]> git.proxmox.com Git - mirror_edk2.git/blobdiff - MdeModulePkg/MdeModulePkg.uni
MdeModulePkg/Core/Dxe: limit FwVol encapsulation section recursion
[mirror_edk2.git] / MdeModulePkg / MdeModulePkg.uni
index cc18e533228a4b52eabd76397b2ba6b599f3f65a..1b347a75f68400c1058640fd6574a43947a6614f 100644 (file)
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdVariableStoreSize_HELP  #language en-US "The size of volatile buffer. This buffer is used to store VOLATILE attribute variables."\r
 \r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAllowVariablePolicyEnforcementDisable_PROMPT  #language en-US "Allow VariablePolicy enforcement to be disabled."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAllowVariablePolicyEnforcementDisable_HELP  #language en-US "If this PCD is disabled, it will block the ability to<BR>\n"\r
+                                                                                                          "disable the enforcement and VariablePolicy enforcement will always be ON.<BR>\n"\r
+                                                                                                          "TRUE - VariablePolicy can be disabled by request through the interface (until interface is locked)<BR>\n"\r
+                                                                                                          "FALSE - VariablePolicy interface will not accept requests to disable and is ALWAYS ON<BR>\n"\r
+\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAcpiTableStorageFile_PROMPT  #language en-US "FFS name of ACPI tables storage"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAcpiTableStorageFile_HELP  #language en-US "FFS filename to find the ACPI tables."\r
                                                                                        "TRUE  - Shadow PEIM on S3 boot path after memory is ready.<BR>\n"\r
                                                                                        "FALSE - Not shadow PEIM on S3 boot path after memory is ready.<BR>"\r
 \r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMigrateTemporaryRamFirmwareVolumes_HELP #language en-US "Enable the feature that evacuate temporary memory to permanent memory or not.<BR><BR>\n"\r
+                                                                                                      "It will allocate page to save the temporary PEIMs resided in NEM(or CAR) to the permanent memory and change all pointers pointed to the NEM(or CAR) to permanent memory.<BR><BR>\n"\r
+                                                                                                      "After then, there are no pointer pointed to NEM(or CAR) and TOCTOU volnerability can be avoid.<BR><BR>\n"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMigrateTemporaryRamFirmwareVolumes_PROMPT #language en-US "Enable the feature that evacuate temporary memory to permanent memory or not"\r
+\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAcpiDefaultOemId_PROMPT  #language en-US "Default OEM ID for ACPI table creation"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAcpiDefaultOemId_HELP  #language en-US "Default OEM ID for ACPI table creation, its length must be 0x6 bytes to follow ACPI specification."\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdFrontPageFormSetGuid_HELP  #language en-US "This PCD points to the front page formset GUID\n"\r
                                                                                          "Compare the FormsetGuid or ClassGuid with this PCD value can detect whether in front page"\r
 \r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPropertiesTableEnable_PROMPT  #language en-US "Publish UEFI PropertiesTable."\r
-\r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPropertiesTableEnable_HELP  #language en-US "Publish PropertiesTable or not.\n"\r
-                                                                                          "\n"\r
-                                                                                          "If this PCD is TRUE, DxeCore publishs PropertiesTable.\n"\r
-                                                                                          "DxeCore evaluates if all runtime drivers has 4K aligned PE sections. If all\n"\r
-                                                                                          "PE sections in runtime drivers are 4K aligned, DxeCore sets BIT0 in\n"\r
-                                                                                          "PropertiesTable. Or DxeCore clears BIT0 in PropertiesTable.\n"\r
-                                                                                          "If this PCD is FALSE, DxeCore does not publish PropertiesTable.\n"\r
-                                                                                          "\n"\r
-                                                                                          "If PropertiesTable has BIT0 set, DxeCore uses below policy in UEFI memory map:\n"\r
-                                                                                          "1) Use EfiRuntimeServicesCode for runtime driver PE image code section and\n"\r
-                                                                                          "use EfiRuntimeServicesData for runtime driver PE image header and other section.\n"\r
-                                                                                          "2) Set EfiRuntimeServicesCode to be EFI_MEMORY_RO.\n"\r
-                                                                                          "3) Set EfiRuntimeServicesData to be EFI_MEMORY_XP.\n"\r
-                                                                                          "4) Set EfiMemoryMappedIO and EfiMemoryMappedIOPortSpace to be EFI_MEMORY_XP.\n"\r
-                                                                                          "\n"\r
-                                                                                          "NOTE: Platform need gurantee this PCD is set correctly. Platform should set\n"\r
-                                                                                          "this PCD to be TURE if and only if all runtime driver has seperated Code/Data\n"\r
-                                                                                          "section. If PE code/data sections are merged, the result is unpredictable.\n"\r
-\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdShadowPeimOnBoot_HELP  #language en-US "Indicates if to shadow PEIM and PeiCore after memory is ready.<BR><BR>\n"\r
                                                                                      "This PCD is used on other boot path except for S3 boot.\n"\r
                                                                                      "TRUE  - Shadow PEIM and PeiCore after memory is ready.<BR>\n"\r
                                                                                            "Note:<BR>"\r
                                                                                            "If Both Capsule In Ram and Capsule On Disk are provisioned at the same time, the Capsule On Disk will be bypassed."\r
 \r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdFwVolDxeMaxEncapsulationDepth_PROMPT #language en-US "Maximum permitted FwVol section nesting depth (exclusive)."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdFwVolDxeMaxEncapsulationDepth_HELP   #language en-US "Maximum permitted encapsulation levels of sections in a firmware volume,<BR>"\r
+                                                                                                   "in the DXE phase. Minimum value is 1. Sections nested more deeply are<BR>"\r
+                                                                                                   "rejected."\r
+\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleInRamSupport_PROMPT  #language en-US "Enable Capsule In Ram support"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleInRamSupport_HELP  #language en-US   "Capsule In Ram is to use memory to deliver the capsules that will be processed after system reset.<BR><BR>"\r
                                                                                     "when the PCD is TRUE but CPU doesn't support 5-Level Paging."\r
                                                                                     " TRUE  - 5-Level Paging will be enabled."\r
                                                                                     " FALSE - 5-Level Paging will not be enabled."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdTcgPfpMeasurementRevision_PROMPT #language en-US "TCG Platform Firmware Profile revision"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdTcgPfpMeasurementRevision_HELP #language en-US "Indicates which TCG Platform Firmware Profile revision the EDKII firmware follows."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdGhcbBase_PROMPT #language en-US "Guest-Hypervisor Communication Block (GHCB) Pool Base Address"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdGhcbBase_HELP #language en-US "Used with SEV-ES support to identify an address range that is not to be encrypted."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdGhcbSize_PROMPT #language en-US "Guest-Hypervisor Communication Block (GHCB) Pool Base Size"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdGhcbSize_HELP #language en-US "Used with SEV-ES support to identify the size of the address range that is not to be encrypted."\r