Hi,
We are experiencing an issue with our NVIDIA Jetson Xavier NX where the board gets stuck during the flashing process.
We have attempted to flash the eMMC and the NVMe on the Jetson Xavier NX using both the NVIDIA development board and our custom board. However, in both cases, the flashing process halts.
Furthermore, the board remains in recovery mode despite the FORCE_RECOVERY*
pin being high.
We cannot retrieve serial logs from the target.
Summary:
- Boards Used: Jetson Xavier NX Developer Kit, and our custom board
- Flashing Methods: NVIDIA SDK and custom Yocto build
- Jetpack Version: 5.1.2
- Issue when flashing the eMMC (tried with both NVIDIA SDK and Yocto): The board gets stuck at
tegrarcm_v2 --isapplet
- Issue when flashing the NVMe SSD (tried with Yocto): The board gets stuck at
== Step 3: Sending flash sequence commands at 2024-06-14T17:18:13+02:00 ==
Waiting for USB storage device flashpkg from 565ffc03...........
- Recovery Mode: The board is always in recovery mode
- Serial Console: Unable to retrieve any output. Testing with other Jetson boards we validated that the serial transceiver and the USB port are functional and outputting during the booting sequence.
Host-side log from the eMMC attempt flashing with the NVIDIA SDK manager
Sorry for the pastebin but I exceeded the characters limit.
[pastebin]
Host-side log from the NVMe attempt flashing with our custom Yocto build
Rootfs device: nvme0n1p1
Found Jetson device in recovery mode at USB 1-5
== Step 1: Signing binaries at 2024-06-14T17:17:53+02:00 ==
Found Jetson device in recovery mode at USB 1-5
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0160 ] Generating RCM messages
[ 0.0178 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod.bin zerosbk
[ 0.0183 ] Header already present for mb1_t194_prod.bin
[ 0.0262 ] tegrasign_v3.py --key None --getmode mode.txt
[ 0.0263 ] Assuming zero filled SBK key
[ 0.0280 ] tegrasign_v3.py --file mb1_t194_prod_sigheader.bin --key None --length 1136 --offset 2960 --pubkeyhash pub_key.key
[ 0.0281 ] Assuming zero filled SBK key
[ 0.0292 ] Warning: pub_key.key is not found
[ 0.0265 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin mb1_t194_prod_sigheader.hash zerosbk
[ 0.0306 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg.pdf sfuse.bin
[ 0.0327 ] tegrarcm_v2 --instance 1-5 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_sigheader.bin 0 0
[ 0.0332 ] RCM 0 is saved as rcm_0.rcm
[ 0.0352 ] RCM 1 is saved as rcm_1.rcm
[ 0.0354 ] RCM 2 is saved as rcm_2.rcm
[ 0.0354 ] List of rcm files are saved in rcm_list.xml
[ 0.0354 ]
[ 0.0354 ] Signing RCM messages
[ 0.0414 ] tegrasign_v3.py --key None --list rcm_list.xml --getmontgomeryvalues montgomery.bin --pubkeyhash pub_key.key
[ 0.0415 ] Assuming zero filled SBK key
[ 0.0442 ] Warning: pub_key.key is not found
[ 0.0398 ] Copying signature to RCM mesages
[ 0.0413 ] tegrarcm_v2 --instance 1-5 --chip 0x19 0 --updatesig rcm_list_signed.xml
[ 0.0421 ] Boot Rom communication
[ 0.0436 ] tegrarcm_v2 --instance 1-5 --chip 0x19 0 --rcm rcm_list_signed.xml --skipuid
[ 0.0441 ] RCM version 0X190001
[ 0.0491 ] Boot Rom communication completed
[ 2.0712 ] tegrarcm_v2 --instance 1-5 --isapplet
[ 2.0738 ] Applet version 01.00.0000
[ 2.0893 ] tegrarcm_v2 --instance 1-5 --ismb2
[ 2.1015 ] tegrahost_v2 --chip 0x19 --align nvtboot_applet_t194_aligned.bin
[ 2.1036 ] tegrahost_v2 --chip 0x19 0 --magicid PLDT --appendsigheader nvtboot_applet_t194_aligned.bin zerosbk
[ 2.1040 ] adding BCH for nvtboot_applet_t194_aligned.bin
[ 2.1135 ] tegrasign_v3.py --key None --list nvtboot_applet_t194_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 2.1137 ] Assuming zero filled SBK key
[ 2.1147 ] Warning: pub_key.key is not found
[ 2.1120 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_applet_t194_aligned_sigheader.bin.encrypt nvtboot_applet_t194_aligned_sigheader.bin.hash zerosbk
[ 2.1196 ] tegrarcm_v2 --instance 1-5 --download mb2 nvtboot_applet_t194_sigheader.bin.encrypt
[ 2.1211 ] Applet version 01.00.0000
[ 2.1435 ] Sending mb2
[ 2.1435 ] [................................................] 100%
[ 2.1620 ] tegrarcm_v2 --instance 1-5 --boot recovery
[ 2.1633 ] Applet version 01.00.0000
[ 3.1985 ] tegrarcm_v2 --instance 1-5 --isapplet
[ 3.2165 ] tegrarcm_v2 --instance 1-5 --ismb2
[ 3.2170 ] MB2 Applet version 01.00.0000
[ 3.2284 ] tegrarcm_v2 --instance 1-5 --ismb2
[ 3.2289 ] MB2 Applet version 01.00.0000
[ 3.2406 ] Retrieving board information
[ 3.2422 ] tegrarcm_v2 --instance 1-5 --oem platformdetails chip chip_info.bin
[ 3.2427 ] MB2 Applet version 01.00.0000
[ 3.2546 ] Saved platform info in chip_info.bin
[ 3.2588 ] Chip minor revision: 2
[ 3.2588 ] Bootrom revision: 0xf
[ 3.2589 ] Ram code: 0x0
[ 3.2589 ] Chip sku: 0xde
[ 3.2589 ] Chip Sample: non es
[ 3.2597 ] Retrieving EEPROM data
[ 3.2597 ] tegrarcm_v2 --instance 1-5 --oem platformdetails eeprom cvm /home/gmellone/sw_uav_ap_os/images/cvm.bin.hpn6A
[ 3.2602 ] MB2 Applet version 01.00.0000
[ 3.2716 ] Saved platform info in /home/gmellone/sw_uav_ap_os/images/cvm.bin.hpn6A
[ 3.3117 ] Rebooting to recovery mode
[ 3.3157 ] tegrarcm_v2 --instance 1-5 --ismb2
[ 3.3183 ] MB2 Applet version 01.00.0000
[ 3.3467 ] Rebooting to recovery mode
[ 3.3483 ] tegrarcm_v2 --instance 1-5 --reboot recovery
[ 3.3488 ] MB2 Applet version 01.00.0000
Board ID(3668) version(300) sku(0001) revision(B.0)
./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin --bldtb tegra194-p3668-all-p3509-0000.dtb --sdram_config tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg,tegra194-memcfg-sw-override.cfg --odmdata 0xB8190000 --applet mb1_t194_prod.bin --cmd "sign" --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --cfg flash.xml --chip 0x19 --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --device_config tegra19x-mb1-bct-device-qspi-p3668.cfg --misc_config tegra194-mb1-bct-misc-flash.cfg --misc_cold_boot_config tegra194-mb1-bct-misc-l4t.cfg --pinmux_config tegra19x-mb1-pinmux-p3668-a01.cfg --gpioint_config tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --pmic_config tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --pmc_config tegra19x-mb1-padvoltage-p3668-a01.cfg --prod_config tegra19x-mb1-prod-p3668-0001-a00.cfg --scr_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --scr_cold_boot_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --br_cmd_config tegra194-mb1-bct-reset-p3668-0001-a00.cfg --dev_params tegra194-br-bct-qspi-l4t.cfg,tegra194-br-bct_b-qspi-l4t.cfg --overlay_dtb L4TConfiguration.dtbo,L4TConfiguration-RootfsRedundancyLevelABEnable.dtbo,tegra194-p3668-p3509-overlay.dtbo --bct_backup --secondary_gpt_backup --bins "mb2_bootloader nvtboot_recovery_t194.bin; mts_preboot preboot_c10_prod_cr.bin; mts_mce mce_c10_prod_cr.bin; mts_proper mts_c10_prod_cr.bin; bpmp_fw bpmp-2_t194.bin; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00_lz4.dtb; spe_fw spe_t194.bin; tos tos-optee_t194.img; eks eks.img; bootloader_dtb tegra194-p3668-all-p3509-0000.dtb" --instance 1-5 --secondary_gpt_backup --bct_backup
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0042 ] Reading ramcode from backup chip_info.bin file
[ 0.0042 ] RAMCODE Read from Device: 0
[ 0.0042 ] Disable BPMP dtb trim, using default dtb
[ 0.0042 ]
[ 0.0068 ] tegrasign_v3.py --key None --getmode mode.txt
[ 0.0069 ] Assuming zero filled SBK key
[ 0.0061 ] Generating RCM messages
[ 0.0076 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod.bin zerosbk
[ 0.0081 ] Header already present for mb1_t194_prod.bin
[ 0.0125 ] tegrasign_v3.py --key None --getmode mode.txt
[ 0.0125 ] Assuming zero filled SBK key
[ 0.0142 ] tegrasign_v3.py --file mb1_t194_prod_sigheader.bin --key None --length 1136 --offset 2960 --pubkeyhash pub_key.key
[ 0.0143 ] Assuming zero filled SBK key
[ 0.0155 ] Warning: pub_key.key is not found
[ 0.0162 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin mb1_t194_prod_sigheader.hash zerosbk
[ 0.0201 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg sfuse.bin
[ 0.0222 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg
[ 0.0226 ] FwIndex: 1, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 2, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 3, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 4, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 5, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 6, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 7, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 11, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 12, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 13, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 14, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 15, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 16, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 17, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 18, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 19, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 30, MinRatchetLevel: 0
[ 0.0228 ] FwIndex: 31, MinRatchetLevel: 0
[ 0.0228 ]
[ 0.0244 ] tegrarcm_v2 --instance 1-5 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_sigheader.bin 0 0
[ 0.0248 ] RCM 0 is saved as rcm_0.rcm
[ 0.0268 ] RCM 1 is saved as rcm_1.rcm
[ 0.0269 ] RCM 2 is saved as rcm_2.rcm
[ 0.0269 ] List of rcm files are saved in rcm_list.xml
[ 0.0269 ]
[ 0.0269 ] Signing RCM messages
[ 0.0294 ] tegrasign_v3.py --key None --list rcm_list.xml --getmontgomeryvalues montgomery.bin --pubkeyhash pub_key.key
[ 0.0295 ] Assuming zero filled SBK key
[ 0.0320 ] Warning: pub_key.key is not found
[ 0.0311 ] Copying signature to RCM mesages
[ 0.0327 ] tegrarcm_v2 --instance 1-5 --chip 0x19 0 --updatesig rcm_list_signed.xml
[ 0.0334 ] odmdata (to decode) = 3088646144
[ 0.0334 ] Odmdata strings: PCIE_XBAR_8_1_1_0_1,UFS_DISABLED,NVHS_PCIE,enable-debug-console,enable-denver-wdt
[ 0.0334 ] Bpmp odmdata config: {'pcie-xbar-config': [0, 1, 'PCIE_XBAR_8_1_1_0_1'], 'pcie-c0-endpoint-enable': [1, 0, ''], 'pcie-c4-endpoint-enable': [1, 0, ''], 'ufs-config': [0, 1, 'UFS_DISABLED'], 'sata-enable': [1, 0, ''], 'nvhs-owner': [0, 1, 'PCIE'], 'pcie-c5-endpoint-enable': [1, 0, '']}
[ 0.0339 ] bpmp_dtb is compressed; decompressing...
