Hello,
We have a product with R7FA6M2AD3CFB microcontroller. The device has a bootloader (which had been created using FSP 3.1.0). The bootloader resides in the flash between addresses 0x0 - 0xFFFF. The bootloader is programmed into the devices in our factory and cannot be changed later. Also, as we have many devices in the field, it is not an option to change the bootloader.
The task of the bootloader is to download the main program in some specific way (which is not relevant here) and write it into flash memory starting from address 0x10000.On startup, if there is a valid main program in the flash, the bootloader jumps to the main program and continues execution from there.
The main program is compiled also with e2studio+FSP and then packed in some specific way (which is also irrelevant)
The Problem:The system was working fine until we upgraded from FSP 3.1.0 to FSP 5.3.0. But after upgrading to FSP 5.3.0 and compiling the new version main programs with that, we encountered a big problem. Now, as soon as the bootloader tries to jump to the main program (which is compiled with FSP 5.3.0), the device resets. Then tries to jump again and reset again... and so on infinitely.
Codes:
The code in the bootloader that jumps to the main program is this:
#define MAIN_PRG_START_ADR 0x10000 void JumpToMainProgram(void){ pFunction appEntry; uint32_t appStack; __disable_irq(); R_MPU_SPMON->SP[0].CTL = 0; //Disable Main Stack Pointer monitoring appStack = (uint32_t) *((__IO uint32_t*)MAIN_PRG_START_ADR); //Get the application stack pointer (First entry in the application vector table) appEntry = (pFunction) *(__IO uint32_t*)(MAIN_PRG_START_ADR + 4); //Get the application entry point (Second entry in the application vector table) SCB->VTOR = ((uint32_t)MAIN_PRG_START_ADR); //Reconfigure vector table offset register to match the application location __DSB(); __set_CONTROL(0); __set_MSP(appStack); //Set the application stack pointer print_sdb("APP "); appEntry(); //Start the application // Shouldn't get here while(1); }
To move the main program after address 0x10000, we renamed the generated memory_regions.ld file as memory_regions_main.ld and change 2 lines of it as follows:
/* FLASH_START = 0x00000000; FLASH_LENGTH = 0x80000; */ FLASH_START = 0x10000; FLASH_LENGTH = 0x70000;
And we changed the INCLUDE memory_regions.ld line to INCLUDE memory_regions_main.ld on top of fsp.ld file.
Configuration files for two FSP versions are below:
fsp_3_1_0_configuration.xml
fsp_5_3_0_configuration.xml
Auto-generated fsp.ld files for two FSP versions are below:
/* Linker File for Renesas FSP */ INCLUDE memory_regions.ld QSPI_FLASH_PRV_LENGTH = DEFINED(QSPI_FLASH_SIZE) ? ABSOLUTE(QSPI_FLASH_SIZE) : ABSOLUTE(QSPI_FLASH_LENGTH); OSPI_DEVICE_0_PRV_LENGTH = DEFINED(OSPI_DEVICE_0_SIZE) ? ABSOLUTE(OSPI_DEVICE_0_SIZE) : ABSOLUTE(OSPI_DEVICE_0_LENGTH); OSPI_DEVICE_1_PRV_LENGTH = DEFINED(OSPI_DEVICE_1_SIZE) ? ABSOLUTE(OSPI_DEVICE_1_SIZE) : ABSOLUTE(OSPI_DEVICE_1_LENGTH); /* If a flat (secure) project has DEFINED RAM_NS_BUFFER_LENGTH, then emit IDAU symbols to allocate non-secure RAM. */ __RESERVE_NS_RAM = !DEFINED(PROJECT_NONSECURE) && DEFINED(RAM_NS_BUFFER_LENGTH) && (OPTION_SETTING_S_LENGTH != 0); RAM_NS_BUFFER_BLOCK_LENGTH = DEFINED(RAM_NS_BUFFER_LENGTH) ? ALIGN(RAM_NS_BUFFER_LENGTH, 8192) : 0; RAM_NS_BUFFER_LENGTH = DEFINED(RAM_NS_BUFFER_LENGTH) ? RAM_NS_BUFFER_LENGTH : 0; RAM_NS_BUFFER_START = RAM_START + RAM_LENGTH - RAM_NS_BUFFER_LENGTH; RAM_NS_BUFFER_BLOCK_START = RAM_START + RAM_LENGTH - RAM_NS_BUFFER_BLOCK_LENGTH; OPTION_SETTING_START_NS = 0x0100A180; /* This definition is used to avoid moving the counter in OPTION_SETTING regions for projects that should not configure option settings. * Bootloader images do not configure option settings because they are owned by the bootloader. * FSP_BOOTABLE_IMAGE is only defined in bootloader images. */ __bl_FSP_BOOTABLE_IMAGE = 1; __bln_FSP_BOOTABLE_IMAGE = 1; PROJECT_SECURE_OR_FLAT = !DEFINED(PROJECT_NONSECURE) && OPTION_SETTING_LENGTH && !DEFINED(FSP_BOOTABLE_IMAGE); USE_OPTION_SETTING_NS = DEFINED(PROJECT_NONSECURE) && !DEFINED(FSP_BOOTABLE_IMAGE); __bl_FLASH_IMAGE_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_IMAGE_NUMBER == 1 ? FLASH_BOOTLOADER_LENGTH + FLASH_BOOTLOADER_HEADER_LENGTH : FLASH_BOOTLOADER_LENGTH + FLASH_BOOTLOADER_SCRATCH_LENGTH + FLASH_APPLICATION_S_LENGTH + FLASH_BOOTLOADER_HEADER_LENGTH; __bl_FLASH_IMAGE_LENGTH = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_S_LENGTH - FLASH_BOOTLOADER_HEADER_LENGTH; __bl_FLASH_IMAGE_END = __bl_FLASH_IMAGE_START + __bl_FLASH_IMAGE_LENGTH; __bl_FLASH_NS_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? __bl_FLASH_IMAGE_END : __bl_FLASH_IMAGE_START - FLASH_BOOTLOADER_HEADER_LENGTH + FLASH_APPLICATION_S_LENGTH; __bl_FLASH_NSC_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? __bl_FLASH_IMAGE_END : __bl_FLASH_NS_START - FLASH_APPLICATION_NSC_LENGTH; __bl_RAM_NS_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? RAM_START + RAM_LENGTH : RAM_START + RAM_LENGTH - RAM_APPLICATION_NS_LENGTH; __bl_RAM_NSC_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? RAM_START + RAM_LENGTH : __bl_RAM_NS_START - RAM_APPLICATION_NSC_LENGTH; __bl_FLASH_NS_IMAGE_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? __bl_FLASH_IMAGE_END : __bl_FLASH_NS_START + FLASH_BOOTLOADER_HEADER_LENGTH_2; __bln_FLASH_IMAGE_START = __bl_FLASH_NS_IMAGE_START; __bln_FLASH_IMAGE_LENGTH = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? __bl_FLASH_IMAGE_END : FLASH_APPLICATION_NS_LENGTH - FLASH_BOOTLOADER_HEADER_LENGTH_2; FLASH_ORIGIN = DEFINED(FLASH_IMAGE_START) ? FLASH_IMAGE_START : FLASH_START; LIMITED_FLASH_LENGTH = DEFINED(FLASH_IMAGE_LENGTH) ? FLASH_IMAGE_LENGTH : DEFINED(FLASH_BOOTLOADER_LENGTH) ? FLASH_BOOTLOADER_LENGTH : FLASH_LENGTH; /* Define memory regions. */ MEMORY { FLASH (rx) : ORIGIN = FLASH_ORIGIN, LENGTH = LIMITED_FLASH_LENGTH RAM (rwx) : ORIGIN = RAM_START, LENGTH = RAM_LENGTH DATA_FLASH (rx) : ORIGIN = DATA_FLASH_START, LENGTH = DATA_FLASH_LENGTH QSPI_FLASH (rx) : ORIGIN = QSPI_FLASH_START, LENGTH = QSPI_FLASH_PRV_LENGTH OSPI_DEVICE_0 (rx) : ORIGIN = OSPI_DEVICE_0_START, LENGTH = OSPI_DEVICE_0_PRV_LENGTH OSPI_DEVICE_1 (rx) : ORIGIN = OSPI_DEVICE_1_START, LENGTH = OSPI_DEVICE_1_PRV_LENGTH SDRAM (rwx) : ORIGIN = SDRAM_START, LENGTH = SDRAM_LENGTH OPTION_SETTING (r): ORIGIN = OPTION_SETTING_START, LENGTH = OPTION_SETTING_LENGTH OPTION_SETTING_S (r): ORIGIN = OPTION_SETTING_S_START, LENGTH = OPTION_SETTING_S_LENGTH ID_CODE (rx) : ORIGIN = ID_CODE_START, LENGTH = ID_CODE_LENGTH } /* Library