]> git.proxmox.com Git - mirror_edk2.git/blob - Nt32Pkg/Nt32Pkg.fdf
UefiCpuPkg: Remove double \r
[mirror_edk2.git] / Nt32Pkg / Nt32Pkg.fdf
1 ## @file
2 # This is NT32 FDF file with UEFI HII features enabled
3 #
4 # Copyright (c) 2007 - 2018, Intel Corporation. All rights reserved.<BR>
5 # (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
6 #
7 # SPDX-License-Identifier: BSD-2-Clause-Patent
8 #
9
10 ################################################################################
11 #
12 # FD Section
13 # The [FD] Section is made up of the definition statements and a
14 # description of what goes into the Flash Device Image. Each FD section
15 # defines one flash "device" image. A flash device image may be one of
16 # the following: Removable media bootable image (like a boot floppy
17 # image,) an Option ROM image (that would be "flashed" into an add-in
18 # card,) a System "Flash" image (that would be burned into a system's
19 # flash) or an Update ("Capsule") image that will be used to update and
20 # existing system flash.
21 #
22 ################################################################################
23 [FD.Nt32]
24 BaseAddress = 0x0|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFdBaseAddress #The base address of the FLASH Device.
25 Size = 0x00480000|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFirmwareFdSize #The size in bytes of the FLASH Device
26 ErasePolarity = 1
27 BlockSize = 0x10000
28 NumBlocks = 0x48
29
30 ################################################################################
31 #
32 # Following are lists of FD Region layout which correspond to the locations of different
33 # images within the flash device.
34 #
35 # Regions must be defined in ascending order and may not overlap.
36 #
37 # A Layout Region start with a eight digit hex offset (leading "0x" required) followed by
38 # the pipe "|" character, followed by the size of the region, also in hex with the leading
39 # "0x" characters. Like:
40 # Offset|Size
41 # PcdOffsetCName|PcdSizeCName
42 # RegionType <FV, DATA, or FILE>
43 #
44 ################################################################################
45 0x00000000|0x00460000
46 gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoveryBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashFvRecoverySize
47 FV = FvRecovery
48
49 0x00460000|0x0000c000
50 gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageVariableBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize
51 #NV_VARIABLE_STORE
52 DATA = {
53 ## This is the EFI_FIRMWARE_VOLUME_HEADER
54 # ZeroVector []
55 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
56 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
57 # FileSystemGuid: gEfiSystemNvDataFvGuid =
58 # { 0xFFF12B8D, 0x7696, 0x4C8B, { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }}
59 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C,
60 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50,
61 # FvLength: 0x20000
62 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00,
63 #Signature "_FVH" #Attributes
64 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00,
65 #HeaderLength #CheckSum #ExtHeaderOffset #Reserved #Revision
66 0x48, 0x00, 0x36, 0x09, 0x00, 0x00, 0x00, 0x02,
67 #Blockmap[0]: 2 Blocks * 0x10000 Bytes / Block
68 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00,
69 #Blockmap[1]: End
70 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
71 ## This is the VARIABLE_STORE_HEADER
72 !if $(SECURE_BOOT_ENABLE) == TRUE
73 #Signature: gEfiAuthenticatedVariableGuid =
74 # { 0xaaf32c78, 0x947b, 0x439a, { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }}
75 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43,
76 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92,
77 !else
78 #Signature: gEfiVariableGuid =
79 # { 0xddcf3616, 0x3275, 0x4164, { 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d }}
80 0x16, 0x36, 0xcf, 0xdd, 0x75, 0x32, 0x64, 0x41,
81 0x98, 0xb6, 0xfe, 0x85, 0x70, 0x7f, 0xfe, 0x7d,
82 !endif
83 #Size: 0xc000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize) - 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) = 0xBFB8
84 # This can speed up the Variable Dispatch a bit.
85 0xB8, 0xBF, 0x00, 0x00,
86 #FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32
87 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
88 }
89
90 0x0046c000|0x00002000
91 #NV_EVENT_LOG
92 gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogBase|gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageEventLogSize
93
94 0x0046e000|0x00002000
95 gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwWorkingBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize
96 #NV_FTW_WORKING
97 DATA = {
98 # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature = gEdkiiWorkingBlockSignatureGuid =
99 # { 0x9e58292b, 0x7c68, 0x497d, { 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95 }}
100 0x2b, 0x29, 0x58, 0x9e, 0x68, 0x7c, 0x7d, 0x49,
101 0xa0, 0xce, 0x65, 0x0, 0xfd, 0x9f, 0x1b, 0x95,
102 # Crc:UINT32 #WorkingBlockValid:1, WorkingBlockInvalid:1, Reserved
103 0xE2, 0x33, 0xF2, 0x03, 0xFE, 0xFF, 0xFF, 0xFF,
104 # WriteQueueSize: UINT64
105 0xE0, 0x1F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
106 }
107
108 0x00470000|0x00010000
109 #NV_FTW_SPARE
110 gEfiNt32PkgTokenSpaceGuid.PcdWinNtFlashNvStorageFtwSpareBase|gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize
111
112 ################################################################################
113 #
114 # FV Section
115 #
116 # [FV] section is used to define what components or modules are placed within a flash
117 # device file. This section also defines order the components and modules are positioned
118 # within the image. The [FV] section consists of define statements, set statements and
119 # module statements.
120 #
121 ################################################################################
122 [FV.FvRecovery]
123 FvAlignment = 16 #FV alignment and FV attributes setting.
124 ERASE_POLARITY = 1
125 MEMORY_MAPPED = TRUE
126 STICKY_WRITE = TRUE
127 LOCK_CAP = TRUE
128 LOCK_STATUS = TRUE
129 WRITE_DISABLED_CAP = TRUE
130 WRITE_ENABLED_CAP = TRUE
131 WRITE_STATUS = TRUE
132 WRITE_LOCK_CAP = TRUE
133 WRITE_LOCK_STATUS = TRUE
134 READ_DISABLED_CAP = TRUE
135 READ_ENABLED_CAP = TRUE
136 READ_STATUS = TRUE
137 READ_LOCK_CAP = TRUE
138 READ_LOCK_STATUS = TRUE
139 FvNameGuid = 6D99E806-3D38-42c2-A095-5F4300BFD7DC
140
141 ################################################################################
142 #
143 # The INF statements point to EDK component and EDK II module INF files, which will be placed into this FV image.
144 # Parsing tools will scan the INF file to determine the type of component or module.
145 # The component or module type is used to reference the standard rules
146 # defined elsewhere in the FDF file.
147 #
148 # The format for INF statements is:
149 # INF $(PathAndInfFileName)
150 #
151 ################################################################################
152 ##
153 # PEI Phase modules
154 ##
155 ##
156 # PEI Apriori file example, more PEIM module added later.
157 ##
158 APRIORI PEI {
159 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
160 INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf
161 INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf
162 INF Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf
163 }
164 APRIORI DXE {
165 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
166 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
167 INF Nt32Pkg/MetronomeDxe/MetronomeDxe.inf
168 INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf
169 INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf
170 INF Nt32Pkg/WinNtOemHookStatusCodeHandlerDxe/WinNtOemHookStatusCodeHandlerDxe.inf
171 }
172
173 INF MdeModulePkg/Core/Pei/PeiMain.inf
174 INF MdeModulePkg/Universal/PCD/Pei/Pcd.inf
175 INF MdeModulePkg/Universal/ReportStatusCodeRouter/Pei/ReportStatusCodeRouterPei.inf
176 INF MdeModulePkg/Universal/StatusCodeHandler/Pei/StatusCodeHandlerPei.inf
177 INF Nt32Pkg/WinNtOemHookStatusCodeHandlerPei/WinNtOemHookStatusCodeHandlerPei.inf
178 INF Nt32Pkg/BootModePei/BootModePei.inf
179 INF Nt32Pkg/StallPei/StallPei.inf
180 INF Nt32Pkg/WinNtFlashMapPei/WinNtFlashMapPei.inf
181 INF Nt32Pkg/WinNtAutoScanPei/WinNtAutoScanPei.inf
182 INF Nt32Pkg/WinNtFirmwareVolumePei/WinNtFirmwareVolumePei.inf
183
184 INF MdeModulePkg/Universal/FaultTolerantWritePei/FaultTolerantWritePei.inf
185 INF MdeModulePkg/Universal/Variable/Pei/VariablePei.inf
186
187 INF Nt32Pkg/WinNtThunkPPIToProtocolPei/WinNtThunkPPIToProtocolPei.inf
188 INF MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf
189
190 ##
191 # DXE Phase modules
192 ##
193 INF MdeModulePkg/Core/Dxe/DxeMain.inf
194 INF MdeModulePkg/Universal/PCD/Dxe/Pcd.inf
195 INF Nt32Pkg/MetronomeDxe/MetronomeDxe.inf
196 INF Nt32Pkg/RealTimeClockRuntimeDxe/RealTimeClockRuntimeDxe.inf
197 INF MdeModulePkg/Universal/ResetSystemRuntimeDxe/ResetSystemRuntimeDxe.inf
198 INF MdeModulePkg/Core/RuntimeDxe/RuntimeDxe.inf
199 INF Nt32Pkg/FvbServicesRuntimeDxe/FvbServicesRuntimeDxe.inf
200 INF MdeModulePkg/Universal/SecurityStubDxe/SecurityStubDxe.inf
201 INF MdeModulePkg/Universal/SmbiosDxe/SmbiosDxe.inf
202 INF MdeModulePkg/Universal/EbcDxe/EbcDxe.inf
203 INF MdeModulePkg/Universal/MemoryTest/NullMemoryTestDxe/NullMemoryTestDxe.inf
204 INF MdeModulePkg/Universal/HiiDatabaseDxe/HiiDatabaseDxe.inf
205 INF Nt32Pkg/WinNtThunkDxe/WinNtThunkDxe.inf
206 INF Nt32Pkg/CpuRuntimeDxe/CpuRuntimeDxe.inf
207 INF MdeModulePkg/Universal/BdsDxe/BdsDxe.inf
208 INF MdeModulePkg/Application/UiApp/UiApp.inf
209 INF MdeModulePkg/Universal/DriverHealthManagerDxe/DriverHealthManagerDxe.inf
210 INF MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.inf
211 INF Nt32Pkg/MiscSubClassPlatformDxe/MiscSubClassPlatformDxe.inf
212 INF Nt32Pkg/TimerDxe/TimerDxe.inf
213 INF MdeModulePkg/Universal/ReportStatusCodeRouter/RuntimeDxe/ReportStatusCodeRouterRuntimeDxe.inf
214 INF MdeModulePkg/Universal/StatusCodeHandler/RuntimeDxe/StatusCodeHandlerRuntimeDxe.inf
215 INF Nt32Pkg/WinNtOemHookStatusCodeHandlerDxe/WinNtOemHookStatusCodeHandlerDxe.inf
216 INF MdeModulePkg/Universal/Variable/RuntimeDxe/VariableRuntimeDxe.inf
217 !if $(SECURE_BOOT_ENABLE) == TRUE
218 INF SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf
219 !endif
220 INF MdeModulePkg/Universal/WatchdogTimerDxe/WatchdogTimer.inf
221 INF MdeModulePkg/Universal/MonotonicCounterRuntimeDxe/MonotonicCounterRuntimeDxe.inf
222 INF MdeModulePkg/Universal/CapsuleRuntimeDxe/CapsuleRuntimeDxe.inf
223 INF MdeModulePkg/Universal/Console/ConPlatformDxe/ConPlatformDxe.inf
224 INF MdeModulePkg/Universal/Console/ConSplitterDxe/ConSplitterDxe.inf
225 INF MdeModulePkg/Universal/Console/GraphicsConsoleDxe/GraphicsConsoleDxe.inf
226 INF MdeModulePkg/Universal/Console/TerminalDxe/TerminalDxe.inf
227 INF MdeModulePkg/Universal/DevicePathDxe/DevicePathDxe.inf
228 INF MdeModulePkg/Universal/Disk/DiskIoDxe/DiskIoDxe.inf
229 INF MdeModulePkg/Universal/Disk/PartitionDxe/PartitionDxe.inf
230 INF MdeModulePkg/Universal/DisplayEngineDxe/DisplayEngineDxe.inf
231 INF MdeModulePkg/Universal/SetupBrowserDxe/SetupBrowserDxe.inf
232 INF MdeModulePkg/Universal/PrintDxe/PrintDxe.inf
233 INF RuleOverride = TIANOCOMPRESSED MdeModulePkg/Universal/Disk/UnicodeCollation/EnglishDxe/EnglishDxe.inf
234 INF MdeModulePkg/Bus/Pci/PciBusDxe/PciBusDxe.inf
235 INF MdeModulePkg/Bus/Scsi/ScsiBusDxe/ScsiBusDxe.inf
236 INF MdeModulePkg/Bus/Scsi/ScsiDiskDxe/ScsiDiskDxe.inf
237 INF IntelFrameworkModulePkg/Bus/Pci/IdeBusDxe/IdeBusDxe.inf
238 INF Nt32Pkg/WinNtBusDriverDxe/WinNtBusDriverDxe.inf
239 INF Nt32Pkg/WinNtBlockIoDxe/WinNtBlockIoDxe.inf
240 INF Nt32Pkg/WinNtSerialIoDxe/WinNtSerialIoDxe.inf
241 INF Nt32Pkg/WinNtGopDxe/WinNtGopDxe.inf
242 INF Nt32Pkg/WinNtSimpleFileSystemDxe/WinNtSimpleFileSystemDxe.inf
243 INF MdeModulePkg/Universal/PlatformDriOverrideDxe/PlatformDriOverrideDxe.inf
244 INF MdeModulePkg/Universal/DriverSampleDxe/DriverSampleDxe.inf
245
246 INF Nt32Pkg/SnpNt32Dxe/SnpNt32Dxe.inf
247 !include NetworkPkg/Network.fdf.inc
248
249 INF MdeModulePkg/Application/BootManagerMenuApp/BootManagerMenuApp.inf
250 ################################################################################
251 #
252 # FILE statements are provided so that a platform integrator can include
253 # complete EFI FFS files, as well as a method for constructing FFS files
254 # using curly "{}" brace scoping. The following three FILEs are
255 # for binary shell, binary fat and logo module.
256 #
257 ################################################################################
258 INF ShellPkg/Application/Shell/Shell.inf
259
260 INF FatPkg/EnhancedFatDxe/Fat.inf
261 INF MdeModulePkg/Universal/Disk/UdfDxe/UdfDxe.inf
262
263 INF MdeModulePkg/Logo/LogoDxe.inf
264 INF MdeModulePkg/Universal/LoadFileOnFv2/LoadFileOnFv2.inf
265 ################################################################################
266 #
267 # Rules are use with the [FV] section's module INF type to define
268 # how an FFS file is created for a given INF file. The following Rule are the default
269 # rules for the different module type. User can add the customized rules to define the
270 # content of the FFS file.
271 #
272 ################################################################################
273
274
275 ############################################################################
276 # Example of a DXE_DRIVER FFS file with a Checksum encapsulation section #
277 ############################################################################
278 #
279 #[Rule.Common.DXE_DRIVER]
280 # FILE DRIVER = $(NAMED_GUID) {
281 # DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
282 # COMPRESS PI_STD {
283 # GUIDED {
284 # PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
285 # UI STRING="$(MODULE_NAME)" Optional
286 # VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
287 # }
288 # }
289 # }
290 #
291 ############################################################################
292
293 [Rule.Common.PEI_CORE]
294 FILE PEI_CORE = $(NAMED_GUID) {
295 PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi
296 UI STRING ="$(MODULE_NAME)" Optional
297 VERSION STRING ="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
298 }
299
300 [Rule.Common.PEIM]
301 FILE PEIM = $(NAMED_GUID) {
302 PEI_DEPEX PEI_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
303 PE32 PE32 Align=4K $(INF_OUTPUT)/$(MODULE_NAME).efi
304 UI STRING="$(MODULE_NAME)" Optional
305 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
306 }
307
308 [Rule.Common.DXE_CORE]
309 FILE DXE_CORE = $(NAMED_GUID) {
310 COMPRESS PI_STD {
311 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
312 UI STRING="$(MODULE_NAME)" Optional
313 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
314 }
315 }
316
317 [Rule.Common.UEFI_DRIVER]
318 FILE DRIVER = $(NAMED_GUID) {
319 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
320 COMPRESS PI_STD {
321 GUIDED {
322 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
323 UI STRING="$(MODULE_NAME)" Optional
324 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
325 }
326 }
327 }
328
329 [Rule.Common.UEFI_DRIVER.TIANOCOMPRESSED]
330 FILE DRIVER = $(NAMED_GUID) {
331 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
332 GUIDED A31280AD-481E-41B6-95E8-127F4C984779 PROCESSING_REQUIRED = TRUE {
333 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
334 UI STRING="$(MODULE_NAME)" Optional
335 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
336 }
337 }
338
339 [Rule.Common.DXE_DRIVER]
340 FILE DRIVER = $(NAMED_GUID) {
341 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
342 COMPRESS PI_STD {
343 GUIDED {
344 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
345 UI STRING="$(MODULE_NAME)" Optional
346 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
347 }
348 }
349 }
350
351 [Rule.Common.DXE_RUNTIME_DRIVER]
352 FILE DRIVER = $(NAMED_GUID) {
353 DXE_DEPEX DXE_DEPEX Optional $(INF_OUTPUT)/$(MODULE_NAME).depex
354 COMPRESS PI_STD {
355 GUIDED {
356 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
357 UI STRING="$(MODULE_NAME)" Optional
358 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
359 }
360 }
361 }
362
363 [Rule.Common.UEFI_APPLICATION]
364 FILE APPLICATION = $(NAMED_GUID) {
365 COMPRESS PI_STD {
366 GUIDED {
367 PE32 PE32 $(INF_OUTPUT)/$(MODULE_NAME).efi
368 UI STRING="$(MODULE_NAME)" Optional
369 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
370 }
371 }
372 }
373
374 [Rule.Common.UEFI_APPLICATION.BINARY]
375 FILE APPLICATION = $(NAMED_GUID) {
376 COMPRESS PI_STD {
377 GUIDED {
378 PE32 PE32 |.efi
379 UI STRING="$(MODULE_NAME)" Optional
380 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
381 }
382 }
383 }
384
385 [Rule.Common.UEFI_DRIVER.BINARY]
386 FILE DRIVER = $(NAMED_GUID) {
387 DXE_DEPEX DXE_DEPEX Optional |.depex
388 COMPRESS PI_STD {
389 GUIDED {
390 PE32 PE32 |.efi
391 UI STRING="$(MODULE_NAME)" Optional
392 VERSION STRING="$(INF_VERSION)" Optional BUILD_NUM=$(BUILD_NUMBER)
393 }
394 }
395 }