blob: 9a2d4ddd5ef4ae89d57535f0a31a3054a67c0126 [file] [log] [blame]
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001// SPDX-License-Identifier: GPL-2.0+
2/*
3 * UEFI Shell-like command
4 *
5 * Copyright (c) 2018 AKASHI Takahiro, Linaro Limited
6 */
7
8#include <charset.h>
9#include <common.h>
10#include <command.h>
Heinrich Schuchardt94686f62020-12-13 10:30:24 +010011#include <efi_dt_fixup.h>
AKASHI Takahiro59df7e72019-02-25 15:54:38 +090012#include <efi_loader.h>
Heinrich Schuchardt79693352020-09-27 14:50:25 +020013#include <efi_rng.h>
AKASHI Takahiro59df7e72019-02-25 15:54:38 +090014#include <exports.h>
Heinrich Schuchardt39a1ff82019-04-29 13:51:45 +020015#include <hexdump.h>
Simon Glassf7ae49f2020-05-10 11:40:05 -060016#include <log.h>
AKASHI Takahiro59df7e72019-02-25 15:54:38 +090017#include <malloc.h>
Heinrich Schuchardta415d612020-03-14 08:44:07 +010018#include <mapmem.h>
AKASHI Takahiro59df7e72019-02-25 15:54:38 +090019#include <search.h>
20#include <linux/ctype.h>
21
AKASHI Takahiro355cdb52019-02-25 15:54:39 +090022#define BS systab.boottime
AKASHI Takahiro7f35ced2020-11-17 09:28:01 +090023#define RT systab.runtime
24
25#ifdef CONFIG_EFI_HAVE_CAPSULE_SUPPORT
26/**
27 * do_efi_capsule_update() - process a capsule update
28 *
29 * @cmdtp: Command table
30 * @flag: Command flag
31 * @argc: Number of arguments
32 * @argv: Argument array
33 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
34 *
35 * Implement efidebug "capsule update" sub-command.
36 * process a capsule update.
37 *
38 * efidebug capsule update [-v] <capsule address>
39 */
40static int do_efi_capsule_update(struct cmd_tbl *cmdtp, int flag,
41 int argc, char * const argv[])
42{
43 struct efi_capsule_header *capsule;
44 int verbose = 0;
45 char *endp;
46 efi_status_t ret;
47
48 if (argc != 2 && argc != 3)
49 return CMD_RET_USAGE;
50
51 if (argc == 3) {
52 if (strcmp(argv[1], "-v"))
53 return CMD_RET_USAGE;
54
55 verbose = 1;
56 argc--;
57 argv++;
58 }
59
60 capsule = (typeof(capsule))simple_strtoul(argv[1], &endp, 16);
61 if (endp == argv[1]) {
62 printf("Invalid address: %s", argv[1]);
63 return CMD_RET_FAILURE;
64 }
65
66 if (verbose) {
67 printf("Capsule guid: %pUl\n", &capsule->capsule_guid);
68 printf("Capsule flags: 0x%x\n", capsule->flags);
69 printf("Capsule header size: 0x%x\n", capsule->header_size);
70 printf("Capsule image size: 0x%x\n",
71 capsule->capsule_image_size);
72 }
73
74 ret = EFI_CALL(RT->update_capsule(&capsule, 1, (u64)NULL));
75 if (ret) {
76 printf("Cannot handle a capsule at %p", capsule);
77 return CMD_RET_FAILURE;
78 }
79
80 return CMD_RET_SUCCESS;
81}
82
Sughosh Ganu74075952020-12-30 19:27:11 +053083static int do_efi_capsule_on_disk_update(struct cmd_tbl *cmdtp, int flag,
84 int argc, char * const argv[])
85{
86 efi_status_t ret;
87
88 ret = efi_launch_capsules();
89
90 return ret == EFI_SUCCESS ? CMD_RET_SUCCESS : CMD_RET_FAILURE;
91}
92
AKASHI Takahiro7f35ced2020-11-17 09:28:01 +090093/**
94 * do_efi_capsule_show() - show capsule information
95 *
96 * @cmdtp: Command table
97 * @flag: Command flag
98 * @argc: Number of arguments
99 * @argv: Argument array
100 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
101 *
102 * Implement efidebug "capsule show" sub-command.
103 * show capsule information.
104 *
105 * efidebug capsule show <capsule address>
106 */
107static int do_efi_capsule_show(struct cmd_tbl *cmdtp, int flag,
108 int argc, char * const argv[])
109{
110 struct efi_capsule_header *capsule;
111 char *endp;
112
113 if (argc != 2)
114 return CMD_RET_USAGE;
115
116 capsule = (typeof(capsule))simple_strtoul(argv[1], &endp, 16);
117 if (endp == argv[1]) {
118 printf("Invalid address: %s", argv[1]);
119 return CMD_RET_FAILURE;
120 }
121
122 printf("Capsule guid: %pUl\n", &capsule->capsule_guid);
123 printf("Capsule flags: 0x%x\n", capsule->flags);
124 printf("Capsule header size: 0x%x\n", capsule->header_size);
125 printf("Capsule image size: 0x%x\n",
126 capsule->capsule_image_size);
127
128 return CMD_RET_SUCCESS;
129}
130
131/**
132 * do_efi_capsule_res() - show a capsule update result
133 *
134 * @cmdtp: Command table
135 * @flag: Command flag
136 * @argc: Number of arguments
137 * @argv: Argument array
138 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
139 *
140 * Implement efidebug "capsule result" sub-command.
141 * show a capsule update result.
142 * If result number is not specified, CapsuleLast will be shown.
143 *
144 * efidebug capsule result [<capsule result number>]
145 */
146static int do_efi_capsule_res(struct cmd_tbl *cmdtp, int flag,
147 int argc, char * const argv[])
148{
149 int capsule_id;
150 char *endp;
151 char var_name[12];
152 u16 var_name16[12], *p;
153 efi_guid_t guid;
154 struct efi_capsule_result_variable_header *result = NULL;
155 efi_uintn_t size;
156 efi_status_t ret;
157
158 if (argc != 1 && argc != 2)
159 return CMD_RET_USAGE;
160
161 guid = efi_guid_capsule_report;
162 if (argc == 1) {
163 size = sizeof(var_name16);
164 ret = EFI_CALL(RT->get_variable(L"CapsuleLast", &guid, NULL,
165 &size, var_name16));
166 if (ret != EFI_SUCCESS) {
167 if (ret == EFI_NOT_FOUND)
168 printf("CapsuleLast doesn't exist\n");
169 else
170 printf("Failed to get CapsuleLast\n");
171
172 return CMD_RET_FAILURE;
173 }
174 printf("CapsuleLast is %ls\n", var_name16);
175 } else {
176 argc--;
177 argv++;
178
179 capsule_id = simple_strtoul(argv[0], &endp, 16);
180 if (capsule_id < 0 || capsule_id > 0xffff)
181 return CMD_RET_USAGE;
182
183 sprintf(var_name, "Capsule%04X", capsule_id);
184 p = var_name16;
185 utf8_utf16_strncpy(&p, var_name, 9);
186 }
187
188 size = 0;
189 ret = EFI_CALL(RT->get_variable(var_name16, &guid, NULL, &size, NULL));
190 if (ret == EFI_BUFFER_TOO_SMALL) {
191 result = malloc(size);
192 ret = EFI_CALL(RT->get_variable(var_name16, &guid, NULL, &size,
193 result));
194 if (ret != EFI_SUCCESS) {
195 free(result);
196 printf("Failed to get %ls\n", var_name16);
197
198 return CMD_RET_FAILURE;
199 }
200 }
201
202 printf("Result total size: 0x%x\n", result->variable_total_size);
203 printf("Capsule guid: %pUl\n", &result->capsule_guid);
204 printf("Time processed: %04d-%02d-%02d %02d:%02d:%02d\n",
205 result->capsule_processed.year, result->capsule_processed.month,
206 result->capsule_processed.day, result->capsule_processed.hour,
207 result->capsule_processed.minute,
208 result->capsule_processed.second);
209 printf("Capsule status: 0x%lx\n", result->capsule_status);
210
211 free(result);
212
213 return CMD_RET_SUCCESS;
214}
215
216static struct cmd_tbl cmd_efidebug_capsule_sub[] = {
217 U_BOOT_CMD_MKENT(update, CONFIG_SYS_MAXARGS, 1, do_efi_capsule_update,
218 "", ""),
219 U_BOOT_CMD_MKENT(show, CONFIG_SYS_MAXARGS, 1, do_efi_capsule_show,
220 "", ""),
Sughosh Ganu74075952020-12-30 19:27:11 +0530221 U_BOOT_CMD_MKENT(disk-update, 0, 0, do_efi_capsule_on_disk_update,
222 "", ""),
AKASHI Takahiro7f35ced2020-11-17 09:28:01 +0900223 U_BOOT_CMD_MKENT(result, CONFIG_SYS_MAXARGS, 1, do_efi_capsule_res,
224 "", ""),
225};
226
227/**
228 * do_efi_capsule() - manage UEFI capsules
229 *
230 * @cmdtp: Command table
231 * @flag: Command flag
232 * @argc: Number of arguments
233 * @argv: Argument array
234 * Return: CMD_RET_SUCCESS on success,
235 * CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
236 *
237 * Implement efidebug "capsule" sub-command.
