xref: /rk3399_ARM-atf/plat/arm/board/fvp/fdts/fvp_fw_config.dts (revision 665e71b8ea28162ec7737c1411bca3ea89e5957e)
1/*
2 * Copyright (c) 2019-2020, ARM Limited. All rights reserved.
3 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <export/common/tbbr/tbbr_img_def_exp.h>
8
9/dts-v1/;
10
11/ {
12	dtb-registry {
13		compatible = "arm,dyn_cfg-dtb_registry";
14
15		/* tb_fw_config is temporarily contained on this dtb */
16		tb_fw-config {
17			load-address = <0x0 0x4001010>;
18			max-size = <0x200>;
19			id = <TB_FW_CONFIG_ID>;
20		};
21
22		hw-config {
23			load-address = <0x0 0x82000000>;
24			max-size = <0x01000000>;
25			id = <HW_CONFIG_ID>;
26		};
27
28		/*
29		 * Load SoC and TOS firmware configs at the base of
30		 * non shared SRAM. The runtime checks ensure we don't
31		 * overlap BL2, BL31 or BL32. The NT firmware config
32		 * is loaded at base of DRAM.
33		 */
34		soc_fw-config {
35			load-address = <0x0 0x04001000>;
36			max-size = <0x200>;
37			id = <SOC_FW_CONFIG_ID>;
38		};
39
40		tos_fw-config {
41			load-address = <0x0 0x04001200>;
42			max-size = <0x200>;
43			id = <TOS_FW_CONFIG_ID>;
44		};
45
46		nt_fw-config {
47			load-address = <0x0 0x80000000>;
48			max-size = <0x200>;
49			id = <NT_FW_CONFIG_ID>;
50		};
51	};
52
53	tb_fw-config {
54		compatible = "arm,tb_fw";
55
56		/* Disable authentication for development */
57		disable_auth = <0x0>;
58
59		/*
60		 * The following two entries are placeholders for Mbed TLS
61		 * heap information. The default values don't matter since
62		 * they will be overwritten by BL1.
63		 * In case of having shared Mbed TLS heap between BL1 and BL2,
64		 * BL1 will populate these two properties with the respective
65		 * info about the shared heap. This info will be available for
66		 * BL2 in order to locate and re-use the heap.
67		 */
68		mbedtls_heap_addr = <0x0 0x0>;
69		mbedtls_heap_size = <0x0>;
70	};
71
72	/*
73	 * Though TF-A is UUID RFC 4122 compliant meaning fields are stored in
74	 * network order (big endian), UUID's mentioned in this file are are
75	 * stored in machine order (little endian).
76	 * This will be fixed in future.
77	 */
78	arm-io_policies {
79		fip-handles {
80			compatible = "arm,io-fip-handle";
81			scp_bl2_uuid = <0x3dfd6697 0x49e8be89 0xa1785dae 0x13826040>;
82			bl31_uuid = <0x6d08d447 0x4698fe4c 0x5029959b 0x005abdcb>;
83			bl32_uuid = <0x89e1d005 0x4713dc53 0xa502b8d 0x383e7a4b>;
84			bl32_extra1_uuid = <0x9bc2700b 0x40785a2a 0x560a659f 0x88827382>;
85			bl32_extra2_uuid = <0xb17ba88e 0x4d3fa2cf 0xbbe7fd85 0xd92002a5>;
86			bl33_uuid = <0xa7eed0d6 0x4bd5eafc 0x34998297 0xe4b634f2>;
87			hw_cfg_uuid = <0xd9f1b808 0x4993cfc9 0xbc6f62a9 0xcc65726b>;
88			soc_fw_cfg_uuid = <0x4b817999 0x46fb7603 0x268d8e8c 0xe059787f>;
89			tos_fw_cfg_uuid = <0x1a7c2526 0x477fc6db 0xc4c4968d 0x218024b0>;
90			nt_fw_cfg_uuid = <0x1598da28 0x447ee893 0xaf1a66ac 0xf9501580>;
91			t_key_cert_uuid = <0x90e87e82 0x11e460f8 0x7a77b4a1 0x4cf9b421>;
92			scp_fw_key_uuid = <0xa1214202 0x11e460f8 0x3cf39b8d 0x14a0150e>;
93			soc_fw_key_uuid = <0xccbeb88a 0x11e460f9 0x48ebd09a 0xf8dcd822>;
94			tos_fw_key_cert_uuid = <0x3d67794 0x11e460fb 0x10b7dd85 0x4ee8c5b>;
95			nt_fw_key_cert_uuid = <0x2a83d58a 0x11e460fb 0x30dfaf8a 0x5998c4bb>;
96			scp_fw_content_cert_uuid = <0x046fbe44 0x11e4635e 0xd8738bb2 0x5696aeea>;
97			soc_fw_content_cert_uuid = <0x200cb2e2 0x11e4635e 0xccabe89c 0x66b62bf9>;
98			tos_fw_content_cert_uuid = <0x11449fa4 0x11e4635e 0x53f2887 0x3df32a72>;
99			nt_fw_content_cert_uuid = <0xf3c1c48e 0x11e4635d 0xee87a9a7 0xa73fb240>;
100		};
101	};
102
103	secure-partitions {
104		compatible = "arm,sp";
105		cactus {
106			uuid = <0x1e67b5b4 0xe14f904a 0x13fb1fb8 0xcbdae1da>;
107			load-address = <0x7000000>;
108		};
109
110		ivy {
111			uuid = <0x092358d1 0xb94723f0 0x64447c82 0xc88f57f5>;
112			load-address = <0x7100000>;
113		};
114	};
115};
116