fwupd/plugins/uefi
Richard Hughes ded5410f6d Delete unused EFI variables when deploying firmware
Unconditionally delete FWUPDATE_VERBOSE and FWUPDATE_DEBUG_LOG when deploying
the update using fwupdtool or fwupd and leave it to fwupdate.

If you want to debug the efi binary you then have to use fwupdate and squirt
the .cap file rather than using all the other layers.
2020-10-27 17:05:01 +00:00
..
efi uefi: add configuration option for objcopy utility. 2020-10-10 12:32:13 +01:00
tests When TPM PCR0 measurements fail, query if secure boot is available and enabled 2020-03-05 07:54:15 -06:00
fu-plugin-uefi.c Include the amount of NVRAM size in use in the LVFS failure report 2020-10-27 13:58:40 +00:00
fu-self-test.c Make TPM more optional (Fixes: #2360) 2020-09-08 15:16:58 -05:00
fu-ucs2.c trivial: Ensure all source files include config.h 2018-08-09 14:21:23 +01:00
fu-ucs2.h Use '#pragma once' to avoid a lot of boilerplate 2019-02-09 08:42:30 -06:00
fu-uefi-bgrt.c uefi: Do not check the BGRT status before uploading a UX capsule 2019-01-16 13:08:48 +00:00
fu-uefi-bgrt.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-uefi-bootmgr.c uefi: Drop efivar dependency 2020-10-19 16:13:21 +01:00
fu-uefi-bootmgr.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-uefi-common.c uefi: Drop efivar dependency 2020-10-19 16:13:21 +01:00
fu-uefi-common.h uefi: Drop efivar dependency 2020-10-19 16:13:21 +01:00
fu-uefi-device.c Delete unused EFI variables when deploying firmware 2020-10-27 17:05:01 +00:00
fu-uefi-device.h uefi: Drop efivar dependency 2020-10-19 16:13:21 +01:00
fu-uefi-devpath.c uefi: Fix a libasan failure when reading a UEFI variable 2019-05-02 17:25:34 +01:00
fu-uefi-devpath.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-uefi-pcrs.c uefi: correct a logic error in TPM PCR reading (Fixes: #2382) 2020-09-15 14:38:52 -05:00
fu-uefi-pcrs.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-uefi-tool.c uefi: Drop efivar dependency 2020-10-19 16:13:21 +01:00
fu-uefi-update-info.c uefi: Drop efivar dependency 2020-10-19 16:13:21 +01:00
fu-uefi-update-info.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
meson.build uefi: Drop efivar dependency 2020-10-19 16:13:21 +01:00
README.md Add external interface messages 2020-10-26 12:05:20 -05:00
uefi.conf trivial: Add helper fu_plugin_get_config_value_boolean() 2020-02-20 14:55:10 +00:00
uefi.quirk uefi: correctly format firmware version of Dynabook (né Toshiba) X30, X40 and probably others 2020-04-15 13:00:26 +01:00

UEFI Support

Introduction

The Unified Extensible Firmware Interface (UEFI) is a specification that defines the software interface between an OS and platform firmware. With the UpdateCapsule boot service it can be used to update system firmware.

If you don't want or need this functionality you can use the -Dplugin_uefi=false option.

Firmware Format

The daemon will decompress the cabinet archive and extract a firmware blob in EFI capsule file format.

See https://www.uefi.org/sites/default/files/resources/UEFI%20Spec%202_6.pdf for details.

This plugin supports the following protocol ID:

  • org.uefi.capsule

GUID Generation

These devices use the UEFI GUID as provided in the ESRT. Additionally, for the system device the main-system-firmware GUID is also added.

For compatibility with Windows 10, the plugin also adds GUIDs of the form UEFI\RES_{$(esrt)}.

Vendor ID Security

The vendor ID is set from the BIOS vendor, for example DMI:LENOVO for all devices that are not marked as supporting Firmware Management Protocol. For FMP device no vendor ID is set.

UEFI Unlock Support

On some Dell systems it is possible to turn on and off UEFI capsule support from within the BIOS. This functionality can also be adjusted from within the OS by fwupd. This requires compiling with libsmbios support.

When fwupd has been compiled with this support you will be able to enable UEFI support on the device by using the unlock command.

Custom EFI System Partition

Since version 1.1.0 fwupd will autodetect the ESP when it is mounted on /boot/efi, /boot, or /efi. A custom EFI system partition location can be used by modifying OverrideESPMountPoint in /etc/fwupd/uefi.conf.

Setting an invalid directory will disable the fwupd plugin.

External interface access

This plugin requires:

  • read/write access to the EFI system partition.
  • read access to /sys/firmware/efi/esrt/
  • read access to /sys/firmware/efi/fw_platform_size
  • read/write access to /sys/firmware/efi/efivars