Home
last modified time | relevance | path

Searched refs:capsule (Results 1 – 25 of 36) sorted by relevance

12

/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot/corstone1000/
H A D0040-fix-runtime-capsule-update-flags-checks.patch4 Subject: [PATCH] fix runtime capsule update flags checks for corstone1000
6 Fixes capsule update flags checks in capsule update as these checks are missing
7 in the platform-specific capsule-update implementation in corstone1000.
25 + if ((capsule->flags & CAPSULE_FLAGS_PERSIST_ACROSS_RESET) &&
31 + /*According to UEFI specs a capsule which has the CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE
34 + if (capsule->flags & CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE){
35 + if(!(capsule->flags & CAPSULE_FLAGS_PERSIST_ACROSS_RESET)){
41 + /* According to UEFI specs, a capsule which has the CAPSULE_FLAGS_INITIATE_RESET
44 + if (capsule->flags & CAPSULE_FLAGS_INITIATE_RESET){
45 + if(!(capsule->flags & CAPSULE_FLAGS_PERSIST_ACROSS_RESET)){
[all …]
H A D0013-efi_loader-corstone1000-remove-guid-check-from-corst.patch22 i, &capsule->capsule_guid);
25 - if (guidcmp(&corstone1000_capsule_guid, &capsule->capsule_guid)) {
27 - log_err("Corstone1000: Invalid capsule GUID\n");
31 if (efi_size_in_pages(capsule->capsule_image_size) >
38 - if (!guidcmp(&capsule->capsule_guid,
40 - ret = efi_capsule_update_firmware(capsule);
42 - log_err("Unsupported capsule type: %pUs\n",
43 - &capsule->capsule_guid);
47 + ret = efi_capsule_update_firmware(capsule);
H A D0038-corstone1000-introduce-EFI-authenticated-capsule-upd.patch4 Subject: [PATCH] corstone1000: introduce EFI authenticated capsule update
6 Introduces EFI authenticated capsule update for corstone1000. Corstone1000
7 implements platform-specific capsule update mechanism in u-bootdue to the SoC
8 design. This patch add authenticated capsule update mechanism to the
24 struct efi_capsule_header *capsule;
38 + capsule_header = (void *)capsule + capsule->header_size;
68 + log_debug("Corstone1000: Updating capsule without authenticating.\n");
72 efi_memcpy_runtime(corstone1000_capsule_buf, capsule, capsule->capsule_image_size);
H A D0041-scatter-gather-flag-workaround.patch10 scatter_gather_list during capsule update, this patch will skip the check only
11 for on-disk capsule update.
24 ret = efi_capsule_read_file(files[i], &capsule);
27 - /* capsule update only supports 1 image and no scatter gather list for corstone1000 */
28 - efi_update_capsule(&capsule, 1, 0);
29 + /* capsule update only supports 1 image and use of scatter_gather_list
32 + * new capsule update design*/
33 + ret = efi_update_capsule(&capsule, 1, 1);
35 ret = efi_capsule_update_firmware(capsule);
H A D0039-enables-ondisk-capsule-update-feature.patch4 Subject: [PATCH] Enables on-disk capsule update feature
6 Enables on-disk capsule update feature for corstone1000.
20 ret = efi_capsule_read_file(files[i], &capsule);
23 + /* capsule update only supports 1 image and no scatter gather list for corstone1000 */
24 + efi_update_capsule(&capsule, 1, 0);
26 ret = efi_capsule_update_firmware(capsule);
29 log_err("Applying capsule %ls failed.\n",
H A D0011-efi-corstone1000-fwu-introduce-EFI-capsule-update.patch6 This commit provides capsule update feature for Corstone1000.
10 A platform specific capsule buffer is allocated. This buffer
89 +/* Size in 4KB pages of the EFI capsule buffer */
211 + * in the capsule shared buffer.
233 + * - capsule update interface ID (31:16)
268 i++, capsule = *(++capsule_header_array)) {
272 i, &capsule->capsule_guid);
289 + efi_memcpy_runtime(corstone1000_capsule_buf, capsule, capsule->capsule_image_size);
306 if (!guidcmp(&capsule->capsule_guid,
308 ret = efi_capsule_update_firmware(capsule);
[all …]
H A D0037-corstone1000-enable-authenticated-capsule-config.patch4 Subject: [PATCH] corstone1000: enable authenticated capsule config
6 Enables authenticated capsule update config for corstone1000.
H A D0015-efi_firmware-add-get_image_info-for-corstone1000.patch68 + /* Check if the capsule authentication is enabled */
86 - * FMP payload by the edk2 capsule generation scripts.
87 + * FMP payload by the edk1 capsule generation scripts.
H A D0036-corstone1000-add-signature-device-tree-overlay.patch23 + capsule-key = /incbin/("../../../CRT.esl");
/openbmc/linux/drivers/firmware/efi/
H A Dcapsule.c88 efi_capsule_header_t capsule; in efi_capsule_supported() local
89 efi_capsule_header_t *cap_list[] = { &capsule }; in efi_capsule_supported()
96 capsule.headersize = capsule.imagesize = sizeof(capsule); in efi_capsule_supported()
97 memcpy(&capsule.guid, &guid, sizeof(efi_guid_t)); in efi_capsule_supported()
98 capsule.flags = flags; in efi_capsule_supported()
143 efi_capsule_update_locked(efi_capsule_header_t *capsule, in efi_capsule_update_locked() argument
174 status = efi.update_capsule(&capsule, 1, sglist_phys); in efi_capsule_update_locked()
218 u32 imagesize = capsule->imagesize; in efi_capsule_update()
219 efi_guid_t guid = capsule->guid; in efi_capsule_update()
221 u32 flags = capsule->flags; in efi_capsule_update()
[all …]
H A Dcapsule-loader.c118 if (!cap_info->capsule) { in efi_capsule_submit_update()
119 cap_info->capsule = vmap(cap_info->pages, cap_info->index, in efi_capsule_submit_update()
