aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBryan O'Donoghue <bryan.odonoghue@linaro.org>2019-05-09 14:36:02 +0100
committerBryan O'Donoghue <bryan.odonoghue@linaro.org>2019-05-09 14:36:02 +0100
commit0239ce57edd332d40f741107621642f86a1c1cb3 (patch)
tree93ccf9e93c8a618fbf5f7fae50fc682363c7e273
parentd40bc61c4a9ebff664408bca9b02656093fc4121 (diff)
plat: imx8: Switch on FIP image extractionimx_4.14.78_1.0.0_ga-mbl-bod
This patch switches on extraction of FIP image elements to the addresses we have defined in the FIP array. Right now the SPL FIT will already have loaded those images such as u-boot and OP-TEE to the same memory address but, after this patch ATF will do that on its own and the SPL/FIT extraction can be gotten rid of. Signed-off-by: Bryan O'Donoghue <bryan.odonoghue@linaro.org>
-rw-r--r--plat/imx/imx8mm/imx8mm_io_storage.c13
1 files changed, 5 insertions, 8 deletions
diff --git a/plat/imx/imx8mm/imx8mm_io_storage.c b/plat/imx/imx8mm/imx8mm_io_storage.c
index 97c9c044..6e1c4831 100644
--- a/plat/imx/imx8mm/imx8mm_io_storage.c
+++ b/plat/imx/imx8mm/imx8mm_io_storage.c
@@ -24,7 +24,7 @@ static const io_block_spec_t fip_block_spec = {
.length = FIP_SIZE
};
static int open_memmap(const uintptr_t spec);
-#if 0
+
static int open_fip(const uintptr_t spec);
@@ -44,7 +44,7 @@ static const io_uuid_spec_t bl33_uuid_spec = {
.uuid = UUID_NON_TRUSTED_FIRMWARE_BL33,
};
-#if TRUSTED_BOARD_BOOT
+#if 0 && TRUSTED_BOARD_BOOT
static const io_uuid_spec_t tb_fw_cert_uuid_spec = {
.uuid = UUID_TRUSTED_BOOT_FW_CERT,
};
@@ -69,7 +69,6 @@ static const io_uuid_spec_t nt_fw_cert_uuid_spec = {
.uuid = UUID_NON_TRUSTED_FW_CONTENT_CERT,
};
#endif /* TRUSTED_BOARD_BOOT */
-#endif
struct plat_io_policy {
uintptr_t *dev_handle;
@@ -83,7 +82,6 @@ static const struct plat_io_policy policies[] = {
(uintptr_t)&fip_block_spec,
open_memmap
},
-#if 0
[BL32_IMAGE_ID] = {
&fip_dev_handle,
(uintptr_t)&bl32_uuid_spec,
@@ -104,7 +102,7 @@ static const struct plat_io_policy policies[] = {
(uintptr_t)&bl33_uuid_spec,
open_fip
},
-#if TRUSTED_BOARD_BOOT
+#if 0 && TRUSTED_BOARD_BOOT
[TRUSTED_BOOT_FW_CERT_ID] = {
&fip_dev_handle,
(uintptr_t)&tb_fw_cert_uuid_spec,
@@ -136,9 +134,8 @@ static const struct plat_io_policy policies[] = {
open_fip
},
#endif /* TRUSTED_BOARD_BOOT */
-#endif
};
-#if 0
+
static int open_fip(const uintptr_t spec)
{
int result;
@@ -155,7 +152,7 @@ static int open_fip(const uintptr_t spec)
}
return result;
}
-#endif
+
static int open_memmap(const uintptr_t spec)
{
int result;