Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

arm-trusted-firmware-tools-2.10.0-1.2 RPM for s390x

From OpenSuSE Ports Tumbleweed for s390x

Name: arm-trusted-firmware-tools Distribution: openSUSE:Factory:zSystems
Version: 2.10.0 Vendor: openSUSE
Release: 1.2 Build date: Sat Dec 23 00:12:55 2023
Group: System/Boot Build host: s390zl24
Size: 2010632 Source RPM: arm-trusted-firmware-2.10.0-1.2.src.rpm
Packager: https://bugs.opensuse.org
Url: https://www.trustedfirmware.org/
Summary: Tools for ARM Trusted Firmware-A
Trusted Firmware-A (TF-A) provides a reference implementation of
secure world software for ARMv8-A, including a Secure Monitor executing at
Exception Level 3 (EL3). It implements various ARM interface standards,
such as the Power State Coordination Interface (PSCI),
Trusted Board Boot Requirements (TBBR, ARM DEN0006C-1) and
SMC Calling Convention. As far as possible the code is designed for reuse
or porting to other ARMv8-A model and hardware platforms.

This package contains fiptool.

Provides

Requires

License

BSD-3-Clause

Changelog

* Thu Nov 23 2023 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Update to 2.10.0:
    * Changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/docs/change-log.md?id=9873580997c7f5ec60535bd45367d0c7d3cc2784
* Mon Sep 18 2023 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Update to 2.9.0:
    * Changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/docs/change-log.md?id=b78ad00e580596c4f0b5dfc41efbf5f5877cbdb9
* Mon Sep 18 2023 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Update to 2.8.8:
    - **Libraries**
    - **CPU Support**
    - fix(cpus): workaround for Neoverse V2 erratum 2801372 ([ec3fafa](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/ec3fafa24307686b957de0899ba30bfbb5a70380))
  - Skipped 2.8.7:
    - **Build System**
    - fix(build): allow warnings when using lld ([37bee49](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/37bee4983192451a00ed9dd5987e8e856fb09714))
    - build(makefile): add helper to detect linker options ([8782b88](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/8782b8849147aef0e0f8dcf54ec3f2d980acbf50))
    - feat(build): add support for new binutils versions ([1fdc979](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/1fdc9797f32c711c35a8a61a591607c8fa8a5468))
    - **Services**
    - **Errata ABI**
    - feat(errata_abi): errata management firmware interface ([bb9d6fa](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/bb9d6faa41ee9d60fdd310f446870b1dbcc41b03))
    - refactor(errata_abi): factor in non-arm interconnect ([4a001ff](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/4a001ffb68e0a8f306ca84a6c1c3142dff728aa2))
    - fix(cpus): workaround platforms non-arm interconnect ([f718c87](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/f718c8723aca40164340c416a0e9d96a37719fe5))
    - docs(errata_abi): document the errata abi changes ([66dab5c](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/66dab5c69420fc728a74d10a83f0abc0e4c4f756))
    - **Platforms**
    - **FVP**
    - feat(fvp): enable errata management interface ([b8bb1e3](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b8bb1e347e5486583edda32e47af53a43165a3aa))
* Mon Apr 24 2023 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Update to 2.8.6:
    - **Arm**
    - **GIC**
    - **GICv3**
    - fix(gicv3): workaround for NVIDIA erratum T241-FABRIC-4 ([2e48284](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/2e48284c8b5a4cf28779a30fd60d99650928865e))
    - **Bootloader Images**
    - **BL32**
    - **TSP**
    - fix(tsp): use verbose for power logs ([6cc8ca9](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/6cc8ca93a905cfdc791ab7a7d2b8d6c366b5705e))
  - Skipped 2.8.5:
    - **Libraries**
    - **CPU Support**
    - refactor(cpus): shorten errata flag defines ([e31060c](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/e31060c472cd53ce5a21a5ce19cd663a3fd79ec3))
