2020-05-08 18:32:38 +02:00
|
|
|
# SPDX-License-Identifier: GPL-2.0-only
|
2011-02-22 15:35:05 +01:00
|
|
|
|
2017-01-19 23:20:14 +01:00
|
|
|
ifneq ($(NOCOMPILE),1)
|
2018-01-14 11:38:30 +01:00
|
|
|
GIT:=$(shell git -C "$(top)" rev-parse --git-dir 1>/dev/null 2>&1 \
|
|
|
|
&& command -v git)
|
2017-01-19 23:20:14 +01:00
|
|
|
else
|
|
|
|
GIT:=
|
|
|
|
endif
|
2015-03-04 15:02:03 +01:00
|
|
|
|
2015-11-30 22:44:53 +01:00
|
|
|
#######################################################################
|
|
|
|
# normalize Kconfig variables in a central place
|
|
|
|
CONFIG_CBFS_PREFIX:=$(call strip_quotes,$(CONFIG_CBFS_PREFIX))
|
2015-09-16 18:10:52 +02:00
|
|
|
CONFIG_FMDFILE:=$(call strip_quotes,$(CONFIG_FMDFILE))
|
2016-08-08 23:12:11 +02:00
|
|
|
CONFIG_DEVICETREE:=$(call strip_quotes, $(CONFIG_DEVICETREE))
|
2018-06-22 03:50:48 +02:00
|
|
|
CONFIG_OVERRIDE_DEVICETREE:=$(call strip_quotes, $(CONFIG_OVERRIDE_DEVICETREE))
|
2020-07-30 01:28:43 +02:00
|
|
|
CONFIG_CHIPSET_DEVICETREE:=$(call strip_quotes, $(CONFIG_CHIPSET_DEVICETREE))
|
2020-06-11 20:59:07 +02:00
|
|
|
CONFIG_MEMLAYOUT_LD_FILE:=$(call strip_quotes, $(CONFIG_MEMLAYOUT_LD_FILE))
|
2015-11-30 22:44:53 +01:00
|
|
|
|
2011-02-22 15:35:05 +01:00
|
|
|
#######################################################################
|
|
|
|
# misleadingly named, this is the coreboot version
|
2016-04-20 04:15:16 +02:00
|
|
|
ifeq ($(KERNELVERSION),)
|
2016-01-24 16:00:50 +01:00
|
|
|
ifeq ($(BUILD_TIMELESS),1)
|
2019-05-24 13:03:43 +02:00
|
|
|
KERNELVERSION := -TIMELESS--LESSTIME-
|
2016-01-24 16:00:50 +01:00
|
|
|
else
|
2017-08-23 23:48:13 +02:00
|
|
|
KERNELVERSION := $(strip $(if $(GIT),\
|
2015-03-04 15:02:03 +01:00
|
|
|
$(shell git describe --dirty --always || git describe),\
|
2015-07-13 20:43:28 +02:00
|
|
|
$(if $(wildcard $(top)/.coreboot-version),\
|
|
|
|
$(shell cat $(top)/.coreboot-version),\
|
|
|
|
coreboot-unknown$(KERNELREVISION))))
|
2016-01-24 16:00:50 +01:00
|
|
|
endif
|
2016-04-20 04:15:16 +02:00
|
|
|
endif
|
2017-08-23 23:48:13 +02:00
|
|
|
COREBOOT_EXPORTS += KERNELVERSION
|
2011-02-22 15:35:05 +01:00
|
|
|
|
|
|
|
#######################################################################
|
|
|
|
# Basic component discovery
|
|
|
|
MAINBOARDDIR=$(call strip_quotes,$(CONFIG_MAINBOARD_DIR))
|
2016-11-16 22:03:43 +01:00
|
|
|
VARIANT_DIR:=$(call strip_quotes,$(CONFIG_VARIANT_DIR))
|
Makefile.inc: Add CARRIER_DIR to component discovery
The idea is to split the “mainboard” category into “variants” and
“carrierboards”, in the case when we use the COMe module together
with the Carrier Board instead of a single monolithic motherboard.
Previously, the “variants” category defined the type of motherboard,
which has a number of differences from the base one, for example, it
differed in the size or type of memory, and in the configuration of
the interfaces. Thus, there is no need to create a separate directory
in src/mainboard for a board that is similar in configuration to the
base board. But for a COMe module, “variants” contains different
variants of only this module, and the entire Carrier Board configuration
is allocated to a separate category - “carrierboards”, and each of the
variants can be used with one of the many boards in “carrierboards”.
For example, in the case of the Kontron mAL10 COMe module, variant
refers to the COMe-mAL10 or COMe-m4AL10 module type. They differ in the
type of memory (DDR3L or DDR4), and maybe they differ in some chips (see
more in https://www.kontron.com/products). However, all variants contain
the same type of processor/SoC.
The "carrierboards" directory can be able contain both the Kontron's
Evalution carrier boards (such as Eval Carrier2 T10 and COMe
Ref.Carrier-i T10 TNI) and third party vendor backplanes that are
compatible with the COMe modules from “variants”.
Thus, the src/mainboard/<module-name> directory contains the common
configuration code for all variants from src/mainboard/<module-name>/
variants, which can be supplemented/redefined with a configuration from
src/mainboard/<module-name>/carrierboard/<vendor-carrierboard-name>.
This architectural solution will be able to systematize and simplify
understanding of the code structure for COMe modules and will allow
vendors to add/maintain their code in a separate directory.
This work is also the first step towards to union of all carrierboards
into the global category in src/carrierboard on a par with all boards
from src/mainboard.
The patch takes this into account in the build system and adds
CARRIER_DIR component to use the “carrierboards” category, as it has
done for VARIANT_DIR.
TEST = Build ROM image for Kontron mAL10 COMe module together with T10
TNI carrier board (https://review.coreboot.org/c/coreboot/+/39133).
Change-Id: Ic6b2f8994b1293ae6f5bda8c9cc95128ba0abf7a
Signed-off-by: Maxim Polyakov <max.senia.poliak@gmail.com>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/42609
Reviewed-by: Angel Pons <th3fanbus@gmail.com>
Reviewed-by: Patrick Georgi <pgeorgi@google.com>
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
2020-06-20 16:26:21 +02:00
|
|
|
CARRIER_DIR:=$(call strip_quotes,$(CONFIG_CARRIER_DIR))
|
|
|
|
COREBOOT_EXPORTS += MAINBOARDDIR VARIANT_DIR CARRIER_DIR
|
2011-02-22 15:35:05 +01:00
|
|
|
|
2012-04-19 11:00:06 +02:00
|
|
|
## Final build results, which CBFSTOOL uses to create the final
|
|
|
|
## rom image file, are placed under $(objcbfs).
|
|
|
|
## These typically have suffixes .debug .elf .bin and .map
|
2017-08-23 23:48:13 +02:00
|
|
|
objcbfs := $(obj)/cbfs/$(CONFIG_CBFS_PREFIX)
|
2021-03-06 13:12:34 +01:00
|
|
|
additional-dirs += $(objcbfs)
|
2017-08-23 23:48:13 +02:00
|
|
|
COREBOOT_EXPORTS += objcbfs
|
2012-04-19 11:00:06 +02:00
|
|
|
|
|
|
|
## Based on the active configuration, Makefile conditionally collects
|
|
|
|
## the required assembly includes and saves them in a file.
|
|
|
|
## Such files that do not have a clear one-to-one relation to a source
|
|
|
|
## file under src/ are placed and built under $(objgenerated)
|
2017-08-23 23:48:13 +02:00
|
|
|
objgenerated := $(obj)/generated
|
2021-03-06 13:12:34 +01:00
|
|
|
additional-dirs += $(objgenerated)
|
2017-08-23 23:48:13 +02:00
|
|
|
COREBOOT_EXPORTS += objgenerated
|
2012-04-19 11:00:06 +02:00
|
|
|
|
2018-05-21 22:04:04 +02:00
|
|
|
## CCACHE_EXTRAFILES can be set by individual rules to help CCACHE
|
|
|
|
## discover dependencies it might not notice on its own (e.g. asm (".incbin")).
|
|
|
|
COREBOOT_EXPORTS += CCACHE_EXTRAFILES
|
|
|
|
|
2011-02-22 15:35:05 +01:00
|
|
|
#######################################################################
|
|
|
|
# root rule to resolve if in build mode (ie. configuration exists)
|
2016-02-02 17:38:45 +01:00
|
|
|
real-target: $(obj)/config.h coreboot files_added
|
2021-09-17 07:04:11 +02:00
|
|
|
coreboot: $(obj)/coreboot.rom $(obj)/cbfstool $(obj)/rmodtool $(obj)/ifwitool $(obj)/cse_fpt $(obj)/cse_serger
|
2011-02-22 15:35:05 +01:00
|
|
|
|
2016-01-25 03:38:33 +01:00
|
|
|
# This target can be used in site local to run scripts or additional
|
|
|
|
# targets after the build completes by creating a Makefile.inc in the
|
|
|
|
# site-local directory with a target named 'build_complete::'
|
|
|
|
build_complete:: coreboot
|
2022-12-14 16:26:35 +01:00
|
|
|
printf "\nBuilt %s (%s)\n" $(MAINBOARDDIR) $(CONFIG_MAINBOARD_PART_NUMBER)
|
|
|
|
if [ -f "$(CCACHE_STATSLOG)" ]; then \
|
|
|
|
printf "\nccache statistics\n"; \
|
|
|
|
$(CCACHE) --show-log-stats -v; \
|
|
|
|
fi
|
2016-01-25 03:38:33 +01:00
|
|
|
|
2016-02-02 17:38:45 +01:00
|
|
|
# This target can be used to run rules after all files were added to CBFS,
|
|
|
|
# for example to process FMAP regions or the entire image.
|
|
|
|
files_added:: build_complete
|
|
|
|
|
2011-02-22 15:35:05 +01:00
|
|
|
#######################################################################
|
|
|
|
# our phony targets
|
2021-03-06 13:12:34 +01:00
|
|
|
PHONY+= clean-abuild coreboot check-style build_complete
|
2011-02-22 15:35:05 +01:00
|
|
|
|
|
|
|
#######################################################################
|
|
|
|
# root source directories of coreboot
|
2020-12-24 15:33:20 +01:00
|
|
|
subdirs-y := src/lib src/commonlib/ src/console src/device src/acpi src/superio/common
|
2022-12-01 16:53:53 +01:00
|
|
|
subdirs-$(CONFIG_EC_ACPI) += src/ec/intel
|
2015-04-27 23:03:47 +02:00
|
|
|
subdirs-y += src/ec/acpi $(wildcard src/ec/*/*) $(wildcard src/southbridge/*/*)
|
2022-03-11 07:47:07 +01:00
|
|
|
subdirs-y += $(wildcard src/soc/*) $(wildcard src/soc/*/common) $(filter-out $(wildcard src/soc/*/common),$(wildcard src/soc/*/*))
|
|
|
|
subdirs-y += $(wildcard src/northbridge/*/*)
|
|
|
|
subdirs-y += $(filter-out src/superio/common,$(wildcard src/superio/*)) $(wildcard src/superio/*/*)
|
2020-08-28 21:46:35 +02:00
|
|
|
subdirs-y += $(wildcard src/drivers/*) $(wildcard src/drivers/*/*) $(wildcard src/drivers/*/*/*)
|
2016-03-12 05:22:28 +01:00
|
|
|
subdirs-y += src/cpu src/vendorcode
|
2020-09-29 11:32:36 +02:00
|
|
|
subdirs-y += util/cbfstool util/sconfig util/nvramtool util/pgtblgen util/amdfwtool
|
2020-10-25 12:37:21 +01:00
|
|
|
subdirs-y += util/futility util/marvell util/bincfg util/supermicro util/qemu
|
2021-01-11 15:17:59 +01:00
|
|
|
subdirs-y += util/ifdtool
|
2015-04-27 23:02:36 +02:00
|
|
|
subdirs-y += $(wildcard src/arch/*)
|
2011-02-22 15:35:05 +01:00
|
|
|
subdirs-y += src/mainboard/$(MAINBOARDDIR)
|
2017-10-17 17:02:29 +02:00
|
|
|
subdirs-y += src/security
|
2016-02-17 03:40:47 +01:00
|
|
|
subdirs-y += payloads payloads/external
|
Add SBOM (Software Bill of Materials) Generation
Firmware is typically delivered as one large binary image that gets
flashed. Since this final image consists of binaries and data from
a vast number of different people and companies, it's hard to
determine what all the small parts included in it are. The goal of
the software bill of materials (SBOM) is to take a firmware image
and make it easy to find out what it consists of and where those
pieces came from. Basically, this answers the question, who supplied
the code that's running on my system right now? For example, buyers
of a system can use an SBOM to perform an automated vulnerability
check or license analysis, both of which can be used to evaluate
risk in a product. Furthermore, one can quickly check to see if the
firmware is subject to a new vulnerability included in one of the
software parts (with the specified version) of the firmware.
Further reference:
https://web.archive.org/web/20220310104905/https://blogs.gnome.org/hughsie/2022/03/10/firmware-software-bill-of-materials/
- Add Makefile.inc to generate and build coswid tags
- Add templates for most payloads, coreboot, intel-microcode,
amd-microcode. intel FSP-S/M/T, EC, BIOS_ACM, SINIT_ACM,
intel ME and compiler (gcc,clang,other)
- Add Kconfig entries to optionally supply a path to CoSWID tags
instead of using the default CoSWID tags
- Add CBFS entry called SBOM to each build via Makefile.inc
- Add goswid utility tool to generate SBOM data
Signed-off-by: Maximilian Brune <maximilian.brune@9elements.com>
Change-Id: Icb7481d4903f95d200eddbfed7728fbec51819d0
Reviewed-on: https://review.coreboot.org/c/coreboot/+/63639
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Martin Roth <martin.roth@amd.corp-partner.google.com>
2022-04-14 14:54:16 +02:00
|
|
|
subdirs-$(CONFIG_SBOM) += src/sbom
|
2011-02-22 15:35:05 +01:00
|
|
|
|
2011-09-02 09:57:01 +02:00
|
|
|
subdirs-y += site-local
|
2017-07-31 19:52:58 +02:00
|
|
|
subdirs-y += util/checklist util/testing
|
2011-09-02 09:57:01 +02:00
|
|
|
|
2011-02-22 15:35:05 +01:00
|
|
|
#######################################################################
|
|
|
|
# Add source classes and their build options
|
Introduce bootblock self-decompression
Masked ROMs are the silent killers of boot speed on devices without
memory-mapped SPI flash. They often contain awfully slow SPI drivers
(presumably bit-banged) that take hundreds of milliseconds to load our
bootblock, and every extra kilobyte of bootblock size has a hugely
disproportionate impact on boot speed. The coreboot timestamps can never
show that component, but it impacts our users all the same.
This patch tries to alleviate that issue a bit by allowing us to
compress the bootblock with LZ4, which can cut its size down to nearly
half. Of course, masked ROMs usually don't come with decompression
algorithms built in, so we need to introduce a little decompression stub
that can decompress the rest of the bootblock. This is done by creating
a new "decompressor" stage which runs before the bootblock, but includes
the compressed bootblock code in its data section. It needs to be as
small as possible to get a real benefit from this approach, which means
no device drivers, no console output, no exception handling, etc.
Besides the decompression algorithm itself we only include the timer
driver so that we can measure the boot speed impact of decompression. On
ARM and ARM64 systems, we also need to give SoC code a chance to
initialize the MMU, since running decompression without MMU is
prohibitively slow on these architectures.
This feature is implemented for ARM and ARM64 architectures for now,
although most of it is architecture-independent and it should be
relatively simple to port to other platforms where a masked ROM loads
the bootblock into SRAM. It is also supposed to be a clean starting
point from which later optimizations can hopefully cut down the
decompression stub size (currently ~4K on RK3399) a bit more.
NOTE: Bootblock compression is not for everyone. Possible side effects
include trying to run LZ4 on CPUs that come out of reset extremely
underclocked or enabling this too early in SoC bring-up and getting
frustrated trying to find issues in an undebuggable environment. Ask
your SoC vendor if bootblock compression is right for you.
Change-Id: I0dc1cad9ae7508892e477739e743cd1afb5945e8
Signed-off-by: Julius Werner <jwerner@chromium.org>
Reviewed-on: https://review.coreboot.org/26340
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Aaron Durbin <adurbin@chromium.org>
2018-05-16 23:14:04 +02:00
|
|
|
classes-y := ramstage romstage bootblock decompressor postcar smm smmstub cpu_microcode verstage
|
2014-07-31 18:28:55 +02:00
|
|
|
|
2019-06-04 13:16:28 +02:00
|
|
|
# Add a special 'all' class to add sources to all stages
|
|
|
|
$(call add-special-class,all)
|
|
|
|
all-handler = $(foreach class,bootblock verstage romstage postcar ramstage,$(eval $(class)-y += $(2)))
|
|
|
|
|
Makefile.inc: introduce all_x86 target
For compilation units that should be built for all stages that run on
the x86 cores in a newer AMD SoC, but can't be built for verstage on PSP
which is an ARM core, the 'all' target can't be used, since that would
result in the compilation unit also being added to the verstage target
in the verstage on PSP case. In order to not need to add a compilation
unit to the 'bootblock', 'verstage_x86', 'romstage', and 'ramstage'
targets in separate lines in the Makefile, introduce the 'all_x86'
target that adds a file to 'bootblock', 'verstage_x86', 'romstage',
'postcar', and 'ramstage'. The compilation units also need to be added
to the 'postcar' stage which is only present on the pre-Zen SoCs to be
able to also use the 'all_x86' target in common AMD code that is also
used in those pre-Zen SoCs.
Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
Change-Id: I9d0184182b931185990094d0874b49c0b5cb9f7e
Reviewed-on: https://review.coreboot.org/c/coreboot/+/74150
Reviewed-by: Fred Reitberger <reitbergerfred@gmail.com>
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Matt DeVillier <matt.devillier@amd.corp-partner.google.com>
Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
2023-04-01 01:26:39 +02:00
|
|
|
$(call add-special-class,all_x86)
|
|
|
|
all_x86-handler = $(foreach class,bootblock verstage_x86 romstage postcar ramstage,$(eval $(class)-y += $(2)))
|
|
|
|
|
2020-06-04 03:24:11 +02:00
|
|
|
$(call add-special-class,verstage_x86)
|
|
|
|
ifeq ($(CONFIG_ARCH_VERSTAGE_X86_32)$(CONFIG_ARCH_VERSTAGE_X86_64),y)
|
|
|
|
verstage_x86-handler = $(eval verstage-y += $(2))
|
|
|
|
else
|
|
|
|
verstage_x86-handler =
|
|
|
|
endif
|
|
|
|
|
2014-07-31 18:28:55 +02:00
|
|
|
# Add dynamic classes for rmodules
|
|
|
|
$(foreach supported_arch,$(ARCH_SUPPORTED), \
|
|
|
|
$(eval $(call define_class,rmodules_$(supported_arch),$(supported_arch))))
|
2015-09-05 19:59:26 +02:00
|
|
|
# Provide a macro to determine environment for free standing rmodules.
|
|
|
|
$(foreach supported_arch,$(ARCH_SUPPORTED), \
|
|
|
|
$(eval rmodules_$(supported_arch)-generic-ccopts += -D__RMODULE__))
|
2011-02-22 15:35:05 +01:00
|
|
|
|
2014-11-12 19:11:50 +01:00
|
|
|
#######################################################################
|
2016-03-14 22:07:14 +01:00
|
|
|
# Helper functions for math, strings, and various file placement matters.
|
2015-07-03 20:54:14 +02:00
|
|
|
# macros work on all formats understood by printf(1)
|
|
|
|
# values are space separated if using more than one value
|
2014-11-12 19:11:50 +01:00
|
|
|
#
|
2017-09-19 21:25:11 +02:00
|
|
|
# int-add: adds an arbitrary length list of integers
|
2018-12-11 17:53:07 +01:00
|
|
|
# int-subtract: subtracts the second of two integers from the first
|
2017-09-19 21:25:11 +02:00
|
|
|
# int-multiply: multiplies an arbitrary length list of integers
|
|
|
|
# int-divide: divides the first integer by the second
|
|
|
|
# int-remainder: arithmetic remainder of the first number divided by the second
|
|
|
|
# int-shift-left: Shift $1 left by $2 bits
|
|
|
|
# int-lt: 1 if the first value is less than the second. 0 otherwise
|
|
|
|
# int-gt: 1 if the first values is greater than the second. 0 otherwise
|
|
|
|
# int-eq: 1 if the two values are equal. 0 otherwise
|
|
|
|
# int-align: align $1 to $2 units
|
|
|
|
# file-size: returns the filesize of the given file
|
|
|
|
# tolower: returns the value in all lowercase
|
|
|
|
# toupper: returns the value in all uppercase
|
|
|
|
# ws_to_under: returns the value with any whitespace changed to underscores
|
2014-11-12 19:11:50 +01:00
|
|
|
_toint=$(shell printf "%d" $1)
|
2023-02-11 09:28:16 +01:00
|
|
|
_tohex=$(shell printf 0x"%x" $1)
|
2014-11-12 19:11:50 +01:00
|
|
|
_int-add2=$(shell expr $(call _toint,$1) + $(call _toint,$2))
|
|
|
|
int-add=$(if $(filter 1,$(words $1)),$(strip $1),$(call int-add,$(call _int-add2,$(word 1,$1),$(word 2,$1)) $(wordlist 3,$(words $1),$1)))
|
2015-07-03 20:54:14 +02:00
|
|
|
int-subtract=$(if $(filter 1,$(words $1)),$(strip $1),$(shell expr $(call _toint,$(word 1,$1)) - $(call _toint,$(word 2,$1))))
|
|
|
|
_int-multiply2=$(shell expr $(call _toint,$1) \* $(call _toint,$2))
|
|
|
|
int-multiply=$(if $(filter 1,$(words $1)),$(strip $1),$(call int-multiply,$(call _int-multiply2,$(word 1,$1),$(word 2,$1)) $(wordlist 3,$(words $1),$1)))
|
|
|
|
int-divide=$(if $(filter 1,$(words $1)),$(strip $1),$(shell expr $(call _toint,$(word 1,$1)) / $(call _toint,$(word 2,$1))))
|
|
|
|
int-remainder=$(if $(filter 1,$(words $1)),$(strip $1),$(shell expr $(call _toint,$(word 1,$1)) % $(call _toint,$(word 2,$1))))
|
2017-09-19 21:25:11 +02:00
|
|
|
int-shift-left=$(shell echo "$(call _toint,$(word 1, $1)) * (2 ^ $(call _toint,$(word 2, $1)))" | bc)
|
2015-07-03 20:54:14 +02:00
|
|
|
int-lt=$(if $(filter 1,$(words $1)),$(strip $1),$(shell expr $(call _toint,$(word 1,$1)) \< $(call _toint,$(word 2,$1))))
|
|
|
|
int-gt=$(if $(filter 1,$(words $1)),$(strip $1),$(shell expr $(call _toint,$(word 1,$1)) \> $(call _toint,$(word 2,$1))))
|
|
|
|
int-eq=$(if $(filter 1,$(words $1)),$(strip $1),$(shell expr $(call _toint,$(word 1,$1)) = $(call _toint,$(word 2,$1))))
|
2014-12-03 11:20:51 +01:00
|
|
|
int-align=$(shell A=$(call _toint,$1) B=$(call _toint,$2); expr $$A + \( \( $$B - \( $$A % $$B \) \) % $$B \) )
|
2018-12-25 02:52:52 +01:00
|
|
|
int-align-down=$(shell A=$(call _toint,$1) B=$(call _toint,$2); expr $$A - \( $$A % $$B \) )
|
2022-09-01 04:42:50 +02:00
|
|
|
file-size=$(strip $(shell wc -c "$1" | cut -f 1 -d ' '))
|
2016-03-14 22:07:14 +01:00
|
|
|
tolower=$(shell echo '$1' | tr '[:upper:]' '[:lower:]')
|
|
|
|
toupper=$(shell echo '$1' | tr '[:lower:]' '[:upper:]')
|
|
|
|
ws_to_under=$(shell echo '$1' | tr ' \t' '_')
|
2014-11-12 19:11:50 +01:00
|
|
|
|
2012-11-25 17:10:47 +01:00
|
|
|
#######################################################################
|
|
|
|
# Helper functions for ramstage postprocess
|
|
|
|
spc :=
|
2020-02-09 11:24:32 +01:00
|
|
|
spc := $(spc) $(spc)
|
2016-01-20 15:54:31 +01:00
|
|
|
comma := ,
|
2012-11-25 17:10:47 +01:00
|
|
|
|
2018-07-02 18:19:40 +02:00
|
|
|
# Returns all files and dirs below `dir` (recursively).
|
|
|
|
# files-below-dir,dir,files
|
|
|
|
files-below-dir=$(filter $(1)%,$(2))
|
2012-11-25 17:10:47 +01:00
|
|
|
|
2018-07-02 18:19:40 +02:00
|
|
|
# Returns all dirs below `dir` (recursively).
|
|
|
|
# dirs-below-dir,dir,files
|
|
|
|
dirs-below-dir=$(filter-out $(1),$(sort $(dir $(call files-below-dir,$(1),$(2)))))
|
2012-11-25 17:10:47 +01:00
|
|
|
|
2018-07-02 18:19:40 +02:00
|
|
|
# Returns all files directly in `dir` (non-recursively).
|
2012-11-25 17:10:47 +01:00
|
|
|
# files-in-dir,dir,files
|
2018-07-02 18:19:40 +02:00
|
|
|
files-in-dir=$(filter-out $(addsuffix %,$(call dirs-below-dir,$(1),$(2))),$(call files-below-dir,$(1),$(2)))
|
2012-11-25 17:10:47 +01:00
|
|
|
|
|
|
|
#######################################################################
|
|
|
|
# reduce command line length by linking the objects of each
|
|
|
|
# directory into an intermediate file
|
2014-12-05 21:32:09 +01:00
|
|
|
ramstage-postprocess=$$(eval DEPENDENCIES+=$$(addsuffix .d,$$(basename $(1)))) \
|
|
|
|
$(foreach d,$(sort $(dir $(filter-out %.ld,$(1)))), \
|
2015-05-07 22:24:41 +02:00
|
|
|
$(eval $(d)ramstage.a: $(call files-in-dir,$(d),$(filter-out %.ld,$(1))); rm -f $$@ && $(AR_ramstage) rcsT $$@ $$^ ) \
|
|
|
|
$(eval ramstage-objs:=$(d)ramstage.a $(filter-out $(filter-out %.ld, $(call files-in-dir,$(d),$(1))),$(ramstage-objs))))
|
2012-11-25 17:10:47 +01:00
|
|
|
|
2019-11-21 07:09:34 +01:00
|
|
|
decompressor-generic-ccopts += -D__DECOMPRESSOR__
|
|
|
|
bootblock-generic-ccopts += -D__BOOTBLOCK__
|
|
|
|
romstage-generic-ccopts += -D__ROMSTAGE__
|
2014-09-16 07:10:33 +02:00
|
|
|
ramstage-generic-ccopts += -D__RAMSTAGE__
|
Implement GCC code coverage analysis
In order to provide some insight on what code is executed during
coreboot's run time and how well our test scenarios work, this
adds code coverage support to coreboot's ram stage. This should
be easily adaptable for payloads, and maybe even romstage.
See http://gcc.gnu.org/onlinedocs/gcc/Gcov.html for
more information.
To instrument coreboot, select CONFIG_COVERAGE ("Code coverage
support") in Kconfig, and recompile coreboot. coreboot will then
store its code coverage information into CBMEM, if possible.
Then, run "cbmem -CV" as root on the target system running the
instrumented coreboot binary. This will create a whole bunch of
.gcda files that contain coverage information. Tar them up, copy
them to your build system machine, and untar them. Then you can
use your favorite coverage utility (gcov, lcov, ...) to visualize
code coverage.
For a sneak peak of what will expect you, please take a look
at http://www.coreboot.org/~stepan/coreboot-coverage/
Change-Id: Ib287d8309878a1f5c4be770c38b1bc0bb3aa6ec7
Signed-off-by: Stefan Reinauer <reinauer@google.com>
Reviewed-on: http://review.coreboot.org/2052
Tested-by: build bot (Jenkins)
Reviewed-by: David Hendricks <dhendrix@chromium.org>
Reviewed-by: Martin Roth <martin@se-eng.com>
Reviewed-by: Ronald G. Minnich <rminnich@gmail.com>
2012-12-19 01:23:28 +01:00
|
|
|
ifeq ($(CONFIG_COVERAGE),y)
|
2014-09-16 07:10:33 +02:00
|
|
|
ramstage-c-ccopts += -fprofile-arcs -ftest-coverage
|
Implement GCC code coverage analysis
In order to provide some insight on what code is executed during
coreboot's run time and how well our test scenarios work, this
adds code coverage support to coreboot's ram stage. This should
be easily adaptable for payloads, and maybe even romstage.
See http://gcc.gnu.org/onlinedocs/gcc/Gcov.html for
more information.
To instrument coreboot, select CONFIG_COVERAGE ("Code coverage
support") in Kconfig, and recompile coreboot. coreboot will then
store its code coverage information into CBMEM, if possible.
Then, run "cbmem -CV" as root on the target system running the
instrumented coreboot binary. This will create a whole bunch of
.gcda files that contain coverage information. Tar them up, copy
them to your build system machine, and untar them. Then you can
use your favorite coverage utility (gcov, lcov, ...) to visualize
code coverage.
For a sneak peak of what will expect you, please take a look
at http://www.coreboot.org/~stepan/coreboot-coverage/
Change-Id: Ib287d8309878a1f5c4be770c38b1bc0bb3aa6ec7
Signed-off-by: Stefan Reinauer <reinauer@google.com>
Reviewed-on: http://review.coreboot.org/2052
Tested-by: build bot (Jenkins)
Reviewed-by: David Hendricks <dhendrix@chromium.org>
Reviewed-by: Martin Roth <martin@se-eng.com>
Reviewed-by: Ronald G. Minnich <rminnich@gmail.com>
2012-12-19 01:23:28 +01:00
|
|
|
endif
|
2022-06-23 02:33:43 +02:00
|
|
|
ifneq ($(GIT),)
|
2016-04-20 04:15:16 +02:00
|
|
|
ifneq ($(UPDATED_SUBMODULES),1)
|
2022-06-23 02:35:58 +02:00
|
|
|
$(info Updating git submodules.)
|
2015-02-13 03:34:11 +01:00
|
|
|
# try to fetch non-optional submodules if the source is under git
|
2022-06-23 02:33:43 +02:00
|
|
|
forgetthis:=$(shell git submodule update --init $(quiet_errors))
|
2021-04-21 23:09:04 +02:00
|
|
|
# Checkout Cmocka repository
|
2022-06-23 02:33:43 +02:00
|
|
|
forgetthis:=$(shell git submodule update --init --checkout 3rdparty/cmocka $(quiet_errors))
|
2012-04-30 21:06:10 +02:00
|
|
|
ifeq ($(CONFIG_USE_BLOBS),y)
|
2019-10-29 18:44:16 +01:00
|
|
|
# These items are necessary because each has update=none in .gitmodules. They are ignored
|
|
|
|
# until expressly requested and enabled with --checkout
|
2022-06-23 02:33:43 +02:00
|
|
|
forgetthis:=$(shell git submodule update --init --checkout 3rdparty/blobs $(quiet_errors))
|
|
|
|
forgetthis:=$(shell git submodule update --init --checkout 3rdparty/intel-microcode $(quiet_errors))
|
2020-06-24 18:49:41 +02:00
|
|
|
ifeq ($(CONFIG_FSP_USE_REPO),y)
|
2022-06-23 02:33:43 +02:00
|
|
|
forgetthis:=$(shell git submodule update --init --checkout 3rdparty/fsp $(quiet_errors))
|
2019-01-08 11:37:18 +01:00
|
|
|
endif
|
2019-10-28 22:55:03 +01:00
|
|
|
ifeq ($(CONFIG_USE_AMD_BLOBS),y)
|
2022-06-23 02:33:43 +02:00
|
|
|
forgetthis:=$(shell git submodule update --init --checkout 3rdparty/amd_blobs $(quiet_errors))
|
2019-10-28 22:55:03 +01:00
|
|
|
endif
|
2020-06-19 00:03:22 +02:00
|
|
|
ifeq ($(CONFIG_USE_QC_BLOBS),y)
|
2022-06-23 02:33:43 +02:00
|
|
|
forgetthis:=$(shell git submodule update --init --checkout 3rdparty/qc_blobs $(quiet_errors))
|
2020-06-19 00:03:22 +02:00
|
|
|
endif
|
2019-01-08 11:37:18 +01:00
|
|
|
endif
|
2017-08-23 23:48:13 +02:00
|
|
|
UPDATED_SUBMODULES:=1
|
|
|
|
COREBOOT_EXPORTS += UPDATED_SUBMODULES
|
2021-11-21 16:42:04 +01:00
|
|
|
|
2016-04-20 04:15:16 +02:00
|
|
|
endif
|
2022-06-23 02:33:43 +02:00
|
|
|
endif # GIT != ""
|
2012-04-30 21:06:10 +02:00
|
|
|
|
2017-07-25 15:55:08 +02:00
|
|
|
postcar-c-deps:=$$(OPTION_TABLE_H)
|
2011-03-08 21:49:18 +01:00
|
|
|
ramstage-c-deps:=$$(OPTION_TABLE_H)
|
|
|
|
romstage-c-deps:=$$(OPTION_TABLE_H)
|
2015-01-14 19:51:47 +01:00
|
|
|
verstage-c-deps:=$$(OPTION_TABLE_H)
|
2013-01-31 18:09:24 +01:00
|
|
|
bootblock-c-deps:=$$(OPTION_TABLE_H)
|
2015-09-29 16:41:19 +02:00
|
|
|
$(foreach type,ads adb, \
|
|
|
|
$(foreach stage,$(COREBOOT_STANDARD_STAGES), \
|
2019-01-01 22:06:01 +01:00
|
|
|
$(eval $(stage)-$(type)-deps := \
|
|
|
|
$(obj)/$(stage)/$(notdir $(KCONFIG_AUTOADS)) \
|
|
|
|
$(obj)/libgnat-$(ARCH-$(stage)-y)/libgnat.a)))
|
2011-03-08 21:49:18 +01:00
|
|
|
|
2015-04-03 10:47:15 +02:00
|
|
|
# Add handler to copy linker scripts
|
|
|
|
define generic-objs_ld_template_gen
|
|
|
|
de$(EMPTY)fine $(1)-objs_ld_template
|
2019-11-07 04:29:44 +01:00
|
|
|
$$(call src-to-obj,$1,$$(1).ld): $$(1).ld $(obj)/config.h $(obj)/fmap_config.h
|
2015-04-03 10:47:15 +02:00
|
|
|
@printf " CP $$$$(subst $$$$(obj)/,,$$$$(@))\n"
|
2015-09-30 01:41:11 +02:00
|
|
|
$$(CC_$(1)) -MMD $$(CPPFLAGS_$(1)) $$($(1)-ld-ccopts) $(PREPROCESS_ONLY) -include $(obj)/config.h -MT $$$$@ -o $$$$@ $$$$<
|
2015-04-03 10:47:15 +02:00
|
|
|
en$(EMPTY)def
|
|
|
|
endef
|
|
|
|
|
2015-04-27 18:01:12 +02:00
|
|
|
# Add handler to deal with archives
|
|
|
|
define generic-objs_a_template_gen
|
|
|
|
de$(EMPTY)fine $(1)-objs_a_template
|
|
|
|
$$(call src-to-obj,$1,$$(1).a): $$(1).a
|
2016-01-23 03:23:23 +01:00
|
|
|
@printf " AR $$$$(subst $$$$(obj)/,,$$$$(@))\n"
|
|
|
|
$$$$(AR_$(1)) rcsT $$$$@.tmp $$$$<
|
2015-04-27 18:01:12 +02:00
|
|
|
mv $$$$@.tmp $$$$@
|
|
|
|
en$(EMPTY)def
|
|
|
|
endef
|
|
|
|
|
2015-04-03 10:39:05 +02:00
|
|
|
# Add handler to add no rules for manual files
|
|
|
|
define generic-objs_manual_template_gen
|
|
|
|
# do nothing
|
|
|
|
endef
|
|
|
|
|
2011-02-22 15:35:05 +01:00
|
|
|
#######################################################################
|
|
|
|
# Add handler to compile ACPI's ASL
|
2015-07-30 19:44:58 +02:00
|
|
|
# arg1: base file name
|
|
|
|
# arg2: y or n for including in cbfs. defaults to y
|
2018-05-17 18:18:01 +02:00
|
|
|
|
|
|
|
# Empty resource templates were marked as a warning in IASL with the comment
|
|
|
|
# "This would appear to be worthless in real-world ASL code.", which is
|
|
|
|
# possibly true in many cases. In other cases it seems that an empty
|
|
|
|
# ResourceTemplate is the correct code.
|
|
|
|
# As it's valid ASL, disable the warning.
|
|
|
|
EMPTY_RESOURCE_TEMPLATE_WARNING = 3150
|
2020-02-09 22:30:26 +01:00
|
|
|
|
2022-05-09 15:18:56 +02:00
|
|
|
IASL_WARNINGS_LIST = $(EMPTY_RESOURCE_TEMPLATE_WARNING)
|
2020-08-27 15:41:53 +02:00
|
|
|
|
|
|
|
IGNORED_IASL_WARNINGS = $(addprefix -vw , $(IASL_WARNINGS_LIST))
|
|
|
|
|
2015-05-31 12:31:59 +02:00
|
|
|
define asl_template
|
2015-11-30 22:44:53 +01:00
|
|
|
$(CONFIG_CBFS_PREFIX)/$(1).aml-file = $(obj)/$(1).aml
|
|
|
|
$(CONFIG_CBFS_PREFIX)/$(1).aml-type = raw
|
|
|
|
$(CONFIG_CBFS_PREFIX)/$(1).aml-compression = none
|
2021-11-19 19:38:35 +01:00
|
|
|
ifeq ($(CONFIG_SOC_AMD_COMMON_BLOCK_LPC_SPI_DMA),y)
|
|
|
|
$(CONFIG_CBFS_PREFIX)/$(1).aml-align = 64
|
|
|
|
endif
|
2015-11-30 22:44:53 +01:00
|
|
|
cbfs-files-$(if $(2),$(2),y) += $(CONFIG_CBFS_PREFIX)/$(1).aml
|
2015-12-09 21:05:00 +01:00
|
|
|
-include $(obj)/$(1).d
|
2015-05-31 12:31:59 +02:00
|
|
|
$(obj)/$(1).aml: $(src)/mainboard/$(MAINBOARDDIR)/$(1).asl $(obj)/config.h
|
2011-02-22 15:35:05 +01:00
|
|
|
@printf " IASL $$(subst $(top)/,,$$(@))\n"
|
2019-02-20 17:03:52 +01:00
|
|
|
$(CC_ramstage) -x assembler-with-cpp -E -MMD -MT $$(@) $$(CPPFLAGS_ramstage) -D__ACPI__ -P -include $(src)/include/kconfig.h -I$(obj) -I$(src) -I$(src)/include -I$(src)/arch/$(ARCHDIR-$(ARCH-ramstage-y))/include -I$(src)/mainboard/$(MAINBOARDDIR) $$< -o $(obj)/$(1).asl
|
|
|
|
cd $$(dir $$@); $(IASL) $(IGNORED_IASL_WARNINGS) -we -p $$(notdir $$@) $(1).asl
|
2020-08-27 15:41:53 +02:00
|
|
|
echo " IASL "$(IASL_WARNINGS_LIST)" warning types were ignored!"
|
2019-04-26 15:11:42 +02:00
|
|
|
if ! $(IASL) -d $$@ 2>&1 | grep -Eq 'ACPI (Warning|Error)'; then \
|
|
|
|
echo " IASL $$@ disassembled correctly."; \
|
|
|
|
true; \
|
|
|
|
else \
|
|
|
|
echo "Error: Could not correctly disassemble $$@"; \
|
|
|
|
$(IASL) -d $$@; \
|
|
|
|
false; \
|
|
|
|
fi
|
2011-02-22 15:35:05 +01:00
|
|
|
endef
|
|
|
|
|
2012-03-09 12:30:07 +01:00
|
|
|
#######################################################################
|
2020-02-16 10:01:33 +01:00
|
|
|
# Parse plaintext CMOS defaults into binary format
|
2012-03-09 12:30:07 +01:00
|
|
|
# arg1: source file
|
|
|
|
# arg2: binary file name
|
|
|
|
cbfs-files-processor-nvramtool= \
|
2021-05-17 12:12:39 +02:00
|
|
|
$(eval $(2): $(1) $(top)/$(call strip_quotes,$(CONFIG_CMOS_LAYOUT_FILE)) | $(objutil)/nvramtool/nvramtool ; \
|
2015-11-25 19:17:42 +01:00
|
|
|
printf " CREATE $(2) (from $(1))\n"; \
|
2021-05-17 12:12:39 +02:00
|
|
|
$(objutil)/nvramtool/nvramtool -y $(top)/$(call strip_quotes,$(CONFIG_CMOS_LAYOUT_FILE)) -D $(2).tmp -p $(1) && \
|
2015-11-25 19:17:42 +01:00
|
|
|
mv $(2).tmp $(2))
|
2012-03-09 12:30:07 +01:00
|
|
|
|
2015-11-25 18:47:56 +01:00
|
|
|
#######################################################################
|
2022-11-24 03:20:32 +01:00
|
|
|
# Reduce a .config file by removing lines about default unset booleans
|
2015-11-25 18:47:56 +01:00
|
|
|
# arg1: input
|
|
|
|
# arg2: output
|
build: List all Kconfigs in CBFS `config` file, compress it
The coreboot build system automatically adds a `config` file to CBFS
that lists the exact Kconfig configuration that this image was built
with. This is useful to reproduce a build after the fact or to check
whether support for a specific feature is enabled in the image.
However, the file is currently generated using the `savedefconfig`
command to Kconfig, which generates the minimal .config file that is
needed to produce the required config in a coreboot build. This is fine
for reproduction, but bad when you want to check if a certain config was
enabled, since many configs get enabled by default or pulled in through
another config's `select` statement and thus don't show up in the
defconfig.
This patch tries to fix that second use case by instead including the
full .config instead. In order to save some space, we can remove all
comments (e.g. `# CONFIG_XXX is not set`) from the file, which still
makes it easy to test for a specific config (if it's in the file you can
extract the right value, if not you can assume it was set to `n`). We
can also LZMA compress it since this file is never read by firmware
itself and only intended for later re-extraction via cbfstool, which
always has LZMA support included.
On a sample Trogdor device the existing (uncompressed) `config` file
takes up 519 bytes in CBFS, whereas the new (compressed) file after this
patch will take up 1832 bytes -- still a small amount that should
hopefully not break the bank for anyone.
Signed-off-by: Julius Werner <jwerner@chromium.org>
Change-Id: I5259ec6f932cdc5780b8843f46dd476da9d19728
Reviewed-on: https://review.coreboot.org/c/coreboot/+/69710
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Yu-Ping Wu <yupingso@google.com>
Reviewed-by: Jakub Czapiga <jacz@semihalf.com>
Reviewed-by: Martin Roth <martin.roth@amd.corp-partner.google.com>
2022-11-17 02:48:46 +01:00
|
|
|
define cbfs-files-processor-config
|
2023-01-18 12:28:08 +01:00
|
|
|
$(eval $(2): $(1) $(obj)/build.h $(objutil)/kconfig/conf; \
|
2017-01-30 15:29:34 +01:00
|
|
|
+printf " CREATE $(2) (from $(1))\n"; \
|
2020-02-09 11:44:27 +01:00
|
|
|
printf "# This image was built using coreboot " > $(2).tmp && \
|
2015-11-27 12:36:28 +01:00
|
|
|
grep "\<COREBOOT_VERSION\>" $(obj)/build.h |cut -d\" -f2 >> $(2).tmp && \
|
2022-11-24 03:20:32 +01:00
|
|
|
$(MAKE) DOTCONFIG=$(1) DEFCONFIG=$(2).tmp2 savedefconfig && \
|
|
|
|
cat $(2).tmp2 >> $(2).tmp && \
|
|
|
|
printf "# End of defconfig. Derivable values start here.\n" >> $(2).tmp && \
|
|
|
|
grep "^CONFIG" $(1) | grep -F -v -f $(2).tmp2 >> $(2).tmp && \
|
|
|
|
rm -f $(2).tmp2 && \
|
|
|
|
mv -f $(2).tmp $(2))
|
2020-02-09 11:44:27 +01:00
|
|
|
endef
|
2015-11-25 18:47:56 +01:00
|
|
|
|
2023-05-10 20:43:24 +02:00
|
|
|
#######################################################################
|
|
|
|
# Add a file to CBFS with just type and compression values
|
|
|
|
# arg1: name in CBFS
|
|
|
|
# arg2: filename and path
|
|
|
|
# arg3: type in CBFS
|
|
|
|
# arg4: compression type
|
|
|
|
define add-cbfs-file-simple
|
|
|
|
$(eval cbfs-files-y += $(1))
|
|
|
|
$(eval $(1)-file := $(2))
|
|
|
|
$(eval $(1)-type := $(3))
|
|
|
|
$(eval $(1)-compression := $(4))
|
|
|
|
endef
|
|
|
|
|
2016-08-20 00:43:06 +02:00
|
|
|
#######################################################################
|
|
|
|
# Compile a C file with a bare struct definition into binary
|
|
|
|
# arg1: C source file
|
|
|
|
# arg2: binary file
|
|
|
|
cbfs-files-processor-struct= \
|
2022-04-04 14:02:19 +02:00
|
|
|
$(eval $(2): $(1) $(obj)/build.h $(obj)/fmap_config.h $(KCONFIG_AUTOHEADER); \
|
2020-12-01 09:17:24 +01:00
|
|
|
printf " CC+STRIP $(1)\n"; \
|
2021-03-12 10:24:44 +01:00
|
|
|
$(CC_ramstage) -MMD $(CPPFLAGS_ramstage) $(CFLAGS_ramstage) --param asan-globals=0 $$(ramstage-c-ccopts) -include $(KCONFIG_AUTOHEADER) -MT $(2) -o $(2).tmp -c $(1) && \
|
2022-07-13 05:23:15 +02:00
|
|
|
$(OBJCOPY_ramstage) -O binary --only-section='.data*' --only-section='.bss*' --set-section-flags .bss*=alloc,contents,load $(2).tmp $(2); \
|
2016-08-20 00:43:06 +02:00
|
|
|
rm -f $(2).tmp) \
|
|
|
|
$(eval DEPENDENCIES += $(2).d)
|
|
|
|
|
2011-02-22 15:35:05 +01:00
|
|
|
#######################################################################
|
|
|
|
# Add handler for arbitrary files in CBFS
|
|
|
|
$(call add-special-class,cbfs-files)
|
|
|
|
cbfs-files-handler= \
|
2012-03-09 12:30:07 +01:00
|
|
|
$(eval tmp-cbfs-method:=$(word 2, $(subst :, ,$($(2)-file)))) \
|
2012-11-15 14:51:54 +01:00
|
|
|
$(eval $(2)-file:=$(call strip_quotes,$(word 1, $(subst :, ,$($(2)-file))))) \
|
2015-11-25 18:59:54 +01:00
|
|
|
$(eval tmp-cbfs-file:= ) \
|
|
|
|
$(if $($(2)-file), \
|
|
|
|
$(if $(wildcard $(1)$($(2)-file)), \
|
|
|
|
$(eval tmp-cbfs-file:= $(wildcard $(1)$($(2)-file))), \
|
|
|
|
$(eval tmp-cbfs-file:= $($(2)-file)))) \
|
2013-02-16 01:06:57 +01:00
|
|
|
$(if $(strip $($(2)-required)), \
|
|
|
|
$(if $(wildcard $(tmp-cbfs-file)),, \
|
|
|
|
$(info This build configuration requires $($(2)-required)) \
|
|
|
|
$(eval FAILBUILD:=1) \
|
|
|
|
)) \
|
2014-12-09 12:49:21 +01:00
|
|
|
$(if $(strip $($(2)-align)), \
|
|
|
|
$(if $(strip $($(2)-position)), \
|
|
|
|
$(info ERROR: It is not allowed to specify both alignment and position for $($(2)-file)) \
|
|
|
|
$(eval FAILBUILD:=1) \
|
|
|
|
)) \
|
2012-03-09 12:30:07 +01:00
|
|
|
$(if $(tmp-cbfs-method), \
|
|
|
|
$(eval tmp-old-cbfs-file:=$(tmp-cbfs-file)) \
|
2012-09-21 18:11:59 +02:00
|
|
|
$(eval tmp-cbfs-file:=$(shell mkdir -p $(obj)/mainboard/$(MAINBOARDDIR); mktemp $(obj)/mainboard/$(MAINBOARDDIR)/cbfs-file.XXXXXX).out) \
|
2012-03-09 12:30:07 +01:00
|
|
|
$(call cbfs-files-processor-$(tmp-cbfs-method),$(tmp-old-cbfs-file),$(tmp-cbfs-file))) \
|
2015-11-25 18:59:54 +01:00
|
|
|
$(if $(tmp-cbfs-file), \
|
2016-08-10 13:29:03 +02:00
|
|
|
$(eval cbfs-files += $(subst $(spc),*,$(tmp-cbfs-file)|$(2)|$($(2)-type)|$($(2)-compression)|$(strip $($(2)-position))|$($(2)-align)|$($(2)-options)))) \
|
2011-02-22 15:35:05 +01:00
|
|
|
$(eval $(2)-name:=) \
|
|
|
|
$(eval $(2)-type:=) \
|
2012-08-14 19:01:53 +02:00
|
|
|
$(eval $(2)-compression:=) \
|
2013-02-16 01:06:57 +01:00
|
|
|
$(eval $(2)-position:=) \
|
2014-12-09 12:49:21 +01:00
|
|
|
$(eval $(2)-required:=) \
|
2015-11-26 16:37:45 +01:00
|
|
|
$(eval $(2)-options:=) \
|
2014-12-09 12:49:21 +01:00
|
|
|
$(eval $(2)-align:=)
|
2011-02-22 15:35:05 +01:00
|
|
|
|
|
|
|
#######################################################################
|
|
|
|
# a variety of flags for our build
|
2012-10-30 00:52:36 +01:00
|
|
|
CBFS_COMPRESS_FLAG:=none
|
2023-01-05 01:26:21 +01:00
|
|
|
ifeq ($(CONFIG_COMPRESS_RAMSTAGE_LZMA),y)
|
2012-10-30 00:52:36 +01:00
|
|
|
CBFS_COMPRESS_FLAG:=LZMA
|
2011-05-02 21:53:04 +02:00
|
|
|
endif
|
2023-01-05 01:26:21 +01:00
|
|
|
ifeq ($(CONFIG_COMPRESS_RAMSTAGE_LZ4),y)
|
|
|
|
CBFS_COMPRESS_FLAG:=LZ4
|
|
|
|
endif
|
2011-05-02 21:53:04 +02:00
|
|
|
|
2012-10-30 00:52:36 +01:00
|
|
|
CBFS_PAYLOAD_COMPRESS_FLAG:=none
|
2011-02-22 15:35:05 +01:00
|
|
|
ifeq ($(CONFIG_COMPRESSED_PAYLOAD_LZMA),y)
|
2012-10-30 00:52:36 +01:00
|
|
|
CBFS_PAYLOAD_COMPRESS_FLAG:=LZMA
|
2011-02-22 15:35:05 +01:00
|
|
|
endif
|
2016-07-23 17:11:44 +02:00
|
|
|
ifeq ($(CONFIG_COMPRESSED_PAYLOAD_LZ4),y)
|
|
|
|
CBFS_PAYLOAD_COMPRESS_FLAG:=LZ4
|
|
|
|
endif
|
2011-02-22 15:35:05 +01:00
|
|
|
|
2018-02-07 13:01:43 +01:00
|
|
|
CBFS_SECONDARY_PAYLOAD_COMPRESS_FLAG:=none
|
|
|
|
ifeq ($(CONFIG_COMPRESS_SECONDARY_PAYLOAD),y)
|
|
|
|
CBFS_SECONDARY_PAYLOAD_COMPRESS_FLAG:=LZMA
|
|
|
|
endif
|
|
|
|
|
2015-09-29 22:51:35 +02:00
|
|
|
CBFS_PRERAM_COMPRESS_FLAG:=none
|
|
|
|
ifeq ($(CONFIG_COMPRESS_PRERAM_STAGES),y)
|
|
|
|
CBFS_PRERAM_COMPRESS_FLAG:=LZ4
|
|
|
|
endif
|
|
|
|
|
2011-02-22 15:35:05 +01:00
|
|
|
ifneq ($(CONFIG_LOCALVERSION),"")
|
2017-08-23 23:48:13 +02:00
|
|
|
COREBOOT_EXTRA_VERSION := -$(call strip_quotes,$(CONFIG_LOCALVERSION))
|
|
|
|
COREBOOT_EXPORTS += COREBOOT_EXTRA_VERSION
|
2011-02-22 15:35:05 +01:00
|
|
|
endif
|
|
|
|
|
2019-12-12 00:47:42 +01:00
|
|
|
CPPFLAGS_common := -Isrc -Isrc/include -Isrc/commonlib/include -Isrc/commonlib/bsd/include -I$(obj)
|
2016-07-24 12:10:38 +02:00
|
|
|
VBOOT_SOURCE ?= 3rdparty/vboot
|
|
|
|
CPPFLAGS_common += -I$(VBOOT_SOURCE)/firmware/include
|
2014-05-17 14:00:12 +02:00
|
|
|
CPPFLAGS_common += -include $(src)/include/kconfig.h
|
2016-11-30 13:53:24 +01:00
|
|
|
CPPFLAGS_common += -include $(src)/include/rules.h
|
2019-12-12 00:47:42 +01:00
|
|
|
CPPFLAGS_common += -include $(src)/commonlib/bsd/include/commonlib/bsd/compiler.h
|
2015-11-30 11:16:42 +01:00
|
|
|
CPPFLAGS_common += -I3rdparty
|
2018-05-21 22:04:04 +02:00
|
|
|
CPPFLAGS_common += -D__BUILD_DIR__=\"$(obj)\"
|
2011-02-22 15:35:05 +01:00
|
|
|
|
2020-06-08 15:52:03 +02:00
|
|
|
ifeq ($(BUILD_TIMELESS),1)
|
|
|
|
CPPFLAGS_common += -D__TIMELESS__
|
|
|
|
endif
|
|
|
|
|
2019-03-02 18:33:26 +01:00
|
|
|
ifeq ($(CONFIG_PCI_OPTION_ROM_RUN_YABEL)$(CONFIG_PCI_OPTION_ROM_RUN_REALMODE),y)
|
|
|
|
CPPFLAGS_ramstage += -Isrc/device/oprom/include
|
|
|
|
endif
|
|
|
|
|
2016-11-29 10:30:44 +01:00
|
|
|
CFLAGS_common += -pipe -g -nostdinc -std=gnu11
|
Introduce stage-specific architecture for coreboot
Make all three coreboot stages (bootblock, romstage and ramstage) aware of the
architecture specific to that stage i.e. we will have CONFIG_ARCH variables for
each of the three stages. This allows us to have an SOC with any combination of
architectures and thus every stage can be made to run on a completely different
architecture independent of others. Thus, bootblock can have an x86 arch whereas
romstage and ramstage can have arm32 and arm64 arch respectively. These stage
specific CONFIG_ARCH_ variables enable us to select the proper set of toolchain
and compiler flags for every stage.
These options can be considered as either arch or modes eg: x86 running in
different modes or ARM having different arch types (v4, v7, v8). We have got rid
of the original CONFIG_ARCH option completely as every stage can have any
architecture of its own. Thus, almost all the components of coreboot are
identified as being part of one of the three stages (bootblock, romstage or
ramstage). The components which cannot be classified as such e.g. smm, rmodules
can have their own compiler toolset which is for now set to *_i386. Hence, all
special classes are treated in a similar way and the compiler toolset is defined
using create_class_compiler defined in Makefile.
In order to meet these requirements, changes have been made to CC, LD, OBJCOPY
and family to add CC_bootblock, CC_romstage, CC_ramstage and similarly others.
Additionally, CC_x86_32 and CC_armv7 handle all the special classes. All the
toolsets are defined using create_class_compiler.
Few additional macros have been introduced to identify the class to be used at
various points, e.g.: CC_$(class) derives the $(class) part from the name of
the stage being compiled.
We have also got rid of COREBOOT_COMPILER, COREBOOT_ASSEMBLER and COREBOOT_LINKER
as they do not make any sense for coreboot as a whole. All these attributes are
associated with each of the stages.
Change-Id: I923f3d4fb097d21071030b104c372cc138c68c7b
Signed-off-by: Furquan Shaikh <furquan@google.com>
Reviewed-on: http://review.coreboot.org/5577
Tested-by: build bot (Jenkins)
Reviewed-by: Aaron Durbin <adurbin@gmail.com>
2014-04-23 19:18:48 +02:00
|
|
|
CFLAGS_common += -nostdlib -Wall -Wundef -Wstrict-prototypes -Wmissing-prototypes
|
2019-07-13 02:43:07 +02:00
|
|
|
CFLAGS_common += -Wwrite-strings -Wredundant-decls -Wno-trigraphs -Wimplicit-fallthrough
|
2022-12-01 12:12:49 +01:00
|
|
|
CFLAGS_common += -Wshadow -Wdate-time -Wtype-limits -Wvla -Wold-style-definition
|
2022-12-05 19:06:56 +01:00
|
|
|
CFLAGS_common += -Wdangling-else -Wmissing-include-dirs
|
2015-07-31 22:50:03 +02:00
|
|
|
CFLAGS_common += -fno-common -ffreestanding -fno-builtin -fomit-frame-pointer
|
2020-08-05 15:24:47 +02:00
|
|
|
CFLAGS_common += -fstrict-aliasing -ffunction-sections -fdata-sections -fno-pie
|
2017-08-25 15:39:10 +02:00
|
|
|
ifeq ($(CONFIG_COMPILER_GCC),y)
|
2018-06-06 05:41:19 +02:00
|
|
|
# Don't add these GCC specific flags when running scan-build
|
|
|
|
ifeq ($(CCC_ANALYZER_OUTPUT_FORMAT),)
|
2018-07-22 18:11:26 +02:00
|
|
|
CFLAGS_common += -Wno-packed-not-aligned
|
2018-06-06 05:41:19 +02:00
|
|
|
CFLAGS_common += -fconserve-stack
|
2023-05-28 07:42:33 +02:00
|
|
|
CFLAGS_common += -Wnull-dereference
|
2022-07-23 10:25:34 +02:00
|
|
|
CFLAGS_common += -Wlogical-op -Wduplicated-cond -Wno-array-compare
|
2018-06-06 05:41:19 +02:00
|
|
|
endif
|
2017-08-25 15:39:10 +02:00
|
|
|
endif
|
2015-04-08 10:53:39 +02:00
|
|
|
|
2017-12-30 15:40:20 +01:00
|
|
|
ADAFLAGS_common += -gnatp
|
2016-01-14 01:13:33 +01:00
|
|
|
ADAFLAGS_common += -Wuninitialized -Wall -Werror
|
|
|
|
ADAFLAGS_common += -pipe -g -nostdinc
|
|
|
|
ADAFLAGS_common += -Wstrict-aliasing -Wshadow
|
|
|
|
ADAFLAGS_common += -fno-common -fomit-frame-pointer
|
|
|
|
ADAFLAGS_common += -ffunction-sections -fdata-sections
|
2020-03-07 19:20:49 +01:00
|
|
|
ADAFLAGS_common += -fno-pie
|
2016-01-14 01:13:33 +01:00
|
|
|
# Ada warning options:
|
|
|
|
#
|
|
|
|
# a Activate most optional warnings.
|
|
|
|
# .e Activate every optional warnings.
|
|
|
|
# e Treat warnings and style checks as errors.
|
|
|
|
#
|
|
|
|
# D Suppress warnings on implicit dereferences:
|
|
|
|
# As SPARK does not accept access types we have to map the
|
|
|
|
# dynamically chosen register locations to a static SPARK
|
|
|
|
# variable.
|
|
|
|
#
|
|
|
|
# .H Suppress warnings on holes/gaps in records:
|
|
|
|
# We are modelling hardware here!
|
|
|
|
#
|
|
|
|
# H Suppress warnings on hiding:
|
|
|
|
# It's too annoying, you run out of ideas for identifiers fast.
|
|
|
|
#
|
|
|
|
# T Suppress warnings for tracking of deleted conditional code:
|
|
|
|
# We use static options to select code paths at compile time.
|
|
|
|
#
|
|
|
|
# U Suppress warnings on unused entities:
|
|
|
|
# Would have lots of warnings for unused register definitions,
|
|
|
|
# `withs` for debugging etc.
|
|
|
|
#
|
|
|
|
# .U Deactivate warnings on unordered enumeration types:
|
|
|
|
# As SPARK doesn't support `pragma Ordered` by now, we don't
|
|
|
|
# use that, yet.
|
|
|
|
#
|
|
|
|
# .W Suppress warnings on unnecessary Warnings Off pragmas:
|
|
|
|
# Things get really messy when you use different compiler
|
|
|
|
# versions, otherwise.
|
|
|
|
# .Y Disable information messages for why package spec needs body:
|
|
|
|
# Those messages are annoying. But don't forget to enable those,
|
|
|
|
# if you need the information.
|
|
|
|
ADAFLAGS_common += -gnatwa.eeD.HHTU.U.W.Y
|
|
|
|
# Disable style checks for now
|
|
|
|
ADAFLAGS_common += -gnatyN
|
|
|
|
|
Makefile.inc: Replace linker flag -nostartfiles with --nmagic
While the gcc(1) driver has the `-nostartfiles` option, ld(1), the
program the coreboot toolchain uses to link the object files, doesn't
have it.
