1*4882a593Smuzhiyun# 2*4882a593Smuzhiyun# SPDX-License-Identifier: GPL-2.0+ 3*4882a593Smuzhiyun# 4*4882a593Smuzhiyun 5*4882a593Smuzhiyunlibs-y += arch/arc/cpu/$(CPU)/ 6*4882a593Smuzhiyunlibs-y += arch/arc/lib/ 7*4882a593Smuzhiyun 8*4882a593Smuzhiyun# MetaWare debugger doesn't support PIE (position-independent executable) 9*4882a593Smuzhiyun# so the only way to load U-Boot in MDB is to fake it by: 10*4882a593Smuzhiyun# 1. Reset PIE flag in ELF header 11*4882a593Smuzhiyun# 2. Strip all debug information from elf 12*4882a593Smuzhiyunifdef CONFIG_SYS_LITTLE_ENDIAN 13*4882a593Smuzhiyun EXEC_TYPE_OFFSET=16 14*4882a593Smuzhiyunelse 15*4882a593Smuzhiyun EXEC_TYPE_OFFSET=17 16*4882a593Smuzhiyunendif 17*4882a593Smuzhiyun 18*4882a593Smuzhiyunmdbtrick: u-boot 19*4882a593Smuzhiyun $(Q)printf '\x02' | dd of=u-boot bs=1 seek=$(EXEC_TYPE_OFFSET) count=1 \ 20*4882a593Smuzhiyun conv=notrunc &> /dev/null 21*4882a593Smuzhiyun $(Q)$(CROSS_COMPILE)strip -g u-boot 22