<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>i.MX ProcessorsのトピックRe: How to enable secure boot for IMX8MM</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1664997#M207247</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you tell more details about device bricked?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not sure what will happen when you do fuse 1 3 0x8000000, as I see this bit reserved.&lt;/P&gt;
&lt;P&gt;If you close device, have you compared SRK fuse with SRK table?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can try to boot your signed image on a not-closed device.&lt;/P&gt;
&lt;P&gt;Are you using your own script (build_boot.sh) to build uboot? then have you tried an unsigned image which can be booted on a not-closed device?&lt;/P&gt;
&lt;P&gt;So far, I can't find problems from your csf and images.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;Harvey&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 07 Jun 2023 08:28:46 GMT</pubDate>
    <dc:creator>Harvey021</dc:creator>
    <dc:date>2023-06-07T08:28:46Z</dc:date>
    <item>
      <title>How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1655311#M206316</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently I'm working on Enable SecureBoot, would anyone guide me and point me out what steps I missed?&lt;/P&gt;&lt;P&gt;Here's my step as below:&lt;/P&gt;&lt;P&gt;Step 1. download cst-3.3.1.tgz&lt;/P&gt;&lt;P&gt;Step 2. tar xvf&amp;nbsp;cst-3.3.1.tgz &amp;amp;&amp;amp; cd&amp;nbsp;cst-3.3.1/keys&lt;/P&gt;&lt;P&gt;Step 3. cst-3.3.1/keys&lt;/P&gt;&lt;P&gt;$ echo "4242424E" &amp;gt; ser&lt;/P&gt;&lt;P&gt;$ echo "test" &amp;gt;&amp;nbsp;key_pass.txt&lt;/P&gt;&lt;P&gt;$ echo "test" &amp;gt;&amp;gt;&amp;nbsp;key_pass.txt&lt;/P&gt;&lt;P&gt;$ ./hab4_pki_tree.sh&lt;/P&gt;&lt;P&gt;+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++&lt;BR /&gt;This script is a part of the Code signing tools for Freescale's&lt;BR /&gt;High Assurance Boot. It generates a basic PKI tree. The PKI&lt;BR /&gt;tree consists of one or more Super Root Keys (SRK), with each&lt;BR /&gt;SRK having two subordinate keys:&lt;BR /&gt;+ a Command Sequence File (CSF) key&lt;BR /&gt;+ Image key.&lt;BR /&gt;Additional keys can be added to the PKI tree but a separate&lt;BR /&gt;script is available for this. This this script assumes openssl&lt;BR /&gt;is installed on your system and is included in your search&lt;BR /&gt;path. Finally, the private keys generated are password&lt;BR /&gt;protectedwith the password provided by the file key_pass.txt.&lt;BR /&gt;The format of the file is the password repeated twice:&lt;BR /&gt;my_password&lt;BR /&gt;my_password&lt;BR /&gt;All private keys in the PKI tree are in PKCS #8 format will be&lt;BR /&gt;protected by the same password.&lt;/P&gt;&lt;P&gt;+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++&lt;BR /&gt;Do you want to use an existing CA key (y/n)?: n&lt;BR /&gt;Do you want to use Elliptic Curve Cryptography (y/n)?: n&lt;BR /&gt;Enter key length in bits for PKI tree: 2048&lt;BR /&gt;Enter PKI tree duration (years): 20&lt;BR /&gt;How many Super Root Keys should be generated? 4&lt;BR /&gt;Do you want the SRK certificates to have the CA flag set? (y/n)?: y&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Step 4. cd ../crts &amp;amp;&amp;amp;&lt;/P&gt;&lt;P&gt;../linux64/bin/srktool \&lt;BR /&gt;&amp;gt; -h 4 \&lt;BR /&gt;&amp;gt; -t SRK_1_2_3_4_table.bin \&lt;BR /&gt;&amp;gt; -e SRK_1_2_3_4_fuse.bin \&lt;BR /&gt;&amp;gt; -d sha256 \&lt;BR /&gt;&amp;gt; -c ./SRK1_sha256_2048_65537_v3_ca_crt.pem,\&lt;BR /&gt;&amp;gt; ./SRK2_sha256_2048_65537_v3_ca_crt.pem,\&lt;BR /&gt;&amp;gt; ./SRK3_sha256_2048_65537_v3_ca_crt.pem,\&lt;BR /&gt;&amp;gt; ./SRK4_sha256_2048_65537_v3_ca_crt.pem&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Number of certificates = 4&lt;BR /&gt;SRK table binary filename = SRK_1_2_3_4_table.bin&lt;BR /&gt;SRK Fuse binary filename = SRK_1_2_3_4_fuse.bin&lt;BR /&gt;SRK Fuse binary dump:&lt;BR /&gt;SRK HASH[0] = 0xDA7CCBEB&lt;BR /&gt;SRK HASH[1] = 0xD7D9F573&lt;BR /&gt;SRK HASH[2] = 0x20DEBFD6&lt;BR /&gt;SRK HASH[3] = 0x0E4AAC11&lt;BR /&gt;SRK HASH[4] = 0xB0965A65&lt;BR /&gt;SRK HASH[5] = 0x1A89C7DA&lt;BR /&gt;SRK HASH[6] = 0x6D960E3F&lt;BR /&gt;SRK HASH[7] = 0xE080A6D8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Step 5.&amp;nbsp;CONFIG_SECURE_BOOT=y In uboot then rebuild it.&lt;/P&gt;&lt;P&gt;Step 6.&amp;nbsp;&lt;/P&gt;&lt;P&gt;$ cp imx-uboot/tools/mkimage ./imx-mkimage/iMX8M/mkimage_uboot&lt;BR /&gt;$ cp imx-uboot/arch/arm/dts/myb-imx8mm-base.dtb ./imx-mkimage/iMX8M/fsl-imx8mm-ddr4-evk.dtb&lt;BR /&gt;$ cp imx-uboot/spl/u-boot-spl.bin ./imx-mkimage/iMX8M/&lt;BR /&gt;$ cp imx-uboot/u-boot-nodtb.bin ./imx-mkimage/iMX8M/&lt;/P&gt;&lt;P&gt;# firmware-imx-8.7&lt;BR /&gt;$ cp firmware-imx-8.7/firmware/ddr/synopsys/ddr4_dmem_1d.bin ./imx-mkimage/iMX8M/&lt;BR /&gt;$ cp firmware-imx-8.7/firmware/ddr/synopsys/ddr4_dmem_2d.bin ./imx-mkimage/iMX8M/&lt;BR /&gt;$ cp firmware-imx-8.7/firmware/ddr/synopsys/ddr4_imem_1d.bin ./imx-mkimage/iMX8M/&lt;BR /&gt;$ cp firmware-imx-8.7/firmware/ddr/synopsys/ddr4_imem_2d.bin ./imx-mkimage/iMX8M/&lt;/P&gt;&lt;P&gt;# imx8mm-atf&lt;BR /&gt;$ cp imx-atf/build/imx8mm/release/bl31.bin ./imx-mkimage/iMX8M/&lt;/P&gt;&lt;P&gt;$ cd imx-mkimage&lt;BR /&gt;$ make SOC=iMX8MM clean&lt;BR /&gt;$ make SOC=iMX8MM flash_ddr4_evk&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;========= OFFSET dump =========&lt;BR /&gt;Loader IMAGE:&lt;BR /&gt;header_image_off 0x0&lt;BR /&gt;dcd_off 0x0&lt;BR /&gt;image_off 0x40&lt;BR /&gt;csf_off &lt;STRONG&gt;0x2c600&lt;/STRONG&gt;&lt;BR /&gt;spl hab block: &lt;STRONG&gt;0x7e0fc0 0x0 0x2c600&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Second Loader IMAGE:&lt;BR /&gt;sld_header_off 0x57c00&lt;BR /&gt;sld_csf_off &lt;STRONG&gt;0x58c20&lt;/STRONG&gt;&lt;BR /&gt;sld hab block: &lt;STRONG&gt;0x401fcdc0 0x57c00 0x1020&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;$ make SOC=iMX8MM print_fit_hab_ddr&lt;BR /&gt;&lt;/STRONG&gt;./../scripts/pad_image.sh bl31.bin&lt;BR /&gt;./../scripts/pad_image.sh u-boot-nodtb.bin fsl-imx8mm-ddr4-evk.dtb&lt;BR /&gt;TEE_LOAD_ADDR=0xbe000000 ATF_LOAD_ADDR=0x00920000 VERSION=v1 ./print_fit_hab.sh 0x60000 fsl-imx8mm-ddr4-evk.dtb&lt;STRONG&gt;&lt;BR /&gt;0x40200000 0x5AC00 0x9BDB0&lt;BR /&gt;0x4029BDB0 0xF69B0 0x83B0&lt;BR /&gt;0x920000 0xFED60 0xA160&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Step 7.