diff options
author | Guo Dong <guo.dong@intel.com> | 2021-09-28 20:34:40 -0700 |
---|---|---|
committer | mergify[bot] <37929162+mergify[bot]@users.noreply.github.com> | 2021-09-30 16:26:14 +0000 |
commit | 422e5d2f7f1abbecd9dd7baad54213251a8ed47f (patch) | |
tree | e2b97dae6156d26e6231b8907616e44730202952 /UefiPayloadPkg/UefiPayloadEntry/X64 | |
parent | 22737996771c8053189b8fe2839cf4a96272784a (diff) | |
download | edk2-422e5d2f7f1abbecd9dd7baad54213251a8ed47f.tar.gz edk2-422e5d2f7f1abbecd9dd7baad54213251a8ed47f.tar.bz2 edk2-422e5d2f7f1abbecd9dd7baad54213251a8ed47f.zip |
UefiPayloadPkg: Remove asm code and sharing libraries
Remove asm code used for payload entry.
Use patchable PCD instead a fixed PCD PcdPayloadStackTop to avoid
potential conflict.
Based on the removal, use same HobLib regardless UNIVERSAL_PAYLOAD.
Use same PlatformHookLib regardless UNIVERSAL_PAYLOAD. The original
PlatformHookLib was removed and UniversalPayloadPlatformHookLib was
rename to new PlatformHookLib.
Cc: Ray Ni <ray.ni@intel.com>
Cc: Maurice Ma <maurice.ma@intel.com>
Cc: Benjamin You <benjamin.you@intel.com>
Signed-off-by: Guo Dong <guo.dong@intel.com>
Reviewed-by: Ray Ni <ray.ni@intel.com>
Diffstat (limited to 'UefiPayloadPkg/UefiPayloadEntry/X64')
-rw-r--r-- | UefiPayloadPkg/UefiPayloadEntry/X64/SecEntry.nasm | 47 |
1 files changed, 0 insertions, 47 deletions
diff --git a/UefiPayloadPkg/UefiPayloadEntry/X64/SecEntry.nasm b/UefiPayloadPkg/UefiPayloadEntry/X64/SecEntry.nasm deleted file mode 100644 index 974cf77771..0000000000 --- a/UefiPayloadPkg/UefiPayloadEntry/X64/SecEntry.nasm +++ /dev/null @@ -1,47 +0,0 @@ -;------------------------------------------------------------------------------
-;*
-;* Copyright (c) 2006 - 2020, Intel Corporation. All rights reserved.<BR>
-;* SPDX-License-Identifier: BSD-2-Clause-Patent
-
-;------------------------------------------------------------------------------
-
-#include <Base.h>
-
-DEFAULT REL
-SECTION .text
-
-extern ASM_PFX(PayloadEntry)
-extern ASM_PFX(PcdGet32 (PcdPayloadStackTop))
-
-;
-; SecCore Entry Point
-;
-; Processor is in flat protected mode
-
-global ASM_PFX(_ModuleEntryPoint)
-ASM_PFX(_ModuleEntryPoint):
-
- ;
- ; Disable all the interrupts
- ;
- cli
-
-
- mov rsp, FixedPcdGet32 (PcdPayloadStackTop)
-
- ;
- ; Push the bootloader parameter address onto new stack
- ;
- push rcx
- mov rax, 0
- push rax ; shadow space
- push rax
- push rax
- push rax
-
- ;
- ; Call into C code
- ;
- call ASM_PFX(PayloadEntry)
- jmp $
-
|