xref: /optee_os/mk/config.mk (revision 2fa93c744fbdcdf6415dfdf149588b3c7624a7eb)
1# Default configuration values for OP-TEE core (all platforms).
2#
3# Platform-specific overrides are in core/arch/arm32/plat-*/conf.mk.
4# Some subsystem-specific defaults are not here but rather in */sub.mk.
5#
6# Configuration values may be assigned from multiple sources.
7# From higher to lower priority:
8#
9#   1. Make arguments ('make CFG_FOO=bar...')
10#   2. The file specified by $(CFG_OPTEE_CONFIG) (if defined)
11#   3. The environment ('CFG_FOO=bar make...')
12#   4. The platform-specific configuration file: core/arch/arm32/plat-*/conf.mk
13#   5. This file
14#   6. Subsystem-specific makefiles (*/sub.mk)
15#
16# Actual values used during the build are output to $(out-dir)/conf.mk
17# (CFG_* variables only).
18
19# Cross-compiler prefix and suffix
20CROSS_COMPILE ?= arm-linux-gnueabihf-
21CROSS_COMPILE32 ?= $(CROSS_COMPILE)
22CROSS_COMPILE64 ?= aarch64-linux-gnu-
23COMPILER ?= gcc
24
25# For convenience
26ifdef CFLAGS
27CFLAGS32 ?= $(CFLAGS)
28CFLAGS64 ?= $(CFLAGS)
29endif
30
31# Compiler warning level.
32# Supported values: undefined, 1, 2 and 3. 3 gives more warnings.
33WARNS ?= 3
34
35# Define NOWERROR=1 so that warnings are not treated as errors
36# NOWERROR=1
37
38# Define DEBUG=1 to compile without optimization (forces -O0)
39# DEBUG=1
40
41# If y, enable debug mode of the tee firmware (CPU restart, Core Status
42# verbose, panic & assert verbose). When disable, NDEBUG directive is defined.
43CFG_TEE_CORE_DEBUG ?= n
44
45# Max level of the tee core traces. 0 means disable, 4 is max.
46# Supported values: 0 (no traces) to 4 (all traces)
47# If CFG_TEE_DRV_DEBUGFS is set, the level of traces to print can be
48# dynamically changes via debugfs in the range 1 => CFG_TEE_CORE_LOG_LEVEL
49CFG_TEE_CORE_LOG_LEVEL ?= 1
50
51# TA and TEECore log level
52# Supported values: 0 (no traces) to 4 (all traces)
53# If CFG_TEE_DRV_DEBUGFS is set, the level of traces to print can be
54# dynamically changes via debugfs in the range 1 => CFG_TEE_TA_LOG_LEVEL
55CFG_TEE_TA_LOG_LEVEL ?= 1
56
57# TA enablement
58# When defined to "y", TA traces are output according to
59# CFG_TEE_TA_LOG_LEVEL. Otherwise, they are not output at all
60CFG_TEE_CORE_TA_TRACE ?= y
61
62# Define TEE_Panic as a macro to help debugging panics caused by calls to
63# TEE_Panic. This flag can have a different value when later compiling the
64# TA
65CFG_TEE_PANIC_DEBUG ?= y
66
67# If 1, enable debug features in TA memory allocation.
68# Debug features include check of buffer overflow, statistics, mark/check heap
69# feature.
70CFG_TEE_CORE_USER_MEM_DEBUG ?= 1
71
72# If y, enable memory leak detection feature in bget memory allocator.
73CFG_TEE_CORE_MALLOC_DEBUG ?= n
74CFG_TEE_TA_MALLOC_DEBUG ?= n
75
76# All message with level equal or higher to the following value will be
77# prefixed with long debugging information (severity, thread ID, component
78# name, function name, line number). Otherwise a short prefix is used
79# (severity and component name only).
80# Levels: 0=none 1=error 2=info 3=debug 4=flow
81CFG_MSG_LONG_PREFIX_THRESHOLD ?= 3
82
83# PRNG configuration
84# If CFG_WITH_SOFTWARE_PRNG is enabled, crypto provider provided
85# software PRNG implementation is used.
86# Otherwise, you need to implement hw_get_random_byte() for your platform
87CFG_WITH_SOFTWARE_PRNG ?= y
88
89# Number of threads
90CFG_NUM_THREADS ?= 2
91
92# API implementation version
93CFG_TEE_API_VERSION ?= GPD-1.1-dev
94
95# Implementation description (implementation-dependent)
96CFG_TEE_IMPL_DESCR ?= OPTEE
97
98# Trusted OS implementation version
99TEE_IMPL_VERSION ?= $(shell git describe --always --dirty=-dev 2>/dev/null || echo Unknown)
100# The following values are not extracted from the "git describe" output because
101# we might be outside of a Git environment, or the tree may have been cloned
102# with limited depth not including any tag, so there is really no guarantee
103# that TEE_IMPL_VERSION contains the major and minor revision numbers.
104CFG_OPTEE_REVISION_MAJOR ?= 2
105CFG_OPTEE_REVISION_MINOR ?= 4
106
107# Trusted OS implementation manufacturer name
108CFG_TEE_MANUFACTURER ?= LINARO
109
110# Trusted firmware version
111CFG_TEE_FW_IMPL_VERSION ?= FW_IMPL_UNDEF
112
113# Trusted OS implementation manufacturer name
114CFG_TEE_FW_MANUFACTURER ?= FW_MAN_UNDEF
115
116# Rich Execution Environment (REE) file system support: normal world OS
117# provides the actual storage.
