Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

arm-trusted-firmware-2.5-2.2 RPM for armv7hl

From OpenSuSE Ports Tumbleweed for armv7hl

Name: arm-trusted-firmware Distribution: openSUSE Tumbleweed
Version: 2.5 Vendor: openSUSE
Release: 2.2 Build date: Sun Sep 26 03:22:07 2021
Group: System/Boot Build host: obs-arm-10
Size: 37444 Source RPM: arm-trusted-firmware-2.5-2.2.src.rpm
Packager: http://bugs.opensuse.org
Url: https://www.trustedfirmware.org/
Summary: Arm Trusted Firmware-A
Trusted Firmware-A (TF-A) provides a reference implementation of secure world
software for Armv7-A and Armv8-A, including a Secure Monitor executing at
Exception Level 3 (EL3).

Provides

Requires

License

BSD-3-Clause

Changelog

* Tue Jul 06 2021 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Update mv-ddr-marvell to use master branch as upstream recommends
    This fixes build of a80x0_mcbin
  - Update A3700-utils-marvell to use master branch as upstream recommends
  - Re-enable A3700 tools with patch:
    * fix-A3700-gcc11.patch
  - And refresh patch:
    * A3700_utils-drop-git.patch
* Thu Jun 10 2021 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Disable A3700 tools until fixed upstream:
    https://github.com/MarvellEmbeddedProcessors/A3700-utils-marvell/issues/22
* Thu Jun 03 2021 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Fix rk3399 build:
    * atf-2411053.diff
* Thu May 20 2021 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Update to version 2.5:
    * changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.rst#version-25
* Fri Dec 11 2020 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Update to version 2.4:
    * changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.rst#n7
  - Replace mv-ddr-marvell-armada-atf-mainline.tar.gz with
    mv-ddr-marvell-mv-ddr-devel.tar.gz to match the upstream requirements
  - Drop upstream patch:
    * mv-ddr.diff
* Sat Oct 17 2020 Andreas Färber <afaerber@suse.de>
  - Fix BUILD_MESSAGE_TIMESTAMP (don't try parsing deleted .changes)
  - Clean up rpi4 build
  - Drop comments to avoid RPM errors about %else and %endif end of line
  - Update mv-ddr-marvell from mv_ddr-atf-mainline branch to mv-ddr-devel 14.0.0
    * Add mv-ddr.diff (from d:A:F:Contrib:MacchiatoBin) to fix a warning treated as error
    * Add a _service to clarify its origin and facilitate future updates
  - Update A3700-utils-marvell from armada-18.12 to armada-18.12-fixed branch
    * Drop A3700_utils-TBB-Split-INCDIR-from-LIBDIR.patch (merged)
    * Drop A3700_utils-TBB-Fix-building-for-Crypto-6.0-and-later.patch (merged)
    * Actually apply A3700_utils-drop-git.patch (output cleanup)
  - Build and package A3700 utils as part of -tools (non-noarch, ensure PIE)
  - Build the tools for all architectures again
  - Add binaries-marvell from binaries-marvell-armada-SDK10.0.1.0 branch
  - Add a80x0_mcbin and extend a3700 to build and package all needed files
    * Suppress OP-TEE for now, as it fails to initialize
* Fri Oct 16 2020 Andreas Färber <afaerber@suse.de>
  - Build fixes for a3700 and a80x0_mcbin
* Thu Jul 02 2020 Nicolas Patricio Saenz Julienne <nsaenzjulienne@suse.com>
  - Add rpi4
* Thu Apr 23 2020 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Disable debug on imx8mq to fix build
* Thu Apr 23 2020 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Update to 2.3:
    * Add support for Armv8.4-SecEL2 extension through the SPCI defined SPMD/SPMC components.
    * Build option to support EL2 context save and restore in the secure world (CTX_INCLUDE_EL2_REGS).
    * Add support for SMCCC v1.2 (introducing the new SMCCC_ARCH_SOC_ID SMC).
      Note that the support is compliant, but the SVE registers save/restore will be done as part of future S-EL2/SPM development.
    * Enhanced BL2 bootloader flow to load secure partitions based on firmware configuration data (fconf).
    * Changes necessary to support SEPARATE_NOBITS_REGION feature
    * TSP and BL2_AT_EL3: Add Position Independent Execution PIE support
    * Enable MTE support
    * Enable Link Time Optimization in GCC
    * Add CPU support:
    - cortex-a57: Enable higher performance non-cacheable load forwarding
    - Hercules: Workaround for Errata 1688305
    - Klein: Support added for Klein CPU
    - Matterhorn: Support added for Matterhorn CPU
    * Full changelog:  https://trustedfirmware-a.readthedocs.io/en/latest/change-log.html#version-2-3
* Sat Feb 01 2020 Matwey Kornilov <matwey.kornilov@gmail.com>
  - Initial implementation for Marvel A3700 platform
* Thu Oct 24 2019 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Switch to _multibuild system
  - Update to 2.2:
    * Enable Pointer Authentication (PAuth) support for Secure World
    - Adds support for ARMv8.3-PAuth in BL1 SMC calls and BL2U
      image for firmware updates.
    * Enable Memory Tagging Extension (MTE) support in both secure
      and non-secure worlds
    - Adds support for the new Memory Tagging Extension arriving
      in ARMv8.5. MTE support is now enabled by default on
      systems that support it at EL0.
    - To enable it at ELx for both the non-secure and the secure
      world, the compiler flag CTX_INCLUDE_MTE_REGS includes
      register saving and restoring when necessary in order to
      prevent information leakage between the worlds.
    * Add support for Branch Target Identification (BTI)
    * Full changelog: https://trustedfirmware-a.readthedocs.io/en/latest/change-log.html#version-2-2
  - Drop upstreamed patches:
    * arm-trusted-firmware_hikey960_race.patch
    * arm-trusted-firmware_poplar_mmc_dma.patch
    * arm-trusted-firmware_zynqmp_ipi.patch
* Wed Sep 04 2019 Andreas Färber <afaerber@suse.de>
  - Add zynqmp
    * arm-trusted-firmware_zynqmp_ipi.patch
* Thu Aug 01 2019 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Add initial bits for a80x0_mcbin support for MacchiatoBin
* Sun Jun 16 2019 Andreas Färber <afaerber@suse.de>
  - rpi3: By now building okay with OP-TEE
  - rpi3: Replace dependency on deprecated bootstrap code with U-Boot
  - rpi3: Change installation location (adopted from u-boot-rpi3)
  - poplar: Fix eMMC DMA FIFO breaking U-Boot eMMC access
    (https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/1230)
    arm-trusted-firmware_poplar_mmc_dma.patch
  - poplar: Build for both 2 GiB and 1 GiB boards (b96o#834)
* Sat Jun 08 2019 Andreas Färber <afaerber@suse.de>
  - Add imxmq and imxmm
* Sat Jun 08 2019 Andreas Färber <afaerber@suse.de>
