Download and decompressedk2-nvidia-202406.0.tar.gz
copy file uefi_Jetson_RELEASE.bin to Linux_for_Tegra/bootloader/uefi_jetson.bin
Flash QSPI: ./flash.sh -c bootloader/generic/cfg/flash_t234_qspi.xml $BOARD nvme0n1p1
Then the device fails to start. The serial port log is as follows:
@ WayneWWW
Hi, I downloaded the SDK for R36.4.0, copied Linux_for_Tegra/bootloader/uefi_jetson.bininto my current directory, and then re-burned QSPI, but this problem still occurs
This is the serial port printed version information: Jetson UEFI firmware (version 36.4.0-gcid-37537400 built on 2024-09-13T04:02:39+00:00)
This is the serial port log of the error:
I/TC: Reserved shared memory is disabled
I/TC: Dynamic shared memory is enabled
I/TC: Normal World virtualization support is disabled
I/TC: Asynchronous notifications are disabled
I/TC: WARNING: Test UEFI variable auth key is being used !
I/TC: WARNING: UEFI variable protection is not fully enabled !
ASSERT [FvbNorFlashStandaloneMm] /out/nvidia/optee.t234-uefi/StandaloneMmOptee_RELEASE/edk2-nvidia/Silicon/NVIDIA/Drivers/FvbNorFlashDxe/FvbNorFlashStandaloneMm.c(937): ((BOOLEAN)(0==1))
I copied uefi_jetson.bin to R36.3 and then full flash
Can I just update BSP. and leave rootfs, ota_tools, and public_sources unchanged, since I made a lot of changes
Or Can I modify this to solve this problem?
I> Task: Bootchain failure check
I> Current Boot-Chain Slot: 0
I> BR-BCT Boot-Chain is 0, and status is 1. Set UPDATE_BRBCT bit to 0
I> Task: Burn RESERVED_ODM0 fuse
I> Task: Lock fusing
I> Task: Clear dec source key
I> MB2 finished
?OTICE: BL31: v2.8(release):V2.0.7-6-gf463dc0-dirty
NOTICE: BL31: Built : 11:11:36, Nov 14 2024
I/TC:
I/TC: Non-secure external DT found
I/TC: OP-TEE version: 3.22 (gcc version 11.3.0 (Buildroot 2022.08)) #2 Thu Nov 14 06:07:55 UTC 2024 aarch64
I/TC: WARNING: This OP-TEE configuration might be insecure!
I/TC: WARNING: Please check https://optee.readthedocs.io/en/latest/architecture/porting_guidelines.html
I/TC: Primary CPU initializing
I/TC: Test OEM keys are being used. This is insecure for shipping products!
I/TC: Primary CPU switching to normal world boot
Unhandled Exception from EL1
x0 = 0xbe079bff9347c86a
x1 = 0xd2ef6f3ad7dac5cf
x2 = 0x00000000000f4240
x3 = 0x0000000081000000
x4 = 0x0000000000000001
x5 = 0x00000000be1ead38
x6 = 0xffffffffffffffff
x7 = 0x00000000be261ef0
x8 = 0x0000000000000020
I see that the problem with this ASSERT is due to variable integrity check failures, possibly caused by write operations. Can I get around this problem by mounting efivars as read-only?