blob: 17acae52f74cf72d0aebf9526994c608bf88d696 [file] [log] [blame]
Dan Handleyb4315302015-03-19 18:58:55 +00001#
dp-arm04c1db12017-01-31 13:01:04 +00002# Copyright (c) 2015-2017, ARM Limited and Contributors. All rights reserved.
Dan Handleyb4315302015-03-19 18:58:55 +00003#
dp-arm82cb2c12017-05-03 09:38:09 +01004# SPDX-License-Identifier: BSD-3-Clause
Dan Handleyb4315302015-03-19 18:58:55 +00005#
6
Soby Mathew877cf3f2016-07-11 14:13:56 +01007ifeq (${ARCH}, aarch64)
8 # On ARM standard platorms, the TSP can execute from Trusted SRAM, Trusted
9 # DRAM (if available) or the TZC secured area of DRAM.
10 # Trusted SRAM is the default.
Dan Handleyb4315302015-03-19 18:58:55 +000011
Qixiang Xu7ca267b2017-10-13 09:04:12 +080012 ifneq (${TRUSTED_BOARD_BOOT},0)
13 ARM_TSP_RAM_LOCATION ?= dram
14 else
15 ARM_TSP_RAM_LOCATION ?= tsram
16 endif
17
Soby Mathew877cf3f2016-07-11 14:13:56 +010018 ifeq (${ARM_TSP_RAM_LOCATION}, tsram)
19 ARM_TSP_RAM_LOCATION_ID = ARM_TRUSTED_SRAM_ID
20 else ifeq (${ARM_TSP_RAM_LOCATION}, tdram)
21 ARM_TSP_RAM_LOCATION_ID = ARM_TRUSTED_DRAM_ID
22 else ifeq (${ARM_TSP_RAM_LOCATION}, dram)
23 ARM_TSP_RAM_LOCATION_ID = ARM_DRAM_ID
24 else
25 $(error "Unsupported ARM_TSP_RAM_LOCATION value")
26 endif
27
28 # Process flags
Soby Mathew877cf3f2016-07-11 14:13:56 +010029 # Process ARM_BL31_IN_DRAM flag
30 ARM_BL31_IN_DRAM := 0
31 $(eval $(call assert_boolean,ARM_BL31_IN_DRAM))
32 $(eval $(call add_define,ARM_BL31_IN_DRAM))
Roberto Vargasd58f3ca2017-10-20 10:46:23 +010033else
34 ARM_TSP_RAM_LOCATION_ID = ARM_TRUSTED_SRAM_ID
Dan Handleyb4315302015-03-19 18:58:55 +000035endif
36
Roberto Vargasd58f3ca2017-10-20 10:46:23 +010037$(eval $(call add_define,ARM_TSP_RAM_LOCATION_ID))
38
39
Soby Mathew2204afd2015-04-16 14:49:09 +010040# For the original power-state parameter format, the State-ID can be encoded
41# according to the recommended encoding or zero. This flag determines which
42# State-ID encoding to be parsed.
43ARM_RECOM_STATE_ID_ENC := 0
44
Douglas Raillard91a422d2016-11-07 17:29:34 +000045# If the PSCI_EXTENDED_STATE_ID is set, then ARM_RECOM_STATE_ID_ENC need to
46# be set. Else throw a build error.
Soby Mathew2204afd2015-04-16 14:49:09 +010047ifeq (${PSCI_EXTENDED_STATE_ID}, 1)
48 ifeq (${ARM_RECOM_STATE_ID_ENC}, 0)
Douglas Raillard91a422d2016-11-07 17:29:34 +000049 $(error Build option ARM_RECOM_STATE_ID_ENC needs to be set if \
50 PSCI_EXTENDED_STATE_ID is set for ARM platforms)
Soby Mathew2204afd2015-04-16 14:49:09 +010051 endif
52endif
53
54# Process ARM_RECOM_STATE_ID_ENC flag
55$(eval $(call assert_boolean,ARM_RECOM_STATE_ID_ENC))
56$(eval $(call add_define,ARM_RECOM_STATE_ID_ENC))
57
Juan Castillo7b4c1402015-10-06 14:01:35 +010058# Process ARM_DISABLE_TRUSTED_WDOG flag
59# By default, Trusted Watchdog is always enabled unless SPIN_ON_BL1_EXIT is set
60ARM_DISABLE_TRUSTED_WDOG := 0
61ifeq (${SPIN_ON_BL1_EXIT}, 1)
62ARM_DISABLE_TRUSTED_WDOG := 1
63endif
64$(eval $(call assert_boolean,ARM_DISABLE_TRUSTED_WDOG))
65$(eval $(call add_define,ARM_DISABLE_TRUSTED_WDOG))
66
Juan Castillo0e5dcdd2015-11-06 16:02:32 +000067# Process ARM_CONFIG_CNTACR
68ARM_CONFIG_CNTACR := 1
69$(eval $(call assert_boolean,ARM_CONFIG_CNTACR))
70$(eval $(call add_define,ARM_CONFIG_CNTACR))
71
David Wang4518dd92016-03-07 11:02:57 +080072# Process ARM_BL31_IN_DRAM flag
73ARM_BL31_IN_DRAM := 0
74$(eval $(call assert_boolean,ARM_BL31_IN_DRAM))
75$(eval $(call add_define,ARM_BL31_IN_DRAM))
76
Summer Qind8d6cf22017-02-28 16:46:17 +000077# Process ARM_PLAT_MT flag
78ARM_PLAT_MT := 0
79$(eval $(call assert_boolean,ARM_PLAT_MT))
80$(eval $(call add_define,ARM_PLAT_MT))
81
Antonio Nino Diaz3b211ff2017-04-11 14:04:56 +010082# Use translation tables library v2 by default
83ARM_XLAT_TABLES_LIB_V1 := 0
84$(eval $(call assert_boolean,ARM_XLAT_TABLES_LIB_V1))
85$(eval $(call add_define,ARM_XLAT_TABLES_LIB_V1))
86
Antonio Nino Diazd77b98c2017-05-24 14:11:07 +010087# Use an implementation of SHA-256 with a smaller memory footprint but reduced
88# speed.
89$(eval $(call add_define,MBEDTLS_SHA256_SMALLER))
90
Summer Qin71fb3962017-04-20 16:28:39 +010091# Add the build options to pack Trusted OS Extra1 and Trusted OS Extra2 images
92# in the FIP if the platform requires.
93ifneq ($(BL32_EXTRA1),)
94$(eval $(call FIP_ADD_IMG,BL32_EXTRA1,--tos-fw-extra1))
95endif
96ifneq ($(BL32_EXTRA2),)
97$(eval $(call FIP_ADD_IMG,BL32_EXTRA2,--tos-fw-extra2))
98endif
99
Soby Mathewd75f2572016-05-23 16:07:53 +0100100# Enable PSCI_STAT_COUNT/RESIDENCY APIs on ARM platforms
Soby Mathew877cf3f2016-07-11 14:13:56 +0100101ENABLE_PSCI_STAT := 1
dp-arm04c1db12017-01-31 13:01:04 +0000102ENABLE_PMF := 1
Soby Mathewd75f2572016-05-23 16:07:53 +0100103
Sandrine Bailleux0af559a2016-07-08 14:38:16 +0100104# On ARM platforms, separate the code and read-only data sections to allow
105# mapping the former as executable and the latter as execute-never.
