48 lines
1.6 KiB
PHP
48 lines
1.6 KiB
PHP
|
|
# Corstone1000 64-bit machines specific TFA support
|
||
|
|
|
||
|
|
COMPATIBLE_MACHINE = "(corstone1000)"
|
||
|
|
|
||
|
|
FILESEXTRAPATHS:prepend := "${THISDIR}/files/corstone1000:"
|
||
|
|
|
||
|
|
SRC_URI:append = " \
|
||
|
|
file://0001-Fix-FF-A-version-in-SPMC-manifest.patch \
|
||
|
|
file://0002-feat-corstone1000-bl2-loads-fip-based-on-metadata.patch \
|
||
|
|
"
|
||
|
|
|
||
|
|
#Sets TF-A version to 2.8.0
|
||
|
|
SRCREV_tfa = "9881bb93a3bc0a3ea37e9f093e09ab4b360a9e48"
|
||
|
|
PV = "2.8.0"
|
||
|
|
|
||
|
|
TFA_DEBUG = "1"
|
||
|
|
TFA_UBOOT ?= "1"
|
||
|
|
TFA_MBEDTLS = "1"
|
||
|
|
TFA_BUILD_TARGET = "bl2 bl31 fip"
|
||
|
|
|
||
|
|
# Enabling Secure-EL1 Payload Dispatcher (SPD)
|
||
|
|
TFA_SPD = "spmd"
|
||
|
|
# Cortex-A35 supports Armv8.0-A (no S-EL2 execution state).
|
||
|
|
# So, the SPD SPMC component should run at the S-EL1 execution state
|
||
|
|
TFA_SPMD_SPM_AT_SEL2 = "0"
|
||
|
|
|
||
|
|
# BL2 loads BL32 (optee). So, optee needs to be built first:
|
||
|
|
DEPENDS += "optee-os"
|
||
|
|
|
||
|
|
EXTRA_OEMAKE:append = " \
|
||
|
|
ARCH=aarch64 \
|
||
|
|
TARGET_PLATFORM=${TFA_TARGET_PLATFORM} \
|
||
|
|
ENABLE_STACK_PROTECTOR=strong \
|
||
|
|
ENABLE_PIE=1 \
|
||
|
|
BL2_AT_EL3=1 \
|
||
|
|
CREATE_KEYS=1 \
|
||
|
|
GENERATE_COT=1 \
|
||
|
|
TRUSTED_BOARD_BOOT=1 \
|
||
|
|
ARM_GPT_SUPPORT=1 \
|
||
|
|
PSA_FWU_SUPPORT=1 \
|
||
|
|
NR_OF_IMAGES_IN_FW_BANK=4 \
|
||
|
|
COT=tbbr \
|
||
|
|
ARM_ROTPK_LOCATION=devel_rsa \
|
||
|
|
ROT_KEY=plat/arm/board/common/rotpk/arm_rotprivk_rsa.pem \
|
||
|
|
BL32=${RECIPE_SYSROOT}/lib/firmware/tee-pager_v2.bin \
|
||
|
|
LOG_LEVEL=50 \
|
||
|
|
"
|