From patchwork Tue Jun 4 18:09:44 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jon Mason X-Patchwork-Id: 44676 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 38C9BC25B78 for ; Tue, 4 Jun 2024 18:09:53 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web11.3228.1717524591412803382 for ; Tue, 04 Jun 2024 11:09:51 -0700 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: jon.mason@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 46146DA7 for ; Tue, 4 Jun 2024 11:10:15 -0700 (PDT) Received: from H24V3P4C17.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id A83E83F762 for ; Tue, 4 Jun 2024 11:09:50 -0700 (PDT) From: Jon Mason To: meta-arm@lists.yoctoproject.org Subject: [PATCH 1/6] arm/trusted-firmware-a: add support for 2.11.0 Date: Tue, 4 Jun 2024 14:09:44 -0400 Message-Id: <20240604180949.15501-1-jon.mason@arm.com> X-Mailer: git-send-email 2.39.3 (Apple Git-146) MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 04 Jun 2024 18:09:53 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/5785 Add support for tf-a version v2.11.0 and mbedtls 3.6.0. Modifications to the license checksum were necessary due to the addition to that file for DICE (which is Apache 2.0 licensed) for TF-A and the dual license of mbedtls (Apache 2.0 and addition of GPLv2). NOTE: FVP base is having (more of) an issue with CI on the newest TF-A, with SSH tests timing out. Holding that back to the LTS version until it cane be resolved. Signed-off-by: Jon Mason --- meta-arm-bsp/conf/machine/fvp-base.conf | 3 +- .../fiptool-native_2.11.0.bb | 33 +++++++++++ .../trusted-firmware-a/tf-a-tests_2.11.0.bb | 58 +++++++++++++++++++ .../trusted-firmware-a_2.11.0.bb | 19 ++++++ 4 files changed, 112 insertions(+), 1 deletion(-) create mode 100644 meta-arm/recipes-bsp/trusted-firmware-a/fiptool-native_2.11.0.bb create mode 100644 meta-arm/recipes-bsp/trusted-firmware-a/tf-a-tests_2.11.0.bb create mode 100644 meta-arm/recipes-bsp/trusted-firmware-a/trusted-firmware-a_2.11.0.bb diff --git a/meta-arm-bsp/conf/machine/fvp-base.conf b/meta-arm-bsp/conf/machine/fvp-base.conf index 17fb5023ccc5..24d03e7124af 100644 --- a/meta-arm-bsp/conf/machine/fvp-base.conf +++ b/meta-arm-bsp/conf/machine/fvp-base.conf @@ -9,6 +9,7 @@ require conf/machine/include/arm/arch-armv8-4a.inc ARM_SYSTEMREADY_FIRMWARE = "trusted-firmware-a:do_deploy" ARM_SYSTEMREADY_ACS_CONSOLE = "default" EXTRA_IMAGEDEPENDS = "${ARM_SYSTEMREADY_FIRMWARE}" +PREFERRED_VERSION_trusted-firmware-a ?= "2.10.%" MACHINE_FEATURES = "efi" @@ -62,4 +63,4 @@ FVP_TERMINALS[bp.terminal_0] ?= "Console" FVP_TERMINALS[bp.terminal_1] ?= "" FVP_TERMINALS[bp.terminal_2] ?= "" FVP_TERMINALS[bp.terminal_3] ?= "" -FVP_CONFIG[bp.secure_memory] ?= "1" \ No newline at end of file +FVP_CONFIG[bp.secure_memory] ?= "1" diff --git a/meta-arm/recipes-bsp/trusted-firmware-a/fiptool-native_2.11.0.bb b/meta-arm/recipes-bsp/trusted-firmware-a/fiptool-native_2.11.0.bb new file mode 100644 index 000000000000..47e783a892c8 --- /dev/null +++ b/meta-arm/recipes-bsp/trusted-firmware-a/fiptool-native_2.11.0.bb @@ -0,0 +1,33 @@ +# Firmware Image Package (FIP) +# It is a packaging format used by TF-A to package the +# firmware images in a single binary. + +DESCRIPTION = "fiptool - Trusted Firmware tool for packaging" +LICENSE = "BSD-3-Clause" + +SRC_URI_TRUSTED_FIRMWARE_A ?= "git://git.trustedfirmware.org/TF-A/trusted-firmware-a.git;protocol=https" +SRC_URI = "${SRC_URI_TRUSTED_FIRMWARE_A};destsuffix=fiptool-${PV};branch=${SRCBRANCH}" +LIC_FILES_CHKSUM = "file://docs/license.rst;md5=b5fbfdeb6855162dded31fadcd5d4dc5" + +# Use fiptool from TF-A v2.11.0 +SRCREV = "f2735ebccf5173f74c0458736ec526276106097e" +SRCBRANCH = "master" + +DEPENDS += "openssl-native" + +inherit native + +EXTRA_OEMAKE = "V=1 HOSTCC='${BUILD_CC}' OPENSSL_DIR=${STAGING_DIR_NATIVE}/${prefix_native}" + +do_compile () { + # This is still needed to have the native fiptool executing properly by + # setting the RPATH + sed -i '/^LDOPTS/ s,$, \$\{BUILD_LDFLAGS},' ${S}/tools/fiptool/Makefile + sed -i '/^INCLUDE_PATHS/ s,$, \$\{BUILD_CFLAGS},' ${S}/tools/fiptool/Makefile + + oe_runmake fiptool +} + +do_install () { + install -D -p -m 0755 tools/fiptool/fiptool ${D}${bindir}/fiptool +} diff --git a/meta-arm/recipes-bsp/trusted-firmware-a/tf-a-tests_2.11.0.bb b/meta-arm/recipes-bsp/trusted-firmware-a/tf-a-tests_2.11.0.bb new file mode 100644 index 000000000000..02f03f3b00cf --- /dev/null +++ b/meta-arm/recipes-bsp/trusted-firmware-a/tf-a-tests_2.11.0.bb @@ -0,0 +1,58 @@ +DESCRIPTION = "Trusted Firmware-A tests(aka TFTF)" +LICENSE = "BSD-3-Clause & NCSA" + +LIC_FILES_CHKSUM += "file://docs/license.rst;md5=6175cc0aa2e63b6d21a32aa0ee7d1b4a" + +inherit deploy + +COMPATIBLE_MACHINE ?