diff mbox series

[v12,02/16] board/ti/am6{2, 4}x-sk: add arm-trusted-firmware v2.7 hash

Message ID 20240407103512.1112712-3-romain.naour@smile.fr
State Accepted
Headers show
Series Add support for AM62x-SK HS-FS devices | expand

Commit Message

Romain Naour April 7, 2024, 10:34 a.m. UTC
We are going to enable BR2_DOWNLOAD_FORCE_CHECK_HASHES by default
to enforce downloads to have at least one valid hash including
those that use a custom version.

Signed-off-by: Romain Naour <romain.naour@smile.fr>
---
 .../patches/arm-trusted-firmware/arm-trusted-firmware.hash      | 2 ++
 .../patches/arm-trusted-firmware/arm-trusted-firmware.hash      | 2 ++
 2 files changed, 4 insertions(+)
 create mode 100644 board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
 create mode 100644 board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash

Comments

Arnout Vandecappelle April 7, 2024, 7:53 p.m. UTC | #1
On 07/04/2024 12:34, Romain Naour wrote:
> We are going to enable BR2_DOWNLOAD_FORCE_CHECK_HASHES by default
> to enforce downloads to have at least one valid hash including
> those that use a custom version.

  If we switch to BR2_TARGET_ARM_TRUSTED_FIRMWARE_LATEST_LTS_2_8_VERSION then 
this custom hash isn't needed any more.

  Regards,
  Arnout

> 
> Signed-off-by: Romain Naour <romain.naour@smile.fr>
> ---
>   .../patches/arm-trusted-firmware/arm-trusted-firmware.hash      | 2 ++
>   .../patches/arm-trusted-firmware/arm-trusted-firmware.hash      | 2 ++
>   2 files changed, 4 insertions(+)
>   create mode 100644 board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
>   create mode 100644 board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
> 
> diff --git a/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash b/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
> new file mode 100644
> index 0000000000..74fe35c9bc
> --- /dev/null
> +++ b/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
> @@ -0,0 +1,2 @@
> +# Locally computed:
> +sha256  327c65b1bc231608a7a808b068b00c1a22310e9fc86158813cd10a9711d5725e  arm-trusted-firmware-v2.7.tar.gz
> diff --git a/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash b/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
> new file mode 100644
> index 0000000000..74fe35c9bc
> --- /dev/null
> +++ b/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
> @@ -0,0 +1,2 @@
> +# Locally computed:
> +sha256  327c65b1bc231608a7a808b068b00c1a22310e9fc86158813cd10a9711d5725e  arm-trusted-firmware-v2.7.tar.gz
Romain Naour April 9, 2024, 11:35 a.m. UTC | #2
Hello Arnout,

Le 07/04/2024 à 21:53, Arnout Vandecappelle a écrit :
> 
> 
> On 07/04/2024 12:34, Romain Naour wrote:
>> We are going to enable BR2_DOWNLOAD_FORCE_CHECK_HASHES by default
>> to enforce downloads to have at least one valid hash including
>> those that use a custom version.
> 
>  If we switch to BR2_TARGET_ARM_TRUSTED_FIRMWARE_LATEST_LTS_2_8_VERSION then
> this custom hash isn't needed any more.

Indeed, but with the upcoming new TI K3 SoC support the atf v2.8 may already too
old. I would suggest to sync the ATF version with the one used by meta-ti
(currently v2.10) as much as possible.

ATF is using the TI-SCI (TI System Controller Interface) to communicate with SoC
firmware.

https://software-dl.ti.com/tisci/esd/latest/1_intro/TISCI.html

Best regards,
Romain


> 
>  Regards,
>  Arnout
> 
>>
>> Signed-off-by: Romain Naour <romain.naour@smile.fr>
>> ---
>>   .../patches/arm-trusted-firmware/arm-trusted-firmware.hash      | 2 ++
>>   .../patches/arm-trusted-firmware/arm-trusted-firmware.hash      | 2 ++
>>   2 files changed, 4 insertions(+)
>>   create mode 100644
>> board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
>>   create mode 100644
>> board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
>>
>> diff --git
>> a/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
>> b/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
>> new file mode 100644
>> index 0000000000..74fe35c9bc
>> --- /dev/null
>> +++ b/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
>> @@ -0,0 +1,2 @@
>> +# Locally computed:
>> +sha256  327c65b1bc231608a7a808b068b00c1a22310e9fc86158813cd10a9711d5725e 
>> arm-trusted-firmware-v2.7.tar.gz
>> diff --git
>> a/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
>> b/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
>> new file mode 100644
>> index 0000000000..74fe35c9bc
>> --- /dev/null
>> +++ b/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
>> @@ -0,0 +1,2 @@
>> +# Locally computed:
>> +sha256  327c65b1bc231608a7a808b068b00c1a22310e9fc86158813cd10a9711d5725e 
>> arm-trusted-firmware-v2.7.tar.gz
diff mbox series

Patch

diff --git a/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash b/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
new file mode 100644
index 0000000000..74fe35c9bc
--- /dev/null
+++ b/board/ti/am62x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
@@ -0,0 +1,2 @@ 
+# Locally computed:
+sha256  327c65b1bc231608a7a808b068b00c1a22310e9fc86158813cd10a9711d5725e  arm-trusted-firmware-v2.7.tar.gz
diff --git a/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash b/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
new file mode 100644
index 0000000000..74fe35c9bc
--- /dev/null
+++ b/board/ti/am64x-sk/patches/arm-trusted-firmware/arm-trusted-firmware.hash
@@ -0,0 +1,2 @@ 
+# Locally computed:
+sha256  327c65b1bc231608a7a808b068b00c1a22310e9fc86158813cd10a9711d5725e  arm-trusted-firmware-v2.7.tar.gz