Message ID | 20240528182917.91027-1-marcin.juszkiewicz@linaro.org |
---|---|
State | New |
Headers | show |
Series | [1/1] tests/avocado: update sbsa-ref firmware | expand |
On 2024-05-28 19:29, Marcin Juszkiewicz wrote: > Partial support for NUMA setup: > - cpu nodes > - memory nodes > > Used versions: > > - Trusted Firmware v2.11.0 > - Tianocore EDK2 stable202405 > - Tianocore EDK2 Platforms code commit 4bbd0ed > > Firmware is built using Debian 'bookworm' cross toolchain (gcc 12.2.0). Missing signoff? Apart from that: Reviewed-by: Leif Lindholm <quic_llindhol@quicinc.com> > --- > tests/avocado/machine_aarch64_sbsaref.py | 20 ++++++++++---------- > 1 file changed, 10 insertions(+), 10 deletions(-) > > diff --git a/tests/avocado/machine_aarch64_sbsaref.py b/tests/avocado/machine_aarch64_sbsaref.py > index 98c76c1ff7..6bb82f2a03 100644 > --- a/tests/avocado/machine_aarch64_sbsaref.py > +++ b/tests/avocado/machine_aarch64_sbsaref.py > @@ -37,18 +37,18 @@ def fetch_firmware(self): > > Used components: > > - - Trusted Firmware 2.10.2 > - - Tianocore EDK2 stable202402 > - - Tianocore EDK2-platforms commit 085c2fb > + - Trusted Firmware 2.11.0 > + - Tianocore EDK2 stable202405 > + - Tianocore EDK2-platforms commit 4bbd0ed > > """ > > # Secure BootRom (TF-A code) > fs0_xz_url = ( > "https://artifacts.codelinaro.org/artifactory/linaro-419-sbsa-ref/" > - "20240313-116475/edk2/SBSA_FLASH0.fd.xz" > + "20240528-140808/edk2/SBSA_FLASH0.fd.xz" > ) > - fs0_xz_hash = "637593749cc307dea7dc13265c32e5d020267552f22b18a31850b8429fc5e159" > + fs0_xz_hash = "fa6004900b67172914c908b78557fec4d36a5f784f4c3dd08f49adb75e1892a9" > tar_xz_path = self.fetch_asset(fs0_xz_url, asset_hash=fs0_xz_hash, > algorithm='sha256') > archive.extract(tar_xz_path, self.workdir) > @@ -57,9 +57,9 @@ def fetch_firmware(self): > # Non-secure rom (UEFI and EFI variables) > fs1_xz_url = ( > "https://artifacts.codelinaro.org/artifactory/linaro-419-sbsa-ref/" > - "20240313-116475/edk2/SBSA_FLASH1.fd.xz" > + "20240528-140808/edk2/SBSA_FLASH1.fd.xz" > ) > - fs1_xz_hash = "cb0a5e8cf5e303c5d3dc106cfd5943ffe9714b86afddee7164c69ee1dd41991c" > + fs1_xz_hash = "5f3747d4000bc416d9641e33ff4ac60c3cc8cb74ca51b6e932e58531c62eb6f7" > tar_xz_path = self.fetch_asset(fs1_xz_url, asset_hash=fs1_xz_hash, > algorithm='sha256') > archive.extract(tar_xz_path, self.workdir) > @@ -98,15 +98,15 @@ def test_sbsaref_edk2_firmware(self): > > # AP Trusted ROM > wait_for_console_pattern(self, "Booting Trusted Firmware") > - wait_for_console_pattern(self, "BL1: v2.10.2(release):") > + wait_for_console_pattern(self, "BL1: v2.11.0(release):") > wait_for_console_pattern(self, "BL1: Booting BL2") > > # Trusted Boot Firmware > - wait_for_console_pattern(self, "BL2: v2.10.2(release)") > + wait_for_console_pattern(self, "BL2: v2.11.0(release)") > wait_for_console_pattern(self, "Booting BL31") > > # EL3 Runtime Software > - wait_for_console_pattern(self, "BL31: v2.10.2(release)") > + wait_for_console_pattern(self, "BL31: v2.11.0(release)") > > # Non-trusted Firmware > wait_for_console_pattern(self, "UEFI firmware (version 1.0")
W dniu 29.05.2024 o 15:12, Leif Lindholm pisze: > On 2024-05-28 19:29, Marcin Juszkiewicz wrote: >> Partial support for NUMA setup: >> - cpu nodes >> - memory nodes >> >> Used versions: >> >> - Trusted Firmware v2.11.0 >> - Tianocore EDK2 stable202405 >> - Tianocore EDK2 Platforms code commit 4bbd0ed >> >> Firmware is built using Debian 'bookworm' cross toolchain (gcc 12.2.0). > > Missing signoff? Ooops. Signed-off-by: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org> > Apart from that: > Reviewed-by: Leif Lindholm <quic_llindhol@quicinc.com> > >> --- >> tests/avocado/machine_aarch64_sbsaref.py | 20 ++++++++++---------- >> 1 file changed, 10 insertions(+), 10 deletions(-) >> >> diff --git a/tests/avocado/machine_aarch64_sbsaref.py >> b/tests/avocado/machine_aarch64_sbsaref.py >> index 98c76c1ff7..6bb82f2a03 100644 >> --- a/tests/avocado/machine_aarch64_sbsaref.py >> +++ b/tests/avocado/machine_aarch64_sbsaref.py >> @@ -37,18 +37,18 @@ def fetch_firmware(self): >> Used components: >> - - Trusted Firmware 2.10.2 >> - - Tianocore EDK2 stable202402 >> - - Tianocore EDK2-platforms commit 085c2fb >> + - Trusted Firmware 2.11.0 >> + - Tianocore EDK2 stable202405 >> + - Tianocore EDK2-platforms commit 4bbd0ed >> """ >> # Secure BootRom (TF-A code) >> fs0_xz_url = ( >> >> "https://artifacts.codelinaro.org/artifactory/linaro-419-sbsa-ref/" >> - "20240313-116475/edk2/SBSA_FLASH0.fd.xz" >> + "20240528-140808/edk2/SBSA_FLASH0.fd.xz" >> ) >> - fs0_xz_hash = >> "637593749cc307dea7dc13265c32e5d020267552f22b18a31850b8429fc5e159" >> + fs0_xz_hash = >> "fa6004900b67172914c908b78557fec4d36a5f784f4c3dd08f49adb75e1892a9" >> tar_xz_path = self.fetch_asset(fs0_xz_url, >> asset_hash=fs0_xz_hash, >> algorithm='sha256') >> archive.extract(tar_xz_path, self.workdir) >> @@ -57,9 +57,9 @@ def fetch_firmware(self): >> # Non-secure rom (UEFI and EFI variables) >> fs1_xz_url = ( >> >> "https://artifacts.codelinaro.org/artifactory/linaro-419-sbsa-ref/" >> - "20240313-116475/edk2/SBSA_FLASH1.fd.xz" >> + "20240528-140808/edk2/SBSA_FLASH1.fd.xz" >> ) >> - fs1_xz_hash = >> "cb0a5e8cf5e303c5d3dc106cfd5943ffe9714b86afddee7164c69ee1dd41991c" >> + fs1_xz_hash = >> "5f3747d4000bc416d9641e33ff4ac60c3cc8cb74ca51b6e932e58531c62eb6f7" >> tar_xz_path = self.fetch_asset(fs1_xz_url, >> asset_hash=fs1_xz_hash, >> algorithm='sha256') >> archive.extract(tar_xz_path, self.workdir) >> @@ -98,15 +98,15 @@ def test_sbsaref_edk2_firmware(self): >> # AP Trusted ROM >> wait_for_console_pattern(self, "Booting Trusted Firmware") >> - wait_for_console_pattern(self, "BL1: v2.10.2(release):") >> + wait_for_console_pattern(self, "BL1: v2.11.0(release):") >> wait_for_console_pattern(self, "BL1: Booting BL2") >> # Trusted Boot Firmware >> - wait_for_console_pattern(self, "BL2: v2.10.2(release)") >> + wait_for_console_pattern(self, "BL2: v2.11.0(release)") >> wait_for_console_pattern(self, "Booting BL31") >> # EL3 Runtime Software >> - wait_for_console_pattern(self, "BL31: v2.10.2(release)") >> + wait_for_console_pattern(self, "BL31: v2.11.0(release)") >> # Non-trusted Firmware >> wait_for_console_pattern(self, "UEFI firmware (version 1.0") >
Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org> writes: > Partial support for NUMA setup: > - cpu nodes > - memory nodes > > Used versions: > > - Trusted Firmware v2.11.0 > - Tianocore EDK2 stable202405 > - Tianocore EDK2 Platforms code commit 4bbd0ed > > Firmware is built using Debian 'bookworm' cross toolchain (gcc > 12.2.0). Queued to testing/next, thanks.
diff --git a/tests/avocado/machine_aarch64_sbsaref.py b/tests/avocado/machine_aarch64_sbsaref.py index 98c76c1ff7..6bb82f2a03 100644 --- a/tests/avocado/machine_aarch64_sbsaref.py +++ b/tests/avocado/machine_aarch64_sbsaref.py @@ -37,18 +37,18 @@ def fetch_firmware(self): Used components: - - Trusted Firmware 2.10.2 - - Tianocore EDK2 stable202402 - - Tianocore EDK2-platforms commit 085c2fb + - Trusted Firmware 2.11.0 + - Tianocore EDK2 stable202405 + - Tianocore EDK2-platforms commit 4bbd0ed """ # Secure BootRom (TF-A code) fs0_xz_url = ( "https://artifacts.codelinaro.org/artifactory/linaro-419-sbsa-ref/" - "20240313-116475/edk2/SBSA_FLASH0.fd.xz" + "20240528-140808/edk2/SBSA_FLASH0.fd.xz" ) - fs0_xz_hash = "637593749cc307dea7dc13265c32e5d020267552f22b18a31850b8429fc5e159" + fs0_xz_hash = "fa6004900b67172914c908b78557fec4d36a5f784f4c3dd08f49adb75e1892a9" tar_xz_path = self.fetch_asset(fs0_xz_url, asset_hash=fs0_xz_hash, algorithm='sha256') archive.extract(tar_xz_path, self.workdir) @@ -57,9 +57,9 @@ def fetch_firmware(self): # Non-secure rom (UEFI and EFI variables) fs1_xz_url = ( "https://artifacts.codelinaro.org/artifactory/linaro-419-sbsa-ref/" - "20240313-116475/edk2/SBSA_FLASH1.fd.xz" + "20240528-140808/edk2/SBSA_FLASH1.fd.xz" ) - fs1_xz_hash = "cb0a5e8cf5e303c5d3dc106cfd5943ffe9714b86afddee7164c69ee1dd41991c" + fs1_xz_hash = "5f3747d4000bc416d9641e33ff4ac60c3cc8cb74ca51b6e932e58531c62eb6f7" tar_xz_path = self.fetch_asset(fs1_xz_url, asset_hash=fs1_xz_hash, algorithm='sha256') archive.extract(tar_xz_path, self.workdir) @@ -98,15 +98,15 @@ def test_sbsaref_edk2_firmware(self): # AP Trusted ROM wait_for_console_pattern(self, "Booting Trusted Firmware") - wait_for_console_pattern(self, "BL1: v2.10.2(release):") + wait_for_console_pattern(self, "BL1: v2.11.0(release):") wait_for_console_pattern(self, "BL1: Booting BL2") # Trusted Boot Firmware - wait_for_console_pattern(self, "BL2: v2.10.2(release)") + wait_for_console_pattern(self, "BL2: v2.11.0(release)") wait_for_console_pattern(self, "Booting BL31") # EL3 Runtime Software - wait_for_console_pattern(self, "BL31: v2.10.2(release)") + wait_for_console_pattern(self, "BL31: v2.11.0(release)") # Non-trusted Firmware wait_for_console_pattern(self, "UEFI firmware (version 1.0")