mmcblk0p1 ############################################################################### # L4T BSP Information: # R32 , REVISION: 4.4 ############################################################################### # Target Board Information: # Name: cti/xavier-nx/photon, Board Family: t186ref, SoC: Tegra 194, # OpMode: production, Boot Authentication: NS, ############################################################################### creating dummy /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/badpage.bin 1+0 records in 1+0 records out 4096 bytes (4.1 kB, 4.0 KiB) copied, 0.000426166 s, 9.6 MB/s copying bctfile(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg)... done. copying bctfile1(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-memcfg-sw-override.cfg)... done. copying device_config(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-bct-device-qspi-p3668.cfg)... done. copying misc_cold_boot_config(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-l4t.cfg)... done. copying misc_config(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-flash.cfg)... done. copying pinmux_config(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-xavier-nx-cti-mb1-pinmux-p3668-a01.cfg)... done. copying gpioint_config(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg)... done. copying pmic_config(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-pmic-p3668-0001-a00.cfg)... done. copying prod_config(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-prod-p3668-0001-a00.cfg)... done. copying scr_config(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying scr_cold_boot_config(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying bootrom_config(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-reset-p3668-0001-a00.cfg)... done. copying dev_params(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-br-bct-qspi.cfg)... done. Existing bootloader(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. copying initrd(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/l4t_initrd.img)... done. populating kernel to rootfs... done. Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0212 ] Generating signature [ 0.0727 ] tegrasign_v2 --key --getmode mode.txt [ 0.0761 ] Assuming zero filled SBK key [ 0.0975 ] [ 0.0979 ] header_magic: 805814 [ 0.1245 ] tegrahost_v2 --chip 0x19 --align 1_Image [ 0.1286 ] [ 0.1322 ] tegrahost_v2 --chip 0x19 0 --magicid DATA --appendsigheader 1_Image zerosbk [ 0.1348 ] adding BCH for 1_Image [ 1.2944 ] [ 1.2969 ] tegrasign_v2 --key --list 1_Image_sigheader_list.xml --pubkeyhash pub_key.key [ 1.2982 ] Assuming zero filled SBK key [ 1.3481 ] [ 1.3832 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_Image_sigheader.encrypt 1_Image_sigheader.hash zerosbk [ 2.6536 ] [ 2.7023 ] Signed file: /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/Image_sigheader.encrypt Generate header for Image_sigheader.encrypt Generate 16-byte-size-aligned base file for Image_sigheader.encrypt Remove temporary file done. populating initrd to rootfs... done. populating /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/kernel/dtb/tegra194-xavier-nx-cti-NGX003.dtb to rootfs... done. Making Boot image... done. Existing sosfile(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing tegraboot(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/nvtboot_t194.bin) reused. Existing cpu_bootloader(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. Existing mb2blfile(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/nvtboot_recovery_t194.bin) reused. Existing mtspreboot(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/preboot_c10_prod_cr.bin) reused. Existing mcepreboot(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/mce_c10_prod_cr.bin) reused. Existing mtsproper(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/mts_c10_prod_cr.bin) reused. Existing mb1file(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing bpffile(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/bpmp_t194.bin) reused. copying bpfdtbfile(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/t186ref/tegra194-a02-bpmp-p3668-a00.dtb)... done. Existing scefile(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. Existing camerafw(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/camera-rtcpu-rce.img) reused. Existing spefile(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/spe_t194.bin) reused. Existing drameccfile(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/dram-ecc.bin) reused. Existing badpagefile(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/badpage.bin) reused. Existing wb0boot(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/warmboot_t194_prod.bin) reused. Existing tosfile(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/tos-trusty_t194.img) reused. Existing eksfile(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/eks.img) reused. copying soft_fuses(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. copying dtbfile(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/kernel/dtb/tegra194-xavier-nx-cti-NGX003.dtb)... done. Copying nv_boot_control.conf to rootfs Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0046 ] Generating signature [ 0.0062 ] tegrasign_v2 --key --getmode mode.txt [ 0.0075 ] Assuming zero filled SBK key [ 0.0079 ] [ 0.0080 ] header_magic: d00dfeed [ 0.0096 ] tegrahost_v2 --chip 0x19 --align 1_tegra194-xavier-nx-cti-NGX003.dtb [ 0.0111 ] [ 0.0126 ] tegrahost_v2 --chip 0x19 0 --magicid DATA --appendsigheader 1_tegra194-xavier-nx-cti-NGX003.dtb zerosbk [ 0.0142 ] adding BCH for 1_tegra194-xavier-nx-cti-NGX003.dtb [ 0.0253 ] [ 0.0280 ] tegrasign_v2 --key --list 1_tegra194-xavier-nx-cti-NGX003_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 0.0297 ] Assuming zero filled SBK key [ 0.0304 ] [ 0.0336 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt 1_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.hash zerosbk [ 0.0413 ] [ 0.0420 ] Signed file: /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt Generate header for tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt Generate 16-byte-size-aligned base file for tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt Remove temporary file done. Making system.img... populating rootfs from /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/rootfs ... done. populating /boot/extlinux/extlinux.conf ... done. Sync'ing system.img ... done. Converting RAW image to Sparse image... done. system.img built successfully. Existing tbcfile(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/cboot_t194.bin) reused. copying tbcdtbfile(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/kernel/dtb/tegra194-xavier-nx-cti-NGX003.dtb)... done. copying cfgfile(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t194_spi_emmc_p3668.xml) to flash.xml... done. Existing flasher(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu_t194.bin) reused. Existing flashapp(/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/tegraflash.py) reused. ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin --sdram_config tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg,tegra194-memcfg-sw-override.cfg --odmdata 0xB8190000 --applet mb1_t194_prod.bin --cmd "flash; reboot" --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --cfg flash.xml --chip 0x19 --device_config tegra19x-mb1-bct-device-qspi-p3668.cfg --misc_cold_boot_config tegra194-mb1-bct-misc-l4t.cfg --misc_config tegra194-mb1-bct-misc-flash.cfg --pinmux_config tegra19x-xavier-nx-cti-mb1-pinmux-p3668-a01.cfg --gpioint_config tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --pmic_config tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --prod_config tegra19x-mb1-prod-p3668-0001-a00.cfg --scr_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --scr_cold_boot_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --br_cmd_config tegra194-mb1-bct-reset-p3668-0001-a00.cfg --dev_params tegra194-br-bct-qspi.cfg --bin "mb2_bootloader nvtboot_recovery_t194.bin; mts_preboot preboot_c10_prod_cr.bin; mts_mce mce_c10_prod_cr.bin; mts_proper mts_c10_prod_cr.bin; bpmp_fw bpmp_t194.bin; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00.dtb; spe_fw spe_t194.bin; tlk tos-trusty_t194.img; eks eks.img; bootloader_dtb tegra194-xavier-nx-cti-NGX003.dtb" --skipuid saving flash command in /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/flashcmd.txt saving Windows flash command to /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/flash_win.bat *** Flashing target device started. *** Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.1090 ] tegrasign_v2 --key None --getmode mode.txt [ 0.1693 ] Assuming zero filled SBK key [ 0.7632 ] [ 0.7635 ] Generating RCM messages [ 0.8829 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod.bin zerosbk [ 0.8864 ] Header already present for mb1_t194_prod.bin [ 1.3983 ] [ 1.4019 ] tegrasign_v2 --key None --getmode mode.txt [ 1.4034 ] Assuming zero filled SBK key [ 1.4740 ] [ 1.4777 ] tegrasign_v2 --key None --file mb1_t194_prod_sigheader.bin --offset 2960 --length 1136 --pubkeyhash pub_key.key [ 1.4808 ] Assuming zero filled SBK key [ 1.4832 ] [ 1.4864 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin mb1_t194_prod_sigheader.hash zerosbk [ 1.5260 ] [ 1.7800 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg sfuse.bin [ 2.4543 ] [ 2.7283 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_sigheader.bin 0 0 [ 2.7317 ] RCM 0 is saved as rcm_0.rcm [ 2.9668 ] RCM 1 is saved as rcm_1.rcm [ 2.9683 ] RCM 2 is saved as rcm_2.rcm [ 2.9697 ] List of rcm files are saved in rcm_list.xml [ 3.0418 ] [ 3.0419 ] Signing RCM messages [ 3.0453 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 3.0484 ] Assuming zero filled SBK key [ 3.0517 ] [ 3.0518 ] Copying signature to RCM mesages [ 3.0546 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml [ 3.1894 ] [ 3.1895 ] Parsing partition layout [ 3.6094 ] tegraparser_v2 --pt flash.xml.tmp [ 3.8837 ] [ 3.8839 ] Creating list of images to be