configurations */ GROUP(libgcc.a libc.a libm.a libnosys.a) /* Linker script to place sections and symbol values. Should be used together * with other linker script that defines memory regions FLASH and RAM. * It references following symbols, which must be DEFINED in code: * Reset_Handler : Entry of reset handler * * It defines following symbols, which code can use without definition: * __exidx_start * __exidx_end * __copy_table_start__ * __copy_table_end__ * __zero_table_start__ * __zero_table_end__ * __etext * __data_start__ * __preinit_array_start * __preinit_array_end * __init_array_start * __init_array_end * __fini_array_start * __fini_array_end * __data_end__ * __bss_start__ * __bss_end__ * __HeapLimit * __StackLimit * __StackTop * __stack * __Vectors_End * __Vectors_Size * __qspi_flash_start__ * __qspi_flash_end__ * __qspi_flash_code_size__ * __qspi_region_max_size__ * __qspi_region_start_address__ * __qspi_region_end_address__ * __ospi_device_0_start__ * __ospi_device_0_end__ * __ospi_device_0_code_size__ * __ospi_device_0_region_max_size__ * __ospi_device_0_region_start_address__ * __ospi_device_0_region_end_address__ * __ospi_device_1_start__ * __ospi_device_1_end__ * __ospi_device_1_code_size__ * __ospi_device_1_region_max_size__ * __ospi_device_1_region_start_address__ * __ospi_device_1_region_end_address__ */ ENTRY(Reset_Handler) SECTIONS { .text : { __tz_FLASH_S = ABSOLUTE(FLASH_START); __ROM_Start = .; /* Even though the vector table is not 256 entries (1KB) long, we still allocate that much * space because ROM registers are at address 0x400 and there is very little space * in between. */ KEEP(*(.fixed_vectors*)) KEEP(*(.application_vectors*)) __Vectors_End = .; /* ROM Registers start at address 0x00000400 for devices that do not have the OPTION_SETTING region. */ . = OPTION_SETTING_LENGTH > 0 ? . : __ROM_Start + 0x400; KEEP(*(.rom_registers*)) /* Reserving 0x100 bytes of space for ROM registers. */ . = OPTION_SETTING_LENGTH > 0 ? . : __ROM_Start + 0x500; *(.text*) KEEP(*(.version)) KEEP(*(.init)) KEEP(*(.fini)) /* .ctors */ *crtbegin.o(.ctors) *crtbegin?.o(.ctors) *(EXCLUDE_FILE(*crtend?.o *crtend.o) .ctors) *(SORT(.ctors.*)) *(.ctors) /* .dtors */ *crtbegin.o(.dtors) *crtbegin?.o(.dtors) *(EXCLUDE_FILE(*crtend?.o *crtend.o) .dtors) *(SORT(.dtors.*)) *(.dtors) *(.rodata*) __usb_dev_descriptor_start_fs = .; KEEP(*(.usb_device_desc_fs*)) __usb_cfg_descriptor_start_fs = .; KEEP(*(.usb_config_desc_fs*)) __usb_interface_descriptor_start_fs = .; KEEP(*(.usb_interface_desc_fs*)) __usb_descriptor_end_fs = .; __usb_dev_descriptor_start_hs = .; KEEP(*(.usb_device_desc_hs*)) __usb_cfg_descriptor_start_hs = .; KEEP(*(.usb_config_desc_hs*)) __usb_interface_descriptor_start_hs = .; KEEP(*(.usb_interface_desc_hs*)) __usb_descriptor_end_hs = .; KEEP(*(.eh_frame*)) __ROM_End = .; } > FLASH = 0xFF __Vectors_Size = __Vectors_End - __Vectors; .ARM.extab : { *(.ARM.extab* .gnu.linkonce.armextab.*) } > FLASH __exidx_start = .; .ARM.exidx : { *(.ARM.exidx* .gnu.linkonce.armexidx.*) } > FLASH __exidx_end = .; /* To copy multiple ROM to RAM sections, * uncomment .copy.table section and, * define __STARTUP_COPY_MULTIPLE in startup_ARMCMx.S */ /* .copy.table : { . = ALIGN(4); __copy_table_start__ = .; LONG (__etext) LONG (__data_start__) LONG (__data_end__ - __data_start__) LONG (__etext2) LONG (__data2_start__) LONG (__data2_end__ - __data2_start__) __copy_table_end__ = .; } > FLASH */ /* To clear multiple BSS sections, * uncomment .zero.table section and, * define __STARTUP_CLEAR_BSS_MULTIPLE in startup_ARMCMx.S */ /* .zero.table : { . = ALIGN(4); __zero_table_start__ = .; LONG (__bss_start__) LONG (__bss_end__ - __bss_start__) LONG (__bss2_start__) LONG (__bss2_end__ - __bss2_start__) __zero_table_end__ = .; } > FLASH */ __etext = .; __tz_RAM_S = ORIGIN(RAM); /* If DTC is used, put the DTC vector table at the start of SRAM. This avoids memory holes due to 1K alignment required by it. */ .fsp_dtc_vector_table (NOLOAD) : { . = ORIGIN(RAM); *(.fsp_dtc_vector_table) } > RAM /* Initialized data section. */ .data : { __data_start__ = .; . = ALIGN(4); __Code_In_RAM_Start = .; KEEP(*(.code_in_ram*)) __Code_In_RAM_End = .; *(vtable) /* Don't use *(.data*) because it will place data meant for .data_flash in this section. */ *(.data.*) *(.data) . = ALIGN(4); /* preinit data */ PROVIDE_HIDDEN (__preinit_array_start = .); KEEP(*(.preinit_array)) PROVIDE_HIDDEN (__preinit_array_end = .); . = ALIGN(4); /* init data */ PROVIDE_HIDDEN (__init_array_start = .); KEEP(*(SORT(.init_array.*))) KEEP(*(.init_array)) PROVIDE_HIDDEN (__init_array_end = .); . = ALIGN(4); /* finit data */ PROVIDE_HIDDEN (__fini_array_start = .); KEEP(*(SORT(.fini_array.*))) KEEP(*(.fini_array)) PROVIDE_HIDDEN (__fini_array_end = .); KEEP(*(.jcr*)) . = ALIGN(4); /* All data end */ __data_end__ = .; } > RAM AT > FLASH /* TrustZone Secure Gateway Stubs Section. */ .gnu.sgstubs : ALIGN (1024) { . = (DEFINED(PROJECT_SECURE) && DEFINED(FLASH_NSC_START)) ? ABSOLUTE(FLASH_NSC_START) : ALIGN(1024); __tz_FLASH_C = DEFINED(FLASH_NSC_START) ? ABSOLUTE(FLASH_NSC_START) : __RESERVE_NS_RAM ? ABSOLUTE(FLASH_START + FLASH_LENGTH) : ALIGN(1024); _start_sg = .; *(.gnu.sgstubs*) . = ALIGN(32); _end_sg = .; } > FLASH __tz_FLASH_N = DEFINED(FLASH_NS_START) ? ABSOLUTE(FLASH_NS_START) : __RESERVE_NS_RAM ? ABSOLUTE(FLASH_START + FLASH_LENGTH) : ALIGN(32768); FLASH_NS_IMAGE_START = DEFINED(FLASH_NS_IMAGE_START) ? FLASH_NS_IMAGE_START : __tz_FLASH_N; /* Note: There are no secure/non-secure boundaries for QSPI. These symbols are provided for the RA configuration tool. */ __tz_QSPI_FLASH_S = ORIGIN(QSPI_FLASH); /* QSPI_FLASH section to be downloaded via debugger */ .qspi_flash : { __qspi_flash_start__ = .; KEEP(*(.qspi_flash*)) KEEP(*(.code_in_qspi*)) __qspi_flash_end__ = .; } > QSPI_FLASH __qspi_flash_code_size__ = __qspi_flash_end__ - __qspi_flash_start__; /* QSPI_FLASH non-retentive section, creates a copy in internal flash that can be copied to QSPI */ __qspi_flash_code_addr__ = __etext + (__data_end__ - __data_start__); .qspi_non_retentive : AT (__qspi_flash_code_addr__) { __qspi_non_retentive_start__ = .; KEEP(*(.qspi_non_retentive*)) __qspi_non_retentive_end__ = .; } > QSPI_FLASH __qspi_non_retentive_size__ = __qspi_non_retentive_end__ - __qspi_non_retentive_start__; __qspi_region_max_size__ = 0x4000000; /* Must be the same as defined in MEMORY above */ __qspi_region_start_address__ = __qspi_flash_start__; __qspi_region_end_address__ = __qspi_flash_start__ + __qspi_region_max_size__; /* Note: There are no secure/non-secure boundaries for QSPI. These