$ sudo ./flash.sh -u /home/citix-ai/Credential_Keys/rsa_priv.pem -v /home/citix-ai/Credential_Keys/skb_file.key jetson-xavier-nx-devkit-emmc mmcblk0p1 ############################################################################### # L4T BSP Information: # R32 , REVISION: 7.2 ############################################################################### sbk_keyfile is present, but no user_keyfile; set user_keyfile to zero keyfile # Target Board Information: # Name: jetson-xavier-nx-devkit-emmc, Board Family: t186ref, SoC: Tegra 194, # OpMode: production, Boot Authentication: SBKPKC, # Disk encryption: disabled , ############################################################################### copying soft_fuses(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. ./tegraflash.py --chip 0x19 --applet "/home/citix-ai/Linux_for_Tegra/bootloader/mb1_t194_prod.bin" --skipuid --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --bins "mb2_applet nvtboot_applet_t194.bin" --cmd "dump eeprom boardinfo cvm.bin;reboot recovery" --key "/home/citix-ai/Credential_Keys/rsa_priv.pem" --encrypt_key "/home/citix-ai/Credential_Keys/skb_file.key" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0095 ] Generating RCM messages [ 0.0132 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --file /home/citix-ai/Linux_for_Tegra/bootloader/mb1_t194_prod.bin --offset 4096 [ 0.0145 ] Key is a SBK key [ 0.1454 ] Key Size is 16 bytes [ 0.1459 ] 246336 [ 0.1761 ] [ 0.2344 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader /home/citix-ai/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt.bin zerosbk [ 0.2360 ] Header already present for /home/citix-ai/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt.bin [ 0.2628 ] [ 0.2657 ] tegrasign_v3.py --getmode mode.txt --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 0.2687 ] Key size is 25[ 0.2784 ] 6 bytes [ 0.2830 ] tegrasign_v3.py --file /home/citix-ai/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt_sigheader.bin --getmontgomeryvalues montgomery.bin --key /home/citix-ai/Credential_Keys/rsa_priv.pem --length 1136 --offset 2960 --pubkeyhash pub_key.key [ 0.2859 ] K[ 0.2863 ] ey size is 256 bytes [ 0.3058 ] Saving pkc public key in pub_key.key [ 0.3085 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin --updatesigheader /home/citix-ai/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt_sigheader.bin /home/citix-ai/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt_sigheader.sig oem-rsa [ 0.3140 ] [ 0.3204 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg.pdf sfuse.bin [ 0.3307 ] [ 0.3335 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm /home/citix-ai/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt_sigheader.bin 0 0 [ 0.3352 ] RCM 0 is saved as rcm_0.rcm [ 0.3384 ] RCM 1 is saved as rcm_1.rcm [ 0.3385 ] RCM 2 is saved as rcm_2.rcm [ 0.3386 ] List of rcm files are saved in rcm_list.xml [ 0.3386 ] [ 0.3387 ] Signing RCM messages [ 0.3431 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list rcm_list.xml --pubkeyhash pub_key.key [ 0.3464 ] K[ 0.3473 ] ey size is 256 bytes [ 0.4321 ] Saving pkc public key in pub_key.key [ 0.4320 ] Copying signature to RCM mesages [ 0.4346 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml --pubkeyhash pub_key.key [ 0.4382 ] [ 0.4384 ] Boot Rom communication [ 0.4405 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_list_signed.xml --skipuid [ 0.4421 ] RCM version 0X190001 [ 0.4475 ] Boot Rom communication completed [ 1.4883 ] [ 2.4944 ] tegrarcm_v2 --isapplet [ 2.4971 ] Applet version 01.00.0000 [ 2.5391 ] [ 2.5432 ] tegrarcm_v2 --ismb2 [ 2.5847 ] [ 2.5897 ] tegrahost_v2 --chip 0x19 --align nvtboot_applet_t194.bin [ 2.5915 ] [ 2.5934 ] header_magic: 50000ea [ 2.5970 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list nvtboot_applet_t194.bin_list.xml [ 2.5971 ] Key is a SBK key [ 2.5971 ] Key Size is 16 bytes [ 2.6224 ] 123616 [ 2.6454 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_applet_t194.bin.encrypt nvtboot_applet_t194.bin.hash zerosbk [ 2.6498 ] [ 2.6540 ] tegrahost_v2 --chip 0x19 --align nvtboot_applet_t194.bin.encrypt [ 2.6568 ] [ 2.6570 ] header_magic: 23c5f77a [ 2.6582 ] tegrahost_v2 --appendsigheader nvtboot_applet_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid PLDT [ 2.6596 ] adding BCH for nvtboot_applet_t194.bin.encrypt [ 2.6636 ] [ 2.6669 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list nvtboot_applet_t194.bin_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 2.6694 ] Ke[ 2.6701 ] y size is 256 bytes [ 2.7009 ] Saving pkc public key in pub_key.key [ 2.7035 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_applet_t194.bin_sigheader.encrypt.signed nvtboot_applet_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.7075 ] [ 2.7092 ] tegrarcm_v2 --download mb2 nvtboot_applet_t194.bin_sigheader.encrypt.signed [ 2.7106 ] Applet version 01.00.0000 [ 2.7498 ] Sending mb2 [ 2.7501 ] [................................................] 100% [ 2.8096 ] [ 2.8113 ] tegrarcm_v2 --boot recovery [ 2.8122 ] Applet version 01.00.0000 [ 2.8728 ] [ 3.8768 ] tegrarcm_v2 --isapplet [ 3.9181 ] [ 3.9217 ] tegrarcm_v2 --ismb2 [ 3.9250 ] MB2 Applet version 01.00.0000 [ 3.9638 ] [ 3.9673 ] tegrarcm_v2 --ismb2 [ 3.9699 ] MB2 Applet version 01.00.0000 [ 4.0122 ] [ 4.0176 ] Retrieving board information [ 4.0207 ] tegrarcm_v2 --oem platformdetails chip chip_info.bin [ 4.0234 ] MB2 Applet version 01.00.0000 [ 4.1035 ] Saved platform info in chip_info.bin [ 4.1284 ] Chip minor revision: 2 [ 4.1288 ] Bootrom revision: 0xf [ 4.1293 ] Ram code: 0x0 [ 4.1295 ] Chip sku: 0xde [ 4.1297 ] Chip Sample: non es [ 4.1441 ] [ 4.1445 ] Retrieving EEPROM data [ 4.1446 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/citix-ai/Linux_for_Tegra/bootloader/cvm.bin [ 4.1464 ] MB2 Applet version 01.00.0000 [ 4.2271 ] Saved platform info in /home/citix-ai/Linux_for_Tegra/bootloader/cvm.bin [ 4.3026 ] [ 4.3028 ] Rebooting to recovery mode [ 4.3060 ] tegrarcm_v2 --ismb2 [ 4.3082 ] MB2 Applet version 01.00.0000 [ 4.3490 ] [ 4.3491 ] Rebooting to recovery mode [ 4.3519 ] tegrarcm_v2 --reboot recovery [ 4.3532 ] MB2 Applet version 01.00.0000 [ 4.4501 ] Board ID(3668) version(301) sku(0001) revision(F.0) Copy /home/citix-ai/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb to /home/citix-ai/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb.rec copying bctfile(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg)... done. copying bctfile1(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-memcfg-sw-override.cfg)... done. copying minratchet_config(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-ratchet-p3668.cfg)... done. copying device_config(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-bct-device-qspi-p3668.cfg)... done. copying misc_cold_boot_config(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-l4t.cfg)... done. copying misc_config(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-flash.cfg)... done. copying pinmux_config(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-pinmux-p3668-a01.cfg)... done. copying gpioint_config(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg)... done. copying pmic_config(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-pmic-p3668-0001-a00.cfg)... done. copying pmc_config(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-padvoltage-p3668-a01.cfg)... done. copying prod_config(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-prod-p3668-0001-a00.cfg)... done. copying scr_config(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying scr_cold_boot_config(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying bootrom_config(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-reset-p3668-0001-a00.cfg)... done. copying dev_params(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-br-bct-qspi.cfg)... done. Existing bootloader(/home/citix-ai/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. copying initrd(/home/citix-ai/Linux_for_Tegra/bootloader/l4t_initrd.img)... done. Making Boot image... done. /home/citix-ai/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /home/citix-ai/Credential_Keys/rsa_priv.pem --encrypt_key /home/citix-ai/Linux_for_Tegra/.zero_.key --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign boot.img kernel Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0005 ] Generating signature [ 0.0021 ] tegrasign_v3.py --getmode mode.txt --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 0.0042 ] K[ 0.0046 ] ey size is 256 bytes [ 0.0064 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 0.0090 ] K[ 0.0096 ] ey size is 256 bytes [ 0.0096 ] Generating ratchet blob [ 0.0126 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0138 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0143 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0143 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0143 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0143 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0143 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0143 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0143 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0143 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0143 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0143 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0143 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0143 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0144 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0144 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0144 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0144 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0144 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0144 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0144 ] [ 0.0146 ] header_magic: 414e4452 [ 0.0148 ] Encrypting file [ 0.0172 ] tegrahost_v2 --chip 0x19 --align 1_boot.img [ 0.0183 ] [ 0.0184 ] header_magic: 414e4452 [ 0.0219 ] tegrasign_v3.py --key /home/citix-ai/Linux_for_Tegra/.zero_.key --list 1_boot.img_list.xml [ 0.0221 ] Key is a SBK key [ 0.0221 ] Key Size is 16 bytes [ 0.8382 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot.img.encrypt 1_boot.img.hash zerosbk [ 0.9615 ] [ 0.9659 ] tegrahost_v2 --chip 0x19 --align 1_boot.img.encrypt [ 0.9687 ] [ 0.9692 ] header_magic: 414e4452 [ 0.9732 ] tegrahost_v2 --appendsigheader 1_boot.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid KRNL --ratchet_blob ratchet_blob.bin [ 0.9756 ] adding BCH for 1_boot.img.encrypt [ 2.4126 ] [ 2.4153 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list 1_boot.img_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 2.4193 ] K[ 2.4200 ] ey size is 256 bytes [ 2.4898 ] Saving pkc public key in pub_key.key [ 2.4914 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot.img_sigheader.encrypt.signed 1_boot.img_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 3.1477 ] [ 3.1851 ] Signed and encrypted file: /home/citix-ai/Linux_for_Tegra/bootloader/temp_user_dir/boot.img_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for boot.img_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x27cb800 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot.img_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /home/citix-ai/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt.signed done. Making recovery ramdisk for recovery image... Re-generating recovery ramdisk for recovery image... ~/Linux_for_Tegra/bootloader/ramdisk_tmp ~/Linux_for_Tegra/bootloader ~/Linux_for_Tegra 30412 blocks _BASE_KERNEL_VERSION=4.9.253-tegra cp: cannot stat '/home/citix-ai/Linux_for_Tegra/rootfs/etc/wpa_supplicant.conf': No such file or directory warning: cp -f /home/citix-ai/Linux_for_Tegra/rootfs/etc/wpa_supplicant.conf /home/citix-ai/Linux_for_Tegra/bootloader/ramdisk_tmp//etc/wpa_supplicant.conf cp: cannot stat '/home/citix-ai/Linux_for_Tegra/rootfs/lib/firmware/brcm/fw_bcmdhd.bin': No such file or directory warning: cp -f /home/citix-ai/Linux_for_Tegra/rootfs/lib/firmware/brcm/fw_bcmdhd.bin /home/citix-ai/Linux_for_Tegra/bootloader/ramdisk_tmp//lib/firmware/brcm/fw_bcmdhd.bin cp: cannot stat '/home/citix-ai/Linux_for_Tegra/rootfs/lib/firmware/brcm/nvram.txt': No such file or directory warning: cp -f /home/citix-ai/Linux_for_Tegra/rootfs/lib/firmware/brcm/nvram.txt /home/citix-ai/Linux_for_Tegra/bootloader/ramdisk_tmp//lib/firmware/brcm/nvram.txt cp: cannot stat '/home/citix-ai/Linux_for_Tegra/rootfs/lib/modules/4.9.253-tegra/kernel/drivers/net/wireless/bcmdhd/bcmdhd.ko': No such file or directory warning: cp -f /home/citix-ai/Linux_for_Tegra/rootfs/lib/modules/4.9.253-tegra/kernel/drivers/net/wireless/bcmdhd/bcmdhd.ko /home/citix-ai/Linux_for_Tegra/bootloader/ramdisk_tmp//lib/modules/4.9.253-tegra/kernel/drivers/net/wireless/bcmdhd/bcmdhd.ko cp: cannot stat '/home/citix-ai/Linux_for_Tegra/rootfs/lib/modules/4.9.253-tegra/kernel/net/wireless/lib80211.ko': No such file or directory warning: cp -f /home/citix-ai/Linux_for_Tegra/rootfs/lib/modules/4.9.253-tegra/kernel/net/wireless/lib80211.ko /home/citix-ai/Linux_for_Tegra/bootloader/ramdisk_tmp//lib/modules/4.9.253-tegra/kernel/net/wireless/lib80211.ko cp: cannot stat '/home/citix-ai/Linux_for_Tegra/rootfs/lib/modules/4.9.253-tegra/kernel/net/wireless/cfg80211.ko': No such file or directory warning: cp -f /home/citix-ai/Linux_for_Tegra/rootfs/lib/modules/4.9.253-tegra/kernel/net/wireless/cfg80211.ko /home/citix-ai/Linux_for_Tegra/bootloader/ramdisk_tmp//lib/modules/4.9.253-tegra/kernel/net/wireless/cfg80211.ko ~/Linux_for_Tegra/bootloader/ramdisk_tmp/lib ~/Linux_for_Tegra/bootloader/ramdisk_tmp ~/Linux_for_Tegra/bootloader ~/Linux_for_Tegra 60024 blocks Making Recovery image... copying recdtbfile(/home/citix-ai/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb.rec)... done. 20+0 records in 20+0 records out 20 bytes copied, 0,00100839 s, 19,8 kB/s Existing sosfile(/home/citix-ai/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing tegraboot(/home/citix-ai/Linux_for_Tegra/bootloader/nvtboot_t194.bin) reused. Existing cpu_bootloader(/home/citix-ai/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. Existing mb2blfile(/home/citix-ai/Linux_for_Tegra/bootloader/nvtboot_recovery_t194.bin) reused. Existing mtspreboot(/home/citix-ai/Linux_for_Tegra/bootloader/preboot_c10_prod_cr.bin) reused. Existing mcepreboot(/home/citix-ai/Linux_for_Tegra/bootloader/mce_c10_prod_cr.bin) reused. Existing mtsproper(/home/citix-ai/Linux_for_Tegra/bootloader/mts_c10_prod_cr.bin) reused. Existing mb1file(/home/citix-ai/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing bpffile(/home/citix-ai/Linux_for_Tegra/bootloader/bpmp_t194.bin) reused. copying bpfdtbfile(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/tegra194-a02-bpmp-p3668-a00.dtb)... done. Existing scefile(/home/citix-ai/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. Existing camerafw(/home/citix-ai/Linux_for_Tegra/bootloader/camera-rtcpu-rce.img) reused. Existing spefile(/home/citix-ai/Linux_for_Tegra/bootloader/spe_t194.bin) reused. Existing wb0boot(/home/citix-ai/Linux_for_Tegra/bootloader/warmboot_t194_prod.bin) reused. Existing tosfile(/home/citix-ai/Linux_for_Tegra/bootloader/tos-trusty_t194.img) reused. Existing eksfile(/home/citix-ai/Linux_for_Tegra/bootloader/eks.img) reused. copying soft_fuses(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. copying dtbfile(/home/citix-ai/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb)... done. Copying nv_boot_control.conf to rootfs /home/citix-ai/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /home/citix-ai/Credential_Keys/rsa_priv.pem --encrypt_key /home/citix-ai/Linux_for_Tegra/.zero_.key --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign kernel_tegra194-p3668-all-p3509-0000.dtb kernel_dtb Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0024 ] Generating signature [ 0.0069 ] tegrasign_v3.py --getmode mode.txt --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 0.0119 ] K[ 0.0125 ] ey size is 256 bytes [ 0.0170 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 0.0209 ] K[ 0.0217 ] ey size is 256 bytes [ 0.0212 ] Generating ratchet blob [ 0.0229 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0251 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0251 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0251 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0251 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0251 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0251 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0252 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0252 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0252 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0252 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0252 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0252 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0252 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0252 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0252 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0252 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0252 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0253 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0253 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0253 ] [ 0.0256 ] header_magic: d00dfeed [ 0.0261 ] Encrypting file [ 0.0297 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p3668-all-p3509-0000.dtb [ 0.0326 ] [ 0.0330 ] header_magic: d00dfeed [ 0.0385 ] tegrasign_v3.py --key /home/citix-ai/Linux_for_Tegra/.zero_.key --list 1_kernel_tegra194-p3668-all-p3509-0000.dtb_list.xml [ 0.0387 ] Key is a SBK key [ 0.0387 ] Key Size is 16 bytes [ 0.0507 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt 1_kernel_tegra194-p3668-all-p3509-0000.dtb.hash zerosbk [ 0.0541 ] [ 0.0583 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt [ 0.0607 ] [ 0.0611 ] header_magic: d00dfeed [ 0.0650 ] tegrahost_v2 --appendsigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid KDTB --ratchet_blob ratchet_blob.bin [ 0.0674 ] adding BCH for 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt [ 0.0798 ] [ 0.0867 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.0913 ] K[ 0.0920 ] ey size is 256 bytes [ 0.1188 ] Saving pkc public key in pub_key.key [ 0.1224 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.1342 ] [ 0.1354 ] Signed and encrypted file: /home/citix-ai/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x31f5f to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /home/citix-ai/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed done. populating kernel to rootfs... done. populating initrd to rootfs... done. populating kernel_tegra194-p3668-all-p3509-0000.dtb to rootfs... done. Making system.img... populating rootfs from /home/citix-ai/Linux_for_Tegra/rootfs ... populating /boot/extlinux/extlinux.conf ... done. generating sig file of Image ... /home/citix-ai/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /home/citix-ai/Credential_Keys/rsa_priv.pem --encrypt_key /home/citix-ai/Linux_for_Tegra/.zero_.key --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign ./boot/Image kernel Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0014 ] Generating signature [ 0.0046 ] tegrasign_v3.py --getmode mode.txt --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 0.4374 ] K[ 2.6664 ] ey size is 256 bytes [ 2.6715 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 2.6770 ] K[ 2.6775 ] ey size is 256 bytes [ 2.6772 ] Generating ratchet blob [ 2.7480 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 2.7495 ] FwIndex: 1, MinRatchetLevel: 0 [ 2.8706 ] FwIndex: 2, MinRatchetLevel: 0 [ 2.8706 ] FwIndex: 3, MinRatchetLevel: 0 [ 2.8706 ] FwIndex: 4, MinRatchetLevel: 0 [ 2.8706 ] FwIndex: 5, MinRatchetLevel: 0 [ 2.8706 ] FwIndex: 6, MinRatchetLevel: 0 [ 2.8706 ] FwIndex: 7, MinRatchetLevel: 0 [ 2.8706 ] FwIndex: 11, MinRatchetLevel: 0 [ 2.8706 ] FwIndex: 12, MinRatchetLevel: 0 [ 2.8706 ] FwIndex: 13, MinRatchetLevel: 0 [ 2.8707 ] FwIndex: 14, MinRatchetLevel: 0 [ 2.8707 ] FwIndex: 15, MinRatchetLevel: 0 [ 2.8707 ] FwIndex: 16, MinRatchetLevel: 0 [ 2.8707 ] FwIndex: 17, MinRatchetLevel: 0 [ 2.8707 ] FwIndex: 18, MinRatchetLevel: 0 [ 2.8707 ] FwIndex: 19, MinRatchetLevel: 0 [ 2.8707 ] FwIndex: 30, MinRatchetLevel: 0 [ 2.8707 ] FwIndex: 31, MinRatchetLevel: 0 [ 2.8707 ] FwIndex: 32, MinRatchetLevel: 0 [ 2.8707 ] [ 3.1870 ] header_magic: 405614 [ 3.1873 ] Encrypting file [ 3.6791 ] tegrahost_v2 --chip 0x19 --align 1_Image [ 12.2202 ] [ 12.2208 ] header_magic: 405614 [ 12.4773 ] tegrasign_v3.py --key /home/citix-ai/Linux_for_Tegra/.zero_.key --list 1_Image_list.xml [ 12.7261 ] Key is a SBK key [ 12.7261 ] Key Size is 16 bytes [ 13.8645 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_Image.encrypt 1_Image.hash zerosbk [ 13.9343 ] [ 13.9390 ] tegrahost_v2 --chip 0x19 --align 1_Image.encrypt [ 13.9402 ] [ 13.9403 ] header_magic: 405614 [ 13.9412 ] tegrahost_v2 --appendsigheader 1_Image.encrypt oem-rsa-sbk --chip 0x19 0 --magicid KRNL --ratchet_blob ratchet_blob.bin [ 13.9425 ] adding BCH for 1_Image.encrypt [ 14.7933 ] [ 14.7981 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list 1_Image_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 14.8025 ] K[ 14.8034 ] ey size is 256 bytes [ 14.8547 ] Saving pkc public key in pub_key.key [ 14.8559 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_Image_sigheader.encrypt.signed 1_Image_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 15.3514 ] [ 15.3842 ] Signed and encrypted file: /home/citix-ai/Linux_for_Tegra/bootloader/mnt/Image_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for Image_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x20e3008 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for Image_sigheader.encrypt.signed l4t_sign_image.sh: the sign header is saved at ./boot/Image.sig done. done. generating sig file of kernel_tegra194-p3668-all-p3509-0000.dtb ... /home/citix-ai/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /home/citix-ai/Credential_Keys/rsa_priv.pem --encrypt_key /home/citix-ai/Linux_for_Tegra/.zero_.key --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign ./boot/dtb/kernel_tegra194-p3668-all-p3509-0000.dtb kernel_dtb Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0005 ] Generating signature [ 0.0039 ] tegrasign_v3.py --getmode mode.txt --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 0.0078 ] K[ 0.0084 ] ey size is 256 bytes [ 0.0122 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 0.0151 ] K[ 0.0158 ] ey size is 256 bytes [ 0.0161 ] Generating ratchet blob [ 0.0195 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0213 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0220 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0220 ] [ 0.0250 ] header_magic: d00dfeed [ 0.0252 ] Encrypting file [ 0.0275 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p3668-all-p3509-0000.dtb [ 0.0302 ] [ 0.0305 ] header_magic: d00dfeed [ 0.0328 ] tegrasign_v3.py --key /home/citix-ai/Linux_for_Tegra/.zero_.key --list 1_kernel_tegra194-p3668-all-p3509-0000.dtb_list.xml [ 0.0331 ] Key is a SBK key [ 0.0331 ] Key Size is 16 bytes [ 0.0406 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt 1_kernel_tegra194-p3668-all-p3509-0000.dtb.hash zerosbk [ 0.0423 ] [ 0.0448 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt [ 0.0467 ] [ 0.0469 ] header_magic: d00dfeed [ 0.0500 ] tegrahost_v2 --appendsigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid KDTB --ratchet_blob ratchet_blob.bin [ 0.0517 ] adding BCH for 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt [ 0.0590 ] [ 0.0618 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.0641 ] K[ 0.0647 ] ey size is 256 bytes [ 0.0815 ] Saving pkc public key in pub_key.key [ 0.0829 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.0863 ] [ 0.0869 ] Signed and encrypted file: /home/citix-ai/Linux_for_Tegra/bootloader/mnt/kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x31f5f to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: the sign header is saved at ./boot/dtb/kernel_tegra194-p3668-all-p3509-0000.dtb.sig done. done. generating sig file of initrd ... /home/citix-ai/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /home/citix-ai/Credential_Keys/rsa_priv.pem --encrypt_key /home/citix-ai/Linux_for_Tegra/.zero_.key --cmd sign ./boot/initrd data Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0005 ] Generating signature [ 0.0020 ] tegrasign_v3.py --getmode mode.txt --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 0.0043 ] K[ 0.0046 ] ey size is 256 bytes [ 0.0073 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 0.0107 ] K[ 0.0114 ] ey size is 256 bytes [ 0.0121 ] header_magic: 1f8b0800 [ 0.0122 ] Encrypting file [ 0.0144 ] tegrahost_v2 --chip 0x19 --align 1_initrd [ 0.0193 ] [ 0.0196 ] header_magic: 1f8b0800 [ 0.0249 ] tegrasign_v3.py --key /home/citix-ai/Linux_for_Tegra/.zero_.key --list 1_initrd_list.xml [ 0.0251 ] Key is a SBK key [ 0.0251 ] Key Size is 16 bytes [ 0.2594 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_initrd.encrypt 1_initrd.hash zerosbk [ 0.2747 ] [ 0.2773 ] tegrahost_v2 --chip 0x19 --align 1_initrd.encrypt [ 0.2794 ] [ 0.2796 ] header_magic: 1f8b0800 [ 0.2833 ] tegrahost_v2 --appendsigheader 1_initrd.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 0.2885 ] adding BCH for 1_initrd.encrypt [ 0.4797 ] [ 0.4837 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list 1_initrd_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.4876 ] K[ 0.4884 ] ey size is 256 bytes [ 0.5116 ] Saving pkc public key in pub_key.key [ 0.5140 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_initrd_sigheader.encrypt.signed 1_initrd_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.6004 ] [ 0.6079 ] Signed and encrypted file: /home/citix-ai/Linux_for_Tegra/bootloader/mnt/initrd_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for initrd_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x6e72de to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for initrd_sigheader.encrypt.signed l4t_sign_image.sh: the sign header is saved at ./boot/initrd.sig done. done. generating sig file of extlinux.conf ... /home/citix-ai/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /home/citix-ai/Credential_Keys/rsa_priv.pem --encrypt_key /home/citix-ai/Linux_for_Tegra/.zero_.key --cmd sign ./boot/extlinux/extlinux.conf data Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0006 ] Generating signature [ 0.0022 ] tegrasign_v3.py --getmode mode.txt --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 0.0045 ] K[ 0.0048 ] ey size is 256 bytes [ 0.0080 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 0.0106 ] K[ 0.0109 ] ey size is 256 bytes [ 0.0111 ] /home/citix-ai/Linux_for_Tegra/bootloader/mnt/boot/extlinux/extlinux.conf size is less than header size (400) [ 0.0116 ] Encrypting file [ 0.0139 ] tegrahost_v2 --chip 0x19 --align 1_extlinux.conf [ 0.0160 ] [ 0.0162 ] 1_extlinux.conf size is less than header size (400) [ 0.0205 ] tegrasign_v3.py --key /home/citix-ai/Linux_for_Tegra/.zero_.key --list 1_extlinux.conf_list.xml [ 0.0207 ] Key is a SBK key [ 0.0207 ] Key Size is 16 bytes [ 0.0272 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_extlinux.conf.encrypt 1_extlinux.conf.hash zerosbk [ 0.0282 ] [ 0.0304 ] tegrahost_v2 --chip 0x19 --align 1_extlinux.conf.encrypt [ 0.0314 ] [ 0.0315 ] 1_extlinux.conf.encrypt size is less than header size (400) [ 0.0325 ] tegrahost_v2 --appendsigheader 1_extlinux.conf.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 0.0333 ] adding BCH for 1_extlinux.conf.encrypt [ 0.0333 ] [ 0.0362 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list 1_extlinux.conf_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.0389 ] K[ 0.0392 ] ey size is 256 bytes [ 0.0544 ] Saving pkc public key in pub_key.key [ 0.0577 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_extlinux.conf_sigheader.encrypt.signed 1_extlinux.conf_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.0600 ] [ 0.0603 ] Signed and encrypted file: /home/citix-ai/Linux_for_Tegra/bootloader/mnt/extlinux.conf_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for extlinux.conf_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x0 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for extlinux.conf_sigheader.encrypt.signed l4t_sign_image.sh: the sign header is saved at ./boot/extlinux/extlinux.conf.sig done. done. Sync'ing system.img ... done. Converting RAW image to Sparse image... done. system.img built successfully. Existing tbcfile(/home/citix-ai/Linux_for_Tegra/bootloader/cboot_t194.bin) reused. copying tbcdtbfile(/home/citix-ai/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb)... done. copying cfgfile(/home/citix-ai/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t194_spi_emmc_p3668.xml) to flash.xml... done. Existing flasher(/home/citix-ai/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu_t194.bin) reused. Existing flashapp(/home/citix-ai/Linux_for_Tegra/bootloader/tegraflash.py) reused. ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin --sdram_config tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg,tegra194-memcfg-sw-override.cfg --odmdata 0xB8190000 --applet mb1_t194_prod.bin --cmd "sign" --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --cfg flash.xml --chip 0x19 --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --device_config tegra19x-mb1-bct-device-qspi-p3668.cfg --misc_cold_boot_config tegra194-mb1-bct-misc-l4t.cfg --misc_config tegra194-mb1-bct-misc-flash.cfg --pinmux_config tegra19x-mb1-pinmux-p3668-a01.cfg --gpioint_config tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --pmic_config tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --pmc_config tegra19x-mb1-padvoltage-p3668-a01.cfg --prod_config tegra19x-mb1-prod-p3668-0001-a00.cfg --scr_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --scr_cold_boot_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --br_cmd_config tegra194-mb1-bct-reset-p3668-0001-a00.cfg --dev_params tegra194-br-bct-qspi.cfg --bin "mb2_bootloader nvtboot_recovery_t194.bin; mts_preboot preboot_c10_prod_cr.bin; mts_mce mce_c10_prod_cr.bin; mts_proper mts_c10_prod_cr.bin; bpmp_fw bpmp_t194.bin; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00.dtb; spe_fw spe_t194.bin; tlk tos-trusty_t194.img; eks eks.img; bootloader_dtb tegra194-p3668-all-p3509-0000.dtb" --key /home/citix-ai/Credential_Keys/rsa_priv.pem --encrypt_key /home/citix-ai/Credential_Keys/skb_file.key Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.1116 ] Reading ramcode from backup chip_info.bin file [ 0.1124 ] RAMCODE Read from Device: 0 [ 0.1126 ] Disable BPMP dtb trim, using default dtb [ 0.1126 ] [ 0.1146 ] tegrasign_v3.py --getmode mode.txt --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 0.2277 ] K[ 0.7055 ] ey size is 256 bytes [ 0.7066 ] Generating RCM messages [ 0.7082 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --file mb1_t194_prod.bin --offset 4096 [ 0.7093 ] Key is a SBK key [ 0.8073 ] Key Size is 16 bytes [ 0.8075 ] 246336 [ 0.8186 ] [ 0.8210 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod_encrypt.bin zerosbk [ 0.8220 ] Header already present for mb1_t194_prod_encrypt.bin [ 0.8280 ] [ 0.8300 ] tegrasign_v3.py --getmode mode.txt --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 0.8327 ] K[ 0.8331 ] ey size is 256 bytes [ 0.8363 ] tegrasign_v3.py --file mb1_t194_prod_encrypt_sigheader.bin --getmontgomeryvalues montgomery.bin --key /home/citix-ai/Credential_Keys/rsa_priv.pem --length 1136 --offset 2960 --pubkeyhash pub_key.key [ 0.8396 ] K[ 0.8402 ] ey size is 256 bytes [ 0.8741 ] Saving pkc public key in pub_key.key [ 0.8773 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin --updatesigheader mb1_t194_prod_encrypt_sigheader.bin mb1_t194_prod_encrypt_sigheader.sig oem-rsa [ 0.8840 ] [ 0.8900 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg sfuse.bin [ 0.8959 ] [ 0.8988 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.9007 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.9018 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.9021 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.9026 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.9026 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.9026 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.9026 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.9027 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.9027 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.9027 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.9028 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.9028 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.9028 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.9028 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.9028 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.9028 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.9028 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.9028 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.9028 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.9029 ] [ 0.9075 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_encrypt_sigheader.bin 0 0 [ 0.9094 ] RCM 0 is saved as rcm_0.rcm [ 0.9210 ] RCM 1 is saved as rcm_1.rcm [ 0.9213 ] RCM 2 is saved as rcm_2.rcm [ 0.9217 ] List of rcm files are saved in rcm_list.xml [ 0.9218 ] [ 0.9219 ] Signing RCM messages [ 0.9243 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list rcm_list.xml --pubkeyhash pub_key.key [ 0.9284 ] K[ 0.9294 ] ey size is 256 bytes [ 1.0290 ] Saving pkc public key in pub_key.key [ 1.0290 ] Copying signature to RCM mesages [ 1.0327 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml --pubkeyhash pub_key.key [ 1.0367 ] [ 1.0375 ] Parsing partition layout [ 1.0447 ] tegraparser_v2 --pt flash.xml.tmp [ 1.0508 ] [ 1.0510 ] Creating list of images to be signed [ 1.0540 ] tegrahost_v2 --chip 0x19 --partitionlayout flash.xml.bin --list images_list.xml --ratchet_blob ratchet_blob.bin [ 1.0558 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 1.0583 ] Header already present for mb1_t194_prod_sigheader.bin [ 1.0587 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 1.0667 ] Header already present for mb1_t194_prod_sigheader.bin [ 1.0678 ] adding BCH for spe_t194.bin [ 1.0724 ] adding BCH for spe_t194.bin [ 1.0761 ] adding BCH for nvtboot_t194.bin [ 1.0825 ] adding BCH for nvtboot_t194.bin [ 1.0924 ] Header already present for preboot_c10_prod_cr.bin [ 1.1037 ] Header already present for preboot_c10_prod_cr.bin [ 1.1051 ] Header already present for mce_c10_prod_cr.bin [ 1.1066 ] Header already present for mce_c10_prod_cr.bin [ 1.1114 ] adding BCH for mts_c10_prod_cr.bin [ 1.1252 ] adding BCH for mts_c10_prod_cr.bin [ 1.2085 ] Header already present for warmboot_t194_prod.bin [ 1.3166 ] Header already present for warmboot_t194_prod.bin [ 1.3177 ] adding BCH for xusb_sil_rel_fw [ 1.3217 ] adding BCH for xusb_sil_rel_fw [ 1.3231 ] adding BCH for cboot_t194.bin [ 1.3270 ] adding BCH for cboot_t194.bin [ 1.3351 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb [ 1.3472 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb [ 1.3535 ] adding BCH for tos-trusty_t194.img [ 1.3637 ] adding BCH for tos-trusty_t194.img [ 1.3769 ] adding BCH for eks.img [ 1.4043 ] adding BCH for eks.img [ 1.4071 ] adding BCH for adsp-fw.bin [ 1.6145 ] adding BCH for adsp-fw.bin [ 1.6173 ] adding BCH for camera-rtcpu-rce.img [ 2.0962 ] adding BCH for camera-rtcpu-rce.img [ 2.1049 ] adding BCH for bpmp_t194.bin [ 2.9398 ] adding BCH for bpmp_t194.bin [ 2.9651 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 3.2369 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 3.2554 ] adding BCH for boot.img [ 9.8438 ] adding BCH for boot.img [ 11.0172 ] adding BCH for kernel_tegra194-p3668-all-p3509-0000.dtb [ 12.4328 ] adding BCH for kernel_tegra194-p3668-all-p3509-0000.dtb [ 12.4367 ] adding BCH for recovery.img [ 12.5692 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb.rec [ 14.4272 ] [ 14.4301 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list images_list.xml --pubkeyhash pub_key.key [ 14.4317 ] Key size is 256 bytes [ 15.2051 ] Saving pkc public key in pub_key.key [ 16.4532 ] [ 16.4533 ] Generating br-bct [ 16.4549 ] Performing cfg overlay [ 16.4551 ] ['tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg', 'tegra194-memcfg-sw-override.cfg'] [ 16.4555 ] sw_memcfg_overlay.pl -c tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg -s tegra194-memcfg-sw-override.cfg -o /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1.cfg [ 20.7361 ] [ 20.7364 ] Updating dev and MSS params in BR BCT [ 20.7365 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 20.8002 ] [ 20.8002 ] Updating bl info [ 20.8034 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 20.8072 ] [ 20.8100 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin [ 20.8116 ] [ 20.8120 ] header_magic: 4e564441 [ 20.8143 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list mb1_t194_prod_sigheader.bin_list.xml [ 20.8146 ] Key is a SBK key [ 20.8147 ] Key Size is 16 bytes [ 20.8164 ] 246336 [ 20.8365 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt mb1_t194_prod_sigheader.bin.hash zerosbk [ 20.8434 ] [ 20.8472 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 20.8500 ] [ 20.8505 ] header_magic: 4e564441 [ 20.8545 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list mb1_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 20.8583 ] K[ 20.8591 ] ey size is 256 bytes [ 20.8845 ] Saving pkc public key in pub_key.key [ 20.8862 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 20.8907 ] [ 20.8945 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin [ 20.8966 ] [ 20.8968 ] header_magic: 4e564441 [ 20.9004 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list mb1_t194_prod_sigheader.bin_list.xml [ 20.9006 ] Key is a SBK key [ 20.9007 ] Key Size is 16 bytes [ 20.9024 ] 246336 [ 20.9246 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt mb1_t194_prod_sigheader.bin.hash zerosbk [ 20.9310 ] [ 20.9326 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 20.9338 ] [ 20.9340 ] header_magic: 4e564441 [ 20.9377 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list mb1_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 20.9398 ] Key [ 20.9402 ] size is 256 bytes [ 20.9648 ] Saving pkc public key in pub_key.key [ 20.9662 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 20.9702 ] [ 20.9757 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin [ 20.9778 ] [ 20.9782 ] header_magic: 4e564441 [ 20.9821 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list spe_t194_sigheader.bin_list.xml [ 20.9825 ] Key is a SBK key [ 20.9825 ] Key Size is 16 bytes [ 20.9830 ] 90864 [ 20.9988 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 21.0019 ] [ 21.0039 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin.encrypt [ 21.0051 ] [ 21.0053 ] header_magic: 4e564441 [ 21.0078 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list spe_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 21.0104 ] Ke[ 21.0112 ] y size is 256 bytes [ 21.0339 ] Saving pkc public key in pub_key.key [ 21.0360 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt.signed spe_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 21.0406 ] [ 21.0435 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin [ 21.0446 ] [ 21.0449 ] header_magic: 4e564441 [ 21.0478 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list spe_t194_sigheader.bin_list.xml [ 21.0480 ] Key is a SBK key [ 21.0480 ] Key Size is 16 bytes [ 21.0490 ] 90864 [ 21.0627 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 21.0671 ] [ 21.0709 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin.encrypt [ 21.0735 ] [ 21.0737 ] header_magic: 4e564441 [ 21.0771 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list spe_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 21.0812 ] K[ 21.0822 ] ey size is 256 bytes [ 21.1042 ] Saving pkc public key in pub_key.key [ 21.1081 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt.signed spe_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 21.1123 ] [ 21.1141 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin [ 21.1156 ] [ 21.1159 ] header_magic: 4e564441 [ 21.1176 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list nvtboot_t194_sigheader.bin_list.xml [ 21.1178 ] Key is a SBK key [ 21.1178 ] Key Size is 16 bytes [ 21.1185 ] 177232 [ 21.1420 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt nvtboot_t194_sigheader.bin.hash zerosbk [ 21.1490 ] [ 21.1508 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin.encrypt [ 21.1517 ] [ 21.1518 ] header_magic: 4e564441 [ 21.1549 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list nvtboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 21.1590 ] Key si[ 21.1599 ] ze is 256 bytes [ 21.1860 ] Saving pkc public key in pub_key.key [ 21.1898 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt.signed nvtboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 21.1946 ] [ 21.1967 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin [ 21.1983 ] [ 21.1984 ] header_magic: 4e564441 [ 21.2004 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list nvtboot_t194_sigheader.bin_list.xml [ 21.2006 ] Key is a SBK key [ 21.2006 ] Key Size is 16 bytes [ 21.2021 ] 177232 [ 21.2251 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt nvtboot_t194_sigheader.bin.hash zerosbk [ 21.2287 ] [ 21.2316 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin.encrypt [ 21.2332 ] [ 21.2334 ] header_magic: 4e564441 [ 21.2354 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list nvtboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 21.2376 ] K[ 21.2386 ] ey size is 256 bytes [ 21.2606 ] Saving pkc public key in pub_key.key [ 21.2628 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt.signed nvtboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 21.2683 ] [ 21.2717 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin [ 21.2736 ] [ 21.2741 ] header_magic: 4e564441 [ 21.2769 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list preboot_c10_prod_cr_sigheader.bin_list.xml [ 21.2772 ] Key is a SBK key [ 21.2772 ] Key Size is 16 bytes [ 21.2782 ] 19920 [ 21.2870 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 21.2890 ] [ 21.2913 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin.encrypt [ 21.2927 ] [ 21.2930 ] header_magic: 4e564441 [ 21.2947 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list preboot_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 21.2970 ] K[ 21.2974 ] ey size is 256 bytes [ 21.3132 ] Saving pkc public key in pub_key.key [ 21.3144 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt.signed preboot_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 21.3160 ] [ 21.3174 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin [ 21.3183 ] [ 21.3185 ] header_magic: 4e564441 [ 21.3206 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list preboot_c10_prod_cr_sigheader.bin_list.xml [ 21.3208 ] Key is a SBK key [ 21.3208 ] Key Size is 16 bytes [ 21.3218 ] 19920 [ 21.3342 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 21.3373 ] [ 21.3401 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin.encrypt [ 21.3422 ] [ 21.3428 ] header_magic: 4e564441 [ 21.3467 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list preboot_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 21.3501 ] K[ 21.3509 ] ey size is 256 bytes [ 21.3773 ] Saving pkc public key in pub_key.key [ 21.3806 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt.signed preboot_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 21.3832 ] [ 21.3872 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin [ 21.3892 ] [ 21.3896 ] header_magic: 4e564441 [ 21.3920 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list mce_c10_prod_cr_sigheader.bin_list.xml [ 21.3921 ] Key is a SBK key [ 21.3921 ] Key Size is 16 bytes [ 21.3928 ] 139104 [ 21.4082 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 21.4148 ] [ 21.4198 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin.encrypt [ 21.4218 ] [ 21.4222 ] header_magic: 4e564441 [ 21.4266 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list mce_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 21.4286 ] K[ 21.4294 ] ey size is 256 bytes [ 21.4545 ] Saving pkc public key in pub_key.key [ 21.4585 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt.signed mce_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 21.4653 ] [ 21.4687 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin [ 21.4707 ] [ 21.4708 ] header_magic: 4e564441 [ 21.4759 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list mce_c10_prod_cr_sigheader.bin_list.xml [ 21.4762 ] Key is a SBK key [ 21.4762 ] Key Size is 16 bytes [ 21.4770 ] 139104 [ 21.4945 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 21.5016 ] [ 21.5045 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin.encrypt [ 21.5066 ] [ 21.5071 ] header_magic: 4e564441 [ 21.5114 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list mce_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 21.5161 ] K[ 21.5171 ] ey size is 256 bytes [ 21.5491 ] Saving pkc public key in pub_key.key [ 21.5511 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt.signed mce_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 21.5548 ] [ 21.5591 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin [ 21.5618 ] [ 21.5620 ] header_magic: 4e564441 [ 21.5654 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list mts_c10_prod_cr_sigheader.bin_list.xml [ 21.5658 ] Key is a SBK key [ 21.5658 ] Key Size is 16 bytes [ 21.5792 ] 3426320 [ 21.6928 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 21.7350 ] [ 21.7372 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin.encrypt [ 21.7388 ] [ 21.7390 ] header_magic: 4e564441 [ 21.7420 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list mts_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 21.7475 ] Key size is 256 bytes [ 21.7669 ] Saving pkc public key in pub_key.key [ 21.7684 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt.signed mts_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 21.8449 ] [ 21.8501 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin [ 21.8519 ] [ 21.8522 ] header_magic: 4e564441 [ 21.8567 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list mts_c10_prod_cr_sigheader.bin_list.xml [ 21.8569 ] Key is a SBK key [ 21.8569 ] Key Size is 16 bytes [ 21.8712 ] 3426320 [ 22.0405 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 22.1035 ] [ 22.1049 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin.encrypt [ 22.1064 ] [ 22.1066 ] header_magic: 4e564441 [ 22.1093 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list mts_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 22.1136 ] K[ 22.1147 ] ey size is 256 bytes [ 22.1527 ] Saving pkc public key in pub_key.key [ 22.1552 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt.signed mts_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.1978 ] [ 22.2087 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin [ 22.2097 ] [ 22.2099 ] header_magic: 4e564441 [ 22.2114 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list warmboot_t194_prod_sigheader.bin_list.xml [ 22.2116 ] Key is a SBK key [ 22.2116 ] Key Size is 16 bytes [ 22.2121 ] 61408 [ 22.2203 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt warmboot_t194_prod_sigheader.bin.hash zerosbk [ 22.2227 ] [ 22.2246 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin.encrypt [ 22.2265 ] [ 22.2267 ] header_magic: 4e564441 [ 22.2285 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list warmboot_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 22.2304 ] K[ 22.2310 ] ey size is 256 bytes [ 22.2556 ] Saving pkc public key in pub_key.key [ 22.2594 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt.signed warmboot_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.2618 ] [ 22.2635 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin [ 22.2645 ] [ 22.2647 ] header_magic: 4e564441 [ 22.2679 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list warmboot_t194_prod_sigheader.bin_list.xml [ 22.2682 ] Key is a SBK key [ 22.2682 ] Key Size is 16 bytes [ 22.2688 ] 61408 [ 22.2786 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt warmboot_t194_prod_sigheader.bin.hash zerosbk [ 22.2817 ] [ 22.2855 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin.encrypt [ 22.2880 ] [ 22.2884 ] header_magic: 4e564441 [ 22.2929 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list warmboot_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 22.2967 ] K[ 22.2972 ] ey size is 256 bytes [ 22.3298 ] Saving pkc public key in pub_key.key [ 22.3316 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt.signed warmboot_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.3353 ] [ 22.3383 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader [ 22.3397 ] [ 22.3399 ] header_magic: 4e564441 [ 22.3415 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list xusb_sil_rel_fw_sigheader_list.xml [ 22.3420 ] Key is a SBK key [ 22.3421 ] Key Size is 16 bytes [ 22.3434 ] 129024 [ 22.3619 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt xusb_sil_rel_fw_sigheader.hash zerosbk [ 22.3695 ] [ 22.3738 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader.encrypt [ 22.3754 ] [ 22.3756 ] header_magic: 4e564441 [ 22.3785 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list xusb_sil_rel_fw_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 22.3837 ] K[ 22.3848 ] ey size is 256 bytes [ 22.4064 ] Saving pkc public key in pub_key.key [ 22.4095 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt.signed xusb_sil_rel_fw_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.4149 ] [ 22.4184 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader [ 22.4206 ] [ 22.4208 ] header_magic: 4e564441 [ 22.4239 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list xusb_sil_rel_fw_sigheader_list.xml [ 22.4241 ] Key is a SBK key [ 22.4241 ] Key Size is 16 bytes [ 22.4249 ] 129024 [ 22.4405 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt xusb_sil_rel_fw_sigheader.hash zerosbk [ 22.4467 ] [ 22.4492 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader.encrypt [ 22.4512 ] [ 22.4516 ] header_magic: 4e564441 [ 22.4546 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list xusb_sil_rel_fw_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 22.4584 ] Ke[ 22.4596 ] y size is 256 bytes [ 22.4802 ] Saving pkc public key in pub_key.key [ 22.4826 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt.signed xusb_sil_rel_fw_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.4866 ] [ 22.4887 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin [ 22.4905 ] [ 22.4909 ] header_magic: 4e564441 [ 22.4959 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list cboot_t194_sigheader.bin_list.xml [ 22.4963 ] Key is a SBK key [ 22.4964 ] Key Size is 16 bytes [ 22.4990 ] 467664 [ 22.5292 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt cboot_t194_sigheader.bin.hash zerosbk [ 22.5404 ] [ 22.5428 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin.encrypt [ 22.5443 ] [ 22.5446 ] header_magic: 4e564441 [ 22.5480 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list cboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 22.5504 ] K[ 22.5508 ] ey size is 256 bytes [ 22.5726 ] Saving pkc public key in pub_key.key [ 22.5758 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt.signed cboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.5885 ] [ 22.5915 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin [ 22.5932 ] [ 22.5936 ] header_magic: 4e564441 [ 22.5977 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list cboot_t194_sigheader.bin_list.xml [ 22.5981 ] Key is a SBK key [ 22.5982 ] Key Size is 16 bytes [ 22.6008 ] 467664 [ 22.6305 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt cboot_t194_sigheader.bin.hash zerosbk [ 22.6373 ] [ 22.6387 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin.encrypt [ 22.6405 ] [ 22.6407 ] header_magic: 4e564441 [ 22.6425 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list cboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 22.6454 ] K[ 22.6464 ] ey size is 256 bytes [ 22.6837 ] Saving pkc public key in pub_key.key [ 22.6863 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt.signed cboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.6965 ] [ 22.7014 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb [ 22.7030 ] [ 22.7032 ] header_magic: 4e564441 [ 22.7053 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 22.7054 ] Key is a SBK key [ 22.7055 ] Key Size is 16 bytes [ 22.7063 ] 204640 [ 22.7198 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 22.7262 ] [ 22.7277 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 22.7289 ] [ 22.7292 ] header_magic: 4e564441 [ 22.7325 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 22.7353 ] K[ 22.7360 ] ey size is 256 bytes [ 22.7654 ] Saving pkc public key in pub_key.key [ 22.7701 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.7788 ] [ 22.7841 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb [ 22.7870 ] [ 22.7872 ] header_magic: 4e564441 [ 22.7891 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 22.7893 ] Key is a SBK key [ 22.7893 ] Key Size is 16 bytes [ 22.7900 ] 204640 [ 22.8176 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 22.8220 ] [ 22.8272 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 22.8298 ] [ 22.8302 ] header_magic: 4e564441 [ 22.8336 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 22.8362 ] K[ 22.8367 ] ey size is 256 bytes [ 22.8583 ] Saving pkc public key in pub_key.key [ 22.8615 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.8654 ] [ 22.8690 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img [ 22.8706 ] [ 22.8709 ] header_magic: 4e564441 [ 22.8732 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list tos-trusty_t194_sigheader.img_list.xml [ 22.8737 ] Key is a SBK key [ 22.8738 ] Key Size is 16 bytes [ 22.8761 ] 406464 [ 22.9164 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 22.9277 ] [ 22.9325 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img.encrypt [ 22.9352 ] [ 22.9357 ] header_magic: 4e564441 [ 22.9395 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list tos-trusty_t194_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 22.9419 ] K[ 22.9423 ] ey size is 256 bytes [ 22.9725 ] Saving pkc public key in pub_key.key [ 22.9751 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt.signed tos-trusty_t194_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.9895 ] [ 22.9950 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img [ 22.9978 ] [ 22.9980 ] header_magic: 4e564441 [ 23.0007 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list tos-trusty_t194_sigheader.img_list.xml [ 23.0014 ] Key is a SBK key [ 23.0015 ] Key Size is 16 bytes [ 23.0031 ] 406464 [ 23.0321 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 23.0420 ] [ 23.0465 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img.encrypt [ 23.0485 ] [ 23.0486 ] header_magic: 4e564441 [ 23.0509 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list tos-trusty_t194_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 23.0532 ] Ke[ 23.0540 ] y size is 256 bytes [ 23.0806 ] Saving pkc public key in pub_key.key [ 23.0852 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt.signed tos-trusty_t194_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 23.0991 ] [ 23.1044 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img [ 23.1073 ] [ 23.1077 ] header_magic: 4e564441 [ 23.1110 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list eks_sigheader.img_list.xml [ 23.1113 ] Key is a SBK key [ 23.1113 ] Key Size is 16 bytes [ 23.1119 ] 1040 [ 23.1236 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 23.1252 ] [ 23.1265 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img.encrypt [ 23.1275 ] [ 23.1279 ] header_magic: 4e564441 [ 23.1313 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list eks_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 23.1338 ] K[ 23.1343 ] ey size is 256 bytes [ 23.1595 ] Saving pkc public key in pub_key.key [ 23.1637 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt.signed eks_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 23.1667 ] [ 23.1712 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img [ 23.1728 ] [ 23.1730 ] header_magic: 4e564441 [ 23.1760 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list eks_sigheader.img_list.xml [ 23.1762 ] Key is a SBK key [ 23.1762 ] Key Size is 16 bytes [ 23.1766 ] 1040 [ 23.1828 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 23.1840 ] [ 23.1852 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img.encrypt [ 23.1871 ] [ 23.1876 ] header_magic: 4e564441 [ 23.1906 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list eks_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 23.1940 ] K[ 23.1945 ] ey size is 256 bytes [ 23.2128 ] Saving pkc public key in pub_key.key [ 23.2144 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt.signed eks_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 23.2158 ] [ 23.2187 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin [ 23.2206 ] [ 23.2209 ] header_magic: 4e564441 [ 23.2245 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list adsp-fw_sigheader.bin_list.xml [ 23.2248 ] Key is a SBK key [ 23.2248 ] Key Size is 16 bytes [ 23.2256 ] 77216 [ 23.2387 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt adsp-fw_sigheader.bin.hash zerosbk [ 23.2444 ] [ 23.2479 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin.encrypt [ 23.2496 ] [ 23.2498 ] header_magic: 4e564441 [ 23.2524 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list adsp-fw_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 23.2557 ] K[ 23.2561 ] ey size is 256 bytes [ 23.2860 ] Saving pkc public key in pub_key.key [ 23.2906 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 23.2965 ] [ 23.2983 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin [ 23.2997 ] [ 23.3002 ] header_magic: 4e564441 [ 23.3025 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list adsp-fw_sigheader.bin_list.xml [ 23.3028 ] Key is a SBK key [ 23.3028 ] Key Size is 16 bytes [ 23.3039 ] 77216 [ 23.3217 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt adsp-fw_sigheader.bin.hash zerosbk [ 23.3260 ] [ 23.3279 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin.encrypt [ 23.3296 ] [ 23.3299 ] header_magic: 4e564441 [ 23.3324 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list adsp-fw_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 23.3348 ] K[ 23.3354 ] ey size is 256 bytes [ 23.3587 ] Saving pkc public key in pub_key.key [ 23.3625 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 23.3679 ] [ 23.3717 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img [ 23.3750 ] [ 23.3757 ] header_magic: 4e564441 [ 23.3790 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list camera-rtcpu-rce_sigheader.img_list.xml [ 23.3792 ] Key is a SBK key [ 23.3793 ] Key Size is 16 bytes [ 23.3806 ] 267856 [ 23.4037 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt camera-rtcpu-rce_sigheader.img.hash zerosbk [ 23.4139 ] [ 23.4155 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img.encrypt [ 23.4178 ] [ 23.4182 ] header_magic: 4e564441 [ 23.4211 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list camera-rtcpu-rce_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 23.4244 ] K[ 23.4251 ] ey size is 256 bytes [ 23.4480 ] Saving pkc public key in pub_key.key [ 23.4520 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt.signed camera-rtcpu-rce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 23.4617 ] [ 23.4640 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img [ 23.4660 ] [ 23.4662 ] header_magic: 4e564441 [ 23.4689 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list camera-rtcpu-rce_sigheader.img_list.xml [ 23.4691 ] Key is a SBK key [ 23.4691 ] Key Size is 16 bytes [ 23.4702 ] 267856 [ 23.4957 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt camera-rtcpu-rce_sigheader.img.hash zerosbk [ 23.5072 ] [ 23.5122 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img.encrypt [ 23.5154 ] [ 23.5158 ] header_magic: 4e564441 [ 23.5207 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list camera-rtcpu-rce_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 23.5259 ] K[ 23.5275 ] ey size is 256 bytes [ 23.5499 ] Saving pkc public key in pub_key.key [ 23.5537 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt.signed camera-rtcpu-rce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 23.5642 ] [ 23.5701 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin [ 23.5715 ] [ 23.5717 ] header_magic: 4e564441 [ 23.5758 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list bpmp_t194_sigheader.bin_list.xml [ 23.5763 ] Key is a SBK key [ 23.5763 ] Key Size is 16 bytes [ 23.5799 ] 852256 [ 23.6301 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 23.6520 ] [ 23.6557 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin.encrypt [ 23.6574 ] [ 23.6576 ] header_magic: 4e564441 [ 23.6597 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list bpmp_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 23.6625 ] K[ 23.6635 ] ey size is 256 bytes [ 23.6945 ] Saving pkc public key in pub_key.key [ 23.6971 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt.signed bpmp_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 23.7139 ] [ 23.7197 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin [ 23.7218 ] [ 23.7220 ] header_magic: 4e564441 [ 23.7243 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list bpmp_t194_sigheader.bin_list.xml [ 23.7246 ] Key is a SBK key [ 23.7246 ] Key Size is 16 bytes [ 23.7278 ] 852256 [ 23.7627 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 23.7744 ] [ 23.7760 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin.encrypt [ 23.7772 ] [ 23.7774 ] header_magic: 4e564441 [ 23.7795 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list bpmp_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 23.7814 ] K[ 23.7819 ] ey size is 256 bytes [ 23.8052 ] Saving pkc public key in pub_key.key [ 23.8074 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt.signed bpmp_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 23.8317 ] [ 23.8391 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb [ 23.8418 ] [ 23.8425 ] header_magic: 4e564441 [ 23.8449 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml [ 23.8451 ] Key is a SBK key [ 23.8451 ] Key Size is 16 bytes [ 23.8462 ] 387520 [ 23.8772 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk [ 23.8862 ] [ 23.8882 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 23.8892 ] [ 23.8893 ] header_magic: 4e564441 [ 23.8912 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 23.8936 ] K[ 23.8946 ] ey size is 256 bytes [ 23.9240 ] Saving pkc public key in pub_key.key [ 23.9282 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 23.9400 ] [ 23.9419 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb [ 23.9429 ] [ 23.9431 ] header_magic: 4e564441 [ 23.9464 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml [ 23.9466 ] Key is a SBK key [ 23.9466 ] Key Size is 16 bytes [ 23.9480 ] 387520 [ 23.9837 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk [ 23.9968 ] [ 23.9985 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 24.0001 ] [ 24.0003 ] header_magic: 4e564441 [ 24.0032 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 24.0059 ] K[ 24.0064 ] ey size is 256 bytes [ 24.0331 ] Saving pkc public key in pub_key.key [ 24.0370 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 24.0470 ] [ 24.0534 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img [ 24.0561 ] [ 24.0566 ] header_magic: 4e564441 [ 24.0618 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list boot_sigheader.img_list.xml [ 24.0623 ] Key is a SBK key [ 24.0623 ] Key Size is 16 bytes [ 24.1625 ] 41728000 [ 25.4798 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt boot_sigheader.img.hash zerosbk [ 26.0707 ] [ 26.0726 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img.encrypt [ 26.0740 ] [ 26.0742 ] header_magic: 4e564441 [ 26.0774 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list boot_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 26.0805 ] K[ 26.0809 ] ey size is 256 bytes [ 26.1655 ] Saving pkc public key in pub_key.key [ 26.1684 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt.signed boot_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 26.7641 ] [ 26.7963 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img [ 26.7977 ] [ 26.7979 ] header_magic: 4e564441 [ 26.7999 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list boot_sigheader.img_list.xml [ 26.8001 ] Key is a SBK key [ 26.8001 ] Key Size is 16 bytes [ 26.9047 ] 41728000 [ 28.2994 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt boot_sigheader.img.hash zerosbk [ 28.8842 ] [ 28.8893 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img.encrypt [ 28.8925 ] [ 28.8929 ] header_magic: 4e564441 [ 28.8970 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list boot_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 28.9008 ] K[ 28.9016 ] ey size is 256 bytes [ 29.0264 ] Saving pkc public key in pub_key.key [ 29.0298 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt.signed boot_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 29.6480 ] [ 29.7205 ] tegrahost_v2 --chip 0x19 --align kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb [ 29.7220 ] [ 29.7222 ] header_magic: 4e564441 [ 29.7255 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 29.7259 ] Key is a SBK key [ 29.7259 ] Key Size is 16 bytes [ 29.7277 ] 204640 [ 29.7521 ] tegrahost_v2 --chip 0x19 0 --updatesigheader kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 29.7588 ] [ 29.7618 ] tegrahost_v2 --chip 0x19 --align kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 29.7646 ] [ 29.7653 ] header_magic: 4e564441 [ 29.7689 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 29.7721 ] Key siz[ 29.7732 ] e is 256 bytes [ 29.7944 ] Saving pkc public key in pub_key.key [ 29.7972 ] tegrahost_v2 --chip 0x19 0 --updatesigheader kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 29.8020 ] [ 29.8040 ] tegrahost_v2 --chip 0x19 --align kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb [ 29.8054 ] [ 29.8056 ] header_magic: 4e564441 [ 29.8097 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 29.8099 ] Key is a SBK key [ 29.8099 ] Key Size is 16 bytes [ 29.8112 ] 204640 [ 29.8290 ] tegrahost_v2 --chip 0x19 0 --updatesigheader kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 29.8334 ] [ 29.8367 ] tegrahost_v2 --chip 0x19 --align kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 29.8389 ] [ 29.8397 ] header_magic: 4e564441 [ 29.8448 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 29.8484 ] Key [ 29.8491 ] size is 256 bytes [ 29.8747 ] Saving pkc public key in pub_key.key [ 29.8763 ] tegrahost_v2 --chip 0x19 0 --updatesigheader kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 29.8829 ] [ 29.8893 ] tegrahost_v2 --chip 0x19 --align recovery_sigheader.img [ 29.8921 ] [ 29.8923 ] header_magic: 4e564441 [ 29.8946 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list recovery_sigheader.img_list.xml [ 29.8953 ] Key is a SBK key [ 29.8953 ] Key Size is 16 bytes [ 30.0243 ] 48406528 [ 31.8164 ] tegrahost_v2 --chip 0x19 0 --updatesigheader recovery_sigheader.img.encrypt recovery_sigheader.img.hash zerosbk [ 32.5260 ] [ 32.5278 ] tegrahost_v2 --chip 0x19 --align recovery_sigheader.img.encrypt [ 32.5292 ] [ 32.5294 ] header_magic: 4e564441 [ 32.5330 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list recovery_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 32.5363 ] K[ 32.5369 ] ey size is 256 bytes [ 42.2872 ] Saving pkc public key in pub_key.key [ 42.2919 ] tegrahost_v2 --chip 0x19 0 --updatesigheader recovery_sigheader.img.encrypt.signed recovery_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 43.0801 ] [ 43.1322 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000.dtb_sigheader.rec [ 43.1338 ] [ 43.1340 ] header_magic: 4e564441 [ 43.1375 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list tegra194-p3668-all-p3509-0000.dtb_sigheader.rec_list.xml [ 43.1377 ] Key is a SBK key [ 43.1377 ] Key Size is 16 bytes [ 43.1388 ] 204640 [ 43.1526 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.hash zerosbk [ 43.1564 ] [ 43.1577 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt [ 43.1587 ] [ 43.1589 ] header_magic: 4e564441 [ 43.1609 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt_list.xml --pubkeyhash pub_key.key [ 43.1651 ] K[ 43.1660 ] ey size is 256 bytes [ 43.1928 ] Saving pkc public key in pub_key.key [ 43.1959 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt.signed tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 43.2028 ] [ 43.2124 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin [ 43.2151 ] [ 43.2162 ] header_magic: 50000ea [ 43.2195 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list nvtboot_recovery_t194.bin_list.xml [ 43.2200 ] Key is a SBK key [ 43.2201 ] Key Size is 16 bytes [ 43.2216 ] 177056 [ 43.2383 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194.bin.encrypt nvtboot_recovery_t194.bin.hash zerosbk [ 43.2412 ] [ 43.2454 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin.encrypt [ 43.2484 ] [ 43.2487 ] header_magic: 23c5f77a [ 43.2521 ] tegrahost_v2 --appendsigheader nvtboot_recovery_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MB2B --ratchet_blob ratchet_blob.bin [ 43.2532 ] adding BCH for nvtboot_recovery_t194.bin.encrypt [ 43.2625 ] [ 43.2652 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list nvtboot_recovery_t194.bin_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 43.2686 ] K[ 43.2691 ] ey size is 256 bytes [ 43.2966 ] Saving pkc public key in pub_key.key [ 43.2981 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194.bin_sigheader.encrypt.signed nvtboot_recovery_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 43.3013 ] [ 43.3045 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin [ 43.3068 ] [ 43.3069 ] header_magic: 9000014 [ 43.3101 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list nvtboot_recovery_cpu_t194.bin_list.xml [ 43.3105 ] Key is a SBK key [ 43.3106 ] Key Size is 16 bytes [ 43.3118 ] 259968 [ 43.3334 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194.bin.encrypt nvtboot_recovery_cpu_t194.bin.hash zerosbk [ 43.3379 ] [ 43.3407 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin.encrypt [ 43.3427 ] [ 43.3428 ] header_magic: 329de335 [ 43.3459 ] tegrahost_v2 --appendsigheader nvtboot_recovery_cpu_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid CPBL --ratchet_blob ratchet_blob.bin [ 43.3482 ] adding BCH for nvtboot_recovery_cpu_t194.bin.encrypt [ 43.3578 ] [ 43.3615 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list nvtboot_recovery_cpu_t194.bin_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 43.3675 ] K[ 43.3685 ] ey size is 256 bytes [ 43.3934 ] Saving pkc public key in pub_key.key [ 43.3955 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 43.3996 ] [ 43.3998 ] Copying signed file in /home/citix-ai/Linux_for_Tegra/bootloader/encrypted_signed_t19x [ 43.4005 ] Generating br-bct [ 43.4019 ] Performing cfg overlay [ 43.4020 ] ['/home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1.cfg'] [ 43.4020 ] Updating dev and MSS params in BR BCT [ 43.4020 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 43.4558 ] [ 43.4560 ] Updating bl info [ 43.4581 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 43.4615 ] [ 43.4616 ] Generating br-bct [ 43.4641 ] Performing cfg overlay [ 43.4642 ] ['/home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1.cfg'] [ 43.4642 ] Updating dev and MSS params in BR BCT [ 43.4643 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 43.5160 ] [ 43.5161 ] Updating bl info [ 43.5177 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 43.5242 ] [ 43.5244 ] Updating smd info [ 43.5261 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 --updatesmdinfo flash.xml.bin [ 43.5277 ] [ 43.5278 ] Updating Odmdata [ 43.5304 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0xB8190000 [ 43.5348 ] [ 43.5350 ] Get encrypted section of bct [ 43.5389 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listencbct bct_list.xml [ 43.5405 ] [ 43.5406 ] Signing BCT [ 43.5437 ] Generating signatures with encryption [ 43.5463 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --offset 2328 --file br_bct_BR.bct [ 43.5497 ] Key is a SBK key [ 43.5828 ] Key Size is 16 bytes [ 43.5831 ] 560 [ 43.5893 ] [ 43.5894 ] Updating BCT with signature [ 43.5902 ] Get Signed section of bct [ 43.5936 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listbct bct_list.xml [ 43.5981 ] [ 43.6027 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list bct_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 43.6055 ] Key size is 256 bytes [ 43.6519 ] Saving pkc public key in pub_key.key [ 43.6576 ] [ 43.6577 ] Updating BCT with signature [ 43.6592 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key [ 43.6617 ] [ 43.6618 ] Generating coldboot mb1-bct [ 43.6730 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_cold_boot_bct.cfg --sdram /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1.cfg --misc tegra194-mb1-bct-misc-l4t.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 43.6760 ] MB1-BCT version: 0x1 [ 43.6776 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg [ 43.6799 ] Added Platform Config 0 data with size :- 2496 [ 43.6816 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 43.6827 ] Added Platform Config 1 data with size :- 19640 [ 43.7049 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg [ 43.7055 ] Added Platform Config 2 data with size :- 24 [ 43.7058 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 43.7063 ] Added Platform Config 4 data with size :- 348 [ 43.7067 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 43.7072 ] Added Platform Config 3 data with size :- 92 [ 43.7076 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 43.7081 ] Added Platform Config 5 data with size :- 128 [ 43.7089 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 43.7096 ] Added Platform Config 7 data with size :- 392 [ 43.7113 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 43.7114 ] Added Platform Config 9 data with size :- 40 [ 43.7114 ] [ 43.7115 ] Updating mb1-bct with firmware information [ 43.7133 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 43.7146 ] MB1-BCT version: 0x1 [ 43.7154 ] [ 43.7154 ] Updating mb1-bct with storage information [ 43.7181 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 43.7194 ] MB1-BCT version: 0x1 [ 43.7200 ] [ 43.7201 ] Updating mb1-bct with ratchet information [ 43.7215 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 43.7226 ] MB1-BCT version: 0x1 [ 43.7229 ] FwIndex: 1, MinRatchetLevel: 0 [ 43.7232 ] FwIndex: 2, MinRatchetLevel: 0 [ 43.7232 ] FwIndex: 3, MinRatchetLevel: 0 [ 43.7232 ] FwIndex: 4, MinRatchetLevel: 0 [ 43.7232 ] FwIndex: 5, MinRatchetLevel: 0 [ 43.7232 ] FwIndex: 6, MinRatchetLevel: 0 [ 43.7232 ] FwIndex: 7, MinRatchetLevel: 0 [ 43.7232 ] FwIndex: 11, MinRatchetLevel: 0 [ 43.7233 ] FwIndex: 12, MinRatchetLevel: 0 [ 43.7233 ] FwIndex: 13, MinRatchetLevel: 0 [ 43.7234 ] FwIndex: 14, MinRatchetLevel: 0 [ 43.7234 ] FwIndex: 15, MinRatchetLevel: 0 [ 43.7234 ] FwIndex: 16, MinRatchetLevel: 0 [ 43.7234 ] FwIndex: 17, MinRatchetLevel: 0 [ 43.7234 ] FwIndex: 18, MinRatchetLevel: 0 [ 43.7234 ] FwIndex: 19, MinRatchetLevel: 0 [ 43.7235 ] FwIndex: 30, MinRatchetLevel: 0 [ 43.7235 ] FwIndex: 31, MinRatchetLevel: 0 [ 43.7235 ] FwIndex: 32, MinRatchetLevel: 0 [ 43.7235 ] [ 43.7256 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct [ 43.7280 ] [ 43.7283 ] header_magic: c0660000 [ 43.7302 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list mb1_cold_boot_bct_MB1.bct_list.xml [ 43.7303 ] Key is a SBK key [ 43.7303 ] Key Size is 16 bytes [ 43.7307 ] 26304 [ 43.7396 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1.bct.encrypt mb1_cold_boot_bct_MB1.bct.hash zerosbk [ 43.7418 ] [ 43.7432 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct.encrypt [ 43.7443 ] [ 43.7445 ] header_magic: 50ccbde [ 43.7463 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin [ 43.7477 ] adding BCH for mb1_cold_boot_bct_MB1.bct.encrypt [ 43.7484 ] [ 43.7503 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list mb1_cold_boot_bct_MB1.bct_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 43.7527 ] K[ 43.7531 ] ey size is 256 bytes [ 43.7721 ] Saving pkc public key in pub_key.key [ 43.7735 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 43.7750 ] [ 43.7751 ] Generating recovery mb1-bct [ 43.7784 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_bct.cfg --sdram /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1.cfg --misc tegra194-mb1-bct-misc-flash.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 43.7811 ] MB1-BCT version: 0x1 [ 43.7821 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg [ 43.7834 ] Added Platform Config 0 data with size :- 2496 [ 43.7867 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 43.7871 ] Added Platform Config 1 data with size :- 19640 [ 43.8156 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg [ 43.8162 ] Added Platform Config 2 data with size :- 24 [ 43.8167 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 43.8172 ] Added Platform Config 4 data with size :- 348 [ 43.8172 ] [ 43.8172 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 43.8173 ] Added Platform Config 3 data with size :- 92 [ 43.8173 ] [ 43.8173 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 43.8173 ] Added Platform Config 5 data with size :- 128 [ 43.8173 ] [ 43.8174 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 43.8174 ] Added Platform Config 7 data with size :- 392 [ 43.8174 ] [ 43.8174 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 43.8174 ] Added Platform Config 9 data with size :- 40 [ 43.8175 ] [ 43.8175 ] Updating mb1-bct with firmware information [ 43.8204 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin [ 43.8218 ] MB1-BCT version: 0x1 [ 43.8227 ] [ 43.8227 ] Updating mb1-bct with storage information [ 43.8252 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 43.8262 ] MB1-BCT version: 0x1 [ 43.8274 ] [ 43.8274 ] Updating mb1-bct with ratchet information [ 43.8297 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 43.8307 ] MB1-BCT version: 0x1 [ 43.8309 ] FwIndex: 1, MinRatchetLevel: 0 [ 43.8317 ] FwIndex: 2, MinRatchetLevel: 0 [ 43.8318 ] FwIndex: 3, MinRatchetLevel: 0 [ 43.8318 ] FwIndex: 4, MinRatchetLevel: 0 [ 43.8318 ] FwIndex: 5, MinRatchetLevel: 0 [ 43.8318 ] FwIndex: 6, MinRatchetLevel: 0 [ 43.8318 ] FwIndex: 7, MinRatchetLevel: 0 [ 43.8318 ] FwIndex: 11, MinRatchetLevel: 0 [ 43.8318 ] FwIndex: 12, MinRatchetLevel: 0 [ 43.8318 ] FwIndex: 13, MinRatchetLevel: 0 [ 43.8318 ] FwIndex: 14, MinRatchetLevel: 0 [ 43.8318 ] FwIndex: 15, MinRatchetLevel: 0 [ 43.8318 ] FwIndex: 16, MinRatchetLevel: 0 [ 43.8319 ] FwIndex: 17, MinRatchetLevel: 0 [ 43.8319 ] FwIndex: 18, MinRatchetLevel: 0 [ 43.8319 ] FwIndex: 19, MinRatchetLevel: 0 [ 43.8319 ] FwIndex: 30, MinRatchetLevel: 0 [ 43.8319 ] FwIndex: 31, MinRatchetLevel: 0 [ 43.8319 ] FwIndex: 32, MinRatchetLevel: 0 [ 43.8319 ] [ 43.8333 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct [ 43.8345 ] [ 43.8347 ] header_magic: c0660000 [ 43.8364 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list mb1_bct_MB1.bct_list.xml [ 43.8366 ] Key is a SBK key [ 43.8367 ] Key Size is 16 bytes [ 43.8372 ] 26304 [ 43.8452 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1.bct.encrypt mb1_bct_MB1.bct.hash zerosbk [ 43.8466 ] [ 43.8480 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct.encrypt [ 43.8494 ] [ 43.8496 ] header_magic: 50ccbde [ 43.8506 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin [ 43.8516 ] adding BCH for mb1_bct_MB1.bct.encrypt [ 43.8522 ] [ 43.8541 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list mb1_bct_MB1.bct_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 43.8561 ] Key[ 43.8567 ] size is 256 bytes [ 43.8767 ] Saving pkc public key in pub_key.key [ 43.8796 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1.bct_sigheader.encrypt.signed mb1_bct_MB1.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 43.8818 ] [ 43.8820 ] Generating coldboot mem-bct [ 43.8838 ] tegrabct_v2 --chip 0x19 0 --sdram /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1.cfg --membct /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_1.bct /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_2.bct /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_3.bct /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_4.bct [ 43.8854 ] Packing sdram param for instance[0] [ 43.9351 ] Packing sdram param for instance[1] [ 43.9351 ] Packing sdram param for instance[2] [ 43.9351 ] Packing sdram param for instance[3] [ 43.9351 ] Packing sdram param for instance[4] [ 43.9352 ] Packing sdram param for instance[5] [ 43.9352 ] Packing sdram param for instance[6] [ 43.9352 ] Packing sdram param for instance[7] [ 43.9353 ] Packing sdram param for instance[8] [ 43.9353 ] Packing sdram param for instance[9] [ 43.9355 ] Packing sdram param for instance[10] [ 43.9355 ] Packing sdram param for instance[11] [ 43.9359 ] Packing sdram param for instance[12] [ 43.9359 ] Packing sdram param for instance[13] [ 43.9360 ] Packing sdram param for instance[14] [ 43.9360 ] Packing sdram param for instance[15] [ 43.9361 ] [ 43.9362 ] Getting sector size from pt [ 43.9393 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin [ 43.9405 ] [ 43.9407 ] BlockSize read from layout is 200 [ 43.9434 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --file /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_1.bct [ 43.9460 ] Key is a SBK key [ 43.9845 ] Key Size is 16 bytes [ 43.9853 ] 48352 [ 43.9935 ] [ 43.9957 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --file /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_2.bct [ 43.9967 ] Key is a SBK key [ 44.0272 ] Key Size is 16 bytes [ 44.0284 ] 48352 [ 44.0349 ] [ 44.0366 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --file /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_3.bct [ 44.0379 ] Key is a SBK key [ 44.0816 ] Key Size is 16 bytes [ 44.0822 ] 48352 [ 44.0929 ] [ 44.0962 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --file /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_4.bct [ 44.0984 ] Key is a SBK key [ 44.1334 ] Key Size is 16 bytes [ 44.1336 ] 48352 [ 44.1412 ] [ 44.1433 ] tegrahost_v2 --chip 0x19 0 --blocksize 512 --magicid MEMB --addsigheader_multi /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_1_encrypt.bct /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_2_encrypt.bct /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_3_encrypt.bct /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_4_encrypt.bct [ 44.1444 ] adding BCH for /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_1_encrypt.bct [ 44.1500 ] [ 44.1531 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 44.1545 ] [ 44.1546 ] header_magic: 4e564441 [ 44.1565 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list mem_coldboot.bct_list.xml --pubkeyhash pub_key.key [ 44.1602 ] K[ 44.1611 ] ey size is 256 bytes [ 44.1837 ] Saving pkc public key in pub_key.key [ 44.1860 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_coldboot.bct.signed mem_coldboot.bct.sig oem-rsa --pubkeyhash pub_key.key [ 44.1880 ] [ 44.1909 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 44.1943 ] [ 44.1972 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin --appendsigheader mem_coldboot.bct oem-rsa [ 44.1997 ] Header already present for mem_coldboot.bct [ 44.2006 ] [ 44.2043 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list mem_coldboot_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 44.2073 ] K[ 44.2083 ] ey size is 256 bytes [ 44.2298 ] Saving pkc public key in pub_key.key [ 44.2336 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --updatesigheader mem_coldboot_sigheader.bct.signed mem_coldboot_sigheader.bct.sig oem-rsa [ 44.2371 ] [ 44.2373 ] Generating recovery mem-bct [ 44.2404 ] tegrabct_v2 --chip 0x19 0 --sdram /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1.cfg --membct /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_1.bct /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_2.bct /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_3.bct /home/citix-ai/Linux_for_Tegra/bootloader/27461/tmp99g749bi1_4.bct [ 44.2428 ] Packing sdram param for instance[0] [ 44.3100 ] Packing sdram param for instance[1] [ 44.3114 ] Packing sdram param for instance[2] [ 44.3115 ] Packing sdram param for instance[3] [ 44.3119 ] Packing sdram param for instance[4] [ 44.3119 ] Packing sdram param for instance[5] [ 44.3120 ] Packing sdram param for instance[6] [ 44.3120 ] Packing sdram param for instance[7] [ 44.3124 ] Packing sdram param for instance[8] [ 44.3125 ] Packing sdram param for instance[9] [ 44.3126 ] Packing sdram param for instance[10] [ 44.3127 ] Packing sdram param for instance[11] [ 44.3128 ] Packing sdram param for instance[12] [ 44.3128 ] Packing sdram param for instance[13] [ 44.3129 ] Packing sdram param for instance[14] [ 44.3129 ] Packing sdram param for instance[15] [ 44.3130 ] [ 44.3163 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct [ 44.3186 ] [ 44.3189 ] header_magic: 3000000 [ 44.3222 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/skb_file.key --list mem_rcm.bct_list.xml [ 44.3226 ] Key is a SBK key [ 44.3226 ] Key Size is 16 bytes [ 44.3233 ] 48352 [ 44.3378 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm.bct.encrypt mem_rcm.bct.hash zerosbk [ 44.3407 ] [ 44.3420 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct.encrypt [ 44.3432 ] [ 44.3436 ] header_magic: 27624384 [ 44.3464 ] tegrahost_v2 --appendsigheader mem_rcm.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin [ 44.3484 ] adding BCH for mem_rcm.bct.encrypt [ 44.3505 ] [ 44.3533 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list mem_rcm.bct_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 44.3578 ] K[ 44.3587 ] ey size is 256 bytes [ 44.3822 ] Saving pkc public key in pub_key.key [ 44.3842 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm.bct_sigheader.encrypt.signed mem_rcm.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 44.3863 ] [ 44.3870 ] nvtboot_recovery_t194.bin_sigheader.encrypt.signed [ 44.3872 ] preboot_c10_prod_cr.bin [ 44.3873 ] mce_c10_prod_cr.bin [ 44.3877 ] mts_c10_prod_cr.bin [ 44.3918 ] bpmp_t194.bin [ 44.3932 ] tegra194-a02-bpmp-p3668-a00.dtb [ 44.3940 ] spe_t194.bin [ 44.3944 ] tos-trusty_t194.img [ 44.3952 ] eks.img [ 44.3955 ] tegra194-p3668-all-p3509-0000.dtb [ 44.3961 ] nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed [ 44.3981 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 44.3992 ] [ 44.3993 ] header_magic: 4e564441 [ 44.4011 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list mb1_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 44.4059 ] K[ 44.4069 ] ey size is 256 bytes [ 44.4285 ] Saving pkc public key in pub_key.key [ 44.4308 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 44.4388 ] [ 44.4428 ] tegraparser_v2 --generategpt --pt flash.xml.bin [ 44.4455 ] [ 44.4551 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /home/citix-ai/Linux_for_Tegra/bootloader/encrypted_signed_t19x/flash.xml.tmp flash.idx [ 46.1541 ] /home/citix-ai/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /home/citix-ai/Credential_Keys/rsa_priv.pem --encrypt_key /home/citix-ai/Linux_for_Tegra/.zero_.key --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign xusb_sil_rel_fw xusb_fw Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0013 ] Generating signature [ 0.0042 ] tegrasign_v3.py --getmode mode.txt --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 0.0086 ] K[ 0.0095 ] ey size is 256 bytes [ 0.0118 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /home/citix-ai/Credential_Keys/rsa_priv.pem [ 0.0141 ] K[ 0.0149 ] ey size is 256 bytes [ 0.0147 ] Generating ratchet blob [ 0.0177 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0186 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0188 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0188 ] [ 0.0189 ] header_magic: 5b0000 [ 0.0190 ] Encrypting file [ 0.0212 ] tegrahost_v2 --chip 0x19 --align 1_xusb_sil_rel_fw [ 0.0221 ] [ 0.0222 ] header_magic: 5b0000 [ 0.0263 ] tegrasign_v3.py --key /home/citix-ai/Linux_for_Tegra/.zero_.key --list 1_xusb_sil_rel_fw_list.xml [ 0.0297 ] Key is a SBK key [ 0.0297 ] Key Size is 16 bytes [ 0.0354 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_xusb_sil_rel_fw.encrypt 1_xusb_sil_rel_fw.hash zerosbk [ 0.0365 ] [ 0.0378 ] tegrahost_v2 --chip 0x19 --align 1_xusb_sil_rel_fw.encrypt [ 0.0388 ] [ 0.0390 ] header_magic: 5b0000 [ 0.0401 ] tegrahost_v2 --appendsigheader 1_xusb_sil_rel_fw.encrypt oem-rsa-sbk --chip 0x19 0 --magicid XUSB --ratchet_blob ratchet_blob.bin [ 0.0409 ] adding BCH for 1_xusb_sil_rel_fw.encrypt [ 0.0457 ] [ 0.0498 ] tegrasign_v3.py --key /home/citix-ai/Credential_Keys/rsa_priv.pem --list 1_xusb_sil_rel_fw_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.0531 ] K[ 0.0538 ] ey size is 256 bytes [ 0.0796 ] Saving pkc public key in pub_key.key [ 0.0807 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_xusb_sil_rel_fw_sigheader.encrypt.signed 1_xusb_sil_rel_fw_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.0862 ] [ 0.0866 ] Signed and encrypted file: /home/citix-ai/Linux_for_Tegra/bootloader/temp_user_dir/xusb_sil_rel_fw_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for xusb_sil_rel_fw_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x1f800 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for xusb_sil_rel_fw_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /home/citix-ai/Linux_for_Tegra/bootloader/temp_user_dir/xusb_sil_rel_fw_sigheader.encrypt.signed done. ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed --bct br_bct_BR.bct --applet rcm_2_signed.rcm --applet_softfuse rcm_1_signed.rcm --cmd "secureflash;reboot" --cfg secureflash.xml --chip 0x19 --mb1_bct mb1_bct_MB1.bct_sigheader.encrypt.signed --mem_bct mem_rcm.bct_sigheader.encrypt.signed --mb1_cold_boot_bct mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed --mem_bct_cold_boot mem_coldboot_sigheader.bct.signed --bins "mb2_bootloader nvtboot_recovery_t194.bin_sigheader.encrypt.signed; mts_preboot preboot_c10_prod_cr_sigheader.bin.encrypt.signed; mts_mce mce_c10_prod_cr_sigheader.bin.encrypt.signed; mts_proper mts_c10_prod_cr_sigheader.bin.encrypt.signed; bpmp_fw bpmp_t194_sigheader.bin.encrypt.signed; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed; spe_fw spe_t194_sigheader.bin.encrypt.signed; tlk tos-trusty_t194_sigheader.img.encrypt.signed; eks eks_sigheader.img.encrypt.signed; bootloader_dtb tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed" saving flash command in flashcmd.txt *** Flashing target device started. *** Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0112 ] Parsing partition layout [ 0.0131 ] tegraparser_v2 --pt secureflash.xml.tmp [ 0.0151 ] [ 0.0152 ] Boot Rom communication [ 0.0169 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_1_signed.rcm --rcm rcm_2_signed.rcm [ 0.0182 ] BR_CID: 0xd80219116411f187000000000d028200 [ 0.0194 ] Boot Rom communication completed [ 1.0656 ] [ 2.0715 ] tegrarcm_v2 --isapplet [ 2.0764 ] Applet version 01.00.0000 [ 2.1176 ] [ 2.1176 ] Sending BCTs [ 2.1214 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1.bct_sigheader.encrypt.signed --download bct_mem mem_rcm.bct_sigheader.encrypt.signed [ 2.1238 ] Applet version 01.00.0000 [ 2.1662 ] Sending bct_bootrom [ 2.1664 ] [................................................] 100% [ 2.1924 ] Sending bct_mb1 [ 2.2124 ] [................................................] 100% [ 2.2394 ] Sending bct_mem [ 2.3049 ] [................................................] 100% [ 2.4223 ] [ 2.4224 ] Generating blob [ 2.4251 ] tegrahost_v2 --chip 0x19 --generateblob blob.xml blob.bin [ 2.4260 ] number of images in blob are 11 [ 2.4265 ] blobsize is 6010392 [ 2.4266 ] Added binary blob_nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed of size 264064 [ 2.4308 ] Added binary blob_nvtboot_recovery_t194.bin_sigheader.encrypt.signed of size 181152 [ 2.4312 ] Added binary blob_preboot_c10_prod_cr_sigheader.bin.encrypt.signed of size 24016 [ 2.4324 ] Added binary blob_mce_c10_prod_cr_sigheader.bin.encrypt.signed of size 143200 [ 2.4338 ] Added binary blob_mts_c10_prod_cr_sigheader.bin.encrypt.signed of size 3430416 [ 2.4367 ] Added binary blob_bpmp_t194_sigheader.bin.encrypt.signed of size 856352 [ 2.4380 ] Added binary blob_tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed of size 391616 [ 2.4398 ] Added binary blob_spe_t194_sigheader.bin.encrypt.signed of size 94960 [ 2.4409 ] Added binary blob_tos-trusty_t194_sigheader.img.encrypt.signed of size 410560 [ 2.4420 ] Added binary blob_eks_sigheader.img.encrypt.signed of size 5136 [ 2.4430 ] Added binary blob_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed of size 208736 [ 2.4454 ] [ 2.4456 ] Sending bootloader and pre-requisite binaries [ 2.4492 ] tegrarcm_v2 --download blob blob.bin [ 2.4505 ] Applet version 01.00.0000 [ 2.4903 ] Sending blob [ 2.4904 ] [................................................] 100% [ 3.7195 ] [ 3.7221 ] tegrarcm_v2 --boot recovery [ 3.7233 ] Applet version 01.00.0000 [ 3.7830 ] [ 4.7857 ] tegrarcm_v2 --isapplet [ 5.2952 ] [ 5.2969 ] tegrarcm_v2 --ismb2 [ 5.3388 ] [ 5.3421 ] tegradevflash_v2 --iscpubl [ 5.3432 ] Bootloader version 01.00.0000 [ 5.3878 ] Bootloader version 01.00.0000 [ 5.4264 ] [ 5.4264 ] Retrieving storage infomation [ 5.4293 ] tegrarcm_v2 --oem platformdetails storage storage_info.bin [ 5.4303 ] Applet is not running on device. Continue with Bootloader [ 5.5141 ] [ 5.5178 ] tegradevflash_v2 --oem platformdetails storage storage_info.bin [ 5.5199 ] Bootloader version 01.00.0000 [ 5.5631 ] Saved platform info in storage_info.bin [ 5.6041 ] [ 5.6042 ] Flashing the device [ 5.6058 ] tegraparser_v2 --storageinfo storage_info.bin --generategpt --pt secureflash.xml.bin [ 5.6083 ] [ 5.6113 ] tegradevflash_v2 --pt secureflash.xml.bin --create [ 5.6134 ] Bootloader version 01.00.0000 [ 5.6520 ] Erasing spi: 0 ......... [Done] [ 66.6894 ] Writing partition secondary_gpt with gpt_secondary_3_0.bin [ 66.6917 ] [................................................] 100% [ 66.8469 ] Erasing sdmmc_user: 3 ......... [Done] [ 67.4758 ] Writing partition master_boot_record with mbr_1_3.bin [ 67.4764 ] [................................................] 100% [ 67.4989 ] Writing partition primary_gpt with gpt_primary_1_3.bin [ 67.5203 ] [................................................] 100% [ 67.5470 ] Writing partition secondary_gpt with gpt_secondary_1_3.bin [ 67.5810 ] [................................................] 100% [ 67.6395 ] Writing partition mb1 with mb1_t194_prod_sigheader.bin.encrypt.signed [ 67.6408 ] [................................................] 100% [ 67.6819 ] Writing partition mb1_b with mb1_t194_prod_sigheader.bin.encrypt.signed [ 69.2952 ] [................................................] 100% [ 69.3352 ] Writing partition spe-fw with spe_t194_sigheader.bin.encrypt.signed [ 70.9481 ] [................................................] 100% [ 70.9811 ] Writing partition spe-fw_b with spe_t194_sigheader.bin.encrypt.signed [ 71.6071 ] [................................................] 100% [ 71.6376 ] Writing partition mb2 with nvtboot_t194_sigheader.bin.encrypt.signed [ 72.2708 ] [................................................] 100% [ 72.3084 ] Writing partition mb2_b with nvtboot_t194_sigheader.bin.encrypt.signed [ 73.4816 ] [................................................] 100% [ 73.5187 ] Writing partition mts-preboot with preboot_c10_prod_cr_sigheader.bin.encrypt.signed [ 74.6935 ] [................................................] 100% [ 74.7163 ] Writing partition mts-preboot_b with preboot_c10_prod_cr_sigheader.bin.encrypt.signed [ 74.8942 ] [................................................] 100% [ 74.9206 ] Writing partition mts-mce with mce_c10_prod_cr_sigheader.bin.encrypt.signed [ 75.1002 ] [................................................] 100% [ 75.1331 ] Writing partition mts-mce_b with mce_c10_prod_cr_sigheader.bin.encrypt.signed [ 76.0632 ] [................................................] 100% [ 76.0979 ] Writing partition mts-proper with mts_c10_prod_cr_sigheader.bin.encrypt.signed [ 77.0293 ] [................................................] 100% [ 97.1706 ] Writing partition mts-proper_b with mts_c10_prod_cr_sigheader.bin.encrypt.signed [ 98.9928 ] [................................................] 100% [ 119.1665 ] Writing partition sc7 with warmboot_t194_prod_sigheader.bin.encrypt.signed [ 120.9864 ] [................................................] 100% [ 121.0136 ] Writing partition sc7_b with warmboot_t194_prod_sigheader.bin.encrypt.signed [ 121.4551 ] [................................................] 100% [ 121.4823 ] Writing partition SMD with slot_metadata.bin [ 121.9198 ] [................................................] 100% [ 121.9424 ] Writing partition SMD_b with slot_metadata.bin [ 121.9679 ] [................................................] 100% [ 121.9929 ] Writing partition xusb-fw with xusb_sil_rel_fw_sigheader.encrypt.signed [ 122.0149 ] [................................................] 100% [ 122.0483 ] Writing partition xusb-fw_b with xusb_sil_rel_fw_sigheader.encrypt.signed [ 122.9073 ] [................................................] 100% [ 122.9397 ] Writing partition cpu-bootloader with cboot_t194_sigheader.bin.encrypt.signed [ 123.8002 ] [................................................] 100% [ 123.8600 ] Writing partition cpu-bootloader_b with cboot_t194_sigheader.bin.encrypt.signed [ 126.8558 ] [................................................] 100% [ 126.9208 ] Writing partition bootloader-dtb with tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed [ 129.9166 ] [................................................] 100% [ 129.9559 ] Writing partition bootloader-dtb_b with tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed [ 131.2984 ] [................................................] 100% [ 131.3333 ] Writing partition BMP with bmp.blob [ 132.6740 ] [................................................] 100% [ 132.7095 ] Writing partition BMP_b with bmp.blob [ 133.6804 ] [................................................] 100% [ 133.7171 ] Writing partition secure-os with tos-trusty_t194_sigheader.img.encrypt.signed [ 134.6871 ] [................................................] 100% [ 134.7423 ] Writing partition secure-os_b with tos-trusty_t194_sigheader.img.encrypt.signed [ 137.3519 ] [................................................] 100% [ 137.4047 ] Writing partition eks with eks_sigheader.img.encrypt.signed [ 140.0129 ] [................................................] 100% [ 140.0354 ] Writing partition eks_b with eks_sigheader.img.encrypt.signed [ 140.0994 ] [................................................] 100% [ 140.1214 ] Writing partition adsp-fw with adsp-fw_sigheader.bin.encrypt.signed [ 140.1822 ] [................................................] 100% [ 140.2113 ] Writing partition adsp-fw_b with adsp-fw_sigheader.bin.encrypt.signed [ 140.7496 ] [................................................] 100% [ 140.7774 ] Writing partition rce-fw with camera-rtcpu-rce_sigheader.img.encrypt.signed [ 141.3156 ] [................................................] 100% [ 141.3569 ] Writing partition rce-fw_b with camera-rtcpu-rce_sigheader.img.encrypt.signed [ 143.0972 ] [................................................] 100% [ 143.1397 ] Writing partition bpmp-fw with bpmp_t194_sigheader.bin.encrypt.signed [ 144.8802 ] [................................................] 100% [ 144.9691 ] Writing partition bpmp-fw_b with bpmp_t194_sigheader.bin.encrypt.signed [ 150.3834 ] [................................................] 100% [ 150.4740 ] Writing partition bpmp-fw-dtb with tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed [ 155.8876 ] [................................................] 100% [ 155.9402 ] Writing partition bpmp-fw-dtb_b with tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed [ 158.4294 ] [................................................] 100% [ 158.4811 ] Writing partition VER with qspi_bootblob_ver.txt [ 160.9725 ] [................................................] 100% [ 160.9963 ] Writing partition VER_b with qspi_bootblob_ver.txt [ 161.0200 ] [................................................] 100% [ 161.0446 ] Writing partition master_boot_record with mbr_1_3.bin [ 161.0689 ] [................................................] 100% [ 161.0921 ] Writing partition APP with system.img [ 161.1142 ] [................................................] 100% [ 697.0942 ] Writing partition kernel with boot_sigheader.img.encrypt.signed [ 697.1654 ] [................................................] 100% [ 701.7464 ] Writing partition kernel_b with boot_sigheader.img.encrypt.signed [ 701.7813 ] [................................................] 100% [ 706.4069 ] Writing partition kernel-dtb with kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed [ 706.4400 ] [................................................] 100% [ 706.4838 ] Writing partition kernel-dtb_b with kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed [ 706.5216 ] [................................................] 100% [ 706.5557 ] Writing partition recovery with recovery_sigheader.img.encrypt.signed [ 706.5927 ] [................................................] 100% [ 711.9380 ] Writing partition recovery-dtb with tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt.signed [ 711.9619 ] [................................................] 100% [ 712.0056 ] Writing partition kernel-bootctrl with kernel_bootctrl.bin [ 712.0438 ] [................................................] 100% [ 712.0691 ] Writing partition kernel-bootctrl_b with kernel_bootctrl.bin [ 712.0979 ] [................................................] 100% [ 712.1486 ] [ 712.1544 ] tegradevflash_v2 --write BCT br_bct_BR.bct [ 712.1566 ] Bootloader version 01.00.0000 [ 712.1971 ] Writing partition BCT with br_bct_BR.bct [ 712.1983 ] [................................................] 100% [ 712.3802 ] [ 712.3908 ] tegradevflash_v2 --write MB1_BCT mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed [ 712.3926 ] Bootloader version 01.00.0000 [ 712.4328 ] Writing partition MB1_BCT with mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed [ 712.4350 ] [................................................] 100% [ 712.6783 ] [ 712.6820 ] tegradevflash_v2 --write MB1_BCT_b mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed [ 712.6840 ] Bootloader version 01.00.0000 [ 712.7253 ] Writing partition MB1_BCT_b with mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed [ 712.7263 ] [................................................] 100% [ 712.9686 ] [ 712.9725 ] tegradevflash_v2 --write MEM_BCT mem_coldboot_sigheader.bct.signed [ 712.9734 ] Bootloader version 01.00.0000 [ 713.0156 ] Writing partition MEM_BCT with mem_coldboot_sigheader.bct.signed [ 713.0170 ] [................................................] 100% [ 714.3386 ] [ 714.3430 ] tegradevflash_v2 --write MEM_BCT_b mem_coldboot_sigheader.bct.signed [ 714.3457 ] Bootloader version 01.00.0000 [ 714.3889 ] Writing partition MEM_BCT_b with mem_coldboot_sigheader.bct.signed [ 714.3898 ] [................................................] 100% [ 715.6983 ] [ 715.6985 ] Flashing completed [ 715.6987 ] Coldbooting the device [ 715.7116 ] tegrarcm_v2 --ismb2 [ 715.7603 ] [ 715.7642 ] tegradevflash_v2 --reboot coldboot [ 715.7669 ] Bootloader version 01.00.0000 [ 715.8290 ]