blob: 056ebb10832960ef032e58afb9741bad46aca7bf [file] [log] [blame]
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001// SPDX-License-Identifier: GPL-2.0+
2/*
3 * UEFI Shell-like command
4 *
5 * Copyright (c) 2018 AKASHI Takahiro, Linaro Limited
6 */
7
8#include <charset.h>
9#include <common.h>
10#include <command.h>
11#include <efi_loader.h>
AKASHI Takahiro59df7e72019-02-25 15:54:38 +090012#include <exports.h>
Heinrich Schuchardt39a1ff82019-04-29 13:51:45 +020013#include <hexdump.h>
AKASHI Takahiro59df7e72019-02-25 15:54:38 +090014#include <malloc.h>
15#include <search.h>
16#include <linux/ctype.h>
17
AKASHI Takahiro355cdb52019-02-25 15:54:39 +090018#define BS systab.boottime
AKASHI Takahiro59df7e72019-02-25 15:54:38 +090019#define RT systab.runtime
20
21/**
AKASHI Takahiro355cdb52019-02-25 15:54:39 +090022 * efi_get_device_handle_info() - get information of UEFI device
23 *
24 * @handle: Handle of UEFI device
25 * @dev_path_text: Pointer to text of device path
26 * Return: 0 on success, -1 on failure
27 *
28 * Currently return a formatted text of device path.
29 */
30static int efi_get_device_handle_info(efi_handle_t handle, u16 **dev_path_text)
31{
32 struct efi_device_path *dp;
33 efi_status_t ret;
34
35 ret = EFI_CALL(BS->open_protocol(handle, &efi_guid_device_path,
36 (void **)&dp, NULL /* FIXME */, NULL,
37 EFI_OPEN_PROTOCOL_GET_PROTOCOL));
38 if (ret == EFI_SUCCESS) {
39 *dev_path_text = efi_dp_str(dp);
40 return 0;
41 } else {
42 return -1;
43 }
44}
45
46#define EFI_HANDLE_WIDTH ((int)sizeof(efi_handle_t) * 2)
47
48static const char spc[] = " ";
49static const char sep[] = "================";
50
51/**
52 * do_efi_show_devices() - show UEFI devices
53 *
54 * @cmdtp: Command table
55 * @flag: Command flag
56 * @argc: Number of arguments
57 * @argv: Argument array
58 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
59 *
60 * Implement efidebug "devices" sub-command.
61 * Show all UEFI devices and their information.
62 */
63static int do_efi_show_devices(cmd_tbl_t *cmdtp, int flag,
64 int argc, char * const argv[])
65{
66 efi_handle_t *handles;
67 efi_uintn_t num, i;
68 u16 *dev_path_text;
69 efi_status_t ret;
70
71 ret = EFI_CALL(BS->locate_handle_buffer(ALL_HANDLES, NULL, NULL,
72 &num, &handles));
73 if (ret != EFI_SUCCESS)
74 return CMD_RET_FAILURE;
75
76 if (!num)
77 return CMD_RET_SUCCESS;
78
79 printf("Device%.*s Device Path\n", EFI_HANDLE_WIDTH - 6, spc);
80 printf("%.*s ====================\n", EFI_HANDLE_WIDTH, sep);
81 for (i = 0; i < num; i++) {
82 if (!efi_get_device_handle_info(handles[i], &dev_path_text)) {
83 printf("%p %ls\n", handles[i], dev_path_text);
84 efi_free_pool(dev_path_text);
85 }
86 }
87
88 EFI_CALL(BS->free_pool(handles));
89
90 return CMD_RET_SUCCESS;
91}
92
93/**
AKASHI Takahiro66eaf562019-02-25 15:54:40 +090094 * efi_get_driver_handle_info() - get information of UEFI driver
95 *
96 * @handle: Handle of UEFI device
97 * @driver_name: Driver name
98 * @image_path: Pointer to text of device path
99 * Return: 0 on success, -1 on failure
100 *
101 * Currently return no useful information as all UEFI drivers are
102 * built-in..
103 */
104static int efi_get_driver_handle_info(efi_handle_t handle, u16 **driver_name,
105 u16 **image_path)
106{
107 struct efi_handler *handler;
108 struct efi_loaded_image *image;
109 efi_status_t ret;
110
111 /*
112 * driver name
113 * TODO: support EFI_COMPONENT_NAME2_PROTOCOL
114 */
115 *driver_name = NULL;
116
117 /* image name */
118 ret = efi_search_protocol(handle, &efi_guid_loaded_image, &handler);
119 if (ret != EFI_SUCCESS) {
120 *image_path = NULL;
121 return 0;
122 }
123
124 image = handler->protocol_interface;
125 *image_path = efi_dp_str(image->file_path);
126
127 return 0;
128}
129
130/**
131 * do_efi_show_drivers() - show UEFI drivers
132 *
133 * @cmdtp: Command table
134 * @flag: Command flag
135 * @argc: Number of arguments
136 * @argv: Argument array
137 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
138 *
139 * Implement efidebug "drivers" sub-command.
140 * Show all UEFI drivers and their information.
