aboutsummaryrefslogtreecommitdiffstats
path: root/roms/edk2/UefiPayloadPkg/SecCore/Ia32/SecEntry.nasm
blob: 877fc61ef0b3ba3c224716db416f0019aa3fca3a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
;------------------------------------------------------------------------------
;
; Copyright (c) 2015 - 2016, Intel Corporation. All rights reserved.<BR>
; SPDX-License-Identifier: BSD-2-Clause-Patent
;
; Abstract:
;
;   Entry point for the coreboot UEFI payload.
;
;------------------------------------------------------------------------------

SECTION .text

; C Functions
extern  ASM_PFX(SecStartup)

; Pcds
extern  ASM_PFX(PcdGet32 (PcdPayloadFdMemBase))
extern  ASM_PFX(PcdGet32 (PcdPayloadStackTop))

;
; SecCore Entry Point
;
; Processor is in flat protected mode
;
; @param[in]  EAX   Initial value of the EAX register (BIST: Built-in Self Test)
; @param[in]  DI    'BP': boot-strap processor, or 'AP': application processor
; @param[in]  EBP   Pointer to the start of the Boot Firmware Volume
;
; @return     None  This routine does not return
;
global ASM_PFX(_ModuleEntryPoint)
ASM_PFX(_ModuleEntryPoint):
  ;
  ; Disable all the interrupts
  ;
  cli

  ;
  ; Save the Payload HOB base address before switching the stack
  ;
  mov     eax, [esp + 4]

  ;
  ; Construct the temporary memory at 0x80000, length 0x10000
  ;
  mov     esp, DWORD [ASM_PFX(PcdGet32 (PcdPayloadStackTop))]

  ;
  ; Push the Payload HOB base address onto new stack
  ;
  push    eax

  ;
  ; Pass BFV into the PEI Core
  ;
  push    DWORD [ASM_PFX(PcdGet32 (PcdPayloadFdMemBase))]

  ;
  ; Pass stack base into the PEI Core
  ;
  push    BASE_512KB

  ;
  ; Pass stack size into the PEI Core
  ;
  push    SIZE_64KB

  ;
  ; Pass Control into the PEI Core
  ;
  call    ASM_PFX(SecStartup)

  ;
  ; Should never return
  ;
  jmp     $