]> git.proxmox.com Git - mirror_edk2.git/blame_incremental - Nt32Pkg/Nt32Pkg.fdf
BaseTools/BinToPcd: Fix Python 2.7.x compatibility issue
[mirror_edk2.git] / Nt32Pkg / Nt32Pkg.fdf
... / ...
CommitLineData
1## @file\r
2# This is NT32 FDF file with UEFI HII features enabled\r
3#\r
4# Copyright (c) 2007 - 2017, Intel Corporation. All rights reserved.<BR>\r
5# (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>\r
6#\r
7# This program and the accompanying materials\r
8# are licensed and made available under the terms and conditions of the BSD License\r
9# which accompanies this distribution. The full text of the license may be found at\r
10# http://opensource.org/licenses/bsd-license.php\r
11#\r
12# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
13# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
14#\r
15\r
16################################################################################\r
17#\r
18# FD Section\r
19# The [FD] Section is made up of the definition statements and a\r
20# description of what goes into the Flash Device Image. Each FD section\r
21# defines one flash "device" image. A flash device image may be one of\r
22# the following: Removable media bootable image (like a boot floppy\r
23# image,) an Option ROM image (that would be "flashed" into an add-in\r
24# card,) a System "Flash" image (that would be burned into a system's\r
25# flash) or an Update ("Capsule") image that will be used to update and\r
26# existing system flash.\r
27#\r
28################################################################################\r
29[FD.Nt32]\r
30BaseAddress = 0x0|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFdBaseAddress #The base address of the FLASH Device.\r
31Size = 0x00480000|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFirmwareFdSize #The size in bytes of the FLASH Device\r
32ErasePolarity = 1\r
33BlockSize = 0x10000\r
34NumBlocks = 0x48\r
35\r
36################################################################################\r
37#\r
38# Following are lists of FD Region layout which correspond to the locations of different\r
39# images within the flash device.\r
40#\r
41# Regions must be defined in ascending order and may not overlap.\r
42#\r
43# A Layout Region start with a eight digit hex offset (leading "0x" required) followed by\r
44# the pipe "|" character, followed by the size of the region, also in hex with the leading\r
45# "0x" characters. Like:\r
46# Offset|Size\r
47# PcdOffsetCName|PcdSizeCName\r
48# RegionType <FV, DATA, or FILE>\r
49#\r
50################################################################################\r
510x00000000|0x00460000\r
52gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoveryBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoverySize\r
53FV = FvRecovery\r
54\r
550x00460000|0x0000c000\r
56gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize\r
57#NV_VARIABLE_STORE\r
58DATA = {\r
59 ## This is the EFI_FIRMWARE_VOLUME_HEADER\r
60 # ZeroVector []\r
61 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
62 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
63 # FileSystemGuid: gEfiSystemNvDataFvGuid =\r
64 # { 0xFFF12B8D, 0x7696, 0x4C8B, { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }}\r
65 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C,\r
66 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50,\r
67 # FvLength: 0x20000\r
68 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00,\r
69 #Signature "_FVH" #Attributes\r
70 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00,\r
71 #HeaderLength #CheckSum #ExtHeaderOffset #Reserved #Revision\r
72 0x48, 0x00, 0x36, 0x09, 0x00, 0x00, 0x00, 0x02,\r
73 #Blockmap[0]: 2 Blocks * 0x10000 Bytes / Block\r
74 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00,\r
75 #Blockmap[1]: End\r
76 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,\r
77 ## This is the VARIABLE_STORE_HEADER\r
78!if $(SECURE_BOOT_ENABLE) == TRUE\r
79 #Signature: gEfiAuthenticatedVariableGuid =\r
80 # { 0xaaf32c78, 0x947b, 0x439a, { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }}\r
81 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43,\r
82 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92,\r
83!else\r
84 #Signature: gEfiVariableGuid =\r
85 # { 0xddcf3616, 0x3275, 0x4164, { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }}\r
86 0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41,\r
87 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d,\r
88!endif\r
89 #Size: 0xc000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) - 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0xBFB8\r
90 # This can speed up the Variable Dispatch a bit.\r
91 0xB8, 0xBF, 0x00, 0x00,\r
