Jeston orin nx backup failed

I use Jetson Orin NX 16GB modules and the Jetson Xavier NX Developer Kit carrier board.
When I try to backup my system, it doesn’t work and the backup gets stuck.
My jetpak version is 5.1.
The package used is Jetson_Linux_R35.2.1_aarch64.tbz2.
orin-nx-overlay-35.2.1.tbz2, Tegra_Linux_Sample-Root-Filesystem_R35.2.1_aarch64.tbz2
.
Commands used:

$ mkdir workspace
$ tar -xf Jetson_Linux_R35.2.1_aarch64.tbz2
$ tar -xf orin-nx-overlay-35.2.1.tbz2
$ cd Linux_for_Tegra/rootfs/
$ sudo tar -xpf ../../ Tegra_Linux_Sample-Root-Filesystem_R35.2.1_aarch64.tbz2
$ cd ..
$ sudo ./apply_binaries.sh
$ sudo ./flash.sh -k APP -G backup.img jetson-orin-nx-devkit-16gb  mmcblk0p1

Terminal print:

###############################################################################
# L4T BSP Information:
# R35 , REVISION: 2.1
# User release: 0.0
###############################################################################
# Target Board Information:
# Name: jetson-orin-nx-devkit-16gb, Board Family: t186ref, SoC: Tegra 234, 
# OpMode: production, Boot Authentication: NS, 
# Disk encryption: disabled ,
###############################################################################
copying emc_fuse_dev_params(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-br-bct-diag-boot.dts)... done.
copying device_config(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-device-p3767-0000.dts)... done.
copying misc_config(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-misc-p3767-0000.dts)... done.
./tegraflash.py --chip 0x23 --applet "/data/jetson/orin/Linux_for_Tegra/bootloader/mb1_t234_prod.bin" --skipuid --cfg readinfo_t234_min_prod.xml --dev_params tegra234-br-bct-diag-boot.dts --device_config tegra234-mb1-bct-device-p3767-0000.dts --misc_config tegra234-mb1-bct-misc-p3767-0000.dts --bins "mb2_applet applet_t234.bin" --cmd "dump eeprom cvm cvm.bin; dump custinfo custinfo_out.bin; reboot recovery" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0128 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   0.0137 ] File rcm_state open failed
[   0.0141 ] ERROR: failed to read rcm_state
[   0.0141 ] 
[   0.0149 ] tegrasign_v3.py --key None --getmode mode.txt
[   0.0152 ] Assuming zero filled SBK key
[   0.0147 ] Pre-processing config: tegra234-mb1-bct-device-p3767-0000.dts
[   0.0205 ] Pre-processing config: tegra234-mb1-bct-misc-p3767-0000.dts
[   0.0306 ] Parsing partition layout
[   0.0317 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[   0.0338 ] Kernel DTB used: None
[   0.0338 ] WARNING: dce base dtb is not provided

[   0.0338 ] Parsing partition layout
[   0.0349 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[   0.0361 ] Creating list of images to be signed
[   0.0371 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --list images_list.xml zerosbk
[   0.0381 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[   0.0391 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[   0.0394 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[   0.0449 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[   0.0460 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[   0.0512 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[   0.0515 ] adding BCH for mb2_t234_aligned.bin
[   0.0544 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[   0.0678 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[   0.0681 ] adding BCH for mb2_t234_aligned.bin
[   0.0836 ] Filling MB1 storage info
[   0.0836 ] Parsing dev params for multi chains
[   0.0897 ] Generating br-bct
[   0.0908 ] Updating dev and MSS params in BR BCT
[   0.0908 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[   0.0921 ] Updating bl info
[   0.0931 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin
[   0.0940 ] WARNING: boot chain is not completed. set to 0
[   0.0947 ] Generating signatures
[   0.0955 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.0958 ] Assuming zero filled SBK key
[   0.1096 ] Warning: pub_key.key is not found
[   0.1092 ] Parsing dev params for multi chains
[   0.1092 ] Generating br-bct
[   0.1100 ] Updating dev and MSS params in BR BCT
[   0.1101 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[   0.1111 ] Updating bl info
[   0.1119 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[   0.1127 ] WARNING: boot chain is not completed. set to 0
[   0.1136 ] Get Signed section of bct
[   0.1145 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml
[   0.1154 ] Signing BCT
[   0.1162 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.1164 ] Assuming zero filled SBK key
[   0.1190 ] Sha saved in br_bct_BR.sha
[   0.1195 ] Warning: pub_key.key is not found
[   0.1188 ] Updating BCT with signature
[   0.1197 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml
[   0.1205 ] Offset :4608 Len :3584
[   0.1209 ] Generating SHA2 Hash
[   0.1217 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512
[   0.1219 ] Assuming zero filled SBK key
[   0.1220 ] Assuming zero filled SBK key
[   0.1248 ] Sha saved in br_bct_BR.sha
[   0.1246 ] Updating BCT with SHA2 Hash
[   0.1255 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml
[   0.1263 ] Offset :4608 Len :3584
[   0.1266 ] Offset :68 Len :8124
[   0.1268 ] Generating coldboot mb1-bct
[   0.1277 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb
[   0.1284 ] MB1-BCT version: 0.9
[   0.1286 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED5/ is not supported
[   0.1291 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED5/ is not supported
[   0.1294 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED5/ is not supported
[   0.1298 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_MCE_COVERAGE/ is not supported
[   0.1301 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_MCE_COVERAGE/ is not supported
[   0.1301 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_MCE_COVERAGE/ is not supported
[   0.1301 ] ERROR: /misc/vmon/vdd_soc/int/ is not supported
[   0.1301 ] ERROR: /misc/vmon/vdd_soc/int/ is not supported
[   0.1301 ] ERROR: /misc/vmon/vdd_cpu/int/ is not supported
[   0.1301 ] ERROR: /misc/vmon/vdd_cpu/int/ is not supported
[   0.1301 ] 
[   0.1302 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb 
[   0.1302 ] Added Platform Config 9 data with size :- 100
[   0.1302 ] 
[   0.1302 ] Updating mb1-bct with firmware information
[   0.1310 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin
[   0.1332 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct
[   0.1352 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk
[   0.1361 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[   0.1379 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.1381 ] Assuming zero filled SBK key
[   0.1401 ] Warning: pub_key.key is not found
[   0.1405 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk
[   0.1421 ] Generating recovery mb1-bct
[   0.1430 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb
[   0.1439 ] MB1-BCT version: 0.9
[   0.1440 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED5/ is not supported
[   0.1445 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED5/ is not supported
[   0.1449 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED5/ is not supported
[   0.1452 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_MCE_COVERAGE/ is not supported
[   0.1456 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_MCE_COVERAGE/ is not supported
[   0.1456 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_MCE_COVERAGE/ is not supported
[   0.1456 ] ERROR: /misc/vmon/vdd_soc/int/ is not supported
[   0.1456 ] ERROR: /misc/vmon/vdd_soc/int/ is not supported
[   0.1456 ] ERROR: /misc/vmon/vdd_cpu/int/ is not supported
[   0.1456 ] ERROR: /misc/vmon/vdd_cpu/int/ is not supported
[   0.1456 ] 
[   0.1456 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb 
[   0.1456 ] Added Platform Config 9 data with size :- 100
[   0.1456 ] 
[   0.1457 ] Updating mb1-bct with firmware information
[   0.1465 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo readinfo_t234_min_prod.xml.bin
[   0.1486 ] tegrahost_v2 --chip 0x23 0 --align mb1_bct_MB1_aligned.bct
[   0.1507 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_bct_MB1_aligned.bct zerosbk
[   0.1516 ] adding BCH for mb1_bct_MB1_aligned.bct
[   0.1533 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.1535 ] Assuming zero filled SBK key
[   0.1555 ] Warning: pub_key.key is not found
[   0.1559 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk
[   0.1576 ] Error: Skip generating mem_bct because sdram_config is not defined
[   0.1576 ] Error: Skip generating mem_bct because sdram_config is not defined
[   0.1576 ] Copying signatures
[   0.1586 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[   0.1657 ] mb1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[   0.1659 ] psc_bl1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[   0.1659 ] Boot Rom communication
[   0.1669 ] tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[   0.1680 ] BR_CID: 0x80012344705DD1903C0000000BFF0080
[   0.1947 ] Sending bct_br
[   0.2383 ] Sending mb1
[   0.2392 ] Sending psc_bl1
[   0.2483 ] Sending bct_mb1
[   0.2541 ] Boot Rom communication completed
[   0.2580 ] tegrahost_v2 --chip 0x23 0 --align applet_t234_aligned.bin
[   0.2619 ] tegrahost_v2 --chip 0x23 0 --magicid MB2A --appendsigheader applet_t234_aligned.bin zerosbk
[   0.2637 ] adding BCH for applet_t234_aligned.bin
[   0.2783 ] tegrasign_v3.py --key None --list applet_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.2785 ] Assuming zero filled SBK key
[   0.2806 ] Warning: pub_key.key is not found
[   0.2809 ] tegrahost_v2 --chip 0x23 0 --updatesigheader applet_t234_aligned_sigheader.bin.encrypt applet_t234_aligned_sigheader.bin.hash zerosbk
[   0.2826 ] Sending mb2_applet...

[   0.2834 ] tegrarcm_v2 --chip 0x23 0 --pollbl --download applet applet_t234_sigheader.bin.encrypt
[   0.2842 ] BL: version 0.28.0.0-t234-54845784-ec016368 last_boot_error: 0
[   0.4506 ] Sending applet
[   0.5547 ] completed
[   0.5573 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   0.5599 ] MB2 Applet version 01.00.0000
[   0.7339 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   0.7367 ] MB2 Applet version 01.00.0000
[   0.7683 ] Retrieving board information
[   0.7714 ] tegrarcm_v2 --chip 0x23 0 --oem platformdetails chip chip_info.bin
[   0.7727 ] MB2 Applet version 01.00.0000
[   0.8173 ] Saved platform info in chip_info.bin
[   0.8227 ] Chip minor revision: 1
[   0.8233 ] Bootrom revision: 0x7
[   0.8233 ] Ram code: 0x0
[   0.8233 ] Chip sku: 0xd3
[   0.8233 ] Chip Sample: prod
[   0.8233 ] 
[   0.8241 ] Retrieving EEPROM data
[   0.8242 ] tegrarcm_v2 --oem platformdetails eeprom cvm /data/jetson/orin/Linux_for_Tegra/bootloader/cvm.bin --chip 0x23 0
[   0.8263 ] MB2 Applet version 01.00.0000
[   0.8572 ] Saved platform info in /data/jetson/orin/Linux_for_Tegra/bootloader/cvm.bin
[   0.8935 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   0.8962 ] MB2 Applet version 01.00.0000
[   0.9275 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   0.9295 ] MB2 Applet version 01.00.0000
[   0.9773 ] Dumping customer Info
[   0.9804 ] tegrarcm_v2 --chip 0x23 0 --oem dump bct tmp.bct
[   0.9829 ] MB2 Applet version 01.00.0000
[   1.0294 ] Saved bct in tmp.bct
[   1.0399 ] tegrabct_v2 --brbct tmp.bct --chip 0x23 0 --custinfo /data/jetson/orin/Linux_for_Tegra/bootloader/custinfo_out.bin
[   1.0420 ] C[   1.0424 ] ustomer data saved in /data/jetson/orin/Linux_for_Tegra/bootloader/custinfo_out.bin successfully
[   1.0425 ] Rebooting to recovery mode
[   1.0438 ] tegrarcm_v2 --chip 0x23 0 --ismb2
[   1.0752 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   1.0772 ] MB2 Applet version 01.00.0000
[   1.1213 ] Booting to recovery mode
[   1.1243 ] tegrarcm_v2 --chip 0x23 0 --reboot recovery
[   1.1268 ] MB2 Applet version 01.00.0000
Board ID(3767) version(300) sku(0000) revision(G.3)
Chip SKU(00:00:00:D3) ramcode(00:00:00:00) fuselevel(fuselevel_production) board_FAB(300)
emc_opt_disable_fuse:(0)
copying bctfile(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-p3767-0000-sdram-l4t.dts)... done.
copying device_config(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-device-p3767-0000.dts)... done.
copying misc_config(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-misc-p3767-0000.dts)... done.
copying pinmux_config(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-pinmux-p3767-dp-a03.dtsi)... done.
copying gpioint_config(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-gpioint-p3767-0000.dts)... done.
copying pmic_config(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-pmic-p3767-0000-a02.dts)... done.
copying pmc_config(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-padvoltage-p3767-dp-a03.dtsi)... done.
copying deviceprod_config(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-cprod-p3767-0000.dts)... done.
copying prod_config(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-prod-p3767-0000.dts)... done.
copying scr_config(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb2-bct-scr-p3767-0000.dts)... done.
copying wb0sdram(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-p3767-0000-wb0sdram-l4t.dts)... done.
copying bootrom_config(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-reset-p3767-0000.dts)... done.
copying dev_params(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-br-bct-p3767-0000-l4t.dts)... done.
copying dev_params_b(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-br-bct_b-p3767-0000-l4t.dts)... done.
copying mb2bct_cfg(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb2-bct-misc-p3767-0000.dts)... done.
Existing pscfwfile(/data/jetson/orin/Linux_for_Tegra/bootloader/pscfw_t234_prod.bin) reused.
Existing pscbl1file(/data/jetson/orin/Linux_for_Tegra/bootloader/psc_bl1_t234_prod.bin) reused.
Existing mtsmcefile(/data/jetson/orin/Linux_for_Tegra/bootloader/mce_flash_o10_cr_prod.bin) reused.
Existing mb2applet(/data/jetson/orin/Linux_for_Tegra/bootloader/applet_t234.bin) reused.
Existing bootloader(/data/jetson/orin/Linux_for_Tegra/bootloader/mb2_t234.bin) reused.
copying initrd(/data/jetson/orin/Linux_for_Tegra/bootloader/l4t_initrd.img)... done.
bl is uefi
Making Boot image... done.
Not signing of boot.img
Existing sosfile(/data/jetson/orin/Linux_for_Tegra/bootloader/mb1_t234_prod.bin) reused.
Existing tegraboot(/data/jetson/orin/Linux_for_Tegra/bootloader/mb2_t234.bin) reused.
Existing cpu_bootloader(/data/jetson/orin/Linux_for_Tegra/bootloader/mb2_t234.bin) reused.
Existing mb2blfile(/data/jetson/orin/Linux_for_Tegra/bootloader/mb2_t234.bin) reused.
Existing xusbfile(/data/jetson/orin/Linux_for_Tegra/bootloader/xusb_t234_prod.bin) reused.
Existing dcefile(/data/jetson/orin/Linux_for_Tegra/bootloader/display-t234-dce.bin) reused.
Existing nvdecfile(/data/jetson/orin/Linux_for_Tegra/bootloader/nvdec_t234_prod.fw) reused.
Existing psc_rf(/data/jetson/orin/Linux_for_Tegra/bootloader/psc_rf_t234_prod.bin) reused.
Existing mb2_rf(/data/jetson/orin/Linux_for_Tegra/bootloader/mb2rf_t234.bin) reused.
Existing mb1file(/data/jetson/orin/Linux_for_Tegra/bootloader/mb1_t234_prod.bin) reused.
Existing bpffile(/data/jetson/orin/Linux_for_Tegra/bootloader/bpmp_t234-TE990M-A1_prod.bin) reused.
copying bpfdtbfile(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/tegra234-bpmp-3767-0000-a02-3509-a02.dtb)... done.
Existing scefile(/data/jetson/orin/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused.
Existing camerafw(/data/jetson/orin/Linux_for_Tegra/bootloader/camera-rtcpu-t234-rce.img) reused.
Existing apefile(/data/jetson/orin/Linux_for_Tegra/bootloader/adsp-fw.bin) reused.
Existing spefile(/data/jetson/orin/Linux_for_Tegra/bootloader/spe_t234.bin) reused.
Existing wb0boot(/data/jetson/orin/Linux_for_Tegra/bootloader/sc7_t234_prod.bin) reused.
Existing tosfile(/data/jetson/orin/Linux_for_Tegra/bootloader/tos-optee_t234.img) reused.
Existing eksfile(/data/jetson/orin/Linux_for_Tegra/bootloader/eks_t234.img) reused.
copying dtbfile(/data/jetson/orin/Linux_for_Tegra/kernel/dtb/tegra234-p3767-0000-p3768-0000-a0.dtb)... done.
Copying nv_boot_control.conf to rootfs
Skip generating system.img
Not signing of kernel-dtb
Existing tbcfile(/data/jetson/orin/Linux_for_Tegra/bootloader/uefi_jetson.bin) reused.
131072+0 records in
131072+0 records out
67108864 bytes (67 MB, 64 MiB) copied, 1.14246 s, 58.7 MB/s
	Sync'ing esp.img ... done.
copying tbcdtbfile(/data/jetson/orin/Linux_for_Tegra/kernel/dtb/tegra234-p3767-0000-p3768-0000-a0.dtb)... done.
copying cfgfile(/data/jetson/orin/Linux_for_Tegra/bootloader/t186ref/cfg/flash_t234_qspi_sd.xml) to flash.xml... done.
Existing flashapp(/data/jetson/orin/Linux_for_Tegra/bootloader/tegraflash.py) reused.
*** Reading [APP] and storing to /data/jetson/orin/Linux_for_Tegra/santachi.img ***
copying overlay_dtb(/data/jetson/orin/Linux_for_Tegra/kernel/dtb/L4TConfiguration.dtbo)... done.
./tegraflash.py  --bl uefi_jetson_with_dtb.bin --chip 0x23 --applet mb1_t234_prod.bin --sdram_config tegra234-p3767-0000-sdram-l4t.dts --device_config tegra234-mb1-bct-device-p3767-0000.dts --misc_config tegra234-mb1-bct-misc-p3767-0000.dts --pinmux_config tegra234-mb1-bct-pinmux-p3767-dp-a03.dtsi --gpioint_config tegra234-mb1-bct-gpioint-p3767-0000.dts --pmic_config tegra234-mb1-bct-pmic-p3767-0000-a02.dts --pmc_config tegra234-mb1-bct-padvoltage-p3767-dp-a03.dtsi --deviceprod_config tegra234-mb1-bct-cprod-p3767-0000.dts --prod_config tegra234-mb1-bct-prod-p3767-0000.dts --scr_config tegra234-mb2-bct-scr-p3767-0000.dts --wb0sdram_config tegra234-p3767-0000-wb0sdram-l4t.dts --br_cmd_config tegra234-mb1-bct-reset-p3767-0000.dts --dev_params tegra234-br-bct-p3767-0000-l4t.dts,tegra234-br-bct_b-p3767-0000-l4t.dts --mb2bct_cfg tegra234-mb2-bct-misc-p3767-0000.dts  --cfg  flash.xml --bins "psc_fw pscfw_t234_prod.bin; mts_mce mce_flash_o10_cr_prod.bin; mb2_applet applet_t234.bin; mb2_bootloader mb2_t234.bin; xusb_fw xusb_t234_prod.bin; dce_fw display-t234-dce.bin; nvdec nvdec_t234_prod.fw; bpmp_fw bpmp_t234-TE990M-A1_prod.bin; bpmp_fw_dtb tegra234-bpmp-3767-0000-a02-3509-a02.dtb; sce_fw camera-rtcpu-sce.img; rce_fw camera-rtcpu-t234-rce.img; ape_fw adsp-fw.bin; spe_fw spe_t234.bin; tos tos-optee_t234.img; eks eks_t234.img"  --odmdata gbe-uphy-config-8,hsstp-lane-map-3,hsio-uphy-config-0  --overlay_dtb L4TConfiguration.dtbo, --bldtb tegra234-p3767-0000-p3768-0000-a0.dtb --concat_cpubl_bldtb --cpubl uefi_jetson.bin  --cmd "read APP /data/jetson/orin/Linux_for_Tegra/santachi.img"  --bct_backup  --boot_chain A  
