summaryrefslogtreecommitdiff
path: root/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot-corstone1000.inc
blob: c0a029e9da49b85cc810812c6a9a11507c838e40 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
# Corstone1000 specific U-boot support

DEPENDS:append = " openssl-native efitools-native"
CORSTONE1000_DEVICE_TREE:corstone1000-mps3 = "corstone1000-mps3"
CORSTONE1000_DEVICE_TREE:corstone1000-fvp = "corstone1000-fvp"
EXTRA_OEMAKE:append = ' DEVICE_TREE=${CORSTONE1000_DEVICE_TREE}'

UBOOT_CONFIG ??= "EFI"
UBOOT_CONFIG[EFI] = "corstone1000_defconfig"
UBOOT_ENTRYPOINT  = "0x80000000"
UBOOT_LOADADDRESS = "0x80000000"
UBOOT_BOOTARGS = "${LINUX_KERNEL_ARGS} loglevel=9"
UBOOT_ARCH = "arm"
UBOOT_EXTLINUX = "0"

SYSROOT_DIRS:append = " /boot"

SRC_URI:append = " \
    file://0001-FF-A-v15-arm64-smccc-add-support-for-SMCCCv1.2-x0-x1.patch \
    file://0002-FF-A-v15-lib-uuid-introduce-uuid_str_to_le_bin-funct.patch \
    file://0003-FF-A-v15-lib-uuid-introduce-testcase-for-uuid_str_to.patch \
    file://0004-FF-A-v15-arm_ffa-introduce-Arm-FF-A-support.patch \
    file://0005-FF-A-v15-arm_ffa-introduce-armffa-command.patch \
    file://0006-FF-A-v15-arm_ffa-introduce-sandbox-FF-A-support.patch \
    file://0007-FF-A-v15-arm_ffa-introduce-sandbox-test-cases-for-UC.patch \
    file://0008-FF-A-v15-arm_ffa-introduce-armffa-command-Sandbox-te.patch \
    file://0009-FF-A-v15-arm_ffa-efi-introduce-FF-A-MM-communication.patch \
    file://0010-FF-A-v15-arm_ffa-efi-corstone1000-enable-MM-communic.patch \
    file://0011-efi-corstone1000-fwu-introduce-EFI-capsule-update.patch \
    file://0012-arm-corstone1000-fix-unrecognized-filesystem-type.patch \
    file://0013-efi_loader-corstone1000-remove-guid-check-from-corst.patch \
    file://0014-efi_loader-populate-ESRT-table-if-EFI_ESRT-config-op.patch \
    file://0015-efi_firmware-add-get_image_info-for-corstone1000.patch \
    file://0016-efi_loader-fix-null-pointer-exception-with-get_image.patch \
    file://0017-arm-corstone1000-add-mmc-for-fvp.patch \
    file://0018-corstone1000-add-compressed-kernel-support.patch \
    file://0019-arm-corstone1000-esrt-support.patch \
    file://0020-corstone1000-enable-distro-booting-command.patch \
    file://0021-corstone1000-add-fwu-metadata-store-info.patch \
    file://0022-fwu_metadata-make-sure-structures-are-packed.patch \
    file://0023-corstone1000-add-boot-index.patch \
    file://0024-corstone1000-adjust-boot-bank-and-kernel-location.patch \
    file://0025-corstone1000-add-nvmxip-fwu-mdata-and-gpt-options.patch \
    file://0026-nvmxip-move-header-to-include.patch \
    file://0027-corstone1000-set-kernel_addr-based-on-boot_idx.patch \
    file://0028-corstone1000-boot-index-from-active.patch \
    file://0029-corstone1000-enable-PSCI-reset.patch \
    file://0030-Enable-EFI-set-get-time-services.patch \
    file://0031-corstone1000-detect-inflated-kernel-size.patch \
    file://0032-corstone1000-ESRT-add-unique-firmware-GUID.patch \
    file://0033-dt-Provide-a-way-to-remove-non-compliant-nodes-and-p.patch \
    file://0034-bootefi-Call-the-EVT_FT_FIXUP-event-handler.patch \
    file://0035-corstone1000-purge-U-Boot-specific-DT-nodes.patch \
    file://0036-corstone1000-add-signature-device-tree-overlay.patch \
    file://0037-corstone1000-enable-authenticated-capsule-config.patch \
    file://0038-corstone1000-introduce-EFI-authenticated-capsule-upd.patch \
    file://0039-enables-ondisk-capsule-update-feature.patch		  \
    file://0040-fix-runtime-capsule-update-flags-checks.patch		  \
    file://0041-scatter-gather-flag-workaround.patch			  \
    file://0042-corstone1000-enable-virtio-net-support.patch		  \
    file://0043-firmware-psci-Fix-bind_smccc_features-psci-check.patch		  \
    file://0044-corstone1000-set-unique-GUID-for-fvp-and-mps3.patch		  \
    "

do_configure:append() {
    openssl req -x509 -sha256 -newkey rsa:2048 -subj /CN=CRT/ -keyout ${B}/CRT.key -out ${B}/CRT.crt -nodes -days 365
    cert-to-efi-sig-list ${B}/CRT.crt ${B}/corstone1000_defconfig/CRT.esl
}

FILES:${PN} += "/corstone1000_capsule_*"
do_install:append() {
   install -D -p -m 0644 ${B}/CRT.crt ${D}/corstone1000_capsule_cert.crt
   install -D -p -m 0644 ${B}/CRT.key ${D}/corstone1000_capsule_key.key
}

do_deploy:append(){
   cp -Rf ${D}/corstone1000_capsule* ${DEPLOYDIR}/
}

addtask deploy after do_install