GCC_ASM_EXPORT(ArmPlatformIsMemoryInitialized)\r
GCC_ASM_EXPORT(ArmPlatformInitializeBootMemory)\r
\r
-/**
- Called at the early stage of the Boot phase to know if the memory has already been initialized
-
- Running the code from the reset vector does not mean we start from cold boot. In some case, we
- can go through this code with the memory already initialized.
- Because this function is called at the early stage, the implementation must not use the stack.
- Its implementation must probably done in assembly to ensure this requirement.
-
- @return Return the condition value into the 'Z' flag
-
-**/
+/**\r
+ Called at the early stage of the Boot phase to know if the memory has already been initialized\r
+\r
+ Running the code from the reset vector does not mean we start from cold boot. In some case, we\r
+ can go through this code with the memory already initialized.\r
+ Because this function is called at the early stage, the implementation must not use the stack.\r
+ Its implementation must probably done in assembly to ensure this requirement.\r
+\r
+ @return Return the condition value into the 'Z' flag\r
+\r
+**/\r
ASM_PFX(ArmPlatformIsMemoryInitialized):\r
- // Check if the memory has been already mapped, if so skipped the memory initialization
- LoadConstantToReg (ARM_EB_SYSCTRL, r0)
- ldr r0, [r0, #0]
-
- // 0x200 (BIT9): This read-only bit returns the remap status.
- and r0, r0, #0x200
- tst r0, #0x200
+ // Check if the memory has been already mapped, if so skipped the memory initialization\r
+ LoadConstantToReg (ARM_EB_SYSCTRL, r0)\r
+ ldr r0, [r0, #0]\r
+ \r
+ // 0x200 (BIT9): This read-only bit returns the remap status.\r
+ and r0, r0, #0x200\r
+ tst r0, #0x200\r
bx lr\r
\r
-/**
- Initialize the memory where the initial stacks will reside
-
- This memory can contain the initial stacks (Secure and Secure Monitor stacks).
- In some platform, this region is already initialized and the implementation of this function can
- do nothing. This memory can also represent the Secure RAM.
- This function is called before the satck has been set up. Its implementation must ensure the stack
- pointer is not used (probably required to use assembly language)
-
-**/
+/**\r
+ Initialize the memory where the initial stacks will reside\r
+\r
+ This memory can contain the initial stacks (Secure and Secure Monitor stacks).\r
+ In some platform, this region is already initialized and the implementation of this function can\r
+ do nothing. This memory can also represent the Secure RAM.\r
+ This function is called before the satck has been set up. Its implementation must ensure the stack\r
+ pointer is not used (probably required to use assembly language)\r
+\r
+**/\r
ASM_PFX(ArmPlatformInitializeBootMemory):\r
// The SMC does not need to be initialized for RTSM\r
bx lr\r
\r
-.end\r
+ASM_FUNCTION_REMOVE_IF_UNREFERENCED
\ No newline at end of file
#start of the code section
.text
-.align 5\r
-\r
+.align 5
+
# IMPORT
GCC_ASM_IMPORT(SecCommonExceptionEntry)
# EXPORT
GCC_ASM_EXPORT(SecVectorTable)
-\r
+
//============================================================
//Default Exception Handlers
//============================================================
//FIXME: One of the EDK2 tool is broken. It does not look to respect the alignment. Even, if we specify 32-byte alignment for this file.
-Dummy1: .word 0\r
-Dummy2: .word 0\r
+Dummy1: .word 0
+Dummy2: .word 0
ASM_PFX(SecVectorTable):
b _DefaultResetHandler
cps #0x13
mov r0, #7
blx SecCommonExceptionEntry
-\r
-.end\r
+
+