2016-10-24 14:31:51 +01:00
|
|
|
#
|
2021-07-12 00:33:20 +01:00
|
|
|
# Copyright (c) 2016-2021, Arm Limited. All rights reserved.
|
2016-10-24 14:31:51 +01:00
|
|
|
#
|
2017-05-03 09:38:09 +01:00
|
|
|
# SPDX-License-Identifier: BSD-3-Clause
|
2016-10-24 14:31:51 +01:00
|
|
|
#
|
|
|
|
|
|
|
|
# Default, static values for build variables, listed in alphabetic order.
|
|
|
|
# Dependencies between build options, if any, are handled in the top-level
|
|
|
|
# Makefile, after this file is included. This ensures that the former is better
|
|
|
|
# poised to handle dependencies, as all build variables would have a default
|
|
|
|
# value by then.
|
|
|
|
|
2018-08-08 16:28:43 +01:00
|
|
|
# Use T32 by default
|
|
|
|
AARCH32_INSTRUCTION_SET := T32
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# The AArch32 Secure Payload to be built as BL32 image
|
|
|
|
AARCH32_SP := none
|
|
|
|
|
|
|
|
# The Target build architecture. Supported values are: aarch64, aarch32.
|
|
|
|
ARCH := aarch64
|
|
|
|
|
2020-12-07 16:38:53 +00:00
|
|
|
# ARM Architecture feature modifiers: none by default
|
|
|
|
ARM_ARCH_FEATURE := none
|
|
|
|
|
2017-01-16 16:52:35 +00:00
|
|
|
# ARM Architecture major and minor versions: 8.0 by default.
|
|
|
|
ARM_ARCH_MAJOR := 8
|
|
|
|
ARM_ARCH_MINOR := 0
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# Base commit to perform code check on
|
|
|
|
BASE_COMMIT := origin/master
|
|
|
|
|
2017-10-30 14:43:43 +00:00
|
|
|
# Execute BL2 at EL3
|
|
|
|
BL2_AT_EL3 := 0
|
|
|
|
|
2021-03-26 15:23:18 +00:00
|
|
|
# Only use SP packages if SP layout JSON is defined
|
|
|
|
BL2_ENABLE_SP_LOAD := 0
|
|
|
|
|
2018-03-21 07:20:09 +00:00
|
|
|
# BL2 image is stored in XIP memory, for now, this option is only supported
|
|
|
|
# when BL2_AT_EL3 is 1.
|
|
|
|
BL2_IN_XIP_MEM := 0
|
|
|
|
|
2019-08-20 08:33:27 +01:00
|
|
|
# Do dcache invalidate upon BL2 entry at EL3
|
|
|
|
BL2_INV_DCACHE := 1
|
|
|
|
|
2019-05-24 12:17:09 +01:00
|
|
|
# Select the branch protection features to use.
|
|
|
|
BRANCH_PROTECTION := 0
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# By default, consider that the platform may release several CPUs out of reset.
