currently I am running these command to successfully flash a jetson orin nano super, with a signed bootloader, rootfs encryption as well as a/b boot enabled:
However, when I add the uefi_keys.conf file to the command after generating the UefiDefaultSecurityKeys.dtbo - I get the following error in the serial console:
…��I/TC: Reserved shared memory is disabledI/TC: Dynamic shared memory is
enabledI/TC: Normal World virtualization support is disabledI/TC: Asynchronous
notifications are disabled��L4TLauncher: Attempting Recovery Boot��E/TA:
decrypt_image:99 TEE_InvokeTACommand failed with res = 0xffff0006E/TA:
decrypt_image:99 TEE_InvokeTACommand failed with res = 0xffff0007E/TA:
decrypt_image:99 TEE_InvokeTACommand failed with res = 0xffff0007E/TA:
decrypt_image:99 TEE_InvokeTACommand failed with res = 0xffff0007E/TA:
decrypt_image:99 TEE_InvokeTACommand failed with res = 0xffff0007E/TA:
decrypt_image:99 TEE_InvokeTACommand failed with res = 0xffff0007E/TA:
decrypt_image:99 TEE_InvokeTACommand failed with res = 0xffff0007E/TA:
decrypt_image:99 TEE_InvokeTACommand failed with res = 0xffff0007E/TA:
decrypt_image:99 TEE_InvokeTACommand failed with res = 0xffff0007E/TA:
decrypt_image:99 TEE_InvokeTACommand failed with res = 0xffff0007E/TA:
decrypt_image:99 TEE_InvokeTACommand failed with res = 0xffff0007E/TA:
decrypt_image:99 TEE_InvokeTACommand failed with res = 0xffff0007E/TA:
decrypt_image:99 TEE_InvokeTACommand failed with res = 0xffff0007UEFI
Interactive Shell v2.2
EDK II
UEFI v2.70 (EDK II, 0x00010000)
Mapping table
FS2: Alias(s):HD2b:;BLK1:….
The device will boot into the Boot Shell. These are the used flashing commands:
*** Please note that this reply is generated by LLM automatically ***
Based on the provided context, it appears that you are trying to flash a Jetson Orin Nano Super with a signed bootloader, rootfs encryption, and A/B boot enabled, using the flash.sh command. However, when you add the uefikeys.conf file to the command, you encounter an error in the serial console, causing the device to boot into the Boot Shell.
To troubleshoot this issue, let’s break down the flashing commands and the error message:
The device boots into the Boot Shell, indicating a failure in the flashing process.
Comparing the flashing commands, we can see that the first command uses the flash.sh script, while the subsequent commands use the l4t_initrd_flash.sh script. The uefikeys.conf file is not mentioned in the first command, but it is likely being used in the subsequent commands.
To resolve the issue, you can try the following:
Verify that the uefikeys.conf file is correctly generated and formatted.
Check that the UefiDefaultSecurityKeys.dtbo file is correctly generated and formatted.
Ensure that the uefikeys.conf file is being used correctly in the flashing commands.
Try removing the uefikeys.conf file from the flashing commands and see if the device boots successfully.
If the device boots successfully without the uefikeys.conf file, try re-generating the UefiDefaultSecurityKeys.dtbo file and re-adding the uefikeys.conf file to the flashing commands.
Additionally, you can refer to the Jetson Linux Developer Guide for more information on configuring UEFI secure boot and using the uefikeys.conf file.
In comparison to other similar issues, such as the one mentioned in the context (“[Orin Nano NVME] SKU 003 Enable UEFI secure boot by OTA from 35.5.0 to 35.6.0”), it appears that the issue is specific to the use of the uefikeys.conf file and the flashing commands. Therefore, the solution will likely involve modifying the flashing commands or the uefikeys.conf file to resolve the issue.
*** Please give the thumbs up if you get answers you like. Or provide feedback to help us improve the answer. ***
I can only repeat myself.. just like in my last request:
Unfortunately I think the LLM is hallucinating or not reading correctly.
“first command uses the flash.sh" → not true
I think answers from llms should be reviewed by internal staff before posting. Making the end user reviewing it is not the right approach. The answer does not give any new information or hints on the issue at hand.
I am just guessing, but I can see that in your tests, you didn’t fuse the board before. So maybe fusing does not work in combination with UEFI Secureboot + Disk Encryption + Rootfs-AB?
Or there might be a Bug in Version 36.4.4? Thats the version I am using.
Tested with an unfused board and repeatet the steps (using the default oem1key for the eks image. And got the same result. So it must have todo with me creating the wrong uefi keys.
L4TLauncher cannot detect whether UEFI payload encryption is enabled.
if the EKS contains the UEFI payload encryption key and UEFI secure boot is enabled, L4TLauncher will assume that UEFI payload encryption is enabled and will attempt to decrypt the UEFI payloads.
let’s provide UEFI variable authentication key (auth_t234.key) to re-create EKS image.
otherwise UEFI will block the booting.