From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=2a00:1450:400c:c09::243; helo=mail-wm0-x243.google.com; envelope-from=ard.biesheuvel@linaro.org; receiver=edk2-devel@lists.01.org Received: from mail-wm0-x243.google.com (mail-wm0-x243.google.com [IPv6:2a00:1450:400c:c09::243]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 20C0621B00DF6 for ; Fri, 10 Nov 2017 06:18:36 -0800 (PST) Received: by mail-wm0-x243.google.com with SMTP id b9so3061662wmh.5 for ; Fri, 10 Nov 2017 06:22:39 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=yte7/lc315mQgJmsxKa22JfVTiRtUcaSwPYvaAcuyVI=; b=fmpjCTDbDXQ/rb7fHwRnsKBe0CS7mxHd8EKqjAyj0Pof7huchDY8WnEDyy0gGtKgcL F1oBtAGTs6BOxAsr43Mm3w8rsjEPh2hdmz9NAJFNoKLVfEORjhXB5iVw2jG20gdnBBzo XEzHwnh0tC4if6bozG5NluR/tJd/b5Wbu/hTc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=yte7/lc315mQgJmsxKa22JfVTiRtUcaSwPYvaAcuyVI=; b=rSj2f0Wak/qK+qR8+gADgkwXamR43gLfVaUuMHWyoyh6yXfowBOQGHAUaOMggPMvbQ DXVzGCkizCT4lo4RjSod8m+2IkOdfOQGVF7LtpJbYVSZ+g0yQWkM+U7infUOXkH0EpkY SYUwZpGK2vx9r32qi8DyyEEqmQ5XIGRwmxyBMsSPtZICR9XHwonDMeDHHDl3fWXy/BRQ pOZ+S8QeSLMkKhLvvba83oF0K5939vqkAPhhbgGqVqZFOHFyZ9typREu4p6WtIlJe7UF XN3omCRDTf/f6jr6lQV9zfi0XDPNC14XAzmWgcm8ZZBBvkHTJYGZIW43NONHjK3JGZHy Pk2g== X-Gm-Message-State: AJaThX6U3paviRgbZYF6/v5ljFjsIQJ/iEyPYA9AHQcIYDPKP/zNZ+fC Iuq+QWdrC68l1q2Tthb1PY3m6e0lec0= X-Google-Smtp-Source: AGs4zMYeZIGIikp9F2XS7PYk3L6QNGppksma7mjqdZfPN+Jz57rAFonKB+sHPco3IXikZE2KRDXqPQ== X-Received: by 10.28.142.20 with SMTP id q20mr352990wmd.37.1510323757592; Fri, 10 Nov 2017 06:22:37 -0800 (PST) Received: from localhost.localdomain ([160.167.170.128]) by smtp.gmail.com with ESMTPSA id e131sm1036477wmg.15.2017.11.10.06.22.35 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 10 Nov 2017 06:22:36 -0800 (PST) From: Ard Biesheuvel To: edk2-devel@lists.01.org, leif.lindholm@linaro.org, daniel.thompson@linaro.org Cc: masami.hiramatsu@linaro.org, methavanitpong.pipat@socionext.com, masahisa.kojima@linaro.org, Ard Biesheuvel Date: Fri, 10 Nov 2017 14:21:12 +0000 Message-Id: <20171110142127.12018-20-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20171110142127.12018-1-ard.biesheuvel@linaro.org> References: <20171110142127.12018-1-ard.biesheuvel@linaro.org> Subject: [PATCH edk2-platforms v4 19/34] Socionext/SynQuacerEvalBoard: switch to execute in place X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Nov 2017 14:18:36 -0000 Now that we switched to PrePeiCore, we can execute the firmware image in place, using a stack and temporary heap in non-secure SRAM. This allows us to query the secure firmware for the size and placement of DRAM, and also allows the use of capsules for firmware update. NOTE: this requires ARM Trusted Firmware to be built with PRELOADED_BL33_BASE set to the base of UEFI in the NOR flash, 0x820_0000 in our case. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ard Biesheuvel Reviewed-by: Leif Lindholm --- Platform/Socionext/SynQuacerEvalBoard/SynQuacerEvalBoard.fdf | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Platform/Socionext/SynQuacerEvalBoard/SynQuacerEvalBoard.fdf b/Platform/Socionext/SynQuacerEvalBoard/SynQuacerEvalBoard.fdf index c099c3dd8d2f..80cbcdad18aa 100644 --- a/Platform/Socionext/SynQuacerEvalBoard/SynQuacerEvalBoard.fdf +++ b/Platform/Socionext/SynQuacerEvalBoard/SynQuacerEvalBoard.fdf @@ -26,7 +26,7 @@ ################################################################################ [FD.BL33_AP_UEFI] -BaseAddress = 0xE0000000|gArmTokenSpaceGuid.PcdFdBaseAddress # The base address of the Firmware in NOR Flash. +BaseAddress = 0x08200000|gArmTokenSpaceGuid.PcdFdBaseAddress # The base address of the Firmware in NOR Flash. Size = 0x00200000|gArmTokenSpaceGuid.PcdFdSize # The size in bytes of the FLASH Device ErasePolarity = 1 -- 2.11.0