From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by mx.groups.io with SMTP id smtpd.web11.5559.1646117582985871836 for ; Mon, 28 Feb 2022 22:53:03 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=DgS54PZ6; spf=pass (domain: intel.com, ip: 134.134.136.24, mailfrom: ray.ni@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1646117583; x=1677653583; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=5u+HOYhS5MnXjAuWRt1CG9wf81FsbLN8zXyiSst9mfw=; b=DgS54PZ6j9l1zx9BT7CaV7MmtgjMgeGz3awZfSYPDr1uFcqF1c4oZ/C8 qQLzqy4PHdcgTKPR2NA2Iepa2z5c7RLnRrJdr9zX75CCXJPFi+MH5M5af bJbuPke4U9BaZKX9ixRRYoS/mocejqpKx4+F0c2uSx022O+s7U5OvIwT2 jRHKAOVVYtsDuKzxf9tEnwlwXKcTBomrrorR8QsqQc/vOHHSpIG5g5XwY gq2psiOogmDht4rVdrfpuKzu/rmT78+BBlSkNzbvDOTcdHWkIgUlnDSns gth47RzaAJYN8mKvRU9dRNo2ghJi0nGFfuPvE+xvVSzv6iSHQ3RxvHJq/ g==; X-IronPort-AV: E=McAfee;i="6200,9189,10272"; a="252804789" X-IronPort-AV: E=Sophos;i="5.90,145,1643702400"; d="scan'208";a="252804789" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Feb 2022 22:53:02 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.90,145,1643702400"; d="scan'208";a="708948162" Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81]) by orsmga005.jf.intel.com with ESMTP; 28 Feb 2022 22:53:02 -0800 Received: from fmsmsx611.amr.corp.intel.com (10.18.126.91) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21; Mon, 28 Feb 2022 22:53:01 -0800 Received: from fmsmsx606.amr.corp.intel.com (10.18.126.86) by fmsmsx611.amr.corp.intel.com (10.18.126.91) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21; Mon, 28 Feb 2022 22:53:01 -0800 Received: from fmsedg601.ED.cps.intel.com (10.1.192.135) by fmsmsx606.amr.corp.intel.com (10.18.126.86) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21 via Frontend Transport; Mon, 28 Feb 2022 22:53:01 -0800 Received: from NAM02-BN1-obe.outbound.protection.outlook.com (104.47.51.46) by edgegateway.intel.com (192.55.55.70) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.20; Mon, 28 Feb 2022 22:53:00 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ORadmF/wy1c+hXN1mVHCs8DaljIUWpu5woeCaAwn5yjMM4SAcTNQ9aOvbxS/sRgypHOSzRaoQofGYLfSO1rR0aCwZty0giblCFwdCYihMPabeatqZixYK+ZGobEnYvcbBBKnXMwzkmucIkbvJ4l6IB8nQxKEACfSAEMHDeX2xKtVm6xsPqoXpqjwwQiNiM+nAkV1F4ZkbAc9GouQbscdUbNMvRLWWi7zxdz/hmJuPQYjTv25s6Rpcs08rtQr001lTDcGre2gZg+F+kCQClSMQy+k8HK+JALCqbUxqwEObuMoeYLE1XDMzE4Ky3MHjbCAwE3dhIgtmrXcQ1HJWwBh9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=K0trYqwRO9Ai01VgQvUmus61YQoFWm5Ce1QX6kxZKWM=; b=W++gildf6p3lvohkTBzHhX4r/Zid+jGBEhS6y8jgIQWkC81ZPkGiz5/aZb/RGJrUz3RDNuQweC0Es/2ANuAYmAzRIVlFimDCpodmACkgyPWw02E47T+Z0Sc+DpCI7TJ+Vr6rX+ChUd8T+u+nZ+9cSI4YxSGOrPkVPE1h279zxUam57BX3QnoFV/UMBSUfKI0TImpomst2SuWqlwaTlgqmppPzx0OO102XVfiNLYTRKyjr7COkamDpbCUHQLwV6Zt0Y3qHsMEy6ed3vBnHdpBGajrcYA72Y86S2H9Od8UmZxu74NF79KS8dPfrG4Xgk8JmmEUcO1lTc7Y3CdFolnPgA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MWHPR11MB1631.namprd11.prod.outlook.com (2603:10b6:301:10::10) by BN8PR11MB3540.namprd11.prod.outlook.com (2603:10b6:408:81::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Tue, 1 Mar 2022 06:52:53 +0000 Received: from MWHPR11MB1631.namprd11.prod.outlook.com ([fe80::99b6:d326:2925:4d2f]) by MWHPR11MB1631.namprd11.prod.outlook.com ([fe80::99b6:d326:2925:4d2f%3]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022 06:52:53 +0000 From: "Ni, Ray" To: "Rhodes, Sean" , "devel@edk2.groups.io" CC: "Dong, Guo" , "Rhodes, Sean" , "Ma, Maurice" , "You, Benjamin" Subject: Re: [PATCH] UefiPayloadPkg: Add build option for Above 4G Memory Thread-Topic: [PATCH] UefiPayloadPkg: Add build option for Above 4G Memory Thread-Index: AQHYKQkMdf+w7biZfU6VTK1aXn1d3qyqH9Og Date: Tue, 1 Mar 2022 06:52:53 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 7ef5a866-0889-4fba-98de-08d9fb501bf3 x-ms-traffictypediagnostic: BN8PR11MB3540:EE_ x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr x-microsoft-antispam-prvs: x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: UkIzvgEewFZG7H9UCa8xThcGOvauTsy3nRmRFXO1eTM7VUEc1iY/K1inXOpISIp957L80IPCY561WDlgW9uFSCkAdSEHjoYFCpfbnawZlFd4HQLA673kN4dH9+mLj2L3tYdXklZ1c62MBk082T/2gbZRMFz3xGpmwM40Dn0KSk3b0PIXRyOofKF4h401LpjRfPibedACdpVIYUNbufbwg8Co7ORpKqBS4I3SgQsAMF76rui2NHMEAsfqoNxgFipvpdscMEVShx67FHdfAMxUU3Hbr1euEpMVWVHGi5JmlQlAA9rFXCqz1oKlPoD7dnaDeAV49A4RFmJGU+hQSPjvRqPF3ZE/vgIVqctm3G8ALJ20WtdSmZpqaj7/o94FGLKSIDqqRLdt7GncjhsE5PT2Yoz+Agf3R70kXU0o9EirksnkHdi3qldyruU9tRVr/o1ikqh+gEmhSfpmMa0CVW3qp7MJxTbNuNa3a7gfgMhHzQeVF68ALd4yPD15keq4S2/rUEU+l4OJW0VR/MP0CTNJGZLajWROuvKZow5w9XWWd5kcd3Ve3jQhSkl3n9eiDcga7wmbAJohuoxWRqMDp8O4eh/hPDMRNiLp1Pvu+SCvBC/M3EyLHm2QOpdxKQEthyY5wW8zc1VokS3rDmovYB2b+MUdM/6VJvlFUOTCP7H+58xERIwXK+QyIn3GAinq3Yq1oGrFS/AsJ/4XWbtrYxlyYg== x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MWHPR11MB1631.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(2906002)(86362001)(110136005)(55016003)(33656002)(38070700005)(82960400001)(66476007)(186003)(26005)(508600001)(107886003)(122000001)(53546011)(7696005)(6506007)(71200400001)(64756008)(19627235002)(9686003)(8676002)(66446008)(52536014)(4326008)(8936002)(66556008)(5660300002)(83380400001)(316002)(66946007)(76116006)(54906003);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?onRqNqK74cdiSbeBckV5THJ55lEQEXXqEQqarccJn59aptSh8JRIl2wp++uS?= =?us-ascii?Q?Os58WCSvB4/n4eiqVTq1ycCc7D6fgWGDdq4L+0OR/+lD1JQOVfRxQ9p4diUh?