Replies: 2 comments 1 reply
-
|
We did mention this breaking change on the wiki page for R35.5.0, when it was introduced. In generating the EKB, you should only need the "auth" key, since the other two are used for other purposes, but it probably doesn't hurt to include all three. Did you flash the updated EKB to your device when you tested? Or if you used an OTA update system, did you make sure that the update included updating the EKB? But I'm not sure what the expected behavior is when you've locked down the secure boot fuses, but left the KEKs all zeroes... hopefully it will work just by specifying the key in the EKB. If not, you may need to patch the UEFI code to disable the variable authentication. |
Beta Was this translation helpful? Give feedback.
-
|
Yes, I flashed the updated EKB (eks.img), also verified that the hash sum is equal to the image I generated with gen_ekb.py . I just noticed that the interesting logs start even earlier with: Would be really nice to know if leaving KEK2 at all zeros and burning the production fuse is a valid option or actually screwed up my devices. Meanwhile I was able to boot the device with disabling variable authentication. I set |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello,
we are running our Yocto on a Jetson Xavier AGX Industrial based target. It's successfully running now for more than a year with using the tag 35.4.1 (kirkstone) of layer meta-tegra. The device is fused, with secure boot enabled for bootloaders and UEFI.
After updating to meta-tegra release 35.6.1 (still kirkstone) the device refuses to boot with this error:
I read in the forum that this might be related to the UEFI Variable Protection that is now enabled by default and that the issue could be solved with creating my own EKB partition (till now the default eks_t194.img was used).
So I created my own eks_t194.img and installed it with a bbappend to tegra-bootfiles. For creating the EKS image on my own I downloaded the op-tee sources (BSP Driver Sources for Jetson 35.6.1) and used the example.sh:
Unfortunately the behaviour persists with still the same error message. I uses kek2 filled with zeros, because we never fused a value for kek0, kek1 and kek2 - only the secure boot key and the public key hash. We were not aware that kek2 might be needed in the future. Did I miss something? Is there anything more that needs to be changed?
Beta Was this translation helpful? Give feedback.
All reactions