]> git.proxmox.com Git - mirror_edk2.git/blame - EdkNt32Pkg/Sec/SecMain.msa
Remove the duplicated Copy Right in msa header.
[mirror_edk2.git] / EdkNt32Pkg / Sec / SecMain.msa
CommitLineData
7867eb23 1<?xml version="1.0" encoding="UTF-8"?>\r
53b86193 2<ModuleSurfaceArea xmlns="http://www.TianoCore.org/2006/Edk2.0">\r
878ddf1f 3 <MsaHeader>\r
2d527200 4 <ModuleName>SecMain</ModuleName>\r
5 <ModuleType>USER_DEFINED</ModuleType>\r
6 <GuidValue>4b837b03-6587-4d19-b82b-edfad836c0a0</GuidValue>\r
7 <Version>1.0</Version>\r
7867eb23 8 <Abstract>Entry Point of NT32 Emulator</Abstract>\r
9 <Description>Main executable file of NT32 Emulator that loads PEI core after initialization finished.</Description>\r
15f3b1d4 10 <Copyright>Copyright (c) 2006, Intel Corporation</Copyright>\r
0992e559
LG
11 <License>All rights reserved. This program and the accompanying materials\r
12 are licensed and made available under the terms and conditions of the BSD License\r
13 which accompanies this distribution. The full text of the license may be found at\r
14 http://opensource.org/licenses/bsd-license.php\r
15 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
2d527200 16 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.</License>\r
17 <Specification>FRAMEWORK_BUILD_PACKAGING_SPECIFICATION 0x00000052</Specification>\r
878ddf1f 18 </MsaHeader>\r
2d527200 19 <ModuleDefinitions>\r
20 <SupportedArchitectures>IA32 X64 IPF EBC</SupportedArchitectures>\r
21 <BinaryModule>false</BinaryModule>\r
22 <OutputFileBasename>SecMain</OutputFileBasename>\r
23 </ModuleDefinitions>\r
878ddf1f 24 <LibraryClassDefinitions>\r
2d527200 25 <LibraryClass Usage="ALWAYS_CONSUMED">\r
26 <Keyword>PeCoffLib</Keyword>\r
27 </LibraryClass>\r
28 <LibraryClass Usage="ALWAYS_CONSUMED">\r
29 <Keyword>BaseLib</Keyword>\r
30 </LibraryClass>\r
31 <LibraryClass Usage="ALWAYS_CONSUMED">\r
32 <Keyword>BaseMemoryLib</Keyword>\r
33 </LibraryClass>\r
34 <LibraryClass Usage="ALWAYS_CONSUMED">\r
35 <Keyword>PrintLib</Keyword>\r
36 </LibraryClass>\r
37 <LibraryClass Usage="ALWAYS_CONSUMED">\r
38 <Keyword>ReportStatusCodeLib</Keyword>\r
39 </LibraryClass>\r
40 <LibraryClass Usage="ALWAYS_CONSUMED">\r
41 <Keyword>PcdLib</Keyword>\r
42 </LibraryClass>\r
43 <LibraryClass Usage="ALWAYS_CONSUMED">\r
44 <Keyword>DebugLib</Keyword>\r
45 </LibraryClass>\r
878ddf1f 46 </LibraryClassDefinitions>\r
47 <SourceFiles>\r
69ce08bf 48 <Filename ToolCode="DUMMY">SecMain_build.xml</Filename>\r
878ddf1f 49 <Filename>SecMain.c</Filename>\r
50 <Filename>FwVol.c</Filename>\r
51 <Filename>WinNtThunk.c</Filename>\r
52 <Filename>SecMain.h</Filename>\r
53 </SourceFiles>\r
2d527200 54 <PackageDependencies>\r
55 <Package PackageGuid="5e0e9358-46b6-4ae2-8218-4ab8b9bbdcec"/>\r
