661 lines
33 KiB
Plaintext
661 lines
33 KiB
Plaintext
-------------------------------------------------------------------
|
|
Mon Sep 18 10:12:57 UTC 2023 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Update to 2.8.8:
|
|
- **Libraries**
|
|
- **CPU Support**
|
|
- fix(cpus): workaround for Neoverse V2 erratum 2801372 ([ec3fafa](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/ec3fafa24307686b957de0899ba30bfbb5a70380))
|
|
- Skipped 2.8.7:
|
|
- **Build System**
|
|
- fix(build): allow warnings when using lld ([37bee49](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/37bee4983192451a00ed9dd5987e8e856fb09714))
|
|
- build(makefile): add helper to detect linker options ([8782b88](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/8782b8849147aef0e0f8dcf54ec3f2d980acbf50))
|
|
- feat(build): add support for new binutils versions ([1fdc979](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/1fdc9797f32c711c35a8a61a591607c8fa8a5468))
|
|
- **Services**
|
|
- **Errata ABI**
|
|
- feat(errata_abi): errata management firmware interface ([bb9d6fa](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/bb9d6faa41ee9d60fdd310f446870b1dbcc41b03))
|
|
- refactor(errata_abi): factor in non-arm interconnect ([4a001ff](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/4a001ffb68e0a8f306ca84a6c1c3142dff728aa2))
|
|
- fix(cpus): workaround platforms non-arm interconnect ([f718c87](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/f718c8723aca40164340c416a0e9d96a37719fe5))
|
|
- docs(errata_abi): document the errata abi changes ([66dab5c](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/66dab5c69420fc728a74d10a83f0abc0e4c4f756))
|
|
- **Platforms**
|
|
- **FVP**
|
|
- feat(fvp): enable errata management interface ([b8bb1e3](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b8bb1e347e5486583edda32e47af53a43165a3aa))
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Apr 24 13:17:03 UTC 2023 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Update to 2.8.6:
|
|
- **Arm**
|
|
- **GIC**
|
|
- **GICv3**
|
|
- fix(gicv3): workaround for NVIDIA erratum T241-FABRIC-4 ([2e48284](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/2e48284c8b5a4cf28779a30fd60d99650928865e))
|
|
- **Bootloader Images**
|
|
- **BL32**
|
|
- **TSP**
|
|
- fix(tsp): use verbose for power logs ([6cc8ca9](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/6cc8ca93a905cfdc791ab7a7d2b8d6c366b5705e))
|
|
- Skipped 2.8.5:
|
|
- **Libraries**
|
|
- **CPU Support**
|
|
- refactor(cpus): shorten errata flag defines ([e31060c](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/e31060c472cd53ce5a21a5ce19cd663a3fd79ec3))
|
|
- fix(cpus): workaround for Cortex-A78C erratum 1827430 ([14bb756](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/14bb7567d5e9805e5287651eeec5aa95cae40432))
|
|
- fix(cpus): workaround for Cortex-A78C erratum 1827440 ([330095f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/330095fa4a2695bac85fd12e0017090d9ebb633f))
|
|
- Skipped 2.8.4:
|
|
- **Libraries**
|
|
- **CPU Support**
|
|
- fix(cpus): workaround for Neoverse V1 errata 2743233 ([08a0f6a](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/08a0f6acaa327b0de868a2fdff9fcdf5880de9db))
|
|
- Skipped 2.8.3:
|
|
- **Libraries**
|
|
- **CPU Support**
|
|
- fix(cpus): workaround for Cortex-A78 erratum 2742426 ([a307605](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/a30760567eacce2b384ba072050eae4a422a5e9f))
|
|
- fix(cpus): workaround for Cortex-A78C erratum 2779484 ([48f38bc](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/48f38bcb0465719a502d98bc04efe69553b3cb22))
|
|
- **Dependencies**
|
|
- **Compiler runtime libraries**
|
|
- fix(deps): add missing aeabi_memset.S ([0aae8a3](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/0aae8a34b3ca8ed0885166cb5bf6af67bc91c5fa))
|
|
- Skipped 2.8.2:
|
|
- **Platforms**
|
|
- **Xilinx**
|
|
- **ZynqMP**
|
|
- fix(zynqmp): enable A53 workaround(errata 1530924) ([3c5ba11ca] (https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/3c5ba11ca800e41e36ea97b696cd3ce9c64d5412)))
|
|
- Skipped 2.8.1:
|
|
- **Libraries**
|
|
- **el3_runtime**
|
|
- Revert "fix(el3_runtime): allow SErrors when executing in EL3" ([51120a499](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/51120a499ee7682ce659e613e197597e9376aae7))
|
|
- Skipped 2.8.0:
|
|
- **Libraries**
|
|
- **C Standard Library**
|
|
- fix(libc): properly define SCHAR_MIN ([33d7e301f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/33d7e301f74059b12b606cfc54afd48a9ad26b4a))
|
|
- **CPU Support**
|
|
- fix(cpus): workaround for Cortex-A510 erratum 2684597 ([a40d9559b](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/a40d9559b2f104923dc01c74dcdd4ac06b85adef))
|
|
- fix(cpus): workaround for Cortex-A78C erratum 2772121 ([b33ea1e3e](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b33ea1e3e91430d03d4328f1c7c094af7622ff2d))
|
|
- fix(cpus): workaround for Neoverse V1 errata 2779461 ([c06124dad](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/c06124dadc10a4cdc63772483921810dbc3f4b95))
|
|
- fix(cpus): workaround for Cortex-A78 erratum 2779479 ([5a25a70fb](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/5a25a70fb67f56be5f3ebed3d4234bb3b8120181))
|
|
- fix(cpus): workaround for Cortex-X2 erratum 2282622 ([209b8ccd7](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/209b8ccd772d3b94b30b731bd85da1c3ecd0ecdb))
|
|
- fix(cpus): workaround for Cortex-A710 erratum 2282622 ([a9f7a50d3](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/a9f7a50d30598d2bd7f3d048930e54c520adc69f))
|
|
- fix(cpus): workaround for Neoverse V1 erratum 2743093 ([b7f723e55](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b7f723e55f52f693e6517120bd016d56f0cdb80c))
|
|
- fix(cpus): workaround for Cortex-A78 erratum 2772019 ([3a8011088](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/3a80110887ed752b0c6e5b4f0d59bd6d40f4bb24))
|
|
- fix(cpus): workaround for Neoverse N2 erratum 2743089 ([b0b654f90](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b0b654f908df85133e9d8cbbe252cf7f48dd883c))
|
|
- fix(cpus): workaround for Cortex-X2 erratum 2768515 ([262bb3a22](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/262bb3a223bed377603ac756fef8d685fad016ef))
|
|
- fix(cpus): workaround for Cortex-A710 erratum 2768515 ([c90daab3f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/c90daab3f0029867f7d1b419dcb72961bdfaea9d))
|
|
- fix(cpus): workaround for Cortex-X3 erratum 2615812 ([bcdd5152d](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/bcdd5152dc6c0496d25e936f3af4416dab1d32bc))
|
|
- **el3_runtime**
|
|
- fix(el3_runtime): allow SErrors when executing in EL3 ([327f4bb0c](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/327f4bb0cf2035ee46f0753429a43fd4c97a5d98))
|
|
- fix(el3_runtime): restore SPSR/ELR/SCR after esb ([f06ba4a21](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/f06ba4a2137000e87f1ec77eef054d3ac1706d84))
|
|
- **Miscellaneous**
|
|
- **Debug**
|
|
- fix(console): fix crash on spin_unlock with cache disabled ([cede543e2](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/cede543e29d7110adfd99427f35858e6a81cb596))
|
|
- **Platforms**
|
|
- **Arm**
|
|
- **CSS**
|
|
- fix(plat/css): fix invalid redistributor poweroff ([1432d4b86](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/1432d4b86ea11160d211470a15cdcdc1e36bb0fb))
|
|
- **ST**
|
|
- fix(st): include utils.h to solve compilation error ([06d5116f2](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/06d5116f29bcffef89ae3190bb4df3043cb91cf8))
|
|
- **Intel**
|
|
- fix(intel): fix fcs_client crashed when increased param size ([2b2eaf1d9](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/2b2eaf1d96255f5e56cf8469e98ee77631b0bcda))
|
|
- **Layerscape**
|
|
- fix(layerscape): unlock write access SMMU_CBn_ACTLR ([40b90a9c4](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/40b90a9c4ce8a7f131ea65edb549d8f0160a5999))
|
|
- fix(layerscape): fix errata a008850 ([61cc890d7](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/61cc890d715e6d388ed15ba9cb1a5a8c66ded6c3))
|
|
- **LX2**
|
|
- feat(lx2): enable OCRAM ECC ([1c65e8798](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/1c65e8798b5be2a2ac7f3aaa410e02f7fc4b29ad))
|
|
- feat(lx2): support more variants ([fa8a6d76f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/fa8a6d76ffe03647676f12740fce5a2ed3735616))
|
|
- fix(lx2): init global data before using it ([fd857216e](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/fd857216e5e7bec268579f4999b9c23dd7c1cfac))
|
|
- **NXP**
|
|
- fix(nxp-drivers): fix tzc380 memory regions config ([4b654f4b4](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/4b654f4b47267469426a3f77ad0981a1063ebf24))
|
|
- fix(nxp-ddr): apply Max CDD values for warm boot ([1414e0add](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/1414e0adda7fdfa4405412c6328d52371e1e376a))
|
|
- fix(nxp-ddr): use CDDWW for write to read delay ([8047151ab](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/8047151ab249c9f900132486c17d5bdf39d7ca51))
|
|
- **ls1046a**
|
|
- fix(ls1046a): 4 keys secureboot failure resolved ([ff8694041](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/ff8694041010045e3fcafe57aed0fbbe236d2cf5))
|
|
- **Security**
|
|
- docs(security): security advisory for CVE-2022-47630 ([084d29c26](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/084d29c2654f0717129aac116adb644df9a8387c))
|
|
- fix(auth): properly validate X.509 extensions ([a89b1f193](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/a89b1f19303add7971828546f922bb9f889dae87))
|
|
- fix(auth): avoid out-of-bounds read in auth_nvctr() ([187e79427](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/187e79427dd09ae4b47128aa17975dc1310453bc))
|
|
- fix(auth): require at least one extension to be present ([379183edc](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/379183edc4d34e513678f652703b890c1db95d3b))
|
|
- fix(auth): forbid junk after extensions ([609437cbf](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/609437cbf591d77050d4a4e2de4e0c322d71706e))
|
|
- **Tools**
|
|
- fix(sptool): add dependency to SP image ([9e01aedd4](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/9e01aedd4359311169f4e472240314db8494d251))
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Apr 3 09:57:51 UTC 2023 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Add fvp platform
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jan 12 09:45:00 UTC 2023 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Disable debug build on sun50i_a64 as it is too big
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jan 10 14:06:18 UTC 2023 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Update to version 2.8:
|
|
* changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.md
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jan 10 09:05:12 UTC 2023 - Oscar Curero <oscar@naiandei.net>
|
|
|
|
- Add sun50i_h616 flavor for OrangePi Zero2
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Nov 21 19:23:38 UTC 2022 - Michal Suchanek <msuchanek@suse.com>
|
|
|
|
- Add --no-warn-rwx-segment always, the problem is not specific to Tumbleweed.
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Aug 30 11:34:06 UTC 2022 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Add --no-warn-rwx-segment to LDFLAGS on Tumbleweed, as a
|
|
workaround for binutils 2.39
|
|
See https://developer.trustedfirmware.org/T996
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Aug 29 10:47:03 UTC 2022 - Michal Suchanek <msuchanek@suse.com>
|
|
|
|
- Workaround for gcc 7 constant assigment error (boo#1202477).
|
|
+ Workaround-gcc-7-constant-assignment-error.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Aug 17 08:48:09 UTC 2022 - Michal Suchanek <msuchanek@suse.com>
|
|
|
|
- Do not disable build on Leap
|
|
- Fix build on Tumbleweed
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jul 13 11:25:48 UTC 2022 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Fix build of zynqmp with gcc7 (Leap 15.4)
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jul 8 14:49:35 UTC 2022 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Update to version 2.7:
|
|
* changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.md
|
|
- Drop usptream patches:
|
|
0001-docs-security-security-advisory-for-CVE-2022-23960.patch
|
|
0002-fix-security-workaround-for-CVE-2022-23960.patch
|
|
0003-refactor-el3-runtime-change-Cortex-A76-implementatio.patch
|
|
0004-fix-security-loop-workaround-for-CVE-2022-23960-for-.patch
|
|
0005-fix-security-workaround-for-CVE-2022-23960-for-Corte.patch
|
|
0006-fix-security-SMCCC_ARCH_WORKAROUND_3-mitigations-for.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jul 1 14:50:40 UTC 2022 - Michal Suchanek <msuchanek@suse.com>
|
|
|
|
- rockchip: rk3399: Align default baudrate with u-boot (boo#1201096).
|
|
* rockchip-rk3399-Align-default-baudrate-with-u-boot.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Thu May 19 09:50:31 UTC 2022 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Add "--param=min-pagesize=0" to CFLAGS as a workaround for
|
|
GCC12 bug: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105523
|
|
- Add a patch to add "--param=min-pagesize=0" for
|
|
mv-ddr-marvell-armada since it does not use CFLAGS:
|
|
* fix-mv-ddr-marvell-armada.patch
|
|
- Fix bug on A3700 flavor found by GCC12:
|
|
* fix-a3700_tool.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Mar 18 09:48:05 UTC 2022 - Ivan Ivanov <ivan.ivanov@suse.com>
|
|
|
|
- Backport fallowing patches mitigating CVE-2022-23960 [1] and [2].
|
|
|
|
0001-docs-security-security-advisory-for-CVE-2022-23960.patch
|
|
0002-fix-security-workaround-for-CVE-2022-23960.patch
|
|
0003-refactor-el3-runtime-change-Cortex-A76-implementatio.patch
|
|
0004-fix-security-loop-workaround-for-CVE-2022-23960-for-.patch
|
|
0005-fix-security-workaround-for-CVE-2022-23960-for-Corte.patch
|
|
0006-fix-security-SMCCC_ARCH_WORKAROUND_3-mitigations-for.patch
|
|
|
|
Fixes bsc#1196657
|
|
|
|
[1] https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-9.html
|
|
[2] https://review.trustedfirmware.org/q/topic:"spectre_bhb"
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Feb 8 09:29:53 UTC 2022 - Matwey Kornilov <matwey.kornilov@gmail.com>
|
|
|
|
- Update A3700-utils-marvell version:
|
|
Fix build SATA bootloader for A3700 boards
|
|
Drop fix-A3700-gcc11.patch: upstreamed
|
|
Enable %fdupes which is particularly useful for a3700 flavour
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Feb 2 07:09:52 UTC 2022 - Stefan Weiberg <sweiberg@suse.com>
|
|
|
|
- ExclusiveArch got overwritten, using else branches instead as
|
|
SLE 15 SP4 continued to build excluded flavours
|
|
(related to bsc#1193779 and bsc#1195129)
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jan 31 14:24:30 UTC 2022 - Stefan Weiberg <sweiberg@suse.com>
|
|
|
|
- Fixing the if statement to disable some targets on SLE 15 SP4, as
|
|
the prior change resulted in the packages being built on other
|
|
architectures than aarch64 on SLE 15 SP4
|
|
(related to bsc#1193779 and bsc#1195129)
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 28 08:37:26 UTC 2022 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Disable some targets on SLE15-SP4 because of missing deps in SLE:
|
|
a3700, hikey, hikey960, imx8qm, imx8qx, rk3399
|
|
Fixes bsc#1193779 and bsc#1195129
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 14 12:29:15 UTC 2022 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Add qemu_sbsa flavor
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jan 6 08:42:29 UTC 2022 - Ivan Ivanov <ivan.ivanov@suse.com>
|
|
|
|
- Auto install on RPi4
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Dec 10 14:16:59 UTC 2021 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Update to version 2.6:
|
|
* changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.md
|
|
- Update mv-ddr-marvell-armada-atf-master to latest version
|
|
- Drop upstreamed patch:
|
|
* atf-2411053.diff
|
|
- Add patch to allow to use non-git checkouts:
|
|
* atf-allow-non-git-dir.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jul 6 12:16:36 UTC 2021 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Update mv-ddr-marvell to use master branch as upstream recommends
|
|
This fixes build of a80x0_mcbin
|
|
- Update A3700-utils-marvell to use master branch as upstream recommends
|
|
- Re-enable A3700 tools with patch:
|
|
* fix-A3700-gcc11.patch
|
|
- And refresh patch:
|
|
* A3700_utils-drop-git.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jun 10 10:16:18 UTC 2021 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Disable A3700 tools until fixed upstream:
|
|
https://github.com/MarvellEmbeddedProcessors/A3700-utils-marvell/issues/22
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jun 3 12:54:02 UTC 2021 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Fix rk3399 build:
|
|
* atf-2411053.diff
|
|
|
|
-------------------------------------------------------------------
|
|
Thu May 20 15:20:04 UTC 2021 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Update to version 2.5:
|
|
* changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.rst#version-25
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Dec 11 09:30:17 UTC 2020 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Update to version 2.4:
|
|
* changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.rst#n7
|
|
- Replace mv-ddr-marvell-armada-atf-mainline.tar.gz with
|
|
mv-ddr-marvell-mv-ddr-devel.tar.gz to match the upstream requirements
|
|
- Drop upstream patch:
|
|
* mv-ddr.diff
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Oct 17 01:03:28 UTC 2020 - Andreas Färber <afaerber@suse.de>
|
|
|
|
- Fix BUILD_MESSAGE_TIMESTAMP (don't try parsing deleted .changes)
|
|
- Clean up rpi4 build
|
|
- Drop comments to avoid RPM errors about %else and %endif end of line
|
|
- Update mv-ddr-marvell from mv_ddr-atf-mainline branch to mv-ddr-devel 14.0.0
|
|
* Add mv-ddr.diff (from d:A:F:Contrib:MacchiatoBin) to fix a warning treated as error
|
|
* Add a _service to clarify its origin and facilitate future updates
|
|
- Update A3700-utils-marvell from armada-18.12 to armada-18.12-fixed branch
|
|
* Drop A3700_utils-TBB-Split-INCDIR-from-LIBDIR.patch (merged)
|
|
* Drop A3700_utils-TBB-Fix-building-for-Crypto-6.0-and-later.patch (merged)
|
|
* Actually apply A3700_utils-drop-git.patch (output cleanup)
|
|
- Build and package A3700 utils as part of -tools (non-noarch, ensure PIE)
|
|
- Build the tools for all architectures again
|
|
- Add binaries-marvell from binaries-marvell-armada-SDK10.0.1.0 branch
|
|
- Add a80x0_mcbin and extend a3700 to build and package all needed files
|
|
* Suppress OP-TEE for now, as it fails to initialize
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Oct 16 23:35:20 UTC 2020 - Andreas Färber <afaerber@suse.de>
|
|
|
|
- Build fixes for a3700 and a80x0_mcbin
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jul 2 17:18:45 UTC 2020 - Nicolas Patricio Saenz Julienne <nsaenzjulienne@suse.com>
|
|
|
|
- Add rpi4
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Apr 23 12:25:49 UTC 2020 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Disable debug on imx8mq to fix build
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Apr 23 09:59:49 UTC 2020 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Update to 2.3:
|
|
* Add support for Armv8.4-SecEL2 extension through the SPCI defined SPMD/SPMC components.
|
|
* Build option to support EL2 context save and restore in the secure world (CTX_INCLUDE_EL2_REGS).
|
|
* Add support for SMCCC v1.2 (introducing the new SMCCC_ARCH_SOC_ID SMC).
|
|
Note that the support is compliant, but the SVE registers save/restore will be done as part of future S-EL2/SPM development.
|
|
* Enhanced BL2 bootloader flow to load secure partitions based on firmware configuration data (fconf).
|
|
* Changes necessary to support SEPARATE_NOBITS_REGION feature
|
|
* TSP and BL2_AT_EL3: Add Position Independent Execution PIE support
|
|
* Enable MTE support
|
|
* Enable Link Time Optimization in GCC
|
|
* Add CPU support:
|
|
- cortex-a57: Enable higher performance non-cacheable load forwarding
|
|
- Hercules: Workaround for Errata 1688305
|
|
- Klein: Support added for Klein CPU
|
|
- Matterhorn: Support added for Matterhorn CPU
|
|
* Full changelog: https://trustedfirmware-a.readthedocs.io/en/latest/change-log.html#version-2-3
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Feb 1 21:01:01 UTC 2020 - Matwey Kornilov <matwey.kornilov@gmail.com>
|
|
|
|
- Initial implementation for Marvel A3700 platform
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Oct 24 10:53:55 UTC 2019 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Switch to _multibuild system
|
|
- Update to 2.2:
|
|
* Enable Pointer Authentication (PAuth) support for Secure World
|
|
- Adds support for ARMv8.3-PAuth in BL1 SMC calls and BL2U
|
|
image for firmware updates.
|
|
* Enable Memory Tagging Extension (MTE) support in both secure
|
|
and non-secure worlds
|
|
- Adds support for the new Memory Tagging Extension arriving
|
|
in ARMv8.5. MTE support is now enabled by default on
|
|
systems that support it at EL0.
|
|
- To enable it at ELx for both the non-secure and the secure
|
|
world, the compiler flag CTX_INCLUDE_MTE_REGS includes
|
|
register saving and restoring when necessary in order to
|
|
prevent information leakage between the worlds.
|
|
* Add support for Branch Target Identification (BTI)
|
|
* Full changelog: https://trustedfirmware-a.readthedocs.io/en/latest/change-log.html#version-2-2
|
|
- Drop upstreamed patches:
|
|
* arm-trusted-firmware_hikey960_race.patch
|
|
* arm-trusted-firmware_poplar_mmc_dma.patch
|
|
* arm-trusted-firmware_zynqmp_ipi.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Sep 4 22:19:57 UTC 2019 - Andreas Färber <afaerber@suse.de>
|
|
|
|
- Add zynqmp
|
|
* arm-trusted-firmware_zynqmp_ipi.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Aug 1 07:02:12 UTC 2019 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Add initial bits for a80x0_mcbin support for MacchiatoBin
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jun 16 16:00:26 UTC 2019 - Andreas Färber <afaerber@suse.de>
|
|
|
|
- rpi3: By now building okay with OP-TEE
|
|
- rpi3: Replace dependency on deprecated bootstrap code with U-Boot
|
|
- rpi3: Change installation location (adopted from u-boot-rpi3)
|
|
- poplar: Fix eMMC DMA FIFO breaking U-Boot eMMC access
|
|
(https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/1230)
|
|
arm-trusted-firmware_poplar_mmc_dma.patch
|
|
- poplar: Build for both 2 GiB and 1 GiB boards (b96o#834)
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Jun 8 18:19:24 UTC 2019 - Andreas Färber <afaerber@suse.de>
|
|
|
|
- Add imxmq and imxmm
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Jun 8 15:47:29 UTC 2019 - Andreas Färber <afaerber@suse.de>
|
|
|
|
- Fix build date by escaping %S (which expanded to %SOURCE).
|
|
- hikey960: Avoid a race condition (boo#1134788)
|
|
arm-trusted-firmware_hikey960_race.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Apr 9 13:51:40 UTC 2019 - Guillaume GARDET <guillaume.gardet@opensuse.org>
|
|
|
|
- Update to v2.1:
|
|
* Add ARMv8.3 pointer authentication in the normal and secure worlds
|
|
* Cortex-Axx workarounds for erratums
|
|
* New platforms
|
|
* Full changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/about/docs/change-log.rst#version-2-1
|
|
- Remove outdated patch:
|
|
* hikey960.diff
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Mar 28 23:06:55 UTC 2019 - Andreas Färber <afaerber@suse.de>
|
|
|
|
- rpi3: Package armstub8.bin, fip.bin, bl1.bin, bl2.bin
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Nov 11 16:56:46 UTC 2018 - afaerber@suse.de
|
|
|
|
- pre_checkin.sh: Fix package names for sun50i_{a64,h6}
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Nov 4 15:16:20 UTC 2018 - afaerber@suse.de
|
|
|
|
- Add imx8qm, imx8qx, sun50i_a64, sun50i_h6
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Nov 4 14:29:26 UTC 2018 - afaerber@suse.de
|
|
|
|
- Update to v2.0
|
|
* Drop upstream patches
|
|
arm-trusted-firmware_cve-2018-3639_smccc_rename.patch
|
|
arm-trusted-firmware_cve-2018-3639_smccc_return.patch
|
|
arm-trusted-firmware_cve-2018-3639_rename.patch
|
|
arm-trusted-firmware_cve-2018-3639_static.patch
|
|
arm-trusted-firmware_cve-2018-3639_static_aarch32.patch
|
|
arm-trusted-firmware_cve-2018-3639_dynamic.patch
