Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 1 | # |
Vikram Kanigiri | 70752bb | 2016-02-10 14:50:53 +0000 | [diff] [blame] | 2 | # Copyright (c) 2015-2016, ARM Limited and Contributors. All rights reserved. |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 3 | # |
| 4 | # Redistribution and use in source and binary forms, with or without |
| 5 | # modification, are permitted provided that the following conditions are met: |
| 6 | # |
| 7 | # Redistributions of source code must retain the above copyright notice, this |
| 8 | # list of conditions and the following disclaimer. |
| 9 | # |
| 10 | # Redistributions in binary form must reproduce the above copyright notice, |
| 11 | # this list of conditions and the following disclaimer in the documentation |
| 12 | # and/or other materials provided with the distribution. |
| 13 | # |
| 14 | # Neither the name of ARM nor the names of its contributors may be used |
| 15 | # to endorse or promote products derived from this software without specific |
| 16 | # prior written permission. |
| 17 | # |
| 18 | # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
| 19 | # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 20 | # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| 21 | # ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE |
| 22 | # LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
| 23 | # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
| 24 | # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
| 25 | # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
| 26 | # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| 27 | # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
| 28 | # POSSIBILITY OF SUCH DAMAGE. |
| 29 | # |
| 30 | |
| 31 | # On ARM standard platorms, the TSP can execute from Trusted SRAM, Trusted |
| 32 | # DRAM (if available) or the TZC secured area of DRAM. |
| 33 | # Trusted SRAM is the default. |
| 34 | |
| 35 | ARM_TSP_RAM_LOCATION := tsram |
| 36 | ifeq (${ARM_TSP_RAM_LOCATION}, tsram) |
| 37 | ARM_TSP_RAM_LOCATION_ID = ARM_TRUSTED_SRAM_ID |
| 38 | else ifeq (${ARM_TSP_RAM_LOCATION}, tdram) |
| 39 | ARM_TSP_RAM_LOCATION_ID = ARM_TRUSTED_DRAM_ID |
| 40 | else ifeq (${ARM_TSP_RAM_LOCATION}, dram) |
| 41 | ARM_TSP_RAM_LOCATION_ID = ARM_DRAM_ID |
| 42 | else |
| 43 | $(error "Unsupported ARM_TSP_RAM_LOCATION value") |
| 44 | endif |
| 45 | |
| 46 | # Process flags |
| 47 | $(eval $(call add_define,ARM_TSP_RAM_LOCATION_ID)) |
| 48 | |
Soby Mathew | 7799cf7 | 2015-04-16 14:49:09 +0100 | [diff] [blame] | 49 | # For the original power-state parameter format, the State-ID can be encoded |
| 50 | # according to the recommended encoding or zero. This flag determines which |
| 51 | # State-ID encoding to be parsed. |
| 52 | ARM_RECOM_STATE_ID_ENC := 0 |
| 53 | |
| 54 | # If the PSCI_EXTENDED_STATE_ID is set, then the recommended state ID need to |
| 55 | # be used. Else throw a build error. |
| 56 | ifeq (${PSCI_EXTENDED_STATE_ID}, 1) |
| 57 | ifeq (${ARM_RECOM_STATE_ID_ENC}, 0) |
| 58 | $(error "Incompatible STATE_ID build option specified") |
| 59 | endif |
| 60 | endif |
| 61 | |
| 62 | # Process ARM_RECOM_STATE_ID_ENC flag |
| 63 | $(eval $(call assert_boolean,ARM_RECOM_STATE_ID_ENC)) |
| 64 | $(eval $(call add_define,ARM_RECOM_STATE_ID_ENC)) |
| 65 | |
Juan Castillo | b6132f1 | 2015-10-06 14:01:35 +0100 | [diff] [blame] | 66 | # Process ARM_DISABLE_TRUSTED_WDOG flag |
| 67 | # By default, Trusted Watchdog is always enabled unless SPIN_ON_BL1_EXIT is set |
| 68 | ARM_DISABLE_TRUSTED_WDOG := 0 |
| 69 | ifeq (${SPIN_ON_BL1_EXIT}, 1) |
| 70 | ARM_DISABLE_TRUSTED_WDOG := 1 |
| 71 | endif |
| 72 | $(eval $(call assert_boolean,ARM_DISABLE_TRUSTED_WDOG)) |
| 73 | $(eval $(call add_define,ARM_DISABLE_TRUSTED_WDOG)) |
| 74 | |
Juan Castillo | aadf19a | 2015-11-06 16:02:32 +0000 | [diff] [blame] | 75 | # Process ARM_CONFIG_CNTACR |
| 76 | ARM_CONFIG_CNTACR := 1 |
| 77 | $(eval $(call assert_boolean,ARM_CONFIG_CNTACR)) |
| 78 | $(eval $(call add_define,ARM_CONFIG_CNTACR)) |
| 79 | |
David Wang | 0ba499f | 2016-03-07 11:02:57 +0800 | [diff] [blame] | 80 | # Process ARM_BL31_IN_DRAM flag |
| 81 | ARM_BL31_IN_DRAM := 0 |
| 82 | $(eval $(call assert_boolean,ARM_BL31_IN_DRAM)) |
| 83 | $(eval $(call add_define,ARM_BL31_IN_DRAM)) |
| 84 | |
Juan Castillo | 9b265a8 | 2015-05-07 14:52:44 +0100 | [diff] [blame] | 85 | PLAT_INCLUDES += -Iinclude/common/tbbr \ |
| 86 | -Iinclude/plat/arm/common \ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 87 | -Iinclude/plat/arm/common/aarch64 |
| 88 | |
| 89 | |
Soby Mathew | cc037c1 | 2016-04-08 16:42:58 +0100 | [diff] [blame] | 90 | PLAT_BL_COMMON_SOURCES += lib/xlat_tables/xlat_tables_common.c \ |
| 91 | lib/xlat_tables/aarch64/xlat_tables.c \ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 92 | plat/arm/common/aarch64/arm_common.c \ |
| 93 | plat/arm/common/aarch64/arm_helpers.S \ |
| 94 | plat/common/aarch64/plat_common.c |
| 95 | |
Vikram Kanigiri | fbb1301 | 2016-02-15 11:54:14 +0000 | [diff] [blame] | 96 | BL1_SOURCES += drivers/arm/sp805/sp805.c \ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 97 | drivers/io/io_fip.c \ |
| 98 | drivers/io/io_memmap.c \ |
| 99 | drivers/io/io_storage.c \ |
| 100 | plat/arm/common/arm_bl1_setup.c \ |
| 101 | plat/arm/common/arm_io_storage.c \ |
| 102 | plat/common/aarch64/platform_up_stack.S |
Sandrine Bailleux | 03897bb | 2015-11-26 16:31:34 +0000 | [diff] [blame] | 103 | ifdef EL3_PAYLOAD_BASE |
| 104 | # Need the arm_program_trusted_mailbox() function to release secondary CPUs from |
| 105 | # their holding pen |
| 106 | BL1_SOURCES += plat/arm/common/arm_pm.c |
| 107 | endif |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 108 | |
Vikram Kanigiri | 70752bb | 2016-02-10 14:50:53 +0000 | [diff] [blame] | 109 | BL2_SOURCES += drivers/io/io_fip.c \ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 110 | drivers/io/io_memmap.c \ |
| 111 | drivers/io/io_storage.c \ |
| 112 | plat/arm/common/arm_bl2_setup.c \ |
| 113 | plat/arm/common/arm_io_storage.c \ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 114 | plat/common/aarch64/platform_up_stack.S |
| 115 | |
Vikram Kanigiri | 70752bb | 2016-02-10 14:50:53 +0000 | [diff] [blame] | 116 | BL2U_SOURCES += plat/arm/common/arm_bl2u_setup.c \ |
Yatharth Kochar | 3a11eda | 2015-10-14 15:28:11 +0100 | [diff] [blame] | 117 | plat/common/aarch64/platform_up_stack.S |
| 118 | |
Vikram Kanigiri | fbb1301 | 2016-02-15 11:54:14 +0000 | [diff] [blame] | 119 | BL31_SOURCES += plat/arm/common/arm_bl31_setup.c \ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 120 | plat/arm/common/arm_pm.c \ |
Dan Handley | 9df4804 | 2015-03-19 18:58:55 +0000 | [diff] [blame] | 121 | plat/arm/common/arm_topology.c \ |
Soby Mathew | fec4eb7 | 2015-07-01 16:16:20 +0100 | [diff] [blame] | 122 | plat/common/aarch64/platform_mp_stack.S \ |
| 123 | plat/common/aarch64/plat_psci_common.c |
Juan Castillo | a08a5e7 | 2015-05-19 11:54:12 +0100 | [diff] [blame] | 124 | |
| 125 | ifneq (${TRUSTED_BOARD_BOOT},0) |
| 126 | |
| 127 | # By default, ARM platforms use RSA keys |
| 128 | KEY_ALG := rsa |
| 129 | |
| 130 | # Include common TBB sources |
| 131 | AUTH_SOURCES := drivers/auth/auth_mod.c \ |
Achin Gupta | 1fa7eb6 | 2015-11-03 14:18:34 +0000 | [diff] [blame] | 132 | drivers/auth/crypto_mod.c \ |
| 133 | drivers/auth/img_parser_mod.c \ |
| 134 | drivers/auth/tbbr/tbbr_cot.c \ |
Juan Castillo | a08a5e7 | 2015-05-19 11:54:12 +0100 | [diff] [blame] | 135 | |
Yatharth Kochar | 736a3bf | 2015-10-11 14:14:55 +0100 | [diff] [blame] | 136 | PLAT_INCLUDES += -Iinclude/bl1/tbbr |
| 137 | |
Yatharth Kochar | f11b29a | 2016-02-01 11:04:46 +0000 | [diff] [blame] | 138 | BL1_SOURCES += ${AUTH_SOURCES} \ |
| 139 | bl1/tbbr/tbbr_img_desc.c \ |
Yatharth Kochar | 736a3bf | 2015-10-11 14:14:55 +0100 | [diff] [blame] | 140 | plat/arm/common/arm_bl1_fwu.c |
| 141 | |
Juan Castillo | a08a5e7 | 2015-05-19 11:54:12 +0100 | [diff] [blame] | 142 | BL2_SOURCES += ${AUTH_SOURCES} |
| 143 | |
Juan Castillo | 8e04dec | 2016-01-05 11:55:36 +0000 | [diff] [blame] | 144 | $(eval $(call FWU_FIP_ADD_IMG,NS_BL2U,--fwu)) |
Yatharth Kochar | d1a9343 | 2015-10-12 12:33:47 +0100 | [diff] [blame] | 145 | |
Juan Castillo | a08a5e7 | 2015-05-19 11:54:12 +0100 | [diff] [blame] | 146 | MBEDTLS_KEY_ALG := ${KEY_ALG} |
| 147 | |
| 148 | # We expect to locate the *.mk files under the directories specified below |
| 149 | CRYPTO_LIB_MK := drivers/auth/mbedtls/mbedtls_crypto.mk |
| 150 | IMG_PARSER_LIB_MK := drivers/auth/mbedtls/mbedtls_x509.mk |
| 151 | |
| 152 | $(info Including ${CRYPTO_LIB_MK}) |
| 153 | include ${CRYPTO_LIB_MK} |
| 154 | |
| 155 | $(info Including ${IMG_PARSER_LIB_MK}) |
| 156 | include ${IMG_PARSER_LIB_MK} |
| 157 | |
| 158 | endif |