2019-05-31 13:11:33 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0+ OR BSD-3-Clause
|
|
|
|
/*
|
|
|
|
* Copyright (C) 2019, STMicroelectronics - All Rights Reserved
|
|
|
|
*/
|
|
|
|
#include <common.h>
|
2019-11-14 19:57:39 +00:00
|
|
|
#include <cpu_func.h>
|
2019-05-31 13:11:33 +00:00
|
|
|
#include <dm.h>
|
|
|
|
#include <elf.h>
|
2020-05-10 17:40:05 +00:00
|
|
|
#include <log.h>
|
2019-05-31 13:11:33 +00:00
|
|
|
#include <remoteproc.h>
|
2020-05-10 17:39:56 +00:00
|
|
|
#include <asm/cache.h>
|
2020-02-03 14:36:16 +00:00
|
|
|
#include <dm/device_compat.h>
|
|
|
|
#include <linux/compat.h>
|
2019-05-31 13:11:33 +00:00
|
|
|
|
2019-10-30 13:38:28 +00:00
|
|
|
/**
|
|
|
|
* struct resource_table - firmware resource table header
|
|
|
|
* @ver: version number
|
|
|
|
* @num: number of resource entries
|
|
|
|
* @reserved: reserved (must be zero)
|
|
|
|
* @offset: array of offsets pointing at the various resource entries
|
|
|
|
*
|
|
|
|
* A resource table is essentially a list of system resources required
|
|
|
|
* by the remote processor. It may also include configuration entries.
|
|
|
|
* If needed, the remote processor firmware should contain this table
|
|
|
|
* as a dedicated ".resource_table" ELF section.
|
|
|
|
*
|
|
|
|
* Some resources entries are mere announcements, where the host is informed
|
|
|
|
* of specific remoteproc configuration. Other entries require the host to
|
|
|
|
* do something (e.g. allocate a system resource). Sometimes a negotiation
|
|
|
|
* is expected, where the firmware requests a resource, and once allocated,
|
|
|
|
* the host should provide back its details (e.g. address of an allocated
|
|
|
|
* memory region).
|
|
|
|
*
|
|
|
|
* The header of the resource table, as expressed by this structure,
|
|
|
|
* contains a version number (should we need to change this format in the
|
|
|
|
* future), the number of available resource entries, and their offsets
|
|
|
|
* in the table.
|
|
|
|
*
|
|
|
|
* Immediately following this header are the resource entries themselves.
|
|
|
|
*/
|
|
|
|
struct resource_table {
|
|
|
|
u32 ver;
|
|
|
|
u32 num;
|
|
|
|
u32 reserved[2];
|
|
|
|
u32 offset[0];
|
|
|
|
} __packed;
|
|
|
|
|
2019-05-31 13:11:33 +00:00
|
|
|
/* Basic function to verify ELF32 image format */
|
|
|
|
int rproc_elf32_sanity_check(ulong addr, ulong size)
|
|
|
|
{
|
|
|
|
Elf32_Ehdr *ehdr;
|
|
|
|
char class;
|
|
|
|
|
|
|
|
if (!addr) {
|
|
|
|
pr_debug("Invalid fw address?\n");
|
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (size < sizeof(Elf32_Ehdr)) {
|
|
|
|
pr_debug("Image is too small\n");
|
|
|
|
return -ENOSPC;
|
|
|
|
}
|
|
|
|
|
|
|
|
ehdr = (Elf32_Ehdr *)addr;
|
|
|
|
class = ehdr->e_ident[EI_CLASS];
|
|
|
|
|
|
|
|
if (!IS_ELF(*ehdr) || ehdr->e_type != ET_EXEC || class != ELFCLASS32) {
|
|
|
|
pr_debug("Not an executable ELF32 image\n");
|
|
|
|
return -EPROTONOSUPPORT;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* We assume the firmware has the same endianness as the host */
|
|
|
|
# ifdef __LITTLE_ENDIAN
|
|
|
|
if (ehdr->e_ident[EI_DATA] != ELFDATA2LSB) {
|
|
|
|
# else /* BIG ENDIAN */
|
|
|
|
if (ehdr->e_ident[EI_DATA] != ELFDATA2MSB) {
|
|
|
|
# endif
|
|
|
|
pr_debug("Unsupported firmware endianness\n");
|
|
|
|
return -EILSEQ;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (size < ehdr->e_shoff + sizeof(Elf32_Shdr)) {
|
|
|
|
pr_debug("Image is too small\n");
|
|
|
|
return -ENOSPC;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (memcmp(ehdr->e_ident, ELFMAG, SELFMAG)) {
|
|
|
|
pr_debug("Image is corrupted (bad magic)\n");
|
|
|
|
return -EBADF;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ehdr->e_phnum == 0) {
|
|
|
|
pr_debug("No loadable segments\n");
|
|
|
|
return -ENOEXEC;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ehdr->e_phoff > size) {
|
|
|
|
pr_debug("Firmware size is too small\n");
|
|
|
|
return -ENOSPC;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-09-04 10:31:29 +00:00
|
|
|
/* Basic function to verify ELF64 image format */
|
|
|
|
int rproc_elf64_sanity_check(ulong addr, ulong size)
|
|
|
|
{
|
|
|
|
Elf64_Ehdr *ehdr = (Elf64_Ehdr *)addr;
|
|
|
|
char class;
|
|
|
|
|
|
|
|
if (!addr) {
|
|
|
|
pr_debug("Invalid fw address?\n");
|
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (size < sizeof(Elf64_Ehdr)) {
|
|
|
|
pr_debug("Image is too small\n");
|
|
|
|
return -ENOSPC;
|
|
|
|
}
|
|
|
|
|
|
|
|
class = ehdr->e_ident[EI_CLASS];
|
|
|
|
|
|
|
|
if (!IS_ELF(*ehdr) || ehdr->e_type != ET_EXEC || class != ELFCLASS64) {
|
|
|
|
pr_debug("Not an executable ELF64 image\n");
|
|
|
|
return -EPROTONOSUPPORT;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* We assume the firmware has the same endianness as the host */
|
|
|
|
# ifdef __LITTLE_ENDIAN
|
|
|
|
if (ehdr->e_ident[EI_DATA] != ELFDATA2LSB) {
|
|
|
|
# else /* BIG ENDIAN */
|
|
|
|
if (ehdr->e_ident[EI_DATA] != ELFDATA2MSB) {
|
|
|
|
# endif
|
|
|
|
pr_debug("Unsupported firmware endianness\n");
|
|
|
|
return -EILSEQ;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (size < ehdr->e_shoff + sizeof(Elf64_Shdr)) {
|
|
|
|
pr_debug("Image is too small\n");
|
|
|
|
return -ENOSPC;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (memcmp(ehdr->e_ident, ELFMAG, SELFMAG)) {
|
|
|
|
pr_debug("Image is corrupted (bad magic)\n");
|
|
|
|
return -EBADF;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ehdr->e_phnum == 0) {
|
|
|
|
pr_debug("No loadable segments\n");
|
|
|
|
return -ENOEXEC;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ehdr->e_phoff > size) {
|
|
|
|
pr_debug("Firmware size is too small\n");
|
|
|
|
return -ENOSPC;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-09-04 10:31:28 +00:00
|
|
|
int rproc_elf32_load_image(struct udevice *dev, unsigned long addr, ulong size)
|
2019-05-31 13:11:33 +00:00
|
|
|
{
|
|
|
|
Elf32_Ehdr *ehdr; /* Elf header structure pointer */
|
|
|
|
Elf32_Phdr *phdr; /* Program header structure pointer */
|
|
|
|
const struct dm_rproc_ops *ops;
|
2019-09-04 10:31:28 +00:00
|
|
|
unsigned int i, ret;
|
|
|
|
|
|
|
|
ret = rproc_elf32_sanity_check(addr, size);
|
|
|
|
if (ret) {
|
|
|
|
dev_err(dev, "Invalid ELF32 Image %d\n", ret);
|
|
|
|
return ret;
|
|
|
|
}
|
2019-05-31 13:11:33 +00:00
|
|
|
|
|
|
|
ehdr = (Elf32_Ehdr *)addr;
|
|
|
|
phdr = (Elf32_Phdr *)(addr + ehdr->e_phoff);
|
|
|
|
|
|
|
|
ops = rproc_get_ops(dev);
|
|
|
|
|
|
|
|
/* Load each program header */
|
2019-09-04 07:53:22 +00:00
|
|
|
for (i = 0; i < ehdr->e_phnum; i++, phdr++) {
|
2019-05-31 13:11:33 +00:00
|
|
|
void *dst = (void *)(uintptr_t)phdr->p_paddr;
|
|
|
|
void *src = (void *)addr + phdr->p_offset;
|
|
|
|
|
|
|
|
if (phdr->p_type != PT_LOAD)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (ops->device_to_virt)
|
2019-09-04 10:31:27 +00:00
|
|
|
dst = ops->device_to_virt(dev, (ulong)dst,
|
|
|
|
phdr->p_memsz);
|
2019-05-31 13:11:33 +00:00
|
|
|
|
|
|
|
dev_dbg(dev, "Loading phdr %i to 0x%p (%i bytes)\n",
|
|
|
|
i, dst, phdr->p_filesz);
|
|
|
|
if (phdr->p_filesz)
|
|
|
|
memcpy(dst, src, phdr->p_filesz);
|
|
|
|
if (phdr->p_filesz != phdr->p_memsz)
|
|
|
|
memset(dst + phdr->p_filesz, 0x00,
|
|
|
|
phdr->p_memsz - phdr->p_filesz);
|
|
|
|
flush_cache(rounddown((unsigned long)dst, ARCH_DMA_MINALIGN),
|
|
|
|
roundup((unsigned long)dst + phdr->p_filesz,
|
|
|
|
ARCH_DMA_MINALIGN) -
|
|
|
|
rounddown((unsigned long)dst, ARCH_DMA_MINALIGN));
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2019-09-04 10:31:29 +00:00
|
|
|
|
|
|
|
int rproc_elf64_load_image(struct udevice *dev, ulong addr, ulong size)
|
|
|
|
{
|
|
|
|
const struct dm_rproc_ops *ops = rproc_get_ops(dev);
|
|
|
|
u64 da, memsz, filesz, offset;
|
|
|
|
Elf64_Ehdr *ehdr;
|
|
|
|
Elf64_Phdr *phdr;
|
|
|
|
int i, ret = 0;
|
|
|
|
void *ptr;
|
|
|
|
|
|
|
|
dev_dbg(dev, "%s: addr = 0x%lx size = 0x%lx\n", __func__, addr, size);
|
|
|
|
|
|
|
|
if (rproc_elf64_sanity_check(addr, size))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
ehdr = (Elf64_Ehdr *)addr;
|
|
|
|
phdr = (Elf64_Phdr *)(addr + (ulong)ehdr->e_phoff);
|
|
|
|
|
|
|
|
/* go through the available ELF segments */
|
|
|
|
for (i = 0; i < ehdr->e_phnum; i++, phdr++) {
|
|
|
|
da = phdr->p_paddr;
|
|
|
|
memsz = phdr->p_memsz;
|
|
|
|
filesz = phdr->p_filesz;
|
|
|
|
offset = phdr->p_offset;
|
|
|
|
|
|
|
|
if (phdr->p_type != PT_LOAD)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
dev_dbg(dev, "%s:phdr: type %d da 0x%llx memsz 0x%llx filesz 0x%llx\n",
|
|
|
|
__func__, phdr->p_type, da, memsz, filesz);
|
|
|
|
|
|
|
|
ptr = (void *)(uintptr_t)da;
|
|
|
|
if (ops->device_to_virt) {
|
|
|
|
ptr = ops->device_to_virt(dev, da, phdr->p_memsz);
|
|
|
|
if (!ptr) {
|
|
|
|
dev_err(dev, "bad da 0x%llx mem 0x%llx\n", da,
|
|
|
|
memsz);
|
|
|
|
ret = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (filesz)
|
|
|
|
memcpy(ptr, (void *)addr + offset, filesz);
|
|
|
|
if (filesz != memsz)
|
|
|
|
memset(ptr + filesz, 0x00, memsz - filesz);
|
|
|
|
|
|
|
|
flush_cache(rounddown((ulong)ptr, ARCH_DMA_MINALIGN),
|
|
|
|
roundup((ulong)ptr + filesz, ARCH_DMA_MINALIGN) -
|
|
|
|
rounddown((ulong)ptr, ARCH_DMA_MINALIGN));
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
2019-09-04 10:31:30 +00:00
|
|
|
|
|
|
|
int rproc_elf_load_image(struct udevice *dev, ulong addr, ulong size)
|
|
|
|
{
|
|
|
|
Elf32_Ehdr *ehdr = (Elf32_Ehdr *)addr;
|
|
|
|
|
|
|
|
if (!addr) {
|
|
|
|
dev_err(dev, "Invalid firmware address\n");
|
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ehdr->e_ident[EI_CLASS] == ELFCLASS64)
|
|
|
|
return rproc_elf64_load_image(dev, addr, size);
|
|
|
|
else
|
|
|
|
return rproc_elf32_load_image(dev, addr, size);
|
|
|
|
}
|
2019-09-04 10:31:31 +00:00
|
|
|
|
|
|
|
static ulong rproc_elf32_get_boot_addr(ulong addr)
|
|
|
|
{
|
|
|
|
Elf32_Ehdr *ehdr = (Elf32_Ehdr *)addr;
|
|
|
|
|
|
|
|
return ehdr->e_entry;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ulong rproc_elf64_get_boot_addr(ulong addr)
|
|
|
|
{
|
|
|
|
Elf64_Ehdr *ehdr = (Elf64_Ehdr *)addr;
|
|
|
|
|
|
|
|
return ehdr->e_entry;
|
|
|
|
}
|
|
|
|
|
|
|
|
ulong rproc_elf_get_boot_addr(struct udevice *dev, ulong addr)
|
|
|
|
{
|
|
|
|
Elf32_Ehdr *ehdr = (Elf32_Ehdr *)addr;
|
|
|
|
|
|
|
|
if (ehdr->e_ident[EI_CLASS] == ELFCLASS64)
|
|
|
|
return rproc_elf64_get_boot_addr(addr);
|
|
|
|
else
|
|
|
|
return rproc_elf32_get_boot_addr(addr);
|
|
|
|
}
|
2019-10-30 13:38:28 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Search for the resource table in an ELF32 image.
|
|
|
|
* Returns the address of the resource table section if found, NULL if there is
|
|
|
|
* no resource table section, or error pointer.
|
|
|
|
*/
|
|
|
|
static Elf32_Shdr *rproc_elf32_find_rsc_table(struct udevice *dev,
|
|
|
|
ulong fw_addr, ulong fw_size)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
unsigned int i;
|
|
|
|
const char *name_table;
|
|
|
|
struct resource_table *table;
|
|
|
|
const u8 *elf_data = (void *)fw_addr;
|
|
|
|
Elf32_Ehdr *ehdr = (Elf32_Ehdr *)fw_addr;
|
|
|
|
Elf32_Shdr *shdr;
|
|
|
|
|
|
|
|
ret = rproc_elf32_sanity_check(fw_addr, fw_size);
|
|
|
|
if (ret) {
|
|
|
|
pr_debug("Invalid ELF32 Image %d\n", ret);
|
|
|
|
return ERR_PTR(ret);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* look for the resource table and handle it */
|
|
|
|
shdr = (Elf32_Shdr *)(elf_data + ehdr->e_shoff);
|
|
|
|
name_table = (const char *)(elf_data +
|
|
|
|
shdr[ehdr->e_shstrndx].sh_offset);
|
|
|
|
|
|
|
|
for (i = 0; i < ehdr->e_shnum; i++, shdr++) {
|
|
|
|
u32 size = shdr->sh_size;
|
|
|
|
u32 offset = shdr->sh_offset;
|
|
|
|
|
|
|
|
if (strcmp(name_table + shdr->sh_name, ".resource_table"))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
table = (struct resource_table *)(elf_data + offset);
|
|
|
|
|
|
|
|
/* make sure we have the entire table */
|
|
|
|
if (offset + size > fw_size) {
|
|
|
|
pr_debug("resource table truncated\n");
|
|
|
|
return ERR_PTR(-ENOSPC);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* make sure table has at least the header */
|
|
|
|
if (sizeof(*table) > size) {
|
|
|
|
pr_debug("header-less resource table\n");
|
|
|
|
return ERR_PTR(-ENOSPC);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* we don't support any version beyond the first */
|
|
|
|
if (table->ver != 1) {
|
|
|
|
pr_debug("unsupported fw ver: %d\n", table->ver);
|
|
|
|
return ERR_PTR(-EPROTONOSUPPORT);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* make sure reserved bytes are zeroes */
|
|
|
|
if (table->reserved[0] || table->reserved[1]) {
|
|
|
|
pr_debug("non zero reserved bytes\n");
|
|
|
|
return ERR_PTR(-EBADF);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* make sure the offsets array isn't truncated */
|
|
|
|
if (table->num * sizeof(table->offset[0]) +
|
|
|
|
sizeof(*table) > size) {
|
|
|
|
pr_debug("resource table incomplete\n");
|
|
|
|
return ERR_PTR(-ENOSPC);
|
|
|
|
}
|
|
|
|
|
|
|
|
return shdr;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Load the resource table from an ELF32 image */
|
|
|
|
int rproc_elf32_load_rsc_table(struct udevice *dev, ulong fw_addr,
|
|
|
|
ulong fw_size, ulong *rsc_addr, ulong *rsc_size)
|
|
|
|
{
|
|
|
|
const struct dm_rproc_ops *ops;
|
|
|
|
Elf32_Shdr *shdr;
|
|
|
|
void *src, *dst;
|
|
|
|
|
|
|
|
shdr = rproc_elf32_find_rsc_table(dev, fw_addr, fw_size);
|
|
|
|
if (!shdr)
|
|
|
|
return -ENODATA;
|
|
|
|
if (IS_ERR(shdr))
|
|
|
|
return PTR_ERR(shdr);
|
|
|
|
|
|
|
|
ops = rproc_get_ops(dev);
|
|
|
|
*rsc_addr = (ulong)shdr->sh_addr;
|
|
|
|
*rsc_size = (ulong)shdr->sh_size;
|
|
|
|
|
|
|
|
src = (void *)fw_addr + shdr->sh_offset;
|
|
|
|
if (ops->device_to_virt)
|
|
|
|
dst = (void *)ops->device_to_virt(dev, *rsc_addr, *rsc_size);
|
|
|
|
else
|
|
|
|
dst = (void *)rsc_addr;
|
|
|
|
|
|
|
|
dev_dbg(dev, "Loading resource table to 0x%8lx (%ld bytes)\n",
|
|
|
|
(ulong)dst, *rsc_size);
|
|
|
|
|
|
|
|
memcpy(dst, src, *rsc_size);
|
|
|
|
flush_cache(rounddown((unsigned long)dst, ARCH_DMA_MINALIGN),
|
|
|
|
roundup((unsigned long)dst + *rsc_size,
|
|
|
|
ARCH_DMA_MINALIGN) -
|
|
|
|
rounddown((unsigned long)dst, ARCH_DMA_MINALIGN));
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Search for the resource table in an ELF64 image.
|
|
|
|
* Returns the address of the resource table section if found, NULL if there is
|
|
|
|
* no resource table section, or error pointer.
|
|
|
|
*/
|
|
|
|
static Elf64_Shdr *rproc_elf64_find_rsc_table(struct udevice *dev,
|
|
|
|
ulong fw_addr, ulong fw_size)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
unsigned int i;
|
|
|
|
const char *name_table;
|
|
|
|
struct resource_table *table;
|
|
|
|
const u8 *elf_data = (void *)fw_addr;
|
|
|
|
Elf64_Ehdr *ehdr = (Elf64_Ehdr *)fw_addr;
|
|
|
|
Elf64_Shdr *shdr;
|
|
|
|
|
|
|
|
ret = rproc_elf64_sanity_check(fw_addr, fw_size);
|
|
|
|
if (ret) {
|
|
|
|
pr_debug("Invalid ELF64 Image %d\n", ret);
|
|
|
|
return ERR_PTR(ret);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* look for the resource table and handle it */
|
|
|
|
shdr = (Elf64_Shdr *)(elf_data + ehdr->e_shoff);
|
|
|
|
name_table = (const char *)(elf_data +
|
|
|
|
shdr[ehdr->e_shstrndx].sh_offset);
|
|
|
|
|
|
|
|
for (i = 0; i < ehdr->e_shnum; i++, shdr++) {
|
|
|
|
u64 size = shdr->sh_size;
|
|
|
|
u64 offset = shdr->sh_offset;
|
|
|
|
|
|
|
|
if (strcmp(name_table + shdr->sh_name, ".resource_table"))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
table = (struct resource_table *)(elf_data + offset);
|
|
|
|
|
|
|
|
/* make sure we have the entire table */
|
|
|
|
if (offset + size > fw_size) {
|
|
|
|
pr_debug("resource table truncated\n");
|
|
|
|
return ERR_PTR(-ENOSPC);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* make sure table has at least the header */
|
|
|
|
if (sizeof(*table) > size) {
|
|
|
|
pr_debug("header-less resource table\n");
|
|
|
|
return ERR_PTR(-ENOSPC);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* we don't support any version beyond the first */
|
|
|
|
if (table->ver != 1) {
|
|
|
|
pr_debug("unsupported fw ver: %d\n", table->ver);
|
|
|
|
return ERR_PTR(-EPROTONOSUPPORT);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* make sure reserved bytes are zeroes */
|
|
|
|
if (table->reserved[0] || table->reserved[1]) {
|
|
|
|
pr_debug("non zero reserved bytes\n");
|
|
|
|
return ERR_PTR(-EBADF);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* make sure the offsets array isn't truncated */
|
|
|
|
if (table->num * sizeof(table->offset[0]) +
|
|
|
|
sizeof(*table) > size) {
|
|
|
|
pr_debug("resource table incomplete\n");
|
|
|
|
return ERR_PTR(-ENOSPC);
|
|
|
|
}
|
|
|
|
|
|
|
|
return shdr;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Load the resource table from an ELF64 image */
|
|
|
|
int rproc_elf64_load_rsc_table(struct udevice *dev, ulong fw_addr,
|
|
|
|
ulong fw_size, ulong *rsc_addr, ulong *rsc_size)
|
|
|
|
{
|
|
|
|
const struct dm_rproc_ops *ops;
|
|
|
|
Elf64_Shdr *shdr;
|
|
|
|
void *src, *dst;
|
|
|
|
|
|
|
|
shdr = rproc_elf64_find_rsc_table(dev, fw_addr, fw_size);
|
|
|
|
if (!shdr)
|
|
|
|
return -ENODATA;
|
|
|
|
if (IS_ERR(shdr))
|
|
|
|
return PTR_ERR(shdr);
|
|
|
|
|
|
|
|
ops = rproc_get_ops(dev);
|
|
|
|
*rsc_addr = (ulong)shdr->sh_addr;
|
|
|
|
*rsc_size = (ulong)shdr->sh_size;
|
|
|
|
|
|
|
|
src = (void *)fw_addr + shdr->sh_offset;
|
|
|
|
if (ops->device_to_virt)
|
|
|
|
dst = (void *)ops->device_to_virt(dev, *rsc_addr, *rsc_size);
|
|
|
|
else
|
|
|
|
dst = (void *)rsc_addr;
|
|
|
|
|
|
|
|
dev_dbg(dev, "Loading resource table to 0x%8lx (%ld bytes)\n",
|
|
|
|
(ulong)dst, *rsc_size);
|
|
|
|
|
|
|
|
memcpy(dst, src, *rsc_size);
|
|
|
|
flush_cache(rounddown((unsigned long)dst, ARCH_DMA_MINALIGN),
|
|
|
|
roundup((unsigned long)dst + *rsc_size,
|
|
|
|
ARCH_DMA_MINALIGN) -
|
|
|
|
rounddown((unsigned long)dst, ARCH_DMA_MINALIGN));
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Load the resource table from an ELF32 or ELF64 image */
|
|
|
|
int rproc_elf_load_rsc_table(struct udevice *dev, ulong fw_addr,
|
|
|
|
ulong fw_size, ulong *rsc_addr, ulong *rsc_size)
|
|
|
|
|
|
|
|
{
|
|
|
|
Elf32_Ehdr *ehdr = (Elf32_Ehdr *)fw_addr;
|
|
|
|
|
|
|
|
if (!fw_addr)
|
|
|
|
return -EFAULT;
|
|
|
|
|
|
|
|
if (ehdr->e_ident[EI_CLASS] == ELFCLASS64)
|
|
|
|
return rproc_elf64_load_rsc_table(dev, fw_addr, fw_size,
|
|
|
|
rsc_addr, rsc_size);
|
|
|
|
else
|
|
|
|
return rproc_elf32_load_rsc_table(dev, fw_addr, fw_size,
|
|
|
|
rsc_addr, rsc_size);
|
|
|
|
}
|