upstream u-boot with additional patches for our devices/boards:
https://lists.denx.de/pipermail/u-boot/2017-March/282789.html (AXP crashes) ;
Gbit ethernet patch for some LIME2 revisions ;
with SPI flash support
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
29 lines
768 B
29 lines
768 B
#ifndef __ASM_SECURE_H
|
|
#define __ASM_SECURE_H
|
|
|
|
#include <config.h>
|
|
|
|
#define __secure __attribute__ ((section ("._secure.text")))
|
|
#define __secure_data __attribute__ ((section ("._secure.data")))
|
|
|
|
#ifdef CONFIG_ARMV7_SECURE_BASE
|
|
/*
|
|
* Warning, horror ahead.
|
|
*
|
|
* The target code lives in our "secure ram", but u-boot doesn't know
|
|
* that, and has blindly added reloc_off to every relocation
|
|
* entry. Gahh. Do the opposite conversion. This hack also prevents
|
|
* GCC from generating code veeners, which u-boot doesn't relocate at
|
|
* all...
|
|
*/
|
|
#define secure_ram_addr(_fn) ({ \
|
|
DECLARE_GLOBAL_DATA_PTR; \
|
|
void *__fn = _fn; \
|
|
typeof(_fn) *__tmp = (__fn - gd->reloc_off); \
|
|
__tmp; \
|
|
})
|
|
#else
|
|
#define secure_ram_addr(_fn) (_fn)
|
|
#endif
|
|
|
|
#endif
|
|
|