  - Fix build date by escaping %S (which expanded to %SOURCE).
  - hikey960: Avoid a race condition (boo#1134788)
    arm-trusted-firmware_hikey960_race.patch
* Tue Apr 09 2019 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Update to v2.1:
    * Add ARMv8.3 pointer authentication in the normal and secure worlds
    * Cortex-Axx workarounds for erratums
    * New platforms
    * Full changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/about/docs/change-log.rst#version-2-1
  - Remove outdated patch:
    * hikey960.diff
* Thu Mar 28 2019 Andreas Färber <afaerber@suse.de>
  - rpi3: Package armstub8.bin, fip.bin, bl1.bin, bl2.bin
* Sun Nov 11 2018 afaerber@suse.de
  - pre_checkin.sh: Fix package names for sun50i_{a64,h6}
* Sun Nov 04 2018 afaerber@suse.de
  - Add imx8qm, imx8qx, sun50i_a64, sun50i_h6
* Sun Nov 04 2018 afaerber@suse.de
  - Update to v2.0
    * Drop upstream patches
    arm-trusted-firmware_cve-2018-3639_smccc_rename.patch
    arm-trusted-firmware_cve-2018-3639_smccc_return.patch
    arm-trusted-firmware_cve-2018-3639_rename.patch
    arm-trusted-firmware_cve-2018-3639_static.patch
    arm-trusted-firmware_cve-2018-3639_static_aarch32.patch
    arm-trusted-firmware_cve-2018-3639_dynamic.patch
    * fip_create wrapper is no longer built (use fiptool instead)
    * Set BL33 for qemu
* Sun Jun 03 2018 afaerber@suse.de
  - Conditionally enable OP-TEE as BL32
* Sun Jun 03 2018 afaerber@suse.de
  - Add rpi3
* Sun Jun 03 2018 afaerber@suse.de
  - Set BUILD_MESSAGE_TIMESTAMP for reproducible builds
  - Simplify tegra packaging, reusing %target_soc
* Fri Jun 01 2018 afaerber@suse.de
  - Address CVE-2018-3639 (bsc#1085308)
    arm-trusted-firmware_cve-2018-3639_smccc_rename.patch
    arm-trusted-firmware_cve-2018-3639_smccc_return.patch
    arm-trusted-firmware_cve-2018-3639_rename.patch
    arm-trusted-firmware_cve-2018-3639_static.patch
    arm-trusted-firmware_cve-2018-3639_static_aarch32.patch
    arm-trusted-firmware_cve-2018-3639_dynamic.patch
* Thu May 31 2018 afaerber@suse.de
  - hikey960.diff: Fix assertion on HiKey 960 (b9o#739)
* Thu May 31 2018 afaerber@suse.de
  - Package bl2 for hikey and hikey960
* Mon May 21 2018 afaerber@suse.de
  - Add tegra186
* Mon May 21 2018 afaerber@suse.de
  - Package poplar_layout.h header for l-loader in devel package
* Sun May 20 2018 afaerber@suse.de
  - Build recovery version of poplar, too
* Sun May 20 2018 afaerber@suse.de
  - Adopt %license
  - Add poplar
  - Prepare tegra186
* Sun May 20 2018 afaerber@suse.de
  - Update to v1.5
    * Dropped upstream patches:
    arm-trusted-firmware_pie_1.patch
    arm-trusted-firmware_pie_2.patch
    arm-trusted-firmware_fiptool_pad.patch
    arm-trusted-firmware_fiptool_pad_useafterfree.patch
    arm-trusted-firmware_fiptool_pad_hikey.patch
    arm-trusted-firmware_fiptool_pad_hikey960.patch
    arm-trusted-firmware_cve-2017-5715_a57_a72.patch
    arm-trusted-firmware_cve-2017-5715_a73_a75.patch
    arm-trusted-firmware_cve-2017-5715_pfr0.patch
    arm-trusted-firmware_cve-2017-5715_errata_format.patch
    arm-trusted-firmware_cve-2017-5715_errata_output.patch
    arm-trusted-firmware_cve-2017-5715_platforms.patch
    arm-trusted-firmware_cve-2017-5715_bpiall.patch
    arm-trusted-firmware_cve-2017-5715_smccc.patch
    arm-trusted-firmware_cve-2017-5715_psci.patch
    arm-trusted-firmware_cve-2017-5715_runtime_exceptions.patch
    arm-trusted-firmware_cve-2017-5715_smccc_v1.1.patch
* Sat Feb 10 2018 afaerber@suse.de
  - Apply fiptool patches to tools package, too (b9o#633)
  - Prepare for detecting PIE support (gh#ARM-software/tf-issues#519)
    arm-trusted-firmware_pie_1.patch
    arm-trusted-firmware_pie_2.patch
* Sat Feb 10 2018 afaerber@suse.de
  - Implement SMCCC v1.1 (bsc#1074741)
    arm-trusted-firmware_cve-2017-5715_platforms.patch
    arm-trusted-firmware_cve-2017-5715_bpiall.patch
    arm-trusted-firmware_cve-2017-5715_smccc.patch
    arm-trusted-firmware_cve-2017-5715_psci.patch
    arm-trusted-firmware_cve-2017-5715_runtime_exceptions.patch
    arm-trusted-firmware_cve-2017-5715_smccc_v1.1.patch
* Sat Jan 27 2018 afaerber@suse.de
  - Pad HiKey FIP to avoid hanging fastboot transfer (b9o#633)
    arm-trusted-firmware_fiptool_pad.patch
    arm-trusted-firmware_fiptool_pad_useafterfree.patch
    arm-trusted-firmware_fiptool_pad_hikey.patch
    arm-trusted-firmware_fiptool_pad_hikey960.patch
* Sat Jan 27 2018 afaerber@suse.de
  - Add CVE-2017-5715 output (bsc#1074741)
    arm-trusted-firmware_cve-2017-5715_errata_format.patch
    arm-trusted-firmware_cve-2017-5715_errata_output.patch
* Mon Jan 22 2018 afaerber@suse.de
  - Use debug builds
* Fri Jan 12 2018 afaerber@suse.de
  - rk3399: Don't require cross binutils (let cross gcc choose which)
* Fri Jan 12 2018 afaerber@suse.de
  - hikey960: Build fip and require EDK2 for SCP_BL2 and BL33
  - Refresh CVE-2017-5715 patches (bsc#1074741)
    Drop arm-trusted-firmware_cve-2017-5715_ic_iallu.patch
    Add arm-trusted-firmware_cve-2017-5715_pfr0.patch
  - Suppress debuginfo for firmware
* Sun Jan 07 2018 afaerber@suse.de
  - Make noarch so that it can be exported
* Sun Jan 07 2018 afaerber@suse.de
  - hikey: Build fip and require EDK2 for SCP_BL2
  - Add tegra210
* Sun Jan 07 2018 afaerber@suse.de
  - Add hikey960
* Sun Jan 07 2018 afaerber@suse.de
  - Add hikey
  - Clean up pre_checkin.sh
  - Don't package bl31.bin for Rockchip, we need bl31.elf only
* Fri Jan 05 2018 afaerber@suse.de
  - Require arm-none gcc for RK3399
* Fri Jan 05 2018 afaerber@suse.de
  - Address CVE-2017-5715 (bsc#1074741)
    arm-trusted-firmware_cve-2017-5715_a57_a72.patch
    arm-trusted-firmware_cve-2017-5715_a73_a75.patch
    arm-trusted-firmware_cve-2017-5715_ic_iallu.patch
* Wed Jan 03 2018 matwey.kornilov@gmail.com
  - Return lost doc files
* Tue Jan 02 2018 matwey.kornilov@gmail.com
  - Package bl31.elf
* Tue Jan 02 2018 matwey.kornilov@gmail.com
  - acknowledgements.md renamed to acknowledgements.rst

Files

/usr/share/doc/packages/arm-trusted-firmware
/usr/share/doc/packages/arm-trusted-firmware/acknowledgements.rst
/usr/share/doc/packages/arm-trusted-firmware/contributing.rst
/usr/share/doc/packages/arm-trusted-firmware/dco.txt
/usr/share/doc/packages/arm-trusted-firmware/maintainers.rst
/usr/share/doc/packages/arm-trusted-firmware/readme.rst
/usr/share/licenses/arm-trusted-firmware
/usr/share/licenses/arm-trusted-firmware/license.rst


Generated by rpm2html 1.8.1

Fabrice Bellet, Fri Dec 3 23:48:33 2021