VirtualBox

Ignore:
Timestamp:
Sep 11, 2019 8:46:37 AM (5 years ago)
Author:
vboxsync
svn:sync-xref-src-repo-rev:
133262
Message:

Devices/EFI/FirmwareNew: Start upgrade process to edk2-stable201908 (compiles on Windows and works to some extent), bugref:4643

Location:
trunk/src/VBox/Devices/EFI/FirmwareNew
Files:
2 edited

Legend:

Unmodified
Added
Removed
  • trunk/src/VBox/Devices/EFI/FirmwareNew

  • trunk/src/VBox/Devices/EFI/FirmwareNew/MdeModulePkg/MdeModulePkg.dec

    r77662 r80721  
    44# and libraries instances, which are used for those modules.
    55#
    6 # Copyright (c) 2007 - 2018, Intel Corporation. All rights reserved.<BR>
     6# Copyright (c) 2007 - 2019, Intel Corporation. All rights reserved.<BR>
    77# Copyright (c) 2016, Linaro Ltd. All rights reserved.<BR>
    88# (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>
    99# Copyright (c) 2017, AMD Incorporated. All rights reserved.<BR>
    1010# Copyright (c) 2016, Microsoft Corporation<BR>
    11 # This program and the accompanying materials are licensed and made available under
    12 # the terms and conditions of the BSD License that accompanies this distribution.
    13 # The full text of the license may be found at
    14 # http://opensource.org/licenses/bsd-license.php.
    15 #
    16 # THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
    17 # WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
     11# SPDX-License-Identifier: BSD-2-Clause-Patent
    1812#
    1913##
     
    3226
    3327[LibraryClasses]
    34   ##  @libraryclass  IpIo layer upon EFI IP4 Protocol.
    35   #   This library is only intended to be used by UEFI network stack modules.
    36   IpIoLib|Include/Library/IpIoLib.h
    37 
    38   ##  @libraryclass  Basic function for UEFI network stack.
    39   #   This library is only intended to be used by UEFI network stack modules.
    40   NetLib|Include/Library/NetLib.h
    41 
    42   ##  @libraryclass  The helper routines to access UDP service.
    43   #   This library is only intended to be used by UEFI network stack modules.
    44   UdpIoLib|Include/Library/UdpIoLib.h
    45 
    46   ##  @libraryclass  The helper routines to access TCP service.
    47   #   This library is only intended to be used by UEFI network stack modules.
    48   TcpIoLib|Include/Library/TcpIoLib.h
    49 
    50   ##  @libraryclass  The helper routines to access HTTP service.
    51   #   This library is only intended to be used by UEFI network stack modules.
    52   HttpLib|Include/Library/HttpLib.h
    53 
    5428  ##  @libraryclass  Defines a set of methods to reset whole system.
    5529  ResetSystemLib|Include/Library/ResetSystemLib.h
     
    5832  ResetUtilityLib|Include/Library/ResetUtilityLib.h
    5933
    60   ##  @libraryclass  Defines a set of methods related do S3 mode.
    61   #   This library class is no longer used and modules using this library should
    62   #   directly locate EFI_PEI_S3_RESUME_PPI defined in PI 1.2 specification.
    63   S3Lib|Include/Library/S3Lib.h
    64 
    65   ##  @libraryclass  Defines a set of methods related recovery mode.
    66   #   This library class is no longer used and modules using this library should
    67   #   directly locate EFI_PEI_RECOVERY_MODULE_PPI defined in PI 1.2 specification.
    68   RecoveryLib|Include/Library/RecoveryLib.h
    69 
    7034  ##  @libraryclass  Provides HII related functions.
    7135  HiiLib|Include/Library/HiiLib.h
     
    7337  ##  @libraryclass  Defines a set of interfaces on how to process capusle image update.
    7438  CapsuleLib|Include/Library/CapsuleLib.h
    75 
    76   ##  @libraryclass  Library for Deferred Procedure Calls.
    77   DpcLib|Include/Library/DpcLib.h
    7839
    7940  ##  @libraryclass    Provides global variables that are pointers
     
    261222  gPerformanceExProtocolGuid     = { 0x1ea81bec, 0xf01a, 0x4d98, { 0xa2, 0x1,  0x4a, 0x61, 0xce, 0x2f, 0xc0, 0x22 } }
    262223  gSmmPerformanceExProtocolGuid  = { 0x931fc048, 0xc71d, 0x4455, { 0x89, 0x30, 0x47, 0x6,  0x30, 0xe3, 0xe,  0xe5 } }
     224  #  Include/Guid/PerformanceMeasurement.h
     225  gEdkiiPerformanceMeasurementProtocolGuid      = { 0xc85d06be, 0x5f75, 0x48ce, { 0xa8, 0x0f, 0x12, 0x36, 0xba, 0x3b, 0x87, 0xb1 } }
     226  gEdkiiSmmPerformanceMeasurementProtocolGuid   = { 0xd56b6d73, 0x1a7b, 0x4015, { 0x9b, 0xb4, 0x7b, 0x07, 0x17, 0x29, 0xed, 0x24 } }
    263227
    264228  ## Guid is defined for CRC32 encapsulation scheme.
     
    300264  ## Include/Guid/RecoveryDevice.h
    301265  gRecoveryOnDataCdGuid              = { 0x5CAC0099, 0x0DC9, 0x48E5, { 0x80, 0x68, 0xBB, 0x95, 0xF5, 0x40, 0x0A, 0x9F }}
     266
     267  ## Include/Guid/RecoveryDevice.h
     268  gRecoveryOnFatNvmeDiskGuid         = { 0xC770A27F, 0x956A, 0x497A, { 0x85, 0x48, 0xE0, 0x61, 0x97, 0x58, 0x8B, 0xF6 }}
    302269
    303270  ## Include/Guid/SmmLockBox.h
     
    417384  gEdkiiS3SmmInitDoneGuid = { 0x8f9d4825, 0x797d, 0x48fc, { 0x84, 0x71, 0x84, 0x50, 0x25, 0x79, 0x2e, 0xf6 } }
    418385
     386  ## Include/Guid/S3StorageDeviceInitList.h
     387  gS3StorageDeviceInitListGuid = { 0x310e9b8c, 0xcf90, 0x421e, { 0x8e, 0x9b, 0x9e, 0xef, 0xb6, 0x17, 0xc8, 0xef } }
     388
     389  ## Include/Guid/SerialPortLibVendor.h
     390  gEdkiiSerialPortLibVendorGuid = { 0xD3987D4B, 0x971A, 0x435F, { 0x8C, 0xAF, 0x49, 0x67, 0xEB, 0x62, 0x72, 0x41 } }
     391
     392  ## GUID indicates the capsule is to store Capsule On Disk file names.
     393  gEdkiiCapsuleOnDiskNameGuid = { 0x98c80a4f, 0xe16b, 0x4d11, { 0x93, 0x9a, 0xab, 0xe5, 0x61, 0x26, 0x3, 0x30 } }
     394
    419395[Ppis]
    420396  ## Include/Ppi/AtaController.h
     
    471447  ## Include/Ppi/PlatformSpecificResetHandler.h
    472448  gEdkiiPlatformSpecificResetHandlerPpiGuid = { 0x75cf14ae, 0x3441, 0x49dc, { 0xaa, 0x10, 0xbb, 0x35, 0xa7, 0xba, 0x8b, 0xab } }
     449
     450  ## Include/Ppi/NvmExpressHostController.h
     451  gEdkiiPeiNvmExpressHostControllerPpiGuid  = { 0xcae3aa63, 0x676f, 0x4da3, { 0xbd, 0x50, 0x6c, 0xc5, 0xed, 0xde, 0x9a, 0xad } }
     452
     453  ## Include/Ppi/AtaAhciController.h
     454  gEdkiiPeiAtaAhciHostControllerPpiGuid     = { 0x61dd33ea, 0x421f, 0x4cc0, { 0x89, 0x29, 0xff, 0xee, 0xa9, 0xa1, 0xa2, 0x61 } }
     455
     456  ## Include/Ppi/StorageSecurityCommand.h
     457  gEdkiiPeiStorageSecurityCommandPpiGuid    = { 0x35de0b4e, 0x30fb, 0x46c3, { 0xbd, 0x84, 0x1f, 0xdb, 0xa1, 0x58, 0xbb, 0x56 } }
     458
     459  ## Include/Ppi/AtaPassThru.h
     460  gEdkiiPeiAtaPassThruPpiGuid               = { 0xa16473fd, 0xd474, 0x4c89, { 0xae, 0xc7, 0x90, 0xb8, 0x3c, 0x73, 0x86, 0x9  } }
     461
     462  ## Include/Ppi/Debug.h
     463  gEdkiiDebugPpiGuid                        = { 0x999e699c, 0xb013, 0x475e, { 0xb1, 0x7b, 0xf3, 0xa8, 0xae, 0x5c, 0x48, 0x75 } }
     464
     465  ## Include/Ppi/NvmExpressPassThru.h
     466  gEdkiiPeiNvmExpressPassThruPpiGuid    = { 0x6af31b2c, 0x3be, 0x46c1, { 0xb1, 0x2d, 0xea, 0x4a, 0x36, 0xdf, 0xa7, 0x4c } }
     467
     468  ## Include/Ppi/CapsuleOnDisk.h
     469  gEdkiiPeiCapsuleOnDiskPpiGuid             = { 0x71a9ea61, 0x5a35, 0x4a5d, { 0xac, 0xef, 0x9c, 0xf8, 0x6d, 0x6d, 0x67, 0xe0 } }
     470  gEdkiiPeiBootInCapsuleOnDiskModePpiGuid   = { 0xb08a11e4, 0xe2b7, 0x4b75, { 0xb5, 0x15, 0xaf, 0x61, 0x6, 0x68, 0xbf, 0xd1  } }
    473471
    474472[Protocols]
     
    492490  gEfiDebuggerConfigurationProtocolGuid = { 0x577d959c, 0xe967, 0x4546, { 0x86, 0x20, 0xc7, 0x78, 0xfa, 0xe5, 0xda, 0x05 }}
    493491
    494   ## Include/Protocol/Dpc.h
    495   gEfiDpcProtocolGuid            = {0x480f8ae9, 0xc46, 0x4aa9,  { 0xbc, 0x89, 0xdb, 0x9f, 0xba, 0x61, 0x98, 0x6 }}
    496 
    497492  ## Fault Tolerant Write protocol provides boot-time service to do fault tolerant write capability for block devices.
    498493  #  Include/Protocol/FaultTolerantWrite.h
     
    561556  gEdkiiUfsHostControllerProtocolGuid = { 0xebc01af5, 0x7a9, 0x489e, { 0xb7, 0xce, 0xdc, 0x8, 0x9e, 0x45, 0x9b, 0x2f } }
    562557
     558  ## Include/Protocol/UfsHostControllerPlatform.h
     559  gEdkiiUfsHcPlatformProtocolGuid = { 0x3d18ba13, 0xd9b1, 0x4dd4, {0xb9, 0x16, 0xd3, 0x07, 0x96, 0x53, 0x9e, 0xd8}}
     560
    563561  ## Include/Protocol/EsrtManagement.h
    564562  gEsrtManagementProtocolGuid         = { 0xa340c064, 0x723c, 0x4a9c, { 0xa4, 0xdd, 0xd5, 0xb4, 0x7a, 0x26, 0xfb, 0xb0 }}
     
    595593  ## Include/Protocol/SmmMemoryAttribute.h
    596594  gEdkiiSmmMemoryAttributeProtocolGuid = { 0x69b792ea, 0x39ce, 0x402d, { 0xa2, 0xa6, 0xf7, 0x21, 0xde, 0x35, 0x1d, 0xfe } }
     595
     596  ## Include/Protocol/SdMmcOverride.h
     597  gEdkiiSdMmcOverrideProtocolGuid = { 0xeaf9e3c1, 0xc9cd, 0x46db, { 0xa5, 0xe5, 0x5a, 0x12, 0x4c, 0x83, 0x23, 0x23 } }
    597598
    598599  ## Include/Protocol/PlatformSpecificResetFilter.h
     
