Use HW boot rom in renode simulation
Need to preload the secure core binary to the eflash to avoid the
bootstrapping step (the same mechanism as in verilator sim)
Change-Id: I04516c5d7576d38d453d21f9ad1139720ce4d712
diff --git a/shodan.resc b/shodan.resc
index f03a68c..1c9a0c7 100644
--- a/shodan.resc
+++ b/shodan.resc
@@ -41,17 +41,21 @@
uart0-analyzer TimestampFormat None
uart5-analyzer TimestampFormat None
-# Load the bootrom into the 32k rom at 0x8000 (useVirtualAddress = false, allowLoadsOnlyToMemory = true)
-sysbus LoadELF @out/shodan_boot_rom/multihart_boot_rom.elf false true cpu0
+# Load the boot rom into the 32k rom at 0x8000 (useVirtualAddress = false, allowLoadsOnlyToMemory = true)
+sysbus LoadELF @out/matcha/hw/boot_rom.elf false true cpu0
-# Load the tarball of CAmkES components, cpio bundle of built-in files, and the seL4 kernel
+# Load the tarball of CAmkES components, cpio bundle of built-in files,
+# the seL4 kernel, and preload the secure core binary.
$tar ?= @out/cantrip/shodan/release/ext_flash.tar
$tar_load_address ?= 0x44000000
$cpio ?= @out/cantrip/shodan/release/ext_builtins.cpio
$cpio_load_address ?= 0x46000000
$kernel ?= @out/cantrip/shodan/release/kernel/kernel.elf
+$eflash_address ?= 0x20000000
+$sc_bin ?= @out/cantrip/shodan/release/tmp/matcha-tock-bundle.bin
sysbus LoadBinary $tar $tar_load_address
sysbus LoadBinary $cpio $cpio_load_address
+sysbus LoadBinary $sc_bin $eflash_address
sysbus LoadSymbolsFrom $kernel
# Start cpu0 at the bootrom reset vector, which is stored immediately after the