/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot/corstone1000/ |
H A D | 0040-fix-runtime-capsule-update-flags-checks.patch | 4 Subject: [PATCH] fix runtime capsule update flags checks for corstone1000 6 Fixes capsule update flags checks in capsule update as these checks are missing 7 in the platform-specific capsule-update implementation in corstone1000. 25 + if ((capsule->flags & CAPSULE_FLAGS_PERSIST_ACROSS_RESET) && 31 + /*According to UEFI specs a capsule which has the CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE 34 + if (capsule->flags & CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE){ 35 + if(!(capsule->flags & CAPSULE_FLAGS_PERSIST_ACROSS_RESET)){ 41 + /* According to UEFI specs, a capsule which has the CAPSULE_FLAGS_INITIATE_RESET 44 + if (capsule->flags & CAPSULE_FLAGS_INITIATE_RESET){ 45 + if(!(capsule->flags & CAPSULE_FLAGS_PERSIST_ACROSS_RESET)){ [all …]
|
H A D | 0013-efi_loader-corstone1000-remove-guid-check-from-corst.patch | 22 i, &capsule->capsule_guid); 25 - if (guidcmp(&corstone1000_capsule_guid, &capsule->capsule_guid)) { 27 - log_err("Corstone1000: Invalid capsule GUID\n"); 31 if (efi_size_in_pages(capsule->capsule_image_size) > 38 - if (!guidcmp(&capsule->capsule_guid, 40 - ret = efi_capsule_update_firmware(capsule); 42 - log_err("Unsupported capsule type: %pUs\n", 43 - &capsule->capsule_guid); 47 + ret = efi_capsule_update_firmware(capsule);
|
H A D | 0038-corstone1000-introduce-EFI-authenticated-capsule-upd.patch | 4 Subject: [PATCH] corstone1000: introduce EFI authenticated capsule update 6 Introduces EFI authenticated capsule update for corstone1000. Corstone1000 7 implements platform-specific capsule update mechanism in u-bootdue to the SoC 8 design. This patch add authenticated capsule update mechanism to the 24 struct efi_capsule_header *capsule; 38 + capsule_header = (void *)capsule + capsule->header_size; 68 + log_debug("Corstone1000: Updating capsule without authenticating.\n"); 72 efi_memcpy_runtime(corstone1000_capsule_buf, capsule, capsule->capsule_image_size);
|
H A D | 0041-scatter-gather-flag-workaround.patch | 10 scatter_gather_list during capsule update, this patch will skip the check only 11 for on-disk capsule update. 24 ret = efi_capsule_read_file(files[i], &capsule); 27 - /* capsule update only supports 1 image and no scatter gather list for corstone1000 */ 28 - efi_update_capsule(&capsule, 1, 0); 29 + /* capsule update only supports 1 image and use of scatter_gather_list 32 + * new capsule update design*/ 33 + ret = efi_update_capsule(&capsule, 1, 1); 35 ret = efi_capsule_update_firmware(capsule);
|
H A D | 0039-enables-ondisk-capsule-update-feature.patch | 4 Subject: [PATCH] Enables on-disk capsule update feature 6 Enables on-disk capsule update feature for corstone1000. 20 ret = efi_capsule_read_file(files[i], &capsule); 23 + /* capsule update only supports 1 image and no scatter gather list for corstone1000 */ 24 + efi_update_capsule(&capsule, 1, 0); 26 ret = efi_capsule_update_firmware(capsule); 29 log_err("Applying capsule %ls failed.\n",
|
H A D | 0011-efi-corstone1000-fwu-introduce-EFI-capsule-update.patch | 6 This commit provides capsule update feature for Corstone1000. 10 A platform specific capsule buffer is allocated. This buffer 89 +/* Size in 4KB pages of the EFI capsule buffer */ 211 + * in the capsule shared buffer. 233 + * - capsule update interface ID (31:16) 268 i++, capsule = *(++capsule_header_array)) { 272 i, &capsule->capsule_guid); 289 + efi_memcpy_runtime(corstone1000_capsule_buf, capsule, capsule->capsule_image_size); 306 if (!guidcmp(&capsule->capsule_guid, 308 ret = efi_capsule_update_firmware(capsule); [all …]
|
H A D | 0037-corstone1000-enable-authenticated-capsule-config.patch | 4 Subject: [PATCH] corstone1000: enable authenticated capsule config 6 Enables authenticated capsule update config for corstone1000.
|
H A D | 0015-efi_firmware-add-get_image_info-for-corstone1000.patch | 68 + /* Check if the capsule authentication is enabled */ 86 - * FMP payload by the edk2 capsule generation scripts. 87 + * FMP payload by the edk1 capsule generation scripts.
|
H A D | 0036-corstone1000-add-signature-device-tree-overlay.patch | 23 + capsule-key = /incbin/("../../../CRT.esl");
|
/openbmc/linux/drivers/firmware/efi/ |
H A D | capsule.c | 88 efi_capsule_header_t capsule; in efi_capsule_supported() local 89 efi_capsule_header_t *cap_list[] = { &capsule }; in efi_capsule_supported() 96 capsule.headersize = capsule.imagesize = sizeof(capsule); in efi_capsule_supported() 97 memcpy(&capsule.guid, &guid, sizeof(efi_guid_t)); in efi_capsule_supported() 98 capsule.flags = flags; in efi_capsule_supported() 143 efi_capsule_update_locked(efi_capsule_header_t *capsule, in efi_capsule_update_locked() argument 174 status = efi.update_capsule(&capsule, 1, sglist_phys); in efi_capsule_update_locked() 218 u32 imagesize = capsule->imagesize; in efi_capsule_update() 219 efi_guid_t guid = capsule->guid; in efi_capsule_update() 221 u32 flags = capsule->flags; in efi_capsule_update() [all …]
|
H A D | capsule-loader.c | 118 if (!cap_info->capsule) { in efi_capsule_submit_update() 119 cap_info->capsule = vmap(cap_info->pages, cap_info->index, in efi_capsule_submit_update() 121 if (!cap_info->capsule) in efi_capsule_submit_update() 126 ret = efi_capsule_update(cap_info->capsule, cap_info->phys); in efi_capsule_submit_update() 128 vunmap(cap_info->capsule); in efi_capsule_submit_update()
|
H A D | Makefile | 17 obj-$(CONFIG_EFI) += capsule.o 40 obj-$(CONFIG_EFI_CAPSULE_LOADER) += capsule-loader.o
|
/openbmc/openbmc/meta-arm/meta-arm/classes/ |
H A D | uefi_capsule.bbclass | 2 # The current class supports generating a capsule with single firmware binary 12 # By default the wic image is used to create a capsule 15 # IMGDEPLOYDIR is used as the default location of firmware binary for which the capsule needs to be… 18 # The generated capsule by default has uefi.capsule extension 19 CAPSULE_EXTENSION ?= "uefi.capsule" 21 # The following variables must be set to be able to generate a capsule update 37 # Copy the firmware and the capsule config json to current directory 43 envsubst < ${UEFI_CAPSULE_CONFIG} > ./${MACHINE}-capsule-update-image.json 47 ${MACHINE}-capsule-update-image.json 54 # The firmware binary should be created before generating the capsule
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/ |
H A D | u-boot-corstone1000.inc | 29 file://0011-efi-corstone1000-fwu-introduce-EFI-capsule-update.patch \ 55 file://0037-corstone1000-enable-authenticated-capsule-config.patch \ 56 file://0038-corstone1000-introduce-EFI-authenticated-capsule-upd.patch \ 57 file://0039-enables-ondisk-capsule-update-feature.patch \ 58 file://0040-fix-runtime-capsule-update-flags-checks.patch \
|
/openbmc/qemu/migration/ |
H A D | vmstate-types.c | 680 struct put_gtree_data *capsule = (struct put_gtree_data *)data; in put_gtree_elem() local 681 QEMUFile *f = capsule->f; in put_gtree_elem() 687 if (!capsule->key_vmsd) { in put_gtree_elem() 690 ret = vmstate_save_state(f, capsule->key_vmsd, key, capsule->vmdesc); in put_gtree_elem() 692 capsule->ret = ret; in put_gtree_elem() 698 ret = vmstate_save_state(f, capsule->val_vmsd, value, capsule->vmdesc); in put_gtree_elem() 700 capsule->ret = ret; in put_gtree_elem() 713 struct put_gtree_data capsule = { in put_gtree() local 726 g_tree_foreach(tree, put_gtree_elem, (gpointer)&capsule); in put_gtree() 728 ret = capsule.ret; in put_gtree()
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/files/corstone1000/ |
H A D | 0004-platform-corstone1000-align-capsule-update-structs.patch | 4 Subject: [PATCH] platform: corstone1000: align capsule update structs 6 U-boot mkefitool creates capsule image without packed and byte-aligned 7 structs. This patch aligns the capsule-update structures and avoids
|
H A D | 0006-Platform-Corstone1000-skip-the-first-nv-counter.patch | 6 It skips doing a sanity check the BL2 nv counter after the capsule
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ |
H A D | ts-arm-platforms.inc | 5 file://0001-Add-stub-capsule-update-service-components.patch \ 11 file://0007-plat-corstone1000-Initialize-capsule-update-provider.patch \
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/ |
H A D | 0001-Add-stub-capsule-update-service-components.patch | 4 Subject: [PATCH 1/6] Add stub capsule update service components 6 To facilitate development of a capsule update service provider, 8 implementation. The capsule update service provider is integrated 55 + * Defines the common capsule update backend interface. Concrete backends 229 + * The capsule_update_provider is a service provider that accepts update capsule 239 + * \brief Initialize an instance of the capsule update service provider 346 + * Opcode definitions for the capsule update service 369 + * Operation parameter definitions for the capsule update service access protocol.
|
H A D | 0007-plat-corstone1000-Initialize-capsule-update-provider.patch | 4 Subject: [PATCH] plat: corstone1000: Initialize capsule update provider 6 Initializes the capsule update service provider in se-proxy-sp.c deployment
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/images/ |
H A D | corstone1000-firmware-deploy-image.inc | 6 corstone1000-flash-firmware-image-${MACHINE}.wic.uefi.capsule \
|
H A D | corstone1000-flash-firmware-image.bb | 27 UEFI_CAPSULE_CONFIG = "${THISDIR}/files/${PN}-capsule-update-image.json"
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/ |
H A D | change-log.rst | 23 - Add signed capsule update support 24 - Enable on-disk capsule update 224 - Manual capsule update support in FVP. 254 - TF-M: fix capsule instability issue for Corstone-1000
|
H A D | release-notes.rst | 117 BSA), manual capsule update test, Linux distro install and boot. 131 BSA), manual capsule update test, Linux distro install and boot, psa-arch-test. 146 capsule update test, Linux distro install and boot, etc., the SecureEnclave 176 BSA), manual capsule update test, Linux distro install and boot, and 178 - Only the manual capsule update from UEFI shell is supported on FPGA.
|
H A D | user-guide.rst | 545 * uefi manual capsule application 679 Manual capsule update and ESRT checks 682 The following section describes running manual capsule update. 685 to retrieve the installed capsule details. 731 generate a UEFI capsule. 754 generate a UEFI capsule. 771 The capsule binary size (wic file) should be less than 15 MB. 823 Performing the capsule update 845 Executing capsule update for FVP and FPGA 866 After successfully updating the capsule the system will reset. [all …]
|