Message ID | 20200317021247.5849-14-takahiro.akashi@linaro.org |
---|---|
State | New |
Headers | show |
Series | efi_loader: add capsule update support | expand |
On 3/17/20 3:12 AM, AKASHI Takahiro wrote: > This is a utility mainly for test purpose. > mkeficapsule -f: create a FIT image firmware capsule The UEFI spec defines a capsule format and how to invoke it by placing the file in the right directory before reboot. Why do we need a FIT image firmware capsule? Best regards Heinrich > mkeficapsule -v: create a specific test case capsule for variables > > Having said that, you will be able to customize the code to fit > your specific requirements for your platform. > > Signed-off-by: AKASHI Takahiro <takahiro.akashi at linaro.org> > --- > tools/Makefile | 3 + > tools/mkeficapsule.c | 501 +++++++++++++++++++++++++++++++++++++++++++ > 2 files changed, 504 insertions(+) > create mode 100644 tools/mkeficapsule.c > > diff --git a/tools/Makefile b/tools/Makefile > index 99be724b82a5..fe07f8952f49 100644 > --- a/tools/Makefile > +++ b/tools/Makefile > @@ -222,6 +222,9 @@ hostprogs-$(CONFIG_MIPS) += mips-relocs > hostprogs-$(CONFIG_ASN1_COMPILER) += asn1_compiler > HOSTCFLAGS_asn1_compiler.o = -idirafter $(srctree)/include > > +# TODO: only build this for capsule pytest > +hostprogs-$(CONFIG_EFI_CAPSULE_UPDATE) += mkeficapsule > + > # We build some files with extra pedantic flags to try to minimize things > # that won't build on some weird host compiler -- though there are lots of > # exceptions for files that aren't complaint. > diff --git a/tools/mkeficapsule.c b/tools/mkeficapsule.c > new file mode 100644 > index 000000000000..732a54811df9 > --- /dev/null > +++ b/tools/mkeficapsule.c > @@ -0,0 +1,501 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * Copyright 2018 Linaro Limited > + * Author: AKASHI Takahiro > + */ > + > +#include <malloc.h> > +#include <stdio.h> > +#include <string.h> > +#include <sys/stat.h> > +#include <sys/types.h> > +/* > + * TODO: use libefi/libgnuefi headers > + */ > + > +typedef u_int8_t u8; > +typedef u_int16_t u16; > +typedef u_int32_t u32; > +typedef u_int64_t u64; > + > +/* include/efi.h */ > +typedef struct { > + u8 b[16]; > +} efi_guid_t; > + > +#define EFI_GUID(a, b, c, d0, d1, d2, d3, d4, d5, d6, d7) \ > + {{ (a) & 0xff, ((a) >> 8) & 0xff, ((a) >> 16) & 0xff, \ > + ((a) >> 24) & 0xff, \ > + (b) & 0xff, ((b) >> 8) & 0xff, \ > + (c) & 0xff, ((c) >> 8) & 0xff, \ > + (d0), (d1), (d2), (d3), (d4), (d5), (d6), (d7) } } > + > +#define EFI_VARIABLE_NON_VOLATILE 0x0000000000000001 > +#define EFI_VARIABLE_BOOTSERVICE_ACCESS 0x0000000000000002 > +#define EFI_VARIABLE_RUNTIME_ACCESS 0x0000000000000004 > + > +/* include/efi_api.h */ > +#define EFI_GLOBAL_VARIABLE_GUID \ > + EFI_GUID(0x8be4df61, 0x93ca, 0x11d2, 0xaa, 0x0d, \ > + 0x00, 0xe0, 0x98, 0x03, 0x2b, 0x8c) > + > +#define CAPSULE_FLAGS_PERSIST_ACROSS_RESET 0x00010000 > +#define CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE 0x00020000 > +#define CAPSULE_FLAGS_INITIATE_RESET 0x00040000 > + > +#define EFI_FIRMWARE_IMAGE_TYPE_UBOOT_FIT_GUID \ > + EFI_GUID(0xae13ff2d, 0x9ad4, 0x4e25, 0x9a, 0xc8, \ > + 0x6d, 0x80, 0xb3, 0xb2, 0x21, 0x47) > + > +#define EFI_FIRMWARE_MANAGEMENT_CAPSULE_ID_GUID \ > + EFI_GUID(0x6dcbd5ed, 0xe82d, 0x4c44, 0xbd, 0xa1, \ > + 0x71, 0x94, 0x19, 0x9a, 0xd9, 0x2a) > + > +#define EFI_VARIABLE_STORAGE_GUID \ > + EFI_GUID(0x1a3fb419, 0x2171, 0x458d, 0xb8, 0xb4, \ > + 0xbe, 0xa3, 0x0c, 0x9f, 0x6b, 0xab) > + > +struct efi_capsule_header { > + efi_guid_t capsule_guid; > + u32 header_size; > + u32 flags; > + u32 capsule_image_size; > +} __attribute__((packed)); > + > +struct efi_capsule_block_descriptor { > + u64 length; > + union { > + u64 data_block; > + u64 continuation_ptr; > + }; > +} __attribute__((packed)); > + > +struct efi_firmware_management_capsule_header { > + u32 version; > + u16 embedded_driver_count; > + u16 payload_item_count; > + u64 item_offset_list[]; > +} __attribute__((packed)); > + > +struct efi_firmware_management_capsule_image_header { > + u32 version; > + efi_guid_t update_image_type_id; > + u8 update_image_index; > + u8 reserved[3]; > + u32 update_image_size; > + u32 update_vendor_code_size; > + u64 update_hardware_instance; > +} __attribute__((packed)); > + > +struct efi_ebbr_variable { > + u16 variable_name[64]; > + efi_guid_t vendor_guid; > + u32 attributes; > + u32 data_size; > + u8 data[]; > +}; > + > +struct efi_ebbr_variable_bundle { > + struct efi_capsule_header header; > + u8 reserved[0]; > + struct efi_ebbr_variable variables[]; > +} __attribute__((packed)); > + > +efi_guid_t efi_guid_fm_capsule = EFI_FIRMWARE_MANAGEMENT_CAPSULE_ID_GUID; > +efi_guid_t efi_guid_image_type_uboot_fit = > + EFI_FIRMWARE_IMAGE_TYPE_UBOOT_FIT_GUID; > +efi_guid_t efi_guid_variable_storage = EFI_VARIABLE_STORAGE_GUID; > +efi_guid_t efi_global_variable_guid = EFI_GLOBAL_VARIABLE_GUID; > + > +/* generated by efi boot add 3 TEST scsi 0:0 /EFI/Images/hello.efi "" */ > +char boot_var3[] = "0100000052005400450053005400000001041400b9731de684a3cc4aaeab82e828f3628b0302080000000000040432005c005c004500460049005c0049006d0061006700650073005c00680065006c006c006f002e0065006600690000007fff040000"; > +u16 boot_order[] = { > + 0x0003, > + 0x0002, > +}; > + > +/* efi_variable.c */ > +static int hex(int ch) > +{ > + if (ch >= 'a' && ch <= 'f') > + return ch - 'a' + 10; > + if (ch >= '0' && ch <= '9') > + return ch - '0'; > + if (ch >= 'A' && ch <= 'F') > + return ch - 'A' + 10; > + return -1; > +} > + > +static int hex2mem(u8 *mem, const char *hexstr, int size) > +{ > + int nibble; > + int i; > + > + for (i = 0; i < size; i++) { > + if (*hexstr == '\0') > + break; > + > + nibble = hex(*hexstr); > + if (nibble < 0) > + return -1; > + > + *mem = nibble; > + hexstr++; > + > + nibble = hex(*hexstr); > + if (nibble < 0) > + return -1; > + > + *mem = (*mem << 4) | nibble; > + hexstr++; > + mem++; > + } > + > + return i; > +} > + > +void wcharcpy(u16 *dst, wchar_t *src, size_t n) > +{ > + int i; > + > + for (i = 0; i < n; i++) > + *dst++ = *src++; > +} > + > +static int create_fwbin(char *bin, char *path) > +{ > + struct efi_capsule_header header; > + struct efi_firmware_management_capsule_header capsule; > + struct efi_firmware_management_capsule_image_header image; > + FILE *f, *g; > + struct stat bin_stat; > + u8 *data; > + size_t size; > + > + g = fopen(bin, "r"); > + if (!g) { > + printf("cannot open %s\n", bin); > + return -1; > + } > + if (stat(bin, &bin_stat) < 0) { > + printf("cannot determine the size of %s\n", bin); > + goto err_1; > + } > + data = malloc(bin_stat.st_size); > + if (!data) { > + printf("cannot allocate memory: %lx\n", bin_stat.st_size); > + goto err_1; > + } > + f = fopen(path, "w"); > + if (!f) { > + printf("cannot open %s\n", path); > + goto err_2; > + } > + header.capsule_guid = efi_guid_fm_capsule; > + header.header_size = sizeof(header); > + header.flags = CAPSULE_FLAGS_PERSIST_ACROSS_RESET; /* TODO */ > + header.capsule_image_size = sizeof(header) > + + sizeof(capsule) + sizeof(u64) > + + sizeof(image) > + + bin_stat.st_size; > + > + size = fwrite(&header, 1, sizeof(header), f); > + if (size < sizeof(header)) { > + printf("write failed (%lx)\n", size); > + goto err_3; > + } > + > + capsule.version = 0x00000001; > + capsule.embedded_driver_count = 0; > + capsule.payload_item_count = 1; > + capsule.item_offset_list[0] = sizeof(capsule) + sizeof(u64); > + size = fwrite(&capsule, 1, sizeof(capsule) + sizeof(u64), f); > + if (size < (sizeof(capsule) + sizeof(u64))) { > + printf("write failed (%lx)\n", size); > + goto err_3; > + } > + > + image.version = 0x00000002; > + image.update_image_type_id = efi_guid_image_type_uboot_fit; > + image.update_image_index = 1; > + image.update_image_size = bin_stat.st_size; > + image.update_vendor_code_size = 0; /* none */ > + image.update_hardware_instance = 1; > + > + size = fwrite(&image, 1, sizeof(image), f); > + if (size < sizeof(image)) { > + printf("write failed (%lx)\n", size); > + goto err_3; > + } > + size = fread(data, 1, bin_stat.st_size, g); > + if (size < bin_stat.st_size) { > + printf("read failed (%lx)\n", size); > + goto err_3; > + } > + size = fwrite(data, 1, bin_stat.st_size, f); > + if (size < bin_stat.st_size) { > + printf("write failed (%lx)\n", size); > + goto err_3; > + } > + > + fclose(f); > + fclose(g); > + free(data); > + > + return 0; > + > +err_3: > + fclose(f); > +err_2: > + free(data); > +err_1: > + fclose(g); > + > + return -1; > +} > + > +static int create_test1(char *path) > +{ > + FILE *f; > + size_t size; > + struct efi_capsule_header header; > + struct efi_ebbr_variable variable; > + u8 *data; > + size_t data_size; > + > + f = fopen(path, "w"); > + if (!f) { > + printf("cannot open %s\n", path); > + return -1; > + } > + header.capsule_guid = efi_guid_variable_storage; > + header.header_size = sizeof(header); > + header.flags = CAPSULE_FLAGS_PERSIST_ACROSS_RESET; /* TODO */ > + header.capsule_image_size = sizeof(header); > + > + size = fwrite(&header, 1, sizeof(header), f); > + if (size < sizeof(header)) { > + printf("write failed (%lx)\n", size); > + return -1; > + } > + > + /* add a new variable */ > + data_size = sizeof(boot_var3) / 2; > + data = malloc(data_size); > + if (!data) { > + printf("memory allocation failed\n"); > + return -1; > + } > + hex2mem(data, boot_var3, data_size); > + wcharcpy(variable.variable_name, L"Boot0003", 9); > + variable.vendor_guid = efi_global_variable_guid; > + variable.attributes = (EFI_VARIABLE_NON_VOLATILE | > + EFI_VARIABLE_BOOTSERVICE_ACCESS | > + EFI_VARIABLE_RUNTIME_ACCESS); > + variable.data_size = data_size; > + header.capsule_image_size += sizeof(variable) + variable.data_size; > + > + size = fwrite(&variable, 1, sizeof(variable), f); > + if (size < sizeof(variable)) { > + printf("write failed (%lx)\n", size); > + return -1; > + } > + size = fwrite(data, 1, data_size, f); > + if (size < data_size) { > + printf("write failed (%lx)\n", size); > + return -1; > + } > + > + /* update capsule image size */ > + rewind(f); > + size = fwrite(&header, 1, sizeof(header), f); > + if (size < sizeof(header)) { > + printf("write failed (%lx)\n", size); > + return -1; > + } > + > + fclose(f); > + > + return 0; > +} > + > +static int create_test2(char *path) > +{ > + FILE *f; > + size_t size; > + struct efi_capsule_header header; > + struct efi_ebbr_variable variable; > + > + f = fopen(path, "w"); > + if (!f) { > + printf("cannot open %s\n", path); > + return -1; > + } > + header.capsule_guid = efi_guid_variable_storage; > + header.header_size = sizeof(header); > + header.flags = CAPSULE_FLAGS_PERSIST_ACROSS_RESET; /* TODO */ > + header.capsule_image_size = sizeof(header); > + > + size = fwrite(&header, 1, sizeof(header), f); > + if (size < sizeof(header)) { > + printf("write failed (%lx)\n", size); > + return -1; > + } > + > + /* modify an existing variable */ > + wcharcpy(variable.variable_name, L"BootOrder", 10); > + variable.vendor_guid = efi_global_variable_guid; > + variable.attributes = (EFI_VARIABLE_NON_VOLATILE | > + EFI_VARIABLE_BOOTSERVICE_ACCESS | > + EFI_VARIABLE_RUNTIME_ACCESS); > + variable.data_size = sizeof(boot_order); > + header.capsule_image_size += sizeof(variable) + variable.data_size; > + > + size = fwrite(&variable, 1, sizeof(variable), f); > + if (size < sizeof(variable)) { > + printf("write failed (%lx)\n", size); > + return -1; > + } > + size = fwrite(boot_order, 1, sizeof(boot_order), f); > + if (size < sizeof(boot_order)) { > + printf("write failed (%lx)\n", size); > + return -1; > + } > + > + /* delete an existing variable */ > + wcharcpy(variable.variable_name, L"Boot0001", 9); > + variable.vendor_guid = efi_global_variable_guid; > + variable.attributes = (EFI_VARIABLE_NON_VOLATILE | > + EFI_VARIABLE_BOOTSERVICE_ACCESS | > + EFI_VARIABLE_RUNTIME_ACCESS); > + variable.data_size = 0; > + header.capsule_image_size += sizeof(variable) + variable.data_size; > + > + size = fwrite(&variable, 1, sizeof(variable), f); > + if (size < sizeof(variable)) { > + printf("write failed (%lx)\n", size); > + return -1; > + } > + > + /* update capsule image size */ > + rewind(f); > + size = fwrite(&header, 1, sizeof(header), f); > + if (size < sizeof(header)) { > + printf("write failed (%lx)\n", size); > + return -1; > + } > + > + fclose(f); > + > + return 0; > +} > + > +static int create_test3(char *path) > +{ > + FILE *f; > + size_t size; > + struct efi_capsule_header header; > + struct efi_ebbr_variable variable; > + > + f = fopen(path, "w"); > + if (!f) { > + printf("cannot open %s\n", path); > + return -1; > + } > + header.capsule_guid = efi_guid_variable_storage; > + header.header_size = sizeof(header); > + header.flags = CAPSULE_FLAGS_PERSIST_ACROSS_RESET; /* TODO */ > + header.capsule_image_size = sizeof(header); > + > + size = fwrite(&header, 1, sizeof(header), f); > + if (size < sizeof(header)) { > + printf("write failed (%lx)\n", size); > + return -1; > + } > + > + /* delete a non-existing variable */ > + wcharcpy(variable.variable_name, L"FooVar", 9); > + variable.vendor_guid = efi_global_variable_guid; > + variable.attributes = (EFI_VARIABLE_BOOTSERVICE_ACCESS | > + EFI_VARIABLE_RUNTIME_ACCESS); > + variable.data_size = 0; > + header.capsule_image_size += sizeof(variable) + variable.data_size; > + > + size = fwrite(&variable, 1, sizeof(variable), f); > + if (size < sizeof(variable)) { > + printf("write failed (%lx)\n", size); > + return -1; > + } > + > + /* update capsule image size */ > + rewind(f); > + size = fwrite(&header, 1, sizeof(header), f); > + if (size < sizeof(header)) { > + printf("write failed (%lx)\n", size); > + return -1; > + } > + > + fclose(f); > + > + return 0; > +} > + > +void print_usage(void) > +{ > + printf("mkeficapsule [-f <firmware binary> | -t <variable test no>]\n"); > +} > + > +/* > + * Usage: > + * $ mkeficapsule [-f <firmware binary> | -t <variable test no>] <output file> > + */ > +int main(int argc, char **argv) > +{ > + int test_no; > + > + if (argc != 4) { > + print_usage(); > + return -1; > + } > + > + if (!strcmp(argv[1], "-f")) { > + if (create_fwbin(argv[2], argv[3]) < 0) { > + printf("Creating firmware capsule for %s failed\n", > + argv[2]); > + return -1; > + } > + > + return 0; > + } else if (!strcmp(argv[1], "-v")) { > + test_no = atoi(argv[2]); > + > + switch (test_no) { > + case 1: > + if (create_test1(argv[3]) < 0) { > + printf("Creating test%02x failed\n", test_no); > + return -1; > + } > + break; > + case 2: > + if (create_test2(argv[3]) < 0) { > + printf("Creating test%02x failed\n", test_no); > + return -1; > + } > + break; > + case 3: > + if (create_test3(argv[3]) < 0) { > + printf("Creating test%02x failed\n", test_no); > + return -1; > + } > + break; > + default: > + printf("Invalid test number: %s\n", argv[2]); > + return -1; > + } > + > + return 0; > + } > + > + print_usage(); > + return -1; > +} >
On Tue, Mar 17, 2020 at 08:58:55AM +0100, Heinrich Schuchardt wrote: > On 3/17/20 3:12 AM, AKASHI Takahiro wrote: > > This is a utility mainly for test purpose. > > mkeficapsule -f: create a FIT image firmware capsule > > The UEFI spec defines a capsule format and how to invoke it by placing > the file in the right directory before reboot. Why do we need a FIT > image firmware capsule? ??? I don't get your point. A capsule is just a wrapper that can hold any kind (or format) of binary data. In fact, an associated capsule driver should know how the data should correctly be handled on U-Boot. So if you provide your own driver (more specifically, "firmware management protocol" for firmware update), you can encapsulate any firmware in your proprietary format. In this RFC, I provide a *sample* driver for a single FIT image in patch#9. Thanks, -Takahiro Akashi > Best regards > > Heinrich > > > mkeficapsule -v: create a specific test case capsule for variables > > > > Having said that, you will be able to customize the code to fit > > your specific requirements for your platform. > > > > Signed-off-by: AKASHI Takahiro <takahiro.akashi at linaro.org> > > --- > > tools/Makefile | 3 + > > tools/mkeficapsule.c | 501 +++++++++++++++++++++++++++++++++++++++++++ > > 2 files changed, 504 insertions(+) > > create mode 100644 tools/mkeficapsule.c > > > > diff --git a/tools/Makefile b/tools/Makefile > > index 99be724b82a5..fe07f8952f49 100644 > > --- a/tools/Makefile > > +++ b/tools/Makefile > > @@ -222,6 +222,9 @@ hostprogs-$(CONFIG_MIPS) += mips-relocs > > hostprogs-$(CONFIG_ASN1_COMPILER) += asn1_compiler > > HOSTCFLAGS_asn1_compiler.o = -idirafter $(srctree)/include > > > > +# TODO: only build this for capsule pytest > > +hostprogs-$(CONFIG_EFI_CAPSULE_UPDATE) += mkeficapsule > > + > > # We build some files with extra pedantic flags to try to minimize things > > # that won't build on some weird host compiler -- though there are lots of > > # exceptions for files that aren't complaint. > > diff --git a/tools/mkeficapsule.c b/tools/mkeficapsule.c > > new file mode 100644 > > index 000000000000..732a54811df9 > > --- /dev/null > > +++ b/tools/mkeficapsule.c > > @@ -0,0 +1,501 @@ > > +// SPDX-License-Identifier: GPL-2.0 > > +/* > > + * Copyright 2018 Linaro