141 */
142static int do_efi_show_drivers(cmd_tbl_t *cmdtp, int flag,
143 int argc, char * const argv[])
144{
145 efi_handle_t *handles;
146 efi_uintn_t num, i;
147 u16 *driver_name, *image_path_text;
148 efi_status_t ret;
149
150 ret = EFI_CALL(BS->locate_handle_buffer(
151 BY_PROTOCOL, &efi_guid_driver_binding_protocol,
152 NULL, &num, &handles));
153 if (ret != EFI_SUCCESS)
154 return CMD_RET_FAILURE;
155
156 if (!num)
157 return CMD_RET_SUCCESS;
158
159 printf("Driver%.*s Name Image Path\n",
160 EFI_HANDLE_WIDTH - 6, spc);
161 printf("%.*s ==================== ====================\n",
162 EFI_HANDLE_WIDTH, sep);
163 for (i = 0; i < num; i++) {
164 if (!efi_get_driver_handle_info(handles[i], &driver_name,
165 &image_path_text)) {
166 if (image_path_text)
167 printf("%p %-20ls %ls\n", handles[i],
168 driver_name, image_path_text);
169 else
170 printf("%p %-20ls <built-in>\n",
171 handles[i], driver_name);
172 EFI_CALL(BS->free_pool(driver_name));
173 EFI_CALL(BS->free_pool(image_path_text));
174 }
175 }
176
177 EFI_CALL(BS->free_pool(handles));
178
179 return CMD_RET_SUCCESS;
180}
181
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900182static const struct {
183 const char *text;
184 const efi_guid_t guid;
185} guid_list[] = {
186 {
187 "Device Path",
Heinrich Schuchardtdec88e42019-04-20 07:39:11 +0200188 EFI_DEVICE_PATH_PROTOCOL_GUID,
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900189 },
190 {
191 "Device Path To Text",
192 EFI_DEVICE_PATH_TO_TEXT_PROTOCOL_GUID,
193 },
194 {
195 "Device Path Utilities",
196 EFI_DEVICE_PATH_UTILITIES_PROTOCOL_GUID,
197 },
198 {
199 "Unicode Collation 2",
200 EFI_UNICODE_COLLATION_PROTOCOL2_GUID,
201 },
202 {
203 "Driver Binding",
204 EFI_DRIVER_BINDING_PROTOCOL_GUID,
205 },
206 {
207 "Simple Text Input",
208 EFI_SIMPLE_TEXT_INPUT_PROTOCOL_GUID,
209 },
210 {
211 "Simple Text Input Ex",
212 EFI_SIMPLE_TEXT_INPUT_EX_PROTOCOL_GUID,
213 },
214 {
215 "Simple Text Output",
216 EFI_SIMPLE_TEXT_OUTPUT_PROTOCOL_GUID,
217 },
218 {
219 "Block IO",
Heinrich Schuchardtdec88e42019-04-20 07:39:11 +0200220 EFI_BLOCK_IO_PROTOCOL_GUID,
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900221 },
222 {
223 "Simple File System",
224 EFI_SIMPLE_FILE_SYSTEM_PROTOCOL_GUID,
225 },
226 {
227 "Loaded Image",
Heinrich Schuchardtdec88e42019-04-20 07:39:11 +0200228 EFI_LOADED_IMAGE_PROTOCOL_GUID,
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900229 },
230 {
Heinrich Schuchardtdec88e42019-04-20 07:39:11 +0200231 "Graphics Output",
232 EFI_GRAPHICS_OUTPUT_PROTOCOL_GUID,
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900233 },
Heinrich Schuchardt391bc8a2019-04-20 07:57:28 +0200234 {
235 "HII String",
236 EFI_HII_STRING_PROTOCOL_GUID,
237 },
238 {
239 "HII Database",
240 EFI_HII_DATABASE_PROTOCOL_GUID,
241 },
242 {
243 "HII Config Routing",
244 EFI_HII_CONFIG_ROUTING_PROTOCOL_GUID,
245 },
246 {
Ilias Apalodimasec80b472020-02-21 09:55:45 +0200247 "Load File2",
248 EFI_LOAD_FILE2_PROTOCOL_GUID,
249 },
250 {
Heinrich Schuchardt391bc8a2019-04-20 07:57:28 +0200251 "Simple Network",
252 EFI_SIMPLE_NETWORK_PROTOCOL_GUID,
253 },
254 {
255 "PXE Base Code",
256 EFI_PXE_BASE_CODE_PROTOCOL_GUID,
257 },
Heinrich Schuchardt986e0642020-01-07 05:57:47 +0100258 /* Configuration table GUIDs */
259 {
260 "ACPI table",
261 EFI_ACPI_TABLE_GUID,
262 },
263 {
264 "device tree",
265 EFI_FDT_GUID,
266 },
267 {
268 "SMBIOS table",
269 SMBIOS_TABLE_GUID,
270 },
Heinrich Schuchardt76be6872020-02-19 20:48:49 +0100271 {
272 "Runtime properties",
273 EFI_RT_PROPERTIES_TABLE_GUID,
274 },
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900275};
276
277/**
Heinrich Schuchardt173cd9e2020-01-07 06:02:33 +0100278 * get_guid_text - get string of GUID
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900279 *
Heinrich Schuchardt173cd9e2020-01-07 06:02:33 +0100280 * Return description of GUID.
281 *
282 * @guid: GUID
283 * Return: description of GUID or NULL
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900284 */
Heinrich Schuchardt173cd9e2020-01-07 06:02:33 +0100285static const char *get_guid_text(const void *guid)
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900286{
287 int i;
288
Heinrich Schuchardt173cd9e2020-01-07 06:02:33 +0100289 for (i = 0; i < ARRAY_SIZE(guid_list); i++) {
290 /*
291 * As guidcmp uses memcmp() we can safely accept unaligned
292 * GUIDs.
293 */
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900294 if (!guidcmp(&guid_list[i].guid, guid))
Heinrich Schuchardt173cd9e2020-01-07 06:02:33 +0100295 return guid_list[i].text;
296 }
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900297
Heinrich Schuchardt173cd9e2020-01-07 06:02:33 +0100298 return NULL;
AKASHI Takahiroa8014622019-02-25 15:54:41 +0900299}
300
301/**
302 * do_efi_show_handles() - show UEFI handles
303 *
304 * @cmdtp: Command table
305 * @flag: Command flag
306 * @argc: Number of arguments
307 * @argv: Argument array
308 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
309 *
310 * Implement efidebug "dh" sub-command.
311 * Show all UEFI handles and their information, currently all protocols
312 * added to handle.
