/openbmc/linux/drivers/firmware/efi/ |
H A D | capsule.c | 3 * EFI capsule support. 34 * efi_capsule_pending - has a capsule been passed to the firmware? 35 * @reset_type: store the type of EFI reset if capsule is pending 37 * To ensure that the registered capsule is processed correctly by the 38 * firmware we need to perform a specific type of reset. If a capsule is 63 * Whitelist of EFI capsule flags that we support. 74 * efi_capsule_supported - does the firmware support the capsule? 75 * @guid: vendor guid of capsule 76 * @flags: capsule flags 77 * @size: size of capsule data [all …]
|
H A D | capsule-loader.c | 3 * EFI capsule loader driver. 47 pr_err("invalid capsule size\n"); in __efi_capsule_setup_info() 51 /* Check if the capsule binary supported */ in __efi_capsule_setup_info() 57 pr_err("capsule not supported\n"); in __efi_capsule_setup_info() 81 * efi_capsule_setup_info - obtain the efi capsule header in the binary and 87 * Platforms with non-standard capsule update mechanisms can override 88 * this __weak function so they can perform any required capsule 115 * cap_info->capsule may have been assigned already by a quirk in efi_capsule_submit_update() 118 if (!cap_info->capsule) { in efi_capsule_submit_update() 119 cap_info->capsule = vmap(cap_info->pages, cap_info->index, in efi_capsule_submit_update() [all …]
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot/corstone1000/ |
H A D | 0040-fix-runtime-capsule-update-flags-checks.patch | 4 Subject: [PATCH] fix runtime capsule update flags checks for corstone1000 6 Fixes capsule update flags checks in capsule update as these checks are missing 7 in the platform-specific capsule-update implementation in corstone1000. 10 Upstream-Status: Inappropriate [Redesign of Capsule update interface is required] 25 + if ((capsule->flags & CAPSULE_FLAGS_PERSIST_ACROSS_RESET) && 31 + /*According to UEFI specs a capsule which has the CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE 34 + if (capsule->flags & CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE){ 35 + if(!(capsule->flags & CAPSULE_FLAGS_PERSIST_ACROSS_RESET)){ 41 + /* According to UEFI specs, a capsule which has the CAPSULE_FLAGS_INITIATE_RESET 44 + if (capsule->flags & CAPSULE_FLAGS_INITIATE_RESET){ [all …]
|
H A D | 0038-corstone1000-introduce-EFI-authenticated-capsule-upd.patch | 4 Subject: [PATCH] corstone1000: introduce EFI authenticated capsule update 6 Introduces EFI authenticated capsule update for corstone1000. Corstone1000 7 implements platform-specific capsule update mechanism in u-bootdue to the SoC 8 design. This patch add authenticated capsule update mechanism to the 12 Upstream-Status: Inappropriate [Redesign of Capsule update interface is required] 24 struct efi_capsule_header *capsule; 38 + capsule_header = (void *)capsule + capsule->header_size; 44 + log_err("Corstone1000: Capsule authentication flag check failed. Aborting update\n"); 59 + log_err("Corstone1000: Capsule authentication check failed. Aborting update\n"); 65 + log_debug("Corstone1000: Capsule authentication successful\n"); [all …]
|
H A D | 0011-efi-corstone1000-fwu-introduce-EFI-capsule-update.patch | 4 Subject: [PATCH] efi: corstone1000: fwu: introduce EFI capsule update 6 This commit provides capsule update feature for Corstone1000. 10 A platform specific capsule buffer is allocated. This buffer 14 The capsule buffer is shared between u-boot and the secure world. 16 On UpdateCapsule() , capsule data is copied to the buffer and a buffer ready event is generated usi… 89 +/* Size in 4KB pages of the EFI capsule buffer */ 92 +/* Capsule GUID */ 107 /* Capsule update */ 151 +void *__efi_runtime_data corstone1000_capsule_buf; /* capsule shared buffer virtual address */ 165 + * efi_corstone1000_alloc_capsule_shared_buf - allocate capsule shared buffer [all …]
|
H A D | 0041-scatter-gather-flag-workaround.patch | 10 scatter_gather_list during capsule update, this patch will skip the check only 11 for on-disk capsule update. 14 Upstream-Status: Inappropriate [Redesign of Capsule update interface is required] 24 ret = efi_capsule_read_file(files[i], &capsule); 27 - /* capsule update only supports 1 image and no scatter gather list for corstone1000 */ 28 - efi_update_capsule(&capsule, 1, 0); 29 + /* capsule update only supports 1 image and use of scatter_gather_list 32 + * new capsule update design*/ 33 + ret = efi_update_capsule(&capsule, 1, 1); 35 ret = efi_capsule_update_firmware(capsule);
|
H A D | 0013-efi_loader-corstone1000-remove-guid-check-from-corst.patch | 22 i, &capsule->capsule_guid); 25 - if (guidcmp(&corstone1000_capsule_guid, &capsule->capsule_guid)) { 27 - log_err("Corstone1000: Invalid capsule GUID\n"); 31 if (efi_size_in_pages(capsule->capsule_image_size) > 33 log_err("Corstone1000: Capsule data size exceeds the shared buffer size\n"); 38 - if (!guidcmp(&capsule->capsule_guid, 40 - ret = efi_capsule_update_firmware(capsule); 42 - log_err("Unsupported capsule type: %pUs\n", 43 - &capsule->capsule_guid); 47 + ret = efi_capsule_update_firmware(capsule);
|
H A D | 0039-enables-ondisk-capsule-update-feature.patch | 4 Subject: [PATCH] Enables on-disk capsule update feature 6 Enables on-disk capsule update feature for corstone1000. 9 Upstream-Status: Inappropriate [Redesign of Capsule update interface is required] 20 ret = efi_capsule_read_file(files[i], &capsule); 23 + /* capsule update only supports 1 image and no scatter gather list for corstone1000 */ 24 + efi_update_capsule(&capsule, 1, 0); 26 ret = efi_capsule_update_firmware(capsule); 29 log_err("Applying capsule %ls failed.\n",
|
H A D | 0046-Corstone1000-Change-MMCOMM-buffer-location.patch | 8 to the DDR and also fixes the capsule buffer size since it cannot be 38 /* Size in 4KB pages of the EFI capsule buffer */ 42 /* Capsule GUID */
|
H A D | 0037-corstone1000-enable-authenticated-capsule-config.patch | 4 Subject: [PATCH] corstone1000: enable authenticated capsule config 6 Enables authenticated capsule update config for corstone1000.
|
H A D | 0015-efi_firmware-add-get_image_info-for-corstone1000.patch | 68 + /* Check if the capsule authentication is enabled */ 86 - * FMP payload by the edk2 capsule generation scripts. 87 + * FMP payload by the edk1 capsule generation scripts.
|
/openbmc/openbmc/meta-arm/meta-arm/classes/ |
H A D | uefi_capsule.bbclass | 2 # The current class supports generating a capsule with single firmware binary 9 # By default the wic image is used to create a capsule 12 # IMGDEPLOYDIR is used as the default location of firmware binary for which the capsule needs to be… 15 # The generated capsule by default has uefi.capsule extension 16 CAPSULE_EXTENSION ?= "uefi.capsule" 18 # The generated capsule's name by default is the same as UEFI_FIRMWARE_BINARY 21 # The following variables must be set to be able to generate a capsule update 51 # The firmware binary should be created before generating the capsule
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/ |
H A D | user-guide.rst | 640 * UEFI manual capsule application 802 Capsule Update 805 The following section describes the steps to update the firmware using Capsule Update 808 The firmware update process is tested with an invalid capsule (negative capsule update test) 809 and with a valid capsule (positive capsule update test) to validate the robustness and 812 During the positive capsule update test, the Corstone-1000 is given a valid capsule, which it succe… 814 During the negative capsule update test, the Corstone-1000 is given an outdated capsule with a lowe… 830 The capsule's default metadata passed can be found in the ``$WORKSPACE/meta-arm/meta-arm-bsp/recipe… 833 Valid Capsule 836 …ically generated capsule can be found in ``$WORKSPACE/build/tmp/deploy/images/corstone1000-$TARGET… [all …]
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/dynamic-layers/meta-arm-systemready/recipes-test/arm-systemready-acs/files/fvp-base/ |
H A D | 0001-check-sr-results-Change-the-expected-SR-result-confi.patch | 18 Capsule updates are not supported. 23 a. must-contain "Failure: |0|": Capsule and EFI partition failures make 26 a. capsuleapp-esrt: Capsule updates are not supported. 30 c. must-contain "FwClass": Capsule updates are not supported. 31 d. error-if-contains "ESRT - Not Found": Capsule updates are not 34 a. warn-if-contains "Aborted test": Capsule updates are not supported. 38 a. Remove whole directory because capsule updates are not supported. 48 b. must-contain "FirmwareManagement": Capsule updates are not supported. 52 a. Make optional because capsule updates are not supported.
|
/openbmc/linux/tools/power/acpi/man/ |
H A D | pfrut.8 | 35 Load the capsule file into the system. 36 To be more specific, the capsule file will be copied to the 40 Stage the capsule image from communication buffer into Management Mode 44 Activate a previous staged capsule image.
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/ |
H A D | u-boot-corstone1000.inc | 29 file://0011-efi-corstone1000-fwu-introduce-EFI-capsule-update.patch \ 55 file://0037-corstone1000-enable-authenticated-capsule-config.patch \ 56 file://0038-corstone1000-introduce-EFI-authenticated-capsule-upd.patch \ 57 file://0039-enables-ondisk-capsule-update-feature.patch \ 58 file://0040-fix-runtime-capsule-update-flags-checks.patch \
|
/openbmc/qemu/migration/ |
H A D | vmstate-types.c | 680 struct put_gtree_data *capsule = (struct put_gtree_data *)data; in put_gtree_elem() local 681 QEMUFile *f = capsule->f; in put_gtree_elem() 687 if (!capsule->key_vmsd) { in put_gtree_elem() 690 ret = vmstate_save_state(f, capsule->key_vmsd, key, capsule->vmdesc); in put_gtree_elem() 692 capsule->ret = ret; in put_gtree_elem() 698 ret = vmstate_save_state(f, capsule->val_vmsd, value, capsule->vmdesc); in put_gtree_elem() 700 capsule->ret = ret; in put_gtree_elem() 713 struct put_gtree_data capsule = { in put_gtree() local 726 g_tree_foreach(tree, put_gtree_elem, (gpointer)&capsule); in put_gtree() 728 ret = capsule.ret; in put_gtree()
|
/openbmc/linux/include/uapi/linux/ |
H A D | pfrut.h | 34 * Stage a capsule image from communication buffer and perform authentication. 45 * Activate a previously staged capsule image. 75 * struct pfru_payload_hdr - Capsule file payload header. 77 * @sig: Signature of this capsule file. 83 * this capsule image support.
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/ |
H A D | 0001-Add-stub-capsule-update-service-components.patch | 4 Subject: [PATCH 1/8] Add stub capsule update service components 6 To facilitate development of a capsule update service provider, 8 implementation. The capsule update service provider is integrated 55 + * Defines the common capsule update backend interface. Concrete backends 231 + * The capsule_update_provider is a service provider that accepts update capsule 241 + * \brief Initialize an instance of the capsule update service provider 348 + * Opcode definitions for the capsule update service 371 + * Operation parameter definitions for the capsule update service access protocol.
|
H A D | 0007-plat-corstone1000-Initialize-capsule-update-provider.patch | 4 Subject: [PATCH 7/8] plat: corstone1000: Initialize capsule update provider 6 Initializes the capsule update service provider in se-proxy-sp.c deployment 36 + EMSG("Failed to create Capsule Update proxy");
|
/openbmc/linux/tools/power/acpi/tools/pfrut/ |
H A D | pfrut.c | 9 * on the /dev/pfr_update is to load the EFI capsule into 326 perror("Can not open capsule file..."); in main() 334 perror("Can not fstat capsule file..."); in main() 345 perror("Failed to mmap capsule file."); in main() 354 printf("Load %d bytes of capsule file into the system\n", in main() 358 perror("Failed to load capsule file"); in main()
|
/openbmc/linux/tools/wmi/ |
H A D | dell-smbios-example.c | 190 printf("UEFI Capsule enabled token is: %d\n", ret); in main() 192 printf("UEFI Capsule disabled token is: %d\n", ret); in main() 194 /* activate UEFI capsule token if disabled */ in main() 196 printf("Enabling UEFI capsule token"); in main()
|
/openbmc/openbmc/meta-arm/kas/ |
H A D | corstone1000-image-configuration.yml | 46 capsule: | 47 CAPSULE_EXTENSION = "uefi.capsule"
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/u-boot/ |
H A D | u-boot-uefi-secureboot.inc | 8 require ${@bb.utils.contains('MACHINE_FEATURES', 'uefi-capsule-update', 'u-boot-capsule-update.inc'…
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/files/corstone1000/ |
H A D | 0011-Platform-CS1000-Fix-Bank-offsets.patch | 7 erasing the banks during capsule update. The fwu_agent erases the flash 9 be erased during capsule update.
|