= =?us-ascii?Q?lqLPSh4fVe77UovIVCyFx4vAwq5SA0++QCWANgcUPFkHLYAW++b+7AFuilMb?= =?us-ascii?Q?99nwow9C9MtgUcgcnO9aiGIZ0p+CCns/TUdG0DZVYIcZVrgrDCUcSQsG9iRj?= =?us-ascii?Q?qGQabH8lz+OVqALjgnYJME9CFmNq8Kcg53dGetgdygO+Rc7y4z9fOoSvm5V/?= =?us-ascii?Q?aFvhTv/9K9D3MHX691FnpXQT4EUkSkeDOBBXPp+qJZH/Y5M7jSisV47MkA7u?= =?us-ascii?Q?c0HdctvJKmLUIzyhOscjBW6TMPY09YfBgn3/nzpyPOFe4NGkIYkGD/URceqh?= =?us-ascii?Q?Cd9HL4K1X5BumPDpUSk7WL8Ze959LopYruG8t48qww1YbecMVg9ecWIgLex0?= =?us-ascii?Q?OkRHF8DK+O25t6L3bUmV45/NLM4QpZ6TKfSK5nMBtfTjMBHSnUvZPkNzmbSV?= =?us-ascii?Q?fXCs4QhfgtA85RKuIa9W3XvHrtnx7i4k8E2QcCBG35reOM4uNI4flinPUluL?= =?us-ascii?Q?iFhg/W9TeYabCvzxww4g97uc/L3jwf6R0tMx6Hbd8U+ioglsBfep8ER1YCwd?= =?us-ascii?Q?oLL1pMPijcb8kcdJ2H8/j0LnofZsZ2E3DbfpzXjANHb3gidNu62/22FVUWdy?= =?us-ascii?Q?xQheS0UswIwu7qfNwJHHY3vur+2ptCvhflMow6Q6WYEqutDZS8gTu+Tjxwgw?= =?us-ascii?Q?IIprY7gSIo9nOwQ3Gx5FpnCO01IQMJG7w5+6+j8cZIHyr9vibD167yc1u2ip?= =?us-ascii?Q?pRWo7jPKvc9kkQyf7Mkv9j5Pbpe7ul9lfkS5Wp6xo0gsbB2jmyHiP6CcQPsk?= =?us-ascii?Q?osEjnMslVdceuMx1085Dak0JCALZQ5GFrU9n2Ax4jSCsnF5jxVThAzTUHMN4?= =?us-ascii?Q?AK7qqdKOy05y++dpbUeFDODGl9Rc+P1MGQ7dbobso2hg0TWq1mqs/HiuFyBZ?= =?us-ascii?Q?03SwbL45AbomJHY9lDanFCbJ9+ERPvMUk3gMVfGZgu0Vp8GV7RmxJfL+hTu5?= =?us-ascii?Q?hDEtkSZ48eGjhXUtvYakwIlQT/tBdBiMmauPf/mNmBkAPB61VMDxDJaLMDxL?= =?us-ascii?Q?UcVS8Mo0IwQouEf8lIrurVS3UenlwiFGXvOx/KpZhbsSo8IFCfZMV1Kzg6LW?= =?us-ascii?Q?j7gGP9TA5Cq0JmpZdSY0JFPTgi7oxQMHR2v9SYg87ypPjNerZDzd+I3EIWZq?= =?us-ascii?Q?e/DkKrONuwUwjSQmvYFcB3waOlolpZb/fA+X+s9A3cku0zjzI8jXe07aC4vJ?= =?us-ascii?Q?EXgWBN4aXR0ZG/LnCh4iyyr5BSM3Q2V8swrD0JOenOGoB+tnb22HuyCtA4xA?= =?us-ascii?Q?TlOLif5BJNKqTSX77cLTV/1MCw1NiM1dtsUke5b3ZlaF3G7XxoCk+d9P3I4r?= =?us-ascii?Q?PRj/SDFQ0zYcDq6VNWyOumT5v6/F8rVwenTVLQ+SEtA9iVn055Ij58CO3EyC?= =?us-ascii?Q?cCqcwry0B5J6KpW3+k7wKydbaO0Ms8yf+2f618jjOSU4eFl4HYUwVJ05/Xgz?= =?us-ascii?Q?8oEXC/NVTt97q5iAsfwzSVHRM89dRIH0a4pDEl9VV9s18LgjPZj+XvkIX3p4?= =?us-ascii?Q?sw=3D=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MWHPR11MB1631.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 7ef5a866-0889-4fba-98de-08d9fb501bf3 X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2022 06:52:53.2978 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: GhN8JJDoKiwCa5hhZmYtoZLJBl40vJzU8tCMKvWArZ9Gp/5Vk94JNJxzgVbdeK4vvL2aTz4b40uGaDv4gFHrGw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR11MB3540 Return-Path: ray.ni@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Reviewed-by: Ray Ni -----Original Message----- From: Sean Rhodes =20 Sent: Thursday, February 24, 2022 7:00 AM To: devel@edk2.groups.io Cc: Dong, Guo ; Rhodes, Sean ; N= i, Ray ; Ma, Maurice ; You, Benjami= n Subject: [PATCH] UefiPayloadPkg: Add build option for Above 4G Memory When build option ABOVE_4G_MEMORY is set to true, nothing will change and EDKII will use all available memory. Setting it to false will create memory type information HOB in payload entry, so that EDKII will reserve enough memory below 4G for EDKII modules. This option is useful for bootloaders that are not fully 64-bit aware such as Qubes R4.0.4 bootloader, Zorin and Proxmox. Cc: Guo Dong Cc: Ray Ni Cc: Maurice Ma Cc: Benjamin You Signed-off-by: Sean Rhodes --- .../UefiPayloadEntry/UefiPayloadEntry.c | 39 +++++++++++++++++++ .../UefiPayloadEntry/UefiPayloadEntry.inf | 7 ++++ UefiPayloadPkg/UefiPayloadPkg.dec | 3 ++ UefiPayloadPkg/UefiPayloadPkg.dsc | 3 ++ 4 files changed, 52 insertions(+) diff --git a/UefiPayloadPkg/UefiPayloadEntry/UefiPayloadEntry.c b/UefiPaylo= adPkg/UefiPayloadEntry/UefiPayloadEntry.c index 0fed1e3691..780348eadf 100644 --- a/UefiPayloadPkg/UefiPayloadEntry/UefiPayloadEntry.c +++ b/UefiPayloadPkg/UefiPayloadEntry/UefiPayloadEntry.c @@ -5,10 +5,44 @@ =20 **/ =20 +#include #include "UefiPayloadEntry.h" =20 STATIC UINT32 mTopOfLowerUsableDram =3D 0; =20 +EFI_MEMORY_TYPE_INFORMATION mDefaultMemoryTypeInformation[] =3D { + { EfiACPIReclaimMemory, FixedPcdGet32 (PcdMemoryTypeEfiACPIReclaimMemo= ry) }, + { EfiACPIMemoryNVS, FixedPcdGet32 (PcdMemoryTypeEfiACPIMemoryNVS) = }, + { EfiReservedMemoryType, FixedPcdGet32 (PcdMemoryTypeEfiReservedMemoryT= ype) }, + { EfiRuntimeServicesData, FixedPcdGet32 (PcdMemoryTypeEfiRuntimeServices= Data) }, + { EfiRuntimeServicesCode, FixedPcdGet32 (PcdMemoryTypeEfiRuntimeServices= Code) }, + { EfiMaxMemoryType, 0 = } +}; + +/** + Function to reserve memory below 4GB for EDKII Modules. + + This causes the DXE to dispatch everything under 4GB and allows Operati= ng + System's that require EFI_LOADED_IMAGE to be under 4GB to start. + e.g. Xen hypervisor used in Qubes. +**/ +VOID +ForceModulesBelow4G ( + VOID + ) +{ + DEBUG ((DEBUG_INFO, "Building hob to restrict memory resorces to below 4= G.\n")); + + // + // Create Memory Type Information HOB + // + BuildGuidDataHob ( + &gEfiMemoryTypeInformationGuid, + mDefaultMemoryTypeInformation, + sizeof (mDefaultMemoryTypeInformation) + ); +} + /** Callback function to build resource descriptor HOB =20 @@ -438,6 +472,11 @@ _ModuleEntryPoint ( // Build other HOBs required by DXE BuildGenericHob (); =20 + // Create a HOB to make resources for EDKII modules below 4G + if (!FixedPcdGetBool (PcdDispatchModuleAbove4GMemory)) { + ForceModulesBelow4G (); + } + // Load the DXE Core Status =3D LoadDxeCore (&DxeCoreEntryPoint); ASSERT_EFI_ERROR (Status); diff --git a/UefiPayloadPkg/UefiPayloadEntry/UefiPayloadEntry.inf b/UefiPay= loadPkg/UefiPayloadEntry/UefiPayloadEntry.inf