aboutsummaryrefslogtreecommitdiffstats
AgeCommit message (Collapse)Author
2023-02-19CI: pin to kas 3.2 as 3.2.1 failsyocto-3.4.33.4.3honisterRoss Burton
For some reason the kas 3.2.1 container fails: No such file or directory: '/builds/engineering/yocto/meta-arm/ci/ci/base.yml' Note the repeated /ci/, which is wrong. Pin the kas container to 3.2 for now until this is resolved. Signed-off-by: Ross Burton <ross.burton@arm.com>
2023-01-18arm-bsp/juno: move to compressed initramfs imageJon Mason
Change u-boot and machine config to default to booting a compressed initramfs. This allows for easier testing. A compressed image is needed as the image is too big for the storage, and the error notifying of such is vague. Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-09-07arm-bsp:ffa-debugfs: update git SHA for v2.1.0yocto-3.4.2CORSTONE1000-2022.04.07CORSTONE1000-2022.02.18CORSTONE1000-2022.01.183.4.2Vishnu Banavath
git sha on https://git.gitlab.arm.com/linux-arm/linux-trusted-services/-/tree/v2.1.0 has been changed recently for v2.1.0 tag. This change is to update ffa-debugfs-mod_2.1.0.bb to fetch correct git SHA. Signed-off-by: Vishnu Banavath <vishnu.banavath@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-08-08gem5: add meta-arm-bsp dependencyJon Mason
meta-gem5 needs the 5.4 kernel, which is only present in the meta-arm-bsp layer. Add this as a dependency to resolve issues. Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-08-04arm-toolchain/layer.conf: remove BB_DANGLINGAPPENDS_WARNONLYRoss Burton
This appears to be historical from when the toolchain was in meta-linaro. It isn't needed anymore, there's one bbappend in meta-arm-toolchain for grub which is part of oe-core, so will never be dangling. This variable has a global effect, so leaving it in here has a negative impact on users. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-06-05arm/linux-yocto: fix boot failure in qemuarm64-securebootRoss Burton
The boot crash that appears to be triggered by the ZONE_DMA patches has been root-caused, so work around the problem whilst upstream figure out the best way to fix. Also, upgrade qemuarm64-secureboot to 5.15 instead of pinning back to 5.10. Signed-off-by: Ross Burton <ross.burton@arm.com>
2022-04-26runfvp: check for telnetyocto-3.4.13.4.1Ross Burton
Check for telnet on startup to avoid mysterious failures later when telnet isn't available. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-04-26runfvp: propagate the exit code correctlyRoss Burton
runfvp could encounter an error but the exit code remained as 0. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-04-26runfvp: fix undefined variable in terminal selection loginRoss Burton
Since 10e60cc the terminal_map doesn't exist, this piece of code wasn't updated. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-04-26runfvp: refactor terminal selectionRoss Burton
Rewrite the terminal code to have a priority list of terminals when selecting a default, allow the user to pick a default with a configuration file, and add gnome-terminal to the list. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-04-26runfvp: don't use f-string when there's no expressionsRoss Burton
Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-04-26runfvp: don't hide output when using terminalsRoss Burton
Only pass a console_cb if we're hooking up a console, so that the output from the FVP is visible on the terminal. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-04-26runfvp: handle the fvp quitting before we kill itRoss Burton
Don't raise an exception if the FVP has quit before we get around to killing it. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-04-26runfvp: add an asyncio TODORoss Burton
Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-04-26arm-bsp/machine: Add runfvp config for corstone1000Harry Moulton
Add the runfvp config for corstone1000-fvp. Signed-off-by: Harry Moulton <harry.moulton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-04-25arm-bsp/trusted-firmware-a: corstone1000: update Tfa SHAEmekcan Aras
This commit updates Tfa SHA to remove the patches from the recipe since all of them are upstreamed now. Signed-off-by: Emekcan Aras emekcan.aras@arm.com Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-04-06kas/corstone1000.yml: refspec update for run-scriptsSatish Kumar
Signed-off-by: Satish Kumar <satish.kumar01@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-04-01arm-bsp/u-boot: add SDCard support for corstone1000 FVPCORSTONE1000-2022.04.04Vishnu Banavath
This change is to add SDCard support for corstone1000 FVP Signed-off-by: Vishnu Banavath <vishnu.banavath@arm.com>
2022-03-14arm-bsp/corstone1000: Add RDEPENDS to remove unwanted images.Harry Moulton
Remove unwanted build images that push the binaries size over the size limit for corstone1000. Signed-off-by: Harry Moulton <harry.moulton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-03-14arm-bsp/linux-yocto: backport remove redundant kernel hackingHarry Moulton
Backport of 7fc51c7c from master which removes some redundant code to reduce the size of the resulting corstone1000 binary. Signed-off-by: Harry Moulton <harry.moulton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-03-11arm-bsp: update linux-yocto 5.4 to the latest versionJon Mason
Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-03-11arm-bsp: fix yylloc kernel build errorJon Mason
Backport patch from upstream to address the following error: scripts/dtc/dtc-parser.tab.o:(.bss+0x20): multiple definition of `yylloc'; scripts/dtc/dtc-lexer.lex.o:(.bss+0x0): first defined here Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-03-11arm-bsp/docs,kas: Add SSH server to fvp-baser-aemv8r64 imagePeter Hoyes
To make it easier for users to test and evaluate the FVP, including testing inbound network connections, enable the openssh SSH server by default and map to port 8022 on the host. Update fvp-baser-aemv8r64 documentation accordingly in new "Networking" section. Issue-Id: SCM-3881 Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com> Change-Id: I88329731418e198e2ef5d3449bfb38fde5ae77bb Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-03-09arm/fvp-corstone1000: backport: update to latest versionHarry Moulton
Backport patch from master to update the URL and checksums for the new Corstone1000 FVP version 11.17.23. Signed-off-by: Harry Moulton <harry.moulton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-03-08corstone1000: backport: update meta-arm-image for kirkstone supportHarry Moulton
Backport patch from master to update the sha for meta-arm-image in the corstone1000 kas file to add support for kirkstone. Signed-off-by: Harry Moulton <harry.moulton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-03-08arm-bsp/docs: Minor fvp-baser-aemv8r64 fixesPeter Hoyes
* Include `--upgrade` in pip3 command to ensure latest kas version is installed * Ensure all underscores are either quoted or escaped * Fix P9 example command Issue-Id: SCM-3881 Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com> Change-Id: Ie460dbd6b1f87f5f9ca2966329341d22da3606d3 Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-03-04arm-bsp/docs: Add -b honister instruction for fvp-baser-aemv8r64Peter Hoyes
Issue-Id: SCM-3871 Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com> Change-Id: I1874b0bd9dc5e3da9c40b46d9d002b83b41addcc
2022-03-02arm/fvp-base-r-aem: Update to version 11.17.21Peter Hoyes
Also update version and download link in meta-arm-bsp fvp-baser-aemv8r64 documentation Issue-Id: SCM-3871 Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com> Change-Id: I92ec616d25703ff74ed063918a1e4811bac9ff3f
2022-03-02arm-bsp/docs: Improve fvp-baser-aemv864 limitationPeter Hoyes
Add more details about the cache_state_modelled limitation, which can worked around by setting cci400.force_on_from_start=1 Issue-Id: SCM-3871 Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com> Change-Id: Idde23278a87316dae842c6c3793b9836482e8c3a
2022-02-25arm-bsp/docs: Minor fvp-baser-aemv8r64 updatesPeter Hoyes
* Add clarification on how to mount p9 device * Remove instruction to use ctrl + c to stop FVP * Add cache_state_modelled to Known Issues Issue-Id: SCM-3871 Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com> Change-Id: I122c5ae5b3ceee1d106205d93a006f75bdbfa2bf Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-02-25arm-bsp/docs: Update fvp-baser-aemv8r64 docsPeter Hoyes
Document U-Boot addition, add new architecture section and update the change log. Issue-Id: SCM-3871 Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com> Change-Id: Ie0e1ff35ade634f2b523c14bb058c9d775802632 Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-02-25arm-bsp/conf: Use real-time clock for fvp-baser-aemv8r64Peter Hoyes
Enable the bp.refcounter.use_real_time option, so that the CNTPCT_EL0 increments in real-time instead of simulator time. Issue-Id: SCM-3871 Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com> Change-Id: I197d6de4a7316e5299aee34e64e149cbd3d515a9 Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-02-25arm-bsp/kernel: Use 4 Gb of RAM in fvp-baser-aemv8r64Peter Hoyes
The FVP default configuration has bp.dram_size=4, which is sufficient for development and testing purposes, so remove the FVP_CONFIG override and set to 4 Gb in the device tree. Issue-Id: SCM-3871 Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com> Change-Id: I4a96062c9e94d36f5459f33c86aab4d4885bab43 Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-02-25arm-bsp/u-boot: Add U-Boot for fvp-baser-aemv8r64Peter Hoyes
This patch introduces U-Boot into the fvp-baser-aemv8r64 boot flow, providing EFI services. The fvp-baser-aemv8r64 does not have an EL3, so the system starts at S-EL2. For now, U-Boot is running at S-EL2, alongside boot-wrapper. Enable the --enable-keep-el option in boot-wrapper-aarch64 so that it boots the next stage (U-Boot) at S-EL2. Additionally, tell boot-wrapper-aarch64 to bundle U-Boot instead of the kernel. Linux only supports booting from S-EL1 on the fvp-baser-aemv8r64, so U-Boot is configured with CONFIG_SWITCH_TO_EL1, so that booti or bootefi switch to S-EL1 before booting the EFI payload (unless an enviornment variable - armv8_switch_to_el1 - is set to 'n'). Add patches to U-Boot, which: * Backports 53b40e8d54fcdb834e10e6538084517524b8401b, to disable pointer authentication traps. * Add board support for the fvp-baser-aemv8r64 (with a memory map which is inverted from the fvp-base). * Enable the configuration of U-Boot using the device tree passed from boot-wrapper-aarch64. * Enable virtio-net. * Disable setting the exception vectors at S-EL2 so that the PSCI vectors pass through to Linux. * Set up system registers at S-EL2 for Linux. * Configure the S-EL2 MPU for the EFI services. * Allows bootefi to switch to EL1 before booting Linux. Issue-Id: SCM-3871 Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com> Change-Id: I229d14b0717df412c1fe33772230ca779f79b32d Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-02-25arm-bsp/boot-wrapper-aarch64: Update patches for fvp-baser-aemv8r64Peter Hoyes
Update the SRCREV to a more recent revision for the fvp-baser-aemv8r64. Update the machine-specific patches, which makes the following changes: * Add PSCI services to /memreserve/ in the device tree using libfdt. * Add --enable-keep-el option, which allows boot-wrapper-aarch64 to boot the next stage at the same exception level. * Update the counter frequency to 100 MHz. Issue-Id: SCM-3871 Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com> Change-Id: I41843e958cf629d69de644bb57b660fb542fc8b7 Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-02-25arm/boot-wrapper-aarch64: Upgrade to newer revisionPeter Hoyes
Upgrade boot-wrapper-aarch64 to 1044c77062573985f7c994c3b6cef5695f57e955 Hold back gem5 at 8d5a765251d9113c3c0f9fa14de42a9e7486fe8a in bbappend. Issue-Id: SCM-3871 Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com> Change-Id: Ia5ccca2234dd117d530970f9f90469dacbb778e3 Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-02-25arm-bsp/fvp-baser-aemv8r64: Fix PL011 and SP805 register sizesPeter Hoyes
The Linux kernel expects the peripheral ID register to be just below the end of the address range, which for the PL011 and SP805 is at 0xFE0 not 0xFFE0, so set the size to 0x1000. Issue-Id: SCM-3881 Signed-off-by: Peter Hoyes <Peter.Hoyes@arm.com> Change-Id: Iada28e8192d72b1647822c33d13deffe507043b5 Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-02-21arm-bsp/security: move TS patches to corstone1000 directoryEmekcan Aras
This commit moves all the trusted-services patches to a new corstone1000 directory. Signed-off-by: Vishnu Banavath <vishnu.banavath@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-02-17kas/corstone1000-base: update meta-arm-image SHAEmekcan Aras
This commit updates the meta-arm-image SHA to drop psa-arch-test from the build. Signed-off-by: Emekcan Aras <emekcan.aras@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-02-17arm-bsp/security: trusted-services to fix psa-arch-testsVishnu Banavath
These changes are to fix failures in psa-arch-tests Signed-off-by: Vishnu Banavath <vishnu.banavath@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-02-17arm-bsp/security: drop psa-arch-tests recipeVishnu Banavath
This change is to build and install psa-arch-tests using trusted-services code and drop psa-arch-tests recipe. Signed-off-by: Vishnu Banavath <vishnu.banavath@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-02-17arm-bsp/tf-m: update git SHAVishnu Banavath
This change is to update TF-M git SHA to fix psa-arch-tests test case failures. Signed-off-by: Vishnu Banavath <vishnu.banavath@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-02-17arm-bsp/security: replace mbedcrypto with mbedtlsVishnu Banavath
This commit replaces mbedcrpyto with mbedtls on the trusted-service recipe. Signed-off-by: Vishnu Banavath <vishnu.banavath@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-01-28CI: use the latest release of the Kas containerRoss Burton
If we don't specify a tag name GitLab uses the 'latest' tag, which for Kas is moved whenever an image build is made. Instead explicitly use the latest-release tag, which is only updated when a release is made. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-01-28meta-arm: Make generic-arm64 kernel cfg based on linux-yocto standard kernel ↵Diego Sueiro
type By having the generic-arm64 machine using the same kernel config as the linux-yocto standard kernel type, application layers can rely on the same base configuration, independently of the target machine. Also, the kernel-yocto.bbclass searches for .scc files in the FILESEXTRAPATHS. Hence, we don't need to list generic-arm64-standard.scc in the SRC_URI. Issue-Id: SCM-3910 Signed-off-by: Diego Sueiro <diego.sueiro@arm.com> Change-Id: I46889ce38b32521d8350534cc590b57b158ad573 Signed-off-by: Jon Mason <jon.mason@arm.com>
2022-01-18arm-bsp/psa-arch-tests: change master to main for psa-arch-tests repoVishnu Banavath
master branch is renamed to main on psa-arch-tests github. Signed-off-by: Vishnu Banavath <vishnu.banavath@arm.com>
2022-01-17arm-bsp/uboot: fix null pointer exception for get_image_infoVishnu Banavath
This change is to fix NULL pointer exception for get_image_info API for corstone1000 platform Signed-off-by: Vishnu Banavath <vishnu.banavath@arm.com>
2022-01-17arm-bsp/tf-m: fix capsule instability issue for corstone1000Vishnu Banavath
This change is to upgrade TF-M to latest git hash which contains fix for capsule instability issue for corstone1000 platform. Latest TF-M would also require v3.1 mbedtls. Also updated git hash for mbedtls repo.
2022-01-17CI: track honister branch for clang and zephyrRoss Burton
These layers now have honister branches, so track those instead of master. Signed-off-by: Ross Burton <ross.burton@arm.com>
2022-01-06arm-bsp/uboot: send bootcomplete event to secure enclaveCORSTONE1000-2022.01.06Vishnu Banavath
On corstone1000 platform, Secure Enclave will be expecting an event from uboot when it performs capsule update. Previously, an event is sent at exitbootservice level. This will create a problem when user wants to interrupt at UEFI shell, hence, it is required to send an uboot efi initialized event at efi sub-system initialization stage. Change-Id: I7d16e184675d537d790365e1b03a414ac802694a Signed-off-by: Vishnu Banavath <vishnu.banavath@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>