Hi NXP team,
I enable secure boot support on i.MX6UL based custom board and use software programming mechanism to program the ZMK value.
No HAB event is found during the boot process.
After that, I program the SEC_CONFIG[1] fuse bit to close the device.
ZMK is automatically zeroized and ZMK-WSL is set to 1 when the security violation is triggered.
The signed U-Boot image and the signed Linux Kernel image can no longer be burned to the device using UUU in either internal boot mode or serial download mode.
How do I clear the ZMK-WSL with a "system reset"?
I found a similar "unlock ZMK_WSL" issue in the forum.
For closed devices, Unlock SNVS ZMK WRITE command should be added in the CSF file.
In CSF file, after [Authenticate CSF], before [Authenticate Data], add below command.
[Unlock]
Engine = SNVS
Features = ZMK WRITE
Do I only need to add unlock command to be able to reconfigure ZMK?
Should this unlock command be added in the CSF file for U-Boot and the CSF file for Linux Kernel?
The burning procedure is locked in the following figure.

Is there any way to burn images to the device again after recovering tamper events?
I have attached my current U-Boot CSF file, zImage CSF file, and UUU script.
Please check the attachment to confirm if there are any wrong steps.
It's appreciated if you could give me some suggestions to resolve this issue.