In binutils before 2.36, this option is interpreted as `-n -o
startfiles`, in which the `-o` option is overridden by a later `-o`
option, so only the `-n` option has effect, which is the `--nmagic`
long option of ld(1). So the correct linker option in this place is
`--nmagic`.
It is tested that without `--nmagic`, ld can generate a much bigger
x86_64 romstage, so this option is still needed.
This error is found when trying to update binutils to 2.36 and later
versions, where ld(1) is unable to disambiguate options and reports an
error.
Change-Id: I27dc2209abdc6fec866716a252736c5cf236a347
Signed-off-by: Iru Cai <mytbk920423@gmail.com>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/56490
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Martin Roth <martinroth@google.com>
2021-07-21 17:14:35 +02:00
|
|
|
LDFLAGS_common := --gc-sections -nostdlib --nmagic -static
|
2021-01-14 04:13:21 +01:00
|
|
|
|
|
|
|
# Workaround for RISC-V linker bug, merge back into above line when fixed.
|
|
|
|
# https://sourceware.org/bugzilla/show_bug.cgi?id=27180
|
|
|
|
ifneq ($(CONFIG_ARCH_RISCV),y)
|
|
|
|
LDFLAGS_common += --emit-relocs
|
|
|
|
endif
|
2015-09-06 17:15:17 +02:00
|
|
|
|
2011-02-22 15:35:05 +01:00
|
|
|
ifeq ($(CONFIG_WARNINGS_ARE_ERRORS),y)
|
Introduce stage-specific architecture for coreboot
Make all three coreboot stages (bootblock, romstage and ramstage) aware of the
architecture specific to that stage i.e. we will have CONFIG_ARCH variables for
each of the three stages. This allows us to have an SOC with any combination of
architectures and thus every stage can be made to run on a completely different
architecture independent of others. Thus, bootblock can have an x86 arch whereas
romstage and ramstage can have arm32 and arm64 arch respectively. These stage
specific CONFIG_ARCH_ variables enable us to select the proper set of toolchain
and compiler flags for every stage.
These options can be considered as either arch or modes eg: x86 running in
different modes or ARM having different arch types (v4, v7, v8). We have got rid
of the original CONFIG_ARCH option completely as every stage can have any
architecture of its own. Thus, almost all the components of coreboot are
identified as being part of one of the three stages (bootblock, romstage or
ramstage). The components which cannot be classified as such e.g. smm, rmodules
can have their own compiler toolset which is for now set to *_i386. Hence, all
special classes are treated in a similar way and the compiler toolset is defined
using create_class_compiler defined in Makefile.
In order to meet these requirements, changes have been made to CC, LD, OBJCOPY
and family to add CC_bootblock, CC_romstage, CC_ramstage and similarly others.
Additionally, CC_x86_32 and CC_armv7 handle all the special classes. All the
toolsets are defined using create_class_compiler.
Few additional macros have been introduced to identify the class to be used at
various points, e.g.: CC_$(class) derives the $(class) part from the name of
the stage being compiled.
We have also got rid of COREBOOT_COMPILER, COREBOOT_ASSEMBLER and COREBOOT_LINKER
as they do not make any sense for coreboot as a whole. All these attributes are
associated with each of the stages.
Change-Id: I923f3d4fb097d21071030b104c372cc138c68c7b
Signed-off-by: Furquan Shaikh <furquan@google.com>
Reviewed-on: http://review.coreboot.org/5577
Tested-by: build bot (Jenkins)
Reviewed-by: Aaron Durbin <adurbin@gmail.com>
2014-04-23 19:18:48 +02:00
|
|
|
CFLAGS_common += -Werror
|
2011-02-22 15:35:05 +01:00
|
|
|
endif
|
2014-04-23 02:06:43 +02:00
|
|
|
ifneq ($(GDB_DEBUG),)
|
2015-03-15 00:21:17 +01:00
|
|
|
CFLAGS_common += -Og
|
2016-01-14 01:13:33 +01:00
|
|
|
ADAFLAGS_common += -Og
|
2014-04-23 02:06:43 +02:00
|
|
|
else
|
|
|
|
CFLAGS_common += -Os
|
2016-01-14 01:13:33 +01:00
|
|
|
ADAFLAGS_common += -Os
|
2014-04-23 02:06:43 +02:00
|
|
|
endif
|
|
|
|
|
2016-10-05 17:43:56 +02:00
|
|
|
ifeq ($(CONFIG_DEBUG_ADA_CODE),y)
|
|
|
|
ADAFLAGS_common += -gnata
|
|
|
|
endif
|
|
|
|
|
2021-03-06 13:12:34 +01:00
|
|
|
additional-dirs += $(objutil)/cbfstool $(objutil)/ifdtool \
|
2018-08-20 16:32:22 +02:00
|
|
|
$(objutil)/options $(objutil)/amdfwtool \
|
2019-10-31 00:12:24 +01:00
|
|
|
$(objutil)/cbootimage
|
2011-02-22 15:35:05 +01:00
|
|
|
|
2017-08-23 23:48:13 +02:00
|
|
|
export $(COREBOOT_EXPORTS)
|
|
|
|
|
2011-02-22 15:35:05 +01:00
|
|
|
#######################################################################
|
|
|
|
# generate build support files
|
2018-08-17 17:29:14 +02:00
|
|
|
|
|
|
|
build_h := $(obj)/build.h
|
|
|
|
|
|
|
|
# We have to manually export variables that `genbuild_h.sh` uses
|
|
|
|
# when we call it through the `$(shell)` function. This is fragile
|
|
|
|
# but as variables newly added to `genbuild_h.sh` would just not
|
|
|
|
# work, we'd notice that instantly at least.
|
|
|
|
build_h_exports := BUILD_TIMELESS KERNELVERSION COREBOOT_EXTRA_VERSION
|
|
|
|
|
|
|
|
# Report new `build.ht` as dependency if `build.h` differs.
|
|
|
|
build_h_check := \
|
|
|
|
export $(foreach exp,$(build_h_exports),$(exp)="$($(exp))"); \
|
2019-07-11 18:44:21 +02:00
|
|
|
util/genbuild_h/genbuild_h.sh $(xcompile) \
|
|
|
|
>$(build_h)t 2>/dev/null; \
|
2018-08-17 17:29:14 +02:00
|
|
|
cmp -s $(build_h)t $(build_h) >/dev/null 2>&1 || echo $(build_h)t
|
|
|
|
|
|
|
|
$(build_h): $$(shell $$(build_h_check))
|
2011-02-22 15:35:05 +01:00
|
|
|
@printf " GEN build.h\n"
|
2018-08-17 17:29:14 +02:00
|
|
|
mv $< $@
|
2011-02-22 15:35:05 +01:00
|
|
|
|
2020-11-15 08:07:36 +01:00
|
|
|
$(obj)/build_info:
|
|
|
|
@echo 'COREBOOT_VERSION: $(call strip_quotes,$(KERNELVERSION))' > $@.tmp
|
|
|
|
@echo 'MAINBOARD_VENDOR: $(call strip_quotes,$(CONFIG_MAINBOARD_VENDOR))' >> $@.tmp
|
|
|
|
@echo 'MAINBOARD_PART_NUMBER: $(call strip_quotes,$(CONFIG_MAINBOARD_PART_NUMBER))' >> $@.tmp
|
|
|
|
mv $@.tmp $@
|
|
|
|
|
2011-02-22 15:35:05 +01:00
|
|
|
#######################################################################
|
|
|
|
# Build the tools
|
2014-07-10 09:42:03 +02:00
|
|
|
CBFSTOOL:=$(objutil)/cbfstool/cbfstool
|
2015-02-26 20:47:19 +01:00
|
|
|
FMAPTOOL:=$(objutil)/cbfstool/fmaptool
|
2014-07-10 09:42:03 +02:00
|
|
|
RMODTOOL:=$(objutil)/cbfstool/rmodtool
|
2016-05-31 08:03:58 +02:00
|
|
|
IFWITOOL:=$(objutil)/cbfstool/ifwitool
|
2019-02-18 13:33:16 +01:00
|
|
|
IFITTOOL:=$(objutil)/cbfstool/ifittool
|
2019-03-19 21:48:33 +01:00
|
|
|
AMDCOMPRESS:=$(objutil)/cbfstool/amdcompress
|
2021-09-17 07:02:01 +02:00
|
|
|
CSE_FPT:=$(objutil)/cbfstool/cse_fpt
|
2021-09-17 07:04:11 +02:00
|
|
|
CSE_SERGER:=$(objutil)/cbfstool/cse_serger
|
2011-02-22 15:35:05 +01:00
|
|
|
|
2014-07-10 09:42:03 +02:00
|
|
|
$(obj)/cbfstool: $(CBFSTOOL)
|
2011-02-22 15:35:05 +01:00
|
|
|
cp $< $@
|
|
|
|
|
2015-02-26 20:47:19 +01:00
|
|
|
$(obj)/fmaptool: $(FMAPTOOL)
|
|
|
|
cp $< $@
|
|
|
|
|
2014-07-10 09:42:03 +02:00
|
|
|
$(obj)/rmodtool: $(RMODTOOL)
|
2014-03-10 22:13:58 +01:00
|
|
|
cp $< $@
|
|
|
|
|
2016-05-31 08:03:58 +02:00
|
|
|
$(obj)/ifwitool: $(IFWITOOL)
|
|
|
|
cp $< $@
|
|
|
|
|
2019-02-18 13:33:16 +01:00
|
|
|
$(obj)/ifittool: $(IFITTOOL)
|
|
|
|
cp $< $@
|
|
|
|
|
2019-03-19 21:48:33 +01:00
|
|
|
$(obj)/amdcompress: $(AMDCOMPRESS)
|
|
|
|
cp $< $@
|
|
|
|
|
2021-09-17 07:02:01 +02:00
|
|
|
$(obj)/cse_fpt: $(CSE_FPT)
|
|
|
|
cp $< $@
|
|
|
|
|
2021-09-17 07:04:11 +02:00
|
|
|
$(obj)/cse_serger: $(CSE_SERGER)
|
|
|
|
cp $< $@
|
|
|
|
|
2011-02-22 15:35:05 +01:00
|
|
|
_WINCHECK=$(shell uname -o 2> /dev/null)
|
|
|
|
STACK=
|
|
|
|
ifeq ($(_WINCHECK),Msys)
|
|
|
|
STACK=-Wl,--stack,16384000
|
|
|
|
endif
|
|
|
|
ifeq ($(_WINCHECK),Cygwin)
|
|
|
|
STACK=-Wl,--stack,16384000
|
|
|
|
endif
|
|
|
|
|
2018-01-10 14:35:55 +01:00
|
|
|
BINCFG:=$(objutil)/bincfg/bincfg
|
2017-10-20 22:09:12 +02:00
|
|
|
|
2012-08-16 23:05:42 +02:00
|
|
|
IFDTOOL:=$(objutil)/ifdtool/ifdtool
|
|
|
|
|
2016-11-08 19:49:58 +01:00
|
|
|
AMDFWTOOL:=$(objutil)/amdfwtool/amdfwtool
|
2022-08-17 01:30:06 +02:00
|
|
|
AMDFWREAD:=$(objutil)/amdfwtool/amdfwread
|
2014-08-11 01:09:15 +02:00
|
|
|
|
2020-05-26 22:47:05 +02:00
|
|
|
APCB_EDIT_TOOL:=$(top)/util/apcb/apcb_edit.py
|
|
|
|
|
2021-12-23 16:03:14 +01:00
|
|
|
APCB_V3_EDIT_TOOL:=$(top)/util/apcb/apcb_v3_edit.py
|
|
|
|
|
2014-09-08 23:28:17 +02:00
|
|
|
CBOOTIMAGE:=$(objutil)/cbootimage/cbootimage
|
|
|
|
|
2016-03-15 23:14:08 +01:00
|
|
|
FUTILITY?=$(objutil)/futility/futility
|
2016-02-01 12:03:04 +01:00
|
|
|
|
2014-09-27 11:37:46 +02:00
|
|
|
subdirs-y += util/nvidia
|
2014-09-08 23:28:17 +02:00
|
|
|
|
2016-02-29 05:04:15 +01:00
|
|
|
$(obj)/config.h: $(objutil)/kconfig/conf
|
|
|
|
|
2011-02-22 15:35:05 +01:00
|
|
|
#######################################################################
|
|
|
|
# needed objects that every mainboard uses
|
|
|
|
# Creation of these is architecture and mainboard independent
|
2016-08-08 23:12:11 +02:00
|
|
|
DEVICETREE_FILE := $(src)/mainboard/$(MAINBOARDDIR)/$(CONFIG_DEVICETREE)
|
2018-06-22 03:50:48 +02:00
|
|
|
|
2020-06-09 20:20:29 +02:00
|
|
|
SCONFIG_OPTIONS := --mainboard_devtree=$(DEVICETREE_FILE)
|
2018-06-22 03:50:48 +02:00
|
|
|
|
2020-06-09 20:20:29 +02:00
|
|
|
ifneq ($(CONFIG_OVERRIDE_DEVICETREE),)
|
2018-06-22 03:50:48 +02:00
|
|
|
OVERRIDE_DEVICETREE_FILE := $(src)/mainboard/$(MAINBOARDDIR)/$(CONFIG_OVERRIDE_DEVICETREE)
|
2020-06-09 20:20:29 +02:00
|
|
|
SCONFIG_OPTIONS += --override_devtree=$(OVERRIDE_DEVICETREE_FILE)
|
2018-06-22 03:50:48 +02:00
|
|
|
endif
|
|
|
|
|
2020-07-30 01:28:43 +02:00
|
|
|
ifneq ($(CONFIG_CHIPSET_DEVICETREE),)
|
|
|
|
CHIPSET_DEVICETREE_FILE := $(src)/$(CONFIG_CHIPSET_DEVICETREE)
|
|
|
|
SCONFIG_OPTIONS += --chipset_devtree=$(CHIPSET_DEVICETREE_FILE)
|
|
|
|
endif
|
|
|
|
|
2016-08-05 23:46:56 +02:00
|
|
|
DEVICETREE_STATIC_C := $(obj)/mainboard/$(MAINBOARDDIR)/static.c
|
2020-06-09 20:20:29 +02:00
|
|
|
SCONFIG_OPTIONS += --output_c=$(DEVICETREE_STATIC_C)
|
|
|
|
|
2019-09-20 12:05:51 +02:00
|
|
|
DEVICETREE_STATIC_H := $(obj)/static.h
|
2020-06-09 20:20:29 +02:00
|
|
|
SCONFIG_OPTIONS += --output_h=$(DEVICETREE_STATIC_H)
|
2016-08-05 23:46:56 +02:00
|
|
|
|
2020-09-23 23:36:30 +02:00
|
|
|
DEVICETREE_DEVICENAMES_H := $(obj)/static_devices.h
|
|
|
|
SCONFIG_OPTIONS += --output_d=$(DEVICETREE_DEVICENAMES_H)
|
|
|
|
|
|
|
|
DEVICETREE_FWCONFIG_H := $(obj)/static_fw_config.h
|
|
|
|
SCONFIG_OPTIONS += --output_f=$(DEVICETREE_FWCONFIG_H)
|
|
|
|
|
2020-07-30 01:28:43 +02:00
|
|
|
$(DEVICETREE_STATIC_C): $(DEVICETREE_FILE) $(OVERRIDE_DEVICETREE_FILE) $(CHIPSET_DEVICETREE_FILE) $(objutil)/sconfig/sconfig
|
2011-02-22 15:35:05 +01:00
|
|
|
@printf " SCONFIG $(subst $(src)/,,$(<))\n"
|
2016-08-05 23:46:56 +02:00
|
|
|
mkdir -p $(dir $(DEVICETREE_STATIC_C))
|
2020-06-09 20:20:29 +02:00
|
|
|
$(objutil)/sconfig/sconfig $(SCONFIG_OPTIONS)
|
2011-02-22 15:35:05 +01:00
|
|
|
|
2016-08-05 23:46:56 +02:00
|
|
|
ramstage-y+=$(DEVICETREE_STATIC_C)
|
|
|
|
romstage-y+=$(DEVICETREE_STATIC_C)
|
|
|
|
verstage-y+=$(DEVICETREE_STATIC_C)
|
|
|
|
bootblock-y+=$(DEVICETREE_STATIC_C)
|
2017-04-17 05:13:39 +02:00
|
|
|
postcar-y+=$(DEVICETREE_STATIC_C)
|
2018-02-20 06:07:42 +01:00
|
|
|
smm-y+=$(DEVICETREE_STATIC_C)
|
2011-02-22 15:35:05 +01:00
|
|
|
|
2020-05-16 00:37:07 +02:00
|
|
|
# Ensure static.c and static.h are created before any objects are compiled
|
|
|
|
ramstage-c-deps+=$(DEVICETREE_STATIC_C)
|
|
|
|
romstage-c-deps+=$(DEVICETREE_STATIC_C)
|
|
|
|
verstage-c-deps+=$(DEVICETREE_STATIC_C)
|
|
|
|
bootblock-c-deps+=$(DEVICETREE_STATIC_C)
|
|
|
|
postcar-c-deps+=$(DEVICETREE_STATIC_C)
|
|
|
|
smm-c-deps+=$(DEVICETREE_STATIC_C)
|
|
|
|
|
2022-11-09 10:23:11 +01:00
|
|
|
# Ensure fmap_config.h are created before any objects are compiled
|
|
|
|
ramstage-c-deps+=$(obj)/fmap_config.h
|
|
|
|
romstage-c-deps+=$(obj)/fmap_config.h
|
|
|
|
verstage-c-deps+=$(obj)/fmap_config.h
|
|
|
|
bootblock-c-deps+=$(obj)/fmap_config.h
|
|
|
|
postcar-c-deps+=$(obj)/fmap_config.h
|
|
|
|
smm-c-deps+=$(obj)/fmap_config.h
|
|
|
|
|
2020-05-16 00:37:07 +02:00
|
|
|
.PHONY: devicetree
|
|
|
|
devicetree: $(DEVICETREE_STATIC_C)
|
|
|
|
|
2020-06-11 20:59:07 +02:00
|
|
|
ramstage-y += $(CONFIG_MEMLAYOUT_LD_FILE)
|
|
|
|
romstage-y += $(CONFIG_MEMLAYOUT_LD_FILE)
|
|
|
|
bootblock-y += $(CONFIG_MEMLAYOUT_LD_FILE)
|
|
|
|
verstage-y += $(CONFIG_MEMLAYOUT_LD_FILE)
|
|
|
|
postcar-y += $(CONFIG_MEMLAYOUT_LD_FILE)
|
|
|
|
decompressor-y += $(CONFIG_MEMLAYOUT_LD_FILE)
|
|
|
|
|
2011-02-22 15:35:05 +01:00
|
|
|
#######################################################################
|
|
|
|
# Clean up rules
|
|
|
|
clean-abuild:
|
|
|
|
rm -rf coreboot-builds
|
|
|
|
|
|
|
|
#######################################################################
|
|
|
|
# Development utilities
|
|
|
|
printcrt0s:
|
|
|
|
@echo crt0s=$(crt0s)
|
|
|
|
@echo ldscripts=$(ldscripts)
|
|
|
|
|
|
|
|
update:
|
|
|
|
dongle.py -c /dev/term/1 $(obj)/coreboot.rom EOF
|
|
|
|
|
2015-01-02 16:08:33 +01:00
|
|
|
check-style:
|
|
|
|
grep "^# DESCR:" util/lint/check-style | sed "s,.*DESCR: *,,"
|
|
|
|
echo "========"
|
|
|
|
util/lint/check-style
|
|
|
|
echo "========"
|
|
|
|
|
2011-06-05 15:15:49 +02:00
|
|
|
gitconfig:
|
2018-01-04 16:16:23 +01:00
|
|
|
util/gitconfig/gitconfig.sh "$(MAKE)"
|
2011-06-05 15:15:49 +02:00
|
|
|
|
2018-08-01 16:19:31 +02:00
|
|
|
install-git-commit-clangfmt:
|
|
|
|
cp util/scripts/prepare-commit-msg.clang-format .git/hooks/prepare-commit-msg
|
|
|
|
|
2016-01-30 02:48:47 +01:00
|
|
|
include util/crossgcc/Makefile.inc
|
2011-05-16 17:32:28 +02:00
|
|
|
|
2016-01-30 02:48:47 +01:00
|
|
|
.PHONY: tools
|
2022-08-17 01:30:06 +02:00
|
|
|
tools: $(objutil)/kconfig/conf $(objutil)/kconfig/toada $(CBFSTOOL) $(objutil)/cbfstool/cbfs-compression-tool $(FMAPTOOL) $(RMODTOOL) $(IFWITOOL) $(objutil)/nvramtool/nvramtool $(objutil)/sconfig/sconfig $(IFDTOOL) $(CBOOTIMAGE) $(AMDFWTOOL) $(AMDCOMPRESS) $(FUTILITY) $(BINCFG) $(IFITTOOL) $(objutil)/supermicro/smcbiosinfo $(CSE_FPT) $(CSE_SERGER) $(AMDFWREAD)
|
2011-11-05 14:44:41 +01:00
|
|
|
|
2014-04-23 01:33:22 +02:00
|
|
|
###########################################################################
|
|
|
|
# Common recipes for all stages
|
|
|
|
###########################################################################
|
|
|
|
|
New mechanism to define SRAM/memory map with automatic bounds checking
This patch creates a new mechanism to define the static memory layout
(primarily in SRAM) for a given board, superseding the brittle mass of
Kconfigs that we were using before. The core part is a memlayout.ld file
in the mainboard directory (although boards are expected to just include
the SoC default in most cases), which is the primary linker script for
all stages (though not rmodules for now). It uses preprocessor macros
from <memlayout.h> to form a different valid linker script for all
stages while looking like a declarative, boilerplate-free map of memory
addresses to the programmer. Linker asserts will automatically guarantee
that the defined regions cannot overlap. Stages are defined with a
maximum size that will be enforced by the linker. The file serves to
both define and document the memory layout, so that the documentation
cannot go missing or out of date.
The mechanism is implemented for all boards in the ARM, ARM64 and MIPS
architectures, and should be extended onto all systems using SRAM in the
future. The CAR/XIP environment on x86 has very different requirements
and the layout is generally not as static, so it will stay like it is
and be unaffected by this patch (save for aligning some symbol names for
consistency and sharing the new common ramstage linker script include).
BUG=None
TEST=Booted normally and in recovery mode, checked suspend/resume and
the CBMEM console on Falco, Blaze (both normal and vboot2), Pinky and
Pit. Compiled Ryu, Storm and Urara, manually compared the disassemblies
with ToT and looked for red flags.
Change-Id: Ifd2276417f2036cbe9c056f17e42f051bcd20e81
Signed-off-by: Patrick Georgi <pgeorgi@chromium.org>
Original-Commit-Id: f1e2028e7ebceeb2d71ff366150a37564595e614
Original-Change-Id: I005506add4e8fcdb74db6d5e6cb2d4cb1bd3cda5
Original-Signed-off-by: Julius Werner <jwerner@chromium.org>
Original-Reviewed-on: https://chromium-review.googlesource.com/213370
Reviewed-on: http://review.coreboot.org/9283
Tested-by: build bot (Jenkins)
Reviewed-by: Stefan Tauner <stefan.tauner@gmx.at>
Reviewed-by: Aaron Durbin <adurbin@google.com>
2014-08-21 00:29:56 +02:00
|
|
|
# loadaddr can determine the load address of a stage, which may be needed for
|
|
|
|
# platform-specific image headers (only works *after* the stage has been built)
|
|
|
|
loadaddr = $(shell $(OBJDUMP_$(1)) -p $(objcbfs)/$(1).debug | \
|
|
|
|
sed -ne '/LOAD/s/^.*vaddr 0x\([0-9a-fA-F]\{8\}\).*$$/0x\1/p')
|
|
|
|
|
Introduce stage-specific architecture for coreboot
Make all three coreboot stages (bootblock, romstage and ramstage) aware of the
architecture specific to that stage i.e. we will have CONFIG_ARCH variables for
each of the three stages. This allows us to have an SOC with any combination of
architectures and thus every stage can be made to run on a completely different
architecture independent of others. Thus, bootblock can have an x86 arch whereas
romstage and ramstage can have arm32 and arm64 arch respectively. These stage
specific CONFIG_ARCH_ variables enable us to select the proper set of toolchain
and compiler flags for every stage.
These options can be considered as either arch or modes eg: x86 running in
different modes or ARM having different arch types (v4, v7, v8). We have got rid
of the original CONFIG_ARCH option completely as every stage can have any
architecture of its own. Thus, almost all the components of coreboot are
identified as being part of one of the three stages (bootblock, romstage or
ramstage). The components which cannot be classified as such e.g. smm, rmodules
can have their own compiler toolset which is for now set to *_i386. Hence, all
special classes are treated in a similar way and the compiler toolset is defined
using create_class_compiler defined in Makefile.
In order to meet these requirements, changes have been made to CC, LD, OBJCOPY
and family to add CC_bootblock, CC_romstage, CC_ramstage and similarly others.
Additionally, CC_x86_32 and CC_armv7 handle all the special classes. All the
toolsets are defined using create_class_compiler.
Few additional macros have been introduced to identify the class to be used at
various points, e.g.: CC_$(class) derives the $(class) part from the name of
the stage being compiled.
We have also got rid of COREBOOT_COMPILER, COREBOOT_ASSEMBLER and COREBOOT_LINKER
as they do not make any sense for coreboot as a whole. All these attributes are
associated with each of the stages.
Change-Id: I923f3d4fb097d21071030b104c372cc138c68c7b
Signed-off-by: Furquan Shaikh <furquan@google.com>
Reviewed-on: http://review.coreboot.org/5577
Tested-by: build bot (Jenkins)
Reviewed-by: Aaron Durbin <adurbin@gmail.com>
2014-04-23 19:18:48 +02:00
|
|
|
# find-substr is required for stages like romstage_null and romstage_xip to
|
|
|
|
# eliminate the _* part of the string
|
|
|
|
find-substr = $(word 1,$(subst _, ,$(1)))
|
|
|
|
|
|
|
|
# find-class is used to identify the class from the name of the stage
|
|
|
|
# The input to this macro can be something like romstage.x or romstage.x.y
|
|
|
|
# find-class recursively strips off the suffixes to extract the exact class name
|
|
|
|
# e.g.: if romstage.x is provided to find-class, it will remove .x and return romstage
|
|
|
|
# if romstage.x.y is provided, it will first remove .y, call find-class with romstage.x
|
|
|
|
# and remove .x the next time and finally return romstage
|
|
|
|
find-class = $(if $(filter $(1),$(basename $(1))),$(if $(CC_$(1)), $(1), $(call find-substr,$(1))),$(call find-class,$(basename $(1))))
|
|
|
|
|
2015-09-18 00:02:53 +02:00
|
|
|
# Bootblocks are not CBFS stages. coreboot is currently expecting the bss to
|
|
|
|
# be cleared by the loader of the stage. For ARM SoCs that means one needs to
|
|
|
|
# include the bss section in the binary so the BootROM clears the bss on
|
|
|
|
# loading of the bootblock stage. Achieve this by marking the bss section
|
|
|
|
# loadable,allocatable, and data. Do the same for the .data section in case
|
2018-05-16 02:36:59 +02:00
|
|
|
# the linker marked it NOBITS automatically because there are only zeroes in it.
|
|
|
|
preserve-bss-flags := --set-section-flags .bss=load,alloc,data --set-section-flags .data=load,alloc,data
|
|
|
|
|
2019-02-19 10:57:16 +01:00
|
|
|
# For Intel TXT files in the CBFS needs to be marked as 'Initial Boot Block'.
|
|
|
|
# As CBFS attributes aren't cheap, only mark them if TXT is enabled.
|
|
|
|
ifeq ($(CONFIG_INTEL_TXT),y)
|
|
|
|
|
|
|
|
TXTIBB := --ibb
|
|
|
|
|
|
|
|
else
|
|
|
|
|
|
|
|
TXTIBB :=
|
|
|
|
|
|
|
|
endif
|
|
|
|
|
Introduce bootblock self-decompression
Masked ROMs are the silent killers of boot speed on devices without
memory-mapped SPI flash. They often contain awfully slow SPI drivers
(presumably bit-banged) that take hundreds of milliseconds to load our
bootblock, and every extra kilobyte of bootblock size has a hugely
disproportionate impact on boot speed. The coreboot timestamps can never
show that component, but it impacts our users all the same.
This patch tries to alleviate that issue a bit by allowing us to
compress the bootblock with LZ4, which can cut its size down to nearly
half. Of course, masked ROMs usually don't come with decompression
algorithms built in, so we need to introduce a little decompression stub
that can decompress the rest of the bootblock. This is done by creating
a new "decompressor" stage which runs before the bootblock, but includes
the compressed bootblock code in its data section. It needs to be as
small as possible to get a real benefit from this approach, which means
no device drivers, no console output, no exception handling, etc.
Besides the decompression algorithm itself we only include the timer
driver so that we can measure the boot speed impact of decompression. On
ARM and ARM64 systems, we also need to give SoC code a chance to
initialize the MMU, since running decompression without MMU is
prohibitively slow on these architectures.
This feature is implemented for ARM and ARM64 architectures for now,
although most of it is architecture-independent and it should be
relatively simple to port to other platforms where a masked ROM loads
the bootblock into SRAM. It is also supposed to be a clean starting
point from which later optimizations can hopefully cut down the
decompression stub size (currently ~4K on RK3399) a bit more.
NOTE: Bootblock compression is not for everyone. Possible side effects
include trying to run LZ4 on CPUs that come out of reset extremely
underclocked or enabling this too early in SoC bring-up and getting
frustrated trying to find issues in an undebuggable environment. Ask
your SoC vendor if bootblock compression is right for you.
Change-Id: I0dc1cad9ae7508892e477739e743cd1afb5945e8
Signed-off-by: Julius Werner <jwerner@chromium.org>
Reviewed-on: https://review.coreboot.org/26340
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Aaron Durbin <adurbin@chromium.org>
2018-05-16 23:14:04 +02:00
|
|
|
ifeq ($(CONFIG_COMPRESS_BOOTBLOCK),y)
|
|
|
|
|
|
|
|
$(objcbfs)/bootblock.lz4: $(objcbfs)/bootblock.elf $(objutil)/cbfstool/cbfs-compression-tool
|
|
|
|
@printf " LZ4 $(subst $(obj)/,,$(@))\n"
|
|
|
|
$(OBJCOPY_bootblock) $(preserve-bss-flags) $< $@.tmp
|
|
|
|
$(OBJCOPY_bootblock) -O binary $@.tmp
|
|
|
|
$(objutil)/cbfstool/cbfs-compression-tool rawcompress $@.tmp $@.tmp2 lz4
|
|
|
|
rm -f $@.tmp
|
|
|
|
mv $@.tmp2 $@
|
|
|
|
|
|
|
|
# Put assembled decompressor+bootblock into bootblock.raw.elf so that SoC
|
|
|
|
# Makefiles wrapping the bootblock in a header can always key off the same file.
|
|
|
|
$(objcbfs)/bootblock.raw.elf: $(objcbfs)/decompressor.elf
|
|
|
|
@printf " OBJCOPY $(notdir $(@))\n"
|
|
|
|
$(OBJCOPY_bootblock) $(preserve-bss-flags) $< $@
|
|
|
|
|
|
|
|
else # CONFIG_COMPRESS_BOOTBLOCK
|
|
|
|
|
2018-05-16 02:36:59 +02:00
|
|
|
$(objcbfs)/bootblock.raw.elf: $(objcbfs)/bootblock.elf
|
|
|
|
@printf " OBJCOPY $(notdir $(@))\n"
|
|
|
|
$(OBJCOPY_bootblock) $(preserve-bss-flags) $< $@
|
|
|
|
|
Introduce bootblock self-decompression
Masked ROMs are the silent killers of boot speed on devices without
memory-mapped SPI flash. They often contain awfully slow SPI drivers
(presumably bit-banged) that take hundreds of milliseconds to load our
bootblock, and every extra kilobyte of bootblock size has a hugely
disproportionate impact on boot speed. The coreboot timestamps can never
show that component, but it impacts our users all the same.
This patch tries to alleviate that issue a bit by allowing us to
compress the bootblock with LZ4, which can cut its size down to nearly
half. Of course, masked ROMs usually don't come with decompression
algorithms built in, so we need to introduce a little decompression stub
that can decompress the rest of the bootblock. This is done by creating
a new "decompressor" stage which runs before the bootblock, but includes
the compressed bootblock code in its data section. It needs to be as
small as possible to get a real benefit from this approach, which means
no device drivers, no console output, no exception handling, etc.
Besides the decompression algorithm itself we only include the timer
driver so that we can measure the boot speed impact of decompression. On
ARM and ARM64 systems, we also need to give SoC code a chance to
initialize the MMU, since running decompression without MMU is
prohibitively slow on these architectures.
This feature is implemented for ARM and ARM64 architectures for now,
although most of it is architecture-independent and it should be
relatively simple to port to other platforms where a masked ROM loads
the bootblock into SRAM. It is also supposed to be a clean starting
point from which later optimizations can hopefully cut down the
decompression stub size (currently ~4K on RK3399) a bit more.
NOTE: Bootblock compression is not for everyone. Possible side effects
include trying to run LZ4 on CPUs that come out of reset extremely
underclocked or enabling this too early in SoC bring-up and getting
frustrated trying to find issues in an undebuggable environment. Ask
your SoC vendor if bootblock compression is right for you.
Change-Id: I0dc1cad9ae7508892e477739e743cd1afb5945e8
Signed-off-by: Julius Werner <jwerner@chromium.org>
Reviewed-on: https://review.coreboot.org/26340
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Aaron Durbin <adurbin@chromium.org>
2018-05-16 23:14:04 +02:00
|
|
|
endif # CONFIG_COMPRESS_BOOTBLOCK
|
|
|
|
|
2018-05-16 02:36:59 +02:00
|
|
|
$(objcbfs)/bootblock.raw.bin: $(objcbfs)/bootblock.raw.elf
|
2015-09-18 00:02:53 +02:00
|
|
|
@printf " OBJCOPY $(notdir $(@))\n"
|
2018-05-16 02:36:59 +02:00
|
|
|
$(OBJCOPY_bootblock) -O binary $< $@
|
2015-09-18 00:02:53 +02:00
|
|
|
|
2019-07-22 08:34:43 +02:00
|
|
|
ifneq ($(CONFIG_HAVE_BOOTBLOCK),y)
|
2021-03-06 13:12:34 +01:00
|
|
|
$(objcbfs)/bootblock.bin:
|
2019-07-22 08:34:43 +02:00
|
|
|
dd if=/dev/zero of=$@ bs=64 count=1
|
|
|
|
endif
|
|
|
|
|
2015-09-18 00:02:53 +02:00
|
|
|
$(objcbfs)/%.bin: $(objcbfs)/%.raw.bin
|
|
|
|
cp $< $@
|
2014-04-23 01:33:22 +02:00
|
|
|
|
2022-02-26 00:22:27 +01:00
|
|
|
$(objcbfs)/%.map: $(objcbfs)/%.debug
|
|
|
|
$(eval class := $(call find-class,$(@F)))
|
|
|
|
$(NM_$(class)) -n $< | sort > $(basename $@).map
|
|
|
|
|
|
|
|
$(objcbfs)/%.elf: $(objcbfs)/%.debug $(objcbfs)/%.map
|
Introduce stage-specific architecture for coreboot
Make all three coreboot stages (bootblock, romstage and ramstage) aware of the
architecture specific to that stage i.e. we will have CONFIG_ARCH variables for
each of the three stages. This allows us to have an SOC with any combination of
architectures and thus every stage can be made to run on a completely different
architecture independent of others. Thus, bootblock can have an x86 arch whereas
romstage and ramstage can have arm32 and arm64 arch respectively. These stage
specific CONFIG_ARCH_ variables enable us to select the proper set of toolchain
and compiler flags for every stage.
These options can be considered as either arch or modes eg: x86 running in
different modes or ARM having different arch types (v4, v7, v8). We have got rid
of the original CONFIG_ARCH option completely as every stage can have any
architecture of its own. Thus, almost all the components of coreboot are
identified as being part of one of the three stages (bootblock, romstage or
ramstage). The components which cannot be classified as such e.g. smm, rmodules
can have their own compiler toolset which is for now set to *_i386. Hence, all
special classes are treated in a similar way and the compiler toolset is defined
using create_class_compiler defined in Makefile.
In order to meet these requirements, changes have been made to CC, LD, OBJCOPY
and family to add CC_bootblock, CC_romstage, CC_ramstage and similarly others.
Additionally, CC_x86_32 and CC_armv7 handle all the special classes. All the
toolsets are defined using create_class_compiler.
Few additional macros have been introduced to identify the class to be used at
various points, e.g.: CC_$(class) derives the $(class) part from the name of
the stage being compiled.
We have also got rid of COREBOOT_COMPILER, COREBOOT_ASSEMBLER and COREBOOT_LINKER
as they do not make any sense for coreboot as a whole. All these attributes are
associated with each of the stages.
Change-Id: I923f3d4fb097d21071030b104c372cc138c68c7b
Signed-off-by: Furquan Shaikh <furquan@google.com>
Reviewed-on: http://review.coreboot.org/5577
Tested-by: build bot (Jenkins)
Reviewed-by: Aaron Durbin <adurbin@gmail.com>
2014-04-23 19:18:48 +02:00
|
|
|
$(eval class := $(call find-class,$(@F)))
|
2014-04-23 01:33:22 +02:00
|
|
|
@printf " OBJCOPY $(subst $(obj)/,,$(@))\n"
|
|
|
|
cp $< $@.tmp
|
Introduce stage-specific architecture for coreboot
Make all three coreboot stages (bootblock, romstage and ramstage) aware of the
architecture specific to that stage i.e. we will have CONFIG_ARCH variables for
each of the three stages. This allows us to have an SOC with any combination of
architectures and thus every stage can be made to run on a completely different
architecture independent of others. Thus, bootblock can have an x86 arch whereas
romstage and ramstage can have arm32 and arm64 arch respectively. These stage
specific CONFIG_ARCH_ variables enable us to select the proper set of toolchain
and compiler flags for every stage.
