From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 7247222195536003072 X-Received: by 2002:a05:622a:1d4:b0:3f3:97c9:dff0 with SMTP id t20-20020a05622a01d400b003f397c9dff0mr21195512qtw.12.1687375419593; Wed, 21 Jun 2023 12:23:39 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:ac8:51d4:0:b0:3ef:573b:68e1 with SMTP id d20-20020ac851d4000000b003ef573b68e1ls10842qtn.0.-pod-prod-05-us; Wed, 21 Jun 2023 12:23:39 -0700 (PDT) X-Received: by 2002:ac8:5c56:0:b0:3ff:2513:a381 with SMTP id j22-20020ac85c56000000b003ff2513a381mr3135335qtj.12.1687375419210; Wed, 21 Jun 2023 12:23:39 -0700 (PDT) Received: by 2002:a05:620a:1999:b0:759:555d:427d with SMTP id af79cd13be357-765104ab558ms85a; Wed, 21 Jun 2023 12:22:43 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5n6vEV3sgmdl0JMHOt635halOUb8wqynVUplp8PmmCtTDXi87imdy225LOvpQqBQz6p2uo X-Received: by 2002:a1f:c152:0:b0:471:af22:9a3b with SMTP id r79-20020a1fc152000000b00471af229a3bmr5279074vkf.1.1687375362734; Wed, 21 Jun 2023 12:22:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1687375362; cv=none; d=google.com; s=arc-20160816; b=E+y4NqoZNq/poHjX66sTRgXDbWelycScjaXyETOFY6iM45ztaXfnHsv9fqhLLKheXv kNZtu+7IaTm1zJ+vXniLfQIV3sZAvT/kjwHbnTIivu3Mmn6IPyrDv43tGEPIKhrCstzb yomMKpKsYXMCaBRyjkAwtMyH/AXBKyjkKWqAs3in84TyTKeHtM11Js1HMWlWibzN7xM8 hmrNlblQEkgjEjfmqPkQ0OrfzUlbNobYHZkOUJDKaQY/l3HR7FJpR9j+rzfj0lsJvADK ipsdBWl4J4eNjocEj1erouRurXlA5nLicp6sy5m3a+TIuDx6vNQtxIiLjCa/DpSR6Gon t/8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:dkim-signature; bh=nEXJy1HVTwsIZmk9bvPz5VWXeP1ugjsZrzhCXlIlGtU=; b=A/8ycsyhjMT5yD+rwqv2lg7gBdB6o02F0Yx7UUf4Mcw0zfQC6htt7TSNfJidSORMvr elzA6aoRM7fpBJbjdpkG16hVxyhL6fMqvic6QNmtBVRdlmubp5Ql6pIh/MGdPkPp1nHh wwOUfcDgmpAQG8mrEPQ4wLq005QYN9yUGyxNDldOOCufMBzbSkZ/e4kIcdx/b+YJ3QDR KumeHy5hSdd66Vql4xNzmLbP/1D1V7rPB+F9vxPKhmDWTHsSZdUxBmC1ClZtpRf1kRQ6 dF6yC6EX26tgxb1dUSo3zsXAidzLjXDll7L/ZWEKBV8zSPwDpEq6l/3ygSPHHiP5bTy3 XyYQ== ARC-Authentication-Results: i=1; gmr-mx.google.com; dkim=pass header.i=@163.com header.s=s110527 header.b=MAY1LZIP; spf=pass (google.com: domain of baocheng_su@163.com designates 220.181.12.199 as permitted sender) smtp.mailfrom=baocheng_su@163.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=163.com Return-Path: Received: from m12.mail.163.com (m12.mail.163.com. [220.181.12.199]) by gmr-mx.google.com with ESMTP id 5-20020ac5ce85000000b00462f78b2408si365464vke.2.2023.06.21.12.22.41 for ; Wed, 21 Jun 2023 12:22:42 -0700 (PDT) Received-SPF: pass (google.com: domain of baocheng_su@163.com designates 220.181.12.199 as permitted sender) client-ip=220.181.12.199; Authentication-Results: gmr-mx.google.com; dkim=pass header.i=@163.com header.s=s110527 header.b=MAY1LZIP; spf=pass (google.com: domain of baocheng_su@163.com designates 220.181.12.199 as permitted sender) smtp.mailfrom=baocheng_su@163.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=163.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=163.com; s=s110527; h=From:Subject:Date:Message-Id:MIME-Version; bh=nEXJy 1HVTwsIZmk9bvPz5VWXeP1ugjsZrzhCXlIlGtU=; b=MAY1LZIPjqru02PtgPYBF gXkknMeUhwT5wZ7zB3BgEtkBwviReuC+9RL7g+o5S71H0+jVxWchMRUYeHZWMSQU RcNnYEwVZqslekwvslpwvS2oQfUFZBUod4L7bt1h+G8cIZ1QRN6frDFZCfLjy6of mKcf50pTLoI04cgZSuhNaE= Received: from debian-sie.lan (unknown [182.148.93.108]) by zwqz-smtp-mta-g2-4 (Coremail) with SMTP id _____wCXC+XvTZNkxagjAg--.40412S6; Thu, 22 Jun 2023 03:22:35 +0800 (CST) From: baocheng_su@163.com To: isar-users@googlegroups.com, jan.kiszka@siemens.com, felix.moessbauer@siemens.com Cc: christian.storm@siemens.com, quirin.gylstorff@siemens.com, baocheng.su@siemens.com, baocheng_su@163.com Subject: [PATCH v2 4/7] Add recipe for optee examples Date: Thu, 22 Jun 2023 03:22:14 +0800 Message-Id: <20230621192217.2045717-5-baocheng_su@163.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20230621192217.2045717-1-baocheng_su@163.com> References: <20230621192217.2045717-1-baocheng_su@163.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-CM-TRANSID:_____wCXC+XvTZNkxagjAg--.40412S6 X-Coremail-Antispam: 1Uf129KBjvAXoWfGFy3Cw47GryxuryktF4DCFg_yoW8WryUAo W3ArZ8AF1xArnruFZIqrs5CrW5XrZ3WF4Sgr1kuwn8G3WfAa4ayw18Za13ZrWSvry7ur1q yry2gr93Cw4rtrZ3n29KB7ZKAUJUUUUU529EdanIXcx71UUUUU7v73VFW2AGmfu7bjvjm3 AaLaJ3UbIYCTnIWIevJa73UjIFyTuYvj4RtCzKUUUUU X-Originating-IP: [182.148.93.108] X-CM-SenderInfo: pedrux5hqjs2rx6rljoofrz/xtbBFB6VJ1aEIQZ2SgAAsx X-TUID: 8bNXpUyZahji From: Baocheng Su The optee-examples repo is provided to demostrate the trusted application and the host counterpart. The stm32mp15x is used as the demo platform. Signed-off-by: Baocheng Su --- meta-isar/conf/machine/stm32mp15x.conf | 9 +- .../optee-examples/files/debian/compat | 1 + .../optee-examples/files/debian/control.tmpl | 112 ++++++++++++++++++ .../optee-examples/files/debian/rules.tmpl | 21 ++++ .../optee-examples-stm32mp15x_3.21.0.bb | 100 ++++++++++++++++ .../optee-os/optee-os-stm32mp15x_3.21.0.bb | 22 ++++ .../lib/wic/canned-wks/stm32mp15x.wks.in | 2 +- 7 files changed, 265 insertions(+), 2 deletions(-) create mode 100644 meta-isar/recipes-bsp/optee-examples/files/debian/compat create mode 100644 meta-isar/recipes-bsp/optee-examples/files/debian/control.tmpl create mode 100644 meta-isar/recipes-bsp/optee-examples/files/debian/rules.tmpl create mode 100644 meta-isar/recipes-bsp/optee-examples/optee-examples-stm32mp15x_3.21.0.bb diff --git a/meta-isar/conf/machine/stm32mp15x.conf b/meta-isar/conf/machine/stm32mp15x.conf index 0b200d2..4e8142e 100644 --- a/meta-isar/conf/machine/stm32mp15x.conf +++ b/meta-isar/conf/machine/stm32mp15x.conf @@ -16,4 +16,11 @@ WKS_FILE ?= "stm32mp15x.wks.in" IMAGER_INSTALL += "trusted-firmware-a-stm32mp15x optee-os-stm32mp15x u-boot-stm32mp15x" IMAGER_BUILD_DEPS += "trusted-firmware-a-stm32mp15x optee-os-stm32mp15x u-boot-stm32mp15x" -IMAGE_INSTALL += "u-boot-script tee-supplicant" +IMAGE_INSTALL += "u-boot-script \ + optee-examples-stm32mp15x-acipher-host \ + optee-examples-stm32mp15x-aes-host \ + optee-examples-stm32mp15x-hello-world-host \ + optee-examples-stm32mp15x-hotp-host \ + optee-examples-stm32mp15x-random-host \ + optee-examples-stm32mp15x-secure-storage-host \ + " diff --git a/meta-isar/recipes-bsp/optee-examples/files/debian/compat b/meta-isar/recipes-bsp/optee-examples/files/debian/compat new file mode 100644 index 0000000..f599e28 --- /dev/null +++ b/meta-isar/recipes-bsp/optee-examples/files/debian/compat @@ -0,0 +1 @@ +10 diff --git a/meta-isar/recipes-bsp/optee-examples/files/debian/control.tmpl b/meta-isar/recipes-bsp/optee-examples/files/debian/control.tmpl new file mode 100644 index 0000000..b0e7039 --- /dev/null +++ b/meta-isar/recipes-bsp/optee-examples/files/debian/control.tmpl @@ -0,0 +1,112 @@ +Source: ${PN} +Section: admin +Priority: optional +Standards-Version: 3.9.6 +Build-Depends: ${DEBIAN_BUILD_DEPENDS} +Maintainer: ISAR project + +Package: ${PN}-acipher-ta +Architecture: ${DISTRO_ARCH} +Description: OP-TEE Trusted Application example - acipher + Generates an RSA key pair of specified size and encrypts a supplied string with + it using the GlobalPlatform TEE Internal Core API. + . + UUID: a734eed9-d6a1-4244-aa50-7c99719e7b7b + +Package: ${PN}-acipher-host +Architecture: ${DISTRO_ARCH} +Depends: libteec1, tee-supplicant, + ${misc:Depends} +Description: OP-TEE Trusted Application example - acipher (host application) + Generates an RSA key pair of specified size and encrypts a supplied string with + it using the GlobalPlatform TEE Internal Core API. + . + UUID: a734eed9-d6a1-4244-aa50-7c99719e7b7b + +Package: ${PN}-aes-ta +Architecture: ${DISTRO_ARCH} +Description: OP-TEE Trusted Application example - aes + Runs an AES encryption and decryption from a TA using the GlobalPlatform TEE + Internal Core API. Non secure test application provides the key, initial vector + and ciphered data. + . + UUID: 5dbac793-f574-4871-8ad3-04331ec17f24 + +Package: ${PN}-aes-host +Architecture: ${DISTRO_ARCH} +Depends: libteec1, tee-supplicant, + ${misc:Depends} +Description: OP-TEE Trusted Application example - aes (host application) + Runs an AES encryption and decryption from a TA using the GlobalPlatform TEE + Internal Core API. Non secure test application provides the key, initial vector + and ciphered data. + . + UUID: 5dbac793-f574-4871-8ad3-04331ec17f24 + +Package: ${PN}-hello-world-ta +Architecture: ${DISTRO_ARCH} +Description: OP-TEE Trusted Application example - hello_world + This is a very simple Trusted Application to answer a hello command and + incrementing an integer value. + . + UUID: 8aaaf200-2450-11e4-abe2-0002a5d5c51b + +Package: ${PN}-hello-world-host +Architecture: ${DISTRO_ARCH} +Depends: libteec1, tee-supplicant, + ${misc:Depends} +Description: OP-TEE Trusted Application example - hello_world (host application) + This is a very simple Trusted Application to answer a hello command and + incrementing an integer value. + . + UUID: 8aaaf200-2450-11e4-abe2-0002a5d5c51b + +Package: ${PN}-hotp-ta +Architecture: ${DISTRO_ARCH} +Description: OP-TEE Trusted Application example - hotp + HMAC based One Time Password in OP-TEE. + . + UUID: 484d4143-2d53-4841-3120-4a6f636b6542 + +Package: ${PN}-hotp-host +Architecture: ${DISTRO_ARCH} +Depends: libteec1, tee-supplicant, + ${misc:Depends} +Description: OP-TEE Trusted Application example - hotp (host application) + HMAC based One Time Password in OP-TEE. + . + UUID: 484d4143-2d53-4841-3120-4a6f636b6542 + +Package: ${PN}-random-ta +Architecture: ${DISTRO_ARCH} +Description: OP-TEE Trusted Application example - random + Generates a random UUID using capabilities of TEE API (TEE_GenerateRandom()). + . + UUID: b6c53aba-9669-4668-a7f2-205629d00f86 + +Package: ${PN}-random-host +Architecture: ${DISTRO_ARCH} +Depends: libteec1, tee-supplicant, + ${misc:Depends} +Description: OP-TEE Trusted Application example - random (host application) + Generates a random UUID using capabilities of TEE API (TEE_GenerateRandom()). + . + UUID: b6c53aba-9669-4668-a7f2-205629d00f86 + +Package: ${PN}-secure-storage-ta +Architecture: ${DISTRO_ARCH} +Description: OP-TEE Trusted Application example - secure_storage + A Trusted Application to read/write raw data into the OP-TEE secure storage + using the GlobalPlatform TEE Internal Core API. + . + UUID: f4e750bb-1437-4fbf-8785-8d3580c34994 + +Package: ${PN}-secure-storage-host +Architecture: ${DISTRO_ARCH} +Depends: libteec1, tee-supplicant, + ${misc:Depends} +Description: OP-TEE Trusted Application example - secure_storage (host application) + A Trusted Application to read/write raw data into the OP-TEE secure storage + using the GlobalPlatform TEE Internal Core API. + . + UUID: f4e750bb-1437-4fbf-8785-8d3580c34994 diff --git a/meta-isar/recipes-bsp/optee-examples/files/debian/rules.tmpl b/meta-isar/recipes-bsp/optee-examples/files/debian/rules.tmpl new file mode 100644 index 0000000..7e4be39 --- /dev/null +++ b/meta-isar/recipes-bsp/optee-examples/files/debian/rules.tmpl @@ -0,0 +1,21 @@ +#!/usr/bin/make -f +# +# Debian rules for custom OP-TEE Examples build +# +# This software is a part of ISAR. +# Copyright (c) Siemens AG, 2023 +# +# SPDX-License-Identifier: MIT + +ifneq ($(DEB_BUILD_GNU_TYPE),$(DEB_HOST_GNU_TYPE)) +export CROSS_COMPILE=$(DEB_HOST_GNU_TYPE)- +endif + +%: + dh $@ + +override_dh_auto_build: + dh_auto_build -- HOST_CROSS_COMPILE=${CROSS_COMPILE} \ + PLATFORM=${OPTEE_PLATFORM} \ + TA_DEV_KIT_DIR=${TA_DEV_KIT_DIR} \ + examples diff --git a/meta-isar/recipes-bsp/optee-examples/optee-examples-stm32mp15x_3.21.0.bb b/meta-isar/recipes-bsp/optee-examples/optee-examples-stm32mp15x_3.21.0.bb new file mode 100644 index 0000000..2a64a86 --- /dev/null +++ b/meta-isar/recipes-bsp/optee-examples/optee-examples-stm32mp15x_3.21.0.bb @@ -0,0 +1,100 @@ +# +# Copyright (c) Siemens AG, 2023 +# +# SPDX-License-Identifier: MIT +inherit dpkg + +DESCRIPTION ?= "OP-TEE examples" + +FILESEXTRAPATHS:prepend := "${FILE_DIRNAME}/files:" + +SRC_URI += " \ + https://github.com/linaro-swg/optee_examples/archive/${PV}.tar.gz;downloadfilename=optee_examples-${PV}.tar.gz \ + file://debian \ + " +SRC_URI[sha256sum] = "9b965f829adc532b5228534d3b9b38ae1fc4f2ac55d73159a39d43e59749f3ed" + +S = "${WORKDIR}/optee_examples-${PV}" + +OPTEE_NAME = "${MACHINE}" +OPTEE_PLATFORM = "stm32mp1" +TA_DEV_KIT_DIR = "/usr/lib/optee-os/${OPTEE_NAME}/export-ta_arm32" + +PROVIDES += " \ + optee-examples-${OPTEE_NAME}-acipher-host \ + optee-examples-${OPTEE_NAME}-acipher-ta \ + optee-examples-${OPTEE_NAME}-aes-host \ + optee-examples-${OPTEE_NAME}-aes-ta \ + optee-examples-${OPTEE_NAME}-hello-world-host \ + optee-examples-${OPTEE_NAME}-hello-world-ta \ + optee-examples-${OPTEE_NAME}-hotp-host \ + optee-examples-${OPTEE_NAME}-hotp-ta \ + optee-examples-${OPTEE_NAME}-random-host \ + optee-examples-${OPTEE_NAME}-random-ta \ + optee-examples-${OPTEE_NAME}-secure-storage-host \ + optee-examples-${OPTEE_NAME}-secure-storage-ta \ + " + +DEPENDS = "optee-os-tadevkit-${OPTEE_NAME} optee-client-${OPTEE_NAME}" +DEBIAN_BUILD_DEPENDS ?= " \ + python3-pycryptodome:native, \ + python3-cryptography:native, \ + optee-client-dev, \ + optee-os-tadevkit-${OPTEE_NAME}" + +TEMPLATE_FILES = "debian/control.tmpl debian/rules.tmpl" +TEMPLATE_VARS += "DEBIAN_BUILD_DEPENDS OPTEE_PLATFORM TA_DEV_KIT_DIR" + +do_prepare_build() { + cp -r ${WORKDIR}/debian ${S}/ + + deb_add_changelog + + # acipher.install + echo "acipher/ta/a734eed9-d6a1-4244-aa50-7c99719e7b7b.ta /usr/lib/optee-os/${OPTEE_NAME}/ta" > \ + ${S}/debian/${PN}-acipher-ta.install + echo "acipher/ta/a734eed9-d6a1-4244-aa50-7c99719e7b7b.stripped.elf /usr/lib/optee-os/${OPTEE_NAME}/ta" >> \ + ${S}/debian/${PN}-acipher-ta.install + echo "acipher/host/optee_example_acipher /usr/lib/optee-os/${OPTEE_NAME}/ca" > \ + ${S}/debian/${PN}-acipher-host.install + + # aes.install + echo "aes/ta/5dbac793-f574-4871-8ad3-04331ec17f24.ta /usr/lib/optee-os/${OPTEE_NAME}/ta" > \ + ${S}/debian/${PN}-aes-ta.install + echo "aes/ta/5dbac793-f574-4871-8ad3-04331ec17f24.stripped.elf /usr/lib/optee-os/${OPTEE_NAME}/ta" >> \ + ${S}/debian/${PN}-aes-ta.install + echo "aes/host/optee_example_aes /usr/lib/optee-os/${OPTEE_NAME}/ca" > \ + ${S}/debian/${PN}-aes-host.install + + # hello-world.install + echo "hello_world/ta/8aaaf200-2450-11e4-abe2-0002a5d5c51b.ta /usr/lib/optee-os/${OPTEE_NAME}/ta" > \ + ${S}/debian/${PN}-hello-world-ta.install + echo "hello_world/ta/8aaaf200-2450-11e4-abe2-0002a5d5c51b.stripped.elf /usr/lib/optee-os/${OPTEE_NAME}/ta" >> \ + ${S}/debian/${PN}-hello-world-ta.install + echo "hello_world/host/optee_example_hello_world /usr/lib/optee-os/${OPTEE_NAME}/ca" > \ + ${S}/debian/${PN}-hello-world-host.install + + # hotp.install + echo "hotp/ta/484d4143-2d53-4841-3120-4a6f636b6542.ta /usr/lib/optee-os/${OPTEE_NAME}/ta" > \ + ${S}/debian/${PN}-hotp-ta.install + echo "hotp/ta/484d4143-2d53-4841-3120-4a6f636b6542.stripped.elf /usr/lib/optee-os/${OPTEE_NAME}/ta" >> \ + ${S}/debian/${PN}-hotp-ta.install + echo "hotp/host/optee_example_hotp /usr/lib/optee-os/${OPTEE_NAME}/ca" > \ + ${S}/debian/${PN}-hotp-host.install + + # random.install + echo "random/ta/b6c53aba-9669-4668-a7f2-205629d00f86.ta /usr/lib/optee-os/${OPTEE_NAME}/ta" > \ + ${S}/debian/${PN}-random-ta.install + echo "random/ta/b6c53aba-9669-4668-a7f2-205629d00f86.stripped.elf /usr/lib/optee-os/${OPTEE_NAME}/ta" >> \ + ${S}/debian/${PN}-random-ta.install + echo "random/host/optee_example_random /usr/lib/optee-os/${OPTEE_NAME}/ca" > \ + ${S}/debian/${PN}-random-host.install + + # secure-storage.install + echo "secure_storage/ta/f4e750bb-1437-4fbf-8785-8d3580c34994.ta /usr/lib/optee-os/${OPTEE_NAME}/ta" > \ + ${S}/debian/${PN}-secure-storage-ta.install + echo "secure_storage/ta/f4e750bb-1437-4fbf-8785-8d3580c34994.stripped.elf /usr/lib/optee-os/${OPTEE_NAME}/ta" >> \ + ${S}/debian/${PN}-secure-storage-ta.install + echo "secure_storage/host/optee_example_secure_storage /usr/lib/optee-os/${OPTEE_NAME}/ca" > \ + ${S}/debian/${PN}-secure-storage-host.install +} diff --git a/meta-isar/recipes-bsp/optee-os/optee-os-stm32mp15x_3.21.0.bb b/meta-isar/recipes-bsp/optee-os/optee-os-stm32mp15x_3.21.0.bb index 096e263..7468ca6 100644 --- a/meta-isar/recipes-bsp/optee-os/optee-os-stm32mp15x_3.21.0.bb +++ b/meta-isar/recipes-bsp/optee-os/optee-os-stm32mp15x_3.21.0.bb @@ -6,3 +6,25 @@ require recipes-bsp/optee-os/optee-os-custom.inc require optee-os-stm32mp15x_${PV}.inc +# optee-examples integration +DEPENDS += "optee-examples-stm32mp15x" +DEBIAN_BUILD_DEPENDS += " \ + , optee-examples-stm32mp15x-acipher-ta \ + , optee-examples-stm32mp15x-aes-ta \ + , optee-examples-stm32mp15x-hello-world-ta \ + , optee-examples-stm32mp15x-hotp-ta \ + , optee-examples-stm32mp15x-random-ta \ + , optee-examples-stm32mp15x-secure-storage-ta \ + " +EARLY_TA_PATHS = " \ + /usr/lib/optee-os/${OPTEE_NAME}/ta/a734eed9-d6a1-4244-aa50-7c99719e7b7b.stripped.elf \ + /usr/lib/optee-os/${OPTEE_NAME}/ta/5dbac793-f574-4871-8ad3-04331ec17f24.stripped.elf \ + /usr/lib/optee-os/${OPTEE_NAME}/ta/8aaaf200-2450-11e4-abe2-0002a5d5c51b.stripped.elf \ + /usr/lib/optee-os/${OPTEE_NAME}/ta/484d4143-2d53-4841-3120-4a6f636b6542.stripped.elf \ + /usr/lib/optee-os/${OPTEE_NAME}/ta/b6c53aba-9669-4668-a7f2-205629d00f86.stripped.elf \ + /usr/lib/optee-os/${OPTEE_NAME}/ta/f4e750bb-1437-4fbf-8785-8d3580c34994.stripped.elf \ + " +OPTEE_EXTRA_BUILDARGS += " \ + CFG_EARLY_TA=y \ + EARLY_TA_PATHS='${EARLY_TA_PATHS}' \ + " diff --git a/meta-isar/scripts/lib/wic/canned-wks/stm32mp15x.wks.in b/meta-isar/scripts/lib/wic/canned-wks/stm32mp15x.wks.in index 4ed4ee8..5d96f65 100644 --- a/meta-isar/scripts/lib/wic/canned-wks/stm32mp15x.wks.in +++ b/meta-isar/scripts/lib/wic/canned-wks/stm32mp15x.wks.in @@ -8,7 +8,7 @@ part fsbl2 --part-name fsbl2 --source rawcopy --sourceparams "file=/usr/lib/trus part ssbl --part-name ssbl --source rawcopy --sourceparams "file=/usr/lib/u-boot/${MACHINE}/u-boot.stm32" --fstype=ext4 --fsoptions "noauto" --part-type 0x8301 --fixed-size 2048K part teeh --part-name teeh --source rawcopy --sourceparams "file=/usr/lib/optee-os/${MACHINE}/tee-header_v2.stm32" --fstype=ext4 --fsoptions "noauto" --part-type 0x8301 --fixed-size 256K -part teed --part-name teed --source rawcopy --sourceparams "file=/usr/lib/optee-os/${MACHINE}/tee-pageable_v2.stm32" --fstype=ext4 --fsoptions "noauto" --part-type 0x8301 --fixed-size 512K +part teed --part-name teed --source rawcopy --sourceparams "file=/usr/lib/optee-os/${MACHINE}/tee-pageable_v2.stm32" --fstype=ext4 --fsoptions "noauto" --part-type 0x8301 --fixed-size 1024K part teex --part-name teex --source rawcopy --sourceparams "file=/usr/lib/optee-os/${MACHINE}/tee-pager_v2.stm32" --fstype=ext4 --fsoptions "noauto" --part-type 0x8301 --fixed-size 256K part / --source rootfs-u-boot --fstype ext4 --mkfs-extraopts "-T default" --label root --align 1024 --active --use-uuid -- 2.30.2