-
Notifications
You must be signed in to change notification settings - Fork 1
/
sdk11.patch
544 lines (504 loc) · 23.2 KB
/
sdk11.patch
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
diff -Naur SDK11.orig/components/libraries/bootloader_dfu/bootloader.c SDK11/components/libraries/bootloader_dfu/bootloader.c
--- SDK11.orig/components/libraries/bootloader_dfu/bootloader.c 2020-05-17 22:15:40.264414600 +0200
+++ SDK11/components/libraries/bootloader_dfu/bootloader.c 2020-05-18 00:24:19.364741100 +0200
@@ -78,10 +78,21 @@
{
for (;;)
{
+#ifdef FEED_WATCHDOG
+ if ( (NRF_WDT->RUNSTATUS) && (NRF_WDT->CONFIG & (WDT_CONFIG_SLEEP_Run << WDT_CONFIG_SLEEP_Pos)) ){
+ // if watchdog is enabled while sleeping we cannot sleep via sd_app_evt_wait() here
+ uint8_t RREN = NRF_WDT->RREN;
+ volatile uint32_t *RR= &NRF_WDT->RR[0];
+ while (RREN&1) { // reload all enabled registers
+ *RR=0x6E524635; RR++; RREN >>= 1;
+ }
+ } else
+#endif
+ {
// Wait in low power state for any events.
uint32_t err_code = sd_app_evt_wait();
APP_ERROR_CHECK(err_code);
-
+ }
// Event received. Process it from the scheduler.
app_sched_execute();
diff -Naur SDK11.orig/components/libraries/bootloader_dfu/dfu_init_template.c SDK11/components/libraries/bootloader_dfu/dfu_init_template.c
--- SDK11.orig/components/libraries/bootloader_dfu/dfu_init_template.c 2020-05-17 22:15:40.283415100 +0200
+++ SDK11/components/libraries/bootloader_dfu/dfu_init_template.c 2020-05-18 00:24:19.365706800 +0200
@@ -86,7 +86,7 @@
memcpy(m_extended_packet,
&p_init_packet->softdevice[p_init_packet->softdevice_len],
m_extended_packet_length);
-
+#ifndef DISABLE_DFU_APPCHECK
/** [DFU init application version] */
// To support application versioning, this check should be updated.
// This template allows for any application to be installed. However,
@@ -111,7 +111,7 @@
{
return NRF_ERROR_INVALID_DATA;
}
-
+#endif
// Third check: Check the array of supported SoftDevices by this application.
// If the installed SoftDevice does not match any SoftDevice in the list then an
// error is returned.
diff -Naur SDK11.orig/components/libraries/bootloader_dfu/dfu_single_bank.c SDK11/components/libraries/bootloader_dfu/dfu_single_bank.c
--- SDK11.orig/components/libraries/bootloader_dfu/dfu_single_bank.c 2020-05-17 22:15:40.285414000 +0200
+++ SDK11/components/libraries/bootloader_dfu/dfu_single_bank.c 2020-05-18 00:24:19.367733700 +0200
@@ -658,6 +658,8 @@
uint32_t block_size = (boot_settings.sd_image_start - sd_start) / 2;
uint32_t image_end = boot_settings.sd_image_start + boot_settings.sd_image_size;
+ block_size = 0xD000; /* for SD 2.x */ // &= ~(uint32_t)(CODE_PAGE_SIZE - 1); //nrf52 alingment fix
+
uint32_t img_block_start = boot_settings.sd_image_start + 2 * block_size;
uint32_t sd_block_start = sd_start + 2 * block_size;
@@ -760,6 +762,8 @@
uint32_t image_end = bootloader_settings.sd_image_start +
bootloader_settings.sd_image_size;
+ block_size= 0xD000;// &= ~(uint32_t)(CODE_PAGE_SIZE - 1); //nrf52 alingment fix
+
uint32_t img_block_start = bootloader_settings.sd_image_start + 2 * block_size;
uint32_t sd_block_start = sd_start + 2 * block_size;
diff -Naur SDK11.orig/components/libraries/bootloader_dfu/dfu_transport_ble.c SDK11/components/libraries/bootloader_dfu/dfu_transport_ble.c
--- SDK11.orig/components/libraries/bootloader_dfu/dfu_transport_ble.c 2020-05-17 22:15:40.287413300 +0200
+++ SDK11/components/libraries/bootloader_dfu/dfu_transport_ble.c 2020-05-24 22:10:16.037415800 +0200
@@ -39,14 +39,15 @@
#define DFU_REV_MAJOR 0x00 /** DFU Major revision number to be exposed. */
#define DFU_REV_MINOR 0x08 /** DFU Minor revision number to be exposed. */
#define DFU_REVISION ((DFU_REV_MAJOR << 8) | DFU_REV_MINOR) /** DFU Revision number to be exposed. Combined of major and minor versions. */
-#define ADVERTISING_LED_PIN_NO BSP_LED_0 /**< Is on when device is advertising. */
-#define CONNECTED_LED_PIN_NO BSP_LED_1 /**< Is on when device has connected. */
#define DFU_SERVICE_HANDLE 0x000C /**< Handle of DFU service when DFU service is first service initialized. */
#define BLE_HANDLE_MAX 0xFFFF /**< Max handle value is BLE. */
+#ifndef DEVICE_NAME
#define DEVICE_NAME "DfuTarg" /**< Name of device. Will be included in the advertising data. */
+#endif
+#ifndef MANUFACTURER_NAME
#define MANUFACTURER_NAME "NordicSemiconductor" /**< Manufacturer. Will be passed to Device Information Service. */
-
+#endif
#define MIN_CONN_INTERVAL (uint16_t)(MSEC_TO_UNITS(15, UNIT_1_25_MS)) /**< Minimum acceptable connection interval (11.25 milliseconds). */
#define MAX_CONN_INTERVAL (uint16_t)(MSEC_TO_UNITS(30, UNIT_1_25_MS)) /**< Maximum acceptable connection interval (15 milliseconds). */
#define SLAVE_LATENCY 0 /**< Slave latency. */
@@ -108,8 +109,10 @@
static bool m_pkt_rcpt_notif_enabled = false; /**< Variable to denote whether packet receipt notification has been enabled by the DFU controller.*/
static uint16_t m_conn_handle = BLE_CONN_HANDLE_INVALID; /**< Handle of the current connection. */
static bool m_is_advertising = false; /**< Variable to indicate if advertising is ongoing.*/
+#ifndef DISABLE_BUTTONLESS_DFU
static dfu_ble_peer_data_t m_ble_peer_data; /**< BLE Peer data exchanged from application on buttonless update mode. */
static bool m_ble_peer_data_valid = false; /**< True if BLE Peer data has been exchanged from application. */
+#endif
static uint32_t m_direct_adv_cnt = APP_DIRECTED_ADV_TIMEOUT; /**< Counter of direct advertisements. */
static uint8_t * mp_final_packet; /**< Pointer to final data packet received. When callback for succesful packet handling is received from dfu bank handling a transfer complete response can be sent to peer. */
@@ -132,6 +135,7 @@
return NRF_ERROR_INVALID_STATE;
}
+#ifndef DISABLE_BUTTONLESS_DFU
if (m_ble_peer_data_valid)
{
err_code = sd_ble_gatts_sys_attr_set(m_conn_handle,
@@ -157,6 +161,7 @@
}
}
else
+#endif
{
err_code = sd_ble_gatts_sys_attr_set(m_conn_handle, NULL, 0, 0);
}
@@ -685,7 +690,7 @@
// Initialize advertising parameters (used when starting advertising).
memset(&m_adv_params, 0, sizeof(m_adv_params));
-
+#ifndef DISABLE_BUTTONLESS_DFU
if (m_ble_peer_data_valid)
{
ble_gap_irk_t empty_irk = {{0}};
@@ -722,6 +727,7 @@
}
}
else
+#endif
{
advertising_init(BLE_GAP_ADV_FLAGS_LE_ONLY_GENERAL_DISC_MODE);
m_adv_params.type = BLE_GAP_ADV_TYPE_ADV_IND;
@@ -734,7 +740,7 @@
err_code = sd_ble_gap_adv_start(&m_adv_params);
APP_ERROR_CHECK(err_code);
- nrf_gpio_pin_clear(ADVERTISING_LED_PIN_NO);
+ LED_ON(ADVERTISING_LED_PIN_NO);
m_is_advertising = true;
}
@@ -752,7 +758,7 @@
err_code = sd_ble_gap_adv_stop();
APP_ERROR_CHECK(err_code);
- nrf_gpio_pin_set(ADVERTISING_LED_PIN_NO);
+ LED_OFF(ADVERTISING_LED_PIN_NO);
m_is_advertising = false;
}
@@ -771,8 +777,8 @@
switch (p_ble_evt->header.evt_id)
{
case BLE_GAP_EVT_CONNECTED:
- nrf_gpio_pin_clear(CONNECTED_LED_PIN_NO);
- nrf_gpio_pin_set(ADVERTISING_LED_PIN_NO);
+ LED_ON(CONNECTED_LED_PIN_NO);
+ LED_OFF(ADVERTISING_LED_PIN_NO);
m_conn_handle = p_ble_evt->evt.gap_evt.conn_handle;
m_is_advertising = false;
@@ -784,7 +790,7 @@
uint16_t sys_attr_len = 128;
m_direct_adv_cnt = APP_DIRECTED_ADV_TIMEOUT;
- nrf_gpio_pin_set(CONNECTED_LED_PIN_NO);
+ LED_OFF(CONNECTED_LED_PIN_NO);
err_code = sd_ble_gatts_sys_attr_get(m_conn_handle,
sys_attr,
@@ -805,6 +811,7 @@
m_conn_handle = BLE_CONN_HANDLE_INVALID;
break;
+#ifndef DISABLE_BUTTONLESS_DFU
case BLE_GAP_EVT_SEC_PARAMS_REQUEST:
{
@@ -826,7 +833,7 @@
APP_ERROR_CHECK(err_code);
}
break;
-
+#endif
case BLE_GATTS_EVT_TIMEOUT:
if (p_ble_evt->evt.gatts_evt.params.timeout.src == BLE_GATT_TIMEOUT_SRC_PROTOCOL)
{
@@ -886,6 +893,7 @@
}
break;
+#ifndef DISABLE_BUTTONLESS_DFU
case BLE_GAP_EVT_SEC_INFO_REQUEST:
{
ble_gap_enc_info_t * p_enc_info = NULL;
@@ -904,6 +912,7 @@
APP_ERROR_CHECK(err_code);
}
break;
+#endif
case BLE_GATTS_EVT_SYS_ATTR_MISSING:
case BLE_GAP_EVT_CONN_SEC_UPDATE:
@@ -938,19 +947,6 @@
}
-/**@brief Function for the LEDs initialization.
- *
- * @details Initializes all LEDs used by this application.
- */
-static void leds_init(void)
-{
- nrf_gpio_cfg_output(ADVERTISING_LED_PIN_NO);
- nrf_gpio_cfg_output(CONNECTED_LED_PIN_NO);
- nrf_gpio_pin_set(ADVERTISING_LED_PIN_NO);
- nrf_gpio_pin_set(CONNECTED_LED_PIN_NO);
-}
-
-
/**@brief Function for the GAP initialization.
*
* @details This function will setup all the necessary GAP (Generic Access Profile) parameters of
@@ -1036,8 +1032,6 @@
m_tear_down_in_progress = false;
m_pkt_type = PKT_TYPE_INVALID;
- leds_init();
-
err_code = softdevice_ble_evt_handler_set(ble_evt_dispatch);
VERIFY_SUCCESS(err_code);
@@ -1045,13 +1039,14 @@
err_code = hci_mem_pool_open();
VERIFY_SUCCESS(err_code);
-
+#ifndef DISABLE_BUTTONLESS_DFU
err_code = dfu_ble_peer_data_get(&m_ble_peer_data);
if (err_code == NRF_SUCCESS)
{
m_ble_peer_data_valid = true;
}
else
+#endif
{
ble_gap_addr_t addr;
diff -Naur SDK11.orig/components/libraries/bootloader_dfu/dfu_types.h SDK11/components/libraries/bootloader_dfu/dfu_types.h
--- SDK11.orig/components/libraries/bootloader_dfu/dfu_types.h 2020-05-17 22:15:40.290413800 +0200
+++ SDK11/components/libraries/bootloader_dfu/dfu_types.h 2020-09-21 20:56:38.845064100 +0200
@@ -58,7 +58,10 @@
#elif NRF52
+#ifndef BOOTLOADER_REGION_START
+#warning "Hardcoding BOOTLOADER_REGION_START to 0x0007A000"
#define BOOTLOADER_REGION_START 0x0007A000 /**< This field should correspond to start address of the bootloader, found in UICR.RESERVED, 0x10001014, register. This value is used for sanity check, so the bootloader will fail immediately if this value differs from runtime value. The value is used to determine max application size for updating. */
+#endif
#define BOOTLOADER_SETTINGS_ADDRESS 0x0007F000 /**< The field specifies the page location of the bootloader settings address. */
#define BOOTLOADER_MBR_PARAMS_PAGE_ADDRESS 0x0007E000 /**< The field specifies the page location of the mbr params page address. */
diff -Naur SDK11.orig/components/toolchain/gcc/gcc_startup_nrf52.s SDK11/components/toolchain/gcc/gcc_startup_nrf52.s
--- SDK11.orig/components/toolchain/gcc/gcc_startup_nrf52.s 2020-05-17 22:15:41.049922900 +0200
+++ SDK11/components/toolchain/gcc/gcc_startup_nrf52.s 2020-05-18 00:24:19.375179900 +0200
@@ -130,6 +130,7 @@
.long 0 /*Reserved */
.long 0 /*Reserved */
.long 0 /*Reserved */
+#ifndef SMALL_INTERRUPT_VECTORS
.long 0 /*Reserved */
.long 0 /*Reserved */
.long 0 /*Reserved */
@@ -147,6 +148,7 @@
.long 0 /*Reserved */
.long 0 /*Reserved */
.long 0 /*Reserved */
+
.long 0 /*Reserved */
.long 0 /*Reserved */
.long 0 /*Reserved */
@@ -322,7 +324,7 @@
.long 0 /*Reserved */
.long 0 /*Reserved */
.long 0 /*Reserved */
-
+#endif
.size __isr_vector, . - __isr_vector
/* Reset Handler */
diff -Naur SDK11.orig/components/toolchain/system_nrf52.c SDK11/components/toolchain/system_nrf52.c
--- SDK11.orig/components/toolchain/system_nrf52.c 2020-05-17 22:15:41.064922800 +0200
+++ SDK11/components/toolchain/system_nrf52.c 2020-09-28 20:10:23.859428200 +0200
@@ -44,6 +44,7 @@
static bool errata_37(void);
static bool errata_57(void);
static bool errata_66(void);
+static bool errata_108(void);
#if defined ( __CC_ARM )
@@ -64,21 +65,21 @@
/* Workaround for Errata 16 "System: RAM may be corrupt on wakeup from CPU IDLE" found at the Errata document
for your device located at https://infocenter.nordicsemi.com/ */
if (errata_16()){
- *(volatile uint32_t *)0x4007C074 = 3131961357ul;
+ *(volatile uint32_t *)0x4007C074 = 3131961357ul;
}
-
+
/* Workaround for Errata 31 "CLOCK: Calibration values are not correctly loaded from FICR at reset" found at the Errata document
for your device located at https://infocenter.nordicsemi.com/ */
if (errata_31()){
*(volatile uint32_t *)0x4000053C = ((*(volatile uint32_t *)0x10000244) & 0x0000E000) >> 13;
}
-
+
/* Workaround for Errata 32 "DIF: Debug session automatically enables TracePort pins" found at the Errata document
for your device located at https://infocenter.nordicsemi.com/ */
if (errata_32()){
CoreDebug->DEMCR &= ~CoreDebug_DEMCR_TRCENA_Msk;
}
-
+
/* Workaround for Errata 36 "CLOCK: Some registers are not reset when expected" found at the Errata document
for your device located at https://infocenter.nordicsemi.com/ */
if (errata_36()){
@@ -86,22 +87,22 @@
NRF_CLOCK->EVENTS_CTTO = 0;
NRF_CLOCK->CTIV = 0;
}
-
+
/* Workaround for Errata 37 "RADIO: Encryption engine is slow by default" found at the Errata document
for your device located at https://infocenter.nordicsemi.com/ */
if (errata_37()){
*(volatile uint32_t *)0x400005A0 = 0x3;
}
-
+
/* Workaround for Errata 57 "NFCT: NFC Modulation amplitude" found at the Errata document
for your device located at https://infocenter.nordicsemi.com/ */
if (errata_57()){
- *(volatile uint32_t *)0x40005610 = 0x00000005;
- *(volatile uint32_t *)0x40005688 = 0x00000001;
- *(volatile uint32_t *)0x40005618 = 0x00000000;
+ *(volatile uint32_t *)0x40005610 = 0x00000005;
+ *(volatile uint32_t *)0x40005688 = 0x00000001;
+ *(volatile uint32_t *)0x40005618 = 0x00000000;
*(volatile uint32_t *)0x40005614 = 0x0000003F;
}
-
+
/* Workaround for Errata 66 "TEMP: Linearity specification not met with default settings" found at the Errata document
for your device located at https://infocenter.nordicsemi.com/ */
if (errata_66()){
@@ -123,16 +124,22 @@
NRF_TEMP->T3 = NRF_FICR->TEMP.T3;
NRF_TEMP->T4 = NRF_FICR->TEMP.T4;
}
+
+ /* Workaround for Errata 108 "RAM: RAM content cannot be trusted upon waking up from System ON Idle or System OFF mode" found at the Errata document
+ for your device located at https://infocenter.nordicsemi.com/ */
+ if (errata_108()){
+ *(volatile uint32_t *)0x40000EE4 = *(volatile uint32_t *)0x10000258 & 0x0000004F;
+ }
/* Enable the FPU if the compiler used floating point unit instructions. __FPU_USED is a MACRO defined by the
* compiler. Since the FPU consumes energy, remember to disable FPU use in the compiler if floating point unit
* operations are not used in your code. */
#if (__FPU_USED == 1)
- SCB->CPACR |= (3UL << 20) | (3UL << 22);
+ SCB->CPACR |= (3UL << 20) | (3UL << 22);
__DSB();
__ISB();
#endif
-
+
/* Configure NFCT pins as GPIOs if NFCT is not to be used in your code. If CONFIG_NFCT_PINS_AS_GPIOS is not defined,
two GPIOs (see Product Specification to see which ones) will be reserved for NFC and will not be available as
normal GPIOs. */
@@ -147,9 +154,9 @@
NVIC_SystemReset();
}
#endif
-
+
/* Configure GPIO pads as pPin Reset pin if Pin Reset capabilities desired. If CONFIG_GPIO_AS_PINRESET is not
- defined, pin reset will not be available. One GPIO (see Product Specification to see which one) will then be
+ defined, pin reset will not be available. One GPIO (see Product Specification to see which one) will then be
reserved for PinReset and not available as normal GPIO. */
#if defined (CONFIG_GPIO_AS_PINRESET)
if (((NRF_UICR->PSELRESET[0] & UICR_PSELRESET_CONNECT_Msk) != (UICR_PSELRESET_CONNECT_Connected << UICR_PSELRESET_CONNECT_Pos)) ||
@@ -165,7 +172,7 @@
NVIC_SystemReset();
}
#endif
-
+
/* Enable SWO trace functionality. If ENABLE_SWO is not defined, SWO pin will be used as GPIO (see Product
Specification to see which one). */
#if defined (ENABLE_SWO)
@@ -173,8 +180,8 @@
NRF_CLOCK->TRACECONFIG |= CLOCK_TRACECONFIG_TRACEMUX_Serial << CLOCK_TRACECONFIG_TRACEMUX_Pos;
NRF_P0->PIN_CNF[18] = (GPIO_PIN_CNF_DRIVE_H0H1 << GPIO_PIN_CNF_DRIVE_Pos) | (GPIO_PIN_CNF_INPUT_Connect << GPIO_PIN_CNF_INPUT_Pos) | (GPIO_PIN_CNF_DIR_Output << GPIO_PIN_CNF_DIR_Pos);
#endif
-
- /* Enable Trace functionality. If ENABLE_TRACE is not defined, TRACE pins will be used as GPIOs (see Product
+
+ /* Enable Trace functionality. If ENABLE_TRACE is not defined, TRACE pins will be used as GPIOs (see Product
Specification to see which ones). */
#if defined (ENABLE_TRACE)
CoreDebug->DEMCR |= CoreDebug_DEMCR_TRCENA_Msk;
@@ -192,10 +199,8 @@
static bool errata_16(void)
{
- if ((((*(uint32_t *)0xF0000FE0) & 0x000000FF) == 0x6) && (((*(uint32_t *)0xF0000FE4) & 0x0000000F) == 0x0))
- {
- if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x30)
- {
+ if ((((*(uint32_t *)0xF0000FE0) & 0x000000FF) == 0x6) && (((*(uint32_t *)0xF0000FE4) & 0x0000000F) == 0x0)){
+ if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x30){
return true;
}
}
@@ -205,18 +210,14 @@
static bool errata_31(void)
{
- if ((((*(uint32_t *)0xF0000FE0) & 0x000000FF) == 0x6) && (((*(uint32_t *)0xF0000FE4) & 0x0000000F) == 0x0))
- {
- if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x30)
- {
+ if ((((*(uint32_t *)0xF0000FE0) & 0x000000FF) == 0x6) && (((*(uint32_t *)0xF0000FE4) & 0x0000000F) == 0x0)){
+ if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x30){
return true;
}
- if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x40)
- {
+ if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x40){
return true;
}
- if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x50)
- {
+ if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x50){
return true;
}
}
@@ -226,10 +227,8 @@
static bool errata_32(void)
{
- if ((((*(uint32_t *)0xF0000FE0) & 0x000000FF) == 0x6) && (((*(uint32_t *)0xF0000FE4) & 0x0000000F) == 0x0))
- {
- if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x30)
- {
+ if ((((*(uint32_t *)0xF0000FE0) & 0x000000FF) == 0x6) && (((*(uint32_t *)0xF0000FE4) & 0x0000000F) == 0x0)){
+ if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x30){
return true;
}
}
@@ -239,18 +238,14 @@
static bool errata_36(void)
{
- if ((((*(uint32_t *)0xF0000FE0) & 0x000000FF) == 0x6) && (((*(uint32_t *)0xF0000FE4) & 0x0000000F) == 0x0))
- {
- if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x30)
- {
+ if ((((*(uint32_t *)0xF0000FE0) & 0x000000FF) == 0x6) && (((*(uint32_t *)0xF0000FE4) & 0x0000000F) == 0x0)){
+ if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x30){
return true;
}
- if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x40)
- {
+ if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x40){
return true;
}
- if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x50)
- {
+ if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x50){
return true;
}
}
@@ -260,10 +255,8 @@
static bool errata_37(void)
{
- if ((((*(uint32_t *)0xF0000FE0) & 0x000000FF) == 0x6) && (((*(uint32_t *)0xF0000FE4) & 0x0000000F) == 0x0))
- {
- if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x30)
- {
+ if ((((*(uint32_t *)0xF0000FE0) & 0x000000FF) == 0x6) && (((*(uint32_t *)0xF0000FE4) & 0x0000000F) == 0x0)){
+ if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x30){
return true;
}
}
@@ -273,10 +266,8 @@
static bool errata_57(void)
{
- if ((((*(uint32_t *)0xF0000FE0) & 0x000000FF) == 0x6) && (((*(uint32_t *)0xF0000FE4) & 0x0000000F) == 0x0))
- {
- if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x30)
- {
+ if ((((*(uint32_t *)0xF0000FE0) & 0x000000FF) == 0x6) && (((*(uint32_t *)0xF0000FE4) & 0x0000000F) == 0x0)){
+ if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x30){
return true;
}
}
@@ -286,10 +277,26 @@
static bool errata_66(void)
{
- if ((((*(uint32_t *)0xF0000FE0) & 0x000000FF) == 0x6) && (((*(uint32_t *)0xF0000FE4) & 0x0000000F) == 0x0))
- {
- if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x50)
- {
+ if ((((*(uint32_t *)0xF0000FE0) & 0x000000FF) == 0x6) && (((*(uint32_t *)0xF0000FE4) & 0x0000000F) == 0x0)){
+ if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x50){
+ return true;
+ }
+ }
+
+ return false;
+}
+
+
+static bool errata_108(void)
+{
+ if ((((*(uint32_t *)0xF0000FE0) & 0x000000FF) == 0x6) && (((*(uint32_t *)0xF0000FE4) & 0x0000000F) == 0x0)){
+ if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x30){
+ return true;
+ }
+ if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x40){
+ return true;
+ }
+ if (((*(uint32_t *)0xF0000FE8) & 0x000000F0) == 0x50){
return true;
}
}