&amp;nbsp; Copy template from imx-uboot source code&lt;/P&gt;&lt;P&gt;$ cp ./myir-imx-uboot/doc/imx/habv4/csf_examples/mx8m/csf_fit.txt cst-3.3.1&lt;/P&gt;&lt;P&gt;$ cp ./myir-imx-uboot/doc/imx/habv4/csf_examples/mx8m/csf_spl.txt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Step 8. Modify Blocks in csf_spl.txt&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Blocks = 0x7e0fc0 0x0 0x2c600 "flash.bin"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Step 9. Modify Blocks in csf_fit.txt&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Blocks =&amp;nbsp;0x401fcdc0 0x57c00 0x1020 "flash.bin" \&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;0x40200000 0x5AC00 0x9BDB0&amp;nbsp;"flash.bin" \&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0x4029BDB0 0xF69B0 0x83B0&amp;nbsp;"flash.bin" \&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0x920000 0xFED60 0xA160&amp;nbsp;"flash.bin"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Step 10.&amp;nbsp; Signed flash.bin then updating uboot&lt;/P&gt;&lt;P&gt;$ &lt;STRONG&gt;../linux64/bin/cst -i csf_spl.txt -o csf_spl.bin&lt;/STRONG&gt;&lt;BR /&gt;Install SRK&lt;BR /&gt;Install CSFK&lt;BR /&gt;Authenticate CSF&lt;BR /&gt;Install key&lt;BR /&gt;Authenticate data&lt;BR /&gt;CSF Processed successfully and signed data available in csf_spl.bin&lt;BR /&gt;$ &lt;STRONG&gt;../linux64/bin/cst -i csf_fit.txt -o csf_fit.bin&lt;/STRONG&gt;&lt;BR /&gt;Install SRK&lt;BR /&gt;Install CSFK&lt;BR /&gt;Authenticate CSF&lt;BR /&gt;Install key&lt;BR /&gt;Authenticate data&lt;BR /&gt;CSF Processed successfully and signed data available in csf_fit.bin&lt;/P&gt;&lt;P&gt;$ &lt;STRONG&gt;cp flash.bin signed_flash.bin&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;$&amp;nbsp;&lt;STRONG&gt;dd if=csf_spl.bin of=signed_flash.bin seek=$((0x2c600)) bs=1 conv=notrunc&lt;/STRONG&gt;&lt;BR /&gt;3912+0 records in&lt;BR /&gt;3912+0 records out&lt;BR /&gt;3912 bytes (3.9 kB, 3.8 KiB) copied, 0.00899194 s, 435 kB/s&lt;BR /&gt;$ &lt;STRONG&gt;dd if=csf_fit.bin of=signed_flash.bin seek=$((0x58c20)) bs=1 conv=notrunc&lt;/STRONG&gt;&lt;BR /&gt;3928+0 records in&lt;BR /&gt;3928+0 records out&lt;BR /&gt;3928 bytes (3.9 kB, 3.8 KiB) copied, 0.00964808 s, 407 kB/s&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$ &lt;STRONG&gt;dd if=/tmp/signed_flash.bin of=/dev/mmcblk1 bs=1k seek=33 &amp;amp;&amp;amp; sync &amp;amp;&amp;amp; reboot&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Step11.&amp;nbsp; check&amp;nbsp;hab_status&lt;/P&gt;&lt;P&gt;u-boot=&amp;gt; &lt;STRONG&gt;hab_status&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Secure boot disabled&lt;/P&gt;&lt;P&gt;HAB Configuration: 0xf0, HAB State: 0x66&lt;/P&gt;&lt;P&gt;--------- HAB Event 1 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x43 0x33 0x21 0xc0 0x00&lt;BR /&gt;0xbe 0x00 0x0c 0x00 0x03 0x17 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x68&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_CERTIFICATE (0x21)&lt;BR /&gt;CTX = HAB_CTX_COMMAND (0xC0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 2 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x43 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x40 0x1f 0xdd 0xc0&lt;BR /&gt;0x00 0x00 0x00 0x20&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 3 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x43 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x00 0x7e 0x0f 0xc0&lt;BR /&gt;0x00 0x00 0x00 0x20&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 4 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x43 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x00 0x7e 0x0f 0xe0&lt;BR /&gt;0x00 0x00 0x00 0x01&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 5 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x43 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x00 0x7e 0x10 0x00&lt;BR /&gt;0x00 0x00 0x00 0x04&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 6 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x43 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x40 0x1f 0xcd 0xc0&lt;BR /&gt;0x00 0x00 0x00 0x04&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 7 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x43 0x33 0x21 0xc0 0x00&lt;BR /&gt;0xbe 0x00 0x0c 0x00 0x03 0x17 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x58&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_CERTIFICATE (0x21)&lt;BR /&gt;CTX = HAB_CTX_COMMAND (0xC0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Step 12. fuse program&lt;/P&gt;&lt;P&gt;u-boot=&amp;gt; fuse prog 6 0 0xDA7CCBEB&lt;BR /&gt;u-boot=&amp;gt; fuse prog 6 1 0xD7D9F573&lt;BR /&gt;u-boot=&amp;gt; fuse prog 6 2 0x20DEBFD6&lt;BR /&gt;u-boot=&amp;gt; fuse prog 6 3 0x0E4AAC11&lt;BR /&gt;u-boot=&amp;gt; fuse prog 7 0 0xB0965A65&lt;BR /&gt;u-boot=&amp;gt; fuse prog 7 1 0x1A89C7DA&lt;BR /&gt;u-boot=&amp;gt; fuse prog 7 2 0x6D960E3F&lt;BR /&gt;u-boot=&amp;gt; fuse prog 7 3 0xE080A6D8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;u-boot=&amp;gt; fuse prog 0 0 0x200&lt;BR /&gt;&lt;BR /&gt;u-boot=&amp;gt; fuse prog 1 3 0x8000000&lt;BR /&gt;&lt;BR /&gt;u-boot=&amp;gt; fuse prog 1 3 0x200000&lt;BR /&gt;&lt;BR /&gt;u-boot=&amp;gt; fuse prog 1 3 0xC00000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;u-boot=&amp;gt; reset&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After resetting, iMX8MM can not bootup, could anyone help me clarify this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm wondering what the correct way is or what steps I missed/wrong?&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 06:09:07 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1655311#M206316</guid>
