]> git.proxmox.com Git - mirror_edk2.git/blob - Nt32Pkg/Nt32Pkg.fdf
UefiCpuPkg/PiSmmCpuDxeSmm: patch "gSmbase" with PatchInstructionX86()
[mirror_edk2.git] / Nt32Pkg / Nt32Pkg.fdf
1 ## @file
2 # This is NT32 FDF file with UEFI HII features enabled
3 #
4 # Copyright (c) 2007 - 2017, Intel Corporation. All rights reserved.<BR>
5 # (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
6 #
7 # This program and the accompanying materials
8 # are licensed and made available under the terms and conditions of the BSD License
9 # which accompanies this distribution. The full text of the license may be found at
10 # http://opensource.org/licenses/bsd-license.php
11 #
12 # THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
14 #
15
16 ################################################################################
17 #
18 # FD Section
19 # The [FD] Section is made up of the definition statements and a
20 # description of what goes into the Flash Device Image. Each FD section
21 # defines one flash "device" image. A flash device image may be one of
22 # the following: Removable media bootable image (like a boot floppy
23 # image,) an Option ROM image (that would be "flashed" into an add-in
24 # card,) a System "Flash" image (that would be burned into a system's
25 # flash) or an Update ("Capsule") image that will be used to update and
26 # existing system flash.
27 #
28 ################################################################################
29 [FD.Nt32]
30 BaseAddress = 0x0|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFdBaseAddress #The base address of the FLASH Device.
31 Size = 0x00480000|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFirmwareFdSize #The size in bytes of the FLASH Device
32 ErasePolarity = 1
33 BlockSize = 0x10000
34 NumBlocks = 0x48
35
36 ################################################################################
37 #
38 # Following are lists of FD Region layout which correspond to the locations of different
39 # images within the flash device.
40 #
41 # Regions must be defined in ascending order and may not overlap.
42 #
43 # A Layout Region start with a eight digit hex offset (leading "0x" required) followed by
44 # the pipe "|" character, followed by the size of the region, also in hex with the leading
45 # "0x" characters. Like:
46 # Offset|Size
47 # PcdOffsetCName|PcdSizeCName
48 # RegionType <FV, DATA, or FILE>
49 #
50 ################################################################################
51 0x00000000|0x00460000
52 gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoveryBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoverySize
53 FV = FvRecovery
54
55 0x00460000|0x0000c000
56 gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize
57 #NV_VARIABLE_STORE
58 DATA = {
59 ## This is the EFI_FIRMWARE_VOLUME_HEADER
60 # ZeroVector []
61 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
62 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
63 # FileSystemGuid: gEfiSystemNvDataFvGuid =
64 # { 0xFFF12B8D, 0x7696, 0x4C8B, { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }}
65 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C,
66 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50,
67 # FvLength: 0x20000
68 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00,
69 #Signature "_FVH" #Attributes
70 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00,
71 #HeaderLength #CheckSum #ExtHeaderOffset #Reserved #Revision
72 0x48, 0x00, 0x36, 0x09, 0x00, 0x00, 0x00, 0x02,
73 #Blockmap[0]: 2 Blocks * 0x10000 Bytes / Block
74 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00,
75 #Blockmap[1]: End
76 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
77 ## This is the VARIABLE_STORE_HEADER
78 !if $(SECURE_BOOT_ENABLE) == TRUE
79 #Signature: gEfiAuthenticatedVariableGuid =
80 # { 0xaaf32c78, 0x947b, 0x439a, { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }}
81 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43,
82 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92,
83 !else
84 #Signature: gEfiVariableGuid =
85 # { 0xddcf3616, 0x3275, 0x4164, { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }}
86 0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41,
87 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d,
88 !endif
89 #Size: 0xc000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) - 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0xBFB8
90 # This can speed up the Variable Dispatch a bit.
