1dde3b70dSSimon Glass/* 2dde3b70dSSimon Glass * Copyright (c) 2004-2008 Texas Instruments 3dde3b70dSSimon Glass * 4dde3b70dSSimon Glass * (C) Copyright 2002 5dde3b70dSSimon Glass * Gary Jennejohn, DENX Software Engineering, <garyj@denx.de> 6dde3b70dSSimon Glass * 71a459660SWolfgang Denk * SPDX-License-Identifier: GPL-2.0+ 8dde3b70dSSimon Glass */ 9dde3b70dSSimon Glass 10bf433afdSMarc Zyngier#include <config.h> 11980d6a55SChen-Yu Tsai#include <asm/psci.h> 12bf433afdSMarc Zyngier 13dde3b70dSSimon GlassOUTPUT_FORMAT("elf32-littlearm", "elf32-littlearm", "elf32-littlearm") 14dde3b70dSSimon GlassOUTPUT_ARCH(arm) 15dde3b70dSSimon GlassENTRY(_start) 16dde3b70dSSimon GlassSECTIONS 17dde3b70dSSimon Glass{ 18c1352119SSimon Glass#ifndef CONFIG_CMDLINE 19c1352119SSimon Glass /DISCARD/ : { *(.u_boot_list_2_cmd_*) } 20c1352119SSimon Glass#endif 21c5e954ecSWang Dongsheng#if defined(CONFIG_ARMV7_SECURE_BASE) && defined(CONFIG_ARMV7_NONSEC) 22d47cb0b6SPeng Fan /* 23c5e954ecSWang Dongsheng * If CONFIG_ARMV7_SECURE_BASE is true, secure code will not 24c5e954ecSWang Dongsheng * bundle with u-boot, and code offsets are fixed. Secure zone 25c5e954ecSWang Dongsheng * only needs to be copied from the loading address to 26c5e954ecSWang Dongsheng * CONFIG_ARMV7_SECURE_BASE, which is the linking and running 27c5e954ecSWang Dongsheng * address for secure code. 28d47cb0b6SPeng Fan * 29c5e954ecSWang Dongsheng * If CONFIG_ARMV7_SECURE_BASE is undefined, the secure zone will 30c5e954ecSWang Dongsheng * be included in u-boot address space, and some absolute address 31c5e954ecSWang Dongsheng * were used in secure code. The absolute addresses of the secure 32c5e954ecSWang Dongsheng * code also needs to be relocated along with the accompanying u-boot 33c5e954ecSWang Dongsheng * code. 34c5e954ecSWang Dongsheng * 35c5e954ecSWang Dongsheng * So DISCARD is only for CONFIG_ARMV7_SECURE_BASE. 36d47cb0b6SPeng Fan */ 37d47cb0b6SPeng Fan /DISCARD/ : { *(.rel._secure*) } 38c5e954ecSWang Dongsheng#endif 39dde3b70dSSimon Glass . = 0x00000000; 40dde3b70dSSimon Glass 41dde3b70dSSimon Glass . = ALIGN(4); 42dde3b70dSSimon Glass .text : 43dde3b70dSSimon Glass { 44d026dec8SAlbert ARIBAUD *(.__image_copy_start) 4541623c91SAlbert ARIBAUD *(.vectors) 46b68d6712SStephen Warren CPUDIR/start.o (.text*) 47b68d6712SStephen Warren *(.text*) 48dde3b70dSSimon Glass } 49dde3b70dSSimon Glass 50104d6fb6SJan Kiszka#ifdef CONFIG_ARMV7_NONSEC 51bf433afdSMarc Zyngier 52a1274cc9SChen-Yu Tsai /* Align the secure section only if we're going to use it in situ */ 53a1274cc9SChen-Yu Tsai .