|
|
* fip_create wrapper is no longer built (use fiptool instead)
|
|
* Set BL33 for qemu
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jun 3 18:48:01 UTC 2018 - afaerber@suse.de
|
|
|
|
- Conditionally enable OP-TEE as BL32
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jun 3 17:39:05 UTC 2018 - afaerber@suse.de
|
|
|
|
- Add rpi3
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jun 3 05:53:57 UTC 2018 - afaerber@suse.de
|
|
|
|
- Set BUILD_MESSAGE_TIMESTAMP for reproducible builds
|
|
- Simplify tegra packaging, reusing %target_soc
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jun 1 09:09:14 UTC 2018 - afaerber@suse.de
|
|
|
|
- Address CVE-2018-3639 (bsc#1085308)
|
|
arm-trusted-firmware_cve-2018-3639_smccc_rename.patch
|
|
arm-trusted-firmware_cve-2018-3639_smccc_return.patch
|
|
arm-trusted-firmware_cve-2018-3639_rename.patch
|
|
arm-trusted-firmware_cve-2018-3639_static.patch
|
|
arm-trusted-firmware_cve-2018-3639_static_aarch32.patch
|
|
arm-trusted-firmware_cve-2018-3639_dynamic.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Thu May 31 23:32:12 UTC 2018 - afaerber@suse.de
|
|
|
|
- hikey960.diff: Fix assertion on HiKey 960 (b9o#739)
|
|
|
|
-------------------------------------------------------------------
|
|
Thu May 31 19:21:09 UTC 2018 - afaerber@suse.de
|
|
|
|
- Package bl2 for hikey and hikey960
|
|
|
|
-------------------------------------------------------------------
|
|
Mon May 21 01:13:15 UTC 2018 - afaerber@suse.de
|
|
|
|
- Add tegra186
|
|
|
|
-------------------------------------------------------------------
|
|
Mon May 21 00:25:58 UTC 2018 - afaerber@suse.de
|
|
|
|
- Package poplar_layout.h header for l-loader in devel package
|
|
|
|
-------------------------------------------------------------------
|
|
Sun May 20 20:15:00 UTC 2018 - afaerber@suse.de
|
|
|
|
- Build recovery version of poplar, too
|
|
|
|
-------------------------------------------------------------------
|
|
Sun May 20 18:44:14 UTC 2018 - afaerber@suse.de
|
|
|
|
- Adopt %license
|
|
- Add poplar
|
|
- Prepare tegra186
|
|
|
|
-------------------------------------------------------------------
|
|
Sun May 20 17:13:47 UTC 2018 - afaerber@suse.de
|
|
|
|
- Update to v1.5
|
|
* Dropped upstream patches:
|
|
arm-trusted-firmware_pie_1.patch
|
|
arm-trusted-firmware_pie_2.patch
|
|
arm-trusted-firmware_fiptool_pad.patch
|
|
arm-trusted-firmware_fiptool_pad_useafterfree.patch
|
|
arm-trusted-firmware_fiptool_pad_hikey.patch
|
|
arm-trusted-firmware_fiptool_pad_hikey960.patch
|
|
arm-trusted-firmware_cve-2017-5715_a57_a72.patch
|
|
arm-trusted-firmware_cve-2017-5715_a73_a75.patch
|
|
arm-trusted-firmware_cve-2017-5715_pfr0.patch
|
|
arm-trusted-firmware_cve-2017-5715_errata_format.patch
|
|
arm-trusted-firmware_cve-2017-5715_errata_output.patch
|
|
arm-trusted-firmware_cve-2017-5715_platforms.patch
|
|
arm-trusted-firmware_cve-2017-5715_bpiall.patch
|
|
arm-trusted-firmware_cve-2017-5715_smccc.patch
|
|
arm-trusted-firmware_cve-2017-5715_psci.patch
|
|
arm-trusted-firmware_cve-2017-5715_runtime_exceptions.patch
|
|
arm-trusted-firmware_cve-2017-5715_smccc_v1.1.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Feb 10 16:46:15 UTC 2018 - afaerber@suse.de
|
|
|
|
- Apply fiptool patches to tools package, too (b9o#633)
|
|
- Prepare for detecting PIE support (gh#ARM-software/tf-issues#519)
|
|
arm-trusted-firmware_pie_1.patch
|
|
arm-trusted-firmware_pie_2.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Feb 10 11:05:00 UTC 2018 - afaerber@suse.de
|
|
|
|
- Implement SMCCC v1.1 (bsc#1074741)
|
|
arm-trusted-firmware_cve-2017-5715_platforms.patch
|
|
arm-trusted-firmware_cve-2017-5715_bpiall.patch
|
|
arm-trusted-firmware_cve-2017-5715_smccc.patch
|
|
arm-trusted-firmware_cve-2017-5715_psci.patch
|
|
arm-trusted-firmware_cve-2017-5715_runtime_exceptions.patch
|
|
arm-trusted-firmware_cve-2017-5715_smccc_v1.1.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Jan 27 13:10:47 UTC 2018 - afaerber@suse.de
|
|
|
|
- Pad HiKey FIP to avoid hanging fastboot transfer (b9o#633)
|
|
arm-trusted-firmware_fiptool_pad.patch
|
|
arm-trusted-firmware_fiptool_pad_useafterfree.patch
|
|
arm-trusted-firmware_fiptool_pad_hikey.patch
|
|
arm-trusted-firmware_fiptool_pad_hikey960.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Jan 27 05:41:01 UTC 2018 - afaerber@suse.de
|
|
|
|
- Add CVE-2017-5715 output (bsc#1074741)
|
|
arm-trusted-firmware_cve-2017-5715_errata_format.patch
|
|
arm-trusted-firmware_cve-2017-5715_errata_output.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jan 22 02:03:03 UTC 2018 - afaerber@suse.de
|
|
|
|
- Use debug builds
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 12 00:47:57 UTC 2018 - afaerber@suse.de
|
|
|
|
- rk3399: Don't require cross binutils (let cross gcc choose which)
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 12 00:07:40 UTC 2018 - afaerber@suse.de
|
|
|
|
- hikey960: Build fip and require EDK2 for SCP_BL2 and BL33
|
|
- Refresh CVE-2017-5715 patches (bsc#1074741)
|
|
Drop arm-trusted-firmware_cve-2017-5715_ic_iallu.patch
|
|
Add arm-trusted-firmware_cve-2017-5715_pfr0.patch
|
|
- Suppress debuginfo for firmware
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jan 7 18:07:45 UTC 2018 - afaerber@suse.de
|
|
|
|
- Make noarch so that it can be exported
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jan 7 16:26:58 UTC 2018 - afaerber@suse.de
|
|
|
|
- hikey: Build fip and require EDK2 for SCP_BL2
|
|
- Add tegra210
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jan 7 14:13:53 UTC 2018 - afaerber@suse.de
|
|
|
|
- Add hikey960
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jan 7 14:04:14 UTC 2018 - afaerber@suse.de
|
|
|
|
- Add hikey
|
|
- Clean up pre_checkin.sh
|
|
- Don't package bl31.bin for Rockchip, we need bl31.elf only
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 5 06:05:48 UTC 2018 - afaerber@suse.de
|
|
|
|
- Require arm-none gcc for RK3399
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 5 01:42:30 UTC 2018 - afaerber@suse.de
|
|
|
|
- Address CVE-2017-5715 (bsc#1074741)
|
|
arm-trusted-firmware_cve-2017-5715_a57_a72.patch
|
|
arm-trusted-firmware_cve-2017-5715_a73_a75.patch
|
|
arm-trusted-firmware_cve-2017-5715_ic_iallu.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jan 3 16:06:42 UTC 2018 - matwey.kornilov@gmail.com
|
|
|
|
- Return lost doc files
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jan 2 18:42:17 UTC 2018 - matwey.kornilov@gmail.com
|
|
|
|
- Package bl31.elf
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jan 2 18:25:45 UTC 2018 - matwey.kornilov@gmail.com
|
|
|
|
- acknowledgements.md renamed to acknowledgements.rst
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Dec 28 17:06:51 UTC 2017 - matwey.kornilov@gmail.com
|
|
|
|
- Version 1.4
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Dec 26 06:57:57 UTC 2016 - afaerber@suse.de
|
|
|
|
- Update to v1.3 final
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Oct 8 15:28:50 UTC 2016 - afaerber@suse.de
|
|
|
|
- Initial
|
|
|