signed [ 3.8874 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk [ 3.8906 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 3.8939 ] Header already present for mb1_t194_prod_sigheader.bin [ 4.1333 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 4.3586 ] Header already present for mb1_t194_prod_sigheader.bin [ 4.6481 ] adding BCH for spe_t194.bin [ 5.0771 ] adding BCH for spe_t194.bin [ 5.0887 ] adding BCH for nvtboot_t194.bin [ 5.2839 ] adding BCH for nvtboot_t194.bin [ 5.2964 ] Header already present for preboot_c10_prod_cr.bin [ 5.5074 ] Header already present for preboot_c10_prod_cr.bin [ 5.5098 ] Header already present for mce_c10_prod_cr.bin [ 5.7539 ] Header already present for mce_c10_prod_cr.bin [ 5.7632 ] adding BCH for mts_c10_prod_cr.bin [ 6.0826 ] adding BCH for mts_c10_prod_cr.bin [ 6.2015 ] Header already present for warmboot_t194_prod.bin [ 6.6754 ] Header already present for warmboot_t194_prod.bin [ 6.6800 ] adding BCH for cboot_t194.bin [ 6.7519 ] adding BCH for cboot_t194.bin [ 6.7726 ] adding BCH for tegra194-xavier-nx-cti-NGX003.dtb [ 6.8789 ] adding BCH for tegra194-xavier-nx-cti-NGX003.dtb [ 6.8926 ] adding BCH for tos-trusty_t194.img [ 7.2276 ] adding BCH for tos-trusty_t194.img [ 7.2467 ] adding BCH for eks.img [ 7.4487 ] adding BCH for eks.img [ 7.4496 ] adding BCH for adsp-fw.bin [ 7.5202 ] adding BCH for adsp-fw.bin [ 7.5283 ] adding BCH for camera-rtcpu-rce.img [ 7.7605 ] adding BCH for camera-rtcpu-rce.img [ 7.7759 ] adding BCH for bpmp_t194.bin [ 8.0150 ] adding BCH for bpmp_t194.bin [ 8.0508 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 8.6013 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 8.6147 ] adding BCH for boot.img [ 8.7095 ] adding BCH for boot.img [ 10.0292 ] adding BCH for tegra194-xavier-nx-cti-NGX003.dtb [ 13.2781 ] adding BCH for tegra194-xavier-nx-cti-NGX003.dtb [ 13.6709 ] [ 13.6711 ] Filling MB1 storage info [ 13.6711 ] Generating br-bct [ 13.6749 ] Performing cfg overlay [ 13.6750 ] ['tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg', 'tegra194-memcfg-sw-override.cfg'] [ 13.6778 ] sw_memcfg_overlay.pl -c tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg -s tegra194-memcfg-sw-override.cfg -o /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1.cfg [ 15.7929 ] [ 15.7933 ] Updating dev and MSS params in BR BCT [ 15.7935 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 15.9378 ] [ 15.9379 ] Updating bl info [ 15.9404 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 16.1855 ] [ 16.1857 ] Generating signatures [ 16.1891 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key [ 16.1922 ] Assuming zero filled SBK key [ 20.2638 ] [ 20.2639 ] Generating br-bct [ 20.2675 ] Performing cfg overlay [ 20.2675 ] ['/home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1.cfg'] [ 20.2676 ] Updating dev and MSS params in BR BCT [ 20.2678 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 20.4000 ] [ 20.4002 ] Updating bl info [ 20.4025 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 20.9435 ] [ 20.9437 ] Updating smd info [ 20.9475 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 --updatesmdinfo flash.xml.bin [ 21.1768 ] [ 21.1770 ] Updating Odmdata [ 21.1808 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0xB8190000 [ 21.4920 ] [ 21.4922 ] Get Signed section of bct [ 21.4960 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listbct bct_list.xml [ 21.8296 ] [ 21.8335 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 21.8364 ] Assuming zero filled SBK key [ 21.8374 ] [ 21.8374 ] Updating BCT with signature [ 21.8406 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml [ 22.1320 ] [ 22.1322 ] Generating coldboot mb1-bct [ 22.4189 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_cold_boot_bct.cfg --sdram /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1.cfg --misc tegra194-mb1-bct-misc-l4t.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-xavier-nx-cti-mb1-pinmux-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 22.4225 ] MB1-BCT version: 0x1 [ 22.4236 ] Parsing config file :tegra19x-xavier-nx-cti-mb1-pinmux-p3668-a01.cfg [ 22.4274 ] Added Platform Config 0 data with size :- 2400 [ 22.5629 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 22.5665 ] Added Platform Config 1 data with size :- 19640 [ 22.7568 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 22.7600 ] Added Platform Config 4 data with size :- 348 [ 22.8485 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 22.8523 ] Added Platform Config 3 data with size :- 92 [ 22.9339 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 22.9373 ] Added Platform Config 5 data with size :- 128 [ 23.0482 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 23.0519 ] Added Platform Config 7 data with size :- 392 [ 23.1245 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 23.1268 ] Added Platform Config 9 data with size :- 40 [ 23.2463 ] [ 23.2464 ] Updating mb1-bct with firmware information [ 23.2497 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 