/* Linker File for Renesas FSP */ INCLUDE memory_regions.ld /* Uncomment and set XIP_SECONDARY_SLOT_IMAGE to 1 below for the secondary XIP application image.*/ /* XIP_SECONDARY_SLOT_IMAGE = 1; */ QSPI_FLASH_PRV_LENGTH = DEFINED(QSPI_FLASH_SIZE) ? ABSOLUTE(QSPI_FLASH_SIZE) : ABSOLUTE(QSPI_FLASH_LENGTH); OSPI_DEVICE_0_PRV_LENGTH = DEFINED(OSPI_DEVICE_0_SIZE) ? ABSOLUTE(OSPI_DEVICE_0_SIZE) : ABSOLUTE(OSPI_DEVICE_0_LENGTH); OSPI_DEVICE_1_PRV_LENGTH = DEFINED(OSPI_DEVICE_1_SIZE) ? ABSOLUTE(OSPI_DEVICE_1_SIZE) : ABSOLUTE(OSPI_DEVICE_1_LENGTH); /* If a flat (secure) project has DEFINED RAM_NS_BUFFER_LENGTH, then emit IDAU symbols to allocate non-secure RAM. */ __RESERVE_NS_RAM = !DEFINED(PROJECT_NONSECURE) && DEFINED(RAM_NS_BUFFER_LENGTH) && (OPTION_SETTING_S_LENGTH != 0); RAM_NS_BUFFER_BLOCK_LENGTH = DEFINED(RAM_NS_BUFFER_LENGTH) ? ALIGN(RAM_NS_BUFFER_LENGTH, 8192) : 0; RAM_NS_BUFFER_LENGTH = DEFINED(RAM_NS_BUFFER_LENGTH) ? RAM_NS_BUFFER_LENGTH : 0; RAM_NS_BUFFER_START = RAM_START + RAM_LENGTH - RAM_NS_BUFFER_LENGTH; RAM_NS_BUFFER_BLOCK_START = RAM_START + RAM_LENGTH - RAM_NS_BUFFER_BLOCK_LENGTH; OPTION_SETTING_START_NS = 0x0100A180; /* This definition is used to avoid moving the counter in OPTION_SETTING regions for projects that should not configure option settings. * Bootloader images do not configure option settings because they are owned by the bootloader. * FSP_BOOTABLE_IMAGE is only defined in bootloader images. */ __bl_FSP_BOOTABLE_IMAGE = 1; __bln_FSP_BOOTABLE_IMAGE = 1; PROJECT_SECURE_OR_FLAT = !DEFINED(PROJECT_NONSECURE) && OPTION_SETTING_LENGTH && !DEFINED(FSP_BOOTABLE_IMAGE); USE_OPTION_SETTING_NS = DEFINED(PROJECT_NONSECURE) && !DEFINED(FSP_BOOTABLE_IMAGE); __bl_FLASH_IMAGE_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_IMAGE_NUMBER == 1 ? FLASH_BOOTLOADER_LENGTH + FLASH_BOOTLOADER_HEADER_LENGTH : FLASH_BOOTLOADER_LENGTH + FLASH_BOOTLOADER_SCRATCH_LENGTH + FLASH_APPLICATION_S_LENGTH + FLASH_BOOTLOADER_HEADER_LENGTH; __bl_FLASH_IMAGE_LENGTH = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_S_LENGTH - FLASH_BOOTLOADER_HEADER_LENGTH; __bl_FLASH_IMAGE_END = __bl_FLASH_IMAGE_START + __bl_FLASH_IMAGE_LENGTH; __bl_XIP_SECONDARY_FLASH_IMAGE_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_BOOTLOADER_LENGTH + FLASH_APPLICATION_S_LENGTH + FLASH_BOOTLOADER_HEADER_LENGTH; __bl_XIP_SECONDARY_FLASH_IMAGE_END = __bl_XIP_SECONDARY_FLASH_IMAGE_START + __bl_FLASH_IMAGE_LENGTH; __bl_FLASH_NS_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? __bl_FLASH_IMAGE_END : __bl_FLASH_IMAGE_START - FLASH_BOOTLOADER_HEADER_LENGTH + FLASH_APPLICATION_S_LENGTH; __bl_FLASH_NSC_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? __bl_FLASH_IMAGE_END : __bl_FLASH_NS_START - FLASH_APPLICATION_NSC_LENGTH; __bl_RAM_NS_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? RAM_START + RAM_LENGTH : RAM_START + RAM_LENGTH - RAM_APPLICATION_NS_LENGTH; __bl_RAM_NSC_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? RAM_START + RAM_LENGTH : __bl_RAM_NS_START - RAM_APPLICATION_NSC_LENGTH; __bl_FLASH_NS_IMAGE_START = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? __bl_FLASH_IMAGE_END : __bl_FLASH_NS_START + FLASH_BOOTLOADER_HEADER_LENGTH_2; __bln_FLASH_IMAGE_START = __bl_FLASH_NS_IMAGE_START; __bln_FLASH_IMAGE_LENGTH = !DEFINED(FLASH_BOOTLOADER_LENGTH) ? 