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0141 ] Pre-processing config: tegra234-mb1-bct-reset-p3767-0000.dts
[   0.0197 ] Pre-processing config: tegra234-mb1-bct-device-p3767-0000.dts
[   0.0257 ] Pre-processing config: tegra234-mb1-bct-cprod-p3767-0000.dts
[   0.0315 ] Pre-processing config: tegra234-mb1-bct-gpioint-p3767-0000.dts
[   0.0385 ] Pre-processing config: tegra234-mb1-bct-misc-p3767-0000.dts
[   0.0483 ] Pre-processing config: tegra234-mb1-bct-pinmux-p3767-dp-a03.dtsi
[   0.0601 ] Pre-processing config: tegra234-mb1-bct-padvoltage-p3767-dp-a03.dtsi
[   0.0653 ] Pre-processing config: tegra234-mb1-bct-pmic-p3767-0000-a02.dts
[   0.0712 ] Pre-processing config: tegra234-mb1-bct-prod-p3767-0000.dts
[   0.0777 ] Pre-processing config: tegra234-mb2-bct-scr-p3767-0000.dts
[   0.5225 ] Pre-processing config: tegra234-p3767-0000-sdram-l4t.dts
[   2.1732 ] Pre-processing config: tegra234-p3767-0000-wb0sdram-l4t.dts
[   3.8254 ] tegrarcm_v2 --chip 0x23 0 --ismb2
[   3.8265 ] File rcm_state open failed
[   3.8265 ] ERROR: failed to read rcm_state
[   3.8265 ] 
[   3.8273 ] tegrasign_v3.py --key None --getmode mode.txt
[   3.8276 ] Assuming zero filled SBK key
[   3.8439 ] Parsing partition layout
[   3.8454 ] tegraparser_v2 --pt flash.xml.tmp
[   3.8539 ] Change tegra234-bpmp-3767-0000-a02-3509-a02.dtb to tegra234-bpmp-3767-0000-a02-3509-a02_with_odm.dtb
[   3.8540 ] Change tegra234-bpmp-3767-0000-a02-3509-a02.dtb to tegra234-bpmp-3767-0000-a02-3509-a02_with_odm.dtb
[   3.8913 ] /usr/bin/python3 dtbcheck.py -c t234 -o tegra234-bpmp-3767-0000-a02-3509-a02_with_odm.dtb tegra234-bpmp-3767-0000-a02-3509-a02_with_odm_tmp.dtb
[   4.3704 ] Concatenating L4TConfiguration.dtbo to tegra234-p3767-0000-p3768-0000-a0_with_odm.dtb
[   4.3706 ] Concatenating bl dtb to cpubl binary
[   4.3739 ] MB2 binary: mb2_t234.bin
[   4.3739 ] Pre-processing mb2bct config: tegra234-mb2-bct-misc-p3767-0000.dts
[   4.3842 ] Generating coldboot mb2-bct
[   4.3842 ] tegrabct_v2 --chip 0x23 0 --mb2bct mb2_cold_boot_bct.cfg --mb2bctcfg tegra234-mb2-bct-misc-p3767-0000_cpp.dtb --scr tegra234-mb2-bct-scr-p3767-0000_cpp.dtb
[   4.3853 ] WARNING: unknown property 'tfc_version'
[   4.3867 ] WARNING: unknown property 'addr_header_version'
[   4.3974 ] Updating mb2-bct with storage information
[   4.3985 ] tegrabct_v2 --chip 0x23 0 --mb2bct mb2_cold_boot_bct_MB2.bct --updatestorageinfo flash.xml.bin
[   4.4000 ] Concatenating mb2-bct to mb2 binary
[   4.4000 ] mb2_bin_file = mb2_t234.bin
[   4.4000 ] mb2_bct_file = mb2_cold_boot_bct_MB2.bct
[   4.4043 ] DCE binary: display-t234-dce.bin
[   4.4043 ] Kernel DTB used: kernel_tegra234-p3767-0000-p3768-0000-a0.dtb
[   4.4044 ] Concatenating kernel-dtb to dce-fw binary
[   4.4044 ] dce_bin = display-t234-dce.bin
[   4.4044 ] kernel_dtb = kernel_tegra234-p3767-0000-p3768-0000-a0.dtb
[   4.4044 ] dce_with_dtb = display-t234-dce_with_kernel_tegra234-p3767-0000-p3768-0000-a0.bin
[   4.4112 ] Update display-t234-dce_with_kernel_tegra234-p3767-0000-p3768-0000-a0.bin to dce_fw partitions
[   4.4139 ] Parsing partition layout
[   4.4151 ] tegraparser_v2 --pt flash.xml.tmp
[   4.4168 ] Creating list of images to be signed
[   4.4179 ] tegrahost_v2 --chip 0x23 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[   4.4189 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[   4.4199 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[   4.4202 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[   4.4247 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[   4.4250 ] Header already present for nvdec_t234_prod_aligned.fw
[   4.4277 ] adding BCH for mb2_t234_with_mb2_cold_boot_bct_MB2_aligned.bin
[   4.4336 ] adding BCH for xusb_t234_prod_aligned.bin
[   4.4480 ] Header already present for bpmp_t234-TE990M-A1_prod_aligned.bin
[   4.4553 ] adding BCH for tegra234-bpmp-3767-0000-a02-3509-a02_with_odm_aligned.dtb
[   4.4725 ] Header already present for pscfw_t234_prod_aligned.bin
[   4.4775 ] Header already present for mce_flash_o10_cr_prod_aligned.bin
[   4.4839 ] Header already present for sc7_t234_prod.bin
[   4.4872 ] Header already present for psc_rf_t234_prod_aligned.bin
[   4.4903 ] adding BCH for mb2rf_t234_aligned.bin
[   4.4924 ] adding BCH for uefi_jetson_with_dtb_aligned.bin
[   4.5028 ] adding BCH for tos-optee_t234_aligned.img
[   4.6063 ] adding BCH for eks_t234_aligned.img
[   4.6403 ] INFO: compressing display-t234-dce_with_kernel_tegra234-p3767-0000-p3768-0000-a0_aligned.bin
[   4.8065 ] INFO: complete compression, display-t234-dce_with_kernel_tegra234-p3767-0000-p3768-0000-a0_aligned.bin, ratio = 7%
[   4.8257 ] adding BCH for display-t234-dce_with_kernel_tegra234-p3767-0000-p3768-0000-a0_aligned_blob_w_bin_aligned.bin
[   4.8424 ] adding BCH for spe_t234_aligned.bin
[   4.8549 ] adding BCH for camera-rtcpu-t234-rce_aligned.img
[   4.8641 ] adding BCH for adsp-fw_aligned.bin
[   4.8818 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[   4.8952 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[   4.8955 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[   4.9001 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[   4.9004 ] Header already present for nvdec_t234_prod_aligned.fw
[   4.9028 ] adding BCH for mb2_t234_with_mb2_cold_boot_bct_MB2_aligned.bin
[   4.9085 ] adding BCH for xusb_t234_prod_aligned.bin
[   4.9227 ] Header already present for bpmp_t234-TE990M-A1_prod_aligned.bin
[   4.9302 ] adding BCH for tegra234-bpmp-3767-0000-a02-3509-a02_with_odm_aligned.dtb
[   4.9476 ] Header already present for pscfw_t234_prod_aligned.bin
[   4.9527 ] Header already present for mce_flash_o10_cr_prod_aligned.bin
[   4.9593 ] Header already present for sc7_t234_prod.bin
[   4.9626 ] Header already present for psc_rf_t234_prod_aligned.bin
[   4.9984 ] adding BCH for mb2rf_t234_aligned.bin
[   5.0025 ] adding BCH for uefi_jetson_with_dtb_aligned.bin
[   5.0170 ] adding BCH for tos-optee_t234_aligned.img
[   5.1217 ] adding BCH for eks_t234_aligned.img
[   5.1560 ] INFO: compressing display-t234-dce_with_kernel_tegra234-p3767-0000-p3768-0000-a0_aligned.bin
[   5.5337 ] INFO: complete compression, display-t234-dce_with_kernel_tegra234-p3767-0000-p3768-0000-a0_aligned.bin, ratio = 7%
[   5.5529 ] adding BCH for display-t234-dce_with_kernel_tegra234-p3767-0000-p3768-0000-a0_aligned_blob_w_bin_aligned.bin
[   5.5697 ] adding BCH for spe_t234_aligned.bin
[   5.5821 ] adding BCH for camera-rtcpu-t234-rce_aligned.img
[   5.5915 ] adding BCH for adsp-fw_aligned.bin
[   5.6226 ] Filling MB1 storage info
[   5.6227 ] Parsing dev params for multi chains
[   5.6285 ] Generating br-bct
[   5.6296 ] Updating dev and MSS params in BR BCT
[   5.6297 ] tegrabct_v2 --dev_param tegra234-br-bct-p3767-0000-l4t_cpp.dtb --sdram tegra234-p3767-0000-sdram-l4t_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[   5.7348 ] Updating bl info
[   5.7359 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo flash.xml.bin
[   5.7436 ] Generating br-bct
[   5.7447 ] Updating dev and MSS params in BR BCT
[   5.7448 ] tegrabct_v2 --dev_param tegra234-br-bct_b-p3767-0000-l4t_cpp.dtb --sdram tegra234-p3767-0000-sdram-l4t_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[   5.8497 ] Updating bl info
[   5.8509 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo flash.xml.bin
[   5.8526 ] Generating BCT backup image
[   5.8527 ] dd if=/dev/zero of=bct_backup.img bs=1 count=32768
[   5.8538 ] 32768+0 records in
[   5.9125 ] 32768+0 records out
[   5.9125 ] 32768 bytes (33 kB, 32 KiB) copied, 0.0580667 s, 564 kB/s
[   5.9126 ] 
[   5.9126 ] Concatenating BCT for chain A to bct_backup.img

