Commit 710b313c authored by Manish Pandey's avatar Manish Pandey Committed by TrustedFirmware Code Review
Browse files

Merge changes from topic "tf-cleanup" into integration

* changes:
  plat/arm: Move fconf population after the enablement of MMU
  lib/fconf: Update 'set_fw_config_info' function
  lib/fconf: Update data type of config max size
  plat/arm: Check the need for firmware update only once
  plat/arm: sgm: Use consistent name for tb fw config node
parents 3ee148d6 a07c101a
...@@ -14,14 +14,15 @@ ...@@ -14,14 +14,15 @@
struct dyn_cfg_dtb_info_t { struct dyn_cfg_dtb_info_t {
uintptr_t config_addr; uintptr_t config_addr;
size_t config_max_size; uint32_t config_max_size;
unsigned int config_id; unsigned int config_id;
}; };
struct dyn_cfg_dtb_info_t *dyn_cfg_dtb_info_getter(unsigned int config_id); struct dyn_cfg_dtb_info_t *dyn_cfg_dtb_info_getter(unsigned int config_id);
int fconf_populate_dtb_registry(uintptr_t config); int fconf_populate_dtb_registry(uintptr_t config);
/* Set fw_config information in global DTB array */ /* Set config information in global DTB array */
void set_fw_config_info(uintptr_t config_addr, uint32_t config_max_size); void set_config_info(uintptr_t config_addr, uint32_t config_max_size,
unsigned int config_id);
#endif /* FCONF_DYN_CFG_GETTER_H */ #endif /* FCONF_DYN_CFG_GETTER_H */
...@@ -294,12 +294,19 @@ ...@@ -294,12 +294,19 @@
#define ARM_V2M_MAP_MEM_PROTECT MAP_REGION_FLAT(PLAT_ARM_MEM_PROT_ADDR, \ #define ARM_V2M_MAP_MEM_PROTECT MAP_REGION_FLAT(PLAT_ARM_MEM_PROT_ADDR, \
V2M_FLASH_BLOCK_SIZE, \ V2M_FLASH_BLOCK_SIZE, \
MT_DEVICE | MT_RW | MT_SECURE) MT_DEVICE | MT_RW | MT_SECURE)
/*
* Map the region for device tree configuration with read and write permissions
*/
#define ARM_MAP_BL_CONFIG_REGION MAP_REGION_FLAT(ARM_BL_RAM_BASE, \
(ARM_FW_CONFIGS_LIMIT \
- ARM_BL_RAM_BASE), \
MT_MEMORY | MT_RW | MT_SECURE)
/* /*
* The max number of regions like RO(code), coherent and data required by * The max number of regions like RO(code), coherent and data required by
* different BL stages which need to be mapped in the MMU. * different BL stages which need to be mapped in the MMU.
*/ */
#define ARM_BL_REGIONS 5 #define ARM_BL_REGIONS 6
#define MAX_MMAP_REGIONS (PLAT_ARM_MMAP_ENTRIES + \ #define MAX_MMAP_REGIONS (PLAT_ARM_MMAP_ENTRIES + \
ARM_BL_REGIONS) ARM_BL_REGIONS)
......
...@@ -32,8 +32,7 @@ int fconf_load_config(unsigned int image_id) ...@@ -32,8 +32,7 @@ int fconf_load_config(unsigned int image_id)
assert(config_info != NULL); assert(config_info != NULL);
config_image_info.image_base = config_info->config_addr; config_image_info.image_base = config_info->config_addr;
config_image_info.image_max_size = config_image_info.image_max_size = config_info->config_max_size;
(uint32_t)config_info->config_max_size;
VERBOSE("FCONF: Loading config with image ID: %d\n", image_id); VERBOSE("FCONF: Loading config with image ID: %d\n", image_id);
err = load_auth_image(image_id, &config_image_info); err = load_auth_image(image_id, &config_image_info);
......
...@@ -14,63 +14,56 @@ ...@@ -14,63 +14,56 @@
/* We currently use FW, TB_FW, SOC_FW, TOS_FW, NT_FW and HW configs */ /* We currently use FW, TB_FW, SOC_FW, TOS_FW, NT_FW and HW configs */
#define MAX_DTB_INFO U(6) #define MAX_DTB_INFO U(6)
/*
* Compile time assert if FW_CONFIG_ID is 0 which is more
* unlikely as 0 is a valid image ID for FIP as per the current
* code but still to avoid code breakage in case of unlikely
* event when image IDs get changed.
*/
CASSERT(FW_CONFIG_ID != U(0), assert_invalid_fw_config_id);
static struct dyn_cfg_dtb_info_t dtb_infos[MAX_DTB_INFO]; static struct dyn_cfg_dtb_info_t dtb_infos[MAX_DTB_INFO];
static OBJECT_POOL_ARRAY(dtb_info_pool, dtb_infos); static OBJECT_POOL_ARRAY(dtb_info_pool, dtb_infos);
/* /*
* This function is used to alloc memory for fw config information from * This function is used to alloc memory for config information from
* global pool and set fw configuration information. * global pool and set the configuration information.
* Specifically used by BL1 to set fw_config information in global array
*/ */
void set_fw_config_info(uintptr_t config_addr, uint32_t config_max_size) void set_config_info(uintptr_t config_addr, uint32_t config_max_size,
unsigned int config_id)
{ {
struct dyn_cfg_dtb_info_t *dtb_info; struct dyn_cfg_dtb_info_t *dtb_info;
dtb_info = pool_alloc(&dtb_info_pool); dtb_info = pool_alloc(&dtb_info_pool);
dtb_info->config_addr = config_addr; dtb_info->config_addr = config_addr;
dtb_info->config_max_size = config_max_size; dtb_info->config_max_size = config_max_size;
dtb_info->config_id = FW_CONFIG_ID; dtb_info->config_id = config_id;
} }
struct dyn_cfg_dtb_info_t *dyn_cfg_dtb_info_getter(unsigned int config_id) struct dyn_cfg_dtb_info_t *dyn_cfg_dtb_info_getter(unsigned int config_id)
{ {
unsigned int index; unsigned int index;
struct dyn_cfg_dtb_info_t *info;
/* Positions index to the proper config-id */ /* Positions index to the proper config-id */
for (index = 0; index < MAX_DTB_INFO; index++) { for (index = 0U; index < MAX_DTB_INFO; index++) {
if (dtb_infos[index].config_id == config_id) { if (dtb_infos[index].config_id == config_id) {
info = &dtb_infos[index]; return &dtb_infos[index];
break;
} }
} }
if (index == MAX_DTB_INFO) { WARN("FCONF: Invalid config id %u\n", config_id);
WARN("FCONF: Invalid config id %u\n", config_id);
info = NULL;
}
return info; return NULL;
} }
int fconf_populate_dtb_registry(uintptr_t config) int fconf_populate_dtb_registry(uintptr_t config)
{ {
int rc; int rc;
int node, child; int node, child;
struct dyn_cfg_dtb_info_t *dtb_info;
/* As libfdt use void *, we can't avoid this cast */ /* As libfdt use void *, we can't avoid this cast */
const void *dtb = (void *)config; const void *dtb = (void *)config;
/*
* Compile time assert if FW_CONFIG_ID is 0 which is more
* unlikely as 0 is a valid image id for FIP as per the current
* code but still to avoid code breakage in case of unlikely
* event when image ids gets changed.
*/
CASSERT(FW_CONFIG_ID != 0, assert_invalid_fw_config_id);
/* /*
* In case of BL1, fw_config dtb information is already * In case of BL1, fw_config dtb information is already
* populated in global dtb_infos array by 'set_fw_config_info' * populated in global dtb_infos array by 'set_fw_config_info'
...@@ -80,11 +73,9 @@ int fconf_populate_dtb_registry(uintptr_t config) ...@@ -80,11 +73,9 @@ int fconf_populate_dtb_registry(uintptr_t config)
* Other BLs, satisfy below check and populate fw_config information * Other BLs, satisfy below check and populate fw_config information
* in global dtb_infos array. * in global dtb_infos array.
