diff options
author | jljusten <jljusten@6f19259b-4bc3-4df7-8a09-765794883524> | 2009-12-16 23:29:17 +0000 |
---|---|---|
committer | jljusten <jljusten@6f19259b-4bc3-4df7-8a09-765794883524> | 2009-12-16 23:29:17 +0000 |
commit | 0913fadc1af9edf545d5dd4120e0a708dfb73af0 (patch) | |
tree | 268f0551065ff5347bdeff734b336f191a19e830 /OvmfPkg/Sec/Ia32 | |
parent | 7a55c43b072ec2192d35df5e44cf37eb8be06555 (diff) | |
download | edk2-platforms-0913fadc1af9edf545d5dd4120e0a708dfb73af0.tar.xz |
OVMF SEC: Modify to match new interface of reset vector module
Previously the interface to the SEC module was:
ESI/RSI - SEC Core entry point
EDI/RDI - PEI Core entry point
EBP/RBP - Start of BFV
Now it is:
RAX/EAX Initial value of the EAX register
(BIST: Built-in Self Test)
DI 'BP': boot-strap processor, or
'AP': application processor
RBP/EBP Address of Boot Firmware Volume (BFV)
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@9572 6f19259b-4bc3-4df7-8a09-765794883524
Diffstat (limited to 'OvmfPkg/Sec/Ia32')
-rw-r--r-- | OvmfPkg/Sec/Ia32/SecEntry.S | 19 | ||||
-rw-r--r-- | OvmfPkg/Sec/Ia32/SecEntry.asm | 15 |
2 files changed, 12 insertions, 22 deletions
diff --git a/OvmfPkg/Sec/Ia32/SecEntry.S b/OvmfPkg/Sec/Ia32/SecEntry.S index 50ba5aa99e..4240f3377f 100644 --- a/OvmfPkg/Sec/Ia32/SecEntry.S +++ b/OvmfPkg/Sec/Ia32/SecEntry.S @@ -1,8 +1,4 @@ -# -# ConvertAsm.py: Automatically generated from SecEntry.asm -# # TITLE SecEntry.asm - #------------------------------------------------------------------------------ #* #* Copyright 2006 - 2009, Intel Corporation @@ -26,16 +22,15 @@ #EXTERN ASM_PFX(SecCoreStartupWithStack) # -# SecCore Entry Point -# -# Processor is in flat protected mode +# SecCore Entry Point # -# @param ESI Pointer to SEC Core Entry Point (this function) -# @param EDI Pointer to PEI Core Entry Point -# @param EBP Pointer to the start of the Boot Firmware Volume +# Processor is in flat protected mode # -# @return None +# @param[in] EAX Initial value of the EAX register (BIST: Built-in Self Test) +# @param[in] DI 'BP': boot-strap processor, or 'AP': application processor +# @param[in] EBP Pointer to the start of the Boot Firmware Volume # +# @return None This routine does not return # ASM_GLOBAL ASM_PFX(_ModuleEntryPoint) ASM_PFX(_ModuleEntryPoint): @@ -52,8 +47,6 @@ ASM_PFX(_ModuleEntryPoint): # Call into C code # pushl %eax - pushl %edi - pushl %esi pushl %ebp call ASM_PFX(SecCoreStartupWithStack) diff --git a/OvmfPkg/Sec/Ia32/SecEntry.asm b/OvmfPkg/Sec/Ia32/SecEntry.asm index 48b97a40f9..eae2801d18 100644 --- a/OvmfPkg/Sec/Ia32/SecEntry.asm +++ b/OvmfPkg/Sec/Ia32/SecEntry.asm @@ -25,16 +25,15 @@ EXTERN SecCoreStartupWithStack:PROC
;
-; SecCore Entry Point
+; SecCore Entry Point
;
-; Processor is in flat protected mode
+; Processor is in flat protected mode
;
-; @param ESI Pointer to SEC Core Entry Point (this function)
-; @param EDI Pointer to PEI Core Entry Point
-; @param EBP Pointer to the start of the Boot Firmware Volume
-;
-; @return None
+; @param[in] EAX Initial value of the EAX register (BIST: Built-in Self Test)
+; @param[in] DI 'BP': boot-strap processor, or 'AP': application processor
+; @param[in] EBP Pointer to the start of the Boot Firmware Volume
;
+; @return None This routine does not return
;
_ModuleEntryPoint PROC PUBLIC
@@ -50,8 +49,6 @@ _ModuleEntryPoint PROC PUBLIC ; Call into C code
;
push eax
- push edi
- push esi
push ebp
call SecCoreStartupWithStack
|