]> git.proxmox.com Git - mirror_edk2.git/blobdiff - MdeModulePkg/MdeModulePkg.uni
UefiCpuPkg: Move AsmRelocateApLoopStart from Mpfuncs.nasm to AmdSev.nasm
[mirror_edk2.git] / MdeModulePkg / MdeModulePkg.uni
index 44f740e96afeadade8d5dd1374a7a57cb9aafe55..33ce9f61984a9c563f6c300a7160bee6efc142a5 100644 (file)
@@ -4,15 +4,9 @@
 // It also provides the definitions(including PPIs/PROTOCOLs/GUIDs and library classes)\r
 // and libraries instances, which are used for those modules.\r
 //\r
-// Copyright (c) 2007 - 2016, Intel Corporation. All rights reserved.<BR>\r
+// Copyright (c) 2007 - 2021, Intel Corporation. All rights reserved.<BR>\r
 //\r
-// This program and the accompanying materials are licensed and made available under\r
-// the terms and conditions of the BSD License that accompanies this distribution.\r
-// The full text of the license may be found at\r
-// http://opensource.org/licenses/bsd-license.php.\r
-//\r
-// THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
-// WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
+// SPDX-License-Identifier: BSD-2-Clause-Patent\r
 //\r
 // **/\r
 \r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdVpdBaseAddress_HELP  #language en-US "VPD type PCD allows a developer to point to an absolute physical address PCDVPDBASEADDRESS to store PCD value."\r
 \r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPeiCoreMaxFvSupported_PROMPT  #language en-US "Maximum number of FV supported by PeiCore"\r
-\r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPeiCoreMaxFvSupported_HELP  #language en-US "Maximum number of FV is supported by PeiCore's dispatching."\r
-\r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPeiCoreMaxPeimPerFv_PROMPT  #language en-US "Maximum File count per FV supported by PeiCore"\r
-\r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPeiCoreMaxPeimPerFv_HELP  #language en-US "Maximum File count in every FV is supported by PeiCore's dispatching. PeiCore supported File type includes PEIM, Combined PEIM and FV."\r
-\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPeiCoreMaxPeiStackSize_PROMPT  #language en-US "Maximum stack size for PeiCore"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPeiCoreMaxPeiStackSize_HELP  #language en-US "Maximum stack size for PeiCore."\r
 \r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPeiCoreMaxPpiSupported_PROMPT  #language en-US "Maximum PPI count supported by PeiCore"\r
-\r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPeiCoreMaxPpiSupported_HELP  #language en-US "Maximum PPI count is supported by PeiCore's PPI database."\r
-\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxVariableSize_PROMPT  #language en-US "Maximum variable size"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxVariableSize_HELP  #language en-US "The maximum size of a single non-HwErr type variable."\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxAuthVariableSize_HELP  #language en-US "The maximum size of a single authenticated variable."\r
                                                                                         "The value is 0 as default for compatibility that maximum authenticated variable size is specified by PcdMaxVariableSize."\r
 \r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxVolatileVariableSize_PROMPT  #language en-US "The maximum size of a single non-authenticated volatile variable."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxVolatileVariableSize_HELP  #language en-US "The maximum size of a single non-authenticated volatile variable.<BR><BR>\n"\r
+                                                                                            "The default value is 0 for compatibility: in that case, the maximum "\r
+                                                                                            "non-authenticated volatile variable size remains specified by "\r
+                                                                                            "PcdMaxVariableSize.<BR>\n"\r
+                                                                                            "Only the MdeModulePkg/Universal/Variable/RuntimeDxe driver supports this PCD.<BR>"\r
+\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxHardwareErrorVariableSize_PROMPT  #language en-US "Maximum HwErr variable size"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxHardwareErrorVariableSize_HELP  #language en-US "The maximum size of single hardware error record variable.<BR><BR>\n"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdVariableStoreSize_HELP  #language en-US "The size of volatile buffer. This buffer is used to store VOLATILE attribute variables."\r
 \r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAllowVariablePolicyEnforcementDisable_PROMPT  #language en-US "Allow VariablePolicy enforcement to be disabled."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAllowVariablePolicyEnforcementDisable_HELP  #language en-US "If this PCD is disabled, it will block the ability to<BR>\n"\r
+                                                                                                          "disable the enforcement and VariablePolicy enforcement will always be ON.<BR>\n"\r
+                                                                                                          "TRUE - VariablePolicy can be disabled by request through the interface (until interface is locked)<BR>\n"\r
+                                                                                                          "FALSE - VariablePolicy interface will not accept requests to disable and is ALWAYS ON<BR>\n"\r
+\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAcpiTableStorageFile_PROMPT  #language en-US "FFS name of ACPI tables storage"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAcpiTableStorageFile_HELP  #language en-US "FFS filename to find the ACPI tables."\r
                                                                                                   "entries. If greater than 0, then this PCD determines the number of entries,\n"\r
                                                                                                   "and PcdMaxPeiPerformanceLogEntries is ignored."\r
 \r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdRealTimeClockUpdateTimeout_PROMPT  #language en-US "RTC Update Timeout Value"\r
-\r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdRealTimeClockUpdateTimeout_HELP  #language en-US "RTC Update Timeout Value(microsecond)."\r
-\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSerialUseMmio_PROMPT  #language en-US "Serial port registers use MMIO"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSerialUseMmio_HELP  #language en-US "Indicates the 16550 serial port registers are in MMIO space, or in I/O space. Default is I/O space.<BR><BR>\n"\r
                                                                                   "TRUE  - 16550 serial port registers are in MMIO space.<BR>\n"\r
                                                                                   "FALSE - 16550 serial port registers are in I/O space.<BR>"\r
 \r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSerialRegisterAccessWidth_PROMPT  #language en-US "Serial port registers access width"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSerialRegisterAccessWidth_HELP  #language en-US "Sets the 16550 serial port registers access width in MMIO space. Default is 8 bits access.<BR><BR>\n"\r
+                                                                                  "8  - 16550 serial port MMIO register access are in 8 bits mode.<BR>\n"\r
+                                                                                  "32 - 16550 serial port MMIO registers acess are in 32 bits mode.<BR>"\r
+\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSerialUseHardwareFlowControl_PROMPT  #language en-US "Enable serial port hardware flow control"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSerialUseHardwareFlowControl_HELP  #language en-US "Indicates if the 16550 serial port hardware flow control will be enabled. Default is FALSE.<BR><BR>\n"\r
                                                                                       "BIT7..BIT6 - Reserved.  Must be 0.<BR>\n"\r
                                                                                       "Default is to enable and clear all FIFOs.<BR>"\r
 \r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdTftpBlockSize_PROMPT  #language en-US "TFTP block size"\r
-\r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdTftpBlockSize_HELP  #language en-US "This setting can override the default TFTP block size. A value of 0 computes "\r
-                                                                                  "the default from MTU information. A non-zero value will be used as block size "\r
-                                                                                  "in bytes."\r
-\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxEfiSystemTablePointerAddress_PROMPT  #language en-US "Maximum Efi System Table Pointer address"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxEfiSystemTablePointerAddress_HELP  #language en-US "Maximum address that the DXE Core will allocate the EFI_SYSTEM_TABLE_POINTER structure. The default value for this PCD is 0, which means that the DXE Core will allocate the buffer from the EFI_SYSTEM_TABLE_POINTER structure on a 4MB boundary as close to the top of memory as feasible.  If this PCD is set to a value other than 0, then the DXE Core will first attempt to allocate the EFI_SYSTEM_TABLE_POINTER structure on a 4MB boundary below the address specified by this PCD, and if that allocation fails, retry the allocation on a 4MB boundary as close to the top of memory as feasible."\r
                                                                                        "TRUE  - Shadow PEIM on S3 boot path after memory is ready.<BR>\n"\r
                                                                                        "FALSE - Not shadow PEIM on S3 boot path after memory is ready.<BR>"\r
 \r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMigrateTemporaryRamFirmwareVolumes_HELP #language en-US "Enable the feature that evacuate temporary memory to permanent memory or not.<BR><BR>\n"\r
+                                                                                                      "It will allocate page to save the temporary PEIMs resided in NEM(or CAR) to the permanent memory and change all pointers pointed to the NEM(or CAR) to permanent memory.<BR><BR>\n"\r
+                                                                                                      "After then, there are no pointer pointed to NEM(or CAR) and TOCTOU volnerability can be avoid.<BR><BR>\n"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMigrateTemporaryRamFirmwareVolumes_PROMPT #language en-US "Enable the feature that evacuate temporary memory to permanent memory or not"\r
+\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAcpiDefaultOemId_PROMPT  #language en-US "Default OEM ID for ACPI table creation"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAcpiDefaultOemId_HELP  #language en-US "Default OEM ID for ACPI table creation, its length must be 0x6 bytes to follow ACPI specification."\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMemoryProfilePropertyMask_HELP  #language en-US "The mask is used to control memory profile behavior.<BR><BR>\n"\r
                                                                                            "BIT0 - Enable UEFI memory profile.<BR>\n"\r
-                                                                                           "BIT1 - Enable SMRAM profile.<BR>"\r
+                                                                                           "BIT1 - Enable SMRAM profile.<BR>\n"\r
+                                                                                           "BIT7 - Disable recording at the start.<BR>"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMemoryProfileMemoryType_PROMPT  #language en-US "Memory profile memory type"\r
 \r
                                                                                    " OS Reserved                0x80000000<BR>\n"\r
                                                                                    "e.g. Reserved+ACPINvs+ACPIReclaim+RuntimeCode+RuntimeData are needed, 0x661 should be used.<BR>\n"\r
 \r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMemoryProfileDriverPath_PROMPT  #language en-US "Memory profile driver path"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMemoryProfileDriverPath_HELP  #language en-US "This PCD is to control which drivers need memory profile data.<BR><BR>\n"\r
+                                                                                   "For example:<BR>\n"\r
+                                                                                   "One image only (Shell):<BR>\n"\r
+                                                                                   "    Header                    GUID<BR>\n"\r
+                                                                                   "    {0x04, 0x06, 0x14, 0x00,  0x83, 0xA5, 0x04, 0x7C, 0x3E, 0x9E, 0x1C, 0x4F, 0xAD, 0x65, 0xE0, 0x52, 0x68, 0xD0, 0xB4, 0xD1,<BR>\n"\r
+                                                                                   "     0x7F, 0xFF, 0x04, 0x00}<BR>\n"\r
+                                                                                   "Two or more images (Shell + WinNtSimpleFileSystem):<BR>\n"\r
+                                                                                   "    {0x04, 0x06, 0x14, 0x00,  0x83, 0xA5, 0x04, 0x7C, 0x3E, 0x9E, 0x1C, 0x4F, 0xAD, 0x65, 0xE0, 0x52, 0x68, 0xD0, 0xB4, 0xD1,<BR>\n"\r
+                                                                                   "     0x7F, 0x01, 0x04, 0x00,<BR>\n"\r
+                                                                                   "     0x04, 0x06, 0x14, 0x00,  0x8B, 0xE1, 0x25, 0x9C, 0xBA, 0x76, 0xDA, 0x43, 0xA1, 0x32, 0xDB, 0xB0, 0x99, 0x7C, 0xEF, 0xEF,<BR>\n"\r
+                                                                                   "     0x7F, 0xFF, 0x04, 0x00}<BR>\n"\r
+\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSerialClockRate_PROMPT  #language en-US "Serial Port Clock Rate"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSerialClockRate_HELP  #language en-US "UART clock frequency is for the baud rate configuration."\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSerialPciDeviceInfo_PROMPT  #language en-US "PCI Serial Device Info"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSerialPciDeviceInfo_HELP  #language en-US "PCI Serial Device Info. It is an array of Device, Function, and Power Management\n"\r
-                                                                                        "information that describes the path that contains zero or more PCI to PCI briges\n"\r
+                                                                                        "information that describes the path that contains zero or more PCI to PCI bridges\n"\r
                                                                                         "followed by a PCI serial device.  Each array entry is 4-bytes in length.  The\n"\r
                                                                                         "first byte is the PCI Device Number, then second byte is the PCI Function Number,\n"\r
                                                                                         "and the last two bytes are the offset to the PCI power management capabilities\n"\r
                                                                                   "For the DxeIpl and the DxeCore are both X64, set NX for stack feature also require PcdDxeIplBuildPageTables be TRUE.<BR>"\r
                                                                                   "For the DxeIpl and the DxeCore are both IA32 (PcdDxeIplSwitchToLongMode is FALSE), set NX for stack feature also require"\r
                                                                                   "IA32 PAE is supported and Execute Disable Bit is available.<BR>"\r
-                                                                                  "TRUE  - to set NX for stack.<BR>"\r
-                                                                                  "FALSE - Not to set NX for stack.<BR>"\r
+                                                                                  "TRUE  - Set NX for stack.<BR>"\r
+                                                                                  "FALSE - Do nothing for stack.<BR>"\r
+                                                                                  "Note: If this PCD is set to FALSE, NX could be still applied to stack due to PcdDxeNxMemoryProtectionPolicy enabled for EfiBootServicesData.<BR>"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAcpiS3Enable_PROMPT  #language en-US "ACPI S3 Enable"\r
 \r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdFlashNvStorageFtwWorkingBase64_HELP  #language en-US "64-bit Base address of the FTW working block range in flash device. If PcdFlashNvStorageFtwWorkingSize is larger than one block size, this value should be block size aligned."\r
 \r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdEmuVariableNvStoreReserved_PROMPT  #language en-US "Reserved memory range for EMU variable NV storage"\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdEmuVariableNvModeEnable_PROMPT  #language en-US "EMU variable NV mode enable"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdEmuVariableNvModeEnable_HELP  #language en-US "Indicates if Variable driver will enable emulated variable NV mode.<BR><BR>"\r
+                                                                                  "If this PCD is configured to dynamic, its value should be set before Variable driver starts to work,<BR>"\r
+                                                                                  "otherwise default value will take effect.<BR>"\r
+                                                                                  "TRUE  - An EMU variable NV storage will be allocated or reserved for NV variables.<BR>"\r
+                                                                                  "FALSE - No EMU variable NV storage will be allocated or reserved for NV variables.<BR>"\r
 \r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdEmuVariableNvStoreReserved_HELP  #language en-US "This PCD defines a reserved memory range for the EMU Variable driver's NV Variable Store. The range is valid if non-zero. The memory range size must be PcdVariableStoreSize."\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdEmuVariableNvStoreReserved_PROMPT  #language en-US "Base of reserved memory range for EMU variable NV storage"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdEmuVariableNvStoreReserved_HELP  #language en-US "This PCD defines the base address of reserved memory range for EMU variable NV storage. A non-ZERO value indicates a valid range reserved with size given by PcdVariableStoreSize."\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHelloWorldPrintTimes_PROMPT  #language en-US "HelloWorld print times"\r
 \r
                                                                                                        "TRUE  - Resets system when memory type information changes.<BR>\n"\r
                                                                                                        "FALSE - Does not reset system when memory type information changes.<BR>"\r
 \r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPlatformRecoverySupport_PROMPT  #language en-US "Support Platform Recovery"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPlatformRecoverySupport_HELP  #language en-US "Indicates if the BDS supports Platform Recovery.<BR><BR>\n"\r
+                                                                                            "TRUE  - BDS supports Platform Recovery.<BR>\n"\r
+                                                                                            "FALSE - BDS does not support Platform Recovery.<BR>"\r
+\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdBrowserSubtitleTextColor_PROMPT  #language en-US "Foreground color for browser subtitle"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdBrowserSubtitleTextColor_HELP  #language en-US "Specify the foreground color for Subtitle text in HII Form Browser. The default value is EFI_BLUE. Only following values defined in UEFI specification are valid:<BR><BR>\n"\r
                                                                                                         "TRUE  - Device Path From Text Protocol will be produced.<BR>\n"\r
                                                                                                         "FALSE - Device Path From Text Protocol will not be produced.<BR>"\r
 \r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdEnableVariableRuntimeCache_PROMPT  #language en-US "Enable the UEFI variable runtime cache."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdEnableVariableRuntimeCache_HELP  #language en-US "Indicates if the UEFI variable runtime cache should be enabled.<BR><BR>\n"\r
+                                                                                               "This setting only applies if SMM variables are enabled. When enabled, all variable<BR>\n"\r
+                                                                                               "data for Runtime Service GetVariable () and GetNextVariableName () calls is retrieved<BR>\n"\r
+                                                                                               "from a runtime data buffer referred to as the "runtime cache". An SMI is not triggered<BR>\n"\r
+                                                                                               "at all for these requests. Variables writes still trigger an SMI. This can greatly<BR>\n"\r
+                                                                                               "reduce overall system SMM usage as most boots tend to issue far more variable reads<BR>\n"\r
+                                                                                               "than writes.<BR>\n"\r
+                                                                                               "TRUE  - The UEFI variable runtime cache is enabled.<BR>\n"\r
+                                                                                               "FALSE - The UEFI variable runtime cache is disabled.<BR>"\r
+\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdVariableCollectStatistics_PROMPT  #language en-US "Enable variable statistics collection"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdVariableCollectStatistics_HELP  #language en-US "Indicates if the statistics about variable usage will be collected. This information is stored as a vendor configuration table into the EFI system table. Set this PCD to TRUE to use VariableInfo application in MdeModulePkg\Application directory to get variable usage info. VariableInfo application will not output information if not set to TRUE.<BR><BR>\n"\r
                                                                                                               "TRUE  - disable<BR>\n"\r
                                                                                                               "FALSE - enable<BR>"\r
 \r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdFrameworkCompatibilitySupport_PROMPT  #language en-US "Enable framework backward compatibility support"\r
-\r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdFrameworkCompatibilitySupport_HELP  #language en-US "Indicates if backward compatibility to Framework HII and Framework FvHob is supported.<BR><BR>\n"\r
-                                                                                                  "TRUE  - Setup Browser supports GUID opcodes generated from Framework HII VFR file by VFR compiler. the PeiCore will handle the framework FvHob and install FvInfo PPI for it.<BR>\n"\r
-                                                                                                  "FALSE - Setup Browser doesn't support GUID opcodes generated from Framework HII VFR file by VFR compiler. the PeiCore will not handle the framework FvHob and install FvInfo PPI for it.<BR>"\r
-\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHelloWorldPrintEnable_PROMPT  #language en-US "Enable HelloWorld print"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHelloWorldPrintEnable_HELP  #language en-US "Indicates if HelloWorld Application will print the verbose information. This PCD is a sample to explain FeatureFlag PCD usage.<BR><BR>\n"\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdDriverHealthConfigureForm_PROMPT  #language en-US "Driver Health Management Form"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdDriverHealthConfigureForm_HELP  #language en-US "This PCD points to the formset GUID of the driver health management form\n"\r
-                                                                                              "The form will be popped up by BDS core when there are Configuration Required driver health intances.\n"\r
+                                                                                              "The form will be popped up by BDS core when there are Configuration Required driver health instances.\n"\r
                                                                                               "Platform can customize the PCD to point to different formset."\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSetupVideoHorizontalResolution_PROMPT  #language en-US "Video Horizontal Resolution of Text Setup"\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdFrontPageFormSetGuid_HELP  #language en-US "This PCD points to the front page formset GUID\n"\r
                                                                                          "Compare the FormsetGuid or ClassGuid with this PCD value can detect whether in front page"\r
 \r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPropertiesTableEnable_PROMPT  #language en-US "Publish UEFI PropertiesTable."\r
-\r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPropertiesTableEnable_HELP  #language en-US "Publish PropertiesTable or not.\n"\r
-                                                                                          "\n"\r
-                                                                                          "If this PCD is TRUE, DxeCore publishs PropertiesTable.\n"\r
-                                                                                          "DxeCore evaluates if all runtime drivers has 4K aligned PE sections. If all\n"\r
-                                                                                          "PE sections in runtime drivers are 4K aligned, DxeCore sets BIT0 in\n"\r
-                                                                                          "PropertiesTable. Or DxeCore clears BIT0 in PropertiesTable.\n"\r
-                                                                                          "If this PCD is FALSE, DxeCore does not publish PropertiesTable.\n"\r
-                                                                                          "\n"\r
-                                                                                          "If PropertiesTable has BIT0 set, DxeCore uses below policy in UEFI memory map:\n"\r
-                                                                                          "1) Use EfiRuntimeServicesCode for runtime driver PE image code section and\n"\r
-                                                                                          "use EfiRuntimeServicesData for runtime driver PE image header and other section.\n"\r
-                                                                                          "2) Set EfiRuntimeServicesCode to be EFI_MEMORY_RO.\n"\r
-                                                                                          "3) Set EfiRuntimeServicesData to be EFI_MEMORY_XP.\n"\r
