From patchwork Wed Mar 20 16:13:37 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Alex_Benn=C3=A9e?= X-Patchwork-Id: 781378 Delivered-To: patch@linaro.org Received: by 2002:adf:cf01:0:b0:33e:7753:30bd with SMTP id o1csp387920wrj; Wed, 20 Mar 2024 09:14:42 -0700 (PDT) X-Forwarded-Encrypted: i=2; AJvYcCUlZGTUZbASsAIPKXWcqktlpWAaMxwgcQeJ+eqZkvCgm9s/tgUJ42mlUPTE5Vj3/rGdJDhpyuwaTy/uCZXFsDUP X-Google-Smtp-Source: AGHT+IFpsTaaJ9+9el0YpKy5p7I3CpAD506vF8DgZ9a7rjR7OGTFYMOclVadPT7fCwczja+Q+R8U X-Received: by 2002:a05:620a:5e0f:b0:789:f0e3:d8a9 with SMTP id xz15-20020a05620a5e0f00b00789f0e3d8a9mr216401qkn.13.1710951281948; Wed, 20 Mar 2024 09:14:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1710951281; cv=none; d=google.com; s=arc-20160816; b=mk2WCf3sVRDqkrBd8/wnioa1pbdJT5FoJMtWEUa1SquBDItl1aAbXM46EzAbHouSIO jUe0lLYvrV44A6zUaMMCLRp9lXA+4F//vktmBVk3eKyZBiUwNB/lF4Ra3l8KhkeamNLv uKjHZv0zvY9DJj5QvfL0LQ3Soy+JOUDrhEpc4Bs0qRkDOPkB1xFNoFnXfqtZggceHMyo Bd2bwXzJYpv6XRaH//LIcq9AtNy299diLqpc+hd455W21oz0eT806bqG7Xay3SZYbHbA Y+O3k+n4QaZwzH8/xPp1iOB1u+I/Nn7Nr8qS80Cop64Hj9n8xmcP8CeQe0XM2JgprQQ8 Sdfw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=XT2fjAt/fMm7dCx4w3sQ31zoFoyy4ckvjlYypijIbGY=; fh=6U2J5omtyhaqLcqmFSctHI6Cv/ER2BdjCLTdVvmd0gE=; b=nNNFz9KWB+pVHTPcsbalpDJMvlCBSViPLwYtHYbXtg0pF/eGTcE7rhPyFqqIV3p0jn pBPqJTTAAz+2O+Z6tocxgrHU6mTd0kgaggYM0wuxPMmZnApsn0MY/mHwgqbDxFAyvWnY 0UJ1pF6xuTWJl7z0ewiIJPYnPdR05mXdkORJIg1BGuS2DyrCk3/nCDGZORbvmUCXONIS iM+S/S40qNYRLRy9d8vTZFiN3u3LCVY/ndiE/W0dnS/0vbOTjrF/UNQEk343IogpICx1 dkelEULbqHaZSNDZ4J8Abab0CkoD8Ogs+HTja4IdE+gDeSkqhqhrtw5LEQhuKqO3Gw2P Q4TQ==; dara=google.com ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=pUg270RY; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lists.gnu.org (lists.gnu.org. [209.51.188.17]) by mx.google.com with ESMTPS id c2-20020a05620a134200b00786fe4117fcsi10763107qkl.388.2024.03.20.09.14.41 for (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Wed, 20 Mar 2024 09:14:41 -0700 (PDT) Received-SPF: pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=pUg270RY; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1rmyZt-00033A-E2; Wed, 20 Mar 2024 12:14:10 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1rmyZb-00030t-F6 for qemu-devel@nongnu.org; Wed, 20 Mar 2024 12:13:51 -0400 Received: from mail-ed1-x52c.google.com ([2a00:1450:4864:20::52c]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1rmyZU-00035Q-Ch for qemu-devel@nongnu.org; Wed, 20 Mar 2024 12:13:51 -0400 Received: by mail-ed1-x52c.google.com with SMTP id 4fb4d7f45d1cf-56b93b45779so2980372a12.1 for ; Wed, 20 Mar 2024 09:13:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1710951222; x=1711556022; darn=nongnu.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=XT2fjAt/fMm7dCx4w3sQ31zoFoyy4ckvjlYypijIbGY=; b=pUg270RY0q+8XL9rqsSA+epnm9vBmgBDcdyCdHOabKH30E6zZ/5Ie+r1E83gljqMzy R87fxWNtkkY7p3dqOnJQsPMj55F06efKgLTWysjTMX8puMlActB9wpaqym5O9ZHOXptd FYsble5TqTZTb1oJVhlqcvz592qSgxdRjXTbl7W4CpjB7G2wrTm6SMtJ2nh2SLBa1vK4 fQoLUKHq4LJYipA0OJKWJZczrqL4TQkcLoyXAJJQMk6Kayv9u70Q+QiGaOIItPScvWNj +IkcvYEX/M9A/7N+SympkIJJmHkW9yIg1wlEH5GSx/988lol7iUijIYfujpCUybma9Bs s72g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1710951222; x=1711556022; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=XT2fjAt/fMm7dCx4w3sQ31zoFoyy4ckvjlYypijIbGY=; b=jBIC/C7l76L75b5+cbauNuM/7JLsOl8tajwMVJYpx3gM+9viMjr0fV4Sdz7TLJHAlK 6/rVyJH3euRZatEp3BfMkwxUA6FIvJg6lyniZZfnG44Q3Zp6R/H2bzdWgxVb9Pka2YUT UjmiQ9nKMgPFh9z2Hn99VpU49ZBhxjr2h8kSRuerB0jvUSSmqu6aPfNjroi9AIMDOz/1 aEoskUH57PG1n3EQ8ggQIu1YMLTbA7ilL+nXpjHVhSXRaljvQwITmhrEBThkerdKw1zB CQUFzyi8dgmeTCeDu3vnCq7miGkx/JqD0hpFXSXHrGwRMO5FgggPek47ENxDfZsApF6F 8K3g== X-Gm-Message-State: AOJu0Yye9BJbFVf+Vj04QDigkei2Eg0aciqOkVntolGOQAGXGVHxhb78 W891eUh+CWdZ0NNQb0IRk1NDMGCVrXV55uG8BfinZWVU/wirZGl1E8BA5b7350c= X-Received: by 2002:a17:907:1b03:b0:a46:e51a:466e with SMTP id mp3-20020a1709071b0300b00a46e51a466emr4393621ejc.64.1710951222311; Wed, 20 Mar 2024 09:13:42 -0700 (PDT) Received: from draig.lan ([85.9.250.243]) by smtp.gmail.com with ESMTPSA id e25-20020a170906845900b00a449026672esm7463987ejy.81.2024.03.20.09.13.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 Mar 2024 09:13:41 -0700 (PDT) Received: from draig.lan (localhost [IPv6:::1]) by draig.lan (Postfix) with ESMTP id 29FF55F8F1; Wed, 20 Mar 2024 16:13:41 +0000 (GMT) From: =?utf-8?q?Alex_Benn=C3=A9e?= To: qemu-devel@nongnu.org Cc: Marcin Juszkiewicz , =?utf-8?q?Philippe_M?= =?utf-8?q?athieu-Daud=C3=A9?= , =?utf-8?q?Alex_Benn?= =?utf-8?q?=C3=A9e?= , Radoslaw Biernacki , Peter Maydell , Leif Lindholm , Cleber Rosa , Wainer dos Santos Moschetta , Beraldo Leal , qemu-arm@nongnu.org (open list:SBSA-REF) Subject: [PULL 2/5] tests/avocado: update sbsa-ref firmware Date: Wed, 20 Mar 2024 16:13:37 +0000 Message-Id: <20240320161340.391798-3-alex.bennee@linaro.org> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20240320161340.391798-1-alex.bennee@linaro.org> References: <20240320161340.391798-1-alex.bennee@linaro.org> MIME-Version: 1.0 Received-SPF: pass client-ip=2a00:1450:4864:20::52c; envelope-from=alex.bennee@linaro.org; helo=mail-ed1-x52c.google.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_TEMPERROR=0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+patch=linaro.org@nongnu.org Sender: qemu-devel-bounces+patch=linaro.org@nongnu.org From: Marcin Juszkiewicz We now have CI job to build those and publish in space with readable urls. Firmware is built using Debian 'bookworm' cross toolchain (gcc 12.2.0). Used versions: - Trusted Firmware v2.10.2 - Tianocore EDK2 stable202402 - Tianocore EDK2 Platforms code commit 085c2fb Signed-off-by: Marcin Juszkiewicz Tested-by: Philippe Mathieu-Daudé Message-Id: <20240318-sbsa-ref-firmware-update-v3-1-1c33b995a538@linaro.org> Signed-off-by: Alex Bennée diff --git a/tests/avocado/machine_aarch64_sbsaref.py b/tests/avocado/machine_aarch64_sbsaref.py index 528c7d2934..cbab793455 100644 --- a/tests/avocado/machine_aarch64_sbsaref.py +++ b/tests/avocado/machine_aarch64_sbsaref.py @@ -1,6 +1,6 @@ # Functional test that boots a Linux kernel and checks the console # -# SPDX-FileCopyrightText: 2023 Linaro Ltd. +# SPDX-FileCopyrightText: 2023-2024 Linaro Ltd. # SPDX-FileContributor: Philippe Mathieu-Daudé # SPDX-FileContributor: Marcin Juszkiewicz # @@ -32,34 +32,36 @@ def fetch_firmware(self): """ Flash volumes generated using: - - Fedora GNU Toolchain version 13.2.1 20230728 (Red Hat 13.2.1-1) + Toolchain from Debian: + aarch64-linux-gnu-gcc (Debian 12.2.0-14) 12.2.0 - - Trusted Firmware-A - https://github.com/ARM-software/arm-trusted-firmware/tree/7c3ff62d + Used components: + + - Trusted Firmware 2.10.2 + - Tianocore EDK2 stable202402 + - Tianocore EDK2-platforms commit 085c2fb - - Tianocore EDK II - https://github.com/tianocore/edk2/tree/0f9283429dd4 - https://github.com/tianocore/edk2/tree/ad1c0394b177 - https://github.com/tianocore/edk2-platforms/tree/d03a60523a60 """ # Secure BootRom (TF-A code) fs0_xz_url = ( - "https://fileserver.linaro.org/s/rE43RJyTfxPtBkc/" - "download/SBSA_FLASH0.fd.xz" + "https://artifacts.codelinaro.org/artifactory/linaro-419-sbsa-ref/" + "20240313-116475/edk2/SBSA_FLASH0.fd.xz" ) - fs0_xz_hash = "cdb8e4ffdaaa79292b7b465693f9e5fae6b7062d" - tar_xz_path = self.fetch_asset(fs0_xz_url, asset_hash=fs0_xz_hash) + fs0_xz_hash = "637593749cc307dea7dc13265c32e5d020267552f22b18a31850b8429fc5e159" + tar_xz_path = self.fetch_asset(fs0_xz_url, asset_hash=fs0_xz_hash, + algorithm='sha256') archive.extract(tar_xz_path, self.workdir) fs0_path = os.path.join(self.workdir, "SBSA_FLASH0.fd") # Non-secure rom (UEFI and EFI variables) fs1_xz_url = ( - "https://fileserver.linaro.org/s/AGWPDXbcqJTKS4R/" - "download/SBSA_FLASH1.fd.xz" + "https://artifacts.codelinaro.org/artifactory/linaro-419-sbsa-ref/" + "20240313-116475/edk2/SBSA_FLASH1.fd.xz" ) - fs1_xz_hash = "411155ae6984334714dff08d5d628178e790c875" - tar_xz_path = self.fetch_asset(fs1_xz_url, asset_hash=fs1_xz_hash) + fs1_xz_hash = "cb0a5e8cf5e303c5d3dc106cfd5943ffe9714b86afddee7164c69ee1dd41991c" + tar_xz_path = self.fetch_asset(fs1_xz_url, asset_hash=fs1_xz_hash, + algorithm='sha256') archive.extract(tar_xz_path, self.workdir) fs1_path = os.path.join(self.workdir, "SBSA_FLASH1.fd") @@ -96,15 +98,15 @@ def test_sbsaref_edk2_firmware(self): # AP Trusted ROM wait_for_console_pattern(self, "Booting Trusted Firmware") - wait_for_console_pattern(self, "BL1: v2.9(release):v2.9") + wait_for_console_pattern(self, "BL1: v2.10.2(release):") wait_for_console_pattern(self, "BL1: Booting BL2") # Trusted Boot Firmware - wait_for_console_pattern(self, "BL2: v2.9(release)") + wait_for_console_pattern(self, "BL2: v2.10.2(release)") wait_for_console_pattern(self, "Booting BL31") # EL3 Runtime Software - wait_for_console_pattern(self, "BL31: v2.9(release)") + wait_for_console_pattern(self, "BL31: v2.10.2(release)") # Non-trusted Firmware wait_for_console_pattern(self, "UEFI firmware (version 1.0")