Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp5404522ybv; Tue, 11 Feb 2020 15:13:25 -0800 (PST) X-Google-Smtp-Source: APXvYqwGZNLRn4YP5v0YxBy8I0Uhs6ZG5v33L1zcYrTZYYboZ7GyXhePYW0m4NzE9ZChPGNzKxmo X-Received: by 2002:a54:4418:: with SMTP id k24mr4531889oiw.46.1581462805392; Tue, 11 Feb 2020 15:13:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581462805; cv=none; d=google.com; s=arc-20160816; b=leb3BVjEz9sITtxhw7VXzjibmIH7YR6+PkaTOxph8zdTLmeJuSOjxlX1hru2eLdYCO f/m0dGQE2QXVGCgg/ODTpY5JlSniiMjWL01iyAe7aJWjKUkBsXKSQrjanJ/bmlpSKiHz vkWE3L4Me9P7iFfoTVLcBP8lTJxVuRYF+dH6IFH34xxZ9oRDCvsutuCNGIWi7CX2YbrV 3EnhzJqgbdNCYQ/Yu5alWeDvslLMtYdhzVwrS07r5JdP2YPpBtzV3aWT52KrnpSO403r b9kwfWUZgbYEk44BSyh80OTEobL8SsLJQWNraAkPAOx4PZiaGPvO/TgIxoXJLqW1hNIc ewBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=asxH5rE1mHmxca38giWrHRQ20XhnB22SkpjtANiGhwo=; b=Fht7WoJpM4nN+LRUHP7PjwafYDycgk6djvw7gl269ywUmT7u/bWdTg3kYVDQfiOtMe 2obFjzpTeHHxA8Z8gKDsbl1ryoandO4UD0BOul40UowRJoMjrUjRQiH+k8HTjADvDBf8 BAHqrZXYEjLNS74N/epBSZYHzM6CFrzS/lpxomSruswnmqfSuKSltbBAjkCLRYEpBDZ+ mTxk6ZkBtrXEChwOaBIb0nqKQI535IaS884gxYUgIFNnqKFiRfTq8D5kZmVsAhU3sxuu ItIuQqmcMlHtchDwN4aypWuritXOB2yUtH/HnQFkAWIAv1cgJhaV7j8Khp9hwYozKUiz lyZg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=yz4M8AJn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a17si2695492otp.236.2020.02.11.15.13.13; Tue, 11 Feb 2020 15:13:25 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=yz4M8AJn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727874AbgBKXNA (ORCPT + 99 others); Tue, 11 Feb 2020 18:13:00 -0500 Received: from mail-yb1-f193.google.com ([209.85.219.193]:42235 "EHLO mail-yb1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727770AbgBKXM7 (ORCPT ); Tue, 11 Feb 2020 18:12:59 -0500 Received: by mail-yb1-f193.google.com with SMTP id z125so6270066ybf.9 for ; Tue, 11 Feb 2020 15:12:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=asxH5rE1mHmxca38giWrHRQ20XhnB22SkpjtANiGhwo=; b=yz4M8AJnylgO83dqd5cHyCjYaG5DRQ4oA07sMnefBQQQRRBCvVJY+osWsi+9Nu03Ym Nd18a44FRrJAJZ8GtRwQxwQpmiKD3/0GcxsgtiKJ50Oju6HP+mnhBMLqOxFNVrA6OJWt XSebUd/CBV4Y5UMZsn9YFteKAlIMCXiRs740o+q3oOGzk5H5nUFVQcxvtaqcZCrJXyZ4 BSLVbiNVuufPe1A+TwmfZFeG7PX4HQvLeCsHqB47yQI69ky0//yxUSf9DnwZBJ+lktSw OQwg05nLXKwaryExroWR4AWqlmEVCxSUAH7YtiRHXA+t3Rb0xlAw3HW1Cr/74HddoJab zl+w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=asxH5rE1mHmxca38giWrHRQ20XhnB22SkpjtANiGhwo=; b=c+b8CY5/vvhlZp3AIVRtBmo7G7ydk1YgH+ptlx4mYVpFAM1k8cmrsylMI5mzDLpTb9 mg//hFIx6UOm/QTb90njUjOwEroOaWEVO2L5DKHCBgDmsiAJHgGHWKucIkXiBvc0d/NW uA0jzat9VTlcBgfWKIxZqW4L40fN+SEKUUB0CMxLNKQXd1yXGTabphKpOYlI0bv03tTX 8gurnI1ZqF2f1p1VrZAse1o/+L7enNGmJ6zkFYnYk62aZSkF1H6RX7fR2d9XkVRP3ZIz su7noiEVqeIT+r2Bk+kyvx347VJ+71OqHDOBrfI5WJIWe/wSxJYZtk0umnrumBI27/Au 1vcw== X-Gm-Message-State: APjAAAXBUK9IhbVlhSytpDVJcFyyGee94fQZyP8RRgL4zP08MPL5WPEC R0NutcTsqZR3QS4hgHV8plQqPw== X-Received: by 2002:a05:6902:526:: with SMTP id y6mr1973370ybs.132.1581462777524; Tue, 11 Feb 2020 15:12:57 -0800 (PST) Received: from xps15 (S0106002369de4dac.cg.shawcable.net. [68.147.8.254]) by smtp.gmail.com with ESMTPSA id s31sm2597687ywa.30.2020.02.11.15.12.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 11 Feb 2020 15:12:56 -0800 (PST) Date: Tue, 11 Feb 2020 16:12:53 -0700 From: Mathieu Poirier To: Arnaud POULIQUEN Cc: Clement Leger , Ohad Ben-Cohen , Bjorn Andersson , Jonathan Corbet , Shawn Guo , Sascha Hauer , linux-remoteproc@vger.kernel.org, Pengutronix Kernel Team , Fabio Estevam , NXP Linux Team , Andy Gross , Patrice Chotard , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-arm-msm@vger.kernel.org, Loic PALLARDY , s-anna Subject: Re: [PATCH v4 0/5] remoteproc: Add elf64 support Message-ID: <20200211231253.GC27770@xps15> References: <527785289.2852303.1581062223707.JavaMail.zimbra@kalray.eu> <20200210162209.23149-1-cleger@kalray.eu> <5b8045be-0942-2ecf-5dba-dad58071f6af@st.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5b8045be-0942-2ecf-5dba-dad58071f6af@st.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 11, 2020 at 04:57:18PM +0100, Arnaud POULIQUEN wrote: > Hi Clement, > > I tested the series on the stm32 platform for remote proc firmwre load: no regression found. > I do not test the da_to_va feature as not implemented on stm32 platform. It would be very interesting if you could test the coredump, that would give us a lot more confidence in the implementation. Thanks, Mathieu > > Regards, > Arnaud > > > > On 2/10/20 5:22 PM, Clement Leger wrote: > > This serie add support for elf64 in remoteproc (elf loader, coredump). > > First two patches modifies the type of len argument (in da_to_va) and > > boot_addr in order to allow loading elf64 segment with a u64 size > > and a u64 entry point. > > Next patch introduce a set of macros to access elf64 and elf32 > > transparently. > > Last two patches are the actual modification in the elf loader and > > remoteproc coredump support to add elf64 support. > > > > Changes from V3: > > - Adapt coredump to elf64 file format > > - Rename remoteproc_elf_loader.h to remoteproc_elf_helpers.h > > - Update copyright year in remoteproc_elf_helpers.h > > - Rename macros elf_hdr_* to elf_get_hdr_* for coherency with elf_hdr_set_* > > - Split elf64 loader patch in 3: > > - boot_addr u64 change > > - remoteproc_elf_helpers.h creation > > - elf64 loading > > > > Clement Leger (5): > > remoteproc: Use u64 len for da_to_va > > remoteproc: Use u64 type for boot_addr > > remoteproc: Add elf helpers to access elf64 and elf32 fields > > remoteproc: Add elf64 support in elf loader > > remoteproc: Adapt coredump to generate correct elf type > > > > Documentation/remoteproc.txt | 2 +- > > drivers/remoteproc/imx_rproc.c | 11 +- > > drivers/remoteproc/keystone_remoteproc.c | 4 +- > > drivers/remoteproc/qcom_q6v5_adsp.c | 2 +- > > drivers/remoteproc/qcom_q6v5_mss.c | 2 +- > > drivers/remoteproc/qcom_q6v5_pas.c | 2 +- > > drivers/remoteproc/qcom_q6v5_wcss.c | 2 +- > > drivers/remoteproc/qcom_wcnss.c | 2 +- > > drivers/remoteproc/remoteproc_core.c | 69 +++++++------ > > drivers/remoteproc/remoteproc_elf_helpers.h | 95 ++++++++++++++++++ > > drivers/remoteproc/remoteproc_elf_loader.c | 150 ++++++++++++++++++---------- > > drivers/remoteproc/remoteproc_internal.h | 4 +- > > drivers/remoteproc/st_remoteproc.c | 2 +- > > drivers/remoteproc/st_slim_rproc.c | 4 +- > > drivers/remoteproc/wkup_m3_rproc.c | 4 +- > > include/linux/remoteproc.h | 7 +- > > 16 files changed, 252 insertions(+), 110 deletions(-) > > create mode 100644 drivers/remoteproc/remoteproc_elf_helpers.h > >