*/ */
if (dtb_infos[0].config_id == 0) { if (dtb_infos[0].config_id == 0U) {
dtb_info = pool_alloc(&dtb_info_pool); uint32_t config_max_size = fdt_totalsize(dtb);
dtb_info->config_addr = config; set_config_info(config, config_max_size, FW_CONFIG_ID);
dtb_info->config_max_size = fdt_totalsize(dtb);
dtb_info->config_id = FW_CONFIG_ID;
} }
/* Find the node offset point to "fconf,dyn_cfg-dtb_registry" compatible property */ /* Find the node offset point to "fconf,dyn_cfg-dtb_registry" compatible property */
...@@ -96,37 +87,36 @@ int fconf_populate_dtb_registry(uintptr_t config) ...@@ -96,37 +87,36 @@ int fconf_populate_dtb_registry(uintptr_t config)
} }
fdt_for_each_subnode(child, dtb, node) { fdt_for_each_subnode(child, dtb, node) {
uint32_t val32; uint32_t config_max_size, config_id;
uintptr_t config_addr;
uint64_t val64; uint64_t val64;
dtb_info = pool_alloc(&dtb_info_pool);
/* Read configuration dtb information */ /* Read configuration dtb information */
rc = fdt_read_uint64(dtb, child, "load-address", &val64); rc = fdt_read_uint64(dtb, child, "load-address", &val64);
if (rc < 0) { if (rc < 0) {
ERROR("FCONF: Incomplete configuration property in dtb-registry.\n"); ERROR("FCONF: Incomplete configuration property in dtb-registry.\n");
return rc; return rc;
} }
dtb_info->config_addr = (uintptr_t)val64; config_addr = (uintptr_t)val64;
rc = fdt_read_uint32(dtb, child, "max-size", &val32); rc = fdt_read_uint32(dtb, child, "max-size", &config_max_size);
if (rc < 0) { if (rc < 0) {
ERROR("FCONF: Incomplete configuration property in dtb-registry.\n"); ERROR("FCONF: Incomplete configuration property in dtb-registry.\n");
return rc; return rc;
} }
dtb_info->config_max_size = val32;
rc = fdt_read_uint32(dtb, child, "id", &val32); rc = fdt_read_uint32(dtb, child, "id", &config_id);
if (rc < 0) { if (rc < 0) {
ERROR("FCONF: Incomplete configuration property in dtb-registry.\n"); ERROR("FCONF: Incomplete configuration property in dtb-registry.\n");
return rc; return rc;
} }
dtb_info->config_id = val32;
VERBOSE("FCONF: dyn_cfg.dtb_registry cell found with:\n"); VERBOSE("FCONF: dyn_cfg.dtb_registry cell found with:\n");
VERBOSE("\tload-address = %lx\n", dtb_info->config_addr); VERBOSE("\tload-address = %lx\n", config_addr);
VERBOSE("\tmax-size = 0x%zx\n", dtb_info->config_max_size); VERBOSE("\tmax-size = 0x%x\n", config_max_size);
VERBOSE("\tconfig-id = %u\n", dtb_info->config_id); VERBOSE("\tconfig-id = %u\n", config_id);
set_config_info(config_addr, config_max_size, config_id);
} }
if ((child < 0) && (child != -FDT_ERR_NOTFOUND)) { if ((child < 0) && (child != -FDT_ERR_NOTFOUND)) {
......
...@@ -151,11 +151,19 @@ ...@@ -151,11 +151,19 @@
MT_DEVICE | MT_RW | MT_SECURE) MT_DEVICE | MT_RW | MT_SECURE)
#endif #endif
/*
* Map the region for device tree configuration with read and write permissions
*/
#define ARM_MAP_BL_CONFIG_REGION MAP_REGION_FLAT(ARM_BL_RAM_BASE, \
(ARM_FW_CONFIGS_LIMIT \
- ARM_BL_RAM_BASE), \
MT_MEMORY | MT_RW | MT_SECURE)
/* /*
* The max number of regions like RO(code), coherent and data required by * The max number of regions like RO(code), coherent and data required by
* different BL stages which need to be mapped in the MMU. * different BL stages which need to be mapped in the MMU.