[ 0.0339 ] lz4c -df tegra194-a02-bpmp-p3668-a00_lz4.dtb tegra194-a02-bpmp-p3668-a00_lz4_with_odm.dtb
[ 0.0355 ]
[ 0.0362 ] tegra194-a02-bpmp-p3 : decoded 442560 bytes
[ 0.0362 ]
[ 0.1081 ] Re-compressing updated bpmp_dtb
[ 0.1081 ] lz4c -zf tegra194-a02-bpmp-p3668-a00_lz4_with_odm.dtb tegra194-a02-bpmp-p3668-a00_lz4.dtb
[ 0.1088 ]
[ 0.1094 ] Compressed 442529 bytes into 32067 bytes ==> 7.25%
[ 0.1094 ]
[ 0.2879 ] Concatenating L4TConfiguration.dtbo,L4TConfiguration-RootfsRedundancyLevelABEnable.dtbo,tegra194-p3668-p3509-overlay.dtbo to tegra194-p3668-all-p3509-0000_with_odm_overlay.dtb
[ 0.2882 ] Parsing partition layout
[ 0.2901 ] tegraparser_v2 --pt flash.xml.tmp
[ 0.2908 ] Creating list of images to be signed
[ 0.2924 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --ratchet_blob ratchet_blob.bin --list images_list.xml zerosbk
[ 0.2930 ] Filling MB1 storage info
[ 0.2930 ] Parsing dev params for multi chains
[ 0.2930 ] Generating br-bct
[ 0.2946 ] Performing cfg overlay
[ 0.2946 ] ['tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg', 'tegra194-memcfg-sw-override.cfg']
[ 0.2947 ] sw_memcfg_overlay.pl -c tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg -s tegra194-memcfg-sw-override.cfg -o /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1.cfg
[ 0.3223 ] Updating dev and MSS params in BR BCT
[ 0.3224 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi-l4t.cfg --sdram /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0
[ 0.3512 ] Updating bl info
[ 0.3529 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin
[ 0.3535 ] Generating br-bct
[ 0.3551 ] Performing cfg overlay
[ 0.3551 ] ['/home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1.cfg']
[ 0.3551 ] Updating dev and MSS params in BR BCT
[ 0.3551 ] tegrabct_v2 --dev_param tegra194-br-bct_b-qspi-l4t.cfg --sdram /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0
[ 0.3832 ] Updating bl info
[ 0.3849 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin
[ 0.3855 ] Generating BCT backup image
[ 0.3856 ] dd if=/dev/zero of=bct_backup.img bs=1 count=32768
[ 0.3864 ] 32768+0 records in
[ 0.4129 ] 32768+0 records out
[ 0.4129 ] 32768 bytes (33 kB, 32 KiB) copied, 0,0260096 s, 1,3 MB/s
[ 0.4129 ]
[ 0.4130 ] Concatenating BCT for chain A to bct_backup.img
[ 0.4130 ] dd if=br_bct_BR.bct of=bct_backup.img bs=1 seek=0 conv=notrunc
[ 0.4136 ] 2888+0 records in
[ 0.4155 ] 2888+0 records out
[ 0.4156 ] 2888 bytes (2,9 kB, 2,8 KiB) copied, 0,00177635 s, 1,6 MB/s
[ 0.4156 ]
[ 0.4156 ] Concatenating BCT for chain B to bct_backup.img
[ 0.4156 ] dd if=br_bct_b_BR.bct of=bct_backup.img bs=1 seek=16384 conv=notrunc
[ 0.4162 ] 2888+0 records in
[ 0.4181 ] 2888+0 records out
[ 0.4181 ] 2888 bytes (2,9 kB, 2,8 KiB) copied, 0,00170912 s, 1,7 MB/s
[ 0.4181 ]
[ 0.4181 ] Generating signatures
[ 0.4207 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key
[ 0.4208 ] Assuming zero filled SBK key
[ 0.4210 ] Warning: pub_key.key is not found
[ 0.4201 ] Parsing dev params for multi chains
[ 0.4201 ] Generating br-bct
[ 0.4217 ] Performing cfg overlay
[ 0.4217 ] ['/home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1.cfg']
[ 0.4217 ] Updating dev and MSS params in BR BCT
[ 0.4217 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi-l4t.cfg --sdram /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0
[ 0.4496 ] Updating bl info
[ 0.4512 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[ 0.4519 ] Updating smd info
[ 0.4535 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 --updatesmdinfo flash.xml.bin
[ 0.4542 ] Updating Odmdata
[ 0.4559 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0xB8190000
[ 0.4566 ] Signing BCT
[ 0.4566 ] Get Signed section of bct
[ 0.4582 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listbct bct_list.xml
[ 0.4615 ] tegrasign_v3.py --key None --list bct_list.xml --getmontgomeryvalues montgomery.bin --pubkeyhash pub_key.key
[ 0.4616 ] Assuming zero filled SBK key
[ 0.4626 ] Warning: pub_key.key is not found
[ 0.4617 ] Updating BCT with signature
[ 0.4633 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml
[ 0.4641 ] Generating br-bct
[ 0.4657 ] Performing cfg overlay
[ 0.4657 ] ['/home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1.cfg']
[ 0.4657 ] Updating dev and MSS params in BR BCT
[ 0.4658 ] tegrabct_v2 --dev_param tegra194-br-bct_b-qspi-l4t.cfg --sdram /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0
[ 0.4940 ] Updating bl info
[ 0.4957 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[ 0.4963 ] Updating smd info
[ 0.4980 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 --updatesmdinfo flash.xml.bin
[ 0.4988 ] Updating Odmdata
[ 0.5005 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0xB8190000
[ 0.5012 ] Signing BCT
[ 0.5012 ] Get Signed section of bct
[ 0.5028 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listbct bct_list.xml
[ 0.5060 ] tegrasign_v3.py --key None --list bct_list.xml --getmontgomeryvalues montgomery.bin --pubkeyhash pub_key.key
[ 0.5061 ] Assuming zero filled SBK key
[ 0.5072 ] Warning: pub_key.key is not found
[ 0.5062 ] Updating BCT with signature
[ 0.5079 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml
[ 0.5087 ] Generating BCT backup image
[ 0.5087 ] dd if=/dev/zero of=bct_backup.img bs=1 count=32768
[ 0.5092 ] 32768+0 records in
[ 0.5406 ] 32768+0 records out
[ 0.5406 ] 32768 bytes (33 kB, 32 KiB) copied, 0,0310594 s, 1,1 MB/s
[ 0.5406 ]
[ 0.5406 ] Concatenating BCT for chain A to bct_backup.img
[ 0.5406 ] dd if=br_bct_BR.bct of=bct_backup.img bs=1 seek=0 conv=notrunc
[ 0.5412 ] 2888+0 records in
[ 0.5432 ] 2888+0 records out
[ 0.5432 ] 2888 bytes (2,9 kB, 2,8 KiB) copied, 0,00178248 s, 1,6 MB/s
[ 0.5432 ]
[ 0.5432 ] Concatenating BCT for chain B to bct_backup.img
[ 0.5432 ] dd if=br_bct_b_BR.bct of=bct_backup.img bs=1 seek=16384 conv=notrunc
[ 0.5438 ] 2888+0 records in
[ 0.5457 ] 2888+0 records out
[ 0.5457 ] 2888 bytes (2,9 kB, 2,8 KiB) copied, 0,00173317 s, 1,7 MB/s
[ 0.5457 ]
[ 0.5458 ] Generating coldboot mb1-bct
[ 0.5475 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_cold_boot_bct.cfg --sdram /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1.cfg --misc tegra194-mb1-bct-misc-l4t.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg
[ 0.5480 ] MB1-BCT version: 0x1
[ 0.5483 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg
[ 0.5484 ] Added Platform Config 0 data with size :- 2496
[ 0.5490 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg
[ 0.5491 ] Added Platform Config 1 data with size :- 19640
[ 0.5555 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg
[ 0.5556 ] Added Platform Config 2 data with size :- 24
[ 0.5557 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg
[ 0.5559 ] Added Platform Config 4 data with size :- 348
[ 0.5559 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg
[ 0.5561 ] Added Platform Config 3 data with size :- 92
[ 0.5562 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg
[ 0.5563 ] Added Platform Config 5 data with size :- 140
[ 0.5563 ]
[ 0.5563 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg
[ 0.5563 ] Added Platform Config 7 data with size :- 392
[ 0.5563 ]
[ 0.5563 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg
[ 0.5563 ] Added Platform Config 9 data with size :- 40
[ 0.5563 ]
[ 0.5563 ] Updating mb1-bct with firmware information
[ 0.5580 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 0.5589 ] Updating mb1-bct with storage information
[ 0.5605 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 0.5613 ] Updating mb1-bct with ratchet information
[ 0.5629 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p3668.cfg
[ 0.5635 ] FwIndex: 1, MinRatchetLevel: 0
[ 0.5637 ] FwIndex: 2, MinRatchetLevel: 0
[ 0.5638 ] FwIndex: 3, MinRatchetLevel: 0
[ 0.5638 ] FwIndex: 4, MinRatchetLevel: 0
[ 0.5638 ] FwIndex: 5, MinRatchetLevel: 0
[ 0.5638 ] FwIndex: 6, MinRatchetLevel: 0
[ 0.5638 ] FwIndex: 7, MinRatchetLevel: 0
[ 0.5638 ] FwIndex: 11, MinRatchetLevel: 0
[ 0.5638 ] FwIndex: 12, MinRatchetLevel: 0
[ 0.5638 ] FwIndex: 13, MinRatchetLevel: 0
[ 0.5638 ] FwIndex: 14, MinRatchetLevel: 0
[ 0.5638 ] FwIndex: 15, MinRatchetLevel: 0
[ 0.5638 ] FwIndex: 16, MinRatchetLevel: 0
[ 0.5638 ] FwIndex: 17, MinRatchetLevel: 0
[ 0.5638 ] FwIndex: 18, MinRatchetLevel: 0
[ 0.5638 ] FwIndex: 19, MinRatchetLevel: 0
[ 0.5638 ] FwIndex: 30, MinRatchetLevel: 0
[ 0.5638 ] FwIndex: 31, MinRatchetLevel: 0
[ 0.5638 ]
[ 0.5656 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1_aligned.bct
[ 0.5682 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk
[ 0.5690 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[ 0.5729 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 0.5731 ] Assuming zero filled SBK key
[ 0.5749 ] Warning: pub_key.key is not found
[ 0.5765 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk
[ 0.5786 ] Generating recovery mb1-bct
[ 0.5811 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_bct.cfg --sdram /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1.cfg --misc tegra194-mb1-bct-misc-flash.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg
[ 0.5821 ] MB1-BCT version: 0x1
[ 0.5826 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg
[ 0.5829 ] Added Platform Config 0 data with size :- 2496
[ 0.5842 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg
[ 0.5845 ] Added Platform Config 1 data with size :- 19640
[ 0.5987 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg
[ 0.5989 ] Added Platform Config 2 data with size :- 24
[ 0.5990 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg
[ 0.5992 ] Added Platform Config 4 data with size :- 348
[ 0.5993 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg
[ 0.5995 ] Added Platform Config 3 data with size :- 92
[ 0.5996 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg
[ 0.5997 ] Added Platform Config 5 data with size :- 140
[ 0.5997 ]
[ 0.5997 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg
[ 0.5997 ] Added Platform Config 7 data with size :- 392
[ 0.5997 ]
[ 0.5997 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg
[ 0.5997 ] Added Platform Config 9 data with size :- 40
[ 0.5997 ]
[ 0.5998 ] Updating mb1-bct with firmware information
[ 0.6016 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo flash.xml.bin
[ 0.6023 ] Updating mb1-bct with storage information
[ 0.6040 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 0.6048 ] Updating mb1-bct with ratchet information
[ 0.6064 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p3668.cfg
[ 0.6074 ] FwIndex: 1, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 2, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 3, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 4, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 5, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 6, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 7, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 11, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 12, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 13, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 14, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 15, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 16, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 17, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 18, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 19, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 30, MinRatchetLevel: 0
[ 0.6077 ] FwIndex: 31, MinRatchetLevel: 0
[ 0.6077 ]
[ 0.6100 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1_aligned.bct
[ 0.6137 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_bct_MB1_aligned.bct zerosbk
[ 0.6150 ] adding BCH for mb1_bct_MB1_aligned.bct
[ 0.6200 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 0.6203 ] Assuming zero filled SBK key
[ 0.6226 ] Warning: pub_key.key is not found
[ 0.6243 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk
[ 0.6263 ] Generating coldboot mem-bct
[ 0.6287 ] tegrabct_v2 --chip 0x19 0 --sdram /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1.cfg --membct /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1_1.bct /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1_2.bct /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1_3.bct /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1_4.bct
[ 0.6297 ] Packing sdram param for instance[0]
[ 0.6605 ] Packing sdram param for instance[1]
[ 0.6605 ] Packing sdram param for instance[2]
[ 0.6606 ] Packing sdram param for instance[3]
[ 0.6607 ] Packing sdram param for instance[4]
[ 0.6607 ] Packing sdram param for instance[5]
[ 0.6607 ] Packing sdram param for instance[6]
[ 0.6607 ] Packing sdram param for instance[7]
[ 0.6607 ] Packing sdram param for instance[8]
[ 0.6607 ] Packing sdram param for instance[9]
[ 0.6607 ] Packing sdram param for instance[10]
[ 0.6607 ] Packing sdram param for instance[11]
[ 0.6607 ] Packing sdram param for instance[12]
[ 0.6607 ] Packing sdram param for instance[13]
[ 0.6607 ] Packing sdram param for instance[14]
[ 0.6607 ] Packing sdram param for instance[15]
[ 0.6607 ]
[ 0.6607 ] Getting sector size from pt
[ 0.6624 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin
[ 0.6630 ] BlockSize read from layout is 200
[ 0.6646 ] tegrahost_v2 --chip 0x19 0 --blocksize 512 --magicid MEMB --addsigheader_multi /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1_1.bct /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1_2.bct /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1_3.bct /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1_4.bct
[ 0.6651 ] adding BCH for /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1_1.bct
[ 0.6686 ] tegrahost_v2 --chip 0x19 --align mem_coldboot_aligned.bct
[ 0.6707 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin --appendsigheader mem_coldboot_aligned.bct zerosbk
[ 0.6712 ] Header already present for mem_coldboot_aligned.bct
[ 0.6741 ] tegrasign_v3.py --key None --list mem_coldboot_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 0.6742 ] Assuming zero filled SBK key
[ 0.6753 ] Warning: pub_key.key is not found
[ 0.6761 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_coldboot_aligned_sigheader.bct.encrypt mem_coldboot_aligned_sigheader.bct.hash zerosbk
[ 0.6770 ] Generating recovery mem-bct
[ 0.6786 ] tegrabct_v2 --chip 0x19 0 --sdram /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1.cfg --membct /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1_1.bct /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1_2.bct /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1_3.bct /home/gmellone/sw_uav_ap_os/images/381032/tmp0zccuu1r1_4.bct
[ 0.6791 ] Packing sdram param for instance[0]
[ 0.7063 ] Packing sdram param for instance[1]
[ 0.7064 ] Packing sdram param for instance[2]
[ 0.7065 ] Packing sdram param for instance[3]
[ 0.7066 ] Packing sdram param for instance[4]
[ 0.7066 ] Packing sdram param for instance[5]
[ 0.7066 ] Packing sdram param for instance[6]
[ 0.7066 ] Packing sdram param for instance[7]
[ 0.7066 ] Packing sdram param for instance[8]
[ 0.7066 ] Packing sdram param for instance[9]
[ 0.7066 ] Packing sdram param for instance[10]
[ 0.7066 ] Packing sdram param for instance[11]
[ 0.7066 ] Packing sdram param for instance[12]
[ 0.7066 ] Packing sdram param for instance[13]
[ 0.7066 ] Packing sdram param for instance[14]
[ 0.7066 ] Packing sdram param for instance[15]
[ 0.7066 ]
[ 0.7085 ] tegrahost_v2 --chip 0x19 --align mem_rcm_aligned.bct
[ 0.7107 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin --appendsigheader mem_rcm_aligned.bct zerosbk
[ 0.7112 ] adding BCH for mem_rcm_aligned.bct
[ 0.7147 ] tegrasign_v3.py --key None --list mem_rcm_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 0.7148 ] Assuming zero filled SBK key
[ 0.7159 ] Warning: pub_key.key is not found
[ 0.7166 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm_aligned_sigheader.bct.encrypt mem_rcm_aligned_sigheader.bct.hash zerosbk
[ 0.7177 ] Copying signatures
[ 0.7193 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[ 0.7215 ] tegraparser_v2 --generategpt --pt flash.xml.bin
[ 0.7220 ] gpt_primary_1_3.bin:
[ 0.7222 ] partition_id partition_name StartingLba EndingLba
[ 0.7223 ] 1 APP 40 117314039
[ 0.7224 ] 2 APP_b 117314040 234628039
[ 0.7226 ] 3 kernel 234628040 234890183
[ 0.7227 ] 4 kernel-dtb 234890184 234891719
[ 0.7227 ] 5 reserved_for_chain_A_user 234891720 234956487
[ 0.7227 ] 6 kernel_b 234956488 235218631
[ 0.7227 ] 7 kernel-dtb_b 235218632 235220167
[ 0.7227 ] 8 reserved_for_chain_B_user 235220168 235284935
[ 0.7227 ] 9 recovery 235284936 235448775
[ 0.7227 ] 10 recovery-dtb 235448776 235449799
[ 0.7227 ] 11 RECROOTFS 235449800 235654599
[ 0.7227 ] 12 esp 235654600 235785671
[ 0.7227 ] 13 recovery_alt 235785672 235949511
[ 0.7227 ] 14 recovery-dtb_alt 235949512 235950535
[ 0.7227 ] 15 esp_alt 235950536 236081607
[ 0.7227 ] 16 UDA 236081608 249999966
[ 0.7227 ] gpt_secondary_1_3.bin:
[ 0.7227 ] partition_id partition_name StartingLba EndingLba
[ 0.7227 ] 1 APP 40 117314039
[ 0.7227 ] 2 APP_b 117314040 234628039
[ 0.7227 ] 3 kernel 234628040 234890183
[ 0.7227 ] 4 kernel-dtb 234890184 234891719
[ 0.7227 ] 5 reserved_for_chain_A_user 234891720 234956487
[ 0.7227 ] 6 kernel_b 234956488 235218631
[ 0.7227 ] 7 kernel-dtb_b 235218632 235220167
[ 0.7227 ] 8 reserved_for_chain_B_user 235220168 235284935
[ 0.7227 ] 9 recovery 235284936 235448775
[ 0.7227 ] 10 recovery-dtb 235448776 235449799
[ 0.7227 ] 11 RECROOTFS 235449800 235654599
[ 0.7227 ] 12 esp 235654600 235785671
[ 0.7228 ] 13 recovery_alt 235785672 235949511
[ 0.7228 ] 14 recovery-dtb_alt 235949512 235950535
[ 0.7228 ] 15 esp_alt 235950536 236081607
[ 0.7228 ] 16 UDA 236081608 249999966
[ 0.7228 ]
[ 0.7249 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194_aligned.bin
[ 0.7271 ] tegrahost_v2 --chip 0x19 0 --magicid MB2B --ratchet_blob ratchet_blob.bin --appendsigheader nvtboot_recovery_t194_aligned.bin zerosbk
[ 0.7276 ] adding BCH for nvtboot_recovery_t194_aligned.bin
[ 0.7334 ] tegrasign_v3.py --key None --list nvtboot_recovery_t194_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 0.7335 ] Assuming zero filled SBK key
[ 0.7346 ] Warning: pub_key.key is not found
[ 0.7354 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194_aligned_sigheader.bin.encrypt nvtboot_recovery_t194_aligned_sigheader.bin.hash zerosbk
[ 0.7407 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_aligned.bin
[ 0.7433 ] tegrahost_v2 --chip 0x19 0 --magicid MTSP --appendsigheader preboot_c10_prod_cr_aligned.bin zerosbk
[ 0.7441 ] Header already present for preboot_c10_prod_cr_aligned.bin
[ 0.7475 ] tegrasign_v3.py --key None --list preboot_c10_prod_cr_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 0.7477 ] Assuming zero filled SBK key
[ 0.7492 ] Warning: pub_key.key is not found
[ 0.7503 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_aligned_sigheader.bin.encrypt preboot_c10_prod_cr_aligned_sigheader.bin.hash zerosbk
[ 0.7539 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_aligned.bin
[ 0.7568 ] tegrahost_v2 --chip 0x19 0 --magicid MTSM --appendsigheader mce_c10_prod_cr_aligned.bin zerosbk
[ 0.7577 ] Header already present for mce_c10_prod_cr_aligned.bin
[ 0.7630 ] tegrasign_v3.py --key None --list mce_c10_prod_cr_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 0.7631 ] Assuming zero filled SBK key
[ 0.7651 ] Warning: pub_key.key is not found
[ 0.7663 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_aligned_sigheader.bin.encrypt mce_c10_prod_cr_aligned_sigheader.bin.hash zerosbk
[ 0.7735 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_aligned.bin
[ 0.7766 ] tegrahost_v2 --chip 0x19 0 --magicid MTSB --appendsigheader mts_c10_prod_cr_aligned.bin zerosbk
[ 0.7775 ] adding BCH for mts_c10_prod_cr_aligned.bin
[ 0.8399 ] tegrasign_v3.py --key None --list mts_c10_prod_cr_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 0.8400 ] Assuming zero filled SBK key
[ 0.8452 ] Warning: pub_key.key is not found
[ 0.8460 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_aligned_sigheader.bin.encrypt mts_c10_prod_cr_aligned_sigheader.bin.hash zerosbk
[ 0.8762 ] tegrahost_v2 --chip 0x19 --align bpmp-2_t194_aligned.bin
[ 0.8784 ] tegrahost_v2 --chip 0x19 0 --magicid BPMF --ratchet_blob ratchet_blob.bin --appendsigheader bpmp-2_t194_aligned.bin zerosbk
[ 0.8790 ] adding BCH for bpmp-2_t194_aligned.bin
[ 0.8970 ] tegrasign_v3.py --key None --list bpmp-2_t194_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 0.8971 ] Assuming zero filled SBK key
[ 0.8991 ] Warning: pub_key.key is not found
[ 0.8999 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp-2_t194_aligned_sigheader.bin.encrypt bpmp-2_t194_aligned_sigheader.bin.hash zerosbk
[ 0.9105 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_lz4_aligned.dtb
[ 0.9128 ] tegrahost_v2 --chip 0x19 0 --magicid BPMD --ratchet_blob ratchet_blob.bin --appendsigheader tegra194-a02-bpmp-p3668-a00_lz4_aligned.dtb zerosbk
[ 0.9134 ] adding BCH for tegra194-a02-bpmp-p3668-a00_lz4_aligned.dtb
[ 0.9171 ] tegrasign_v3.py --key None --list tegra194-a02-bpmp-p3668-a00_lz4_aligned_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 0.9173 ] Assuming zero filled SBK key
[ 0.9188 ] Warning: pub_key.key is not found
[ 0.9201 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_lz4_aligned_sigheader.dtb.encrypt tegra194-a02-bpmp-p3668-a00_lz4_aligned_sigheader.dtb.hash zerosbk
[ 0.9245 ] tegrahost_v2 --chip 0x19 --align spe_t194_aligned.bin
[ 0.9284 ] tegrahost_v2 --chip 0x19 0 --magicid SPEF --ratchet_blob ratchet_blob.bin --appendsigheader spe_t194_aligned.bin zerosbk
[ 0.9296 ] adding BCH for spe_t194_aligned.bin
[ 0.9374 ] tegrasign_v3.py --key None --list spe_t194_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 0.9377 ] Assuming zero filled SBK key
[ 0.9403 ] Warning: pub_key.key is not found
[ 0.9420 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_aligned_sigheader.bin.encrypt spe_t194_aligned_sigheader.bin.hash zerosbk
[ 0.9492 ] tegrahost_v2 --chip 0x19 --align tos-optee_t194_aligned.img
[ 0.9531 ] tegrahost_v2 --chip 0x19 0 --magicid TOSB --ratchet_blob ratchet_blob.bin --appendsigheader tos-optee_t194_aligned.img zerosbk
[ 0.9543 ] adding BCH for tos-optee_t194_aligned.img
[ 0.9803 ] tegrasign_v3.py --key None --list tos-optee_t194_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 0.9803 ] Assuming zero filled SBK key
[ 0.9822 ] Warning: pub_key.key is not found
[ 0.9829 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-optee_t194_aligned_sigheader.img.encrypt tos-optee_t194_aligned_sigheader.img.hash zerosbk
[ 0.9936 ] tegrahost_v2 --chip 0x19 --align eks_aligned.img
[ 0.9958 ] tegrahost_v2 --chip 0x19 0 --magicid EKSB --ratchet_blob ratchet_blob.bin --appendsigheader eks_aligned.img zerosbk
[ 0.9964 ] adding BCH for eks_aligned.img
[ 0.9992 ] tegrasign_v3.py --key None --list eks_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 0.9993 ] Assuming zero filled SBK key
[ 1.0003 ] Warning: pub_key.key is not found
[ 1.0011 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_aligned_sigheader.img.encrypt eks_aligned_sigheader.img.hash zerosbk
[ 1.0037 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_aligned.dtb
[ 1.0060 ] tegrahost_v2 --chip 0x19 0 --magicid CDTB --ratchet_blob ratchet_blob.bin --appendsigheader tegra194-p3668-all-p3509-0000_aligned.dtb zerosbk
[ 1.0066 ] adding BCH for tegra194-p3668-all-p3509-0000_aligned.dtb
[ 1.0149 ] tegrasign_v3.py --key None --list tegra194-p3668-all-p3509-0000_aligned_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 1.0150 ] Assuming zero filled SBK key
[ 1.0164 ] Warning: pub_key.key is not found
[ 1.0173 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_aligned_sigheader.dtb.encrypt tegra194-p3668-all-p3509-0000_aligned_sigheader.dtb.hash zerosbk
[ 1.0235 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194_aligned.bin
[ 1.0259 ] tegrahost_v2 --chip 0x19 0 --magicid CPBL --ratchet_blob ratchet_blob.bin --appendsigheader nvtboot_recovery_cpu_t194_aligned.bin zerosbk
[ 1.0266 ] adding BCH for nvtboot_recovery_cpu_t194_aligned.bin
[ 1.0352 ] tegrasign_v3.py --key None --list nvtboot_recovery_cpu_t194_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 1.0354 ] Assuming zero filled SBK key
[ 1.0381 ] Warning: pub_key.key is not found
[ 1.0398 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194_aligned_sigheader.bin.encrypt nvtboot_recovery_cpu_t194_aligned_sigheader.bin.hash zerosbk
[ 1.0461 ] Copying signed file in /home/gmellone/sw_uav_ap_os/images/signed
[ 1.0470 ] Copying br bct for multi chains
[ 1.0471 ] Signed BCT for boot chain A is copied to /home/gmellone/sw_uav_ap_os/images/signed/br_bct_BR.bct
[ 1.0472 ] Signed BCT for boot chain B is copied to /home/gmellone/sw_uav_ap_os/images/signed/br_bct_b_BR.bct
[ 1.0472 ] Copying BCT backup image bct_backup.img to /home/gmellone/sw_uav_ap_os/images/signed/bct_backup.img
[ 1.0567 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /home/gmellone/sw_uav_ap_os/images/signed/flash.xml.tmp flash.idx
./tegraflash.py --bl nvtboot_recovery_cpu_t194_sigheader.bin.encrypt --bct br_bct_BR.bct --applet rcm_2_encrypt.rcm --applet_softfuse rcm_1_encrypt.rcm --cmd "secureflash;reboot" --cfg secureflash.xml --chip 0x19 --mb1_bct mb1_bct_MB1_sigheader.bct.encrypt --mem_bct mem_rcm_sigheader.bct.encrypt --mb1_cold_boot_bct mb1_cold_boot_bct_MB1_sigheader.bct.encrypt --mem_bct_cold_boot mem_coldboot_sigheader.bct.encrypt --bins "mb2_bootloader nvtboot_recovery_t194_sigheader.bin.encrypt; mts_preboot preboot_c10_prod_cr_sigheader.bin.encrypt; mts_mce mce_c10_prod_cr_sigheader.bin.encrypt; mts_proper mts_c10_prod_cr_sigheader.bin.encrypt; bpmp_fw bpmp-2_t194_sigheader.bin.encrypt; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00_lz4_sigheader.dtb.encrypt; spe_fw spe_t194_sigheader.bin.encrypt; tos tos-optee_t194_sigheader.img.encrypt; eks eks_sigheader.img.encrypt; bootloader_dtb tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt" --instance 1-5 --secondary_gpt_backup --bct_backup
saving flash command in flashcmd.txt
*** no-flash flag enabled. Exiting now... ***
User can run above saved command in factory environment without
providing pkc and sbk keys to flash a device
Example:
$ cd bootloader
$ sudo bash ./flashcmd.txt
Board ID(3668) version(300) sku(0001) revision(B.0)
./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin --bldtb tegra194-p3668-all-p3509-0000.dtb --sdram_config tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg,tegra194-memcfg-sw-override.cfg --odmdata 0xB8190000 --applet mb1_t194_prod.bin --cmd "sign" --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --cfg flash.xml --chip 0x19 --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --device_config tegra19x-mb1-bct-device-qspi-p3668.cfg --misc_config tegra194-mb1-bct-misc-flash.cfg --misc_cold_boot_config tegra194-mb1-bct-misc-l4t.cfg --pinmux_config tegra19x-mb1-pinmux-p3668-a01.cfg --gpioint_config tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --pmic_config tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --pmc_config tegra19x-mb1-padvoltage-p3668-a01.cfg --prod_config tegra19x-mb1-prod-p3668-0001-a00.cfg --scr_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --scr_cold_boot_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --br_cmd_config tegra194-mb1-bct-reset-p3668-0001-a00.cfg --dev_params tegra194-br-bct-qspi-l4t.cfg,tegra194-br-bct_b-qspi-l4t.cfg --overlay_dtb L4TConfiguration.dtbo,L4TConfiguration-RootfsRedundancyLevelABEnable.dtbo,tegra194-p3668-p3509-overlay.dtbo --bct_backup --secondary_gpt_backup --bins "mb2_bootloader nvtboot_recovery_t194.bin; mts_preboot preboot_c10_prod_cr.bin; mts_mce mce_c10_prod_cr.bin; mts_proper mts_c10_prod_cr.bin; bpmp_fw bpmp-2_t194.bin; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00_lz4.dtb; spe_fw spe_t194.bin; tos tos-optee_t194.img; eks eks.img; bootloader_dtb tegra194-p3668-all-p3509-0000.dtb" --instance 1-5 --secondary_gpt_backup --bct_backup
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0057 ] Using default ramcode: 0
