diff options
Diffstat (limited to 'make_helpers/defaults.mk')
-rw-r--r-- | make_helpers/defaults.mk | 40 |
1 files changed, 34 insertions, 6 deletions
diff --git a/make_helpers/defaults.mk b/make_helpers/defaults.mk index f63e46f39..fff336cd2 100644 --- a/make_helpers/defaults.mk +++ b/make_helpers/defaults.mk @@ -1,5 +1,5 @@ # -# Copyright (c) 2016-2019, ARM Limited and Contributors. All rights reserved. +# Copyright (c) 2016-2020, ARM Limited and Contributors. All rights reserved. # # SPDX-License-Identifier: BSD-3-Clause # @@ -33,6 +33,9 @@ BL2_AT_EL3 := 0 # when BL2_AT_EL3 is 1. BL2_IN_XIP_MEM := 0 +# Do dcache invalidate upon BL2 entry at EL3 +BL2_INV_DCACHE := 1 + # Select the branch protection features to use. BRANCH_PROTECTION := 0 @@ -136,6 +139,9 @@ HW_ASSISTED_COHERENCY := 0 # Set the default algorithm for the generation of Trusted Board Boot keys KEY_ALG := rsa +# Option to build TF with Measured Boot support +MEASURED_BOOT := 0 + # NS timer register save and restore NS_TIMER_SWITCH := 0 @@ -168,6 +174,10 @@ SDEI_SUPPORT := 0 # platform Makefile is free to override this value. SEPARATE_CODE_AND_RODATA := 0 +# Put NOBITS sections (.bss, stacks, page tables, and coherent memory) in a +# separate memory region, which may be discontiguous from the rest of BL31. +SEPARATE_NOBITS_REGION := 0 + # If the BL31 image initialisation code is recalimed after use for the secondary # cores stack RECLAIM_INIT_CODE := 0 @@ -175,11 +185,8 @@ RECLAIM_INIT_CODE := 0 # SPD choice SPD := none -# For including the Secure Partition Manager -ENABLE_SPM := 0 - -# Use the SPM based on MM -SPM_MM := 1 +# Enable the Management Mode (MM)-based Secure Partition Manager implementation +SPM_MM := 0 # Flag to introduce an infinite loop in BL1 just before it exits into the next # image. This is meant to help debugging the post-BL2 phase. @@ -191,9 +198,15 @@ TRUSTED_BOARD_BOOT := 0 # Build option to choose whether Trusted Firmware uses Coherent memory or not. USE_COHERENT_MEM := 1 +# Build option to add debugfs support +USE_DEBUGFS := 0 + # Build option to choose whether Trusted Firmware uses library at ROM USE_ROMLIB := 0 +# Chain of trust. +COT := tbbr + # Use tbbr_oid.h instead of platform_oid.h USE_TBBR_DEFS := 1 @@ -214,6 +227,11 @@ ifeq (${ARCH},aarch32) override ENABLE_SPE_FOR_LOWER_ELS := 0 endif +# Include Memory Tagging Extension registers in cpu context. This must be set +# to 1 if the platform wants to use this feature in the Secure world and MTE is +# enabled at ELX. +CTX_INCLUDE_MTE_REGS := 0 + ENABLE_AMU := 0 # By default, enable Scalable Vector Extension if implemented for Non-secure @@ -224,3 +242,13 @@ ifneq (${ARCH},aarch32) else override ENABLE_SVE_FOR_NS := 0 endif + +SANITIZE_UB := off + +# For ARMv8.1 (AArch64) platforms, enabling this option selects the spinlock +# implementation variant using the ARMv8.1-LSE compare-and-swap instruction. +# Default: disabled +USE_SPINLOCK_CAS := 0 + +# Enable Link Time Optimization +ENABLE_LTO := 0 |