*/ */
#define ARM_BL_REGIONS 5 #define ARM_BL_REGIONS 6
#define MAX_MMAP_REGIONS (PLAT_ARM_MMAP_ENTRIES + \ #define MAX_MMAP_REGIONS (PLAT_ARM_MMAP_ENTRIES + \
ARM_BL_REGIONS) ARM_BL_REGIONS)
...@@ -194,6 +202,12 @@ ...@@ -194,6 +202,12 @@
#define ARM_FW_CONFIG_BASE (ARM_BL_RAM_BASE + sizeof(meminfo_t)) #define ARM_FW_CONFIG_BASE (ARM_BL_RAM_BASE + sizeof(meminfo_t))
#define ARM_FW_CONFIG_LIMIT (ARM_BL_RAM_BASE + PAGE_SIZE) #define ARM_FW_CONFIG_LIMIT (ARM_BL_RAM_BASE + PAGE_SIZE)
/*
* Define limit of firmware configuration memory:
* ARM_FW_CONFIG + ARM_BL2_MEM_DESC memory
*/
#define ARM_FW_CONFIGS_LIMIT (ARM_BL_RAM_BASE + (PAGE_SIZE * 2))
/******************************************************************************* /*******************************************************************************
* BL1 specific defines. * BL1 specific defines.
* BL1 RW data is relocated from ROM to RAM at runtime so we need 2 sets of * BL1 RW data is relocated from ROM to RAM at runtime so we need 2 sets of
...@@ -221,6 +235,8 @@ ...@@ -221,6 +235,8 @@
/* Put BL32 below BL2 in NS DRAM.*/ /* Put BL32 below BL2 in NS DRAM.*/
#define ARM_BL2_MEM_DESC_BASE ARM_FW_CONFIG_LIMIT #define ARM_BL2_MEM_DESC_BASE ARM_FW_CONFIG_LIMIT
#define ARM_BL2_MEM_DESC_LIMIT (ARM_BL2_MEM_DESC_BASE \
+ (PAGE_SIZE / 2U))
#define BL32_BASE ((ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE)\ #define BL32_BASE ((ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE)\
- PLAT_ARM_MAX_BL32_SIZE) - PLAT_ARM_MAX_BL32_SIZE)
......
...@@ -92,11 +92,24 @@ ...@@ -92,11 +92,24 @@
#define ARM_FW_CONFIG_BASE (ARM_BL_RAM_BASE + sizeof(meminfo_t)) #define ARM_FW_CONFIG_BASE (ARM_BL_RAM_BASE + sizeof(meminfo_t))
#define ARM_FW_CONFIG_LIMIT (ARM_BL_RAM_BASE + (PAGE_SIZE / 2U)) #define ARM_FW_CONFIG_LIMIT (ARM_BL_RAM_BASE + (PAGE_SIZE / 2U))
/*
* Boot parameters passed from BL2 to BL31/BL32 are stored here
*/
#define ARM_BL2_MEM_DESC_BASE (ARM_FW_CONFIG_LIMIT)
#define ARM_BL2_MEM_DESC_LIMIT (ARM_BL2_MEM_DESC_BASE \
+ (PAGE_SIZE / 2U))
/*
* Define limit of firmware configuration memory:
* ARM_FW_CONFIG + ARM_BL2_MEM_DESC memory
*/
#define ARM_FW_CONFIGS_LIMIT (ARM_BL_RAM_BASE + (PAGE_SIZE * 2))
/* /*
* The max number of regions like RO(code), coherent and data required by * The max number of regions like RO(code), coherent and data required by
* different BL stages which need to be mapped in the MMU. * different BL stages which need to be mapped in the MMU.
*/ */
#define ARM_BL_REGIONS 2 #define ARM_BL_REGIONS 3
#define PLAT_ARM_MMAP_ENTRIES 8 #define PLAT_ARM_MMAP_ENTRIES 8
#define MAX_XLAT_TABLES 5 #define MAX_XLAT_TABLES 5
#define MAX_MMAP_REGIONS (PLAT_ARM_MMAP_ENTRIES + \ #define MAX_MMAP_REGIONS (PLAT_ARM_MMAP_ENTRIES + \
...@@ -201,6 +214,14 @@ ...@@ -201,6 +214,14 @@
MT_DEVICE | MT_RW | MT_SECURE) MT_DEVICE | MT_RW | MT_SECURE)
#endif #endif
/*
* Map the region for device tree configuration with read and write permissions
*/
#define ARM_MAP_BL_CONFIG_REGION MAP_REGION_FLAT(ARM_BL_RAM_BASE, \
(ARM_FW_CONFIGS_LIMIT \
- ARM_BL_RAM_BASE), \
MT_MEMORY | MT_RW | MT_SECURE)
#define CORSTONE700_DEVICE_BASE (0x1A000000) #define CORSTONE700_DEVICE_BASE (0x1A000000)
#define CORSTONE700_DEVICE_SIZE (0x26000000) #define CORSTONE700_DEVICE_SIZE (0x26000000)
#define CORSTONE700_MAP_DEVICE MAP_REGION_FLAT( \ #define CORSTONE700_MAP_DEVICE MAP_REGION_FLAT( \
......
...@@ -120,11 +120,20 @@ ...@@ -120,11 +120,20 @@
MT_DEVICE | MT_RW | MT_SECURE) MT_DEVICE | MT_RW | MT_SECURE)
#endif #endif
/*
* Map the region for device tree configuration with read and write permissions
*/
#define ARM_MAP_BL_CONFIG_REGION MAP_REGION_FLAT(ARM_BL_RAM_BASE, \
(ARM_FW_CONFIGS_LIMIT \
- ARM_BL_RAM_BASE), \
MT_MEMORY | MT_RW | MT_SECURE)
/* /*
* The max number of regions like RO(code), coherent and data required by * The max number of regions like RO(code), coherent and data required by
* different BL stages which need to be mapped in the MMU. * different BL stages which need to be mapped in the MMU.
*/ */
#define ARM_BL_REGIONS 5 #define ARM_BL_REGIONS 6
#define MAX_MMAP_REGIONS (PLAT_ARM_MMAP_ENTRIES + \ #define MAX_MMAP_REGIONS (PLAT_ARM_MMAP_ENTRIES + \
ARM_BL_REGIONS) ARM_BL_REGIONS)
...@@ -173,7 +182,14 @@ ...@@ -173,7 +182,14 @@
* and limit. Leave enough space of BL2 meminfo. * and limit. Leave enough space of BL2 meminfo.
*/ */
#define ARM_FW_CONFIG_BASE (ARM_BL_RAM_BASE + sizeof(meminfo_t)) #define ARM_FW_CONFIG_BASE (ARM_BL_RAM_BASE + sizeof(meminfo_t))
#define ARM_FW_CONFIG_LIMIT (ARM_BL_RAM_BASE + PAGE_SIZE) #define ARM_FW_CONFIG_LIMIT ((ARM_BL_RAM_BASE + PAGE_SIZE) \
+ (PAGE_SIZE / 2U))
/*
* Define limit of firmware configuration memory:
* ARM_FW_CONFIG + ARM_BL2_MEM_DESC memory
*/
#define ARM_FW_CONFIGS_LIMIT (ARM_BL_RAM_BASE + (PAGE_SIZE * 2))
/******************************************************************************* /*******************************************************************************
* BL1 specific defines. * BL1 specific defines.
...@@ -205,6 +221,8 @@ ...@@ -205,6 +221,8 @@
/* Put BL32 below BL2 in NS DRAM.*/ /* Put BL32 below BL2 in NS DRAM.*/
#define ARM_BL2_MEM_DESC_BASE ARM_FW_CONFIG_LIMIT #define ARM_BL2_MEM_DESC_BASE ARM_FW_CONFIG_LIMIT
#define ARM_BL2_MEM_DESC_LIMIT (ARM_BL2_MEM_DESC_BASE \
+ (PAGE_SIZE / 2U))
#define BL32_BASE ((ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE)\ #define BL32_BASE ((ARM_BL_RAM_BASE + ARM_BL_RAM_SIZE)\
- PLAT_ARM_MAX_BL32_SIZE) - PLAT_ARM_MAX_BL32_SIZE)
......
