Your message dated Tue, 27 Nov 2018 23:00:10 +0000 with message-id <e1grmkw-000eco...@fasolo.debian.org> and subject line Bug#881620: fixed in arm-trusted-firmware 2.0+267~cabe0a31-1 has caused the Debian Bug report #881620, regarding ITP: arm-trusted-firmware -- reference implementation of secure world software for ARMv8-A to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 881620: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881620 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: wnpp Owner: Vagrant Cascadian <vagr...@debian.org> Severity: wishlist * Package name : arm-trusted-firmware Version : 1.4 Upstream Author : ARM Limited and Contributors * URL or Web page : https://github.com/ARM-software/arm-trusted-firmware/ * License : BSD-2-Clause, BSD-3-Clause, Expat, ISC Description : reference implementation of secure world software for ARMv8-A ARM Trusted Firmware provides a reference implementation of secure world software for `ARMv8-A`_, including a `Secure Monitor`_ executing at Exception Level 3 (EL3). It implements various ARM interface standards, such as: - The `Power State Coordination Interface (PSCI)`_ - Trusted Board Boot Requirements (TBBR, ARM DEN0006C-1) - `SMC Calling Convention`_ - `System Control and Management Interface`_ As far as possible the code is designed for reuse or porting to other ARMv8-A model and hardware platforms. ARM will continue development in collaboration with interested parties to provide a full reference implementation of Secure Monitor code and ARM standards to the benefit of all developers working with ARMv8-A TrustZone technology. -------------------------- This is needed to boot various arm64 boards (pine64, firefly-rk3399) that may not have built-in firmware shipped with them, possibly in conjunction with an EFI implementation or u-boot. Some considerations when packaging this: - Not all vendors are merged upstream; there are several vendor-specific forks that are needed in order to support specific hardware, such as support for allwinner A64: https://github.com/apritzel/arm-trusted-firmware I would definitely need some help with initial and long-term maintenance to make this a reality... live well, vagrantsignature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---Source: arm-trusted-firmware Source-Version: 2.0+267~cabe0a31-1 We believe that the bug you reported is fixed in the latest version of arm-trusted-firmware, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 881...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Vagrant Cascadian <vagr...@debian.org> (supplier of updated arm-trusted-firmware package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Mon, 19 Nov 2018 14:25:59 -0800 Source: arm-trusted-firmware Binary: arm-trusted-firmware Architecture: source arm64 Version: 2.0+267~cabe0a31-1 Distribution: experimental Urgency: medium Maintainer: Vagrant Cascadian <vagr...@debian.org> Changed-By: Vagrant Cascadian <vagr...@debian.org> Description: arm-trusted-firmware - "secure world" software for ARM SoCs Closes: 881620 Changes: arm-trusted-firmware (2.0+267~cabe0a31-1) experimental; urgency=medium . * Upstream git snapshot from commit cabe0a31801e99e7abb84d2114ded6bb56f3c71e. * Initial upload to Debian (Closes: #881620). Checksums-Sha1: 2b95333c811fffb691f506a36d0565056bb3378a 1501 arm-trusted-firmware_2.0+267~cabe0a31-1.dsc bcfba9a8cdea2f358e2e3ea75c6bf734c69f6b83 2656736 arm-trusted-firmware_2.0+267~cabe0a31.orig.tar.xz ee2476294a419b82a5539ac0c1a1a0fe5be49835 4344 arm-trusted-firmware_2.0+267~cabe0a31-1.debian.tar.xz b8b64c619d2a9310b4b89c273bacf5ba486fb163 4789 arm-trusted-firmware_2.0+267~cabe0a31-1_arm64.buildinfo db9f2b15c4b87ec69e4b4812c9ac3da3dfc53242 53820 arm-trusted-firmware_2.0+267~cabe0a31-1_arm64.deb Checksums-Sha256: e1c7571bbe4d2a9231b2e5d9b6b49eb5c939a75b3a722951a2dad69bccda3e50 1501 arm-trusted-firmware_2.0+267~cabe0a31-1.dsc 10ccb977b1b1f38a5a0d96497e04f32bb4850849723ae1162bc7a9f93287d208 2656736 arm-trusted-firmware_2.0+267~cabe0a31.orig.tar.xz d0260e97b2a4b8cd186c4b69cccb3eeb5e34e797ddb5f9e465d0703ee1febf47 4344 arm-trusted-firmware_2.0+267~cabe0a31-1.debian.tar.xz 8863559f2a137cc64828972f05a25385793a0824b977686e9ee32ef520228137 4789 arm-trusted-firmware_2.0+267~cabe0a31-1_arm64.buildinfo fc70fc8960d1c8e196cddc8278bc9bb4a6b22f411e4ccbe3b058b8ec805d3faa 53820 arm-trusted-firmware_2.0+267~cabe0a31-1_arm64.deb Files: 094dbc44f84be47486dfc9c0e2e26ec3 1501 admin optional arm-trusted-firmware_2.0+267~cabe0a31-1.dsc 20296912bec5c9444c24465650a58b6c 2656736 admin optional arm-trusted-firmware_2.0+267~cabe0a31.orig.tar.xz cca8d4fd580f8f81c15fc70444e0372c 4344 admin optional arm-trusted-firmware_2.0+267~cabe0a31-1.debian.tar.xz 4b6bf204f9ed3ae6f5e4b62c26a0b65b 4789 admin optional arm-trusted-firmware_2.0+267~cabe0a31-1_arm64.buildinfo 01cf251063c1da68674b4505af472d41 53820 admin optional arm-trusted-firmware_2.0+267~cabe0a31-1_arm64.deb -----BEGIN PGP SIGNATURE----- iIkEARYIADEWIQRlgHNhO/zFx+LkXUXcUY/If5cWqgUCW/M6oRMcdmFncmFudEBk ZWJpYW4ub3JnAAoJENxRj8h/lxaqkOUBAKjJfDEjPYXBE0zgTR01Xs2AsTxWUpku Eq3nnM8s4GUMAPwL7SSldc4j6GWpMkiaeXxnIGA2N+CMN/vGWrfvbufFCw== =nDvq -----END PGP SIGNATURE-----
--- End Message ---