symbols are provided for the RA configuration tool. */ __tz_QSPI_FLASH_N = __qspi_non_retentive_end__; /* Note: There are no secure/non-secure boundaries for QSPI. These symbols are provided for the RA configuration tool. */ __tz_OSPI_DEVICE_0_S = ORIGIN(OSPI_DEVICE_0); /* OSPI_DEVICE_0 section to be downloaded via debugger */ .OSPI_DEVICE_0 : { __ospi_device_0_start__ = .; KEEP(*(.ospi_device_0*)) KEEP(*(.code_in_ospi_device_0*)) __ospi_device_0_end__ = .; } > OSPI_DEVICE_0 __ospi_device_0_code_size__ = __ospi_device_0_end__ - __ospi_device_0_start__; /* OSPI_DEVICE_0 non-retentive section, creates a copy in internal flash that can be copied to OSPI */ __ospi_device_0_code_addr__ = __etext + (__data_end__ - __data_start__); .ospi_device_0_non_retentive : AT (__ospi_device_0_code_addr__) { __ospi_device_0_non_retentive_start__ = .; KEEP(*(.ospi_device_0_non_retentive*)) __ospi_device_0_non_retentive_end__ = .; } > OSPI_DEVICE_0 __ospi_device_0_non_retentive_size__ = __ospi_device_0_non_retentive_end__ - __ospi_device_0_non_retentive_start__; __ospi_device_0_region_max_size__ = 0x8000000; /* Must be the same as defined in MEMORY above */ __ospi_device_0_region_start_address__ = __ospi_device_0_start__; __ospi_device_0_region_end_address__ = __ospi_device_0_start__ + __ospi_device_0_region_max_size__; /* Note: There are no secure/non-secure boundaries for OSPI. These symbols are provided for the RA configuration tool. */ __tz_OSPI_DEVICE_0_N = __ospi_device_0_non_retentive_end__; /* Note: There are no secure/non-secure boundaries for OSPI. These symbols are provided for the RA configuration tool. */ __tz_OSPI_DEVICE_1_S = ORIGIN(OSPI_DEVICE_1); /* OSPI_DEVICE_1 section to be downloaded via debugger */ .OSPI_DEVICE_1 : { __ospi_device_1_start__ = .; KEEP(*(.ospi_device_1*)) KEEP(*(.code_in_ospi_device_1*)) __ospi_device_1_end__ = .; } > OSPI_DEVICE_1 __ospi_device_1_code_size__ = __ospi_device_1_end__ - __ospi_device_1_start__; /* OSPI_DEVICE_1 non-retentive section, creates a copy in internal flash that can be copied to OSPI */ __ospi_device_1_code_addr__ = __etext + (__data_end__ - __data_start__); .ospi_device_1_non_retentive : AT (__ospi_device_1_code_addr__) { __ospi_device_1_non_retentive_start__ = .; KEEP(*(.ospi_device_1_non_retentive*)) __ospi_device_1_non_retentive_end__ = .; } > OSPI_DEVICE_1 __ospi_device_1_non_retentive_size__ = __ospi_device_1_non_retentive_end__ - __ospi_device_1_non_retentive_start__; __ospi_device_1_region_max_size__ = 0x10000000; /* Must be the same as defined in MEMORY above */ __ospi_device_1_region_start_address__ = __ospi_device_1_start__; __ospi_device_1_region_end_address__ = __ospi_device_1_start__ + __ospi_device_1_region_max_size__; /* Note: There are no secure/non-secure boundaries for OSPI. These symbols are provided for the RA configuration tool. */ __tz_OSPI_DEVICE_1_N = __ospi_device_1_non_retentive_end__; .noinit (NOLOAD): { . = ALIGN(4); __noinit_start = .; KEEP(*(.noinit*)) . = ALIGN(8); /* Place the FreeRTOS heap here so that the __HeapLimit calculation does not include the freertos heap. */ KEEP(*(.heap.*)) __noinit_end = .; } > RAM .bss : { . = ALIGN(4); __bss_start__ = .; *(.bss*) *(COMMON) . = ALIGN(4); __bss_end__ = .; } > RAM .heap (NOLOAD): { . = ALIGN(8); __HeapBase = .; /* Place the STD heap here. */ KEEP(*(.heap)) __HeapLimit = .; } > RAM /* Stacks are stored in this section. */ .stack_dummy (NOLOAD): { . = ALIGN(8); __StackLimit = .; /* Main stack */ KEEP(*(.stack)) __StackTop = .; /* Thread stacks */ KEEP(*(.stack*)) __StackTopAll = .; } > RAM PROVIDE(__stack = __StackTopAll); /* This symbol represents the end of user allocated RAM. The RAM after this symbol can be used at run time for things such as ThreadX memory pool allocations. */ __RAM_segment_used_end__ = ALIGN(__StackTopAll , 4); /* RAM_NSC_START can be used to set a fixed address for non-secure callable RAM in secure projects. * If it is not specified, the address for NSC RAM is the end of RAM aligned to a 1K boundary. * In flat projects that require non-secure RAM, this variable is set to the start of non-secure RAM. */ __tz_RAM_C = DEFINED(RAM_NSC_START) ? ABSOLUTE(RAM_NSC_START) : __RESERVE_NS_RAM ? ABSOLUTE(RAM_NS_BUFFER_BLOCK_START) : ALIGN(__RAM_segment_used_end__, 1024); /* RAM_NS_START can be used to set a fixed address for non-secure RAM in secure projects or flat projects. * RAM_NS_BUFFER_BLOCK_LENGTH is used to allocate non-secure buffers in a flat project. If it is not * specified, the address for NSC RAM is the end of RAM aligned to an 8K boundary. * In flat projects that require non-secure RAM, this variable is set to the start of non-secure RAM. */ __tz_RAM_N = DEFINED(RAM_NS_START) ? ABSOLUTE(RAM_NS_START) : __RESERVE_NS_RAM ? ABSOLUTE(RAM_NS_BUFFER_BLOCK_START) : ALIGN(__tz_RAM_C, 8192); /* Non-secure buffers must be in non-secure RAM. This is primarily used for the EDMAC in flat projects. * The EDMAC is a non-secure bus master and can only access non-secure RAM. */ .ns_buffer (NOLOAD): { /* Allocate RAM on a 32-byte boundary to help with placement of Ethernet buffers. */ . = __RESERVE_NS_RAM ? ABSOLUTE(RAM_NS_BUFFER_START & 0xFFFFFFE0) : .; KEEP(*(.ns_buffer*)) } > RAM /* Data flash. */ .data_flash : { . = ORIGIN(DATA_FLASH); __tz_DATA_FLASH_S = .; __Data_Flash_Start = .; KEEP(*(.data_flash*)) __Data_Flash_End = .; __tz_DATA_FLASH_N = DEFINED(DATA_FLASH_NS_START) ? ABSOLUTE(DATA_FLASH_NS_START) : __RESERVE_NS_RAM ? ABSOLUTE(DATA_FLASH_START + DATA_FLASH_LENGTH) : ALIGN(1024); } > DATA_FLASH /* Note: There are no secure/non-secure boundaries for SDRAM. These symbols are provided for the RA configuration tool. */ __tz_SDRAM_S = ORIGIN(SDRAM); /* SDRAM */ .sdram (NOLOAD): { __SDRAM_Start = .; KEEP(*(.sdram*)) KEEP(*(.frame*)) __SDRAM_End = .; } > SDRAM /* Note: There are no secure/non-secure boundaries for SDRAM. These symbols are provided for the RA configuration tool. */ __tz_SDRAM_N = __SDRAM_End; /* Note: There are no secure/non-secure boundaries for ID_CODE. These symbols are provided for the RA configuration tool. */ __tz_ID_CODE_S = ORIGIN(ID_CODE); .id_code : { __ID_Code_Start = .; KEEP(*(.id_code*)) __ID_Code_End = .; } > ID_CODE /* Note: There are no secure/non-secure boundaries for ID_CODE. These symbols are provided for the RA configuration tool. */ __tz_ID_CODE_N = __ID_Code_End; /* Symbol required for RA Configuration tool. */ __tz_OPTION_SETTING_S = ORIGIN(OPTION_SETTING); .option_setting : { __OPTION_SETTING_Start = .; KEEP(*(.option_setting_ofs0)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_Start + 0x10 : __OPTION_SETTING_Start; KEEP(*(.option_setting_dualsel)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_Start + 0x34 : __OPTION_SETTING_Start; KEEP(*(.option_setting_sas)) __OPTION_SETTING_End = .; } > OPTION_SETTING = 0xFF /* Symbol required for RA Configuration tool. */ __tz_OPTION_SETTING_N = OPTION_SETTING_START_NS; .option_setting_ns : { __OPTION_SETTING_NS_Start = .; KEEP(*(.option_setting_ofs1)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x10 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_banksel)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x40 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_bps0)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x44 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_bps1)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x48 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_bps2)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x60 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_pbps0)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x64 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_pbps1)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x68 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_pbps2)) __OPTION_SETTING_NS_End = .; } > OPTION_SETTING = 0xFF /* Symbol required for RA Configuration tool. */ __tz_OPTION_SETTING_S_S = ORIGIN(OPTION_SETTING_S); .option_setting_s : { __OPTION_SETTING_S_Start = .; KEEP(*(.option_setting_ofs1_sec)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x10 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_banksel_sec)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x40 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sec0)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x44 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sec1)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x48 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sec2)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x60 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_pbps_sec0)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x64 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_pbps_sec1)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x68 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_pbps_sec2)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x80 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_ofs1_sel)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x90 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_banksel_sel)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0xC0 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sel0)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0xC4 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sel1)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0xC8 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sel2)) __OPTION_SETTING_S_End = .; } > OPTION_SETTING_S = 0xFF /* Symbol required for RA Configuration tool. */ __tz_OPTION_SETTING_S_N = __OPTION_SETTING_S_End; }
/* Linker File for Renesas FSP */ INCLUDE memory_regions_main.ld /* Uncomment and set XIP_SECONDARY_SLOT_IMAGE to 1 below for the secondary XIP application image.*/ /* XIP_SECONDARY_SLOT_IMAGE = 1; */ QSPI_FLASH_PRV_LENGTH = DEFINED(QSPI_FLASH_SIZE) ? ABSOLUTE(QSPI_FLASH_SIZE) : ABSOLUTE(QSPI_FLASH_LENGTH); OSPI_DEVICE_0_PRV_LENGTH = DEFINED(OSPI_DEVICE_0_SIZE) ? ABSOLUTE(OSPI_DEVICE_0_SIZE) : ABSOLUTE(OSPI_DEVICE_0_LENGTH); OSPI_DEVICE_1_PRV_LENGTH = DEFINED(OSPI_DEVICE_1_SIZE) ? ABSOLUTE(OSPI_DEVICE_1_SIZE) : ABSOLUTE(OSPI_DEVICE_1_LENGTH); /* If a flat (secure) project has DEFINED RAM_NS_BUFFER_LENGTH, then emit IDAU symbols to allocate non-secure RAM. */ __RESERVE_NS_RAM = !DEFINED(PROJECT_NONSECURE) && DEFINED(RAM_NS_BUFFER_LENGTH) && (OPTION_SETTING_S_LENGTH != 0); ITCM_START = DEFINED(ITCM_START)? ITCM_START : 0; ITCM_LENGTH = DEFINED(ITCM_LENGTH)? ITCM_LENGTH : 0; DTCM_START = DEFINED(DTCM_START)? DTCM_START : 0; DTCM_LENGTH = DEFINED(DTCM_LENGTH)? DTCM_LENGTH : 0; RAM_NS_BUFFER_BLOCK_LENGTH = DEFINED(RAM_NS_BUFFER_LENGTH) ? ALIGN(RAM_NS_BUFFER_LENGTH, 8192) : 0; RAM_NS_BUFFER_LENGTH = DEFINED(RAM_NS_BUFFER_LENGTH) ? RAM_NS_BUFFER_LENGTH : 0; RAM_NS_BUFFER_START = RAM_START + RAM_LENGTH - RAM_NS_BUFFER_LENGTH; RAM_NS_BUFFER_BLOCK_START = RAM_START + RAM_LENGTH - RAM_NS_BUFFER_BLOCK_LENGTH; OPTION_SETTING_START_NS = DEFINED(PROJECT_NONSECURE) ? OPTION_SETTING_START : OPTION_SETTING_START + 0x80; /* This definition is used to avoid moving the counter in OPTION_SETTING regions for projects that should not configure option settings. * Bootloader images do not configure option settings because they are owned by the bootloader. * FSP_BOOTABLE_IMAGE is only defined in bootloader images. */ __bl_FSP_BOOTABLE_IMAGE = 1; __bln_FSP_BOOTABLE_IMAGE = 1; PROJECT_SECURE_OR_FLAT = (!DEFINED(PROJECT_NONSECURE) || DEFINED(PROJECT_SECURE)) && OPTION_SETTING_LENGTH && !DEFINED(FSP_BOOTABLE_IMAGE); USE_OPTION_SETTING_NS = DEFINED(PROJECT_NONSECURE) && !DEFINED(FSP_BOOTABLE_IMAGE); __bl_FLASH_IMAGE_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_IMAGE_NUMBER == 1 ? FLASH_START + FLASH_BOOTLOADER_LENGTH + FLASH_BOOTLOADER_HEADER_LENGTH : DEFINED(BOOTLOADER_SECONDARY_USE_QSPI) ? FLASH_START + FLASH_BOOTLOADER_LENGTH + FLASH_BOOTLOADER_SCRATCH_LENGTH + FLASH_BOOTLOADER_HEADER_LENGTH : FLASH_START + FLASH_BOOTLOADER_LENGTH + FLASH_BOOTLOADER_SCRATCH_LENGTH + FLASH_APPLICATION_S_LENGTH + FLASH_BOOTLOADER_HEADER_LENGTH; __bl_FLASH_IMAGE_LENGTH = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_S_LENGTH - FLASH_BOOTLOADER_HEADER_LENGTH; __bl_FLASH_IMAGE_END = __bl_FLASH_IMAGE_START + __bl_FLASH_IMAGE_LENGTH; __bl_XIP_SECONDARY_FLASH_IMAGE_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_BOOTLOADER_LENGTH + FLASH_APPLICATION_S_LENGTH + FLASH_BOOTLOADER_HEADER_LENGTH; __bl_XIP_SECONDARY_FLASH_IMAGE_END = __bl_XIP_SECONDARY_FLASH_IMAGE_START + __bl_FLASH_IMAGE_LENGTH; __bl_FLASH_NS_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? __bl_FLASH_IMAGE_END : __bl_FLASH_IMAGE_START - FLASH_BOOTLOADER_HEADER_LENGTH + FLASH_APPLICATION_S_LENGTH; __bl_FLASH_NSC_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? __bl_FLASH_IMAGE_END : __bl_FLASH_IMAGE_END - FLASH_APPLICATION_NSC_LENGTH; __bl_RAM_NS_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? RAM_START + RAM_LENGTH : RAM_START + RAM_LENGTH - RAM_APPLICATION_NS_LENGTH; __bl_RAM_NSC_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? RAM_START + RAM_LENGTH : __bl_RAM_NS_START - RAM_APPLICATION_NSC_LENGTH; __bl_FLASH_NS_IMAGE_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? __bl_FLASH_IMAGE_END : __bl_FLASH_NS_START + FLASH_BOOTLOADER_HEADER_LENGTH_2; __bln_FLASH_IMAGE_START = __bl_FLASH_NS_IMAGE_START | (!DEFINED (NS_OFFSET_START) ? 