blob: e79417ebef6f93918cbe98e9c7fc9c08af31b8f6 [file] [log] [blame]
Pascal Brand6044eb52016-02-23 15:48:31 +01001################################################################################
2# Following variables defines how the NS_USER (Non Secure User - Client
3# Application), NS_KERNEL (Non Secure Kernel), S_KERNEL (Secure Kernel) and
4# S_USER (Secure User - TA) are compiled
5################################################################################
Pascal Brandefe56592016-03-03 10:46:52 +01006COMPILE_NS_USER ?= 64
7override COMPILE_NS_KERNEL := 64
Pascal Brand6044eb52016-02-23 15:48:31 +01008COMPILE_S_USER ?= 64
9COMPILE_S_KERNEL ?= 64
10
Etienne Carriere3768a2b2019-05-14 17:13:19 +020011OPTEE_OS_PLATFORM = vexpress-fvp
12
Victor Chong7a716512017-09-11 15:18:44 +010013include common.mk
Pascal Brandd6536da2015-09-01 10:38:43 +020014
Javier Almansa Sobrinocf568482020-02-26 11:51:45 +000015################################################################################
16# Variables used for TPM configuration.
17################################################################################
18BR2_ROOTFS_OVERLAY = $(ROOT)/build/br-ext/board/fvp/overlay
19BR2_PACKAGE_FTPM_OPTEE_EXT_SITE ?= $(CURDIR)/br-ext/package/ftpm_optee_ext
20BR2_PACKAGE_FTPM_OPTEE_PACKAGE_SITE ?= $(ROOT)/ms-tpm-20-ref
21
22# The fTPM implementation is based on ARM32 architecture whereas the rest of the
23# system is built to run on 64-bit mode (COMPILE_S_USER = 64). Therefore set
24# BR2_PACKAGE_FTPM_OPTEE_EXT_SDK manually to the arm32 OPTEE toolkit rather than
25# relying on OPTEE_OS_TA_DEV_KIT_DIR variable.
26BR2_PACKAGE_FTPM_OPTEE_EXT_SDK ?= $(OPTEE_OS_PATH)/out/arm/export-ta_arm32
27
28BR2_PACKAGE_LINUX_FTPM_MOD_EXT_SITE ?= $(CURDIR)/br-ext/package/linux_ftpm_mod_ext
29BR2_PACKAGE_LINUX_FTPM_MOD_EXT_PATH ?= $(LINUX_PATH)
Joakim Bech427dd632015-05-04 15:52:33 +020030
31################################################################################
32# Paths to git projects and various binaries
33################################################################################
Javier Almansa Sobrinocf568482020-02-26 11:51:45 +000034MEASURED_BOOT ?= n
Victor Chongdf54b112019-08-11 15:58:12 +010035TF_A_PATH ?= $(ROOT)/trusted-firmware-a
Javier Almansa Sobrinocf568482020-02-26 11:51:45 +000036ifeq ($(MEASURED_BOOT),y)
37# Prefer release mode for TF-A if using Measured Boot, debug may exhaust memory.