    603604  ## Include/Protocol/FirmwareManagementProgress.h
    604605  gEdkiiFirmwareManagementProgressProtocolGuid = { 0x1849bda2, 0x6952, 0x4e86, { 0xa1, 0xdb, 0x55, 0x9a, 0x3c, 0x47, 0x9d, 0xf1 } }
     606
     607  ## Include/Protocol/AtaAtapiPolicy.h
     608  gEdkiiAtaAtapiPolicyProtocolGuid = { 0xe59cd769, 0x5083, 0x4f26,{ 0x90, 0x94, 0x6c, 0x91, 0x9f, 0x91, 0x6c, 0x4e } }
     609
     610  ## Include/Protocol/PeCoffImageEmulator.h
     611  gEdkiiPeCoffImageEmulatorProtocolGuid = { 0x96f46153, 0x97a7, 0x4793, { 0xac, 0xc1, 0xfa, 0x19, 0xbf, 0x78, 0xea, 0x97 } }
    605612
    606613#
     
    707714  gEfiMdeModulePkgTokenSpaceGuid.PcdDisableDefaultKeyboardLayoutInUsbKbDriver|FALSE|BOOLEAN|0x00010200
    708715
    709   ## Indicates if backward compatibility to Framework HII and Framework FvHob is supported.<BR><BR>
    710   #   TRUE  - Setup Browser supports GUID opcodes generated from Framework HII VFR file by VFR compiler.
    711   #           the PeiCore will handle the framework FvHob and install FvInfo PPI for it.<BR>
    712   #   FALSE - Setup Browser doesn't support GUID opcodes generated from Framework HII VFR file by VFR compiler.
    713   #           the PeiCore will not handle the framework FvHob and install FvInfo PPI for it.<BR>
    714   # @Prompt Enable framework backward compatibility support.
    715   gEfiMdeModulePkgTokenSpaceGuid.PcdFrameworkCompatibilitySupport|FALSE|BOOLEAN|0x00012009
    716 
    717716  ## Indicates if HelloWorld Application will print the verbose information.
    718717  #  This PCD is a sample to explain FeatureFlag PCD usage.<BR><BR>
     
    919918  #    BIT0    - Enable NULL pointer detection for UEFI.<BR>
    920919  #    BIT1    - Enable NULL pointer detection for SMM.<BR>
    921   #    BIT2..6 - Reserved for future uses.<BR>
     920  #    BIT2..5 - Reserved for future uses.<BR>
     921  #    BIT6    - Enable non-stop mode.<BR>
    922922  #    BIT7    - Disable NULL pointer detection just after EndOfDxe. <BR>
    923923  #              This is a workaround for those unsolvable NULL access issues in
     
    940940  # free pages for all of them. The page allocation for the type related to
    941941  # cleared bits keeps the same as ususal.
     942  #
     943  # This PCD is only valid if BIT0 and/or BIT2 are set in PcdHeapGuardPropertyMask.
    942944  #
    943945  # Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>
     
    970972  # type related to cleared bits keeps the same as ususal.
    971973  #
     974  # This PCD is only valid if BIT1 and/or BIT3 are set in PcdHeapGuardPropertyMask.
     975  #
    972976  # Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>
    973977  #  EfiReservedMemoryType             0x0000000000000001<BR>
     
    993997
    994998  ## This mask is to control Heap Guard behavior.
    995   # Note that due to the limit of pool memory implementation and the alignment
    996   # requirement of UEFI spec, BIT7 is a try-best setting which cannot guarantee
    997   # that the returned pool is exactly adjacent to head guard page or tail guard
    998   # page.
     999  #
     1000  # Note:
     1001  #   a) Heap Guard is for debug purpose and should not be enabled in product
     1002  #      BIOS.
     1003  #   b) Due to the limit of pool memory implementation and the alignment
     1004  #      requirement of UEFI spec, BIT7 is a try-best setting which cannot
     1005  #      guarantee that the returned pool is exactly adjacent to head guard
     1006  #      page or tail guard page.
     1007  #   c) UEFI freed-memory guard and UEFI pool/page guard cannot be enabled
     1008  #      at the same time.
     1009  #
    9991010  #   BIT0 - Enable UEFI page guard.<BR>
    10001011  #   BIT1 - Enable UEFI pool guard.<BR>
    10011012  #   BIT2 - Enable SMM page guard.<BR>
    10021013  #   BIT3 - Enable SMM pool guard.<BR>
     1014  #   BIT4 - Enable UEFI freed-memory guard (Use-After-Free memory detection).<BR>
     1015  #   BIT6 - Enable non-stop mode.<BR>
    10031016  #   BIT7 - The direction of Guard Page for Pool Guard.
    10041017  #          0 - The returned pool is near the tail guard page.<BR>
     
    10261039  gEfiMdeModulePkgTokenSpaceGuid.PcdVpdBaseAddress|0x0|UINT32|0x00010010
    10271040
    1028   ## Maximum number of FV is supported by PeiCore's dispatching.
    1029   # @Prompt Maximum number of FV supported by PeiCore.
    1030   gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxFvSupported|6|UINT32|0x00010030
    1031 
    1032   ## Maximum File count in every FV is supported by PeiCore's dispatching.
    1033   #  PeiCore supported File type includes PEIM, Combined PEIM and FV.
    1034   # @Prompt Maximum File count per FV supported by PeiCore.
    1035   gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxPeimPerFv|32|UINT32|0x00010031
    1036 
    10371041  ## Maximum stack size for PeiCore.
    10381042  # @Prompt Maximum stack size for PeiCore.
    10391043  gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxPeiStackSize|0x20000|UINT32|0x00010032
    1040 
    1041   ## Maximum PPI count is supported by PeiCore's PPI database.
    1042   # @Prompt Maximum PPI count supported by PeiCore.
    1043   gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxPpiSupported|64|UINT32|0x00010033
    10441044
    10451045  ## The maximum size of a single non-HwErr type variable.
     
    10511051  # @Prompt Maximum authenticated variable size.
    10521052  gEfiMdeModulePkgTokenSpaceGuid.PcdMaxAuthVariableSize|0x00|UINT32|0x30000009
     1053
     1054  ## The maximum size of a single non-authenticated volatile variable.
     1055  # The default value is 0 for compatibility: in that case, the maximum
     1056  # non-authenticated volatile variable size remains specified by
     1057  # PcdMaxVariableSize. Only the MdeModulePkg/Universal/Variable/RuntimeDxe
     1058  # driver supports this PCD.
     1059  # @Prompt Maximum non-authenticated volatile variable size.
     1060  gEfiMdeModulePkgTokenSpaceGuid.PcdMaxVolatileVariableSize|0x00|UINT32|0x3000000a
    10531061
    10541062  ## The maximum size of single hardware error record variable.<BR><BR>
     
    11301138  # @Prompt Serial port registers use MMIO.
    11311139  gEfiMdeModulePkgTokenSpaceGuid.PcdSerialUseMmio|FALSE|BOOLEAN|0x00020000
     1140
     1141  ## Indicates the access width for 16550 serial port registers.
     1142  # Default is 8-bit access mode.<BR><BR>
     1143  #    8  - 16550 serial port registers are accessed in 8-bit width.<BR>
     1144  #   32 - 16550 serial port registers are accessed in 32-bit width.<BR>
     1145  # @Prompt Serial port register access width.
     1146  gEfiMdeModulePkgTokenSpaceGuid.PcdSerialRegisterAccessWidth|8|UINT8|0x00020007
    11321147
    11331148  ## Indicates if the 16550 serial port hardware flow control will be enabled. Default is FALSE.<BR><BR>
     