121 if (!cap_info->capsule) in efi_capsule_submit_update()
126 ret = efi_capsule_update(cap_info->capsule, cap_info->phys); in efi_capsule_submit_update()
128 vunmap(cap_info->capsule); in efi_capsule_submit_update()
H A DMakefile17 obj-$(CONFIG_EFI) += capsule.o
40 obj-$(CONFIG_EFI_CAPSULE_LOADER) += capsule-loader.o
/openbmc/openbmc/meta-arm/meta-arm/classes/
H A Duefi_capsule.bbclass2 # The current class supports generating a capsule with single firmware binary
12 # By default the wic image is used to create a capsule
15 # IMGDEPLOYDIR is used as the default location of firmware binary for which the capsule needs to be…
18 # The generated capsule by default has uefi.capsule extension
19 CAPSULE_EXTENSION ?= "uefi.capsule"
21 # The following variables must be set to be able to generate a capsule update
37 # Copy the firmware and the capsule config json to current directory
43 envsubst < ${UEFI_CAPSULE_CONFIG} > ./${MACHINE}-capsule-update-image.json
47 ${MACHINE}-capsule-update-image.json
54 # The firmware binary should be created before generating the capsule
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/
H A Du-boot-corstone1000.inc29 file://0011-efi-corstone1000-fwu-introduce-EFI-capsule-update.patch \
55 file://0037-corstone1000-enable-authenticated-capsule-config.patch \
56 file://0038-corstone1000-introduce-EFI-authenticated-capsule-upd.patch \
57 file://0039-enables-ondisk-capsule-update-feature.patch \
58 file://0040-fix-runtime-capsule-update-flags-checks.patch \
/openbmc/qemu/migration/
H A Dvmstate-types.c680 struct put_gtree_data *capsule = (struct put_gtree_data *)data; in put_gtree_elem() local
681 QEMUFile *f = capsule->f; in put_gtree_elem()
687 if (!capsule->key_vmsd) { in put_gtree_elem()
690 ret = vmstate_save_state(f, capsule->key_vmsd, key, capsule->vmdesc); in put_gtree_elem()
692 capsule->ret = ret; in put_gtree_elem()
698 ret = vmstate_save_state(f, capsule->val_vmsd, value, capsule->vmdesc); in put_gtree_elem()
700 capsule->ret = ret; in put_gtree_elem()
713 struct put_gtree_data capsule = { in put_gtree() local
726 g_tree_foreach(tree, put_gtree_elem, (gpointer)&capsule); in put_gtree()
728 ret = capsule.ret; in put_gtree()
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/files/corstone1000/
H A D0004-platform-corstone1000-align-capsule-update-structs.patch4 Subject: [PATCH] platform: corstone1000: align capsule update structs
6 U-boot mkefitool creates capsule image without packed and byte-aligned
7 structs. This patch aligns the capsule-update structures and avoids
H A D0006-Platform-Corstone1000-skip-the-first-nv-counter.patch6 It skips doing a sanity check the BL2 nv counter after the capsule
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/
H A Dts-arm-platforms.inc5 file://0001-Add-stub-capsule-update-service-components.patch \
11 file://0007-plat-corstone1000-Initialize-capsule-update-provider.patch \
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/
H A D0001-Add-stub-capsule-update-service-components.patch4 Subject: [PATCH 1/6] Add stub capsule update service components
6 To facilitate development of a capsule update service provider,
8 implementation. The capsule update service provider is integrated
55 + * Defines the common capsule update backend interface. Concrete backends
229 + * The capsule_update_provider is a service provider that accepts update capsule
239 + * \brief Initialize an instance of the capsule update service provider
346 + * Opcode definitions for the capsule update service
369 + * Operation parameter definitions for the capsule update service access protocol.
H A D0007-plat-corstone1000-Initialize-capsule-update-provider.patch4 Subject: [PATCH] plat: corstone1000: Initialize capsule update provider
6 Initializes the capsule update service provider in se-proxy-sp.c deployment
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/images/
H A Dcorstone1000-firmware-deploy-image.inc6 corstone1000-flash-firmware-image-${MACHINE}.wic.uefi.capsule \
H A Dcorstone1000-flash-firmware-image.bb27 UEFI_CAPSULE_CONFIG = "${THISDIR}/files/${PN}-capsule-update-image.json"
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/
H A Dchange-log.rst23 - Add signed capsule update support
24 - Enable on-disk capsule update
224 - Manual capsule update support in FVP.
254 - TF-M: fix capsule instability issue for Corstone-1000
H A Drelease-notes.rst117 BSA), manual capsule update test, Linux distro install and boot.
131 BSA), manual capsule update test, Linux distro install and boot, psa-arch-test.
146 capsule update test, Linux distro install and boot, etc., the SecureEnclave
176 BSA), manual capsule update test, Linux distro install and boot, and
178 - Only the manual capsule update from UEFI shell is supported on FPGA.
H A Duser-guide.rst545 * uefi manual capsule application
679 Manual capsule update and ESRT checks
682 The following section describes running manual capsule update.
685 to retrieve the installed capsule details.
731 generate a UEFI capsule.
754 generate a UEFI capsule.
771 The capsule binary size (wic file) should be less than 15 MB.
823 Performing the capsule update
845 Executing capsule update for FVP and FPGA
866 After successfully updating the capsule the system will reset.
[all …]

12