Hi,
Below are the list to check on the jetson agx xavier secure boot System.
Components That Can Still Be Updated After Fuses Are Burned
-
Linux Kernel (Image or zImage)
-
Can be updated as long as the new kernel is signed with the same OEM private key.
-
Kernel modules (.ko) can also be updated if they are signed (if kernel module verification is enabled).
-
Root Filesystem (rootfs)
-
Can be updated freely if not encrypted.
-
If dm-verity or full disk encryption (FDE) is enabled, updates must follow their integrity policies.
-
Device Tree (dtb)
-
Can be updated if signed with the same OEM key.
-
Kernel Command Line Parameters (bootargs)
-
Can be updated if the bootloader allows modifying them.
-
If “secure boot with rollback protection” is enabled, updates must be signed.
-
Userspace Applications (/usr/bin, /lib, etc.)
-
Can be updated like any Linux system.
Components That Cannot Be Updated After Fuses Are Burned
-
Bootloader (MB1, MB2, cboot, UEFI)
-
Cannot be modified unless a signed update is provided .
-
If rollback protection is enabled, the bootloader will reject updates with an older version number.
-
Secure Boot Key Hash (OEM Public Key)
-
Permanent once burned (prevents key replacement).
-
SBK Key (if using encrypted boot)
-
Irreversible and locks down encrypted boot process.
-
Rollback Counter (if enabled)
-
Enforced at boot time to prevent downgrades to vulnerable firmware.
’
How can we verify this on secure boot agx xavier system?
Please provide the related document and detailed information on this.
Thanks!