1################################################################################ 2# 3# arm-trusted-firmware 4# 5################################################################################ 6 7ARM_TRUSTED_FIRMWARE_VERSION = $(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_VERSION)) 8 9ifeq ($(ARM_TRUSTED_FIRMWARE_VERSION),custom) 10# Handle custom ATF tarballs as specified by the configuration 11ARM_TRUSTED_FIRMWARE_TARBALL = $(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_TARBALL_LOCATION)) 12ARM_TRUSTED_FIRMWARE_SITE = $(patsubst %/,%,$(dir $(ARM_TRUSTED_FIRMWARE_TARBALL))) 13ARM_TRUSTED_FIRMWARE_SOURCE = $(notdir $(ARM_TRUSTED_FIRMWARE_TARBALL)) 14else ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_GIT),y) 15ARM_TRUSTED_FIRMWARE_SITE = $(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_REPO_URL)) 16ARM_TRUSTED_FIRMWARE_SITE_METHOD = git 17else 18# Handle stable official ATF versions 19ARM_TRUSTED_FIRMWARE_SITE = $(call github,ARM-software,arm-trusted-firmware,$(ARM_TRUSTED_FIRMWARE_VERSION)) 20# The licensing of custom or from-git versions is unknown. 21# This is valid only for the latest (i.e. known) version. 22ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_LATEST_VERSION),y) 23ARM_TRUSTED_FIRMWARE_LICENSE = BSD-3-Clause 24ARM_TRUSTED_FIRMWARE_LICENSE_FILES = docs/license.rst 25endif 26endif 27 28ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE)$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_LATEST_VERSION),y) 29BR_NO_CHECK_HASH_FOR += $(ARM_TRUSTED_FIRMWARE_SOURCE) 30endif 31 32ARM_TRUSTED_FIRMWARE_INSTALL_IMAGES = YES 33 34ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_NEEDS_DTC),y) 35ARM_TRUSTED_FIRMWARE_DEPENDENCIES += host-dtc 36endif 37 38ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_NEEDS_ARM32_TOOLCHAIN),y) 39ARM_TRUSTED_FIRMWARE_DEPENDENCIES += host-arm-gnu-a-toolchain 40endif 41 42ARM_TRUSTED_FIRMWARE_PLATFORM = $(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_PLATFORM)) 43 44ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_DEBUG),y) 45ARM_TRUSTED_FIRMWARE_MAKE_OPTS += DEBUG=1 46ARM_TRUSTED_FIRMWARE_IMG_DIR = $(@D)/build/$(ARM_TRUSTED_FIRMWARE_PLATFORM)/debug 47else 48ARM_TRUSTED_FIRMWARE_IMG_DIR = $(@D)/build/$(ARM_TRUSTED_FIRMWARE_PLATFORM)/release 49endif 50 51ARM_TRUSTED_FIRMWARE_MAKE_OPTS += \ 52 CROSS_COMPILE="$(TARGET_CROSS)" \ 53 $(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_ADDITIONAL_VARIABLES)) \ 54 PLAT=$(ARM_TRUSTED_FIRMWARE_PLATFORM) 55 56ARM_TRUSTED_FIRMWARE_MAKE_ENV += \ 57 $(TARGET_MAKE_ENV) \ 58 ENABLE_STACK_PROTECTOR=$(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_SSP_LEVEL)) 59 60ifeq ($(BR2_ARM_CPU_ARMV7A),y) 61ARM_TRUSTED_FIRMWARE_MAKE_OPTS += ARM_ARCH_MAJOR=7 62else ifeq ($(BR2_ARM_CPU_ARMV8A),y) 63ARM_TRUSTED_FIRMWARE_MAKE_OPTS += ARM_ARCH_MAJOR=8 64endif 65 66ifeq ($(BR2_arm),y) 67ARM_TRUSTED_FIRMWARE_MAKE_OPTS += ARCH=aarch32 68else ifeq ($(BR2_aarch64),y) 69ARM_TRUSTED_FIRMWARE_MAKE_OPTS += ARCH=aarch64 70endif 71 72ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_BL32_OPTEE),y) 73ARM_TRUSTED_FIRMWARE_DEPENDENCIES += optee-os 74ARM_TRUSTED_FIRMWARE_MAKE_OPTS += \ 75 BL32=$(BINARIES_DIR)/tee-header_v2.bin \ 76 BL32_EXTRA1=$(BINARIES_DIR)/tee-pager_v2.bin \ 77 BL32_EXTRA2=$(BINARIES_DIR)/tee-pageable_v2.bin 78ifeq ($(BR2_aarch64),y) 79ARM_TRUSTED_FIRMWARE_MAKE_OPTS += SPD=opteed 80endif 81ifeq ($(BR2_arm),y) 82ARM_TRUSTED_FIRMWARE_MAKE_OPTS += AARCH32_SP=optee 83endif 84endif # BR2_TARGET_ARM_TRUSTED_FIRMWARE_BL32_OPTEE 85 86ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_EDK2_AS_BL33),y) 87ARM_TRUSTED_FIRMWARE_DEPENDENCIES += edk2 88# Since the flash device name vary between platforms, we use the variable 89# provided by the EDK2 package for this. Using this variable here is OK 90# as it will expand after all dependencies are resolved, inside _BUILD_CMDS. 91ARM_TRUSTED_FIRMWARE_MAKE_OPTS += \ 92 BL33=$(BINARIES_DIR)/$(call qstrip,$(BR2_TARGET_EDK2_FD_NAME).fd) 93endif 94 95ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_UBOOT_AS_BL33),y) 96ARM_TRUSTED_FIRMWARE_UBOOT_BIN = $(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_UBOOT_BL33_IMAGE)) 97ARM_TRUSTED_FIRMWARE_MAKE_OPTS += BL33=$(BINARIES_DIR)/$(ARM_TRUSTED_FIRMWARE_UBOOT_BIN) 98ARM_TRUSTED_FIRMWARE_DEPENDENCIES += uboot 99endif 100 101ifeq ($(BR2_TARGET_VEXPRESS_FIRMWARE),y) 102ARM_TRUSTED_FIRMWARE_MAKE_OPTS += SCP_BL2=$(BINARIES_DIR)/scp-fw.bin 103ARM_TRUSTED_FIRMWARE_DEPENDENCIES += vexpress-firmware 104endif 105 106ifeq ($(BR2_TARGET_BINARIES_MARVELL),y) 107ARM_TRUSTED_FIRMWARE_MAKE_OPTS += SCP_BL2=$(BINARIES_DIR)/scp-fw.bin 108ARM_TRUSTED_FIRMWARE_DEPENDENCIES += binaries-marvell 109endif 110 111ifeq ($(BR2_TARGET_MV_DDR_MARVELL),y) 112ARM_TRUSTED_FIRMWARE_MAKE_OPTS += MV_DDR_PATH=$(MV_DDR_MARVELL_DIR) 113ARM_TRUSTED_FIRMWARE_DEPENDENCIES += mv-ddr-marvell 114endif 115 116ARM_TRUSTED_FIRMWARE_MAKE_TARGETS = all 117 118ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_FIP),y) 119ARM_TRUSTED_FIRMWARE_MAKE_TARGETS += fip 120ARM_TRUSTED_FIRMWARE_DEPENDENCIES += host-openssl 121# fiptool only exists in newer (>= 1.3) versions of ATF, so we build 122# it conditionally. We need to explicitly build it as it requires 123# OpenSSL, and therefore needs to be passed proper variables to find 124# the host OpenSSL. 125define ARM_TRUSTED_FIRMWARE_BUILD_FIPTOOL 126 if test -d $(@D)/tools/fiptool; then \ 127 $(TARGET_CONFIGURE_OPTS) $(MAKE) -C $(@D)/tools/fiptool \ 128 $(ARM_TRUSTED_FIRMWARE_MAKE_OPTS) \ 129 CPPFLAGS="$(HOST_CPPFLAGS)" \ 130 LDLIBS="$(HOST_LDFLAGS) -lcrypto" ; \ 131 fi 132endef 133endif 134 135ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_BL31),y) 136ARM_TRUSTED_FIRMWARE_MAKE_TARGETS += bl31 137endif 138 139ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_BL31_UBOOT),y) 140define ARM_TRUSTED_FIRMWARE_BL31_UBOOT_BUILD 141# Get the entry point address from the elf. 142 BASE_ADDR=$$($(TARGET_READELF) -h $(ARM_TRUSTED_FIRMWARE_IMG_DIR)/bl31/bl31.elf | \ 143 sed -r '/^ Entry point address:\s*(.*)/!d; s//\1/') && \ 144 $(MKIMAGE) \ 145 -A $(MKIMAGE_ARCH) -O arm-trusted-firmware -C none \ 146 -a $${BASE_ADDR} -e $${BASE_ADDR} \ 147 -d $(ARM_TRUSTED_FIRMWARE_IMG_DIR)/bl31.bin \ 148 $(ARM_TRUSTED_FIRMWARE_IMG_DIR)/atf-uboot.ub 149endef 150define ARM_TRUSTED_FIRMWARE_BL31_UBOOT_INSTALL 151 $(INSTALL) -m 0644 $(ARM_TRUSTED_FIRMWARE_IMG_DIR)/atf-uboot.ub \ 152 $(BINARIES_DIR)/atf-uboot.ub 153endef 154ARM_TRUSTED_FIRMWARE_MAKE_OPTS += RESET_TO_BL31=1 155ARM_TRUSTED_FIRMWARE_DEPENDENCIES += host-uboot-tools 156endif 157 158ifeq ($(BR2_TARGET_UBOOT_NEEDS_ATF_BL31_ELF),y) 159define ARM_TRUSTED_FIRMWARE_BL31_UBOOT_INSTALL_ELF 160 $(INSTALL) -D -m 0644 $(ARM_TRUSTED_FIRMWARE_IMG_DIR)/bl31/bl31.elf \ 161 $(BINARIES_DIR)/bl31.elf 162endef 163endif 164 165ARM_TRUSTED_FIRMWARE_MAKE_TARGETS += \ 166 $(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_ADDITIONAL_TARGETS)) 167 168ARM_TRUSTED_FIRMWARE_CUSTOM_DTS_PATH = $(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_DTS_PATH)) 169 170define ARM_TRUSTED_FIRMWARE_BUILD_CMDS 171 $(if $(ARM_TRUSTED_FIRMWARE_CUSTOM_DTS_PATH), 172 cp -f $(ARM_TRUSTED_FIRMWARE_CUSTOM_DTS_PATH) $(@D)/fdts/ 173 ) 174 $(ARM_TRUSTED_FIRMWARE_BUILD_FIPTOOL) 175 $(ARM_TRUSTED_FIRMWARE_MAKE_ENV) $(MAKE) -C $(@D) \ 176 $(ARM_TRUSTED_FIRMWARE_MAKE_OPTS) \ 177 $(ARM_TRUSTED_FIRMWARE_MAKE_TARGETS) 178 $(ARM_TRUSTED_FIRMWARE_BL31_UBOOT_BUILD) 179endef 180 181define ARM_TRUSTED_FIRMWARE_INSTALL_IMAGES_CMDS 182 $(foreach f,$(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_IMAGES)), \ 183 cp -dpf $(ARM_TRUSTED_FIRMWARE_IMG_DIR)/$(f) $(BINARIES_DIR)/ 184 ) 185 $(ARM_TRUSTED_FIRMWARE_BL31_UBOOT_INSTALL) 186 $(ARM_TRUSTED_FIRMWARE_BL31_UBOOT_INSTALL_ELF) 187endef 188 189# Configuration check 190ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE)$(BR_BUILDING),yy) 191 192ifeq ($(ARM_TRUSTED_FIRMWARE_VERSION),custom) 193ifeq ($(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_TARBALL_LOCATION))),) 194$(error No tarball location specified. Please check BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_TARBALL_LOCATION)) 195endif 196endif 197 198ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_GIT),y) 199ifeq ($(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_REPO_URL)),) 200$(error No repository specified. Please check BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_REPO_URL) 201endif 202endif 203 204endif 205 206$(eval $(generic-package)) 207