38TF_A_BUILD ?= release
39endif
Sudeep Holla48a071b2024-05-19 19:27:00 +010040TF_A_DEBUG ?= $(DEBUG)
41ifeq ($(TF_A_DEBUG),1)
42TF_A_LOGLVL ?= 40
Victor Chongeca7cfd2019-11-08 09:18:05 +000043TF_A_BUILD ?= debug
44else
Sudeep Holla48a071b2024-05-19 19:27:00 +010045TF_A_LOGLVL ?= 20
Victor Chongeca7cfd2019-11-08 09:18:05 +000046TF_A_BUILD ?= release
47endif
Balint Dobszayc394dcd2022-05-23 18:32:57 +020048FVP_PATH ?= $(ROOT)/Base_RevC_AEMvA_pkg/models/Linux64_GCC-9.3
49FVP_BIN ?= FVP_Base_RevC-2xAEMvA
50FVP_LINUX_DTB ?= $(LINUX_PATH)/arch/arm64/boot/dts/arm/fvp-base-revc.dtb
Joakim Bech277ddad2017-11-15 09:33:21 +010051OUT_PATH ?= $(ROOT)/out
Balint Dobszayb80d8cb2024-04-24 14:09:18 +020052BINARIES_PATH ?= $(ROOT)/out/bin
53UBOOT_PATH ?= $(ROOT)/u-boot
54UBOOT_BIN ?= $(UBOOT_PATH)/u-boot.bin
55MKIMAGE_PATH ?= $(UBOOT_PATH)/tools
Sudeep Holla24152282024-05-19 22:27:07 +010056HAFNIUM_PATH ?= $(ROOT)/hafnium
57HAFNIUM_BIN ?= $(HAFNIUM_PATH)/out/reference/secure_aem_v8a_fvp_vhe_clang/hafnium.bin
Balint Dobszayb80d8cb2024-04-24 14:09:18 +020058UBOOT_BOOT_SCRIPT ?= $(OUT_PATH)/boot.scr
Joakim Bechab622612017-11-15 10:45:28 +010059BOOT_IMG ?= $(OUT_PATH)/boot-fat.uefi.img
Javier Almansa Sobrinocf568482020-02-26 11:51:45 +000060FTPM_PATH ?= $(ROOT)/ms-tpm-20-ref/Samples/ARM32-FirmwareTPM/optee_ta
61
Sudeep Holla6bab50e2024-05-19 19:41:48 +010062# Option to configure FF-A and SPM:
63# n: disabled
64# 3: not supported, SPMC and SPMD at EL3 (in TF-A)
Sudeep Holla24152282024-05-19 22:27:07 +010065# 2: SPMC at S-EL2 (in Hafnium), SPMD at EL3 (in TF-A)
Sudeep Holla6bab50e2024-05-19 19:41:48 +010066# 1: SPMC at S-EL1 (in OP-TEE), SPMD at EL3 (in TF-A)
67SPMC_AT_EL ?= n
Sudeep Holla24152282024-05-19 22:27:07 +010068ifneq ($(filter-out n 1 2,$(SPMC_AT_EL)),)
Sudeep Holla6bab50e2024-05-19 19:41:48 +010069$(error Unsupported SPMC_AT_EL value $(SPMC_AT_EL))
70endif
71
Javier Almansa Sobrinocf568482020-02-26 11:51:45 +000072ifeq ($(MEASURED_BOOT),y)
Balint Dobszay35e60992022-06-10 16:19:10 +020073# By default enable FTPM for backwards compatibility.
74MEASURED_BOOT_FTPM ?= y
75else
76$(call force,MEASURED_BOOT_FTPM,n,requires MEASURED_BOOT enabled)
77endif
78
79# Build ancillary components to access fTPM if Measured Boot is enabled.
80ifeq ($(MEASURED_BOOT_FTPM),y)
Javier Almansa Sobrinocf568482020-02-26 11:51:45 +000081DEFCONFIG_FTPM ?= --br-defconfig build/br-ext/configs/ftpm_optee
82DEFCONFIG_TPM_MODULE ?= --br-defconfig build/br-ext/configs/linux_ftpm
83DEFCONFIG_TSS ?= --br-defconfig build/br-ext/configs/tss
84endif
Joakim Bech427dd632015-05-04 15:52:33 +020085
86################################################################################
Joakim Bech427dd632015-05-04 15:52:33 +020087# Targets
88################################################################################
Balint Dobszayb80d8cb2024-04-24 14:09:18 +020089all: arm-tf optee-os ftpm boot-img linux u-boot
90clean: arm-tf-clean boot-img-clean buildroot-clean ftpm-clean optee-os-clean u-boot-clean
Joakim Bech427dd632015-05-04 15:52:33 +020091
Victor Chong7a716512017-09-11 15:18:44 +010092include toolchain.mk
Joakim Bech427dd632015-05-04 15:52:33 +020093
94################################################################################
Joakim Bech277ddad2017-11-15 09:33:21 +010095# Folders
96################################################################################
97$(OUT_PATH):
98 mkdir -p $@
99
100################################################################################
Balint Dobszay276212d2022-05-24 18:45:34 +0200101# Shared folder
102################################################################################
103# Enable accessing the host directory FVP_VIRTFS_HOST_DIR from the FVP.
