Changeset 80721 in vbox for trunk/src/VBox/Devices/EFI/FirmwareNew/MdeModulePkg/MdeModulePkg.dec
- Timestamp:
- Sep 11, 2019 8:46:37 AM (5 years ago)
- svn:sync-xref-src-repo-rev:
- 133262
- Location:
- trunk/src/VBox/Devices/EFI/FirmwareNew
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/VBox/Devices/EFI/FirmwareNew
-
Property svn:mergeinfo
changed from (toggle deleted branches)
to (toggle deleted branches)/vendor/edk2/current 103735-103757,103769-103776,129194-129237 /vendor/edk2/current 103735-103757,103769-103776,129194-133213
-
Property svn:mergeinfo
changed from (toggle deleted branches)
-
trunk/src/VBox/Devices/EFI/FirmwareNew/MdeModulePkg/MdeModulePkg.dec
r77662 r80721 4 4 # and libraries instances, which are used for those modules. 5 5 # 6 # Copyright (c) 2007 - 201 8, Intel Corporation. All rights reserved.<BR>6 # Copyright (c) 2007 - 2019, Intel Corporation. All rights reserved.<BR> 7 7 # Copyright (c) 2016, Linaro Ltd. All rights reserved.<BR> 8 8 # (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR> 9 9 # Copyright (c) 2017, AMD Incorporated. All rights reserved.<BR> 10 10 # Copyright (c) 2016, Microsoft Corporation<BR> 11 # This program and the accompanying materials are licensed and made available under 12 # the terms and conditions of the BSD License that accompanies this distribution. 13 # The full text of the license may be found at 14 # http://opensource.org/licenses/bsd-license.php. 15 # 16 # THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, 17 # WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. 11 # SPDX-License-Identifier: BSD-2-Clause-Patent 18 12 # 19 13 ## … … 32 26 33 27 [LibraryClasses] 34 ## @libraryclass IpIo layer upon EFI IP4 Protocol.35 # This library is only intended to be used by UEFI network stack modules.36 IpIoLib|Include/Library/IpIoLib.h37 38 ## @libraryclass Basic function for UEFI network stack.39 # This library is only intended to be used by UEFI network stack modules.40 NetLib|Include/Library/NetLib.h41 42 ## @libraryclass The helper routines to access UDP service.43 # This library is only intended to be used by UEFI network stack modules.44 UdpIoLib|Include/Library/UdpIoLib.h45 46 ## @libraryclass The helper routines to access TCP service.47 # This library is only intended to be used by UEFI network stack modules.48 TcpIoLib|Include/Library/TcpIoLib.h49 50 ## @libraryclass The helper routines to access HTTP service.51 # This library is only intended to be used by UEFI network stack modules.52 HttpLib|Include/Library/HttpLib.h53 54 28 ## @libraryclass Defines a set of methods to reset whole system. 55 29 ResetSystemLib|Include/Library/ResetSystemLib.h … … 58 32 ResetUtilityLib|Include/Library/ResetUtilityLib.h 59 33 60 ## @libraryclass Defines a set of methods related do S3 mode.61 # This library class is no longer used and modules using this library should62 # directly locate EFI_PEI_S3_RESUME_PPI defined in PI 1.2 specification.63 S3Lib|Include/Library/S3Lib.h64 65 ## @libraryclass Defines a set of methods related recovery mode.66 # This library class is no longer used and modules using this library should67 # directly locate EFI_PEI_RECOVERY_MODULE_PPI defined in PI 1.2 specification.68 RecoveryLib|Include/Library/RecoveryLib.h69 70 34 ## @libraryclass Provides HII related functions. 71 35 HiiLib|Include/Library/HiiLib.h … … 73 37 ## @libraryclass Defines a set of interfaces on how to process capusle image update. 74 38 CapsuleLib|Include/Library/CapsuleLib.h 75 76 ## @libraryclass Library for Deferred Procedure Calls.77 DpcLib|Include/Library/DpcLib.h78 39 79 40 ## @libraryclass Provides global variables that are pointers … … 261 222 gPerformanceExProtocolGuid = { 0x1ea81bec, 0xf01a, 0x4d98, { 0xa2, 0x1, 0x4a, 0x61, 0xce, 0x2f, 0xc0, 0x22 } } 262 223 gSmmPerformanceExProtocolGuid = { 0x931fc048, 0xc71d, 0x4455, { 0x89, 0x30, 0x47, 0x6, 0x30, 0xe3, 0xe, 0xe5 } } 224 # Include/Guid/PerformanceMeasurement.h 225 gEdkiiPerformanceMeasurementProtocolGuid = { 0xc85d06be, 0x5f75, 0x48ce, { 0xa8, 0x0f, 0x12, 0x36, 0xba, 0x3b, 0x87, 0xb1 } } 226 gEdkiiSmmPerformanceMeasurementProtocolGuid = { 0xd56b6d73, 0x1a7b, 0x4015, { 0x9b, 0xb4, 0x7b, 0x07, 0x17, 0x29, 0xed, 0x24 } } 263 227 264 228 ## Guid is defined for CRC32 encapsulation scheme. … … 300 264 ## Include/Guid/RecoveryDevice.h 301 265 gRecoveryOnDataCdGuid = { 0x5CAC0099, 0x0DC9, 0x48E5, { 0x80, 0x68, 0xBB, 0x95, 0xF5, 0x40, 0x0A, 0x9F }} 266 267 ## Include/Guid/RecoveryDevice.h 268 gRecoveryOnFatNvmeDiskGuid = { 0xC770A27F, 0x956A, 0x497A, { 0x85, 0x48, 0xE0, 0x61, 0x97, 0x58, 0x8B, 0xF6 }} 302 269 303 270 ## Include/Guid/SmmLockBox.h … … 417 384 gEdkiiS3SmmInitDoneGuid = { 0x8f9d4825, 0x797d, 0x48fc, { 0x84, 0x71, 0x84, 0x50, 0x25, 0x79, 0x2e, 0xf6 } } 418 385 386 ## Include/Guid/S3StorageDeviceInitList.h 387 gS3StorageDeviceInitListGuid = { 0x310e9b8c, 0xcf90, 0x421e, { 0x8e, 0x9b, 0x9e, 0xef, 0xb6, 0x17, 0xc8, 0xef } } 388 389 ## Include/Guid/SerialPortLibVendor.h 390 gEdkiiSerialPortLibVendorGuid = { 0xD3987D4B, 0x971A, 0x435F, { 0x8C, 0xAF, 0x49, 0x67, 0xEB, 0x62, 0x72, 0x41 } } 391 392 ## GUID indicates the capsule is to store Capsule On Disk file names. 393 gEdkiiCapsuleOnDiskNameGuid = { 0x98c80a4f, 0xe16b, 0x4d11, { 0x93, 0x9a, 0xab, 0xe5, 0x61, 0x26, 0x3, 0x30 } } 394 419 395 [Ppis] 420 396 ## Include/Ppi/AtaController.h … … 471 447 ## Include/Ppi/PlatformSpecificResetHandler.h 472 448 gEdkiiPlatformSpecificResetHandlerPpiGuid = { 0x75cf14ae, 0x3441, 0x49dc, { 0xaa, 0x10, 0xbb, 0x35, 0xa7, 0xba, 0x8b, 0xab } } 449 450 ## Include/Ppi/NvmExpressHostController.h 451 gEdkiiPeiNvmExpressHostControllerPpiGuid = { 0xcae3aa63, 0x676f, 0x4da3, { 0xbd, 0x50, 0x6c, 0xc5, 0xed, 0xde, 0x9a, 0xad } } 452 453 ## Include/Ppi/AtaAhciController.h 454 gEdkiiPeiAtaAhciHostControllerPpiGuid = { 0x61dd33ea, 0x421f, 0x4cc0, { 0x89, 0x29, 0xff, 0xee, 0xa9, 0xa1, 0xa2, 0x61 } } 455 456 ## Include/Ppi/StorageSecurityCommand.h 457 gEdkiiPeiStorageSecurityCommandPpiGuid = { 0x35de0b4e, 0x30fb, 0x46c3, { 0xbd, 0x84, 0x1f, 0xdb, 0xa1, 0x58, 0xbb, 0x56 } } 458 459 ## Include/Ppi/AtaPassThru.h 460 gEdkiiPeiAtaPassThruPpiGuid = { 0xa16473fd, 0xd474, 0x4c89, { 0xae, 0xc7, 0x90, 0xb8, 0x3c, 0x73, 0x86, 0x9 } } 461 462 ## Include/Ppi/Debug.h 463 gEdkiiDebugPpiGuid = { 0x999e699c, 0xb013, 0x475e, { 0xb1, 0x7b, 0xf3, 0xa8, 0xae, 0x5c, 0x48, 0x75 } } 464 465 ## Include/Ppi/NvmExpressPassThru.h 466 gEdkiiPeiNvmExpressPassThruPpiGuid = { 0x6af31b2c, 0x3be, 0x46c1, { 0xb1, 0x2d, 0xea, 0x4a, 0x36, 0xdf, 0xa7, 0x4c } } 467 468 ## Include/Ppi/CapsuleOnDisk.h 469 gEdkiiPeiCapsuleOnDiskPpiGuid = { 0x71a9ea61, 0x5a35, 0x4a5d, { 0xac, 0xef, 0x9c, 0xf8, 0x6d, 0x6d, 0x67, 0xe0 } } 470 gEdkiiPeiBootInCapsuleOnDiskModePpiGuid = { 0xb08a11e4, 0xe2b7, 0x4b75, { 0xb5, 0x15, 0xaf, 0x61, 0x6, 0x68, 0xbf, 0xd1 } } 473 471 474 472 [Protocols] … … 492 490 gEfiDebuggerConfigurationProtocolGuid = { 0x577d959c, 0xe967, 0x4546, { 0x86, 0x20, 0xc7, 0x78, 0xfa, 0xe5, 0xda, 0x05 }} 493 491 494 ## Include/Protocol/Dpc.h495 gEfiDpcProtocolGuid = {0x480f8ae9, 0xc46, 0x4aa9, { 0xbc, 0x89, 0xdb, 0x9f, 0xba, 0x61, 0x98, 0x6 }}496 497 492 ## Fault Tolerant Write protocol provides boot-time service to do fault tolerant write capability for block devices. 498 493 # Include/Protocol/FaultTolerantWrite.h … … 561 556 gEdkiiUfsHostControllerProtocolGuid = { 0xebc01af5, 0x7a9, 0x489e, { 0xb7, 0xce, 0xdc, 0x8, 0x9e, 0x45, 0x9b, 0x2f } } 562 557 558 ## Include/Protocol/UfsHostControllerPlatform.h 559 gEdkiiUfsHcPlatformProtocolGuid = { 0x3d18ba13, 0xd9b1, 0x4dd4, {0xb9, 0x16, 0xd3, 0x07, 0x96, 0x53, 0x9e, 0xd8}} 560 563 561 ## Include/Protocol/EsrtManagement.h 564 562 gEsrtManagementProtocolGuid = { 0xa340c064, 0x723c, 0x4a9c, { 0xa4, 0xdd, 0xd5, 0xb4, 0x7a, 0x26, 0xfb, 0xb0 }} … … 595 593 ## Include/Protocol/SmmMemoryAttribute.h 596 594 gEdkiiSmmMemoryAttributeProtocolGuid = { 0x69b792ea, 0x39ce, 0x402d, { 0xa2, 0xa6, 0xf7, 0x21, 0xde, 0x35, 0x1d, 0xfe } } 595 596 ## Include/Protocol/SdMmcOverride.h 597 gEdkiiSdMmcOverrideProtocolGuid = { 0xeaf9e3c1, 0xc9cd, 0x46db, { 0xa5, 0xe5, 0x5a, 0x12, 0x4c, 0x83, 0x23, 0x23 } } 597 598 598 599 ## Include/Protocol/PlatformSpecificResetFilter.h … … 603 604 ## Include/Protocol/FirmwareManagementProgress.h 604 605 gEdkiiFirmwareManagementProgressProtocolGuid = { 0x1849bda2, 0x6952, 0x4e86, { 0xa1, 0xdb, 0x55, 0x9a, 0x3c, 0x47, 0x9d, 0xf1 } } 606 607 ## Include/Protocol/AtaAtapiPolicy.h 608 gEdkiiAtaAtapiPolicyProtocolGuid = { 0xe59cd769, 0x5083, 0x4f26,{ 0x90, 0x94, 0x6c, 0x91, 0x9f, 0x91, 0x6c, 0x4e } } 609 610 ## Include/Protocol/PeCoffImageEmulator.h 611 gEdkiiPeCoffImageEmulatorProtocolGuid = { 0x96f46153, 0x97a7, 0x4793, { 0xac, 0xc1, 0xfa, 0x19, 0xbf, 0x78, 0xea, 0x97 } } 605 612 606 613 # … … 707 714 gEfiMdeModulePkgTokenSpaceGuid.PcdDisableDefaultKeyboardLayoutInUsbKbDriver|FALSE|BOOLEAN|0x00010200 708 715 709 ## Indicates if backward compatibility to Framework HII and Framework FvHob is supported.<BR><BR>710 # TRUE - Setup Browser supports GUID opcodes generated from Framework HII VFR file by VFR compiler.711 # the PeiCore will handle the framework FvHob and install FvInfo PPI for it.<BR>712 # FALSE - Setup Browser doesn't support GUID opcodes generated from Framework HII VFR file by VFR compiler.713 # the PeiCore will not handle the framework FvHob and install FvInfo PPI for it.<BR>714 # @Prompt Enable framework backward compatibility support.715 gEfiMdeModulePkgTokenSpaceGuid.PcdFrameworkCompatibilitySupport|FALSE|BOOLEAN|0x00012009716 717 716 ## Indicates if HelloWorld Application will print the verbose information. 718 717 # This PCD is a sample to explain FeatureFlag PCD usage.<BR><BR> … … 919 918 # BIT0 - Enable NULL pointer detection for UEFI.<BR> 920 919 # BIT1 - Enable NULL pointer detection for SMM.<BR> 921 # BIT2..6 - Reserved for future uses.<BR> 920 # BIT2..5 - Reserved for future uses.<BR> 921 # BIT6 - Enable non-stop mode.<BR> 922 922 # BIT7 - Disable NULL pointer detection just after EndOfDxe. <BR> 923 923 # This is a workaround for those unsolvable NULL access issues in … … 940 940 # free pages for all of them. The page allocation for the type related to 941 941 # cleared bits keeps the same as ususal. 942 # 943 # This PCD is only valid if BIT0 and/or BIT2 are set in PcdHeapGuardPropertyMask. 942 944 # 943 945 # Below is bit mask for this PCD: (Order is same as UEFI spec)<BR> … … 970 972 # type related to cleared bits keeps the same as ususal. 971 973 # 974 # This PCD is only valid if BIT1 and/or BIT3 are set in PcdHeapGuardPropertyMask. 975 # 972 976 # Below is bit mask for this PCD: (Order is same as UEFI spec)<BR> 973 977 # EfiReservedMemoryType 0x0000000000000001<BR> … … 993 997 994 998 ## This mask is to control Heap Guard behavior. 995 # Note that due to the limit of pool memory implementation and the alignment 996 # requirement of UEFI spec, BIT7 is a try-best setting which cannot guarantee 997 # that the returned pool is exactly adjacent to head guard page or tail guard 998 # page. 999 # 1000 # Note: 1001 # a) Heap Guard is for debug purpose and should not be enabled in product 1002 # BIOS. 1003 # b) Due to the limit of pool memory implementation and the alignment 1004 # requirement of UEFI spec, BIT7 is a try-best setting which cannot 1005 # guarantee that the returned pool is exactly adjacent to head guard 1006 # page or tail guard page. 1007 # c) UEFI freed-memory guard and UEFI pool/page guard cannot be enabled 1008 # at the same time. 1009 # 999 1010 # BIT0 - Enable UEFI page guard.<BR> 1000 1011 # BIT1 - Enable UEFI pool guard.<BR> 1001 1012 # BIT2 - Enable SMM page guard.<BR> 1002 1013 # BIT3 - Enable SMM pool guard.<BR> 1014 # BIT4 - Enable UEFI freed-memory guard (Use-After-Free memory detection).<BR> 1015 # BIT6 - Enable non-stop mode.<BR> 1003 1016 # BIT7 - The direction of Guard Page for Pool Guard. 1004 1017 # 0 - The returned pool is near the tail guard page.