__secure_start : 54a1274cc9SChen-Yu Tsai#ifndef CONFIG_ARMV7_SECURE_BASE 55a1274cc9SChen-Yu Tsai ALIGN(CONSTANT(COMMONPAGESIZE)) 56a1274cc9SChen-Yu Tsai#endif 57a1274cc9SChen-Yu Tsai { 58a1274cc9SChen-Yu Tsai KEEP(*(.__secure_start)) 59a1274cc9SChen-Yu Tsai } 60a1274cc9SChen-Yu Tsai 61bf433afdSMarc Zyngier#ifndef CONFIG_ARMV7_SECURE_BASE 62bf433afdSMarc Zyngier#define CONFIG_ARMV7_SECURE_BASE 63b56e06d3SChen-Yu Tsai#define __ARMV7_PSCI_STACK_IN_RAM 64bf433afdSMarc Zyngier#endif 65bf433afdSMarc Zyngier 66bf433afdSMarc Zyngier .secure_text CONFIG_ARMV7_SECURE_BASE : 67bf433afdSMarc Zyngier AT(ADDR(.__secure_start) + SIZEOF(.__secure_start)) 68bf433afdSMarc Zyngier { 69bf433afdSMarc Zyngier *(._secure.text) 70bf433afdSMarc Zyngier } 71bf433afdSMarc Zyngier 72980d6a55SChen-Yu Tsai .secure_stack ALIGN(ADDR(.secure_text) + SIZEOF(.secure_text), 73980d6a55SChen-Yu Tsai CONSTANT(COMMONPAGESIZE)) (NOLOAD) : 74b56e06d3SChen-Yu Tsai#ifdef __ARMV7_PSCI_STACK_IN_RAM 75980d6a55SChen-Yu Tsai AT(ADDR(.secure_stack)) 76980d6a55SChen-Yu Tsai#else 77980d6a55SChen-Yu Tsai AT(LOADADDR(.secure_text) + SIZEOF(.secure_text)) 78980d6a55SChen-Yu Tsai#endif 79980d6a55SChen-Yu Tsai { 80980d6a55SChen-Yu Tsai KEEP(*(.__secure_stack_start)) 81980d6a55SChen-Yu Tsai 82980d6a55SChen-Yu Tsai /* Skip addreses for stack */ 83980d6a55SChen-Yu Tsai . = . + CONFIG_ARMV7_PSCI_NR_CPUS * ARM_PSCI_STACK_SIZE; 84980d6a55SChen-Yu Tsai 85980d6a55SChen-Yu Tsai /* Align end of stack section to page boundary */ 86980d6a55SChen-Yu Tsai . = ALIGN(CONSTANT(COMMONPAGESIZE)); 87980d6a55SChen-Yu Tsai 88980d6a55SChen-Yu Tsai KEEP(*(.__secure_stack_end)) 89*3eff6818SChen-Yu Tsai 90*3eff6818SChen-Yu Tsai#ifdef CONFIG_ARMV7_SECURE_MAX_SIZE 91*3eff6818SChen-Yu Tsai /* 92*3eff6818SChen-Yu Tsai * We are not checking (__secure_end - __secure_start) here, 93*3eff6818SChen-Yu Tsai * as these are the load addresses, and do not include the 94*3eff6818SChen-Yu Tsai * stack section. Instead, use the end of the stack section 95*3eff6818SChen-Yu Tsai * and the start of the text section. 96*3eff6818SChen-Yu Tsai */ 97*3eff6818SChen-Yu Tsai ASSERT((. - ADDR(.secure_text)) <= CONFIG_ARMV7_SECURE_MAX_SIZE, 98*3eff6818SChen-Yu Tsai "Error: secure section exceeds secure memory size"); 99*3eff6818SChen-Yu Tsai#endif 100980d6a55SChen-Yu Tsai } 101980d6a55SChen-Yu Tsai 102980d6a55SChen-Yu Tsai#ifndef __ARMV7_PSCI_STACK_IN_RAM 103980d6a55SChen-Yu Tsai /* Reset VMA but don't allocate space if we have secure SRAM */ 104980d6a55SChen-Yu Tsai . = LOADADDR(.secure_stack); 105b56e06d3SChen-Yu Tsai#endif 106b56e06d3SChen-Yu Tsai 107980d6a55SChen-Yu Tsai .