#
# Copyright (c) 2013-2021, Arm Limited and Contributors. All rights reserved.
#
# SPDX-License-Identifier: BSD-3-Clause
#
#
# Trusted Firmware Version
#
VERSION_MAJOR := 2
VERSION_MINOR := 6
# Default goal is build all images
.DEFAULT_GOAL := all
# Avoid any implicit propagation of command line variable definitions to
# sub-Makefiles, like CFLAGS that we reserved for the firmware images'
# usage. Other command line options like "-s" are still propagated as usual.
MAKEOVERRIDES =
MAKE_HELPERS_DIRECTORY := make_helpers/
i n c l u d e $ { M A K E _ H E L P E R S _ D I R E C T O R Y } b u i l d _ m a c r o s . m k
i n c l u d e $ { M A K E _ H E L P E R S _ D I R E C T O R Y } b u i l d _ e n v . m k
################################################################################
# Default values for build configurations, and their dependencies
################################################################################
i n c l u d e $ { M A K E _ H E L P E R S _ D I R E C T O R Y } d e f a u l t s . m k
# Assertions enabled for DEBUG builds by default
ENABLE_ASSERTIONS := ${ DEBUG }
ENABLE_PMF := ${ ENABLE_RUNTIME_INSTRUMENTATION }
PLAT := ${ DEFAULT_PLAT }
################################################################################
# Checkpatch script options
################################################################################
CHECKCODE_ARGS := --no-patch
# Do not check the coding style on imported library files or documentation files
INC_ARM_DIRS_TO_CHECK := $( sort $( filter-out \
include/drivers/arm/cryptocell, \
$( wildcard include/drivers/arm/*) ) )
INC_ARM_DIRS_TO_CHECK += include/drivers/arm/cryptocell/*.h
INC_DRV_DIRS_TO_CHECK := $( sort $( filter-out \
include/drivers/arm, \
$( wildcard include/drivers/*) ) )
INC_LIB_DIRS_TO_CHECK := $( sort $( filter-out \
include/lib/libfdt \
include/lib/libc, \
$( wildcard include/lib/*) ) )
INC_DIRS_TO_CHECK := $( sort $( filter-out \
include/lib \
include/drivers, \
$( wildcard include/*) ) )
LIB_DIRS_TO_CHECK := $( sort $( filter-out \
lib/compiler-rt \
lib/libfdt% \
lib/libc, \
$( wildcard lib/*) ) )
ROOT_DIRS_TO_CHECK := $( sort $( filter-out \
lib \
include \
docs \
%.rst, \
$( wildcard *) ) )
CHECK_PATHS := ${ ROOT_DIRS_TO_CHECK } \
${ INC_DIRS_TO_CHECK } \
${ INC_LIB_DIRS_TO_CHECK } \
${ LIB_DIRS_TO_CHECK } \
${ INC_DRV_DIRS_TO_CHECK } \
${ INC_ARM_DIRS_TO_CHECK }
################################################################################
# Process build options
################################################################################
# Verbose flag
i f e q ( $ { V } , 0 )
Q:= @
Makefile: Support totally quiet output with -s
"-s" is a command line option to the make tool, to suppress normal output,
something to the effect of prepending every line with '@' in the Makefile.
However with our V={0|1} support, we now print the shortened command line
output in any case (even with V=1, in addition to the long line!).
Normally -s helps to not miss non-fatal warnings, which tend to scroll out
of the window easily.
Introduce a new Makefile variable ECHO, to control the shortened output.
We only set it in the (current default) V=0 case, and replace every
occurence of "@echo" with that variable.
When the user specifies "-s", we set ECHO to some magic string which
changes the output line into a comment, so the output is suppressed.
Beside suppressing every output for "-s", we also avoid the redundant
short output when compiling with V=1.
This changes the output to:
==========
$ make -s PLAT=.... bl31
Built build/.../release/bl31.bin
==========
$ make PLAT=.... bl31
...
CC lib/libc/strncmp.c
CC lib/libc/strnlen.c
...
==========
$ make V=1 PLAT=.... bl31
...
gcc -DDEBUG=0 .... -o build/.../release/libc/strncmp.o
gcc -DDEBUG=0 .... -o build/.../release/libc/strnlen.o
...
==========
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
6 years ago
ECHO:= @echo
CHECKCODE_ARGS += --no-summary --terse
e l s e
Q:=
ECHO:= $( ECHO_QUIET)
e n d i f
Makefile: Support totally quiet output with -s
"-s" is a command line option to the make tool, to suppress normal output,
something to the effect of prepending every line with '@' in the Makefile.
However with our V={0|1} support, we now print the shortened command line
output in any case (even with V=1, in addition to the long line!).
Normally -s helps to not miss non-fatal warnings, which tend to scroll out
of the window easily.
Introduce a new Makefile variable ECHO, to control the shortened output.
We only set it in the (current default) V=0 case, and replace every
occurence of "@echo" with that variable.
When the user specifies "-s", we set ECHO to some magic string which
changes the output line into a comment, so the output is suppressed.
Beside suppressing every output for "-s", we also avoid the redundant
short output when compiling with V=1.
This changes the output to:
==========
$ make -s PLAT=.... bl31
Built build/.../release/bl31.bin
==========
$ make PLAT=.... bl31
...
CC lib/libc/strncmp.c
CC lib/libc/strnlen.c
...
==========
$ make V=1 PLAT=.... bl31
...
gcc -DDEBUG=0 .... -o build/.../release/libc/strncmp.o
gcc -DDEBUG=0 .... -o build/.../release/libc/strnlen.o
...
==========
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
6 years ago
i f n e q ( $( findstring s ,$ ( filter -out --%,$ ( MAKEFLAGS ) ) ) , )
Q:= @
ECHO:= $( ECHO_QUIET)
Makefile: Support totally quiet output with -s
"-s" is a command line option to the make tool, to suppress normal output,
something to the effect of prepending every line with '@' in the Makefile.
However with our V={0|1} support, we now print the shortened command line
output in any case (even with V=1, in addition to the long line!).
Normally -s helps to not miss non-fatal warnings, which tend to scroll out
of the window easily.
Introduce a new Makefile variable ECHO, to control the shortened output.
We only set it in the (current default) V=0 case, and replace every
occurence of "@echo" with that variable.
When the user specifies "-s", we set ECHO to some magic string which
changes the output line into a comment, so the output is suppressed.
Beside suppressing every output for "-s", we also avoid the redundant
short output when compiling with V=1.
This changes the output to:
==========
$ make -s PLAT=.... bl31
Built build/.../release/bl31.bin
==========
$ make PLAT=.... bl31
...
CC lib/libc/strncmp.c
CC lib/libc/strnlen.c
...
==========
$ make V=1 PLAT=.... bl31
...
gcc -DDEBUG=0 .... -o build/.../release/libc/strncmp.o
gcc -DDEBUG=0 .... -o build/.../release/libc/strnlen.o
...
==========
Signed-off-by: Andre Przywara <andre.przywara@arm.com>
6 years ago
e n d i f
export Q ECHO
# The cert_create tool cannot generate certificates individually, so we use the
# target 'certificates' to create them all
i f n e q ( $ { G E N E R A T E _ C O T } , 0 )
FIP_DEPS += certificates
FWU_FIP_DEPS += fwu_certificates
e n d i f
# Process BRANCH_PROTECTION value and set
# Pointer Authentication and Branch Target Identification flags
i f e q ( $ { B R A N C H _ P R O T E C T I O N } , 0 )
# Default value turns off all types of branch protection
BP_OPTION := none
e l s e i f n e q ( $ { A R C H } , a a r c h 6 4 )
$( error BRANCH_PROTECTION requires AArch64)
e l s e i f e q ( $ { B R A N C H _ P R O T E C T I O N } , 1 )
# Enables all types of branch protection features
BP_OPTION := standard
ENABLE_BTI := 1
ENABLE_PAUTH := 1
e l s e i f e q ( $ { B R A N C H _ P R O T E C T I O N } , 2 )
# Return address signing to its standard level
BP_OPTION := pac-ret
ENABLE_PAUTH := 1
e l s e i f e q ( $ { B R A N C H _ P R O T E C T I O N } , 3 )
# Extend the signing to include leaf functions
BP_OPTION := pac-ret+leaf
ENABLE_PAUTH := 1
e l s e i f e q ( $ { B R A N C H _ P R O T E C T I O N } , 4 )
# Turn on branch target identification mechanism
BP_OPTION := bti
ENABLE_BTI := 1
e l s e
$( error Unknown BRANCH_PROTECTION value ${ BRANCH_PROTECTION } )
e n d i f
# FEAT_RME
i f e q ( $ { E N A B L E _ R M E } , 1 )
# RME doesn't support PIE
i f n e q ( $ { E N A B L E _ P I E } , 0 )
$( error ENABLE_RME does not support PIE)
e n d i f
# RME requires AARCH64
i f n e q ( $ { A R C H } , a a r c h 6 4 )
$( error ENABLE_RME requires AArch64)
e n d i f
# RME requires el2 context to be saved for now.
CTX_INCLUDE_EL2_REGS := 1
CTX_INCLUDE_AARCH32_REGS := 0
ARM_ARCH_MAJOR := 8
ARM_ARCH_MINOR := 6
e n d i f
# USE_SPINLOCK_CAS requires AArch64 build
i f e q ( $ { U S E _ S P I N L O C K _ C A S } , 1 )
i f n e q ( $ { A R C H } , a a r c h 6 4 )
$( error USE_SPINLOCK_CAS requires AArch64)
e n d i f
e n d i f
# USE_DEBUGFS experimental feature recommended only in debug builds
i f e q ( $ { U S E _ D E B U G F S } , 1 )
i f e q ( $ { D E B U G } , 1 )
$( warning DEBUGFS experimental feature is enabled.)
e l s e
$( warning DEBUGFS experimental, recommended in DEBUG builds ONLY)
e n d i f
e n d i f
i f n e q ( $ { D E C R Y P T I O N _ S U P P O R T } , n o n e )
ENC_ARGS += -f ${ FW_ENC_STATUS }
ENC_ARGS += -k ${ ENC_KEY }
ENC_ARGS += -n ${ ENC_NONCE }
FIP_DEPS += enctool
FWU_FIP_DEPS += enctool
e n d i f
################################################################################
# Toolchain
################################################################################
HOSTCC := gcc
export HOSTCC
CC := ${ CROSS_COMPILE } gcc
CPP := ${ CROSS_COMPILE } cpp
AS := ${ CROSS_COMPILE } gcc
AR := ${ CROSS_COMPILE } ar
LINKER := ${ CROSS_COMPILE } ld
OC := ${ CROSS_COMPILE } objcopy
OD := ${ CROSS_COMPILE } objdump
NM := ${ CROSS_COMPILE } nm
PP := ${ CROSS_COMPILE } gcc -E
DTC := dtc
# Use ${LD}.bfd instead if it exists (as absolute path or together with $PATH).
i f n e q ( $( strip $ ( wildcard $ {LD }.bfd ) \
$( foreach dir,$( subst :, ,${ PATH } ) ,$( wildcard ${ dir } /${ LINKER } .bfd) ) ) ,)
LINKER := ${ LINKER } .bfd
e n d i f
i f e q ( $ { A R M _ A R C H _ M A J O R } , 7 )
target32-directive = -target arm-none-eabi
# Will set march32-directive from platform configuration
e l s e
target32-directive = -target armv8a-none-eabi
# Set the compiler's target architecture profile based on
# ARM_ARCH_MAJOR ARM_ARCH_MINOR options
i f e q ( $ { A R M _ A R C H _ M I N O R } , 0 )
march32-directive = -march= armv${ ARM_ARCH_MAJOR } -a
march64-directive = -march= armv${ ARM_ARCH_MAJOR } -a
e l s e
march32-directive = -march= armv${ ARM_ARCH_MAJOR } .${ ARM_ARCH_MINOR } -a
march64-directive = -march= armv${ ARM_ARCH_MAJOR } .${ ARM_ARCH_MINOR } -a
e n d i f
e n d i f
# Memory tagging is supported in architecture Armv8.5-A AArch64 and onwards
i f e q ( $( ARCH ) , a a r c h 6 4 )
# Check if revision is greater than or equal to 8.5
i f e q "8.5" "$(word 1, $(sort 8.5 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
mem_tag_arch_support = yes
e n d i f
e n d i f
# Get architecture feature modifiers
arch-features = ${ ARM_ARCH_FEATURE }
# Enable required options for memory stack tagging.
# Currently, these options are enabled only for clang and armclang compiler.
i f e q ( $ { S U P P O R T _ S T A C K _ M E M T A G } , y e s )
i f d e f m e m _ t a g _ a r c h _ s u p p o r t
# Check for armclang and clang compilers
i f n e q ( , $( filter $ ( notdir $ ( CC ) ) ,armclang clang ) )
# Add "memtag" architecture feature modifier if not specified
i f e q ( , $( findstring memtag ,$ ( arch -features ) ) )
arch-features := $( arch-features) +memtag
e n d i f # memtag
i f e q ( $( notdir $ ( CC ) ) , a r m c l a n g )
TF_CFLAGS += -mmemtag-stack
e l s e i f e q ( $( notdir $ ( CC ) ) , c l a n g )
TF_CFLAGS += -fsanitize= memtag
e n d i f # armclang
e n d i f # armclang clang
e l s e
$(error "Error : stack memory tagging is not supported for architecture \
${ ARCH } ,armv${ ARM_ARCH_MAJOR } .${ ARM_ARCH_MINOR } -a" )
e n d i f # mem_tag_arch_support
e n d i f # SUPPORT_STACK_MEMTAG
# Set the compiler's architecture feature modifiers
i f n e q ( $( arch -features ) , n o n e )
# Strip "none+" from arch-features
arch-features := $( subst none+,,$( arch-features) )
i f e q ( $( ARCH ) , a a r c h 3 2 )
march32-directive := $( march32-directive) +$( arch-features)
e l s e
march64-directive := $( march64-directive) +$( arch-features)
e n d i f
# Print features
$(info Arm Architecture Features specified : $( subst +, ,$ ( arch -features ) ) )
e n d i f # arch-features
# Determine if FEAT_RNG is supported
ENABLE_FEAT_RNG = $( if $( findstring rng,${ arch -features } ) ,1,0)
# Determine if FEAT_SB is supported
ENABLE_FEAT_SB = $( if $( findstring sb,${ arch -features } ) ,1,0)
i f e q "8.5" "$(word 1, $(sort 8.5 $(ARM_ARCH_MAJOR).$(ARM_ARCH_MINOR)))"
ENABLE_FEAT_SB = 1
e n d i f
i f n e q ( $( findstring armclang ,$ ( notdir $ ( CC ) ) ) , )
TF_CFLAGS_aarch32 = -target arm-arm-none-eabi $( march32-directive)
TF_CFLAGS_aarch64 = -target aarch64-arm-none-eabi $( march64-directive)
LD = $( LINKER)
AS = $( CC) -c -x assembler-with-cpp $( TF_CFLAGS_$( ARCH) )
CPP = $( CC) -E $( TF_CFLAGS_$( ARCH) )
PP = $( CC) -E $( TF_CFLAGS_$( ARCH) )
e l s e i f n e q ( $( findstring clang ,$ ( notdir $ ( CC ) ) ) , )
CLANG_CCDIR = $( if $( filter-out ./,$( dir $( CC) ) ) ,$( dir $( CC) ) ,)
TF_CFLAGS_aarch32 = $( target32-directive) $( march32-directive)
TF_CFLAGS_aarch64 = -target aarch64-elf $( march64-directive)
LD = $( CLANG_CCDIR) ld.lld
i f e q ( , $( shell which $ ( LD ) ) )
$( error "No $ ( LD ) in PATH , make sure it is installed or set LD to a different linker ")
e n d i f
AS = $( CC) -c -x assembler-with-cpp $( TF_CFLAGS_$( ARCH) )
CPP = $( CC) -E
PP = $( CC) -E
e l s e i f n e q ( $( findstring gcc ,$ ( notdir $ ( CC ) ) ) , )
TF_CFLAGS_aarch32 = $( march32-directive)
TF_CFLAGS_aarch64 = $( march64-directive)
i f e q ( $( ENABLE_LTO ) , 1 )
# Enable LTO only for aarch64
ifeq ( ${ ARCH } ,aarch64)
LTO_CFLAGS = -flto
# Use gcc as a wrapper for the ld, recommended for LTO
LINKER := ${ CROSS_COMPILE } gcc
endif
e n d i f
LD = $( LINKER)
e l s e
TF_CFLAGS_aarch32 = $( march32-directive)
TF_CFLAGS_aarch64 = $( march64-directive)
LD = $( LINKER)
e n d i f
# Process Debug flag
$( eval $ ( call add_define ,DEBUG ) )
i f n e q ( $ { D E B U G } , 0 )
BUILD_TYPE := debug
TF_CFLAGS += -g
ifneq ( $( findstring clang,$( notdir $( CC) ) ) ,)
ASFLAGS += -g
else
ASFLAGS += -g -Wa,--gdwarf-2
endif
# Use LOG_LEVEL_INFO by default for debug builds
LOG_LEVEL := 40
e l s e
BUILD_TYPE := release
# Use LOG_LEVEL_NOTICE by default for release builds
LOG_LEVEL := 20
e n d i f
# Default build string (git branch and commit)
i f e q ( $ { B U I L D _ S T R I N G } , )
BUILD_STRING := $( shell git describe --always --dirty --tags 2> /dev/null)
e n d i f
VERSION_STRING := v${ VERSION_MAJOR } .${ VERSION_MINOR } ( ${ BUILD_TYPE } ) :${ BUILD_STRING }
i f e q ( $ { A A R C H 3 2 _ I N S T R U C T I O N _ S E T } , A 3 2 )
TF_CFLAGS_aarch32 += -marm
e l s e i f e q ( $ { A A R C H 3 2 _ I N S T R U C T I O N _ S E T } , T 3 2 )
TF_CFLAGS_aarch32 += -mthumb
e l s e
$(error Error : Unknown AArch 32 instruction set ${AARCH 32_INSTRUCTION_SET })
e n d i f
TF_CFLAGS_aarch32 += -mno-unaligned-access
TF_CFLAGS_aarch64 += -mgeneral-regs-only -mstrict-align
i f n e q ( $ { B P _ O P T I O N } , n o n e )
TF_CFLAGS_aarch64 += -mbranch-protection= ${ BP_OPTION }
e n d i f
ASFLAGS_aarch32 = $( march32-directive)
ASFLAGS_aarch64 = $( march64-directive)
# General warnings
WARNINGS := -Wall -Wmissing-include-dirs -Wunused \
-Wdisabled-optimization -Wvla -Wshadow \
-Wno-unused-parameter -Wredundant-decls
# Additional warnings
# Level 1
WARNING1 := -Wextra
WARNING1 += -Wmissing-format-attribute
WARNING1 += -Wmissing-prototypes
WARNING1 += -Wold-style-definition
# Level 2
WARNING2 := -Waggregate-return
WARNING2 += -Wcast-align
WARNING2 += -Wnested-externs
WARNING3 := -Wbad-function-cast
WARNING3 += -Wcast-qual
WARNING3 += -Wconversion
WARNING3 += -Wpacked
WARNING3 += -Wpointer-arith
WARNING3 += -Wswitch-default
i f e q ( $ { W } , 1 )
WARNINGS += $( WARNING1)
e l s e i f e q ( $ { W } , 2 )
WARNINGS += $( WARNING1) $( WARNING2)
e l s e i f e q ( $ { W } , 3 )
WARNINGS += $( WARNING1) $( WARNING2) $( WARNING3)
e n d i f
# Compiler specific warnings
i f e q ( $( findstring clang ,$ ( notdir $ ( CC ) ) ) , )
# not using clang
WARNINGS += -Wunused-but-set-variable -Wmaybe-uninitialized \
-Wpacked-bitfield-compat -Wshift-overflow= 2 \
-Wlogical-op
e l s e
# using clang
WARNINGS += -Wshift-overflow -Wshift-sign-overflow \
-Wlogical-op-parentheses
e n d i f
i f n e q ( $ { E } , 0 )
ERRORS := -Werror
e n d i f
CPPFLAGS = ${ DEFINES } ${ INCLUDES } ${ MBEDTLS_INC } -nostdinc \
$( ERRORS) $( WARNINGS)
ASFLAGS += $( CPPFLAGS) $( ASFLAGS_$( ARCH) ) \
-ffreestanding -Wa,--fatal-warnings
TF_CFLAGS += $( CPPFLAGS) $( TF_CFLAGS_$( ARCH) ) \
-ffunction-sections -fdata-sections \
-ffreestanding -fno-builtin -fno-common \
-Os -std= gnu99
i f e q ( $ { S A N I T I Z E _ U B } , o n )
TF_CFLAGS += -fsanitize= undefined -fno-sanitize-recover
e n d i f
i f e q ( $ { S A N I T I Z E _ U B } , t r a p )
TF_CFLAGS += -fsanitize= undefined -fno-sanitize-recover \
-fsanitize-undefined-trap-on-error
e n d i f
GCC_V_OUTPUT := $( shell $( CC) -v 2>& 1)
# LD = armlink
i f n e q ( $( findstring armlink ,$ ( notdir $ ( LD ) ) ) , )
TF_LDFLAGS += --diag_error= warning --lto_level= O1
TF_LDFLAGS += --remove --info= unused,unusedsymbols
TF_LDFLAGS += $( TF_LDFLAGS_$( ARCH) )
# LD = gcc (used when GCC LTO is enabled)
e l s e i f n e q ( $( findstring gcc ,$ ( notdir $ ( LD ) ) ) , )
# Pass ld options with Wl or Xlinker switches
TF_LDFLAGS += -Wl,--fatal-warnings -O1
TF_LDFLAGS += -Wl,--gc-sections
i f e q ( $( ENABLE_LTO ) , 1 )
ifeq ( ${ ARCH } ,aarch64)
TF_LDFLAGS += -flto -fuse-linker-plugin
endif
e n d i f
# GCC automatically adds fix-cortex-a53-843419 flag when used to link
# which breaks some builds, so disable if errata fix is not explicitly enabled
i f n e q ( $ { E R R A T A _ A 5 3 _ 8 4 3 4 1 9 } , 1 )
TF_LDFLAGS += -mno-fix-cortex-a53-843419
e n d i f
TF_LDFLAGS += -nostdlib
TF_LDFLAGS += $( subst --,-Xlinker --,$( TF_LDFLAGS_$( ARCH) ) )
# LD = gcc-ld (ld) or llvm-ld (ld.lld) or other
e l s e
TF_LDFLAGS += --fatal-warnings -O1
TF_LDFLAGS += --gc-sections
# ld.lld doesn't recognize the errata flags,
# therefore don't add those in that case
i f e q ( $( findstring ld .lld ,$ ( notdir $ ( LD ) ) ) , )
TF_LDFLAGS += $( TF_LDFLAGS_$( ARCH) )
e n d i f
e n d i f
Makefile: Add ability to build dtb
This is a revamp of the original approach in:
https://github.com/ARM-software/arm-trusted-firmware/pull/747
Current build system has no means to automatically generate dtbs from
dts, instead, stores the dtbs in the fdts/ folder. While this makes
perfect sense for many reference platforms, this becomes a minor
breakage in development flow for newer platforms.
