/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot/corstone1000/ |
H A D | 0040-fix-runtime-capsule-update-flags-checks.patch | 4 Subject: [PATCH] fix runtime capsule update flags checks for corstone1000 6 Fixes capsule update flags checks in capsule update as these checks are missing 7 in the platform-specific capsule-update implementation in corstone1000. 25 + if ((capsule->flags & CAPSULE_FLAGS_PERSIST_ACROSS_RESET) && 31 + /*According to UEFI specs a capsule which has the CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE 34 + if (capsule->flags & CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE){ 35 + if(!(capsule->flags & CAPSULE_FLAGS_PERSIST_ACROSS_RESET)){ 41 + /* According to UEFI specs, a capsule which has the CAPSULE_FLAGS_INITIATE_RESET 44 + if (capsule->flags & CAPSULE_FLAGS_INITIATE_RESET){ 45 + if(!(capsule->flags & CAPSULE_FLAGS_PERSIST_ACROSS_RESET)){ [all …]
|
H A D | 0013-efi_loader-corstone1000-remove-guid-check-from-corst.patch | 22 i, &capsule->capsule_guid); 25 - if (guidcmp(&corstone1000_capsule_guid, &capsule->capsule_guid)) { 27 - log_err("Corstone1000: Invalid capsule GUID\n"); 31 if (efi_size_in_pages(capsule->capsule_image_size) > 38 - if (!guidcmp(&capsule->capsule_guid, 40 - ret = efi_capsule_update_firmware(capsule); 42 - log_err("Unsupported capsule type: %pUs\n", 43 - &capsule->capsule_guid); 47 + ret = efi_capsule_update_firmware(capsule);
|
H A D | 0038-corstone1000-introduce-EFI-authenticated-capsule-upd.patch | 4 Subject: [PATCH] corstone1000: introduce EFI authenticated capsule update 6 Introduces EFI authenticated capsule update for corstone1000. Corstone1000 7 implements platform-specific capsule update mechanism in u-bootdue to the SoC 8 design. This patch add authenticated capsule update mechanism to the 24 struct efi_capsule_header *capsule; 38 + capsule_header = (void *)capsule + capsule->header_size; 68 + log_debug("Corstone1000: Updating capsule without authenticating.\n"); 72 efi_memcpy_runtime(corstone1000_capsule_buf, capsule, capsule->capsule_image_size);
|
H A D | 0011-efi-corstone1000-fwu-introduce-EFI-capsule-update.patch | 4 Subject: [PATCH] efi: corstone1000: fwu: introduce EFI capsule update 6 This commit provides capsule update feature for Corstone1000. 10 A platform specific capsule buffer is allocated. This buffer 14 The capsule buffer is shared between u-boot and the secure world. 16 On UpdateCapsule() , capsule data is copied to the buffer and a buffer ready event is generated usi… 89 +/* Size in 4KB pages of the EFI capsule buffer */ 151 +void *__efi_runtime_data corstone1000_capsule_buf; /* capsule shared buffer virtual address */ 165 + * efi_corstone1000_alloc_capsule_shared_buf - allocate capsule shared buffer 166 + * @capsule_image_size: The capsule data (header + payload) 169 + * and the secure world. On UpdateCapsule() capsule data is copied to the buffer [all …]
|
H A D | 0041-scatter-gather-flag-workaround.patch | 10 scatter_gather_list during capsule update, this patch will skip the check only 11 for on-disk capsule update. 24 ret = efi_capsule_read_file(files[i], &capsule); 27 - /* capsule update only supports 1 image and no scatter gather list for corstone1000 */ 28 - efi_update_capsule(&capsule, 1, 0); 29 + /* capsule update only supports 1 image and use of scatter_gather_list 32 + * new capsule update design*/ 33 + ret = efi_update_capsule(&capsule, 1, 1); 35 ret = efi_capsule_update_firmware(capsule);
|
H A D | 0039-enables-ondisk-capsule-update-feature.patch | 4 Subject: [PATCH] Enables on-disk capsule update feature 6 Enables on-disk capsule update feature for corstone1000. 20 ret = efi_capsule_read_file(files[i], &capsule); 23 + /* capsule update only supports 1 image and no scatter gather list for corstone1000 */ 24 + efi_update_capsule(&capsule, 1, 0); 26 ret = efi_capsule_update_firmware(capsule); 29 log_err("Applying capsule %ls failed.\n",
|
H A D | 0037-corstone1000-enable-authenticated-capsule-config.patch | 4 Subject: [PATCH] corstone1000: enable authenticated capsule config 6 Enables authenticated capsule update config for corstone1000.
|
H A D | 0015-efi_firmware-add-get_image_info-for-corstone1000.patch | 68 + /* Check if the capsule authentication is enabled */ 86 - * FMP payload by the edk2 capsule generation scripts. 87 + * FMP payload by the edk1 capsule generation scripts.
|
H A D | 0046-Corstone1000-Change-MMCOMM-buffer-location.patch | 8 to the DDR and also fixes the capsule buffer size since it cannot be 38 /* Size in 4KB pages of the EFI capsule buffer */
|
H A D | 0045-efi-corstone1000-fwu-update-RPC-ABI.patch | 27 * - capsule update interface ID (31:16) 55 * setting capsule update interface ID(31:16)
|
/openbmc/linux/drivers/firmware/efi/ |
H A D | capsule.c | 88 efi_capsule_header_t capsule; in efi_capsule_supported() local 89 efi_capsule_header_t *cap_list[] = { &capsule }; in efi_capsule_supported() 96 capsule.headersize = capsule.imagesize = sizeof(capsule); in efi_capsule_supported() 97 memcpy(&capsule.guid, &guid, sizeof(efi_guid_t)); in efi_capsule_supported() 98 capsule.flags = flags; in efi_capsule_supported() 143 efi_capsule_update_locked(efi_capsule_header_t *capsule, in efi_capsule_update_locked() argument 174 status = efi.update_capsule(&capsule, 1, sglist_phys); in efi_capsule_update_locked() 216 int efi_capsule_update(efi_capsule_header_t *capsule, phys_addr_t *pages) in efi_capsule_update() argument 218 u32 imagesize = capsule->imagesize; in efi_capsule_update() 219 efi_guid_t guid = capsule->guid; in efi_capsule_update() [all …]
|
H A D | capsule-loader.c | 118 if (!cap_info->capsule) { in efi_capsule_submit_update() 119 cap_info->capsule = vmap(cap_info->pages, cap_info->index, in efi_capsule_submit_update() 121 if (!cap_info->capsule) in efi_capsule_submit_update() 126 ret = efi_capsule_update(cap_info->capsule, cap_info->phys); in efi_capsule_submit_update() 128 vunmap(cap_info->capsule); in efi_capsule_submit_update()
|
H A D | Makefile | 17 obj-$(CONFIG_EFI) += capsule.o 40 obj-$(CONFIG_EFI_CAPSULE_LOADER) += capsule-loader.o
|
/openbmc/openbmc/meta-arm/meta-arm/classes/ |
H A D | uefi_capsule.bbclass | 2 # The current class supports generating a capsule with single firmware binary 9 # By default the wic image is used to create a capsule 12 # IMGDEPLOYDIR is used as the default location of firmware binary for which the capsule needs to be… 15 # The generated capsule by default has uefi.capsule extension 16 CAPSULE_EXTENSION ?= "uefi.capsule" 18 # The generated capsule's name by default is the same as UEFI_FIRMWARE_BINARY 21 # The following variables must be set to be able to generate a capsule update 51 # The firmware binary should be created before generating the capsule
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/ |
H A D | user-guide.rst | 640 * UEFI manual capsule application 808 The firmware update process is tested with an invalid capsule (negative capsule update test) 809 and with a valid capsule (positive capsule update test) to validate the robustness and 812 During the positive capsule update test, the Corstone-1000 is given a valid capsule, which it succe… 814 During the negative capsule update test, the Corstone-1000 is given an outdated capsule with a lowe… 830 The capsule's default metadata passed can be found in the ``$WORKSPACE/meta-arm/meta-arm-bsp/recipe… 836 …ically generated capsule can be found in ``$WORKSPACE/build/tmp/deploy/images/corstone1000-$TARGET… 838 The default metadata values are assumed to be correct to generate a valid capsule. 840 This capsule will be used for the positive capsule update test. 845 Generate another capsule with ``fw-version`` metadata set to a lower version than the valid capsule. [all …]
