Home
last modified time | relevance | path

Searched refs:capsule (Results 1 – 25 of 41) sorted by relevance

12

/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot/corstone1000/
H A D0040-fix-runtime-capsule-update-flags-checks.patch4 Subject: [PATCH] fix runtime capsule update flags checks for corstone1000
6 Fixes capsule update flags checks in capsule update as these checks are missing
7 in the platform-specific capsule-update implementation in corstone1000.
25 + if ((capsule->flags & CAPSULE_FLAGS_PERSIST_ACROSS_RESET) &&
31 + /*According to UEFI specs a capsule which has the CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE
34 + if (capsule->flags & CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE){
35 + if(!(capsule->flags & CAPSULE_FLAGS_PERSIST_ACROSS_RESET)){
41 + /* According to UEFI specs, a capsule which has the CAPSULE_FLAGS_INITIATE_RESET
44 + if (capsule->flags & CAPSULE_FLAGS_INITIATE_RESET){
45 + if(!(capsule->flags & CAPSULE_FLAGS_PERSIST_ACROSS_RESET)){
[all …]
H A D0013-efi_loader-corstone1000-remove-guid-check-from-corst.patch22 i, &capsule->capsule_guid);
25 - if (guidcmp(&corstone1000_capsule_guid, &capsule->capsule_guid)) {
27 - log_err("Corstone1000: Invalid capsule GUID\n");
31 if (efi_size_in_pages(capsule->capsule_image_size) >
38 - if (!guidcmp(&capsule->capsule_guid,
40 - ret = efi_capsule_update_firmware(capsule);
42 - log_err("Unsupported capsule type: %pUs\n",
43 - &capsule->capsule_guid);
47 + ret = efi_capsule_update_firmware(capsule);
H A D0038-corstone1000-introduce-EFI-authenticated-capsule-upd.patch4 Subject: [PATCH] corstone1000: introduce EFI authenticated capsule update
6 Introduces EFI authenticated capsule update for corstone1000. Corstone1000
7 implements platform-specific capsule update mechanism in u-bootdue to the SoC
8 design. This patch add authenticated capsule update mechanism to the
24 struct efi_capsule_header *capsule;
38 + capsule_header = (void *)capsule + capsule->header_size;
68 + log_debug("Corstone1000: Updating capsule without authenticating.\n");
72 efi_memcpy_runtime(corstone1000_capsule_buf, capsule, capsule->capsule_image_size);
H A D0011-efi-corstone1000-fwu-introduce-EFI-capsule-update.patch4 Subject: [PATCH] efi: corstone1000: fwu: introduce EFI capsule update
6 This commit provides capsule update feature for Corstone1000.
10 A platform specific capsule buffer is allocated. This buffer
14 The capsule buffer is shared between u-boot and the secure world.
16 On UpdateCapsule() , capsule data is copied to the buffer and a buffer ready event is generated usi…
89 +/* Size in 4KB pages of the EFI capsule buffer */
151 +void *__efi_runtime_data corstone1000_capsule_buf; /* capsule shared buffer virtual address */
165 + * efi_corstone1000_alloc_capsule_shared_buf - allocate capsule shared buffer
166 + * @capsule_image_size: The capsule data (header + payload)
169 + * and the secure world. On UpdateCapsule() capsule data is copied to the buffer
[all …]
H A D0041-scatter-gather-flag-workaround.patch10 scatter_gather_list during capsule update, this patch will skip the check only
11 for on-disk capsule update.
24 ret = efi_capsule_read_file(files[i], &capsule);
27 - /* capsule update only supports 1 image and no scatter gather list for corstone1000 */
28 - efi_update_capsule(&capsule, 1, 0);
29 + /* capsule update only supports 1 image and use of scatter_gather_list
32 + * new capsule update design*/
33 + ret = efi_update_capsule(&capsule, 1, 1);
35 ret = efi_capsule_update_firmware(capsule);
H A D0039-enables-ondisk-capsule-update-feature.patch4 Subject: [PATCH] Enables on-disk capsule update feature
6 Enables on-disk capsule update feature for corstone1000.
20 ret = efi_capsule_read_file(files[i], &capsule);
23 + /* capsule update only supports 1 image and no scatter gather list for corstone1000 */
24 + efi_update_capsule(&capsule, 1, 0);
26 ret = efi_capsule_update_firmware(capsule);
29 log_err("Applying capsule %ls failed.\n",
H A D0037-corstone1000-enable-authenticated-capsule-config.patch4 Subject: [PATCH] corstone1000: enable authenticated capsule config
6 Enables authenticated capsule update config for corstone1000.
H A D0015-efi_firmware-add-get_image_info-for-corstone1000.patch68 + /* Check if the capsule authentication is enabled */
86 - * FMP payload by the edk2 capsule generation scripts.
87 + * FMP payload by the edk1 capsule generation scripts.
H A D0046-Corstone1000-Change-MMCOMM-buffer-location.patch8 to the DDR and also fixes the capsule buffer size since it cannot be
38 /* Size in 4KB pages of the EFI capsule buffer */
H A D0045-efi-corstone1000-fwu-update-RPC-ABI.patch27 * - capsule update interface ID (31:16)
55 * setting capsule update interface ID(31:16)
/openbmc/linux/drivers/firmware/efi/
H A Dcapsule.c88 efi_capsule_header_t capsule; in efi_capsule_supported() local
89 efi_capsule_header_t *cap_list[] = { &capsule }; in efi_capsule_supported()
96 capsule.headersize = capsule.imagesize = sizeof(capsule); in efi_capsule_supported()
97 memcpy(&capsule.guid, &guid, sizeof(efi_guid_t)); in efi_capsule_supported()
98 capsule.flags = flags; in efi_capsule_supported()
143 efi_capsule_update_locked(efi_capsule_header_t *capsule, in efi_capsule_update_locked() argument
174 status = efi.update_capsule(&capsule, 1, sglist_phys); in efi_capsule_update_locked()
216 int efi_capsule_update(efi_capsule_header_t *capsule, phys_addr_t *pages) in efi_capsule_update() argument
218 u32 imagesize = capsule->imagesize; in efi_capsule_update()
219 efi_guid_t guid = capsule->guid; in efi_capsule_update()
[all …]
H A Dcapsule-loader.c118 if (!cap_info->capsule) { in efi_capsule_submit_update()
119 cap_info->capsule = vmap(cap_info->pages, cap_info->index, in efi_capsule_submit_update()
121 if (!cap_info->capsule) in efi_capsule_submit_update()
126 ret = efi_capsule_update(cap_info->capsule, cap_info->phys); in efi_capsule_submit_update()
128 vunmap(cap_info->capsule); in efi_capsule_submit_update()
H A DMakefile17 obj-$(CONFIG_EFI) += capsule.o
40 obj-$(CONFIG_EFI_CAPSULE_LOADER) += capsule-loader.o
/openbmc/openbmc/meta-arm/meta-arm/classes/
H A Duefi_capsule.bbclass2 # The current class supports generating a capsule with single firmware binary
9 # By default the wic image is used to create a capsule
12 # IMGDEPLOYDIR is used as the default location of firmware binary for which the capsule needs to be…
15 # The generated capsule by default has uefi.capsule extension
16 CAPSULE_EXTENSION ?= "uefi.capsule"
18 # The generated capsule's name by default is the same as UEFI_FIRMWARE_BINARY
21 # The following variables must be set to be able to generate a capsule update
51 # The firmware binary should be created before generating the capsule
/openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/
H A Duser-guide.rst640 * UEFI manual capsule application
808 The firmware update process is tested with an invalid capsule (negative capsule update test)
809 and with a valid capsule (positive capsule update test) to validate the robustness and
812 During the positive capsule update test, the Corstone-1000 is given a valid capsule, which it succe…
814 During the negative capsule update test, the Corstone-1000 is given an outdated capsule with a lowe…
830 The capsule's default metadata passed can be found in the ``$WORKSPACE/meta-arm/meta-arm-bsp/recipe…
836 …ically generated capsule can be found in ``$WORKSPACE/build/tmp/deploy/images/corstone1000-$TARGET…
