7.41.Socionext UniPhier

Socionext UniPhier Armv8-A SoCs use Trusted Firmware-A (TF-A) as the secureworld firmware, supporting BL2 and BL31.

UniPhier SoC family implements its internal boot ROM, which loads 64KB[1]image from a non-volatile storage to the on-chip SRAM, and jumps over to it.TF-A provides a special mode, BL2-AT-EL3, which enables BL2 to execute at EL3.It is useful for platforms with non-TF-A boot ROM, like UniPhier. Here, aproblem is BL2 does not fit in the 64KB limit ifTrusted Board Boot (TBB) is enabled.To solve this issue, Socionext provides a first stage loader calledUniPhier BL. This loader runs in the on-chip SRAM, initializes the DRAM,expands BL2 there, and hands the control over to it. Therefore, all imagesof TF-A run in DRAM.

The UniPhier platform works with/without TBB. See below for the build processof each case. The image authentication for the UniPhier platform fullycomplies with the Trusted Board Boot Requirements (TBBR) specification.

The UniPhier BL does not implement the authentication functionality, that is,it can not verify the BL2 image by itself. Instead, the UniPhier BL assuresthe BL2 validity in a different way; BL2 is GZIP-compressed and appended tothe UniPhier BL. The concatenation of the UniPhier BL and the compressed BL2fits in the 64KB limit. The concatenated image is loaded by the internal bootROM (and verified if the chip fuses are blown).

7.41.1.Boot Flow

  1. The Boot ROM

    This is hard-wired ROM, so never corrupted. It loads the UniPhier BL (withcompressed-BL2 appended) into the on-chip SRAM. If the SoC fuses are blown,the image is verified by the SoC’s own method.

  2. UniPhier BL

    This runs in the on-chip SRAM. After the minimum SoC initialization and DRAMsetup, it decompresses the appended BL2 image into the DRAM, then jumps tothe BL2 entry.

  3. BL2 (at EL3)

    This runs in the DRAM. It extracts more images such as BL31, BL33 (optionallySCP_BL2, BL32 as well) from Firmware Image Package (FIP). If TBB is enabled,they are all authenticated by the standard mechanism of TF-A.After loading all the images, it jumps to the BL31 entry.

  4. BL31, BL32, and BL33

    They all run in the DRAM. SeeFirmware Design for details.

7.41.2.Basic Build

BL2 must be compressed for the reason above. The UniPhier’s platform makefileprovides a build targetbl2_gzip for this.

For a non-secure boot loader (aka BL33), U-Boot is well supported for UniPhierSoCs. The U-Boot image (u-boot.bin) must be built in advance. For the buildprocedure of U-Boot, refer to the document in theU-Boot project.

To build minimum functionality for UniPhier (without TBB):

makeCROSS_COMPILE=<gcc-prefix>PLAT=uniphierBL33=<path-to-BL33>bl2_gzipfip

Output images:

  • bl2.bin.gz

  • fip.bin

7.41.3.Optional features

  • Trusted Board Boot

    mbed TLS is needed as the cryptographic and image parser modules.Refer to thePrerequisites document for the appropriate version ofmbed TLS.

    To enable TBB, add the following options to the build command:

    TRUSTED_BOARD_BOOT=1GENERATE_COT=1MBEDTLS_DIR=<path-to-mbedtls>
  • System Control Processor (SCP)

    If desired, FIP can include an SCP BL2 image. If BL2 finds an SCP BL2 imagein FIP, BL2 loads it into DRAM and kicks the SCP. Most of UniPhier boardsstill work without SCP, but SCP provides better power management support.

    To include SCP BL2, add the following option to the build command:

    SCP_BL2=<path-to-SCP>
  • BL32 (Secure Payload)

    To enable BL32, add the following options to the build command:

    SPD=<spd>BL32=<path-to-BL32>

    If you use TSP for BL32,BL32=<path-to-BL32> is not required. Just add thefollowing:

    SPD=tspd
[1]

Some SoCs can load 80KB, but the software implementation must be alignedto the lowest common denominator.