Home
last modified time | relevance | path

Searched refs:efi (Results 1 – 25 of 961) sorted by relevance

12345678910>>...39

/OK3568_Linux_fs/buildroot/boot/grub2/
H A Dgrub2.mk75 GRUB2_IMAGE_i386-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/bootia32.efi
76 GRUB2_CFG_i386-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/grub.cfg
77 GRUB2_PREFIX_i386-efi = /EFI/BOOT
78 GRUB2_TARGET_i386-efi = i386
79 GRUB2_PLATFORM_i386-efi = efi
80 GRUB2_BUILTIN_CONFIG_i386-efi = $(GRUB2_BUILTIN_CONFIG_EFI)
81 GRUB2_BUILTIN_MODULES_i386-efi = $(GRUB2_BUILTIN_MODULES_EFI)
82 GRUB2_TUPLES-$(BR2_TARGET_GRUB2_I386_EFI) += i386-efi
84 GRUB2_IMAGE_x86_64-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/bootx64.efi
85 GRUB2_CFG_x86_64-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/grub.cfg
[all …]
H A D0032-efi-Add-secure-boot-detection.patch4 Subject: [PATCH] efi: Add secure boot detection
21 grub-core/kern/efi/sb.c | 109 ++++++++++++++++++++++++++++++++++++++++++++
22 include/grub/efi/sb.h | 40 ++++++++++++++++
25 create mode 100644 grub-core/kern/efi/sb.c
26 create mode 100644 include/grub/efi/sb.h
36 +KERNEL_HEADER_FILES += $(top_srcdir)/include/grub/efi/sb.h
47 kernel_exec_SOURCES = kern/i386/efi/startup.S
48efi/tsc.c kern/i386/tsc_pmtimer.c kern/i386/efi/init.c bus/pci.c kern/i386/dl.c kern/i386/tsc.c ke…
49efi/tsc.c kern/i386/tsc_pmtimer.c kern/i386/efi/init.c bus/pci.c kern/i386/dl.c kern/i386/tsc.c ke…
56 kernel_exec_SOURCES = kern/x86_64/efi/startup.S
[all …]
H A D0026-efi-Fix-use-after-free-in-halt-reboot-path.patch4 Subject: [PATCH] efi: Fix use-after-free in halt/reboot path
9 commit 92bfc33db984 ("efi: Free malloc regions on exit")
41 loader flag to be used by efi halt/reboot path.
48 grub-core/kern/arm/efi/init.c | 3 +++
49 grub-core/kern/arm64/efi/init.c | 3 +++
50 grub-core/kern/efi/efi.c | 3 ++-
51 grub-core/kern/efi/init.c | 1 -
52 grub-core/kern/i386/efi/init.c | 9 +++++++--
53 grub-core/kern/ia64/efi/init.c | 9 +++++++--
54 grub-core/kern/riscv/efi/init.c | 3 +++
[all …]
H A D0035-kern-Add-lockdown-support.patch190 kernel_exec_SOURCES = kern/i386/efi/startup.S
191efi/tsc.c kern/i386/tsc_pmtimer.c kern/i386/efi/init.c bus/pci.c kern/i386/dl.c kern/i386/tsc.c ke…
192efi/tsc.c kern/i386/tsc_pmtimer.c kern/i386/efi/init.c bus/pci.c kern/i386/dl.c kern/i386/tsc.c ke…
199 kernel_exec_SOURCES = kern/x86_64/efi/startup.S
200efi/tsc.c kern/i386/tsc_pmtimer.c kern/x86_64/efi/callwrap.S kern/i386/efi/init.c bus/pci.c kern/x…
201efi/tsc.c kern/i386/tsc_pmtimer.c kern/x86_64/efi/callwrap.S kern/i386/efi/init.c bus/pci.c kern/x…
209efi/startup.S kern/ia64/efi/init.c kern/ia64/dl.c kern/ia64/dl_helper.c kern/ia64/cache.c lib/divi…
210efi/startup.S kern/ia64/efi/init.c kern/ia64/dl.c kern/ia64/dl_helper.c kern/ia64/cache.c lib/divi…
217 kernel_exec_SOURCES = kern/arm/efi/startup.S
218efi/init.c kern/efi/fdt.c kern/arm/dl.c kern/arm/dl_helper.c kern/arm/cache_armv6.S kern/arm/cache…
[all …]
H A D0031-efi-Add-a-function-to-read-EFI-variables-with-attrib.patch4 Subject: [PATCH] efi: Add a function to read EFI variables with attributes
15 grub-core/kern/efi/efi.c | 16 +++++++++++++---
16 include/grub/efi/efi.h | 5 +++++
19 diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c
21 --- a/grub-core/kern/efi/efi.c
22 +++ b/grub-core/kern/efi/efi.c
60 diff --git a/include/grub/efi/efi.h b/include/grub/efi/efi.h
62 --- a/include/grub/efi/efi.h
63 +++ b/include/grub/efi/efi.h
H A D0030-efi-Return-grub_efi_status_t-from-grub_efi_get_varia.patch4 Subject: [PATCH] efi: Return grub_efi_status_t from grub_efi_get_variable()
19 grub-core/commands/efi/efifwsetup.c | 8 ++++----
20 grub-core/kern/efi/efi.c | 16 +++++++++-------
22 include/grub/efi/efi.h | 7 ++++---
25 diff --git a/grub-core/commands/efi/efifwsetup.c b/grub-core/commands/efi/efifwsetup.c
27 --- a/grub-core/commands/efi/efifwsetup.c
28 +++ b/grub-core/commands/efi/efifwsetup.c
51 diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c
53 --- a/grub-core/kern/efi/efi.c
54 +++ b/grub-core/kern/efi/efi.c
[all …]
H A D0053-kern-efi-Fix-memory-leak-on-failure.patch4 Subject: [PATCH] kern/efi: Fix memory leak on failure
14 grub-core/kern/efi/efi.c | 1 +
17 diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c
19 --- a/grub-core/kern/efi/efi.c
20 +++ b/grub-core/kern/efi/efi.c
H A D0024-efi-Fix-some-malformed-device-path-arithmetic-errors.patch4 Subject: [PATCH] efi: Fix some malformed device path arithmetic errors
25 grub-core/kern/efi/efi.c | 64 +++++++++++++++++++++++++-----
26 grub-core/loader/efi/chainloader.c | 13 +++++-
28 include/grub/efi/api.h | 14 ++++---
31 diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c
33 --- a/grub-core/kern/efi/efi.c
34 +++ b/grub-core/kern/efi/efi.c
154 diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c
156 --- a/grub-core/loader/efi/chainloader.c
157 +++ b/grub-core/loader/efi/chainloader.c
[all …]
H A D0037-efi-Lockdown-the-GRUB-when-the-UEFI-Secure-Boot-is-e.patch4 Subject: [PATCH] efi: Lockdown the GRUB when the UEFI Secure Boot is enabled
14 grub-core/kern/efi/init.c | 12 ++++++++++--
17 diff --git a/grub-core/kern/efi/init.c b/grub-core/kern/efi/init.c
19 --- a/grub-core/kern/efi/init.c
20 +++ b/grub-core/kern/efi/init.c
22 #include <grub/efi/console.h>
23 #include <grub/efi/disk.h>
24 #include <grub/efi/sb.h>
H A D0029-efi-Make-shim_lock-GUID-and-protocol-type-public.patch4 Subject: [PATCH] efi: Make shim_lock GUID and protocol type public
19 grub-core/commands/efi/shim_lock.c | 12 ------------
20 include/grub/efi/api.h | 19 +++++++++++++++----
23 diff --git a/grub-core/commands/efi/shim_lock.c b/grub-core/commands/efi/shim_lock.c
25 --- a/grub-core/commands/efi/shim_lock.c
26 +++ b/grub-core/commands/efi/shim_lock.c
46 diff --git a/include/grub/efi/api.h b/include/grub/efi/api.h
48 --- a/include/grub/efi/api.h
49 +++ b/include/grub/efi/api.h
/OK3568_Linux_fs/kernel/arch/x86/platform/efi/
H A Defi.c73 &efi.acpi,
74 &efi.acpi20,
75 &efi.smbios,
76 &efi.smbios3,
84 &efi.esrt,
90 &efi.tpm_log,
91 &efi.tpm_final_log,
94 &efi.mokvar_table,
246 WARN(efi.memmap.desc_version != 1, in efi_memblock_x86_reserve_range()
248 efi.memmap.desc_version); in efi_memblock_x86_reserve_range()
[all …]
/OK3568_Linux_fs/buildroot/boot/syslinux/
H A D0015-efi-main.c-include-efisetjmp.h.patch4 Subject: [PATCH] efi/main.c: include <efisetjmp.h>
9 Building syslinux against gnu-efi 3.0.10 currently fails with:
11 syslinux/efi/main.c:33:8: error: unknown type name ‘jmp_buf’
14 syslinux/efi/main.c: In function ‘local_boot’:
15 syslinux/efi/main.c:189:5: warning: implicit declaration of function ‘longjmp’ [-Wimplicit-function…
18 syslinux/efi/main.c: In function ‘build_gdt’:
19 syslinux/efi/main.c:907:75: warning: taking address of packed member of ‘struct dt_desc’ may result…
22 syslinux/efi/main.c: In function ‘efi_main’:
23 syslinux/efi/main.c:1390:7: warning: implicit declaration of function ‘setjmp’ [-Wimplicit-function…
26 make[3]: *** [syslinux/mk/efi.mk:63: main.o] Error 1
[all …]
H A D0008-efi-wrapper-build-it-with-the-host-toolchain.patch4 Subject: [PATCH] efi/wrapper: build it with the host toolchain.
14 efi/Makefile | 2 +-
17 diff --git a/efi/Makefile b/efi/Makefile
19 --- a/efi/Makefile
20 +++ b/efi/Makefile
29 # Build the wrapper app and wrap our .so to produce a .efi
H A D0006-The-VPrint-definition-is-now-part-of-the-exports-of-.patch5 gnu-efi
12 efi/fio.h | 9 ---------
15 diff --git a/efi/fio.h b/efi/fio.h
17 --- a/efi/fio.h
18 +++ b/efi/fio.h
23 -/* VPrint is not in export declarations in gnu-efi lib yet
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-bsp/fwupd/fwupd-efi/
H A Dcc.patch1 Change the efi-cc argument to take an array, so that we can pass compiler flags
4 In the long term changing the fwupd-efi build to use the standard Meson
10 diff --git a/efi/generate_sbat.py b/efi/generate_sbat.py
12 --- a/efi/generate_sbat.py
13 +++ b/efi/generate_sbat.py
23 FWUPD_URL = "https://github.com/fwupd/fwupd-efi"
31 diff --git a/efi/meson.build b/efi/meson.build
33 --- a/efi/meson.build
34 +++ b/efi/meson.build
49 -option('efi-cc', type : 'string', value : 'gcc', description : 'the compiler to use for EFI module…
[all …]
/OK3568_Linux_fs/kernel/drivers/firmware/efi/
H A Dmemmap.c49 __efi_memmap_free(efi.memmap.phys_map, in efi_memmap_free()
50 efi.memmap.desc_size * efi.memmap.nr_map, in efi_memmap_free()
51 efi.memmap.flags); in efi_memmap_free()
71 data->size = num_entries * efi.memmap.desc_size; in efi_memmap_alloc()
72 data->desc_version = efi.memmap.desc_version; in efi_memmap_alloc()
73 data->desc_size = efi.memmap.desc_size; in efi_memmap_alloc()
75 data->flags |= efi.memmap.flags & EFI_MEMMAP_LATE; in efi_memmap_alloc()
136 set_bit(EFI_MEMMAP, &efi.flags); in __efi_memmap_init()
138 efi.memmap = map; in __efi_memmap_init()
153 WARN_ON(efi.memmap.flags & EFI_MEMMAP_LATE); in efi_memmap_init_early()
[all …]
H A Dtpm.c46 if (efi.tpm_log == EFI_INVALID_TABLE_ADDR) { in efi_tpm_eventlog_init()
54 log_tbl = early_memremap(efi.tpm_log, sizeof(*log_tbl)); in efi_tpm_eventlog_init()
57 efi.tpm_log); in efi_tpm_eventlog_init()
58 efi.tpm_log = EFI_INVALID_TABLE_ADDR; in efi_tpm_eventlog_init()
63 memblock_reserve(efi.tpm_log, tbl_size); in efi_tpm_eventlog_init()
65 if (efi.tpm_final_log == EFI_INVALID_TABLE_ADDR) { in efi_tpm_eventlog_init()
73 final_tbl = early_memremap(efi.tpm_final_log, sizeof(*final_tbl)); in efi_tpm_eventlog_init()
77 efi.tpm_final_log); in efi_tpm_eventlog_init()
78 efi.tpm_final_log = EFI_INVALID_TABLE_ADDR; in efi_tpm_eventlog_init()
85 void *events = (void *)efi.tpm_final_log in efi_tpm_eventlog_init()
[all …]
H A Druntime-wrappers.c43 efi_call_virt_pointer(efi.runtime, f, args)
45 __efi_call_virt_pointer(efi.runtime, f, args)
369 if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION) in virt_efi_query_variable_info()
388 if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION) in virt_efi_query_variable_info_nonblocking()
433 if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION) in virt_efi_update_capsule()
451 if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION) in virt_efi_query_capsule_caps()
464 efi.get_time = virt_efi_get_time; in efi_native_runtime_setup()
465 efi.set_time = virt_efi_set_time; in efi_native_runtime_setup()
466 efi.get_wakeup_time = virt_efi_get_wakeup_time; in efi_native_runtime_setup()
467 efi.set_wakeup_time = virt_efi_set_wakeup_time; in efi_native_runtime_setup()
[all …]
H A Defi.c37 struct efi __read_mostly efi = { variable
50 EXPORT_SYMBOL(efi);
95 set_bit(EFI_DBG, &efi.flags); in parse_efi_cmdline()
101 set_bit(EFI_MEM_NO_SOFT_RESERVE, &efi.flags); in parse_efi_cmdline()
123 if (efi.acpi20 != EFI_INVALID_TABLE_ADDR) in systab_show()
124 str += sprintf(str, "ACPI20=0x%lx\n", efi.acpi20); in systab_show()
125 if (efi.acpi != EFI_INVALID_TABLE_ADDR) in systab_show()
126 str += sprintf(str, "ACPI=0x%lx\n", efi.acpi); in systab_show()
132 if (efi.smbios3 != EFI_INVALID_TABLE_ADDR) in systab_show()
133 str += sprintf(str, "SMBIOS3=0x%lx\n", efi.smbios3); in systab_show()
[all …]
/OK3568_Linux_fs/yocto/poky/meta/recipes-core/systemd/
H A Dsystemd-boot_250.5.bb6 DEPENDS = "intltool-native libcap util-linux gnu-efi gperf-native python3-jinja2-native"
25 -Dgnu-efi=true \
26 -Defi-includedir=${STAGING_INCDIR}/efi \
33 # install to the image as boot*.efi if its the EFI_PROVIDER,
58 src/boot/efi/${SYSTEMD_BOOT_IMAGE_PREFIX}${SYSTEMD_BOOT_IMAGE} \
59 src/boot/efi/linux${EFI_ARCH}.efi.stub
64 install ${B}/src/boot/efi/systemd-boot*.efi ${D}${EFI_FILES_PATH}/${SYSTEMD_BOOT_IMAGE}
68 install ${B}/src/boot/efi/systemd-boot*.efi ${DEPLOYDIR}
69 install ${B}/src/boot/efi/linux*.efi.stub ${DEPLOYDIR}
/OK3568_Linux_fs/buildroot/boot/gummiboot/
H A Dgummiboot.mk15 GUMMIBOOT_DEPENDENCIES = gnu-efi host-pkgconf util-linux
27 --with-efi-libdir=$(STAGING_DIR)/usr/lib \
28 --with-efi-ldsdir=$(STAGING_DIR)/usr/lib \
29 --with-efi-includedir=$(STAGING_DIR)/usr/include \
33 $(INSTALL) -D -m 0644 $(@D)/gummiboot$(GUMMIBOOT_IMGARCH).efi \
34 $(BINARIES_DIR)/efi-part/EFI/BOOT/boot$(GUMMIBOOT_IMGARCH).efi
36 $(BINARIES_DIR)/efi-part/loader/loader.conf
38 $(BINARIES_DIR)/efi-part/loader/entries/buildroot.conf
/OK3568_Linux_fs/kernel/drivers/xen/
H A Defi.c191 if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION) in xen_efi_query_variable_info()
223 if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION) in xen_efi_update_capsule()
242 if (efi.runtime_version < EFI_2_00_SYSTEM_TABLE_REVISION) in xen_efi_query_capsule_caps()
280 efi.get_time = xen_efi_get_time; in xen_efi_runtime_setup()
281 efi.set_time = xen_efi_set_time; in xen_efi_runtime_setup()
282 efi.get_wakeup_time = xen_efi_get_wakeup_time; in xen_efi_runtime_setup()
283 efi.set_wakeup_time = xen_efi_set_wakeup_time; in xen_efi_runtime_setup()
284 efi.get_variable = xen_efi_get_variable; in xen_efi_runtime_setup()
285 efi.get_next_variable = xen_efi_get_next_variable; in xen_efi_runtime_setup()
286 efi.set_variable = xen_efi_set_variable; in xen_efi_runtime_setup()
[all …]
/OK3568_Linux_fs/kernel/Documentation/ABI/testing/
H A Dsysfs-firmware-efi-esrt1 What: /sys/firmware/efi/esrt/
10 What: /sys/firmware/efi/esrt/fw_resource_count
15 What: /sys/firmware/efi/esrt/fw_resource_count_max
22 What: /sys/firmware/efi/esrt/fw_resource_version
27 What: /sys/firmware/efi/esrt/entries/entry$N/
32 example: /sys/firmware/efi/esrt/entries/entry0/
34 What: /sys/firmware/efi/esrt/entries/entry$N/fw_type
46 What: /sys/firmware/efi/esrt/entries/entry$N/fw_class
51 What: /sys/firmware/efi/esrt/entries/entry$N/fw_version
57 What: /sys/firmware/efi/esrt/entries/entry$N/lowest_supported_fw_version
[all …]
H A Dsysfs-firmware-efi-runtime-map1 What: /sys/firmware/efi/runtime-map/
4 Description: Switching efi runtime services to virtual mode requires
5 that all efi memory ranges which have the runtime attribute
8 The efi runtime services can only be switched to virtual
14 /sys/firmware/efi/runtime-map/ is the directory the kernel
19 /sys/firmware/efi/runtime-map/0
20 /sys/firmware/efi/runtime-map/1
21 /sys/firmware/efi/runtime-map/2
22 /sys/firmware/efi/runtime-map/3
/OK3568_Linux_fs/kernel/Documentation/admin-guide/
H A Defi-stub.rst12 arch/arm/boot/compressed/efi-header.S and
13 arch/arm/boot/compressed/efi-stub.c. EFI stub code that is shared
14 between architectures is in drivers/firmware/efi/libstub.
18 kernel. The arm64 EFI stub lives in arch/arm64/kernel/efi-entry.S
19 and drivers/firmware/efi/libstub/arm64-stub.c.
29 How to install bzImage.efi
33 System Partition (ESP) and renamed with the extension ".efi". Without
35 not possible to execute bzImage.efi from the usual Linux file systems
45 Arguments to the kernel can be passed after bzImage.efi, e.g.::
47 fs0:> bzImage.efi console=ttyS0 root=/dev/sda4
[all …]

12345678910>>...39