12.07.2015 Views

PXA3xx Boot ROM Reference Manual - Marvell

PXA3xx Boot ROM Reference Manual - Marvell

PXA3xx Boot ROM Reference Manual - Marvell

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

13 Other <strong>Boot</strong> <strong>ROM</strong> FeaturesThis chapter provides details about the functionality between the <strong>Boot</strong> <strong>ROM</strong> and other systemcomponents.13.1 Optional Settings in the TIM/NTIM ModulesThe reserved areas of the trusted image module and non-trusted image module are provided for useby the OEM. A few optional settings are available to modify certain functionality of the <strong>Boot</strong> <strong>ROM</strong>,specifically, settings for an optional download port and custom GPIO settings. The structure below isinterpreted by the <strong>Boot</strong> <strong>ROM</strong> and the settings are used at boot time or any other time the <strong>Boot</strong> <strong>ROM</strong>owns system resources. Refer to 5.8 "Handling Power Mode and Reset Transitions" to see the list ofresets and power modes.typedef struct{UINT_T Addr;UINT_T Value;}GPIO_DEF, *pGPIO_DEF;typedef struct{UINT_T Identifier;UINT_T PortType;UINT_T Port;UINT_T GPIOPresent;UINT_T NumGpios;pGPIO_DEFGPIO;}OPT_SET, *pOPT_SET//Option Identifiers#define OPTIONALHEADER 0x4F505448 // "OPTH"#define FFIDENTIFIER 0x00004646 // "FF"#define ALTIDENTIFIER 0x00414C54 // "ALT"#define DIFFIDENTIFIER 0x44696666 // "Diff"#define SEIDENTIFIER 0x00005345 // "SE"#define UARTID 0x55415254 // "UART"#define USBID 0x00555342 // "USB"#define PINSIDENTIFIER 0x50696E73 // "Pins"#define TERMINATOR 0x5465726D // "Term"13.2 Tamper Recovery MechanismsA tamper recover mechanism was implemented in the <strong>Boot</strong> <strong>ROM</strong> for trusted platforms. Refer toTable 1, Version 2.xx and Version 3.xx High Level Differences, on page 15 for specific processorsupport of this feature.The tamper recover mechanism works with the Device Keying Binary and Wireless Trusted PlatformService Package (WTPSP) security device driver. An install status word has been added to theWireless Trusted Module (WTM) save state data that allows the <strong>Boot</strong> <strong>ROM</strong>, the Device KeyingBinary, and WTPSP to keep track of the status of the last boot attempt.Three states are defined: successful boot, backup boot, and corrupted save state. If the state isanything but a successful boot or backup state, the <strong>Boot</strong> <strong>ROM</strong> performs a WTM initialization to an12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758Copyright © 2010 <strong>Marvell</strong> PUBLIC RELEASE Doc. No. MV-S301208-00 Rev. -Page 105

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!