mirror of
https://github.com/espressif/esp-idf.git
synced 2026-04-27 19:13:21 +00:00
31b113b649
- Increased the TEE stack when secure boot is enabled - Also, generate a build error when the generated TEE binary image size is greater than the TEE partition size
95 lines
3.3 KiB
CMake
95 lines
3.3 KiB
CMake
idf_build_get_property(idf_path IDF_PATH)
|
|
idf_build_get_property(idf_target IDF_TARGET)
|
|
idf_build_get_property(build_dir BUILD_DIR)
|
|
idf_build_get_property(sdkconfig SDKCONFIG)
|
|
idf_build_get_property(python PYTHON)
|
|
idf_build_get_property(extra_cmake_args EXTRA_CMAKE_ARGS)
|
|
idf_build_get_property(project_dir PROJECT_DIR)
|
|
idf_build_get_property(non_os_build NON_OS_BUILD)
|
|
idf_build_get_property(custom_secure_service_dir CUSTOM_SECURE_SERVICE_COMPONENT_DIR)
|
|
idf_build_get_property(custom_secure_service_component CUSTOM_SECURE_SERVICE_COMPONENT)
|
|
idf_build_get_property(partition_table_bin PARTITION_TABLE_BIN_PATH)
|
|
|
|
if(NOT CONFIG_SECURE_ENABLE_TEE OR non_os_build)
|
|
return()
|
|
endif()
|
|
|
|
if(CONFIG_SECURE_BOOT_BUILD_SIGNED_BINARIES)
|
|
get_filename_component(secure_boot_signing_key
|
|
"${CONFIG_SECURE_BOOT_SIGNING_KEY}"
|
|
ABSOLUTE BASE_DIR "${project_dir}")
|
|
|
|
set(SECURE_BOOT_SIGNING_KEY ${secure_boot_signing_key})
|
|
set(sign_key_arg "-DSECURE_BOOT_SIGNING_KEY=${secure_boot_signing_key}")
|
|
else()
|
|
set(sign_key_arg)
|
|
endif()
|
|
|
|
set(TEE_BUILD_DIR "${build_dir}/esp_tee")
|
|
set(tee_binary_files
|
|
"${TEE_BUILD_DIR}/esp_tee.elf"
|
|
"${TEE_BUILD_DIR}/esp_tee.bin"
|
|
"${TEE_BUILD_DIR}/esp_tee.map"
|
|
)
|
|
|
|
# Override LibC for ESP-TEE if needed
|
|
set(esp_tee_sdkconfig "${CMAKE_CURRENT_BINARY_DIR}/sdkconfig.esp_tee")
|
|
configure_file("${sdkconfig}" "${esp_tee_sdkconfig}" COPYONLY)
|
|
|
|
file(READ "${esp_tee_sdkconfig}" content)
|
|
|
|
unset(REE_LIBC)
|
|
unset(TEE_LIBC)
|
|
|
|
foreach(libc NEWLIB PICOLIBC)
|
|
if(content MATCHES "CONFIG_LIBC_${libc}=y")
|
|
set(REE_LIBC ${libc})
|
|
endif()
|
|
|
|
if(content MATCHES "CONFIG_SECURE_TEE_LIBC_${libc}=y")
|
|
set(TEE_LIBC ${libc})
|
|
endif()
|
|
endforeach()
|
|
|
|
if(REE_LIBC AND TEE_LIBC AND NOT REE_LIBC STREQUAL TEE_LIBC)
|
|
string(REGEX REPLACE
|
|
"CONFIG_LIBC_(NEWLIB|PICOLIBC)=y"
|
|
"# CONFIG_LIBC_\\1 is not set"
|
|
content
|
|
"${content}"
|
|
)
|
|
# Enable libc selected by TEE
|
|
string(REGEX REPLACE
|
|
"# CONFIG_LIBC_${TEE_LIBC} is not set"
|
|
"CONFIG_LIBC_${TEE_LIBC}=y"
|
|
content
|
|
"${content}"
|
|
)
|
|
file(WRITE "${esp_tee_sdkconfig}" "${content}")
|
|
endif()
|
|
|
|
set(secure_service_headers_dir "${CMAKE_CURRENT_BINARY_DIR}/secure_service_headers")
|
|
make_directory(${secure_service_headers_dir})
|
|
idf_build_set_property(SECURE_SERVICE_HEADERS_DIR "${secure_service_headers_dir}")
|
|
include_directories("${secure_service_headers_dir}")
|
|
|
|
externalproject_add(esp_tee
|
|
SOURCE_DIR "${CMAKE_CURRENT_LIST_DIR}/subproject"
|
|
BINARY_DIR "${TEE_BUILD_DIR}"
|
|
CMAKE_ARGS -DSDKCONFIG=${esp_tee_sdkconfig} -DIDF_PATH=${idf_path} -DIDF_TARGET=${idf_target}
|
|
-DCUSTOM_SECURE_SERVICE_COMPONENT=${custom_secure_service_component}
|
|
-DCUSTOM_SECURE_SERVICE_COMPONENT_DIR=${custom_secure_service_dir}
|
|
-DSECURE_SERVICE_HEADERS_DIR=${secure_service_headers_dir}
|
|
-DPARTITION_TABLE_BIN_PATH=${partition_table_bin}
|
|
${extra_cmake_args} ${sign_key_arg}
|
|
INSTALL_COMMAND ""
|
|
BUILD_ALWAYS 1 # no easy way around this...
|
|
USES_TERMINAL_CONFIGURE TRUE
|
|
USES_TERMINAL_BUILD TRUE
|
|
BUILD_BYPRODUCTS ${tee_binary_files}
|
|
)
|
|
|
|
set_property(DIRECTORY "${CMAKE_CURRENT_SOURCE_DIR}" APPEND PROPERTY
|
|
ADDITIONAL_MAKE_CLEAN_FILES
|
|
${tee_binary_files})
|