Description:
I have enabled UEFI Secure Boot on my Jetson Xavier platform and successfully provisioned my own PK, KEK, and db keys using the `fflash.sh --uefi-keys option.
The system boots normally, and efivar shows that SecureBoot is enabled (Value: 01) and SetupMode is disabled (`Value:Value: 00).
However, the firmware still reports “Secure Boot Mode: Standard Mode” and “WARNING: Test Key detected” in the UEFI log.
Even when booting unsigned images (not si
Additionally, the UEFI setup menu does not allow switching from Standard Mode to Custom Mode.
The option appears grCustom Mode.
Steps to Reproduce:
-
Generate PK, KEK, and db keys using OpenSSL.
-
Create
uefi_keys.confand flash using:sudo ./flash.sh --uefi-keys uefi_keys/uefi_keys.conf <target> mmcblk0p1 -
Boot the device and verify Secure Boot status:
efivar -n 8be4df61-93ca-11d2-aa0d-00e098032b8c-SecureBoot efivar -n 8be4df61-93ca-11d2-aa0d-00e098032b8c-SetupMode efi-readvar -
Secure Boot is
Enabled, Setup Mode isDisabled, and custom PK/KEK/db certificates appear correctly. -
Attempt to boot with unsigned
boot.imgor kernel — system still boots successfully. -
UEFI setup menu shows
Secure Boot Mode <Standard Mode>and the warning:** WARNING: Test key detected **
Expected Behavior:
After provisioning custom PK/KEK/db keys and switching out of Setup Mode, the firmware should enter Custom Mode and enforce signature verification — booting should fail for unsigned or untrusted images.
Actual Behavior:
-
Secure Boot remains in Standard Mode.
-
Warning “Test key detected” appears even with custom keys.
-
Unsigned images still boot successfully (no verification failure).
-
Cannot manually switch to Custom Mode in the UEFI configuration interface.
Additional Information:
-
Platform: Jetson Xavier
-
JetPack / L4T version: (e.g., JetPack 5.1.3)
-
Flash command used:
sudo ./flash.sh --uefi-keys uefi_keys/uefi_keys.conf <target> mmcblk0p1 -
Verified efivars:
SecureBoot = 01 SetupMode = 00 -
PK, KEK, and db entries visible under
/sys/firmware/efi/efivars/