aboutsummaryrefslogtreecommitdiffstats
path: root/meta-arm/recipes-bsp
AgeCommit message (Collapse)Author
12 daysarm/trusted-firmware-a: update to 2.10.3 releaseJon Mason
Update to the latest stable version (2.10.3), comprised of the following commits: fc93d0edfc52 docs(changelog): changelog for lts-v2.10.3 release 4a10950a8538 docs(changelog): display all sections bafc27c8d7cf chore: rename Poseidon to Neoverse V3 a6256d7a2638 feat(cpu): add support for Poseidon V CPU ef393a3f9fa2 fix(cpu): correct variant name for default Poseidon CPU 81931a13a835 fix(cpus): workaround for Cortex-A715 erratum 2413290 baf14745f117 fix(cpus): workaround for Cortex-A720 erratum 2926083 635c83eb456a chore: update status of Cortex-X3 erratum 2615812 03636f2c3d60 fix(cpus): workaround for Cortex-A720 erratum 2940794 e86990d0911d fix(cpus): fix a defect in Cortex-A715 erratum 2561034 b59307ef8efd fix(cpus): workaround for Cortex-A715 erratum 2413290 44f36c48f280 docs(sdei): provide security guidelines when using SDEI 11cb0962f7ac docs(threat_model): mark power analysis threats out-of-scope 3e3ff298a614 fix(cpus): workaround for Cortex-A715 erratum 2344187 d466c5d4d27b fix(cpus): workaround for Cortex-X4 erratum 2701112 940ebbe2d1d0 fix(cpus): workaround for Cortex-A715 erratum 2331818 04c60d5ef31c fix(cpus): workaround for Cortex-A715 erratum 2420947 b7ed781eea74 fix(gic600): workaround for Part 1 of GIC600 erratum 2384374 58646309aedf chore: rearrange the fvp_cpu_errata.mk file a234f540b727 fix(cpus): add erratum 2701951 to Cortex-X3's list a24c8006ea39 refactor(errata-abi): workaround platforms non-arm interconnect 9fe65073d442 refactor(errata-abi): optimize errata ABI using errata framework 301698e15bc8 fix(cpus): workaround for Cortex-A715 erratum 2429384 5f8f745c7e99 fix(cpus): workaround for Cortex-X3 erratum 2372204 Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-03-28arm/sbsa-acs: use UPSTREAM_CHECK_URI for version checkingJon Mason
Since sbsa-acs requires edk2-firmware, it bases its SRC_URI on that. The first entry of SRC_URI is what is used to determine the latest version. So, specify an alternative URI to determine the correct version. Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-03-23Revert "arm/rmm: Add bitbake, include and patch file for RMM firmware"Jon Mason
This reverts commit 3877284730dff140d3045efeacf47d929224d5e2. Overzealous script usage pushed patch still under review. Reverting until all issues can be resolved.
2024-03-22arm/sbsa-acs: remove unreferenced patchJon Mason
A patch was not removed when sbsa-acs was updated. Remove and everyone is now happy. Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-03-22arm/rmm: Add bitbake, include and patch file for RMM firmwareMathieu Poirier
Initial checking providing support for RMM on QEMU's "virt" machine. Signed-off-by: Mathieu Poirier <mathieu.poirier@linaro.org> Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-03-21arm/scp-firmware: update to v2.14.0Jon Mason
Update to the latest version of SCP. In this release, some of the platforms were grouped into common family directories, which necessitated adding a variable to specify which one. Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-03-20arm/sbsa-acs: update to 7.1.4Jon Mason
Update to the latest version. Also, remove the gcc12 workaround, as that was added in edk2 commit 206168e83f090, which has been included since the 202305 release. Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-03-20arm/trusted-firmware-a: update to 2.10.2Jon Mason
Update the TF-A recipe to the latest stable version (2.10.2). NOTE: tf-a-tests did not have a corresponding stable release. So, keeping back at 2.10.0. Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-03-20arm/edk2: update to 202402Jon Mason
Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-03-14arm/trusted-firmware-m: Change GNU Arm compiler version for TF-M 2.0Ali Can Ozaslan
GNU Arm compiler version greater and equal than *11.3.Rel1* has a linker issue in syscall for TF-M 1.8.0. Let's bump to TF-M 2.0 which contains the fix for the issue. Signed-off-by: Emekcan Aras <emekcan.aras@arm.com> Signed-off-by: Ali Can Ozaslan <ali.oezaslan@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-03-07arm/trusted-firmware-a: fix mbedTLS versionDelane Brandy
Update mbedTLS version as TF-A 2.10 supports mbedTLS 3.4.1, as seen: https://trustedfirmware-a.readthedocs.io/en/v2.10/change-log.html#new-features Signed-off-by: Delane Brandy <delane.brandy@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-02-23meta-arm: Support firmware building under a multiconfigDrew Reed
To enable building rescue or bootstrap images that can be included into firmware a "firmware" multiconfig option is required to allow the building with different options to any mass storage image they may also be built. As this multiconfig build will occur under a different TMPDIR, we also provide a deployment image to allow easy copying of the firmware into another deploy dir. Signed-off-by: Drew Reed <Drew.Reed@arm.com>
2024-01-26n1sdp:arm arm-bsp: fix tftf tests for n1sdpHarsimran Singh Tungal
This changeset fix the tftf tests issue on n1sdp. Before this change, the tftf tests were getting stuck on n1sdp. The following changes have been done: 1. There were some tftf tests based on multicore which involve powering up the other cores. These tests were creating issues and the same thing has already been mentioned in the tests-to-skip.txt file for n1sdp platform in tftf source. Those tests are skipped while executing tftf and patch has been created. 2. The TFTF_MODE variable added for tftf v2.10 recipe file, as did earlier for tftf v2.9. With the help of this, we can enable debug or relase mode. The configuration based on this has been added for n1sdp in the corresponding bbappend file. 3. Add PREFERRED_VERSION_tf-a-tests for v2.10. Signed-off-by: Harsimran Singh Tungal <harsimransingh.tungal@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-01-15arm/trusted-firmware-m: update to 2.0.0Jon Mason
Updated to the latest version. Corstone1000 doesn't seem to boot. So, pull back the old version to meta-arm-bsp for it to use temporarily. Signed-off-by: Jon Mason <jon.mason@arm.com>
2024-01-09arm/scp-firmware: update git repository to new locationJon Mason
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-12-09arm/edk2: update to 202311Jon Mason
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-12-05arm/hafnium: update to v2.10Jon Mason
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-12-05arm/trusted-firmware-a: update to 2.10Jon Mason
Update tf-a and mbedtls to the latest versions. Also, migrate the previous version to meta-arm-bsp for corstone1000. NOTE: in v2.10, the fiptool makefile was changed to reference LDOPTS instead of LDLIBS. NOTE: commit 408cde8a59080ac2caa11c4d99474b2ef09f90df in tf-a modifies the qemu_sbsa starting offset, and per the commit comment, it requires the edk2 same change. This is why the edk-platforms SHA has been changed. There are only 19 patches between the previous SHA and this one (most of which are adding a single platform). So, it shouldn't be too impactful to bump the SHA (instead of making it a patch to apply on top of the existing SHA). NOTE: tf-a-tests added LDFLAGS to the makefile, causing the need for it to be removed in the recipe. Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-12-05arm/trusted-firmware-a: move patch file to bbappendJon Mason
TF-A is being patched in the recipe for qemuarm64-secureboot. This should be done in the bbappend. Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-11-03arm/trusted-firmware-a: update mbedtls to recommended releaseRoss Burton
The TF-A 2.9 documentation[1] says that mbedtls 3.4.0 is the recommended release to use, so switch to that. [1] https://trustedfirmware-a.readthedocs.io/en/v2.9/getting_started/prerequisites.html#software-and-libraries Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-10-30arm/hafnium: update to v2.9Jon Mason
Updating to the latest version of hafnium. Also, dropping tc patches, as they are either experimental or a similar feature has been added. Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-10-07trusted-firmware-a: fix build error when using ccacheJavier Tia
When ccache is enabled trusted-firmware-a recipe fails with this error message: make: *** No rule to make target 'aarch64-poky-linux-gcc'. Stop. ccache prefix CC variable with 'ccache' word before compiler. Because there are no quotes assigned to CC, only 'ccache' is assigned. The compiler becomes a make target, producing the build error. Add single quotes to LD is a good measure to prevent this kind of error. Signed-off-by: Javier Tia <javier.tia@linaro.org> Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-10-06arm-bsp/u-boot: add recipe for 2023.07.02Jon Mason
Multiple machines in meta-arm-bsp have need of the 2023.07.02 version of u-boot. Temporarily add it here to give those machines enough time to update to the latest version. NOTE: MTD changes in u-boot require changes to the qemuarm config. Specifically, not disabling it. Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-09-19arm/scp-firmware: update to v2.13.0Jon Mason
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-09-19arm/trusted-firmware-m: update to 1.8.1Jon Mason
TFM updated to 1.8.1. Note, TF-Mv1.8.1 tags point to the same SHA as the TF-Mv1.8.0 tag for tf-m-tests and tf-m-extras. Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-09-14arm/edk2: update to edk2-stable202308Jon Mason
Update to the latest versions of edk2 and edk2-platforms. This necessitates updating the patches in sbsa-acs to apply cleanly to the latest version of edk2. Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-09-10arm/sbsa-acs: update to v7.1.2Jon Mason
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-08-31arm/edk2: update to 202305 versionJon Mason
edk2-202305 contains a commit which modifies the build environment's variables from BUILD_CC to CC, BUILD_CXX to CXX, etc. https://github.com/tianocore/edk2/commit/206168e83f0901cbc1815ef5df4ac6598ad9721b This causes changes to the recipe to support this change. Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-08-30arm: patch clean-upsJon Mason
Clean up various patches by * Create email headers for those not present using the s-o-b as author and date applied to the tree as the patch date * regenerating the patch name via git rebase and format-patch * replacing patch with backported version * moving patch location to be more accurate Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-08-29Remove explicit SRCPVRoss Burton
As of oe-core a8e7b0f, PV doesn't need to contain SRCPV explicitly as base.bbclass will append it to PKGV if there is a + in the version. So, remove the redundant assignments. Also change the boot-wrapper-aarch64 PV to 0+git as it's possible that some point they'll tag a release and we want to be able to upgrade to it. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-08-22arm/hafnium: update to v2.8Jon Mason
Update hafnium to v2.8, which allows updating tc1 to that version and remove the intermediate SHA. It also allows for the removal of some backported patches. Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-08-11arm/trusted-firmware-a: update to 2.9.0Jon Mason
Update the trusted-firmware-a recipes to 2.9.0 Moving legacy recipes (2.8) for tc1 and corestone1000 to meta-arm-bsp Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-08-08arm/trusted-firmware-m: upgrade to v1.8.0Jon Mason
Upgrade tf-m to v1.8.0 and update the related components as well Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-08-08arm/edk2: move 202211 recipe to meta-arm-bspJon Mason
202211 is only used in meta-arm-bsp, and all other users should be using the latest version. Move it there until n1sdp can be updated to the latest. Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-08-03arm/trusted-firmware-m: explicitly use Arm GCC 11.2Ross Burton
TF-M recommend using GCC 11.2 as 11.3 onwards currently has code generation issues. Signed-off-by: Ross Burton <ross.burton@arm.com>
2023-07-10arm/scp-firmware: fix intermittent compile failuresRoss Burton
scp-firmware passes -I/core/include to the compiler which doesn't exist, and sometimes gcc emits a fatal error. It's unclear why this doesn't happen for everyone, but this workaround appears to be the correct solution. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-07-10arm/scp-firmware: log what platform/firmware/type is being builtRoss Burton
This helps understand long build logs. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-07-10arm/scp-firware: update compiler variablesRoss Burton
SCP_COMPILER isn't used anymore, so remove it. Explicitly set SCP_TOOLCHAIN=GNU for clarity. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-07-10arm/scp-firmware: set default SCP_PLATFORM to MACHINERoss Burton
Many platform names are the same as the machine name, so this saves some typing. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-06-13arm/scp-firmware: update to v2.12.0Jon Mason
Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-06-13arm/scp-firmware: use concerete toolchainRoss Burton
There are not any alternatives for the virtual/arm-non-eabi-gcc provider, so just use the real recipe name. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-06-12arm/trusted-firmware-m: remove -fcanon-prefix-map from DEBUG_PREFIX_MAPRoss Burton
This recipe uses the binary Arm compiler, which is based on GCC 12. Remove this GCC 13-specific option until the next release. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-06-09trusted-firmware-a: update to the latest TF-A LTSJon Mason
Update TF-A and fiptool (which is part of tf-a) to the latest stable version. Also, use the tf-a tests lts branch (which is still at version 2.8.0). Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-06-06arm/trusted-firmware-a: look for LTS releases when looking for releasesRoss Burton
TF-A has LTS releases, which are prefixed with lts- for some reason. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-06-06arm/trusted-firmware-a: Add TOS_FW_CONFIG handling for quemuGyorgy Szing
This change: - cherry-picks TF-A changes from master which implement passing TOS_FW_CONFIG DTB from the FIP package to the trusted OS. - add an OP-TEE SPMC specific SPMC manifest file - configures TF-A to build the manifest, add it to the FIP package and pass it to OP-TEE as a boot argument. This functionality needs matching changes in OPTEE (OP-TEE v3.21 or v3.20 + carried patches.) Signed-off-by: Gyorgy Szing <Gyorgy.Szing@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-05-29scp-firmware: remove -fcanon-prefix-mapMikko Rapeli
virtual/arm-none-eabi-gcc-native is still at version 12 which doesn't support it. poky comes with gcc 13 already. Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org> Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-04-20arm/trusted-firmware-m-scripts: relocate to tfm directoryJon Mason
Relocate to be with tfm to make it more obvious when a version update is needed Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-04-20arm/trusted-firmware-m: package .elf files in PN-dbgRoss Burton
Some platforms install .elf files, so put those into the -dbg package. This means expanding the buildpaths QA exclusion. Whilst here, expand the comments for the other INSANE_SKIP statements. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-04-20arm/trusted-firmware-m: clean up environment flagsRoss Burton
We don't need to unset CFLAGS and LDFLAGS as the CMake file doesn't respect them anyway. Add CC to the unexport list for completeness, at least one of these is needed for now as the build fails without the unexports. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>
2023-04-20arm/trusted-firmware-m: add the tf-m-extras repository that some machines needRoss Burton
Some machines use components from tf-m-extras, so fetch that too. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Jon Mason <jon.mason@arm.com>