Hello,
I tried to configure max77620 register CNFGBBC, so on startup there is other value than 0x41, but looks like it isn’t enough just to write lines from this thread [Primary battery for RTC for Jetson TX2 - #7 by vucvic ] and flash Jetson TX2.
Do you have any suggestions?
What’s the command to flash the device?
Hello @ShaneCCC ,
The command we use is
./flash.sh -k kernel jetson-tx2 mmcblk0p1
Do you know the solution?
Best regards
For applying the cfg file you need to flash whole system without -k
sudo ./flash.sh -r jetson-tx2 mmcblk0p1
vucvic
May 27, 2020, 12:29pm
6
Hi @ShaneCCC ,
We did it but the results weren’t as expected. It’s still old register value.
We are using JetPack 3.1, maybe there are some improvements in the newer version regarding this question.
Best regards
You may need to confirm if modify the right file in …/Linux_for_Tegra/bootloader/t186ref/BCT/
Hello @ShaneCCC ,
Yes, it’s the right path.
When we modified the c03 file (our board revision), and flashed it using your command, we didn’t get any results, but after we changed all c00 - c04 files and used your command, it worked.
Is there a way to change this configuration file, without full flashing? Maybe a command just to update a given (bootloader) partition?
We don’t want to flash the entire file system.
Best regards
Sorry to tell current don’t have method instead of flash full system.
Could you confirm again the -k kernel after modify the right file.
Hi,
can you please try with below command to update mb1-bct:
sudo ./flash.sh -r --sign jetson-tx2 mmcblk0p1
sudo ./flash.sh -r -k MB1_BCT --image ./bootloader/signed/mb1_cold_boot_bct_MB1_sigheader.bct.encrypt jetson-tx2 mmcblk0p1
vucvic
June 4, 2020, 9:16am
14
@ShaneCCC ,
Yes we tried to flash with -k and didn’t have any results
@jburman ,
this command flashes the entire filesystem
result of this command is :
Update :MB1_BCT is not supported.
Is there a way to unlock a bootloader partition update?
Best regards
It appears to work for me with L4T 32.4.2 running:
./flash.sh -k MB1_BCT jetson-custom mmcblk0p1
Try without the -r
and the --image ...
arguments to see if you can make it work.
root:/projects/jetson-custom/Linux_for_Tegra_R32.4.2# ./flash.sh -k MB1_BCT jetson-custom mmcblk0p1
##########################################################################
# L4T BSP Information:
# R32 , REVISION: 4.2
##########################################################################
# Target Board Information:
# Name: jetson-custom, Board Family: t186ref, SoC: Tegra 186,
# OpMode: production, Boot Authentication: NS,
##########################################################################
./tegraflash.py --chip 0x18 --applet “/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/mb1_recovery_prod.bin” --skipuid --cmd “dump eeprom boardinfo cvm.bin”
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0039 ] Generating RCM messages
[ 0.0059 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm /projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/mb1_recovery_prod.bin 0 0
[ 0.0080 ] RCM 0 is saved as rcm_0.rcm
[ 0.0098 ] RCM 1 is saved as rcm_1.rcm
[ 0.0098 ] List of rcm files are saved in rcm_list.xml
[ 0.0098 ]
[ 0.0098 ] Signing RCM messages
[ 0.0123 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0147 ] Assuming zero filled SBK key
[ 0.0239 ]
[ 0.0240 ] Copying signature to RCM mesages
[ 0.0256 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[ 0.0282 ]
[ 0.0283 ] Boot Rom communication
[ 0.0305 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml --skipuid
[ 0.0327 ] RCM version 0X180001
[ 0.0941 ] Boot Rom communication completed
[ 1.1003 ]
[ 2.1032 ] tegrarcm_v2 --isapplet
[ 2.1058 ] Applet version 01.00.0000
[ 2.1683 ]
[ 2.1707 ] Retrieving EEPROM data
[ 2.1709 ] tegrarcm_v2 --oem platformdetails eeprom cvm /projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/cvm.bin
[ 2.1730 ] Applet version 01.00.0000
[ 2.2505 ] Saved platform info in /projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/cvm.bin
[ 2.3232 ]
Board ID(3310) version(D00) sku(1000) revision(E.0)
Copy /projects/jetson-custom/Linux_for_Tegra_R32.4.2/kernel/dtb/tegra186-jetson-custom-p9999-0000.dtb to /projects/jetson-custom/Linux_for_Tegra_R32.4.2/kernel/dtb/tegra186-jetson-custom-p9999-0000.dtb.rec
copying bctfile(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/t186ref/BCT/P3310_A00_8GB_lpddr4_A02_l4t.cfg)… done.
