12.07.2015 Views

PXA3xx Boot ROM Reference Manual - Marvell

PXA3xx Boot ROM Reference Manual - Marvell

PXA3xx Boot ROM Reference Manual - Marvell

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PXA3xx</strong> Processors and Tavor Processor<strong>Boot</strong> <strong>ROM</strong> <strong>Reference</strong> <strong>Manual</strong>9.2 Preprogrammed Flash RequirementsFor large-volume manufacturing, the preprogramming of flash memory is supported. When using atrusted image module, the requirements are as follows:• Program the trusted image module to the correct offset; contact your <strong>Marvell</strong> ApplicationsEngineer for more information.• Program the OEM boot module and any other image described in the non-trusted imagemodule, to the address indicated by FlashEntryAddr of the trusted image module.• Perform device provisioning using a Device Keying Binary.Programming of the fuses is required when a trusted image module is used. The Trusted <strong>Boot</strong> <strong>ROM</strong>examines flash memory and searches for the non-trusted image module. After it is found, the imageis loaded, the CRC verified, and control is transferred.9.3 JTAG Re-enablementTo troubleshoot failed parts returned from the field, it is necessary to gain access to the devicethrough the JTAG port. However, access to this port is disabled by non-volatile fuses in devices withthe security module enabled. This feature protects the security module and the device fromcompromise, but also prevents the primary debug interface. However, there is a challenge/responsemechanism for re-enabling the JTAG port.After the JTAG port is re-enabled, it remains accessible until the next power-on reset. After apower-on reset, the JTAG challenge/response must occur again before the JTAG port can be used.The <strong>Boot</strong> <strong>ROM</strong> enables the JTAG challenge/response mechanism during initialization of the WTM,using the OEM’s JTAG re-enabling key hash stored in the trusted image module and in the one-timeprogrammable registers (if available) during the device keying process.After the WTM is enabled for the JTAG challenge/response, one attempt per power-on reset isallowed. After a failed attempt, the WTM locks out the JTAG port until a power-on reset hasoccurred. If the validation of the trusted image module fails during the platform initialization, a newtrusted image module must first be downloaded and validated using the OEM platform bind keyburned into the WTM fuses.12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758Doc. No. MV-S301208-00 Rev. - PUBLIC RELEASE Copyright © 2010 <strong>Marvell</strong>Page 92

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!