[   5.9126 ] dd if=br_bct_BR.bct of=bct_backup.img bs=1 seek=0 conv=notrunc
[   5.9135 ] 8192+0 records in
[   5.9255 ] 8192+0 records out
[   5.9256 ] 8192 bytes (8.2 kB, 8.0 KiB) copied, 0.0116614 s, 702 kB/s
[   5.9256 ] 
[   5.9256 ] Concatenating BCT for chain B to bct_backup.img

[   5.9256 ] dd if=br_bct_b_BR.bct of=bct_backup.img bs=1 seek=16384 conv=notrunc
[   5.9266 ] 8192+0 records in
[   5.9388 ] 8192+0 records out
[   5.9388 ] 8192 bytes (8.2 kB, 8.0 KiB) copied, 0.0118307 s, 692 kB/s
[   5.9388 ] 
[   5.9388 ] Generating signatures
[   5.9396 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key --sha sha512
[   5.9399 ] Assuming zero filled SBK key
[   6.3023 ] Warning: pub_key.key is not found
[   6.3082 ] Parsing dev params for multi chains
[   6.3082 ] Generating br-bct
[   6.3092 ] Updating dev and MSS params in BR BCT
[   6.3094 ] tegrabct_v2 --dev_param tegra234-br-bct-p3767-0000-l4t_cpp.dtb --sdram tegra234-p3767-0000-sdram-l4t_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[   6.4120 ] Updating bl info
[   6.4130 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   6.4153 ] Get Signed section of bct
[   6.4163 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml
[   6.4177 ] Signing BCT
[   6.4184 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   6.4187 ] Assuming zero filled SBK key
[   6.4219 ] Sha saved in br_bct_BR.sha
[   6.4224 ] Warning: pub_key.key is not found
[   6.4217 ] Updating BCT with signature
[   6.4228 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml
[   6.4237 ] Offset :4608 Len :3584
[   6.4240 ] Generating SHA2 Hash
[   6.4248 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512
[   6.4250 ] Assuming zero filled SBK key
[   6.4250 ] Assuming zero filled SBK key
[   6.4284 ] Sha saved in br_bct_BR.sha
[   6.4282 ] Updating BCT with SHA2 Hash
[   6.4293 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml
[   6.4305 ] Offset :4608 Len :3584
[   6.4307 ] Offset :68 Len :8124
[   6.4309 ] Generating br-bct
[   6.4321 ] Updating dev and MSS params in BR BCT
[   6.4322 ] tegrabct_v2 --dev_param tegra234-br-bct_b-p3767-0000-l4t_cpp.dtb --sdram tegra234-p3767-0000-sdram-l4t_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[   6.5370 ] Updating bl info
[   6.5381 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   6.5404 ] Get Signed section of bct
[   6.5415 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml
[   6.5428 ] Signing BCT
[   6.5436 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   6.5439 ] Assuming zero filled SBK key
[   6.5473 ] Sha saved in br_bct_BR.sha
[   6.5478 ] Warning: pub_key.key is not found
[   6.5471 ] Updating BCT with signature
[   6.5483 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml
[   6.5494 ] Offset :4608 Len :3584
[   6.5498 ] Generating SHA2 Hash
[   6.5506 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512
[   6.5508 ] Assuming zero filled SBK key
[   6.5509 ] Assuming zero filled SBK key
[   6.5544 ] Sha saved in br_bct_BR.sha
[   6.5542 ] Updating BCT with SHA2 Hash
[   6.5554 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml
[   6.5565 ] Offset :4608 Len :3584
[   6.5569 ] Offset :68 Len :8124
[   6.5569 ] 
[   6.5571 ] Generating BCT backup image
[   6.5571 ] dd if=/dev/zero of=bct_backup.img bs=1 count=32768
[   6.5584 ] 32768+0 records in
[   6.6185 ] 32768+0 records out
[   6.6185 ] 32768 bytes (33 kB, 32 KiB) copied, 0.0595975 s, 550 kB/s
[   6.6185 ] 
[   6.6186 ] Concatenating BCT for chain A to bct_backup.img

[   6.6186 ] dd if=br_bct_BR.bct of=bct_backup.img bs=1 seek=0 conv=notrunc
[   6.6195 ] 8192+0 records in
[   6.6316 ] 8192+0 records out
[   6.6316 ] 8192 bytes (8.2 kB, 8.0 KiB) copied, 0.0116993 s, 700 kB/s
[   6.6317 ] 
[   6.6317 ] Concatenating BCT for chain B to bct_backup.img

[   6.6317 ] dd if=br_bct_b_BR.bct of=bct_backup.img bs=1 seek=16384 conv=notrunc
[   6.6327 ] 8192+0 records in
[   6.6448 ] 8192+0 records out
[   6.6448 ] 8192 bytes (8.2 kB, 8.0 KiB) copied, 0.0117574 s, 697 kB/s
[   6.6448 ] 
[   6.6449 ] Generating coldboot mb1-bct
[   6.6459 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --wb0sdram tegra234-p3767-0000-wb0sdram-l4t_cpp.dtb --pinmux tegra234-mb1-bct-pinmux-p3767-dp-a03_cpp.dtb --pmc tegra234-mb1-bct-padvoltage-p3767-dp-a03_cpp.dtb --pmic tegra234-mb1-bct-pmic-p3767-0000-a02_cpp.dtb --brcommand tegra234-mb1-bct-reset-p3767-0000_cpp.dtb --prod tegra234-mb1-bct-prod-p3767-0000_cpp.dtb --gpioint tegra234-mb1-bct-gpioint-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --deviceprod tegra234-mb1-bct-cprod-p3767-0000_cpp.dtb
[   6.6470 ] MB1-BCT version: 0.9
[   6.6471 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED5/ is not supported
[   6.6476 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED5/ is not supported
[   6.6480 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED5/ is not supported
[   6.6483 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_MCE_COVERAGE/ is not supported
[   6.6487 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_MCE_COVERAGE/ is not supported
[   6.6491 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_MCE_COVERAGE/ is not supported
[   6.6494 ] ERROR: /misc/vmon/vdd_soc/int/ is not supported
[   6.6497 ] ERROR: /misc/vmon/vdd_soc/int/ is not supported
[   6.6499 ] ERROR: /misc/vmon/vdd_cpu/int/ is not supported
[   6.6502 ] ERROR: /misc/vmon/vdd_cpu/int/ is not supported

[   6.6504 ] Parsing config file :tegra234-mb1-bct-pinmux-p3767-dp-a03_cpp.dtb 
[   6.6507 ] Added Platform Config 0 data with size :- 2416

[   6.6511 ] Parsing config file :tegra234-mb1-bct-padvoltage-p3767-dp-a03_cpp.dtb 
[   6.6515 ] WARNING: unknown node 'g2'
[   6.6515 ] WARNING: unknown node 'g2'
[   6.6515 ] WARNING: unknown node 'g9'
[   6.6515 ] WARNING: unknown node 'g9'
[   6.6515 ] Added Platform Config 2 data with size :- 24
[   6.6515 ] 
[   6.6515 ] Parsing config file :tegra234-mb1-bct-pmic-p3767-0000-a02_cpp.dtb 
[   6.6515 ] Added Platform Config 4 data with size :- 264
[   6.6515 ] 
[   6.6515 ] Parsing config file :tegra234-mb1-bct-reset-p3767-0000_cpp.dtb 
[   6.6515 ] Added Platform Config 3 data with size :- 52
[   6.6515 ] 
[   6.6515 ] Parsing config file :tegra234-mb1-bct-prod-p3767-0000_cpp.dtb 
[   6.6516 ] WARNING: unknown property 'major'
[   6.6516 ] WARNING: unknown property 'minor'
[   6.6516 ] Added Platform Config 5 data with size :- 500
[   6.6516 ] 
[   6.6516 ] Parsing config file :tegra234-mb1-bct-gpioint-p3767-0000_cpp.dtb 
[   6.6516 ] WARNING: unknown property 'major'
[   6.6516 ] WARNING: unknown property 'minor'
[   6.6516 ] Added Platform Config 7 data with size :- 380
[   6.6516 ] 
[   6.6516 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb 
[   6.6516 ] Added Platform Config 9 data with size :- 100
[   6.6516 ] 
[   6.6516 ] Parsing config file :tegra234-mb1-bct-cprod-p3767-0000_cpp.dtb 
[   6.6516 ] ModuleCount 0 NumProdNames 0
[   6.6516 ] Added Platform Config 6 data with size :- 16
[   6.6516 ] 
[   6.6517 ] Updating mb1-bct with firmware information
[   6.6527 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[   6.6555 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct
[   6.6580 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk
[   6.6592 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[   6.6610 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   6.6612 ] Assuming zero filled SBK key
[   6.6632 ] Warning: pub_key.key is not found
[   6.6636 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk
[   6.6652 ] Generating recovery mb1-bct
[   6.6662 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --wb0sdram tegra234-p3767-0000-wb0sdram-l4t_cpp.dtb --pinmux tegra234-mb1-bct-pinmux-p3767-dp-a03_cpp.dtb --pmc tegra234-mb1-bct-padvoltage-p3767-dp-a03_cpp.dtb --pmic tegra234-mb1-bct-pmic-p3767-0000-a02_cpp.dtb --brcommand tegra234-mb1-bct-reset-p3767-0000_cpp.dtb --prod tegra234-mb1-bct-prod-p3767-0000_cpp.dtb --gpioint tegra234-mb1-bct-gpioint-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --deviceprod tegra234-mb1-bct-cprod-p3767-0000_cpp.dtb
[   6.6672 ] MB1-BCT version: 0.9
[   6.6674 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED5/ is not supported
[   6.6680 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED5/ is not supported
[   6.6683 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED5/ is not supported
[   6.6687 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_MCE_COVERAGE/ is not supported
[   6.6690 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_MCE_COVERAGE/ is not supported
[   6.6694 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_MCE_COVERAGE/ is not supported
[   6.6698 ] ERROR: /misc/vmon/vdd_soc/int/ is not supported
[   6.6701 ] ERROR: /misc/vmon/vdd_soc/int/ is not supported
[   6.6703 ] ERROR: /misc/vmon/vdd_cpu/int/ is not supported
[   6.6705 ] ERROR: /misc/vmon/vdd_cpu/int/ is not supported

[   6.6707 ] Parsing config file :tegra234-mb1-bct-pinmux-p3767-dp-a03_cpp.dtb 
[   6.6710 ] Added Platform Config 0 data with size :- 2416

[   6.6713 ] Parsing config file :tegra234-mb1-bct-padvoltage-p3767-dp-a03_cpp.dtb 
[   6.6716 ] WARNING: unknown node 'g2'
[   6.6716 ] WARNING: unknown node 'g2'
[   6.6716 ] WARNING: unknown node 'g9'
[   6.6716 ] WARNING: unknown node 'g9'
[   6.6716 ] Added Platform Config 2 data with size :- 24
[   6.6716 ] 
[   6.6716 ] Parsing config file :tegra234-mb1-bct-pmic-p3767-0000-a02_cpp.dtb 
[   6.6716 ] Added Platform Config 4 data with size :- 264
[   6.6716 ] 
[   6.6716 ] Parsing config file :tegra234-mb1-bct-reset-p3767-0000_cpp.dtb 
[   6.6716 ] Added Platform Config 3 data with size :- 52
[   6.6716 ] 
[   6.6716 ] Parsing config file :tegra234-mb1-bct-prod-p3767-0000_cpp.dtb 
[   6.6716 ] WARNING: unknown property 'major'
[   6.6716 ] WARNING: unknown property 'minor'
[   6.6717 ] Added Platform Config 5 data with size :- 500
[   6.6717 ] 
[   6.6717 ] Parsing config file :tegra234-mb1-bct-gpioint-p3767-0000_cpp.dtb 
[   6.6717 ] WARNING: unknown property 'major'
[   6.6717 ] WARNING: unknown property 'minor'
[   6.6717 ] Added Platform Config 7 data with size :- 380
[   6.6717 ] 
[   6.6717 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb 
[   6.6717 ] Added Platform Config 9 data with size :- 100
[   6.6717 ] 
[   6.6717 ] Parsing config file :tegra234-mb1-bct-cprod-p3767-0000_cpp.dtb 
[   6.6717 ] ModuleCount 0 NumProdNames 0
[   6.6717 ] Added Platform Config 6 data with size :- 16
[   6.6717 ] 
[   6.6717 ] Updating mb1-bct with firmware information
[   6.6727 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo flash.xml.bin
[   6.6754 ] tegrahost_v2 --chip 0x23 0 --align mb1_bct_MB1_aligned.bct
[   6.6778 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_bct_MB1_aligned.bct zerosbk
[   6.6790 ] adding BCH for mb1_bct_MB1_aligned.bct
[   6.6809 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   6.6811 ] Assuming zero filled SBK key
[   6.6831 ] Warning: pub_key.key is not found
[   6.6837 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk
[   6.6853 ] Generating coldboot mem-bct
[   6.6865 ] tegrabct_v2 --chip 0x23 0 --sdram tegra234-p3767-0000-sdram-l4t_cpp.dtb --wb0sdram tegra234-p3767-0000-wb0sdram-l4t_cpp.dtb --membct tegra234-p3767-0000-sdram-l4t_cpp_1.bct tegra234-p3767-0000-sdram-l4t_cpp_2.bct tegra234-p3767-0000-sdram-l4t_cpp_3.bct tegra234-p3767-0000-sdram-l4t_cpp_4.bct
[   6.6876 ]  packing sdram params with Wb0 file tegra234-p3767-0000-wb0sdram-l4t_cpp.dtb
[   6.7912 ] Packing sdram param for instance[0]
[   6.7914 ] Packing sdram param for instance[1]
[   6.7916 ] Packing sdram param for instance[2]
[   6.7917 ] Packing sdram param for instance[3]
[   6.7919 ] Packing sdram param for instance[4]
[   6.7921 ] Packing sdram param for instance[5]
[   6.7922 ] Packing sdram param for instance[6]
[   6.7924 ] Packing sdram param for instance[7]
[   6.7926 ] Packing sdram param for instance[8]
[   6.7927 ] Packing sdram param for instance[9]
[   6.7929 ] Packing sdram param for instance[10]
[   6.7931 ] Packing sdram param for instance[11]
[   6.7933 ] Packing sdram param for instance[12]
[   6.7935 ] Packing sdram param for instance[13]
[   6.7936 ] Packing sdram param for instance[14]
[   6.7938 ] Packing sdram param for instance[15]
[   6.8933 ] Getting sector size from pt
[   6.8947 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin
[   6.8961 ] BlockSize read from layout is 0x200