copying misc_config(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)… done.
copying pinmux_config(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-jetson-custom-p9999-0000.cfg)… done.
copying pmic_config(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-jetson-custom-p9999-0000.cfg)… done.
copying pmc_config(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-jetson-custom-p9999-0000.cfg)… done.
copying prod_config(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg)… done.
copying scr_config(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/t186ref/BCT/minimal_scr.cfg)… done.
copying scr_cold_boot_config(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/t186ref/BCT/mobile_scr.cfg)… done.
copying bootrom_config(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg)… done.
copying dev_params(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/t186ref/BCT/emmc.cfg)… done.
Existing bootloader(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/nvtboot_cpu.bin) reused.
copying initrd(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/l4t_initrd.img)… done.
populating kernel to rootfs… done.
populating initrd to rootfs… done.
populating /projects/jetson-custom/Linux_for_Tegra_R32.4.2/sources/kernel/kernel-4.9/arch/arm64/boot/dts/tegra186-jetson-custom-p9999-0000.dtb to rootfs… done.
Making Boot image… done.
20+0 records in
20+0 records out
20 bytes copied, 0.00021852 s, 91.5 kB/s
Existing sosfile(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/mb1_recovery_prod.bin) reused.
copying tegraboot(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/t186ref/nvtboot.bin)… done.
Existing cpu_bootloader(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/nvtboot_cpu.bin) reused.
Existing mb2blfile(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/nvtboot_recovery.bin) reused.
Existing mtspreboot(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/preboot_d15_prod_cr.bin) reused.
Existing mts(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/mce_mts_d15_prod_cr.bin) reused.
Existing mb1file(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/mb1_prod.bin) reused.
Existing bpffile(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/bpmp.bin) reused.
copying bpfdtbfile(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/t186ref/tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb)… done.
Existing scefile(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/camera-rtcpu-sce.img) reused.
Existing spefile(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/spe.bin) reused.
Existing drameccfile(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/dram-ecc.bin) reused.
Existing badpagefile(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/badpage.bin) reused.
copying wb0boot(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/t186ref/warmboot.bin)… done.
Existing tosfile(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/tos-trusty.img) reused.
Existing eksfile(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/eks.img) reused.
copying dtbfile(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/sources/kernel/kernel-4.9/arch/arm64/boot/dts/tegra186-jetson-custom-p9999-0000.dtb)… done.
Copying nv_boot_control.conf to rootfs
Existing tbcfile(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/cboot.bin) reused.
copying tbcdtbfile(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/sources/kernel/kernel-4.9/arch/arm64/boot/dts/tegra186-jetson-custom-p9999-0000.dtb)… done.
copying cfgfile(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml… done.
Existing flasher(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing flashapp(/projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/tegraflash.py) reused.