838 The default metadata values are assumed to be correct to generate a valid capsule.
840 This capsule will be used for the positive capsule update test.
845 Generate another capsule with ``fw-version`` metadata set to a lower version than the valid capsule.
[all …]
H A Dchange-log.rst89 - The capsule generation script is now part of the meta-arm build system.
90 …Corstone1000-flash-firmware-image recipe generates a capsule binary using the U-Boot capsule gener…
158 - Add signed capsule update support
159 - Enable on-disk capsule update
359 - Manual capsule update support in FVP.
389 - TF-M: fix capsule instability issue for Corstone-1000
/openbmc/qemu/migration/
H A Dvmstate-types.c680 struct put_gtree_data *capsule = (struct put_gtree_data *)data; in put_gtree_elem() local
681 QEMUFile *f = capsule->f; in put_gtree_elem()
687 if (!capsule->key_vmsd) { in put_gtree_elem()
690 ret = vmstate_save_state(f, capsule->key_vmsd, key, capsule->vmdesc); in put_gtree_elem()
692 capsule->ret = ret; in put_gtree_elem()
698 ret = vmstate_save_state(f, capsule->val_vmsd, value, capsule->vmdesc); in put_gtree_elem()
700 capsule->ret = ret; in put_gtree_elem()
713 struct put_gtree_data capsule = { in put_gtree() local
726 g_tree_foreach(tree, put_gtree_elem, (gpointer)&capsule); in put_gtree()
728 ret = capsule.ret; in put_gtree()
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/
H A Du-boot-corstone1000.inc29 file://0011-efi-corstone1000-fwu-introduce-EFI-capsule-update.patch \
55 file://0037-corstone1000-enable-authenticated-capsule-config.patch \
56 file://0038-corstone1000-introduce-EFI-authenticated-capsule-upd.patch \
57 file://0039-enables-ondisk-capsule-update-feature.patch \
58 file://0040-fix-runtime-capsule-update-flags-checks.patch \
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/
H A D0001-Add-stub-capsule-update-service-components.patch4 Subject: [PATCH 1/8] Add stub capsule update service components
6 To facilitate development of a capsule update service provider,
8 implementation. The capsule update service provider is integrated
55 + * Defines the common capsule update backend interface. Concrete backends
231 + * The capsule_update_provider is a service provider that accepts update capsule
241 + * \brief Initialize an instance of the capsule update service provider
348 + * Opcode definitions for the capsule update service
371 + * Operation parameter definitions for the capsule update service access protocol.
H A D0007-plat-corstone1000-Initialize-capsule-update-provider.patch4 Subject: [PATCH 7/8] plat: corstone1000: Initialize capsule update provider
6 Initializes the capsule update service provider in se-proxy-sp.c deployment
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/u-boot/
H A Du-boot-uefi-secureboot.inc8 require ${@bb.utils.contains('MACHINE_FEATURES', 'uefi-capsule-update', 'u-boot-capsule-update.inc'…
H A Du-boot-uefi-capsule-update.inc3 SRC_URI += "file://uefi-capsule-update.cfg"
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/files/corstone1000/
H A D0011-Platform-CS1000-Fix-Bank-offsets.patch7 erasing the banks during capsule update. The fwu_agent erases the flash
9 be erased during capsule update.
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/
H A Dts-arm-platforms.inc5 file://0001-Add-stub-capsule-update-service-components.patch \
11 file://0007-plat-corstone1000-Initialize-capsule-update-provider.patch \
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/images/
H A Dcorstone1000-flash-firmware-image.bb29 # for the capsule generation. The uefi.capsule image type doesn't have to

12