Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

arm-trusted-firmware-2.6-150400.4.7 RPM for ppc64le

From OpenSuSE Leap 15.4 for ppc64le

Name: arm-trusted-firmware Distribution: SUSE Linux Enterprise 15
Version: 2.6 Vendor: SUSE LLC <https://www.suse.com/>
Release: 150400.4.7 Build date: Sun May 8 00:35:57 2022
Group: System/Boot Build host: mourvedre
Size: 40266 Source RPM: arm-trusted-firmware-2.6-150400.4.7.src.rpm
Packager: https://www.suse.com/
Url: https://www.trustedfirmware.org/
Summary: Arm Trusted Firmware-A
Trusted Firmware-A (TF-A) provides a reference implementation of secure world
software for Armv7-A and Armv8-A, including a Secure Monitor executing at
Exception Level 3 (EL3).

Provides

Requires

License

BSD-3-Clause

Changelog

* Fri Mar 18 2022 ivan.ivanov@suse.com
  - Backport fallowing patches mitigating CVE-2022-23960 [1] and [2].
    0001-docs-security-security-advisory-for-CVE-2022-23960.patch
    0002-fix-security-workaround-for-CVE-2022-23960.patch
    0003-refactor-el3-runtime-change-Cortex-A76-implementatio.patch
    0004-fix-security-loop-workaround-for-CVE-2022-23960-for-.patch
    0005-fix-security-workaround-for-CVE-2022-23960-for-Corte.patch
    0006-fix-security-SMCCC_ARCH_WORKAROUND_3-mitigations-for.patch
    Fixes bsc#1196657
    [1] https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-9.html
    [2] https://review.trustedfirmware.org/q/topic:"spectre_bhb"
* Tue Feb 08 2022 matwey.kornilov@gmail.com
  - Update A3700-utils-marvell version:
    Fix build SATA bootloader for A3700 boards
    Drop fix-A3700-gcc11.patch: upstreamed
    Enable %fdupes which is particularly useful for a3700 flavour
* Wed Feb 02 2022 sweiberg@suse.com
  - ExclusiveArch got overwritten, using else branches instead as
    SLE 15 SP4 continued to build excluded flavours
    (related to bsc#1193779 and bsc#1195129)
* Mon Jan 31 2022 sweiberg@suse.com
  - Fixing the if statement to disable some targets on SLE 15 SP4, as
    the prior change resulted in the packages being built on other
    architectures than aarch64 on SLE 15 SP4
    (related to bsc#1193779 and bsc#1195129)
* Fri Jan 28 2022 guillaume.gardet@opensuse.org
  - Disable some targets on SLE15-SP4 because of missing deps in SLE:
    a3700, hikey, hikey960, imx8qm, imx8qx, rk3399
    Fixes bsc#1193779 and bsc#1195129
* Fri Jan 14 2022 guillaume.gardet@opensuse.org
  - Add qemu_sbsa flavor
* Thu Jan 06 2022 ivan.ivanov@suse.com
  - Auto install on RPi4
* Fri Dec 10 2021 guillaume.gardet@opensuse.org
  - Update to version 2.6:
    * changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.md
  - Update mv-ddr-marvell-armada-atf-master to latest version
  - Drop upstreamed patch:
    * atf-2411053.diff
  - Add patch to allow to use non-git checkouts:
    * atf-allow-non-git-dir.patch
* Tue Jul 06 2021 guillaume.gardet@opensuse.org
  - Update mv-ddr-marvell to use master branch as upstream recommends
    This fixes build of a80x0_mcbin
  - Update A3700-utils-marvell to use master branch as upstream recommends
  - Re-enable A3700 tools with patch:
    * fix-A3700-gcc11.patch
  - And refresh patch:
    * A3700_utils-drop-git.patch
* Thu Jun 10 2021 guillaume.gardet@opensuse.org
  - Disable A3700 tools until fixed upstream:
    https://github.com/MarvellEmbeddedProcessors/A3700-utils-marvell/issues/22
* Thu Jun 03 2021 guillaume.gardet@opensuse.org
  - Fix rk3399 build:
    * atf-2411053.diff
* Thu May 20 2021 guillaume.gardet@opensuse.org
  - Update to version 2.5:
    * changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.rst#version-25
* Fri Dec 11 2020 guillaume.gardet@opensuse.org
  - Update to version 2.4:
    * changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/change-log.rst#n7
  - Replace mv-ddr-marvell-armada-atf-mainline.tar.gz with
    mv-ddr-marvell-mv-ddr-devel.tar.gz to match the upstream requirements
  - Drop upstream patch:
    * mv-ddr.diff
* Sat Oct 17 2020 afaerber@suse.de
  - Fix BUILD_MESSAGE_TIMESTAMP (don't try parsing deleted .changes)
  - Clean up rpi4 build
  - Drop comments to avoid RPM errors about %else and %endif end of line
  - Update mv-ddr-marvell from mv_ddr-atf-mainline branch to mv-ddr-devel 14.0.0
    * Add mv-ddr.diff (from d:A:F:Contrib:MacchiatoBin) to fix a warning treated as error
    * Add a _service to clarify its origin and facilitate future updates
  - Update A3700-utils-marvell from armada-18.12 to armada-18.12-fixed branch
    * Drop A3700_utils-TBB-Split-INCDIR-from-LIBDIR.patch (merged)
    * Drop A3700_utils-TBB-Fix-building-for-Crypto-6.0-and-later.patch (merged)
    * Actually apply A3700_utils-drop-git.patch (output cleanup)
  - Build and package A3700 utils as part of -tools (non-noarch, ensure PIE)
  - Build the tools for all architectures again
  - Add binaries-marvell from binaries-marvell-armada-SDK10.0.1.0 branch
  - Add a80x0_mcbin and extend a3700 to build and package all needed files
    * Suppress OP-TEE for now, as it fails to initialize
* Fri Oct 16 2020 afaerber@suse.de
  - Build fixes for a3700 and a80x0_mcbin
* Thu Jul 02 2020 nsaenzjulienne@suse.com
  - Add rpi4
* Thu Apr 23 2020 guillaume.gardet@opensuse.org
  - Disable debug on imx8mq to fix build
* Thu Apr 23 2020 guillaume.gardet@opensuse.org
  - Update to 2.3:
    * Add support for Armv8.4-SecEL2 extension through the SPCI defined SPMD/SPMC components.
    * Build option to support EL2 context save and restore in the secure world (CTX_INCLUDE_EL2_REGS).
    * Add support for SMCCC v1.2 (introducing the new SMCCC_ARCH_SOC_ID SMC).
      Note that the support is compliant, but the SVE registers save/restore will be done as part of future S-EL2/SPM development.
    * Enhanced BL2 bootloader flow to load secure partitions based on firmware configuration data (fconf).
    * Changes necessary to support SEPARATE_NOBITS_REGION feature
    * TSP and BL2_AT_EL3: Add Position Independent Execution PIE support
    * Enable MTE support
    * Enable Link Time Optimization in GCC
    * Add CPU support:
    - cortex-a57: Enable higher performance non-cacheable load forwarding
    - Hercules: Workaround for Errata 1688305
    - Klein: Support added for Klein CPU
    - Matterhorn: Support added for Matterhorn CPU
    * Full changelog:  https://trustedfirmware-a.readthedocs.io/en/latest/change-log.html#version-2-3
* Sat Feb 01 2020 matwey.kornilov@gmail.com
  - Initial implementation for Marvel A3700 platform
* Thu Oct 24 2019 guillaume.gardet@opensuse.org
  - Switch to _multibuild system
  - Update to 2.2:
    * Enable Pointer Authentication (PAuth) support for Secure World
    - Adds support for ARMv8.3-PAuth in BL1 SMC calls and BL2U
      image for firmware updates.
    * Enable Memory Tagging Extension (MTE) support in both secure
      and non-secure worlds
    - Adds support for the new Memory Tagging Extension arriving
      in ARMv8.5. MTE support is now enabled by default on
      systems that support it at EL0.
    - To enable it at ELx for both the non-secure and the secure
      world, the compiler flag CTX_INCLUDE_MTE_REGS includes
      register saving and restoring when necessary in order to
      prevent information leakage between the worlds.
    * Add support for Branch Target Identification (BTI)
    * Full changelog: https://trustedfirmware-a.readthedocs.io/en/latest/change-log.html#version-2-2
  - Drop upstreamed patches:
    * arm-trusted-firmware_hikey960_race.patch
    * arm-trusted-firmware_poplar_mmc_dma.patch
    * arm-trusted-firmware_zynqmp_ipi.patch
* Wed Sep 04 2019 afaerber@suse.de
  - Add zynqmp
    * arm-trusted-firmware_zynqmp_ipi.patch
* Thu Aug 01 2019 guillaume.gardet@opensuse.org
  - Add initial bits for a80x0_mcbin support for MacchiatoBin
* Sun Jun 16 2019 afaerber@suse.de
  - rpi3: By now building okay with OP-TEE
  - rpi3: Replace dependency on deprecated bootstrap code with U-Boot
  - rpi3: Change installation location (adopted from u-boot-rpi3)
  - poplar: Fix eMMC DMA FIFO breaking U-Boot eMMC access
    (https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/1230)
    arm-trusted-firmware_poplar_mmc_dma.patch
  - poplar: Build for both 2 GiB and 1 GiB boards (b96o#834)
* Sat Jun 08 2019 afaerber@suse.de
  - Add imxmq and imxmm
* Sat Jun 08 2019 afaerber@suse.de
  - Fix build date by escaping %S (which expanded to %SOURCE).
  - hikey960: Avoid a race condition (boo#1134788)
    arm-trusted-firmware_hikey960_race.patch
* Tue Apr 09 2019 guillaume.gardet@opensuse.org
  - Update to v2.1:
    * Add ARMv8.3 pointer authentication in the normal and secure worlds
    * Cortex-Axx workarounds for erratums
    * New platforms
    * Full changelog: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/about/docs/change-log.rst#version-2-1
  - Remove outdated patch:
    * hikey960.diff
* Thu Mar 28 2019 afaerber@suse.de
  - rpi3: Package armstub8.bin, fip.bin, bl1.bin, bl2.bin
* Sun Nov 11 2018 afaerber@suse.de
  - pre_checkin.sh: Fix package names for sun50i_{a64,h6}
* Sun Nov 04 2018 afaerber@suse.de
  - Add imx8qm, imx8qx, sun50i_a64, sun50i_h6
* Sun Nov 04 2018 afaerber@suse.de
  - Update to v2.0
    * Drop upstream patches
    arm-trusted-firmware_cve-2018-3639_smccc_rename.patch
    arm-trusted-firmware_cve-2018-3639_smccc_return.patch
    arm-trusted-firmware_cve-2018-3639_rename.patch
    arm-trusted-firmware_cve-2018-3639_static.patch
    arm-trusted-firmware_cve-2018-3639_static_aarch32.patch
    arm-trusted-firmware_cve-2018-3639_dynamic.patch
    * fip_create wrapper is no longer built (use fiptool instead)
    * Set BL33 for qemu
* Sun Jun 03 2018 afaerber@suse.de
  - Conditionally enable OP-TEE as BL32
* Sun Jun 03 2018 afaerber@suse.de
  - Add rpi3
* Sun Jun 03 2018 afaerber@suse.de
  - Set BUILD_MESSAGE_TIMESTAMP for reproducible builds
  - Simplify tegra packaging, reusing %target_soc
* Fri Jun 01 2018 afaerber@suse.de
  - Address CVE-2018-3639 (bsc#1085308)
    arm-trusted-firmware_cve-2018-3639_smccc_rename.patch
    arm-trusted-firmware_cve-2018-3639_smccc_return.patch
    arm-trusted-firmware_cve-2018-3639_rename.patch
    arm-trusted-firmware_cve-2018-3639_static.patch
    arm-trusted-firmware_cve-2018-3639_static_aarch32.patch
    arm-trusted-firmware_cve-2018-3639_dynamic.patch
* Thu May 31 2018 afaerber@suse.de
  - hikey960.diff: Fix assertion on HiKey 960 (b9o#739)
* Thu May 31 2018 afaerber@suse.de
  - Package bl2 for hikey and hikey960
* Mon May 21 2018 afaerber@suse.de
  - Add tegra186
* Mon May 21 2018 afaerber@suse.de
  - Package poplar_layout.h header for l-loader in devel package
* Sun May 20 2018 afaerber@suse.de
  - Build recovery version of poplar, too
* Sun May 20 2018 afaerber@suse.de
  - Adopt %license
  - Add poplar
  - Prepare tegra186
* Sun May 20 2018 afaerber@suse.de
  - Update to v1.5
    * Dropped upstream patches:
    arm-trusted-firmware_pie_1.patch
    arm-trusted-firmware_pie_2.patch
    arm-trusted-firmware_fiptool_pad.patch
    arm-trusted-firmware_fiptool_pad_useafterfree.patch
    arm-trusted-firmware_fiptool_pad_hikey.patch
    arm-trusted-firmware_fiptool_pad_hikey960.patch
    arm-trusted-firmware_cve-2017-5715_a57_a72.patch
    arm-trusted-firmware_cve-2017-5715_a73_a75.patch
    arm-trusted-firmware_cve-2017-5715_pfr0.patch
    arm-trusted-firmware_cve-2017-5715_errata_format.patch
    arm-trusted-firmware_cve-2017-5715_errata_output.patch
    arm-trusted-firmware_cve-2017-5715_platforms.patch
    arm-trusted-firmware_cve-2017-5715_bpiall.patch
    arm-trusted-firmware_cve-2017-5715_smccc.patch
    arm-trusted-firmware_cve-2017-5715_psci.patch
    arm-trusted-firmware_cve-2017-5715_runtime_exceptions.patch
    arm-trusted-firmware_cve-2017-5715_smccc_v1.1.patch
* Sat Feb 10 2018 afaerber@suse.de
  - Apply fiptool patches to tools package, too (b9o#633)
  - Prepare for detecting PIE support (gh#ARM-software/tf-issues#519)
    arm-trusted-firmware_pie_1.patch
    arm-trusted-firmware_pie_2.patch
* Sat Feb 10 2018 afaerber@suse.de
  - Implement SMCCC v1.1 (bsc#1074741)
    arm-trusted-firmware_cve-2017-5715_platforms.patch
    arm-trusted-firmware_cve-2017-5715_bpiall.patch
    arm-trusted-firmware_cve-2017-5715_smccc.patch
    arm-trusted-firmware_cve-2017-5715_psci.patch
    arm-trusted-firmware_cve-2017-5715_runtime_exceptions.patch
    arm-trusted-firmware_cve-2017-5715_smccc_v1.1.patch
* Sat Jan 27 2018 afaerber@suse.de
  - Pad HiKey FIP to avoid hanging fastboot transfer (b9o#633)
    arm-trusted-firmware_fiptool_pad.patch
    arm-trusted-firmware_fiptool_pad_useafterfree.patch
    arm-trusted-firmware_fiptool_pad_hikey.patch
    arm-trusted-firmware_fiptool_pad_hikey960.patch
* Sat Jan 27 2018 afaerber@suse.de
  - Add CVE-2017-5715 output (bsc#1074741)
    arm-trusted-firmware_cve-2017-5715_errata_format.patch
    arm-trusted-firmware_cve-2017-5715_errata_output.patch
* Mon Jan 22 2018 afaerber@suse.de
  - Use debug builds
* Fri Jan 12 2018 afaerber@suse.de
  - rk3399: Don't require cross binutils (let cross gcc choose which)
* Fri Jan 12 2018 afaerber@suse.de
  - hikey960: Build fip and require EDK2 for SCP_BL2 and BL33
  - Refresh CVE-2017-5715 patches (bsc#1074741)
    Drop arm-trusted-firmware_cve-2017-5715_ic_iallu.patch
    Add arm-trusted-firmware_cve-2017-5715_pfr0.patch
  - Suppress debuginfo for firmware
* Sun Jan 07 2018 afaerber@suse.de
  - Make noarch so that it can be exported
* Sun Jan 07 2018 afaerber@suse.de
  - hikey: Build fip and require EDK2 for SCP_BL2
  - Add tegra210
* Sun Jan 07 2018 afaerber@suse.de
  - Add hikey960
* Sun Jan 07 2018 afaerber@suse.de
  - Add hikey
  - Clean up pre_checkin.sh
  - Don't package bl31.bin for Rockchip, we need bl31.elf only
* Fri Jan 05 2018 afaerber@suse.de
  - Require arm-none gcc for RK3399
* Fri Jan 05 2018 afaerber@suse.de
  - Address CVE-2017-5715 (bsc#1074741)
    arm-trusted-firmware_cve-2017-5715_a57_a72.patch
    arm-trusted-firmware_cve-2017-5715_a73_a75.patch
    arm-trusted-firmware_cve-2017-5715_ic_iallu.patch
* Wed Jan 03 2018 matwey.kornilov@gmail.com
  - Return lost doc files
* Tue Jan 02 2018 matwey.kornilov@gmail.com
  - Package bl31.elf
* Tue Jan 02 2018 matwey.kornilov@gmail.com
  - acknowledgements.md renamed to acknowledgements.rst
* Thu Dec 28 2017 matwey.kornilov@gmail.com
  - Version 1.4
* Mon Dec 26 2016 afaerber@suse.de
  - Update to v1.3 final
* Sat Oct 08 2016 afaerber@suse.de
  - Initial

Files

/usr/share/doc/packages/arm-trusted-firmware
/usr/share/doc/packages/arm-trusted-firmware/acknowledgements.rst
/usr/share/doc/packages/arm-trusted-firmware/contributing.rst
/usr/share/doc/packages/arm-trusted-firmware/dco.txt
/usr/share/doc/packages/arm-trusted-firmware/maintainers.rst
/usr/share/doc/packages/arm-trusted-firmware/readme.rst
/usr/share/licenses/arm-trusted-firmware
/usr/share/licenses/arm-trusted-firmware/license.rst


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Mar 9 16:49:08 2024