From c9db8a6dae0e62fc57d212c81ed2f589ca58106d Mon Sep 17 00:00:00 2001 From: Adam Johnston Date: Thu, 21 Mar 2024 17:19:14 +0000 Subject: [PATCH 1/6] bsp: Update bmaptool in utility image The latest version of bmap-tools package has been renamed bmaptool. Fix the package name in the utility image. Signed-off-by: Adam Johnston --- .../recipes-core/images/corstone1000-utils-overlay-image.bb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta-arm/meta-arm-bsp/recipes-core/images/corstone1000-utils-overlay-image.bb b/meta-arm/meta-arm-bsp/recipes-core/images/corstone1000-utils-overlay-image.bb index 47d0b60..b51133e 100644 --- a/meta-arm/meta-arm-bsp/recipes-core/images/corstone1000-utils-overlay-image.bb +++ b/meta-arm/meta-arm-bsp/recipes-core/images/corstone1000-utils-overlay-image.bb @@ -1,4 +1,4 @@ -# SPDX-FileCopyrightText: Copyright 2023 Arm Limited and/or its +# SPDX-FileCopyrightText: Copyright 2023-2024 Arm Limited and/or its # affiliates # # SPDX-License-Identifier: MIT @@ -12,7 +12,7 @@ LICENSE = "MIT" inherit core-image inherit nopackages -PACKAGE_INSTALL = "bmap-tools" +PACKAGE_INSTALL = "bmaptool" IMAGE_FEATURES = "" IMAGE_LINGUAS = "" -- GitLab From c286021f84c149c9b4ab8216014213c2dfcf739f Mon Sep 17 00:00:00 2001 From: Adam Johnston Date: Thu, 21 Mar 2024 17:25:55 +0000 Subject: [PATCH 2/6] bsp: Correct utility image base and dependencies The utility image always depends on the firmware image. Explicitly set the dependency so the firmware image is always built first. Also, `core-image` provides common definitions for `core-image-*` recipes. The utility image should derive from `image` rather than `core-image` Signed-off-by: Adam Johnston --- .../recipes-core/images/corstone1000-utils-overlay-image.bb | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/meta-arm/meta-arm-bsp/recipes-core/images/corstone1000-utils-overlay-image.bb b/meta-arm/meta-arm-bsp/recipes-core/images/corstone1000-utils-overlay-image.bb index b51133e..6fcca9c 100644 --- a/meta-arm/meta-arm-bsp/recipes-core/images/corstone1000-utils-overlay-image.bb +++ b/meta-arm/meta-arm-bsp/recipes-core/images/corstone1000-utils-overlay-image.bb @@ -9,7 +9,9 @@ DESCRIPTION = "Image used during testing of initramfs based platforms to \ tested" LICENSE = "MIT" -inherit core-image +DEPENDS += "corstone1000-flash-firmware-image" + +inherit image inherit nopackages PACKAGE_INSTALL = "bmaptool" -- GitLab From a9b4b1aff0e251245c4c2b0a4e15ffa5f9cc6d0f Mon Sep 17 00:00:00 2001 From: Adam Johnston Date: Thu, 21 Mar 2024 17:38:34 +0000 Subject: [PATCH 3/6] bsp: Update LAYERSERIES_COMPAT for `scarthgap` Update LAYERSERIES_COMPAT prior to creation of `scarthgap` branches. Changelog: other Signed-off-by: Adam Johnston --- conf/layer.conf | 4 ++-- qa-checks/cassini-bsp-dictionary | 6 +++++- 2 files changed, 7 insertions(+), 3 deletions(-) diff --git a/conf/layer.conf b/conf/layer.conf index 2e779be..d3cec37 100644 --- a/conf/layer.conf +++ b/conf/layer.conf @@ -1,6 +1,6 @@ # SPDX-FileCopyrightText: Copyright (c) 2023, Linaro Limited. # -# SPDX-FileCopyrightText: Copyright 2022-2023 Arm Limited and/or its +# SPDX-FileCopyrightText: Copyright 2022-2024 Arm Limited and/or its # affiliates # # SPDX-License-Identifier: MIT @@ -18,7 +18,7 @@ BBFILES_DYNAMIC += " \ BBFILE_COLLECTIONS += "meta-cassini-bsp" BBFILE_PATTERN_meta-cassini-bsp = "^${LAYERDIR}/" -LAYERSERIES_COMPAT_meta-cassini-bsp = "nanbield" +LAYERSERIES_COMPAT_meta-cassini-bsp = "scarthgap" # Root directory for the meta-cassini-bsp/meta-arm/meta-arm-bsp CASSINI_ARM_BSP_DYNAMIC_DIR := "${LAYERDIR}/meta-arm/meta-arm-bsp" diff --git a/qa-checks/cassini-bsp-dictionary b/qa-checks/cassini-bsp-dictionary index ddc5690..26156b2 100644 --- a/qa-checks/cassini-bsp-dictionary +++ b/qa-checks/cassini-bsp-dictionary @@ -1,4 +1,4 @@ -# SPDX-FileCopyrightText: Copyright 2023 Arm Limited and/or its +# SPDX-FileCopyrightText: Copyright 2023-2024 Arm Limited and/or its # affiliates # # SPDX-License-Identifier: MIT @@ -14,6 +14,7 @@ buildable BUILDIN cassini cgroups +COMPAT config CONFIG_AUTOFS_FS CONFIG_AUTOFS4_FS @@ -36,6 +37,8 @@ gzio homepageping initscripts kernelcfg +LAYERSERIES +LAYERSERIES_COMPAT LIBC Linaro mandatoryvar @@ -64,6 +67,7 @@ requireinclude requirenotfound RPROVIDER SAST +scarthgap SDHC sourceparams srcurifile -- GitLab From 5645c928a7e56f26a11468e5a924af77874eda33 Mon Sep 17 00:00:00 2001 From: Adam Johnston Date: Thu, 28 Mar 2024 14:41:41 +0000 Subject: [PATCH 4/6] bsp: Generate bz2 file for Corstone-1000 utility image After refactoring in meta-arm, the utility image is no longer generating a tar.bz2 file as expected. Set IMAGE_FSTYPES to generate a tar.bz2 image only. Signed-off-by: Adam Johnston --- .../recipes-core/images/corstone1000-utils-overlay-image.bb | 2 +- qa-checks/cassini-bsp-dictionary | 3 +++ 2 files changed, 4 insertions(+), 1 deletion(-) diff --git a/meta-arm/meta-arm-bsp/recipes-core/images/corstone1000-utils-overlay-image.bb b/meta-arm/meta-arm-bsp/recipes-core/images/corstone1000-utils-overlay-image.bb index 6fcca9c..771e8b5 100644 --- a/meta-arm/meta-arm-bsp/recipes-core/images/corstone1000-utils-overlay-image.bb +++ b/meta-arm/meta-arm-bsp/recipes-core/images/corstone1000-utils-overlay-image.bb @@ -22,4 +22,4 @@ IMAGE_LINGUAS = "" IMAGE_ROOTFS_SIZE = "0" IMAGE_ROOTFS_EXTRA_SPACE = "0" -IMAGE_FSTYPES += "tar.bz2" +IMAGE_FSTYPES = "tar.bz2" diff --git a/qa-checks/cassini-bsp-dictionary b/qa-checks/cassini-bsp-dictionary index 26156b2..fee9224 100644 --- a/qa-checks/cassini-bsp-dictionary +++ b/qa-checks/cassini-bsp-dictionary @@ -29,12 +29,14 @@ envparse extfs flashfw fstype +FSTYPES gcsections gettext gitlab gitlab-ciyml gzio homepageping +IMAGE_FSTYPES initscripts kernelcfg LAYERSERIES @@ -72,6 +74,7 @@ SDHC sourceparams srcurifile suggestedvar +tarbz2 udev unitdir usbgadget -- GitLab From c8341d782a1f5a19586873d90cd4f946aa966a6d Mon Sep 17 00:00:00 2001 From: Adam Johnston Date: Thu, 28 Mar 2024 08:04:12 +0000 Subject: [PATCH 5/6] bsp: Remove recipe for Block Storage SP The generic recipe for the Block Storage service has been up-streamed to meta-arm. Remove the version we hold here to avoid collisions. Signed-off-by: Adam Johnston --- .../recipes-security/optee/optee-os-ts.inc | 17 ----------------- .../recipes-security/optee/optee-os_%.bbappend | 8 -------- .../trusted-services/ts-sp-block-storage_git.bb | 17 ----------------- .../trusted-services/ts-sp-common.inc | 13 ------------- .../trusted-services/ts-uuid.inc | 8 -------- 5 files changed, 63 deletions(-) delete mode 100644 meta-arm/meta-arm-bsp/recipes-security/optee/optee-os-ts.inc delete mode 100644 meta-arm/meta-arm-bsp/recipes-security/optee/optee-os_%.bbappend delete mode 100644 meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-block-storage_git.bb delete mode 100644 meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-common.inc delete mode 100644 meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-uuid.inc diff --git a/meta-arm/meta-arm-bsp/recipes-security/optee/optee-os-ts.inc b/meta-arm/meta-arm-bsp/recipes-security/optee/optee-os-ts.inc deleted file mode 100644 index e4f8c53..0000000 --- a/meta-arm/meta-arm-bsp/recipes-security/optee/optee-os-ts.inc +++ /dev/null @@ -1,17 +0,0 @@ -# SPDX-FileCopyrightText: Copyright 2023 Arm Limited and/or its -# affiliates -# -# SPDX-License-Identifier: MIT - -# Include Trusted Services Secure Partitions according to defined machine features - -# From meta-cassini -require ../trusted-services/ts-uuid.inc - -# Block Storage SP -DEPENDS:append:n1sdp = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-block-storage', \ - ' ts-sp-block-storage', '' , d)}" - -# Load Block Storage SP first -SP_PATHS:prepend:n1sdp = "${@bb.utils.contains('MACHINE_FEATURES', 'ts-block-storage', \ - ' ${TS_BIN}/${BLOCK_STORAGE_UUID}.stripped.elf', '', d)}" diff --git a/meta-arm/meta-arm-bsp/recipes-security/optee/optee-os_%.bbappend b/meta-arm/meta-arm-bsp/recipes-security/optee/optee-os_%.bbappend deleted file mode 100644 index 8a215d3..0000000 --- a/meta-arm/meta-arm-bsp/recipes-security/optee/optee-os_%.bbappend +++ /dev/null @@ -1,8 +0,0 @@ -# SPDX-FileCopyrightText: Copyright 2023 Arm Limited and/or its -# affiliates -# -# SPDX-License-Identifier: MIT - -# Include Trusted Services Secure Partitions - -require optee-os-ts.inc diff --git a/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-block-storage_git.bb b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-block-storage_git.bb deleted file mode 100644 index d147796..0000000 --- a/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-block-storage_git.bb +++ /dev/null @@ -1,17 +0,0 @@ -# nooelint: oelint.var.mandatoryvar - This recipe has no source files -# -# SPDX-FileCopyrightText: Copyright 2023 Arm Limited and/or its -# affiliates -# -# SPDX-License-Identifier: MIT - -SUMMARY = "Trusted Services block storage service provider" -HOMEPAGE = "https://cassini.readthedocs.io/en/latest/" - -require ts-sp-common.inc -require recipes-security/trusted-services/ts-arm-platforms.inc - -SP_UUID = "${BLOCK_STORAGE_UUID}" -TS_SP_BLOCK_STORAGE_CONFIG ?= "default" - -OECMAKE_SOURCEPATH = "${S}/deployments/block-storage/config/${TS_SP_BLOCK_STORAGE_CONFIG}-${TS_ENV}" diff --git a/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-common.inc b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-common.inc deleted file mode 100644 index 69ccab2..0000000 --- a/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-common.inc +++ /dev/null @@ -1,13 +0,0 @@ -# SPDX-FileCopyrightText: Copyright 2023 Arm Limited and/or its -# affiliates -# -# SPDX-License-Identifier: MIT - -# Common part of all Trusted Services SPs recipes - -# From meta-arm -# nooelint: oelint.var.multiinclude - including file is in different layer -require recipes-security/trusted-services/ts-sp-common.inc - -# Local overrides -require ts-uuid.inc diff --git a/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-uuid.inc b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-uuid.inc deleted file mode 100644 index 786a0ea..0000000 --- a/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-uuid.inc +++ /dev/null @@ -1,8 +0,0 @@ -# SPDX-FileCopyrightText: Copyright 2023 Arm Limited and/or its -# affiliates -# -# SPDX-License-Identifier: MIT - -# Trusted Services SPs canonical UUIDs - -BLOCK_STORAGE_UUID = "63646e80-eb52-462f-ac4f-8cdf3987519c" -- GitLab From 6b5058c4561968cb1ee1c51812c9539d1984ad43 Mon Sep 17 00:00:00 2001 From: Adam Johnston Date: Thu, 28 Mar 2024 14:28:52 +0000 Subject: [PATCH 6/6] bsp: Add boot-order to secure partition manifests Previously, the order in which secure partitions were initialized relied on the order in which they were loaded - however that is undocumented behavior. Add boot order property into SP manifests to ensure each partition is initialized in the correct order i.e before any other partition which uses it - block storage before protected storage - protected storage before crypto Signed-off-by: Adam Johnston --- ...0001-add-boot-order-into-SP-manifest.patch | 78 +++++++++++++++++++ .../trusted-services/ts-platforms.inc | 5 ++ .../ts-sp-attestation_%.bbappend | 6 ++ .../ts-sp-block-storage_%.bbappend | 6 ++ .../trusted-services/ts-sp-crypto_%.bbappend | 6 ++ .../trusted-services/ts-sp-its_%.bbappend | 4 +- .../trusted-services/ts-sp-storage_%.bbappend | 4 +- qa-checks/cassini-bsp-dictionary | 3 + 8 files changed, 110 insertions(+), 2 deletions(-) create mode 100644 meta-arm/meta-arm-bsp/recipes-security/trusted-services/files/n1sdp/0001-add-boot-order-into-SP-manifest.patch create mode 100644 meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-platforms.inc create mode 100644 meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-attestation_%.bbappend create mode 100644 meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-block-storage_%.bbappend create mode 100644 meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-crypto_%.bbappend diff --git a/meta-arm/meta-arm-bsp/recipes-security/trusted-services/files/n1sdp/0001-add-boot-order-into-SP-manifest.patch b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/files/n1sdp/0001-add-boot-order-into-SP-manifest.patch new file mode 100644 index 0000000..8853dbf --- /dev/null +++ b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/files/n1sdp/0001-add-boot-order-into-SP-manifest.patch @@ -0,0 +1,78 @@ +From 9cb4babc2e496a4028bcd75337ea4466563f73ca Mon Sep 17 00:00:00 2001 +From: Emekcan Aras +Date: Wed, 13 Mar 2024 16:44:10 +0000 +Subject: [PATCH] add boot order into SP manifest + +The block storage SP should be loaded before the protected storage and ITS +SP due to block storage dependency. After OP-TEE v4.0, SPs can be loaded +in orderly fashion depending on the boot-order property in the SPs +manifest file. This patch loads SPs in a orderly fashion to make sure +there is no runtime dependency issues. + +Signed-off-by: Emekcan Aras +Upstream-Status: Pending +--- + .../config/default-opteesp/default_block-storage.dts.in | 1 + + deployments/crypto/config/default-opteesp/default_crypto.dts.in | 1 + + .../shared-flash-opteesp/default_internal-trusted-storage.dts.in | 1 + + .../config/shared-flash-opteesp/default_protected-storage.dts.in | 1 + + .../config/default-opteesp/default_smm-gateway.dts.in | 1 + + 5 files changed, 5 insertions(+) + +diff --git a/deployments/block-storage/config/default-opteesp/default_block-storage.dts.in b/deployments/block-storage/config/default-opteesp/default_block-storage.dts.in +index 0a97cb5..4b408ca 100644 +--- a/deployments/block-storage/config/default-opteesp/default_block-storage.dts.in ++++ b/deployments/block-storage/config/default-opteesp/default_block-storage.dts.in +@@ -18,4 +18,5 @@ + messaging-method = <3>; /* Direct messaging only */ + ns-interrupts-action = <2>; /* Non-secure interrupts are signaled */ + elf-format = <1>; ++ boot-order = /bits/ 16 <1>; + }; +diff --git a/deployments/crypto/config/default-opteesp/default_crypto.dts.in b/deployments/crypto/config/default-opteesp/default_crypto.dts.in +index c900636..7d90a88 100644 +--- a/deployments/crypto/config/default-opteesp/default_crypto.dts.in ++++ b/deployments/crypto/config/default-opteesp/default_crypto.dts.in +@@ -18,6 +18,7 @@ + messaging-method = <3>; /* Direct messaging only */ + ns-interrupts-action = <2>; /* Non-secure interrupts are signaled */ + elf-format = <1>; ++ boot-order = /bits/ 16 <4>; + + device-regions { + compatible = "arm,ffa-manifest-device-regions"; +diff --git a/deployments/internal-trusted-storage/config/shared-flash-opteesp/default_internal-trusted-storage.dts.in b/deployments/internal-trusted-storage/config/shared-flash-opteesp/default_internal-trusted-storage.dts.in +index 77d0805..a6ac644 100644 +--- a/deployments/internal-trusted-storage/config/shared-flash-opteesp/default_internal-trusted-storage.dts.in ++++ b/deployments/internal-trusted-storage/config/shared-flash-opteesp/default_internal-trusted-storage.dts.in +@@ -18,4 +18,5 @@ + messaging-method = <3>; /* Direct messaging only */ + ns-interrupts-action = <2>; /* Non-secure interrupts are signaled */ + elf-format = <1>; ++ boot-order = /bits/ 16 <3>; + }; +diff --git a/deployments/protected-storage/config/shared-flash-opteesp/default_protected-storage.dts.in b/deployments/protected-storage/config/shared-flash-opteesp/default_protected-storage.dts.in +index b305fbb..95bd537 100644 +--- a/deployments/protected-storage/config/shared-flash-opteesp/default_protected-storage.dts.in ++++ b/deployments/protected-storage/config/shared-flash-opteesp/default_protected-storage.dts.in +@@ -18,4 +18,5 @@ + messaging-method = <3>; /* Direct messaging only */ + ns-interrupts-action = <2>; /* Non-secure interrupts are signaled */ + elf-format = <1>; ++ boot-order = /bits/ 16 <2>; + }; +diff --git a/deployments/smm-gateway/config/default-opteesp/default_smm-gateway.dts.in b/deployments/smm-gateway/config/default-opteesp/default_smm-gateway.dts.in +index d74c2f3..4803de1 100644 +--- a/deployments/smm-gateway/config/default-opteesp/default_smm-gateway.dts.in ++++ b/deployments/smm-gateway/config/default-opteesp/default_smm-gateway.dts.in +@@ -18,6 +18,7 @@ + messaging-method = <3>; /* Direct messaging only */ + ns-interrupts-action = <2>; /* Non-secure interrupts are signaled */ + elf-format = <1>; ++ boot-order = /bits/ 16 <5>; + + memory-regions { + compatible = "arm,ffa-manifest-memory-regions"; +-- +2.25.1 + diff --git a/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-platforms.inc b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-platforms.inc new file mode 100644 index 0000000..789311e --- /dev/null +++ b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-platforms.inc @@ -0,0 +1,5 @@ +FILESEXTRAPATHS:prepend:n1sdp := "${THISDIR}/files/n1sdp:" + +SRC_URI:append:n1sdp = " \ + file://0001-add-boot-order-into-SP-manifest.patch \ + " diff --git a/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-attestation_%.bbappend b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-attestation_%.bbappend new file mode 100644 index 0000000..48d83d7 --- /dev/null +++ b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-attestation_%.bbappend @@ -0,0 +1,6 @@ +# SPDX-FileCopyrightText: Copyright 2024 Arm Limited and/or its +# affiliates +# +# SPDX-License-Identifier: MIT + +require ts-platforms.inc diff --git a/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-block-storage_%.bbappend b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-block-storage_%.bbappend new file mode 100644 index 0000000..48d83d7 --- /dev/null +++ b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-block-storage_%.bbappend @@ -0,0 +1,6 @@ +# SPDX-FileCopyrightText: Copyright 2024 Arm Limited and/or its +# affiliates +# +# SPDX-License-Identifier: MIT + +require ts-platforms.inc diff --git a/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-crypto_%.bbappend b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-crypto_%.bbappend new file mode 100644 index 0000000..48d83d7 --- /dev/null +++ b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-crypto_%.bbappend @@ -0,0 +1,6 @@ +# SPDX-FileCopyrightText: Copyright 2024 Arm Limited and/or its +# affiliates +# +# SPDX-License-Identifier: MIT + +require ts-platforms.inc diff --git a/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-its_%.bbappend b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-its_%.bbappend index 64215cd..7794851 100644 --- a/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-its_%.bbappend +++ b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-its_%.bbappend @@ -1,7 +1,9 @@ -# SPDX-FileCopyrightText: Copyright 2023 Arm Limited and/or its +# SPDX-FileCopyrightText: Copyright 2023-2024 Arm Limited and/or its # affiliates # # SPDX-License-Identifier: MIT +require ts-platforms.inc + # Override configuration to use block storage service OECMAKE_SOURCEPATH:n1sdp = "${S}/deployments/internal-trusted-storage/config/shared-flash-${TS_ENV}" diff --git a/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-storage_%.bbappend b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-storage_%.bbappend index 2d3e9e9..edde7ed 100644 --- a/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-storage_%.bbappend +++ b/meta-arm/meta-arm-bsp/recipes-security/trusted-services/ts-sp-storage_%.bbappend @@ -1,7 +1,9 @@ -# SPDX-FileCopyrightText: Copyright 2023 Arm Limited and/or its +# SPDX-FileCopyrightText: Copyright 2023-2024 Arm Limited and/or its # affiliates # # SPDX-License-Identifier: MIT +require ts-platforms.inc + # Override configuration to use block storage service OECMAKE_SOURCEPATH:n1sdp = "${S}/deployments/protected-storage/config/shared-flash-${TS_ENV}" diff --git a/qa-checks/cassini-bsp-dictionary b/qa-checks/cassini-bsp-dictionary index fee9224..147a6c2 100644 --- a/qa-checks/cassini-bsp-dictionary +++ b/qa-checks/cassini-bsp-dictionary @@ -21,12 +21,14 @@ CONFIG_AUTOFS4_FS configfile corstone cpio +crypto distro DISTROOVERRIDES efidisk eglibc envparse extfs +FILESEXTRAPATHS flashfw fstype FSTYPES @@ -75,6 +77,7 @@ sourceparams srcurifile suggestedvar tarbz2 +THISDIR udev unitdir usbgadget -- GitLab