System and Method for Booting a Multiprocessor Device Based on Selection of Encryption Keys to be Provided to Processors

ABSTRACT

A system and method for booting a multiprocessor device based on selection of encryption keys to be provided to the processors are provided. With the system and method, a security key and one or more randomly generated key values are provided to a selector mechanism of each processor of the multiprocessor device. A random selection mechanism is provided in pervasive logic that randomly selects one of the processors to be a boot processor and thereby, provides a select signal to the selector of the boot processor such that the boot processor selects the security key. All other processors select one of the one or more randomly generated key values. As a result, only the randomly selected boot processor is able to use the proper security key to decrypt the boot code for execution.

BACKGROUND

1. Technical Field

The present application relates generally to an improved data processingsystem and method. More specifically, the present application isdirected to a system and method for booting a multiprocessor devicebased on selection of encryption keys to be provided to processors.

2. Description of Related Art

As our society becomes increasingly dependent upon electroniccommunication and storage of information, concerns over the security ofdigital information, such as personal information and digital rightsmanagement (DRM), have increased. Moreover, the sophistication ofcomputer hackers and other unauthorized interlopers into computingsystems has increased in recent years. As a result, much effort has goneinto the development of security systems for computing devices so thatsuch sensitive digital information may be secured from unauthorizedaccess.

One way in which an intruder may gain access to a computing system is toobserve the boot activity of a computing system through electricalinterfaces and other observable electromagnetic or thermal activity. Byobserving the boot activity in this way, the intruder may deduce whatdata signals are being input and output by the boot processor, whatcryptographic algorithms are running on the processors, and the like.From this information, an intruder may detect points in the bootsequence where unauthorized intrusion may be made. Moreover, with secureboot sequences in which security keys are required for booting of thesystem, the intruder may reverse the cryptographic algorithm used by theboot processor to obtain access to the security keys and thereby begiven complete access to the computing system. Since the overallsecurity of the computing system is often dependent upon the security ofthe boot process, when the intruder gains access to the boot sequence,the security of the entire system may be at risk.

Thus, it would be beneficial to have an apparatus and method thatincreases the difficulty of monitoring the boot sequence of a processorso as to make the system more secure from unauthorized intrusion.

SUMMARY

The illustrative embodiments provide a system and method for selecting arandom processor to boot a multiprocessor system and for booting amultiprocessor device based on selection of encryption keys to beprovided to processors. By randomizing which processor will be used toboot the multiprocessor system, the ability of unauthorized persons tomonitor the electrical interfaces, thermal activity, and otherelectromagnetic activity to obtain information about the boot sequencefor purposes of defeating the security of the system is made moredifficult. For example, in a multiprocessor system, the would-beintruder would either need to run the boot sequence many different timeswhile monitoring a single processor in hopes that it may be randomlyselected as the boot processor, or monitor all of the processors at bootin order to determine which one was the actual boot processor. Bothoptions require considerable effort on the part of the would-be intruderthat may act as a deterrent from actually attempting to monitor thesystem to obtain boot sequence information or at least add significantdelay to the time it would take the would-be intruder to compromise thesystem.

With the mechanisms of the illustrative embodiments, pervasive logic isprovided on a multiprocessor system, such as a system-on-a-chip, thatcontrols the boot operation of the multiprocessor system. The pervasivelogic includes a random event generator which randomly selects whichprocessor in the multiprocessor system is to be the boot processor thatruns the boot code to thereby bring the system into an operationalstate. Based on the random selection of a boot processor, aconfiguration bit associated with the boot processor is set indicatingthat processor to be the boot processor. Thereafter, the selected bootprocessor is provided with the necessary security key(s) for securebooting of the multiprocessor system into an operational state.

In some illustrative embodiments, while the randomly selected processorperforms the secure boot operation, the other processors of themultiprocessor system perform operations to mask the real secure bootoperation. This masking may involve executing other code sequences,other than the boot code sequence, that cause the processors to generateelectromagnetic and/or thermal outputs that, if monitored by aninterloper, would make it difficult for the interloper to distinguishwhich processor is performing the actual secure boot operation.

One way in which a different code sequence may be generated is byinserting random delay elements into the boot code that run loops whichiterate a random amount. In this way, each processor may run the bootcode but with differing delay amounts thereby causing differentelectromagnetic and thermal signatures to be generated. From aninterloper's perspective, it will be very difficult to discern theactual boot processor from the other processors in the multiprocessorsystem due to such masking.

In a further illustrative embodiment, the code sequences performed bythe other processors are the same boot code sequence that the randomlyselected processor executes but with dummy security keys. Thus, theseother processors operate and look, to an interloper, as if they areperforming the secure boot operation. However, if the processors aremonitored, false electromagnetic and thermal outputs are identified thatmake it difficult for the interloper to determine if the monitoredprocessor is the actual randomly selected processor that is performingthe secure boot operation.

In a still further illustrative embodiment, masking of the randomlyselected boot processor may be performed by providing a dummy processor.The dummy processor appears, from an electromagnetic, thermal, etc.,monitoring apparatus perspective, as if it is unique by runningprocesses different from the boot code sequence on this dummy processorto thereby redirect attacks on the system to this dummy processor. Inthis way, when an interloper attempts to access the system by gettingaround the security mechanisms, the interloper only accesses a dummyprocessor that does not have actual access to the rest of themultiprocessor system.

In other illustrative embodiments, the boot code sequence may bedistributed across a plurality of processors in the multiprocessorsystem. By distributing the boot code sequence across a plurality ofprocessors in the multiprocessor system, the number of processors thatmust be compromised in order to obtain complete information about theboot sequence and thereby circumvent security measures is increased.Thus, the distributed boot operation of the illustrative embodiments ismore secure than multiprocessor data processing systems that utilize asingle secure core. Furthermore, by distributing the boot operation, ifany portion of the boot operation is compromised, the boot operationfails, thereby preventing an unauthorized individual from circumventingthe security of the system.

With this illustrative embodiment, the boot code sequence is partitionedinto a plurality of partitions such that each partition may be providedto a different processor of the multiprocessor system. As each partitionof the boot code sequence is executed, that partition must completecorrectly on its respective processor before the boot code sequence mayproceed on another processor. A secure communication mechanism is usedto communicate satisfactory completion of a previous partition of theboot code sequence. This secure communication mechanism may include asecurity token, such as an encrypted password or other securityidentifier, e.g., a public/private encryption key pair, that indicatesthat the previous session was not compromised. In this way, a chain ofdependent “sessions” are created that must complete satisfactorily.

The processors that are involved in the distributed execution of theboot code may be all of the processors in the multiprocessor system or asub-set of the processors in the multiprocessor system. For example, arandom selection mechanism, such as that described above for selecting asingle boot processor, may be used to randomly select a plurality ofboot processors to be used in booting the system in a distributedmanner. Moreover, the particular partitions of the boot code that areexecuted by the processors may be randomly selected such that, with eachpower-on reset (POR) operation, the same processor may or may notexecute the same boot code partition as in a previous POR operation.Thus, randomization may be performed with regard to which processors areinvolved in the distributed boot operation as well as with regard towhat boot code partitions each processor will execute.

Other processors of the multiprocessor system, i.e. non-boot processors,may either not perform any work during the distributed boot operation ormay execute masking code sequences, of one or more of the variousmasking code illustrative embodiments described previously, to mask theboot code execution on the randomly selected sub-set of processors. Inother words, the distributed boot code sequence operation of the presentillustrative embodiment may be combined with one or more of thepreviously described illustrative embodiments.

In one illustrative embodiment, a method is provided, in a dataprocessing system having a plurality of processors, for booting the dataprocessing system. The method may comprise receiving, in each processorof the plurality of processors, a secret key value and at least onerandom key value. One of the processors of the plurality of processorsmay be randomly selected to be a boot processor. Each of the processorsof the plurality of processors may select a key value for the processorbased on the random selection of the boot processor. Only the bootprocessor is permitted to select the secret key as its corresponding keyvalue with each of the other processors of the plurality of processorsselecting one of the at least one random key value as theircorresponding key value. The boot processor may receive encrypted bootcode from an encrypted boot code storage and may decrypt the encryptedboot code using the secret key value. The boot processor may thenexecute the decrypted boot code to thereby boot the data processingsystem to an operational state.

Each processor of the plurality of processors may receive the secret keyvalue and a predetermined number of random key values. The predeterminednumber of random key values may be equal to a number of processors inthe plurality of processors. Each processor of the plurality ofprocessors that is not selected to be the boot processor may select adifferent key value from the at least one random key value.

Bach processor in the plurality of processors may comprise amultiplexer. The secret key value and the at least one random key valuemay be provided as inputs to the multiplexer of each processor in theplurality of processors and a select signal may be provided to eachmultiplexer of each processor in the plurality of processors. The selectsignal input to a multiplexer of a processor may have an associatedvalue corresponding to the selection of the key value for the processor.

Randomly selecting one of the processors of the plurality of processorsto be a boot processor may comprise using a random event generatorprovided in pervasive logic of the data processing system to generate arandom value and decoding the random value to identify a processor fromthe plurality of processors in the data processing system to be the bootprocessor. The random event generator may comprise a linear feedbackshift register (LFSR) counter and a ring oscillator coupled to the LFSR.The ring oscillator may provide an input to the LFSR to thereby generatea random value.

As mentioned above, the at least one random key value may comprise aplurality of random key values. Each random key value in the pluralityof random key values may be generated by a separate random key valuegenerator. Alternatively, each random key value in the plurality ofrandom key values may be generated by a same random key value generator.

The data processing system may be a heterogeneous multiprocessorsystem-on-a-chip. The heterogeneous multiprocessor system-on-a-chip mayhave a first processor that operates according to a first instructionset and one or more second processors that operate according to a secondinstruction set different from the first instruction set. The firstinstruction set may be, for example, a RISC instruction set and thesecond instruction set may be, for example, a SIMD instruction set.

In another illustrative embodiment, a data processing system is providedthat comprises a plurality of processors, pervasive logic coupled to theprocessors, at least one random key generator coupled to the pluralityof processors, an encrypted boot code storage coupled to the pluralityof processors, and a secret key storage coupled to the plurality ofprocessors. Each processor of the plurality of processors may receive asecret key value from the secret key storage and at least one random keyvalue from the at least one random key generator. The pervasive logicmay randomly select one of the processors of the plurality of processorsto be a boot processor. Each processor of the processors of theplurality of processors may select a key value for the processor basedon the random selection of the boot processor. Only the boot processoris permitted to select the secret key as its corresponding key value andeach of the other processors of the plurality of processors selects oneof the at least one random key value as their corresponding key value.The boot processor may receive encrypted boot code from the encryptedboot code storage and may decrypt the encrypted boot code using thesecret key value. The decrypted boot code may then be executed by theboot processor to thereby boot the data processing system to anoperational state.

Each processor of the plurality of processors may receive the secret keyvalue and a predetermined number of random key values. The predeterminednumber of random key values may be equal to a number of processors inthe plurality of processors. Each processor of the plurality ofprocessors that were not selected to be the boot processor may select adifferent key value from the at least one random key value.

Each processor in the plurality of processors may comprise amultiplexer. The secret key value and the at least one random key valuemay be provided as inputs to the multiplexer of each processor in theplurality of processors and a select signal may be provided to eachmultiplexer of each processor in the plurality of processors. The selectsignal input to a multiplexer of a processor may have an associatedvalue corresponding to the selection of the key value for the processor.

The pervasive logic may comprise a random event generator and a decoder.The pervasive logic may randomly select one of the processors of theplurality of processors to be a boot processor by using the random eventgenerator to generate a random value and using the decoder to decode therandom value to identify a processor from the plurality of processors inthe data processing system to be the boot processor. The random eventgenerator may comprise a linear feedback shift register (LFSR) counterand a ring oscillator coupled to the LFSR. The ring oscillator mayprovide an input to the LFSR to thereby generate a random value.

As mentioned above, the at least one random key value may comprises aplurality of random key values. Each random key value in the pluralityof random key values may be generated by a separate random key valuegenerator. Alternatively, each random key value in the plurality ofrandom key values may be generated by a same random key value generator.

In yet a further illustrative embodiment, a computer program productcomprising a computer useable medium having a computer readable programis provided. The computer readable program, when executed on a dataprocessing system, may cause the data processing system to performvarious ones, and combinations of, the operations outlined above withregard to the method illustrative embodiment described previously.

These and other features and advantages of the present invention will bedescribed in, or will become apparent to those of ordinary skill in theart in view of, the following detailed description of the exemplaryembodiments of the present invention.

BRIEF DESCRIPTION OF THE DRAWINGS

The novel features believed characteristic of the invention are setforth in the appended claims. The invention itself, however, as well asa preferred mode of use, further objectives and advantages thereof, willbest be understood by reference to the following detailed description ofan illustrative embodiment when read in conjunction with theaccompanying drawings, wherein:

FIG. 1 is an exemplary block diagram of a multiprocessor system in whichthe illustrative embodiments may be implemented;

FIG. 2 is an exemplary diagram illustrating the primary operationalcomponents of a random boot processor selection mechanism in accordancewith one illustrative embodiment;

FIG. 3A is an exemplary diagram illustrating a random selectionmechanism in accordance with one illustrative embodiment;

FIG. 3B is a graphical representation of jitter introduced into theinput to a LFSR counter of a random event generator in accordance withone illustrative embodiment;

FIG. 3C is an exemplary diagram illustrating an illustrative embodimentin which a secret key and a plurality of randomly generated key valuesare provided to processors using parallel signal lines;

FIGS. 4A-4D are exemplary diagrams illustrating masking operations formasking a secure boot operation of a randomly selected boot processor inaccordance with illustrative embodiments;

FIG. 5 is a flowchart outlining an exemplary operation for randomlyselecting a processor in a multiprocessor system as a boot processor;

FIG. 6 is a flowchart outlining an exemplary operation for masking aboot code sequence in accordance with one illustrative embodiment;

FIG. 7A is an exemplary diagram illustrating a distributed bootoperation configured as a daisy chain or ring arrangement in accordancewith one illustrative embodiment;

FIG. 7B is an exemplary diagram illustrating a distributed bootoperation configured as a master/slave arrangement in accordance withone illustrative embodiment; and

FIG. 8 is a flowchart outlining an exemplary operation for distributedbooting of a multiprocessor system in accordance with one illustrativeembodiment.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The illustrative embodiments provide an apparatus and method forselecting a random processor to boot on a multiprocessor system. Theillustrative embodiments may be implemented for use with anymultiprocessor system in which one of the processors may be selected forbooting the multiprocessor system. Thus, the mechanisms of theillustrative embodiments are applicable to symmetric multiprocessor(SMP) systems, heterogeneous multiprocessor systems, non-coherentasymmetrical multiprocessor systems, and the like.

One multiprocessor system in which the illustrative embodiments may beimplemented is the Cell Broadband Engine (CBE) available fromInternational Business Machines, Inc. of Armonk, N.Y. The illustrativeembodiments will be described with reference to the CBE architecture,however, it should be appreciated that the description of theillustrative embodiments is only exemplary and is not intended to stateor imply any limitation with regard to the types or configurations ofthe multiprocessor systems in which the mechanisms of the illustrativeembodiments may be implemented. Many modifications to the described CBEarchitecture may be made without departing from the spirit and scope ofthe present invention.

FIG. 1 is an exemplary block diagram of a data processing system inwhich aspects of the present invention may be implemented. The exemplarydata processing system shown in FIG. 1 is an example of the CellBroadband Engine (CBE) data processing system. While the CBE will beused in the description of the preferred embodiments of the presentinvention, the present invention is not limited to such, as will bereadily apparent to those of ordinary skill in the art upon reading thefollowing description.

As shown in FIG. 1, the CBE 100 includes a power processor element (PPE)110 having a power processor unit (PPU) 116 and its L1 and L2 caches 112and 114, and multiple synergistic processor elements (SPEs) 120-134 thateach has its own synergistic processor unit (SPU) 140-154, memory flowcontrol 155-162, local memory or store (LS) 163-170, and bus interfaceunit (BIU unit) 180-194 which may be, for example, a combination directmemory access (DMA), memory management unit (MMU), and bus interfaceunit. A high bandwidth internal element interconnect bus (EIB) 196, abus interface controller (BIC) 197, and a memory interface controller(MIC) 198 are also provided.

The CBE 100 may be a system-on-a-chip such that each of the elementsdepicted in FIG. 1 may be provided on a single microprocessor chip.Moreover, the CBE 100 is a heterogeneous processing environment in whicheach of the SPUs may receive different instructions from each of theother SPUs in the system. Moreover, the instruction set for the SPUs isdifferent from that of the PPU, e.g., the PPU may execute ReducedInstruction Set Computer (RISC) based instructions while the SPUsexecute Single Instruction Multiple Data (SIMD) instructions.

The SPEs 120-134 are coupled to each other and to the L2 cache 114 viathe EIB 196. In addition, the SPEs 120-134 are coupled to MIC 198 andBIC 197 via the EIB 196. The MIC 198 provides a communication interfaceto shared memory 199. The BIC 197 provides a communication interfacebetween the CBE 100 and other external buses and devices, such as aSouthBridge™ communications processor, for example.

The PPE 110 is a dual threaded PPE 110. The combination of this dualthreaded PPE 110 and the eight SPEs 120-134 makes the CBE 100 capable ofhandling 10 simultaneous threads and over 128 outstanding memoryrequests. The PPE 110 acts as a controller for the other eight SPEs120-134 which handle most of the computational workload. The PPE 110 maybe used to run conventional operating systems while the SPEs 120-134perform vectorized floating point code execution, for example.

The SPEs 120-134 comprise a synergistic processing unit (SPU) 140-154,memory flow control units 155-162, local memory or store 163-170, andbus interface units 180-194. The local memory or store 163-170, in oneexemplary embodiment, comprises a 256 KB instruction and data memorywhich is visible to the PPE 110 and can be addressed directly bysoftware.

The PPE 110 may load the SPEs 120-134 with small programs or threads,chaining the SPEs together to handle each step in a complex operation.For example, a set-top box incorporating the CBE 100 may load programsfor reading a DVD, video and audio decoding, and display, and the datawould be passed off from SPE to SPE until it finally ended up on theoutput display. At 4 GHz, each SPE 120-134 gives a theoretical 32 GFLOPSof performance with the PPE 110 having a similar level of performance.

The memory flow control units (MFCs) 155-162 serve as an interface foran SPU to the rest of the system and other elements. The MFCs 155-162provide the primary mechanism for data transfer, protection, andsynchronization between main storage and the local storages 163-170.There is logically an MFC for each SPU in a processor. Someimplementations can share resources of a single MFC between multipleSPUs. In such a case, all the facilities and commands defined for theMFC must appear independent to software for each SPU. The effects ofsharing an MFC are limited to implementation-dependent facilities andcommands.

The illustrative embodiments provide an apparatus and method forselecting a random processor, such as one of the SPEs 120-134, to boot amultiprocessor system, e.g., the CBE 100. By randomizing which SPE120-134 will be used to boot the CBE 100, the ability of unauthorizedpersons to monitor the electrical interfaces, thermal activity, andother electromagnetic activity to obtain information about the bootsequence for purposes of defeating the security of the CBE 100 is mademore difficult.

With the mechanisms of the illustrative embodiments, pervasive logic 193is provided on the CBE 100 which controls the boot operation of the CBE100. The pervasive logic 193 includes a random event generator whichrandomly selects which SPE 120-134 is to be the boot processor that runsthe boot code to thereby bring the system into an operational state.Based on the random selection of a boot SPE 120-134, a configuration bitassociated with the selected SPE, e.g., SPE 120, is set indicating thatSPE 120 to be the actual boot processor. Thereafter, the selected SPE120 is provided with the necessary security key(s) for secure booting ofthe CBE 100 into an operational state. When the chosen SPE successfullycompletes the secure boot procedure, it will transition from a securestate, wherein the MIC 198, Shared Memory 199, and a portion of the BIC197 other than the communication link to Flash Rom 230 in FIG. 2hereafter, are shutdown and prevented from operation, to an unlockedstate. Once the secure SPE enters the unlocked state, it will initiatethe process of fully enabling the MIC 198, BIC 197 (a process referredto as “training”), and all other processors (SPEs and PPE) by executingthe encrypted code provided by the Flash ROM 230. For more informationregarding the secure boot process used in the Cell Broadband Engine,reference is made to co-pending and commonly assigned U.S. PatentApplication Publication No. 20050021944, which is hereby incorporated byreference.

In some illustrative embodiments, while the randomly selected SPE 120performs the secure boot operation, the other SPEs 122-134 performoperations to mask the real secure boot operation. This masking mayinvolve executing other code sequences, other than the boot codesequence, that cause the SPEs 122-134 to generate electrical,electromagnetic, and/or thermal outputs that, if monitored by aninterloper, would make it difficult for the interloper to distinguishwhich SPE 120-134 is performing the actual secure boot operation.

One way in which a different code sequence may be generated is byinserting random delay elements into the boot code that run loops whichiterate a random amount. These random delay elements are added so thatwhile booting the processor, the secure-boot algorithm will change in arandom way to cause different electromagnetic and thermal signatures,thereby making it difficult to compare two different boot operationsover time. In this way, each SPE 120-134 may run the boot code but withdiffering delay amounts thereby causing different electromagnetic andthermal signatures to be generated. Moreover, the same SPE 120-134 willgenerate different electromagnetic and thermal signatures each time itruns the secure boot code. From an interloper's perspective, it will bevery difficult to discern the actual boot SPE 120 from the other SPEs122-134 in the CBE 100 due to such masking.

In a further illustrative embodiment, the code sequences performed bythe other SPEs 122-134 are the same boot code sequence that the randomlyselected SPE 120 executes but with dummy security keys. Thus, theseother SPEs 122-134 operate and look, to an interloper, as if they areperforming the secure boot operation. However, if the SPEs 122-134 aremonitored, false electrical, electromagnetic, and thermal outputs areidentified that make it difficult for the interloper to determine if themonitored SPE is the actual randomly selected SPE 120 that is performingthe secure boot operation.

In a still further illustrative embodiment, masking of the randomlyselected boot SPE 120 may be performed by providing a dummy SPE (notshown). The dummy SPE appears, from an electromagnetic, thermal, etc.,monitoring apparatus perspective, as if it is unique by runningprocesses different from the boot code sequence on this dummy SPE tothereby redirect attacks on the CBE 100 to this dummy SPE. In this way,when an interloper attempts to access the system by getting around thesecurity mechanisms, the interloper only accesses a dummy SPE that doesnot have actual access to the rest of the CBE 100. Furthermore, if theintruder compromises the dummy SPE and attempts to execute code, thedummy SPE can then shutdown the rest of the CBE 100 to prevent furtherintrusion attempts.

Each of the above mentioned illustrative embodiments will now bedescribed in greater detail. It should be appreciated that, while eachillustrative embodiment will be described separately herein, theillustrative embodiments may be combined in various ways so as toachieve even greater security of the multiprocessor system, e.g., CBE100. Thus, any combination of the illustrative embodiments that isdeemed suitable to a particular situation and multiprocessor environmentis intended to be within the spirit and scope of the present invention.

FIG. 2 is an exemplary diagram illustrating the primary operationalcomponents of a random boot processor selection mechanism in accordancewith one illustrative embodiment. It should be appreciated that, forsimplicity of the explanation of the illustrative embodiments, FIG. 2only shows one processor of a multiprocessor system in detail. However,it should be appreciated that each of the processors of themultiprocessor system have a similar arrangement of elements and operatein a similar manner to that of the processor that is explicitly shown inFIG. 2. Any number of processors may be included in the multiprocessorsystem without departing from the spirit and scope of the presentinvention. However, for purposes of explanation of the illustrativeembodiments, it will be assumed that the number of processors is eightas in the CBE architecture shown in FIG. 1.

As shown in FIG. 2, the primary operational components of a random bootprocessor selection mechanism include a system controller 210, a securekey storage 220, a flash ROM 230, and pervasive logic 240. In oneillustrative embodiment, taking the CBE architecture of FIG. 1 asexemplary, elements 210-240 may be elements that are provided on thechip in which the CBE architecture is implemented. That is, theseelements 210-240 may be built into the logic of a multiprocessorsystem-on-a-chip (SoC) and thus, the operations performed by theseelements 210-240 may be performed on-chip. Alternatively, one or more ofthe elements may be provided off chip, e.g., the flash ROM 230 may beprovided off-chip.

The system controller 210 is responsible for performing the initialoperations of a power on reset (POR) to bring the power of the system toan acceptable and stable level. That is, the system controller 210 isresponsible for bringing up the voltages, turning on the system clock,and other initial operations required for bringing the multiprocessorsystem to a state where boot operations may begin, as is generally knownin the art. As part of this POR operation, the processors 280-290 arebrought up in a secure mode of operation. In this secure mode ofoperation, the processor's local stores are not accessible outside theprocessor. The system controller 210, once these initial operations arecompleted and the system is at an acceptable power state, signals a“power good” state to the pervasive logic 240.

In response to the “power good” signal from the system controller 210,the pervasive logic 240 begins a boot operation for booting themultiprocessor system into an operational state such that softwareprograms may begin to execute. As part of this boot operation, a randomevent generator 242 of the pervasive logic 240 randomly selects one ofthe processors, e.g., processor 280, to be the boot processor for themultiprocessor system. The random event generator 242 generates a signalthat is sent to each of the processors of the multiprocessor system. Thesignal is logically high only for the processor that is selected as theboot processor. This signal effectively sets the value in theconfiguration bit register 250 of the randomly selected processor 280 toa value, e.g., “1”, indicative of this processor 280 being the bootprocessor. The other processors will have their configuration bit valuesin their respective configuration bit registers kept at an initialvalue, thereby indicating that these processors are not the randomlyselected boot processor for the multiprocessor system.

The boot code for booting the multiprocessor system is stored in anencrypted format in flash ROM 230. The encrypted boot code 232 may beprovided to each of the processors 280-290. That is, as part of the bootsequence, each of the processors 280-290 may attempt to read theencrypted boot code 232 from the flash ROM 230. However, since only oneof the processors has been randomly selected as the boot processor, onlyone of the processors will be able to decrypt the encrypted boot code232 and properly execute it so as to bring the multiprocessor system toan operational state. This is achieved through the use of a selector 260provided in each of the processors that selects between the secret keythat is the key value used to decrypt the encrypted boot code 232 and arandomly generated key value that will not be able to decrypt theencrypted boot code 232.

The value stored in the configuration bit register 250 is used togenerate a selector signal that is provided to the selector 260. Forexample, selector 260 may be a multiplexer that receives the secure key(Skey) from the secure key storage 220 as one input, a randomlygenerated key value from a random value generator 262 as a second input,and the select signal from the configuration bit register 250 indicatingwhich of the two inputs to select. If the configuration bit register 250stores a value indicative of the processor being the randomly selectedboot processor, then the Skey input is selected. If the configurationbit register 250 stores a value indicative that the processor is not therandomly selected boot processor, then the randomly generated key valueinput may be selected by the selector 260. The selected key value isthen output to the SPE 270.

