Bup file build failed

Hello.

Now, we need to build the bup file on a double partitioned root file system. If you run it, you will get a “File read failed Error: Return value 11” I get a message and creation fails.

I just changed the flash_l4t_t186.xml file, but I don’t know why. Please let me know if there is a solution to this problem.

[flash.xml]
I add APP_b partition

<?xml version="1.0"?>

<!-- Nvidia Tegra Partition Layout Version 1.0.0 -->

<partition_layout version="01.00.0000">
    <device type="sdmmc_boot" instance="3" sector_size="512" num_sectors="16384">
        <partition name="BCT" type="boot_config_table">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 32768 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <description> **Required.** Contains Boot Configuration Table. </description>
        </partition>
        <partition name="MB1NAME" type="MB1TYPE">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 262144 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> MB1FILE </filename>
            <description> **Required.** Slot A; contains NVIDIA signed MB1 binary. </description>
        </partition>
        <partition name="MB1NAME_b" type="MB1TYPE">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 262144 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> MB1FILE </filename>
            <description> **Required.** Slot B; contains NVIDIA signed MB1 binary. </description>
        </partition>
        <partition name="MB1_BCT" type="mb1_boot_config_table">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 65536 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <description> **Required.** Slot A; contains MB1 boot configuration table. </description>
        </partition>
        <partition name="MB1_BCT_b" type="mb1_boot_config_table">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 65536 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <description> **Required.** Slot B; contains MB1 boot configuration table. </description>
        </partition>
        <partition name="DRAMECCNAME" type="DRAMECCTYPE" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 55296 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> DRAMECCFILE </filename>
            <description> **Optional.** Contains DRAM-ECC firmware. </description>
        </partition>
        <partition name="BADPAGENAME" type="BADPAGETYPE" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 4608 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> BADPAGEFILE </filename>
            <description> **Optional.** Slot A; contains badpage firmware. </description>
        </partition>
        <partition name="BADPAGENAME_b" type="BADPAGETYPE" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 4608 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> BADPAGEFILE </filename>
            <description> **Optional.** Slot B; contains badpage firmware. </description>
        </partition>
        <partition name="SPENAME" type="SPETYPE" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 131072 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> SPEFILE </filename>
            <description> **Required.** Slot A; contains BPMP SPE-FW binary. </description>
        </partition>
        <partition name="SPENAME_b" type="SPETYPE" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 131072 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> SPEFILE </filename>
            <description> **Required.** Slot B; contains BPMP SPE-FW binary. </description>
        </partition>
        <partition name="MB2NAME" type="MB2TYPE" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 262144 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> MB2FILE </filename>
            <description> **Required.** Slot A; contains TegraBoot binary. </description>
        </partition>
        <partition name="MB2NAME_b" type="MB2TYPE" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 262144 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> MB2FILE </filename>
            <description> **Required.** Slot B; contains TegraBoot binary. </description>
        </partition>
        <partition name="MPBNAME" type="MPBTYPE" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 262144 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> MPBFILE </filename>
            <description> **Required.** Slot A; contains Denver preboot firmware. </description>
        </partition>
        <partition name="MPBNAME_b" type="MPBTYPE" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 262144 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> MPBFILE </filename>
            <description> **Required.** Slot B; contains Denver preboot firmware. </description>
        </partition>
        <partition name="SMD" type="smd">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 4096 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 0x8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> slot_metadata.bin </filename>
            <description> **Required.** Slot A; contains slot status for A/B boot and A/B
              update. </description>
        </partition>
        <partition name="SMD_b" type="smd">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 4096 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 0x8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> slot_metadata.bin </filename>
            <description> **Required.** Slot B; contains slot status for A/B boot and A/B
              update. </description>
        </partition>
        <partition name="VER_b" type="data">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
	    <size> 65536 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 0x8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> VERFILE </filename>
            <description> **Required.** Contains a redundant copy of BSP version information. </description>
        </partition>
        <partition name="VER" type="data">
            <allocation_policy> sequential </allocation_policy>
	    <filesystem_type> basic </filesystem_type>
            <size> 65536 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 0x8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> VERFILE </filename>
            <description> **Required.** Contains BSP version information. </description>
        </partition>
        <partition name="secondary_gpt" type="secondary_gpt">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 0xFFFFFFFFFFFFFFFF </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <description> **Required.** Contains secondary GPT of the `sdmmc_boot`
              device. </description>
        </partition>
    </device>

    <device type="sdmmc_user" instance="3" sector_size="512" num_sectors="61071360">
        <partition name="master_boot_record" type="protective_master_boot_record">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 512 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <description> **Required.** Contains protective MBR. </description>
        </partition>
        <partition name="primary_gpt" type="primary_gpt">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> PPTSIZE </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <description> **Required.** Contains primary GPT of the `sdmmc_user` device. All
              partitions defined after this entry are configured in the kernel, and are
              accessible by standard partition tools such as gdisk and parted. </description>
        </partition>
        <partition name="APP" type="data">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 5368709120 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 0x8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <align_boundary> 4096 </align_boundary>
            <unique_guid> 9ec0d34a-a8b1-4eff-8dea-7aa4fe81ba08 </unique_guid>
            <filename> APPFILE </filename>
            <description> **Required.** Contains the rootfs. This partition must be defined
              after `primary_GPT` so that it can be accessed as the fixed known special device
              `/dev/mmcblk0p1`. </description>
        </partition>
        <partition name="APP_b" type="data">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 5368709120 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 0x8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <align_boundary> 4096 </align_boundary>
            <unique_guid> 36970dcb-2da8-420f-8a3a-3c2dccbe7fb3 </unique_guid>
            <filename> APPFILE </filename>
            <description> **Required.** Contains the rootfs. This partition must be defined
              after `primary_GPT` so that it can be accessed as the fixed known special device
              `/dev/mmcblk0p1`. </description>
        </partition>
        <partition name="MBPNAME" type="MBPTYPE" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 4194304 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> MBPFILE </filename>
            <description> **Required.** Slot A; contains Denver boot pack firmware. </description>
        </partition>
        <partition name="MBPNAME_b" type="MBPTYPE" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 4194304 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> MBPFILE </filename>
            <description> **Required.** Slot B; contains Denver boot pack firmware. </description>
        </partition>
        <partition name="TBCNAME" type="TBCTYPE" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 524288 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> TBCFILE </filename>
            <description> **Required.** Slot A; contains CBoot, the final boot stage CPU Bootloader
              binary that loads the binary in kernel partition. </description>
        </partition>
        <partition name="TBCNAME_b" type="TBCTYPE" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 524288 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> TBCFILE </filename>
            <description> **Required.** Slot B; contains CBoot, the final boot stage CPU Bootloader
              binary that loads the binary in kernel partition. </description>
        </partition>
        <partition name="TBCDTB-NAME" type="data" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 524288 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> TBCDTB-FILE </filename>
            <description> **Required.** Slot A; contains Bootloader device tree blob (DTB). </description>
        </partition>
        <partition name="TBCDTB-NAME_b" type="data" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 524288 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> TBCDTB-FILE </filename>
            <description> **Required.** Slot B; contains Bootloader device tree blob (DTB). </description>
        </partition>
        <partition name="TOSNAME" type="data" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 3145728 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> TOSFILE </filename>
            <description> **Required.** Slot A; contains the trusted OS. </description>
        </partition>
        <partition name="TOSNAME_b" type="data" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 3145728 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> TOSFILE </filename>
            <description> **Required.** Slot B; contains the trusted OS. </description>
        </partition>
        <partition name="eks" type="data" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 2097152 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> EKSFILE </filename>
            <description> **Optional.** Contains the encrypted keys. </description>
        </partition>
        <partition name="adsp-fw" type="data" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 4194304 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> adsp-fw.bin </filename>
            <description> **Required.** Slot A; contains ADSP software. </description>
        </partition>
        <partition name="adsp-fw_b" type="data" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 4194304 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> adsp-fw.bin </filename>
            <description> **Required.** Slot B; contains ADSP software. </description>
        </partition>
        <partition name="BPFNAME" type="data" oem_sign="BPFSIGN">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 618144 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> BPFFILE </filename>
            <description> **Required.** Slot A; contains BPMP firmware. </description>
        </partition>
        <partition name="BPFNAME_b" type="data" oem_sign="BPFSIGN">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 618144 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> BPFFILE </filename>
            <description> **Required.** Slot B; contains BPMP firmware. </description>
        </partition>
        <partition name="BPFDTB-NAME" type="data" oem_sign="BPMPDTB-SIGN">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 1048576 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> BPFDTB-FILE </filename>
            <description> **Required.** Slot A; contains BPMP firmware device tree blob
              (DTB). </description>
        </partition>
        <partition name="BPFDTB-NAME_b" type="data" oem_sign="BPMPDTB-SIGN">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 1048576 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> BPFDTB-FILE </filename>
            <description> **Required.** Slot B; contains BPMP firmware device tree blob
              (DTB). </description>
        </partition>
        <partition name="SCENAME" type="data" oem_sign="SCESIGN">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 2097152 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> SCEFILE </filename>
            <description> **Required.** Slot A; contains `camera-rtcpu-sce` firmware. </description>
        </partition>
        <partition name="SCENAME_b" type="data" oem_sign="SCESIGN">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 2097152 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> SCEFILE </filename>
            <description> **Required.** Slot B; contains `camera-rtcpu-sce` firmware. </description>
        </partition>
        <partition name="SC7NAME" type="WB0TYPE">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 6291456 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> WB0FILE </filename>
            <description> **Required.** Slot A; contains warm boot binary. </description>
        </partition>
        <partition name="SC7NAME_b" type="WB0TYPE">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 6291456 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> WB0FILE </filename>
            <description> **Required.** Slot B; contains warm boot binary. </description>
        </partition>
        <partition name="FBNAME" type="FBTYPE" oem_sign="FBSIGN">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 2097152 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 0x8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> FBFILE </filename>
            <description> **Optional.** Reserved for future use; removable. </description>
        </partition>
        <partition name="BMP" type="data">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 134217728 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 0x8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> bmp.blob </filename>
            <description> **Optional.** Slot A; contains BMP images for splash screen
              display during boot. </description>
        </partition>
        <partition name="BMP_b" type="data">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 134217728 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 0x8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> bmp.blob </filename>
            <description> **Optional.** Slot B; contains BMP images for splash screen
              display during boot. </description>
        </partition>
        <partition name="RECNAME" type="data" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> RECSIZE </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> RECFILE </filename>
            <description> **Required.** Contains recovery image. </description>
        </partition>
        <partition name="RECDTB-NAME" type="data" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 524288 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> RECDTB-FILE </filename>
            <description> **Required.** Contains recovery DTB image. </description>
        </partition>
        <partition name="BOOTCTRLNAME" type="data">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 262144 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> BOOTCTRL-FILE </filename>
            <description> **Required.** Slot A; contains boot control data. </description>
        </partition>
        <partition name="BOOTCTRLNAME_b" type="data">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 262144 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> BOOTCTRL-FILE </filename>
            <description> **Required.** Slot B; contains boot control data. </description>
        </partition>
        <partition name="LNXNAME" type="data" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> LNXSIZE </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> LNXFILE </filename>
            <description> **Required.** Slot A; contains U-Boot, which loads and launches the kernel
              from the rootfs at `/boot`. </description>
        </partition>
        <partition name="LNXNAME_b" type="data" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> LNXSIZE </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> LNXFILE </filename>
            <description> **Required.** Slot B; contains U-Boot, which loads and launches the kernel
              from the rootfs at `/boot`. </description>
        </partition>
        <partition name="KERNELDTB-NAME" type="data" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 524288 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> KERNELDTB-FILE </filename>
            <description> **Required.** Slot A; contains kernel device tree blob. </description>
        </partition>
        <partition name="KERNELDTB-NAME_b" type="data" oem_sign="true">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 524288 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <filename> KERNELDTB-FILE </filename>
            <description> **Required.** Slot B; contains kernel device tree blob. </description>
        </partition>
        <partition name="RECROOTFS" type="data">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> RECROOTFSSIZE </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 0x8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <description> **Optional.** Reserved for future use by the recovery filesystem;
              removable. </description>
        </partition>
        <partition name="UDA" type="data">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 18432 </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 0x808 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <description> **Required.** Automatically takes all remaining space on the device except that
              occupied by the `secondary_gpt` partition. Allocation attribute must be set to 0x808.
              May be mounted and used to store user data. </description>
        </partition>
        <partition name="secondary_gpt" type="secondary_gpt">
            <allocation_policy> sequential </allocation_policy>
            <filesystem_type> basic </filesystem_type>
            <size> 0xFFFFFFFFFFFFFFFF </size>
            <file_system_attribute> 0 </file_system_attribute>
            <allocation_attribute> 8 </allocation_attribute>
            <percent_reserved> 0 </percent_reserved>
            <description> **Required.** Contains secondary GPT of the `sdmmc_user`
              device. </description>
        </partition>
    </device>
</partition_layout>

[ build log ]

/workspace# BOARDID=3310 FAB=B02 FUSELEVEL=fuselevel_production ./build_l4t_bup.sh jetson-tx2 mmcblk0p1
###############################################################################
# L4T BSP Information:
# R32 , REVISION: 4.2
###############################################################################
Board ID(3310) version(B02) sku() revision()
Copy /workspace/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb to /workspace/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb.rec
copying bctfile(/workspace/bootloader/t186ref/BCT/P3310_A00_8GB_lpddr4_A02_l4t.cfg)... done.
copying misc_config(/workspace/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)... done.
copying pinmux_config(/workspace/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg)... done.
copying pmic_config(/workspace/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg)... done.
copying pmc_config(/workspace/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg)... done.
copying prod_config(/workspace/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg)... done.
copying scr_config(/workspace/bootloader/t186ref/BCT/minimal_scr.cfg)... done.
copying scr_cold_boot_config(/workspace/bootloader/t186ref/BCT/mobile_scr.cfg)... done.
copying bootrom_config(/workspace/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg)... done.
copying dev_params(/workspace/bootloader/t186ref/BCT/emmc.cfg)... done.
Existing bootloader(/workspace/bootloader/nvtboot_cpu.bin) reused.
copying initrd(/workspace/bootloader/l4t_initrd.img)... done.
	populating kernel to rootfs... done.
	populating initrd to rootfs... done.
	populating /workspace/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb to rootfs... done.
Making Boot image... done.
20+0 レコード入力
20+0 レコード出力
20 bytes copied, 0.00020672 s, 96.7 kB/s
Existing sosfile(/workspace/bootloader/mb1_recovery_prod.bin) reused.
copying tegraboot(/workspace/bootloader/t186ref/nvtboot.bin)... done.
Existing cpu_bootloader(/workspace/bootloader/nvtboot_cpu.bin) reused.
Existing mb2blfile(/workspace/bootloader/nvtboot_recovery.bin) reused.
Existing mtspreboot(/workspace/bootloader/preboot_d15_prod_cr.bin) reused.
Existing mts(/workspace/bootloader/mce_mts_d15_prod_cr.bin) reused.
Existing mb1file(/workspace/bootloader/mb1_prod.bin) reused.
Existing bpffile(/workspace/bootloader/bpmp.bin) reused.
copying bpfdtbfile(/workspace/bootloader/t186ref/tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb)... done.
Existing scefile(/workspace/bootloader/camera-rtcpu-sce.img) reused.
Existing spefile(/workspace/bootloader/spe.bin) reused.
Existing drameccfile(/workspace/bootloader/dram-ecc.bin) reused.
Existing badpagefile(/workspace/bootloader/badpage.bin) reused.
copying wb0boot(/workspace/bootloader/t186ref/warmboot.bin)... done.
Existing tosfile(/workspace/bootloader/tos-trusty.img) reused.
Existing eksfile(/workspace/bootloader/eks.img) reused.
copying dtbfile(/workspace/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)... done.
Copying nv_boot_control.conf to rootfs
Skip generating system.img
Existing tbcfile(/workspace/bootloader/cboot.bin) reused.
copying tbcdtbfile(/workspace/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)... done.
copying cfgfile(/workspace/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml... done.
Existing flasher(/workspace/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing flashapp(/workspace/bootloader/tegraflash.py) reused.
./tegraflash.py --bl nvtboot_recovery_cpu.bin --sdram_config P3310_A00_8GB_lpddr4_A02_l4t.cfg --odmdata 0x1090000 --applet mb1_recovery_prod.bin --cmd "sign"  --cfg flash.xml --chip 0x18 --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg  --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb; tlk tos-trusty.img; eks eks.img; bootloader_dtb tegra186-quill-p3310-1000-c03-00-base.dtb"   
saving flash command in /workspace/bootloader/flashcmd.txt
saving Windows flash command to /workspace/bootloader/flash_win.bat
*** Sign and generate BUP... *** 
Signing with zerosbk ...
rollback info is parsed and saved in rollback.bin
pad ZEROs to the end of rollback.bin

Generating signed binaries for 3310-B02---1-0-jetson-tx2-mmcblk0p1 ...
./tegraflash.py --bl nvtboot_recovery_cpu.bin --sdram_config P3310_A00_8GB_lpddr4_A02_l4t.cfg --odmdata 0x1090000 --applet mb1_recovery_prod.bin --cmd "sign" --cfg flash.xml --chip 0x18 --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb; tlk tos-trusty.img; eks eks.img; bootloader_dtb tegra186-quill-p3310-1000-c03-00-base.dtb"
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0139 ] tegrasign_v2 --key None --getmode mode.txt
[   0.0146 ] Assuming zero filled SBK key
[   0.0148 ] 
[   0.0149 ] Generating RCM messages
[   0.0157 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[   0.0164 ] RCM 0 is saved as rcm_0.rcm
[   0.0168 ] RCM 1 is saved as rcm_1.rcm
[   0.0168 ] List of rcm files are saved in rcm_list.xml
[   0.0168 ] 
[   0.0168 ] Signing RCM messages
[   0.0187 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0196 ] Assuming zero filled SBK key
[   0.0230 ] 
[   0.0231 ] Copying signature to RCM mesages
[   0.0239 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[   0.0250 ] 
[   0.0250 ] Parsing partition layout
[   0.0258 ] tegraparser_v2 --pt flash.xml.tmp
[   0.0270 ] 
[   0.0270 ] Creating list of images to be signed
[   0.0277 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[   0.0585 ] 
[   0.0586 ] Generating signatures
[   0.0596 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[   0.0605 ] Assuming zero filled SBK key
[   0.3271 ] 
[   0.3271 ] Generating br-bct
[   0.3282 ] Updating dev and MSS params in BR BCT
[   0.3283 ] tegrabct_v2 --dev_param emmc.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --brbct br_bct.cfg --chip 0x18 0
[   0.3491 ] 
[   0.3491 ] Updating bl info
[   0.3502 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   0.3526 ] 
[   0.3527 ] Updating smd info
[   0.3553 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[   0.3576 ] 
[   0.3576 ] Updating Odmdata
[   0.3586 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x1090000
[   0.3605 ] 
[   0.3605 ] Get Signed section of bct
[   0.3619 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[   0.3632 ] 
[   0.3642 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key
[   0.3651 ] Assuming zero filled SBK key
[   0.3655 ] 
[   0.3655 ] Updating BCT with signature
[   0.3663 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml
[   0.3675 ] 
[   0.3676 ] Generating coldboot mb1-bct
[   0.3693 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[   0.3712 ] MB1-BCT version: 0xf
[   0.3714 ] Packing sdram param for instance[0]
[   0.3922 ] Packing sdram param for instance[1]
[   0.3923 ] Packing sdram param for instance[2]
[   0.3925 ] Packing sdram param for instance[3]

[   0.3927 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg 
[   0.3931 ] Appending platform config data of size :- 3032

[   0.3933 ] Parsing config file :mobile_scr.cfg 
[   0.3935 ] Appending platform config data of size :- 12240