__secure_end : AT(ADDR(.__secure_end)) { 108bf433afdSMarc Zyngier *(.__secure_end) 109bf433afdSMarc Zyngier LONG(0x1d1071c); /* Must output something to reset LMA */ 110bf433afdSMarc Zyngier } 111bf433afdSMarc Zyngier#endif 112bf433afdSMarc Zyngier 113dde3b70dSSimon Glass . = ALIGN(4); 114dde3b70dSSimon Glass .rodata : { *(SORT_BY_ALIGNMENT(SORT_BY_NAME(.rodata*))) } 115dde3b70dSSimon Glass 116dde3b70dSSimon Glass . = ALIGN(4); 117dde3b70dSSimon Glass .data : { 118b68d6712SStephen Warren *(.data*) 119dde3b70dSSimon Glass } 120dde3b70dSSimon Glass 121dde3b70dSSimon Glass . = ALIGN(4); 122dde3b70dSSimon Glass 123dde3b70dSSimon Glass . = .; 124dde3b70dSSimon Glass 125dde3b70dSSimon Glass . = ALIGN(4); 12655675142SMarek Vasut .u_boot_list : { 127ef123c52SAlbert ARIBAUD KEEP(*(SORT(.u_boot_list*))); 12855675142SMarek Vasut } 12955675142SMarek Vasut 13055675142SMarek Vasut . = ALIGN(4); 131dde3b70dSSimon Glass 13250149ea3SAlexander Graf .__efi_runtime_start : { 13350149ea3SAlexander Graf *(.__efi_runtime_start) 13450149ea3SAlexander Graf } 13550149ea3SAlexander Graf 13650149ea3SAlexander Graf .efi_runtime : { 13750149ea3SAlexander Graf *(efi_runtime_text) 13850149ea3SAlexander Graf *(efi_runtime_data) 13950149ea3SAlexander Graf } 14050149ea3SAlexander Graf 14150149ea3SAlexander Graf .__efi_runtime_stop : { 14250149ea3SAlexander Graf *(.__efi_runtime_stop) 14350149ea3SAlexander Graf } 14450149ea3SAlexander Graf 14550149ea3SAlexander Graf .efi_runtime_rel_start : 14650149ea3SAlexander Graf { 14750149ea3SAlexander Graf *(.__efi_runtime_rel_start) 14850149ea3SAlexander Graf } 14950149ea3SAlexander Graf 15050149ea3SAlexander Graf .efi_runtime_rel : { 15150149ea3SAlexander Graf *(.relefi_runtime_text) 15250149ea3SAlexander Graf *(.relefi_runtime_data) 15350149ea3SAlexander Graf } 15450149ea3SAlexander Graf 15550149ea3SAlexander Graf .efi_runtime_rel_stop : 15650149ea3SAlexander Graf { 15750149ea3SAlexander Graf *(.__efi_runtime_rel_stop) 15850149ea3SAlexander Graf } 15950149ea3SAlexander Graf 16050149ea3SAlexander Graf . = ALIGN(4); 16150149ea3SAlexander Graf 162d026dec8SAlbert ARIBAUD .image_copy_end : 163d026dec8SAlbert ARIBAUD { 164d026dec8SAlbert ARIBAUD *(.__image_copy_end) 165d026dec8SAlbert ARIBAUD } 166dde3b70dSSimon Glass 16747bd65efSAlbert ARIBAUD .rel_dyn_start : 16847bd65efSAlbert ARIBAUD { 16947bd65efSAlbert ARIBAUD *(.__rel_dyn_start) 17047bd65efSAlbert ARIBAUD } 17147bd65efSAlbert ARIBAUD 172dde3b70dSSimon Glass .rel.dyn : { 173dde3b70dSSimon Glass *(.rel*) 17447bd65efSAlbert ARIBAUD } 17547bd65efSAlbert ARIBAUD 17647bd65efSAlbert ARIBAUD .rel_dyn_end : 17747bd65efSAlbert ARIBAUD { 17847bd65efSAlbert ARIBAUD *(.__rel_dyn_end) 179dde3b70dSSimon Glass } 180dde3b70dSSimon Glass 181d0b5d9daSAlbert ARIBAUD .end : 182d0b5d9daSAlbert ARIBAUD { 183d0b5d9daSAlbert ARIBAUD *(.__end) 184d0b5d9daSAlbert ARIBAUD } 185d0b5d9daSAlbert ARIBAUD 186d0b5d9daSAlbert ARIBAUD _image_binary_end = .; 187dde3b70dSSimon Glass 188dde3b70dSSimon Glass /* 189dde3b70dSSimon Glass * Deprecated: this MMU section is used by pxa at present but 190dde3b70dSSimon Glass * should not be used by new boards/CPUs. 191dde3b70dSSimon Glass */ 192dde3b70dSSimon Glass . = ALIGN(4096); 193dde3b70dSSimon Glass .mmutable : { 194dde3b70dSSimon Glass *(.mmutable) 195dde3b70dSSimon Glass } 196dde3b70dSSimon Glass 197f84a7b8fSAlbert ARIBAUD/* 198f84a7b8fSAlbert ARIBAUD * Compiler-generated __bss_start and __bss_end, see arch/arm/lib/bss.c 199f84a7b8fSAlbert ARIBAUD * __bss_base and __bss_limit are for linker only (overlay ordering) 200f84a7b8fSAlbert ARIBAUD */ 201f84a7b8fSAlbert ARIBAUD 2023ebd1cbcSAlbert ARIBAUD .bss_start __rel_dyn_start (OVERLAY) : { 2033ebd1cbcSAlbert ARIBAUD KEEP(*(.__bss_start)); 204f84a7b8fSAlbert ARIBAUD __bss_base = .; 2053ebd1cbcSAlbert ARIBAUD } 2063ebd1cbcSAlbert ARIBAUD 207f84a7b8fSAlbert ARIBAUD .bss __bss_base (OVERLAY) : { 208b68d6712SStephen Warren *(.bss*) 209dde3b70dSSimon Glass . = ALIGN(4); 210f84a7b8fSAlbert ARIBAUD __bss_limit = .; 211dde3b70dSSimon Glass } 212dde3b70dSSimon Glass 213f84a7b8fSAlbert ARIBAUD .bss_end __bss_limit (OVERLAY) : { 214f84a7b8fSAlbert ARIBAUD KEEP(*(.__bss_end)); 215dde3b70dSSimon Glass } 216dde3b70dSSimon Glass 217d0b5d9daSAlbert ARIBAUD .dynsym _image_binary_end : { *(.dynsym) } 21847ed5dd0SAlbert ARIBAUD .dynbss : { *(.dynbss) } 21947ed5dd0SAlbert ARIBAUD .dynstr : { *(.dynstr*) } 22047ed5dd0SAlbert ARIBAUD .dynamic : { *(.dynamic*) } 22147ed5dd0SAlbert ARIBAUD .plt : { *(.plt*) } 22247ed5dd0SAlbert ARIBAUD .interp : { *(.interp*) } 2232c67e0e7SAndreas Färber .gnu.hash : { *(.gnu.hash) } 22447ed5dd0SAlbert ARIBAUD .gnu : { *(.gnu*) } 22547ed5dd0SAlbert ARIBAUD .ARM.exidx : { *(.ARM.exidx*) } 226b02bfc4dSAlbert ARIBAUD .gnu.linkonce.armexidx : { *(.gnu.linkonce.armexidx.*) } 227dde3b70dSSimon Glass} 228