*** Updating [MB1_BCT] with signed/mb1_cold_boot_bct_MB1_sigheader.bct.encrypt ***
./tegraflash.py --bl nvtboot_recovery_cpu.bin --chip 0x18 --applet mb1_recovery_prod.bin --sdram_config P3310_A00_8GB_lpddr4_A02_l4t.cfg --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-jetson-custom-p9999-0000.cfg --pmic_config tegra186-mb1-bct-pmic-jetson-custom-p9999-0000.cfg --pmc_config tegra186-mb1-bct-pad-jetson-custom-p9999-0000.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg --cfg flash.xml --bins “mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb; tlk tos-trusty.img; eks eks.img; bootloader_dtb tegra186-jetson-custom-p9999-0000.dtb” --odmdata 0x1090000 --cmd “sign; write MB1_BCT signed/mb1_cold_boot_bct_MB1_sigheader.bct.encrypt; reboot”
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0113 ] tegrasign_v2 --key None --getmode mode.txt
[ 0.0132 ] Assuming zero filled SBK key
[ 0.0136 ]
[ 0.0138 ] Generating RCM messages
[ 0.0156 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[ 0.0175 ] RCM 0 is saved as rcm_0.rcm
[ 0.0182 ] RCM 1 is saved as rcm_1.rcm
[ 0.0184 ] List of rcm files are saved in rcm_list.xml
[ 0.0184 ]
[ 0.0184 ] Signing RCM messages
[ 0.0200 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0212 ] Assuming zero filled SBK key
[ 0.0248 ]
[ 0.0249 ] Copying signature to RCM mesages
[ 0.0271 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[ 0.0297 ]
[ 0.0298 ] Parsing partition layout
[ 0.0327 ] tegraparser_v2 --pt flash.xml.tmp
[ 0.0361 ]
[ 0.0362 ] Creating list of images to be signed
[ 0.0390 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[ 0.0731 ]
[ 0.0732 ] Generating signatures
[ 0.0754 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[ 0.0775 ] Assuming zero filled SBK key
[ 0.2915 ]
[ 0.2916 ] Generating br-bct
[ 0.2943 ] Updating dev and MSS params in BR BCT
[ 0.2945 ] tegrabct_v2 --dev_param emmc.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --brbct br_bct.cfg --chip 0x18 0
[ 0.3153 ]
[ 0.3153 ] Updating bl info
[ 0.3173 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[ 0.3212 ]
[ 0.3212 ] Updating smd info
[ 0.3230 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[ 0.3254 ]
[ 0.3255 ] Updating Odmdata
[ 0.3274 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x1090000
[ 0.3291 ]
[ 0.3292 ] Get Signed section of bct
[ 0.3304 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[ 0.3327 ]
[ 0.3347 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key
[ 0.3365 ] Assuming zero filled SBK key
[ 0.3371 ]
[ 0.3372 ] Updating BCT with signature
[ 0.3392 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml
[ 0.3415 ]
[ 0.3416 ] Generating coldboot mb1-bct
[ 0.3433 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-jetson-custom-p9999-0000.cfg --pmc tegra186-mb1-bct-pad-jetson-custom-p9999-0000.cfg --pmic tegra186-mb1-bct-pmic-jetson-custom-p9999-0000.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 0.3452 ] MB1-BCT version: 0xf
[ 0.3454 ] Packing sdram param for instance[0]
[ 0.3790 ] Packing sdram param for instance[1]
[ 0.3796 ] Packing sdram param for instance[2]
[ 0.3802 ] Packing sdram param for instance[3]
[ 0.3807 ]
[ 0.3808 ] Parsing config file :tegra186-mb1-bct-pinmux-jetson-custom-p9999-0000.cfg
[ 0.3808 ] Appending platform config data of size :- 4088
[ 0.3808 ]
[ 0.3808 ] Parsing config file :mobile_scr.cfg
[ 0.3808 ] Appending platform config data of size :- 12240
[ 0.3808 ]
[ 0.3808 ] Parsing config file :tegra186-mb1-bct-pad-jetson-custom-p9999-0000.cfg
[ 0.3809 ] Appending platform config data of size :- 24
[ 0.3809 ]
[ 0.3809 ] Parsing config file :tegra186-mb1-bct-pmic-jetson-custom-p9999-0000.cfg
[ 0.3809 ] Appending platform config data of size :- 672
[ 0.3809 ]
[ 0.3809 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg
[ 0.3809 ] Appending platform config data of size :- 64
[ 0.3810 ]
[ 0.3810 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 0.3810 ] Appending platform config data of size :- 1628
[ 0.3810 ]
[ 0.3811 ] Updating mb1-bct with firmware information
[ 0.3830 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 0.3858 ] MB1-BCT version: 0xf
[ 0.3866 ]
[ 0.3866 ] Updating mb1-bct with storage information
[ 0.3886 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 0.3906 ] MB1-BCT version: 0xf
[ 0.3913 ]
[ 0.3932 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[ 0.3952 ]
[ 0.3972 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[ 0.3994 ]
[ 0.4020 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 0.4040 ] Assuming zero filled SBK key
[ 0.4078 ]
[ 0.4101 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[ 0.4126 ]
[ 0.4128 ] Generating recovery mb1-bct
[ 0.4147 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-jetson-custom-p9999-0000.cfg --pmc tegra186-mb1-bct-pad-jetson-custom-p9999-0000.cfg --pmic tegra186-mb1-bct-pmic-jetson-custom-p9999-0000.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 0.4168 ] MB1-BCT version: 0xf
[ 0.4172 ] Packing sdram param for instance[0]
[ 0.4509 ] Packing sdram param for instance[1]
[ 0.4514 ] Packing sdram param for instance[2]
[ 0.4518 ] Packing sdram param for instance[3]
[ 0.4523 ] Parsing config file :tegra186-mb1-bct-pinmux-jetson-custom-p9999-0000.cfg
[ 0.4529 ] Appending platform config data of size :- 4088
[ 0.4529 ]
[ 0.4529 ] Parsing config file :minimal_scr.cfg
[ 0.4529 ] Appending platform config data of size :- 12240
[ 0.4529 ]
[ 0.4529 ] Parsing config file :tegra186-mb1-bct-pad-jetson-custom-p9999-0000.cfg
[ 0.4529 ] Appending platform config data of size :- 24
[ 0.4529 ]
[ 0.4529 ] Parsing config file :tegra186-mb1-bct-pmic-jetson-custom-p9999-0000.cfg
[ 0.4530 ] Appending platform config data of size :- 672
[ 0.4530 ]
[ 0.4530 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg
[ 0.4530 ] Appending platform config data of size :- 64
[ 0.4530 ]
[ 0.4530 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 0.4530 ] Appending platform config data of size :- 1628
[ 0.4530 ]
[ 0.4531 ] Updating mb1-bct with firmware information
[ 0.4549 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 0.4566 ] MB1-BCT version: 0xf
[ 0.4576 ]
[ 0.4576 ] Updating mb1-bct with storage information
[ 0.4591 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 0.4608 ] MB1-BCT version: 0xf
[ 0.4615 ]
[ 0.4631 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[ 0.4650 ]
[ 0.4667 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk
[ 0.4687 ]
[ 0.4704 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 0.4720 ] Assuming zero filled SBK key
[ 0.4759 ]
[ 0.4779 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[ 0.4799 ]
[ 0.4801 ] Copying signatures
[ 0.4822 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[ 0.5159 ]
[ 0.5180 ] tegraparser_v2 --generategpt --pt flash.xml.bin
[ 0.5207 ]
[ 0.5245 ] tegrahost_v2 --chip 0x18 --align nvtboot_recovery.bin
[ 0.5267 ]
[ 0.5289 ] tegrahost_v2 --appendsigheader nvtboot_recovery.bin zerosbk
[ 0.5313 ]
[ 0.5340 ] tegrasign_v2 --key None --list nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 0.5360 ] Assuming zero filled SBK key
[ 0.5404 ]
[ 0.5430 ] tegrahost_v2 --updatesigheader nvtboot_recovery_sigheader.bin.encrypt nvtboot_recovery_sigheader.bin.hash zerosbk
[ 0.5457 ]
[ 0.5477 ] tegrahost_v2 --chip 0x18 --align preboot_d15_prod_cr.bin
[ 0.5499 ]
[ 0.5519 ] tegrahost_v2 --appendsigheader preboot_d15_prod_cr.bin zerosbk
[ 0.5547 ]
[ 0.5573 ] tegrasign_v2 --key None --list preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 0.5594 ] Assuming zero filled SBK key
[ 0.5641 ]
[ 0.5670 ] tegrahost_v2 --updatesigheader preboot_d15_prod_cr_sigheader.bin.encrypt preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[ 0.5698 ]
[ 0.5720 ] tegrahost_v2 --chip 0x18 --align mce_mts_d15_prod_cr.bin
[ 0.5744 ]
[ 0.5767 ] tegrahost_v2 --appendsigheader mce_mts_d15_prod_cr.bin zerosbk
[ 0.5884 ]
[ 0.5913 ] tegrasign_v2 --key None --list mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 0.5934 ] Assuming zero filled SBK key
[ 0.6470 ]
[ 0.6497 ] tegrahost_v2 --updatesigheader mce_mts_d15_prod_cr_sigheader.bin.encrypt mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[ 0.6583 ]
[ 0.6606 ] tegrahost_v2 --chip 0x18 --align bpmp.bin
[ 0.6627 ]
[ 0.6648 ] tegrahost_v2 --appendsigheader bpmp.bin zerosbk
[ 0.6693 ]
[ 0.6719 ] tegrasign_v2 --key None --list bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 0.6740 ] Assuming zero filled SBK key
[ 0.7065 ]
[ 0.7091 ] tegrahost_v2 --updatesigheader bpmp_sigheader.bin.encrypt bpmp_sigheader.bin.hash zerosbk
[ 0.7122 ]
[ 0.7144 ] tegrahost_v2 --chip 0x18 --align tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb
[ 0.7161 ]
[ 0.7175 ] tegrahost_v2 --appendsigheader tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk
[ 0.7224 ]
[ 0.7247 ] tegrasign_v2 --key None --list tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 0.7269 ] Assuming zero filled SBK key
[ 0.7564 ]
[ 0.7594 ] tegrahost_v2 --updatesigheader tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[ 0.7636 ]
[ 0.7660 ] tegrahost_v2 --chip 0x18 --align tos-trusty.img
[ 0.7686 ]
[ 0.7706 ] tegrahost_v2 --appendsigheader tos-trusty.img zerosbk
[ 0.7741 ]
[ 0.7767 ] tegrasign_v2 --key None --list tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 0.7789 ] Assuming zero filled SBK key
[ 0.8005 ]
[ 0.8033 ] tegrahost_v2 --updatesigheader tos-trusty_sigheader.img.encrypt tos-trusty_sigheader.img.hash zerosbk
[ 0.8072 ]
[ 0.8093 ] tegrahost_v2 --chip 0x18 --align eks.img
[ 0.8119 ]
[ 0.8147 ] tegrahost_v2 --appendsigheader eks.img zerosbk
[ 0.8174 ]
[ 0.8203 ] tegrasign_v2 --key None --list eks_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 0.8225 ] Assuming zero filled SBK key
[ 0.8231 ]
[ 0.8266 ] tegrahost_v2 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk
[ 0.8294 ]
[ 0.8321 ] tegrahost_v2 --chip 0x18 --align tegra186-jetson-custom-p9999-0000.dtb
[ 0.8347 ]
[ 0.8372 ] tegrahost_v2 --appendsigheader tegra186-jetson-custom-p9999-0000.dtb zerosbk
[ 0.8410 ]
[ 0.8440 ] tegrasign_v2 --key None --list tegra186-jetson-custom-p9999-0000_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 0.8465 ] Assuming zero filled SBK key
[ 0.8627 ]
[ 0.8658 ] tegrahost_v2 --updatesigheader tegra186-jetson-custom-p9999-0000_sigheader.dtb.encrypt tegra186-jetson-custom-p9999-0000_sigheader.dtb.hash zerosbk
[ 0.8697 ]
[ 0.8720 ] tegrahost_v2 --chip 0x18 --align nvtboot_recovery_cpu.bin
[ 0.8746 ]
[ 0.8772 ] tegrahost_v2 --appendsigheader nvtboot_recovery_cpu.bin zerosbk
[ 0.8807 ]
[ 0.8837 ] tegrasign_v2 --key None --list nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 0.8863 ] Assuming zero filled SBK key
[ 0.8998 ]
[ 0.9029 ] tegrahost_v2 --updatesigheader nvtboot_recovery_cpu_sigheader.bin.encrypt nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[ 0.9063 ]
[ 0.9066 ] Copying signed file in /projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/signed
[ 0.9595 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/signed/flash.xml.tmp flash.idx
[ 1.0451 ]
[ 1.0458 ] Generating RCM messages
[ 1.0479 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[ 1.0501 ] RCM 0 is saved as rcm_0.rcm
[ 1.0510 ] RCM 1 is saved as rcm_1.rcm
[ 1.0512 ] List of rcm files are saved in rcm_list.xml
[ 1.0512 ]
[ 1.0512 ] Signing RCM messages
[ 1.0532 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 1.0553 ] Assuming zero filled SBK key
[ 1.0636 ]
[ 1.0636 ] Copying signature to RCM mesages
[ 1.0656 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[ 1.0688 ]
[ 1.0689 ] Boot Rom communication
[ 1.0709 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[ 1.0730 ] BootRom is not running
[ 6.4876 ]
[ 7.4919 ] tegrarcm_v2 --isapplet
[ 7.4943 ] Applet version 01.00.0000
[ 7.6621 ]
[ 7.6645 ] tegrasign_v2 --key None --getmode mode.txt
[ 7.6670 ] Assuming zero filled SBK key
[ 7.6674 ]
[ 7.6675 ] Parsing partition layout
[ 7.6702 ] tegraparser_v2 --pt flash.xml.tmp
[ 7.6743 ]
[ 7.6744 ] Creating list of images to be signed
[ 7.6767 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[ 7.7135 ]
[ 7.7136 ] Generating signatures
[ 7.7160 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[ 7.7184 ] Assuming zero filled SBK key
[ 7.9441 ]
[ 7.9442 ] Reading BCT from device for further operations
[ 7.9442 ] Generating blob
[ 7.9467 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin
[ 7.9489 ]
[ 7.9509 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[ 7.9541 ]
[ 7.9568 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 7.9588 ] Assuming zero filled SBK key
[ 7.9718 ]
[ 7.9746 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[ 7.9771 ]
[ 7.9792 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin
[ 7.9812 ]
[ 7.9830 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[ 7.9856 ]
[ 7.9880 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 7.9900 ] Assuming zero filled SBK key
[ 7.9962 ]
[ 7.9991 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[ 8.0018 ]
[ 8.0042 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin
[ 8.0064 ]
[ 8.0087 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[ 8.0112 ]
[ 8.0139 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 8.0159 ] Assuming zero filled SBK key
[ 8.0205 ]
[ 8.0232 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[ 8.0258 ]
[ 8.0283 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin
[ 8.0306 ]
[ 8.0328 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[ 8.0427 ]
[ 8.0456 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 8.0477 ] Assuming zero filled SBK key
[ 8.1071 ]
[ 8.1102 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[ 8.1183 ]
[ 8.1203 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin
[ 8.1223 ]
[ 8.1243 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk
[ 8.1284 ]
[ 8.1307 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 8.1326 ] Assuming zero filled SBK key
[ 8.1580 ]
[ 8.1609 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[ 8.1651 ]
[ 8.1676 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb
[ 8.1696 ]
[ 8.1716 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk
[ 8.1752 ]
[ 8.1780 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 8.1803 ] Assuming zero filled SBK key
[ 8.2087 ]
[ 8.2122 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[ 8.2163 ]
[ 8.2189 ] tegrahost_v2 --chip 0x18 --align blob_tos-trusty.img
[ 8.2214 ]
[ 8.2239 ] tegrahost_v2 --appendsigheader blob_tos-trusty.img zerosbk
[ 8.2276 ]
[ 8.2296 ] tegrasign_v2 --key None --list blob_tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 8.2316 ] Assuming zero filled SBK key
[ 8.2496 ]
[ 8.2528 ] tegrahost_v2 --updatesigheader blob_tos-trusty_sigheader.img.encrypt blob_tos-trusty_sigheader.img.hash zerosbk
[ 8.2570 ]
[ 8.2597 ] tegrahost_v2 --chip 0x18 --align blob_eks.img
[ 8.2621 ]
[ 8.2647 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk
[ 8.2669 ]
[ 8.2699 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 8.2724 ] Assuming zero filled SBK key
[ 8.2729 ]
[ 8.2761 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[ 8.2790 ]
[ 8.2820 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-jetson-custom-p9999-0000.dtb
[ 8.2848 ]
[ 8.2877 ] tegrahost_v2 --appendsigheader blob_tegra186-jetson-custom-p9999-0000.dtb zerosbk
[ 8.2915 ]
[ 8.2947 ] tegrasign_v2 --key None --list blob_tegra186-jetson-custom-p9999-0000_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 8.2970 ] Assuming zero filled SBK key
[ 8.3128 ]
[ 8.3159 ] tegrahost_v2 --updatesigheader blob_tegra186-jetson-custom-p9999-0000_sigheader.dtb.encrypt blob_tegra186-jetson-custom-p9999-0000_sigheader.dtb.hash zerosbk
[ 8.3198 ]
[ 8.3229 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin
[ 8.3255 ] number of images in blob are 9
[ 8.3263 ] blobsize is 4214264
[ 8.3266 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 220080
[ 8.3317 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 89792
[ 8.3327 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 63104
[ 8.3338 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2082144
[ 8.3349 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 533904
[ 8.3361 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt of size 605120
[ 8.3378 ] Added binary blob_tos-trusty_sigheader.img.encrypt of size 366400
[ 8.3388 ] Added binary blob_eks_sigheader.img.encrypt of size 1440
[ 8.3397 ] Added binary blob_tegra186-jetson-custom-p9999-0000_sigheader.dtb.encrypt of size 252128
[ 8.3423 ]
[ 8.3425 ] Sending bootloader and pre-requisite binaries
[ 8.3449 ] tegrarcm_v2 --download blob blob.bin
[ 8.3476 ] Applet version 01.00.0000
[ 8.5125 ] Sending blob
[ 8.5127 ] […] 100%
[ 9.1915 ]
[ 9.1942 ] tegrarcm_v2 --boot recovery
[ 9.1966 ] Applet version 01.00.0000
[ 9.3656 ]
[ 10.3696 ] tegrarcm_v2 --isapplet
[ 10.6416 ]
[ 10.6452 ] tegradevflash_v2 --iscpubl
[ 10.6476 ] CPU Bootloader is not running on device.
[ 10.7082 ]
[ 11.7124 ] tegrarcm_v2 --isapplet
[ 11.8590 ]
[ 11.8621 ] tegradevflash_v2 --iscpubl
[ 11.8647 ] Bootloader version 01.00.0000
[ 11.9422 ] Bootloader version 01.00.0000
[ 11.9432 ]
[ 11.9433 ] Writing partition
[ 11.9459 ] tegradevflash_v2 --write MB1_BCT /projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/signed/mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 11.9485 ] Bootloader version 01.00.0000
[ 12.0262 ] Writing partition MB1_BCT with /projects/jetson-custom/Linux_for_Tegra_R32.4.2/bootloader/signed/mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 12.0282 ] […] 100%
[ 12.0377 ]
[ 12.0379 ] Coldbooting the device
[ 12.0405 ] tegradevflash_v2 --reboot coldboot
[ 12.0428 ] Bootloader version 01.00.0000
[ 12.1120 ]
*** The [MB1_BCT] has been updated successfully. ***
Hi vucvic,
Can you share host side logs ?
Below command used to generate signed files under “bootloader/signed/” directory (-r is optional).
sudo ./flash.sh -r --sign jetson-tx2 mmcblk0p1
And flashing command for signed mb1-bct would be (-r is optional):
sudo ./flash.sh -r -k MB1_BCT --image ./bootloader/signed/mb1_cold_boot_bct_MB1_sigheader.bct.encrypt jetson-tx2 mmcblk0p1
kayccc
June 18, 2020, 1:29am
17
Hi vucvic,
There is no update from you for a period, assuming this is not an issue any more.
Hence we are closing this topic. If need further support, please open a new one. Thanks
vucvic
July 13, 2020, 3:23pm
19
Hello everyone,
Sorry for not responding, I hope everyone is good and healthy.
I didn’t try the above thing, I hope ill do it in the near future and be sure i will update you
All the best!