-#
-# ConvertAsm.py: Automatically generated from SecEntry.asm
-#
# TITLE SecEntry.asm
-
#------------------------------------------------------------------------------
#*
#* Copyright 2006 - 2009, Intel Corporation
#EXTERN ASM_PFX(SecCoreStartupWithStack)
#
-# SecCore Entry Point
-#
-# Processor is in flat protected mode
+# SecCore Entry Point
#
-# @param ESI Pointer to SEC Core Entry Point (this function)
-# @param EDI Pointer to PEI Core Entry Point
-# @param EBP Pointer to the start of the Boot Firmware Volume
+# Processor is in flat protected mode
#
-# @return None
+# @param[in] EAX Initial value of the EAX register (BIST: Built-in Self Test)
+# @param[in] DI 'BP': boot-strap processor, or 'AP': application processor
+# @param[in] EBP Pointer to the start of the Boot Firmware Volume
#
+# @return None This routine does not return
#
-.intel_syntax
ASM_GLOBAL ASM_PFX(_ModuleEntryPoint)
ASM_PFX(_ModuleEntryPoint):
# Load temporary stack top at very low memory. The C code
# can reload to a better address.
#
- mov eax, INITIAL_TOP_OF_STACK
- mov esp, eax
+ movl $INITIAL_TOP_OF_STACK, %eax
+ movl %eax, %esp
nop
#
# Call into C code
#
- push eax
- push edi
- push esi
- push ebp
+ pushl %eax
+ pushl %ebp
call ASM_PFX(SecCoreStartupWithStack)