xref: /arm-trusted-firmware/plat/arm/common/arm_common.mk (revision 91f16700b400a8c0651d24a598fc48ee2997a0d7)
1*91f16700Schasinglulu#
2*91f16700Schasinglulu# Copyright (c) 2015-2023, Arm Limited and Contributors. All rights reserved.
3*91f16700Schasinglulu#
4*91f16700Schasinglulu# SPDX-License-Identifier: BSD-3-Clause
5*91f16700Schasinglulu#
6*91f16700Schasinglulu
7*91f16700Schasingluluinclude common/fdt_wrappers.mk
8*91f16700Schasinglulu
9*91f16700Schasingluluifeq (${ARCH},aarch32)
10*91f16700Schasinglulu    ifeq (${AARCH32_SP},none)
11*91f16700Schasinglulu        $(error Variable AARCH32_SP has to be set for AArch32)
12*91f16700Schasinglulu    endif
13*91f16700Schasingluluendif
14*91f16700Schasinglulu
15*91f16700Schasingluluifeq (${ARCH}, aarch64)
16*91f16700Schasinglulu  # On ARM standard platorms, the TSP can execute from Trusted SRAM, Trusted
17*91f16700Schasinglulu  # DRAM (if available) or the TZC secured area of DRAM.
18*91f16700Schasinglulu  # TZC secured DRAM is the default.
19*91f16700Schasinglulu
20*91f16700Schasinglulu  ARM_TSP_RAM_LOCATION	?=	dram
21*91f16700Schasinglulu
22*91f16700Schasinglulu  ifeq (${ARM_TSP_RAM_LOCATION}, tsram)
23*91f16700Schasinglulu    ARM_TSP_RAM_LOCATION_ID = ARM_TRUSTED_SRAM_ID
24*91f16700Schasinglulu  else ifeq (${ARM_TSP_RAM_LOCATION}, tdram)
25*91f16700Schasinglulu    ARM_TSP_RAM_LOCATION_ID = ARM_TRUSTED_DRAM_ID
26*91f16700Schasinglulu  else ifeq (${ARM_TSP_RAM_LOCATION}, dram)
27*91f16700Schasinglulu    ARM_TSP_RAM_LOCATION_ID = ARM_DRAM_ID
28*91f16700Schasinglulu  else
29*91f16700Schasinglulu    $(error "Unsupported ARM_TSP_RAM_LOCATION value")
30*91f16700Schasinglulu  endif
31*91f16700Schasinglulu
32*91f16700Schasinglulu  # Process flags
33*91f16700Schasinglulu  # Process ARM_BL31_IN_DRAM flag
34*91f16700Schasinglulu  ARM_BL31_IN_DRAM		:=	0
35*91f16700Schasinglulu  $(eval $(call assert_boolean,ARM_BL31_IN_DRAM))
36*91f16700Schasinglulu  $(eval $(call add_define,ARM_BL31_IN_DRAM))
37*91f16700Schasingluluelse
38*91f16700Schasinglulu  ARM_TSP_RAM_LOCATION_ID = ARM_TRUSTED_SRAM_ID
39*91f16700Schasingluluendif
40*91f16700Schasinglulu
41*91f16700Schasinglulu$(eval $(call add_define,ARM_TSP_RAM_LOCATION_ID))
42*91f16700Schasinglulu
43*91f16700Schasinglulu
44*91f16700Schasinglulu# For the original power-state parameter format, the State-ID can be encoded
45*91f16700Schasinglulu# according to the recommended encoding or zero. This flag determines which
46*91f16700Schasinglulu# State-ID encoding to be parsed.
47*91f16700SchasingluluARM_RECOM_STATE_ID_ENC := 0
48*91f16700Schasinglulu
49*91f16700Schasinglulu# If the PSCI_EXTENDED_STATE_ID is set, then ARM_RECOM_STATE_ID_ENC need to
50*91f16700Schasinglulu# be set. Else throw a build error.
51*91f16700Schasingluluifeq (${PSCI_EXTENDED_STATE_ID}, 1)
52*91f16700Schasinglulu  ifeq (${ARM_RECOM_STATE_ID_ENC}, 0)
53*91f16700Schasinglulu    $(error Build option ARM_RECOM_STATE_ID_ENC needs to be set if \
54*91f16700Schasinglulu            PSCI_EXTENDED_STATE_ID is set for ARM platforms)
55*91f16700Schasinglulu  endif
56*91f16700Schasingluluendif
57*91f16700Schasinglulu
58*91f16700Schasinglulu# Process ARM_RECOM_STATE_ID_ENC flag
59*91f16700Schasinglulu$(eval $(call assert_boolean,ARM_RECOM_STATE_ID_ENC))
60*91f16700Schasinglulu$(eval $(call add_define,ARM_RECOM_STATE_ID_ENC))
61*91f16700Schasinglulu
62*91f16700Schasinglulu# Process ARM_DISABLE_TRUSTED_WDOG flag
63*91f16700Schasinglulu# By default, Trusted Watchdog is always enabled unless
64*91f16700Schasinglulu# SPIN_ON_BL1_EXIT or ENABLE_RME is set
65*91f16700SchasingluluARM_DISABLE_TRUSTED_WDOG	:=	0
66*91f16700Schasingluluifneq ($(filter 1,${SPIN_ON_BL1_EXIT} ${ENABLE_RME}),)
67*91f16700SchasingluluARM_DISABLE_TRUSTED_WDOG	:=	1
68*91f16700Schasingluluendif
69*91f16700Schasinglulu$(eval $(call assert_boolean,ARM_DISABLE_TRUSTED_WDOG))
70*91f16700Schasinglulu$(eval $(call add_define,ARM_DISABLE_TRUSTED_WDOG))
71*91f16700Schasinglulu
72*91f16700Schasinglulu# Process ARM_CONFIG_CNTACR
73*91f16700SchasingluluARM_CONFIG_CNTACR		:=	1
74*91f16700Schasinglulu$(eval $(call assert_boolean,ARM_CONFIG_CNTACR))
75*91f16700Schasinglulu$(eval $(call add_define,ARM_CONFIG_CNTACR))
76*91f16700Schasinglulu
77*91f16700Schasinglulu# Process ARM_BL31_IN_DRAM flag
78*91f16700SchasingluluARM_BL31_IN_DRAM		:=	0
79*91f16700Schasinglulu$(eval $(call assert_boolean,ARM_BL31_IN_DRAM))
80*91f16700Schasinglulu$(eval $(call add_define,ARM_BL31_IN_DRAM))
81*91f16700Schasinglulu
82*91f16700Schasinglulu# As per CCA security model, all root firmware must execute from on-chip secure
83*91f16700Schasinglulu# memory. This means we must not run BL31 from TZC-protected DRAM.
84*91f16700Schasingluluifeq (${ARM_BL31_IN_DRAM},1)
85*91f16700Schasinglulu  ifeq (${ENABLE_RME},1)
86*91f16700Schasinglulu    $(error "BL31 must not run from DRAM on RME-systems. Please set ARM_BL31_IN_DRAM to 0")
87*91f16700Schasinglulu  endif
88*91f16700Schasingluluendif
89*91f16700Schasinglulu
90*91f16700Schasinglulu# Process ARM_PLAT_MT flag
91*91f16700SchasingluluARM_PLAT_MT			:=	0
92*91f16700Schasinglulu$(eval $(call assert_boolean,ARM_PLAT_MT))
93*91f16700Schasinglulu$(eval $(call add_define,ARM_PLAT_MT))
94*91f16700Schasinglulu
95*91f16700Schasinglulu# Use translation tables library v2 by default
96*91f16700SchasingluluARM_XLAT_TABLES_LIB_V1		:=	0
97*91f16700Schasinglulu$(eval $(call assert_boolean,ARM_XLAT_TABLES_LIB_V1))
98*91f16700Schasinglulu$(eval $(call add_define,ARM_XLAT_TABLES_LIB_V1))
99*91f16700Schasinglulu
100*91f16700Schasinglulu# Don't have the Linux kernel as a BL33 image by default
101*91f16700SchasingluluARM_LINUX_KERNEL_AS_BL33	:=	0
102*91f16700Schasinglulu$(eval $(call assert_boolean,ARM_LINUX_KERNEL_AS_BL33))
103*91f16700Schasinglulu$(eval $(call add_define,ARM_LINUX_KERNEL_AS_BL33))
104*91f16700Schasinglulu
105*91f16700Schasingluluifeq (${ARM_LINUX_KERNEL_AS_BL33},1)
106*91f16700Schasinglulu  ifneq (${ARCH},aarch64)
107*91f16700Schasinglulu    ifneq (${RESET_TO_SP_MIN},1)
108*91f16700Schasinglulu      $(error "ARM_LINUX_KERNEL_AS_BL33 is only available if RESET_TO_SP_MIN=1.")
109*91f16700Schasinglulu    endif
110*91f16700Schasinglulu  endif
111*91f16700Schasinglulu  ifndef PRELOADED_BL33_BASE
112*91f16700Schasinglulu    $(error "PRELOADED_BL33_BASE must be set if ARM_LINUX_KERNEL_AS_BL33 is used.")
113*91f16700Schasinglulu  endif
114*91f16700Schasinglulu  ifeq (${RESET_TO_BL31},1)
115*91f16700Schasinglulu    ifndef ARM_PRELOADED_DTB_BASE
116*91f16700Schasinglulu      $(error "ARM_PRELOADED_DTB_BASE must be set if ARM_LINUX_KERNEL_AS_BL33 is
117*91f16700Schasinglulu       used with RESET_TO_BL31.")
118*91f16700Schasinglulu    endif
119*91f16700Schasinglulu    $(eval $(call add_define,ARM_PRELOADED_DTB_BASE))
120*91f16700Schasinglulu  endif
121*91f16700Schasingluluendif
122*91f16700Schasinglulu
123*91f16700Schasinglulu# Use an implementation of SHA-256 with a smaller memory footprint but reduced
124*91f16700Schasinglulu# speed.
125*91f16700Schasinglulu$(eval $(call add_define,MBEDTLS_SHA256_SMALLER))
126*91f16700Schasinglulu
127*91f16700Schasinglulu# Add the build options to pack Trusted OS Extra1 and Trusted OS Extra2 images
128*91f16700Schasinglulu# in the FIP if the platform requires.
129*91f16700Schasingluluifneq ($(BL32_EXTRA1),)
130*91f16700Schasinglulu$(eval $(call TOOL_ADD_IMG,bl32_extra1,--tos-fw-extra1))
131*91f16700Schasingluluendif
132*91f16700Schasingluluifneq ($(BL32_EXTRA2),)
133*91f16700Schasinglulu$(eval $(call TOOL_ADD_IMG,bl32_extra2,--tos-fw-extra2))
134*91f16700Schasingluluendif
135*91f16700Schasinglulu
136*91f16700Schasinglulu# Enable PSCI_STAT_COUNT/RESIDENCY APIs on ARM platforms
137*91f16700SchasingluluENABLE_PSCI_STAT		:=	1
138*91f16700SchasingluluENABLE_PMF			:=	1
139*91f16700Schasinglulu
140*91f16700Schasinglulu# Override the standard libc with optimised libc_asm
141*91f16700SchasingluluOVERRIDE_LIBC			:=	1
142*91f16700Schasingluluifeq (${OVERRIDE_LIBC},1)
143*91f16700Schasinglulu    include lib/libc/libc_asm.mk
144*91f16700Schasingluluendif
145*91f16700Schasinglulu
146*91f16700Schasinglulu# On ARM platforms, separate the code and read-only data sections to allow
147*91f16700Schasinglulu# mapping the former as executable and the latter as execute-never.
148*91f16700SchasingluluSEPARATE_CODE_AND_RODATA	:=	1
149*91f16700Schasinglulu
150*91f16700Schasinglulu# On ARM platforms, disable SEPARATE_NOBITS_REGION by default. Both PROGBITS
151*91f16700Schasinglulu# and NOBITS sections of BL31 image are adjacent to each other and loaded
152*91f16700Schasinglulu# into Trusted SRAM.
153*91f16700SchasingluluSEPARATE_NOBITS_REGION		:=	0
154*91f16700Schasinglulu
155*91f16700Schasinglulu# In order to support SEPARATE_NOBITS_REGION for Arm platforms, we need to load
156*91f16700Schasinglulu# BL31 PROGBITS into secure DRAM space and BL31 NOBITS into SRAM. Hence mandate
157*91f16700Schasinglulu# the build to require that ARM_BL31_IN_DRAM is enabled as well.
158*91f16700Schasingluluifeq ($(SEPARATE_NOBITS_REGION),1)
159*91f16700Schasinglulu    ifneq ($(ARM_BL31_IN_DRAM),1)
160*91f16700Schasinglulu         $(error For SEPARATE_NOBITS_REGION, ARM_BL31_IN_DRAM must be enabled)
161*91f16700Schasinglulu    endif
162*91f16700Schasinglulu    ifneq ($(RECLAIM_INIT_CODE),0)
163*91f16700Schasinglulu          $(error For SEPARATE_NOBITS_REGION, RECLAIM_INIT_CODE cannot be supported)
164*91f16700Schasinglulu    endif
165*91f16700Schasingluluendif
166*91f16700Schasinglulu
167*91f16700Schasinglulu# Enable PIE support for RESET_TO_BL31/RESET_TO_SP_MIN case
168*91f16700Schasingluluifneq ($(filter 1,${RESET_TO_BL31} ${RESET_TO_SP_MIN}),)
169*91f16700Schasinglulu	ENABLE_PIE			:=	1
170*91f16700Schasingluluendif
171*91f16700Schasinglulu
172*91f16700Schasinglulu# Disable GPT parser support, use FIP image by default
173*91f16700SchasingluluARM_GPT_SUPPORT			:=	0
174*91f16700Schasinglulu$(eval $(call assert_boolean,ARM_GPT_SUPPORT))
175*91f16700Schasinglulu$(eval $(call add_define,ARM_GPT_SUPPORT))
176*91f16700Schasinglulu
177*91f16700Schasinglulu# Include necessary sources to parse GPT image
178*91f16700Schasingluluifeq (${ARM_GPT_SUPPORT}, 1)
179*91f16700Schasinglulu  BL2_SOURCES	+=	drivers/partition/gpt.c		\
180*91f16700Schasinglulu			drivers/partition/partition.c
181*91f16700Schasingluluendif
182*91f16700Schasinglulu
183*91f16700Schasinglulu# Enable CRC instructions via extension for ARMv8-A CPUs.
184*91f16700Schasinglulu# For ARMv8.1-A, and onwards CRC instructions are default enabled.
185*91f16700Schasinglulu# Enable HW computed CRC support unconditionally in BL2 component.
186*91f16700Schasingluluifeq (${ARM_ARCH_MAJOR},8)
187*91f16700Schasinglulu    ifeq (${ARM_ARCH_MINOR},0)
188*91f16700Schasinglulu        BL2_CPPFLAGS += -march=armv8-a+crc
189*91f16700Schasinglulu    endif
190*91f16700Schasingluluendif
191*91f16700Schasinglulu
192*91f16700Schasingluluifeq ($(PSA_FWU_SUPPORT),1)
193*91f16700Schasinglulu    # GPT support is recommended as per PSA FWU specification hence
194*91f16700Schasinglulu    # PSA FWU implementation is tightly coupled with GPT support,
195*91f16700Schasinglulu    # and it does not support other formats.
196*91f16700Schasinglulu    ifneq ($(ARM_GPT_SUPPORT),1)
197*91f16700Schasinglulu      $(error For PSA_FWU_SUPPORT, ARM_GPT_SUPPORT must be enabled)
198*91f16700Schasinglulu    endif
199*91f16700Schasinglulu    FWU_MK := drivers/fwu/fwu.mk
200*91f16700Schasinglulu    $(info Including ${FWU_MK})
201*91f16700Schasinglulu    include ${FWU_MK}
202*91f16700Schasingluluendif
203*91f16700Schasinglulu
204*91f16700Schasingluluifeq (${ARCH}, aarch64)
205*91f16700SchasingluluPLAT_INCLUDES		+=	-Iinclude/plat/arm/common/aarch64
206*91f16700Schasingluluendif
207*91f16700Schasinglulu
208*91f16700SchasingluluPLAT_BL_COMMON_SOURCES	+=	plat/arm/common/${ARCH}/arm_helpers.S		\
209*91f16700Schasinglulu				plat/arm/common/arm_common.c			\
210*91f16700Schasinglulu				plat/arm/common/arm_console.c
211*91f16700Schasinglulu
212*91f16700Schasingluluifeq (${ARM_XLAT_TABLES_LIB_V1}, 1)
213*91f16700SchasingluluPLAT_BL_COMMON_SOURCES 	+=	lib/xlat_tables/xlat_tables_common.c	      \
214*91f16700Schasinglulu				lib/xlat_tables/${ARCH}/xlat_tables.c
215*91f16700Schasingluluelse
216*91f16700Schasingluluifeq (${XLAT_MPU_LIB_V1}, 1)
