# It also provides the definitions(including PPIs/PROTOCOLs/GUIDs and library classes)\r
# and libraries instances, which are used for those modules.\r
#\r
-# Copyright (c) 2007 - 2018, Intel Corporation. All rights reserved.<BR>\r
+# Copyright (c) 2007 - 2019, Intel Corporation. All rights reserved.<BR>\r
# Copyright (c) 2016, Linaro Ltd. All rights reserved.<BR>\r
# (C) Copyright 2016 Hewlett Packard Enterprise Development LP<BR>\r
# Copyright (c) 2017, AMD Incorporated. All rights reserved.<BR>\r
gSmmPerformanceProtocolGuid = { 0xf866226a, 0xeaa5, 0x4f5a, { 0xa9, 0xa, 0x6c, 0xfb, 0xa5, 0x7c, 0x58, 0x8e } }\r
gPerformanceExProtocolGuid = { 0x1ea81bec, 0xf01a, 0x4d98, { 0xa2, 0x1, 0x4a, 0x61, 0xce, 0x2f, 0xc0, 0x22 } }\r
gSmmPerformanceExProtocolGuid = { 0x931fc048, 0xc71d, 0x4455, { 0x89, 0x30, 0x47, 0x6, 0x30, 0xe3, 0xe, 0xe5 } }\r
+ # Include/Guid/PerformanceMeasurement.h\r
+ gEdkiiPerformanceMeasurementProtocolGuid = { 0xc85d06be, 0x5f75, 0x48ce, { 0xa8, 0x0f, 0x12, 0x36, 0xba, 0x3b, 0x87, 0xb1 } }\r
+ gEdkiiSmmPerformanceMeasurementProtocolGuid = { 0xd56b6d73, 0x1a7b, 0x4015, { 0x9b, 0xb4, 0x7b, 0x07, 0x17, 0x29, 0xed, 0x24 } }\r
\r
## Guid is defined for CRC32 encapsulation scheme.\r
# Include/Guid/Crc32GuidedSectionExtraction.h\r
## Include/Guid/RecoveryDevice.h\r
gRecoveryOnDataCdGuid = { 0x5CAC0099, 0x0DC9, 0x48E5, { 0x80, 0x68, 0xBB, 0x95, 0xF5, 0x40, 0x0A, 0x9F }}\r
\r
+ ## Include/Guid/RecoveryDevice.h\r
+ gRecoveryOnFatNvmeDiskGuid = { 0xC770A27F, 0x956A, 0x497A, { 0x85, 0x48, 0xE0, 0x61, 0x97, 0x58, 0x8B, 0xF6 }}\r
+\r
## Include/Guid/SmmLockBox.h\r
gEfiSmmLockBoxCommunicationGuid = { 0x2a3cfebd, 0x27e8, 0x4d0a, { 0x8b, 0x79, 0xd6, 0x88, 0xc2, 0xa3, 0xe1, 0xc0 }}\r
\r
# If enabled, accessing NULL address in UEFI or SMM code can be caught.<BR><BR>\r
# BIT0 - Enable NULL pointer detection for UEFI.<BR>\r
# BIT1 - Enable NULL pointer detection for SMM.<BR>\r
- # BIT2..6 - Reserved for future uses.<BR>\r
+ # BIT2..5 - Reserved for future uses.<BR>\r
+ # BIT6 - Enable non-stop mode.<BR>\r
# BIT7 - Disable NULL pointer detection just after EndOfDxe. <BR>\r
# This is a workaround for those unsolvable NULL access issues in\r
# OptionROM, boot loader, etc. It can also help to avoid unnecessary\r
# free pages for all of them. The page allocation for the type related to\r
# cleared bits keeps the same as ususal.\r
#\r
+ # This PCD is only valid if BIT0 and/or BIT2 are set in PcdHeapGuardPropertyMask.\r
+ #\r
# Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>\r
# EfiReservedMemoryType 0x0000000000000001<BR>\r
# EfiLoaderCode 0x0000000000000002<BR>\r
# if there's enough free memory for all of them. The pool allocation for the\r
# type related to cleared bits keeps the same as ususal.\r
#\r
+ # This PCD is only valid if BIT1 and/or BIT3 are set in PcdHeapGuardPropertyMask.\r
+ #\r
# Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>\r
# EfiReservedMemoryType 0x0000000000000001<BR>\r
# EfiLoaderCode 0x0000000000000002<BR>\r
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPoolType|0x0|UINT64|0x30001053\r
\r
## This mask is to control Heap Guard behavior.\r
- # Note that due to the limit of pool memory implementation and the alignment\r
- # requirement of UEFI spec, BIT7 is a try-best setting which cannot guarantee\r
- # that the returned pool is exactly adjacent to head guard page or tail guard\r
- # page.\r
+ #\r
+ # Note:\r
+ # a) Heap Guard is for debug purpose and should not be enabled in product\r
+ # BIOS.\r
+ # b) Due to the limit of pool memory implementation and the alignment\r
+ # requirement of UEFI spec, BIT7 is a try-best setting which cannot\r
+ # guarantee that the returned pool is exactly adjacent to head guard\r
+ # page or tail guard page.\r
+ # c) UEFI freed-memory guard and UEFI pool/page guard cannot be enabled\r
+ # at the same time.\r
+ #\r
# BIT0 - Enable UEFI page guard.<BR>\r
# BIT1 - Enable UEFI pool guard.<BR>\r
# BIT2 - Enable SMM page guard.<BR>\r
# BIT3 - Enable SMM pool guard.<BR>\r
+ # BIT4 - Enable UEFI freed-memory guard (Use-After-Free memory detection).<BR>\r
+ # BIT6 - Enable non-stop mode.<BR>\r
# BIT7 - The direction of Guard Page for Pool Guard.\r
# 0 - The returned pool is near the tail guard page.<BR>\r
# 1 - The returned pool is near the head guard page.<BR>\r
# @Prompt VPD base address.\r
gEfiMdeModulePkgTokenSpaceGuid.PcdVpdBaseAddress|0x0|UINT32|0x00010010\r
\r
- ## Maximum number of FV is supported by PeiCore's dispatching.\r
- # @Prompt Maximum number of FV supported by PeiCore.\r
- gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxFvSupported|6|UINT32|0x00010030\r
-\r
- ## Maximum File count in every FV is supported by PeiCore's dispatching.\r
- # PeiCore supported File type includes PEIM, Combined PEIM and FV.\r
- # @Prompt Maximum File count per FV supported by PeiCore.\r
- gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxPeimPerFv|32|UINT32|0x00010031\r
-\r
## Maximum stack size for PeiCore.\r
# @Prompt Maximum stack size for PeiCore.\r
gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxPeiStackSize|0x20000|UINT32|0x00010032\r
\r
- ## Maximum PPI count is supported by PeiCore's PPI database.\r
- # @Prompt Maximum PPI count supported by PeiCore.\r
- gEfiMdeModulePkgTokenSpaceGuid.PcdPeiCoreMaxPpiSupported|64|UINT32|0x00010033\r
-\r
## The maximum size of a single non-HwErr type variable.\r
# @Prompt Maximum variable size.\r
gEfiMdeModulePkgTokenSpaceGuid.PcdMaxVariableSize|0x400|UINT32|0x30000003\r
## Set image protection policy. The policy is bitwise.\r
# If a bit is set, the image will be protected by DxeCore if it is aligned.\r
# The code section becomes read-only, and the data section becomes non-executable.\r
- # If a bit is clear, the image will not be protected.<BR><BR>\r
+ # If a bit is clear, nothing will be done to image code/data sections.<BR><BR>\r
# BIT0 - Image from unknown device. <BR>\r
# BIT1 - Image from firmware volume.<BR>\r
+ # <BR>\r
+ # Note: If a bit is cleared, the data section could be still non-executable if\r
+ # PcdDxeNxMemoryProtectionPolicy is enabled for EfiLoaderData, EfiBootServicesData\r
+ # and/or EfiRuntimeServicesData.<BR>\r
+ # <BR>\r
# @Prompt Set image protection policy.\r
# @ValidRange 0x80000002 | 0x00000000 - 0x0000001F\r
gEfiMdeModulePkgTokenSpaceGuid.PcdImageProtectionPolicy|0x00000002|UINT32|0x00001047\r
\r
## Set DXE memory protection policy. The policy is bitwise.\r
# If a bit is set, memory regions of the associated type will be mapped\r
- # non-executable.<BR><BR>\r
- #\r
+ # non-executable.<BR>\r
+ # If a bit is cleared, nothing will be done to associated type of memory.<BR>\r
+ # <BR>\r
# Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>\r
# EfiReservedMemoryType 0x0001<BR>\r
# EfiLoaderCode 0x0002<BR>\r
# @Prompt 64-bit Base address of flash FTW working block range.\r
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase64|0x0|UINT64|0x80000010\r
\r
- ## This PCD defines a reserved memory range for the EMU Variable driver's NV Variable Store.\r
- # The range is valid if non-zero. The memory range size must be PcdVariableStoreSize.\r
- # @Prompt Reserved memory range for EMU variable NV storage.\r
+ ## Indicates if Variable driver will enable emulated variable NV mode.<BR><BR>\r
+ # If this PCD is configured to dynamic, its value should be set before Variable driver starts to work,<BR>\r
+ # otherwise default value will take effect.<BR>\r
+ # TRUE - An EMU variable NV storage will be allocated or reserved for NV variables.<BR>\r
+ # FALSE - No EMU variable NV storage will be allocated or reserved for NV variables.<BR>\r
+ # @Prompt EMU variable NV mode enable.\r
+ gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvModeEnable|FALSE|BOOLEAN|0x01100001\r
+\r
+ ## This PCD defines the base address of reserved memory range for EMU variable NV storage.\r
+ # A non-ZERO value indicates a valid range reserved with size given by PcdVariableStoreSize.\r
+ # @Prompt Base of reserved memory range for EMU variable NV storage.\r
gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvStoreReserved|0|UINT64|0x40000008\r
\r
## This PCD defines the times to print hello world string.\r
\r
## SMBIOS version.\r
# @Prompt SMBIOS version.\r
- gEfiMdeModulePkgTokenSpaceGuid.PcdSmbiosVersion|0x0301|UINT16|0x00010055\r
+ gEfiMdeModulePkgTokenSpaceGuid.PcdSmbiosVersion|0x0302|UINT16|0x00010055\r
\r
## SMBIOS Docrev field in SMBIOS 3.0 (64-bit) Entry Point Structure.\r
# @Prompt SMBIOS Docrev field in SMBIOS 3.0 (64-bit) Entry Point Structure.\r
- gEfiMdeModulePkgTokenSpaceGuid.PcdSmbiosDocRev|0x1|UINT8|0x0001006A\r
+ gEfiMdeModulePkgTokenSpaceGuid.PcdSmbiosDocRev|0x0|UINT8|0x0001006A\r
\r
## SMBIOS produce method.\r
# BIT0 set indicates 32-bit entry point and table are produced.<BR>\r
# For the DxeIpl and the DxeCore are both X64, set NX for stack feature also require PcdDxeIplBuildPageTables be TRUE.<BR>\r
# For the DxeIpl and the DxeCore are both IA32 (PcdDxeIplSwitchToLongMode is FALSE), set NX for stack feature also require\r
# IA32 PAE is supported and Execute Disable Bit is available.<BR>\r
- # TRUE - to set NX for stack.<BR>\r
- # FALSE - Not to set NX for stack.<BR>\r
+ # <BR>\r
+ # TRUE - Set NX for stack.<BR>\r
+ # FALSE - Do nothing for stack.<BR>\r
+ # <BR>\r
+ # Note: If this PCD is set to FALSE, NX could be still applied to stack due to PcdDxeNxMemoryProtectionPolicy enabled for\r
+ # EfiBootServicesData.<BR>\r
+ # <BR>\r
# @Prompt Set NX for stack.\r
gEfiMdeModulePkgTokenSpaceGuid.PcdSetNxForStack|FALSE|BOOLEAN|0x0001006f\r
\r
gEfiMdeModulePkgTokenSpaceGuid.PcdAcpiS3Enable|TRUE|BOOLEAN|0x01100000\r
\r
## Specify memory size for boot script executor stack usage in S3 phase.\r
- # The default size 32K. When changing the value make sure the memory size is large enough \r
+ # The default size 32K. When changing the value make sure the memory size is large enough\r
# to meet boot script executor requirement in the S3 phase.\r
# @Prompt Reserved S3 Boot Script Stack ACPI Memory Size\r
gEfiMdeModulePkgTokenSpaceGuid.PcdS3BootScriptStackSize|0x8000|UINT32|0x02000000\r
# @ValidList 0x80000001 | 0x0\r
gEfiMdeModulePkgTokenSpaceGuid.PcdS3BootScriptTablePrivateSmmDataPtr|0x0|UINT64|0x00030001\r
\r
- ## This dynamic PCD hold an address to point to the memory of page table. The page table establishes a 1:1\r
- # Virtual to Physical mapping according to the processor physical address bits.\r
- # @Prompt Identify Mapping Page Table pointer.\r
- # @ValidList 0x80000001 | 0x0\r
- gEfiMdeModulePkgTokenSpaceGuid.PcdIdentifyMappingPageTablePtr|0x0|UINT64|0x00030002\r
-\r
## This dynamic PCD holds the information if there is any test key used by the platform.\r
# @Prompt If there is any test key used by the platform.\r
gEfiMdeModulePkgTokenSpaceGuid.PcdTestKeyUsed|FALSE|BOOLEAN|0x00030003\r
# @Prompt NV Storage Default Value Buffer\r
gEfiMdeModulePkgTokenSpaceGuid.PcdNvStoreDefaultValueBuffer|{0x0}|VOID*|0x00030005\r
\r
+ ## VPD type PCD allows a developer to point to an absolute physical address PcdVpdBaseAddress64\r
+ # to store PCD value. It will be DynamicExDefault only.\r
+ # It is used to set VPD region base address. So, it can't be DynamicExVpd PCD. Its value is\r
+ # required to be accessed in PcdDxe driver entry point. So, its value must be set in PEI phase.\r
+ # It can't depend on EFI variable service, and can't be DynamicExHii PCD.\r
+ # @Prompt 64bit VPD base address.\r
+ gEfiMdeModulePkgTokenSpaceGuid.PcdVpdBaseAddress64|0x0|UINT64|0x00030006\r
+\r
[UserExtensions.TianoCore."ExtraFiles"]\r
MdeModulePkgExtra.uni\r