blob: 16e2c496fd45a21274c8c9b0809aa030a2006191 [file] [log] [blame]
Thomas Gleixner1802d0b2019-05-27 08:55:21 +02001// SPDX-License-Identifier: GPL-2.0-only
Sjur Brændeland72854fb2012-07-15 11:25:27 +03002/*
3 * Remote Processor Framework Elf loader
4 *
5 * Copyright (C) 2011 Texas Instruments, Inc.
6 * Copyright (C) 2011 Google, Inc.
7 *
8 * Ohad Ben-Cohen <ohad@wizery.com>
9 * Brian Swetland <swetland@google.com>
10 * Mark Grosen <mgrosen@ti.com>
11 * Fernando Guzman Lugo <fernando.lugo@ti.com>
12 * Suman Anna <s-anna@ti.com>
13 * Robert Tivy <rtivy@ti.com>
14 * Armando Uribe De Leon <x0095078@ti.com>
15 * Sjur Brændeland <sjur.brandeland@stericsson.com>
Sjur Brændeland72854fb2012-07-15 11:25:27 +030016 */
17
18#define pr_fmt(fmt) "%s: " fmt, __func__
19
20#include <linux/module.h>
21#include <linux/firmware.h>
22#include <linux/remoteproc.h>
23#include <linux/elf.h>
24
25#include "remoteproc_internal.h"
Clement Legerf31e3392020-03-02 10:39:00 +010026#include "remoteproc_elf_helpers.h"
Sjur Brændeland72854fb2012-07-15 11:25:27 +030027
28/**
Clement Legerf31e3392020-03-02 10:39:00 +010029 * rproc_elf_sanity_check() - Sanity Check for ELF32/ELF64 firmware image
Sjur Brændeland72854fb2012-07-15 11:25:27 +030030 * @rproc: the remote processor handle
31 * @fw: the ELF firmware image
32 *
Clement Legerf31e3392020-03-02 10:39:00 +010033 * Make sure this fw image is sane (ie a correct ELF32/ELF64 file).
Sjur Brændeland72854fb2012-07-15 11:25:27 +030034 */
Clement Legerf31e3392020-03-02 10:39:00 +010035int rproc_elf_sanity_check(struct rproc *rproc, const struct firmware *fw)
Sjur Brændeland72854fb2012-07-15 11:25:27 +030036{
37 const char *name = rproc->firmware;
38 struct device *dev = &rproc->dev;
Clement Legerf31e3392020-03-02 10:39:00 +010039 /*
40 * Elf files are beginning with the same structure. Thus, to simplify
41 * header parsing, we can use the elf32_hdr one for both elf64 and
42 * elf32.
43 */
Sjur Brændeland72854fb2012-07-15 11:25:27 +030044 struct elf32_hdr *ehdr;
Clement Legerf31e3392020-03-02 10:39:00 +010045 u32 elf_shdr_get_size;
46 u64 phoff, shoff;
Sjur Brændeland72854fb2012-07-15 11:25:27 +030047 char class;
Clement Legerf31e3392020-03-02 10:39:00 +010048 u16 phnum;
Sjur Brændeland72854fb2012-07-15 11:25:27 +030049
50 if (!fw) {
51 dev_err(dev, "failed to load %s\n", name);
52 return -EINVAL;
53 }
54
55 if (fw->size < sizeof(struct elf32_hdr)) {
56 dev_err(dev, "Image is too small\n");
57 return -EINVAL;
58 }
59
60 ehdr = (struct elf32_hdr *)fw->data;
61
Clement Legerf31e3392020-03-02 10:39:00 +010062 if (memcmp(ehdr->e_ident, ELFMAG, SELFMAG)) {
63 dev_err(dev, "Image is corrupted (bad magic)\n");
64 return -EINVAL;
65 }
66
Sjur Brændeland72854fb2012-07-15 11:25:27 +030067 class = ehdr->e_ident[EI_CLASS];
Clement Legerf31e3392020-03-02 10:39:00 +010068 if (class != ELFCLASS32 && class != ELFCLASS64) {
Sjur Brændeland72854fb2012-07-15 11:25:27 +030069 dev_err(dev, "Unsupported class: %d\n", class);
70 return -EINVAL;
71 }
72
Clement Legerf31e3392020-03-02 10:39:00 +010073 if (class == ELFCLASS64 && fw->size < sizeof(struct elf64_hdr)) {
74 dev_err(dev, "elf64 header is too small\n");
75 return -EINVAL;
76 }
77
Masanari Iida9c768202012-11-30 14:10:25 +090078 /* We assume the firmware has the same endianness as the host */
Sjur Brændeland72854fb2012-07-15 11:25:27 +030079# ifdef __LITTLE_ENDIAN
80 if (ehdr->e_ident[EI_DATA] != ELFDATA2LSB) {
81# else /* BIG ENDIAN */
82 if (ehdr->e_ident[EI_DATA] != ELFDATA2MSB) {
83# endif
Masanari Iida9c768202012-11-30 14:10:25 +090084 dev_err(dev, "Unsupported firmware endianness\n");
Sjur Brændeland72854fb2012-07-15 11:25:27 +030085 return -EINVAL;
86 }
87
Clement Legerf31e3392020-03-02 10:39:00 +010088 phoff = elf_hdr_get_e_phoff(class, fw->data);
89 shoff = elf_hdr_get_e_shoff(class, fw->data);
90 phnum = elf_hdr_get_e_phnum(class, fw->data);
91 elf_shdr_get_size = elf_size_of_shdr(class);
92
93 if (fw->size < shoff + elf_shdr_get_size) {
Sjur Brændeland72854fb2012-07-15 11:25:27 +030094 dev_err(dev, "Image is too small\n");
95 return -EINVAL;
96 }
97
Clement Legerf31e3392020-03-02 10:39:00 +010098 if (phnum == 0) {
Sjur Brændeland72854fb2012-07-15 11:25:27 +030099 dev_err(dev, "No loadable segments\n");
100 return -EINVAL;
101 }
102
Clement Legerf31e3392020-03-02 10:39:00 +0100103 if (phoff > fw->size) {
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300104 dev_err(dev, "Firmware size is too small\n");
105 return -EINVAL;
106 }
107
Clement Legerf31e3392020-03-02 10:39:00 +0100108 dev_dbg(dev, "Firmware is an elf%d file\n",
109 class == ELFCLASS32 ? 32 : 64);
110
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300111 return 0;
112}
Clement Legerf31e3392020-03-02 10:39:00 +0100113EXPORT_SYMBOL(rproc_elf_sanity_check);
114
115/**
116 * rproc_elf_sanity_check() - Sanity Check ELF32 firmware image
117 * @rproc: the remote processor handle
118 * @fw: the ELF32 firmware image
119 *
120 * Make sure this fw image is sane.
121 */
122int rproc_elf32_sanity_check(struct rproc *rproc, const struct firmware *fw)
123{
124 int ret = rproc_elf_sanity_check(rproc, fw);
125
126 if (ret)
127 return ret;
128
129 if (fw_elf_get_class(fw) == ELFCLASS32)
130 return 0;
131
132 return -EINVAL;
133}
Clement Leger826c3392020-03-02 10:38:59 +0100134EXPORT_SYMBOL(rproc_elf32_sanity_check);
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300135
136/**
Sjur Brændeland4afc89d2012-06-19 10:08:18 +0300137 * rproc_elf_get_boot_addr() - Get rproc's boot address.
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300138 * @rproc: the remote processor handle
139 * @fw: the ELF firmware image
140 *
141 * This function returns the entry point address of the ELF
142 * image.
143 *
144 * Note that the boot address is not a configurable property of all remote
145 * processors. Some will always boot at a specific hard-coded address.
146 */
Clement Legere4ae4b72020-03-02 10:38:57 +0100147u64 rproc_elf_get_boot_addr(struct rproc *rproc, const struct firmware *fw)
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300148{
Clement Legerf31e3392020-03-02 10:39:00 +0100149 return elf_hdr_get_e_entry(fw_elf_get_class(fw), fw->data);
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300150}
Bjorn Andersson0f21f9c2018-01-05 15:58:01 -0800151EXPORT_SYMBOL(rproc_elf_get_boot_addr);
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300152
153/**
Sjur Brændeland4afc89d2012-06-19 10:08:18 +0300154 * rproc_elf_load_segments() - load firmware segments to memory
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300155 * @rproc: remote processor which will be booted using these fw segments
156 * @fw: the ELF firmware image
157 *
158 * This function loads the firmware segments to memory, where the remote
159 * processor expects them.
160 *
161 * Some remote processors will expect their code and data to be placed
162 * in specific device addresses, and can't have them dynamically assigned.
163 *
164 * We currently support only those kind of remote processors, and expect
165 * the program header's paddr member to contain those addresses. We then go
166 * through the physically contiguous "carveout" memory regions which we
167 * allocated (and mapped) earlier on behalf of the remote processor,
168 * and "translate" device address to kernel addresses, so we can copy the
169 * segments where they are expected.
170 *
171 * Currently we only support remote processors that required carveout
172 * allocations and got them mapped onto their iommus. Some processors
173 * might be different: they might not have iommus, and would prefer to
174 * directly allocate memory for every segment/resource. This is not yet
175 * supported, though.
176 */
Bjorn Andersson0f21f9c2018-01-05 15:58:01 -0800177int rproc_elf_load_segments(struct rproc *rproc, const struct firmware *fw)
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300178{
179 struct device *dev = &rproc->dev;
Clement Legerf31e3392020-03-02 10:39:00 +0100180 const void *ehdr, *phdr;
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300181 int i, ret = 0;
Clement Legerf31e3392020-03-02 10:39:00 +0100182 u16 phnum;
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300183 const u8 *elf_data = fw->data;
Clement Legerf31e3392020-03-02 10:39:00 +0100184 u8 class = fw_elf_get_class(fw);
185 u32 elf_phdr_get_size = elf_size_of_phdr(class);
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300186
Clement Legerf31e3392020-03-02 10:39:00 +0100187 ehdr = elf_data;
188 phnum = elf_hdr_get_e_phnum(class, ehdr);
189 phdr = elf_data + elf_hdr_get_e_phoff(class, ehdr);
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300190
191 /* go through the available ELF segments */
Clement Legerf31e3392020-03-02 10:39:00 +0100192 for (i = 0; i < phnum; i++, phdr += elf_phdr_get_size) {
193 u64 da = elf_phdr_get_p_paddr(class, phdr);
194 u64 memsz = elf_phdr_get_p_memsz(class, phdr);
195 u64 filesz = elf_phdr_get_p_filesz(class, phdr);
196 u64 offset = elf_phdr_get_p_offset(class, phdr);
197 u32 type = elf_phdr_get_p_type(class, phdr);
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300198 void *ptr;
199
Clement Legerf31e3392020-03-02 10:39:00 +0100200 if (type != PT_LOAD)
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300201 continue;
202
Clement Legerf31e3392020-03-02 10:39:00 +0100203 dev_dbg(dev, "phdr: type %d da 0x%llx memsz 0x%llx filesz 0x%llx\n",
204 type, da, memsz, filesz);
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300205
206 if (filesz > memsz) {
Clement Legerf31e3392020-03-02 10:39:00 +0100207 dev_err(dev, "bad phdr filesz 0x%llx memsz 0x%llx\n",
Anna, Suman730f84c2016-08-12 18:42:20 -0500208 filesz, memsz);
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300209 ret = -EINVAL;
210 break;
211 }
212
213 if (offset + filesz > fw->size) {
Clement Legerf31e3392020-03-02 10:39:00 +0100214 dev_err(dev, "truncated fw: need 0x%llx avail 0x%zx\n",
Anna, Suman730f84c2016-08-12 18:42:20 -0500215 offset + filesz, fw->size);
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300216 ret = -EINVAL;
217 break;
218 }
219
Clement Legerf31e3392020-03-02 10:39:00 +0100220 if (!rproc_u64_fit_in_size_t(memsz)) {
221 dev_err(dev, "size (%llx) does not fit in size_t type\n",
222 memsz);
223 ret = -EOVERFLOW;
224 break;
225 }
226
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300227 /* grab the kernel address for this device address */
228 ptr = rproc_da_to_va(rproc, da, memsz);
229 if (!ptr) {
Clement Legerf31e3392020-03-02 10:39:00 +0100230 dev_err(dev, "bad phdr da 0x%llx mem 0x%llx\n", da,
231 memsz);
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300232 ret = -EINVAL;
233 break;
234 }
235
236 /* put the segment where the remote processor expects it */
Clement Legerf31e3392020-03-02 10:39:00 +0100237 if (filesz)
238 memcpy(ptr, elf_data + offset, filesz);
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300239
240 /*
241 * Zero out remaining memory for this segment.
242 *
243 * This isn't strictly required since dma_alloc_coherent already
244 * did this for us. albeit harmless, we may consider removing
245 * this.
246 */
247 if (memsz > filesz)
248 memset(ptr + filesz, 0, memsz - filesz);
249 }
250
Clement Leger8f403352020-03-02 10:39:02 +0100251 if (ret == 0)
252 rproc->elf_class = class;
253
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300254 return ret;
255}
Bjorn Andersson0f21f9c2018-01-05 15:58:01 -0800256EXPORT_SYMBOL(rproc_elf_load_segments);
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300257
Clement Legerf31e3392020-03-02 10:39:00 +0100258static const void *
259find_table(struct device *dev, const struct firmware *fw)
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300260{
Clement Legerf31e3392020-03-02 10:39:00 +0100261 const void *shdr, *name_table_shdr;
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300262 int i;
Sjur Brændelandf665b2c2013-02-21 18:15:33 +0100263 const char *name_table;
264 struct resource_table *table = NULL;
Clement Legerf31e3392020-03-02 10:39:00 +0100265 const u8 *elf_data = (void *)fw->data;
266 u8 class = fw_elf_get_class(fw);
267 size_t fw_size = fw->size;
268 const void *ehdr = elf_data;
269 u16 shnum = elf_hdr_get_e_shnum(class, ehdr);
270 u32 elf_shdr_get_size = elf_size_of_shdr(class);
271 u16 shstrndx = elf_hdr_get_e_shstrndx(class, ehdr);
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300272
Sjur Brændelandf665b2c2013-02-21 18:15:33 +0100273 /* look for the resource table and handle it */
Clement Legerf31e3392020-03-02 10:39:00 +0100274 /* First, get the section header according to the elf class */
275 shdr = elf_data + elf_hdr_get_e_shoff(class, ehdr);
276 /* Compute name table section header entry in shdr array */
277 name_table_shdr = shdr + (shstrndx * elf_shdr_get_size);
278 /* Finally, compute the name table section address in elf */
279 name_table = elf_data + elf_shdr_get_sh_offset(class, name_table_shdr);
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300280
Clement Legerf31e3392020-03-02 10:39:00 +0100281 for (i = 0; i < shnum; i++, shdr += elf_shdr_get_size) {
282 u64 size = elf_shdr_get_sh_size(class, shdr);
283 u64 offset = elf_shdr_get_sh_offset(class, shdr);
284 u32 name = elf_shdr_get_sh_name(class, shdr);
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300285
Clement Legerf31e3392020-03-02 10:39:00 +0100286 if (strcmp(name_table + name, ".resource_table"))
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300287 continue;
288
289 table = (struct resource_table *)(elf_data + offset);
290
291 /* make sure we have the entire table */
Sjur Brændelandf665b2c2013-02-21 18:15:33 +0100292 if (offset + size > fw_size || offset + size < size) {
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300293 dev_err(dev, "resource table truncated\n");
294 return NULL;
295 }
296
297 /* make sure table has at least the header */
298 if (sizeof(struct resource_table) > size) {
299 dev_err(dev, "header-less resource table\n");
300 return NULL;
301 }
302
303 /* we don't support any version beyond the first */
304 if (table->ver != 1) {
305 dev_err(dev, "unsupported fw ver: %d\n", table->ver);
306 return NULL;
307 }
308
309 /* make sure reserved bytes are zeroes */
310 if (table->reserved[0] || table->reserved[1]) {
311 dev_err(dev, "non zero reserved bytes\n");
312 return NULL;
313 }
314
315 /* make sure the offsets array isn't truncated */
Gustavo A. R. Silva77e5a442019-06-07 13:53:14 -0500316 if (struct_size(table, offset, table->num) > size) {
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300317 dev_err(dev, "resource table incomplete\n");
318 return NULL;
319 }
320
Sjur Brændelandf665b2c2013-02-21 18:15:33 +0100321 return shdr;
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300322 }
323
Sjur Brændelandf665b2c2013-02-21 18:15:33 +0100324 return NULL;
325}
326
327/**
Bjorn Andersson58b64092018-01-05 15:58:03 -0800328 * rproc_elf_load_rsc_table() - load the resource table
Sjur Brændelandf665b2c2013-02-21 18:15:33 +0100329 * @rproc: the rproc handle
330 * @fw: the ELF firmware image
Sjur Brændelandf665b2c2013-02-21 18:15:33 +0100331 *
332 * This function finds the resource table inside the remote processor's
Bjorn Andersson58b64092018-01-05 15:58:03 -0800333 * firmware, load it into the @cached_table and update @table_ptr.
Sjur Brændelandf665b2c2013-02-21 18:15:33 +0100334 *
Bjorn Andersson58b64092018-01-05 15:58:03 -0800335 * Return: 0 on success, negative errno on failure.
Sjur Brændelandf665b2c2013-02-21 18:15:33 +0100336 */
Bjorn Andersson58b64092018-01-05 15:58:03 -0800337int rproc_elf_load_rsc_table(struct rproc *rproc, const struct firmware *fw)
Sjur Brændelandf665b2c2013-02-21 18:15:33 +0100338{
Clement Legerf31e3392020-03-02 10:39:00 +0100339 const void *shdr;
Sjur Brændelandf665b2c2013-02-21 18:15:33 +0100340 struct device *dev = &rproc->dev;
341 struct resource_table *table = NULL;
342 const u8 *elf_data = fw->data;
Bjorn Andersson58b64092018-01-05 15:58:03 -0800343 size_t tablesz;
Clement Legerf31e3392020-03-02 10:39:00 +0100344 u8 class = fw_elf_get_class(fw);
345 u64 sh_offset;
Sjur Brændelandf665b2c2013-02-21 18:15:33 +0100346
Clement Legerf31e3392020-03-02 10:39:00 +0100347 shdr = find_table(dev, fw);
Sjur Brændelandf665b2c2013-02-21 18:15:33 +0100348 if (!shdr)
Bjorn Andersson58b64092018-01-05 15:58:03 -0800349 return -EINVAL;
Sjur Brændelandf665b2c2013-02-21 18:15:33 +0100350
Clement Legerf31e3392020-03-02 10:39:00 +0100351 sh_offset = elf_shdr_get_sh_offset(class, shdr);
352 table = (struct resource_table *)(elf_data + sh_offset);
353 tablesz = elf_shdr_get_sh_size(class, shdr);
Sjur Brændelandf665b2c2013-02-21 18:15:33 +0100354
Bjorn Andersson58b64092018-01-05 15:58:03 -0800355 /*
356 * Create a copy of the resource table. When a virtio device starts
357 * and calls vring_new_virtqueue() the address of the allocated vring
358 * will be stored in the cached_table. Before the device is started,
359 * cached_table will be copied into device memory.
360 */
361 rproc->cached_table = kmemdup(table, tablesz, GFP_KERNEL);
362 if (!rproc->cached_table)
363 return -ENOMEM;
364
365 rproc->table_ptr = rproc->cached_table;
366 rproc->table_sz = tablesz;
367
368 return 0;
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300369}
Bjorn Andersson58b64092018-01-05 15:58:03 -0800370EXPORT_SYMBOL(rproc_elf_load_rsc_table);
Sjur Brændeland4afc89d2012-06-19 10:08:18 +0300371
Sjur Brændeland95f95782013-02-21 18:15:34 +0100372/**
373 * rproc_elf_find_loaded_rsc_table() - find the loaded resource table
374 * @rproc: the rproc handle
375 * @fw: the ELF firmware image
376 *
377 * This function finds the location of the loaded resource table. Don't
378 * call this function if the table wasn't loaded yet - it's a bug if you do.
379 *
380 * Returns the pointer to the resource table if it is found or NULL otherwise.
381 * If the table wasn't loaded yet the result is unspecified.
382 */
Bjorn Andersson0f21f9c2018-01-05 15:58:01 -0800383struct resource_table *rproc_elf_find_loaded_rsc_table(struct rproc *rproc,
384 const struct firmware *fw)
Sjur Brændeland95f95782013-02-21 18:15:34 +0100385{
Clement Legerf31e3392020-03-02 10:39:00 +0100386 const void *shdr;
387 u64 sh_addr, sh_size;
388 u8 class = fw_elf_get_class(fw);
389 struct device *dev = &rproc->dev;
Sjur Brændeland95f95782013-02-21 18:15:34 +0100390
Clement Legerf31e3392020-03-02 10:39:00 +0100391 shdr = find_table(&rproc->dev, fw);
Sjur Brændeland95f95782013-02-21 18:15:34 +0100392 if (!shdr)
393 return NULL;
394
Clement Legerf31e3392020-03-02 10:39:00 +0100395 sh_addr = elf_shdr_get_sh_addr(class, shdr);
396 sh_size = elf_shdr_get_sh_size(class, shdr);
397
398 if (!rproc_u64_fit_in_size_t(sh_size)) {
399 dev_err(dev, "size (%llx) does not fit in size_t type\n",
400 sh_size);
401 return NULL;
402 }
403
404 return rproc_da_to_va(rproc, sh_addr, sh_size);
Sjur Brændeland95f95782013-02-21 18:15:34 +0100405}
Bjorn Andersson0f21f9c2018-01-05 15:58:01 -0800406EXPORT_SYMBOL(rproc_elf_find_loaded_rsc_table);