From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=2a00:1450:400c:c0c::241; helo=mail-wr0-x241.google.com; envelope-from=ard.biesheuvel@linaro.org; receiver=edk2-devel@lists.01.org Received: from mail-wr0-x241.google.com (mail-wr0-x241.google.com [IPv6:2a00:1450:400c:c0c::241]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 6EFE72035D103 for ; Tue, 31 Oct 2017 03:49:30 -0700 (PDT) Received: by mail-wr0-x241.google.com with SMTP id k62so15481358wrc.9 for ; Tue, 31 Oct 2017 03:53:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=0JRYcofyjcIcmnCjLfJUN36c7wd2TgPnpAs/aZAjRWQ=; b=SxGluYE1BB7zvSOybkO9h0/DNbVqfVl1Wq3H1LwXX8++gQXxRAJn7E+68lmyCNzk+o ZQMViMiRlt6S6cisZ6lfYKgN/X4ZYMVVnWRoaoqYN9U0DK+Y9U5IRZQGhavgmIT4pRmS JYLzm1K+lKcZ/ZXp3Gs2Pa8kkZaAq0ZtxRiPo= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=0JRYcofyjcIcmnCjLfJUN36c7wd2TgPnpAs/aZAjRWQ=; b=bBYII3G60olJl0LxC4Qy7lLp/NPtBz+/0B8fXZzwbAoAthTQyq065K62XLQCGzkZh7 sJy1MHI0FhzH9oL1Uw4BXsatdT4luHTVhPl+i2lvyh22nJQKxbP4H4+8f6c0oj0TCAsO OLi3yBeUX/Bwq2W9OOKrksp68VxmVGcFQmRlGs9ZOP115SPGcIGHFCjUSPDCo4Pn6x9C hS62k4RI07dDV75MLbZ8EAaGCp4sgp7fkQuwcXh1B30UfBdfAfmRfC8i6sF/dENhGEkL 1oKYp83QMCM7wsCteuwVBmD2ptGtAvbejI9TryY5VQH3cEWXwHn9+UGQZF4krBBHdaj6 Mu5w== X-Gm-Message-State: AMCzsaVW/yz9Q0J4MjoxzaquLtyd8EWgXcA6juNW2aKBUB3rApkvfZzg WpV/z2EnqHAPGBaY5bJiSxGuzwPAP90= X-Google-Smtp-Source: ABhQp+RHyjYTEYuTvqGlERjpyBZwYsvVYbv7Nw9nQ/LEyq3EO70nOE9FnGdwD1xIYmb/4Soajvv7+A== X-Received: by 10.223.153.45 with SMTP id x42mr1409133wrb.212.1509447200542; Tue, 31 Oct 2017 03:53:20 -0700 (PDT) Received: from localhost.localdomain ([105.129.222.2]) by smtp.gmail.com with ESMTPSA id o14sm460985wra.54.2017.10.31.03.53.18 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 31 Oct 2017 03:53:19 -0700 (PDT) From: Ard Biesheuvel To: edk2-devel@lists.01.org, leif.lindholm@linaro.org Cc: graeme.gregory@linaro.org, daniel.thompson@linaro.org, masami.hiramatsu@linaro.org, methavanitpong.pipat@socionext.com, Ard Biesheuvel Date: Tue, 31 Oct 2017 10:52:11 +0000 Message-Id: <20171031105218.30208-21-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20171031105218.30208-1-ard.biesheuvel@linaro.org> References: <20171031105218.30208-1-ard.biesheuvel@linaro.org> Subject: [PATCH edk2-platforms v3 20/27] Socionext/SynQuacerEvalBoard: switch to execute in place X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 31 Oct 2017 10:49:30 -0000 Now that we switched to PrePeiCore, we can execute the firmware image in place, using a stack and temporary heap in non-secure SRAM. This allows us to query the secure firmware for the size and placement of DRAM, and also allows the use of capsules for firmware update. NOTE: this requires ARM Trusted Firmware to be built with PRELOADED_BL33_BASE set to the base of UEFI in the NOR flash, 0x820_0000 in our case. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ard Biesheuvel Reviewed-by: Leif Lindholm --- Platform/Socionext/SynQuacerEvalBoard/SynQuacerEvalBoard.fdf | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Platform/Socionext/SynQuacerEvalBoard/SynQuacerEvalBoard.fdf b/Platform/Socionext/SynQuacerEvalBoard/SynQuacerEvalBoard.fdf index f39f67f053be..53f5fef96466 100644 --- a/Platform/Socionext/SynQuacerEvalBoard/SynQuacerEvalBoard.fdf +++ b/Platform/Socionext/SynQuacerEvalBoard/SynQuacerEvalBoard.fdf @@ -26,7 +26,7 @@ ################################################################################ [FD.BL33_AP_UEFI] -BaseAddress = 0xE0000000|gArmTokenSpaceGuid.PcdFdBaseAddress # The base address of the Firmware in NOR Flash. +BaseAddress = 0x08200000|gArmTokenSpaceGuid.PcdFdBaseAddress # The base address of the Firmware in NOR Flash. Size = 0x00200000|gArmTokenSpaceGuid.PcdFdSize # The size in bytes of the FLASH Device ErasePolarity = 1 -- 2.11.0