AnsweredAssumed Answered

Fatal security violation doesn't result in a transition to hard-fail

Question asked by Ethan Yang on Jul 28, 2017
Latest reply on Jul 28, 2017 by Yuri Muhin

Hi,

According to the "Security Reference Manual for the i.MX 6UltraLite Applications Processor" document, an occurrence of a fatal security violation should always result in a transition to the "soft-fail" state by the "System Security Monitor" (SSM). "Soft-fail" is the state which SSM generates a security interrupt and the fail state indication output, which is treated as a security violation by other modules.

 

By enabling "high assurance" configuration, the processor can even go to "hard-fail" state that triggers a hard reset request output, which should be used in the system to perform a hardware reset without the aid of software. SSM transitions from "soft-fail" to the "hard-fail" state is based on a count down. If enabled, the transition should occur when the value in "HAC counter" counts down to zero.

 

But, after setting these configurations and asserting a fatal-software violation we couldn't observe the automatic system reset in "hard-fail" state with the latest iMX6UL chip. It was observed on the older revision of iMX6UL chip.

 

Are the latest i.MX6UL supposed to act like the previous revision of it? If not, is there an update of SRM for the latest i.MX6UL?

 

Thanks,

Ethan

Outcomes