blob: e6572262545557ac02b3d0ad3555f11a93a436b0 [file] [log] [blame]
AKASHI Takahiroe7c08832019-02-25 15:54:38 +09001// SPDX-License-Identifier: GPL-2.0+
2/*
3 * UEFI Shell-like command
4 *
5 * Copyright (c) 2018 AKASHI Takahiro, Linaro Limited
6 */
7
8#include <charset.h>
9#include <common.h>
10#include <command.h>
11#include <efi_loader.h>
12#include <environment.h>
13#include <exports.h>
Heinrich Schuchardt9df002e2019-04-29 13:51:45 +020014#include <hexdump.h>
AKASHI Takahiroe7c08832019-02-25 15:54:38 +090015#include <malloc.h>
16#include <search.h>
17#include <linux/ctype.h>
18
AKASHI Takahiroe32788a2019-02-25 15:54:39 +090019#define BS systab.boottime
AKASHI Takahiroe7c08832019-02-25 15:54:38 +090020#define RT systab.runtime
21
22/**
AKASHI Takahiroe32788a2019-02-25 15:54:39 +090023 * efi_get_device_handle_info() - get information of UEFI device
24 *
25 * @handle: Handle of UEFI device
26 * @dev_path_text: Pointer to text of device path
27 * Return: 0 on success, -1 on failure
28 *
29 * Currently return a formatted text of device path.
30 */
31static int efi_get_device_handle_info(efi_handle_t handle, u16 **dev_path_text)
32{
33 struct efi_device_path *dp;
34 efi_status_t ret;
35
36 ret = EFI_CALL(BS->open_protocol(handle, &efi_guid_device_path,
37 (void **)&dp, NULL /* FIXME */, NULL,
38 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
39 if (ret == EFI_SUCCESS) {
40 *dev_path_text = efi_dp_str(dp);
41 return 0;
42 } else {
43 return -1;
44 }
45}
46
47#define EFI_HANDLE_WIDTH ((int)sizeof(efi_handle_t) * 2)
48
49static const char spc[] = " ";
50static const char sep[] = "================";
51
52/**
53 * do_efi_show_devices() - show UEFI devices
54 *
55 * @cmdtp: Command table
56 * @flag: Command flag
57 * @argc: Number of arguments
58 * @argv: Argument array
59 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
60 *
61 * Implement efidebug "devices" sub-command.
62 * Show all UEFI devices and their information.
63 */
64static int do_efi_show_devices(cmd_tbl_t *cmdtp, int flag,
65 int argc, char * const argv[])
66{
67 efi_handle_t *handles;
68 efi_uintn_t num, i;
69 u16 *dev_path_text;
70 efi_status_t ret;
71
72 ret = EFI_CALL(BS->locate_handle_buffer(ALL_HANDLES, NULL, NULL,
73 &num, &handles));
74 if (ret != EFI_SUCCESS)
75 return CMD_RET_FAILURE;
76
77 if (!num)
78 return CMD_RET_SUCCESS;
79
80 printf("Device%.*s Device Path\n", EFI_HANDLE_WIDTH - 6, spc);
81 printf("%.*s ====================\n", EFI_HANDLE_WIDTH, sep);
82 for (i = 0; i < num; i++) {
83 if (!efi_get_device_handle_info(handles[i], &dev_path_text)) {
84 printf("%p %ls\n", handles[i], dev_path_text);
85 efi_free_pool(dev_path_text);
86 }
87 }
88
89 EFI_CALL(BS->free_pool(handles));
90
91 return CMD_RET_SUCCESS;
92}
93
94/**
AKASHI Takahiro185716a2019-02-25 15:54:40 +090095 * efi_get_driver_handle_info() - get information of UEFI driver
96 *
97 * @handle: Handle of UEFI device
98 * @driver_name: Driver name
99 * @image_path: Pointer to text of device path
100 * Return: 0 on success, -1 on failure
101 *
102 * Currently return no useful information as all UEFI drivers are
103 * built-in..
104 */
105static int efi_get_driver_handle_info(efi_handle_t handle, u16 **driver_name,
106 u16 **image_path)
107{
108 struct efi_handler *handler;
109 struct efi_loaded_image *image;
110 efi_status_t ret;
111
112 /*
113 * driver name
114 * TODO: support EFI_COMPONENT_NAME2_PROTOCOL
115 */
116 *driver_name = NULL;
117
118 /* image name */
119 ret = efi_search_protocol(handle, &efi_guid_loaded_image, &handler);
120 if (ret != EFI_SUCCESS) {
121 *image_path = NULL;
122 return 0;
123 }
124
125 image = handler->protocol_interface;
126 *image_path = efi_dp_str(image->file_path);
127
128 return 0;
129}
130
131/**
132 * do_efi_show_drivers() - show UEFI drivers
133 *
134 * @cmdtp: Command table
135 * @flag: Command flag
136 * @argc: Number of arguments
137 * @argv: Argument array
138 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
139 *
140 * Implement efidebug "drivers" sub-command.
141 * Show all UEFI drivers and their information.
142 */
143static int do_efi_show_drivers(cmd_tbl_t *cmdtp, int flag,
144 int argc, char * const argv[])
145{
146 efi_handle_t *handles;
147 efi_uintn_t num, i;
148 u16 *driver_name, *image_path_text;
149 efi_status_t ret;
150
151 ret = EFI_CALL(BS->locate_handle_buffer(
152 BY_PROTOCOL, &efi_guid_driver_binding_protocol,
153 NULL, &num, &handles));
154 if (ret != EFI_SUCCESS)
155 return CMD_RET_FAILURE;
156
157 if (!num)
158 return CMD_RET_SUCCESS;
159
160 printf("Driver%.*s Name Image Path\n",
161 EFI_HANDLE_WIDTH - 6, spc);
162 printf("%.*s ==================== ====================\n",
163 EFI_HANDLE_WIDTH, sep);
164 for (i = 0; i < num; i++) {
165 if (!efi_get_driver_handle_info(handles[i], &driver_name,
166 &image_path_text)) {
167 if (image_path_text)
168 printf("%p %-20ls %ls\n", handles[i],
169 driver_name, image_path_text);
170 else
171 printf("%p %-20ls <built-in>\n",
172 handles[i], driver_name);
173 EFI_CALL(BS->free_pool(driver_name));
174 EFI_CALL(BS->free_pool(image_path_text));
175 }
176 }
177
178 EFI_CALL(BS->free_pool(handles));
179
180 return CMD_RET_SUCCESS;
181}
182
AKASHI Takahiro02e8ca62019-02-25 15:54:41 +0900183static const struct {
184 const char *text;
185 const efi_guid_t guid;
186} guid_list[] = {
187 {
188 "Device Path",
Heinrich Schuchardt788ad412019-04-20 07:39:11 +0200189 EFI_DEVICE_PATH_PROTOCOL_GUID,
AKASHI Takahiro02e8ca62019-02-25 15:54:41 +0900190 },
191 {
192 "Device Path To Text",
193 EFI_DEVICE_PATH_TO_TEXT_PROTOCOL_GUID,
194 },
195 {
196 "Device Path Utilities",
197 EFI_DEVICE_PATH_UTILITIES_PROTOCOL_GUID,
198 },
199 {
200 "Unicode Collation 2",
201 EFI_UNICODE_COLLATION_PROTOCOL2_GUID,
202 },
203 {
204 "Driver Binding",
205 EFI_DRIVER_BINDING_PROTOCOL_GUID,
206 },
207 {
208 "Simple Text Input",
209 EFI_SIMPLE_TEXT_INPUT_PROTOCOL_GUID,
210 },
211 {
212 "Simple Text Input Ex",
213 EFI_SIMPLE_TEXT_INPUT_EX_PROTOCOL_GUID,
214 },
215 {
216 "Simple Text Output",
217 EFI_SIMPLE_TEXT_OUTPUT_PROTOCOL_GUID,
218 },
219 {
220 "Block IO",
Heinrich Schuchardt788ad412019-04-20 07:39:11 +0200221 EFI_BLOCK_IO_PROTOCOL_GUID,
AKASHI Takahiro02e8ca62019-02-25 15:54:41 +0900222 },
223 {
224 "Simple File System",
225 EFI_SIMPLE_FILE_SYSTEM_PROTOCOL_GUID,
226 },
227 {
228 "Loaded Image",
Heinrich Schuchardt788ad412019-04-20 07:39:11 +0200229 EFI_LOADED_IMAGE_PROTOCOL_GUID,
AKASHI Takahiro02e8ca62019-02-25 15:54:41 +0900230 },
231 {
Heinrich Schuchardt788ad412019-04-20 07:39:11 +0200232 "Graphics Output",
233 EFI_GRAPHICS_OUTPUT_PROTOCOL_GUID,
AKASHI Takahiro02e8ca62019-02-25 15:54:41 +0900234 },
Heinrich Schuchardtae776902019-04-20 07:57:28 +0200235 {
236 "HII String",
237 EFI_HII_STRING_PROTOCOL_GUID,
238 },
239 {
240 "HII Database",
241 EFI_HII_DATABASE_PROTOCOL_GUID,
242 },
243 {
244 "HII Config Routing",
245 EFI_HII_CONFIG_ROUTING_PROTOCOL_GUID,
246 },
247 {
248 "Simple Network",
249 EFI_SIMPLE_NETWORK_PROTOCOL_GUID,
250 },
251 {
252 "PXE Base Code",
253 EFI_PXE_BASE_CODE_PROTOCOL_GUID,
254 },
AKASHI Takahiro02e8ca62019-02-25 15:54:41 +0900255};
256
257/**
258 * get_guid_text - get string of protocol guid
259 * @guid: Protocol guid
260 * Return: String
261 *
262 * Return string for display to represent the protocol.
263 */
264static const char *get_guid_text(const efi_guid_t *guid)
265{
266 int i;
267
268 for (i = 0; i < ARRAY_SIZE(guid_list); i++)
269 if (!guidcmp(&guid_list[i].guid, guid))
270 break;
271
272 if (i != ARRAY_SIZE(guid_list))
273 return guid_list[i].text;
274 else
275 return NULL;
276}
277
278/**
279 * do_efi_show_handles() - show UEFI handles
280 *
281 * @cmdtp: Command table
282 * @flag: Command flag
283 * @argc: Number of arguments
284 * @argv: Argument array
285 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
286 *
287 * Implement efidebug "dh" sub-command.
288 * Show all UEFI handles and their information, currently all protocols
289 * added to handle.
290 */
291static int do_efi_show_handles(cmd_tbl_t *cmdtp, int flag,
292 int argc, char * const argv[])
293{
294 efi_handle_t *handles;
295 efi_guid_t **guid;
296 efi_uintn_t num, count, i, j;
297 const char *guid_text;
298 efi_status_t ret;
299
300 ret = EFI_CALL(BS->locate_handle_buffer(ALL_HANDLES, NULL, NULL,
301 &num, &handles));
302 if (ret != EFI_SUCCESS)
303 return CMD_RET_FAILURE;
304
305 if (!num)
306 return CMD_RET_SUCCESS;
307
308 printf("Handle%.*s Protocols\n", EFI_HANDLE_WIDTH - 6, spc);
309 printf("%.*s ====================\n", EFI_HANDLE_WIDTH, sep);
310 for (i = 0; i < num; i++) {
311 printf("%p", handles[i]);
312 ret = EFI_CALL(BS->protocols_per_handle(handles[i], &guid,
313 &count));
314 if (ret || !count) {
315 putc('\n');
316 continue;
317 }
318
319 for (j = 0; j < count; j++) {
320 if (j)
321 printf(", ");
322 else
323 putc(' ');
324
325 guid_text = get_guid_text(guid[j]);
326 if (guid_text)
327 puts(guid_text);
328 else
329 printf("%pUl", guid[j]);
330 }
331 putc('\n');
332 }
333
334 EFI_CALL(BS->free_pool(handles));
335
336 return CMD_RET_SUCCESS;
337}
338
AKASHI Takahiro185716a2019-02-25 15:54:40 +0900339/**
AKASHI Takahiro71ab1bf2019-02-25 15:54:42 +0900340 * do_efi_show_images() - show UEFI images
341 *
342 * @cmdtp: Command table
343 * @flag: Command flag
344 * @argc: Number of arguments
345 * @argv: Argument array
346 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
347 *
348 * Implement efidebug "images" sub-command.
349 * Show all UEFI loaded images and their information.
350 */
351static int do_efi_show_images(cmd_tbl_t *cmdtp, int flag,
352 int argc, char * const argv[])
353{
354 efi_print_image_infos(NULL);
355
356 return CMD_RET_SUCCESS;
357}
358
AKASHI Takahiro32979d82019-02-25 15:54:43 +0900359static const char * const efi_mem_type_string[] = {
360 [EFI_RESERVED_MEMORY_TYPE] = "RESERVED",
361 [EFI_LOADER_CODE] = "LOADER CODE",
362 [EFI_LOADER_DATA] = "LOADER DATA",
363 [EFI_BOOT_SERVICES_CODE] = "BOOT CODE",
364 [EFI_BOOT_SERVICES_DATA] = "BOOT DATA",
365 [EFI_RUNTIME_SERVICES_CODE] = "RUNTIME CODE",
366 [EFI_RUNTIME_SERVICES_DATA] = "RUNTIME DATA",
367 [EFI_CONVENTIONAL_MEMORY] = "CONVENTIONAL",
368 [EFI_UNUSABLE_MEMORY] = "UNUSABLE MEM",
369 [EFI_ACPI_RECLAIM_MEMORY] = "ACPI RECLAIM MEM",
370 [EFI_ACPI_MEMORY_NVS] = "ACPI NVS",
371 [EFI_MMAP_IO] = "IO",
372 [EFI_MMAP_IO_PORT] = "IO PORT",
373 [EFI_PAL_CODE] = "PAL",
374};
375
376static const struct efi_mem_attrs {
377 const u64 bit;
378 const char *text;
379} efi_mem_attrs[] = {
380 {EFI_MEMORY_UC, "UC"},
381 {EFI_MEMORY_UC, "UC"},
382 {EFI_MEMORY_WC, "WC"},
383 {EFI_MEMORY_WT, "WT"},
384 {EFI_MEMORY_WB, "WB"},
385 {EFI_MEMORY_UCE, "UCE"},
386 {EFI_MEMORY_WP, "WP"},
387 {EFI_MEMORY_RP, "RP"},
388 {EFI_MEMORY_XP, "WP"},
389 {EFI_MEMORY_NV, "NV"},
390 {EFI_MEMORY_MORE_RELIABLE, "REL"},
391 {EFI_MEMORY_RO, "RO"},
392 {EFI_MEMORY_RUNTIME, "RT"},
393};
394
395/**
396 * print_memory_attributes() - print memory map attributes
397 * @attributes: Attribute value
398 *
399 * Print memory map attributes
400 */
401static void print_memory_attributes(u64 attributes)
402{
403 int sep, i;
404
405 for (sep = 0, i = 0; i < ARRAY_SIZE(efi_mem_attrs); i++)
406 if (attributes & efi_mem_attrs[i].bit) {
407 if (sep) {
408 putc('|');
409 } else {
410 putc(' ');
411 sep = 1;
412 }
413 puts(efi_mem_attrs[i].text);
414 }
415}
416
417#define EFI_PHYS_ADDR_WIDTH (int)(sizeof(efi_physical_addr_t) * 2)
418
419/**
420 * do_efi_show_memmap() - show UEFI memory map
421 *
422 * @cmdtp: Command table
423 * @flag: Command flag
424 * @argc: Number of arguments
425 * @argv: Argument array
426 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
427 *
428 * Implement efidebug "memmap" sub-command.
429 * Show UEFI memory map.
430 */
431static int do_efi_show_memmap(cmd_tbl_t *cmdtp, int flag,
432 int argc, char * const argv[])
433{
434 struct efi_mem_desc *memmap = NULL, *map;
435 efi_uintn_t map_size = 0;
436 const char *type;
437 int i;
438 efi_status_t ret;
439
440 ret = EFI_CALL(BS->get_memory_map(&map_size, memmap, NULL, NULL, NULL));
441 if (ret == EFI_BUFFER_TOO_SMALL) {
442 map_size += sizeof(struct efi_mem_desc); /* for my own */
443 ret = EFI_CALL(BS->allocate_pool(EFI_LOADER_DATA,
444 map_size, (void *)&memmap));
445 if (ret != EFI_SUCCESS)
446 return CMD_RET_FAILURE;
447 ret = EFI_CALL(BS->get_memory_map(&map_size, memmap,
448 NULL, NULL, NULL));
449 }
450 if (ret != EFI_SUCCESS) {
451 EFI_CALL(BS->free_pool(memmap));
452 return CMD_RET_FAILURE;
453 }
454
455 printf("Type Start%.*s End%.*s Attributes\n",
456 EFI_PHYS_ADDR_WIDTH - 5, spc, EFI_PHYS_ADDR_WIDTH - 3, spc);
457 printf("================ %.*s %.*s ==========\n",
458 EFI_PHYS_ADDR_WIDTH, sep, EFI_PHYS_ADDR_WIDTH, sep);
459 for (i = 0, map = memmap; i < map_size / sizeof(*map); map++, i++) {
460 if (map->type < EFI_MAX_MEMORY_TYPE)
461 type = efi_mem_type_string[map->type];
462 else
463 type = "(unknown)";
464
465 printf("%-16s %.*llx-%.*llx", type,
466 EFI_PHYS_ADDR_WIDTH,
467 map->physical_start,
468 EFI_PHYS_ADDR_WIDTH,
469 map->physical_start + map->num_pages * EFI_PAGE_SIZE);
470
471 print_memory_attributes(map->attribute);
472 putc('\n');
473 }
474
475 EFI_CALL(BS->free_pool(memmap));
476
477 return CMD_RET_SUCCESS;
478}
479
AKASHI Takahiro71ab1bf2019-02-25 15:54:42 +0900480/**
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900481 * do_efi_boot_add() - set UEFI load option
482 *
483 * @cmdtp: Command table
484 * @flag: Command flag
485 * @argc: Number of arguments
486 * @argv: Argument array
487 * Return: CMD_RET_SUCCESS on success,
488 * CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
489 *
490 * Implement efidebug "boot add" sub-command.
491 * Create or change UEFI load option.
492 * - boot add <id> <label> <interface> <devnum>[:<part>] <file> <options>
493 */
494static int do_efi_boot_add(cmd_tbl_t *cmdtp, int flag,
495 int argc, char * const argv[])
496{
497 int id;
498 char *endp;
499 char var_name[9];
500 u16 var_name16[9], *p;
501 efi_guid_t guid;
502 size_t label_len, label_len16;
503 u16 *label;
504 struct efi_device_path *device_path = NULL, *file_path = NULL;
505 struct efi_load_option lo;
506 void *data = NULL;
507 efi_uintn_t size;
508 int ret;
509
510 if (argc < 6 || argc > 7)
511 return CMD_RET_USAGE;
512
513 id = (int)simple_strtoul(argv[1], &endp, 16);
514 if (*endp != '\0' || id > 0xffff)
Heinrich Schuchardtb2469722019-02-28 20:41:58 +0100515 return CMD_RET_USAGE;
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900516
517 sprintf(var_name, "Boot%04X", id);
518 p = var_name16;
519 utf8_utf16_strncpy(&p, var_name, 9);
520
521 guid = efi_global_variable_guid;
522
523 /* attributes */
524 lo.attributes = LOAD_OPTION_ACTIVE; /* always ACTIVE */
525
526 /* label */
527 label_len = strlen(argv[2]);
528 label_len16 = utf8_utf16_strnlen(argv[2], label_len);
529 label = malloc((label_len16 + 1) * sizeof(u16));
530 if (!label)
531 return CMD_RET_FAILURE;
532 lo.label = label; /* label will be changed below */
533 utf8_utf16_strncpy(&label, argv[2], label_len);
534
535 /* file path */
536 ret = efi_dp_from_name(argv[3], argv[4], argv[5], &device_path,
537 &file_path);
538 if (ret != EFI_SUCCESS) {
539 printf("Cannot create device path for \"%s %s\"\n",
540 argv[3], argv[4]);
541 ret = CMD_RET_FAILURE;
542 goto out;
543 }
544 lo.file_path = file_path;
545 lo.file_path_length = efi_dp_size(file_path)
546 + sizeof(struct efi_device_path); /* for END */
547
548 /* optional data */
Heinrich Schuchardt9df002e2019-04-29 13:51:45 +0200549 if (argc < 6)
550 lo.optional_data = NULL;
551 else
552 lo.optional_data = (const u8 *)argv[6];
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900553
554 size = efi_serialize_load_option(&lo, (u8 **)&data);
555 if (!size) {
556 ret = CMD_RET_FAILURE;
557 goto out;
558 }
559
560 ret = EFI_CALL(RT->set_variable(var_name16, &guid,
AKASHI Takahiroc1f3ebc2019-06-04 15:52:10 +0900561 EFI_VARIABLE_NON_VOLATILE |
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900562 EFI_VARIABLE_BOOTSERVICE_ACCESS |
563 EFI_VARIABLE_RUNTIME_ACCESS,
564 size, data));
565 ret = (ret == EFI_SUCCESS ? CMD_RET_SUCCESS : CMD_RET_FAILURE);
566out:
567 free(data);
568 efi_free_pool(device_path);
569 efi_free_pool(file_path);
570 free(lo.label);
571
572 return ret;
573}
574
575/**
576 * do_efi_boot_rm() - delete UEFI load options
577 *
578 * @cmdtp: Command table
579 * @flag: Command flag
580 * @argc: Number of arguments
581 * @argv: Argument array
582 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
583 *
584 * Implement efidebug "boot rm" sub-command.
585 * Delete UEFI load options.
586 * - boot rm <id> ...
587 */
588static int do_efi_boot_rm(cmd_tbl_t *cmdtp, int flag,
589 int argc, char * const argv[])
590{
591 efi_guid_t guid;
592 int id, i;
593 char *endp;
594 char var_name[9];
595 u16 var_name16[9];
596 efi_status_t ret;
597
598 if (argc == 1)
599 return CMD_RET_USAGE;
600
601 guid = efi_global_variable_guid;
602 for (i = 1; i < argc; i++, argv++) {
603 id = (int)simple_strtoul(argv[1], &endp, 16);
604 if (*endp != '\0' || id > 0xffff)
605 return CMD_RET_FAILURE;
606
607 sprintf(var_name, "Boot%04X", id);
608 utf8_utf16_strncpy((u16 **)&var_name16, var_name, 9);
609
610 ret = EFI_CALL(RT->set_variable(var_name16, &guid, 0, 0, NULL));
611 if (ret) {
612 printf("cannot remove Boot%04X", id);
613 return CMD_RET_FAILURE;
614 }
615 }
616
617 return CMD_RET_SUCCESS;
618}
619
620/**
621 * show_efi_boot_opt_data() - dump UEFI load option
622 *
Heinrich Schuchardt9df002e2019-04-29 13:51:45 +0200623 * @id: load option number
624 * @data: value of UEFI load option variable
625 * @size: size of the boot option
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900626 *
627 * Decode the value of UEFI load option variable and print information.
628 */
Heinrich Schuchardt9df002e2019-04-29 13:51:45 +0200629static void show_efi_boot_opt_data(int id, void *data, size_t size)
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900630{
631 struct efi_load_option lo;
632 char *label, *p;
633 size_t label_len16, label_len;
634 u16 *dp_str;
635
636 efi_deserialize_load_option(&lo, data);
637
638 label_len16 = u16_strlen(lo.label);
639 label_len = utf16_utf8_strnlen(lo.label, label_len16);
640 label = malloc(label_len + 1);
641 if (!label)
642 return;
643 p = label;
644 utf16_utf8_strncpy(&p, lo.label, label_len16);
645
646 printf("Boot%04X:\n", id);
Heinrich Schuchardt9df002e2019-04-29 13:51:45 +0200647 printf(" attributes: %c%c%c (0x%08x)\n",
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900648 /* ACTIVE */
649 lo.attributes & LOAD_OPTION_ACTIVE ? 'A' : '-',
650 /* FORCE RECONNECT */
651 lo.attributes & LOAD_OPTION_FORCE_RECONNECT ? 'R' : '-',
652 /* HIDDEN */
653 lo.attributes & LOAD_OPTION_HIDDEN ? 'H' : '-',
654 lo.attributes);
Heinrich Schuchardt9df002e2019-04-29 13:51:45 +0200655 printf(" label: %s\n", label);
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900656
657 dp_str = efi_dp_str(lo.file_path);
Heinrich Schuchardt9df002e2019-04-29 13:51:45 +0200658 printf(" file_path: %ls\n", dp_str);
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900659 efi_free_pool(dp_str);
660
Heinrich Schuchardt9df002e2019-04-29 13:51:45 +0200661 printf(" data:\n");
662 print_hex_dump(" ", DUMP_PREFIX_OFFSET, 16, 1,
663 lo.optional_data, size + (u8 *)data -
664 (u8 *)lo.optional_data, true);
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900665 free(label);
666}
667
668/**
669 * show_efi_boot_opt() - dump UEFI load option
670 *
671 * @id: Load option number
672 *
673 * Dump information defined by UEFI load option.
674 */
675static void show_efi_boot_opt(int id)
676{
677 char var_name[9];
678 u16 var_name16[9], *p;
679 efi_guid_t guid;
680 void *data = NULL;
681 efi_uintn_t size;
682 int ret;
683
684 sprintf(var_name, "Boot%04X", id);
685 p = var_name16;
686 utf8_utf16_strncpy(&p, var_name, 9);
687 guid = efi_global_variable_guid;
688
689 size = 0;
690 ret = EFI_CALL(RT->get_variable(var_name16, &guid, NULL, &size, NULL));
691 if (ret == (int)EFI_BUFFER_TOO_SMALL) {
692 data = malloc(size);
693 ret = EFI_CALL(RT->get_variable(var_name16, &guid, NULL, &size,
694 data));
695 }
696 if (ret == EFI_SUCCESS)
Heinrich Schuchardt9df002e2019-04-29 13:51:45 +0200697 show_efi_boot_opt_data(id, data, size);
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900698 else if (ret == EFI_NOT_FOUND)
699 printf("Boot%04X: not found\n", id);
700
701 free(data);
702}
703
AKASHI Takahiro016bfcd2019-04-26 09:44:18 +0900704static int u16_tohex(u16 c)
705{
706 if (c >= '0' && c <= '9')
707 return c - '0';
708 if (c >= 'A' && c <= 'F')
709 return c - 'A' + 10;
710
711 /* not hexadecimal */
712 return -1;
713}
714
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900715/**
716 * show_efi_boot_dump() - dump all UEFI load options
717 *
718 * @cmdtp: Command table
719 * @flag: Command flag
720 * @argc: Number of arguments
721 * @argv: Argument array
722 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
723 *
724 * Implement efidebug "boot dump" sub-command.
725 * Dump information of all UEFI load options defined.
726 * - boot dump
727 */
728static int do_efi_boot_dump(cmd_tbl_t *cmdtp, int flag,
729 int argc, char * const argv[])
730{
AKASHI Takahiro016bfcd2019-04-26 09:44:18 +0900731 u16 *var_name16, *p;
732 efi_uintn_t buf_size, size;
733 efi_guid_t guid;
734 int id, i, digit;
735 efi_status_t ret;
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900736
737 if (argc > 1)
738 return CMD_RET_USAGE;
739
AKASHI Takahiro016bfcd2019-04-26 09:44:18 +0900740 buf_size = 128;
741 var_name16 = malloc(buf_size);
742 if (!var_name16)
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900743 return CMD_RET_FAILURE;
744
AKASHI Takahiro016bfcd2019-04-26 09:44:18 +0900745 var_name16[0] = 0;
746 for (;;) {
747 size = buf_size;
748 ret = EFI_CALL(efi_get_next_variable_name(&size, var_name16,
749 &guid));
750 if (ret == EFI_NOT_FOUND)
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900751 break;
AKASHI Takahiro016bfcd2019-04-26 09:44:18 +0900752 if (ret == EFI_BUFFER_TOO_SMALL) {
753 buf_size = size;
754 p = realloc(var_name16, buf_size);
755 if (!p) {
756 free(var_name16);
757 return CMD_RET_FAILURE;
758 }
759 var_name16 = p;
760 ret = EFI_CALL(efi_get_next_variable_name(&size,
761 var_name16,
762 &guid));
763 }
764 if (ret != EFI_SUCCESS) {
765 free(var_name16);
766 return CMD_RET_FAILURE;
767 }
768
769 if (memcmp(var_name16, L"Boot", 8))
770 continue;
771
772 for (id = 0, i = 0; i < 4; i++) {
773 digit = u16_tohex(var_name16[4 + i]);
774 if (digit < 0)
775 break;
776 id = (id << 4) + digit;
777 }
778 if (i == 4 && !var_name16[8])
779 show_efi_boot_opt(id);
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900780 }
AKASHI Takahiro016bfcd2019-04-26 09:44:18 +0900781
782 free(var_name16);
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900783
784 return CMD_RET_SUCCESS;
785}
786
787/**
788 * show_efi_boot_order() - show order of UEFI load options
789 *
790 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
791 *
792 * Show order of UEFI load options defined by BootOrder variable.
793 */
794static int show_efi_boot_order(void)
795{
796 efi_guid_t guid;
797 u16 *bootorder = NULL;
798 efi_uintn_t size;
799 int num, i;
800 char var_name[9];
801 u16 var_name16[9], *p16;
802 void *data;
803 struct efi_load_option lo;
804 char *label, *p;
805 size_t label_len16, label_len;
806 efi_status_t ret;
807
808 guid = efi_global_variable_guid;
809 size = 0;
810 ret = EFI_CALL(RT->get_variable(L"BootOrder", &guid, NULL, &size,
811 NULL));
812 if (ret == EFI_BUFFER_TOO_SMALL) {
813 bootorder = malloc(size);
814 ret = EFI_CALL(RT->get_variable(L"BootOrder", &guid, NULL,
815 &size, bootorder));
816 }
817 if (ret == EFI_NOT_FOUND) {
818 printf("BootOrder not defined\n");
819 ret = CMD_RET_SUCCESS;
820 goto out;
821 } else if (ret != EFI_SUCCESS) {
822 ret = CMD_RET_FAILURE;
823 goto out;
824 }
825
826 num = size / sizeof(u16);
827 for (i = 0; i < num; i++) {
828 sprintf(var_name, "Boot%04X", bootorder[i]);
829 p16 = var_name16;
830 utf8_utf16_strncpy(&p16, var_name, 9);
831
832 size = 0;
833 ret = EFI_CALL(RT->get_variable(var_name16, &guid, NULL, &size,
834 NULL));
835 if (ret != EFI_BUFFER_TOO_SMALL) {
836 printf("%2d: Boot%04X: (not defined)\n",
837 i + 1, bootorder[i]);
838 continue;
839 }
840
841 data = malloc(size);
842 if (!data) {
843 ret = CMD_RET_FAILURE;
844 goto out;
845 }
846 ret = EFI_CALL(RT->get_variable(var_name16, &guid, NULL, &size,
847 data));
848 if (ret != EFI_SUCCESS) {
849 free(data);
850 ret = CMD_RET_FAILURE;
851 goto out;
852 }
853
854 efi_deserialize_load_option(&lo, data);
855
856 label_len16 = u16_strlen(lo.label);
857 label_len = utf16_utf8_strnlen(lo.label, label_len16);
858 label = malloc(label_len + 1);
859 if (!label) {
860 free(data);
861 ret = CMD_RET_FAILURE;
862 goto out;
863 }
864 p = label;
865 utf16_utf8_strncpy(&p, lo.label, label_len16);
866 printf("%2d: Boot%04X: %s\n", i + 1, bootorder[i], label);
867 free(label);
868
869 free(data);
870 }
871out:
872 free(bootorder);
873
874 return ret;
875}
876
877/**
878 * do_efi_boot_next() - manage UEFI BootNext variable
879 *
880 * @cmdtp: Command table
881 * @flag: Command flag
882 * @argc: Number of arguments
883 * @argv: Argument array
884 * Return: CMD_RET_SUCCESS on success,
885 * CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
886 *
887 * Implement efidebug "boot next" sub-command.
