Blame view

cmd/elf.c 14.3 KB
89789ebd7   Tom Rini   cmd/elf.c: Add SP...
1
  // SPDX-License-Identifier: BSD-2-Clause
458ded34b   wdenk   Initial revision
2
3
4
  /*
   * Copyright (c) 2001 William L. Pitts
   * All rights reserved.
458ded34b   wdenk   Initial revision
5
6
7
8
   */
  
  #include <common.h>
  #include <command.h>
62270f439   Simon Glass   common: Move some...
9
  #include <cpu_func.h>
458ded34b   wdenk   Initial revision
10
  #include <elf.h>
cdbff9fc4   Simon Glass   env: Move env_get...
11
  #include <env.h>
8e8ccfe1a   Simon Glass   common: Move the ...
12
  #include <image.h>
ebca3df78   Bin Meng   cmd: Clean up cmd...
13
  #include <net.h>
29a4c24de   Niklaus Giger   cmd_elf.c: Cleanu...
14
  #include <vxworks.h>
b90ff0fda   Bin Meng   cmd: bootvx: Pass...
15
  #ifdef CONFIG_X86
447ae4f7a   Bin Meng   bootvx: x86: Make...
16
  #include <vbe.h>
b90ff0fda   Bin Meng   cmd: bootvx: Pass...
17
  #include <asm/e820.h>
9aa1280a5   Bin Meng   cmd: bootvx: Add ...
18
  #include <linux/linkage.h>
b90ff0fda   Bin Meng   cmd: bootvx: Pass...
19
  #endif
458ded34b   wdenk   Initial revision
20

9dffa52da   Bin Meng   cmd: elf: Reorder...
21
  /*
839c4e9c5   Bin Meng   elf: Add a very s...
22
   * A very simple ELF64 loader, assumes the image is valid, returns the
9dffa52da   Bin Meng   cmd: elf: Reorder...
23
   * entry point address.
839c4e9c5   Bin Meng   elf: Add a very s...
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
   *
   * Note if U-Boot is 32-bit, the loader assumes the to segment's
   * physical address and size is within the lower 32-bit address space.
   */
  static unsigned long load_elf64_image_phdr(unsigned long addr)
  {
  	Elf64_Ehdr *ehdr; /* Elf header structure pointer */
  	Elf64_Phdr *phdr; /* Program header structure pointer */
  	int i;
  
  	ehdr = (Elf64_Ehdr *)addr;
  	phdr = (Elf64_Phdr *)(addr + (ulong)ehdr->e_phoff);
  
  	/* Load each program header */
  	for (i = 0; i < ehdr->e_phnum; ++i) {
  		void *dst = (void *)(ulong)phdr->p_paddr;
  		void *src = (void *)addr + phdr->p_offset;
  
  		debug("Loading phdr %i to 0x%p (%lu bytes)
  ",
  		      i, dst, (ulong)phdr->p_filesz);
  		if (phdr->p_filesz)
  			memcpy(dst, src, phdr->p_filesz);
  		if (phdr->p_filesz != phdr->p_memsz)
  			memset(dst + phdr->p_filesz, 0x00,
  			       phdr->p_memsz - phdr->p_filesz);
957f51e86   Kurban Mallachiev   elf: fix cache fl...
50
51
  		flush_cache(rounddown((unsigned long)dst, ARCH_DMA_MINALIGN),
  			    roundup(phdr->p_memsz, ARCH_DMA_MINALIGN));
839c4e9c5   Bin Meng   elf: Add a very s...
52
53
  		++phdr;
  	}
2846ea81a   Rob Bracero   elf: Add support ...
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
  	if (ehdr->e_machine == EM_PPC64 && (ehdr->e_flags &
  					    EF_PPC64_ELFV1_ABI)) {
  		/*
  		 * For the 64-bit PowerPC ELF V1 ABI, e_entry is a function
  		 * descriptor pointer with the first double word being the
  		 * address of the entry point of the function.
  		 */
  		uintptr_t addr = ehdr->e_entry;
  
  		return *(Elf64_Addr *)addr;
  	}
  
  	return ehdr->e_entry;
  }
  
  static unsigned long load_elf64_image_shdr(unsigned long addr)
  {
  	Elf64_Ehdr *ehdr; /* Elf header structure pointer */
  	Elf64_Shdr *shdr; /* Section header structure pointer */
  	unsigned char *strtab = 0; /* String table pointer */
  	unsigned char *image; /* Binary image pointer */
  	int i; /* Loop counter */
  
  	ehdr = (Elf64_Ehdr *)addr;
  
  	/* Find the section header string table for output info */
  	shdr = (Elf64_Shdr *)(addr + (ulong)ehdr->e_shoff +
  			     (ehdr->e_shstrndx * sizeof(Elf64_Shdr)));
  
  	if (shdr->sh_type == SHT_STRTAB)
  		strtab = (unsigned char *)(addr + (ulong)shdr->sh_offset);
  
  	/* Load each appropriate section */
  	for (i = 0; i < ehdr->e_shnum; ++i) {
  		shdr = (Elf64_Shdr *)(addr + (ulong)ehdr->e_shoff +
  				     (i * sizeof(Elf64_Shdr)));
  
  		if (!(shdr->sh_flags & SHF_ALLOC) ||
  		    shdr->sh_addr == 0 || shdr->sh_size == 0) {
  			continue;
  		}
  
  		if (strtab) {
  			debug("%sing %s @ 0x%08lx (%ld bytes)
  ",
  			      (shdr->sh_type == SHT_NOBITS) ? "Clear" : "Load",
  			       &strtab[shdr->sh_name],
  			       (unsigned long)shdr->sh_addr,
  			       (long)shdr->sh_size);
  		}
  
  		if (shdr->sh_type == SHT_NOBITS) {
  			memset((void *)(uintptr_t)shdr->sh_addr, 0,
  			       shdr->sh_size);
  		} else {
  			image = (unsigned char *)addr + (ulong)shdr->sh_offset;
  			memcpy((void *)(uintptr_t)shdr->sh_addr,
  			       (const void *)image, shdr->sh_size);
  		}
8744d6c50   Neil Stainton   u-boot: align cac...
113
114
115
116
  		flush_cache(rounddown(shdr->sh_addr, ARCH_DMA_MINALIGN),
  			    roundup((shdr->sh_addr + shdr->sh_size),
  				     ARCH_DMA_MINALIGN) -
  			            rounddown(shdr->sh_addr, ARCH_DMA_MINALIGN));
2846ea81a   Rob Bracero   elf: Add support ...
117
118
119
120
121
122
123
124
125
126
127
128
129
  	}
  
  	if (ehdr->e_machine == EM_PPC64 && (ehdr->e_flags &
  					    EF_PPC64_ELFV1_ABI)) {
  		/*
  		 * For the 64-bit PowerPC ELF V1 ABI, e_entry is a function
  		 * descriptor pointer with the first double word being the
  		 * address of the entry point of the function.
  		 */
  		uintptr_t addr = ehdr->e_entry;
  
  		return *(Elf64_Addr *)addr;
  	}
839c4e9c5   Bin Meng   elf: Add a very s...
130
131
132
133
134
135
136
137
138
  	return ehdr->e_entry;
  }
  
  /*
   * A very simple ELF loader, assumes the image is valid, returns the
   * entry point address.
   *
   * The loader firstly reads the EFI class to see if it's a 64-bit image.
   * If yes, call the ELF64 loader. Otherwise continue with the ELF32 loader.
9dffa52da   Bin Meng   cmd: elf: Reorder...
139
140
141
142
143
144
145
146
   */
  static unsigned long load_elf_image_phdr(unsigned long addr)
  {
  	Elf32_Ehdr *ehdr; /* Elf header structure pointer */
  	Elf32_Phdr *phdr; /* Program header structure pointer */
  	int i;
  
  	ehdr = (Elf32_Ehdr *)addr;
839c4e9c5   Bin Meng   elf: Add a very s...
147
148
  	if (ehdr->e_ident[EI_CLASS] == ELFCLASS64)
  		return load_elf64_image_phdr(addr);
9dffa52da   Bin Meng   cmd: elf: Reorder...
149
150
151
152
153
154
  	phdr = (Elf32_Phdr *)(addr + ehdr->e_phoff);
  
  	/* Load each program header */
  	for (i = 0; i < ehdr->e_phnum; ++i) {
  		void *dst = (void *)(uintptr_t)phdr->p_paddr;
  		void *src = (void *)addr + phdr->p_offset;
839c4e9c5   Bin Meng   elf: Add a very s...
155

9dffa52da   Bin Meng   cmd: elf: Reorder...
156
157
158
159
160
161
162
163
  		debug("Loading phdr %i to 0x%p (%i bytes)
  ",
  		      i, dst, phdr->p_filesz);
  		if (phdr->p_filesz)
  			memcpy(dst, src, phdr->p_filesz);
  		if (phdr->p_filesz != phdr->p_memsz)
  			memset(dst + phdr->p_filesz, 0x00,
  			       phdr->p_memsz - phdr->p_filesz);
957f51e86   Kurban Mallachiev   elf: fix cache fl...
164
165
  		flush_cache(rounddown((unsigned long)dst, ARCH_DMA_MINALIGN),
  			    roundup(phdr->p_memsz, ARCH_DMA_MINALIGN));
9dffa52da   Bin Meng   cmd: elf: Reorder...
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
  		++phdr;
  	}
  
  	return ehdr->e_entry;
  }
  
  static unsigned long load_elf_image_shdr(unsigned long addr)
  {
  	Elf32_Ehdr *ehdr; /* Elf header structure pointer */
  	Elf32_Shdr *shdr; /* Section header structure pointer */
  	unsigned char *strtab = 0; /* String table pointer */
  	unsigned char *image; /* Binary image pointer */
  	int i; /* Loop counter */
  
  	ehdr = (Elf32_Ehdr *)addr;
2846ea81a   Rob Bracero   elf: Add support ...
181
182
  	if (ehdr->e_ident[EI_CLASS] == ELFCLASS64)
  		return load_elf64_image_shdr(addr);
9dffa52da   Bin Meng   cmd: elf: Reorder...
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
  
  	/* Find the section header string table for output info */
  	shdr = (Elf32_Shdr *)(addr + ehdr->e_shoff +
  			     (ehdr->e_shstrndx * sizeof(Elf32_Shdr)));
  
  	if (shdr->sh_type == SHT_STRTAB)
  		strtab = (unsigned char *)(addr + shdr->sh_offset);
  
  	/* Load each appropriate section */
  	for (i = 0; i < ehdr->e_shnum; ++i) {
  		shdr = (Elf32_Shdr *)(addr + ehdr->e_shoff +
  				     (i * sizeof(Elf32_Shdr)));
  
  		if (!(shdr->sh_flags & SHF_ALLOC) ||
  		    shdr->sh_addr == 0 || shdr->sh_size == 0) {
  			continue;
  		}
  
  		if (strtab) {
  			debug("%sing %s @ 0x%08lx (%ld bytes)
  ",
  			      (shdr->sh_type == SHT_NOBITS) ? "Clear" : "Load",
  			       &strtab[shdr->sh_name],
  			       (unsigned long)shdr->sh_addr,
  			       (long)shdr->sh_size);
  		}
  
  		if (shdr->sh_type == SHT_NOBITS) {
  			memset((void *)(uintptr_t)shdr->sh_addr, 0,
  			       shdr->sh_size);
  		} else {
  			image = (unsigned char *)addr + shdr->sh_offset;
  			memcpy((void *)(uintptr_t)shdr->sh_addr,
  			       (const void *)image, shdr->sh_size);
  		}
18f201ea2   Neil Stainton   u-boot: align cac...
218
219
220
221
  		flush_cache(rounddown(shdr->sh_addr, ARCH_DMA_MINALIGN),
  			    roundup((shdr->sh_addr + shdr->sh_size),
  				    ARCH_DMA_MINALIGN) -
  			    rounddown(shdr->sh_addr, ARCH_DMA_MINALIGN));
9dffa52da   Bin Meng   cmd: elf: Reorder...
222
223
224
225
  	}
  
  	return ehdr->e_entry;
  }
017e9b792   Mike Frysinger   allow ports to ov...
226
227
  
  /* Allow ports to override the default behavior */
553d8c3a5   Jeroen Hofstee   common: cmd_elf: ...
228
  static unsigned long do_bootelf_exec(ulong (*entry)(int, char * const[]),
ebca3df78   Bin Meng   cmd: Clean up cmd...
229
  				     int argc, char * const argv[])
1f1d88dd4   Mike Frysinger   disable caches be...
230
  {
017e9b792   Mike Frysinger   allow ports to ov...
231
  	unsigned long ret;
1f1d88dd4   Mike Frysinger   disable caches be...
232
  	/*
017e9b792   Mike Frysinger   allow ports to ov...
233
234
235
  	 * pass address parameter as argv[0] (aka command name),
  	 * and all remaining args
  	 */
62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
236
  	ret = entry(argc, argv);
1f1d88dd4   Mike Frysinger   disable caches be...
237

017e9b792   Mike Frysinger   allow ports to ov...
238
239
  	return ret;
  }
458ded34b   wdenk   Initial revision
240

ebca3df78   Bin Meng   cmd: Clean up cmd...
241
  /*
62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
242
   * Determine if a valid ELF image exists at the given memory location.
ebca3df78   Bin Meng   cmd: Clean up cmd...
243
244
245
   * First look at the ELF header magic field, then make sure that it is
   * executable.
   */
62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
246
247
  int valid_elf_image(unsigned long addr)
  {
ebca3df78   Bin Meng   cmd: Clean up cmd...
248
  	Elf32_Ehdr *ehdr; /* Elf header structure pointer */
62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
249

ebca3df78   Bin Meng   cmd: Clean up cmd...
250
  	ehdr = (Elf32_Ehdr *)addr;
62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
251
252
253
254
255
256
257
258
259
260
261
262
  
  	if (!IS_ELF(*ehdr)) {
  		printf("## No elf image at address 0x%08lx
  ", addr);
  		return 0;
  	}
  
  	if (ehdr->e_type != ET_EXEC) {
  		printf("## Not a 32-bit elf image at address 0x%08lx
  ", addr);
  		return 0;
  	}
62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
263
264
  	return 1;
  }
ebca3df78   Bin Meng   cmd: Clean up cmd...
265
  /* Interpreter command to boot an arbitrary ELF image from memory */
62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
266
  int do_bootelf(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
458ded34b   wdenk   Initial revision
267
  {
ebca3df78   Bin Meng   cmd: Clean up cmd...
268
269
  	unsigned long addr; /* Address of the ELF image */
  	unsigned long rc; /* Return value from user code */
be1b8679c   Tom Rini   cmd/elf.c: Suppor...
270
  	char *sload = NULL;
00caae6d4   Simon Glass   env: Rename geten...
271
  	const char *ep = env_get("autostart");
458ded34b   wdenk   Initial revision
272
  	int rcode = 0;
be1b8679c   Tom Rini   cmd/elf.c: Suppor...
273
274
  	/* Consume 'bootelf' */
  	argc--; argv++;
f44a928e7   Mike Frysinger   cmd_elf: add an o...
275

be1b8679c   Tom Rini   cmd/elf.c: Suppor...
276
277
278
279
280
281
282
283
284
285
286
287
  	/* Check for flag. */
  	if (argc >= 1 && (argv[0][0] == '-' && \
  				(argv[0][1] == 'p' || argv[0][1] == 's'))) {
  		sload = argv[0];
  		/* Consume flag. */
  		argc--; argv++;
  	}
  	/* Check for address. */
  	if (argc >= 1 && strict_strtoul(argv[0], 16, &addr) != -EINVAL) {
  		/* Consume address */
  		argc--; argv++;
  	} else
bb872dd93   Simon Glass   image: Rename loa...
288
  		addr = image_load_addr;
458ded34b   wdenk   Initial revision
289

62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
290
  	if (!valid_elf_image(addr))
458ded34b   wdenk   Initial revision
291
  		return 1;
f44a928e7   Mike Frysinger   cmd_elf: add an o...
292
293
294
295
  	if (sload && sload[1] == 'p')
  		addr = load_elf_image_phdr(addr);
  	else
  		addr = load_elf_image_shdr(addr);
458ded34b   wdenk   Initial revision
296

44c8fd3ab   Siva Durga Prasad Paladugu   common: cmd_elf: ...
297
298
  	if (ep && !strcmp(ep, "no"))
  		return rcode;
62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
299
300
  	printf("## Starting application at 0x%08lx ...
  ", addr);
458ded34b   wdenk   Initial revision
301

458ded34b   wdenk   Initial revision
302
303
304
305
  	/*
  	 * pass address parameter as argv[0] (aka command name),
  	 * and all remaining args
  	 */
be1b8679c   Tom Rini   cmd/elf.c: Suppor...
306
  	rc = do_bootelf_exec((void *)addr, argc, argv);
458ded34b   wdenk   Initial revision
307
308
  	if (rc != 0)
  		rcode = 1;
62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
309
310
  	printf("## Application terminated, rc = 0x%lx
  ", rc);
ebca3df78   Bin Meng   cmd: Clean up cmd...
311

458ded34b   wdenk   Initial revision
312
313
  	return rcode;
  }
ebca3df78   Bin Meng   cmd: Clean up cmd...
314
  /*
458ded34b   wdenk   Initial revision
315
316
317
   * Interpreter command to boot VxWorks from a memory image.  The image can
   * be either an ELF image or a raw binary.  Will attempt to setup the
   * bootline and other parameters correctly.
ebca3df78   Bin Meng   cmd: Clean up cmd...
318
   */
62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
319
  int do_bootvx(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
458ded34b   wdenk   Initial revision
320
  {
ebca3df78   Bin Meng   cmd: Clean up cmd...
321
  	unsigned long addr; /* Address of image */
79c584e55   Bin Meng   bootvx: x86: Assi...
322
  	unsigned long bootaddr = 0; /* Address to put the bootline */
ebca3df78   Bin Meng   cmd: Clean up cmd...
323
324
325
  	char *bootline; /* Text of the bootline */
  	char *tmp; /* Temporary char pointer */
  	char build_buf[128]; /* Buffer for building the bootline */
7f0c3c51c   Bin Meng   cmd: bootvx: Avoi...
326
  	int ptr = 0;
b90ff0fda   Bin Meng   cmd: bootvx: Pass...
327
  #ifdef CONFIG_X86
2902be86c   Bin Meng   bootvx: x86: Prep...
328
  	ulong base;
fa5e91f77   Bin Meng   vxworks: x86: Ren...
329
  	struct e820_info *info;
45519924a   Bin Meng   x86: Rename e820e...
330
  	struct e820_entry *data;
447ae4f7a   Bin Meng   bootvx: x86: Make...
331
332
  	struct efi_gop_info *gop;
  	struct vesa_mode_info *vesa = &mode_info.vesa;
b90ff0fda   Bin Meng   cmd: bootvx: Pass...
333
  #endif
ebca3df78   Bin Meng   cmd: Clean up cmd...
334
335
  
  	/*
458ded34b   wdenk   Initial revision
336
337
338
  	 * Check the loadaddr variable.
  	 * If we don't know where the image is then we're done.
  	 */
07a1a0c93   Stany MARCEL   Correct vxWorks e...
339
  	if (argc < 2)
bb872dd93   Simon Glass   image: Rename loa...
340
  		addr = image_load_addr;
1bdd46832   Stefan Roese   [PATCH] common/cm...
341
  	else
07a1a0c93   Stany MARCEL   Correct vxWorks e...
342
  		addr = simple_strtoul(argv[1], NULL, 16);
458ded34b   wdenk   Initial revision
343