0 : FLASH_APPLICATION_NS_LENGTH == 0 ? __bl_FLASH_IMAGE_END : FLASH_APPLICATION_NS_LENGTH - FLASH_BOOTLOADER_HEADER_LENGTH_2; XIP_SECONDARY_SLOT_IMAGE = DEFINED(XIP_SECONDARY_SLOT_IMAGE) ? XIP_SECONDARY_SLOT_IMAGE : 0; FLASH_ORIGIN = !DEFINED(FLASH_IMAGE_START) ? FLASH_START : XIP_SECONDARY_SLOT_IMAGE == 1 ? XIP_SECONDARY_FLASH_IMAGE_START : FLASH_IMAGE_START; LIMITED_FLASH_LENGTH = DEFINED(FLASH_IMAGE_LENGTH) ? FLASH_IMAGE_LENGTH : DEFINED(FLASH_BOOTLOADER_LENGTH) ? FLASH_BOOTLOADER_LENGTH : FLASH_LENGTH; /* Define memory regions. */ MEMORY { FLASH (rx) : ORIGIN = FLASH_ORIGIN, LENGTH = LIMITED_FLASH_LENGTH RAM (rwx) : ORIGIN = RAM_START, LENGTH = RAM_LENGTH DATA_FLASH (rx) : ORIGIN = DATA_FLASH_START, LENGTH = DATA_FLASH_LENGTH QSPI_FLASH (rx) : ORIGIN = QSPI_FLASH_START, LENGTH = QSPI_FLASH_PRV_LENGTH OSPI_DEVICE_0 (rx) : ORIGIN = OSPI_DEVICE_0_START, LENGTH = OSPI_DEVICE_0_PRV_LENGTH OSPI_DEVICE_1 (rx) : ORIGIN = OSPI_DEVICE_1_START, LENGTH = OSPI_DEVICE_1_PRV_LENGTH OSPI_DEVICE_0_RAM (rwx) : ORIGIN = OSPI_DEVICE_0_START, LENGTH = OSPI_DEVICE_0_PRV_LENGTH OSPI_DEVICE_1_RAM (rwx) : ORIGIN = OSPI_DEVICE_1_START, LENGTH = OSPI_DEVICE_1_PRV_LENGTH SDRAM (rwx) : ORIGIN = SDRAM_START, LENGTH = SDRAM_LENGTH OPTION_SETTING (r): ORIGIN = OPTION_SETTING_START, LENGTH = OPTION_SETTING_LENGTH OPTION_SETTING_S (r): ORIGIN = OPTION_SETTING_S_START, LENGTH = OPTION_SETTING_S_LENGTH ID_CODE (rx) : ORIGIN = ID_CODE_START, LENGTH = ID_CODE_LENGTH } /* Library configurations */ GROUP(libc.a libm.a) /* Linker script to place sections and symbol values. Should be used together * with other linker script that defines memory regions FLASH and RAM. * It references following symbols, which must be DEFINED in code: * Reset_Handler : Entry of reset handler * * It defines following symbols, which code can use without definition: * __exidx_start * __exidx_end * __copy_table_start__ * __copy_table_end__ * __zero_table_start__ * __zero_table_end__ * __etext * __data_start__ * __preinit_array_start * __preinit_array_end * __init_array_start * __init_array_end * __fini_array_start * __fini_array_end * __data_end__ * __bss_start__ * __bss_end__ * __HeapLimit * __StackLimit * __StackTop * __stack * __Vectors_End * __Vectors_Size * __qspi_flash_start__ * __qspi_flash_end__ * __qspi_flash_code_size__ * __qspi_region_max_size__ * __qspi_region_start_address__ * __qspi_region_end_address__ * __ospi_device_0_start__ * __ospi_device_0_end__ * __ospi_device_0_code_size__ * __ospi_device_0_region_max_size__ * __ospi_device_0_region_start_address__ * __ospi_device_0_region_end_address__ * __ospi_device_1_start__ * __ospi_device_1_end__ * __ospi_device_1_code_size__ * __ospi_device_1_region_max_size__ * __ospi_device_1_region_start_address__ * __ospi_device_1_region_end_address__ */ ENTRY(Reset_Handler) SECTIONS { .text : { __tz_FLASH_S = ABSOLUTE(FLASH_START); __ROM_Start = .; /* Even though the vector table is not 256 entries (1KB) long, we still allocate that much * space because ROM registers are at address 0x400 and there is very little space * in between. */ KEEP(*(.fixed_vectors*)) KEEP(*(.application_vectors*)) __Vectors_End = .; /* ROM Registers start at address 0x00000400 for devices that do not have the OPTION_SETTING region. */ . = OPTION_SETTING_LENGTH > 0 ? . : __ROM_Start + 0x400; KEEP(*(.rom_registers*)) /* Reserving 0x100 bytes of space for ROM registers. */ . = OPTION_SETTING_LENGTH > 0 ? . : __ROM_Start + 0x500; /* Allocate flash write-boundary-aligned * space for sce9 wrapped public keys for mcuboot if the module is used. */ . = ALIGN(128); KEEP(*(.mcuboot_sce9_key*)) *(.text*) KEEP(*(.version)) KEEP(*(.init)) KEEP(*(.fini)) /* section information for finsh shell */ . = ALIGN(4); __fsymtab_start = .; KEEP(*(FSymTab)) __fsymtab_end = .; . = ALIGN(4); __vsymtab_start = .; KEEP(*(VSymTab)) __vsymtab_end = .; /* section information for initial. */ . = ALIGN(4); __rt_init_start = .; KEEP(*(SORT(.rti_fn*))) __rt_init_end = .; . = ALIGN(4); KEEP(*(FalPartTable)) /* .ctors */ *crtbegin.o(.ctors) *crtbegin?.o(.ctors) *(EXCLUDE_FILE(*crtend?.o *crtend.o) .ctors) *(SORT(.ctors.*)) *(.ctors) /* .dtors */ *crtbegin.o(.dtors) *crtbegin?.o(.dtors) *(EXCLUDE_FILE(*crtend?.o *crtend.o) .dtors) *(SORT(.dtors.*)) *(.dtors) *(.rodata*) __usb_dev_descriptor_start_fs = .; KEEP(*(.usb_device_desc_fs*)) __usb_cfg_descriptor_start_fs = .; KEEP(*(.usb_config_desc_fs*)) __usb_interface_descriptor_start_fs = .; KEEP(*(.usb_interface_desc_fs*)) __usb_descriptor_end_fs = .; __usb_dev_descriptor_start_hs = .; KEEP(*(.usb_device_desc_hs*)) __usb_cfg_descriptor_start_hs = .; KEEP(*(.usb_config_desc_hs*)) __usb_interface_descriptor_start_hs = .; KEEP(*(.usb_interface_desc_hs*)) __usb_descriptor_end_hs = .; KEEP(*(.eh_frame*)) __ROM_End = .; } > FLASH = 0xFF __Vectors_Size = __Vectors_End - __Vectors; .ARM.extab : { *(.ARM.extab* .gnu.linkonce.armextab.*) } > FLASH __exidx_start = .; .ARM.exidx : { *(.ARM.exidx* .gnu.linkonce.armexidx.*) } > FLASH __exidx_end = .; /* To copy multiple ROM to RAM sections, * uncomment .copy.table section and, * define __STARTUP_COPY_MULTIPLE in startup_ARMCMx.S */ /* .copy.table : { . = ALIGN(4); __copy_table_start__ = .; LONG (__etext) LONG (__data_start__) LONG (__data_end__ - __data_start__) LONG (__etext2) LONG (__data2_start__) LONG (__data2_end__ - __data2_start__) __copy_table_end__ = .; } > FLASH */ /* To clear multiple BSS sections, * uncomment .zero.table section and, * define __STARTUP_CLEAR_BSS_MULTIPLE in startup_ARMCMx.S */ /* .zero.table : { . = ALIGN(4); __zero_table_start__ = .; LONG (__bss_start__) LONG (__bss_end__ - __bss_start__) LONG (__bss2_start__) LONG (__bss2_end__ - __bss2_start__) __zero_table_end__ = .; } > FLASH */ __etext = .; __tz_RAM_S = ORIGIN(RAM); /* If DTC is used, put the DTC vector table at the start of SRAM. This avoids memory holes due to 1K alignment required by it. */ .fsp_dtc_vector_table (NOLOAD) : { . = ORIGIN(RAM); *(.fsp_dtc_vector_table) } > RAM /* Initialized data section. */ .data : { __data_start__ = .; . = ALIGN(4); __Code_In_RAM_Start = .; KEEP(*(.code_in_ram*)) __Code_In_RAM_End = .; *(vtable) /* Don't use *(.data*) because it will place data meant for .data_flash in this section. */ *(.data.*) *(.data) . = ALIGN(4); /* preinit data */ PROVIDE_HIDDEN (__preinit_array_start = .); KEEP(*(.preinit_array)) PROVIDE_HIDDEN (__preinit_array_end = .); . = ALIGN(4); /* init data */ PROVIDE_HIDDEN (__init_array_start = .); KEEP(*(SORT(.init_array.*))) KEEP(*(.init_array)) PROVIDE_HIDDEN (__init_array_end = .); . = ALIGN(4); /* finit data */ PROVIDE_HIDDEN (__fini_array_start = .); KEEP(*(SORT(.fini_array.*))) KEEP(*(.fini_array)) PROVIDE_HIDDEN (__fini_array_end = .); KEEP(*(.jcr*)) . = ALIGN(4); /* All data end */ __data_end__ = .; } > RAM AT > FLASH /* TrustZone Secure Gateway Stubs Section. */ /* Some arithmetic is needed to eliminate unnecessary FILL for secure projects. */ /* 1. Get the address to the next block after the .data section in FLASH. */ DATA_END = LOADADDR(.data) + SIZEOF(.data); /* 2. Determine the secure gateway stubs address either by the provided linker variable or the next 1024-byte block after .data */ SGSTUBS_LOC = (DEFINED(PROJECT_SECURE) && DEFINED(FLASH_NSC_START)) ? ABSOLUTE(FLASH_NSC_START) : ALIGN(DATA_END, 1024); /* 3. Manually specify the start location for .gnu.sgstubs */ .gnu.sgstubs SGSTUBS_LOC : ALIGN(1024) { __tz_FLASH_C = DEFINED(FLASH_NSC_START) ? ABSOLUTE(FLASH_NSC_START) : __RESERVE_NS_RAM ? ABSOLUTE(FLASH_START + FLASH_LENGTH) : ALIGN(1024); _start_sg = .; *(.gnu.sgstubs*) . = ALIGN(32); _end_sg = .; } > FLASH __tz_FLASH_N = DEFINED(FLASH_NS_START) ? ABSOLUTE(FLASH_NS_START) : __RESERVE_NS_RAM ? ABSOLUTE(FLASH_START + FLASH_LENGTH) : FLASH_LENGTH < 32768 ? FLASH_LENGTH : ALIGN(32768); FLASH_NS_IMAGE_START = DEFINED(FLASH_NS_IMAGE_START) ? FLASH_NS_IMAGE_START : __tz_FLASH_N; /* Note: There are no secure/non-secure boundaries for QSPI. These symbols are provided for the RA configuration tool. */ __tz_QSPI_FLASH_S = ORIGIN(QSPI_FLASH); /* QSPI_FLASH section to be downloaded via debugger */ .qspi_flash : { __qspi_flash_start__ = .; KEEP(*(.qspi_flash*)) KEEP(*(.code_in_qspi*)) __qspi_flash_end__ = .; } > QSPI_FLASH __qspi_flash_code_size__ = __qspi_flash_end__ - __qspi_flash_start__; /* QSPI_FLASH non-retentive section, creates a copy in internal flash that can be copied to QSPI */ __qspi_flash_code_addr__ = __etext + (__data_end__ - __data_start__); .qspi_non_retentive : AT (__qspi_flash_code_addr__) { __qspi_non_retentive_start__ = .; KEEP(*(.qspi_non_retentive*)) __qspi_non_retentive_end__ = .; } > QSPI_FLASH __qspi_non_retentive_size__ = __qspi_non_retentive_end__ - __qspi_non_retentive_start__; __qspi_region_max_size__ = 0x4000000; /* Must be the same as defined in MEMORY above */ __qspi_region_start_address__ = __qspi_flash_start__; __qspi_region_end_address__ = __qspi_flash_start__ + __qspi_region_max_size__; /* Note: There are no secure/non-secure boundaries for QSPI. These symbols are provided for the RA configuration tool. */ __tz_QSPI_FLASH_N = __qspi_non_retentive_end__; /* Support for OctaRAM */ .OSPI_DEVICE_0_NO_LOAD (NOLOAD): { . = ALIGN(4); __ospi_device_0_start__ = .; *(.ospi_device_0_no_load*) . = ALIGN(4); __ospi_device_0_end__ = .; } > OSPI_DEVICE_0_RAM .OSPI_DEVICE_1_NO_LOAD (NOLOAD): { . = ALIGN(4); __ospi_device_1_start__ = .; *(.ospi_device_1_no_load*) . = ALIGN(4); __ospi_device_1_end__ = .; } > OSPI_DEVICE_1_RAM /* Note: There are no secure/non-secure boundaries for QSPI. These symbols are provided for the RA configuration tool. */ __tz_OSPI_DEVICE_0_S = ORIGIN(OSPI_DEVICE_0); /* OSPI_DEVICE_0 section to be downloaded via debugger */ .OSPI_DEVICE_0 : { __ospi_device_0_start__ = .; KEEP(*(.ospi_device_0*)) KEEP(*(.code_in_ospi_device_0*)) __ospi_device_0_end__ = .; } > OSPI_DEVICE_0 __ospi_device_0_code_size__ = __ospi_device_0_end__ - __ospi_device_0_start__; /* OSPI_DEVICE_0 non-retentive section, creates a copy in internal flash that can be copied to OSPI */ __ospi_device_0_code_addr__ = __etext + (__data_end__ - __data_start__); .ospi_device_0_non_retentive : AT (__ospi_device_0_code_addr__) { __ospi_device_0_non_retentive_start__ = .; KEEP(*(.ospi_device_0_non_retentive*)) __ospi_device_0_non_retentive_end__ = .; } > OSPI_DEVICE_0 __ospi_device_0_non_retentive_size__ = __ospi_device_0_non_retentive_end__ - __ospi_device_0_non_retentive_start__; __ospi_device_0_region_max_size__ = 0x8000000; /* Must be the same as defined in MEMORY above */ __ospi_device_0_region_start_address__ = __ospi_device_0_start__; __ospi_device_0_region_end_address__ = __ospi_device_0_start__ + __ospi_device_0_region_max_size__; /* Note: There are no secure/non-secure boundaries for OSPI. These symbols are provided for the RA configuration tool. */ __tz_OSPI_DEVICE_0_N = __ospi_device_0_non_retentive_end__; /* Note: There are no secure/non-secure boundaries for OSPI. These symbols are provided for the RA configuration tool. */ __tz_OSPI_DEVICE_1_S = ORIGIN(OSPI_DEVICE_1); /* OSPI_DEVICE_1 section to be downloaded via debugger */ .OSPI_DEVICE_1 : { __ospi_device_1_start__ = .; KEEP(*(.ospi_device_1*)) KEEP(*(.code_in_ospi_device_1*)) __ospi_device_1_end__ = .; } > OSPI_DEVICE_1 __ospi_device_1_code_size__ = __ospi_device_1_end__ - __ospi_device_1_start__; /* OSPI_DEVICE_1 non-retentive section, creates a copy in internal flash that can be copied to OSPI */ __ospi_device_1_code_addr__ = __etext + (__data_end__ - __data_start__); .ospi_device_1_non_retentive : AT (__ospi_device_1_code_addr__) { __ospi_device_1_non_retentive_start__ = .; KEEP(*(.ospi_device_1_non_retentive*)) __ospi_device_1_non_retentive_end__ = .; } > OSPI_DEVICE_1 __ospi_device_1_non_retentive_size__ = __ospi_device_1_non_retentive_end__ - __ospi_device_1_non_retentive_start__; __ospi_device_1_region_max_size__ = 0x10000000; /* Must be the same as defined in MEMORY above */ __ospi_device_1_region_start_address__ = __ospi_device_1_start__; __ospi_device_1_region_end_address__ = __ospi_device_1_start__ + __ospi_device_1_region_max_size__; /* Note: There are no secure/non-secure boundaries for OSPI. These symbols are provided for the RA configuration tool. */ __tz_OSPI_DEVICE_1_N = __ospi_device_1_non_retentive_end__; .noinit (NOLOAD): { . = ALIGN(4); __noinit_start = .; KEEP(*(.noinit*)) . = ALIGN(8); /* Place the FreeRTOS heap here so that the __HeapLimit calculation does not include the freertos heap. */ KEEP(*(.heap.*)) __noinit_end = .; } > RAM .bss : { . = ALIGN(4); __bss_start__ = .; *(.bss*) *(COMMON) . = ALIGN(4); __bss_end__ = .; } > RAM .heap (NOLOAD): { . = ALIGN(8); __HeapBase = .; /* Place the STD heap here. */ KEEP(*(.heap)) __HeapLimit = .; } > RAM /* Stacks are stored in this section. */ .stack_dummy (NOLOAD): { . = ALIGN(8); __StackLimit = .; /* Main stack */ KEEP(*(.stack)) __StackTop = .; /* Thread stacks */ KEEP(*(.stack*)) __StackTopAll = .; } > RAM PROVIDE(__stack = __StackTopAll); /* This symbol represents the end of user allocated RAM. The RAM after this symbol can be used at run time for things such as ThreadX memory pool allocations. */ __RAM_segment_used_end__ = ALIGN(__StackTopAll , 4); /* RAM_NSC_START can be used to set a fixed address for non-secure callable RAM in secure projects. * If it is not specified, the address for NSC RAM is the end of RAM aligned to a 1K boundary. * In flat projects that require non-secure RAM, this variable is set to the start of non-secure RAM. */ __tz_RAM_C = DEFINED(RAM_NSC_START) ? ABSOLUTE(RAM_NSC_START) : __RESERVE_NS_RAM ? ABSOLUTE(RAM_NS_BUFFER_BLOCK_START) : ALIGN(__RAM_segment_used_end__, 1024); /* RAM_NS_START can be used to set a fixed address for non-secure RAM in secure projects or flat projects. * RAM_NS_BUFFER_BLOCK_LENGTH is used to allocate non-secure buffers in a flat project. If it is not * specified, the address for NSC RAM is the end of RAM aligned to an 8K boundary. * In flat projects that require non-secure RAM, this variable is set to the start of non-secure RAM. */ __tz_RAM_N = DEFINED(RAM_NS_START) ? ABSOLUTE(RAM_NS_START) : __RESERVE_NS_RAM ? ABSOLUTE(RAM_NS_BUFFER_BLOCK_START) : ALIGN(__tz_RAM_C, 8192); /* Non-secure buffers must be in non-secure RAM. This is primarily used for the EDMAC in flat projects. * The EDMAC is a non-secure bus master and can only access non-secure RAM. */ .ns_buffer (NOLOAD): { /* Allocate RAM on a 32-byte boundary to help with placement of Ethernet buffers. */ . = __RESERVE_NS_RAM ? ABSOLUTE(RAM_NS_BUFFER_START & 0xFFFFFFE0) : .; KEEP(*(.ns_buffer*)) } > RAM /* Data flash. */ .data_flash : { . = ORIGIN(DATA_FLASH); __tz_DATA_FLASH_S = .; __Data_Flash_Start = .; KEEP(*(.data_flash*)) __Data_Flash_End = .; __tz_DATA_FLASH_N = DEFINED(DATA_FLASH_NS_START) ? ABSOLUTE(DATA_FLASH_NS_START) : __RESERVE_NS_RAM ? ABSOLUTE(DATA_FLASH_START + DATA_FLASH_LENGTH) : ALIGN(1024); } > DATA_FLASH /* Note: There are no secure/non-secure boundaries for SDRAM. These symbols are provided for the RA configuration tool. */ __tz_SDRAM_S = ORIGIN(SDRAM); /* SDRAM */ .sdram (NOLOAD): { __SDRAM_Start = .; KEEP(*(.sdram*)) KEEP(*(.frame*)) __SDRAM_End = .; } > SDRAM /* Note: There are no secure/non-secure boundaries for SDRAM. These symbols are provided for the RA configuration tool. */ __tz_SDRAM_N = __SDRAM_End; /* Note: There are no secure/non-secure boundaries for ID_CODE. These symbols are provided for the RA configuration tool. */ __tz_ID_CODE_S = ORIGIN(ID_CODE); .id_code : { __ID_Code_Start = .; KEEP(*(.id_code*)) __ID_Code_End = .; } > ID_CODE /* Note: There are no secure/non-secure boundaries for ID_CODE. These symbols are provided for the RA configuration tool. */ __tz_ID_CODE_N = __ID_Code_End; /* Symbol required for RA Configuration tool. */ __tz_OPTION_SETTING_S = ORIGIN(OPTION_SETTING); .option_setting : { __OPTION_SETTING_Start = .; KEEP(*(.option_setting_ofs0)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_Start + 0x10 : __OPTION_SETTING_Start; KEEP(*(.option_setting_dualsel)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_Start + 0x34 : __OPTION_SETTING_Start; KEEP(*(.option_setting_sas)) __OPTION_SETTING_End = .; } > OPTION_SETTING = 0xFF /* Symbol required for RA Configuration tool. */ __tz_OPTION_SETTING_N = OPTION_SETTING_START_NS; .option_setting_ns : { __OPTION_SETTING_NS_Start = .; KEEP(*(.option_setting_ofs1)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x10 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_banksel)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x40 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_bps0)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x44 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_bps1)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x48 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_bps2)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x60 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_pbps0)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x64 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_pbps1)) . = USE_OPTION_SETTING_NS ? __OPTION_SETTING_NS_Start + 0x68 : __OPTION_SETTING_NS_Start; KEEP(*(.option_setting_pbps2)) __OPTION_SETTING_NS_End = .; } > OPTION_SETTING = 0xFF /* Symbol required for RA Configuration tool. */ __tz_OPTION_SETTING_S_S = ORIGIN(OPTION_SETTING_S); .option_setting_s : { __OPTION_SETTING_S_Start = .; KEEP(*(.option_setting_ofs1_sec)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x10 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_banksel_sec)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x40 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sec0)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x44 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sec1)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x48 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sec2)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x60 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_pbps_sec0)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x64 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_pbps_sec1)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x68 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_pbps_sec2)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x80 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_ofs1_sel)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0x90 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_banksel_sel)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0xC0 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sel0)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0xC4 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sel1)) . = PROJECT_SECURE_OR_FLAT ? __OPTION_SETTING_S_Start + 0xC8 : __OPTION_SETTING_S_Start; KEEP(*(.option_setting_bps_sel2)) __OPTION_SETTING_S_End = .; } > OPTION_SETTING_S = 0xFF /* Symbol required for RA Configuration tool. */ __tz_OPTION_SETTING_S_N = __OPTION_SETTING_S_End; }