Files
u-boot/lib/efi_client/app_run.c
Simon Glass e6f9a0ae58 boot: Show the device path for EFI bootflows
If the bootflow relates to the EFI bootmeth, show the device path along
with the other info.

Signed-off-by: Simon Glass <sjg@chromium.org>
2025-08-28 05:21:49 -06:00

110 lines
2.6 KiB
C

// SPDX-License-Identifier: GPL-2.0+
/*
* Running programs from the EFI app
*
* Copyright 2024 Linaro Limited
* Copyright 2024 Canonical Ltd
*/
#include <bootm.h>
#include <dm.h>
#include <efi.h>
#include <efi_api.h>
#include <efi_device_path.h>
#include <log.h>
#include <malloc.h>
/**
* do_bootefi_exec() - execute EFI binary
*
* The image indicated by @handle is started. When it returns the allocated
* memory for the @load_options is freed.
*
* @handle: handle of loaded image
* @load_options: load options
* Return: status code
*/
static efi_status_t do_bootefi_exec(efi_handle_t handle, void *load_options)
{
struct efi_boot_services *boot = efi_get_boot();
efi_uintn_t exit_data_size = 0;
u16 *exit_data = NULL;
efi_status_t ret;
/* On ARM switch from EL3 or secure mode to EL2 or non-secure mode */
if (!IS_ENABLED(CONFIG_EFI_APP))
switch_to_non_secure_mode();
/* TODO(sjg@chromium.org): Set watchdog */
/* Call our payload! */
ret = boot->start_image(handle, &exit_data_size, &exit_data);
if (ret != EFI_SUCCESS) {
log_err("## Application failed, r = %lu\n",
ret & ~EFI_ERROR_MASK);
if (exit_data) {
log_err("## %ls\n", exit_data);
boot->free_pool(exit_data);
}
}
free(load_options);
/* TODO(sjg@chromium.org): Disable watchdog */
return ret;
}
efi_status_t efi_run_image(void *source_buffer, efi_uintn_t source_size,
struct efi_device_path *dp_dev,
struct efi_device_path *dp_img)
{
struct efi_boot_services *boot = efi_get_boot();
efi_handle_t handle;
struct efi_device_path *msg_path, *file_path;
efi_status_t ret;
file_path = efi_dp_concat(dp_dev, dp_img, 0);
msg_path = dp_img;
log_info("Booting %pD\n", msg_path);
ret = boot->load_image(false, efi_get_parent_image(), file_path,
source_buffer, source_size, &handle);
if (ret != EFI_SUCCESS) {
log_err("Loading image failed\n");
goto out;
}
ret = do_bootefi_exec(handle, NULL);
out:
return ret;
}
efi_status_t efi_binary_run_dp(void *image, size_t size, void *fdt,
void *initrd, size_t initrd_sz,
struct efi_device_path *dp_dev,
struct efi_device_path *dp_img)
{
return efi_run_image(image, size, dp_dev, dp_img);
}
int efi_dp_from_bootdev(const struct udevice *dev,
const struct efi_device_path **dpp)
{
const struct udevice *media = dev_get_parent(dev);
const struct efi_media_plat *plat;
log_debug("dev '%s': uclass ID %d\n", media->name,
device_get_uclass_id(media));
if (device_get_uclass_id(media) != UCLASS_EFI_MEDIA)
return log_msg_ret("efb", -ENOTSUPP);
plat = dev_get_plat(media);
*dpp = plat->device_path;
return 0;
}