These options can be considered as either arch or modes eg: x86 running in
different modes or ARM having different arch types (v4, v7, v8). We have got rid
of the original CONFIG_ARCH option completely as every stage can have any
architecture of its own. Thus, almost all the components of coreboot are
identified as being part of one of the three stages (bootblock, romstage or
ramstage). The components which cannot be classified as such e.g. smm, rmodules
can have their own compiler toolset which is for now set to *_i386. Hence, all
special classes are treated in a similar way and the compiler toolset is defined
using create_class_compiler defined in Makefile.
In order to meet these requirements, changes have been made to CC, LD, OBJCOPY
and family to add CC_bootblock, CC_romstage, CC_ramstage and similarly others.
Additionally, CC_x86_32 and CC_armv7 handle all the special classes. All the
toolsets are defined using create_class_compiler.
Few additional macros have been introduced to identify the class to be used at
various points, e.g.: CC_$(class) derives the $(class) part from the name of
the stage being compiled.
We have also got rid of COREBOOT_COMPILER, COREBOOT_ASSEMBLER and COREBOOT_LINKER
as they do not make any sense for coreboot as a whole. All these attributes are
associated with each of the stages.
Change-Id: I923f3d4fb097d21071030b104c372cc138c68c7b
Signed-off-by: Furquan Shaikh <furquan@google.com>
Reviewed-on: http://review.coreboot.org/5577
Tested-by: build bot (Jenkins)
Reviewed-by: Aaron Durbin <adurbin@gmail.com>
2014-04-23 19:18:48 +02:00
|
|
|
$(OBJCOPY_$(class)) --strip-debug $@.tmp
|
|
|
|
$(OBJCOPY_$(class)) --add-gnu-debuglink=$< $@.tmp
|
2014-04-23 01:33:22 +02:00
|
|
|
mv $@.tmp $@
|
|
|
|
|
Introduce bootblock self-decompression
Masked ROMs are the silent killers of boot speed on devices without
memory-mapped SPI flash. They often contain awfully slow SPI drivers
(presumably bit-banged) that take hundreds of milliseconds to load our
bootblock, and every extra kilobyte of bootblock size has a hugely
disproportionate impact on boot speed. The coreboot timestamps can never
show that component, but it impacts our users all the same.
This patch tries to alleviate that issue a bit by allowing us to
compress the bootblock with LZ4, which can cut its size down to nearly
half. Of course, masked ROMs usually don't come with decompression
algorithms built in, so we need to introduce a little decompression stub
that can decompress the rest of the bootblock. This is done by creating
a new "decompressor" stage which runs before the bootblock, but includes
the compressed bootblock code in its data section. It needs to be as
small as possible to get a real benefit from this approach, which means
no device drivers, no console output, no exception handling, etc.
Besides the decompression algorithm itself we only include the timer
driver so that we can measure the boot speed impact of decompression. On
ARM and ARM64 systems, we also need to give SoC code a chance to
initialize the MMU, since running decompression without MMU is
prohibitively slow on these architectures.
This feature is implemented for ARM and ARM64 architectures for now,
although most of it is architecture-independent and it should be
relatively simple to port to other platforms where a masked ROM loads
the bootblock into SRAM. It is also supposed to be a clean starting
point from which later optimizations can hopefully cut down the
decompression stub size (currently ~4K on RK3399) a bit more.
NOTE: Bootblock compression is not for everyone. Possible side effects
include trying to run LZ4 on CPUs that come out of reset extremely
underclocked or enabling this too early in SoC bring-up and getting
frustrated trying to find issues in an undebuggable environment. Ask
your SoC vendor if bootblock compression is right for you.
Change-Id: I0dc1cad9ae7508892e477739e743cd1afb5945e8
Signed-off-by: Julius Werner <jwerner@chromium.org>
Reviewed-on: https://review.coreboot.org/26340
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Aaron Durbin <adurbin@chromium.org>
2018-05-16 23:14:04 +02:00
|
|
|
|
2014-04-23 01:33:22 +02:00
|
|
|
###########################################################################
|
|
|
|
# Build the final rom image
|
|
|
|
###########################################################################
|
|
|
|
|
2015-12-11 19:40:06 +01:00
|
|
|
# extract_nth - Return a subsection of the $file string
|
|
|
|
#
|
|
|
|
# the input string looks like this:
|
|
|
|
# ./build/cbfs/fallback/romstage.elf|fallback/romstage|stage|none||64|--xip*-S*.car.data*-P*0x10000
|
|
|
|
#
|
|
|
|
# Sections:
|
|
|
|
# 1 - Path and name of file [FILENAME: Added to cbfs-files-y list variable]
|
|
|
|
# 2 - Name of file in cbfs [$(FILENAME)-file]
|
|
|
|
# 3 - File type: [$(FILENAME)-type]
|
|
|
|
# bootblock, cbfs header, stage, payload, optionrom, bootsplash, raw, vsa,
|
|
|
|
# mbi, microcode, fsp, mrc, cmos_default, cmos_layout, spd, mrc_cache,
|
|
|
|
# mma, efi, deleted, null
|
|
|
|
# 4 - Compression type [$(FILENAME)-compression]
|
|
|
|
# none, LZMA
|
|
|
|
# 5 - Base address [$(FILANAME)-position]
|
|
|
|
# 6 - Alignment [$(FILENAME)-align]
|
|
|
|
# 7 - cbfstool flags [$(FILENAME)-options]
|
|
|
|
#
|
|
|
|
# Input:
|
|
|
|
# $(1) = Section to extract
|
|
|
|
# $(2) = Input string
|
|
|
|
#
|
|
|
|
# Steps:
|
|
|
|
# 1) replace all '|' characters with the sequence '- -' within the full string, prepended and appended with the character '-'
|
|
|
|
# 2) extract the specified section from the string - this gets us the section surrounded by '-' characters
|
|
|
|
# 3) remove the leading and trailing '-' characters
|
|
|
|
# 4) replace all '*' characters with spaces
|
2015-11-26 17:17:28 +01:00
|
|
|
extract_nth=$(subst *,$(spc),$(patsubst -%-,%,$(word $(1), $(subst |,- -,-$(2)-))))
|
2014-04-23 01:33:22 +02:00
|
|
|
|
2016-01-18 16:24:10 +01:00
|
|
|
# regions-for-file - Returns a cbfstool regions parameter
|
|
|
|
# $(call regions-for-file,$(filename))
|
|
|
|
# returns "REGION1,REGION2,..."
|
|
|
|
#
|
|
|
|
# This is the default implementation. When using a boot strategy employing
|
|
|
|
# multiple CBFSes in fmap regions, override it.
|
2022-12-04 10:38:04 +01:00
|
|
|
regions-for-file ?= $(if $(value regions-for-file-$(1)), $(regions-for-file-$(1)), COREBOOT)
|
2016-01-18 16:24:10 +01:00
|
|
|
|
2016-01-14 15:08:36 +01:00
|
|
|
ifeq ($(CONFIG_CBFS_AUTOGEN_ATTRIBUTES),y)
|
|
|
|
cbfs-autogen-attributes=-g
|
|
|
|
endif
|
|
|
|
|
2016-01-28 22:22:38 +01:00
|
|
|
# cbfs-add-cmd-for-region
|
|
|
|
# $(call cbfs-add-cmd-for-region,file in extract_nth format,region name)
|
2020-11-22 07:21:42 +01:00
|
|
|
#
|
|
|
|
# CBFSTOOL_ADD_CMD_OPTIONS can be used by arch/SoC/mainboard to supply
|
|
|
|
# add commands with any additional arguments for cbfstool.
|
|
|
|
# Example: --ext-win-base <base> --ext-win-size <size>
|
2016-01-28 22:22:38 +01:00
|
|
|
define cbfs-add-cmd-for-region
|
2016-01-28 21:32:33 +01:00
|
|
|
$(CBFSTOOL) $@.tmp \
|
2015-12-11 20:24:33 +01:00
|
|
|
add$(if $(filter stage,$(call extract_nth,3,$(1))),-stage)$(if \
|
|
|
|
$(filter payload,$(call extract_nth,3,$(1))),-payload)$(if \
|
|
|
|
$(filter flat-binary,$(call extract_nth,3,$(1))),-flat-binary) \
|
2016-01-28 21:47:31 +01:00
|
|
|
-f $(call extract_nth,1,$(1)) \
|
|
|
|
-n $(call extract_nth,2,$(1)) \
|
2018-05-16 13:12:35 +02:00
|
|
|
$(if $(filter-out flat-binary payload stage,$(call \
|
|
|
|
extract_nth,3,$(1))),-t $(call extract_nth,3,$(1))) \
|
2016-01-28 21:51:55 +01:00
|
|
|
$(if $(call extract_nth,4,$(1)),-c $(call extract_nth,4,$(1))) \
|
|
|
|
$(cbfs-autogen-attributes) \
|
2016-01-28 22:22:38 +01:00
|
|
|
-r $(2) \
|
2016-05-06 23:01:25 +02:00
|
|
|
$(if $(call extract_nth,6,$(1)),-a $(call extract_nth,6,$(file)), \
|
|
|
|
$(if $(call extract_nth,5,$(file)),-b $(call extract_nth,5,$(file)))) \
|
2020-11-22 07:21:42 +01:00
|
|
|
$(call extract_nth,7,$(1)) \
|
|
|
|
$(CBFSTOOL_ADD_CMD_OPTIONS)
|
2016-01-28 22:22:38 +01:00
|
|
|
|
|
|
|
endef
|
|
|
|
# Empty line before endef is necessary so cbfs-add-cmd-for-region ends in a
|
|
|
|
# newline
|
|
|
|
|
|
|
|
# cbfs-add-cmd
|
2016-08-09 20:19:19 +02:00
|
|
|
# $(call cbfs-add-cmd,
|
|
|
|
# file in extract_nth format,
|
|
|
|
# region name,
|
|
|
|
# non-empty if file removal requested)
|
2016-01-28 22:22:38 +01:00
|
|
|
define cbfs-add-cmd
|
|
|
|
printf " CBFS $(call extract_nth,2,$(1))\n"
|
2016-08-09 20:19:19 +02:00
|
|
|
$(if $(3),-$(CBFSTOOL) $@.tmp remove -n $(call extract_nth,2,$(file)) 2>/dev/null)
|
|
|
|
$(call cbfs-add-cmd-for-region,$(1),$(2))
|
2016-01-28 21:37:16 +01:00
|
|
|
endef
|
2014-12-09 12:49:21 +01:00
|
|
|
|
2016-08-09 20:19:19 +02:00
|
|
|
# list of files to add (using their file system names, not CBFS names),
|
|
|
|
# for dependencies etc.
|
2014-04-23 01:33:22 +02:00
|
|
|
prebuilt-files = $(foreach file,$(cbfs-files), $(call extract_nth,1,$(file)))
|
2016-08-09 20:19:19 +02:00
|
|
|
|
|
|
|
# $(all-regions)
|
|
|
|
# returns full list of fmap regions that we add files to
|
|
|
|
all-regions = $(sort $(subst $(comma),$(spc), \
|
|
|
|
$(foreach file,$(cbfs-files), \
|
|
|
|
$(call regions-for-file,$(call extract_nth,2,$(file))))))
|
|
|
|
|
|
|
|
# $(call all-files-in-region,region name)
|
|
|
|
# returns elements in $(cbfs-files) that end up in that region, in the order
|
|
|
|
# they appear in $(cbfs-files)
|
|
|
|
all-files-in-region = $(foreach file,$(cbfs-files), \
|
|
|
|
$(if $(filter $(1), \
|
|
|
|
$(subst $(comma),$(spc),$(call regions-for-file,$(call extract_nth,2,$(file))))), \
|
|
|
|
$(file)))
|
|
|
|
|
2016-08-10 17:02:58 +02:00
|
|
|
# $(call update-file-for-region,file string from $(cbfs-files),region name)
|
|
|
|
# Update position and alignment according to overrides for region
|
|
|
|
# Doesn't check for invalid configurations (eg. resetting neither or both
|
|
|
|
# position and align)
|
|
|
|
# Returns the updated file string
|
|
|
|
update-file-for-region = \
|
|
|
|
$(subst $(spc),*,$(call extract_nth,1,$(1))|$(call extract_nth,2,$(1))|$(call extract_nth,3,$(1))|$(call extract_nth,4,$(1))|$($(call extract_nth,2,$(1))-$(2)-position)|$($(call extract_nth,2,$(1))-$(2)-align)|$(call extract_nth,7,$(1)))
|
|
|
|
|
|
|
|
# $(call placed-files-in-region,region name)
|
|
|
|
# like all-files-in-region, but updates the files to contain region overrides
|
|
|
|
# to position or alignment.
|
|
|
|
placed-files-in-region = $(foreach file,$(call all-files-in-region,$(1)), \
|
|
|
|
$(if $($(call extract_nth,2,$(file))-$(1)-position), \
|
|
|
|
$(if $($(call extract_nth,2,$(file))-$(1)-align), \
|
|
|
|
$(error It is not allowed to specify both alignment and position for $(call extract_nth,2,$(file))-$(1))) \
|
|
|
|
$(call update-file-for-region,$(file),$(1)), \
|
|
|
|
$(if $($(call extract_nth,2,$(file))-$(1)-align), \
|
|
|
|
$(call update-file-for-region,$(file),$(1)), \
|
|
|
|
$(file))))
|
|
|
|
|
2016-08-10 13:25:02 +02:00
|
|
|
# $(call sort-files,subset of $(cbfs-files))
|
|
|
|
# reorders the files in the given set to list files at fixed positions first,
|
|
|
|
# followed by aligned files and finally those with no constraints.
|
|
|
|
sort-files = \
|
|
|
|
$(eval _tmp_fixed:=) \
|
|
|
|
$(eval _tmp_aligned:=) \
|
|
|
|
$(eval _tmp_regular:=) \
|
|
|
|
$(foreach file,$(1), \
|
|
|
|
$(if $(call extract_nth,5,$(file)),\
|
|
|
|
$(eval _tmp_fixed += $(file)), \
|
|
|
|
$(if $(call extract_nth,6,$(file)), \
|
|
|
|
$(eval _tmp_aligned += $(file)), \
|
|
|
|
$(eval _tmp_regular += $(file))))) \
|
|
|
|
$(_tmp_fixed) $(_tmp_aligned) $(_tmp_regular)
|
|
|
|
|
2016-08-09 20:19:19 +02:00
|
|
|
# command list to add files to CBFS
|
|
|
|
prebuild-files = $(foreach region,$(all-regions), \
|
2016-08-10 13:25:02 +02:00
|
|
|
$(foreach file, \
|
2016-08-10 17:02:58 +02:00
|
|
|
$(call sort-files,$(call placed-files-in-region,$(region))), \
|
2016-08-09 20:19:19 +02:00
|
|
|
$(call cbfs-add-cmd,$(file),$(region),$(CONFIG_UPDATE_IMAGE))))
|
2014-04-23 01:33:22 +02:00
|
|
|
|
2023-03-05 20:55:32 +01:00
|
|
|
# If no FMD file (Flashmap) is supplied by mainboard, fall back to a default
|
2015-09-16 18:10:52 +02:00
|
|
|
ifeq ($(CONFIG_FMDFILE),)
|
2023-03-05 20:55:32 +01:00
|
|
|
|
2015-09-16 18:10:52 +02:00
|
|
|
ifeq ($(CONFIG_ARCH_X86),y)
|
2023-03-05 20:55:32 +01:00
|
|
|
|
2015-09-16 18:10:52 +02:00
|
|
|
DEFAULT_FLASHMAP:=$(top)/util/cbfstool/default-x86.fmd
|
2023-03-05 20:55:32 +01:00
|
|
|
# check if IFD_CHIPSET is set and if yes generate a FMAP template from IFD descriptor
|
|
|
|
ifneq ($(CONFIG_IFD_CHIPSET),)
|
|
|
|
ifeq ($(CONFIG_HAVE_IFD_BIN),y)
|
|
|
|
DEFAULT_FLASHMAP:=$(obj)/fmap-template.fmd
|
|
|
|
$(DEFAULT_FLASHMAP): $(call strip_quotes,$(CONFIG_IFD_BIN_PATH)) $(IFDTOOL)
|
|
|
|
echo " IFDTOOL -p $(CONFIG_IFD_CHIPSET) -F $@ $<"
|
|
|
|
$(IFDTOOL) -p $(CONFIG_IFD_CHIPSET) -F $@ $<
|
|
|
|
endif # ifeq($(CONFIG_HAVE_IFD_BIN),y)
|
|
|
|
endif # ifneq($(CONFIG_IFD_CHIPSET),)
|
|
|
|
|
2015-09-16 18:10:52 +02:00
|
|
|
# entire flash
|
|
|
|
FMAP_ROM_ADDR := $(call int-subtract, 0x100000000 $(CONFIG_ROM_SIZE))
|
|
|
|
FMAP_ROM_SIZE := $(CONFIG_ROM_SIZE)
|
|
|
|
# entire "BIOS" region (everything directly of concern to the host system)
|
|
|
|
# relative to ROM_BASE
|
2018-12-25 02:52:52 +01:00
|
|
|
FMAP_BIOS_BASE := $(call int-align, $(call int-subtract, $(CONFIG_ROM_SIZE) $(CONFIG_CBFS_SIZE)), 0x10000)
|
|
|
|
FMAP_BIOS_SIZE := $(call int-align-down, $(shell echo $(CONFIG_CBFS_SIZE) | tr A-F a-f), 0x10000)
|
2015-09-16 18:10:52 +02:00
|
|
|
# position and size of flashmap, relative to BIOS_BASE
|
2018-01-07 23:12:49 +01:00
|
|
|
|
|
|
|
#
|
|
|
|
# X86 CONSOLE FMAP region
|
|
|
|
#
|
2017-05-11 16:36:29 +02:00
|
|
|
# position, size and entry line of CONSOLE relative to BIOS_BASE, if enabled
|
2020-04-14 08:39:44 +02:00
|
|
|
|
|
|
|
FMAP_CURRENT_BASE := 0
|
|
|
|
|
2017-05-11 16:36:29 +02:00
|
|
|
ifeq ($(CONFIG_CONSOLE_SPI_FLASH),y)
|
2020-04-14 08:39:44 +02:00
|
|
|
FMAP_CONSOLE_BASE := $(FMAP_CURRENT_BASE)
|
2017-05-11 16:36:29 +02:00
|
|
|
FMAP_CONSOLE_SIZE := $(CONFIG_CONSOLE_SPI_FLASH_BUFFER_SIZE)
|
|
|
|
FMAP_CONSOLE_ENTRY := CONSOLE@$(FMAP_CONSOLE_BASE) $(FMAP_CONSOLE_SIZE)
|
2020-04-14 08:39:44 +02:00
|
|
|
FMAP_CURRENT_BASE := $(call int-add, $(FMAP_CONSOLE_BASE) $(FMAP_CONSOLE_SIZE))
|
|
|
|
else
|
2017-05-11 16:36:29 +02:00
|
|
|
FMAP_CONSOLE_ENTRY :=
|
2020-04-14 08:39:44 +02:00
|
|
|
endif
|
2018-01-07 23:12:49 +01:00
|
|
|
|
|
|
|
ifeq ($(CONFIG_CACHE_MRC_SETTINGS),y)
|
2020-04-14 08:39:44 +02:00
|
|
|
FMAP_MRC_CACHE_BASE := $(call int-align, $(FMAP_CURRENT_BASE), 0x10000)
|
2018-01-07 23:12:49 +01:00
|
|
|
FMAP_MRC_CACHE_SIZE := $(CONFIG_MRC_SETTINGS_CACHE_SIZE)
|
|
|
|
FMAP_MRC_CACHE_ENTRY := RW_MRC_CACHE@$(FMAP_MRC_CACHE_BASE) $(FMAP_MRC_CACHE_SIZE)
|
2020-04-14 08:39:44 +02:00
|
|
|
FMAP_CURRENT_BASE := $(call int-add, $(FMAP_MRC_CACHE_BASE) $(FMAP_MRC_CACHE_SIZE))
|
|
|
|
else
|
2018-01-07 23:12:49 +01:00
|
|
|
FMAP_MRC_CACHE_ENTRY :=
|
2020-04-14 08:39:44 +02:00
|
|
|
endif
|
2018-01-07 23:12:49 +01:00
|
|
|
|
2018-12-25 03:00:34 +01:00
|
|
|
ifeq ($(CONFIG_SMMSTORE),y)
|
2020-04-14 08:39:44 +02:00
|
|
|
FMAP_SMMSTORE_BASE := $(call int-align, $(FMAP_CURRENT_BASE), 0x10000)
|
2018-12-25 03:00:34 +01:00
|
|
|
FMAP_SMMSTORE_SIZE := $(CONFIG_SMMSTORE_SIZE)
|
|
|
|
FMAP_SMMSTORE_ENTRY := SMMSTORE@$(FMAP_SMMSTORE_BASE) $(FMAP_SMMSTORE_SIZE)
|
2020-04-14 08:39:44 +02:00
|
|
|
FMAP_CURRENT_BASE := $(call int-add, $(FMAP_SMMSTORE_BASE) $(FMAP_SMMSTORE_SIZE))
|
|
|
|
else
|
2018-12-25 03:00:34 +01:00
|
|
|
FMAP_SMMSTORE_ENTRY :=
|
2020-04-14 08:39:44 +02:00
|
|
|
endif
|
2018-12-25 03:00:34 +01:00
|
|
|
|
2020-11-30 21:30:15 +01:00
|
|
|
ifeq ($(CONFIG_SPD_CACHE_IN_FMAP),y)
|
|
|
|
FMAP_SPD_CACHE_BASE := $(call int-align, $(FMAP_CURRENT_BASE), 0x4000)
|
|
|
|
FMAP_SPD_CACHE_SIZE := $(call int-multiply, $(CONFIG_DIMM_MAX) $(CONFIG_DIMM_SPD_SIZE))
|
|
|
|
FMAP_SPD_CACHE_SIZE := $(call int-align, $(FMAP_SPD_CACHE_SIZE), 0x1000)
|
|
|
|
FMAP_SPD_CACHE_ENTRY := $(CONFIG_SPD_CACHE_FMAP_NAME)@$(FMAP_SPD_CACHE_BASE) $(FMAP_SPD_CACHE_SIZE)
|
|
|
|
FMAP_CURRENT_BASE := $(call int-add, $(FMAP_SPD_CACHE_BASE) $(FMAP_SPD_CACHE_SIZE))
|
|
|
|
else
|
|
|
|
FMAP_SPD_CACHE_ENTRY :=
|
|
|
|
endif
|
|
|
|
|
2021-01-01 21:08:29 +01:00
|
|
|
ifeq ($(CONFIG_VPD),y)
|
|
|
|
FMAP_VPD_BASE := $(call int-align, $(FMAP_CURRENT_BASE), 0x4000)
|
|
|
|
FMAP_VPD_SIZE := $(CONFIG_VPD_FMAP_SIZE)
|
|
|
|
FMAP_VPD_ENTRY := $(CONFIG_VPD_FMAP_NAME)@$(FMAP_VPD_BASE) $(FMAP_VPD_SIZE)
|
|
|
|
FMAP_CURRENT_BASE := $(call int-add, $(FMAP_VPD_BASE) $(FMAP_VPD_SIZE))
|
|
|
|
else
|
|
|
|
FMAP_VPD_ENTRY :=
|
|
|
|
endif
|
|
|
|
|
2022-10-29 21:32:54 +02:00
|
|
|
ifeq ($(CONFIG_INCLUDE_HSPHY_IN_FMAP),y)
|
|
|
|
FMAP_HSPHY_FW_BASE := $(call int-align, $(FMAP_CURRENT_BASE), 0x1000)
|
|
|
|
FMAP_HSPHY_FW_SIZE := $(CONFIG_HSPHY_FW_MAX_SIZE)
|
|
|
|
FMAP_HSPHY_FW_ENTRY := HSPHY_FW@$(FMAP_HSPHY_FW_BASE) $(FMAP_HSPHY_FW_SIZE)
|
|
|
|
FMAP_CURRENT_BASE := $(call int-add, $(FMAP_HSPHY_FW_BASE) $(FMAP_HSPHY_FW_SIZE))
|
|
|
|
else
|
|
|
|
FMAP_HSPHY_FW_ENTRY :=
|
|
|
|
endif
|
|
|
|
|
2018-12-25 02:31:48 +01:00
|
|
|
#
|
|
|
|
# X86 FMAP region
|
|
|
|
#
|
|
|
|
#
|
|
|
|
# position, size
|
2020-04-14 08:39:44 +02:00
|
|
|
FMAP_FMAP_BASE := $(FMAP_CURRENT_BASE)
|
2018-12-25 02:31:48 +01:00
|
|
|
FMAP_FMAP_SIZE := 0x200
|
|
|
|
|
2018-01-07 23:12:49 +01:00
|
|
|
#
|
|
|
|
# X86 COREBOOT default cbfs FMAP region
|
|
|
|
#
|
2015-09-16 18:10:52 +02:00
|
|
|
# position and size of CBFS, relative to BIOS_BASE
|
2018-12-25 02:31:48 +01:00
|
|
|
FMAP_CBFS_BASE := $(call int-add, $(FMAP_FMAP_BASE) $(FMAP_FMAP_SIZE))
|
2017-05-11 16:36:29 +02:00
|
|
|
FMAP_CBFS_SIZE := $(call int-subtract, $(FMAP_BIOS_SIZE) $(FMAP_CBFS_BASE))
|
2020-04-14 08:39:44 +02:00
|
|
|
|
2016-01-20 22:52:08 +01:00
|
|
|
else # ifeq ($(CONFIG_ARCH_X86),y)
|
2020-04-14 08:39:44 +02:00
|
|
|
|
2015-09-16 18:10:52 +02:00
|
|
|
DEFAULT_FLASHMAP:=$(top)/util/cbfstool/default.fmd
|
|
|
|
# entire flash
|
|
|
|
FMAP_ROM_ADDR := 0
|
|
|
|
FMAP_ROM_SIZE := $(CONFIG_ROM_SIZE)
|
|
|
|
# entire "BIOS" region (everything directly of concern to the host system)
|
|
|
|
# relative to ROM_BASE
|
|
|
|
FMAP_BIOS_BASE := 0
|
|
|
|
FMAP_BIOS_SIZE := $(CONFIG_CBFS_SIZE)
|
|
|
|
# position and size of flashmap, relative to BIOS_BASE
|
|
|
|
FMAP_FMAP_BASE := 0x20000
|
2020-04-14 08:57:08 +02:00
|
|
|
FMAP_FMAP_SIZE := 0x200
|
2018-01-07 23:12:49 +01:00
|
|
|
|
2020-04-14 08:39:44 +02:00
|
|
|
FMAP_CURRENT_BASE := $(call int-add, $(FMAP_FMAP_BASE) $(FMAP_FMAP_SIZE))
|
|
|
|
|
2018-01-07 23:12:49 +01:00
|
|
|
#
|
|
|
|
# NON-X86 CONSOLE FMAP region
|
|
|
|
#
|
2017-05-11 16:36:29 +02:00
|
|
|
# position, size and entry line of CONSOLE relative to BIOS_BASE, if enabled
|
|
|
|
ifeq ($(CONFIG_CONSOLE_SPI_FLASH),y)
|
2020-04-14 08:39:44 +02:00
|
|
|
FMAP_CONSOLE_BASE := $(FMAP_CURRENT_BASE)
|
2017-05-11 16:36:29 +02:00
|
|
|
FMAP_CONSOLE_SIZE := $(CONFIG_CONSOLE_SPI_FLASH_BUFFER_SIZE)
|
|
|
|
FMAP_CONSOLE_ENTRY := CONSOLE@$(FMAP_CONSOLE_BASE) $(FMAP_CONSOLE_SIZE)
|
2020-04-14 08:39:44 +02:00
|
|
|
FMAP_CURRENT_BASE := $(call int-add, $(FMAP_CONSOLE_BASE) $(FMAP_CONSOLE_SIZE))
|
|
|
|
else
|
2017-05-11 16:36:29 +02:00
|
|
|
FMAP_CONSOLE_ENTRY :=
|
2020-04-14 08:39:44 +02:00
|
|
|
endif
|
2018-01-07 23:12:49 +01:00
|
|
|
|
|
|
|
#
|
|
|
|
# NON-X86 RW_MRC_CACHE FMAP region
|
|
|
|
#
|
|
|
|
# position, size and entry line of MRC_CACHE relative to BIOS_BASE, if enabled
|
|
|
|
ifeq ($(CONFIG_CACHE_MRC_SETTINGS),y)
|
2020-04-14 08:39:44 +02:00
|
|
|
FMAP_MRC_CACHE_BASE := $(call int-align, $(FMAP_CURRENT_BASE), 0x10000)
|
2018-01-07 23:12:49 +01:00
|
|
|
FMAP_MRC_CACHE_SIZE := $(CONFIG_MRC_SETTINGS_CACHE_SIZE)
|
|
|
|
FMAP_MRC_CACHE_ENTRY := RW_MRC_CACHE@$(FMAP_MRC_CACHE_BASE) $(FMAP_MRC_CACHE_SIZE)
|
2020-04-14 08:39:44 +02:00
|
|
|
FMAP_CURRENT_BASE := $(call int-add, $(FMAP_MRC_CACHE_BASE) $(FMAP_MRC_CACHE_SIZE))
|
|
|
|
else
|
2018-01-07 23:12:49 +01:00
|
|
|
FMAP_MRC_CACHE_ENTRY :=
|
2020-04-14 08:39:44 +02:00
|
|
|
endif
|
2018-01-07 23:12:49 +01:00
|
|
|
|
|
|
|
#
|
|
|
|
# NON-X86 COREBOOT default cbfs FMAP region
|
|
|
|
#
|
2015-09-16 18:10:52 +02:00
|
|
|
# position and size of CBFS, relative to BIOS_BASE
|
2020-04-14 08:39:44 +02:00
|
|
|
FMAP_CBFS_BASE := $(FMAP_CURRENT_BASE)
|
2015-09-16 18:10:52 +02:00
|
|
|
FMAP_CBFS_SIZE := $(call int-subtract,$(FMAP_BIOS_SIZE) $(FMAP_CBFS_BASE))
|
2020-04-14 08:39:44 +02:00
|
|
|
|
2016-01-20 22:52:08 +01:00
|
|
|
endif # ifeq ($(CONFIG_ARCH_X86),y)
|
2015-09-16 18:10:52 +02:00
|
|
|
|
2015-12-27 01:02:41 +01:00
|
|
|
$(obj)/fmap.fmd: $(top)/Makefile.inc $(DEFAULT_FLASHMAP) $(obj)/config.h
|
2015-09-16 18:10:52 +02:00
|
|
|
sed -e "s,##ROM_BASE##,$(FMAP_ROM_ADDR)," \
|
|
|
|
-e "s,##ROM_SIZE##,$(FMAP_ROM_SIZE)," \
|
|
|
|
-e "s,##BIOS_BASE##,$(FMAP_BIOS_BASE)," \
|
|
|
|
-e "s,##BIOS_SIZE##,$(FMAP_BIOS_SIZE)," \
|
|
|
|
-e "s,##FMAP_BASE##,$(FMAP_FMAP_BASE)," \
|
|
|
|
-e "s,##FMAP_SIZE##,$(FMAP_FMAP_SIZE)," \
|
2017-05-11 16:36:29 +02:00
|
|
|
-e "s,##CONSOLE_ENTRY##,$(FMAP_CONSOLE_ENTRY)," \
|
2018-01-07 23:12:49 +01:00
|
|
|
-e "s,##MRC_CACHE_ENTRY##,$(FMAP_MRC_CACHE_ENTRY)," \
|
2018-12-25 03:00:34 +01:00
|
|
|
-e "s,##SMMSTORE_ENTRY##,$(FMAP_SMMSTORE_ENTRY)," \
|
2020-11-30 21:30:15 +01:00
|
|
|
-e "s,##SPD_CACHE_ENTRY##,$(FMAP_SPD_CACHE_ENTRY)," \
|
2021-01-01 21:08:29 +01:00
|
|
|
-e "s,##VPD_ENTRY##,$(FMAP_VPD_ENTRY)," \
|
2022-10-29 21:32:54 +02:00
|
|
|
-e "s,##HSPHY_FW_ENTRY##,$(FMAP_HSPHY_FW_ENTRY)," \
|
2015-09-16 18:10:52 +02:00
|
|
|
-e "s,##CBFS_BASE##,$(FMAP_CBFS_BASE)," \
|
|
|
|
-e "s,##CBFS_SIZE##,$(FMAP_CBFS_SIZE)," \
|
|
|
|
$(DEFAULT_FLASHMAP) > $@.tmp
|
|
|
|
mv $@.tmp $@
|
2016-01-20 22:52:08 +01:00
|
|
|
else # ifeq ($(CONFIG_FMDFILE),)
|
2015-12-27 01:02:41 +01:00
|
|
|
$(obj)/fmap.fmd: $(CONFIG_FMDFILE) $(obj)/config.h
|
2016-06-17 01:48:44 +02:00
|
|
|
$(HOSTCC) $(PREPROCESS_ONLY) -include $(obj)/config.h $< -o $@.pre
|
|
|
|
mv $@.pre $@
|
2016-01-20 22:52:08 +01:00
|
|
|
endif # ifeq ($(CONFIG_FMDFILE),)
|
2015-09-16 18:10:52 +02:00
|
|
|
|
|
|
|
# generated at the same time as fmap.fmap
|
2016-05-02 10:50:31 +02:00
|
|
|
$(obj)/fmap_config.h: $(obj)/fmap.fmap
|
2018-08-17 20:05:53 +02:00
|
|
|
true
|
2016-01-20 15:32:03 +01:00
|
|
|
$(obj)/fmap.desc: $(obj)/fmap.fmap
|
2018-08-17 20:05:53 +02:00
|
|
|
true
|
2015-09-16 18:10:52 +02:00
|
|
|
|
|
|
|
$(obj)/fmap.fmap: $(obj)/fmap.fmd $(FMAPTOOL)
|
2016-05-02 10:50:31 +02:00
|
|
|
echo " FMAP $(FMAPTOOL) -h $(obj)/fmap_config.h $< $@"
|
|
|
|
$(FMAPTOOL) -h $(obj)/fmap_config.h -R $(obj)/fmap.desc $< $@
|
2015-09-16 18:10:52 +02:00
|
|
|
|
2017-11-16 09:02:29 +01:00
|
|
|
ifeq ($(CONFIG_INTEL_ADD_TOP_SWAP_BOOTBLOCK),y)
|
|
|
|
TS_OPTIONS := -j $(CONFIG_INTEL_TOP_SWAP_BOOTBLOCK_SIZE)
|
|
|
|
endif
|
2020-10-15 13:57:52 +02:00
|
|
|
|
2022-05-20 11:36:46 +02:00
|
|
|
ifneq ($(CONFIG_ARCH_X86),y)
|
|
|
|
add_bootblock = $(CBFSTOOL) $(1) write -u -r BOOTBLOCK -f $(2)
|
|
|
|
endif
|
|
|
|
|
2022-03-18 16:54:19 +01:00
|
|
|
# coreboot.pre doesn't follow the standard Make conventions. It gets modified
|
|
|
|
# by multiple rules, and thus we can't compute the dependencies correctly.
|
|
|
|
$(shell rm -f $(obj)/coreboot.pre)
|
|
|
|
|
2016-05-04 01:37:50 +02:00
|
|
|
ifneq ($(CONFIG_UPDATE_IMAGE),y)
|
2022-05-20 11:36:46 +02:00
|
|
|
$(obj)/coreboot.pre: $$(prebuilt-files) $(CBFSTOOL) $(obj)/fmap.fmap $(obj)/fmap.desc $(objcbfs)/bootblock.bin
|
2016-01-20 15:32:03 +01:00
|
|
|
$(CBFSTOOL) $@.tmp create -M $(obj)/fmap.fmap -r $(shell cat $(obj)/fmap.desc)
|
2022-05-20 11:36:46 +02:00
|
|
|
printf " BOOTBLOCK\n"
|
|
|
|
$(call add_bootblock,$@.tmp,$(objcbfs)/bootblock.bin)
|
2014-04-23 01:33:22 +02:00
|
|
|
$(prebuild-files) true
|
|
|
|
mv $@.tmp $@
|
2016-01-20 22:52:08 +01:00
|
|
|
else # ifneq ($(CONFIG_UPDATE_IMAGE),y)
|
2015-11-26 17:22:38 +01:00
|
|
|
.PHONY: $(obj)/coreboot.pre
|
|
|
|
$(obj)/coreboot.pre: $$(prebuilt-files) $(CBFSTOOL)
|
2016-01-20 22:54:27 +01:00
|
|
|
mv $(obj)/coreboot.rom $@.tmp || \
|
|
|
|
(echo "Error: You have UPDATE_IMAGE set in Kconfig, but have no existing image to update." && \
|
2016-01-26 22:25:40 +01:00
|
|
|
echo "Exiting." && \
|
2016-01-20 22:54:27 +01:00
|
|
|
false)
|
2015-06-03 18:54:59 +02:00
|
|
|
$(prebuild-files) true
|
|
|
|
mv $@.tmp $@
|
2016-01-20 22:52:08 +01:00
|
|
|
endif # ifneq ($(CONFIG_UPDATE_IMAGE),y)
|
2014-04-23 01:33:22 +02:00
|
|
|
|
|
|
|
ifeq ($(CONFIG_HAVE_REFCODE_BLOB),y)
|
|
|
|
REFCODE_BLOB=$(obj)/refcode.rmod
|
|
|
|
$(REFCODE_BLOB): $(RMODTOOL)
|
|
|
|
$(RMODTOOL) -i $(CONFIG_REFCODE_BLOB_FILE) -o $@
|
|
|
|
endif
|
|
|
|
|
2019-06-08 08:59:02 +02:00
|
|
|
ifeq ($(CONFIG_HAVE_RAMSTAGE),y)
|
|
|
|
RAMSTAGE=$(objcbfs)/ramstage.elf
|
|
|
|
else
|
|
|
|
RAMSTAGE=
|
|
|
|
endif
|
|
|
|
|
2021-01-12 15:09:57 +01:00
|
|
|
add_intermediate = \
|
2021-01-13 09:15:07 +01:00
|
|
|
$(1): $(obj)/coreboot.pre $(2) | $(INTERMEDIATE) \
|
2021-01-12 15:09:57 +01:00
|
|
|
$(eval INTERMEDIATE+=$(1)) $(eval PHONY+=$(1))
|
|
|
|
|
2021-07-06 12:26:41 +02:00
|
|
|
$(obj)/coreboot.rom: $(obj)/coreboot.pre $(CBFSTOOL) $(IFITTOOL) $$(INTERMEDIATE)
|
2014-04-23 01:33:22 +02:00
|
|
|
@printf " CBFS $(subst $(obj)/,,$(@))\n"
|
CBFS: Correct ROM_SIZE for ARM boards, use CBFS_SIZE for cbfstool
Some projects (like ChromeOS) put more content than described by CBFS
onto their image. For top-aligned images (read: x86), this has
traditionally been achieved with a CBFS_SIZE Kconfig (which denotes the
area actually managed by CBFS, as opposed to ROM_SIZE) that is used to
calculate the CBFS entry start offset. On bottom-aligned boards, many
define a fake (smaller) ROM_SIZE for only the CBFS part, which is not
consistently done and can be an issue because ROM_SIZE is expected to be
a power of two.
This patch changes all non-x86 boards to describe their actual
(physical) ROM size via one of the BOARD_ROMSIZE_KB_xxx options as a
mainboard Kconfig select (which is the correct place to declare
unchangeable physical properties of the board). It also changes the
cbfstool create invocation to use CBFS_SIZE as the -s parameter for
those architectures, which defaults to ROM_SIZE but gets overridden for
special use cases like ChromeOS. This has the advantage that cbfstool
has a consistent idea of where the area it is responsible for ends,
which offers better bounds-checking and is needed for a subsequent fix.
Also change the FMAP offset to default to right behind the (now
consistently known) CBFS region for non-x86 boards, which has emerged as
a de-facto standard on those architectures and allows us to reduce the
amount of custom configuration. In the future, the nightmare that is
ChromeOS's image build system could be redesigned to enforce this
automatically, and also confirm that it doesn't overwrite any space used
by CBFS (which is now consistently defined as the file size of
coreboot.rom on non-x86).
CQ-DEPEND=CL:231576,CL:231475
BRANCH=None
BUG=chromium:422501
TEST=Built and booted on Veyron_Pinky.
Change-Id: I89aa5b30e25679e074d4cb5eee4c08178892ada6
Signed-off-by: Patrick Georgi <pgeorgi@chromium.org>
Original-Commit-Id: e707c67c69599274b890d0686522880aa2e16d71
Original-Change-Id: I4fce5a56a8d72f4c4dd3a08c129025f1565351cc
Original-Signed-off-by: Julius Werner <jwerner@chromium.org>
Original-Reviewed-on: https://chromium-review.googlesource.com/229974
Original-Reviewed-by: Aaron Durbin <adurbin@chromium.org>
Reviewed-on: http://review.coreboot.org/9619
Tested-by: build bot (Jenkins)
Reviewed-by: Stefan Reinauer <stefan.reinauer@coreboot.org>
2014-11-10 22:11:50 +01:00
|
|
|
# The full ROM may be larger than the CBFS part, so create an empty
|
|
|
|
# file (filled with \377 = 0xff) and copy the CBFS image over it.
|
2015-04-22 09:22:00 +02:00
|
|
|
dd if=/dev/zero bs=$(call _toint,$(CONFIG_ROM_SIZE)) count=1 2> /dev/null | tr '\000' '\377' > $@.tmp
|
CBFS: Correct ROM_SIZE for ARM boards, use CBFS_SIZE for cbfstool
Some projects (like ChromeOS) put more content than described by CBFS
onto their image. For top-aligned images (read: x86), this has
traditionally been achieved with a CBFS_SIZE Kconfig (which denotes the
area actually managed by CBFS, as opposed to ROM_SIZE) that is used to
calculate the CBFS entry start offset. On bottom-aligned boards, many
define a fake (smaller) ROM_SIZE for only the CBFS part, which is not
consistently done and can be an issue because ROM_SIZE is expected to be
a power of two.
This patch changes all non-x86 boards to describe their actual
(physical) ROM size via one of the BOARD_ROMSIZE_KB_xxx options as a
mainboard Kconfig select (which is the correct place to declare
unchangeable physical properties of the board). It also changes the
cbfstool create invocation to use CBFS_SIZE as the -s parameter for
those architectures, which defaults to ROM_SIZE but gets overridden for
special use cases like ChromeOS. This has the advantage that cbfstool
has a consistent idea of where the area it is responsible for ends,
which offers better bounds-checking and is needed for a subsequent fix.
Also change the FMAP offset to default to right behind the (now
consistently known) CBFS region for non-x86 boards, which has emerged as
a de-facto standard on those architectures and allows us to reduce the
amount of custom configuration. In the future, the nightmare that is
ChromeOS's image build system could be redesigned to enforce this
automatically, and also confirm that it doesn't overwrite any space used
by CBFS (which is now consistently defined as the file size of
coreboot.rom on non-x86).
CQ-DEPEND=CL:231576,CL:231475
BRANCH=None
BUG=chromium:422501
TEST=Built and booted on Veyron_Pinky.
Change-Id: I89aa5b30e25679e074d4cb5eee4c08178892ada6
Signed-off-by: Patrick Georgi <pgeorgi@chromium.org>
Original-Commit-Id: e707c67c69599274b890d0686522880aa2e16d71
Original-Change-Id: I4fce5a56a8d72f4c4dd3a08c129025f1565351cc
Original-Signed-off-by: Julius Werner <jwerner@chromium.org>
Original-Reviewed-on: https://chromium-review.googlesource.com/229974
Original-Reviewed-by: Aaron Durbin <adurbin@chromium.org>
Reviewed-on: http://review.coreboot.org/9619
Tested-by: build bot (Jenkins)
Reviewed-by: Stefan Reinauer <stefan.reinauer@coreboot.org>
2014-11-10 22:11:50 +01:00
|
|
|
dd if=$(obj)/coreboot.pre of=$@.tmp bs=8192 conv=notrunc 2> /dev/null
|
2014-04-23 01:33:22 +02:00
|
|
|
ifeq ($(CONFIG_CPU_INTEL_FIRMWARE_INTERFACE_TABLE),y)
|
2020-10-14 16:35:11 +02:00
|
|
|
# Print final FIT table
|
2019-02-18 13:33:16 +01:00
|
|
|
$(IFITTOOL) -f $@.tmp -D -r COREBOOT
|
2020-10-14 16:35:11 +02:00
|
|
|
# Print final TS BOOTBLOCK FIT table
|
2019-02-18 13:33:16 +01:00
|
|
|
ifeq ($(CONFIG_INTEL_ADD_TOP_SWAP_BOOTBLOCK),y)
|
2020-10-14 16:35:11 +02:00
|
|
|
@printf " TOP SWAP FIT table\n"
|
2019-02-18 13:33:16 +01:00
|
|
|
$(IFITTOOL) -f $@.tmp -D $(TS_OPTIONS) -r COREBOOT
|
2020-10-14 16:35:11 +02:00
|
|
|
endif # CONFIG_INTEL_ADD_TOP_SWAP_BOOTBLOCK
|
2020-03-24 13:51:26 +01:00
|
|
|
endif # CONFIG_CPU_INTEL_FIRMWARE_INTERFACE_TABLE
|
2014-04-23 01:33:22 +02:00
|
|
|
mv $@.tmp $@
|
2017-10-23 19:20:57 +02:00
|
|
|
@printf " CBFSLAYOUT $(subst $(obj)/,,$(@))\n\n"
|
|
|
|
$(CBFSTOOL) $@ layout
|
2014-04-23 01:33:22 +02:00
|
|
|
@printf " CBFSPRINT $(subst $(obj)/,,$(@))\n\n"
|
2016-08-10 17:13:00 +02:00
|
|
|
$(CBFSTOOL) $@ print -r $(subst $(spc),$(comma),$(all-regions))
|
2022-05-25 03:18:46 +02:00
|
|
|
ifeq ($(CONFIG_CBFS_VERIFICATION),y)
|
|
|
|
line=$$($(CBFSTOOL) $@ print -kv 2>/dev/null | grep -F '[CBFS VERIFICATION (COREBOOT)]') ;\
|
|
|
|
if ! printf "$$line" | grep -q 'fully valid'; then \
|
|
|
|
echo "CBFS verification error: $$line" ;\
|
|
|
|
exit 1 ;\
|
|
|
|
fi
|
|
|
|
endif # CONFIG_CBFS_VERIFICATION
|
2014-04-23 01:33:22 +02:00
|
|
|
|
2015-11-26 16:39:23 +01:00
|
|
|
cbfs-files-y += $(CONFIG_CBFS_PREFIX)/romstage
|
|
|
|
$(CONFIG_CBFS_PREFIX)/romstage-file := $(objcbfs)/romstage.elf
|
|
|
|
$(CONFIG_CBFS_PREFIX)/romstage-type := stage
|
2015-09-29 22:51:35 +02:00
|
|
|
$(CONFIG_CBFS_PREFIX)/romstage-compression := $(CBFS_PRERAM_COMPRESS_FLAG)
|
2015-11-26 16:39:23 +01:00
|
|
|
ifeq ($(CONFIG_ARCH_ROMSTAGE_ARM),y)
|
|
|
|
$(CONFIG_CBFS_PREFIX)/romstage-options := -b 0
|
|
|
|
endif
|
|
|
|
ifeq ($(CONFIG_ARCH_ROMSTAGE_X86_32)$(CONFIG_ARCH_ROMSTAGE_X86_64),y)
|
|
|
|
# Use a 64 byte alignment to provide a minimum alignment
|
|
|
|
# requirement for the overall romstage. While the first object within
|
|
|
|
# romstage could have a 4 byte minimum alignment that doesn't mean the linker
|
|
|
|
# won't decide the entire section should be aligned to a larger value. In the
|
|
|
|
# future cbfstool should add XIP files proper and honor the alignment
|
|
|
|
# requirements of the program segment.
|
|
|
|
#
|
|
|
|
# Make sure that segment for .car.data is ignored while adding romstage.
|
|
|
|
$(CONFIG_CBFS_PREFIX)/romstage-align := 64
|
2016-05-05 08:25:16 +02:00
|
|
|
$(CONFIG_CBFS_PREFIX)/romstage-options := -S ".car.data"
|
|
|
|
|
|
|
|
# If CAR does not support execution of code, romstage on x86 is expected to be
|
|
|
|
# xip.
|
|
|
|
ifneq ($(CONFIG_NO_XIP_EARLY_STAGES),y)
|
|
|
|
$(CONFIG_CBFS_PREFIX)/romstage-options += --xip
|
|
|
|
|
2020-05-25 07:52:07 +02:00
|
|
|
# For efficient MTRR utilisation use natural alignment for romstage.
|
|
|
|
ifeq ($(CONFIG_SETUP_XIP_CACHE),y)
|
2020-05-25 07:52:07 +02:00
|
|
|
$(CONFIG_CBFS_PREFIX)/romstage-options += --pow2page
|
2020-05-25 07:52:07 +02:00
|
|
|
endif # CONFIG_SETUP_XIP_CACHE
|
2016-05-05 08:25:16 +02:00
|
|
|
|
|
|
|
endif # CONFIG_NO_XIP_EARLY_STAGES
|
|
|
|
endif # CONFIG_ARCH_ROMSTAGE_X86_32 / CONFIG_ARCH_ROMSTAGE_X86_64
|
2019-02-19 10:57:16 +01:00
|
|
|
ifeq ($(CONFIG_VBOOT_STARTS_IN_ROMSTAGE),y)
|
|
|
|
$(CONFIG_CBFS_PREFIX)/romstage-options += $(TXTIBB)
|
|
|
|
endif
|
2015-11-26 16:39:23 +01:00
|
|
|
|
2019-06-08 08:59:02 +02:00
|
|
|
cbfs-files-$(CONFIG_HAVE_RAMSTAGE) += $(CONFIG_CBFS_PREFIX)/ramstage
|
|
|
|
$(CONFIG_CBFS_PREFIX)/ramstage-file := $(RAMSTAGE)
|
2015-11-25 18:21:53 +01:00
|
|
|
$(CONFIG_CBFS_PREFIX)/ramstage-type := stage
|
|
|
|
$(CONFIG_CBFS_PREFIX)/ramstage-compression := $(CBFS_COMPRESS_FLAG)
|
2021-11-05 17:29:24 +01:00
|
|
|
# The AMD LPC SPI DMA controller requires source files to be 64 byte aligned.
|
|
|
|
ifeq ($(CONFIG_SOC_AMD_COMMON_BLOCK_LPC_SPI_DMA),y)
|
|
|
|
$(CONFIG_CBFS_PREFIX)/ramstage-align := 64
|
|
|
|
endif
|
2015-11-25 18:21:53 +01:00
|
|
|
|
|
|
|
cbfs-files-$(CONFIG_HAVE_REFCODE_BLOB) += $(CONFIG_CBFS_PREFIX)/refcode
|
|
|
|
$(CONFIG_CBFS_PREFIX)/refcode-file := $(REFCODE_BLOB)
|
|
|
|
$(CONFIG_CBFS_PREFIX)/refcode-type := stage
|
|
|
|
$(CONFIG_CBFS_PREFIX)/refcode-compression := $(CBFS_COMPRESS_FLAG)
|
|
|
|
|
|
|
|
cbfs-files-$(CONFIG_SEABIOS_VGA_COREBOOT) += vgaroms/seavgabios.bin
|
|
|
|
vgaroms/seavgabios.bin-file := $(CONFIG_PAYLOAD_VGABIOS_FILE)
|
|
|
|
vgaroms/seavgabios.bin-type := raw
|
|
|
|
|
2015-11-25 18:47:56 +01:00
|
|
|
cbfs-files-$(CONFIG_INCLUDE_CONFIG_FILE) += config
|
build: List all Kconfigs in CBFS `config` file, compress it
The coreboot build system automatically adds a `config` file to CBFS
that lists the exact Kconfig configuration that this image was built
with. This is useful to reproduce a build after the fact or to check
whether support for a specific feature is enabled in the image.
However, the file is currently generated using the `savedefconfig`
command to Kconfig, which generates the minimal .config file that is
needed to produce the required config in a coreboot build. This is fine
for reproduction, but bad when you want to check if a certain config was
enabled, since many configs get enabled by default or pulled in through
another config's `select` statement and thus don't show up in the
defconfig.
This patch tries to fix that second use case by instead including the
full .config instead. In order to save some space, we can remove all
comments (e.g. `# CONFIG_XXX is not set`) from the file, which still
makes it easy to test for a specific config (if it's in the file you can
extract the right value, if not you can assume it was set to `n`). We
can also LZMA compress it since this file is never read by firmware
itself and only intended for later re-extraction via cbfstool, which
always has LZMA support included.
On a sample Trogdor device the existing (uncompressed) `config` file
takes up 519 bytes in CBFS, whereas the new (compressed) file after this
patch will take up 1832 bytes -- still a small amount that should
hopefully not break the bank for anyone.
Signed-off-by: Julius Werner <jwerner@chromium.org>
Change-Id: I5259ec6f932cdc5780b8843f46dd476da9d19728
Reviewed-on: https://review.coreboot.org/c/coreboot/+/69710
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Yu-Ping Wu <yupingso@google.com>
Reviewed-by: Jakub Czapiga <jacz@semihalf.com>
Reviewed-by: Martin Roth <martin.roth@amd.corp-partner.google.com>
2022-11-17 02:48:46 +01:00
|
|
|
config-file := $(DOTCONFIG):config
|
2015-11-25 18:47:56 +01:00
|
|
|
config-type := raw
|
build: List all Kconfigs in CBFS `config` file, compress it
The coreboot build system automatically adds a `config` file to CBFS
that lists the exact Kconfig configuration that this image was built
with. This is useful to reproduce a build after the fact or to check
whether support for a specific feature is enabled in the image.
However, the file is currently generated using the `savedefconfig`
command to Kconfig, which generates the minimal .config file that is
needed to produce the required config in a coreboot build. This is fine
for reproduction, but bad when you want to check if a certain config was
enabled, since many configs get enabled by default or pulled in through
another config's `select` statement and thus don't show up in the
defconfig.
This patch tries to fix that second use case by instead including the
full .config instead. In order to save some space, we can remove all
comments (e.g. `# CONFIG_XXX is not set`) from the file, which still
makes it easy to test for a specific config (if it's in the file you can
extract the right value, if not you can assume it was set to `n`). We
can also LZMA compress it since this file is never read by firmware
itself and only intended for later re-extraction via cbfstool, which
always has LZMA support included.
On a sample Trogdor device the existing (uncompressed) `config` file
takes up 519 bytes in CBFS, whereas the new (compressed) file after this
patch will take up 1832 bytes -- still a small amount that should
hopefully not break the bank for anyone.
Signed-off-by: Julius Werner <jwerner@chromium.org>
Change-Id: I5259ec6f932cdc5780b8843f46dd476da9d19728
Reviewed-on: https://review.coreboot.org/c/coreboot/+/69710
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Yu-Ping Wu <yupingso@google.com>
Reviewed-by: Jakub Czapiga <jacz@semihalf.com>
Reviewed-by: Martin Roth <martin.roth@amd.corp-partner.google.com>
2022-11-17 02:48:46 +01:00
|
|
|
config-compression := LZMA
|
2015-11-25 18:47:56 +01:00
|
|
|
|
|
|
|
cbfs-files-$(CONFIG_INCLUDE_CONFIG_FILE) += revision
|
|
|
|
revision-file := $(obj)/build.h
|
|
|
|
revision-type := raw
|
|
|
|
|
2020-11-15 08:07:36 +01:00
|
|
|
cbfs-files-y += build_info
|
|
|
|
build_info-file := $(obj)/build_info
|
|
|
|
build_info-type := raw
|
|
|
|
|
2016-05-21 04:20:58 +02:00
|
|
|
BOOTSPLASH_SUFFIX=$(suffix $(call strip_quotes,$(CONFIG_BOOTSPLASH_FILE)))
|
|
|
|
cbfs-files-$(CONFIG_BOOTSPLASH_IMAGE) += bootsplash$(BOOTSPLASH_SUFFIX)
|
|
|
|
bootsplash$(BOOTSPLASH_SUFFIX)-file := $(call strip_quotes,$(CONFIG_BOOTSPLASH_FILE))
|
|
|
|
bootsplash$(BOOTSPLASH_SUFFIX)-type := bootsplash
|
2014-04-23 01:33:22 +02:00
|
|
|
|
2016-03-08 02:55:43 +01:00
|
|
|
# Ensure that no payload segment overlaps with memory regions used by ramstage
|
|
|
|
# (not for x86 since it can relocate itself in that case)
|
|
|
|
ifneq ($(CONFIG_ARCH_X86),y)
|
|
|
|
check-ramstage-overlap-regions := ramstage
|
|
|
|
check-ramstage-overlap-files :=
|
|
|
|
ifneq ($(CONFIG_PAYLOAD_NONE),y)
|
|
|
|
check-ramstage-overlap-files += $(CONFIG_CBFS_PREFIX)/payload
|
|
|
|
endif
|
|
|
|
|
|
|
|
# will output one or more lines of "<load address in hex> <memlen in decimal>"
|
|
|
|
cbfs-get-segments-cmd = $(CBFSTOOL) $(obj)/coreboot.pre print -v | sed -n \
|
|
|
|
'\%$(1)%,\%^[^ ]\{4\}%s% .*load: \(0x[0-9a-fA-F]*\),.*length: [0-9]*/\([0-9]*\).*%\1 \2%p'
|
|
|
|
|
|
|
|
ramstage-symbol-addr-cmd = $(OBJDUMP_ramstage) -t $(objcbfs)/ramstage.elf | \
|
2021-07-22 16:57:26 +02:00
|
|
|
sed -n '/ $(1)$$/s/^\([0-9a-fA-F]*\) .*/0x\1/p' | \
|
|
|
|
uniq
|
2016-03-08 02:55:43 +01:00
|
|
|
|
2021-01-13 09:15:07 +01:00
|
|
|
$(call add_intermediate, check-ramstage-overlaps)
|
2016-03-08 02:55:43 +01:00
|
|
|
programs=$$($(foreach file,$(check-ramstage-overlap-files), \
|
|
|
|
$(call cbfs-get-segments-cmd,$(file)) ; )) ; \
|
|
|
|
regions=$$($(foreach region,$(check-ramstage-overlap-regions), \
|
|
|
|
echo $(region) ; \
|
|
|
|
$(call ramstage-symbol-addr-cmd,_$(region)) ; \
|
|
|
|
$(call ramstage-symbol-addr-cmd,_e$(region)) ; )) ; \
|
|
|
|
pstart= ; pend= ; \
|
|
|
|
for x in $$programs; do \
|
|
|
|
if [ -z $$pstart ]; then pstart=$$(($$x)) ; continue ; fi ; \
|
|
|
|
pend=$$(($$pstart + $$x)) ; \
|
|
|
|
rname= ; rstart= ; rend= ; \
|
|
|
|
for y in $$regions ; do \
|
|
|
|
if [ -z $$rname ]; then rname=$$y ; continue ; fi ; \
|
|
|
|
if [ -z $$rstart ]; then rstart=$$(($$y)) ; continue ; fi ; \
|
|
|
|
rend=$$(($$y)) ; \
|
|
|
|
if [ $$pstart -lt $$rend -a $$rstart -lt $$pend ]; then \
|
|
|
|
echo "ERROR: Ramstage region _$$rname overlapped by:" \
|
|
|
|
$(check-ramstage-overlap-files) ; \
|
|
|
|
exit 1 ; \
|
|
|
|
fi ; \
|
|
|
|
rname= ; rstart= ; rend= ; \
|
|
|
|
done ; \
|
|
|
|
pstart= ; pend= ; \
|
|
|
|
done
|
|
|
|
|
|
|
|
endif
|