104# The shared folder can be mounted in the following ways:
105# - Run 'mount -t 9p -o trans=virtio,version=9p2000.L FM <mount point>' or,
106# - enable FVP_VIRTFS_AUTOMOUNT.
107# The latter will use the Buildroot post-build script to add an entry to the
108# target's /etc/fstab, mounting the shared directory to FVP_VIRTFS_MOUNTPOINT
109# on the FVP.
110# Note: the post-build script can only append to fstab. If FVP_VIRTFS_AUTOMOUNT
111# is changed from "y" to "n", run 'rm -r ../out-br/build/skeleton-init-sysv' so
112# the target's fstab will be replaced with the unmodified original again.
113FVP_VIRTFS_ENABLE ?= n
114FVP_VIRTFS_HOST_DIR ?= $(ROOT)
115FVP_VIRTFS_AUTOMOUNT ?= n
116FVP_VIRTFS_MOUNTPOINT ?= /mnt/host
117
Sudeep Holla24152282024-05-19 22:27:07 +0100118ifeq ($(SPMC_AT_EL),2)
119BL32_DEPS ?= hafnium optee-os
120else
121BL32_DEPS ?= optee-os
122endif
123
124BL33_BIN ?= $(UBOOT_BIN)
125BL33_DEPS ?= u-boot
126
Balint Dobszay276212d2022-05-24 18:45:34 +0200127ifeq ($(FVP_VIRTFS_AUTOMOUNT),y)
128$(call force,FVP_VIRTFS_ENABLE,y,required by FVP_VIRTFS_AUTOMOUNT)
129endif
130
Balint Dobszay276212d2022-05-24 18:45:34 +0200131BR2_ROOTFS_POST_BUILD_SCRIPT = $(ROOT)/build/br-ext/board/fvp/post-build.sh
132BR2_ROOTFS_POST_SCRIPT_ARGS = "$(FVP_VIRTFS_AUTOMOUNT) $(FVP_VIRTFS_MOUNTPOINT)"
133
134################################################################################
Joakim Bech427dd632015-05-04 15:52:33 +0200135# ARM Trusted Firmware
136################################################################################
Victor Chong371d7c22019-08-08 17:17:14 +0100137TF_A_EXPORTS ?= \
Joakim Bech69a8a372016-04-26 11:05:04 +0200138 CROSS_COMPILE="$(CCACHE)$(AARCH64_CROSS_COMPILE)"
Pascal Brandb130ea22015-10-13 13:18:36 +0200139
Victor Chong371d7c22019-08-08 17:17:14 +0100140TF_A_FLAGS ?= \
Balint Dobszayb80d8cb2024-04-24 14:09:18 +0200141 BL33=$(UBOOT_BIN) \
Jerome Forissier0c761952018-11-09 11:09:26 +0100142 FVP_USE_GIC_DRIVER=FVP_GICV3 \
Pascal Brandb130ea22015-10-13 13:18:36 +0200143 PLAT=fvp \
Sudeep Holla48a071b2024-05-19 19:27:00 +0100144 DEBUG=$(TF_A_DEBUG) \
145 LOG_LEVEL=$(TF_A_LOGLVL)
Pascal Brandb130ea22015-10-13 13:18:36 +0200146
Javier Almansa Sobrinocf568482020-02-26 11:51:45 +0000147ifneq ($(MEASURED_BOOT),y)
Sudeep Holla48a071b2024-05-19 19:27:00 +0100148 TF_A_FLAGS += MEASURED_BOOT=0
Javier Almansa Sobrinocf568482020-02-26 11:51:45 +0000149else
Sudeep Holla48a071b2024-05-19 19:27:00 +0100150 TF_A_FLAGS += MBEDTLS_DIR=$(ROOT)/mbedtls \
Javier Almansa Sobrinocf568482020-02-26 11:51:45 +0000151 ARM_ROTPK_LOCATION=devel_rsa \
152 GENERATE_COT=1 \
153 MEASURED_BOOT=1 \
154 ROT_KEY=plat/arm/board/common/rotpk/arm_rotprivk_rsa.pem \
155 TPM_HASH_ALG=sha256 \
156 TRUSTED_BOARD_BOOT=1 \
157 EVENT_LOG_LEVEL=20
158endif
159
Sudeep Holla6bab50e2024-05-19 19:41:48 +0100160TF_A_FLAGS_BL32_OPTEE = BL32=$(OPTEE_OS_HEADER_V2_BIN)
161TF_A_FLAGS_BL32_OPTEE += BL32_EXTRA1=$(OPTEE_OS_PAGER_V2_BIN)
162TF_A_FLAGS_BL32_OPTEE += BL32_EXTRA2=$(OPTEE_OS_PAGEABLE_V2_BIN)
163TF_A_FLAGS_BL32_OPTEE += ARM_TSP_RAM_LOCATION=tdram
164
165TF_A_FLAGS_SPMC_AT_EL_n = $(TF_A_FLAGS_BL32_OPTEE) SPD=opteed
166TF_A_FLAGS_SPMC_AT_EL_1 = BL32=$(OPTEE_OS_PAGER_V2_BIN) SPD=spmd
167TF_A_FLAGS_SPMC_AT_EL_1 += CTX_INCLUDE_EL2_REGS=0 SPMD_SPM_AT_SEL2=0
Sudeep Holla127b7352024-05-19 22:14:24 +0100168TF_A_FLAGS_SPMC_AT_EL_1 += ARM_SPMC_MANIFEST_DTS=../build/fvp/spmc_el1_partitions_manifest.dts
Sudeep Holla6bab50e2024-05-19 19:41:48 +0100169TF_A_FLAGS_SPMC_AT_EL_1 += SPMC_OPTEE=1
Sudeep Holla24152282024-05-19 22:27:07 +0100170TF_A_FLAGS_SPMC_AT_EL_2 = SPD=spmd
171TF_A_FLAGS_SPMC_AT_EL_2 += SP_LAYOUT_FILE=../build/fvp/sp_layout.json
172TF_A_FLAGS_SPMC_AT_EL_2 += BL32=$(HAFNIUM_BIN)
173TF_A_FLAGS_SPMC_AT_EL_2 += ARM_SPMC_MANIFEST_DTS=../build/fvp/spmc_el2_optee_sp_manifest.dts
Olivier Deprez1d0bcfc2024-07-08 14:16:35 +0200174TF_A_FLAGS_SPMC_AT_EL_2 += BRANCH_PROTECTION=1
Olivier Deprez9c285052024-07-08 14:16:35 +0200175TF_A_FLAGS_SPMC_AT_EL_2 += ENABLE_FEAT_MTE2=1
Sudeep Holla6bab50e2024-05-19 19:41:48 +0100176
177TF_A_FLAGS += $(TF_A_FLAGS_SPMC_AT_EL_$(SPMC_AT_EL))
178
Sudeep Holla24152282024-05-19 22:27:07 +0100179arm-tf: $(BL32_DEPS) $(BL33_DEPS)
Victor Chong371d7c22019-08-08 17:17:14 +0100180 $(TF_A_EXPORTS) $(MAKE) -C $(TF_A_PATH) $(TF_A_FLAGS) all fip
Joakim Bech427dd632015-05-04 15:52:33 +0200181
182arm-tf-clean:
Victor Chong371d7c22019-08-08 17:17:14 +0100183 $(TF_A_EXPORTS) $(MAKE) -C $(TF_A_PATH) $(TF_A_FLAGS) clean
Joakim Bech427dd632015-05-04 15:52:33 +0200184
185################################################################################
Joakim Bech427dd632015-05-04 15:52:33 +0200186# Linux kernel
187################################################################################
Jerome Forissiere1002382015-11-26 11:36:00 +0100188LINUX_DEFCONFIG_COMMON_ARCH := arm64
Balint Dobszay3730e012023-06-02 11:40:41 +0200189LINUX_DEFCONFIG_COMMON_FILES ?= \
Jerome Forissiere1002382015-11-26 11:36:00 +0100190 $(LINUX_PATH)/arch/arm64/configs/defconfig \
191 $(CURDIR)/kconfigs/fvp.conf
Joakim Bech427dd632015-05-04 15:52:33 +0200192
Javier Almansa Sobrinocf568482020-02-26 11:51:45 +0000193.PHONY: linux-ftpm-module