0 : NS_OFFSET_START); __bln_FLASH_IMAGE_LENGTH = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? __bl_FLASH_IMAGE_END : FLASH_APPLICATION_NS_LENGTH - FLASH_BOOTLOADER_HEADER_LENGTH_2; XIP_SECONDARY_SLOT_IMAGE = DEFINED(XIP_SECONDARY_SLOT_IMAGE) ? XIP_SECONDARY_SLOT_IMAGE : 0; FLASH_ORIGIN = !DEFINED(FLASH_IMAGE_START) ? FLASH_START : XIP_SECONDARY_SLOT_IMAGE == 1 ? XIP_SECONDARY_FLASH_IMAGE_START : FLASH_IMAGE_START; LIMITED_FLASH_LENGTH = DEFINED(FLASH_IMAGE_LENGTH) ? FLASH_IMAGE_LENGTH : DEFINED(FLASH_BOOTLOADER_LENGTH) ? FLASH_BOOTLOADER_LENGTH : FLASH_LENGTH; OPTION_SETTING_SAS_SIZE = 0x34; OPTION_SETTING_SAS_LENGTH = !DEFINED(OPTION_SETTING_LENGTH) ? 0 : OPTION_SETTING_LENGTH == 0 ? 0 : OPTION_SETTING_LENGTH - OPTION_SETTING_SAS_SIZE; /* Define memory regions. */ MEMORY { ITCM (rx) : ORIGIN = ITCM_START, LENGTH = ITCM_LENGTH DTCM (rwx) : ORIGIN = DTCM_START, LENGTH = DTCM_LENGTH FLASH (rx) : ORIGIN = FLASH_ORIGIN, LENGTH = LIMITED_FLASH_LENGTH RAM (rwx) : ORIGIN = RAM_START, LENGTH = RAM_LENGTH DATA_FLASH (rx) : ORIGIN = DATA_FLASH_START, LENGTH = DATA_FLASH_LENGTH QSPI_FLASH (rx) : ORIGIN = QSPI_FLASH_START, LENGTH = QSPI_FLASH_PRV_LENGTH OSPI_DEVICE_0 (rx) : ORIGIN = OSPI_DEVICE_0_START, LENGTH = OSPI_DEVICE_0_PRV_LENGTH OSPI_DEVICE_1 (rx) : ORIGIN = OSPI_DEVICE_1_START, LENGTH = OSPI_DEVICE_1_PRV_LENGTH OSPI_DEVICE_0_RAM (rwx) : ORIGIN = OSPI_DEVICE_0_START, LENGTH = OSPI_DEVICE_0_PRV_LENGTH OSPI_DEVICE_1_RAM (rwx) : ORIGIN = OSPI_DEVICE_1_START, LENGTH = OSPI_DEVICE_1_PRV_LENGTH SDRAM (rwx) : ORIGIN = SDRAM_START, LENGTH = SDRAM_LENGTH OPTION_SETTING (r) : ORIGIN = OPTION_SETTING_START, LENGTH = OPTION_SETTING_LENGTH OPTION_SETTING_OFS (r) : ORIGIN = OPTION_SETTING_START, LENGTH = 0x18 OPTION_SETTING_SAS (r) : ORIGIN = OPTION_SETTING_START + OPTION_SETTING_SAS_SIZE, LENGTH = OPTION_SETTING_SAS_LENGTH OPTION_SETTING_S (r) : ORIGIN = OPTION_SETTING_S_START, LENGTH = OPTION_SETTING_S_LENGTH ID_CODE (rx) : ORIGIN = ID_CODE_START, LENGTH = ID_CODE_LENGTH } /* Library configurations */ GROUP(libgcc.a libc.a libm.a) /* Linker script to place sections and symbol values. Should be used together * with other linker script that defines memory regions FLASH and RAM. * It references following symbols, which must be DEFINED in code: * Reset_Handler : Entry of reset handler * * It defines following symbols, which code can use without definition: * __exidx_start * __exidx_end * __copy_table_start__ * __copy_table_end__ * __zero_table_start__ * __zero_table_end__ * __etext * __data_start__ * __preinit_array_start * __preinit_array_end * __init_array_start * __init_array_end * __fini_array_start * __fini_array_end * __data_end__ * __bss_start__ * __bss_end__ * __HeapLimit * __StackLimit * __StackTop * __stack * __Vectors_End * __Vectors_Size * __qspi_flash_start__ * __qspi_flash_end__ * __qspi_flash_code_size__ * __qspi_region_max_size__ * __qspi_region_start_address__ * __qspi_region_end_address__ * __ospi_device_0_start__ * __ospi_device_0_end__ * __ospi_device_0_code_size__ * __ospi_device_0_region_max_size__ * __ospi_device_0_region_start_address__ * __ospi_device_0_region_end_address__ * __ospi_device_1_start__ * __ospi_device_1_end__ * __ospi_device_1_code_size__ * __ospi_device_1_region_max_size__ * __ospi_device_1_region_start_address__ * __ospi_device_1_region_end_address__ */ ENTRY(Reset_Handler) SECTIONS { .text : { __tz_FLASH_S = ABSOLUTE(FLASH_START); __ROM_Start = .; /* Even though the vector table is not 256 entries (1KB) long, we still allocate that much * space because ROM registers are at address 0x400 and there is very little space * in between. */ KEEP(*(.fixed_vectors*)) KEEP(*(.application_vectors*)) __Vectors_End = .; /* Some devices have a gap of code flash between the vector table and ROM Registers. * The flash gap section allows applications to place code and data in this section. */ *(.flash_gap*) /* ROM Registers start at address 0x00000400 for devices that do not have the OPTION_SETTING region. */ . = OPTION_SETTING_LENGTH > 0 ? . : __ROM_Start + 0x400; KEEP(*(.rom_registers*)) /* Allocate flash write-boundary-aligned * space for sce9 wrapped public keys for mcuboot if the module is used. */ KEEP(*(.mcuboot_sce9_key*)) *(.text*) KEEP(*(.version)) KEEP(*(.init)) KEEP(*(.fini)) /* .ctors */ *crtbegin.o(.ctors) *crtbegin?.o(.ctors) *(EXCLUDE_FILE(*crtend?.o *crtend.o) .ctors) *(SORT(.ctors.*)) *(.ctors) /* .dtors */ *crtbegin.o(.dtors) *crtbegin?.o(.dtors) *(EXCLUDE_FILE(*crtend?.o *crtend.o) .dtors) *(SORT(.dtors.*)) *(.dtors) *(.rodata*) __usb_dev_descriptor_start_fs = .; KEEP(*(.usb_device_desc_fs*)) __usb_cfg_descriptor_start_fs = .; KEEP(*(.usb_config_desc_fs*)) __usb_interface_descriptor_start_fs = .; KEEP(*(.usb_interface_desc_fs*)) __usb_descriptor_end_fs = .; __usb_dev_descriptor_start_hs = .; KEEP(*(.usb_device_desc_hs*)) __usb_cfg_descriptor_start_hs = .; KEEP(*(.usb_config_desc_hs*)) __usb_interface_descriptor_start_hs = .; KEEP(*(.usb_interface_desc_hs*)) __usb_descriptor_end_hs = .; KEEP(*(.eh_frame*)) __ROM_End = .; } > FLASH = 0xFF __Vectors_Size = __Vectors_End - __Vectors; . = .; __itcm_data_pre_location = .; /* Initialized ITCM data. */ /* Aligned to FCACHE2 for RA8. */ .itcm_data : ALIGN(16) { /* Start of ITCM Secure Trustzone region. */ __tz_ITCM_S = ABSOLUTE(ITCM_START); /* All ITCM data start */ __itcm_data_start = .; KEEP(*(.itcm_data*)) /* Pad to eight byte alignment in case of ECC initialization. Fill zero. */ . = ALIGN(8); /* All ITCM data end */ __itcm_data_end = .; /* * Start of the ITCM Non-Secure Trustzone region. * ITCM_NS_START can be used to set a fixed address for non-secure ITCM in secure projects or flat projects. */ __tz_ITCM_N = DEFINED(ITCM_NS_START) ? ABSOLUTE(ITCM_NS_START) : ALIGN(__itcm_data_end, 8192); } > ITCM AT > FLASH = 0x00 /* Addresses exported for ITCM initialization. */ __itcm_data_init_start = LOADADDR(.itcm_data); __itcm_data_init_end = LOADADDR(.itcm_data) + SIZEOF(.itcm_data); ASSERT(ORIGIN(ITCM) % 8 == 0, "ITCM memory region origin must be aligned to 8 bytes.") ASSERT(LENGTH(ITCM) % 8 == 0, "ITCM memory region length must be a multiple of 8 bytes.") ASSERT(LOADADDR(.itcm_data) % 16 == 0, ".itcm_data section must be aligned to 16 bytes.") ASSERT(SIZEOF(.itcm_data) % 8 == 0, ".itcm_data section size must be a multiple of 8 bytes.") /* Restore location counter. */ /* If ITCM is not present, this will be the address stored in '.' before ALIGN was attempted. */ /* If ITCM is present, this will be the absolute address that follows the ITCM ROM location. */ . = (SIZEOF(.itcm_data) > 0) ? __itcm_data_init_end : __itcm_data_pre_location; __exidx_start = .; /DISCARD/ : { *(.ARM.extab* .gnu.linkonce.armextab.