From patchwork Fri Oct 14 11:02:49 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: mohamed.omarasaker@arm.com X-Patchwork-Id: 13885 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 34765C433FE for ; Fri, 14 Oct 2022 11:03:28 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web10.5773.1665745407068004281 for ; Fri, 14 Oct 2022 04:03:27 -0700 Authentication-Results: mx.groups.io; dkim=missing; spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: mohamed.omarasaker@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 7D3FC13D5; Fri, 14 Oct 2022 04:03:32 -0700 (PDT) Received: from e126544.arm.com (unknown [10.57.36.234]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 2B7033F792; Fri, 14 Oct 2022 04:03:24 -0700 (PDT) From: mohamed.omarasaker@arm.com To: meta-arm@lists.yoctoproject.org, Ross.Burton@arm.com Cc: nd@arm.com, Satish Kumar Subject: [PATCH 2/4] arm-bsp/trusted-firmware-m: corstone1000: bump tfm SHA Date: Fri, 14 Oct 2022 12:02:49 +0100 Message-Id: <20221014110251.1766159-3-mohamed.omarasaker@arm.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221014110251.1766159-1-mohamed.omarasaker@arm.com> References: <20221014110251.1766159-1-mohamed.omarasaker@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 14 Oct 2022 11:03:28 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/3965 From: Satish Kumar The patch bumps the tfm SHA to b065a6b28cc6c692b99e4f7e9387d96f51bf4d07 Signed-off-by: Satish Kumar --- .../trusted-firmware-m-corstone1000.inc | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/meta-arm-bsp/recipes-bsp/trusted-firmware-m/trusted-firmware-m-corstone1000.inc b/meta-arm-bsp/recipes-bsp/trusted-firmware-m/trusted-firmware-m-corstone1000.inc index 95c49d06..e57b1a97 100644 --- a/meta-arm-bsp/recipes-bsp/trusted-firmware-m/trusted-firmware-m-corstone1000.inc +++ b/meta-arm-bsp/recipes-bsp/trusted-firmware-m/trusted-firmware-m-corstone1000.inc @@ -11,6 +11,22 @@ TFM_PLATFORM_IS_FVP ?= "FALSE" EXTRA_OECMAKE += "-DPLATFORM_IS_FVP=${TFM_PLATFORM_IS_FVP}" EXTRA_OECMAKE += "-DCC312_LEGACY_DRIVER_API_ENABLED=OFF" +SRCBRANCH_tfm = "master" +SRC_URI = "git://git.trustedfirmware.org/TF-M/trusted-firmware-m.git;protocol=https;branch=${SRCBRANCH_tfm};name=tfm;destsuffix=git/tfm \ + git://git.trustedfirmware.org/TF-M/tf-m-tests.git;protocol=https;branch=master;name=tfm-tests;destsuffix=git/tf-m-tests \ + git://github.com/ARMmbed/mbedtls.git;protocol=https;branch=master;name=mbedtls;destsuffix=git/mbedtls \ + git://github.com/mcu-tools/mcuboot.git;protocol=https;branch=main;name=mcuboot;destsuffix=git/mcuboot \ + " + +# Bumping the SHA of TFM is required as multiple changes are needed in the TFM to support the ESRT +# The most crucial change needed is TFM support for UEFI FMP Image Information +SRCREV_tfm = "b065a6b28cc6c692b99e4f7e9387d96f51bf4d07" +SRCREV_mbedtls = "869298bffeea13b205343361b7a7daf2b210e33d" +SRCREV_mcuboot = "c657cbea75f2bb1faf1fceacf972a0537a8d26dd" +SRCREV_tfm-tests = "3e6c52b4b255e4b1343ba6a257a77fa7a976e8fb" +PV .= "+git${SRCPV}" +SRCREV_FORMAT ?= "tfm" + # libmetal LICENSE += "& BSD-3-Clause" LIC_FILES_CHKSUM += "file://../libmetal/LICENSE.md;md5=fe0b8a4beea8f0813b606d15a3df3d3c"