/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/ |
H A D | optee-os-ts.inc | 6 # TS SPs UUIDs definitions 7 require recipes-security/trusted-services/ts-uuid.inc 16 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-its', \ 17 ' ts-sp-its', '' , d)}" 18 SP_PATHS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-its', \ 21 # Storage SP 22 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-storage', \ 23 ' ts-sp-storage', '' , d)}" 24 SP_PATHS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-storage', \ 28 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-crypto', \ [all …]
|
/openbmc/openbmc/meta-arm/ci/ |
H A D | qemuarm64-secureboot-ts.yml | 1 # yaml-language-server: $schema=https://raw.githubusercontent.com/siemens/kas/master/kas/schema-kas… 6 - ci/meta-openembedded.yml 11 …# Include TS Crypto, TS Protected Storage, and TS Internal Trusted Storage and SPs into optee-os i… 12 # FIXME - remove TS SMM Gateway due to QEMU v9.0.0 test failures 13 MACHINE_FEATURES:append = " arm-ffa ts-crypto ts-storage ts-its" 14 # Include TS demo/test tools into image 15 IMAGE_INSTALL:append = " packagegroup-ts-tests" 16 # Include TS PSA Arch tests into image 17 IMAGE_INSTALL:append = " packagegroup-ts-tests-psa"
|
H A D | fvp-base-ts.yml | 1 # yaml-language-server: $schema=https://raw.githubusercontent.com/siemens/kas/master/kas/schema-kas… 6 - ci/fvp-base.yml 7 - ci/meta-openembedded.yml 8 - ci/testimage.yml 15 MACHINE_FEATURES:append = " arm-ffa ts-crypto ts-storage ts-its" 16 MACHINE_FEATURES:append = " ts-attestation ts-smm-gateway optee-spmc-test" 17 MACHINE_FEATURES:append = " ts-block-storage ts-fwu" 18 # Include TS demo/test tools into image 19 IMAGE_INSTALL:append = " packagegroup-ts-tests" 20 # Include TS PSA Arch tests into image [all …]
|
/openbmc/openbmc/meta-arm/meta-arm/lib/oeqa/runtime/cases/ |
H A D | trusted_services.py | 18 @OEHasPackage(['ts-demo']) 21 self.run_test_tool('ts-demo') 23 @OEHasPackage(['ts-uefi-test']) 26 self.run_test_tool('uefi-test') 28 @OEHasPackage(['ts-psa-crypto-api-test']) 31 self.run_test_tool('psa-crypto-api-test') 33 @OEHasPackage(['ts-psa-its-api-test']) 36 self.run_test_tool('psa-its-api-test') 38 @OEHasPackage(['ts-psa-ps-api-test']) 41 self.run_test_tool('psa-ps-api-test') [all …]
|
/openbmc/linux/include/linux/ |
H A D | pstore.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 3 * Persistent Storage - pstore.h 8 * level persistent storage via a file system. 25 * These values may be written to storage (see EFI vars backend), so 29 /* Frontend storage types */ 35 /* PPC64-specific partition types */ 51 * struct pstore_record - details of a pstore record entry 54 * @id: per-type unique identifier for record 61 * kfree()d by the pstore core if non-NULL 89 * struct pstore_info - backend pstore driver structure [all …]
|
/openbmc/openbmc/meta-arm/documentation/ |
H A D | trusted-services.md | 1 # The Trusted Services: framework for developing root-of-trust services 3 meta-arm layer includes recipes for [Trusted Services][^1] Secure Partitions and Normal World appli… 4 in `meta-arm/recipes-security/trusted-services` 8 We define dedicated recipes for all supported Trusted Services (TS) Secure Partitions. 10 These files are automatically included into optee-os image accordingly to defined MACHINE_FEATURES. 12 ### How to include TS SPs 14 To include TS SPs into optee-os image you need to add into MACHINE_FEATURES 18 | ----------------- | --------------- | 19 | Attestation | ts-attesation | 20 | Crypto | ts-crypto | [all …]
|
/openbmc/linux/arch/arm/mach-orion5x/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 15 Orion-1 (5181), Orion-VoIP (5181L), Orion-NAS (5182), 16 Orion-2 (5281), Orion-1-90 (6183). 32 bool "Marvell Orion-NAS Reference Design (Flattened Device Tree)" 37 Orion-NAS (88F5182) RD2, Flattened Device Tree. 48 bool "D-Link DNS-323" 53 D-Link DNS-323 platform. 56 bool "QNAP TS-109/TS-209" 60 QNAP TS-109/TS-209 platform. 83 Buffalo Linkstation Mini (LS-WSGL) platform. [all …]
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/packagegroups/ |
H A D | packagegroup-ts-tests.bb | 7 COMPATIBLE_HOST = "aarch64.*-linux" 9 COMPATIBLE_MACHINE:qemuarm64-secureboot = "qemuarm64-secureboot" 11 PACKAGES = "${PN} ${PN}-psa" 14 ts-demo \ 15 ts-service-test \ 16 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-env-test', 'ts-remote-test', '' , d)} \ 17 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-smm-gateway', 'ts-uefi-test', '' , d)} \ 20 SUMMARY:${PN}-psa = "PSA certification tests (psa-arch-test) for TS SPs" 21 RDEPENDS:${PN}-psa = "\ 22 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-crypto', 'ts-psa-crypto-api-test', '' , d)} \ [all …]
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/ |
H A D | ts-sp-storage_git.bb | 1 DESCRIPTION = "Trusted Services secure storage service provider" 3 require ts-sp-common.inc 8 OECMAKE_SOURCEPATH="${S}/deployments/protected-storage/config/${TS_SP_PS_CONFIG}-${TS_ENV}"
|
H A D | ts-sp-its_git.bb | 1 DESCRIPTION = "Trusted Services internal secure storage service provider" 3 require ts-sp-common.inc 8 OECMAKE_SOURCEPATH="${S}/deployments/internal-trusted-storage/config/${TS_SP_ITS_CONFIG}-${TS_ENV}"
|
H A D | ts-sp-block-storage_git.bb | 1 # SPDX-FileCopyrightText: <text>Copyright 2023 Arm Limited and/or its 2 # affiliates <open-source-office@arm.com></text> 4 # SPDX-License-Identifier: MIT 6 DESCRIPTION = "Trusted Services block storage service provider" 8 require ts-sp-common.inc 13 OECMAKE_SOURCEPATH="${S}/deployments/block-storage/config/${TS_SP_BLOCK_STORAGE_CONFIG}-${TS_ENV}"
|
H A D | ts-psa-ps-api-test_git.bb | 1 DESCRIPTION = "Protected Storage PSA certification tests (psa-arch-test) for Trusted Services" 3 TS_ENV = "arm-linux" 5 require ts-psa-api-test-common_${PV}.inc 7 OECMAKE_SOURCEPATH = "${S}/deployments/psa-api-test/protected_storage/${TS_ENV}" 9 PSA_TEST = "psa-ps-api-test"
|
H A D | ts-psa-its-api-test_git.bb | 1 DESCRIPTION = "Internal Trusted Storage PSA certification tests (psa-arch-test) for Trusted Service… 3 TS_ENV = "arm-linux" 5 require ts-psa-api-test-common_${PV}.inc 7 OECMAKE_SOURCEPATH = "${S}/deployments/psa-api-test/internal_trusted_storage/${TS_ENV}" 9 PSA_TEST = "psa-its-api-test"
|
/openbmc/linux/drivers/gpu/drm/etnaviv/ |
H A D | etnaviv_drv.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 3 * Copyright (C) 2015-2018 Etnaviv Project 94 * Return the storage size of a structure with a variable length array. 100 if (elem_size && nelem > (SIZE_MAX - base) / elem_size) in size_vstruct() 113 struct timespec64 ts, to = { in etnaviv_timeout_to_jiffies() local 114 .tv_sec = timeout->tv_sec, in etnaviv_timeout_to_jiffies() 115 .tv_nsec = timeout->tv_nsec, in etnaviv_timeout_to_jiffies() 118 ktime_get_ts64(&ts); in etnaviv_timeout_to_jiffies() 121 if (timespec64_compare(&to, &ts) <= 0) in etnaviv_timeout_to_jiffies() 124 ts = timespec64_sub(to, ts); in etnaviv_timeout_to_jiffies() [all …]
|
/openbmc/linux/drivers/media/test-drivers/vidtv/ |
H A D | vidtv_mux.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 7 * This file contains the muxer logic for TS packets from different 27 * struct vidtv_mux_timing - Timing related information 30 * provide storage for the clock, which is used to compute the value for the PCR. 52 * struct vidtv_mux_si - Store the PSI context. 57 * vidtv_channel and then periodically sends the TS packets for them> 75 * struct vidtv_mux_pid_ctx - Store the context for a given TS PID. 76 * @pid: The TS PID. 77 * @cc: The continuity counter for this PID. It is incremented on every TS 80 * @h: This is embedded in a hash table, mapping pid -> vidtv_mux_pid_ctx [all …]
|
/openbmc/telemetry/src/ |
H A D | trigger_manager.cpp | 11 #include <phosphor-logging/log.hpp> 24 managerIface = objServer->add_unique_interface( in TriggerManager() 52 triggerFactory->getLabeledSensorsInfo(yield, sensors); in TriggerManager() 90 namespace ts = utils::tstring; in verifyThresholdParams() 99 if (discreteParam.at_label<ts::UserId>().length() > in verifyThresholdParams() 132 triggers, [](const auto& trigger) { return trigger->getId(); }); in addTrigger() 139 triggers.emplace_back(triggerFactory->make( in addTrigger() 149 triggerStorage->list(); in loadFromPersistent() 153 std::optional<nlohmann::json> data = triggerStorage->load(path); in loadFromPersistent() 158 throw std::runtime_error("Empty storage"); in loadFromPersistent() [all …]
|
H A D | report_manager.cpp | 10 #include <phosphor-logging/log.hpp> 29 reportManagerIface = objServer->add_unique_interface( in ReportManager() 36 [](const auto&) -> uint64_t { return minInterval.count(); }); in ReportManager() 40 [](const auto&) -> std::vector<std::string> { in ReportManager() 106 namespace ts = utils::tstring; in verifyAddReport() 133 utils::toUnderlying(item.at_label<ts::OperationType>())); in verifyAddReport() 145 reportFactory->convertMetricParams(yield, metricParams); in addReport() 161 reports, [](const auto& report) { return report->getId(); }); in addReport() 170 reportFactory->make(id, name, reportingType, reportActions, interval, in addReport() 179 reportStorage->list(); in loadFromPersistent() [all …]
|
/openbmc/linux/kernel/time/ |
H A D | timekeeping.c | 1 // SPDX-License-Identifier: GPL-2.0 28 #include "tick-internal.h" 63 * struct tk_fast - NMI safe timekeeper 76 /* Suspend-time cycles value for halted fast timekeeper. */ 119 while (tk->tkr_mono.xtime_nsec >= ((u64)NSEC_PER_SEC << tk->tkr_mono.shift)) { in tk_normalize_xtime() 120 tk->tkr_mono.xtime_nsec -= (u64)NSEC_PER_SEC << tk->tkr_mono.shift; in tk_normalize_xtime() 121 tk->xtime_sec++; in tk_normalize_xtime() 123 while (tk->tkr_raw.xtime_nsec >= ((u64)NSEC_PER_SEC << tk->tkr_raw.shift)) { in tk_normalize_xtime() 124 tk->tkr_raw.xtime_nsec -= (u64)NSEC_PER_SEC << tk->tkr_raw.shift; in tk_normalize_xtime() 125 tk->raw_sec++; in tk_normalize_xtime() [all …]
|
H A D | time.c | 1 // SPDX-License-Identifier: GPL-2.0 10 * 1993-09-02 Philip Gladstone 12 * 1993-10-08 Torsten Duwe 14 * 1995-08-13 Torsten Duwe 15 * kernel PLL updated to 1994-12-13 specs (rfc-1589) 16 * 1999-01-16 Ulrich Windl 22 * 2004-07-14 Christoph Lameter 57 * sys_time() can be implemented in user-level using 68 return -EFAULT; in SYSCALL_DEFINE1() 75 * sys_stime() can be implemented in user-level using [all …]
|
/openbmc/linux/arch/x86/kernel/ |
H A D | rtc.c | 1 // SPDX-License-Identifier: GPL-2.0 13 #include <asm/intel-mid.h> 38 unsigned long long nowtime = now->tv_sec; in mach_set_cmos_time() 52 retval = -EINVAL; in mach_set_cmos_time() 62 * If pm_trace abused the RTC as storage, set the timespec to 0, in mach_get_cmos_time() 66 now->tv_sec = now->tv_nsec = 0; in mach_get_cmos_time() 72 now->tv_sec = now->tv_nsec = 0; in mach_get_cmos_time() 76 now->tv_sec = rtc_tm_to_time64(&tm); in mach_get_cmos_time() 77 now->tv_nsec = 0; in mach_get_cmos_time() 109 void read_persistent_clock64(struct timespec64 *ts) in read_persistent_clock64() argument [all …]
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/ |
H A D | 0013-Fix-error-handling-of-variable-index-loading.patch | 6 If loading of the variable index from Protected Storage fails, SmmGW 12 Signed-off-by: Gabor Toth <gabor.toth2@arm.com> 13 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TS/trusted-services/+/28300] 14 --- 15 .../backend/uefi_variable_store.c | 28 ++++++++++++++----- 16 1 file changed, 21 insertions(+), 7 deletions(-) 18 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.c b/components/servic… 20 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.c 22 @@ -27,7 +27,7 @@ 26 -static void load_variable_index(struct uefi_variable_store *context); [all …]
|
H A D | 0015-Add-timestamp-validation-for-uefi-variables.patch | 9 Signed-off-by: Gabor Toth <gabor.toth2@arm.com> 10 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TS/trusted-services/+/27955] 11 --- 12 .../backend/uefi_variable_store.c | 35 +++++++++++++++---- 15 3 files changed, 30 insertions(+), 7 deletions(-) 17 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.c b/components/servic… 19 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.c 21 @@ -76,6 +76,7 @@ static efi_status_t verify_var_by_key_var(const efi_data_map *new_var, 29 @@ -197,6 +198,7 @@ efi_status_t uefi_variable_store_set_variable(const struct uefi_variable_store * 36 efi_status_t status = check_name_terminator(var->Name, var->NameSize); [all …]
|
/openbmc/u-boot/arch/powerpc/include/asm/ |
H A D | mmu.h | 28 unsigned long w:1; /* Write-thru cache mode */ 47 unsigned long n:1; /* No-execute */ 90 unsigned long w:1; /* Write-thru cache */ 109 * Simulated two-level MMU. This structure is used by the kernel 133 pte **pmap; /* Two-level page-map structure */ 170 #define BATL_PP_01 0x00000001 /* Read-only */ 171 #define BATL_PP_10 0x00000002 /* Read-write */ 218 (u32)((((1ull << __ilog2_u64((u64)x)) / (128 * 1024)) - 1) * 4) 238 * During software tablewalk, the registers used perform mask/shift-add 275 #define MI_GUARDED 0x00000010 /* Guarded storage */ [all …]
|
/openbmc/linux/drivers/misc/ |
H A D | kgdbts.c | 1 // SPDX-License-Identifier: GPL-2.0-only 12 * ------------------------------------- 75 * fg # and hit control-c 76 * fg # and hit control-c 81 * fg # and hit control-c 143 /* Storage for the registers, in GDB format. */ 145 sizeof(unsigned long) - 1) / 149 /* -1 = init not run yet, 0 = unconfigured, 1 = configured. */ 150 static int configured = -1; 179 static struct test_state ts; variable [all …]
|
/openbmc/linux/drivers/gpu/drm/msm/disp/dpu1/ |
H A D | dpu_crtc.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 4 * Copyright (c) 2015-2021 The Linux Foundation. All rights reserved. 19 /* define the maximum number of in-flight frame events */ 26 * @NRT_CLIENT: Non-RealTime client like WB display 84 DPU_CRTC_CRC_SOURCE_INVALID = -1 107 * @ts: timestamp at queue entry 114 ktime_t ts; member 124 * struct dpu_crtc - virtualized CRTC data structure 128 * pending vblank event, this will be non-null. 137 * commit-thread, not state-swap time which is earlier, so [all …]
|