From 6f106a0a4ce15fe0678d4ffefd572e6978c72597 Mon Sep 17 00:00:00 2001 From: "Jason M. Bills" Date: Thu, 26 Aug 2021 13:18:00 -0700 Subject: Update to internal 0.70 Signed-off-by: Jason M. Bills --- .../u-boot/files/0022-KCS-driver-support-in-uBoot.patch | 15 ++++++++------- ...024-IPMI-command-handler-implementation-in-uboot.patch | 8 ++++---- ...FUJ-FW-IPMI-commands-and-flash-support-in-u-boot.patch | 8 ++++---- .../0030-Support-Get-Set-Security-mode-command.patch | 4 ++-- .../recipes-bsp/u-boot/files/0036-Re-Enable-KCS.patch | 2 +- 5 files changed, 19 insertions(+), 18 deletions(-) (limited to 'meta-openbmc-mods/meta-ast2500') diff --git a/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0022-KCS-driver-support-in-uBoot.patch b/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0022-KCS-driver-support-in-uBoot.patch index 9020ff265..515b383e5 100644 --- a/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0022-KCS-driver-support-in-uBoot.patch +++ b/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0022-KCS-driver-support-in-uBoot.patch @@ -13,16 +13,17 @@ only when Force Firmware Update Jumper is ON. Tested By: Stopped booting in uBoot and sent IPMI commands -via KCS interfaces using cmdtool.efi. +via KCS interfaces. - Get Device ID: - Req: cmdtool.efi 20 18 1 - Res: 00 23 00 12 03 02 BF 57 01 00 7B 00 00 00 00 00 + Req: ipmitool raw 6 1 + Res: 23 00 12 03 02 BF 57 01 00 7B 00 00 00 00 00 - Get Self Test Results - Req: cmdtool.efi 20 18 4 - Res: 00 56 00 + Req: ipmitool raw 6 4 + Res: 56 00 - All other commands - Req: cmdtool.efi 20 18 2 - Res: C1 (Invalid). + Req: ipmitool raw 6 2 + Res: Unable to send RAW command (channel=0x0 netfn=0x6 lun=0x0 +cmd=0x2 rsp=0xc1): Invalid command Signed-off-by: AppaRao Puli Signed-off-by: James Feist diff --git a/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0024-IPMI-command-handler-implementation-in-uboot.patch b/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0024-IPMI-command-handler-implementation-in-uboot.patch index 0697c2808..ce160e137 100644 --- a/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0024-IPMI-command-handler-implementation-in-uboot.patch +++ b/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0024-IPMI-command-handler-implementation-in-uboot.patch @@ -12,11 +12,11 @@ Tested By: Ran the above IPMI command Via KCS channel and got proper response. - Get Device ID - Req: cmdtool.efi 20 18 1 - Res: 0x00 0x23 0x00 0x82 0x03 0x02 0x00 0x57 0x01 0x00 0x7b 0x00 0x00 0x00 0x00 0x00 + Req: ipmitool raw 6 1 + Res: 23 00 82 03 02 00 57 01 00 7b 00 00 00 00 00 - Get Self Test Results - Req: cmdtool.efi 20 18 4 - Res: 00 56 00 + Req: ipmitool raw 6 4 + Res: 56 00 Change-Id: I18b205bc45c34f7c4ef16adc29fa5bd494624ceb Signed-off-by: AppaRao Puli diff --git a/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0029-FFUJ-FW-IPMI-commands-and-flash-support-in-u-boot.patch b/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0029-FFUJ-FW-IPMI-commands-and-flash-support-in-u-boot.patch index 5dbf1304c..238630af6 100644 --- a/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0029-FFUJ-FW-IPMI-commands-and-flash-support-in-u-boot.patch +++ b/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0029-FFUJ-FW-IPMI-commands-and-flash-support-in-u-boot.patch @@ -22,10 +22,10 @@ OEM Commands: 1) Get Buffer Size(0x66) Tested: - - Used cmdtool.efi to test the individual commands - implementation and negative cases. - - Used debug fwpiaupd.efi tool for validating Firmware - image transfer via KCS and flashing. + - Tested the individual commands implementation and negative + cases. + - Used debug tool for validating Firmware image transfer via + KCS and flashing. Signed-off-by: AppaRao Puli diff --git a/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0030-Support-Get-Set-Security-mode-command.patch b/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0030-Support-Get-Set-Security-mode-command.patch index ce62c3fb1..d471d2c99 100644 --- a/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0030-Support-Get-Set-Security-mode-command.patch +++ b/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0030-Support-Get-Set-Security-mode-command.patch @@ -11,9 +11,9 @@ value, which is not allowed in normal mode from Host interface Tested: 1. Verified get security mode returns proper value read from -U-Boot environment variable. cmdtool.efi 20 C0 B3 +U-Boot environment variable. ipmitool raw 0x30 0xB3 2. Verified set security mode updates U-Boot environment variable -and it is reflected in linux too cmdtool.efi 20 C0 B4 4 +and it is reflected in linux too. ipmitool raw 0x30 0xB4 4 3. Verified negative test cases with improper values and it throws correct errors diff --git a/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0036-Re-Enable-KCS.patch b/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0036-Re-Enable-KCS.patch index 08b05e60b..90eb41627 100644 --- a/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0036-Re-Enable-KCS.patch +++ b/meta-openbmc-mods/meta-ast2500/recipes-bsp/u-boot/files/0036-Re-Enable-KCS.patch @@ -7,7 +7,7 @@ Phosphor-isolation isolates too much and seems to make KCS not work. This removes the lines from that patch that seem to be of question. -Tested: AC/Cycled, cmdtool.efi 20 18 1 works +Tested: AC/Cycled, ipmitool raw 6 1 works Signed-off-by: James Feist -- cgit v1.2.3