[ 0.0057 ] Disable BPMP dtb trim, using default dtb
[ 0.0057 ]
[ 0.0086 ] tegrasign_v3.py --key None --getmode mode.txt
[ 0.0087 ] Assuming zero filled SBK key
[ 0.0078 ] Generating RCM messages
[ 0.0094 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod.bin zerosbk
[ 0.0099 ] Header already present for mb1_t194_prod.bin
[ 0.0143 ] tegrasign_v3.py --key None --getmode mode.txt
[ 0.0144 ] Assuming zero filled SBK key
[ 0.0160 ] tegrasign_v3.py --file mb1_t194_prod_sigheader.bin --key None --length 1136 --offset 2960 --pubkeyhash pub_key.key
[ 0.0161 ] Assuming zero filled SBK key
[ 0.0172 ] Warning: pub_key.key is not found
[ 0.0177 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin mb1_t194_prod_sigheader.hash zerosbk
[ 0.0215 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg sfuse.bin
[ 0.0235 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg
[ 0.0239 ] FwIndex: 1, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 2, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 3, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 4, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 5, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 6, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 7, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 11, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 12, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 13, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 14, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 15, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 16, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 17, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 18, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 19, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 30, MinRatchetLevel: 0
[ 0.0241 ] FwIndex: 31, MinRatchetLevel: 0
[ 0.0241 ]
[ 0.0256 ] tegrarcm_v2 --instance 1-5 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_sigheader.bin 0 0
[ 0.0260 ] RCM 0 is saved as rcm_0.rcm
[ 0.0280 ] RCM 1 is saved as rcm_1.rcm
[ 0.0281 ] RCM 2 is saved as rcm_2.rcm
[ 0.0281 ] List of rcm files are saved in rcm_list.xml
[ 0.0281 ]
[ 0.0281 ] Signing RCM messages
[ 0.0306 ] tegrasign_v3.py --key None --list rcm_list.xml --getmontgomeryvalues montgomery.bin --pubkeyhash pub_key.key
[ 0.0307 ] Assuming zero filled SBK key
[ 0.0333 ] Warning: pub_key.key is not found
[ 0.0323 ] Copying signature to RCM mesages
[ 0.0338 ] tegrarcm_v2 --instance 1-5 --chip 0x19 0 --updatesig rcm_list_signed.xml
[ 0.0345 ] odmdata (to decode) = 3088646144
[ 0.0346 ] Odmdata strings: PCIE_XBAR_8_1_1_0_1,UFS_DISABLED,NVHS_PCIE,enable-debug-console,enable-denver-wdt
[ 0.0346 ] Bpmp odmdata config: {'pcie-xbar-config': [0, 1, 'PCIE_XBAR_8_1_1_0_1'], 'pcie-c0-endpoint-enable': [1, 0, ''], 'pcie-c4-endpoint-enable': [1, 0, ''], 'ufs-config': [0, 1, 'UFS_DISABLED'], 'sata-enable': [1, 0, ''], 'nvhs-owner': [0, 1, 'PCIE'], 'pcie-c5-endpoint-enable': [1, 0, '']}
[ 0.0353 ] bpmp_dtb is compressed; decompressing...
[ 0.0353 ] lz4c -df tegra194-a02-bpmp-p3668-a00_lz4.dtb tegra194-a02-bpmp-p3668-a00_lz4_with_odm.dtb
[ 0.0358 ]
[ 0.0364 ] tegra194-a02-bpmp-p3 : decoded 442529 bytes
[ 0.0364 ]
[ 0.1047 ] Re-compressing updated bpmp_dtb
[ 0.1047 ] lz4c -zf tegra194-a02-bpmp-p3668-a00_lz4_with_odm.dtb tegra194-a02-bpmp-p3668-a00_lz4.dtb
[ 0.1055 ]
[ 0.1062 ] Compressed 442529 bytes into 32067 bytes ==> 7.25%
[ 0.1062 ]
[ 0.2808 ] Concatenating L4TConfiguration.dtbo,L4TConfiguration-RootfsRedundancyLevelABEnable.dtbo,tegra194-p3668-p3509-overlay.dtbo to tegra194-p3668-all-p3509-0000_with_odm_overlay.dtb
[ 0.2811 ] Parsing partition layout
[ 0.2831 ] tegraparser_v2 --pt flash.xml.tmp
[ 0.2840 ] Creating list of images to be signed
[ 0.2856 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --ratchet_blob ratchet_blob.bin --list images_list.xml zerosbk
[ 0.2860 ] MB1: Nvheader already present is mb1_t194_prod_aligned.bin
[ 0.2865 ] Header already present for mb1_t194_prod_aligned_sigheader.bin
[ 0.2866 ] MB1: Nvheader already present is mb1_t194_prod_aligned.bin
[ 0.2886 ] Header already present for mb1_t194_prod_aligned_sigheader.bin
[ 0.2888 ] adding BCH for spe_t194_aligned.bin
[ 0.2908 ] adding BCH for nvtboot_t194_aligned.bin
[ 0.2924 ] Header already present for preboot_c10_prod_cr_aligned.bin
[ 0.2955 ] Header already present for mce_c10_prod_cr_aligned.bin
[ 0.2957 ] adding BCH for mts_c10_prod_cr_aligned.bin
[ 0.3011 ] Header already present for warmboot_t194_prod_aligned.bin
[ 0.3522 ] adding BCH for uefi_jetson_aligned.bin
[ 0.3559 ] adding BCH for tegra194-p3668-all-p3509-0000_aligned.dtb
[ 0.4000 ] adding BCH for tos-optee_t194_aligned.img
[ 0.4061 ] adding BCH for eks_aligned.img
[ 0.4203 ] adding BCH for adsp-fw_aligned.bin
[ 0.4207 ] adding BCH for camera-rtcpu-t194-rce_aligned.img
[ 0.4275 ] adding BCH for bpmp-2_t194_aligned.bin
[ 0.4362 ] adding BCH for tegra194-a02-bpmp-p3668-a00_lz4_aligned.dtb
[ 0.4507 ] adding BCH for spe_t194_aligned.bin
[ 0.4513 ] adding BCH for nvtboot_t194_aligned.bin
[ 0.4529 ] Header already present for preboot_c10_prod_cr_aligned.bin
[ 0.4561 ] Header already present for mce_c10_prod_cr_aligned.bin
[ 0.4565 ] adding BCH for mts_c10_prod_cr_aligned.bin
[ 0.4636 ] Header already present for warmboot_t194_prod_aligned.bin
[ 0.5141 ] adding BCH for uefi_jetson_aligned.bin
[ 0.5182 ] adding BCH for tegra194-p3668-all-p3509-0000_aligned.dtb
[ 0.5636 ] adding BCH for tos-optee_t194_aligned.img
[ 0.5697 ] adding BCH for eks_aligned.img
[ 0.5836 ] adding BCH for adsp-fw_aligned.bin
[ 0.5842 ] adding BCH for camera-rtcpu-t194-rce_aligned.img
[ 0.5910 ] adding BCH for bpmp-2_t194_aligned.bin
[ 0.6005 ] adding BCH for tegra194-a02-bpmp-p3668-a00_lz4_aligned.dtb
[ 0.6172 ] Filling MB1 storage info
[ 0.6172 ] Parsing dev params for multi chains
[ 0.6172 ] Generating br-bct
[ 0.6193 ] Performing cfg overlay
[ 0.6193 ] ['tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg', 'tegra194-memcfg-sw-override.cfg']
[ 0.6194 ] sw_memcfg_overlay.pl -c tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg -s tegra194-memcfg-sw-override.cfg -o /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1.cfg
[ 0.6455 ] Updating dev and MSS params in BR BCT
[ 0.6455 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi-l4t.cfg --sdram /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0
[ 0.6754 ] Updating bl info
[ 0.6774 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin
[ 0.6787 ] Generating br-bct
[ 0.6804 ] Performing cfg overlay
[ 0.6804 ] ['/home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1.cfg']
[ 0.6804 ] Updating dev and MSS params in BR BCT
[ 0.6804 ] tegrabct_v2 --dev_param tegra194-br-bct_b-qspi-l4t.cfg --sdram /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0
[ 0.7093 ] Updating bl info
[ 0.7113 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin
[ 0.7124 ] Generating BCT backup image
[ 0.7125 ] dd if=/dev/zero of=bct_backup.img bs=1 count=32768
[ 0.7131 ] 32768+0 records in
[ 0.7394 ] 32768+0 records out
[ 0.7394 ] 32768 bytes (33 kB, 32 KiB) copied, 0,0260302 s, 1,3 MB/s
[ 0.7394 ]
[ 0.7394 ] Concatenating BCT for chain A to bct_backup.img
[ 0.7394 ] dd if=br_bct_BR.bct of=bct_backup.img bs=1 seek=0 conv=notrunc
[ 0.7400 ] 2888+0 records in
[ 0.7420 ] 2888+0 records out
[ 0.7420 ] 2888 bytes (2,9 kB, 2,8 KiB) copied, 0,00177498 s, 1,6 MB/s
[ 0.7420 ]
[ 0.7420 ] Concatenating BCT for chain B to bct_backup.img
[ 0.7420 ] dd if=br_bct_b_BR.bct of=bct_backup.img bs=1 seek=16384 conv=notrunc
[ 0.7426 ] 2888+0 records in
[ 0.7446 ] 2888+0 records out
[ 0.7446 ] 2888 bytes (2,9 kB, 2,8 KiB) copied, 0,00174854 s, 1,7 MB/s
[ 0.7446 ]
[ 0.7446 ] Generating signatures
[ 0.7473 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key
[ 0.7474 ] Assuming zero filled SBK key
[ 0.7969 ] Warning: pub_key.key is not found
[ 0.7959 ] Parsing dev params for multi chains
[ 0.7959 ] Generating br-bct
[ 0.7975 ] Performing cfg overlay
[ 0.7975 ] ['/home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1.cfg']
[ 0.7975 ] Updating dev and MSS params in BR BCT
[ 0.7976 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi-l4t.cfg --sdram /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0
[ 0.8262 ] Updating bl info
[ 0.8282 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[ 0.8298 ] Updating smd info
[ 0.8315 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 --updatesmdinfo flash.xml.bin
[ 0.8322 ] Updating Odmdata
[ 0.8338 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0xB8190000
[ 0.8346 ] Signing BCT
[ 0.8346 ] Get Signed section of bct
[ 0.8363 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listbct bct_list.xml
[ 0.8397 ] tegrasign_v3.py --key None --list bct_list.xml --getmontgomeryvalues montgomery.bin --pubkeyhash pub_key.key
[ 0.8398 ] Assuming zero filled SBK key
[ 0.8409 ] Warning: pub_key.key is not found
[ 0.8399 ] Updating BCT with signature
[ 0.8416 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml
[ 0.8424 ] Generating br-bct
[ 0.8440 ] Performing cfg overlay
[ 0.8440 ] ['/home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1.cfg']
[ 0.8440 ] Updating dev and MSS params in BR BCT
[ 0.8441 ] tegrabct_v2 --dev_param tegra194-br-bct_b-qspi-l4t.cfg --sdram /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0