<BR> … … 1026 1039 gEfiMdeModulePkgTokenSpaceGuid.PcdVpdBaseAddress|0x0|UINT32|0x00010010 1027 1040 1028 ## Maximum number of FV is supported by PeiCore's dispatching.1029 # @Prompt Maximum number of FV supported by PeiCore.1030 gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxFvSupported|6|UINT32|0x000100301031 1032 ## Maximum File count in every FV is supported by PeiCore's dispatching.1033 # PeiCore supported File type includes PEIM, Combined PEIM and FV.1034 # @Prompt Maximum File count per FV supported by PeiCore.1035 gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxPeimPerFv|32|UINT32|0x000100311036 1037 1041 ## Maximum stack size for PeiCore. 1038 1042 # @Prompt Maximum stack size for PeiCore. 1039 1043 gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxPeiStackSize|0x20000|UINT32|0x00010032 1040 1041 ## Maximum PPI count is supported by PeiCore's PPI database.1042 # @Prompt Maximum PPI count supported by PeiCore.1043 gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxPpiSupported|64|UINT32|0x000100331044 1044 1045 1045 ## The maximum size of a single non-HwErr type variable. … … 1051 1051 # @Prompt Maximum authenticated variable size. 1052 1052 gEfiMdeModulePkgTokenSpaceGuid.PcdMaxAuthVariableSize|0x00|UINT32|0x30000009 1053 1054 ## The maximum size of a single non-authenticated volatile variable. 1055 # The default value is 0 for compatibility: in that case, the maximum 1056 # non-authenticated volatile variable size remains specified by 1057 # PcdMaxVariableSize. Only the MdeModulePkg/Universal/Variable/RuntimeDxe 1058 # driver supports this PCD. 1059 # @Prompt Maximum non-authenticated volatile variable size. 1060 gEfiMdeModulePkgTokenSpaceGuid.PcdMaxVolatileVariableSize|0x00|UINT32|0x3000000a 1053 1061 1054 1062 ## The maximum size of single hardware error record variable.<BR><BR> … … 1130 1138 # @Prompt Serial port registers use MMIO. 1131 1139 gEfiMdeModulePkgTokenSpaceGuid.PcdSerialUseMmio|FALSE|BOOLEAN|0x00020000 1140 1141 ## Indicates the access width for 16550 serial port registers. 1142 # Default is 8-bit access mode.<BR><BR> 1143 # 8 - 16550 serial port registers are accessed in 8-bit width.<BR> 1144 # 32 - 16550 serial port registers are accessed in 32-bit width.<BR> 1145 # @Prompt Serial port register access width. 1146 gEfiMdeModulePkgTokenSpaceGuid.PcdSerialRegisterAccessWidth|8|UINT8|0x00020007 1132 1147 1133 1148 ## Indicates if the 16550 serial port hardware flow control will be enabled. Default is FALSE.<BR><BR> … … 1265 1280 # If a bit is set, the image will be protected by DxeCore if it is aligned. 1266 1281 # The code section becomes read-only, and the data section becomes non-executable. 1267 # If a bit is clear, the image will not be protected.<BR><BR>1282 # If a bit is clear, nothing will be done to image code/data sections.<BR><BR> 1268 1283 # BIT0 - Image from unknown device. <BR> 1269 1284 # BIT1 - Image from firmware volume.<BR> 1285 # <BR> 1286 # Note: If a bit is cleared, the data section could be still non-executable if 1287 # PcdDxeNxMemoryProtectionPolicy is enabled for EfiLoaderData, EfiBootServicesData 1288 # and/or EfiRuntimeServicesData.