<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>LayerscapeのトピックRe: During prototyping, can secured boot functionality be tested without blowing fuses?</title>
    <link>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919324#M4397</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When secure is performed, secMon HP Status Register indicate 1101b = Trusted in SSM_STATE&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 05 Nov 2019 09:34:49 GMT</pubDate>
    <dc:creator>yipingwang</dc:creator>
    <dc:date>2019-11-05T09:34:49Z</dc:date>
    <item>
      <title>During prototyping, can secured boot functionality be tested without blowing fuses?</title>
      <link>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919313#M4386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I would like to know a temporary way of provisioning SRKH Register(without blowing the fuses) and executing secured boot.&lt;/P&gt;&lt;P&gt;I am aware of SFP SRKH Mirror Registers being mapped to&amp;nbsp;0x01E80254 location onwards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Question 1:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;If we write to these mirror register will they have any effect on fuse array?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Question 2:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;What is the endian-ness of SRKH Register?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Question 3:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;During prototyping, can secured boot functionality be tested without blowing fuses?. If so, how?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Rashmitha&lt;/P&gt;&lt;P&gt;&lt;A class="jx-jive-macro-user" href="https://community.nxp.com/people/chitra.amzarewale@utas.utc.com"&gt;chitra.amzarewale@utas.utc.com&lt;/A&gt;‌&lt;/P&gt;&lt;P&gt;&lt;A class="jx-jive-macro-user" href="https://community.nxp.com/people/shivesh.sood@collins.com"&gt;shivesh.sood@collins.com&lt;/A&gt;‌&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2019 05:14:10 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919313#M4386</guid>
      <dc:creator>rashmitharamesh</dc:creator>
      <dc:date>2019-10-15T05:14:10Z</dc:date>
    </item>
    <item>
      <title>Re: During prototyping, can secured boot functionality be tested without blowing fuses?</title>
      <link>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919314#M4387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;A _jive_internal="true" data-content-finding="Community" data-userid="345679" data-username="rashmitharamesh.nair@collins.com" href="https://community.nxp.com/people/rashmitharamesh.nair@collins.com"&gt;Rashmitha Ramesh Nair&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Only writing mirror registers will not affect fuse array.&lt;/P&gt;&lt;P&gt;2. SRKH Register is little endian on Layerscape platform.&lt;/P&gt;&lt;P&gt;3. During prototyping stage, the user needs to put the boot core in holdoff mode, setting BOOT_HO = 1 and enabled secure boot by SB_EN=1 in RCW. Then use CCS to connect to the target board to write SRKH mirror register without blowing fuses?&lt;/P&gt;&lt;P&gt;Platforms LS1021, LS1043, LS1046&lt;/P&gt;&lt;P&gt;ccs::config_server 0 10000&lt;BR /&gt;ccs::config_chain {&amp;lt;platform&amp;gt; dap sap2}&lt;BR /&gt;display ccs::get_config_chain&lt;BR /&gt;#Check Initial SNVS State and Value in SCRATCH Registers&lt;BR /&gt;ccs::display_mem &amp;lt;dap position&amp;gt; 0x1e90014 4 0 4&lt;BR /&gt;ccs::display_mem &amp;lt;dap position&amp;gt; 0x1ee0200 4 0 4&lt;BR /&gt;#Wrie the SRK Hash Value in Mirror Registers&lt;BR /&gt;ccs::write_mem &amp;lt;dap position&amp;gt; 0x1e80254 4 0 &amp;lt;SRKH1&amp;gt;&lt;BR /&gt;ccs::write_mem &amp;lt;dap position&amp;gt; 0x1e80258 4 0 &amp;lt;SRKH2&amp;gt;&lt;BR /&gt;ccs::write_mem &amp;lt;dap position&amp;gt; 0x1e8025c 4 0 &amp;lt;SRKH3&amp;gt;&lt;BR /&gt;ccs::write_mem &amp;lt;dap position&amp;gt; 0x1e80260 4 0 &amp;lt;SRKH4&amp;gt;&lt;BR /&gt;ccs::write_mem &amp;lt;dap position&amp;gt; 0x1e80264 4 0 &amp;lt;SRKH5&amp;gt;&lt;BR /&gt;ccs::write_mem &amp;lt;dap position&amp;gt; 0x1e80268 4 0 &amp;lt;SRKH6&amp;gt;&lt;BR /&gt;ccs::write_mem &amp;lt;dap position&amp;gt; 0x1e8026c 4 0 &amp;lt;SRKH7&amp;gt;&lt;BR /&gt;ccs::write_mem &amp;lt;dap position&amp;gt; 0x1e80270 4 0 &amp;lt;SRKH8&amp;gt;&lt;BR /&gt;#Get the Core Out of Boot Hold-Off&lt;BR /&gt;ccs::write_mem &amp;lt;dap position&amp;gt; 0x1ee00e4 4 0 0x00000001&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Platforms