The SPE 270 receives the selected key value and the encrypted boot code232. The SPE 270 then attempts to decrypt the encrypted boot code 232.If the selected key value is the Skey from the secure key storage 220,then the SPE 270 will be able to properly decrypt the encrypted bootcode 232 and execute the boot code instructions therein to bring thesystem to an operational state. If the selected key value is not theSkey from the secure key storage 220, then the decryption will fail andthe SPE 270 will not be able to execute the boot code instructions.

The above process for randomly selecting a boot processor and bootingthe multiprocessor system using the randomly selected boot processor maybe performed with each power-on reset (POR) operation performed by themultiprocessor system. Thus, each time the multiprocessor system isbooted, a different one of the plurality of processors may be randomlyselected to be the boot processor. As a result, a potential intruderinto the system will not be able to determine, a priori, which processoris the boot processor and direct measurements of electromagnetic andthermal conditions of the multiprocessor system to that particularprocessor.

On the contrary, the potential intruder must either monitor a singleprocessor through multiple boot-up operations of the multiprocessorsystem in hopes that the single processor will eventually be selected asthe random processor to be the boot processor or the potential intrudermust monitor all of the processors to thereby identify which processoris the boot processor and attempt to obtain the necessary informationthrough measurements of its individual electromagnetic and thermalconditions. In an eight processor system, for example, the difficulty inmonitoring the boot sequence is made eight times more difficult sinceall eight processors must be monitored. Moreover, more probes andhardware would be need to do such monitoring, thereby adding to thedifficulty of attempting such monitoring.

FIG. 3A is an exemplary diagram illustrating a random selectionmechanism in accordance with one illustrative embodiment. As describedabove, the principle idea behind the illustrative embodiments is therandom selection of a processor, from a plurality of processors, to bethe boot processor for the multiprocessor system. In order to do thisrandom selection, a random event generator and selector mechanism areprovided. The random event generator is provided in pervasive logic ofthe multiprocessor system while a selector is provided in associationwith each of the processors, in the illustrative embodiments. FIG. 3Aprovides a depiction of one implementation of a random event generatorand selector in accordance with one illustrative embodiment.

As shown in FIG. 3A, the random event generator 310, which maycorrespond to the random event generator 242 in FIG. 2, for example,includes a linear feedback shift register (LFSR) counter 320, a ringoscillator 330, and a selector signal register/decoder 340. The ringoscillator 330 is a device composed of an odd number of NOT gates whoseoutput oscillates between two voltage levels. The NOT gates, orinverters, are attached in a chain with the output of the last inverterbeing fed back into the first inverter. The last output of a chain of anodd number of inverters is the logical NOT of the first input. Thisfinal output is asserted a finite amount of time after the first inputis asserted. The feedback of this last output to the input causes anunstable oscillation that will vary in time according to random elementssuch as electromagnetic noise on the power supply and temperature.

The output of the ring oscillator 330 is provided as an input to theLFSR counter 320 along with a clock signal clk. The LFSR counter 320 isa shift register whose input bit is a linear function of its previousstate. The only linear functions of single bits are XOR and inverse-XORand thus, the LFSR is a shift register whose input bit is driven by theexclusive-or (XOR) of some bits of the overall shift register value.

The initial value of the LFSR counter 320 is called the seed, andbecause the operation of the register is deterministic, the sequence ofvalues produced by the LFSR counter 320 is completely determined by itscurrent (or previous) state. A LFSR counter 320 with a well-chosenfeedback function can produce a sequence of bits which appears randomand which has a very long cycle. In the illustrative embodiments, thisrandomness is made more apparent in that the input to the LFSR counter320 is a product of the oscillation produced by the ring oscillator 330and the discrepancy between the frequency of the ring oscillator 330 andthe input clock clk which vary independently of one another.

The LFSR counter 320 receives, as input, the output from the ringoscillator 330 and the clock signal clk, and generates an output bitstream that is stored in selector signal register/decoder 340. Theinverters of the ring oscillator 330 introduce a delay in the outputsignal to the LFSR counter 320 and thus, there is a discrepancy betweenthe frequency of the ring oscillator 330 and the input clock clk. Thisdiscrepancy between the frequencies gives rise to jitter in the input tothe LFSR counter 320, as depicted in FIG. 3B. This jitter provides ameasure of randomness which randomizes the output generated by the LFSRcounter 320.

The output of the LFSR counter 320 is stored in the selector signalregister/decoder 340. In the depicted example, the LFSR counter 320 is a3-bit counter which generates a 3-bit output that is interpreted toencode a value 1-8. A decoder function of the selector signalregister/decoder 340 selects one of the 8 unique outputs based on therandom 3-bit input value. Based on the state of the bits stored in theselector signal register 340, high or low state signals are output tothe configuration bit registers of the various processors, e.g.,SPE0-SPE7 120-134 in FIG. 1, to thereby set the values stored in theconfiguration bit registers and thus, select one of the processors to bethe boot processor for the multiprocessor system.

Once the configuration bit register values are set, these values areused to provide selector signals to the corresponding selectors 350-370.As shown in FIG. 3A, the selector signal is provided to a multiplexer352, 362, 372, along with an Skey input and a random key value input.Based on the state of the selector signal, either the Skey input or therandom key value input is selected by each of the multiplexers 352, 362,372. The random key value inputs may be generated by one or more randomvalue generators of the same or a different type from the random eventgenerator configuration described above for selecting the bootprocessor. That is, a similar random event generator configuration asdescribed above may be used to randomly generate a key value having asame length as the Skey. These random key values are then input to themultiplexers 352, 362, and 372.

The system is designed such that, by way of the decoder functiondescribe above, for example, only one of the selector signals that areinput to the multiplexers 352, 362, 372 will select the Skey input whileall the others will select a random key value input. The outputs fromthe multiplexers 352, 362, and 372 are provide to the corresponding SPEsso that the SPEs may utilize these outputs for either decrypting bootcode and executing the boot code, in the case of the randomly selectedboot processor, or attempting to decrypt the boot code and failing toboot the multiprocessor system, as in the case of all other processorsin the multiprocessor system.

It should be appreciated that the mechanisms described above forproviding a random event generator and selector are only exemplary andare not intended to state or imply any limitation with regard to thetypes of random event generators and selectors that may be used with theillustrative embodiments. For example, rather than using a ringoscillator and LFSR counter arrangement as shown in FIG. 3A, otherrandom event generators may be utilized. For example, a thermal sensormay be used to measure thermal noise which may then be used to generatea random event for selecting one of the processors as a boot processor.Similarly, a quantum dot (q-dot), or semiconductor nanocrystals, may beused to measure quantum source effects that may be used as a source ofrandomness for selecting a processor as the boot processor. Any strongsource of randomness may be used with the illustrative embodiments toprovide a random selection of a processor for use as the boot processorfor the multiprocessor system.

Moreover, it should be appreciated that while FIG. 3A shows the ringoscillator 330 having five inverters, the illustrative embodiments arenot limited to such. Rather, any number of inverters, so long as thereare an odd number of inverters, may be used without departing from thespirit and scope of the present invention. In fact, in order to provideadditional jitter in the input to the LFSR counter 320, it may bedesirable to add additional inverters to the chain of inverters in thering oscillator 330 so as to introduce even more discrepancy between thefrequency of the input clock signal clk and the input from the ringoscillator 330. The amount of discrepancy may be selected based on thedesired operational characteristics for the particular multiprocessorsystem in which the illustrative embodiments are implemented.

Furthermore, while FIGS. 2 and 3A depict the random key value beinggenerated by a separate random key value generator for each processor,the illustrative embodiments are not limited to such. Rather, a singlerandom key value generator may be provided for all of the processorswith the random key value generator generating one or more random keyvalues that are input to the processors. Thus, for example, the randomkey value generator may generate a single random key value that isprovided to all of the processors, a separate random key value for eachindividual processor (in which case seven different random key valuesmay be generated, for example), or any number of random key values thatmay be selectively provided to the various processors of themultiprocessor system.

In one illustrative embodiment, as illustrated in FIG. 3C, a pluralityof random key value generators 390 may be provided that each output adifferent random key value. Alternatively, as mentioned above, a singlerandom key value generator may be used in replacement of these separaterandom key value generators. These random key values may be provided asinputs to the selectors, e.g., multiplexers 391 and 392, of theprocessors, e.g., SPEs 393 and 394, in the multiprocessor system alongwith the secure key (Skey) from an Skey storage 395, e.g., an eFuse,that is actually used to decrypt the boot code for booting of themultiprocessor system. As shown, the randomly generated key values andthe Skey value may be multiplexed and provided on eight identical signallines to each of the multiplexers 391 and 392 so as to make it moredifficult for an intruder to isolate one of the lines as being a signalline from the secure key storage 395.

The eight total key value inputs may be provided to the multiplexers 391and 392 and the select signals from the random event generator 396 inthe pervasive logic 397 may be used to select one of the eight inputs.In this case, rather than simply selecting between the Skey input and arandom key value, the multiplexers 391 and 392 may select between theSkey input and seven random key values. Thus, a first processor mayselect the Skey input, based on the random selection of this firstprocessor as the boot processor, a second processor may select a thirdrandom key value, a third processor may select a fourth random keyvalue, a fifth processor may select a first random key value, and so on.Thus, each processor may receive a different key value, either the Skeyor a randomly generated key value. As a result, it becomes difficult foran intruder to discern which key value is the correct key value whenmonitoring bus traffic of the multiprocessor system.

It should be further appreciated that the mechanisms shown in FIGS. 3Aand 3C are preferably provided in lower layer metal layers of theceramic package in which the multiprocessor system is provided, or thelowest layer of interconnect, if the design is on a single chip. Sincethe ability to probe electrical and thermal characteristics of amultiprocessor system is currently limited to the upper layers of themultiprocessor ceramic package, by placing these elements in the lowerlayer metal layers, the ability to probe the operation of these elementsis made more difficult. Thus, it is very difficult, if not impossible,for a would-be intruder to monitor the thermal and electricalcharacteristics of the random event generator and selectors so as todetermine the key values provided by these elements.

Using the mechanisms above, a processor within a plurality of processorsof a multiprocessor system may be randomly selected to boot themultiprocessor system. In this way, the ability to monitor theelectrical and thermal characteristics of the processors so as to obtainsecret information, e.g., the secret keys, used to boot themultiprocessor system is made more difficult and potentially becomes adeterrent to those who may wish to access the multiprocessor systemwithout authorization.

While the above mechanism for randomly selecting a processor to boot themultiprocessor system provide a good amount of protection againstmonitoring of the boot sequence, it may still be possible for anunauthorized individual to “hack” the system if such an individual ispersistent enough. In order to make such monitoring virtuallyimpossible, the illustrative embodiments provide additional mechanismsfor masking the boot sequence on the randomly selected processor suchthat the unauthorized individual is not able to discern which processoris correctly performing the actual boot sequence for booting themultiprocessor system.

In one illustrative embodiment, the masking operation involves each ofthe processors that were not selected to be the boot processor running adifferent set of instructions to thereby generate masking electrical andthermal signatures that make it difficult to discern the boot processorfrom the other processors in the system. The code sequences that are runby the different processors may be the same default code sequence thatis provided either in a memory associated with the processor, or isotherwise accessible by the processors when the processors are not ableto decrypt the boot code sequence. For example, the default codesequence may be provided in a secure portion of a local store associatedwith each of the processors. Alternatively, the default code sequencemay be provided in a flash ROM or other storage device provided on oroff-chip.

When the processor is not able to decrypt the actual encrypted boot codereceived from the flash ROM, the processor may default back to thissecure portion of local storage which causes the processor to executeinstructions to mask the boot code sequence being performed on anotherprocessor. This sequence of instructions may not generate any useableinformation and may serve only a masking function. Alternatively, thissequence of instructions may be used to perform operations formonitoring the system during the boot operation, or other usefuloperations, for example.

In one illustrative embodiment, the code that is executed on each of thenon-selected processors, i.e. the non-boot processors, is the same. Inillustrative embodiments where the code that is executed by each of thenon-selected processors is the same, the code that is run on each ofthese non-selected processors preferably is code that generateselectrical and thermal profiles that resemble the actual boot code butdo not provide any of the secret information that an intruder wouldrequire in order to circumvent the security of the multiprocessorsystem. Such code may perform similar operations to that of the actualboot code but not access the sensitive portions of the multiprocessorsystem. In fact, in one illustrative embodiment, the same boot code thatis used to boot the multiprocessor system may be used by thenon-selected processors but with access to the secure key (Skey) andother privileged information being made inaccessible.

As a result, the thermal profile and bus traffic of these non-selectedprocessors will approximate the actual boot sequence. Thus, from theperspective of an intruder using monitoring probes to monitor thethermal profile, bus traffic, and the like, the intruder will be unableto decipher which core is performing the actual boot operation since allof the cores will look the same via the monitoring probes. Suchambiguity deters tampering and makes it more difficult to isolate thereal boot code sequence, secret key information, and the like.

In other illustrative embodiments, each of the non-selected processorsmay execute a different set of instructions. By executing different setsof instructions on each of the non-selected processors, none of theprocessors look unique when monitored using electrical or thermalprobes. As a result, a distinguishing characteristic, such as thermalprofile or bus traffic, cannot be identified by probes so as to identifywhich processor is the boot processor.

These different sets of instructions may be randomly selected for eachof the processors in the multiprocessor system. Thus, for example,differing start addresses for code sequences stored in an on-chipstorage device, e.g., a flash ROM or the like, may be randomly selectedand provided to the processors of the multiprocessor system. Theprocessors may then begin executing instructions at the randomlyselected start addresses thereby generating different thermal profilesand bus traffic that masks the actual boot code sequence.

One way in which to provide different code sequences for the differentprocessors is to provide boot code that has random delay elementsinserted into the boot code. These delay elements may be, for example,loops that iterate a random number of times. Such delay elements may beprovided both in the actual boot code sequence run by the randomlyselected boot processor and in the boot code sequences run by thenon-selected processors. This random delay causes the boot code to“look” different on each of the processors from the perspective of anintruder monitoring the thermal and bus traffic characteristics of theprocessors. As a result, it is not possible for the intruder to discernwhich processor is running the actual boot code that boots themultiprocessor system.

In yet another illustrative embodiment, a dummy processor is providedthat looks as though it is unique when monitored by an intruder. Thisillustrative embodiment is a combination of the previous embodiments inwhich one processor is randomly selected to be the boot processor, oneprocessor of the non-selected processors is selected to be a dummyprocessor that runs code that provides a unique thermal and bus trafficprofile from the boot code sequence, and the other processors run codesequences that replicate the thermal profile and bus traffic of theactual boot code sequence as close as possible. In this way, theintruder will detect the dummy processor as being unique from the otherprocessors and will conclude that this processor is running the actualboot code sequence. Thus, the intruder will direct its attacks to thisdummy processor rather than the actual boot processor that appears to besimilar to the other processors from a thermal profile and bus trafficstandpoint. Furthermore, if the intruder attempts to run code orotherwise actively interfere with the dummy processor, the dummyprocessor can then signal a system shutdown.

FIGS. 4A-4D are exemplary diagrams illustrating masking operations formasking a secure boot operation of a randomly selected boot processor inaccordance with illustrative embodiments. FIG. 4A illustrates a firstmasking operation in which code that appears, from a monitoring probestandpoint, to be the same as the boot code sequence is run on each ofthe non-selected processors. As shown in FIG. 4A, SPE0 410 is randomlyselected, such as by use of the mechanisms described previously, to bethe boot processor for the multiprocessor system 400. Thus, SPE0 410receives the secret key, decrypts the boot code sequence from the flashROM, and executes the actual boot code operations required to bring themultiprocessor system 400 into an operational state. The other SPEs,i.e. SPE1-SPE7 412-424, execute code that looks like the boot codesequence from the perspective of a monitoring probe.

As described above, the code sequence that the other SPEs 412-424 runmay be default code sequences provided in a secure portion of localstorage which causes the SPE 412-424 to execute instructions to mask theboot code sequence being performed on SPE0 410. The code that is run oneach of these non-selected SPEs 412-424 preferably is code thatgenerates electrical and thermal profiles that resemble the actual bootcode but do not provide any of the secret information that an intruderwould require in order to circumvent the security of the multiprocessorsystem. Such code may perform similar operations to that of the actualboot code but not access the sensitive portions of the multiprocessorsystem 400.

FIG. 4B illustrates another illustrative embodiment in which differentrandomly selected algorithms are run on each of the non-selectedprocessors. As shown in FIG. 4B, SPE0 is again selected to be the bootprocessor and thus, runs the boot code for booting the multiprocessorsystem 400 into an operational state. Each of the other SPEs 412-424 runa separate randomly selected algorithm that generates different thermalprofiles and different bus traffic on the EIB. Thus, each SPE0-7 appearsto be unique when compared to each of the other SPEs 410-424. Thus, itis not possible to discern which SPE0-7 410-424 is the actual bootprocessor for booting the multiprocessor system 400.

As mentioned above, these different algorithms may be randomly selectedfor each of the SPEs 412-424 in the multiprocessor system. Thus, forexample, differing start addresses for code sequences stored in anon-chip storage device, e.g., a flash ROM or the like, may be randomlyselected and provided to the SPEs 412-424. The SPEs 412-424 may thenbegin executing instructions at the randomly selected start addressesthereby generating different thermal profiles and bus traffic that masksthe actual boot code sequence.

Alternatively, the boot code may be provided to each of the SPEs 410-424with random delay elements inserted into the boot code. These delayelements may be, for example, loops that iterate a random number oftimes. This random delay causes the boot code to “look” different oneach of the SPEs 410-424 from the perspective of an intruder monitoringthe thermal and bus traffic characteristics of the processors. As aresult, it is not possible for the intruder to discern which processoris running the actual boot code that boots the multiprocessor system.

FIG. 4C illustrates another illustrative embodiment in which a dummyprocessor is provided to which attacks from an intruder may beredirected. As shown in FIG. 4C, SPE0 is the randomly selected bootprocessor executing the boot sequence. SPE1-SPE4 412-418 and SPE6-SPE7422-424 run code that looks like the boot code sequence from a thermaland bus traffic monitoring perspective, as in the embodiment describedabove with regard to FIG. 4A. SPE5 420, on the other hand, runs arandomly selected algorithm which may be randomly selected in a similarmanner as described above with regard to FIG. 4B.

Thus, from the perspective of an intruder monitoring the characteristicsof the processors 410-424, all of the SPE0-SPE4 410-418 and SPE6-SPE7422-424 look to be executing the same code. SPE5 420, however, appearsto be unique from the other SPEs. Hence, an intruder wishing to attackthe boot sequence of the multiprocessor system may redirect attacksagainst SPE5 420 rather than the actual boot processor SPE0 410 since,to the intruder, it appears that SPE5 420 is the actual boot processor.

Just as the actual boot processor is randomly selected with eachpower-on reset (POR) operation, the dummy processor may be randomlyselected from the non-selected processors as well. Thus, with each PORoperation, a different boot processor and dummy processor may beselected, thereby making it more difficult for an intruder to deducewhich processor is performing an actual boot sequence that may becompromised in order to obtain access to the multiprocessor system.

For completeness, FIG. 4D illustrates the illustrative embodimentpreviously described above in which the boot code that is used to bootthe system is executed by each of the processors. In this illustrativeembodiment, only the randomly selected boot processor is given access tothe secret key (Skey) while the other processors receive randomlyselected keys (Rkey1-Rkey7). Each of the processors attempts to decodeand execute the boot code using the key that was supplied to them, e.g.,the Skey or an Rkey. Only the randomly selected boot processor will beable to correctly decrypt the boot code and execute it to bring the dataprocessing system into an operational state. However, to an outsidemonitor, it will appear as if all of the processors are booting thesystem, thereby masking the actual boot processor, since each of themwill be performing similar tasks to attempt to decrypt and boot thesystem. That is, each of the processors will generate a similar thermaland/or electrical signature that makes it difficult for a would-beintruder to discern which processor is the actual boot processor usingmeasuring probes and the like.

Through the use of the random selection of the boot processor and themasking of the boot sequence, as provided by the illustrativeembodiments, it becomes very difficult for any would-be intruder intothe multiprocessor system to be able to discern which processor isperforming a boot code sequence. Thus, it becomes very difficult for awould-be intruder to monitor thermal profiles and bus traffic of theprocessors and identify secret key information for use in accessing theencrypted boot code. Moreover, it becomes difficult for a would-beintruder to identify places in the boot code sequence where intrusioninto the system is possible. Hence, the multiprocessor system is mademore secure from unauthorized access to the boot sequence.

FIGS. 5-6 are flowcharts outlining an exemplary operation for randomlyselecting a processor in a multiprocessor system as a boot processor andfor masking the boot code sequence. It will be understood that eachblock of the flowchart illustrations, and combinations of blocks in theflowchart illustrations, can be implemented by computer programinstructions. These computer program instructions may be provided to aprocessor or other programmable data processing apparatus to produce amachine, such that the instructions which execute on the processor orother programmable data processing apparatus create means forimplementing the functions specified in the flowchart block or blocks.These computer program instructions may also be stored in acomputer-readable memory or storage medium that can direct a processoror other programmable data processing apparatus to function in aparticular manner, such that the instructions stored in thecomputer-readable memory or storage medium produce an article ofmanufacture including instruction means which implement the functionsspecified in the flowchart block or blocks.

Accordingly, blocks of the flowchart illustrations support combinationsof means for performing the specified functions, combinations of stepsfor performing the specified functions and program instruction means forperforming the specified functions. It will also be understood that eachblock of the flowchart illustrations, and combinations of blocks in theflowchart illustrations, can be implemented by special purposehardware-based computer systems which perform the specified functions orsteps, or by combinations of special purpose hardware and computerinstructions.

FIG. 5 outlines an exemplary operation for random selection of a bootprocessor for booting a multiprocessor system. As shown in FIG. 5, theoperation starts with the system controller performing a power-on reset(POR) operation (step 510). After performance of the initial PORoperations, the system controller provides a “power good” signal to thepervasive logic of the multiprocessor system (step 520) and thepervasive logic initiates a random boot operation (step 530).

The pervasive logic randomly selects a processor from a plurality ofprocessors to be the boot processor (step 540). The pervasive logic thensets the configuration bits of the processors based on the randomselection (step 550) and signals the processors to begin the bootoperation (step 560). A flash ROM provides the encrypted boot code tothe processors and key values are provided to the processors from asecret key storage and random key generator (step 570). The processorsthen select the keys that are to be used by the processors based on thesetting of their configuration bits (step 580). The processors attemptto decrypt the boot code based on the selected keys (step 590). Theselected processor decrypts the boot code using the secret key and bootsthe system (step 595). It should be noted that the attempt to decryptthe boot code by all other non-selected processors will fail and onlythe selected processor will be able to boot the system. The operationthen ends.

FIG. 6 is a flowchart outlining an exemplary operation for masking aboot code sequence in accordance with one illustrative embodiment. Theoperation outlined in FIG. 6 may be performed in each processor of amultiprocessor system, for example.

As shown in FIG. 6, the processor receives a signal to begin a bootoperation (step 610). This step may correspond to step 530 in FIG. 5,for example. The processor attempts to decrypt the boot code (step 620)and a determination is made as to whether the decrypt attempt failed(step 630). If the decrypt was successful, i.e. the processor is therandomly selected boot processor, then the boot code is executed tothereby bring the multiprocessor system to an operational state (step640).

If the decryption failed, then a code sequence to execute to mask theboot sequence is selected (step 650). As mentioned above, depending uponthe particular embodiment, the selection of a masking code sequence maybe based on a default code sequence in a secure portion of a localstore, a randomly selected starting address, the use of boot code withrandom delay elements, or the like. The masking code sequence is run(step 660) and a determination is made as to whether the system is in anoperational state, i.e. the boot sequence has completed (step 670). Ifnot, the operation returns to step 660 and continues to run the maskingcode sequence. If the system is in an operational state, then theexecution of the masking code sequence is ended (step 680) and theoperation terminates.

Thus, the above illustrative embodiments provide a mechanism by which aprocessor may be randomly selected from a plurality of processors as aboot processor for booting a multiprocessor system to an operationalstate. The illustrative embodiments further provide a mechanism formasking the boot code sequence being executed by a randomly selectedprocessor so as to make it difficult for an intruder to discern whichprocessor has been randomly selected to execute the actual boot codesequence. Using these mechanisms, a multiprocessor system is made moresecure by making it extremely difficult for an intruder to gain accessto the system through monitoring the boot code sequence.

The above illustrative embodiments are described in terms of the bootcode sequence being performed by a single processor in a multiprocessorsystem. However, the illustrative embodiments are not limited to such.In other illustrative embodiments, the boot code sequence may bedistributed across a plurality of processors in the multiprocessorsystem, as described hereafter. By distributing the boot code sequenceacross a plurality of processors in the multiprocessor system, thenumber of processors that must be compromised in order to obtaincomplete information about the boot sequence and thereby circumventsecurity measures is increased.

Thus, the distributed boot operation of the illustrative embodimentsdescribed hereafter is more secure than multiprocessor data processingsystems that utilize a single secure core. Furthermore, by distributingthe boot operation, if any portion of the boot operation is compromised,the boot operation fails, thereby preventing an unauthorized individualfrom circumventing the security of the system. In other words, while thewould-be intruder may compromise a portion of the boot operation, thewould-be intruder is not able to compromise the all of the bootoperation and thus, is not able to obtain access to the multiprocessordata processing system.

With this illustrative embodiment, the boot code sequence is partitionedinto a plurality of partitions such that each partition may be providedto a different processor of the multiprocessor system. As each partitionof the boot code sequence is executed, that partition must completecorrectly on its respective processor before the boot code sequence mayproceed on another processor. A secure communication mechanism is usedto communicate satisfactory completion of a previous partition of theboot code sequence. This secure communication mechanism may include asecurity token, such as an encrypted password or other securityidentifier, e.g., a public/private encryption key pair, that indicatesthat the previous session was not compromised. In this way, a chain ofdependent “sessions” are created that must complete satisfactorily.

The processors that are involved in the distributed execution of theboot code may be all of the processors in the multiprocessor system or asub-set of the processors in the multiprocessor system. For example, arandom selection mechanism, such as that described above for selecting asingle boot processor, may be used to randomly select a plurality ofboot processors to be used in booting the system in a distributedmanner. Moreover, the particular partitions of the boot code that areexecuted by the processors may be randomly selected such that, with eachpower-on reset (POR) operation, the same processor may or may notexecute the same boot code partition as in a previous POR operation.Thus, randomization may be performed with regard to which processors areinvolved in the distributed boot operation as well as with regard towhat boot code partitions each processor will execute.

Other processors of the multiprocessor system, i.e. non-boot processors,may either not perform any work during the distributed boot operation ormay execute masking code sequences, of one or more of the variousmasking code illustrative embodiments described previously, to mask theboot code execution on the randomly selected sub-set of processors. Inother words, the distributed boot code sequence operation of the presentillustrative embodiment may be combined with one or more of thepreviously described illustrative embodiments without departing from thespirit and scope of the present invention.

FIG. 7A is an exemplary diagram illustrating a distributed bootoperation configured as a daisy chain or ring arrangement in accordancewith one illustrative embodiment. As shown in FIG. 7A, a plurality ofprocessors 720-750 are provided for booting the multiprocessor dataprocessing system. In the depicted example, all of the co-processors,i.e. SPEs, are utilized in the distributed boot operation while thecontrol processor, e.g., PPE, does not execute the distributed bootcode. Of course, in other illustrative embodiments, the PPE may also beincluded in the distributed boot operation. Moreover, in otherillustrative embodiments, as mentioned previously, only a sub-set of theprocessors in the multiprocessor data processing system may be used toperform the distributed boot operation.

The encrypted boot code 710, which may be stored in a storage deviceassociated with the multiprocessor data processing system, such as inFlash ROM 230 in FIG. 2, for example, may be partitioned into separatelyexecutable partitions, i.e. boot code partitions 1 to n. For example,the partitions may be provided as modules or routines in the encryptedboot code that are separately encrypted using the same encryptionalgorithm and the same secret key (Skey). Preferably, the number of bootcode partitions is equal to the number of processors that will beinvolved in the distributed boot operation, i.e. the number of bootprocessors. However, in some illustrative embodiments, such as in a ringarrangement of the boot processors, the number of boot code partitionsis not limited the number of boot processors and may be any number ofpartitions less than or greater than the number of boot processors.

The distributed boot operation is performed under the control of thepervasive logic 790, which may be the same pervasive logic 193 in FIG.1, for example. The pervasive logic 790, through the user of the randomevent generator, for example, may randomly select the processors 720-750to be used as boot processors as well as may randomly select whichpartition each of the randomly selected processors 720-750 will execute.In such an embodiment, the pervasive logic 790 may keep track of theorder in which the boot code partitions are to be executed in order toensure the security of the boot code sequence through use of a securecommunication mechanism that indicates whether or not a previous sessionof the distributed boot operation has been compromised. For simplicityof the present description, however, it will be assumed that, in thedepicted example, all of the processors, or at least the co-processors,of the multiprocessor system are utilized in the distributed bootoperation and that boot code partitions are provided to the processors720-750 in sequential order.

The pervasive logic 790 provides selector signals to the processors720-750 for selecting which boot code partition is to be executed byeach of the processors 720-750. In addition, the pervasive logic 790provides key value selector signals for causing the processor 720-750 toselect the Skey, from Skey storage, as the key to be used to decrypttheir corresponding boot code partitions. The processors 720-750 decrypttheir boot code partition using the supplied Skey and then execute theboot code partition in the proper sequence either by virtue of thearrangement of the processors 720-750 in a daisy chain architecture orunder the control of the pervasive logic 790, for example.

In the depicted example, SPE0 720 begins the distributed boot operationby decrypting its boot code partition 1, executing the boot codepartition, and then securely communicating the successful completion ofthe boot code partition 1 to SPE1 730. Moreover, a security mechanismmay be utilized between the SPEs for indicating that the previoussession, i.e. the session comprised of the execution of the previousboot code partition, was not compromised. The security mechanism may be,for example, passing a security token, digital signature, password, achecksum of the previous boot code partition, using public key/privatekey encryption of the successful completion message, or the like. Anysecurity mechanism that may be used to communicate whether or not theprevious session of a distributed boot operation was compromised or notis intended to be within the spirit and scope of the present invention.

After receiving confirmation of the successful and uncompromisedcompletion of the boot code partition 1 execution, the SPE1 730 maydecrypt its boot code partition 2, execute the boot code partition, andthen communicate its successful completion of boot code partition 2 toSPE2 740. This process may continue until all of the processors havesignaled that they have completed their portion of the distributed bootoperation without being compromised. Any break in this dependency chainof boot code partitions, e.g., any signaling of unsuccessful executionor compromised execution, results in a failed boot which may be signaledto the system controller. Once all of the boot code partitions havecompleted successfully, the multiprocessor data processing system is inan operative state in which software applications may be executed on thevarious processors.

The illustrative embodiment described above utilizes a daisy-chainarrangement of the processors with regard to the boot code partitionsthat are executed on the processors. Other arrangements that ensure asequential execution of boot code partitions may be utilized withoutdeparting from the spirit and scope of the present invention. Forexample, an extension of the daisy-chain arrangement above is to providea ring arrangement of the processors with regard to the distributed bootoperation such that the last processor, e.g., SPE7 750, communicatesback to the first processor, e.g., SPE0 720, which is selected as the“primary” boot processor, its successful and uncompromised completion ofexecution of its boot code partition. In this way, the securitymechanism, e.g., the security token, an incremented count value, etc.,which is passed from one session to the next through the ringarrangement may be used at the primary boot processor to verifyuncompromised execution of the entire distributed boot operation.

Moreover, a ring arrangement of processors allows a greater number ofboot code partitions to be utilized than the number of boot processors.Thus, if only a sub-set of processors in the multiprocessor dataprocessing system are selected to be boot processors, this sub-set ofprocessors may execute any number of boot code partitions when arrangedin a ring arrangement with regard to the distributed boot operation.This gives rise to the ability of the pervasive logic 790 to not onlyrandomly select which processors in the multiprocessor data processingsystem are to be boot processors, but also to randomly select how manyprocessors will be boot processors in the distributed boot operation.Thus, in a first POR operation, four processors may be selected to beboot processors while in a subsequent POR operation three bootprocessors may be selected. The pervasive logic 790 may contain logicfor randomly selecting a number of processors to select to be bootprocessors which then is used to control the random selection ofprocessors as previously described above.

Another possible arrangement of boot processors with regard to adistributed boot operation is to provide a master/slave arrangement.FIG. 7B is an exemplary diagram illustrating a distributed bootoperation configured as a master/slave arrangement in accordance withone illustrative embodiment. As shown in FIG. 7B, one processor 760 isdesignated the master processor. This processor may be one of theco-processors, e.g., an SPE, or the control processor, e.g., the PPE.The slave processors, e.g., SPE0-SPE7 720-750, each are responsible forcompleting their boot code partition and securely communicating to themaster core that they have finished execution and have not beencompromised, in a similar manner as described above in FIG. 7A. Once themaster processor 760 has received signals from each of the slaveprocessors 720-750, and validated that it has not been compromiseditself, then the multiprocessor data processing system is permitted toenter an operational state in which software applications may beexecuted.

It should be appreciated that while a daisy-chain, ring, andmaster/slave arrangement of processors with regard to a distributed bootoperation have been described herein, the present invention is notlimited to only these described arrangements. Rather any arrangement ofprocessors with regard to a distributed boot operation may be used withthe mechanisms of the illustrative embodiments without departing fromthe spirit and scope of the present invention.

FIG. 8 is a flowchart outlining an exemplary operation for distributedbooting of a multiprocessor system in accordance with one illustrativeembodiment. As shown in FIG. 8, the operation starts with the pervasivelogic receiving a “power good” signal from the system controller (step810). The pervasive logic selects the processors to be boot processorsfrom the plurality of processors in the multiprocessor data processingsystem (step 820). As mentioned above, such selection may result in allof the processors being selected or some sub-set of the processors inthe multiprocessor data processing system being selected to be bootprocessors. Such selection may be performed using a random eventgenerator in the pervasive logic, for example.

The pervasive logic selects the boot code partitions to be assigned tothe selected boot processors (step 830). A next boot code partition isexecuted by an associated boot processor (step 840). The boot processordetermines whether the execution of the boot code partition wassuccessful and uncompromised (step 850). If not, a boot failure issignaled to the system controller (step 860) and the operationterminates.

If the boot code partition executes successfully and is not compromised,then the boot processor determines if the all boot code partitions havebeen executed successfully (step 870). If not, the operation returns tostep 840 and the next boot code partition is executed by its associatedboot processor. If all of the boot code partitions have been executedsuccessfully, the boot processor signals the successful boot of the dataprocessing system to the system controller (step 880) and the operationterminates.

Thus, as set forth above, the illustrative embodiments, in addition torandomly selecting a single boot processor and performing maskingoperations on other processors of the multiprocessor data processingsystem, provides mechanisms for distributing the boot operation over aplurality of processors. The illustrative embodiments provide mechanismsfor randomly selecting boot processors, randomly selecting boot codepartitions to be executed on selected boot processors, and to ensure thesecurity of the execution of the boot code partitions by the variousboot processors. All of these various mechanisms aid is increasing thesecurity of the multiprocessor data processing system from unauthorizedmonitoring of the boot operation.

The illustrative embodiments may take the form of an entirely hardwareembodiment, an entirely software embodiment or an embodiment containingboth hardware and software elements. In a preferred embodiment, theinvention is implemented in software, which includes but is not limitedto firmware, resident software, microcode, etc.

Furthermore, the illustrative embodiments may take the form of acomputer program product accessible from a computer-usable orcomputer-readable medium providing program code for use by or inconnection with a computer or any instruction execution system. For thepurposes of this description, a computer-usable or computer readablemedium may be any apparatus that may contain, store, communicate,propagate, or transport the program for use by or in connection with theinstruction execution system, apparatus, or device.

The medium may be an electronic, magnetic, optical, electromagnetic,infrared, or semiconductor system (or apparatus or device) or apropagation medium. Examples of a computer-readable medium include asemiconductor or solid state memory, magnetic tape, a removable computerdiskette, a random access memory (RAM), a read-only memory (ROM), arigid magnetic disk and an optical disk. Current examples of opticaldisks include compact disk-read only memory (CD-ROM), compactdisk-read/write (CD-R/W) and DVD.

The circuits as described above may be part of the design for anintegrated circuit chip. The chip design may be created in a graphicalcomputer programming language, and stored in a computer storage medium(such as a disk, tape, physical hard drive, or virtual hard drive suchas in a storage access network). If the designer does not fabricatechips or the photolithographic masks used to fabricate chips, thedesigner may transmit the resulting design by physical means (e.g., byproviding a copy of the storage medium storing the design) orelectronically (e.g., through the Internet) to such entities, directlyor indirectly. The stored design may then be converted into theappropriate format (e.g., GDSII) for the fabrication ofphotolithographic masks, which typically include multiple copies of thechip design in question that are to be formed on a wafer. Thephotolithographic masks may be utilized to define areas of the wafer(and/or the layers thereon) to be etched or otherwise processed.

The resulting integrated circuit chips may be distributed by thefabricator in raw wafer form (that is, as a single wafer that hasmultiple unpackaged chips), as a bare die, or in a packaged form. In thelatter case the chip may be mounted in a single chip package (such as aplastic carrier, with leads that are affixed to a motherboard or otherhigher level carrier) or in a multichip package (such as a ceramiccarrier that has either or both surface interconnections or buriedinterconnections). In any case the chip may then be integrated withother chips, discrete circuit elements, and/or other signal processingdevices as part of either (a) an intermediate product, such as amotherboard, or (b) an end product. The end product may be any productthat includes integrated circuit chips, ranging from toys and otherlow-end applications to advanced computer products having a display, akeyboard or other input device, and a central processor. Moreover, theend products in which the integrated circuit chips may be provided mayinclude game machines, game consoles, hand-held computing devices,personal digital assistants, communication devices, such as wirelesstelephones and the like, laptop computing devices, desktop computingdevices, server computing devices, or any other computing device.

The description of the present invention has been presented for purposesof illustration and description, and is not intended to be exhaustive orlimited to the invention in the form disclosed. Many modifications andvariations will be apparent to those of ordinary skill in the art. Theembodiment was chosen and described in order to best explain theprinciples of the invention, the practical application, and to enableothers of ordinary skill in the art to understand the invention forvarious embodiments with various modifications as are suited to theparticular use contemplated.

1. A method, in a data processing system having a plurality ofprocessors, for booting the data processing system, comprising:receiving, in each processor of the plurality of processors, a secretkey value; receiving, in each processor of the plurality of processors,at least one random key value; randomly selecting one of the processorsof the plurality of processors to be a boot processor; selecting, byeach of the processors of the plurality of processors, a key value forthe processor based on the random selection of the boot processor,wherein only the boot processor selects the secret key value as itscorresponding key value and each of the other processors of theplurality of processors selects one of the at least one random key valueas their corresponding key value; receiving, by the boot processor,encrypted boot code from an encrypted boot code storage; decrypting, bythe boot processor, the encrypted boot code using the secret key value;and executing the decrypted boot code to thereby boot the dataprocessing system to an operational state.
 2. The method of claim 1,wherein each processor of the plurality of processors receives thesecret key value and a predetermined number of random key values, andwherein the predetermined number is equal to a number of processors inthe plurality of processors.
 3. The method of claim 2, wherein eachprocessor of the plurality of processors that is not selected to be theboot processor selects a different key value from the at least onerandom key value.
 4. The method of claim 1, wherein each processor inthe plurality of processors comprises a multiplexer, the secret keyvalue and the at least one random key value are provided as inputs tothe multiplexer of each processor in the plurality of processors, and aselect signal is provided to each multiplexer of each processor in theplurality of processors, wherein the select signal input to amultiplexer of a processor has an associated value corresponding to theselection of the key value for the processor.
 5. The method of claim 1,wherein randomly selecting one of the processors of the plurality ofprocessors to be a boot processor comprises: using a random eventgenerator provided in pervasive logic of the data processing system togenerate a random value; and decoding the random value to identify aprocessor from the plurality of processors in the data processing systemto be the boot processor.
 6. (canceled)
 7. The method of claim 1,wherein the at least one random key value comprises a plurality ofrandom key values, and wherein each random key value in the plurality ofrandom key values is generated by a separate random key value generator.8. The method of claim 1, wherein the at least one random key valuecomprises a plurality of random key values, and wherein each random keyvalue in the plurality of random key values is generated by a samerandom key value generator.
 9. The method of claim 1, wherein the dataprocessing system is a heterogeneous multiprocessor system-on-a-chiphaving a first processor that operates according to a first instructionset and one or more second processors that operate according to a secondinstruction set different from the first instruction set.
 10. The methodof claim 9, wherein the first instruction set is a RISC instruction setand the second instruction set is a SIMD instruction set.
 11. A dataprocessing system comprising: a plurality of processors; pervasive logiccoupled to the processors; at least one random key generator coupled tothe plurality of processors; an encrypted boot code storage coupled tothe plurality of processors; and a secret key storage coupled to theplurality of processors, wherein: each processor of the plurality ofprocessors receives a secret key value from the secret key storage, eachprocessor of the plurality of processors receives at least one randomkey value from the at least one random key generator, the pervasivelogic randomly selects one of the processors of the plurality ofprocessors to be a boot processor, each processor of the processors ofthe plurality of processors selects a key value for the processor basedon the random selection of the boot processor, wherein only the bootprocessor selects the secret key value as its corresponding key valueand each of the other processors of the plurality of processors selectsone of the at least one random key value as their corresponding keyvalue, the boot processor receives encrypted boot code from theencrypted boot code storage, the boot processor decrypts encrypted bootcode using the secret key value, and the decrypted boot code is executedby the boot processor to thereby boot the data processing system to anoperational state.
 12. The system of claim 11, wherein each processor ofthe plurality of processors receives the secret key value and apredetermined number of random key values, and wherein the predeterminednumber is equal to a number of processors in the plurality ofprocessors.
 13. The system of claim 12, wherein each processor of theplurality of processors that were not selected to be the boot processorselects a different key value from the at least one random key value.14. The system of claim 11, wherein each processor in the plurality ofprocessors comprises a multiplexer, the secret key value and the atleast one random key value are provided as inputs to the multiplexer ofeach processor in the plurality of processors, and a select signal isprovided to each multiplexer of each processor in the plurality ofprocessors, wherein the select signal input to a multiplexer of aprocessor has an associated value corresponding to the selection of thekey value for the processor.
 15. The system of claim 11, wherein thepervasive logic comprises a random event generator and a decoder, andwherein the pervasive logic randomly selects one of the processors ofthe plurality of processors to be a boot processor by: using the randomevent generator to generate a random value; and using the decoder todecode the random value to identify a processor from the plurality ofprocessors in the data processing system to be the boot processor. 16.The system of claim 15, wherein the random event generator comprises alinear feedback shift register (LFSR) counter and a ring oscillatorcoupled to the LFSR, wherein the ring oscillator provides an input tothe LFSR to thereby generate a random value.
 17. The system of claim 11,wherein the at least one random key value comprises a plurality ofrandom key values, and wherein each random key value in the plurality ofrandom key values is generated by a separate random key value generator.18. The system of claim 11, wherein the at least one random key valuecomprises a plurality of random key values, and wherein each random keyvalue in the plurality of random key values is generated by a samerandom key value generator.
 19. The system of claim 11, wherein the dataprocessing system is a heterogeneous multiprocessor system-on-a-chiphaving a first processor the operates according to a first instructionset and one or more second processors that operate according to a secondinstruction set different from the first instruction set.
 20. A computerprogram product comprising a computer useable medium having a computerreadable program recorded thereon, wherein the computer readableprogram, when executed on a data processing system, causes the dataprocessing system to: receive, in each processor of a plurality ofprocessors in the data processing system, a secret key value; receive,in each processor of the plurality of processors, at least one randomkey value; randomly select one of the processors of the plurality ofprocessors to be a boot processor; select, in each of the processors ofthe plurality of processors, a key value for the processor based on therandom selection of the boot processor, wherein only the boot processorselects the secret key value as its corresponding key value and each ofthe other processors of the plurality of processors selects one of theat least one random key value as their corresponding key value; decrypt,in the boot processor, encrypted boot code using the secret key value;and execute the decrypted boot code to thereby boot the data processingsystem to an operational state.