From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6883009067021762560 X-Received: by 2002:a5d:688c:: with SMTP id h12mr11518121wru.92.1602575431069; Tue, 13 Oct 2020 00:50:31 -0700 (PDT) X-BeenThere: isar-users@googlegroups.com Received: by 2002:adf:82ab:: with SMTP id 40ls320088wrc.1.gmail; Tue, 13 Oct 2020 00:50:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxrAxQizinLpgWNNWej/TsOzrcb2QcYfP23Ktsso8tc3oUtkjeikZhLkzwy7maYDkIZoJHA X-Received: by 2002:adf:e312:: with SMTP id b18mr36051649wrj.372.1602575429936; Tue, 13 Oct 2020 00:50:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602575429; cv=none; d=google.com; s=arc-20160816; b=QF70dXSAWGxfyeEVbYzyGnkKSCct+ppPFbJMX7LRnUn5CWVm8sxOeRA6mnmBoUm1gk VNIclaxZXOD4ZKe42mpgPD5FAkcv9Imdy7MOGZXedw5GIQq4Q7dljmuI1FTno00Jj8w5 8KjVZo77yjGvlEPQIPWA3HpTJ30TExub8vZJCmOZzHyauPi7ggGLz4XLdzl4zEPmA62x F1j+e+HdNpesXJsWagP23rAgP4YU6OQ7lg+gGLdxR2Vp7NSKNx3AqKHYENcLsolrJekM StQvttGY2gcpIuC2TBJM8aoZBOKFBoGJB5KiG2pTJo5DBhJfeH4rhlo4sZemgAyw3WHf R42Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:message-id:date:subject:to :from; bh=lOAAyisWcCCLWxB4N+CvSZ+AbjmIOjG/KRPXPHMnk7Y=; b=eroVV1u7eLZzKp4Vgatmr/4zaMb1eF+GU7ki2nyCGdi+xt7/Zuz9jPXnj5f9WSYZrq X32K/5Tnhj15A7kQHrTanGyCLmN1fbXXrJbTu5mUkEu0aO8LdRS1pbxcIWVuIv14pDPz 94+7G2O73QenMAzt5H09Wv94xiBTdVJMqaCPrlL7S1D6QAUiMpBrAAi+mo/fxNXo5AGS DHjoYE2hYBB7EeqK7SlDt4zoXd1/hgpBA/mnAteZybmhpBPD4pg4PnA6V/PGfePHq50+ 17LW+zLeIi3w5RFNkcDzmsBflfeI/hPpKzyVRpWRKEHq/QgUAi3wRB142D7bmBZX22af OL8w== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.28 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from goliath.siemens.de (goliath.siemens.de. [192.35.17.28]) by gmr-mx.google.com with ESMTPS id w206si615178wmb.2.2020.10.13.00.50.29 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 13 Oct 2020 00:50:29 -0700 (PDT) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.28 as permitted sender) client-ip=192.35.17.28; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.28 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by goliath.siemens.de (8.15.2/8.15.2) with ESMTPS id 09D7oTOm031897 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Tue, 13 Oct 2020 09:50:29 +0200 Received: from md1f2u6c.ad001.siemens.net ([167.87.21.249]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTP id 09D7oTaq020807 for ; Tue, 13 Oct 2020 09:50:29 +0200 From: Jan Kiszka To: isar-users Subject: [PATCH 00/11] Support for building TF-A and OP-TEE, add STM32MP15x board Date: Tue, 13 Oct 2020 09:50:17 +0200 Message-Id: X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-TUID: pl9gdgQ0wtJW This adds include files for building custom Trusted Firmware A and Open Portable Trusted Execution Environment, similar to U-Boot. As a demonstration target, support for the STM32MP15x board is added, and its boot is enabled for both TF-a and OP-TEE. Jan Jan Kiszka (11): meta-isar: Lift de0-nano-soc build to buster meta-isar: linux-mainline: Update to latest 5.4.70 meta-isar: u-boot: Update to 2020.10 meta-isar: u-boot: Factor our de0-nano-soc recipe meta-isar: example-raw: Purge securetty from target image Add STM32MP15x eval board Add recipe include for building custom Trusted Firmware A stm32mp15x: Switch to TF-A based boot Add recipe include for building custom OP-TEE meta-isar: linux-mainline: Add patches for stm32mp15x target meta-isar: Add OP-TEE to STM32MP15x board meta-isar/conf/local.conf.sample | 3 +- meta-isar/conf/machine/de0-nano-soc.conf | 1 + meta-isar/conf/machine/stm32mp15x.conf | 19 +++++ .../conf/multiconfig/de0-nano-soc-buster.conf | 7 ++ .../multiconfig/de0-nano-soc-stretch.conf | 7 -- .../conf/multiconfig/stm32mp15x-buster.conf | 7 ++ .../recipes-app/example-raw/files/postinst | 3 + .../optee-os/optee-os-stm32mp15x_3.10.0.bb | 19 +++++ .../trusted-firmware-a-stm32mp15x_2.3.bb | 21 +++++ .../recipes-bsp/u-boot/u-boot-2020.10.inc | 13 +++ .../u-boot/u-boot-de0-nano-soc_2020.10.bb | 9 +++ .../u-boot/u-boot-stm32mp15x_2020.10.bb | 6 ++ .../recipes-bsp/u-boot/u-boot_2018.09.bb | 14 ---- ...d-OP-TEE-node-and-its-reserved-memor.patch | 79 +++++++++++++++++++ ...move-reserve-memory-holes-on-stm32mp.patch | 65 +++++++++++++++ ...ine_5.4.10.bb => linux-mainline_5.4.70.bb} | 6 +- .../lib/wic/canned-wks/stm32mp15x.wks.in | 16 ++++ meta/recipes-bsp/optee-os/files/debian/compat | 1 + .../optee-os/files/debian/control.tmpl | 10 +++ meta/recipes-bsp/optee-os/files/debian/rules | 19 +++++ meta/recipes-bsp/optee-os/optee-os-custom.inc | 43 ++++++++++ .../trusted-firmware-a/files/debian/compat | 1 + .../files/debian/control.tmpl | 10 +++ .../trusted-firmware-a/files/debian/rules | 19 +++++ .../trusted-firmware-a-custom.inc | 43 ++++++++++ scripts/ci_build.sh | 5 +- 26 files changed, 420 insertions(+), 26 deletions(-) create mode 100644 meta-isar/conf/machine/stm32mp15x.conf create mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-buster.conf delete mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-stretch.conf create mode 100644 meta-isar/conf/multiconfig/stm32mp15x-buster.conf create mode 100644 meta-isar/recipes-bsp/optee-os/optee-os-stm32mp15x_3.10.0.bb create mode 100644 meta-isar/recipes-bsp/trusted-firmware-a/trusted-firmware-a-stm32mp15x_2.3.bb create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-2020.10.inc create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-de0-nano-soc_2020.10.bb create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-stm32mp15x_2020.10.bb delete mode 100644 meta-isar/recipes-bsp/u-boot/u-boot_2018.09.bb create mode 100644 meta-isar/recipes-kernel/linux/files/0001-ARM-dts-stm32-add-OP-TEE-node-and-its-reserved-memor.patch create mode 100644 meta-isar/recipes-kernel/linux/files/0002-ARM-dts-stm32-remove-reserve-memory-holes-on-stm32mp.patch rename meta-isar/recipes-kernel/linux/{linux-mainline_5.4.10.bb => linux-mainline_5.4.70.bb} (78%) create mode 100644 meta-isar/scripts/lib/wic/canned-wks/stm32mp15x.wks.in create mode 100644 meta/recipes-bsp/optee-os/files/debian/compat create mode 100644 meta/recipes-bsp/optee-os/files/debian/control.tmpl create mode 100755 meta/recipes-bsp/optee-os/files/debian/rules create mode 100644 meta/recipes-bsp/optee-os/optee-os-custom.inc create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/compat create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/control.tmpl create mode 100755 meta/recipes-bsp/trusted-firmware-a/files/debian/rules create mode 100644 meta/recipes-bsp/trusted-firmware-a/trusted-firmware-a-custom.inc -- 2.26.2