blob: 7fee1c2b2e4ff1f12f016209bc901aa59fcf7cbb [file] [log] [blame]
Vishal Bhoj82c80712015-12-15 21:13:33 +05301;------------------------------------------------------------------------------
2;*
3;* Copyright (c) 2006 - 2013, Intel Corporation. All rights reserved.<BR>
4;* This program and the accompanying materials
5;* are licensed and made available under the terms and conditions of the BSD License
6;* which accompanies this distribution. The full text of the license may be found at
7;* http://opensource.org/licenses/bsd-license.php
8;*
9;* THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
10;* WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
11;*
12;* CpuAsm.asm
13;*
14;* Abstract:
15;*
16;------------------------------------------------------------------------------
17
18#include <Base.h>
19
20 SECTION .text
21
22extern ASM_PFX(SecCoreStartupWithStack)
23
24;
25; SecCore Entry Point
26;
27; Processor is in flat protected mode
28;
29; @param[in] EAX Initial value of the EAX register (BIST: Built-in Self Test)
30; @param[in] DI 'BP': boot-strap processor, or 'AP': application processor
31; @param[in] EBP Pointer to the start of the Boot Firmware Volume
32;
33; @return None This routine does not return
34;
35global ASM_PFX(_ModuleEntryPoint)
36ASM_PFX(_ModuleEntryPoint):
37
38 ;
39 ; Load temporary RAM stack based on PCDs
40 ;
41 %define SEC_TOP_OF_STACK (FixedPcdGet32 (PcdOvmfSecPeiTempRamBase) + \
42 FixedPcdGet32 (PcdOvmfSecPeiTempRamSize))
43 mov eax, SEC_TOP_OF_STACK
44 mov esp, eax
45 nop
46
47 ;
48 ; Setup parameters and call SecCoreStartupWithStack
49 ; [esp] return address for call
50 ; [esp+4] BootFirmwareVolumePtr
51 ; [esp+8] TopOfCurrentStack
52 ;
53 push eax
54 push ebp
55 call ASM_PFX(SecCoreStartupWithStack)
56