## Include/Protocol/VarErrorFlag.h\r
gEdkiiVarErrorFlagGuid = { 0x4b37fe8, 0xf6ae, 0x480b, { 0xbd, 0xd5, 0x37, 0xd9, 0x8c, 0x5e, 0x89, 0xaa } }\r
\r
+ ## GUID indicates the BROTLI custom compress/decompress algorithm.\r
+ gBrotliCustomDecompressGuid = { 0x3D532050, 0x5CDA, 0x4FD0, { 0x87, 0x9E, 0x0F, 0x7F, 0x63, 0x0D, 0x5A, 0xFB }}\r
+\r
## GUID indicates the LZMA custom compress/decompress algorithm.\r
# Include/Guid/LzmaDecompress.h\r
gLzmaCustomDecompressGuid = { 0xEE4E5898, 0x3914, 0x4259, { 0x9D, 0x6E, 0xDC, 0x7B, 0xD7, 0x94, 0x03, 0xCF }}\r
## This PCD holds the address mask for page table entries when memory encryption is\r
# enabled on AMD processors supporting the Secure Encrypted Virtualization (SEV) feature.\r
# This mask should be applied when creating 1:1 virtual to physical mapping tables.\r
- #\r
+ # @Prompt The address mask when memory encryption is enabled.\r
gEfiMdeModulePkgTokenSpaceGuid.PcdPteMemoryEncryptionAddressOrMask|0x0|UINT64|0x30001047\r
\r
[PcdsPatchableInModule]\r