142c8ea3dSArd Biesheuvel // SPDX-License-Identifier: GPL-2.0-only 242c8ea3dSArd Biesheuvel 342c8ea3dSArd Biesheuvel #include <linux/efi.h> 4*8b0d1354SThomas Zimmermann #include <linux/screen_info.h> 5*8b0d1354SThomas Zimmermann 642c8ea3dSArd Biesheuvel #include <asm/efi.h> 742c8ea3dSArd Biesheuvel 842c8ea3dSArd Biesheuvel #include "efistub.h" 942c8ea3dSArd Biesheuvel 10fc3608aaSArd Biesheuvel static unsigned long screen_info_offset; 11fc3608aaSArd Biesheuvel 12fc3608aaSArd Biesheuvel struct screen_info *alloc_screen_info(void) 13fc3608aaSArd Biesheuvel { 14fc3608aaSArd Biesheuvel if (IS_ENABLED(CONFIG_ARM)) 15fc3608aaSArd Biesheuvel return __alloc_screen_info(); 16fc3608aaSArd Biesheuvel return (void *)&screen_info + screen_info_offset; 17fc3608aaSArd Biesheuvel } 18fc3608aaSArd Biesheuvel 1942c8ea3dSArd Biesheuvel /* 2042c8ea3dSArd Biesheuvel * EFI entry point for the generic EFI stub used by ARM, arm64, RISC-V and 2142c8ea3dSArd Biesheuvel * LoongArch. This is the entrypoint that is described in the PE/COFF header 2242c8ea3dSArd Biesheuvel * of the core kernel. 2342c8ea3dSArd Biesheuvel */ 2442c8ea3dSArd Biesheuvel efi_status_t __efiapi efi_pe_entry(efi_handle_t handle, 2542c8ea3dSArd Biesheuvel efi_system_table_t *systab) 2642c8ea3dSArd Biesheuvel { 2742c8ea3dSArd Biesheuvel efi_loaded_image_t *image; 2842c8ea3dSArd Biesheuvel efi_status_t status; 2942c8ea3dSArd Biesheuvel unsigned long image_addr; 3042c8ea3dSArd Biesheuvel unsigned long image_size = 0; 3142c8ea3dSArd Biesheuvel /* addr/point and size pairs for memory management*/ 3242c8ea3dSArd Biesheuvel char *cmdline_ptr = NULL; 3342c8ea3dSArd Biesheuvel efi_guid_t loaded_image_proto = LOADED_IMAGE_PROTOCOL_GUID; 3442c8ea3dSArd Biesheuvel unsigned long reserve_addr = 0; 3542c8ea3dSArd Biesheuvel unsigned long reserve_size = 0; 3642c8ea3dSArd Biesheuvel 3742c8ea3dSArd Biesheuvel WRITE_ONCE(efi_system_table, systab); 3842c8ea3dSArd Biesheuvel 3942c8ea3dSArd Biesheuvel /* Check if we were booted by the EFI firmware */ 4042c8ea3dSArd Biesheuvel if (efi_system_table->hdr.signature != EFI_SYSTEM_TABLE_SIGNATURE) 4142c8ea3dSArd Biesheuvel return EFI_INVALID_PARAMETER; 4242c8ea3dSArd Biesheuvel 4342c8ea3dSArd Biesheuvel /* 4442c8ea3dSArd Biesheuvel * Get a handle to the loaded image protocol. This is used to get 4542c8ea3dSArd Biesheuvel * information about the running image, such as size and the command 4642c8ea3dSArd Biesheuvel * line. 4742c8ea3dSArd Biesheuvel */ 4842c8ea3dSArd Biesheuvel status = efi_bs_call(handle_protocol, handle, &loaded_image_proto, 4942c8ea3dSArd Biesheuvel (void *)&image); 5042c8ea3dSArd Biesheuvel if (status != EFI_SUCCESS) { 5142c8ea3dSArd Biesheuvel efi_err("Failed to get loaded image protocol\n"); 5242c8ea3dSArd Biesheuvel return status; 5342c8ea3dSArd Biesheuvel } 5442c8ea3dSArd Biesheuvel 5542c8ea3dSArd Biesheuvel status = efi_handle_cmdline(image, &cmdline_ptr); 5642c8ea3dSArd Biesheuvel if (status != EFI_SUCCESS) 5742c8ea3dSArd Biesheuvel return status; 5842c8ea3dSArd Biesheuvel 5942c8ea3dSArd Biesheuvel efi_info("Booting Linux Kernel...\n"); 6042c8ea3dSArd Biesheuvel 6142c8ea3dSArd Biesheuvel status = handle_kernel_image(&image_addr, &image_size, 6242c8ea3dSArd Biesheuvel &reserve_addr, 6342c8ea3dSArd Biesheuvel &reserve_size, 6442c8ea3dSArd Biesheuvel image, handle); 6542c8ea3dSArd Biesheuvel if (status != EFI_SUCCESS) { 6642c8ea3dSArd Biesheuvel efi_err("Failed to relocate kernel\n"); 6742c8ea3dSArd Biesheuvel return status; 6842c8ea3dSArd Biesheuvel } 6942c8ea3dSArd Biesheuvel 70fc3608aaSArd Biesheuvel screen_info_offset = image_addr - (unsigned long)image->image_base; 71fc3608aaSArd Biesheuvel 7242c8ea3dSArd Biesheuvel status = efi_stub_common(handle, image, image_addr, cmdline_ptr); 7342c8ea3dSArd Biesheuvel 7442c8ea3dSArd Biesheuvel efi_free(image_size, image_addr); 7542c8ea3dSArd Biesheuvel efi_free(reserve_size, reserve_addr); 7642c8ea3dSArd Biesheuvel 7742c8ea3dSArd Biesheuvel return status; 7842c8ea3dSArd Biesheuvel } 79