From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id E1ACA80345 for ; Mon, 6 Mar 2017 18:09:19 -0800 (PST) Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga105.jf.intel.com with ESMTP; 06 Mar 2017 18:09:19 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.35,256,1484035200"; d="scan'208";a="1119295401" Received: from fmsmsx105.amr.corp.intel.com ([10.18.124.203]) by fmsmga001.fm.intel.com with ESMTP; 06 Mar 2017 18:09:19 -0800 Received: from fmsmsx114.amr.corp.intel.com (10.18.116.8) by FMSMSX105.amr.corp.intel.com (10.18.124.203) with Microsoft SMTP Server (TLS) id 14.3.248.2; Mon, 6 Mar 2017 18:09:19 -0800 Received: from shsmsx152.ccr.corp.intel.com (10.239.6.52) by FMSMSX114.amr.corp.intel.com (10.18.116.8) with Microsoft SMTP Server (TLS) id 14.3.248.2; Mon, 6 Mar 2017 18:09:18 -0800 Received: from shsmsx102.ccr.corp.intel.com ([169.254.2.88]) by SHSMSX152.ccr.corp.intel.com ([169.254.6.132]) with mapi id 14.03.0248.002; Tue, 7 Mar 2017 10:09:16 +0800 From: "Zeng, Star" To: "Bi, Dandan" , "edk2-devel@lists.01.org" CC: Brijesh Singh , Leo Duran , "Ard Biesheuvel" , "Zeng, Star" Thread-Topic: [patch] MdeModulePkg: Add PROMPT&HELP string of pcd to UNI file Thread-Index: AQHSk9jwDvopCm3IR0qYspZOqhby2KGIp92A Date: Tue, 7 Mar 2017 02:09:16 +0000 Message-ID: <0C09AFA07DD0434D9E2A0C6AEB0483103B82F503@shsmsx102.ccr.corp.intel.com> References: <1488516286-44788-1-git-send-email-dandan.bi@intel.com> In-Reply-To: <1488516286-44788-1-git-send-email-dandan.bi@intel.com> Accept-Language: zh-CN, en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.239.127.40] MIME-Version: 1.0 Subject: Re: [patch] MdeModulePkg: Add PROMPT&HELP string of pcd to UNI file X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Mar 2017 02:09:20 -0000 Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Reviewed-by: Star Zeng -----Original Message----- From: Bi, Dandan=20 Sent: Friday, March 3, 2017 12:45 PM To: edk2-devel@lists.01.org Cc: Brijesh Singh ; Leo Duran ; A= rd Biesheuvel ; Zeng, Star Subject: [patch] MdeModulePkg: Add PROMPT&HELP string of pcd to UNI file Cc: Brijesh Singh Cc: Leo Duran Cc: Ard Biesheuvel Cc: Star Zeng Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Dandan Bi --- MdeModulePkg/MdeModulePkg.dec | 2 +- MdeModulePkg/MdeModulePkg.uni | 38 ++++++++++++++++++++++++++++++++++++++ 2 files changed, 39 insertions(+), 1 deletion(-) diff --git a/MdeModulePkg/MdeModulePkg.dec b/MdeModulePkg/MdeModulePkg.dec = index 356b3e1..626e479 100644 --- a/MdeModulePkg/MdeModulePkg.dec +++ b/MdeModulePkg/MdeModulePkg.dec @@ -1737,11 +1737,11 @@ [PcdsFixedAtBuild, PcdsPatchableInModule, PcdsDynam= ic, PcdsDynamicEx] gEfiMdeModulePkgTokenSpaceGuid.PcdSystemFmpCapsuleImageTypeIdGuid|{0x0}|= VOID*|0x30001046 =20 ## This PCD holds the address mask for page table entries when memory en= cryption is # enabled on AMD processors supporting the Secure Encrypted Virtualizat= ion (SEV) feature. # This mask should be applied when creating 1:1 virtual to physical map= ping tables. - # + # @Prompt The address mask when memory encryption is enabled. gEfiMdeModulePkgTokenSpaceGuid.PcdPteMemoryEncryptionAddressOrMask|0x0|U= INT64|0x30001047 =20 [PcdsPatchableInModule] ## Specify memory size with page number for PEI code when # Loading Module at Fixed Address feature is enabled. diff --git a/MdeModulePkg/MdeModulePkg.uni b/MdeModulePkg/MdeModulePkg.uni = index ff0d697..d6015de 100644 --- a/MdeModulePkg/MdeModulePkg.uni +++ b/MdeModulePkg/MdeModulePkg.uni @@ -1087,5 +1087,43 @@ = "The code section becomes read-only, and the data section b= ecomes non-executable.\n" = "If a bit is clear, the image will not be protected.
\n" = "BIT0 - Image from unknown device.
\n" = "BIT1 - Image from firmware volume.
" =20 +#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdDxeNxMemoryProtectionPolicy_= PROMPT #language en-US "Set DXE memory protection policy." + +#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdDxeNxMemoryProtectionPolicy_= HELP #language en-US "Set DXE memory protection policy. The policy is bitw= ise.\n" + = "If a bit is set, memory regions of the associated ty= pe will be mapped\n" + = "non-executable.

\n" + = "\n" + = "Below is bit mask for this PCD: (Order is same as UE= FI spec)
\n" + = "EfiReservedMemoryType 0x0001
\n" + = "EfiLoaderCode 0x0002
\n" + = "EfiLoaderData 0x0004
\n" + = "EfiBootServicesCode 0x0008
\n" + = "EfiBootServicesData 0x0010
\n" + = "EfiRuntimeServicesCode 0x0020
\n" + = "EfiRuntimeServicesData 0x0040
\n" + = "EfiConventionalMemory 0x0080
\n" + = "EfiUnusableMemory 0x0100
\n" + = "EfiACPIReclaimMemory 0x0200
\n" + = "EfiACPIMemoryNVS 0x0400
\n" + = "EfiMemoryMappedIO 0x0800
\n" + = "EfiMemoryMappedIOPortSpace 0x1000
\n" + = "EfiPalCode 0x2000
\n" + = "EfiPersistentMemory 0x4000
\n" + = "OEM Reserved 0x4000000000000000
\n" + = "OS Reserved 0x8000000000000000
\n" + = "\n" + = "NOTE: User must NOT set NX protection for EfiLoaderC= ode / EfiBootServicesCode / EfiRuntimeServicesCode.
\n" + = "User MUST set the same NX protection for EfiBootServ= icesData and EfiConventionalMemory.
\n" + = "\n" + = "e.g. 0x7FD5 can be used for all memory except Code. =
\n" + = "e.g. 0x7BD4 can be used for all memory except Code a= nd ACPINVS/Reserved.
\n" + = "" + +#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPteMemoryEncryptionAddressOr= Mask_PROMPT #language en-US "The address mask when memory encryption is en= abled." + +#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPteMemoryEncryptionAddressOr= Mask_HELP #language en-US "This PCD holds the address mask for page table = entries when memory encryption is\n" + = "enabled on AMD processors supporting the Secure= Encrypted Virtualization (SEV) feature.\n" + = "This mask should be applied when creating 1:1 v= irtual to physical mapping tables." + -- 1.9.5.msysgit.1