From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Permerror (SPF Permanent Error: Two or more type TXT spf records found.) identity=mailfrom; client-ip=134.134.136.100; helo=mga07.intel.com; envelope-from=jian.j.wang@intel.com; receiver=edk2-devel@lists.01.org Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 3ADCD2110784D for ; Thu, 30 Aug 2018 18:22:26 -0700 (PDT) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 30 Aug 2018 18:22:25 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.53,309,1531810800"; d="scan'208";a="81733082" Received: from shwdeopenpsi777.ccr.corp.intel.com ([10.239.158.27]) by fmsmga002.fm.intel.com with ESMTP; 30 Aug 2018 18:22:08 -0700 From: Jian J Wang To: edk2-devel@lists.01.org Cc: Star Zeng , Eric Dong Date: Fri, 31 Aug 2018 09:22:06 +0800 Message-Id: <20180831012206.2356-1-jian.j.wang@intel.com> X-Mailer: git-send-email 2.16.2.windows.1 Subject: [PATCH] MdeModulePkg/MdeModulePkg.uni: update PCD string per dec file change X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Aug 2018 01:22:26 -0000 PcdNullPointerDetectionPropertyMask and PcdHeapGuardPropertyMask have been updated in dec file to reflect a new feature (non-stop mode). This patch updates corresponding unicode strings in uni file to match those changes. Cc: Star Zeng Cc: Eric Dong Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Jian J Wang --- MdeModulePkg/MdeModulePkg.uni | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/MdeModulePkg/MdeModulePkg.uni b/MdeModulePkg/MdeModulePkg.uni index 080b8a62c0..8807af801e 100644 --- a/MdeModulePkg/MdeModulePkg.uni +++ b/MdeModulePkg/MdeModulePkg.uni @@ -1146,7 +1146,8 @@ " If enabled, accessing NULL address in UEFI or SMM code can be caught.\n\n" " BIT0 - Enable NULL pointer detection for UEFI.\n" " BIT1 - Enable NULL pointer detection for SMM.\n" - " BIT2..6 - Reserved for future uses.\n" + " BIT2..5 - Reserved for future uses.\n" + " BIT6 - Enable non-stop mode.\n" " BIT7 - Disable NULL pointer detection just after EndOfDxe." " This is a workaround for those unsolvable NULL access issues in" " OptionROM, boot loader, etc. It can also help to avoid unnecessary" @@ -1225,6 +1226,7 @@ " BIT1 - Enable UEFI pool guard.
\n" " BIT2 - Enable SMM page guard.
\n" " BIT3 - Enable SMM pool guard.
\n" + " BIT6 - Enable non-stop mode.
\n" " BIT7 - The direction of Guard Page for Pool Guard.\n" " 0 - The returned pool is near the tail guard page.
\n" " 1 - The returned pool is near the head guard page.
" -- 2.16.2.windows.1