Message ID | 20240407103512.1112712-3-romain.naour@smile.fr |
---|---|
State | Accepted |
Headers | show |
Series | Add support for AM62x-SK HS-FS devices | expand |
On 07/04/2024 12:34, Romain Naour wrote: > We are going to enable BR2_DOWNLOAD_FORCE_CHECK_HASHES by default > to enforce downloads to have at least one valid hash including > those that use a custom version. If we switch to BR2_TARGET_ARM_TRUSTED_FIRMWARE_LATEST_LTS_2_8_VERSION then this custom hash isn't needed any more. Regards, Arnout > > Signed-off-by: Romain Naour <romain.naour@smile.fr> > --- > .../patches/arm-trusted-firmware/arm-trusted-firmware.hash | 2 ++ > .../patches/arm-trusted-firmware/arm-trusted-firmware.hash | 2 ++ > 2 files changed, 4 insertions(+) > create mode 100644 board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash > create mode 100644 board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash > > diff --git a/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash b/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash > new file mode 100644 > index 0000000000..74fe35c9bc > --- /dev/null > +++ b/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash > @@ -0,0 +1,2 @@ > +# Locally computed: > +sha256 327c65b1bc231608a7a808b068b00c1a22310e9fc86158813cd10a9711d5725e arm-trusted-firmware-v2.7.tar.gz > diff --git a/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash b/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash > new file mode 100644 > index 0000000000..74fe35c9bc > --- /dev/null > +++ b/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash > @@ -0,0 +1,2 @@ > +# Locally computed: > +sha256 327c65b1bc231608a7a808b068b00c1a22310e9fc86158813cd10a9711d5725e arm-trusted-firmware-v2.7.tar.gz
Hello Arnout, Le 07/04/2024 à 21:53, Arnout Vandecappelle a écrit : > > > On 07/04/2024 12:34, Romain Naour wrote: >> We are going to enable BR2_DOWNLOAD_FORCE_CHECK_HASHES by default >> to enforce downloads to have at least one valid hash including >> those that use a custom version. > > If we switch to BR2_TARGET_ARM_TRUSTED_FIRMWARE_LATEST_LTS_2_8_VERSION then > this custom hash isn't needed any more. Indeed, but with the upcoming new TI K3 SoC support the atf v2.8 may already too old. I would suggest to sync the ATF version with the one used by meta-ti (currently v2.10) as much as possible. ATF is using the TI-SCI (TI System Controller Interface) to communicate with SoC firmware. https://software-dl.ti.com/tisci/esd/latest/1_intro/TISCI.html Best regards, Romain > > Regards, > Arnout > >> >> Signed-off-by: Romain Naour <romain.naour@smile.fr> >> --- >> .../patches/arm-trusted-firmware/arm-trusted-firmware.hash | 2 ++ >> .../patches/arm-trusted-firmware/arm-trusted-firmware.hash | 2 ++ >> 2 files changed, 4 insertions(+) >> create mode 100644 >> board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash >> create mode 100644 >> board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash >> >> diff --git >> a/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash >> b/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash >> new file mode 100644 >> index 0000000000..74fe35c9bc >> --- /dev/null >> +++ b/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash >> @@ -0,0 +1,2 @@ >> +# Locally computed: >> +sha256 327c65b1bc231608a7a808b068b00c1a22310e9fc86158813cd10a9711d5725e >> arm-trusted-firmware-v2.7.tar.gz >> diff --git >> a/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash >> b/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash >> new file mode 100644 >> index 0000000000..74fe35c9bc >> --- /dev/null >> +++ b/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash >> @@ -0,0 +1,2 @@ >> +# Locally computed: >> +sha256 327c65b1bc231608a7a808b068b00c1a22310e9fc86158813cd10a9711d5725e >> arm-trusted-firmware-v2.7.tar.gz
diff --git a/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash b/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash new file mode 100644 index 0000000000..74fe35c9bc --- /dev/null +++ b/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash @@ -0,0 +1,2 @@ +# Locally computed: +sha256 327c65b1bc231608a7a808b068b00c1a22310e9fc86158813cd10a9711d5725e arm-trusted-firmware-v2.7.tar.gz diff --git a/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash b/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash new file mode 100644 index 0000000000..74fe35c9bc --- /dev/null +++ b/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash @@ -0,0 +1,2 @@ +# Locally computed: +sha256 327c65b1bc231608a7a808b068b00c1a22310e9fc86158813cd10a9711d5725e arm-trusted-firmware-v2.7.tar.gz
We are going to enable BR2_DOWNLOAD_FORCE_CHECK_HASHES by default to enforce downloads to have at least one valid hash including those that use a custom version. Signed-off-by: Romain Naour <romain.naour@smile.fr> --- .../patches/arm-trusted-firmware/arm-trusted-firmware.hash | 2 ++ .../patches/arm-trusted-firmware/arm-trusted-firmware.hash | 2 ++ 2 files changed, 4 insertions(+) create mode 100644 board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash create mode 100644 board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash