diff mbox series

[1/1] tests/avocado: update sbsa-ref firmware

Message ID 20240528182917.91027-1-marcin.juszkiewicz@linaro.org
State Superseded
Headers show
Series [1/1] tests/avocado: update sbsa-ref firmware | expand

Commit Message

Marcin Juszkiewicz May 28, 2024, 6:29 p.m. UTC
Partial support for NUMA setup:
- cpu nodes
- memory nodes

Used versions:

- Trusted Firmware v2.11.0
- Tianocore EDK2 stable202405
- Tianocore EDK2 Platforms code commit 4bbd0ed

Firmware is built using Debian 'bookworm' cross toolchain (gcc 12.2.0).
---
 tests/avocado/machine_aarch64_sbsaref.py | 20 ++++++++++----------
 1 file changed, 10 insertions(+), 10 deletions(-)

Comments

Leif Lindholm May 29, 2024, 1:12 p.m. UTC | #1
On 2024-05-28 19:29, Marcin Juszkiewicz wrote:
> Partial support for NUMA setup:
> - cpu nodes
> - memory nodes
> 
> Used versions:
> 
> - Trusted Firmware v2.11.0
> - Tianocore EDK2 stable202405
> - Tianocore EDK2 Platforms code commit 4bbd0ed
> 
> Firmware is built using Debian 'bookworm' cross toolchain (gcc 12.2.0).

Missing signoff?

Apart from that:
Reviewed-by: Leif Lindholm <quic_llindhol@quicinc.com>

> ---
>   tests/avocado/machine_aarch64_sbsaref.py | 20 ++++++++++----------
>   1 file changed, 10 insertions(+), 10 deletions(-)
> 
> diff --git a/tests/avocado/machine_aarch64_sbsaref.py b/tests/avocado/machine_aarch64_sbsaref.py
> index 98c76c1ff7..6bb82f2a03 100644
> --- a/tests/avocado/machine_aarch64_sbsaref.py
> +++ b/tests/avocado/machine_aarch64_sbsaref.py
> @@ -37,18 +37,18 @@ def fetch_firmware(self):
>   
>           Used components:
>   
> -        - Trusted Firmware 2.10.2
> -        - Tianocore EDK2 stable202402
> -        - Tianocore EDK2-platforms commit 085c2fb
> +        - Trusted Firmware 2.11.0
> +        - Tianocore EDK2 stable202405
> +        - Tianocore EDK2-platforms commit 4bbd0ed
>   
>           """
>   
>           # Secure BootRom (TF-A code)
>           fs0_xz_url = (
>               "https://artifacts.codelinaro.org/artifactory/linaro-419-sbsa-ref/"
> -            "20240313-116475/edk2/SBSA_FLASH0.fd.xz"
> +            "20240528-140808/edk2/SBSA_FLASH0.fd.xz"
>           )
> -        fs0_xz_hash = "637593749cc307dea7dc13265c32e5d020267552f22b18a31850b8429fc5e159"
> +        fs0_xz_hash = "fa6004900b67172914c908b78557fec4d36a5f784f4c3dd08f49adb75e1892a9"
>           tar_xz_path = self.fetch_asset(fs0_xz_url, asset_hash=fs0_xz_hash,
>                                         algorithm='sha256')
>           archive.extract(tar_xz_path, self.workdir)
> @@ -57,9 +57,9 @@ def fetch_firmware(self):
>           # Non-secure rom (UEFI and EFI variables)
>           fs1_xz_url = (
>               "https://artifacts.codelinaro.org/artifactory/linaro-419-sbsa-ref/"
> -            "20240313-116475/edk2/SBSA_FLASH1.fd.xz"
> +            "20240528-140808/edk2/SBSA_FLASH1.fd.xz"
>           )
> -        fs1_xz_hash = "cb0a5e8cf5e303c5d3dc106cfd5943ffe9714b86afddee7164c69ee1dd41991c"
> +        fs1_xz_hash = "5f3747d4000bc416d9641e33ff4ac60c3cc8cb74ca51b6e932e58531c62eb6f7"
>           tar_xz_path = self.fetch_asset(fs1_xz_url, asset_hash=fs1_xz_hash,
>                                         algorithm='sha256')
>           archive.extract(tar_xz_path, self.workdir)
> @@ -98,15 +98,15 @@ def test_sbsaref_edk2_firmware(self):
>   
>           # AP Trusted ROM
>           wait_for_console_pattern(self, "Booting Trusted Firmware")
> -        wait_for_console_pattern(self, "BL1: v2.10.2(release):")
> +        wait_for_console_pattern(self, "BL1: v2.11.0(release):")
>           wait_for_console_pattern(self, "BL1: Booting BL2")
>   
>           # Trusted Boot Firmware
> -        wait_for_console_pattern(self, "BL2: v2.10.2(release)")
> +        wait_for_console_pattern(self, "BL2: v2.11.0(release)")
>           wait_for_console_pattern(self, "Booting BL31")
>   
>           # EL3 Runtime Software
> -        wait_for_console_pattern(self, "BL31: v2.10.2(release)")
> +        wait_for_console_pattern(self, "BL31: v2.11.0(release)")
>   
>           # Non-trusted Firmware
>           wait_for_console_pattern(self, "UEFI firmware (version 1.0")
Marcin Juszkiewicz May 29, 2024, 1:37 p.m. UTC | #2
W dniu 29.05.2024 o 15:12, Leif Lindholm pisze:
> On 2024-05-28 19:29, Marcin Juszkiewicz wrote:
>> Partial support for NUMA setup:
>> - cpu nodes
>> - memory nodes
>>
>> Used versions:
>>
>> - Trusted Firmware v2.11.0
>> - Tianocore EDK2 stable202405
>> - Tianocore EDK2 Platforms code commit 4bbd0ed
>>
>> Firmware is built using Debian 'bookworm' cross toolchain (gcc 12.2.0).
> 
> Missing signoff?

Ooops.

Signed-off-by: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org>

> Apart from that:
> Reviewed-by: Leif Lindholm <quic_llindhol@quicinc.com>
> 
>> ---
>>   tests/avocado/machine_aarch64_sbsaref.py | 20 ++++++++++----------
>>   1 file changed, 10 insertions(+), 10 deletions(-)
>>
>> diff --git a/tests/avocado/machine_aarch64_sbsaref.py 
>> b/tests/avocado/machine_aarch64_sbsaref.py
>> index 98c76c1ff7..6bb82f2a03 100644
>> --- a/tests/avocado/machine_aarch64_sbsaref.py
>> +++ b/tests/avocado/machine_aarch64_sbsaref.py
>> @@ -37,18 +37,18 @@ def fetch_firmware(self):
>>           Used components:
>> -        - Trusted Firmware 2.10.2
>> -        - Tianocore EDK2 stable202402
>> -        - Tianocore EDK2-platforms commit 085c2fb
>> +        - Trusted Firmware 2.11.0
>> +        - Tianocore EDK2 stable202405
>> +        - Tianocore EDK2-platforms commit 4bbd0ed
>>           """
>>           # Secure BootRom (TF-A code)
>>           fs0_xz_url = (
>>               
>> "https://artifacts.codelinaro.org/artifactory/linaro-419-sbsa-ref/"
>> -            "20240313-116475/edk2/SBSA_FLASH0.fd.xz"
>> +            "20240528-140808/edk2/SBSA_FLASH0.fd.xz"
>>           )
>> -        fs0_xz_hash = 
>> "637593749cc307dea7dc13265c32e5d020267552f22b18a31850b8429fc5e159"
>> +        fs0_xz_hash = 
>> "fa6004900b67172914c908b78557fec4d36a5f784f4c3dd08f49adb75e1892a9"
>>           tar_xz_path = self.fetch_asset(fs0_xz_url, 
>> asset_hash=fs0_xz_hash,
>>                                         algorithm='sha256')
>>           archive.extract(tar_xz_path, self.workdir)
>> @@ -57,9 +57,9 @@ def fetch_firmware(self):
>>           # Non-secure rom (UEFI and EFI variables)
>>           fs1_xz_url = (
>>               
>> "https://artifacts.codelinaro.org/artifactory/linaro-419-sbsa-ref/"
>> -            "20240313-116475/edk2/SBSA_FLASH1.fd.xz"
>> +            "20240528-140808/edk2/SBSA_FLASH1.fd.xz"
>>           )
>> -        fs1_xz_hash = 
>> "cb0a5e8cf5e303c5d3dc106cfd5943ffe9714b86afddee7164c69ee1dd41991c"
>> +        fs1_xz_hash = 
>> "5f3747d4000bc416d9641e33ff4ac60c3cc8cb74ca51b6e932e58531c62eb6f7"
>>           tar_xz_path = self.fetch_asset(fs1_xz_url, 
>> asset_hash=fs1_xz_hash,
>>                                         algorithm='sha256')
>>           archive.extract(tar_xz_path, self.workdir)
>> @@ -98,15 +98,15 @@ def test_sbsaref_edk2_firmware(self):
>>           # AP Trusted ROM
>>           wait_for_console_pattern(self, "Booting Trusted Firmware")
>> -        wait_for_console_pattern(self, "BL1: v2.10.2(release):")
>> +        wait_for_console_pattern(self, "BL1: v2.11.0(release):")
>>           wait_for_console_pattern(self, "BL1: Booting BL2")
>>           # Trusted Boot Firmware
>> -        wait_for_console_pattern(self, "BL2: v2.10.2(release)")
>> +        wait_for_console_pattern(self, "BL2: v2.11.0(release)")
>>           wait_for_console_pattern(self, "Booting BL31")
>>           # EL3 Runtime Software
>> -        wait_for_console_pattern(self, "BL31: v2.10.2(release)")
>> +        wait_for_console_pattern(self, "BL31: v2.11.0(release)")
>>           # Non-trusted Firmware
>>           wait_for_console_pattern(self, "UEFI firmware (version 1.0")
>
Alex Bennée May 29, 2024, 3:34 p.m. UTC | #3
Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org> writes:

> Partial support for NUMA setup:
> - cpu nodes
> - memory nodes
>
> Used versions:
>
> - Trusted Firmware v2.11.0
> - Tianocore EDK2 stable202405
> - Tianocore EDK2 Platforms code commit 4bbd0ed
>
> Firmware is built using Debian 'bookworm' cross toolchain (gcc
> 12.2.0).

Queued to testing/next, thanks.
diff mbox series

Patch

diff --git a/tests/avocado/machine_aarch64_sbsaref.py b/tests/avocado/machine_aarch64_sbsaref.py
index 98c76c1ff7..6bb82f2a03 100644
--- a/tests/avocado/machine_aarch64_sbsaref.py
+++ b/tests/avocado/machine_aarch64_sbsaref.py
@@ -37,18 +37,18 @@  def fetch_firmware(self):
 
         Used components:
 
-        - Trusted Firmware 2.10.2
-        - Tianocore EDK2 stable202402
-        - Tianocore EDK2-platforms commit 085c2fb
+        - Trusted Firmware 2.11.0
+        - Tianocore EDK2 stable202405
+        - Tianocore EDK2-platforms commit 4bbd0ed
 
         """
 
         # Secure BootRom (TF-A code)
         fs0_xz_url = (
             "https://artifacts.codelinaro.org/artifactory/linaro-419-sbsa-ref/"
-            "20240313-116475/edk2/SBSA_FLASH0.fd.xz"
+            "20240528-140808/edk2/SBSA_FLASH0.fd.xz"
         )
-        fs0_xz_hash = "637593749cc307dea7dc13265c32e5d020267552f22b18a31850b8429fc5e159"
+        fs0_xz_hash = "fa6004900b67172914c908b78557fec4d36a5f784f4c3dd08f49adb75e1892a9"
         tar_xz_path = self.fetch_asset(fs0_xz_url, asset_hash=fs0_xz_hash,
                                       algorithm='sha256')
         archive.extract(tar_xz_path, self.workdir)
@@ -57,9 +57,9 @@  def fetch_firmware(self):
         # Non-secure rom (UEFI and EFI variables)
         fs1_xz_url = (
             "https://artifacts.codelinaro.org/artifactory/linaro-419-sbsa-ref/"
-            "20240313-116475/edk2/SBSA_FLASH1.fd.xz"
+            "20240528-140808/edk2/SBSA_FLASH1.fd.xz"
         )
-        fs1_xz_hash = "cb0a5e8cf5e303c5d3dc106cfd5943ffe9714b86afddee7164c69ee1dd41991c"
+        fs1_xz_hash = "5f3747d4000bc416d9641e33ff4ac60c3cc8cb74ca51b6e932e58531c62eb6f7"
         tar_xz_path = self.fetch_asset(fs1_xz_url, asset_hash=fs1_xz_hash,
                                       algorithm='sha256')
         archive.extract(tar_xz_path, self.workdir)
@@ -98,15 +98,15 @@  def test_sbsaref_edk2_firmware(self):
 
         # AP Trusted ROM
         wait_for_console_pattern(self, "Booting Trusted Firmware")
-        wait_for_console_pattern(self, "BL1: v2.10.2(release):")
+        wait_for_console_pattern(self, "BL1: v2.11.0(release):")
         wait_for_console_pattern(self, "BL1: Booting BL2")
 
         # Trusted Boot Firmware
-        wait_for_console_pattern(self, "BL2: v2.10.2(release)")
+        wait_for_console_pattern(self, "BL2: v2.11.0(release)")
         wait_for_console_pattern(self, "Booting BL31")
 
         # EL3 Runtime Software
-        wait_for_console_pattern(self, "BL31: v2.10.2(release)")
+        wait_for_console_pattern(self, "BL31: v2.11.0(release)")
 
         # Non-trusted Firmware
         wait_for_console_pattern(self, "UEFI firmware (version 1.0")