|
[isar-cip-core][PATCH] Update ISAR revision 2 messages
From: Quirin Gylstorff <quirin.gylstorff@...> Update for downstream layers. Signed-off-by: Quirin Gylstorff <quirin.gylstorff@...> --- kas-cip.yml | 2 +- kas/opt/swupdate.yml | 1 + 2 files changed, 2
From: Quirin Gylstorff <quirin.gylstorff@...> Update for downstream layers. Signed-off-by: Quirin Gylstorff <quirin.gylstorff@...> --- kas-cip.yml | 2 +- kas/opt/swupdate.yml | 1 + 2 files changed, 2
|
By
Quirin Gylstorff
·
|
|
[isar-cip-core][PATCH 1/7] add recipe for optee qemu arm64 7 messages
From: Sven Schultschik <sven.schultschik@...> The recipe provides the possibility to create optee-os binaries for use inside of an qemu secureboot setup with edk2, rpmb, u-boot and uefi Signed-off-by:
From: Sven Schultschik <sven.schultschik@...> The recipe provides the possibility to create optee-os binaries for use inside of an qemu secureboot setup with edk2, rpmb, u-boot and uefi Signed-off-by:
|
By
Schultschik, Sven
·
|
|
[isar-cip-core][PATCH 7/7] no merge - manually instructions test secure boot
From: Sven Schultschik <sven.schultschik@...> This patch is not ment for merge but shows how to generally test the implementation of the optee and rpmb driven secure boot qemu setup. Signed-off-by: Sv
From: Sven Schultschik <sven.schultschik@...> This patch is not ment for merge but shows how to generally test the implementation of the optee and rpmb driven secure boot qemu setup. Signed-off-by: Sv
|
By
Schultschik, Sven
·
|
|
[isar-cip-core][PATCH 6/7] enhance start-qemu.sh for arm64 secure boot
From: Sven Schultschik <sven.schultschik@...> The start-qemu shell script need some adjustments to switch on secure in the machine statement and adds the virtual random number generator if secure boot
From: Sven Schultschik <sven.schultschik@...> The start-qemu shell script need some adjustments to switch on secure in the machine statement and adds the virtual random number generator if secure boot
|
By
Schultschik, Sven
·
|
|
[isar-cip-core][PATCH 5/7] add kas files for building qemu secure boot images
From: Sven Schultschik <sven.schultschik@...> The u-boot-efi-ebg-op-tee-qemu kas file combines the different recipes to create an image which can be booted with qemu and provides secure boot with EBG,
From: Sven Schultschik <sven.schultschik@...> The u-boot-efi-ebg-op-tee-qemu kas file combines the different recipes to create an image which can be booted with qemu and provides secure boot with EBG,
|
By
Schultschik, Sven
·
|
|
[isar-cip-core][PATCH 4/7] add u-boot patch for qemu to support RPMB
From: Sven Schultschik <sven.schultschik@...> Qemu itself is missing a implemented emulation of an RPBM (replay protected memory) which is part of an emmc. Therefore currently a u-boot patch, which ad
From: Sven Schultschik <sven.schultschik@...> Qemu itself is missing a implemented emulation of an RPBM (replay protected memory) which is part of an emmc. Therefore currently a u-boot patch, which ad
|
By
Schultschik, Sven
·
|
|
[isar-cip-core][PATCH 3/7] add recipe for trusted firmware a qemu arm64
From: Sven Schultschik <sven.schultschik@...> provide a recipe to generate the needed binary to start a secure boot qemu with integrated optee and active RPMB replay protected memory emulation within
From: Sven Schultschik <sven.schultschik@...> provide a recipe to generate the needed binary to start a secure boot qemu with integrated optee and active RPMB replay protected memory emulation within
|
By
Schultschik, Sven
·
|
|
[isar-cip-core][PATCH] secureboot: Move IMAGE_TYPEDEP_wic out of verity class
From: Jan Kiszka <jan.kiszka@...> The usage of class is not bound to wic, thus we should not declare any dependency of wic on it. This makes the verity pattern analogous to the squashfs one (for non-s
From: Jan Kiszka <jan.kiszka@...> The usage of class is not bound to wic, thus we should not declare any dependency of wic on it. This makes the verity pattern analogous to the squashfs one (for non-s
|
By
Jan Kiszka
·
|
|
Tests run on CIP-LAVA platform 5 messages
Hi Team, I could able to see there are few tests are running in the CIP LAVA platform. I am showing the list below what all LAVA tests are running in the CIP LAVA platform. Test-case CIP LAVA job link
Hi Team, I could able to see there are few tests are running in the CIP LAVA platform. I am showing the list below what all LAVA tests are running in the CIP LAVA platform. Test-case CIP LAVA job link
|
By
P T, Sarath
·
|
|
[isar-cip-core][PATCH] tmp_fs: Correct option generation 2 messages
From: Quirin Gylstorff <quirin.gylstorff@...> This fixes issues https://gitlab.com/cip-project/cip-core/isar-cip-core/-/issues/44. Signed-off-by: Quirin Gylstorff <quirin.gylstorff@...> --- recipes-co
From: Quirin Gylstorff <quirin.gylstorff@...> This fixes issues https://gitlab.com/cip-project/cip-core/isar-cip-core/-/issues/44. Signed-off-by: Quirin Gylstorff <quirin.gylstorff@...> --- recipes-co
|
By
Quirin Gylstorff
·
|
|
[isar-cip-core][PATCH] Fix mount options passed to systemd unit 3 messages
Mount unit template used wrong variable name for mount options. This resulted in empty `Options` value used for /tmp mounting. Signed-off-by: Uladzimir Bely <ubely@...> --- recipes-core/tmp-fs/files/t
Mount unit template used wrong variable name for mount options. This resulted in empty `Options` value used for /tmp mounting. Signed-off-by: Uladzimir Bely <ubely@...> --- recipes-core/tmp-fs/files/t
|
By
Uladzimir Bely
·
|
|
[ANNOUNCE] Release v4.19.261-cip83 and v5.10.147-cip18
Hi, CIP kernel team has released Linux kernel v4.19.261-cip83 and v5.10.147-cip18. The linux-4.19.y-cip tree has been updated base version from v4.19.259 to v4.19.261, and the linux-5.10.y-cip tree ha
Hi, CIP kernel team has released Linux kernel v4.19.261-cip83 and v5.10.147-cip18. The linux-4.19.y-cip tree has been updated base version from v4.19.259 to v4.19.261, and the linux-5.10.y-cip tree ha
|
By
Nobuhiro Iwamatsu
·
|
|
[isar-cip-core][PATCH 1/1] add support to install efibootguard in cross env 5 messages
Also an issue in Debian upstream? Jan -- Siemens AG, Technology Competence Center Embedded Linux
Also an issue in Debian upstream? Jan -- Siemens AG, Technology Competence Center Embedded Linux
|
By
Jan Kiszka
·
|
|
Plugin efibootguard-boot doesn't support to specify root parameter with unified kernel image 2 messages
Hi all, I have a target image with following partitions: |- bootloader (efibootguard) |- system A (linux.efi) |- system B (linux.efi) |- root FS A |- root FS B My plan is to use plugin efibootguard-bo
Hi all, I have a target image with following partitions: |- bootloader (efibootguard) |- system A (linux.efi) |- system B (linux.efi) |- root FS A |- root FS B My plan is to use plugin efibootguard-bo
|
By
Mou, ChengShu(Ben)
·
|
|
[isar-cip-core][PATCH v2 0/2] Simplify integration of swupdate into downstream layers 2 messages
Changes since v1: - moved initramfs-squashfs-hook from ebg-swu to swupdate kas file - minimal style fixes according to review comments - fixed typo in commit message - rebased onto current next This s
Changes since v1: - moved initramfs-squashfs-hook from ebg-swu to swupdate kas file - minimal style fixes according to review comments - fixed typo in commit message - rebased onto current next This s
|
By
Felix Moessbauer
·
|
|
[isar-cip-core][PATCH v2 1/2] fix: add squashfs hook to enforce load of module
This patch fixes issues when using a stock debian kernel, as this kernel has no compiled-in support for sqashfs. By explicitly adding the module to the initramfs we ensure that it is available. Signed
This patch fixes issues when using a stock debian kernel, as this kernel has no compiled-in support for sqashfs. By explicitly adding the module to the initramfs we ensure that it is available. Signed
|
By
Felix Moessbauer
·
|
|
[isar-cip-core][PATCH 1/3] fix: add missing class dependencies in image_uuid 3 messages
Just for my understanding: Is this more a theoretical issue, or did you actually saw errors because of where you included the class? Jan -- Siemens AG, Technology Competence Center Embedded Linux
Just for my understanding: Is this more a theoretical issue, or did you actually saw errors because of where you included the class? Jan -- Siemens AG, Technology Competence Center Embedded Linux
|
By
Jan Kiszka
·
|
|
[isar-cip-core][PATCH v2 2/2] activate nodoc profile for swupdate build
This patch enables the nodoc debian build profile for swupdate. By that, the overall download and build time is drastically reduced. It also helps when building behind proxies that sometimes have issu
This patch enables the nodoc debian build profile for swupdate. By that, the overall download and build time is drastically reduced. It also helps when building behind proxies that sometimes have issu
|
By
Felix Moessbauer
·
|
|
Troubleshooting missing lore messages 5 messages
Hi, all: I am aware of the problem with occasional missing message on the lore.kernel.org archive. Due to the way groups.io operates, the messages are actually delivered via the web hook (otherwise gr
Hi, all: I am aware of the problem with occasional missing message on the lore.kernel.org archive. Due to the way groups.io operates, the messages are actually delivered via the web hook (otherwise gr
|
By
Konstantin Ryabitsev
·
|
|
CIP IRC weekly meeting today on libera.chat
Hi all, Kindly be reminded to attend the weekly meeting through IRC to discuss technical topics with CIP kernel today. Our channel is the following: irc:irc.libera.chat:6667/cip The IRC meeting is sch
Hi all, Kindly be reminded to attend the weekly meeting through IRC to discuss technical topics with CIP kernel today. Our channel is the following: irc:irc.libera.chat:6667/cip The IRC meeting is sch
|
By
Jan Kiszka
·
|