Skip to content

Latest commit

 

History

History
 
 

ES

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 

SystemReady ES ACS

Introduction to SystemReady ES

SystemReady Embedded Server (ES) is a band of system certification in the Arm SystemReady program that ensures interoperability with standard operating systems and hypervisors.

SystemReady ES-certified platforms implement a minimum set of hardware and firmware features that an operating system can depend on to deploy the operating system image. Compliant systems must conform to the:

This section contains the build scripts and the live-images for the SystemReady ES Band.

Release details

  • Code Quality: v1.3.0
  • The latest pre-built release of ACS is available for download here: v23.09_1.3.0
  • The BSA tests are written for version 1.0 of the BSA specification.
  • The BBR tests are written for the SBBR section in version 1.0 of the BBR specification.
  • The compliance suite is not a substitute for design verification.
  • To review the ACS logs, Arm licensees can contact Arm directly through their partner managers.

Steps to build SystemReady ES ACS live image

Code download

  • To build a release version of the code, checkout the main branch with the appropriate release tag.
  • To build the latest version of the code with bug fixes and new features, use the main branch.

ACS build steps

Prebuilt images

  • Prebuilt images for each release are available in the prebuilt_images folder. You can either choose to use these images or build your own image by following the build steps.
  • To access the prebuilt_images, click : prebuilt_images
  • The prebuilt images are archived after compression to the .xz format. On Linux, use the xz utility to uncompress the image xz -d es_acs_live_image.img.xz. On Windows, use the 7zip or a similar utility.
  • If you choose to use the prebuilt image, skip the build steps, and navigate to the "Verification" section below.

Note: The latest pre-built image contains Linux kernel version 6.0. To build a image with a different Linux kernel version, update the LINUX_KERNEL_VERSION in the configuration file <path to arm-systemready>/common/config/common_config.cfg before the build (after step 3 below). To see the list of kernel versions for which Linux BSA patches are available, see the folder

Prerequisites

Before starting the ACS build, ensure that the following requirements are met:

  • Ubuntu 18.04 or later LTS with at least 32GB of free disk space.
  • Use bash shell.
  • You must have sudo privilege to install tools required for build.
  • Install git using sudo apt install git
  • git config --global user.name "Your Name" and git config --global user.email "Your Email" must be configured.

Steps to build SystemReady ES ACS live image

  1. Clone the arm-systemready repository
    git clone https://github.com/ARM-software/arm-systemready.git

  2. Navigate to the ES/scripts directory
    cd arm-systemready/ES/scripts

  3. Run get_source.sh to download all related sources and tools for the build. Provide the sudo permission when prompted
    ./build-scripts/get_source.sh

  4. To start the build of the ES ACS live image, execute the below step
    ./build-scripts/build-es-live-image.sh

  5. If all the above steps are successful, then the bootable image will be available at /path-to-arm-systemready/ES/scripts/output/es_acs_live_image.img.xz

Note: The image is generated in a compressed (.xz) format. The image must be uncompressed before it is used.

Build output

This image comprises of single FAT file system partition recognized by UEFI:

  • 'boot'
    Approximate size: 640 MB
    contains bootable applications and test suites.
    contains a 'acs_results' directory which stores logs of the automated execution of ACS.

Verification

Note: UEFI EDK2 setting for "Console Preference": The default is "Graphical". When that is selected, Linux output will go only to the graphical console (HDMI monitor). To force serial console output, you may change the "Console Preference" to "Serial".

Verification of the ES image on the Arm Neoverse N2 reference design (RD-N2)

Prerequisites

  • If the system supports LPIs (Interrupt ID > 8192) then Firmware should support installation of handler for LPI interrupts.
    • If you are using edk2, change the ArmGic driver in the ArmPkg to support installation of handler for LPIs.
    • Add the following in <path to RDN2 software stack>/uefi/edk2/ArmPkg/Drivers/ArmGic/GicV3/ArmGicV3Dxe.c
   - After [#define ARM_GIC_DEFAULT_PRIORITY  0x80]
     +#define ARM_GIC_MAX_NUM_INTERRUPT 16384
   - Change this in GicV3DxeInitialize function.
     -mGicNumInterrupts      = ArmGicGetMaxNumInterrupts (mGicDistributorBase);
     +mGicNumInterrupts      = ARM_GIC_MAX_NUM_INTERRUPT;

Follow the steps mentioned in RD-N2 platform software user guide to obtain RD-N2 FVP.

For software stack build instructions follow Busybox Boot link under Supported Features by RD-N2 platform software stack section in the same guide.

Note: RD-N2 should be built with the GIC Changes mentioned in Prerequisites.
Note: sudo permission will be required by building software stack.

Verifying the ACS-ES pre-built image

  1. Set the environment variable 'MODEL'
export MODEL=<absolute path to the RD-N2 FVP binary/FVP_RD_N2>
  1. Launch the RD-N2 FVP with the pre-built image with the below command
cd /path to RD-N2_FVP platform software/model-scripts/rdinfra/platforms/rdn2
./run_model.sh -v /path-to-es-acs-live-image/es_acs_live_image.img

This will start the ACS live image automation and run the test suites in sequence.

Known Limitations:
On FVP models, with versions previous to 11.15.23, during the execution of the UEFI-SCT suite, the following behavior is observed:

  1. Execution of “UEFIRuntimeServices” tests may cause the test execution on FVP to stall and become non-responsive. The message displayed prior to this stall would be either “System may reset after 1 second…” or a print associated with “SetTime” tests.

The FVP execution must be terminated and restarted by running the run_model.sh script to continue with the execution of the tests. The execution will continue from the test that is next in sequence of the test prior to FVP stall.

  1. It may appear that the test execution has stalled with the message “Waiting for few seconds for signal …” displayed on the console. This is expected behavior and the forward progress of tests will continue after a 20-minute delay.

Note: When verifiying ACS on hardware, ensure that ACS image is not in two different boot medias (USB, NVMe drives etc) attached to the device.

Automation

The test suite execution can be automated or manual. Automated execution is the default execution method when no key is pressed during boot.
The live image boots to UEFI Shell. The different test applications can be run in the following order:

  1. SCT tests for BBR compliance.
  2. UEFI Shell application for BSA compliance.
  3. FWTS tests for BBR compliance.
  4. OS tests for Linux BSA compliance. Note: To skip FWTS and OS tests for debugging, append "noacs" to the Linux command by editing the "Linux Boot" option in the grub menu during image boot. To start an extended run of UEFI-SCT append "-nostartup startup.nsh sct_extd" to the shell.efi command by editing the "bbr/bsa" option in the grub menu during image boot.

Running Security interface extension (SIE) ACS components.

Now SIE ACS is integrated with ES ACS image, which can be accessed through GRUB options.

For the verification steps of SIE ACS, refer to the SIE ACS Verification.

Baselines for Open Source Software in this release:

Security Implication

Arm SystemReady ES ACS test suite may run at higher privilege level. An attacker may utilize these tests as a means to elevate privilege which can potentially reveal the platform security assets. To prevent the leakage of Secure information, it is strongly recommended that the ACS test suite is run only on development platforms. If it is run on production systems, the system should be scrubbed after running the test suite.

License

System Ready ACS is distributed under Apache v2.0 License.

Feedback, contributions, and support

  • For feedback, use the GitHub Issue Tracker that is associated with this repository.
  • For support, send an email to "[email protected]" with details.
  • Arm licensees can contact Arm directly through their partner managers.
  • Arm welcomes code contributions through GitHub pull requests.

Copyright (c) 2021-2023, Arm Limited and Contributors. All rights reserved.