From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6883009067021762560 X-Received: by 2002:a05:6512:358d:: with SMTP id m13mr14148701lfr.435.1606118043334; Sun, 22 Nov 2020 23:54:03 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:ac2:58ed:: with SMTP id v13ls1048947lfo.2.gmail; Sun, 22 Nov 2020 23:54:02 -0800 (PST) X-Google-Smtp-Source: ABdhPJziy/7WH1mQMdfvGGaSoAIU8kr8PQmTulMSXIc7maeq0R0bsZBLhnnpeIj1qniHNl1xUYuw X-Received: by 2002:a19:f504:: with SMTP id j4mr1684056lfb.163.1606118042166; Sun, 22 Nov 2020 23:54:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606118042; cv=none; d=google.com; s=arc-20160816; b=c/uFor4xZt2lyMwNYx14SXss2I4vvCA841xnqoXVVwI+M14xpKvDwOR8vwgjuCXfJF MSFL0tLd6k7KNV9EihHa8vJCWxbA9hrYvYZW92uq7ufhUEYp3i8NYWHCNrw76p/Ec4IY M5Hi9ex3Tv8VfTtx0udFAZopD31GkMgMrj5rMztwZJypWvrULHB5J5W5zj60u7gsgnvd y7SuqdLhyP7uV0sFez09Ask1nYMh+JdJiGuLe/blcMjfGgwcNkcHcvf+u0aJarC02gfa S19O3kig3sGML5CIytbCf3fD4GJPdmA2Gx/cdEc+Wt+Je8BLi3FyMZIIFHREYCX7c1bT Mqwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from; bh=oyRkqCc8WeC7pIou5P2oMW5f9+UGRaSI9LnRu5h6jgk=; b=WGZA1v9d49HzK/7Q+u0RfXNeXn8WyzQwyVQBaPUt+rw8PgujUrkfjzytWOAwiM/tBc AbGDpPpta/OBDcEyk/tlYeKRMvzajVcUmSNTUqfC0V+klfAV/P4XIjNctJoKcwX4GRgp eF7Rq1e7NFsjKrP61w0cJmxqImiRR+4m/ZJ3qLtEsdGfwecmnYHHYtn9QOo3BBg5SxdQ T8vIT0cGrFGIBoypgT2ZLXXYTJ28JShVDyKIeJUdd9SEh8ivnD8l3EaLxRCe2sjyjbNE 2CwfR+u7XX2HXyrBaGFMnmFHOmHd2xHml7sMdEcyLE+tJMCQDYW7WrYOPnz0M18G7/vB sWcw== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.2 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from thoth.sbs.de (thoth.sbs.de. [192.35.17.2]) by gmr-mx.google.com with ESMTPS id h19si376097ljh.7.2020.11.22.23.54.01 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sun, 22 Nov 2020 23:54:02 -0800 (PST) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.2 as permitted sender) client-ip=192.35.17.2; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 192.35.17.2 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by thoth.sbs.de (8.15.2/8.15.2) with ESMTPS id 0AN7s04o001621 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 23 Nov 2020 08:54:00 +0100 Received: from md1f2u6c.ad001.siemens.net ([167.87.38.29]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTP id 0AN7rxTo017265; Mon, 23 Nov 2020 08:54:00 +0100 From: Jan Kiszka To: isar-users Cc: vijaikumar.kanagarajan@gmail.com Subject: [PATCH v4 00/11] Support for building TF-A and OP-TEE, add STM32MP15x board Date: Mon, 23 Nov 2020 08:53:48 +0100 Message-Id: X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-TUID: MhzArvyOnyM9 Changes in v4: - fix up OP-TEE version reporting for STM32MP15x - update to TF-A 2.4 and OP-TEE 3.11.0 Changes in v3 (sent as partial updates before): - more flexible TF_A_BINARIES definition, supporting also platforms with custom BUILD_PLAT definitions (k3, rk3399, tegra) - account for platform flavors in OPTEE_PLATFORM This adds include files for building custom Trusted Firmware A and Open Portable Trusted Execution Environment, similar to U-Boot. As a demonstration target, support for the STM32MP15x board is added, and its boot is enabled for both TF-a and OP-TEE. Note that the kernel is intentionally kept at 5.4.70 due to https://lkml.org/lkml/2020/11/22/126. Jan CC: vijaikumar.kanagarajan@gmail.com Jan Kiszka (11): meta-isar: Lift de0-nano-soc build to buster meta-isar: linux-mainline: Update to latest 5.4.70 meta-isar: u-boot: Update to 2020.10 meta-isar: u-boot: Factor our de0-nano-soc recipe meta-isar: example-raw: Purge securetty from target image Add STM32MP15x eval board Add recipe include for building custom Trusted Firmware A stm32mp15x: Switch to TF-A based boot Add recipe include for building custom OP-TEE meta-isar: u-boot-stm32mp15x: Add patches needed for OP-TEE usage meta-isar: Add OP-TEE to STM32MP15x board meta-isar/conf/local.conf.sample | 3 +- meta-isar/conf/machine/de0-nano-soc.conf | 1 + meta-isar/conf/machine/stm32mp15x.conf | 19 +++ .../conf/multiconfig/de0-nano-soc-buster.conf | 7 + .../multiconfig/de0-nano-soc-stretch.conf | 7 - .../conf/multiconfig/stm32mp15x-buster.conf | 7 + .../recipes-app/example-raw/files/postinst | 3 + .../optee-os/optee-os-stm32mp15x_3.10.0.bb | 19 +++ .../trusted-firmware-a-stm32mp15x_2.3.bb | 21 +++ ...y-add-property-no-map-to-created-res.patch | 151 ++++++++++++++++++ ...rty-no-map-to-secure-reserved-memory.patch | 33 ++++ .../recipes-bsp/u-boot/u-boot-2020.10.inc | 13 ++ .../u-boot/u-boot-de0-nano-soc_2020.10.bb | 9 ++ .../u-boot/u-boot-stm32mp15x_2020.10.bb | 10 ++ .../recipes-bsp/u-boot/u-boot_2018.09.bb | 14 -- ...ine_5.4.10.bb => linux-mainline_5.4.70.bb} | 4 +- .../lib/wic/canned-wks/stm32mp15x.wks.in | 16 ++ meta/recipes-bsp/optee-os/files/debian/compat | 1 + .../optee-os/files/debian/control.tmpl | 10 ++ meta/recipes-bsp/optee-os/files/debian/rules | 19 +++ meta/recipes-bsp/optee-os/optee-os-custom.inc | 46 ++++++ .../trusted-firmware-a/files/debian/compat | 1 + .../files/debian/control.tmpl | 10 ++ .../trusted-firmware-a/files/debian/rules | 19 +++ .../trusted-firmware-a-custom.inc | 43 +++++ scripts/ci_build.sh | 5 +- 26 files changed, 465 insertions(+), 26 deletions(-) create mode 100644 meta-isar/conf/machine/stm32mp15x.conf create mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-buster.conf delete mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-stretch.conf create mode 100644 meta-isar/conf/multiconfig/stm32mp15x-buster.conf create mode 100644 meta-isar/recipes-bsp/optee-os/optee-os-stm32mp15x_3.10.0.bb create mode 100644 meta-isar/recipes-bsp/trusted-firmware-a/trusted-firmware-a-stm32mp15x_2.3.bb create mode 100644 meta-isar/recipes-bsp/u-boot/files/0001-fdtdec-optionally-add-property-no-map-to-created-res.patch create mode 100644 meta-isar/recipes-bsp/u-boot/files/0002-optee-add-property-no-map-to-secure-reserved-memory.patch create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-2020.10.inc create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-de0-nano-soc_2020.10.bb create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-stm32mp15x_2020.10.bb delete mode 100644 meta-isar/recipes-bsp/u-boot/u-boot_2018.09.bb rename meta-isar/recipes-kernel/linux/{linux-mainline_5.4.10.bb => linux-mainline_5.4.70.bb} (89%) create mode 100644 meta-isar/scripts/lib/wic/canned-wks/stm32mp15x.wks.in create mode 100644 meta/recipes-bsp/optee-os/files/debian/compat create mode 100644 meta/recipes-bsp/optee-os/files/debian/control.tmpl create mode 100755 meta/recipes-bsp/optee-os/files/debian/rules create mode 100644 meta/recipes-bsp/optee-os/optee-os-custom.inc create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/compat create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/control.tmpl create mode 100755 meta/recipes-bsp/trusted-firmware-a/files/debian/rules create mode 100644 meta/recipes-bsp/trusted-firmware-a/trusted-firmware-a-custom.inc -- 2.26.2