mbox series

[v2,00/11] Support for building TF-A and OP-TEE, add STM32MP15x board

Message ID cover.1602755020.git.jan.kiszka@siemens.com
Headers show
Series Support for building TF-A and OP-TEE, add STM32MP15x board | expand

Message

Jan Kiszka Oct. 15, 2020, 12:43 a.m. UTC
Changes in v2:
 - fix wks file so that it becomes compatible with upcoming wic version
   (credits go to Vijai for debugging this)
 - replace kernel patches with upstream U-Boot backports, following
   community suggestions

This adds include files for building custom Trusted Firmware A and Open
Portable Trusted Execution Environment, similar to U-Boot. As a
demonstration target, support for the STM32MP15x board is added, and its
boot is enabled for both TF-a and OP-TEE.

Jan


CC: vijaikumar.kanagarajan@gmail.com

Jan Kiszka (11):
  meta-isar: Lift de0-nano-soc build to buster
  meta-isar: linux-mainline: Update to latest 5.4.70
  meta-isar: u-boot: Update to 2020.10
  meta-isar: u-boot: Factor our de0-nano-soc recipe
  meta-isar: example-raw: Purge securetty from target image
  Add STM32MP15x eval board
  Add recipe include for building custom Trusted Firmware A
  stm32mp15x: Switch to TF-A based boot
  Add recipe include for building custom OP-TEE
  meta-isar: u-boot-stm32mp15x: Add patches needed for OP-TEE usage
  meta-isar: Add OP-TEE to STM32MP15x board

 meta-isar/conf/local.conf.sample              |   3 +-
 meta-isar/conf/machine/de0-nano-soc.conf      |   1 +
 meta-isar/conf/machine/stm32mp15x.conf        |  19 +++
 .../conf/multiconfig/de0-nano-soc-buster.conf |   7 +
 .../multiconfig/de0-nano-soc-stretch.conf     |   7 -
 .../conf/multiconfig/stm32mp15x-buster.conf   |   7 +
 .../recipes-app/example-raw/files/postinst    |   3 +
 .../optee-os/optee-os-stm32mp15x_3.10.0.bb    |  19 +++
 .../trusted-firmware-a-stm32mp15x_2.3.bb      |  21 +++
 ...y-add-property-no-map-to-created-res.patch | 151 ++++++++++++++++++
 ...rty-no-map-to-secure-reserved-memory.patch |  33 ++++
 .../recipes-bsp/u-boot/u-boot-2020.10.inc     |  13 ++
 .../u-boot/u-boot-de0-nano-soc_2020.10.bb     |   9 ++
 .../u-boot/u-boot-stm32mp15x_2020.10.bb       |  10 ++
 .../recipes-bsp/u-boot/u-boot_2018.09.bb      |  14 --
 ...ine_5.4.10.bb => linux-mainline_5.4.70.bb} |   4 +-
 .../lib/wic/canned-wks/stm32mp15x.wks.in      |  16 ++
 meta/recipes-bsp/optee-os/files/debian/compat |   1 +
 .../optee-os/files/debian/control.tmpl        |  10 ++
 meta/recipes-bsp/optee-os/files/debian/rules  |  19 +++
 meta/recipes-bsp/optee-os/optee-os-custom.inc |  43 +++++
 .../trusted-firmware-a/files/debian/compat    |   1 +
 .../files/debian/control.tmpl                 |  10 ++
 .../trusted-firmware-a/files/debian/rules     |  19 +++
 .../trusted-firmware-a-custom.inc             |  43 +++++
 scripts/ci_build.sh                           |   5 +-
 26 files changed, 462 insertions(+), 26 deletions(-)
 create mode 100644 meta-isar/conf/machine/stm32mp15x.conf
 create mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-buster.conf
 delete mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-stretch.conf
 create mode 100644 meta-isar/conf/multiconfig/stm32mp15x-buster.conf
 create mode 100644 meta-isar/recipes-bsp/optee-os/optee-os-stm32mp15x_3.10.0.bb
 create mode 100644 meta-isar/recipes-bsp/trusted-firmware-a/trusted-firmware-a-stm32mp15x_2.3.bb
 create mode 100644 meta-isar/recipes-bsp/u-boot/files/0001-fdtdec-optionally-add-property-no-map-to-created-res.patch
 create mode 100644 meta-isar/recipes-bsp/u-boot/files/0002-optee-add-property-no-map-to-secure-reserved-memory.patch
 create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-2020.10.inc
 create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-de0-nano-soc_2020.10.bb
 create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-stm32mp15x_2020.10.bb
 delete mode 100644 meta-isar/recipes-bsp/u-boot/u-boot_2018.09.bb
 rename meta-isar/recipes-kernel/linux/{linux-mainline_5.4.10.bb => linux-mainline_5.4.70.bb} (89%)
 create mode 100644 meta-isar/scripts/lib/wic/canned-wks/stm32mp15x.wks.in
 create mode 100644 meta/recipes-bsp/optee-os/files/debian/compat
 create mode 100644 meta/recipes-bsp/optee-os/files/debian/control.tmpl
 create mode 100755 meta/recipes-bsp/optee-os/files/debian/rules
 create mode 100644 meta/recipes-bsp/optee-os/optee-os-custom.inc
 create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/compat
 create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/control.tmpl
 create mode 100755 meta/recipes-bsp/trusted-firmware-a/files/debian/rules
 create mode 100644 meta/recipes-bsp/trusted-firmware-a/trusted-firmware-a-custom.inc

