800ef49 73 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00,\r
498f4b39 74 #Blockmap[1]: End\r
7800ef49 75 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
498f4b39 76 ## This is the VARIABLE_STORE_HEADER\r
0ff38cbf 77!if $(SECURE_BOOT_ENABLE) == TRUE\r
78 #Signature: gEfiAuthenticatedVariableGuid =\r
79 # { 0xaaf32c78, 0x947b, 0x439a, { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }}\r
80 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43,\r
81 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92,\r
82!else\r
3709c4cd 83 #Signature: gEfiVariableGuid =\r
84 # { 0xddcf3616, 0x3275, 0x4164, { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }}\r
85 0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41,\r
86 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d,\r
0ff38cbf 87!endif\r
3709c4cd 88 #Size: 0xc000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) - 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0xBFB8\r
89 # This can speed up the Variable Dispatch a bit.\r
90 0xB8, 0xBF, 0x00, 0x00,\r
498f4b39
LG
91 #FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32\r
92 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r
24491cf6
LG
93}\r
94\r
950x0028c000|0x00002000\r
498f4b39 96#NV_EVENT_LOG\r
c4396d66 97gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogSize\r
24491cf6
LG
98\r
990x0028e000|0x00002000\r
c4396d66 100gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize\r
498f4b39 101#NV_FTW_WORKING\r
7800ef49 102DATA = {\r
71e9d09e
SZ
103 # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =\r
104 # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}\r
105 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,\r
106 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95,\r
498f4b39 107 # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved\r
71e9d09e 108 0xE2, 0x33, 0xF2, 0x03, 0xFE, 0xFF, 0xFF, 0xFF,\r
2a958a00
LG
109 # WriteQueueSize: UINT64\r
110 0xE0, 0x1F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r
24491cf6
LG
111}\r
112\r
1130x00290000|0x00010000\r
498f4b39 114#NV_FTW_SPARE\r
c4396d66 115gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize\r
24491cf6 116\r
f5d74f6d
LG
117################################################################################\r
118#\r
119# FV Section\r
120#\r
121# [FV] section is used to define what components or modules are placed within a flash\r
122# device file. This section also defines order the components and modules are positioned\r
123# within the image. The [FV] section consists of define statements, set statements and\r
124# module statements.\r
125#\r
126################################################################################\r
c47eca1a 127[FV.FvRecovery]\r
7800ef49 128FvAlignment = 16 #FV alignment and FV attributes setting.\r
24491cf6
LG
129ERASE_POLARITY = 1\r
130MEMORY_MAPPED = TRUE\r
131STICKY_WRITE = TRUE\r
132LOCK_CAP = TRUE\r
133LOCK_STATUS = TRUE\r
134WRITE_DISABLED_CAP = TRUE\r
135WRITE_ENABLED_CAP = TRUE\r
136WRITE_STATUS = TRUE\r
137WRITE_LOCK_CAP = TRUE\r
138WRITE_LOCK_STATUS = TRUE\r
139READ_DISABLED_CAP = TRUE\r
140READ_ENABLED_CAP = TRUE\r
141READ_STATUS = TRUE\r
142READ_LOCK_CAP = TRUE\r
143READ_LOCK_STATUS = TRUE\r
eb920364 144FvNameGuid = 6D99E806-3D38-42c2-A095-5F4300BFD7DC\r
24491cf6 145\r
c47eca1a
LG
146################################################################################\r
147#\r
148# The INF statements point to EDK component and EDK II module INF files, which will be placed into this FV image.\r
149# Parsing tools will scan the INF file to determine the type of component or module.\r
150# The component or module type is used to reference the standard rules\r
151# defined elsewhere in the FDF file.\r
152#\r
153# The format for INF statements is:\r
154# INF $(PathAndInfFileName)\r
155#\r
156################################################################################\r
157 ##\r
158 # PEI Phase modules\r
159 ##\r
160 ##\r
