|
[isar-cip-core][PATCH 0/8] Secureboot on QEMU with EDK2, OP-TEE and RPBM 3 messages
From: Sven Schultschik <sven.schultschik@...> This series of patches will add recipes to build a QEMU setup which uses OP-TEE to use RPBM (Replay protected memory) of an EMMC for a secure storage. Whi
From: Sven Schultschik <sven.schultschik@...> This series of patches will add recipes to build a QEMU setup which uses OP-TEE to use RPBM (Replay protected memory) of an EMMC for a secure storage. Whi
|
By
Schultschik, Sven
·
|
|
[isar-cip-core][PATCH 7/8] enhance start-qemu.sh for arm64 secure boot
From: Sven Schultschik <sven.schultschik@...> The start-qemu shell script need some adjustments to switch on secure in the machine statement and adds the virtual random number generator if secure boot
From: Sven Schultschik <sven.schultschik@...> The start-qemu shell script need some adjustments to switch on secure in the machine statement and adds the virtual random number generator if secure boot
|
By
Schultschik, Sven
·
|
|
[isar-cip-core][PATCH 4/8] add u-boot patch for qemu to support RPMB
From: Sven Schultschik <sven.schultschik@...> Qemu itself is missing a implemented emulation of an RPBM (replay protected memory) which is part of an emmc. Therefore currently a u-boot patch, which ad
From: Sven Schultschik <sven.schultschik@...> Qemu itself is missing a implemented emulation of an RPBM (replay protected memory) which is part of an emmc. Therefore currently a u-boot patch, which ad
|
By
Schultschik, Sven
·
|
|
[isar-cip-core][PATCH 2/8] add recipe for optee qemu arm64
From: Sven Schultschik <sven.schultschik@...> The recipe provides the possibility to create optee-os binaries for use inside of an qemu secureboot setup with edk2, rpmb, u-boot and uefi Signed-off-by:
From: Sven Schultschik <sven.schultschik@...> The recipe provides the possibility to create optee-os binaries for use inside of an qemu secureboot setup with edk2, rpmb, u-boot and uefi Signed-off-by:
|
By
Schultschik, Sven
·
|
|
[isar-cip-core] doc/README.secureboot.md : Add method to check secure boot status in arm arch. 2 messages
From: Sai <Sai.Sathujoda@...> The dmesg will not show secure boot status for arm64 or armhf architectures. Signed-off-by: Sai <Sai.Sathujoda@...> --- doc/README.secureboot.md | 4 ++++ 1 file changed,
From: Sai <Sai.Sathujoda@...> The dmesg will not show secure boot status for arm64 or armhf architectures. Signed-off-by: Sai <Sai.Sathujoda@...> --- doc/README.secureboot.md | 4 ++++ 1 file changed,
|
By
sai.sathujoda@...
·
|
|
[isar-cip-core][PATCH 2/7] add recipe for for edk2 7 messages
From: Sven Schultschik <sven.schultschik@...> provide a recipe to create the BL32_AP_MM.fd binary by edk2 which is needed for the qemu optee generation as dependencie. Signed-off-by: Sven Schultschik
From: Sven Schultschik <sven.schultschik@...> provide a recipe to create the BL32_AP_MM.fd binary by edk2 which is needed for the qemu optee generation as dependencie. Signed-off-by: Sven Schultschik
|
By
Schultschik, Sven
·
|
|
New CVE entries this week 3 messages
Hi ! It's this week's CVE report. This week reported 23 new CVEs and 2 updated CVEs. CVE-2022-41674, CVE-2022-42719, and CVE-2022-42720 are remote code execution vulnerabilities. These CVEs are alread
Hi ! It's this week's CVE report. This week reported 23 new CVEs and 2 updated CVEs. CVE-2022-41674, CVE-2022-42719, and CVE-2022-42720 are remote code execution vulnerabilities. These CVEs are alread
|
By
Masami Ichikawa
·
|
|
CIP IRC weekly meeting today on libera.chat
Hi all, Kindly be reminded to attend the weekly meeting through IRC to discuss technical topics with CIP kernel today. Our channel is the following: irc:irc.libera.chat:6667/cip The IRC meeting is sch
Hi all, Kindly be reminded to attend the weekly meeting through IRC to discuss technical topics with CIP kernel today. Our channel is the following: irc:irc.libera.chat:6667/cip The IRC meeting is sch
|
By
Jan Kiszka
·
|
|
[isar-cip-core][PATCH] Update ISAR revision 2 messages
From: Quirin Gylstorff <quirin.gylstorff@...> Update for downstream layers. Signed-off-by: Quirin Gylstorff <quirin.gylstorff@...> --- kas-cip.yml | 2 +- kas/opt/swupdate.yml | 1 + 2 files changed, 2
From: Quirin Gylstorff <quirin.gylstorff@...> Update for downstream layers. Signed-off-by: Quirin Gylstorff <quirin.gylstorff@...> --- kas-cip.yml | 2 +- kas/opt/swupdate.yml | 1 + 2 files changed, 2
|
By
Quirin Gylstorff
·
|
|
[isar-cip-core][PATCH 1/7] add recipe for optee qemu arm64 7 messages
From: Sven Schultschik <sven.schultschik@...> The recipe provides the possibility to create optee-os binaries for use inside of an qemu secureboot setup with edk2, rpmb, u-boot and uefi Signed-off-by:
From: Sven Schultschik <sven.schultschik@...> The recipe provides the possibility to create optee-os binaries for use inside of an qemu secureboot setup with edk2, rpmb, u-boot and uefi Signed-off-by:
|
By
Schultschik, Sven
·
|
|
[isar-cip-core][PATCH 7/7] no merge - manually instructions test secure boot
From: Sven Schultschik <sven.schultschik@...> This patch is not ment for merge but shows how to generally test the implementation of the optee and rpmb driven secure boot qemu setup. Signed-off-by: Sv
From: Sven Schultschik <sven.schultschik@...> This patch is not ment for merge but shows how to generally test the implementation of the optee and rpmb driven secure boot qemu setup. Signed-off-by: Sv
|
By
Schultschik, Sven
·
|
|
[isar-cip-core][PATCH 6/7] enhance start-qemu.sh for arm64 secure boot
From: Sven Schultschik <sven.schultschik@...> The start-qemu shell script need some adjustments to switch on secure in the machine statement and adds the virtual random number generator if secure boot
From: Sven Schultschik <sven.schultschik@...> The start-qemu shell script need some adjustments to switch on secure in the machine statement and adds the virtual random number generator if secure boot
|
By
Schultschik, Sven
·
|
|
[isar-cip-core][PATCH 5/7] add kas files for building qemu secure boot images
From: Sven Schultschik <sven.schultschik@...> The u-boot-efi-ebg-op-tee-qemu kas file combines the different recipes to create an image which can be booted with qemu and provides secure boot with EBG,
From: Sven Schultschik <sven.schultschik@...> The u-boot-efi-ebg-op-tee-qemu kas file combines the different recipes to create an image which can be booted with qemu and provides secure boot with EBG,
|
By
Schultschik, Sven
·
|
|
[isar-cip-core][PATCH 4/7] add u-boot patch for qemu to support RPMB
From: Sven Schultschik <sven.schultschik@...> Qemu itself is missing a implemented emulation of an RPBM (replay protected memory) which is part of an emmc. Therefore currently a u-boot patch, which ad
From: Sven Schultschik <sven.schultschik@...> Qemu itself is missing a implemented emulation of an RPBM (replay protected memory) which is part of an emmc. Therefore currently a u-boot patch, which ad
|
By
Schultschik, Sven
·
|
|
[isar-cip-core][PATCH 3/7] add recipe for trusted firmware a qemu arm64
From: Sven Schultschik <sven.schultschik@...> provide a recipe to generate the needed binary to start a secure boot qemu with integrated optee and active RPMB replay protected memory emulation within
From: Sven Schultschik <sven.schultschik@...> provide a recipe to generate the needed binary to start a secure boot qemu with integrated optee and active RPMB replay protected memory emulation within
|
By
Schultschik, Sven
·
|
|
[isar-cip-core][PATCH] secureboot: Move IMAGE_TYPEDEP_wic out of verity class
From: Jan Kiszka <jan.kiszka@...> The usage of class is not bound to wic, thus we should not declare any dependency of wic on it. This makes the verity pattern analogous to the squashfs one (for non-s
From: Jan Kiszka <jan.kiszka@...> The usage of class is not bound to wic, thus we should not declare any dependency of wic on it. This makes the verity pattern analogous to the squashfs one (for non-s
|
By
Jan Kiszka
·
|
|
Tests run on CIP-LAVA platform 5 messages
Hi Team, I could able to see there are few tests are running in the CIP LAVA platform. I am showing the list below what all LAVA tests are running in the CIP LAVA platform. Test-case CIP LAVA job link
Hi Team, I could able to see there are few tests are running in the CIP LAVA platform. I am showing the list below what all LAVA tests are running in the CIP LAVA platform. Test-case CIP LAVA job link
|
By
P T, Sarath
·
|
|
[isar-cip-core][PATCH] tmp_fs: Correct option generation 2 messages
From: Quirin Gylstorff <quirin.gylstorff@...> This fixes issues https://gitlab.com/cip-project/cip-core/isar-cip-core/-/issues/44. Signed-off-by: Quirin Gylstorff <quirin.gylstorff@...> --- recipes-co
From: Quirin Gylstorff <quirin.gylstorff@...> This fixes issues https://gitlab.com/cip-project/cip-core/isar-cip-core/-/issues/44. Signed-off-by: Quirin Gylstorff <quirin.gylstorff@...> --- recipes-co
|
By
Quirin Gylstorff
·
|
|
[isar-cip-core][PATCH] Fix mount options passed to systemd unit 3 messages
Mount unit template used wrong variable name for mount options. This resulted in empty `Options` value used for /tmp mounting. Signed-off-by: Uladzimir Bely <ubely@...> --- recipes-core/tmp-fs/files/t
Mount unit template used wrong variable name for mount options. This resulted in empty `Options` value used for /tmp mounting. Signed-off-by: Uladzimir Bely <ubely@...> --- recipes-core/tmp-fs/files/t
|
By
Uladzimir Bely
·
|
|
[ANNOUNCE] Release v4.19.261-cip83 and v5.10.147-cip18
Hi, CIP kernel team has released Linux kernel v4.19.261-cip83 and v5.10.147-cip18. The linux-4.19.y-cip tree has been updated base version from v4.19.259 to v4.19.261, and the linux-5.10.y-cip tree ha
Hi, CIP kernel team has released Linux kernel v4.19.261-cip83 and v5.10.147-cip18. The linux-4.19.y-cip tree has been updated base version from v4.19.259 to v4.19.261, and the linux-5.10.y-cip tree ha
|
By
Nobuhiro Iwamatsu
·
|