|
H A D | change-log.rst | 89 - The capsule generation script is now part of the meta-arm build system. 90 …Corstone1000-flash-firmware-image recipe generates a capsule binary using the U-Boot capsule gener… 158 - Add signed capsule update support 159 - Enable on-disk capsule update 359 - Manual capsule update support in FVP. 389 - TF-M: fix capsule instability issue for Corstone-1000
|
/openbmc/qemu/migration/ |
H A D | vmstate-types.c | 680 struct put_gtree_data *capsule = (struct put_gtree_data *)data; in put_gtree_elem() local 681 QEMUFile *f = capsule->f; in put_gtree_elem() 687 if (!capsule->key_vmsd) { in put_gtree_elem() 690 ret = vmstate_save_state(f, capsule->key_vmsd, key, capsule->vmdesc); in put_gtree_elem() 692 capsule->ret = ret; in put_gtree_elem() 698 ret = vmstate_save_state(f, capsule->val_vmsd, value, capsule->vmdesc); in put_gtree_elem() 700 capsule->ret = ret; in put_gtree_elem() 713 struct put_gtree_data capsule = { in put_gtree() local 726 g_tree_foreach(tree, put_gtree_elem, (gpointer)&capsule); in put_gtree() 728 ret = capsule.ret; in put_gtree()
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/ |
H A D | u-boot-corstone1000.inc | 29 file://0011-efi-corstone1000-fwu-introduce-EFI-capsule-update.patch \ 55 file://0037-corstone1000-enable-authenticated-capsule-config.patch \ 56 file://0038-corstone1000-introduce-EFI-authenticated-capsule-upd.patch \ 57 file://0039-enables-ondisk-capsule-update-feature.patch \ 58 file://0040-fix-runtime-capsule-update-flags-checks.patch \
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/ |
H A D | 0001-Add-stub-capsule-update-service-components.patch | 4 Subject: [PATCH 1/8] Add stub capsule update service components 6 To facilitate development of a capsule update service provider, 8 implementation. The capsule update service provider is integrated 55 + * Defines the common capsule update backend interface. Concrete backends 231 + * The capsule_update_provider is a service provider that accepts update capsule 241 + * \brief Initialize an instance of the capsule update service provider 348 + * Opcode definitions for the capsule update service 371 + * Operation parameter definitions for the capsule update service access protocol.
|
H A D | 0007-plat-corstone1000-Initialize-capsule-update-provider.patch | 4 Subject: [PATCH 7/8] plat: corstone1000: Initialize capsule update provider 6 Initializes the capsule update service provider in se-proxy-sp.c deployment
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/u-boot/ |
H A D | u-boot-uefi-secureboot.inc | 8 require ${@bb.utils.contains('MACHINE_FEATURES', 'uefi-capsule-update', 'u-boot-capsule-update.inc'…
|
H A D | u-boot-uefi-capsule-update.inc | 3 SRC_URI += "file://uefi-capsule-update.cfg"
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/files/corstone1000/ |
H A D | 0011-Platform-CS1000-Fix-Bank-offsets.patch | 7 erasing the banks during capsule update. The fwu_agent erases the flash 9 be erased during capsule update.
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ |
H A D | ts-arm-platforms.inc | 5 file://0001-Add-stub-capsule-update-service-components.patch \ 11 file://0007-plat-corstone1000-Initialize-capsule-update-provider.patch \
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/images/ |
H A D | corstone1000-flash-firmware-image.bb | 29 # for the capsule generation. The uefi.capsule image type doesn't have to
|