Message ID | 61da823d3e9db42cd1543644de559dd83e392adb.1654178252.git.michal.simek@amd.com |
---|---|
State | Superseded |
Delegated to: | Michal Simek |
Headers | show
Return-Path: <u-boot-bounces@lists.denx.de> X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=monstr-eu.20210112.gappssmtp.com header.i=@monstr-eu.20210112.gappssmtp.com header.a=rsa-sha256 header.s=20210112 header.b=1NdTYWsD; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de (client-ip=85.214.62.61; helo=phobos.denx.de; envelope-from=u-boot-bounces@lists.denx.de; receiver=<UNKNOWN>) Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4LDSLY55S0z9sFr for <incoming@patchwork.ozlabs.org>; Thu, 2 Jun 2022 23:59:33 +1000 (AEST) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id C0D6F84388; Thu, 2 Jun 2022 15:58:46 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=monstr.eu Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=monstr-eu.20210112.gappssmtp.com header.i=@monstr-eu.20210112.gappssmtp.com header.b="1NdTYWsD"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id B53208432E; Thu, 2 Jun 2022 15:58:07 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.2 Received: from mail-ed1-x530.google.com (mail-ed1-x530.google.com [IPv6:2a00:1450:4864:20::530]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 0BB738431A for <u-boot@lists.denx.de>; Thu, 2 Jun 2022 15:58:01 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=none (p=none dis=none) header.from=monstr.eu Authentication-Results: phobos.denx.de; spf=none smtp.mailfrom=monstr@monstr.eu Received: by mail-ed1-x530.google.com with SMTP id er5so6359993edb.12 for <u-boot@lists.denx.de>; Thu, 02 Jun 2022 06:58:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=monstr-eu.20210112.gappssmtp.com; s=20210112; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=9mzemrwUb3D2m3sKdmhvPcZbsnHm0xJQQBSDiq0IfiI=; b=1NdTYWsDi8wuZ7+VYGjzamcjqfUfIY6QCiq4XIl4Nxwpc/KSC1R1XaM04i/zX/UTL6 3gLVlfArWqVfwhM2HokD3TW18vKg7U/ihjzXBBFEV4Um/eYjynAT+r4IHxz2eHIU0vJ3 RXY2qxijYLBbZZTO5u8s85jWjBUFs7ztRuKk7kA6KIhFQU3D5W5e46jKzdbFAn6RbSyh U6DXHDt/kXOEOSvmYe00gWpt1otWCEcANt3crbyOwnc64sckydsN+kt5U7Zlq67U7H6o NaDItjtzYrTfGXDVYSwHwp0fasIhwblYZOF8uxw4vFgrifmQR00fSl3FmJJFECi8OUrF hHgA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=9mzemrwUb3D2m3sKdmhvPcZbsnHm0xJQQBSDiq0IfiI=; b=CUMJb22zHEbs3RRdciJuseblr9opW/pcrP1sq0y+yXTdoPMnrXLP10QvvHpHUBSUaY 6kl7vEb9Rhjpx7asUOEsMc3YqNF1dXN6rJRnghakTJKUiA2VRHt3dBMLDZyvdCLF5c4a wP9+MVV68X/b1wz0lxv77Q6/GWdpIWybYtBfyA6/5FkcTJ+mucit3rk2knDZWyuuAruh AIgXLisT0P4BbQQgfk67e0gCnBD8QOzZS0V9QCK2/SKmHK5EHjLwWlNYkjPcuAGF0eQJ L5sEN/hPaQq2gnvfTQYLzphvdbFkzsiKgXQWzv+n7wQrRq0xM+slcVByN2xxXGLifH3O WhIw== X-Gm-Message-State: AOAM530TDWwLXSrrYY07DozKSEZLAq3vNsgbz5MHQtqIjc7V+K66/Uil uGCgE9Nqjw0phCYxGwhN0m8MhKSSf/SsjA== X-Google-Smtp-Source: ABdhPJzWc84uTCrlzJMdhp2jpNk/Fpj3hZo5WhyhBLRja7EJMIIW8uvxW1jmFFhjsC7EBaqfkxRA6g== X-Received: by 2002:a05:6402:510a:b0:42b:66c3:d4fd with SMTP id m10-20020a056402510a00b0042b66c3d4fdmr5659726edd.260.1654178280359; Thu, 02 Jun 2022 06:58:00 -0700 (PDT) Received: from localhost ([2a02:768:2307:40d6::f9e]) by smtp.gmail.com with ESMTPSA id u15-20020a05640207cf00b0042dd60352d1sm2524842edy.35.2022.06.02.06.57.59 (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Thu, 02 Jun 2022 06:58:00 -0700 (PDT) From: Michal Simek <monstr@monstr.eu> X-Google-Original-From: Michal Simek <michal.simek@amd.com> To: u-boot@lists.denx.de, git@xilinx.com Cc: Michal Simek <monstr@monstr.eu>, Ovidiu Panait <ovidiu.panait@windriver.com> Subject: [PATCH 06/22] microblaze: Fix stack protection behavior Date: Thu, 2 Jun 2022 15:57:30 +0200 Message-Id: <61da823d3e9db42cd1543644de559dd83e392adb.1654178252.git.michal.simek@amd.com> X-Mailer: git-send-email 2.36.0 In-Reply-To: <cover.1654178252.git.michal.simek@amd.com> References: <cover.1654178252.git.michal.simek@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion <u-boot.lists.denx.de> List-Unsubscribe: <https://lists.denx.de/options/u-boot>, <mailto:u-boot-request@lists.denx.de?subject=unsubscribe> List-Archive: <https://lists.denx.de/pipermail/u-boot/> List-Post: <mailto:u-boot@lists.denx.de> List-Help: <mailto:u-boot-request@lists.denx.de?subject=help> List-Subscribe: <https://lists.denx.de/listinfo/u-boot>, <mailto:u-boot-request@lists.denx.de?subject=subscribe> Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" <u-boot-bounces@lists.denx.de> X-Virus-Scanned: clamav-milter 0.103.5 at phobos.denx.de X-Virus-Status: Clean |
Series |
microblaze: Add support for full relocation
|
expand
|
diff --git a/arch/microblaze/cpu/start.S b/arch/microblaze/cpu/start.S index 9e00eef1f4b6..715ef37b39d9 100644 --- a/arch/microblaze/cpu/start.S +++ b/arch/microblaze/cpu/start.S @@ -15,8 +15,9 @@ _start: mts rmsr, r0 /* disable cache */ - addi r8, r0, _end - mts rslr, r8 + mts rslr, r0 + addi r8, r0, _start + mts rshr, r8 #if defined(CONFIG_SPL_BUILD) addi r1, r0, CONFIG_SPL_STACK_ADDR
When U-Boot starts stack protection can be already enabled that's why setup the lowest possible SLR value which is address 0. And the highest possible stack in front of U-Boot. That's why you should never load U-Boot to the beginning of DDR. There must be some space reserved. Code is using this location for early malloc space, early global data and stack. Signed-off-by: Michal Simek <michal.simek@amd.com> --- arch/microblaze/cpu/start.S | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)