1## @file 2# This is NT32 FDF file with UEFI HII features enabled 3# 4# Copyright (c) 2007 - 2016, Intel Corporation. All rights reserved.<BR> 5# (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR> 6# 7# This program and the accompanying materials 8# are licensed and made available under the terms and conditions of the BSD License 9# which accompanies this distribution. The full text of the license may be found at 10# http://opensource.org/licenses/bsd-license.php 11# 12# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, 13# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. 14# 15 16################################################################################ 17# 18# FD Section 19# The [FD] Section is made up of the definition statements and a 20# description of what goes into the Flash Device Image. Each FD section 21# defines one flash "device" image. A flash device image may be one of 22# the following: Removable media bootable image (like a boot floppy 23# image,) an Option ROM image (that would be "flashed" into an add-in 24# card,) a System "Flash" image (that would be burned into a system's 25# flash) or an Update ("Capsule") image that will be used to update and 26# existing system flash. 27# 28################################################################################ 29[FD.Nt32] 30BaseAddress = 0x0|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFdBaseAddress #The base address of the FLASH Device. 31Size = 0x00380000|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFirmwareFdSize #The size in bytes of the FLASH Device 32ErasePolarity = 1 33BlockSize = 0x10000 34NumBlocks = 0x38 35 36################################################################################ 37# 38# Following are lists of FD Region layout which correspond to the locations of different 39# images within the flash device. 40# 41# Regions must be defined in ascending order and may not overlap. 42# 43# A Layout Region start with a eight digit hex offset (leading "0x" required) followed by 44# the pipe "|" character, followed by the size of the region, also in hex with the leading 45# "0x" characters. Like: 46# Offset|Size 47# PcdOffsetCName|PcdSizeCName 48# RegionType <FV, DATA, or FILE> 49# 50################################################################################ 510x00000000|0x00360000 52gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoveryBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoverySize 53FV = FvRecovery 54 550x00360000|0x0000c000 56gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize 57#NV_VARIABLE_STORE 58DATA = { 59 ## This is the EFI_FIRMWARE_VOLUME_HEADER 60 # ZeroVector [] 61 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 62 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 63 # FileSystemGuid: gEfiSystemNvDataFvGuid = 64 # { 0xFFF12B8D, 0x7696, 0x4C8B, { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }} 65 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C, 66 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50, 67 # FvLength: 0x20000 68 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 69 #Signature "_FVH" #Attributes 70 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00, 71 #HeaderLength #CheckSum #ExtHeaderOffset #Reserved #Revision 72 0x48, 0x00, 0x36, 0x09, 0x00, 0x00, 0x00, 0x02, 73 #Blockmap[0]: 2 Blocks * 0x10000 Bytes / Block 74 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 75 #Blockmap[1]: End 76 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 77 ## This is the VARIABLE_STORE_HEADER 78!if $(SECURE_BOOT_ENABLE) == TRUE 79 #Signature: gEfiAuthenticatedVariableGuid = 80 # { 0xaaf32c78, 0x947b, 0x439a, { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }} 81 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43, 82 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92, 83!else 84 #Signature: gEfiVariableGuid = 85 # { 0xddcf3616, 0x3275, 0x4164, { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }} 86 0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41, 87 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d, 88!endif 89 #Size: 0xc000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) - 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0xBFB8 90 # This can speed up the Variable Dispatch a bit. 91 0xB8, 0xBF, 0x00, 0x00, 92 #FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32 93 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 94} 95 960x0036c000|0x00002000 97#NV_EVENT_LOG 98gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogSize 99 1000x0036e000|0x00002000 101gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize 102#NV_FTW_WORKING 103DATA = { 104 # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid = 105 # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }} 106 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49, 107 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95, 108 # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved 109 0xE2, 0x33, 0xF2, 0x03, 0xFE, 0xFF, 0xFF, 0xFF, 110 # WriteQueueSize: UINT64 111 0xE0, 0x1F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 112} 113 1140x00370000|0x00010000 115#NV_FTW_SPARE 116gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize 117 118################################################################################ 119# 120# FV Section 121# 122# [FV] section is used to define what components or modules are placed within a flash 123# device file. This section also defines order the components and modules are positioned 124# within the image. The [FV] section consists of define statements, set statements and 125# module statements. 126# 127################################################################################ 128[FV.FvRecovery] 129FvAlignment = 16 #FV alignment and FV attributes setting. 130ERASE_POLARITY = 1 131MEMORY_MAPPED = TRUE 132STICKY_WRITE = TRUE 133LOCK_CAP = TRUE 134LOCK_STATUS = TRUE 135WRITE_DISABLED_CAP = TRUE 136WRITE_ENABLED_CAP = TRUE 137WRITE_STATUS = TRUE 138WRITE_LOCK_CAP = TRUE 139WRITE_LOCK_STATUS = TRUE 140READ_DISABLED_CAP = TRUE 141READ_ENABLED_CAP = TRUE 142READ_STATUS = TRUE 143READ_LOCK_CAP = TRUE 144READ_LOCK_STATUS = TRUE 145FvNameGuid = 6D99E806-3D38-42c2-A095-5F4300BFD7DC 146 147################################################################################ 148# 149# The INF statements point to EDK component and EDK II module INF files, which will be placed into this FV image. 150# Parsing tools will scan the INF file to determine the type of component or module. 151# The component or module type is used to reference the standard rules 152# defined elsewhere in the FDF file. 153# 154# The format for INF statements is: 155# INF $(PathAndInfFileName) 156# 157################################################################################ 158 ## 159 # PEI Phase modules 160 ## 161 ## 162 # PEI Apriori file example, more PEIM module added later. 163 ## 164APRIORI PEI { 165 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf 166 INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf 167 INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf 168 INF Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf 169 } 170APRIORI DXE { 171 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf 172 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf 173 INF Nt32Pkg/MetronomeDxe/MetronomeDxe.inf 174 } 175 176INF MdeModulePkg/Core/Pei/PeiMain.inf 177INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf 178INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf 179INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf 180INF Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf 181INF Nt32Pkg/BootModePei/BootModePei.inf 182INF Nt32Pkg/StallPei/StallPei.inf 183INF Nt32Pkg/WinNtFlashMapPei/WinNtFlashMapPei.inf 184INF Nt32Pkg/WinNtAutoScanPei/WinNtAutoScanPei.inf 185INF Nt32Pkg/WinNtFirmwareVolumePei/WinNtFirmwareVolumePei.inf 186 187INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf 188INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf 189 190INF Nt32Pkg/WinNtThunkPPIToProtocolPei/WinNtThunkPPIToProtocolPei.inf 191INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf 192 193 ## 194 # DXE Phase modules 195 ## 196INF MdeModulePkg/Core/Dxe/DxeMain.inf 197INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf 198INF Nt32Pkg/MetronomeDxe/MetronomeDxe.inf 199INF Nt32Pkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf 200INF Nt32Pkg/ResetRuntimeDxe/ResetRuntimeDxe.inf 201INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf 202INF Nt32Pkg/FvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf 203INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf 204INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf 205INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf 206INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf 207INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf 208INF Nt32Pkg/WinNtThunkDxe/WinNtThunkDxe.inf 209INF Nt32Pkg/CpuRuntimeDxe/CpuRuntimeDxe.inf 210INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf 211INF MdeModulePkg/Application/UiApp/UiApp.inf 212INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf 213INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf 214INF Nt32Pkg/MiscSubClassPlatformDxe/MiscSubClassPlatformDxe.inf 215INF Nt32Pkg/TimerDxe/TimerDxe.inf 216INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf 217INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf 218INF Nt32Pkg/WinNtOemHookStatusCodeHandlerDxe/WinNtOemHookStatusCodeHandlerDxe.inf 219INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf 220!if $(SECURE_BOOT_ENABLE) == TRUE 221INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf 222!endif 223INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf 224INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf 225INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf 226INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf 227INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf 228INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf 229INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf 230INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf 231INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf 232INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf 233INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf 234INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf 235INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf 236INF RuleOverride = TIANOCOMPRESSED MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf 237INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf 238INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf 239INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf 240INF IntelFrameworkModulePkg/Bus/Pci/IdeBusDxe/IdeBusDxe.inf 241INF Nt32Pkg/WinNtBusDriverDxe/WinNtBusDriverDxe.inf 242INF Nt32Pkg/WinNtBlockIoDxe/WinNtBlockIoDxe.inf 243INF Nt32Pkg/WinNtSerialIoDxe/WinNtSerialIoDxe.inf 244INF Nt32Pkg/WinNtGopDxe/WinNtGopDxe.inf 245INF Nt32Pkg/WinNtSimpleFileSystemDxe/WinNtSimpleFileSystemDxe.inf 246INF MdeModulePkg/Universal/PlatformDriOverrideDxe/PlatformDriOverrideDxe.inf 247INF MdeModulePkg/Universal/DriverSampleDxe/DriverSampleDxe.inf 248 249INF MdeModulePkg/Universal/Network/DpcDxe/DpcDxe.inf 250INF MdeModulePkg/Universal/Network/ArpDxe/ArpDxe.inf 251INF MdeModulePkg/Universal/Network/Dhcp4Dxe/Dhcp4Dxe.inf 252INF MdeModulePkg/Universal/Network/Ip4Dxe/Ip4Dxe.inf 253INF MdeModulePkg/Universal/Network/MnpDxe/MnpDxe.inf 254INF MdeModulePkg/Universal/Network/VlanConfigDxe/VlanConfigDxe.inf 255INF MdeModulePkg/Universal/Network/Mtftp4Dxe/Mtftp4Dxe.inf 256INF MdeModulePkg/Universal/Network/Tcp4Dxe/Tcp4Dxe.inf 257INF MdeModulePkg/Universal/Network/Udp4Dxe/Udp4Dxe.inf 258INF Nt32Pkg/SnpNt32Dxe/SnpNt32Dxe.inf 259INF MdeModulePkg/Universal/Network/UefiPxeBcDxe/UefiPxeBcDxe.inf 260INF MdeModulePkg/Universal/Network/IScsiDxe/IScsiDxe.inf 261INF NetworkPkg/HttpBootDxe/HttpBootDxe.inf 262INF NetworkPkg/DnsDxe/DnsDxe.inf 263INF NetworkPkg/HttpDxe/HttpDxe.inf 264INF NetworkPkg/HttpUtilitiesDxe/HttpUtilitiesDxe.inf 265!if $(TLS_ENABLE) == TRUE 266INF NetworkPkg/TlsDxe/TlsDxe.inf 267INF NetworkPkg/TlsAuthConfigDxe/TlsAuthConfigDxe.inf 268!endif 269INF MdeModulePkg/Application/BootManagerMenuApp/BootManagerMenuApp.inf 270################################################################################ 271# 272# FILE statements are provided so that a platform integrator can include 273# complete EFI FFS files, as well as a method for constructing FFS files 274# using curly "{}" brace scoping. The following three FILEs are 275# for binary shell, binary fat and logo module. 276# 277################################################################################ 278!ifndef $(USE_OLD_SHELL) 279INF ShellBinPkg/UefiShell/UefiShell.inf 280!else 281INF EdkShellBinPkg/FullShell/FullShell.inf 282!endif 283 284INF FatPkg/EnhancedFatDxe/Fat.inf 285 286INF MdeModulePkg/Logo/LogoDxe.inf 287INF MdeModulePkg/Universal/LoadFileOnFv2/LoadFileOnFv2.inf 288################################################################################ 289# 290# Rules are use with the [FV] section's module INF type to define 291# how an FFS file is created for a given INF file. The following Rule are the default 292# rules for the different module type. User can add the customized rules to define the 293# content of the FFS file. 294# 295################################################################################ 296 297 298############################################################################ 299# Example of a DXE_DRIVER FFS file with a Checksum encapsulation section # 300############################################################################ 301# 302#[Rule.Common.DXE_DRIVER] 303# FILE DRIVER = $(NAMED_GUID) { 304# DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex 305# COMPRESS PI_STD { 306# GUIDED { 307# PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi 308# UI STRING="$(MODULE_NAME)" Optional 309# VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) 310# } 311# } 312# } 313# 314############################################################################ 315 316[Rule.Common.PEI_CORE] 317 FILE PEI_CORE = $(NAMED_GUID) { 318 PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi 319 UI STRING ="$(MODULE_NAME)" Optional 320 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) 321 } 322 323[Rule.Common.PEIM] 324 FILE PEIM = $(NAMED_GUID) { 325 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex 326 PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi 327 UI STRING="$(MODULE_NAME)" Optional 328 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) 329 } 330 331[Rule.Common.DXE_CORE] 332 FILE DXE_CORE = $(NAMED_GUID) { 333 COMPRESS PI_STD { 334 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi 335 UI STRING="$(MODULE_NAME)" Optional 336 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) 337 } 338 } 339 340[Rule.Common.UEFI_DRIVER] 341 FILE DRIVER = $(NAMED_GUID) { 342 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex 343 COMPRESS PI_STD { 344 GUIDED { 345 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi 346 UI STRING="$(MODULE_NAME)" Optional 347 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) 348 } 349 } 350 } 351 352[Rule.Common.UEFI_DRIVER.TIANOCOMPRESSED] 353 FILE DRIVER = $(NAMED_GUID) { 354 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex 355 GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED = TRUE { 356 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi 357 UI STRING="$(MODULE_NAME)" Optional 358 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) 359 } 360 } 361 362[Rule.Common.DXE_DRIVER] 363 FILE DRIVER = $(NAMED_GUID) { 364 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex 365 COMPRESS PI_STD { 366 GUIDED { 367 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi 368 UI STRING="$(MODULE_NAME)" Optional 369 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) 370 } 371 } 372 } 373 374[Rule.Common.DXE_RUNTIME_DRIVER] 375 FILE DRIVER = $(NAMED_GUID) { 376 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex 377 COMPRESS PI_STD { 378 GUIDED { 379 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi 380 UI STRING="$(MODULE_NAME)" Optional 381 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) 382 } 383 } 384 } 385 386[Rule.Common.UEFI_APPLICATION] 387 FILE APPLICATION = $(NAMED_GUID) { 388 COMPRESS PI_STD { 389 GUIDED { 390 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi 391 UI STRING="$(MODULE_NAME)" Optional 392 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) 393 } 394 } 395 } 396 397[Rule.Common.UEFI_APPLICATION.BINARY] 398 FILE APPLICATION = $(NAMED_GUID) { 399 COMPRESS PI_STD { 400 GUIDED { 401 PE32 PE32 |.efi 402 UI STRING="$(MODULE_NAME)" Optional 403 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) 404 } 405 } 406 } 407 408[Rule.Common.UEFI_DRIVER.BINARY] 409 FILE DRIVER = $(NAMED_GUID) { 410 DXE_DEPEX DXE_DEPEX Optional |.depex 411 COMPRESS PI_STD { 412 GUIDED { 413 PE32 PE32 |.efi 414 UI STRING="$(MODULE_NAME)" Optional 415 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER) 416 } 417 } 418 } 419