mbox series

[00/11] Support for building TF-A and OP-TEE, add STM32MP15x board

Message ID cover.1602575428.git.jan.kiszka@siemens.com
Headers show
Series Support for building TF-A and OP-TEE, add STM32MP15x board | expand

Message

Jan Kiszka Oct. 12, 2020, 10:50 p.m. UTC
This adds include files for building custom Trusted Firmware A and Open
Portable Trusted Execution Environment, similar to U-Boot. As a
demonstration target, support for the STM32MP15x board is added, and its
boot is enabled for both TF-a and OP-TEE.

Jan

Jan Kiszka (11):
  meta-isar: Lift de0-nano-soc build to buster
  meta-isar: linux-mainline: Update to latest 5.4.70
  meta-isar: u-boot: Update to 2020.10
  meta-isar: u-boot: Factor our de0-nano-soc recipe
  meta-isar: example-raw: Purge securetty from target image
  Add STM32MP15x eval board
  Add recipe include for building custom Trusted Firmware A
  stm32mp15x: Switch to TF-A based boot
  Add recipe include for building custom OP-TEE
  meta-isar: linux-mainline: Add patches for stm32mp15x target
  meta-isar: Add OP-TEE to STM32MP15x board

 meta-isar/conf/local.conf.sample              |  3 +-
 meta-isar/conf/machine/de0-nano-soc.conf      |  1 +
 meta-isar/conf/machine/stm32mp15x.conf        | 19 +++++
 .../conf/multiconfig/de0-nano-soc-buster.conf |  7 ++
 .../multiconfig/de0-nano-soc-stretch.conf     |  7 --
 .../conf/multiconfig/stm32mp15x-buster.conf   |  7 ++
 .../recipes-app/example-raw/files/postinst    |  3 +
 .../optee-os/optee-os-stm32mp15x_3.10.0.bb    | 19 +++++
 .../trusted-firmware-a-stm32mp15x_2.3.bb      | 21 +++++
 .../recipes-bsp/u-boot/u-boot-2020.10.inc     | 13 +++
 .../u-boot/u-boot-de0-nano-soc_2020.10.bb     |  9 +++
 .../u-boot/u-boot-stm32mp15x_2020.10.bb       |  6 ++
 .../recipes-bsp/u-boot/u-boot_2018.09.bb      | 14 ----
 ...d-OP-TEE-node-and-its-reserved-memor.patch | 79 +++++++++++++++++++
 ...move-reserve-memory-holes-on-stm32mp.patch | 65 +++++++++++++++
 ...ine_5.4.10.bb => linux-mainline_5.4.70.bb} |  6 +-
 .../lib/wic/canned-wks/stm32mp15x.wks.in      | 16 ++++
 meta/recipes-bsp/optee-os/files/debian/compat |  1 +
 .../optee-os/files/debian/control.tmpl        | 10 +++
 meta/recipes-bsp/optee-os/files/debian/rules  | 19 +++++
 meta/recipes-bsp/optee-os/optee-os-custom.inc | 43 ++++++++++
 .../trusted-firmware-a/files/debian/compat    |  1 +
 .../files/debian/control.tmpl                 | 10 +++
 .../trusted-firmware-a/files/debian/rules     | 19 +++++
 .../trusted-firmware-a-custom.inc             | 43 ++++++++++
 scripts/ci_build.sh                           |  5 +-
 26 files changed, 420 insertions(+), 26 deletions(-)
 create mode 100644 meta-isar/conf/machine/stm32mp15x.conf
 create mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-buster.conf
 delete mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-stretch.conf
 create mode 100644 meta-isar/conf/multiconfig/stm32mp15x-buster.conf
 create mode 100644 meta-isar/recipes-bsp/optee-os/optee-os-stm32mp15x_3.10.0.bb
 create mode 100644 meta-isar/recipes-bsp/trusted-firmware-a/trusted-firmware-a-stm32mp15x_2.3.bb
 create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-2020.10.inc
 create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-de0-nano-soc_2020.10.bb
 create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-stm32mp15x_2020.10.bb
 delete mode 100644 meta-isar/recipes-bsp/u-boot/u-boot_2018.09.bb
 create mode 100644 meta-isar/recipes-kernel/linux/files/0001-ARM-dts-stm32-add-OP-TEE-node-and-its-reserved-memor.patch
 create mode 100644 meta-isar/recipes-kernel/linux/files/0002-ARM-dts-stm32-remove-reserve-memory-holes-on-stm32mp.patch
 rename meta-isar/recipes-kernel/linux/{linux-mainline_5.4.10.bb => linux-mainline_5.4.70.bb} (78%)
 create mode 100644 meta-isar/scripts/lib/wic/canned-wks/stm32mp15x.wks.in
 create mode 100644 meta/recipes-bsp/optee-os/files/debian/compat
 create mode 100644 meta/recipes-bsp/optee-os/files/debian/control.tmpl
 create mode 100755 meta/recipes-bsp/optee-os/files/debian/rules
 create mode 100644 meta/recipes-bsp/optee-os/optee-os-custom.inc
 create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/compat
 create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/control.tmpl
 create mode 100755 meta/recipes-bsp/trusted-firmware-a/files/debian/rules
 create mode 100644 meta/recipes-bsp/trusted-firmware-a/trusted-firmware-a-custom.inc

Comments

Jan Kiszka Oct. 12, 2020, 11:01 p.m. UTC | #1
On 13.10.20 09:50, [ext] Jan Kiszka wrote:
> This adds include files for building custom Trusted Firmware A and Open
> Portable Trusted Execution Environment, similar to U-Boot. As a
> demonstration target, support for the STM32MP15x board is added, and its
> boot is enabled for both TF-a and OP-TEE.
> 

Forgot to mention that at least the TF-A abstraction has been stressed
by jailhouse-images extensively already. It works fine to model 4 more
boards [1].

Jan

[1] https://groups.google.com/forum/#!topic/jailhouse-dev/JQXKZUdlxpU