[ 0.8722 ] Updating bl info
[ 0.8740 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[ 0.8754 ] Updating smd info
[ 0.8770 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 --updatesmdinfo flash.xml.bin
[ 0.8777 ] Updating Odmdata
[ 0.8794 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0xB8190000
[ 0.8801 ] Signing BCT
[ 0.8801 ] Get Signed section of bct
[ 0.8817 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listbct bct_list.xml
[ 0.8851 ] tegrasign_v3.py --key None --list bct_list.xml --getmontgomeryvalues montgomery.bin --pubkeyhash pub_key.key
[ 0.8852 ] Assuming zero filled SBK key
[ 0.8862 ] Warning: pub_key.key is not found
[ 0.8853 ] Updating BCT with signature
[ 0.8869 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml
[ 0.8877 ] Generating BCT backup image
[ 0.8877 ] dd if=/dev/zero of=bct_backup.img bs=1 count=32768
[ 0.8883 ] 32768+0 records in
[ 0.9151 ] 32768+0 records out
[ 0.9151 ] 32768 bytes (33 kB, 32 KiB) copied, 0,0264861 s, 1,2 MB/s
[ 0.9151 ]
[ 0.9151 ] Concatenating BCT for chain A to bct_backup.img
[ 0.9151 ] dd if=br_bct_BR.bct of=bct_backup.img bs=1 seek=0 conv=notrunc
[ 0.9158 ] 2888+0 records in
[ 0.9178 ] 2888+0 records out
[ 0.9178 ] 2888 bytes (2,9 kB, 2,8 KiB) copied, 0,00178807 s, 1,6 MB/s
[ 0.9178 ]
[ 0.9178 ] Concatenating BCT for chain B to bct_backup.img
[ 0.9178 ] dd if=br_bct_b_BR.bct of=bct_backup.img bs=1 seek=16384 conv=notrunc
[ 0.9184 ] 2888+0 records in
[ 0.9204 ] 2888+0 records out
[ 0.9204 ] 2888 bytes (2,9 kB, 2,8 KiB) copied, 0,00175355 s, 1,6 MB/s
[ 0.9204 ]
[ 0.9204 ] Generating coldboot mb1-bct
[ 0.9221 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_cold_boot_bct.cfg --sdram /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1.cfg --misc tegra194-mb1-bct-misc-l4t.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg
[ 0.9227 ] MB1-BCT version: 0x1
[ 0.9229 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg
[ 0.9230 ] Added Platform Config 0 data with size :- 2496
[ 0.9236 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg
[ 0.9237 ] Added Platform Config 1 data with size :- 19640
[ 0.9300 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg
[ 0.9302 ] Added Platform Config 2 data with size :- 24
[ 0.9302 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg
[ 0.9304 ] Added Platform Config 4 data with size :- 348
[ 0.9305 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg
[ 0.9306 ] Added Platform Config 3 data with size :- 92
[ 0.9307 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg
[ 0.9307 ] Added Platform Config 5 data with size :- 140
[ 0.9307 ]
[ 0.9307 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg
[ 0.9307 ] Added Platform Config 7 data with size :- 392
[ 0.9307 ]
[ 0.9307 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg
[ 0.9307 ] Added Platform Config 9 data with size :- 40
[ 0.9307 ]
[ 0.9308 ] Updating mb1-bct with firmware information
[ 0.9324 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 0.9332 ] Updating mb1-bct with storage information
[ 0.9349 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 0.9355 ] Updating mb1-bct with ratchet information
[ 0.9372 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p3668.cfg
[ 0.9377 ] FwIndex: 1, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 2, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 3, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 4, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 5, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 6, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 7, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 11, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 12, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 13, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 14, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 15, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 16, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 17, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 18, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 19, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 30, MinRatchetLevel: 0
[ 0.9379 ] FwIndex: 31, MinRatchetLevel: 0
[ 0.9379 ]
[ 0.9396 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1_aligned.bct
[ 0.9419 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk
[ 0.9427 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[ 0.9467 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 0.9468 ] Assuming zero filled SBK key
[ 0.9484 ] Warning: pub_key.key is not found
[ 0.9495 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk
[ 0.9516 ] Generating recovery mb1-bct
[ 0.9541 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_bct.cfg --sdram /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1.cfg --misc tegra194-mb1-bct-misc-flash.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg
[ 0.9553 ] MB1-BCT version: 0x1
[ 0.9557 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg
[ 0.9559 ] Added Platform Config 0 data with size :- 2496
[ 0.9572 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg
[ 0.9575 ] Added Platform Config 1 data with size :- 19640
[ 0.9700 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg
[ 0.9702 ] Added Platform Config 2 data with size :- 24
[ 0.9703 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg
[ 0.9705 ] Added Platform Config 4 data with size :- 348
[ 0.9707 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg
[ 0.9709 ] Added Platform Config 3 data with size :- 92
[ 0.9710 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg
[ 0.9711 ] Added Platform Config 5 data with size :- 140
[ 0.9711 ]
[ 0.9711 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg
[ 0.9711 ] Added Platform Config 7 data with size :- 392
[ 0.9711 ]
[ 0.9711 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg
[ 0.9711 ] Added Platform Config 9 data with size :- 40
[ 0.9711 ]
[ 0.9711 ] Updating mb1-bct with firmware information
[ 0.9729 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo flash.xml.bin
[ 0.9738 ] Updating mb1-bct with storage information
[ 0.9756 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 0.9764 ] Updating mb1-bct with ratchet information
[ 0.9782 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p3668.cfg
[ 0.9790 ] FwIndex: 1, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 2, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 3, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 4, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 5, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 6, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 7, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 11, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 12, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 13, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 14, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 15, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 16, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 17, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 18, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 19, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 30, MinRatchetLevel: 0
[ 0.9792 ] FwIndex: 31, MinRatchetLevel: 0
[ 0.9792 ]
[ 0.9813 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1_aligned.bct
[ 0.9846 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_bct_MB1_aligned.bct zerosbk
[ 0.9857 ] adding BCH for mb1_bct_MB1_aligned.bct
[ 0.9905 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 0.9907 ] Assuming zero filled SBK key
[ 0.9929 ] Warning: pub_key.key is not found
[ 0.9945 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk
[ 0.9966 ] Generating coldboot mem-bct
[ 0.9993 ] tegrabct_v2 --chip 0x19 0 --sdram /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1.cfg --membct /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1_1.bct /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1_2.bct /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1_3.bct /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1_4.bct
[ 1.0008 ] Packing sdram param for instance[0]
[ 1.0440 ] Packing sdram param for instance[1]
[ 1.0441 ] Packing sdram param for instance[2]
[ 1.0442 ] Packing sdram param for instance[3]
[ 1.0443 ] Packing sdram param for instance[4]
[ 1.0443 ] Packing sdram param for instance[5]
[ 1.0443 ] Packing sdram param for instance[6]
[ 1.0443 ] Packing sdram param for instance[7]
[ 1.0443 ] Packing sdram param for instance[8]
[ 1.0443 ] Packing sdram param for instance[9]
[ 1.0443 ] Packing sdram param for instance[10]
[ 1.0443 ] Packing sdram param for instance[11]
[ 1.0443 ] Packing sdram param for instance[12]
[ 1.0443 ] Packing sdram param for instance[13]
[ 1.0443 ] Packing sdram param for instance[14]
[ 1.0443 ] Packing sdram param for instance[15]
[ 1.0443 ]
[ 1.0443 ] Getting sector size from pt
[ 1.0461 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin
[ 1.0468 ] BlockSize read from layout is 200
[ 1.0484 ] tegrahost_v2 --chip 0x19 0 --blocksize 512 --magicid MEMB --addsigheader_multi /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1_1.bct /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1_2.bct /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1_3.bct /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1_4.bct
[ 1.0489 ] adding BCH for /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1_1.bct
[ 1.0524 ] tegrahost_v2 --chip 0x19 --align mem_coldboot_aligned.bct
[ 1.0546 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin --appendsigheader mem_coldboot_aligned.bct zerosbk
[ 1.0551 ] Header already present for mem_coldboot_aligned.bct
[ 1.0580 ] tegrasign_v3.py --key None --list mem_coldboot_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 1.0581 ] Assuming zero filled SBK key
[ 1.0593 ] Warning: pub_key.key is not found
[ 1.0600 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_coldboot_aligned_sigheader.bct.encrypt mem_coldboot_aligned_sigheader.bct.hash zerosbk
[ 1.0609 ] Generating recovery mem-bct
[ 1.0626 ] tegrabct_v2 --chip 0x19 0 --sdram /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1.cfg --membct /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1_1.bct /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1_2.bct /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1_3.bct /home/gmellone/sw_uav_ap_os/images/381374/tmpnzi_szpq1_4.bct
[ 1.0631 ] Packing sdram param for instance[0]
[ 1.0908 ] Packing sdram param for instance[1]
[ 1.0909 ] Packing sdram param for instance[2]
[ 1.0910 ] Packing sdram param for instance[3]
[ 1.0910 ] Packing sdram param for instance[4]
[ 1.0911 ] Packing sdram param for instance[5]
[ 1.0911 ] Packing sdram param for instance[6]
[ 1.0911 ] Packing sdram param for instance[7]
[ 1.0911 ] Packing sdram param for instance[8]
[ 1.0911 ] Packing sdram param for instance[9]
[ 1.0911 ] Packing sdram param for instance[10]
[ 1.0911 ] Packing sdram param for instance[11]
[ 1.0911 ] Packing sdram param for instance[12]
[ 1.0911 ] Packing sdram param for instance[13]
[ 1.0911 ] Packing sdram param for instance[14]
[ 1.0911 ] Packing sdram param for instance[15]
[ 1.0911 ]
[ 1.0929 ] tegrahost_v2 --chip 0x19 --align mem_rcm_aligned.bct
[ 1.0951 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin --appendsigheader mem_rcm_aligned.bct zerosbk
[ 1.0957 ] adding BCH for mem_rcm_aligned.bct
[ 1.0993 ] tegrasign_v3.py --key None --list mem_rcm_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 1.0994 ] Assuming zero filled SBK key
[ 1.1005 ] Warning: pub_key.key is not found
[ 1.1012 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm_aligned_sigheader.bct.encrypt mem_rcm_aligned_sigheader.bct.hash zerosbk
[ 1.1023 ] Copying signatures
[ 1.1040 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[ 1.2736 ] tegraparser_v2 --generategpt --pt flash.xml.bin
[ 1.2742 ] gpt_secondary_3_0.bin:
[ 1.2744 ] partition_id partition_name StartingLba EndingLba
[ 1.2745 ] 1 BCT 0 255
[ 1.2746 ] 2 mb1 256 767
[ 1.2747 ] 3 mb1_b 768 1279
[ 1.2749 ] 4 MB1_BCT 1280 1407
[ 1.2750 ] 5 MEM_BCT 1408 1919
[ 1.2751 ] 6 spe-fw 1920 2431
[ 1.2753 ] 7 mb2 2432 2943
[ 1.2754 ] 8 mts-preboot 2944 3071
[ 1.2754 ] 9 mts-mce 3072 3455
[ 1.2754 ] 10 mts-proper 3456 11647
[ 1.2754 ] 11 sc7 11648 11903
[ 1.2754 ] 12 xusb-fw 11904 12287
[ 1.2754 ] 13 cpu-bootloader 12288 20479
[ 1.2754 ] 14 bootloader-dtb 20480 21375
[ 1.2754 ] 15 secure-os 21376 26495
[ 1.2754 ] 16 eks 26496 26623
[ 1.2754 ] 17 adsp-fw 26624 28671
[ 1.2754 ] 18 rce-fw 28672 30719
[ 1.2754 ] 19 sce-fw 30720 32767
[ 1.2755 ] 20 bpmp-fw 32768 35839
[ 1.2755 ] 21 bpmp-fw-dtb 35840 37887
[ 1.2755 ] 22 reserved_for_chain_A_boot 37888 41983
[ 1.2755 ] 23 MB1_BCT_b 41984 42111
[ 1.2755 ] 24 MEM_BCT_b 42112 42623
[ 1.2755 ] 25 spe-fw_b 42624 43135
[ 1.2755 ] 26 mb2_b 43136 43647
[ 1.2755 ] 27 mts-preboot_b 43648 43775
[ 1.2755 ] 28 mts-mce_b 43776 44159
[ 1.2755 ] 29 mts-proper_b 44160 52351
[ 1.2755 ] 30 sc7_b 52352 52607
[ 1.2755 ] 31 xusb-fw_b 52608 52991
[ 1.2755 ] 32 cpu-bootloader_b 52992 61183
[ 1.2755 ] 33 bootloader-dtb_b 61184 62079
[ 1.2755 ] 34 reserved_for_chain_B_boot 62080 63359
[ 1.2755 ] 35 uefi_variables 63360 63615
[ 1.2755 ] 36 uefi_ftw 63616 63999
[ 1.2755 ] 37 BCT-boot-chain_backup 64768 64895
[ 1.2755 ] 38 reserved_partition 64896 65023
[ 1.2755 ] 39 secondary_gpt_backup 65024 65151
[ 1.2755 ] 40 VER_b 65152 65279
[ 1.2755 ] 41 VER 65280 65407
[ 1.2755 ] gpt_primary_1_3.bin:
[ 1.2755 ] partition_id partition_name StartingLba EndingLba
[ 1.2755 ] 1 reserved_for_chain_A_user 40 66687
[ 1.2755 ] 2 secure-os_b 29558784 29563903
[ 1.2755 ] 3 eks_b 29563904 29564031
[ 1.2755 ] 4 adsp-fw_b 29564032 29566079
[ 1.2755 ] 5 rce-fw_b 29566080 29568127
[ 1.2755 ] 6 sce-fw_b 29568128 29570175
[ 1.2755 ] 7 bpmp-fw_b 29570176 29573247
[ 1.2755 ] 8 bpmp-fw-dtb_b 29573248 29575295
[ 1.2755 ] 9 reserved_for_chain_B_user 29575296 29641855
[ 1.2755 ] 10 recovery_alt 29641856 29805695
[ 1.2755 ] 11 recovery-dtb_alt 29805696 29806719
[ 1.2755 ] 12 esp_alt 29806720 29937791
[ 1.2755 ] gpt_secondary_1_3.bin:
[ 1.2755 ] partition_id partition_name StartingLba EndingLba
[ 1.2755 ] 1 reserved_for_chain_A_user 40 66687
[ 1.2755 ] 2 secure-os_b 29558784 29563903
[ 1.2755 ] 3 eks_b 29563904 29564031
[ 1.2755 ] 4 adsp-fw_b 29564032 29566079
[ 1.2755 ] 5 rce-fw_b 29566080 29568127
[ 1.2755 ] 6 sce-fw_b 29568128 29570175
[ 1.2755 ] 7 bpmp-fw_b 29570176 29573247
[ 1.2755 ] 8 bpmp-fw-dtb_b 29573248 29575295
[ 1.2755 ] 9 reserved_for_chain_B_user 29575296 29641855
[ 1.2755 ] 10 recovery_alt 29641856 29805695
[ 1.2755 ] 11 recovery-dtb_alt 29805696 29806719
[ 1.2755 ] 12 esp_alt 29806720 29937791
[ 1.2755 ] u-boot
[ 1.2778 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194_aligned.bin
[ 1.2800 ] tegrahost_v2 --chip 0x19 0 --magicid MB2B --ratchet_blob ratchet_blob.bin --appendsigheader nvtboot_recovery_t194_aligned.bin zerosbk
[ 1.2805 ] adding BCH for nvtboot_recovery_t194_aligned.bin
[ 1.2866 ] tegrasign_v3.py --key None --list nvtboot_recovery_t194_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 1.2867 ] Assuming zero filled SBK key
[ 1.2879 ] Warning: pub_key.key is not found
[ 1.2885 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194_aligned_sigheader.bin.encrypt nvtboot_recovery_t194_aligned_sigheader.bin.hash zerosbk
[ 1.2926 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_aligned.bin
[ 1.2948 ] tegrahost_v2 --chip 0x19 0 --magicid MTSP --appendsigheader preboot_c10_prod_cr_aligned.bin zerosbk
[ 1.2953 ] Header already present for preboot_c10_prod_cr_aligned.bin
[ 1.2984 ] tegrasign_v3.py --key None --list preboot_c10_prod_cr_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 1.2985 ] Assuming zero filled SBK key
[ 1.2995 ] Warning: pub_key.key is not found
[ 1.3002 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_aligned_sigheader.bin.encrypt preboot_c10_prod_cr_aligned_sigheader.bin.hash zerosbk
[ 1.3029 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_aligned.bin
[ 1.3051 ] tegrahost_v2 --chip 0x19 0 --magicid MTSM --appendsigheader mce_c10_prod_cr_aligned.bin zerosbk
[ 1.3060 ] Header already present for mce_c10_prod_cr_aligned.bin
[ 1.3115 ] tegrasign_v3.py --key None --list mce_c10_prod_cr_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 1.3117 ] Assuming zero filled SBK key
[ 1.3136 ] Warning: pub_key.key is not found
[ 1.3149 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_aligned_sigheader.bin.encrypt mce_c10_prod_cr_aligned_sigheader.bin.hash zerosbk
[ 1.3234 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_aligned.bin
[ 1.3263 ] tegrahost_v2 --chip 0x19 0 --magicid MTSB --appendsigheader mts_c10_prod_cr_aligned.bin zerosbk
[ 1.3271 ] adding BCH for mts_c10_prod_cr_aligned.bin
[ 1.3887 ] tegrasign_v3.py --key None --list mts_c10_prod_cr_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 1.3888 ] Assuming zero filled SBK key
[ 1.3941 ] Warning: pub_key.key is not found
[ 1.3950 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_aligned_sigheader.bin.encrypt mts_c10_prod_cr_aligned_sigheader.bin.hash zerosbk
[ 1.4266 ] tegrahost_v2 --chip 0x19 --align bpmp-2_t194_aligned.bin
[ 1.4288 ] tegrahost_v2 --chip 0x19 0 --magicid BPMF --ratchet_blob ratchet_blob.bin --appendsigheader bpmp-2_t194_aligned.bin zerosbk
[ 1.4294 ] adding BCH for bpmp-2_t194_aligned.bin
[ 1.4476 ] tegrasign_v3.py --key None --list bpmp-2_t194_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 1.4477 ] Assuming zero filled SBK key
[ 1.4498 ] Warning: pub_key.key is not found
[ 1.4506 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp-2_t194_aligned_sigheader.bin.encrypt bpmp-2_t194_aligned_sigheader.bin.hash zerosbk
[ 1.4619 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_lz4_aligned.dtb
[ 1.4641 ] tegrahost_v2 --chip 0x19 0 --magicid BPMD --ratchet_blob ratchet_blob.bin --appendsigheader tegra194-a02-bpmp-p3668-a00_lz4_aligned.dtb zerosbk
[ 1.4647 ] adding BCH for tegra194-a02-bpmp-p3668-a00_lz4_aligned.dtb
[ 1.4681 ] tegrasign_v3.py --key None --list tegra194-a02-bpmp-p3668-a00_lz4_aligned_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 1.4682 ] Assuming zero filled SBK key
[ 1.4692 ] Warning: pub_key.key is not found
[ 1.4699 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_lz4_aligned_sigheader.dtb.encrypt tegra194-a02-bpmp-p3668-a00_lz4_aligned_sigheader.dtb.hash zerosbk
[ 1.4733 ] tegrahost_v2 --chip 0x19 --align spe_t194_aligned.bin
[ 1.4759 ] tegrahost_v2 --chip 0x19 0 --magicid SPEF --ratchet_blob ratchet_blob.bin --appendsigheader spe_t194_aligned.bin zerosbk
[ 1.4765 ] adding BCH for spe_t194_aligned.bin
[ 1.4817 ] tegrasign_v3.py --key None --list spe_t194_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 1.4818 ] Assuming zero filled SBK key
[ 1.4833 ] Warning: pub_key.key is not found
[ 1.4842 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_aligned_sigheader.bin.encrypt spe_t194_aligned_sigheader.bin.hash zerosbk
[ 1.4889 ] tegrahost_v2 --chip 0x19 --align tos-optee_t194_aligned.img
[ 1.4921 ] tegrahost_v2 --chip 0x19 0 --magicid TOSB --ratchet_blob ratchet_blob.bin --appendsigheader tos-optee_t194_aligned.img zerosbk
[ 1.4932 ] adding BCH for tos-optee_t194_aligned.img
[ 1.5181 ] tegrasign_v3.py --key None --list tos-optee_t194_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 1.5182 ] Assuming zero filled SBK key
[ 1.5200 ] Warning: pub_key.key is not found
[ 1.5207 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-optee_t194_aligned_sigheader.img.encrypt tos-optee_t194_aligned_sigheader.img.hash zerosbk
[ 1.5313 ] tegrahost_v2 --chip 0x19 --align eks_aligned.img
[ 1.5335 ] tegrahost_v2 --chip 0x19 0 --magicid EKSB --ratchet_blob ratchet_blob.bin --appendsigheader eks_aligned.img zerosbk
[ 1.5340 ] adding BCH for eks_aligned.img
[ 1.5370 ] tegrasign_v3.py --key None --list eks_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 1.5371 ] Assuming zero filled SBK key
[ 1.5381 ] Warning: pub_key.key is not found
[ 1.5388 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_aligned_sigheader.img.encrypt eks_aligned_sigheader.img.hash zerosbk
[ 1.5414 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_aligned.dtb
[ 1.5436 ] tegrahost_v2 --chip 0x19 0 --magicid CDTB --ratchet_blob ratchet_blob.bin --appendsigheader tegra194-p3668-all-p3509-0000_aligned.dtb zerosbk
[ 1.5441 ] adding BCH for tegra194-p3668-all-p3509-0000_aligned.dtb
[ 1.5523 ] tegrasign_v3.py --key None --list tegra194-p3668-all-p3509-0000_aligned_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 1.5524 ] Assuming zero filled SBK key
[ 1.5537 ] Warning: pub_key.key is not found
[ 1.5545 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_aligned_sigheader.dtb.encrypt tegra194-p3668-all-p3509-0000_aligned_sigheader.dtb.hash zerosbk
[ 1.5597 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194_aligned.bin
[ 1.5618 ] tegrahost_v2 --chip 0x19 0 --magicid CPBL --ratchet_blob ratchet_blob.bin --appendsigheader nvtboot_recovery_cpu_t194_aligned.bin zerosbk
[ 1.5624 ] adding BCH for nvtboot_recovery_cpu_t194_aligned.bin
[ 1.5687 ] tegrasign_v3.py --key None --list nvtboot_recovery_cpu_t194_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 1.5688 ] Assuming zero filled SBK key
[ 1.5700 ] Warning: pub_key.key is not found
[ 1.5707 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194_aligned_sigheader.bin.encrypt nvtboot_recovery_cpu_t194_aligned_sigheader.bin.hash zerosbk
[ 1.5733 ] Copying signed file in /home/gmellone/sw_uav_ap_os/images/signed
[ 1.5836 ] Copying br bct for multi chains
[ 1.5837 ] Signed BCT for boot chain A is copied to /home/gmellone/sw_uav_ap_os/images/signed/br_bct_BR.bct
[ 1.5837 ] Signed BCT for boot chain B is copied to /home/gmellone/sw_uav_ap_os/images/signed/br_bct_b_BR.bct
[ 1.5837 ] Copying BCT backup image bct_backup.img to /home/gmellone/sw_uav_ap_os/images/signed/bct_backup.img
[ 1.5908 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /home/gmellone/sw_uav_ap_os/images/signed/flash.xml.tmp flash.idx
./tegraflash.py --bl nvtboot_recovery_cpu_t194_sigheader.bin.encrypt --bct br_bct_BR.bct --applet rcm_2_encrypt.rcm --applet_softfuse rcm_1_encrypt.rcm --cmd "secureflash;reboot" --cfg secureflash.xml --chip 0x19 --mb1_bct mb1_bct_MB1_sigheader.bct.encrypt --mem_bct mem_rcm_sigheader.bct.encrypt --mb1_cold_boot_bct mb1_cold_boot_bct_MB1_sigheader.bct.encrypt --mem_bct_cold_boot mem_coldboot_sigheader.bct.encrypt --bins "mb2_bootloader nvtboot_recovery_t194_sigheader.bin.encrypt; mts_preboot preboot_c10_prod_cr_sigheader.bin.encrypt; mts_mce mce_c10_prod_cr_sigheader.bin.encrypt; mts_proper mts_c10_prod_cr_sigheader.bin.encrypt; bpmp_fw bpmp-2_t194_sigheader.bin.encrypt; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00_lz4_sigheader.dtb.encrypt; spe_fw spe_t194_sigheader.bin.encrypt; tos tos-optee_t194_sigheader.img.encrypt; eks eks_sigheader.img.encrypt; bootloader_dtb tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt" --instance 1-5 --secondary_gpt_backup --bct_backup
saving flash command in flashcmd.txt
*** no-flash flag enabled. Exiting now... ***
User can run above saved command in factory environment without
providing pkc and sbk keys to flash a device
Example:
$ cd bootloader
$ sudo bash ./flashcmd.txt
== Step 2: Boot Jetson via RCM at 2024-06-14T17:18:04+02:00 ==
Found Jetson device in recovery mode at USB 1-5
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
Entering RCM boot
[ 0.0000 ] rcm boot with presigned binaries
[ 0.0000 ] Boot Rom communication
[ 0.0016 ] tegrarcm_v2 --instance 1-5 --chip 0x19 0 --rcm rcm_1_encrypt.rcm --rcm rcm_2_encrypt.rcm
[ 0.0021 ] BR_CID: 0x88021911640971c10800000017ff00c0
[ 0.0068 ] Boot Rom communication completed
[ 2.0345 ] tegrarcm_v2 --instance 1-5 --isapplet
[ 2.0368 ] Applet version 01.00.0000
[ 2.0512 ] Sending BCTs
[ 2.0528 ] tegrarcm_v2 --instance 1-5 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt --download bct_mem mem_rcm_sigheader.bct.encrypt
[ 2.0533 ] Applet version 01.00.0000
[ 2.0631 ] Sending bct_bootrom
[ 2.0632 ] [................................................] 100%
[ 2.0644 ] Sending bct_mb1
[ 2.0693 ] [................................................] 100%
[ 2.0727 ] Sending bct_mem
[ 2.1200 ] [................................................] 100%
[ 2.1572 ] Generating blob
[ 2.3037 ] Disable RCE in rcm kernel-dtb.
[ 2.3330 ] tegrahost_v2 --chip 0x19 --generateblob blob.xml blob.bin
[ 2.3335 ] number of images in blob are 13
[ 2.3337 ] blobsize is 44318898
[ 2.3337 ] Added binary blob_nvtboot_recovery_cpu_t194_sigheader.bin.encrypt of size 232976
[ 2.3436 ] Added binary blob_nvtboot_recovery_t194_sigheader.bin.encrypt of size 206016
[ 2.3437 ] Added binary blob_preboot_c10_prod_cr_sigheader.bin.encrypt of size 24016
[ 2.3438 ] Added binary blob_mce_c10_prod_cr_sigheader.bin.encrypt of size 145184
[ 2.3440 ] Added binary blob_mts_c10_prod_cr_sigheader.bin.encrypt of size 3430416
[ 2.3448 ] Added binary blob_bpmp-2_t194_sigheader.bin.encrypt of size 1007392
[ 2.3452 ] Added binary blob_tegra194-a02-bpmp-p3668-a00_lz4_sigheader.dtb.encrypt of size 36176
[ 2.3454 ] Added binary blob_spe_t194_sigheader.bin.encrypt of size 95232
[ 2.3455 ] Added binary blob_tos-optee_t194_sigheader.img.encrypt of size 948992
[ 2.3457 ] Added binary blob_eks_sigheader.img.encrypt of size 5136
[ 2.3458 ] Added binary blob_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt of size 340032
[ 2.3459 ] Added binary blob_initrd-flash.img of size 37525504
[ 2.3572 ] Added binary blob_kernel_tegra194-p3668-all-p3509-0000.dtb of size 321610
[ 2.3759 ] Sending bootloader and pre-requisite binaries
[ 2.3779 ] tegrarcm_v2 --instance 1-5 --download blob blob.bin
[ 2.3784 ] Applet version 01.00.0000
[ 2.3891 ] Sending blob
[ 2.3891 ] [. ] 002%
[ 2.3891 ] [.. ] 004%
[ 2.3891 ] [... ] 007%
[ 2.3891 ] [.... ] 009%
[ 2.3891 ] [..... ] 011%
[ 2.3891 ] [....... ] 014%
[ 2.3891 ] [........ ] 016%
[ 2.3891 ] [......... ] 018%
[ 2.3891 ] [.......... ] 021%
[ 2.3891 ] [........... ] 023%
[ 2.3891 ] [............. ] 026%
[ 2.3891 ] [.............. ] 028%
[ 2.3891 ] [............... ] 030%
[ 2.3891 ] [................ ] 033%
[ 2.3891 ] [................. ] 035%
[ 2.3891 ] [.................. ] 037%
[ 2.3891 ] [.................... ] 040%
[ 2.3891 ] [..................... ] 042%
[ 2.3891 ] [...................... ] 044%
[ 2.3891 ] [....................... ] 047%
[ 2.3891 ] [........................ ] 049%
[ 2.3891 ] [.......................... ] 052%
[ 2.3891 ] [........................... ] 054%
[ 2.3891 ] [............................ ] 056%
[ 2.3891 ] [............................. ] 059%
[ 2.3891 ] [.............................. ] 061%
[ 2.3891 ] [............................... ] 063%
[ 2.3891 ] [................................. ] 066%
[ 2.3891 ] [.................................. ] 068%
[ 2.3891 ] [................................... ] 070%
[ 2.3891 ] [.................................... ] 073%
[ 2.3891 ] [..................................... ] 075%
[ 2.3891 ] [....................................... ] 078%
[ 2.3891 ] [........................................ ] 080%
[ 2.3891 ] [......................................... ] 082%
[ 2.3891 ] [.......................................... ] 085%
[ 2.3891 ] [........................................... ] 087%
[ 2.3891 ] [............................................ ] 089%
[ 2.3891 ] [.............................................. ] 092%
[ 2.3891 ] [............................................... ] 094%
[ 2.3891 ] [................................................] 097%
[ 2.3891 ] [................................................] 099%
[ 2.3891 ] [................................................] 100%
[ 8.7449 ] tegrarcm_v2 --instance 1-5 --boot rcm
[ 8.7476 ] Applet version 01.00.0000
[ 8.7658 ] RCM-boot started
== Step 3: Sending flash sequence commands at 2024-06-14T17:18:13+02:00 ==
Waiting for USB storage device flashpkg from 565ffc03...........
Thank you for your help