238 */
239static int do_efi_capsule(struct cmd_tbl *cmdtp, int flag,
240 int argc, char * const argv[])
241{
242 struct cmd_tbl *cp;
243
244 if (argc < 2)
245 return CMD_RET_USAGE;
246
247 argc--; argv++;
248
249 cp = find_cmd_tbl(argv[0], cmd_efidebug_capsule_sub,
250 ARRAY_SIZE(cmd_efidebug_capsule_sub));
251 if (!cp)
252 return CMD_RET_USAGE;
253
254 return cp->cmd(cmdtp, flag, argc, argv);
255}
256#endif /* CONFIG_EFI_HAVE_CAPSULE_SUPPORT */
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900257
258/**
AKASHI Takahiro355cdb52019-02-25 15:54:39 +0900259 * efi_get_device_handle_info() - get information of UEFI device
260 *
261 * @handle: Handle of UEFI device
262 * @dev_path_text: Pointer to text of device path
263 * Return: 0 on success, -1 on failure
264 *
265 * Currently return a formatted text of device path.
266 */
267static int efi_get_device_handle_info(efi_handle_t handle, u16 **dev_path_text)
268{
269 struct efi_device_path *dp;
270 efi_status_t ret;
271
272 ret = EFI_CALL(BS->open_protocol(handle, &efi_guid_device_path,
273 (void **)&dp, NULL /* FIXME */, NULL,
274 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
275 if (ret == EFI_SUCCESS) {
276 *dev_path_text = efi_dp_str(dp);
277 return 0;
278 } else {
279 return -1;
280 }
281}
282
283#define EFI_HANDLE_WIDTH ((int)sizeof(efi_handle_t) * 2)
284
285static const char spc[] = " ";
286static const char sep[] = "================";
287
288/**
289 * do_efi_show_devices() - show UEFI devices
290 *
291 * @cmdtp: Command table
292 * @flag: Command flag
293 * @argc: Number of arguments
294 * @argv: Argument array
295 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
296 *
297 * Implement efidebug "devices" sub-command.
298 * Show all UEFI devices and their information.
299 */
Simon Glass09140112020-05-10 11:40:03 -0600300static int do_efi_show_devices(struct cmd_tbl *cmdtp, int flag,
301 int argc, char *const argv[])
AKASHI Takahiro355cdb52019-02-25 15:54:39 +0900302{
303 efi_handle_t *handles;
304 efi_uintn_t num, i;
305 u16 *dev_path_text;
306 efi_status_t ret;
307
Heinrich Schuchardta30c7232020-05-02 16:08:37 +0200308 ret = EFI_CALL(efi_locate_handle_buffer(ALL_HANDLES, NULL, NULL,
AKASHI Takahiro355cdb52019-02-25 15:54:39 +0900309 &num, &handles));
310 if (ret != EFI_SUCCESS)
311 return CMD_RET_FAILURE;
312
313 if (!num)
314 return CMD_RET_SUCCESS;
315
316 printf("Device%.*s Device Path\n", EFI_HANDLE_WIDTH - 6, spc);
317 printf("%.*s ====================\n", EFI_HANDLE_WIDTH, sep);
318 for (i = 0; i < num; i++) {
319 if (!efi_get_device_handle_info(handles[i], &dev_path_text)) {
320 printf("%p %ls\n", handles[i], dev_path_text);
321 efi_free_pool(dev_path_text);
322 }
323 }
324
Heinrich Schuchardta30c7232020-05-02 16:08:37 +0200325 efi_free_pool(handles);
AKASHI Takahiro355cdb52019-02-25 15:54:39 +0900326
327 return CMD_RET_SUCCESS;
328}
329
330/**
AKASHI Takahiro66eaf562019-02-25 15:54:40 +0900331 * efi_get_driver_handle_info() - get information of UEFI driver
332 *
333 * @handle: Handle of UEFI device
334 * @driver_name: Driver name
335 * @image_path: Pointer to text of device path
336 * Return: 0 on success, -1 on failure
337 *
338 * Currently return no useful information as all UEFI drivers are
339 * built-in..
340 */
341static int efi_get_driver_handle_info(efi_handle_t handle, u16 **driver_name,
342 u16 **image_path)
343{
344 struct efi_handler *handler;
345 struct efi_loaded_image *image;
346 efi_status_t ret;
347
348 /*
349 * driver name
350 * TODO: support EFI_COMPONENT_NAME2_PROTOCOL
351 */
352 *driver_name = NULL;
353
354 /* image name */
355 ret = efi_search_protocol(handle, &efi_guid_loaded_image, &handler);
356 if (ret != EFI_SUCCESS) {
357 *image_path = NULL;
358 return 0;
359 }
360
361 image = handler->protocol_interface;
362 *image_path = efi_dp_str(image->file_path);
363
364 return 0;
365}
366
367/**
368 * do_efi_show_drivers() - show UEFI drivers
369 *
370 * @cmdtp: Command table
371 * @flag: Command flag
372 * @argc: Number of arguments
373 * @argv: Argument array
374 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
375 *
376 * Implement efidebug "drivers" sub-command.
377 * Show all UEFI drivers and their information.
378 */
Simon Glass09140112020-05-10 11:40:03 -0600379static int do_efi_show_drivers(struct cmd_tbl *cmdtp, int flag,
380 int argc, char *const argv[])
AKASHI Takahiro66eaf562019-02-25 15:54:40 +0900381{
382 efi_handle_t *handles;
383 efi_uintn_t num, i;
384 u16 *driver_name, *image_path_text;
385 efi_status_t ret;
386
Heinrich Schuchardta30c7232020-05-02 16:08:37 +0200387 ret = EFI_CALL(efi_locate_handle_buffer(
AKASHI Takahiro66eaf562019-02-25 15:54:40 +0900388 BY_PROTOCOL, &efi_guid_driver_binding_protocol,
389 NULL, &num, &handles));
390 if (ret != EFI_SUCCESS)
391 return CMD_RET_FAILURE;
392
393 if (!num)
394 return CMD_RET_SUCCESS;
395
396 printf("Driver%.*s Name Image Path\n",
397 EFI_HANDLE_WIDTH - 6, spc);
398 printf("%.*s ==================== ====================\n",
399 EFI_HANDLE_WIDTH, sep);
400 for (i = 0; i < num; i++) {
401 if (!efi_get_driver_handle_info(handles[i], &driver_name,
402 &image_path_text)) {
403 if (image_path_text)
404 printf("%p %-20ls %ls\n", handles[i],
405 driver_name, image_path_text);
406 else
407 printf("%p %-20ls <built-in>\n",
408 handles[i], driver_name);
Heinrich Schuchardta30c7232020-05-02 16:08:37 +0200409 efi_free_pool(driver_name);
410 efi_free_pool(image_path_text);
AKASHI Takahiro66eaf562019-02-25 15:54:40 +0900411 }
412 }
413
Heinrich Schuchardta30c7232020-05-02 16:08:37 +0200414 efi_free_pool(handles);
AKASHI Takahiro66eaf562019-02-25 15:54:40 +0900415
416 return CMD_RET_SUCCESS;
417}
418
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900419static const struct {
420 const char *text;
421 const efi_guid_t guid;
422} guid_list[] = {
423 {
424 "Device Path",
Heinrich Schuchardtdec88e42019-04-20 07:39:11 +0200425 EFI_DEVICE_PATH_PROTOCOL_GUID,
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900426 },
427 {
428 "Device Path To Text",
429 EFI_DEVICE_PATH_TO_TEXT_PROTOCOL_GUID,
430 },
431 {
432 "Device Path Utilities",
433 EFI_DEVICE_PATH_UTILITIES_PROTOCOL_GUID,
434 },
435 {
436 "Unicode Collation 2",
437 EFI_UNICODE_COLLATION_PROTOCOL2_GUID,
438 },
439 {
440 "Driver Binding",
441 EFI_DRIVER_BINDING_PROTOCOL_GUID,
442 },
443 {
444 "Simple Text Input",
445 EFI_SIMPLE_TEXT_INPUT_PROTOCOL_GUID,
446 },
447 {
448 "Simple Text Input Ex",
449 EFI_SIMPLE_TEXT_INPUT_EX_PROTOCOL_GUID,
450 },
451 {
452 "Simple Text Output",
453 EFI_SIMPLE_TEXT_OUTPUT_PROTOCOL_GUID,
454 },
455 {
456 "Block IO",
Heinrich Schuchardtdec88e42019-04-20 07:39:11 +0200457 EFI_BLOCK_IO_PROTOCOL_GUID,
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900458 },
459 {
460 "Simple File System",
461 EFI_SIMPLE_FILE_SYSTEM_PROTOCOL_GUID,
462 },
463 {
464 "Loaded Image",
Heinrich Schuchardtdec88e42019-04-20 07:39:11 +0200465 EFI_LOADED_IMAGE_PROTOCOL_GUID,
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900466 },
467 {
Heinrich Schuchardtdec88e42019-04-20 07:39:11 +0200468 "Graphics Output",
469 EFI_GRAPHICS_OUTPUT_PROTOCOL_GUID,
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900470 },
Heinrich Schuchardt391bc8a2019-04-20 07:57:28 +0200471 {
472 "HII String",
473 EFI_HII_STRING_PROTOCOL_GUID,
474 },
475 {
476 "HII Database",
477 EFI_HII_DATABASE_PROTOCOL_GUID,
478 },
479 {
480 "HII Config Routing",
481 EFI_HII_CONFIG_ROUTING_PROTOCOL_GUID,
482 },
483 {
Ilias Apalodimasec80b472020-02-21 09:55:45 +0200484 "Load File2",
485 EFI_LOAD_FILE2_PROTOCOL_GUID,
486 },
487 {
Heinrich Schuchardt79693352020-09-27 14:50:25 +0200488 "Random Number Generator",
489 EFI_RNG_PROTOCOL_GUID,
490 },
491 {
Heinrich Schuchardt391bc8a2019-04-20 07:57:28 +0200492 "Simple Network",
493 EFI_SIMPLE_NETWORK_PROTOCOL_GUID,
494 },
495 {
496 "PXE Base Code",
497 EFI_PXE_BASE_CODE_PROTOCOL_GUID,
498 },
Heinrich Schuchardt94686f62020-12-13 10:30:24 +0100499 {
500 "Device-Tree Fixup",
501 EFI_DT_FIXUP_PROTOCOL_GUID,
502 },
Heinrich Schuchardt986e0642020-01-07 05:57:47 +0100503 /* Configuration table GUIDs */
504 {
505 "ACPI table",
506 EFI_ACPI_TABLE_GUID,
507 },
508 {
509 "device tree",
510 EFI_FDT_GUID,
511 },
512 {
513 "SMBIOS table",
514 SMBIOS_TABLE_GUID,
515 },
Heinrich Schuchardt76be6872020-02-19 20:48:49 +0100516 {
517 "Runtime properties",
518 EFI_RT_PROPERTIES_TABLE_GUID,
519 },
Ilias Apalodimas94e78202020-11-30 11:47:41 +0200520 {
521 "TCG2 Final Events Table",
522 EFI_TCG2_FINAL_EVENTS_TABLE_GUID,
523 },
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900524};
525
526/**
Heinrich Schuchardt173cd9e2020-01-07 06:02:33 +0100527 * get_guid_text - get string of GUID
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900528 *
Heinrich Schuchardt173cd9e2020-01-07 06:02:33 +0100529 * Return description of GUID.
