From patchwork Wed Dec 11 23:31:44 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Julien Olivain X-Patchwork-Id: 2021786 Return-Path: X-Original-To: incoming-buildroot@patchwork.ozlabs.org Delivered-To: patchwork-incoming-buildroot@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org (client-ip=2605:bc80:3010::138; helo=smtp1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org) Received: from smtp1.osuosl.org (smtp1.osuosl.org [IPv6:2605:bc80:3010::138]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4Y7sMK6lVdz1yRL for ; Thu, 12 Dec 2024 10:32:11 +1100 (AEDT) Received: from localhost (localhost [127.0.0.1]) by smtp1.osuosl.org (Postfix) with ESMTP id E8BDF81F76; Wed, 11 Dec 2024 23:32:08 +0000 (UTC) X-Virus-Scanned: amavis at osuosl.org Received: from smtp1.osuosl.org ([127.0.0.1]) by localhost (smtp1.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP id BaD-Nmf1WDLJ; Wed, 11 Dec 2024 23:32:08 +0000 (UTC) X-Comment: SPF check N/A for local connections - client-ip=140.211.166.142; helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org; receiver= DKIM-Filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org ED83681F1A Received: from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142]) by smtp1.osuosl.org (Postfix) with ESMTP id ED83681F1A; Wed, 11 Dec 2024 23:32:07 +0000 (UTC) X-Original-To: buildroot@buildroot.org Delivered-To: buildroot@buildroot.org Received: from smtp2.osuosl.org (smtp2.osuosl.org [IPv6:2605:bc80:3010::133]) by lists1.osuosl.org (Postfix) with ESMTP id F3F6D1146 for ; Wed, 11 Dec 2024 23:32:05 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp2.osuosl.org (Postfix) with ESMTP id CC9AA400AF for ; Wed, 11 Dec 2024 23:32:05 +0000 (UTC) X-Virus-Scanned: amavis at osuosl.org Received: from smtp2.osuosl.org ([127.0.0.1]) by localhost (smtp2.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP id MaZ3ENZ3aJ9i for ; Wed, 11 Dec 2024 23:32:04 +0000 (UTC) Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=212.27.42.1; helo=smtp1-g21.free.fr; envelope-from=ju.o@free.fr; receiver= DMARC-Filter: OpenDMARC Filter v1.4.2 smtp2.osuosl.org 6954C40118 DKIM-Filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 6954C40118 Received: from smtp1-g21.free.fr (smtp1-g21.free.fr [212.27.42.1]) by smtp2.osuosl.org (Postfix) with ESMTPS id 6954C40118 for ; Wed, 11 Dec 2024 23:32:03 +0000 (UTC) Received: from home.juju.sh (unknown [IPv6:2a01:e0a:485:b220:8213:2270:4a8d:a1d5]) (Authenticated sender: ju.o@free.fr) by smtp1-g21.free.fr (Postfix) with ESMTPSA id F0BFAB00565; Thu, 12 Dec 2024 00:31:59 +0100 (CET) From: Julien Olivain To: buildroot@buildroot.org Cc: Julien Olivain Date: Thu, 12 Dec 2024 00:31:44 +0100 Message-ID: <20241211233144.729270-1-ju.o@free.fr> X-Mailer: git-send-email 2.47.1 MIME-Version: 1.0 X-Mailman-Original-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=free.fr; s=smtp-20201208; t=1733959921; bh=ALBffXXgbtSDnHTwRLP5n8RWd6ZLdp1oKn4zDUWB5T4=; h=From:To:Cc:Subject:Date:From; b=mlQHWU2MJZk8NHQDk8Yo31nhuuemheDTT19eNe6+bn+VAgWQd+n+vvOIB+XG4KGpS sycaxACYpJHOI3w1KNBLoBM/y2MIC5hG3HHSLQmfMwp1vbmq5ThwuYMO2QkJ80cG2O WrPuaPfJoq2K+K7BXRdAHXf8iFEt22CtdS6hQlAX/+vThGdKJXv3E6pB70IpuyuQP2 i3B/eZcpe/ZdwtPRNOLtQSIuEr8EjcE0g/VqFASEF537srzDOBJjpNpBg3NCrC6pcg wFEN8dpKFXCbCYPj7Int/nZT2ddRT0xIqwLeIBXgYYuiecp9cxR3UtN/4kIt98M+W6 AoIB61bwvAzlA== X-Mailman-Original-Authentication-Results: smtp2.osuosl.org; dmarc=pass (p=none dis=none) header.from=free.fr X-Mailman-Original-Authentication-Results: smtp2.osuosl.org; dkim=pass (2048-bit key, unprotected) header.d=free.fr header.i=@free.fr header.a=rsa-sha256 header.s=smtp-20201208 header.b=mlQHWU2M Subject: [Buildroot] [PATCH 1/1] support/testing: fix test_atf by bumping atf to 2.11 X-BeenThere: buildroot@buildroot.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Discussion and development of buildroot List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: buildroot-bounces@buildroot.org Sender: "buildroot" Since commit [1], test_atf is failing. See [2]. Passing -no-pie to ld does not produce the bl31.elf file (and does not generate an error). TF-A 2.11 reworked its makefiles and switched to gcc to link files. This commit fixes this failing test by updating to this newer TF-A version. Fixes: [2]. [1] https://gitlab.com/buildroot.org/buildroot/-/commit/248c2d045e780b23e6ed19fec1f242460ac464e3 [2] https://gitlab.com/buildroot.org/buildroot/-/jobs/8609307891 Signed-off-by: Julien Olivain --- Patch tested in: https://gitlab.com/jolivain/buildroot/-/jobs/8618207810 --- support/testing/tests/boot/test_atf.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/support/testing/tests/boot/test_atf.py b/support/testing/tests/boot/test_atf.py index b0e7696e86..6142dd36c1 100644 --- a/support/testing/tests/boot/test_atf.py +++ b/support/testing/tests/boot/test_atf.py @@ -9,7 +9,7 @@ class TestATFAllwinner(infra.basetest.BRTest): BR2_TOOLCHAIN_EXTERNAL_LINARO_AARCH64=y BR2_TARGET_ARM_TRUSTED_FIRMWARE=y BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_VERSION=y - BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_VERSION_VALUE="v2.9" + BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_VERSION_VALUE="v2.11" BR2_TARGET_ARM_TRUSTED_FIRMWARE_PLATFORM="sun50i_a64" # BR2_TARGET_ARM_TRUSTED_FIRMWARE_SSP is not set BR2_TARGET_ARM_TRUSTED_FIRMWARE_BL31=y