Brad Bishop | bec4ebc | 2022-08-03 09:55:16 -0400 | [diff] [blame] | 1 | # N1SDP specific TFA support |
| 2 | |
Patrick Williams | 8dd6848 | 2022-10-04 07:57:18 -0500 | [diff] [blame^] | 3 | # Align with post-N1SDP-2022.06.22 refresh |
| 4 | SRCREV_tfa = "1309c6c805190bd376c0561597653f3f8ecd0f58" |
Patrick Williams | 92b42cb | 2022-09-03 06:53:57 -0500 | [diff] [blame] | 5 | PV .= "+git${SRCPV}" |
| 6 | |
Brad Bishop | bec4ebc | 2022-08-03 09:55:16 -0400 | [diff] [blame] | 7 | COMPATIBLE_MACHINE = "n1sdp" |
| 8 | TFA_PLATFORM = "n1sdp" |
| 9 | TFA_BUILD_TARGET = "all fip" |
| 10 | TFA_INSTALL_TARGET = "bl1 bl2 bl31 n1sdp-multi-chip n1sdp-single-chip n1sdp_fw_config n1sdp_tb_fw_config fip" |
| 11 | TFA_DEBUG = "1" |
| 12 | TFA_MBEDTLS = "1" |
| 13 | TFA_UBOOT = "0" |
| 14 | TFA_UEFI = "1" |
| 15 | |
Brad Bishop | bec4ebc | 2022-08-03 09:55:16 -0400 | [diff] [blame] | 16 | TFA_ROT_KEY= "plat/arm/board/common/rotpk/arm_rotprivk_rsa.pem" |
| 17 | |
Patrick Williams | 92b42cb | 2022-09-03 06:53:57 -0500 | [diff] [blame] | 18 | # Enabling Secure-EL1 Payload Dispatcher (SPD) |
| 19 | TFA_SPD = "spmd" |
| 20 | # Cortex-A35 supports Armv8.0-A (no S-EL2 execution state). |
| 21 | # So, the SPD SPMC component should run at the S-EL1 execution state |
| 22 | TFA_SPMD_SPM_AT_SEL2 = "0" |
| 23 | |
| 24 | # BL2 loads BL32 (optee). So, optee needs to be built first: |
| 25 | DEPENDS += "optee-os" |
| 26 | |
Brad Bishop | bec4ebc | 2022-08-03 09:55:16 -0400 | [diff] [blame] | 27 | EXTRA_OEMAKE:append = "\ |
| 28 | TRUSTED_BOARD_BOOT=1 \ |
Patrick Williams | 92b42cb | 2022-09-03 06:53:57 -0500 | [diff] [blame] | 29 | GENERATE_COT=1 \ |
| 30 | CREATE_KEYS=1 \ |
| 31 | ARM_ROTPK_LOCATION="devel_rsa" \ |
| 32 | ROT_KEY="${TFA_ROT_KEY}" \ |
| 33 | BL32=${RECIPE_SYSROOT}/lib/firmware/tee-pager_v2.bin \ |
| 34 | BL33=${RECIPE_SYSROOT}/firmware/uefi.bin \ |
| 35 | " |