888 * Set BootNext variable.
889 * - boot next <id>
890 */
891static int do_efi_boot_next(cmd_tbl_t *cmdtp, int flag,
892 int argc, char * const argv[])
893{
894 u16 bootnext;
895 efi_uintn_t size;
896 char *endp;
897 efi_guid_t guid;
898 efi_status_t ret;
899
900 if (argc != 2)
901 return CMD_RET_USAGE;
902
903 bootnext = (u16)simple_strtoul(argv[1], &endp, 16);
904 if (*endp != '\0' || bootnext > 0xffff) {
905 printf("invalid value: %s\n", argv[1]);
906 ret = CMD_RET_FAILURE;
907 goto out;
908 }
909
910 guid = efi_global_variable_guid;
911 size = sizeof(u16);
912 ret = EFI_CALL(RT->set_variable(L"BootNext", &guid,
AKASHI Takahiroc1f3ebc2019-06-04 15:52:10 +0900913 EFI_VARIABLE_NON_VOLATILE |
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900914 EFI_VARIABLE_BOOTSERVICE_ACCESS |
915 EFI_VARIABLE_RUNTIME_ACCESS,
916 size, &bootnext));
917 ret = (ret == EFI_SUCCESS ? CMD_RET_SUCCESS : CMD_RET_FAILURE);
918out:
919 return ret;
920}
921
922/**
923 * do_efi_boot_order() - manage UEFI BootOrder variable
924 *
925 * @cmdtp: Command table
926 * @flag: Command flag
927 * @argc: Number of arguments
928 * @argv: Argument array
929 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
930 *
931 * Implement efidebug "boot order" sub-command.
932 * Show order of UEFI load options, or change it in BootOrder variable.
933 * - boot order [<id> ...]
934 */
935static int do_efi_boot_order(cmd_tbl_t *cmdtp, int flag,
936 int argc, char * const argv[])
937{
938 u16 *bootorder = NULL;
939 efi_uintn_t size;
940 int id, i;
941 char *endp;
942 efi_guid_t guid;
943 efi_status_t ret;
944
945 if (argc == 1)
946 return show_efi_boot_order();
947
948 argc--;
949 argv++;
950
951 size = argc * sizeof(u16);
952 bootorder = malloc(size);
953 if (!bootorder)
954 return CMD_RET_FAILURE;
955
956 for (i = 0; i < argc; i++) {
957 id = (int)simple_strtoul(argv[i], &endp, 16);
958 if (*endp != '\0' || id > 0xffff) {
959 printf("invalid value: %s\n", argv[i]);
960 ret = CMD_RET_FAILURE;
961 goto out;
962 }
963
964 bootorder[i] = (u16)id;
965 }
966
967 guid = efi_global_variable_guid;
968 ret = EFI_CALL(RT->set_variable(L"BootOrder", &guid,
AKASHI Takahiroc1f3ebc2019-06-04 15:52:10 +0900969 EFI_VARIABLE_NON_VOLATILE |
AKASHI Takahiroe7c08832019-02-25 15:54:38 +0900970 EFI_VARIABLE_BOOTSERVICE_ACCESS |
971 EFI_VARIABLE_RUNTIME_ACCESS,
972 size, bootorder));
973 ret = (ret == EFI_SUCCESS ? CMD_RET_SUCCESS : CMD_RET_FAILURE);
974out:
975 free(bootorder);
976
977 return ret;
978}
979
980static cmd_tbl_t cmd_efidebug_boot_sub[] = {
981 U_BOOT_CMD_MKENT(add, CONFIG_SYS_MAXARGS, 1, do_efi_boot_add, "", ""),
982 U_BOOT_CMD_MKENT(rm, CONFIG_SYS_MAXARGS, 1, do_efi_boot_rm, "", ""),
983 U_BOOT_CMD_MKENT(dump, CONFIG_SYS_MAXARGS, 1, do_efi_boot_dump, "", ""),
984 U_BOOT_CMD_MKENT(next, CONFIG_SYS_MAXARGS, 1, do_efi_boot_next, "", ""),
985 U_BOOT_CMD_MKENT(order, CONFIG_SYS_MAXARGS, 1, do_efi_boot_order,
986 "", ""),
987};
988
989/**
990 * do_efi_boot_opt() - manage UEFI load options
991 *
992 * @cmdtp: Command table
993 * @flag: Command flag
994 * @argc: Number of arguments
995 * @argv: Argument array
996 * Return: CMD_RET_SUCCESS on success,
997 * CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
998 *
999 * Implement efidebug "boot" sub-command.
1000 * See above for details of sub-commands.
1001 */
1002static int do_efi_boot_opt(cmd_tbl_t *cmdtp, int flag,
1003 int argc, char * const argv[])
1004{
1005 cmd_tbl_t *cp;
1006
1007 if (argc < 2)
1008 return CMD_RET_USAGE;
1009
1010 argc--; argv++;
1011
1012 cp = find_cmd_tbl(argv[0], cmd_efidebug_boot_sub,
1013 ARRAY_SIZE(cmd_efidebug_boot_sub));
1014 if (!cp)
1015 return CMD_RET_USAGE;
1016
1017 return cp->cmd(cmdtp, flag, argc, argv);
1018}
1019
1020static cmd_tbl_t cmd_efidebug_sub[] = {
1021 U_BOOT_CMD_MKENT(boot, CONFIG_SYS_MAXARGS, 1, do_efi_boot_opt, "", ""),
AKASHI Takahiroe32788a2019-02-25 15:54:39 +09001022 U_BOOT_CMD_MKENT(devices, CONFIG_SYS_MAXARGS, 1, do_efi_show_devices,
1023 "", ""),
AKASHI Takahiro185716a2019-02-25 15:54:40 +09001024 U_BOOT_CMD_MKENT(drivers, CONFIG_SYS_MAXARGS, 1, do_efi_show_drivers,
1025 "", ""),
AKASHI Takahiro02e8ca62019-02-25 15:54:41 +09001026 U_BOOT_CMD_MKENT(dh, CONFIG_SYS_MAXARGS, 1, do_efi_show_handles,
1027 "", ""),
AKASHI Takahiro71ab1bf2019-02-25 15:54:42 +09001028 U_BOOT_CMD_MKENT(images, CONFIG_SYS_MAXARGS, 1, do_efi_show_images,
1029 "", ""),
AKASHI Takahiro32979d82019-02-25 15:54:43 +09001030 U_BOOT_CMD_MKENT(memmap, CONFIG_SYS_MAXARGS, 1, do_efi_show_memmap,
1031 "", ""),
AKASHI Takahiroe7c08832019-02-25 15:54:38 +09001032};
1033
1034/**
1035 * do_efidebug() - display and configure UEFI environment
1036 *
1037 * @cmdtp: Command table
1038 * @flag: Command flag
1039 * @argc: Number of arguments
1040 * @argv: Argument array
1041 * Return: CMD_RET_SUCCESS on success,
1042 * CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
1043 *
1044 * Implement efidebug command which allows us to display and
1045 * configure UEFI environment.
1046 * See above for details of sub-commands.
1047 */
1048static int do_efidebug(cmd_tbl_t *cmdtp, int flag,
1049 int argc, char * const argv[])
1050{
1051 cmd_tbl_t *cp;
1052 efi_status_t r;
1053
1054 if (argc < 2)
1055 return CMD_RET_USAGE;
1056
1057 argc--; argv++;
1058
1059 /* Initialize UEFI drivers */
1060 r = efi_init_obj_list();
1061 if (r != EFI_SUCCESS) {
1062 printf("Error: Cannot initialize UEFI sub-system, r = %lu\n",
1063 r & ~EFI_ERROR_MASK);
1064 return CMD_RET_FAILURE;
1065 }
1066
1067 cp = find_cmd_tbl(argv[0], cmd_efidebug_sub,
1068 ARRAY_SIZE(cmd_efidebug_sub));
1069 if (!cp)
1070 return CMD_RET_USAGE;
1071
1072 return cp->cmd(cmdtp, flag, argc, argv);
1073}
1074
1075#ifdef CONFIG_SYS_LONGHELP
1076static char efidebug_help_text[] =
1077 " - UEFI Shell-like interface to configure UEFI environment\n"
1078 "\n"
1079 "efidebug boot add <bootid> <label> <interface> <devnum>[:<part>] <file path> [<load options>]\n"
1080 " - set UEFI BootXXXX variable\n"
1081 " <load options> will be passed to UEFI application\n"
1082 "efidebug boot rm <bootid#1> [<bootid#2> [<bootid#3> [...]]]\n"
1083 " - delete UEFI BootXXXX variables\n"
1084 "efidebug boot dump\n"
1085 " - dump all UEFI BootXXXX variables\n"
1086 "efidebug boot next <bootid>\n"
1087 " - set UEFI BootNext variable\n"
1088 "efidebug boot order [<bootid#1> [<bootid#2> [<bootid#3> [...]]]]\n"
1089 " - set/show UEFI boot order\n"
AKASHI Takahiroe32788a2019-02-25 15:54:39 +09001090 "\n"
1091 "efidebug devices\n"
AKASHI Takahiro185716a2019-02-25 15:54:40 +09001092 " - show uefi devices\n"
1093 "efidebug drivers\n"
AKASHI Takahiro02e8ca62019-02-25 15:54:41 +09001094 " - show uefi drivers\n"
1095 "efidebug dh\n"
AKASHI Takahiro71ab1bf2019-02-25 15:54:42 +09001096 " - show uefi handles\n"
1097 "efidebug images\n"
AKASHI Takahiro32979d82019-02-25 15:54:43 +09001098 " - show loaded images\n"
1099 "efidebug memmap\n"
1100 " - show uefi memory map\n";
AKASHI Takahiroe7c08832019-02-25 15:54:38 +09001101#endif
1102
1103U_BOOT_CMD(
1104 efidebug, 10, 0, do_efidebug,
1105 "Configure UEFI environment",
1106 efidebug_help_text
1107);