= "invalid" + +SRC_URI_TRUSTED_FIRMWARE_A_TESTS ?= "git://git.trustedfirmware.org/TF-A/tf-a-tests.git;protocol=https" +SRC_URI = "${SRC_URI_TRUSTED_FIRMWARE_A_TESTS};branch=${SRCBRANCH} \ + " +SRCBRANCH = "master" +SRCREV = "fd053b75cde9c2aa1a5b979a2b544890510d4f52" + +DEPENDS += "optee-os" + +EXTRA_OEMAKE += "USE_NVM=0" +EXTRA_OEMAKE += "SHELL_COLOR=1" +EXTRA_OEMAKE += "DEBUG=1" + +# Modify mode based on debug or release mode +TFTF_MODE ?= "debug" + +# Platform must be set for each machine +TFA_PLATFORM ?= "invalid" + +EXTRA_OEMAKE += "ARCH=aarch64" +EXTRA_OEMAKE += "LOG_LEVEL=50" + +S = "${WORKDIR}/git" +B = "${WORKDIR}/build" + +# Add platform parameter +EXTRA_OEMAKE += "BUILD_BASE=${B} PLAT=${TFA_PLATFORM}" + +# Requires CROSS_COMPILE set by hand as there is no configure script +export CROSS_COMPILE="${TARGET_PREFIX}" + +LDFLAGS[unexport] = "1" +do_compile() { + oe_runmake -C ${S} tftf +} + +do_compile[cleandirs] = "${B}" + +FILES:${PN} = "/firmware/tftf.bin" +SYSROOT_DIRS += "/firmware" + +do_install() { + install -d -m 755 ${D}/firmware + install -m 0644 ${B}/${TFA_PLATFORM}/${TFTF_MODE}/tftf.bin ${D}/firmware/tftf.bin +} + +do_deploy() { + cp -rf ${D}/firmware/* ${DEPLOYDIR}/ +} +addtask deploy after do_install diff --git a/meta-arm/recipes-bsp/trusted-firmware-a/trusted-firmware-a_2.11.0.bb b/meta-arm/recipes-bsp/trusted-firmware-a/trusted-firmware-a_2.11.0.bb new file mode 100644 index 000000000000..27cdfc0953f3 --- /dev/null +++ b/meta-arm/recipes-bsp/trusted-firmware-a/trusted-firmware-a_2.11.0.bb @@ -0,0 +1,19 @@ +require recipes-bsp/trusted-firmware-a/trusted-firmware-a.inc + +# TF-A v2.11.0 +SRCREV_tfa = "f2735ebccf5173f74c0458736ec526276106097e" +SRCBRANCH = "master" + +LIC_FILES_CHKSUM += "file://docs/license.rst;md5=b5fbfdeb6855162dded31fadcd5d4dc5" + +# in TF-A src, docs/getting_started/prerequisites.rst lists the expected version mbedtls +# mbedtls-3.6.0 +SRC_URI_MBEDTLS = "git://github.com/ARMmbed/mbedtls.git;name=mbedtls;protocol=https;destsuffix=git/mbedtls;branch=master" +SRCREV_mbedtls = "2ca6c285a0dd3f33982dd57299012dacab1ff206" + +LIC_FILES_CHKSUM_MBEDTLS = "file://mbedtls/LICENSE;md5=379d5819937a6c2f1ef1630d341e026d" + +# continue to boot also without TPM +SRC_URI += "\ + file://0001-qemu_measured_boot.c-ignore-TPM-error-and-continue-w.patch \ +" From patchwork Tue Jun 4 18:09:45 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jon Mason X-Patchwork-Id: 44679 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 66D5EC27C5E for ; Tue, 4 Jun 2024 18:09:53 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web10.3052.1717524591754617513 for ; Tue, 04 Jun 2024 11:09:51 -0700 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: jon.mason@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 99EB91042 for ; Tue, 4 Jun 2024 11:10:15 -0700 (PDT) Received: from H24V3P4C17.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 117AB3F762 for ; Tue, 4 Jun 2024 11:09:51 -0700 (PDT) From: Jon Mason To: meta-arm@lists.yoctoproject.org Subject: [PATCH 2/6] arm/hafnium: update to v2.11 Date: Tue, 4 Jun 2024 14:09:45 -0400 Message-Id: <20240604180949.15501-2-jon.mason@arm.com> X-Mailer: git-send-email 2.39.3 (Apple Git-146) In-Reply-To: <20240604180949.15501-1-jon.mason@arm.com> References: <20240604180949.15501-1-jon.mason@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 04 Jun 2024 18:09:53 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/5786 Update hafnium to the latest version Changes in hafnium between 946fde92bedc95e1320684b0bc2dc752bc1e1bc7 and 2bef7ab3895c48d39b84ab58179b2d0de5156b8b 2bef7ab3895c docs: the change log for the v2.11 release 2aea748eb344 docs: add SIMD support section dac0ae1bf74a docs: threat model GPF with memory share 9dbe17a3fc60 docs: threat model to NWd rxtx buffer 0b45a2e28f65 docs: fix FFA_CONSOLE_LOG description c28ee3eda25d docs: device regions in SPMC manifest d547d6df4228 docs(memory management): rme integration 963a5d73abb5 docs: document `FFA_FEATURES` d40979fd9974 docs: document `FFA_CONSOLE_LOG` ABI dfc312e2a965 docs: add description of device memory lending ce8526ecac0f docs: update threat model for static dma isolation 17c9ad327bfa fix(ff-a): report NPI and MEI unsupported to normal world 27a4df506d83 refactor(simd): cosmetic rename sm local variable 4695ce892967 fix(simd): fix SME-only save/restore conditions 4fd8f364ff43 fix(simd): omit setting SVE VL in SIMD restore 034a31970f4e fix(simd): cosmetic comments 79dbd6f9ab99 fix(simd): mask out SMCCC SVE hint bit 96ffeee3175b fix(simd): use SMCCC SVE hint bit mask ca92fb0d303a refactor(simd): FPU save/restore convert to C 42a5262ebd4a fix: SVE/SME unsupported in processor feature regs 731f40b91e39 fix(test): reorder log before sync call in echo_mp 9b579d365a2d chore: remove extra lines from echo_mp test log 8a5fd9d9163a feat(indirect message): use 'memcpy_trapped' 0a21db13d12d feat(ff-a): use memcpy that is trapped GPF a2d1c3b9c94a feat: add implementation of `memcpy_trapped` 7388c18ef222 refactor: exception handling macros for reuse at EL2 568f2a7b8fb9 feat(aarch64): define macros to process GPF 462ad8d90796 chore(hftest): use common secondary stack definition 491ff30f1ac4 test(dir_msg): demo MP test with direct message 0c029c2719cd feat: prepare for MP tests b186fecfdf78 feat: added macro SERVICE_SELECT_MP 592ede3c7b95 test(memory share): NWd to SWd device memory sharing 63af1fab1656 feat(memory share): enable NWd to SWd device memory lending 4339edcf0bb0 feat(memory share): validate sp device mem ranges 6dff8271fbdc test(memory share): check limits on device mem sharing a4de8a56b211 test(memory share): device lend SP to SP a56ec8eff0f5 refactor(memory share): attributes in test helpers 9764ff6bd861 feat(memory share): allow device memory lend SP to SP 941ef34e5741 test(manifest): device memory for overlaps 4d16572b89ac feat(manifest): check device memory region for overlap 163e1a95a253 fix: ensure device regions are mapped as nGnRnE 899c4f28ab00 docs: drop unnecessary build option 03ba75fe13c3 refactor: set vcpu of the NWd in preempted state 0247fe68743e refactor: use `vcpu_set_running` function 874737a43d64 docs: mte build option in TF-A integration 2d570d1ef339 ci: increasing timeout 6976541fcc9e fix: update docs to use correct MTE build flag b1dbca99bae7 docs: update docs with new RXTX_MAP/UNMAP behavior 738bee137e1d feat(ff-a): validate FFA_RXTX_MAP/UNMAP against NWd page tables 41e8d5b1f805 refactor: set vcpu in preempted state e143080baf9b feat: add `vm_lock_both_in_order` 587cd29b5d3a test: FFA_CONSOLE_LOG with extended registers 740f74fc95c6 feat: support extended register set for `FFA_CONSOLE_LOG` b9705e2bd383 fix(ff-a): check that hypervisor's TX buffer is set-up 95f0e6033ad9 fix: fix typo in static_assert f98b2aa1d407 feat: add helpers for names of various enums 84710f315ae7 refactor(ff-a): use bitfields for memory access bitmaps 2fc6dcfa97e0 feat: update BL31 binary to optimize NS context management 5386559b386a feat: save and restore non-secure peripheral registers 80a7b7fe9abe feat: save and restore non-secure MTE context 0ec38247a973 feat: save and restore non-secure system reg context c70bacdd5054 refactor: create helpers to save and restore sys reg context 3956b2e6074a fix(direct message): tests to look for FFA_BUSY 7ea3f7ec8cb9 fix(direct message): reorder checks for FFA_BUSY e5262378c5d7 fix(memory share): missing flag if permissions RO c972cc6de311 fix(memory share): data access permissions 7de61af932d1 fix(memory share): sender and receiver are the same f779fb7ed4eb fix: ffa_msg_wait shall not change the mailbox state dc8cf3b899e6 test(ff-a): NPI not supported on EL0 partition f1ed5f16cd59 fix(ff-a): report NPI unsupported on EL0 partition 76f1c8f03c27 test(ff-a): SRI is unsupported on secure world cb6642c1cd6a fix(ff-a): report SRI unsupported to secure partitions f7861301c512 test(ff-a): FFA_FEATURES returns max RXTX buffer size 0fd672906e61 feat(ff-a): report RXTX buffer size in FFA_FEATURES f2b6fd1e8e7d test(ff-a): fix counts for ffa_info_get with multiple uuids a1de3c5f69f6 feat(ff-a): add multiple uuids to partition info desc 3bbed8f554d2 fix: allow code coverage tests to run despite fails 6e3abcff0f1b docs: add