[ 5.4141 ] tegrahost_v2 --chip 0x23 0 --blocksize 512 --magicid MEMB --addsigheader_multi tegra234-p3767-0004-sdram-l4t_cpp_1.bct tegra234-p3767-0004-sdram-l4t_cpp_2.bct tegra234-p3767-0004-sdram-l4t_cpp_3.bct tegra234-p3767-0004-sdram-l4t_cpp_4.bct
[ 5.4152 ] Binary 0 length is 58752
[ 5.4158 ] Binary 0 align length is 58880
[ 5.4168 ] Binary 1 length is 58752
[ 5.4171 ] Binary 1 align length is 58880
[ 5.4184 ] Binary 2 length is 58752
[ 5.4186 ] Binary 2 align length is 58880
[ 5.4194 ] Binary 3 length is 58752
[ 5.4196 ] Binary 3 align length is 58880
[ 5.4204 ] Buffer length is 235520
[ 5.4206 ] adding BCH for tegra234-p3767-0004-sdram-l4t_cpp_1.bct
[ 5.4209 ] new length is 243712
[ 5.4209 ]
[ 5.4226 ] tegrahost_v2 --chip 0x23 0 --align mem_coldboot_aligned.bct
[ 5.4246 ] tegrahost_v2 --chip 0x23 0 --magicid MEMB --ratchet_blob ratchet_blob.bin --appendsigheader mem_coldboot_aligned.bct zerosbk
[ 5.4254 ] Header already present for mem_coldboot_aligned.bct
[ 5.4268 ] tegrasign_v3.py --key None --list mem_coldboot_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 5.4270 ] Assuming zero filled SBK key
[ 5.4290 ] Warning: pub_key.key is not found
[ 5.4298 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mem_coldboot_aligned_sigheader.bct.encrypt mem_coldboot_aligned_sigheader.bct.hash zerosbk
[ 5.4364 ] Generating recovery mem-bct
[ 5.4379 ] tegrabct_v2 --chip 0x23 0 --sdram tegra234-p3767-0004-sdram-l4t_cpp.dtb --wb0sdram tegra234-p3767-0004-wb0sdram-l4t_cpp.dtb --membct tegra234-p3767-0004-sdram-l4t_cpp_1.bct tegra234-p3767-0004-sdram-l4t_cpp_2.bct tegra234-p3767-0004-sdram-l4t_cpp_3.bct tegra234-p3767-0004-sdram-l4t_cpp_4.bct
[ 5.4389 ] packing sdram params with Wb0 file tegra234-p3767-0004-wb0sdram-l4t_cpp.dtb
[ 5.5244 ] Packing sdram param for instance[0]
[ 5.5248 ] Packing sdram param for instance[1]
[ 5.5250 ] Packing sdram param for instance[2]
[ 5.5252 ] Packing sdram param for instance[3]
[ 5.5254 ] Packing sdram param for instance[4]
[ 5.5258 ] Packing sdram param for instance[5]
[ 5.5260 ] Packing sdram param for instance[6]
[ 5.5265 ] Packing sdram param for instance[7]
[ 5.5268 ] Packing sdram param for instance[8]
[ 5.5273 ] Packing sdram param for instance[9]
[ 5.5275 ] Packing sdram param for instance[10]
[ 5.5278 ] Packing sdram param for instance[11]
[ 5.5281 ] Packing sdram param for instance[12]
[ 5.5286 ] Packing sdram param for instance[13]
[ 5.5288 ] Packing sdram param for instance[14]
[ 5.5289 ] Packing sdram param for instance[15]
[ 5.6083 ] Reading ramcode from backup chip_info.bin file
[ 5.6084 ] RAMCODE Read from Device: 4
[ 5.6084 ] Using ramcode 1
[ 5.6084 ] Disabled BPMP dtb trim, using default dtb
[ 5.6084 ]
[ 5.6098 ] tegrahost_v2 --chip 0x23 0 --align mem_rcm_aligned.bct
[ 5.6114 ] tegrahost_v2 --chip 0x23 0 --magicid MEM1 --ratchet_blob ratchet_blob.bin --appendsigheader mem_rcm_aligned.bct zerosbk
[ 5.6121 ] adding BCH for mem_rcm_aligned.bct
[ 5.6152 ] tegrasign_v3.py --key None --list mem_rcm_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 5.6153 ] Assuming zero filled SBK key
[ 5.6176 ] Warning: pub_key.key is not found
[ 5.6181 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mem_rcm_aligned_sigheader.bct.encrypt mem_rcm_aligned_sigheader.bct.hash zerosbk
[ 5.6211 ] Copying signatures
[ 5.6222 ] tegrahost_v2 --chip 0x23 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[ 5.7338 ] tegraparser_v2 --generategpt --pt flash.xml.bin
[ 5.7351 ] gpt_secondary_3_0.bin:
[ 5.7357 ] partition_id partition_name StartingLba EndingLba
[ 5.7361 ] 1 BCT 0 2047
[ 5.7365 ] 2 A_mb1 2048 3071
[ 5.7369 ] 3 A_psc_bl1 3072 3583
[ 5.7374 ] 4 A_MB1_BCT 3584 3839
[ 5.7377 ] 5 A_MEM_BCT 3840 4351
[ 5.7377 ] 6 A_tsec-fw 4352 6399
[ 5.7377 ] 7 A_nvdec 6400 8447
[ 5.7377 ] 8 A_mb2 8448 9471
[ 5.7377 ] 9 A_xusb-fw 9472 9983
[ 5.7377 ] 10 A_bpmp-fw 9984 13055
[ 5.7377 ] 11 A_bpmp-fw-dtb 13056 21247
[ 5.7377 ] 12 A_psc-fw 21248 22783
[ 5.7377 ] 13 A_mts-mce 22784 23807
[ 5.7378 ] 14 A_sc7 23808 24191
[ 5.7378 ] 15 A_pscrf 24192 24575
[ 5.7378 ] 16 A_mb2rf 24576 24831
[ 5.7378 ] 17 A_cpu-bootloader 24832 31999
[ 5.7378 ] 18 A_secure-os 32000 40191
[ 5.7378 ] 19 A_smm-fw 40192 44287
[ 5.7378 ] 20 A_eks 44288 44799
[ 5.7378 ] 21 A_dce-fw 44800 55039
[ 5.7378 ] 22 A_spe-fw 55040 56191
[ 5.7378 ] 23 A_rce-fw 56192 58239
[ 5.7378 ] 24 A_adsp-fw 58240 62335
[ 5.7378 ] 25 A_pva-fw 62336 62847
[ 5.7378 ] 26 A_reserved_on_boot 62848 65023
[ 5.7378 ] 27 B_mb1 65024 66047
[ 5.7378 ] 28 B_psc_bl1 66048 66559
[ 5.7378 ] 29 B_MB1_BCT 66560 66815
[ 5.7378 ] 30 B_MEM_BCT 66816 67327
[ 5.7379 ] 31 B_tsec-fw 67328 69375
[ 5.7379 ] 32 B_nvdec 69376 71423
[ 5.7379 ] 33 B_mb2 71424 72447
[ 5.7379 ] 34 B_xusb-fw 72448 72959
[ 5.7379 ] 35 B_bpmp-fw 72960 76031
[ 5.7379 ] 36 B_bpmp-fw-dtb 76032 84223
[ 5.7379 ] 37 B_psc-fw 84224 85759
[ 5.7379 ] 38 B_mts-mce 85760 86783
[ 5.7379 ] 39 B_sc7 86784 87167
[ 5.7380 ] 40 B_pscrf 87168 87551
[ 5.7380 ] 41 B_mb2rf 87552 87807
[ 5.7380 ] 42 B_cpu-bootloader 87808 94975
[ 5.7380 ] 43 B_secure-os 94976 103167
[ 5.7380 ] 44 B_smm-fw 103168 107263
[ 5.7380 ] 45 B_eks 107264 107775
[ 5.7380 ] 46 B_dce-fw 107776 118015
[ 5.7380 ] 47 B_spe-fw 118016 119167
[ 5.7380 ] 48 B_rce-fw 119168 121215
[ 5.7381 ] 49 B_adsp-fw 121216 125311
[ 5.7381 ] 50 B_pva-fw 125312 125823
[ 5.7381 ] 51 B_reserved_on_boot 125824 127999
[ 5.7381 ] 52 uefi_variables 128000 128511
[ 5.7381 ] 53 uefi_ftw 128512 129535
[ 5.7381 ] 54 reserved 129536 129919
[ 5.7381 ] 55 worm 129920 130303
[ 5.7381 ] 56 BCT-boot-chain_backup 130304 130431
[ 5.7381 ] 57 reserved_partition 130432 130559
[ 5.7381 ] 58 secondary_gpt_backup 130560 130687
[ 5.7381 ] 59 B_VER 130688 130815
[ 5.7382 ] 60 A_VER 130816 130943
[ 5.7382 ] gpt_primary_6_0.bin:
[ 5.7382 ] partition_id partition_name StartingLba EndingLba
[ 5.7382 ] 1 APP 3050048119537623
[ 5.7382 ] 2 A_kernel 40 262183
[ 5.7382 ] 3 A_kernel-dtb 262184 263719
[ 5.7382 ] 4 A_reserved_on_user 263720 328487
[ 5.7382 ] 5 B_kernel 328488 590631
[ 5.7382 ] 6 B_kernel-dtb 590632 592167
[ 5.7382 ] 7 B_reserved_on_user 592168 656935
[ 5.7382 ] 8 recovery 656936 820775
[ 5.7382 ] 9 recovery-dtb 820776 821799
[ 5.7382 ] 10 esp 821800 952871
[ 5.7383 ] 11 recovery_alt 952872 1116711
[ 5.7383 ] 12 recovery-dtb_alt 1116712 1117735
[ 5.7383 ] 13 esp_alt 1117736 1248807
[ 5.7383 ] 14 UDA 1248832 2068031
[ 5.7383 ] 15 reserved 2068032 3050047
[ 5.7383 ] gpt_secondary_6_0.bin:
[ 5.7383 ] partition_id partition_name StartingLba EndingLba
[ 5.7383 ] 1 APP 3050048119537623
[ 5.7383 ] 2 A_kernel 40 262183
[ 5.7383 ] 3 A_kernel-dtb 262184 263719
[ 5.7384 ] 4 A_reserved_on_user 263720 328487
[ 5.7384 ] 5 B_kernel 328488 590631
[ 5.7384 ] 6 B_kernel-dtb 590632 592167
[ 5.7384 ] 7 B_reserved_on_user 592168 656935
[ 5.7384 ] 8 recovery 656936 820775
[ 5.7384 ] 9 recovery-dtb 820776 821799
[ 5.7384 ] 10 esp 821800 952871
[ 5.7384 ] 11 recovery_alt 952872 1116711
[ 5.7384 ] 12 recovery-dtb_alt 1116712 1117735
[ 5.7384 ] 13 esp_alt 1117736 1248807
[ 5.7384 ] 14 UDA 1248832 2068031
[ 5.7384 ] 15 reserved 2068032 3050047
[ 5.7384 ]
[ 5.7402 ] Get magic id
[ 5.7413 ] tegraparser_v2 --get_magic psc_fw
[ 5.7421 ] PFWP
[ 5.7422 ] partition type psc_fw, magic id = PFWP
[ 5.7469 ] tegrahost_v2 --chip 0x23 0 --align pscfw_t234_prod_aligned.bin
[ 5.7487 ] tegrahost_v2 --chip 0x23 0 --magicid PFWP --ratchet_blob ratchet_blob.bin --appendsigheader pscfw_t234_prod_aligned.bin zerosbk
[ 5.7496 ] Header already present for pscfw_t234_prod_aligned.bin
[ 5.7558 ] tegrasign_v3.py --key None --list pscfw_t234_prod_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 5.7560 ] Assuming zero filled SBK key
[ 5.7582 ] Warning: pub_key.key is not found
[ 5.7588 ] tegrahost_v2 --chip 0x23 0 --updatesigheader pscfw_t234_prod_aligned_sigheader.bin.encrypt pscfw_t234_prod_aligned_sigheader.bin.hash zerosbk
[ 5.7634 ] Get magic id
[ 5.7649 ] tegraparser_v2 --get_magic mts_mce
[ 5.7662 ] MTSM
[ 5.7663 ] partition type mts_mce, magic id = MTSM
[ 5.7685 ] tegrahost_v2 --chip 0x23 0 --align mce_flash_o10_cr_prod_aligned.bin
[ 5.7707 ] tegrahost_v2 --chip 0x23 0 --magicid MTSM --ratchet_blob ratchet_blob.bin --appendsigheader mce_flash_o10_cr_prod_aligned.bin zerosbk
[ 5.7718 ] Header already present for mce_flash_o10_cr_prod_aligned.bin
[ 5.7760 ] tegrasign_v3.py --key None --list mce_flash_o10_cr_prod_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 5.7762 ] Assuming zero filled SBK key
[ 5.7781 ] Warning: pub_key.key is not found
[ 5.7785 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mce_flash_o10_cr_prod_aligned_sigheader.bin.encrypt mce_flash_o10_cr_prod_aligned_sigheader.bin.hash zerosbk
[ 5.7817 ] Get magic id
[ 5.7827 ] tegraparser_v2 --get_magic tsec_fw
[ 5.7844 ] TSEC
[ 5.7844 ]
[ 5.7844 ] partition type tsec_fw, magic id = TSEC
[ 5.7863 ] tegrahost_v2 --chip 0x23 0 --align tsec_t234_aligned.bin
[ 5.7884 ] tegrahost_v2 --chip 0x23 0 --magicid TSEC --ratchet_blob ratchet_blob.bin --appendsigheader tsec_t234_aligned.bin zerosbk
[ 5.7892 ] Header already present for tsec_t234_aligned.bin
[ 5.7933 ] tegrasign_v3.py --key None --list tsec_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 5.7935 ] Assuming zero filled SBK key
[ 5.7956 ] Warning: pub_key.key is not found
[ 5.7965 ] tegrahost_v2 --chip 0x23 0 --updatesigheader tsec_t234_aligned_sigheader.bin.encrypt tsec_t234_aligned_sigheader.bin.hash zerosbk
[ 5.8002 ] Get magic id
[ 5.8013 ] tegraparser_v2 --get_magic mb2_applet
[ 5.8024 ] MB2A
[ 5.8025 ] partition type mb2_applet, magic id = MB2A
[ 5.8039 ] tegrahost_v2 --chip 0x23 0 --align applet_t234_aligned.bin
[ 5.8056 ] tegrahost_v2 --chip 0x23 0 --magicid MB2A --ratchet_blob ratchet_blob.bin --appendsigheader applet_t234_aligned.bin zerosbk
[ 5.8065 ] adding BCH for applet_t234_aligned.bin
[ 5.8166 ] tegrasign_v3.py --key None --list applet_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 5.8169 ] Assuming zero filled SBK key
[ 5.8190 ] Warning: pub_key.key is not found
[ 5.8193 ] tegrahost_v2 --chip 0x23 0 --updatesigheader applet_t234_aligned_sigheader.bin.encrypt applet_t234_aligned_sigheader.bin.hash zerosbk
[ 5.8266 ] Generating recovery mb2-bct
[ 5.8266 ] tegrabct_v2 --chip 0x23 0 --mb2bct mb2_bct.cfg --recov --mb2bctcfg tegra234-mb2-bct-misc-p3767-0000_cpp.dtb --scr tegra234-mb2-bct-scr-p3767-0000_cpp.dtb
[ 5.8276 ] ERROR: value 0x31 is out of range
[ 5.8283 ] ERROR: value 0x31 is out of range
[ 5.8284 ] ERROR: value 0x31 is out of range
[ 5.8285 ] ERROR: value 0x31 is out of range
[ 5.8286 ] WARNING: unknown property 'tfc_version'
[ 5.8288 ] WARNING: unknown property 'addr_header_version'
[ 5.8366 ] Updating mb2-bct with storage information for RCM
[ 5.8376 ] tegrabct_v2 --chip 0x23 0 --mb2bct mb2_bct_MB2.bct --updatestorageinfo flash.xml.bin
[ 5.8389 ] Concatenating mb2-bct to mb2 binary
[ 5.8389 ] mb2_bin_file = mb2_t234.bin
[ 5.8389 ] mb2_bct_file = mb2_bct_MB2.bct
[ 5.8393 ] Get magic id
[ 5.8401 ] tegraparser_v2 --get_magic mb2_bootloader
[ 5.8408 ] MB2B
[ 5.8409 ] partition type mb2_bootloader, magic id = MB2B
[ 5.8420 ] tegrahost_v2 --chip 0x23 0 --align mb2_t234_with_mb2_bct_MB2_aligned.bin
[ 5.8436 ] tegrahost_v2 --chip 0x23 0 --magicid MB2B --ratchet_blob ratchet_blob.bin --appendsigheader mb2_t234_with_mb2_bct_MB2_aligned.bin zerosbk
[ 5.8444 ] adding BCH for mb2_t234_with_mb2_bct_MB2_aligned.bin
[ 5.8601 ] tegrasign_v3.py --key None --list mb2_t234_with_mb2_bct_MB2_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 5.8603 ] Assuming zero filled SBK key
[ 5.8629 ] Warning: pub_key.key is not found
[ 5.8636 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb2_t234_with_mb2_bct_MB2_aligned_sigheader.bin.encrypt mb2_t234_with_mb2_bct_MB2_aligned_sigheader.bin.hash zerosbk
[ 5.8696 ] Get magic id
[ 5.8708 ] tegraparser_v2 --get_magic xusb_fw
[ 5.8719 ] XUSB
[ 5.8719 ]
[ 5.8719 ] partition type xusb_fw, magic id = XUSB
[ 5.8742 ] tegrahost_v2 --chip 0x23 0 --align xusb_t234_prod_aligned.bin
[ 5.8762 ] tegrahost_v2 --chip 0x23 0 --magicid XUSB --ratchet_blob ratchet_blob.bin --appendsigheader xusb_t234_prod_aligned.bin zerosbk
[ 5.8773 ] adding BCH for xusb_t234_prod_aligned.bin
[ 5.8838 ] tegrasign_v3.py --key None --list xusb_t234_prod_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 5.8840 ] Assuming zero filled SBK key
[ 5.8862 ] Warning: pub_key.key is not found
[ 5.8869 ] tegrahost_v2 --chip 0x23 0 --updatesigheader xusb_t234_prod_aligned_sigheader.bin.encrypt xusb_t234_prod_aligned_sigheader.bin.hash zerosbk
[ 5.8930 ] Get magic id
[ 5.8941 ] tegraparser_v2 --get_magic pva_fw
[ 5.8948 ] PVAF
[ 5.8949 ] partition type pva_fw, magic id = PVAF
[ 5.9050 ] tegrahost_v2 --chip 0x23 0 --align nvpva_020_aligned.fw
[ 5.9075 ] tegrahost_v2 --chip 0x23 0 --magicid PVAF --ratchet_blob ratchet_blob.bin --appendsigheader nvpva_020_aligned.fw zerosbk
[ 5.9087 ] adding BCH for nvpva_020_aligned.fw
[ 5.9862 ] tegrasign_v3.py --key None --list nvpva_020_aligned_sigheader.fw_list.xml --pubkeyhash pub_key.key --sha sha512
[ 5.9864 ] Assuming zero filled SBK key
[ 5.9913 ] Warning: pub_key.key is not found
[ 5.9917 ] tegrahost_v2 --chip 0x23 0 --updatesigheader nvpva_020_aligned_sigheader.fw.encrypt nvpva_020_aligned_sigheader.fw.hash zerosbk
[ 6.0161 ] Kernel DTB used: kernel_tegra234-p3768-0000+p3767-0004-nv.dtb
[ 6.0161 ] Concatenating kernel-dtb to dce-fw binary
[ 6.0162 ] dce_bin = display-t234-dce.bin
[ 6.0162 ] kernel_dtb = kernel_tegra234-p3768-0000+p3767-0004-nv.dtb
[ 6.0162 ] dce_with_dtb = display-t234-dce_with_kernel_tegra234-p3768-0000+p3767-0004-nv.bin
[ 6.0656 ] Get magic id
[ 6.0669 ] tegraparser_v2 --get_magic dce_fw
[ 6.0678 ] DCEF
[ 6.0679 ] partition type dce_fw, magic id = DCEF
[ 6.1153 ] tegrahost_v2 --chip 0x23 0 --align display-t234-dce_with_kernel_tegra234-p3768-0000+p3767-0004-nv_aligned.bin
[ 6.1167 ] tegrahost_v2 --chip 0x23 0 --magicid DCEF --ratchet_blob ratchet_blob.bin --appendsigheader display-t234-dce_with_kernel_tegra234-p3768-0000+p3767-0004-nv_aligned.bin zerosbk
[ 6.1174 ] adding BCH for display-t234-dce_with_kernel_tegra234-p3768-0000+p3767-0004-nv_aligned.bin
[ 6.5092 ] tegrasign_v3.py --key None --list display-t234-dce_with_kernel_tegra234-p3768-0000+p3767-0004-nv_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 6.5094 ] Assuming zero filled SBK key
[ 6.5352 ] Warning: pub_key.key is not found
[ 6.5359 ] tegrahost_v2 --chip 0x23 0 --updatesigheader display-t234-dce_with_kernel_tegra234-p3768-0000+p3767-0004-nv_aligned_sigheader.bin.encrypt display-t234-dce_with_kernel_tegra234-p3768-0000+p3767-0004-nv_aligned_sigheader.bin.hash zerosbk
[ 6.7004 ] Get magic id
[ 6.7016 ] tegraparser_v2 --get_magic nvdec
[ 6.7028 ] NDEC
[ 6.7028 ]
[ 6.7028 ] partition type nvdec, magic id = NDEC
[ 6.7051 ] tegrahost_v2 --chip 0x23 0 --align nvdec_t234_prod_aligned.fw
[ 6.7065 ] tegrahost_v2 --chip 0x23 0 --magicid NDEC --ratchet_blob ratchet_blob.bin --appendsigheader nvdec_t234_prod_aligned.fw zerosbk
[ 6.7072 ] Header already present for nvdec_t234_prod_aligned.fw
[ 6.7131 ] tegrasign_v3.py --key None --list nvdec_t234_prod_aligned_sigheader.fw_list.xml --pubkeyhash pub_key.key --sha sha512
[ 6.7133 ] Assuming zero filled SBK key
[ 6.7152 ] Warning: pub_key.key is not found
[ 6.7154 ] tegrahost_v2 --chip 0x23 0 --updatesigheader nvdec_t234_prod_aligned_sigheader.fw.encrypt nvdec_t234_prod_aligned_sigheader.fw.hash zerosbk
[ 6.7195 ] Get magic id
[ 6.7203 ] tegraparser_v2 --get_magic bpmp_fw
[ 6.7210 ] BPMF
[ 6.7211 ]
[ 6.7211 ] partition type bpmp_fw, magic id = BPMF
[ 6.7262 ] tegrahost_v2 --chip 0x23 0 --align bpmp_t234-TE950M-A1_prod_aligned.bin
[ 6.7279 ] tegrahost_v2 --chip 0x23 0 --magicid BPMF --ratchet_blob ratchet_blob.bin --appendsigheader bpmp_t234-TE950M-A1_prod_aligned.bin zerosbk
[ 6.7287 ] Header already present for bpmp_t234-TE950M-A1_prod_aligned.bin
[ 6.7466 ] tegrasign_v3.py --key None --list bpmp_t234-TE950M-A1_prod_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 6.7468 ] Assuming zero filled SBK key
[ 6.7502 ] Warning: pub_key.key is not found
[ 6.7510 ] tegrahost_v2 --chip 0x23 0 --updatesigheader bpmp_t234-TE950M-A1_prod_aligned_sigheader.bin.encrypt bpmp_t234-TE950M-A1_prod_aligned_sigheader.bin.hash zerosbk
[ 6.7642 ] Using bpmp-dtb concatenated with odmdata
[ 6.7643 ] Get magic id
[ 6.7660 ] tegraparser_v2 --get_magic bpmp_fw_dtb
[ 6.7674 ] BPMD
[ 6.7676 ] partition type bpmp_fw_dtb, magic id = BPMD
[ 6.7700 ] tegrahost_v2 --chip 0x23 0 --align tegra234-bpmp-3767-0004-3509-a02_with_odm_aligned.dtb
[ 6.7725 ] tegrahost_v2 --chip 0x23 0 --magicid BPMD --ratchet_blob ratchet_blob.bin --appendsigheader tegra234-bpmp-3767-0004-3509-a02_with_odm_aligned.dtb zerosbk
[ 6.7735 ] adding BCH for tegra234-bpmp-3767-0004-3509-a02_with_odm_aligned.dtb
[ 6.7814 ] tegrasign_v3.py --key None --list tegra234-bpmp-3767-0004-3509-a02_with_odm_aligned_sigheader.dtb_list.xml --pubkeyhash pub_key.key --sha sha512
[ 6.7816 ] Assuming zero filled SBK key
[ 6.7842 ] Warning: pub_key.key is not found
[ 6.7849 ] tegrahost_v2 --chip 0x23 0 --updatesigheader tegra234-bpmp-3767-0004-3509-a02_with_odm_aligned_sigheader.dtb.encrypt tegra234-bpmp-3767-0004-3509-a02_with_odm_aligned_sigheader.dtb.hash zerosbk
[ 6.7894 ] Get magic id
[ 6.7906 ] tegraparser_v2 --get_magic rce_fw
[ 6.7917 ] RCEF
[ 6.7919 ] partition type rce_fw, magic id = RCEF
[ 6.7956 ] tegrahost_v2 --chip 0x23 0 --align camera-rtcpu-t234-rce_aligned.img
[ 6.7979 ] tegrahost_v2 --chip 0x23 0 --magicid RCEF --ratchet_blob ratchet_blob.bin --appendsigheader camera-rtcpu-t234-rce_aligned.img zerosbk
[ 6.7991 ] adding BCH for camera-rtcpu-t234-rce_aligned.img
[ 6.8172 ] tegrasign_v3.py --key None --list camera-rtcpu-t234-rce_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512
[ 6.8174 ] Assuming zero filled SBK key
[ 6.8200 ] Warning: pub_key.key is not found
[ 6.8203 ] tegrahost_v2 --chip 0x23 0 --updatesigheader camera-rtcpu-t234-rce_aligned_sigheader.img.encrypt camera-rtcpu-t234-rce_aligned_sigheader.img.hash zerosbk
[ 6.8285 ] Get magic id
[ 6.8300 ] tegraparser_v2 --get_magic ape_fw
[ 6.8308 ] APEF
[ 6.8309 ] partition type ape_fw, magic id = APEF
[ 6.8338 ] tegrahost_v2 --chip 0x23 0 --align adsp-fw_aligned.bin
[ 6.8354 ] tegrahost_v2 --chip 0x23 0 --magicid APEF --ratchet_blob ratchet_blob.bin --appendsigheader adsp-fw_aligned.bin zerosbk
[ 6.8362 ] adding BCH for adsp-fw_aligned.bin
[ 6.8520 ] tegrasign_v3.py --key None --list adsp-fw_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 6.8524 ] Assuming zero filled SBK key
[ 6.8551 ] Warning: pub_key.key is not found
[ 6.8557 ] tegrahost_v2 --chip 0x23 0 --updatesigheader adsp-fw_aligned_sigheader.bin.encrypt adsp-fw_aligned_sigheader.bin.hash zerosbk
[ 6.8615 ] Get magic id
[ 6.8627 ] tegraparser_v2 --get_magic spe_fw
[ 6.8639 ] SPEF
[ 6.8640 ]
[ 6.8640 ] partition type spe_fw, magic id = SPEF
[ 6.8665 ] tegrahost_v2 --chip 0x23 0 --align spe_t234_aligned.bin
[ 6.8687 ] tegrahost_v2 --chip 0x23 0 --magicid SPEF --ratchet_blob ratchet_blob.bin --appendsigheader spe_t234_aligned.bin zerosbk
[ 6.8697 ] adding BCH for spe_t234_aligned.bin
[ 6.8808 ] tegrasign_v3.py --key None --list spe_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 6.8810 ] Assuming zero filled SBK key
[ 6.8833 ] Warning: pub_key.key is not found
[ 6.8840 ] tegrahost_v2 --chip 0x23 0 --updatesigheader spe_t234_aligned_sigheader.bin.encrypt spe_t234_aligned_sigheader.bin.hash zerosbk
[ 6.8911 ] Get magic id
[ 6.8924 ] tegraparser_v2 --get_magic tos
[ 6.8934 ] TOSB
[ 6.8935 ] partition type tos, magic id = TOSB
[ 6.9016 ] tegrahost_v2 --chip 0x23 0 --align tos-optee_t234_aligned.img
[ 6.9039 ] tegrahost_v2 --chip 0x23 0 --magicid TOSB --ratchet_blob ratchet_blob.bin --appendsigheader tos-optee_t234_aligned.img zerosbk
[ 6.9050 ] adding BCH for tos-optee_t234_aligned.img
[ 6.9594 ] tegrasign_v3.py --key None --list tos-optee_t234_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512
[ 6.9596 ] Assuming zero filled SBK key
[ 6.9636 ] Warning: pub_key.key is not found
[ 6.9641 ] tegrahost_v2 --chip 0x23 0 --updatesigheader tos-optee_t234_aligned_sigheader.img.encrypt tos-optee_t234_aligned_sigheader.img.hash zerosbk
[ 6.9811 ] Get magic id
[ 6.9829 ] tegraparser_v2 --get_magic eks
[ 6.9844 ] EKSB
[ 6.9844 ]
[ 6.9845 ] partition type eks, magic id = EKSB
[ 6.9859 ] tegrahost_v2 --chip 0x23 0 --align eks_t234_aligned.img
[ 6.9880 ] tegrahost_v2 --chip 0x23 0 --magicid EKSB --ratchet_blob ratchet_blob.bin --appendsigheader eks_t234_aligned.img zerosbk
[ 6.9888 ] adding BCH for eks_t234_aligned.img
[ 6.9900 ] tegrasign_v3.py --key None --list eks_t234_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512
[ 6.9902 ] Assuming zero filled SBK key
[ 6.9919 ] Warning: pub_key.key is not found
[ 6.9926 ] tegrahost_v2 --chip 0x23 0 --updatesigheader eks_t234_aligned_sigheader.img.encrypt eks_t234_aligned_sigheader.img.hash zerosbk
[ 7.0095 ] tegrahost_v2 --chip 0x23 0 --align uefi_jetson_with_dtb_aligned.bin
[ 7.0111 ] tegrahost_v2 --chip 0x23 0 --magicid CPBL --ratchet_blob ratchet_blob.bin --appendsigheader uefi_jetson_with_dtb_aligned.bin zerosbk
[ 7.0119 ] adding BCH for uefi_jetson_with_dtb_aligned.bin
[ 7.1290 ] tegrasign_v3.py --key None --list uefi_jetson_with_dtb_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 7.1292 ] Assuming zero filled SBK key
[ 7.1370 ] Warning: pub_key.key is not found
[ 7.1378 ] tegrahost_v2 --chip 0x23 0 --updatesigheader uefi_jetson_with_dtb_aligned_sigheader.bin.encrypt uefi_jetson_with_dtb_aligned_sigheader.bin.hash zerosbk
[ 7.1745 ] Copying enc\/signed file in /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2300 ] Copying br bct for multi chains
[ 7.2302 ] Signed BCT for boot chain A is copied to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/br_bct_BR.bct
[ 7.2303 ] Signed BCT for boot chain B is copied to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/br_bct_b_BR.bct
[ 7.2303 ] Copying BCT backup image bct_backup.img to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/bct_backup.img
[ 7.2336 ] Copying pscfw_t234_prod_sigheader.bin.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2350 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/pscfw_t234_prod_sigheader.bin.encrypt
[ 7.2350 ] Copying mce_flash_o10_cr_prod_sigheader.bin.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2360 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/mce_flash_o10_cr_prod_sigheader.bin.encrypt
[ 7.2360 ] Copying tsec_t234_sigheader.bin.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2369 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/tsec_t234_sigheader.bin.encrypt
[ 7.2370 ] Copying applet_t234_sigheader.bin.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2372 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/applet_t234_sigheader.bin.encrypt
[ 7.2372 ] Copying mb2_t234_with_mb2_bct_MB2_sigheader.bin.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2376 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/mb2_t234_with_mb2_bct_MB2_sigheader.bin.encrypt
[ 7.2376 ] Copying xusb_t234_prod_sigheader.bin.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2384 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/xusb_t234_prod_sigheader.bin.encrypt
[ 7.2385 ] Copying nvpva_020_sigheader.fw.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2400 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/nvpva_020_sigheader.fw.encrypt
[ 7.2400 ] Copying display-t234-dce_sigheader.bin.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2472 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/display-t234-dce_sigheader.bin.encrypt
[ 7.2472 ] Copying display-t234-dce_with_kernel_tegra234-p3768-0000+p3767-0004-nv_sigheader.bin.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2553 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/display-t234-dce_with_kernel_tegra234-p3768-0000+p3767-0004-nv_sigheader.bin.encrypt
[ 7.2554 ] Copying nvdec_t234_prod_sigheader.fw.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2569 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/nvdec_t234_prod_sigheader.fw.encrypt
[ 7.2570 ] Copying bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2613 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt
[ 7.2613 ] Copying tegra234-bpmp-3767-0004-3509-a02_with_odm_sigheader.dtb.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2625 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/tegra234-bpmp-3767-0004-3509-a02_with_odm_sigheader.dtb.encrypt
[ 7.2625 ] Copying camera-rtcpu-t234-rce_sigheader.img.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2644 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/camera-rtcpu-t234-rce_sigheader.img.encrypt
[ 7.2644 ] Copying adsp-fw_sigheader.bin.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2662 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/adsp-fw_sigheader.bin.encrypt
[ 7.2662 ] Copying spe_t234_sigheader.bin.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2675 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/spe_t234_sigheader.bin.encrypt
[ 7.2676 ] Copying tos-optee_t234_sigheader.img.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2738 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/tos-optee_t234_sigheader.img.encrypt
[ 7.2738 ] Copying eks_t234_sigheader.img.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2739 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/eks_t234_sigheader.img.encrypt
[ 7.2740 ] Copying uefi_jetson_with_dtb_sigheader.bin.encrypt to /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed
[ 7.2764 ] Signed file: /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/uefi_jetson_with_dtb_sigheader.bin.encrypt
[ 7.2796 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /home/zynq/nvidia/Linux_for_Tegra/bootloader/signed/flash.xml.tmp flash.idx
Using bpmp-dtb concatenated with odmdata in blob for t23x
./tegraflash.py --bl uefi_jetson_with_dtb_sigheader.bin.encrypt --bct br_bct_BR.bct --securedev --bldtb tegra234-p3768-0000+p3767-0004-nv.dtb --applet rcm_2_encrypt.rcm --applet_softfuse rcm_1_encrypt.rcm --cmd "rcmboot" --cfg secureflash.xml --chip 0x23 --mb1_bct mb1_bct_MB1_sigheader.bct.encrypt --mem_bct mem_rcm_sigheader.bct.encrypt --mb1_cold_boot_bct mb1_cold_boot_bct_MB1_sigheader.bct.encrypt --mb1_bin mb1_t234_prod_aligned_sigheader.bin.encrypt --psc_bl1_bin psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --mem_bct_cold_boot mem_coldboot_sigheader.bct.encrypt --bins "psc_fw pscfw_t234_prod_sigheader.bin.encrypt; mts_mce mce_flash_o10_cr_prod_sigheader.bin.encrypt; tsec_fw tsec_t234_sigheader.bin.encrypt; mb2_applet applet_t234_sigheader.bin.encrypt; mb2_bootloader mb2_t234_with_mb2_cold_boot_bct_MB2_sigheader.bin.encrypt; xusb_fw xusb_t234_prod_sigheader.bin.encrypt; pva_fw nvpva_020_sigheader.fw.encrypt; dce_fw display-t234-dce_sigheader.bin.encrypt; nvdec nvdec_t234_prod_sigheader.fw.encrypt; bpmp_fw bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt; bpmp_fw_dtb tegra234-bpmp-3767-0004-3509-a02_with_odm_sigheader.dtb.encrypt; rce_fw camera-rtcpu-t234-rce_sigheader.img.encrypt; ape_fw adsp-fw_sigheader.bin.encrypt; spe_fw spe_t234_sigheader.bin.encrypt; tos tos-optee_t234_sigheader.img.encrypt; eks eks_t234_sigheader.img.encrypt; kernel boot.img; kernel_dtb tegra234-p3768-0000+p3767-0004-nv.dtb" --bct_backup
saving flash command in flashcmd.txt
no_flash ...; prepare rcm blob
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
Entering RCM boot
[ 0.0196 ] mb1_t234_prod_aligned_sigheader.bin.encrypt filename is from --mb1_bin
[ 0.0196 ] psc_bl1_t234_prod_aligned_sigheader.bin.encrypt filename is from --psc_bl1_bin
[ 0.0197 ] rcm boot with presigned binaries
[ 0.0208 ] Generating blob for T23x
[ 0.0224 ] tegrahost_v2 --chip 0x23 0 --generateblob blob.xml blob.bin
[ 0.0233 ] The number of images in blob is 19
[ 0.0237 ] blobsize is 78193888
[ 0.0239 ] Added binary blob_uefi_jetson_with_dtb_sigheader.bin.encrypt of size 3563584
[ 0.0467 ] Added binary blob_pscfw_t234_prod_sigheader.bin.encrypt of size 310768
[ 0.0472 ] Added binary blob_mce_flash_o10_cr_prod_sigheader.bin.encrypt of size 187120
[ 0.0478 ] Added binary blob_tsec_t234_sigheader.bin.encrypt of size 176128
[ 0.0482 ] Added binary blob_applet_t234_sigheader.bin.encrypt of size 279616
[ 0.0496 ] Not supported type: mb2_applet
[ 0.0499 ] Added binary blob_mb2_t234_with_mb2_cold_boot_bct_MB2_sigheader.bin.encrypt of size 439968
[ 0.0502 ] Added binary blob_xusb_t234_prod_sigheader.bin.encrypt of size 164864
[ 0.0505 ] Added binary blob_nvpva_020_sigheader.fw.encrypt of size 2164640
[ 0.0509 ] Added binary blob_display-t234-dce_sigheader.bin.encrypt of size 12065152
[ 0.0561 ] Added binary blob_nvdec_t234_prod_sigheader.fw.encrypt of size 294912
[ 0.0582 ] Added binary blob_bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt of size 1027008
[ 0.0588 ] Added binary blob_tegra234-bpmp-3767-0004-3509-a02_with_odm_sigheader.dtb.encrypt of size 204672
[ 0.0591 ] Added binary blob_camera-rtcpu-t234-rce_sigheader.img.encrypt of size 458096
[ 0.0594 ] Added binary blob_adsp-fw_sigheader.bin.encrypt of size 414960
[ 0.0597 ] Added binary blob_spe_t234_sigheader.bin.encrypt of size 270336
[ 0.0601 ] Added binary blob_tos-optee_t234_sigheader.img.encrypt of size 1633344
[ 0.0605 ] Added binary blob_eks_t234_sigheader.img.encrypt of size 9232
[ 0.0609 ] Added binary blob_boot.img of size 54284288
[ 0.0945 ] Added binary blob_tegra234-p3768-0000+p3767-0004-nv.dtb of size 244096
[ 0.2268 ] All RCM required files are saved in rcm_blob folder
done.
*** no-flash flag enabled. Exiting now... ***
User can run above saved command in factory environment without
providing pkc and sbk keys to flash a device
Example:
$ cd bootloader
$ sudo bash ./flashcmd.txt
Save initrd flashing command parameters to /home/zynq/nvidia/Linux_for_Tegra/tools/kernel_flash/initrdflashparam.txt
/tmp/tmp.vEI3MTkdsx /home/zynq/nvidia/Linux_for_Tegra
writing boot image config in bootimg.cfg
extracting kernel in zImage
extracting ramdisk in initrd.img
/tmp/tmp.vEI3MTkdsx/initrd /tmp/tmp.vEI3MTkdsx /home/zynq/nvidia/Linux_for_Tegra
75110 块
106186 块
/tmp/tmp.vEI3MTkdsx /home/zynq/nvidia/Linux_for_Tegra
flashimg0=boot0.img
/home/zynq/nvidia/Linux_for_Tegra
Success
Cleaning up...
Finish generating flash package.
/home/zynq/nvidia/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh --initrd --usb-instance 1-1 --device-instance 0 --flash-only --initrd --network usb0 jetson-orin-nano-devkit internal
# Entry added by NVIDIA initrd flash tool
/home/zynq/nvidia/Linux_for_Tegra/tools/kernel_flash/tmp 127.0.0.1(rw,nohide,insecure,no_subtree_check,async,no_root_squash)
Export list for localhost:
/home/zynq/nvidia/Linux_for_Tegra/tools/kernel_flash/tmp 127.0.0.1
**********************************************
* *
* Step 1: Build the flashing environment *
* *
**********************************************
Create flash environment 0
/home/zynq/nvidia/Linux_for_Tegra/bootloader /home/zynq/nvidia/Linux_for_Tegra
/home/zynq/nvidia/Linux_for_Tegra
Finish creating flash environment 0.
****************************************************
* *
* Step 2: Boot the device with flash initrd image *
* *
****************************************************
/home/zynq/nvidia/Linux_for_Tegra/temp_initrdflash/bootloader0 /home/zynq/nvidia/Linux_for_Tegra
./tegraflash.py --bl uefi_jetson_with_dtb_sigheader.bin.encrypt --bct br_bct_BR.bct --securedev --bldtb tegra234-p3768-0000+p3767-0004-nv.dtb --applet rcm_2_encrypt.rcm --applet_softfuse rcm_1_encrypt.rcm --cmd "rcmboot" --cfg secureflash.xml --chip 0x23 --mb1_bct mb1_bct_MB1_sigheader.bct.encrypt --mem_bct mem_rcm_sigheader.bct.encrypt --mb1_cold_boot_bct mb1_cold_boot_bct_MB1_sigheader.bct.encrypt --mb1_bin mb1_t234_prod_aligned_sigheader.bin.encrypt --psc_bl1_bin psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --mem_bct_cold_boot mem_coldboot_sigheader.bct.encrypt --bins "psc_fw pscfw_t234_prod_sigheader.bin.encrypt; mts_mce mce_flash_o10_cr_prod_sigheader.bin.encrypt; tsec_fw tsec_t234_sigheader.bin.encrypt; mb2_applet applet_t234_sigheader.bin.encrypt; mb2_bootloader mb2_t234_with_mb2_cold_boot_bct_MB2_sigheader.bin.encrypt; xusb_fw xusb_t234_prod_sigheader.bin.encrypt; pva_fw nvpva_020_sigheader.fw.encrypt; dce_fw display-t234-dce_sigheader.bin.encrypt; nvdec nvdec_t234_prod_sigheader.fw.encrypt; bpmp_fw bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt; bpmp_fw_dtb tegra234-bpmp-3767-0004-3509-a02_with_odm_sigheader.dtb.encrypt; rce_fw camera-rtcpu-t234-rce_sigheader.img.encrypt; ape_fw adsp-fw_sigheader.bin.encrypt; spe_fw spe_t234_sigheader.bin.encrypt; tos tos-optee_t234_sigheader.img.encrypt; eks eks_t234_sigheader.img.encrypt; kernel boot0.img; kernel_dtb tegra234-p3768-0000+p3767-0004-nv.dtb" --bct_backup --instance 1-1
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
Entering RCM boot
[ 0.0351 ] mb1_t234_prod_aligned_sigheader.bin.encrypt filename is from --mb1_bin
[ 0.0351 ] psc_bl1_t234_prod_aligned_sigheader.bin.encrypt filename is from --psc_bl1_bin
[ 0.0351 ] rcm boot with presigned binaries
[ 0.0365 ] tegrarcm_v2 --instance 1-1 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[ 0.0375 ] BR_CID: 0x80012344705DD50C6C00000001FE8140
[ 0.0517 ] Sending bct_br
[ 0.0564 ] Sending mb1
[ 0.0577 ] Sending psc_bl1
[ 0.0948 ] Sending bct_mb1
[ 0.1147 ] Generating blob for T23x
[ 0.1167 ] tegrahost_v2 --chip 0x23 0 --generateblob blob.xml blob.bin
[ 0.1178 ] The number of images in blob is 19
[ 0.1181 ] blobsize is 86887648
[ 0.1181 ] Added binary blob_uefi_jetson_with_dtb_sigheader.bin.encrypt of size 3563584
[ 0.1458 ] Added binary blob_pscfw_t234_prod_sigheader.bin.encrypt of size 310768
[ 0.1464 ] Added binary blob_mce_flash_o10_cr_prod_sigheader.bin.encrypt of size 187120
[ 0.1466 ] Added binary blob_tsec_t234_sigheader.bin.encrypt of size 176128
[ 0.1467 ] Added binary blob_applet_t234_sigheader.bin.encrypt of size 279616
[ 0.1468 ] Not supported type: mb2_applet
[ 0.1469 ] Added binary blob_mb2_t234_with_mb2_cold_boot_bct_MB2_sigheader.bin.encrypt of size 439968
[ 0.1470 ] Added binary blob_xusb_t234_prod_sigheader.bin.encrypt of size 164864
[ 0.1479 ] Added binary blob_nvpva_020_sigheader.fw.encrypt of size 2164640
[ 0.1481 ] Added binary blob_display-t234-dce_sigheader.bin.encrypt of size 12065152
[ 0.1551 ] Added binary blob_nvdec_t234_prod_sigheader.fw.encrypt of size 294912
[ 0.1575 ] Added binary blob_bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt of size 1027008
[ 0.1581 ] Added binary blob_tegra234-bpmp-3767-0004-3509-a02_with_odm_sigheader.dtb.encrypt of size 204672
[ 0.1583 ] Added binary blob_camera-rtcpu-t234-rce_sigheader.img.encrypt of size 458096
[ 0.1586 ] Added binary blob_adsp-fw_sigheader.bin.encrypt of size 414960
[ 0.1588 ] Added binary blob_spe_t234_sigheader.bin.encrypt of size 270336
[ 0.1589 ] Added binary blob_tos-optee_t234_sigheader.img.encrypt of size 1633344
[ 0.1598 ] Added binary blob_eks_t234_sigheader.img.encrypt of size 9232
[ 0.1601 ] Added binary blob_boot0.img of size 62978048
[ 0.1929 ] Added binary blob_tegra234-p3768-0000+p3767-0004-nv.dtb of size 244096
[ 0.2613 ] tegrarcm_v2 --instance 1-1 --chip 0x23 0 --pollbl --download bct_mem mem_rcm_sigheader.bct.encrypt --download blob blob.bin
[ 0.2620 ] BL: version 1.4.0.2-t234-54845784-08a4de08 last_boot_error: 0
[ 0.3755 ] Sending bct_mem
[ 0.3808 ] Sending blob
[ 11.7478 ] RCM-boot started
/home/zynq/nvidia/Linux_for_Tegra
***************************************
* *
* Step 3: Start the flashing process *
* *
***************************************
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for device to expose ssh ......Waiting for device to expose ssh ...Device has booted into initrd. You can ssh to the target by the command:
$ ssh root@fc00:1:1:0::2
Cleaning up...
Log is saved to Linux_for_Tegra/initrdlog/flash_1-1_0_20240731-111452.log
Run command:
ln -s /proc/self/fd /dev/fd && mount -o nolock [fc00:1:1::1]:/home/zynq/nvidia/Linux_for_Tegra/tools/backup_restore /mnt && /mnt/nvrestore_partitions.sh -e nvme0n1 -n
on root@fc00:1:1::2
/mnt/images ~
nvrestore_partitions.sh: Use the default nvpartitionmap.txt as the index file.
40+0 records in
40+0 records out
20480 bytes (20 kB, 20 KiB) copied, 0.000624 s, 32.8 MB/s
nvrestore_partitions.sh Restoring qspi0 with image QSPI0.img...
Erasing 65536 Kibyte @ 0 -- 0 % complete
gzip: QSPI0.img: not in gzip format
0+0 records in
0+0 records out
0 bytes copied, 0.00405885 s, 0.0 kB/s
nvrestore_partitions.sh Restoring gpt_2 with image gptbackup.img...
33+0 records in
33+0 records out
16896 bytes (17 kB, 16 KiB) copied, 0.000138976 s, 122 MB/s
nvrestore_partitions.sh Restoring nvme0n1 with image nvme0n1p1_bak.img...
Erasing 65536 Kibyte @ 0 -- 100 % complete 7 s, 196 MB/s
27132225024 bytes (27 GB, 25 GiB) copied, 140 s, 194 MB/s67+1 records in
67+1 records out
67108864 bytes (67 MB, 64 MiB) copied, 72.8446 s, 921 kB/s
254431673856 bytes (254 GB, 237 GiB) copied, 1380 s, 184 MB/s
497068104+0 records in
497068104+0 records out
254498869248 bytes (254 GB, 237 GiB) copied, 1380.67 s, 184 MB/s
nvrestore_partitions.sh Restoring nvme0n1 with image nvme0n1p2_bak.img...
101487104 bytes (101 MB, 97 MiB) copied, 1 s, 101 MB/s
262144+0 records in
262144+0 records out
134217728 bytes (134 MB, 128 MiB) copied, 1.55112 s, 86.5 MB/s
nvrestore_partitions.sh Restoring nvme0n1 with image nvme0n1p3_bak.img...
1536+0 records in
1536+0 records out
786432 bytes (786 kB, 768 KiB) copied, 0.015493 s, 50.8 MB/s
nvrestore_partitions.sh Restoring nvme0n1 with image nvme0n1p4_bak.img...
64768+0 records in
64768+0 records out
33161216 bytes (33 MB, 32 MiB) copied, 0.268433 s, 124 MB/s
nvrestore_partitions.sh Restoring nvme0n1 with image nvme0n1p5_bak.img...
76128768 bytes (76 MB, 73 MiB) copied, 1 s, 76.1 MB/s
262144+0 records in
262144+0 records out
134217728 bytes (134 MB, 128 MiB) copied, 1.43855 s, 93.3 MB/s
nvrestore_partitions.sh Restoring nvme0n1 with image nvme0n1p6_bak.img...
1536+0 records in
1536+0 records out
786432 bytes (786 kB, 768 KiB) copied, 0.0105393 s, 74.6 MB/s
nvrestore_partitions.sh Restoring nvme0n1 with image nvme0n1p7_bak.img...
64768+0 records in
64768+0 records out
33161216 bytes (33 MB, 32 MiB) copied, 0.17717 s, 187 MB/s
nvrestore_partitions.sh Restoring nvme0n1 with image nvme0n1p8_bak.img...
163840+0 records in
163840+0 records out
83886080 bytes (84 MB, 80 MiB) copied, 0.979405 s, 85.7 MB/s
nvrestore_partitions.sh Restoring nvme0n1 with image nvme0n1p9_bak.img...
1024+0 records in
1024+0 records out
524288 bytes (524 kB, 512 KiB) copied, 0.00907898 s, 57.7 MB/s
nvrestore_partitions.sh Restoring nvme0n1 with image nvme0n1p10_bak.img...
131072+0 records in
131072+0 records out
67108864 bytes (67 MB, 64 MiB) copied, 0.343883 s, 195 MB/s
nvrestore_partitions.sh Restoring nvme0n1 with image nvme0n1p11_bak.img...
163840+0 records in
163840+0 records out
83886080 bytes (84 MB, 80 MiB) copied, 0.42383 s, 198 MB/s
nvrestore_partitions.sh Restoring nvme0n1 with image nvme0n1p12_bak.img...
1024+0 records in
1024+0 records out
524288 bytes (524 kB, 512 KiB) copied, 0.00616454 s, 85.0 MB/s
nvrestore_partitions.sh Restoring nvme0n1 with image nvme0n1p13_bak.img...
131072+0 records in
131072+0 records out
67108864 bytes (67 MB, 64 MiB) copied, 0.348471 s, 193 MB/s
nvrestore_partitions.sh Restoring nvme0n1 with image nvme0n1p14_bak.img...
391950848 bytes (392 MB, 374 MiB) copied, 3 s, 131 MB/s
819200+0 records in
819200+0 records out
419430400 bytes (419 MB, 400 MiB) copied, 3.47074 s, 121 MB/s
nvrestore_partitions.sh Restoring nvme0n1 with image nvme0n1p15_bak.img...
475226624 bytes (475 MB, 453 MiB) copied, 7 s, 67.9 MB/s
982016+0 records in
982016+0 records out
502792192 bytes (503 MB, 480 MiB) copied, 7.76971 s, 64.7 MB/s
~
nvrestore_partitions.sh Successful restore of partitions on target board.
Operation finishes. You can manually reset the device