161 # PEI Apriori file example, more PEIM module added later.\r
162 ##\r
163APRIORI PEI {\r
164 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
25126a05 165 INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf\r
164393a0 166 INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf\r
25126a05 167 INF Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf\r
9c7aa186 168 }\r
c47eca1a 169APRIORI DXE {\r
863986b3 170 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
c47eca1a
LG
171 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
172 INF Nt32Pkg/MetronomeDxe/MetronomeDxe.inf\r
00b7321e 173 }\r
9c7aa186 174\r
c47eca1a
LG
175INF MdeModulePkg/Core/Pei/PeiMain.inf\r
176INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
25126a05 177INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf\r
164393a0 178INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf\r
25126a05 179INF Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf\r
c47eca1a 180INF Nt32Pkg/BootModePei/BootModePei.inf\r
ba82cb67 181INF Nt32Pkg/StallPei/StallPei.inf\r
c47eca1a 182INF Nt32Pkg/WinNtFlashMapPei/WinNtFlashMapPei.inf\r
c47eca1a
LG
183INF Nt32Pkg/WinNtAutoScanPei/WinNtAutoScanPei.inf\r
184INF Nt32Pkg/WinNtFirmwareVolumePei/WinNtFirmwareVolumePei.inf\r
0ff38cbf 185\r
71e9d09e 186INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf\r
58dcdada 187INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf\r
0ff38cbf 188\r
c47eca1a
LG
189INF Nt32Pkg/WinNtThunkPPIToProtocolPei/WinNtThunkPPIToProtocolPei.inf\r
190INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf\r
7800ef49 191\r
c47eca1a
LG
192 ##\r
193 # DXE Phase modules\r
194 ##\r
195INF MdeModulePkg/Core/Dxe/DxeMain.inf\r
a5b8a503 196INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
197INF Nt32Pkg/MetronomeDxe/MetronomeDxe.inf\r
198INF Nt32Pkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf\r
199INF Nt32Pkg/ResetRuntimeDxe/ResetRuntimeDxe.inf\r
200INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf\r
201INF Nt32Pkg/FvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf\r
202INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf\r
1fdd39d3 203INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf\r
a5b8a503 204INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf\r
205INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf\r
5fd5fcd3 206INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf\r
a5b8a503 207INF Nt32Pkg/WinNtThunkDxe/WinNtThunkDxe.inf\r
a5b8a503 208INF Nt32Pkg/CpuRuntimeDxe/CpuRuntimeDxe.inf\r
811e73ac 209INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf\r
f2993c02 210INF MdeModulePkg/Application/UiApp/UiApp.inf\r
811e73ac 211INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf\r
eba3ff4c 212INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf\r
a5b8a503 213INF Nt32Pkg/MiscSubClassPlatformDxe/MiscSubClassPlatformDxe.inf\r
214INF Nt32Pkg/TimerDxe/TimerDxe.inf\r
25126a05 215INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf\r
164393a0 216INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf\r
25126a05 217INF Nt32Pkg/WinNtOemHookStatusCodeHandlerDxe/WinNtOemHookStatusCodeHandlerDxe.inf\r
6f88fb20 218INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf\r
0ff38cbf 219!if $(SECURE_BOOT_ENABLE) == TRUE\r
0ff38cbf 220INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf\r
0ff38cbf 221!endif\r
9efcf13f 222INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf\r
a5b8a503 223INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf\r
224INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf\r
225INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf\r
226INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf\r
227INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf\r
228INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf\r
229INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
230INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf\r
231INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf\r
6b1ac444 232INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf\r
5fd5fcd3 233INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf\r
fcf24bad 234INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf\r
97ef8cff 235INF RuleOverride = TIANOCOMPRESSED MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf\r
061b1c20 236INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf\r
d46f3632
LG
237INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf\r
238INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf\r
a5b8a503 239INF IntelFrameworkModulePkg/Bus/Pci/IdeBusDxe/IdeBusDxe.inf\r
240INF Nt32Pkg/WinNtBusDriverDxe/WinNtBusDriverDxe.inf\r
241INF Nt32Pkg/WinNtBlockIoDxe/WinNtBlockIoDxe.inf\r
a5b8a503 242INF Nt32Pkg/WinNtSerialIoDxe/WinNtSerialIoDxe.inf\r
243INF Nt32Pkg/WinNtGopDxe/WinNtGopDxe.inf\r
244INF Nt32Pkg/WinNtSimpleFileSystemDxe/WinNtSimpleFileSystemDxe.inf\r
27431725 245INF MdeModulePkg/Universal/PlatformDriOverrideDxe/PlatformDriOverrideDxe.inf\r
785a1214 246INF MdeModulePkg/Universal/DriverSampleDxe/DriverSampleDxe.inf\r
f5d74f6d 247\r
3709c4cd 248INF MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf\r
249INF MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf\r
250INF MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf\r
3709c4cd 251INF MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf\r
252INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf\r
1b14ec40 253INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf\r
3709c4cd 254INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf\r
255INF MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf\r
256INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf\r
257INF Nt32Pkg/SnpNt32Dxe/SnpNt32Dxe.inf\r
dda34dc7 258INF MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf\r
3709c4cd 259INF MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf\r
24662805
FS
260INF NetworkPkg/HttpBootDxe/HttpBootDxe.inf\r
261INF NetworkPkg/DnsDxe/DnsDxe.inf\r
262INF NetworkPkg/HttpDxe/HttpDxe.inf\r
f5d74f6d
LG
263################################################################################\r
264#\r
7800ef49 265# FILE statements are provided so that a platform integrator can include\r
266# complete EFI FFS files, as well as a method for constructing FFS files\r
267# using curly "{}" brace scoping. The following three FILEs are\r
f5d74f6d
LG
268# for binary shell, binary fat and logo module.\r
269#\r
270################################################################################\r
2790926d
RN
271!ifndef $(USE_OLD_SHELL)\r
272INF ShellBinPkg/UefiShell/UefiShell.inf\r
273!else\r
274INF EdkShellBinPkg/FullShell/FullShell.inf\r
275!endif\r
ae8432d0 276\r
f66a43b2 277INF FatBinPkg/EnhancedFatDxe/Fat.inf\r
ae8432d0 278\r
d46f3632 279FILE FREEFORM = PCD(gEfiIntelFrameworkModulePkgTokenSpaceGuid.PcdLogoFile) {\r
ae8432d0 280 SECTION RAW = MdeModulePkg/Logo/Logo.bmp\r
c47eca1a
LG
281 }\r
282\r
f5d74f6d
LG
283\r
284################################################################################\r
285#\r
8df425cb 286# Rules are use with the [FV] section's module INF type to define\r
f5d74f6d
LG
287# how an FFS file is created for a given INF file. The following Rule are the default\r
288# rules for the different module type. User can add the customized rules to define the\r
289# content of the FFS file.\r
290#\r
291################################################################################\r
29c3622c 292\r
293\r
294############################################################################\r
295# Example of a DXE_DRIVER FFS file with a Checksum encapsulation section # \r
296############################################################################\r
297#\r
298#[Rule.Common.DXE_DRIVER]\r
c4396d66 299# FILE DRIVER = $(NAMED_GUID) {\r
2014a81a 300# DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
29c3622c 301# COMPRESS PI_STD {\r
302# GUIDED {\r
2014a81a 303# PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