0992e559 56 <Package PackageGuid="68169ab0-d41b-4009-9060-292c253ac43d"/>\r
2d527200 57 <Package PackageGuid="0fb2aa2d-10d5-40a5-a9dc-060c12a4a3f3"/>\r
58 </PackageDependencies>\r
878ddf1f 59 <PPIs>\r
2d527200 60 <Ppi Usage="ALWAYS_PRODUCED">\r
53b86193 61 <PpiCName>gPeiNtThunkPpiGuid</PpiCName>\r
2d527200 62 </Ppi>\r
63 <Ppi Usage="ALWAYS_PRODUCED">\r
53b86193 64 <PpiCName>gPeiNtAutoScanPpiGuid</PpiCName>\r
2d527200 65 </Ppi>\r
66 <Ppi Usage="ALWAYS_PRODUCED">\r
53b86193 67 <PpiCName>gNtFwhPpiGuid</PpiCName>\r
2d527200 68 </Ppi>\r
69 <Ppi Usage="ALWAYS_PRODUCED">\r
53b86193 70 <PpiCName>gEfiPeiStatusCodePpiGuid</PpiCName>\r
2d527200 71 </Ppi>\r
72 <Ppi Usage="ALWAYS_PRODUCED">\r
53b86193 73 <PpiCName>gNtPeiLoadFilePpiGuid</PpiCName>\r
2d527200 74 </Ppi>\r
878ddf1f 75 </PPIs>\r
76 <Guids>\r
2d527200 77 <GuidCNames Usage="ALWAYS_PRODUCED">\r
53b86193 78 <GuidCName>gEfiPeiPeCoffLoaderGuid</GuidCName>\r
2d527200 79 </GuidCNames>\r
878ddf1f 80 </Guids>\r
81 <Externs>\r
15b06e58
LG
82 <Specification>EFI_SPECIFICATION_VERSION 0x00020000</Specification>\r
83 <Specification>EDK_RELEASE_VERSION 0x00020000</Specification>\r
878ddf1f 84 </Externs>\r
95945c76 85 <PcdCoded>\r
8cf2c0a7 86 <PcdEntry PcdItemType="DYNAMIC">\r
b144ae9a 87 <C_Name>PcdWinNtMemorySizeForSecMain</C_Name>\r
53b86193 88 <TokenSpaceGuidCName>gEfiEdkNt32PkgTokenSpaceGuid</TokenSpaceGuidCName>\r
f7ba3555 89 <HelpText>This PCD defines the memory size of simulated machine. Simulator will allocate\r
8cf2c0a7 90 the size of PcdWinNtMemorySizeForSecMain in windows platform.</HelpText>\r
95945c76 91 </PcdEntry>\r
8cf2c0a7 92 <PcdEntry PcdItemType="DYNAMIC">\r
878ddf1f 93 <C_Name>PcdWinNtFirmwareVolume</C_Name>\r
53b86193 94 <TokenSpaceGuidCName>gEfiEdkNt32PkgTokenSpaceGuid</TokenSpaceGuidCName>\r
8cf2c0a7 95 <HelpText>This PCD defines the FD file windows path string. Simulator will load the FD file and execute.</HelpText>\r
95945c76 96 </PcdEntry>\r
8cf2c0a7 97 <PcdEntry PcdItemType="DYNAMIC">\r
878ddf1f 98 <C_Name>PcdWinNtBootMode</C_Name>\r
53b86193 99 <TokenSpaceGuidCName>gEfiEdkNt32PkgTokenSpaceGuid</TokenSpaceGuidCName>\r
f7ba3555 100 <HelpText>This PCD defines the boot mode for simualtor. \r
101 The boot mode can be set as following value:\r
102 0x0: Boot with full configuration.\r
103 0x1: Boot with minimal configuration.\r
104 0x2: Boot assume no configuration changes.\r
105 0x3: Boot with full configuration plus diagnostics.\r
106 0x4: Boot with default settings.\r
107 0x5: Boot on S4 resume.\r
108 0x6: Boot on S5 resume.\r
109 0x10: Boot on S2 resume. \r
110 0x11: Boot on S3 resume.\r
111 0x12: Boot on flash update.\r
8cf2c0a7 112 0x20: Boot in reovery mode.</HelpText>\r
95945c76 113 </PcdEntry>\r
114 </PcdCoded>\r
2d527200 115</ModuleSurfaceArea>