217*91f16700Schasingluluinclude lib/xlat_mpu/xlat_mpu.mk
218*91f16700SchasingluluPLAT_BL_COMMON_SOURCES	+=	${XLAT_MPU_LIB_V1_SRCS}
219*91f16700Schasingluluelse
220*91f16700Schasingluluinclude lib/xlat_tables_v2/xlat_tables.mk
221*91f16700SchasingluluPLAT_BL_COMMON_SOURCES	+=      ${XLAT_TABLES_LIB_SRCS}
222*91f16700Schasingluluendif
223*91f16700Schasingluluendif
224*91f16700Schasinglulu
225*91f16700SchasingluluARM_IO_SOURCES		+=	plat/arm/common/arm_io_storage.c		\
226*91f16700Schasinglulu				plat/arm/common/fconf/arm_fconf_io.c
227*91f16700Schasingluluifeq (${SPD},spmd)
228*91f16700Schasinglulu    ifeq (${BL2_ENABLE_SP_LOAD},1)
229*91f16700Schasinglulu         ARM_IO_SOURCES		+=	plat/arm/common/fconf/arm_fconf_sp.c
230*91f16700Schasinglulu    endif
231*91f16700Schasingluluendif
232*91f16700Schasinglulu
233*91f16700SchasingluluBL1_SOURCES		+=	drivers/io/io_fip.c				\
234*91f16700Schasinglulu				drivers/io/io_memmap.c				\
235*91f16700Schasinglulu				drivers/io/io_storage.c				\
236*91f16700Schasinglulu				plat/arm/common/arm_bl1_setup.c			\
237*91f16700Schasinglulu				plat/arm/common/arm_err.c			\
238*91f16700Schasinglulu				${ARM_IO_SOURCES}
239*91f16700Schasinglulu
240*91f16700Schasingluluifdef EL3_PAYLOAD_BASE
241*91f16700Schasinglulu# Need the plat_arm_program_trusted_mailbox() function to release secondary CPUs from
242*91f16700Schasinglulu# their holding pen
243*91f16700SchasingluluBL1_SOURCES		+=	plat/arm/common/arm_pm.c
244*91f16700Schasingluluendif
245*91f16700Schasinglulu
246*91f16700SchasingluluBL2_SOURCES		+=	drivers/delay_timer/delay_timer.c		\
247*91f16700Schasinglulu				drivers/delay_timer/generic_delay_timer.c	\
248*91f16700Schasinglulu				drivers/io/io_fip.c				\
249*91f16700Schasinglulu				drivers/io/io_memmap.c				\
250*91f16700Schasinglulu				drivers/io/io_storage.c				\
251*91f16700Schasinglulu				plat/arm/common/arm_bl2_setup.c			\
252*91f16700Schasinglulu				plat/arm/common/arm_err.c			\
253*91f16700Schasinglulu				common/tf_crc32.c				\
254*91f16700Schasinglulu				${ARM_IO_SOURCES}
255*91f16700Schasinglulu
256*91f16700Schasinglulu# Firmware Configuration Framework sources
257*91f16700Schasingluluinclude lib/fconf/fconf.mk
258*91f16700Schasinglulu
259*91f16700SchasingluluBL1_SOURCES		+=	${FCONF_SOURCES} ${FCONF_DYN_SOURCES}
260*91f16700SchasingluluBL2_SOURCES		+=	${FCONF_SOURCES} ${FCONF_DYN_SOURCES}
261*91f16700Schasinglulu
262*91f16700Schasinglulu# Add `libfdt` and Arm common helpers required for Dynamic Config
263*91f16700Schasingluluinclude lib/libfdt/libfdt.mk
264*91f16700Schasinglulu
265*91f16700SchasingluluDYN_CFG_SOURCES		+=	plat/arm/common/arm_dyn_cfg.c		\
266*91f16700Schasinglulu				plat/arm/common/arm_dyn_cfg_helpers.c	\
267*91f16700Schasinglulu				common/uuid.c
268*91f16700Schasinglulu
269*91f16700SchasingluluDYN_CFG_SOURCES		+=	${FDT_WRAPPERS_SOURCES}
270*91f16700Schasinglulu
271*91f16700SchasingluluBL1_SOURCES		+=	${DYN_CFG_SOURCES}
272*91f16700SchasingluluBL2_SOURCES		+=	${DYN_CFG_SOURCES}
273*91f16700Schasinglulu
274*91f16700Schasingluluifeq (${RESET_TO_BL2},1)
275*91f16700SchasingluluBL2_SOURCES		+=	plat/arm/common/arm_bl2_el3_setup.c
276*91f16700Schasingluluendif
277*91f16700Schasinglulu
278*91f16700Schasinglulu# Because BL1/BL2 execute in AArch64 mode but BL32 in AArch32 we need to use
279*91f16700Schasinglulu# the AArch32 descriptors.
280*91f16700Schasingluluifeq (${JUNO_AARCH32_EL3_RUNTIME},1)
281*91f16700SchasingluluBL2_SOURCES		+=	plat/arm/common/aarch32/arm_bl2_mem_params_desc.c
282*91f16700Schasingluluelse
283*91f16700Schasingluluifneq (${PLAT}, corstone1000)
284*91f16700SchasingluluBL2_SOURCES		+=	plat/arm/common/${ARCH}/arm_bl2_mem_params_desc.c
285*91f16700Schasingluluendif
286*91f16700Schasingluluendif
287*91f16700SchasingluluBL2_SOURCES		+=	plat/arm/common/arm_image_load.c		\
288*91f16700Schasinglulu				common/desc_image_load.c
289*91f16700Schasingluluifeq (${SPD},opteed)
290*91f16700SchasingluluBL2_SOURCES		+=	lib/optee/optee_utils.c
291*91f16700Schasingluluendif
292*91f16700Schasinglulu
293*91f16700SchasingluluBL2U_SOURCES		+=	drivers/delay_timer/delay_timer.c		\
294*91f16700Schasinglulu				drivers/delay_timer/generic_delay_timer.c	\
295*91f16700Schasinglulu				plat/arm/common/arm_bl2u_setup.c
296*91f16700Schasinglulu
297*91f16700SchasingluluBL31_SOURCES		+=	plat/arm/common/arm_bl31_setup.c		\
298*91f16700Schasinglulu				plat/arm/common/arm_pm.c			\
299*91f16700Schasinglulu				plat/arm/common/arm_topology.c			\
300*91f16700Schasinglulu				plat/common/plat_psci_common.c
301*91f16700Schasinglulu
302*91f16700Schasingluluifneq ($(filter 1,${ENABLE_PMF} ${ETHOSN_NPU_DRIVER}),)
303*91f16700SchasingluluARM_SVC_HANDLER_SRCS :=
304*91f16700Schasinglulu
305*91f16700Schasingluluifeq (${ENABLE_PMF},1)
306*91f16700SchasingluluARM_SVC_HANDLER_SRCS	+=	lib/pmf/pmf_smc.c
307*91f16700Schasingluluendif
308*91f16700Schasinglulu
309*91f16700Schasingluluifeq (${ETHOSN_NPU_DRIVER},1)
310*91f16700SchasingluluARM_SVC_HANDLER_SRCS	+=	plat/arm/common/fconf/fconf_ethosn_getter.c	\
311*91f16700Schasinglulu				drivers/delay_timer/delay_timer.c		\
312*91f16700Schasinglulu				drivers/arm/ethosn/ethosn_smc.c
313*91f16700Schasingluluifeq (${ETHOSN_NPU_TZMP1},1)
314*91f16700SchasingluluARM_SVC_HANDLER_SRCS	+=	drivers/arm/ethosn/ethosn_big_fw.c
315*91f16700Schasingluluendif
316*91f16700Schasingluluendif
317*91f16700Schasinglulu
318*91f16700Schasingluluifeq (${ARCH}, aarch64)
319*91f16700SchasingluluBL31_SOURCES		+=	plat/arm/common/aarch64/execution_state_switch.c\
320*91f16700Schasinglulu				plat/arm/common/arm_sip_svc.c			\
321*91f16700Schasinglulu				plat/arm/common/plat_arm_sip_svc.c		\
322*91f16700Schasinglulu				${ARM_SVC_HANDLER_SRCS}
323*91f16700Schasingluluelse
324*91f16700SchasingluluBL32_SOURCES		+=	plat/arm/common/arm_sip_svc.c			\
325*91f16700Schasinglulu				plat/arm/common/plat_arm_sip_svc.c		\
326*91f16700Schasinglulu				${ARM_SVC_HANDLER_SRCS}
327*91f16700Schasingluluendif
328*91f16700Schasingluluendif
329*91f16700Schasinglulu
330*91f16700Schasingluluifeq (${EL3_EXCEPTION_HANDLING},1)
331*91f16700SchasingluluBL31_SOURCES		+=	plat/common/aarch64/plat_ehf.c
332*91f16700Schasingluluendif
333*91f16700Schasinglulu
334*91f16700Schasingluluifeq (${SDEI_SUPPORT},1)
335*91f16700SchasingluluBL31_SOURCES		+=	plat/arm/common/aarch64/arm_sdei.c
336*91f16700Schasingluluifeq (${SDEI_IN_FCONF},1)
337*91f16700SchasingluluBL31_SOURCES		+=	plat/arm/common/fconf/fconf_sdei_getter.c
338*91f16700Schasingluluendif
339*91f16700Schasingluluendif
340*91f16700Schasinglulu
341*91f16700Schasinglulu# RAS sources
342*91f16700Schasingluluifeq (${ENABLE_FEAT_RAS}-${HANDLE_EA_EL3_FIRST_NS},1-1)
343*91f16700SchasingluluBL31_SOURCES		+=	lib/extensions/ras/std_err_record.c		\
344*91f16700Schasinglulu				lib/extensions/ras/ras_common.c
345*91f16700Schasingluluendif
346*91f16700Schasinglulu
347*91f16700Schasinglulu# Pointer Authentication sources
348*91f16700Schasingluluifeq (${ENABLE_PAUTH}, 1)
349*91f16700SchasingluluPLAT_BL_COMMON_SOURCES	+=	plat/arm/common/aarch64/arm_pauth.c
350*91f16700Schasingluluendif
351*91f16700Schasinglulu
352*91f16700Schasingluluifeq (${SPD},spmd)
353*91f16700SchasingluluBL31_SOURCES		+=	plat/common/plat_spmd_manifest.c	\
354*91f16700Schasinglulu				common/uuid.c				\
355*91f16700Schasinglulu				${LIBFDT_SRCS}
356*91f16700Schasinglulu
357*91f16700SchasingluluBL31_SOURCES		+=	${FDT_WRAPPERS_SOURCES}
358*91f16700Schasingluluendif
359*91f16700Schasinglulu
360*91f16700Schasingluluifeq (${DRTM_SUPPORT},1)
361*91f16700SchasingluluBL31_SOURCES            +=	plat/arm/common/arm_err.c
362*91f16700Schasingluluendif
363*91f16700Schasinglulu
364*91f16700Schasingluluifneq (${TRUSTED_BOARD_BOOT},0)
365*91f16700Schasinglulu
366*91f16700Schasinglulu    # Include common TBB sources
367*91f16700Schasinglulu    AUTH_SOURCES 	:= 	drivers/auth/auth_mod.c	\
368*91f16700Schasinglulu				drivers/auth/img_parser_mod.c
369*91f16700Schasinglulu
370*91f16700Schasinglulu    # Include the selected chain of trust sources.
371*91f16700Schasinglulu    ifeq (${COT},tbbr)
372*91f16700Schasinglulu            BL1_SOURCES	+=	drivers/auth/tbbr/tbbr_cot_common.c		\
373*91f16700Schasinglulu				drivers/auth/tbbr/tbbr_cot_bl1.c
374*91f16700Schasinglulu        ifneq (${COT_DESC_IN_DTB},0)
375*91f16700Schasinglulu            BL2_SOURCES	+=	lib/fconf/fconf_cot_getter.c
376*91f16700Schasinglulu        else
377*91f16700Schasinglulu            BL2_SOURCES	+=	drivers/auth/tbbr/tbbr_cot_common.c
378*91f16700Schasinglulu	    # Juno has its own TBBR CoT file for BL2
379*91f16700Schasinglulu            ifneq (${PLAT},juno)
380*91f16700Schasinglulu                BL2_SOURCES	+=	drivers/auth/tbbr/tbbr_cot_bl2.c
381*91f16700Schasinglulu            endif
382*91f16700Schasinglulu        endif
383*91f16700Schasinglulu    else ifeq (${COT},dualroot)
384*91f16700Schasinglulu        AUTH_SOURCES	+=	drivers/auth/dualroot/cot.c
385*91f16700Schasinglulu    else ifeq (${COT},cca)
386*91f16700Schasinglulu        AUTH_SOURCES	+=	drivers/auth/cca/cot.c
387*91f16700Schasinglulu    else
388*91f16700Schasinglulu        $(error Unknown chain of trust ${COT})
389*91f16700Schasinglulu    endif
390*91f16700Schasinglulu
391*91f16700Schasinglulu    BL1_SOURCES		+=	${AUTH_SOURCES}					\
392*91f16700Schasinglulu				bl1/tbbr/tbbr_img_desc.c			\
393*91f16700Schasinglulu				plat/arm/common/arm_bl1_fwu.c			\
394*91f16700Schasinglulu				plat/common/tbbr/plat_tbbr.c
395*91f16700Schasinglulu
396*91f16700Schasinglulu    BL2_SOURCES		+=	${AUTH_SOURCES}					\
397*91f16700Schasinglulu				plat/common/tbbr/plat_tbbr.c
398*91f16700Schasinglulu
399*91f16700Schasinglulu    $(eval $(call TOOL_ADD_IMG,ns_bl2u,--fwu,FWU_))
400*91f16700Schasinglulu
401*91f16700Schasinglulu    IMG_PARSER_LIB_MK := drivers/auth/mbedtls/mbedtls_x509.mk
402*91f16700Schasinglulu
403*91f16700Schasinglulu    $(info Including ${IMG_PARSER_LIB_MK})
404*91f16700Schasinglulu    include ${IMG_PARSER_LIB_MK}
405*91f16700Schasingluluendif
406*91f16700Schasinglulu
407*91f16700Schasinglulu# Include Measured Boot makefile before any Crypto library makefile.
