From: AKASHI Takahiro <takahiro.akashi@linaro.org>
To: u-boot@lists.denx.de
Subject: [RFC 00/14] efi_loader: add capsule update support
Date: Tue, 14 Apr 2020 13:38:10 +0900 [thread overview]
Message-ID: <20200414043810.GA1599@laputa> (raw)
In-Reply-To: <20200331043618.GI11504@linaro.org>
Heinrich,
On Tue, Mar 31, 2020 at 01:36:19PM +0900, AKASHI Takahiro wrote:
> Heinrich,
>
> On Wed, Mar 18, 2020 at 11:04:05AM +0900, AKASHI Takahiro wrote:
> > Heinrich,
> >
> > Thank you for your quick review.
> >
> > On Tue, Mar 17, 2020 at 08:49:12AM +0100, Heinrich Schuchardt wrote:
> > > On 3/17/20 3:12 AM, AKASHI Takahiro wrote:
> > > > Summary
> > > > =======
> > > > 'UpdateCapsule' is one of runtime services defined in UEFI specification
> > > > and its aim is to allow a caller to pass information to the firmware.
> > > > This is mostly used to update firmware binary on devices by instructions
> > > > from OS.
> > > >
> > > > In this patch series, all the related definitions and structures are given
> > > > as UEFI specification describes and basic framework for capsule support is
> > > > implemented. Currently supported types of capsule are
> > > > * firmware update (Firmware Management Protocol or simply FMP)
> > > > * variable update
> > > >
> > > > UpdateCapsule is a runtime services function, but is, at least initially,
> > > > provided only before exiting boot services alike other runtime functions.
> > > > This is because modifying storage which may be shared with OS must be
> > > > carefully designed and there is no general assumption to do that as in
> > > > the case of [Get/]SetVariable.
> > > > Instead, any capsule can be handed over to the firmware as a file on
> > > > a specific file system. In other words, we only support "capsules on disk"
> > > > for now.
> > > >
> > > > Regarding firmware update, most of functionality is provided by FMP
> > > > driver and it will be by nature system/platform-specific. So you can and
> > > > should implement FMP drivers based on your system requirements.
> > > > In this patch series, only a simple FMP driver based on FIT image for
> > > > a single region is supported. (So it is "for reference only")
> > > > See more details in "efi_loader: capsule: add simple firmware management
> > > > protocol."
> > > >
> > > > Regarding variable update, the implementation here is based on a draft
> > > > proposal[1] by Peter in Boot-arch ML. The specification should be discussed
> > > > and finalized first. So the code doesn't fully implement Peter's idea.
> > > >
> > > > [1] https://lists.linaro.org/pipermail/boot-architecture/2018-October/000883.html
> > >
> > > I do not like the idea of exposing variables as a configuration table as
> > > operating system users may start doing strange things like accessing
> > > variables via the configuration table. Why not keep the pointer to the
> > > internal storage of variable hidden in your runtime code and expose the
> > > runtime services defined in the UEFI spec?
> > >
> > > Please, elaborate on the benefit of your approach.
> >
> > I have already commented on your reply to my patch#11.
> >
> > Rather, my aim of this patch is to discuss the following points:
>
> Do you have any comments on them?
No comment?
Do you mind my posting v1 without addressing any TODO list below?
(I'm going to add some enhancement to address "timing of executing
capsule" issue in v1.)
Thanks,
-Takahiro Akashi
> > > > Issues
> > > > ======
> > > > * Timing of executing capsules-on-disk
> > > > Currently, processing a capsule is triggered only as part of
> > > > UEFI subsystem initialization. This means that, for example,
> > > > firmware update, may not take place at system booting time and
> > > > will potentially be delayed until a first call of any UEFI functions.
>
> We, Linaro, internally discussed this issue and agreed that the current
> capsule handling should be split from UEFI initialization code,
> efi_init_obj_list(), and that both of them should be called respectively
> as early as possible in U-Boot initialization time, probably in board_init_r().
>
> We may restrict this behavior only if CAPSULE is enabled.
>
> >
> > and
> >
> > > > TODO's
> > > > ======
> > > > (May or may not be addressed in future versions of this series.)
> > > > * capsule authentication
> > > > * capsule dependency (dependency expression instruction set)
> > > > * loading drivers in a capsule
> > > > * handling RESET flag in a capsule and QeuryCapsuleCaps
> > > > * full semantics of ESRT (EFI System Resource Table)
> > > > * enabling capsule API at runtime
> > > > * json capsule
> > > > * recovery from update failure
> >
> > What functionality should be initially included in my first implementation
> > for capsule support.
>
> Do you have any primary requirements so that you will be happy to
> accept my patch series?
>
> -Takahiro Akashi
>
>
> > FYI, Sughosh is going to work on
> > * capsule authentication
> > * recovery from update failure (or at least, A/B partition)
> > in the coming months.
> >
> > Thanks,
> > -Takahiro Akashi
> >
> >
> >
> > > >
> > > >
> > > > Changes
> > > > =======
> > > > Initial release as RFC (March 17, 2020)
> > > >
> > > > AKASHI Takahiro (14):
> > > > efi_loader: define OsIndicationsSupported flags
> > > > efi_loader: define System Resource Table macros
> > > > efi_loader: export a couple of protocol related functions
> > > > efi_loader: correct a definition of struct efi_capsule_header
> > > > efi_loader: define UpdateCapsule api
> > > > efi_loader: capsule: add capsule_on_disk support
> > > > efi_loader: capsule: add memory range capsule definitions
> > > > efi_loader: capsule: support firmware update
> > > > efi_loader: add simple firmware management protocol for FIT image
> > > > efi_loader: capsule: support variable update
> > > > efi_loader: variable: export variables table for runtime access
> > > > cmd: add "efidebug capsule" command
> > > > tools: add mkeficapsule command for UEFI capsule update test
> > > > test/py: add efi capsule test
> > > >
> > > > cmd/efidebug.c | 234 +++++
> > > > include/efi_api.h | 214 ++++-
> > > > include/efi_loader.h | 53 ++
> > > > lib/efi_loader/Kconfig | 65 ++
> > > > lib/efi_loader/Makefile | 2 +
> > > > lib/efi_loader/efi_boottime.c | 29 +-
> > > > lib/efi_loader/efi_capsule.c | 860 ++++++++++++++++++
> > > > lib/efi_loader/efi_firmware.c | 191 ++++
> > > > lib/efi_loader/efi_runtime.c | 104 ++-
> > > > lib/efi_loader/efi_setup.c | 41 +-
> > > > lib/efi_loader/efi_variable.c | 109 +++
> > > > test/py/tests/test_efi_capsule/conftest.py | 109 +++
> > > > test/py/tests/test_efi_capsule/defs.py | 21 +
> > > > .../test_efi_capsule/test_capsule_firmware.py | 102 +++
> > > > .../test_efi_capsule/test_capsule_variable.py | 141 +++
> > > > test/py/tests/test_efi_capsule/uboot_env.its | 25 +
> > > > tools/Makefile | 3 +
> > > > tools/mkeficapsule.c | 501 ++++++++++
> > > > 18 files changed, 2744 insertions(+), 60 deletions(-)
> > > > create mode 100644 lib/efi_loader/efi_capsule.c
> > > > create mode 100644 lib/efi_loader/efi_firmware.c
> > > > create mode 100644 test/py/tests/test_efi_capsule/conftest.py
> > > > create mode 100644 test/py/tests/test_efi_capsule/defs.py
> > > > create mode 100644 test/py/tests/test_efi_capsule/test_capsule_firmware.py
> > > > create mode 100644 test/py/tests/test_efi_capsule/test_capsule_variable.py
> > > > create mode 100644 test/py/tests/test_efi_capsule/uboot_env.its
> > > > create mode 100644 tools/mkeficapsule.c
> > > >
> > >
next prev parent reply other threads:[~2020-04-14 4:38 UTC|newest]
Thread overview: 49+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-03-17 2:12 [RFC 00/14] efi_loader: add capsule update support AKASHI Takahiro
2020-03-17 2:12 ` [RFC 01/14] efi_loader: define OsIndicationsSupported flags AKASHI Takahiro
2020-03-17 7:03 ` Heinrich Schuchardt
2020-03-18 1:18 ` AKASHI Takahiro
2020-03-18 18:01 ` Heinrich Schuchardt
2020-03-17 2:12 ` [RFC 02/14] efi_loader: define System Resource Table macros AKASHI Takahiro
2020-03-17 7:06 ` Heinrich Schuchardt
2020-03-18 18:02 ` Heinrich Schuchardt
2020-03-17 2:12 ` [RFC 03/14] efi_loader: export a couple of protocol related functions AKASHI Takahiro
2020-03-17 7:19 ` Heinrich Schuchardt
2020-03-18 18:03 ` Heinrich Schuchardt
2020-03-17 2:12 ` [RFC 04/14] efi_loader: correct a definition of struct efi_capsule_header AKASHI Takahiro
2020-03-17 7:25 ` Heinrich Schuchardt
2020-03-18 18:03 ` Heinrich Schuchardt
2020-03-17 2:12 ` [RFC 05/14] efi_loader: define UpdateCapsule api AKASHI Takahiro
2020-03-17 2:12 ` [RFC 06/14] efi_loader: capsule: add capsule_on_disk support AKASHI Takahiro
2020-03-18 8:55 ` Heinrich Schuchardt
2020-03-19 17:08 ` Heinrich Schuchardt
2020-03-30 7:43 ` AKASHI Takahiro
2020-03-17 2:12 ` [RFC 07/14] efi_loader: capsule: add memory range capsule definitions AKASHI Takahiro
2020-03-17 8:11 ` Heinrich Schuchardt
2020-03-18 1:22 ` AKASHI Takahiro
2020-03-18 7:35 ` Heinrich Schuchardt
2020-03-18 7:57 ` AKASHI Takahiro
2020-04-06 7:48 ` AKASHI Takahiro
2020-03-17 2:12 ` [RFC 08/14] efi_loader: capsule: support firmware update AKASHI Takahiro
2020-03-18 14:09 ` Sughosh Ganu
2020-03-17 2:12 ` [RFC 09/14] efi_loader: add simple firmware management protocol for FIT image AKASHI Takahiro
2020-03-18 8:04 ` Heinrich Schuchardt
2020-03-18 8:17 ` AKASHI Takahiro
2020-03-18 9:06 ` Heinrich Schuchardt
2020-04-06 7:59 ` AKASHI Takahiro
2020-03-17 2:12 ` [RFC 10/14] efi_loader: capsule: support variable update AKASHI Takahiro
2020-03-17 2:12 ` [RFC 11/14] efi_loader: variable: export variables table for runtime access AKASHI Takahiro
2020-03-17 7:37 ` Heinrich Schuchardt
2020-03-18 1:53 ` AKASHI Takahiro
2020-03-19 9:30 ` Ilias Apalodimas
2020-03-18 13:54 ` Sughosh Ganu
2020-03-17 2:12 ` [RFC 12/14] cmd: add "efidebug capsule" command AKASHI Takahiro
2020-03-17 2:12 ` [RFC 13/14] tools: add mkeficapsule command for UEFI capsule update test AKASHI Takahiro
2020-03-17 7:58 ` Heinrich Schuchardt
2020-03-18 1:32 ` AKASHI Takahiro
2020-03-19 8:55 ` Ilias Apalodimas
2020-03-17 2:12 ` [RFC 14/14] test/py: add efi capsule test AKASHI Takahiro
2020-03-17 7:49 ` [RFC 00/14] efi_loader: add capsule update support Heinrich Schuchardt
2020-03-18 2:04 ` AKASHI Takahiro
2020-03-31 4:36 ` AKASHI Takahiro
2020-04-14 4:38 ` AKASHI Takahiro [this message]
2020-03-18 18:16 ` Sughosh Ganu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200414043810.GA1599@laputa \
--to=takahiro.akashi@linaro.org \
--cc=u-boot@lists.denx.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox