` to validate networking between the Primary Compute and
the three Safety Island clusters.
Baremetal Architecture
----------------------
Build
^^^^^
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To build a Baremetal Architecture image:
1. Select ``Safety Island Communication Demo (using HIPC)`` from the
``Use-Case`` menu.
2. Select ``Baremetal`` from the ``Reference Software Stack Architecture``
menu.
3. Select ``Build``.
Automated Validation
^^^^^^^^^^^^^^^^^^^^
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To run the validation tests:
1. Select ``Safety Island Communication Demo (using HIPC)`` as ``Use-Case``.
2. Select ``Baremetal`` from the ``Reference Software Stack Architecture``
menu.
3. Select ``Run Automated Validation`` from the ``Runtime Validation Setup``
menu.
4. Select ``Build``.
The complete test suite takes around 45 minutes to complete. See
:ref:`validation_hipc_demo` for more details.
The following messages are expected in the output to validate this Use-Case:
.. code-block:: text
RESULTS - test_30_hipc.HIPCTestBase.test_hipc_cluster0: PASSED (223.04s)
RESULTS - test_30_hipc.HIPCTestBase.test_hipc_cluster1: PASSED (351.62s)
RESULTS - test_30_hipc.HIPCTestBase.test_hipc_cluster2: PASSED (426.17s)
RESULTS - test_30_hipc.HIPCTestBase.test_hipc_cluster_cl0_cl1: PASSED (100.46s)
RESULTS - test_30_hipc.HIPCTestBase.test_hipc_cluster_cl0_cl2: PASSED (120.00s)
RESULTS - test_30_hipc.HIPCTestBase.test_hipc_cluster_cl1_cl2: PASSED (161.80s)
RESULTS - test_30_hipc.HIPCTestBase.test_ping_cl0_cl1: PASSED (37.34s)
RESULTS - test_30_hipc.HIPCTestBase.test_ping_cl0_cl2: PASSED (36.80s)
RESULTS - test_30_hipc.HIPCTestBase.test_ping_cl1_cl2: PASSED (37.10s)
RESULTS - test_30_hipc.HIPCTestBase.test_ping_cluster0: PASSED (102.31s)
RESULTS - test_30_hipc.HIPCTestBase.test_ping_cluster1: PASSED (95.50s)
RESULTS - test_30_hipc.HIPCTestBase.test_ping_cluster2: PASSED (92.91s)
RESULTS - test_30_ptp.PTPTest.test_ptp_linux_services: PASSED (4.56s)
RESULTS - test_30_ptp.PTPTest.test_ptp_si_clients: PASSED (34.73s)
.. note::
There is a rare known failure where a timeout might occur during test execution. Refer to
:ref:`releasenotes_knownissues` for possible workarounds.
Virtualization Architecture
---------------------------
Build
^^^^^
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To build a Virtualization Architecture image:
1. Select ``Safety Island Communication Demo (using HIPC)`` as ``Use-Case``.
2. Select ``Virtualization`` from the ``Reference Software Stack Architecture``
menu.
3. Select ``Build``.
Automated Validation
^^^^^^^^^^^^^^^^^^^^
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To run the validation tests:
1. Select ``Safety Island Communication Demo (using HIPC)`` as ``Use-Case``.
2. Select ``Virtualization`` from the
``Reference Software Stack Architecture`` menu.
3. Select ``Run Automated Validation`` from the ``Runtime Validation Setup``
menu.
4. Select ``Build``.
The complete test suite takes around 90 minutes to complete. See
:ref:`validation_hipc_demo` for more details.
The following messages are expected in the output to validate this Use-Case:
.. code-block:: text
RESULTS - test_30_hipc_virtualization.HIPCTestDomU1.test_hipc_cluster0: PASSED (311.77s)
RESULTS - test_30_hipc_virtualization.HIPCTestDomU1.test_hipc_cluster1: PASSED (389.55s)
RESULTS - test_30_hipc_virtualization.HIPCTestDomU1.test_hipc_cluster2: PASSED (413.83s)
RESULTS - test_30_hipc_virtualization.HIPCTestDomU1.test_hipc_cluster_cl0_cl1: PASSED (114.97s)
RESULTS - test_30_hipc_virtualization.HIPCTestDomU1.test_hipc_cluster_cl0_cl2: PASSED (138.32s)
RESULTS - test_30_hipc_virtualization.HIPCTestDomU1.test_hipc_cluster_cl1_cl2: PASSED (182.33s)
RESULTS - test_30_hipc_virtualization.HIPCTestDomU1.test_ping_cl0_cl1: PASSED (60.64s)
RESULTS - test_30_hipc_virtualization.HIPCTestDomU1.test_ping_cl0_cl2: PASSED (61.63s)
RESULTS - test_30_hipc_virtualization.HIPCTestDomU1.test_ping_cl1_cl2: PASSED (61.06s)
RESULTS - test_30_hipc_virtualization.HIPCTestDomU1.test_ping_cluster0: PASSED (153.76s)
RESULTS - test_30_hipc_virtualization.HIPCTestDomU1.test_ping_cluster1: PASSED (154.39s)
RESULTS - test_30_hipc_virtualization.HIPCTestDomU1.test_ping_cluster2: PASSED (153.34s)
RESULTS - test_30_hipc_virtualization.HIPCTestDomU2.test_hipc_cluster1: PASSED (365.17s)
RESULTS - test_30_hipc_virtualization.HIPCTestDomU2.test_ping_cluster1: PASSED (152.43s)
RESULTS - test_30_ptp.PTPTest.test_ptp_linux_services: PASSED (7.17s)
RESULTS - test_30_ptp.PTPTest.test_ptp_si_clients: PASSED (47.37s)
RESULTS - test_30_ptp.PTPTestDomU1.test_ptp_domu_client: PASSED (50.57s)
RESULTS - test_30_ptp.PTPTestDomU1.test_ptp_linux_services: PASSED (1.38s)
RESULTS - test_30_ptp.PTPTestDomU2.test_ptp_domu_client: PASSED (50.31s)
RESULTS - test_30_ptp.PTPTestDomU2.test_ptp_linux_services: PASSED (1.48s)
.. note::
There is a rare known failure where a timeout might occur during test execution. Refer to
:ref:`releasenotes_knownissues` for possible workarounds.
.. _user_guide_reproduce_parsec_tls:
Parsec-enabled TLS Demo
=======================
The demo can be run on the Baremetal Architecture. It consists of a TLS server
and a TLS client. Refer to :ref:`design_applications_parsec_enabled_tls`
for more information on this application. This demo is included as part of the
``Safety Island Actuation Demo``.
Baremetal Architecture
----------------------
Build
^^^^^
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To build a Baremetal Architecture image:
1. Select ``Safety Island Actuation Demo`` from the ``Use-Case`` menu.
2. Select ``Baremetal`` from the ``Reference Software Stack Architecture`` menu.
3. Select ``Build``.
Run the FVP
^^^^^^^^^^^
To start the FVP and connect to the Primary Compute terminal (running Linux):
.. code-block:: text
kas shell -c "../layers/meta-arm/scripts/runfvp -t tmux --verbose"
The user should wait for the system to boot and for the Linux prompt to appear.
The Reference Software Stack running on the Primary Compute can be logged into
as ``root`` user without a password in the Linux terminal. Run the below
command to guarantee that all the expected services have been
initialized.
.. code-block:: text
systemctl is-system-running --wait
Wait for it to return. The expected terminal output is ``running``.
Run the Demo
^^^^^^^^^^^^
The demo consists of a TLS server and a TLS client. Refer to
:ref:`design_applications_parsec_enabled_tls` for more information on
this application.
1. Run ``ssl_server`` from the Primary Compute terminal in the background and
press the ``Enter`` key to continue:
.. code-block:: text
ssl_server &
A message similar to the following should appear:
.. code-block:: text
. Seeding the random number generator... ok
. Loading the server cert. and key... ok
. Bind on https://localhost:4433/ ... ok
. Setting up the SSL data.... ok
. Waiting for a remote connection ...
The TLS client can take an optional parameter as the TLS server IP address.
The default value of the parameter is ``localhost``.
2. Run ``ssl_client1`` from the Primary Compute terminal in a container:
.. code-block:: text
docker run --rm -v /run/parsec/parsec.sock:/run/parsec/parsec.sock -v /usr/bin/ssl_client1:/usr/bin/ssl_client1 --network host docker.io/library/ubuntu:22.04 ssl_client1
After a few seconds, a message similar to the following should appear:
.. code-block:: text
. Seeding the random number generator... ok
. Loading the CA root certificate ... ok (0 skipped)
. Connecting to tcp/localhost/4433... ok
. Setting up the SSL/TLS structure... ok
. Performing the SSL/TLS handshake... ok
. Verifying peer X.509 certificate... ok
> Write to server: 18 bytes written
GET / HTTP/1.0
< Read from server: 156 bytes read
HTTP/1.0 200 OK
Content-Type: text/html
mbed TLS Test Server
Successful connection using: TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256
3. Stop the TLS server and synchronize the container image to the
persistent storage:
.. code-block:: text
pkill ssl_server
sync
4. To shut down the FVP and terminate the emulation automatically, issue the
following command on the Primary Compute terminal.
.. code-block:: text
shutdown now
The below messages indicate the shutdown process is complete.
.. code-block:: text
[ OK ] Finished System Power Off.
[ OK ] Reached target System Power Off.
reboot: Power down
Automated Validation
^^^^^^^^^^^^^^^^^^^^
For more details about the validation of Parsec demo, refer to
:ref:`validation_parsec_enabled_tls_demo`.
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To run the validation tests:
1. Select ``Safety Island Actuation Demo`` as ``Use-Case``.
2. Select ``Baremetal`` from the ``Reference Software Stack Architecture``
menu.
3. Select ``Run Automated Validation`` from the ``Runtime Validation Setup``
menu.
4. Select ``Build``.
The complete test suite takes around 45 minutes to complete. See
:ref:`validation_parsec_enabled_tls_demo` for more details.
The following messages are expected in the output to validate this Use-Case:
.. code-block:: text
RESULTS - test_40_parsec.ParsecTest.test_parsec_demo: PASSED (479.25s)
.. note::
There is a rare known failure where a timeout might occur during test execution. Refer to
:ref:`releasenotes_knownissues` for possible workarounds.
.. _user_guide_reproduce_pc_psa_ps_crypto_api_test:
Primary Compute PSA Protected Storage and Crypto APIs Architecture Test Suite
=============================================================================
The demo can be run on the Baremetal Architecture. Refer to
:ref:`design_primary_compute_secure_services` for more information on this
application. This demo is included as part of the ``Critical Application
Monitoring Demo``.
Baremetal Architecture
----------------------
Build
^^^^^
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To build a Baremetal Architecture image:
1. Select ``Critical Application Monitoring Demo`` from the ``Use-Case`` menu.
2. Select ``Baremetal`` from the ``Reference Stack Architecture`` menu.
3. Select ``Build``.
Run the FVP
^^^^^^^^^^^
To start the FVP and connect to the Primary Compute terminal (running Linux):
.. code-block:: text
kas shell -c "../layers/meta-arm/scripts/runfvp -t tmux --verbose"
The user should wait for the system to boot and for the Linux prompt to appear.
The Reference Software Stack running on the Primary Compute can be logged into
as ``root`` user without a password in the Linux terminal. Run the below
command to guarantee that all the expected services have been
initialized.
.. code-block:: text
systemctl is-system-running --wait
Wait for it to return. The expected terminal output is ``running``.
Run the Demo
^^^^^^^^^^^^
The demo consists of simple tests run from the Linux terminal. Refer to
:ref:`design_primary_compute_secure_services` for more information on
this application.
1. Run the PSA Crypto API tests from the Primary Compute terminal using the
following command:
.. code-block:: text
psa-crypto-api-test
A message similar to the following should appear once the tests have
completed:
.. code-block:: text
************ Crypto Suite Report **********
TOTAL TESTS : 59
TOTAL PASSED : 59
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
2. Run the PSA Protected Storage API tests from the Primary Compute terminal
using the following command:
.. code-block:: text
psa-ps-api-test
A message similar to the following should appear once the tests have
completed:
.. code-block:: text
************ Storage Suite Report **********
TOTAL TESTS : 17
TOTAL PASSED : 11
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 6
******************************************
3. To shut down the FVP and terminate the emulation automatically, issue the
following command on the Primary Compute terminal.
.. code-block:: text
shutdown now
The below messages indicate the shutdown process is complete.
.. code-block:: text
[ OK ] Finished System Power Off.
[ OK ] Reached target System Power Off.
reboot: Power down
Automated Validation
^^^^^^^^^^^^^^^^^^^^
For more details about the validation of PSA Architecture Test Suite, refer to
:ref:`validation_trusted_services_tests`.
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To run the validation tests:
1. Select ``Critical Application Monitoring Demo`` as ``Use-Case``.
2. Select ``Baremetal`` from the ``Reference Stack Architecture`` menu.
3. Select ``Run Automated Validation`` from the ``Runtime Validation Setup``
menu.
4. Select ``Build``.
The complete test suite takes around 40 minutes to complete. See
:ref:`validation_trusted_services_tests` for more details.
The following messages are expected in the output to validate this Use-Case:
.. code-block:: text
RESULTS - test_50_trusted_services.KronosTrustedServices.test_03_psa_crypto_api_test: PASSED (298.70s)
RESULTS - test_50_trusted_services.KronosTrustedServices.test_05_psa_ps_api_test: PASSED (68.88s)
.. note::
There is a rare known failure where a timeout might occur during test execution. Refer to
:ref:`releasenotes_knownissues` for possible workarounds.
.. _user_guide_reproduce_si_psa_ps_api_test:
Safety Island PSA Secure Storage APIs Architecture Test Suite
=============================================================
The demo can be run on the Baremetal Architecture.
See :ref:`design_applications_psa_arch_tests` for further details.
Baremetal Architecture
----------------------
Build
^^^^^
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To build a Baremetal Architecture image:
1. Select ``Safety Island PSA Secure Storage APIs Architecture Test Suite``
from the ``Use-Case`` menu.
2. Select ``Build``.
Run the FVP
^^^^^^^^^^^
To start the FVP:
.. code-block:: text
kas shell -c "../layers/meta-arm/scripts/runfvp -t tmux --verbose"
The Safety Island Cluster 2 terminal running the ``PSA Secure Storage APIs
Architecture Test Suite`` is available via the tmux window titled
``terminal_uart_si_cluster2``.
The Safety Island Cluster 2 tmux window can be accessed by typing ``Ctrl-b w``,
using the arrow keys to select ``terminal_uart_si_cluster2`` then pressing the
``Enter`` key.
Run the Demo
^^^^^^^^^^^^
The tests will automatically run. A log similar to the following should be
visible; it is normal for some tests to be skipped but there should be no
failed tests:
.. code-block:: text
***** PSA Architecture Test Suite - Version 1.4 *****
Running.. Storage Suite
******************************************
TEST: 401 | DESCRIPTION: UID not found check | UT: STORAGE
[Info] Executing tests from non-secure
[Info] Executing ITS Tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
[Info] Executing PS Tests
[Check 1] Call get API for UID 6 which is not set
[Check 2] Call get_info API for UID 6 which is not set
[Check 3] Call remove API for UID 6 which is not set
[Check 4] Call get API for UID 6 which is removed
[Check 5] Call get_info API for UID 6 which is removed
[Check 6] Call remove API for UID 6 which is removed
Set storage for UID 6
[Check 7] Call get API for different UID 5
[Check 8] Call get_info API for different UID 5
[Check 9] Call remove API for different UID 5
TEST RESULT: PASSED
******************************************
************ Storage Suite Report **********
TOTAL TESTS : 17
TOTAL PASSED : 11
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 6
******************************************
To shut down the FVP and terminate the emulation, select the terminal titled as
``python3`` where the ``runfvp`` was launched by pressing ``Ctrl-b 0`` and press
``Ctrl-c`` to stop the FVP process.
Automated Validation
^^^^^^^^^^^^^^^^^^^^
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To run the validation tests:
1. Select ``Safety Island PSA Secure Storage APIs Architecture Test Suite``
from the ``Use-Case`` menu.
2. Select ``Run Automated Validation`` from the ``Runtime Validation Setup``
menu.
3. Select ``Build``.
The complete test suite takes around 15 minutes to complete. See
:ref:`validation_si_psa_arch_tests` for more details.
The following message is expected in the output to validate this Use-Case:
.. code-block:: text
RESULTS - test_10_si_psa_arch_tests.SIPSAArchTests.test_psa_si_cluster2: PASSED (0.00s)
.. note::
There is a rare known failure where a timeout might occur during test execution. Refer to
:ref:`releasenotes_knownissues` for possible workarounds.
.. _user_guide_reproduce_si_psa_crypto_api_test:
Safety Island PSA Crypto APIs Architecture Test Suite
=====================================================
The demo can be run on the Baremetal Architecture.
See :ref:`design_applications_psa_arch_tests` for further details.
Baremetal Architecture
----------------------
Build
^^^^^
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To build a Baremetal Architecture image:
1. Select ``Safety Island PSA Crypto APIs Architecture Test Suite``
from the ``Use-Case`` menu.
2. Select ``Build``.
Run the FVP
^^^^^^^^^^^
To start the FVP:
.. code-block:: text
kas shell -c "../layers/meta-arm/scripts/runfvp -t tmux --verbose"
The ``PSA Crypto APIs Architecture Test Suite`` is deployed on all the 3 Safety
Island (SI) Clusters. The test results can be seen on the following tmux
windows:
* ``terminal_uart_si_cluster0``
* ``terminal_uart_si_cluster1``
* ``terminal_uart_si_cluster2``
The user can navigate through the windows mentioned above by pressing
``Ctrl-b w`` and arrow keys followed by the ``Enter`` key.
Run the tests
^^^^^^^^^^^^^
The tests will automatically run after the FVP is started. The complete test
suite takes around 5 minutes to complete.
When the tests finish, a log similar to the following should be visible.
Normally no failure should be seen::
************ Crypto Suite Report **********
TOTAL TESTS : 61
TOTAL PASSED : 61
TOTAL SIM ERROR : 0
TOTAL FAILED : 0
TOTAL SKIPPED : 0
******************************************
To shut down the FVP and terminate the emulation, select the terminal titled as
``python3`` where the ``runfvp`` was launched by pressing ``Ctrl-b 0`` and press
``Ctrl-c`` to stop the FVP process.
.. note::
This use-case does not require waiting for the Primary Compute to boot.
Automated Validation
^^^^^^^^^^^^^^^^^^^^
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To run the validation tests:
1. Select ``Safety Island PSA Crypto APIs Architecture Test Suite`` from the
``Use-Case`` menu.
2. Select ``Run Automated Validation`` from the ``Runtime Validation Setup``
menu.
3. Select ``Build``.
The complete test suite takes around 35 minutes to complete. See
:ref:`validation_si_psa_arch_tests` for more details.
The following messages are expected in the output to validate this Use-Case:
.. code-block:: text
RESULTS - test_10_si_psa_arch_tests.SIPSAArchTests.test_psa_si_cluster0: PASSED (0.01s)
RESULTS - test_10_si_psa_arch_tests.SIPSAArchTests.test_psa_si_cluster1: PASSED (0.01s)
RESULTS - test_10_si_psa_arch_tests.SIPSAArchTests.test_psa_si_cluster2: PASSED (0.01s)
.. note::
There is a rare known failure where a timeout might occur during test execution. Refer to
:ref:`releasenotes_knownissues` for possible workarounds.
.. _user_guide_reproduce_fault_management:
Fault Management Demo
=====================
The demo uses the Safety Island Cluster 1 console and it can be run on the
Baremetal Architecture of the Safety Island Actuation Demo. Refer to
:ref:`design_applications_fault_mgmt` for further details.
Baremetal Architecture
----------------------
Build
^^^^^
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To build the Baremetal Architecture image:
1. Select ``Safety Island Actuation Demo`` from the ``Use-Case`` menu.
2. Select ``Baremetal`` from the ``Reference Software Stack Architecture`` menu.
3. Select ``Build``.
Run the FVP
^^^^^^^^^^^
To start the FVP:
.. code-block:: text
kas shell -c "../layers/meta-arm/scripts/runfvp -t tmux --verbose"
The Fault Management subsystem is deployed on Safety Island Cluster 1 so the
instructions below should be executed on its terminal.
The Safety Island Cluster 1 tmux window can be accessed by typing ``Ctrl-b w``,
using the arrow keys to select ``terminal_uart_si_cluster1`` then pressing the
``Enter`` key.
Run the Demo
^^^^^^^^^^^^
The instructions below demonstrate injecting faults into both the System FMU
and GIC-720AE FMU and how this affects the SSU safety state.
1. Start by enumerating the configured fault device tree:
.. code-block:: text
fault tree
The output shows the root fault device ``fmu@2a510000`` (the System FMU),
after which are the attached safety state device ``ssu@2a500000`` and
fault device ``fmu@2a570000`` (the GIC-720AE FMU):
.. code-block:: text
Root 0: fmu@2a510000
Safety: ssu@2a500000
Slot 0: fmu@2a570000
2. After booting, query the initial state of the SSU:
.. code-block:: text
fault safety_status ssu@2a500000
The initial state is TEST:
.. code-block:: text
Status: TEST (0x0)
3. It is expected that a Fault Management deployment would perform a self-test
after boot then signal its outcome to the SSU. For demonstration purposes,
simulate a successful self-test completion by issuing the
``compl_ok`` signal to the SSU:
.. code-block:: text
fault safety_control ssu@2a500000 compl_ok
The system is now ``SAFE`` for operation:
.. code-block:: text
Signal: compl_ok (0x0)
State: SAFE (0x3)
4. Simulate an internal *Lockstep error* (``0x4``) in the System FMU:
.. code-block:: text
fault inject fmu@2a510000 0x4
Three events are logged:
* The subsystem reports that it received the fault and that it was
non-critical (all System FMU internal faults are non-critical).
* The safety component reports that this caused the SSU to enter the
``ERRN`` state.
* The storage component reports that the total historical fault count for
this fault on this device is now ``1``.
.. code-block:: text
Injecting fault 0x4 to device fmu@2a510000
[00:04:49.110,000] fault_mgmt: Fault received (non-critical): 0x4 on fmu@2a510000
[00:04:49.110,000] fault_mgmt_safety: Safety status: ERRN (0x5) on ssu@2a500000
[00:04:49.160,000] fault_mgmt_protected_storage: Fault count for 0x4 on fmu@2a510000: 1
5. The SSU will remain in the ``ERRN`` state until signaled (unless a critical
fault occurs). Send a ``compl_ok`` signal again to recover from this fault:
.. code-block:: text
fault safety_control ssu@2a500000 compl_ok
The SSU is now in the ``SAFE`` state again:
.. code-block:: text
Signal: compl_ok (0x0)
State: SAFE (0x3)
6. Next, inject an *SPI collator external error* (``0x20000a00``) into the
GIC-720AE FMU:
.. code-block:: text
fault inject fmu@2a570000 0x20000a00
This results in a similar output to above, except that the received fault
was critical and the safety status is now ``ERRC``. (GIC-720AE FMU faults
are critical by default, but this can be changed from the shell using the
``fault set_critical`` sub-command).
.. code-block:: text
Injecting fault 0x20000a00 to device fmu@2a570000
[00:09:13.210,000] fault_mgmt: Fault received (critical): 0x20000a00 on fmu@2a570000
[00:09:13.210,000] fault_mgmt_safety: Safety status: ERRC (0x6) on ssu@2a500000
[00:09:13.270,000] fault_mgmt_protected_storage: Fault count for 0x20000a00 on fmu@2a570000: 1
7. The number of occurrences of each fault is tracked per device by the
storage component. Inject another *Lockstep error* into the System FMU:
.. code-block:: text
fault inject fmu@2a510000 0x4
The fault count is now ``2``. Note that the safety status is still
``ERRC``.
.. code-block:: text
Injecting fault 0x4 to device fmu@2a510000
[00:14:02.800,000] fault_mgmt: Fault received (non-critical): 0x4 on fmu@2a510000
[00:14:02.800,000] fault_mgmt_safety: Safety status: ERRC (0x6) on ssu@2a500000
[00:14:02.860,000] fault_mgmt_protected_storage: Fault count for 0x4 on fmu@2a510000: 2
The full list of stored faults can also be queried:
.. code-block:: text
fault list
This shows all the faults injected into both FMUs above:
.. code-block:: text
Fault history:
Fault received (non-critical): 0x4 on fmu@2a510000 : count 2
Fault received (critical): 0x20000a00 on fmu@2a570000 : count 1
8. The ``ERRC`` represents a critical system failure and cannot be recovered
by the software - confirm this by trying to issue ``compl_ok`` again:
.. code-block:: text
fault safety_control ssu@2a500000 compl_ok
The SSU status is still ``ERRC``:
.. code-block:: text
Signal: compl_ok (0x0)
State: ERRC (0x6)
The state can now only be affected through a full system reset (e.g. by
stopping and starting the FVP), after which the state will be ``TEST``
once again.
9. To shut down the FVP and terminate the emulation, select the terminal titled
as ``python3`` where the ``runfvp`` was launched by pressing ``Ctrl-b 0``
and press ``Ctrl-c`` to stop the FVP process.
See the :ref:`design_applications_fault_mgmt_shell_reference` for more details
about these and other Fault Management shell sub-commands.
Automated Validation
^^^^^^^^^^^^^^^^^^^^
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To run the validation tests:
1. Select ``Safety Island Actuation Demo`` as ``Use-Case``.
2. Select ``Baremetal`` from the ``Reference Software Stack Architecture``
menu.
3. Select ``Run Automated Validation`` from the ``Runtime Validation Setup``
menu.
4. Select ``Build``.
The complete test suite takes around 45 minutes to complete. See
:ref:`validation_fault_management` for more details.
The following messages are expected in the output to validate this Use-Case:
.. code-block:: text
RESULTS - test_10_fault_mgmt.FaultMgmtSSUTest.test_ssu_ce_not_ok: PASSED (38.18s)
RESULTS - test_10_fault_mgmt.FaultMgmtSSUTest.test_ssu_compl_ok: PASSED (30.66s)
RESULTS - test_10_fault_mgmt.FaultMgmtSSUTest.test_ssu_nce_ok: PASSED (29.24s)
RESULTS - test_10_fault_mgmt.FaultMgmtTest.test_fmu_fault_clear: PASSED (11.24s)
RESULTS - test_10_fault_mgmt.FaultMgmtTest.test_fmu_fault_count: PASSED (6.04s)
RESULTS - test_10_fault_mgmt.FaultMgmtTest.test_fmu_fault_list: PASSED (36.22s)
RESULTS - test_10_fault_mgmt.FaultMgmtTest.test_fmu_fault_summary: PASSED (22.64s)
RESULTS - test_10_fault_mgmt.FaultMgmtTest.test_gic_fmu_inject: PASSED (18.69s)
RESULTS - test_10_fault_mgmt.FaultMgmtTest.test_system_fmu_internal_inject: PASSED (8.77s)
RESULTS - test_10_fault_mgmt.FaultMgmtTest.test_system_fmu_internal_set_enabled: PASSED (11.09s)
RESULTS - test_10_fault_mgmt.FaultMgmtTest.test_tree: PASSED (0.71s)
.. note::
There is a rare known failure where a timeout might occur during test execution. Refer to
:ref:`releasenotes_knownissues` for possible workarounds.
.. _user_guide_reproduce_arm_systemready_ir_validation:
Arm SystemReady IR Validation
=============================
Arm SystemReady IR Firmware Build
---------------------------------
The Arm SystemReady IR Firmware Build option just builds the
Arm SystemReady IR-aligned firmware. Refer to :ref:`design_systemready_ir`
for more details.
.. image:: ../images/kronos_reference_stack_build_config_sr_ir.*
:align: center
:width: 60 %
:alt: Kronos Reference Software Stack Build Configuration Menu - Arm SystemReady IR Firmware Build
|
Build
^^^^^
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To build the Arm SystemReady IR-aligned firmware image:
1. Select ``Arm SystemReady IR Firmware Build`` under
``Arm SystemReady IR Validation`` from the ``Use-Case`` menu.
2. Select ``Build``.
The firmware images listed below can be found in the directory
``build/tmp_systemready-glibc/deploy/images/fvp-rd-kronos/``.
* ``ap-flash-image-fvp-rd-kronos.wic``
* ``encrypted_cm_provisioning_bundle_0.bin``
* ``encrypted_dm_provisioning_bundle.bin``
* ``rss-flash-image-fvp-rd-kronos.wic``
* ``rss-nvm-image.bin``
* ``rss-rom-image-fvp-rd-kronos.wic.nopt``
.. _user_guide_reproduce_sr_ir_acs:
Arm SystemReady IR Architecture Compliance Suite (ACS) Tests
------------------------------------------------------------
The ACS for the Arm SystemReady IR certification is delivered through a
live OS image, which enables the basic automation to run the tests.
The system will boot with the ACS live OS image and the ACS tests will run
automatically after the system boots. See :ref:`systemready_ir_acs_tests` for
more details.
Build and Automated Validation
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To build and run the Arm SystemReady IR ACS tests:
1. Select ``Arm SystemReady IR Architecture Compliance Suite (ACS) Tests`` under
``Arm SystemReady IR Validation`` from the ``Use-Case`` menu.
2. Select ``Build``.
A similar output to the following is printed out:
.. code-block:: text
NOTE: recipe arm-systemready-ir-acs-2.1.0-r0: task do_testimage: Started
Creating terminal default on terminal_ns_uart0
Creating terminal tf-a on terminal_sec_uart
Creating terminal scp on terminal_uart_scp
Creating terminal lcp on terminal_uart_lcp
Creating terminal rss on terminal_rss_uart
Creating terminal safety_island_c0 on terminal_uart_si_cluster0
Creating terminal safety_island_c1 on terminal_uart_si_cluster1
Creating terminal safety_island_c2 on terminal_uart_si_cluster2
Test Group (PlatformSpecificElements): FAILED
Test Group (RequiredElements): FAILED
Test Group (CheckEvent_Conf): PASSED
Test Group (CheckEvent_Func): PASSED
Test Group (CloseEvent_Func): PASSED
Test Group (CreateEventEx_Conf): PASSED
Test Group (CreateEventEx_Func): PASSED
Test Group (CreateEvent_Conf): PASSED
Test Group (CreateEvent_Func): PASSED
Test Group (RaiseTPL_Func): PASSED
Test Group (RestoreTPL_Func): PASSED
Test Group (SetTimer_Conf): PASSED
Test Group (SetTimer_Func): PASSED
Test Group (SignalEvent_Func): PASSED
Test Group (WaitForEvent_Conf): PASSED
Test Group (WaitForEvent_Func): PASSED
Test Group (AllocatePages_Conf): PASSED
Test Group (AllocatePages_Func): PASSED
Test Group (AllocatePool_Conf): PASSED
Test Group (AllocatePool_Func): PASSED
Test Group (FreePages_Conf): PASSED
Test Group (FreePages_Func): PASSED
Test Group (GetMemoryMap_Conf): PASSED
Test Group (GetMemoryMap_Func): PASSED
...
...
Test Group (virtio_blk virtio1): vda
Test Group (Supported ports):
Linux tests complete
RESULTS:
RESULTS - arm_systemready_ir_acs.SystemReadyACSTest.test_acs: PASSED (32417.37s)
SUMMARY:
arm-systemready-ir-acs () - Ran 1 test in 32417.375s
arm-systemready-ir-acs - OK - All required tests passed (successes=1, skipped=0, failures=0, errors=0)
As seen in the above logs, some Test Groups are expected to fail. The following
messages are expected to validate this Use-Case:
.. code-block:: text
RESULTS - arm_systemready_ir_acs.SystemReadyACSTest.test_acs: PASSED (32417.37s)
.. note::
Running the ACS tests more than once will have them resume from where they
last stopped. Additionally, consecutive runs are not supported by the ACS
logs; it will result in a failure after the end of the tests. Use the
following to re-start the entire test suite properly:
.. code-block:: text
kas shell -c "bitbake arm-systemready-ir-acs -C unpack"
.. note::
The ACS tests take hours to complete. The actual time taken will vary
depending on the performance of the build host. The default timeout setting
for the tests is 12 hours for an x86_64 host or 24 hours for an aarch64 host.
If a timeout failure occurs, increase the timeout setting and re-run
the tests with the following command on the build host terminal. The example
command below changes the timeout setting to 16 hours.
.. code-block:: text
TEST_OVERALL_TIMEOUT="\${@16*60*60}" kas shell -c "bitbake arm-systemready-ir-acs -C unpack"
.. note::
There is a rare known failure where a timeout might occur during test execution. Refer to
:ref:`releasenotes_knownissues` for possible workarounds.
Refer to :ref:`systemready_ir_acs_tests` for an explanation on how the
ACS tests are set up and how they work in the Reference Software Stack.
.. _user_guide_reproduce_arm_systemready_ir_linux:
Linux Distribution Installation (Debian and openSUSE)
=====================================================
The Arm SystemReady IR-aligned firmware must boot at least two unmodified
generic UEFI distribution images from an ISO image.
This Software Stack currently supports two Linux distributions: `Debian Stable`_
and `openSUSE Leap`_.
.. note::
The installation of a Linux distribution requires some manual interaction, for
example, some necessary selections or confirmations, entering the user and
password, etc.
The whole installation process takes a long time (possibly up to 10 hours, or
even longer).
We suggest that when running the Linux distribution installations the FVP is
the only running process as it will consume large amounts of RAM that can make
the system unstable.
Refer to :ref:`systemready_ir_linux_install` for an explanation on how
the Linux distros installation is set up and how they work in the Reference
Software Stack.
Debian
------
To install Debian, you can refer to the `Debian GNU/Linux Installation Guide`_.
Distro Installation Media Preparation
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To build the Arm SystemReady IR Linux distros installation tests:
1. Select ``Debian Linux Distro Installation`` under
``Linux Distribution Installation (Debian and openSUSE)`` from the
``Use-Case`` menu.
2. Select ``Build``.
.. image:: ../images/kronos_reference_stack_build_config_sr_distro_debian.*
:align: center
:width: 60 %
:alt: Kronos Reference Software Stack Build Configuration Menu - Debian Linux Distro Installation
|
Distro Installation
^^^^^^^^^^^^^^^^^^^
Run the following command to start the installation:
.. code-block:: text
kas shell -c "../layers/meta-arm/scripts/runfvp -t tmux --verbose"
The whole process of installing Debian will probably take about 5 hours. The
install process begins when you see the following:
.. image:: ../images/sr-ir-linux-distro-debian-install-grub-4.*
:align: center
:width: 60 %
:alt: Grub Install Options Menu - Debian Linux Distro Installation
Select ``Install`` to start the installation process.
The following are problems that have been encountered during the Debian
installation process and how to solve them:
* Detect and mount installation media
1. After the installer starts, a tab titled
``Detect and mount installation media`` will appear with
``No device for installation media was detected.``
When prompted with ``Load drivers from removable media?``
select ``No`` to continue.
2. For ``Manually select a module and device for installation media?`` select
``Yes``.
3. For ``Module needed for accessing the installation media:`` select
``none``.
4. For ``Device file for accessing the installation media:`` input
``/dev/mmcblk0`` as the device file for accessing the installation media,
then select ``Continue``.
.. image:: ../images/sr-ir-linux-distro-debian-install-media.*
:align: center
:width: 60 %
:alt: Detect and Mount Installation Media Device File - Debian Linux Distro Installation
|
* Install the GRUB boot loader
When the installation reaches the ``Install the GRUB boot loader`` phase,
there will be an error ``Unable to install GRUB in dummy``.
This is because on an EBBR platform, UEFI ``SetVariable()`` is not required at
runtime (however, it is required at boot time).
.. image:: ../images/sr-ir-linux-distro-debian-install-grub-0.*
:align: center
:width: 60 %
:alt: Grub Installation Failure Prompt - Debian Linux Distro Installation
|
One workaround we have is to "execute a shell" when the GRUB install phase
throws the above error. To execute a shell, press ``Ctrl-a n`` to switch the
debug shell, and run the following commands:
.. code-block:: text
chroot /target
update-grub
mkdir /boot/efi/EFI/BOOT
cp -v /boot/efi/EFI/debian/grubaa64.efi /boot/efi/EFI/BOOT/bootaa64.efi
A snapshot is as below:
.. image:: ../images/sr-ir-linux-distro-debian-install-grub-1.*
:align: center
:width: 60 %
:alt: Grub Workaround Console Output - Debian Linux Distro Installation
|
After doing the above GRUB workaround, press ``Ctrl-a p`` to go back to the
installer again. Select ``Continue`` on the GRUB failure screen.
.. image:: ../images/sr-ir-linux-distro-debian-install-grub-2.*
:align: center
:width: 60 %
:alt: Second Grub Installation Failure Prompt - Debian Linux Distro Installation
|
Select ``Continue without boot loader`` in the ``Debian installer main menu``
and continue.
.. image:: ../images/sr-ir-linux-distro-debian-install-grub-3.*
:align: center
:width: 60 %
:alt: Debian Installer Main Menu - Debian Linux Distro Installation
|
* Log in
When the installation reaches the final ``Finishing the installation``
phase, you will need to wait some time to finish the remaining tasks,
and then it will automatically reboot into the installed OS. You can log into
the Linux shell with the user created during installation.
* Terminate the FVP
To shut down the FVP and terminate the emulation automatically, log into the
Linux shell as the root user then run the following command.
.. code-block:: text
shutdown now
The below message indicates the shutdown process is complete.
.. code-block:: text
reboot: Power down
Subsequently running the FVP will boot into Debian.
openSUSE
--------
To install openSUSE, you can refer to the `openSUSE Installation Guide`_.
Distro Installation Media Preparation
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To build the Arm SystemReady IR Linux distros installation tests:
1. Select ``openSUSE Linux Distro Installation`` under
``Linux Distribution Installation (Debian and openSUSE)`` from the
``Use-Case`` menu.
2. Select ``Build``.
.. image:: ../images/kronos_reference_stack_build_config_sr_distro_opensuse.*
:align: center
:width: 60 %
:alt: Kronos Reference Software Stack Build Configuration Menu - openSUSE Linux Distro Installation
|
Distro Installation
^^^^^^^^^^^^^^^^^^^
Run the following command to start the installation:
.. code-block:: text
kas shell -c "../layers/meta-arm/scripts/runfvp -t tmux --verbose"
The whole process of installing openSUSE will take several hours. The install
process begins when you see the following:
.. image:: ../images/sr-ir-linux-distro-opensuse-install-installation.*
:align: center
:width: 60 %
:alt: Leap Install Options Menu - openSUSE Linux Distro Installation
Select ``Installation`` to start the installation process.
* System Role
When you get to the ``System Role`` screen, select ``Server``, then select
``Next`` to continue with the installation.
.. image:: ../images/sr-ir-linux-distro-opensuse-install-system-role.*
:align: center
:width: 60 %
:alt: System Role Selection Menu - openSUSE Linux Distro Installation
|
.. tip::
Use ``Tab`` to cycle through options on screens during installation.
* Installation process
Once you have selected ``Install`` on the ``Confirm Installation`` screen, the
installation will proceed and it will take several hours. The steps of the
installation process are:
* ``Installing Packages...``
* ``Save configuration``
* ``Save installation settings``
* ``Install boot manager``
* ``Prepare system for initial boot``
* Then the system will reboot automatically in 10s, you can select ``OK`` to
reboot immediately.
* Log in
After the reboot process, log into the Linux shell with the user
created during installation.
* Terminate the FVP
To shut down the FVP and terminate the emulation automatically, run the
following command.
.. code-block:: text
sudo shutdown now
The below message indicates the shutdown process is complete.
.. code-block:: text
reboot: Power down
Subsequently running the FVP will boot into openSUSE.
.. _user_guide_reproduce_secure_firmware_update:
Secure Firmware Update
======================
Currently, :ref:`design_secure_firmware_update` is only available in the
Baremetal Architecture.
Baremetal Architecture
----------------------
Build
^^^^^
The to be updated firmware capsule for testing will be generated together with
the image for the software stack when building. The firmware capsule is placed
on a removable storage device (in the case of Kronos, an MMC card implementation
in the FVP).
Ensure the creation of the initial firmware flash images because previously updated
firmware will lead to failure of the secure firmware update tests.
.. code-block:: text
kas shell -c "bitbake ap-flash-image rss-flash-image -C image"
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To build a Baremetal Architecture image:
1. Select ``Critical Application Monitoring Demo`` from the ``Use-Case`` menu.
2. Select ``Baremetal`` from the ``Reference Software Stack Architecture`` menu.
3. Select ``Build``.
Run the FVP
^^^^^^^^^^^
To start the FVP and connect to the Primary Compute terminal (running Linux):
.. code-block:: text
kas shell -c "../layers/meta-arm/scripts/runfvp -t tmux --verbose"
Note that the main tmux windows involved in the Secure Firmware Update are
``terminal_ns_uart0`` and ``terminal_rss_uart``. For ease of navigation, it is
recommended to join these in a single window with two panes.
Follow the steps below to achieve the same:
1. Ensure that the tmux window titled ``terminal_ns_uart0`` is selected.
If not, press ``Ctrl-b w`` from the tmux session, navigate to the tmux
window titled ``terminal_ns_uart0`` followed by pressing the ``Enter`` key.
2. The user should wait for the U-Boot ``Hit any key to stop autoboot``
to appear.
3. Press any key before the time limit to enter the U-Boot shell.
4. Press ``Ctrl-b :`` and then type ``join-pane -s :terminal_rss_uart -h``
followed by pressing the ``Enter`` key to join the RSS terminal window to
the Primary Compute terminal window.
Refer to the following image of the tmux panes rearrangement. Panes can
be navigated using ``Ctrl-b`` followed by the arrow keys.
.. image:: ../images/kronos_reference_stack_secure_firmware_update.*
:align: center
:alt: Kronos Reference Software Stack Secure Firmware Update FVP Windows
|
Run the Demo
^^^^^^^^^^^^
To start Secure Firmware Update:
1. In the U-Boot shell, run the following commands to start Secure Firmware
Update:
.. note::
Each command should be copied and pasted individually to the U-Boot shell.
.. code-block:: text
fatload mmc 0:1 0xa2000000 fw.cap
efidebug capsule update -v 0xa2000000
2. The system will automatically start upgrading the firmware capsule.
**Note: This time there is no need to press any keys.**
The following logs indicate that the upgrade process has started and is in
progress.
In ``terminal_ns_uart0``:
.. code-block:: text
FF-A driver 1.0
FF-A framework 1.0
FF-A versions are compatible
EFI: MM partition ID 0x8003
EFI: FVP: Capsule shared buffer at 0x81000000 , size 8192 pages
In ``terminal_rss_uart``:
.. code-block:: text
[INF]:[FWU]: get_fwu_agent_state: enter, boot_index = 0
[INF]:[FWU]: get_fwu_agent_state: enter, boot_index = 0
[INF]:[FWU]: FMP image update: image id = 1
[INF]:[FWU]: FMP image update: status = 0, version=7, last_attempt_version=0.
[INF]: [FWU]: Host acknowledged.
[INF]:[FWU]: pack_image_info:207 ImageInfo size = 105, ImageName size = 14, ImageVersionName size = 14
[INF]: [FWU]: Getting image info succeeded.
[INF]:[FWU]: get_fwu_agent_state: enter, boot_index = 0
[INF]:[FWU]: uefi_capsule_retrieve_images: enter, capsule ptr = 0x0x65000000
[INF]:[FWU]: uefi_capsule_retrieve_images: capsule size = 18284656, image count = 1
[INF]:[FWU]: uefi_capsule_retrieve_images: image 0, version = 3
[INF]:[FWU]: uefi_capsule_retrieve_images: image 0 at 0x65000070, size=18284560
[INF]:[FWU]: flash_rss_capsule: enter: image = 0x65000070, size = 16187408, version = 3
[INF]:[FWU]: erase_bank: erasing sectors = 4080, from offset = 16748544
[INF]:[FWU]: flash_rss_capsule: writing capsule to the flash at offset = 16748544...
**Note: This step will take about 10 minutes.**
3. The system will reset after a successful firmware update and boot with the
updated firmware. This can be confirmed by checking the terminal logs; if
there are lines in the log like below, then the upgrade was successful and
the system has successfully rebooted with the updated firmware.
In ``terminal_rss_uart``:
.. code-block:: text
[INF]: [FWU]: Flashing the image succeeded.
[INF]: [FWU]: Performing system reset...
...
...
[INF]:[FWU]: get_fwu_agent_state: enter, boot_index = 1
4. The system will eventually boot into Linux using the upgraded firmware.
5. To shut down the FVP and terminate the emulation, select the terminal titled
as ``python3`` where the ``runfvp`` was launched by pressing ``Ctrl-b 0``
and press ``Ctrl-c`` to stop the FVP process.
Automated Validation
^^^^^^^^^^^^^^^^^^^^
Ensure the creation of the initial firmware flash images because previously updated
firmware will lead to failure of the tests.
.. code-block:: text
kas shell -c "bitbake ap-flash-image rss-flash-image -C image"
To run the configuration menu:
.. code-block:: text
kas menu kronos/Kconfig
To run the validation tests:
1. Select ``Critical Application Monitoring Demo`` as ``Use-Case``.
2. Select ``Baremetal`` from the ``Reference Software Stack Architecture``
menu.
3. Select ``Run Automated Validation`` from the ``Runtime Validation Setup``
menu.
4. Select ``Build``.
The following messages are expected in the output to validate this Use-Case:
.. code-block:: text
RESULTS - test_00_fwu.SecureFirmwareUpdateTest.test_securefirmwareupdate: PASSED (414.85s)
.. note::
There is a rare known failure where a timeout might occur during test execution. Refer to
:ref:`releasenotes_knownissues` for possible workarounds.
See :ref:`validation_secure_firmware_update` for more details.