Message ID | cover.1602755020.git.jan.kiszka@siemens.com |
---|---|
Headers | show |
Series | Support for building TF-A and OP-TEE, add STM32MP15x board | expand |
On 15.10.20 11:43, [ext] Jan Kiszka wrote: > Changes in v2: > - fix wks file so that it becomes compatible with upcoming wic version > (credits go to Vijai for debugging this) > - replace kernel patches with upstream U-Boot backports, following > community suggestions > > This adds include files for building custom Trusted Firmware A and Open > Portable Trusted Execution Environment, similar to U-Boot. As a > demonstration target, support for the STM32MP15x board is added, and its > boot is enabled for both TF-a and OP-TEE. > > Jan > > > CC: vijaikumar.kanagarajan@gmail.com > > Jan Kiszka (11): > meta-isar: Lift de0-nano-soc build to buster > meta-isar: linux-mainline: Update to latest 5.4.70 > meta-isar: u-boot: Update to 2020.10 > meta-isar: u-boot: Factor our de0-nano-soc recipe > meta-isar: example-raw: Purge securetty from target image > Add STM32MP15x eval board > Add recipe include for building custom Trusted Firmware A > stm32mp15x: Switch to TF-A based boot > Add recipe include for building custom OP-TEE > meta-isar: u-boot-stm32mp15x: Add patches needed for OP-TEE usage > meta-isar: Add OP-TEE to STM32MP15x board > > meta-isar/conf/local.conf.sample | 3 +- > meta-isar/conf/machine/de0-nano-soc.conf | 1 + > meta-isar/conf/machine/stm32mp15x.conf | 19 +++ > .../conf/multiconfig/de0-nano-soc-buster.conf | 7 + > .../multiconfig/de0-nano-soc-stretch.conf | 7 - > .../conf/multiconfig/stm32mp15x-buster.conf | 7 + > .../recipes-app/example-raw/files/postinst | 3 + > .../optee-os/optee-os-stm32mp15x_3.10.0.bb | 19 +++ > .../trusted-firmware-a-stm32mp15x_2.3.bb | 21 +++ > ...y-add-property-no-map-to-created-res.patch | 151 ++++++++++++++++++ > ...rty-no-map-to-secure-reserved-memory.patch | 33 ++++ > .../recipes-bsp/u-boot/u-boot-2020.10.inc | 13 ++ > .../u-boot/u-boot-de0-nano-soc_2020.10.bb | 9 ++ > .../u-boot/u-boot-stm32mp15x_2020.10.bb | 10 ++ > .../recipes-bsp/u-boot/u-boot_2018.09.bb | 14 -- > ...ine_5.4.10.bb => linux-mainline_5.4.70.bb} | 4 +- > .../lib/wic/canned-wks/stm32mp15x.wks.in | 16 ++ > meta/recipes-bsp/optee-os/files/debian/compat | 1 + > .../optee-os/files/debian/control.tmpl | 10 ++ > meta/recipes-bsp/optee-os/files/debian/rules | 19 +++ > meta/recipes-bsp/optee-os/optee-os-custom.inc | 43 +++++ > .../trusted-firmware-a/files/debian/compat | 1 + > .../files/debian/control.tmpl | 10 ++ > .../trusted-firmware-a/files/debian/rules | 19 +++ > .../trusted-firmware-a-custom.inc | 43 +++++ > scripts/ci_build.sh | 5 +- > 26 files changed, 462 insertions(+), 26 deletions(-) > create mode 100644 meta-isar/conf/machine/stm32mp15x.conf > create mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-buster.conf > delete mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-stretch.conf > create mode 100644 meta-isar/conf/multiconfig/stm32mp15x-buster.conf > create mode 100644 meta-isar/recipes-bsp/optee-os/optee-os-stm32mp15x_3.10.0.bb > create mode 100644 meta-isar/recipes-bsp/trusted-firmware-a/trusted-firmware-a-stm32mp15x_2.3.bb > create mode 100644 meta-isar/recipes-bsp/u-boot/files/0001-fdtdec-optionally-add-property-no-map-to-created-res.patch > create mode 100644 meta-isar/recipes-bsp/u-boot/files/0002-optee-add-property-no-map-to-secure-reserved-memory.patch > create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-2020.10.inc > create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-de0-nano-soc_2020.10.bb > create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-stm32mp15x_2020.10.bb > delete mode 100644 meta-isar/recipes-bsp/u-boot/u-boot_2018.09.bb > rename meta-isar/recipes-kernel/linux/{linux-mainline_5.4.10.bb => linux-mainline_5.4.70.bb} (89%) > create mode 100644 meta-isar/scripts/lib/wic/canned-wks/stm32mp15x.wks.in > create mode 100644 meta/recipes-bsp/optee-os/files/debian/compat > create mode 100644 meta/recipes-bsp/optee-os/files/debian/control.tmpl > create mode 100755 meta/recipes-bsp/optee-os/files/debian/rules > create mode 100644 meta/recipes-bsp/optee-os/optee-os-custom.inc > create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/compat > create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/control.tmpl > create mode 100755 meta/recipes-bsp/trusted-firmware-a/files/debian/rules > create mode 100644 meta/recipes-bsp/trusted-firmware-a/trusted-firmware-a-custom.inc > Ping for this series, more and more downstream layers would love to use these patterns. Jan
On 21.11.20 08:35, [ext] Jan Kiszka wrote: > On 15.10.20 11:43, [ext] Jan Kiszka wrote: >> Changes in v2: >> - fix wks file so that it becomes compatible with upcoming wic version >> (credits go to Vijai for debugging this) >> - replace kernel patches with upstream U-Boot backports, following >> community suggestions >> >> This adds include files for building custom Trusted Firmware A and Open >> Portable Trusted Execution Environment, similar to U-Boot. As a >> demonstration target, support for the STM32MP15x board is added, and its >> boot is enabled for both TF-a and OP-TEE. >> >> Jan >> >> >> CC: vijaikumar.kanagarajan@gmail.com >> >> Jan Kiszka (11): >> meta-isar: Lift de0-nano-soc build to buster >> meta-isar: linux-mainline: Update to latest 5.4.70 >> meta-isar: u-boot: Update to 2020.10 >> meta-isar: u-boot: Factor our de0-nano-soc recipe >> meta-isar: example-raw: Purge securetty from target image >> Add STM32MP15x eval board >> Add recipe include for building custom Trusted Firmware A >> stm32mp15x: Switch to TF-A based boot >> Add recipe include for building custom OP-TEE >> meta-isar: u-boot-stm32mp15x: Add patches needed for OP-TEE usage >> meta-isar: Add OP-TEE to STM32MP15x board >> >> meta-isar/conf/local.conf.sample | 3 +- >> meta-isar/conf/machine/de0-nano-soc.conf | 1 + >> meta-isar/conf/machine/stm32mp15x.conf | 19 +++ >> .../conf/multiconfig/de0-nano-soc-buster.conf | 7 + >> .../multiconfig/de0-nano-soc-stretch.conf | 7 - >> .../conf/multiconfig/stm32mp15x-buster.conf | 7 + >> .../recipes-app/example-raw/files/postinst | 3 + >> .../optee-os/optee-os-stm32mp15x_3.10.0.bb | 19 +++ >> .../trusted-firmware-a-stm32mp15x_2.3.bb | 21 +++ >> ...y-add-property-no-map-to-created-res.patch | 151 ++++++++++++++++++ >> ...rty-no-map-to-secure-reserved-memory.patch | 33 ++++ >> .../recipes-bsp/u-boot/u-boot-2020.10.inc | 13 ++ >> .../u-boot/u-boot-de0-nano-soc_2020.10.bb | 9 ++ >> .../u-boot/u-boot-stm32mp15x_2020.10.bb | 10 ++ >> .../recipes-bsp/u-boot/u-boot_2018.09.bb | 14 -- >> ...ine_5.4.10.bb => linux-mainline_5.4.70.bb} | 4 +- >> .../lib/wic/canned-wks/stm32mp15x.wks.in | 16 ++ >> meta/recipes-bsp/optee-os/files/debian/compat | 1 + >> .../optee-os/files/debian/control.tmpl | 10 ++ >> meta/recipes-bsp/optee-os/files/debian/rules | 19 +++ >> meta/recipes-bsp/optee-os/optee-os-custom.inc | 43 +++++ >> .../trusted-firmware-a/files/debian/compat | 1 + >> .../files/debian/control.tmpl | 10 ++ >> .../trusted-firmware-a/files/debian/rules | 19 +++ >> .../trusted-firmware-a-custom.inc | 43 +++++ >> scripts/ci_build.sh | 5 +- >> 26 files changed, 462 insertions(+), 26 deletions(-) >> create mode 100644 meta-isar/conf/machine/stm32mp15x.conf >> create mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-buster.conf >> delete mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-stretch.conf >> create mode 100644 meta-isar/conf/multiconfig/stm32mp15x-buster.conf >> create mode 100644 meta-isar/recipes-bsp/optee-os/optee-os-stm32mp15x_3.10.0.bb >> create mode 100644 meta-isar/recipes-bsp/trusted-firmware-a/trusted-firmware-a-stm32mp15x_2.3.bb >> create mode 100644 meta-isar/recipes-bsp/u-boot/files/0001-fdtdec-optionally-add-property-no-map-to-created-res.patch >> create mode 100644 meta-isar/recipes-bsp/u-boot/files/0002-optee-add-property-no-map-to-secure-reserved-memory.patch >> create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-2020.10.inc >> create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-de0-nano-soc_2020.10.bb >> create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-stm32mp15x_2020.10.bb >> delete mode 100644 meta-isar/recipes-bsp/u-boot/u-boot_2018.09.bb >> rename meta-isar/recipes-kernel/linux/{linux-mainline_5.4.10.bb => linux-mainline_5.4.70.bb} (89%) >> create mode 100644 meta-isar/scripts/lib/wic/canned-wks/stm32mp15x.wks.in >> create mode 100644 meta/recipes-bsp/optee-os/files/debian/compat >> create mode 100644 meta/recipes-bsp/optee-os/files/debian/control.tmpl >> create mode 100755 meta/recipes-bsp/optee-os/files/debian/rules >> create mode 100644 meta/recipes-bsp/optee-os/optee-os-custom.inc >> create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/compat >> create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/control.tmpl >> create mode 100755 meta/recipes-bsp/trusted-firmware-a/files/debian/rules >> create mode 100644 meta/recipes-bsp/trusted-firmware-a/trusted-firmware-a-custom.inc >> > > Ping for this series, more and more downstream layers would love to use > these patterns. > Will send a new series, did some version updates. And found a wic-img bug. And a stable kernel regression. Jan