| # Corstone1000 64-bit machines specific TFA support |
| |
| COMPATIBLE_MACHINE = "(corstone1000)" |
| |
| FILESEXTRAPATHS:prepend := "${THISDIR}/files/corstone1000:" |
| |
| SRC_URI:append = " \ |
| file://0001-Fix-FF-A-version-in-SPMC-manifest.patch \ |
| file://0002-feat-corstone1000-bl2-loads-fip-based-on-metadata.patch \ |
| file://0003-psci-SMCCC_ARCH_FEATURES-discovery-through-PSCI_FEATURES.patch \ |
| " |
| |
| #Sets TF-A version to 2.8.0 |
| SRCREV_tfa = "9881bb93a3bc0a3ea37e9f093e09ab4b360a9e48" |
| PV = "2.8.0" |
| |
| TFA_DEBUG = "1" |
| TFA_UBOOT ?= "1" |
| TFA_MBEDTLS = "1" |
| TFA_BUILD_TARGET = "bl2 bl31 fip" |
| |
| # Enabling Secure-EL1 Payload Dispatcher (SPD) |
| TFA_SPD = "spmd" |
| # Cortex-A35 supports Armv8.0-A (no S-EL2 execution state). |
| # So, the SPD SPMC component should run at the S-EL1 execution state |
| TFA_SPMD_SPM_AT_SEL2 = "0" |
| |
| # BL2 loads BL32 (optee). So, optee needs to be built first: |
| DEPENDS += "optee-os" |
| |
| EXTRA_OEMAKE:append = " \ |
| ARCH=aarch64 \ |
| TARGET_PLATFORM=${TFA_TARGET_PLATFORM} \ |
| ENABLE_STACK_PROTECTOR=strong \ |
| ENABLE_PIE=1 \ |
| BL2_AT_EL3=1 \ |
| CREATE_KEYS=1 \ |
| GENERATE_COT=1 \ |
| TRUSTED_BOARD_BOOT=1 \ |
| ARM_GPT_SUPPORT=1 \ |
| PSA_FWU_SUPPORT=1 \ |
| NR_OF_IMAGES_IN_FW_BANK=4 \ |
| COT=tbbr \ |
| ARM_ROTPK_LOCATION=devel_rsa \ |
| ROT_KEY=plat/arm/board/common/rotpk/arm_rotprivk_rsa.pem \ |
| BL32=${RECIPE_SYSROOT}/lib/firmware/tee-pager_v2.bin \ |
| LOG_LEVEL=50 \ |
| " |