1
0
mirror of https://git.yoctoproject.org/meta-arm synced 2026-05-07 04:58:57 +00:00
Commit Graph

1887 Commits

Author SHA1 Message Date
Jon Mason e545d4ce5d arm-bsp/juno: update to use u-boot v2023.01
Update the compressed kernel patch and drop the unnecessary custom
bootcmd patch.

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-28 15:36:31 -05:00
Jon Mason 834f5aa990 arm/qemuarm-secureboot: Changes for v2023.01 u-boot
Update qemuarm-secureboot to work with the latest u-boot version and
remove the old, unneeded version from meta-arm

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-27 13:50:44 -05:00
Anton Antonov 3d51e1117d arm/kernel: Update ARM-FFA kernel drivers
New arm-ffa-tee and arm-ffa-user drivers are compatible with 5.* and 6.1 kernels.

Signed-off-by: Anton Antonov <Anton.Antonov@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-27 11:00:07 -05:00
Jon Mason 508ed52a4f arm-bsp: add u-boot v2022.10 support
Upstream has updated u-boot to v2023.01, but the update is causing
problems with some machines.  Temporarily add a v2022.10 recipe until
the issues can be resolved.

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-27 09:00:19 -05:00
Jon Mason 23feaec9b4 arm-bsp: add u-boot v2022.10 support
Upstream has updated u-boot to v2023.01, but the update is causing
problems with some machines.  Temporarily add a v2022.10 recipe until
the issues can be resolved.

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-27 08:51:52 -05:00
Daniel Díaz 99b769e6ce arm-bsp/firmware-image-juno: Fix deployment of compressed Image
A recent commit compressed the kernel image (to Image.gz) and
by default enabled an initramfs image. In the case for when
such that (initramfs) is not desirable, the deploy step of the
Juno firmware will still try to install the Image file, (not
Image.gz), so this fails:

  ERROR: firmware-image-juno-1.0-r0 do_deploy: ExecutionError('/oe/build/tmp-glibc/work/juno-oe-linux/firmware-image-juno/1.0-r0/temp/run.do_deploy.360477', 1, None, None)
  ERROR: Logfile of failure stored in: /oe/build/tmp-glibc/work/juno-oe-linux/firmware-image-juno/1.0-r0/temp/log.do_deploy.360477
  Log data follows:
  | DEBUG: Executing python function sstate_task_prefunc
  | DEBUG: Python function sstate_task_prefunc finished
  | DEBUG: Executing shell function do_deploy
  | cp: cannot stat '/oe/build/tmp-glibc/deploy/images/juno/Image': No such file or directory
  | WARNING: /oe/build/tmp-glibc/work/juno-oe-linux/firmware-image-juno/1.0-r0/temp/run.do_deploy.360477:152 exit 1 from 'cp -L -f /oe/build/tmp-glibc/deploy/images/juno/Image /oe/build/tmp-glibc/work/juno-oe-linux/firmware-image-juno/1.0-r0/image/juno-firmware-19.06/SOFTWARE/'
  | WARNING: Backtrace (BB generated script):
  | 	#1: do_deploy, /oe/build/tmp-glibc/work/juno-oe-linux/firmware-image-juno/1.0-r0/temp/run.do_deploy.360477, line 152
  | 	#2: main, /oe/build/tmp-glibc/work/juno-oe-linux/firmware-image-juno/1.0-r0/temp/run.do_deploy.360477, line 163
  NOTE: recipe firmware-image-juno-1.0-r0: task do_deploy: Failed
  ERROR: Task (../meta-arm/meta-arm-bsp/recipes-bsp/images/firmware-image-juno.bb:do_deploy) failed with exit code '1'

This updates the else case for when an initramfs image is not
in use so that the right kernel image is deployed, by using
the KERNEL_IMAGETYPE variable, to use either version of the
kernel image.

Signed-off-by: Daniel Díaz <daniel.diaz@linaro.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-26 15:00:11 -05:00
Peter Hoyes bf204866e8 arm: Use SRC* variables consistently
The SRC_URI, SRCREV AND SRCBRANCH variables are currently used
inconsistently across recipes in meta-arm, leading to difficulties
customizing the configuration in external BSP layers where necessary.

Standardize usage across commonly used recipes so that:
 * SRC_URI contains a SRC_URI_PACKAGE_NAME variable per component which
   can be used to easily configure a mirror. This variable uses
   default assignment so that it can be easily overridden using an
   environment variable, e.g. to point to an internal mirror that cannot
   be committed externally.
 * SRCBRANCH is defined per component.
 * SRCREV is defined per component.

Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-25 12:23:44 -05:00
Peter Hoyes d8383c11f3 classes: Set ARMLMD_LICENSE_FILE in the runfvp environment
For models that require a license, ARMLMD_LICENSE_FILE is used to define
the location of a license file or server. If the variable is not set in
Bitbake it will not be set in the model environment.

Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-23 09:00:17 -05:00
Peter Hoyes 1b8ee250f3 classes: Prevent passing None to the runfvp environment
FVP_ENV_PASSTHROUGH may contain variables that have not been set.
d.getVar returns None in this case. Detect this and skip setting the
variable in the model environment.

Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-23 09:00:17 -05:00
Peter Hoyes 94f28592ad classes: Define FVP_ENV_PASSTHROUGH variable dependencies
Define FVP_ENV_PASSTHROUGH's vardeps to equal itself, so that the
fvpconf is regenerated if any of the defined variables change.

Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-23 09:00:17 -05:00
Peter Hoyes 33b816e03a arm/lib: Add XAUTHORITY to runfvp environment
aa89fe3f ensured environment variables necessary for GUI applications
are passed through to the model despite runfvp env var restrictions. Add
XAUTHORITY to this list. This is useful when doing X-forwarding with
Kas, which creates its own home directory.

Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-23 09:00:17 -05:00
Jon Mason 9166b5deee external-arm-toolchain: Enable 12.2.rel1 support
Enable support for 12.2.rel1 binary toolchain release

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-20 10:00:09 -05:00
Jon Mason cf43a3c398 arm-toolchain: update Arm GCC to 12.2
Update the Arm GCC source to the latest version.  Also, update the GCC
patches to apply cleanly, removing those that are no longer relevant.

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-20 10:00:09 -05:00
Jon Mason 9b6457de82 arm/trusted-firmware-m: disable fatal warnings
Disable fatal warnings for tfm.  This removes issues with RWX and others
when using the new binary toolchain versions.

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-20 10:00:09 -05:00
Jon Mason 12cd5e1859 arm-bsp/trusted-firmware-m: corstone1000: TFM file clean-ups
Remove unnecessary spaces and commented out appends

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-20 10:00:09 -05:00
Jon Mason 0099eee0d0 arm-bsp/juno: Update kernel patches to the latest
Pulling in the latest juno kernel patches from
https://git.kernel.org/pub/scm/linux/kernel/git/sudeep.holla/linux.git

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-18 11:25:10 -05:00
Jon Mason 15e59127ee arm-bsp/juno: move to compressed initramfs image
Change u-boot and machine config to default to booting a compressed
initramfs.  This allows for easier testing.  A compressed image is
needed as the image is too big for the storage, and the error notifying
of such is vague.

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-18 11:25:10 -05:00
Ross Burton dc36e1de6b CI: remove obsolete install
Kas 3.2 ships python3-subunit, so we don't need to try to install that
anymore.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-18 11:25:10 -05:00
Ross Burton 513d085a16 CI: use 'kas dump' instead of manually catting files
Kas 3.2 has a 'dump' plugin, so use that instead of cat in a shell.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-18 11:25:10 -05:00
Ross Burton 6b98584ae3 CI: pass --update and --force-checkout to kas in pending-updates job
This job doesn't use the standard helpers, so needs to pass these
explicitly otherwise it can pick up an old SHA.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-18 11:25:10 -05:00
Abdellatif El Khlifi a51d4704cc arm-bsp/u-boot: Corstone1000: bump to v2022.10
Upgrade to v2022.10

This includes Corstone-1000 out of tree patches.

FF-A patches are the latest sent to U-Boot mailing list (v8).

Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-13 10:02:35 -05:00
Rui Miguel Silva 3f35573acb arm-bsp/u-boot: corstone500: bump to 2022.10
Rebase corstone500 u-boot patches to 2022.10 version.

Signed-off-by: Rui Miguel Silva <rui.silva@linaro.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-13 10:02:35 -05:00
Qi Feng a7d911310e arm-bsp/fvp-baser-aemv8r64: Rebase u-boot patches onto v2022.10
* 0004-armv8-ARMV8_SWITCH_TO_EL1-improvements.patch

  config ARMV8_SWITCH_TO_EL1 already exists in upstream.

