fwupd/plugins/uefi
Mario Limonciello d5d496b62a trivial: uefi: fix dell TPM updates
Adding an extra header makes the firmware reject the GUID in the real
header.
2020-05-29 07:31:15 -05:00
..
efi trivial: detect cpuid.h and also look for host architecture 2020-05-26 15:06:08 -05:00
tests When TPM PCR0 measurements fail, query if secure boot is available and enabled 2020-03-05 07:54:15 -06:00
fu-plugin-uefi.c trivial: Move the SecureBoot attr to a runtime issue 2020-05-22 15:15:09 +01:00
fu-self-test.c When TPM PCR0 measurements fail, query if secure boot is available and enabled 2020-03-05 07:54:15 -06:00
fu-ucs2.c trivial: Ensure all source files include config.h 2018-08-09 14:21:23 +01:00
fu-ucs2.h Use '#pragma once' to avoid a lot of boilerplate 2019-02-09 08:42:30 -06:00
fu-uefi-bgrt.c uefi: Do not check the BGRT status before uploading a UX capsule 2019-01-16 13:08:48 +00:00
fu-uefi-bgrt.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-uefi-bootmgr.c uefi: Don't use shim for non-secure boot configurations 2020-03-16 06:55:05 -05:00
fu-uefi-bootmgr.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-uefi-common.c When TPM PCR0 measurements fail, query if secure boot is available and enabled 2020-03-05 07:54:15 -06:00
fu-uefi-common.h When TPM PCR0 measurements fail, query if secure boot is available and enabled 2020-03-05 07:54:15 -06:00
fu-uefi-device.c trivial: uefi: fix dell TPM updates 2020-05-29 07:31:15 -05:00
fu-uefi-device.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-uefi-devpath.c uefi: Fix a libasan failure when reading a UEFI variable 2019-05-02 17:25:34 +01:00
fu-uefi-devpath.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-uefi-pcrs.c Make tss2-esys conditional 2020-04-22 09:36:14 +01:00
fu-uefi-pcrs.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-uefi-tool.c When TPM PCR0 measurements fail, query if secure boot is available and enabled 2020-03-05 07:54:15 -06:00
fu-uefi-udisks.c trivial: Fix up some NULL/FALSE confusion 2019-11-01 13:55:32 +00:00
fu-uefi-udisks.h uefi: rework ESP path detection and lifecycle 2019-10-24 15:22:01 -05:00
fu-uefi-update-info.c uefi: Fix a libasan failure when reading a UEFI variable 2019-05-02 17:25:34 +01:00
fu-uefi-update-info.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
meson.build trivial: uefi: restore uefi.quirk 2020-03-06 12:10:15 +00:00
README.md trivial: Document the use of vendor-id in each plugin 2019-12-11 18:10:44 +00:00
uefi.conf trivial: Add helper fu_plugin_get_config_value_boolean() 2020-02-20 14:55:10 +00:00
uefi.quirk uefi: correctly format firmware version of Dynabook (né Toshiba) X30, X40 and probably others 2020-04-15 13:00:26 +01:00

UEFI Support

Introduction

The Unified Extensible Firmware Interface (UEFI) is a specification that defines the software interface between an OS and platform firmware. With the UpdateCapsule boot service it can be used to update system firmware.

If you don't want or need this functionality you can use the -Dplugin_uefi=false option.

Firmware Format

The daemon will decompress the cabinet archive and extract a firmware blob in EFI capsule file format.

See https://www.uefi.org/sites/default/files/resources/UEFI%20Spec%202_6.pdf for details.

This plugin supports the following protocol ID:

  • org.uefi.capsule

GUID Generation

These devices use the UEFI GUID as provided in the ESRT. Additionally, for the system device the main-system-firmware GUID is also added.

For compatibility with Windows 10, the plugin also adds GUIDs of the form UEFI\RES_{$(esrt)}.

Vendor ID Security

The vendor ID is set from the BIOS vendor, for example DMI:LENOVO for all devices that are not marked as supporting Firmware Management Protocol. For FMP device no vendor ID is set.

UEFI Unlock Support

On some Dell systems it is possible to turn on and off UEFI capsule support from within the BIOS. This functionality can also be adjusted from within the OS by fwupd. This requires compiling with libsmbios support.

When fwupd has been compiled with this support you will be able to enable UEFI support on the device by using the unlock command.

Custom EFI System Partition

Since version 1.1.0 fwupd will autodetect the ESP when it is mounted on /boot/efi, /boot, or /efi. A custom EFI system partition location can be used by modifying OverrideESPMountPoint in /etc/fwupd/uefi.conf.

Setting an invalid directory will disable the fwupd plugin.