...@@ -54,6 +54,9 @@ ...@@ -54,6 +54,9 @@
/* Data structure which holds the extents of the trusted SRAM for BL1*/ /* Data structure which holds the extents of the trusted SRAM for BL1*/
static meminfo_t bl1_tzram_layout; static meminfo_t bl1_tzram_layout;
/* Boolean variable to hold condition whether firmware update needed or not */
static bool is_fwu_needed;
struct meminfo *bl1_plat_sec_mem_layout(void) struct meminfo *bl1_plat_sec_mem_layout(void)
{ {
return &bl1_tzram_layout; return &bl1_tzram_layout;
...@@ -152,15 +155,15 @@ void arm_bl1_platform_setup(void) ...@@ -152,15 +155,15 @@ void arm_bl1_platform_setup(void)
plat_arm_io_setup(); plat_arm_io_setup();
/* Check if we need FWU before further processing */ /* Check if we need FWU before further processing */
err = plat_arm_bl1_fwu_needed(); is_fwu_needed = plat_arm_bl1_fwu_needed();
if (err) { if (is_fwu_needed) {
ERROR("Skip platform setup as FWU detected\n"); ERROR("Skip platform setup as FWU detected\n");
return; return;
} }
/* Set global DTB info for fixed fw_config information */ /* Set global DTB info for fixed fw_config information */
fw_config_max_size = ARM_FW_CONFIG_LIMIT - ARM_FW_CONFIG_BASE; fw_config_max_size = ARM_FW_CONFIG_LIMIT - ARM_FW_CONFIG_BASE;
set_fw_config_info(ARM_FW_CONFIG_BASE, fw_config_max_size); set_config_info(ARM_FW_CONFIG_BASE, fw_config_max_size, FW_CONFIG_ID);
/* Fill the device tree information struct with the info from the config dtb */ /* Fill the device tree information struct with the info from the config dtb */
err = fconf_load_config(FW_CONFIG_ID); err = fconf_load_config(FW_CONFIG_ID);
...@@ -247,5 +250,5 @@ bool plat_arm_bl1_fwu_needed(void) ...@@ -247,5 +250,5 @@ bool plat_arm_bl1_fwu_needed(void)
******************************************************************************/ ******************************************************************************/
unsigned int bl1_plat_get_next_image_id(void) unsigned int bl1_plat_get_next_image_id(void)
{ {
return plat_arm_bl1_fwu_needed() ? NS_BL1U_IMAGE_ID : BL2_IMAGE_ID; return is_fwu_needed ? NS_BL1U_IMAGE_ID : BL2_IMAGE_ID;
} }
...@@ -26,6 +26,9 @@ ...@@ -26,6 +26,9 @@
/* Data structure which holds the extents of the trusted SRAM for BL2 */ /* Data structure which holds the extents of the trusted SRAM for BL2 */
static meminfo_t bl2_tzram_layout __aligned(CACHE_WRITEBACK_GRANULE); static meminfo_t bl2_tzram_layout __aligned(CACHE_WRITEBACK_GRANULE);
/* Base address of fw_config received from BL1 */
static uintptr_t fw_config_base;
/* /*
* Check that BL2_BASE is above ARM_FW_CONFIG_LIMIT. This reserved page is * Check that BL2_BASE is above ARM_FW_CONFIG_LIMIT. This reserved page is
* for `meminfo_t` data structure and fw_configs passed from BL1. * for `meminfo_t` data structure and fw_configs passed from BL1.