23.2530 ] MB1-BCT version: 0x1 [ 23.4020 ] [ 23.4021 ] Updating mb1-bct with storage information [ 23.4060 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 23.4091 ] MB1-BCT version: 0x1 [ 23.9984 ] [ 24.0023 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct [ 24.0058 ] [ 24.0092 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk [ 24.0120 ] adding BCH for mb1_cold_boot_bct_MB1.bct [ 24.0148 ] [ 24.0176 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 24.0199 ] Assuming zero filled SBK key [ 24.0204 ] [ 24.0233 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk [ 24.0269 ] [ 24.0271 ] Generating recovery mb1-bct [ 24.0295 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_bct.cfg --sdram /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1.cfg --misc tegra194-mb1-bct-misc-flash.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-xavier-nx-cti-mb1-pinmux-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 24.0312 ] MB1-BCT version: 0x1 [ 24.0319 ] Parsing config file :tegra19x-xavier-nx-cti-mb1-pinmux-p3668-a01.cfg [ 24.0339 ] Added Platform Config 0 data with size :- 2400 [ 24.0374 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 24.0384 ] Added Platform Config 1 data with size :- 19640 [ 24.0569 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 24.0579 ] Added Platform Config 4 data with size :- 348 [ 24.0587 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 24.0599 ] Added Platform Config 3 data with size :- 92 [ 24.0599 ] [ 24.0599 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 24.0599 ] Added Platform Config 5 data with size :- 128 [ 24.0599 ] [ 24.0600 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 24.0600 ] Added Platform Config 7 data with size :- 392 [ 24.0600 ] [ 24.0600 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 24.0601 ] Added Platform Config 9 data with size :- 40 [ 24.0601 ] [ 24.0602 ] Updating mb1-bct with firmware information [ 24.0618 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin [ 24.0628 ] MB1-BCT version: 0x1 [ 24.2492 ] [ 24.2493 ] Updating mb1-bct with storage information [ 24.2530 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 24.2562 ] MB1-BCT version: 0x1 [ 24.3283 ] [ 24.3319 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct [ 24.3354 ] [ 24.3380 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --appendsigheader mb1_bct_MB1.bct zerosbk [ 24.3410 ] adding BCH for mb1_bct_MB1.bct [ 24.3430 ] [ 24.3453 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 24.3468 ] Assuming zero filled SBK key [ 24.3473 ] [ 24.3503 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk [ 24.3531 ] [ 24.3532 ] Generating coldboot mem-bct [ 24.3553 ] tegrabct_v2 --chip 0x19 0 --sdram /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1.cfg --membct /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1_1.bct /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1_2.bct /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1_3.bct /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1_4.bct [ 24.3575 ] Packing sdram param for instance[0] [ 24.4043 ] Packing sdram param for instance[1] [ 24.4048 ] Packing sdram param for instance[2] [ 24.4048 ] Packing sdram param for instance[3] [ 24.4048 ] Packing sdram param for instance[4] [ 24.4048 ] Packing sdram param for instance[5] [ 24.4049 ] Packing sdram param for instance[6] [ 24.4049 ] Packing sdram param for instance[7] [ 24.4049 ] Packing sdram param for instance[8] [ 24.4049 ] Packing sdram param for instance[9] [ 24.4049 ] Packing sdram param for instance[10] [ 24.4049 ] Packing sdram param for instance[11] [ 24.4049 ] Packing sdram param for instance[12] [ 24.4050 ] Packing sdram param for instance[13] [ 24.4050 ] Packing sdram param for instance[14] [ 24.4050 ] Packing sdram param for instance[15] [ 24.4050 ] [ 24.4051 ] Getting sector size from pt [ 24.4062 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin [ 24.4078 ] [ 24.4079 ] BlockSize read from layout is 200 [ 24.4103 ] tegrahost_v2 --chip 0x19 0 --blocksize 512 --magicid MEMB --addsigheader_multi /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1_1.bct /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1_2.bct /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1_3.bct /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1_4.bct [ 24.4113 ] adding BCH for /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1_1.bct [ 24.4152 ] [ 24.4169 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 24.4181 ] [ 24.4200 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --appendsigheader mem_coldboot.bct zerosbk [ 24.4222 ] Header already present for mem_coldboot.bct [ 24.4232 ] [ 24.4251 ] tegrasign_v2 --key None --list mem_coldboot_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 24.4268 ] Assuming zero filled SBK key [ 24.4277 ] [ 24.4304 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_coldboot_sigheader.bct.encrypt mem_coldboot_sigheader.bct.hash zerosbk [ 24.4324 ] [ 24.4325 ] Generating recovery mem-bct [ 24.4343 ] tegrabct_v2 --chip 0x19 0 --sdram /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1.cfg --membct /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1_1.bct /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1_2.bct /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1_3.bct /home/jswantek/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra/bootloader/19331/tmpO4wDfF1_4.bct [ 24.4360 ] Packing sdram param for instance[0] [ 24.4806 ] Packing sdram param for instance[1] [ 24.4812 ] Packing sdram param for instance[2] [ 24.4812 ] Packing sdram param for instance[3] [ 24.4813 ] Packing sdram param for instance[4] [ 24.4813 ] Packing sdram param for instance[5] [ 24.4813 ] Packing sdram param for instance[6] [ 24.4813 ] Packing sdram param for instance[7] [ 24.4813 ] Packing sdram param for instance[8] [ 24.4813 ] Packing sdram param for instance[9] [ 24.4814 ] Packing sdram param for instance[10] [ 24.4814 ] Packing sdram param for instance[11] [ 24.4814 ] Packing sdram param for instance[12] [ 24.4814 ] Packing sdram param for instance[13] [ 24.4815 ] Packing sdram param for instance[14] [ 24.4815 ] Packing sdram param for instance[15] [ 24.4815 ] [ 24.4834 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct [ 24.4850 ] [ 24.4866 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --appendsigheader mem_rcm.bct zerosbk [ 24.4881 ] adding BCH for mem_rcm.bct [ 24.4914 ] [ 24.4938 ] tegrasign_v2 --key None --list mem_rcm_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 24.4951 ] Assuming zero filled SBK key [ 24.4957 ] [ 24.4981 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm_sigheader.bct.encrypt mem_rcm_sigheader.bct.hash zerosbk [ 24.5022 ] [ 24.5023 ] Copying signatures [ 24.5038 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml [ 27.7327 ] [ 27.7329 ] Boot Rom communication [ 27.7364 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_list_signed.xml --skipuid [ 27.7396 ] RCM version 0X190001 [ 27.7427 ] Boot Rom communication completed [ 28.7650 ] [ 29.7689 ] tegrarcm_v2 --isapplet [ 29.7721 ] Applet version 01.00.0000 [ 29.7916 ] [ 29.7918 ] Sending BCTs [ 29.7956 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt --download bct_mem mem_rcm_sigheader.bct.encrypt [ 29.7987 ] Applet version 01.00.0000 [ 29.8205 ] Sending bct_bootrom [ 29.8218 ] [................................................] 100% [ 29.8249 ] Sending bct_mb1 [ 29.8281 ] [................................................] 100% [ 29.8345 ] Sending bct_mem [ 29.8927 ] [................................................] 100% [ 29.9711 ] [ 29.9713 ] Generating blob [ 29.9748 ] tegrahost_v2 --chip 0x19 --align blob_nvtboot_recovery_cpu_t194.bin [ 29.9781 ] [ 29.9813 ] tegrahost_v2 --chip 0x19 0 --magicid CPBL --appendsigheader blob_nvtboot_recovery_cpu_t194.bin zerosbk [ 29.9835 ] adding BCH for blob_nvtboot_recovery_cpu_t194.bin [ 29.9965 ] [ 29.9993 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 30.0014 ] Assuming zero filled SBK key [ 30.0031 ] [ 30.0057 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_nvtboot_recovery_cpu_t194_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_t194_sigheader.bin.hash zerosbk [ 30.0141 ] [ 30.0160 ] tegrahost_v2 --chip 0x19 --align blob_nvtboot_recovery_t194.bin [ 30.0435 ] [ 30.0473 ] tegrahost_v2 --chip 0x19 0 --magicid MB2B --appendsigheader blob_nvtboot_recovery_t194.bin zerosbk [ 30.0506 ] adding BCH for blob_nvtboot_recovery_t194.bin [ 30.0639 ] [ 30.0669 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 30.0681 ] Assuming zero filled SBK key [ 30.0686 ] [ 30.0725 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_nvtboot_recovery_t194_sigheader.bin.encrypt blob_nvtboot_recovery_t194_sigheader.bin.hash zerosbk [ 30.0765 ] [ 30.0795 ] tegrahost_v2 --chip 0x19 --align blob_preboot_c10_prod_cr.bin [ 30.0808 ] [ 30.0825 ] tegrahost_v2 --chip 0x19 0 --magicid MTSP --appendsigheader blob_preboot_c10_prod_cr.bin zerosbk [ 30.0842 ] Header already present for blob_preboot_c10_prod_cr.bin [ 30.0850 ] [ 30.0871 ] tegrasign_v2 --key None --list blob_preboot_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 30.0887 ] Assuming zero filled SBK key [ 30.0892 ] [ 30.0916 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_preboot_c10_prod_cr_sigheader.bin.encrypt blob_preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 30.0945 ] [ 30.0965 ] tegrahost_v2 --chip 0x19 --align blob_mce_c10_prod_cr.bin [ 30.0984 ] [ 30.1003 ] tegrahost_v2 --chip 0x19 0 --magicid MTSM --appendsigheader blob_mce_c10_prod_cr.bin zerosbk [ 30.1020 ] Header already present for blob_mce_c10_prod_cr.bin [ 30.1070 ] [ 30.1094 ] tegrasign_v2 --key None --list blob_mce_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 30.1109 ] Assuming zero filled SBK key [ 30.1119 ] [ 30.1148 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_mce_c10_prod_cr_sigheader.bin.encrypt blob_mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 30.1239 ] [ 30.1264 ] tegrahost_v2 --chip 0x19 --align blob_mts_c10_prod_cr.bin [ 30.1288 ] [ 30.1307 ] tegrahost_v2 --chip 0x19 0 --magicid MTSB --appendsigheader blob_mts_c10_prod_cr.bin zerosbk [ 30.1326 ] adding BCH for blob_mts_c10_prod_cr.bin [ 30.2498 ] [ 30.2521 ] tegrasign_v2 --key None --list blob_mts_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 30.2536 ] Assuming zero filled SBK key [ 30.2591 ] [ 30.2615 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_mts_c10_prod_cr_sigheader.bin.encrypt blob_mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 30.3303 ] [ 30.3327 ] tegrahost_v2 --chip 0x19 --align blob_bpmp_t194.bin [ 30.3350 ] [ 30.3367 ] tegrahost_v2 --chip 0x19 0 --magicid BPMF --appendsigheader blob_bpmp_t194.bin zerosbk [ 30.3381 ] adding BCH for blob_bpmp_t194.bin [ 30.3681 ] [ 30.3707 ] tegrasign_v2 --key None --list blob_bpmp_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 30.3719 ] Assuming zero filled SBK key [ 30.3735 ] [ 30.3765 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_bpmp_t194_sigheader.bin.encrypt blob_bpmp_t194_sigheader.bin.hash zerosbk [ 30.4014 ] [ 30.4043 ] tegrahost_v2 --chip 0x19 --align blob_tegra194-a02-bpmp-p3668-a00.dtb [ 30.4072 ] [ 30.4100 ] tegrahost_v2 --chip 0x19 0 --magicid BPMD --appendsigheader blob_tegra194-a02-bpmp-p3668-a00.dtb zerosbk [ 30.4129 ] adding BCH for blob_tegra194-a02-bpmp-p3668-a00.dtb [ 30.4225 ] [ 30.4256 ] tegrasign_v2 --key None --list blob_tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 30.4268 ] Assuming zero filled SBK key [ 30.4277 ] [ 30.4307 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt blob_tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk [ 30.4372 ] [ 30.4389 ] tegrahost_v2 --chip 0x19 --align blob_spe_t194.bin [ 30.4415 ] [ 30.4430 ] tegrahost_v2 --chip 0x19 0 --magicid SPEF --appendsigheader blob_spe_t194.bin zerosbk [ 30.4451 ] adding BCH for blob_spe_t194.bin [ 30.4497 ] [ 30.4517 ] tegrasign_v2 --key None --list blob_spe_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 30.4541 ] Assuming zero filled SBK key [ 30.4551 ] [ 30.4580 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_spe_t194_sigheader.bin.encrypt blob_spe_t194_sigheader.bin.hash zerosbk [ 30.4657 ] [ 30.4681 ] tegrahost_v2 --chip 0x19 --align blob_tos-trusty_t194.img [ 30.4699 ] [ 30.4711 ] tegrahost_v2 --chip 0x19 0 --magicid TOSB --appendsigheader blob_tos-trusty_t194.img zerosbk [ 30.4732 ] adding BCH for blob_tos-trusty_t194.img [ 30.4931 ] [ 30.4965 ] tegrasign_v2 --key None --list blob_tos-trusty_t194_sigheader.img_list.xml --pubkeyhash pub_key.key [ 30.4990 ] Assuming zero filled SBK key [ 30.5009 ] [ 30.5053 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_tos-trusty_t194_sigheader.img.encrypt blob_tos-trusty_t194_sigheader.img.hash zerosbk [ 30.5241 ] [ 30.5279 ] tegrahost_v2 --chip 0x19 --align blob_eks.img [ 30.5297 ] [ 30.5330 ] tegrahost_v2 --chip 0x19 0 --magicid EKSB --appendsigheader blob_eks.img zerosbk [ 30.5356 ] adding BCH for blob_eks.img [ 30.5359 ] [ 30.5379 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key [ 30.5394 ] Assuming zero filled SBK key [ 30.5402 ] [ 30.5425 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk [ 30.5443 ] [ 30.5468 ] tegrahost_v2 --chip 0x19 --align blob_tegra194-xavier-nx-cti-NGX003.dtb [ 30.5483 ] [ 30.5500 ] tegrahost_v2 --chip 0x19 0 --magicid CDTB --appendsigheader blob_tegra194-xavier-nx-cti-NGX003.dtb zerosbk [ 30.5516 ] adding BCH for blob_tegra194-xavier-nx-cti-NGX003.dtb [ 30.5627 ] [ 30.5656 ] tegrasign_v2 --key None --list blob_tegra194-xavier-nx-cti-NGX003_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 30.5667 ] Assuming zero filled SBK key [ 30.5675 ] [ 30.5705 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt blob_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.hash zerosbk [ 30.5809 ] [ 30.5842 ] tegrahost_v2 --chip 0x19 --generateblob blob.xml blob.bin [ 30.5862 ] number of images in blob are 11 [ 30.5873 ] blobsize is 5724584 [ 30.5877 ] Added binary blob_nvtboot_recovery_cpu_t194_sigheader.bin.encrypt of size 258288 [ 30.5956 ] Added binary blob_nvtboot_recovery_t194_sigheader.bin.encrypt of size 129936 [ 30.5971 ] Added binary blob_preboot_c10_prod_cr_sigheader.bin.encrypt of size 24016 [ 30.5979 ] Added binary blob_mce_c10_prod_cr_sigheader.bin.encrypt of size 142592 [ 30.5985 ] Added binary blob_mts_c10_prod_cr_sigheader.bin.encrypt of size 3430800 [ 30.6009 ] Added binary blob_bpmp_t194_sigheader.bin.encrypt of size 856112 [ 30.6024 ] Added binary blob_tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt of size 227552 [ 30.6031 ] Added binary blob_spe_t194_sigheader.bin.encrypt of size 94960 [ 30.6036 ] Added binary blob_tos-trusty_t194_sigheader.img.encrypt of size 373696 [ 30.6043 ] Added binary blob_eks_sigheader.img.encrypt of size 5136 [ 30.6047 ] Added binary blob_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt of size 181312 [ 30.6095 ] [ 30.6096 ] Sending bootloader and pre-requisite binaries [ 30.6112 ] tegrarcm_v2 --download blob blob.bin [ 30.6126 ] Applet version 01.00.0000 [ 30.6316 ] Sending blob [ 30.6318 ] [................................................] 100% [ 31.5223 ] [ 31.5259 ] tegrarcm_v2 --boot recovery [ 31.5291 ] Applet version 01.00.0000 [ 31.5604 ] [ 32.5654 ] tegrarcm_v2 --isapplet [ 33.0371 ] [ 33.0408 ] tegrarcm_v2 --ismb2 [ 33.0637 ] [ 33.0874 ] tegradevflash_v2 --iscpubl [ 33.0909 ] Bootloader version 01.00.0000 [ 33.0969 ] Bootloader version 01.00.0000 [ 33.1003 ] [ 33.1004 ] Retrieving storage infomation [ 33.1031 ] tegrarcm_v2 --oem platformdetails storage storage_info.bin [ 33.1060 ] Applet is not running on device. Continue with Bootloader [ 33.1319 ] [ 33.1355 ] tegradevflash_v2 --oem platformdetails storage storage_info.bin [ 33.1385 ] Bootloader version 01.00.0000 [ 33.1443 ] Saved platform info in storage_info.bin [ 33.1483 ] [ 33.1484 ] Flashing the device [ 33.1510 ] tegraparser_v2 --storageinfo storage_info.bin --generategpt --pt flash.xml.bin [ 33.1538 ] [ 33.1565 ] tegradevflash_v2 --pt flash.xml.bin --create [ 33.1589 ] Bootloader version 01.00.0000 [ 33.1657 ] Erasing spi: 0 ......... [Done] [ 91.1747 ] Writing partition secondary_gpt with gpt_secondary_3_0.bin [ 91.1765 ] [................................................] 100% [ 91.2943 ] Erasing sdmmc_user: 3 ......... [Done] [ 92.1723 ] Writing partition master_boot_record with mbr_1_3.bin [ 92.1741 ] [................................................] 100% [ 92.1767 ] Writing partition primary_gpt with gpt_primary_1_3.bin [ 92.1843 ] [................................................] 100% [ 92.1867 ] Writing partition secondary_gpt with gpt_secondary_1_3.bin [ 92.2085 ] [................................................] 100% [ 92.2324 ] Writing partition mb1 with mb1_t194_prod_sigheader.bin.encrypt [ 92.2338 ] [................................................] 100% [ 92.2487 ] Writing partition mb1_b with mb1_t194_prod_sigheader.bin.encrypt [ 93.8422 ] [................................................] 100% [ 93.8567 ] Writing partition spe-fw with spe_t194_sigheader.bin.encrypt [ 95.4505 ] [................................................] 100% [ 95.4574 ] Writing partition spe-fw_b with spe_t194_sigheader.bin.encrypt [ 96.0693 ] [................................................] 100% [ 96.0762 ] Writing partition mb2 with nvtboot_t194_sigheader.bin.encrypt [ 96.6885 ] [................................................] 100% [ 96.6982 ] Writing partition mb2_b with nvtboot_t194_sigheader.bin.encrypt [ 97.7878 ] [................................................] 100% [ 97.7976 ] Writing partition mts-preboot with preboot_c10_prod_cr_sigheader.bin.encrypt [ 98.8868 ] [................................................] 100% [ 98.8899 ] Writing partition mts-preboot_b with preboot_c10_prod_cr_sigheader.bin.encrypt [ 99.0541 ] [................................................] 100% [ 99.0571 ] Writing partition mts-mce with mce_c10_prod_cr_sigheader.bin.encrypt [ 99.2208 ] [................................................] 100% [ 99.2300 ] Writing partition mts-mce_b with mce_c10_prod_cr_sigheader.bin.encrypt [ 100.1410 ] [................................................] 100% [ 100.1502 ] Writing partition mts-proper with mts_c10_prod_cr_sigheader.bin.encrypt [ 101.0618 ] [................................................] 100% [ 121.0465 ] Writing partition mts-proper_b with mts_c10_prod_cr_sigheader.bin.encrypt [ 122.8525 ] [................................................] 100% [ 142.8311 ] Writing partition sc7 with warmboot_t194_prod_sigheader.bin.encrypt [ 144.6370 ] [................................................] 100% [ 144.6422 ] Writing partition sc7_b with warmboot_t194_prod_sigheader.bin.encrypt [ 145.0662 ] [................................................] 100% [ 145.0711 ] Writing partition SMD with slot_metadata.bin [ 145.4949 ] [................................................] 100% [ 145.5109 ] Writing partition SMD_b with slot_metadata.bin [ 145.5209 ] [................................................] 100% [ 145.5237 ] Writing partition xusb-fw with xusb_sil_rel_fw [ 145.5330 ] [................................................] 100% [ 145.5489 ] Writing partition xusb-fw_b with xusb_sil_rel_fw [ 146.3422 ] [................................................] 100% [ 146.3504 ] Writing partition cpu-bootloader with cboot_t194_sigheader.bin.encrypt [ 147.1438 ] [................................................] 100% [ 147.1686 ] Writing partition cpu-bootloader_b with cboot_t194_sigheader.bin.encrypt [ 149.9364 ] [................................................] 100% [ 149.9586 ] Writing partition bootloader-dtb with tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt [ 152.7277 ] [................................................] 100% [ 152.7377 ] Writing partition bootloader-dtb_b with tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt [ 153.8939 ] [................................................] 100% [ 153.9032 ] Writing partition BMP with bmp.blob [ 155.0575 ] [................................................] 100% [ 155.0901 ] Writing partition BMP_b with bmp.blob [ 155.5486 ] [................................................] 100% [ 155.5550 ] Writing partition secure-os with tos-trusty_t194_sigheader.img.encrypt [ 156.0147 ] [................................................] 100% [ 156.0331 ] Writing partition secure-os_b with tos-trusty_t194_sigheader.img.encrypt [ 158.3959 ] [................................................] 100% [ 158.4159 ] Writing partition eks with eks_sigheader.img.encrypt [ 160.7787 ] [................................................] 100% [ 160.7815 ] Writing partition eks_b with eks_sigheader.img.encrypt [ 160.8290 ] [................................................] 100% [ 160.8323 ] Writing partition adsp-fw with adsp-fw_sigheader.bin.encrypt [ 160.8797 ] [................................................] 100% [ 160.8870 ] Writing partition adsp-fw_b with adsp-fw_sigheader.bin.encrypt [ 161.6048 ] [................................................] 100% [ 161.6112 ] Writing partition rce-fw with camera-rtcpu-rce_sigheader.img.encrypt [ 162.3285 ] [................................................] 100% [ 162.3428 ] Writing partition rce-fw_b with camera-rtcpu-rce_sigheader.img.encrypt [ 164.0744 ] [................................................] 100% [ 164.0898 ] Writing partition bpmp-fw with bpmp_t194_sigheader.bin.encrypt [ 165.8212 ] [................................................] 100% [ 165.8670 ] Writing partition bpmp-fw_b with bpmp_t194_sigheader.bin.encrypt [ 171.2663 ] [................................................] 100% [ 171.3127 ] Writing partition bpmp-fw-dtb with tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 176.7119 ] [................................................] 100% [ 176.7235 ] Writing partition bpmp-fw-dtb_b with tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 178.1693 ] [................................................] 100% [ 178.1808 ] Writing partition VER with qspi_bootblob_ver.txt [ 179.6260 ] [................................................] 100% [ 179.6430 ] Writing partition VER_b with qspi_bootblob_ver.txt [ 179.6526 ] [................................................] 100% [ 179.6546 ] Writing partition master_boot_record with mbr_1_3.bin [ 179.6643 ] [................................................] 100% [ 179.6673 ] Writing partition APP with system.img [ 179.6749 ] [................................................] 100% [ 589.4946 ] Writing partition kernel with boot_sigheader.img.encrypt [ 589.5516 ] [................................................] 100% [ 592.2539 ] Writing partition kernel_b with boot_sigheader.img.encrypt [ 592.2730 ] [................................................] 100% [ 594.9371 ] Writing partition kernel-dtb with tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt [ 594.9573 ] [................................................] 100% [ 594.9660 ] Writing partition kernel-dtb_b with tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt [ 594.9996 ] [................................................] 100% [ 595.0321 ] [ 595.0357 ] tegradevflash_v2 --write BCT br_bct_BR.bct [ 595.0390 ] Bootloader version 01.00.0000 [ 595.0449 ] Writing partition BCT with br_bct_BR.bct [ 595.0459 ] [................................................] 100% [ 595.1911 ] [ 595.2118 ] tegradevflash_v2 --write MB1_BCT mb1_cold_boot_bct_MB1_sigheader.bct.encrypt [ 595.2143 ] Bootloader version 01.00.0000 [ 595.2203 ] Writing partition MB1_BCT with mb1_cold_boot_bct_MB1_sigheader.bct.encrypt [ 595.2212 ] [................................................] 100% [ 595.4313 ] [ 595.4345 ] tegradevflash_v2 --write MB1_BCT_b mb1_cold_boot_bct_MB1_sigheader.bct.encrypt [ 595.4377 ] Bootloader version 01.00.0000 [ 595.4454 ] Writing partition MB1_BCT_b with mb1_cold_boot_bct_MB1_sigheader.bct.encrypt [ 595.4477 ] [................................................] 100% [ 595.6534 ] [ 595.6733 ] tegradevflash_v2 --write MEM_BCT mem_coldboot_sigheader.bct.encrypt [ 595.6758 ] Bootloader version 01.00.0000 [ 595.6825 ] Writing partition MEM_BCT with mem_coldboot_sigheader.bct.encrypt [ 595.6833 ] [................................................] 100% [ 596.9500 ] [ 596.9539 ] tegradevflash_v2 --write MEM_BCT_b mem_coldboot_sigheader.bct.encrypt [ 596.9572 ] Bootloader version 01.00.0000 [ 596.9638 ] Writing partition MEM_BCT_b with mem_coldboot_sigheader.bct.encrypt [ 596.9658 ] [................................................] 100% [ 598.2318 ] [ 598.2320 ] Flashing completed [ 598.2322 ] Coldbooting the device [ 598.2358 ] tegrarcm_v2 --ismb2 [ 598.2598 ] [ 598.2637 ] tegradevflash_v2 --reboot coldboot [ 598.2671 ] Bootloader version 01.00.0000 [ 598.2754 ] *** The target t186ref has been flashed successfully. *** Reset the board to boot from internal eMMC. jswantek@ubuntu-laptop:~/workspace/custom_builds/cti_32.4.4/build/Linux_for_Tegra$