<BR> 1289 # <BR> 1270 1290 # @Prompt Set image protection policy. 1271 1291 # @ValidRange 0x80000002 | 0x00000000 - 0x0000001F … … 1274 1294 ## Set DXE memory protection policy. The policy is bitwise. 1275 1295 # If a bit is set, memory regions of the associated type will be mapped 1276 # non-executable.<BR><BR> 1277 # 1296 # non-executable.<BR> 1297 # If a bit is cleared, nothing will be done to associated type of memory.<BR> 1298 # <BR> 1278 1299 # Below is bit mask for this PCD: (Order is same as UEFI spec)<BR> 1279 1300 # EfiReservedMemoryType 0x0001<BR> … … 1458 1479 gEfiMdeModulePkgTokenSpaceGuid.PcdMaximumPeiResetNotifies|0x10|UINT32|0x0000010A 1459 1480 1481 ## Capsule On Disk is to deliver capsules via files on Mass Storage device.<BR><BR> 1482 # This PCD indicates if the Capsule On Disk is supported.<BR> 1483 # TRUE - Capsule On Disk is supported.<BR> 1484 # FALSE - Capsule On Disk is not supported.<BR> 1485 # If platform does not use this feature, this PCD should be set to FALSE.<BR><BR> 1486 # Two sulotions to deliver Capsule On Disk:<BR> 1487 # a) If PcdCapsuleInRamSupport = TRUE, Load Capsule On Disk image out of TCB, and reuse 1488 # Capsule In Ram to deliver capsule.<BR> 1489 # b) If PcdCapsuleInRamSupport = FALSE, Relocate Capsule On Disk image to RootDir out 1490 # of TCB, and reuse FatPei to load capsules from external storage.<BR> 1491 # Note:<BR> 1492 # If Both Capsule In Ram and Capsule On Disk are provisioned at the same time, the Capsule 1493 # On Disk will be bypassed. 1494 # @Prompt Enable Capsule On Disk support. 1495 gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleOnDiskSupport|FALSE|BOOLEAN|0x0000002d 1496 1460 1497 [PcdsPatchableInModule, PcdsDynamic, PcdsDynamicEx] 1461 1498 ## This PCD defines the Console output row. The default value is 25 according to UEFI spec. … … 1558 1595 gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase64|0x0|UINT64|0x80000010 1559 1596 1560 ## This PCD defines a reserved memory range for the EMU Variable driver's NV Variable Store. 1561 # The range is valid if non-zero. The memory range size must be PcdVariableStoreSize. 1562 # @Prompt Reserved memory range for EMU variable NV storage. 1597 ## Indicates if Variable driver will enable emulated variable NV mode.<BR><BR> 1598 # If this PCD is configured to dynamic, its value should be set before Variable driver starts to work,<BR> 1599 # otherwise default value will take effect.<BR> 1600 # TRUE - An EMU variable NV storage will be allocated or reserved for NV variables.<BR> 1601 # FALSE - No EMU variable NV storage will be allocated or reserved for NV variables.<BR> 1602 # @Prompt EMU variable NV mode enable. 1603 gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvModeEnable|FALSE|BOOLEAN|0x01100001 1604 1605 ## This PCD defines the base address of reserved memory range for EMU variable NV storage. 1606 # A non-ZERO value indicates a valid range reserved with size given by PcdVariableStoreSize. 1607 # @Prompt Base of reserved memory range for EMU variable NV storage. 1563 1608 gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvStoreReserved|0|UINT64|0x40000008 1564 1609 … … 1611 1656 # @Prompt Reset on memory type information change. 1612 1657 gEfiMdeModulePkgTokenSpaceGuid.PcdResetOnMemoryTypeInformationChange|TRUE|BOOLEAN|0x00010056 1658 1659 ## Indicates if the BDS supports Platform Recovery.<BR><BR> 1660 # TRUE - BDS supports Platform Recovery.<BR> 1661 # FALSE - BDS does not support Platform Recovery.<BR> 1662 # @Prompt Support Platform Recovery. 1663 gEfiMdeModulePkgTokenSpaceGuid.PcdPlatformRecoverySupport|TRUE|BOOLEAN|0x00010078 1613 1664 1614 1665 ## Specify the foreground color for Subtile text in HII Form Browser. The default value is EFI_BLUE. … … 1742 1793 ## SMBIOS version. 1743 1794 # @Prompt SMBIOS version. 1744 gEfiMdeModulePkgTokenSpaceGuid.PcdSmbiosVersion|0x030 1|UINT16|0x000100551795 gEfiMdeModulePkgTokenSpaceGuid.PcdSmbiosVersion|0x0302|UINT16|0x00010055 1745 1796 1746 1797 ## SMBIOS Docrev field in SMBIOS 3.0 (64-bit) Entry Point Structure. 1747 1798 # @Prompt SMBIOS Docrev field in SMBIOS 3.0 (64-bit) Entry Point Structure. 1748 gEfiMdeModulePkgTokenSpaceGuid.PcdSmbiosDocRev|0x 1|UINT8|0x0001006A1799 gEfiMdeModulePkgTokenSpaceGuid.PcdSmbiosDocRev|0x0|UINT8|0x0001006A 1749 1800 1750 1801 ## SMBIOS produce method. … … 1867 1918 # For the DxeIpl and the DxeCore are both IA32 (PcdDxeIplSwitchToLongMode is FALSE), set NX for stack feature also require 1868 1919 # IA32 PAE is supported and Execute Disable Bit is available.<BR> 1869 # TRUE - to set NX for stack.<BR> 1870 # FALSE - Not to set NX for stack.<BR> 1920 # <BR> 1921 # TRUE - Set NX for stack.<BR> 1922 # FALSE - Do nothing for stack.<BR> 1923 # <BR> 1924 # Note: If this PCD is set to FALSE, NX could be still applied to stack due to PcdDxeNxMemoryProtectionPolicy enabled for 1925 # EfiBootServicesData.<BR> 1926 # <BR> 1871 1927 # @Prompt Set NX for stack. 1872 1928 gEfiMdeModulePkgTokenSpaceGuid.PcdSetNxForStack|FALSE|BOOLEAN|0x0001006f … … 1904 1960 gEfiMdeModulePkgTokenSpaceGuid.PcdRecoveryFileName|L"FVMAIN.FV"|VOID*|0x30001045 1905 1961 1962 ## This is Capsule Temp Relocation file name in PEI phase. 1963 # The file must be in the root directory. 1964 # The file name must be the 8.3 format. 1965 # The PCD data must be in UNICODE format. 1966 # CapsuleOnDiskLoadPei PEI module will set value of this PCD to PcdRecoveryFileName, then 1967 # leverage recovery to get Capsule On Disk Temp Relocation file. 1968 # Note: The file name must be shorter than PcdRecoveryFileName, otherwise CapsuleOnDiskLoadPei 1969 # PEI module will fail to get Capsule On Disk Temp Relocation file. 1970 # @Prompt Capsule On Disk Temp Relocation file name in PEI phase 1971 gEfiMdeModulePkgTokenSpaceGuid.PcdCoDRelocationFileName|L"Cod.tmp"|VOID*|0x30001048 1972 1906 1973 ## This PCD hold a list GUIDs for the ImageTypeId to indicate the 1907 1974 # FMP capsule is a system FMP. … … 1914 1981 # @Prompt The address mask when memory encryption is enabled. 1915 1982 gEfiMdeModulePkgTokenSpaceGuid.PcdPteMemoryEncryptionAddressOrMask|0x0|UINT64|0x30001047 1983 1984 ## Indicates if 5-Level Paging will be enabled in long mode. 5-Level Paging will not be enabled 1985 # when the PCD is TRUE but CPU doesn't support 5-Level Paging. 1986 # TRUE - 5-Level Paging will be enabled.<BR> 1987 # FALSE - 5-Level Paging will not be enabled.<BR> 1988 # @Prompt Enable 5-Level Paging support in long mode. 1989 gEfiMdeModulePkgTokenSpaceGuid.PcdUse5LevelPageTable|FALSE|BOOLEAN|0x0001105F 1990 1991 ## Capsule In Ram is to use memory to deliver the capsules that will be processed after system 1992 # reset.<BR><BR> 1993 # This PCD indicates if the Capsule In Ram is supported.<BR> 1994 # TRUE - Capsule In Ram is supported.<BR> 1995 # FALSE - Capsule In Ram is not supported. 1996 # @Prompt Enable Capsule In Ram support. 1997 gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleInRamSupport|TRUE|BOOLEAN|0x0000002e 1998 1999 ## Full device path of plaform specific device to store Capsule On Disk temp relocation file.<BR> 2000 # If this PCD is set, Capsule On Disk temp relocation file will be stored in the device specified 2001 # by this PCD, instead of the EFI System Partition that stores capsule image file. 2002 # @Prompt Capsule On Disk relocation device path. 2003 gEfiMdeModulePkgTokenSpaceGuid.PcdCodRelocationDevPath|{0xFF}|VOID*|0x0000002f 1916 2004 1917 2005 [PcdsPatchableInModule] … … 1961 2049 gEfiMdeModulePkgTokenSpaceGuid.PcdS3BootScriptTablePrivateSmmDataPtr|0x0|UINT64|0x00030001 1962 2050 1963 ## This dynamic PCD hold an address to point to the memory of page table. The page table establishes a 1:11964 # Virtual to Physical mapping according to the processor physical address bits.1965 # @Prompt Identify Mapping Page Table pointer.1966 # @ValidList 0x80000001 | 0x01967 gEfiMdeModulePkgTokenSpaceGuid.PcdIdentifyMappingPageTablePtr|0x0|UINT64|0x000300021968 1969 2051 ## This dynamic PCD holds the information if there is any test key used by the platform. 1970 2052 # @Prompt If there is any test key used by the platform. … … 1982 2064 gEfiMdeModulePkgTokenSpaceGuid.PcdNvStoreDefaultValueBuffer|{0x0}|VOID*|0x00030005 1983 2065 2066 ## VPD type PCD allows a developer to point to an absolute physical address PcdVpdBaseAddress64 2067 # to store PCD value. It will be DynamicExDefault only. 2068 # It is used to set VPD region base address. So, it can't be DynamicExVpd PCD. Its value is 2069 # required to be accessed in PcdDxe driver entry point. So, its value must be set in PEI phase. 2070 # It can't depend on EFI variable service, and can't be DynamicExHii PCD. 2071 # @Prompt 64bit VPD base address. 2072 gEfiMdeModulePkgTokenSpaceGuid.PcdVpdBaseAddress64|0x0|UINT64|0x00030006 2073 1984 2074 [UserExtensions.TianoCore."ExtraFiles"] 1985 2075 MdeModulePkgExtra.uni
Note:
See TracChangeset
for help on using the changeset viewer.