...@@ -57,21 +60,13 @@ CASSERT(BL2_BASE >= ARM_FW_CONFIG_LIMIT, assert_bl2_base_overflows); ...@@ -57,21 +60,13 @@ CASSERT(BL2_BASE >= ARM_FW_CONFIG_LIMIT, assert_bl2_base_overflows);
void arm_bl2_early_platform_setup(uintptr_t fw_config, void arm_bl2_early_platform_setup(uintptr_t fw_config,
struct meminfo *mem_layout) struct meminfo *mem_layout)
{ {
const struct dyn_cfg_dtb_info_t *tb_fw_config_info;
/* Initialize the console to provide early debug support */ /* Initialize the console to provide early debug support */
arm_console_boot_init(); arm_console_boot_init();
/* Setup the BL2 memory layout */ /* Setup the BL2 memory layout */
bl2_tzram_layout = *mem_layout; bl2_tzram_layout = *mem_layout;
/* Fill the properties struct with the info from the config dtb */ fw_config_base = fw_config;
fconf_populate("FW_CONFIG", fw_config);
/* TB_FW_CONFIG was also loaded by BL1 */
tb_fw_config_info = FCONF_GET_PROPERTY(dyn_cfg, dtb, TB_FW_CONFIG_ID);
assert(tb_fw_config_info != NULL);
fconf_populate("TB_FW", tb_fw_config_info->config_addr);
/* Initialise the IO layer and register platform IO devices */ /* Initialise the IO layer and register platform IO devices */
plat_arm_io_setup(); plat_arm_io_setup();
...@@ -135,6 +130,7 @@ void arm_bl2_plat_arch_setup(void) ...@@ -135,6 +130,7 @@ void arm_bl2_plat_arch_setup(void)
#if ARM_CRYPTOCELL_INTEG #if ARM_CRYPTOCELL_INTEG
ARM_MAP_BL_COHERENT_RAM, ARM_MAP_BL_COHERENT_RAM,
#endif #endif
ARM_MAP_BL_CONFIG_REGION,
{0} {0}
}; };
...@@ -151,7 +147,18 @@ void arm_bl2_plat_arch_setup(void) ...@@ -151,7 +147,18 @@ void arm_bl2_plat_arch_setup(void)
void bl2_plat_arch_setup(void) void bl2_plat_arch_setup(void)
{ {
const struct dyn_cfg_dtb_info_t *tb_fw_config_info;
arm_bl2_plat_arch_setup(); arm_bl2_plat_arch_setup();
/* Fill the properties struct with the info from the config dtb */
fconf_populate("FW_CONFIG", fw_config_base);
/* TB_FW_CONFIG was also loaded by BL1 */
tb_fw_config_info = FCONF_GET_PROPERTY(dyn_cfg, dtb, TB_FW_CONFIG_ID);
assert(tb_fw_config_info != NULL);
fconf_populate("TB_FW", tb_fw_config_info->config_addr);
} }
int arm_bl2_handle_post_image_load(unsigned int image_id) int arm_bl2_handle_post_image_load(unsigned int image_id)
......
...@@ -203,7 +203,7 @@ void arm_bl2_dyn_cfg_init(void) ...@@ -203,7 +203,7 @@ void arm_bl2_dyn_cfg_init(void)
unsigned int i; unsigned int i;
bl_mem_params_node_t *cfg_mem_params = NULL; bl_mem_params_node_t *cfg_mem_params = NULL;
uintptr_t image_base; uintptr_t image_base;
size_t image_size; uint32_t image_size;
const unsigned int config_ids[] = { const unsigned int config_ids[] = {
HW_CONFIG_ID, HW_CONFIG_ID,
SOC_FW_CONFIG_ID, SOC_FW_CONFIG_ID,
......
...@@ -8,7 +8,7 @@ ...@@ -8,7 +8,7 @@
/ { / {
/* Platform Config */ /* Platform Config */
plat_arm_bl2 { tb_fw-config {
compatible = "arm,tb_fw"; compatible = "arm,tb_fw";
hw_config_addr = <0x0 0x83000000>; hw_config_addr = <0x0 0x83000000>;
hw_config_max_size = <0x01000000>; hw_config_max_size = <0x01000000>;
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment