From nobody Wed Dec 25 14:45:07 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1509447256908927.675398644586; Tue, 31 Oct 2017 03:54:16 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id C0DC72035D103; Tue, 31 Oct 2017 03:49:31 -0700 (PDT) Received: from mail-wr0-x241.google.com (mail-wr0-x241.google.com [IPv6:2a00:1450:400c:c0c::241]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 6EFE72035D103 for ; Tue, 31 Oct 2017 03:49:30 -0700 (PDT) Received: by mail-wr0-x241.google.com with SMTP id k62so15481358wrc.9 for ; Tue, 31 Oct 2017 03:53:22 -0700 (PDT) Received: from localhost.localdomain ([105.129.222.2]) by smtp.gmail.com with ESMTPSA id o14sm460985wra.54.2017.10.31.03.53.18 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 31 Oct 2017 03:53:19 -0700 (PDT) X-Original-To: edk2-devel@lists.01.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=2a00:1450:400c:c0c::241; helo=mail-wr0-x241.google.com; envelope-from=ard.biesheuvel@linaro.org; receiver=edk2-devel@lists.01.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=0JRYcofyjcIcmnCjLfJUN36c7wd2TgPnpAs/aZAjRWQ=; b=SxGluYE1BB7zvSOybkO9h0/DNbVqfVl1Wq3H1LwXX8++gQXxRAJn7E+68lmyCNzk+o ZQMViMiRlt6S6cisZ6lfYKgN/X4ZYMVVnWRoaoqYN9U0DK+Y9U5IRZQGhavgmIT4pRmS JYLzm1K+lKcZ/ZXp3Gs2Pa8kkZaAq0ZtxRiPo= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=0JRYcofyjcIcmnCjLfJUN36c7wd2TgPnpAs/aZAjRWQ=; b=bBYII3G60olJl0LxC4Qy7lLp/NPtBz+/0B8fXZzwbAoAthTQyq065K62XLQCGzkZh7 sJy1MHI0FhzH9oL1Uw4BXsatdT4luHTVhPl+i2lvyh22nJQKxbP4H4+8f6c0oj0TCAsO OLi3yBeUX/Bwq2W9OOKrksp68VxmVGcFQmRlGs9ZOP115SPGcIGHFCjUSPDCo4Pn6x9C hS62k4RI07dDV75MLbZ8EAaGCp4sgp7fkQuwcXh1B30UfBdfAfmRfC8i6sF/dENhGEkL 1oKYp83QMCM7wsCteuwVBmD2ptGtAvbejI9TryY5VQH3cEWXwHn9+UGQZF4krBBHdaj6 Mu5w== X-Gm-Message-State: AMCzsaVW/yz9Q0J4MjoxzaquLtyd8EWgXcA6juNW2aKBUB3rApkvfZzg WpV/z2EnqHAPGBaY5bJiSxGuzwPAP90= X-Google-Smtp-Source: ABhQp+RHyjYTEYuTvqGlERjpyBZwYsvVYbv7Nw9nQ/LEyq3EO70nOE9FnGdwD1xIYmb/4Soajvv7+A== X-Received: by 10.223.153.45 with SMTP id x42mr1409133wrb.212.1509447200542; Tue, 31 Oct 2017 03:53:20 -0700 (PDT) From: Ard Biesheuvel To: edk2-devel@lists.01.org, leif.lindholm@linaro.org Date: Tue, 31 Oct 2017 10:52:11 +0000 Message-Id: <20171031105218.30208-21-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20171031105218.30208-1-ard.biesheuvel@linaro.org> References: <20171031105218.30208-1-ard.biesheuvel@linaro.org> Subject: [edk2] [PATCH edk2-platforms v3 20/27] Socionext/SynQuacerEvalBoard: switch to execute in place X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: daniel.thompson@linaro.org, masami.hiramatsu@linaro.org, Ard Biesheuvel MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZohoMail: RDKM_2 RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" Now that we switched to PrePeiCore, we can execute the firmware image in place, using a stack and temporary heap in non-secure SRAM. This allows us to query the secure firmware for the size and placement of DRAM, and also allows the use of capsules for firmware update. NOTE: this requires ARM Trusted Firmware to be built with PRELOADED_BL33_BA= SE set to the base of UEFI in the NOR flash, 0x820_0000 in our case. Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Ard Biesheuvel Reviewed-by: Leif Lindholm --- Platform/Socionext/SynQuacerEvalBoard/SynQuacerEvalBoard.fdf | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Platform/Socionext/SynQuacerEvalBoard/SynQuacerEvalBoard.fdf b= /Platform/Socionext/SynQuacerEvalBoard/SynQuacerEvalBoard.fdf index f39f67f053be..53f5fef96466 100644 --- a/Platform/Socionext/SynQuacerEvalBoard/SynQuacerEvalBoard.fdf +++ b/Platform/Socionext/SynQuacerEvalBoard/SynQuacerEvalBoard.fdf @@ -26,7 +26,7 @@ ##########################################################################= ###### =20 [FD.BL33_AP_UEFI] -BaseAddress =3D 0xE0000000|gArmTokenSpaceGuid.PcdFdBaseAddress # The ba= se address of the Firmware in NOR Flash. +BaseAddress =3D 0x08200000|gArmTokenSpaceGuid.PcdFdBaseAddress # The ba= se address of the Firmware in NOR Flash. Size =3D 0x00200000|gArmTokenSpaceGuid.PcdFdSize # The si= ze in bytes of the FLASH Device ErasePolarity =3D 1 =20 --=20 2.11.0 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel