Home
last modified time | relevance | path

Searched full:uefi (Results 1 – 25 of 435) sorted by relevance

12345678910>>...18

/openbmc/u-boot/doc/
H A DREADME.uefi7 # UEFI on U-Boot
9 The Unified Extensible Firmware Interface Specification (UEFI) [1] has become
17 The implementation of UEFI in U-Boot strives to reach the minimum requirements
21 A full blown UEFI implementation would contradict the U-Boot design principle
24 ## Building for UEFI
26 The UEFI standard supports only little-endian systems. The UEFI support can be
35 loaded UEFI application [3], requires
40 ### Executing a UEFI binary
42 The bootefi command is used to start UEFI applications or to install UEFI
47 * image address - the memory address of the UEFI binary
[all …]
/openbmc/linux/Documentation/arch/arm/
H A Duefi.rst2 The Unified Extensible Firmware Interface (UEFI)
5 UEFI, the Unified Extensible Firmware Interface, is a specification
7 maintained by the UEFI Forum - http://www.uefi.org/.
9 UEFI is an evolution of its predecessor 'EFI', so the terms EFI and
10 UEFI are used somewhat interchangeably in this document and associated
11 source code. As a rule, anything new uses 'UEFI', whereas 'EFI' refers
14 UEFI support in Linux
16 Booting on a platform with firmware compliant with the UEFI specification
19 - UEFI Runtime Services
21 interface of UEFI configuration tables. (ACPI, SMBIOS, ...)
[all …]
/openbmc/openbmc-test-automation/redfish/systems/
H A Dtest_boot_devices.robot39 ... UEFI=BIOS EFI boot
51 Once Hdd UEFI
52 Once Pxe UEFI
53 Once Diags UEFI
54 Once Cd UEFI
55 Once BiosSetup UEFI
56 Once None UEFI
71 Continuous Hdd UEFI
72 Continuous Pxe UEFI
73 Continuous Diags UEFI
[all …]
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/BIOSConfig/
H A DSecureBoot.interface.yaml2 UEFI Secure Boot information and represents properties for managing the UEFI
9 The UEFI Secure Boot state during the current boot cycle.
15 An indication of whether the UEFI Secure Boot takes effect on next
21 The current UEFI Secure Boot Mode.
31 UEFI Secure Boot is currently unknown.
34 UEFI Secure Boot is currently enabled.
37 UEFI Secure Boot is currently disabled.
41 Secure Boot Mode Type. UEFI Secure Boot Modes are defined in UEFI
43 https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html#secure-boot-modes
47 UEFI Secure Boot is currently unknown.
[all …]
/openbmc/linux/Documentation/devicetree/bindings/arm/
H A Dxen.txt22 To support UEFI on Xen ARM virtual platforms, Xen populates the FDT "uefi" node
28 xen,uefi-system-table | 64-bit | Guest physical address of the UEFI System
31 xen,uefi-mmap-start | 64-bit | Guest physical address of the UEFI memory
34 xen,uefi-mmap-size | 32-bit | Size in bytes of the UEFI memory map
37 xen,uefi-mmap-desc-size | 32-bit | Size in bytes of each entry in the UEFI
40 xen,uefi-mmap-desc-ver | 32-bit | Version of the mmap descriptor format.
49 uefi {
50 xen,uefi-system-table = <0xXXXXXXXX>;
51 xen,uefi-mmap-start = <0xXXXXXXXX>;
52 xen,uefi-mmap-size = <0xXXXXXXXX>;
[all …]
/openbmc/bmcweb/redfish-core/schema/dmtf/json-schema/
H A DSecureBoot.v1_1_2.json60 "description": "This action resets the UEFI Secure Boot keys.",
61UEFI Secure Boot key databases. The `ResetAllKeysToDefault` value shall reset all UEFI Secure Boo…
65 … "description": "The type of reset or delete to perform on the UEFI Secure Boot databases.",
66 …his parameter shall specify the type of reset or delete to perform on the UEFI Secure Boot databas…
104 …"DeleteAllKeys": "Delete the contents of all UEFI Secure Boot key databases, including the PK key …
105 …"DeletePK": "Delete the contents of the PK UEFI Secure Boot database. This puts the system in Set…
106 …"ResetAllKeysToDefault": "Reset the contents of all UEFI Secure Boot key databases, including the …
112 …n": "The `SecureBoot` schema contains UEFI Secure Boot information and represents properties for m…
113 …"longDescription": "This resource contains UEFI Secure Boot information for a Redfish implementati…
179 "description": "The UEFI Secure Boot state during the current boot cycle.",
[all …]
H A DSecureBootDatabase.v1_0_3.json60 … "description": "This action is used to reset the UEFI Secure Boot keys of this database.",
61UEFI Secure Boot key database. The `ResetAllKeysToDefault` value shall reset this UEFI Secure Boo…
65 … "description": "The type of reset or delete to perform on this UEFI Secure Boot database.",
66 …is parameter shall specify the type of reset or delete to perform on this UEFI Secure Boot databas…
103 "DeleteAllKeys": "Delete the contents of this UEFI Secure Boot key database.",
104 …"ResetAllKeysToDefault": "Reset the contents of this UEFI Secure Boot key database to the default …
110 …"description": "The `SecureBootDatabase` schema describes a UEFI Secure Boot database used to stor…
111 …"longDescription": "This resource shall be used to represent a UEFI Secure Boot database for a Red…
146 …"description": "A link to the collection of certificates contained in this UEFI Secure Boot databa…
151 … "description": "This property contains the name of the UEFI Secure Boot database.",
[all …]
/openbmc/u-boot/cmd/
H A Defidebug.c3 * UEFI Shell-like command
22 * efi_get_device_handle_info() - get information of UEFI device
24 * @handle: Handle of UEFI device
52 * do_efi_show_devices() - show UEFI devices
61 * Show all UEFI devices and their information.
94 * efi_get_driver_handle_info() - get information of UEFI driver
96 * @handle: Handle of UEFI device
101 * Currently return no useful information as all UEFI drivers are
131 * do_efi_show_drivers() - show UEFI drivers
140 * Show all UEFI drivers and their information.
[all …]
H A Dnvedit_efi.c3 * Integrate UEFI variables to u-boot env interface
20 * Mapping between UEFI variables and u-boot variables:
37 * efi_dump_single_var() - show information about a UEFI variable
42 * Show information encoded in one UEFI variable
88 * efi_dump_vars() - show information about named UEFI variables
94 * Show information encoded in named UEFI variables
131 * efi_dump_vars() - show information about all the UEFI variables
135 * Show information encoded in all the UEFI variables
182 * do_env_print_efi() - show information about UEFI variables
193 * named UEFI variables, otherwise show all the UEFI variables.
[all …]
/openbmc/linux/security/integrity/platform_certs/
H A Dload_uefi.c17 * On T2 Macs reading the db and dbx efi variables to load UEFI Secure Boot
43 * Look to see if a UEFI variable called MokIgnoreDB exists and return true if
46 * This UEFI variable is set by the shim if a user tells the shim to not use
47 * the certs/hashes in the UEFI db variable for verification purposes. If it
99 * Load the certs contained in the UEFI MokListRT database into the
103 * that fails, this routine uses the MokListRT ordinary UEFI variable.
122 rc = parse_efi_signature_list("UEFI:MokListRT (MOKvar table)", in load_moklist_certs()
139 rc = parse_efi_signature_list("UEFI:MokListRT", in load_moklist_certs()
149 pr_info("Couldn't get UEFI MokListRT\n"); in load_moklist_certs()
154 * load_uefi_certs() - Load certs from UEFI sources
[all …]
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/
H A D0015-Add-timestamp-validation-for-uefi-variables.patch4 Subject: [PATCH 1/3] Add timestamp validation for uefi variables
6 Return failure if uefi variable creation or update is not
17 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.c b/components/servic…
19 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.c
20 +++ b/components/service/uefi/smm_variable/backend/uefi_variable_store.c
89 * UEFI: Page 253
103 + * UEFI: Page 253
120 diff --git a/components/service/uefi/smm_variable/backend/variable_index.c b/components/service/uef…
122 --- a/components/service/uefi/smm_variable/backend/variable_index.c
123 +++ b/components/service/uefi/smm_variable/backend/variable_index.c
[all …]
H A D0012-Fix-GetNextVariableName-NameSize-input.patch25 diff --git a/components/service/uefi/smm_variable/backend/test/variable_store_tests.cpp b/component…
27 --- a/components/service/uefi/smm_variable/backend/test/variable_store_tests.cpp
28 +++ b/components/service/uefi/smm_variable/backend/test/variable_store_tests.cpp
161 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.c b/components/servic…
163 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.c
164 +++ b/components/service/uefi/smm_variable/backend/uefi_variable_store.c
199 - /* The NameSize has to be set in every case according to the UEFI specs.
262 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.h b/components/servic…
264 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.h
265 +++ b/components/service/uefi/smm_variable/backend/uefi_variable_store.h
[all …]
H A D0017-Implement-Private-Authenticated-Variable-verificatio.patch20 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.c b/components/servic…
22 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.c
23 +++ b/components/service/uefi/smm_variable/backend/uefi_variable_store.c
200 + * UEFI: Page 254
232 diff --git a/components/service/uefi/smm_variable/backend/variable_index.c b/components/service/uef…
234 --- a/components/service/uefi/smm_variable/backend/variable_index.c
235 +++ b/components/service/uefi/smm_variable/backend/variable_index.c
244 diff --git a/components/service/uefi/smm_variable/backend/variable_index.h b/components/service/uef…
246 --- a/components/service/uefi/smm_variable/backend/variable_index.h
247 +++ b/components/service/uefi/smm_variable/backend/variable_index.h
[all …]
H A D0011-Fix-Avoid-redefinition-of-variables.patch11 .../service/uefi/smm_variable/client/cpp/smm_variable_client.cpp | 1 -
14 diff --git a/components/service/uefi/smm_variable/client/cpp/smm_variable_client.cpp b/components/s…
16 --- a/components/service/uefi/smm_variable/client/cpp/smm_variable_client.cpp
17 +++ b/components/service/uefi/smm_variable/client/cpp/smm_variable_client.cpp
/openbmc/linux/drivers/firmware/efi/
H A Dfdtparams.c38 .path = "/hypervisor/uefi",
41 [SYSTAB] = "xen,uefi-system-table",
42 [MMBASE] = "xen,uefi-mmap-start",
43 [MMSIZE] = "xen,uefi-mmap-size",
44 [DCSIZE] = "xen,uefi-mmap-desc-size",
45 [DCVERS] = "xen,uefi-mmap-desc-ver",
51 [SYSTAB] = "linux,uefi-system-table",
52 [MMBASE] = "linux,uefi-mmap-start",
53 [MMSIZE] = "linux,uefi-mmap-size",
54 [DCSIZE] = "linux,uefi-mmap-desc-size",
[all …]
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/
H A DSecureBoot_v1.xml37 …ing="The `SecureBoot` schema contains UEFI Secure Boot information and represents properties for m…
38 …<Annotation Term="OData.LongDescription" String="This resource contains UEFI Secure Boot informati…
65 … <Annotation Term="OData.Description" String="This action resets the UEFI Secure Boot keys."/>
66UEFI Secure Boot key databases. The `ResetAllKeysToDefault` value shall reset all UEFI Secure Boo…
69 …"OData.Description" String="The type of reset or delete to perform on the UEFI Secure Boot databas…
70 …his parameter shall specify the type of reset or delete to perform on the UEFI Secure Boot databas…
82 …<Annotation Term="OData.Description" String="An indication of whether UEFI Secure Boot is enabled.…
83 …property shall indicate whether the UEFI Secure Boot takes effect on next boot. This property can…
87 …<Annotation Term="OData.Description" String="The UEFI Secure Boot state during the current boot cy…
88 …<Annotation Term="OData.LongDescription" String="This property shall indicate the UEFI Secure Boot…
[all …]
H A DSecureBootDatabase_v1.xml40 …m="OData.Description" String="The `SecureBootDatabase` schema describes a UEFI Secure Boot databas…
41 …OData.LongDescription" String="This resource shall be used to represent a UEFI Secure Boot databas…
67 …<Annotation Term="OData.Description" String="This action is used to reset the UEFI Secure Boot key…
68UEFI Secure Boot key database. The `ResetAllKeysToDefault` value shall reset this UEFI Secure Boo…
71 …OData.Description" String="The type of reset or delete to perform on this UEFI Secure Boot databas…
72 …is parameter shall specify the type of reset or delete to perform on this UEFI Secure Boot databas…
84 …<Annotation Term="OData.Description" String="This property contains the name of the UEFI Secure Bo…
85 …name of the UEFI Secure Boot database. This property shall contain the same value as the `Id` pro…
93 …ption" String="A link to the collection of certificates contained in this UEFI Secure Boot databas…
99 …ription" String="A link to the collection of signatures contained in this UEFI Secure Boot databas…
[all …]
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/
H A Dpython3-uefi-firmware_1.12.bb1 SUMMARY = "Various data structures and parsing tools for UEFI firmware."
2 DESCRIPTION = "This package contains Python UEFI firmware parser tool. The \
3 UEFI firmware parser is a simple module and set of scripts for parsing, \
4 extracting, and recreating UEFI firmware volumes. This includes parsing \
6 HOMEPAGE = "https://github.com/theopolis/uefi-firmware-parser"
10 SRC_URI = "git://github.com/theopolis/uefi-firmware-parser;protocol=https;branch=master"
/openbmc/qemu/tests/uefi-test-tools/
H A DMakefile1 # Makefile for the test helper UEFI applications that run in guests.
14 images_dir := ../data/uefi-boot-images
27 # to the UEFI source code. Normally, the intermediate files would have been
29 # from the unchanged UEFI sources. Unfortunately, the "mkdosfs" and
48 # Embed the "UEFI system partition" into an ISO9660 file system as an ElTorito
55 # *short* UEFI architecture identifiers. Periods are allowed in, and ultimately
64 # Format a "UEFI system partition", using the UEFI binary as the default boot
67 # after the UEFI binary. (Excess characters are automatically dropped from the
81 # association between the UEFI binary (such as "bios-tables-test") and the
100 $(PYTHON) ../../roms/edk2-build.py --config uefi-test-build.config \
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/
H A Dts-uefi-test_git.bb1 DESCRIPTION = "Trusted Services uefi-test deployment for arm-linux. \
3 on an Arm platform with real deployments of UEFI SMM services."
12 OECMAKE_SOURCEPATH = "${S}/deployments/uefi-test/${TS_ENV}"
14 FILES:${PN} = "${bindir}/uefi-test"
18 mv ${D}${TS_INSTALL}/bin/uefi-test ${D}${bindir}
/openbmc/u-boot/lib/efi_loader/
H A Defi_device_path_utilities.c21 * See the Unified Extensible Firmware Interface (UEFI) specification
45 * The UEFI spec does not indicate what happens to the end tag. We follow the
49 * See the Unified Extensible Firmware Interface (UEFI) specification
68 * See the Unified Extensible Firmware Interface (UEFI) specification
89 * See the Unified Extensible Firmware Interface (UEFI) specification
110 * See the Unified Extensible Firmware Interface (UEFI) specification
132 * See the Unified Extensible Firmware Interface (UEFI) specification
154 * See the Unified Extensible Firmware Interface (UEFI) specification
174 * See the Unified Extensible Firmware Interface (UEFI) specification
/openbmc/linux/drivers/firmware/efi/libstub/
H A Dfdt.c71 * Delete all memory reserve map entries. When booting via UEFI, in update_fdt()
72 * kernel will use the UEFI memory map to find reserved regions. in update_fdt()
99 status = fdt_setprop_var(fdt, node, "linux,uefi-system-table", fdt_val64); in update_fdt()
105 status = fdt_setprop_var(fdt, node, "linux,uefi-mmap-start", fdt_val64); in update_fdt()
111 status = fdt_setprop_var(fdt, node, "linux,uefi-mmap-size", fdt_val32); in update_fdt()
115 status = fdt_setprop_var(fdt, node, "linux,uefi-mmap-desc-size", fdt_val32); in update_fdt()
119 status = fdt_setprop_var(fdt, node, "linux,uefi-mmap-desc-ver", fdt_val32); in update_fdt()
159 err = fdt_setprop_inplace_var(fdt, node, "linux,uefi-mmap-start", fdt_val64); in update_fdt_memmap()
165 err = fdt_setprop_inplace_var(fdt, node, "linux,uefi-mmap-size", fdt_val32); in update_fdt_memmap()
171 err = fdt_setprop_inplace_var(fdt, node, "linux,uefi-mmap-desc-size", fdt_val32); in update_fdt_memmap()
[all …]
/openbmc/linux/include/linux/
H A Dcper.h3 * UEFI Common Platform Error Record
30 * defined in the UEFI spec because some of them don't make any sense.)
57 * in the UEFI spec v2.7, sec N.2.1.
150 * cper_section_descriptor. These UUIDs are defined in the UEFI spec
323 /* Record Header, UEFI v2.7 sec N.2.1 */
343 /* Section Descriptor, UEFI v2.7 sec N.2.2 */
359 /* Generic Processor Error Section, UEFI v2.7 sec N.2.4.1 */
378 /* IA32/X64 Processor Error Section, UEFI v2.7 sec N.2.4.2 */
385 /* IA32/X64 Processor Error Information Structure, UEFI v2.7 sec N.2.4.2.1 */
396 /* IA32/X64 Processor Context Information Structure, UEFI v2.7 sec N.2.4.2.2 */
[all …]
/openbmc/linux/Documentation/riscv/
H A Dboot.rst41 as per the devicetree specification and/or the UEFI specification.
56 using the ``$a1`` register, or when booting with UEFI, it can be passed using the
77 UEFI section in Pre-kernel Requirements and Constraints
80 UEFI memory map argument
83 When booting with UEFI, the RISC-V kernel will use only the EFI memory map to
86 The UEFI firmware must parse the subnodes of the ``/reserved-memory`` devicetree
89 (refer to section "3.5.4 /reserved-memory and UEFI" of the devicetree
95 When booting with UEFI, the EFI stub requires the boot hartid in order to pass argument
113 When booting with UEFI, the devicetree is supplemented (or created) by the EFI
115 "UEFI kernel support on ARM" in Documentation/arch/arm/uefi.rst.
/openbmc/linux/drivers/net/wireless/intel/iwlwifi/fw/
H A Duefi.c11 #include "fw/uefi.h"
68 "PNVM UEFI variable not found 0x%lx (len %lu)\n", in iwl_uefi_get_pnvm()
73 IWL_DEBUG_FW(trans, "Read PNVM from UEFI with size %lu\n", package_size); in iwl_uefi_get_pnvm()
238 "Reduced Power UEFI variable not found 0x%lx (len %lu)\n", in iwl_uefi_get_reduced_power()
245 "Invalid Reduced Power UEFI variable len (%lu)\n", in iwl_uefi_get_reduced_power()
251 IWL_DEBUG_FW(trans, "Read reduced power from UEFI with size %lu\n", in iwl_uefi_get_reduced_power()
297 "STEP UEFI variable not found 0x%lx\n", in iwl_uefi_get_step_table()
304 "Invalid STEP table UEFI variable len (%lu)\n", in iwl_uefi_get_step_table()
310 IWL_DEBUG_FW(trans, "Read STEP from UEFI with size %lu\n", in iwl_uefi_get_step_table()
368 "SGOM UEFI variable not found 0x%lx\n", in iwl_uefi_get_sgom_table()
[all …]

12345678910>>...18