baa26db41   Jon Loeliger   common/cmd_[af]*:...
344
  #if defined(CONFIG_CMD_NET)
62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
345
  	/*
ebca3df78   Bin Meng   cmd: Clean up cmd...
346
347
  	 * Check to see if we need to tftp the image ourselves
  	 * before starting
62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
348
  	 */
07a1a0c93   Stany MARCEL   Correct vxWorks e...
349
  	if ((argc == 2) && (strcmp(argv[1], "tftp") == 0)) {
bc0571fc1   Joe Hershberger   net: cosmetic: Fi...
350
  		if (net_loop(TFTPGET) <= 0)
458ded34b   wdenk   Initial revision
351
  			return 1;
62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
352
353
354
  		printf("Automatic boot of VxWorks image at address 0x%08lx ...
  ",
  			addr);
458ded34b   wdenk   Initial revision
355
356
  	}
  #endif
ebca3df78   Bin Meng   cmd: Clean up cmd...
357
358
359
  	/*
  	 * This should equate to
  	 * NV_RAM_ADRS + NV_BOOT_OFFSET + NV_ENET_OFFSET
458ded34b   wdenk   Initial revision
360
361
362
  	 * from the VxWorks BSP header files.
  	 * This will vary from board to board
  	 */
8996975ff   Tuomas Tynkkynen   powerpc: Drop CON...
363
  #if defined(CONFIG_SYS_VXWORKS_MAC_PTR)
ebca3df78   Bin Meng   cmd: Clean up cmd...
364
  	tmp = (char *)CONFIG_SYS_VXWORKS_MAC_PTR;
35affd7a2   Simon Glass   env: Rename eth_g...
365
  	eth_env_get_enetaddr("ethaddr", (uchar *)build_buf);
62c93d92f   Mike Frysinger   bootvx: get mac a...
366
  	memcpy(tmp, build_buf, 6);
458ded34b   wdenk   Initial revision
367
  #else
62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
368
369
  	puts("## Ethernet MAC address not copied to NV RAM
  ");
458ded34b   wdenk   Initial revision
370
  #endif
79c584e55   Bin Meng   bootvx: x86: Assi...
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
  #ifdef CONFIG_X86
  	/*
  	 * Get VxWorks's physical memory base address from environment,
  	 * if we don't specify it in the environment, use a default one.
  	 */
  	base = env_get_hex("vx_phys_mem_base", VXWORKS_PHYS_MEM_BASE);
  	data = (struct e820_entry *)(base + E820_DATA_OFFSET);
  	info = (struct e820_info *)(base + E820_INFO_OFFSET);
  
  	memset(info, 0, sizeof(struct e820_info));
  	info->sign = E820_SIGNATURE;
  	info->entries = install_e820_map(E820MAX, data);
  	info->addr = (info->entries - 1) * sizeof(struct e820_entry) +
  		     E820_DATA_OFFSET;
  
  	/*
  	 * Explicitly clear the bootloader image size otherwise if memory
  	 * at this offset happens to contain some garbage data, the final
  	 * available memory size for the kernel is insane.
  	 */
  	*(u32 *)(base + BOOT_IMAGE_SIZE_OFFSET) = 0;
  
  	/*
  	 * Prepare compatible framebuffer information block.
  	 * The VESA mode has to be 32-bit RGBA.
  	 */
  	if (vesa->x_resolution && vesa->y_resolution) {
  		gop = (struct efi_gop_info *)(base + EFI_GOP_INFO_OFFSET);
  		gop->magic = EFI_GOP_INFO_MAGIC;
  		gop->info.version = 0;
  		gop->info.width = vesa->x_resolution;
  		gop->info.height = vesa->y_resolution;
  		gop->info.pixel_format = EFI_GOT_RGBA8;
  		gop->info.pixels_per_scanline = vesa->bytes_per_scanline / 4;
  		gop->fb_base = vesa->phys_base_ptr;
  		gop->fb_size = vesa->bytes_per_scanline * vesa->y_resolution;
  	}
  #endif
8bde7f776   wdenk   * Code cleanup:
409
410
  	/*
  	 * Use bootaddr to find the location in memory that VxWorks
9e98b7e3c   Bin Meng   cmd: bootvx: Alwa...
411
412
413
  	 * will look for the bootline string. The default value is
  	 * (LOCAL_MEM_LOCAL_ADRS + BOOT_LINE_OFFSET) as defined by
  	 * VxWorks BSP. For example, on PowerPC it defaults to 0x4200.
458ded34b   wdenk   Initial revision
414
  	 */
00caae6d4   Simon Glass   env: Rename geten...
415
  	tmp = env_get("bootaddr");
9e98b7e3c   Bin Meng   cmd: bootvx: Alwa...
416
  	if (!tmp) {
79c584e55   Bin Meng   bootvx: x86: Assi...
417
418
419
  #ifdef CONFIG_X86
  		bootaddr = base + X86_BOOT_LINE_OFFSET;
  #else
9e98b7e3c   Bin Meng   cmd: bootvx: Alwa...
420
421
  		printf("## VxWorks bootline address not specified
  ");
ced71a2f7   Bin Meng   bootvx: Exit if b...
422
  		return 1;
79c584e55   Bin Meng   bootvx: x86: Assi...
423
  #endif
ced71a2f7   Bin Meng   bootvx: Exit if b...
424
  	}
79c584e55   Bin Meng   bootvx: x86: Assi...
425
426
  	if (!bootaddr)
  		bootaddr = simple_strtoul(tmp, NULL, 16);
ced71a2f7   Bin Meng   bootvx: Exit if b...
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
  
  	/*
  	 * Check to see if the bootline is defined in the 'bootargs' parameter.
  	 * If it is not defined, we may be able to construct the info.
  	 */
  	bootline = env_get("bootargs");
  	if (!bootline) {
  		tmp = env_get("bootdev");
  		if (tmp) {
  			strcpy(build_buf, tmp);
  			ptr = strlen(tmp);
  		} else {
  			printf("## VxWorks boot device not specified
  ");
  		}
  
  		tmp = env_get("bootfile");
  		if (tmp)
  			ptr += sprintf(build_buf + ptr, "host:%s ", tmp);
  		else
  			ptr += sprintf(build_buf + ptr, "host:vxWorks ");
458ded34b   wdenk   Initial revision
448

9e98b7e3c   Bin Meng   cmd: bootvx: Alwa...
449
  		/*
ced71a2f7   Bin Meng   bootvx: Exit if b...
450
451
  		 * The following parameters are only needed if 'bootdev'
  		 * is an ethernet device, otherwise they are optional.
9e98b7e3c   Bin Meng   cmd: bootvx: Alwa...
452
  		 */
ced71a2f7   Bin Meng   bootvx: Exit if b...
453
454
455
456
  		tmp = env_get("ipaddr");
  		if (tmp) {
  			ptr += sprintf(build_buf + ptr, "e=%s", tmp);
  			tmp = env_get("netmask");
192bc6948   Ben Whitten   Fix GCC format-se...
457
  			if (tmp) {
ced71a2f7   Bin Meng   bootvx: Exit if b...
458
  				u32 mask = env_get_ip("netmask").s_addr;
9e98b7e3c   Bin Meng   cmd: bootvx: Alwa...
459
  				ptr += sprintf(build_buf + ptr,
ced71a2f7   Bin Meng   bootvx: Exit if b...
460
461
462
  					       ":%08x ", ntohl(mask));
  			} else {
  				ptr += sprintf(build_buf + ptr, " ");
a4092dbd8   Bin Meng   cmd: bootvx: Pass...
463
  			}
ced71a2f7   Bin Meng   bootvx: Exit if b...
464
  		}
458ded34b   wdenk   Initial revision
465

ced71a2f7   Bin Meng   bootvx: Exit if b...
466
467
468
  		tmp = env_get("serverip");
  		if (tmp)
  			ptr += sprintf(build_buf + ptr, "h=%s ", tmp);
a4092dbd8   Bin Meng   cmd: bootvx: Pass...
469

ced71a2f7   Bin Meng   bootvx: Exit if b...
470
471
472
  		tmp = env_get("gatewayip");
  		if (tmp)
  			ptr += sprintf(build_buf + ptr, "g=%s ", tmp);
458ded34b   wdenk   Initial revision
473

ced71a2f7   Bin Meng   bootvx: Exit if b...
474
475
476
  		tmp = env_get("hostname");
  		if (tmp)
  			ptr += sprintf(build_buf + ptr, "tn=%s ", tmp);
9e98b7e3c   Bin Meng   cmd: bootvx: Alwa...
477

ced71a2f7   Bin Meng   bootvx: Exit if b...
478
479
480
481
  		tmp = env_get("othbootargs");
  		if (tmp) {
  			strcpy(build_buf + ptr, tmp);
  			ptr += strlen(tmp);
9e98b7e3c   Bin Meng   cmd: bootvx: Alwa...
482
  		}
29a4c24de   Niklaus Giger   cmd_elf.c: Cleanu...
483

ced71a2f7   Bin Meng   bootvx: Exit if b...
484
  		bootline = build_buf;
458ded34b   wdenk   Initial revision
485
  	}
ced71a2f7   Bin Meng   bootvx: Exit if b...
486
487
488
489
  	memcpy((void *)bootaddr, bootline, max(strlen(bootline), (size_t)255));
  	flush_cache(bootaddr, max(strlen(bootline), (size_t)255));
  	printf("## Using bootline (@ 0x%lx): %s
  ", bootaddr, (char *)bootaddr);
8bde7f776   wdenk   * Code cleanup:
490
491
492
  	/*
  	 * If the data at the load address is an elf image, then
  	 * treat it like an elf image. Otherwise, assume that it is a
ebca3df78   Bin Meng   cmd: Clean up cmd...
493
  	 * binary image.
458ded34b   wdenk   Initial revision
494
  	 */
ebca3df78   Bin Meng   cmd: Clean up cmd...
495
  	if (valid_elf_image(addr))
476c2fcd2   Christian Gmeiner   bootvx: use progr...
496
  		addr = load_elf_image_phdr(addr);
ebca3df78   Bin Meng   cmd: Clean up cmd...
497
  	else
62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
498
499
  		puts("## Not an ELF image, assuming binary
  ");
458ded34b   wdenk   Initial revision
500

62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
501
502
  	printf("## Starting vxWorks at 0x%08lx ...
  ", addr);
458ded34b   wdenk   Initial revision
503

6eee21daf   Reinhard Arlt   bootvx: Clear and...
504
  	dcache_disable();
3194daa10   Vasyl Vavrychuk   vxworks: fixed cp...
505
506
507
508
  #if defined(CONFIG_ARM64) && defined(CONFIG_ARMV8_PSCI)
  	armv8_setup_psci();
  	smp_kick_all_cpus();
  #endif
9aa1280a5   Bin Meng   cmd: bootvx: Add ...
509
510
511
512
  #ifdef CONFIG_X86
  	/* VxWorks on x86 uses stack to pass parameters */
  	((asmlinkage void (*)(int))addr)(0);
  #else
ebca3df78   Bin Meng   cmd: Clean up cmd...
513
  	((void (*)(int))addr)(0);
9aa1280a5   Bin Meng   cmd: bootvx: Add ...
514
  #endif
458ded34b   wdenk   Initial revision
515

62e03d33c   Daniel Schwierzeck   common: cmd_elf.c...
516
517
  	puts("## vxWorks terminated
  ");
ebca3df78   Bin Meng   cmd: Clean up cmd...
518

458ded34b   wdenk   Initial revision
519
520
  	return 1;
  }
0d4983930   wdenk   Patch by Kenneth ...
521
  U_BOOT_CMD(
be1b8679c   Tom Rini   cmd/elf.c: Suppor...
522
  	bootelf, CONFIG_SYS_MAXARGS, 0, do_bootelf,
2fb2604d5   Peter Tyser   Command usage cle...
523
  	"Boot from an ELF image in memory",
f44a928e7   Mike Frysinger   cmd_elf: add an o...
524
525
526
527
528
  	"[-p|-s] [address]
  "
  	"\t- load ELF image at [address] via program headers (-p)
  "
  	"\t  or via section headers (-s)"
8bde7f776   wdenk   * Code cleanup:
529
  );
0d4983930   wdenk   Patch by Kenneth ...
530
  U_BOOT_CMD(
ebca3df78   Bin Meng   cmd: Clean up cmd...
531
  	bootvx, 2, 0, do_bootvx,
2fb2604d5   Peter Tyser   Command usage cle...
532
  	"Boot vxWorks from an ELF image",
a89c33db9   Wolfgang Denk   General help mess...
533
  	" [address] - load address of vxWorks ELF image."
8bde7f776   wdenk   * Code cleanup:
534
  );