91 0xB8, 0xBF, 0x00, 0x00,
92 #FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32
93 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
94 }
95
96 0x0046c000|0x00002000
97 #NV_EVENT_LOG
98 gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogSize
99
100 0x0046e000|0x00002000
101 gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize
102 #NV_FTW_WORKING
103 DATA = {
104 # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =
105 # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}
106 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,
107 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95,
108 # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved
109 0xE2, 0x33, 0xF2, 0x03, 0xFE, 0xFF, 0xFF, 0xFF,
110 # WriteQueueSize: UINT64
111 0xE0, 0x1F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
112 }
113
114 0x00470000|0x00010000
115 #NV_FTW_SPARE
116 gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize
117
118 ################################################################################
119 #
120 # FV Section
121 #
122 # [FV] section is used to define what components or modules are placed within a flash
123 # device file. This section also defines order the components and modules are positioned
124 # within the image. The [FV] section consists of define statements, set statements and
125 # module statements.
126 #
127 ################################################################################
128 [FV.FvRecovery]
129 FvAlignment = 16 #FV alignment and FV attributes setting.
130 ERASE_POLARITY = 1
131 MEMORY_MAPPED = TRUE
132 STICKY_WRITE = TRUE
133 LOCK_CAP = TRUE
134 LOCK_STATUS = TRUE
135 WRITE_DISABLED_CAP = TRUE
136 WRITE_ENABLED_CAP = TRUE
137 WRITE_STATUS = TRUE
138 WRITE_LOCK_CAP = TRUE
139 WRITE_LOCK_STATUS = TRUE
140 READ_DISABLED_CAP = TRUE
141 READ_ENABLED_CAP = TRUE
142 READ_STATUS = TRUE
143 READ_LOCK_CAP = TRUE
144 READ_LOCK_STATUS = TRUE
145 FvNameGuid = 6D99E806-3D38-42c2-A095-5F4300BFD7DC
146
147 ################################################################################
148 #
149 # The INF statements point to EDK component and EDK II module INF files, which will be placed into this FV image.
150 # Parsing tools will scan the INF file to determine the type of component or module.
151 # The component or module type is used to reference the standard rules
152 # defined elsewhere in the FDF file.
153 #
154 # The format for INF statements is:
155 # INF $(PathAndInfFileName)
156 #
157 ################################################################################
158 ##
159 # PEI Phase modules
160 ##
161 ##
162 # PEI Apriori file example, more PEIM module added later.
163 ##
164 APRIORI PEI {
165 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
166 INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf
167 INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf
168 INF Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf
169 }
170 APRIORI DXE {
171 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
172 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
173 INF Nt32Pkg/MetronomeDxe/MetronomeDxe.inf
174 INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf
175 INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf
176 INF Nt32Pkg/WinNtOemHookStatusCodeHandlerDxe/WinNtOemHookStatusCodeHandlerDxe.inf
177 }
178
179 INF MdeModulePkg/Core/Pei/PeiMain.inf
180 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
181 INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf
182 INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf
183 INF Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf
184 INF Nt32Pkg/BootModePei/BootModePei.inf
185 INF Nt32Pkg/StallPei/StallPei.inf
186 INF Nt32Pkg/WinNtFlashMapPei/WinNtFlashMapPei.inf
187 INF Nt32Pkg/WinNtAutoScanPei/WinNtAutoScanPei.inf
188 INF Nt32Pkg/WinNtFirmwareVolumePei/WinNtFirmwareVolumePei.inf
189
190 INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf
191 INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf
192
193 INF Nt32Pkg/WinNtThunkPPIToProtocolPei/WinNtThunkPPIToProtocolPei.inf
194 INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
195
196 ##
197 # DXE Phase modules
198 ##
199 INF MdeModulePkg/Core/Dxe/DxeMain.inf
200 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
201 INF Nt32Pkg/MetronomeDxe/MetronomeDxe.inf
202 INF Nt32Pkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf
203 INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf
204 INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
205 INF Nt32Pkg/FvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
206 INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
207 INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf
208 INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
209 INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
210 INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
211 INF Nt32Pkg/WinNtThunkDxe/WinNtThunkDxe.inf
212 INF Nt32Pkg/CpuRuntimeDxe/CpuRuntimeDxe.inf
213 INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
214 INF MdeModulePkg/Application/UiApp/UiApp.inf
215 INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
216 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
217 INF Nt32Pkg/MiscSubClassPlatformDxe/MiscSubClassPlatformDxe.inf
218 INF Nt32Pkg/TimerDxe/TimerDxe.inf
219 INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf
220 INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf
221 INF Nt32Pkg/WinNtOemHookStatusCodeHandlerDxe/WinNtOemHookStatusCodeHandlerDxe.inf
222 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
223 !if $(SECURE_BOOT_ENABLE) == TRUE
224 INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
225 !endif
226 INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
227 INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
228 INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
229 INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
230 INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
231 INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
232 INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
233 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
234 INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
235 INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
236 INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
237 INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
238 INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf
239 INF RuleOverride = TIANOCOMPRESSED MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
240 INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf
241 INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
242 INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
243 INF IntelFrameworkModulePkg/Bus/Pci/IdeBusDxe/IdeBusDxe.inf
244 INF Nt32Pkg/WinNtBusDriverDxe/WinNtBusDriverDxe.inf
245 INF Nt32Pkg/WinNtBlockIoDxe/WinNtBlockIoDxe.inf
246 INF Nt32Pkg/WinNtSerialIoDxe/WinNtSerialIoDxe.inf
247 INF Nt32Pkg/WinNtGopDxe/WinNtGopDxe.inf
248 INF Nt32Pkg/WinNtSimpleFileSystemDxe/WinNtSimpleFileSystemDxe.inf
249 INF MdeModulePkg/Universal/PlatformDriOverrideDxe/PlatformDriOverrideDxe.inf
250 INF MdeModulePkg/Universal/DriverSampleDxe/DriverSampleDxe.inf
251
252 INF MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf
253 INF MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf
254 INF MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf
255 INF MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf
256 INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf
257 INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf
258 INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf
259 INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf
260 INF Nt32Pkg/SnpNt32Dxe/SnpNt32Dxe.inf
261 !if $(NETWORK_IP6_ENABLE) == TRUE
262 INF NetworkPkg/Ip6Dxe/Ip6Dxe.inf
263 INF NetworkPkg/Dhcp6Dxe/Dhcp6Dxe.inf
264 INF NetworkPkg/Udp6Dxe/Udp6Dxe.inf
265 INF NetworkPkg/Mtftp6Dxe/Mtftp6Dxe.inf
266 INF NetworkPkg/TcpDxe/TcpDxe.inf
267 INF NetworkPkg/UefiPxeBcDxe/UefiPxeBcDxe.inf
268 INF NetworkPkg/IScsiDxe/IScsiDxe.inf
269 !else
270 INF MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
271 INF MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf
272 INF MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf
273 !endif
274 INF NetworkPkg/HttpBootDxe/HttpBootDxe.inf
275 INF NetworkPkg/DnsDxe/DnsDxe.inf
276 INF NetworkPkg/HttpDxe/HttpDxe.inf
277 INF NetworkPkg/HttpUtilitiesDxe/HttpUtilitiesDxe.inf
278 !if $(TLS_ENABLE) == TRUE
279 INF NetworkPkg/TlsDxe/TlsDxe.inf
280 INF NetworkPkg/TlsAuthConfigDxe/TlsAuthConfigDxe.inf
281 !endif
282 INF MdeModulePkg/Application/BootManagerMenuApp/BootManagerMenuApp.inf
283 ################################################################################
284 #
285 # FILE statements are provided so that a platform integrator can include
286 # complete EFI FFS files, as well as a method for constructing FFS files
287 # using curly "{}" brace scoping. The following three FILEs are
288 # for binary shell, binary fat and logo module.
289 #
290 ################################################################################
291 !ifndef $(USE_OLD_SHELL)
292 INF ShellPkg/Application/Shell/Shell.inf
293 !else
294 INF EdkShellBinPkg/FullShell/FullShell.inf
295 !endif
296
297 INF FatPkg/EnhancedFatDxe/Fat.inf
298 INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
299
300 INF MdeModulePkg/Logo/LogoDxe.inf
301 INF MdeModulePkg/Universal/LoadFileOnFv2/LoadFileOnFv2.inf
302 ################################################################################
303 #
304 # Rules are use with the [FV] section's module INF type to define
305 # how an FFS file is created for a given INF file. The following Rule are the default
306 # rules for the different module type. User can add the customized rules to define the
307 # content of the FFS file.
308 #
309 ################################################################################
310
311
312 ############################################################################
313 # Example of a DXE_DRIVER FFS file with a Checksum encapsulation section #
314 ############################################################################
315 #
316 #[Rule.Common.DXE_DRIVER]
317 # FILE DRIVER = $(NAMED_GUID) {
318 # DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
319 # COMPRESS PI_STD {
320 # GUIDED {
321 # PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
322 # UI STRING="$(MODULE_NAME)" Optional
323 # VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
324 # }
325 # }
326 # }
327 #
328 ############################################################################
329
330 [Rule.Common.PEI_CORE]
331 FILE PEI_CORE = $(NAMED_GUID) {
332 PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi
333 UI STRING ="$(MODULE_NAME)" Optional
334 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
335 }
336
337 [Rule.Common.PEIM]
338 FILE PEIM = $(NAMED_GUID) {
339 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
340 PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi
341 UI STRING="$(MODULE_NAME)" Optional
342 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
343 }
344
345 [Rule.Common.DXE_CORE]
346 FILE DXE_CORE = $(NAMED_GUID) {
347 COMPRESS PI_STD {
348 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
349 UI STRING="$(MODULE_NAME)" Optional
350 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
351 }
352 }
353
354 [Rule.Common.UEFI_DRIVER]
355 FILE DRIVER = $(NAMED_GUID) {
356 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
357 COMPRESS PI_STD {
358 GUIDED {
359 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
360 UI STRING="$(MODULE_NAME)" Optional
361 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
362 }
363 }
364 }
365
366 [Rule.Common.UEFI_DRIVER.TIANOCOMPRESSED]
367 FILE DRIVER = $(NAMED_GUID) {
368 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
369 GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED = TRUE {
370 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
371 UI STRING="$(MODULE_NAME)" Optional
372 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
373 }
374 }
375
376 [Rule.Common.DXE_DRIVER]
377 FILE DRIVER = $(NAMED_GUID) {
378 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
379 COMPRESS PI_STD {
380 GUIDED {
381 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
382 UI STRING="$(MODULE_NAME)" Optional
383 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
384 }
385 }
386 }
387
388 [Rule.Common.DXE_RUNTIME_DRIVER]
389 FILE DRIVER = $(NAMED_GUID) {
390 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
391 COMPRESS PI_STD {
392 GUIDED {
393 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
394 UI STRING="$(MODULE_NAME)" Optional
395 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
396 }
397 }
398 }
399
400 [Rule.Common.UEFI_APPLICATION]
401 FILE APPLICATION = $(NAMED_GUID) {
402 COMPRESS PI_STD {
403 GUIDED {
404 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
405 UI STRING="$(MODULE_NAME)" Optional
406 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
407 }
408 }
409 }
410
411 [Rule.Common.UEFI_APPLICATION.BINARY]
412 FILE APPLICATION = $(NAMED_GUID) {
413 COMPRESS PI_STD {
414 GUIDED {
415 PE32 PE32 |.efi
416 UI STRING="$(MODULE_NAME)" Optional
417 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
418 }
419 }
420 }
421
422 [Rule.Common.UEFI_DRIVER.BINARY]
423 FILE DRIVER = $(NAMED_GUID) {
424 DXE_DEPEX DXE_DEPEX Optional |.depex
425 COMPRESS PI_STD {
426 GUIDED {
427 PE32 PE32 |.efi
428 UI STRING="$(MODULE_NAME)" Optional
429 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
430 }
431 }
432 }