    - fix(cpus): workaround for Cortex-A78C erratum 1827430 ([14bb756](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/14bb7567d5e9805e5287651eeec5aa95cae40432))
    - fix(cpus): workaround for Cortex-A78C erratum 1827440 ([330095f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/330095fa4a2695bac85fd12e0017090d9ebb633f))
  - Skipped 2.8.4:
    - **Libraries**
    - **CPU Support**
    - fix(cpus): workaround for Neoverse V1 errata 2743233 ([08a0f6a](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/08a0f6acaa327b0de868a2fdff9fcdf5880de9db))
  - Skipped 2.8.3:
    - **Libraries**
    - **CPU Support**
    - fix(cpus): workaround for Cortex-A78 erratum 2742426 ([a307605](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/a30760567eacce2b384ba072050eae4a422a5e9f))
    - fix(cpus): workaround for Cortex-A78C erratum 2779484 ([48f38bc](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/48f38bcb0465719a502d98bc04efe69553b3cb22))
    - **Dependencies**
    - **Compiler runtime libraries**
    - fix(deps): add missing aeabi_memset.S ([0aae8a3](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/0aae8a34b3ca8ed0885166cb5bf6af67bc91c5fa))
  - Skipped 2.8.2:
    - **Platforms**
    - **Xilinx**
    - **ZynqMP**
    - fix(zynqmp): enable A53 workaround(errata 1530924) ([3c5ba11ca] (https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/3c5ba11ca800e41e36ea97b696cd3ce9c64d5412)))
  - Skipped 2.8.1:
    - **Libraries**
    - **el3_runtime**
    - Revert "fix(el3_runtime): allow SErrors when executing in EL3" ([51120a499](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/51120a499ee7682ce659e613e197597e9376aae7))
  - Skipped 2.8.0:
    - **Libraries**
    - **C Standard Library**
    - fix(libc): properly define SCHAR_MIN ([33d7e301f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/33d7e301f74059b12b606cfc54afd48a9ad26b4a))
    - **CPU Support**
    - fix(cpus): workaround for Cortex-A510 erratum 2684597 ([a40d9559b](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/a40d9559b2f104923dc01c74dcdd4ac06b85adef))
    - fix(cpus): workaround for Cortex-A78C erratum 2772121 ([b33ea1e3e](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b33ea1e3e91430d03d4328f1c7c094af7622ff2d))
    - fix(cpus): workaround for Neoverse V1 errata 2779461 ([c06124dad](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/c06124dadc10a4cdc63772483921810dbc3f4b95))
    - fix(cpus): workaround for Cortex-A78 erratum 2779479 ([5a25a70fb](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/5a25a70fb67f56be5f3ebed3d4234bb3b8120181))
    - fix(cpus): workaround for Cortex-X2 erratum 2282622 ([209b8ccd7](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/209b8ccd772d3b94b30b731bd85da1c3ecd0ecdb))
    - fix(cpus): workaround for Cortex-A710 erratum 2282622 ([a9f7a50d3](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/a9f7a50d30598d2bd7f3d048930e54c520adc69f))
    - fix(cpus): workaround for Neoverse V1 erratum 2743093 ([b7f723e55](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b7f723e55f52f693e6517120bd016d56f0cdb80c))
    - fix(cpus): workaround for Cortex-A78 erratum 2772019 ([3a8011088](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/3a80110887ed752b0c6e5b4f0d59bd6d40f4bb24))
    - fix(cpus): workaround for Neoverse N2 erratum 2743089 ([b0b654f90](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/b0b654f908df85133e9d8cbbe252cf7f48dd883c))
    - fix(cpus): workaround for Cortex-X2 erratum 2768515 ([262bb3a22](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/262bb3a223bed377603ac756fef8d685fad016ef))
    - fix(cpus): workaround for Cortex-A710 erratum 2768515 ([c90daab3f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/c90daab3f0029867f7d1b419dcb72961bdfaea9d))
    - fix(cpus): workaround for Cortex-X3 erratum 2615812 ([bcdd5152d](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/bcdd5152dc6c0496d25e936f3af4416dab1d32bc))
    - **el3_runtime**
    - fix(el3_runtime): allow SErrors when executing in EL3 ([327f4bb0c](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/327f4bb0cf2035ee46f0753429a43fd4c97a5d98))
