Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 1 | # |
Vikram Kanigiri | 70752bb | 2016-02-10 14:50:53 +0000 | [diff] [blame] | 2 | # Copyright (c) 2015-2016, ARM Limited and Contributors. All rights reserved. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 3 | # |
| 4 | # Redistribution and use in source and binary forms, with or without |
| 5 | # modification, are permitted provided that the following conditions are met: |
| 6 | # |
| 7 | # Redistributions of source code must retain the above copyright notice, this |
| 8 | # list of conditions and the following disclaimer. |
| 9 | # |
| 10 | # Redistributions in binary form must reproduce the above copyright notice, |
| 11 | # this list of conditions and the following disclaimer in the documentation |
| 12 | # and/or other materials provided with the distribution. |
| 13 | # |
| 14 | # Neither the name of ARM nor the names of its contributors may be used |
| 15 | # to endorse or promote products derived from this software without specific |
| 16 | # prior written permission. |
| 17 | # |
| 18 | # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
| 19 | # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 20 | # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| 21 | # ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE |
| 22 | # LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
| 23 | # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
| 24 | # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
| 25 | # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
| 26 | # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| 27 | # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
| 28 | # POSSIBILITY OF SUCH DAMAGE. |
| 29 | # |
| 30 | |
Soby Mathew | 0d268dc | 2016-07-11 14:13:56 +0100 | [diff] [blame^] | 31 | ifeq (${ARCH}, aarch64) |
| 32 | # On ARM standard platorms, the TSP can execute from Trusted SRAM, Trusted |
| 33 | # DRAM (if available) or the TZC secured area of DRAM. |
| 34 | # Trusted SRAM is the default. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 35 | |
Soby Mathew | 0d268dc | 2016-07-11 14:13:56 +0100 | [diff] [blame^] | 36 | ARM_TSP_RAM_LOCATION := tsram |
| 37 | ifeq (${ARM_TSP_RAM_LOCATION}, tsram) |
| 38 | ARM_TSP_RAM_LOCATION_ID = ARM_TRUSTED_SRAM_ID |
| 39 | else ifeq (${ARM_TSP_RAM_LOCATION}, tdram) |
| 40 | ARM_TSP_RAM_LOCATION_ID = ARM_TRUSTED_DRAM_ID |
| 41 | else ifeq (${ARM_TSP_RAM_LOCATION}, dram) |
| 42 | ARM_TSP_RAM_LOCATION_ID = ARM_DRAM_ID |
| 43 | else |
| 44 | $(error "Unsupported ARM_TSP_RAM_LOCATION value") |
| 45 | endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 46 | |
Soby Mathew | 0d268dc | 2016-07-11 14:13:56 +0100 | [diff] [blame^] | 47 | # Process flags |
| 48 | $(eval $(call add_define,ARM_TSP_RAM_LOCATION_ID)) |
| 49 | |
| 50 | # Process ARM_BL31_IN_DRAM flag |
| 51 | ARM_BL31_IN_DRAM := 0 |
| 52 | $(eval $(call assert_boolean,ARM_BL31_IN_DRAM)) |
| 53 | $(eval $(call add_define,ARM_BL31_IN_DRAM)) |
| 54 | endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 55 | |
Soby Mathew | 7799cf7 | 2015-04-16 14:49:09 +0100 | [diff] [blame] | 56 | # For the original power-state parameter format, the State-ID can be encoded |
| 57 | # according to the recommended encoding or zero. This flag determines which |
| 58 | # State-ID encoding to be parsed. |
| 59 | ARM_RECOM_STATE_ID_ENC := 0 |
| 60 | |
| 61 | # If the PSCI_EXTENDED_STATE_ID is set, then the recommended state ID need to |
| 62 | # be used. Else throw a build error. |
| 63 | ifeq (${PSCI_EXTENDED_STATE_ID}, 1) |
| 64 | ifeq (${ARM_RECOM_STATE_ID_ENC}, 0) |
| 65 | $(error "Incompatible STATE_ID build option specified") |
| 66 | endif |
| 67 | endif |
| 68 | |
| 69 | # Process ARM_RECOM_STATE_ID_ENC flag |
| 70 | $(eval $(call assert_boolean,ARM_RECOM_STATE_ID_ENC)) |
| 71 | $(eval $(call add_define,ARM_RECOM_STATE_ID_ENC)) |
| 72 | |
Juan Castillo | b6132f1 | 2015-10-06 14:01:35 +0100 | [diff] [blame] | 73 | # Process ARM_DISABLE_TRUSTED_WDOG flag |
| 74 | # By default, Trusted Watchdog is always enabled unless SPIN_ON_BL1_EXIT is set |
| 75 | ARM_DISABLE_TRUSTED_WDOG := 0 |
| 76 | ifeq (${SPIN_ON_BL1_EXIT}, 1) |
| 77 | ARM_DISABLE_TRUSTED_WDOG := 1 |
| 78 | endif |
| 79 | $(eval $(call assert_boolean,ARM_DISABLE_TRUSTED_WDOG)) |
| 80 | $(eval $(call add_define,ARM_DISABLE_TRUSTED_WDOG)) |
| 81 | |
Juan Castillo | aadf19a | 2015-11-06 16:02:32 +0000 | [diff] [blame] | 82 | # Process ARM_CONFIG_CNTACR |
| 83 | ARM_CONFIG_CNTACR := 1 |
| 84 | $(eval $(call assert_boolean,ARM_CONFIG_CNTACR)) |
| 85 | $(eval $(call add_define,ARM_CONFIG_CNTACR)) |
| 86 | |
David Wang | 0ba499f | 2016-03-07 11:02:57 +0800 | [diff] [blame] | 87 | # Process ARM_BL31_IN_DRAM flag |
| 88 | ARM_BL31_IN_DRAM := 0 |
| 89 | $(eval $(call assert_boolean,ARM_BL31_IN_DRAM)) |
| 90 | $(eval $(call add_define,ARM_BL31_IN_DRAM)) |
| 91 | |
Soby Mathew | 421dbc4 | 2016-05-23 16:07:53 +0100 | [diff] [blame] | 92 | # Enable PSCI_STAT_COUNT/RESIDENCY APIs on ARM platforms |
Soby Mathew | 0d268dc | 2016-07-11 14:13:56 +0100 | [diff] [blame^] | 93 | ENABLE_PSCI_STAT := 1 |
Soby Mathew | 421dbc4 | 2016-05-23 16:07:53 +0100 | [diff] [blame] | 94 | |
Sandrine Bailleux | ecdc4d3 | 2016-07-08 14:38:16 +0100 | [diff] [blame] | 95 | # On ARM platforms, separate the code and read-only data sections to allow |
| 96 | # mapping the former as executable and the latter as execute-never. |
| 97 | SEPARATE_CODE_AND_RODATA := 1 |
| 98 | |
| 99 | |
Juan Castillo | 9b265a8 | 2015-05-07 14:52:44 +0100 | [diff] [blame] | 100 | PLAT_INCLUDES += -Iinclude/common/tbbr \ |
Soby Mathew | 0d268dc | 2016-07-11 14:13:56 +0100 | [diff] [blame^] | 101 | -Iinclude/plat/arm/common |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 102 | |
Soby Mathew | 0d268dc | 2016-07-11 14:13:56 +0100 | [diff] [blame^] | 103 | ifeq (${ARCH}, aarch64) |
| 104 | PLAT_INCLUDES += -Iinclude/plat/arm/common/aarch64 |
| 105 | endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 106 | |
Soby Mathew | cc037c1 | 2016-04-08 16:42:58 +0100 | [diff] [blame] | 107 | PLAT_BL_COMMON_SOURCES += lib/xlat_tables/xlat_tables_common.c \ |
Soby Mathew | 0d268dc | 2016-07-11 14:13:56 +0100 | [diff] [blame^] | 108 | lib/xlat_tables/${ARCH}/xlat_tables.c \ |
| 109 | plat/arm/common/${ARCH}/arm_helpers.S \ |
Soby Mathew | 0eb965b | 2016-07-07 08:45:56 +0100 | [diff] [blame] | 110 | plat/arm/common/arm_common.c \ |
Soby Mathew | 0d268dc | 2016-07-11 14:13:56 +0100 | [diff] [blame^] | 111 | plat/common/${ARCH}/plat_common.c |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 112 | |
Vikram Kanigiri | fbb1301 | 2016-02-15 11:54:14 +0000 | [diff] [blame] | 113 | BL1_SOURCES += drivers/arm/sp805/sp805.c \ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 114 | drivers/io/io_fip.c \ |
| 115 | drivers/io/io_memmap.c \ |
| 116 | drivers/io/io_storage.c \ |
| 117 | plat/arm/common/arm_bl1_setup.c \ |
| 118 | plat/arm/common/arm_io_storage.c \ |
| 119 | plat/common/aarch64/platform_up_stack.S |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 120 | ifdef EL3_PAYLOAD_BASE |
| 121 | # Need the arm_program_trusted_mailbox() function to release secondary CPUs from |
| 122 | # their holding pen |
| 123 | BL1_SOURCES += plat/arm/common/arm_pm.c |
| 124 | endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 125 | |
Vikram Kanigiri | 70752bb | 2016-02-10 14:50:53 +0000 | [diff] [blame] | 126 | BL2_SOURCES += drivers/io/io_fip.c \ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 127 | drivers/io/io_memmap.c \ |
| 128 | drivers/io/io_storage.c \ |
| 129 | plat/arm/common/arm_bl2_setup.c \ |
| 130 | plat/arm/common/arm_io_storage.c \ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 131 | plat/common/aarch64/platform_up_stack.S |
| 132 | |
Vikram Kanigiri | 70752bb | 2016-02-10 14:50:53 +0000 | [diff] [blame] | 133 | BL2U_SOURCES += plat/arm/common/arm_bl2u_setup.c \ |
Yatharth Kochar | 3a11eda | 2015-10-14 15:28:11 +0100 | [diff] [blame] | 134 | plat/common/aarch64/platform_up_stack.S |
| 135 | |
Vikram Kanigiri | fbb1301 | 2016-02-15 11:54:14 +0000 | [diff] [blame] | 136 | BL31_SOURCES += plat/arm/common/arm_bl31_setup.c \ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 137 | plat/arm/common/arm_pm.c \ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 138 | plat/arm/common/arm_topology.c \ |
Soby Mathew | fec4eb7 | 2015-07-01 16:16:20 +0100 | [diff] [blame] | 139 | plat/common/aarch64/platform_mp_stack.S \ |
Soby Mathew | f6c4108 | 2016-05-03 12:31:18 +0100 | [diff] [blame] | 140 | plat/common/plat_psci_common.c |
Juan Castillo | a08a5e7 | 2015-05-19 11:54:12 +0100 | [diff] [blame] | 141 | |
| 142 | ifneq (${TRUSTED_BOARD_BOOT},0) |
| 143 | |
| 144 | # By default, ARM platforms use RSA keys |
| 145 | KEY_ALG := rsa |
| 146 | |
| 147 | # Include common TBB sources |
| 148 | AUTH_SOURCES := drivers/auth/auth_mod.c \ |
Achin Gupta | 1fa7eb6 | 2015-11-03 14:18:34 +0000 | [diff] [blame] | 149 | drivers/auth/crypto_mod.c \ |
| 150 | drivers/auth/img_parser_mod.c \ |
| 151 | drivers/auth/tbbr/tbbr_cot.c \ |
Juan Castillo | a08a5e7 | 2015-05-19 11:54:12 +0100 | [diff] [blame] | 152 | |
Yatharth Kochar | 736a3bf | 2015-10-11 14:14:55 +0100 | [diff] [blame] | 153 | PLAT_INCLUDES += -Iinclude/bl1/tbbr |
| 154 | |
Yatharth Kochar | f11b29a | 2016-02-01 11:04:46 +0000 | [diff] [blame] | 155 | BL1_SOURCES += ${AUTH_SOURCES} \ |
| 156 | bl1/tbbr/tbbr_img_desc.c \ |
Yatharth Kochar | 736a3bf | 2015-10-11 14:14:55 +0100 | [diff] [blame] | 157 | plat/arm/common/arm_bl1_fwu.c |
| 158 | |
Juan Castillo | a08a5e7 | 2015-05-19 11:54:12 +0100 | [diff] [blame] | 159 | BL2_SOURCES += ${AUTH_SOURCES} |
| 160 | |
Juan Castillo | 8e04dec | 2016-01-05 11:55:36 +0000 | [diff] [blame] | 161 | $(eval $(call FWU_FIP_ADD_IMG,NS_BL2U,--fwu)) |
Yatharth Kochar | d1a9343 | 2015-10-12 12:33:47 +0100 | [diff] [blame] | 162 | |
Juan Castillo | a08a5e7 | 2015-05-19 11:54:12 +0100 | [diff] [blame] | 163 | MBEDTLS_KEY_ALG := ${KEY_ALG} |
| 164 | |
| 165 | # We expect to locate the *.mk files under the directories specified below |
| 166 | CRYPTO_LIB_MK := drivers/auth/mbedtls/mbedtls_crypto.mk |
| 167 | IMG_PARSER_LIB_MK := drivers/auth/mbedtls/mbedtls_x509.mk |
| 168 | |
| 169 | $(info Including ${CRYPTO_LIB_MK}) |
| 170 | include ${CRYPTO_LIB_MK} |
| 171 | |
| 172 | $(info Including ${IMG_PARSER_LIB_MK}) |
| 173 | include ${IMG_PARSER_LIB_MK} |
| 174 | |
| 175 | endif |