| /OK3568_Linux_fs/buildroot/boot/grub2/ |
| H A D | grub2.mk | 75 GRUB2_IMAGE_i386-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/bootia32.efi 76 GRUB2_CFG_i386-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/grub.cfg 77 GRUB2_PREFIX_i386-efi = /EFI/BOOT 78 GRUB2_TARGET_i386-efi = i386 79 GRUB2_PLATFORM_i386-efi = efi 80 GRUB2_BUILTIN_CONFIG_i386-efi = $(GRUB2_BUILTIN_CONFIG_EFI) 81 GRUB2_BUILTIN_MODULES_i386-efi = $(GRUB2_BUILTIN_MODULES_EFI) 82 GRUB2_TUPLES-$(BR2_TARGET_GRUB2_I386_EFI) += i386-efi 84 GRUB2_IMAGE_x86_64-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/bootx64.efi 85 GRUB2_CFG_x86_64-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/grub.cfg [all …]
|
| H A D | 0032-efi-Add-secure-boot-detection.patch | 4 Subject: [PATCH] efi: Add secure boot detection 21 grub-core/kern/efi/sb.c | 109 ++++++++++++++++++++++++++++++++++++++++++++ 22 include/grub/efi/sb.h | 40 ++++++++++++++++ 25 create mode 100644 grub-core/kern/efi/sb.c 26 create mode 100644 include/grub/efi/sb.h 36 +KERNEL_HEADER_FILES += $(top_srcdir)/include/grub/efi/sb.h 47 kernel_exec_SOURCES = kern/i386/efi/startup.S 48 …efi/tsc.c kern/i386/tsc_pmtimer.c kern/i386/efi/init.c bus/pci.c kern/i386/dl.c kern/i386/tsc.c ke… 49 …efi/tsc.c kern/i386/tsc_pmtimer.c kern/i386/efi/init.c bus/pci.c kern/i386/dl.c kern/i386/tsc.c ke… 56 kernel_exec_SOURCES = kern/x86_64/efi/startup.S [all …]
|
| H A D | 0026-efi-Fix-use-after-free-in-halt-reboot-path.patch | 4 Subject: [PATCH] efi: Fix use-after-free in halt/reboot path 9 commit 92bfc33db984 ("efi: Free malloc regions on exit") 41 loader flag to be used by efi halt/reboot path. 48 grub-core/kern/arm/efi/init.c | 3 +++ 49 grub-core/kern/arm64/efi/init.c | 3 +++ 50 grub-core/kern/efi/efi.c | 3 ++- 51 grub-core/kern/efi/init.c | 1 - 52 grub-core/kern/i386/efi/init.c | 9 +++++++-- 53 grub-core/kern/ia64/efi/init.c | 9 +++++++-- 54 grub-core/kern/riscv/efi/init.c | 3 +++ [all …]
|
| H A D | 0035-kern-Add-lockdown-support.patch | 190 kernel_exec_SOURCES = kern/i386/efi/startup.S 191 …efi/tsc.c kern/i386/tsc_pmtimer.c kern/i386/efi/init.c bus/pci.c kern/i386/dl.c kern/i386/tsc.c ke… 192 …efi/tsc.c kern/i386/tsc_pmtimer.c kern/i386/efi/init.c bus/pci.c kern/i386/dl.c kern/i386/tsc.c ke… 199 kernel_exec_SOURCES = kern/x86_64/efi/startup.S 200 …efi/tsc.c kern/i386/tsc_pmtimer.c kern/x86_64/efi/callwrap.S kern/i386/efi/init.c bus/pci.c kern/x… 201 …efi/tsc.c kern/i386/tsc_pmtimer.c kern/x86_64/efi/callwrap.S kern/i386/efi/init.c bus/pci.c kern/x… 209 …efi/startup.S kern/ia64/efi/init.c kern/ia64/dl.c kern/ia64/dl_helper.c kern/ia64/cache.c lib/divi… 210 …efi/startup.S kern/ia64/efi/init.c kern/ia64/dl.c kern/ia64/dl_helper.c kern/ia64/cache.c lib/divi… 217 kernel_exec_SOURCES = kern/arm/efi/startup.S 218 …efi/init.c kern/efi/fdt.c kern/arm/dl.c kern/arm/dl_helper.c kern/arm/cache_armv6.S kern/arm/cache… [all …]
|
| H A D | 0031-efi-Add-a-function-to-read-EFI-variables-with-attrib.patch | 4 Subject: [PATCH] efi: Add a function to read EFI variables with attributes 15 grub-core/kern/efi/efi.c | 16 +++++++++++++--- 16 include/grub/efi/efi.h | 5 +++++ 19 diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c 21 --- a/grub-core/kern/efi/efi.c 22 +++ b/grub-core/kern/efi/efi.c 60 diff --git a/include/grub/efi/efi.h b/include/grub/efi/efi.h 62 --- a/include/grub/efi/efi.h 63 +++ b/include/grub/efi/efi.h
|
| H A D | 0030-efi-Return-grub_efi_status_t-from-grub_efi_get_varia.patch | 4 Subject: [PATCH] efi: Return grub_efi_status_t from grub_efi_get_variable() 19 grub-core/commands/efi/efifwsetup.c | 8 ++++---- 20 grub-core/kern/efi/efi.c | 16 +++++++++------- 22 include/grub/efi/efi.h | 7 ++++--- 25 diff --git a/grub-core/commands/efi/efifwsetup.c b/grub-core/commands/efi/efifwsetup.c 27 --- a/grub-core/commands/efi/efifwsetup.c 28 +++ b/grub-core/commands/efi/efifwsetup.c 51 diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c 53 --- a/grub-core/kern/efi/efi.c 54 +++ b/grub-core/kern/efi/efi.c [all …]
|
| H A D | 0053-kern-efi-Fix-memory-leak-on-failure.patch | 4 Subject: [PATCH] kern/efi: Fix memory leak on failure 14 grub-core/kern/efi/efi.c | 1 + 17 diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c 19 --- a/grub-core/kern/efi/efi.c 20 +++ b/grub-core/kern/efi/efi.c
|
| H A D | 0024-efi-Fix-some-malformed-device-path-arithmetic-errors.patch | 4 Subject: [PATCH] efi: Fix some malformed device path arithmetic errors 25 grub-core/kern/efi/efi.c | 64 +++++++++++++++++++++++++----- 26 grub-core/loader/efi/chainloader.c | 13 +++++- 28 include/grub/efi/api.h | 14 ++++--- 31 diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c 33 --- a/grub-core/kern/efi/efi.c 34 +++ b/grub-core/kern/efi/efi.c 154 diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c 156 --- a/grub-core/loader/efi/chainloader.c 157 +++ b/grub-core/loader/efi/chainloader.c [all …]
|
| H A D | 0037-efi-Lockdown-the-GRUB-when-the-UEFI-Secure-Boot-is-e.patch | 4 Subject: [PATCH] efi: Lockdown the GRUB when the UEFI Secure Boot is enabled 14 grub-core/kern/efi/init.c | 12 ++++++++++-- 17 diff --git a/grub-core/kern/efi/init.c b/grub-core/kern/efi/init.c 19 --- a/grub-core/kern/efi/init.c 20 +++ b/grub-core/kern/efi/init.c 22 #include <grub/efi/console.h> 23 #include <grub/efi/disk.h> 24 #include <grub/efi/sb.h>
|
| H A D | 0029-efi-Make-shim_lock-GUID-and-protocol-type-public.patch | 4 Subject: [PATCH] efi: Make shim_lock GUID and protocol type public 19 grub-core/commands/efi/shim_lock.c | 12 ------------ 20 include/grub/efi/api.h | 19 +++++++++++++++---- 23 diff --git a/grub-core/commands/efi/shim_lock.c b/grub-core/commands/efi/shim_lock.c 25 --- a/grub-core/commands/efi/shim_lock.c 26 +++ b/grub-core/commands/efi/shim_lock.c 46 diff --git a/include/grub/efi/api.h b/include/grub/efi/api.h 48 --- a/include/grub/efi/api.h 49 +++ b/include/grub/efi/api.h
|
| /OK3568_Linux_fs/kernel/arch/x86/platform/efi/ |
| H A D | efi.c | 73 &efi.acpi, 74 &efi.acpi20, 75 &efi.smbios, 76 &efi.smbios3, 84 &efi.esrt, 90 &efi.tpm_log, 91 &efi.tpm_final_log, 94 &efi.mokvar_table, 246 WARN(efi.memmap.desc_version != 1, in efi_memblock_x86_reserve_range() 248 efi.memmap.desc_version); in efi_memblock_x86_reserve_range() [all …]
|
| /OK3568_Linux_fs/buildroot/boot/syslinux/ |
| H A D | 0015-efi-main.c-include-efisetjmp.h.patch | 4 Subject: [PATCH] efi/main.c: include <efisetjmp.h> 9 Building syslinux against gnu-efi 3.0.10 currently fails with: 11 syslinux/efi/main.c:33:8: error: unknown type name ‘jmp_buf’ 14 syslinux/efi/main.c: In function ‘local_boot’: 15 syslinux/efi/main.c:189:5: warning: implicit declaration of function ‘longjmp’ [-Wimplicit-function… 18 syslinux/efi/main.c: In function ‘build_gdt’: 19 syslinux/efi/main.c:907:75: warning: taking address of packed member of ‘struct dt_desc’ may result… 22 syslinux/efi/main.c: In function ‘efi_main’: 23 syslinux/efi/main.c:1390:7: warning: implicit declaration of function ‘setjmp’ [-Wimplicit-function… 26 make[3]: *** [syslinux/mk/efi.mk:63: main.o] Error 1 [all …]
|
| H A D | 0008-efi-wrapper-build-it-with-the-host-toolchain.patch | 4 Subject: [PATCH] efi/wrapper: build it with the host toolchain. 14 efi/Makefile | 2 +- 17 diff --git a/efi/Makefile b/efi/Makefile 19 --- a/efi/Makefile 20 +++ b/efi/Makefile 29 # Build the wrapper app and wrap our .so to produce a .efi
|
| H A D | 0006-The-VPrint-definition-is-now-part-of-the-exports-of-.patch | 5 gnu-efi 12 efi/fio.h | 9 --------- 15 diff --git a/efi/fio.h b/efi/fio.h 17 --- a/efi/fio.h 18 +++ b/efi/fio.h 23 -/* VPrint is not in export declarations in gnu-efi lib yet
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-bsp/fwupd/fwupd-efi/ |
| H A D | cc.patch | 1 Change the efi-cc argument to take an array, so that we can pass compiler flags 4 In the long term changing the fwupd-efi build to use the standard Meson 10 diff --git a/efi/generate_sbat.py b/efi/generate_sbat.py 12 --- a/efi/generate_sbat.py 13 +++ b/efi/generate_sbat.py 23 FWUPD_URL = "https://github.com/fwupd/fwupd-efi" 31 diff --git a/efi/meson.build b/efi/meson.build 33 --- a/efi/meson.build 34 +++ b/efi/meson.build 49 -option('efi-cc', type : 'string', value : 'gcc', description : 'the compiler to use for EFI module… [all …]
|
| /OK3568_Linux_fs/kernel/drivers/firmware/efi/ |
| H A D | memmap.c | 49 __efi_memmap_free(efi.memmap.phys_map, in efi_memmap_free() 50 efi.memmap.desc_size * efi.memmap.nr_map, in efi_memmap_free() 51 efi.memmap.flags); in efi_memmap_free() 71 data->size = num_entries * efi.memmap.desc_size; in efi_memmap_alloc() 72 data->desc_version = efi.memmap.desc_version; in efi_memmap_alloc() 73 data->desc_size = efi.memmap.desc_size; in efi_memmap_alloc() 75 data->flags |= efi.memmap.flags & EFI_MEMMAP_LATE; in efi_memmap_alloc() 136 set_bit(EFI_MEMMAP, &efi.flags); in __efi_memmap_init() 138 efi.memmap = map; in __efi_memmap_init() 153 WARN_ON(efi.memmap.flags & EFI_MEMMAP_LATE); in efi_memmap_init_early() [all …]
|
| H A D | tpm.c | 46 if (efi.tpm_log == EFI_INVALID_TABLE_ADDR) { in efi_tpm_eventlog_init() 54 log_tbl = early_memremap(efi.tpm_log, sizeof(*log_tbl)); in efi_tpm_eventlog_init() 57 efi.tpm_log); in efi_tpm_eventlog_init() 58 efi.tpm_log = EFI_INVALID_TABLE_ADDR; in efi_tpm_eventlog_init() 63 memblock_reserve(efi.tpm_log, tbl_size); in efi_tpm_eventlog_init() 65 if (efi.tpm_final_log == EFI_INVALID_TABLE_ADDR) { in efi_tpm_eventlog_init() 73 final_tbl = early_memremap(efi.tpm_final_log, sizeof(*final_tbl)); in efi_tpm_eventlog_init() 77 efi.tpm_final_log); in efi_tpm_eventlog_init() 78 efi.tpm_final_log = EFI_INVALID_TABLE_ADDR; in efi_tpm_eventlog_init() 85 void *events = (void *)efi.tpm_final_log in efi_tpm_eventlog_init() [all …]
|
| H A D | runtime-wrappers.c | 43 efi_call_virt_pointer(efi.runtime, f, args) 45 __efi_call_virt_pointer(efi.runtime, f, args) 369 if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION) in virt_efi_query_variable_info() 388 if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION) in virt_efi_query_variable_info_nonblocking() 433 if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION) in virt_efi_update_capsule() 451 if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION) in virt_efi_query_capsule_caps() 464 efi.get_time = virt_efi_get_time; in efi_native_runtime_setup() 465 efi.set_time = virt_efi_set_time; in efi_native_runtime_setup() 466 efi.get_wakeup_time = virt_efi_get_wakeup_time; in efi_native_runtime_setup() 467 efi.set_wakeup_time = virt_efi_set_wakeup_time; in efi_native_runtime_setup() [all …]
|
| H A D | efi.c | 37 struct efi __read_mostly efi = { variable 50 EXPORT_SYMBOL(efi); 95 set_bit(EFI_DBG, &efi.flags); in parse_efi_cmdline() 101 set_bit(EFI_MEM_NO_SOFT_RESERVE, &efi.flags); in parse_efi_cmdline() 123 if (efi.acpi20 != EFI_INVALID_TABLE_ADDR) in systab_show() 124 str += sprintf(str, "ACPI20=0x%lx\n", efi.acpi20); in systab_show() 125 if (efi.acpi != EFI_INVALID_TABLE_ADDR) in systab_show() 126 str += sprintf(str, "ACPI=0x%lx\n", efi.acpi); in systab_show() 132 if (efi.smbios3 != EFI_INVALID_TABLE_ADDR) in systab_show() 133 str += sprintf(str, "SMBIOS3=0x%lx\n", efi.smbios3); in systab_show() [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/systemd/ |
| H A D | systemd-boot_250.5.bb | 6 DEPENDS = "intltool-native libcap util-linux gnu-efi gperf-native python3-jinja2-native" 25 -Dgnu-efi=true \ 26 -Defi-includedir=${STAGING_INCDIR}/efi \ 33 # install to the image as boot*.efi if its the EFI_PROVIDER, 58 src/boot/efi/${SYSTEMD_BOOT_IMAGE_PREFIX}${SYSTEMD_BOOT_IMAGE} \ 59 src/boot/efi/linux${EFI_ARCH}.efi.stub 64 install ${B}/src/boot/efi/systemd-boot*.efi ${D}${EFI_FILES_PATH}/${SYSTEMD_BOOT_IMAGE} 68 install ${B}/src/boot/efi/systemd-boot*.efi ${DEPLOYDIR} 69 install ${B}/src/boot/efi/linux*.efi.stub ${DEPLOYDIR}
|
| /OK3568_Linux_fs/buildroot/boot/gummiboot/ |
| H A D | gummiboot.mk | 15 GUMMIBOOT_DEPENDENCIES = gnu-efi host-pkgconf util-linux 27 --with-efi-libdir=$(STAGING_DIR)/usr/lib \ 28 --with-efi-ldsdir=$(STAGING_DIR)/usr/lib \ 29 --with-efi-includedir=$(STAGING_DIR)/usr/include \ 33 $(INSTALL) -D -m 0644 $(@D)/gummiboot$(GUMMIBOOT_IMGARCH).efi \ 34 $(BINARIES_DIR)/efi-part/EFI/BOOT/boot$(GUMMIBOOT_IMGARCH).efi 36 $(BINARIES_DIR)/efi-part/loader/loader.conf 38 $(BINARIES_DIR)/efi-part/loader/entries/buildroot.conf
|
| /OK3568_Linux_fs/kernel/drivers/xen/ |
| H A D | efi.c | 191 if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION) in xen_efi_query_variable_info() 223 if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION) in xen_efi_update_capsule() 242 if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION) in xen_efi_query_capsule_caps() 280 efi.get_time = xen_efi_get_time; in xen_efi_runtime_setup() 281 efi.set_time = xen_efi_set_time; in xen_efi_runtime_setup() 282 efi.get_wakeup_time = xen_efi_get_wakeup_time; in xen_efi_runtime_setup() 283 efi.set_wakeup_time = xen_efi_set_wakeup_time; in xen_efi_runtime_setup() 284 efi.get_variable = xen_efi_get_variable; in xen_efi_runtime_setup() 285 efi.get_next_variable = xen_efi_get_next_variable; in xen_efi_runtime_setup() 286 efi.set_variable = xen_efi_set_variable; in xen_efi_runtime_setup() [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/ABI/testing/ |
| H A D | sysfs-firmware-efi-esrt | 1 What: /sys/firmware/efi/esrt/ 10 What: /sys/firmware/efi/esrt/fw_resource_count 15 What: /sys/firmware/efi/esrt/fw_resource_count_max 22 What: /sys/firmware/efi/esrt/fw_resource_version 27 What: /sys/firmware/efi/esrt/entries/entry$N/ 32 example: /sys/firmware/efi/esrt/entries/entry0/ 34 What: /sys/firmware/efi/esrt/entries/entry$N/fw_type 46 What: /sys/firmware/efi/esrt/entries/entry$N/fw_class 51 What: /sys/firmware/efi/esrt/entries/entry$N/fw_version 57 What: /sys/firmware/efi/esrt/entries/entry$N/lowest_supported_fw_version [all …]
|
| H A D | sysfs-firmware-efi-runtime-map | 1 What: /sys/firmware/efi/runtime-map/ 4 Description: Switching efi runtime services to virtual mode requires 5 that all efi memory ranges which have the runtime attribute 8 The efi runtime services can only be switched to virtual 14 /sys/firmware/efi/runtime-map/ is the directory the kernel 19 /sys/firmware/efi/runtime-map/0 20 /sys/firmware/efi/runtime-map/1 21 /sys/firmware/efi/runtime-map/2 22 /sys/firmware/efi/runtime-map/3
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/ |
| H A D | efi-stub.rst | 12 arch/arm/boot/compressed/efi-header.S and 13 arch/arm/boot/compressed/efi-stub.c. EFI stub code that is shared 14 between architectures is in drivers/firmware/efi/libstub. 18 kernel. The arm64 EFI stub lives in arch/arm64/kernel/efi-entry.S 19 and drivers/firmware/efi/libstub/arm64-stub.c. 29 How to install bzImage.efi 33 System Partition (ESP) and renamed with the extension ".efi". Without 35 not possible to execute bzImage.efi from the usual Linux file systems 45 Arguments to the kernel can be passed after bzImage.efi, e.g.:: 47 fs0:> bzImage.efi console=ttyS0 root=/dev/sda4 [all …]
|