194linux-ftpm-module: linux
Balint Dobszay35e60992022-06-10 16:19:10 +0200195ifeq ($(MEASURED_BOOT_FTPM),y)
Javier Almansa Sobrinocf568482020-02-26 11:51:45 +0000196linux-ftpm-module:
197 $(MAKE) -C $(LINUX_PATH) $(LINUX_COMMON_FLAGS) M=drivers/char/tpm \
198 modules_install INSTALL_MOD_PATH=$(LINUX_PATH)
199endif
200
Joakim Bech427dd632015-05-04 15:52:33 +0200201linux-defconfig: $(LINUX_PATH)/.config
202
Pascal Brande3d85982015-09-10 17:20:42 +0200203LINUX_COMMON_FLAGS += ARCH=arm64
204
205linux: linux-common
206
207linux-defconfig-clean: linux-defconfig-clean-common
208
209LINUX_CLEAN_COMMON_FLAGS += ARCH=arm64
210
211linux-clean: linux-clean-common
212
213LINUX_CLEANER_COMMON_FLAGS += ARCH=arm64
214
215linux-cleaner: linux-cleaner-common
Joakim Bech427dd632015-05-04 15:52:33 +0200216
217################################################################################
218# OP-TEE
219################################################################################
Etienne Carriere3768a2b2019-05-14 17:13:19 +0200220OPTEE_OS_COMMON_FLAGS += CFG_ARM_GICV3=y
Sudeep Holla6bab50e2024-05-19 19:41:48 +0100221OPTEE_OS_COMMON_FLAGS_SPMC_AT_EL_1 = CFG_CORE_SEL1_SPMC=y
Sudeep Holla24152282024-05-19 22:27:07 +0100222OPTEE_OS_COMMON_FLAGS_SPMC_AT_EL_2 = CFG_CORE_SEL2_SPMC=y
223OPTEE_OS_COMMON_FLAGS_SPMC_AT_EL_2 += CFG_ARM_GICV3=n CFG_CORE_HAFNIUM_INTC=y
224OPTEE_OS_COMMON_FLAGS_SPMC_AT_EL_2 += CFG_CORE_WORKAROUND_NSITR_CACHE_PRIME=n
Sudeep Holla6bab50e2024-05-19 19:41:48 +0100225
226OPTEE_OS_COMMON_FLAGS += $(OPTEE_OS_COMMON_FLAGS_SPMC_AT_EL_$(SPMC_AT_EL))
Javier Almansa Sobrinocf568482020-02-26 11:51:45 +0000227
228ifeq ($(MEASURED_BOOT),y)
229 OPTEE_OS_COMMON_FLAGS += CFG_DT=y CFG_CORE_TPM_EVENT_LOG=y
230endif
231
Jerome Forissierae45fbf2015-09-04 09:40:17 +0200232optee-os: optee-os-common
Joakim Bech427dd632015-05-04 15:52:33 +0200233
Javier Almansa Sobrinocf568482020-02-26 11:51:45 +0000234optee-os-clean: ftpm-clean optee-os-clean-common
235
236################################################################################
Sudeep Holla24152282024-05-19 22:27:07 +0100237# Hafnium
238################################################################################
239
Jens Wiklander0186a1b2024-10-15 11:00:01 +0200240HAFNIUM_EXPORTS = PATH=$(TOOLCHAIN_ROOT)/clang-$(CLANG_BUILD_VER)/bin:$(PATH)
241
Sudeep Holla24152282024-05-19 22:27:07 +0100242.hafnium_checkout:
243 git -C $(HAFNIUM_PATH) submodule update --init
244 touch $@
245
246hafnium: $(HAFNIUM_BIN)
247
248$(HAFNIUM_BIN): .hafnium_checkout | $(OUT_PATH)