However, this can be solved by providing a rule for the dtbs while
building the ATF binaries by purely describing which dts sources we
need.
For example, with this change, we will now be able to describe the
dtbs we need for the platform in the corresponding platform.mk file:
FDT_SOURCES += fdts/abc.dts
This should be able to generate the abc.dtb appropriately.
Since device trees are specification of hardware, we don't tie the rule
to any specific BL, instead a generic rule is introduced.
Further, this approach allows us to generate appropriate dtbs which may be
need to be regenerated when a common dtsi gets updated, by just
restricting changes to the dtsi alone, instead of synchronizing all the
dtbs as well.
If dtc is not available in default paths, but is available in an
alternate location, it can be chosen by overriding the DTC variable
such as 'make DTC=~/dtc/dtc ....`
NOTE: dtbs are built only with the explicit make dtbs command. The rule
is only available if the platform defines a FDT_SOURCES variable.
Signed-off-by: Benjamin Fair <b-fair@ti.com>
Signed-off-by: Nishanth Menon <nm@ti.com>
8 years ago
DTC_FLAGS += -I dts -O dtb
DTC_CPPFLAGS += -P -nostdinc -Iinclude -Ifdts -undef \
-x assembler-with-cpp $( DEFINES)
Makefile: Add ability to build dtb
This is a revamp of the original approach in:
https://github.com/ARM-software/arm-trusted-firmware/pull/747
Current build system has no means to automatically generate dtbs from
dts, instead, stores the dtbs in the fdts/ folder. While this makes
perfect sense for many reference platforms, this becomes a minor
breakage in development flow for newer platforms.
However, this can be solved by providing a rule for the dtbs while
building the ATF binaries by purely describing which dts sources we
need.
For example, with this change, we will now be able to describe the
dtbs we need for the platform in the corresponding platform.mk file:
FDT_SOURCES += fdts/abc.dts
This should be able to generate the abc.dtb appropriately.
Since device trees are specification of hardware, we don't tie the rule
to any specific BL, instead a generic rule is introduced.
Further, this approach allows us to generate appropriate dtbs which may be
need to be regenerated when a common dtsi gets updated, by just
restricting changes to the dtsi alone, instead of synchronizing all the
dtbs as well.
If dtc is not available in default paths, but is available in an
alternate location, it can be chosen by overriding the DTC variable
such as 'make DTC=~/dtc/dtc ....`
NOTE: dtbs are built only with the explicit make dtbs command. The rule
is only available if the platform defines a FDT_SOURCES variable.
Signed-off-by: Benjamin Fair <b-fair@ti.com>
Signed-off-by: Nishanth Menon <nm@ti.com>
8 years ago
i f e q ( $( MEASURED_BOOT ) , 1 )
DTC_CPPFLAGS += -DMEASURED_BOOT -DBL2_HASH_SIZE= ${ TCG_DIGEST_SIZE }
e n d i f
################################################################################
# Common sources and include directories
################################################################################
i n c l u d e l i b / c o m p i l e r - r t / c o m p i l e r - r t . m k
BL_COMMON_SOURCES += common/bl_common.c \
common/tf_log.c \
common/${ ARCH } /debug.S \
drivers/console/multi_console.c \
lib/${ ARCH } /cache_helpers.S \
lib/${ ARCH } /misc_helpers.S \
plat/common/plat_bl_common.c \
plat/common/plat_log_common.c \
plat/common/${ ARCH } /plat_common.c \
plat/common/${ ARCH } /platform_helpers.S \
${ COMPILER_RT_SRCS }
i f e q ( $( notdir $ ( CC ) ) , a r m c l a n g )
BL_COMMON_SOURCES += lib/${ ARCH } /armclang_printf.S
e n d i f
i f e q ( $ { S A N I T I Z E _ U B } , o n )
BL_COMMON_SOURCES += plat/common/ubsan.c
e n d i f
INCLUDES += -Iinclude \
-Iinclude/arch/${ ARCH } \
-Iinclude/lib/cpus/${ ARCH } \
-Iinclude/lib/el3_runtime/${ ARCH } \
${ PLAT_INCLUDES } \
${ SPD_INCLUDES }
i n c l u d e c o m m o n / b a c k t r a c e / b a c k t r a c e . m k
################################################################################
# Generic definitions
################################################################################
i n c l u d e $ { M A K E _ H E L P E R S _ D I R E C T O R Y } p l a t _ h e l p e r s . m k
i f e q ( $ { B U I L D _ B A S E } , )
BUILD_BASE := ./build
e n d i f
BUILD_PLAT := $( abspath ${ BUILD_BASE } ) /${ PLAT } /${ BUILD_TYPE }
SPDS := $( sort $( filter-out none, $( patsubst services/spd/%,%,$( wildcard services/spd/*) ) ) )
# Platforms providing their own TBB makefile may override this value
INCLUDE_TBBR_MK := 1
################################################################################
# Include SPD Makefile if one has been specified
################################################################################
i f n e q ( $ { S P D } , n o n e )
ifeq ( ${ ARCH } ,aarch32)
$( error "Error: SPD is incompatible with AArch32." )
endif
ifdef EL3_PAYLOAD_BASE
$( warning "SPD and EL3_PAYLOAD_BASE are incompatible build options." )
$( warning "The SPD and its BL32 companion will be present but ignored." )
endif
ifeq ( ${ SPD } ,spmd)
# SPMD is located in std_svc directory
SPD_DIR := std_svc
ifeq ( $( SPMD_SPM_AT_SEL2) ,1)
ifeq ( $( CTX_INCLUDE_EL2_REGS) ,0)
$( error SPMD with SPM at S-EL2 requires CTX_INCLUDE_EL2_REGS option)
endif
endif
ifeq ( $( findstring optee_sp,$( ARM_SPMC_MANIFEST_DTS) ) ,optee_sp)
DTC_CPPFLAGS += -DOPTEE_SP_FW_CONFIG
endif
ifeq ( $( TS_SP_FW_CONFIG) ,1)
DTC_CPPFLAGS += -DTS_SP_FW_CONFIG
endif
ifneq ( $( ARM_BL2_SP_LIST_DTS) ,)
DTC_CPPFLAGS += -DARM_BL2_SP_LIST_DTS= $( ARM_BL2_SP_LIST_DTS)
endif
ifneq ( $( SP_LAYOUT_FILE) ,)
BL2_ENABLE_SP_LOAD := 1
endif
else
# All other SPDs in spd directory
SPD_DIR := spd
endif
# We expect to locate an spd.mk under the specified SPD directory
SPD_MAKE := $( wildcard services/${ SPD_DIR } /${ SPD } /${ SPD } .mk)
ifeq ( ${ SPD_MAKE } ,)
$( error Error: No services/${ SPD_DIR } /${ SPD } /${ SPD } .mk located)
endif
$( info Including ${ SPD_MAKE } )
include ${ SPD_MAKE }
# If there's BL32 companion for the chosen SPD, we expect that the SPD's
# Makefile would set NEED_BL32 to "yes". In this case, the build system
# supports two mutually exclusive options:
# * BL32 is built from source: then BL32_SOURCES must contain the list
# of source files to build BL32
# * BL32 is a prebuilt binary: then BL32 must point to the image file
# that will be included in the FIP
# If both BL32_SOURCES and BL32 are defined, the binary takes precedence
# over the sources.
e n d i f
################################################################################
# Include rmmd Makefile if RME is enabled
################################################################################
i f n e q ( $ { E N A B L E _ R M E } , 0 )
i f n e q ( $ { A R C H } , a a r c h 6 4 )
$( error ENABLE_RME requires AArch64)
e n d i f
i n c l u d e s e r v i c e s / s t d _ s v c / r m m d / r m m d . m k
$( warning "RME is an experimental feature ")
e n d i f
################################################################################
# Include the platform specific Makefile after the SPD Makefile (the platform
# makefile may use all previous definitions in this file)
################################################################################
i n c l u d e $ { P L A T _ M A K E F I L E _ F U L L }
$( eval $ ( call MAKE_PREREQ_DIR ,$ {BUILD_PLAT }) )
i f e q ( $ { A R M _ A R C H _ M A J O R } , 7 )
i n c l u d e m a k e _ h e l p e r s / a r m v 7 - a - c p u s . m k
e n d i f
PIE: pass PIE options only to BL31
docs/getting_started/build-options.rst clearly says ENABLE_PIE is
currently only supported in BL31, but in fact, it has a stronger
limitation:
Defining ENABLE_PIE may corrupt BL1 and BL2. So, ENABLE_PIE is
supported only for platforms where BL31 is the only image built
in the TF-A tree.
Currently, ENABLE_PIE is enabled by two platforms,
plat/arm/common/arm_common.mk and ti/k3/common/plat_common.mk,
both of which enable ENABLE_PIE together with RESET_TO_BL31.
For platforms with the full boot sequence, ENABLE_PIE may break earlier
BL stages. For example, if I build PLAT=qemu with ENABLE_PIE=1, it
fails in BL1.
When ENABLE_PIE is enabled, PIE options are added to TF_CFLAGS and
TF_LDFLAGS, so all BL images are affected. It is problematic because
currently only the BL31 linker script handles it. Even if BL1/BL2
works, the image size would increase needlessly, at least.
Pass the PIE options only to BL images that support it.
Change-Id: I550e95148aa3c63571c8ad2081082c554a848f57
Signed-off-by: Masahiro Yamada <yamada.masahiro@socionext.com>
5 years ago
PIE_FOUND := $( findstring --enable-default-pie,${ GCC_V_OUTPUT } )
i f n e q ( $( PIE_FOUND ) , )
TF_CFLAGS += -fno-PIE
e n d i f
i f n e q ( $( findstring gcc ,$ ( notdir $ ( LD ) ) ) , )
PIE_LDFLAGS += -Wl,-pie -Wl,--no-dynamic-linker
e l s e
PIE: pass PIE options only to BL31
docs/getting_started/build-options.rst clearly says ENABLE_PIE is
currently only supported in BL31, but in fact, it has a stronger
limitation:
Defining ENABLE_PIE may corrupt BL1 and BL2. So, ENABLE_PIE is
supported only for platforms where BL31 is the only image built
in the TF-A tree.
Currently, ENABLE_PIE is enabled by two platforms,
plat/arm/common/arm_common.mk and ti/k3/common/plat_common.mk,
both of which enable ENABLE_PIE together with RESET_TO_BL31.
For platforms with the full boot sequence, ENABLE_PIE may break earlier
BL stages. For example, if I build PLAT=qemu with ENABLE_PIE=1, it
fails in BL1.
When ENABLE_PIE is enabled, PIE options are added to TF_CFLAGS and
TF_LDFLAGS, so all BL images are affected. It is problematic because
currently only the BL31 linker script handles it. Even if BL1/BL2
works, the image size would increase needlessly, at least.
Pass the PIE options only to BL images that support it.
Change-Id: I550e95148aa3c63571c8ad2081082c554a848f57
Signed-off-by: Masahiro Yamada <yamada.masahiro@socionext.com>
5 years ago
PIE_LDFLAGS += -pie --no-dynamic-linker
e n d i f
i f e q ( $( ENABLE_PIE ) , 1 )
i f e q ( $( BL 2_AT_EL 3) , 1 )
i f n e q ( $( BL 2_IN_XIP_MEM ) , 1 )
BL2_CFLAGS += -fpie
BL2_LDFLAGS += $( PIE_LDFLAGS)
e n d i f
e n d i f
PIE: pass PIE options only to BL31
docs/getting_started/build-options.rst clearly says ENABLE_PIE is
currently only supported in BL31, but in fact, it has a stronger
limitation:
Defining ENABLE_PIE may corrupt BL1 and BL2. So, ENABLE_PIE is
supported only for platforms where BL31 is the only image built
in the TF-A tree.
Currently, ENABLE_PIE is enabled by two platforms,
plat/arm/common/arm_common.mk and ti/k3/common/plat_common.mk,
both of which enable ENABLE_PIE together with RESET_TO_BL31.
For platforms with the full boot sequence, ENABLE_PIE may break earlier
BL stages. For example, if I build PLAT=qemu with ENABLE_PIE=1, it
fails in BL1.
When ENABLE_PIE is enabled, PIE options are added to TF_CFLAGS and
TF_LDFLAGS, so all BL images are affected. It is problematic because
currently only the BL31 linker script handles it. Even if BL1/BL2
works, the image size would increase needlessly, at least.
Pass the PIE options only to BL images that support it.
Change-Id: I550e95148aa3c63571c8ad2081082c554a848f57
Signed-off-by: Masahiro Yamada <yamada.masahiro@socionext.com>
5 years ago
BL31_CFLAGS += -fpie
BL31_LDFLAGS += $( PIE_LDFLAGS)
BL32_CFLAGS += -fpie
BL32_LDFLAGS += $( PIE_LDFLAGS)
e n d i f
i f e q ( $ { A R C H } , a a r c h 6 4 )
BL1_CPPFLAGS += -DIMAGE_AT_EL3
i f e q ( $( BL 2_AT_EL 3) , 1 )
BL2_CPPFLAGS += -DIMAGE_AT_EL3
e l s e
BL2_CPPFLAGS += -DIMAGE_AT_EL1
e n d i f
BL2U_CPPFLAGS += -DIMAGE_AT_EL1
BL31_CPPFLAGS += -DIMAGE_AT_EL3
BL32_CPPFLAGS += -DIMAGE_AT_EL1
e n d i f
# Include the CPU specific operations makefile, which provides default
# values for all CPU errata workarounds and CPU specific optimisations.
# This can be overridden by the platform.
i n c l u d e l i b / c p u s / c p u - o p s . m k
i f e q ( $ { A R C H } , a a r c h 3 2 )
NEED_BL32 := yes
################################################################################
# Build `AARCH32_SP` as BL32 image for AArch32
################################################################################
i f n e q ( $ { A A R C H 3 2 _ S P } , n o n e )
# We expect to locate an sp.mk under the specified AARCH32_SP directory
AARCH32_SP_MAKE := $( wildcard bl32/${ AARCH32_SP } /${ AARCH32_SP } .mk)
i f e q ( $ { A A R C H 3 2 _ S P _ M A K E } , )
$( error Error: No bl32/${ AARCH32_SP } /${ AARCH32_SP } .mk located)
e n d i f
$( info Including $ {AARCH 32_SP_MAKE })
i n c l u d e $ { A A R C H 3 2 _ S P _ M A K E }
e n d i f
e n d i f
################################################################################
# Include libc if not overridden
################################################################################
i f e q ( $ { O V E R R I D E _ L I B C } , 0 )
i n c l u d e l i b / l i b c / l i b c . m k
e n d i f
################################################################################
# Check incompatible options
################################################################################
i f d e f E L 3 _ P A Y L O A D _ B A S E
ifdef PRELOADED_BL33_BASE
$( warning " PRELOADED_BL33_BASE and EL3_PAYLOAD_BASE are \
incompatible build options. EL3_PAYLOAD_BASE has priority." )
endif
ifneq ( ${ GENERATE_COT } ,0)
$( error "GENERATE_COT and EL3_PAYLOAD_BASE are incompatible build options." )
endif
ifneq ( ${ TRUSTED_BOARD_BOOT } ,0)
$( error "TRUSTED_BOARD_BOOT and EL3_PAYLOAD_BASE are incompatible build options." )
endif
e n d i f
i f e q ( $ { N E E D _ B L 3 3 } , y e s )
ifdef EL3_PAYLOAD_BASE
$( warning " BL33 image is not needed when option \
BL33_PAYLOAD_BASE is used and won' t be added to the FIP file." )
endif
ifdef PRELOADED_BL33_BASE
$( warning " BL33 image is not needed when option \
PRELOADED_BL33_BASE is used and won' t be added to the FIP \
file." )
endif
e n d i f
# When building for systems with hardware-assisted coherency, there's no need to
# use USE_COHERENT_MEM. Require that USE_COHERENT_MEM must be set to 0 too.
i f e q ( $( HW_ASSISTED_COHERENCY ) - $( USE_COHERENT_MEM ) , 1 - 1 )
$( error USE_COHERENT_MEM cannot be enabled with HW_ASSISTED_COHERENCY )
e n d i f
#For now, BL2_IN_XIP_MEM is only supported when BL2_AT_EL3 is 1.
i f e q ( $( BL 2_AT_EL 3) - $( BL 2_IN_XIP_MEM ) , 0 - 1 )
$( error "BL 2_IN_XIP_MEM is only supported when BL 2_AT_EL 3 is enabled ")
e n d i f
# For RAS_EXTENSION, require that EAs are handled in EL3 first
i f e q ( $( RAS_EXTENSION ) , 1 )
ifneq ( $( HANDLE_EA_EL3_FIRST) ,1)
$( error For RAS_EXTENSION, HANDLE_EA_EL3_FIRST must also be 1)
endif
e n d i f
# When FAULT_INJECTION_SUPPORT is used, require that RAS_EXTENSION is enabled
i f e q ( $( FAULT_INJECTION_SUPPORT ) , 1 )
ifneq ( $( RAS_EXTENSION) ,1)
$( error For FAULT_INJECTION_SUPPORT, RAS_EXTENSION must also be 1)
endif
e n d i f
# DYN_DISABLE_AUTH can be set only when TRUSTED_BOARD_BOOT=1
i f e q ( $( DYN_DISABLE_AUTH ) , 1 )
ifeq ( ${ TRUSTED_BOARD_BOOT } , 0)
$( error "TRUSTED_BOARD_BOOT must be enabled for DYN_DISABLE_AUTH to be set." )
endif
e n d i f
# SDEI_IN_FCONF is only supported when SDEI_SUPPORT is enabled.
i f e q ( $( SDEI_SUPPORT ) - $( SDEI_IN_FCONF ) , 0 - 1 )
$( error "SDEI_IN_FCONF is only supported when SDEI_SUPPORT is enabled ")
e n d i f
# If pointer authentication is used in the firmware, make sure that all the
# registers associated to it are also saved and restored.
# Not doing it would leak the value of the keys used by EL3 to EL1 and S-EL1.
i f e q ( $( ENABLE_PAUTH ) , 1 )
ifeq ( $( CTX_INCLUDE_PAUTH_REGS) ,0)
$( error Pointer Authentication requires CTX_INCLUDE_PAUTH_REGS = 1)
endif
e n d i f
i f e q ( $( CTX_INCLUDE_PAUTH_REGS ) , 1 )
ifneq ( ${ ARCH } ,aarch64)
$( error CTX_INCLUDE_PAUTH_REGS requires AArch64)
endif
e n d i f
i f e q ( $( CTX_INCLUDE_MTE_REGS ) , 1 )
ifneq ( ${ ARCH } ,aarch64)
$( error CTX_INCLUDE_MTE_REGS requires AArch64)
endif
e n d i f
# Trusted Boot is a prerequisite for Measured Boot. It provides trust that the
# code taking the measurements and recording them has not been tampered
# with. This is referred to as the Root of Trust for Measurement.
i f e q ( $( MEASURED_BOOT ) , 1 )
ifneq ( ${ TRUSTED_BOARD_BOOT } ,1)
$( error MEASURED_BOOT requires TRUSTED_BOARD_BOOT = 1)
endif
e n d i f
i f e q ( $( PSA_FWU_SUPPORT ) , 1 )
$( info PSA_FWU_SUPPORT is an experimental feature)
e n d i f
i f e q ( $ { A R M _ X L A T _ T A B L E S _ L I B _ V 1 } , 1 )
ifeq ( ${ ALLOW_RO_XLAT_TABLES } , 1)
$( error "ALLOW_RO_XLAT_TABLES requires translation tables library v2" )
endif
e n d i f
i f n e q ( $ { D E C R Y P T I O N _ S U P P O R T } , n o n e )
ifeq ( ${ TRUSTED_BOARD_BOOT } , 0)
$( error TRUSTED_BOARD_BOOT must be enabled for DECRYPTION_SUPPORT to be set )
endif
e n d i f
# SME/SVE only supported on AArch64
i f e q ( $ { A R C H } , a a r c h 3 2 )
ifeq ( ${ ENABLE_SME_FOR_NS } ,1)
$( error "ENABLE_SME_FOR_NS cannot be used with ARCH=aarch32" )
endif
ifeq ( ${ ENABLE_SVE_FOR_NS } ,1)
# Warning instead of error due to CI dependency on this
$( warning "ENABLE_SVE_FOR_NS cannot be used with ARCH=aarch32" )
$( warning "Forced ENABLE_SVE_FOR_NS=0" )
override ENABLE_SVE_FOR_NS := 0
endif
e n d i f
# Ensure ENABLE_RME is not used with SME
i f e q ( $ { E N A B L E _ R M E } , 1 )
ifeq ( ${ ENABLE_SME_FOR_NS } ,1)
$( error "ENABLE_SME_FOR_NS cannot be used with ENABLE_RME" )
endif
e n d i f
# Secure SME/SVE requires the non-secure component as well
i f e q ( $ { E N A B L E _ S M E _ F O R _ S W D } , 1 )
ifeq ( ${ ENABLE_SME_FOR_NS } ,0)
$( error "ENABLE_SME_FOR_SWD requires ENABLE_SME_FOR_NS" )
endif
e n d i f
i f e q ( $ { E N A B L E _ S V E _ F O R _ S W D } , 1 )
ifeq ( ${ ENABLE_SVE_FOR_NS } ,0)
$( error "ENABLE_SVE_FOR_SWD requires ENABLE_SVE_FOR_NS" )
endif
e n d i f
# SVE and SME cannot be used with CTX_INCLUDE_FPREGS since secure manager does
# its own context management including FPU registers.
i f e q ( $ { C T X _ I N C L U D E _ F P R E G S } , 1 )
ifeq ( ${ ENABLE_SME_FOR_NS } ,1)
$( error "ENABLE_SME_FOR_NS cannot be used with CTX_INCLUDE_FPREGS" )
endif
ifeq ( ${ ENABLE_SVE_FOR_NS } ,1)
# Warning instead of error due to CI dependency on this
$( warning "ENABLE_SVE_FOR_NS cannot be used with CTX_INCLUDE_FPREGS" )
$( warning "Forced ENABLE_SVE_FOR_NS=0" )
override ENABLE_SVE_FOR_NS := 0
endif
e n d i f
################################################################################
# Process platform overrideable behaviour
################################################################################
i f d e f B L 1 _ S O U R C E S
NEED_BL1 := yes
e n d i f
i f d e f B L 2 _ S O U R C E S
NEED_BL2 := yes
# Using BL2 implies that a BL33 image also needs to be supplied for the FIP and
# Certificate generation tools. This flag can be overridden by the platform.
ifdef EL3_PAYLOAD_BASE
# If booting an EL3 payload there is no need for a BL33 image
# in the FIP file.
NEED_BL33 := no
else
ifdef PRELOADED_BL33_BASE
# If booting a BL33 preloaded image there is no need of
# another one in the FIP file.
NEED_BL33 := no
else
NEED_BL33 ?= yes
endif
endif
e n d i f
i f d e f B L 2 U _ S O U R C E S
NEED_BL2U := yes
e n d i f
# If SCP_BL2 is given, we always want FIP to include it.
i f d e f S C P _ B L 2
NEED_SCP_BL2 := yes
e n d i f
# For AArch32, BL31 is not currently supported.
i f n e q ( $ { A R C H } , a a r c h 3 2 )
ifdef BL31_SOURCES
# When booting an EL3 payload, there is no need to compile the BL31 image nor
# put it in the FIP.
ifndef EL3_PAYLOAD_BASE
NEED_BL31 := yes
endif
endif
e n d i f
# Process TBB related flags
i f n e q ( $ { G E N E R A T E _ C O T } , 0 )
# Common cert_create options
ifneq ( ${ CREATE_KEYS } ,0)
$( eval CRT_ARGS += -n)
$( eval FWU_CRT_ARGS += -n)
ifneq ( ${ SAVE_KEYS } ,0)
$( eval CRT_ARGS += -k)
$( eval FWU_CRT_ARGS += -k)
endif
endif
# Include TBBR makefile (unless the platform indicates otherwise)
ifeq ( ${ INCLUDE_TBBR_MK } ,1)
include make_helpers/tbbr/tbbr_tools.mk
endif
e n d i f
fiptool: support --align option to add desired alignment to image offset
The current fiptool packs all the images without any padding between
them. So, the offset to each image has no alignment. This is not
efficient, for example, when the FIP is read from a block-oriented
device.
For example, (e)MMC is accessed by block-addressing. The block size
is 512 byte. So, the best case is each image is aligned by 512 byte
since the DMA engine can transfer the whole of the image to its load
address directly. The worst case is the offset does not have even
DMA-capable alignment (this is where we stand now). In this case,
we need to transfer every block to a bounce buffer, then do memcpy()
from the bounce buffer to our final destination. At least, this
should work with the abstraction by the block I/O layer, but the
CPU-intervention for the whole data transfer makes it really slow.
This commit adds a new option --align to the fiptool. This option,
if given, requests the tool to align each component in the FIP file
by the specified byte. Also, add a new Make option FIP_ALIGN for
easier access to this feature; users can give something like
FIP_ALIGN=512 from the command line, or add "FIP_ALIGN := 512" to
their platform.mk file.
Signed-off-by: Masahiro Yamada <yamada.masahiro@socionext.com>
8 years ago
i f n e q ( $ { F I P _ A L I G N } , 0 )
FIP_ARGS += --align ${ FIP_ALIGN }
e n d i f
i f d e f F D T _ S O U R C E S
NEED_FDT := yes
e n d i f
################################################################################
# Include libraries' Makefile that are used in all BL
################################################################################
i n c l u d e l i b / s t a c k _ p r o t e c t o r / s t a c k _ p r o t e c t o r . m k
################################################################################
# Auxiliary tools (fiptool, cert_create, etc)
################################################################################
# Variables for use with Certificate Generation Tool
CRTTOOLPATH ?= tools/cert_create
CRTTOOL ?= ${ CRTTOOLPATH } /cert_create${ BIN_EXT }
# Variables for use with Firmware Encryption Tool
ENCTOOLPATH ?= tools/encrypt_fw
ENCTOOL ?= ${ ENCTOOLPATH } /encrypt_fw${ BIN_EXT }
# Variables for use with Firmware Image Package
FIPTOOLPATH ?= tools/fiptool
FIPTOOL ?= ${ FIPTOOLPATH } /fiptool${ BIN_EXT }
# Variables for use with sptool
SPTOOLPATH ?= tools/sptool
SPTOOL ?= ${ SPTOOLPATH } /sptool${ BIN_EXT }
SP_MK_GEN ?= ${ SPTOOLPATH } /sp_mk_generator.py
# Variables for use with ROMLIB
ROMLIBPATH ?= lib/romlib
# Variable for use with Python
PYTHON ?= python3
# Variables for use with PRINT_MEMORY_MAP
PRINT_MEMORY_MAP_PATH ?= tools/memory
PRINT_MEMORY_MAP ?= ${ PRINT_MEMORY_MAP_PATH } /print_memory_map.py
# Variables for use with documentation build using Sphinx tool
DOCS_PATH ?= docs
################################################################################
# Include BL specific makefiles
################################################################################
i f e q ( $ { N E E D _ B L 1 } , y e s )
i n c l u d e b l 1 / b l 1 . m k
e n d i f
i f e q ( $ { N E E D _ B L 2 } , y e s )
i n c l u d e b l 2 / b l 2 . m k
e n d i f
i f e q ( $ { N E E D _ B L 2 U } , y e s )
i n c l u d e b l 2 u / b l 2 u . m k
e n d i f
i f e q ( $ { N E E D _ B L 3 1 } , y e s )
i n c l u d e b l 3 1 / b l 3 1 . m k
e n d i f
Makefile: Add ability to build dtb
This is a revamp of the original approach in:
https://github.com/ARM-software/arm-trusted-firmware/pull/747
Current build system has no means to automatically generate dtbs from
dts, instead, stores the dtbs in the fdts/ folder. While this makes
perfect sense for many reference platforms, this becomes a minor
breakage in development flow for newer platforms.
However, this can be solved by providing a rule for the dtbs while
building the ATF binaries by purely describing which dts sources we
need.
For example, with this change, we will now be able to describe the
dtbs we need for the platform in the corresponding platform.mk file:
FDT_SOURCES += fdts/abc.dts
This should be able to generate the abc.dtb appropriately.
Since device trees are specification of hardware, we don't tie the rule
to any specific BL, instead a generic rule is introduced.
Further, this approach allows us to generate appropriate dtbs which may be
need to be regenerated when a common dtsi gets updated, by just
restricting changes to the dtsi alone, instead of synchronizing all the
dtbs as well.
If dtc is not available in default paths, but is available in an
alternate location, it can be chosen by overriding the DTC variable
such as 'make DTC=~/dtc/dtc ....`
NOTE: dtbs are built only with the explicit make dtbs command. The rule
is only available if the platform defines a FDT_SOURCES variable.
Signed-off-by: Benjamin Fair <b-fair@ti.com>
Signed-off-by: Nishanth Menon <nm@ti.com>
8 years ago
################################################################################
# Build options checks
################################################################################
$( eval $ ( call assert_booleans ,\
$( sort \
ALLOW_RO_XLAT_TABLES \
BL2_ENABLE_SP_LOAD \
COLD_BOOT_SINGLE_CPU \
CREATE_KEYS \
CTX_INCLUDE_AARCH32_REGS \
CTX_INCLUDE_FPREGS \
CTX_INCLUDE_PAUTH_REGS \
CTX_INCLUDE_MTE_REGS \
CTX_INCLUDE_EL2_REGS \
CTX_INCLUDE_NEVE_REGS \
DEBUG \
DISABLE_MTPMU \
DYN_DISABLE_AUTH \
EL3_EXCEPTION_HANDLING \
ENABLE_AMU \
ENABLE_AMU_AUXILIARY_COUNTERS \
ENABLE_AMU_FCONF \
AMU_RESTRICT_COUNTERS \
ENABLE_ASSERTIONS \
ENABLE_MPAM_FOR_LOWER_ELS \
ENABLE_PIE \
ENABLE_PMF \
ENABLE_PSCI_STAT \
ENABLE_RME \
ENABLE_RUNTIME_INSTRUMENTATION \
ENABLE_SME_FOR_NS \
ENABLE_SME_FOR_SWD \
ENABLE_SPE_FOR_LOWER_ELS \
ENABLE_SVE_FOR_NS \
ENABLE_SVE_FOR_SWD \
ERROR_DEPRECATED \
FAULT_INJECTION_SUPPORT \
GENERATE_COT \
GICV2_G0_FOR_EL3 \
HANDLE_EA_EL3_FIRST \
HW_ASSISTED_COHERENCY \
INVERTED_MEMMAP \
MEASURED_BOOT \
NS_TIMER_SWITCH \
OVERRIDE_LIBC \
PL011_GENERIC_UART \
PROGRAMMABLE_RESET_ADDRESS \
PSCI_EXTENDED_STATE_ID \
RAS_EXTENSION \
RESET_TO_BL31 \
SAVE_KEYS \
SEPARATE_CODE_AND_RODATA \
SEPARATE_NOBITS_REGION \
SPIN_ON_BL1_EXIT \
SPM_MM \
SPMD_SPM_AT_SEL2 \
TRUSTED_BOARD_BOOT \
USE_COHERENT_MEM \
USE_DEBUGFS \
ARM_IO_IN_DTB \
SDEI_IN_FCONF \
SEC_INT_DESC_IN_FCONF \
USE_ROMLIB \
USE_TBBR_DEFS \
WARMBOOT_ENABLE_DCACHE_EARLY \
BL2_AT_EL3 \
BL2_IN_XIP_MEM \
BL2_INV_DCACHE \
USE_SPINLOCK_CAS \
ENCRYPT_BL31 \
ENCRYPT_BL32 \
ERRATA_SPECULATIVE_AT \
RAS_TRAP_LOWER_EL_ERR_ACCESS \
COT_DESC_IN_DTB \
USE_SP804_TIMER \
ENABLE_FEAT_RNG \
ENABLE_FEAT_SB \
PSA_FWU_SUPPORT \
ENABLE_TRBE_FOR_NS \
ENABLE_SYS_REG_TRACE_FOR_NS \
ENABLE_TRF_FOR_NS \
ENABLE_FEAT_HCX \
ENABLE_MPMM \
ENABLE_MPMM_FCONF \
) ) )
$( eval $ ( call assert_numerics ,\
$( sort \
ARM_ARCH_MAJOR \
ARM_ARCH_MINOR \
BRANCH_PROTECTION \
FW_ENC_STATUS \
NR_OF_FW_BANKS \
NR_OF_IMAGES_IN_FW_BANK \
) ) )
i f d e f K E Y _ S I Z E
$( eval $( call assert_numeric,KEY_SIZE) )
e n d i f
i f e q ( $( filter $ ( SANITIZE_UB ) , on off trap ) , )
$( error "Invalid value for SANITIZE_UB: can be one of on, off, trap" )
e n d i f
################################################################################
# Add definitions to the cpp preprocessor based on the current build options.
# This is done after including the platform specific makefile to allow the
# platform to overwrite the default options
################################################################################
$( eval $ ( call add_defines ,\
$( sort \
ALLOW_RO_XLAT_TABLES \
ARM_ARCH_MAJOR \
ARM_ARCH_MINOR \
BL2_ENABLE_SP_LOAD \
COLD_BOOT_SINGLE_CPU \
CTX_INCLUDE_AARCH32_REGS \
CTX_INCLUDE_FPREGS \
CTX_INCLUDE_PAUTH_REGS \
EL3_EXCEPTION_HANDLING \
CTX_INCLUDE_MTE_REGS \
CTX_INCLUDE_EL2_REGS \
CTX_INCLUDE_NEVE_REGS \
DECRYPTION_SUPPORT_${ DECRYPTION_SUPPORT } \
DISABLE_MTPMU \
ENABLE_AMU \
ENABLE_AMU_AUXILIARY_COUNTERS \
ENABLE_AMU_FCONF \
AMU_RESTRICT_COUNTERS \
ENABLE_ASSERTIONS \
ENABLE_BTI \
ENABLE_MPAM_FOR_LOWER_ELS \
ENABLE_PAUTH \
ENABLE_PIE \
ENABLE_PMF \
ENABLE_PSCI_STAT \
ENABLE_RME \
ENABLE_RUNTIME_INSTRUMENTATION \
ENABLE_SME_FOR_NS \
ENABLE_SME_FOR_SWD \
ENABLE_SPE_FOR_LOWER_ELS \
ENABLE_SVE_FOR_NS \
ENABLE_SVE_FOR_SWD \
ENCRYPT_BL31 \
ENCRYPT_BL32 \
ERROR_DEPRECATED \
FAULT_INJECTION_SUPPORT \
GICV2_G0_FOR_EL3 \
HANDLE_EA_EL3_FIRST \
HW_ASSISTED_COHERENCY \
LOG_LEVEL \
MEASURED_BOOT \
NS_TIMER_SWITCH \
PL011_GENERIC_UART \
PLAT_${ PLAT } \
PROGRAMMABLE_RESET_ADDRESS \
PSCI_EXTENDED_STATE_ID \
RAS_EXTENSION \
RESET_TO_BL31 \
SEPARATE_CODE_AND_RODATA \
SEPARATE_NOBITS_REGION \
RECLAIM_INIT_CODE \
SPD_${ SPD } \
SPIN_ON_BL1_EXIT \
SPM_MM \
SPMD_SPM_AT_SEL2 \
TRUSTED_BOARD_BOOT \
TRNG_SUPPORT \
USE_COHERENT_MEM \
USE_DEBUGFS \
ARM_IO_IN_DTB \
SDEI_IN_FCONF \
SEC_INT_DESC_IN_FCONF \
USE_ROMLIB \
USE_TBBR_DEFS \
WARMBOOT_ENABLE_DCACHE_EARLY \
BL2_AT_EL3 \
BL2_IN_XIP_MEM \
BL2_INV_DCACHE \
USE_SPINLOCK_CAS \
ERRATA_SPECULATIVE_AT \
RAS_TRAP_LOWER_EL_ERR_ACCESS \
COT_DESC_IN_DTB \
USE_SP804_TIMER \
ENABLE_FEAT_RNG \
ENABLE_FEAT_SB \
NR_OF_FW_BANKS \
NR_OF_IMAGES_IN_FW_BANK \
PSA_FWU_SUPPORT \
ENABLE_TRBE_FOR_NS \
ENABLE_SYS_REG_TRACE_FOR_NS \
ENABLE_TRF_FOR_NS \
ENABLE_FEAT_HCX \
ENABLE_MPMM \
ENABLE_MPMM_FCONF \
) ) )
i f e q ( $ { S A N I T I Z E _ U B } , t r a p )
$( eval $( call add_define,MONITOR_TRAPS) )
e n d i f
# Define the EL3_PAYLOAD_BASE flag only if it is provided.
i f d e f E L 3 _ P A Y L O A D _ B A S E
$( eval $( call add_define,EL3_PAYLOAD_BASE) )
e l s e
# Define the PRELOADED_BL33_BASE flag only if it is provided and
# EL3_PAYLOAD_BASE is not defined, as it has priority.
ifdef PRELOADED_BL33_BASE
$( eval $( call add_define,PRELOADED_BL33_BASE) )
endif
e n d i f
# Define the DYN_DISABLE_AUTH flag only if set.
i f e q ( $ { D Y N _ D I S A B L E _ A U T H } , 1 )
$( eval $ ( call add_define ,DYN_DISABLE_AUTH ) )
e n d i f
i f n e q ( $( findstring armlink ,$ ( notdir $ ( LD ) ) ) , )
$( eval $ ( call add_define ,USE_ARM_LINK ) )
e n d i f
# Generate and include sp_gen.mk if SPD is spmd and SP_LAYOUT_FILE is defined
i f e q ( $ { S P D } , s p m d )
i f d e f S P _ L A Y O U T _ F I L E
-include $( BUILD_PLAT) /sp_gen.mk
FIP_DEPS += sp
CRT_DEPS += sp
NEED_SP_PKG := yes
e l s e
ifeq ( ${ SPMD_SPM_AT_SEL2 } ,1)
$( error "SPMD with SPM at S-EL2 require SP_LAYOUT_FILE" )
endif
e n d i f
e n d i f
################################################################################
# Build targets
################################################################################
.PHONY : all msg_start clean realclean distclean cscope locate -checkpatch checkcodebase checkpatch fiptool sptool fip sp fwu_fip certtool dtbs memmap doc enctool
.SUFFIXES :
all : msg_start
msg_start :
@echo " Building ${ PLAT } "
i f e q ( $ { E R R O R _ D E P R E C A T E D } , 0 )
# Check if deprecated declarations and cpp warnings should be treated as error or not.
i f n e q ( $( findstring clang ,$ ( notdir $ ( CC ) ) ) , )
CPPFLAGS += -Wno-error= deprecated-declarations
e l s e
CPPFLAGS += -Wno-error= deprecated-declarations -Wno-error= cpp
e n d i f
e n d i f # !ERROR_DEPRECATED
$( eval $ ( call MAKE_LIB_DIRS ) )
$( eval $ ( call MAKE_LIB ,c ) )
# Expand build macros for the different images
i f e q ( $ { N E E D _ B L 1 } , y e s )
BL1_SOURCES := $( sort ${ BL1_SOURCES } )
$( eval $ ( call MAKE_BL ,bl 1) )
e n d i f
i f e q ( $ { N E E D _ B L 2 } , y e s )
i f e q ( $ { B L 2 _ A T _ E L 3 } , 0 )
FIP_BL2_ARGS := tb-fw
e n d i f
BL2_SOURCES := $( sort ${ BL2_SOURCES } )
$( if $ {BL 2}, $ ( eval $ ( call TOOL_ADD_IMG ,bl 2,--$ {FIP_BL 2_ARGS }) ) ,\
$( eval $( call MAKE_BL,bl2,${ FIP_BL2_ARGS } ) ) )
e n d i f
i f e q ( $ { N E E D _ S C P _ B L 2 } , y e s )
$( eval $ ( call TOOL_ADD_IMG ,scp_bl 2,--scp -fw ) )
e n d i f
i f e q ( $ { N E E D _ B L 3 1 } , y e s )
BL31_SOURCES += ${ SPD_SOURCES }
# Sort BL31 source files to remove duplicates
BL31_SOURCES := $( sort ${ BL31_SOURCES } )
i f n e q ( $ { D E C R Y P T I O N _ S U P P O R T } , n o n e )
$( if $ {BL 31}, $ ( eval $ ( call TOOL_ADD_IMG ,bl 31,--soc -fw ,,$ ( ENCRYPT_BL 31) ) ) ,\
$( eval $( call MAKE_BL,bl31,soc-fw,,$( ENCRYPT_BL31) ) ) )
e l s e
$( if $ {BL 31}, $ ( eval $ ( call TOOL_ADD_IMG ,bl 31,--soc -fw ) ) ,\
$( eval $( call MAKE_BL,bl31,soc-fw) ) )
e n d i f
e n d i f
# If a BL32 image is needed but neither BL32 nor BL32_SOURCES is defined, the
# build system will call TOOL_ADD_IMG to print a warning message and abort the
# process. Note that the dependency on BL32 applies to the FIP only.
i f e q ( $ { N E E D _ B L 3 2 } , y e s )
# Sort BL32 source files to remove duplicates
BL32_SOURCES := $( sort ${ BL32_SOURCES } )
BUILD_BL32 := $( if $( BL32) ,,$( if $( BL32_SOURCES) ,1) )
i f n e q ( $ { D E C R Y P T I O N _ S U P P O R T } , n o n e )
$( if $ {BUILD_BL 32}, $ ( eval $ ( call MAKE_BL ,bl 32,tos -fw ,,$ ( ENCRYPT_BL 32) ) ) ,\
$( eval $( call TOOL_ADD_IMG,bl32,--tos-fw,,$( ENCRYPT_BL32) ) ) )
e l s e
$( if $ {BUILD_BL 32}, $ ( eval $ ( call MAKE_BL ,bl 32,tos -fw ) ) ,\
$( eval $( call TOOL_ADD_IMG,bl32,--tos-fw) ) )
e n d i f
e n d i f
# If RMM image is needed but RMM is not defined, Test Realm Payload (TRP)
# needs to be built from RMM_SOURCES.
i f e q ( $ { N E E D _ R M M } , y e s )
# Sort RMM source files to remove duplicates
RMM_SOURCES := $( sort ${ RMM_SOURCES } )
BUILD_RMM := $( if $( RMM) ,,$( if $( RMM_SOURCES) ,1) )
$( if $ {BUILD_RMM }, $ ( eval $ ( call MAKE_BL ,rmm ,rmm -fw ) ) ,\
$( eval $( call TOOL_ADD_IMG,rmm,--rmm-fw) ) )
e n d i f
# Add the BL33 image if required by the platform
i f e q ( $ { N E E D _ B L 3 3 } , y e s )
$( eval $ ( call TOOL_ADD_IMG ,bl 33,--nt -fw ) )
e n d i f
i f e q ( $ { N E E D _ B L 2 U } , y e s )
$( if $ {BL 2U }, $ ( eval $ ( call TOOL_ADD_IMG ,bl 2u ,--ap -fwu -cfg ,FWU_ ) ) ,\
$( eval $( call MAKE_BL,bl2u,ap-fwu-cfg,FWU_) ) )
e n d i f
Makefile: Add ability to build dtb
This is a revamp of the original approach in:
https://github.com/ARM-software/arm-trusted-firmware/pull/747
Current build system has no means to automatically generate dtbs from
dts, instead, stores the dtbs in the fdts/ folder. While this makes
perfect sense for many reference platforms, this becomes a minor
breakage in development flow for newer platforms.
However, this can be solved by providing a rule for the dtbs while
building the ATF binaries by purely describing which dts sources we
need.
For example, with this change, we will now be able to describe the
dtbs we need for the platform in the corresponding platform.mk file:
FDT_SOURCES += fdts/abc.dts
This should be able to generate the abc.dtb appropriately.
Since device trees are specification of hardware, we don't tie the rule
to any specific BL, instead a generic rule is introduced.
Further, this approach allows us to generate appropriate dtbs which may be
need to be regenerated when a common dtsi gets updated, by just
restricting changes to the dtsi alone, instead of synchronizing all the
dtbs as well.
If dtc is not available in default paths, but is available in an
alternate location, it can be chosen by overriding the DTC variable
such as 'make DTC=~/dtc/dtc ....`
NOTE: dtbs are built only with the explicit make dtbs command. The rule
is only available if the platform defines a FDT_SOURCES variable.
Signed-off-by: Benjamin Fair <b-fair@ti.com>
Signed-off-by: Nishanth Menon <nm@ti.com>
8 years ago
# Expand build macros for the different images
i f e q ( $ { N E E D _ F D T } , y e s )
$( eval $( call MAKE_DTBS,$( BUILD_PLAT) /fdts,$( FDT_SOURCES) ) )
Makefile: Add ability to build dtb
This is a revamp of the original approach in:
https://github.com/ARM-software/arm-trusted-firmware/pull/747
Current build system has no means to automatically generate dtbs from
dts, instead, stores the dtbs in the fdts/ folder. While this makes
perfect sense for many reference platforms, this becomes a minor
breakage in development flow for newer platforms.
However, this can be solved by providing a rule for the dtbs while
building the ATF binaries by purely describing which dts sources we
need.
For example, with this change, we will now be able to describe the
dtbs we need for the platform in the corresponding platform.mk file:
FDT_SOURCES += fdts/abc.dts
This should be able to generate the abc.dtb appropriately.
Since device trees are specification of hardware, we don't tie the rule
to any specific BL, instead a generic rule is introduced.
Further, this approach allows us to generate appropriate dtbs which may be
need to be regenerated when a common dtsi gets updated, by just
restricting changes to the dtsi alone, instead of synchronizing all the
dtbs as well.
If dtc is not available in default paths, but is available in an
alternate location, it can be chosen by overriding the DTC variable
such as 'make DTC=~/dtc/dtc ....`
NOTE: dtbs are built only with the explicit make dtbs command. The rule
is only available if the platform defines a FDT_SOURCES variable.
Signed-off-by: Benjamin Fair <b-fair@ti.com>
Signed-off-by: Nishanth Menon <nm@ti.com>
8 years ago
e n d i f
# Add Secure Partition packages
i f e q ( $ { N E E D _ S P _ P K G } , y e s )
$(BUILD_PLAT)/sp_gen.mk : ${SP_MK_GEN } ${SP_LAYOUT_FILE } | ${BUILD_PLAT }
${ Q } ${ PYTHON } " $< " " $@ " $( filter-out $<,$^) $( BUILD_PLAT) ${ COT }
sp : $( SPTOOL ) $( DTBS ) $( BUILD_PLAT ) /sp_gen .mk
${ Q } $( SPTOOL) $( SPTOOL_ARGS)
@${ ECHO_BLANK_LINE }
@echo "Built SP Images successfully"
@${ ECHO_BLANK_LINE }
e n d i f
locate-checkpatch :
i f n d e f C H E C K P A T C H
$( error "Please set CHECKPATCH to point to the Linux checkpatch.pl file, eg: CHECKPATCH=../linux/scripts/checkpatch.pl" )
e l s e
i f e q ( , $( wildcard $ {CHECKPATCH }) )
$( error "The file CHECKPATCH points to cannot be found, use eg: CHECKPATCH=../linux/scripts/checkpatch.pl" )
e n d i f
e n d i f
clean :
@echo " CLEAN"
$( call SHELL_REMOVE_DIR,${ BUILD_PLAT } )
