[U-Boot] [RFC v2 09/11] cmd: bootefi: carve out do_boot_efi() from do_bootefi()

Heinrich Schuchardt xypron.glpk at gmx.de
Fri Apr 12 09:01:05 UTC 2019



On 4/12/19 9:22 AM, AKASHI Takahiro wrote:
> On Fri, Apr 12, 2019 at 07:59:51AM +0200, Heinrich Schuchardt wrote:
>> On 3/27/19 5:40 AM, AKASHI Takahiro wrote:
>>> This is a preparatory patch for reworking do_bootefi() in later patch.
>>> All the non-boot-manager-based (that is, bootefi <addr>) code is put
>>> into one function, do_boot_efi().
>>>
>>> Signed-off-by: AKASHI Takahiro <takahiro.akashi at linaro.org>
>>> ---
>>>  cmd/bootefi.c | 122 ++++++++++++++++++++++++++++----------------------
>>>  1 file changed, 68 insertions(+), 54 deletions(-)
>>>
>>> diff --git a/cmd/bootefi.c b/cmd/bootefi.c
>>> index 94b5bdeed3f1..39a0712af6ad 100644
>>> --- a/cmd/bootefi.c
>>> +++ b/cmd/bootefi.c
>>> @@ -355,6 +355,73 @@ static int do_efibootmgr(const char *fdt_opt)
>>>  	return 0;
>>>  }
>>>
>>> +/*
>>> + * do_boot_efi() - execute EFI binary from command line
>>> + *
>>> + * @image_opt:	string of image start address
>>> + * @fdt_opt:	string of fdt start address
>>> + * Return:	status code
>>> + *
>>> + * Set up memory image for the binary to be loaded, prepare
>>> + * device path and then call do_bootefi_exec() to execute it.
>>> + */
>>> +static int do_boot_efi(const char *image_opt, const char *fdt_opt)
>>> +{
>>> +	unsigned long addr;
>>> +	char *saddr;
>>> +	efi_status_t ret;
>>> +	unsigned long fdt_addr;
>>> +
>>> +	/* Allow unaligned memory access */
>>> +	allow_unaligned();
>>> +
>>> +	switch_to_non_secure_mode();
>>
>> The two call above should be moved to efi_init_obj_list().
>
> Same comment as in patch#8/11
>
>>> +
>>> +	/* Initialize EFI drivers */
>>> +	ret = efi_init_obj_list();
>>> +	if (ret != EFI_SUCCESS) {
>>> +		printf("Error: Cannot initialize UEFI sub-system, r = %lu\n",
>>> +		       ret & ~EFI_ERROR_MASK);
>>> +		return CMD_RET_FAILURE;
>>> +	}
>>> +
>>> +	ret = efi_install_fdt(fdt_opt);
>>> +	if (ret != EFI_SUCCESS)
>>> +		return CMD_RET_FAILURE;
>>> +
>>> +#ifdef CONFIG_CMD_BOOTEFI_HELLO
>>> +	if (!strcmp(argv[1], "hello")) {
>>> +		ulong size = __efi_helloworld_end - __efi_helloworld_begin;
>>> +
>>> +		saddr = env_get("loadaddr");
>>> +		if (saddr)
>>> +			addr = simple_strtoul(saddr, NULL, 16);
>>> +		else
>>> +			addr = CONFIG_SYS_LOAD_ADDR;
>>> +		memcpy(map_sysmem(addr, size), __efi_helloworld_begin, size);
>>> +	} else
>>> +#endif
>>> +	{
>>> +		saddr = argv[1];
>>> +
>>> +		addr = simple_strtoul(saddr, NULL, 16);
>>> +		/* Check that a numeric value was passed */
>>> +		if (!addr && *saddr != '0')
>>> +			return CMD_RET_USAGE;
>>> +	}
>>> +
>>> +	printf("## Starting EFI application at %08lx ...\n", addr);
>>
>> Shouldn't this be debug() in efi_start_image()?
>
> Okay, and application -> image
> # but I'm not sure that this information is useful.

When debugging I would be more interested in the address to which the
image is loaded so that I have the offset at hand to load the text
symbols into gdb.

I am happy if you simply drop this entry address output.

Regards

Heinrich

>
> -Takahiro Akashi
>
>
>> Best regards
>>
>> Heinrich
>>
>>> +	ret = do_bootefi_exec(map_sysmem(addr, 0), bootefi_device_path,
>>> +			      bootefi_image_path);
>>> +	printf("## Application terminated, r = %lu\n",
>>> +	       ret & ~EFI_ERROR_MASK);
>>> +
>>> +	if (ret != EFI_SUCCESS)
>>> +		return CMD_RET_FAILURE;
>>> +	else
>>> +		return CMD_RET_SUCCESS;
>>> +}
>>> +
>>>  #ifdef CONFIG_CMD_BOOTEFI_SELFTEST
>>>  static efi_status_t bootefi_run_prepare(const char *load_options_path,
>>>  		struct efi_device_path *device_path,
>>> @@ -481,11 +548,6 @@ static int do_efi_selftest(const char *fdt_opt)
>>>  /* Interpreter command to boot an arbitrary EFI image from memory */
>>>  static int do_bootefi(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
>>>  {
>>> -	unsigned long addr;
>>> -	char *saddr;
>>> -	efi_status_t r;
>>> -	unsigned long fdt_addr;
>>> -
>>>  	if (argc < 2)
>>>  		return CMD_RET_USAGE;
>>>
>>> @@ -496,55 +558,7 @@ static int do_bootefi(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
>>>  		return do_efi_selftest(argc > 2 ? argv[2] : NULL);
>>>  #endif
>>>
>>> -	/* Allow unaligned memory access */
>>> -	allow_unaligned();
>>> -
>>> -	switch_to_non_secure_mode();
>>> -
>>> -	/* Initialize EFI drivers */
>>> -	r = efi_init_obj_list();
>>> -	if (r != EFI_SUCCESS) {
>>> -		printf("Error: Cannot set up EFI drivers, r = %lu\n",
>>> -		       r & ~EFI_ERROR_MASK);
>>> -		return CMD_RET_FAILURE;
>>> -	}
>>> -
>>> -	r = fdt_install_fdt(argc > 2 ? argv[2] : NULL);
>>> -	if (r != EFI_SUCCESS)
>>> -		return r;
>>> -
>>> -#ifdef CONFIG_CMD_BOOTEFI_HELLO
>>> -	if (!strcmp(argv[1], "hello")) {
>>> -		ulong size = __efi_helloworld_end - __efi_helloworld_begin;
>>> -
>>> -		saddr = env_get("loadaddr");
>>> -		if (saddr)
>>> -			addr = simple_strtoul(saddr, NULL, 16);
>>> -		else
>>> -			addr = CONFIG_SYS_LOAD_ADDR;
>>> -		memcpy(map_sysmem(addr, size), __efi_helloworld_begin, size);
>>> -	} else
>>> -#endif
>>> -	{
>>> -		saddr = argv[1];
>>> -
>>> -		addr = simple_strtoul(saddr, NULL, 16);
>>> -		/* Check that a numeric value was passed */
>>> -		if (!addr && *saddr != '0')
>>> -			return CMD_RET_USAGE;
>>> -
>>> -	}
>>> -
>>> -	printf("## Starting EFI application at %08lx ...\n", addr);
>>> -	r = do_bootefi_exec(map_sysmem(addr, 0), bootefi_device_path,
>>> -			    bootefi_image_path);
>>> -	printf("## Application terminated, r = %lu\n",
>>> -	       r & ~EFI_ERROR_MASK);
>>> -
>>> -	if (r != EFI_SUCCESS)
>>> -		return 1;
>>> -	else
>>> -		return 0;
>>> +	return do_boot_efi(argv[1], argc > 2 ? argv[2] : NULL);
>>>  }
>>>
>>>  #ifdef CONFIG_SYS_LONGHELP
>>>
>>
>


More information about the U-Boot mailing list