    - fix(el3_runtime): restore SPSR/ELR/SCR after esb ([f06ba4a21](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/f06ba4a2137000e87f1ec77eef054d3ac1706d84))
    - **Miscellaneous**
    - **Debug**
    - fix(console): fix crash on spin_unlock with cache disabled ([cede543e2](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/cede543e29d7110adfd99427f35858e6a81cb596))
    - **Platforms**
    - **Arm**
    - **CSS**
    - fix(plat/css): fix invalid redistributor poweroff ([1432d4b86](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/1432d4b86ea11160d211470a15cdcdc1e36bb0fb))
    - **ST**
    - fix(st): include utils.h to solve compilation error ([06d5116f2](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/06d5116f29bcffef89ae3190bb4df3043cb91cf8))
    - **Intel**
    - fix(intel): fix fcs_client crashed when increased param size ([2b2eaf1d9](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/2b2eaf1d96255f5e56cf8469e98ee77631b0bcda))
    - **Layerscape**
    - fix(layerscape): unlock write access SMMU_CBn_ACTLR ([40b90a9c4](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/40b90a9c4ce8a7f131ea65edb549d8f0160a5999))
    - fix(layerscape): fix errata a008850 ([61cc890d7](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/61cc890d715e6d388ed15ba9cb1a5a8c66ded6c3))
    - **LX2**
    - feat(lx2): enable OCRAM ECC ([1c65e8798](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/1c65e8798b5be2a2ac7f3aaa410e02f7fc4b29ad))
    - feat(lx2): support more variants ([fa8a6d76f](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/fa8a6d76ffe03647676f12740fce5a2ed3735616))
    - fix(lx2): init global data before using it ([fd857216e](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/fd857216e5e7bec268579f4999b9c23dd7c1cfac))
    - **NXP**
    - fix(nxp-drivers): fix tzc380 memory regions config ([4b654f4b4](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/4b654f4b47267469426a3f77ad0981a1063ebf24))
    - fix(nxp-ddr): apply Max CDD values for warm boot ([1414e0add](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/1414e0adda7fdfa4405412c6328d52371e1e376a))
    - fix(nxp-ddr): use CDDWW for write to read delay ([8047151ab](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/8047151ab249c9f900132486c17d5bdf39d7ca51))
    - **ls1046a**
    - fix(ls1046a): 4 keys secureboot failure resolved ([ff8694041](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/ff8694041010045e3fcafe57aed0fbbe236d2cf5))
    - **Security**
    - docs(security): security advisory for CVE-2022-47630 ([084d29c26](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/084d29c2654f0717129aac116adb644df9a8387c))
    - fix(auth): properly validate X.509 extensions ([a89b1f193](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/a89b1f19303add7971828546f922bb9f889dae87))
    - fix(auth): avoid out-of-bounds read in auth_nvctr() ([187e79427](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/187e79427dd09ae4b47128aa17975dc1310453bc))
    - fix(auth): require at least one extension to be present ([379183edc](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/379183edc4d34e513678f652703b890c1db95d3b))
    - fix(auth): forbid junk after extensions ([609437cbf](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/609437cbf591d77050d4a4e2de4e0c322d71706e))
    - **Tools**
    - fix(sptool): add dependency to SP image ([9e01aedd4](https://review.trustedfirmware.org/plugins/gitiles/TF-A/trusted-firmware-a/+/9e01aedd4359311169f4e472240314db8494d251))
* Mon Apr 03 2023 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Add fvp platform
* Thu Jan 12 2023 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Disable debug build on sun50i_a64 as it is too big
* Tue Jan 10 2023 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Update to version 2.8:
    * changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.md
* Tue Jan 10 2023 Oscar Curero <oscar@naiandei.net>
  - Add sun50i_h616 flavor for OrangePi Zero2
* Mon Nov 21 2022 Michal Suchanek <msuchanek@suse.com>
  - Add --no-warn-rwx-segment always, the problem is not specific to Tumbleweed.
* Tue Aug 30 2022 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Add --no-warn-rwx-segment to LDFLAGS on Tumbleweed, as a
    workaround for binutils 2.39
    See https://developer.trustedfirmware.org/T996
* Mon Aug 29 2022 Michal Suchanek <msuchanek@suse.com>
  - Workaround for gcc 7 constant assigment error (boo#1202477).
    + Workaround-gcc-7-constant-assignment-error.patch
* Wed Aug 17 2022 Michal Suchanek <msuchanek@suse.com>
  - Do not disable build on Leap
  - Fix build on Tumbleweed
* Wed Jul 13 2022 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Fix build of zynqmp with gcc7 (Leap 15.4)
* Fri Jul 08 2022 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Update to version 2.7:
    * changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.md
  - Drop usptream patches:
    0001-docs-security-security-advisory-for-CVE-2022-23960.patch
    0002-fix-security-workaround-for-CVE-2022-23960.patch
    0003-refactor-el3-runtime-change-Cortex-A76-implementatio.patch
    0004-fix-security-loop-workaround-for-CVE-2022-23960-for-.patch
    0005-fix-security-workaround-for-CVE-2022-23960-for-Corte.patch
    0006-fix-security-SMCCC_ARCH_WORKAROUND_3-mitigations-for.patch
* Fri Jul 01 2022 Michal Suchanek <msuchanek@suse.com>
  - rockchip: rk3399: Align default baudrate with u-boot (boo#1201096).
    * rockchip-rk3399-Align-default-baudrate-with-u-boot.patch
* Thu May 19 2022 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Add "--param=min-pagesize=0" to CFLAGS as a workaround for
    GCC12 bug: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105523
  - Add a patch to add "--param=min-pagesize=0" for
    mv-ddr-marvell-armada since it does not use CFLAGS:
    * fix-mv-ddr-marvell-armada.patch
  - Fix bug on A3700 flavor found by GCC12:
    * fix-a3700_tool.patch
* Fri Mar 18 2022 Ivan Ivanov <ivan.ivanov@suse.com>
  - Backport fallowing patches mitigating CVE-2022-23960 [1] and [2].
    0001-docs-security-security-advisory-for-CVE-2022-23960.patch
    0002-fix-security-workaround-for-CVE-2022-23960.patch
    0003-refactor-el3-runtime-change-Cortex-A76-implementatio.patch
    0004-fix-security-loop-workaround-for-CVE-2022-23960-for-.patch
    0005-fix-security-workaround-for-CVE-2022-23960-for-Corte.patch
    0006-fix-security-SMCCC_ARCH_WORKAROUND_3-mitigations-for.patch
    Fixes bsc#1196657
    [1] https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-9.html
    [2] https://review.trustedfirmware.org/q/topic:"spectre_bhb"
* Tue Feb 08 2022 Matwey Kornilov <matwey.kornilov@gmail.com>
  - Update A3700-utils-marvell version:
    Fix build SATA bootloader for A3700 boards
    Drop fix-A3700-gcc11.patch: upstreamed
    Enable %fdupes which is particularly useful for a3700 flavour
* Wed Feb 02 2022 Stefan Weiberg <sweiberg@suse.com>
  - ExclusiveArch got overwritten, using else branches instead as
    SLE 15 SP4 continued to build excluded flavours
    (related to bsc#1193779 and bsc#1195129)
* Mon Jan 31 2022 Stefan Weiberg <sweiberg@suse.com>
  - Fixing the if statement to disable some targets on SLE 15 SP4, as
    the prior change resulted in the packages being built on other
    architectures than aarch64 on SLE 15 SP4
    (related to bsc#1193779 and bsc#1195129)
* Fri Jan 28 2022 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Disable some targets on SLE15-SP4 because of missing deps in SLE:
    a3700, hikey, hikey960, imx8qm, imx8qx, rk3399
    Fixes bsc#1193779 and bsc#1195129
* Fri Jan 14 2022 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Add qemu_sbsa flavor
* Thu Jan 06 2022 Ivan Ivanov <ivan.ivanov@suse.com>
  - Auto install on RPi4
* Fri Dec 10 2021 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Update to version 2.6:
    * changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.md
  - Update mv-ddr-marvell-armada-atf-master to latest version
  - Drop upstreamed patch:
    * atf-2411053.diff
  - Add patch to allow to use non-git checkouts:
    * atf-allow-non-git-dir.patch
* Tue Jul 06 2021 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Update mv-ddr-marvell to use master branch as upstream recommends
    This fixes build of a80x0_mcbin
  - Update A3700-utils-marvell to use master branch as upstream recommends
  - Re-enable A3700 tools with patch:
    * fix-A3700-gcc11.patch
  - And refresh patch:
    * A3700_utils-drop-git.patch
* Thu Jun 10 2021 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Disable A3700 tools until fixed upstream:
    https://github.com/MarvellEmbeddedProcessors/A3700-utils-marvell/issues/22
* Thu Jun 03 2021 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Fix rk3399 build:
    * atf-2411053.diff
* Thu May 20 2021 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Update to version 2.5:
    * changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.rst#version-25
* Fri Dec 11 2020 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Update to version 2.4:
    * changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.rst#n7
  - Replace mv-ddr-marvell-armada-atf-mainline.tar.gz with
    mv-ddr-marvell-mv-ddr-devel.tar.gz to match the upstream requirements
  - Drop upstream patch:
    * mv-ddr.diff
* Sat Oct 17 2020 Andreas Färber <afaerber@suse.de>
  - Fix BUILD_MESSAGE_TIMESTAMP (don't try parsing deleted .changes)
  - Clean up rpi4 build
  - Drop comments to avoid RPM errors about %else and %endif end of line
  - Update mv-ddr-marvell from mv_ddr-atf-mainline branch to mv-ddr-devel 14.0.0
    * Add mv-ddr.diff (from d:A:F:Contrib:MacchiatoBin) to fix a warning treated as error
    * Add a _service to clarify its origin and facilitate future updates
  - Update A3700-utils-marvell from armada-18.12 to armada-18.12-fixed branch
    * Drop A3700_utils-TBB-Split-INCDIR-from-LIBDIR.patch (merged)
    * Drop A3700_utils-TBB-Fix-building-for-Crypto-6.0-and-later.patch (merged)
    * Actually apply A3700_utils-drop-git.patch (output cleanup)
  - Build and package A3700 utils as part of -tools (non-noarch, ensure PIE)
  - Build the tools for all architectures again
  - Add binaries-marvell from binaries-marvell-armada-SDK10.0.1.0 branch
  - Add a80x0_mcbin and extend a3700 to build and package all needed files
    * Suppress OP-TEE for now, as it fails to initialize
* Fri Oct 16 2020 Andreas Färber <afaerber@suse.de>
  - Build fixes for a3700 and a80x0_mcbin
* Thu Jul 02 2020 Nicolas Patricio Saenz Julienne <nsaenzjulienne@suse.com>
  - Add rpi4
* Thu Apr 23 2020 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Disable debug on imx8mq to fix build
* Thu Apr 23 2020 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Update to 2.3:
    * Add support for Armv8.4-SecEL2 extension through the SPCI defined SPMD/SPMC components.
    * Build option to support EL2 context save and restore in the secure world (CTX_INCLUDE_EL2_REGS).
    * Add support for SMCCC v1.2 (introducing the new SMCCC_ARCH_SOC_ID SMC).
      Note that the support is compliant, but the SVE registers save/restore will be done as part of future S-EL2/SPM development.
    * Enhanced BL2 bootloader flow to load secure partitions based on firmware configuration data (fconf).
    * Changes necessary to support SEPARATE_NOBITS_REGION feature
    * TSP and BL2_AT_EL3: Add Position Independent Execution PIE support
    * Enable MTE support
    * Enable Link Time Optimization in GCC
    * Add CPU support:
    - cortex-a57: Enable higher performance non-cacheable load forwarding
    - Hercules: Workaround for Errata 1688305
    - Klein: Support added for Klein CPU
    - Matterhorn: Support added for Matterhorn CPU
    * Full changelog:  https://trustedfirmware-a.readthedocs.io/en/latest/change-log.html#version-2-3
* Sat Feb 01 2020 Matwey Kornilov <matwey.kornilov@gmail.com>
  - Initial implementation for Marvel A3700 platform

Files

/usr/bin/TBB
/usr/bin/WtpDownload
/usr/bin/fiptool


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Mar 9 12:50:11 2024