[   6.8973 ] tegrahost_v2 --chip 0x23 0 --blocksize 512 --magicid MEMB --addsigheader_multi tegra234-p3767-0000-sdram-l4t_cpp_1.bct tegra234-p3767-0000-sdram-l4t_cpp_2.bct tegra234-p3767-0000-sdram-l4t_cpp_3.bct tegra234-p3767-0000-sdram-l4t_cpp_4.bct
[   6.8984 ] Binary 0 length is 58752
[   6.8986 ] Binary 0 align length is 58880
[   6.8997 ] Binary 1 length is 58752
[   6.8998 ] Binary 1 align length is 58880
[   6.9007 ] Binary 2 length is 58752
[   6.9008 ] Binary 2 align length is 58880
[   6.9019 ] Binary 3 length is 58752
[   6.9020 ] Binary 3 align length is 58880
[   6.9030 ] Buffer length is 235520
[   6.9031 ] adding BCH for tegra234-p3767-0000-sdram-l4t_cpp_1.bct
[   6.9034 ] new length is 243712
[   6.9034 ] 
[   6.9048 ] tegrahost_v2 --chip 0x23 0 --align mem_coldboot_aligned.bct
[   6.9070 ] tegrahost_v2 --chip 0x23 0 --magicid MEMB --appendsigheader mem_coldboot_aligned.bct zerosbk
[   6.9082 ] Header already present for mem_coldboot_aligned.bct
[   6.9100 ] tegrasign_v3.py --key None --list mem_coldboot_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   6.9103 ] Assuming zero filled SBK key
[   6.9127 ] Warning: pub_key.key is not found
[   6.9132 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mem_coldboot_aligned_sigheader.bct.encrypt mem_coldboot_aligned_sigheader.bct.hash zerosbk
[   6.9155 ] Generating recovery mem-bct
[   6.9166 ] tegrabct_v2 --chip 0x23 0 --sdram tegra234-p3767-0000-sdram-l4t_cpp.dtb --wb0sdram tegra234-p3767-0000-wb0sdram-l4t_cpp.dtb --membct tegra234-p3767-0000-sdram-l4t_cpp_1.bct tegra234-p3767-0000-sdram-l4t_cpp_2.bct tegra234-p3767-0000-sdram-l4t_cpp_3.bct tegra234-p3767-0000-sdram-l4t_cpp_4.bct
[   6.9176 ]  packing sdram params with Wb0 file tegra234-p3767-0000-wb0sdram-l4t_cpp.dtb
[   7.0205 ] Packing sdram param for instance[0]
[   7.0206 ] Packing sdram param for instance[1]
[   7.0208 ] Packing sdram param for instance[2]
[   7.0210 ] Packing sdram param for instance[3]
[   7.0211 ] Packing sdram param for instance[4]
[   7.0213 ] Packing sdram param for instance[5]
[   7.0215 ] Packing sdram param for instance[6]
[   7.0216 ] Packing sdram param for instance[7]
[   7.0218 ] Packing sdram param for instance[8]
[   7.0220 ] Packing sdram param for instance[9]
[   7.0222 ] Packing sdram param for instance[10]
[   7.0223 ] Packing sdram param for instance[11]
[   7.0225 ] Packing sdram param for instance[12]
[   7.0227 ] Packing sdram param for instance[13]
[   7.0229 ] Packing sdram param for instance[14]
[   7.0230 ] Packing sdram param for instance[15]
[   7.1225 ] Reading ramcode from backup chip_info.bin file
[   7.1226 ] RAMCODE Read from Device: 0

[   7.1226 ] Using ramcode 0
[   7.1226 ] Disabled BPMP dtb trim, using default dtb
[   7.1226 ] 
[   7.1240 ] tegrahost_v2 --chip 0x23 0 --align mem_rcm_aligned.bct
[   7.1264 ] tegrahost_v2 --chip 0x23 0 --magicid MEM0 --appendsigheader mem_rcm_aligned.bct zerosbk
[   7.1276 ] adding BCH for mem_rcm_aligned.bct
[   7.1312 ] tegrasign_v3.py --key None --list mem_rcm_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   7.1314 ] Assuming zero filled SBK key
[   7.1335 ] Warning: pub_key.key is not found
[   7.1341 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mem_rcm_aligned_sigheader.bct.encrypt mem_rcm_aligned_sigheader.bct.hash zerosbk
[   7.1358 ] Copying signatures
[   7.1369 ] tegrahost_v2 --chip 0x23 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   7.5583 ] mb1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[   7.5589 ] psc_bl1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[   7.5589 ] Boot Rom communication
[   7.5602 ] tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[   7.5611 ] BR_CID: 0x80012344705DD1903C0000000BFF0080
[   7.5868 ] Sending bct_br
[   7.6300 ] Sending mb1
[   7.7207 ] Sending psc_bl1
[   7.7294 ] Sending bct_mb1
[   7.7354 ] Boot Rom communication completed
[   7.7355 ] Generating blob for T23x
[   7.7465 ] tegrahost_v2 --chip 0x23 0 --align blob_uefi_jetson_with_dtb_aligned.bin
[   7.7502 ] tegrahost_v2 --chip 0x23 0 --magicid CPBL --appendsigheader blob_uefi_jetson_with_dtb_aligned.bin zerosbk
[   7.7513 ] adding BCH for blob_uefi_jetson_with_dtb_aligned.bin
[   7.8571 ] tegrasign_v3.py --key None --list blob_uefi_jetson_with_dtb_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   7.8573 ] Assuming zero filled SBK key
[   7.8655 ] Warning: pub_key.key is not found
[   7.8664 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_uefi_jetson_with_dtb_aligned_sigheader.bin.encrypt blob_uefi_jetson_with_dtb_aligned_sigheader.bin.hash zerosbk
[   7.8753 ] Get magic id
[   7.8765 ] tegraparser_v2 --get_magic psc_fw
[   7.8775 ] PFWP
[   7.8775 ] 
[   7.8776 ] partition type psc_fw, magic id = PFWP
[   7.8792 ] tegrahost_v2 --chip 0x23 0 --align blob_pscfw_t234_prod_aligned.bin
[   7.8815 ] tegrahost_v2 --chip 0x23 0 --magicid PFWP --appendsigheader blob_pscfw_t234_prod_aligned.bin zerosbk
[   7.8826 ] Header already present for blob_pscfw_t234_prod_aligned.bin
[   7.8914 ] tegrasign_v3.py --key None --list blob_pscfw_t234_prod_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   7.8916 ] Assuming zero filled SBK key
[   7.8941 ] Warning: pub_key.key is not found
[   7.8945 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_pscfw_t234_prod_aligned_sigheader.bin.encrypt blob_pscfw_t234_prod_aligned_sigheader.bin.hash zerosbk
[   7.8969 ] Get magic id
[   7.8978 ] tegraparser_v2 --get_magic mts_mce
[   7.8989 ] MTSM
[   7.8989 ] 
[   7.8989 ] partition type mts_mce, magic id = MTSM
[   7.9004 ] tegrahost_v2 --chip 0x23 0 --align blob_mce_flash_o10_cr_prod_aligned.bin
[   7.9029 ] tegrahost_v2 --chip 0x23 0 --magicid MTSM --appendsigheader blob_mce_flash_o10_cr_prod_aligned.bin zerosbk
[   7.9041 ] Header already present for blob_mce_flash_o10_cr_prod_aligned.bin
[   7.9090 ] tegrasign_v3.py --key None --list blob_mce_flash_o10_cr_prod_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   7.9093 ] Assuming zero filled SBK key
[   7.9116 ] Warning: pub_key.key is not found
[   7.9121 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_mce_flash_o10_cr_prod_aligned_sigheader.bin.encrypt blob_mce_flash_o10_cr_prod_aligned_sigheader.bin.hash zerosbk
[   7.9144 ] Get magic id
[   7.9155 ] tegraparser_v2 --get_magic mb2_applet
[   7.9167 ] MB2A
[   7.9167 ] 
[   7.9168 ] partition type mb2_applet, magic id = MB2A
[   7.9184 ] tegrahost_v2 --chip 0x23 0 --align blob_applet_t234_aligned.bin
[   7.9209 ] tegrahost_v2 --chip 0x23 0 --magicid MB2A --appendsigheader blob_applet_t234_aligned.bin zerosbk
[   7.9220 ] adding BCH for blob_applet_t234_aligned.bin
[   7.9352 ] tegrasign_v3.py --key None --list blob_applet_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   7.9354 ] Assuming zero filled SBK key
[   7.9381 ] Warning: pub_key.key is not found
[   7.9386 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_applet_t234_aligned_sigheader.bin.encrypt blob_applet_t234_aligned_sigheader.bin.hash zerosbk
[   7.9420 ] Generating recovery mb2-bct
[   7.9421 ] tegrabct_v2 --chip 0x23 0 --mb2bct mb2_bct.cfg --recov --mb2bctcfg tegra234-mb2-bct-misc-p3767-0000_cpp.dtb --scr tegra234-mb2-bct-scr-p3767-0000_cpp.dtb
[   7.9432 ] WARNING: unknown property 'tfc_version'
[   7.9446 ] WARNING: unknown property 'addr_header_version'
[   7.9561 ] Updating mb2-bct with storage information
[   7.9571 ] tegrabct_v2 --chip 0x23 0 --mb2bct mb2_bct_MB2.bct --updatestorageinfo flash.xml.bin
[   7.9588 ] Concatenating mb2-bct to mb2 binary
[   7.9588 ] mb2_bin_file = mb2_t234.bin
[   7.9588 ] mb2_bct_file = mb2_bct_MB2.bct
[   7.9596 ] Get magic id
[   7.9608 ] tegraparser_v2 --get_magic mb2_bootloader
[   7.9620 ] MB2B
[   7.9620 ] 
[   7.9620 ] partition type mb2_bootloader, magic id = MB2B
[   7.9637 ] tegrahost_v2 --chip 0x23 0 --align blob_mb2_t234_with_mb2_bct_MB2_aligned.bin
[   7.9659 ] tegrahost_v2 --chip 0x23 0 --magicid MB2B --appendsigheader blob_mb2_t234_with_mb2_bct_MB2_aligned.bin zerosbk
[   7.9670 ] adding BCH for blob_mb2_t234_with_mb2_bct_MB2_aligned.bin
[   7.9841 ] tegrasign_v3.py --key None --list blob_mb2_t234_with_mb2_bct_MB2_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   7.9843 ] Assuming zero filled SBK key
[   7.9874 ] Warning: pub_key.key is not found
[   7.9878 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_mb2_t234_with_mb2_bct_MB2_aligned_sigheader.bin.encrypt blob_mb2_t234_with_mb2_bct_MB2_aligned_sigheader.bin.hash zerosbk
[   7.9904 ] Get magic id
[   7.9913 ] tegraparser_v2 --get_magic xusb_fw
[   7.9924 ] XUSB
[   7.9924 ] 
[   7.9924 ] partition type xusb_fw, magic id = XUSB
[   7.9939 ] tegrahost_v2 --chip 0x23 0 --align blob_xusb_t234_prod_aligned.bin
[   7.9963 ] tegrahost_v2 --chip 0x23 0 --magicid XUSB --appendsigheader blob_xusb_t234_prod_aligned.bin zerosbk
[   7.9976 ] adding BCH for blob_xusb_t234_prod_aligned.bin
[   8.0068 ] tegrasign_v3.py --key None --list blob_xusb_t234_prod_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   8.0071 ] Assuming zero filled SBK key
[   8.0097 ] Warning: pub_key.key is not found
[   8.0103 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_xusb_t234_prod_aligned_sigheader.bin.encrypt blob_xusb_t234_prod_aligned_sigheader.bin.hash zerosbk
[   8.0123 ] Kernel DTB used: kernel_tegra234-p3767-0000-p3768-0000-a0.dtb
[   8.0124 ] Concatenating kernel-dtb to dce-fw binary
[   8.0124 ] dce_bin = display-t234-dce.bin
[   8.0124 ] kernel_dtb = kernel_tegra234-p3767-0000-p3768-0000-a0.dtb
[   8.0124 ] dce_with_dtb = display-t234-dce_with_kernel_tegra234-p3767-0000-p3768-0000-a0.bin
[   8.0215 ] Get magic id
[   8.0228 ] tegraparser_v2 --get_magic dce_fw
[   8.0241 ] DCEF
[   8.0241 ] 
[   8.0241 ] partition type dce_fw, magic id = DCEF
[   8.0326 ] tegrahost_v2 --chip 0x23 0 --align blob_display-t234-dce_with_kernel_tegra234-p3767-0000-p3768-0000-a0_aligned.bin
[   8.0352 ] tegrahost_v2 --chip 0x23 0 --magicid DCEF --appendsigheader blob_display-t234-dce_with_kernel_tegra234-p3767-0000-p3768-0000-a0_aligned.bin zerosbk
[   8.0365 ] adding BCH for blob_display-t234-dce_with_kernel_tegra234-p3767-0000-p3768-0000-a0_aligned.bin
[   8.3494 ] tegrasign_v3.py --key None --list blob_display-t234-dce_with_kernel_tegra234-p3767-0000-p3768-0000-a0_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   8.3497 ] Assuming zero filled SBK key
[   8.3712 ] Warning: pub_key.key is not found
[   8.3721 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_display-t234-dce_with_kernel_tegra234-p3767-0000-p3768-0000-a0_aligned_sigheader.bin.encrypt blob_display-t234-dce_with_kernel_tegra234-p3767-0000-p3768-0000-a0_aligned_sigheader.bin.hash zerosbk
[   8.3928 ] Get magic id
[   8.3943 ] tegraparser_v2 --get_magic nvdec
[   8.3957 ] NDEC
[   8.3958 ] 
[   8.3958 ] partition type nvdec, magic id = NDEC
[   8.3980 ] tegrahost_v2 --chip 0x23 0 --align blob_nvdec_t234_prod_aligned.fw
[   8.4005 ] tegrahost_v2 --chip 0x23 0 --magicid NDEC --appendsigheader blob_nvdec_t234_prod_aligned.fw zerosbk
[   8.4018 ] Header already present for blob_nvdec_t234_prod_aligned.fw
[   8.4080 ] tegrasign_v3.py --key None --list blob_nvdec_t234_prod_aligned_sigheader.fw_list.xml --pubkeyhash pub_key.key --sha sha512
[   8.4083 ] Assuming zero filled SBK key
[   8.4110 ] Warning: pub_key.key is not found
[   8.4116 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_nvdec_t234_prod_aligned_sigheader.fw.encrypt blob_nvdec_t234_prod_aligned_sigheader.fw.hash zerosbk
[   8.4140 ] Get magic id
[   8.4151 ] tegraparser_v2 --get_magic bpmp_fw
[   8.4162 ] BPMF
