| /openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/ |
| H A D | optee-os-ts.inc | 6 # TS SPs UUIDs definitions 7 require recipes-security/trusted-services/ts-uuid.inc 16 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-its', \ 17 ' ts-sp-its', '' , d)}" 18 SP_PATHS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-its', \ 21 # Storage SP 22 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-storage', \ 23 ' ts-sp-storage', '' , d)}" 24 SP_PATHS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-storage', \ 28 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-crypto', \ [all …]
|
| /openbmc/openbmc/meta-arm/ci/ |
| H A D | qemuarm64-secureboot-ts.yml | 1 # yaml-language-server: $schema=https://raw.githubusercontent.com/siemens/kas/master/kas/schema-kas… 6 - ci/meta-openembedded.yml 11 …# Include TS Crypto, TS Protected Storage, and TS Internal Trusted Storage and SPs into optee-os i… 12 # FIXME - remove TS SMM Gateway due to QEMU v9.0.0 test failures 13 MACHINE_FEATURES:append = " arm-ffa ts-crypto ts-storage ts-its" 14 # Include TS demo/test tools into image 15 IMAGE_INSTALL:append = " packagegroup-ts-tests" 16 # Include TS PSA Arch tests into image 17 IMAGE_INSTALL:append = " packagegroup-ts-tests-psa"
|
| H A D | fvp-base-ts.yml | 1 # yaml-language-server: $schema=https://raw.githubusercontent.com/siemens/kas/master/kas/schema-kas… 6 - ci/fvp-base.yml 7 - ci/meta-openembedded.yml 8 - ci/testimage.yml 15 MACHINE_FEATURES:append = " arm-ffa ts-crypto ts-storage ts-its" 16 MACHINE_FEATURES:append = " ts-attestation ts-smm-gateway optee-spmc-test" 17 MACHINE_FEATURES:append = " ts-block-storage ts-fwu ts-logging" 18 MACHINE_FEATURES:append = " arm-branch-protection" 20 # Include TS demo/test tools into image 21 IMAGE_INSTALL:append = " packagegroup-ts-tests" [all …]
|
| /openbmc/openbmc/meta-arm/meta-arm/lib/oeqa/runtime/cases/ |
| H A D | trusted_services.py | 18 @OEHasPackage(['ts-demo']) 21 self.run_test_tool('ts-demo') 23 @OEHasPackage(['ts-uefi-test']) 26 self.run_test_tool('uefi-test') 28 @OEHasPackage(['ts-psa-crypto-api-test']) 31 self.run_test_tool('psa-crypto-api-test') 33 @OEHasPackage(['ts-psa-its-api-test']) 36 self.run_test_tool('psa-its-api-test') 38 @OEHasPackage(['ts-psa-ps-api-test']) 41 self.run_test_tool('psa-ps-api-test') [all …]
|
| /openbmc/openbmc/meta-arm/documentation/ |
| H A D | trusted-services.md | 1 # The Trusted Services: framework for developing root-of-trust services 3 meta-arm layer includes recipes for [Trusted Services][^1] Secure Partitions and Normal World appli… 4 in `meta-arm/recipes-security/trusted-services` 8 We define dedicated recipes for all supported Trusted Services (TS) Secure Partitions. 10 These files are automatically included into optee-os image accordingly to defined MACHINE_FEATURES. 12 ### How to include TS SPs 14 To include TS SPs into optee-os image you need to add into MACHINE_FEATURES 18 | ----------------- | --------------- | 19 | Attestation | ts-attesation | 20 | Crypto | ts-crypto | [all …]
|
| /openbmc/openbmc/meta-arm/meta-arm/recipes-security/packagegroups/ |
| H A D | packagegroup-ts-tests.bb | 7 COMPATIBLE_HOST = "aarch64.*-linux" 9 COMPATIBLE_MACHINE:qemuarm64-secureboot = "qemuarm64-secureboot" 11 PACKAGES = "${PN} ${PN}-psa" 14 ts-demo \ 15 ts-service-test \ 16 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-env-test', 'ts-remote-test', '' , d)} \ 17 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-smm-gateway', 'ts-uefi-test', '' , d)} \ 20 SUMMARY:${PN}-psa = "PSA certification tests (psa-arch-test) for TS SPs" 21 RDEPENDS:${PN}-psa = "\ 22 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-crypto', 'ts-psa-crypto-api-test', '' , d)} \ [all …]
|
| /openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/ |
| H A D | ts-sp-storage_git.bb | 1 DESCRIPTION = "Trusted Services secure storage service provider" 3 require ts-sp-common.inc 8 OECMAKE_SOURCEPATH = "${S}/deployments/protected-storage/config/${TS_SP_PS_CONFIG}-${TS_ENV}"
|
| H A D | ts-sp-its_git.bb | 1 DESCRIPTION = "Trusted Services internal secure storage service provider" 3 require ts-sp-common.inc 8 OECMAKE_SOURCEPATH = "${S}/deployments/internal-trusted-storage/config/${TS_SP_ITS_CONFIG}-${TS_ENV…
|
| H A D | ts-sp-block-storage_git.bb | 1 # SPDX-FileCopyrightText: <text>Copyright 2023 Arm Limited and/or its 2 # affiliates <open-source-office@arm.com></text> 4 # SPDX-License-Identifier: MIT 6 DESCRIPTION = "Trusted Services block storage service provider" 8 require ts-sp-common.inc 13 OECMAKE_SOURCEPATH = "${S}/deployments/block-storage/config/${TS_SP_BLOCK_STORAGE_CONFIG}-${TS_ENV}"
|
| H A D | ts-psa-ps-api-test_git.bb | 1 DESCRIPTION = "Protected Storage PSA certification tests (psa-arch-test) for Trusted Services" 3 TS_ENV = "arm-linux" 5 require ts-psa-api-test-common_${PV}.inc 7 OECMAKE_SOURCEPATH = "${S}/deployments/psa-api-test/protected_storage/${TS_ENV}" 9 PSA_TEST = "psa-ps-api-test"
|
| H A D | ts-psa-its-api-test_git.bb | 1 DESCRIPTION = "Internal Trusted Storage PSA certification tests (psa-arch-test) for Trusted Service… 3 TS_ENV = "arm-linux" 5 require ts-psa-api-test-common_${PV}.inc 7 OECMAKE_SOURCEPATH = "${S}/deployments/psa-api-test/internal_trusted_storage/${TS_ENV}" 9 PSA_TEST = "psa-its-api-test"
|
| /openbmc/telemetry/src/ |
| H A D | trigger_manager.cpp | 11 #include <phosphor-logging/log.hpp> 24 managerIface = objServer->add_unique_interface( in TriggerManager() 52 triggerFactory->getLabeledSensorsInfo(yield, sensors); in TriggerManager() 90 namespace ts = utils::tstring; in verifyThresholdParams() 99 if (discreteParam.at_label<ts::UserId>().length() > in verifyThresholdParams() 132 triggers, [](const auto& trigger) { return trigger->getId(); }); in addTrigger() 139 triggers.emplace_back(triggerFactory->make( in addTrigger() 149 triggerStorage->list(); in loadFromPersistent() 153 std::optional<nlohmann::json> data = triggerStorage->load(path); in loadFromPersistent() 158 throw std::runtime_error("Empty storage"); in loadFromPersistent() [all …]
|
| H A D | report_manager.cpp | 10 #include <phosphor-logging/log.hpp> 29 reportManagerIface = objServer->add_unique_interface( in ReportManager() 36 [](const auto&) -> uint64_t { return minInterval.count(); }); in ReportManager() 40 [](const auto&) -> std::vector<std::string> { in ReportManager() 106 namespace ts = utils::tstring; in verifyAddReport() 133 utils::toUnderlying(item.at_label<ts::OperationType>())); in verifyAddReport() 145 reportFactory->convertMetricParams(yield, metricParams); in addReport() 161 reports, [](const auto& report) { return report->getId(); }); in addReport() 170 reportFactory->make(id, name, reportingType, reportActions, interval, in addReport() 179 reportStorage->list(); in loadFromPersistent() [all …]
|
| /openbmc/qemu/tcg/ |
| H A D | tcg.c | 30 #include "qemu/error-report.h" 32 #include "qemu/host-utils.h" 33 #include "qemu/qemu-print.h" 38 #include "exec/translation-block.h" 39 #include "exec/tlb-common.h" 41 #include "tcg/tcg-op-common.h" 56 #include "tcg/tcg-ldst.h" 57 #include "tcg/tcg-temp-internal.h" 58 #include "tcg-internal.h" 60 #include "tcg-has.h" [all …]
|
| /openbmc/u-boot/arch/powerpc/include/asm/ |
| H A D | mmu.h | 28 unsigned long w:1; /* Write-thru cache mode */ 47 unsigned long n:1; /* No-execute */ 90 unsigned long w:1; /* Write-thru cache */ 109 * Simulated two-level MMU. This structure is used by the kernel 133 pte **pmap; /* Two-level page-map structure */ 170 #define BATL_PP_01 0x00000001 /* Read-only */ 171 #define BATL_PP_10 0x00000002 /* Read-write */ 218 (u32)((((1ull << __ilog2_u64((u64)x)) / (128 * 1024)) - 1) * 4) 238 * During software tablewalk, the registers used perform mask/shift-add 275 #define MI_GUARDED 0x00000010 /* Guarded storage */ [all …]
|
| /openbmc/sdbusplus/include/sdbusplus/async/stdexec/__detail/ |
| H A D | __variant.hpp | |
| /openbmc/qemu/block/ |
| H A D | qapi.c | 4 * Copyright (c) 2003-2008 Fabrice Bellard 29 #include "block/dirty-bitmap.h" 30 #include "block/throttle-groups.h" 31 #include "block/write-threshold.h" 33 #include "qapi/qapi-commands-block-core.h" 34 #include "qapi/qobject-output-visitor.h" 35 #include "qapi/qapi-visit-block-core.h" 41 #include "qemu/qemu-print.h" 42 #include "system/block-backend.h" 57 if (!bs->drv) { in bdrv_block_device_info() [all …]
|
| /openbmc/u-boot/arch/powerpc/cpu/mpc85xx/ |
| H A D | start.S | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 3 * Copyright 2004, 2007-2012 Freescale Semiconductor, Inc. 7 /* U-Boot Startup Code for Motorola 85xx PowerPC based Embedded Boards 10 * last 4K page(0xfffff000-0xffffffff) in flash/rom. 14 #include <asm-offsets.h> 62 * e500 Startup -- after reset only the last 4KB of the effective 129 * Disable L2 cache here so that u-boot can enable it later 170 mtspr L1CSR0,r0 /* invalidate d-cache */ 171 mtspr L1CSR1,r0 /* invalidate i-cache */ 177 .macro create_tlb1_entry esel ts tsize epn wimg rpn perm phy_high scratch [all …]
|
| /openbmc/qemu/include/tcg/ |
| H A D | tcg.h | 33 #include "tcg/tcg-mo.h" 34 #include "tcg-target-reg-bits.h" 35 #include "tcg-target.h" 36 #include "tcg/tcg-cond.h" 37 #include "tcg/insn-start-words.h" 38 #include "tcg/debug-assert.h" 70 #include "tcg/tcg-opc.h" 175 i -= TCG_TYPE_V64 - 1; in tcg_type_size() 185 in tcg/README. Target CPU front-end code uses these types to deal 194 to the CPU front-end code. [all …]
|
| /openbmc/qemu/include/standard-headers/drm/ |
| H A D | drm_fourcc.h | 38 * further describe the buffer's format - for example tiling or compression. 41 * ---------------- 55 * vendor-namespaced, and as such the relationship between a fourcc code and a 57 * may preserve meaning - such as number of planes - from the fourcc code, 63 * a modifier: a buffer may match a 64-pixel aligned modifier and a 32-pixel 75 * - Kernel and user-space drivers: for drivers it's important that modifiers 79 * - Higher-level programs interfacing with KMS/GBM/EGL/Vulkan/etc: these users 92 * ----------------------- 97 * upstream in-kernel or open source userspace user does not apply. 221 * IEEE 754-2008 binary16 half-precision float [all …]
|
| /openbmc/openbmc/meta-arm/meta-arm-bsp/documentation/corstone1000/ |
| H A D | user-guide.rst | 2 # Copyright (c) 2022-2024, Arm Limited. 4 # SPDX-License-Identifier: MIT 11 ------ 12 The Corstone-1000 software stack uses the `Yocto Project <https://www.yoctoproject.org/>`__ to build 13 a tiny Linux distribution suitable for the Corstone-1000 platform (kernel and initramfs filesystem … 14 The Yocto Project relies on the `BitBake <https://docs.yoctoproject.org/bitbake.html#bitbake-docume… 19 ------------- 26 - Git 1.8.3.1 or greater. 27 - Python 3.8.0 or greater. 28 - GNU Tar 1.28 or greater. [all …]
|
| H A D | change-log.rst | 2 # Copyright (c) 2022-2024, Arm Limited. 4 # SPDX-License-Identifier: MIT 11 fixes in each release of Corstone-1000 software stack. 21 - Implementation of a replication strategy for FWU metadata in TF-M according to the FWU specificat… 22 - Upgrade to metadata version 2 in TF-M. 23 - Increase the ITS and PS memory size in Secure Flash for TF-M. 24 - SW components upgrades. 25 - Bug fixes. 27 Corstone-1000 components versions 30 +-------------------------------------------+-----------------------------------------------------+ [all …]
|
| /openbmc/phosphor-certificate-manager/test/ |
| H A D | certs_manager_test.cpp | 11 #include <systemd/sd-event.h> 105 std::string cmd = "openssl req -x509 -sha256 -newkey rsa:2048 "; in createNewCertificate() 106 cmd += "-keyout cert.pem -out cert.pem -days 365000 -nodes"; in createNewCertificate() 107 cmd += " -subj /O=openbmc-project.xyz/CN=localhost"; in createNewCertificate() 130 ASSERT_EQ(std::system("mkdir -p demoCA"), 0); in createNeverExpiredRootCertificate() 131 ASSERT_EQ(std::system("mkdir -p demoCA/private/"), 0); in createNeverExpiredRootCertificate() 132 ASSERT_EQ(std::system("mkdir -p demoCA/newcerts/"), 0); in createNeverExpiredRootCertificate() 137 "openssl req -x509 -sha256 -newkey rsa:2048 -keyout " in createNeverExpiredRootCertificate() 138 "demoCA/private/cakey.pem -out demoCA/cacert.pem -nodes " in createNeverExpiredRootCertificate() 139 "-subj /O=openbmc-project.xyz/C=US/ST=CA/CN=localhost-ca"), in createNeverExpiredRootCertificate() [all …]
|
| /openbmc/qemu/linux-user/ |
| H A D | elfload.c | 1 /* This is the Linux kernel elf-loading code, ported into user space */ 10 #include "user/tswap-target.h" 11 #include "user/page-protection.h" 12 #include "exec/page-protection.h" 13 #include "exec/mmap-lock.h" 14 #include "exec/translation-block.h" 16 #include "user/guest-base.h" 17 #include "user-internals.h" 18 #include "signal-common.h" 20 #include "user-mmap.h" [all …]
|
| /openbmc/qemu/qga/ |
| H A D | commands-win32.c | 2 * QEMU Guest Agent win32-specific command implementations 11 * See the COPYING file in the top-level directory. 32 #include "guest-agent-core.h" 33 #include "vss-win32.h" 34 #include "qga-qapi-commands.h" 38 #include "qemu/host-utils.h" 40 #include "commands-common.h" 62 #pragma GCC diagnostic ignored "-Wredundant-decls" 82 (365 * (1970 - 1601) + \ 83 (1970 - 1601) / 4 - 3)) [all …]
|