    12651280  #  If a bit is set, the image will be protected by DxeCore if it is aligned.
    12661281  #   The code section becomes read-only, and the data section becomes non-executable.
    1267   #  If a bit is clear, the image will not be protected.<BR><BR>
     1282  #  If a bit is clear, nothing will be done to image code/data sections.<BR><BR>
    12681283  #    BIT0       - Image from unknown device. <BR>
    12691284  #    BIT1       - Image from firmware volume.<BR>
     1285  #  <BR>
     1286  #  Note: If a bit is cleared, the data section could be still non-executable if
     1287  #  PcdDxeNxMemoryProtectionPolicy is enabled for EfiLoaderData, EfiBootServicesData
     1288  #  and/or EfiRuntimeServicesData.<BR>
     1289  #  <BR>
    12701290  # @Prompt Set image protection policy.
    12711291  # @ValidRange 0x80000002 | 0x00000000 - 0x0000001F
     
    12741294  ## Set DXE memory protection policy. The policy is bitwise.
    12751295  #  If a bit is set, memory regions of the associated type will be mapped
    1276   #  non-executable.<BR><BR>
    1277   #
     1296  #  non-executable.<BR>
     1297  #  If a bit is cleared, nothing will be done to associated type of memory.<BR>
     1298  #  <BR>
    12781299  # Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>
    12791300  #  EfiReservedMemoryType          0x0001<BR>
     
    14581479  gEfiMdeModulePkgTokenSpaceGuid.PcdMaximumPeiResetNotifies|0x10|UINT32|0x0000010A
    14591480
     1481  ## Capsule On Disk is to deliver capsules via files on Mass Storage device.<BR><BR>
     1482  #  This PCD indicates if the Capsule On Disk is supported.<BR>
     1483  #   TRUE  - Capsule On Disk is supported.<BR>
     1484  #   FALSE - Capsule On Disk is not supported.<BR>
     1485  #  If platform does not use this feature, this PCD should be set to FALSE.<BR><BR>
     1486  #  Two sulotions to deliver Capsule On Disk:<BR>
     1487  #    a) If PcdCapsuleInRamSupport = TRUE, Load Capsule On Disk image out of TCB, and reuse
     1488  #       Capsule In Ram to deliver capsule.<BR>
     1489  #    b) If PcdCapsuleInRamSupport = FALSE, Relocate Capsule On Disk image to RootDir out
     1490  #       of TCB, and reuse FatPei to load capsules from external storage.<BR>
     1491  #  Note:<BR>
     1492  #    If Both Capsule In Ram and Capsule On Disk are provisioned at the same time, the Capsule
     1493  #  On Disk will be bypassed.
     1494  # @Prompt Enable Capsule On Disk support.
     1495  gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleOnDiskSupport|FALSE|BOOLEAN|0x0000002d
     1496
    14601497[PcdsPatchableInModule, PcdsDynamic, PcdsDynamicEx]
    14611498  ## This PCD defines the Console output row. The default value is 25 according to UEFI spec.
     
    15581595  gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase64|0x0|UINT64|0x80000010
    15591596
    1560   ## This PCD defines a reserved memory range for the EMU Variable driver's NV Variable Store.
    1561   #  The range is valid if non-zero. The memory range size must be PcdVariableStoreSize.
    1562   # @Prompt Reserved memory range for EMU variable NV storage.
     1597  ## Indicates if Variable driver will enable emulated variable NV mode.<BR><BR>
     1598  #  If this PCD is configured to dynamic, its value should be set before Variable driver starts to work,<BR>
     1599  #  otherwise default value will take effect.<BR>
     1600  #   TRUE  - An EMU variable NV storage will be allocated or reserved for NV variables.<BR>
     1601  #   FALSE - No EMU variable NV storage will be allocated or reserved for NV variables.<BR>
     1602  # @Prompt EMU variable NV mode enable.
     1603  gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvModeEnable|FALSE|BOOLEAN|0x01100001
     1604
     1605  ## This PCD defines the base address of reserved memory range for EMU variable NV storage.
     1606  #  A non-ZERO value indicates a valid range reserved with size given by PcdVariableStoreSize.
     1607  # @Prompt Base of reserved memory range for EMU variable NV storage.
    15631608  gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvStoreReserved|0|UINT64|0x40000008
    15641609
     