index 1847d6481a..c4e4339ede 100644 --- a/UefiPayloadPkg/UefiPayloadEntry/UefiPayloadEntry.inf +++ b/UefiPayloadPkg/UefiPayloadEntry/UefiPayloadEntry.inf @@ -86,8 +86,15 @@ gUefiPayloadPkgTokenSpaceGuid.PcdPayloadFdMemSize gUefiPayloadPkgTokenSpaceGuid.PcdBootloaderParameter gUefiPayloadPkgTokenSpaceGuid.PcdSystemMemoryUefiRegionSize + gUefiPayloadPkgTokenSpaceGuid.PcdMemoryTypeEfiACPIMemoryNVS + gUefiPayloadPkgTokenSpaceGuid.PcdMemoryTypeEfiACPIReclaimMemory + gUefiPayloadPkgTokenSpaceGuid.PcdMemoryTypeEfiReservedMemoryType + gUefiPayloadPkgTokenSpaceGuid.PcdMemoryTypeEfiRuntimeServicesData + gUefiPayloadPkgTokenSpaceGuid.PcdMemoryTypeEfiRuntimeServicesCode =20 gEfiMdeModulePkgTokenSpaceGuid.PcdSetNxForStack ## SOMETIM= ES_CONSUMES gEfiMdeModulePkgTokenSpaceGuid.PcdDxeNxMemoryProtectionPolicy ## SOMETIM= ES_CONSUMES gEfiMdeModulePkgTokenSpaceGuid.PcdImageProtectionPolicy ## SOMETIM= ES_CONSUMES =20 + gUefiPayloadPkgTokenSpaceGuid.PcdDispatchModuleAbove4GMemory + diff --git a/UefiPayloadPkg/UefiPayloadPkg.dec b/UefiPayloadPkg/UefiPayload= Pkg.dec index 551f0a4915..e9204d1168 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.dec +++ b/UefiPayloadPkg/UefiPayloadPkg.dec @@ -83,6 +83,9 @@ gUefiPayloadPkgTokenSpaceGuid.PcdSystemMemoryUefiRegionSi= ze|0x04000000|UINT32|0x =20 gUefiPayloadPkgTokenSpaceGuid.PcdPcdDriverFile|{ 0x57, 0x72, 0xcf, 0x80, 0= xab, 0x87, 0xf9, 0x47, 0xa3, 0xfe, 0xD5, 0x0B, 0x76, 0xd8, 0x95, 0x41 }|VOI= D*|0x00000018 =20 +# Above 4G Memory +gUefiPayloadPkgTokenSpaceGuid.PcdDispatchModuleAbove4GMemory|TRUE|BOOLEAN|= 0x00000019 + ## FFS filename to find the default variable initial data file. # @Prompt FFS Name of variable initial data file gUefiPayloadPkgTokenSpaceGuid.PcdNvsDataFile |{ 0x1a, 0xf1, 0xb1, 0xae, 0= x42, 0xcc, 0xcf, 0x4e, 0xac, 0x60, 0xdb, 0xab, 0xf6, 0xca, 0x69, 0xe6 }|VOI= D*|0x00000025 diff --git a/UefiPayloadPkg/UefiPayloadPkg.dsc b/UefiPayloadPkg/UefiPayload= Pkg.dsc index 1ce96a51c1..4fe81a61d6 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.dsc +++ b/UefiPayloadPkg/UefiPayloadPkg.dsc @@ -33,6 +33,7 @@ DEFINE UNIVERSAL_PAYLOAD =3D FALSE DEFINE SECURITY_STUB_ENABLE =3D TRUE DEFINE SMM_SUPPORT =3D FALSE + DEFINE ABOVE_4G_MEMORY =3D TRUE # # SBL: UEFI payload for Slim Bootloader # COREBOOT: UEFI payload for coreboot @@ -399,6 +400,8 @@ gEfiMdePkgTokenSpaceGuid.PcdPerformanceLibraryPropertyMask | 0x1 !endif =20 + gUefiPayloadPkgTokenSpaceGuid.PcdDispatchModuleAbove4GMemory|$(ABOVE_4G_= MEMORY) + [PcdsPatchableInModule.X64] gPcAtChipsetPkgTokenSpaceGuid.PcdRtcIndexRegister|$(RTC_INDEX_REGISTER) gPcAtChipsetPkgTokenSpaceGuid.PcdRtcTargetRegister|$(RTC_TARGET_REGISTER= ) --=20 2.32.0