313 */
314static int do_efi_show_handles(cmd_tbl_t *cmdtp, int flag,
315 int argc, char * const argv[])
316{
317 efi_handle_t *handles;
318 efi_guid_t **guid;
319 efi_uintn_t num, count, i, j;
320 const char *guid_text;
321 efi_status_t ret;
322
323 ret = EFI_CALL(BS->locate_handle_buffer(ALL_HANDLES, NULL, NULL,
324 &num, &handles));
325 if (ret != EFI_SUCCESS)
326 return CMD_RET_FAILURE;
327
328 if (!num)
329 return CMD_RET_SUCCESS;
330
331 printf("Handle%.*s Protocols\n", EFI_HANDLE_WIDTH - 6, spc);
332 printf("%.*s ====================\n", EFI_HANDLE_WIDTH, sep);
333 for (i = 0; i < num; i++) {
334 printf("%p", handles[i]);
335 ret = EFI_CALL(BS->protocols_per_handle(handles[i], &guid,
336 &count));
337 if (ret || !count) {
338 putc('\n');
339 continue;
340 }
341
342 for (j = 0; j < count; j++) {
343 if (j)
344 printf(", ");
345 else
346 putc(' ');
347
348 guid_text = get_guid_text(guid[j]);
349 if (guid_text)
350 puts(guid_text);
351 else
352 printf("%pUl", guid[j]);
353 }
354 putc('\n');
355 }
356
357 EFI_CALL(BS->free_pool(handles));
358
359 return CMD_RET_SUCCESS;
360}
361
AKASHI Takahiro66eaf562019-02-25 15:54:40 +0900362/**
AKASHI Takahirofa536732019-02-25 15:54:42 +0900363 * do_efi_show_images() - show UEFI images
364 *
365 * @cmdtp: Command table
366 * @flag: Command flag
367 * @argc: Number of arguments
368 * @argv: Argument array
369 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
370 *
371 * Implement efidebug "images" sub-command.
372 * Show all UEFI loaded images and their information.
373 */
374static int do_efi_show_images(cmd_tbl_t *cmdtp, int flag,
375 int argc, char * const argv[])
376{
377 efi_print_image_infos(NULL);
378
379 return CMD_RET_SUCCESS;
380}
381
AKASHI Takahiro00358bb2019-02-25 15:54:43 +0900382static const char * const efi_mem_type_string[] = {
383 [EFI_RESERVED_MEMORY_TYPE] = "RESERVED",
384 [EFI_LOADER_CODE] = "LOADER CODE",
385 [EFI_LOADER_DATA] = "LOADER DATA",
386 [EFI_BOOT_SERVICES_CODE] = "BOOT CODE",
387 [EFI_BOOT_SERVICES_DATA] = "BOOT DATA",
388 [EFI_RUNTIME_SERVICES_CODE] = "RUNTIME CODE",
389 [EFI_RUNTIME_SERVICES_DATA] = "RUNTIME DATA",
390 [EFI_CONVENTIONAL_MEMORY] = "CONVENTIONAL",
391 [EFI_UNUSABLE_MEMORY] = "UNUSABLE MEM",
392 [EFI_ACPI_RECLAIM_MEMORY] = "ACPI RECLAIM MEM",
393 [EFI_ACPI_MEMORY_NVS] = "ACPI NVS",
394 [EFI_MMAP_IO] = "IO",
395 [EFI_MMAP_IO_PORT] = "IO PORT",
396 [EFI_PAL_CODE] = "PAL",
397};
398
399static const struct efi_mem_attrs {
400 const u64 bit;
401 const char *text;
402} efi_mem_attrs[] = {
403 {EFI_MEMORY_UC, "UC"},
404 {EFI_MEMORY_UC, "UC"},
405 {EFI_MEMORY_WC, "WC"},
406 {EFI_MEMORY_WT, "WT"},
407 {EFI_MEMORY_WB, "WB"},
408 {EFI_MEMORY_UCE, "UCE"},
409 {EFI_MEMORY_WP, "WP"},
410 {EFI_MEMORY_RP, "RP"},
411 {EFI_MEMORY_XP, "WP"},
412 {EFI_MEMORY_NV, "NV"},
413 {EFI_MEMORY_MORE_RELIABLE, "REL"},
414 {EFI_MEMORY_RO, "RO"},
415 {EFI_MEMORY_RUNTIME, "RT"},
416};
417
418/**
419 * print_memory_attributes() - print memory map attributes
Heinrich Schuchardt0b016562019-07-14 14:00:41 +0200420 *
AKASHI Takahiro00358bb2019-02-25 15:54:43 +0900421 * @attributes: Attribute value
422 *
423 * Print memory map attributes
424 */
425static void print_memory_attributes(u64 attributes)
426{
427 int sep, i;
428
429 for (sep = 0, i = 0; i < ARRAY_SIZE(efi_mem_attrs); i++)
430 if (attributes & efi_mem_attrs[i].bit) {
431 if (sep) {
432 putc('|');
433 } else {
434 putc(' ');
435 sep = 1;
436 }
437 puts(efi_mem_attrs[i].text);
438 }
439}
440
441#define EFI_PHYS_ADDR_WIDTH (int)(sizeof(efi_physical_addr_t) * 2)
442
443/**
444 * do_efi_show_memmap() - show UEFI memory map
445 *
446 * @cmdtp: Command table
447 * @flag: Command flag
448 * @argc: Number of arguments
449 * @argv: Argument array
450 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
451 *
452 * Implement efidebug "memmap" sub-command.
453 * Show UEFI memory map.
454 */
455static int do_efi_show_memmap(cmd_tbl_t *cmdtp, int flag,
456 int argc, char * const argv[])
457{
458 struct efi_mem_desc *memmap = NULL, *map;
459 efi_uintn_t map_size = 0;
460 const char *type;
461 int i;
462 efi_status_t ret;
463
464 ret = EFI_CALL(BS->get_memory_map(&map_size, memmap, NULL, NULL, NULL));
465 if (ret == EFI_BUFFER_TOO_SMALL) {
466 map_size += sizeof(struct efi_mem_desc); /* for my own */
467 ret = EFI_CALL(BS->allocate_pool(EFI_LOADER_DATA,
468 map_size, (void *)&memmap));
469 if (ret != EFI_SUCCESS)
470 return CMD_RET_FAILURE;
471 ret = EFI_CALL(BS->get_memory_map(&map_size, memmap,
472 NULL, NULL, NULL));
473 }
474 if (ret != EFI_SUCCESS) {
475 EFI_CALL(BS->free_pool(memmap));
476 return CMD_RET_FAILURE;
477 }
478
479 printf("Type Start%.*s End%.*s Attributes\n",
480 EFI_PHYS_ADDR_WIDTH - 5, spc, EFI_PHYS_ADDR_WIDTH - 3, spc);
481 printf("================ %.*s %.*s ==========\n",
482 EFI_PHYS_ADDR_WIDTH, sep, EFI_PHYS_ADDR_WIDTH, sep);
483 for (i = 0, map = memmap; i < map_size / sizeof(*map); map++, i++) {
484 if (map->type < EFI_MAX_MEMORY_TYPE)
485 type = efi_mem_type_string[map->type];
486 else
487 type = "(unknown)";
488
489 printf("%-16s %.*llx-%.*llx", type,
490 EFI_PHYS_ADDR_WIDTH,
491 map->physical_start,
492 EFI_PHYS_ADDR_WIDTH,
493 map->physical_start + map->num_pages * EFI_PAGE_SIZE);
494
495 print_memory_attributes(map->attribute);
496 putc('\n');
497 }
498
499 EFI_CALL(BS->free_pool(memmap));
500
501 return CMD_RET_SUCCESS;
502}
503
AKASHI Takahirofa536732019-02-25 15:54:42 +0900504/**
Heinrich Schuchardt986e0642020-01-07 05:57:47 +0100505 * do_efi_show_tables() - show UEFI configuration tables
506 *
507 * @cmdtp: Command table
508 * @flag: Command flag
509 * @argc: Number of arguments
510 * @argv: Argument array
511 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
512 *
513 * Implement efidebug "tables" sub-command.
514 * Show UEFI configuration tables.
515 */
516static int do_efi_show_tables(cmd_tbl_t *cmdtp, int flag,
517 int argc, char * const argv[])
518{
519 efi_uintn_t i;
520 const char *guid_str;
521
522 for (i = 0; i < systab.nr_tables; ++i) {
523 guid_str = get_guid_text(&systab.tables[i].guid);
524 if (!guid_str)
525 guid_str = "";
526 printf("%pUl %s\n", &systab.tables[i].guid, guid_str);
527 }
528
529 return CMD_RET_SUCCESS;
530}
531
532/**
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900533 * do_efi_boot_add() - set UEFI load option
534 *
535 * @cmdtp: Command table
536 * @flag: Command flag
537 * @argc: Number of arguments
538 * @argv: Argument array
539 * Return: CMD_RET_SUCCESS on success,
540 * CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
541 *
Heinrich Schuchardt0b016562019-07-14 14:00:41 +0200542 * Implement efidebug "boot add" sub-command. Create or change UEFI load option.
543 *
544 * efidebug boot add <id> <label> <interface> <devnum>[:<part>] <file> <options>
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900545 */
546static int do_efi_boot_add(cmd_tbl_t *cmdtp, int flag,
547 int argc, char * const argv[])
548{
549 int id;
550 char *endp;
551 char var_name[9];
552 u16 var_name16[9], *p;
553 efi_guid_t guid;
554 size_t label_len, label_len16;
555 u16 *label;
556 struct efi_device_path *device_path = NULL, *file_path = NULL;
557 struct efi_load_option lo;
558 void *data = NULL;
559 efi_uintn_t size;
Heinrich Schuchardt428a4702019-06-20 12:48:04 +0200560 efi_status_t ret;
Heinrich Schuchardta332f252019-06-20 12:59:45 +0200561 int r = CMD_RET_SUCCESS;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900562
563 if (argc < 6 || argc > 7)
564 return CMD_RET_USAGE;
565
566 id = (int)simple_strtoul(argv[1], &endp, 16);
567 if (*endp != '\0' || id > 0xffff)
Heinrich Schuchardt1fa442e2019-02-28 20:41:58 +0100568 return CMD_RET_USAGE;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900569
570 sprintf(var_name, "Boot%04X", id);
571 p = var_name16;
572 utf8_utf16_strncpy(&p, var_name, 9);
573
574 guid = efi_global_variable_guid;
575
576 /* attributes */
577 lo.attributes = LOAD_OPTION_ACTIVE; /* always ACTIVE */
578
579 /* label */
580 label_len = strlen(argv[2]);
581 label_len16 = utf8_utf16_strnlen(argv[2], label_len);
582 label = malloc((label_len16 + 1) * sizeof(u16));
583 if (!label)
584 return CMD_RET_FAILURE;
585 lo.label = label; /* label will be changed below */
586 utf8_utf16_strncpy(&label, argv[2], label_len);
587
588 /* file path */
589 ret = efi_dp_from_name(argv[3], argv[4], argv[5], &device_path,
590 &file_path);
591 if (ret != EFI_SUCCESS) {
592 printf("Cannot create device path for \"%s %s\"\n",
593 argv[3], argv[4]);
Heinrich Schuchardt428a4702019-06-20 12:48:04 +0200594 r = CMD_RET_FAILURE;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900595 goto out;
596 }
597 lo.file_path = file_path;
598 lo.file_path_length = efi_dp_size(file_path)
599 + sizeof(struct efi_device_path); /* for END */
600
601 /* optional data */
Heinrich Schuchardt39a1ff82019-04-29 13:51:45 +0200602 if (argc < 6)
603 lo.optional_data = NULL;
604 else
605 lo.optional_data = (const u8 *)argv[6];
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900606
607 size = efi_serialize_load_option(&lo, (u8 **)&data);
608 if (!size) {
Heinrich Schuchardt428a4702019-06-20 12:48:04 +0200609 r = CMD_RET_FAILURE;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900610 goto out;
611 }
612
613 ret = EFI_CALL(RT->set_variable(var_name16, &guid,
AKASHI Takahirof658c2e2019-06-04 15:52:10 +0900614 EFI_VARIABLE_NON_VOLATILE |
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900615 EFI_VARIABLE_BOOTSERVICE_ACCESS |
616 EFI_VARIABLE_RUNTIME_ACCESS,
617 size, data));
Heinrich Schuchardta332f252019-06-20 12:59:45 +0200618 if (ret != EFI_SUCCESS) {
619 printf("Cannot set %ls\n", var_name16);
620 r = CMD_RET_FAILURE;
621 }
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900622out:
623 free(data);
624 efi_free_pool(device_path);
625 efi_free_pool(file_path);
626 free(lo.label);
627
Heinrich Schuchardt428a4702019-06-20 12:48:04 +0200628 return r;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900629}
630
631/**
632 * do_efi_boot_rm() - delete UEFI load options
633 *
634 * @cmdtp: Command table
635 * @flag: Command flag
636 * @argc: Number of arguments
637 * @argv: Argument array
638 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
639 *
640 * Implement efidebug "boot rm" sub-command.
641 * Delete UEFI load options.
Heinrich Schuchardt0b016562019-07-14 14:00:41 +0200642 *
643 * efidebug boot rm <id> ...
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900644 */
645static int do_efi_boot_rm(cmd_tbl_t *cmdtp, int flag,
646 int argc, char * const argv[])
647{
648 efi_guid_t guid;
649 int id, i;
650 char *endp;
651 char var_name[9];
AKASHI Takahiroe8bced62020-02-28 09:05:04 +0900652 u16 var_name16[9], *p;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900653 efi_status_t ret;
654
655 if (argc == 1)
656 return CMD_RET_USAGE;
657
658 guid = efi_global_variable_guid;
659 for (i = 1; i < argc; i++, argv++) {
660 id = (int)simple_strtoul(argv[1], &endp, 16);
661 if (*endp != '\0' || id > 0xffff)
662 return CMD_RET_FAILURE;
663
664 sprintf(var_name, "Boot%04X", id);
AKASHI Takahiroe8bced62020-02-28 09:05:04 +0900665 p = var_name16;
666 utf8_utf16_strncpy(&p, var_name, 9);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900667
668 ret = EFI_CALL(RT->set_variable(var_name16, &guid, 0, 0, NULL));
669 if (ret) {
Heinrich Schuchardta332f252019-06-20 12:59:45 +0200670 printf("Cannot remove Boot%04X", id);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900671 return CMD_RET_FAILURE;
672 }
673 }
674
675 return CMD_RET_SUCCESS;
676}
677
678/**
679 * show_efi_boot_opt_data() - dump UEFI load option
680 *
Heinrich Schuchardt39a1ff82019-04-29 13:51:45 +0200681 * @id: load option number
682 * @data: value of UEFI load option variable
683 * @size: size of the boot option
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900684 *
685 * Decode the value of UEFI load option variable and print information.
686 */
Heinrich Schuchardt39a1ff82019-04-29 13:51:45 +0200687static void show_efi_boot_opt_data(int id, void *data, size_t size)
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900688{
689 struct efi_load_option lo;
690 char *label, *p;
691 size_t label_len16, label_len;
692 u16 *dp_str;
693
694 efi_deserialize_load_option(&lo, data);
695
696 label_len16 = u16_strlen(lo.label);
697 label_len = utf16_utf8_strnlen(lo.label, label_len16);
698 label = malloc(label_len + 1);
699 if (!label)
700 return;
701 p = label;
702 utf16_utf8_strncpy(&p, lo.label, label_len16);
703
704 printf("Boot%04X:\n", id);
Heinrich Schuchardt39a1ff82019-04-29 13:51:45 +0200705 printf(" attributes: %c%c%c (0x%08x)\n",
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900706 /* ACTIVE */
707 lo.attributes & LOAD_OPTION_ACTIVE ? 'A' : '-',
708 /* FORCE RECONNECT */
709 lo.attributes & LOAD_OPTION_FORCE_RECONNECT ? 'R' : '-',
710 /* HIDDEN */
711 lo.attributes & LOAD_OPTION_HIDDEN ? 'H' : '-',
712 lo.attributes);
Heinrich Schuchardt39a1ff82019-04-29 13:51:45 +0200713 printf(" label: %s\n", label);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900714
715 dp_str = efi_dp_str(lo.file_path);
Heinrich Schuchardt39a1ff82019-04-29 13:51:45 +0200716 printf(" file_path: %ls\n", dp_str);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900717 efi_free_pool(dp_str);
718
Heinrich Schuchardt39a1ff82019-04-29 13:51:45 +0200719 printf(" data:\n");
720 print_hex_dump(" ", DUMP_PREFIX_OFFSET, 16, 1,
721 lo.optional_data, size + (u8 *)data -
722 (u8 *)lo.optional_data, true);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900723 free(label);
724}
725
726/**
727 * show_efi_boot_opt() - dump UEFI load option
728 *
729 * @id: Load option number
730 *
731 * Dump information defined by UEFI load option.
732 */
733static void show_efi_boot_opt(int id)
734{
735 char var_name[9];
736 u16 var_name16[9], *p;
737 efi_guid_t guid;
738 void *data = NULL;
739 efi_uintn_t size;
AKASHI Takahiro0bffb8c2019-11-26 10:11:22 +0900740 efi_status_t ret;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900741
742 sprintf(var_name, "Boot%04X", id);
743 p = var_name16;
744 utf8_utf16_strncpy(&p, var_name, 9);
745 guid = efi_global_variable_guid;
746
747 size = 0;
748 ret = EFI_CALL(RT->get_variable(var_name16, &guid, NULL, &size, NULL));
AKASHI Takahiro0bffb8c2019-11-26 10:11:22 +0900749 if (ret == EFI_BUFFER_TOO_SMALL) {
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900750 data = malloc(size);
751 ret = EFI_CALL(RT->get_variable(var_name16, &guid, NULL, &size,
752 data));
753 }
754 if (ret == EFI_SUCCESS)
Heinrich Schuchardt39a1ff82019-04-29 13:51:45 +0200755 show_efi_boot_opt_data(id, data, size);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900756 else if (ret == EFI_NOT_FOUND)
757 printf("Boot%04X: not found\n", id);
758
759 free(data);
760}
761
AKASHI Takahiroffe21572019-04-26 09:44:18 +0900762static int u16_tohex(u16 c)
763{
764 if (c >= '0' && c <= '9')
765 return c - '0';
766 if (c >= 'A' && c <= 'F')
767 return c - 'A' + 10;
768
769 /* not hexadecimal */
770 return -1;
771}
772
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900773/**
774 * show_efi_boot_dump() - dump all UEFI load options
775 *
776 * @cmdtp: Command table
777 * @flag: Command flag
778 * @argc: Number of arguments
779 * @argv: Argument array
780 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
781 *
782 * Implement efidebug "boot dump" sub-command.
783 * Dump information of all UEFI load options defined.
Heinrich Schuchardta6ccba02019-07-25 20:52:23 +0200784 *
785 * efidebug boot dump
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900786 */
787static int do_efi_boot_dump(cmd_tbl_t *cmdtp, int flag,
788 int argc, char * const argv[])
789{
AKASHI Takahiroffe21572019-04-26 09:44:18 +0900790 u16 *var_name16, *p;
791 efi_uintn_t buf_size, size;
792 efi_guid_t guid;
793 int id, i, digit;
794 efi_status_t ret;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900795
796 if (argc > 1)
797 return CMD_RET_USAGE;
798
AKASHI Takahiroffe21572019-04-26 09:44:18 +0900799 buf_size = 128;
800 var_name16 = malloc(buf_size);
801 if (!var_name16)
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900802 return CMD_RET_FAILURE;
803
AKASHI Takahiroffe21572019-04-26 09:44:18 +0900804 var_name16[0] = 0;
805 for (;;) {
806 size = buf_size;
807 ret = EFI_CALL(efi_get_next_variable_name(&size, var_name16,
808 &guid));
809 if (ret == EFI_NOT_FOUND)
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900810 break;
AKASHI Takahiroffe21572019-04-26 09:44:18 +0900811 if (ret == EFI_BUFFER_TOO_SMALL) {
812 buf_size = size;
813 p = realloc(var_name16, buf_size);
814 if (!p) {
815 free(var_name16);
816 return CMD_RET_FAILURE;
817 }
818 var_name16 = p;
819 ret = EFI_CALL(efi_get_next_variable_name(&size,
820 var_name16,
821 &guid));
822 }
823 if (ret != EFI_SUCCESS) {
824 free(var_name16);
825 return CMD_RET_FAILURE;
826 }
827
828 if (memcmp(var_name16, L"Boot", 8))
829 continue;
830
831 for (id = 0, i = 0; i < 4; i++) {
832 digit = u16_tohex(var_name16[4 + i]);
833 if (digit < 0)
834 break;
835 id = (id << 4) + digit;
836 }
837 if (i == 4 && !var_name16[8])
838 show_efi_boot_opt(id);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900839 }
AKASHI Takahiroffe21572019-04-26 09:44:18 +0900840
841 free(var_name16);
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900842
843 return CMD_RET_SUCCESS;
844}
845
846/**
847 * show_efi_boot_order() - show order of UEFI load options
848 *
849 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
850 *
851 * Show order of UEFI load options defined by BootOrder variable.
852 */
853static int show_efi_boot_order(void)
854{
855 efi_guid_t guid;
856 u16 *bootorder = NULL;
857 efi_uintn_t size;
858 int num, i;
859 char var_name[9];
860 u16 var_name16[9], *p16;
861 void *data;
862 struct efi_load_option lo;
863 char *label, *p;
864 size_t label_len16, label_len;
865 efi_status_t ret;
866
867 guid = efi_global_variable_guid;
868 size = 0;
869 ret = EFI_CALL(RT->get_variable(L"BootOrder", &guid, NULL, &size,
870 NULL));
871 if (ret == EFI_BUFFER_TOO_SMALL) {
872 bootorder = malloc(size);
873 ret = EFI_CALL(RT->get_variable(L"BootOrder", &guid, NULL,
874 &size, bootorder));
875 }
876 if (ret == EFI_NOT_FOUND) {
877 printf("BootOrder not defined\n");
878 ret = CMD_RET_SUCCESS;
879 goto out;
880 } else if (ret != EFI_SUCCESS) {
881 ret = CMD_RET_FAILURE;
882 goto out;
883 }
884
885 num = size / sizeof(u16);
886 for (i = 0; i < num; i++) {
887 sprintf(var_name, "Boot%04X", bootorder[i]);
888 p16 = var_name16;
889 utf8_utf16_strncpy(&p16, var_name, 9);
890
891 size = 0;
892 ret = EFI_CALL(RT->get_variable(var_name16, &guid, NULL, &size,
893 NULL));
894 if (ret != EFI_BUFFER_TOO_SMALL) {
895 printf("%2d: Boot%04X: (not defined)\n",
896 i + 1, bootorder[i]);
897 continue;
898 }
899
900 data = malloc(size);
901 if (!data) {
902 ret = CMD_RET_FAILURE;
903 goto out;
904 }
905 ret = EFI_CALL(RT->get_variable(var_name16, &guid, NULL, &size,
906 data));
907 if (ret != EFI_SUCCESS) {
908 free(data);
909 ret = CMD_RET_FAILURE;
910 goto out;
911 }
912
913 efi_deserialize_load_option(&lo, data);
914
915 label_len16 = u16_strlen(lo.label);
916 label_len = utf16_utf8_strnlen(lo.label, label_len16);
917 label = malloc(label_len + 1);
918 if (!label) {
919 free(data);
920 ret = CMD_RET_FAILURE;
921 goto out;
922 }
923 p = label;
924 utf16_utf8_strncpy(&p, lo.label, label_len16);
925 printf("%2d: Boot%04X: %s\n", i + 1, bootorder[i], label);
926 free(label);
927
928 free(data);
929 }
930out:
931 free(bootorder);
932
933 return ret;
934}
935
936/**
937 * do_efi_boot_next() - manage UEFI BootNext variable
938 *
939 * @cmdtp: Command table
940 * @flag: Command flag
941 * @argc: Number of arguments
942 * @argv: Argument array
943 * Return: CMD_RET_SUCCESS on success,
944 * CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
945 *
946 * Implement efidebug "boot next" sub-command.
947 * Set BootNext variable.
Heinrich Schuchardt0b016562019-07-14 14:00:41 +0200948 *
949 * efidebug boot next <id>
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900950 */
951static int do_efi_boot_next(cmd_tbl_t *cmdtp, int flag,
952 int argc, char * const argv[])
953{
954 u16 bootnext;
955 efi_uintn_t size;
956 char *endp;
957 efi_guid_t guid;
958 efi_status_t ret;
Heinrich Schuchardta332f252019-06-20 12:59:45 +0200959 int r = CMD_RET_SUCCESS;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900960
961 if (argc != 2)
962 return CMD_RET_USAGE;
963
964 bootnext = (u16)simple_strtoul(argv[1], &endp, 16);
965 if (*endp != '\0' || bootnext > 0xffff) {
966 printf("invalid value: %s\n", argv[1]);
Heinrich Schuchardt428a4702019-06-20 12:48:04 +0200967 r = CMD_RET_FAILURE;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900968 goto out;
969 }
970
971 guid = efi_global_variable_guid;
972 size = sizeof(u16);
973 ret = EFI_CALL(RT->set_variable(L"BootNext", &guid,
AKASHI Takahirof658c2e2019-06-04 15:52:10 +0900974 EFI_VARIABLE_NON_VOLATILE |
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900975 EFI_VARIABLE_BOOTSERVICE_ACCESS |
976 EFI_VARIABLE_RUNTIME_ACCESS,
977 size, &bootnext));
Heinrich Schuchardta332f252019-06-20 12:59:45 +0200978 if (ret != EFI_SUCCESS) {
979 printf("Cannot set BootNext\n");
980 r = CMD_RET_FAILURE;
981 }
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900982out:
Heinrich Schuchardt428a4702019-06-20 12:48:04 +0200983 return r;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900984}
985
986/**
987 * do_efi_boot_order() - manage UEFI BootOrder variable
988 *
989 * @cmdtp: Command table
990 * @flag: Command flag
991 * @argc: Number of arguments
992 * @argv: Argument array
993 * Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
994 *
995 * Implement efidebug "boot order" sub-command.
996 * Show order of UEFI load options, or change it in BootOrder variable.
Heinrich Schuchardt0b016562019-07-14 14:00:41 +0200997 *
998 * efidebug boot order [<id> ...]
AKASHI Takahiro59df7e72019-02-25 15:54:38 +0900999 */
1000static int do_efi_boot_order(cmd_tbl_t *cmdtp, int flag,
1001 int argc, char * const argv[])
1002{
1003 u16 *bootorder = NULL;
1004 efi_uintn_t size;
1005 int id, i;
1006 char *endp;
1007 efi_guid_t guid;
1008 efi_status_t ret;
Heinrich Schuchardta332f252019-06-20 12:59:45 +02001009 int r = CMD_RET_SUCCESS;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001010
1011 if (argc == 1)
1012 return show_efi_boot_order();
1013
1014 argc--;
1015 argv++;
1016
1017 size = argc * sizeof(u16);
1018 bootorder = malloc(size);
1019 if (!bootorder)
1020 return CMD_RET_FAILURE;
1021
1022 for (i = 0; i < argc; i++) {
1023 id = (int)simple_strtoul(argv[i], &endp, 16);
1024 if (*endp != '\0' || id > 0xffff) {
1025 printf("invalid value: %s\n", argv[i]);
Heinrich Schuchardt428a4702019-06-20 12:48:04 +02001026 r = CMD_RET_FAILURE;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001027 goto out;
1028 }
1029
1030 bootorder[i] = (u16)id;
1031 }
1032
1033 guid = efi_global_variable_guid;
1034 ret = EFI_CALL(RT->set_variable(L"BootOrder", &guid,
AKASHI Takahirof658c2e2019-06-04 15:52:10 +09001035 EFI_VARIABLE_NON_VOLATILE |
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001036 EFI_VARIABLE_BOOTSERVICE_ACCESS |
1037 EFI_VARIABLE_RUNTIME_ACCESS,
1038 size, bootorder));
Heinrich Schuchardta332f252019-06-20 12:59:45 +02001039 if (ret != EFI_SUCCESS) {
1040 printf("Cannot set BootOrder\n");
1041 r = CMD_RET_FAILURE;
1042 }
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001043out:
1044 free(bootorder);
1045
Heinrich Schuchardt428a4702019-06-20 12:48:04 +02001046 return r;
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001047}
1048
1049static cmd_tbl_t cmd_efidebug_boot_sub[] = {
1050 U_BOOT_CMD_MKENT(add, CONFIG_SYS_MAXARGS, 1, do_efi_boot_add, "", ""),
1051 U_BOOT_CMD_MKENT(rm, CONFIG_SYS_MAXARGS, 1, do_efi_boot_rm, "", ""),
1052 U_BOOT_CMD_MKENT(dump, CONFIG_SYS_MAXARGS, 1, do_efi_boot_dump, "", ""),
1053 U_BOOT_CMD_MKENT(next, CONFIG_SYS_MAXARGS, 1, do_efi_boot_next, "", ""),
1054 U_BOOT_CMD_MKENT(order, CONFIG_SYS_MAXARGS, 1, do_efi_boot_order,
1055 "", ""),
1056};
1057
1058/**
1059 * do_efi_boot_opt() - manage UEFI load options
1060 *
1061 * @cmdtp: Command table
1062 * @flag: Command flag
1063 * @argc: Number of arguments
1064 * @argv: Argument array
1065 * Return: CMD_RET_SUCCESS on success,
1066 * CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
1067 *
1068 * Implement efidebug "boot" sub-command.
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001069 */
1070static int do_efi_boot_opt(cmd_tbl_t *cmdtp, int flag,
1071 int argc, char * const argv[])
1072{
1073 cmd_tbl_t *cp;
1074
1075 if (argc < 2)
1076 return CMD_RET_USAGE;
1077
1078 argc--; argv++;
1079
1080 cp = find_cmd_tbl(argv[0], cmd_efidebug_boot_sub,
1081 ARRAY_SIZE(cmd_efidebug_boot_sub));
1082 if (!cp)
1083 return CMD_RET_USAGE;
1084
1085 return cp->cmd(cmdtp, flag, argc, argv);
1086}
1087
1088static cmd_tbl_t cmd_efidebug_sub[] = {
1089 U_BOOT_CMD_MKENT(boot, CONFIG_SYS_MAXARGS, 1, do_efi_boot_opt, "", ""),
AKASHI Takahiro355cdb52019-02-25 15:54:39 +09001090 U_BOOT_CMD_MKENT(devices, CONFIG_SYS_MAXARGS, 1, do_efi_show_devices,
1091 "", ""),
AKASHI Takahiro66eaf562019-02-25 15:54:40 +09001092 U_BOOT_CMD_MKENT(drivers, CONFIG_SYS_MAXARGS, 1, do_efi_show_drivers,
1093 "", ""),
AKASHI Takahiroa8014622019-02-25 15:54:41 +09001094 U_BOOT_CMD_MKENT(dh, CONFIG_SYS_MAXARGS, 1, do_efi_show_handles,
1095 "", ""),
AKASHI Takahirofa536732019-02-25 15:54:42 +09001096 U_BOOT_CMD_MKENT(images, CONFIG_SYS_MAXARGS, 1, do_efi_show_images,
1097 "", ""),
AKASHI Takahiro00358bb2019-02-25 15:54:43 +09001098 U_BOOT_CMD_MKENT(memmap, CONFIG_SYS_MAXARGS, 1, do_efi_show_memmap,
1099 "", ""),
Heinrich Schuchardt986e0642020-01-07 05:57:47 +01001100 U_BOOT_CMD_MKENT(tables, CONFIG_SYS_MAXARGS, 1, do_efi_show_tables,
1101 "", ""),
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001102};
1103
1104/**
1105 * do_efidebug() - display and configure UEFI environment
1106 *
1107 * @cmdtp: Command table
1108 * @flag: Command flag
1109 * @argc: Number of arguments
1110 * @argv: Argument array
1111 * Return: CMD_RET_SUCCESS on success,
1112 * CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
1113 *
1114 * Implement efidebug command which allows us to display and
1115 * configure UEFI environment.
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001116 */
1117static int do_efidebug(cmd_tbl_t *cmdtp, int flag,
1118 int argc, char * const argv[])
1119{
1120 cmd_tbl_t *cp;
1121 efi_status_t r;
1122
1123 if (argc < 2)
1124 return CMD_RET_USAGE;
1125
1126 argc--; argv++;
1127
1128 /* Initialize UEFI drivers */
1129 r = efi_init_obj_list();
1130 if (r != EFI_SUCCESS) {
1131 printf("Error: Cannot initialize UEFI sub-system, r = %lu\n",
1132 r & ~EFI_ERROR_MASK);
1133 return CMD_RET_FAILURE;
1134 }
1135
1136 cp = find_cmd_tbl(argv[0], cmd_efidebug_sub,
1137 ARRAY_SIZE(cmd_efidebug_sub));
1138 if (!cp)
1139 return CMD_RET_USAGE;
1140
1141 return cp->cmd(cmdtp, flag, argc, argv);
1142}
1143
1144#ifdef CONFIG_SYS_LONGHELP
1145static char efidebug_help_text[] =
1146 " - UEFI Shell-like interface to configure UEFI environment\n"
1147 "\n"
1148 "efidebug boot add <bootid> <label> <interface> <devnum>[:<part>] <file path> [<load options>]\n"
1149 " - set UEFI BootXXXX variable\n"
1150 " <load options> will be passed to UEFI application\n"
1151 "efidebug boot rm <bootid#1> [<bootid#2> [<bootid#3> [...]]]\n"
1152 " - delete UEFI BootXXXX variables\n"
1153 "efidebug boot dump\n"
1154 " - dump all UEFI BootXXXX variables\n"
1155 "efidebug boot next <bootid>\n"
1156 " - set UEFI BootNext variable\n"
1157 "efidebug boot order [<bootid#1> [<bootid#2> [<bootid#3> [...]]]]\n"
1158 " - set/show UEFI boot order\n"
AKASHI Takahiro355cdb52019-02-25 15:54:39 +09001159 "\n"
1160 "efidebug devices\n"
Heinrich Schuchardt07e2fe72020-01-07 07:48:15 +01001161 " - show UEFI devices\n"
AKASHI Takahiro66eaf562019-02-25 15:54:40 +09001162 "efidebug drivers\n"
Heinrich Schuchardt07e2fe72020-01-07 07:48:15 +01001163 " - show UEFI drivers\n"
AKASHI Takahiroa8014622019-02-25 15:54:41 +09001164 "efidebug dh\n"
Heinrich Schuchardt07e2fe72020-01-07 07:48:15 +01001165 " - show UEFI handles\n"
AKASHI Takahirofa536732019-02-25 15:54:42 +09001166 "efidebug images\n"
AKASHI Takahiro00358bb2019-02-25 15:54:43 +09001167 " - show loaded images\n"
1168 "efidebug memmap\n"
Heinrich Schuchardt07e2fe72020-01-07 07:48:15 +01001169 " - show UEFI memory map\n"
Heinrich Schuchardt986e0642020-01-07 05:57:47 +01001170 "efidebug tables\n"
1171 " - show UEFI configuration tables\n";
AKASHI Takahiro59df7e72019-02-25 15:54:38 +09001172#endif
1173
1174U_BOOT_CMD(
1175 efidebug, 10, 0, do_efidebug,
1176 "Configure UEFI environment",
1177 efidebug_help_text
1178);