From mboxrd@z Thu Jan 1 00:00:00 1970 X-GM-THRID: 6883009067021762560 X-Received: by 2002:a1c:4884:: with SMTP id v126mr20061318wma.160.1606056374276; Sun, 22 Nov 2020 06:46:14 -0800 (PST) X-BeenThere: isar-users@googlegroups.com Received: by 2002:adf:aa87:: with SMTP id h7ls4446525wrc.2.gmail; Sun, 22 Nov 2020 06:46:13 -0800 (PST) X-Google-Smtp-Source: ABdhPJwS8f1hkyGdQWGsE/FjU188NmRpOBX5AfTw4GlbfaXz7G2PjleK213vJ04mAnwHwxU+KF1E X-Received: by 2002:a5d:4bc7:: with SMTP id l7mr28075265wrt.105.1606056373298; Sun, 22 Nov 2020 06:46:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606056373; cv=none; d=google.com; s=arc-20160816; b=hOx79PQyH7vuY5tRjTaoBMleCcIE7wWW9rcd2caHqEEITN6aR/fKqG5dMMW8FOV5fv fCW5VkbA2l8SGDrjR37w6asChL/YKuli90c9PZF18+/swB6RvPJmodIweOL6FRLLN5dt 1KqJEDAQlcP1bFtgGCeiTL7EgcWlQBodAVIg6vSLYNGK6NWSLelGBXGmzhHHt4EtrW/G oLYuSZkqTyzx9UCviKuc44bfUxkE55QqpHjMuBo042H2fZQfKJgXx/CGRP5J5JNNEQu2 Ktml/8s4qjal8XJPfO0dPcdDClMj+MjwyM9wRLSAUt16hH5xkIHbyugy5JZAIEFZzX+0 zknA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:content-language:in-reply-to:mime-version :user-agent:date:message-id:references:cc:to:from:subject; bh=2xL1GPjHiLe2X4LTY3kRqyMEuMWztButs00uu4mv27w=; b=0hCBW9lBuH5k/qsHWJjpXl77w6GhYjK/67rC1C/t91d8sk7cDoo11HMAtX4Z18ePHr W5UBL5gP8OAye6KL1W1Iw5Ev080pfLF9SKZNLg3nejw3NnRST4s2iG7/EPedwtLdnsjM hIcSzduZUk0BHr7yNz9CNkDvvxSWA5vJg43oqP9K0DcZ6U3nWqkt0v+pi9RH1tu00X1I TtCAX7z1tGSHCBAqaEgRDUMMCRIZBlZ8tQUGoRGHFTDt5NH6DM2dGMSYAh+PqFhw+k2L r29vkCuYlaY7XSR1W8yQf+NRruSETBX7OaCArNsFMkcJo2jAkIA5A/WmO1Jn20zeGOEd vRyg== ARC-Authentication-Results: i=1; gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 194.138.37.40 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from gecko.sbs.de (gecko.sbs.de. [194.138.37.40]) by gmr-mx.google.com with ESMTPS id w65si198768wmg.1.2020.11.22.06.46.13 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sun, 22 Nov 2020 06:46:13 -0800 (PST) Received-SPF: pass (google.com: domain of jan.kiszka@siemens.com designates 194.138.37.40 as permitted sender) client-ip=194.138.37.40; Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of jan.kiszka@siemens.com designates 194.138.37.40 as permitted sender) smtp.mailfrom=jan.kiszka@siemens.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by gecko.sbs.de (8.15.2/8.15.2) with ESMTPS id 0AMEkCaH002677 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sun, 22 Nov 2020 15:46:12 +0100 Received: from [167.87.38.29] ([167.87.38.29]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTP id 0AMEkBJV009517; Sun, 22 Nov 2020 15:46:11 +0100 Subject: Re: [PATCH v2 00/11] Support for building TF-A and OP-TEE, add STM32MP15x board From: Jan Kiszka To: isar-users , Baurzhan Ismagulov Cc: vijaikumar.kanagarajan@gmail.com References: <9d87d3ab-2ad0-88a7-a354-ff5ca329a5ad@siemens.com> Message-ID: Date: Sun, 22 Nov 2020 15:46:11 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.4.0 MIME-Version: 1.0 In-Reply-To: <9d87d3ab-2ad0-88a7-a354-ff5ca329a5ad@siemens.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-TUID: Ap5nmzYg8C75 On 21.11.20 08:35, [ext] Jan Kiszka wrote: > On 15.10.20 11:43, [ext] Jan Kiszka wrote: >> Changes in v2: >> - fix wks file so that it becomes compatible with upcoming wic version >> (credits go to Vijai for debugging this) >> - replace kernel patches with upstream U-Boot backports, following >> community suggestions >> >> This adds include files for building custom Trusted Firmware A and Open >> Portable Trusted Execution Environment, similar to U-Boot. As a >> demonstration target, support for the STM32MP15x board is added, and its >> boot is enabled for both TF-a and OP-TEE. >> >> Jan >> >> >> CC: vijaikumar.kanagarajan@gmail.com >> >> Jan Kiszka (11): >> meta-isar: Lift de0-nano-soc build to buster >> meta-isar: linux-mainline: Update to latest 5.4.70 >> meta-isar: u-boot: Update to 2020.10 >> meta-isar: u-boot: Factor our de0-nano-soc recipe >> meta-isar: example-raw: Purge securetty from target image >> Add STM32MP15x eval board >> Add recipe include for building custom Trusted Firmware A >> stm32mp15x: Switch to TF-A based boot >> Add recipe include for building custom OP-TEE >> meta-isar: u-boot-stm32mp15x: Add patches needed for OP-TEE usage >> meta-isar: Add OP-TEE to STM32MP15x board >> >> meta-isar/conf/local.conf.sample | 3 +- >> meta-isar/conf/machine/de0-nano-soc.conf | 1 + >> meta-isar/conf/machine/stm32mp15x.conf | 19 +++ >> .../conf/multiconfig/de0-nano-soc-buster.conf | 7 + >> .../multiconfig/de0-nano-soc-stretch.conf | 7 - >> .../conf/multiconfig/stm32mp15x-buster.conf | 7 + >> .../recipes-app/example-raw/files/postinst | 3 + >> .../optee-os/optee-os-stm32mp15x_3.10.0.bb | 19 +++ >> .../trusted-firmware-a-stm32mp15x_2.3.bb | 21 +++ >> ...y-add-property-no-map-to-created-res.patch | 151 ++++++++++++++++++ >> ...rty-no-map-to-secure-reserved-memory.patch | 33 ++++ >> .../recipes-bsp/u-boot/u-boot-2020.10.inc | 13 ++ >> .../u-boot/u-boot-de0-nano-soc_2020.10.bb | 9 ++ >> .../u-boot/u-boot-stm32mp15x_2020.10.bb | 10 ++ >> .../recipes-bsp/u-boot/u-boot_2018.09.bb | 14 -- >> ...ine_5.4.10.bb => linux-mainline_5.4.70.bb} | 4 +- >> .../lib/wic/canned-wks/stm32mp15x.wks.in | 16 ++ >> meta/recipes-bsp/optee-os/files/debian/compat | 1 + >> .../optee-os/files/debian/control.tmpl | 10 ++ >> meta/recipes-bsp/optee-os/files/debian/rules | 19 +++ >> meta/recipes-bsp/optee-os/optee-os-custom.inc | 43 +++++ >> .../trusted-firmware-a/files/debian/compat | 1 + >> .../files/debian/control.tmpl | 10 ++ >> .../trusted-firmware-a/files/debian/rules | 19 +++ >> .../trusted-firmware-a-custom.inc | 43 +++++ >> scripts/ci_build.sh | 5 +- >> 26 files changed, 462 insertions(+), 26 deletions(-) >> create mode 100644 meta-isar/conf/machine/stm32mp15x.conf >> create mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-buster.conf >> delete mode 100644 meta-isar/conf/multiconfig/de0-nano-soc-stretch.conf >> create mode 100644 meta-isar/conf/multiconfig/stm32mp15x-buster.conf >> create mode 100644 meta-isar/recipes-bsp/optee-os/optee-os-stm32mp15x_3.10.0.bb >> create mode 100644 meta-isar/recipes-bsp/trusted-firmware-a/trusted-firmware-a-stm32mp15x_2.3.bb >> create mode 100644 meta-isar/recipes-bsp/u-boot/files/0001-fdtdec-optionally-add-property-no-map-to-created-res.patch >> create mode 100644 meta-isar/recipes-bsp/u-boot/files/0002-optee-add-property-no-map-to-secure-reserved-memory.patch >> create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-2020.10.inc >> create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-de0-nano-soc_2020.10.bb >> create mode 100644 meta-isar/recipes-bsp/u-boot/u-boot-stm32mp15x_2020.10.bb >> delete mode 100644 meta-isar/recipes-bsp/u-boot/u-boot_2018.09.bb >> rename meta-isar/recipes-kernel/linux/{linux-mainline_5.4.10.bb => linux-mainline_5.4.70.bb} (89%) >> create mode 100644 meta-isar/scripts/lib/wic/canned-wks/stm32mp15x.wks.in >> create mode 100644 meta/recipes-bsp/optee-os/files/debian/compat >> create mode 100644 meta/recipes-bsp/optee-os/files/debian/control.tmpl >> create mode 100755 meta/recipes-bsp/optee-os/files/debian/rules >> create mode 100644 meta/recipes-bsp/optee-os/optee-os-custom.inc >> create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/compat >> create mode 100644 meta/recipes-bsp/trusted-firmware-a/files/debian/control.tmpl >> create mode 100755 meta/recipes-bsp/trusted-firmware-a/files/debian/rules >> create mode 100644 meta/recipes-bsp/trusted-firmware-a/trusted-firmware-a-custom.inc >> > > Ping for this series, more and more downstream layers would love to use > these patterns. > Will send a new series, did some version updates. And found a wic-img bug. And a stable kernel regression. Jan -- Siemens AG, T RDA IOT Corporate Competence Center Embedded Linux