From patchwork Wed May 29 16:09:34 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Alex_Benn=C3=A9e?= X-Patchwork-Id: 799860 Delivered-To: patch@linaro.org Received: by 2002:adf:e110:0:b0:35b:5a80:51b4 with SMTP id t16csp813645wrz; Wed, 29 May 2024 09:11:56 -0700 (PDT) X-Forwarded-Encrypted: i=2; AJvYcCVyCMMnerVzdILggF5Vh6vdUr72E0drafZE6FwHIXUFw6uOBjVM6ZS9aoDb0jF+fS8RA2m/dje9Hq15lJx3vRVv X-Google-Smtp-Source: AGHT+IFSd/hZYX59I366EdqEW6wIj/VbwdAtYp3Z24llwLjQiq56xf7QqFoTCrPP4Is3K9nFjz1d X-Received: by 2002:a05:622a:211:b0:43e:1039:8ce8 with SMTP id d75a77b69052e-43fe10e3d57mr44862681cf.14.1716999116204; Wed, 29 May 2024 09:11:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1716999116; cv=none; d=google.com; s=arc-20160816; b=G1chqO3KEltwWSOvaCI1Q0esjVtNb6oXEyF/z58xFPIi8ZGzA4lcGimR+FoTqS7WqH Lflg+N6EBGSySPjBRW6IzINte2RX/bhIEy7qtW9FI0rWBGflqqmqbSTKFMo041to1sKA gmnG/ka/xb4hJHO3tYDt0NXzLZ1eTSmcLABfXsEpAzOW6SIyuqbeskS2XWiw2Wr7qBBg Sg0b9zPq5Hd8/kxyK8lQvF/WzzLmcOxF1ToESzcROYfQ00WoXdz1Wb1o/U98pdVkcU7I 8bXkw0j51zGkB8Lx+BUFfwtUuFPuEgh3KfRrK3LAF/K/aWH2ZunMxrWTS0eqPwMyGdEq oaSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=uLMfOIC0M6UjEiTjbHQfPonFA1Fbh58cXgqyObzz2H0=; fh=73Bjh8AhN5WIZkOkggOaOI6x10w+Om+h0ZWVmgoFcNA=; b=SAXMQODe7N2fyMyzXi/IfozIrSpMIvAHn/Lbz1zDU2ke9U4nsh2H4ZXPXC+gVml5mu iiwa8PxB7TtGDxchDabLI+gep+O9IgAXmzBG5qf86QgBV0Aq3TJ4ngkqUhymMQBg8Cj4 9S+pLY2J7/H4Zm3rPxoL/7bJhyvD7LG5GeRje1vwUEoUCIX9iNeEo8QrdEeaedfdBknu KEwQkuqO9hD82663h7gsvfxuNBFNJjVjjo15Icry4xlNZ83ASkPHlbVU1AcnfjTQPn0N ybTdgLUFHUsDtCKF3dCG4oNwnB2fVx86jG9ypMM/ffQBpT3Qww7j6fsQPjdgUB399If7 EjWA==; dara=google.com ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=DsLEgT+L; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lists.gnu.org (lists.gnu.org. [209.51.188.17]) by mx.google.com with ESMTPS id d75a77b69052e-43fd8a76df0si50996331cf.407.2024.05.29.09.11.56 for (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Wed, 29 May 2024 09:11:56 -0700 (PDT) Received-SPF: pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=DsLEgT+L; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom="qemu-devel-bounces+patch=linaro.org@nongnu.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1sCLsH-0000f2-5f; Wed, 29 May 2024 12:10:01 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1sCLsD-0000d9-Oo for qemu-devel@nongnu.org; Wed, 29 May 2024 12:09:58 -0400 Received: from mail-ej1-x630.google.com ([2a00:1450:4864:20::630]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1sCLrx-0003IL-Vh for qemu-devel@nongnu.org; Wed, 29 May 2024 12:09:57 -0400 Received: by mail-ej1-x630.google.com with SMTP id a640c23a62f3a-a61b70394c0so265127366b.1 for ; Wed, 29 May 2024 09:09:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1716998980; x=1717603780; darn=nongnu.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=uLMfOIC0M6UjEiTjbHQfPonFA1Fbh58cXgqyObzz2H0=; b=DsLEgT+LeP5vwy+DFlqew/KR2R6dXZWPn8+XPxhx106d2xOLzaBoxUWAfsMoyIMzEW 330TjaR7FuyFCLy6HwVUVMHhyl23CGx0gRl2ko06RIZO8T10B0kJdJbXV91GwlAuVCk0 yKhipM+RRYDtXyeqQjaX40jiGkN1g2j6tqFCNM1Sta5/DNrGPtry5K1u3POONxc4kg0P tQm8ueKch+u7cPbSo3adm+WUhHTXrDp9O4GNHtMvgDJv1PW2Ld+HZkHoNmdT4d5PboXS uLA8YLPqG7elDL1BZABa3mG53wADCQRAlRgW6n+k5p/794ec0DmNKefyHGN17Q99yXk8 DLBA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1716998980; x=1717603780; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=uLMfOIC0M6UjEiTjbHQfPonFA1Fbh58cXgqyObzz2H0=; b=GY70xL5kIPsmpTVuMmx3xzkVlz5ycsiBGX84rzu00OlwJ9kwtAoMifv9RPMWtJZKn3 x0wWRxyAyRXpAspyyPwVw1FwLEiVtoZGZjVWFAEvHhoC4nmdnGWHmbIXGUhblO99xIsd XeLJMrxViZ9ZWgMraHb7xAF2kQfIiMkfMDulZzZdUpdeIo0LJq/QqzIRwyWBsbqHpYrW daJRj7ptvu2S8d9JVEQw/Ll/wdQ6NT/QRWVzrQK/0ur8QZq6BLZfx1pL4+b4LYGQwnNw w9c8vitqm1gux9GwArG72kNd9krFhSWy4B3N3QE4Egdc/NSY4SZGUFm+UtfnNzmq3RER 42ow== X-Gm-Message-State: AOJu0Ywy2tvxVC5HBqkf4qsRaGpbfPk2Hya3W4QhBfjKrKfAXE3cyZCd 9bIb7IWzqNtEpp7fpDovFrIS9dF1wjrXJjB+Dz9mWGGD+u+POxtPmis8X9gC0kg= X-Received: by 2002:a17:906:fb03:b0:a62:415b:b5c with SMTP id a640c23a62f3a-a62641a2a26mr966637966b.5.1716998980355; Wed, 29 May 2024 09:09:40 -0700 (PDT) Received: from draig.lan ([85.9.250.243]) by smtp.gmail.com with ESMTPSA id a640c23a62f3a-a626c934fd8sm727651966b.47.2024.05.29.09.09.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 29 May 2024 09:09:38 -0700 (PDT) Received: from draig.lan (localhost [IPv6:::1]) by draig.lan (Postfix) with ESMTP id 06C3F5FA95; Wed, 29 May 2024 17:09:36 +0100 (BST) From: =?utf-8?q?Alex_Benn=C3=A9e?= To: qemu-devel@nongnu.org Cc: Laurent Vivier , Wainer dos Santos Moschetta , =?utf-8?q?Daniel_P=2E_Be?= =?utf-8?q?rrang=C3=A9?= , Beraldo Leal , Thomas Huth , Richard Henderson , Leif Lindholm , John Snow , Markus Armbruster , =?utf-8?q?Marc-Andr=C3=A9_Lureau?= , Pavel Dovgalyuk , Mark Cave-Ayland , =?utf-8?q?Alex_Benn=C3=A9?= =?utf-8?q?e?= , Paolo Bonzini , Jiaxun Yang , qemu-arm@nongnu.org, Cleber Rosa , Joel Stanley , Aurelien Jarno , =?utf-8?q?Philippe_Mathieu-Daud?= =?utf-8?q?=C3=A9?= , Marcin Juszkiewicz , Peter Maydell , qemu-s390x@nongnu.org, Radoslaw Biernacki Subject: [PATCH 10/10] tests/avocado: update sbsa-ref firmware Date: Wed, 29 May 2024 17:09:34 +0100 Message-Id: <20240529160934.982373-11-alex.bennee@linaro.org> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20240529160934.982373-1-alex.bennee@linaro.org> References: <20240529160934.982373-1-alex.bennee@linaro.org> MIME-Version: 1.0 Received-SPF: pass client-ip=2a00:1450:4864:20::630; envelope-from=alex.bennee@linaro.org; helo=mail-ej1-x630.google.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=unavailable autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+patch=linaro.org@nongnu.org Sender: qemu-devel-bounces+patch=linaro.org@nongnu.org From: Marcin Juszkiewicz Partial support for NUMA setup: - cpu nodes - memory nodes Used versions: - Trusted Firmware v2.11.0 - Tianocore EDK2 stable202405 - Tianocore EDK2 Platforms code commit 4bbd0ed Firmware is built using Debian 'bookworm' cross toolchain (gcc 12.2.0). Signed-off-by: Marcin Juszkiewicz Reviewed-by: Leif Lindholm Message-Id: <20240528182917.91027-1-marcin.juszkiewicz@linaro.org> Signed-off-by: Alex Bennée --- tests/avocado/machine_aarch64_sbsaref.py | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/tests/avocado/machine_aarch64_sbsaref.py b/tests/avocado/machine_aarch64_sbsaref.py index 98c76c1ff7..6bb82f2a03 100644 --- a/tests/avocado/machine_aarch64_sbsaref.py +++ b/tests/avocado/machine_aarch64_sbsaref.py @@ -37,18 +37,18 @@ def fetch_firmware(self): Used components: - - Trusted Firmware 2.10.2 - - Tianocore EDK2 stable202402 - - Tianocore EDK2-platforms commit 085c2fb + - Trusted Firmware 2.11.0 + - Tianocore EDK2 stable202405 + - Tianocore EDK2-platforms commit 4bbd0ed """ # Secure BootRom (TF-A code) fs0_xz_url = ( "https://artifacts.codelinaro.org/artifactory/linaro-419-sbsa-ref/" - "20240313-116475/edk2/SBSA_FLASH0.fd.xz" + "20240528-140808/edk2/SBSA_FLASH0.fd.xz" ) - fs0_xz_hash = "637593749cc307dea7dc13265c32e5d020267552f22b18a31850b8429fc5e159" + fs0_xz_hash = "fa6004900b67172914c908b78557fec4d36a5f784f4c3dd08f49adb75e1892a9" tar_xz_path = self.fetch_asset(fs0_xz_url, asset_hash=fs0_xz_hash, algorithm='sha256') archive.extract(tar_xz_path, self.workdir) @@ -57,9 +57,9 @@ def fetch_firmware(self): # Non-secure rom (UEFI and EFI variables) fs1_xz_url = ( "https://artifacts.codelinaro.org/artifactory/linaro-419-sbsa-ref/" - "20240313-116475/edk2/SBSA_FLASH1.fd.xz" + "20240528-140808/edk2/SBSA_FLASH1.fd.xz" ) - fs1_xz_hash = "cb0a5e8cf5e303c5d3dc106cfd5943ffe9714b86afddee7164c69ee1dd41991c" + fs1_xz_hash = "5f3747d4000bc416d9641e33ff4ac60c3cc8cb74ca51b6e932e58531c62eb6f7" tar_xz_path = self.fetch_asset(fs1_xz_url, asset_hash=fs1_xz_hash, algorithm='sha256') archive.extract(tar_xz_path, self.workdir) @@ -98,15 +98,15 @@ def test_sbsaref_edk2_firmware(self): # AP Trusted ROM wait_for_console_pattern(self, "Booting Trusted Firmware") - wait_for_console_pattern(self, "BL1: v2.10.2(release):") + wait_for_console_pattern(self, "BL1: v2.11.0(release):") wait_for_console_pattern(self, "BL1: Booting BL2") # Trusted Boot Firmware - wait_for_console_pattern(self, "BL2: v2.10.2(release)") + wait_for_console_pattern(self, "BL2: v2.11.0(release)") wait_for_console_pattern(self, "Booting BL31") # EL3 Runtime Software - wait_for_console_pattern(self, "BL31: v2.10.2(release)") + wait_for_console_pattern(self, "BL31: v2.11.0(release)") # Non-trusted Firmware wait_for_console_pattern(self, "UEFI firmware (version 1.0")