|
|
|
|
# The platform Makefile is free to override this value.
|
|
|
|
COLD_BOOT_SINGLE_CPU := 0
|
|
|
|
|
2017-06-09 23:17:15 +01:00
|
|
|
# Flag to compile in coreboot support code. Exclude by default. The coreboot
|
|
|
|
# Makefile system will set this when compiling TF as part of a coreboot image.
|
|
|
|
COREBOOT := 0
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# For Chain of Trust
|
|
|
|
CREATE_KEYS := 1
|
|
|
|
|
|
|
|
# Build flag to include AArch32 registers in cpu context save and restore during
|
|
|
|
# world switch. This flag must be set to 0 for AArch64-only platforms.
|
|
|
|
CTX_INCLUDE_AARCH32_REGS := 1
|
|
|
|
|
|
|
|
# Include FP registers in cpu context
|
|
|
|
CTX_INCLUDE_FPREGS := 0
|
|
|
|
|
2019-01-31 11:58:00 +00:00
|
|
|
# Include pointer authentication (ARMv8.3-PAuth) registers in cpu context. This
|
|
|
|
# must be set to 1 if the platform wants to use this feature in the Secure
|
|
|
|
# world. It is not needed to use it in the Non-secure world.
|
|
|
|
CTX_INCLUDE_PAUTH_REGS := 0
|
|
|
|
|
2020-05-28 11:57:09 +01:00
|
|
|
# Include Nested virtualization control (Armv8.4-NV) registers in cpu context.
|
|
|
|
# This must be set to 1 if architecture implements Nested Virtualization
|
|
|
|
# Extension and platform wants to use this feature in the Secure world
|
|
|
|
CTX_INCLUDE_NEVE_REGS := 0
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# Debug build
|
|
|
|
DEBUG := 0
|
|
|
|
|
2019-11-15 05:13:00 +00:00
|
|
|
# By default disable authenticated decryption support.
|
|
|
|
DECRYPTION_SUPPORT := none
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# Build platform
|
|
|
|
DEFAULT_PLAT := fvp
|
|
|
|
|
2019-04-24 08:45:30 +01:00
|
|
|
# Disable the generation of the binary image (ELF only).
|
|
|
|
DISABLE_BIN_GENERATION := 0
|
|
|
|
|
2020-11-23 18:38:15 +00:00
|
|
|
# Disable MTPMU if FEAT_MTPMU is supported. Default is 0 to keep backwards
|
|
|
|
# compatibility.
|
|
|
|
DISABLE_MTPMU := 0
|
|
|
|
|
2018-03-26 12:43:37 +01:00
|
|
|
# Enable capability to disable authentication dynamically. Only meant for
|
|
|
|
# development platforms.
|
|
|
|
DYN_DISABLE_AUTH := 0
|
|
|
|
|
2018-07-31 16:13:33 +01:00
|
|
|
# Build option to enable MPAM for lower ELs
|
|
|
|
ENABLE_MPAM_FOR_LOWER_ELS := 0
|
|
|
|
|
2021-05-05 13:38:30 +01:00
|
|
|
# Enable the Maximum Power Mitigation Mechanism on supporting cores.
|
|
|
|
ENABLE_MPMM := 0
|
|
|
|
|
|
|
|
# Enable MPMM configuration via FCONF.
|
|
|
|
ENABLE_MPMM_FCONF := 0
|
|
|
|
|
2018-08-28 11:13:55 +01:00
|
|
|
# Flag to Enable Position Independant support (PIE)
|
|
|
|
ENABLE_PIE := 0
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# Flag to enable Performance Measurement Framework
|
|
|
|
ENABLE_PMF := 0
|
|
|
|
|
|
|
|
# Flag to enable PSCI STATs functionality
|
|
|
|
ENABLE_PSCI_STAT := 0
|
|
|
|
|
2021-07-12 00:33:20 +01:00
|
|
|
# Flag to enable Realm Management Extension (FEAT_RME)
|
|
|
|
ENABLE_RME := 0
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# Flag to enable runtime instrumentation using PMF
|
|
|
|
ENABLE_RUNTIME_INSTRUMENTATION := 0
|
|
|
|
|
2017-02-24 18:14:15 +00:00
|
|
|
# Flag to enable stack corruption protection
|
|
|
|
ENABLE_STACK_PROTECTOR := 0
|
|
|
|
|
2017-09-22 08:32:10 +01:00
|
|
|
# Flag to enable exception handling in EL3
|
|
|
|
EL3_EXCEPTION_HANDLING := 0
|
|
|
|
|
2019-05-24 12:17:09 +01:00
|
|
|
# Flag to enable Branch Target Identification.
|
|
|
|
# Internal flag not meant for direct setting.
|
|
|
|
# Use BRANCH_PROTECTION to enable BTI.
|
|
|
|
ENABLE_BTI := 0
|
|
|
|
|
|
|
|
# Flag to enable Pointer Authentication.
|
|
|
|
# Internal flag not meant for direct setting.
|
|
|
|
# Use BRANCH_PROTECTION to enable PAUTH.
|
2019-02-19 11:53:51 +00:00
|
|
|
ENABLE_PAUTH := 0
|
|
|
|
|
2021-08-05 01:38:18 +01:00
|
|
|
# Flag to enable access to the HCRX_EL2 register by setting SCR_EL3.HXEn.
|
|
|
|
ENABLE_FEAT_HCX := 0
|
|
|
|
|
2019-11-14 11:03:45 +00:00
|
|
|
# By default BL31 encryption disabled
|
|
|
|
ENCRYPT_BL31 := 0
|
|
|
|
|
|
|
|
# By default BL32 encryption disabled
|
|
|
|
ENCRYPT_BL32 := 0
|
|
|
|
|
|
|
|
# Default dummy firmware encryption key
|
|
|
|
ENC_KEY := 1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef
|
|
|
|
|
|
|
|
# Default dummy nonce for firmware encryption
|
|
|
|
ENC_NONCE := 1234567890abcdef12345678
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# Build flag to treat usage of deprecated platform and framework APIs as error.
|
|
|
|
ERROR_DEPRECATED := 0
|
|
|
|
|
2017-12-08 12:13:51 +00:00
|
|
|
# Fault injection support
|
|
|
|
FAULT_INJECTION_SUPPORT := 0
|
|
|
|
|
fiptool: support --align option to add desired alignment to image offset
The current fiptool packs all the images without any padding between
them. So, the offset to each image has no alignment. This is not
efficient, for example, when the FIP is read from a block-oriented
device.
For example, (e)MMC is accessed by block-addressing. The block size
is 512 byte. So, the best case is each image is aligned by 512 byte
since the DMA engine can transfer the whole of the image to its load
address directly. The worst case is the offset does not have even
DMA-capable alignment (this is where we stand now). In this case,
we need to transfer every block to a bounce buffer, then do memcpy()
from the bounce buffer to our final destination. At least, this
should work with the abstraction by the block I/O layer, but the
CPU-intervention for the whole data transfer makes it really slow.
This commit adds a new option --align to the fiptool. This option,
if given, requests the tool to align each component in the FIP file
by the specified byte. Also, add a new Make option FIP_ALIGN for
easier access to this feature; users can give something like
FIP_ALIGN=512 from the command line, or add "FIP_ALIGN := 512" to
their platform.mk file.
Signed-off-by: Masahiro Yamada <yamada.masahiro@socionext.com>
2016-12-25 04:52:22 +00:00
|
|
|
# Byte alignment that each component in FIP is aligned to
|
|
|
|
FIP_ALIGN := 0
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# Default FIP file name
|
|
|
|
FIP_NAME := fip.bin
|
|
|
|
|
|
|
|
# Default FWU_FIP file name
|
|
|
|
FWU_FIP_NAME := fwu_fip.bin
|
|
|
|
|
2019-11-14 11:03:45 +00:00
|
|
|
# By default firmware encryption with SSK
|
|
|
|
FW_ENC_STATUS := 0
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# For Chain of Trust
|
|
|
|
GENERATE_COT := 0
|
|
|
|
|
2017-09-22 08:32:09 +01:00
|
|
|
# Hint platform interrupt control layer that Group 0 interrupts are for EL3. By
|
|
|
|
# default, they are for Secure EL1.
|
|
|
|
GICV2_G0_FOR_EL3 := 0
|
|
|
|
|
2017-11-30 12:54:15 +00:00
|
|
|
# Route External Aborts to EL3. Disabled by default; External Aborts are handled
|
|
|
|
# by lower ELs.
|
|
|
|
HANDLE_EA_EL3_FIRST := 0
|
|
|
|
|
2020-10-06 15:54:12 +01:00
|
|
|
# Secure hash algorithm flag, accepts 3 values: sha256, sha384 and sha512.
|
|
|
|
# The default value is sha256.
|
|
|
|
HASH_ALG := sha256
|
|
|
|
|
2017-01-04 13:51:42 +00:00
|
|
|
# Whether system coherency is managed in hardware, without explicit software
|
|
|
|
# operations.
|
|
|
|
HW_ASSISTED_COHERENCY := 0
|
|
|
|
|
2017-08-31 11:49:32 +01:00
|
|
|
# Set the default algorithm for the generation of Trusted Board Boot keys
|
|
|
|
KEY_ALG := rsa
|
|
|
|
|
2020-06-18 23:32:55 +01:00
|
|
|
# Set the default key size in case KEY_ALG is rsa
|
|
|
|
ifeq ($(KEY_ALG),rsa)
|
|
|
|
KEY_SIZE := 2048
|
|
|
|
endif
|
|
|
|
|
2020-01-23 14:27:38 +00:00
|
|
|
# Option to build TF with Measured Boot support
|
|
|
|
MEASURED_BOOT := 0
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# NS timer register save and restore
|
|
|
|
NS_TIMER_SWITCH := 0
|
|
|
|
|
2019-01-31 17:22:30 +00:00
|
|
|
# Include lib/libc in the final image
|
|
|
|
OVERRIDE_LIBC := 0
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# Build PL011 UART driver in minimal generic UART mode
