]> git.proxmox.com Git - mirror_edk2.git/blobdiff - MdeModulePkg/MdeModulePkg.uni
IntelFsp2Pkg/GenCfgOpt.py: Support UPD offset auto assignment
[mirror_edk2.git] / MdeModulePkg / MdeModulePkg.uni
index f3fa616438b0e37ea6feccbee6c4ab1f9d8f1035..a6bcb627cf3ba425d075e92c9b7955c95560e53b 100644 (file)
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxAuthVariableSize_HELP  #language en-US "The maximum size of a single authenticated variable."\r
                                                                                         "The value is 0 as default for compatibility that maximum authenticated variable size is specified by PcdMaxVariableSize."\r
 \r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxVolatileVariableSize_PROMPT  #language en-US "The maximum size of a single non-authenticated volatile variable."\r
+\r
+#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxVolatileVariableSize_HELP  #language en-US "The maximum size of a single non-authenticated volatile variable.<BR><BR>\n"\r
+                                                                                            "The default value is 0 for compatibility: in that case, the maximum "\r
+                                                                                            "non-authenticated volatile variable size remains specified by "\r
+                                                                                            "PcdMaxVariableSize.<BR>\n"\r
+                                                                                            "Only the MdeModulePkg/Universal/Variable/RuntimeDxe driver supports this PCD.<BR>"\r
+\r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxHardwareErrorVariableSize_PROMPT  #language en-US "Maximum HwErr variable size"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdMaxHardwareErrorVariableSize_HELP  #language en-US "The maximum size of single hardware error record variable.<BR><BR>\n"\r
                                                                                   "For the DxeIpl and the DxeCore are both X64, set NX for stack feature also require PcdDxeIplBuildPageTables be TRUE.<BR>"\r
                                                                                   "For the DxeIpl and the DxeCore are both IA32 (PcdDxeIplSwitchToLongMode is FALSE), set NX for stack feature also require"\r
                                                                                   "IA32 PAE is supported and Execute Disable Bit is available.<BR>"\r
-                                                                                  "TRUE  - to set NX for stack.<BR>"\r
-                                                                                  "FALSE - Not to set NX for stack.<BR>"\r
+                                                                                  "TRUE  - Set NX for stack.<BR>"\r
+                                                                                  "FALSE - Do nothing for stack.<BR>"\r
+                                                                                  "Note: If this PCD is set to FALSE, NX could be still applied to stack due to PcdDxeNxMemoryProtectionPolicy enabled for EfiBootServicesData.<BR>"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdAcpiS3Enable_PROMPT  #language en-US "ACPI S3 Enable"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdImageProtectionPolicy_HELP  #language en-US "Set image protection policy. The policy is bitwise.\n"\r
                                                                                           "If a bit is set, the image will be protected by DxeCore if it is aligned.\n"\r
                                                                                           "The code section becomes read-only, and the data section becomes non-executable.\n"\r
-                                                                                          "If a bit is clear, the image will not be protected.<BR><BR>\n"\r
+                                                                                          "If a bit is clear, nothing will be done to image code/data sections.<BR><BR>\n"\r
                                                                                           "BIT0       - Image from unknown device. <BR>\n"\r
                                                                                           "BIT1       - Image from firmware volume.<BR>"\r
+                                                                                          "Note: If a bit is cleared, the data section could be still non-executable if\n"\r
+                                                                                          "PcdDxeNxMemoryProtectionPolicy is enabled for EfiLoaderData, EfiBootServicesData\n"\r
+                                                                                          "and/or EfiRuntimeServicesData.<BR>"\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdDxeNxMemoryProtectionPolicy_PROMPT  #language en-US "Set DXE memory protection policy."\r
 \r
 #string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdDxeNxMemoryProtectionPolicy_HELP  #language en-US "Set DXE memory protection policy. The policy is bitwise.\n"\r
                                                                                                 "If a bit is set, memory regions of the associated type will be mapped\n"\r
-                                                                                                "non-executable.<BR><BR>\n"\r
+                                                                                                "non-executable.<BR>\n"\r
+                                                                                                "If a bit is cleared, nothing will be done to associated type of memory.<BR><BR>\n"\r
                                                                                                 "\n"\r
                                                                                                 "Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>\n"\r
                                                                                                 "EfiReservedMemoryType          0x0001<BR>\n"\r