*) *(.ARM.exidx* .gnu.linkonce.armexidx.*) } __exidx_end = .; /* To copy multiple ROM to RAM sections, * uncomment .copy.table section and, * define __STARTUP_COPY_MULTIPLE in startup_ARMCMx.S */ /* .copy.table : { . = ALIGN(4); __copy_table_start__ = .; LONG (__etext) LONG (__data_start__) LONG (__data_end__ - __data_start__) LONG (__etext2) LONG (__data2_start__) LONG (__data2_end__ - __data2_start__) __copy_table_end__ = .; } > FLASH */ /* To clear multiple BSS sections, * uncomment .zero.table section and, * define __STARTUP_CLEAR_BSS_MULTIPLE in startup_ARMCMx.S */ /* .zero.table : { . = ALIGN(4); __zero_table_start__ = .; LONG (__bss_start__) LONG (__bss_end__ - __bss_start__) LONG (__bss2_start__) LONG (__bss2_end__ - __bss2_start__) __zero_table_end__ = .; } > FLASH */ __etext = .; __tz_RAM_S = ORIGIN(RAM); /* If DTC is used, put the DTC vector table at the start of SRAM. This avoids memory holes due to 1K alignment required by it. */ .fsp_dtc_vector_table (NOLOAD) : { . = ORIGIN(RAM); *(.fsp_dtc_vector_table) } > RAM /* Initialized data section. */ .data : { __data_start__ = .; . = ALIGN(4); __Code_In_RAM_Start = .; KEEP(*(.code_in_ram*)) __Code_In_RAM_End = .; *(vtable) /* Don't use *(.data*) because it will place data meant for .data_flash in this section. */ *(.data.*) *(.data) . = ALIGN(4); /* preinit data */ PROVIDE_HIDDEN (__preinit_array_start = .); KEEP(*(.preinit_array)) PROVIDE_HIDDEN (__preinit_array_end = .); . = ALIGN(4); /* init data */ PROVIDE_HIDDEN (__init_array_start = .); KEEP(*(SORT(.init_array.*))) KEEP(*(.init_array)) PROVIDE_HIDDEN (__init_array_end = .); . = ALIGN(4); /* finit data */ PROVIDE_HIDDEN (__fini_array_start = .); KEEP(*(SORT(.fini_array.*))) KEEP(*(.fini_array)) PROVIDE_HIDDEN (__fini_array_end = .); KEEP(*(.jcr*)) . = ALIGN(4); /* All data end */ __data_end__ = .; } > RAM AT > FLASH . = .; __dtcm_data_pre_location = LOADADDR(.data) + SIZEOF(.data); /* Initialized DTCM data. */ /* Aligned to FCACHE2 for RA8. */ .dtcm_data : ALIGN(16) { /* Start of DTCM Secure Trustzone region. */ __tz_DTCM_S = ABSOLUTE(DTCM_START); /* Initialized DTCM data start */ __dtcm_data_start = .; KEEP(*(.dtcm_data*)) /* Pad to eight byte alignment in case of ECC initialization. Fill zero. */ . = ALIGN(8); /* Initialized DTCM data end */ __dtcm_data_end = .; } > DTCM AT > FLASH = 0x00 . = __dtcm_data_end; /* Uninitialized DTCM data. */ /* ALIGN appears on the left side of the colon because it is being used to assign the VMA directly, as opposed to a right side appearance which would control the LMA. */ .dtcm_bss ALIGN(8) (NOLOAD) : { /* Uninitialized DTCM data start */ __dtcm_bss_start = .; KEEP(*(.dtcm_bss*)) /* Pad to eight byte alignment in case of ECC initialization. No fill because of NOLOAD. */ . = ALIGN(8); /* Uninitialized DTCM data end */ __dtcm_bss_end = .; /* * Start of the DTCM Non-Secure Trustzone region. * DTCM_NS_START can be used to set a fixed address for non-secure DTCM in secure projects or flat projects. */ __tz_DTCM_N = DEFINED(DTCM_NS_START) ? ABSOLUTE(DTCM_NS_START) : ALIGN(__dtcm_bss_end, 8192); } > DTCM /* Addresses exported for DTCM initialization. */ __dtcm_data_init_start = LOADADDR(.dtcm_data); __dtcm_data_init_end = LOADADDR(.dtcm_data) + SIZEOF(.dtcm_data); ASSERT(ORIGIN(DTCM) % 8 == 0, "DTCM memory region origin must be aligned to 8 bytes.") ASSERT(LENGTH(DTCM) % 8 == 0, "DTCM memory region length must be a multiple of 8 bytes.") ASSERT(LOADADDR(.dtcm_bss) == ADDR(.dtcm_bss), ".dtcm_bss has (VMA != LMA) but should be NOLOAD (VMA == LMA).") ASSERT(LOADADDR(.dtcm_data) % 16 == 0, ".dtcm_data section must be aligned to 16 bytes.") ASSERT(SIZEOF(.dtcm_data) % 8 == 0, ".dtcm_data section size must be a multiple of 8 bytes.") ASSERT(LOADADDR(.dtcm_bss) % 8 == 0, ".dtcm_bss section must be aligned to 8 bytes.") ASSERT(SIZEOF(.dtcm_bss) % 8 == 0, ".dtcm_bss section size must be a multiple of 8 bytes.") ASSERT(__dtcm_bss_start == __dtcm_data_end, ".dtcm_bss section is not adjacent to .dtcm_data section.") /* Restore location counter. */ /* If DTCM is not present, this will be the address stored in '.' before ALIGN was attempted. */ /* If DTCM is present, this will be the absolute address that follows the DTCM ROM location. */ . = (SIZEOF(.dtcm_data) > 0) ? __dtcm_data_init_end : __dtcm_data_pre_location; /* TrustZone Secure Gateway Stubs Section */ /* Store location counter for SPI non-retentive sections. */ sgstubs_pre_location = .; /* Determine the secure gateway stubs address either by the provided linker variable or the next 1024-byte block. */ SGSTUBS_LOC = (DEFINED(PROJECT_SECURE) && DEFINED(FLASH_NSC_START)) ? ABSOLUTE(FLASH_NSC_START) : ALIGN(1024); .gnu.sgstubs SGSTUBS_LOC : ALIGN(1024) { __tz_FLASH_C = DEFINED(FLASH_NSC_START) ? ABSOLUTE(FLASH_NSC_START) : __RESERVE_NS_RAM ? ABSOLUTE(FLASH_START + FLASH_LENGTH) : ALIGN(1024); _start_sg = .; *(.gnu.sgstubs*) . = ALIGN(32); _end_sg = .; } > FLASH __tz_FLASH_N = DEFINED(FLASH_NS_START) ? ABSOLUTE(FLASH_NS_START) : __RESERVE_NS_RAM ? ABSOLUTE(FLASH_START + FLASH_LENGTH) : FLASH_LENGTH < 32768 ? FLASH_LENGTH : ALIGN(32768); FLASH_NS_IMAGE_START = DEFINED(FLASH_NS_IMAGE_START) ? FLASH_NS_IMAGE_START : __tz_FLASH_N; /* Note: There are no secure/non-secure boundaries for QSPI. These symbols are provided for the RA configuration tool. */ __tz_QSPI_FLASH_S = ORIGIN(QSPI_FLASH); /* QSPI_FLASH section to be downloaded via debugger */ .qspi_flash : { __qspi_flash_start__ = .; KEEP(*(.qspi_flash*)) KEEP(*(.code_in_qspi*)) __qspi_flash_end__ = .; } > QSPI_FLASH __qspi_flash_code_size__ = __qspi_flash_end__ - __qspi_flash_start__; /* QSPI_FLASH non-retentive section, creates a copy in internal flash that can be copied to QSPI */ __qspi_flash_code_addr__ = sgstubs_pre_location; .qspi_non_retentive : AT(__qspi_flash_code_addr__) { __qspi_non_retentive_start__ = .; KEEP(*(.qspi_non_retentive*)) __qspi_non_retentive_end__ = .; } > QSPI_FLASH __qspi_non_retentive_size__ = __qspi_non_retentive_end__ - __qspi_non_retentive_start__; __qspi_region_max_size__ = 0x4000000; /* Must be the same as defined in MEMORY above */ __qspi_region_start_address__ = __qspi_flash_start__; __qspi_region_end_address__ = __qspi_flash_start__ + __qspi_region_max_size__; /* Note: There are no secure/non-secure boundaries for QSPI. These symbols are provided for the RA configuration tool. */ __tz_QSPI_FLASH_N = __qspi_non_retentive_end__; /* Support for OctaRAM */ .OSPI_DEVICE_0_NO_LOAD (NOLOAD): { . = ALIGN(4); __ospi_device_0_start__ = .; *(.ospi_device_0_no_load*) . = ALIGN(4); __ospi_device_0_end__ = .; } > OSPI_DEVICE_0_RAM .OSPI_DEVICE_1_NO_LOAD (NOLOAD): { . = ALIGN(4); __ospi_device_1_start__ = .; *(.ospi_device_1_no_load*) . = ALIGN(4); __ospi_device_1_end__ = .; } > OSPI_DEVICE_1_RAM /* Note: There are no secure/non-secure boundaries for QSPI. These symbols are provided for the RA configuration tool. */ __tz_OSPI_DEVICE_0_S = ORIGIN(OSPI_DEVICE_0); /* OSPI_DEVICE_0 section to be downloaded via debugger */ .OSPI_DEVICE_0 : { __ospi_device_0_start__ = .; KEEP(*(.ospi_device_0*)) KEEP(*(.code_in_ospi_device_0*)) __ospi_device_0_end__ = .; } > OSPI_DEVICE_0 __ospi_device_0_code_size__ = __ospi_device_0_end__ - __ospi_device_0_start__; /* OSPI_DEVICE_0 non-retentive section, creates a copy in internal flash that can be copied to OSPI */ __ospi_device_0_code_addr__ = sgstubs_pre_location + (SIZEOF(.qspi_non_retentive)); .ospi_device_0_non_retentive : AT(__ospi_device_0_code_addr__) { __ospi_device_0_non_retentive_start__ = .; KEEP(*(.ospi_device_0_non_retentive*)) __ospi_device_0_non_retentive_end__ = .; } > OSPI_DEVICE_0 __ospi_device_0_non_retentive_size__ = __ospi_device_0_non_retentive_end__ - __ospi_device_0_non_retentive_start__; __ospi_device_0_region_max_size__ = 0x8000000; /* Must be the same as defined in MEMORY above */ __ospi_device_0_region_start_address__ = __ospi_device_0_start__; __ospi_device_0_region_end_address__ = __ospi_device_0_start__ + __ospi_device_0_region_max_size__; /* Note: There are no secure/non-secure boundaries for OSPI. These symbols are provided for the RA configuration tool. */ __tz_OSPI_DEVICE_0_N = __ospi_device_0_non_retentive_end__; /* Note: There are no secure/non-secure boundaries for OSPI. These symbols are provided for the RA configuration tool. */ __tz_OSPI_DEVICE_1_S = ORIGIN(OSPI_DEVICE_1); /* OSPI_DEVICE_1 section to be downloaded via debugger */ .OSPI_DEVICE_1 : { __ospi_device_1_start__ = .; KEEP(*(.ospi_device_1*)) KEEP(*(.code_in_ospi_device_1*)) __ospi_device_1_end__ = .; } > OSPI_DEVICE_1 __ospi_device_1_code_size__ = __ospi_device_1_end__ - __ospi_device_1_start__; /* OSPI_DEVICE_1 non-retentive section, creates a copy in internal flash that can be copied to OSPI */ __ospi_device_1_code_addr__ = sgstubs_pre_location + (SIZEOF(.qspi_non_retentive) + SIZEOF(.ospi_device_0_non_retentive)); .ospi_device_1_non_retentive : AT(__ospi_device_1_code_addr__) { __ospi_device_1_non_retentive_start__ = .; KEEP(*(.ospi_device_1_non_retentive*)) __ospi_device_1_non_retentive_end__ = .; } > OSPI_DEVICE_1 __ospi_device_1_non_retentive_size__ = __ospi_device_1_non_retentive_end__ - __ospi_device_1_non_retentive_start__; __ospi_device_1_region_max_size__ = 0x10000000; /* Must be the same as defined in MEMORY above */ __ospi_device_1_region_start_address__ = __ospi_device_1_start__; __ospi_device_1_region_end_address__ = __ospi_device_1_start__ + __ospi_device_1_region_max_size__; /* Note: There are no secure/non-secure boundaries for OSPI. These symbols are provided for the RA configuration tool. */ __tz_OSPI_DEVICE_1_N = __ospi_device_1_non_retentive_end__; .noinit (NOLOAD): { . = ALIGN(4); __noinit_start = .; KEEP(*(.noinit*)) . = ALIGN(8); /* Place the FreeRTOS heap here so that the __HeapLimit calculation does not include the freertos heap. */ KEEP(*(.heap.*)) __noinit_end = .; } > RAM .bss : { . = ALIGN(4); __bss_start__ = .; *(.bss*) *(COMMON) . = ALIGN(4); __bss_end__ = .; } > RAM .heap (NOLOAD): { . = ALIGN(8); __HeapBase = .; /* Place the STD heap here. */ KEEP(*(.heap)) __HeapLimit = .; } > RAM /* Stacks are stored in this section. */ .stack_dummy (NOLOAD): { . = ALIGN(8); __StackLimit = .; /* Main stack */ KEEP(*(.stack)) __StackTop = .; /* Thread stacks */ KEEP(*(.stack*)) __StackTopAll = .; } > RAM PROVIDE(__stack = __StackTopAll); /* This symbol represents the end of user allocated RAM. The RAM after this symbol can be used at run time for things such as ThreadX memory pool allocations. */ __RAM_segment_used_end__ = ALIGN(__StackTopAll , 4); /* RAM_NSC_START can be used to set a fixed address for non-secure callable RAM in secure projects. * If it is not specified, the address for NSC RAM is the end of RAM aligned to a 1K boundary. * In flat projects that require non-secure RAM, this variable is set to the start of non-secure RAM. */ __tz_RAM_C = DEFINED(RAM_NSC_START) ? ABSOLUTE(RAM_NSC_START - RAM_NS_BUFFER_BLOCK_LENGTH) : __RESERVE_NS_RAM ? ABSOLUTE(RAM_NS_BUFFER_BLOCK_START) : ALIGN(__RAM_segment_used_end__, 1024); /* RAM_NS_START can be used to set a fixed address for non-secure RAM in secure projects or flat projects. * RAM_NS_BUFFER_BLOCK_LENGTH is used to allocate non-secure buffers in a flat project. If it is not * specified, the address for NSC RAM is the end of RAM aligned to an 8K boundary. * In flat projects that require non-secure RAM, this variable is set to the start of non-secure RAM. */ __tz_RAM_N = DEFINED(RAM_NS_START) ? ABSOLUTE(RAM_NS_START - RAM_NS_BUFFER_BLOCK_LENGTH) : __RESERVE_NS_RAM ? ABSOLUTE(RAM_NS_BUFFER_BLOCK_START) : ALIGN(__tz_RAM_C, 8192); /* Non-secure buffers must be in non-secure RAM. This is primarily used for the EDMAC in flat projects. * The EDMAC is a non-secure bus master and can only access non-secure RAM. */ .ns_buffer (NOLOAD): { /* Allocate RAM on a 32-byte boundary to help with placement of Ethernet buffers. */ . = __RESERVE_NS_RAM ? ABSOLUTE(RAM_NS_BUFFER_START & 0xFFFFFFE0) : .; KEEP(*(.ns_buffer*)) } > RAM /* Data flash. */ .data_flash : { . = ORIGIN(DATA_FLASH); __tz_DATA_FLASH_S = .; __Data_Flash_Start = .; KEEP(*(.data_flash*)) __Data_Flash_End = .; __tz_DATA_FLASH_N = DEFINED(DATA_FLASH_NS_START) ? ABSOLUTE(DATA_FLASH_NS_START) : __RESERVE_NS_RAM ? ABSOLUTE(DATA_FLASH_START + DATA_FLASH_LENGTH) : ALIGN(1024); } > DATA_FLASH /* Note: There are no secure/non-secure boundaries for SDRAM. These symbols are provided for the RA configuration tool. */ __tz_SDRAM_S = ORIGIN(SDRAM); /* SDRAM */ .sdram (NOLOAD): { __SDRAM_Start = .; KEEP(*(.sdram*)) KEEP(*(.frame*)) __SDRAM_End = .; } > SDRAM /* Note: There are no secure/non-secure boundaries for SDRAM. These symbols are provided for the RA configuration tool. */ __tz_SDRAM_N = __SDRAM_End; /* Note: There are no secure/non-secure boundaries for ID_CODE. These symbols are provided for the RA configuration tool. */ __tz_ID_CODE_S = ORIGIN(ID_CODE); /* Note: There are no secure/non-secure boundaries for ID_CODE. These symbols are provided for the RA configuration tool. * Set this symbol to the same value as __tz_ID_CODE_S so the RA configuration tool does not split the ID_CODE * memory region between TrustZone projects. */ __tz_ID_CODE_N = __tz_ID_CODE_S; .id_code : { __ID_Code_Start = .; KEEP(*(.id_code*)) __ID_Code_End = .; } > ID_CODE /* Symbol required for RA Configuration tool. */ __tz_OPTION_SETTING_S = ORIGIN(OPTION_SETTING_OFS); .option_setting_ofs : { __OPTION_SETTING_OFS_Start = .; KEEP(*(.option_setting_ofs0)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_OFS_Start + 0x04 : __OPTION_SETTING_OFS_Start; KEEP(*(.option_setting_ofs2)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_OFS_Start + 0x10 : __OPTION_SETTING_OFS_Start; KEEP(*(.option_setting_dualsel)) __OPTION_SETTING_OFS_End = .; } > OPTION_SETTING_OFS = 0xFF .option_setting_sas : { __OPTION_SETTING_SAS_Start = .; KEEP(*(.option_setting_sas)) __OPTION_SETTING_SAS_End = .; } > OPTION_SETTING_SAS = 0xFF /* Symbol required for RA Configuration tool. */ __tz_OPTION_SETTING_N = ABSOLUTE(OPTION_SETTING_START_NS); .option_setting_ns : { __OPTION_SETTING_NS_Start = .; KEEP(*(.option_setting_ofs1)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x04 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_ofs3)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x10 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_banksel)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x40 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_bps0)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x44 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_bps1)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x48 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_bps2)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x4C : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_bps3)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x60 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_pbps0)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x64 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_pbps1)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x68 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_pbps2)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x6C : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_pbps3)) __OPTION_SETTING_NS_End = .; } > OPTION_SETTING = 0xFF /* Symbol required for RA Configuration tool. */ __tz_OPTION_SETTING_S_S = ORIGIN(OPTION_SETTING_S); .option_setting_s : { __OPTION_SETTING_S_Start = .; KEEP(*(.option_setting_ofs1_sec)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x04 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_ofs3_sec)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x10 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_banksel_sec)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x40 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sec0)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x44 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sec1)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x48 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sec2)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x4C : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sec3)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x60 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_pbps_sec0)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x64 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_pbps_sec1)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x68 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_pbps_sec2)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x6C : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_pbps_sec3)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x80 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_ofs1_sel)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x84 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_ofs3_sel)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x90 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_banksel_sel)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0xC0 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sel0)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0xC4 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sel1)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0xC8 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sel2)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0xCC : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sel3)) __OPTION_SETTING_S_End = .; } > OPTION_SETTING_S = 0xFF /* Symbol required for RA Configuration tool. */ __tz_OPTION_SETTING_S_N = __OPTION_SETTING_S_End; }
Auto-generated memory_regions.ld files for two FSP versions:
My Findings:
1. There are many differences in fsp.ld versions between 2 versions
2. memory_regions.ld files have some address changes that I don't understand. Why are OPTION_SETTING register addresses different for example?
3. When I edit the memory_regions.ld file of the FSP 5.3.0 version and replace the contents with the contents of 3.1.0 version, I get this error dialog during compile:
- In the 5.3.0 version, when Independent Watchdog is added to the Stacks, the properties of iwdt looks like this:
This used to work fine in 3.1.0 with the same MPU.
I appreciate any help or suggestions,
Thanks
It sounds like the watchdog timer resets the device. To find out the cause of the reset please read the Reset Status Registers RSTSR0, RSTSR1.
That was my first thought but it isn't.
Another finding is this:
Our original bootloader was simply jumping to the main program. That was working fine when both apps (bootloader and main app) were compiled with FSP 3.1 but it didn't work when main app was compiled with FSP 5.3.
When I changed the bootloader like this:
1. Write a signature value to the RAM on a specific location
2. Reset
3. On reset handler, before initializing anything, check the signature. If signature is there, jump to main program.
... it works. But this doesn't solve my problem because I need to fix the devices in the field.
So I am writing a main program that will be loaded by the original bootloader, then will replace the original bootloader by the new bootloader.
I know it is risky. If power goes off during flashing, device will be bricked. But there are not so many devices in the field yet and we will replace them if happens.
Thx.