About

Work - Learn - Share

Lê Quang Thành : quangthanh010290@gmail.com | thanhlev@amazon.com.vn

Tiny210 Information for development

Table of contents

  1. Table of contents
  2. SoC
  3. Address Map
    1. Device specific address space
    2. Special function register map
  4. Booting
    1. Booting sequence
      1. iROM(BL0) boot-up sequence
      2. First stage bootloader(BL1) boot-up sequence
      3. Second stage bootloader(BL2) boot-up sequence
    2. Boot Device Configuration
    3. BL1 image boot block assignment
      1. SD/MMC/eSSD Device Boot Block Assignment
      2. eMMC Device Boot Block Assignment
      3. OneNAND/NAND Device Boot Block Assignment
    4. Secure boot
      1. Secure booting sequence
        1. The iROM code (BL0)
        2. The first boot loader (BL1)
        3. The second boot loader (BL2)

SoC

Address Map

Device specific address space

Special function register map

Booting

Booting sequence

Note

BL1 / BL2 : It can be variable size copied from boot device to internal SRAM area. BL1 max. size is 16KB. BL2 max. size is 80KB.

iROM(BL0) boot-up sequence

First stage bootloader(BL1) boot-up sequence

Second stage bootloader(BL2) boot-up sequence

Boot Device Configuration

The booting device can be chosen from following list:

iROM checks for OM pins to priority boot devices

BL1 image boot block assignment

SD/MMC/eSSD Device Boot Block Assignment

eMMC Device Boot Block Assignment

OneNAND/NAND Device Boot Block Assignment

Secure boot

According to the datasheet The basic criterion for security system is “The ‘root of trust’ has to be hardware. You cannot request a software system to ‘validate’ itself.”

In S5PV210, the root of trust is implemented by iROM code in internal ROM. Therefore it cannot be modified by unauthorized users. The hardware design proves the integrity of iROM code. On the other hand, the first boot loader, the second boot loader and OS images are stored in external memory devices. Therefore, the iROM code (that has already been proved as secure) should verify the integrity of first boot loader. If the integrity check passes on first boot loader, the first boot loader is included in trust region. Then, first boot loader verifies the integrity of the second boot loader, the second boot loader verifies the integrity of the OS image.

Secure booting sequence

The iROM code (BL0)
The first boot loader (BL1)
The second boot loader (BL2)