Comments

Jan Kiszka Nov. 20, 2020, 9:35 p.m. UTC | #1
On 15.10.20 11:43, [ext] Jan Kiszka wrote:
> Changes in v2:
>  - fix wks file so that it becomes compatible with upcoming wic version
>    (credits go to Vijai for debugging this)
>  - replace kernel patches with upstream U-Boot backports, following
>    community suggestions
> 
> This adds include files for building custom Trusted Firmware A and Open
> Portable Trusted Execution Environment, similar to U-Boot. As a
> demonstration target, support for the STM32MP15x board is added, and its
> boot is enabled for both TF-a and OP-TEE.
> 
> Jan
> 
> 
> CC: vijaikumar.kanagarajan@gmail.com
> 
> Jan Kiszka (11):
>   meta-isar: Lift de0-nano-soc build to buster
>   meta-isar: linux-mainline: Update to latest 5.4.70
>   meta-isar: u-boot: Update to 2020.10
>   meta-isar: u-boot: Factor our de0-nano-soc recipe
>   meta-isar: example-raw: Purge securetty from target image
>   Add STM32MP15x eval board
>   Add recipe include for building custom Trusted Firmware A
>   stm32mp15x: Switch to TF-A based boot
>   Add recipe include for building custom OP-TEE
>   meta-isar: u-boot-stm32mp15x: Add patches needed for OP-TEE usage
>   meta-isar: Add OP-TEE to STM32MP15x board
> 
>  meta-isar/conf/local.conf.sample              |   3 +-
>  meta-isar/conf/machine/de0-nano-soc.conf      |   1 +
>  meta-isar/conf/machine/stm32mp15x.conf        |  19 +++
>  .../conf/multiconfig/de0-nano-soc-buster.conf |   7 +
>  .../multiconfig/de0-nano-soc-stretch.conf     |   7 -
>  .../conf/multiconfig/stm32mp15x-buster.conf   |   7 +
>  .../recipes-app/example-raw/files/postinst    |   3 +
>  .../optee-os/optee-os-stm32mp15x_3.10.0.bb    |  19 +++
>  .../trusted-firmware-a-stm32mp15x_2.3.bb      |  21 +++
>  ...y-add-property-no-map-to-created-res.patch | 151 ++++++++++++++++++
>  ...rty-no-map-to-secure-reserved-memory.patch |  33 ++++
>  .../recipes-bsp/u-boot/u-boot-2020.10.inc     |  13 ++
>  .../u-boot/u-boot-de0-nano-soc_2020.10.bb     |   9 ++
>  .../u-boot/u-boot-stm32mp15x_2020.10.bb       |  10 ++
>  .../recipes-bsp/u-boot/u-boot_2018.09.bb      |  14 --
>  ...ine_5.4.10.bb => linux-mainline_5.4.70.bb} |   4 +-
>  .../lib/wic/canned-wks/stm32mp15x.wks.in      |  16 ++
>  meta/recipes-bsp/optee-os/files/debian/compat |   1 +
>  .../optee-os/files/debian/control.tmpl        |  10 ++
>  meta/recipes-bsp/optee-os/files/debian/rules  |  19 +++
>  meta/recipes-bsp/optee-os/optee-os-custom.inc |  43 +++++
>  .../trusted-firmware-a/files/debian/compat    |   1 +
>  .../files/debian/control.tmpl                 |  10 ++
>  .../trusted-firmware-a/files/debian/rules     |  19 +++
>  .../trusted-firmware-a-custom.inc             |  43 +++++
>  scripts/ci_build.sh                           |   5 +-
>  26 files changed, 462 insertions(+), 26 deletions(-)
>  create mode 100644 meta-isar/conf/machine/stm32mp15x.conf
>  create mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-buster.conf
>  delete mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-stretch.conf
>  create mode 100644 meta-isar/conf/multiconfig/stm32mp15x-buster.conf
>  create mode 100644 meta-isar/recipes-bsp/optee-os/optee-os-stm32mp15x_3.10.0.bb
>  create mode 100644 meta-isar/recipes-bsp/trusted-firmware-a/trusted-firmware-a-stm32mp15x_2.3.bb
>  create mode 100644 meta-isar/recipes-bsp/u-boot/files/0001-fdtdec-optionally-add-property-no-map-to-created-res.patch
>  create mode 100644 meta-isar/recipes-bsp/u-boot/files/0002-optee-add-property-no-map-to-secure-reserved-memory.patch
>  create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-2020.10.inc
>  create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-de0-nano-soc_2020.10.bb
>  create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-stm32mp15x_2020.10.bb
>  delete mode 100644 meta-isar/recipes-bsp/u-boot/u-boot_2018.09.bb
>  rename meta-isar/recipes-kernel/linux/{linux-mainline_5.4.10.bb => linux-mainline_5.4.70.bb} (89%)
>  create mode 100644 meta-isar/scripts/lib/wic/canned-wks/stm32mp15x.wks.in
>  create mode 100644 meta/recipes-bsp/optee-os/files/debian/compat
>  create mode 100644 meta/recipes-bsp/optee-os/files/debian/control.tmpl
>  create mode 100755 meta/recipes-bsp/optee-os/files/debian/rules
>  create mode 100644 meta/recipes-bsp/optee-os/optee-os-custom.inc
>  create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/compat
>  create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/control.tmpl
>  create mode 100755 meta/recipes-bsp/trusted-firmware-a/files/debian/rules
>  create mode 100644 meta/recipes-bsp/trusted-firmware-a/trusted-firmware-a-custom.inc
> 