Jens Wiklander0186a1b2024-10-15 11:00:01 +0200249 $(HAFNIUM_EXPORTS) $(MAKE) -C $(HAFNIUM_PATH) $(HAFNIUM_FLAGS) PLATFORM=secure_aem_v8a_fvp_vhe
Sudeep Holla24152282024-05-19 22:27:07 +0100250
251
252################################################################################
Javier Almansa Sobrinocf568482020-02-26 11:51:45 +0000253# Buildroot
254################################################################################
255
256buildroot: linux-ftpm-module
Joakim Bech427dd632015-05-04 15:52:33 +0200257
Joakim Bech427dd632015-05-04 15:52:33 +0200258################################################################################
Balint Dobszayb80d8cb2024-04-24 14:09:18 +0200259# U-Boot
Joakim Bech277ddad2017-11-15 09:33:21 +0100260################################################################################
Balint Dobszayb80d8cb2024-04-24 14:09:18 +0200261UBOOT_DEFCONFIG_FILES := $(ROOT)/build/kconfigs/u-boot_fvp.conf
Joakim Bech277ddad2017-11-15 09:33:21 +0100262
Balint Dobszayb80d8cb2024-04-24 14:09:18 +0200263UBOOT_COMMON_FLAGS ?= CROSS_COMPILE=$(CROSS_COMPILE_NS_KERNEL)
Joakim Bech277ddad2017-11-15 09:33:21 +0100264
Balint Dobszayb80d8cb2024-04-24 14:09:18 +0200265$(UBOOT_PATH)/.config: $(UBOOT_DEFCONFIG_FILES)
266 cd $(UBOOT_PATH) && scripts/kconfig/merge_config.sh $(UBOOT_DEFCONFIG_FILES)
Joakim Bech277ddad2017-11-15 09:33:21 +0100267
Balint Dobszayb80d8cb2024-04-24 14:09:18 +0200268.PHONY: u-boot-defconfig
269u-boot-defconfig: $(UBOOT_PATH)/.config
Joakim Bech277ddad2017-11-15 09:33:21 +0100270
Balint Dobszayb80d8cb2024-04-24 14:09:18 +0200271.PHONY: u-boot
272u-boot: u-boot-defconfig
273 $(MAKE) -C $(UBOOT_PATH) $(UBOOT_COMMON_FLAGS)
Joakim Bech277ddad2017-11-15 09:33:21 +0100274
Balint Dobszayb80d8cb2024-04-24 14:09:18 +0200275.PHONY: u-boot-clean
276u-boot-clean:
277 $(MAKE) -C $(UBOOT_PATH) $(UBOOT_COMMON_FLAGS) distclean
Joakim Bech277ddad2017-11-15 09:33:21 +0100278
Balint Dobszayb80d8cb2024-04-24 14:09:18 +0200279$(UBOOT_BOOT_SCRIPT): $(BUILD_PATH)/fvp/uboot_boot_cmd.txt u-boot | $(OUT_PATH)
280 $(MKIMAGE_PATH)/mkimage -A arm64 \
281 -O linux \
282 -T script \
283 -C none \
284 -d $(BUILD_PATH)/fvp/uboot_boot_cmd.txt \
285 $(UBOOT_BOOT_SCRIPT)
Joakim Bech277ddad2017-11-15 09:33:21 +0100286
287################################################################################
Joakim Bechab622612017-11-15 10:45:28 +0100288# Boot Image
289################################################################################
Javier Almansa Sobrinocf568482020-02-26 11:51:45 +0000290
Joakim Bechab622612017-11-15 10:45:28 +0100291.PHONY: boot-img
Balint Dobszayb80d8cb2024-04-24 14:09:18 +0200292boot-img: buildroot u-boot $(UBOOT_BOOT_SCRIPT)
Joakim Bechab622612017-11-15 10:45:28 +0100293 rm -f $(BOOT_IMG)
294 mformat -i $(BOOT_IMG) -n 64 -h 255 -T 131072 -v "BOOT IMG" -C ::
295 mcopy -i $(BOOT_IMG) $(LINUX_PATH)/arch/arm64/boot/Image ::
Balint Dobszayc394dcd2022-05-23 18:32:57 +0200296 mcopy -i $(BOOT_IMG) $(FVP_LINUX_DTB) ::/fvp.dtb
Jens Wiklander41a0dfe2018-02-05 22:55:02 +0100297 mcopy -i $(BOOT_IMG) $(ROOT)/out-br/images/rootfs.cpio.gz ::/initrd.img
Balint Dobszayb80d8cb2024-04-24 14:09:18 +0200298 mcopy -i $(BOOT_IMG) $(UBOOT_BOOT_SCRIPT) ::
Joakim Bechab622612017-11-15 10:45:28 +0100299
300.PHONY: boot-img-clean
301boot-img-clean:
302 rm -f $(BOOT_IMG)
303
304################################################################################
Joakim Bech427dd632015-05-04 15:52:33 +0200305# Run targets
306################################################################################
307# This target enforces updating root fs etc
Pascal Brand15271692015-09-08 10:42:22 +0200308run: all
Pascal Brand15271692015-09-08 10:42:22 +0200309 $(MAKE) run-only
Joakim Bech427dd632015-05-04 15:52:33 +0200310
Balint Dobszayc394dcd2022-05-23 18:32:57 +0200311FVP_ARGS ?= \
312 -C bp.ve_sysregs.exit_on_shutdown=1 \
313 -C cache_state_modelled=0 \
314 -C pctl.startup=0.0.0.0 \
315 -C cluster0.NUM_CORES=4 \
Balint Dobszay4791acb2023-04-24 13:39:19 +0200316 -C cluster0.cpu0.enable_crc32=1 \
317 -C cluster0.cpu1.enable_crc32=1 \
318 -C cluster0.cpu2.enable_crc32=1 \
319 -C cluster0.cpu3.enable_crc32=1 \
Gyorgy Szing08d69742023-04-05 07:30:08 +0000320 -C cluster0.cpu0.semihosting-cwd="$(BINARIES_PATH)" \
321 -C cluster0.cpu1.semihosting-cwd="$(BINARIES_PATH)" \
322 -C cluster0.cpu2.semihosting-cwd="$(BINARIES_PATH)" \
323 -C cluster0.cpu3.semihosting-cwd="$(BINARIES_PATH)" \
Sudeep Holla473b92e2024-05-20 13:04:36 +0100324 -C cluster1.NUM_CORES=4 \
325 -C cluster1.cpu0.enable_crc32=1 \
326 -C cluster1.cpu1.enable_crc32=1 \
327 -C cluster1.cpu2.enable_crc32=1 \
328 -C cluster1.cpu3.enable_crc32=1 \
Gyorgy Szing08d69742023-04-05 07:30:08 +0000329 -C cluster1.cpu0.semihosting-cwd="$(BINARIES_PATH)" \
330 -C cluster1.cpu1.semihosting-cwd="$(BINARIES_PATH)" \
331 -C cluster1.cpu2.semihosting-cwd="$(BINARIES_PATH)" \
332 -C cluster1.cpu3.semihosting-cwd="$(BINARIES_PATH)" \
Balint Dobszayc394dcd2022-05-23 18:32:57 +0200333 -C bp.secure_memory=1 \
334 -C bp.secureflashloader.fname=$(TF_A_PATH)/build/fvp/$(TF_A_BUILD)/bl1.bin \
335 -C bp.flashloader0.fname=$(TF_A_PATH)/build/fvp/$(TF_A_BUILD)/fip.bin \
336 -C bp.virtioblockdevice.image_path=$(BOOT_IMG)
Sudeep Holla40aedde2024-05-20 13:10:49 +0100337ifeq ($(SPMC_AT_EL),2)
338 FVP_ARGS += -C cluster0.gicv3.extended-interrupt-range-support=1 \
339 -C cluster0.has_generic_authentication=1 \
340 -C cluster0.has_pointer_authentication=2 \
341 -C cluster0.has_branch_target_exception=1 \
342 -C cluster0.has_arm_v8-4=1 \
343 -C cluster0.has_large_system_ext=1 \
344 -C cluster0.has_large_va=1 \
345 -C cluster0.has_rndr=1 \
346 -C cluster0.memory_tagging_support_level=3 \
347 -C cluster1.gicv3.extended-interrupt-range-support=1 \
348 -C cluster1.has_generic_authentication=1 \
349 -C cluster1.has_pointer_authentication=2 \
350 -C cluster1.has_branch_target_exception=1 \
351 -C cluster1.has_arm_v8-4=1 \
352 -C cluster1.has_large_system_ext=1 \
353 -C cluster1.has_large_va=1 \
354 -C cluster1.has_rndr=1 \
355 -C cluster1.memory_tagging_support_level=3 \
356 -C gic_distributor.extended-ppi-count=64 \
357 -C gic_distributor.extended-spi-count=1024 \
358 -C pci.pci_smmuv3.mmu.SMMU_AIDR=0x2 \
359 -C pci.pci_smmuv3.mmu.SMMU_IDR0=0x0046123B \
360 -C pci.pci_smmuv3.mmu.SMMU_IDR1=0x00600002 \
361 -C pci.pci_smmuv3.mmu.SMMU_IDR3=0x1714 \
362 -C pci.pci_smmuv3.mmu.SMMU_IDR5=0xFFFF0475 \
363 -C pci.pci_smmuv3.mmu.SMMU_S_IDR1=0xA0000002 \
364 -C pci.pci_smmuv3.mmu.SMMU_S_IDR2=0 \
365 -C pci.pci_smmuv3.mmu.SMMU_S_IDR3=0
366endif
Sudeep Holla012b6bf2024-05-20 12:25:30 +0100367ifeq ($(FVP_NETWORK_SUPPORT),y)
368 FVP_ARGS += -C bp.hostbridge.userNetworking=true \
369 -C bp.hostbridge.userNetPorts="5555=5555,8080=80,8022=22" \
370 -C bp.smsc_91c111.enabled=1 \
371 -C bp.smsc_91c111.mac_address=auto \
372 -C bp.virtio_net.enabled=1 \
373 -C bp.virtio_net.hostbridge.userNetworking=1
374endif
Sudeep Holla3d33df22024-05-20 12:27:09 +0100375ifeq ($(FVP_NO_VISUALISATION),y)
376 FVP_ARGS += -C bp.vis.disable_visualisation=1 \
377 -C bp.terminal_0.start_telnet=0 \
378 -C bp.terminal_1.mode=raw \
379 -C bp.terminal_1.start_telnet=0 \
380 -C bp.terminal_2.mode=raw \
381 -C bp.terminal_2.start_telnet=0 \
382 -C bp.terminal_3.mode=raw \
383 -C bp.terminal_3.start_telnet=0
384endif
Gabor Ambrus557af272023-08-16 12:59:55 +0200385ifeq ($(TS_LOGGING_SP),y)
386 FVP_ARGS += -C bp.pl011_uart2.out_file=$(TS_LOGGING_SP_LOG)
387endif
Balint Dobszay276212d2022-05-24 18:45:34 +0200388ifeq ($(FVP_VIRTFS_ENABLE),y)
389 FVP_ARGS += -C bp.virtiop9device.root_path=$(FVP_VIRTFS_HOST_DIR)
390endif
Balint Dobszay5e188572022-06-07 13:10:34 +0200391
392run-only:
Gabor Tothde2f8932023-03-09 12:12:46 +0100393 $(FVP_PATH)/$(FVP_BIN) $(FVP_ARGS) $(FVP_EXTRA_ARGS)