LS1088, LS2088&lt;/P&gt;&lt;P&gt;ccs::config_chain {&amp;lt;platform&amp;gt; sap2}&lt;BR /&gt;display ccs::get_config_chain&lt;BR /&gt;puts "Entry RSP: "&lt;BR /&gt;ccs::write_mem 2 0x7 0x001000D0 0x4 0x0 0x800&lt;BR /&gt;set ::littleendian(2) 1&lt;BR /&gt;ccs::write_mem &amp;lt;sap position&amp;gt; 0x1e80254 4 0 &amp;lt;SRKH1&amp;gt;&lt;BR /&gt;ccs::write_mem &amp;lt;sap position&amp;gt; 0x1e80258 4 0 &amp;lt;SRKH2&amp;gt;&lt;BR /&gt;ccs::write_mem &amp;lt;sap position&amp;gt; 0x1e8025c 4 0 &amp;lt;SRKH3&amp;gt;&lt;BR /&gt;ccs::write_mem &amp;lt;sap position&amp;gt; 0x1e80260 4 0 &amp;lt;SRKH4&amp;gt;&lt;BR /&gt;ccs::write_mem &amp;lt;sap position&amp;gt; 0x1e80264 4 0 &amp;lt;SRKH5&amp;gt;&lt;BR /&gt;ccs::write_mem &amp;lt;sap position&amp;gt; 0x1e80268 4 0 &amp;lt;SRKH6&amp;gt;&lt;BR /&gt;ccs::write_mem &amp;lt;sap position&amp;gt; 0x1e8026c 4 0 &amp;lt;SRKH7&amp;gt;&lt;BR /&gt;ccs::write_mem &amp;lt;sap position&amp;gt; 0x1e80270 4 0 &amp;lt;SRKH8&amp;gt;&lt;BR /&gt;set ::littleendian(2) 0&lt;BR /&gt;puts "Exiting RSP: "&lt;BR /&gt;ccs::write_mem 2 0x7 0x001000D0 0x4 0x0 0x400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please refer to the section "4.4.2 Running secure boot on target platforms" in LSDK 1906 user manual.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please refer to &lt;A href="https://community.nxp.com/docs/DOC-332248"&gt;Setting up Secure Boot on PBL Based Platforms in Prototype Stage&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Yiping&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2019 08:08:33 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919314#M4387</guid>
      <dc:creator>yipingwang</dc:creator>
      <dc:date>2019-10-16T08:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: During prototyping, can secured boot functionality be tested without blowing fuses?</title>
      <link>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919315#M4388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A class="jx-jive-macro-user" href="https://community.nxp.com/people/yipingwang"&gt;yipingwang&lt;/A&gt;‌,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In CST,&lt;/P&gt;&lt;P&gt;First step is ./gen_keys xxxx ===&amp;gt;Which generates keys ===&amp;gt;srk.pri and srk.pub&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second step is ./uni_sign &amp;lt;loc&amp;gt;/input_uboot_qspi_secure ===&amp;gt;Which generates CSF Header ===&amp;gt;hdr_uboot.out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to understand what all are included in this .out file. From the comments displayed by CST, I can make out that digital signature is appended.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Question 1:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Does .out file include public key also?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Or should public key be loaded as a separate image?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Question 2:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;What is the address of ESBC Pointer Register which points to CSF Header location? (FOR LS1046ARDB)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;(SCRATCHRW1 - Pointer to ESBC Header (Primary Boot Image))&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;This is for 1st level authentication done by ISBC&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a confusion if I should used DCFG Reg or SCFG Reg. There are SCRATCHRW Registers in both.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards,&lt;/P&gt;&lt;P&gt;Rashmitha&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Oct 2019 07:33:44 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919315#M4388</guid>
      <dc:creator>rashmitharamesh</dc:creator>
      <dc:date>2019-10-17T07:33:44Z</dc:date>
    </item>
    <item>
      <title>Re: During prototyping, can secured boot functionality be tested without blowing fuses?</title>
      <link>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919316#M4389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Rashmitha,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. There are RSA public and private key pairs, private keys are used to sign the images and public keys are keys are used to validate the image during ISBC and ESBC phase. Public keys are embedded in the header and the hash of SRK table is fused in SRKH register of SFP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Please refer to the following in ls1043aqds/uboot_hdr_addr.rcw of RCW package. &lt;STRONG&gt;CSF Header&lt;/STRONG&gt; is at 0x606c0000, the address of&amp;nbsp;DCFG_CCSR_SCRATCHRW1 is at&amp;nbsp; 1EE_0200.&lt;/P&gt;&lt;P&gt;.pbi&lt;BR /&gt;// Workaround for u-boot address.&lt;BR /&gt;write 0xee0200, 0x606c0000&lt;BR /&gt;.end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Yiping&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Oct 2019 03:52:24 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919316#M4389</guid>
      <dc:creator>yipingwang</dc:creator>
      <dc:date>2019-10-18T03:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: During prototyping, can secured boot functionality be tested without blowing fuses?</title>
      <link>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919317#M4390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Yiping,&lt;/P&gt;&lt;P&gt;That was very helpful. Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I changed SB_EN=1 and BOOT_HO=1 in RCW&lt;/P&gt;&lt;P&gt;I wrote SRKH Registers, loaded CSF Header and ESBC binary&lt;/P&gt;&lt;P&gt;Released the core by writing 0x0100 0000 to 0x01EE00E4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DCFG_CCSR_SCRATCHRW2 at 0x01EE0204 is having the value 0101 (Indicating mismatch)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Question 1:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;QORIQ-SDK-2.0 documentations&amp;nbsp;&lt;/P&gt;&lt;P&gt;Section&amp;nbsp;10.3.1.3 Pre-Boot Phase : talks about writing some LAWS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i) Are writing these LAWS mandatory? I have not included it in my execution currently.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ii) Could you please provide me the LAWS for LS1046ARDB (Along with purpose of each LAW, so that i can discard the ones that are not needed)&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&lt;EM&gt;My inputs are:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;(RCW_SRC=QSPI&amp;nbsp; ||&amp;nbsp; &amp;nbsp;CSF Header Location= 0x4070 0000&amp;nbsp; ||&amp;nbsp; ESBC Binary Location= 0x40100000)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;iii) How and where should these LAWS be included?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Rashmitha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Oct 2019 04:37:42 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919317#M4390</guid>
      <dc:creator>rashmitharamesh</dc:creator>
      <dc:date>2019-10-18T04:37:42Z</dc:date>
    </item>
    <item>
      <title>Re: During prototyping, can secured boot functionality be tested without blowing fuses?</title>
      <link>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919318#M4391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Rashmitha,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAWs is only needed in PowerPC Architecture, no this concept in ARM architecture processor.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Yiping&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Oct 2019 06:10:17 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919318#M4391</guid>
      <dc:creator>yipingwang</dc:creator>
      <dc:date>2019-10-21T06:10:17Z</dc:date>
    </item>
    <item>
      <title>Re: During prototyping, can secured boot functionality be tested without blowing fuses?</title>
      <link>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919319#M4392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Yiping&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am facing an error because I did not fuse OTPMK &lt;SPAN style="color: #51626f;"&gt;(OTPMK_ZERO=1 in SFP HP Status Register)&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #51626f; background-color: #ffffff;"&gt;I am trying to fuse OTPMK now, &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #51626f; background-color: #ffffff;"&gt;But there is a mismatch&amp;nbsp;in the value shown in AN5227 of SFP HP Status Register and the value on my board&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #51626f; background-color: #ffffff;"&gt;As per AN5227, the value should be 88000900 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #51626f; background-color: #ffffff;"&gt;My value is 8800AB00&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #51626f; background-color: #ffffff;"&gt;SECURITY_CONFIG and SSM_STATE have mismatch&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #51626f; background-color: #ffffff;"&gt;QORIQTRUST2.1UG_RevB does not provide explanation for SECURITY_CONFIG values.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #ffffff; color: #51626f; "&gt;What does SECURITY_CONFIG = 1010b (0xA)&amp;nbsp;mean?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Rashmitha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2019 03:24:34 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919319#M4392</guid>
      <dc:creator>rashmitharamesh</dc:creator>
      <dc:date>2019-10-22T03:24:34Z</dc:date>
    </item>
    <item>
      <title>Re: During prototyping, can secured boot functionality be tested without blowing fuses?</title>
      <link>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919320#M4393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;STRONG class=""&gt;&lt;SPAN class=""&gt; Ramesh Nair&lt;/SPAN&gt;&lt;/STRONG&gt;,&lt;/P&gt;&lt;P&gt;Please refer to the following for OTPMK key programming.&lt;/P&gt;&lt;P&gt;OTPMK[255:0] is:&lt;BR /&gt;1a4721b1d5371cf735e6975844932d9ce2f460b7aa7816a774e2aba90adca9a2&lt;BR /&gt;NAME | BITS | VALUE&lt;BR /&gt;_________|______________|____________&lt;BR /&gt;OTPMKR 0 | 255-224 | 1a4721b1&lt;BR /&gt;OTPMKR 1 | 223-192 | d5371cf7&lt;BR /&gt;OTPMKR 2 | 191-160 | 35e69758&lt;BR /&gt;OTPMKR 3 | 159-128 | 44932d9c&lt;BR /&gt;OTPMKR 4 | 127- 96 | e2f460b7&lt;BR /&gt;OTPMKR 5 | 95- 64 | aa7816a7&lt;BR /&gt;OTPMKR 6 | 63- 32 | 74e2aba9&lt;BR /&gt;OTPMKR 7 | 31- 0 | 0adca9a2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Write OTPMK registers to fuse array under CCS.&lt;BR /&gt;% config cc cwtap:10.81.116.21&lt;BR /&gt;% ccs::config_server 0 10000&lt;BR /&gt;% ccs::config_chain {ls1043a dap sap2}&lt;BR /&gt;% display ccs::get_config_chain&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;Chain Position 32: DAP&lt;BR /&gt;Chain Position 33: SAP2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Write OTPMK to mirror registers.&lt;BR /&gt;ccs::write_mem 32 0x1e80234 4 0 0x1a4721b1&lt;BR /&gt;ccs::write_mem 32 0x1e80238 4 0 0xd5371cf7&lt;/P&gt;&lt;P&gt;ccs::write_mem 32 0x1e8023c 4 0 0x35e69758&lt;BR /&gt;ccs::write_mem 32 0x1e80240 4 0 0x44932d9c&lt;BR /&gt;ccs::write_mem 32 0x1e80244 4 0 0xe2f460b7&lt;BR /&gt;ccs::write_mem 32 0x1e80248 4 0 0xaa7816a7&lt;BR /&gt;ccs::write_mem 32 0x1e8024c 4 0 0x74e2aba9&lt;BR /&gt;ccs::write_mem 32 0x1e80250 4 0 0x0adca9a2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check OTPMK_ZERO and OTPMK_SYNDROME as 0 in SecMon_HP Status Register&lt;BR /&gt;% ccs::display_mem 32 0x1e90014 4 0 4&lt;BR /&gt;Check SFP_SVHESR no parity error.&lt;BR /&gt;% ccs::display_mem 32 0x1e80024 4 0 4&lt;BR /&gt;Permanently write OTPMK from the mirror registers into the fuse array&lt;BR /&gt;ccs::write_mem 32 0x1e80020 4 0 0x00000002&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Yiping&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Oct 2019 09:12:33 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919320#M4393</guid>
      <dc:creator>yipingwang</dc:creator>
      <dc:date>2019-10-24T09:12:33Z</dc:date>
    </item>
    <item>
      <title>Re: During prototyping, can secured boot functionality be tested without blowing fuses?</title>
      <link>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919321#M4394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A class="jx-jive-macro-user" href="https://community.nxp.com/people/yipingwang"&gt;yipingwang&lt;/A&gt;‌&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have fused OTPMK correctly without any errors. (For SRKH, I am using the "temporary write to mirror registers" option)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when I enable SB_EN =1 in RCW and try to execute Secure Boot&lt;/P&gt;&lt;P&gt;My application is running (prints on UART)&lt;/P&gt;&lt;P&gt;But&lt;/P&gt;&lt;P&gt;(i)SCRATCHRW2 Registers has &lt;STRONG&gt;0x 41 03&lt;/STRONG&gt; (when I load SRKH in mirror register with %BE)&lt;/P&gt;&lt;P&gt;(ii) Same register has value &lt;STRONG&gt;0x 40 03&lt;/STRONG&gt; (when I load SRKH in mirror register with %LE)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;EM&gt;Question 1&lt;/EM&gt;&lt;/SPAN&gt;: I am not able to find the meaning of these error codes in ISBC ERROR CODES section. What do these errors indicate?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From LSDK 19.06,&amp;nbsp;&lt;STRONG&gt;6.1.2.10 ISBC error codes =&amp;gt;&amp;nbsp;Error handling in development environment (ITS = 0, SB_EN = 1)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I understand that the application runs if the error is NON-FATAL.&lt;/P&gt;&lt;P&gt;But even if i corrupt the hash or do not give hash in mirror registers, the application runs, &lt;STRONG&gt;&lt;EM&gt;bypassing&lt;/EM&gt;&lt;/STRONG&gt; secure-boot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;SPAN style="text-decoration: underline;"&gt;&lt;EM&gt;Question 2:&lt;/EM&gt;&lt;/SPAN&gt; What are the reasons for secure-boot bypass even when SB_EN=1 in RCW ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Rashmitha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Oct 2019 02:30:18 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919321#M4394</guid>
      <dc:creator>rashmitharamesh</dc:creator>
      <dc:date>2019-10-25T02:30:18Z</dc:date>
    </item>
    <item>
      <title>Re: During prototyping, can secured boot functionality be tested without blowing fuses?</title>
      <link>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919322#M4395</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. Please refer to section "6.1.1.8 Troubleshooting" in LSDK 19.06 document.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background: white;"&gt;2. &lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;The behavior you see is correct, i.e system wouldn’t reset if there is mismatch in the hash but would continue when we do secure boot with SB_EN=1.&lt;/SPAN&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'Times New Roman',serif; color: black;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background: white;"&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'Times New Roman',serif; color: black;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background: white;"&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;The system would get reset for this error , if your secure boot with ITS=1. (blowing fuse ITS)&lt;/SPAN&gt;&lt;SPAN lang="EN-US" style="font-size: 12.0pt; font-family: 'Times New Roman',serif; color: black;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Oct 2019 09:19:14 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919322#M4395</guid>
      <dc:creator>yipingwang</dc:creator>
      <dc:date>2019-10-30T09:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: During prototyping, can secured boot functionality be tested without blowing fuses?</title>
      <link>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919323#M4396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A class="jx-jive-macro-user" href="https://community.nxp.com/people/yipingwang"&gt;yipingwang&lt;/A&gt;‌&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;Thank you for your reply&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;In development environment (ITS = 0, SB_EN = 1)&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;STRONG&gt;(ITS bit&amp;nbsp;&lt;SPAN style="text-decoration: underline;"&gt;NOT&lt;/SPAN&gt; fused)&lt;/STRONG&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;STRONG&gt;Question 1: What are the conditions that should be checked to ensure secure boot is performed?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;(Other than&amp;nbsp;DCFG_CCSR_SCRATCHRW2 having a zero value)&amp;nbsp;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;STRONG&gt;Question 2: Should SecMon HP Status Register indicate 1101b = Trusted in SSM_STATE&amp;nbsp; when secure boot is performed?&lt;/STRONG&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;Rashmitha&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;A class="jx-jive-macro-user" href="https://community.nxp.com/people/chitra.amzarewale@utas.utc.com"&gt;chitra.amzarewale@utas.utc.com&lt;/A&gt;‌&lt;/P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;A class="jx-jive-macro-user" href="https://community.nxp.com/people/shivesh.sood@collins.com"&gt;shivesh.sood@collins.com&lt;/A&gt;‌&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Nov 2019 09:22:42 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919323#M4396</guid>
      <dc:creator>rashmitharamesh</dc:creator>
      <dc:date>2019-11-04T09:22:42Z</dc:date>
    </item>
    <item>
      <title>Re: During prototyping, can secured boot functionality be tested without blowing fuses?</title>
      <link>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919324#M4397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When secure is performed, secMon HP Status Register indicate 1101b = Trusted in SSM_STATE&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2019 09:34:49 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Layerscape/During-prototyping-can-secured-boot-functionality-be-tested/m-p/919324#M4397</guid>
      <dc:creator>yipingwang</dc:creator>
      <dc:date>2019-11-05T09:34:49Z</dc:date>
    </item>
  </channel>
</rss>

