blob: 008103469e22031e21f657ec3c292e8bac125397 [file] [log] [blame]
Brad Bishopbec4ebc2022-08-03 09:55:16 -04001# Corstone1000 64-bit machines specific TFA support
2
3COMPATIBLE_MACHINE = "(corstone1000)"
4
5FILESEXTRAPATHS:prepend := "${THISDIR}/files/corstone1000:"
6
7SRC_URI:append = " \
8 file://0001-Fix-FF-A-version-in-SPMC-manifest.patch \
Andrew Geissler2daf84b2023-03-31 09:57:23 -05009 file://0002-feat-corstone1000-bl2-loads-fip-based-on-metadata.patch \
10 "
Brad Bishopbec4ebc2022-08-03 09:55:16 -040011
12TFA_DEBUG = "1"
13TFA_UBOOT ?= "1"
14TFA_MBEDTLS = "1"
15TFA_BUILD_TARGET = "bl2 bl31 fip"
16
17# Enabling Secure-EL1 Payload Dispatcher (SPD)
18TFA_SPD = "spmd"
19# Cortex-A35 supports Armv8.0-A (no S-EL2 execution state).
20# So, the SPD SPMC component should run at the S-EL1 execution state
21TFA_SPMD_SPM_AT_SEL2 = "0"
22
23# BL2 loads BL32 (optee). So, optee needs to be built first:
24DEPENDS += "optee-os"
25
26EXTRA_OEMAKE:append = " \
27 ARCH=aarch64 \
28 TARGET_PLATFORM=${TFA_TARGET_PLATFORM} \
29 ENABLE_STACK_PROTECTOR=strong \
30 ENABLE_PIE=1 \
31 BL2_AT_EL3=1 \
32 CREATE_KEYS=1 \
33 GENERATE_COT=1 \
34 TRUSTED_BOARD_BOOT=1 \
Andrew Geissler2daf84b2023-03-31 09:57:23 -050035 ARM_GPT_SUPPORT=1 \
36 PSA_FWU_SUPPORT=1 \
37 NR_OF_IMAGES_IN_FW_BANK=4 \
Brad Bishopbec4ebc2022-08-03 09:55:16 -040038 COT=tbbr \
39 ARM_ROTPK_LOCATION=devel_rsa \
40 ROT_KEY=plat/arm/board/common/rotpk/arm_rotprivk_rsa.pem \
41 BL32=${RECIPE_SYSROOT}/lib/firmware/tee-pager_v2.bin \
42 LOG_LEVEL=50 \
43 "