Hello,
We're looking at shipping our product with secure boot enabled by default, and checking legal obligations.
In particular, the GPL requires user to be able to modify the software, so we're thinking of doing like android: allow disabling secure boot (and wipe all storage when we do so). Ideally we'd like to allow re-enabling as well later but this is not mandatory.
But looking at the documentations I don't see anything that'd permit such disabling.
(I've seen ahab_return_lifecycle, but nothing mentions this command in the security reference manual (or normal manual), nor uboot docs, but it requires a signed message and I'm not even sure it's appropriate in this context)
Is there a way to toggle this?
Or would we have to provide the user with a uboot that doesn't check kernel signatures or something like that?
Thanks
解決済! 解決策の投稿を見る。
secure boot which is fused can't be disabled. images after SPL can be configured to not be verified.
Regards
Harvey
secure boot which is fused can't be disabled. images after SPL can be configured to not be verified.
Regards
Harvey