@@ -1,4 +1,4 @@
-COMPATIBLE_MACHINE = "qemuarm64-secureboot"
+COMPATIBLE_MACHINE = "(qemuarm64-secureboot|genericarm64)"
# Enable passing TOS_FW_CONFIG from FIP package to Trusted OS.
FILESEXTRAPATHS:prepend := "${THISDIR}/files:"
@@ -3,13 +3,16 @@
QEMU_TFA_REQUIRE ?= ""
QEMU_TFA_REQUIRE:qemuarm-secureboot = "trusted-firmware-a-qemuarm-secureboot.inc"
QEMU_TFA_REQUIRE:qemuarm64-secureboot = "trusted-firmware-a-qemuarm64-secureboot.inc"
+QEMU_TFA_REQUIRE:genericarm64 = "trusted-firmware-a-qemuarm64-secureboot.inc"
require ${QEMU_TFA_REQUIRE}
TFA_BUILD_TARGET:aarch64:qemuall = "all fip"
+TFA_BUILD_TARGET:aarch64:genericarm64 = "all fip"
TFA_BUILD_TARGET:arm:qemuall = "all fip"
DEPENDS:append:aarch64:qemuall = " optee-os"
+DEPENDS:append:aarch64:genericarm64 = " optee-os"
DEPENDS:append:arm:qemuall = " optee-os"
EXTRA_OEMAKE:append:aarch64:qemuall = " \
@@ -19,6 +22,13 @@ EXTRA_OEMAKE:append:aarch64:qemuall = " \
BL32_RAM_LOCATION=tdram \
"
+EXTRA_OEMAKE:append:aarch64:genericarm64 = " \
+ BL32=${STAGING_DIR_TARGET}${nonarch_base_libdir}/firmware/tee-header_v2.bin \
+ BL32_EXTRA1=${STAGING_DIR_TARGET}${nonarch_base_libdir}/firmware/tee-pager_v2.bin \
+ BL32_EXTRA2=${STAGING_DIR_TARGET}${nonarch_base_libdir}/firmware/tee-pageable_v2.bin \
+ BL32_RAM_LOCATION=tdram \
+ "
+
EXTRA_OEMAKE:append:arm:qemuall = " \
BL32=${STAGING_DIR_TARGET}${nonarch_base_libdir}/firmware/tee-header_v2.bin \
BL32_EXTRA1=${STAGING_DIR_TARGET}${nonarch_base_libdir}/firmware/tee-pager_v2.bin \
genericarm64 builds can build tf-a for secureboot for testing secureboot support. For real target the support should be in the device specific UEFI firmware which are built separately by device vendors. Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org> --- .../trusted-firmware-a-qemuarm64-secureboot.inc | 2 +- .../trusted-firmware-a/trusted-firmware-a_%.bbappend | 10 ++++++++++ 2 files changed, 11 insertions(+), 1 deletion(-)