106SEPARATE_CODE_AND_RODATA := 1
107
Yatharth Kochar53d703a2016-11-11 13:57:50 +0000108# Enable new version of image loading on ARM platforms
109LOAD_IMAGE_V2 := 1
Sandrine Bailleux0af559a2016-07-08 14:38:16 +0100110
Masahiro Yamada232c6b32017-05-23 19:41:36 +0900111# Use generic OID definition (tbbr_oid.h)
112USE_TBBR_DEFS := 1
113
Soby Mathewe60f2af2017-05-10 11:50:30 +0100114# Disable ARM Cryptocell by default
115ARM_CRYPTOCELL_INTEG := 0
116$(eval $(call assert_boolean,ARM_CRYPTOCELL_INTEG))
117$(eval $(call add_define,ARM_CRYPTOCELL_INTEG))
118
Juan Castillodff93c82015-05-07 14:52:44 +0100119PLAT_INCLUDES += -Iinclude/common/tbbr \
Soby Mathew877cf3f2016-07-11 14:13:56 +0100120 -Iinclude/plat/arm/common
Dan Handleyb4315302015-03-19 18:58:55 +0000121
Soby Mathew877cf3f2016-07-11 14:13:56 +0100122ifeq (${ARCH}, aarch64)
123PLAT_INCLUDES += -Iinclude/plat/arm/common/aarch64
124endif
Dan Handleyb4315302015-03-19 18:58:55 +0000125
Antonio Nino Diaz3b211ff2017-04-11 14:04:56 +0100126PLAT_BL_COMMON_SOURCES += plat/arm/common/${ARCH}/arm_helpers.S \
127 plat/arm/common/arm_common.c
128
129ifeq (${ARM_XLAT_TABLES_LIB_V1}, 1)
130PLAT_BL_COMMON_SOURCES += lib/xlat_tables/xlat_tables_common.c \
131 lib/xlat_tables/${ARCH}/xlat_tables.c
132else
Antonio Nino Diazbf75a372017-02-23 17:22:58 +0000133include lib/xlat_tables_v2/xlat_tables.mk
134
Antonio Nino Diaz3b211ff2017-04-11 14:04:56 +0100135PLAT_BL_COMMON_SOURCES += ${XLAT_TABLES_LIB_SRCS}
136endif
Dan Handleyb4315302015-03-19 18:58:55 +0000137
Vikram Kanigiri6355f232016-02-15 11:54:14 +0000138BL1_SOURCES += drivers/arm/sp805/sp805.c \
Dan Handleyb4315302015-03-19 18:58:55 +0000139 drivers/io/io_fip.c \
140 drivers/io/io_memmap.c \
141 drivers/io/io_storage.c \
142 plat/arm/common/arm_bl1_setup.c \
dp-arm75311202017-03-07 11:02:47 +0000143 plat/arm/common/arm_io_storage.c
Sandrine Bailleux4c117f62015-11-26 16:31:34 +0000144ifdef EL3_PAYLOAD_BASE
145# Need the arm_program_trusted_mailbox() function to release secondary CPUs from
146# their holding pen
147BL1_SOURCES += plat/arm/common/arm_pm.c
148endif
Dan Handleyb4315302015-03-19 18:58:55 +0000149
Soby Mathew18e279e2017-06-12 12:37:10 +0100150BL2_SOURCES += drivers/delay_timer/delay_timer.c \
151 drivers/delay_timer/generic_delay_timer.c \
152 drivers/io/io_fip.c \
Dan Handleyb4315302015-03-19 18:58:55 +0000153 drivers/io/io_memmap.c \
154 drivers/io/io_storage.c \
155 plat/arm/common/arm_bl2_setup.c \
dp-arm75311202017-03-07 11:02:47 +0000156 plat/arm/common/arm_io_storage.c
Yatharth Kochara8aa7fe2016-09-13 17:07:57 +0100157ifeq (${LOAD_IMAGE_V2},1)
Yatharth Kochar07570d52016-11-14 12:01:04 +0000158# Because BL1/BL2 execute in AArch64 mode but BL32 in AArch32 we need to use
159# the AArch32 descriptors.
160ifeq (${JUNO_AARCH32_EL3_RUNTIME},1)
161BL2_SOURCES += plat/arm/common/aarch32/arm_bl2_mem_params_desc.c
162else
163BL2_SOURCES += plat/arm/common/${ARCH}/arm_bl2_mem_params_desc.c
164endif
165BL2_SOURCES += plat/arm/common/arm_image_load.c \
Yatharth Kochara8aa7fe2016-09-13 17:07:57 +0100166 common/desc_image_load.c
Summer Qin54661cd2017-04-24 16:49:28 +0100167ifeq (${SPD},opteed)
168BL2_SOURCES += lib/optee/optee_utils.c
169endif
Yatharth Kochara8aa7fe2016-09-13 17:07:57 +0100170endif
Dan Handleyb4315302015-03-19 18:58:55 +0000171
Soby Mathew18e279e2017-06-12 12:37:10 +0100172BL2U_SOURCES += drivers/delay_timer/delay_timer.c \
173 drivers/delay_timer/generic_delay_timer.c \
174 plat/arm/common/arm_bl2u_setup.c
Yatharth Kochardcda29f2015-10-14 15:28:11 +0100175
Vikram Kanigiri6355f232016-02-15 11:54:14 +0000176BL31_SOURCES += plat/arm/common/arm_bl31_setup.c \
Dan Handleyb4315302015-03-19 18:58:55 +0000177 plat/arm/common/arm_pm.c \
Dan Handleyb4315302015-03-19 18:58:55 +0000178 plat/arm/common/arm_topology.c \
Jeenu Viswambharanb10d4492017-02-16 14:55:15 +0000179 plat/arm/common/execution_state_switch.c \
Soby Mathewbb2162f2016-05-03 12:31:18 +0100180 plat/common/plat_psci_common.c
Juan Castillo1779ba62015-05-19 11:54:12 +0100181
dp-armf10796a2016-09-19 11:21:03 +0100182ifeq (${ENABLE_PMF}, 1)
183BL31_SOURCES += plat/arm/common/arm_sip_svc.c \
184 lib/pmf/pmf_smc.c
185endif
186
Jeenu Viswambharan0bef0ed2017-10-24 11:47:13 +0100187ifeq (${EL3_EXCEPTION_HANDLING},1)
188BL31_SOURCES += plat/arm/common/aarch64/arm_ehf.c
189endif
190
Jeenu Viswambharan0baec2a2017-09-22 08:32:10 +0100191ifeq (${SDEI_SUPPORT},1)
192BL31_SOURCES += plat/arm/common/aarch64/arm_sdei.c
193endif
194
Juan Castillo1779ba62015-05-19 11:54:12 +0100195ifneq (${TRUSTED_BOARD_BOOT},0)
196
Juan Castillo1779ba62015-05-19 11:54:12 +0100197 # Include common TBB sources
198 AUTH_SOURCES := drivers/auth/auth_mod.c \
Achin Gupta27573c52015-11-03 14:18:34 +0000199 drivers/auth/crypto_mod.c \
200 drivers/auth/img_parser_mod.c \
201 drivers/auth/tbbr/tbbr_cot.c \
Juan Castillo1779ba62015-05-19 11:54:12 +0100202
Yatharth Kochar436223d2015-10-11 14:14:55 +0100203 PLAT_INCLUDES += -Iinclude/bl1/tbbr
204
Yatharth Kochar843ddee2016-02-01 11:04:46 +0000205 BL1_SOURCES += ${AUTH_SOURCES} \
206 bl1/tbbr/tbbr_img_desc.c \
dp-armd35dee22016-12-12 14:48:13 +0000207 plat/arm/common/arm_bl1_fwu.c \
208 plat/common/tbbr/plat_tbbr.c
Yatharth Kochar436223d2015-10-11 14:14:55 +0100209
dp-armd35dee22016-12-12 14:48:13 +0000210 BL2_SOURCES += ${AUTH_SOURCES} \
211 plat/common/tbbr/plat_tbbr.c
Juan Castillo1779ba62015-05-19 11:54:12 +0100212
Juan Castillo8f0617e2016-01-05 11:55:36 +0000213 $(eval $(call FWU_FIP_ADD_IMG,NS_BL2U,--fwu))
Yatharth Kochar01912622015-10-12 12:33:47 +0100214
Juan Castillo1779ba62015-05-19 11:54:12 +0100215 # We expect to locate the *.mk files under the directories specified below
Soby Mathewe60f2af2017-05-10 11:50:30 +0100216ifeq (${ARM_CRYPTOCELL_INTEG},0)
Juan Castillo1779ba62015-05-19 11:54:12 +0100217 CRYPTO_LIB_MK := drivers/auth/mbedtls/mbedtls_crypto.mk
Soby Mathewe60f2af2017-05-10 11:50:30 +0100218else
219 CRYPTO_LIB_MK := drivers/auth/cryptocell/cryptocell_crypto.mk
220endif
Juan Castillo1779ba62015-05-19 11:54:12 +0100221 IMG_PARSER_LIB_MK := drivers/auth/mbedtls/mbedtls_x509.mk
222
223 $(info Including ${CRYPTO_LIB_MK})
224 include ${CRYPTO_LIB_MK}
225
226 $(info Including ${IMG_PARSER_LIB_MK})
227 include ${IMG_PARSER_LIB_MK}
228
229endif