]> git.proxmox.com Git - mirror_edk2.git/blame - OvmfPkg/Sec/Ia32/SecEntry.S
OVMF ResetVector: Modify interface with SEC module
[mirror_edk2.git] / OvmfPkg / Sec / Ia32 / SecEntry.S
CommitLineData
49ba9447 1#
2# ConvertAsm.py: Automatically generated from SecEntry.asm
3#
4# TITLE SecEntry.asm
5
6#------------------------------------------------------------------------------
7#*
8#* Copyright 2006 - 2009, Intel Corporation
9#* All rights reserved. This program and the accompanying materials
10#* are licensed and made available under the terms and conditions of the BSD License
11#* which accompanies this distribution. The full text of the license may be found at
12#* http://opensource.org/licenses/bsd-license.php
13#*
14#* THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
15#* WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
16#*
17#* CpuAsm.asm
18#*
19#* Abstract:
20#*
21#------------------------------------------------------------------------------
22
23
24#include "SecMain.h"
25
26#EXTERN ASM_PFX(SecCoreStartupWithStack)
27
28#
29# SecCore Entry Point
30#
31# Processor is in flat protected mode
32#
33# @param ESI Pointer to SEC Core Entry Point (this function)
34# @param EDI Pointer to PEI Core Entry Point
35# @param EBP Pointer to the start of the Boot Firmware Volume
36#
37# @return None
38#
39#
49ba9447 40ASM_GLOBAL ASM_PFX(_ModuleEntryPoint)
41ASM_PFX(_ModuleEntryPoint):
42
43 #
44 # Load temporary stack top at very low memory. The C code
45 # can reload to a better address.
46 #
16e864a2 47 movl $INITIAL_TOP_OF_STACK, %eax
48 movl %eax, %esp
49ba9447 49 nop
50
51 #
52 # Call into C code
53 #
16e864a2 54 pushl %eax
55 pushl %edi
56 pushl %esi
57 pushl %ebp
49ba9447 58 call ASM_PFX(SecCoreStartupWithStack)
59
60
61#END
62