// It also provides the definitions(including PPIs/PROTOCOLs/GUIDs and library classes)\r
// and libraries instances, which are used for those modules.\r
//\r
-// Copyright (c) 2007 - 2016, Intel Corporation. All rights reserved.<BR>\r
+// Copyright (c) 2007 - 2018, Intel Corporation. All rights reserved.<BR>\r
//\r
// This program and the accompanying materials are licensed and made available under\r
// the terms and conditions of the BSD License that accompanies this distribution.\r
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxAuthVariableSize_HELP #language en-US "The maximum size of a single authenticated variable."\r
"The value is 0 as default for compatibility that maximum authenticated variable size is specified by PcdMaxVariableSize."\r
\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxVolatileVariableSize_PROMPT #language en-US "The maximum size of a single non-authenticated volatile variable."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxVolatileVariableSize_HELP #language en-US "The maximum size of a single non-authenticated volatile variable.<BR><BR>\n"\r
+ "The default value is 0 for compatibility: in that case, the maximum "\r
+ "non-authenticated volatile variable size remains specified by "\r
+ "PcdMaxVariableSize.<BR>\n"\r
+ "Only the MdeModulePkg/Universal/Variable/RuntimeDxe driver supports this PCD.<BR>"\r
+\r
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxHardwareErrorVariableSize_PROMPT #language en-US "Maximum HwErr variable size"\r
\r
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxHardwareErrorVariableSize_HELP #language en-US "The maximum size of single hardware error record variable.<BR><BR>\n"\r
"For the DxeIpl and the DxeCore are both X64, set NX for stack feature also require PcdDxeIplBuildPageTables be TRUE.<BR>"\r
"For the DxeIpl and the DxeCore are both IA32 (PcdDxeIplSwitchToLongMode is FALSE), set NX for stack feature also require"\r
"IA32 PAE is supported and Execute Disable Bit is available.<BR>"\r
- "TRUE - to set NX for stack.<BR>"\r
- "FALSE - Not to set NX for stack.<BR>"\r
+ "TRUE - Set NX for stack.<BR>"\r
+ "FALSE - Do nothing for stack.<BR>"\r
+ "Note: If this PCD is set to FALSE, NX could be still applied to stack due to PcdDxeNxMemoryProtectionPolicy enabled for EfiBootServicesData.<BR>"\r
\r
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAcpiS3Enable_PROMPT #language en-US "ACPI S3 Enable"\r
\r
\r
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleMax_HELP #language en-US "CapsuleMax value in capsule report variable."\r
\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaximumPeiResetNotifies_PROMPT #language en-US "Maximum Number of PEI Reset Filters, Reset Notifications or Reset Handlers."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaximumPeiResetNotifies_HELP #language en-US "Indicates the allowable maximum number of Reset Filters, <BR>\n"\r
+ "Reset Notifications or Reset Handlers in PEI phase."\r
+\r
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdRecoveryFileName_PROMPT #language en-US "Recover file name in PEI phase"\r
\r
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdRecoveryFileName_HELP #language en-US "This is recover file name in PEI phase.\n"\r
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdImageProtectionPolicy_HELP #language en-US "Set image protection policy. The policy is bitwise.\n"\r
"If a bit is set, the image will be protected by DxeCore if it is aligned.\n"\r
"The code section becomes read-only, and the data section becomes non-executable.\n"\r
- "If a bit is clear, the image will not be protected.<BR><BR>\n"\r
+ "If a bit is clear, nothing will be done to image code/data sections.<BR><BR>\n"\r
"BIT0 - Image from unknown device. <BR>\n"\r
"BIT1 - Image from firmware volume.<BR>"\r
+ "Note: If a bit is cleared, the data section could be still non-executable if\n"\r
+ "PcdDxeNxMemoryProtectionPolicy is enabled for EfiLoaderData, EfiBootServicesData\n"\r
+ "and/or EfiRuntimeServicesData.<BR>"\r
\r
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdDxeNxMemoryProtectionPolicy_PROMPT #language en-US "Set DXE memory protection policy."\r
\r
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdDxeNxMemoryProtectionPolicy_HELP #language en-US "Set DXE memory protection policy. The policy is bitwise.\n"\r
"If a bit is set, memory regions of the associated type will be mapped\n"\r
- "non-executable.<BR><BR>\n"\r
+ "non-executable.<BR>\n"\r
+ "If a bit is cleared, nothing will be done to associated type of memory.<BR><BR>\n"\r
"\n"\r
"Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>\n"\r