Signed-off-by: Qi Feng <qi.feng@arm.com>
Issue-Id: SCM-4874
Change-Id: I690484a031bc7bfa1c9a0d8a145271874b26239a
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-13 10:02:35 -05:00
Ross Burton 314b3b2eb7 arm-bsp/fvp-base*: no need to remove rng-tools from openssh
Since oe-core 868dfb4 rng-tools is no longer depended on by openssh, so
we don't need to remove it ourself.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-13 10:02:35 -05:00
Ross Burton d3a0c441cd Revert "CI: revert a meta-clang change which breaks pixman (thus, xserver)"
meta-clang now builds pixman with GCC until this is resolved.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-13 10:02:35 -05:00
Ross Burton 725281582a CI: remove obsolete linux-yocto workarounds
Now we're using master these workarounds are not needed anymore.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-13 10:02:35 -05:00
Ross Burton fdf95798bc CI: switch back to master
We're now compatible with oe-core master, so update the CI to build
against master branches instead of langdale.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-13 10:02:35 -05:00
Ross Burton d9db8b7075 arm-toolchain: remove obsolete oe_import
The oe_import() function was removed in oe-core when addpylib was
added[1]. However, meta-arm-toolchain doesn't ship any library code so
this call doesn't do anything useful anyway.

[1] 1f56155e91da2030ee0a5e93037c62e1349ba89f

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-13 10:02:35 -05:00
Peter Hoyes bba5bc9138 arm: Add addpylib declaration
OE-core 4901c9d471cab99d52876842980222ce271b66e4 "base: Switch to use
addpylib directive and BB_GLOBAL_PYMODULES" means that ${LAYERDIR}/lib
is no longer searched by default when loading test controllers.

meta-arm defines some custom test controllers for testing FVPs, so add
an addpylib directive to meta-arm/conf/layer.conf to fix testimage on
FVPs.

testimage.bbclass still has its own test case loading logic based on
BBLAYERS, so other layers that only define test cases (not controllers
or other Python libraries) need no further changes.

Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Change-Id: I7fab638b4a1610d30efad2dae214378d096e0fc4
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-13 10:02:35 -05:00
Ross Burton 146e9a5178 meta-*: mark layers as compatible with mickledore only
oe-core's master branch is diverging from langdale and meta-arm will be
following this, so drop compatibility with langdale in master so we're
free to diverge too.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-13 10:01:42 -05:00
Peter Hoyes c0f3a83179 arm/scp-firmware: Disable cppcheck
The SCP-firmware CMake compile step automatically attempts to execute
cppcheck if both:
 * cppcheck can be located using find_program
 * DISABLE_CPPCHECK is not defined

cppcheck is not readily available in OE-core and is not an essential
part of the compilation process for end-users, so explicitly disable the
cppcheck step by passing DISABLE_CPPCHECK to CMake.

Additionally, because the OE-core CMake toolchain file cannot be used,
find_program may locate cppcheck on the host machine, which will cause
the build to fail if it is not the recommended version (as it is in
recent Linux distros).

Issue-Id: SCM-5864
Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Change-Id: Ia87a0cbbb67ac1d6f3b26cfb5747a85b46131f81
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-11 13:00:10 -05:00
Peter Hoyes f7fafc58a1 arm/scp-firmware: Ensure CMAKE_BUILD_TYPE is capitalized
If CMAKE_BUILD_TYPE=debug (lowercase), SCP-firmware builds with debug
compiler flags but BUILD_MODE_DEBUG is not defined in C code so features
that are conditionally enabled/disabled in debug mode are not active.

Pass capitalized "Debug" and "Release" strings to CMAKE_BUILD_TYPE to
ensure Debug mode is fully enabled when SCP_BUILD_RELEASE = "0".

SCP_BUILD_RELEASE = "1" (the default) for all machines in meta-arm-bsp
so they are unaffected.

Issue-Id: SCM-5864
Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Change-Id: I93220420eedd2e3e6c169679efcaf4642dd5bc51
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-11 13:00:10 -05:00
Theodore A. Roth 393e37c90e arm/optee-os: Fix FILESEXTRAPATHS
The include file should be pointing to `optee-os-3.19.0` instead of
`optee-os-3_19` (which does not exist).

Fixes: 3259a2a840 ("arm/optee: support optee 3.19")
Signed-off-by: Theodore A. Roth <theodore_roth@trimble.com>
Signed-off-by: Theodore A. Roth <troth@openavr.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-10 13:00:08 -05:00
Peter Hoyes 5c42f084f7 arm/classes: Ensure patch files are sorted in apply_local_src_patches
apply_local_src_patches.bbclass was added in a previous patch to handle
the application of patch files located inside the fetched source code.

find is used to collect the patch files which does not guarantee the
order of its output. Pipe the output of find into sort to ensure patch
files are applied in the correct order.

Issue-Id: SCM-5864
Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Change-Id: I1082fb7a726a7745289a5aa8bb6447bef57a94b0
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-10 06:00:08 -05:00
Ross Burton ddc67dc4bb CI: don't pin fvp-base jobs to x86-64
Now that the FVP is available for both aarch64 and x86-64, don't set a
tag so this can run on both architectures.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-09 13:00:08 -05:00
Ross Burton 0c4bfbe40a arm/fvp-base-a-aem: add support for aarch64 binaries
There is now a beta release of the Base-A AEM FVP for aarch64!

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-09 13:00:08 -05:00
Ross Burton befd9f1567 arm/fvp-envelope: update HOMEPAGE
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-09 13:00:08 -05:00
Ross Burton 8015efe2f1 arm/fvp-envelope: name the FVP tarballs for checksums
We can download both x86-64 and aarch64 binaries, so ensure the SRC_URI
entry is named to identify them.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-09 13:00:08 -05:00
Emekcan Aras a6211b6067 arm/qemuarm-secureboot: pin optee-os version
There is a new optee version 3.19. Currently, qemuarm-secureboot cannot boot
optee 3.19 out-of-the-box. This pins optee-os version to 3.18 for
qemuarm-secureboot.

Signed-off-by: Emekcan Aras <emekcan.aras@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-08 12:41:08 -05:00
Emekcan Aras 529d18e8a5 arm-bsp/optee-os: N1SDP support for optee-os 3.19
From: Emekcan <emekcan.aras@arm.com>

Adds build configuration to support optee-os 3.19 for N1SDP.
Also, it patches optee-os to support external DT for N1SDP.

Signed-off-by: Emekcan <emekcan.aras@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-08 12:41:08 -05:00
Emekcan Aras 3d9c97a0cc arm-bsp/optee-os: Adds 3.19 bbappend
From: Emekcan <emekcan.aras@arm.com>

This commit adds bbappend file for new optee-os 3.19 version.

Signed-off-by: Emekcan <emekcan.aras@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-08 12:41:08 -05:00
Emekcan Aras 3259a2a840 arm/optee: support optee 3.19
From: Emekcan <emekcan.aras@arm.com>

This commits adds a recipe to support optee-os 3.19.

Signed-off-by: Emekcan Aras <emekcan.aras@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-08 12:41:08 -05:00
Emekcan Aras b061104c87 arm/optee: Move optee-3.18 patches
Moves optee-3.18 and optee-tadevkit patches into
related directories.

Signed-off-by: Emekcan Aras <emekcan.aras@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-08 12:41:08 -05:00
Khem Raj ef20a1c9b5 gn: Replace lfs64 functions with original counterparts
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-08 12:41:08 -05:00
Adam Johnston 74f0ce7028 arm/trusted-services: Fix 'no such file' when building libts
The libts recipe assumes generated cmake file will be suffixed with
'-noconfig'. This is only true when building with the default type
i.e. "".

Check which target cmake file has been generated before trying to
patch it. This fixes 'no such file' error when building with an
explicit type (Debug, Release, etc).

Signed-off-by: Adam Johnston <adam.johnston@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-08 12:41:08 -05:00
Mohamed Omar Asaker 95f83818ab arm-bsp/trusted-firmware-m: Remove TF-M 1.6 recipe
Remove old version recipe after adding TF-M 1.7 recipe

Signed-off-by: Mohamed Omar Asaker <mohamed.omarasaker@arm.com>
2023-01-05 11:35:52 +00:00
Mohamed Omar Asaker a57d99be63 arm-bsp/musca_b1: Edit the platform name
The Platform name in TFM has changed
from arm/musca_b1/sse_200 to arm/musca_b1

Signed-off-by: Mohamed Omar Asaker <mohamed.omarasaker@arm.com>
2023-01-05 11:32:40 +00:00
Mohamed Omar Asaker 9952e98bb5 arm-bsp/trusted-firmware-m: corstone1000: TFM 1.7
Add TFM corstone append file for v1.7

Signed-off-by: Mohamed Omar Asaker <mohamed.omarasaker@arm.com>
2023-01-05 11:32:40 +00:00
Mohamed Omar Asaker 64b51c5e5c arm-bsp/trusted-firmware-m: Bump TFM to v1.7
Create tfm recipe for v1.7.x

Signed-off-by: Mohamed Omar Asaker <mohamed.omarasaker@arm.com>
2023-01-05 11:32:40 +00:00
Mohamed Omar Asaker 4d87fe01d1 arm-bsp/trusted-services: corstone1000: Use the stateless platform service calls
Apply patch to use the stateless platform service calls

Calls to psa_connect is not needed and psa_call can be called
directly with a pre defined handle.

Signed-off-by: Mohamed Omar Asaker <mohamed.omarasaker@arm.com>
2023-01-05 11:32:40 +00:00