408*91f16700Schasinglulu# Crypto library makefile may need default definitions of Measured Boot build
409*91f16700Schasinglulu# flags present in Measured Boot makefile.
410*91f16700Schasingluluifneq ($(filter 1,${MEASURED_BOOT} ${DRTM_SUPPORT}),)
411*91f16700Schasinglulu    MEASURED_BOOT_MK := drivers/measured_boot/event_log/event_log.mk
412*91f16700Schasinglulu    $(info Including ${MEASURED_BOOT_MK})
413*91f16700Schasinglulu    include ${MEASURED_BOOT_MK}
414*91f16700Schasinglulu
415*91f16700Schasinglulu    ifneq (${MBOOT_EL_HASH_ALG}, sha256)
416*91f16700Schasinglulu        $(eval $(call add_define,TF_MBEDTLS_MBOOT_USE_SHA512))
417*91f16700Schasinglulu    endif
418*91f16700Schasinglulu
419*91f16700Schasinglulu    ifeq (${MEASURED_BOOT},1)
420*91f16700Schasinglulu         BL1_SOURCES		+= 	${EVENT_LOG_SOURCES}
421*91f16700Schasinglulu         BL2_SOURCES		+= 	${EVENT_LOG_SOURCES}
422*91f16700Schasinglulu    endif
423*91f16700Schasinglulu
424*91f16700Schasinglulu    ifeq (${DRTM_SUPPORT},1)
425*91f16700Schasinglulu         BL31_SOURCES	        += 	${EVENT_LOG_SOURCES}
426*91f16700Schasinglulu    endif
427*91f16700Schasingluluendif
428*91f16700Schasinglulu
429*91f16700Schasingluluifneq ($(filter 1,${MEASURED_BOOT} ${TRUSTED_BOARD_BOOT} ${DRTM_SUPPORT}),)
430*91f16700Schasinglulu    CRYPTO_SOURCES	:=	drivers/auth/crypto_mod.c 	\
431*91f16700Schasinglulu				lib/fconf/fconf_tbbr_getter.c
432*91f16700Schasinglulu    BL1_SOURCES		+=	${CRYPTO_SOURCES}
433*91f16700Schasinglulu    BL2_SOURCES		+=	${CRYPTO_SOURCES}
434*91f16700Schasinglulu    BL31_SOURCES	+=	drivers/auth/crypto_mod.c
435*91f16700Schasinglulu
436*91f16700Schasinglulu    # We expect to locate the *.mk files under the directories specified below
437*91f16700Schasinglulu    CRYPTO_LIB_MK := drivers/auth/mbedtls/mbedtls_crypto.mk
438*91f16700Schasinglulu
439*91f16700Schasinglulu    $(info Including ${CRYPTO_LIB_MK})
440*91f16700Schasinglulu    include ${CRYPTO_LIB_MK}
441*91f16700Schasingluluendif
442*91f16700Schasinglulu
443*91f16700Schasingluluifeq (${RECLAIM_INIT_CODE}, 1)
444*91f16700Schasinglulu    ifeq (${ARM_XLAT_TABLES_LIB_V1}, 1)
445*91f16700Schasinglulu        $(error "To reclaim init code xlat tables v2 must be used")
446*91f16700Schasinglulu    endif
447*91f16700Schasingluluendif
448