diff options
Diffstat (limited to 'OvmfPkg/Sec/Ia32/SecEntry.S')
-rw-r--r-- | OvmfPkg/Sec/Ia32/SecEntry.S | 63 |
1 files changed, 63 insertions, 0 deletions
diff --git a/OvmfPkg/Sec/Ia32/SecEntry.S b/OvmfPkg/Sec/Ia32/SecEntry.S new file mode 100644 index 0000000000..9fefebca5f --- /dev/null +++ b/OvmfPkg/Sec/Ia32/SecEntry.S @@ -0,0 +1,63 @@ +# +# ConvertAsm.py: Automatically generated from SecEntry.asm +# +# TITLE SecEntry.asm + +#------------------------------------------------------------------------------ +#* +#* Copyright 2006 - 2009, Intel Corporation +#* All rights reserved. This program and the accompanying materials +#* are licensed and made available under the terms and conditions of the BSD License +#* which accompanies this distribution. The full text of the license may be found at +#* http://opensource.org/licenses/bsd-license.php +#* +#* THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +#* WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. +#* +#* CpuAsm.asm +#* +#* Abstract: +#* +#------------------------------------------------------------------------------ + + +#include "SecMain.h" + +#EXTERN ASM_PFX(SecCoreStartupWithStack) + +# +# SecCore Entry Point +# +# Processor is in flat protected mode +# +# @param ESI Pointer to SEC Core Entry Point (this function) +# @param EDI Pointer to PEI Core Entry Point +# @param EBP Pointer to the start of the Boot Firmware Volume +# +# @return None +# +# +.intel_syntax +ASM_GLOBAL ASM_PFX(_ModuleEntryPoint) +ASM_PFX(_ModuleEntryPoint): + + # + # Load temporary stack top at very low memory. The C code + # can reload to a better address. + # + mov eax, INITIAL_TOP_OF_STACK + mov esp, eax + nop + + # + # Call into C code + # + push eax + push edi + push esi + push ebp + call ASM_PFX(SecCoreStartupWithStack) + + +#END + |