1/* 2 * Copyright (c) 2020, ARM Limited. All rights reserved. 3 * 4 * SPDX-License-Identifier: BSD-3-Clause 5 */ 6 7/dts-v1/; 8 9/ { 10 tb_fw-config { 11 compatible = "arm,tb_fw"; 12 13 /* Disable authentication for development */ 14 disable_auth = <0x0>; 15 16 /* 17 * The following two entries are placeholders for Mbed TLS 18 * heap information. The default values don't matter since 19 * they will be overwritten by BL1. 20 * In case of having shared Mbed TLS heap between BL1 and BL2, 21 * BL1 will populate these two properties with the respective 22 * info about the shared heap. This info will be available for 23 * BL2 in order to locate and re-use the heap. 24 */ 25 mbedtls_heap_addr = <0x0 0x0>; 26 mbedtls_heap_size = <0x0>; 27 28#if MEASURED_BOOT 29 /* BL2 image hash calculated by BL1 */ 30 bl2_hash_data = [ 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 32#if BL2_HASH_SIZE > 32 33 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 34#if BL2_HASH_SIZE > 48 35 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36#endif /* > 48 */ 37#endif /* > 32 */ 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00]; 39#endif /* MEASURED_BOOT */ 40 }; 41 42 /* 43 * UUID's here are UUID RFC 4122 compliant meaning fieds are stored in 44 * network order (big endian) 45 */ 46 47#if ARM_IO_IN_DTB 48 arm-io_policies { 49 fip-handles { 50 compatible = "arm,io-fip-handle"; 51 scp_bl2_uuid = <0x9766fd3d 0x89bee849 0xae5d78a1 0x40608213>; 52 bl31_uuid = <0x47d4086d 0x4cfe9846 0x9b952950 0xcbbd5a00>; 53 bl32_uuid = <0x05d0e189 0x53dc1347 0x8d2b500a 0x4b7a3e38>; 54 bl32_extra1_uuid = <0x0b70c28b 0x2a5a7840 0x9f650a56 0x82738288>; 55 bl32_extra2_uuid = <0x8ea87bb1 0xcfa23f4d 0x85fde7bb 0xa50220d9>; 56 bl33_uuid = <0xd6d0eea7 0xfcead54b 0x97829934 0xf234b6e4>; 57 hw_cfg_uuid = <0x08b8f1d9 0xc9cf9349 0xa9626fbc 0x6b7265cc>; 58 soc_fw_cfg_uuid = <0x9979814b 0x0376fb46 0x8c8e8d26 0x7f7859e0>; 59 tos_fw_cfg_uuid = <0x26257c1a 0xdbc67f47 0x8d96c4c4 0xb0248021>; 60 nt_fw_cfg_uuid = <0x28da9815 0x93e87e44 0xac661aaf 0x801550f9>; 61 t_key_cert_uuid = <0x827ee890 0xf860e411 0xa1b477a7 0x21b4f94c>; 62 scp_fw_key_uuid = <0x024221a1 0xf860e411 0x8d9bf33c 0x0e15a014>; 63 soc_fw_key_uuid = <0x8ab8becc 0xf960e411 0x9ad0eb48 0x22d8dcf8>; 64 tos_fw_key_cert_uuid = <0x9477d603 0xfb60e411 0x85ddb710 0x5b8cee04>; 65 nt_fw_key_cert_uuid = <0x8ad5832a 0xfb60e411 0x8aafdf30 0xbbc49859>; 66 scp_fw_content_cert_uuid = <0x44be6f04 0x5e63e411 0xb28b73d8 0xeaae9656>; 67 soc_fw_content_cert_uuid = <0xe2b20c20 0x5e63e411 0x9ce8abcc 0xf92bb666>; 68 tos_fw_content_cert_uuid = <0xa49f4411 0x5e63e411 0x87283f05 0x722af33d>; 69 nt_fw_content_cert_uuid = <0x8ec4c1f3 0x5d63e411 0xa7a987ee 0x40b23fa7>; 70 sp_content_cert_uuid = <0x776dfd44 0x86974c3b 0x91ebc13e 0x025a2a6f>; 71 }; 72 }; 73#endif /* ARM_IO_IN_DTB */ 74 75 secure-partitions { 76 compatible = "arm,sp"; 77#ifdef OPTEE_SP_FW_CONFIG 78 op-tee { 79 uuid = <0x486178e0 0xe7f811e3 0xbc5e0002 0xa5d5c51b>; 80 load-address = <0x6280000>; 81 }; 82#else 83 cactus-primary { 84 uuid = <0xb4b5671e 0x4a904fe1 0xb81ffb13 0xdae1dacb>; 85 load-address = <0x7000000>; 86 owner = "SiP"; 87 }; 88 89 cactus-secondary { 90 uuid = <0xd1582309 0xf02347b9 0x827c4464 0xf5578fc8>; 91 load-address = <0x7100000>; 92 owner = "Plat"; 93 }; 94 95 cactus-tertiary { 96 uuid = <0x79b55c73 0x1d8c44b9 0x859361e1 0x770ad8d2>; 97 load-address = <0x7200000>; 98 }; 99#endif 100 }; 101 102#if COT_DESC_IN_DTB 103 #include "cot_descriptors.dtsi" 104#endif 105 106}; 107 108#if COT_DESC_IN_DTB 109 110#include "../fvp_def.h" 111 112&trusted_nv_counter { 113 reg = <TFW_NVCTR_BASE>; 114}; 115 116&non_trusted_nv_counter { 117 reg = <NTFW_CTR_BASE>; 118}; 119#endif 120