From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by mx.groups.io with SMTP id smtpd.web10.602.1646686379522348919 for ; Mon, 07 Mar 2022 12:53:00 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=AUDIpSZw; spf=pass (domain: intel.com, ip: 134.134.136.65, mailfrom: guo.dong@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1646686379; x=1678222379; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=MTEYV0PCtFAcSMPjsFcadjdx+mWTvLJGZDUn67vcI68=; b=AUDIpSZw5bVjlx3FEd8ic0cUpQqshuW6gF1toGnMk8jDpRpBcx8gPqfY bUCW6NUF0vZ4Nm22Jm6lmhGwCSDe9vpdsUPNXcJN/M+DwkZcP/ELqxMOB nTXXT4KmXS9y3mo7soG+WU3GksgEjwqzzM0iI0vmbL3a8whctvdaikqdj Ukx4rqtkuB6rvkxCtSiEgwGAqTnU1yJ8brPMz/5NAlBiyv6rtd9ZUoQ5M sR6p7bT6gwfqzacWrgS19d+4G7ckW3gJ0l46kU+9Ow5WLgXloPTUYVmks eFFT1kBSFvDnKaEQ83imLrtQ7llJQ/USdFoIKrOSZkPtdxarlV+S0gnP5 w==; X-IronPort-AV: E=McAfee;i="6200,9189,10279"; a="254441834" X-IronPort-AV: E=Sophos;i="5.90,163,1643702400"; d="scan'208";a="254441834" Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Mar 2022 12:52:58 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.90,163,1643702400"; d="scan'208";a="595639717" Received: from orsmsx606.amr.corp.intel.com ([10.22.229.19]) by fmsmga008.fm.intel.com with ESMTP; 07 Mar 2022 12:52:57 -0800 Received: from orsmsx602.amr.corp.intel.com (10.22.229.15) by ORSMSX606.amr.corp.intel.com (10.22.229.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21; Mon, 7 Mar 2022 12:52:57 -0800 Received: from orsedg603.ED.cps.intel.com (10.7.248.4) by orsmsx602.amr.corp.intel.com (10.22.229.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21 via Frontend Transport; Mon, 7 Mar 2022 12:52:57 -0800 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.171) by edgegateway.intel.com (134.134.137.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.21; Mon, 7 Mar 2022 12:52:56 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gZ6IaY7GGn4i++qcg07ktVyOcRrHES0qAEsdU/VEttplgbDlJ2vYLm51fqcjfCbTbLHd1gNkFE05KKcrLdDgvnocUV7vMoZwiqW2/OkkFjJWNkwpEJ+R0coGl0a9kC/1J0wyMcsFPXyb/VKWYAVDRHySeaEga9P7G4a+gSHiwm6IKinNwe3uJv7HcrSjN9dDtLfCVP5Y7mJXI+nOyGD471FofYVjrtdcUdeT/3MEQ+fkAgQEOg7JdW2piIuDygdFiGZC6SkKaSFLYhFVHaPyUA6zli3NmrptcVQB2/Xwv7u+bG5abYxnHq/86dwGUNzJjQn5jVmzRVR6noMoYIuv6g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Y0FyBNKTH9AVpcv20re00WTEQ4wrAkaFSav09fup2hk=; b=JT7qhsRUQEcyzApsd025ZjIY6Edgbx9fWu1JecjK7IJ7NV+cKQl7KDE6GBh3MChw2vCfrlmy7Rv9zEUzdlu3M8qLg4LNW5yZo9BIrcobv5kr4ZyChHOXCH7znhESbrhXuZqHxz6zogzJs9dfiSU6jPMukeAT4rnFOC58dMvw7NAkd4aV6PwS7CTyx7ZQFmS17+731OHNdiziCJC6oXprWXze+Uat2Om2aDdPknyzDFGCZgXQ0yb5HuZx+3LGI5164cEo96zJuNVNVL1q3Dz4QPZjNsbZfglUAiMUFVUzGvGko29IdgwLjvYFUkJI+fu5t/7LM8gghIjgTZ3FyFWa2A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from BYAPR11MB3622.namprd11.prod.outlook.com (2603:10b6:a03:fe::30) by MW3PR11MB4764.namprd11.prod.outlook.com (2603:10b6:303:5a::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar 2022 20:52:54 +0000 Received: from BYAPR11MB3622.namprd11.prod.outlook.com ([fe80::45c8:c9c6:42a:a43d]) by BYAPR11MB3622.namprd11.prod.outlook.com ([fe80::45c8:c9c6:42a:a43d%4]) with mapi id 15.20.5038.027; Mon, 7 Mar 2022 20:52:54 +0000 From: "Guo Dong" To: "devel@edk2.groups.io" , "Dong, Guo" , "Rhodes, Sean" CC: "Ni, Ray" , "Ma, Maurice" , "You, Benjamin" Subject: Re: [edk2-devel] [PATCH] UefiPayloadPkg: Make Boot Manager Key configurable Thread-Topic: [edk2-devel] [PATCH] UefiPayloadPkg: Make Boot Manager Key configurable Thread-Index: AQHYMHn2NKCV0A9eIUCCokyr9944oay0YWwwgAAICoA= Date: Mon, 7 Mar 2022 20:52:54 +0000 Message-ID: References: <761adf234fa5ca4fd3e6b3abc608927df1372251.1646475274.git.sean@starlabs.systems> <16DA32EF7E183AB0.24026@groups.io> In-Reply-To: <16DA32EF7E183AB0.24026@groups.io> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-reaction: no-action dlp-version: 11.6.401.20 authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 0db54bd4-4cc8-4f1c-d990-08da007c73c5 x-ms-traffictypediagnostic: MW3PR11MB4764:EE_ x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr x-microsoft-antispam-prvs: x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: vDu7Hlr0JkHsJYrhQuLsD7E2CwBcMvugv83bOd8SEZlrUzVf9emHqRt3xVaVKp1bVLjC1c4vXzqj9IxsOzM45eSd8XxMQ9/5ROZm7mD4NGEssqgVVxAMKNRmVpEZ/9LG/p7pt+v9YI7BvVCxbJUXne1WGRPn33uGTNiO4KoDLe7nrVbzQfBlMVwbWd0gYXcS3yUleBj2uCLFEz+i7Zbp1zkjFKfXP6u8DwTeZgl3eI8cTIrV/+rI2EGz4gBxTZoPCwpDuCpE6Xze0PLVz5UlqpgQ4isIbPTYBhbJdgvTlpcOamzs9FMpAZnj50URa0EiPEwah8qy4r6mTye/ZRh2TGjfyhcOB+e6m04wQKFBmunsj/onl+P+/+mZA2cQvmGDZD0iH/iSHnRSV7UJG/jw3WcP+CL/JsqHVOU9XByXTrg5dyMqCOFB7gU9BpTgOsNa4YDrjlxbzmJUKIhBOnFG7L8RRHKyYXfBKzcJr24s+NizJupHdk/drD2JyFx4XPUQx8B1zERve8KA4yYWz/PLCBt3S5UB93a5kEWkmiK/14TgL2s5oGNq5Q3ZQETzJuxgD2OtmgEnktgGIly1V99yFjP1LwZpehdUGrbUGipoz5OMtmAwsxP+wiNkK3zZsC0YAeW/dgG0CmosOsC8bUnXgKpt+sQiEu5YIE5VKuHb4cgyjvsOTD16xoe2jJLH3g3BOWT32PkBYNN8BgArdzCjpk7wupQqpAARizMcqrIkNhz19zE12lFZoMfcshJMujNkXeb/QrudTV7k4owuvgA8inIDl5/5mXfhwYno7YGH+NycaP8mV+ckcyrp8/QoUW7PBc0xRQ+9MVVUZeh2pBs15A== x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR11MB3622.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66476007)(66446008)(8676002)(66946007)(38100700002)(2906002)(53546011)(66556008)(82960400001)(64756008)(76116006)(4326008)(122000001)(71200400001)(54906003)(52536014)(110136005)(55016003)(38070700005)(8936002)(5660300002)(86362001)(316002)(508600001)(7696005)(6506007)(966005)(33656002)(186003)(83380400001)(9686003)(107886003);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?jJGlmIIJnqqJ/AIykuuObL+GJGpWQVrOCmUaG22z2KIq4X+G+mVT63LiySaM?= =?us-ascii?Q?lxUVwc/FeZrq6inKAX4JZeXHmQfizllN9ESQIV92JBvcdJNieSE4zydUV6Qh?= =?us-ascii?Q?0Ln7QMrksrnayx8n6IF4EncHRe+wBxfCSmQk9MfmtqVdd5fS7bX+9p+5vKxL?= =?us-ascii?Q?AwwwSh45O8voLIp3zus/Fajn6FadDOgHsc1OIAB0doSDUy3V7W8RRk8Uxuai?= =?us-ascii?Q?Gr4O77kls9/J4I8pLBFIcO9NAZfQn5S7T1HNtiDBXIJE76NyO4pkqTLTqXBQ?= =?us-ascii?Q?yXHxlKtDmCsZ2tL0c2MLmUNZNwSXgU5noH81UnNn4zlUaUiJ0jJ7oGAMgaWF?= =?us-ascii?Q?ro8rsV6c1+wdOTygsiD2ucTDcNn4Epc7BIFXe5Xwb8HeNVP+f6zHpMATFWOd?= =?us-ascii?Q?D/AfBatnPjXWxEoTR1wo2cy28I0dQglon/a1lf3vzhYerijRPdWxQmcFDZlZ?= =?us-ascii?Q?imvP6e8dWpuBwqG5jJx14+FuGEur9gWDcOLrLCqakI7z+0/Qm+AhjZ7Mua9d?= =?us-ascii?Q?d0Y/Qi98pkQHuoVHkk1mJ6ekwNNO9t9qXx9a4R4sUIJXsMhVrcnIHZe6UrIG?= =?us-ascii?Q?s+m2kMIa5ijK6sOy+bx6chlvAEpvcVJyEl+v5cwuEkX3zi+vN0jGrS27/Szm?= =?us-ascii?Q?OASgfCW0MaZCp6yOyJTtM2zBut/kdYPJ3/MLQSil+p/Ms7AgC4dEx8POXi9U?= =?us-ascii?Q?yuUMFhBB/l30XOB5DgVXj976Q1x6ljRPAmyLeI88KhrtTLuqEYby6W/mxtwk?= =?us-ascii?Q?pSyHh5Fj54gCk/IMAI8mr5dEc0kRZiQE5rTzSvUa+Yp1zI28c9Ff1nyvzSP5?= =?us-ascii?Q?OtT2gs9zfXvcelslkAvt+GpTolweAlaIymct3x0xk+xUp2RLp/b5avJuJFin?= =?us-ascii?Q?uHWEU4cN3emYI0c7ccxxiKBWzm9oW7Ccjcmsadi7Wfb9nbLG1KK276y1sLFE?= =?us-ascii?Q?NUj50+zc5JjKBNY9Ku8wXuDi+kCp1gi8jvQJSs68UZl3XsT6RaSJPC1u85kA?= =?us-ascii?Q?l3oDXTkbA8QrDnJ83eLcGgVk9AXKIZosE3FDVA3Rr5p9WIBaQr0ytoVjgoSs?= =?us-ascii?Q?iPnL0GhrYpl9tszxOc9a4p/xW+Z9cEwQy/Rc4xeJXoDZmGsgkteZLfxBXaH0?= =?us-ascii?Q?nMKsI7b/+tEdK9VQrcEkJUzUYX+59hIn2jAE12822IiWR1Zjh6YwQn7vP0oT?= =?us-ascii?Q?5wcoG9ezzGYfEuKSZyaINKXWGHX27U+Ay+a81UIXscM9R3lXxRxBJcR3ZzWA?= =?us-ascii?Q?dJ8XzabapYDDmEY5R18+cRUk78KOiK2vGmr0Gv3mf8X0xaSBjMYxnyxUnMvV?= =?us-ascii?Q?PIo6Qh6/RwSlFwPrbS+fvCfe6WWDpdW3HI2nMDvAKebA4yXsmlLi2hfoG7rP?= =?us-ascii?Q?1yaCg92IakWSwhs+XP8T2Vl2la8EBBDDMbGeSyo/JphUmSfuA8q9ISh/kFUE?= =?us-ascii?Q?ngUsaQ1yKtPdYZ22pg8ksUlQ5mZEJo0Rt4I783KWJtzh7ikRVfcnp/40a/+D?= =?us-ascii?Q?SN1PQ2M2RJjJBXjJxtvcILtFALm5OoTjR851OuoNjGyZhnLTfCycVhuNHgeq?= =?us-ascii?Q?RCqCd6bFIZG8RPST/Niu94dHgnUVK40wtIrlu1apuYVqM26LCif95tzaxuSo?= =?us-ascii?Q?IoqkMlahEK1F8sqmEdRIXFGwlY5Xq4A62CTrZaGJEULkhQUM7b3JZX61t7NQ?= =?us-ascii?Q?qhQoAoka6J30HgXiSIQeWeGt2vo=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB3622.