2006-04-23 19:12:42 +02:00
|
|
|
/*
|
|
|
|
* QEMU Executable loader
|
2007-09-16 23:08:06 +02:00
|
|
|
*
|
2006-04-23 19:12:42 +02:00
|
|
|
* Copyright (c) 2006 Fabrice Bellard
|
2007-09-16 23:08:06 +02:00
|
|
|
*
|
2006-04-23 19:12:42 +02:00
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
* of this software and associated documentation files (the "Software"), to deal
|
|
|
|
* in the Software without restriction, including without limitation the rights
|
|
|
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
* copies of the Software, and to permit persons to whom the Software is
|
|
|
|
* furnished to do so, subject to the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be included in
|
|
|
|
* all copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
|
|
|
* THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
|
|
* THE SOFTWARE.
|
2008-11-20 23:04:01 +01:00
|
|
|
*
|
|
|
|
* Gunzip functionality in this file is derived from u-boot:
|
|
|
|
*
|
|
|
|
* (C) Copyright 2008 Semihalf
|
|
|
|
*
|
|
|
|
* (C) Copyright 2000-2005
|
|
|
|
* Wolfgang Denk, DENX Software Engineering, wd@denx.de.
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License as
|
|
|
|
* published by the Free Software Foundation; either version 2 of
|
|
|
|
* the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
2009-01-04 23:05:52 +01:00
|
|
|
* You should have received a copy of the GNU General Public License along
|
2009-07-16 22:47:01 +02:00
|
|
|
* with this program; if not, see <http://www.gnu.org/licenses/>.
|
2006-04-23 19:12:42 +02:00
|
|
|
*/
|
2008-11-20 23:04:01 +01:00
|
|
|
|
2016-01-26 19:17:29 +01:00
|
|
|
#include "qemu/osdep.h"
|
2020-10-28 12:36:57 +01:00
|
|
|
#include "qemu/datadir.h"
|
include/qemu/osdep.h: Don't include qapi/error.h
Commit 57cb38b included qapi/error.h into qemu/osdep.h to get the
Error typedef. Since then, we've moved to include qemu/osdep.h
everywhere. Its file comment explains: "To avoid getting into
possible circular include dependencies, this file should not include
any other QEMU headers, with the exceptions of config-host.h,
compiler.h, os-posix.h and os-win32.h, all of which are doing a
similar job to this file and are under similar constraints."
qapi/error.h doesn't do a similar job, and it doesn't adhere to
similar constraints: it includes qapi-types.h. That's in excess of
100KiB of crap most .c files don't actually need.
Add the typedef to qemu/typedefs.h, and include that instead of
qapi/error.h. Include qapi/error.h in .c files that need it and don't
get it now. Include qapi-types.h in qom/object.h for uint16List.
Update scripts/clean-includes accordingly. Update it further to match
reality: replace config.h by config-target.h, add sysemu/os-posix.h,
sysemu/os-win32.h. Update the list of includes in the qemu/osdep.h
comment quoted above similarly.
This reduces the number of objects depending on qapi/error.h from "all
of them" to less than a third. Unfortunately, the number depending on
qapi-types.h shrinks only a little. More work is needed for that one.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
[Fix compilation without the spice devel packages. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-03-14 09:01:28 +01:00
|
|
|
#include "qapi/error.h"
|
2021-09-08 11:35:43 +02:00
|
|
|
#include "qapi/qapi-commands-machine.h"
|
|
|
|
#include "qapi/type-helpers.h"
|
2019-06-13 07:09:37 +02:00
|
|
|
#include "trace.h"
|
2013-02-04 15:40:22 +01:00
|
|
|
#include "hw/hw.h"
|
2012-10-24 11:12:21 +02:00
|
|
|
#include "disas/disas.h"
|
2019-08-12 07:23:45 +02:00
|
|
|
#include "migration/vmstate.h"
|
2012-12-17 18:19:49 +01:00
|
|
|
#include "monitor/monitor.h"
|
2019-08-12 07:23:38 +02:00
|
|
|
#include "sysemu/reset.h"
|
2012-12-17 18:20:04 +01:00
|
|
|
#include "sysemu/sysemu.h"
|
2013-03-18 17:36:02 +01:00
|
|
|
#include "uboot_image.h"
|
2013-02-04 15:40:22 +01:00
|
|
|
#include "hw/loader.h"
|
2013-02-05 17:06:20 +01:00
|
|
|
#include "hw/nvram/fw_cfg.h"
|
2012-12-17 18:19:49 +01:00
|
|
|
#include "exec/memory.h"
|
2015-12-01 23:58:08 +01:00
|
|
|
#include "hw/boards.h"
|
2016-03-20 18:16:19 +01:00
|
|
|
#include "qemu/cutils.h"
|
2019-04-08 10:42:13 +02:00
|
|
|
#include "sysemu/runstate.h"
|
2006-04-23 19:12:42 +02:00
|
|
|
|
2008-11-20 23:04:01 +01:00
|
|
|
#include <zlib.h>
|
|
|
|
|
2009-11-11 19:17:24 +01:00
|
|
|
static int roms_loaded;
|
|
|
|
|
2006-04-23 19:12:42 +02:00
|
|
|
/* return the size or -1 if error */
|
2018-09-13 12:07:13 +02:00
|
|
|
int64_t get_image_size(const char *filename)
|
2006-04-23 19:12:42 +02:00
|
|
|
{
|
2018-09-13 12:07:13 +02:00
|
|
|
int fd;
|
|
|
|
int64_t size;
|
2006-04-23 19:12:42 +02:00
|
|
|
fd = open(filename, O_RDONLY | O_BINARY);
|
|
|
|
if (fd < 0)
|
|
|
|
return -1;
|
|
|
|
size = lseek(fd, 0, SEEK_END);
|
|
|
|
close(fd);
|
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
2014-07-21 05:02:03 +02:00
|
|
|
/* return the size or -1 if error */
|
|
|
|
ssize_t load_image_size(const char *filename, void *addr, size_t size)
|
|
|
|
{
|
|
|
|
int fd;
|
2019-01-17 13:49:02 +01:00
|
|
|
ssize_t actsize, l = 0;
|
2014-07-21 05:02:03 +02:00
|
|
|
|
|
|
|
fd = open(filename, O_RDONLY | O_BINARY);
|
|
|
|
if (fd < 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2019-01-17 13:49:02 +01:00
|
|
|
while ((actsize = read(fd, addr + l, size - l)) > 0) {
|
|
|
|
l += actsize;
|
2014-07-21 05:02:03 +02:00
|
|
|
}
|
2019-01-17 13:49:02 +01:00
|
|
|
|
2014-07-21 05:02:03 +02:00
|
|
|
close(fd);
|
|
|
|
|
2019-01-17 13:49:02 +01:00
|
|
|
return actsize < 0 ? -1 : l;
|
2014-07-21 05:02:03 +02:00
|
|
|
}
|
|
|
|
|
2008-05-12 19:22:13 +02:00
|
|
|
/* read()-like version */
|
2011-11-16 19:41:56 +01:00
|
|
|
ssize_t read_targphys(const char *name,
|
2012-10-23 12:30:10 +02:00
|
|
|
int fd, hwaddr dst_addr, size_t nbytes)
|
2008-05-12 19:22:13 +02:00
|
|
|
{
|
2009-10-01 16:42:33 +02:00
|
|
|
uint8_t *buf;
|
2011-11-16 19:41:56 +01:00
|
|
|
ssize_t did;
|
2009-10-01 16:42:33 +02:00
|
|
|
|
2011-08-21 05:09:37 +02:00
|
|
|
buf = g_malloc(nbytes);
|
2009-10-01 16:42:33 +02:00
|
|
|
did = read(fd, buf, nbytes);
|
|
|
|
if (did > 0)
|
|
|
|
rom_add_blob_fixed("read", buf, did, dst_addr);
|
2011-08-21 05:09:37 +02:00
|
|
|
g_free(buf);
|
2009-10-01 16:42:33 +02:00
|
|
|
return did;
|
2008-05-12 19:22:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
int load_image_targphys(const char *filename,
|
2012-10-23 12:30:10 +02:00
|
|
|
hwaddr addr, uint64_t max_sz)
|
2016-09-22 19:13:08 +02:00
|
|
|
{
|
|
|
|
return load_image_targphys_as(filename, addr, max_sz, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* return the size or -1 if error */
|
|
|
|
int load_image_targphys_as(const char *filename,
|
|
|
|
hwaddr addr, uint64_t max_sz, AddressSpace *as)
|
2008-05-12 19:22:13 +02:00
|
|
|
{
|
2009-10-01 16:42:33 +02:00
|
|
|
int size;
|
2008-05-12 19:22:13 +02:00
|
|
|
|
2009-10-01 16:42:33 +02:00
|
|
|
size = get_image_size(filename);
|
2017-07-27 04:42:07 +02:00
|
|
|
if (size < 0 || size > max_sz) {
|
2012-01-11 20:46:20 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (size > 0) {
|
2017-06-23 18:45:56 +02:00
|
|
|
if (rom_add_file_fixed_as(filename, addr, -1, as) < 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
2012-01-11 20:46:20 +01:00
|
|
|
}
|
2009-10-01 16:42:33 +02:00
|
|
|
return size;
|
2008-05-12 19:22:13 +02:00
|
|
|
}
|
|
|
|
|
2016-03-04 12:30:17 +01:00
|
|
|
int load_image_mr(const char *filename, MemoryRegion *mr)
|
|
|
|
{
|
|
|
|
int size;
|
|
|
|
|
|
|
|
if (!memory_access_is_direct(mr, false)) {
|
|
|
|
/* Can only load an image into RAM or ROM */
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
size = get_image_size(filename);
|
|
|
|
|
2017-07-27 04:42:07 +02:00
|
|
|
if (size < 0 || size > memory_region_size(mr)) {
|
2016-03-04 12:30:17 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (size > 0) {
|
|
|
|
if (rom_add_file_mr(filename, mr, -1) < 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
2012-10-23 12:30:10 +02:00
|
|
|
void pstrcpy_targphys(const char *name, hwaddr dest, int buf_size,
|
2008-05-12 19:22:13 +02:00
|
|
|
const char *source)
|
|
|
|
{
|
|
|
|
const char *nulp;
|
2009-10-07 13:37:06 +02:00
|
|
|
char *ptr;
|
2008-05-12 19:22:13 +02:00
|
|
|
|
|
|
|
if (buf_size <= 0) return;
|
|
|
|
nulp = memchr(source, 0, buf_size);
|
|
|
|
if (nulp) {
|
2009-10-07 13:37:06 +02:00
|
|
|
rom_add_blob_fixed(name, source, (nulp - source) + 1, dest);
|
2008-05-12 19:22:13 +02:00
|
|
|
} else {
|
2009-10-07 13:37:06 +02:00
|
|
|
rom_add_blob_fixed(name, source, buf_size, dest);
|
2018-06-26 11:35:40 +02:00
|
|
|
ptr = rom_ptr(dest + buf_size - 1, sizeof(*ptr));
|
2009-10-07 13:37:06 +02:00
|
|
|
*ptr = 0;
|
2008-05-12 19:22:13 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-04-23 19:12:42 +02:00
|
|
|
/* A.OUT loader */
|
|
|
|
|
|
|
|
struct exec
|
|
|
|
{
|
|
|
|
uint32_t a_info; /* Use macros N_MAGIC, etc for access */
|
|
|
|
uint32_t a_text; /* length of text, in bytes */
|
|
|
|
uint32_t a_data; /* length of data, in bytes */
|
|
|
|
uint32_t a_bss; /* length of uninitialized data area, in bytes */
|
|
|
|
uint32_t a_syms; /* length of symbol table data in file, in bytes */
|
|
|
|
uint32_t a_entry; /* start address */
|
|
|
|
uint32_t a_trsize; /* length of relocation info for text, in bytes */
|
|
|
|
uint32_t a_drsize; /* length of relocation info for data, in bytes */
|
|
|
|
};
|
|
|
|
|
|
|
|
static void bswap_ahdr(struct exec *e)
|
|
|
|
{
|
|
|
|
bswap32s(&e->a_info);
|
|
|
|
bswap32s(&e->a_text);
|
|
|
|
bswap32s(&e->a_data);
|
|
|
|
bswap32s(&e->a_bss);
|
|
|
|
bswap32s(&e->a_syms);
|
|
|
|
bswap32s(&e->a_entry);
|
|
|
|
bswap32s(&e->a_trsize);
|
|
|
|
bswap32s(&e->a_drsize);
|
|
|
|
}
|
|
|
|
|
|
|
|
#define N_MAGIC(exec) ((exec).a_info & 0xffff)
|
|
|
|
#define OMAGIC 0407
|
|
|
|
#define NMAGIC 0410
|
|
|
|
#define ZMAGIC 0413
|
|
|
|
#define QMAGIC 0314
|
|
|
|
#define _N_HDROFF(x) (1024 - sizeof (struct exec))
|
|
|
|
#define N_TXTOFF(x) \
|
|
|
|
(N_MAGIC(x) == ZMAGIC ? _N_HDROFF((x)) + sizeof (struct exec) : \
|
|
|
|
(N_MAGIC(x) == QMAGIC ? 0 : sizeof (struct exec)))
|
2009-09-20 16:58:02 +02:00
|
|
|
#define N_TXTADDR(x, target_page_size) (N_MAGIC(x) == QMAGIC ? target_page_size : 0)
|
|
|
|
#define _N_SEGMENT_ROUND(x, target_page_size) (((x) + target_page_size - 1) & ~(target_page_size - 1))
|
2006-04-23 19:12:42 +02:00
|
|
|
|
2009-09-20 16:58:02 +02:00
|
|
|
#define _N_TXTENDADDR(x, target_page_size) (N_TXTADDR(x, target_page_size)+(x).a_text)
|
2006-04-23 19:12:42 +02:00
|
|
|
|
2009-09-20 16:58:02 +02:00
|
|
|
#define N_DATADDR(x, target_page_size) \
|
|
|
|
(N_MAGIC(x)==OMAGIC? (_N_TXTENDADDR(x, target_page_size)) \
|
|
|
|
: (_N_SEGMENT_ROUND (_N_TXTENDADDR(x, target_page_size), target_page_size)))
|
2006-04-23 19:12:42 +02:00
|
|
|
|
|
|
|
|
2012-10-23 12:30:10 +02:00
|
|
|
int load_aout(const char *filename, hwaddr addr, int max_sz,
|
|
|
|
int bswap_needed, hwaddr target_page_size)
|
2006-04-23 19:12:42 +02:00
|
|
|
{
|
2011-11-16 19:41:56 +01:00
|
|
|
int fd;
|
|
|
|
ssize_t size, ret;
|
2006-04-23 19:12:42 +02:00
|
|
|
struct exec e;
|
|
|
|
uint32_t magic;
|
|
|
|
|
|
|
|
fd = open(filename, O_RDONLY | O_BINARY);
|
|
|
|
if (fd < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
size = read(fd, &e, sizeof(e));
|
|
|
|
if (size < 0)
|
|
|
|
goto fail;
|
|
|
|
|
2009-09-20 16:58:02 +02:00
|
|
|
if (bswap_needed) {
|
|
|
|
bswap_ahdr(&e);
|
|
|
|
}
|
2006-04-23 19:12:42 +02:00
|
|
|
|
|
|
|
magic = N_MAGIC(e);
|
|
|
|
switch (magic) {
|
|
|
|
case ZMAGIC:
|
|
|
|
case QMAGIC:
|
|
|
|
case OMAGIC:
|
2008-05-12 19:22:13 +02:00
|
|
|
if (e.a_text + e.a_data > max_sz)
|
|
|
|
goto fail;
|
2018-12-13 23:37:37 +01:00
|
|
|
lseek(fd, N_TXTOFF(e), SEEK_SET);
|
|
|
|
size = read_targphys(filename, fd, addr, e.a_text + e.a_data);
|
|
|
|
if (size < 0)
|
|
|
|
goto fail;
|
|
|
|
break;
|
2006-04-23 19:12:42 +02:00
|
|
|
case NMAGIC:
|
2009-09-20 16:58:02 +02:00
|
|
|
if (N_DATADDR(e, target_page_size) + e.a_data > max_sz)
|
2008-05-12 19:22:13 +02:00
|
|
|
goto fail;
|
2018-12-13 23:37:37 +01:00
|
|
|
lseek(fd, N_TXTOFF(e), SEEK_SET);
|
|
|
|
size = read_targphys(filename, fd, addr, e.a_text);
|
|
|
|
if (size < 0)
|
|
|
|
goto fail;
|
2009-10-01 16:42:33 +02:00
|
|
|
ret = read_targphys(filename, fd, addr + N_DATADDR(e, target_page_size),
|
2009-09-20 16:58:02 +02:00
|
|
|
e.a_data);
|
2018-12-13 23:37:37 +01:00
|
|
|
if (ret < 0)
|
|
|
|
goto fail;
|
|
|
|
size += ret;
|
|
|
|
break;
|
2006-04-23 19:12:42 +02:00
|
|
|
default:
|
2018-12-13 23:37:37 +01:00
|
|
|
goto fail;
|
2006-04-23 19:12:42 +02:00
|
|
|
}
|
|
|
|
close(fd);
|
|
|
|
return size;
|
|
|
|
fail:
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* ELF loader */
|
|
|
|
|
2015-03-14 09:37:08 +01:00
|
|
|
static void *load_at(int fd, off_t offset, size_t size)
|
2006-04-23 19:12:42 +02:00
|
|
|
{
|
|
|
|
void *ptr;
|
|
|
|
if (lseek(fd, offset, SEEK_SET) < 0)
|
|
|
|
return NULL;
|
2011-08-21 05:09:37 +02:00
|
|
|
ptr = g_malloc(size);
|
2006-04-23 19:12:42 +02:00
|
|
|
if (read(fd, ptr, size) != size) {
|
2011-08-21 05:09:37 +02:00
|
|
|
g_free(ptr);
|
2006-04-23 19:12:42 +02:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
return ptr;
|
|
|
|
}
|
|
|
|
|
2009-07-18 11:10:12 +02:00
|
|
|
#ifdef ELF_CLASS
|
|
|
|
#undef ELF_CLASS
|
|
|
|
#endif
|
2006-04-23 19:12:42 +02:00
|
|
|
|
|
|
|
#define ELF_CLASS ELFCLASS32
|
|
|
|
#include "elf.h"
|
|
|
|
|
|
|
|
#define SZ 32
|
|
|
|
#define elf_word uint32_t
|
2007-10-18 01:07:31 +02:00
|
|
|
#define elf_sword int32_t
|
2006-04-23 19:12:42 +02:00
|
|
|
#define bswapSZs bswap32s
|
2013-02-04 15:40:22 +01:00
|
|
|
#include "hw/elf_ops.h"
|
2006-04-23 19:12:42 +02:00
|
|
|
|
|
|
|
#undef elfhdr
|
|
|
|
#undef elf_phdr
|
|
|
|
#undef elf_shdr
|
|
|
|
#undef elf_sym
|
2015-03-09 11:12:52 +01:00
|
|
|
#undef elf_rela
|
2006-04-23 19:12:42 +02:00
|
|
|
#undef elf_note
|
|
|
|
#undef elf_word
|
2007-10-18 01:07:31 +02:00
|
|
|
#undef elf_sword
|
2006-04-23 19:12:42 +02:00
|
|
|
#undef bswapSZs
|
|
|
|
#undef SZ
|
|
|
|
#define elfhdr elf64_hdr
|
|
|
|
#define elf_phdr elf64_phdr
|
|
|
|
#define elf_note elf64_note
|
|
|
|
#define elf_shdr elf64_shdr
|
|
|
|
#define elf_sym elf64_sym
|
2015-03-09 11:12:52 +01:00
|
|
|
#define elf_rela elf64_rela
|
2006-04-23 19:12:42 +02:00
|
|
|
#define elf_word uint64_t
|
2007-10-18 01:07:31 +02:00
|
|
|
#define elf_sword int64_t
|
2006-04-23 19:12:42 +02:00
|
|
|
#define bswapSZs bswap64s
|
|
|
|
#define SZ 64
|
2013-02-04 15:40:22 +01:00
|
|
|
#include "hw/elf_ops.h"
|
2006-04-23 19:12:42 +02:00
|
|
|
|
2021-10-14 21:43:25 +02:00
|
|
|
const char *load_elf_strerror(ssize_t error)
|
2014-02-04 05:04:18 +01:00
|
|
|
{
|
|
|
|
switch (error) {
|
|
|
|
case 0:
|
|
|
|
return "No error";
|
|
|
|
case ELF_LOAD_FAILED:
|
|
|
|
return "Failed to load ELF";
|
|
|
|
case ELF_LOAD_NOT_ELF:
|
|
|
|
return "The image is not ELF";
|
|
|
|
case ELF_LOAD_WRONG_ARCH:
|
|
|
|
return "The image is from incompatible architecture";
|
|
|
|
case ELF_LOAD_WRONG_ENDIAN:
|
|
|
|
return "The image has incorrect endianness";
|
2019-09-10 16:22:23 +02:00
|
|
|
case ELF_LOAD_TOO_BIG:
|
|
|
|
return "The image segments are too big to load";
|
2014-02-04 05:04:18 +01:00
|
|
|
default:
|
|
|
|
return "Unknown error";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-03-04 12:30:21 +01:00
|
|
|
void load_elf_hdr(const char *filename, void *hdr, bool *is64, Error **errp)
|
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
uint8_t e_ident_local[EI_NIDENT];
|
|
|
|
uint8_t *e_ident;
|
|
|
|
size_t hdr_size, off;
|
|
|
|
bool is64l;
|
|
|
|
|
|
|
|
if (!hdr) {
|
|
|
|
hdr = e_ident_local;
|
|
|
|
}
|
|
|
|
e_ident = hdr;
|
|
|
|
|
|
|
|
fd = open(filename, O_RDONLY | O_BINARY);
|
|
|
|
if (fd < 0) {
|
|
|
|
error_setg_errno(errp, errno, "Failed to open file: %s", filename);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (read(fd, hdr, EI_NIDENT) != EI_NIDENT) {
|
|
|
|
error_setg_errno(errp, errno, "Failed to read file: %s", filename);
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
if (e_ident[0] != ELFMAG0 ||
|
|
|
|
e_ident[1] != ELFMAG1 ||
|
|
|
|
e_ident[2] != ELFMAG2 ||
|
|
|
|
e_ident[3] != ELFMAG3) {
|
|
|
|
error_setg(errp, "Bad ELF magic");
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
is64l = e_ident[EI_CLASS] == ELFCLASS64;
|
|
|
|
hdr_size = is64l ? sizeof(Elf64_Ehdr) : sizeof(Elf32_Ehdr);
|
|
|
|
if (is64) {
|
|
|
|
*is64 = is64l;
|
|
|
|
}
|
|
|
|
|
|
|
|
off = EI_NIDENT;
|
|
|
|
while (hdr != e_ident_local && off < hdr_size) {
|
|
|
|
size_t br = read(fd, hdr + off, hdr_size - off);
|
|
|
|
switch (br) {
|
|
|
|
case 0:
|
|
|
|
error_setg(errp, "File too short: %s", filename);
|
|
|
|
goto fail;
|
|
|
|
case -1:
|
|
|
|
error_setg_errno(errp, errno, "Failed to read file: %s",
|
|
|
|
filename);
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
off += br;
|
|
|
|
}
|
|
|
|
|
|
|
|
fail:
|
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
|
2006-04-23 19:12:42 +02:00
|
|
|
/* return < 0 if error, otherwise the number of bytes loaded in memory */
|
2021-10-14 21:43:25 +02:00
|
|
|
ssize_t load_elf(const char *filename,
|
|
|
|
uint64_t (*elf_note_fn)(void *, void *, bool),
|
|
|
|
uint64_t (*translate_fn)(void *, uint64_t),
|
|
|
|
void *translate_opaque, uint64_t *pentry, uint64_t *lowaddr,
|
|
|
|
uint64_t *highaddr, uint32_t *pflags, int big_endian,
|
|
|
|
int elf_machine, int clear_lsb, int data_swab)
|
2016-09-22 19:13:08 +02:00
|
|
|
{
|
2019-01-15 13:18:03 +01:00
|
|
|
return load_elf_as(filename, elf_note_fn, translate_fn, translate_opaque,
|
2020-01-26 23:55:04 +01:00
|
|
|
pentry, lowaddr, highaddr, pflags, big_endian,
|
|
|
|
elf_machine, clear_lsb, data_swab, NULL);
|
2016-09-22 19:13:08 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* return < 0 if error, otherwise the number of bytes loaded in memory */
|
2021-10-14 21:43:25 +02:00
|
|
|
ssize_t load_elf_as(const char *filename,
|
|
|
|
uint64_t (*elf_note_fn)(void *, void *, bool),
|
|
|
|
uint64_t (*translate_fn)(void *, uint64_t),
|
|
|
|
void *translate_opaque, uint64_t *pentry, uint64_t *lowaddr,
|
|
|
|
uint64_t *highaddr, uint32_t *pflags, int big_endian,
|
|
|
|
int elf_machine, int clear_lsb, int data_swab,
|
|
|
|
AddressSpace *as)
|
2016-11-07 16:50:30 +01:00
|
|
|
{
|
2019-01-15 13:18:03 +01:00
|
|
|
return load_elf_ram(filename, elf_note_fn, translate_fn, translate_opaque,
|
2020-01-26 23:55:04 +01:00
|
|
|
pentry, lowaddr, highaddr, pflags, big_endian,
|
|
|
|
elf_machine, clear_lsb, data_swab, as, true);
|
2016-11-07 16:50:30 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* return < 0 if error, otherwise the number of bytes loaded in memory */
|
2021-10-14 21:43:25 +02:00
|
|
|
ssize_t load_elf_ram(const char *filename,
|
|
|
|
uint64_t (*elf_note_fn)(void *, void *, bool),
|
|
|
|
uint64_t (*translate_fn)(void *, uint64_t),
|
|
|
|
void *translate_opaque, uint64_t *pentry,
|
|
|
|
uint64_t *lowaddr, uint64_t *highaddr, uint32_t *pflags,
|
|
|
|
int big_endian, int elf_machine, int clear_lsb,
|
|
|
|
int data_swab, AddressSpace *as, bool load_rom)
|
2018-03-02 13:31:12 +01:00
|
|
|
{
|
2019-01-15 13:18:03 +01:00
|
|
|
return load_elf_ram_sym(filename, elf_note_fn,
|
|
|
|
translate_fn, translate_opaque,
|
2020-01-26 23:55:04 +01:00
|
|
|
pentry, lowaddr, highaddr, pflags, big_endian,
|
2018-03-02 13:31:12 +01:00
|
|
|
elf_machine, clear_lsb, data_swab, as,
|
|
|
|
load_rom, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* return < 0 if error, otherwise the number of bytes loaded in memory */
|
2021-10-14 21:43:25 +02:00
|
|
|
ssize_t load_elf_ram_sym(const char *filename,
|
|
|
|
uint64_t (*elf_note_fn)(void *, void *, bool),
|
|
|
|
uint64_t (*translate_fn)(void *, uint64_t),
|
|
|
|
void *translate_opaque, uint64_t *pentry,
|
|
|
|
uint64_t *lowaddr, uint64_t *highaddr,
|
|
|
|
uint32_t *pflags, int big_endian, int elf_machine,
|
|
|
|
int clear_lsb, int data_swab,
|
|
|
|
AddressSpace *as, bool load_rom, symbol_fn_t sym_cb)
|
2006-04-23 19:12:42 +02:00
|
|
|
{
|
2021-10-14 21:43:25 +02:00
|
|
|
int fd, data_order, target_data_order, must_swab;
|
|
|
|
ssize_t ret = ELF_LOAD_FAILED;
|
2006-04-23 19:12:42 +02:00
|
|
|
uint8_t e_ident[EI_NIDENT];
|
|
|
|
|
2006-05-07 20:06:27 +02:00
|
|
|
fd = open(filename, O_RDONLY | O_BINARY);
|
2006-04-23 19:12:42 +02:00
|
|
|
if (fd < 0) {
|
|
|
|
perror(filename);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (read(fd, e_ident, sizeof(e_ident)) != sizeof(e_ident))
|
|
|
|
goto fail;
|
|
|
|
if (e_ident[0] != ELFMAG0 ||
|
|
|
|
e_ident[1] != ELFMAG1 ||
|
|
|
|
e_ident[2] != ELFMAG2 ||
|
2014-02-04 05:04:18 +01:00
|
|
|
e_ident[3] != ELFMAG3) {
|
|
|
|
ret = ELF_LOAD_NOT_ELF;
|
2006-04-23 19:12:42 +02:00
|
|
|
goto fail;
|
2014-02-04 05:04:18 +01:00
|
|
|
}
|
2022-03-23 16:57:17 +01:00
|
|
|
#if HOST_BIG_ENDIAN
|
2006-04-23 19:12:42 +02:00
|
|
|
data_order = ELFDATA2MSB;
|
|
|
|
#else
|
|
|
|
data_order = ELFDATA2LSB;
|
|
|
|
#endif
|
|
|
|
must_swab = data_order != e_ident[EI_DATA];
|
2009-09-20 16:58:02 +02:00
|
|
|
if (big_endian) {
|
|
|
|
target_data_order = ELFDATA2MSB;
|
|
|
|
} else {
|
|
|
|
target_data_order = ELFDATA2LSB;
|
|
|
|
}
|
2006-12-23 15:18:40 +01:00
|
|
|
|
2011-01-12 20:48:57 +01:00
|
|
|
if (target_data_order != e_ident[EI_DATA]) {
|
2014-02-04 05:04:18 +01:00
|
|
|
ret = ELF_LOAD_WRONG_ENDIAN;
|
2011-01-12 20:48:57 +01:00
|
|
|
goto fail;
|
|
|
|
}
|
2006-12-23 15:18:40 +01:00
|
|
|
|
2006-04-23 19:12:42 +02:00
|
|
|
lseek(fd, 0, SEEK_SET);
|
|
|
|
if (e_ident[EI_CLASS] == ELFCLASS64) {
|
2019-01-15 13:18:03 +01:00
|
|
|
ret = load_elf64(filename, fd, elf_note_fn,
|
|
|
|
translate_fn, translate_opaque, must_swab,
|
2020-01-26 23:55:04 +01:00
|
|
|
pentry, lowaddr, highaddr, pflags, elf_machine,
|
|
|
|
clear_lsb, data_swab, as, load_rom, sym_cb);
|
2006-04-23 19:12:42 +02:00
|
|
|
} else {
|
2019-01-15 13:18:03 +01:00
|
|
|
ret = load_elf32(filename, fd, elf_note_fn,
|
|
|
|
translate_fn, translate_opaque, must_swab,
|
2020-01-26 23:55:04 +01:00
|
|
|
pentry, lowaddr, highaddr, pflags, elf_machine,
|
|
|
|
clear_lsb, data_swab, as, load_rom, sym_cb);
|
2006-04-23 19:12:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
fail:
|
|
|
|
close(fd);
|
2014-02-04 05:04:18 +01:00
|
|
|
return ret;
|
2006-04-23 19:12:42 +02:00
|
|
|
}
|
2007-03-07 00:52:01 +01:00
|
|
|
|
2009-10-01 23:12:16 +02:00
|
|
|
static void bswap_uboot_header(uboot_image_header_t *hdr)
|
2007-03-07 00:52:01 +01:00
|
|
|
{
|
2022-03-23 16:57:17 +01:00
|
|
|
#if !HOST_BIG_ENDIAN
|
2007-03-07 00:52:01 +01:00
|
|
|
bswap32s(&hdr->ih_magic);
|
|
|
|
bswap32s(&hdr->ih_hcrc);
|
|
|
|
bswap32s(&hdr->ih_time);
|
|
|
|
bswap32s(&hdr->ih_size);
|
|
|
|
bswap32s(&hdr->ih_load);
|
|
|
|
bswap32s(&hdr->ih_ep);
|
|
|
|
bswap32s(&hdr->ih_dcrc);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2008-11-20 23:04:01 +01:00
|
|
|
|
|
|
|
#define ZALLOC_ALIGNMENT 16
|
|
|
|
|
|
|
|
static void *zalloc(void *x, unsigned items, unsigned size)
|
|
|
|
{
|
|
|
|
void *p;
|
|
|
|
|
|
|
|
size *= items;
|
|
|
|
size = (size + ZALLOC_ALIGNMENT - 1) & ~(ZALLOC_ALIGNMENT - 1);
|
|
|
|
|
2011-08-21 05:09:37 +02:00
|
|
|
p = g_malloc(size);
|
2008-11-20 23:04:01 +01:00
|
|
|
|
|
|
|
return (p);
|
|
|
|
}
|
|
|
|
|
2009-06-09 23:36:03 +02:00
|
|
|
static void zfree(void *x, void *addr)
|
2008-11-20 23:04:01 +01:00
|
|
|
{
|
2011-08-21 05:09:37 +02:00
|
|
|
g_free(addr);
|
2008-11-20 23:04:01 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#define HEAD_CRC 2
|
|
|
|
#define EXTRA_FIELD 4
|
|
|
|
#define ORIG_NAME 8
|
|
|
|
#define COMMENT 0x10
|
|
|
|
#define RESERVED 0xe0
|
|
|
|
|
|
|
|
#define DEFLATED 8
|
|
|
|
|
2016-09-08 16:51:56 +02:00
|
|
|
ssize_t gunzip(void *dst, size_t dstlen, uint8_t *src, size_t srclen)
|
2008-11-20 23:04:01 +01:00
|
|
|
{
|
|
|
|
z_stream s;
|
|
|
|
ssize_t dstbytes;
|
|
|
|
int r, i, flags;
|
|
|
|
|
|
|
|
/* skip header */
|
|
|
|
i = 10;
|
2021-08-12 16:18:03 +02:00
|
|
|
if (srclen < 4) {
|
|
|
|
goto toosmall;
|
|
|
|
}
|
2008-11-20 23:04:01 +01:00
|
|
|
flags = src[3];
|
|
|
|
if (src[2] != DEFLATED || (flags & RESERVED) != 0) {
|
|
|
|
puts ("Error: Bad gzipped data\n");
|
|
|
|
return -1;
|
|
|
|
}
|
2021-08-12 16:18:03 +02:00
|
|
|
if ((flags & EXTRA_FIELD) != 0) {
|
|
|
|
if (srclen < 12) {
|
|
|
|
goto toosmall;
|
|
|
|
}
|
2008-11-20 23:04:01 +01:00
|
|
|
i = 12 + src[10] + (src[11] << 8);
|
2021-08-12 16:18:03 +02:00
|
|
|
}
|
|
|
|
if ((flags & ORIG_NAME) != 0) {
|
|
|
|
while (i < srclen && src[i++] != 0) {
|
|
|
|
/* do nothing */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if ((flags & COMMENT) != 0) {
|
|
|
|
while (i < srclen && src[i++] != 0) {
|
|
|
|
/* do nothing */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if ((flags & HEAD_CRC) != 0) {
|
2008-11-20 23:04:01 +01:00
|
|
|
i += 2;
|
2021-08-12 16:18:03 +02:00
|
|
|
}
|
2008-11-20 23:04:01 +01:00
|
|
|
if (i >= srclen) {
|
2021-08-12 16:18:03 +02:00
|
|
|
goto toosmall;
|
2008-11-20 23:04:01 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
s.zalloc = zalloc;
|
2009-06-09 23:36:03 +02:00
|
|
|
s.zfree = zfree;
|
2008-11-20 23:04:01 +01:00
|
|
|
|
|
|
|
r = inflateInit2(&s, -MAX_WBITS);
|
|
|
|
if (r != Z_OK) {
|
|
|
|
printf ("Error: inflateInit2() returned %d\n", r);
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
s.next_in = src + i;
|
|
|
|
s.avail_in = srclen - i;
|
|
|
|
s.next_out = dst;
|
|
|
|
s.avail_out = dstlen;
|
|
|
|
r = inflate(&s, Z_FINISH);
|
|
|
|
if (r != Z_OK && r != Z_STREAM_END) {
|
|
|
|
printf ("Error: inflate() returned %d\n", r);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
dstbytes = s.next_out - (unsigned char *) dst;
|
|
|
|
inflateEnd(&s);
|
|
|
|
|
|
|
|
return dstbytes;
|
2021-08-12 16:18:03 +02:00
|
|
|
|
|
|
|
toosmall:
|
|
|
|
puts("Error: gunzip out of data in header\n");
|
|
|
|
return -1;
|
2008-11-20 23:04:01 +01:00
|
|
|
}
|
|
|
|
|
2007-03-07 00:52:01 +01:00
|
|
|
/* Load a U-Boot image. */
|
2013-07-09 00:40:01 +02:00
|
|
|
static int load_uboot_image(const char *filename, hwaddr *ep, hwaddr *loadaddr,
|
2014-10-19 05:42:22 +02:00
|
|
|
int *is_linux, uint8_t image_type,
|
|
|
|
uint64_t (*translate_fn)(void *, uint64_t),
|
2016-09-22 19:13:08 +02:00
|
|
|
void *translate_opaque, AddressSpace *as)
|
2007-03-07 00:52:01 +01:00
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
int size;
|
2013-07-09 00:40:01 +02:00
|
|
|
hwaddr address;
|
2009-10-01 23:12:16 +02:00
|
|
|
uboot_image_header_t h;
|
|
|
|
uboot_image_header_t *hdr = &h;
|
2007-03-07 00:52:01 +01:00
|
|
|
uint8_t *data = NULL;
|
2008-11-20 23:02:56 +01:00
|
|
|
int ret = -1;
|
2013-07-09 00:40:01 +02:00
|
|
|
int do_uncompress = 0;
|
2007-03-07 00:52:01 +01:00
|
|
|
|
|
|
|
fd = open(filename, O_RDONLY | O_BINARY);
|
|
|
|
if (fd < 0)
|
|
|
|
return -1;
|
|
|
|
|
2009-10-01 23:12:16 +02:00
|
|
|
size = read(fd, hdr, sizeof(uboot_image_header_t));
|
2017-06-02 12:51:46 +02:00
|
|
|
if (size < sizeof(uboot_image_header_t)) {
|
2008-11-20 23:02:56 +01:00
|
|
|
goto out;
|
2017-06-02 12:51:46 +02:00
|
|
|
}
|
2007-03-07 00:52:01 +01:00
|
|
|
|
|
|
|
bswap_uboot_header(hdr);
|
|
|
|
|
|
|
|
if (hdr->ih_magic != IH_MAGIC)
|
2008-11-20 23:02:56 +01:00
|
|
|
goto out;
|
2007-03-07 00:52:01 +01:00
|
|
|
|
2013-07-09 00:40:01 +02:00
|
|
|
if (hdr->ih_type != image_type) {
|
2019-01-07 09:31:50 +01:00
|
|
|
if (!(image_type == IH_TYPE_KERNEL &&
|
|
|
|
hdr->ih_type == IH_TYPE_KERNEL_NOLOAD)) {
|
|
|
|
fprintf(stderr, "Wrong image type %d, expected %d\n", hdr->ih_type,
|
|
|
|
image_type);
|
|
|
|
goto out;
|
|
|
|
}
|
2007-03-07 00:52:01 +01:00
|
|
|
}
|
|
|
|
|
2013-07-09 00:40:01 +02:00
|
|
|
/* TODO: Implement other image types. */
|
|
|
|
switch (hdr->ih_type) {
|
2019-01-07 09:31:50 +01:00
|
|
|
case IH_TYPE_KERNEL_NOLOAD:
|
|
|
|
if (!loadaddr || *loadaddr == LOAD_UIMAGE_LOADADDR_INVALID) {
|
|
|
|
fprintf(stderr, "this image format (kernel_noload) cannot be "
|
|
|
|
"loaded on this machine type");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
hdr->ih_load = *loadaddr + sizeof(*hdr);
|
|
|
|
hdr->ih_ep += hdr->ih_load;
|
|
|
|
/* fall through */
|
2013-07-09 00:40:01 +02:00
|
|
|
case IH_TYPE_KERNEL:
|
|
|
|
address = hdr->ih_load;
|
2014-10-19 05:42:22 +02:00
|
|
|
if (translate_fn) {
|
|
|
|
address = translate_fn(translate_opaque, address);
|
|
|
|
}
|
2013-07-09 00:40:01 +02:00
|
|
|
if (loadaddr) {
|
|
|
|
*loadaddr = hdr->ih_load;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (hdr->ih_comp) {
|
|
|
|
case IH_COMP_NONE:
|
|
|
|
break;
|
|
|
|
case IH_COMP_GZIP:
|
|
|
|
do_uncompress = 1;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
fprintf(stderr,
|
|
|
|
"Unable to load u-boot images with compression type %d\n",
|
|
|
|
hdr->ih_comp);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ep) {
|
|
|
|
*ep = hdr->ih_ep;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* TODO: Check CPU type. */
|
|
|
|
if (is_linux) {
|
|
|
|
if (hdr->ih_os == IH_OS_LINUX) {
|
|
|
|
*is_linux = 1;
|
2022-03-24 14:48:12 +01:00
|
|
|
} else if (hdr->ih_os == IH_OS_VXWORKS) {
|
|
|
|
/*
|
|
|
|
* VxWorks 7 uses the same boot interface as the Linux kernel
|
|
|
|
* on Arm (64-bit only), PowerPC and RISC-V architectures.
