summaryrefslogtreecommitdiffstats
path: root/OvmfPkg/Sec/Ia32/SecEntry.S
diff options
context:
space:
mode:
Diffstat (limited to 'OvmfPkg/Sec/Ia32/SecEntry.S')
-rw-r--r--OvmfPkg/Sec/Ia32/SecEntry.S19
1 files changed, 6 insertions, 13 deletions
diff --git a/OvmfPkg/Sec/Ia32/SecEntry.S b/OvmfPkg/Sec/Ia32/SecEntry.S
index 50ba5aa99e..4240f3377f 100644
--- a/OvmfPkg/Sec/Ia32/SecEntry.S
+++ b/OvmfPkg/Sec/Ia32/SecEntry.S
@@ -1,8 +1,4 @@
-#
-# ConvertAsm.py: Automatically generated from SecEntry.asm
-#
# TITLE SecEntry.asm
-
#------------------------------------------------------------------------------
#*
#* Copyright 2006 - 2009, Intel Corporation
@@ -26,16 +22,15 @@
#EXTERN ASM_PFX(SecCoreStartupWithStack)
#
-# SecCore Entry Point
-#
-# Processor is in flat protected mode
+# SecCore Entry Point
#
-# @param ESI Pointer to SEC Core Entry Point (this function)
-# @param EDI Pointer to PEI Core Entry Point
-# @param EBP Pointer to the start of the Boot Firmware Volume
+# Processor is in flat protected mode
#
-# @return None
+# @param[in] EAX Initial value of the EAX register (BIST: Built-in Self Test)
+# @param[in] DI 'BP': boot-strap processor, or 'AP': application processor
+# @param[in] EBP Pointer to the start of the Boot Firmware Volume
#
+# @return None This routine does not return
#
ASM_GLOBAL ASM_PFX(_ModuleEntryPoint)
ASM_PFX(_ModuleEntryPoint):
@@ -52,8 +47,6 @@ ASM_PFX(_ModuleEntryPoint):
# Call into C code
#
pushl %eax
- pushl %edi
- pushl %esi
pushl %ebp
call ASM_PFX(SecCoreStartupWithStack)