/openbmc/linux/Documentation/admin-guide/ |
H A D | efi-stub.rst | 2 The EFI Boot Stub 5 On the x86 and ARM platforms, a kernel zImage/bzImage can masquerade 6 as a PE/COFF image, thereby convincing EFI firmware loaders to load 7 it as an EFI executable. The code that modifies the bzImage header, 8 along with the EFI-specific entry point that the firmware loader 9 jumps to are collectively known as the "EFI boot stub", and live in 10 arch/x86/boot/header.S and drivers/firmware/efi/libstub/x86-stub.c, 11 respectively. For ARM the EFI stub is implemented in 12 arch/arm/boot/compressed/efi-header.S and 13 drivers/firmware/efi/libstub/arm32-stub.c. EFI stub code that is shared [all …]
|
/openbmc/openbmc/poky/meta/recipes-bsp/gnu-efi/ |
H A D | gnu-efi_4.0.0.bb | 1 SUMMARY = "Libraries for producing EFI binaries" 2 HOMEPAGE = "http://sourceforge.net/projects/gnu-efi/" 3 …GNU-EFI aims to Develop EFI applications for ARM-64, ARM-32, x86_64, IA-64 (IPF), IA-32 (x86), and… 5 LICENSE = "GPL-2.0-or-later & BSD-2-Clause" 6 LIC_FILES_CHKSUM = "file://gnuefi/crt0-efi-arm.S;beginline=4;endline=16;md5=8b0a86085b86eda7a3c7e8a… 7 … file://gnuefi/crt0-efi-aarch64.S;beginline=4;endline=16;md5=8b0a86085b86eda7a3c7e8a1eb7ec753 \ 9 … file://lib/arm/math.c;beginline=2;endline=15;md5=ccb5c6b51053d1ee7277539ec38513d7 \ 10 … file://lib/arm/initplat.c;beginline=2;endline=15;md5=ccb5c6b51053d1ee7277539ec38513d7 \ 15 COMPATIBLE_HOST = "(x86_64.*|i.86.*|aarch64.*|arm.*|riscv64.*)-linux" 18 SRC_URI = "git://github.com/ncroxon/gnu-efi;protocol=https;branch=master \ [all …]
|
/openbmc/qemu/tests/uefi-test-tools/ |
H A D | uefi-test-build.config | 5 # arm 7 [build.arm] 11 arch = ARM 12 cpy1 = ARM/BiosTablesTest.efi bios-tables-test.arm.efi 22 cpy1 = AARCH64/BiosTablesTest.efi bios-tables-test.aarch64.efi 32 cpy1 = RISCV64/BiosTablesTest.efi bios-tables-test.riscv64.efi 42 cpy1 = IA32/BiosTablesTest.efi bios-tables-test.i386.efi 52 cpy1 = X64/BiosTablesTest.efi bios-tables-test.x86_64.efi
|
H A D | Makefile | 8 # <http://opensource.org/licenses/bsd-license.php>. 14 images_dir := ../data/uefi-boot-images 15 emulation_targets := arm aarch64 i386 x86_64 riscv64 16 uefi_binaries := bios-tables-test 17 intermediate_suffixes := .efi .fat .iso.raw 24 # - Intermediate targets help with development & debugging. 25 # - Preserving intermediate targets also keeps spurious changes out of the 26 # final build products, in case the user re-runs "make" without any changes 28 # removed by the last "make" invocation, hence the re-run would rebuild them 30 # "genisoimage" utilities embed timestamp-based information in their outputs, [all …]
|
/openbmc/linux/drivers/firmware/efi/ |
H A D | Makefile | 1 # SPDX-License-Identifier: GPL-2.0 7 # ARM64 maps efi runtime services in userspace addresses 11 KASAN_SANITIZE_runtime-wrappers.o := n 13 obj-$(CONFIG_ACPI_BGRT) += efi-bgrt.o 14 obj-$(CONFIG_EFI) += efi.o vars.o reboot.o memattr.o tpm.o 15 obj-$(CONFIG_EFI) += memmap.o 17 obj-$(CONFIG_EFI) += capsule.o 19 obj-$(CONFIG_EFI_PARAMS_FROM_FDT) += fdtparams.o 20 obj-$(CONFIG_EFI_ESRT) += esrt.o 21 obj-$(CONFIG_EFI_VARS_PSTORE) += efi-pstore.o [all …]
|
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 2 menu "EFI (Extensible Firmware Interface) Support" 3 depends on EFI 7 depends on EFI && !IA64 18 else supported by pstore to EFI variables. 30 bool "Reserve EFI Specific Purpose Memory" 31 depends on EFI && EFI_STUB && ACPI_HMAT 34 On systems that have mixed performance classes of memory EFI 40 and its base EFI memory type is "conventional" answer Y to 42 resource, and set aside for direct-access (device-dax) by [all …]
|
/openbmc/u-boot/ |
H A D | .travis.yml | 1 # SPDX-License-Identifier: GPL-2.0+ 4 # build U-Boot on Travis CI - https://travis-ci.org/ 14 - ubuntu-toolchain-r-test 15 - llvm-toolchain-trusty-7 17 - cppcheck 18 - sloccount 19 - sparse 20 - bc 21 - build-essential 22 - libsdl1.2-dev [all …]
|
/openbmc/openbmc/poky/meta/conf/ |
H A D | image-uefi.conf | 1 # Location of EFI files inside EFI System Partition 2 EFIDIR ?= "/EFI/BOOT" 4 # Location of UKI inside EFI System Partition 5 EFI_UKI_DIR ?= "/EFI/Linux" 15 # The EFI name for the architecture 18 EFI_ARCH:x86-64 = "x64" 20 EFI_ARCH:arm = "arm" 26 EFI_BOOT_IMAGE ?= "boot${EFI_ARCH}.efi"
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/ |
H A D | u-boot-corstone1000.inc | 1 # Corstone1000 specific U-boot support 3 DEPENDS:append = " openssl-native efitools-native" 4 CORSTONE1000_DEVICE_TREE:corstone1000-mps3 = "corstone1000-mps3" 5 CORSTONE1000_DEVICE_TREE:corstone1000-fvp = "corstone1000-fvp" 8 UBOOT_CONFIG ??= "EFI" 9 UBOOT_CONFIG[EFI] = "corstone1000_defconfig" 13 UBOOT_ARCH = "arm" 19 file://0001-FF-A-v15-arm64-smccc-add-support-for-SMCCCv1.2-x0-x1.patch \ 20 file://0002-FF-A-v15-lib-uuid-introduce-uuid_str_to_le_bin-funct.patch \ 21 file://0003-FF-A-v15-lib-uuid-introduce-testcase-for-uuid_str_to.patch \ [all …]
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot/corstone1000/ |
H A D | 0009-FF-A-v15-arm_ffa-efi-introduce-FF-A-MM-communication.patch | 2 From: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com> 4 Subject: [PATCH] FF-A v15: arm_ffa: efi: introduce FF-A MM communication 6 Add MM communication support using FF-A transport 9 EFI MM communication protocol. MM partitions such as StandAlonneMM 10 or smm-gateway secure partitions which reside in secure world. 15 The data is used by EFI services such as GetVariable()/SetVariable() 19 MM shared buffer by an FF-A message (door bell). 25 consumed by the EFI subsystem. 27 MM communication protocol supports FF-A 64-bit direct messaging. 29 Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com> [all …]
|
H A D | 0030-Enable-EFI-set-get-time-services.patch | 2 From: Gowtham Suresh Kumar <gowtham.sureshkumar@arm.com> 4 Subject: [PATCH] Enable EFI set/get time services 8 CONFIG_EFI_GET_TIME config values are added to enable these EFI 11 Upstream-Status: Pending [Not submitted to upstream yet] 12 Signed-off-by: Gowtham Suresh Kumar <gowtham.sureshkumar@arm.com> 13 Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com> 14 --- 15 configs/corstone1000_defconfig | 4 +++- 16 1 file changed, 3 insertions(+), 1 deletion(-) 18 diff --git a/configs/corstone1000_defconfig b/configs/corstone1000_defconfig [all …]
|
H A D | 0010-FF-A-v15-arm_ffa-efi-corstone1000-enable-MM-communic.patch | 2 From: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com> 4 Subject: [PATCH] FF-A v15: arm_ffa: efi: corstone1000: enable MM communication 6 turn on EFI MM communication 8 On corstone1000 platform MM communication between u-boot 9 and the secure world (Optee) is done using the FF-A bus. 11 Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com> 12 Upstream-Status: Submitted [cover letter: https://lore.kernel.org/all/20230713132847.176000-1-abdel… 13 --- 17 diff --git a/configs/corstone1000_defconfig b/configs/corstone1000_defconfig 19 --- a/configs/corstone1000_defconfig [all …]
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/files/corstone1000/ |
H A D | 0006-Platform-CS1000-Increase-buffers-for-EFI-vars.patch | 2 From: Bence Balogh <bence.balogh@arm.com> 4 Subject: [PATCH 6/9] Platform: CS1000: Increase buffers for EFI vars 10 - The PS_MAX_ASSET_SIZE needs to be big enough to store the variables. 11 - The CRYPTO_ENGINE_BUF_SIZE needs to be increased because the encryption 13 - The CRYPTO_IOVEC_BUFFER_SIZE needs to be increased because the PS 17 Signed-off-by: Bence Balogh <bence.balogh@arm.com> 18 Upstream-Status: Backport [8ca9620a000ba182ebb51c51f49e2b97622f3404] 19 --- 20 platform/ext/target/arm/corstone1000/config_tfm_target.h | 8 ++++++++ 23 diff --git a/platform/ext/target/arm/corstone1000/config_tfm_target.h b/platform/ext/target/arm/cor… [all …]
|
H A D | 0005-Platform-CS1000-Increase-RSE_COMMS-buffer-size.patch | 2 From: Bence Balogh <bence.balogh@arm.com> 10 Signed-off-by: Bence Balogh <bence.balogh@arm.com> 11 Upstream-Status: Backport [85e7e9f52177c9617b8554fbacac34c8c591f549] 12 --- 13 .../ext/target/arm/corstone1000/rse_comms/rse_comms.h | 9 +++++++-- 14 1 file changed, 7 insertions(+), 2 deletions(-) 16 diff --git a/platform/ext/target/arm/corstone1000/rse_comms/rse_comms.h b/platform/ext/target/arm/c… 18 --- a/platform/ext/target/arm/corstone1000/rse_comms/rse_comms.h 19 +++ b/platform/ext/target/arm/corstone1000/rse_comms/rse_comms.h 20 @@ -15,8 +15,13 @@ [all …]
|
/openbmc/linux/drivers/firmware/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 4 # see Documentation/kbuild/kconfig-language.rst. 12 tristate "ARM System Control and Power Interface (SCPI) Message Protocol" 13 depends on ARM || ARM64 || COMPILE_TEST 19 provides a mechanism for inter-processor communication between SCP 41 bool "ARM Software Delegated Exception Interface (SDEI)" 45 The Software Delegated Exception Interface (SDEI) is an ARM 71 bool "Add firmware-provided memory map to sysfs" if EXPERT 74 Add the firmware-provided (unmodified) memory map to /sys/firmware/memmap. 78 See also Documentation/ABI/testing/sysfs-firmware-memmap. [all …]
|
/openbmc/qemu/pc-bios/ |
H A D | meson.build | 4 'edk2-aarch64-code.fd', 5 'edk2-arm-code.fd', 6 'edk2-arm-vars.fd', 7 'edk2-riscv-code.fd', 8 'edk2-riscv-vars.fd', 9 'edk2-i386-code.fd', 10 'edk2-i386-secure-code.fd', 11 'edk2-i386-vars.fd', 12 'edk2-x86_64-code.fd', 13 'edk2-x86_64-secure-code.fd', [all …]
|
/openbmc/linux/drivers/firmware/efi/libstub/ |
H A D | efi-stub.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * EFI stub implementation that is shared by arm and arm64 architectures. 4 * This should be #included by the EFI stub implementation files. 12 #include <linux/efi.h> 13 #include <asm/efi.h> 21 * For ARM/ARM64: 24 * The value chosen is the largest non-zero power of 2 suitable for this purpose 25 * both on 32-bit and 64-bit ARM CPUs, to maximize the likelihood that it can 27 * Since 32-bit ARM could potentially execute with a 1G/3G user/kernel split, 31 * For RISC-V: [all …]
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/conf/machine/ |
H A D | sgi575.conf | 1 # Configuration for Arm SGI575 development board 7 require conf/machine/include/arm/armv8-2a/tune-cortexa75.inc 9 PREFERRED_VERSION_trusted-firmware-a ?= "2.11.%" 11 EXTRA_IMAGEDEPENDS += "virtual/control-processor-firmware" 13 EXTRA_IMAGEDEPENDS += "trusted-firmware-a" 16 PREFERRED_PROVIDER_virtual/kernel ?= "linux-yocto" 19 #grub-efi 20 EFI_PROVIDER ?= "grub-efi" 21 MACHINE_FEATURES += "efi" 25 WKS_FILE ?= "sgi575-efidisk.wks"
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/ |
H A D | user-guide.rst | 2 # Copyright (c) 2022-2024, Arm Limited. 4 # SPDX-License-Identifier: MIT 11 ------ 12 The Corstone-1000 software stack uses the `Yocto Project <https://www.yoctoproject.org/>`__ to build 13 a tiny Linux distribution suitable for the Corstone-1000 platform (kernel and initramfs filesystem … 14 The Yocto Project relies on the `BitBake <https://docs.yoctoproject.org/bitbake.html#bitbake-docume… 19 ------------- 26 - Git 1.8.3.1 or greater. 27 - Python 3.8.0 or greater. 28 - GNU Tar 1.28 or greater. [all …]
|
/openbmc/openbmc/poky/meta/recipes-bsp/grub/ |
H A D | grub-efi_2.12.bb | 3 require conf/image-uefi.conf 5 GRUBPLATFORM = "efi" 7 DEPENDS:append = " grub-native" 8 RDEPENDS:${PN} = "grub-common virtual-grub-bootconf" 14 S = "${WORKDIR}/grub-${PV}" 20 prefix = "" if d.getVar('EFI_PROVIDER') == "grub-efi" else "grub-efi-" 27 elif re.match('arm', target): 28 grubtarget = 'arm' 34 raise bb.parse.SkipRecipe("grub-efi is incompatible with target %s" % target) 38 prefix = "grub-efi-" if prefix == "" else "" [all …]
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/conf/machine/include/ |
H A D | corstone1000.inc | 1 require conf/machine/include/arm/armv8a/tune-cortexa35.inc 5 # TF-M 6 PREFERRED_VERSION_trusted-firmware-m ?= "2.1.%" 8 # TF-A 10 PREFERRED_VERSION_trusted-firmware-a ?= "2.11.%" 11 PREFERRED_VERSION_tf-a-tests ?= "2.10.%" 13 TFA_BL2_BINARY = "bl2-corstone1000.bin" 14 TFA_FIP_BINARY = "fip-corstone1000.bin" 17 PREFERRED_VERSION_optee-os ?= "4.3.%" 20 TS_PLATFORM = "arm/corstone1000" [all …]
|
/openbmc/u-boot/doc/ |
H A D | README.uefi | 1 <!-- 2 SPDX-License-Identifier: GPL-2.0+ 5 --> 7 # UEFI on U-Boot 17 The implementation of UEFI in U-Boot strives to reach the minimum requirements 18 described in "Server Base Boot Requirements System Software on ARM Platforms - 21 A full blown UEFI implementation would contradict the U-Boot design principle 26 The UEFI standard supports only little-endian systems. The UEFI support can be 27 activated for ARM and x86 by specifying 47 * image address - the memory address of the UEFI binary [all …]
|
H A D | README.u-boot_on_efi | 1 # SPDX-License-Identifier: GPL-2.0+ 5 U-Boot on EFI 7 This document provides information about U-Boot running on top of EFI, either 8 as an application or just as a means of getting U-Boot onto a new platform. 18 EFI Application 19 EFI Payload 22 32/64-bit 28 ---------- 29 Running U-Boot on EFI is useful in several situations: 31 - You have EFI running on a board but U-Boot does not natively support it [all …]
|
/openbmc/u-boot/arch/arm/lib/ |
H A D | crt0_arm_efi.S | 1 /* SPDX-License-Identifier: GPL-2.0+ OR BSD-2-Clause */ 3 * crt0-efi-arm.S - PE/COFF header for ARM EFI applications 7 * This file is taken and modified from the gnu-efi project. 10 #include <asm-generic/pe.h> 21 .long pe_header - image_base /* Offset to the PE header */ 26 .short 0x1c2 /* Mixed ARM/Thumb */ 31 .short section_table - optional_header /* SizeOfOptionalHeader */ 42 .long _edata - _start /* SizeOfCode */ 45 .long _start - image_base /* AddressOfEntryPoint */ 46 .long _start - image_base /* BaseOfCode */ [all …]
|
/openbmc/linux/Documentation/arch/arm/ |
H A D | uefi.rst | 7 maintained by the UEFI Forum - http://www.uefi.org/. 9 UEFI is an evolution of its predecessor 'EFI', so the terms EFI and 11 source code. As a rule, anything new uses 'UEFI', whereas 'EFI' refers 19 - UEFI Runtime Services 20 - Retrieving various configuration information through the standardised 23 For actually enabling [U]EFI support, enable: 25 - CONFIG_EFI=y 26 - CONFIG_EFIVAR_FS=y or m 29 in a Flattened Device Tree (FDT) - so is only available with CONFIG_OF. 39 booting in non-UEFI environments. [all …]
|