Ping for this series, more and more downstream layers would love to use
these patterns.

Jan
Jan Kiszka Nov. 22, 2020, 4:46 a.m. UTC | #2
On 21.11.20 08:35, [ext] Jan Kiszka wrote:
> On 15.10.20 11:43, [ext] Jan Kiszka wrote:
>> Changes in v2:
>>  - fix wks file so that it becomes compatible with upcoming wic version
>>    (credits go to Vijai for debugging this)
>>  - replace kernel patches with upstream U-Boot backports, following
>>    community suggestions
>>
>> This adds include files for building custom Trusted Firmware A and Open
>> Portable Trusted Execution Environment, similar to U-Boot. As a
>> demonstration target, support for the STM32MP15x board is added, and its
>> boot is enabled for both TF-a and OP-TEE.
>>
>> Jan
>>
>>
>> CC: vijaikumar.kanagarajan@gmail.com
>>
>> Jan Kiszka (11):
>>   meta-isar: Lift de0-nano-soc build to buster
>>   meta-isar: linux-mainline: Update to latest 5.4.70
>>   meta-isar: u-boot: Update to 2020.10
>>   meta-isar: u-boot: Factor our de0-nano-soc recipe
>>   meta-isar: example-raw: Purge securetty from target image
>>   Add STM32MP15x eval board
>>   Add recipe include for building custom Trusted Firmware A
>>   stm32mp15x: Switch to TF-A based boot
>>   Add recipe include for building custom OP-TEE
>>   meta-isar: u-boot-stm32mp15x: Add patches needed for OP-TEE usage
>>   meta-isar: Add OP-TEE to STM32MP15x board
>>
>>  meta-isar/conf/local.conf.sample              |   3 +-
>>  meta-isar/conf/machine/de0-nano-soc.conf      |   1 +
>>  meta-isar/conf/machine/stm32mp15x.conf        |  19 +++
>>  .../conf/multiconfig/de0-nano-soc-buster.conf |   7 +
>>  .../multiconfig/de0-nano-soc-stretch.conf     |   7 -
>>  .../conf/multiconfig/stm32mp15x-buster.conf   |   7 +
>>  .../recipes-app/example-raw/files/postinst    |   3 +
>>  .../optee-os/optee-os-stm32mp15x_3.10.0.bb    |  19 +++
>>  .../trusted-firmware-a-stm32mp15x_2.3.bb      |  21 +++
>>  ...y-add-property-no-map-to-created-res.patch | 151 ++++++++++++++++++
>>  ...rty-no-map-to-secure-reserved-memory.patch |  33 ++++
>>  .../recipes-bsp/u-boot/u-boot-2020.10.inc     |  13 ++
>>  .../u-boot/u-boot-de0-nano-soc_2020.10.bb     |   9 ++
>>  .../u-boot/u-boot-stm32mp15x_2020.10.bb       |  10 ++
>>  .../recipes-bsp/u-boot/u-boot_2018.09.bb      |  14 --
>>  ...ine_5.4.10.bb => linux-mainline_5.4.70.bb} |   4 +-
>>  .../lib/wic/canned-wks/stm32mp15x.wks.in      |  16 ++
>>  meta/recipes-bsp/optee-os/files/debian/compat |   1 +
>>  .../optee-os/files/debian/control.tmpl        |  10 ++
>>  meta/recipes-bsp/optee-os/files/debian/rules  |  19 +++
>>  meta/recipes-bsp/optee-os/optee-os-custom.inc |  43 +++++
>>  .../trusted-firmware-a/files/debian/compat    |   1 +
>>  .../files/debian/control.tmpl                 |  10 ++
>>  .../trusted-firmware-a/files/debian/rules     |  19 +++
>>  .../trusted-firmware-a-custom.inc             |  43 +++++
>>  scripts/ci_build.sh                           |   5 +-
>>  26 files changed, 462 insertions(+), 26 deletions(-)
>>  create mode 100644 meta-isar/conf/machine/stm32mp15x.conf
>>  create mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-buster.conf
>>  delete mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-stretch.conf
>>  create mode 100644 meta-isar/conf/multiconfig/stm32mp15x-buster.conf
>>  create mode 100644 meta-isar/recipes-bsp/optee-os/optee-os-stm32mp15x_3.10.0.bb
>>  create mode 100644 meta-isar/recipes-bsp/trusted-firmware-a/trusted-firmware-a-stm32mp15x_2.3.bb
>>  create mode 100644 meta-isar/recipes-bsp/u-boot/files/0001-fdtdec-optionally-add-property-no-map-to-created-res.patch
>>  create mode 100644 meta-isar/recipes-bsp/u-boot/files/0002-optee-add-property-no-map-to-secure-reserved-memory.patch
>>  create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-2020.10.inc
>>  create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-de0-nano-soc_2020.10.bb
>>  create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-stm32mp15x_2020.10.bb
>>  delete mode 100644 meta-isar/recipes-bsp/u-boot/u-boot_2018.09.bb
>>  rename meta-isar/recipes-kernel/linux/{linux-mainline_5.4.10.bb => linux-mainline_5.4.70.bb} (89%)
>>  create mode 100644 meta-isar/scripts/lib/wic/canned-wks/stm32mp15x.wks.in
>>  create mode 100644 meta/recipes-bsp/optee-os/files/debian/compat
>>  create mode 100644 meta/recipes-bsp/optee-os/files/debian/control.tmpl
>>  create mode 100755 meta/recipes-bsp/optee-os/files/debian/rules
>>  create mode 100644 meta/recipes-bsp/optee-os/optee-os-custom.inc
>>  create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/compat
>>  create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/control.tmpl
>>  create mode 100755 meta/recipes-bsp/trusted-firmware-a/files/debian/rules
>>  create mode 100644 meta/recipes-bsp/trusted-firmware-a/trusted-firmware-a-custom.inc
>>
> 
> Ping for this series, more and more downstream layers would love to use
> these patterns.
> 

Will send a new series, did some version updates. And found a wic-img
bug. And a stable kernel regression.

Jan