-                                                                                          "4) Set EfiMemoryMappedIO and EfiMemoryMappedIOPortSpace to be EFI_MEMORY_XP.\n"\r
-                                                                                          "\n"\r
-                                                                                          "NOTE: Platform need gurantee this PCD is set correctly. Platform should set\n"\r
-                                                                                          "this PCD to be TURE if and only if all runtime driver has seperated Code/Data\n"\r
-                                                                                          "section. If PE code/data sections are merged, the result is unpredictable.\n"\r
-\r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdIdentifyMappingPageTablePtr_PROMPT  #language en-US "Identify Mapping Page Table pointer."\r
-\r
-#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdIdentifyMappingPageTablePtr_HELP  #language en-US "This dynamic PCD hold an address to point to the memory of page table. The page table establishes a 1:1\n"\r
-                                                                                                "Virtual to Physical mapping according to the processor physical address bits."\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdShadowPeimOnBoot_HELP  #language en-US "Indicates if to shadow PEIM and PeiCore after memory is ready.<BR><BR>\n"\r
                                                                                      "This PCD is used on other boot path except for S3 boot.\n"\r
                                                                                      "TRUE  - Shadow PEIM and PeiCore after memory is ready.<BR>\n"\r
                                                                                         "TRUE  - Export HII data and configuration data.<BR>\n"\r
                                                                                         "FALSE - Does not export HII data and configuration.<BR>"\r
 \r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPs2KbdExtendedVerification_PROMPT  #language en-US "Turn on PS2 Keyboard Extended Verification"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPs2KbdExtendedVerification_HELP  #language en-US "Indicates if PS2 keyboard does a extended verification during start.\n"\r
+                                                                                               "Add this PCD mainly consider the use case of simulator. This PCD maybe set to FALSE for\n"\r
+                                                                                               "Extended verification will take some performance. It can be set to FALSE for boot performance.<BR><BR>\n"\r
+                                                                                               "TRUE  - Turn on PS2 keyboard extended verification.<BR>\n"\r
+                                                                                               "FALSE - Turn off PS2 keyboard extended verification.<BR>"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPs2MouseExtendedVerification_PROMPT  #language en-US "Turn on PS2 Mouse Extended Verification"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPs2MouseExtendedVerification_HELP  #language en-US "Indicates if PS2 mouse does a extended verification during start.\n"\r
+                                                                                                 "Extended verification will take some performance. It can be set to FALSE for boot performance.<BR><BR>\n"\r
+                                                                                                 "TRUE  - Turn on PS2 mouse extended verification. <BR>\n"\r
+                                                                                                 "FALSE - Turn off PS2 mouse extended verification. <BR>"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdFastPS2Detection_PROMPT  #language en-US "Enable fast PS2 detection"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdFastPS2Detection_HELP  #language en-US "Indicates if to use the optimized timing for best PS2 detection performance.\n"\r
+                                                                                     "Note this PCD could be set to TRUE for best boot performance and set to FALSE for best device compatibility.<BR><BR>\n"\r
+                                                                                     "TRUE  - Use the optimized timing for best PS2 detection performance.<BR>\n"\r
+                                                                                     "FALSE - Use the normal timing to detect PS2.<BR>"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSdMmcPciHostControllerMmioBase_PROMPT  #language en-US "Mmio base address of pci-based SD/MMC host controller"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSdMmcPciHostControllerMmioBase_HELP  #language en-US "This PCD specifies the PCI-based SD/MMC host controller mmio base address. Define the mmio base address of the pci-based SD/MMC host controller. If there are multiple SD/MMC host controllers, their mmio base addresses are calculated one by one from this base address.<BR>"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxRepairCount_PROMPT  #language en-US "MAX repair count"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxRepairCount_HELP  #language en-US "This PCD defines the MAX repair count. The default value is 0 that means infinite.<BR>"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPciDegradeResourceForOptionRom_PROMPT  #language en-US "Degrade 64-bit PCI MMIO BARs for legacy BIOS option ROMs"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPciDegradeResourceForOptionRom_HELP  #language en-US "Indicates whether 64-bit PCI MMIO BARs should degrade to 32-bit in the presence of an option ROM.<BR>"\r
+                                                                                                   "On X64 platforms, Option ROMs may contain code that executes in the context of a legacy BIOS (CSM),"\r
+                                                                                                   "which requires that all PCI MMIO BARs are located below 4 GB.<BR>"\r
+                                                                                                   "TRUE  - All PCI MMIO BARs of a device will be located below 4 GB if it has an option ROM.<BR>"\r
+                                                                                                   "FALSE - PCI MMIO BARs of a device may be located above 4 GB even if it has an option ROM.<BR>"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSupportProcessCapsuleAtRuntime_PROMPT  #language en-US "Enable process non-reset capsule image at runtime."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSupportProcessCapsuleAtRuntime_HELP  #language en-US "Indicates if the platform can support process non-reset capsule image at runtime.<BR><BR>\n"\r
+                                                                                                   "TRUE  - Supports process non-reset capsule image at runtime.<BR>\n"\r
+                                                                                                   "FALSE - Does not support process non-reset capsule image at runtime.<BR>"\r
+\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdStatusCodeSubClassCapsule_PROMPT  #language en-US "Status Code for Capsule subclass definitions"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdStatusCodeSubClassCapsule_HELP  #language en-US "Status Code for Capsule subclass definitions.<BR><BR>\n"\r
+                                                                                              "EFI_OEM_SPECIFIC_SUBCLASS_CAPSULE  = 0x00810000<BR>\n"\r
+                                                                                              "NOTE: The default value of this PCD may collide with other OEM specific status codes.\n"\r
+                                                                                              "Override the value of this PCD in the platform DSC file as needed."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleStatusCodeProcessCapsulesBegin_PROMPT  #language en-US "Status Code for Capsule Process Begin"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleStatusCodeProcessCapsulesBegin_HELP  #language en-US "Status Code for Capsule Process Begin.<BR><BR>\n"\r
+                                                                                                          "EFI_CAPSULE_PROCESS_CAPSULES_BEGIN  = (EFI_OEM_SPECIFIC | 0x00000001) = 0x00008001<BR>\n"\r
+                                                                                                          "NOTE: The default value of this PCD may collide with other OEM specific status codes.\n"\r
+                                                                                                          "Override the value of this PCD in the platform DSC file as needed."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleStatusCodeProcessCapsulesEnd_PROMPT  #language en-US "Status Code for Capsule Process End"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleStatusCodeProcessCapsulesEnd_HELP  #language en-US "Status Code for Capsule Process End.<BR><BR>\n"\r
+                                                                                                        "EFI_CAPSULE_PROCESS_CAPSULES_END    = (EFI_OEM_SPECIFIC | 0x00000002) = 0x00008002<BR>\n"\r
+                                                                                                        "NOTE: The default value of this PCD may collide with other OEM specific status codes.\n"\r
+                                                                                                        "Override the value of this PCD in the platform DSC file as needed."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleStatusCodeUpdatingFirmware_PROMPT  #language en-US "Status Code for Capsule Process Updating Firmware"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleStatusCodeUpdatingFirmware_HELP  #language en-US "Status Code for Capsule Process Updating Firmware.<BR><BR>\n"\r
+                                                                                                      "EFI_CAPSULE_UPDATING_FIRMWARE       = (EFI_OEM_SPECIFIC | 0x00000003) = 0x00008003<BR>\n"\r
+                                                                                                      "NOTE: The default value of this PCD may collide with other OEM specific status codes.\n"\r
+                                                                                                      "Override the value of this PCD in the platform DSC file as needed."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleStatusCodeUpdateFirmwareSuccess_PROMPT  #language en-US "Status Code for Capsule Process Update Firmware Success"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleStatusCodeUpdateFirmwareSuccess_HELP  #language en-US "Status Code for Capsule Process Update Firmware Success.<BR><BR>\n"\r
+                                                                                                           "EFI_CAPSULE_UPDATE_FIRMWARE_SUCCESS = (EFI_OEM_SPECIFIC | 0x00000004) = 0x00008004<BR>\n"\r
+                                                                                                           "NOTE: The default value of this PCD may collide with other OEM specific status codes.\n"\r
+                                                                                                           "Override the value of this PCD in the platform DSC file as needed."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleStatusCodeUpdateFirmwareFailed_PROMPT  #language en-US "Status Code for Capsule Process Update Firmware Failed"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleStatusCodeUpdateFirmwareFailed_HELP  #language en-US "Status Code for Capsule Process Update Firmware Failed.<BR><BR>\n"\r
+                                                                                                          "EFI_CAPSULE_UPDATE_FIRMWARE_FAILED  = (EFI_OEM_SPECIFIC | 0x00000005) = 0x00008005<BR>\n"\r
+                                                                                                          "NOTE: The default value of this PCD may collide with other OEM specific status codes.\n"\r
+                                                                                                          "Override the value of this PCD in the platform DSC file as needed."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleStatusCodeResettingSystem_PROMPT  #language en-US "Status Code for Capsule Resetting System"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleStatusCodeResettingSystem_HELP  #language en-US "Status Code for Capsule Resetting System.<BR><BR>\n"\r
+                                                                                                     "EFI_CAPSULE_RESETTING_SYSTEM        = (EFI_OEM_SPECIFIC | 0x00000006) = 0x00008006<BR>\n"\r
+                                                                                                     "NOTE: The default value of this PCD may collide with other OEM specific status codes.\n"\r
+                                                                                                     "Override the value of this PCD in the platform DSC file as needed."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleMax_PROMPT  #language en-US "CapsuleMax value in capsule report variable."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleMax_HELP  #language en-US "CapsuleMax value in capsule report variable."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaximumPeiResetNotifies_PROMPT  #language en-US "Maximum Number of PEI Reset Filters, Reset Notifications or Reset Handlers."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaximumPeiResetNotifies_HELP  #language en-US "Indicates the allowable maximum number of Reset Filters, <BR>\n"\r
+                                                                                            "Reset Notifications or Reset Handlers in PEI phase."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdRecoveryFileName_PROMPT  #language en-US "Recover file name in PEI phase"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdRecoveryFileName_HELP  #language en-US "This is recover file name in PEI phase.\n"\r
+                                                                                     "The file must be in the root directory.\n"\r
+                                                                                     "The file name must be the 8.3 format.\n"\r
+                                                                                     "The PCD data must be in UNICODE format."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCoDRelocationFileName_PROMPT  #language en-US "Capsule On Disk Temp Relocation file name in PEI phase"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCoDRelocationFileName_HELP  #language en-US "This is Capsule Temp Relocation file name in PEI phase.<BR>"\r
+                                                                                          "The file must be in the root directory.<BR>"\r
+                                                                                          "The file name must be the 8.3 format.<BR>"\r
+                                                                                          "The PCD data must be in UNICODE format.<BR>"\r
+                                                                                          "CapsuleOnDiskLoadPei PEI module will set value of this PCD to PcdRecoveryFileName, then leverage recovery to get Capsule On Disk Temp Relocation file.<BR>"\r
+                                                                                          "Note: The file name must be shorter than PcdRecoveryFileName, otherwise CapsuleOnDiskLoadPei PEI module will fail to get Capsule On Disk Temp Relocation file.<BR>"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSystemFmpCapsuleImageTypeIdGuid_PROMPT  #language en-US "A list of system FMP ImageTypeId GUIDs"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSystemFmpCapsuleImageTypeIdGuid_HELP  #language en-US "This PCD hold a list GUIDs for the ImageTypeId to indicate the\n"\r
+                                                                                                    "FMP capsule is a system FMP."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdTestKeyUsed_PROMPT  #language en-US "If there is any test key used by the platform."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdTestKeyUsed_HELP  #language en-US "This dynamic PCD holds the information if there is any test key used by the platform."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSmiHandlerProfilePropertyMask_PROMPT  #language en-US "SmiHandlerProfile Property."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSmiHandlerProfilePropertyMask_HELP  #language en-US "The mask is used to control SmiHandlerProfile behavior.<BR><BR>\n"\r
+                                                                                                  "BIT0 - Enable SmiHandlerProfile.<BR>"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdImageProtectionPolicy_PROMPT  #language en-US "Set image protection policy."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdImageProtectionPolicy_HELP  #language en-US "Set image protection policy. The policy is bitwise.\n"\r
+                                                                                          "If a bit is set, the image will be protected by DxeCore if it is aligned.\n"\r
+                                                                                          "The code section becomes read-only, and the data section becomes non-executable.\n"\r
+                                                                                          "If a bit is clear, nothing will be done to image code/data sections.<BR><BR>\n"\r
+                                                                                          "BIT0       - Image from unknown device. <BR>\n"\r
+                                                                                          "BIT1       - Image from firmware volume.<BR>"\r
+                                                                                          "Note: If a bit is cleared, the data section could be still non-executable if\n"\r
+                                                                                          "PcdDxeNxMemoryProtectionPolicy is enabled for EfiLoaderData, EfiBootServicesData\n"\r
+                                                                                          "and/or EfiRuntimeServicesData.<BR>"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdDxeNxMemoryProtectionPolicy_PROMPT  #language en-US "Set DXE memory protection policy."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdDxeNxMemoryProtectionPolicy_HELP  #language en-US "Set DXE memory protection policy. The policy is bitwise.\n"\r
