Home
last modified time | relevance | path

Searched +full:arm +full:- +full:efi (Results 1 – 25 of 178) sorted by relevance

12345678

/openbmc/linux/Documentation/admin-guide/
H A Defi-stub.rst2 The EFI Boot Stub
5 On the x86 and ARM platforms, a kernel zImage/bzImage can masquerade
6 as a PE/COFF image, thereby convincing EFI firmware loaders to load
7 it as an EFI executable. The code that modifies the bzImage header,
8 along with the EFI-specific entry point that the firmware loader
9 jumps to are collectively known as the "EFI boot stub", and live in
10 arch/x86/boot/header.S and drivers/firmware/efi/libstub/x86-stub.c,
11 respectively. For ARM the EFI stub is implemented in
12 arch/arm/boot/compressed/efi-header.S and
13 drivers/firmware/efi/libstub/arm32-stub.c. EFI stub code that is shared
[all …]
/openbmc/openbmc/poky/meta/recipes-bsp/gnu-efi/
H A Dgnu-efi_4.0.0.bb1 SUMMARY = "Libraries for producing EFI binaries"
2 HOMEPAGE = "http://sourceforge.net/projects/gnu-efi/"
3 …GNU-EFI aims to Develop EFI applications for ARM-64, ARM-32, x86_64, IA-64 (IPF), IA-32 (x86), and…
5 LICENSE = "GPL-2.0-or-later & BSD-2-Clause"
6 LIC_FILES_CHKSUM = "file://gnuefi/crt0-efi-arm.S;beginline=4;endline=16;md5=8b0a86085b86eda7a3c7e8a…
7 … file://gnuefi/crt0-efi-aarch64.S;beginline=4;endline=16;md5=8b0a86085b86eda7a3c7e8a1eb7ec753 \
9 … file://lib/arm/math.c;beginline=2;endline=15;md5=ccb5c6b51053d1ee7277539ec38513d7 \
10 … file://lib/arm/initplat.c;beginline=2;endline=15;md5=ccb5c6b51053d1ee7277539ec38513d7 \
15 COMPATIBLE_HOST = "(x86_64.*|i.86.*|aarch64.*|arm.*|riscv64.*)-linux"
18 SRC_URI = "git://github.com/ncroxon/gnu-efi;protocol=https;branch=master \
[all …]
/openbmc/qemu/tests/uefi-test-tools/
H A Duefi-test-build.config5 # arm
7 [build.arm]
11 arch = ARM
12 cpy1 = ARM/BiosTablesTest.efi bios-tables-test.arm.efi
22 cpy1 = AARCH64/BiosTablesTest.efi bios-tables-test.aarch64.efi
32 cpy1 = RISCV64/BiosTablesTest.efi bios-tables-test.riscv64.efi
42 cpy1 = IA32/BiosTablesTest.efi bios-tables-test.i386.efi
52 cpy1 = X64/BiosTablesTest.efi bios-tables-test.x86_64.efi
H A DMakefile8 # <http://opensource.org/licenses/bsd-license.php>.
14 images_dir := ../data/uefi-boot-images
15 emulation_targets := arm aarch64 i386 x86_64 riscv64
16 uefi_binaries := bios-tables-test
17 intermediate_suffixes := .efi .fat .iso.raw
24 # - Intermediate targets help with development & debugging.
25 # - Preserving intermediate targets also keeps spurious changes out of the
26 # final build products, in case the user re-runs "make" without any changes
28 # removed by the last "make" invocation, hence the re-run would rebuild them
30 # "genisoimage" utilities embed timestamp-based information in their outputs,
[all …]
/openbmc/linux/drivers/firmware/efi/
H A DMakefile1 # SPDX-License-Identifier: GPL-2.0
7 # ARM64 maps efi runtime services in userspace addresses
11 KASAN_SANITIZE_runtime-wrappers.o := n
13 obj-$(CONFIG_ACPI_BGRT) += efi-bgrt.o
14 obj-$(CONFIG_EFI) += efi.o vars.o reboot.o memattr.o tpm.o
15 obj-$(CONFIG_EFI) += memmap.o
17 obj-$(CONFIG_EFI) += capsule.o
19 obj-$(CONFIG_EFI_PARAMS_FROM_FDT) += fdtparams.o
20 obj-$(CONFIG_EFI_ESRT) += esrt.o
21 obj-$(CONFIG_EFI_VARS_PSTORE) += efi-pstore.o
[all …]
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
2 menu "EFI (Extensible Firmware Interface) Support"
3 depends on EFI
7 depends on EFI && !IA64
18 else supported by pstore to EFI variables.
30 bool "Reserve EFI Specific Purpose Memory"
31 depends on EFI && EFI_STUB && ACPI_HMAT
34 On systems that have mixed performance classes of memory EFI
40 and its base EFI memory type is "conventional" answer Y to
42 resource, and set aside for direct-access (device-dax) by
[all …]
/openbmc/u-boot/
H A D.travis.yml1 # SPDX-License-Identifier: GPL-2.0+
4 # build U-Boot on Travis CI - https://travis-ci.org/
14 - ubuntu-toolchain-r-test
15 - llvm-toolchain-trusty-7
17 - cppcheck
18 - sloccount
19 - sparse
20 - bc
21 - build-essential
22 - libsdl1.2-dev
[all …]
/openbmc/openbmc/poky/meta/conf/
H A Dimage-uefi.conf1 # Location of EFI files inside EFI System Partition
2 EFIDIR ?= "/EFI/BOOT"
4 # Location of UKI inside EFI System Partition
5 EFI_UKI_DIR ?= "/EFI/Linux"
15 # The EFI name for the architecture
18 EFI_ARCH:x86-64 = "x64"
20 EFI_ARCH:arm = "arm"
26 EFI_BOOT_IMAGE ?= "boot${EFI_ARCH}.efi"
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/
H A Du-boot-corstone1000.inc1 # Corstone1000 specific U-boot support
3 DEPENDS:append = " openssl-native efitools-native"
4 CORSTONE1000_DEVICE_TREE:corstone1000-mps3 = "corstone1000-mps3"
5 CORSTONE1000_DEVICE_TREE:corstone1000-fvp = "corstone1000-fvp"
8 UBOOT_CONFIG ??= "EFI"
9 UBOOT_CONFIG[EFI] = "corstone1000_defconfig"
13 UBOOT_ARCH = "arm"
19 file://0001-FF-A-v15-arm64-smccc-add-support-for-SMCCCv1.2-x0-x1.patch \
20 file://0002-FF-A-v15-lib-uuid-introduce-uuid_str_to_le_bin-funct.patch \
21 file://0003-FF-A-v15-lib-uuid-introduce-testcase-for-uuid_str_to.patch \
[all …]
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot/corstone1000/
H A D0009-FF-A-v15-arm_ffa-efi-introduce-FF-A-MM-communication.patch2 From: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>
4 Subject: [PATCH] FF-A v15: arm_ffa: efi: introduce FF-A MM communication
6 Add MM communication support using FF-A transport
9 EFI MM communication protocol. MM partitions such as StandAlonneMM
10 or smm-gateway secure partitions which reside in secure world.
15 The data is used by EFI services such as GetVariable()/SetVariable()
19 MM shared buffer by an FF-A message (door bell).
25 consumed by the EFI subsystem.
27 MM communication protocol supports FF-A 64-bit direct messaging.
29 Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>
[all …]
H A D0030-Enable-EFI-set-get-time-services.patch2 From: Gowtham Suresh Kumar <gowtham.sureshkumar@arm.com>
4 Subject: [PATCH] Enable EFI set/get time services
8 CONFIG_EFI_GET_TIME config values are added to enable these EFI
11 Upstream-Status: Pending [Not submitted to upstream yet]
12 Signed-off-by: Gowtham Suresh Kumar <gowtham.sureshkumar@arm.com>
13 Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>
14 ---
15 configs/corstone1000_defconfig | 4 +++-
16 1 file changed, 3 insertions(+), 1 deletion(-)
18 diff --git a/configs/corstone1000_defconfig b/configs/corstone1000_defconfig
[all …]
H A D0010-FF-A-v15-arm_ffa-efi-corstone1000-enable-MM-communic.patch2 From: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>
4 Subject: [PATCH] FF-A v15: arm_ffa: efi: corstone1000: enable MM communication
6 turn on EFI MM communication
8 On corstone1000 platform MM communication between u-boot
9 and the secure world (Optee) is done using the FF-A bus.
11 Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>
12 Upstream-Status: Submitted [cover letter: https://lore.kernel.org/all/20230713132847.176000-1-abdel…
13 ---
17 diff --git a/configs/corstone1000_defconfig b/configs/corstone1000_defconfig
19 --- a/configs/corstone1000_defconfig
[all …]
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/files/corstone1000/
H A D0006-Platform-CS1000-Increase-buffers-for-EFI-vars.patch2 From: Bence Balogh <bence.balogh@arm.com>
4 Subject: [PATCH 6/9] Platform: CS1000: Increase buffers for EFI vars
10 - The PS_MAX_ASSET_SIZE needs to be big enough to store the variables.
11 - The CRYPTO_ENGINE_BUF_SIZE needs to be increased because the encryption
13 - The CRYPTO_IOVEC_BUFFER_SIZE needs to be increased because the PS
17 Signed-off-by: Bence Balogh <bence.balogh@arm.com>
18 Upstream-Status: Backport [8ca9620a000ba182ebb51c51f49e2b97622f3404]
19 ---
20 platform/ext/target/arm/corstone1000/config_tfm_target.h | 8 ++++++++
23 diff --git a/platform/ext/target/arm/corstone1000/config_tfm_target.h b/platform/ext/target/arm/cor…
[all …]
H A D0005-Platform-CS1000-Increase-RSE_COMMS-buffer-size.patch2 From: Bence Balogh <bence.balogh@arm.com>
10 Signed-off-by: Bence Balogh <bence.balogh@arm.com>
11 Upstream-Status: Backport [85e7e9f52177c9617b8554fbacac34c8c591f549]
12 ---
13 .../ext/target/arm/corstone1000/rse_comms/rse_comms.h | 9 +++++++--
14 1 file changed, 7 insertions(+), 2 deletions(-)
16 diff --git a/platform/ext/target/arm/corstone1000/rse_comms/rse_comms.h b/platform/ext/target/arm/c…
18 --- a/platform/ext/target/arm/corstone1000/rse_comms/rse_comms.h
19 +++ b/platform/ext/target/arm/corstone1000/rse_comms/rse_comms.h
20 @@ -15,8 +15,13 @@
[all …]
/openbmc/linux/drivers/firmware/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
4 # see Documentation/kbuild/kconfig-language.rst.
12 tristate "ARM System Control and Power Interface (SCPI) Message Protocol"
13 depends on ARM || ARM64 || COMPILE_TEST
19 provides a mechanism for inter-processor communication between SCP
41 bool "ARM Software Delegated Exception Interface (SDEI)"
45 The Software Delegated Exception Interface (SDEI) is an ARM
71 bool "Add firmware-provided memory map to sysfs" if EXPERT
74 Add the firmware-provided (unmodified) memory map to /sys/firmware/memmap.
78 See also Documentation/ABI/testing/sysfs-firmware-memmap.
[all …]
/openbmc/qemu/pc-bios/
H A Dmeson.build4 'edk2-aarch64-code.fd',
5 'edk2-arm-code.fd',
6 'edk2-arm-vars.fd',
7 'edk2-riscv-code.fd',
8 'edk2-riscv-vars.fd',
9 'edk2-i386-code.fd',
10 'edk2-i386-secure-code.fd',
11 'edk2-i386-vars.fd',
12 'edk2-x86_64-code.fd',
13 'edk2-x86_64-secure-code.fd',
[all …]
/openbmc/linux/drivers/firmware/efi/libstub/
H A Defi-stub.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * EFI stub implementation that is shared by arm and arm64 architectures.
4 * This should be #included by the EFI stub implementation files.
12 #include <linux/efi.h>
13 #include <asm/efi.h>
21 * For ARM/ARM64:
24 * The value chosen is the largest non-zero power of 2 suitable for this purpose
25 * both on 32-bit and 64-bit ARM CPUs, to maximize the likelihood that it can
27 * Since 32-bit ARM could potentially execute with a 1G/3G user/kernel split,
31 * For RISC-V:
[all …]
/openbmc/openbmc/meta-arm/meta-arm-bsp/conf/machine/
H A Dsgi575.conf1 # Configuration for Arm SGI575 development board
7 require conf/machine/include/arm/armv8-2a/tune-cortexa75.inc
9 PREFERRED_VERSION_trusted-firmware-a ?= "2.11.%"
11 EXTRA_IMAGEDEPENDS += "virtual/control-processor-firmware"
13 EXTRA_IMAGEDEPENDS += "trusted-firmware-a"
16 PREFERRED_PROVIDER_virtual/kernel ?= "linux-yocto"
19 #grub-efi
20 EFI_PROVIDER ?= "grub-efi"
21 MACHINE_FEATURES += "efi"
25 WKS_FILE ?= "sgi575-efidisk.wks"
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/
H A Duser-guide.rst2 # Copyright (c) 2022-2024, Arm Limited.
4 # SPDX-License-Identifier: MIT
11 ------
12 The Corstone-1000 software stack uses the `Yocto Project <https://www.yoctoproject.org/>`__ to build
13 a tiny Linux distribution suitable for the Corstone-1000 platform (kernel and initramfs filesystem …
14 The Yocto Project relies on the `BitBake <https://docs.yoctoproject.org/bitbake.html#bitbake-docume…
19 -------------
26 - Git 1.8.3.1 or greater.
27 - Python 3.8.0 or greater.
28 - GNU Tar 1.28 or greater.
[all …]
/openbmc/openbmc/poky/meta/recipes-bsp/grub/
H A Dgrub-efi_2.12.bb3 require conf/image-uefi.conf
5 GRUBPLATFORM = "efi"
7 DEPENDS:append = " grub-native"
8 RDEPENDS:${PN} = "grub-common virtual-grub-bootconf"
14 S = "${WORKDIR}/grub-${PV}"
20 prefix = "" if d.getVar('EFI_PROVIDER') == "grub-efi" else "grub-efi-"
27 elif re.match('arm', target):
28 grubtarget = 'arm'
34 raise bb.parse.SkipRecipe("grub-efi is incompatible with target %s" % target)
38 prefix = "grub-efi-" if prefix == "" else ""
[all …]
/openbmc/openbmc/meta-arm/meta-arm-bsp/conf/machine/include/
H A Dcorstone1000.inc1 require conf/machine/include/arm/armv8a/tune-cortexa35.inc
5 # TF-M
6 PREFERRED_VERSION_trusted-firmware-m ?= "2.1.%"
8 # TF-A
10 PREFERRED_VERSION_trusted-firmware-a ?= "2.11.%"
11 PREFERRED_VERSION_tf-a-tests ?= "2.10.%"
13 TFA_BL2_BINARY = "bl2-corstone1000.bin"
14 TFA_FIP_BINARY = "fip-corstone1000.bin"
17 PREFERRED_VERSION_optee-os ?= "4.3.%"
20 TS_PLATFORM = "arm/corstone1000"
[all …]
/openbmc/u-boot/doc/
H A DREADME.uefi1 <!--
2 SPDX-License-Identifier: GPL-2.0+
5 -->
7 # UEFI on U-Boot
17 The implementation of UEFI in U-Boot strives to reach the minimum requirements
18 described in "Server Base Boot Requirements System Software on ARM Platforms -
21 A full blown UEFI implementation would contradict the U-Boot design principle
26 The UEFI standard supports only little-endian systems. The UEFI support can be
27 activated for ARM and x86 by specifying
47 * image address - the memory address of the UEFI binary
[all …]
H A DREADME.u-boot_on_efi1 # SPDX-License-Identifier: GPL-2.0+
5 U-Boot on EFI
7 This document provides information about U-Boot running on top of EFI, either
8 as an application or just as a means of getting U-Boot onto a new platform.
18 EFI Application
19 EFI Payload
22 32/64-bit
28 ----------
29 Running U-Boot on EFI is useful in several situations:
31 - You have EFI running on a board but U-Boot does not natively support it
[all …]
/openbmc/u-boot/arch/arm/lib/
H A Dcrt0_arm_efi.S1 /* SPDX-License-Identifier: GPL-2.0+ OR BSD-2-Clause */
3 * crt0-efi-arm.S - PE/COFF header for ARM EFI applications
7 * This file is taken and modified from the gnu-efi project.
10 #include <asm-generic/pe.h>
21 .long pe_header - image_base /* Offset to the PE header */
26 .short 0x1c2 /* Mixed ARM/Thumb */
31 .short section_table - optional_header /* SizeOfOptionalHeader */
42 .long _edata - _start /* SizeOfCode */
45 .long _start - image_base /* AddressOfEntryPoint */
46 .long _start - image_base /* BaseOfCode */
[all …]
/openbmc/linux/Documentation/arch/arm/
H A Duefi.rst7 maintained by the UEFI Forum - http://www.uefi.org/.
9 UEFI is an evolution of its predecessor 'EFI', so the terms EFI and
11 source code. As a rule, anything new uses 'UEFI', whereas 'EFI' refers
19 - UEFI Runtime Services
20 - Retrieving various configuration information through the standardised
23 For actually enabling [U]EFI support, enable:
25 - CONFIG_EFI=y
26 - CONFIG_EFIVAR_FS=y or m
29 in a Flattened Device Tree (FDT) - so is only available with CONFIG_OF.
39 booting in non-UEFI environments.
[all …]

12345678