Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
T
test
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Deploy
Releases
Package registry
Container registry
Model registry
Operate
Terraform modules
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
GitLab community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Linaro
firmware-dual-banked-updates
test
Commits
3faab860
Commit
3faab860
authored
4 years ago
by
Jose Marinho
Browse files
Options
Downloads
Patches
Plain Diff
Fix Flow descriptions.
The flows had superfluous reboots. We've removed those.
parent
14ec6df1
Branches
Branches containing commit
Tags
Tags containing commit
No related merge requests found
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
source/chapter3-fwupdate.rst
+3
-7
3 additions, 7 deletions
source/chapter3-fwupdate.rst
with
3 additions
and
7 deletions
source/chapter3-fwupdate.rst
+
3
−
7
View file @
3faab860
...
@@ -82,8 +82,6 @@ Capsule install Secure World
...
@@ -82,8 +82,6 @@ Capsule install Secure World
#. UEFI implementation traverses all the images in the capsule passing them to their corresponding FMPs
#. UEFI implementation traverses all the images in the capsule passing them to their corresponding FMPs
#. The FMP transfers the images to the FWU Implementation in the Secure World [FWU]_
#. The FMP transfers the images to the FWU Implementation in the Secure World [FWU]_
#. OS requests a system reboot
#. OS requests a system reboot
#. Platform boots from the newly updated FW bank
#. OS requests a system reset
Capsule install non-Secure World
Capsule install non-Secure World
--------------------------------
--------------------------------
...
@@ -98,8 +96,6 @@ Capsule install non-Secure World
...
@@ -98,8 +96,6 @@ Capsule install non-Secure World
#. UEFI implementation traverses all the images in the capsule passing them to their corresponding FMPs
#. UEFI implementation traverses all the images in the capsule passing them to their corresponding FMPs
#. The UEFI firmware performs the update
#. The UEFI firmware performs the update
#. UEFI firmware requests a system reboot
#. UEFI firmware requests a system reboot
#. Platform boots from the newly updated FW bank
#. OS requests a system reset
Post-capsule install reboot success
Post-capsule install reboot success
-----------------------------------
-----------------------------------
...
@@ -112,7 +108,7 @@ Post-capsule install reboot success
...
@@ -112,7 +108,7 @@ Post-capsule install reboot success
:width: 100%
:width: 100%
:align: center
:align: center
#. Platform
resets
#. Platform
boots with the new FW
#. From the TFA boot report [FWU]_, UEFI verifies that platform booted from the intended bank
#. From the TFA boot report [FWU]_, UEFI verifies that platform booted from the intended bank
#. UEFI accepts a sub-set of the FW images [FWU]_ (the sub-set is platform specific)
#. UEFI accepts a sub-set of the FW images [FWU]_ (the sub-set is platform specific)
#. OS loader obtains the ESRT from UEFI
#. OS loader obtains the ESRT from UEFI
...
@@ -136,7 +132,7 @@ Post-capsule install reboot fails before UEFI
...
@@ -136,7 +132,7 @@ Post-capsule install reboot fails before UEFI
:width: 100%
:width: 100%
:align: center
:align: center
#. Platform
resets
#. Platform
boots with the new FW
#. The images fail to authenticate or the generic watchdog fires
#. The images fail to authenticate or the generic watchdog fires
#. Platform resets
#. Platform resets
#. Early platform bootloader detects FW maltfunction and selects another bank to boot from
#. Early platform bootloader detects FW maltfunction and selects another bank to boot from
...
@@ -158,7 +154,7 @@ Post-capsule install image fails OS test
...
@@ -158,7 +154,7 @@ Post-capsule install image fails OS test
:width: 100%
:width: 100%
:align: center
:align: center
#. Platform
resets
#. Platform
boots with the new FW
#. From the TFA boot report [FWU]_, UEFI verifies that platform booted from the intended bank
#. From the TFA boot report [FWU]_, UEFI verifies that platform booted from the intended bank
#. UEFI accepts all images [FWU]_
#. UEFI accepts all images [FWU]_
#. OS loader obtains the ESRT from UEFI
#. OS loader obtains the ESRT from UEFI
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment