Nt32Pkg.fdf 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418
  1. ## @file
  2. # This is NT32 FDF file with UEFI HII features enabled
  3. #
  4. # Copyright (c) 2007 - 2018, Intel Corporation. All rights reserved.<BR>
  5. # (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
  6. #
  7. # SPDX-License-Identifier: BSD-2-Clause-Patent
  8. #
  9. ################################################################################
  10. #
  11. # FD Section
  12. # The [FD] Section is made up of the definition statements and a
  13. # description of what goes into the Flash Device Image. Each FD section
  14. # defines one flash "device" image. A flash device image may be one of
  15. # the following: Removable media bootable image (like a boot floppy
  16. # image,) an Option ROM image (that would be "flashed" into an add-in
  17. # card,) a System "Flash" image (that would be burned into a system's
  18. # flash) or an Update ("Capsule") image that will be used to update and
  19. # existing system flash.
  20. #
  21. ################################################################################
  22. [FD.Nt32]
  23. BaseAddress = 0x0|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFdBaseAddress #The base address of the FLASH Device.
  24. Size = 0x00480000|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFirmwareFdSize #The size in bytes of the FLASH Device
  25. ErasePolarity = 1
  26. BlockSize = 0x10000
  27. NumBlocks = 0x48
  28. ################################################################################
  29. #
  30. # Following are lists of FD Region layout which correspond to the locations of different
  31. # images within the flash device.
  32. #
  33. # Regions must be defined in ascending order and may not overlap.
  34. #
  35. # A Layout Region start with a eight digit hex offset (leading "0x" required) followed by
  36. # the pipe "|" character, followed by the size of the region, also in hex with the leading
  37. # "0x" characters. Like:
  38. # Offset|Size
  39. # PcdOffsetCName|PcdSizeCName
  40. # RegionType <FV, DATA, or FILE>
  41. #
  42. ################################################################################
  43. 0x00000000|0x00460000
  44. gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoveryBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoverySize
  45. FV = FvRecovery
  46. 0x00460000|0x0000c000
  47. gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize
  48. #NV_VARIABLE_STORE
  49. DATA = {
  50. ## This is the EFI_FIRMWARE_VOLUME_HEADER
  51. # ZeroVector []
  52. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  53. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  54. # FileSystemGuid: gEfiSystemNvDataFvGuid =
  55. # { 0xFFF12B8D, 0x7696, 0x4C8B, { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }}
  56. 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C,
  57. 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50,
  58. # FvLength: 0x20000
  59. 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00,
  60. #Signature "_FVH" #Attributes
  61. 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00,
  62. #HeaderLength #CheckSum #ExtHeaderOffset #Reserved #Revision
  63. 0x48, 0x00, 0x36, 0x09, 0x00, 0x00, 0x00, 0x02,
  64. #Blockmap[0]: 2 Blocks * 0x10000 Bytes / Block
  65. 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00,
  66. #Blockmap[1]: End
  67. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  68. ## This is the VARIABLE_STORE_HEADER
  69. !if $(SECURE_BOOT_ENABLE) == TRUE
  70. #Signature: gEfiAuthenticatedVariableGuid =
  71. # { 0xaaf32c78, 0x947b, 0x439a, { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }}
  72. 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43,
  73. 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92,
  74. !else
  75. #Signature: gEfiVariableGuid =
  76. # { 0xddcf3616, 0x3275, 0x4164, { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }}
  77. 0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41,
  78. 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d,
  79. !endif
  80. #Size: 0xc000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) - 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0xBFB8
  81. # This can speed up the Variable Dispatch a bit.
  82. 0xB8, 0xBF, 0x00, 0x00,
  83. #FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32
  84. 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
  85. }
  86. 0x0046c000|0x00002000
  87. #NV_EVENT_LOG
  88. gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogSize
  89. 0x0046e000|0x00002000
  90. gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize
  91. #NV_FTW_WORKING
  92. DATA = {
  93. # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =
  94. # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}
  95. 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,
  96. 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95,
  97. # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved
  98. 0xE2, 0x33, 0xF2, 0x03, 0xFE, 0xFF, 0xFF, 0xFF,
  99. # WriteQueueSize: UINT64
  100. 0xE0, 0x1F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
  101. }
  102. 0x00470000|0x00010000
  103. #NV_FTW_SPARE
  104. gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize
  105. ################################################################################
  106. #
  107. # FV Section
  108. #
  109. # [FV] section is used to define what components or modules are placed within a flash
  110. # device file. This section also defines order the components and modules are positioned
  111. # within the image. The [FV] section consists of define statements, set statements and
  112. # module statements.
  113. #
  114. ################################################################################
  115. [FV.FvRecovery]
  116. FvAlignment = 16 #FV alignment and FV attributes setting.
  117. ERASE_POLARITY = 1
  118. MEMORY_MAPPED = TRUE
  119. STICKY_WRITE = TRUE
  120. LOCK_CAP = TRUE
  121. LOCK_STATUS = TRUE
  122. WRITE_DISABLED_CAP = TRUE
  123. WRITE_ENABLED_CAP = TRUE
  124. WRITE_STATUS = TRUE
  125. WRITE_LOCK_CAP = TRUE
  126. WRITE_LOCK_STATUS = TRUE
  127. READ_DISABLED_CAP = TRUE
  128. READ_ENABLED_CAP = TRUE
  129. READ_STATUS = TRUE
  130. READ_LOCK_CAP = TRUE
  131. READ_LOCK_STATUS = TRUE
  132. FvNameGuid = 6D99E806-3D38-42c2-A095-5F4300BFD7DC
  133. ################################################################################
  134. #
  135. # The INF statements point to EDK component and EDK II module INF files, which will be placed into this FV image.
  136. # Parsing tools will scan the INF file to determine the type of component or module.
  137. # The component or module type is used to reference the standard rules
  138. # defined elsewhere in the FDF file.
  139. #
  140. # The format for INF statements is:
  141. # INF $(PathAndInfFileName)
  142. #
  143. ################################################################################
  144. ##
  145. # PEI Phase modules
  146. ##
  147. ##
  148. # PEI Apriori file example, more PEIM module added later.
  149. ##
  150. APRIORI PEI {
  151. INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
  152. INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf
  153. INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf
  154. INF Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf
  155. }
  156. APRIORI DXE {
  157. INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
  158. INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
  159. INF Nt32Pkg/MetronomeDxe/MetronomeDxe.inf
  160. INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf
  161. INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf
  162. INF Nt32Pkg/WinNtOemHookStatusCodeHandlerDxe/WinNtOemHookStatusCodeHandlerDxe.inf
  163. }
  164. INF MdeModulePkg/Core/Pei/PeiMain.inf
  165. INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
  166. INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf
  167. INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf
  168. INF Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf
  169. INF Nt32Pkg/BootModePei/BootModePei.inf
  170. INF Nt32Pkg/StallPei/StallPei.inf
  171. INF Nt32Pkg/WinNtFlashMapPei/WinNtFlashMapPei.inf
  172. INF Nt32Pkg/WinNtAutoScanPei/WinNtAutoScanPei.inf
  173. INF Nt32Pkg/WinNtFirmwareVolumePei/WinNtFirmwareVolumePei.inf
  174. INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf
  175. INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf
  176. INF Nt32Pkg/WinNtThunkPPIToProtocolPei/WinNtThunkPPIToProtocolPei.inf
  177. INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
  178. ##
  179. # DXE Phase modules
  180. ##
  181. INF MdeModulePkg/Core/Dxe/DxeMain.inf
  182. INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
  183. INF Nt32Pkg/MetronomeDxe/MetronomeDxe.inf
  184. INF Nt32Pkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf
  185. INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf
  186. INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
  187. INF Nt32Pkg/FvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
  188. INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
  189. INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf
  190. INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
  191. INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
  192. INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
  193. INF Nt32Pkg/WinNtThunkDxe/WinNtThunkDxe.inf
  194. INF Nt32Pkg/CpuRuntimeDxe/CpuRuntimeDxe.inf
  195. INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
  196. INF MdeModulePkg/Application/UiApp/UiApp.inf
  197. INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
  198. INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
  199. INF Nt32Pkg/MiscSubClassPlatformDxe/MiscSubClassPlatformDxe.inf
  200. INF Nt32Pkg/TimerDxe/TimerDxe.inf
  201. INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf
  202. INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf
  203. INF Nt32Pkg/WinNtOemHookStatusCodeHandlerDxe/WinNtOemHookStatusCodeHandlerDxe.inf
  204. INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
  205. !if $(SECURE_BOOT_ENABLE) == TRUE
  206. INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
  207. !endif
  208. INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
  209. INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
  210. INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
  211. INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
  212. INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
  213. INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
  214. INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
  215. INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
  216. INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
  217. INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
  218. INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
  219. INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
  220. INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf
  221. INF RuleOverride = TIANOCOMPRESSED MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
  222. INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf
  223. INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
  224. INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
  225. INF IntelFrameworkModulePkg/Bus/Pci/IdeBusDxe/IdeBusDxe.inf
  226. INF Nt32Pkg/WinNtBusDriverDxe/WinNtBusDriverDxe.inf
  227. INF Nt32Pkg/WinNtBlockIoDxe/WinNtBlockIoDxe.inf
  228. INF Nt32Pkg/WinNtSerialIoDxe/WinNtSerialIoDxe.inf
  229. INF Nt32Pkg/WinNtGopDxe/WinNtGopDxe.inf
  230. INF Nt32Pkg/WinNtSimpleFileSystemDxe/WinNtSimpleFileSystemDxe.inf
  231. INF MdeModulePkg/Universal/PlatformDriOverrideDxe/PlatformDriOverrideDxe.inf
  232. INF MdeModulePkg/Universal/DriverSampleDxe/DriverSampleDxe.inf
  233. INF MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf
  234. INF MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf
  235. INF MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf
  236. INF MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf
  237. INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf
  238. INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf
  239. INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf
  240. INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf
  241. INF NetworkPkg/UefiPxeBcDxe/UefiPxeBcDxe.inf
  242. INF NetworkPkg/TcpDxe/TcpDxe.inf
  243. INF NetworkPkg/IScsiDxe/IScsiDxe.inf
  244. INF Nt32Pkg/SnpNt32Dxe/SnpNt32Dxe.inf
  245. !if $(NETWORK_IP6_ENABLE) == TRUE
  246. INF NetworkPkg/Ip6Dxe/Ip6Dxe.inf
  247. INF NetworkPkg/Dhcp6Dxe/Dhcp6Dxe.inf
  248. INF NetworkPkg/Udp6Dxe/Udp6Dxe.inf
  249. INF NetworkPkg/Mtftp6Dxe/Mtftp6Dxe.inf
  250. !endif
  251. INF NetworkPkg/HttpBootDxe/HttpBootDxe.inf
  252. INF NetworkPkg/DnsDxe/DnsDxe.inf
  253. INF NetworkPkg/HttpDxe/HttpDxe.inf
  254. INF NetworkPkg/HttpUtilitiesDxe/HttpUtilitiesDxe.inf
  255. !if $(TLS_ENABLE) == TRUE
  256. INF NetworkPkg/TlsDxe/TlsDxe.inf
  257. INF NetworkPkg/TlsAuthConfigDxe/TlsAuthConfigDxe.inf
  258. !endif
  259. INF MdeModulePkg/Application/BootManagerMenuApp/BootManagerMenuApp.inf
  260. ################################################################################
  261. #
  262. # FILE statements are provided so that a platform integrator can include
  263. # complete EFI FFS files, as well as a method for constructing FFS files
  264. # using curly "{}" brace scoping. The following three FILEs are
  265. # for binary shell, binary fat and logo module.
  266. #
  267. ################################################################################
  268. INF ShellPkg/Application/Shell/Shell.inf
  269. INF FatPkg/EnhancedFatDxe/Fat.inf
  270. INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
  271. INF MdeModulePkg/Logo/LogoDxe.inf
  272. INF MdeModulePkg/Universal/LoadFileOnFv2/LoadFileOnFv2.inf
  273. ################################################################################
  274. #
  275. # Rules are use with the [FV] section's module INF type to define
  276. # how an FFS file is created for a given INF file. The following Rule are the default
  277. # rules for the different module type. User can add the customized rules to define the
  278. # content of the FFS file.
  279. #
  280. ################################################################################
  281. ############################################################################
  282. # Example of a DXE_DRIVER FFS file with a Checksum encapsulation section #
  283. ############################################################################
  284. #
  285. #[Rule.Common.DXE_DRIVER]
  286. # FILE DRIVER = $(NAMED_GUID) {
  287. # DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
  288. # COMPRESS PI_STD {
  289. # GUIDED {
  290. # PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
  291. # UI STRING="$(MODULE_NAME)" Optional
  292. # VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  293. # }
  294. # }
  295. # }
  296. #
  297. ############################################################################
  298. [Rule.Common.PEI_CORE]
  299. FILE PEI_CORE = $(NAMED_GUID) {
  300. PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi
  301. UI STRING ="$(MODULE_NAME)" Optional
  302. VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  303. }
  304. [Rule.Common.PEIM]
  305. FILE PEIM = $(NAMED_GUID) {
  306. PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
  307. PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi
  308. UI STRING="$(MODULE_NAME)" Optional
  309. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  310. }
  311. [Rule.Common.DXE_CORE]
  312. FILE DXE_CORE = $(NAMED_GUID) {
  313. COMPRESS PI_STD {
  314. PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
  315. UI STRING="$(MODULE_NAME)" Optional
  316. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  317. }
  318. }
  319. [Rule.Common.UEFI_DRIVER]
  320. FILE DRIVER = $(NAMED_GUID) {
  321. DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
  322. COMPRESS PI_STD {
  323. GUIDED {
  324. PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
  325. UI STRING="$(MODULE_NAME)" Optional
  326. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  327. }
  328. }
  329. }
  330. [Rule.Common.UEFI_DRIVER.TIANOCOMPRESSED]
  331. FILE DRIVER = $(NAMED_GUID) {
  332. DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
  333. GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED = TRUE {
  334. PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
  335. UI STRING="$(MODULE_NAME)" Optional
  336. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  337. }
  338. }
  339. [Rule.Common.DXE_DRIVER]
  340. FILE DRIVER = $(NAMED_GUID) {
  341. DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
  342. COMPRESS PI_STD {
  343. GUIDED {
  344. PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
  345. UI STRING="$(MODULE_NAME)" Optional
  346. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  347. }
  348. }
  349. }
  350. [Rule.Common.DXE_RUNTIME_DRIVER]
  351. FILE DRIVER = $(NAMED_GUID) {
  352. DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
  353. COMPRESS PI_STD {
  354. GUIDED {
  355. PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
  356. UI STRING="$(MODULE_NAME)" Optional
  357. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  358. }
  359. }
  360. }
  361. [Rule.Common.UEFI_APPLICATION]
  362. FILE APPLICATION = $(NAMED_GUID) {
  363. COMPRESS PI_STD {
  364. GUIDED {
  365. PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
  366. UI STRING="$(MODULE_NAME)" Optional
  367. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  368. }
  369. }
  370. }
  371. [Rule.Common.UEFI_APPLICATION.BINARY]
  372. FILE APPLICATION = $(NAMED_GUID) {
  373. COMPRESS PI_STD {
  374. GUIDED {
  375. PE32 PE32 |.efi
  376. UI STRING="$(MODULE_NAME)" Optional
  377. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  378. }
  379. }
  380. }
  381. [Rule.Common.UEFI_DRIVER.BINARY]
  382. FILE DRIVER = $(NAMED_GUID) {
  383. DXE_DEPEX DXE_DEPEX Optional |.depex
  384. COMPRESS PI_STD {
  385. GUIDED {
  386. PE32 PE32 |.efi
  387. UI STRING="$(MODULE_NAME)" Optional
  388. VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
  389. }
  390. }
  391. }