summaryrefslogtreecommitdiff
path: root/OvmfPkg/Sec/Ia32/SecEntry.S
diff options
context:
space:
mode:
Diffstat (limited to 'OvmfPkg/Sec/Ia32/SecEntry.S')
-rw-r--r--OvmfPkg/Sec/Ia32/SecEntry.S63
1 files changed, 63 insertions, 0 deletions
diff --git a/OvmfPkg/Sec/Ia32/SecEntry.S b/OvmfPkg/Sec/Ia32/SecEntry.S
new file mode 100644
index 0000000000..9fefebca5f
--- /dev/null
+++ b/OvmfPkg/Sec/Ia32/SecEntry.S
@@ -0,0 +1,63 @@
+#
+# ConvertAsm.py: Automatically generated from SecEntry.asm
+#
+# TITLE SecEntry.asm
+
+#------------------------------------------------------------------------------
+#*
+#* Copyright 2006 - 2009, Intel Corporation
+#* All rights reserved. This program and the accompanying materials
+#* are licensed and made available under the terms and conditions of the BSD License
+#* which accompanies this distribution. The full text of the license may be found at
+#* http://opensource.org/licenses/bsd-license.php
+#*
+#* THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+#* WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+#*
+#* CpuAsm.asm
+#*
+#* Abstract:
+#*
+#------------------------------------------------------------------------------
+
+
+#include "SecMain.h"
+
+#EXTERN ASM_PFX(SecCoreStartupWithStack)
+
+#
+# SecCore Entry Point
+#
+# Processor is in flat protected mode
+#
+# @param ESI Pointer to SEC Core Entry Point (this function)
+# @param EDI Pointer to PEI Core Entry Point
+# @param EBP Pointer to the start of the Boot Firmware Volume
+#
+# @return None
+#
+#
+.intel_syntax
+ASM_GLOBAL ASM_PFX(_ModuleEntryPoint)
+ASM_PFX(_ModuleEntryPoint):
+
+ #
+ # Load temporary stack top at very low memory. The C code
+ # can reload to a better address.
+ #
+ mov eax, INITIAL_TOP_OF_STACK
+ mov esp, eax
+ nop
+
+ #
+ # Call into C code
+ #
+ push eax
+ push edi
+ push esi
+ push ebp
+ call ASM_PFX(SecCoreStartupWithStack)
+
+
+#END
+