[   8.4163 ] 
[   8.4163 ] partition type bpmp_fw, magic id = BPMF
[   8.4189 ] tegrahost_v2 --chip 0x23 0 --align blob_bpmp_t234-TE990M-A1_prod_aligned.bin
[   8.4214 ] tegrahost_v2 --chip 0x23 0 --magicid BPMF --appendsigheader blob_bpmp_t234-TE990M-A1_prod_aligned.bin zerosbk
[   8.4226 ] Header already present for blob_bpmp_t234-TE990M-A1_prod_aligned.bin
[   8.4425 ] tegrasign_v3.py --key None --list blob_bpmp_t234-TE990M-A1_prod_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   8.4428 ] Assuming zero filled SBK key
[   8.4468 ] Warning: pub_key.key is not found
[   8.4473 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_bpmp_t234-TE990M-A1_prod_aligned_sigheader.bin.encrypt blob_bpmp_t234-TE990M-A1_prod_aligned_sigheader.bin.hash zerosbk
[   8.4509 ] Using bpmp-dtb concatenated with odmdata in blob
[   8.4510 ] Get magic id
[   8.4520 ] tegraparser_v2 --get_magic bpmp_fw_dtb
[   8.4534 ] BPMD
[   8.4534 ] 
[   8.4535 ] partition type bpmp_fw_dtb, magic id = BPMD
[   8.4551 ] tegrahost_v2 --chip 0x23 0 --align blob_tegra234-bpmp-3767-0000-a02-3509-a02_with_odm_aligned.dtb
[   8.4576 ] tegrahost_v2 --chip 0x23 0 --magicid BPMD --appendsigheader blob_tegra234-bpmp-3767-0000-a02-3509-a02_with_odm_aligned.dtb zerosbk
[   8.4588 ] adding BCH for blob_tegra234-bpmp-3767-0000-a02-3509-a02_with_odm_aligned.dtb
[   8.4654 ] tegrasign_v3.py --key None --list blob_tegra234-bpmp-3767-0000-a02-3509-a02_with_odm_aligned_sigheader.dtb_list.xml --pubkeyhash pub_key.key --sha sha512
[   8.4656 ] Assuming zero filled SBK key
[   8.4680 ] Warning: pub_key.key is not found
[   8.4686 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_tegra234-bpmp-3767-0000-a02-3509-a02_with_odm_aligned_sigheader.dtb.encrypt blob_tegra234-bpmp-3767-0000-a02-3509-a02_with_odm_aligned_sigheader.dtb.hash zerosbk
[   8.4707 ] Get magic id
[   8.4718 ] tegraparser_v2 --get_magic sce_fw
[   8.4729 ] SCEF
[   8.4729 ] 
[   8.4730 ] partition type sce_fw, magic id = SCEF
[   8.4746 ] tegrahost_v2 --chip 0x23 0 --align blob_camera-rtcpu-sce_aligned.img
[   8.4770 ] tegrahost_v2 --chip 0x23 0 --magicid SCEF --appendsigheader blob_camera-rtcpu-sce_aligned.img zerosbk
[   8.4782 ] adding BCH for blob_camera-rtcpu-sce_aligned.img
[   8.4856 ] tegrasign_v3.py --key None --list blob_camera-rtcpu-sce_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512
[   8.4858 ] Assuming zero filled SBK key
[   8.4882 ] Warning: pub_key.key is not found
[   8.4888 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_camera-rtcpu-sce_aligned_sigheader.img.encrypt blob_camera-rtcpu-sce_aligned_sigheader.img.hash zerosbk
[   8.4912 ] Get magic id
[   8.4924 ] tegraparser_v2 --get_magic rce_fw
[   8.4937 ] RCEF
[   8.4937 ] 
[   8.4937 ] partition type rce_fw, magic id = RCEF
[   8.4957 ] tegrahost_v2 --chip 0x23 0 --align blob_camera-rtcpu-t234-rce_aligned.img
[   8.4982 ] tegrahost_v2 --chip 0x23 0 --magicid RCEF --appendsigheader blob_camera-rtcpu-t234-rce_aligned.img zerosbk
[   8.4994 ] adding BCH for blob_camera-rtcpu-t234-rce_aligned.img
[   8.5212 ] tegrasign_v3.py --key None --list blob_camera-rtcpu-t234-rce_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512
[   8.5215 ] Assuming zero filled SBK key
[   8.5245 ] Warning: pub_key.key is not found
[   8.5250 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_camera-rtcpu-t234-rce_aligned_sigheader.img.encrypt blob_camera-rtcpu-t234-rce_aligned_sigheader.img.hash zerosbk
[   8.5280 ] Get magic id
[   8.5290 ] tegraparser_v2 --get_magic ape_fw
[   8.5303 ] APEF
[   8.5303 ] 
[   8.5303 ] partition type ape_fw, magic id = APEF
[   8.5321 ] tegrahost_v2 --chip 0x23 0 --align blob_adsp-fw_aligned.bin
[   8.5346 ] tegrahost_v2 --chip 0x23 0 --magicid APEF --appendsigheader blob_adsp-fw_aligned.bin zerosbk
[   8.5358 ] adding BCH for blob_adsp-fw_aligned.bin
[   8.5526 ] tegrasign_v3.py --key None --list blob_adsp-fw_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   8.5528 ] Assuming zero filled SBK key
[   8.5556 ] Warning: pub_key.key is not found
[   8.5561 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_adsp-fw_aligned_sigheader.bin.encrypt blob_adsp-fw_aligned_sigheader.bin.hash zerosbk
[   8.5584 ] Get magic id
[   8.5594 ] tegraparser_v2 --get_magic spe_fw
[   8.5605 ] SPEF
[   8.5606 ] 
[   8.5606 ] partition type spe_fw, magic id = SPEF
[   8.5622 ] tegrahost_v2 --chip 0x23 0 --align blob_spe_t234_aligned.bin
[   8.5650 ] tegrahost_v2 --chip 0x23 0 --magicid SPEF --appendsigheader blob_spe_t234_aligned.bin zerosbk
[   8.5663 ] adding BCH for blob_spe_t234_aligned.bin
[   8.5774 ] tegrasign_v3.py --key None --list blob_spe_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   8.5776 ] Assuming zero filled SBK key
[   8.5801 ] Warning: pub_key.key is not found
[   8.5806 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_spe_t234_aligned_sigheader.bin.encrypt blob_spe_t234_aligned_sigheader.bin.hash zerosbk
[   8.5828 ] Get magic id
[   8.5838 ] tegraparser_v2 --get_magic tos
[   8.5850 ] TOSB
[   8.5850 ] 
[   8.5850 ] partition type tos, magic id = TOSB
[   8.5874 ] tegrahost_v2 --chip 0x23 0 --align blob_tos-optee_t234_aligned.img
[   8.5897 ] tegrahost_v2 --chip 0x23 0 --magicid TOSB --appendsigheader blob_tos-optee_t234_aligned.img zerosbk
[   8.5909 ] adding BCH for blob_tos-optee_t234_aligned.img
[   8.6291 ] tegrasign_v3.py --key None --list blob_tos-optee_t234_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512
[   8.6294 ] Assuming zero filled SBK key
[   8.6333 ] Warning: pub_key.key is not found
[   8.6340 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_tos-optee_t234_aligned_sigheader.img.encrypt blob_tos-optee_t234_aligned_sigheader.img.hash zerosbk
[   8.6380 ] Get magic id
[   8.6392 ] tegraparser_v2 --get_magic eks
[   8.6404 ] EKSB
[   8.6405 ] 
[   8.6405 ] partition type eks, magic id = EKSB
[   8.6418 ] tegrahost_v2 --chip 0x23 0 --align blob_eks_t234_aligned.img
[   8.6444 ] tegrahost_v2 --chip 0x23 0 --magicid EKSB --appendsigheader blob_eks_t234_aligned.img zerosbk
[   8.6456 ] adding BCH for blob_eks_t234_aligned.img
[   8.6471 ] tegrasign_v3.py --key None --list blob_eks_t234_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512
[   8.6474 ] Assuming zero filled SBK key
[   8.6496 ] Warning: pub_key.key is not found
[   8.6502 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_eks_t234_aligned_sigheader.img.encrypt blob_eks_t234_aligned_sigheader.img.hash zerosbk
[   8.6536 ] tegrahost_v2 --chip 0x23 0 --generateblob blob.xml blob.bin
[   8.6548 ] The number of images in blob is 16
[   8.6551 ] blobsize is 17987312
[   8.6552 ] Added binary blob_uefi_jetson_with_dtb_sigheader.bin.encrypt of size 3171168
[   8.6640 ] Added binary blob_pscfw_t234_prod_sigheader.bin.encrypt of size 375168
[   8.6648 ] Added binary blob_mce_flash_o10_cr_prod_sigheader.bin.encrypt of size 190592
[   8.6652 ] Added binary blob_applet_t234_sigheader.bin.encrypt of size 277312
[   8.6656 ] Not supported type: mb2_applet
[   8.6658 ] Added binary blob_mb2_t234_with_mb2_bct_MB2_sigheader.bin.encrypt of size 437760
[   8.6662 ] Added binary blob_xusb_t234_prod_sigheader.bin.encrypt of size 164352
[   8.6666 ] Added binary blob_display-t234-dce_with_kernel_tegra234-p3767-0000-p3768-0000-a0_sigheader.bin.encrypt of size 9438928
[   8.6727 ] Added binary blob_nvdec_t234_prod_sigheader.fw.encrypt of size 294912
[   8.6750 ] Added binary blob_bpmp_t234-TE990M-A1_prod_sigheader.bin.encrypt of size 1047616
[   8.6758 ] Added binary blob_tegra234-bpmp-3767-0000-a02-3509-a02_with_odm_sigheader.dtb.encrypt of size 138880
[   8.6762 ] Added binary blob_camera-rtcpu-sce_sigheader.img.encrypt of size 166304
[   8.6766 ] Added binary blob_camera-rtcpu-t234-rce_sigheader.img.encrypt of size 537952
[   8.6769 ] Added binary blob_adsp-fw_sigheader.bin.encrypt of size 400944
[   8.6772 ] Added binary blob_spe_t234_sigheader.bin.encrypt of size 270336
[   8.6775 ] Added binary blob_tos-optee_t234_sigheader.img.encrypt of size 1064752
[   8.6779 ] Added binary blob_eks_t234_sigheader.img.encrypt of size 9232
[   8.6871 ] Sending membct and RCM blob
[   8.6885 ] tegrarcm_v2 --chip 0x23 0 --pollbl --download bct_mem mem_rcm_sigheader.bct.encrypt --download blob blob.bin
[   8.6897 ] BL: version 0.28.0.0-t234-54845784-ec016368 last_boot_error: 0
[   8.7184 ] Sending bct_mem
[   8.7622 ] Sending blob
[   9.9974 ] completed
[  11.0031 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[ 1018.2573 ] tegrarcm_v2 --chip 0x23 0 --ismb2
[ 2035.0679 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet

Hi 874752783,

Currently, the clone and backup through flash.sh is only available for internal eMMC.
There’s no internal eMMC for Orin NX.

Please refer to the following thread and use l4t_backup_restore.sh instead.
How to clone Orin NX APP partition to host PC - #6 by lhoang

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.