blob: 8f87f7c6283ac21630855ca369ffe78063fc49a5 [file] [log] [blame]
Louis Mayencourt6d2b5732019-12-17 13:17:25 +00001/*
2 * Copyright (c) 2019-2020, ARM Limited. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
Manish Pandeyf4110242020-06-08 14:48:09 +01007#include <common/tbbr/tbbr_img_def.h>
Louis Mayencourt6d2b5732019-12-17 13:17:25 +00008
9/dts-v1/;
10
11/ {
12 dtb-registry {
Louis Mayencourtb26fafa2020-04-20 14:17:21 +010013 compatible = "fconf,dyn_cfg-dtb_registry";
Louis Mayencourt6d2b5732019-12-17 13:17:25 +000014
15 /* tb_fw_config is temporarily contained on this dtb */
16 tb_fw-config {
17 load-address = <0x0 0x4001010>;
18 max-size = <0x200>;
19 id = <TB_FW_CONFIG_ID>;
20 };
21
22 hw-config {
23 load-address = <0x0 0x82000000>;
24 max-size = <0x01000000>;
25 id = <HW_CONFIG_ID>;
26 };
27
28 /*
29 * Load SoC and TOS firmware configs at the base of
30 * non shared SRAM. The runtime checks ensure we don't
31 * overlap BL2, BL31 or BL32. The NT firmware config
32 * is loaded at base of DRAM.
33 */
34 soc_fw-config {
35 load-address = <0x0 0x04001000>;
36 max-size = <0x200>;
37 id = <SOC_FW_CONFIG_ID>;
38 };
39
40 tos_fw-config {
41 load-address = <0x0 0x04001200>;
Olivier Deprez92e4c642020-02-28 12:12:08 +010042 max-size = <0x1000>;
Louis Mayencourt6d2b5732019-12-17 13:17:25 +000043 id = <TOS_FW_CONFIG_ID>;
44 };
45
46 nt_fw-config {
47 load-address = <0x0 0x80000000>;
48 max-size = <0x200>;
49 id = <NT_FW_CONFIG_ID>;
50 };
51 };
52
53 tb_fw-config {
54 compatible = "arm,tb_fw";
55
56 /* Disable authentication for development */
57 disable_auth = <0x0>;
58
59 /*
60 * The following two entries are placeholders for Mbed TLS
61 * heap information. The default values don't matter since
62 * they will be overwritten by BL1.
63 * In case of having shared Mbed TLS heap between BL1 and BL2,
64 * BL1 will populate these two properties with the respective
65 * info about the shared heap. This info will be available for
66 * BL2 in order to locate and re-use the heap.
67 */
68 mbedtls_heap_addr = <0x0 0x0>;
69 mbedtls_heap_size = <0x0>;
Alexei Fedorov25d7c882020-03-20 18:38:55 +000070
71#if MEASURED_BOOT
72 /* BL2 image hash calculated by BL1 */
73 bl2_hash_data = [
74 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
75#if BL2_HASH_SIZE > 32
76 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
77#if BL2_HASH_SIZE > 48
78 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
79#endif /* > 48 */
80#endif /* > 32 */
81 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00];
82#endif /* MEASURED_BOOT */
Louis Mayencourt6d2b5732019-12-17 13:17:25 +000083 };
Louis Mayencourtbadcac82019-10-24 15:18:46 +010084
Manish Pandey9115dee2020-02-18 13:08:14 +000085 /*
86 * Though TF-A is UUID RFC 4122 compliant meaning fields are stored in
87 * network order (big endian), UUID's mentioned in this file are are
88 * stored in machine order (little endian).
89 * This will be fixed in future.
90 */
Louis Mayencourt6b232d92020-02-28 16:57:30 +000091#if ARM_IO_IN_DTB
Louis Mayencourtbadcac82019-10-24 15:18:46 +010092 arm-io_policies {
93 fip-handles {
94 compatible = "arm,io-fip-handle";
95 scp_bl2_uuid = <0x3dfd6697 0x49e8be89 0xa1785dae 0x13826040>;
96 bl31_uuid = <0x6d08d447 0x4698fe4c 0x5029959b 0x005abdcb>;
97 bl32_uuid = <0x89e1d005 0x4713dc53 0xa502b8d 0x383e7a4b>;
98 bl32_extra1_uuid = <0x9bc2700b 0x40785a2a 0x560a659f 0x88827382>;
99 bl32_extra2_uuid = <0xb17ba88e 0x4d3fa2cf 0xbbe7fd85 0xd92002a5>;
100 bl33_uuid = <0xa7eed0d6 0x4bd5eafc 0x34998297 0xe4b634f2>;
101 hw_cfg_uuid = <0xd9f1b808 0x4993cfc9 0xbc6f62a9 0xcc65726b>;
102 soc_fw_cfg_uuid = <0x4b817999 0x46fb7603 0x268d8e8c 0xe059787f>;
103 tos_fw_cfg_uuid = <0x1a7c2526 0x477fc6db 0xc4c4968d 0x218024b0>;
104 nt_fw_cfg_uuid = <0x1598da28 0x447ee893 0xaf1a66ac 0xf9501580>;
105 t_key_cert_uuid = <0x90e87e82 0x11e460f8 0x7a77b4a1 0x4cf9b421>;
106 scp_fw_key_uuid = <0xa1214202 0x11e460f8 0x3cf39b8d 0x14a0150e>;
107 soc_fw_key_uuid = <0xccbeb88a 0x11e460f9 0x48ebd09a 0xf8dcd822>;
108 tos_fw_key_cert_uuid = <0x3d67794 0x11e460fb 0x10b7dd85 0x4ee8c5b>;
109 nt_fw_key_cert_uuid = <0x2a83d58a 0x11e460fb 0x30dfaf8a 0x5998c4bb>;
110 scp_fw_content_cert_uuid = <0x046fbe44 0x11e4635e 0xd8738bb2 0x5696aeea>;
111 soc_fw_content_cert_uuid = <0x200cb2e2 0x11e4635e 0xccabe89c 0x66b62bf9>;
112 tos_fw_content_cert_uuid = <0x11449fa4 0x11e4635e 0x53f2887 0x3df32a72>;
113 nt_fw_content_cert_uuid = <0xf3c1c48e 0x11e4635d 0xee87a9a7 0xa73fb240>;
114 };
115 };
Louis Mayencourt6b232d92020-02-28 16:57:30 +0000116#endif /* ARM_IO_IN_DTB */
Manish Pandey9115dee2020-02-18 13:08:14 +0000117
118 secure-partitions {
119 compatible = "arm,sp";
Manish Pandey44bdf5f2020-03-19 21:06:18 +0000120 cactus-primary {
Manish Pandey9115dee2020-02-18 13:08:14 +0000121 uuid = <0x1e67b5b4 0xe14f904a 0x13fb1fb8 0xcbdae1da>;
122 load-address = <0x7000000>;
123 };
124
Manish Pandey44bdf5f2020-03-19 21:06:18 +0000125 cactus-secondary {
Manish Pandey9115dee2020-02-18 13:08:14 +0000126 uuid = <0x092358d1 0xb94723f0 0x64447c82 0xc88f57f5>;
127 load-address = <0x7100000>;
128 };
129 };
Louis Mayencourt6d2b5732019-12-17 13:17:25 +0000130};