1
0
mirror of https://git.yoctoproject.org/meta-arm synced 2026-04-20 11:29:54 +00:00
Commit Graph

2295 Commits

Author SHA1 Message Date
Drew Reed
0e3fc3d87b ci: Add Corstone-1000 to the SystemReady ACS build
Added the Corstone-1000 FVP platform to the ACS test build as well as
adding the arm-systemready-firmware variant to the Corstone-1000 FVP
build.

Signed-off-by: Drew Reed <Drew.Reed@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 13:00:07 -04:00
Drew Reed
3b97565103 arm-bsp/corstone1000: Update Corstone-1000 user guide
Update the Corstone-1000 user guide with the new instructions on how to
build/use an ESP image and how to use the meta-arm-systemready layer to
run the ACS tests.

Signed-off-by: Drew Reed <Drew.Reed@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 13:00:07 -04:00
Drew Reed
eed6bc24d1 arm-bsp: corstone1000: Make ESP partition available to Corstone-1000
The SystemReady IR ACS test suite require that there is a valid ESP
partition available to the system.  This change creates a new image that
only contains a ESP partition and ensures it's mounted on the second MMC
card so it's available when the SystemReady tests run.
The diagnostic level of the 2 MMC cards have also been lowered to
improve the ACS test duration.
Corrected a spelling mistake in the corstone1000-flash-firmware-image.bb
file.

Signed-off-by: Drew Reed <Drew.Reed@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 13:00:07 -04:00
Drew Reed
1fd614e545 arm-bsp: corstone1000: Configure Corstone-1000 to use the meta-arm-systemready layer
Added the missing meta-arm-systemready required variable to enable its
use with the corstone1000-fvp machine.  Also explicitly set all the
consoles.

Signed-off-by: Drew Reed <Drew.Reed@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 13:00:07 -04:00
Drew Reed
67f9756fa0 arm: Handle nodistro in firmware deployment
The nodistro settings in poky set the TMPDIR variable to include the
TCLIBC value so we need to spot that and swap the TCLIBC for the musl
one used in the firmware multiconfig.

Signed-off-by: Drew Reed <Drew.Reed@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 13:00:07 -04:00
Drew Reed
97e0c91f79 arm-systemready: Fix regex in arm-systemready-ir-acs recipe
The regex used to validate compatible machines is incorrect as it's only
checking the machine name starts with "fvp" not "fvp-" as intended.
It's also been modified to allow FVPs called xxx-fvp to be compatible
with Corstone-1000.

Signed-off-by: Drew Reed <Drew.Reed@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 13:00:07 -04:00
Emekcan Aras
e20aac1b6b arm-bsp/trusted-firmware-a: corstone1000: Remove unused NS_SHARED_RAM region
After enabling additional features in Trusted Services, the size of BL32
image (OP-TEE + Trusted Services SPs) is larger now. To create more space
in secure RAM for BL32 image, this patch removes NS_SHARED_RAM region which
is not currently used by corstone1000 platform.

Signed-off-by: Emekcan Aras <emekcan.aras@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 12:00:19 -04:00
Harsimran Singh Tungal
25eec5ced2 arm-bsp/u-boot: corstone1000: Enable UEFI secure boot
This change enables the UEFI secure boot and its related configurations
for corstone1000

Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 12:00:19 -04:00
Harsimran Singh Tungal
12711d5734 arm-bsp: corstone1000: Enable SMM gateway authenticated variables
This change enables the SMM gateway authenticated variables feature
implementation for Corstone1000

Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 12:00:19 -04:00
Bence Balogh
5d9e53af10 arm-bsp/corstone1000-flash-firmware-image: fix capsule dependency issue
Signed-off-by: Bence Balogh <bence.balogh@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 12:00:07 -04:00
Bence Balogh
aeade01bb7 arm-bsp/documentation: corstone1000: update capsule generation steps
The .nopt and capsule are generated during the yocto build. Sync the
documentation with the changes.

Signed-off-by: Bence Balogh <bence.balogh@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 12:00:07 -04:00
Bence Balogh
b5b7b8e523 arm/uefi_capsule: use U-Boot for capsule generation
Currently, only the Corstone-1000 platform uses the capsule generation
class. Corstone-1000 uses U-Boot instead of EDK2. With this change,
the dependency on EDK2 was removed.

Signed-off-by: Bence Balogh <bence.balogh@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 12:00:07 -04:00
Bence Balogh
3b74bb36fd arm-bsp/corstone1000-flash-firmware-image: add nopt generation
The .nopt image is used during the UEFI Update Capsule generation.
This .nopt image was generated manually when it was needed.

Signed-off-by: Bence Balogh <bence.balogh@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 12:00:07 -04:00
Mikko Rapeli
c43f173276 ci/qemuarm-secureboot.yml: install optee and test both optee and ftpm
optee-os test xtest needs additional test trusted applications (TA) from
optee-os-ta package to pass. Execution time for ftpm test is around 21
seconds and 596 seconds for optee-test/xtest on an x86_64 build machine.

Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 09:00:08 -04:00
Mikko Rapeli
70e7f64af6 ci/qemuarm64-secureboot.yml: install optee and test both optee and ftpm
optee-os test xtest needs additional test trusted applications (TA) from
optee-os-ta package to pass. Execution time for ftpm test is around 18
seconds and 430 seconds for optee-test/xtest on an x86_64 build machine.

Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 09:00:08 -04:00
Mikko Rapeli
ba315f7242 oeqa runtime: add ftpm.py test
Test checks that ftpm kernel driver interfaces are available.
If fTPM optee TA is missing or crashes, the kernel driver does not
show the interfaces. A more functional tests would be to use tpm2-tools
from meta-security/meta-tpm but those require additional layer
dependencies which are maybe too much for now. tpm2-tools also depend
on starting tpm2-abrmd before the tools work. The ftpm kernel driver
depends on fully running tee-supplicant in userspace and the optee
side ftpm TA which takes some time. When manually running the tests
some of them failed since ftpm was not yet initialized. The boot
was not complete in those cases so added a workaround for that.
Better would be for all of the tests to start only once boot is
complete, not when ssh is available. Also, the qemuarm64-secureboot
machine includes optee and ftpm TA but does u-boot is not configured
to use the TPM device so boot is not measured.

Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 09:00:08 -04:00
Mikko Rapeli
d450786667 oeqa runtime: add optee.py test
The test runs xtest test suite from optee-tests package.

Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 09:00:08 -04:00
Mikko Rapeli
1dad884ac0 optee-os: inrease heap size with fTPM
If firmware TPM TA is compiled into optee, it needs a bit more
heap to pass optee-test/xtest suite.

Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 09:00:08 -04:00
Mikko Rapeli
0923cc8a20 trusted-firmware-a: continue if TPM device is missing
All other firmware boot components also continue booting
if TPM is not found. It is up to subsequent SW components
to e.g. fail if rootfs can't be decrypted. Enables policies
like fall back to unencrypted rootfs if TPM device is
not found with qemu and swtpm.

Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 09:00:08 -04:00
Ross Burton
8399d913a9 CI: build arm-systemready distro images
There are two recipes in meta-arm-systemready that download ISOs for
testing purposes.  Build them in CI to verify that the fetch is
successful.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 09:00:04 -04:00
Ross Burton
d89d05d9aa arm-systemready/arm-systemready-linux-distros: disable buildhistory
These recipes look like images but are not constructed the same way,
specifically there is no WORKDIR/rootfs/ directory. If buildhistory is
enabled this will cause it to abort, so disable image data collection in
buildhistory.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-30 09:00:04 -04:00
Ross Burton
9649cdcf77 CI: disable ptest in external-gccarm builds
We recently switched the CI to not disable ptest, but this breaks builds
that use the GCC binaries built by Arm (external-arm-toolchain). This is
because the external-arm-toolchain recipe can't build packages for the
target, and the standard oe-core gcc recipes assume that they're being
built with themselves and make assumptions, specifically that libunwind
was enabled and headers can be copied directly from the sysroot.

This is a bigger problem that should be solved somehow, but for now we
can just remove ptest in the external-gccarm CI jobs which removes gcc
from the builds (it comes in via elfutils-ptest RDEPENDS).

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-29 17:00:18 -04:00
Ross Burton
e89cd1fe41 CI: remove 32-bit time_t workaround
This is now in the recipe itself, so remove it from CI.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-29 17:00:18 -04:00
Ross Burton
b6a47cd180 external-arm-toolchain: ignore warnings about 32-bit time types
Functions that take 32-bit time_t types are unavoidable in the libc, so
ignore the warnings.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Reviewed-by: Denys Dmytriyenko <denis@denix.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-29 17:00:18 -04:00
Ross Burton
fef5eafc08 CI: temporarily backport the procps fix
This patch will be merged upstream soon, apply it locally to unblock CI.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-29 17:00:18 -04:00
Ross Burton
68fe673cc9 CI: add Kas schema comments
Add YAML language server comments so that IDEs know what schema to use
for the Kas files.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-29 17:00:18 -04:00
Bence Balogh
f63c043ba7 arm-bsp/trusted-firmware-m: replace OpenAMP with RSE Comms
Signed-off-by: Bence Balogh <bence.balogh@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-29 17:00:11 -04:00
Bence Balogh
db2284fc01 arm-bsp/trusted-services: rebase corstone1000 patches
Signed-off-by: Bence Balogh <bence.balogh@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-29 17:00:11 -04:00
Gyorgy Szing
798c0a8257 arm/trusted-services: fix oeqa script
trusted_services.py:test_15_crypto_service runs ts-service test with
an incorrect argument list. The -g argument does not accept two group
names. This resulted in a silent failure.
Fix this by relying the pattern matching capability of the argument.

Additionaly remove references to OP-TEE from test messages as TS tests
are SPMC agonistic.

Signed-off-by: Gyorgy Szing <gyorgy.szing@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-29 17:00:11 -04:00
Gyorgy Szing
2d46f21731 arm/trusted-services: update to 2024 April 19
Update TS and dependencies to latest version of the integration branch.
Remove patches merged upstream.

Signed-off-by: Gyorgy Szing <Gyorgy.Szing@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-29 17:00:11 -04:00
Gyorgy Szing
fa05df1611 Add support for the TS Firmware Update service
Add a recipe to enable building and deploying the FWU service
implemented in the Trusted Services Project. The FWU service can
help vendors to meet PSA certification requirements.

Signed-off-by: Gyorgy Szing <gyorgy.szing@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-29 17:00:11 -04:00
Jon Mason
b972dabc1b CI: use scarthgap branch for meta-clang
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-29 17:00:11 -04:00
Ross Burton
0f955984ec arm-bsp/u-boot: add optimised timer implementation for fvp-base
Due to how the timer in u-boot is implemented, it's quite possible for
a two second timeout in the u-boot login to actually take over 15s to
expire.

Take a patch from the mailing list to implement this differently so the
timer runs in an accurate amount of time.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-29 17:00:11 -04:00
Abdellatif El Khlifi
31de2fada2 arm-bsp/linux-yocto: corstone1000: add external system control support
add support for the remoteproc control feature for the external system

With this feature we can switch on/off the external system on demand:

echo stop > /sys/class/remoteproc/remoteproc0/state
echo start > /sys/class/remoteproc/remoteproc0/state

During Linux boot the remoteproc subsystem automatically start
the external system. The user can use the commands above to
stop then start the remote core.

Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-29 17:00:11 -04:00
Abdellatif El Khlifi
41a848cc93 arm-bsp/u-boot: corstone1000: add external system DTS node
describe the external system as a remoteproc node in the device tree

Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-29 17:00:11 -04:00
Abdellatif El Khlifi
26d48f7322 arm-bsp/external-system: costone1000: install the firmware in the filesystem
install the external system binaries under /lib/firmware

The kernel's remoteproc subsystem expects the firmware file to be under /lib/firmware

Signed-off-by: Abdellatif El Khlifi <abdellatif.elkhlifi@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-29 17:00:10 -04:00
Ross Burton
0bc288f0f2 CI: show the evaluated KASFILES
When trying to replicate a build locally, having the exact list of Kas
files that was used is very useful.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-29 17:00:10 -04:00
Jon Mason
6e9525115b CI: add Yocto Project SSTATE Mirror
Add the Yocto Project public SSTATE mirror to its own unique yml file.
This allows for developers to use this to speed up builds, while not
adding in the default case.  This "off by default" is because it can add
10s of minutes to each build, which might not be beneficial to those who
are using SSTATE dir locally.

Also, removing the removal ptest distro feature, as this change prevents
an optimal usage of the YP SSTATE mirror (~30% match to ~90% match for
qemuarm64).

Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-23 14:08:41 -04:00
Ross Burton
0fabb8c3dd CI: sort jobs alphabetically
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-23 14:08:31 -04:00
Ross Burton
10e23fe1df arm: remove generic-arm64 and qemu-generic-arm64
These BSPs are now obsolete.

Users of generic-arm64 should use genericarm64 from meta-yocto-bsp.

Users of qemu-generic-arm64 should use sbsa-ref from meta-arm-bsp.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-23 14:08:19 -04:00
Ross Burton
a86f62f144 arm-bsp: add new sbsa-ref machine
This is mostly based on the existing qemu-generic-arm64 machine, but by
not being based on the genericarm64 and instead being specifically a
machine to run on the qemu sbsa-ref machine we get to tune differently.

Specifically, this configures sbsa-ref to be a Neoverse N2 (v9), and the
tune is set to match.  Another notable difference to qemu-generic-arm64
is that the kernel configuration is at present defconfig.  We may wish
to change this in the future to be the same fragmented configuration as
genericarm64.

We have to ignore two testimage parselogs failures: one from NUMA which
will be fixed in a future EDK2 release, and one from efifb where we
should be using the bochsdrm driver instead (further investigation is
needed)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-23 14:07:56 -04:00
Ross Burton
9c6330a0b1 CI: add genericarm64
Add the new genericarm64 in meta-yocto-bsp to the CI.

This new BSP is heavily based on the meta-arm generic-arm64 machine, but
with an all-new fragmented kernel configuration.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-23 14:04:25 -04:00
Ross Burton
77ebe8b8cc ci/testimage: don't :append to IMAGE_FEATURES
Some BSPs use a proper initramfs and putting a SSH server into them
via this :append isn't ideal.  Adding using += should be sufficient.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-23 14:04:13 -04:00
Ross Burton
196caca51b arm-bsp/linux-yocto-rt: include linux-arm-platforms unconditionally
Every platform should have the chance to try the -rt patches.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-23 14:04:13 -04:00
Ross Burton
11b8298439 arm/classes/wic_nopt: remove unused class
This class is no longer used by any machines, so remove it.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-23 14:04:13 -04:00
Bence Balogh
a1b5347b39 arm-bsp/trusted-services:cs1000: fix deployments
- The Secure Enclave Proxy Secure Partition fails at psa_call()
because wrong parameter was passed.
- The SMM Gateway initialization failed because a malloc()
returned a NULL pointer. The SMM_GATEWAY_MAX_UEFI_VARIABLES
had to be decreased to avoid this.
- Increase shared memory buffer size and add buildtime check
- Use __packed for the variable_metadata struct

Signed-off-by: Bence Balogh <bence.balogh@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-23 14:01:59 -04:00
Gyorgy Szing
75d6fc1916 arm-bsp/trusted-services: rebase corstone1000 patches
Signed-off-by: Gyorgy Szing <Gyorgy.Szing@arm.com>
Signed-off-by: Bence Balogh <bence.balogh@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-23 14:01:59 -04:00
Bence Balogh
ecb0b05148 arm-bsp/u-boot: corstone1000: update TS RPC protocol
The Trusted Services v1.0 uses new RPC protocol and the message
fields in u-boot had to be synchronized.

Signed-off-by: Bence Balogh <bence.balogh@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-23 14:01:59 -04:00
Gyorgy Szing
eeb6441ac6 arm-bsp: enable Trusted Services on the fvp-base platform
Add configuration settings to TF-A, OP-TEE and TS SPs needed to get TS
built and run on the fvp-base machine.

Signed-off-by: Gyorgy Szing <gyorgy.szing@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-23 14:01:59 -04:00
Gyorgy Szing
a130541e92 arm/devtools/fvp-base-a-aem: update the AEM FVP to 11.25.15
Version v11.25 was released and it fixes measured boot. Update the
recipe and integrate the new version.

The pattern of the download URL has changed. Add functionality to
calculate a new URL fragment from the package version.

Signed-off-by: Gyorgy Szing <gyorgy.szing@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-04-23 14:01:59 -04:00