fwupd/plugins/uefi
2020-02-11 14:53:01 +00:00
..
efi uefi: Fix a build regression with Fedora 30 2020-02-11 14:53:01 +00:00
tests uefi: Add the PCR0 value as the device checksum for system firmware 2018-12-14 19:23:04 +00:00
fu-plugin-uefi.c uefi: Use the BIOS vendor as the vendor ID 2019-12-11 18:10:44 +00:00
fu-self-test.c trivial: Unexport fu_test_get_filename() 2019-11-27 12:45:35 +00:00
fu-ucs2.c trivial: Ensure all source files include config.h 2018-08-09 14:21:23 +01:00
fu-ucs2.h Use '#pragma once' to avoid a lot of boilerplate 2019-02-09 08:42:30 -06:00
fu-uefi-bgrt.c uefi: Do not check the BGRT status before uploading a UX capsule 2019-01-16 13:08:48 +00:00
fu-uefi-bgrt.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-uefi-bootmgr.c uefi: Just use a uint16_t for BootNext processing 2019-11-20 16:24:21 +00:00
fu-uefi-bootmgr.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-uefi-common.c trivial: uefi: correct a NULL pointer dereference 2019-11-18 16:22:01 -06:00
fu-uefi-common.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-uefi-device.c Cleanup ancient fwupdate-* EFI variables too (Fixes: #1739) 2020-02-04 11:36:58 -06:00
fu-uefi-device.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-uefi-devpath.c uefi: Fix a libasan failure when reading a UEFI variable 2019-05-02 17:25:34 +01:00
fu-uefi-devpath.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-uefi-pcrs.c trivial: uefi: don't add PCRs with all 0's 2019-10-14 08:58:14 -05:00
fu-uefi-pcrs.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-uefi-tool.c trivial: Use prefixes for DATADIR in config.h for portability 2019-11-24 14:17:38 -06:00
fu-uefi-udisks.c trivial: Fix up some NULL/FALSE confusion 2019-11-01 13:55:32 +00:00
fu-uefi-udisks.h uefi: rework ESP path detection and lifecycle 2019-10-24 15:22:01 -05:00
fu-uefi-update-info.c uefi: Fix a libasan failure when reading a UEFI variable 2019-05-02 17:25:34 +01:00
fu-uefi-update-info.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-uefi-vars.c trivial: Allow compiling without <fnmatch.h> 2019-11-26 13:13:31 +00:00
fu-uefi-vars.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
meson.build Convert libfwupdprivate to a shared library libfwupdplugin 2019-11-27 11:32:43 +00:00
README.md trivial: Document the use of vendor-id in each plugin 2019-12-11 18:10:44 +00:00
uefi.conf uefi: Check the amount of free space on the ESP 2018-09-12 13:56:02 +01:00
uefi.quirk Add a DMI quirk for the Minnowboard Turbot 2019-09-10 20:39:45 +01:00

UEFI Support

Introduction

The Unified Extensible Firmware Interface (UEFI) is a specification that defines the software interface between an OS and platform firmware. With the UpdateCapsule boot service it can be used to update system firmware.

If you don't want or need this functionality you can use the -Dplugin_uefi=false option.

Firmware Format

The daemon will decompress the cabinet archive and extract a firmware blob in EFI capsule file format.

See https://www.uefi.org/sites/default/files/resources/UEFI%20Spec%202_6.pdf for details.

This plugin supports the following protocol ID:

  • org.uefi.capsule

GUID Generation

These devices use the UEFI GUID as provided in the ESRT. Additionally, for the system device the main-system-firmware GUID is also added.

For compatibility with Windows 10, the plugin also adds GUIDs of the form UEFI\RES_{$(esrt)}.

Vendor ID Security

The vendor ID is set from the BIOS vendor, for example DMI:LENOVO for all devices that are not marked as supporting Firmware Management Protocol. For FMP device no vendor ID is set.

UEFI Unlock Support

On some Dell systems it is possible to turn on and off UEFI capsule support from within the BIOS. This functionality can also be adjusted from within the OS by fwupd. This requires compiling with libsmbios support.

When fwupd has been compiled with this support you will be able to enable UEFI support on the device by using the unlock command.

Custom EFI System Partition

Since version 1.1.0 fwupd will autodetect the ESP when it is mounted on /boot/efi, /boot, or /efi. A custom EFI system partition location can be used by modifying OverrideESPMountPoint in /etc/fwupd/uefi.conf.

Setting an invalid directory will disable the fwupd plugin.