+                                                                                                "If a bit is set, memory regions of the associated type will be mapped\n"\r
+                                                                                                "non-executable.<BR>\n"\r
+                                                                                                "If a bit is cleared, nothing will be done to associated type of memory.<BR><BR>\n"\r
+                                                                                                "\n"\r
+                                                                                                "Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>\n"\r
+                                                                                                "EfiReservedMemoryType          0x0001<BR>\n"\r
+                                                                                                "EfiLoaderCode                  0x0002<BR>\n"\r
+                                                                                                "EfiLoaderData                  0x0004<BR>\n"\r
+                                                                                                "EfiBootServicesCode            0x0008<BR>\n"\r
+                                                                                                "EfiBootServicesData            0x0010<BR>\n"\r
+                                                                                                "EfiRuntimeServicesCode         0x0020<BR>\n"\r
+                                                                                                "EfiRuntimeServicesData         0x0040<BR>\n"\r
+                                                                                                "EfiConventionalMemory          0x0080<BR>\n"\r
+                                                                                                "EfiUnusableMemory              0x0100<BR>\n"\r
+                                                                                                "EfiACPIReclaimMemory           0x0200<BR>\n"\r
+                                                                                                "EfiACPIMemoryNVS               0x0400<BR>\n"\r
+                                                                                                "EfiMemoryMappedIO              0x0800<BR>\n"\r
+                                                                                                "EfiMemoryMappedIOPortSpace     0x1000<BR>\n"\r
+                                                                                                "EfiPalCode                     0x2000<BR>\n"\r
+                                                                                                "EfiPersistentMemory            0x4000<BR>\n"\r
+                                                                                                "OEM Reserved       0x4000000000000000<BR>\n"\r
+                                                                                                "OS Reserved        0x8000000000000000<BR>\n"\r
+                                                                                                "\n"\r
+                                                                                                "NOTE: User must NOT set NX protection for EfiLoaderCode / EfiBootServicesCode / EfiRuntimeServicesCode. <BR>\n"\r
+                                                                                                "User MUST set the same NX protection for EfiBootServicesData and EfiConventionalMemory. <BR>\n"\r
+                                                                                                "\n"\r
+                                                                                                "e.g. 0x7FD5 can be used for all memory except Code. <BR>\n"\r
+                                                                                                "e.g. 0x7BD4 can be used for all memory except Code and ACPINVS/Reserved. <BR>\n"\r
+                                                                                                ""\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPteMemoryEncryptionAddressOrMask_PROMPT  #language en-US "The address mask when memory encryption is enabled."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPteMemoryEncryptionAddressOrMask_HELP  #language en-US "This PCD holds the address mask for page table entries when memory encryption is\n"\r
+                                                                                                     "enabled on AMD processors supporting the Secure Encrypted Virtualization (SEV) feature.\n"\r
+                                                                                                     "This mask should be applied when creating 1:1 virtual to physical mapping tables."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleOnDiskSupport_PROMPT  #language en-US "Enable Capsule On Disk support"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleOnDiskSupport_HELP  #language en-US   "Capsule On Disk is to deliver capsules via files on Mass Storage device.<BR><BR>"\r
+                                                                                           "This PCD indicates if the Capsule On Disk is supported.<BR>"\r
+                                                                                           " TRUE  - Capsule On Disk is supported.<BR>"\r
+                                                                                           " FALSE - Capsule On Disk is not supported.<BR>"\r
+                                                                                           "If platform does not use this feature, this PCD should be set to FALSE.<BR><BR>"\r
+                                                                                           "Two sulotions to deliver Capsule On Disk:<BR>"\r
+                                                                                           " a) If PcdCapsuleInRamSupport = TRUE, Load Capsule On Disk image out of TCB, and reuse Capsule In Ram to deliver capsule.<BR>"\r
+                                                                                           " b) If PcdCapsuleInRamSupport = FALSE, Relocate Capsule On Disk image to RootDir out of TCB, and reuse FatPei to load capsules from external storage.<BR>"\r
+                                                                                           "Note:<BR>"\r
+                                                                                           "If Both Capsule In Ram and Capsule On Disk are provisioned at the same time, the Capsule On Disk will be bypassed."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdFwVolDxeMaxEncapsulationDepth_PROMPT #language en-US "Maximum permitted FwVol section nesting depth (exclusive)."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdFwVolDxeMaxEncapsulationDepth_HELP   #language en-US "Maximum permitted encapsulation levels of sections in a firmware volume,<BR>"\r
+                                                                                                   "in the DXE phase. Minimum value is 1. Sections nested more deeply are<BR>"\r
+                                                                                                   "rejected."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAhciCommandRetryCount_PROMPT  #language en-US "Retry Count of AHCI command if there is a failure"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAhciCommandRetryCount_HELP  #language en-US "This value is used to configure number of retries on AHCI commands, if there is a failure."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleInRamSupport_PROMPT  #language en-US "Enable Capsule In Ram support"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCapsuleInRamSupport_HELP  #language en-US   "Capsule In Ram is to use memory to deliver the capsules that will be processed after system reset.<BR><BR>"\r
+                                                                                          "This PCD indicates if the Capsule In Ram is supported.<BR>"\r
+                                                                                          " TRUE  - Capsule In Ram is supported.<BR>"\r
+                                                                                          " FALSE - Capsule In Ram is not supported."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSdMmcGenericTimeoutValue_PROMPT #language en-US "SD/MMC Host Controller Operations Timeout (us)."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSdMmcGenericTimeoutValue_HELP   #language en-US "Indicates the default timeout value for SD/MMC Host Controller operations in microseconds."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCodRelocationDevPath_PROMPT  #language en-US "Capsule On Disk relocation device path."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCodRelocationDevPath_HELP  #language en-US   "Full device path of platform specific device to store Capsule On Disk temp relocation file.<BR>"\r
+                                                                                           "If this PCD is set, Capsule On Disk temp relocation file will be stored in the device specified by this PCD, instead of the EFI System Partition that stores capsule image file."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdNullPointerDetectionPropertyMask_PROMPT  #language en-US "Enable NULL pointer detection"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdNullPointerDetectionPropertyMask_HELP    #language en-US "Mask to control the NULL address detection in code for different phases.\n"\r
+                                                                                                       " If enabled, accessing NULL address in UEFI or SMM code can be caught.\n\n"\r
+                                                                                                       "   BIT0    - Enable NULL pointer detection for UEFI.\n"\r
+                                                                                                       "   BIT1    - Enable NULL pointer detection for SMM.\n"\r
+                                                                                                       "   BIT2..6 - Reserved for future uses.\n"\r
+                                                                                                       "   BIT7    - Disable NULL pointer detection just after EndOfDxe."\r
+                                                                                                       " This is a workaround for those unsolvable NULL access issues in"\r
+                                                                                                       " OptionROM, boot loader, etc. It can also help to avoid unnecessary"\r
+                                                                                                       " exception caused by legacy memory (0-4095) access after EndOfDxe,"\r
+                                                                                                       " such as Windows 7 boot on Qemu.\n"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdInitValueInTempStack_PROMPT  #language en-US "Init Value in Temp Stack"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdInitValueInTempStack_HELP    #language en-US "Init Value in Temp Stack to be shared between SEC and PEI_CORE\n"\r
+                                                                                           "SEC fills the full temp stack with this values. When switch stack, PeiCore can check\n"\r
+                                                                                           "this value in the temp stack to know how many stack has been used.\n"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPageType_PROMPT  #language en-US "The memory type mask for Page Guard"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPageType_HELP    #language en-US "Indicates which type allocation need guard page.\n\n"\r
+                                                                                        " If a bit is set, a head guard page and a tail guard page will be added just\n"\r
+                                                                                        " before and after corresponding type of pages allocated if there's enough\n"\r
+                                                                                        " free pages for all of them. The page allocation for the type related to\n"\r
+                                                                                        " cleared bits keeps the same as ususal.\n\n"\r
+                                                                                        " This PCD is only valid if BIT0 and/or BIT2 are set in PcdHeapGuardPropertyMask.\n\n"\r
+                                                                                        " Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>\n"\r
+                                                                                        "  EfiReservedMemoryType             0x0000000000000001\n"\r
+                                                                                        "  EfiLoaderCode                     0x0000000000000002\n"\r
+                                                                                        "  EfiLoaderData                     0x0000000000000004\n"\r
+                                                                                        "  EfiBootServicesCode               0x0000000000000008\n"\r
+                                                                                        "  EfiBootServicesData               0x0000000000000010\n"\r
+                                                                                        "  EfiRuntimeServicesCode            0x0000000000000020\n"\r
+                                                                                        "  EfiRuntimeServicesData            0x0000000000000040\n"\r
+                                                                                        "  EfiConventionalMemory             0x0000000000000080\n"\r
+                                                                                        "  EfiUnusableMemory                 0x0000000000000100\n"\r
+                                                                                        "  EfiACPIReclaimMemory              0x0000000000000200\n"\r
+                                                                                        "  EfiACPIMemoryNVS                  0x0000000000000400\n"\r
+                                                                                        "  EfiMemoryMappedIO                 0x0000000000000800\n"\r
+                                                                                        "  EfiMemoryMappedIOPortSpace        0x0000000000001000\n"\r
+                                                                                        "  EfiPalCode                        0x0000000000002000\n"\r
+                                                                                        "  EfiPersistentMemory               0x0000000000004000\n"\r
+                                                                                        "  OEM Reserved                      0x4000000000000000\n"\r
+                                                                                        "  OS Reserved                       0x8000000000000000\n"\r
+                                                                                        " e.g. LoaderCode+LoaderData+BootServicesCode+BootServicesData are needed, 0x1E should be used.<BR>"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPoolType_PROMPT  #language en-US "The memory type mask for Pool Guard"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPoolType_HELP    #language en-US "Indicates which type allocation need guard page.\n\n"\r
+                                                                                        " If a bit is set, a head guard page and a tail guard page will be added just\n"\r
+                                                                                        " before and after corresponding type of pages which the allocated pool occupies,\n"\r
+                                                                                        " if there's enough free memory for all of them. The pool allocation for the\n"\r
+                                                                                        " type related to cleared bits keeps the same as ususal.\n\n"\r
+                                                                                        " This PCD is only valid if BIT1 and/or BIT3 are set in PcdHeapGuardPropertyMask.\n\n"\r
+                                                                                        " Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>\n"\r
+                                                                                        "  EfiReservedMemoryType             0x0000000000000001\n"\r
+                                                                                        "  EfiLoaderCode                     0x0000000000000002\n"\r
+                                                                                        "  EfiLoaderData                     0x0000000000000004\n"\r
+                                                                                        "  EfiBootServicesCode               0x0000000000000008\n"\r
+                                                                                        "  EfiBootServicesData               0x0000000000000010\n"\r
+                                                                                        "  EfiRuntimeServicesCode            0x0000000000000020\n"\r
+                                                                                        "  EfiRuntimeServicesData            0x0000000000000040\n"\r
+                                                                                        "  EfiConventionalMemory             0x0000000000000080\n"\r
+                                                                                        "  EfiUnusableMemory                 0x0000000000000100\n"\r
+                                                                                        "  EfiACPIReclaimMemory              0x0000000000000200\n"\r
+                                                                                        "  EfiACPIMemoryNVS                  0x0000000000000400\n"\r
+                                                                                        "  EfiMemoryMappedIO                 0x0000000000000800\n"\r
+                                                                                        "  EfiMemoryMappedIOPortSpace        0x0000000000001000\n"\r
+                                                                                        "  EfiPalCode                        0x0000000000002000\n"\r
+                                                                                        "  EfiPersistentMemory               0x0000000000004000\n"\r
+                                                                                        "  OEM Reserved                      0x4000000000000000\n"\r
+                                                                                        "  OS Reserved                       0x8000000000000000\n"\r
+                                                                                        " e.g. LoaderCode+LoaderData+BootServicesCode+BootServicesData are needed, 0x1E should be used.<BR>"\r
+\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPropertyMask_PROMPT  #language en-US "The Heap Guard feature mask"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPropertyMask_HELP    #language en-US "This mask is to control Heap Guard behavior.\n"\r
+                                                                                            " Note:\n"\r
+                                                                                            "   a) Heap Guard is for debug purpose and should not be enabled in product"\r
+                                                                                            "      BIOS.\n"\r
+                                                                                            "   b) Due to the limit of pool memory implementation and the alignment"\r
+                                                                                            "      requirement of UEFI spec, BIT7 is a try-best setting which cannot"\r
+                                                                                            "      guarantee that the returned pool is exactly adjacent to head guard"\r
+                                                                                            "      page or tail guard page.\n"\r
+                                                                                            "   c) UEFI freed-memory guard and UEFI pool/page guard cannot be enabled"\r
+                                                                                            "      at the same time.\n"\r
+                                                                                            "   BIT0 - Enable UEFI page guard.<BR>\n"\r
+                                                                                            "   BIT1 - Enable UEFI pool guard.<BR>\n"\r
+                                                                                            "   BIT2 - Enable SMM page guard.<BR>\n"\r
+                                                                                            "   BIT3 - Enable SMM pool guard.<BR>\n"\r
+                                                                                            "   BIT4 - Enable UEFI freed-memory guard (Use-After-Free memory detection).<BR>\n"\r
+                                                                                            "   BIT7 - The direction of Guard Page for Pool Guard.\n"\r
+                                                                                            "          0 - The returned pool is near the tail guard page.<BR>\n"\r
+                                                                                            "          1 - The returned pool is near the head guard page.<BR>"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCpuStackGuard_PROMPT  #language en-US "Enable UEFI Stack Guard"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdCpuStackGuard_HELP    #language en-US "Indicates if UEFI Stack Guard will be enabled.\n"\r
+                                                                                    "  If enabled, stack overflow in UEFI can be caught, preventing chaotic consequences.<BR><BR>\n"\r
+                                                                                    "   TRUE  - UEFI Stack Guard will be enabled.<BR>\n"\r
+                                                                                    "   FALSE - UEFI Stack Guard will be disabled.<BR>"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSetNvStoreDefaultId_PROMPT  #language en-US "NV Storage DefaultId"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdSetNvStoreDefaultId_HELP    #language en-US "This dynamic PCD enables the default variable setting.\n"\r
+                                                                                    "  Its value is the default store ID value. The default value is zero as Standard default.\n"\r
+                                                                                    "  When its value is set in PEI, it will trig the default setting to be applied as the default EFI variable.\n"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdNvStoreDefaultValueBuffer_PROMPT  #language en-US "NV Storage Default Value Buffer"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdNvStoreDefaultValueBuffer_HELP    #language en-US "This dynamic PCD holds the DynamicHii PCD value. Its value is the auto generated.\n"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdEdkiiFpdtStringRecordEnableOnly_PROMPT  #language en-US "String FPDT Record Enable Only"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdEdkiiFpdtStringRecordEnableOnly_HELP    #language en-US "Control which FPDT record format will be used to store the performance entry.\n"\r
+                                                                                                      "On TRUE, the string FPDT record will be used to store every performance entry.\n"\r
+                                                                                                      "On FALSE, the different FPDT record will be used to store the different performance entries."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdVpdBaseAddress64_PROMPT  #language en-US "64bit VPD base address"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdVpdBaseAddress64_HELP  #language en-US "VPD type PCD allows a developer to point to an absolute physical address PcdVpdBaseAddress64"\r
+                                                                                   "to store PCD value. It will be DynamicExDefault only."\r
+                                                                                   "It is used to set VPD region base address. So, it can't be DynamicExVpd PCD. Its value is"\r
+                                                                                   "required to be accessed in PcdDxe driver entry point. So, its value must be set in PEI phase."\r
+                                                                                   "It can't depend on EFI variable service, and can't be DynamicExHii PCD."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdUse5LevelPageTable_PROMPT  #language en-US "Enable 5-Level Paging support in long mode"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdUse5LevelPageTable_HELP  #language en-US "Indicates if 5-Level Paging will be enabled in long mode. 5-Level Paging will not be enabled"\r
+                                                                                    "when the PCD is TRUE but CPU doesn't support 5-Level Paging."\r
+                                                                                    " TRUE  - 5-Level Paging will be enabled."\r
+                                                                                    " FALSE - 5-Level Paging will not be enabled."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdTcgPfpMeasurementRevision_PROMPT #language en-US "TCG Platform Firmware Profile revision"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdTcgPfpMeasurementRevision_HELP #language en-US "Indicates which TCG Platform Firmware Profile revision the EDKII firmware follows."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdGhcbBase_PROMPT #language en-US "Guest-Hypervisor Communication Block (GHCB) Pool Base Address"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdGhcbBase_HELP #language en-US "Used with SEV-ES support to identify an address range that is not to be encrypted."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdGhcbSize_PROMPT #language en-US "Guest-Hypervisor Communication Block (GHCB) Pool Base Size"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdGhcbSize_HELP #language en-US "Used with SEV-ES support to identify the size of the address range that is not to be encrypted."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPcieResizableBarSupport_PROMPT #language en-US "Enable PCIe Resizable BAR Capability Supported"\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdPcieResizableBarSupport_HELP #language en-US "Indicates if the PCIe Resizable BAR Capability Supported.<BR><BR>\n"\r
+                                                                                            "TRUE  - PCIe Resizable BAR Capability is supported.<BR>\n"\r
+                                                                                            "FALSE - PCIe Resizable BAR Capability is not supported.<BR>"\r