xref: /OK3568_Linux_fs/buildroot/boot/arm-trusted-firmware/arm-trusted-firmware.mk (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1################################################################################
2#
3# arm-trusted-firmware
4#
5################################################################################
6
7ARM_TRUSTED_FIRMWARE_VERSION = $(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_VERSION))
8
9ifeq ($(ARM_TRUSTED_FIRMWARE_VERSION),custom)
10# Handle custom ATF tarballs as specified by the configuration
11ARM_TRUSTED_FIRMWARE_TARBALL = $(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_TARBALL_LOCATION))
12ARM_TRUSTED_FIRMWARE_SITE = $(patsubst %/,%,$(dir $(ARM_TRUSTED_FIRMWARE_TARBALL)))
13ARM_TRUSTED_FIRMWARE_SOURCE = $(notdir $(ARM_TRUSTED_FIRMWARE_TARBALL))
14else ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_GIT),y)
15ARM_TRUSTED_FIRMWARE_SITE = $(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_REPO_URL))
16ARM_TRUSTED_FIRMWARE_SITE_METHOD = git
17else
18# Handle stable official ATF versions
19ARM_TRUSTED_FIRMWARE_SITE = $(call github,ARM-software,arm-trusted-firmware,$(ARM_TRUSTED_FIRMWARE_VERSION))
20# The licensing of custom or from-git versions is unknown.
21# This is valid only for the latest (i.e. known) version.
22ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_LATEST_VERSION),y)
23ARM_TRUSTED_FIRMWARE_LICENSE = BSD-3-Clause
24ARM_TRUSTED_FIRMWARE_LICENSE_FILES = docs/license.rst
25endif
26endif
27
28ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE)$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_LATEST_VERSION),y)
29BR_NO_CHECK_HASH_FOR += $(ARM_TRUSTED_FIRMWARE_SOURCE)
30endif
31
32ARM_TRUSTED_FIRMWARE_INSTALL_IMAGES = YES
33
34ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_NEEDS_DTC),y)
35ARM_TRUSTED_FIRMWARE_DEPENDENCIES += host-dtc
36endif
37
38ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_NEEDS_ARM32_TOOLCHAIN),y)
39ARM_TRUSTED_FIRMWARE_DEPENDENCIES += host-arm-gnu-a-toolchain
40endif
41
42ARM_TRUSTED_FIRMWARE_PLATFORM = $(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_PLATFORM))
43
44ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_DEBUG),y)
45ARM_TRUSTED_FIRMWARE_MAKE_OPTS += DEBUG=1
46ARM_TRUSTED_FIRMWARE_IMG_DIR = $(@D)/build/$(ARM_TRUSTED_FIRMWARE_PLATFORM)/debug
47else
48ARM_TRUSTED_FIRMWARE_IMG_DIR = $(@D)/build/$(ARM_TRUSTED_FIRMWARE_PLATFORM)/release
49endif
50
51ARM_TRUSTED_FIRMWARE_MAKE_OPTS += \
52	CROSS_COMPILE="$(TARGET_CROSS)" \
53	$(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_ADDITIONAL_VARIABLES)) \
54	PLAT=$(ARM_TRUSTED_FIRMWARE_PLATFORM)
55
56ARM_TRUSTED_FIRMWARE_MAKE_ENV += \
57	$(TARGET_MAKE_ENV) \
58	ENABLE_STACK_PROTECTOR=$(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_SSP_LEVEL))
59
60ifeq ($(BR2_ARM_CPU_ARMV7A),y)
61ARM_TRUSTED_FIRMWARE_MAKE_OPTS += ARM_ARCH_MAJOR=7
62else ifeq ($(BR2_ARM_CPU_ARMV8A),y)
63ARM_TRUSTED_FIRMWARE_MAKE_OPTS += ARM_ARCH_MAJOR=8
64endif
65
66ifeq ($(BR2_arm),y)
67ARM_TRUSTED_FIRMWARE_MAKE_OPTS += ARCH=aarch32
68else ifeq ($(BR2_aarch64),y)
69ARM_TRUSTED_FIRMWARE_MAKE_OPTS += ARCH=aarch64
70endif
71
72ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_BL32_OPTEE),y)
73ARM_TRUSTED_FIRMWARE_DEPENDENCIES += optee-os
74ARM_TRUSTED_FIRMWARE_MAKE_OPTS += \
75	BL32=$(BINARIES_DIR)/tee-header_v2.bin \
76	BL32_EXTRA1=$(BINARIES_DIR)/tee-pager_v2.bin \
77	BL32_EXTRA2=$(BINARIES_DIR)/tee-pageable_v2.bin
78ifeq ($(BR2_aarch64),y)
79ARM_TRUSTED_FIRMWARE_MAKE_OPTS += SPD=opteed
80endif
81ifeq ($(BR2_arm),y)
82ARM_TRUSTED_FIRMWARE_MAKE_OPTS += AARCH32_SP=optee
83endif
84endif # BR2_TARGET_ARM_TRUSTED_FIRMWARE_BL32_OPTEE
85
86ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_EDK2_AS_BL33),y)
87ARM_TRUSTED_FIRMWARE_DEPENDENCIES += edk2
88# Since the flash device name vary between platforms, we use the variable
89# provided by the EDK2 package for this. Using this variable here is OK
90# as it will expand after all dependencies are resolved, inside _BUILD_CMDS.
91ARM_TRUSTED_FIRMWARE_MAKE_OPTS += \
92	BL33=$(BINARIES_DIR)/$(call qstrip,$(BR2_TARGET_EDK2_FD_NAME).fd)
93endif
94
95ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_UBOOT_AS_BL33),y)
96ARM_TRUSTED_FIRMWARE_UBOOT_BIN = $(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_UBOOT_BL33_IMAGE))
97ARM_TRUSTED_FIRMWARE_MAKE_OPTS += BL33=$(BINARIES_DIR)/$(ARM_TRUSTED_FIRMWARE_UBOOT_BIN)
98ARM_TRUSTED_FIRMWARE_DEPENDENCIES += uboot
99endif
100
101ifeq ($(BR2_TARGET_VEXPRESS_FIRMWARE),y)
102ARM_TRUSTED_FIRMWARE_MAKE_OPTS += SCP_BL2=$(BINARIES_DIR)/scp-fw.bin
103ARM_TRUSTED_FIRMWARE_DEPENDENCIES += vexpress-firmware
104endif
105
106ifeq ($(BR2_TARGET_BINARIES_MARVELL),y)
107ARM_TRUSTED_FIRMWARE_MAKE_OPTS += SCP_BL2=$(BINARIES_DIR)/scp-fw.bin
108ARM_TRUSTED_FIRMWARE_DEPENDENCIES += binaries-marvell
109endif
110
111ifeq ($(BR2_TARGET_MV_DDR_MARVELL),y)
112ARM_TRUSTED_FIRMWARE_MAKE_OPTS += MV_DDR_PATH=$(MV_DDR_MARVELL_DIR)
113ARM_TRUSTED_FIRMWARE_DEPENDENCIES += mv-ddr-marvell
114endif
115
116ARM_TRUSTED_FIRMWARE_MAKE_TARGETS = all
117
118ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_FIP),y)
119ARM_TRUSTED_FIRMWARE_MAKE_TARGETS += fip
120ARM_TRUSTED_FIRMWARE_DEPENDENCIES += host-openssl
121# fiptool only exists in newer (>= 1.3) versions of ATF, so we build
122# it conditionally. We need to explicitly build it as it requires
123# OpenSSL, and therefore needs to be passed proper variables to find
124# the host OpenSSL.
125define ARM_TRUSTED_FIRMWARE_BUILD_FIPTOOL
126	if test -d $(@D)/tools/fiptool; then \
127		$(TARGET_CONFIGURE_OPTS) $(MAKE) -C $(@D)/tools/fiptool \
128			$(ARM_TRUSTED_FIRMWARE_MAKE_OPTS) \
129			CPPFLAGS="$(HOST_CPPFLAGS)" \
130			LDLIBS="$(HOST_LDFLAGS) -lcrypto" ; \
131	fi
132endef
133endif
134
135ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_BL31),y)
136ARM_TRUSTED_FIRMWARE_MAKE_TARGETS += bl31
137endif
138
139ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_BL31_UBOOT),y)
140define ARM_TRUSTED_FIRMWARE_BL31_UBOOT_BUILD
141# Get the entry point address from the elf.
142	BASE_ADDR=$$($(TARGET_READELF) -h $(ARM_TRUSTED_FIRMWARE_IMG_DIR)/bl31/bl31.elf | \
143	             sed -r '/^  Entry point address:\s*(.*)/!d; s//\1/') && \
144	$(MKIMAGE) \
145		-A $(MKIMAGE_ARCH) -O arm-trusted-firmware -C none \
146		-a $${BASE_ADDR} -e $${BASE_ADDR} \
147		-d $(ARM_TRUSTED_FIRMWARE_IMG_DIR)/bl31.bin \
148		$(ARM_TRUSTED_FIRMWARE_IMG_DIR)/atf-uboot.ub
149endef
150define ARM_TRUSTED_FIRMWARE_BL31_UBOOT_INSTALL
151	$(INSTALL) -m 0644 $(ARM_TRUSTED_FIRMWARE_IMG_DIR)/atf-uboot.ub \
152		$(BINARIES_DIR)/atf-uboot.ub
153endef
154ARM_TRUSTED_FIRMWARE_MAKE_OPTS += RESET_TO_BL31=1
155ARM_TRUSTED_FIRMWARE_DEPENDENCIES += host-uboot-tools
156endif
157
158ifeq ($(BR2_TARGET_UBOOT_NEEDS_ATF_BL31_ELF),y)
159define ARM_TRUSTED_FIRMWARE_BL31_UBOOT_INSTALL_ELF
160	$(INSTALL) -D -m 0644 $(ARM_TRUSTED_FIRMWARE_IMG_DIR)/bl31/bl31.elf \
161		$(BINARIES_DIR)/bl31.elf
162endef
163endif
164
165ARM_TRUSTED_FIRMWARE_MAKE_TARGETS += \
166	$(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_ADDITIONAL_TARGETS))
167
168ARM_TRUSTED_FIRMWARE_CUSTOM_DTS_PATH = $(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_DTS_PATH))
169
170define ARM_TRUSTED_FIRMWARE_BUILD_CMDS
171	$(if $(ARM_TRUSTED_FIRMWARE_CUSTOM_DTS_PATH),
172		cp -f $(ARM_TRUSTED_FIRMWARE_CUSTOM_DTS_PATH) $(@D)/fdts/
173	)
174	$(ARM_TRUSTED_FIRMWARE_BUILD_FIPTOOL)
175	$(ARM_TRUSTED_FIRMWARE_MAKE_ENV) $(MAKE) -C $(@D) \
176		$(ARM_TRUSTED_FIRMWARE_MAKE_OPTS) \
177		$(ARM_TRUSTED_FIRMWARE_MAKE_TARGETS)
178	$(ARM_TRUSTED_FIRMWARE_BL31_UBOOT_BUILD)
179endef
180
181define ARM_TRUSTED_FIRMWARE_INSTALL_IMAGES_CMDS
182	$(foreach f,$(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_IMAGES)), \
183		cp -dpf $(ARM_TRUSTED_FIRMWARE_IMG_DIR)/$(f) $(BINARIES_DIR)/
184	)
185	$(ARM_TRUSTED_FIRMWARE_BL31_UBOOT_INSTALL)
186	$(ARM_TRUSTED_FIRMWARE_BL31_UBOOT_INSTALL_ELF)
187endef
188
189# Configuration check
190ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE)$(BR_BUILDING),yy)
191
192ifeq ($(ARM_TRUSTED_FIRMWARE_VERSION),custom)
193ifeq ($(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_TARBALL_LOCATION))),)
194$(error No tarball location specified. Please check BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_TARBALL_LOCATION))
195endif
196endif
197
198ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_GIT),y)
199ifeq ($(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_REPO_URL)),)
200$(error No repository specified. Please check BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_REPO_URL)
201endif
202endif
203
204endif
205
206$(eval $(generic-package))
207