[   0.3943 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg 
[   0.3945 ] Appending platform config data of size :- 24
[   0.3946 ] 
[   0.3946 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg 
[   0.3946 ] Appending platform config data of size :- 672
[   0.3946 ] 
[   0.3946 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg 
[   0.3946 ] Appending platform config data of size :- 64
[   0.3946 ] 
[   0.3946 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg 
[   0.3946 ] Appending platform config data of size :- 1628
[   0.3946 ] 
[   0.3946 ] Updating mb1-bct with firmware information
[   0.3955 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[   0.3963 ] MB1-BCT version: 0xf
[   0.3969 ] 
[   0.3970 ] Updating mb1-bct with storage information
[   0.3977 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   0.3984 ] MB1-BCT version: 0xf
[   0.3990 ] 
[   0.3997 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[   0.4006 ] 
[   0.4015 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[   0.4037 ] 
[   0.4054 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[   0.4063 ] Assuming zero filled SBK key
[   0.4078 ] 
[   0.4095 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[   0.4109 ] 
[   0.4110 ] Generating recovery mb1-bct
[   0.4120 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[   0.4129 ] MB1-BCT version: 0xf
[   0.4131 ] Packing sdram param for instance[0]
[   0.4360 ] Packing sdram param for instance[1]
[   0.4362 ] Packing sdram param for instance[2]
[   0.4364 ] Packing sdram param for instance[3]

[   0.4366 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg 
[   0.4370 ] Appending platform config data of size :- 3032

[   0.4372 ] Parsing config file :minimal_scr.cfg 
[   0.4374 ] Appending platform config data of size :- 12240

[   0.4381 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg 
[   0.4385 ] Appending platform config data of size :- 24
[   0.4385 ] 
[   0.4385 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg 
[   0.4386 ] Appending platform config data of size :- 672
[   0.4386 ] 
[   0.4386 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg 
[   0.4386 ] Appending platform config data of size :- 64
[   0.4386 ] 
[   0.4386 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg 
[   0.4386 ] Appending platform config data of size :- 1628
[   0.4386 ] 
[   0.4386 ] Updating mb1-bct with firmware information
[   0.4396 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[   0.4404 ] MB1-BCT version: 0xf
[   0.4413 ] 
[   0.4413 ] Updating mb1-bct with storage information
[   0.4424 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   0.4433 ] MB1-BCT version: 0xf
[   0.4440 ] 
[   0.4448 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[   0.4455 ] 
[   0.4462 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk
[   0.4471 ] 
[   0.4481 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[   0.4487 ] Assuming zero filled SBK key
[   0.4503 ] 
[   0.4516 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[   0.4525 ] 
[   0.4526 ] Copying signatures
[   0.4534 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   0.5079 ] 
[   0.5090 ] tegraparser_v2 --generategpt --pt flash.xml.bin
[   0.5101 ] 
[   0.5117 ] tegrahost_v2 --chip 0x18 --align nvtboot_recovery.bin
[   0.5126 ] 
[   0.5139 ] tegrahost_v2 --appendsigheader nvtboot_recovery.bin zerosbk
[   0.5157 ] 
[   0.5172 ] tegrasign_v2 --key None --list nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   0.5180 ] Assuming zero filled SBK key
[   0.5213 ] 
[   0.5245 ] tegrahost_v2 --updatesigheader nvtboot_recovery_sigheader.bin.encrypt nvtboot_recovery_sigheader.bin.hash zerosbk
[   0.5268 ] 
[   0.5283 ] tegrahost_v2 --chip 0x18 --align preboot_d15_prod_cr.bin
[   0.5292 ] 
[   0.5301 ] tegrahost_v2 --appendsigheader preboot_d15_prod_cr.bin zerosbk
[   0.5313 ] 
[   0.5324 ] tegrasign_v2 --key None --list preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   0.5333 ] Assuming zero filled SBK key
[   0.5356 ] 
[   0.5369 ] tegrahost_v2 --updatesigheader preboot_d15_prod_cr_sigheader.bin.encrypt preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[   0.5381 ] 
[   0.5392 ] tegrahost_v2 --chip 0x18 --align mce_mts_d15_prod_cr.bin
[   0.5402 ] 
[   0.5412 ] tegrahost_v2 --appendsigheader mce_mts_d15_prod_cr.bin zerosbk
[   0.5499 ] 
[   0.5520 ] tegrasign_v2 --key None --list mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   0.5547 ] Assuming zero filled SBK key
[   0.6094 ] 
[   0.6109 ] tegrahost_v2 --updatesigheader mce_mts_d15_prod_cr_sigheader.bin.encrypt mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[   0.6183 ] 
[   0.6194 ] tegrahost_v2 --chip 0x18 --align bpmp.bin
[   0.6204 ] 
[   0.6213 ] tegrahost_v2 --appendsigheader bpmp.bin zerosbk
[   0.6236 ] 
[   0.6251 ] tegrasign_v2 --key None --list bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   0.6266 ] Assuming zero filled SBK key
[   0.6415 ] 
[   0.6441 ] tegrahost_v2 --updatesigheader bpmp_sigheader.bin.encrypt bpmp_sigheader.bin.hash zerosbk
[   0.6460 ] 
[   0.6470 ] tegrahost_v2 --chip 0x18 --align tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb
[   0.6479 ] 
[   0.6487 ] tegrahost_v2 --appendsigheader tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk
[   0.6513 ] 
[   0.6539 ] tegrasign_v2 --key None --list tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[   0.6556 ] Assuming zero filled SBK key
[   0.6724 ] 
[   0.6741 ] tegrahost_v2 --updatesigheader tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[   0.6760 ] 
[   0.6769 ] tegrahost_v2 --chip 0x18 --align tos-trusty.img
[   0.6778 ] 
[   0.6786 ] tegrahost_v2 --appendsigheader tos-trusty.img zerosbk
[   0.6801 ] 
[   0.6812 ] tegrasign_v2 --key None --list tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key
[   0.6819 ] Assuming zero filled SBK key
[   0.6940 ] 
[   0.6956 ] tegrahost_v2 --updatesigheader tos-trusty_sigheader.img.encrypt tos-trusty_sigheader.img.hash zerosbk
[   0.6969 ] 
[   0.6977 ] tegrahost_v2 --chip 0x18 --align eks.img
[   0.6992 ] 
[   0.7000 ] tegrahost_v2 --appendsigheader eks.img zerosbk
[   0.7010 ] 
[   0.7021 ] tegrasign_v2 --key None --list eks_sigheader.img_list.xml --pubkeyhash pub_key.key
[   0.7029 ] Assuming zero filled SBK key
[   0.7032 ] 
[   0.7046 ] tegrahost_v2 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk
[   0.7059 ] 
[   0.7070 ] tegrahost_v2 --chip 0x18 --align tegra186-quill-p3310-1000-c03-00-base.dtb
[   0.7080 ] 
[   0.7090 ] tegrahost_v2 --appendsigheader tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[   0.7106 ] 
[   0.7118 ] tegrasign_v2 --key None --list tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[   0.7127 ] Assuming zero filled SBK key
[   0.7221 ] 
[   0.7237 ] tegrahost_v2 --updatesigheader tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[   0.7253 ] 
[   0.7265 ] tegrahost_v2 --chip 0x18 --align nvtboot_recovery_cpu.bin
[   0.7276 ] 
[   0.7284 ] tegrahost_v2 --appendsigheader nvtboot_recovery_cpu.bin zerosbk
[   0.7297 ] 
[   0.7307 ] tegrasign_v2 --key None --list nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   0.7315 ] Assuming zero filled SBK key
[   0.7388 ] 
[   0.7410 ] tegrahost_v2 --updatesigheader nvtboot_recovery_cpu_sigheader.bin.encrypt nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[   0.7424 ] 
[   0.7425 ] Copying signed file in /workspace/bootloader/signed
[   0.7846 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /workspace/bootloader/signed/flash.xml.tmp flash.idx
[   0.7854 ] File read failed
[   1.7772 ] 
Error: Return value 11
Command tegraparser_v2 --pt flash.xml.bin --generateflashindex /workspace/bootloader/signed/flash.xml.tmp flash.idx

By the way, if I change the name of the added partition name to “APP” , the build will be successful.

        <partition name="APP" type="data">
        <allocation_policy> sequential </allocation_policy>
        <filesystem_type> basic </filesystem_type>
        <size> 5368709120 </size>
        <file_system_attribute> 0 </file_system_attribute>
        <allocation_attribute> 0x8 </allocation_attribute>
        <percent_reserved> 0 </percent_reserved>
        <align_boundary> 4096 </align_boundary>
        <unique_guid> 9ec0d34a-a8b1-4eff-8dea-7aa4fe81ba08 </unique_guid>
        <filename> APPFILE </filename>
        <description> **Required.** Contains the rootfs. This partition must be defined
          after `primary_GPT` so that it can be accessed as the fixed known special device
          `/dev/mmcblk0p1`. </description>
    </partition>
    <partition name="APP_b" type="data">
        <allocation_policy> sequential </allocation_policy>
        <filesystem_type> basic </filesystem_type>
        <size> 5368709120 </size>
        <file_system_attribute> 0 </file_system_attribute>
        <allocation_attribute> 0x8 </allocation_attribute>
        <percent_reserved> 0 </percent_reserved>
        <align_boundary> 4096 </align_boundary>
        <unique_guid> 36970dcb-2da8-420f-8a3a-3c2dccbe7fb3 </unique_guid>
        <filename> APPFILE </filename>
        <description> **Required.** Contains the rootfs. This partition must be defined
          after `primary_GPT` so that it can be accessed as the fixed known special device
          `/dev/mmcblk0p1`. </description>
    </partition>

change partition name to APP

        <partition name="APP" type="data">
        <allocation_policy> sequential </allocation_policy>
        <filesystem_type> basic </filesystem_type>
        <size> 5368709120 </size>
        <file_system_attribute> 0 </file_system_attribute>
        <allocation_attribute> 0x8 </allocation_attribute>
        <percent_reserved> 0 </percent_reserved>
        <align_boundary> 4096 </align_boundary>
        <unique_guid> 9ec0d34a-a8b1-4eff-8dea-7aa4fe81ba08 </unique_guid>
        <filename> APPFILE </filename>
        <description> **Required.** Contains the rootfs. This partition must be defined
          after `primary_GPT` so that it can be accessed as the fixed known special device
          `/dev/mmcblk0p1`. </description>
    </partition>
    <partition name="APP" type="data">
        <allocation_policy> sequential </allocation_policy>
        <filesystem_type> basic </filesystem_type>
        <size> 5368709120 </size>
        <file_system_attribute> 0 </file_system_attribute>
        <allocation_attribute> 0x8 </allocation_attribute>
        <percent_reserved> 0 </percent_reserved>
        <align_boundary> 4096 </align_boundary>
        <unique_guid> 36970dcb-2da8-420f-8a3a-3c2dccbe7fb3 </unique_guid>
        <filename> APPFILE </filename>
        <description> **Required.** Contains the rootfs. This partition must be defined
          after `primary_GPT` so that it can be accessed as the fixed known special device
          `/dev/mmcblk0p1`. </description>
    </partition>

[build Successful log]

/workspace# BOARDID=3310 FAB=B02 FUSELEVEL=fuselevel_production ./build_l4t_bup.sh jetson-tx2 mmcblk0p1
###############################################################################
# L4T BSP Information:
# R32 , REVISION: 4.2
###############################################################################
Board ID(3310) version(B02) sku() revision()
Copy /workspace/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb to /workspace/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb.rec
copying bctfile(/workspace/bootloader/t186ref/BCT/P3310_A00_8GB_lpddr4_A02_l4t.cfg)... done.
copying misc_config(/workspace/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)... done.
copying pinmux_config(/workspace/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg)... done.
copying pmic_config(/workspace/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg)... done.
copying pmc_config(/workspace/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg)... done.
copying prod_config(/workspace/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg)... done.
copying scr_config(/workspace/bootloader/t186ref/BCT/minimal_scr.cfg)... done.
copying scr_cold_boot_config(/workspace/bootloader/t186ref/BCT/mobile_scr.cfg)... done.
copying bootrom_config(/workspace/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg)... done.
copying dev_params(/workspace/bootloader/t186ref/BCT/emmc.cfg)... done.
Existing bootloader(/workspace/bootloader/nvtboot_cpu.bin) reused.
copying initrd(/workspace/bootloader/l4t_initrd.img)... done.
	populating kernel to rootfs... done.
	populating initrd to rootfs... done.
	populating /workspace/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb to rootfs... done.
Making Boot image... done.
20+0 レコード入力
20+0 レコード出力
20 bytes copied, 0.00021614 s, 92.5 kB/s
Existing sosfile(/workspace/bootloader/mb1_recovery_prod.bin) reused.
copying tegraboot(/workspace/bootloader/t186ref/nvtboot.bin)... done.
Existing cpu_bootloader(/workspace/bootloader/nvtboot_cpu.bin) reused.
Existing mb2blfile(/workspace/bootloader/nvtboot_recovery.bin) reused.
Existing mtspreboot(/workspace/bootloader/preboot_d15_prod_cr.bin) reused.
Existing mts(/workspace/bootloader/mce_mts_d15_prod_cr.bin) reused.
Existing mb1file(/workspace/bootloader/mb1_prod.bin) reused.
Existing bpffile(/workspace/bootloader/bpmp.bin) reused.
copying bpfdtbfile(/workspace/bootloader/t186ref/tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb)... done.
Existing scefile(/workspace/bootloader/camera-rtcpu-sce.img) reused.
Existing spefile(/workspace/bootloader/spe.bin) reused.
Existing drameccfile(/workspace/bootloader/dram-ecc.bin) reused.
Existing badpagefile(/workspace/bootloader/badpage.bin) reused.
copying wb0boot(/workspace/bootloader/t186ref/warmboot.bin)... done.
Existing tosfile(/workspace/bootloader/tos-trusty.img) reused.
Existing eksfile(/workspace/bootloader/eks.img) reused.
copying dtbfile(/workspace/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)... done.
Skip generating system.img
Existing tbcfile(/workspace/bootloader/cboot.bin) reused.
copying tbcdtbfile(/workspace/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)... done.
copying cfgfile(/workspace/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml... done.
Existing flasher(/workspace/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing flashapp(/workspace/bootloader/tegraflash.py) reused.
./tegraflash.py --bl nvtboot_recovery_cpu.bin --sdram_config P3310_A00_8GB_lpddr4_A02_l4t.cfg --odmdata 0x1090000 --applet mb1_recovery_prod.bin --cmd "sign"  --cfg flash.xml --chip 0x18 --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg  --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb; tlk tos-trusty.img; eks eks.img; bootloader_dtb tegra186-quill-p3310-1000-c03-00-base.dtb"   
saving flash command in /workspace/bootloader/flashcmd.txt
saving Windows flash command to /workspace/bootloader/flash_win.bat
*** Sign and generate BUP... *** 
Signing with zerosbk ...
rollback info is parsed and saved in rollback.bin
pad ZEROs to the end of rollback.bin

Generating signed binaries for 3310-B02---1-0-jetson-tx2-mmcblk0p1 ...
./tegraflash.py --bl nvtboot_recovery_cpu.bin --sdram_config P3310_A00_8GB_lpddr4_A02_l4t.cfg --odmdata 0x1090000 --applet mb1_recovery_prod.bin --cmd "sign" --cfg flash.xml --chip 0x18 --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb; tlk tos-trusty.img; eks eks.img; bootloader_dtb tegra186-quill-p3310-1000-c03-00-base.dtb"
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[   0.0122 ] tegrasign_v2 --key None --getmode mode.txt
[   0.0131 ] Assuming zero filled SBK key
[   0.0132 ] 
[   0.0133 ] Generating RCM messages
[   0.0141 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[   0.0150 ] RCM 0 is saved as rcm_0.rcm
[   0.0153 ] RCM 1 is saved as rcm_1.rcm
[   0.0153 ] List of rcm files are saved in rcm_list.xml
[   0.0153 ] 
[   0.0154 ] Signing RCM messages
[   0.0162 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0170 ] Assuming zero filled SBK key
[   0.0206 ] 
[   0.0206 ] Copying signature to RCM mesages
[   0.0230 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[   0.0248 ] 
[   0.0248 ] Parsing partition layout
[   0.0257 ] tegraparser_v2 --pt flash.xml.tmp
[   0.0269 ] 
[   0.0270 ] Creating list of images to be signed
[   0.0278 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[   0.0604 ] 
[   0.0605 ] Generating signatures
[   0.0616 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[   0.0624 ] Assuming zero filled SBK key
[   0.3269 ] 
[   0.3270 ] Generating br-bct
[   0.3280 ] Updating dev and MSS params in BR BCT
[   0.3281 ] tegrabct_v2 --dev_param emmc.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --brbct br_bct.cfg --chip 0x18 0
[   0.3485 ] 
[   0.3486 ] Updating bl info
[   0.3496 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   0.3516 ] 
[   0.3517 ] Updating smd info
[   0.3538 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[   0.3563 ] 
[   0.3564 ] Updating Odmdata
[   0.3579 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x1090000
[   0.3595 ] 
[   0.3595 ] Get Signed section of bct
[   0.3604 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[   0.3614 ] 
[   0.3622 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key
[   0.3631 ] Assuming zero filled SBK key
[   0.3634 ] 
[   0.3635 ] Updating BCT with signature
[   0.3647 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml
[   0.3660 ] 
[   0.3661 ] Generating coldboot mb1-bct
[   0.3669 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[   0.3677 ] MB1-BCT version: 0xf
[   0.3682 ] Packing sdram param for instance[0]
[   0.3880 ] Packing sdram param for instance[1]
[   0.3882 ] Packing sdram param for instance[2]
[   0.3884 ] Packing sdram param for instance[3]

[   0.3885 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg 
[   0.3889 ] Appending platform config data of size :- 3032

[   0.3891 ] Parsing config file :mobile_scr.cfg 
[   0.3893 ] Appending platform config data of size :- 12240

[   0.3898 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg 
[   0.3901 ] Appending platform config data of size :- 24
[   0.3901 ] 
[   0.3901 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg 
[   0.3902 ] Appending platform config data of size :- 672
[   0.3902 ] 
[   0.3902 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg 
[   0.3902 ] Appending platform config data of size :- 64
[   0.3902 ] 
[   0.3902 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg 
[   0.3902 ] Appending platform config data of size :- 1628
[   0.3902 ] 
[   0.3902 ] Updating mb1-bct with firmware information
[   0.3914 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[   0.3925 ] MB1-BCT version: 0xf
[   0.3935 ] 
[   0.3935 ] Updating mb1-bct with storage information
[   0.3945 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   0.3953 ] MB1-BCT version: 0xf
[   0.3960 ] 
[   0.3968 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[   0.3977 ] 
[   0.3985 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[   0.3994 ] 
[   0.4004 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[   0.4019 ] Assuming zero filled SBK key
[   0.4036 ] 
[   0.4053 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[   0.4068 ] 
[   0.4069 ] Generating recovery mb1-bct
[   0.4079 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[   0.4089 ] MB1-BCT version: 0xf
[   0.4091 ] Packing sdram param for instance[0]
[   0.4317 ] Packing sdram param for instance[1]
[   0.4319 ] Packing sdram param for instance[2]
[   0.4321 ] Packing sdram param for instance[3]

[   0.4322 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg 
[   0.4326 ] Appending platform config data of size :- 3032

[   0.4328 ] Parsing config file :minimal_scr.cfg 
[   0.4330 ] Appending platform config data of size :- 12240

[   0.4336 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg 
[   0.4339 ] Appending platform config data of size :- 24
[   0.4339 ] 
[   0.4339 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg 
[   0.4339 ] Appending platform config data of size :- 672
[   0.4340 ] 
[   0.4340 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg 
[   0.4340 ] Appending platform config data of size :- 64
[   0.4340 ] 
[   0.4340 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg 
[   0.4340 ] Appending platform config data of size :- 1628
[   0.4340 ] 
[   0.4340 ] Updating mb1-bct with firmware information
[   0.4362 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[   0.4383 ] MB1-BCT version: 0xf
[   0.4395 ] 
[   0.4395 ] Updating mb1-bct with storage information
[   0.4413 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   0.4422 ] MB1-BCT version: 0xf
[   0.4428 ] 
[   0.4437 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[   0.4445 ] 
[   0.4452 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk
[   0.4461 ] 
[   0.4473 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[   0.4480 ] Assuming zero filled SBK key
[   0.4494 ] 
[   0.4507 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[   0.4519 ] 
[   0.4520 ] Copying signatures
[   0.4529 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   0.5029 ] 
[   0.5041 ] tegraparser_v2 --generategpt --pt flash.xml.bin
[   0.5053 ] 
[   0.5070 ] tegrahost_v2 --chip 0x18 --align nvtboot_recovery.bin
[   0.5079 ] 
[   0.5086 ] tegrahost_v2 --appendsigheader nvtboot_recovery.bin zerosbk
[   0.5096 ] 
[   0.5109 ] tegrasign_v2 --key None --list nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   0.5118 ] Assuming zero filled SBK key
[   0.5156 ] 
[   0.5173 ] tegrahost_v2 --updatesigheader nvtboot_recovery_sigheader.bin.encrypt nvtboot_recovery_sigheader.bin.hash zerosbk
[   0.5198 ] 
[   0.5218 ] tegrahost_v2 --chip 0x18 --align preboot_d15_prod_cr.bin
[   0.5235 ] 
[   0.5251 ] tegrahost_v2 --appendsigheader preboot_d15_prod_cr.bin zerosbk
[   0.5265 ] 
[   0.5279 ] tegrasign_v2 --key None --list preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   0.5289 ] Assuming zero filled SBK key
[   0.5315 ] 
[   0.5331 ] tegrahost_v2 --updatesigheader preboot_d15_prod_cr_sigheader.bin.encrypt preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[   0.5343 ] 
[   0.5354 ] tegrahost_v2 --chip 0x18 --align mce_mts_d15_prod_cr.bin
[   0.5366 ] 
[   0.5377 ] tegrahost_v2 --appendsigheader mce_mts_d15_prod_cr.bin zerosbk
[   0.5442 ] 
[   0.5460 ] tegrasign_v2 --key None --list mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   0.5472 ] Assuming zero filled SBK key
[   0.6019 ] 
[   0.6035 ] tegrahost_v2 --updatesigheader mce_mts_d15_prod_cr_sigheader.bin.encrypt mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[   0.6112 ] 
[   0.6127 ] tegrahost_v2 --chip 0x18 --align bpmp.bin
[   0.6136 ] 
[   0.6145 ] tegrahost_v2 --appendsigheader bpmp.bin zerosbk
[   0.6164 ] 
[   0.6181 ] tegrasign_v2 --key None --list bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   0.6200 ] Assuming zero filled SBK key
[   0.6359 ] 
[   0.6373 ] tegrahost_v2 --updatesigheader bpmp_sigheader.bin.encrypt bpmp_sigheader.bin.hash zerosbk
[   0.6391 ] 
[   0.6402 ] tegrahost_v2 --chip 0x18 --align tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb
[   0.6412 ] 
[   0.6421 ] tegrahost_v2 --appendsigheader tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk
[   0.6446 ] 
[   0.6458 ] tegrasign_v2 --key None --list tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[   0.6466 ] Assuming zero filled SBK key
[   0.6646 ] 
[   0.6660 ] tegrahost_v2 --updatesigheader tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[   0.6678 ] 
[   0.6689 ] tegrahost_v2 --chip 0x18 --align tos-trusty.img
[   0.6701 ] 
[   0.6711 ] tegrahost_v2 --appendsigheader tos-trusty.img zerosbk
[   0.6730 ] 
[   0.6749 ] tegrasign_v2 --key None --list tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key
[   0.6759 ] Assuming zero filled SBK key
[   0.6880 ] 
[   0.6905 ] tegrahost_v2 --updatesigheader tos-trusty_sigheader.img.encrypt tos-trusty_sigheader.img.hash zerosbk
[   0.6919 ] 
[   0.6928 ] tegrahost_v2 --chip 0x18 --align eks.img
[   0.6937 ] 
[   0.6946 ] tegrahost_v2 --appendsigheader eks.img zerosbk
[   0.6955 ] 
[   0.6966 ] tegrasign_v2 --key None --list eks_sigheader.img_list.xml --pubkeyhash pub_key.key
[   0.6974 ] Assuming zero filled SBK key
[   0.6977 ] 
[   0.6992 ] tegrahost_v2 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk
[   0.7005 ] 
[   0.7017 ] tegrahost_v2 --chip 0x18 --align tegra186-quill-p3310-1000-c03-00-base.dtb
[   0.7028 ] 
[   0.7039 ] tegrahost_v2 --appendsigheader tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[   0.7059 ] 
[   0.7073 ] tegrasign_v2 --key None --list tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[   0.7082 ] Assuming zero filled SBK key
[   0.7170 ] 
[   0.7195 ] tegrahost_v2 --updatesigheader tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[   0.7224 ] 
[   0.7240 ] tegrahost_v2 --chip 0x18 --align nvtboot_recovery_cpu.bin
[   0.7251 ] 
[   0.7261 ] tegrahost_v2 --appendsigheader nvtboot_recovery_cpu.bin zerosbk
[   0.7276 ] 
[   0.7289 ] tegrasign_v2 --key None --list nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   0.7300 ] Assuming zero filled SBK key
[   0.7381 ] 
[   0.7411 ] tegrahost_v2 --updatesigheader nvtboot_recovery_cpu_sigheader.bin.encrypt nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[   0.7432 ] 
[   0.7433 ] Copying signed file in /workspace/bootloader/signed
[   0.8302 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /workspace/bootloader/signed/flash.xml.tmp flash.idx
[   0.9810 ] 

signing images succeeded


Creating update payloads for Jetson-3310-B02---1-0-jetson-tx2-mmcblk0p1 board ...
creating bl_and_kernel payload

PARTITION INFO   : signed/bpmp_sigheader.bin.encrypt bpmp-fw 2 0 common; 				signed/camera-rtcpu-sce_sigheader.img.encrypt sce-fw 2 0 common; 				signed/cboot_sigheader.bin.encrypt cpu-bootloader 2 0 common; 				signed/nvtboot_sigheader.bin.encrypt mb2 2 0 common; 				signed/spe_sigheader.bin.encrypt spe-fw 2 0 common; 				signed/tos-trusty_sigheader.img.encrypt secure-os 2 0 common;signed/mb1_prod.bin.encrypt mb1 2 2 common; 				signed/mce_mts_d15_prod_cr_sigheader.bin.encrypt mts-bootpack 2 2 common; 				signed/preboot_d15_prod_cr_sigheader.bin.encrypt mts-preboot 2 2 common; 				signed/warmboot_wbheader.bin.encrypt sc7 2 2 common;multi_signed/3310-B02---1-0-jetson-tx2-mmcblk0p1/tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt bpmp-fw-dtb 2 0 3310-B02---1-0-jetson-tx2-mmcblk0p1;multi_signed/3310-B02---1-0-jetson-tx2-mmcblk0p1/tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt bootloader-dtb 2 0 3310-B02---1-0-jetson-tx2-mmcblk0p1;multi_signed/3310-B02---1-0-jetson-tx2-mmcblk0p1/emmc_bootblob_ver.txt VER 2 0 3310-B02---1-0-jetson-tx2-mmcblk0p1;multi_signed/3310-B02---1-0-jetson-tx2-mmcblk0p1/br_bct_BR_prod.bct BCT 2 2 3310-B02---1-0-jetson-tx2-mmcblk0p1;multi_signed/3310-B02---1-0-jetson-tx2-mmcblk0p1/mb1_cold_boot_bct_MB1_sigheader.bct.encrypt MB1_BCT 2 0 3310-B02---1-0-jetson-tx2-mmcblk0p1;signed/boot_sigheader.img.encrypt kernel 2 0 common;multi_signed/3310-B02---1-0-jetson-tx2-mmcblk0p1/tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt kernel-dtb 2 0 3310-B02---1-0-jetson-tx2-mmcblk0p1

SUCCESS: bl_update_payload created

creating bl payload

PARTITION INFO   : signed/bpmp_sigheader.bin.encrypt bpmp-fw 2 0 common; 				signed/camera-rtcpu-sce_sigheader.img.encrypt sce-fw 2 0 common; 				signed/cboot_sigheader.bin.encrypt cpu-bootloader 2 0 common; 				signed/nvtboot_sigheader.bin.encrypt mb2 2 0 common; 				signed/spe_sigheader.bin.encrypt spe-fw 2 0 common; 				signed/tos-trusty_sigheader.img.encrypt secure-os 2 0 common;signed/mb1_prod.bin.encrypt mb1 2 2 common; 				signed/mce_mts_d15_prod_cr_sigheader.bin.encrypt mts-bootpack 2 2 common; 				signed/preboot_d15_prod_cr_sigheader.bin.encrypt mts-preboot 2 2 common; 				signed/warmboot_wbheader.bin.encrypt sc7 2 2 common;multi_signed/3310-B02---1-0-jetson-tx2-mmcblk0p1/tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt bpmp-fw-dtb 2 0 3310-B02---1-0-jetson-tx2-mmcblk0p1;multi_signed/3310-B02---1-0-jetson-tx2-mmcblk0p1/tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt bootloader-dtb 2 0 3310-B02---1-0-jetson-tx2-mmcblk0p1;multi_signed/3310-B02---1-0-jetson-tx2-mmcblk0p1/emmc_bootblob_ver.txt VER 2 0 3310-B02---1-0-jetson-tx2-mmcblk0p1;multi_signed/3310-B02---1-0-jetson-tx2-mmcblk0p1/br_bct_BR_prod.bct BCT 2 2 3310-B02---1-0-jetson-tx2-mmcblk0p1;multi_signed/3310-B02---1-0-jetson-tx2-mmcblk0p1/mb1_cold_boot_bct_MB1_sigheader.bct.encrypt MB1_BCT 2 0 3310-B02---1-0-jetson-tx2-mmcblk0p1

SUCCESS: bl_only_payload created

creating kernel payload

PARTITION INFO   : signed/boot_sigheader.img.encrypt kernel 2 0 common;multi_signed/3310-B02---1-0-jetson-tx2-mmcblk0p1/tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt kernel-dtb 2 0 3310-B02---1-0-jetson-tx2-mmcblk0p1

SUCCESS: kernel_only_payload created

Payloads saved to "/workspace/bootloader/payloads_t18x/"

hello yasuhiro_yamamoto,

it looks you would like to enable rootfs A/B redundancy,
according to Jetson Xavier NX / AGX Xavier / TX2 Update and Redundancy mention as below,

File system redundancy is disabled by default because only one file system partition (APP) is created.

you may refer to Topic 81097 for the steps to enable A/B redundancy for rootfs.
thanks

hello JerryChang.

Thanks for reply.

Yes, I would like to enable rootfs A/B redundacy.
Your posted Topic 81097 that describe how to select rootfs partition(mmcblk0p1 or mmcblk0p2) in cboot. but I’ve been successful in selecting boot partition.

My problem is that I get an error when building the bup file.

[   0.7846 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /workspace/bootloader/signed/flash.xml.tmp flash.idx
[   0.7854 ] File read failed
[   1.7772 ] 
Error: Return value 11

What does this error indicate? I’m not sure how to resolve this, so I’m just wondering if you have any information that would help.
Thanks

hello yasuhiro_yamamoto,

it looks BUP generation utility currently do not support APP_b partition.
I’ll arrange resources to investigate this internally, will update the status after we come out conclusions.
thanks

hello yasuhiro_yamamoto,

there’s tegraparser_v2 didn’t support very well, it will take long time, about 20sec, to calculate SHA value for APP_b to generate flash.idx;
we would like to check [ 0.7854 ] File read failed errors.
could you please also share your layout file, such as flash_l4t_t186.xml, or /workspace/bootloader/signed/flash.xml.tmp for reference.
thanks

hello JerryChang.

my bootloader/signed/flash.xml.tmp file is this.

flash.xml.tmp.txt (32.0 KB)

hello yasuhiro_yamamoto,

actually, we don’t need the APP/APP_b images in BUP generation,
could you please have a try to remove below line about APPFILE when running BUP generation;
please restore that line when flashing the device.
for example,

<partition name="APP_b" type="data">
<allocation_policy> sequential </allocation_policy>
<filesystem_type> basic </filesystem_type>
<size> 5368709120 </size>
<file_system_attribute> 0 </file_system_attribute>
<allocation_attribute> 0x8 </allocation_attribute>
<percent_reserved> 0 </percent_reserved>
<align_boundary> 4096 </align_boundary>
<unique_guid> 36970dcb-2da8-420f-8a3a-3c2dccbe7fb3 </unique_guid>
-- <filename> APPFILE </filename>
<description> **Required.** Contains the rootfs. This partition must be defined after `primary_GPT` so that it can be accessed as the fixed known special device `/dev/mmcblk0p1`. </description>
</partition>

hell JerryChang.

Using your suggetion code, I’ve succeeded in creating a bup file.
I’m not sure why your suggestion code work well,
but I would replace code when building bup file.

thanks.

hello yasuhiro_yamamoto,

may I know your exact size of system.img; suppose it’s related to systme.img may be too larger, then cause the “File read failed”;
since we don’t need the APP/APP_b images when running BUP generation, you may simply skip that as workaround.

due to above,
we have changes to not calculate SHA values for APP partition, just skip APP_b also due to rootfs A/B support,
please expect next JetPack public release (i.e. JetPack-4.5) will include this fix,
thanks

1 Like

hello JerryChang

may I know your exact size of system.img

The size of my system.img is as follows.

ls -la bootloader/system.img*
-rwxr-xr-x  1 root root  2258104052  7月 13 17:51 system.img
-rwxr-xr-x  1 root root  5368709120  7月 13 17:50 system.img.raw

I expect next release !

thank you