Sync from SUSE:SLFO:Main arm-trusted-firmware revision 87e31b97d89e1fd6108ba660e82529ce

This commit is contained in:
Adrian Schröter 2024-05-03 11:08:41 +02:00
commit f98ac19ec5
15 changed files with 1514 additions and 0 deletions

23
.gitattributes vendored Normal file
View File

@ -0,0 +1,23 @@
## Default LFS
*.7z filter=lfs diff=lfs merge=lfs -text
*.bsp filter=lfs diff=lfs merge=lfs -text
*.bz2 filter=lfs diff=lfs merge=lfs -text
*.gem filter=lfs diff=lfs merge=lfs -text
*.gz filter=lfs diff=lfs merge=lfs -text
*.jar filter=lfs diff=lfs merge=lfs -text
*.lz filter=lfs diff=lfs merge=lfs -text
*.lzma filter=lfs diff=lfs merge=lfs -text
*.obscpio filter=lfs diff=lfs merge=lfs -text
*.oxt filter=lfs diff=lfs merge=lfs -text
*.pdf filter=lfs diff=lfs merge=lfs -text
*.png filter=lfs diff=lfs merge=lfs -text
*.rpm filter=lfs diff=lfs merge=lfs -text
*.tbz filter=lfs diff=lfs merge=lfs -text
*.tbz2 filter=lfs diff=lfs merge=lfs -text
*.tgz filter=lfs diff=lfs merge=lfs -text
*.ttf filter=lfs diff=lfs merge=lfs -text
*.txz filter=lfs diff=lfs merge=lfs -text
*.whl filter=lfs diff=lfs merge=lfs -text
*.xz filter=lfs diff=lfs merge=lfs -text
*.zip filter=lfs diff=lfs merge=lfs -text
*.zst filter=lfs diff=lfs merge=lfs -text

BIN
A3700-utils-marvell-master.tar.gz (Stored with Git LFS) Normal file

Binary file not shown.

View File

@ -0,0 +1,12 @@
--- A3700-utils-marvell-master/wtmi/sys_init/Makefile.orig 2021-07-06 14:15:03.579538716 +0200
+++ A3700-utils-marvell-master/wtmi/sys_init/Makefile 2021-07-06 14:15:14.771664652 +0200
@@ -51,8 +51,7 @@ ECHO = @echo
SED = @sed
LOCAL_VERSION_STRING ?= -armada
-BUILD_STRING := $(shell git log -n 1 --pretty=format:"%h" && (git diff-index --quiet HEAD || echo -dirty))
-VERSION_STRING := $(LOCAL_VERSION_STRING)-$(BUILD_STRING)
+VERSION_STRING := $(LOCAL_VERSION_STRING)
CPUOPTS = -mthumb -mcpu=cortex-m3 -mlittle-endian
BINPATH = build

View File

@ -0,0 +1,138 @@
From 9a9840d726c90dc7dad8d1c07c5f7e0ca091370b Mon Sep 17 00:00:00 2001
From: Michal Suchanek <msuchanek@suse.de>
Date: Mon, 29 Aug 2022 12:43:17 +0200
Subject: [PATCH] Workaround gcc 7 constant assignment error.
[ 30s] plat/imx/imx8qx/imx8qx_bl31_setup.c:32:54: error: initializer element is not constant
[ 30s] static const unsigned long BL31_COHERENT_RAM_START = BL_COHERENT_RAM_BASE;
[ 30s] ^~~~~~~~~~~~~~~~~~~~
[ 30s] plat/imx/imx8qx/imx8qx_bl31_setup.c:33:52: error: initializer element is not constant
[ 30s] static const unsigned long BL31_COHERENT_RAM_END = BL_COHERENT_RAM_END;
[ 30s] ^~~~~~~~~~~~~~~~~~~
[ 30s] plat/imx/imx8qx/imx8qx_bl31_setup.c:34:45: error: initializer element is not constant
[ 30s] static const unsigned long BL31_RO_START = BL_CODE_BASE;
[ 30s] ^~~~~~~~~~~~
[ 30s] plat/imx/imx8qx/imx8qx_bl31_setup.c:35:44: error: initializer element is not constant
[ 30s] static const unsigned long BL31_RO_END = BL_CODE_END;
[ 30s] ^~~~~~~~~~~
[ 30s] plat/imx/imx8qx/imx8qx_bl31_setup.c:36:44: error: initializer element is not constant
[ 30s] static const unsigned long BL31_RW_END = BL_END;
[ 30s] ^~~~~~
Signed-off-by: Michal Suchanek <msuchanek@suse.de>
---
plat/imx/imx8qm/imx8qm_bl31_setup.c | 10 +++++-----
plat/imx/imx8qx/imx8qx_bl31_setup.c | 10 +++++-----
plat/renesas/common/bl31_plat_setup.c | 8 ++++----
plat/renesas/rcar/bl2_plat_setup.c | 8 ++++----
plat/renesas/rzg/bl2_plat_setup.c | 8 ++++----
5 files changed, 22 insertions(+), 22 deletions(-)
diff --git a/plat/imx/imx8qm/imx8qm_bl31_setup.c b/plat/imx/imx8qm/imx8qm_bl31_setup.c
index 68eb53422..ee3384a2e 100644
--- a/plat/imx/imx8qm/imx8qm_bl31_setup.c
+++ b/plat/imx/imx8qm/imx8qm_bl31_setup.c
@@ -29,11 +29,11 @@
#include <sci/sci.h>
#include <sec_rsrc.h>
-static const unsigned long BL31_COHERENT_RAM_START = BL_COHERENT_RAM_BASE;
-static const unsigned long BL31_COHERENT_RAM_END = BL_COHERENT_RAM_END;
-static const unsigned long BL31_RO_START = BL_CODE_BASE;
-static const unsigned long BL31_RO_END = BL_CODE_END;
-static const unsigned long BL31_RW_END = BL_END;
+#define BL31_COHERENT_RAM_START ((const unsigned long)BL_COHERENT_RAM_BASE)
+#define BL31_COHERENT_RAM_END ((const unsigned long)BL_COHERENT_RAM_END)
+#define BL31_RO_START ((const unsigned long)BL_CODE_BASE)
+#define BL31_RO_END ((const unsigned long)BL_CODE_END)
+#define BL31_RW_END ((const unsigned long)BL_END)
IMPORT_SYM(unsigned long, __RW_START__, BL31_RW_START);
diff --git a/plat/imx/imx8qx/imx8qx_bl31_setup.c b/plat/imx/imx8qx/imx8qx_bl31_setup.c
index 1da8d296c..7aca057bf 100644
--- a/plat/imx/imx8qx/imx8qx_bl31_setup.c
+++ b/plat/imx/imx8qx/imx8qx_bl31_setup.c
@@ -29,11 +29,11 @@
#include <sci/sci.h>
#include <sec_rsrc.h>
-static const unsigned long BL31_COHERENT_RAM_START = BL_COHERENT_RAM_BASE;
-static const unsigned long BL31_COHERENT_RAM_END = BL_COHERENT_RAM_END;
-static const unsigned long BL31_RO_START = BL_CODE_BASE;
-static const unsigned long BL31_RO_END = BL_CODE_END;
-static const unsigned long BL31_RW_END = BL_END;
+#define BL31_COHERENT_RAM_START ((const unsigned long)BL_COHERENT_RAM_BASE)
+#define BL31_COHERENT_RAM_END ((const unsigned long)BL_COHERENT_RAM_END)
+#define BL31_RO_START ((const unsigned long)BL_CODE_BASE)
+#define BL31_RO_END ((const unsigned long)BL_CODE_END)
+#define BL31_RW_END ((const unsigned long)BL_END)
IMPORT_SYM(unsigned long, __RW_START__, BL31_RW_START);
diff --git a/plat/renesas/common/bl31_plat_setup.c b/plat/renesas/common/bl31_plat_setup.c
index 60960d4c6..6edc9e60d 100644
--- a/plat/renesas/common/bl31_plat_setup.c
+++ b/plat/renesas/common/bl31_plat_setup.c
@@ -22,12 +22,12 @@
#include "rcar_private.h"
#include "rcar_version.h"
-static const uint64_t BL31_RO_BASE = BL_CODE_BASE;
-static const uint64_t BL31_RO_LIMIT = BL_CODE_END;
+#define BL31_RO_BASE ((const uint64_t)BL_CODE_BASE)
+#define BL31_RO_LIMIT ((const uint64_t)BL_CODE_END)
#if USE_COHERENT_MEM
-static const uint64_t BL31_COHERENT_RAM_BASE = BL_COHERENT_RAM_BASE;
-static const uint64_t BL31_COHERENT_RAM_LIMIT = BL_COHERENT_RAM_END;
+#define BL31_COHERENT_RAM_BASE ((const uint64_t)BL_COHERENT_RAM_BASE)
+#define BL31_COHERENT_RAM_LIMIT ((const uint64_t)BL_COHERENT_RAM_END)
#endif /* USE_COHERENT_MEM */
extern void plat_rcar_gic_driver_init(void);
diff --git a/plat/renesas/rcar/bl2_plat_setup.c b/plat/renesas/rcar/bl2_plat_setup.c
index bbfa16927..2416181a6 100644
--- a/plat/renesas/rcar/bl2_plat_setup.c
+++ b/plat/renesas/rcar/bl2_plat_setup.c
@@ -53,12 +53,12 @@
* Following symbols are only used during plat_arch_setup() only
* when RCAR_BL2_DCACHE is enabled.
*/
-static const uint64_t BL2_RO_BASE = BL_CODE_BASE;
-static const uint64_t BL2_RO_LIMIT = BL_CODE_END;
+#define BL2_RO_BASE ((const uint64_t)BL_CODE_BASE)
+#define BL2_RO_LIMIT ((const uint64_t)BL_CODE_END)
#if USE_COHERENT_MEM
-static const uint64_t BL2_COHERENT_RAM_BASE = BL_COHERENT_RAM_BASE;
-static const uint64_t BL2_COHERENT_RAM_LIMIT = BL_COHERENT_RAM_END;
+#define BL2_COHERENT_RAM_BASE ((const uint64_t)BL_COHERENT_RAM_BASE)
+#define BL2_COHERENT_RAM_LIMIT ((const uint64_t)BL_COHERENT_RAM_END)
#endif
#endif
diff --git a/plat/renesas/rzg/bl2_plat_setup.c b/plat/renesas/rzg/bl2_plat_setup.c
index e9dbd2058..2d458a68f 100644
--- a/plat/renesas/rzg/bl2_plat_setup.c
+++ b/plat/renesas/rzg/bl2_plat_setup.c
@@ -50,12 +50,12 @@
* Following symbols are only used during plat_arch_setup() only
* when RCAR_BL2_DCACHE is enabled.
*/
-static const uint64_t BL2_RO_BASE = BL_CODE_BASE;
-static const uint64_t BL2_RO_LIMIT = BL_CODE_END;
+#define BL2_RO_BASE ((const uint64_t)BL_CODE_BASE)
+#define BL2_RO_LIMIT ((const uint64_t)BL_CODE_END)
#if USE_COHERENT_MEM
-static const uint64_t BL2_COHERENT_RAM_BASE = BL_COHERENT_RAM_BASE;
-static const uint64_t BL2_COHERENT_RAM_LIMIT = BL_COHERENT_RAM_END;
+#define BL2_COHERENT_RAM_BASE ((const uint64_t)BL_COHERENT_RAM_BASE)
+#define BL2_COHERENT_RAM_LIMIT ((const uint64_t)BL_COHERENT_RAM_END)
#endif /* USE_COHERENT_MEM */
#endif /* RCAR_BL2_DCACHE */
--
2.37.1

25
_multibuild Normal file
View File

@ -0,0 +1,25 @@
<multibuild>
<flavor>a3700</flavor>
<flavor>a80x0_mcbin</flavor>
<flavor>fvp</flavor>
<flavor>hikey</flavor>
<flavor>hikey960</flavor>
<flavor>imx8mm</flavor>
<flavor>imx8mq</flavor>
<flavor>imx8qm</flavor>
<flavor>imx8qx</flavor>
<flavor>poplar</flavor>
<flavor>qemu</flavor>
<flavor>qemu_sbsa</flavor>
<flavor>rk3328</flavor>
<flavor>rk3368</flavor>
<flavor>rk3399</flavor>
<flavor>rpi3</flavor>
<flavor>rpi4</flavor>
<flavor>sun50i_a64</flavor>
<flavor>sun50i_h6</flavor>
<flavor>sun50i_h616</flavor>
<flavor>tegra186</flavor>
<flavor>tegra210</flavor>
<flavor>zynqmp</flavor>
</multibuild>

37
_service Normal file
View File

@ -0,0 +1,37 @@
<services>
<service name="tar_scm" mode="disabled">
<param name="url">https://github.com/MarvellEmbeddedProcessors/mv-ddr-marvell.git</param>
<param name="scm">git</param>
<param name="filename">mv-ddr-marvell-armada-atf</param>
<param name="versionformat">master</param>
<param name="revision">5d41a995637de1dbc93f193db6ef0c8954cab316</param>
</service>
<service name="recompress" mode="disabled">
<param name="file">*mv-ddr-marvell*.tar</param>
<param name="compression">gz</param>
</service>
<service name="tar_scm" mode="disabled">
<param name="url">https://github.com/MarvellEmbeddedProcessors/binaries-marvell.git</param>
<param name="scm">git</param>
<param name="filename">binaries-marvell</param>
<param name="versionformat">10.0.1.0</param>
<param name="revision">refs/heads/binaries-marvell-armada-SDK10.0.1.0</param>
</service>
<service name="recompress" mode="disabled">
<param name="file">*binaries-marvell*.tar</param>
<param name="compression">gz</param>
</service>
<service name="tar_scm" mode="disabled">
<param name="url">https://github.com/MarvellEmbeddedProcessors/A3700-utils-marvell.git</param>
<param name="scm">git</param>
<param name="filename">A3700-utils-marvell</param>
<param name="versionformat">master</param>
<param name="revision">e733e9f139ff23c1b0346c6e89f5530a4c24db3b</param>
</service>
<service name="recompress" mode="disabled">
<param name="file">*A3700-utils-marvell*.tar</param>
<param name="compression">gz</param>
</service>
</services>

View File

@ -0,0 +1,660 @@
-------------------------------------------------------------------
Mon Sep 18 10:12:57 UTC 2023 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Update to 2.8.8:
- **Libraries**
- **CPU Support**
- fix(cpus): workaround for Neoverse V2 erratum 2801372 ([ec3fafa](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/ec3fafa24307686b957de0899ba30bfbb5a70380))
- Skipped 2.8.7:
- **Build System**
- fix(build): allow warnings when using lld ([37bee49](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/37bee4983192451a00ed9dd5987e8e856fb09714))
- build(makefile): add helper to detect linker options ([8782b88](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/8782b8849147aef0e0f8dcf54ec3f2d980acbf50))
- feat(build): add support for new binutils versions ([1fdc979](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/1fdc9797f32c711c35a8a61a591607c8fa8a5468))
- **Services**
- **Errata ABI**
- feat(errata_abi): errata management firmware interface ([bb9d6fa](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/bb9d6faa41ee9d60fdd310f446870b1dbcc41b03))
- refactor(errata_abi): factor in non-arm interconnect ([4a001ff](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/4a001ffb68e0a8f306ca84a6c1c3142dff728aa2))
- fix(cpus): workaround platforms non-arm interconnect ([f718c87](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/f718c8723aca40164340c416a0e9d96a37719fe5))
- docs(errata_abi): document the errata abi changes ([66dab5c](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/66dab5c69420fc728a74d10a83f0abc0e4c4f756))
- **Platforms**
- **FVP**
- feat(fvp): enable errata management interface ([b8bb1e3](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b8bb1e347e5486583edda32e47af53a43165a3aa))
-------------------------------------------------------------------
Mon Apr 24 13:17:03 UTC 2023 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Update to 2.8.6:
- **Arm**
- **GIC**
- **GICv3**
- fix(gicv3): workaround for NVIDIA erratum T241-FABRIC-4 ([2e48284](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/2e48284c8b5a4cf28779a30fd60d99650928865e))
- **Bootloader Images**
- **BL32**
- **TSP**
- fix(tsp): use verbose for power logs ([6cc8ca9](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/6cc8ca93a905cfdc791ab7a7d2b8d6c366b5705e))
- Skipped 2.8.5:
- **Libraries**
- **CPU Support**
- refactor(cpus): shorten errata flag defines ([e31060c](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/e31060c472cd53ce5a21a5ce19cd663a3fd79ec3))
- fix(cpus): workaround for Cortex-A78C erratum 1827430 ([14bb756](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/14bb7567d5e9805e5287651eeec5aa95cae40432))
- fix(cpus): workaround for Cortex-A78C erratum 1827440 ([330095f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/330095fa4a2695bac85fd12e0017090d9ebb633f))
- Skipped 2.8.4:
- **Libraries**
- **CPU Support**
- fix(cpus): workaround for Neoverse V1 errata 2743233 ([08a0f6a](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/08a0f6acaa327b0de868a2fdff9fcdf5880de9db))
- Skipped 2.8.3:
- **Libraries**
- **CPU Support**
- fix(cpus): workaround for Cortex-A78 erratum 2742426 ([a307605](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/a30760567eacce2b384ba072050eae4a422a5e9f))
- fix(cpus): workaround for Cortex-A78C erratum 2779484 ([48f38bc](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/48f38bcb0465719a502d98bc04efe69553b3cb22))
- **Dependencies**
- **Compiler runtime libraries**
- fix(deps): add missing aeabi_memset.S ([0aae8a3](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/0aae8a34b3ca8ed0885166cb5bf6af67bc91c5fa))
- Skipped 2.8.2:
- **Platforms**
- **Xilinx**
- **ZynqMP**
- fix(zynqmp): enable A53 workaround(errata 1530924) ([3c5ba11ca] (https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/3c5ba11ca800e41e36ea97b696cd3ce9c64d5412)))
- Skipped 2.8.1:
- **Libraries**
- **el3_runtime**
- Revert "fix(el3_runtime): allow SErrors when executing in EL3" ([51120a499](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/51120a499ee7682ce659e613e197597e9376aae7))
- Skipped 2.8.0:
- **Libraries**
- **C Standard Library**
- fix(libc): properly define SCHAR_MIN ([33d7e301f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/33d7e301f74059b12b606cfc54afd48a9ad26b4a))
- **CPU Support**
- fix(cpus): workaround for Cortex-A510 erratum 2684597 ([a40d9559b](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/a40d9559b2f104923dc01c74dcdd4ac06b85adef))
- fix(cpus): workaround for Cortex-A78C erratum 2772121 ([b33ea1e3e](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b33ea1e3e91430d03d4328f1c7c094af7622ff2d))
- fix(cpus): workaround for Neoverse V1 errata 2779461 ([c06124dad](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/c06124dadc10a4cdc63772483921810dbc3f4b95))
- fix(cpus): workaround for Cortex-A78 erratum 2779479 ([5a25a70fb](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/5a25a70fb67f56be5f3ebed3d4234bb3b8120181))
- fix(cpus): workaround for Cortex-X2 erratum 2282622 ([209b8ccd7](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/209b8ccd772d3b94b30b731bd85da1c3ecd0ecdb))
- fix(cpus): workaround for Cortex-A710 erratum 2282622 ([a9f7a50d3](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/a9f7a50d30598d2bd7f3d048930e54c520adc69f))
- fix(cpus): workaround for Neoverse V1 erratum 2743093 ([b7f723e55](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b7f723e55f52f693e6517120bd016d56f0cdb80c))
- fix(cpus): workaround for Cortex-A78 erratum 2772019 ([3a8011088](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/3a80110887ed752b0c6e5b4f0d59bd6d40f4bb24))
- fix(cpus): workaround for Neoverse N2 erratum 2743089 ([b0b654f90](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b0b654f908df85133e9d8cbbe252cf7f48dd883c))
- fix(cpus): workaround for Cortex-X2 erratum 2768515 ([262bb3a22](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/262bb3a223bed377603ac756fef8d685fad016ef))
- fix(cpus): workaround for Cortex-A710 erratum 2768515 ([c90daab3f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/c90daab3f0029867f7d1b419dcb72961bdfaea9d))
- fix(cpus): workaround for Cortex-X3 erratum 2615812 ([bcdd5152d](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/bcdd5152dc6c0496d25e936f3af4416dab1d32bc))
- **el3_runtime**
- fix(el3_runtime): allow SErrors when executing in EL3 ([327f4bb0c](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/327f4bb0cf2035ee46f0753429a43fd4c97a5d98))
- fix(el3_runtime): restore SPSR/ELR/SCR after esb ([f06ba4a21](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/f06ba4a2137000e87f1ec77eef054d3ac1706d84))
- **Miscellaneous**
- **Debug**
- fix(console): fix crash on spin_unlock with cache disabled ([cede543e2](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/cede543e29d7110adfd99427f35858e6a81cb596))
- **Platforms**
- **Arm**
- **CSS**
- fix(plat/css): fix invalid redistributor poweroff ([1432d4b86](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/1432d4b86ea11160d211470a15cdcdc1e36bb0fb))
- **ST**
- fix(st): include utils.h to solve compilation error ([06d5116f2](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/06d5116f29bcffef89ae3190bb4df3043cb91cf8))
- **Intel**
- fix(intel): fix fcs_client crashed when increased param size ([2b2eaf1d9](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/2b2eaf1d96255f5e56cf8469e98ee77631b0bcda))
- **Layerscape**
- fix(layerscape): unlock write access SMMU_CBn_ACTLR ([40b90a9c4](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/40b90a9c4ce8a7f131ea65edb549d8f0160a5999))
- fix(layerscape): fix errata a008850 ([61cc890d7](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/61cc890d715e6d388ed15ba9cb1a5a8c66ded6c3))
- **LX2**
- feat(lx2): enable OCRAM ECC ([1c65e8798](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/1c65e8798b5be2a2ac7f3aaa410e02f7fc4b29ad))
- feat(lx2): support more variants ([fa8a6d76f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/fa8a6d76ffe03647676f12740fce5a2ed3735616))
- fix(lx2): init global data before using it ([fd857216e](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/fd857216e5e7bec268579f4999b9c23dd7c1cfac))
- **NXP**
- fix(nxp-drivers): fix tzc380 memory regions config ([4b654f4b4](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/4b654f4b47267469426a3f77ad0981a1063ebf24))
- fix(nxp-ddr): apply Max CDD values for warm boot ([1414e0add](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/1414e0adda7fdfa4405412c6328d52371e1e376a))
- fix(nxp-ddr): use CDDWW for write to read delay ([8047151ab](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/8047151ab249c9f900132486c17d5bdf39d7ca51))
- **ls1046a**
- fix(ls1046a): 4 keys secureboot failure resolved ([ff8694041](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/ff8694041010045e3fcafe57aed0fbbe236d2cf5))
- **Security**
- docs(security): security advisory for CVE-2022-47630 ([084d29c26](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/084d29c2654f0717129aac116adb644df9a8387c))
- fix(auth): properly validate X.509 extensions ([a89b1f193](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/a89b1f19303add7971828546f922bb9f889dae87))
- fix(auth): avoid out-of-bounds read in auth_nvctr() ([187e79427](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/187e79427dd09ae4b47128aa17975dc1310453bc))
- fix(auth): require at least one extension to be present ([379183edc](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/379183edc4d34e513678f652703b890c1db95d3b))
- fix(auth): forbid junk after extensions ([609437cbf](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/609437cbf591d77050d4a4e2de4e0c322d71706e))
- **Tools**
- fix(sptool): add dependency to SP image ([9e01aedd4](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/9e01aedd4359311169f4e472240314db8494d251))
-------------------------------------------------------------------
Mon Apr 3 09:57:51 UTC 2023 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Add fvp platform
-------------------------------------------------------------------
Thu Jan 12 09:45:00 UTC 2023 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Disable debug build on sun50i_a64 as it is too big
-------------------------------------------------------------------
Tue Jan 10 14:06:18 UTC 2023 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Update to version 2.8:
* changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.md
-------------------------------------------------------------------
Tue Jan 10 09:05:12 UTC 2023 - Oscar Curero <oscar@naiandei.net>
- Add sun50i_h616 flavor for OrangePi Zero2
-------------------------------------------------------------------
Mon Nov 21 19:23:38 UTC 2022 - Michal Suchanek <msuchanek@suse.com>
- Add --no-warn-rwx-segment always, the problem is not specific to Tumbleweed.
-------------------------------------------------------------------
Tue Aug 30 11:34:06 UTC 2022 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Add --no-warn-rwx-segment to LDFLAGS on Tumbleweed, as a
workaround for binutils 2.39
See https://developer.trustedfirmware.org/T996
-------------------------------------------------------------------
Mon Aug 29 10:47:03 UTC 2022 - Michal Suchanek <msuchanek@suse.com>
- Workaround for gcc 7 constant assigment error (boo#1202477).
+ Workaround-gcc-7-constant-assignment-error.patch
-------------------------------------------------------------------
Wed Aug 17 08:48:09 UTC 2022 - Michal Suchanek <msuchanek@suse.com>
- Do not disable build on Leap
- Fix build on Tumbleweed
-------------------------------------------------------------------
Wed Jul 13 11:25:48 UTC 2022 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Fix build of zynqmp with gcc7 (Leap 15.4)
-------------------------------------------------------------------
Fri Jul 8 14:49:35 UTC 2022 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Update to version 2.7:
* changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.md
- Drop usptream patches:
0001-docs-security-security-advisory-for-CVE-2022-23960.patch
0002-fix-security-workaround-for-CVE-2022-23960.patch
0003-refactor-el3-runtime-change-Cortex-A76-implementatio.patch
0004-fix-security-loop-workaround-for-CVE-2022-23960-for-.patch
0005-fix-security-workaround-for-CVE-2022-23960-for-Corte.patch
0006-fix-security-SMCCC_ARCH_WORKAROUND_3-mitigations-for.patch
-------------------------------------------------------------------
Fri Jul 1 14:50:40 UTC 2022 - Michal Suchanek <msuchanek@suse.com>
- rockchip: rk3399: Align default baudrate with u-boot (boo#1201096).
* rockchip-rk3399-Align-default-baudrate-with-u-boot.patch
-------------------------------------------------------------------
Thu May 19 09:50:31 UTC 2022 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Add "--param=min-pagesize=0" to CFLAGS as a workaround for
GCC12 bug: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105523
- Add a patch to add "--param=min-pagesize=0" for
mv-ddr-marvell-armada since it does not use CFLAGS:
* fix-mv-ddr-marvell-armada.patch
- Fix bug on A3700 flavor found by GCC12:
* fix-a3700_tool.patch
-------------------------------------------------------------------
Fri Mar 18 09:48:05 UTC 2022 - Ivan Ivanov <ivan.ivanov@suse.com>
- Backport fallowing patches mitigating CVE-2022-23960 [1] and [2].
0001-docs-security-security-advisory-for-CVE-2022-23960.patch
0002-fix-security-workaround-for-CVE-2022-23960.patch
0003-refactor-el3-runtime-change-Cortex-A76-implementatio.patch
0004-fix-security-loop-workaround-for-CVE-2022-23960-for-.patch
0005-fix-security-workaround-for-CVE-2022-23960-for-Corte.patch
0006-fix-security-SMCCC_ARCH_WORKAROUND_3-mitigations-for.patch
Fixes bsc#1196657
[1] https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-9.html
[2] https://review.trustedfirmware.org/q/topic:"spectre_bhb"
-------------------------------------------------------------------
Tue Feb 8 09:29:53 UTC 2022 - Matwey Kornilov <matwey.kornilov@gmail.com>
- Update A3700-utils-marvell version:
Fix build SATA bootloader for A3700 boards
Drop fix-A3700-gcc11.patch: upstreamed
Enable %fdupes which is particularly useful for a3700 flavour
-------------------------------------------------------------------
Wed Feb 2 07:09:52 UTC 2022 - Stefan Weiberg <sweiberg@suse.com>
- ExclusiveArch got overwritten, using else branches instead as
SLE 15 SP4 continued to build excluded flavours
(related to bsc#1193779 and bsc#1195129)
-------------------------------------------------------------------
Mon Jan 31 14:24:30 UTC 2022 - Stefan Weiberg <sweiberg@suse.com>
- Fixing the if statement to disable some targets on SLE 15 SP4, as
the prior change resulted in the packages being built on other
architectures than aarch64 on SLE 15 SP4
(related to bsc#1193779 and bsc#1195129)
-------------------------------------------------------------------
Fri Jan 28 08:37:26 UTC 2022 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Disable some targets on SLE15-SP4 because of missing deps in SLE:
a3700, hikey, hikey960, imx8qm, imx8qx, rk3399
Fixes bsc#1193779 and bsc#1195129
-------------------------------------------------------------------
Fri Jan 14 12:29:15 UTC 2022 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Add qemu_sbsa flavor
-------------------------------------------------------------------
Thu Jan 6 08:42:29 UTC 2022 - Ivan Ivanov <ivan.ivanov@suse.com>
- Auto install on RPi4
-------------------------------------------------------------------
Fri Dec 10 14:16:59 UTC 2021 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Update to version 2.6:
* changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.md
- Update mv-ddr-marvell-armada-atf-master to latest version
- Drop upstreamed patch:
* atf-2411053.diff
- Add patch to allow to use non-git checkouts:
* atf-allow-non-git-dir.patch
-------------------------------------------------------------------
Tue Jul 6 12:16:36 UTC 2021 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Update mv-ddr-marvell to use master branch as upstream recommends
This fixes build of a80x0_mcbin
- Update A3700-utils-marvell to use master branch as upstream recommends
- Re-enable A3700 tools with patch:
* fix-A3700-gcc11.patch
- And refresh patch:
* A3700_utils-drop-git.patch
-------------------------------------------------------------------
Thu Jun 10 10:16:18 UTC 2021 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Disable A3700 tools until fixed upstream:
https://github.com/MarvellEmbeddedProcessors/A3700-utils-marvell/issues/22
-------------------------------------------------------------------
Thu Jun 3 12:54:02 UTC 2021 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Fix rk3399 build:
* atf-2411053.diff
-------------------------------------------------------------------
Thu May 20 15:20:04 UTC 2021 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Update to version 2.5:
* changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.rst#version-25
-------------------------------------------------------------------
Fri Dec 11 09:30:17 UTC 2020 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Update to version 2.4:
* changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.rst#n7
- Replace mv-ddr-marvell-armada-atf-mainline.tar.gz with
mv-ddr-marvell-mv-ddr-devel.tar.gz to match the upstream requirements
- Drop upstream patch:
* mv-ddr.diff
-------------------------------------------------------------------
Sat Oct 17 01:03:28 UTC 2020 - Andreas Färber <afaerber@suse.de>
- Fix BUILD_MESSAGE_TIMESTAMP (don't try parsing deleted .changes)
- Clean up rpi4 build
- Drop comments to avoid RPM errors about %else and %endif end of line
- Update mv-ddr-marvell from mv_ddr-atf-mainline branch to mv-ddr-devel 14.0.0
* Add mv-ddr.diff (from d:A:F:Contrib:MacchiatoBin) to fix a warning treated as error
* Add a _service to clarify its origin and facilitate future updates
- Update A3700-utils-marvell from armada-18.12 to armada-18.12-fixed branch
* Drop A3700_utils-TBB-Split-INCDIR-from-LIBDIR.patch (merged)
* Drop A3700_utils-TBB-Fix-building-for-Crypto-6.0-and-later.patch (merged)
* Actually apply A3700_utils-drop-git.patch (output cleanup)
- Build and package A3700 utils as part of -tools (non-noarch, ensure PIE)
- Build the tools for all architectures again
- Add binaries-marvell from binaries-marvell-armada-SDK10.0.1.0 branch
- Add a80x0_mcbin and extend a3700 to build and package all needed files
* Suppress OP-TEE for now, as it fails to initialize
-------------------------------------------------------------------
Fri Oct 16 23:35:20 UTC 2020 - Andreas Färber <afaerber@suse.de>
- Build fixes for a3700 and a80x0_mcbin
-------------------------------------------------------------------
Thu Jul 2 17:18:45 UTC 2020 - Nicolas Patricio Saenz Julienne <nsaenzjulienne@suse.com>
- Add rpi4
-------------------------------------------------------------------
Thu Apr 23 12:25:49 UTC 2020 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Disable debug on imx8mq to fix build
-------------------------------------------------------------------
Thu Apr 23 09:59:49 UTC 2020 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Update to 2.3:
* Add support for Armv8.4-SecEL2 extension through the SPCI defined SPMD/SPMC components.
* Build option to support EL2 context save and restore in the secure world (CTX_INCLUDE_EL2_REGS).
* Add support for SMCCC v1.2 (introducing the new SMCCC_ARCH_SOC_ID SMC).
Note that the support is compliant, but the SVE registers save/restore will be done as part of future S-EL2/SPM development.
* Enhanced BL2 bootloader flow to load secure partitions based on firmware configuration data (fconf).
* Changes necessary to support SEPARATE_NOBITS_REGION feature
* TSP and BL2_AT_EL3: Add Position Independent Execution PIE support
* Enable MTE support
* Enable Link Time Optimization in GCC
* Add CPU support:
- cortex-a57: Enable higher performance non-cacheable load forwarding
- Hercules: Workaround for Errata 1688305
- Klein: Support added for Klein CPU
- Matterhorn: Support added for Matterhorn CPU
* Full changelog: https://trustedfirmware-a.readthedocs.io/en/latest/change-log.html#version-2-3
-------------------------------------------------------------------
Sat Feb 1 21:01:01 UTC 2020 - Matwey Kornilov <matwey.kornilov@gmail.com>
- Initial implementation for Marvel A3700 platform
-------------------------------------------------------------------
Thu Oct 24 10:53:55 UTC 2019 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Switch to _multibuild system
- Update to 2.2:
* Enable Pointer Authentication (PAuth) support for Secure World
- Adds support for ARMv8.3-PAuth in BL1 SMC calls and BL2U
image for firmware updates.
* Enable Memory Tagging Extension (MTE) support in both secure
and non-secure worlds
- Adds support for the new Memory Tagging Extension arriving
in ARMv8.5. MTE support is now enabled by default on
systems that support it at EL0.
- To enable it at ELx for both the non-secure and the secure
world, the compiler flag CTX_INCLUDE_MTE_REGS includes
register saving and restoring when necessary in order to
prevent information leakage between the worlds.
* Add support for Branch Target Identification (BTI)
* Full changelog: https://trustedfirmware-a.readthedocs.io/en/latest/change-log.html#version-2-2
- Drop upstreamed patches:
* arm-trusted-firmware_hikey960_race.patch
* arm-trusted-firmware_poplar_mmc_dma.patch
* arm-trusted-firmware_zynqmp_ipi.patch
-------------------------------------------------------------------
Wed Sep 4 22:19:57 UTC 2019 - Andreas Färber <afaerber@suse.de>
- Add zynqmp
* arm-trusted-firmware_zynqmp_ipi.patch
-------------------------------------------------------------------
Thu Aug 1 07:02:12 UTC 2019 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Add initial bits for a80x0_mcbin support for MacchiatoBin
-------------------------------------------------------------------
Sun Jun 16 16:00:26 UTC 2019 - Andreas Färber <afaerber@suse.de>
- rpi3: By now building okay with OP-TEE
- rpi3: Replace dependency on deprecated bootstrap code with U-Boot
- rpi3: Change installation location (adopted from u-boot-rpi3)
- poplar: Fix eMMC DMA FIFO breaking U-Boot eMMC access
(https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/1230)
arm-trusted-firmware_poplar_mmc_dma.patch
- poplar: Build for both 2 GiB and 1 GiB boards (b96o#834)
-------------------------------------------------------------------
Sat Jun 8 18:19:24 UTC 2019 - Andreas Färber <afaerber@suse.de>
- Add imxmq and imxmm
-------------------------------------------------------------------
Sat Jun 8 15:47:29 UTC 2019 - Andreas Färber <afaerber@suse.de>
- Fix build date by escaping %S (which expanded to %SOURCE).
- hikey960: Avoid a race condition (boo#1134788)
arm-trusted-firmware_hikey960_race.patch
-------------------------------------------------------------------
Tue Apr 9 13:51:40 UTC 2019 - Guillaume GARDET <guillaume.gardet@opensuse.org>
- Update to v2.1:
* Add ARMv8.3 pointer authentication in the normal and secure worlds
* Cortex-Axx workarounds for erratums
* New platforms
* Full changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/about/docs/change-log.rst#version-2-1
- Remove outdated patch:
* hikey960.diff
-------------------------------------------------------------------
Thu Mar 28 23:06:55 UTC 2019 - Andreas Färber <afaerber@suse.de>
- rpi3: Package armstub8.bin, fip.bin, bl1.bin, bl2.bin
-------------------------------------------------------------------
Sun Nov 11 16:56:46 UTC 2018 - afaerber@suse.de
- pre_checkin.sh: Fix package names for sun50i_{a64,h6}
-------------------------------------------------------------------
Sun Nov 4 15:16:20 UTC 2018 - afaerber@suse.de
- Add imx8qm, imx8qx, sun50i_a64, sun50i_h6
-------------------------------------------------------------------
Sun Nov 4 14:29:26 UTC 2018 - afaerber@suse.de
- Update to v2.0
* Drop upstream patches
arm-trusted-firmware_cve-2018-3639_smccc_rename.patch
arm-trusted-firmware_cve-2018-3639_smccc_return.patch
arm-trusted-firmware_cve-2018-3639_rename.patch
arm-trusted-firmware_cve-2018-3639_static.patch
arm-trusted-firmware_cve-2018-3639_static_aarch32.patch
arm-trusted-firmware_cve-2018-3639_dynamic.patch
* fip_create wrapper is no longer built (use fiptool instead)
* Set BL33 for qemu
-------------------------------------------------------------------
Sun Jun 3 18:48:01 UTC 2018 - afaerber@suse.de
- Conditionally enable OP-TEE as BL32
-------------------------------------------------------------------
Sun Jun 3 17:39:05 UTC 2018 - afaerber@suse.de
- Add rpi3
-------------------------------------------------------------------
Sun Jun 3 05:53:57 UTC 2018 - afaerber@suse.de
- Set BUILD_MESSAGE_TIMESTAMP for reproducible builds
- Simplify tegra packaging, reusing %target_soc
-------------------------------------------------------------------
Fri Jun 1 09:09:14 UTC 2018 - afaerber@suse.de
- Address CVE-2018-3639 (bsc#1085308)
arm-trusted-firmware_cve-2018-3639_smccc_rename.patch
arm-trusted-firmware_cve-2018-3639_smccc_return.patch
arm-trusted-firmware_cve-2018-3639_rename.patch
arm-trusted-firmware_cve-2018-3639_static.patch
arm-trusted-firmware_cve-2018-3639_static_aarch32.patch
arm-trusted-firmware_cve-2018-3639_dynamic.patch
-------------------------------------------------------------------
Thu May 31 23:32:12 UTC 2018 - afaerber@suse.de
- hikey960.diff: Fix assertion on HiKey 960 (b9o#739)
-------------------------------------------------------------------
Thu May 31 19:21:09 UTC 2018 - afaerber@suse.de
- Package bl2 for hikey and hikey960
-------------------------------------------------------------------
Mon May 21 01:13:15 UTC 2018 - afaerber@suse.de
- Add tegra186
-------------------------------------------------------------------
Mon May 21 00:25:58 UTC 2018 - afaerber@suse.de
- Package poplar_layout.h header for l-loader in devel package
-------------------------------------------------------------------
Sun May 20 20:15:00 UTC 2018 - afaerber@suse.de
- Build recovery version of poplar, too
-------------------------------------------------------------------
Sun May 20 18:44:14 UTC 2018 - afaerber@suse.de
- Adopt %license
- Add poplar
- Prepare tegra186
-------------------------------------------------------------------
Sun May 20 17:13:47 UTC 2018 - afaerber@suse.de
- Update to v1.5
* Dropped upstream patches:
arm-trusted-firmware_pie_1.patch
arm-trusted-firmware_pie_2.patch
arm-trusted-firmware_fiptool_pad.patch
arm-trusted-firmware_fiptool_pad_useafterfree.patch
arm-trusted-firmware_fiptool_pad_hikey.patch
arm-trusted-firmware_fiptool_pad_hikey960.patch
arm-trusted-firmware_cve-2017-5715_a57_a72.patch
arm-trusted-firmware_cve-2017-5715_a73_a75.patch
arm-trusted-firmware_cve-2017-5715_pfr0.patch
arm-trusted-firmware_cve-2017-5715_errata_format.patch
arm-trusted-firmware_cve-2017-5715_errata_output.patch
arm-trusted-firmware_cve-2017-5715_platforms.patch
arm-trusted-firmware_cve-2017-5715_bpiall.patch
arm-trusted-firmware_cve-2017-5715_smccc.patch
arm-trusted-firmware_cve-2017-5715_psci.patch
arm-trusted-firmware_cve-2017-5715_runtime_exceptions.patch
arm-trusted-firmware_cve-2017-5715_smccc_v1.1.patch
-------------------------------------------------------------------
Sat Feb 10 16:46:15 UTC 2018 - afaerber@suse.de
- Apply fiptool patches to tools package, too (b9o#633)
- Prepare for detecting PIE support (gh#ARM-software/tf-issues#519)
arm-trusted-firmware_pie_1.patch
arm-trusted-firmware_pie_2.patch
-------------------------------------------------------------------
Sat Feb 10 11:05:00 UTC 2018 - afaerber@suse.de
- Implement SMCCC v1.1 (bsc#1074741)
arm-trusted-firmware_cve-2017-5715_platforms.patch
arm-trusted-firmware_cve-2017-5715_bpiall.patch
arm-trusted-firmware_cve-2017-5715_smccc.patch
arm-trusted-firmware_cve-2017-5715_psci.patch
arm-trusted-firmware_cve-2017-5715_runtime_exceptions.patch
arm-trusted-firmware_cve-2017-5715_smccc_v1.1.patch
-------------------------------------------------------------------
Sat Jan 27 13:10:47 UTC 2018 - afaerber@suse.de
- Pad HiKey FIP to avoid hanging fastboot transfer (b9o#633)
arm-trusted-firmware_fiptool_pad.patch
arm-trusted-firmware_fiptool_pad_useafterfree.patch
arm-trusted-firmware_fiptool_pad_hikey.patch
arm-trusted-firmware_fiptool_pad_hikey960.patch
-------------------------------------------------------------------
Sat Jan 27 05:41:01 UTC 2018 - afaerber@suse.de
- Add CVE-2017-5715 output (bsc#1074741)
arm-trusted-firmware_cve-2017-5715_errata_format.patch
arm-trusted-firmware_cve-2017-5715_errata_output.patch
-------------------------------------------------------------------
Mon Jan 22 02:03:03 UTC 2018 - afaerber@suse.de
- Use debug builds
-------------------------------------------------------------------
Fri Jan 12 00:47:57 UTC 2018 - afaerber@suse.de
- rk3399: Don't require cross binutils (let cross gcc choose which)
-------------------------------------------------------------------
Fri Jan 12 00:07:40 UTC 2018 - afaerber@suse.de
- hikey960: Build fip and require EDK2 for SCP_BL2 and BL33
- Refresh CVE-2017-5715 patches (bsc#1074741)
Drop arm-trusted-firmware_cve-2017-5715_ic_iallu.patch
Add arm-trusted-firmware_cve-2017-5715_pfr0.patch
- Suppress debuginfo for firmware
-------------------------------------------------------------------
Sun Jan 7 18:07:45 UTC 2018 - afaerber@suse.de
- Make noarch so that it can be exported
-------------------------------------------------------------------
Sun Jan 7 16:26:58 UTC 2018 - afaerber@suse.de
- hikey: Build fip and require EDK2 for SCP_BL2
- Add tegra210
-------------------------------------------------------------------
Sun Jan 7 14:13:53 UTC 2018 - afaerber@suse.de
- Add hikey960
-------------------------------------------------------------------
Sun Jan 7 14:04:14 UTC 2018 - afaerber@suse.de
- Add hikey
- Clean up pre_checkin.sh
- Don't package bl31.bin for Rockchip, we need bl31.elf only
-------------------------------------------------------------------
Fri Jan 5 06:05:48 UTC 2018 - afaerber@suse.de
- Require arm-none gcc for RK3399
-------------------------------------------------------------------
Fri Jan 5 01:42:30 UTC 2018 - afaerber@suse.de
- Address CVE-2017-5715 (bsc#1074741)
arm-trusted-firmware_cve-2017-5715_a57_a72.patch
arm-trusted-firmware_cve-2017-5715_a73_a75.patch
arm-trusted-firmware_cve-2017-5715_ic_iallu.patch
-------------------------------------------------------------------
Wed Jan 3 16:06:42 UTC 2018 - matwey.kornilov@gmail.com
- Return lost doc files
-------------------------------------------------------------------
Tue Jan 2 18:42:17 UTC 2018 - matwey.kornilov@gmail.com
- Package bl31.elf
-------------------------------------------------------------------
Tue Jan 2 18:25:45 UTC 2018 - matwey.kornilov@gmail.com
- acknowledgements.md renamed to acknowledgements.rst
-------------------------------------------------------------------
Thu Dec 28 17:06:51 UTC 2017 - matwey.kornilov@gmail.com
- Version 1.4
-------------------------------------------------------------------
Mon Dec 26 06:57:57 UTC 2016 - afaerber@suse.de
- Update to v1.3 final
-------------------------------------------------------------------
Sat Oct 8 15:28:50 UTC 2016 - afaerber@suse.de
- Initial

530
arm-trusted-firmware.spec Normal file
View File

@ -0,0 +1,530 @@
#
# spec file for package arm-trusted-firmware
#
# Copyright (c) 2023 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
# Please submit bugfixes or comments via https://bugs.opensuse.org/
#
%global platform @BUILD_FLAVOR@%{nil}
%if "%{platform}" == "a3700" || "%{platform}" == "imx8mq" || "%{platform}" == "sun50i_a64"
# Debug build not supported for UART boot on a3700
# Debug build is too big on imx8mq, see: https://developer.trustedfirmware.org/T626
# Debug build is too big on sun50i_a64 see: https://git.trustedfirmware.org/ci/tf-a-ci-scripts.git/commit/?id=3a78c106bb417a48572c46923c935e8193c4a7bf
%global debug_build 0
%else
%global debug_build 1
%endif
%bcond_without A3700_tools
%bcond_with atf_optee
%if %{with atf_optee}
%define use_optee 1
%if "%{platform}" == "" || "%{platform}" == "fvp" || "%{platform}" == "tegra186" || "%{platform}" == "tegra210" || "%{platform}" == "rk3328" || "%{platform}" == "rk3368" || "%{platform}" == "rk3399" || "%{platform}" == "rpi4"
# OP-TEE not available
%define use_optee 0
%endif
%if "%{platform}" == "a3700" || "%{platform}" == "a80x0_mcbin" || "%{platform}" == "imx8qm" || "%{platform}" == "imx8qx" || "%{platform}" == "imx8mq" || "%{platform}" == "imx8mm" || "%{platform}" == "sun50i_a64" || "%{platform}" == "sun50i_h6" || "%{platform}" == "sun50i_h616" || "%{platform}" == "zynqmp"
# TBD
%define use_optee 0
%endif
%else
%define use_optee 0
%endif
%if "%{platform}" == ""
Name: arm-trusted-firmware
%else
Name: arm-trusted-firmware-%{platform}
%endif
Version: 2.8.8
Release: 0
%define srcversion 2.8.8
%define mv_ddr_ver armada-atf-master
%define mv_bin_ver 10.0.1.0
%define a3700_utils_ver master
Summary: Arm Trusted Firmware-A
License: BSD-3-Clause
Group: System/Boot
URL: https://www.trustedfirmware.org/
Source: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/snapshot/trusted-firmware-a-lts-v%{srcversion}.tar.gz
Source1: mv-ddr-marvell-%{mv_ddr_ver}.tar.gz
Source2: A3700-utils-marvell-%{a3700_utils_ver}.tar.gz
Source3: binaries-marvell-%{mv_bin_ver}.tar.gz
Patch1: atf-allow-non-git-dir.patch
Patch2: rockchip-rk3399-Align-default-baudrate-with-u-boot.patch
Patch3: Workaround-gcc-7-constant-assignment-error.patch
# Workaround for GCC12 bug - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105523
Patch100: fix-mv-ddr-marvell-armada.patch
# Fix build with GCC12 - https://github.com/MarvellEmbeddedProcessors/mv-ddr-marvell/issues/37
Patch101: fix-a3700_tool.patch
Patch150: A3700_utils-drop-git.patch
BuildRequires: fdupes
%if "%{platform}" != ""
#!BuildIgnore: gcc-PIE
%endif
%if "%{platform}" == "a3700"
BuildRequires: arm-trusted-firmware-tools
BuildRequires: cross-arm-none-newlib-devel
BuildRequires: gcc-c++
BuildRequires: libcryptopp-devel
%endif
%if "%{platform}" == "a3700" || "%{platform}" == "rk3399"
BuildRequires: cross-arm-none-gcc%{gcc_version}
%endif
%if "%{platform}" == "a80x0_mcbin" && 0
BuildRequires: edk2-Armada80x0McBin
%endif
%if "%{platform}" == "fvp"
BuildRequires: dtc
BuildRequires: edk2-ArmVExpress-FVP-AArch64
%endif
%if "%{platform}" == "hikey"
BuildRequires: edk2-hikey
%endif
%if "%{platform}" == "hikey960"
BuildRequires: edk2-hikey960
%endif
%if "%{platform}" == ""
BuildRequires: gcc-c++
%endif
BuildRequires: git
%if "%{platform}" == ""
BuildRequires: libcryptopp-devel
%endif
BuildRequires: libopenssl-devel
%if %{use_optee}
%if "%{platform}" == "qemu_sbsa"
BuildRequires: optee-qemu-armv8a
%else
%if "%{platform}" == "a3700"
BuildRequires: optee-armada3700
%else
%if "%{platform}" == "a80x0_mcbin"
BuildRequires: optee-armada7k8k
%else
BuildRequires: optee-%{platform}
%endif
%endif
%endif
%endif
%if "%{platform}" == "qemu"
BuildRequires: qemu-uefi-aarch64
%endif
%if "%{platform}" == "rpi3" || "%{platform}" == "rpi4"
# For /boot/vc
BuildRequires: raspberrypi-firmware
%endif
%if "%{platform}" == "a3700"
BuildRequires: u-boot-mvebuespressobin-88f3720
%endif
%if "%{platform}" == "a80x0_mcbin" && 1
BuildRequires: u-boot-mvebumcbin-88f8040
%endif
%if "%{platform}" == "hikey"
BuildRequires: u-boot-hikey
%endif
%if "%{platform}" == "poplar"
BuildRequires: u-boot-poplar
%endif
%if "%{platform}" == "rpi3"
BuildRequires: u-boot-rpi3
%endif
BuildRoot: %{_tmppath}/%{name}-%{version}-build
%if "%{platform}" != ""
BuildArch: noarch
ExclusiveArch: aarch64
%endif
%if "%{platform}" == "rpi4"
Supplements: modalias(of:N*T*Cbrcm%2Cbcm2711*C*)
%endif
%description
Trusted Firmware-A (TF-A) provides a reference implementation of secure world
software for Armv7-A and Armv8-A, including a Secure Monitor executing at
Exception Level 3 (EL3).
%if "%{platform}" == "poplar"
%package devel
Summary: ARM Trusted Firmware -- %{platform} development files
Group: System/Boot
Requires: %{name} = %{version}
%description devel
ARM Trusted Firmware provides a reference implementation of
secure world software for ARMv8-A, including a Secure Monitor executing at
Exception Level 3 (EL3). It implements various ARM interface standards,
such as the Power State Coordination Interface (PSCI),
Trusted Board Boot Requirements (TBBR, ARM DEN0006C-1) and
SMC Calling Convention. As far as possible the code is designed for reuse
or porting to other ARMv8-A model and hardware platforms.
This sub-package contains development files.
%endif
%if "%{platform}" == ""
%package tools
Summary: Tools for ARM Trusted Firmware-A
Group: System/Boot
%description tools
Trusted Firmware-A (TF-A) provides a reference implementation of
secure world software for ARMv8-A, including a Secure Monitor executing at
Exception Level 3 (EL3). It implements various ARM interface standards,
such as the Power State Coordination Interface (PSCI),
Trusted Board Boot Requirements (TBBR, ARM DEN0006C-1) and
SMC Calling Convention. As far as possible the code is designed for reuse
or porting to other ARMv8-A model and hardware platforms.
This package contains fiptool.
%endif
%prep
%if "%{platform}" == "a3700" || "%{platform}" == "a80x0_mcbin"
%if "%{platform}" == "a3700"
%setup -q -n trusted-firmware-a-lts-v%{srcversion} -a 1 -a 2
%else
%setup -q -n trusted-firmware-a-lts-v%{srcversion} -a 1 -a 3
%endif
# git repo or branch.txt file are expected
echo "%{mv_ddr_ver}" > mv-ddr-marvell-%{mv_ddr_ver}/branch.txt
pushd mv-ddr-marvell-%{mv_ddr_ver}
%if %{suse_version} > 1550
# Workaround for GCC12 bug - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105523
%patch100 -p1
%endif
%patch101 -p1
popd
%else
%if "%{platform}" == ""
%setup -q -n trusted-firmware-a-lts-v%{srcversion} -a 2
%else
%setup -q -n trusted-firmware-a-lts-v%{srcversion}
%endif
%endif
%if "%{platform}" == "" || "%{platform}" == "a3700"
pushd A3700-utils-marvell-%{a3700_utils_ver}
# git repo or branch.txt file are expected
echo "%{a3700_utils_ver}" > branch.txt
%if "%{platform}" != ""
install -D -m 0755 %{_bindir}/TBB wtptp/linux/tbb_linux
%endif
%patch150 -p1
popd
%endif
%patch1 -p1
%patch2 -p1
%patch3 -p1
%if %{suse_version} <= 1500
# GCC7 does not support -mbranch-protection option
sed -i -e "s/TF_CFLAGS_aarch64 += -mbranch-protection=none//" plat/xilinx/zynqmp/platform.mk
%endif
%build
export TF_LDFLAGS=--no-warn-rwx-segments
export BUILD_MESSAGE_TIMESTAMP="\"$(date -d "$(head -n 2 %{_sourcedir}/arm-trusted-firmware.changes | tail -n 1 | cut -d- -f1 )" -u "+%%H:%%M:%%S, %%b %%e %%Y")\""
%if "%{platform}" == "a3700"
export CRYPTOPP_LIBDIR=%{_libdir}
export CRYPTOPP_INCDIR=%{_includedir}/cryptopp
%endif
%if "%{platform}" == ""
make %{?_smp_mflags} V=1 fiptool
%if %{with A3700_tools}
pushd A3700-utils-marvell-%{a3700_utils_ver}
make %{?_smp_mflags} -C wtptp/src/TBB_Linux -f TBB_linux.mak INCDIR=%{_includedir}/cryptopp LIBDIR=%{_libdir}
make %{?_smp_mflags} -C wtptp/src/Wtpdownloader_Linux -f makefile.mk
popd
%endif
%else
%if "%{platform}" == "a3700"
export CROSS_CM3=arm-none-eabi-
%define variants ebin_512M_spinor ebin_v3_1G_spinor ebin_v5_2G_spinor ebin_v7_1G_spinor ebin_v7_2G_spinor ebin_512M_sata ebin_v3_1G_sata ebin_v5_2G_sata ebin_v7_1G_sata ebin_v7_2G_sata
for variant in %{variants}; do
partnum=0
case "${variant}" in
ebin_*)
clockspreset=CPU_1000_DDR_800
;;
esac
case "${variant}" in
ebin_512M_*)
ddr_topology=0
;;
ebin_v3_1G_*)
ddr_topology=2
;;
ebin_v5_2G_*)
ddr_topology=7
;;
ebin_v7_1G_*)
ddr_topology=5
;;
ebin_v7_2G_*)
ddr_topology=6
;;
esac
case "${variant}" in
*_emmc) bootdev=EMMCNORM ;;
*_sata) bootdev=SATA ;;
*_spinand) bootdev=SPINAND ;;
*_spinor) bootdev=SPINOR ;;
esac
make distclean
%endif
%if "%{platform}" == "poplar"
for dram_size in one_gig two_gig; do
%endif
%if 0%{suse_version} > 1550
# Workaround for GCC12 bug - https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105523
export TF_CFLAGS="$TF_CFLAGS --param=min-pagesize=0"
export CFLAGS="$CFLAGS --param=min-pagesize=0"
# Workaround for binutils 2.39 https://developer.trustedfirmware.org/T996
export LDFLAGS="$LDFLAGS --no-warn-rwx-segment"
%endif
make \
%if "%{platform}" != "a3700" && "%{platform}" != "a80x0_mcbin"
%{?_smp_mflags} \
%endif
V=1 DISABLE_PEDANTIC=1 DEBUG=%{debug_build} \
%if "%{platform}" == "tegra186" || "%{platform}" == "tegra210"
%if "%{platform}" == "tegra186"
%define target_soc t186
%endif
%if "%{platform}" == "tegra210"
%define target_soc t210
%endif
PLAT=tegra TARGET_SOC=%{target_soc} \
%else
PLAT=%{platform} \
%endif
%if %{use_optee}
SPD=opteed \
BL32=/boot/tee-header_v2.bin \
BL32_EXTRA1=/boot/tee-pager_v2.bin \
BL32_EXTRA2=/boot/tee-pageable_v2.bin \
%endif
%if "%{platform}" == "a3700" || "%{platform}" == "a80x0_mcbin"
LOG_LEVEL=30 \
MV_DDR_PATH=$(pwd)/mv-ddr-marvell-%{mv_ddr_ver} \
%if "%{platform}" == "a3700"
WTP=$(pwd)/A3700-utils-marvell-%{a3700_utils_ver} \
CLOCKSPRESET=${clockspreset} DDR_TOPOLOGY=${ddr_topology} \
USE_COHERENT_MEM=0 \
%if %{use_optee}
LLC_ENABLE=1 LLC_SRAM=1 \
%endif
BOOTDEV=${bootdev} PARTNUM=${partnum} \
MARVELL_SECURE_BOOT=0 \
%endif
%if "%{platform}" == "a80x0_mcbin"
SCP_BL2=$(pwd)/binaries-marvell-%{mv_bin_ver}/mrvl_scp_bl2.img \
%endif
%if "%{platform}" == "a80x0_mcbin" && 0
BL33=/boot/ARMADA_EFI.fd \
%else
BL33=/boot/u-boot.bin \
%endif
%if "%{platform}" == "a3700" || "%{platform}" == "a80x0_mcbin"
mrvl_flash \
%if "%{platform}" == "a3700"
mrvl_uart \
%endif
%endif
all fip
%if "%{platform}" == "a3700"
mv build build.${variant}
done
%endif
%else
%if "%{platform}" == "fvp"
BL33=/boot/FVP_AARCH64_EFI.fd \
all fip
%else
%if "%{platform}" == "hikey"
SCP_BL2=/boot/mcuimage.bin \
BL33=/boot/u-boot.bin \
all fip
%else
%if "%{platform}" == "hikey960"
SCP_BL2=/boot/lpm3.img \
BL33=/boot/BL33_AP_UEFI.fd \
all fip
%else
%if "%{platform}" == "poplar"
BL33=/boot/u-boot.bin \
POPLAR_DRAM_SIZE=${dram_size} \
all fip
mv build build.${dram_size}
make %{?_smp_mflags} V=1 DISABLE_PEDANTIC=1 DEBUG=%{debug_build} \
PLAT=poplar POPLAR_RECOVERY=1 \
BL33=/boot/u-boot.bin \
POPLAR_DRAM_SIZE=${dram_size} \
all fip
mv build build.${dram_size}.recovery
done
%else
%if "%{platform}" == "rpi3"
BL33=/boot/vc/u-boot.bin \
RPI3_PRELOADED_DTB_BASE=0x01000000 \
RPI3_DIRECT_LINUX_BOOT=1 \
RPI3_RUNTIME_UART=1 \
all
%else
%if "%{platform}" == "qemu"
BL33=%{_datadir}/qemu/qemu-uefi-aarch64.bin \
all fip
%else
%if "%{platform}" == "qemu_sbsa"
all fip
%else
all
%endif
%endif
%endif
%endif
%endif
%endif
%endif
%endif
%endif
%install
%if "%{platform}" == ""
mkdir -p %{buildroot}%{_bindir}
install -m 755 tools/fiptool/fiptool %{buildroot}%{_bindir}/fiptool
%if %{with A3700_tools}
pushd A3700-utils-marvell-%{a3700_utils_ver}
# No need to have a _linux suffix on Linux
install -D -m 0755 wtptp/src/TBB_Linux/release/TBB_linux %{buildroot}%{_bindir}/TBB
install -D -m 0755 wtptp/src/Wtpdownloader_Linux/WtpDownload_linux %{buildroot}%{_bindir}/WtpDownload
popd
%endif
%else
export NO_BRP_STRIP_DEBUG=true
export NO_DEBUGINFO_STRIP_DEBUG=true
mkdir -p %{buildroot}%{_datadir}/%{name}
%if 0%{?debug_build}
%global dir debug
%else
%global dir release
%endif
%define outdir build/%{platform}/%{dir}
%if "%{platform}" == "tegra186" || "%{platform}" == "tegra210"
%define outdir build/tegra/%{target_soc}/%{dir}
%endif
%if "%{platform}" == "a3700"
for v in %{variants}; do
outdir=build.${v}/%{platform}/%{dir}
destdir=%{buildroot}%{_datadir}/%{name}/${v}
install -D -m 0644 ${outdir}/bl1.bin ${destdir}/bl1.bin
install -D -m 0644 ${outdir}/bl2.bin ${destdir}/bl2.bin
install -D -m 0644 ${outdir}/bl31.bin ${destdir}/bl31.bin
install -D -m 0644 ${outdir}/fip.bin ${destdir}/fip.bin
install -D -m 0644 ${outdir}/flash-image.bin ${destdir}/flash-image.bin
install -D -m 0644 ${outdir}/uart-images/TIM_ATF.bin ${destdir}/uart/TIM_ATF.bin
install -D -m 0644 ${outdir}/uart-images/boot-image_h.bin ${destdir}/uart/boot-image_h.bin
install -D -m 0644 ${outdir}/uart-images/wtmi_h.bin ${destdir}/uart/wtmi_h.bin
done
%else
%if "%{platform}" == "poplar"
for v in one_gig two_gig one_gig.recovery two_gig.recovery; do
outdir=build.${v}/%{platform}/%{dir}
destdir=%{buildroot}%{_datadir}/%{name}/${v}
install -D -m 0644 ${outdir}/bl1.bin ${destdir}/bl1.bin
install -D -m 0644 ${outdir}/fip.bin ${destdir}/fip.bin
done
mkdir -p %{buildroot}%{_includedir}/%{name}
install -D -m 0644 plat/hisilicon/poplar/include/poplar_layout.h %{buildroot}%{_includedir}/%{name}/
%else
# u-boot for rockchip requires bl31.elf file
%if "%{platform}" == "rk3328" || "%{platform}" == "rk3368" || "%{platform}" == "rk3399" || "%{platform}" == "zynqmp"
install -D -m 0644 %{outdir}/bl31/bl31.elf %{buildroot}%{_datadir}/%{name}/bl31.elf
%else
install -D -m 0644 %{outdir}/bl31.bin %{buildroot}%{_datadir}/%{name}/bl31.bin
%endif
%if "%{platform}" == "a80x0_mcbin" || "%{platform}" == "fvp" || "%{platform}" == "hikey" || "%{platform}" == "hikey960" || "%{platform}" == "qemu" || "%{platform}" == "qemu_sbsa" || "%{platform}" == "rpi3"
install -D -m 0644 %{outdir}/bl1.bin %{buildroot}%{_datadir}/%{name}/bl1.bin
install -D -m 0644 %{outdir}/fip.bin %{buildroot}%{_datadir}/%{name}/fip.bin
%endif
%if "%{platform}" == "a80x0_mcbin" || "%{platform}" == "hikey" || "%{platform}" == "hikey960" || "%{platform}" == "rpi3"
install -D -m 0644 %{outdir}/bl2.bin %{buildroot}%{_datadir}/%{name}/bl2.bin
%endif
%if "%{platform}" == "rpi3"
install -D -m 0644 %{outdir}/armstub8.bin %{buildroot}/boot/vc/armstub8.bin
%endif
%if "%{platform}" == "rpi4"
install -D -m 0644 %{outdir}/bl31.bin %{buildroot}/boot/vc/armstub8-rpi4.bin
%endif
%if "%{platform}" == "a80x0_mcbin"
install -D -m 0644 %{outdir}/ble.bin %{buildroot}%{_datadir}/%{name}/ble.bin
install -D -m 0644 %{outdir}/flash-image.bin %{buildroot}%{_datadir}/%{name}/flash-image.bin
%endif
%endif
%endif
%endif
%fdupes %{buildroot}%{_prefix}
%if "%{platform}" == "rpi3" || "%{platform}" == "rpi4"
%post
if mountpoint -q /boot/efi; then
if ! [[ "$(readlink -f /boot/efi)" -ef "$(readlink -f /boot/vc)" ]]; then
cp /boot/vc/armstub8* /boot/efi/
fi
fi
%endif
%files
%defattr(-,root,root)
%license license.rst
%doc docs/about/acknowledgements.rst docs/process/contributing.rst docs/about/maintainers.rst readme.rst dco.txt
%if "%{platform}" != ""
%{_datadir}/%{name}
%endif
%if "%{platform}" == "rpi3" || "%{platform}" == "rpi4"
/boot/vc/armstub8*
%endif
%if "%{platform}" == ""
%files tools
%defattr(-,root,root)
%{_bindir}/fiptool
%if %{with A3700_tools}
%{_bindir}/TBB
%{_bindir}/WtpDownload
%endif
%endif
%if "%{platform}" == "poplar"
%files devel
%defattr(-,root,root)
%{_includedir}/%{name}
%endif
%changelog

View File

@ -0,0 +1,29 @@
--- trusted-firmware-a-2.6/plat/marvell/armada/a3k/common/a3700_common.mk.orig 2021-12-10 16:20:41.997076569 +0100
+++ trusted-firmware-a-2.6/plat/marvell/armada/a3k/common/a3700_common.mk 2021-12-10 16:21:36.673658688 +0100
@@ -78,7 +78,7 @@ ifdef WTP
# Do not remove! Following checks are required to ensure correct TF-A builds, removing these checks leads to broken TF-A builds
$(if $(wildcard $(value WTP)/*),,$(error "'WTP=$(value WTP)' was specified, but '$(value WTP)' directory does not exist"))
-$(if $(shell git -C $(value WTP) rev-parse --show-cdup 2>&1),$(error "'WTP=$(value WTP)' was specified, but '$(value WTP)' does not contain valid A3700-utils-marvell git repository"))
+# $(if $(shell git -C $(value WTP) rev-parse --show-cdup 2>&1),$(error "'WTP=$(value WTP)' was specified, but '$(value WTP)' does not contain valid A3700-utils-marvell git repository"))
TBB := $(WTP)/wtptp/src/TBB_Linux/release/TBB_linux
@@ -164,7 +164,7 @@ $(TIMDDRTOOL): FORCE
# Do not remove! Following checks are required to ensure correct TF-A builds, removing these checks leads to broken TF-A builds
$(if $(value MV_DDR_PATH),,$(error "Platform '${PLAT}' for ddr tool requires MV_DDR_PATH. Please set MV_DDR_PATH to point to the right directory"))
$(if $(wildcard $(value MV_DDR_PATH)/*),,$(error "'MV_DDR_PATH=$(value MV_DDR_PATH)' was specified, but '$(value MV_DDR_PATH)' directory does not exist"))
- $(if $(shell git -C $(value MV_DDR_PATH) rev-parse --show-cdup 2>&1),$(error "'MV_DDR_PATH=$(value MV_DDR_PATH)' was specified, but '$(value MV_DDR_PATH)' does not contain valid mv-ddr-marvell git repository"))
+# $(if $(shell git -C $(value MV_DDR_PATH) rev-parse --show-cdup 2>&1),$(error "'MV_DDR_PATH=$(value MV_DDR_PATH)' was specified, but '$(value MV_DDR_PATH)' does not contain valid mv-ddr-marvell git repository"))
$(Q)$(MAKE) --no-print-directory -C $(WTP) MV_DDR_PATH=$(MV_DDR_PATH) DDR_TOPOLOGY=$(DDR_TOPOLOGY) mv_ddr
$(BUILD_PLAT)/$(UART_IMAGE): $(BUILD_PLAT)/$(BOOT_IMAGE) $(BUILD_PLAT)/wtmi.bin $(TBB) $(TIMBUILD) $(TIMDDRTOOL)
--- trusted-firmware-a-2.6/plat/marvell/armada/a8k/common/ble/ble.mk.orig 2021-12-10 16:54:58.282924868 +0100
+++ trusted-firmware-a-2.6/plat/marvell/armada/a8k/common/ble/ble.mk 2021-12-10 16:55:05.963006552 +0100
@@ -31,5 +31,5 @@ $(MV_DDR_LIB): FORCE
# Do not remove! Following checks are required to ensure correct TF-A builds, removing these checks leads to broken TF-A builds
$(if $(value MV_DDR_PATH),,$(error "Platform '$(PLAT)' for BLE requires MV_DDR_PATH. Please set MV_DDR_PATH to point to the right directory"))
$(if $(wildcard $(value MV_DDR_PATH)/*),,$(error "'MV_DDR_PATH=$(value MV_DDR_PATH)' was specified, but '$(value MV_DDR_PATH)' directory does not exist"))
- $(if $(shell git -C $(value MV_DDR_PATH) rev-parse --show-cdup 2>&1),$(error "'MV_DDR_PATH=$(value MV_DDR_PATH)' was specified, but '$(value MV_DDR_PATH)' does not contain valid mv-ddr-marvell git repository"))
+# $(if $(shell git -C $(value MV_DDR_PATH) rev-parse --show-cdup 2>&1),$(error "'MV_DDR_PATH=$(value MV_DDR_PATH)' was specified, but '$(value MV_DDR_PATH)' does not contain valid mv-ddr-marvell git repository"))
@+make -C $(MV_DDR_PATH) --no-print-directory PLAT_INCLUDES="$(MV_DDR_INCLUDES)" PLATFORM=$(PLAT) ARCH=AARCH64 OBJ_DIR=$(BUILD_PLAT)/ble

BIN
binaries-marvell-10.0.1.0.tar.gz (Stored with Git LFS) Normal file

Binary file not shown.

11
fix-a3700_tool.patch Normal file
View File

@ -0,0 +1,11 @@
--- mv-ddr-marvell-armada-atf-master/a3700/a3700_tool.c.orig 2022-05-19 14:28:35.521692453 +0200
+++ mv-ddr-marvell-armada-atf-master/a3700/a3700_tool.c 2022-05-19 14:29:21.318251836 +0200
@@ -327,7 +327,7 @@ static int ddr_cfg_read(FILE *fp, struct
if (strcmp(key, cfg_list[i].key) == 0)
strcpy(cfg_list[i].value, value);
}
- memset(key, 0, MAX_CFG_LINE_LEN);
+ memset(key, 0, MAX_CFG_NAME_LEN);
}
}

View File

@ -0,0 +1,11 @@
--- mv-ddr-marvell-armada-atf-master/Makefile.orig 2022-05-19 13:46:15.391043106 +0200
+++ mv-ddr-marvell-armada-atf-master/Makefile 2022-05-19 14:19:44.503213296 +0200
@@ -328,7 +328,7 @@ ECHO = @echo
# OBJ_DIR set in ble/ble.mk
OBJ_DIR ?= $(MV_DDR_ROOT)
-CFLAGS = -DMV_DDR_ATF -DCONFIG_DDR4
+CFLAGS = -DMV_DDR_ATF -DCONFIG_DDR4 --param=min-pagesize=0
CFLAGS += -Wall -Werror -Os -ffreestanding -mlittle-endian -g -gdwarf-2 -nostdinc
CFLAGS += -march=armv8-a -fpie

BIN
mv-ddr-marvell-armada-atf-master.tar.gz (Stored with Git LFS) Normal file

Binary file not shown.

View File

@ -0,0 +1,26 @@
From ee9848497117f2d2b6a643be6744330402725b72 Mon Sep 17 00:00:00 2001
From: Michal Suchanek <msuchanek@suse.de>
Date: Fri, 1 Jul 2022 16:39:50 +0200
Subject: [PATCH] rockchip: rk3399: Align default baudrate with u-boot.
Signed-off-by: Michal Suchanek <msuchanek@suse.de>
---
plat/rockchip/rk3399/rk3399_def.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/plat/rockchip/rk3399/rk3399_def.h b/plat/rockchip/rk3399/rk3399_def.h
index ba83242eb..8d6ecfbe6 100644
--- a/plat/rockchip/rk3399/rk3399_def.h
+++ b/plat/rockchip/rk3399/rk3399_def.h
@@ -17,7 +17,7 @@
/**************************************************************************
* UART related constants
**************************************************************************/
-#define RK3399_BAUDRATE 115200
+#define RK3399_BAUDRATE 1500000
#define RK3399_UART_CLOCK 24000000
/******************************************************************************
--
2.36.1

BIN
trusted-firmware-a-lts-v2.8.8.tar.gz (Stored with Git LFS) Normal file

Binary file not shown.