Part Number: AM625
Dear TI
I'm verifying secure boot according to "AM62X_OTP_Keywriter_User_Guide_11.01.00.pdf"
I installed all required packages and SDK and execute below command.
4.2.3 Build the Keywriter Certificates
- ./gen_keywr_cert.sh --msv 0xC0FFE -t tifek/ti_fek_public.pem
Then I could find "final_certificate.bin" in source/security/sbl_keywriter/scripts/cert_gen/x509cert/
4.2.4 Build the example
- make -sj clean PROFILE=debug && make -sj PROFILE=debug
Then I could find tiboot3.bin in source/security/sbl_keywriter/am62x-sk/r5fss0-0_nortos/ti-arm-clang
I set AM625_SK EVM to SD boot mode and boot with this tiboot3.bin
Below is the log from R5, unfortunately I missed M4 log but I can confirm that the debug_response is 0x0000 and "Success Programming Keys" message.
0x420002
0x820024
0x4003007
0x4400B17
0x409031
0x800023
# Decrypting extensions..
#
MPK Options: 0x0
MEK Options: 0x0
MPK Opt P1: 0x0
MPK Opt P2: 0x0
MEK Opt : 0x0
SMPKH extension programming disabled
SMEK extension programming disabled
EXT OTP extension programming disabled
* BCH code & MSV: fe0fac8b
JTAG DISABLE programming disabled
KEY CNT extension programming disabled
KEY REV extension programming disabled
SWREV extension programming disabled
FW CFG REV extension programming disabled
* KEYWR VERSION: 0x20000
#
# Programming Keys..
#
* MSV:
[u32] bch + msv: 0x0
Programmed 2/2 rows successfully
[u32] bch + msv: 0x8BAC0FFE
* JTAG DISABLE:
[u32] JTAG DISABLE: 0x0
JTAG DISABLE extension programming disabled
[u32] JTAG DISABLE: 0x0
* SWREV:
[u32] SWREV-SBL: 0x1
[u32] SWREV-SYSFW: 0x1
SWREV extension programming disabled
[u32] SWREV-SBL: 0x1
[u32] SWREV-SYSFW: 0x1
* FW CFG REV:
[u32] SWREV-FW-CFG-REV: 0x1
SWREV SEC BCFG extension programming disabled
[u32] SWREV-FW-CFG-REV: 0x1
* EXT OTP:
EXT OTP extension programming disabled
* BMPKH, BMEK:
BMPKH extension programming disabled
BMEK extension programming disabled
* SMPKH, SMEK:
SMPKH extension programming disabled
SMEK extension programming disabled
* KEYCNT:
[u32] keycnt: 0x0
KEY CNT extension programming disabled
[u32] keycnt: 0x0
* KEYREV:
[u32] keyrev: 0x0
KEY REV extension programming disabled
[u32] keyrev: 0x0
But when I check the boot log with UART boot, it is still HSFS
-----------------------
SoC ID Header Info:
-----------------------
NumBlocks : 2
-----------------------
SoC ID Public ROM Info:
-----------------------
SubBlockId : 1
SubBlockSize : 26
DeviceName : am62x
DeviceType : HSFS
DMSC ROM Version : [0, 1, 0, 1]
R5 ROM Version : [0, 1, 0, 1]
-----------------------
SoC ID Secure ROM Info:
-----------------------
Sec SubBlockId : 2
Sec SubBlockSize : 166
Sec Prime : 0
Sec Key Revision : 0
Sec Key Count : 0
Sec TI MPK Hash : d68ecb2c055dff11ade95bd927e837d2a53bc23b0a2800cebce4f106bcf309df2213912d77a157a8b7c2df40672a06a918034aa4c7d603e462481475225d49b8
Sec Cust MPK Hash : ad0bc40b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Sec Unique ID : c090e3c49076ef1bfab52a03204c9df515e10237962b22e0c8c2fe099281ac1a
Could you check and let me know how to debug it ?
BR
Jace