mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-15 09:04:17 +00:00
docs(rd1ae): update documentation to include BL32
Update the boot sequence in the RD-1 AE documentation to include BL32 (OP-TEE). Signed-off-by: Ziad Elhanafy <ziad.elhanafy@arm.com> Change-Id: I25fdc114bb71d3ad7e1bb2d845f758d6af037e3d
This commit is contained in:
parent
8b27eb7d91
commit
428f4169ab
1 changed files with 29 additions and 7 deletions
|
@ -11,15 +11,34 @@ Further information on RD1-AE is available at `rd1ae`_
|
||||||
Boot Sequence
|
Boot Sequence
|
||||||
-------------
|
-------------
|
||||||
|
|
||||||
BL2 –> BL31 –> BL33
|
The boot process starts from RSE (Runtime Security Engine) that loads the
|
||||||
|
Application Processor (AP) BL2 image and signals the System Control Processor (SCP)
|
||||||
|
to power up the AP. The AP then runs AP BL2
|
||||||
|
|
||||||
The boot process starts from RSE (Runtime Security Engine) that loads the BL2 image
|
The primary compute boot flow follows the following steps:
|
||||||
and signals the System Control Processor (SCP) to power up the Application Processor (AP).
|
|
||||||
The AP then runs BL2, which loads the rest of the images, including the runtime firmware
|
|
||||||
BL31, and proceeds to execute it. Finally, it passes control to the non-secure world
|
|
||||||
BL33 (u-boot).
|
|
||||||
|
|
||||||
BL2 performs the actions described in the `Trusted Board Boot (TBB)`_ document.
|
1. AP BL2:
|
||||||
|
|
||||||
|
* Performs the actions described in the `Trusted Board Boot (TBB)`_ document.
|
||||||
|
* Copies the AP BL31 image from Secure Flash to Secure SRAM
|
||||||
|
* Copies the AP BL32 (OP-TEE) image from Secure Flash to Secure DRAM
|
||||||
|
* Copies the AP BL33 (U-Boot) image from Secure Flash to Normal DRAM
|
||||||
|
* Transfers the execution to AP BL31
|
||||||
|
|
||||||
|
2. AP BL31:
|
||||||
|
|
||||||
|
* Initializes Trusted Firmware-A Services
|
||||||
|
* Transfers the execution to AP BL32 and then transfers the execution to AP BL33
|
||||||
|
* During runtime, acts as the Secure Monitor, handling SMC calls,
|
||||||
|
and context switching between secure and non-secure worlds.
|
||||||
|
|
||||||
|
3. AP BL32:
|
||||||
|
|
||||||
|
* Initializes OP-TEE environment
|
||||||
|
* Initializes Secure Partitions
|
||||||
|
* Transfers the execution back to AP BL31
|
||||||
|
* During runtime, it facilitates secure communication between the
|
||||||
|
normal world environment (e.g. Linux) and the Trusted Execution Environment.
|
||||||
|
|
||||||
Build Procedure (TF-A only)
|
Build Procedure (TF-A only)
|
||||||
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
@ -41,6 +60,9 @@ Build Procedure (TF-A only)
|
||||||
COT=tbbr \
|
COT=tbbr \
|
||||||
ARM_ROTPK_LOCATION=devel_rsa \
|
ARM_ROTPK_LOCATION=devel_rsa \
|
||||||
ROT_KEY=plat/arm/board/common/rotpk/arm_rotprivk_rsa.pem \
|
ROT_KEY=plat/arm/board/common/rotpk/arm_rotprivk_rsa.pem \
|
||||||
|
BL32=<path to optee binary> \
|
||||||
|
SPD=spmd \
|
||||||
|
SPMD_SPM_AT_SEL2=0 \
|
||||||
BL33=<path to u-boot binary> \
|
BL33=<path to u-boot binary> \
|
||||||
|
|
||||||
*Copyright (c) 2024, Arm Limited. All rights reserved.*
|
*Copyright (c) 2024, Arm Limited. All rights reserved.*
|
||||||
|
|
Loading…
Add table
Reference in a new issue