|
|
|
|
PL011_GENERIC_UART := 0
|
|
|
|
|
|
|
|
# By default, consider that the platform's reset address is not programmable.
|
|
|
|
# The platform Makefile is free to override this value.
|
|
|
|
PROGRAMMABLE_RESET_ADDRESS := 0
|
|
|
|
|
2019-02-28 13:35:21 +00:00
|
|
|
# Flag used to choose the power state format: Extended State-ID or Original
|
2016-10-24 14:31:51 +01:00
|
|
|
PSCI_EXTENDED_STATE_ID := 0
|
|
|
|
|
2018-04-04 16:07:11 +01:00
|
|
|
# Enable RAS support
|
|
|
|
RAS_EXTENSION := 0
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# By default, BL1 acts as the reset handler, not BL31
|
|
|
|
RESET_TO_BL31 := 0
|
|
|
|
|
|
|
|
# For Chain of Trust
|
|
|
|
SAVE_KEYS := 0
|
|
|
|
|
2017-10-16 08:43:14 +01:00
|
|
|
# Software Delegated Exception support
|
|
|
|
SDEI_SUPPORT := 0
|
|
|
|
|
2020-06-22 20:18:42 +01:00
|
|
|
# True Random Number firmware Interface
|
|
|
|
TRNG_SUPPORT := 0
|
|
|
|
|
2020-11-18 16:12:41 +00:00
|
|
|
# SMCCC PCI support
|
|
|
|
SMC_PCI_SUPPORT := 0
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# Whether code and read-only data should be put on separate memory pages. The
|
|
|
|
# platform Makefile is free to override this value.
|
|
|
|
SEPARATE_CODE_AND_RODATA := 0
|
|
|
|
|
2018-10-18 03:40:18 +01:00
|
|
|
# Put NOBITS sections (.bss, stacks, page tables, and coherent memory) in a
|
|
|
|
# separate memory region, which may be discontiguous from the rest of BL31.
|
|
|
|
SEPARATE_NOBITS_REGION := 0
|
|
|
|
|
2018-09-18 11:45:51 +01:00
|
|
|
# If the BL31 image initialisation code is recalimed after use for the secondary
|
|
|
|
# cores stack
|
|
|
|
RECLAIM_INIT_CODE := 0
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# SPD choice
|
|
|
|
SPD := none
|
|
|
|
|
2019-09-16 12:29:03 +01:00
|
|
|
# Enable the Management Mode (MM)-based Secure Partition Manager implementation
|
|
|
|
SPM_MM := 0
|
2018-10-30 11:08:08 +00:00
|
|
|
|
2020-02-25 13:55:00 +00:00
|
|
|
# Use SPM at S-EL2 as a default config for SPMD
|
|
|
|
SPMD_SPM_AT_SEL2 := 1
|
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# Flag to introduce an infinite loop in BL1 just before it exits into the next
|
|
|
|
# image. This is meant to help debugging the post-BL2 phase.
|
|
|
|
SPIN_ON_BL1_EXIT := 0
|
|
|
|
|
|
|
|
# Flags to build TF with Trusted Boot support
|
|
|
|
TRUSTED_BOARD_BOOT := 0
|
|
|
|
|
2018-09-25 09:41:08 +01:00
|
|
|
# Build option to choose whether Trusted Firmware uses Coherent memory or not.
|
2016-10-24 14:31:51 +01:00
|
|
|
USE_COHERENT_MEM := 1
|
|
|
|
|
2019-09-19 16:46:46 +01:00
|
|
|
# Build option to add debugfs support
|
|
|
|
USE_DEBUGFS := 0
|
|
|
|
|
2019-10-24 15:18:46 +01:00
|
|
|
# Build option to fconf based io
|
2019-12-18 14:28:00 +00:00
|
|
|
ARM_IO_IN_DTB := 0
|
|
|
|
|
|
|
|
# Build option to support SDEI through fconf
|
2020-06-02 15:26:30 +01:00
|
|
|
SDEI_IN_FCONF := 0
|
|
|
|
|
|
|
|
# Build option to support Secure Interrupt descriptors through fconf
|
|
|
|
SEC_INT_DESC_IN_FCONF := 0
|
2019-10-24 15:18:46 +01:00
|
|
|
|
2018-09-25 09:41:08 +01:00
|
|
|
# Build option to choose whether Trusted Firmware uses library at ROM
|
|
|
|
USE_ROMLIB := 0
|
2018-05-22 16:05:42 +01:00
|
|
|
|
2019-11-07 15:18:03 +00:00
|
|
|
# Build option to choose whether the xlat tables of BL images can be read-only.
|
|
|
|
# Note that this only serves as a higher level option to PLAT_RO_XLAT_TABLES,
|
|
|
|
# which is the per BL-image option that actually enables the read-only tables
|
|
|
|
# API. The reason for having this additional option is to have a common high
|
|
|
|
# level makefile where we can check for incompatible features/build options.
|
|
|
|
ALLOW_RO_XLAT_TABLES := 0
|
|
|
|
|
2020-01-15 09:23:25 +00:00
|
|
|
# Chain of trust.
|
|
|
|
COT := tbbr
|
|
|
|
|
2017-05-22 04:11:24 +01:00
|
|
|
# Use tbbr_oid.h instead of platform_oid.h
|
2018-09-25 09:41:08 +01:00
|
|
|
USE_TBBR_DEFS := 1
|
2017-05-22 04:11:24 +01:00
|
|
|
|
2016-10-24 14:31:51 +01:00
|
|
|
# Build verbosity
|
|
|
|
V := 0
|
2017-04-10 22:35:42 +01:00
|
|
|
|
|
|
|
# Whether to enable D-Cache early during warm boot. This is usually
|
|
|
|
# applicable for platforms wherein interconnect programming is not
|
|
|
|
# required to enable cache coherency after warm reset (eg: single cluster
|
|
|
|
# platforms).
|
|
|
|
WARMBOOT_ENABLE_DCACHE_EARLY := 0
|
2017-05-23 09:32:49 +01:00
|
|
|
|
2017-10-13 15:07:45 +01:00
|
|
|
# Build option to enable/disable the Statistical Profiling Extensions
|
2017-05-23 09:32:49 +01:00
|
|
|
ENABLE_SPE_FOR_LOWER_ELS := 1
|
|
|
|
|
2017-10-13 15:07:45 +01:00
|
|
|
# SPE is only supported on AArch64 so disable it on AArch32.
|
2017-05-23 09:32:49 +01:00
|
|
|
ifeq (${ARCH},aarch32)
|
|
|
|
override ENABLE_SPE_FOR_LOWER_ELS := 0
|
|
|
|
endif
|
2017-10-16 11:40:10 +01:00
|
|
|
|
2019-07-18 14:25:33 +01:00
|
|
|
# Include Memory Tagging Extension registers in cpu context. This must be set
|
|
|
|
# to 1 if the platform wants to use this feature in the Secure world and MTE is
|
|
|
|
# enabled at ELX.
|
2020-10-02 19:41:11 +01:00
|
|
|
CTX_INCLUDE_MTE_REGS := 0
|
2019-07-18 14:25:33 +01:00
|
|
|
|
2017-10-16 11:40:10 +01:00
|
|
|
ENABLE_AMU := 0
|
2021-05-25 10:42:56 +01:00
|
|
|
ENABLE_AMU_AUXILIARY_COUNTERS := 0
|
2021-08-19 11:21:52 +01:00
|
|
|
ENABLE_AMU_FCONF := 0
|
2020-10-02 19:41:11 +01:00
|
|
|
AMU_RESTRICT_COUNTERS := 0
|
2017-10-20 11:30:57 +01:00
|
|
|
|
2021-03-22 11:59:37 +00:00
|
|
|
# By default, enable Scalable Vector Extension if implemented only for Non-secure
|
2017-10-20 11:30:57 +01:00
|
|
|
# lower ELs
|
|
|
|
# Note SVE is only supported on AArch64 - therefore do not enable in AArch32
|
|
|
|
ifneq (${ARCH},aarch32)
|
|
|
|
ENABLE_SVE_FOR_NS := 1
|
2021-03-22 11:59:37 +00:00
|
|
|
ENABLE_SVE_FOR_SWD := 0
|
2017-10-20 11:30:57 +01:00
|
|
|
else
|
|
|
|
override ENABLE_SVE_FOR_NS := 0
|
2021-03-22 11:59:37 +00:00
|
|
|
override ENABLE_SVE_FOR_SWD := 0
|
2017-10-20 11:30:57 +01:00
|
|
|
endif
|
2019-08-20 11:01:52 +01:00
|
|
|
|
|
|
|
SANITIZE_UB := off
|
2019-09-25 14:03:41 +01:00
|
|
|
|
|
|
|
# For ARMv8.1 (AArch64) platforms, enabling this option selects the spinlock
|
|
|
|
# implementation variant using the ARMv8.1-LSE compare-and-swap instruction.
|
|
|
|
# Default: disabled
|
|
|
|
USE_SPINLOCK_CAS := 0
|
2019-11-12 22:20:17 +00:00
|
|
|
|
|
|
|
# Enable Link Time Optimization
|
|
|
|
ENABLE_LTO := 0
|
2020-02-25 13:56:19 +00:00
|
|
|
|
|
|
|
# Build flag to include EL2 registers in cpu context save and restore during
|
|
|
|
# S-EL2 firmware entry/exit. This flag is to be used with SPD=spmd option.
|
|
|
|
# Default is 0.
|
|
|
|
CTX_INCLUDE_EL2_REGS := 0
|
2020-03-22 05:06:38 +00:00
|
|
|
|
|
|
|
# Enable Memory tag extension which is supported for architecture greater
|
|
|
|
# than Armv8.5-A
|
|
|
|
# By default it is set to "no"
|
|
|
|
SUPPORT_STACK_MEMTAG := no
|
2020-04-28 04:53:32 +01:00
|
|
|
|
|
|
|
# Select workaround for AT speculative behaviour.
|
|
|
|
ERRATA_SPECULATIVE_AT := 0
|
2020-06-12 18:11:28 +01:00
|
|
|
|
|
|
|
# Trap RAS error record access from lower EL
|
|
|
|
RAS_TRAP_LOWER_EL_ERR_ACCESS := 0
|
2020-06-29 10:32:53 +01:00
|
|
|
|
|
|
|
# Build option to create cot descriptors using fconf
|
|
|
|
COT_DESC_IN_DTB := 0
|
2020-07-29 10:58:44 +01:00
|
|
|
|
|
|
|
# Build option to provide openssl directory path
|
|
|
|
OPENSSL_DIR := /usr
|
2020-08-12 19:18:19 +01:00
|
|
|
|
|
|
|
# Build option to use the SP804 timer instead of the generic one
|
|
|
|
USE_SP804_TIMER := 0
|
2021-03-16 10:01:27 +00:00
|
|
|
|
|
|
|
# Build option to define number of firmware banks, used in firmware update
|
|
|
|
# metadata structure.
|
|
|
|
NR_OF_FW_BANKS := 2
|
|
|
|
|
|
|
|
# Build option to define number of images in firmware bank, used in firmware
|
|
|
|
# update metadata structure.
|
|
|
|
NR_OF_IMAGES_IN_FW_BANK := 1
|
2021-06-25 23:28:59 +01:00
|
|
|
|
|
|
|
# Disable Firmware update support by default
|
|
|
|
PSA_FWU_SUPPORT := 0
|
2021-07-02 09:10:56 +01:00
|
|
|
|
|
|
|
# By default, disable access of trace buffer control registers from NS
|
|
|
|
# lower ELs i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused
|
|
|
|
# if FEAT_TRBE is implemented.
|
|
|
|
# Note FEAT_TRBE is only supported on AArch64 - therefore do not enable in
|
|
|
|
# AArch32.
|
|
|
|
ifneq (${ARCH},aarch32)
|
|
|
|
ENABLE_TRBE_FOR_NS := 0
|
|
|
|
else
|
|
|
|
override ENABLE_TRBE_FOR_NS := 0
|
|
|
|
endif
|
2021-06-29 11:44:20 +01:00
|
|
|
|
|
|
|
# By default, disable access of trace system registers from NS lower
|
|
|
|
# ELs i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused if
|
|
|
|
# system register trace is implemented.
|
|
|
|
ENABLE_SYS_REG_TRACE_FOR_NS := 0
|
2021-07-08 09:33:18 +01:00
|
|
|
|
|
|
|
# By default, disable trace filter control registers access to NS
|
|
|
|
# lower ELs, i.e. NS-EL2, or NS-EL1 if NS-EL2 implemented but unused
|
|
|
|
# if FEAT_TRF is implemented.
|
|
|
|
ENABLE_TRF_FOR_NS := 0
|