|
|
|
|
*/
|
|
|
|
switch (hdr->ih_arch) {
|
|
|
|
case IH_ARCH_ARM64:
|
|
|
|
case IH_ARCH_PPC:
|
|
|
|
case IH_ARCH_RISCV:
|
|
|
|
*is_linux = 1;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
*is_linux = 0;
|
|
|
|
break;
|
|
|
|
}
|
2013-07-09 00:40:01 +02:00
|
|
|
} else {
|
|
|
|
*is_linux = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
case IH_TYPE_RAMDISK:
|
|
|
|
address = *loadaddr;
|
2008-11-20 23:04:01 +01:00
|
|
|
break;
|
|
|
|
default:
|
2013-07-09 00:40:01 +02:00
|
|
|
fprintf(stderr, "Unsupported u-boot image type %d\n", hdr->ih_type);
|
2008-11-20 23:02:56 +01:00
|
|
|
goto out;
|
2007-03-07 00:52:01 +01:00
|
|
|
}
|
|
|
|
|
2011-08-21 05:09:37 +02:00
|
|
|
data = g_malloc(hdr->ih_size);
|
2007-03-07 00:52:01 +01:00
|
|
|
|
|
|
|
if (read(fd, data, hdr->ih_size) != hdr->ih_size) {
|
|
|
|
fprintf(stderr, "Error reading file\n");
|
2008-11-20 23:02:56 +01:00
|
|
|
goto out;
|
2007-03-07 00:52:01 +01:00
|
|
|
}
|
|
|
|
|
2013-07-09 00:40:01 +02:00
|
|
|
if (do_uncompress) {
|
2008-11-20 23:04:01 +01:00
|
|
|
uint8_t *compressed_data;
|
|
|
|
size_t max_bytes;
|
|
|
|
ssize_t bytes;
|
|
|
|
|
|
|
|
compressed_data = data;
|
|
|
|
max_bytes = UBOOT_MAX_GUNZIP_BYTES;
|
2011-08-21 05:09:37 +02:00
|
|
|
data = g_malloc(max_bytes);
|
2008-11-20 23:04:01 +01:00
|
|
|
|
|
|
|
bytes = gunzip(data, max_bytes, compressed_data, hdr->ih_size);
|
2011-08-21 05:09:37 +02:00
|
|
|
g_free(compressed_data);
|
2008-11-20 23:04:01 +01:00
|
|
|
if (bytes < 0) {
|
|
|
|
fprintf(stderr, "Unable to decompress gzipped image!\n");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
hdr->ih_size = bytes;
|
|
|
|
}
|
|
|
|
|
2016-09-22 19:13:08 +02:00
|
|
|
rom_add_blob_fixed_as(filename, data, hdr->ih_size, address, as);
|
2008-11-20 23:11:52 +01:00
|
|
|
|
2008-11-20 23:02:56 +01:00
|
|
|
ret = hdr->ih_size;
|
2007-03-07 00:52:01 +01:00
|
|
|
|
2008-11-20 23:02:56 +01:00
|
|
|
out:
|
2015-08-26 13:17:18 +02:00
|
|
|
g_free(data);
|
2007-03-07 00:52:01 +01:00
|
|
|
close(fd);
|
2008-11-20 23:02:56 +01:00
|
|
|
return ret;
|
2007-03-07 00:52:01 +01:00
|
|
|
}
|
2009-10-01 16:42:33 +02:00
|
|
|
|
2013-07-09 00:40:01 +02:00
|
|
|
int load_uimage(const char *filename, hwaddr *ep, hwaddr *loadaddr,
|
2014-10-19 05:42:22 +02:00
|
|
|
int *is_linux,
|
|
|
|
uint64_t (*translate_fn)(void *, uint64_t),
|
|
|
|
void *translate_opaque)
|
2013-07-09 00:40:01 +02:00
|
|
|
{
|
2014-10-19 05:42:22 +02:00
|
|
|
return load_uboot_image(filename, ep, loadaddr, is_linux, IH_TYPE_KERNEL,
|
2016-09-22 19:13:08 +02:00
|
|
|
translate_fn, translate_opaque, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
int load_uimage_as(const char *filename, hwaddr *ep, hwaddr *loadaddr,
|
|
|
|
int *is_linux,
|
|
|
|
uint64_t (*translate_fn)(void *, uint64_t),
|
|
|
|
void *translate_opaque, AddressSpace *as)
|
|
|
|
{
|
|
|
|
return load_uboot_image(filename, ep, loadaddr, is_linux, IH_TYPE_KERNEL,
|
|
|
|
translate_fn, translate_opaque, as);
|
2013-07-09 00:40:01 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Load a ramdisk. */
|
|
|
|
int load_ramdisk(const char *filename, hwaddr addr, uint64_t max_sz)
|
2018-03-02 11:45:35 +01:00
|
|
|
{
|
|
|
|
return load_ramdisk_as(filename, addr, max_sz, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
int load_ramdisk_as(const char *filename, hwaddr addr, uint64_t max_sz,
|
|
|
|
AddressSpace *as)
|
2013-07-09 00:40:01 +02:00
|
|
|
{
|
2014-10-19 05:42:22 +02:00
|
|
|
return load_uboot_image(filename, NULL, &addr, NULL, IH_TYPE_RAMDISK,
|
2018-03-02 11:45:35 +01:00
|
|
|
NULL, NULL, as);
|
2013-07-09 00:40:01 +02:00
|
|
|
}
|
|
|
|
|
2014-12-22 13:11:43 +01:00
|
|
|
/* Load a gzip-compressed kernel to a dynamically allocated buffer. */
|
|
|
|
int load_image_gzipped_buffer(const char *filename, uint64_t max_sz,
|
|
|
|
uint8_t **buffer)
|
2014-08-19 19:56:28 +02:00
|
|
|
{
|
|
|
|
uint8_t *compressed_data = NULL;
|
|
|
|
uint8_t *data = NULL;
|
|
|
|
gsize len;
|
|
|
|
ssize_t bytes;
|
|
|
|
int ret = -1;
|
|
|
|
|
|
|
|
if (!g_file_get_contents(filename, (char **) &compressed_data, &len,
|
|
|
|
NULL)) {
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Is it a gzip-compressed file? */
|
|
|
|
if (len < 2 ||
|
|
|
|
compressed_data[0] != 0x1f ||
|
|
|
|
compressed_data[1] != 0x8b) {
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (max_sz > LOAD_IMAGE_MAX_GUNZIP_BYTES) {
|
|
|
|
max_sz = LOAD_IMAGE_MAX_GUNZIP_BYTES;
|
|
|
|
}
|
|
|
|
|
|
|
|
data = g_malloc(max_sz);
|
|
|
|
bytes = gunzip(data, max_sz, compressed_data, len);
|
|
|
|
if (bytes < 0) {
|
|
|
|
fprintf(stderr, "%s: unable to decompress gzipped kernel file\n",
|
|
|
|
filename);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2014-12-22 13:11:43 +01:00
|
|
|
/* trim to actual size and return to caller */
|
|
|
|
*buffer = g_realloc(data, bytes);
|
2014-08-19 19:56:28 +02:00
|
|
|
ret = bytes;
|
2014-12-22 13:11:43 +01:00
|
|
|
/* ownership has been transferred to caller */
|
|
|
|
data = NULL;
|
2014-08-19 19:56:28 +02:00
|
|
|
|
|
|
|
out:
|
|
|
|
g_free(compressed_data);
|
|
|
|
g_free(data);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2014-12-22 13:11:43 +01:00
|
|
|
/* Load a gzip-compressed kernel. */
|
|
|
|
int load_image_gzipped(const char *filename, hwaddr addr, uint64_t max_sz)
|
|
|
|
{
|
|
|
|
int bytes;
|
|
|
|
uint8_t *data;
|
|
|
|
|
|
|
|
bytes = load_image_gzipped_buffer(filename, max_sz, &data);
|
|
|
|
if (bytes != -1) {
|
|
|
|
rom_add_blob_fixed(filename, data, bytes, addr);
|
|
|
|
g_free(data);
|
|
|
|
}
|
|
|
|
return bytes;
|
|
|
|
}
|
|
|
|
|
2009-10-01 16:42:33 +02:00
|
|
|
/*
|
|
|
|
* Functions for reboot-persistent memory regions.
|
|
|
|
* - used for vga bios and option roms.
|
|
|
|
* - also linux kernel (-kernel / -initrd).
|
|
|
|
*/
|
|
|
|
|
|
|
|
typedef struct Rom Rom;
|
|
|
|
|
|
|
|
struct Rom {
|
|
|
|
char *name;
|
|
|
|
char *path;
|
2013-02-19 05:41:11 +01:00
|
|
|
|
|
|
|
/* datasize is the amount of memory allocated in "data". If datasize is less
|
|
|
|
* than romsize, it means that the area from datasize to romsize is filled
|
|
|
|
* with zeros.
|
|
|
|
*/
|
2009-10-01 16:42:33 +02:00
|
|
|
size_t romsize;
|
2013-02-19 05:41:11 +01:00
|
|
|
size_t datasize;
|
|
|
|
|
2009-10-01 16:42:33 +02:00
|
|
|
uint8_t *data;
|
2013-08-19 16:26:55 +02:00
|
|
|
MemoryRegion *mr;
|
2016-09-22 19:13:08 +02:00
|
|
|
AddressSpace *as;
|
2009-10-01 16:42:33 +02:00
|
|
|
int isrom;
|
2009-12-18 12:01:11 +01:00
|
|
|
char *fw_dir;
|
|
|
|
char *fw_file;
|
2019-07-24 16:31:03 +02:00
|
|
|
GMappedFile *mapped_file;
|
2009-10-01 16:42:33 +02:00
|
|
|
|
2018-08-16 15:05:28 +02:00
|
|
|
bool committed;
|
|
|
|
|
2012-10-23 12:30:10 +02:00
|
|
|
hwaddr addr;
|
2009-10-01 16:42:33 +02:00
|
|
|
QTAILQ_ENTRY(Rom) next;
|
|
|
|
};
|
|
|
|
|
2010-01-08 15:25:40 +01:00
|
|
|
static FWCfgState *fw_cfg;
|
2009-10-01 16:42:33 +02:00
|
|
|
static QTAILQ_HEAD(, Rom) roms = QTAILQ_HEAD_INITIALIZER(roms);
|
|
|
|
|
2019-07-24 16:31:03 +02:00
|
|
|
/*
|
|
|
|
* rom->data can be heap-allocated or memory-mapped (e.g. when added with
|
|
|
|
* rom_add_elf_program())
|
|
|
|
*/
|
|
|
|
static void rom_free_data(Rom *rom)
|
|
|
|
{
|
|
|
|
if (rom->mapped_file) {
|
|
|
|
g_mapped_file_unref(rom->mapped_file);
|
|
|
|
rom->mapped_file = NULL;
|
|
|
|
} else {
|
|
|
|
g_free(rom->data);
|
|
|
|
}
|
|
|
|
|
|
|
|
rom->data = NULL;
|
|
|
|
}
|
|
|
|
|
2018-08-16 15:05:28 +02:00
|
|
|
static void rom_free(Rom *rom)
|
|
|
|
{
|
2019-07-24 16:31:03 +02:00
|
|
|
rom_free_data(rom);
|
2018-08-16 15:05:28 +02:00
|
|
|
g_free(rom->path);
|
|
|
|
g_free(rom->name);
|
|
|
|
g_free(rom->fw_dir);
|
|
|
|
g_free(rom->fw_file);
|
|
|
|
g_free(rom);
|
|
|
|
}
|
|
|
|
|
2016-09-22 19:13:08 +02:00
|
|
|
static inline bool rom_order_compare(Rom *rom, Rom *item)
|
|
|
|
{
|
loader: fix undefined behavior in rom_order_compare()
According to ISO C99 / N1256 (referenced in HACKING):
> 6.5.8 Relational operators
>
> 4 For the purposes of these operators, a pointer to an object that is
> not an element of an array behaves the same as a pointer to the first
> element of an array of length one with the type of the object as its
> element type.
>
> 5 When two pointers are compared, the result depends on the relative
> locations in the address space of the objects pointed to. If two
> pointers to object or incomplete types both point to the same object,
> or both point one past the last element of the same array object, they
> compare equal. If the objects pointed to are members of the same
> aggregate object, pointers to structure members declared later compare
> greater than pointers to members declared earlier in the structure,
> and pointers to array elements with larger subscript values compare
> greater than pointers to elements of the same array with lower
> subscript values. All pointers to members of the same union object
> compare equal. If the expression /P/ points to an element of an array
> object and the expression /Q/ points to the last element of the same
> array object, the pointer expression /Q+1/ compares greater than /P/.
> In all other cases, the behavior is undefined.
Our AddressSpace objects are allocated generally individually, and kept in
the "address_spaces" linked list, so we mustn't compare their addresses
with relops.
Convert the pointers subjected to the relop in rom_order_compare() to
"uintptr_t":
> 7.18.1.4 Integer types capable of holding object pointers
>
> 1 [...]
>
> The following type designates an unsigned integer type with the
> property that any valid pointer to void can be converted to this type,
> then converted back to pointer to void, and the result will compare
> equal to the original pointer:
>
> /uintptr_t/
>
> These types are optional.
Cc: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Alistair Francis <alistair.francis@xilinx.com>
Cc: Paolo Bonzini <pbonzini@redhat.com>
Cc: Peter Maydell <peter.maydell@linaro.org>
Cc: qemu-devel@nongnu.org
Fixes: 3e76099aacb4dae0d37ebf95305369e03d1491e6
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Alistair Francis <alistair.francis@xilinx.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
2016-11-29 20:55:33 +01:00
|
|
|
return ((uintptr_t)(void *)rom->as > (uintptr_t)(void *)item->as) ||
|
2016-09-22 19:13:08 +02:00
|
|
|
(rom->as == item->as && rom->addr >= item->addr);
|
|
|
|
}
|
|
|
|
|
2009-10-01 16:42:33 +02:00
|
|
|
static void rom_insert(Rom *rom)
|
|
|
|
{
|
|
|
|
Rom *item;
|
|
|
|
|
2009-11-11 19:17:24 +01:00
|
|
|
if (roms_loaded) {
|
|
|
|
hw_error ("ROM images must be loaded at startup\n");
|
|
|
|
}
|
|
|
|
|
2016-09-22 19:13:08 +02:00
|
|
|
/* The user didn't specify an address space, this is the default */
|
|
|
|
if (!rom->as) {
|
|
|
|
rom->as = &address_space_memory;
|
|
|
|
}
|
|
|
|
|
2018-08-16 15:05:28 +02:00
|
|
|
rom->committed = false;
|
|
|
|
|
2016-09-22 19:13:08 +02:00
|
|
|
/* List is ordered by load address in the same address space */
|
2009-10-01 16:42:33 +02:00
|
|
|
QTAILQ_FOREACH(item, &roms, next) {
|
2016-09-22 19:13:08 +02:00
|
|
|
if (rom_order_compare(rom, item)) {
|
2009-10-01 16:42:33 +02:00
|
|
|
continue;
|
2016-09-22 19:13:08 +02:00
|
|
|
}
|
2009-10-01 16:42:33 +02:00
|
|
|
QTAILQ_INSERT_BEFORE(item, rom, next);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
QTAILQ_INSERT_TAIL(&roms, rom, next);
|
|
|
|
}
|
|
|
|
|
2014-11-17 06:51:50 +01:00
|
|
|
static void fw_cfg_resized(const char *id, uint64_t length, void *host)
|
|
|
|
{
|
|
|
|
if (fw_cfg) {
|
|
|
|
fw_cfg_modify_file(fw_cfg, id + strlen("/rom@"), host, length);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-12 19:24:14 +01:00
|
|
|
static void *rom_set_mr(Rom *rom, Object *owner, const char *name, bool ro)
|
2013-08-19 16:26:55 +02:00
|
|
|
{
|
|
|
|
void *data;
|
|
|
|
|
|
|
|
rom->mr = g_malloc(sizeof(*rom->mr));
|
2014-11-17 06:51:50 +01:00
|
|
|
memory_region_init_resizeable_ram(rom->mr, owner, name,
|
|
|
|
rom->datasize, rom->romsize,
|
|
|
|
fw_cfg_resized,
|
2015-09-11 16:51:44 +02:00
|
|
|
&error_fatal);
|
2017-01-12 19:24:14 +01:00
|
|
|
memory_region_set_readonly(rom->mr, ro);
|
2013-08-19 16:26:55 +02:00
|
|
|
vmstate_register_ram_global(rom->mr);
|
|
|
|
|
|
|
|
data = memory_region_get_ram_ptr(rom->mr);
|
|
|
|
memcpy(data, rom->data, rom->datasize);
|
|
|
|
|
|
|
|
return data;
|
|
|
|
}
|
|
|
|
|
2010-01-08 15:25:38 +01:00
|
|
|
int rom_add_file(const char *file, const char *fw_dir,
|
2014-03-06 13:57:09 +01:00
|
|
|
hwaddr addr, int32_t bootindex,
|
2016-09-22 19:13:08 +02:00
|
|
|
bool option_rom, MemoryRegion *mr,
|
|
|
|
AddressSpace *as)
|
2009-10-01 16:42:33 +02:00
|
|
|
{
|
2015-12-01 23:58:08 +01:00
|
|
|
MachineClass *mc = MACHINE_GET_CLASS(qdev_get_machine());
|
2009-10-01 16:42:33 +02:00
|
|
|
Rom *rom;
|
|
|
|
int rc, fd = -1;
|
2010-12-08 12:35:07 +01:00
|
|
|
char devpath[100];
|
2009-10-01 16:42:33 +02:00
|
|
|
|
2016-09-22 19:13:08 +02:00
|
|
|
if (as && mr) {
|
|
|
|
fprintf(stderr, "Specifying an Address Space and Memory Region is " \
|
|
|
|
"not valid when loading a rom\n");
|
|
|
|
/* We haven't allocated anything so we don't need any cleanup */
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2011-08-21 05:09:37 +02:00
|
|
|
rom = g_malloc0(sizeof(*rom));
|
|
|
|
rom->name = g_strdup(file);
|
2009-10-01 16:42:33 +02:00
|
|
|
rom->path = qemu_find_file(QEMU_FILE_TYPE_BIOS, rom->name);
|
2016-09-22 19:13:08 +02:00
|
|
|
rom->as = as;
|
2009-10-01 16:42:33 +02:00
|
|
|
if (rom->path == NULL) {
|
2011-08-21 05:09:37 +02:00
|
|
|
rom->path = g_strdup(file);
|
2009-10-01 16:42:33 +02:00
|
|
|
}
|
|
|
|
|
2009-10-10 17:02:40 +02:00
|
|
|
fd = open(rom->path, O_RDONLY | O_BINARY);
|
2009-10-01 16:42:33 +02:00
|
|
|
if (fd == -1) {
|
|
|
|
fprintf(stderr, "Could not open option rom '%s': %s\n",
|
|
|
|
rom->path, strerror(errno));
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2010-01-08 15:25:38 +01:00
|
|
|
if (fw_dir) {
|
2011-08-21 05:09:37 +02:00
|
|
|
rom->fw_dir = g_strdup(fw_dir);
|
|
|
|
rom->fw_file = g_strdup(file);
|
2010-01-08 15:25:38 +01:00
|
|
|
}
|
2013-02-19 05:41:11 +01:00
|
|
|
rom->addr = addr;
|
|
|
|
rom->romsize = lseek(fd, 0, SEEK_END);
|
2014-11-15 11:06:43 +01:00
|
|
|
if (rom->romsize == -1) {
|
|
|
|
fprintf(stderr, "rom: file %-20s: get size error: %s\n",
|
|
|
|
rom->name, strerror(errno));
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2013-02-19 05:41:11 +01:00
|
|
|
rom->datasize = rom->romsize;
|
|
|
|
rom->data = g_malloc0(rom->datasize);
|
2009-10-01 16:42:33 +02:00
|
|
|
lseek(fd, 0, SEEK_SET);
|
2013-02-19 05:41:11 +01:00
|
|
|
rc = read(fd, rom->data, rom->datasize);
|
|
|
|
if (rc != rom->datasize) {
|
2009-10-01 16:42:33 +02:00
|
|
|
fprintf(stderr, "rom: file %-20s: read error: rc=%d (expected %zd)\n",
|
2013-02-19 05:41:11 +01:00
|
|
|
rom->name, rc, rom->datasize);
|
2009-10-01 16:42:33 +02:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
close(fd);
|
|
|
|
rom_insert(rom);
|
2010-12-08 12:35:06 +01:00
|
|
|
if (rom->fw_file && fw_cfg) {
|
|
|
|
const char *basename;
|
2013-07-24 17:56:05 +02:00
|
|
|
char fw_file_name[FW_CFG_MAX_FILE_PATH];
|
2013-08-19 16:26:55 +02:00
|
|
|
void *data;
|
2010-12-08 12:35:06 +01:00
|
|
|
|
|
|
|
basename = strrchr(rom->fw_file, '/');
|
|
|
|
if (basename) {
|
|
|
|
basename++;
|
|
|
|
} else {
|
|
|
|
basename = rom->fw_file;
|
|
|
|
}
|
|
|
|
snprintf(fw_file_name, sizeof(fw_file_name), "%s/%s", rom->fw_dir,
|
|
|
|
basename);
|
2010-12-08 12:35:07 +01:00
|
|
|
snprintf(devpath, sizeof(devpath), "/rom@%s", fw_file_name);
|
2013-08-19 16:26:55 +02:00
|
|
|
|
2015-12-01 23:58:08 +01:00
|
|
|
if ((!option_rom || mc->option_rom_has_mr) && mc->rom_file_has_mr) {
|
2017-01-12 19:24:14 +01:00
|
|
|
data = rom_set_mr(rom, OBJECT(fw_cfg), devpath, true);
|
2013-08-19 16:26:55 +02:00
|
|
|
} else {
|
|
|
|
data = rom->data;
|
|
|
|
}
|
|
|
|
|
|
|
|
fw_cfg_add_file(fw_cfg, fw_file_name, data, rom->romsize);
|
2010-12-08 12:35:07 +01:00
|
|
|
} else {
|
2016-03-04 12:30:17 +01:00
|
|
|
if (mr) {
|
|
|
|
rom->mr = mr;
|
|
|
|
snprintf(devpath, sizeof(devpath), "/rom@%s", file);
|
|
|
|
} else {
|
|
|
|
snprintf(devpath, sizeof(devpath), "/rom@" TARGET_FMT_plx, addr);
|
|
|
|
}
|
2010-12-08 12:35:06 +01:00
|
|
|
}
|
2010-12-08 12:35:07 +01:00
|
|
|
|
|
|
|
add_boot_device_path(bootindex, NULL, devpath);
|
2009-10-01 16:42:33 +02:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
err:
|
|
|
|
if (fd != -1)
|
|
|
|
close(fd);
|
2016-02-24 10:12:47 +01:00
|
|
|
|
2018-08-16 15:05:28 +02:00
|
|
|
rom_free(rom);
|
2009-10-01 16:42:33 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-03-23 10:24:16 +01:00
|
|
|
MemoryRegion *rom_add_blob(const char *name, const void *blob, size_t len,
|
2014-11-17 06:51:50 +01:00
|
|
|
size_t max_len, hwaddr addr, const char *fw_file_name,
|
2017-08-07 20:16:11 +02:00
|
|
|
FWCfgCallback fw_callback, void *callback_opaque,
|
2017-01-12 19:24:14 +01:00
|
|
|
AddressSpace *as, bool read_only)
|
2009-10-01 16:42:33 +02:00
|
|
|
{
|
2015-12-01 23:58:08 +01:00
|
|
|
MachineClass *mc = MACHINE_GET_CLASS(qdev_get_machine());
|
2009-10-01 16:42:33 +02:00
|
|
|
Rom *rom;
|
2015-03-23 10:24:16 +01:00
|
|
|
MemoryRegion *mr = NULL;
|
2009-10-01 16:42:33 +02:00
|
|
|
|
2013-02-19 05:41:11 +01:00
|
|
|
rom = g_malloc0(sizeof(*rom));
|
|
|
|
rom->name = g_strdup(name);
|
loader: fix handling of custom address spaces when adding ROM blobs
* Commit 3e76099aacb4 ("loader: Allow a custom AddressSpace when loading
ROMs") introduced the "Rom.as" field:
(1) It modified the utility callers of rom_insert() to take "as" as a
new parameter from *their* callers, and set "rom->as" from that
parameter. The functions covered were rom_add_file() and
rom_add_elf_program().
(2) It also modified rom_insert() itself, to auto-assign
"&address_space_memory", in case the external caller passed -- and
the utility caller forwarded -- as=NULL.
Except, commit 3e76099aacb4 forgot to update the third utility caller of
rom_insert(), under point (1), namely rom_add_blob().
* Later, commit 5e774eb3bd264 ("loader: Add AddressSpace loading support
to uImages") added the load_uimage_as() function, and the
rom_add_blob_fixed_as() function-like macro, with the necessary changes
elsewhere to propagate the new "as" parameter to rom_add_blob():
load_uimage_as()
load_uboot_image()
rom_add_blob_fixed_as()
rom_add_blob()
At this point, the signature (and workings) of rom_add_blob() had been
broken already, and the rom_add_blob_fixed_as() macro passed its "_as"
parameter to rom_add_blob() as "callback_opaque". Given that the
"fw_callback" parameter itself was set to NULL (correctly), this did no
additional damage (the opaque arg would never be used), but ultimately
it broke the new functionality of load_uimage_as().
* The load_uimage_as() function would be put to use in one of the later
patches, commit e481a1f63c93 ("generic-loader: Add a generic loader").
* We can fix this only in a unified patch now. Append "AddressSpace *as"
to the signature of rom_add_blob(), and handle the new parameter. Pass
NULL from all current callers, except from rom_add_blob_fixed_as(),
where "_as" has to be bumped to the proper position.
* Note that rom_add_file() rejects the case when both "mr" and "as" are
passed in as non-NULL. The action that this is apparently supposed to
prevent is the
rom->mr = mr;
assignment (that's the only place where the "mr" parameter is used in
rom_add_file()). In rom_add_blob() though, we have no "mr" parameter,
and the actions done on the fw_cfg branch:
if (fw_file_name && fw_cfg) {
if (mc->rom_file_has_mr) {
data = rom_set_mr(rom, OBJECT(fw_cfg), devpath);
mr = rom->mr;
} else {
data = rom->data;
}
reflect those that are performed by rom_add_file() too (with mr==NULL):
if (rom->fw_file && fw_cfg) {
if ((!option_rom || mc->option_rom_has_mr) &&
mc->rom_file_has_mr) {
data = rom_set_mr(rom, OBJECT(fw_cfg), devpath);
} else {
data = rom->data;
}
Hence we need no additional restrictions in rom_add_blob().
* Stable is not affected as both problematic commits appeared first in
v2.8.0-rc0.
Cc: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Alistair Francis <alistair.francis@xilinx.com>
Cc: Igor Mammedov <imammedo@redhat.com>
Cc: Michael Walle <michael@walle.cc>
Cc: Paolo Bonzini <pbonzini@redhat.com>
Cc: Peter Maydell <peter.maydell@linaro.org>
Cc: Shannon Zhao <zhaoshenglong@huawei.com>
Cc: qemu-arm@nongnu.org
Cc: qemu-devel@nongnu.org
Fixes: 3e76099aacb4dae0d37ebf95305369e03d1491e6
Fixes: 5e774eb3bd264c76484906f4bd0fb38e00b8090e
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Alistair Francis <alistair.francis@xilinx.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
2016-11-29 20:55:32 +01:00
|
|
|
rom->as = as;
|
2013-02-19 05:41:11 +01:00
|
|
|
rom->addr = addr;
|
2014-11-17 06:51:50 +01:00
|
|
|
rom->romsize = max_len ? max_len : len;
|
2013-02-19 05:41:11 +01:00
|
|
|
rom->datasize = len;
|
2019-04-11 13:28:18 +02:00
|
|
|
g_assert(rom->romsize >= rom->datasize);
|
2013-02-19 05:41:11 +01:00
|
|
|
rom->data = g_malloc0(rom->datasize);
|
2009-10-01 16:42:33 +02:00
|
|
|
memcpy(rom->data, blob, len);
|
|
|
|
rom_insert(rom);
|
2013-08-18 16:02:33 +02:00
|
|
|
if (fw_file_name && fw_cfg) {
|
|
|
|
char devpath[100];
|
2014-11-17 06:49:21 +01:00
|
|
|
void *data;
|
2013-08-18 16:02:33 +02:00
|
|
|
|
2017-01-12 19:24:14 +01:00
|
|
|
if (read_only) {
|
|
|
|
snprintf(devpath, sizeof(devpath), "/rom@%s", fw_file_name);
|
|
|
|
} else {
|
|
|
|
snprintf(devpath, sizeof(devpath), "/ram@%s", fw_file_name);
|
|
|
|
}
|
2013-08-18 16:02:33 +02:00
|
|
|
|
2015-12-01 23:58:08 +01:00
|
|
|
if (mc->rom_file_has_mr) {
|
2017-01-12 19:24:14 +01:00
|
|
|
data = rom_set_mr(rom, OBJECT(fw_cfg), devpath, read_only);
|
2015-03-23 10:24:16 +01:00
|
|
|
mr = rom->mr;
|
2013-08-18 16:02:33 +02:00
|
|
|
} else {
|
|
|
|
data = rom->data;
|
|
|
|
}
|
|
|
|
|
|
|
|
fw_cfg_add_file_callback(fw_cfg, fw_file_name,
|
2017-09-11 18:59:23 +02:00
|
|
|
fw_callback, NULL, callback_opaque,
|
2017-01-12 19:24:14 +01:00
|
|
|
data, rom->datasize, read_only);
|
2013-08-18 16:02:33 +02:00
|
|
|
}
|
2015-03-23 10:24:16 +01:00
|
|
|
return mr;
|
2009-10-01 16:42:33 +02:00
|
|
|
}
|
|
|
|
|
2013-02-19 05:41:11 +01:00
|
|
|
/* This function is specific for elf program because we don't need to allocate
|
|
|
|
* all the rom. We just allocate the first part and the rest is just zeros. This
|
2019-07-24 16:31:03 +02:00
|
|
|
* is why romsize and datasize are different. Also, this function takes its own
|
|
|
|
* reference to "mapped_file", so we don't have to allocate and copy the buffer.
|
2013-02-19 05:41:11 +01:00
|
|
|
*/
|
2019-07-24 16:31:03 +02:00
|
|
|
int rom_add_elf_program(const char *name, GMappedFile *mapped_file, void *data,
|
|
|
|
size_t datasize, size_t romsize, hwaddr addr,
|
|
|
|
AddressSpace *as)
|
2013-02-19 05:41:11 +01:00
|
|
|
{
|
|
|
|
Rom *rom;
|
|
|
|
|
|
|
|
rom = g_malloc0(sizeof(*rom));
|
|
|
|
rom->name = g_strdup(name);
|
|
|
|
rom->addr = addr;
|
|
|
|
rom->datasize = datasize;
|
|
|
|
rom->romsize = romsize;
|
|
|
|
rom->data = data;
|
2016-09-22 19:13:08 +02:00
|
|
|
rom->as = as;
|
2019-07-24 16:31:03 +02:00
|
|
|
|
|
|
|
if (mapped_file && data) {
|
|
|
|
g_mapped_file_ref(mapped_file);
|
|
|
|
rom->mapped_file = mapped_file;
|
|
|
|
}
|
|
|
|
|
2013-02-19 05:41:11 +01:00
|
|
|
rom_insert(rom);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2009-10-26 12:18:25 +01:00
|
|
|
int rom_add_vga(const char *file)
|
|
|
|
{
|
2016-09-22 19:13:08 +02:00
|
|
|
return rom_add_file(file, "vgaroms", 0, -1, true, NULL, NULL);
|
2009-10-26 12:18:25 +01:00
|
|
|
}
|
|
|
|
|
2010-12-08 12:35:07 +01:00
|
|
|
int rom_add_option(const char *file, int32_t bootindex)
|
2009-10-26 12:18:25 +01:00
|
|
|
{
|
2016-09-22 19:13:08 +02:00
|
|
|
return rom_add_file(file, "genroms", 0, bootindex, true, NULL, NULL);
|
2009-10-26 12:18:25 +01:00
|
|
|
}
|
|
|
|
|
2009-10-01 16:42:33 +02:00
|
|
|
static void rom_reset(void *unused)
|
|
|
|
{
|
|
|
|
Rom *rom;
|
|
|
|
|
|
|
|
QTAILQ_FOREACH(rom, &roms, next) {
|
2009-12-22 10:57:02 +01:00
|
|
|
if (rom->fw_file) {
|
|
|
|
continue;
|
|
|
|
}
|
2020-03-13 16:59:39 +01:00
|
|
|
/*
|
|
|
|
* We don't need to fill in the RAM with ROM data because we'll fill
|
|
|
|
* the data in during the next incoming migration in all cases. Note
|
|
|
|
* that some of those RAMs can actually be modified by the guest.
|
|
|
|
*/
|
|
|
|
if (runstate_check(RUN_STATE_INMIGRATE)) {
|
|
|
|
if (rom->data && rom->isrom) {
|
|
|
|
/*
|
|
|
|
* Free it so that a rom_reset after migration doesn't
|
|
|
|
* overwrite a potentially modified 'rom'.
|
|
|
|
*/
|
|
|
|
rom_free_data(rom);
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2010-01-08 15:25:38 +01:00
|
|
|
if (rom->data == NULL) {
|
2009-10-01 16:42:33 +02:00
|
|
|
continue;
|
2010-01-08 15:25:38 +01:00
|
|
|
}
|
2013-08-19 16:26:55 +02:00
|
|
|
if (rom->mr) {
|
|
|
|
void *host = memory_region_get_ram_ptr(rom->mr);
|
|
|
|
memcpy(host, rom->data, rom->datasize);
|
2022-01-15 21:37:24 +01:00
|
|
|
memset(host + rom->datasize, 0, rom->romsize - rom->datasize);
|
2013-08-19 16:26:55 +02:00
|
|
|
} else {
|
2018-12-14 14:30:48 +01:00
|
|
|
address_space_write_rom(rom->as, rom->addr, MEMTXATTRS_UNSPECIFIED,
|
|
|
|
rom->data, rom->datasize);
|
2022-01-15 21:37:24 +01:00
|
|
|
address_space_set(rom->as, rom->addr + rom->datasize, 0,
|
|
|
|
rom->romsize - rom->datasize,
|
|
|
|
MEMTXATTRS_UNSPECIFIED);
|
2013-08-19 16:26:55 +02:00
|
|
|
}
|
2009-10-01 16:42:33 +02:00
|
|
|
if (rom->isrom) {
|
|
|
|
/* rom needs to be written only once */
|
2019-07-24 16:31:03 +02:00
|
|
|
rom_free_data(rom);
|
2009-10-01 16:42:33 +02:00
|
|
|
}
|
2013-12-11 14:17:44 +01:00
|
|
|
/*
|
|
|
|
* The rom loader is really on the same level as firmware in the guest
|
|
|
|
* shadowing a ROM into RAM. Such a shadowing mechanism needs to ensure
|
|
|
|
* that the instruction cache for that new region is clear, so that the
|
|
|
|
* CPU definitely fetches its instructions from the just written data.
|
|
|
|
*/
|
|
|
|
cpu_flush_icache_range(rom->addr, rom->datasize);
|
2019-06-13 07:09:37 +02:00
|
|
|
|
|
|
|
trace_loader_write_rom(rom->name, rom->addr, rom->datasize, rom->isrom);
|
2009-10-01 16:42:33 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-29 21:39:20 +01:00
|
|
|
/* Return true if two consecutive ROMs in the ROM list overlap */
|
|
|
|
static bool roms_overlap(Rom *last_rom, Rom *this_rom)
|
|
|
|
{
|
|
|
|
if (!last_rom) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return last_rom->as == this_rom->as &&
|
|
|
|
last_rom->addr + last_rom->romsize > this_rom->addr;
|
|
|
|
}
|
|
|
|
|
2020-11-29 21:39:21 +01:00
|
|
|
static const char *rom_as_name(Rom *rom)
|
|
|
|
{
|
|
|
|
const char *name = rom->as ? rom->as->name : NULL;
|
|
|
|
return name ?: "anonymous";
|
|
|
|
}
|
|
|
|
|
|
|
|
static void rom_print_overlap_error_header(void)
|
|
|
|
{
|
|
|
|
error_report("Some ROM regions are overlapping");
|
|
|
|
error_printf(
|
|
|
|
"These ROM regions might have been loaded by "
|
|
|
|
"direct user request or by default.\n"
|
|
|
|
"They could be BIOS/firmware images, a guest kernel, "
|
|
|
|
"initrd or some other file loaded into guest memory.\n"
|
|
|
|
"Check whether you intended to load all this guest code, and "
|
|
|
|
"whether it has been built to load to the correct addresses.\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
static void rom_print_one_overlap_error(Rom *last_rom, Rom *rom)
|
|
|
|
{
|
|
|
|
error_printf(
|
|
|
|
"\nThe following two regions overlap (in the %s address space):\n",
|
|
|
|
rom_as_name(rom));
|
|
|
|
error_printf(
|
|
|
|
" %s (addresses 0x" TARGET_FMT_plx " - 0x" TARGET_FMT_plx ")\n",
|
|
|
|
last_rom->name, last_rom->addr, last_rom->addr + last_rom->romsize);
|
|
|
|
error_printf(
|
|
|
|
" %s (addresses 0x" TARGET_FMT_plx " - 0x" TARGET_FMT_plx ")\n",
|
|
|
|
rom->name, rom->addr, rom->addr + rom->romsize);
|
|
|
|
}
|
|
|
|
|
2015-06-16 18:07:54 +02:00
|
|
|
int rom_check_and_register_reset(void)
|
2009-10-01 16:42:33 +02:00
|
|
|
{
|
2011-12-08 15:12:18 +01:00
|
|
|
MemoryRegionSection section;
|
2020-11-29 21:39:20 +01:00
|
|
|
Rom *rom, *last_rom = NULL;
|
2020-11-29 21:39:21 +01:00
|
|
|
bool found_overlap = false;
|
2009-10-01 16:42:33 +02:00
|
|
|
|
|
|
|
QTAILQ_FOREACH(rom, &roms, next) {
|
2009-12-22 10:57:02 +01:00
|
|
|
if (rom->fw_file) {
|
|
|
|
continue;
|
|
|
|
}
|
2018-02-23 12:10:17 +01:00
|
|
|
if (!rom->mr) {
|
2020-11-29 21:39:20 +01:00
|
|
|
if (roms_overlap(last_rom, rom)) {
|
2020-11-29 21:39:21 +01:00
|
|
|
if (!found_overlap) {
|
|
|
|
found_overlap = true;
|
|
|
|
rom_print_overlap_error_header();
|
|
|
|
}
|
|
|
|
rom_print_one_overlap_error(last_rom, rom);
|
|
|
|
/* Keep going through the list so we report all overlaps */
|
2018-02-23 12:10:17 +01:00
|
|
|
}
|
2020-11-29 21:39:20 +01:00
|
|
|
last_rom = rom;
|
2009-10-01 16:42:33 +02:00
|
|
|
}
|
2016-09-22 19:13:08 +02:00
|
|
|
section = memory_region_find(rom->mr ? rom->mr : get_system_memory(),
|
|
|
|
rom->addr, 1);
|
2013-05-27 10:08:27 +02:00
|
|
|
rom->isrom = int128_nz(section.size) && memory_region_is_rom(section.mr);
|
2013-05-06 10:46:11 +02:00
|
|
|
memory_region_unref(section.mr);
|
2009-10-01 16:42:33 +02:00
|
|
|
}
|
2020-11-29 21:39:21 +01:00
|
|
|
if (found_overlap) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2009-10-01 16:42:33 +02:00
|
|
|
qemu_register_reset(rom_reset, NULL);
|
2013-07-24 17:56:08 +02:00
|
|
|
roms_loaded = 1;
|
2015-06-16 18:07:54 +02:00
|
|
|
return 0;
|
2013-07-24 17:56:08 +02:00
|
|
|
}
|
|
|
|
|
2013-04-16 02:24:08 +02:00
|
|
|
void rom_set_fw(FWCfgState *f)
|
2009-12-18 12:01:11 +01:00
|
|
|
{
|
2010-01-08 15:25:40 +01:00
|
|
|
fw_cfg = f;
|
2009-12-18 12:01:11 +01:00
|
|
|
}
|
|
|
|
|
2016-04-07 16:12:58 +02:00
|
|
|
void rom_set_order_override(int order)
|
|
|
|
{
|
|
|
|
if (!fw_cfg)
|
|
|
|
return;
|
|
|
|
fw_cfg_set_order_override(fw_cfg, order);
|
|
|
|
}
|
|
|
|
|
|
|
|
void rom_reset_order_override(void)
|
|
|
|
{
|
|
|
|
if (!fw_cfg)
|
|
|
|
return;
|
|
|
|
fw_cfg_reset_order_override(fw_cfg);
|
|
|
|
}
|
|
|
|
|
2018-08-16 15:05:28 +02:00
|
|
|
void rom_transaction_begin(void)
|
|
|
|
{
|
|
|
|
Rom *rom;
|
|
|
|
|
|
|
|
/* Ignore ROMs added without the transaction API */
|
|
|
|
QTAILQ_FOREACH(rom, &roms, next) {
|
|
|
|
rom->committed = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void rom_transaction_end(bool commit)
|
|
|
|
{
|
|
|
|
Rom *rom;
|
|
|
|
Rom *tmp;
|
|
|
|
|
|
|
|
QTAILQ_FOREACH_SAFE(rom, &roms, next, tmp) {
|
|
|
|
if (rom->committed) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (commit) {
|
|
|
|
rom->committed = true;
|
|
|
|
} else {
|
|
|
|
QTAILQ_REMOVE(&roms, rom, next);
|
|
|
|
rom_free(rom);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-26 11:35:40 +02:00
|
|
|
static Rom *find_rom(hwaddr addr, size_t size)
|
2009-10-07 13:37:06 +02:00
|
|
|
{
|
|
|
|
Rom *rom;
|
|
|
|
|
|
|
|
QTAILQ_FOREACH(rom, &roms, next) {
|
2009-12-24 19:30:25 +01:00
|
|
|
if (rom->fw_file) {
|
|
|
|
continue;
|
|
|
|
}
|
2013-08-19 16:26:55 +02:00
|
|
|
if (rom->mr) {
|
|
|
|
continue;
|
|
|
|
}
|
2010-01-08 15:25:38 +01:00
|
|
|
if (rom->addr > addr) {
|
2009-10-07 13:37:06 +02:00
|
|
|
continue;
|
2010-01-08 15:25:38 +01:00
|
|
|
}
|
2018-06-26 11:35:40 +02:00
|
|
|
if (rom->addr + rom->romsize < addr + size) {
|
2009-10-07 13:37:06 +02:00
|
|
|
continue;
|
2010-01-08 15:25:38 +01:00
|
|
|
}
|
2009-10-07 13:37:06 +02:00
|
|
|
return rom;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2022-02-25 18:20:20 +01:00
|
|
|
typedef struct RomSec {
|
|
|
|
hwaddr base;
|
|
|
|
int se; /* start/end flag */
|
|
|
|
} RomSec;
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Sort into address order. We break ties between rom-startpoints
|
|
|
|
* and rom-endpoints in favour of the startpoint, by sorting the 0->1
|
|
|
|
* transition before the 1->0 transition. Either way round would
|
|
|
|
* work, but this way saves a little work later by avoiding
|
|
|
|
* dealing with "gaps" of 0 length.
|
|
|
|
*/
|
|
|
|
static gint sort_secs(gconstpointer a, gconstpointer b)
|
|
|
|
{
|
|
|
|
RomSec *ra = (RomSec *) a;
|
|
|
|
RomSec *rb = (RomSec *) b;
|
|
|
|
|
|
|
|
if (ra->base == rb->base) {
|
|
|
|
return ra->se - rb->se;
|
|
|
|
}
|
|
|
|
return ra->base > rb->base ? 1 : -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static GList *add_romsec_to_list(GList *secs, hwaddr base, int se)
|
|
|
|
{
|
|
|
|
RomSec *cand = g_new(RomSec, 1);
|
|
|
|
cand->base = base;
|
|
|
|
cand->se = se;
|
|
|
|
return g_list_prepend(secs, cand);
|
|
|
|
}
|
|
|
|
|
|
|
|
RomGap rom_find_largest_gap_between(hwaddr base, size_t size)
|
|
|
|
{
|
|
|
|
Rom *rom;
|
|
|
|
RomSec *cand;
|
|
|
|
RomGap res = {0, 0};
|
|
|
|
hwaddr gapstart = base;
|
|
|
|
GList *it, *secs = NULL;
|
|
|
|
int count = 0;
|
|
|
|
|
|
|
|
QTAILQ_FOREACH(rom, &roms, next) {
|
|
|
|
/* Ignore blobs being loaded to special places */
|
|
|
|
if (rom->mr || rom->fw_file) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
/* ignore anything finishing bellow base */
|
|
|
|
if (rom->addr + rom->romsize <= base) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
/* ignore anything starting above the region */
|
|
|
|
if (rom->addr >= base + size) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Save the start and end of each relevant ROM */
|
|
|
|
secs = add_romsec_to_list(secs, rom->addr, 1);
|
|
|
|
|
|
|
|
if (rom->addr + rom->romsize < base + size) {
|
|
|
|
secs = add_romsec_to_list(secs, rom->addr + rom->romsize, -1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* sentinel */
|
|
|
|
secs = add_romsec_to_list(secs, base + size, 1);
|
|
|
|
|
|
|
|
secs = g_list_sort(secs, sort_secs);
|
|
|
|
|
|
|
|
for (it = g_list_first(secs); it; it = g_list_next(it)) {
|
|
|
|
cand = (RomSec *) it->data;
|
|
|
|
if (count == 0 && count + cand->se == 1) {
|
|
|
|
size_t gap = cand->base - gapstart;
|
|
|
|
if (gap > res.size) {
|
|
|
|
res.base = gapstart;
|
|
|
|
res.size = gap;
|
|
|
|
}
|
|
|
|
} else if (count == 1 && count + cand->se == 0) {
|
|
|
|
gapstart = cand->base;
|
|
|
|
}
|
|
|
|
count += cand->se;
|
|
|
|
}
|
|
|
|
|
|
|
|
g_list_free_full(secs, g_free);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2009-12-19 21:15:20 +01:00
|
|
|
/*
|
|
|
|
* Copies memory from registered ROMs to dest. Any memory that is contained in
|
|
|
|
* a ROM between addr and addr + size is copied. Note that this can involve
|
|
|
|
* multiple ROMs, which need not start at addr and need not end at addr + size.
|
|
|
|
*/
|
2012-10-23 12:30:10 +02:00
|
|
|
int rom_copy(uint8_t *dest, hwaddr addr, size_t size)
|
2009-11-12 21:53:11 +01:00
|
|
|
{
|
2012-10-23 12:30:10 +02:00
|
|
|
hwaddr end = addr + size;
|
2009-11-12 21:53:11 +01:00
|
|
|
uint8_t *s, *d = dest;
|
|
|
|
size_t l = 0;
|
|
|
|
Rom *rom;
|
|
|
|
|
|
|
|
QTAILQ_FOREACH(rom, &roms, next) {
|
2009-12-24 19:30:25 +01:00
|
|
|
if (rom->fw_file) {
|
|
|
|
continue;
|
|
|
|
}
|
2013-08-19 16:26:55 +02:00
|
|
|
if (rom->mr) {
|
|
|
|
continue;
|
|
|
|
}
|
2010-01-08 15:25:38 +01:00
|
|
|
if (rom->addr + rom->romsize < addr) {
|
2009-12-18 12:01:12 +01:00
|
|
|
continue;
|
2010-01-08 15:25:38 +01:00
|
|
|
}
|
2019-09-25 14:16:43 +02:00
|
|
|
if (rom->addr > end || rom->addr < addr) {
|
2009-11-12 21:53:11 +01:00
|
|
|
break;
|
2010-01-08 15:25:38 +01:00
|
|
|
}
|
2009-11-12 21:53:11 +01:00
|
|
|
|
2009-12-18 12:01:12 +01:00
|
|
|
d = dest + (rom->addr - addr);
|
2009-11-12 21:53:11 +01:00
|
|
|
s = rom->data;
|
2013-02-19 05:41:11 +01:00
|
|
|
l = rom->datasize;
|
2009-11-12 21:53:11 +01:00
|
|
|
|
|
|
|
if ((d + l) > (dest + size)) {
|
|
|
|
l = dest - d;
|
|
|
|
}
|
|
|
|
|
2013-08-06 20:45:39 +02:00
|
|
|
if (l > 0) {
|
|
|
|
memcpy(d, s, l);
|
|
|
|
}
|
2013-02-19 05:41:11 +01:00
|
|
|
|
|
|
|
if (rom->romsize > rom->datasize) {
|
|
|
|
/* If datasize is less than romsize, it means that we didn't
|
|
|
|
* allocate all the ROM because the trailing data are only zeros.
|
|
|
|
*/
|
|
|
|
|
|
|
|
d += l;
|
|
|
|
l = rom->romsize - rom->datasize;
|
|
|
|
|
|
|
|
if ((d + l) > (dest + size)) {
|
|
|
|
/* Rom size doesn't fit in the destination area. Adjust to avoid
|
|
|
|
* overflow.
|
|
|
|
*/
|
|
|
|
l = dest - d;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (l > 0) {
|
|
|
|
memset(d, 0x0, l);
|
|
|
|
}
|
|
|
|
}
|
2009-11-12 21:53:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return (d + l) - dest;
|
|
|
|
}
|
|
|
|
|
2018-06-26 11:35:40 +02:00
|
|
|
void *rom_ptr(hwaddr addr, size_t size)
|
2009-10-07 13:37:06 +02:00
|
|
|
{
|
|
|
|
Rom *rom;
|
|
|
|
|
2018-06-26 11:35:40 +02:00
|
|
|
rom = find_rom(addr, size);
|
2009-10-07 13:37:06 +02:00
|
|
|
if (!rom || !rom->data)
|
|
|
|
return NULL;
|
2009-12-18 12:01:12 +01:00
|
|
|
return rom->data + (addr - rom->addr);
|
2009-10-07 13:37:06 +02:00
|
|
|
}
|
|
|
|
|
2021-03-18 18:48:22 +01:00
|
|
|
typedef struct FindRomCBData {
|
|
|
|
size_t size; /* Amount of data we want from ROM, in bytes */
|
|
|
|
MemoryRegion *mr; /* MR at the unaliased guest addr */
|
|
|
|
hwaddr xlat; /* Offset of addr within mr */
|
|
|
|
void *rom; /* Output: rom data pointer, if found */
|
|
|
|
} FindRomCBData;
|
|
|
|
|
|
|
|
static bool find_rom_cb(Int128 start, Int128 len, const MemoryRegion *mr,
|
|
|
|
hwaddr offset_in_region, void *opaque)
|
|
|
|
{
|
|
|
|
FindRomCBData *cbdata = opaque;
|
|
|
|
hwaddr alias_addr;
|
|
|
|
|
|
|
|
if (mr != cbdata->mr) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
alias_addr = int128_get64(start) + cbdata->xlat - offset_in_region;
|
|
|
|
cbdata->rom = rom_ptr(alias_addr, cbdata->size);
|
|
|
|
if (!cbdata->rom) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
/* Found a match, stop iterating */
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void *rom_ptr_for_as(AddressSpace *as, hwaddr addr, size_t size)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Find any ROM data for the given guest address range. If there
|
|
|
|
* is a ROM blob then return a pointer to the host memory
|
|
|
|
* corresponding to 'addr'; otherwise return NULL.
|
|
|
|
*
|
|
|
|
* We look not only for ROM blobs that were loaded directly to
|
|
|
|
* addr, but also for ROM blobs that were loaded to aliases of
|
|
|
|
* that memory at other addresses within the AddressSpace.
|
|
|
|
*
|
|
|
|
* Note that we do not check @as against the 'as' member in the
|
|
|
|
* 'struct Rom' returned by rom_ptr(). The Rom::as is the
|
|
|
|
* AddressSpace which the rom blob should be written to, whereas
|
|
|
|
* our @as argument is the AddressSpace which we are (effectively)
|
|
|
|
* reading from, and the same underlying RAM will often be visible
|
|
|
|
* in multiple AddressSpaces. (A common example is a ROM blob
|
|
|
|
* written to the 'system' address space but then read back via a
|
|
|
|
* CPU's cpu->as pointer.) This does mean we might potentially
|
|
|
|
* return a false-positive match if a ROM blob was loaded into an
|
|
|
|
* AS which is entirely separate and distinct from the one we're
|
|
|
|
* querying, but this issue exists also for rom_ptr() and hasn't
|
|
|
|
* caused any problems in practice.
|
|
|
|
*/
|
|
|
|
FlatView *fv;
|
|
|
|
void *rom;
|
|
|
|
hwaddr len_unused;
|
|
|
|
FindRomCBData cbdata = {};
|
|
|
|
|
|
|
|
/* Easy case: there's data at the actual address */
|
|
|
|
rom = rom_ptr(addr, size);
|
|
|
|
if (rom) {
|
|
|
|
return rom;
|
|
|
|
}
|
|
|
|
|
|
|
|
RCU_READ_LOCK_GUARD();
|
|
|
|
|
|
|
|
fv = address_space_to_flatview(as);
|
|
|
|
cbdata.mr = flatview_translate(fv, addr, &cbdata.xlat, &len_unused,
|
|
|
|
false, MEMTXATTRS_UNSPECIFIED);
|
|
|
|
if (!cbdata.mr) {
|
|
|
|
/* Nothing at this address, so there can't be any aliasing */
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
cbdata.size = size;
|
|
|
|
flatview_for_each_range(fv, find_rom_cb, &cbdata);
|
|
|
|
return cbdata.rom;
|
|
|
|
}
|
|
|
|
|
2021-09-08 11:35:43 +02:00
|
|
|
HumanReadableText *qmp_x_query_roms(Error **errp)
|
2009-10-01 16:42:33 +02:00
|
|
|
{
|
|
|
|
Rom *rom;
|
2021-09-08 11:35:43 +02:00
|
|
|
g_autoptr(GString) buf = g_string_new("");
|
2009-10-01 16:42:33 +02:00
|
|
|
|
|
|
|
QTAILQ_FOREACH(rom, &roms, next) {
|
2013-08-19 16:26:55 +02:00
|
|
|
if (rom->mr) {
|
2021-09-08 11:35:43 +02:00
|
|
|
g_string_append_printf(buf, "%s"
|
|
|
|
" size=0x%06zx name=\"%s\"\n",
|
|
|
|
memory_region_name(rom->mr),
|
|
|
|
rom->romsize,
|
|
|
|
rom->name);
|
2013-08-19 16:26:55 +02:00
|
|
|
} else if (!rom->fw_file) {
|
2021-09-08 11:35:43 +02:00
|
|
|
g_string_append_printf(buf, "addr=" TARGET_FMT_plx
|
|
|
|
" size=0x%06zx mem=%s name=\"%s\"\n",
|
|
|
|
rom->addr, rom->romsize,
|
|
|
|
rom->isrom ? "rom" : "ram",
|
|
|
|
rom->name);
|
2009-12-18 12:01:12 +01:00
|
|
|
} else {
|
2021-09-08 11:35:43 +02:00
|
|
|
g_string_append_printf(buf, "fw=%s/%s"
|
|
|
|
" size=0x%06zx name=\"%s\"\n",
|
|
|
|
rom->fw_dir,
|
|
|
|
rom->fw_file,
|
|
|
|
rom->romsize,
|
|
|
|
rom->name);
|
2009-12-18 12:01:12 +01:00
|
|
|
}
|
2009-10-01 16:42:33 +02:00
|
|
|
}
|
2021-09-08 11:35:43 +02:00
|
|
|
|
|
|
|
return human_readable_text_from_str(buf);
|
2009-10-01 16:42:33 +02:00
|
|
|
}
|
2018-08-16 15:05:28 +02:00
|
|
|
|
|
|
|
typedef enum HexRecord HexRecord;
|
|
|
|
enum HexRecord {
|
|
|
|
DATA_RECORD = 0,
|
|
|
|
EOF_RECORD,
|
|
|
|
EXT_SEG_ADDR_RECORD,
|
|
|
|
START_SEG_ADDR_RECORD,
|
|
|
|
EXT_LINEAR_ADDR_RECORD,
|
|
|
|
START_LINEAR_ADDR_RECORD,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Each record contains a 16-bit address which is combined with the upper 16
|
|
|
|
* bits of the implicit "next address" to form a 32-bit address.
|
|
|
|
*/
|
|
|
|
#define NEXT_ADDR_MASK 0xffff0000
|
|
|
|
|
|
|
|
#define DATA_FIELD_MAX_LEN 0xff
|
|
|
|
#define LEN_EXCEPT_DATA 0x5
|
|
|
|
/* 0x5 = sizeof(byte_count) + sizeof(address) + sizeof(record_type) +
|
|
|
|
* sizeof(checksum) */
|
|
|
|
typedef struct {
|
|
|
|
uint8_t byte_count;
|
|
|
|
uint16_t address;
|
|
|
|
uint8_t record_type;
|
|
|
|
uint8_t data[DATA_FIELD_MAX_LEN];
|
|
|
|
uint8_t checksum;
|
|
|
|
} HexLine;
|
|
|
|
|
|
|
|
/* return 0 or -1 if error */
|
|
|
|
static bool parse_record(HexLine *line, uint8_t *our_checksum, const uint8_t c,
|
|
|
|
uint32_t *index, const bool in_process)
|
|
|
|
{
|
|
|
|
/* +-------+---------------+-------+---------------------+--------+
|
|
|
|
* | byte | |record | | |
|
|
|
|
* | count | address | type | data |checksum|
|
|
|
|
* +-------+---------------+-------+---------------------+--------+
|
|
|
|
* ^ ^ ^ ^ ^ ^
|
|
|
|
* |1 byte | 2 bytes |1 byte | 0-255 bytes | 1 byte |
|
|
|
|
*/
|
|
|
|
uint8_t value = 0;
|
|
|
|
uint32_t idx = *index;
|
|
|
|
/* ignore space */
|
|
|
|
if (g_ascii_isspace(c)) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
if (!g_ascii_isxdigit(c) || !in_process) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
value = g_ascii_xdigit_value(c);
|
|
|
|
value = (idx & 0x1) ? (value & 0xf) : (value << 4);
|
|
|
|
if (idx < 2) {
|
|
|
|
line->byte_count |= value;
|
|
|
|
} else if (2 <= idx && idx < 6) {
|
|
|
|
line->address <<= 4;
|
|
|
|
line->address += g_ascii_xdigit_value(c);
|
|
|
|
} else if (6 <= idx && idx < 8) {
|
|
|
|
line->record_type |= value;
|
|
|
|
} else if (8 <= idx && idx < 8 + 2 * line->byte_count) {
|
|
|
|
line->data[(idx - 8) >> 1] |= value;
|
|
|
|
} else if (8 + 2 * line->byte_count <= idx &&
|
|
|
|
idx < 10 + 2 * line->byte_count) {
|
|
|
|
line->checksum |= value;
|
|
|
|
} else {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
*our_checksum += value;
|
|
|
|
++(*index);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
const char *filename;
|
|
|
|
HexLine line;
|
|
|
|
uint8_t *bin_buf;
|
|
|
|
hwaddr *start_addr;
|
|
|
|
int total_size;
|
|
|
|
uint32_t next_address_to_write;
|
|
|
|
uint32_t current_address;
|
|
|
|
uint32_t current_rom_index;
|
|
|
|
uint32_t rom_start_address;
|
|
|
|
AddressSpace *as;
|
2020-04-03 21:11:49 +02:00
|
|
|
bool complete;
|
2018-08-16 15:05:28 +02:00
|
|
|
} HexParser;
|
|
|
|
|
|
|
|
/* return size or -1 if error */
|
|
|
|
static int handle_record_type(HexParser *parser)
|
|
|
|
{
|
|
|
|
HexLine *line = &(parser->line);
|
|
|
|
switch (line->record_type) {
|
|
|
|
case DATA_RECORD:
|
|
|
|
parser->current_address =
|
|
|
|
(parser->next_address_to_write & NEXT_ADDR_MASK) | line->address;
|
|
|
|
/* verify this is a contiguous block of memory */
|
|
|
|
if (parser->current_address != parser->next_address_to_write) {
|
|
|
|
if (parser->current_rom_index != 0) {
|
|
|
|
rom_add_blob_fixed_as(parser->filename, parser->bin_buf,
|
|
|
|
parser->current_rom_index,
|
|
|
|
parser->rom_start_address, parser->as);
|
|
|
|
}
|
|
|
|
parser->rom_start_address = parser->current_address;
|
|
|
|
parser->current_rom_index = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* copy from line buffer to output bin_buf */
|
|
|
|
memcpy(parser->bin_buf + parser->current_rom_index, line->data,
|
|
|
|
line->byte_count);
|
|
|
|
parser->current_rom_index += line->byte_count;
|
|
|
|
parser->total_size += line->byte_count;
|
|
|
|
/* save next address to write */
|
|
|
|
parser->next_address_to_write =
|
|
|
|
parser->current_address + line->byte_count;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case EOF_RECORD:
|
|
|
|
if (parser->current_rom_index != 0) {
|
|
|
|
rom_add_blob_fixed_as(parser->filename, parser->bin_buf,
|
|
|
|
parser->current_rom_index,
|
|
|
|
parser->rom_start_address, parser->as);
|
|
|
|
}
|
2020-04-03 21:11:49 +02:00
|
|
|
parser->complete = true;
|
2018-08-16 15:05:28 +02:00
|
|
|
return parser->total_size;
|
|
|
|
case EXT_SEG_ADDR_RECORD:
|
|
|
|
case EXT_LINEAR_ADDR_RECORD:
|
|
|
|
if (line->byte_count != 2 && line->address != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (parser->current_rom_index != 0) {
|
|
|
|
rom_add_blob_fixed_as(parser->filename, parser->bin_buf,
|
|
|
|
parser->current_rom_index,
|
|
|
|
parser->rom_start_address, parser->as);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* save next address to write,
|
|
|
|
* in case of non-contiguous block of memory */
|
|
|
|
parser->next_address_to_write = (line->data[0] << 12) |
|
|
|
|
(line->data[1] << 4);
|
|
|
|
if (line->record_type == EXT_LINEAR_ADDR_RECORD) {
|
|
|
|
parser->next_address_to_write <<= 12;
|
|
|
|
}
|
|
|
|
|
|
|
|
parser->rom_start_address = parser->next_address_to_write;
|
|
|
|
parser->current_rom_index = 0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case START_SEG_ADDR_RECORD:
|
|
|
|
if (line->byte_count != 4 && line->address != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* x86 16-bit CS:IP segmented addressing */
|
|
|
|
*(parser->start_addr) = (((line->data[0] << 8) | line->data[1]) << 4) +
|
|
|
|
((line->data[2] << 8) | line->data[3]);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case START_LINEAR_ADDR_RECORD:
|
|
|
|
if (line->byte_count != 4 && line->address != 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
*(parser->start_addr) = ldl_be_p(line->data);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return parser->total_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* return size or -1 if error */
|
|
|
|
static int parse_hex_blob(const char *filename, hwaddr *addr, uint8_t *hex_blob,
|
|
|
|
size_t hex_blob_size, AddressSpace *as)
|
|
|
|
{
|
|
|
|
bool in_process = false; /* avoid re-enter and
|
|
|
|
* check whether record begin with ':' */
|
|
|
|
uint8_t *end = hex_blob + hex_blob_size;
|
|
|
|
uint8_t our_checksum = 0;
|
|
|
|
uint32_t record_index = 0;
|
|
|
|
HexParser parser = {
|
|
|
|
.filename = filename,
|
|
|
|
.bin_buf = g_malloc(hex_blob_size),
|
|
|
|
.start_addr = addr,
|
|
|
|
.as = as,
|
2020-04-03 21:11:49 +02:00
|
|
|
.complete = false
|
2018-08-16 15:05:28 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
rom_transaction_begin();
|
|
|
|
|
2020-04-03 21:11:49 +02:00
|
|
|
for (; hex_blob < end && !parser.complete; ++hex_blob) {
|
2018-08-16 15:05:28 +02:00
|
|
|
switch (*hex_blob) {
|
|
|
|
case '\r':
|
|
|
|
case '\n':
|
|
|
|
if (!in_process) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
in_process = false;
|
|
|
|
if ((LEN_EXCEPT_DATA + parser.line.byte_count) * 2 !=
|
|
|
|
record_index ||
|
|
|
|
our_checksum != 0) {
|
|
|
|
parser.total_size = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (handle_record_type(&parser) == -1) {
|
|
|
|
parser.total_size = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* start of a new record. */
|
|
|
|
case ':':
|
|
|
|
memset(&parser.line, 0, sizeof(HexLine));
|
|
|
|
in_process = true;
|
|
|
|
record_index = 0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* decoding lines */
|
|
|
|
default:
|
|
|
|
if (!parse_record(&parser.line, &our_checksum, *hex_blob,
|
|
|
|
&record_index, in_process)) {
|
|
|
|
parser.total_size = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
g_free(parser.bin_buf);
|
|
|
|
rom_transaction_end(parser.total_size != -1);
|
|
|
|
return parser.total_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* return size or -1 if error */
|
|
|
|
int load_targphys_hex_as(const char *filename, hwaddr *entry, AddressSpace *as)
|
|
|
|
{
|
|
|
|
gsize hex_blob_size;
|
|
|
|
gchar *hex_blob;
|
|
|
|
int total_size = 0;
|
|
|
|
|
|
|
|
if (!g_file_get_contents(filename, &hex_blob, &hex_blob_size, NULL)) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
total_size = parse_hex_blob(filename, entry, (uint8_t *)hex_blob,
|
|
|
|
hex_blob_size, as);
|
|
|
|
|
|
|
|
g_free(hex_blob);
|
|
|
|
return total_size;
|
|
|
|
}
|