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 0db54bd4-4cc8-4f1c-d990-08da007c73c5 X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Mar 2022 20:52:54.3074 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: DOi4vT8Kve1Srdm1QZd13nutQOwvlyC2JXIy5TG6GL/+IafMBKt4o64BFc5h84Dbn/oLK6nHbc3axPK/mEBH6g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW3PR11MB4764 Return-Path: guo.dong@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable It was merged @https://github.com/tianocore/edk2/pull/2596 https://github.com/tianocore/edk2/commit/af74efe494c5920c7992b543fada1af2b1= 86bd8c Thanks, Guo -----Original Message----- From: devel@edk2.groups.io On Behalf Of Guo Dong Sent: Monday, March 7, 2022 1:23 PM To: Rhodes, Sean ; devel@edk2.groups.io Cc: Rhodes, Sean ; Ni, Ray ; Ma, M= aurice ; You, Benjamin Subject: Re: [edk2-devel] [PATCH] UefiPayloadPkg: Make Boot Manager Key con= figurable Reviewed-by: Guo Dong -----Original Message----- From: Sean Rhodes =20 Sent: Saturday, March 5, 2022 3:15 AM To: devel@edk2.groups.io Cc: Rhodes, Sean ; Dong, Guo ; N= i, Ray ; Ma, Maurice ; You, Benjami= n Subject: [PATCH] UefiPayloadPkg: Make Boot Manager Key configurable Provide a build option to use [Esc] instead of [F2] for devices such as Chr= omebooks that don't have F-keys. Cc: Guo Dong Cc: Ray Ni Cc: Maurice Ma Cc: Benjamin You Signed-off-by: Sean Rhodes --- .../PlatformBootManager.c | 44 +++++++++++++------ .../PlatformBootManagerLib.inf | 1 + UefiPayloadPkg/UefiPayloadPkg.dec | 3 ++ UefiPayloadPkg/UefiPayloadPkg.dsc | 2 + 4 files changed, 37 insertions(+), 13 deletions(-) diff --git a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootMana= ger.c b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c index a8ead775ea..0eb577313a 100644 --- a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager.c +++ b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManager. +++ c @@ -164,7 +164,7 @@ PlatformBootManagerBeforeConsole ( ) { EFI_INPUT_KEY Enter;- EFI_INPUT_KEY = F2;+ EFI_INPUT_KEY CustomKey; EFI_INPUT_KEY = Down; EFI_BOOT_MANAGER_LOAD_OPTION BootOption; EFI_STATUS = Status;@@ -186,13 +186,22 @@ PlatformBootManagerBeforeConsole= ( Enter.UnicodeChar =3D CHAR_CARRIAGE_RETURN; EfiBootManagerRegisterCont= inueKeyOption (0, &Enter, NULL); - //- // Map F2 to Boot Manager Menu- /= /- F2.ScanCode =3D SCAN_F2;- F2.UnicodeChar =3D CHAR_NULL;+ if (Fixed= PcdGetBool (PcdBootManagerEscape)) {+ //+ // Map Esc to Boot Manager = Menu+ //+ CustomKey.ScanCode =3D SCAN_ESC;+ CustomKey.UnicodeCh= ar =3D CHAR_NULL;+ } else {+ //+ // Map Esc to Boot Manager Menu+ = //+ CustomKey.ScanCode =3D SCAN_F2;+ CustomKey.UnicodeChar =3D CH= AR_NULL;+ }+ EfiBootManagerGetBootManagerMenu (&BootOption);- EfiBootMa= nagerAddKeyOptionVariable (NULL, (UINT16)BootOption.OptionNumber, 0, &F2, N= ULL);+ EfiBootManagerAddKeyOptionVariable (NULL, (UINT16)BootOption.Option= Number, 0, &CustomKey, NULL); // // Also add Down key to Boot Manager = Menu since some serial terminals don't support F2 key.@@ -251,12 +260,21 @@= PlatformBootManagerAfterConsole ( // PlatformRegisterFvBootOption (PcdGetPtr (PcdShellFile), L"UEFI Shel= l", LOAD_OPTION_ACTIVE); - Print (- L"\n"- L"F2 or Down to ente= r Boot Manager Menu.\n"- L"ENTER to boot directly.\n"- L"\n= "- );+ if (FixedPcdGetBool (PcdBootManagerEscape)) {+ Print (+ = L"\n"+ L"Esc or Down to enter Boot Manager Menu.\n"+ L"ENTER= to boot directly.\n"+ L"\n"+ );+ } else {+ Print (= + L"\n"+ L"F2 or Down to enter Boot Manager Menu.\n"+ L= "ENTER to boot directly.\n"+ L"\n"+ );+ } } /**diff -= -git a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib= .inf b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib= .inf index 9c4a9da943..80390e0d98 100644 --- a/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerLib.= inf +++ b/UefiPayloadPkg/Library/PlatformBootManagerLib/PlatformBootManagerL +++ ib.inf @@ -73,3 +73,4 @@ gEfiMdePkgTokenSpaceGuid.PcdUartDefaultParity gEfiMdePkgTokenSpaceGuid= .PcdUartDefaultStopBits gEfiMdeModulePkgTokenSpaceGuid.PcdBootManagerMenu= File+ gUefiPayloadPkgTokenSpaceGuid.PcdBootManagerEscapediff --git a/UefiP= ayloadPkg/UefiPayloadPkg.dec b/UefiPayloadPkg/UefiPayloadPkg.dec index e9204d1168..4051172caf 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.dec +++ b/UefiPayloadPkg/UefiPayloadPkg.dec @@ -86,6 +86,9 @@ gUefiPayloadPkgTokenSpaceGuid.PcdPcdDriverFile|{ 0x57, 0x= 72, 0xcf, 0x80, 0xab, 0 # Above 4G Memory gUefiPayloadPkgTokenSpaceGuid.Pc= dDispatchModuleAbove4GMemory|TRUE|BOOLEAN|0x00000019 +# Boot Manager Key+gU= efiPayloadPkgTokenSpaceGuid.PcdBootManagerEscape|FALSE|BOOLEAN|0x00000020+ = ## FFS filename to find the default variable initial data file. # @Prompt F= FS Name of variable initial data file gUefiPayloadPkgTokenSpaceGuid.PcdNvs= DataFile |{ 0x1a, 0xf1, 0xb1, 0xae, 0x42, 0xcc, 0xcf, 0x4e, 0xac, 0x60, 0xd= b, 0xab, 0xf6, 0xca, 0x69, 0xe6 }|VOID*|0x00000025diff --git a/UefiPayloadP= kg/UefiPayloadPkg.dsc b/UefiPayloadPkg/UefiPayloadPkg.dsc index 4fe81a61d6..558513baf1 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.dsc +++ b/UefiPayloadPkg/UefiPayloadPkg.dsc @@ -34,6 +34,7 @@ DEFINE SECURITY_STUB_ENABLE =3D TRUE DEFINE SMM_SUPPORT = =3D FALSE DEFINE ABOVE_4G_MEMORY =3D TRUE+ DEFIN= E BOOT_MANAGER_ESCAPE =3D FALSE # # SBL: UEFI payload for= Slim Bootloader # COREBOOT: UEFI payload for coreboot@@ -401,6 +402,7 @@ !endif gUefiPayloadPkgTokenSpaceGuid.PcdDispatchModuleAbove4GMemory|$(A= BOVE_4G_MEMORY)+ gUefiPayloadPkgTokenSpaceGuid.PcdBootManagerEscape|$(BOOT= _MANAGER_ESCAPE) [PcdsPatchableInModule.X64] gPcAtChipsetPkgTokenSpaceGu= id.PcdRtcIndexRegister|$(RTC_INDEX_REGISTER)--=20 2.32.0