27bf08e4ad
This new binutils version break the ATF build due to new linker warnings: ld.bfd: warning: bl2.elf has a LOAD segment with RWX permissions From [1] "Users of GNU ld (BPF) from binutils 2.39+ will observe multiple instaces of a new warning when linking the bl*.elf in the form: ld.bfd: warning: stm32mp1_helper.o: missing .note.GNU-stack section implies executable stack ld.bfd: NOTE: This behaviour is deprecated and will be removed in a future version of the linker ld.bfd: warning: bl2.elf has a LOAD segment with RWX permissions ld.bfd: warning: bl32.elf has a LOAD segment with RWX permissions These new warnings are enbaled by default to secure elf binaries: - https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=ba951afb99912da01a6e8434126b8fac7aa75107 - https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=0d38576a34ec64a1b4500c9277a8e9d0f07e6774 " Bump the ATF custom version to 2.9 for binutils 2.39+ support. Fixes: https://gitlab.com/buildroot.org/buildroot/-/jobs/4889436283 Signed-off-by: Romain Naour <romain.naour@gmail.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
36 lines
1.5 KiB
Plaintext
36 lines
1.5 KiB
Plaintext
BR2_arm=y
|
|
BR2_cortex_a7=y
|
|
BR2_PACKAGE_HOST_LINUX_HEADERS_CUSTOM_5_8=y
|
|
BR2_ROOTFS_OVERLAY="board/arrow/avenger96/overlay/"
|
|
BR2_ROOTFS_POST_IMAGE_SCRIPT="board/stmicroelectronics/common/stm32mp157/post-image.sh"
|
|
BR2_LINUX_KERNEL=y
|
|
BR2_LINUX_KERNEL_CUSTOM_VERSION=y
|
|
BR2_LINUX_KERNEL_CUSTOM_VERSION_VALUE="5.8.13"
|
|
BR2_LINUX_KERNEL_DEFCONFIG="multi_v7"
|
|
BR2_LINUX_KERNEL_DTS_SUPPORT=y
|
|
BR2_LINUX_KERNEL_INTREE_DTS_NAME="stm32mp157a-dhcor-avenger96"
|
|
BR2_LINUX_KERNEL_INSTALL_TARGET=y
|
|
BR2_LINUX_KERNEL_NEEDS_HOST_OPENSSL=y
|
|
BR2_TARGET_ROOTFS_EXT2=y
|
|
BR2_TARGET_ROOTFS_EXT2_4=y
|
|
BR2_TARGET_ROOTFS_EXT2_SIZE="120M"
|
|
# BR2_TARGET_ROOTFS_TAR is not set
|
|
BR2_TARGET_ARM_TRUSTED_FIRMWARE=y
|
|
BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_VERSION=y
|
|
BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_VERSION_VALUE="v2.9"
|
|
BR2_TARGET_ARM_TRUSTED_FIRMWARE_PLATFORM="stm32mp1"
|
|
BR2_TARGET_ARM_TRUSTED_FIRMWARE_ADDITIONAL_VARIABLES="STM32MP_SDMMC=1 AARCH32_SP=sp_min DTB_FILE_NAME=stm32mp157a-avenger96.dtb"
|
|
BR2_TARGET_ARM_TRUSTED_FIRMWARE_DEBUG=y
|
|
BR2_TARGET_ARM_TRUSTED_FIRMWARE_IMAGES="*.stm32"
|
|
BR2_TARGET_ARM_TRUSTED_FIRMWARE_NEEDS_DTC=y
|
|
BR2_TARGET_UBOOT=y
|
|
BR2_TARGET_UBOOT_BUILD_SYSTEM_KCONFIG=y
|
|
BR2_TARGET_UBOOT_CUSTOM_VERSION=y
|
|
BR2_TARGET_UBOOT_CUSTOM_VERSION_VALUE="2020.07"
|
|
BR2_TARGET_UBOOT_BOARD_DEFCONFIG="stm32mp15_trusted"
|
|
# BR2_TARGET_UBOOT_FORMAT_BIN is not set
|
|
BR2_TARGET_UBOOT_FORMAT_STM32=y
|
|
BR2_TARGET_UBOOT_BUILD_FORMAT_STM32_LEGACY=y
|
|
BR2_TARGET_UBOOT_CUSTOM_MAKEOPTS="DEVICE_TREE=stm32mp15xx-dhcor-avenger96"
|
|
BR2_PACKAGE_HOST_GENIMAGE=y
|