2019-02-25 14:54:38 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0+
|
|
|
|
/*
|
|
|
|
* UEFI Shell-like command
|
|
|
|
*
|
|
|
|
* Copyright (c) 2018 AKASHI Takahiro, Linaro Limited
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <charset.h>
|
|
|
|
#include <common.h>
|
|
|
|
#include <command.h>
|
2020-12-13 17:30:24 +08:00
|
|
|
#include <efi_dt_fixup.h>
|
2021-03-18 03:55:01 +08:00
|
|
|
#include <efi_load_initrd.h>
|
2019-02-25 14:54:38 +08:00
|
|
|
#include <efi_loader.h>
|
2020-09-27 20:50:25 +08:00
|
|
|
#include <efi_rng.h>
|
2019-02-25 14:54:38 +08:00
|
|
|
#include <exports.h>
|
2019-04-29 19:51:45 +08:00
|
|
|
#include <hexdump.h>
|
2020-05-11 01:40:05 +08:00
|
|
|
#include <log.h>
|
2019-02-25 14:54:38 +08:00
|
|
|
#include <malloc.h>
|
2020-03-14 15:44:07 +08:00
|
|
|
#include <mapmem.h>
|
2021-02-03 00:53:14 +08:00
|
|
|
#include <part.h>
|
2019-02-25 14:54:38 +08:00
|
|
|
#include <search.h>
|
|
|
|
#include <linux/ctype.h>
|
2021-03-18 03:55:01 +08:00
|
|
|
#include <linux/err.h>
|
2019-02-25 14:54:38 +08:00
|
|
|
|
cmd: efidebug: add devices command
"devices" command prints all the uefi variables on the system.
=> efi devices
Scanning disk ahci_scsi.id0lun0...
Scanning disk ahci_scsi.id1lun0...
Found 4 disks
Device Device Path
================ ====================
000000007ef07ea0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000000007ef00c10 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(0,0)
000000007ef00dd0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)
000000007ef07be0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(1,MBR,0x086246ba,0x800,0x40000)
000000007ef07510 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(2,MBR,0x086246ba,0x40800,0x3f800)
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:39 +08:00
|
|
|
#define BS systab.boottime
|
2020-11-17 08:28:01 +08:00
|
|
|
#define RT systab.runtime
|
|
|
|
|
|
|
|
#ifdef CONFIG_EFI_HAVE_CAPSULE_SUPPORT
|
|
|
|
/**
|
|
|
|
* do_efi_capsule_update() - process a capsule update
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "capsule update" sub-command.
|
|
|
|
* process a capsule update.
|
|
|
|
*
|
|
|
|
* efidebug capsule update [-v] <capsule address>
|
|
|
|
*/
|
|
|
|
static int do_efi_capsule_update(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char * const argv[])
|
|
|
|
{
|
|
|
|
struct efi_capsule_header *capsule;
|
|
|
|
int verbose = 0;
|
|
|
|
char *endp;
|
|
|
|
efi_status_t ret;
|
|
|
|
|
|
|
|
if (argc != 2 && argc != 3)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
|
|
|
if (argc == 3) {
|
|
|
|
if (strcmp(argv[1], "-v"))
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
|
|
|
verbose = 1;
|
|
|
|
argc--;
|
|
|
|
argv++;
|
|
|
|
}
|
|
|
|
|
|
|
|
capsule = (typeof(capsule))simple_strtoul(argv[1], &endp, 16);
|
|
|
|
if (endp == argv[1]) {
|
|
|
|
printf("Invalid address: %s", argv[1]);
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (verbose) {
|
|
|
|
printf("Capsule guid: %pUl\n", &capsule->capsule_guid);
|
|
|
|
printf("Capsule flags: 0x%x\n", capsule->flags);
|
|
|
|
printf("Capsule header size: 0x%x\n", capsule->header_size);
|
|
|
|
printf("Capsule image size: 0x%x\n",
|
|
|
|
capsule->capsule_image_size);
|
|
|
|
}
|
|
|
|
|
efi: Fix compiler warnings
This occur when building on Raspberry Pi 400 (32-bit ARM). Fix them.
Examples:
cmd/efidebug.c: In function ‘do_efi_capsule_update’:
cmd/efidebug.c:75:49: warning: cast from pointer to integer of different
size [-Wpointer-to-int-cast]
ret = EFI_CALL(RT->update_capsule(&capsule, 1, (u64)NULL));
^
include/efi_loader.h:104:9: note: in definition of macro ‘EFI_CALL’
typeof(exp) _r = exp; \
^~~
cmd/efidebug.c:75:49: warning: cast from pointer to integer of different
size [-Wpointer-to-int-cast]
ret = EFI_CALL(RT->update_capsule(&capsule, 1, (u64)NULL));
^
include/efi_loader.h:104:19: note: in definition of macro ‘EFI_CALL’
typeof(exp) _r = exp; \
^~~
In file included from include/common.h:20,
from lib/efi_loader/efi_capsule.c:9:
lib/efi_loader/efi_capsule.c: In function ‘efi_update_capsule’:
include/efi_loader.h:83:8: warning: format ‘%lu’ expects argument of type
‘long unsigned int’, but argument 10 has type ‘size_t’
{aka ‘unsigned int’} [-Wformat=]
debug("%sEFI: Entry %s(" format ")\n", __efi_nesting_inc(), \
^~~~~~~~~~~~~~~~~~
include/linux/printk.h:37:21: note: in definition of macro ‘pr_fmt’
#define pr_fmt(fmt) fmt
^~~
include/log.h:229:2: note: in expansion of macro ‘log’
log(LOG_CATEGORY, LOGL_DEBUG, fmt, ##args); \
^~~
include/log.h:249:2: note: in expansion of macro ‘debug_cond’
debug_cond(_DEBUG, fmt, ##args)
^~~~~~~~~~
include/efi_loader.h:83:2: note: in expansion of macro ‘debug’
debug("%sEFI: Entry %s(" format ")\n", __efi_nesting_inc(), \
^~~~~
lib/efi_loader/efi_capsule.c:444:2: note: in expansion of macro ‘EFI_ENTRY’
EFI_ENTRY("%p, %lu, %llu\n", capsule_header_array, capsule_count,
^~~~~~~~~
lib/efi_loader/efi_capsule.c:444:19: note: format string is defined here
EFI_ENTRY("%p, %lu, %llu\n", capsule_header_array, capsule_count,
~~^
%u
Signed-off-by: Simon Glass <sjg@chromium.org>
Replace (uintptr_t)NULL by 0.
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2021-02-08 05:27:02 +08:00
|
|
|
ret = EFI_CALL(RT->update_capsule(&capsule, 1, 0));
|
2020-11-17 08:28:01 +08:00
|
|
|
if (ret) {
|
|
|
|
printf("Cannot handle a capsule at %p", capsule);
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2020-12-30 21:57:11 +08:00
|
|
|
static int do_efi_capsule_on_disk_update(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char * const argv[])
|
|
|
|
{
|
|
|
|
efi_status_t ret;
|
|
|
|
|
|
|
|
ret = efi_launch_capsules();
|
|
|
|
|
|
|
|
return ret == EFI_SUCCESS ? CMD_RET_SUCCESS : CMD_RET_FAILURE;
|
|
|
|
}
|
|
|
|
|
2020-11-17 08:28:01 +08:00
|
|
|
/**
|
|
|
|
* do_efi_capsule_show() - show capsule information
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "capsule show" sub-command.
|
|
|
|
* show capsule information.
|
|
|
|
*
|
|
|
|
* efidebug capsule show <capsule address>
|
|
|
|
*/
|
|
|
|
static int do_efi_capsule_show(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char * const argv[])
|
|
|
|
{
|
|
|
|
struct efi_capsule_header *capsule;
|
|
|
|
char *endp;
|
|
|
|
|
|
|
|
if (argc != 2)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
|
|
|
capsule = (typeof(capsule))simple_strtoul(argv[1], &endp, 16);
|
|
|
|
if (endp == argv[1]) {
|
|
|
|
printf("Invalid address: %s", argv[1]);
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("Capsule guid: %pUl\n", &capsule->capsule_guid);
|
|
|
|
printf("Capsule flags: 0x%x\n", capsule->flags);
|
|
|
|
printf("Capsule header size: 0x%x\n", capsule->header_size);
|
|
|
|
printf("Capsule image size: 0x%x\n",
|
|
|
|
capsule->capsule_image_size);
|
|
|
|
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2021-03-11 21:18:51 +08:00
|
|
|
#ifdef CONFIG_EFI_ESRT
|
|
|
|
|
|
|
|
#define EFI_ESRT_FW_TYPE_NUM 4
|
|
|
|
char *efi_fw_type_str[EFI_ESRT_FW_TYPE_NUM] = {"unknown", "system FW", "device FW",
|
|
|
|
"UEFI driver"};
|
|
|
|
|
|
|
|
#define EFI_ESRT_UPDATE_STATUS_NUM 9
|
|
|
|
char *efi_update_status_str[EFI_ESRT_UPDATE_STATUS_NUM] = {"success", "unsuccessful",
|
|
|
|
"insufficient resources", "incorrect version", "invalid format",
|
|
|
|
"auth error", "power event (AC)", "power event (batt)",
|
|
|
|
"unsatisfied dependencies"};
|
|
|
|
|
|
|
|
#define EFI_FW_TYPE_STR_GET(idx) (\
|
|
|
|
EFI_ESRT_FW_TYPE_NUM > (idx) ? efi_fw_type_str[(idx)] : "error"\
|
|
|
|
)
|
|
|
|
|
|
|
|
#define EFI_FW_STATUS_STR_GET(idx) (\
|
|
|
|
EFI_ESRT_UPDATE_STATUS_NUM > (idx) ? efi_update_status_str[(idx)] : "error"\
|
|
|
|
)
|
|
|
|
|
|
|
|
/**
|
|
|
|
* do_efi_capsule_esrt() - manage UEFI capsules
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success,
|
|
|
|
* CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "capsule esrt" sub-command.
|
|
|
|
* The prints the current ESRT table.
|
|
|
|
*
|
|
|
|
* efidebug capsule esrt
|
|
|
|
*/
|
|
|
|
static int do_efi_capsule_esrt(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char * const argv[])
|
|
|
|
{
|
|
|
|
struct efi_system_resource_table *esrt = NULL;
|
|
|
|
|
|
|
|
if (argc != 1)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
|
|
|
for (int idx = 0; idx < systab.nr_tables; idx++)
|
|
|
|
if (!guidcmp(&efi_esrt_guid, &systab.tables[idx].guid))
|
|
|
|
esrt = (struct efi_system_resource_table *)systab.tables[idx].table;
|
|
|
|
|
|
|
|
if (!esrt) {
|
|
|
|
log_info("ESRT: table not present\n");
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("========================================\n");
|
|
|
|
printf("ESRT: fw_resource_count=%d\n", esrt->fw_resource_count);
|
|
|
|
printf("ESRT: fw_resource_count_max=%d\n", esrt->fw_resource_count_max);
|
|
|
|
printf("ESRT: fw_resource_version=%lld\n", esrt->fw_resource_version);
|
|
|
|
|
|
|
|
for (int idx = 0; idx < esrt->fw_resource_count; idx++) {
|
|
|
|
printf("[entry %d]==============================\n", idx);
|
|
|
|
printf("ESRT: fw_class=%pUL\n", &esrt->entries[idx].fw_class);
|
|
|
|
printf("ESRT: fw_type=%s\n", EFI_FW_TYPE_STR_GET(esrt->entries[idx].fw_type));
|
|
|
|
printf("ESRT: fw_version=%d\n", esrt->entries[idx].fw_version);
|
|
|
|
printf("ESRT: lowest_supported_fw_version=%d\n",
|
|
|
|
esrt->entries[idx].lowest_supported_fw_version);
|
|
|
|
printf("ESRT: capsule_flags=%d\n",
|
|
|
|
esrt->entries[idx].capsule_flags);
|
|
|
|
printf("ESRT: last_attempt_version=%d\n",
|
|
|
|
esrt->entries[idx].last_attempt_version);
|
|
|
|
printf("ESRT: last_attempt_status=%s\n",
|
|
|
|
EFI_FW_STATUS_STR_GET(esrt->entries[idx].last_attempt_status));
|
|
|
|
}
|
|
|
|
printf("========================================\n");
|
|
|
|
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_EFI_ESRT */
|
2020-11-17 08:28:01 +08:00
|
|
|
/**
|
|
|
|
* do_efi_capsule_res() - show a capsule update result
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "capsule result" sub-command.
|
|
|
|
* show a capsule update result.
|
|
|
|
* If result number is not specified, CapsuleLast will be shown.
|
|
|
|
*
|
|
|
|
* efidebug capsule result [<capsule result number>]
|
|
|
|
*/
|
|
|
|
static int do_efi_capsule_res(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char * const argv[])
|
|
|
|
{
|
|
|
|
int capsule_id;
|
|
|
|
char *endp;
|
2021-05-24 16:57:03 +08:00
|
|
|
u16 var_name16[12];
|
2020-11-17 08:28:01 +08:00
|
|
|
efi_guid_t guid;
|
|
|
|
struct efi_capsule_result_variable_header *result = NULL;
|
|
|
|
efi_uintn_t size;
|
|
|
|
efi_status_t ret;
|
|
|
|
|
|
|
|
if (argc != 1 && argc != 2)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
|
|
|
guid = efi_guid_capsule_report;
|
|
|
|
if (argc == 1) {
|
|
|
|
size = sizeof(var_name16);
|
|
|
|
ret = EFI_CALL(RT->get_variable(L"CapsuleLast", &guid, NULL,
|
|
|
|
&size, var_name16));
|
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
if (ret == EFI_NOT_FOUND)
|
|
|
|
printf("CapsuleLast doesn't exist\n");
|
|
|
|
else
|
|
|
|
printf("Failed to get CapsuleLast\n");
|
|
|
|
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
}
|
|
|
|
printf("CapsuleLast is %ls\n", var_name16);
|
|
|
|
} else {
|
|
|
|
argc--;
|
|
|
|
argv++;
|
|
|
|
|
|
|
|
capsule_id = simple_strtoul(argv[0], &endp, 16);
|
|
|
|
if (capsule_id < 0 || capsule_id > 0xffff)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
2021-05-24 16:57:03 +08:00
|
|
|
efi_create_indexed_name(var_name16, sizeof(var_name16),
|
|
|
|
"Capsule", capsule_id);
|
2020-11-17 08:28:01 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
size = 0;
|
|
|
|
ret = EFI_CALL(RT->get_variable(var_name16, &guid, NULL, &size, NULL));
|
|
|
|
if (ret == EFI_BUFFER_TOO_SMALL) {
|
|
|
|
result = malloc(size);
|
2021-01-22 09:42:48 +08:00
|
|
|
if (!result)
|
|
|
|
return CMD_RET_FAILURE;
|
2020-11-17 08:28:01 +08:00
|
|
|
ret = EFI_CALL(RT->get_variable(var_name16, &guid, NULL, &size,
|
|
|
|
result));
|
2021-01-22 09:42:48 +08:00
|
|
|
}
|
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
free(result);
|
|
|
|
printf("Failed to get %ls\n", var_name16);
|
2020-11-17 08:28:01 +08:00
|
|
|
|
2021-01-22 09:42:48 +08:00
|
|
|
return CMD_RET_FAILURE;
|
2020-11-17 08:28:01 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
printf("Result total size: 0x%x\n", result->variable_total_size);
|
|
|
|
printf("Capsule guid: %pUl\n", &result->capsule_guid);
|
|
|
|
printf("Time processed: %04d-%02d-%02d %02d:%02d:%02d\n",
|
|
|
|
result->capsule_processed.year, result->capsule_processed.month,
|
|
|
|
result->capsule_processed.day, result->capsule_processed.hour,
|
|
|
|
result->capsule_processed.minute,
|
|
|
|
result->capsule_processed.second);
|
|
|
|
printf("Capsule status: 0x%lx\n", result->capsule_status);
|
|
|
|
|
|
|
|
free(result);
|
|
|
|
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct cmd_tbl cmd_efidebug_capsule_sub[] = {
|
|
|
|
U_BOOT_CMD_MKENT(update, CONFIG_SYS_MAXARGS, 1, do_efi_capsule_update,
|
|
|
|
"", ""),
|
|
|
|
U_BOOT_CMD_MKENT(show, CONFIG_SYS_MAXARGS, 1, do_efi_capsule_show,
|
|
|
|
"", ""),
|
2021-03-11 21:18:51 +08:00
|
|
|
#ifdef CONFIG_EFI_ESRT
|
|
|
|
U_BOOT_CMD_MKENT(esrt, CONFIG_SYS_MAXARGS, 1, do_efi_capsule_esrt,
|
|
|
|
"", ""),
|
|
|
|
#endif
|
2020-12-30 21:57:11 +08:00
|
|
|
U_BOOT_CMD_MKENT(disk-update, 0, 0, do_efi_capsule_on_disk_update,
|
|
|
|
"", ""),
|
2020-11-17 08:28:01 +08:00
|
|
|
U_BOOT_CMD_MKENT(result, CONFIG_SYS_MAXARGS, 1, do_efi_capsule_res,
|
|
|
|
"", ""),
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* do_efi_capsule() - manage UEFI capsules
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success,
|
|
|
|
* CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "capsule" sub-command.
|
|
|
|
*/
|
|
|
|
static int do_efi_capsule(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char * const argv[])
|
|
|
|
{
|
|
|
|
struct cmd_tbl *cp;
|
|
|
|
|
|
|
|
if (argc < 2)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
|
|
|
argc--; argv++;
|
|
|
|
|
|
|
|
cp = find_cmd_tbl(argv[0], cmd_efidebug_capsule_sub,
|
|
|
|
ARRAY_SIZE(cmd_efidebug_capsule_sub));
|
|
|
|
if (!cp)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
|
|
|
return cp->cmd(cmdtp, flag, argc, argv);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_EFI_HAVE_CAPSULE_SUPPORT */
|
2019-02-25 14:54:38 +08:00
|
|
|
|
cmd: efidebug: add devices command
"devices" command prints all the uefi variables on the system.
=> efi devices
Scanning disk ahci_scsi.id0lun0...
Scanning disk ahci_scsi.id1lun0...
Found 4 disks
Device Device Path
================ ====================
000000007ef07ea0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000000007ef00c10 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(0,0)
000000007ef00dd0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)
000000007ef07be0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(1,MBR,0x086246ba,0x800,0x40000)
000000007ef07510 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(2,MBR,0x086246ba,0x40800,0x3f800)
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:39 +08:00
|
|
|
/**
|
2021-04-02 17:30:02 +08:00
|
|
|
* efi_get_device_path_text() - get device path text
|
cmd: efidebug: add devices command
"devices" command prints all the uefi variables on the system.
=> efi devices
Scanning disk ahci_scsi.id0lun0...
Scanning disk ahci_scsi.id1lun0...
Found 4 disks
Device Device Path
================ ====================
000000007ef07ea0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000000007ef00c10 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(0,0)
000000007ef00dd0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)
000000007ef07be0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(1,MBR,0x086246ba,0x800,0x40000)
000000007ef07510 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(2,MBR,0x086246ba,0x40800,0x3f800)
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:39 +08:00
|
|
|
*
|
2021-04-02 17:30:02 +08:00
|
|
|
* Return the text representation of the device path of a handle.
|
cmd: efidebug: add devices command
"devices" command prints all the uefi variables on the system.
=> efi devices
Scanning disk ahci_scsi.id0lun0...
Scanning disk ahci_scsi.id1lun0...
Found 4 disks
Device Device Path
================ ====================
000000007ef07ea0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000000007ef00c10 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(0,0)
000000007ef00dd0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)
000000007ef07be0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(1,MBR,0x086246ba,0x800,0x40000)
000000007ef07510 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(2,MBR,0x086246ba,0x40800,0x3f800)
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:39 +08:00
|
|
|
*
|
2021-04-02 17:30:02 +08:00
|
|
|
* @handle: handle of UEFI device
|
|
|
|
* Return:
|
|
|
|
* Pointer to the device path text or NULL.
|
|
|
|
* The caller is responsible for calling FreePool().
|
cmd: efidebug: add devices command
"devices" command prints all the uefi variables on the system.
=> efi devices
Scanning disk ahci_scsi.id0lun0...
Scanning disk ahci_scsi.id1lun0...
Found 4 disks
Device Device Path
================ ====================
000000007ef07ea0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000000007ef00c10 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(0,0)
000000007ef00dd0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)
000000007ef07be0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(1,MBR,0x086246ba,0x800,0x40000)
000000007ef07510 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(2,MBR,0x086246ba,0x40800,0x3f800)
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:39 +08:00
|
|
|
*/
|
2021-04-02 17:30:02 +08:00
|
|
|
static u16 *efi_get_device_path_text(efi_handle_t handle)
|
cmd: efidebug: add devices command
"devices" command prints all the uefi variables on the system.
=> efi devices
Scanning disk ahci_scsi.id0lun0...
Scanning disk ahci_scsi.id1lun0...
Found 4 disks
Device Device Path
================ ====================
000000007ef07ea0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000000007ef00c10 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(0,0)
000000007ef00dd0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)
000000007ef07be0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(1,MBR,0x086246ba,0x800,0x40000)
000000007ef07510 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(2,MBR,0x086246ba,0x40800,0x3f800)
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:39 +08:00
|
|
|
{
|
2021-04-02 17:30:02 +08:00
|
|
|
struct efi_handler *handler;
|
cmd: efidebug: add devices command
"devices" command prints all the uefi variables on the system.
=> efi devices
Scanning disk ahci_scsi.id0lun0...
Scanning disk ahci_scsi.id1lun0...
Found 4 disks
Device Device Path
================ ====================
000000007ef07ea0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000000007ef00c10 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(0,0)
000000007ef00dd0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)
000000007ef07be0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(1,MBR,0x086246ba,0x800,0x40000)
000000007ef07510 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(2,MBR,0x086246ba,0x40800,0x3f800)
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:39 +08:00
|
|
|
efi_status_t ret;
|
|
|
|
|
2021-04-02 17:30:02 +08:00
|
|
|
ret = efi_search_protocol(handle, &efi_guid_device_path, &handler);
|
|
|
|
if (ret == EFI_SUCCESS && handler->protocol_interface) {
|
|
|
|
struct efi_device_path *dp = handler->protocol_interface;
|
|
|
|
|
|
|
|
return efi_dp_str(dp);
|
cmd: efidebug: add devices command
"devices" command prints all the uefi variables on the system.
=> efi devices
Scanning disk ahci_scsi.id0lun0...
Scanning disk ahci_scsi.id1lun0...
Found 4 disks
Device Device Path
================ ====================
000000007ef07ea0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000000007ef00c10 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(0,0)
000000007ef00dd0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)
000000007ef07be0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(1,MBR,0x086246ba,0x800,0x40000)
000000007ef07510 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(2,MBR,0x086246ba,0x40800,0x3f800)
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:39 +08:00
|
|
|
} else {
|
2021-04-02 17:30:02 +08:00
|
|
|
return NULL;
|
cmd: efidebug: add devices command
"devices" command prints all the uefi variables on the system.
=> efi devices
Scanning disk ahci_scsi.id0lun0...
Scanning disk ahci_scsi.id1lun0...
Found 4 disks
Device Device Path
================ ====================
000000007ef07ea0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000000007ef00c10 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(0,0)
000000007ef00dd0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)
000000007ef07be0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(1,MBR,0x086246ba,0x800,0x40000)
000000007ef07510 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(2,MBR,0x086246ba,0x40800,0x3f800)
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:39 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#define EFI_HANDLE_WIDTH ((int)sizeof(efi_handle_t) * 2)
|
|
|
|
|
|
|
|
static const char spc[] = " ";
|
|
|
|
static const char sep[] = "================";
|
|
|
|
|
|
|
|
/**
|
|
|
|
* do_efi_show_devices() - show UEFI devices
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "devices" sub-command.
|
|
|
|
* Show all UEFI devices and their information.
|
|
|
|
*/
|
2020-05-11 01:40:03 +08:00
|
|
|
static int do_efi_show_devices(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char *const argv[])
|
cmd: efidebug: add devices command
"devices" command prints all the uefi variables on the system.
=> efi devices
Scanning disk ahci_scsi.id0lun0...
Scanning disk ahci_scsi.id1lun0...
Found 4 disks
Device Device Path
================ ====================
000000007ef07ea0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000000007ef00c10 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(0,0)
000000007ef00dd0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)
000000007ef07be0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(1,MBR,0x086246ba,0x800,0x40000)
000000007ef07510 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(2,MBR,0x086246ba,0x40800,0x3f800)
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:39 +08:00
|
|
|
{
|
|
|
|
efi_handle_t *handles;
|
|
|
|
efi_uintn_t num, i;
|
|
|
|
u16 *dev_path_text;
|
|
|
|
efi_status_t ret;
|
|
|
|
|
2020-05-02 22:08:37 +08:00
|
|
|
ret = EFI_CALL(efi_locate_handle_buffer(ALL_HANDLES, NULL, NULL,
|
cmd: efidebug: add devices command
"devices" command prints all the uefi variables on the system.
=> efi devices
Scanning disk ahci_scsi.id0lun0...
Scanning disk ahci_scsi.id1lun0...
Found 4 disks
Device Device Path
================ ====================
000000007ef07ea0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000000007ef00c10 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(0,0)
000000007ef00dd0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)
000000007ef07be0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(1,MBR,0x086246ba,0x800,0x40000)
000000007ef07510 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(2,MBR,0x086246ba,0x40800,0x3f800)
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:39 +08:00
|
|
|
&num, &handles));
|
|
|
|
if (ret != EFI_SUCCESS)
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
|
|
|
|
if (!num)
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
|
|
|
|
printf("Device%.*s Device Path\n", EFI_HANDLE_WIDTH - 6, spc);
|
|
|
|
printf("%.*s ====================\n", EFI_HANDLE_WIDTH, sep);
|
|
|
|
for (i = 0; i < num; i++) {
|
2021-04-02 17:30:02 +08:00
|
|
|
dev_path_text = efi_get_device_path_text(handles[i]);
|
|
|
|
if (dev_path_text) {
|
cmd: efidebug: add devices command
"devices" command prints all the uefi variables on the system.
=> efi devices
Scanning disk ahci_scsi.id0lun0...
Scanning disk ahci_scsi.id1lun0...
Found 4 disks
Device Device Path
================ ====================
000000007ef07ea0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000000007ef00c10 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(0,0)
000000007ef00dd0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)
000000007ef07be0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(1,MBR,0x086246ba,0x800,0x40000)
000000007ef07510 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(2,MBR,0x086246ba,0x40800,0x3f800)
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:39 +08:00
|
|
|
printf("%p %ls\n", handles[i], dev_path_text);
|
|
|
|
efi_free_pool(dev_path_text);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-02 22:08:37 +08:00
|
|
|
efi_free_pool(handles);
|
cmd: efidebug: add devices command
"devices" command prints all the uefi variables on the system.
=> efi devices
Scanning disk ahci_scsi.id0lun0...
Scanning disk ahci_scsi.id1lun0...
Found 4 disks
Device Device Path
================ ====================
000000007ef07ea0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000000007ef00c10 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(0,0)
000000007ef00dd0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)
000000007ef07be0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(1,MBR,0x086246ba,0x800,0x40000)
000000007ef07510 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(2,MBR,0x086246ba,0x40800,0x3f800)
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:39 +08:00
|
|
|
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2019-02-25 14:54:40 +08:00
|
|
|
/**
|
|
|
|
* efi_get_driver_handle_info() - get information of UEFI driver
|
|
|
|
*
|
|
|
|
* @handle: Handle of UEFI device
|
|
|
|
* @driver_name: Driver name
|
|
|
|
* @image_path: Pointer to text of device path
|
|
|
|
* Return: 0 on success, -1 on failure
|
|
|
|
*
|
|
|
|
* Currently return no useful information as all UEFI drivers are
|
|
|
|
* built-in..
|
|
|
|
*/
|
|
|
|
static int efi_get_driver_handle_info(efi_handle_t handle, u16 **driver_name,
|
|
|
|
u16 **image_path)
|
|
|
|
{
|
|
|
|
struct efi_handler *handler;
|
|
|
|
struct efi_loaded_image *image;
|
|
|
|
efi_status_t ret;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* driver name
|
|
|
|
* TODO: support EFI_COMPONENT_NAME2_PROTOCOL
|
|
|
|
*/
|
|
|
|
*driver_name = NULL;
|
|
|
|
|
|
|
|
/* image name */
|
|
|
|
ret = efi_search_protocol(handle, &efi_guid_loaded_image, &handler);
|
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
*image_path = NULL;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
image = handler->protocol_interface;
|
|
|
|
*image_path = efi_dp_str(image->file_path);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* do_efi_show_drivers() - show UEFI drivers
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "drivers" sub-command.
|
|
|
|
* Show all UEFI drivers and their information.
|
|
|
|
*/
|
2020-05-11 01:40:03 +08:00
|
|
|
static int do_efi_show_drivers(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char *const argv[])
|
2019-02-25 14:54:40 +08:00
|
|
|
{
|
|
|
|
efi_handle_t *handles;
|
|
|
|
efi_uintn_t num, i;
|
|
|
|
u16 *driver_name, *image_path_text;
|
|
|
|
efi_status_t ret;
|
|
|
|
|
2020-05-02 22:08:37 +08:00
|
|
|
ret = EFI_CALL(efi_locate_handle_buffer(
|
2019-02-25 14:54:40 +08:00
|
|
|
BY_PROTOCOL, &efi_guid_driver_binding_protocol,
|
|
|
|
NULL, &num, &handles));
|
|
|
|
if (ret != EFI_SUCCESS)
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
|
|
|
|
if (!num)
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
|
|
|
|
printf("Driver%.*s Name Image Path\n",
|
|
|
|
EFI_HANDLE_WIDTH - 6, spc);
|
|
|
|
printf("%.*s ==================== ====================\n",
|
|
|
|
EFI_HANDLE_WIDTH, sep);
|
|
|
|
for (i = 0; i < num; i++) {
|
|
|
|
if (!efi_get_driver_handle_info(handles[i], &driver_name,
|
|
|
|
&image_path_text)) {
|
|
|
|
if (image_path_text)
|
|
|
|
printf("%p %-20ls %ls\n", handles[i],
|
|
|
|
driver_name, image_path_text);
|
|
|
|
else
|
|
|
|
printf("%p %-20ls <built-in>\n",
|
|
|
|
handles[i], driver_name);
|
2020-05-02 22:08:37 +08:00
|
|
|
efi_free_pool(driver_name);
|
|
|
|
efi_free_pool(image_path_text);
|
2019-02-25 14:54:40 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-02 22:08:37 +08:00
|
|
|
efi_free_pool(handles);
|
2019-02-25 14:54:40 +08:00
|
|
|
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
}
|
|
|
|
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
static const struct {
|
|
|
|
const char *text;
|
|
|
|
const efi_guid_t guid;
|
|
|
|
} guid_list[] = {
|
|
|
|
{
|
|
|
|
"Device Path",
|
2019-04-20 13:39:11 +08:00
|
|
|
EFI_DEVICE_PATH_PROTOCOL_GUID,
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"Device Path To Text",
|
|
|
|
EFI_DEVICE_PATH_TO_TEXT_PROTOCOL_GUID,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"Device Path Utilities",
|
|
|
|
EFI_DEVICE_PATH_UTILITIES_PROTOCOL_GUID,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"Unicode Collation 2",
|
|
|
|
EFI_UNICODE_COLLATION_PROTOCOL2_GUID,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"Driver Binding",
|
|
|
|
EFI_DRIVER_BINDING_PROTOCOL_GUID,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"Simple Text Input",
|
|
|
|
EFI_SIMPLE_TEXT_INPUT_PROTOCOL_GUID,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"Simple Text Input Ex",
|
|
|
|
EFI_SIMPLE_TEXT_INPUT_EX_PROTOCOL_GUID,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"Simple Text Output",
|
|
|
|
EFI_SIMPLE_TEXT_OUTPUT_PROTOCOL_GUID,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"Block IO",
|
2019-04-20 13:39:11 +08:00
|
|
|
EFI_BLOCK_IO_PROTOCOL_GUID,
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"Simple File System",
|
|
|
|
EFI_SIMPLE_FILE_SYSTEM_PROTOCOL_GUID,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"Loaded Image",
|
2019-04-20 13:39:11 +08:00
|
|
|
EFI_LOADED_IMAGE_PROTOCOL_GUID,
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
},
|
|
|
|
{
|
2019-04-20 13:39:11 +08:00
|
|
|
"Graphics Output",
|
|
|
|
EFI_GRAPHICS_OUTPUT_PROTOCOL_GUID,
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
},
|
2019-04-20 13:57:28 +08:00
|
|
|
{
|
|
|
|
"HII String",
|
|
|
|
EFI_HII_STRING_PROTOCOL_GUID,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"HII Database",
|
|
|
|
EFI_HII_DATABASE_PROTOCOL_GUID,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"HII Config Routing",
|
|
|
|
EFI_HII_CONFIG_ROUTING_PROTOCOL_GUID,
|
|
|
|
},
|
2020-02-21 15:55:45 +08:00
|
|
|
{
|
|
|
|
"Load File2",
|
|
|
|
EFI_LOAD_FILE2_PROTOCOL_GUID,
|
|
|
|
},
|
2020-09-27 20:50:25 +08:00
|
|
|
{
|
|
|
|
"Random Number Generator",
|
|
|
|
EFI_RNG_PROTOCOL_GUID,
|
|
|
|
},
|
2019-04-20 13:57:28 +08:00
|
|
|
{
|
|
|
|
"Simple Network",
|
|
|
|
EFI_SIMPLE_NETWORK_PROTOCOL_GUID,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"PXE Base Code",
|
|
|
|
EFI_PXE_BASE_CODE_PROTOCOL_GUID,
|
2020-12-13 17:30:24 +08:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"Device-Tree Fixup",
|
|
|
|
EFI_DT_FIXUP_PROTOCOL_GUID,
|
2019-04-20 13:57:28 +08:00
|
|
|
},
|
2021-02-03 00:53:14 +08:00
|
|
|
{
|
|
|
|
"System Partition",
|
|
|
|
PARTITION_SYSTEM_GUID
|
|
|
|
},
|
2021-02-27 00:57:47 +08:00
|
|
|
{
|
|
|
|
"Firmware Management",
|
|
|
|
EFI_FIRMWARE_MANAGEMENT_PROTOCOL_GUID
|
|
|
|
},
|
2020-01-07 12:57:47 +08:00
|
|
|
/* Configuration table GUIDs */
|
|
|
|
{
|
|
|
|
"ACPI table",
|
|
|
|
EFI_ACPI_TABLE_GUID,
|
|
|
|
},
|
2021-03-03 01:26:38 +08:00
|
|
|
{
|
|
|
|
"EFI System Resource Table",
|
|
|
|
EFI_SYSTEM_RESOURCE_TABLE_GUID,
|
|
|
|
},
|
2020-01-07 12:57:47 +08:00
|
|
|
{
|
|
|
|
"device tree",
|
|
|
|
EFI_FDT_GUID,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"SMBIOS table",
|
|
|
|
SMBIOS_TABLE_GUID,
|
|
|
|
},
|
2020-02-20 03:48:49 +08:00
|
|
|
{
|
|
|
|
"Runtime properties",
|
|
|
|
EFI_RT_PROPERTIES_TABLE_GUID,
|
|
|
|
},
|
2020-11-30 17:47:41 +08:00
|
|
|
{
|
|
|
|
"TCG2 Final Events Table",
|
|
|
|
EFI_TCG2_FINAL_EVENTS_TABLE_GUID,
|
|
|
|
},
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
2020-01-07 13:02:33 +08:00
|
|
|
* get_guid_text - get string of GUID
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
*
|
2020-01-07 13:02:33 +08:00
|
|
|
* Return description of GUID.
|
|
|
|
*
|
|
|
|
* @guid: GUID
|
|
|
|
* Return: description of GUID or NULL
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
*/
|
2020-01-07 13:02:33 +08:00
|
|
|
static const char *get_guid_text(const void *guid)
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
2020-01-07 13:02:33 +08:00
|
|
|
for (i = 0; i < ARRAY_SIZE(guid_list); i++) {
|
|
|
|
/*
|
|
|
|
* As guidcmp uses memcmp() we can safely accept unaligned
|
|
|
|
* GUIDs.
|
|
|
|
*/
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
if (!guidcmp(&guid_list[i].guid, guid))
|
2020-01-07 13:02:33 +08:00
|
|
|
return guid_list[i].text;
|
|
|
|
}
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
|
2020-01-07 13:02:33 +08:00
|
|
|
return NULL;
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* do_efi_show_handles() - show UEFI handles
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "dh" sub-command.
|
|
|
|
* Show all UEFI handles and their information, currently all protocols
|
|
|
|
* added to handle.
|
|
|
|
*/
|
2020-05-11 01:40:03 +08:00
|
|
|
static int do_efi_show_handles(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char *const argv[])
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
{
|
|
|
|
efi_handle_t *handles;
|
|
|
|
efi_guid_t **guid;
|
|
|
|
efi_uintn_t num, count, i, j;
|
|
|
|
const char *guid_text;
|
|
|
|
efi_status_t ret;
|
|
|
|
|
2020-05-02 22:08:37 +08:00
|
|
|
ret = EFI_CALL(efi_locate_handle_buffer(ALL_HANDLES, NULL, NULL,
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
&num, &handles));
|
|
|
|
if (ret != EFI_SUCCESS)
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
|
|
|
|
if (!num)
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
|
|
|
|
printf("Handle%.*s Protocols\n", EFI_HANDLE_WIDTH - 6, spc);
|
|
|
|
printf("%.*s ====================\n", EFI_HANDLE_WIDTH, sep);
|
|
|
|
for (i = 0; i < num; i++) {
|
|
|
|
printf("%p", handles[i]);
|
|
|
|
ret = EFI_CALL(BS->protocols_per_handle(handles[i], &guid,
|
|
|
|
&count));
|
|
|
|
if (ret || !count) {
|
|
|
|
putc('\n');
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (j = 0; j < count; j++) {
|
|
|
|
if (j)
|
|
|
|
printf(", ");
|
|
|
|
else
|
|
|
|
putc(' ');
|
|
|
|
|
|
|
|
guid_text = get_guid_text(guid[j]);
|
|
|
|
if (guid_text)
|
|
|
|
puts(guid_text);
|
|
|
|
else
|
|
|
|
printf("%pUl", guid[j]);
|
|
|
|
}
|
|
|
|
putc('\n');
|
|
|
|
}
|
|
|
|
|
2020-05-02 22:08:37 +08:00
|
|
|
efi_free_pool(handles);
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2019-02-25 14:54:42 +08:00
|
|
|
/**
|
|
|
|
* do_efi_show_images() - show UEFI images
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "images" sub-command.
|
|
|
|
* Show all UEFI loaded images and their information.
|
|
|
|
*/
|
2020-05-11 01:40:03 +08:00
|
|
|
static int do_efi_show_images(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char *const argv[])
|
2019-02-25 14:54:42 +08:00
|
|
|
{
|
|
|
|
efi_print_image_infos(NULL);
|
|
|
|
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2019-02-25 14:54:43 +08:00
|
|
|
static const char * const efi_mem_type_string[] = {
|
|
|
|
[EFI_RESERVED_MEMORY_TYPE] = "RESERVED",
|
|
|
|
[EFI_LOADER_CODE] = "LOADER CODE",
|
|
|
|
[EFI_LOADER_DATA] = "LOADER DATA",
|
|
|
|
[EFI_BOOT_SERVICES_CODE] = "BOOT CODE",
|
|
|
|
[EFI_BOOT_SERVICES_DATA] = "BOOT DATA",
|
|
|
|
[EFI_RUNTIME_SERVICES_CODE] = "RUNTIME CODE",
|
|
|
|
[EFI_RUNTIME_SERVICES_DATA] = "RUNTIME DATA",
|
|
|
|
[EFI_CONVENTIONAL_MEMORY] = "CONVENTIONAL",
|
|
|
|
[EFI_UNUSABLE_MEMORY] = "UNUSABLE MEM",
|
|
|
|
[EFI_ACPI_RECLAIM_MEMORY] = "ACPI RECLAIM MEM",
|
|
|
|
[EFI_ACPI_MEMORY_NVS] = "ACPI NVS",
|
|
|
|
[EFI_MMAP_IO] = "IO",
|
|
|
|
[EFI_MMAP_IO_PORT] = "IO PORT",
|
|
|
|
[EFI_PAL_CODE] = "PAL",
|
2020-04-30 02:21:39 +08:00
|
|
|
[EFI_PERSISTENT_MEMORY_TYPE] = "PERSISTENT",
|
2019-02-25 14:54:43 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static const struct efi_mem_attrs {
|
|
|
|
const u64 bit;
|
|
|
|
const char *text;
|
|
|
|
} efi_mem_attrs[] = {
|
|
|
|
{EFI_MEMORY_UC, "UC"},
|
|
|
|
{EFI_MEMORY_UC, "UC"},
|
|
|
|
{EFI_MEMORY_WC, "WC"},
|
|
|
|
{EFI_MEMORY_WT, "WT"},
|
|
|
|
{EFI_MEMORY_WB, "WB"},
|
|
|
|
{EFI_MEMORY_UCE, "UCE"},
|
|
|
|
{EFI_MEMORY_WP, "WP"},
|
|
|
|
{EFI_MEMORY_RP, "RP"},
|
|
|
|
{EFI_MEMORY_XP, "WP"},
|
|
|
|
{EFI_MEMORY_NV, "NV"},
|
|
|
|
{EFI_MEMORY_MORE_RELIABLE, "REL"},
|
|
|
|
{EFI_MEMORY_RO, "RO"},
|
2020-05-19 13:20:46 +08:00
|
|
|
{EFI_MEMORY_SP, "SP"},
|
2019-02-25 14:54:43 +08:00
|
|
|
{EFI_MEMORY_RUNTIME, "RT"},
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* print_memory_attributes() - print memory map attributes
|
2019-07-14 20:00:41 +08:00
|
|
|
*
|
2019-02-25 14:54:43 +08:00
|
|
|
* @attributes: Attribute value
|
|
|
|
*
|
|
|
|
* Print memory map attributes
|
|
|
|
*/
|
|
|
|
static void print_memory_attributes(u64 attributes)
|
|
|
|
{
|
|
|
|
int sep, i;
|
|
|
|
|
|
|
|
for (sep = 0, i = 0; i < ARRAY_SIZE(efi_mem_attrs); i++)
|
|
|
|
if (attributes & efi_mem_attrs[i].bit) {
|
|
|
|
if (sep) {
|
|
|
|
putc('|');
|
|
|
|
} else {
|
|
|
|
putc(' ');
|
|
|
|
sep = 1;
|
|
|
|
}
|
|
|
|
puts(efi_mem_attrs[i].text);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#define EFI_PHYS_ADDR_WIDTH (int)(sizeof(efi_physical_addr_t) * 2)
|
|
|
|
|
|
|
|
/**
|
|
|
|
* do_efi_show_memmap() - show UEFI memory map
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "memmap" sub-command.
|
|
|
|
* Show UEFI memory map.
|
|
|
|
*/
|
2020-05-11 01:40:03 +08:00
|
|
|
static int do_efi_show_memmap(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char *const argv[])
|
2019-02-25 14:54:43 +08:00
|
|
|
{
|
|
|
|
struct efi_mem_desc *memmap = NULL, *map;
|
|
|
|
efi_uintn_t map_size = 0;
|
|
|
|
const char *type;
|
|
|
|
int i;
|
|
|
|
efi_status_t ret;
|
|
|
|
|
2020-05-02 22:08:37 +08:00
|
|
|
ret = efi_get_memory_map(&map_size, memmap, NULL, NULL, NULL);
|
2019-02-25 14:54:43 +08:00
|
|
|
if (ret == EFI_BUFFER_TOO_SMALL) {
|
|
|
|
map_size += sizeof(struct efi_mem_desc); /* for my own */
|
2020-05-02 22:08:37 +08:00
|
|
|
ret = efi_allocate_pool(EFI_LOADER_DATA, map_size,
|
|
|
|
(void *)&memmap);
|
2019-02-25 14:54:43 +08:00
|
|
|
if (ret != EFI_SUCCESS)
|
|
|
|
return CMD_RET_FAILURE;
|
2020-05-02 22:08:37 +08:00
|
|
|
ret = efi_get_memory_map(&map_size, memmap, NULL, NULL, NULL);
|
2019-02-25 14:54:43 +08:00
|
|
|
}
|
|
|
|
if (ret != EFI_SUCCESS) {
|
2020-05-02 22:08:37 +08:00
|
|
|
efi_free_pool(memmap);
|
2019-02-25 14:54:43 +08:00
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("Type Start%.*s End%.*s Attributes\n",
|
|
|
|
EFI_PHYS_ADDR_WIDTH - 5, spc, EFI_PHYS_ADDR_WIDTH - 3, spc);
|
|
|
|
printf("================ %.*s %.*s ==========\n",
|
|
|
|
EFI_PHYS_ADDR_WIDTH, sep, EFI_PHYS_ADDR_WIDTH, sep);
|
2020-05-08 13:50:18 +08:00
|
|
|
/*
|
|
|
|
* Coverity check: dereferencing null pointer "map."
|
|
|
|
* This is a false positive as memmap will always be
|
|
|
|
* populated by allocate_pool() above.
|
|
|
|
*/
|
2019-02-25 14:54:43 +08:00
|
|
|
for (i = 0, map = memmap; i < map_size / sizeof(*map); map++, i++) {
|
2020-04-30 02:21:39 +08:00
|
|
|
if (map->type < ARRAY_SIZE(efi_mem_type_string))
|
2019-02-25 14:54:43 +08:00
|
|
|
type = efi_mem_type_string[map->type];
|
|
|
|
else
|
|
|
|
type = "(unknown)";
|
|
|
|
|
|
|
|
printf("%-16s %.*llx-%.*llx", type,
|
|
|
|
EFI_PHYS_ADDR_WIDTH,
|
2020-03-27 12:33:17 +08:00
|
|
|
(u64)map_to_sysmem((void *)(uintptr_t)
|
|
|
|
map->physical_start),
|
2019-02-25 14:54:43 +08:00
|
|
|
EFI_PHYS_ADDR_WIDTH,
|
2020-03-27 12:33:17 +08:00
|
|
|
(u64)map_to_sysmem((void *)(uintptr_t)
|
|
|
|
(map->physical_start +
|
|
|
|
map->num_pages * EFI_PAGE_SIZE)));
|
2019-02-25 14:54:43 +08:00
|
|
|
|
|
|
|
print_memory_attributes(map->attribute);
|
|
|
|
putc('\n');
|
|
|
|
}
|
|
|
|
|
2020-05-02 22:08:37 +08:00
|
|
|
efi_free_pool(memmap);
|
2019-02-25 14:54:43 +08:00
|
|
|
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2020-01-07 12:57:47 +08:00
|
|
|
/**
|
|
|
|
* do_efi_show_tables() - show UEFI configuration tables
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "tables" sub-command.
|
|
|
|
* Show UEFI configuration tables.
|
|
|
|
*/
|
2020-05-11 01:40:03 +08:00
|
|
|
static int do_efi_show_tables(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char *const argv[])
|
2020-01-07 12:57:47 +08:00
|
|
|
{
|
|
|
|
efi_uintn_t i;
|
|
|
|
const char *guid_str;
|
|
|
|
|
|
|
|
for (i = 0; i < systab.nr_tables; ++i) {
|
|
|
|
guid_str = get_guid_text(&systab.tables[i].guid);
|
|
|
|
if (!guid_str)
|
|
|
|
guid_str = "";
|
|
|
|
printf("%pUl %s\n", &systab.tables[i].guid, guid_str);
|
|
|
|
}
|
|
|
|
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2021-03-18 03:55:01 +08:00
|
|
|
/**
|
|
|
|
* create_initrd_dp() - Create a special device for our Boot### option
|
|
|
|
*
|
|
|
|
* @dev: Device
|
|
|
|
* @part: Disk partition
|
|
|
|
* @file: Filename
|
|
|
|
* Return: Pointer to the device path or ERR_PTR
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static
|
|
|
|
struct efi_device_path *create_initrd_dp(const char *dev, const char *part,
|
|
|
|
const char *file)
|
|
|
|
|
|
|
|
{
|
|
|
|
struct efi_device_path *tmp_dp = NULL, *tmp_fp = NULL;
|
|
|
|
struct efi_device_path *initrd_dp = NULL;
|
|
|
|
efi_status_t ret;
|
|
|
|
const struct efi_initrd_dp id_dp = {
|
|
|
|
.vendor = {
|
|
|
|
{
|
|
|
|
DEVICE_PATH_TYPE_MEDIA_DEVICE,
|
|
|
|
DEVICE_PATH_SUB_TYPE_VENDOR_PATH,
|
|
|
|
sizeof(id_dp.vendor),
|
|
|
|
},
|
|
|
|
EFI_INITRD_MEDIA_GUID,
|
|
|
|
},
|
|
|
|
.end = {
|
|
|
|
DEVICE_PATH_TYPE_END,
|
|
|
|
DEVICE_PATH_SUB_TYPE_END,
|
|
|
|
sizeof(id_dp.end),
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
ret = efi_dp_from_name(dev, part, file, &tmp_dp, &tmp_fp);
|
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
printf("Cannot create device path for \"%s %s\"\n", part, file);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
initrd_dp = efi_dp_append((const struct efi_device_path *)&id_dp,
|
|
|
|
tmp_fp);
|
|
|
|
|
|
|
|
out:
|
|
|
|
efi_free_pool(tmp_dp);
|
|
|
|
efi_free_pool(tmp_fp);
|
|
|
|
return initrd_dp;
|
|
|
|
}
|
|
|
|
|
2019-02-25 14:54:38 +08:00
|
|
|
/**
|
|
|
|
* do_efi_boot_add() - set UEFI load option
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success,
|
|
|
|
* CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
2019-07-14 20:00:41 +08:00
|
|
|
* Implement efidebug "boot add" sub-command. Create or change UEFI load option.
|
|
|
|
*
|
2021-03-18 03:55:01 +08:00
|
|
|
* efidebug boot add -b <id> <label> <interface> <devnum>[:<part>] <file>
|
|
|
|
* -i <file> <interface2> <devnum2>[:<part>] <initrd>
|
|
|
|
* -s '<options>'
|
2019-02-25 14:54:38 +08:00
|
|
|
*/
|
2020-05-11 01:40:03 +08:00
|
|
|
static int do_efi_boot_add(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char *const argv[])
|
2019-02-25 14:54:38 +08:00
|
|
|
{
|
|
|
|
int id;
|
|
|
|
char *endp;
|
2021-05-24 16:57:03 +08:00
|
|
|
u16 var_name16[9];
|
2019-02-25 14:54:38 +08:00
|
|
|
efi_guid_t guid;
|
|
|
|
size_t label_len, label_len16;
|
|
|
|
u16 *label;
|
|
|
|
struct efi_device_path *device_path = NULL, *file_path = NULL;
|
2021-03-18 03:55:01 +08:00
|
|
|
struct efi_device_path *final_fp = NULL;
|
|
|
|
struct efi_device_path *initrd_dp = NULL;
|
2019-02-25 14:54:38 +08:00
|
|
|
struct efi_load_option lo;
|
|
|
|
void *data = NULL;
|
|
|
|
efi_uintn_t size;
|
2021-03-18 03:55:01 +08:00
|
|
|
efi_uintn_t fp_size = 0;
|
2019-06-20 18:48:04 +08:00
|
|
|
efi_status_t ret;
|
2019-06-20 18:59:45 +08:00
|
|
|
int r = CMD_RET_SUCCESS;
|
2019-02-25 14:54:38 +08:00
|
|
|
|
|
|
|
guid = efi_global_variable_guid;
|
|
|
|
|
|
|
|
/* attributes */
|
|
|
|
lo.attributes = LOAD_OPTION_ACTIVE; /* always ACTIVE */
|
2021-03-18 03:55:01 +08:00
|
|
|
lo.optional_data = NULL;
|
|
|
|
lo.label = NULL;
|
2019-02-25 14:54:38 +08:00
|
|
|
|
2021-03-18 03:55:01 +08:00
|
|
|
argc--;
|
|
|
|
argv++; /* 'add' */
|
|
|
|
for (; argc > 0; argc--, argv++) {
|
|
|
|
if (!strcmp(argv[0], "-b")) {
|
|
|
|
if (argc < 5 || lo.label) {
|
|
|
|
r = CMD_RET_USAGE;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
id = (int)simple_strtoul(argv[1], &endp, 16);
|
|
|
|
if (*endp != '\0' || id > 0xffff)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
2021-05-24 16:57:03 +08:00
|
|
|
efi_create_indexed_name(var_name16, sizeof(var_name16),
|
|
|
|
"Boot", id);
|
2021-03-18 03:55:01 +08:00
|
|
|
|
|
|
|
/* label */
|
|
|
|
label_len = strlen(argv[2]);
|
|
|
|
label_len16 = utf8_utf16_strnlen(argv[2], label_len);
|
|
|
|
label = malloc((label_len16 + 1) * sizeof(u16));
|
|
|
|
if (!label)
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
lo.label = label; /* label will be changed below */
|
|
|
|
utf8_utf16_strncpy(&label, argv[2], label_len);
|
|
|
|
|
|
|
|
/* file path */
|
|
|
|
ret = efi_dp_from_name(argv[3], argv[4], argv[5],
|
|
|
|
&device_path, &file_path);
|
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
printf("Cannot create device path for \"%s %s\"\n",
|
|
|
|
argv[3], argv[4]);
|
|
|
|
r = CMD_RET_FAILURE;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
fp_size += efi_dp_size(file_path) +
|
|
|
|
sizeof(struct efi_device_path);
|
|
|
|
argc -= 5;
|
|
|
|
argv += 5;
|
|
|
|
} else if (!strcmp(argv[0], "-i")) {
|
|
|
|
if (argc < 3 || initrd_dp) {
|
|
|
|
r = CMD_RET_USAGE;
|
|
|
|
goto out;
|
|
|
|
}
|
2019-02-25 14:54:38 +08:00
|
|
|
|
2021-03-18 03:55:01 +08:00
|
|
|
initrd_dp = create_initrd_dp(argv[1], argv[2], argv[3]);
|
|
|
|
if (!initrd_dp) {
|
|
|
|
printf("Cannot add an initrd\n");
|
|
|
|
r = CMD_RET_FAILURE;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
argc -= 3;
|
|
|
|
argv += 3;
|
|
|
|
fp_size += efi_dp_size(initrd_dp) +
|
|
|
|
sizeof(struct efi_device_path);
|
|
|
|
} else if (!strcmp(argv[0], "-s")) {
|
|
|
|
if (argc < 1 || lo.optional_data) {
|
|
|
|
r = CMD_RET_USAGE;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
lo.optional_data = (const u8 *)argv[1];
|
|
|
|
argc -= 1;
|
|
|
|
argv += 1;
|
|
|
|
} else {
|
|
|
|
r = CMD_RET_USAGE;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!file_path) {
|
|
|
|
printf("Missing binary\n");
|
|
|
|
r = CMD_RET_USAGE;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
final_fp = efi_dp_concat(file_path, initrd_dp);
|
|
|
|
if (!final_fp) {
|
|
|
|
printf("Cannot create final device path\n");
|
2019-06-20 18:48:04 +08:00
|
|
|
r = CMD_RET_FAILURE;
|
2019-02-25 14:54:38 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2021-03-18 03:55:01 +08:00
|
|
|
lo.file_path = final_fp;
|
|
|
|
lo.file_path_length = fp_size;
|
2019-02-25 14:54:38 +08:00
|
|
|
|
|
|
|
size = efi_serialize_load_option(&lo, (u8 **)&data);
|
|
|
|
if (!size) {
|
2019-06-20 18:48:04 +08:00
|
|
|
r = CMD_RET_FAILURE;
|
2019-02-25 14:54:38 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2020-05-02 22:08:37 +08:00
|
|
|
ret = EFI_CALL(efi_set_variable(var_name16, &guid,
|
2019-06-04 14:52:10 +08:00
|
|
|
EFI_VARIABLE_NON_VOLATILE |
|
2019-02-25 14:54:38 +08:00
|
|
|
EFI_VARIABLE_BOOTSERVICE_ACCESS |
|
|
|
|
EFI_VARIABLE_RUNTIME_ACCESS,
|
|
|
|
size, data));
|
2019-06-20 18:59:45 +08:00
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
printf("Cannot set %ls\n", var_name16);
|
|
|
|
r = CMD_RET_FAILURE;
|
|
|
|
}
|
2021-03-18 03:55:01 +08:00
|
|
|
|
2019-02-25 14:54:38 +08:00
|
|
|
out:
|
|
|
|
free(data);
|
2021-03-18 03:55:01 +08:00
|
|
|
efi_free_pool(final_fp);
|
|
|
|
efi_free_pool(initrd_dp);
|
2019-02-25 14:54:38 +08:00
|
|
|
efi_free_pool(device_path);
|
|
|
|
efi_free_pool(file_path);
|
|
|
|
free(lo.label);
|
|
|
|
|
2019-06-20 18:48:04 +08:00
|
|
|
return r;
|
2019-02-25 14:54:38 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* do_efi_boot_rm() - delete UEFI load options
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "boot rm" sub-command.
|
|
|
|
* Delete UEFI load options.
|
2019-07-14 20:00:41 +08:00
|
|
|
*
|
|
|
|
* efidebug boot rm <id> ...
|
2019-02-25 14:54:38 +08:00
|
|
|
*/
|
2020-05-11 01:40:03 +08:00
|
|
|
static int do_efi_boot_rm(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char *const argv[])
|
2019-02-25 14:54:38 +08:00
|
|
|
{
|
|
|
|
efi_guid_t guid;
|
|
|
|
int id, i;
|
|
|
|
char *endp;
|
2021-05-24 16:57:03 +08:00
|
|
|
u16 var_name16[9];
|
2019-02-25 14:54:38 +08:00
|
|
|
efi_status_t ret;
|
|
|
|
|
|
|
|
if (argc == 1)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
|
|
|
guid = efi_global_variable_guid;
|
|
|
|
for (i = 1; i < argc; i++, argv++) {
|
|
|
|
id = (int)simple_strtoul(argv[1], &endp, 16);
|
|
|
|
if (*endp != '\0' || id > 0xffff)
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
|
2021-05-24 16:57:03 +08:00
|
|
|
efi_create_indexed_name(var_name16, sizeof(var_name16),
|
|
|
|
"Boot", id);
|
2020-05-02 22:08:37 +08:00
|
|
|
ret = EFI_CALL(efi_set_variable(var_name16, &guid, 0, 0, NULL));
|
2019-02-25 14:54:38 +08:00
|
|
|
if (ret) {
|
2020-03-03 03:13:10 +08:00
|
|
|
printf("Cannot remove %ls\n", var_name16);
|
2019-02-25 14:54:38 +08:00
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* show_efi_boot_opt_data() - dump UEFI load option
|
|
|
|
*
|
2020-04-30 01:20:35 +08:00
|
|
|
* @varname16: variable name
|
2019-04-29 19:51:45 +08:00
|
|
|
* @data: value of UEFI load option variable
|
|
|
|
* @size: size of the boot option
|
2019-02-25 14:54:38 +08:00
|
|
|
*
|
|
|
|
* Decode the value of UEFI load option variable and print information.
|
|
|
|
*/
|
2020-06-01 04:46:09 +08:00
|
|
|
static void show_efi_boot_opt_data(u16 *varname16, void *data, size_t *size)
|
2019-02-25 14:54:38 +08:00
|
|
|
{
|
2021-03-18 03:55:01 +08:00
|
|
|
struct efi_device_path *initrd_path = NULL;
|
2019-02-25 14:54:38 +08:00
|
|
|
struct efi_load_option lo;
|
|
|
|
u16 *dp_str;
|
2020-06-01 04:46:09 +08:00
|
|
|
efi_status_t ret;
|
2021-03-18 03:55:01 +08:00
|
|
|
efi_uintn_t initrd_dp_size;
|
|
|
|
const efi_guid_t lf2_initrd_guid = EFI_INITRD_MEDIA_GUID;
|
2019-02-25 14:54:38 +08:00
|
|
|
|
2020-06-01 04:46:09 +08:00
|
|
|
ret = efi_deserialize_load_option(&lo, data, size);
|
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
printf("%ls: invalid load option\n", varname16);
|
|
|
|
return;
|
|
|
|
}
|
2019-02-25 14:54:38 +08:00
|
|
|
|
2020-04-30 01:20:35 +08:00
|
|
|
printf("%ls:\nattributes: %c%c%c (0x%08x)\n",
|
|
|
|
varname16,
|
2019-02-25 14:54:38 +08:00
|
|
|
/* ACTIVE */
|
|
|
|
lo.attributes & LOAD_OPTION_ACTIVE ? 'A' : '-',
|
|
|
|
/* FORCE RECONNECT */
|
|
|
|
lo.attributes & LOAD_OPTION_FORCE_RECONNECT ? 'R' : '-',
|
|
|
|
/* HIDDEN */
|
|
|
|
lo.attributes & LOAD_OPTION_HIDDEN ? 'H' : '-',
|
|
|
|
lo.attributes);
|
2021-05-24 16:35:25 +08:00
|
|
|
printf(" label: %ls\n", lo.label);
|
2019-02-25 14:54:38 +08:00
|
|
|
|
|
|
|
dp_str = efi_dp_str(lo.file_path);
|
2019-04-29 19:51:45 +08:00
|
|
|
printf(" file_path: %ls\n", dp_str);
|
2019-02-25 14:54:38 +08:00
|
|
|
efi_free_pool(dp_str);
|
|
|
|
|
2021-03-18 03:55:01 +08:00
|
|
|
initrd_path = efi_dp_from_lo(&lo, &initrd_dp_size, lf2_initrd_guid);
|
|
|
|
if (initrd_path) {
|
|
|
|
dp_str = efi_dp_str(initrd_path);
|
|
|
|
printf(" initrd_path: %ls\n", dp_str);
|
|
|
|
efi_free_pool(dp_str);
|
|
|
|
efi_free_pool(initrd_path);
|
|
|
|
}
|
|
|
|
|
2019-04-29 19:51:45 +08:00
|
|
|
printf(" data:\n");
|
|
|
|
print_hex_dump(" ", DUMP_PREFIX_OFFSET, 16, 1,
|
2020-06-01 04:46:09 +08:00
|
|
|
lo.optional_data, *size, true);
|
2019-02-25 14:54:38 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* show_efi_boot_opt() - dump UEFI load option
|
|
|
|
*
|
2020-04-30 01:20:35 +08:00
|
|
|
* @varname16: variable name
|
2019-02-25 14:54:38 +08:00
|
|
|
*
|
|
|
|
* Dump information defined by UEFI load option.
|
|
|
|
*/
|
2020-04-30 01:20:35 +08:00
|
|
|
static void show_efi_boot_opt(u16 *varname16)
|
2019-02-25 14:54:38 +08:00
|
|
|
{
|
2020-04-30 01:20:35 +08:00
|
|
|
void *data;
|
2019-02-25 14:54:38 +08:00
|
|
|
efi_uintn_t size;
|
2019-11-26 09:11:22 +08:00
|
|
|
efi_status_t ret;
|
2019-02-25 14:54:38 +08:00
|
|
|
|
|
|
|
size = 0;
|
2020-04-30 01:20:35 +08:00
|
|
|
ret = EFI_CALL(efi_get_variable(varname16, &efi_global_variable_guid,
|
|
|
|
NULL, &size, NULL));
|
2019-11-26 09:11:22 +08:00
|
|
|
if (ret == EFI_BUFFER_TOO_SMALL) {
|
2019-02-25 14:54:38 +08:00
|
|
|
data = malloc(size);
|
2020-04-30 01:20:35 +08:00
|
|
|
if (!data) {
|
|
|
|
printf("ERROR: Out of memory\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
ret = EFI_CALL(efi_get_variable(varname16,
|
|
|
|
&efi_global_variable_guid,
|
|
|
|
NULL, &size, data));
|
|
|
|
if (ret == EFI_SUCCESS)
|
2020-06-01 04:46:09 +08:00
|
|
|
show_efi_boot_opt_data(varname16, data, &size);
|
2020-04-30 01:20:35 +08:00
|
|
|
free(data);
|
2019-02-25 14:54:38 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-26 08:44:18 +08:00
|
|
|
static int u16_tohex(u16 c)
|
|
|
|
{
|
|
|
|
if (c >= '0' && c <= '9')
|
|
|
|
return c - '0';
|
|
|
|
if (c >= 'A' && c <= 'F')
|
|
|
|
return c - 'A' + 10;
|
|
|
|
|
|
|
|
/* not hexadecimal */
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2019-02-25 14:54:38 +08:00
|
|
|
/**
|
|
|
|
* show_efi_boot_dump() - dump all UEFI load options
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "boot dump" sub-command.
|
|
|
|
* Dump information of all UEFI load options defined.
|
2019-07-26 02:52:23 +08:00
|
|
|
*
|
|
|
|
* efidebug boot dump
|
2019-02-25 14:54:38 +08:00
|
|
|
*/
|
2020-05-11 01:40:03 +08:00
|
|
|
static int do_efi_boot_dump(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char *const argv[])
|
2019-02-25 14:54:38 +08:00
|
|
|
{
|
2019-04-26 08:44:18 +08:00
|
|
|
u16 *var_name16, *p;
|
|
|
|
efi_uintn_t buf_size, size;
|
|
|
|
efi_guid_t guid;
|
|
|
|
int id, i, digit;
|
|
|
|
efi_status_t ret;
|
2019-02-25 14:54:38 +08:00
|
|
|
|
|
|
|
if (argc > 1)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
2019-04-26 08:44:18 +08:00
|
|
|
buf_size = 128;
|
|
|
|
var_name16 = malloc(buf_size);
|
|
|
|
if (!var_name16)
|
2019-02-25 14:54:38 +08:00
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
|
2019-04-26 08:44:18 +08:00
|
|
|
var_name16[0] = 0;
|
|
|
|
for (;;) {
|
|
|
|
size = buf_size;
|
|
|
|
ret = EFI_CALL(efi_get_next_variable_name(&size, var_name16,
|
|
|
|
&guid));
|
|
|
|
if (ret == EFI_NOT_FOUND)
|
2019-02-25 14:54:38 +08:00
|
|
|
break;
|
2019-04-26 08:44:18 +08:00
|
|
|
if (ret == EFI_BUFFER_TOO_SMALL) {
|
|
|
|
buf_size = size;
|
|
|
|
p = realloc(var_name16, buf_size);
|
|
|
|
if (!p) {
|
|
|
|
free(var_name16);
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
}
|
|
|
|
var_name16 = p;
|
|
|
|
ret = EFI_CALL(efi_get_next_variable_name(&size,
|
|
|
|
var_name16,
|
|
|
|
&guid));
|
|
|
|
}
|
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
free(var_name16);
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (memcmp(var_name16, L"Boot", 8))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
for (id = 0, i = 0; i < 4; i++) {
|
|
|
|
digit = u16_tohex(var_name16[4 + i]);
|
|
|
|
if (digit < 0)
|
|
|
|
break;
|
|
|
|
id = (id << 4) + digit;
|
|
|
|
}
|
|
|
|
if (i == 4 && !var_name16[8])
|
2020-04-30 01:20:35 +08:00
|
|
|
show_efi_boot_opt(var_name16);
|
2019-02-25 14:54:38 +08:00
|
|
|
}
|
2019-04-26 08:44:18 +08:00
|
|
|
|
|
|
|
free(var_name16);
|
2019-02-25 14:54:38 +08:00
|
|
|
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* show_efi_boot_order() - show order of UEFI load options
|
|
|
|
*
|
|
|
|
* Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Show order of UEFI load options defined by BootOrder variable.
|
|
|
|
*/
|
|
|
|
static int show_efi_boot_order(void)
|
|
|
|
{
|
2020-04-30 03:15:08 +08:00
|
|
|
u16 *bootorder;
|
2019-02-25 14:54:38 +08:00
|
|
|
efi_uintn_t size;
|
|
|
|
int num, i;
|
2021-05-24 16:57:03 +08:00
|
|
|
u16 var_name16[9];
|
2019-02-25 14:54:38 +08:00
|
|
|
void *data;
|
|
|
|
struct efi_load_option lo;
|
|
|
|
efi_status_t ret;
|
|
|
|
|
|
|
|
size = 0;
|
2020-05-02 22:08:37 +08:00
|
|
|
ret = EFI_CALL(efi_get_variable(L"BootOrder", &efi_global_variable_guid,
|
2020-04-30 03:15:08 +08:00
|
|
|
NULL, &size, NULL));
|
|
|
|
if (ret != EFI_BUFFER_TOO_SMALL) {
|
|
|
|
if (ret == EFI_NOT_FOUND) {
|
|
|
|
printf("BootOrder not defined\n");
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
} else {
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
}
|
2019-02-25 14:54:38 +08:00
|
|
|
}
|
2020-04-30 03:15:08 +08:00
|
|
|
bootorder = malloc(size);
|
|
|
|
if (!bootorder) {
|
|
|
|
printf("ERROR: Out of memory\n");
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
}
|
|
|
|
ret = EFI_CALL(efi_get_variable(L"BootOrder", &efi_global_variable_guid,
|
|
|
|
NULL, &size, bootorder));
|
|
|
|
if (ret != EFI_SUCCESS) {
|
2019-02-25 14:54:38 +08:00
|
|
|
ret = CMD_RET_FAILURE;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
num = size / sizeof(u16);
|
|
|
|
for (i = 0; i < num; i++) {
|
2021-05-24 16:57:03 +08:00
|
|
|
efi_create_indexed_name(var_name16, sizeof(var_name16),
|
|
|
|
"Boot", i);
|
2019-02-25 14:54:38 +08:00
|
|
|
|
|
|
|
size = 0;
|
2020-04-30 03:15:08 +08:00
|
|
|
ret = EFI_CALL(efi_get_variable(var_name16,
|
|
|
|
&efi_global_variable_guid, NULL,
|
|
|
|
&size, NULL));
|
2019-02-25 14:54:38 +08:00
|
|
|
if (ret != EFI_BUFFER_TOO_SMALL) {
|
2021-05-24 16:57:03 +08:00
|
|
|
printf("%2d: %ls: (not defined)\n", i + 1, var_name16);
|
2019-02-25 14:54:38 +08:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
data = malloc(size);
|
|
|
|
if (!data) {
|
|
|
|
ret = CMD_RET_FAILURE;
|
|
|
|
goto out;
|
|
|
|
}
|
2020-04-30 03:15:08 +08:00
|
|
|
ret = EFI_CALL(efi_get_variable(var_name16,
|
|
|
|
&efi_global_variable_guid, NULL,
|
|
|
|
&size, data));
|
2019-02-25 14:54:38 +08:00
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
free(data);
|
|
|
|
ret = CMD_RET_FAILURE;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2020-06-01 04:46:09 +08:00
|
|
|
ret = efi_deserialize_load_option(&lo, data, &size);
|
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
printf("%ls: invalid load option\n", var_name16);
|
|
|
|
ret = CMD_RET_FAILURE;
|
|
|
|
goto out;
|
|
|
|
}
|
2019-02-25 14:54:38 +08:00
|
|
|
|
2021-05-24 16:57:03 +08:00
|
|
|
printf("%2d: %ls: %ls\n", i + 1, var_name16, lo.label);
|
2019-02-25 14:54:38 +08:00
|
|
|
|
|
|
|
free(data);
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
free(bootorder);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* do_efi_boot_next() - manage UEFI BootNext variable
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success,
|
|
|
|
* CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "boot next" sub-command.
|
|
|
|
* Set BootNext variable.
|
2019-07-14 20:00:41 +08:00
|
|
|
*
|
|
|
|
* efidebug boot next <id>
|
2019-02-25 14:54:38 +08:00
|
|
|
*/
|
2020-05-11 01:40:03 +08:00
|
|
|
static int do_efi_boot_next(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char *const argv[])
|
2019-02-25 14:54:38 +08:00
|
|
|
{
|
|
|
|
u16 bootnext;
|
|
|
|
efi_uintn_t size;
|
|
|
|
char *endp;
|
|
|
|
efi_guid_t guid;
|
|
|
|
efi_status_t ret;
|
2019-06-20 18:59:45 +08:00
|
|
|
int r = CMD_RET_SUCCESS;
|
2019-02-25 14:54:38 +08:00
|
|
|
|
|
|
|
if (argc != 2)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
|
|
|
bootnext = (u16)simple_strtoul(argv[1], &endp, 16);
|
2020-05-09 23:59:19 +08:00
|
|
|
if (*endp) {
|
2019-02-25 14:54:38 +08:00
|
|
|
printf("invalid value: %s\n", argv[1]);
|
2019-06-20 18:48:04 +08:00
|
|
|
r = CMD_RET_FAILURE;
|
2019-02-25 14:54:38 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
guid = efi_global_variable_guid;
|
|
|
|
size = sizeof(u16);
|
2020-05-02 22:08:37 +08:00
|
|
|
ret = EFI_CALL(efi_set_variable(L"BootNext", &guid,
|
2019-06-04 14:52:10 +08:00
|
|
|
EFI_VARIABLE_NON_VOLATILE |
|
2019-02-25 14:54:38 +08:00
|
|
|
EFI_VARIABLE_BOOTSERVICE_ACCESS |
|
|
|
|
EFI_VARIABLE_RUNTIME_ACCESS,
|
|
|
|
size, &bootnext));
|
2019-06-20 18:59:45 +08:00
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
printf("Cannot set BootNext\n");
|
|
|
|
r = CMD_RET_FAILURE;
|
|
|
|
}
|
2019-02-25 14:54:38 +08:00
|
|
|
out:
|
2019-06-20 18:48:04 +08:00
|
|
|
return r;
|
2019-02-25 14:54:38 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* do_efi_boot_order() - manage UEFI BootOrder variable
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success, CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "boot order" sub-command.
|
|
|
|
* Show order of UEFI load options, or change it in BootOrder variable.
|
2019-07-14 20:00:41 +08:00
|
|
|
*
|
|
|
|
* efidebug boot order [<id> ...]
|
2019-02-25 14:54:38 +08:00
|
|
|
*/
|
2020-05-11 01:40:03 +08:00
|
|
|
static int do_efi_boot_order(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char *const argv[])
|
2019-02-25 14:54:38 +08:00
|
|
|
{
|
|
|
|
u16 *bootorder = NULL;
|
|
|
|
efi_uintn_t size;
|
|
|
|
int id, i;
|
|
|
|
char *endp;
|
|
|
|
efi_guid_t guid;
|
|
|
|
efi_status_t ret;
|
2019-06-20 18:59:45 +08:00
|
|
|
int r = CMD_RET_SUCCESS;
|
2019-02-25 14:54:38 +08:00
|
|
|
|
|
|
|
if (argc == 1)
|
|
|
|
return show_efi_boot_order();
|
|
|
|
|
|
|
|
argc--;
|
|
|
|
argv++;
|
|
|
|
|
|
|
|
size = argc * sizeof(u16);
|
|
|
|
bootorder = malloc(size);
|
|
|
|
if (!bootorder)
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
|
|
|
|
for (i = 0; i < argc; i++) {
|
|
|
|
id = (int)simple_strtoul(argv[i], &endp, 16);
|
|
|
|
if (*endp != '\0' || id > 0xffff) {
|
|
|
|
printf("invalid value: %s\n", argv[i]);
|
2019-06-20 18:48:04 +08:00
|
|
|
r = CMD_RET_FAILURE;
|
2019-02-25 14:54:38 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
bootorder[i] = (u16)id;
|
|
|
|
}
|
|
|
|
|
|
|
|
guid = efi_global_variable_guid;
|
2020-05-02 22:08:37 +08:00
|
|
|
ret = EFI_CALL(efi_set_variable(L"BootOrder", &guid,
|
2019-06-04 14:52:10 +08:00
|
|
|
EFI_VARIABLE_NON_VOLATILE |
|
2019-02-25 14:54:38 +08:00
|
|
|
EFI_VARIABLE_BOOTSERVICE_ACCESS |
|
|
|
|
EFI_VARIABLE_RUNTIME_ACCESS,
|
|
|
|
size, bootorder));
|
2019-06-20 18:59:45 +08:00
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
printf("Cannot set BootOrder\n");
|
|
|
|
r = CMD_RET_FAILURE;
|
|
|
|
}
|
2019-02-25 14:54:38 +08:00
|
|
|
out:
|
|
|
|
free(bootorder);
|
|
|
|
|
2019-06-20 18:48:04 +08:00
|
|
|
return r;
|
2019-02-25 14:54:38 +08:00
|
|
|
}
|
|
|
|
|
2020-05-11 01:40:03 +08:00
|
|
|
static struct cmd_tbl cmd_efidebug_boot_sub[] = {
|
2019-02-25 14:54:38 +08:00
|
|
|
U_BOOT_CMD_MKENT(add, CONFIG_SYS_MAXARGS, 1, do_efi_boot_add, "", ""),
|
|
|
|
U_BOOT_CMD_MKENT(rm, CONFIG_SYS_MAXARGS, 1, do_efi_boot_rm, "", ""),
|
|
|
|
U_BOOT_CMD_MKENT(dump, CONFIG_SYS_MAXARGS, 1, do_efi_boot_dump, "", ""),
|
|
|
|
U_BOOT_CMD_MKENT(next, CONFIG_SYS_MAXARGS, 1, do_efi_boot_next, "", ""),
|
|
|
|
U_BOOT_CMD_MKENT(order, CONFIG_SYS_MAXARGS, 1, do_efi_boot_order,
|
|
|
|
"", ""),
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* do_efi_boot_opt() - manage UEFI load options
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success,
|
|
|
|
* CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "boot" sub-command.
|
|
|
|
*/
|
2020-05-11 01:40:03 +08:00
|
|
|
static int do_efi_boot_opt(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char *const argv[])
|
2019-02-25 14:54:38 +08:00
|
|
|
{
|
2020-05-11 01:40:03 +08:00
|
|
|
struct cmd_tbl *cp;
|
2019-02-25 14:54:38 +08:00
|
|
|
|
|
|
|
if (argc < 2)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
|
|
|
argc--; argv++;
|
|
|
|
|
|
|
|
cp = find_cmd_tbl(argv[0], cmd_efidebug_boot_sub,
|
|
|
|
ARRAY_SIZE(cmd_efidebug_boot_sub));
|
|
|
|
if (!cp)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
|
|
|
return cp->cmd(cmdtp, flag, argc, argv);
|
|
|
|
}
|
|
|
|
|
2020-04-14 10:51:48 +08:00
|
|
|
/**
|
|
|
|
* do_efi_test_bootmgr() - run simple bootmgr for test
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success,
|
|
|
|
* CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "test bootmgr" sub-command.
|
|
|
|
* Run simple bootmgr for test.
|
|
|
|
*
|
|
|
|
* efidebug test bootmgr
|
|
|
|
*/
|
2021-01-16 02:02:50 +08:00
|
|
|
static __maybe_unused int do_efi_test_bootmgr(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char * const argv[])
|
2020-04-14 10:51:48 +08:00
|
|
|
{
|
|
|
|
efi_handle_t image;
|
|
|
|
efi_uintn_t exit_data_size = 0;
|
|
|
|
u16 *exit_data = NULL;
|
|
|
|
efi_status_t ret;
|
2020-08-12 00:20:50 +08:00
|
|
|
void *load_options = NULL;
|
2020-04-14 10:51:48 +08:00
|
|
|
|
2020-08-07 23:49:39 +08:00
|
|
|
ret = efi_bootmgr_load(&image, &load_options);
|
2020-04-14 10:51:48 +08:00
|
|
|
printf("efi_bootmgr_load() returned: %ld\n", ret & ~EFI_ERROR_MASK);
|
|
|
|
|
|
|
|
/* We call efi_start_image() even if error for test purpose. */
|
|
|
|
ret = EFI_CALL(efi_start_image(image, &exit_data_size, &exit_data));
|
|
|
|
printf("efi_start_image() returned: %ld\n", ret & ~EFI_ERROR_MASK);
|
|
|
|
if (ret && exit_data)
|
|
|
|
efi_free_pool(exit_data);
|
|
|
|
|
|
|
|
efi_restore_gd();
|
|
|
|
|
2020-08-07 23:49:39 +08:00
|
|
|
free(load_options);
|
2020-04-14 10:51:48 +08:00
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2020-05-11 01:40:03 +08:00
|
|
|
static struct cmd_tbl cmd_efidebug_test_sub[] = {
|
2021-01-16 02:02:50 +08:00
|
|
|
#ifdef CONFIG_CMD_BOOTEFI_BOOTMGR
|
2020-04-14 10:51:48 +08:00
|
|
|
U_BOOT_CMD_MKENT(bootmgr, CONFIG_SYS_MAXARGS, 1, do_efi_test_bootmgr,
|
|
|
|
"", ""),
|
2021-01-16 02:02:50 +08:00
|
|
|
#endif
|
2020-04-14 10:51:48 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* do_efi_test() - manage UEFI load options
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success,
|
|
|
|
* CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "test" sub-command.
|
|
|
|
*/
|
2020-05-11 01:40:03 +08:00
|
|
|
static int do_efi_test(struct cmd_tbl *cmdtp, int flag,
|
2020-04-14 10:51:48 +08:00
|
|
|
int argc, char * const argv[])
|
|
|
|
{
|
2020-05-11 01:40:03 +08:00
|
|
|
struct cmd_tbl *cp;
|
2020-04-14 10:51:48 +08:00
|
|
|
|
|
|
|
if (argc < 2)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
|
|
|
argc--; argv++;
|
|
|
|
|
|
|
|
cp = find_cmd_tbl(argv[0], cmd_efidebug_test_sub,
|
|
|
|
ARRAY_SIZE(cmd_efidebug_test_sub));
|
|
|
|
if (!cp)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
|
|
|
return cp->cmd(cmdtp, flag, argc, argv);
|
|
|
|
}
|
|
|
|
|
2020-05-18 03:25:45 +08:00
|
|
|
/**
|
|
|
|
* do_efi_query_info() - QueryVariableInfo EFI service
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success,
|
|
|
|
* CMD_RET_USAGE or CMD_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug "test" sub-command.
|
|
|
|
*/
|
|
|
|
|
2020-05-11 01:40:03 +08:00
|
|
|
static int do_efi_query_info(struct cmd_tbl *cmdtp, int flag,
|
2020-05-18 03:25:45 +08:00
|
|
|
int argc, char * const argv[])
|
|
|
|
{
|
|
|
|
efi_status_t ret;
|
|
|
|
u32 attr = 0;
|
|
|
|
u64 max_variable_storage_size;
|
|
|
|
u64 remain_variable_storage_size;
|
|
|
|
u64 max_variable_size;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 1; i < argc; i++) {
|
|
|
|
if (!strcmp(argv[i], "-bs"))
|
|
|
|
attr |= EFI_VARIABLE_BOOTSERVICE_ACCESS;
|
|
|
|
else if (!strcmp(argv[i], "-rt"))
|
|
|
|
attr |= EFI_VARIABLE_RUNTIME_ACCESS;
|
|
|
|
else if (!strcmp(argv[i], "-nv"))
|
|
|
|
attr |= EFI_VARIABLE_NON_VOLATILE;
|
|
|
|
else if (!strcmp(argv[i], "-at"))
|
|
|
|
attr |=
|
|
|
|
EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = EFI_CALL(efi_query_variable_info(attr,
|
|
|
|
&max_variable_storage_size,
|
|
|
|
&remain_variable_storage_size,
|
|
|
|
&max_variable_size));
|
|
|
|
if (ret != EFI_SUCCESS) {
|
|
|
|
printf("Error: Cannot query UEFI variables, r = %lu\n",
|
|
|
|
ret & ~EFI_ERROR_MASK);
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
printf("Max storage size %llu\n", max_variable_storage_size);
|
|
|
|
printf("Remaining storage size %llu\n", remain_variable_storage_size);
|
|
|
|
printf("Max variable size %llu\n", max_variable_size);
|
|
|
|
|
|
|
|
return CMD_RET_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2020-05-11 01:40:03 +08:00
|
|
|
static struct cmd_tbl cmd_efidebug_sub[] = {
|
2019-02-25 14:54:38 +08:00
|
|
|
U_BOOT_CMD_MKENT(boot, CONFIG_SYS_MAXARGS, 1, do_efi_boot_opt, "", ""),
|
2020-11-17 08:28:01 +08:00
|
|
|
#ifdef CONFIG_EFI_HAVE_CAPSULE_SUPPORT
|
|
|
|
U_BOOT_CMD_MKENT(capsule, CONFIG_SYS_MAXARGS, 1, do_efi_capsule,
|
|
|
|
"", ""),
|
|
|
|
#endif
|
cmd: efidebug: add devices command
"devices" command prints all the uefi variables on the system.
=> efi devices
Scanning disk ahci_scsi.id0lun0...
Scanning disk ahci_scsi.id1lun0...
Found 4 disks
Device Device Path
================ ====================
000000007ef07ea0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000000007ef00c10 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(0,0)
000000007ef00dd0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)
000000007ef07be0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(1,MBR,0x086246ba,0x800,0x40000)
000000007ef07510 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(2,MBR,0x086246ba,0x40800,0x3f800)
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:39 +08:00
|
|
|
U_BOOT_CMD_MKENT(devices, CONFIG_SYS_MAXARGS, 1, do_efi_show_devices,
|
|
|
|
"", ""),
|
2019-02-25 14:54:40 +08:00
|
|
|
U_BOOT_CMD_MKENT(drivers, CONFIG_SYS_MAXARGS, 1, do_efi_show_drivers,
|
|
|
|
"", ""),
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
U_BOOT_CMD_MKENT(dh, CONFIG_SYS_MAXARGS, 1, do_efi_show_handles,
|
|
|
|
"", ""),
|
2019-02-25 14:54:42 +08:00
|
|
|
U_BOOT_CMD_MKENT(images, CONFIG_SYS_MAXARGS, 1, do_efi_show_images,
|
|
|
|
"", ""),
|
2019-02-25 14:54:43 +08:00
|
|
|
U_BOOT_CMD_MKENT(memmap, CONFIG_SYS_MAXARGS, 1, do_efi_show_memmap,
|
|
|
|
"", ""),
|
2020-01-07 12:57:47 +08:00
|
|
|
U_BOOT_CMD_MKENT(tables, CONFIG_SYS_MAXARGS, 1, do_efi_show_tables,
|
|
|
|
"", ""),
|
2020-04-14 10:51:48 +08:00
|
|
|
U_BOOT_CMD_MKENT(test, CONFIG_SYS_MAXARGS, 1, do_efi_test,
|
|
|
|
"", ""),
|
2020-05-18 03:25:45 +08:00
|
|
|
U_BOOT_CMD_MKENT(query, CONFIG_SYS_MAXARGS, 1, do_efi_query_info,
|
|
|
|
"", ""),
|
2019-02-25 14:54:38 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* do_efidebug() - display and configure UEFI environment
|
|
|
|
*
|
|
|
|
* @cmdtp: Command table
|
|
|
|
* @flag: Command flag
|
|
|
|
* @argc: Number of arguments
|
|
|
|
* @argv: Argument array
|
|
|
|
* Return: CMD_RET_SUCCESS on success,
|
|
|
|
* CMD_RET_USAGE or CMD_RET_RET_FAILURE on failure
|
|
|
|
*
|
|
|
|
* Implement efidebug command which allows us to display and
|
|
|
|
* configure UEFI environment.
|
|
|
|
*/
|
2020-05-11 01:40:03 +08:00
|
|
|
static int do_efidebug(struct cmd_tbl *cmdtp, int flag,
|
|
|
|
int argc, char *const argv[])
|
2019-02-25 14:54:38 +08:00
|
|
|
{
|
2020-05-11 01:40:03 +08:00
|
|
|
struct cmd_tbl *cp;
|
2019-02-25 14:54:38 +08:00
|
|
|
efi_status_t r;
|
|
|
|
|
|
|
|
if (argc < 2)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
|
|
|
argc--; argv++;
|
|
|
|
|
|
|
|
/* Initialize UEFI drivers */
|
|
|
|
r = efi_init_obj_list();
|
|
|
|
if (r != EFI_SUCCESS) {
|
|
|
|
printf("Error: Cannot initialize UEFI sub-system, r = %lu\n",
|
|
|
|
r & ~EFI_ERROR_MASK);
|
|
|
|
return CMD_RET_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
cp = find_cmd_tbl(argv[0], cmd_efidebug_sub,
|
|
|
|
ARRAY_SIZE(cmd_efidebug_sub));
|
|
|
|
if (!cp)
|
|
|
|
return CMD_RET_USAGE;
|
|
|
|
|
|
|
|
return cp->cmd(cmdtp, flag, argc, argv);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_SYS_LONGHELP
|
|
|
|
static char efidebug_help_text[] =
|
|
|
|
" - UEFI Shell-like interface to configure UEFI environment\n"
|
|
|
|
"\n"
|
2021-03-18 03:55:01 +08:00
|
|
|
"efidebug boot add "
|
|
|
|
"-b <bootid> <label> <interface> <devnum>[:<part>] <file path> "
|
|
|
|
"-i <interface> <devnum>[:<part>] <initrd file path> "
|
|
|
|
"-s '<optional data>'\n"
|
2019-02-25 14:54:38 +08:00
|
|
|
" - set UEFI BootXXXX variable\n"
|
|
|
|
" <load options> will be passed to UEFI application\n"
|
|
|
|
"efidebug boot rm <bootid#1> [<bootid#2> [<bootid#3> [...]]]\n"
|
|
|
|
" - delete UEFI BootXXXX variables\n"
|
|
|
|
"efidebug boot dump\n"
|
|
|
|
" - dump all UEFI BootXXXX variables\n"
|
|
|
|
"efidebug boot next <bootid>\n"
|
|
|
|
" - set UEFI BootNext variable\n"
|
|
|
|
"efidebug boot order [<bootid#1> [<bootid#2> [<bootid#3> [...]]]]\n"
|
|
|
|
" - set/show UEFI boot order\n"
|
cmd: efidebug: add devices command
"devices" command prints all the uefi variables on the system.
=> efi devices
Scanning disk ahci_scsi.id0lun0...
Scanning disk ahci_scsi.id1lun0...
Found 4 disks
Device Device Path
================ ====================
000000007ef07ea0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000000007ef00c10 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(0,0)
000000007ef00dd0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)
000000007ef07be0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(1,MBR,0x086246ba,0x800,0x40000)
000000007ef07510 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(2,MBR,0x086246ba,0x40800,0x3f800)
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:39 +08:00
|
|
|
"\n"
|
2020-11-17 08:28:01 +08:00
|
|
|
#ifdef CONFIG_EFI_HAVE_CAPSULE_SUPPORT
|
|
|
|
"efidebug capsule update [-v] <capsule address>\n"
|
|
|
|
" - process a capsule\n"
|
2020-12-30 21:57:11 +08:00
|
|
|
"efidebug capsule disk-update\n"
|
|
|
|
" - update a capsule from disk\n"
|
2020-11-17 08:28:01 +08:00
|
|
|
"efidebug capsule show <capsule address>\n"
|
|
|
|
" - show capsule information\n"
|
|
|
|
"efidebug capsule result [<capsule result var>]\n"
|
|
|
|
" - show a capsule update result\n"
|
2021-03-11 21:18:51 +08:00
|
|
|
#ifdef CONFIG_EFI_ESRT
|
|
|
|
"efidebug capsule esrt\n"
|
|
|
|
" - print the ESRT\n"
|
|
|
|
#endif
|
2020-11-17 08:28:01 +08:00
|
|
|
"\n"
|
|
|
|
#endif
|
cmd: efidebug: add devices command
"devices" command prints all the uefi variables on the system.
=> efi devices
Scanning disk ahci_scsi.id0lun0...
Scanning disk ahci_scsi.id1lun0...
Found 4 disks
Device Device Path
================ ====================
000000007ef07ea0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)
000000007ef00c10 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(0,0)
000000007ef00dd0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)
000000007ef07be0 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(1,MBR,0x086246ba,0x800,0x40000)
000000007ef07510 /VenHw(e61d73b9-a384-4acc-aeab-82e828f3628b)/Scsi(1,0)/HD(2,MBR,0x086246ba,0x40800,0x3f800)
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:39 +08:00
|
|
|
"efidebug devices\n"
|
2020-01-07 14:48:15 +08:00
|
|
|
" - show UEFI devices\n"
|
2019-02-25 14:54:40 +08:00
|
|
|
"efidebug drivers\n"
|
2020-01-07 14:48:15 +08:00
|
|
|
" - show UEFI drivers\n"
|
cmd: efidebug: add dh command
"dh" command prints all the uefi handles used in the system.
=> efi dh
7ef3bfa0: Device Path, Device Path To Text, Device Path Utilities,
Unicode Collation 2
7ef31d30: Driver Binding
7ef31da0: Simple Text Output
7ef31e10: Simple Text Input, Simple Text Input Ex
7ef3cca0: Block IO, Device Path
7ef3d070: Block IO, Device Path
7ef3d1b0: Block IO, Device Path, Simple File System
7ef3d3e0: Block IO, Device Path, Simple File System
Signed-off-by: AKASHI Takahiro <takahiro.akashi@linaro.org>
Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
2019-02-25 14:54:41 +08:00
|
|
|
"efidebug dh\n"
|
2020-01-07 14:48:15 +08:00
|
|
|
" - show UEFI handles\n"
|
2019-02-25 14:54:42 +08:00
|
|
|
"efidebug images\n"
|
2019-02-25 14:54:43 +08:00
|
|
|
" - show loaded images\n"
|
|
|
|
"efidebug memmap\n"
|
2020-01-07 14:48:15 +08:00
|
|
|
" - show UEFI memory map\n"
|
2020-01-07 12:57:47 +08:00
|
|
|
"efidebug tables\n"
|
2020-04-14 10:51:48 +08:00
|
|
|
" - show UEFI configuration tables\n"
|
2021-01-16 02:02:50 +08:00
|
|
|
#ifdef CONFIG_CMD_BOOTEFI_BOOTMGR
|
2020-04-14 10:51:48 +08:00
|
|
|
"efidebug test bootmgr\n"
|
2020-05-18 03:25:45 +08:00
|
|
|
" - run simple bootmgr for test\n"
|
2021-01-16 02:02:50 +08:00
|
|
|
#endif
|
2020-05-18 03:25:45 +08:00
|
|
|
"efidebug query [-nv][-bs][-rt][-at]\n"
|
|
|
|
" - show size of UEFI variables store\n";
|
2019-02-25 14:54:38 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
U_BOOT_CMD(
|
2021-03-18 03:55:01 +08:00
|
|
|
efidebug, CONFIG_SYS_MAXARGS, 0, do_efidebug,
|
2019-02-25 14:54:38 +08:00
|
|
|
"Configure UEFI environment",
|
|
|
|
efidebug_help_text
|
|
|
|
);
|