92 #FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32\r
93 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r
94}\r
95\r
960x0046c000|0x00002000\r
97#NV_EVENT_LOG\r
98gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogSize\r
99\r
1000x0046e000|0x00002000\r
101gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize\r
102#NV_FTW_WORKING\r
103DATA = {\r
104 # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =\r
105 # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}\r
106 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,\r
107 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95,\r
108 # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved\r
109 0xE2, 0x33, 0xF2, 0x03, 0xFE, 0xFF, 0xFF, 0xFF,\r
110 # WriteQueueSize: UINT64\r
111 0xE0, 0x1F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00\r
112}\r
113\r
1140x00470000|0x00010000\r
115#NV_FTW_SPARE\r
116gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize\r
117\r
118################################################################################\r
119#\r
120# FV Section\r
121#\r
122# [FV] section is used to define what components or modules are placed within a flash\r
123# device file. This section also defines order the components and modules are positioned\r
124# within the image. The [FV] section consists of define statements, set statements and\r
125# module statements.\r
126#\r
127################################################################################\r
128[FV.FvRecovery]\r
129FvAlignment = 16 #FV alignment and FV attributes setting.\r
130ERASE_POLARITY = 1\r
131MEMORY_MAPPED = TRUE\r
132STICKY_WRITE = TRUE\r
133LOCK_CAP = TRUE\r
134LOCK_STATUS = TRUE\r
135WRITE_DISABLED_CAP = TRUE\r
136WRITE_ENABLED_CAP = TRUE\r
137WRITE_STATUS = TRUE\r
138WRITE_LOCK_CAP = TRUE\r
139WRITE_LOCK_STATUS = TRUE\r
140READ_DISABLED_CAP = TRUE\r
141READ_ENABLED_CAP = TRUE\r
142READ_STATUS = TRUE\r
143READ_LOCK_CAP = TRUE\r
144READ_LOCK_STATUS = TRUE\r
145FvNameGuid = 6D99E806-3D38-42c2-A095-5F4300BFD7DC\r
146\r
147################################################################################\r
148#\r
149# The INF statements point to EDK component and EDK II module INF files, which will be placed into this FV image.\r
150# Parsing tools will scan the INF file to determine the type of component or module.\r
151# The component or module type is used to reference the standard rules\r
152# defined elsewhere in the FDF file.\r
153#\r
154# The format for INF statements is:\r
155# INF $(PathAndInfFileName)\r
156#\r
157################################################################################\r
158 ##\r
159 # PEI Phase modules\r
160 ##\r
161 ##\r
162 # PEI Apriori file example, more PEIM module added later.\r
163 ##\r
164APRIORI PEI {\r
165 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
166 INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf\r
167 INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf\r
168 INF Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf\r
169 }\r
170APRIORI DXE {\r
171 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
172 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
173 INF Nt32Pkg/MetronomeDxe/MetronomeDxe.inf\r
174 INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf\r
175 INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf\r
176 INF Nt32Pkg/WinNtOemHookStatusCodeHandlerDxe/WinNtOemHookStatusCodeHandlerDxe.inf\r
177 }\r
178\r
179INF MdeModulePkg/Core/Pei/PeiMain.inf\r
180INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf\r
181INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf\r
182INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf\r
183INF Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf\r
184INF Nt32Pkg/BootModePei/BootModePei.inf\r
185INF Nt32Pkg/StallPei/StallPei.inf\r
186INF Nt32Pkg/WinNtFlashMapPei/WinNtFlashMapPei.inf\r
187INF Nt32Pkg/WinNtAutoScanPei/WinNtAutoScanPei.inf\r
188INF Nt32Pkg/WinNtFirmwareVolumePei/WinNtFirmwareVolumePei.inf\r
189\r
190INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf\r
191INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf\r
192\r
193INF Nt32Pkg/WinNtThunkPPIToProtocolPei/WinNtThunkPPIToProtocolPei.inf\r
194INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf\r
195\r
196 ##\r
197 # DXE Phase modules\r
198 ##\r
199INF MdeModulePkg/Core/Dxe/DxeMain.inf\r
200INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf\r
201INF Nt32Pkg/MetronomeDxe/MetronomeDxe.inf\r
202INF Nt32Pkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf\r
203INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf\r
204INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf\r
205INF Nt32Pkg/FvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf\r
206INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf\r
207INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf\r
208INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf\r
209INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf\r
210INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf\r
211INF Nt32Pkg/WinNtThunkDxe/WinNtThunkDxe.inf\r
212INF Nt32Pkg/CpuRuntimeDxe/CpuRuntimeDxe.inf\r
213INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf\r
214INF MdeModulePkg/Application/UiApp/UiApp.inf\r
215INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf\r
216INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf\r
217INF Nt32Pkg/MiscSubClassPlatformDxe/MiscSubClassPlatformDxe.inf\r
218INF Nt32Pkg/TimerDxe/TimerDxe.inf\r
219INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf\r
220INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf\r
221INF Nt32Pkg/WinNtOemHookStatusCodeHandlerDxe/WinNtOemHookStatusCodeHandlerDxe.inf\r
222INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf\r
223!if $(SECURE_BOOT_ENABLE) == TRUE\r
224INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf\r
225!endif\r
226INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf\r
227INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf\r
228INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf\r
229INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf\r
230INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf\r
231INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf\r
232INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf\r
233INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf\r
234INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf\r
235INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf\r
236INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf\r
237INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf\r
238INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf\r
239INF RuleOverride = TIANOCOMPRESSED MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf\r
240INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf\r
241INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf\r
242INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf\r
243INF IntelFrameworkModulePkg/Bus/Pci/IdeBusDxe/IdeBusDxe.inf\r
244INF Nt32Pkg/WinNtBusDriverDxe/WinNtBusDriverDxe.inf\r
245INF Nt32Pkg/WinNtBlockIoDxe/WinNtBlockIoDxe.inf\r
246INF Nt32Pkg/WinNtSerialIoDxe/WinNtSerialIoDxe.inf\r
247INF Nt32Pkg/WinNtGopDxe/WinNtGopDxe.inf\r
248INF Nt32Pkg/WinNtSimpleFileSystemDxe/WinNtSimpleFileSystemDxe.inf\r
249INF MdeModulePkg/Universal/PlatformDriOverrideDxe/PlatformDriOverrideDxe.inf\r
250INF MdeModulePkg/Universal/DriverSampleDxe/DriverSampleDxe.inf\r
251\r
252INF MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf\r
253INF MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf\r
254INF MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf\r
255INF MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf\r
256INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf\r
257INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf\r
258INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf\r
259INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf\r
260INF Nt32Pkg/SnpNt32Dxe/SnpNt32Dxe.inf\r
261!if $(NETWORK_IP6_ENABLE) == TRUE\r
262INF NetworkPkg/Ip6Dxe/Ip6Dxe.inf\r
263INF NetworkPkg/Dhcp6Dxe/Dhcp6Dxe.inf\r
264INF NetworkPkg/Udp6Dxe/Udp6Dxe.inf\r
265INF NetworkPkg/Mtftp6Dxe/Mtftp6Dxe.inf\r
266INF NetworkPkg/TcpDxe/TcpDxe.inf\r
267INF NetworkPkg/UefiPxeBcDxe/UefiPxeBcDxe.inf\r
268INF NetworkPkg/IScsiDxe/IScsiDxe.inf\r
269!else\r
270INF MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf\r
271INF MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf\r
272INF MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf\r
273!endif\r
274INF NetworkPkg/HttpBootDxe/HttpBootDxe.inf\r
275INF NetworkPkg/DnsDxe/DnsDxe.inf\r
276INF NetworkPkg/HttpDxe/HttpDxe.inf\r
277INF NetworkPkg/HttpUtilitiesDxe/HttpUtilitiesDxe.inf\r
278!if $(TLS_ENABLE) == TRUE\r
279INF NetworkPkg/TlsDxe/TlsDxe.inf\r
280INF NetworkPkg/TlsAuthConfigDxe/TlsAuthConfigDxe.inf\r
281!endif\r
282INF MdeModulePkg/Application/BootManagerMenuApp/BootManagerMenuApp.inf\r
283################################################################################\r
284#\r
285# FILE statements are provided so that a platform integrator can include\r
286# complete EFI FFS files, as well as a method for constructing FFS files\r
287# using curly "{}" brace scoping. The following three FILEs are\r
288# for binary shell, binary fat and logo module.\r
289#\r
290################################################################################\r