i f d e f U N I X _ M K
${ Q } ${ MAKE } --no-print-directory -C ${ FIPTOOLPATH } clean
e l s e
# Clear the MAKEFLAGS as we do not want
# to pass the gnumake flags to nmake.
${ Q } set MAKEFLAGS = && ${ MSVC_NMAKE } /nologo /f ${ FIPTOOLPATH } /Makefile.msvc FIPTOOLPATH = $( subst /,\, $( FIPTOOLPATH) ) FIPTOOL = $( subst /,\, $( FIPTOOL) ) clean
e n d i f
${ Q } ${ MAKE } PLAT = ${ PLAT } --no-print-directory -C ${ CRTTOOLPATH } clean
${ Q } ${ MAKE } PLAT = ${ PLAT } --no-print-directory -C ${ ENCTOOLPATH } clean
${ Q } ${ MAKE } --no-print-directory -C ${ ROMLIBPATH } clean
realclean distclean :
@echo " REALCLEAN"
$( call SHELL_REMOVE_DIR,${ BUILD_BASE } )
$( call SHELL_DELETE_ALL, ${ CURDIR } /cscope.*)
i f d e f U N I X _ M K
${ Q } ${ MAKE } --no-print-directory -C ${ FIPTOOLPATH } clean
e l s e
# Clear the MAKEFLAGS as we do not want
# to pass the gnumake flags to nmake.
${ Q } set MAKEFLAGS = && ${ MSVC_NMAKE } /nologo /f ${ FIPTOOLPATH } /Makefile.msvc FIPTOOLPATH = $( subst /,\, $( FIPTOOLPATH) ) FIPTOOL = $( subst /,\, $( FIPTOOL) ) realclean
e n d i f
${ Q } ${ MAKE } --no-print-directory -C ${ SPTOOLPATH } clean
${ Q } ${ MAKE } PLAT = ${ PLAT } --no-print-directory -C ${ CRTTOOLPATH } clean
${ Q } ${ MAKE } PLAT = ${ PLAT } --no-print-directory -C ${ ENCTOOLPATH } realclean
${ Q } ${ MAKE } --no-print-directory -C ${ ROMLIBPATH } clean
checkcodebase : locate -checkpatch
@echo " CHECKING STYLE"
@if test -d .git ; then \
git ls-files | grep -E -v 'libfdt|libc|docs|\.rst' | \
while read GIT_FILE ; \
do ${ CHECKPATCH } ${ CHECKCODE_ARGS } -f $$ GIT_FILE ; \
done ; \
else \
find . -type f -not -iwholename "*.git*" \
-not -iwholename "*build*" \
-not -iwholename "*libfdt*" \
-not -iwholename "*libc*" \
-not -iwholename "*docs*" \
-not -iwholename "*.rst" \
-exec ${ CHECKPATCH } ${ CHECKCODE_ARGS } -f { } \; ; \
fi
checkpatch : locate -checkpatch
@echo " CHECKING STYLE"
@if test -n " ${ CHECKPATCH_OPTS } " ; then \
echo " with ${ CHECKPATCH_OPTS } option(s) " ; \
fi
${ Q } COMMON_COMMIT = $$ ( git merge-base HEAD ${ BASE_COMMIT } ) ; \
for commit in ` git rev-list --no-merges $$ COMMON_COMMIT..HEAD` ; \
do \
printf " \n[*] Checking style of ' $$ commit'\n\n " ; \
git log --format= email " $$ commit~.. $$ commit " \
-- ${ CHECK_PATHS } | \
${ CHECKPATCH } ${ CHECKPATCH_OPTS } - || true; \
git diff --format= email " $$ commit~.. $$ commit " \
-- ${ CHECK_PATHS } | \
${ CHECKPATCH } ${ CHECKPATCH_OPTS } - || true; \
done
certtool : ${CRTTOOL }
${CRTTOOL} : FORCE
${ Q } ${ MAKE } PLAT = ${ PLAT } USE_TBBR_DEFS = ${ USE_TBBR_DEFS } COT = ${ COT } OPENSSL_DIR = ${ OPENSSL_DIR } CRTTOOL = ${ CRTTOOL } --no-print-directory -C ${ CRTTOOLPATH }
@${ ECHO_BLANK_LINE }
@echo " Built $@ successfully "
@${ ECHO_BLANK_LINE }
i f n e q ( $ { G E N E R A T E _ C O T } , 0 )
certificates : ${CRT_DEPS } ${CRTTOOL }
${ Q } ${ CRTTOOL } ${ CRT_ARGS }
@${ ECHO_BLANK_LINE }
@echo " Built $@ successfully "
@echo " Certificates can be found in ${ BUILD_PLAT } "
@${ ECHO_BLANK_LINE }
e n d i f
${BUILD_PLAT}/${FIP_NAME} : ${FIP_DEPS } ${FIPTOOL }
$( eval ${ CHECK_FIP_CMD } )
${ Q } ${ FIPTOOL } create ${ FIP_ARGS } $@
${ Q } ${ FIPTOOL } info $@
@${ ECHO_BLANK_LINE }
@echo " Built $@ successfully "
@${ ECHO_BLANK_LINE }
i f n e q ( $ { G E N E R A T E _ C O T } , 0 )
fwu_certificates : ${FWU_CRT_DEPS } ${CRTTOOL }
${ Q } ${ CRTTOOL } ${ FWU_CRT_ARGS }
@${ ECHO_BLANK_LINE }
@echo " Built $@ successfully "
@echo " FWU certificates can be found in ${ BUILD_PLAT } "
@${ ECHO_BLANK_LINE }
e n d i f
${BUILD_PLAT}/${FWU_FIP_NAME} : ${FWU_FIP_DEPS } ${FIPTOOL }
$( eval ${ CHECK_FWU_FIP_CMD } )
${ Q } ${ FIPTOOL } create ${ FWU_FIP_ARGS } $@
${ Q } ${ FIPTOOL } info $@
@${ ECHO_BLANK_LINE }
@echo " Built $@ successfully "
@${ ECHO_BLANK_LINE }
fiptool : ${FIPTOOL }
fip : ${BUILD_PLAT }/${FIP_NAME }
fwu_fip : ${BUILD_PLAT }/${FWU_FIP_NAME }
${FIPTOOL} : FORCE
i f d e f U N I X _ M K
${ Q } ${ MAKE } CPPFLAGS = " -DVERSION='\" ${ VERSION_STRING } \"' " FIPTOOL = ${ FIPTOOL } --no-print-directory -C ${ FIPTOOLPATH }
e l s e
# Clear the MAKEFLAGS as we do not want
# to pass the gnumake flags to nmake.
${ Q } set MAKEFLAGS = && ${ MSVC_NMAKE } /nologo /f ${ FIPTOOLPATH } /Makefile.msvc FIPTOOLPATH = $( subst /,\, $( FIPTOOLPATH) ) FIPTOOL = $( subst /,\, $( FIPTOOL) )
e n d i f
sptool : ${SPTOOL }
${SPTOOL} : FORCE
${ Q } ${ MAKE } CPPFLAGS = " -DVERSION='\" ${ VERSION_STRING } \"' " SPTOOL = ${ SPTOOL } --no-print-directory -C ${ SPTOOLPATH }
romlib.bin : libraries FORCE
${ Q } ${ MAKE } PLAT_DIR = ${ PLAT_DIR } BUILD_PLAT = ${ BUILD_PLAT } ENABLE_BTI = ${ ENABLE_BTI } ARM_ARCH_MINOR = ${ ARM_ARCH_MINOR } INCLUDES = '${INCLUDES}' DEFINES = '${DEFINES}' --no-print-directory -C ${ ROMLIBPATH } all
# Call print_memory_map tool
memmap : all
${ Q } ${ PYTHON } ${ PRINT_MEMORY_MAP } ${ BUILD_PLAT } ${ INVERTED_MEMMAP }
doc :
@echo " BUILD DOCUMENTATION"
${ Q } ${ MAKE } --no-print-directory -C ${ DOCS_PATH } html
enctool : ${ENCTOOL }
${ENCTOOL} : FORCE
${ Q } ${ MAKE } PLAT = ${ PLAT } BUILD_INFO = 0 OPENSSL_DIR = ${ OPENSSL_DIR } ENCTOOL = ${ ENCTOOL } --no-print-directory -C ${ ENCTOOLPATH }
@${ ECHO_BLANK_LINE }
@echo " Built $@ successfully "
@${ ECHO_BLANK_LINE }
cscope :
@echo " CSCOPE"
${ Q } find ${ CURDIR } -name "*.[chsS]" > cscope.files
${ Q } cscope -b -q -k
help :
@echo " usage: ${ MAKE } [PLAT=<platform>] [OPTIONS] [TARGET] "
@echo ""
@echo "PLAT is used to specify which platform you wish to build."
@echo " If no platform is specified, PLAT defaults to: ${ DEFAULT_PLAT } "
@echo ""
@echo " platform = ${ PLATFORM_LIST } "
@echo ""
@echo "Please refer to the User Guide for a list of all supported options."
@echo "Note that the build system doesn't track dependencies for build "
@echo "options. Therefore, if any of the build options are changed "
@echo "from a previous build, a clean build must be performed."
@echo ""
@echo "Supported Targets:"
@echo " all Build all individual bootloader binaries"
@echo " bl1 Build the BL1 binary"
@echo " bl2 Build the BL2 binary"
@echo " bl2u Build the BL2U binary"
@echo " bl31 Build the BL31 binary"
@echo " bl32 Build the BL32 binary. If ARCH=aarch32, then "
@echo " this builds secure payload specified by AARCH32_SP"
@echo " certificates Build the certificates (requires 'GENERATE_COT=1')"
@echo " fip Build the Firmware Image Package (FIP)"
@echo " fwu_fip Build the FWU Firmware Image Package (FIP)"
@echo " checkcodebase Check the coding style of the entire source tree"
@echo " checkpatch Check the coding style on changes in the current"
@echo " branch against BASE_COMMIT (default origin/master)"
@echo " clean Clean the build for the selected platform"
@echo " cscope Generate cscope index"
@echo " distclean Remove all build artifacts for all platforms"
@echo " certtool Build the Certificate generation tool"
@echo " enctool Build the Firmware encryption tool"
@echo " fiptool Build the Firmware Image Package (FIP) creation tool"
@echo " sp Build the Secure Partition Packages"
@echo " sptool Build the Secure Partition Package creation tool"
@echo " dtbs Build the Device Tree Blobs (if required for the platform)"
@echo " memmap Print the memory map of the built binaries"
@echo " doc Build html based documentation using Sphinx tool"
@echo ""
@echo "Note: most build targets require PLAT to be set to a specific platform."
@echo ""
@echo "example: build all targets for the FVP platform:"
@echo " CROSS_COMPILE=aarch64-none-elf- make PLAT=fvp all"
.PHONY : FORCE
FORCE : ;