/openbmc/u-boot/doc/ |
H A D | README.uefi | 7 # UEFI on U-Boot 9 The Unified Extensible Firmware Interface Specification (UEFI) [1] has become 17 The implementation of UEFI in U-Boot strives to reach the minimum requirements 21 A full blown UEFI implementation would contradict the U-Boot design principle 24 ## Building for UEFI 26 The UEFI standard supports only little-endian systems. The UEFI support can be 35 loaded UEFI application [3], requires 40 ### Executing a UEFI binary 42 The bootefi command is used to start UEFI applications or to install UEFI 47 * image address - the memory address of the UEFI binary [all …]
|
/openbmc/linux/Documentation/arch/arm/ |
H A D | uefi.rst | 2 The Unified Extensible Firmware Interface (UEFI) 5 UEFI, the Unified Extensible Firmware Interface, is a specification 7 maintained by the UEFI Forum - http://www.uefi.org/. 9 UEFI is an evolution of its predecessor 'EFI', so the terms EFI and 10 UEFI are used somewhat interchangeably in this document and associated 11 source code. As a rule, anything new uses 'UEFI', whereas 'EFI' refers 14 UEFI support in Linux 16 Booting on a platform with firmware compliant with the UEFI specification 19 - UEFI Runtime Services 21 interface of UEFI configuration tables. (ACPI, SMBIOS, ...) [all …]
|
/openbmc/openbmc-test-automation/redfish/systems/ |
H A D | test_boot_devices.robot | 39 ... UEFI=BIOS EFI boot 51 Once Hdd UEFI 52 Once Pxe UEFI 53 Once Diags UEFI 54 Once Cd UEFI 55 Once BiosSetup UEFI 56 Once None UEFI 71 Continuous Hdd UEFI 72 Continuous Pxe UEFI 73 Continuous Diags UEFI [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/BIOSConfig/ |
H A D | SecureBoot.interface.yaml | 2 UEFI Secure Boot information and represents properties for managing the UEFI 9 The UEFI Secure Boot state during the current boot cycle. 15 An indication of whether the UEFI Secure Boot takes effect on next 21 The current UEFI Secure Boot Mode. 31 UEFI Secure Boot is currently unknown. 34 UEFI Secure Boot is currently enabled. 37 UEFI Secure Boot is currently disabled. 41 Secure Boot Mode Type. UEFI Secure Boot Modes are defined in UEFI 43 https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html#secure-boot-modes 47 UEFI Secure Boot is currently unknown. [all …]
|
/openbmc/linux/Documentation/devicetree/bindings/arm/ |
H A D | xen.txt | 22 To support UEFI on Xen ARM virtual platforms, Xen populates the FDT "uefi" node 28 xen,uefi-system-table | 64-bit | Guest physical address of the UEFI System 31 xen,uefi-mmap-start | 64-bit | Guest physical address of the UEFI memory 34 xen,uefi-mmap-size | 32-bit | Size in bytes of the UEFI memory map 37 xen,uefi-mmap-desc-size | 32-bit | Size in bytes of each entry in the UEFI 40 xen,uefi-mmap-desc-ver | 32-bit | Version of the mmap descriptor format. 49 uefi { 50 xen,uefi-system-table = <0xXXXXXXXX>; 51 xen,uefi-mmap-start = <0xXXXXXXXX>; 52 xen,uefi-mmap-size = <0xXXXXXXXX>; [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/ |
H A D | SecureBoot.v1_1_2.json | 60 "description": "This action resets the UEFI Secure Boot keys.", 61 …UEFI Secure Boot key databases. The `ResetAllKeysToDefault` value shall reset all UEFI Secure Boo… 65 … "description": "The type of reset or delete to perform on the UEFI Secure Boot databases.", 66 …his parameter shall specify the type of reset or delete to perform on the UEFI Secure Boot databas… 104 …"DeleteAllKeys": "Delete the contents of all UEFI Secure Boot key databases, including the PK key … 105 …"DeletePK": "Delete the contents of the PK UEFI Secure Boot database. This puts the system in Set… 106 …"ResetAllKeysToDefault": "Reset the contents of all UEFI Secure Boot key databases, including the … 112 …n": "The `SecureBoot` schema contains UEFI Secure Boot information and represents properties for m… 113 …"longDescription": "This resource contains UEFI Secure Boot information for a Redfish implementati… 179 "description": "The UEFI Secure Boot state during the current boot cycle.", [all …]
|
H A D | SecureBootDatabase.v1_0_3.json | 60 … "description": "This action is used to reset the UEFI Secure Boot keys of this database.", 61 …UEFI Secure Boot key database. The `ResetAllKeysToDefault` value shall reset this UEFI Secure Boo… 65 … "description": "The type of reset or delete to perform on this UEFI Secure Boot database.", 66 …is parameter shall specify the type of reset or delete to perform on this UEFI Secure Boot databas… 103 "DeleteAllKeys": "Delete the contents of this UEFI Secure Boot key database.", 104 …"ResetAllKeysToDefault": "Reset the contents of this UEFI Secure Boot key database to the default … 110 …"description": "The `SecureBootDatabase` schema describes a UEFI Secure Boot database used to stor… 111 …"longDescription": "This resource shall be used to represent a UEFI Secure Boot database for a Red… 146 …"description": "A link to the collection of certificates contained in this UEFI Secure Boot databa… 151 … "description": "This property contains the name of the UEFI Secure Boot database.", [all …]
|
/openbmc/u-boot/cmd/ |
H A D | efidebug.c | 3 * UEFI Shell-like command 22 * efi_get_device_handle_info() - get information of UEFI device 24 * @handle: Handle of UEFI device 52 * do_efi_show_devices() - show UEFI devices 61 * Show all UEFI devices and their information. 94 * efi_get_driver_handle_info() - get information of UEFI driver 96 * @handle: Handle of UEFI device 101 * Currently return no useful information as all UEFI drivers are 131 * do_efi_show_drivers() - show UEFI drivers 140 * Show all UEFI drivers and their information. [all …]
|
H A D | nvedit_efi.c | 3 * Integrate UEFI variables to u-boot env interface 20 * Mapping between UEFI variables and u-boot variables: 37 * efi_dump_single_var() - show information about a UEFI variable 42 * Show information encoded in one UEFI variable 88 * efi_dump_vars() - show information about named UEFI variables 94 * Show information encoded in named UEFI variables 131 * efi_dump_vars() - show information about all the UEFI variables 135 * Show information encoded in all the UEFI variables 182 * do_env_print_efi() - show information about UEFI variables 193 * named UEFI variables, otherwise show all the UEFI variables. [all …]
|
/openbmc/linux/security/integrity/platform_certs/ |
H A D | load_uefi.c | 17 * On T2 Macs reading the db and dbx efi variables to load UEFI Secure Boot 43 * Look to see if a UEFI variable called MokIgnoreDB exists and return true if 46 * This UEFI variable is set by the shim if a user tells the shim to not use 47 * the certs/hashes in the UEFI db variable for verification purposes. If it 99 * Load the certs contained in the UEFI MokListRT database into the 103 * that fails, this routine uses the MokListRT ordinary UEFI variable. 122 rc = parse_efi_signature_list("UEFI:MokListRT (MOKvar table)", in load_moklist_certs() 139 rc = parse_efi_signature_list("UEFI:MokListRT", in load_moklist_certs() 149 pr_info("Couldn't get UEFI MokListRT\n"); in load_moklist_certs() 154 * load_uefi_certs() - Load certs from UEFI sources [all …]
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/ |
H A D | 0015-Add-timestamp-validation-for-uefi-variables.patch | 4 Subject: [PATCH 1/3] Add timestamp validation for uefi variables 6 Return failure if uefi variable creation or update is not 17 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.c b/components/servic… 19 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.c 20 +++ b/components/service/uefi/smm_variable/backend/uefi_variable_store.c 89 * UEFI: Page 253 103 + * UEFI: Page 253 120 diff --git a/components/service/uefi/smm_variable/backend/variable_index.c b/components/service/uef… 122 --- a/components/service/uefi/smm_variable/backend/variable_index.c 123 +++ b/components/service/uefi/smm_variable/backend/variable_index.c [all …]
|
H A D | 0012-Fix-GetNextVariableName-NameSize-input.patch | 25 diff --git a/components/service/uefi/smm_variable/backend/test/variable_store_tests.cpp b/component… 27 --- a/components/service/uefi/smm_variable/backend/test/variable_store_tests.cpp 28 +++ b/components/service/uefi/smm_variable/backend/test/variable_store_tests.cpp 161 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.c b/components/servic… 163 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.c 164 +++ b/components/service/uefi/smm_variable/backend/uefi_variable_store.c 199 - /* The NameSize has to be set in every case according to the UEFI specs. 262 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.h b/components/servic… 264 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.h 265 +++ b/components/service/uefi/smm_variable/backend/uefi_variable_store.h [all …]
|
H A D | 0017-Implement-Private-Authenticated-Variable-verificatio.patch | 20 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.c b/components/servic… 22 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.c 23 +++ b/components/service/uefi/smm_variable/backend/uefi_variable_store.c 200 + * UEFI: Page 254 232 diff --git a/components/service/uefi/smm_variable/backend/variable_index.c b/components/service/uef… 234 --- a/components/service/uefi/smm_variable/backend/variable_index.c 235 +++ b/components/service/uefi/smm_variable/backend/variable_index.c 244 diff --git a/components/service/uefi/smm_variable/backend/variable_index.h b/components/service/uef… 246 --- a/components/service/uefi/smm_variable/backend/variable_index.h 247 +++ b/components/service/uefi/smm_variable/backend/variable_index.h [all …]
|
H A D | 0011-Fix-Avoid-redefinition-of-variables.patch | 11 .../service/uefi/smm_variable/client/cpp/smm_variable_client.cpp | 1 - 14 diff --git a/components/service/uefi/smm_variable/client/cpp/smm_variable_client.cpp b/components/s… 16 --- a/components/service/uefi/smm_variable/client/cpp/smm_variable_client.cpp 17 +++ b/components/service/uefi/smm_variable/client/cpp/smm_variable_client.cpp
|
/openbmc/linux/drivers/firmware/efi/ |
H A D | fdtparams.c | 38 .path = "/hypervisor/uefi", 41 [SYSTAB] = "xen,uefi-system-table", 42 [MMBASE] = "xen,uefi-mmap-start", 43 [MMSIZE] = "xen,uefi-mmap-size", 44 [DCSIZE] = "xen,uefi-mmap-desc-size", 45 [DCVERS] = "xen,uefi-mmap-desc-ver", 51 [SYSTAB] = "linux,uefi-system-table", 52 [MMBASE] = "linux,uefi-mmap-start", 53 [MMSIZE] = "linux,uefi-mmap-size", 54 [DCSIZE] = "linux,uefi-mmap-desc-size", [all …]
|
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/ |
H A D | SecureBoot_v1.xml | 37 …ing="The `SecureBoot` schema contains UEFI Secure Boot information and represents properties for m… 38 …<Annotation Term="OData.LongDescription" String="This resource contains UEFI Secure Boot informati… 65 … <Annotation Term="OData.Description" String="This action resets the UEFI Secure Boot keys."/> 66 …UEFI Secure Boot key databases. The `ResetAllKeysToDefault` value shall reset all UEFI Secure Boo… 69 …"OData.Description" String="The type of reset or delete to perform on the UEFI Secure Boot databas… 70 …his parameter shall specify the type of reset or delete to perform on the UEFI Secure Boot databas… 82 …<Annotation Term="OData.Description" String="An indication of whether UEFI Secure Boot is enabled.… 83 …property shall indicate whether the UEFI Secure Boot takes effect on next boot. This property can… 87 …<Annotation Term="OData.Description" String="The UEFI Secure Boot state during the current boot cy… 88 …<Annotation Term="OData.LongDescription" String="This property shall indicate the UEFI Secure Boot… [all …]
|
H A D | SecureBootDatabase_v1.xml | 40 …m="OData.Description" String="The `SecureBootDatabase` schema describes a UEFI Secure Boot databas… 41 …OData.LongDescription" String="This resource shall be used to represent a UEFI Secure Boot databas… 67 …<Annotation Term="OData.Description" String="This action is used to reset the UEFI Secure Boot key… 68 …UEFI Secure Boot key database. The `ResetAllKeysToDefault` value shall reset this UEFI Secure Boo… 71 …OData.Description" String="The type of reset or delete to perform on this UEFI Secure Boot databas… 72 …is parameter shall specify the type of reset or delete to perform on this UEFI Secure Boot databas… 84 …<Annotation Term="OData.Description" String="This property contains the name of the UEFI Secure Bo… 85 …name of the UEFI Secure Boot database. This property shall contain the same value as the `Id` pro… 93 …ption" String="A link to the collection of certificates contained in this UEFI Secure Boot databas… 99 …ription" String="A link to the collection of signatures contained in this UEFI Secure Boot databas… [all …]
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/ |
H A D | python3-uefi-firmware_1.12.bb | 1 SUMMARY = "Various data structures and parsing tools for UEFI firmware." 2 DESCRIPTION = "This package contains Python UEFI firmware parser tool. The \ 3 UEFI firmware parser is a simple module and set of scripts for parsing, \ 4 extracting, and recreating UEFI firmware volumes. This includes parsing \ 6 HOMEPAGE = "https://github.com/theopolis/uefi-firmware-parser" 10 SRC_URI = "git://github.com/theopolis/uefi-firmware-parser;protocol=https;branch=master"
|
/openbmc/qemu/tests/uefi-test-tools/ |
H A D | Makefile | 1 # Makefile for the test helper UEFI applications that run in guests. 14 images_dir := ../data/uefi-boot-images 27 # to the UEFI source code. Normally, the intermediate files would have been 29 # from the unchanged UEFI sources. Unfortunately, the "mkdosfs" and 48 # Embed the "UEFI system partition" into an ISO9660 file system as an ElTorito 55 # *short* UEFI architecture identifiers. Periods are allowed in, and ultimately 64 # Format a "UEFI system partition", using the UEFI binary as the default boot 67 # after the UEFI binary. (Excess characters are automatically dropped from the 81 # association between the UEFI binary (such as "bios-tables-test") and the 100 $(PYTHON) ../../roms/edk2-build.py --config uefi-test-build.config \
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/ |
H A D | ts-uefi-test_git.bb | 1 DESCRIPTION = "Trusted Services uefi-test deployment for arm-linux. \ 3 on an Arm platform with real deployments of UEFI SMM services." 12 OECMAKE_SOURCEPATH = "${S}/deployments/uefi-test/${TS_ENV}" 14 FILES:${PN} = "${bindir}/uefi-test" 18 mv ${D}${TS_INSTALL}/bin/uefi-test ${D}${bindir}
|
/openbmc/u-boot/lib/efi_loader/ |
H A D | efi_device_path_utilities.c | 21 * See the Unified Extensible Firmware Interface (UEFI) specification 45 * The UEFI spec does not indicate what happens to the end tag. We follow the 49 * See the Unified Extensible Firmware Interface (UEFI) specification 68 * See the Unified Extensible Firmware Interface (UEFI) specification 89 * See the Unified Extensible Firmware Interface (UEFI) specification 110 * See the Unified Extensible Firmware Interface (UEFI) specification 132 * See the Unified Extensible Firmware Interface (UEFI) specification 154 * See the Unified Extensible Firmware Interface (UEFI) specification 174 * See the Unified Extensible Firmware Interface (UEFI) specification
|
/openbmc/linux/drivers/firmware/efi/libstub/ |
H A D | fdt.c | 71 * Delete all memory reserve map entries. When booting via UEFI, in update_fdt() 72 * kernel will use the UEFI memory map to find reserved regions. in update_fdt() 99 status = fdt_setprop_var(fdt, node, "linux,uefi-system-table", fdt_val64); in update_fdt() 105 status = fdt_setprop_var(fdt, node, "linux,uefi-mmap-start", fdt_val64); in update_fdt() 111 status = fdt_setprop_var(fdt, node, "linux,uefi-mmap-size", fdt_val32); in update_fdt() 115 status = fdt_setprop_var(fdt, node, "linux,uefi-mmap-desc-size", fdt_val32); in update_fdt() 119 status = fdt_setprop_var(fdt, node, "linux,uefi-mmap-desc-ver", fdt_val32); in update_fdt() 159 err = fdt_setprop_inplace_var(fdt, node, "linux,uefi-mmap-start", fdt_val64); in update_fdt_memmap() 165 err = fdt_setprop_inplace_var(fdt, node, "linux,uefi-mmap-size", fdt_val32); in update_fdt_memmap() 171 err = fdt_setprop_inplace_var(fdt, node, "linux,uefi-mmap-desc-size", fdt_val32); in update_fdt_memmap() [all …]
|
/openbmc/linux/include/linux/ |
H A D | cper.h | 3 * UEFI Common Platform Error Record 30 * defined in the UEFI spec because some of them don't make any sense.) 57 * in the UEFI spec v2.7, sec N.2.1. 150 * cper_section_descriptor. These UUIDs are defined in the UEFI spec 323 /* Record Header, UEFI v2.7 sec N.2.1 */ 343 /* Section Descriptor, UEFI v2.7 sec N.2.2 */ 359 /* Generic Processor Error Section, UEFI v2.7 sec N.2.4.1 */ 378 /* IA32/X64 Processor Error Section, UEFI v2.7 sec N.2.4.2 */ 385 /* IA32/X64 Processor Error Information Structure, UEFI v2.7 sec N.2.4.2.1 */ 396 /* IA32/X64 Processor Context Information Structure, UEFI v2.7 sec N.2.4.2.2 */ [all …]
|
/openbmc/linux/Documentation/riscv/ |
H A D | boot.rst | 41 as per the devicetree specification and/or the UEFI specification. 56 using the ``$a1`` register, or when booting with UEFI, it can be passed using the 77 UEFI section in Pre-kernel Requirements and Constraints 80 UEFI memory map argument 83 When booting with UEFI, the RISC-V kernel will use only the EFI memory map to 86 The UEFI firmware must parse the subnodes of the ``/reserved-memory`` devicetree 89 (refer to section "3.5.4 /reserved-memory and UEFI" of the devicetree 95 When booting with UEFI, the EFI stub requires the boot hartid in order to pass argument 113 When booting with UEFI, the devicetree is supplemented (or created) by the EFI 115 "UEFI kernel support on ARM" in Documentation/arch/arm/uefi.rst.
|
/openbmc/linux/drivers/net/wireless/intel/iwlwifi/fw/ |
H A D | uefi.c | 11 #include "fw/uefi.h" 68 "PNVM UEFI variable not found 0x%lx (len %lu)\n", in iwl_uefi_get_pnvm() 73 IWL_DEBUG_FW(trans, "Read PNVM from UEFI with size %lu\n", package_size); in iwl_uefi_get_pnvm() 238 "Reduced Power UEFI variable not found 0x%lx (len %lu)\n", in iwl_uefi_get_reduced_power() 245 "Invalid Reduced Power UEFI variable len (%lu)\n", in iwl_uefi_get_reduced_power() 251 IWL_DEBUG_FW(trans, "Read reduced power from UEFI with size %lu\n", in iwl_uefi_get_reduced_power() 297 "STEP UEFI variable not found 0x%lx\n", in iwl_uefi_get_step_table() 304 "Invalid STEP table UEFI variable len (%lu)\n", in iwl_uefi_get_step_table() 310 IWL_DEBUG_FW(trans, "Read STEP from UEFI with size %lu\n", in iwl_uefi_get_step_table() 368 "SGOM UEFI variable not found 0x%lx\n", in iwl_uefi_get_sgom_table() [all …]
|