From patchwork Mon Oct 24 13:33:28 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: mohamed.omarasaker@arm.com X-Patchwork-Id: 14379 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1711BFA3740 for ; Mon, 24 Oct 2022 13:33:48 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web10.19379.1666618427535014447 for ; Mon, 24 Oct 2022 06:33:47 -0700 Authentication-Results: mx.groups.io; dkim=missing; spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: mohamed.omarasaker@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 71F05ED1; Mon, 24 Oct 2022 06:33:53 -0700 (PDT) Received: from e126544.cambridge.arm.com (e126544.cambridge.arm.com [10.1.199.72]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 869FA3F7B4; Mon, 24 Oct 2022 06:33:46 -0700 (PDT) From: mohamed.omarasaker@arm.com To: meta-arm@lists.yoctoproject.org, Ross.Burton@arm.com Cc: nd@arm.com, Mohamed Omar Asaker Subject: [PATCH 2/4] Revert "arm-bsp/trusted-firmware-m: corstone1000: bump tfm SHA" Date: Mon, 24 Oct 2022 14:33:28 +0100 Message-Id: <20221024133330.10542-3-mohamed.omarasaker@arm.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221024133330.10542-1-mohamed.omarasaker@arm.com> References: <20221024133330.10542-1-mohamed.omarasaker@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 24 Oct 2022 13:33:48 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/4018 From: Mohamed Omar Asaker This reverts commit 81181ed89818474bc6887b0383b4311099d482ca. Signed-off-by: Mohamed Omar Asaker --- .../trusted-firmware-m-corstone1000.inc | 16 ---------------- 1 file changed, 16 deletions(-) diff --git a/meta-arm-bsp/recipes-bsp/trusted-firmware-m/trusted-firmware-m-corstone1000.inc b/meta-arm-bsp/recipes-bsp/trusted-firmware-m/trusted-firmware-m-corstone1000.inc index 3cd1a4bb..b8f4870b 100644 --- a/meta-arm-bsp/recipes-bsp/trusted-firmware-m/trusted-firmware-m-corstone1000.inc +++ b/meta-arm-bsp/recipes-bsp/trusted-firmware-m/trusted-firmware-m-corstone1000.inc @@ -11,22 +11,6 @@ TFM_PLATFORM_IS_FVP ?= "FALSE" EXTRA_OECMAKE += "-DPLATFORM_IS_FVP=${TFM_PLATFORM_IS_FVP}" EXTRA_OECMAKE += "-DCC312_LEGACY_DRIVER_API_ENABLED=OFF" -SRCBRANCH_tfm = "master" -SRC_URI = "git://git.trustedfirmware.org/TF-M/trusted-firmware-m.git;protocol=https;branch=${SRCBRANCH_tfm};name=tfm;destsuffix=git/tfm \ - git://git.trustedfirmware.org/TF-M/tf-m-tests.git;protocol=https;branch=master;name=tfm-tests;destsuffix=git/tf-m-tests \ - git://github.com/ARMmbed/mbedtls.git;protocol=https;branch=master;name=mbedtls;destsuffix=git/mbedtls \ - git://github.com/mcu-tools/mcuboot.git;protocol=https;branch=main;name=mcuboot;destsuffix=git/mcuboot \ - " - -# Bumping the SHA of TFM is required as multiple changes are needed in the TFM to support the ESRT -# The most crucial change needed is TFM support for UEFI FMP Image Information -SRCREV_tfm = "b065a6b28cc6c692b99e4f7e9387d96f51bf4d07" -SRCREV_mbedtls = "869298bffeea13b205343361b7a7daf2b210e33d" -SRCREV_mcuboot = "c657cbea75f2bb1faf1fceacf972a0537a8d26dd" -SRCREV_tfm-tests = "3e6c52b4b255e4b1343ba6a257a77fa7a976e8fb" -PV .= "+git${SRCPV}" -SRCREV_FORMAT ?= "tfm" - # libmetal LICENSE += "& BSD-3-Clause" LIC_FILES_CHKSUM += "file://../libmetal/LICENSE.md;md5=fe0b8a4beea8f0813b606d15a3df3d3c"