audk/UefiCpuPkg/ResetVector/Vtf0
Jordan Justen eee1d2ca90 UefiCpuPkg VTF0 X64: Build page tables in NASM code
Previously, we would build the page tables in
Tools/FixupForRawSection.py.

In order to let NASM build VTF0 from source during the EDK II build
process, we need to move this into the VTF0 NASM code.

Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Jordan Justen <jordan.l.justen@intel.com>
Reviewed-by: Liming Gao <liming.gao@intel.com>

git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@15822 6f19259b-4bc3-4df7-8a09-765794883524
2014-08-18 23:03:46 +00:00
..
Bin UefiCpuPkg VTF0: Fix support for finding SEC image of type TE. 2011-09-28 01:36:33 +00:00
Ia16 UefiCpuPkg VTF0 X64: Build page tables in NASM code 2014-08-18 23:03:46 +00:00
Ia32 UefiCpuPkg VTF0 X64: Build page tables in NASM code 2014-08-18 23:03:46 +00:00
Tools UefiCpuPkg VTF0 X64: Build page tables in NASM code 2014-08-18 23:03:46 +00:00
X64 UefiCpuPkg VTF0 X64: Build page tables in NASM code 2014-08-18 23:03:46 +00:00
Build.py UefiCpuPkg: Support building VTF0 ResetVector during the EDK II build 2014-08-18 23:03:30 +00:00
CommonMacros.inc
DebugDisabled.asm
Main.asm
Port80Debug.asm
PostCodes.inc
ReadMe.txt UefiCpuPkg VTF0: Rename README to ReadMe.txt, add nasm version 2011-09-20 01:49:52 +00:00
SerialDebug.asm
Vtf0.inf UefiCpuPkg: Support building VTF0 ResetVector during the EDK II build 2014-08-18 23:03:30 +00:00
Vtf0.nasmb UefiCpuPkg VTF0 X64: Build page tables in NASM code 2014-08-18 23:03:46 +00:00

ReadMe.txt

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.


=== HOW TO USE VTF0 ===

Add this line to your FDF FV section:
INF  RuleOverride=RESET_VECTOR USE = IA32 UefiCpuPkg/ResetVector/Vtf0/Bin/ResetVector.inf
(For X64 SEC/PEI change IA32 to X64 => 'USE = X64')

In your FDF FFS file rules sections add:
[Rule.Common.SEC.RESET_VECTOR]
  FILE RAW = $(NAMED_GUID) {
    RAW RAW                |.raw
  }

=== VTF0 Boot Flow ===

1. Transition to IA32 flat mode
2. Locate BFV (Boot Firmware Volume) by checking every 4kb boundary
3. Locate SEC image
4. X64 VTF0 transitions to X64 mode
5. Call SEC image entry point

== VTF0 SEC input parameters ==

All inputs to SEC image are register based:
EAX/RAX - Initial value of the EAX register (BIST: Built-in Self Test)
DI      - 'BP': boot-strap processor, or 'AP': application processor
EBP/RBP - Pointer to the start of the Boot Firmware Volume

=== HOW TO BUILD VTF0 ===

Dependencies:
* Python 2.5~2.7
* Nasm 2.03 or newer

To rebuild the VTF0 binaries:
1. Change to VTF0 source dir: UefiCpuPkg/ResetVector/Vtf0
2. nasm and python should be in executable path
3. Run this command:
   python Build.py
4. Binaries output will be in UefiCpuPkg/ResetVector/Vtf0/Bin