118# This is the default FS when enabled (i.e., the one used when
119# TEE_STORAGE_PRIVATE is passed to the trusted storage API)
120CFG_REE_FS ?= y
121
122# RPMB file system support
123CFG_RPMB_FS ?= n
124
125# Device identifier used when CFG_RPMB_FS = y.
126# The exact meaning of this value is platform-dependent. On Linux, the
127# tee-supplicant process will open /dev/mmcblk<id>rpmb
128CFG_RPMB_FS_DEV_ID ?= 0
129
130# Enables RPMB key programming by the TEE, in case the RPMB partition has not
131# been configured yet.
132# !!! Security warning !!!
133# Do *NOT* enable this in product builds, as doing so would allow the TEE to
134# leak the RPMB key.
135# This option is useful in the following situations:
136# - Testing
137# - RPMB key provisioning in a controlled environment (factory setup)
138CFG_RPMB_WRITE_KEY ?= n
139
140# Embed public part of this key in OP-TEE OS
141TA_SIGN_KEY ?= keys/default_ta.pem
142
143# Include lib/libutils/isoc in the build? Most platforms need this, but some
144# may not because they obtain the isoc functions from elsewhere
145CFG_LIBUTILS_WITH_ISOC ?= y
146
147# Enables floating point support for user TAs
148# ARM32: EABI defines both a soft-float ABI and a hard-float ABI,
149#	 hard-float is basically a super set of soft-float. Hard-float
150#	 requires all the support routines provided for soft-float, but the
151#	 compiler may choose to optimize to not use some of them and use
152#	 the floating-point registers instead.
153# ARM64: EABI doesn't define a soft-float ABI, everything is hard-float (or
154#	 nothing with ` -mgeneral-regs-only`)
155# With CFG_TA_FLOAT_SUPPORT enabled TA code is free use floating point types
156CFG_TA_FLOAT_SUPPORT ?= y
157
158# Stack unwinding: print a stack dump to the console on abort
159# If CFG_UNWIND is enabled, both the kernel and user mode call stacks can be
160# unwound (not paged TAs, however).
161# Note that 32-bit ARM code needs unwind tables for this to work, so enabling
162# this option will increase the size of the 32-bit TEE binary by a few KB.
163# Similarly, TAs have to be compiled with -funwind-tables (default when the
164# option is set) otherwise they can't be unwound.
165ifeq ($(CFG_TEE_CORE_DEBUG),y)
166CFG_UNWIND ?= y
167endif
168
169# Enable support for dynamically loaded user TAs
170CFG_WITH_USER_TA ?= y
171
172# Load user TAs from the REE filesystem via tee-supplicant
173# There is currently no other alternative, but you may want to disable this in
174# case you implement your own TA store
175CFG_REE_FS_TA ?= y
176
177# Use small pages to map user TAs
178CFG_SMALL_PAGE_USER_TA ?= y
179
180# Enable paging, requires SRAM, can't be enabled by default
181CFG_WITH_PAGER ?= n
182
183# Use the pager for user TAs
184CFG_PAGED_USER_TA ?= $(CFG_WITH_PAGER)
185
186# Enable support for detected undefined behavior in C
187# Uses a lot of memory, can't be enabled by default
188CFG_CORE_SANITIZE_UNDEFINED ?= n
189
190# Enable Kernel Address sanitizer, has a huge performance impact, uses a
191# lot of memory and need platform specific adaptations, can't be enabled by
192# default
193CFG_CORE_SANITIZE_KADDRESS ?= n
194
195# Device Tree support
196# When enabled, the TEE _start function expects to find the address of a
197# Device Tree Blob (DTB) in register r2. The DT parsing code relies on
198# libfdt.  Currently only used to add the optee node and a reserved-memory
199# node for shared memory.
200CFG_DT ?= n
201
202# Maximum size of the Device Tree Blob, has to be large enough to allow
203# editing of the supplied DTB.
204CFG_DTB_MAX_SIZE ?= 0x10000
205
206# Enable static TA and core self tests
207CFG_TEE_CORE_EMBED_INTERNAL_TESTS ?= y
208
209# This option enables OP-TEE to respond to SMP boot request: the Rich OS
210# issues this to request OP-TEE to release secondaries cores out of reset,
211# with specific core number and non-secure entry address.
212CFG_BOOT_SECONDARY_REQUEST ?= n
213
214# Default heap size for Core, 64 kB
215CFG_CORE_HEAP_SIZE ?= 65536
216
217# TA profiling.
218# When this option is enabled, OP-TEE can execute Trusted Applications
219# instrumented with GCC's -pg flag and will output profiling information
220# in gmon.out format to /tmp/gmon-<ta_uuid>.out (path is defined in
221# tee-supplicant)
222CFG_TA_GPROF_SUPPORT ?= n
223
224# Enable to compile user TA libraries with profiling (-pg).
225# Depends on CFG_TA_GPROF_SUPPORT.
226CFG_ULIBS_GPROF ?= n
227
228ifeq ($(CFG_ULIBS_GPROF),y)
229ifneq ($(CFG_TA_GPROF_SUPPORT),y)
230$(error Cannot instrument user libraries if user mode profiling is disabled)
231endif
232endif
233
234# CFG_GP_SOCKETS
235# Enable Global Platform Sockets support
236CFG_GP_SOCKETS ?= y
237
238# Enable Secure Data Path support in OP-TEE core (TA may be invoked with
239# invocation parameters referring to specific secure memories).
240CFG_SECURE_DATA_PATH ?= n
241