1
0
mirror of https://git.yoctoproject.org/meta-arm synced 2026-05-07 04:58:57 +00:00
Commit Graph

1774 Commits

Author SHA1 Message Date
Peter Hoyes 81aaae5754 arm/classes: Factor out image signing arguments in tfm_image_sign
Factor out the image signing arguments in tfm_image_sign.bbclass into
its own variable, TFM_IMAGE_SIGN_ARGS, so that it can be customized on a
per-machine basis if necessary.

Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-22 08:00:09 -05:00
Peter Hoyes 1f6d2b2692 arm/trusted-firmware-m: Synchronize with 1.7.0 release
Update the TF-M image signing scripts to use the TF-M 1.7.0 sources, so
it is in sync with the TF-M recipe itself.

Synchronize the trusted-firmware-m and -scripts Python dependencies
with the in-repo requirements.txt files. This requires a recipe to be
carried for pyhsslms.

1.7.0 introduces the --measured-boot-record argument to the image
signing script, which is required to maintain existing behavior. Add it
to the arguments in the tfm_sign_image bbclass.

Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-22 08:00:09 -05:00
Mohamed Omar Asaker 19452d568f arm-bsp/trusted-firmware-m:corstone1000: Set SPM backend to IPC
TF-M provides IPC as a SPM backend which gives SPM and each Secure Partition
it's own execution context. And provides higher isolation levels.

corstone1000 isolation level is 2. Hence, switching to IPC backend.

Signed-off-by: Mohamed Omar Asaker <mohamed.omarasaker@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-21 13:00:09 -05:00
Mohamed Omar Asaker b3ac88b4e8 arm-bsp/trusted-firmware-m:corstone1000: Increase number of assets
As Corstone1000 stores at boot time few efi variables.
Therefore, number of assets is increased to compansate this early usage.

Note: Adding platform customized configs to config_tfm.h
      More information see:
https://tf-m-user-guide.trustedfirmware.org/configuration/header_file_system.html

Signed-off-by: Mohamed Omar Asaker <mohamed.omarasaker@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-21 13:00:09 -05:00
Mohamed Omar Asaker cbe0ce7992 arm-bsp/trusted-services: corstone1000: Disable SHA512/384
corstone1000 cryptocell (the HW accelerator) doesn't support SHA384/SHA512
Note: TF-Mv1.7 disables the software fallback

Signed-off-by: Mohamed Omar Asaker <mohamed.omarasaker@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-21 11:33:08 -05:00
Mohamed Omar Asaker 1fdb75d465 arm-bsp/trusted-services:corstone1000: disable obsolete algorithms for crypto
Disable obsolete algorithms in the psa-crypto configs

Signed-off-by: Mohamed Omar Asaker <mohamed.omarasaker@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-21 11:33:08 -05:00
Mohamed Omar Asaker fd3b56802e arm-bsp/trusted-services: corstone1000:Align psa crypto client with TF-Mv1.7
This change adds patches to align psa crypto client of TS with TF-Mv1.7
running on secure enclave of corstone1000
The patches updating
- PSA Crypto SID defines values
- psa_ipc_crypto_pack_iovec structure
- Fix inputs and outputs passed to in/out_vec to match crypto service
  expectations

Signed-off-by: Mohamed Omar Asaker <mohamed.omarasaker@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-21 11:33:08 -05:00
Ross Burton 047be751ca arm/optee-os: add missing patch header
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-20 13:02:55 -05:00
Ross Burton 69b73682b3 arm-toolchain/gcc-arm: add missing Signed-off-by tag
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-20 13:02:55 -05:00
Peter Hoyes c5bf035490 CI: Collect testimage logs on failure
Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-16 12:51:33 -05:00
Peter Hoyes ae3b219887 CI: Factor out CACHE_DIR to improve mirror configurability
Mirrors of meta-arm may have the persistent cache directory mounted in a
different place. To make it easier to configure, define this location
using a single $CACHE_DIR variable.

Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-16 12:51:33 -05:00
Ross Burton 402cfcc4e8 CI/machine-summary: add missing recipes
Add missing recipes to the update report.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-16 12:51:33 -05:00
Ross Burton 93f5170eb2 arm/boot-wrapper-aarch64: tell upgrade checker to look for new SHAs
This repository doesn't tag releases, so just track the latest SHA.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-16 12:51:33 -05:00
Peter Hoyes 7fee7ee600 arm-bsp/classes: Use :append to add to IMAGE_TYPES in wic_nopt
IMAGE_TYPES += "wic.nopt" is effective if the bbclass is included
using IMAGE_CLASSES, but not if included directly (using inherit) due to
file parse ordering.

To support applying wic_nopt locally (i.e. for certain image recipes but
not others), change to use :append.

Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-16 12:51:33 -05:00
Peter Hoyes 557e89242e arm,arm-bsp/classes: Move wic_nopt to meta-arm
To support using the wic_nopt bbclass from BSP layers other than
meta-arm-bsp, move it to meta-arm.

Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-16 12:51:33 -05:00
Gowtham Suresh Kumar ac39c6d4cc arm-bsp/uefi_capsule: Use json file to pass capsule config
This patch uses the json config file for UEFI capsule generation
as this is efficient and easily scalable to generate multiple
capsules.

Signed-off-by: Gowtham Suresh Kumar <gowtham.sureshkumar@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-15 14:56:54 -05:00
Gowtham Suresh Kumar ae0dd2a58c arm/edk2-basetools: Convert edk2 basetools recipes to native only
The BBCLASSEXTEND configuration can generate native sdk and target
recipes as well. The cp command used in do_install will
create host contamination issues for these recipes, so this patch
makes the recipe native only.

Signed-off-by: Gowtham Suresh Kumar <gowtham.sureshkumar@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-15 08:19:16 -05:00
Gowtham Suresh Kumar 3af64cee5b arm-bsp/corstone1000-image: Generate UEFI capsule for corstone1000 platform
Inherits the UEFI capsule generation class and configures the capsule
variables for the wic.nopt image

Signed-off-by: Gowtham Suresh Kumar <gowtham.sureshkumar@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-12 12:51:27 -05:00
Gowtham Suresh Kumar f0945f499c arm-bsp/uefi_capsule: Add UEFI capsule generation class
This class currently supports only a single firmware binary. The
required capsule parameters needs to be set, if not the build fails.

Signed-off-by: Gowtham Suresh Kumar <gowtham.sureshkumar@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-12 12:51:27 -05:00
Gowtham Suresh Kumar 5914ae11f4 arm/edk2-basetools: Add edk2 base tool native recipe
The native recipe installs the UEFI capsule generation tool
along with the other base tools to native sysroot.

Signed-off-by: Gowtham Suresh Kumar <gowtham.sureshkumar@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-12 12:51:27 -05:00
Ross Burton 79b44a4d32 arm/trusted-firmware-m: Do not use release branches
TF-M does not use persistent release branches and the release-* branches
have been removed from the repository, so switch the branches to master.

Also update the tf-m-tests SRVREV to the 1.7.0 tag, not the RC2.

99% based on a patch by Peter Hoyes <Peter.Hoyes@arm.com>.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-12 12:51:27 -05:00
Ross Burton 0617555fa5 arm/linux-yocto: remove obsolete 5.19 bbappend
This bbappend is only used by qemuarm*, which now use 6.1, so this can
be removed.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-12 12:51:27 -05:00
Ross Burton 3d39ae853c arm-bsp/linux-yocto: add 5.19 kernel recipe for N1SDP
Currently the N1SDP patches haven't been ported to 6.1 and the
port/testing isn't trivial. Until the relevant team has done the port to
6.1, carry a 5.19 kernel in meta-arm-bsp for N1SDP.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-12 12:51:27 -05:00
Ross Burton 0d7489a055 arm-bsp/external-system: fix the gen_module race, again
Apply the patch from scp-firmware to the third copy of the buggy
Makefiles which fail randomly under parallel builds.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-12 12:51:27 -05:00
Jon Mason dc10b73cc5 arm/linux-yocto: avoid kernel defconfig warning
2 symbols were added to the arm64 kernel defconfig without the
corresponding code.  Remove these unnecessary pieces to avoid the
warning.

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-04 12:11:41 -05:00
Khem Raj 70fbe7fe12 sbsa: Fix build with gcc13
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-04 04:52:21 -05:00
Khem Raj 37fd476ae1 gator-daemon: Fix build with gcc13
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-04 04:52:21 -05:00
Rui Miguel Silva 894e309eaf arm-bsp/corstone1000: bump kernel version to v6.1
Bump kernel version to v6.1 and rebase the patches on
top of this new version.

Signed-off-by: Rui Miguel Silva <rui.silva@linaro.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-04 04:52:21 -05:00
Rui Miguel Silva 03574e9173 arm-bsp: corstone500: bump kernel version to 6.1
Bump corstone500 kernel version to 6.1 and drop the not
longer needed patch regarding the SND_SOC_AC97 config
option in multi_v7.

Signed-off-by: Rui Miguel Silva <rui.silva@linaro.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-04 04:52:21 -05:00
Rui Miguel Silva 30796fb798 arm-bsp/corstone1000: bump u-boot version to 2023.01
Bump corstone1000 to u-boot version 2023.01, as at it
do some trailing spaces cleanup.

Signed-off-by: Rui Miguel Silva <rui.silva@linaro.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-04 04:52:21 -05:00
Rui Miguel Silva 5577b38164 arm-bsp/corstone500: bump u-boot version to 2023.01
Rebase patches and bump version to u-boot 2023.01.

Signed-off-by: Rui Miguel Silva <rui.silva@linaro.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-04 04:52:21 -05:00
Rui Miguel Silva 47872289ae kas/corstone1000: move from langdale to master
Make sure the master branch track the other masters instead
of being lock to langdale.

Signed-off-by: Rui Miguel Silva <rui.silva@linaro.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-04 04:52:21 -05:00
Rui Miguel Silva 4704bf1292 meta-arm: add build to gitignore
To avoid having always tools that depend on git ls or other
git plumbing to include and spin around the enormous content of
the build directory.

Just add it to the ignore file and make that build content,
that will never get in the repo invisible to git and tools.

Signed-off-by: Rui Miguel Silva <rui.silva@linaro.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-02-04 04:52:21 -05:00
Ross Burton 8891820e97 CI: pin to kas 3.2 as 3.2.1 fails
For some reason the kas 3.2.1 container fails:

No such file or directory: '/builds/engineering/yocto/meta-arm/ci/ci/base.yml'

Note the repeated /ci/, which is wrong.

Pin the kas container to 3.2 for now until this is resolved.

Signed-off-by: Ross Burton <ross.burton@arm.com>
2023-02-04 09:39:53 +00:00
Ross Burton 7ac8d1e2a5 arm-bsp/corstone*00: disable openssl in kmod
The initramfs needs to be very small, but since oe-core d6a62e kmod has
enabled OpenSSL support which doubles the size of the initramfs,
resulting in boot failures.

Signed-off-by: Ross Burton <ross.burton@arm.com>
2023-02-01 10:49:29 +00:00
Jon Mason aecbb77f72 arm-bsp/fvp-base: update kernel config to remove warning
With the 6.1 kernel, fvp-base logs the warning:
    [NOTE]: 'CONFIG_ARM_CPUIDLE' last val (y) and .config val (n) do not match

This is because the kernel idle configs have changed.  Remove this
entry, as it is no longer necessary.

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-28 15:36:31 -05:00
Jon Mason b1a9035176 arm-bsp/juno: update kernel patches for 6.1
Update kernel patches and configs for the v6.1 kernel.  Previously, it
was using the linux defconfig as a starting point.  It is now using the
local kernel metadata.

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-28 15:36:31 -05:00
Jon Mason e545d4ce5d arm-bsp/juno: update to use u-boot v2023.01
Update the compressed kernel patch and drop the unnecessary custom
bootcmd patch.

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-28 15:36:31 -05:00
Jon Mason 834f5aa990 arm/qemuarm-secureboot: Changes for v2023.01 u-boot
Update qemuarm-secureboot to work with the latest u-boot version and
remove the old, unneeded version from meta-arm

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-27 13:50:44 -05:00
Anton Antonov 3d51e1117d arm/kernel: Update ARM-FFA kernel drivers
New arm-ffa-tee and arm-ffa-user drivers are compatible with 5.* and 6.1 kernels.

Signed-off-by: Anton Antonov <Anton.Antonov@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-27 11:00:07 -05:00
Jon Mason 508ed52a4f arm-bsp: add u-boot v2022.10 support
Upstream has updated u-boot to v2023.01, but the update is causing
problems with some machines.  Temporarily add a v2022.10 recipe until
the issues can be resolved.

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-27 09:00:19 -05:00
Jon Mason 23feaec9b4 arm-bsp: add u-boot v2022.10 support
Upstream has updated u-boot to v2023.01, but the update is causing
problems with some machines.  Temporarily add a v2022.10 recipe until
the issues can be resolved.

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-27 08:51:52 -05:00
Daniel Díaz 99b769e6ce arm-bsp/firmware-image-juno: Fix deployment of compressed Image
A recent commit compressed the kernel image (to Image.gz) and
by default enabled an initramfs image. In the case for when
such that (initramfs) is not desirable, the deploy step of the
Juno firmware will still try to install the Image file, (not
Image.gz), so this fails:

  ERROR: firmware-image-juno-1.0-r0 do_deploy: ExecutionError('/oe/build/tmp-glibc/work/juno-oe-linux/firmware-image-juno/1.0-r0/temp/run.do_deploy.360477', 1, None, None)
  ERROR: Logfile of failure stored in: /oe/build/tmp-glibc/work/juno-oe-linux/firmware-image-juno/1.0-r0/temp/log.do_deploy.360477
  Log data follows:
  | DEBUG: Executing python function sstate_task_prefunc
  | DEBUG: Python function sstate_task_prefunc finished
  | DEBUG: Executing shell function do_deploy
  | cp: cannot stat '/oe/build/tmp-glibc/deploy/images/juno/Image': No such file or directory
  | WARNING: /oe/build/tmp-glibc/work/juno-oe-linux/firmware-image-juno/1.0-r0/temp/run.do_deploy.360477:152 exit 1 from 'cp -L -f /oe/build/tmp-glibc/deploy/images/juno/Image /oe/build/tmp-glibc/work/juno-oe-linux/firmware-image-juno/1.0-r0/image/juno-firmware-19.06/SOFTWARE/'
  | WARNING: Backtrace (BB generated script):
  | 	#1: do_deploy, /oe/build/tmp-glibc/work/juno-oe-linux/firmware-image-juno/1.0-r0/temp/run.do_deploy.360477, line 152
  | 	#2: main, /oe/build/tmp-glibc/work/juno-oe-linux/firmware-image-juno/1.0-r0/temp/run.do_deploy.360477, line 163
  NOTE: recipe firmware-image-juno-1.0-r0: task do_deploy: Failed
  ERROR: Task (../meta-arm/meta-arm-bsp/recipes-bsp/images/firmware-image-juno.bb:do_deploy) failed with exit code '1'

This updates the else case for when an initramfs image is not
in use so that the right kernel image is deployed, by using
the KERNEL_IMAGETYPE variable, to use either version of the
kernel image.

Signed-off-by: Daniel Díaz <daniel.diaz@linaro.org>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-26 15:00:11 -05:00
Peter Hoyes bf204866e8 arm: Use SRC* variables consistently
The SRC_URI, SRCREV AND SRCBRANCH variables are currently used
inconsistently across recipes in meta-arm, leading to difficulties
customizing the configuration in external BSP layers where necessary.

Standardize usage across commonly used recipes so that:
 * SRC_URI contains a SRC_URI_PACKAGE_NAME variable per component which
   can be used to easily configure a mirror. This variable uses
   default assignment so that it can be easily overridden using an
   environment variable, e.g. to point to an internal mirror that cannot
   be committed externally.
 * SRCBRANCH is defined per component.
 * SRCREV is defined per component.

Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-25 12:23:44 -05:00
Peter Hoyes d8383c11f3 classes: Set ARMLMD_LICENSE_FILE in the runfvp environment
For models that require a license, ARMLMD_LICENSE_FILE is used to define
the location of a license file or server. If the variable is not set in
Bitbake it will not be set in the model environment.

Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-23 09:00:17 -05:00
Peter Hoyes 1b8ee250f3 classes: Prevent passing None to the runfvp environment
FVP_ENV_PASSTHROUGH may contain variables that have not been set.
d.getVar returns None in this case. Detect this and skip setting the
variable in the model environment.

Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-23 09:00:17 -05:00
Peter Hoyes 94f28592ad classes: Define FVP_ENV_PASSTHROUGH variable dependencies
Define FVP_ENV_PASSTHROUGH's vardeps to equal itself, so that the
fvpconf is regenerated if any of the defined variables change.

Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-23 09:00:17 -05:00
Peter Hoyes 33b816e03a arm/lib: Add XAUTHORITY to runfvp environment
aa89fe3f ensured environment variables necessary for GUI applications
are passed through to the model despite runfvp env var restrictions. Add
XAUTHORITY to this list. This is useful when doing X-forwarding with
Kas, which creates its own home directory.

Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com>
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-23 09:00:17 -05:00
Jon Mason 9166b5deee external-arm-toolchain: Enable 12.2.rel1 support
Enable support for 12.2.rel1 binary toolchain release

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-20 10:00:09 -05:00
Jon Mason cf43a3c398 arm-toolchain: update Arm GCC to 12.2
Update the Arm GCC source to the latest version.  Also, update the GCC
patches to apply cleanly, removing those that are no longer relevant.

Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-01-20 10:00:09 -05:00