blob: 7a8bd38cbeddbea99ea2c4631647b70c4a9c6cfe [file] [log] [blame]
Gyorgy Szing30fa9872017-12-05 01:08:47 +00001#-------------------------------------------------------------------------------
Sherry Zhangf58f2bd2022-01-10 17:21:11 +08002# Copyright (c) 2020-2022, Arm Limited. All rights reserved.
Chris Brandcae20262022-06-23 12:05:33 -07003# Copyright (c) 2021-2022 Cypress Semiconductor Corporation (an Infineon
4# company) or an affiliate of Cypress Semiconductor Corporation. All rights
5# reserved.
Gyorgy Szing30fa9872017-12-05 01:08:47 +00006#
7# SPDX-License-Identifier: BSD-3-Clause
8#
9#-------------------------------------------------------------------------------
10
Raef Coles69817322020-10-19 14:14:14 +010011cmake_minimum_required(VERSION 3.15)
Gyorgy Szing30fa9872017-12-05 01:08:47 +000012
Raef Colesabfe81a2020-07-10 09:52:34 +010013add_executable(tfm_s)
14add_library(secure_fw INTERFACE)
David Hu857bfa52019-05-21 13:54:50 +080015
Kevin Peng33d03942021-06-08 11:28:41 +080016add_subdirectory(spm)
David Hu057ba652021-12-07 13:50:15 +080017add_subdirectory(partitions)
Gyorgy Szing30fa9872017-12-05 01:08:47 +000018
Xinyu Zhanga2fab0e2022-10-24 15:37:46 +080019target_include_directories(tfm_config
20 INTERFACE
21 ${CMAKE_CURRENT_SOURCE_DIR}/include
22 ${CMAKE_CURRENT_SOURCE_DIR}/partitions/crypto
23 ${CMAKE_CURRENT_SOURCE_DIR}/partitions/firmware_update
24 ${CMAKE_CURRENT_SOURCE_DIR}/partitions/initial_attestation
25 ${CMAKE_CURRENT_SOURCE_DIR}/partitions/internal_trusted_storage
26 ${CMAKE_CURRENT_SOURCE_DIR}/partitions/platform
27 ${CMAKE_CURRENT_SOURCE_DIR}/partitions/protected_storage
28 ${CMAKE_CURRENT_SOURCE_DIR}/spm/include
29)
30
Raef Colesabfe81a2020-07-10 09:52:34 +010031target_include_directories(secure_fw
32 INTERFACE
33 $<BUILD_INTERFACE:${CMAKE_CURRENT_SOURCE_DIR}/include>
34 $<BUILD_INTERFACE:${CMAKE_CURRENT_SOURCE_DIR}/partitions>
35)
Ken Liue40f9a22019-06-03 16:42:47 +080036
Raef Colesabfe81a2020-07-10 09:52:34 +010037target_link_libraries(secure_fw
38 INTERFACE
39 tfm_spm
40 tfm_partitions
41)
Gyorgy Szing30fa9872017-12-05 01:08:47 +000042
Raef Colesabfe81a2020-07-10 09:52:34 +010043target_link_libraries(tfm_s
44 PRIVATE
45 secure_fw
46 platform_s
47 psa_interface
48 tfm_sprt
49)
Gyorgy Szing30fa9872017-12-05 01:08:47 +000050
Raef Colesabfe81a2020-07-10 09:52:34 +010051set_target_properties(tfm_s
52 PROPERTIES
53 SUFFIX ".axf"
54 RUNTIME_OUTPUT_DIRECTORY "${CMAKE_BINARY_DIR}/bin"
55)
Gyorgy Szingd9c57fb2019-09-02 17:08:18 +020056
Feder Liangd4dbaa92021-09-07 15:34:46 +080057target_compile_options(tfm_s
58 PUBLIC
59 ${COMPILER_CP_FLAG}
60)
61
Raef Colesabfe81a2020-07-10 09:52:34 +010062target_link_options(tfm_s
63 PRIVATE
64 --entry=Reset_Handler
65 $<$<C_COMPILER_ID:GNU>:-Wl,-Map=${CMAKE_BINARY_DIR}/bin/tfm_s.map>
66 $<$<C_COMPILER_ID:ARMClang>:--map>
TTornblomaf19ae92020-09-29 13:26:29 +020067 $<$<C_COMPILER_ID:IAR>:--map\;${CMAKE_BINARY_DIR}/bin/tfm_s.map>
Feder Liangd4dbaa92021-09-07 15:34:46 +080068 PUBLIC
69 ${LINKER_CP_OPTION}
Raef Colesabfe81a2020-07-10 09:52:34 +010070)
71
72add_convert_to_bin_target(tfm_s)
73
74############################ Secure API ########################################
75
Raef Colesabfe81a2020-07-10 09:52:34 +010076set_source_files_properties(
Ken Liu82e3eac2021-10-14 16:19:13 +080077 ${CMAKE_SOURCE_DIR}/secure_fw/spm/cmsis_psa/psa_interface_svc.c
Xinyu Zhanga7ba50b2021-12-27 17:32:53 +080078 ${CMAKE_SOURCE_DIR}/secure_fw/spm/cmsis_psa/psa_interface_cross.c
Ken Liuf39d8eb2021-10-07 12:55:33 +080079 ${CMAKE_SOURCE_DIR}/secure_fw/spm/cmsis_psa/psa_interface_sfn.c
Raef Colesabfe81a2020-07-10 09:52:34 +010080 PROPERTIES
Raef Coles5e8ea842020-09-25 10:36:16 +010081 COMPILE_FLAGS $<$<C_COMPILER_ID:GNU>:-Wno-unused-parameter>
82 COMPILE_FLAGS $<$<C_COMPILER_ID:ARMClang>:-Wno-unused-parameter>
Raef Colesabfe81a2020-07-10 09:52:34 +010083)
84
Kevin Peng8b8f7a42022-08-05 17:56:30 +080085target_sources(tfm_sprt
86 PRIVATE
Sherry Zhangf58f2bd2022-01-10 17:21:11 +080087 $<$<BOOL:${CONFIG_TFM_PSA_API_SUPERVISOR_CALL}>:${CMAKE_SOURCE_DIR}/secure_fw/spm/cmsis_psa/psa_interface_svc.c>
88 $<$<BOOL:${CONFIG_TFM_PSA_API_CROSS_CALL}>:${CMAKE_SOURCE_DIR}/secure_fw/spm/cmsis_psa/psa_interface_cross.c>
89 $<$<BOOL:${CONFIG_TFM_PSA_API_SFN_CALL}>:${CMAKE_SOURCE_DIR}/secure_fw/spm/cmsis_psa/psa_interface_sfn.c>
Ken Liu82e3eac2021-10-14 16:19:13 +080090)
91
Raef Colesabfe81a2020-07-10 09:52:34 +010092############################# Secure veneers ###################################
93
Chris Brandca819022022-07-19 09:25:15 -070094if(CONFIG_TFM_USE_TRUSTZONE)
Raef Colesabfe81a2020-07-10 09:52:34 +010095 add_library(tfm_s_veneers STATIC)
96
97 target_sources(tfm_s_veneers
98 PRIVATE
99 ${CMAKE_CURRENT_BINARY_DIR}/s_veneers.o
100 )
101
102 # Since s_veneers.o doesn't exist when this is evaluated by cmake we need to
103 # explicity specify what language it will use.
104 set_target_properties(tfm_s_veneers
105 PROPERTIES
106 LINKER_LANGUAGE C
107 )
108
109 # Pretend we have a command to generate the veneers, when in reality all
110 # that's needed is the dependency on tfm_s. This is required for the ninja
111 # build system
112 add_custom_command(OUTPUT ${CMAKE_CURRENT_BINARY_DIR}/s_veneers.o
113 COMMAND
114 DEPENDS tfm_s
115 )
116
117 target_link_options(tfm_s
118 PRIVATE
119 ${LINKER_VENEER_OUTPUT_FLAG}${CMAKE_CURRENT_BINARY_DIR}/s_veneers.o
120 )
Gyorgy Szing30fa9872017-12-05 01:08:47 +0000121endif()
Tamas Banf8b0b2d2020-10-26 13:03:13 +0000122
123############################### CODE SHARING ###################################
124if (TFM_CODE_SHARING)
Raef Coles4351ec22021-04-26 09:20:50 +0100125 target_link_shared_code(tfm_s
126 bl2
Tamas Banf8b0b2d2020-10-26 13:03:13 +0000127 )
Raef Coles4351ec22021-04-26 09:20:50 +0100128
129 # mbedtls is build outside of tree, so we have to use the _from_dependency
130 # version of this function to attach the custom_command to the tfm_s target.
131 # It's also picky about stripping the symbols, so we just make them weak
132 # instead.
133 target_weaken_symbols_from_dependency(tfm_s crypto_service_mbedcrypto
134 mbedtls_asn1*
135 mbedtls_mpi*
136 mbedtls_platform*
137 mbedtls_rsa*
138
139 #This group is only relevant if BL2 image encryption is on
140 mbedtls_md*
141
142 #This group has two functions that cause runtime errors when shared, so the
143 #error-free ones are listed piece by piece
144 mbedtls_internal_sha256*
145 mbedtls_sha256_free
146 mbedtls_sha256_init
147 mbedtls_sha256_finish
148 mbedtls_sha256_starts
149
150 #Symbols necessary to make sharing additional functions possible
151 mbedtls_calloc*
152 mbedtls_free*
153
154 #Miscellaneous functions
155 mbedtls_exit*
156 memset_func*
157 )
158
Tamas Banf8b0b2d2020-10-26 13:03:13 +0000159endif()