diff options
author | Lokesh Vutla <lokeshvutla@ti.com> | 2019-09-04 16:01:31 +0530 |
---|---|---|
committer | Tom Rini <trini@konsulko.com> | 2019-10-11 10:07:34 -0400 |
commit | 81e39fbd9251bfbef3bc156735e95b67cd7a828f (patch) | |
tree | e5b8fa24f4dab9809992280ddb9f7c11c08ea40a /test | |
parent | 856c0ad413f52d20963ef6b0fe982a0ca91086f2 (diff) | |
download | u-boot-81e39fbd9251bfbef3bc156735e95b67cd7a828f.tar.gz |
remoteproc: elf_loader: Introduce rproc_elf_get_boot_addr() api
Introduce rproc_elf_get_boot_addr() that returns the entry point of
the elf file. This api auto detects the 64/32 bit elf file and returns
the boot addr accordingly.
Signed-off-by: Lokesh Vutla <lokeshvutla@ti.com>
Diffstat (limited to 'test')
-rw-r--r-- | test/dm/remoteproc.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/test/dm/remoteproc.c b/test/dm/remoteproc.c index c77361c8f4..1d9a9b32d5 100644 --- a/test/dm/remoteproc.c +++ b/test/dm/remoteproc.c @@ -174,6 +174,8 @@ static int dm_test_remoteproc_elf(struct unit_test_state *uts) /* Load firmware in loaded_firmware, and verify it */ ut_assertok(rproc_elf32_load_image(dev, (ulong)valid_elf32, size)); ut_assertok(memcmp(loaded_firmware, valid_elf32, loaded_firmware_size)); + ut_asserteq(rproc_elf_get_boot_addr(dev, (unsigned long)valid_elf32), + 0x08000000); unmap_physmem(loaded_firmware, MAP_NOCACHE); /* Invalid ELF Magic */ |