530 *
531 * @guid: GUID
532 * Return: description of GUID or NULL
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900533 */
Heinrich Schuchardt173cd9e2020-01-07 06:02:33 +0100534static const char *get_guid_text(const void *guid)
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900535{
536 int i;
537
Heinrich Schuchardt173cd9e2020-01-07 06:02:33 +0100538 for (i = 0; i < ARRAY_SIZE(guid_list); i++) {
539 /*
540 * As guidcmp uses memcmp() we can safely accept unaligned
541 * GUIDs.
542 */
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900543 if (!guidcmp(&guid_list[i].guid, guid))
Heinrich Schuchardt173cd9e2020-01-07 06:02:33 +0100544 return guid_list[i].text;
545 }
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900546
Heinrich Schuchardt173cd9e2020-01-07 06:02:33 +0100547 return NULL;
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900548}
549
550/**
551 * do_efi_show_handles() - show UEFI handles
552 *
553 * @cmdtp: Command table
554 * @flag: Command flag
555 * @argc: Number of arguments
556 * @argv: Argument array
557 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
558 *
559 * Implement efidebug "dh" sub-command.
560 * Show all UEFI handles and their information, currently all protocols
561 * added to handle.
562 */
Simon Glass09140112020-05-10 11:40:03 -0600563static int do_efi_show_handles(struct cmd_tbl *cmdtp, int flag,
564 int argc, char *const argv[])
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900565{
566 efi_handle_t *handles;
567 efi_guid_t **guid;
568 efi_uintn_t num, count, i, j;
569 const char *guid_text;
570 efi_status_t ret;
571
Heinrich Schuchardta30c7232020-05-02 16:08:37 +0200572 ret = EFI_CALL(efi_locate_handle_buffer(ALL_HANDLES, NULL, NULL,
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900573 &num, &handles));
574 if (ret != EFI_SUCCESS)
575 return CMD_RET_FAILURE;
576
577 if (!num)
578 return CMD_RET_SUCCESS;
579
580 printf("Handle%.*s Protocols\n", EFI_HANDLE_WIDTH - 6, spc);
581 printf("%.*s ====================\n", EFI_HANDLE_WIDTH, sep);
582 for (i = 0; i < num; i++) {
583 printf("%p", handles[i]);
584 ret = EFI_CALL(BS->protocols_per_handle(handles[i], &guid,
585 &count));
586 if (ret || !count) {
587 putc('\n');
588 continue;
589 }
590
591 for (j = 0; j < count; j++) {
592 if (j)
593 printf(", ");
594 else
595 putc(' ');
596
597 guid_text = get_guid_text(guid[j]);
598 if (guid_text)
599 puts(guid_text);
600 else
601 printf("%pUl", guid[j]);
602 }
603 putc('\n');
604 }
605
Heinrich Schuchardta30c7232020-05-02 16:08:37 +0200606 efi_free_pool(handles);
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900607
608 return CMD_RET_SUCCESS;
609}
610
AKASHI Takahiro66eaf562019-02-25 15:54:40 +0900611/**
AKASHI Takahirofa536732019-02-25 15:54:42 +0900612 * do_efi_show_images() - show UEFI images
613 *
614 * @cmdtp: Command table
615 * @flag: Command flag
616 * @argc: Number of arguments
617 * @argv: Argument array
618 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
619 *
620 * Implement efidebug "images" sub-command.
621 * Show all UEFI loaded images and their information.
622 */
Simon Glass09140112020-05-10 11:40:03 -0600623static int do_efi_show_images(struct cmd_tbl *cmdtp, int flag,
624 int argc, char *const argv[])
AKASHI Takahirofa536732019-02-25 15:54:42 +0900625{
626 efi_print_image_infos(NULL);
627
628 return CMD_RET_SUCCESS;
629}
630
AKASHI Takahiro00358bb2019-02-25 15:54:43 +0900631static const char * const efi_mem_type_string[] = {
632 [EFI_RESERVED_MEMORY_TYPE] = "RESERVED",
633 [EFI_LOADER_CODE] = "LOADER CODE",
634 [EFI_LOADER_DATA] = "LOADER DATA",
635 [EFI_BOOT_SERVICES_CODE] = "BOOT CODE",
636 [EFI_BOOT_SERVICES_DATA] = "BOOT DATA",
637 [EFI_RUNTIME_SERVICES_CODE] = "RUNTIME CODE",
638 [EFI_RUNTIME_SERVICES_DATA] = "RUNTIME DATA",
639 [EFI_CONVENTIONAL_MEMORY] = "CONVENTIONAL",
640 [EFI_UNUSABLE_MEMORY] = "UNUSABLE MEM",
641 [EFI_ACPI_RECLAIM_MEMORY] = "ACPI RECLAIM MEM",
642 [EFI_ACPI_MEMORY_NVS] = "ACPI NVS",
643 [EFI_MMAP_IO] = "IO",
644 [EFI_MMAP_IO_PORT] = "IO PORT",
645 [EFI_PAL_CODE] = "PAL",
Heinrich Schuchardtdd9056c2020-04-29 20:21:39 +0200646 [EFI_PERSISTENT_MEMORY_TYPE] = "PERSISTENT",
AKASHI Takahiro00358bb2019-02-25 15:54:43 +0900647};
648
649static const struct efi_mem_attrs {
650 const u64 bit;
651 const char *text;
652} efi_mem_attrs[] = {
653 {EFI_MEMORY_UC, "UC"},
654 {EFI_MEMORY_UC, "UC"},
655 {EFI_MEMORY_WC, "WC"},
656 {EFI_MEMORY_WT, "WT"},
657 {EFI_MEMORY_WB, "WB"},
658 {EFI_MEMORY_UCE, "UCE"},
659 {EFI_MEMORY_WP, "WP"},
660 {EFI_MEMORY_RP, "RP"},
661 {EFI_MEMORY_XP, "WP"},
662 {EFI_MEMORY_NV, "NV"},
663 {EFI_MEMORY_MORE_RELIABLE, "REL"},
664 {EFI_MEMORY_RO, "RO"},
Heinrich Schuchardt255a4732020-05-19 07:20:46 +0200665 {EFI_MEMORY_SP, "SP"},
AKASHI Takahiro00358bb2019-02-25 15:54:43 +0900666 {EFI_MEMORY_RUNTIME, "RT"},
667};
668
669/**
670 * print_memory_attributes() - print memory map attributes
Heinrich Schuchardt0b016562019-07-14 14:00:41 +0200671 *
AKASHI Takahiro00358bb2019-02-25 15:54:43 +0900672 * @attributes: Attribute value
673 *
674 * Print memory map attributes
675 */
676static void print_memory_attributes(u64 attributes)
677{
678 int sep, i;
679
680 for (sep = 0, i = 0; i < ARRAY_SIZE(efi_mem_attrs); i++)
681 if (attributes & efi_mem_attrs[i].bit) {
682 if (sep) {
683 putc('|');
684 } else {
685 putc(' ');
686 sep = 1;
687 }
688 puts(efi_mem_attrs[i].text);
689 }
690}
691
692#define EFI_PHYS_ADDR_WIDTH (int)(sizeof(efi_physical_addr_t) * 2)
693
694/**
695 * do_efi_show_memmap() - show UEFI memory map
696 *
697 * @cmdtp: Command table
698 * @flag: Command flag
699 * @argc: Number of arguments
700 * @argv: Argument array
701 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
702 *
703 * Implement efidebug "memmap" sub-command.
704 * Show UEFI memory map.
705 */
Simon Glass09140112020-05-10 11:40:03 -0600706static int do_efi_show_memmap(struct cmd_tbl *cmdtp, int flag,
707 int argc, char *const argv[])
AKASHI Takahiro00358bb2019-02-25 15:54:43 +0900708{
709 struct efi_mem_desc *memmap = NULL, *map;
710 efi_uintn_t map_size = 0;
711 const char *type;
712 int i;
713 efi_status_t ret;
714
Heinrich Schuchardta30c7232020-05-02 16:08:37 +0200715 ret = efi_get_memory_map(&map_size, memmap, NULL, NULL, NULL);
AKASHI Takahiro00358bb2019-02-25 15:54:43 +0900716 if (ret == EFI_BUFFER_TOO_SMALL) {
717 map_size += sizeof(struct efi_mem_desc); /* for my own */
Heinrich Schuchardta30c7232020-05-02 16:08:37 +0200718 ret = efi_allocate_pool(EFI_LOADER_DATA, map_size,
719 (void *)&memmap);
AKASHI Takahiro00358bb2019-02-25 15:54:43 +0900720 if (ret != EFI_SUCCESS)
721 return CMD_RET_FAILURE;
Heinrich Schuchardta30c7232020-05-02 16:08:37 +0200722 ret = efi_get_memory_map(&map_size, memmap, NULL, NULL, NULL);
AKASHI Takahiro00358bb2019-02-25 15:54:43 +0900723 }
724 if (ret != EFI_SUCCESS) {
Heinrich Schuchardta30c7232020-05-02 16:08:37 +0200725 efi_free_pool(memmap);
AKASHI Takahiro00358bb2019-02-25 15:54:43 +0900726 return CMD_RET_FAILURE;
727 }
728
729 printf("Type Start%.*s End%.*s Attributes\n",
730 EFI_PHYS_ADDR_WIDTH - 5, spc, EFI_PHYS_ADDR_WIDTH - 3, spc);
731 printf("================ %.*s %.*s ==========\n",
732 EFI_PHYS_ADDR_WIDTH, sep, EFI_PHYS_ADDR_WIDTH, sep);
AKASHI Takahiroe2a5b862020-05-08 14:50:18 +0900733 /*
734 * Coverity check: dereferencing null pointer "map."
735 * This is a false positive as memmap will always be
736 * populated by allocate_pool() above.
737 */
AKASHI Takahiro00358bb2019-02-25 15:54:43 +0900738 for (i = 0, map = memmap; i < map_size / sizeof(*map); map++, i++) {
Heinrich Schuchardtdd9056c2020-04-29 20:21:39 +0200739 if (map->type < ARRAY_SIZE(efi_mem_type_string))
AKASHI Takahiro00358bb2019-02-25 15:54:43 +0900740 type = efi_mem_type_string[map->type];
741 else
742 type = "(unknown)";
743
744 printf("%-16s %.*llx-%.*llx", type,
745 EFI_PHYS_ADDR_WIDTH,
Heinrich Schuchardt6c0ef352020-03-27 04:33:17 +0000746 (u64)map_to_sysmem((void *)(uintptr_t)
747 map->physical_start),
AKASHI Takahiro00358bb2019-02-25 15:54:43 +0900748 EFI_PHYS_ADDR_WIDTH,
Heinrich Schuchardt6c0ef352020-03-27 04:33:17 +0000749 (u64)map_to_sysmem((void *)(uintptr_t)
750 (map->physical_start +
751 map->num_pages * EFI_PAGE_SIZE)));
AKASHI Takahiro00358bb2019-02-25 15:54:43 +0900752
753 print_memory_attributes(map->attribute);
754 putc('\n');
755 }
756
Heinrich Schuchardta30c7232020-05-02 16:08:37 +0200757 efi_free_pool(memmap);
AKASHI Takahiro00358bb2019-02-25 15:54:43 +0900758
759 return CMD_RET_SUCCESS;
760}
761
AKASHI Takahirofa536732019-02-25 15:54:42 +0900762/**
Heinrich Schuchardt986e0642020-01-07 05:57:47 +0100763 * do_efi_show_tables() - show UEFI configuration tables
764 *
765 * @cmdtp: Command table
766 * @flag: Command flag
767 * @argc: Number of arguments
768 * @argv: Argument array
769 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
770 *
771 * Implement efidebug "tables" sub-command.
772 * Show UEFI configuration tables.
773 */
Simon Glass09140112020-05-10 11:40:03 -0600774static int do_efi_show_tables(struct cmd_tbl *cmdtp, int flag,
775 int argc, char *const argv[])
Heinrich Schuchardt986e0642020-01-07 05:57:47 +0100776{
777 efi_uintn_t i;
778 const char *guid_str;
779
780 for (i = 0; i < systab.nr_tables; ++i) {
781 guid_str = get_guid_text(&systab.tables[i].guid);
782 if (!guid_str)
783 guid_str = "";
784 printf("%pUl %s\n", &systab.tables[i].guid, guid_str);
785 }
786
787 return CMD_RET_SUCCESS;
788}
789
790/**
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900791 * do_efi_boot_add() - set UEFI load option
792 *
793 * @cmdtp: Command table
794 * @flag: Command flag
795 * @argc: Number of arguments
796 * @argv: Argument array
797 * Return: CMD_RET_SUCCESS on success,
798 * CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
799 *
Heinrich Schuchardt0b016562019-07-14 14:00:41 +0200800 * Implement efidebug "boot add" sub-command. Create or change UEFI load option.
801 *
802 * efidebug boot add <id> <label> <interface> <devnum>[:<part>] <file> <options>
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900803 */
Simon Glass09140112020-05-10 11:40:03 -0600804static int do_efi_boot_add(struct cmd_tbl *cmdtp, int flag,
805 int argc, char *const argv[])
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900806{
807 int id;
808 char *endp;
809 char var_name[9];
810 u16 var_name16[9], *p;
811 efi_guid_t guid;
812 size_t label_len, label_len16;
813 u16 *label;
814 struct efi_device_path *device_path = NULL, *file_path = NULL;
815 struct efi_load_option lo;
816 void *data = NULL;
817 efi_uintn_t size;
Heinrich Schuchardt428a4702019-06-20 12:48:04 +0200818 efi_status_t ret;
Heinrich Schuchardta332f252019-06-20 12:59:45 +0200819 int r = CMD_RET_SUCCESS;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900820
821 if (argc < 6 || argc > 7)
822 return CMD_RET_USAGE;
823
824 id = (int)simple_strtoul(argv[1], &endp, 16);
825 if (*endp != '\0' || id > 0xffff)
Heinrich Schuchardt1fa442e2019-02-28 20:41:58 +0100826 return CMD_RET_USAGE;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900827
828 sprintf(var_name, "Boot%04X", id);
829 p = var_name16;
830 utf8_utf16_strncpy(&p, var_name, 9);
831
832 guid = efi_global_variable_guid;
833
834 /* attributes */
835 lo.attributes = LOAD_OPTION_ACTIVE; /* always ACTIVE */
836
837 /* label */
838 label_len = strlen(argv[2]);
839 label_len16 = utf8_utf16_strnlen(argv[2], label_len);
840 label = malloc((label_len16 + 1) * sizeof(u16));
841 if (!label)
842 return CMD_RET_FAILURE;
843 lo.label = label; /* label will be changed below */
844 utf8_utf16_strncpy(&label, argv[2], label_len);
845
846 /* file path */
847 ret = efi_dp_from_name(argv[3], argv[4], argv[5], &device_path,
848 &file_path);
849 if (ret != EFI_SUCCESS) {
850 printf("Cannot create device path for \"%s %s\"\n",
851 argv[3], argv[4]);
Heinrich Schuchardt428a4702019-06-20 12:48:04 +0200852 r = CMD_RET_FAILURE;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900853 goto out;
854 }
855 lo.file_path = file_path;
856 lo.file_path_length = efi_dp_size(file_path)
857 + sizeof(struct efi_device_path); /* for END */
858
859 /* optional data */
AKASHI Takahirod67591d2020-05-08 14:50:47 +0900860 if (argc == 6)
Heinrich Schuchardt39a1ff82019-04-29 13:51:45 +0200861 lo.optional_data = NULL;
862 else
863 lo.optional_data = (const u8 *)argv[6];
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900864
865 size = efi_serialize_load_option(&lo, (u8 **)&data);
866 if (!size) {
Heinrich Schuchardt428a4702019-06-20 12:48:04 +0200867 r = CMD_RET_FAILURE;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900868 goto out;
869 }
870
Heinrich Schuchardta30c7232020-05-02 16:08:37 +0200871 ret = EFI_CALL(efi_set_variable(var_name16, &guid,
AKASHI Takahirof658c2e2019-06-04 15:52:10 +0900872 EFI_VARIABLE_NON_VOLATILE |
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900873 EFI_VARIABLE_BOOTSERVICE_ACCESS |
874 EFI_VARIABLE_RUNTIME_ACCESS,
875 size, data));
Heinrich Schuchardta332f252019-06-20 12:59:45 +0200876 if (ret != EFI_SUCCESS) {
877 printf("Cannot set %ls\n", var_name16);
878 r = CMD_RET_FAILURE;
879 }
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900880out:
881 free(data);
882 efi_free_pool(device_path);
883 efi_free_pool(file_path);
884 free(lo.label);
885
Heinrich Schuchardt428a4702019-06-20 12:48:04 +0200886 return r;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900887}
888
889/**
890 * do_efi_boot_rm() - delete UEFI load options
891 *
892 * @cmdtp: Command table
893 * @flag: Command flag
894 * @argc: Number of arguments
895 * @argv: Argument array
896 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
897 *
898 * Implement efidebug "boot rm" sub-command.
899 * Delete UEFI load options.
Heinrich Schuchardt0b016562019-07-14 14:00:41 +0200900 *
901 * efidebug boot rm <id> ...
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900902 */
Simon Glass09140112020-05-10 11:40:03 -0600903static int do_efi_boot_rm(struct cmd_tbl *cmdtp, int flag,
904 int argc, char *const argv[])
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900905{
906 efi_guid_t guid;
907 int id, i;
908 char *endp;
909 char var_name[9];
AKASHI Takahiroe8bced62020-02-28 09:05:04 +0900910 u16 var_name16[9], *p;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900911 efi_status_t ret;
912
913 if (argc == 1)
914 return CMD_RET_USAGE;
915
916 guid = efi_global_variable_guid;
917 for (i = 1; i < argc; i++, argv++) {
918 id = (int)simple_strtoul(argv[1], &endp, 16);
919 if (*endp != '\0' || id > 0xffff)
920 return CMD_RET_FAILURE;
921
922 sprintf(var_name, "Boot%04X", id);
AKASHI Takahiroe8bced62020-02-28 09:05:04 +0900923 p = var_name16;
924 utf8_utf16_strncpy(&p, var_name, 9);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900925
Heinrich Schuchardta30c7232020-05-02 16:08:37 +0200926 ret = EFI_CALL(efi_set_variable(var_name16, &guid, 0, 0, NULL));
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900927 if (ret) {
Heinrich Schuchardt30efb5d2020-03-02 20:13:10 +0100928 printf("Cannot remove %ls\n", var_name16);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900929 return CMD_RET_FAILURE;
930 }
931 }
932
933 return CMD_RET_SUCCESS;
934}
935
936/**
937 * show_efi_boot_opt_data() - dump UEFI load option
938 *
Heinrich Schuchardtb5f4e9e2020-04-29 19:20:35 +0200939 * @varname16: variable name
Heinrich Schuchardt39a1ff82019-04-29 13:51:45 +0200940 * @data: value of UEFI load option variable
941 * @size: size of the boot option
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900942 *
943 * Decode the value of UEFI load option variable and print information.
944 */
Heinrich Schuchardt0e69bcf2020-05-31 22:46:09 +0200945static void show_efi_boot_opt_data(u16 *varname16, void *data, size_t *size)
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900946{
947 struct efi_load_option lo;
948 char *label, *p;
949 size_t label_len16, label_len;
950 u16 *dp_str;
Heinrich Schuchardt0e69bcf2020-05-31 22:46:09 +0200951 efi_status_t ret;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900952
Heinrich Schuchardt0e69bcf2020-05-31 22:46:09 +0200953 ret = efi_deserialize_load_option(&lo, data, size);
954 if (ret != EFI_SUCCESS) {
955 printf("%ls: invalid load option\n", varname16);
956 return;
957 }
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900958
959 label_len16 = u16_strlen(lo.label);
960 label_len = utf16_utf8_strnlen(lo.label, label_len16);
961 label = malloc(label_len + 1);
962 if (!label)
963 return;
964 p = label;
965 utf16_utf8_strncpy(&p, lo.label, label_len16);
966
Heinrich Schuchardtb5f4e9e2020-04-29 19:20:35 +0200967 printf("%ls:\nattributes: %c%c%c (0x%08x)\n",
968 varname16,
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900969 /* ACTIVE */
970 lo.attributes & LOAD_OPTION_ACTIVE ? 'A' : '-',
971 /* FORCE RECONNECT */
972 lo.attributes & LOAD_OPTION_FORCE_RECONNECT ? 'R' : '-',
973 /* HIDDEN */
974 lo.attributes & LOAD_OPTION_HIDDEN ? 'H' : '-',
975 lo.attributes);
Heinrich Schuchardt39a1ff82019-04-29 13:51:45 +0200976 printf(" label: %s\n", label);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900977
978 dp_str = efi_dp_str(lo.file_path);
Heinrich Schuchardt39a1ff82019-04-29 13:51:45 +0200979 printf(" file_path: %ls\n", dp_str);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900980 efi_free_pool(dp_str);
981
Heinrich Schuchardt39a1ff82019-04-29 13:51:45 +0200982 printf(" data:\n");
983 print_hex_dump(" ", DUMP_PREFIX_OFFSET, 16, 1,
Heinrich Schuchardt0e69bcf2020-05-31 22:46:09 +0200984 lo.optional_data, *size, true);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900985 free(label);
986}
987
988/**
989 * show_efi_boot_opt() - dump UEFI load option
990 *
Heinrich Schuchardtb5f4e9e2020-04-29 19:20:35 +0200991 * @varname16: variable name
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900992 *
993 * Dump information defined by UEFI load option.
994 */
Heinrich Schuchardtb5f4e9e2020-04-29 19:20:35 +0200995static void show_efi_boot_opt(u16 *varname16)
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900996{
Heinrich Schuchardtb5f4e9e2020-04-29 19:20:35 +0200997 void *data;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900998 efi_uintn_t size;
AKASHI Takahiro0bffb8c2019-11-26 10:11:22 +0900999 efi_status_t ret;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001000
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001001 size = 0;
Heinrich Schuchardtb5f4e9e2020-04-29 19:20:35 +02001002 ret = EFI_CALL(efi_get_variable(varname16, &efi_global_variable_guid,
1003 NULL, &size, NULL));
AKASHI Takahiro0bffb8c2019-11-26 10:11:22 +09001004 if (ret == EFI_BUFFER_TOO_SMALL) {
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001005 data = malloc(size);
Heinrich Schuchardtb5f4e9e2020-04-29 19:20:35 +02001006 if (!data) {
1007 printf("ERROR: Out of memory\n");
1008 return;
1009 }
1010 ret = EFI_CALL(efi_get_variable(varname16,
1011 &efi_global_variable_guid,
1012 NULL, &size, data));
1013 if (ret == EFI_SUCCESS)
Heinrich Schuchardt0e69bcf2020-05-31 22:46:09 +02001014 show_efi_boot_opt_data(varname16, data, &size);
Heinrich Schuchardtb5f4e9e2020-04-29 19:20:35 +02001015 free(data);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001016 }
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001017}
1018
AKASHI Takahiroffe21572019-04-26 09:44:18 +09001019static int u16_tohex(u16 c)
1020{
1021 if (c >= '0' && c <= '9')
1022 return c - '0';
1023 if (c >= 'A' && c <= 'F')
1024 return c - 'A' + 10;
1025
1026 /* not hexadecimal */
1027 return -1;
1028}
1029
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001030/**
1031 * show_efi_boot_dump() - dump all UEFI load options
1032 *
1033 * @cmdtp: Command table
1034 * @flag: Command flag
1035 * @argc: Number of arguments
1036 * @argv: Argument array
1037 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
1038 *
1039 * Implement efidebug "boot dump" sub-command.
1040 * Dump information of all UEFI load options defined.
Heinrich Schuchardta6ccba02019-07-25 20:52:23 +02001041 *
1042 * efidebug boot dump
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001043 */
Simon Glass09140112020-05-10 11:40:03 -06001044static int do_efi_boot_dump(struct cmd_tbl *cmdtp, int flag,
1045 int argc, char *const argv[])
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001046{
AKASHI Takahiroffe21572019-04-26 09:44:18 +09001047 u16 *var_name16, *p;
1048 efi_uintn_t buf_size, size;
1049 efi_guid_t guid;
1050 int id, i, digit;
1051 efi_status_t ret;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001052
1053 if (argc > 1)
1054 return CMD_RET_USAGE;
1055
AKASHI Takahiroffe21572019-04-26 09:44:18 +09001056 buf_size = 128;
1057 var_name16 = malloc(buf_size);
1058 if (!var_name16)
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001059 return CMD_RET_FAILURE;
1060
AKASHI Takahiroffe21572019-04-26 09:44:18 +09001061 var_name16[0] = 0;
1062 for (;;) {
1063 size = buf_size;
1064 ret = EFI_CALL(efi_get_next_variable_name(&size, var_name16,
1065 &guid));
1066 if (ret == EFI_NOT_FOUND)
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001067 break;
AKASHI Takahiroffe21572019-04-26 09:44:18 +09001068 if (ret == EFI_BUFFER_TOO_SMALL) {
1069 buf_size = size;
1070 p = realloc(var_name16, buf_size);
1071 if (!p) {
1072 free(var_name16);
1073 return CMD_RET_FAILURE;
1074 }
1075 var_name16 = p;
1076 ret = EFI_CALL(efi_get_next_variable_name(&size,
1077 var_name16,
1078 &guid));
1079 }
1080 if (ret != EFI_SUCCESS) {
1081 free(var_name16);
1082 return CMD_RET_FAILURE;
1083 }
1084
1085 if (memcmp(var_name16, L"Boot", 8))
1086 continue;
1087
1088 for (id = 0, i = 0; i < 4; i++) {
1089 digit = u16_tohex(var_name16[4 + i]);
1090 if (digit < 0)
1091 break;
1092 id = (id << 4) + digit;
1093 }
1094 if (i == 4 && !var_name16[8])
Heinrich Schuchardtb5f4e9e2020-04-29 19:20:35 +02001095 show_efi_boot_opt(var_name16);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001096 }
AKASHI Takahiroffe21572019-04-26 09:44:18 +09001097
1098 free(var_name16);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001099
1100 return CMD_RET_SUCCESS;
1101}
1102
1103/**
1104 * show_efi_boot_order() - show order of UEFI load options
1105 *
1106 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
1107 *
1108 * Show order of UEFI load options defined by BootOrder variable.
1109 */
1110static int show_efi_boot_order(void)
1111{
Heinrich Schuchardtf9f5f922020-04-29 21:15:08 +02001112 u16 *bootorder;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001113 efi_uintn_t size;
1114 int num, i;
1115 char var_name[9];
1116 u16 var_name16[9], *p16;
1117 void *data;
1118 struct efi_load_option lo;
1119 char *label, *p;
1120 size_t label_len16, label_len;
1121 efi_status_t ret;
1122
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001123 size = 0;
Heinrich Schuchardta30c7232020-05-02 16:08:37 +02001124 ret = EFI_CALL(efi_get_variable(L"BootOrder", &efi_global_variable_guid,
Heinrich Schuchardtf9f5f922020-04-29 21:15:08 +02001125 NULL, &size, NULL));
1126 if (ret != EFI_BUFFER_TOO_SMALL) {
1127 if (ret == EFI_NOT_FOUND) {
1128 printf("BootOrder not defined\n");
1129 return CMD_RET_SUCCESS;
1130 } else {
1131 return CMD_RET_FAILURE;
1132 }
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001133 }
Heinrich Schuchardtf9f5f922020-04-29 21:15:08 +02001134 bootorder = malloc(size);
1135 if (!bootorder) {
1136 printf("ERROR: Out of memory\n");
1137 return CMD_RET_FAILURE;
1138 }
1139 ret = EFI_CALL(efi_get_variable(L"BootOrder", &efi_global_variable_guid,
1140 NULL, &size, bootorder));
1141 if (ret != EFI_SUCCESS) {
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001142 ret = CMD_RET_FAILURE;
1143 goto out;
1144 }
1145
1146 num = size / sizeof(u16);
1147 for (i = 0; i < num; i++) {
1148 sprintf(var_name, "Boot%04X", bootorder[i]);
1149 p16 = var_name16;
1150 utf8_utf16_strncpy(&p16, var_name, 9);
1151
1152 size = 0;
Heinrich Schuchardtf9f5f922020-04-29 21:15:08 +02001153 ret = EFI_CALL(efi_get_variable(var_name16,
1154 &efi_global_variable_guid, NULL,
1155 &size, NULL));
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001156 if (ret != EFI_BUFFER_TOO_SMALL) {
Heinrich Schuchardtf9f5f922020-04-29 21:15:08 +02001157 printf("%2d: %s: (not defined)\n", i + 1, var_name);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001158 continue;
1159 }
1160
1161 data = malloc(size);
1162 if (!data) {
1163 ret = CMD_RET_FAILURE;
1164 goto out;
1165 }
Heinrich Schuchardtf9f5f922020-04-29 21:15:08 +02001166 ret = EFI_CALL(efi_get_variable(var_name16,
1167 &efi_global_variable_guid, NULL,
1168 &size, data));
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001169 if (ret != EFI_SUCCESS) {
1170 free(data);
1171 ret = CMD_RET_FAILURE;
1172 goto out;
1173 }
1174
Heinrich Schuchardt0e69bcf2020-05-31 22:46:09 +02001175 ret = efi_deserialize_load_option(&lo, data, &size);
1176 if (ret != EFI_SUCCESS) {
1177 printf("%ls: invalid load option\n", var_name16);
1178 ret = CMD_RET_FAILURE;
1179 goto out;
1180 }
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001181
1182 label_len16 = u16_strlen(lo.label);
1183 label_len = utf16_utf8_strnlen(lo.label, label_len16);
1184 label = malloc(label_len + 1);
1185 if (!label) {
1186 free(data);
1187 ret = CMD_RET_FAILURE;
1188 goto out;
1189 }
1190 p = label;
1191 utf16_utf8_strncpy(&p, lo.label, label_len16);
Heinrich Schuchardtf9f5f922020-04-29 21:15:08 +02001192 printf("%2d: %s: %s\n", i + 1, var_name, label);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001193 free(label);
1194
1195 free(data);
1196 }
1197out:
1198 free(bootorder);
1199
1200 return ret;
1201}
1202
1203/**
1204 * do_efi_boot_next() - manage UEFI BootNext variable
1205 *
1206 * @cmdtp: Command table
1207 * @flag: Command flag
1208 * @argc: Number of arguments
1209 * @argv: Argument array
1210 * Return: CMD_RET_SUCCESS on success,
1211 * CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
1212 *
1213 * Implement efidebug "boot next" sub-command.
1214 * Set BootNext variable.
Heinrich Schuchardt0b016562019-07-14 14:00:41 +02001215 *
1216 * efidebug boot next <id>
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001217 */
Simon Glass09140112020-05-10 11:40:03 -06001218static int do_efi_boot_next(struct cmd_tbl *cmdtp, int flag,
1219 int argc, char *const argv[])
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001220{
1221 u16 bootnext;
1222 efi_uintn_t size;
1223 char *endp;
1224 efi_guid_t guid;
1225 efi_status_t ret;
Heinrich Schuchardta332f252019-06-20 12:59:45 +02001226 int r = CMD_RET_SUCCESS;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001227
1228 if (argc != 2)
1229 return CMD_RET_USAGE;
1230
1231 bootnext = (u16)simple_strtoul(argv[1], &endp, 16);
Heinrich Schuchardtbdb15772020-05-09 17:59:19 +02001232 if (*endp) {
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001233 printf("invalid value: %s\n", argv[1]);
Heinrich Schuchardt428a4702019-06-20 12:48:04 +02001234 r = CMD_RET_FAILURE;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001235 goto out;
1236 }
1237
1238 guid = efi_global_variable_guid;
1239 size = sizeof(u16);
Heinrich Schuchardta30c7232020-05-02 16:08:37 +02001240 ret = EFI_CALL(efi_set_variable(L"BootNext", &guid,
AKASHI Takahirof658c2e2019-06-04 15:52:10 +09001241 EFI_VARIABLE_NON_VOLATILE |
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001242 EFI_VARIABLE_BOOTSERVICE_ACCESS |
1243 EFI_VARIABLE_RUNTIME_ACCESS,
1244 size, &bootnext));
Heinrich Schuchardta332f252019-06-20 12:59:45 +02001245 if (ret != EFI_SUCCESS) {
1246 printf("Cannot set BootNext\n");
1247 r = CMD_RET_FAILURE;
1248 }
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001249out:
Heinrich Schuchardt428a4702019-06-20 12:48:04 +02001250 return r;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001251}
1252
1253/**
1254 * do_efi_boot_order() - manage UEFI BootOrder variable
1255 *
1256 * @cmdtp: Command table
1257 * @flag: Command flag
1258 * @argc: Number of arguments
1259 * @argv: Argument array
1260 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
1261 *
1262 * Implement efidebug "boot order" sub-command.
1263 * Show order of UEFI load options, or change it in BootOrder variable.
Heinrich Schuchardt0b016562019-07-14 14:00:41 +02001264 *
1265 * efidebug boot order [<id> ...]
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001266 */
Simon Glass09140112020-05-10 11:40:03 -06001267static int do_efi_boot_order(struct cmd_tbl *cmdtp, int flag,
1268 int argc, char *const argv[])
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001269{
1270 u16 *bootorder = NULL;
1271 efi_uintn_t size;
1272 int id, i;
1273 char *endp;
1274 efi_guid_t guid;
1275 efi_status_t ret;
Heinrich Schuchardta332f252019-06-20 12:59:45 +02001276 int r = CMD_RET_SUCCESS;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001277
1278 if (argc == 1)
1279 return show_efi_boot_order();
1280
1281 argc--;
1282 argv++;
1283
1284 size = argc * sizeof(u16);
1285 bootorder = malloc(size);
1286 if (!bootorder)
1287 return CMD_RET_FAILURE;
1288
1289 for (i = 0; i < argc; i++) {
1290 id = (int)simple_strtoul(argv[i], &endp, 16);
1291 if (*endp != '\0' || id > 0xffff) {
1292 printf("invalid value: %s\n", argv[i]);
Heinrich Schuchardt428a4702019-06-20 12:48:04 +02001293 r = CMD_RET_FAILURE;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001294 goto out;
1295 }
1296
1297 bootorder[i] = (u16)id;
1298 }
1299
1300 guid = efi_global_variable_guid;
Heinrich Schuchardta30c7232020-05-02 16:08:37 +02001301 ret = EFI_CALL(efi_set_variable(L"BootOrder", &guid,
AKASHI Takahirof658c2e2019-06-04 15:52:10 +09001302 EFI_VARIABLE_NON_VOLATILE |
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001303 EFI_VARIABLE_BOOTSERVICE_ACCESS |
1304 EFI_VARIABLE_RUNTIME_ACCESS,
1305 size, bootorder));
Heinrich Schuchardta332f252019-06-20 12:59:45 +02001306 if (ret != EFI_SUCCESS) {
1307 printf("Cannot set BootOrder\n");
1308 r = CMD_RET_FAILURE;
1309 }
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001310out:
1311 free(bootorder);
1312
Heinrich Schuchardt428a4702019-06-20 12:48:04 +02001313 return r;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001314}
1315
Simon Glass09140112020-05-10 11:40:03 -06001316static struct cmd_tbl cmd_efidebug_boot_sub[] = {
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001317 U_BOOT_CMD_MKENT(add, CONFIG_SYS_MAXARGS, 1, do_efi_boot_add, "", ""),
1318 U_BOOT_CMD_MKENT(rm, CONFIG_SYS_MAXARGS, 1, do_efi_boot_rm, "", ""),
1319 U_BOOT_CMD_MKENT(dump, CONFIG_SYS_MAXARGS, 1, do_efi_boot_dump, "", ""),
1320 U_BOOT_CMD_MKENT(next, CONFIG_SYS_MAXARGS, 1, do_efi_boot_next, "", ""),
1321 U_BOOT_CMD_MKENT(order, CONFIG_SYS_MAXARGS, 1, do_efi_boot_order,
1322 "", ""),
1323};
1324
1325/**
1326 * do_efi_boot_opt() - manage UEFI load options
1327 *
1328 * @cmdtp: Command table
1329 * @flag: Command flag
1330 * @argc: Number of arguments
1331 * @argv: Argument array
1332 * Return: CMD_RET_SUCCESS on success,
1333 * CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
1334 *
1335 * Implement efidebug "boot" sub-command.
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001336 */
Simon Glass09140112020-05-10 11:40:03 -06001337static int do_efi_boot_opt(struct cmd_tbl *cmdtp, int flag,
1338 int argc, char *const argv[])
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001339{
Simon Glass09140112020-05-10 11:40:03 -06001340 struct cmd_tbl *cp;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001341
1342 if (argc < 2)
1343 return CMD_RET_USAGE;
1344
1345 argc--; argv++;
1346
1347 cp = find_cmd_tbl(argv[0], cmd_efidebug_boot_sub,
1348 ARRAY_SIZE(cmd_efidebug_boot_sub));
1349 if (!cp)
1350 return CMD_RET_USAGE;
1351
1352 return cp->cmd(cmdtp, flag, argc, argv);
1353}
1354
AKASHI Takahiro525fc062020-04-14 11:51:48 +09001355/**
1356 * do_efi_test_bootmgr() - run simple bootmgr for test
1357 *
1358 * @cmdtp: Command table
1359 * @flag: Command flag
1360 * @argc: Number of arguments
1361 * @argv: Argument array
1362 * Return: CMD_RET_SUCCESS on success,
1363 * CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
1364 *
1365 * Implement efidebug "test bootmgr" sub-command.
1366 * Run simple bootmgr for test.
1367 *
1368 * efidebug test bootmgr
1369 */
Heinrich Schuchardtff2f5322021-01-15 19:02:50 +01001370static __maybe_unused int do_efi_test_bootmgr(struct cmd_tbl *cmdtp, int flag,
1371 int argc, char * const argv[])
AKASHI Takahiro525fc062020-04-14 11:51:48 +09001372{
1373 efi_handle_t image;
1374 efi_uintn_t exit_data_size = 0;
1375 u16 *exit_data = NULL;
1376 efi_status_t ret;
Heinrich Schuchardtbc78d222020-08-11 18:20:50 +02001377 void *load_options = NULL;
AKASHI Takahiro525fc062020-04-14 11:51:48 +09001378
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +02001379 ret = efi_bootmgr_load(&image, &load_options);
AKASHI Takahiro525fc062020-04-14 11:51:48 +09001380 printf("efi_bootmgr_load() returned: %ld\n", ret & ~EFI_ERROR_MASK);
1381
1382 /* We call efi_start_image() even if error for test purpose. */
1383 ret = EFI_CALL(efi_start_image(image, &exit_data_size, &exit_data));
1384 printf("efi_start_image() returned: %ld\n", ret & ~EFI_ERROR_MASK);
1385 if (ret && exit_data)
1386 efi_free_pool(exit_data);
1387
1388 efi_restore_gd();
1389
Heinrich Schuchardt0ad64002020-08-07 17:49:39 +02001390 free(load_options);
AKASHI Takahiro525fc062020-04-14 11:51:48 +09001391 return CMD_RET_SUCCESS;
1392}
1393
Simon Glass09140112020-05-10 11:40:03 -06001394static struct cmd_tbl cmd_efidebug_test_sub[] = {
Heinrich Schuchardtff2f5322021-01-15 19:02:50 +01001395#ifdef CONFIG_CMD_BOOTEFI_BOOTMGR
AKASHI Takahiro525fc062020-04-14 11:51:48 +09001396 U_BOOT_CMD_MKENT(bootmgr, CONFIG_SYS_MAXARGS, 1, do_efi_test_bootmgr,
1397 "", ""),
Heinrich Schuchardtff2f5322021-01-15 19:02:50 +01001398#endif
AKASHI Takahiro525fc062020-04-14 11:51:48 +09001399};
1400
1401/**
1402 * do_efi_test() - manage UEFI load options
1403 *
1404 * @cmdtp: Command table
1405 * @flag: Command flag
1406 * @argc: Number of arguments
1407 * @argv: Argument array
1408 * Return: CMD_RET_SUCCESS on success,
1409 * CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
1410 *
1411 * Implement efidebug "test" sub-command.
1412 */
Simon Glass09140112020-05-10 11:40:03 -06001413static int do_efi_test(struct cmd_tbl *cmdtp, int flag,
AKASHI Takahiro525fc062020-04-14 11:51:48 +09001414 int argc, char * const argv[])
1415{
Simon Glass09140112020-05-10 11:40:03 -06001416 struct cmd_tbl *cp;
AKASHI Takahiro525fc062020-04-14 11:51:48 +09001417
1418 if (argc < 2)
1419 return CMD_RET_USAGE;
1420
1421 argc--; argv++;
1422
1423 cp = find_cmd_tbl(argv[0], cmd_efidebug_test_sub,
1424 ARRAY_SIZE(cmd_efidebug_test_sub));
1425 if (!cp)
1426 return CMD_RET_USAGE;
1427
1428 return cp->cmd(cmdtp, flag, argc, argv);
1429}
1430
Ilias Apalodimasb0e4f2c2020-05-17 22:25:45 +03001431/**
1432 * do_efi_query_info() - QueryVariableInfo EFI service
1433 *
1434 * @cmdtp: Command table
1435 * @flag: Command flag
1436 * @argc: Number of arguments
1437 * @argv: Argument array
1438 * Return: CMD_RET_SUCCESS on success,
1439 * CMD_RET_USAGE or CMD_RET_FAILURE on failure
1440 *
1441 * Implement efidebug "test" sub-command.
