Flashing hangs at tegrarcm_v2 --isapplet

I am attempting to flash a TX2i for operation with a custom carrier board. During flashing, the process hangs at about 28 seconds at the tegrarcm_v2 --isapplet stage. What could be causing this to happen? I can flash the unmodified TX2i configuration without any issues.

Here is my current procedure:

  1. Create configuration files from the pinmux dtsi files.
    1.1. cd <L4T>/kernel/pinmux/t186
    1.2. python pinmux-dts2cfg.py --pinmux addr_info.txt gpio_add_info.txt por_val.txt tegra18x-myboard-pinmux.dtsi tegra18x-myboard-gpio-default.dtsi 1.0 > ../../../bootloader/t186ref/BCT/tegra18x-mb1-bct-pinmux-quilll-myboard.cfg
    1.3. python pinmux-dts2cfg.py --pad pad_info.txt tegra18x-myboard-padvoltage-default.dtsi 1.0 > ../../../bootloader/t186ref/BCT/tegra18x-mb1-bct-pad-quill-myboard.cfg

  2. Modify PMIC configuration
    2.1. cd <L4T>/bootloader/t186ref/BCT
    2.2. cp tegra186-mb1-bct-quill-p3489-1000-a00.cfg tegra18x-mb1-pmic-quill-myboard.cfg
    2.3. Remove lines 70 - 94 from tegra18x-mb1-pmic-quill-myboard.cfg
    2.4. Modify line 21 to read pmic.generic.1.block-count = 4;

  3. Build the device tree from source
    3.1. Modify tegra186-quill-p3489-1000-a00-00-base.dts adding the following nodes to the root node.

i2c@31b0000 {
    pinctrl-names = "default";
    pinctrl-0 = <&dpaux0_default>;
};

i2c@3190000 {
    pinctrl-names = "default";
    pinctrl-0 = <&dpaux_default>;
};

3.2. Add the following to the host1x node.

dpaux@155c0000 {
    status = "okay";
    compatible = "nvidia,tegra186-dpaux-padctl";
    /delete-property/ power-domains;
    dpaux0_default: pinmux@0 {
        dpaux0_pins {
            pins = "dpaux-0";
            function = "i2c";
    };
};

dpaux@15040000 {
    status = "okay";
    compatible = "nvidia,tegra186-dpaux1-padctl";
    /delete-property/ power-domains;
    dpaux_default: pinmux@0 {
        dpaux1_pins {
            pins = "dpaux1-1";
            function = "i2c";
    };
};

3.3. Compile the DTB

  1. Modify jetson-tx2i.conf making the following changes
DTB_FILE=tegra18x-quill-myboard.dtb
TBCDTB_FILE=tegra18x-quill-myboard.dtb
PINMUX_CONFIG="tegra18x-mb1-bct-pinmux-quill-myboard.cfg"
PMIC_CONFIG="tegra18x-mb1-bct-pmic-quill-myboard.cfg"
PMC_CONFIG="tegra18x-mb1-bct-pad-quill-myboard.cfg"
  1. Attempt to flash the TX2i

hello rgalliath,

did you mean the flash process continue after 28 seconds?
since you’re working with a custom carrier board, you should also have assign the flash command to use specific board configuration file instead of default cfg.

Hi,

I mean that the flash process halts at tegraarcm_v2 --isapplet and does not proceed past this point.
I have created a custom configuration based on jetson-tx2i.conf. I have been following the Bring-Up and Adaptation guide and believe I have completed all the steps correctly.

hello rgalliath,

may I know what’s your environment settings, are you using a VM machine?

I am not using a Virtual Machine. This was on a system running Ubuntu 18.04. I can flash the default TX2i configuration without any problems from the same machine.

please access developer guide for reference, pinmux changes.
had you change the pinmux configuration applied by the software.
you should also update the flash cfg file by loading the appropriate cfg file for flashing your customize board.

Hi, please see my edits to the original post. I have included my exact process so far. I have tried following the Adaptation and Bring-Up guide as best as I can.

hello rgalliath,

please share the flash messages in detail for reference,
thanks

Edit: So I took a closer look at everything, and it turns out I had a typo in my jetson-tx2i.conf file. It was not seeing my PMIC configuration file. The flash process now completes without issue.

Hi, here is the entire text output from flash.sh. The name of my custom board is 70020913_r1, as you will see in some of the file names.

vision-firmware/L4T_R1 » sudo ./flash.sh jetson-tx2i mmcblk0p1
###############################################################################
# L4T BSP Information:
# R32 , REVISION: 6.1
###############################################################################
# Target Board Information:
# Name: jetson-tx2i, Board Family: t186ref, SoC: Tegra 186,
# OpMode: production, Boot Authentication: NS,
# Disk encryption: disabled ,
###############################################################################
./tegraflash.py --chip 0x18 --applet "/home/soul/Documents/vision-firmware/L4T_R1/bootloader/mb1_recovery_prod.bin" --skipuid --cmd "dump eeprom boardinfo cvm.bin"
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[   0.0032 ] Generating RCM messages
[   0.0051 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm /home/soul/Documents/vision-firmware/L4T_R1/bootloader/mb1_recovery_prod.bin 0 0
[   0.0057 ] RCM 0 is saved as rcm_0.rcm
[   0.0072 ] RCM 1 is saved as rcm_1.rcm
[   0.0072 ] List of rcm files are saved in rcm_list.xml
[   0.0072 ]
[   0.0072 ] Signing RCM messages
[   0.0093 ] tegrasign_v3.py --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0093 ] Assuming zero filled SBK key
[   0.0182 ] Copying signature to RCM mesages
[   0.0203 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[   0.0215 ]
[   0.0216 ] Boot Rom communication
[   0.0237 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml --skipuid
[   0.0247 ] RCM version 0X180001
[   0.4038 ] Boot Rom communication completed
[   1.4110 ]
[   2.4174 ] tegrarcm_v2 --isapplet
[   2.4207 ] Applet version 01.00.0000
[   6.6420 ]
[   6.6439 ] Retrieving EEPROM data
[   6.6440 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/soul/Documents/vision-firmware/L4T_R1/bootloader/cvm.bin
[   6.6447 ] Applet version 01.00.0000
[   7.0579 ] Saved platform info in /home/soul/Documents/vision-firmware/L4T_R1/bootloader/cvm.bin
[   7.1306 ]
Board ID(3489) version(300) sku(0000) revision(S.0)
Copy /home/soul/Documents/vision-firmware/L4T_R1/kernel/dtb/tegra18x-quill-70020913_r1.dtb to /home/soul/Documents/vision-firmware/L4T_R1/kernel/dtb/tegra18x-quill-70020913_r1.dtb.rec
copying bctfile(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/t186ref/BCT/P3489_A00_8GB_Samsung_8GB_lpddr4_204Mhz_P134_A02_ECC_en_l4t.cfg)... done.
copying misc_config(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t-storm.cfg)... done.
copying pinmux_config(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/t186ref/BCT/tegra18x-mb1-bct-pinmux-quill-70020913_r1.cfg)... done.
copying pmc_config(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/t186ref/BCT/tegra18x-mb1-bct-pad-quill-70020913_r1.cfg)... done.
copying prod_config(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg)... done.
copying scr_config(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/t186ref/BCT/minimal_scr.cfg)... done.
copying scr_cold_boot_config(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/t186ref/BCT/mobile_scr.cfg)... done.
copying bootrom_config(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg)... done.
copying dev_params(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/t186ref/BCT/emmc.cfg)... done.
Existing bootloader(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/nvtboot_cpu.bin) reused.
copying initrd(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/l4t_initrd.img)... done.
Making Boot image... done.
/home/soul/Documents/vision-firmware/L4T_R1/bootloader/tegraflash.py --chip 0x18 --key  --cmd sign boot.img kernel
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[   0.0004 ] Generating signature
[   0.0026 ] tegrasign_v3.py --getmode mode.txt --key
[   0.0026 ] Assuming zero filled SBK key : not reading
[   0.0028 ] sign_type   : 0
[   0.0028 ] header_magic: 414e4452
[   0.0070 ] tegrahost_v2 --chip 0x18 --align 1_boot.img
[   0.0106 ]
[   0.0145 ] tegrahost_v2 --chip 0x18 0 --appendsigheader 1_boot.img zerosbk
[   0.0174 ]
[   0.0212 ] tegrasign_v3.py --key  --list 1_boot_sigheader.img_list.xml --pubkeyhash pub_key.key
[   0.0213 ] Assuming zero filled SBK key : not reading
[   0.0391 ] tegrahost_v2 --chip 0x18 0 --updatesigheader 1_boot_sigheader.img.encrypt 1_boot_sigheader.img.hash zerosbk
[   0.0410 ]
[   0.0416 ] Signed file: /home/soul/Documents/vision-firmware/L4T_R1/bootloader/temp_user_dir/boot_sigheader.img.encrypt
l4t_sign_image.sh: Generate header for boot_sigheader.img.encrypt
l4t_sign_image.sh: chip 0x18: Don't need to do anything
l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot_sigheader.img.encrypt
l4t_sign_image.sh: the signed file is /home/soul/Documents/vision-firmware/L4T_R1/bootloader/temp_user_dir/boot_sigheader.img.encrypt
done.
Making recovery ramdisk for recovery image...
Re-generating recovery ramdisk for recovery image...
/home/soul/Documents/vision-firmware/L4T_R1/bootloader/ramdisk_tmp /home/soul/Documents/vision-firmware/L4T_R1/bootloader /home/soul/Documents/vision-firmware/L4T_R1
30412 blocks
_BASE_KERNEL_VERSION=4.9.253-tegra
/home/soul/Documents/vision-firmware/L4T_R1/bootloader/ramdisk_tmp/lib /home/soul/Documents/vision-firmware/L4T_R1/bootloader/ramdisk_tmp /home/soul/Documents/vision-firmware/L4T_R1/bootloader /home/soul/Documents/vision-firmware/L4T_R1
66129 blocks
Making Recovery image...
copying recdtbfile(/home/soul/Documents/vision-firmware/L4T_R1/kernel/dtb/tegra18x-quill-70020913_r1.dtb.rec)... done.
20+0 records in
20+0 records out
20 bytes copied, 0.000136228 s, 147 kB/s
Existing sosfile(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/mb1_recovery_prod.bin) reused.
copying tegraboot(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/t186ref/nvtboot.bin)... done.
Existing cpu_bootloader(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/nvtboot_cpu.bin) reused.
Existing mb2blfile(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/nvtboot_recovery.bin) reused.
Existing mtspreboot(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/preboot_d15_prod_cr.bin) reused.
Existing mts(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/mce_mts_d15_prod_cr.bin) reused.
Existing mb1file(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/mb1_prod.bin) reused.
Existing bpffile(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/bpmp.bin) reused.
copying bpfdtbfile(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/t186ref/tegra186-a02-bpmp-storm-p3489-a00-00-ta795sa-ucm1.dtb)... done.
Existing scefile(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/camera-rtcpu-sce.img) reused.
Existing spefile(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/spe.bin) reused.
Existing drameccfile(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/dram-ecc.bin) reused.
Existing badpagefile(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/badpage.bin) reused.
copying wb0boot(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/t186ref/warmboot.bin)... done.
Existing tosfile(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/tos-trusty.img) reused.
Existing eksfile(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/eks.img) reused.
copying dtbfile(/home/soul/Documents/vision-firmware/L4T_R1/kernel/dtb/tegra18x-quill-70020913_r1.dtb)... done.
Copying nv_boot_control.conf to rootfs
/home/soul/Documents/vision-firmware/L4T_R1/bootloader/tegraflash.py --chip 0x18 --key  --cmd sign kernel_tegra18x-quill-70020913_r1.dtb kernel_dtb
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[   0.0004 ] Generating signature
[   0.0024 ] tegrasign_v3.py --getmode mode.txt --key
[   0.0024 ] Assuming zero filled SBK key : not reading
[   0.0026 ] sign_type   : 1634887525
[   0.0026 ] header_magic: d00dfeed
[   0.0044 ] tegrahost_v2 --chip 0x18 --align 1_kernel_tegra18x-quill-70020913_r1.dtb
[   0.0050 ]
[   0.0062 ] tegrahost_v2 --chip 0x18 0 --appendsigheader 1_kernel_tegra18x-quill-70020913_r1.dtb zerosbk
[   0.0071 ]
[   0.0095 ] tegrasign_v3.py --key  --list 1_kernel_tegra18x-quill-70020913_r1_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[   0.0096 ] Assuming zero filled SBK key : not reading
[   0.0169 ] tegrahost_v2 --chip 0x18 0 --updatesigheader 1_kernel_tegra18x-quill-70020913_r1_sigheader.dtb.encrypt 1_kernel_tegra18x-quill-70020913_r1_sigheader.dtb.hash zerosbk
[   0.0178 ]
[   0.0181 ] Signed file: /home/soul/Documents/vision-firmware/L4T_R1/bootloader/temp_user_dir/kernel_tegra18x-quill-70020913_r1_sigheader.dtb.encrypt
l4t_sign_image.sh: Generate header for kernel_tegra18x-quill-70020913_r1_sigheader.dtb.encrypt
l4t_sign_image.sh: chip 0x18: Don't need to do anything
l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra18x-quill-70020913_r1_sigheader.dtb.encrypt
l4t_sign_image.sh: the signed file is /home/soul/Documents/vision-firmware/L4T_R1/bootloader/temp_user_dir/kernel_tegra18x-quill-70020913_r1_sigheader.dtb.encrypt
done.
	populating kernel to rootfs... done.
	populating initrd to rootfs... done.
	populating kernel_tegra18x-quill-70020913_r1.dtb to rootfs... done.
Making system.img...
	populating rootfs from /home/soul/Documents/vision-firmware/L4T_R1/rootfs ... 	populating /boot/extlinux/extlinux.conf ... done.
	Sync'ing system.img ... done.
	Converting RAW image to Sparse image... done.
system.img built successfully.
Existing tbcfile(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/cboot.bin) reused.
copying tbcdtbfile(/home/soul/Documents/vision-firmware/L4T_R1/kernel/dtb/tegra18x-quill-70020913_r1.dtb)... done.
copying cfgfile(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml... done.
Existing flasher(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing flashapp(/home/soul/Documents/vision-firmware/L4T_R1/bootloader/tegraflash.py) reused.
./tegraflash.py --bl nvtboot_recovery_cpu.bin --sdram_config P3489_A00_8GB_Samsung_8GB_lpddr4_204Mhz_P134_A02_ECC_en_l4t.cfg --odmdata 0x1090000 --applet mb1_recovery_prod.bin  --cmd "flash; reboot"  --cfg flash.xml --chip 0x18 --misc_config tegra186-mb1-bct-misc-si-l4t-storm.cfg --pinmux_config tegra18x-mb1-bct-pinmux-quill-70020913_r1.cfg --pmc_config tegra18x-mb1-bct-pad-quill-70020913_r1.cfg --prod_config tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg --dev_params emmc.cfg  --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-storm-p3489-a00-00-ta795sa-ucm1.dtb; tlk tos-trusty.img; eks eks.img; bootloader_dtb tegra18x-quill-70020913_r1.dtb"
saving flash command in /home/soul/Documents/vision-firmware/L4T_R1/bootloader/flashcmd.txt
saving Windows flash command to /home/soul/Documents/vision-firmware/L4T_R1/bootloader/flash_win.bat
*** Flashing target device started. ***
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[   0.0086 ] tegrasign_v3.py --getmode mode.txt --key None
[   0.0087 ] Assuming zero filled SBK key
[   0.0025 ] Generating RCM messages
[   0.0048 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[   0.0056 ] RCM 0 is saved as rcm_0.rcm
[   0.0068 ] RCM 1 is saved as rcm_1.rcm
[   0.0069 ] List of rcm files are saved in rcm_list.xml
[   0.0069 ]
[   0.0069 ] Signing RCM messages
[   0.0153 ] tegrasign_v3.py --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0153 ] Assuming zero filled SBK key
[   0.0165 ] Copying signature to RCM mesages
[   0.0184 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[   0.0196 ]
[   0.0196 ] Parsing partition layout
[   0.0218 ] tegraparser_v2 --pt flash.xml.tmp
[   0.0239 ]
[   0.0240 ] Using default ramcode: 0
[   0.0240 ] Disable BPMP dtb trim, using default dtb
[   0.0240 ]
[   0.0240 ] Creating list of images to be signed
[   0.0263 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[   0.1569 ]
[   0.1569 ] Generating signatures
[   0.1660 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key
[   0.1660 ] Assuming zero filled SBK key
[   1.1008 ] Generating br-bct
[   1.1023 ] Updating dev and MSS params in BR BCT
[   1.1024 ] tegrabct_v2 --dev_param emmc.cfg --sdram P3489_A00_8GB_Samsung_8GB_lpddr4_204Mhz_P134_A02_ECC_en_l4t.cfg --brbct br_bct.cfg --chip 0x18 0
[   1.1171 ]
[   1.1171 ] Updating bl info
[   1.1192 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   1.1206 ]
[   1.1206 ] Updating smd info
[   1.1225 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[   1.1234 ]
[   1.1234 ] Updating Odmdata
[   1.1253 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x1090000
[   1.1263 ]
[   1.1263 ] Get Signed section of bct
[   1.1282 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[   1.1295 ]
[   1.1315 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key
[   1.1322 ] Assuming zero filled SBK key
[   1.1739 ]
[   1.1739 ] Updating BCT with signature
[   1.1764 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml
[   1.1778 ]
[   1.1778 ] Generating coldboot mb1-bct
[   1.1802 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram P3489_A00_8GB_Samsung_8GB_lpddr4_204Mhz_P134_A02_ECC_en_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t-storm.cfg --scr mobile_scr.cfg --pinmux tegra18x-mb1-bct-pinmux-quill-70020913_r1.cfg --pmc tegra18x-mb1-bct-pad-quill-70020913_r1.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg --prod tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg
[   1.1811 ] MB1-BCT version: 0xf
[   1.1812 ] Copying Sdram info from 1 to 2 set
[   1.1953 ] Copying Sdram info from 2 to 3 set
[   1.1956 ] Packing sdram param for instance[0]
[   1.1958 ] Packing sdram param for instance[1]
[   1.1961 ] Packing sdram param for instance[2]
[   1.1963 ] Packing sdram param for instance[3]

[   1.1966 ] Parsing config file :tegra18x-mb1-bct-pinmux-quill-70020913_r1.cfg
[   1.1970 ] Appending platform config data of size :- 2024

[   1.1973 ] Parsing config file :mobile_scr.cfg
[   1.1975 ] Appending platform config data of size :- 12240

[   1.1982 ] Parsing config file :tegra18x-mb1-bct-pad-quill-70020913_r1.cfg
[   1.1986 ] Appending platform config data of size :- 24
[   1.1987 ]
[   1.1987 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg
[   1.1987 ] Appending platform config data of size :- 64
[   1.1987 ]
[   1.1987 ] Parsing config file :tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg
[   1.1987 ] Appending platform config data of size :- 2132
[   1.1987 ]
[   1.1988 ] Updating mb1-bct with firmware information
[   1.2009 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[   1.2016 ] MB1-BCT version: 0xf
[   1.2020 ]
[   1.2020 ] Updating mb1-bct with storage information
[   1.2039 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   1.2046 ] MB1-BCT version: 0xf
[   1.2050 ]
[   1.2069 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[   1.2081 ]
[   1.2101 ] tegrahost_v2 --chip 0x18 0 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[   1.2112 ]
[   1.2201 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[   1.2202 ] Assuming zero filled SBK key
[   1.2194 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[   1.2205 ]
[   1.2205 ] Generating recovery mb1-bct
[   1.2226 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram P3489_A00_8GB_Samsung_8GB_lpddr4_204Mhz_P134_A02_ECC_en_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t-storm.cfg --scr minimal_scr.cfg --pinmux tegra18x-mb1-bct-pinmux-quill-70020913_r1.cfg --pmc tegra18x-mb1-bct-pad-quill-70020913_r1.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg --prod tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg
[   1.2234 ] MB1-BCT version: 0xf
[   1.2235 ] Copying Sdram info from 1 to 2 set
[   1.2378 ] Copying Sdram info from 2 to 3 set
[   1.2380 ] Packing sdram param for instance[0]
[   1.2382 ] Packing sdram param for instance[1]
[   1.2385 ] Packing sdram param for instance[2]
[   1.2387 ] Packing sdram param for instance[3]

[   1.2389 ] Parsing config file :tegra18x-mb1-bct-pinmux-quill-70020913_r1.cfg
[   1.2394 ] Appending platform config data of size :- 2024

[   1.2397 ] Parsing config file :minimal_scr.cfg
[   1.2399 ] Appending platform config data of size :- 12240

[   1.2403 ] Parsing config file :tegra18x-mb1-bct-pad-quill-70020913_r1.cfg
[   1.2404 ] Appending platform config data of size :- 24
[   1.2404 ]
[   1.2404 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg
[   1.2404 ] Appending platform config data of size :- 64
[   1.2404 ]
[   1.2404 ] Parsing config file :tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg
[   1.2404 ] Appending platform config data of size :- 2132
[   1.2404 ]
[   1.2405 ] Updating mb1-bct with firmware information
[   1.2429 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[   1.2437 ] MB1-BCT version: 0xf
[   1.2442 ]
[   1.2443 ] Updating mb1-bct with storage information
[   1.2463 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   1.2471 ] MB1-BCT version: 0xf
[   1.2475 ]
[   1.2495 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[   1.2503 ]
[   1.2524 ] tegrahost_v2 --chip 0x18 0 --appendsigheader mb1_bct_MB1.bct zerosbk
[   1.2534 ]
[   1.2620 ] tegrasign_v3.py --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[   1.2620 ] Assuming zero filled SBK key
[   1.2610 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[   1.2623 ]
[   1.2624 ] Copying signatures
[   1.2646 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   1.3976 ]
[   1.3976 ] Boot Rom communication
[   1.4000 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[   1.4009 ] BootRom is not running
[   9.4541 ]
[  10.4610 ] tegrarcm_v2 --isapplet
[  10.4652 ] Applet version 01.00.0000
[  10.8443 ]
[  10.8445 ] Sending BCTs
[  10.8496 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[  10.8522 ] Applet version 01.00.0000
[  11.6776 ] Sending bct_bootrom
[  11.6778 ] [................................................] 100%
[  11.6795 ] Sending bct_mb1
[  11.6806 ] [................................................] 100%
[  20.9374 ]
[  20.9375 ] Generating blob
[  20.9434 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin
[  20.9466 ]
[  20.9490 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[  20.9506 ]
[  20.9595 ] tegrasign_v3.py --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  20.9596 ] Assuming zero filled SBK key
[  20.9656 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[  20.9672 ]
[  20.9703 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin
[  20.9716 ]
[  20.9740 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[  20.9758 ]
[  20.9848 ] tegrasign_v3.py --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  20.9849 ] Assuming zero filled SBK key
[  20.9880 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[  20.9897 ]
[  20.9923 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin
[  20.9936 ]
[  20.9961 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[  20.9976 ]
[  21.0070 ] tegrasign_v3.py --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  21.0071 ] Assuming zero filled SBK key
[  21.0080 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[  21.0093 ]
[  21.0117 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin
[  21.0127 ]
[  21.0151 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[  21.0210 ]
[  21.0302 ] tegrasign_v3.py --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  21.0303 ] Assuming zero filled SBK key
[  21.0715 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[  21.0754 ]
[  21.0778 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin
[  21.0787 ]
[  21.0807 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_bpmp.bin zerosbk
[  21.0825 ]
[  21.0914 ] tegrasign_v3.py --key None --list blob_bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  21.0915 ] Assuming zero filled SBK key
[  21.0989 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[  21.1007 ]
[  21.1035 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-a02-bpmp-storm-p3489-a00-00-ta795sa-ucm1.dtb
[  21.1045 ]
[  21.1066 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tegra186-a02-bpmp-storm-p3489-a00-00-ta795sa-ucm1.dtb zerosbk
[  21.1077 ]
[  21.1163 ] tegrasign_v3.py --key None --list blob_tegra186-a02-bpmp-storm-p3489-a00-00-ta795sa-ucm1_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[  21.1164 ] Assuming zero filled SBK key
[  21.1165 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tegra186-a02-bpmp-storm-p3489-a00-00-ta795sa-ucm1_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-storm-p3489-a00-00-ta795sa-ucm1_sigheader.dtb.hash zerosbk
[  21.1180 ]
[  21.1203 ] tegrahost_v2 --chip 0x18 --align blob_tos-trusty.img
[  21.1212 ]
[  21.1232 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tos-trusty.img zerosbk
[  21.1248 ]
[  21.1334 ] tegrasign_v3.py --key None --list blob_tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key
[  21.1335 ] Assuming zero filled SBK key
[  21.1386 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tos-trusty_sigheader.img.encrypt blob_tos-trusty_sigheader.img.hash zerosbk
[  21.1400 ]
[  21.1421 ] tegrahost_v2 --chip 0x18 --align blob_eks.img
[  21.1429 ]
[  21.1450 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_eks.img zerosbk
[  21.1459 ]
[  21.1546 ] tegrasign_v3.py --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key
[  21.1547 ] Assuming zero filled SBK key
[  21.1534 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[  21.1544 ]
[  21.1565 ] tegrahost_v2 --chip 0x18 --align blob_tegra18x-quill-70020913_r1.dtb
[  21.1574 ]
[  21.1595 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tegra18x-quill-70020913_r1.dtb zerosbk
[  21.1610 ]
[  21.1696 ] tegrasign_v3.py --key None --list blob_tegra18x-quill-70020913_r1_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[  21.1697 ] Assuming zero filled SBK key
[  21.1745 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tegra18x-quill-70020913_r1_sigheader.dtb.encrypt blob_tegra18x-quill-70020913_r1_sigheader.dtb.hash zerosbk
[  21.1759 ]
[  21.1781 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin
[  21.1789 ] number of images in blob are 9
[  21.1791 ] blobsize is 4088200
[  21.1792 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 225152
[  21.1811 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 122272
[  21.1814 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 58384
[  21.1817 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2298464
[  21.1824 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 534816
[  21.1830 ] Added binary blob_tegra186-a02-bpmp-storm-p3489-a00-00-ta795sa-ucm1_sigheader.dtb.encrypt of size 76160
[  21.1835 ] Added binary blob_tos-trusty_sigheader.img.encrypt of size 403264
[  21.1838 ] Added binary blob_eks_sigheader.img.encrypt of size 1440
[  21.1841 ] Added binary blob_tegra18x-quill-70020913_r1_sigheader.dtb.encrypt of size 368096
[  21.1866 ]
[  21.1867 ] Sending bootloader and pre-requisite binaries
[  21.1890 ] tegrarcm_v2 --download blob blob.bin
[  21.1898 ] Applet version 01.00.0000
[  25.9375 ] Sending blob
[  25.9375 ] [................................................] 100%
[  26.4030 ]
[  26.4075 ] tegrarcm_v2 --boot recovery
[  26.4100 ] Applet version 01.00.0000
[  27.2065 ]
[  28.2134 ] tegrarcm_v2 --isapplet
<Ctrl-C>

hello rgalliath,

thanks for sharing, we may close this discussion thread.