Home
last modified time | relevance | path

Searched +full:ts +full:- +full:storage (Results 1 – 25 of 107) sorted by relevance

12345

/openbmc/openbmc/meta-arm/meta-arm/recipes-security/optee/
H A Doptee-os-ts.inc6 # TS SPs UUIDs definitions
7 require recipes-security/trusted-services/ts-uuid.inc
16 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-its', \
17 ' ts-sp-its', '' , d)}"
18 SP_PATHS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-its', \
21 # Storage SP
22 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-storage', \
23 ' ts-sp-storage', '' , d)}"
24 SP_PATHS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-storage', \
28 DEPENDS:append = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-crypto', \
[all …]
/openbmc/openbmc/meta-arm/ci/
H A Dqemuarm64-secureboot-ts.yml1 # yaml-language-server: $schema=https://raw.githubusercontent.com/siemens/kas/master/kas/schema-kas…
6 - ci/meta-openembedded.yml
11 …# Include TS Crypto, TS Protected Storage, and TS Internal Trusted Storage and SPs into optee-os i…
12 # FIXME - remove TS SMM Gateway due to QEMU v9.0.0 test failures
13 MACHINE_FEATURES:append = " arm-ffa ts-crypto ts-storage ts-its"
14 # Include TS demo/test tools into image
15 IMAGE_INSTALL:append = " packagegroup-ts-tests"
16 # Include TS PSA Arch tests into image
17 IMAGE_INSTALL:append = " packagegroup-ts-tests-psa"
H A Dfvp-base-ts.yml1 # yaml-language-server: $schema=https://raw.githubusercontent.com/siemens/kas/master/kas/schema-kas…
6 - ci/fvp-base.yml
7 - ci/meta-openembedded.yml
8 - ci/testimage.yml
15 MACHINE_FEATURES:append = " arm-ffa ts-crypto ts-storage ts-its"
16 MACHINE_FEATURES:append = " ts-attestation ts-smm-gateway optee-spmc-test"
17 MACHINE_FEATURES:append = " ts-block-storage ts-fwu"
18 # Include TS demo/test tools into image
19 IMAGE_INSTALL:append = " packagegroup-ts-tests"
20 # Include TS PSA Arch tests into image
[all …]
/openbmc/openbmc/meta-arm/meta-arm/lib/oeqa/runtime/cases/
H A Dtrusted_services.py18 @OEHasPackage(['ts-demo'])
21 self.run_test_tool('ts-demo')
23 @OEHasPackage(['ts-uefi-test'])
26 self.run_test_tool('uefi-test')
28 @OEHasPackage(['ts-psa-crypto-api-test'])
31 self.run_test_tool('psa-crypto-api-test')
33 @OEHasPackage(['ts-psa-its-api-test'])
36 self.run_test_tool('psa-its-api-test')
38 @OEHasPackage(['ts-psa-ps-api-test'])
41 self.run_test_tool('psa-ps-api-test')
[all …]
/openbmc/linux/include/linux/
H A Dpstore.h1 /* SPDX-License-Identifier: GPL-2.0-only */
3 * Persistent Storage - pstore.h
8 * level persistent storage via a file system.
25 * These values may be written to storage (see EFI vars backend), so
29 /* Frontend storage types */
35 /* PPC64-specific partition types */
51 * struct pstore_record - details of a pstore record entry
54 * @id: per-type unique identifier for record
61 * kfree()d by the pstore core if non-NULL
89 * struct pstore_info - backend pstore driver structure
[all …]
/openbmc/openbmc/meta-arm/documentation/
H A Dtrusted-services.md1 # The Trusted Services: framework for developing root-of-trust services
3 meta-arm layer includes recipes for [Trusted Services][^1] Secure Partitions and Normal World appli…
4 in `meta-arm/recipes-security/trusted-services`
8 We define dedicated recipes for all supported Trusted Services (TS) Secure Partitions.
10 These files are automatically included into optee-os image accordingly to defined MACHINE_FEATURES.
12 ### How to include TS SPs
14 To include TS SPs into optee-os image you need to add into MACHINE_FEATURES
18 | ----------------- | --------------- |
19 | Attestation | ts-attesation |
20 | Crypto | ts-crypto |
[all …]
/openbmc/linux/arch/arm/mach-orion5x/
H A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
15 Orion-1 (5181), Orion-VoIP (5181L), Orion-NAS (5182),
16 Orion-2 (5281), Orion-1-90 (6183).
32 bool "Marvell Orion-NAS Reference Design (Flattened Device Tree)"
37 Orion-NAS (88F5182) RD2, Flattened Device Tree.
48 bool "D-Link DNS-323"
53 D-Link DNS-323 platform.
56 bool "QNAP TS-109/TS-209"
60 QNAP TS-109/TS-209 platform.
83 Buffalo Linkstation Mini (LS-WSGL) platform.
[all …]
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/packagegroups/
H A Dpackagegroup-ts-tests.bb7 COMPATIBLE_HOST = "aarch64.*-linux"
9 COMPATIBLE_MACHINE:qemuarm64-secureboot = "qemuarm64-secureboot"
11 PACKAGES = "${PN} ${PN}-psa"
14 ts-demo \
15 ts-service-test \
16 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-env-test', 'ts-remote-test', '' , d)} \
17 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-smm-gateway', 'ts-uefi-test', '' , d)} \
20 SUMMARY:${PN}-psa = "PSA certification tests (psa-arch-test) for TS SPs"
21 RDEPENDS:${PN}-psa = "\
22 ${@bb.utils.contains('MACHINE_FEATURES', 'ts-crypto', 'ts-psa-crypto-api-test', '' , d)} \
[all …]
/openbmc/openbmc/meta-arm/meta-arm/recipes-security/trusted-services/
H A Dts-sp-storage_git.bb1 DESCRIPTION = "Trusted Services secure storage service provider"
3 require ts-sp-common.inc
8 OECMAKE_SOURCEPATH="${S}/deployments/protected-storage/config/${TS_SP_PS_CONFIG}-${TS_ENV}"
H A Dts-sp-its_git.bb1 DESCRIPTION = "Trusted Services internal secure storage service provider"
3 require ts-sp-common.inc
8 OECMAKE_SOURCEPATH="${S}/deployments/internal-trusted-storage/config/${TS_SP_ITS_CONFIG}-${TS_ENV}"
H A Dts-sp-block-storage_git.bb1 # SPDX-FileCopyrightText: <text>Copyright 2023 Arm Limited and/or its
2 # affiliates <open-source-office@arm.com></text>
4 # SPDX-License-Identifier: MIT
6 DESCRIPTION = "Trusted Services block storage service provider"
8 require ts-sp-common.inc
13 OECMAKE_SOURCEPATH="${S}/deployments/block-storage/config/${TS_SP_BLOCK_STORAGE_CONFIG}-${TS_ENV}"
H A Dts-psa-ps-api-test_git.bb1 DESCRIPTION = "Protected Storage PSA certification tests (psa-arch-test) for Trusted Services"
3 TS_ENV = "arm-linux"
5 require ts-psa-api-test-common_${PV}.inc
7 OECMAKE_SOURCEPATH = "${S}/deployments/psa-api-test/protected_storage/${TS_ENV}"
9 PSA_TEST = "psa-ps-api-test"
H A Dts-psa-its-api-test_git.bb1 DESCRIPTION = "Internal Trusted Storage PSA certification tests (psa-arch-test) for Trusted Service…
3 TS_ENV = "arm-linux"
5 require ts-psa-api-test-common_${PV}.inc
7 OECMAKE_SOURCEPATH = "${S}/deployments/psa-api-test/internal_trusted_storage/${TS_ENV}"
9 PSA_TEST = "psa-its-api-test"
/openbmc/linux/drivers/gpu/drm/etnaviv/
H A Detnaviv_drv.h1 /* SPDX-License-Identifier: GPL-2.0 */
3 * Copyright (C) 2015-2018 Etnaviv Project
94 * Return the storage size of a structure with a variable length array.
100 if (elem_size && nelem > (SIZE_MAX - base) / elem_size) in size_vstruct()
113 struct timespec64 ts, to = { in etnaviv_timeout_to_jiffies() local
114 .tv_sec = timeout->tv_sec, in etnaviv_timeout_to_jiffies()
115 .tv_nsec = timeout->tv_nsec, in etnaviv_timeout_to_jiffies()
118 ktime_get_ts64(&ts); in etnaviv_timeout_to_jiffies()
121 if (timespec64_compare(&to, &ts) <= 0) in etnaviv_timeout_to_jiffies()
124 ts = timespec64_sub(to, ts); in etnaviv_timeout_to_jiffies()
[all …]
/openbmc/linux/drivers/media/test-drivers/vidtv/
H A Dvidtv_mux.h1 /* SPDX-License-Identifier: GPL-2.0 */
7 * This file contains the muxer logic for TS packets from different
27 * struct vidtv_mux_timing - Timing related information
30 * provide storage for the clock, which is used to compute the value for the PCR.
52 * struct vidtv_mux_si - Store the PSI context.
57 * vidtv_channel and then periodically sends the TS packets for them>
75 * struct vidtv_mux_pid_ctx - Store the context for a given TS PID.
76 * @pid: The TS PID.
77 * @cc: The continuity counter for this PID. It is incremented on every TS
80 * @h: This is embedded in a hash table, mapping pid -> vidtv_mux_pid_ctx
[all …]
/openbmc/telemetry/src/
H A Dtrigger_manager.cpp11 #include <phosphor-logging/log.hpp>
24 managerIface = objServer->add_unique_interface( in TriggerManager()
52 triggerFactory->getLabeledSensorsInfo(yield, sensors); in TriggerManager()
90 namespace ts = utils::tstring; in verifyThresholdParams()
99 if (discreteParam.at_label<ts::UserId>().length() > in verifyThresholdParams()
132 triggers, [](const auto& trigger) { return trigger->getId(); }); in addTrigger()
139 triggers.emplace_back(triggerFactory->make( in addTrigger()
149 triggerStorage->list(); in loadFromPersistent()
153 std::optional<nlohmann::json> data = triggerStorage->load(path); in loadFromPersistent()
158 throw std::runtime_error("Empty storage"); in loadFromPersistent()
[all …]
H A Dreport_manager.cpp10 #include <phosphor-logging/log.hpp>
29 reportManagerIface = objServer->add_unique_interface( in ReportManager()
36 [](const auto&) -> uint64_t { return minInterval.count(); }); in ReportManager()
40 [](const auto&) -> std::vector<std::string> { in ReportManager()
106 namespace ts = utils::tstring; in verifyAddReport()
133 utils::toUnderlying(item.at_label<ts::OperationType>())); in verifyAddReport()
145 reportFactory->convertMetricParams(yield, metricParams); in addReport()
161 reports, [](const auto& report) { return report->getId(); }); in addReport()
170 reportFactory->make(id, name, reportingType, reportActions, interval, in addReport()
179 reportStorage->list(); in loadFromPersistent()
[all …]
/openbmc/linux/kernel/time/
H A Dtimekeeping.c1 // SPDX-License-Identifier: GPL-2.0
28 #include "tick-internal.h"
63 * struct tk_fast - NMI safe timekeeper
76 /* Suspend-time cycles value for halted fast timekeeper. */
119 while (tk->tkr_mono.xtime_nsec >= ((u64)NSEC_PER_SEC << tk->tkr_mono.shift)) { in tk_normalize_xtime()
120 tk->tkr_mono.xtime_nsec -= (u64)NSEC_PER_SEC << tk->tkr_mono.shift; in tk_normalize_xtime()
121 tk->xtime_sec++; in tk_normalize_xtime()
123 while (tk->tkr_raw.xtime_nsec >= ((u64)NSEC_PER_SEC << tk->tkr_raw.shift)) { in tk_normalize_xtime()
124 tk->tkr_raw.xtime_nsec -= (u64)NSEC_PER_SEC << tk->tkr_raw.shift; in tk_normalize_xtime()
125 tk->raw_sec++; in tk_normalize_xtime()
[all …]
H A Dtime.c1 // SPDX-License-Identifier: GPL-2.0
10 * 1993-09-02 Philip Gladstone
12 * 1993-10-08 Torsten Duwe
14 * 1995-08-13 Torsten Duwe
15 * kernel PLL updated to 1994-12-13 specs (rfc-1589)
16 * 1999-01-16 Ulrich Windl
22 * 2004-07-14 Christoph Lameter
57 * sys_time() can be implemented in user-level using
68 return -EFAULT; in SYSCALL_DEFINE1()
75 * sys_stime() can be implemented in user-level using
[all …]
/openbmc/linux/arch/x86/kernel/
H A Drtc.c1 // SPDX-License-Identifier: GPL-2.0
13 #include <asm/intel-mid.h>
38 unsigned long long nowtime = now->tv_sec; in mach_set_cmos_time()
52 retval = -EINVAL; in mach_set_cmos_time()
62 * If pm_trace abused the RTC as storage, set the timespec to 0, in mach_get_cmos_time()
66 now->tv_sec = now->tv_nsec = 0; in mach_get_cmos_time()
72 now->tv_sec = now->tv_nsec = 0; in mach_get_cmos_time()
76 now->tv_sec = rtc_tm_to_time64(&tm); in mach_get_cmos_time()
77 now->tv_nsec = 0; in mach_get_cmos_time()
109 void read_persistent_clock64(struct timespec64 *ts) in read_persistent_clock64() argument
[all …]
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/
H A D0013-Fix-error-handling-of-variable-index-loading.patch6 If loading of the variable index from Protected Storage fails, SmmGW
12 Signed-off-by: Gabor Toth <gabor.toth2@arm.com>
13 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TS/trusted-services/+/28300]
14 ---
15 .../backend/uefi_variable_store.c | 28 ++++++++++++++-----
16 1 file changed, 21 insertions(+), 7 deletions(-)
18 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.c b/components/servic…
20 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.c
22 @@ -27,7 +27,7 @@
26 -static void load_variable_index(struct uefi_variable_store *context);
[all …]
H A D0015-Add-timestamp-validation-for-uefi-variables.patch9 Signed-off-by: Gabor Toth <gabor.toth2@arm.com>
10 Upstream-Status: Submitted [https://review.trustedfirmware.org/c/TS/trusted-services/+/27955]
11 ---
12 .../backend/uefi_variable_store.c | 35 +++++++++++++++----
15 3 files changed, 30 insertions(+), 7 deletions(-)
17 diff --git a/components/service/uefi/smm_variable/backend/uefi_variable_store.c b/components/servic…
19 --- a/components/service/uefi/smm_variable/backend/uefi_variable_store.c
21 @@ -76,6 +76,7 @@ static efi_status_t verify_var_by_key_var(const efi_data_map *new_var,
29 @@ -197,6 +198,7 @@ efi_status_t uefi_variable_store_set_variable(const struct uefi_variable_store *
36 efi_status_t status = check_name_terminator(var->Name, var->NameSize);
[all …]
/openbmc/u-boot/arch/powerpc/include/asm/
H A Dmmu.h28 unsigned long w:1; /* Write-thru cache mode */
47 unsigned long n:1; /* No-execute */
90 unsigned long w:1; /* Write-thru cache */
109 * Simulated two-level MMU. This structure is used by the kernel
133 pte **pmap; /* Two-level page-map structure */
170 #define BATL_PP_01 0x00000001 /* Read-only */
171 #define BATL_PP_10 0x00000002 /* Read-write */
218 (u32)((((1ull << __ilog2_u64((u64)x)) / (128 * 1024)) - 1) * 4)
238 * During software tablewalk, the registers used perform mask/shift-add
275 #define MI_GUARDED 0x00000010 /* Guarded storage */
[all …]
/openbmc/linux/drivers/misc/
H A Dkgdbts.c1 // SPDX-License-Identifier: GPL-2.0-only
12 * -------------------------------------
75 * fg # and hit control-c
76 * fg # and hit control-c
81 * fg # and hit control-c
143 /* Storage for the registers, in GDB format. */
145 sizeof(unsigned long) - 1) /
149 /* -1 = init not run yet, 0 = unconfigured, 1 = configured. */
150 static int configured = -1;
179 static struct test_state ts; variable
[all …]
/openbmc/linux/drivers/gpu/drm/msm/disp/dpu1/
H A Ddpu_crtc.h1 /* SPDX-License-Identifier: GPL-2.0-only */
4 * Copyright (c) 2015-2021 The Linux Foundation. All rights reserved.
19 /* define the maximum number of in-flight frame events */
26 * @NRT_CLIENT: Non-RealTime client like WB display
84 DPU_CRTC_CRC_SOURCE_INVALID = -1
107 * @ts: timestamp at queue entry
114 ktime_t ts; member
124 * struct dpu_crtc - virtualized CRTC data structure
128 * pending vblank event, this will be non-null.
137 * commit-thread, not state-swap time which is earlier, so
[all …]

12345