<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>i.MX ProcessorsのトピックI.MX8MP Secure Boot Issues</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2017043#M232177</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I’ve been following the guides for i.MX8M secure boot and I’m using an SD card to boot. So far, I’ve generated a flash.bin containing the SPL, U-Boot, ATF, etc., generated the keys and fuse maps, and finally fused the keys. However, I am encountering the following error:&lt;/P&gt;&lt;P&gt;resetting ...&lt;/P&gt;&lt;P&gt;U-Boot SPL 2022.04-bcn_lf_v2022.04+gf016f1f8de (Nov 02 2022 - 17:32:57 +0000)&lt;BR /&gt;SEC0: RNG instantiated&lt;BR /&gt;Trying to boot from BOOTROM&lt;BR /&gt;image offset 0x8000, pagesize 0x200, ivt offset 0x0&lt;BR /&gt;## Checking hash(es) for config config-1 ... OK&lt;BR /&gt;## Checking hash(es) for Image uboot-1 ... OK&lt;BR /&gt;## Checking hash(es) for Image fdt-1 ... OK&lt;BR /&gt;## Checking hash(es) for Image atf-1 ... OK&lt;BR /&gt;## Checking hash(es) for Image tee-1 ... OK&lt;/P&gt;&lt;P&gt;Authenticate image from DDR location 0x401ff980...&lt;BR /&gt;bad magic magic=0x42 length=0x60 version=0x51&lt;BR /&gt;bad length magic=0x42 length=0x60 version=0x51&lt;BR /&gt;bad version magic=0x42 length=0x60 version=0x51&lt;BR /&gt;Error: Invalid IVT structure&lt;BR /&gt;spl: ERROR: image authentication unsuccessful&lt;/P&gt;&lt;P&gt;The guidelines I followed provided a genIVT.pl script, but I’m unsure how to modify it to resolve the issue.&lt;/P&gt;&lt;P&gt;When I flash my SD card without the IVT (just flash.bin), using bs=1K seek=32, I am able to boot without issues. This suggests that my offsets are correct, but I am uncertain where exactly to place the IVT.&lt;/P&gt;&lt;P&gt;I would be happy to share my environment details as they are critical for the IVT configuration.&lt;/P&gt;&lt;P&gt;I'm also unsure how to use the chain of trust to authenticate the kernel image as well.&lt;/P&gt;&lt;P&gt;I would appreciate any assistance or guidance you can provide.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 19 Dec 2024 08:47:52 GMT</pubDate>
    <dc:creator>KadirY</dc:creator>
    <dc:date>2024-12-19T08:47:52Z</dc:date>
    <item>
      <title>I.MX8MP Secure Boot Issues</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2017043#M232177</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I’ve been following the guides for i.MX8M secure boot and I’m using an SD card to boot. So far, I’ve generated a flash.bin containing the SPL, U-Boot, ATF, etc., generated the keys and fuse maps, and finally fused the keys. However, I am encountering the following error:&lt;/P&gt;&lt;P&gt;resetting ...&lt;/P&gt;&lt;P&gt;U-Boot SPL 2022.04-bcn_lf_v2022.04+gf016f1f8de (Nov 02 2022 - 17:32:57 +0000)&lt;BR /&gt;SEC0: RNG instantiated&lt;BR /&gt;Trying to boot from BOOTROM&lt;BR /&gt;image offset 0x8000, pagesize 0x200, ivt offset 0x0&lt;BR /&gt;## Checking hash(es) for config config-1 ... OK&lt;BR /&gt;## Checking hash(es) for Image uboot-1 ... OK&lt;BR /&gt;## Checking hash(es) for Image fdt-1 ... OK&lt;BR /&gt;## Checking hash(es) for Image atf-1 ... OK&lt;BR /&gt;## Checking hash(es) for Image tee-1 ... OK&lt;/P&gt;&lt;P&gt;Authenticate image from DDR location 0x401ff980...&lt;BR /&gt;bad magic magic=0x42 length=0x60 version=0x51&lt;BR /&gt;bad length magic=0x42 length=0x60 version=0x51&lt;BR /&gt;bad version magic=0x42 length=0x60 version=0x51&lt;BR /&gt;Error: Invalid IVT structure&lt;BR /&gt;spl: ERROR: image authentication unsuccessful&lt;/P&gt;&lt;P&gt;The guidelines I followed provided a genIVT.pl script, but I’m unsure how to modify it to resolve the issue.&lt;/P&gt;&lt;P&gt;When I flash my SD card without the IVT (just flash.bin), using bs=1K seek=32, I am able to boot without issues. This suggests that my offsets are correct, but I am uncertain where exactly to place the IVT.&lt;/P&gt;&lt;P&gt;I would be happy to share my environment details as they are critical for the IVT configuration.&lt;/P&gt;&lt;P&gt;I'm also unsure how to use the chain of trust to authenticate the kernel image as well.&lt;/P&gt;&lt;P&gt;I would appreciate any assistance or guidance you can provide.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Dec 2024 08:47:52 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2017043#M232177</guid>
      <dc:creator>KadirY</dc:creator>
      <dc:date>2024-12-19T08:47:52Z</dc:date>
    </item>
    <item>
      <title>Re: I.MX8MP Secure Boot Issues</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2017347#M232199</link>
      <description>&lt;P&gt;Here, I have listed pretty much everything I've done so far.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Here is my mkimage_imx8 log:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;make -f soc.mak SOC=iMX8MP flash_spl_uboot&lt;BR /&gt;./mkimage_imx8 -version v2 -fit -loader u-boot-spl-ddr.bin 0x920000 -second_loader u-boot.itb 0x40200000 0x60000 -out flash.bin&lt;BR /&gt;Platform: i.MX8M (mScale)&lt;BR /&gt;ROM VERSION: v2&lt;BR /&gt;Using FIT image&lt;BR /&gt;LOADER IMAGE: u-boot-spl-ddr.bin start addr: 0x00920000&lt;BR /&gt;SECOND LOADER IMAGE: u-boot.itb start addr: 0x40200000 offset: 0x00060000&lt;BR /&gt;Output: flash.bin&lt;BR /&gt;========= IVT HEADER [HDMI FW] =========&lt;BR /&gt;header.tag: 0x0&lt;BR /&gt;header.length: 0x0&lt;BR /&gt;header.version: 0x0&lt;BR /&gt;entry: 0x0&lt;BR /&gt;reserved1: 0x0&lt;BR /&gt;dcd_ptr: 0x0&lt;BR /&gt;boot_data_ptr: 0x0&lt;BR /&gt;self: 0x0&lt;BR /&gt;csf: 0x0&lt;BR /&gt;reserved2: 0x0&lt;BR /&gt;boot_data.start: 0x0&lt;BR /&gt;boot_data.size: 0x0&lt;BR /&gt;boot_data.plugin: 0x0&lt;BR /&gt;========= IVT HEADER [PLUGIN] =========&lt;BR /&gt;header.tag: 0x0&lt;BR /&gt;header.length: 0x0&lt;BR /&gt;header.version: 0x0&lt;BR /&gt;entry: 0x0&lt;BR /&gt;reserved1: 0x0&lt;BR /&gt;dcd_ptr: 0x0&lt;BR /&gt;boot_data_ptr: 0x0&lt;BR /&gt;self: 0x0&lt;BR /&gt;csf: 0x0&lt;BR /&gt;reserved2: 0x0&lt;BR /&gt;boot_data.start: 0x0&lt;BR /&gt;boot_data.size: 0x0&lt;BR /&gt;boot_data.plugin: 0x0&lt;BR /&gt;========= IVT HEADER [LOADER IMAGE] =========&lt;BR /&gt;header.tag: 0xd1&lt;BR /&gt;header.length: 0x2000&lt;BR /&gt;header.version: 0x41&lt;BR /&gt;entry: 0x920000&lt;BR /&gt;reserved1: 0x0&lt;BR /&gt;dcd_ptr: 0x0&lt;BR /&gt;boot_data_ptr: 0x91ffe0&lt;BR /&gt;self: 0x91ffc0&lt;BR /&gt;csf: 0x95a5c0&lt;BR /&gt;reserved2: 0x0&lt;BR /&gt;boot_data.start: 0x91ffc0&lt;BR /&gt;boot_data.size: 0x3c660&lt;BR /&gt;boot_data.plugin: 0x0&lt;BR /&gt;========= OFFSET dump =========&lt;BR /&gt;Loader IMAGE:&lt;BR /&gt;header_image_off 0x0&lt;BR /&gt;dcd_off 0x0&lt;BR /&gt;image_off 0x40&lt;BR /&gt;csf_off 0x3a600&lt;BR /&gt;spl hab block: 0x91ffc0 0x0 0x3a600&lt;/P&gt;&lt;P&gt;Second Loader IMAGE:&lt;BR /&gt;sld_header_off 0x58000&lt;BR /&gt;sld_csf_off 0x59020&lt;BR /&gt;sld hab block: 0x401fcdc0 0x58000 0x1020&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;According to this I have prepared my csf files:&lt;/STRONG&gt;&lt;BR /&gt;csf_fit.txt&lt;BR /&gt;[Header]&lt;BR /&gt;Version = 4.3&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = CAAM&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;# Index of the key location in the SRK table to be installed&lt;BR /&gt;File = "../../crts/SRK_1_table.bin"&lt;BR /&gt;Source index = 0&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_2048_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_2048_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Authenticate Start Address, Offset, Length and file&lt;BR /&gt;Blocks = 0x401fcdc0 0x58000 0x1020 "flash.bin", \&lt;BR /&gt;0x40200000 0x5B000 0xEF5A0 "flash.bin", \&lt;BR /&gt;0x402EF5A0 0x14A5A0 0xF160 "flash.bin", \&lt;BR /&gt;0x970000 0x159700 0xB146 "flash.bin", \&lt;BR /&gt;0x56000000 0x164848 0x78EF0 "flash.bin"&lt;/P&gt;&lt;P&gt;csf_spl.txt&lt;BR /&gt;[Header]&lt;BR /&gt;Version = 4.3&lt;BR /&gt;Hash Algorithm = sha256&lt;BR /&gt;Engine = CAAM&lt;BR /&gt;Engine Configuration = 0&lt;BR /&gt;Certificate Format = X509&lt;BR /&gt;Signature Format = CMS&lt;/P&gt;&lt;P&gt;[Install SRK]&lt;BR /&gt;# Index of the key location in the SRK table to be installed&lt;BR /&gt;File = "../../crts/SRK_1_table.bin"&lt;BR /&gt;Source index = 0&lt;/P&gt;&lt;P&gt;[Install CSFK]&lt;BR /&gt;# Key used to authenticate the CSF data&lt;BR /&gt;File = "../../crts/CSF1_1_sha256_2048_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate CSF]&lt;/P&gt;&lt;P&gt;[Unlock]&lt;BR /&gt;# Leave Job Ring and DECO master ID registers Unlocked&lt;BR /&gt;Engine = CAAM&lt;BR /&gt;Features = MID&lt;/P&gt;&lt;P&gt;[Install Key]&lt;BR /&gt;# Key slot index used to authenticate the key to be installed&lt;BR /&gt;Verification index = 0&lt;BR /&gt;# Target key slot in HAB key store where key will be installed&lt;BR /&gt;Target index = 2&lt;BR /&gt;# Key to install&lt;BR /&gt;File = "../../crts/IMG1_1_sha256_2048_65537_v3_usr_crt.pem"&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Authenticate Start Address, Offset, Length and file&lt;BR /&gt;Blocks = 0x91ffc0 0x0 0x3a600 "flash.bin"&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;According to these, I have appended the .bin files as follows:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;dd if=csf_spl.bin of=flash.bin seek=$((0x3a600)) bs=1 conv=notrunc&lt;BR /&gt;dd if=csf_fit.bin of=flash.bin seek=$((0x59020)) bs=1 conv=notrunc&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;However, there is an issue with csf_fit.bin generation.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I've edited the soc.mak so that I can use my board's dtb, when I run the ./print_fit_hab.sh I get:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;./../scripts/pad_image.sh tee.bin&lt;BR /&gt;./../scripts/pad_image.sh bl31.bin&lt;BR /&gt;./../scripts/pad_image.sh u-boot-nodtb.bin imx8mp-my-kit.dtb&lt;BR /&gt;u-boot-nodtb.bin + imx8mp-my-kit.dtb are padded to 1042176&lt;BR /&gt;TEE_LOAD_ADDR=0x56000000 ATF_LOAD_ADDR=0x00970000 VERSION=v2 ./print_fit_hab.sh 0x60000 imx8mp-my-kit.dtb&lt;BR /&gt;0x40200000 0x5B000 0xEF5A0&lt;BR /&gt;0x402EF5A0 0x14A5A0 0xF160&lt;BR /&gt;0x970000 0x159700 0xB146&lt;BR /&gt;0x56000000 0x164848 0x78EF0&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Using these values I get the error at csf_fit.bin creations:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[Authenticate Data]&lt;BR /&gt;# Key slot index used to authenticate the image data&lt;BR /&gt;Verification index = 2&lt;BR /&gt;# Authenticate Start Address, Offset, Length and file&lt;BR /&gt;Blocks = 0x401fcdc0 0x58000 0x1020 "flash.bin", \&lt;BR /&gt;0x40200000 0x5B000 0xEF5A0 "flash.bin", \&lt;BR /&gt;0x402EF5A0 0x14A5A0 0xF160 "flash.bin", \&lt;BR /&gt;0x970000 0x159700 0xB146 "flash.bin", \&lt;BR /&gt;0x56000000 0x164848 0x78EF0 "flash.bin"&lt;/P&gt;&lt;P&gt;./cst -i csf_fit.txt -o csf_fit.bin&lt;/P&gt;&lt;P&gt;Invalid Block arguments, Blocks start offset and length together exceed file size in command AuthenticateData&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Also, I still yet to figure out how to generate the IVT and where at the image do I place it.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Dec 2024 16:45:43 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2017347#M232199</guid>
      <dc:creator>KadirY</dc:creator>
      <dc:date>2024-12-19T16:45:43Z</dc:date>
    </item>
    <item>
      <title>Re: I.MX8MP Secure Boot Issues</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2017665#M232216</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/228036"&gt;@KadirY&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you tried to follow up the guide&amp;nbsp;&lt;A href="https://github.com/nxp-imx/uboot-imx/blob/lf_v2024.04/doc/imx/habv4/guides/mx8m_secure_boot.txt" target="_self"&gt;mx8m_secure_boot.txt&lt;/A&gt;&amp;nbsp;for secure boot?&lt;/P&gt;
&lt;P&gt;The one can also be helpful for reference.&amp;nbsp;&lt;A href="https://community.nxp.com/t5/i-MX-Security/i-MX-8MPlus-865-HAB-High-Assurance-Boot/ta-p/1403447" target="_self"&gt;i-MX-8MPlus-865-HAB-High-Assurance-Boot&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Harvey&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 06:24:17 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2017665#M232216</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2024-12-20T06:24:17Z</dc:date>
    </item>
    <item>
      <title>Re: I.MX8MP Secure Boot Issues</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2017684#M232219</link>
      <description>Greetings,&lt;BR /&gt;&lt;BR /&gt;I have been following the guide you have mentioned. There is no guidelines for ivt generation nor the details about the csf files. I get error when at csf_fit.bin generation when I use the dtb of my devboard, so I can't proceed with that. When I remove the "0x56000000 0x164848 0x78EF0 "flash.bin" part, I can get a csf_fit.bin but then again IVT is the main issue for me.&lt;BR /&gt;A quick question, what do csf.bin files include? Do they posses the signatures etc? So far, even at the mx8m_secure_boot.txt, I could not find a specific note about the signature locations.&lt;BR /&gt;Thanks in advance!</description>
      <pubDate>Fri, 20 Dec 2024 07:08:24 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2017684#M232219</guid>
      <dc:creator>KadirY</dc:creator>
      <dc:date>2024-12-20T07:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: I.MX8MP Secure Boot Issues</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2017700#M232221</link>
      <description>&lt;P&gt;Here is the for IVT gen,&amp;nbsp;&lt;A href="https://github.com/nxp-imx/uboot-imx/tree/lf_v2024.04/doc/imx/habv4/script_examples" target="_self"&gt;script_examples&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not quite sure the question about&amp;nbsp;&lt;SPAN&gt;csf.bin, If I'm not wrong to your question, you may refer to the&amp;nbsp;&lt;A href="https://www.nxp.com/webapp/Download?colCode=AN4581&amp;amp;location=null" target="_self"&gt;AN4581&lt;/A&gt;&amp;nbsp; or&amp;nbsp;CST User’s Guide downloading from&amp;nbsp;&lt;A href="https://www.nxp.com/webapp/Download?colCode=IMX_CST_TOOL_NEW&amp;amp;appType=license&amp;amp;location=null" target="_self"&gt;IMX_CST_TOOL_NEW&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Signature location can be obtained from making images.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Harvey&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 07:36:01 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2017700#M232221</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2024-12-20T07:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: I.MX8MP Secure Boot Issues</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2017705#M232223</link>
      <description>Hello,&lt;BR /&gt;There are parameters such as Load Address, Signature and CSF Pointer etc at the ivt script. Load addr is different for my uboot csf so I edited that but, are there any set addresses that shall not be touched? There is signature and pointer addresses?</description>
      <pubDate>Fri, 20 Dec 2024 07:48:32 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2017705#M232223</guid>
      <dc:creator>KadirY</dc:creator>
      <dc:date>2024-12-20T07:48:32Z</dc:date>
    </item>
    <item>
      <title>Re: I.MX8MP Secure Boot Issues</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2017740#M232224</link>
      <description>&lt;P&gt;Sent you email with explanations.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Harvey&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 08:22:47 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2017740#M232224</guid>
      <dc:creator>Harvey021</dc:creator>
      <dc:date>2024-12-20T08:22:47Z</dc:date>
    </item>
    <item>
      <title>Re: I.MX8MP Secure Boot Issues</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2018451#M232275</link>
      <description>&lt;P&gt;Do mkimage tool generated images contain the IVT for the spl+uboot? I've generated the images with "make -f soc.mak SOC=iMX8MP flash_spl_uboot" command.&lt;/P&gt;&lt;P&gt;So far, the log appears at the serial port contains strings from the spl.c and hab.c, i.e.&lt;/P&gt;&lt;P&gt;"/workspace/sources/u-boot-imx/arch/arm/mach-imx/spl.c:444:panic("spl: ERROR: image authentication unsuccessful\n");"&lt;/P&gt;&lt;P&gt;"sources/u-boot-imx/arch/arm/mach-imx/hab.c:866:/* Invalid IVT structure */"&lt;/P&gt;&lt;P&gt;My understanding is that the bootrom has successfully authenticated the spl and spl failed to authenticate the fit image. Is it correct?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Dec 2024 08:39:21 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/I-MX8MP-Secure-Boot-Issues/m-p/2018451#M232275</guid>
      <dc:creator>KadirY</dc:creator>
      <dc:date>2024-12-23T08:39:21Z</dc:date>
    </item>
  </channel>
</rss>