    16111656  # @Prompt Reset on memory type information change.
    16121657  gEfiMdeModulePkgTokenSpaceGuid.PcdResetOnMemoryTypeInformationChange|TRUE|BOOLEAN|0x00010056
     1658
     1659  ## Indicates if the BDS supports Platform Recovery.<BR><BR>
     1660  #   TRUE  - BDS supports Platform Recovery.<BR>
     1661  #   FALSE - BDS does not support Platform Recovery.<BR>
     1662  # @Prompt Support Platform Recovery.
     1663  gEfiMdeModulePkgTokenSpaceGuid.PcdPlatformRecoverySupport|TRUE|BOOLEAN|0x00010078
    16131664
    16141665  ## Specify the foreground color for Subtile text in HII Form Browser. The default value is EFI_BLUE.
     
    17421793  ## SMBIOS version.
    17431794  # @Prompt SMBIOS version.
    1744   gEfiMdeModulePkgTokenSpaceGuid.PcdSmbiosVersion|0x0301|UINT16|0x00010055
     1795  gEfiMdeModulePkgTokenSpaceGuid.PcdSmbiosVersion|0x0302|UINT16|0x00010055
    17451796
    17461797  ## SMBIOS Docrev field in SMBIOS 3.0 (64-bit) Entry Point Structure.
    17471798  # @Prompt SMBIOS Docrev field in SMBIOS 3.0 (64-bit) Entry Point Structure.
    1748   gEfiMdeModulePkgTokenSpaceGuid.PcdSmbiosDocRev|0x1|UINT8|0x0001006A
     1799  gEfiMdeModulePkgTokenSpaceGuid.PcdSmbiosDocRev|0x0|UINT8|0x0001006A
    17491800
    17501801  ## SMBIOS produce method.
     
    18671918  #  For the DxeIpl and the DxeCore are both IA32 (PcdDxeIplSwitchToLongMode is FALSE), set NX for stack feature also require
    18681919  #  IA32 PAE is supported and Execute Disable Bit is available.<BR>
    1869   #   TRUE  - to set NX for stack.<BR>
    1870   #   FALSE - Not to set NX for stack.<BR>
     1920  #  <BR>
     1921  #   TRUE  - Set NX for stack.<BR>
     1922  #   FALSE - Do nothing for stack.<BR>
     1923  #  <BR>
     1924  #  Note: If this PCD is set to FALSE, NX could be still applied to stack due to PcdDxeNxMemoryProtectionPolicy enabled for
     1925  #  EfiBootServicesData.<BR>
     1926  #  <BR>
    18711927  # @Prompt Set NX for stack.
    18721928  gEfiMdeModulePkgTokenSpaceGuid.PcdSetNxForStack|FALSE|BOOLEAN|0x0001006f
     
    19041960  gEfiMdeModulePkgTokenSpaceGuid.PcdRecoveryFileName|L"FVMAIN.FV"|VOID*|0x30001045
    19051961
     1962  ## This is Capsule Temp Relocation file name in PEI phase.
     1963  #  The file must be in the root directory.
     1964  #  The file name must be the 8.3 format.
     1965  #  The PCD data must be in UNICODE format.
     1966  #  CapsuleOnDiskLoadPei PEI module will set value of this PCD to PcdRecoveryFileName, then
     1967  #  leverage recovery to get Capsule On Disk Temp Relocation file.
     1968  #  Note: The file name must be shorter than PcdRecoveryFileName, otherwise CapsuleOnDiskLoadPei
     1969  #  PEI module will fail to get Capsule On Disk Temp Relocation file.
     1970  # @Prompt Capsule On Disk Temp Relocation file name in PEI phase
     1971  gEfiMdeModulePkgTokenSpaceGuid.PcdCoDRelocationFileName|L"Cod.tmp"|VOID*|0x30001048
     1972
    19061973  ## This PCD hold a list GUIDs for the ImageTypeId to indicate the
    19071974  #  FMP capsule is a system FMP.
     
    19141981  # @Prompt The address mask when memory encryption is enabled.
    19151982  gEfiMdeModulePkgTokenSpaceGuid.PcdPteMemoryEncryptionAddressOrMask|0x0|UINT64|0x30001047
     1983
     1984  ## Indicates if 5-Level Paging will be enabled in long mode. 5-Level Paging will not be enabled
     1985  #  when the PCD is TRUE but CPU doesn't support 5-Level Paging.
     1986  #   TRUE  - 5-Level Paging will be enabled.<BR>
     1987  #   FALSE - 5-Level Paging will not be enabled.<BR>
     1988  # @Prompt Enable 5-Level Paging support in long mode.
     1989  gEfiMdeModulePkgTokenSpaceGuid.PcdUse5LevelPageTable|FALSE|BOOLEAN|0x0001105F
     1990
     1991  ## Capsule In Ram is to use memory to deliver the capsules that will be processed after system
     1992  #  reset.<BR><BR>
     1993  #  This PCD indicates if the Capsule In Ram is supported.<BR>
     1994  #   TRUE  - Capsule In Ram is supported.<BR>
     1995  #   FALSE - Capsule In Ram is not supported.
     1996  # @Prompt Enable Capsule In Ram support.
     1997  gEfiMdeModulePkgTokenSpaceGuid.PcdCapsuleInRamSupport|TRUE|BOOLEAN|0x0000002e
     1998
     1999  ## Full device path of plaform specific device to store Capsule On Disk temp relocation file.<BR>
     2000  #  If this PCD is set, Capsule On Disk temp relocation file will be stored in the device specified
     2001  #  by this PCD, instead of the EFI System Partition that stores capsule image file.
     2002  # @Prompt Capsule On Disk relocation device path.
     2003  gEfiMdeModulePkgTokenSpaceGuid.PcdCodRelocationDevPath|{0xFF}|VOID*|0x0000002f
    19162004
    19172005[PcdsPatchableInModule]
     
    19612049  gEfiMdeModulePkgTokenSpaceGuid.PcdS3BootScriptTablePrivateSmmDataPtr|0x0|UINT64|0x00030001
    19622050
    1963   ## This dynamic PCD hold an address to point to the memory of page table. The page table establishes a 1:1
    1964   #  Virtual to Physical mapping according to the processor physical address bits.
    1965   # @Prompt Identify Mapping Page Table pointer.
    1966   # @ValidList  0x80000001 | 0x0
    1967   gEfiMdeModulePkgTokenSpaceGuid.PcdIdentifyMappingPageTablePtr|0x0|UINT64|0x00030002
    1968 
    19692051  ## This dynamic PCD holds the information if there is any test key used by the platform.
    19702052  # @Prompt If there is any test key used by the platform.
     
    19822064  gEfiMdeModulePkgTokenSpaceGuid.PcdNvStoreDefaultValueBuffer|{0x0}|VOID*|0x00030005
    19832065
     2066  ## VPD type PCD allows a developer to point to an absolute physical address PcdVpdBaseAddress64
     2067  #  to store PCD value. It will be DynamicExDefault only.
     2068  #  It is used to set VPD region base address. So, it can't be DynamicExVpd PCD. Its value is
     2069  #  required to be accessed in PcdDxe driver entry point. So, its value must be set in PEI phase.
     2070  #  It can't depend on EFI variable service, and can't be DynamicExHii PCD.
     2071  # @Prompt 64bit VPD base address.
     2072  gEfiMdeModulePkgTokenSpaceGuid.PcdVpdBaseAddress64|0x0|UINT64|0x00030006
     2073
    19842074[UserExtensions.TianoCore."ExtraFiles"]
    19852075  MdeModulePkgExtra.uni
Note: See TracChangeset for help on using the changeset viewer.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette