• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1## @file
2# This is NT32 FDF file with UEFI HII features enabled
3#
4# Copyright (c) 2007 - 2016, Intel Corporation. All rights reserved.<BR>
5# (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
6#
7#    This program and the accompanying materials
8#    are licensed and made available under the terms and conditions of the BSD License
9#    which accompanies this distribution. The full text of the license may be found at
10#    http://opensource.org/licenses/bsd-license.php
11#
12#    THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
13#    WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
14#
15
16################################################################################
17#
18# FD Section
19# The [FD] Section is made up of the definition statements and a
20# description of what goes into  the Flash Device Image.  Each FD section
21# defines one flash "device" image.  A flash device image may be one of
22# the following: Removable media bootable image (like a boot floppy
23# image,) an Option ROM image (that would be "flashed" into an add-in
24# card,) a System "Flash"  image (that would be burned into a system's
25# flash) or an Update ("Capsule") image that will be used to update and
26# existing system flash.
27#
28################################################################################
29[FD.Nt32]
30BaseAddress   = 0x0|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFdBaseAddress          #The base address of the FLASH Device.
31Size          = 0x00380000|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFirmwareFdSize  #The size in bytes of the FLASH Device
32ErasePolarity = 1
33BlockSize     = 0x10000
34NumBlocks     = 0x38
35
36################################################################################
37#
38# Following are lists of FD Region layout which correspond to the locations of different
39# images within the flash device.
40#
41# Regions must be defined in ascending order and may not overlap.
42#
43# A Layout Region start with a eight digit hex offset (leading "0x" required) followed by
44# the pipe "|" character, followed by the size of the region, also in hex with the leading
45# "0x" characters. Like:
46# Offset|Size
47# PcdOffsetCName|PcdSizeCName
48# RegionType <FV, DATA, or FILE>
49#
50################################################################################
510x00000000|0x00360000
52gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoveryBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoverySize
53FV = FvRecovery
54
550x00360000|0x0000c000
56gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize
57#NV_VARIABLE_STORE
58DATA = {
59  ## This is the EFI_FIRMWARE_VOLUME_HEADER
60  # ZeroVector []
61  0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
62  0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
63  # FileSystemGuid: gEfiSystemNvDataFvGuid         =
64  #  { 0xFFF12B8D, 0x7696, 0x4C8B, { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }}
65  0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C,
66  0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50,
67  # FvLength: 0x20000
68  0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00,
69  #Signature "_FVH"       #Attributes
70  0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00,
71  #HeaderLength #CheckSum #ExtHeaderOffset #Reserved #Revision
72  0x48, 0x00, 0x36, 0x09, 0x00, 0x00, 0x00, 0x02,
73  #Blockmap[0]: 2 Blocks * 0x10000 Bytes / Block
74  0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00,
75  #Blockmap[1]: End
76  0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
77  ## This is the VARIABLE_STORE_HEADER
78!if $(SECURE_BOOT_ENABLE) == TRUE
79  #Signature: gEfiAuthenticatedVariableGuid =
80  #  { 0xaaf32c78, 0x947b, 0x439a, { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }}
81  0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43,
82  0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92,
83!else
84  #Signature: gEfiVariableGuid =
85  #  { 0xddcf3616, 0x3275, 0x4164, { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }}
86  0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41,
87  0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d,
88!endif
89  #Size: 0xc000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) - 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0xBFB8
90  # This can speed up the Variable Dispatch a bit.
91  0xB8, 0xBF, 0x00, 0x00,
92  #FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32
93  0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
94}
95
960x0036c000|0x00002000
97#NV_EVENT_LOG
98gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogSize
99
1000x0036e000|0x00002000
101gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize
102#NV_FTW_WORKING
103DATA = {
104  # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid         =
105  #  { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65,  0x0, 0xfd, 0x9f, 0x1b, 0x95 }}
106  0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,
107  0xa0, 0xce, 0x65,  0x0, 0xfd, 0x9f, 0x1b, 0x95,
108  # Crc:UINT32            #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved
109  0xE2, 0x33, 0xF2, 0x03, 0xFE, 0xFF, 0xFF, 0xFF,
110  # WriteQueueSize: UINT64
111  0xE0, 0x1F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
112}
113
1140x00370000|0x00010000
115#NV_FTW_SPARE
116gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize
117
118################################################################################
119#
120# FV Section
121#
122# [FV] section is used to define what components or modules are placed within a flash
123# device file.  This section also defines order the components and modules are positioned
124# within the image.  The [FV] section consists of define statements, set statements and
125# module statements.
126#
127################################################################################
128[FV.FvRecovery]
129FvAlignment        = 16         #FV alignment and FV attributes setting.
130ERASE_POLARITY     = 1
131MEMORY_MAPPED      = TRUE
132STICKY_WRITE       = TRUE
133LOCK_CAP           = TRUE
134LOCK_STATUS        = TRUE
135WRITE_DISABLED_CAP = TRUE
136WRITE_ENABLED_CAP  = TRUE
137WRITE_STATUS       = TRUE
138WRITE_LOCK_CAP     = TRUE
139WRITE_LOCK_STATUS  = TRUE
140READ_DISABLED_CAP  = TRUE
141READ_ENABLED_CAP   = TRUE
142READ_STATUS        = TRUE
143READ_LOCK_CAP      = TRUE
144READ_LOCK_STATUS   = TRUE
145FvNameGuid         = 6D99E806-3D38-42c2-A095-5F4300BFD7DC
146
147################################################################################
148#
149# The INF statements point to EDK component and EDK II module INF files, which will be placed into this FV image.
150# Parsing tools will scan the INF file to determine the type of component or module.
151# The component or module type is used to reference the standard rules
152# defined elsewhere in the FDF file.
153#
154# The format for INF statements is:
155# INF $(PathAndInfFileName)
156#
157################################################################################
158  ##
159  #  PEI Phase modules
160  ##
161  ##
162  #  PEI Apriori file example, more PEIM module added later.
163  ##
164APRIORI PEI {
165  INF  MdeModulePkg/Universal/PCD/Pei/Pcd.inf
166  INF  MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf
167  INF  MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf
168  INF  Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf
169  }
170APRIORI DXE {
171  INF  MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
172  INF  MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
173  INF  Nt32Pkg/MetronomeDxe/MetronomeDxe.inf
174  }
175
176INF  MdeModulePkg/Core/Pei/PeiMain.inf
177INF  MdeModulePkg/Universal/PCD/Pei/Pcd.inf
178INF  MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf
179INF  MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf
180INF  Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf
181INF  Nt32Pkg/BootModePei/BootModePei.inf
182INF  Nt32Pkg/StallPei/StallPei.inf
183INF  Nt32Pkg/WinNtFlashMapPei/WinNtFlashMapPei.inf
184INF  Nt32Pkg/WinNtAutoScanPei/WinNtAutoScanPei.inf
185INF  Nt32Pkg/WinNtFirmwareVolumePei/WinNtFirmwareVolumePei.inf
186
187INF  MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf
188INF  MdeModulePkg/Universal/Variable/Pei/VariablePei.inf
189
190INF  Nt32Pkg/WinNtThunkPPIToProtocolPei/WinNtThunkPPIToProtocolPei.inf
191INF  MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
192
193  ##
194  #  DXE Phase modules
195  ##
196INF  MdeModulePkg/Core/Dxe/DxeMain.inf
197INF  MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
198INF  Nt32Pkg/MetronomeDxe/MetronomeDxe.inf
199INF  Nt32Pkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf
200INF  Nt32Pkg/ResetRuntimeDxe/ResetRuntimeDxe.inf
201INF  MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
202INF  Nt32Pkg/FvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
203INF  MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
204INF  MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf
205INF  MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
206INF  MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
207INF  MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
208INF  Nt32Pkg/WinNtThunkDxe/WinNtThunkDxe.inf
209INF  Nt32Pkg/CpuRuntimeDxe/CpuRuntimeDxe.inf
210INF  MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
211INF  MdeModulePkg/Application/UiApp/UiApp.inf
212INF  MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
213INF  MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
214INF  Nt32Pkg/MiscSubClassPlatformDxe/MiscSubClassPlatformDxe.inf
215INF  Nt32Pkg/TimerDxe/TimerDxe.inf
216INF  MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf
217INF  MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf
218INF  Nt32Pkg/WinNtOemHookStatusCodeHandlerDxe/WinNtOemHookStatusCodeHandlerDxe.inf
219INF  MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
220!if $(SECURE_BOOT_ENABLE) == TRUE
221INF  SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
222!endif
223INF  MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
224INF  MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
225INF  MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
226INF  MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
227INF  MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
228INF  MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
229INF  MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
230INF  MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
231INF  MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
232INF  MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
233INF  MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
234INF  MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
235INF  MdeModulePkg/Universal/PrintDxe/PrintDxe.inf
236INF  RuleOverride = TIANOCOMPRESSED MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
237INF  MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf
238INF  MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
239INF  MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
240INF  IntelFrameworkModulePkg/Bus/Pci/IdeBusDxe/IdeBusDxe.inf
241INF  Nt32Pkg/WinNtBusDriverDxe/WinNtBusDriverDxe.inf
242INF  Nt32Pkg/WinNtBlockIoDxe/WinNtBlockIoDxe.inf
243INF  Nt32Pkg/WinNtSerialIoDxe/WinNtSerialIoDxe.inf
244INF  Nt32Pkg/WinNtGopDxe/WinNtGopDxe.inf
245INF  Nt32Pkg/WinNtSimpleFileSystemDxe/WinNtSimpleFileSystemDxe.inf
246INF  MdeModulePkg/Universal/PlatformDriOverrideDxe/PlatformDriOverrideDxe.inf
247INF  MdeModulePkg/Universal/DriverSampleDxe/DriverSampleDxe.inf
248
249INF  MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf
250INF  MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf
251INF  MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf
252INF  MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf
253INF  MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf
254INF  MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf
255INF  MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf
256INF  MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf
257INF  MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf
258INF  Nt32Pkg/SnpNt32Dxe/SnpNt32Dxe.inf
259INF  MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf
260INF  MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf
261INF  NetworkPkg/HttpBootDxe/HttpBootDxe.inf
262INF  NetworkPkg/DnsDxe/DnsDxe.inf
263INF  NetworkPkg/HttpDxe/HttpDxe.inf
264INF  NetworkPkg/HttpUtilitiesDxe/HttpUtilitiesDxe.inf
265!if $(TLS_ENABLE) == TRUE
266INF  NetworkPkg/TlsDxe/TlsDxe.inf
267INF  NetworkPkg/TlsAuthConfigDxe/TlsAuthConfigDxe.inf
268!endif
269INF  MdeModulePkg/Application/BootManagerMenuApp/BootManagerMenuApp.inf
270################################################################################
271#
272# FILE statements are provided so that a platform integrator can include
273# complete EFI FFS files, as well as a method for constructing FFS files
274# using curly "{}" brace scoping. The following three FILEs are
275# for binary shell, binary fat and logo module.
276#
277################################################################################
278!ifndef $(USE_OLD_SHELL)
279INF  ShellBinPkg/UefiShell/UefiShell.inf
280!else
281INF  EdkShellBinPkg/FullShell/FullShell.inf
282!endif
283
284INF FatPkg/EnhancedFatDxe/Fat.inf
285
286INF MdeModulePkg/Logo/LogoDxe.inf
287INF MdeModulePkg/Universal/LoadFileOnFv2/LoadFileOnFv2.inf
288################################################################################
289#
290# Rules are use with the [FV] section's module INF type to define
291# how an FFS file is created for a given INF file. The following Rule are the default
292# rules for the different module type. User can add the customized rules to define the
293# content of the FFS file.
294#
295################################################################################
296
297
298############################################################################
299# Example of a DXE_DRIVER FFS file with a Checksum encapsulation section   #
300############################################################################
301#
302#[Rule.Common.DXE_DRIVER]
303#  FILE DRIVER = $(NAMED_GUID) {
304#    DXE_DEPEX    DXE_DEPEX Optional      $(INF_OUTPUT)/$(MODULE_NAME).depex
305#    COMPRESS PI_STD {
306#      GUIDED {
307#        PE32     PE32                    $(INF_OUTPUT)/$(MODULE_NAME).efi
308#        UI       STRING="$(MODULE_NAME)" Optional
309#        VERSION  STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
310#      }
311#    }
312#  }
313#
314############################################################################
315
316[Rule.Common.PEI_CORE]
317  FILE PEI_CORE = $(NAMED_GUID) {
318    PE32     PE32    Align=4K     $(INF_OUTPUT)/$(MODULE_NAME).efi
319    UI       STRING ="$(MODULE_NAME)" Optional
320    VERSION  STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
321  }
322
323[Rule.Common.PEIM]
324  FILE PEIM = $(NAMED_GUID) {
325     PEI_DEPEX PEI_DEPEX Optional        $(INF_OUTPUT)/$(MODULE_NAME).depex
326     PE32      PE32    Align=4K          $(INF_OUTPUT)/$(MODULE_NAME).efi
327     UI       STRING="$(MODULE_NAME)" Optional
328     VERSION  STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
329  }
330
331[Rule.Common.DXE_CORE]
332  FILE DXE_CORE = $(NAMED_GUID) {
333    COMPRESS PI_STD {
334      PE32     PE32      $(INF_OUTPUT)/$(MODULE_NAME).efi
335      UI       STRING="$(MODULE_NAME)" Optional
336      VERSION  STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
337    }
338  }
339
340[Rule.Common.UEFI_DRIVER]
341  FILE DRIVER = $(NAMED_GUID) {
342    DXE_DEPEX    DXE_DEPEX Optional      $(INF_OUTPUT)/$(MODULE_NAME).depex
343    COMPRESS PI_STD {
344      GUIDED {
345        PE32     PE32                    $(INF_OUTPUT)/$(MODULE_NAME).efi
346        UI       STRING="$(MODULE_NAME)" Optional
347        VERSION  STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
348      }
349    }
350  }
351
352[Rule.Common.UEFI_DRIVER.TIANOCOMPRESSED]
353  FILE DRIVER = $(NAMED_GUID) {
354    DXE_DEPEX    DXE_DEPEX Optional      $(INF_OUTPUT)/$(MODULE_NAME).depex
355    GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED = TRUE {
356      PE32     PE32                    $(INF_OUTPUT)/$(MODULE_NAME).efi
357      UI       STRING="$(MODULE_NAME)" Optional
358      VERSION  STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
359    }
360  }
361
362[Rule.Common.DXE_DRIVER]
363  FILE DRIVER = $(NAMED_GUID) {
364    DXE_DEPEX    DXE_DEPEX Optional      $(INF_OUTPUT)/$(MODULE_NAME).depex
365    COMPRESS PI_STD {
366      GUIDED {
367        PE32     PE32                    $(INF_OUTPUT)/$(MODULE_NAME).efi
368        UI       STRING="$(MODULE_NAME)" Optional
369        VERSION  STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
370      }
371    }
372  }
373
374[Rule.Common.DXE_RUNTIME_DRIVER]
375  FILE DRIVER = $(NAMED_GUID) {
376    DXE_DEPEX    DXE_DEPEX Optional      $(INF_OUTPUT)/$(MODULE_NAME).depex
377    COMPRESS PI_STD {
378      GUIDED {
379        PE32     PE32                    $(INF_OUTPUT)/$(MODULE_NAME).efi
380        UI       STRING="$(MODULE_NAME)" Optional
381        VERSION  STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
382      }
383    }
384  }
385
386[Rule.Common.UEFI_APPLICATION]
387  FILE APPLICATION = $(NAMED_GUID) {
388    COMPRESS PI_STD {
389      GUIDED {
390        PE32     PE32                    $(INF_OUTPUT)/$(MODULE_NAME).efi
391        UI       STRING="$(MODULE_NAME)" Optional
392        VERSION  STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
393      }
394    }
395  }
396
397[Rule.Common.UEFI_APPLICATION.BINARY]
398  FILE APPLICATION = $(NAMED_GUID) {
399    COMPRESS PI_STD {
400      GUIDED {
401        PE32     PE32                    |.efi
402        UI       STRING="$(MODULE_NAME)" Optional
403        VERSION  STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
404      }
405    }
406  }
407
408[Rule.Common.UEFI_DRIVER.BINARY]
409  FILE DRIVER = $(NAMED_GUID) {
410    DXE_DEPEX    DXE_DEPEX Optional      |.depex
411    COMPRESS PI_STD {
412      GUIDED {
413        PE32     PE32                    |.efi
414        UI       STRING="$(MODULE_NAME)" Optional
415        VERSION  STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
416      }
417    }
418  }
419