Limited > > + * Author: AKASHI Takahiro > > + */ > > + > > +#include <malloc.h> > > +#include <stdio.h> > > +#include <string.h> > > +#include <sys/stat.h> > > +#include <sys/types.h> > > +/* > > + * TODO: use libefi/libgnuefi headers > > + */ > > + > > +typedef u_int8_t u8; > > +typedef u_int16_t u16; > > +typedef u_int32_t u32; > > +typedef u_int64_t u64; > > + > > +/* include/efi.h */ > > +typedef struct { > > + u8 b[16]; > > +} efi_guid_t; > > + > > +#define EFI_GUID(a, b, c, d0, d1, d2, d3, d4, d5, d6, d7) \ > > + {{ (a) & 0xff, ((a) >> 8) & 0xff, ((a) >> 16) & 0xff, \ > > + ((a) >> 24) & 0xff, \ > > + (b) & 0xff, ((b) >> 8) & 0xff, \ > > + (c) & 0xff, ((c) >> 8) & 0xff, \ > > + (d0), (d1), (d2), (d3), (d4), (d5), (d6), (d7) } } > > + > > +#define EFI_VARIABLE_NON_VOLATILE 0x0000000000000001 > > +#define EFI_VARIABLE_BOOTSERVICE_ACCESS 0x0000000000000002 > > +#define EFI_VARIABLE_RUNTIME_ACCESS 0x0000000000000004 > > + > > +/* include/efi_api.h */ > > +#define EFI_GLOBAL_VARIABLE_GUID \ > > + EFI_GUID(0x8be4df61, 0x93ca, 0x11d2, 0xaa, 0x0d, \ > > + 0x00, 0xe0, 0x98, 0x03, 0x2b, 0x8c) > > + > > +#define CAPSULE_FLAGS_PERSIST_ACROSS_RESET 0x00010000 > > +#define CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE 0x00020000 > > +#define CAPSULE_FLAGS_INITIATE_RESET 0x00040000 > > + > > +#define EFI_FIRMWARE_IMAGE_TYPE_UBOOT_FIT_GUID \ > > + EFI_GUID(0xae13ff2d, 0x9ad4, 0x4e25, 0x9a, 0xc8, \ > > + 0x6d, 0x80, 0xb3, 0xb2, 0x21, 0x47) > > + > > +#define EFI_FIRMWARE_MANAGEMENT_CAPSULE_ID_GUID \ > > + EFI_GUID(0x6dcbd5ed, 0xe82d, 0x4c44, 0xbd, 0xa1, \ > > + 0x71, 0x94, 0x19, 0x9a, 0xd9, 0x2a) > > + > > +#define EFI_VARIABLE_STORAGE_GUID \ > > + EFI_GUID(0x1a3fb419, 0x2171, 0x458d, 0xb8, 0xb4, \ > > + 0xbe, 0xa3, 0x0c, 0x9f, 0x6b, 0xab) > > + > > +struct efi_capsule_header { > > + efi_guid_t capsule_guid; > > + u32 header_size; > > + u32 flags; > > + u32 capsule_image_size; > > +} __attribute__((packed)); > > + > > +struct efi_capsule_block_descriptor { > > + u64 length; > > + union { > > + u64 data_block; > > + u64 continuation_ptr; > > + }; > > +} __attribute__((packed)); > > + > > +struct efi_firmware_management_capsule_header { > > + u32 version; > > + u16 embedded_driver_count; > > + u16 payload_item_count; > > + u64 item_offset_list[]; > > +} __attribute__((packed)); > > + > > +struct efi_firmware_management_capsule_image_header { > > + u32 version; > > + efi_guid_t update_image_type_id; > > + u8 update_image_index; > > + u8 reserved[3]; > > + u32 update_image_size; > > + u32 update_vendor_code_size; > > + u64 update_hardware_instance; > > +} __attribute__((packed)); > > + > > +struct efi_ebbr_variable { > > + u16 variable_name[64]; > > + efi_guid_t vendor_guid; > > + u32 attributes; > > + u32 data_size; > > + u8 data[]; > > +}; > > + > > +struct efi_ebbr_variable_bundle { > > + struct efi_capsule_header header; > > + u8 reserved[0]; > > + struct efi_ebbr_variable variables[]; > > +} __attribute__((packed)); > > + > > +efi_guid_t efi_guid_fm_capsule = EFI_FIRMWARE_MANAGEMENT_CAPSULE_ID_GUID; > > +efi_guid_t efi_guid_image_type_uboot_fit = > > + EFI_FIRMWARE_IMAGE_TYPE_UBOOT_FIT_GUID; > > +efi_guid_t efi_guid_variable_storage = EFI_VARIABLE_STORAGE_GUID; > > +efi_guid_t efi_global_variable_guid = EFI_GLOBAL_VARIABLE_GUID; > > + > > +/* generated by efi boot add 3 TEST scsi 0:0 /EFI/Images/hello.efi "" */ > > +char boot_var3[] = "0100000052005400450053005400000001041400b9731de684a3cc4aaeab82e828f3628b0302080000000000040432005c005c004500460049005c0049006d0061006700650073005c00680065006c006c006f002e0065006600690000007fff040000"; > > +u16 boot_order[] = { > > + 0x0003, > > + 0x0002, > > +}; > > + > > +/* efi_variable.c */ > > +static int hex(int ch) > > +{ > > + if (ch >= 'a' && ch <= 'f') > > + return ch - 'a' + 10; > > + if (ch >= '0' && ch <= '9') > > + return ch - '0'; > > + if (ch >= 'A' && ch <= 'F') > > + return ch - 'A' + 10; > > + return -1; > > +} > > + > > +static int hex2mem(u8 *mem, const char *hexstr, int size) > > +{ > > + int nibble; > > + int i; > > + > > + for (i = 0; i < size; i++) { > > + if (*hexstr == '\0') > > + break; > > + > > + nibble = hex(*hexstr); > > + if (nibble < 0) > > + return -1; > > + > > + *mem = nibble; > > + hexstr++; > > + > > + nibble = hex(*hexstr); > > + if (nibble < 0) > > + return -1; > > + > > + *mem = (*mem << 4) | nibble; > > + hexstr++; > > + mem++; > > + } > > + > > + return i; > > +} > > + > > +void wcharcpy(u16 *dst, wchar_t *src, size_t n) > > +{ > > + int i; > > + > > + for (i = 0; i < n; i++) > > + *dst++ = *src++; > > +} > > + > > +static int create_fwbin(char *bin, char *path) > > +{ > > + struct efi_capsule_header header; > > + struct efi_firmware_management_capsule_header capsule; > > + struct efi_firmware_management_capsule_image_header image; > > + FILE *f, *g; > > + struct stat bin_stat; > > + u8 *data; > > + size_t size; > > + > > + g = fopen(bin, "r"); > > + if (!g) { > > + printf("cannot open %s\n", bin); > > + return -1; > > + } > > + if (stat(bin, &bin_stat) < 0) { > > + printf("cannot determine the size of %s\n", bin); > > + goto err_1; > > + } > > + data = malloc(bin_stat.st_size); > > + if (!data) { > > + printf("cannot allocate memory: %lx\n", bin_stat.st_size); > > + goto err_1; > > + } > > + f = fopen(path, "w"); > > + if (!f) { > > + printf("cannot open %s\n", path); > > + goto err_2; > > + } > > + header.capsule_guid = efi_guid_fm_capsule; > > + header.header_size = sizeof(header); > > + header.flags = CAPSULE_FLAGS_PERSIST_ACROSS_RESET; /* TODO */ > > + header.capsule_image_size = sizeof(header) > > + + sizeof(capsule) + sizeof(u64) > > + + sizeof(image) > > + + bin_stat.st_size; > > + > > + size = fwrite(&header, 1, sizeof(header), f); > > + if (size < sizeof(header)) { > > + printf("write failed (%lx)\n", size); > > + goto err_3; > > + } > > + > > + capsule.version = 0x00000001; > > + capsule.embedded_driver_count = 0; > > + capsule.payload_item_count = 1; > > + capsule.item_offset_list[0] = sizeof(capsule) + sizeof(u64); > > + size = fwrite(&capsule, 1, sizeof(capsule) + sizeof(u64), f); > > + if (size < (sizeof(capsule) + sizeof(u64))) { > > + printf("write failed (%lx)\n", size); > > + goto err_3; > > + } > > + > > + image.version = 0x00000002; > > + image.update_image_type_id = efi_guid_image_type_uboot_fit; > > + image.update_image_index = 1; > > + image.update_image_size = bin_stat.st_size; > > + image.update_vendor_code_size = 0; /* none */ > > + image.update_hardware_instance = 1; > > + > > + size = fwrite(&image, 1, sizeof(image), f); > > + if (size < sizeof(image)) { > > + printf("write failed (%lx)\n", size); > > + goto err_3; > > + } > > + size = fread(data, 1, bin_stat.st_size, g); > > + if (size < bin_stat.st_size) { > > + printf("read failed (%lx)\n", size); > > + goto err_3; > > + } > > + size = fwrite(data, 1, bin_stat.st_size, f); > > + if (size < bin_stat.st_size) { > > + printf("write failed (%lx)\n", size); > > + goto err_3; > > + } > > + > > + fclose(f); > > + fclose(g); > > + free(data); > > + > > + return 0; > > + > > +err_3: > > + fclose(f); > > +err_2: > > + free(data); > > +err_1: > > + fclose(g); > > + > > + return -1; > > +} > > + > > +static int create_test1(char *path) > > +{ > > + FILE *f; > > + size_t size; > > + struct efi_capsule_header header; > > + struct efi_ebbr_variable variable; > > + u8 *data; > > + size_t data_size; > > + > > + f = fopen(path, "w"); > > + if (!f) { > > + printf("cannot open %s\n", path); > > + return -1; > > + } > > + header.capsule_guid = efi_guid_variable_storage; > > + header.header_size = sizeof(header); > > + header.flags = CAPSULE_FLAGS_PERSIST_ACROSS_RESET; /* TODO */ > > + header.capsule_image_size = sizeof(header); > > + > > + size = fwrite(&header, 1, sizeof(header), f); > > + if (size < sizeof(header)) { > > + printf("write failed (%lx)\n", size); > > + return -1; > > + } > > + > > + /* add a new variable */ > > + data_size = sizeof(boot_var3) / 2; > > + data = malloc(data_size); > > + if (!data) { > > + printf("memory allocation failed\n"); > > + return -1; > > + } > > + hex2mem(data, boot_var3, data_size); > > + wcharcpy(variable.variable_name, L"Boot0003", 9); > > + variable.vendor_guid = efi_global_variable_guid; > > + variable.attributes = (EFI_VARIABLE_NON_VOLATILE | > > + EFI_VARIABLE_BOOTSERVICE_ACCESS | > > + EFI_VARIABLE_RUNTIME_ACCESS); > > + variable.data_size = data_size; > > + header.capsule_image_size += sizeof(variable) + variable.data_size; > > + > > + size = fwrite(&variable, 1, sizeof(variable), f); > > + if (size < sizeof(variable)) { > > + printf("write failed (%lx)\n", size); > > + return -1; > > + } > > + size = fwrite(data, 1, data_size, f); > > + if (size < data_size) { > > + printf("write failed (%lx)\n", size); > > + return -1; > > + } > > + > > + /* update capsule image size */ > > + rewind(f); > > + size = fwrite(&header, 1, sizeof(header), f); > > + if (size < sizeof(header)) { > > + printf("write failed (%lx)\n", size); > > + return -1; > > + } > > + > > + fclose(f); > > + > > + return 0; > > +} > > + > > +static int create_test2(char *path) > > +{ > > + FILE *f; > > + size_t size; > > + struct efi_capsule_header header; > > + struct efi_ebbr_variable variable; > > + > > + f = fopen(path, "w"); > > + if (!f) { > > + printf("cannot open %s\n", path); > > + return -1; > > + } > > + header.capsule_guid = efi_guid_variable_storage; > > + header.header_size = sizeof(header); > > + header.flags = CAPSULE_FLAGS_PERSIST_ACROSS_RESET; /* TODO */ > > + header.capsule_image_size = sizeof(header); > > + > > + size = fwrite(&header, 1, sizeof(header), f); > > + if (size < sizeof(header)) { > > + printf("write failed (%lx)\n", size); > > + return -1; > > + } > > + > > + /* modify an existing variable */ > > + wcharcpy(variable.variable_name, L"BootOrder", 10); > > + variable.vendor_guid = efi_global_variable_guid; > > + variable.attributes = (EFI_VARIABLE_NON_VOLATILE | > > + EFI_VARIABLE_BOOTSERVICE_ACCESS | > > + EFI_VARIABLE_RUNTIME_ACCESS); > > + variable.data_size = sizeof(boot_order); > > + header.capsule_image_size += sizeof(variable) + variable.data_size; > > + > > + size = fwrite(&variable, 1, sizeof(variable), f); > > + if (size < sizeof(variable)) { > > + printf("write failed (%lx)\n", size); > > + return -1; > > + } > > + size = fwrite(boot_order, 1, sizeof(boot_order), f); > > + if (size < sizeof(boot_order)) { > > + printf("write failed (%lx)\n", size); > > + return -1; > > + } > > + > > + /* delete an existing variable */ > > + wcharcpy(variable.variable_name, L"Boot0001", 9); > > + variable.vendor_guid = efi_global_variable_guid; > > + variable.attributes = (EFI_VARIABLE_NON_VOLATILE | > > + EFI_VARIABLE_BOOTSERVICE_ACCESS | > > + EFI_VARIABLE_RUNTIME_ACCESS); > > + variable.data_size = 0; > > + header.capsule_image_size += sizeof(variable) + variable.data_size; > > + > > + size = fwrite(&variable, 1, sizeof(variable), f); > > + if (size < sizeof(variable)) { > > + printf("write failed (%lx)\n", size); > > + return -1; > > + } > > + > > + /* update capsule image size */ > > + rewind(f); > > + size = fwrite(&header, 1, sizeof(header), f); > > + if (size < sizeof(header)) { > > + printf("write failed (%lx)\n", size); > > + return -1; > > + } > > + > > + fclose(f); > > + > > + return 0; > > +} > > + > > +static int create_test3(char *path) > > +{ > > + FILE *f; > > + size_t size; > > + struct efi_capsule_header header; > > + struct efi_ebbr_variable variable; > > + > > + f = fopen(path, "w"); > > + if (!f) { > > + printf("cannot open %s\n", path); > > + return -1; > > + } > > + header.capsule_guid = efi_guid_variable_storage; > > + header.header_size = sizeof(header); > > + header.flags = CAPSULE_FLAGS_PERSIST_ACROSS_RESET; /* TODO */ > > + header.capsule_image_size = sizeof(header); > > + > > + size = fwrite(&header, 1, sizeof(header), f); > > + if (size < sizeof(header)) { > > + printf("write failed (%lx)\n", size); > > + return -1; > > + } > > + > > + /* delete a non-existing variable */ > > + wcharcpy(variable.variable_name, L"FooVar", 9); > > + variable.vendor_guid = efi_global_variable_guid; > > + variable.attributes = (EFI_VARIABLE_BOOTSERVICE_ACCESS | > > + EFI_VARIABLE_RUNTIME_ACCESS); > > + variable.data_size = 0; > > + header.capsule_image_size += sizeof(variable) + variable.data_size; > > + > > + size = fwrite(&variable, 1, sizeof(variable), f); > > + if (size < sizeof(variable)) { > > + printf("write failed (%lx)\n", size); > > + return -1; > > + } > > + > > + /* update capsule image size */ > > + rewind(f); > > + size = fwrite(&header, 1, sizeof(header), f); > > + if (size < sizeof(header)) { > > + printf("write failed (%lx)\n", size); > > + return -1; > > + } > > + > > + fclose(f); > > + > > + return 0; > > +} > > + > > +void print_usage(void) > > +{ > > + printf("mkeficapsule [-f <firmware binary> | -t <variable test no>]\n"); > > +} > > + > > +/* > > + * Usage: > > + * $ mkeficapsule [-f <firmware binary> | -t <variable test no>] <output file> > > + */ > > +int main(int argc, char **argv) > > +{ > > + int test_no; > > + > > + if (argc != 4) { > > + print_usage(); > > + return -1; > > + } > > + > > + if (!strcmp(argv[1], "-f")) { > > + if (create_fwbin(argv[2], argv[3]) < 0) { > > + printf("Creating firmware capsule for %s failed\n", > > + argv[2]); > > + return -1; > > + } > > + > > + return 0; > > + } else if (!strcmp(argv[1], "-v")) { > > + test_no = atoi(argv[2]); > > + > > + switch (test_no) { > > + case 1: > > + if (create_test1(argv[3]) < 0) { > > + printf("Creating test%02x failed\n", test_no); > > + return -1; > > + } > > + break; > > + case 2: > > + if (create_test2(argv[3]) < 0) { > > + printf("Creating test%02x failed\n", test_no); > > + return -1; > > + } > > + break; > > + case 3: > > + if (create_test3(argv[3]) < 0) { > > + printf("Creating test%02x failed\n", test_no); > > + return -1; > > + } > > + break; > > + default: > > + printf("Invalid test number: %s\n", argv[2]); > > + return -1; > > + } > > + > > + return 0; > > + } > > + > > + print_usage(); > > + return -1; > > +} > > >
On Wed, Mar 18, 2020 at 10:32:38AM +0900, AKASHI Takahiro wrote: > On Tue, Mar 17, 2020 at 08:58:55AM +0100, Heinrich Schuchardt wrote: > > On 3/17/20 3:12 AM, AKASHI Takahiro wrote: > > > This is a utility mainly for test purpose. > > > mkeficapsule -f: create a FIT image firmware capsule > > > > The UEFI spec defines a capsule format and how to invoke it by placing > > the file in the right directory before reboot. Why do we need a FIT > > image firmware capsule? > > ??? I don't get your point. > > A capsule is just a wrapper that can hold any kind (or format) of > binary data. In fact, an associated capsule driver should know > how the data should correctly be handled on U-Boot. > > So if you provide your own driver (more specifically, "firmware > management protocol" for firmware update), you can encapsulate > any firmware in your proprietary format. > > In this RFC, I provide a *sample* driver for a single FIT image > in patch#9. FWIW I think Takahiro's approach is fine here. FIT has been around for a couple of years so why not use it? As Takahiro pointed out, this is by no means restrictive. Regards /Ilias
diff --git a/tools/Makefile b/tools/Makefile index 99be724b82a5..fe07f8952f49 100644 --- a/tools/Makefile +++ b/tools/Makefile @@ -222,6 +222,9 @@ hostprogs-$(CONFIG_MIPS) += mips-relocs hostprogs-$(CONFIG_ASN1_COMPILER) += asn1_compiler HOSTCFLAGS_asn1_compiler.o = -idirafter $(srctree)/include +# TODO: only build this for capsule pytest +hostprogs-$(CONFIG_EFI_CAPSULE_UPDATE) += mkeficapsule + # We build some files with extra pedantic flags to try to minimize things # that won't build on some weird host compiler -- though there are lots of # exceptions for files that aren't complaint. diff --git a/tools/mkeficapsule.c b/tools/mkeficapsule.c new file mode 100644 index 000000000000..732a54811df9 --- /dev/null +++ b/tools/mkeficapsule.c @@ -0,0 +1,501 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * Copyright 2018 Linaro Limited + * Author: AKASHI Takahiro + */ + +#include <malloc.h> +#include <stdio.h> +#include <string.h> +#include <sys/stat.h> +#include <sys/types.h> +/* + * TODO: use libefi/libgnuefi headers + */ + +typedef u_int8_t u8; +typedef u_int16_t u16; +typedef u_int32_t u32; +typedef u_int64_t u64; + +/* include/efi.h */ +typedef struct { + u8 b[16]; +} efi_guid_t; + +#define EFI_GUID(a, b, c, d0, d1, d2, d3, d4, d5, d6, d7) \ + {{ (a) & 0xff, ((a) >> 8) & 0xff, ((a) >> 16) & 0xff, \ + ((a) >> 24) & 0xff, \ + (b) & 0xff, ((b) >> 8) & 0xff, \ + (c) & 0xff, ((c) >> 8) & 0xff, \ + (d0), (d1), (d2), (d3), (d4), (d5), (d6), (d7) } } + +#define EFI_VARIABLE_NON_VOLATILE 0x0000000000000001 +#define EFI_VARIABLE_BOOTSERVICE_ACCESS 0x0000000000000002 +#define EFI_VARIABLE_RUNTIME_ACCESS 0x0000000000000004 + +/* include/efi_api.h */ +#define EFI_GLOBAL_VARIABLE_GUID \ + EFI_GUID(0x8be4df61, 0x93ca, 0x11d2, 0xaa, 0x0d, \ + 0x00, 0xe0, 0x98, 0x03, 0x2b, 0x8c) + +#define CAPSULE_FLAGS_PERSIST_ACROSS_RESET 0x00010000 +#define CAPSULE_FLAGS_POPULATE_SYSTEM_TABLE 0x00020000 +#define CAPSULE_FLAGS_INITIATE_RESET 0x00040000 + +#define EFI_FIRMWARE_IMAGE_TYPE_UBOOT_FIT_GUID \ + EFI_GUID(0xae13ff2d, 0x9ad4, 0x4e25, 0x9a, 0xc8, \ + 0x6d, 0x80, 0xb3, 0xb2, 0x21, 0x47) + +#define EFI_FIRMWARE_MANAGEMENT_CAPSULE_ID_GUID \ + EFI_GUID(0x6dcbd5ed, 0xe82d, 0x4c44, 0xbd, 0xa1, \ + 0x71, 0x94, 0x19, 0x9a, 0xd9, 0x2a) + +#define EFI_VARIABLE_STORAGE_GUID \ + EFI_GUID(0x1a3fb419, 0x2171, 0x458d, 0xb8, 0xb4, \ + 0xbe, 0xa3, 0x0c, 0x9f, 0x6b, 0xab) + +struct efi_capsule_header { + efi_guid_t capsule_guid; + u32 header_size; + u32 flags; + u32 capsule_image_size; +} __attribute__((packed)); + +struct efi_capsule_block_descriptor { + u64 length; + union { + u64 data_block; + u64 continuation_ptr; + }; +} __attribute__((packed)); + +struct efi_firmware_management_capsule_header { + u32 version; + u16 embedded_driver_count; + u16 payload_item_count; + u64 item_offset_list[]; +} __attribute__((packed)); + +struct efi_firmware_management_capsule_image_header { + u32 version; + efi_guid_t update_image_type_id; + u8 update_image_index; + u8 reserved[3]; + u32 update_image_size; + u32 update_vendor_code_size; + u64 update_hardware_instance; +} __attribute__((packed)); + +struct efi_ebbr_variable { + u16 variable_name[64]; + efi_guid_t vendor_guid; + u32 attributes; + u32 data_size; + u8 data[]; +}; + +struct efi_ebbr_variable_bundle { + struct efi_capsule_header header; + u8 reserved[0]; + struct efi_ebbr_variable variables[]; +} __attribute__((packed)); + +efi_guid_t efi_guid_fm_capsule = EFI_FIRMWARE_MANAGEMENT_CAPSULE_ID_GUID; +efi_guid_t efi_guid_image_type_uboot_fit = + EFI_FIRMWARE_IMAGE_TYPE_UBOOT_FIT_GUID; +efi_guid_t efi_guid_variable_storage = EFI_VARIABLE_STORAGE_GUID; +efi_guid_t efi_global_variable_guid = EFI_GLOBAL_VARIABLE_GUID; + +/* generated by efi boot add 3 TEST scsi 0:0 /EFI/Images/hello.efi "" */ +char boot_var3[] = "0100000052005400450053005400000001041400b9731de684a3cc4aaeab82e828f3628b0302080000000000040432005c005c004500460049005c0049006d0061006700650073005c00680065006c006c006f002e0065006600690000007fff040000"; +u16 boot_order[] = { + 0x0003, + 0x0002, +}; + +/* efi_variable.c */ +static int hex(int ch) +{ + if (ch >= 'a' && ch <= 'f') + return ch - 'a' + 10; + if (ch >= '0' && ch <= '9') + return ch - '0'; + if (ch >= 'A' && ch <= 'F') + return ch - 'A' + 10; + return -1; +} + +static int hex2mem(u8 *mem, const char *hexstr, int size) +{ + int nibble; + int i; + + for (i = 0; i < size; i++) { + if (*hexstr == '\0') + break; + + nibble = hex(*hexstr); + if (nibble < 0) + return -1; + + *mem = nibble; + hexstr++; + + nibble = hex(*hexstr); + if (nibble < 0) + return -1; + + *mem = (*mem << 4) | nibble; + hexstr++; + mem++; + } + + return i; +} + +void wcharcpy(u16 *dst, wchar_t *src, size_t n) +{ + int i; + + for (i = 0; i < n; i++) + *dst++ = *src++; +} + +static int create_fwbin(char *bin, char *path) +{ + struct efi_capsule_header header; + struct efi_firmware_management_capsule_header capsule; + struct efi_firmware_management_capsule_image_header image; + FILE *f, *g; + struct stat bin_stat; + u8 *data; + size_t size; + + g = fopen(bin, "r"); + if (!g) { + printf("cannot open %s\n", bin); + return -1; + } + if (stat(bin, &bin_stat) < 0) { + printf("cannot determine the size of %s\n", bin); + goto err_1; + } + data = malloc(bin_stat.st_size); + if (!data) { + printf("cannot allocate memory: %lx\n", bin_stat.st_size); + goto err_1; + } + f = fopen(path, "w"); + if (!f) { + printf("cannot open %s\n", path); + goto err_2; + } + header.capsule_guid = efi_guid_fm_capsule; + header.header_size = sizeof(header); + header.flags = CAPSULE_FLAGS_PERSIST_ACROSS_RESET; /* TODO */ + header.capsule_image_size = sizeof(header) + + sizeof(capsule) + sizeof(u64) + + sizeof(image) + + bin_stat.st_size; + + size = fwrite(&header, 1, sizeof(header), f); + if (size < sizeof(header)) { + printf("write failed (%lx)\n", size); + goto err_3; + } + + capsule.version = 0x00000001; + capsule.embedded_driver_count = 0; + capsule.payload_item_count = 1; + capsule.item_offset_list[0] = sizeof(capsule) + sizeof(u64); + size = fwrite(&capsule, 1, sizeof(capsule) + sizeof(u64), f); + if (size < (sizeof(capsule) + sizeof(u64))) { + printf("write failed (%lx)\n", size); + goto err_3; + } + + image.version = 0x00000002; + image.update_image_type_id = efi_guid_image_type_uboot_fit; + image.update_image_index = 1; + image.update_image_size = bin_stat.st_size; + image.update_vendor_code_size = 0; /* none */ + image.update_hardware_instance = 1; + + size = fwrite(&image, 1, sizeof(image), f); + if (size < sizeof(image)) { + printf("write failed (%lx)\n", size); + goto err_3; + } + size = fread(data, 1, bin_stat.st_size, g); + if (size < bin_stat.st_size) { + printf("read failed (%lx)\n", size); + goto err_3; + } + size = fwrite(data, 1, bin_stat.st_size, f); + if (size < bin_stat.st_size) { + printf("write failed (%lx)\n", size); + goto err_3; + } + + fclose(f); + fclose(g); + free(data); + + return 0; + +err_3: + fclose(f); +err_2: + free(data); +err_1: + fclose(g); + + return -1; +} + +static int create_test1(char *path) +{ + FILE *f; + size_t size; + struct efi_capsule_header header; + struct efi_ebbr_variable variable; + u8 *data; + size_t data_size; + + f = fopen(path, "w"); + if (!f) { + printf("cannot open %s\n", path); + return -1; + } + header.capsule_guid = efi_guid_variable_storage; + header.header_size = sizeof(header); + header.flags = CAPSULE_FLAGS_PERSIST_ACROSS_RESET; /* TODO */ + header.capsule_image_size = sizeof(header); + + size = fwrite(&header, 1, sizeof(header), f); + if (size < sizeof(header)) { + printf("write failed (%lx)\n", size); + return -1; + } + + /* add a new variable */ + data_size = sizeof(boot_var3) / 2; + data = malloc(data_size); + if (!data) { + printf("memory allocation failed\n"); + return -1; + } + hex2mem(data, boot_var3, data_size); + wcharcpy(variable.variable_name, L"Boot0003", 9); + variable.vendor_guid = efi_global_variable_guid; + variable.attributes = (EFI_VARIABLE_NON_VOLATILE | + EFI_VARIABLE_BOOTSERVICE_ACCESS | + EFI_VARIABLE_RUNTIME_ACCESS); + variable.data_size = data_size; + header.capsule_image_size += sizeof(variable) + variable.data_size; + + size = fwrite(&variable, 1, sizeof(variable), f); + if (size < sizeof(variable)) { + printf("write failed (%lx)\n", size); + return -1; + } + size = fwrite(data, 1, data_size, f); + if (size < data_size) { + printf("write failed (%lx)\n", size); + return -1; + } + + /* update capsule image size */ + rewind(f); + size = fwrite(&header, 1, sizeof(header), f); + if (size < sizeof(header)) { + printf("write failed (%lx)\n", size); + return -1; + } + + fclose(f); + + return 0; +} + +static int create_test2(char *path) +{ + FILE *f; + size_t size; + struct efi_capsule_header header; + struct efi_ebbr_variable variable; + + f = fopen(path, "w"); + if (!f) { + printf("cannot open %s\n", path); + return -1; + } + header.capsule_guid = efi_guid_variable_storage; + header.header_size = sizeof(header); + header.flags = CAPSULE_FLAGS_PERSIST_ACROSS_RESET; /* TODO */ + header.capsule_image_size = sizeof(header); + + size = fwrite(&header, 1, sizeof(header), f); + if (size < sizeof(header)) { + printf("write failed (%lx)\n", size); + return -1; + } + + /* modify an existing variable */ + wcharcpy(variable.variable_name, L"BootOrder", 10); + variable.vendor_guid = efi_global_variable_guid; + variable.attributes = (EFI_VARIABLE_NON_VOLATILE | + EFI_VARIABLE_BOOTSERVICE_ACCESS | + EFI_VARIABLE_RUNTIME_ACCESS); + variable.data_size = sizeof(boot_order); + header.capsule_image_size += sizeof(variable) + variable.data_size; + + size = fwrite(&variable, 1, sizeof(variable), f); + if (size < sizeof(variable)) { + printf("write failed (%lx)\n", size); + return -1; + } + size = fwrite(boot_order, 1, sizeof(boot_order), f); + if (size < sizeof(boot_order)) { + printf("write failed (%lx)\n", size); + return -1; + } + + /* delete an existing variable */ + wcharcpy(variable.variable_name, L"Boot0001", 9); + variable.vendor_guid = efi_global_variable_guid; + variable.attributes = (EFI_VARIABLE_NON_VOLATILE | + EFI_VARIABLE_BOOTSERVICE_ACCESS | + EFI_VARIABLE_RUNTIME_ACCESS); + variable.data_size = 0; + header.capsule_image_size += sizeof(variable) + variable.data_size; + + size = fwrite(&variable, 1, sizeof(variable), f); + if (size < sizeof(variable)) { + printf("write failed (%lx)\n", size); + return -1; + } + + /* update capsule image size */ + rewind(f); + size = fwrite(&header, 1, sizeof(header), f); + if (size < sizeof(header)) { + printf("write failed (%lx)\n", size); + return -1; + } + + fclose(f); + + return 0; +} + +static int create_test3(char *path) +{ + FILE *f; + size_t size; + struct efi_capsule_header header; + struct efi_ebbr_variable variable; + + f = fopen(path, "w"); + if (!f) { + printf("cannot open %s\n", path); + return -1; + } + header.capsule_guid = efi_guid_variable_storage; + header.header_size = sizeof(header); + header.flags = CAPSULE_FLAGS_PERSIST_ACROSS_RESET; /* TODO */ + header.capsule_image_size = sizeof(header); + + size = fwrite(&header, 1, sizeof(header), f); + if (size < sizeof(header)) { + printf("write failed (%lx)\n", size); + return -1; + } + + /* delete a non-existing variable */ + wcharcpy(variable.variable_name, L"FooVar", 9); + variable.vendor_guid = efi_global_variable_guid; + variable.attributes = (EFI_VARIABLE_BOOTSERVICE_ACCESS | + EFI_VARIABLE_RUNTIME_ACCESS); + variable.data_size = 0; + header.capsule_image_size += sizeof(variable) + variable.data_size; + + size = fwrite(&variable, 1, sizeof(variable), f); + if (size < sizeof(variable)) { + printf("write failed (%lx)\n", size); + return -1; + } + + /* update capsule image size */ + rewind(f); + size = fwrite(&header, 1, sizeof(header), f); + if (size < sizeof(header)) { + printf("write failed (%lx)\n", size); + return -1; + } + + fclose(f); + + return 0; +} + +void print_usage(void) +{ + printf("mkeficapsule [-f <firmware binary> | -t <variable test no>]\n"); +} + +/* + * Usage: + * $ mkeficapsule [-f <firmware binary> | -t <variable test no>] <output file> + */ +int main(int argc, char **argv) +{ + int test_no; + + if (argc != 4) { + print_usage(); + return -1; + } + + if (!strcmp(argv[1], "-f")) { + if (create_fwbin(argv[2], argv[3]) < 0) { + printf("Creating firmware capsule for %s failed\n", + argv[2]); + return -1; + } + + return 0; + } else if (!strcmp(argv[1], "-v")) { + test_no = atoi(argv[2]); + + switch (test_no) { + case 1: + if (create_test1(argv[3]) < 0) { + printf("Creating test%02x failed\n", test_no); + return -1; + } + break; + case 2: + if (create_test2(argv[3]) < 0) { + printf("Creating test%02x failed\n", test_no); + return -1; + } + break; + case 3: + if (create_test3(argv[3]) < 0) { + printf("Creating test%02x failed\n", test_no); + return -1; + } + break; + default: + printf("Invalid test number: %s\n", argv[2]); + return -1; + } + + return 0; + } + + print_usage(); + return -1; +}
This is a utility mainly for test purpose. mkeficapsule -f: create a FIT image firmware capsule mkeficapsule -v: create a specific test case capsule for variables Having said that, you will be able to customize the code to fit your specific requirements for your platform. Signed-off-by: AKASHI Takahiro <takahiro.akashi at linaro.org> --- tools/Makefile | 3 + tools/mkeficapsule.c | 501 +++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 504 insertions(+) create mode 100644 tools/mkeficapsule.c