      <dc:creator>Ben_Teng</dc:creator>
      <dc:date>2023-05-23T06:09:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1659001#M206714</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/217655"&gt;@Ben_Teng&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"Step 5.&amp;nbsp;CONFIG_SECURE_BOOT=y In uboot then rebuild it. "&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Not sure what version of U-Boot you are using. It should be CONFIG_IMX_HAB=y if you are using newer U-Boot BSP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;Harvey&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 May 2023 08:00:13 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1659001#M206714</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2023-05-29T08:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1661497#M206914</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/192970"&gt;@Harvey021&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thanks for your reply!&lt;/P&gt;&lt;P&gt;Currently I'm using&amp;nbsp;U-Boot 2019.04.&lt;/P&gt;&lt;P&gt;Is it alright? Thanks again!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2023 06:20:46 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1661497#M206914</guid>
      <dc:creator>Ben_Teng</dc:creator>
      <dc:date>2023-06-01T06:20:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1661710#M206931</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you please share both your csf files? and would be better with your signed and unsigned images.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;Harvey&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2023 09:24:51 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1661710#M206931</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2023-06-01T09:24:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1662579#M207000</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/192970"&gt;@Harvey021&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thanks for your reply!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's csf files and unsigned/signed images as attachment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2023 09:32:55 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1662579#M207000</guid>
      <dc:creator>Ben_Teng</dc:creator>
      <dc:date>2023-06-02T09:32:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1662710#M207020</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/217655"&gt;@Ben_Teng&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Authenticate Data in your csf for fit should be matched as&amp;nbsp;printed by print_fit_hab_ddr.&lt;/P&gt;
&lt;P&gt;These mismatched lines marked with red as attached.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;Harvey&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2023 14:06:25 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1662710#M207020</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2023-06-02T14:06:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1663109#M207054</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/192970"&gt;@Harvey021&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thanks for your reply!&lt;/P&gt;&lt;P&gt;Oops! Most likely I forgot to revise it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this case, do I have any chance to rescue it back?&amp;nbsp;&lt;/P&gt;&lt;P&gt;It cannot boot up due to my mistake.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Besides, would you please help me to check if my images and csf files correct or not when I rebuild it?&lt;/P&gt;&lt;P&gt;I would like to build it again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2023 03:13:18 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1663109#M207054</guid>
      <dc:creator>Ben_Teng</dc:creator>
      <dc:date>2023-06-05T03:13:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1663149#M207056</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can retry to sign your boot image with correct csf files. It should be no problem, I don't see your fuse operation with error which will cause chip bricked if so.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;Harvey&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2023 05:36:13 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1663149#M207056</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2023-06-05T05:36:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1664012#M207154</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/192970"&gt;@Harvey021&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thanks for your reply!&lt;/P&gt;&lt;P&gt;The chip still bricked, let me attach csf &amp;amp; image I used currently again.&lt;/P&gt;&lt;P&gt;Is there anything wrong?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$ &lt;STRONG&gt;build_boot.sh&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;include misc.mak&lt;BR /&gt;include m4.mak&lt;BR /&gt;include android.mak&lt;BR /&gt;include test.mak&lt;BR /&gt;include autobuild.mak&lt;BR /&gt;include rev_a.mak&lt;BR /&gt;include alias.mak&lt;BR /&gt;imx8qm clean done&lt;BR /&gt;include misc.mak&lt;BR /&gt;include m4.mak&lt;BR /&gt;include android.mak&lt;BR /&gt;include test.mak&lt;BR /&gt;include autobuild.mak&lt;BR /&gt;include rev_a.mak&lt;BR /&gt;include alias.mak&lt;BR /&gt;imx8qx clean done&lt;BR /&gt;Compiling mkimage_imx8&lt;BR /&gt;PLAT=imx8mm HDMI=no&lt;BR /&gt;Compiling mkimage_imx8&lt;BR /&gt;gcc -O2 -pipe -g -feliminate-unused-debug-types mkimage_imx8.c -o mkimage_imx8 -lz&lt;BR /&gt;24564+0 records in&lt;BR /&gt;24564+0 records out&lt;BR /&gt;98256 bytes (98 kB, 96 KiB) copied, 0.0506418 s, 1.9 MB/s&lt;BR /&gt;./../scripts/pad_image.sh bl31.bin&lt;BR /&gt;bl31.bin is padded to 41312&lt;BR /&gt;./../scripts/pad_image.sh u-boot-nodtb.bin fsl-imx8mm-ddr4-evk.dtb&lt;BR /&gt;u-boot-nodtb.bin + fsl-imx8mm-ddr4-evk.dtb are padded to 672096&lt;BR /&gt;DEK_BLOB_LOAD_ADDR=0x40400000 TEE_LOAD_ADDR=0xbe000000 ATF_LOAD_ADDR=0x00920000 ./mkimage_fit_atf.sh fsl-imx8mm-ddr4-evk.dtb &amp;gt; u-boot-ddr4-evk.its&lt;BR /&gt;bl31.bin size:&lt;BR /&gt;41312&lt;BR /&gt;u-boot-nodtb.bin size:&lt;BR /&gt;638376&lt;BR /&gt;fsl-imx8mm-ddr4-evk.dtb size:&lt;BR /&gt;33720&lt;BR /&gt;./mkimage_uboot -E -p 0x3000 -f u-boot-ddr4-evk.its u-boot-ddr4-evk.itb&lt;BR /&gt;u-boot-ddr4-evk.its:7.11-14.5: Warning (unit_address_vs_reg): /images/uboot@1: node has a unit name, but no reg property&lt;BR /&gt;u-boot-ddr4-evk.its:15.9-20.5: Warning (unit_address_vs_reg): /images/fdt@1: node has a unit name, but no reg property&lt;BR /&gt;u-boot-ddr4-evk.its:21.9-29.5: Warning (unit_address_vs_reg): /images/atf@1: node has a unit name, but no reg property&lt;BR /&gt;u-boot-ddr4-evk.its:34.12-39.5: Warning (unit_address_vs_reg): /configurations/config@1: node has a unit name, but no reg property&lt;BR /&gt;FIT description: Configuration to load ATF before U-Boot&lt;BR /&gt;Created: Tue Jun 6 14:16:06 2023&lt;BR /&gt;Image 0 (uboot@1)&lt;BR /&gt;Description: U-Boot (64-bit)&lt;BR /&gt;Created: Tue Jun 6 14:16:06 2023&lt;BR /&gt;Type: Standalone Program&lt;BR /&gt;Compression: uncompressed&lt;BR /&gt;Data Size: 638376 Bytes = 623.41 KiB = 0.61 MiB&lt;BR /&gt;Architecture: AArch64&lt;BR /&gt;Load Address: 0x40200000&lt;BR /&gt;Entry Point: unavailable&lt;BR /&gt;Image 1 (fdt@1)&lt;BR /&gt;Description: fsl-imx8mm-ddr4-evk&lt;BR /&gt;Created: Tue Jun 6 14:16:06 2023&lt;BR /&gt;Type: Flat Device Tree&lt;BR /&gt;Compression: uncompressed&lt;BR /&gt;Data Size: 33720 Bytes = 32.93 KiB = 0.03 MiB&lt;BR /&gt;Architecture: Unknown Architecture&lt;BR /&gt;Image 2 (atf@1)&lt;BR /&gt;Description: ARM Trusted Firmware&lt;BR /&gt;Created: Tue Jun 6 14:16:06 2023&lt;BR /&gt;Type: Firmware&lt;BR /&gt;Compression: uncompressed&lt;BR /&gt;Data Size: 41312 Bytes = 40.34 KiB = 0.04 MiB&lt;BR /&gt;Architecture: AArch64&lt;BR /&gt;OS: Unknown OS&lt;BR /&gt;Load Address: 0x00920000&lt;BR /&gt;Default Configuration: 'config@1'&lt;BR /&gt;Configuration 0 (config@1)&lt;BR /&gt;Description: fsl-imx8mm-ddr4-evk&lt;BR /&gt;Kernel: unavailable&lt;BR /&gt;Firmware: uboot@1&lt;BR /&gt;FDT: fdt@1&lt;BR /&gt;Loadables: atf@1&lt;BR /&gt;./mkimage_imx8 -version v1 -fit -loader u-boot-spl-ddr4.bin 0x7E1000 -second_loader u-boot-ddr4-evk.itb 0x40200000 0x60000 -out flash.bin&lt;BR /&gt;Platform: i.MX8M (mScale)&lt;BR /&gt;ROM VERSION: v1&lt;BR /&gt;Using FIT image&lt;BR /&gt;LOADER IMAGE: u-boot-spl-ddr4.bin start addr: 0x007e1000&lt;BR /&gt;SECOND LOADER IMAGE: u-boot-ddr4-evk.itb start addr: 0x40200000 offset: 0x00060000&lt;BR /&gt;Output: flash.bin&lt;BR /&gt;========= IVT HEADER [HDMI FW] =========&lt;BR /&gt;header.tag: 0x0&lt;BR /&gt;header.length: 0x0&lt;BR /&gt;header.version: 0x0&lt;BR /&gt;entry: 0x0&lt;BR /&gt;reserved1: 0x0&lt;BR /&gt;dcd_ptr: 0x0&lt;BR /&gt;boot_data_ptr: 0x0&lt;BR /&gt;self: 0x0&lt;BR /&gt;csf: 0x0&lt;BR /&gt;reserved2: 0x0&lt;BR /&gt;boot_data.start: 0x0&lt;BR /&gt;boot_data.size: 0x0&lt;BR /&gt;boot_data.plugin: 0x0&lt;BR /&gt;========= IVT HEADER [PLUGIN] =========&lt;BR /&gt;header.tag: 0x0&lt;BR /&gt;header.length: 0x0&lt;BR /&gt;header.version: 0x0&lt;BR /&gt;entry: 0x0&lt;BR /&gt;reserved1: 0x0&lt;BR /&gt;dcd_ptr: 0x0&lt;BR /&gt;boot_data_ptr: 0x0&lt;BR /&gt;self: 0x0&lt;BR /&gt;csf: 0x0&lt;BR /&gt;reserved2: 0x0&lt;BR /&gt;boot_data.start: 0x0&lt;BR /&gt;boot_data.size: 0x0&lt;BR /&gt;boot_data.plugin: 0x0&lt;BR /&gt;========= IVT HEADER [LOADER IMAGE] =========&lt;BR /&gt;header.tag: 0xd1&lt;BR /&gt;header.length: 0x2000&lt;BR /&gt;header.version: 0x41&lt;BR /&gt;entry: 0x7e1000&lt;BR /&gt;reserved1: 0x57c00&lt;BR /&gt;dcd_ptr: 0x0&lt;BR /&gt;boot_data_ptr: 0x7e0fe0&lt;BR /&gt;self: 0x7e0fc0&lt;BR /&gt;csf: 0x80d5c0&lt;BR /&gt;reserved2: 0x0&lt;BR /&gt;boot_data.start: 0x7e0bc0&lt;BR /&gt;boot_data.size: 0x2ea60&lt;BR /&gt;boot_data.plugin: 0x0&lt;BR /&gt;========= OFFSET dump =========&lt;BR /&gt;Loader IMAGE:&lt;BR /&gt;header_image_off 0x0&lt;BR /&gt;dcd_off 0x0&lt;BR /&gt;image_off 0x40&lt;BR /&gt;csf_off &lt;STRONG&gt;0x2c600&lt;/STRONG&gt;&lt;BR /&gt;spl hab block: &lt;STRONG&gt;0x7e0fc0 0x0 0x2c600&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Second Loader IMAGE:&lt;BR /&gt;sld_header_off 0x57c00&lt;BR /&gt;sld_csf_off &lt;STRONG&gt;0x58c20&lt;/STRONG&gt;&lt;BR /&gt;sld hab block: &lt;STRONG&gt;0x401fcdc0 0x57c00 0x1020&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;imx-mkimage $ &lt;STRONG&gt;make SOC=iMX8MM print_fit_hab_ddr4&lt;/STRONG&gt;&lt;BR /&gt;./../scripts/pad_image.sh bl31.bin&lt;BR /&gt;./../scripts/pad_image.sh u-boot-nodtb.bin fsl-imx8mm-ddr4-evk.dtb&lt;BR /&gt;TEE_LOAD_ADDR=0xbe000000 ATF_LOAD_ADDR=0x00920000 VERSION=v1 ./print_fit_hab.sh 0x60000 fsl-imx8mm-ddr4-evk.dtb&lt;BR /&gt;&lt;STRONG&gt;0x40200000 0x5AC00 0x9BDA8&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;0x4029BDA8 0xF69A8 0x83B8&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;0x920000 0xFED60 0xA160&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thanks again!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Best Regards,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Ben&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 07:10:28 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1664012#M207154</guid>
      <dc:creator>Ben_Teng</dc:creator>
      <dc:date>2023-06-06T07:10:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1664997#M207247</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you tell more details about device bricked?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not sure what will happen when you do fuse 1 3 0x8000000, as I see this bit reserved.&lt;/P&gt;
&lt;P&gt;If you close device, have you compared SRK fuse with SRK table?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can try to boot your signed image on a not-closed device.&lt;/P&gt;
&lt;P&gt;Are you using your own script (build_boot.sh) to build uboot? then have you tried an unsigned image which can be booted on a not-closed device?&lt;/P&gt;
&lt;P&gt;So far, I can't find problems from your csf and images.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;Harvey&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2023 08:28:46 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1664997#M207247</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2023-06-07T08:28:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1665156#M207269</link>
      <description>&lt;P&gt;I use the tools in cst to parse the&amp;nbsp;signed_flash.bin in&amp;nbsp;secureboot_csf_image.zip and re-create the hash.&lt;/P&gt;&lt;P&gt;hexdump SRK_fuses.bin&lt;BR /&gt;0000000 cbeb da7c f573 d7d9 bfd6 20de ac11 0e4a&lt;BR /&gt;0000010 5a65 b096 c7da 1a89 0e3f 6d96 a6d8 e080&lt;/P&gt;&lt;P&gt;It is correct.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The big problem is:&lt;/P&gt;&lt;P&gt;You didn't follow the document in&amp;nbsp;uboot-imx\doc\imx\habv4\guides\mx8m_secure_boot.txt.&lt;/P&gt;&lt;P&gt;The only fuse to enable the security boot on 8MM is&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Program SEC_CONFIG[1] fuse on i.MX8M family devices:&lt;/P&gt;&lt;P&gt;=&amp;gt; fuse prog 1 3 0x2000000&lt;/P&gt;&lt;P&gt;You didn't do that.&lt;/P&gt;&lt;P&gt;But you program the&amp;nbsp;SRK_LOCK (fuse prog 0 0 0x200).&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is not the i.MX8MM document.&lt;/P&gt;&lt;P&gt;But according to my i.MX6 experience.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the&amp;nbsp;&amp;nbsp;SRK_LOCK is set, even the ROM security boot cannot read the srk table.&lt;/P&gt;&lt;P&gt;So, you board gets&amp;nbsp;&lt;SPAN&gt;bricked for ever.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2023 12:20:51 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1665156#M207269</guid>
      <dc:creator>rudi_cyber</dc:creator>
      <dc:date>2023-06-07T12:20:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1666665#M207355</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/192970"&gt;@Harvey021&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just followed the &lt;A href="https://docs.zondax.ch/tee-signer/Secure%20Boot/SecureBoot-iMX8M" target="_self"&gt;documentation.&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;If you close device, have you compared SRK fuse with SRK table?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;-&amp;gt; Ah, no I didn't compared SRK fuse with SRK table.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Are you using your own script (build_boot.sh) to build uboot? then have you tried an unsigned image which can be booted on a not-closed device?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;-&amp;gt; Yes, I use my script to build uboot, final it will generate flash.bin.&amp;nbsp;&lt;/P&gt;&lt;P&gt;-&amp;gt; I can use flash.bin for good so far.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a question here, can we boot up the device which not be fused with signed image?&lt;/P&gt;&lt;P&gt;The device can boot up yet I'm not sure it is make sense or not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 06:06:52 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1666665#M207355</guid>
      <dc:creator>Ben_Teng</dc:creator>
      <dc:date>2023-06-09T06:06:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1666669#M207356</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/215734"&gt;@rudi_cyber&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thanks for your reply,&lt;/P&gt;&lt;P&gt;I'll read&amp;nbsp;&lt;SPAN&gt;uboot-imx\doc\imx\habv4\guides\mx8m_secure_boot.txt closely.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;According to your experience, could I just only program the fuse as below?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;u-boot=&amp;gt; fuse prog 6 0 0xDA7CCBEB&lt;BR /&gt;u-boot=&amp;gt; fuse prog 6 1 0xD7D9F573&lt;BR /&gt;u-boot=&amp;gt; fuse prog 6 2 0x20DEBFD6&lt;BR /&gt;u-boot=&amp;gt; fuse prog 6 3 0x0E4AAC11&lt;BR /&gt;u-boot=&amp;gt; fuse prog 7 0 0xB0965A65&lt;BR /&gt;u-boot=&amp;gt; fuse prog 7 1 0x1A89C7DA&lt;BR /&gt;u-boot=&amp;gt; fuse prog 7 2 0x6D960E3F&lt;BR /&gt;u-boot=&amp;gt; fuse prog 7 3 0xE080A6D8&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 06:11:13 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1666669#M207356</guid>
      <dc:creator>Ben_Teng</dc:creator>
      <dc:date>2023-06-09T06:11:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1666775#M207370</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/192970"&gt;@Harvey021&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I've a question about output of U-boot Command "hab_status".&lt;/P&gt;&lt;P&gt;I just read the document "mx8m_secure_boot.txt" a few minutes ago, it says that&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"&lt;STRONG&gt;Prior to closing the device users should ensure no HAB events were found&lt;/STRONG&gt;",&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;we should not get any&amp;nbsp;&lt;STRONG&gt;HAB Event&lt;/STRONG&gt;&amp;nbsp;when I called "hab_status" after we programming SRK Hash, right?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In this case the command output as below means something is wrong, am I right?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;u-boot=&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;hab_status&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Secure boot disabled&lt;/P&gt;&lt;P&gt;HAB Configuration: 0xf0, HAB State: 0x66&lt;/P&gt;&lt;P&gt;--------- HAB Event 1 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x43 0x33 0x21 0xc0 0x00&lt;BR /&gt;0xbe 0x00 0x0c 0x00 0x03 0x17 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x68&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_CERTIFICATE (0x21)&lt;BR /&gt;CTX = HAB_CTX_COMMAND (0xC0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 2 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x43 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x40 0x1f 0xdd 0xc0&lt;BR /&gt;0x00 0x00 0x00 0x20&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 3 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x43 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x00 0x7e 0x0f 0xc0&lt;BR /&gt;0x00 0x00 0x00 0x20&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 4 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x43 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x00 0x7e 0x0f 0xe0&lt;BR /&gt;0x00 0x00 0x00 0x01&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 5 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x43 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x00 0x7e 0x10 0x00&lt;BR /&gt;0x00 0x00 0x00 0x04&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 6 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x43 0x33 0x0c 0xa0 0x00&lt;BR /&gt;0x00 0x00 0x00 0x00 0x40 0x1f 0xcd 0xc0&lt;BR /&gt;0x00 0x00 0x00 0x04&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_ASSERTION (0x0C)&lt;BR /&gt;CTX = HAB_CTX_ASSERT (0xA0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------- HAB Event 7 -----------------&lt;BR /&gt;event data:&lt;BR /&gt;0xdb 0x00 0x14 0x43 0x33 0x21 0xc0 0x00&lt;BR /&gt;0xbe 0x00 0x0c 0x00 0x03 0x17 0x00 0x00&lt;BR /&gt;0x00 0x00 0x00 0x58&lt;/P&gt;&lt;P&gt;STS = HAB_FAILURE (0x33)&lt;BR /&gt;RSN = HAB_INV_CERTIFICATE (0x21)&lt;BR /&gt;CTX = HAB_CTX_COMMAND (0xC0)&lt;BR /&gt;ENG = HAB_ENG_ANY (0x00)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your patience.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 08:18:07 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1666775#M207370</guid>
      <dc:creator>Ben_Teng</dc:creator>
      <dc:date>2023-06-09T08:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1666802#M207375</link>
      <description>&lt;P&gt;The srk table hash is correct.&lt;/P&gt;&lt;P&gt;I have check the your signed flash.bin and&amp;nbsp; extract the srk table from your singed flash.bin.&lt;/P&gt;&lt;P&gt;and re-generate the hash by tools in cst. It is correct.&amp;nbsp;&lt;/P&gt;&lt;P&gt;You device hasn't been closed, yet. Because you didn't burn the&amp;nbsp;&lt;SPAN&gt;SEC_CONFIG[1] fuse(fuse prog 1 3 0x2000000).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You problem is you burn the&amp;nbsp;the&amp;nbsp;SRK_LOCK (fuse prog 0 0 0x200).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you didn't burn the&amp;nbsp;SRK_LOCK (fuse prog 0 0 0x200), you can try till no any HAB event.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Then you close the device by&amp;nbsp;burn the&amp;nbsp;SEC_CONFIG[1] fuse(fuse prog 1 3 0x2000000).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The document in uboot, didn't tell you&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;u-boot=&amp;gt; fuse prog 0 0 0x200&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;u-boot=&amp;gt; fuse prog 1 3 0x8000000&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; u-boot=&amp;gt; fuse prog 1 3 0x200000&amp;nbsp; &amp;nbsp;you didn't close the device.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;(SEC_CONFIG[1] fuse(fuse prog 1 3 0x2000000).）&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;u-boot=&amp;gt; fuse prog 1 3 0xC00000&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://github.com/nxp-imx/uboot-imx/blob/lf_v2022.04/doc/imx/habv4/guides/mx8m_secure_boot.txt" target="_blank" rel="noopener"&gt;https://github.com/nxp-imx/uboot-imx/blob/lf_v2022.04/doc/imx/habv4/guides/mx8m_secure_boot.txt&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Prior to closing the device users should ensure &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;no HAB&lt;/FONT&gt; &lt;/STRONG&gt;events were found, as&lt;BR /&gt;the example below:&lt;/P&gt;&lt;P&gt;- Verify HAB events:&lt;/P&gt;&lt;P&gt;=&amp;gt; hab_status&lt;/P&gt;&lt;P&gt;Secure boot disabled&lt;/P&gt;&lt;P&gt;HAB Configuration: 0xf0, HAB State: 0x66&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;attached the SRK_fuse.bin and SRKTable.bin extracted from your signed_flash.bin&lt;/P&gt;&lt;P&gt;hexdump -e '/4 "0x"' -e '/4 "%X""\n"' SRK_fuses.bin&lt;/P&gt;&lt;P&gt;0xDA7CCBEB&lt;/P&gt;&lt;P&gt;0xD7D9F573&lt;/P&gt;&lt;P&gt;0x20DEBFD6&lt;/P&gt;&lt;P&gt;0xE4AAC11&lt;/P&gt;&lt;P&gt;0xB0965A65&lt;/P&gt;&lt;P&gt;0x1A89C7DA&lt;/P&gt;&lt;P&gt;0x6D960E3F&lt;/P&gt;&lt;P&gt;0xE080A6D8&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Fri, 09 Jun 2023 09:11:57 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1666802#M207375</guid>
      <dc:creator>rudi_cyber</dc:creator>
      <dc:date>2023-06-09T09:11:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1667888#M207458</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/192970"&gt;@Harvey021&lt;/a&gt;&amp;nbsp;&amp;amp; &lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/215734"&gt;@rudi_cyber&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I programed new fuse I re-generated couple of minutes ago, the chip is not bricked so far.&lt;/P&gt;&lt;P&gt;I checked hab_status Secure boot is still disabled, should I program these are shown as below for enable secure boot?&lt;/P&gt;&lt;P&gt;I'm not sure if it's fine to program these.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- Program SRK_LOCK:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;=&amp;gt; fuse prog 0 0 0x200&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- Program DIR_BT_DIS:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;=&amp;gt; fuse prog 1 3 0x8000000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- Program SJC_DISABLE:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;=&amp;gt; fuse prog 1 3 0x200000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- JTAG_SMODE:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;=&amp;gt; fuse prog 1 3 0xC00000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Here's the log I programmed SRK_HASH. Then check hab_status.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;u-boot=&amp;gt; hab_status&lt;/P&gt;&lt;P&gt;Secure boot disabled&lt;/P&gt;&lt;P&gt;HAB Configuration: 0xf0, HAB State: 0x66&lt;BR /&gt;No HAB Events Found!&lt;/P&gt;&lt;P&gt;u-boot=&amp;gt; fuse prog 6 0 0xF251CB62&lt;BR /&gt;Programming bank 6 word 0x00000000 to 0xf251cb62...&lt;BR /&gt;Warning: Programming fuses is an irreversible operation!&lt;BR /&gt;This may brick your system.&lt;BR /&gt;Use this command only if you are sure of what you are doing!&lt;/P&gt;&lt;P&gt;Really perform this fuse programming? &amp;lt;y/N&amp;gt;&lt;BR /&gt;y&lt;BR /&gt;u-boot=&amp;gt; fuse prog 6 1 0x7BF4EB5C&lt;BR /&gt;Programming bank 6 word 0x00000001 to 0x7bf4eb5c...&lt;BR /&gt;Warning: Programming fuses is an irreversible operation!&lt;BR /&gt;This may brick your system.&lt;BR /&gt;Use this command only if you are sure of what you are doing!&lt;/P&gt;&lt;P&gt;Really perform this fuse programming? &amp;lt;y/N&amp;gt;&lt;BR /&gt;y&lt;BR /&gt;u-boot=&amp;gt; fuse prog 6 2 0x02741273&lt;BR /&gt;Programming bank 6 word 0x00000002 to 0x02741273...&lt;BR /&gt;Warning: Programming fuses is an irreversible operation!&lt;BR /&gt;This may brick your system.&lt;BR /&gt;Use this command only if you are sure of what you are doing!&lt;/P&gt;&lt;P&gt;Really perform this fuse programming? &amp;lt;y/N&amp;gt;&lt;BR /&gt;y&lt;BR /&gt;u-boot=&amp;gt; fuse prog 6 3 0xD5EE1986&lt;BR /&gt;Programming bank 6 word 0x00000003 to 0xd5ee1986...&lt;BR /&gt;Warning: Programming fuses is an irreversible operation!&lt;BR /&gt;This may brick your system.&lt;BR /&gt;Use this command only if you are sure of what you are doing!&lt;/P&gt;&lt;P&gt;Really perform this fuse programming? &amp;lt;y/N&amp;gt;&lt;BR /&gt;y&lt;BR /&gt;u-boot=&amp;gt; fuse prog 7 0 0xF0CB6BB1&lt;BR /&gt;Programming bank 7 word 0x00000000 to 0xf0cb6bb1...&lt;BR /&gt;Warning: Programming fuses is an irreversible operation!&lt;BR /&gt;This may brick your system.&lt;BR /&gt;Use this command only if you are sure of what you are doing!&lt;/P&gt;&lt;P&gt;Really perform this fuse programming? &amp;lt;y/N&amp;gt;&lt;BR /&gt;y&lt;BR /&gt;u-boot=&amp;gt; fuse prog 7 1 0xE6E0D45E&lt;BR /&gt;Programming bank 7 word 0x00000001 to 0xe6e0d45e...&lt;BR /&gt;Warning: Programming fuses is an irreversible operation!&lt;BR /&gt;This may brick your system.&lt;BR /&gt;Use this command only if you are sure of what you are doing!&lt;/P&gt;&lt;P&gt;Really perform this fuse programming? &amp;lt;y/N&amp;gt;&lt;BR /&gt;y&lt;BR /&gt;u-boot=&amp;gt; fuse prog 7 2 0x6207D012&lt;BR /&gt;Programming bank 7 word 0x00000002 to 0x6207d012...&lt;BR /&gt;Warning: Programming fuses is an irreversible operation!&lt;BR /&gt;This may brick your system.&lt;BR /&gt;Use this command only if you are sure of what you are doing!&lt;/P&gt;&lt;P&gt;Really perform this fuse programming? &amp;lt;y/N&amp;gt;&lt;BR /&gt;y&lt;BR /&gt;u-boot=&amp;gt; fuse prog 7 3 0x1A6EAA7E&lt;BR /&gt;Programming bank 7 word 0x00000003 to 0x1a6eaa7e...&lt;BR /&gt;Warning: Programming fuses is an irreversible operation!&lt;BR /&gt;This may brick your system.&lt;BR /&gt;Use this command only if you are sure of what you are doing!&lt;/P&gt;&lt;P&gt;Really perform this fuse programming? &amp;lt;y/N&amp;gt;&lt;BR /&gt;y&lt;/P&gt;&lt;P&gt;u-boot=&amp;gt; hab_status&lt;/P&gt;&lt;P&gt;Secure boot disabled&lt;/P&gt;&lt;P&gt;HAB Configuration: 0xf0, HAB State: 0x66&lt;BR /&gt;No HAB Events Found!&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 03:44:36 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1667888#M207458</guid>
      <dc:creator>Ben_Teng</dc:creator>
      <dc:date>2023-06-13T03:44:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1667951#M207466</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To enable secure boot, as stated in (&lt;A href="https://github.com/nxp-imx/uboot-imx/blob/lf_v2022.04/doc/imx/habv4/guides/mx8m_secure_boot.txt" target="_blank"&gt;uboot-imx/doc/imx/habv4/guides/mx8m_secure_boot.txt at lf_v2022.04 · nxp-imx/uboot-imx · GitHub&lt;/A&gt;) you have to close device.&lt;/P&gt;
&lt;P&gt;- Program SEC_CONFIG[1] fuse on i.MX8M family devices:&lt;/P&gt;
&lt;P&gt;=&amp;gt; fuse prog 1 3 0x2000000&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, you can go ahead for Completely secure the device, just a note to "&lt;STRONG&gt;DIR_BT_DIS".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Normally this bit is already fused out of factory. You can read it before fuse.&lt;/P&gt;
&lt;P&gt;More details, refer to 5.7 Securing the device of AN4581.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;Harvey&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 05:58:37 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1667951#M207466</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2023-06-13T05:58:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1668127#M207479</link>
      <description>&lt;P&gt;1. fuse prog 1 3 0x2000000 is enough to finish the HAB close the device.&amp;nbsp;SEC_CONFIG[1] fuse&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; You don't need to program others.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The others are related to the device SOC level security not HAB.&amp;nbsp;&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; - Program SJC_DISABLE:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;=&amp;gt; fuse prog 1 3 0x200000&lt;/P&gt;&lt;P&gt;This&amp;nbsp; fuse has no related to the HAB security. Open device still can disable&amp;nbsp; jtag. (no need fuse prog 1 3 0x2000000 )&lt;/P&gt;&lt;P&gt;3.&amp;nbsp;- JTAG_SMODE:&lt;/P&gt;&lt;P&gt;=&amp;gt; fuse prog 1 3 0xC00000&lt;/P&gt;&lt;P&gt;This&amp;nbsp; fuse has no related to the HAB security. Open device still can use security jtag, which is called challenge. In i.MX is using uuid.(no need&amp;nbsp; fuse prog 1 3 0x2000000 )&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled.png" style="width: 999px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/227339i10ADC1CDB86F33DD/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled.png" alt="Untitled.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Besides, when you disable the jtag, you have no chance to access the jtag, jtag challenge also doesn't exist.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So when you use&amp;nbsp;&amp;nbsp;SJC_DISABLE,&amp;nbsp;JTAG_SMODE, you don't need to program&amp;nbsp;JTAG_SMODE.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled1.png" style="width: 817px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/227344iE80FAC59D2F5B98B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled1.png" alt="Untitled1.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 08:15:35 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1668127#M207479</guid>
      <dc:creator>mason2036</dc:creator>
      <dc:date>2023-06-13T08:15:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1668136#M207481</link>
      <description>&lt;P&gt;Harvey:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If it is fused out of factory, it became read only. So note what to&amp;nbsp;"&lt;STRONG&gt;DIR_BT_DIS".&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;What we need to note to a fuse which is fused out of factory.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tell me note what? do not fuse again?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fuse the uuid, which is fused out of factory, what will happen? tell me. I will be careful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, you can go ahead for Completely secure the device, just a note to "&lt;STRONG&gt;DIR_BT_DIS".&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Normally this bit is already fused out of factory. You can read it before fuse.&lt;/P&gt;&lt;P&gt;More details, refer to 5.7 Securing the device of AN4581.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 08:14:19 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1668136#M207481</guid>
      <dc:creator>mason2036</dc:creator>
      <dc:date>2023-06-13T08:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable secure boot for IMX8MM</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1668170#M207486</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/192970"&gt;@Harvey021&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thank you so much for your reply!&lt;/P&gt;&lt;P&gt;1. As stated in&amp;nbsp;AN4581,&amp;nbsp;&lt;STRONG&gt;DIR_BT_DIS:&amp;nbsp;Disable direct external memory boot.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;-&amp;gt; I'm still not fully get it, would you please tell me much more detail?&lt;/P&gt;&lt;P&gt;What to note "&lt;STRONG&gt;DIR_BT_DIS"&lt;/STRONG&gt;? I'm confused by "&lt;STRONG&gt;direct external memory boot" and "eMMC boot", &lt;/STRONG&gt;would you please tell me more about it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. After I programmed SEC_CONFIG[1], I get an &lt;STRONG&gt;Error:Invalid IVT structure,&amp;nbsp;&lt;/STRONG&gt;shown as below, how can I fix it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Authenticate image from DDR location 0x40480000...&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;bad magic magic=0x90 length=0x4ba version=0x0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;bad length magic=0x90 length=0x4ba version=0x0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;bad version magic=0x90 length=0x4ba version=0x0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Error: Invalid IVT structure&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Allowed IVT structure:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;IVT HDR = 0x4X2000D1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;IVT ENTRY = 0xXXXXXXXX&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;IVT RSV1 = 0x0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;IVT DCD = 0x0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;IVT BOOT_DATA = 0xXXXXXXXX&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;IVT SELF = 0xXXXXXXXX&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;IVT CSF = 0xXXXXXXXX&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;IVT RSV2 = 0x0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Authenticate Image Fail, Please check&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 08:33:02 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/How-to-enable-secure-boot-for-IMX8MM/m-p/1668170#M207486</guid>
      <dc:creator>Ben_Teng</dc:creator>
      <dc:date>2023-06-13T08:33:02Z</dc:date>
    </item>
  </channel>
</rss>

