summaryrefslogtreecommitdiff
path: root/test/dm/remoteproc.c
diff options
context:
space:
mode:
authorLokesh Vutla <lokeshvutla@ti.com>2019-09-04 16:01:31 +0530
committerTom Rini <trini@konsulko.com>2019-10-11 10:07:34 -0400
commit81e39fbd9251bfbef3bc156735e95b67cd7a828f (patch)
treee5b8fa24f4dab9809992280ddb9f7c11c08ea40a /test/dm/remoteproc.c
parent856c0ad413f52d20963ef6b0fe982a0ca91086f2 (diff)
remoteproc: elf_loader: Introduce rproc_elf_get_boot_addr() api
Introduce rproc_elf_get_boot_addr() that returns the entry point of the elf file. This api auto detects the 64/32 bit elf file and returns the boot addr accordingly. Signed-off-by: Lokesh Vutla <lokeshvutla@ti.com>
Diffstat (limited to 'test/dm/remoteproc.c')
-rw-r--r--test/dm/remoteproc.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/test/dm/remoteproc.c b/test/dm/remoteproc.c
index c77361c8f4..1d9a9b32d5 100644
--- a/test/dm/remoteproc.c
+++ b/test/dm/remoteproc.c
@@ -174,6 +174,8 @@ static int dm_test_remoteproc_elf(struct unit_test_state *uts)
/* Load firmware in loaded_firmware, and verify it */
ut_assertok(rproc_elf32_load_image(dev, (ulong)valid_elf32, size));
ut_assertok(memcmp(loaded_firmware, valid_elf32, loaded_firmware_size));
+ ut_asserteq(rproc_elf_get_boot_addr(dev, (unsigned long)valid_elf32),
+ 0x08000000);
unmap_physmem(loaded_firmware, MAP_NOCACHE);
/* Invalid ELF Magic */