FFA_MSG_SEND_DIRECT_REQ2/RESP2 support 364400e8d91b refactor: linux driver statically allocate vms e0ca9a07de7b refactor(memory share): introduce ffa_memory_access_impdef_init f1dd1e1375a8 fix: partition message total size check 37b75119ed18 fix: partition message offset check 0abd88768e9a test: FFA_MSG_SEND_DIRECT_RESP2 intercepted 4847e3bdd837 test(dir_msg): cyclic dependency with two ABIs 9375a292b992 test(smccc): test register integrity across FF-A versions bed1dae8b4c1 test(dir_msg): extend multiple uuids test f06b52366f40 fix(mem sharing): return error if receiver count is 0 5e425040abf4 test(memory share): multiple borrowers from v1.1 SP a76fd9165b4b fix(memory share): broken assert in send from SP to multiple d50411214cb8 docs: update memory sharing to reflect recent changes 607c724cbda3 chore: increase timeout for sp_route_interrupt_to_secondary_vcpu 106c8cec1662 fix: reduce verbosity on passing tf-a-tests 9ae48e998450 test: intercept direct response between two SPs ca2f92d3adf1 test: enable specifying options for sp_fwd_sleep command 0a704e559d7e fix: unwind call chain after intercepting direct response 5a0991746afa fix: error return in FFA_MEM_PERM_GET/SET f06ee9df186d fix(memory share): drop assertion sender ID 89c221317513 fix: per-vCPU/global bind/set mismatch 30ac91dc9c78 fix: global notifications shall use vCPU ID 0 6b754a188dca fix: flags that mbz are checked f020814b4105 chore: improve log message in notification set 7333dcfaf21a fix: notification set error code 1512acc0a69c chore: print bitmap on FFA_NOTIFICATION_BIND 7ccaccf2ab18 fix: invalid ID in bitmap create/destroy 2a500071f224 fix: spmc test script didn't capture failures 37e559da0f07 refactor(tc): remap console logs a3905006b590 test(dir_msg): add FF-A version based tests 382e0c622a79 test(ff-a): registers preserved after dir_resp 352388760d18 feat(ff-a): preserve extended registers in dir_resp 81237694db4d test: exercise interrupt handling while processing indirect message 8922671489d9 test: support for services to parse device regions 93978b038e4d test: add twdog helpers to primary_with_secondaries 9a1b9c0bff6b test: make sp805 driver common across test setups ba2488560be8 fix(interrupts): intercept ffa_msg_wait to signal virtual interrupt ba22a72b8866 refactor: add helpers to intercept and resume ffa calls 7182163a2245 docs: update ff-a bindings for static dma isolation 555f8882f437 docs: add support for static dma isolation 7c7b1a7764ef feat: demonstrate specifying dma device count per partition 0715f32ba515 feat(smmuv3): restrict access of streams to limited memory regions 0e57d3d35892 feat(iommu): map memory regions into dma page tables 070f49ebfb4a feat: initialize page tables for enforcing dma isolation 8a3644777dc1 feat: allow platforms to specify dma device count per partition e032af5e6a37 feat: track dma devices and map to stream ids 3c2b7911e6ee feat: retrieve dma properties for each memory region node 1ced4cb719ff feat(sme): add NS SME save/restore operations ffdeb23a067b feat(sme): introduce an SME module 52bbdee7487c feat(sme): add SME related definitions 5b5883351c94 feat(simd): SIMD NS save/restore convert to C dc112d50c258 refactor: make is_arch_feat_sve_supported inlined d71c83aa8f44 feat(sve): introduce an SVE module b0faf45a6c4a fix: ensure SVE traps are enabled when running SPs 063ad835b5bd feat(memory share): revert protect action fd2060536fee feat(memory share): unprotect memory on reclaim 460d36c1fc58 feat(memory share): protect on memory lend/donate cf6253e3abec feat(memory share): protect/unprotect memory a2ff04126675 feat(rme): add protect/unprotect memory functions 0a83dc2bf94c feat(memory share): define ffa_map_actions dad6003e1fcd feat: add build options for memory protect cb4dc90811b6 feat: arch helpers to check RME support 2e14ebe8b6e3 fix(memory share): fix behaviour of relinquish clear flag 3d0a462034c0 ci: separate static checks in a script 674e4de6bb3a refactor: mailbox doesn't need size and sender 44e9b3b7bebb fix(memory share): hypervisor retrieve request 7b6ab6195d84 fix(memory share): set size of access descriptor 4f0d9c1843cf refactor(memory share): split memory retrieve req d61246b6c5e1 fix(ff-a): do not report FFA_EL3_INTR_HANDLE to VM 40d09d2ce60c docs: added section for building a single platform f90f1f12de0a feat(build): check platforms exist before building 41ef8baba363 refactor(memory share): use receiver_offsets to find receiver array 39bc21b07309 test(dir_msg): test direct message abi pairs e468c1168124 fix(dir_msg): enforce direct message ABI pairs cf7cc68012d3 test(ff-a): add FF-A v1.2 ffa_features test 58fe07d70fea test(dir_msg): end-to-end direct msg test with multiple uuids 422b10bc6991 feat(uuids): add support for multiple UUIDs per partition 036cc592731b test(ff-a v1.2): ffa_run to zero extended registers 434bea9652a1 test(dir_msg): add tests for FFA_MSG_SEND_DIRECT_REQ2 de0b0da535a1 test(dir_msg): extend registers in dir_msg tests 087e50241881 feat(dir_msg): add FFA_MSG_SEND_DIRECT_RESP2 db6a08b7cc6c feat(dir_msg) extend FFA_MSG_SEND_DIRECT_REQ2 registers 734ddc4e7cfb test(dir_msg) test FFA_MSG_SEND_DIRECT_REQ2 41fea93fe85b feat(dir msg): add FFA_MSG_SEND_DIRECT_REQ2 86d9fa741b86 feat(prebuilts): add SPMD support for ff-a v1.2 dir msg c0e7dc20f2a9 docs: update messaging method ff-a binding f71dee4c7bab feat(manifest): support FF-A v1.2 direct messages 9681574575c0 test(memory share): add test for FF-A v1.1 endpoints 63130e572dbe refactor(memory share): correct names of versioned share tests 909d3bbeca84 test(memory share): check memory access invalid values 59ffee9ba6bd test(memory share): introduce impdef value check de974ca9b936 feat(memory share): add impdef field to ffa_memory_access c7dc932e9a15 feat(memory share): check memory region desc values d5ae44bed0c1 refactor(memory share): add helper for accessing receivers 36e0bdbf58e6 refactor(memory share): make ffa_memory_region update common 64400234fe31 refactor: make is_arch_feat_bti_supported inlined 109c6d4c0e5b fix: restrict HF_INTERRUPT_INJECT to Hypervisor 0926addea321 feat(amu): enable traps 0a1a9f861e6d feat(ff-a): update el0 services to v1.2 78788f863ca5 fix: ignore spurious interrupt and resume preempted vcpu c5b20e7e0d6b chore: remove clang toolchain from prebuilts 6b351bc82c92 feat: build multiple targets at once fdd59f75403f refactor: remove plat_ffa_other_world_mem_retrive function ed7dee80b329 test: exercise interrupt handling with interrupts masked 3aafcb620cf4 test: add helpers and extend command args to mask interrupts 151c2e7f0bf3 fix(interrupts): intercept direct response to signal virtual interrupt 09e086a7dbcf fix(interrupts): reset implicit completion signal e1562a1488c3 feat(rd): secure hafnium build for rdfremontcfg1 platform e4fe29698285 feat(ff-a): update FF-A version to v1.2 ad7451b1faee feat(prebuilts): update TF-A prebuilt binary to FF-A v1.2 ed508c80a039 chore: make function private to ffa_memory b56aac880e08 fix: explicit boolean for `share_state` pointer 639ddfc0193e fix(memory share): read-only memory can't clear memory 41d4fef0f044 fix(memory share): error code in retrieve request 03f08d3dc4b8 feat(gicv3): ensure implementation supports two security states Signed-off-by: Jon Mason --- .../recipes-bsp/hafnium/{hafnium_2.10.bb => hafnium_2.11.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta-arm/recipes-bsp/hafnium/{hafnium_2.10.bb => hafnium_2.11.bb} (97%) diff --git a/meta-arm/recipes-bsp/hafnium/hafnium_2.10.bb b/meta-arm/recipes-bsp/hafnium/hafnium_2.11.bb similarity index 97% rename from meta-arm/recipes-bsp/hafnium/hafnium_2.10.bb rename to meta-arm/recipes-bsp/hafnium/hafnium_2.11.bb index dea1bdcbb789..0fe9a79b032f 100644 --- a/meta-arm/recipes-bsp/hafnium/hafnium_2.10.bb +++ b/meta-arm/recipes-bsp/hafnium/hafnium_2.11.bb @@ -18,7 +18,7 @@ SRC_URI = "gitsm://git.trustedfirmware.org/hafnium/hafnium.git;protocol=https;br file://0001-Use-pkg-config-native-to-find-the-libssl-headers.patch;patchdir=third_party/linux \ file://0001-work-around-visibility-issue.patch;patchdir=third_party/dtc \ " -SRCREV = "946fde92bedc95e1320684b0bc2dc752bc1e1bc7" +SRCREV = "2bef7ab3895c48d39b84ab58179b2d0de5156b8b" S = "${WORKDIR}/git" B = "${WORKDIR}/build" From patchwork Tue Jun 4 18:09:46 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jon Mason X-Patchwork-Id: 44675 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3D071C41513 for ; Tue, 4 Jun 2024 18:09:53 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web11.3229.1717524592011006779 for ; Tue, 04 Jun 2024 11:09:52 -0700 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: jon.mason@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 0560B1063 for ; Tue, 4 Jun 2024 11:10:16 -0700 (PDT) Received: from H24V3P4C17.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 6589B3F762 for ; Tue, 4 Jun 2024 11:09:51 -0700 (PDT) From: Jon Mason To: meta-arm@lists.yoctoproject.org Subject: [PATCH 3/6] arm/edk2: update to edk2-stable202405 Date: Tue, 4 Jun 2024 14:09:46 -0400 Message-Id: <20240604180949.15501-3-jon.mason@arm.com> X-Mailer: git-send-email 2.39.3 (Apple Git-146) In-Reply-To: <20240604180949.15501-1-jon.mason@arm.com> References: <20240604180949.15501-1-jon.mason@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 04 Jun 2024 18:09:53 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/5787 Signed-off-by: Jon Mason --- ...ls-native_202402.bb => edk2-basetools-native_202405.bb} | 2 +- meta-arm/recipes-bsp/uefi/edk2-firmware_202402.bb | 7 ------- meta-arm/recipes-bsp/uefi/edk2-firmware_202405.bb | 7 +++++++ meta-arm/recipes-bsp/uefi/sbsa-acs_7.1.4.bb | 2 +- 4 files changed, 9 insertions(+), 9 deletions(-) rename meta-arm/recipes-bsp/uefi/{edk2-basetools-native_202402.bb => edk2-basetools-native_202405.bb} (93%) delete mode 100644 meta-arm/recipes-bsp/uefi/edk2-firmware_202402.bb create mode 100644 meta-arm/recipes-bsp/uefi/edk2-firmware_202405.bb diff --git a/meta-arm/recipes-bsp/uefi/edk2-basetools-native_202402.bb b/meta-arm/recipes-bsp/uefi/edk2-basetools-native_202405.bb similarity index 93% rename from meta-arm/recipes-bsp/uefi/edk2-basetools-native_202402.bb rename to meta-arm/recipes-bsp/uefi/edk2-basetools-native_202405.bb index 9a1086fc5b24..851150744c6d 100644 --- a/meta-arm/recipes-bsp/uefi/edk2-basetools-native_202402.bb +++ b/meta-arm/recipes-bsp/uefi/edk2-basetools-native_202405.bb @@ -10,7 +10,7 @@ LICENSE = "BSD-2-Clause-Patent" SRC_URI = "git://github.com/tianocore/edk2.git;branch=master;protocol=https" LIC_FILES_CHKSUM = "file://License.txt;md5=2b415520383f7964e96700ae12b4570a" -SRCREV = "edc6681206c1a8791981a2f911d2fb8b3d2f5768" +SRCREV = "3e722403cd16388a0e4044e705a2b34c841d76ca" UPSTREAM_CHECK_GITTAGREGEX = "^edk2-stable(?P\d+)$" diff --git a/meta-arm/recipes-bsp/uefi/edk2-firmware_202402.bb b/meta-arm/recipes-bsp/uefi/edk2-firmware_202402.bb deleted file mode 100644 index 05885315aa8d..000000000000 --- a/meta-arm/recipes-bsp/uefi/edk2-firmware_202402.bb +++ /dev/null @@ -1,7 +0,0 @@ -SRCREV_edk2 ?= "edc6681206c1a8791981a2f911d2fb8b3d2f5768" -SRCREV_edk2-platforms ?= "07842635c80b64c4a979a652104ea1141ba5007a" - -# FIXME - clang is having issues with antlr -TOOLCHAIN:aarch64 = "gcc" - -require recipes-bsp/uefi/edk2-firmware.inc diff --git a/meta-arm/recipes-bsp/uefi/edk2-firmware_202405.bb b/meta-arm/recipes-bsp/uefi/edk2-firmware_202405.bb new file mode 100644 index 000000000000..294a22322d9a --- /dev/null +++ b/meta-arm/recipes-bsp/uefi/edk2-firmware_202405.bb @@ -0,0 +1,7 @@ +SRCREV_edk2 ?= "3e722403cd16388a0e4044e705a2b34c841d76ca" +SRCREV_edk2-platforms ?= "59c686673992d7549c2b054773d5d1b5e739a88b" + +# FIXME - clang is having issues with antlr +TOOLCHAIN:aarch64 = "gcc" + +require recipes-bsp/uefi/edk2-firmware.inc diff --git a/meta-arm/recipes-bsp/uefi/sbsa-acs_7.1.4.bb b/meta-arm/recipes-bsp/uefi/sbsa-acs_7.1.4.bb index a29c16ecb466..305588d1a11b 100644 --- a/meta-arm/recipes-bsp/uefi/sbsa-acs_7.1.4.bb +++ b/meta-arm/recipes-bsp/uefi/sbsa-acs_7.1.4.bb @@ -1,4 +1,4 @@ -require recipes-bsp/uefi/edk2-firmware_202402.bb +require recipes-bsp/uefi/edk2-firmware_202405.bb PROVIDES:remove = "virtual/bootloader" LICENSE += "& Apache-2.0" From patchwork Tue Jun 4 18:09:47 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jon Mason X-Patchwork-Id: 44677 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4B2B5C27C54 for ; Tue, 4 Jun 2024 18:09:53 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web11.3230.1717524592507024263 for ; Tue, 04 Jun 2024 11:09:52 -0700 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: jon.mason@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 5F583DA7 for ; Tue, 4 Jun 2024 11:10:16 -0700 (PDT) Received: from H24V3P4C17.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id C4AAF3F762 for ; Tue, 4 Jun 2024 11:09:51 -0700 (PDT) From: Jon Mason To: meta-arm@lists.yoctoproject.org Subject: [PATCH 4/6] arm/trusted-firmware-rmm: add UPSTREAM_CHECK and tweak recipe version Date: Tue, 4 Jun 2024 14:09:47 -0400 Message-Id: <20240604180949.15501-4-jon.mason@arm.com> X-Mailer: git-send-email 2.39.3 (Apple Git-146) In-Reply-To: <20240604180949.15501-1-jon.mason@arm.com> References: <20240604180949.15501-1-jon.mason@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 04 Jun 2024 18:09:53 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/5788 Adding UPSTREAM_CHECK_GITTAGREGEX to properly check the upstream version, and modify the recipe name to follow the version in the git tree. Signed-off-by: Jon Mason --- ...trusted-firmware-rmm_0.4.bb => trusted-firmware-rmm_0.4.0.bb} | 1 + 1 file changed, 1 insertion(+) rename meta-arm/recipes-bsp/trusted-firmware-rmm/{trusted-firmware-rmm_0.4.bb => trusted-firmware-rmm_0.4.0.bb} (95%) diff --git a/meta-arm/recipes-bsp/trusted-firmware-rmm/trusted-firmware-rmm_0.4.bb b/meta-arm/recipes-bsp/trusted-firmware-rmm/trusted-firmware-rmm_0.4.0.bb similarity index 95% rename from meta-arm/recipes-bsp/trusted-firmware-rmm/trusted-firmware-rmm_0.4.bb rename to meta-arm/recipes-bsp/trusted-firmware-rmm/trusted-firmware-rmm_0.4.0.bb index 0726cd3d2497..f458a655205a 100644 --- a/meta-arm/recipes-bsp/trusted-firmware-rmm/trusted-firmware-rmm_0.4.bb +++ b/meta-arm/recipes-bsp/trusted-firmware-rmm/trusted-firmware-rmm_0.4.0.bb @@ -7,6 +7,7 @@ SRC_URI = "gitsm://git.trustedfirmware.org/TF-RMM/tf-rmm.git;protocol=https;bran " SRCREV = "0a02656945d69757b0779192cebb9b41dd9037d1" +UPSTREAM_CHECK_GITTAGREGEX = "^tf-rmm-v(?P\d+(\.\d+)+)$" LIC_FILES_CHKSUM += "file://docs/about/license.rst;md5=1375c7c641558198ffe401c2a799d79b" From patchwork Tue Jun 4 18:09:48 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jon Mason X-Patchwork-Id: 44678 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4AFE1C27C53 for ; Tue, 4 Jun 2024 18:09:53 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web11.3231.1717524592741268441 for ; Tue, 04 Jun 2024 11:09:52 -0700 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: jon.mason@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id B30201042 for ; Tue, 4 Jun 2024 11:10:16 -0700 (PDT) Received: from H24V3P4C17.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 2BE8D3F762 for ; Tue, 4 Jun 2024 11:09:52 -0700 (PDT) From: Jon Mason To: meta-arm@lists.yoctoproject.org Subject: [PATCH 5/6] arm/trusted-firmware-rmm: update to 0.5.0 Date: Tue, 4 Jun 2024 14:09:48 -0400 Message-Id: <20240604180949.15501-5-jon.mason@arm.com> X-Mailer: git-send-email 2.39.3 (Apple Git-146) In-Reply-To: <20240604180949.15501-1-jon.mason@arm.com> References: <20240604180949.15501-1-jon.mason@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 04 Jun 2024 18:09:53 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/5789 Signed-off-by: Jon Mason --- ...tra-repositories-for-system-includes.patch | 56 ------------------- ...0.4.0.bb => trusted-firmware-rmm_0.5.0.bb} | 3 +- 2 files changed, 1 insertion(+), 58 deletions(-) delete mode 100644 meta-arm/recipes-bsp/trusted-firmware-rmm/files/0001-build-lib-Add-extra-repositories-for-system-includes.patch rename meta-arm/recipes-bsp/trusted-firmware-rmm/{trusted-firmware-rmm_0.4.0.bb => trusted-firmware-rmm_0.5.0.bb} (90%) diff --git a/meta-arm/recipes-bsp/trusted-firmware-rmm/files/0001-build-lib-Add-extra-repositories-for-system-includes.patch b/meta-arm/recipes-bsp/trusted-firmware-rmm/files/0001-build-lib-Add-extra-repositories-for-system-includes.patch deleted file mode 100644 index 7c3e637f0d63..000000000000 --- a/meta-arm/recipes-bsp/trusted-firmware-rmm/files/0001-build-lib-Add-extra-repositories-for-system-includes.patch +++ /dev/null @@ -1,56 +0,0 @@ -From bc7dbac20a6674eb2834bd6176665f1a2ae42edc Mon Sep 17 00:00:00 2001 -From: Mathieu Poirier -Date: Thu, 14 Mar 2024 14:59:30 -0600 -Subject: [PATCH] build(lib): Add extra repositories for system includes - -Toolchains such as aarch64-none-elf, aarch64-none-linux-gnu and -aarch64-linux-gnu include assert.h and limits.h in a directory that is -part of their search path. This is not the case when compiling with -Yocto where aarch64-poky-linux places those files in the sysroot -directory of the component being compiled. - -Since the sysroot directory of the component is not part of the cmake -search path, compiling the RMM in Yocto fails. This patch fixes