291!ifndef $(USE_OLD_SHELL)\r
292INF ShellPkg/Application/Shell/Shell.inf\r
293!else\r
294INF EdkShellBinPkg/FullShell/FullShell.inf\r
295!endif\r
296\r
297INF FatPkg/EnhancedFatDxe/Fat.inf\r
298INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf\r
299\r
300INF MdeModulePkg/Logo/LogoDxe.inf\r
301INF MdeModulePkg/Universal/LoadFileOnFv2/LoadFileOnFv2.inf\r
302################################################################################\r
303#\r
304# Rules are use with the [FV] section's module INF type to define\r
305# how an FFS file is created for a given INF file. The following Rule are the default\r
306# rules for the different module type. User can add the customized rules to define the\r
307# content of the FFS file.\r
308#\r
309################################################################################\r
310\r
311\r
312############################################################################\r
313# Example of a DXE_DRIVER FFS file with a Checksum encapsulation section # \r
314############################################################################\r
315#\r
316#[Rule.Common.DXE_DRIVER]\r
317# FILE DRIVER = $(NAMED_GUID) {\r
318# DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
319# COMPRESS PI_STD {\r
320# GUIDED {\r
321# PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
322# UI STRING="$(MODULE_NAME)" Optional\r
323# VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
324# }\r
325# }\r
326# }\r
327#\r
328############################################################################\r
329\r
330[Rule.Common.PEI_CORE]\r
331 FILE PEI_CORE = $(NAMED_GUID) {\r
332 PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi\r
333 UI STRING ="$(MODULE_NAME)" Optional \r
334 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) \r
335 }\r
336\r
337[Rule.Common.PEIM]\r
338 FILE PEIM = $(NAMED_GUID) {\r
339 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
340 PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi\r
341 UI STRING="$(MODULE_NAME)" Optional \r
342 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) \r
343 }\r
344\r
345[Rule.Common.DXE_CORE]\r
346 FILE DXE_CORE = $(NAMED_GUID) {\r
347 COMPRESS PI_STD {\r
348 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
349 UI STRING="$(MODULE_NAME)" Optional\r
350 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
351 }\r
352 }\r
353\r
354[Rule.Common.UEFI_DRIVER]\r
355 FILE DRIVER = $(NAMED_GUID) {\r
356 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
357 COMPRESS PI_STD {\r
358 GUIDED {\r
359 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
360 UI STRING="$(MODULE_NAME)" Optional\r
361 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
362 }\r
363 }\r
364 }\r
365\r
366[Rule.Common.UEFI_DRIVER.TIANOCOMPRESSED]\r
367 FILE DRIVER = $(NAMED_GUID) {\r
368 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
369 GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED = TRUE {\r
370 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
371 UI STRING="$(MODULE_NAME)" Optional\r
372 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
373 }\r
374 }\r
375\r
376[Rule.Common.DXE_DRIVER]\r
377 FILE DRIVER = $(NAMED_GUID) {\r
378 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
379 COMPRESS PI_STD {\r
380 GUIDED {\r
381 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
382 UI STRING="$(MODULE_NAME)" Optional\r
383 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
384 }\r
385 }\r
386 }\r
387\r
388[Rule.Common.DXE_RUNTIME_DRIVER]\r
389 FILE DRIVER = $(NAMED_GUID) {\r
390 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex\r
391 COMPRESS PI_STD {\r
392 GUIDED {\r
393 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
394 UI STRING="$(MODULE_NAME)" Optional\r
395 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
396 }\r
397 }\r
398 }\r
399\r
400[Rule.Common.UEFI_APPLICATION]\r
401 FILE APPLICATION = $(NAMED_GUID) {\r
402 COMPRESS PI_STD {\r
403 GUIDED {\r
404 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi\r
405 UI STRING="$(MODULE_NAME)" Optional\r
406 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
407 }\r
408 }\r
409 }\r
410\r
411[Rule.Common.UEFI_APPLICATION.BINARY]\r
412 FILE APPLICATION = $(NAMED_GUID) {\r
413 COMPRESS PI_STD {\r
414 GUIDED {\r
415 PE32 PE32 |.efi\r
416 UI STRING="$(MODULE_NAME)" Optional\r
417 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
418 }\r
419 }\r
420 }\r
421\r
422[Rule.Common.UEFI_DRIVER.BINARY]\r
423 FILE DRIVER = $(NAMED_GUID) {\r
424 DXE_DEPEX DXE_DEPEX Optional |.depex\r
425 COMPRESS PI_STD {\r
426 GUIDED {\r
427 PE32 PE32 |.efi\r
428 UI STRING="$(MODULE_NAME)" Optional\r
429 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)\r
430 }\r
431 }\r
432 }\r