From patchwork Mon Oct 20 15:09:21 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jon Mason X-Patchwork-Id: 72721 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EDB35CCD193 for ; Mon, 20 Oct 2025 15:09:27 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web11.21445.1760972967403815086 for ; Mon, 20 Oct 2025 08:09:27 -0700 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: jon.mason@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 2F3B416A3 for ; Mon, 20 Oct 2025 08:09:19 -0700 (PDT) Received: from H24V3P4C17.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id B1D4B3F66E for ; Mon, 20 Oct 2025 08:09:26 -0700 (PDT) From: Jon Mason To: meta-arm@lists.yoctoproject.org Subject: [PATCH 2/5] arm/trusted-firmware-a: remove forcing of gcc for qemuarm-secureboot Date: Mon, 20 Oct 2025 16:09:21 +0100 Message-ID: <20251020150924.84223-2-jon.mason@arm.com> X-Mailer: git-send-email 2.50.1 In-Reply-To: <20251020150924.84223-1-jon.mason@arm.com> References: <20251020150924.84223-1-jon.mason@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 20 Oct 2025 15:09:27 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/6740 clang is now working for qemuarm-secureboot. Remove the forcing of gcc and clean-up a white space issue. Signed-off-by: Jon Mason --- .../trusted-firmware-a/trusted-firmware-a_%.bbappend | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/meta-arm/recipes-bsp/trusted-firmware-a/trusted-firmware-a_%.bbappend b/meta-arm/recipes-bsp/trusted-firmware-a/trusted-firmware-a_%.bbappend index d996d83beb1f..e80279d63bae 100644 --- a/meta-arm/recipes-bsp/trusted-firmware-a/trusted-firmware-a_%.bbappend +++ b/meta-arm/recipes-bsp/trusted-firmware-a/trusted-firmware-a_%.bbappend @@ -1,10 +1,6 @@ COMPATIBLE_MACHINE:qemuarm64-secureboot = "qemuarm64-secureboot" COMPATIBLE_MACHINE:qemuarm-secureboot = "qemuarm-secureboot" -#FIXME - clang fails to build tfa for qemuarm-secureboot, and possibly other -# arm/aarch32. This is a known testing hole in TF-A. -TOOLCHAIN:qemuarm-secureboot = "gcc" - # Enable passing TOS_FW_CONFIG from FIP package to Trusted OS. FILESEXTRAPATHS:prepend:qemuarm64-secureboot := "${THISDIR}/files:" SRC_URI:append:qemuarm64-secureboot = " \ @@ -53,7 +49,7 @@ EXTRA_OEMAKE:append:arm:qemuall = " \ # When using OP-TEE SPMC specify the SPMC manifest file. EXTRA_OEMAKE:append:qemuarm64-secureboot = "${@bb.utils.contains('MACHINE_FEATURES', 'arm-ffa', \ 'QEMU_TOS_FW_CONFIG_DTS=${S}/plat/qemu/fdts/optee_spmc_manifest.dts', '', d)}" - + do_compile:append:qemuarm64-secureboot() { # Create a secure flash image for booting AArch64 Qemu. See: # https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/plat/qemu.rst