the -problem by expanding the search path when needed, allowing the RMM to be -compiled in Yocto. - -Upstream-Status: Backport [bc7dbac20a6674eb2834bd6176665f1a2ae42edc] -Signed-off-by: Mathieu Poirier ---- - lib/arch/CMakeLists.txt | 3 +++ - lib/libc/CMakeLists.txt | 5 ++++- - 2 files changed, 7 insertions(+), 1 deletion(-) - -diff --git a/lib/arch/CMakeLists.txt b/lib/arch/CMakeLists.txt -index d3afc5f2bfc8..a52185f02695 100644 ---- a/lib/arch/CMakeLists.txt -+++ b/lib/arch/CMakeLists.txt -@@ -12,6 +12,9 @@ target_link_libraries(rmm-lib-arch - target_include_directories(rmm-lib-arch - PUBLIC "include" - "include/${RMM_ARCH}" -+ # The CMAKE_INCLUDE_PATH is included here for Yocto builds. the -+ # Yocto recipe will define this variable as part of the build. -+ ${CMAKE_INCLUDE_PATH} - PRIVATE "src/${RMM_ARCH}" - "src/include") - -diff --git a/lib/libc/CMakeLists.txt b/lib/libc/CMakeLists.txt -index 1631332dbc72..a2adf37f7cb8 100644 ---- a/lib/libc/CMakeLists.txt -+++ b/lib/libc/CMakeLists.txt -@@ -12,7 +12,10 @@ if(NOT RMM_ARCH STREQUAL fake_host) - rmm-lib-debug) - - target_include_directories(rmm-lib-libc SYSTEM -- PUBLIC "include") -+ PUBLIC "include" -+ # The CMAKE_INCLUDE_PATH is included here for Yocto builds. the -+ # Yocto recipe will define this variable as part of the build. -+ ${CMAKE_INCLUDE_PATH}) - - target_sources(rmm-lib-libc - PRIVATE "src/abort.c" --- -2.34.1 - diff --git a/meta-arm/recipes-bsp/trusted-firmware-rmm/trusted-firmware-rmm_0.4.0.bb b/meta-arm/recipes-bsp/trusted-firmware-rmm/trusted-firmware-rmm_0.5.0.bb similarity index 90% rename from meta-arm/recipes-bsp/trusted-firmware-rmm/trusted-firmware-rmm_0.4.0.bb rename to meta-arm/recipes-bsp/trusted-firmware-rmm/trusted-firmware-rmm_0.5.0.bb index f458a655205a..b65b9eb2a766 100644 --- a/meta-arm/recipes-bsp/trusted-firmware-rmm/trusted-firmware-rmm_0.4.0.bb +++ b/meta-arm/recipes-bsp/trusted-firmware-rmm/trusted-firmware-rmm_0.5.0.bb @@ -3,10 +3,9 @@ DESCRIPTION = "RMM Firmware for Arm reference platforms" LICENSE = "BSD-3-Clause & MIT" SRC_URI = "gitsm://git.trustedfirmware.org/TF-RMM/tf-rmm.git;protocol=https;branch=main \ - file://0001-build-lib-Add-extra-repositories-for-system-includes.patch \ " -SRCREV = "0a02656945d69757b0779192cebb9b41dd9037d1" +SRCREV = "6184a730bd4bc80d59eeff7f0752f8423500202c" UPSTREAM_CHECK_GITTAGREGEX = "^tf-rmm-v(?P\d+(\.\d+)+)$" LIC_FILES_CHKSUM += "file://docs/about/license.rst;md5=1375c7c641558198ffe401c2a799d79b" From patchwork Tue Jun 4 18:09:49 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jon Mason X-Patchwork-Id: 44680 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6FEC7C27C5F for ; Tue, 4 Jun 2024 18:09:53 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web11.3230.1717524592507024263 for ; Tue, 04 Jun 2024 11:09:53 -0700 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: jon.mason@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 22EF5DA7 for ; Tue, 4 Jun 2024 11:10:17 -0700 (PDT) Received: from H24V3P4C17.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 7ED6A3F762 for ; Tue, 4 Jun 2024 11:09:52 -0700 (PDT) From: Jon Mason To: meta-arm@lists.yoctoproject.org Subject: [PATCH 6/6] arm/arm-tstee: add UPSTREAM_CHECK Date: Tue, 4 Jun 2024 14:09:49 -0400 Message-Id: <20240604180949.15501-6-jon.mason@arm.com> X-Mailer: git-send-email 2.39.3 (Apple Git-146) In-Reply-To: <20240604180949.15501-1-jon.mason@arm.com> References: <20240604180949.15501-1-jon.mason@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 04 Jun 2024 18:09:53 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/5790 Add UPSTREAM_CHECK_GITTAGREGEX to allow devtool to check for the latest version Signed-off-by: Jon Mason --- meta-arm/recipes-kernel/arm-tstee/arm-tstee_2.0.0.bb | 1 + 1 file changed, 1 insertion(+) diff --git a/meta-arm/recipes-kernel/arm-tstee/arm-tstee_2.0.0.bb b/meta-arm/recipes-kernel/arm-tstee/arm-tstee_2.0.0.bb index 44608b1dd263..34beac945ffa 100644 --- a/meta-arm/recipes-kernel/arm-tstee/arm-tstee_2.0.0.bb +++ b/meta-arm/recipes-kernel/arm-tstee/arm-tstee_2.0.0.bb @@ -12,6 +12,7 @@ S = "${WORKDIR}/git" # Tag tee-v2.0.0 SRCREV = "a2d7349a96c3b3afb44bf1555d53f1c46e45a23d" +UPSTREAM_CHECK_GITTAGREGEX = "^tee-v(?P\d+(\.\d+)+)$" COMPATIBLE_HOST = "(arm|aarch64).*-linux" KERNEL_MODULE_AUTOLOAD += "arm-tstee"