From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga02.intel.com (mga02.intel.com [134.134.136.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 090828220F for ; Thu, 2 Mar 2017 20:44:57 -0800 (PST) Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga101.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 02 Mar 2017 20:44:56 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.35,235,1484035200"; d="scan'208";a="1117864352" Received: from shwdeopenpsi114.ccr.corp.intel.com ([10.239.157.135]) by fmsmga001.fm.intel.com with ESMTP; 02 Mar 2017 20:44:55 -0800 From: Dandan Bi To: edk2-devel@lists.01.org Cc: Brijesh Singh , Leo Duran , Ard Biesheuvel , Star Zeng Date: Fri, 3 Mar 2017 12:44:45 +0800 Message-Id: <1488516286-44788-1-git-send-email-dandan.bi@intel.com> X-Mailer: git-send-email 1.9.5.msysgit.1 Subject: [patch] MdeModulePkg: Add PROMPT&HELP string of pcd to UNI file X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Mar 2017 04:44:57 -0000 Cc: Brijesh Singh Cc: Leo Duran Cc: Ard Biesheuvel Cc: Star Zeng Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Dandan Bi --- MdeModulePkg/MdeModulePkg.dec | 2 +- MdeModulePkg/MdeModulePkg.uni | 38 ++++++++++++++++++++++++++++++++++++++ 2 files changed, 39 insertions(+), 1 deletion(-) diff --git a/MdeModulePkg/MdeModulePkg.dec b/MdeModulePkg/MdeModulePkg.dec index 356b3e1..626e479 100644 --- a/MdeModulePkg/MdeModulePkg.dec +++ b/MdeModulePkg/MdeModulePkg.dec @@ -1737,11 +1737,11 @@ [PcdsFixedAtBuild, PcdsPatchableInModule, PcdsDynamic, PcdsDynamicEx] gEfiMdeModulePkgTokenSpaceGuid.PcdSystemFmpCapsuleImageTypeIdGuid|{0x0}|VOID*|0x30001046 ## This PCD holds the address mask for page table entries when memory encryption is # enabled on AMD processors supporting the Secure Encrypted Virtualization (SEV) feature. # This mask should be applied when creating 1:1 virtual to physical mapping tables. - # + # @Prompt The address mask when memory encryption is enabled. gEfiMdeModulePkgTokenSpaceGuid.PcdPteMemoryEncryptionAddressOrMask|0x0|UINT64|0x30001047 [PcdsPatchableInModule] ## Specify memory size with page number for PEI code when # Loading Module at Fixed Address feature is enabled. diff --git a/MdeModulePkg/MdeModulePkg.uni b/MdeModulePkg/MdeModulePkg.uni index ff0d697..d6015de 100644 --- a/MdeModulePkg/MdeModulePkg.uni +++ b/MdeModulePkg/MdeModulePkg.uni @@ -1087,5 +1087,43 @@ "The code section becomes read-only, and the data section becomes non-executable.\n" "If a bit is clear, the image will not be protected.

\n" "BIT0 - Image from unknown device.
\n" "BIT1 - Image from firmware volume.
" +#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdDxeNxMemoryProtectionPolicy_PROMPT #language en-US "Set DXE memory protection policy." + +#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdDxeNxMemoryProtectionPolicy_HELP #language en-US "Set DXE memory protection policy. The policy is bitwise.\n" + "If a bit is set, memory regions of the associated type will be mapped\n" + "non-executable.

\n" + "\n" + "Below is bit mask for this PCD: (Order is same as UEFI spec)
\n" + "EfiReservedMemoryType 0x0001
\n" + "EfiLoaderCode 0x0002
\n" + "EfiLoaderData 0x0004
\n" + "EfiBootServicesCode 0x0008
\n" + "EfiBootServicesData 0x0010
\n" + "EfiRuntimeServicesCode 0x0020
\n" + "EfiRuntimeServicesData 0x0040
\n" + "EfiConventionalMemory 0x0080
\n" + "EfiUnusableMemory 0x0100
\n" + "EfiACPIReclaimMemory 0x0200
\n" + "EfiACPIMemoryNVS 0x0400
\n" + "EfiMemoryMappedIO 0x0800
\n" + "EfiMemoryMappedIOPortSpace 0x1000
\n" + "EfiPalCode 0x2000
\n" + "EfiPersistentMemory 0x4000
\n" + "OEM Reserved 0x4000000000000000
\n" + "OS Reserved 0x8000000000000000
\n" + "\n" + "NOTE: User must NOT set NX protection for EfiLoaderCode / EfiBootServicesCode / EfiRuntimeServicesCode.
\n" + "User MUST set the same NX protection for EfiBootServicesData and EfiConventionalMemory.
\n" + "\n" + "e.g. 0x7FD5 can be used for all memory except Code.
\n" + "e.g. 0x7BD4 can be used for all memory except Code and ACPINVS/Reserved.
\n" + "" + +#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPteMemoryEncryptionAddressOrMask_PROMPT #language en-US "The address mask when memory encryption is enabled." + +#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPteMemoryEncryptionAddressOrMask_HELP #language en-US "This PCD holds the address mask for page table entries when memory encryption is\n" + "enabled on AMD processors supporting the Secure Encrypted Virtualization (SEV) feature.\n" + "This mask should be applied when creating 1:1 virtual to physical mapping tables." + -- 1.9.5.msysgit.1