mirror of
https://github.com/acidanthera/audk.git
synced 2025-05-28 18:30:10 +02:00
Initial coreboot UEFI payload code check in. It provides UEFI services on top of coreboot that allows UEFI OS boot. CorebootModulePkg is the source code package of coreboot support modules that will be used to parse the coreboot tables and report memory/io resources. It supports the following features: - Support Unified Extensible Firmware Interface (UEFI) specification 2.4. - Support Platform Initialization(PI) specification 1.3. - Support execution as a coreboot payload. - Support USB 3.0 - Support SATA/ATA devices. - Support EFI aware OS boot. The following features are not supported currently and have not been validated: - GCC Tool Chains - SMM Execution Environment - Security Boot It was tested on a Intel Bay Trail CRB platform. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Maurice Ma <maurice.ma@intel.com> Reviewed-by: Prince Agyeman <prince.agyeman@intel.com> git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@17084 6f19259b-4bc3-4df7-8a09-765794883524
75 lines
1.8 KiB
ArmAsm
75 lines
1.8 KiB
ArmAsm
#------------------------------------------------------------------------------
|
|
#
|
|
# Copyright (c) 2013, Intel Corporation. All rights reserved.<BR>
|
|
# This program and the accompanying materials
|
|
# are licensed and made available under the terms and conditions of the BSD License
|
|
# which accompanies this distribution. The full text of the license may be found at
|
|
# http://opensource.org/licenses/bsd-license.php.
|
|
#
|
|
# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|
#
|
|
# Module Name:
|
|
#
|
|
# SecEntry.S
|
|
#
|
|
# Abstract:
|
|
#
|
|
# This is the code that begins in protected mode.
|
|
# It will transfer the control to pei core.
|
|
#
|
|
#------------------------------------------------------------------------------
|
|
|
|
ASM_GLOBAL ASM_PFX(SecStartup)
|
|
|
|
# Pcds
|
|
ASM_GLOBAL ASM_PFX(PcdGet32 (PcdPayloadFdMemBase))
|
|
|
|
#
|
|
# SecCore Entry Point
|
|
#
|
|
# Processor is in flat protected mode
|
|
#
|
|
# @param[in] EAX Initial value of the EAX register (BIST: Built-in Self Test)
|
|
# @param[in] DI 'BP': boot-strap processor, or 'AP': application processor
|
|
# @param[in] EBP Pointer to the start of the Boot Firmware Volume
|
|
#
|
|
# @return None This routine does not return
|
|
#
|
|
ASM_GLOBAL ASM_PFX(_ModuleEntryPoint)
|
|
ASM_PFX(_ModuleEntryPoint):
|
|
#
|
|
# Disable all the interrupts
|
|
#
|
|
cli
|
|
|
|
#
|
|
# Construct the temporary memory at 0x80000, length 0x10000
|
|
#
|
|
movl ($BASE_512KB + $SIZE_64KB), %esp
|
|
|
|
#
|
|
# Pass BFV into the PEI Core
|
|
#
|
|
pushl ASM_PFX(PcdGet32 (PcdPayloadFdMemBase))
|
|
|
|
#
|
|
# Pass stack base into the PEI Core
|
|
#
|
|
pushl $BASE_512KB
|
|
|
|
#
|
|
# Pass stack size into the PEI Core
|
|
#
|
|
pushl $SIZE_64KB
|
|
|
|
#
|
|
# Pass Control into the PEI Core
|
|
#
|
|
call SecStartup
|
|
|
|
#
|
|
# Never return to here
|
|
#
|
|
jmp .
|