c4396d66
LG
304# UI STRING="$(MODULE_NAME)" Optional\r
305# VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
29c3622c 306# }\r
307# }\r
308# }\r
309#\r
310############################################################################\r
311\r
24491cf6 312[Rule.Common.PEI_CORE]\r
29c3622c 313 FILE PEI_CORE = $(NAMED_GUID) {\r
2014a81a 314 PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi\r
c4396d66
LG
315 UI STRING ="$(MODULE_NAME)" Optional \r
316 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) \r
24491cf6
LG
317 }\r
318\r
319[Rule.Common.PEIM]\r
29c3622c 320 FILE PEIM = $(NAMED_GUID) {\r
2014a81a
LG
321 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
322 PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi\r
c4396d66
LG
323 UI STRING="$(MODULE_NAME)" Optional \r
324 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) \r
7800ef49 325 }\r
24491cf6
LG
326\r
327[Rule.Common.DXE_CORE]\r
29c3622c 328 FILE DXE_CORE = $(NAMED_GUID) {\r
24491cf6 329 COMPRESS PI_STD {\r
2014a81a 330 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
c4396d66
LG
331 UI STRING="$(MODULE_NAME)" Optional\r
332 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
7800ef49 333 }\r
24491cf6
LG
334 }\r
335\r
336[Rule.Common.UEFI_DRIVER]\r
29c3622c 337 FILE DRIVER = $(NAMED_GUID) {\r
2014a81a 338 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
24491cf6
LG
339 COMPRESS PI_STD {\r
340 GUIDED {\r
2014a81a 341 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
c4396d66
LG
342 UI STRING="$(MODULE_NAME)" Optional\r
343 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
24491cf6 344 }\r
97ef8cff
LG
345 }\r
346 }\r
347\r
348[Rule.Common.UEFI_DRIVER.TIANOCOMPRESSED]\r
349 FILE DRIVER = $(NAMED_GUID) {\r
2014a81a 350 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
97ef8cff 351 GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED = TRUE {\r
2014a81a 352 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
97ef8cff
LG
353 UI STRING="$(MODULE_NAME)" Optional\r
354 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
24491cf6 355 }\r
7800ef49 356 }\r
24491cf6
LG
357\r
358[Rule.Common.DXE_DRIVER]\r
29c3622c 359 FILE DRIVER = $(NAMED_GUID) {\r
2014a81a 360 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
24491cf6
LG
361 COMPRESS PI_STD {\r
362 GUIDED {\r
2014a81a 363 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
c4396d66
LG
364 UI STRING="$(MODULE_NAME)" Optional\r
365 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
24491cf6
LG
366 }\r
367 }\r
7800ef49 368 }\r
24491cf6
LG
369\r
370[Rule.Common.DXE_RUNTIME_DRIVER]\r
29c3622c 371 FILE DRIVER = $(NAMED_GUID) {\r
2014a81a 372 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
24491cf6
LG
373 COMPRESS PI_STD {\r
374 GUIDED {\r
2014a81a 375 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
c4396d66
LG
376 UI STRING="$(MODULE_NAME)" Optional\r
377 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
24491cf6
LG
378 }\r
379 }\r
7800ef49 380 }\r
24491cf6
LG
381\r
382[Rule.Common.UEFI_APPLICATION]\r
29c3622c 383 FILE APPLICATION = $(NAMED_GUID) {\r
24491cf6
LG
384 COMPRESS PI_STD {\r
385 GUIDED {\r
2014a81a 386 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
c4396d66
LG
387 UI STRING="$(MODULE_NAME)" Optional\r
388 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
24491cf6
LG
389 }\r
390 }\r
7800ef49 391 }\r
f66a43b2
JM
392\r
393[Rule.Common.UEFI_APPLICATION.BINARY]\r
394 FILE APPLICATION = $(NAMED_GUID) {\r
395 COMPRESS PI_STD {\r
396 GUIDED {\r
397 PE32 PE32 |.efi\r
398 UI STRING="$(MODULE_NAME)" Optional\r
399 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
400 }\r
401 }\r
402 }\r
403\r
404[Rule.Common.UEFI_DRIVER.BINARY]\r
405 FILE DRIVER = $(NAMED_GUID) {\r
406 DXE_DEPEX DXE_DEPEX Optional |.depex\r
407 COMPRESS PI_STD {\r
408 GUIDED {\r
409 PE32 PE32 |.efi\r
410 UI STRING="$(MODULE_NAME)" Optional\r
411 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
412 }\r
413 }\r
414 }\r