From nobody Sat May 4 12:53:17 2024 Delivered-To: importer@patchew.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Authentication-Results: mx.zoho.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org; Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1488516300398961.0639309410265; Thu, 2 Mar 2017 20:45:00 -0800 (PST) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 559B282210; Thu, 2 Mar 2017 20:44:58 -0800 (PST) Received: from mga02.intel.com (mga02.intel.com [134.134.136.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 090828220F for ; Thu, 2 Mar 2017 20:44:57 -0800 (PST) Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga101.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 02 Mar 2017 20:44:56 -0800 Received: from shwdeopenpsi114.ccr.corp.intel.com ([10.239.157.135]) by fmsmga001.fm.intel.com with ESMTP; 02 Mar 2017 20:44:55 -0800 X-Original-To: edk2-devel@lists.01.org X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.35,235,1484035200"; d="scan'208";a="1117864352" From: Dandan Bi To: edk2-devel@lists.01.org Date: Fri, 3 Mar 2017 12:44:45 +0800 Message-Id: <1488516286-44788-1-git-send-email-dandan.bi@intel.com> X-Mailer: git-send-email 1.9.5.msysgit.1 Subject: [edk2] [patch] MdeModulePkg: Add PROMPT&HELP string of pcd to UNI file X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Leo Duran , Brijesh Singh , Star Zeng , Ard Biesheuvel MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" Cc: Brijesh Singh Cc: Leo Duran Cc: Ard Biesheuvel Cc: Star Zeng Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Dandan Bi Reviewed-by: Star Zeng --- MdeModulePkg/MdeModulePkg.dec | 2 +- MdeModulePkg/MdeModulePkg.uni | 38 ++++++++++++++++++++++++++++++++++++++ 2 files changed, 39 insertions(+), 1 deletion(-) diff --git a/MdeModulePkg/MdeModulePkg.dec b/MdeModulePkg/MdeModulePkg.dec index 356b3e1..626e479 100644 --- a/MdeModulePkg/MdeModulePkg.dec +++ b/MdeModulePkg/MdeModulePkg.dec @@ -1737,11 +1737,11 @@ [PcdsFixedAtBuild, PcdsPatchableInModule, PcdsDynam= ic, PcdsDynamicEx] gEfiMdeModulePkgTokenSpaceGuid.PcdSystemFmpCapsuleImageTypeIdGuid|{0x0}|= VOID*|0x30001046 =20 ## This PCD holds the address mask for page table entries when memory en= cryption is # enabled on AMD processors supporting the Secure Encrypted Virtualizat= ion (SEV) feature. # This mask should be applied when creating 1:1 virtual to physical map= ping tables. - # + # @Prompt The address mask when memory encryption is enabled. gEfiMdeModulePkgTokenSpaceGuid.PcdPteMemoryEncryptionAddressOrMask|0x0|U= INT64|0x30001047 =20 [PcdsPatchableInModule] ## Specify memory size with page number for PEI code when # Loading Module at Fixed Address feature is enabled. diff --git a/MdeModulePkg/MdeModulePkg.uni b/MdeModulePkg/MdeModulePkg.uni index ff0d697..d6015de 100644 --- a/MdeModulePkg/MdeModulePkg.uni +++ b/MdeModulePkg/MdeModulePkg.uni @@ -1087,5 +1087,43 @@ = "The code section becomes read-only, and the data section b= ecomes non-executable.\n" = "If a bit is clear, the image will not be protected.
\n" = "BIT0 - Image from unknown device.
\n" = "BIT1 - Image from firmware volume.
" =20 +#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdDxeNxMemoryProtectionPolicy_= PROMPT #language en-US "Set DXE memory protection policy." + +#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdDxeNxMemoryProtectionPolicy_= HELP #language en-US "Set DXE memory protection policy. The policy is bitw= ise.\n" + = "If a bit is set, memory regions of the associated ty= pe will be mapped\n" + = "non-executable.

\n" + = "\n" + = "Below is bit mask for this PCD: (Order is same as UE= FI spec)
\n" + = "EfiReservedMemoryType 0x0001
\n" + = "EfiLoaderCode 0x0002
\n" + = "EfiLoaderData 0x0004
\n" + = "EfiBootServicesCode 0x0008
\n" + = "EfiBootServicesData 0x0010
\n" + = "EfiRuntimeServicesCode 0x0020
\n" + = "EfiRuntimeServicesData 0x0040
\n" + = "EfiConventionalMemory 0x0080
\n" + = "EfiUnusableMemory 0x0100
\n" + = "EfiACPIReclaimMemory 0x0200
\n" + = "EfiACPIMemoryNVS 0x0400
\n" + = "EfiMemoryMappedIO 0x0800
\n" + = "EfiMemoryMappedIOPortSpace 0x1000
\n" + = "EfiPalCode 0x2000
\n" + = "EfiPersistentMemory 0x4000
\n" + = "OEM Reserved 0x4000000000000000
\n" + = "OS Reserved 0x8000000000000000
\n" + = "\n" + = "NOTE: User must NOT set NX protection for EfiLoaderC= ode / EfiBootServicesCode / EfiRuntimeServicesCode.
\n" + = "User MUST set the same NX protection for EfiBootServ= icesData and EfiConventionalMemory.
\n" + = "\n" + = "e.g. 0x7FD5 can be used for all memory except Code. =
\n" + = "e.g. 0x7BD4 can be used for all memory except Code a= nd ACPINVS/Reserved.
\n" + = "" + +#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPteMemoryEncryptionAddressOr= Mask_PROMPT #language en-US "The address mask when memory encryption is en= abled." + +#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPteMemoryEncryptionAddressOr= Mask_HELP #language en-US "This PCD holds the address mask for page table = entries when memory encryption is\n" + = "enabled on AMD processors supporting the Secure= Encrypted Virtualization (SEV) feature.\n" + = "This mask should be applied when creating 1:1 v= irtual to physical mapping tables." + --=20 1.9.5.msysgit.1 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel