blob: 71d392cd2a84f6de370a8e11b077a2c489e1a3a7 [file] [log] [blame]
Feder Liang55194382021-11-22 16:45:33 +08001#-------------------------------------------------------------------------------
chesun01ea11c822022-12-15 15:53:05 +08002# Copyright (c) 2022-2023, Arm Limited. All rights reserved.
Feder Liang55194382021-11-22 16:45:33 +08003#
4# SPDX-License-Identifier: BSD-3-Clause
5#
6#-------------------------------------------------------------------------------
7
Jianliang Shenbd624ed2023-10-24 15:42:59 +08008if(POLICY CMP0123)
9 cmake_policy(SET CMP0123 NEW)
10endif()
11
Gabor Toth4d414112021-11-10 17:44:50 +010012########################## FPU and MVE #########################################
13
chesun01ea11c822022-12-15 15:53:05 +080014tfm_invalid_config(NOT CMAKE_C_COMPILER_ID STREQUAL "GNU" AND (CONFIG_TFM_ENABLE_MVE OR CONFIG_TFM_ENABLE_MVE_FP))
15tfm_invalid_config((NOT CMAKE_C_COMPILER_ID STREQUAL "GNU" AND NOT CMAKE_C_COMPILER_ID STREQUAL "ARMClang") AND CONFIG_TFM_ENABLE_FP)
Gabor Toth4d414112021-11-10 17:44:50 +010016tfm_invalid_config((NOT CONFIG_TFM_FP_ARCH) AND (CONFIG_TFM_ENABLE_FP OR CONFIG_TFM_ENABLE_MVE_FP))
chesun01a94a9c72023-02-14 16:19:51 +080017tfm_invalid_config((CMAKE_C_COMPILER_ID STREQUAL "ARMClang") AND (NOT CONFIG_TFM_FP_ARCH_ASM) AND CONFIG_TFM_ENABLE_FP)
Gabor Toth4d414112021-11-10 17:44:50 +010018tfm_invalid_config((NOT CONFIG_TFM_ENABLE_FP AND NOT CONFIG_TFM_ENABLE_MVE AND NOT CONFIG_TFM_ENABLE_MVE_FP) AND CONFIG_TFM_LAZY_STACKING)
19tfm_invalid_config((CONFIG_TFM_ENABLE_FP OR CONFIG_TFM_ENABLE_MVE OR CONFIG_TFM_ENABLE_MVE_FP) AND NOT CONFIG_TFM_ENABLE_CP10CP11)
20
Feder Liang55194382021-11-22 16:45:33 +080021###################### Check compiler for FP vulnerability #####################
22
23# Check compiler with mitigation for the VLLDM instruction security vulnerability or not.
24# For more information, please check https://developer.arm.com/support/arm-security-updates/vlldm-instruction-security-vulnerability.
Gabor Toth4d414112021-11-10 17:44:50 +010025if (CONFIG_TFM_FLOAT_ABI STREQUAL "hard")
Feder Liang55194382021-11-22 16:45:33 +080026 # Create test C file.
27 file(WRITE ${CMAKE_CURRENT_BINARY_DIR}/cvetest.c "int x;")
28 # Compile with mitigation -mfix-cmse-cve-2021-35465.
chesun01ea11c822022-12-15 15:53:05 +080029 if (CMAKE_C_COMPILER_ID STREQUAL "ARMClang")
Jianliang Shenbd624ed2023-10-24 15:42:59 +080030 # This flag is dedicated for this check.
31 # Check command will fail if C flags consist of keyword other than cpu/arch type.
32 # Toolchain file shall define a dedicated CP_CHECK_C_FLAGS to collect cpu/arch type
33 # if CMAKE_C_FLAGS is appended with other flags already before this check.
34 if(NOT DEFINED CP_CHECK_C_FLAGS)
35 set(CP_CHECK_C_FLAGS ${CMAKE_C_FLAGS})
36 endif()
37
chesun01ea11c822022-12-15 15:53:05 +080038 execute_process (
Jianliang Shenbd624ed2023-10-24 15:42:59 +080039 COMMAND ${CMAKE_C_COMPILER} --target=${CROSS_COMPILE} ${CP_CHECK_C_FLAGS} -mcmse -mfix-cmse-cve-2021-35465 -S ${CMAKE_CURRENT_BINARY_DIR}/cvetest.c -o ${CMAKE_CURRENT_BINARY_DIR}/cvetest.s
chesun01ea11c822022-12-15 15:53:05 +080040 RESULT_VARIABLE ret
41 ERROR_VARIABLE err
42 )
43 else()
44 execute_process (
45 COMMAND ${CMAKE_C_COMPILER} -mfix-cmse-cve-2021-35465 -S ${CMAKE_CURRENT_BINARY_DIR}/cvetest.c -o ${CMAKE_CURRENT_BINARY_DIR}/cvetest.s
46 RESULT_VARIABLE ret
47 ERROR_VARIABLE err
48 )
49 endif()
Feder Liang55194382021-11-22 16:45:33 +080050 file(REMOVE ${CMAKE_CURRENT_BINARY_DIR}/cvetest.c)
51 # Check result
52 if(NOT ret EQUAL 0)
53 message(FATAL_ERROR "To enable FPU usage in SPE and NSPE both, please use the compiler with '-mfix-cmse-cve-2021-35465' support")
54 else()
55 file(REMOVE ${CMAKE_CURRENT_BINARY_DIR}/cvetest.s)
56 endif()
57endif()