"EfiReservedMemoryType 0x0001<BR>\n"\r
\r
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPageType_PROMPT #language en-US "The memory type mask for Page Guard"\r
\r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPageType_HELP #language en-US "Indicates which type allocation need guard page.\n"\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPageType_HELP #language en-US "Indicates which type allocation need guard page.\n\n"\r
+ " If a bit is set, a head guard page and a tail guard page will be added just\n"\r
+ " before and after corresponding type of pages allocated if there's enough\n"\r
+ " free pages for all of them. The page allocation for the type related to\n"\r
+ " cleared bits keeps the same as ususal.\n\n"\r
" Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>\n"\r
" EfiReservedMemoryType 0x0000000000000001\n"\r
" EfiLoaderCode 0x0000000000000002\n"\r
\r
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPoolType_PROMPT #language en-US "The memory type mask for Pool Guard"\r
\r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPoolType_HELP #language en-US "Indicates which type allocation need guard page.\n"\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPoolType_HELP #language en-US "Indicates which type allocation need guard page.\n\n"\r
+ " If a bit is set, a head guard page and a tail guard page will be added just\n"\r
+ " before and after corresponding type of pages which the allocated pool occupies,\n"\r
+ " if there's enough free memory for all of them. The pool allocation for the\n"\r
+ " type related to cleared bits keeps the same as ususal.\n\n"\r
" Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>\n"\r
" EfiReservedMemoryType 0x0000000000000001\n"\r
" EfiLoaderCode 0x0000000000000002\n"\r
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPropertyMask_PROMPT #language en-US "The Heap Guard feature mask"\r
\r
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPropertyMask_HELP #language en-US "This mask is to control Heap Guard behavior.\n"\r
+ "Note that due to the limit of pool memory implementation and the alignment\n"\r
+ "requirement of UEFI spec, BIT7 is a try-best setting which cannot guarantee\n"\r
+ "that the returned pool is exactly adjacent to head guard page or tail guard\n"\r
+ "page.\n"\r
" BIT0 - Enable UEFI page guard.<BR>\n"\r
" BIT1 - Enable UEFI pool guard.<BR>\n"\r
" BIT2 - Enable SMM page guard.<BR>\n"\r
" BIT3 - Enable SMM pool guard.<BR>\n"\r
" BIT7 - The direction of Guard Page for Pool Guard.\n"\r
- " 0 - The returned pool is adjacent to the bottom guard page.<BR>\n"\r
- " 1 - The returned pool is adjacent to the top guard page.<BR>"\r
+ " 0 - The returned pool is near the tail guard page.<BR>\n"\r
+ " 1 - The returned pool is near the head guard page.<BR>"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCpuStackGuard_PROMPT #language en-US "Enable UEFI Stack Guard"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCpuStackGuard_HELP #language en-US "Indicates if UEFI Stack Guard will be enabled.\n"\r
+ " If enabled, stack overflow in UEFI can be caught, preventing chaotic consequences.<BR><BR>\n"\r
+ " TRUE - UEFI Stack Guard will be enabled.<BR>\n"\r
+ " FALSE - UEFI Stack Guard will be disabled.<BR>"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSetNvStoreDefaultId_PROMPT #language en-US "NV Storage DefaultId"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSetNvStoreDefaultId_HELP #language en-US "This dynamic PCD enables the default variable setting.\n"\r
+ " Its value is the default store ID value. The default value is zero as Standard default.\n"\r
+ " When its value is set in PEI, it will trig the default setting to be applied as the default EFI variable.\n"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdNvStoreDefaultValueBuffer_PROMPT #language en-US "NV Storage Default Value Buffer"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdNvStoreDefaultValueBuffer_HELP #language en-US "This dynamic PCD holds the DynamicHii PCD value. Its value is the auto generated.\n"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdEdkiiFpdtStringRecordEnableOnly_PROMPT #language en-US "String FPDT Record Enable Only"\r
\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdEdkiiFpdtStringRecordEnableOnly_HELP #language en-US "Control which FPDT record format will be used to store the performance entry.\n"\r
+ "On TRUE, the string FPDT record will be used to store every performance entry.\n"\r
+ "On FALSE, the different FPDT record will be used to store the different performance entries."\r