AM43xx Generation

Secure Boot

Secure TI devices require a boot image that is authenticated by ROM code to function. Without this, even JTAG remains locked and the device is essentially useless. In order to create a valid boot image for a secure device from TI, the initial public software image must be signed and combined with various headers, certificates, and other binary images.

Information on the details on the complete boot image format can be obtained from Texas Instruments. The tools used to generate boot images for secure devices are part of a secure development package (SECDEV) that can be downloaded from:

The secure development package is access controlled due to NDA and export control restrictions. Access must be requested and granted by TI before the package is viewable and downloadable. Contact TI, either online or by way of a local TI representative, to request access.

1. Booting of U-Boot SPL

When CONFIG_TI_SECURE_DEVICE is set, the U-Boot SPL build process requires the presence and use of these tools in order to create a viable boot image. The build process will look for the environment variable TI_SECURE_DEV_PKG, which should be the path of the installed SECDEV package. If the TI_SECURE_DEV_PKG variable is not defined or if it is defined but doesn’t point to a valid SECDEV package, a warning is issued during the build to indicate that a final secure bootable image was not created.

Within the SECDEV package exists an image creation script:

${TI_SECURE_DEV_PKG}/scripts/create-boot-image.sh

This is called as part of the SPL/u-boot build process. As the secure boot image formats and requirements differ between secure SOC from TI, the purpose of this script is to abstract these details as much as possible.

The script is basically the only required interface to the TI SECDEV package for creating a bootable SPL image for secure TI devices.

create-boot-image.sh \
             <IMAGE_FLAG> <INPUT_FILE> <OUTPUT_FILE> <SPL_LOAD_ADDR>

<IMAGE_FLAG> is a value that specifies the type of the image to generate OR the action the image generation tool will take. Valid values are:

SPI_X-LOADER

Generates an image for SPI flash (byte swapped)

XIP_X-LOADER

Generates a single stage u-boot for NOR/QSPI XiP

ISSW

Generates an image for all other boot modes

<INPUT_FILE> is the full path and filename of the public world boot loaderbinary file (depending on the boot media, this is usually either u-boot-spl.bin or u-boot.bin).

<OUTPUT_FILE> is the full path and filename of the final secure image. The output binary images should be used in place of the standard non-secure binary images (see the platform-specific user’s guides and releases notes for how the non-secure images are typically used)

u-boot-spl_HS_SPI_X-LOADER

byte swapped boot image for SPI flash

u-boot_HS_XIP_X-LOADER

boot image for NOR or QSPI Xip flash

u-boot-spl_HS_ISSW

boot image for all other boot media

<SPL_LOAD_ADDR> is the address at which SOC ROM should load the <INPUT_FILE>

2. Booting of Primary U-Boot (u-boot.img)

The SPL image is responsible for loading the next stage boot loader, which is the main u-boot image. For secure TI devices, the SPL will be authenticated, as described above, as part of the particular device’s ROM boot process. In order to continue the secure boot process, the authenticated SPL must authenticate the main u-boot image that it loads.

The configurations for secure TI platforms are written to make the boot process use the FIT image format for the u-boot.img (CONFIG_SPL_FRAMEWORK and CONFIG_SPL_LOAD_FIT). With these configurations the binary components that the SPL loads include a specific DTB image and u-boot image. These DTB image may be one of many available to the boot process. In order to secure these components so that they can be authenticated by the SPL as they are loaded from the FIT image, the build procedure for secure TI devices will secure these images before they are integrated into the FIT image. When those images are extracted from the FIT image at boot time, they are post-processed to verify that they are still secure. The outlined security-related SPL post-processing is enabled through the CONFIG_SPL_FIT_IMAGE_POST_PROCESS option which must be enabled for the secure boot scheme to work. In order to allow verifying proper operation of the secure boot chain in case of successful authentication messages like “Authentication passed” are output by the SPL to the console for each blob that got extracted from the FIT image.

The exact details of the how the images are secured is handled by the SECDEV package. Within the SECDEV package exists a script to process an input binary image:

${TI_SECURE_DEV_PKG}/scripts/secure-binary-image.sh

This is called as part of the u-boot build process. As the secure image formats and requirements can differ between the various secure SOCs from TI, this script in the SECDEV package abstracts these details. This script is essentially the only required interface to the TI SECDEV package for creating a u-boot.img image for secure TI devices.

The SPL/u-boot code contains calls to dedicated secure ROM functions to perform the validation on the secured images. The details of the interface to those functions is shown in the code. The summary is that they are accessed by invoking an ARM secure monitor call to the device’s secure ROM (fixed read-only-memory that is secure and only accessible when the ARM core is operating in the secure mode).

Invoking the secure-binary-image script for Secure Devices

secure-binary-image.sh <INPUT_FILE> <OUTPUT_FILE>

<INPUT_FILE> is the full path and filename of the input binary image

<OUTPUT_FILE> is the full path and filename of the output secure image.

QSPI U-Boot support

Host processor is connected to serial flash device via qpsi interface. QSPI is a kind of spi module that allows single, dual and quad read access to external spi devices. The module has a memory mapped interface which provide direct interface for accessing data form external spi devices.

The one QSPI in the device is primarily intended for fast booting from Quad SPI flash devices.

Usecase

MLO/u-boot.img will be flashed from SD/MMC to the flash device using serial flash erase and write commands. Then, switch settings will be changed to qspi boot. Then, the ROM code will read MLO from the predefined location in the flash, where it was flashed and execute it after storing it in SDRAM. Then, the MLO will read u-boot.img from flash and execute it from SDRAM.

SPI mode

SPI mode uses mtd spi framework for transfer and reception of data. Can be used in:

  1. Normal mode: use single pin for transfers

  2. Dual Mode: use two pins for transfers.

  3. Quad mode: use four pin for transfer

Memory mapped read mode

In this, SPI controller is configured using configuration port and then controller is switched to memory mapped port for data read.

Driver

drivers/qspi/ti_qspi.c
  • File which is responsible for configuring the qspi controller and also for providing the low level api which is responsible for transferring the datas from host controller to flash device and vice versa.

Testing

These are the testing details of qspi flash driver with Macronix M25L51235 flash device.

The test includes
  • probing the flash device

  • erasing the flash device

  • Writing to flash

  • Reading the contents of the flash.

Test Log

Hit any key to stop autoboot:  0
=> sf probe 0
SF: Detected MX25L51235F with page size 256 Bytes, erase size 64 KiB, total 64 MiB, mapped at 30000000
=> sf erase 0 0x80000
SF: 524288 bytes @ 0x0 Erased: OK
=> mw 81000000 0xdededede 0x40000
=> sf write 81000000 0 0x40000
SF: 262144 bytes @ 0x0 Written: OK
=> sf read 82000000 0 0x40000
SF: 262144 bytes @ 0x0 Read: OK
=> md 0x82000000
82000000: dededede dededede dededede dededede    ................
82000010: dededede dededede dededede dededede    ................
82000020: dededede dededede dededede dededede    ................
82000030: dededede dededede dededede dededede    ................
82000040: dededede dededede dededede dededede    ................
82000050: dededede dededede dededede dededede    ................
82000060: dededede dededede dededede dededede    ................
82000070: dededede dededede dededede dededede    ................
82000080: dededede dededede dededede dededede    ................
82000090: dededede dededede dededede dededede    ................
820000a0: dededede dededede dededede dededede    ................
820000b0: dededede dededede dededede dededede    ................
820000c0: dededede dededede dededede dededede    ................
820000d0: dededede dededede dededede dededede    ................
820000e0: dededede dededede dededede dededede    ................
820000f0: dededede dededede dededede dededede    ................
=> md 0x82010000
82010000: dededede dededede dededede dededede    ................
82010010: dededede dededede dededede dededede    ................
82010020: dededede dededede dededede dededede    ................
82010030: dededede dededede dededede dededede    ................
82010040: dededede dededede dededede dededede    ................
82010050: dededede dededede dededede dededede    ................
82010060: dededede dededede dededede dededede    ................
82010070: dededede dededede dededede dededede    ................
82010080: dededede dededede dededede dededede    ................
82010090: dededede dededede dededede dededede    ................
820100a0: dededede dededede dededede dededede    ................
820100b0: dededede dededede dededede dededede    ................
820100c0: dededede dededede dededede dededede    ................
820100d0: dededede dededede dededede dededede    ................
820100e0: dededede dededede dededede dededede    ................
820100f0: dededede dededede dededede dededede    ................
=> md 0x82030000
82030000: dededede dededede dededede dededede    ................
82030010: dededede dededede dededede dededede    ................
82030020: dededede dededede dededede dededede    ................
82030030: dededede dededede dededede dededede    ................
82030040: dededede dededede dededede dededede    ................
82030050: dededede dededede dededede dededede    ................
82030060: dededede dededede dededede dededede    ................
82030070: dededede dededede dededede dededede    ................
82030080: dededede dededede dededede dededede    ................
82030090: dededede dededede dededede dededede    ................
820300a0: dededede dededede dededede dededede    ................
820300b0: dededede dededede dededede dededede    ................
820300c0: dededede dededede dededede dededede    ................
820300d0: dededede dededede dededede dededede    ................
820300e0: dededede dededede dededede dededede    ................
820300f0: dededede dededede dededede dededede    ................