1442 */
1443
Simon Glass09140112020-05-10 11:40:03 -06001444static int do_efi_query_info(struct cmd_tbl *cmdtp, int flag,
Ilias Apalodimasb0e4f2c2020-05-17 22:25:45 +03001445 int argc, char * const argv[])
1446{
1447 efi_status_t ret;
1448 u32 attr = 0;
1449 u64 max_variable_storage_size;
1450 u64 remain_variable_storage_size;
1451 u64 max_variable_size;
1452 int i;
1453
1454 for (i = 1; i < argc; i++) {
1455 if (!strcmp(argv[i], "-bs"))
1456 attr |= EFI_VARIABLE_BOOTSERVICE_ACCESS;
1457 else if (!strcmp(argv[i], "-rt"))
1458 attr |= EFI_VARIABLE_RUNTIME_ACCESS;
1459 else if (!strcmp(argv[i], "-nv"))
1460 attr |= EFI_VARIABLE_NON_VOLATILE;
1461 else if (!strcmp(argv[i], "-at"))
1462 attr |=
1463 EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS;
1464 }
1465
1466 ret = EFI_CALL(efi_query_variable_info(attr,
1467 &max_variable_storage_size,
1468 &remain_variable_storage_size,
1469 &max_variable_size));
1470 if (ret != EFI_SUCCESS) {
1471 printf("Error: Cannot query UEFI variables, r = %lu\n",
1472 ret & ~EFI_ERROR_MASK);
1473 return CMD_RET_FAILURE;
1474 }
1475
1476 printf("Max storage size %llu\n", max_variable_storage_size);
1477 printf("Remaining storage size %llu\n", remain_variable_storage_size);
1478 printf("Max variable size %llu\n", max_variable_size);
1479
1480 return CMD_RET_SUCCESS;
1481}
1482
Simon Glass09140112020-05-10 11:40:03 -06001483static struct cmd_tbl cmd_efidebug_sub[] = {
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001484 U_BOOT_CMD_MKENT(boot, CONFIG_SYS_MAXARGS, 1, do_efi_boot_opt, "", ""),
AKASHI Takahiro7f35ced2020-11-17 09:28:01 +09001485#ifdef CONFIG_EFI_HAVE_CAPSULE_SUPPORT
1486 U_BOOT_CMD_MKENT(capsule, CONFIG_SYS_MAXARGS, 1, do_efi_capsule,
1487 "", ""),
1488#endif
AKASHI Takahiro355cdb52019-02-25 15:54:39 +09001489 U_BOOT_CMD_MKENT(devices, CONFIG_SYS_MAXARGS, 1, do_efi_show_devices,
1490 "", ""),
AKASHI Takahiro66eaf562019-02-25 15:54:40 +09001491 U_BOOT_CMD_MKENT(drivers, CONFIG_SYS_MAXARGS, 1, do_efi_show_drivers,
1492 "", ""),
AKASHI Takahiroa8014622019-02-25 15:54:41 +09001493 U_BOOT_CMD_MKENT(dh, CONFIG_SYS_MAXARGS, 1, do_efi_show_handles,
1494 "", ""),
AKASHI Takahirofa536732019-02-25 15:54:42 +09001495 U_BOOT_CMD_MKENT(images, CONFIG_SYS_MAXARGS, 1, do_efi_show_images,
1496 "", ""),
AKASHI Takahiro00358bb2019-02-25 15:54:43 +09001497 U_BOOT_CMD_MKENT(memmap, CONFIG_SYS_MAXARGS, 1, do_efi_show_memmap,
1498 "", ""),
Heinrich Schuchardt986e0642020-01-07 05:57:47 +01001499 U_BOOT_CMD_MKENT(tables, CONFIG_SYS_MAXARGS, 1, do_efi_show_tables,
1500 "", ""),
AKASHI Takahiro525fc062020-04-14 11:51:48 +09001501 U_BOOT_CMD_MKENT(test, CONFIG_SYS_MAXARGS, 1, do_efi_test,
1502 "", ""),
Ilias Apalodimasb0e4f2c2020-05-17 22:25:45 +03001503 U_BOOT_CMD_MKENT(query, CONFIG_SYS_MAXARGS, 1, do_efi_query_info,
1504 "", ""),
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001505};
1506
1507/**
1508 * do_efidebug() - display and configure UEFI environment
1509 *
1510 * @cmdtp: Command table
1511 * @flag: Command flag
1512 * @argc: Number of arguments
1513 * @argv: Argument array
1514 * Return: CMD_RET_SUCCESS on success,
1515 * CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
1516 *
1517 * Implement efidebug command which allows us to display and
1518 * configure UEFI environment.
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001519 */
Simon Glass09140112020-05-10 11:40:03 -06001520static int do_efidebug(struct cmd_tbl *cmdtp, int flag,
1521 int argc, char *const argv[])
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001522{
Simon Glass09140112020-05-10 11:40:03 -06001523 struct cmd_tbl *cp;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001524 efi_status_t r;
1525
1526 if (argc < 2)
1527 return CMD_RET_USAGE;
1528
1529 argc--; argv++;
1530
1531 /* Initialize UEFI drivers */
1532 r = efi_init_obj_list();
1533 if (r != EFI_SUCCESS) {
1534 printf("Error: Cannot initialize UEFI sub-system, r = %lu\n",
1535 r & ~EFI_ERROR_MASK);
1536 return CMD_RET_FAILURE;
1537 }
1538
1539 cp = find_cmd_tbl(argv[0], cmd_efidebug_sub,
1540 ARRAY_SIZE(cmd_efidebug_sub));
1541 if (!cp)
1542 return CMD_RET_USAGE;
1543
1544 return cp->cmd(cmdtp, flag, argc, argv);
1545}
1546
1547#ifdef CONFIG_SYS_LONGHELP
1548static char efidebug_help_text[] =
1549 " - UEFI Shell-like interface to configure UEFI environment\n"
1550 "\n"
1551 "efidebug boot add <bootid> <label> <interface> <devnum>[:<part>] <file path> [<load options>]\n"
1552 " - set UEFI BootXXXX variable\n"
1553 " <load options> will be passed to UEFI application\n"
1554 "efidebug boot rm <bootid#1> [<bootid#2> [<bootid#3> [...]]]\n"
1555 " - delete UEFI BootXXXX variables\n"
1556 "efidebug boot dump\n"
1557 " - dump all UEFI BootXXXX variables\n"
1558 "efidebug boot next <bootid>\n"
1559 " - set UEFI BootNext variable\n"
1560 "efidebug boot order [<bootid#1> [<bootid#2> [<bootid#3> [...]]]]\n"
1561 " - set/show UEFI boot order\n"
AKASHI Takahiro355cdb52019-02-25 15:54:39 +09001562 "\n"
AKASHI Takahiro7f35ced2020-11-17 09:28:01 +09001563#ifdef CONFIG_EFI_HAVE_CAPSULE_SUPPORT
1564 "efidebug capsule update [-v] <capsule address>\n"
1565 " - process a capsule\n"
Sughosh Ganu74075952020-12-30 19:27:11 +05301566 "efidebug capsule disk-update\n"
1567 " - update a capsule from disk\n"
AKASHI Takahiro7f35ced2020-11-17 09:28:01 +09001568 "efidebug capsule show <capsule address>\n"
1569 " - show capsule information\n"
1570 "efidebug capsule result [<capsule result var>]\n"
1571 " - show a capsule update result\n"
1572 "\n"
1573#endif
AKASHI Takahiro355cdb52019-02-25 15:54:39 +09001574 "efidebug devices\n"
Heinrich Schuchardt07e2fe72020-01-07 07:48:15 +01001575 " - show UEFI devices\n"
AKASHI Takahiro66eaf562019-02-25 15:54:40 +09001576 "efidebug drivers\n"
Heinrich Schuchardt07e2fe72020-01-07 07:48:15 +01001577 " - show UEFI drivers\n"
AKASHI Takahiroa8014622019-02-25 15:54:41 +09001578 "efidebug dh\n"
Heinrich Schuchardt07e2fe72020-01-07 07:48:15 +01001579 " - show UEFI handles\n"
AKASHI Takahirofa536732019-02-25 15:54:42 +09001580 "efidebug images\n"
AKASHI Takahiro00358bb2019-02-25 15:54:43 +09001581 " - show loaded images\n"
1582 "efidebug memmap\n"
Heinrich Schuchardt07e2fe72020-01-07 07:48:15 +01001583 " - show UEFI memory map\n"
Heinrich Schuchardt986e0642020-01-07 05:57:47 +01001584 "efidebug tables\n"
AKASHI Takahiro525fc062020-04-14 11:51:48 +09001585 " - show UEFI configuration tables\n"
Heinrich Schuchardtff2f5322021-01-15 19:02:50 +01001586#ifdef CONFIG_CMD_BOOTEFI_BOOTMGR
AKASHI Takahiro525fc062020-04-14 11:51:48 +09001587 "efidebug test bootmgr\n"
Ilias Apalodimasb0e4f2c2020-05-17 22:25:45 +03001588 " - run simple bootmgr for test\n"
Heinrich Schuchardtff2f5322021-01-15 19:02:50 +01001589#endif
Ilias Apalodimasb0e4f2c2020-05-17 22:25:45 +03001590 "efidebug query [-nv][-bs][-rt][-at]\n"
1591 " - show size of UEFI variables store\n";
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001592#endif
1593
1594U_BOOT_CMD(
1595 efidebug, 10, 0, do_efidebug,
1596 "Configure UEFI environment",
1597 efidebug_help_text
1598);