public inbox for isar-users@googlegroups.com
 help / color / mirror / Atom feed
From: Jan Kiszka <jan.kiszka@siemens.com>
To: isar-users <isar-users@googlegroups.com>,
	Baurzhan Ismagulov <ibr@ilbers.de>
Cc: vijaikumar.kanagarajan@gmail.com
Subject: Re: [PATCH v2 00/11] Support for building TF-A and OP-TEE, add STM32MP15x board
Date: Sun, 22 Nov 2020 15:46:11 +0100	[thread overview]
Message-ID: <f97152b0-a627-75e2-e185-c29bef46a100@siemens.com> (raw)
In-Reply-To: <9d87d3ab-2ad0-88a7-a354-ff5ca329a5ad@siemens.com>

On 21.11.20 08:35, [ext] Jan Kiszka wrote:
> On 15.10.20 11:43, [ext] Jan Kiszka wrote:
>> Changes in v2:
>>  - fix wks file so that it becomes compatible with upcoming wic version
>>    (credits go to Vijai for debugging this)
>>  - replace kernel patches with upstream U-Boot backports, following
>>    community suggestions
>>
>> This adds include files for building custom Trusted Firmware A and Open
>> Portable Trusted Execution Environment, similar to U-Boot. As a
>> demonstration target, support for the STM32MP15x board is added, and its
>> boot is enabled for both TF-a and OP-TEE.
>>
>> Jan
>>
>>
>> CC: vijaikumar.kanagarajan@gmail.com
>>
>> Jan Kiszka (11):
>>   meta-isar: Lift de0-nano-soc build to buster
>>   meta-isar: linux-mainline: Update to latest 5.4.70
>>   meta-isar: u-boot: Update to 2020.10
>>   meta-isar: u-boot: Factor our de0-nano-soc recipe
>>   meta-isar: example-raw: Purge securetty from target image
>>   Add STM32MP15x eval board
>>   Add recipe include for building custom Trusted Firmware A
>>   stm32mp15x: Switch to TF-A based boot
>>   Add recipe include for building custom OP-TEE
>>   meta-isar: u-boot-stm32mp15x: Add patches needed for OP-TEE usage
>>   meta-isar: Add OP-TEE to STM32MP15x board
>>
>>  meta-isar/conf/local.conf.sample              |   3 +-
>>  meta-isar/conf/machine/de0-nano-soc.conf      |   1 +
>>  meta-isar/conf/machine/stm32mp15x.conf        |  19 +++
>>  .../conf/multiconfig/de0-nano-soc-buster.conf |   7 +
>>  .../multiconfig/de0-nano-soc-stretch.conf     |   7 -
>>  .../conf/multiconfig/stm32mp15x-buster.conf   |   7 +
>>  .../recipes-app/example-raw/files/postinst    |   3 +
>>  .../optee-os/optee-os-stm32mp15x_3.10.0.bb    |  19 +++
>>  .../trusted-firmware-a-stm32mp15x_2.3.bb      |  21 +++
>>  ...y-add-property-no-map-to-created-res.patch | 151 ++++++++++++++++++
>>  ...rty-no-map-to-secure-reserved-memory.patch |  33 ++++
>>  .../recipes-bsp/u-boot/u-boot-2020.10.inc     |  13 ++
>>  .../u-boot/u-boot-de0-nano-soc_2020.10.bb     |   9 ++
>>  .../u-boot/u-boot-stm32mp15x_2020.10.bb       |  10 ++
>>  .../recipes-bsp/u-boot/u-boot_2018.09.bb      |  14 --
>>  ...ine_5.4.10.bb => linux-mainline_5.4.70.bb} |   4 +-
>>  .../lib/wic/canned-wks/stm32mp15x.wks.in      |  16 ++
>>  meta/recipes-bsp/optee-os/files/debian/compat |   1 +
>>  .../optee-os/files/debian/control.tmpl        |  10 ++
>>  meta/recipes-bsp/optee-os/files/debian/rules  |  19 +++
>>  meta/recipes-bsp/optee-os/optee-os-custom.inc |  43 +++++
>>  .../trusted-firmware-a/files/debian/compat    |   1 +
>>  .../files/debian/control.tmpl                 |  10 ++
>>  .../trusted-firmware-a/files/debian/rules     |  19 +++
>>  .../trusted-firmware-a-custom.inc             |  43 +++++
>>  scripts/ci_build.sh                           |   5 +-
>>  26 files changed, 462 insertions(+), 26 deletions(-)
>>  create mode 100644 meta-isar/conf/machine/stm32mp15x.conf
>>  create mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-buster.conf
>>  delete mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-stretch.conf
>>  create mode 100644 meta-isar/conf/multiconfig/stm32mp15x-buster.conf
>>  create mode 100644 meta-isar/recipes-bsp/optee-os/optee-os-stm32mp15x_3.10.0.bb
>>  create mode 100644 meta-isar/recipes-bsp/trusted-firmware-a/trusted-firmware-a-stm32mp15x_2.3.bb
>>  create mode 100644 meta-isar/recipes-bsp/u-boot/files/0001-fdtdec-optionally-add-property-no-map-to-created-res.patch
>>  create mode 100644 meta-isar/recipes-bsp/u-boot/files/0002-optee-add-property-no-map-to-secure-reserved-memory.patch
>>  create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-2020.10.inc
>>  create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-de0-nano-soc_2020.10.bb
>>  create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-stm32mp15x_2020.10.bb
>>  delete mode 100644 meta-isar/recipes-bsp/u-boot/u-boot_2018.09.bb
>>  rename meta-isar/recipes-kernel/linux/{linux-mainline_5.4.10.bb => linux-mainline_5.4.70.bb} (89%)
>>  create mode 100644 meta-isar/scripts/lib/wic/canned-wks/stm32mp15x.wks.in
>>  create mode 100644 meta/recipes-bsp/optee-os/files/debian/compat
>>  create mode 100644 meta/recipes-bsp/optee-os/files/debian/control.tmpl
>>  create mode 100755 meta/recipes-bsp/optee-os/files/debian/rules
>>  create mode 100644 meta/recipes-bsp/optee-os/optee-os-custom.inc
>>  create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/compat
>>  create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/control.tmpl
>>  create mode 100755 meta/recipes-bsp/trusted-firmware-a/files/debian/rules
>>  create mode 100644 meta/recipes-bsp/trusted-firmware-a/trusted-firmware-a-custom.inc
>>
> 
> Ping for this series, more and more downstream layers would love to use
> these patterns.
> 

Will send a new series, did some version updates. And found a wic-img
bug. And a stable kernel regression.

Jan

-- 
Siemens AG, T RDA IOT
Corporate Competence Center Embedded Linux

      reply	other threads:[~2020-11-22 14:46 UTC|newest]

Thread overview: 17+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-10-15  9:43 Jan Kiszka
2020-10-15  9:43 ` [PATCH v2 01/11] meta-isar: Lift de0-nano-soc build to buster Jan Kiszka
2020-10-15  9:43 ` [PATCH v2 02/11] meta-isar: linux-mainline: Update to latest 5.4.70 Jan Kiszka
2020-10-15  9:43 ` [PATCH v2 03/11] meta-isar: u-boot: Update to 2020.10 Jan Kiszka
2020-10-15  9:43 ` [PATCH v2 04/11] meta-isar: u-boot: Factor our de0-nano-soc recipe Jan Kiszka
2020-10-15  9:43 ` [PATCH v2 05/11] meta-isar: example-raw: Purge securetty from target image Jan Kiszka
2020-10-15  9:43 ` [PATCH v2 06/11] Add STM32MP15x eval board Jan Kiszka
2020-10-15  9:43 ` [PATCH v2 07/11] Add recipe include for building custom Trusted Firmware A Jan Kiszka
2020-11-21 13:42   ` [PATCH v3 " Jan Kiszka
2020-10-15  9:43 ` [PATCH v2 08/11] stm32mp15x: Switch to TF-A based boot Jan Kiszka
2020-11-21 13:42   ` [PATCH v3 " Jan Kiszka
2020-10-15  9:43 ` [PATCH v2 09/11] Add recipe include for building custom OP-TEE Jan Kiszka
2020-11-21 18:05   ` [PATCH v3 " Jan Kiszka
2020-10-15  9:43 ` [PATCH v2 10/11] meta-isar: u-boot-stm32mp15x: Add patches needed for OP-TEE usage Jan Kiszka
2020-10-15  9:43 ` [PATCH v2 11/11] meta-isar: Add OP-TEE to STM32MP15x board Jan Kiszka
2020-11-21  7:35 ` [PATCH v2 00/11] Support for building TF-A and OP-TEE, add " Jan Kiszka
2020-11-22 14:46   ` Jan Kiszka [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=f97152b0-a627-75e2-e185-c29bef46a100@siemens.com \
    --to=jan.kiszka@siemens.com \
    --cc=ibr@ilbers.de \
    --cc=isar-users@googlegroups.com \
    --cc=vijaikumar.kanagarajan@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox