User manual

Table Of Contents
Zynq-7000 AP SoC Technical Reference Manual www.xilinx.com 775
UG585 (v1.11) September 27, 2016
Chapter 32: Device Secure Boot
32.3.4 Boot Partition Search
The BootROM supports the capability to fall-back and reload a different FSBL if there is a problem
with the initial FSBL. In a secure boot, this feature is only supported if the RSA authentication fails,
regardless of the encryption status of the FSBL. The new FSBL being loaded must also be signed. If
the decryption or HMAC authentication of the FSBL fails, then the device enters secure lockdown.
See section 6.3.10 BootROM Header Search for more information.
32.3.5 JTAG and Debug Considerations
Whenever the BootROM is running, the PS DAP and the PL TAP controllers are disabled, eliminating
any JTAG access to the AP SoC device.
In non-secure boot modes JTAG access is restored once the BootROM has completed execution.
In secure boot modes JTAG access can be restored by the FSBL or subsequent PS images as these
applications are considered trusted. Access to the DAP enable registers can be locked out using the
Device Configuration Interface LOCK register.
The PS DAP and PL TAP controllers can be permanently disabled using the JTAG CHAIN DISABLE
eFuse. The JTAG access to the PL can also be disabled by setting the DISABLE_JTAG configuration
option when creating the PL bitstream. (see UG628
, Command Line Tools User Guide for more
information.
32.3.6 Readback
Whenever an encrypted bitstream is loaded into the PL, readback of the internal configuration
memory cannot be performed by any of the external interfaces, including JTAG. The only readback
access to the configuration memory after an encrypted bitstream load is via PCAP or ICAP. The PCAP
and ICAP interfaces are trusted channels since access to these interfaces are from an authenticated
PS image or an authenticated PL bitstream.
32.3.7 Secure Boot Modes of Operation
Zynq RSA authentication and AES encryption features can be used in a number of combinations to
deliver a flexible secure boot solution. Table 32-4 through Table 32-6 show the possible
authentication and encryption options available for a Zynq secure boot. The following two points
must be taken into consideration when using secure boot:
1. The FSBL must be encrypted if any other PS images or PL bitstreams are required to be
encrypted.
2. The BootROM only provides authentication for the FSBL. If any other PS images or PL bitstreams
require authentication, the RSA algorithm must be provided as user software.