mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-16 09:34:18 +00:00

When using the SPM Dispatcher, the SPMC sits as a BL32 component (BL32_IMAGE_ID). The SPMC manifest is passed as the TOS fw config component (TOS_FW_CONFIG_ID). It defines platform specific attributes (memory range and physical CPU layout) as well as the attributes for each secure partition (mostly load address). This manifest is passed to the SPMC on boot up. An SP package contains the SP dtb in the SPCI defined partition manifest format. As the SPMC manifest was enriched it needs an increase of tos_fw-config max-size in fvp_fw_config dts. Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> Change-Id: Ia1dce00c6c4cbaa118fa56617980d32e2956a94e
115 lines
3.5 KiB
Text
115 lines
3.5 KiB
Text
/*
|
|
* Copyright (c) 2019-2020, ARM Limited. All rights reserved.
|
|
*
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*/
|
|
|
|
#include <export/common/tbbr/tbbr_img_def_exp.h>
|
|
|
|
/dts-v1/;
|
|
|
|
/ {
|
|
dtb-registry {
|
|
compatible = "arm,dyn_cfg-dtb_registry";
|
|
|
|
/* tb_fw_config is temporarily contained on this dtb */
|
|
tb_fw-config {
|
|
load-address = <0x0 0x4001010>;
|
|
max-size = <0x200>;
|
|
id = <TB_FW_CONFIG_ID>;
|
|
};
|
|
|
|
hw-config {
|
|
load-address = <0x0 0x82000000>;
|
|
max-size = <0x01000000>;
|
|
id = <HW_CONFIG_ID>;
|
|
};
|
|
|
|
/*
|
|
* Load SoC and TOS firmware configs at the base of
|
|
* non shared SRAM. The runtime checks ensure we don't
|
|
* overlap BL2, BL31 or BL32. The NT firmware config
|
|
* is loaded at base of DRAM.
|
|
*/
|
|
soc_fw-config {
|
|
load-address = <0x0 0x04001000>;
|
|
max-size = <0x200>;
|
|
id = <SOC_FW_CONFIG_ID>;
|
|
};
|
|
|
|
tos_fw-config {
|
|
load-address = <0x0 0x04001200>;
|
|
max-size = <0x1000>;
|
|
id = <TOS_FW_CONFIG_ID>;
|
|
};
|
|
|
|
nt_fw-config {
|
|
load-address = <0x0 0x80000000>;
|
|
max-size = <0x200>;
|
|
id = <NT_FW_CONFIG_ID>;
|
|
};
|
|
};
|
|
|
|
tb_fw-config {
|
|
compatible = "arm,tb_fw";
|
|
|
|
/* Disable authentication for development */
|
|
disable_auth = <0x0>;
|
|
|
|
/*
|
|
* The following two entries are placeholders for Mbed TLS
|
|
* heap information. The default values don't matter since
|
|
* they will be overwritten by BL1.
|
|
* In case of having shared Mbed TLS heap between BL1 and BL2,
|
|
* BL1 will populate these two properties with the respective
|
|
* info about the shared heap. This info will be available for
|
|
* BL2 in order to locate and re-use the heap.
|
|
*/
|
|
mbedtls_heap_addr = <0x0 0x0>;
|
|
mbedtls_heap_size = <0x0>;
|
|
};
|
|
|
|
/*
|
|
* Though TF-A is UUID RFC 4122 compliant meaning fields are stored in
|
|
* network order (big endian), UUID's mentioned in this file are are
|
|
* stored in machine order (little endian).
|
|
* This will be fixed in future.
|
|
*/
|
|
arm-io_policies {
|
|
fip-handles {
|
|
compatible = "arm,io-fip-handle";
|
|
scp_bl2_uuid = <0x3dfd6697 0x49e8be89 0xa1785dae 0x13826040>;
|
|
bl31_uuid = <0x6d08d447 0x4698fe4c 0x5029959b 0x005abdcb>;
|
|
bl32_uuid = <0x89e1d005 0x4713dc53 0xa502b8d 0x383e7a4b>;
|
|
bl32_extra1_uuid = <0x9bc2700b 0x40785a2a 0x560a659f 0x88827382>;
|
|
bl32_extra2_uuid = <0xb17ba88e 0x4d3fa2cf 0xbbe7fd85 0xd92002a5>;
|
|
bl33_uuid = <0xa7eed0d6 0x4bd5eafc 0x34998297 0xe4b634f2>;
|
|
hw_cfg_uuid = <0xd9f1b808 0x4993cfc9 0xbc6f62a9 0xcc65726b>;
|
|
soc_fw_cfg_uuid = <0x4b817999 0x46fb7603 0x268d8e8c 0xe059787f>;
|
|
tos_fw_cfg_uuid = <0x1a7c2526 0x477fc6db 0xc4c4968d 0x218024b0>;
|
|
nt_fw_cfg_uuid = <0x1598da28 0x447ee893 0xaf1a66ac 0xf9501580>;
|
|
t_key_cert_uuid = <0x90e87e82 0x11e460f8 0x7a77b4a1 0x4cf9b421>;
|
|
scp_fw_key_uuid = <0xa1214202 0x11e460f8 0x3cf39b8d 0x14a0150e>;
|
|
soc_fw_key_uuid = <0xccbeb88a 0x11e460f9 0x48ebd09a 0xf8dcd822>;
|
|
tos_fw_key_cert_uuid = <0x3d67794 0x11e460fb 0x10b7dd85 0x4ee8c5b>;
|
|
nt_fw_key_cert_uuid = <0x2a83d58a 0x11e460fb 0x30dfaf8a 0x5998c4bb>;
|
|
scp_fw_content_cert_uuid = <0x046fbe44 0x11e4635e 0xd8738bb2 0x5696aeea>;
|
|
soc_fw_content_cert_uuid = <0x200cb2e2 0x11e4635e 0xccabe89c 0x66b62bf9>;
|
|
tos_fw_content_cert_uuid = <0x11449fa4 0x11e4635e 0x53f2887 0x3df32a72>;
|
|
nt_fw_content_cert_uuid = <0xf3c1c48e 0x11e4635d 0xee87a9a7 0xa73fb240>;
|
|
};
|
|
};
|
|
|
|
secure-partitions {
|
|
compatible = "arm,sp";
|
|
cactus {
|
|
uuid = <0x1e67b5b4 0xe14f904a 0x13fb1fb8 0xcbdae1da>;
|
|
load-address = <0x7000000>;
|
|
};
|
|
|
|
ivy {
|
|
uuid = <0x092358d1 0xb94723f0 0x64447c82 0xc88f57f5>;
|
|
load-address = <0x7100000>;
|
|
};
|
|
};
|
|
};
|