Bus 001 Device 016: ID 0955:7e19 NVidia Corp. Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 002 Device 004: ID 0e0f:0008 VMware, Inc. Bus 002 Device 003: ID 0e0f:0002 VMware, Inc. Virtual USB Hub Bus 002 Device 002: ID 0e0f:0003 VMware, Inc. Virtual Mouse Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub [developer-vmware] ~/Floyd_SW/Linux_for_Tegra > lsusb Bus 001 Device 017: ID 0955:7e19 NVidia Corp. Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 002 Device 004: ID 0e0f:0008 VMware, Inc. Bus 002 Device 003: ID 0e0f:0002 VMware, Inc. Virtual USB Hub Bus 002 Device 002: ID 0e0f:0003 VMware, Inc. Virtual Mouse Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub [developer-vmware] ~/Floyd_SW/Linux_for_Tegra > sudo ./flash.sh jetson-xavier-nx-devkit-emmc mmcblk0p1 [sudo] password for developer: Sorry, try again. [sudo] password for developer: ############################################################################### # L4T BSP Information: # R32 , REVISION: 4.3 ############################################################################### # Target Board Information: # Name: jetson-xavier-nx-devkit-emmc, Board Family: t186ref, SoC: Tegra 194, # OpMode: production, Boot Authentication: NS, ############################################################################### copying soft_fuses(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. ./tegraflash.py --chip 0x19 --applet "/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/mb1_t194_prod.bin" --skipuid --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --bins "mb2_applet nvtboot_applet_t194.bin" --cmd "dump eeprom boardinfo cvm.bin;reboot recovery" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0134 ] Generating RCM messages [ 0.0144 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/mb1_t194_prod.bin zerosbk [ 0.0151 ] Header already present for /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/mb1_t194_prod.bin [ 0.0176 ] [ 0.0186 ] tegrasign_v2 --key None --getmode mode.txt [ 0.0199 ] Assuming zero filled SBK key [ 0.0199 ] [ 0.0216 ] tegrasign_v2 --key None --file /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.bin --offset 2960 --length 1136 --pubkeyhash pub_key.key [ 0.0224 ] Assuming zero filled SBK key [ 0.0234 ] [ 0.0245 ] tegrahost_v2 --chip 0x19 0 --updatesigheader /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.bin /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.hash zerosbk [ 0.0283 ] [ 0.0295 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg.pdf sfuse.bin [ 0.0303 ] [ 0.0312 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.bin 0 0 [ 0.0320 ] RCM 0 is saved as rcm_0.rcm [ 0.0344 ] RCM 1 is saved as rcm_1.rcm [ 0.0344 ] RCM 2 is saved as rcm_2.rcm [ 0.0344 ] List of rcm files are saved in rcm_list.xml [ 0.0344 ] [ 0.0344 ] Signing RCM messages [ 0.0353 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 0.0361 ] Assuming zero filled SBK key [ 0.0366 ] [ 0.0366 ] Copying signature to RCM mesages [ 0.0376 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml [ 0.0396 ] [ 0.0397 ] Boot Rom communication [ 0.0406 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_list_signed.xml --skipuid [ 0.0418 ] RCM version 0X190001 [ 0.0448 ] Boot Rom communication completed [ 1.0884 ] [ 2.0917 ] tegrarcm_v2 --isapplet [ 2.0927 ] Applet version 01.00.0000 [ 2.1497 ] [ 2.1509 ] tegrarcm_v2 --ismb2 [ 2.2071 ] [ 2.2082 ] tegrahost_v2 --chip 0x19 --align nvtboot_applet_t194.bin [ 2.2092 ] [ 2.2100 ] tegrahost_v2 --chip 0x19 0 --magicid PLDT --appendsigheader nvtboot_applet_t194.bin zerosbk [ 2.2109 ] adding BCH for nvtboot_applet_t194.bin [ 2.2129 ] [ 2.2141 ] tegrasign_v2 --key None --list nvtboot_applet_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 2.2150 ] Assuming zero filled SBK key [ 2.2152 ] [ 2.2168 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_applet_t194_sigheader.bin.encrypt nvtboot_applet_t194_sigheader.bin.hash zerosbk [ 2.2192 ] [ 2.2203 ] tegrarcm_v2 --download mb2 nvtboot_applet_t194_sigheader.bin.encrypt [ 2.2214 ] Applet version 01.00.0000 [ 2.2789 ] Sending mb2 [ 2.2790 ] [................................................] 100% [ 2.3517 ] [ 2.3528 ] tegrarcm_v2 --boot recovery [ 2.3537 ] Applet version 01.00.0000 [ 2.4380 ] [ 3.4414 ] tegrarcm_v2 --isapplet [ 3.5004 ] [ 3.5019 ] tegrarcm_v2 --ismb2 [ 3.5029 ] MB2 Applet version 01.00.0000 [ 3.5631 ] [ 3.5642 ] tegrarcm_v2 --ismb2 [ 3.5651 ] MB2 Applet version 01.00.0000 [ 3.6251 ] [ 3.6264 ] Retrieving EEPROM data [ 3.6265 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/cvm.bin [ 3.6276 ] MB2 Applet version 01.00.0000 [ 3.7461 ] Saved platform info in /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/cvm.bin [ 3.8423 ] [ 3.8424 ] Rebooting to recovery mode [ 3.8435 ] tegrarcm_v2 --ismb2 [ 3.8445 ] MB2 Applet version 01.00.0000 [ 3.9014 ] [ 3.9014 ] Rebooting to recovery mode [ 3.9024 ] tegrarcm_v2 --reboot recovery [ 3.9033 ] MB2 Applet version 01.00.0000 [ 4.0444 ] Board ID(3668) version(200) sku(0000) revision(J.0) copying bctfile(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg)... done. copying bctfile1(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-memcfg-sw-override.cfg)... done. copying device_config(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-bct-device-qspi-p3668.cfg)... done. copying misc_cold_boot_config(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-l4t.cfg)... done. copying misc_config(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-flash.cfg)... done. copying pinmux_config(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-pinmux-p3668-a01.cfg)... done. copying gpioint_config(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg)... done. copying pmic_config(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-pmic-p3668-0001-a00.cfg)... done. copying pmc_config(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-padvoltage-p3668-a01.cfg)... done. copying prod_config(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-prod-p3668-0001-a00.cfg)... done. copying scr_config(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying scr_cold_boot_config(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying bootrom_config(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-reset-p3668-0001-a00.cfg)... done. copying dev_params(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-br-bct-qspi.cfg)... done. Existing bootloader(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. copying initrd(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/l4t_initrd.img)... done. populating kernel to rootfs... done. Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0029 ] Generating signature [ 0.0040 ] tegrasign_v2 --key --getmode mode.txt [ 0.0049 ] Assuming zero filled SBK key [ 0.0049 ] [ 0.0049 ] header_magic: 805514 [ 0.0060 ] tegrahost_v2 --chip 0x19 --align 1_Image [ 0.0070 ] [ 0.0078 ] tegrahost_v2 --chip 0x19 0 --magicid DATA --appendsigheader 1_Image zerosbk [ 0.0087 ] adding BCH for 1_Image [ 0.6416 ] [ 0.6431 ] tegrasign_v2 --key --list 1_Image_sigheader_list.xml --pubkeyhash pub_key.key [ 0.6440 ] Assuming zero filled SBK key [ 0.6772 ] [ 0.6790 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_Image_sigheader.encrypt 1_Image_sigheader.hash zerosbk [ 1.0394 ] [ 1.0697 ] Signed file: /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/Image_sigheader.encrypt Generate header for Image_sigheader.encrypt Generate 16-byte-size-aligned base file for Image_sigheader.encrypt Remove temporary file done. populating initrd to rootfs... done. populating /home/developer/Floyd_SW/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb to rootfs... done. Making Boot image... done. Existing sosfile(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing tegraboot(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/nvtboot_t194.bin) reused. Existing cpu_bootloader(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. Existing mb2blfile(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/nvtboot_recovery_t194.bin) reused. Existing mtspreboot(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/preboot_c10_prod_cr.bin) reused. Existing mcepreboot(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/mce_c10_prod_cr.bin) reused. Existing mtsproper(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/mts_c10_prod_cr.bin) reused. Existing mb1file(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing bpffile(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/bpmp_t194.bin) reused. copying bpfdtbfile(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/tegra194-a02-bpmp-p3668-a00.dtb)... done. Existing scefile(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. Existing camerafw(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/camera-rtcpu-rce.img) reused. Existing spefile(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/spe_t194.bin) reused. Existing drameccfile(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/dram-ecc.bin) reused. Existing badpagefile(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/badpage.bin) reused. Existing wb0boot(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/warmboot_t194_prod.bin) reused. Existing tosfile(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/tos-trusty_t194.img) reused. Existing eksfile(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/eks.img) reused. copying soft_fuses(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. copying dtbfile(/home/developer/Floyd_SW/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb)... done. Copying nv_boot_control.conf to rootfs Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0031 ] Generating signature [ 0.0042 ] tegrasign_v2 --key --getmode mode.txt [ 0.0054 ] Assuming zero filled SBK key [ 0.0054 ] [ 0.0055 ] header_magic: d00dfeed [ 0.0064 ] tegrahost_v2 --chip 0x19 --align 1_tegra194-p3668-all-p3509-0000.dtb [ 0.0074 ] [ 0.0085 ] tegrahost_v2 --chip 0x19 0 --magicid DATA --appendsigheader 1_tegra194-p3668-all-p3509-0000.dtb zerosbk [ 0.0094 ] adding BCH for 1_tegra194-p3668-all-p3509-0000.dtb [ 0.0134 ] [ 0.0146 ] tegrasign_v2 --key --list 1_tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 0.0157 ] Assuming zero filled SBK key [ 0.0174 ] [ 0.0193 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt 1_tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 0.0232 ] [ 0.0239 ] Signed file: /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt Generate header for tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt Generate 16-byte-size-aligned base file for tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt Remove temporary file done. Making system.img... populating rootfs from /home/developer/Floyd_SW/Linux_for_Tegra/rootfs ... done. populating /boot/extlinux/extlinux.conf ... done. Sync'ing system.img ... done. Converting RAW image to Sparse image... done. system.img built successfully. Existing tbcfile(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/cboot_t194.bin) reused. copying tbcdtbfile(/home/developer/Floyd_SW/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb)... done. copying cfgfile(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t194_spi_emmc_p3668.xml) to flash.xml... done. Existing flasher(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu_t194.bin) reused. Existing flashapp(/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/tegraflash.py) reused. ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin --sdram_config tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg,tegra194-memcfg-sw-override.cfg --odmdata 0xB8190000 --applet mb1_t194_prod.bin --cmd "flash; reboot" --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --cfg flash.xml --chip 0x19 --device_config tegra19x-mb1-bct-device-qspi-p3668.cfg --misc_cold_boot_config tegra194-mb1-bct-misc-l4t.cfg --misc_config tegra194-mb1-bct-misc-flash.cfg --pinmux_config tegra19x-mb1-pinmux-p3668-a01.cfg --gpioint_config tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --pmic_config tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --pmc_config tegra19x-mb1-padvoltage-p3668-a01.cfg --prod_config tegra19x-mb1-prod-p3668-0001-a00.cfg --scr_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --scr_cold_boot_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --br_cmd_config tegra194-mb1-bct-reset-p3668-0001-a00.cfg --dev_params tegra194-br-bct-qspi.cfg --bin "mb2_bootloader nvtboot_recovery_t194.bin; mts_preboot preboot_c10_prod_cr.bin; mts_mce mce_c10_prod_cr.bin; mts_proper mts_c10_prod_cr.bin; bpmp_fw bpmp_t194.bin; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00.dtb; spe_fw spe_t194.bin; tlk tos-trusty_t194.img; eks eks.img; bootloader_dtb tegra194-p3668-all-p3509-0000.dtb" saving flash command in /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/flashcmd.txt saving Windows flash command to /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/flash_win.bat *** Flashing target device started. *** Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0010 ] tegrasign_v2 --key None --getmode mode.txt [ 0.0020 ] Assuming zero filled SBK key [ 0.0021 ] [ 0.0022 ] Generating RCM messages [ 0.0030 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod.bin zerosbk [ 0.0038 ] Header already present for mb1_t194_prod.bin [ 0.0077 ] [ 0.0087 ] tegrasign_v2 --key None --getmode mode.txt [ 0.0096 ] Assuming zero filled SBK key [ 0.0099 ] [ 0.0108 ] tegrasign_v2 --key None --file mb1_t194_prod_sigheader.bin --offset 2960 --length 1136 --pubkeyhash pub_key.key [ 0.0120 ] Assuming zero filled SBK key [ 0.0126 ] [ 0.0136 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin mb1_t194_prod_sigheader.hash zerosbk [ 0.0184 ] [ 0.0198 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg sfuse.bin [ 0.0214 ] [ 0.0228 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_sigheader.bin 0 0 [ 0.0242 ] RCM 0 is saved as rcm_0.rcm [ 0.0271 ] RCM 1 is saved as rcm_1.rcm [ 0.0271 ] RCM 2 is saved as rcm_2.rcm [ 0.0271 ] List of rcm files are saved in rcm_list.xml [ 0.0271 ] [ 0.0272 ] Signing RCM messages [ 0.0282 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 0.0292 ] Assuming zero filled SBK key [ 0.0300 ] [ 0.0300 ] Copying signature to RCM mesages [ 0.0317 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml [ 0.0335 ] [ 0.0335 ] Parsing partition layout [ 0.0347 ] tegraparser_v2 --pt flash.xml.tmp [ 0.0367 ] [ 0.0369 ] Creating list of images to be signed [ 0.0385 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk [ 0.0395 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.0398 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.0406 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.0434 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.0444 ] adding BCH for spe_t194.bin [ 0.0554 ] adding BCH for spe_t194.bin [ 0.0571 ] adding BCH for nvtboot_t194.bin [ 0.0590 ] adding BCH for nvtboot_t194.bin [ 0.0623 ] Header already present for preboot_c10_prod_cr.bin [ 0.0660 ] Header already present for preboot_c10_prod_cr.bin [ 0.0663 ] Header already present for mce_c10_prod_cr.bin [ 0.0675 ] Header already present for mce_c10_prod_cr.bin [ 0.0679 ] adding BCH for mts_c10_prod_cr.bin [ 0.0723 ] adding BCH for mts_c10_prod_cr.bin [ 0.1360 ] Header already present for warmboot_t194_prod.bin [ 0.1996 ] Header already present for warmboot_t194_prod.bin [ 0.2002 ] adding BCH for cboot_t194.bin [ 0.2009 ] adding BCH for cboot_t194.bin [ 0.2085 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb [ 0.2170 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb [ 0.2209 ] adding BCH for tos-trusty_t194.img [ 0.2246 ] adding BCH for tos-trusty_t194.img [ 0.2313 ] adding BCH for eks.img [ 0.2459 ] adding BCH for eks.img [ 0.2461 ] adding BCH for adsp-fw.bin [ 0.2462 ] adding BCH for adsp-fw.bin [ 0.2480 ] adding BCH for camera-rtcpu-rce.img [ 0.2503 ] adding BCH for camera-rtcpu-rce.img [ 0.2549 ] adding BCH for bpmp_t194.bin [ 0.2603 ] adding BCH for bpmp_t194.bin [ 0.2774 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 0.2950 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 0.2985 ] adding BCH for boot.img [ 0.3203 ] adding BCH for boot.img [ 1.0910 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb [ 1.8432 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb [ 1.8508 ] [ 1.8509 ] Filling MB1 storage info [ 1.8509 ] Generating br-bct [ 1.8518 ] Performing cfg overlay [ 1.8519 ] ['tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg', 'tegra194-memcfg-sw-override.cfg'] [ 1.8525 ] sw_memcfg_overlay.pl -c tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg -s tegra194-memcfg-sw-override.cfg -o /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1.cfg [ 1.8753 ] [ 1.8755 ] Updating dev and MSS params in BR BCT [ 1.8755 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 1.8915 ] [ 1.8915 ] Updating bl info [ 1.8930 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 1.8955 ] [ 1.8956 ] Generating signatures [ 1.8966 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key [ 1.8975 ] Assuming zero filled SBK key [ 2.0327 ] [ 2.0327 ] Generating br-bct [ 2.0337 ] Performing cfg overlay [ 2.0337 ] ['/home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1.cfg'] [ 2.0337 ] Updating dev and MSS params in BR BCT [ 2.0338 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 2.0492 ] [ 2.0492 ] Updating bl info [ 2.0507 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 2.0555 ] [ 2.0556 ] Updating smd info [ 2.0567 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 --updatesmdinfo flash.xml.bin [ 2.0580 ] [ 2.0580 ] Updating Odmdata [ 2.0590 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0xB8190000 [ 2.0606 ] [ 2.0607 ] Get Signed section of bct [ 2.0616 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listbct bct_list.xml [ 2.0629 ] [ 2.0640 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 2.0649 ] Assuming zero filled SBK key [ 2.0649 ] [ 2.0649 ] Updating BCT with signature [ 2.0657 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml [ 2.0684 ] [ 2.0685 ] Generating coldboot mb1-bct [ 2.0696 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_cold_boot_bct.cfg --sdram /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1.cfg --misc tegra194-mb1-bct-misc-l4t.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 2.0713 ] MB1-BCT version: 0x1 [ 2.0714 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg [ 2.0717 ] Added Platform Config 0 data with size :- 2512 [ 2.0729 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 2.0738 ] Added Platform Config 1 data with size :- 19640 [ 2.0837 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg [ 2.0839 ] Added Platform Config 2 data with size :- 24 [ 2.0845 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 2.0849 ] Added Platform Config 4 data with size :- 348 [ 2.0849 ] [ 2.0849 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 2.0849 ] Added Platform Config 3 data with size :- 92 [ 2.0849 ] [ 2.0849 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 2.0849 ] Added Platform Config 5 data with size :- 128 [ 2.0849 ] [ 2.0849 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 2.0849 ] Added Platform Config 7 data with size :- 392 [ 2.0849 ] [ 2.0849 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 2.0849 ] Added Platform Config 9 data with size :- 40 [ 2.0849 ] [ 2.0850 ] Updating mb1-bct with firmware information [ 2.0859 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 2.0870 ] MB1-BCT version: 0x1 [ 2.0880 ] [ 2.0880 ] Updating mb1-bct with storage information [ 2.0889 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 2.0902 ] MB1-BCT version: 0x1 [ 2.0906 ] [ 2.0918 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct [ 2.0927 ] [ 2.0935 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk [ 2.0950 ] adding BCH for mb1_cold_boot_bct_MB1.bct [ 2.0958 ] [ 2.0974 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 2.0982 ] Assuming zero filled SBK key [ 2.0984 ] [ 2.1000 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk [ 2.1020 ] [ 2.1021 ] Generating recovery mb1-bct [ 2.1032 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_bct.cfg --sdram /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1.cfg --misc tegra194-mb1-bct-misc-flash.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 2.1043 ] MB1-BCT version: 0x1 [ 2.1049 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg [ 2.1051 ] Added Platform Config 0 data with size :- 2512 [ 2.1058 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 2.1061 ] Added Platform Config 1 data with size :- 19640 [ 2.1155 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg [ 2.1157 ] Added Platform Config 2 data with size :- 24 [ 2.1164 ] [ 2.1164 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 2.1164 ] Added Platform Config 4 data with size :- 348 [ 2.1164 ] [ 2.1164 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 2.1164 ] Added Platform Config 3 data with size :- 92 [ 2.1164 ] [ 2.1164 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 2.1164 ] Added Platform Config 5 data with size :- 128 [ 2.1164 ] [ 2.1164 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 2.1164 ] Added Platform Config 7 data with size :- 392 [ 2.1164 ] [ 2.1164 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 2.1164 ] Added Platform Config 9 data with size :- 40 [ 2.1164 ] [ 2.1164 ] Updating mb1-bct with firmware information [ 2.1175 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin [ 2.1186 ] MB1-BCT version: 0x1 [ 2.1195 ] [ 2.1195 ] Updating mb1-bct with storage information [ 2.1206 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 2.1216 ] MB1-BCT version: 0x1 [ 2.1222 ] [ 2.1234 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct [ 2.1244 ] [ 2.1255 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --appendsigheader mb1_bct_MB1.bct zerosbk [ 2.1265 ] adding BCH for mb1_bct_MB1.bct [ 2.1273 ] [ 2.1290 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 2.1313 ] Assuming zero filled SBK key [ 2.1317 ] [ 2.1335 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk [ 2.1354 ] [ 2.1355 ] Generating coldboot mem-bct [ 2.1372 ] tegrabct_v2 --chip 0x19 0 --sdram /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1.cfg --membct /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1_1.bct /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1_2.bct /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1_3.bct /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1_4.bct [ 2.1383 ] Packing sdram param for instance[0] [ 2.1529 ] Packing sdram param for instance[1] [ 2.1530 ] Packing sdram param for instance[2] [ 2.1530 ] Packing sdram param for instance[3] [ 2.1530 ] Packing sdram param for instance[4] [ 2.1530 ] Packing sdram param for instance[5] [ 2.1530 ] Packing sdram param for instance[6] [ 2.1530 ] Packing sdram param for instance[7] [ 2.1530 ] Packing sdram param for instance[8] [ 2.1530 ] Packing sdram param for instance[9] [ 2.1530 ] Packing sdram param for instance[10] [ 2.1530 ] Packing sdram param for instance[11] [ 2.1530 ] Packing sdram param for instance[12] [ 2.1530 ] Packing sdram param for instance[13] [ 2.1530 ] Packing sdram param for instance[14] [ 2.1530 ] Packing sdram param for instance[15] [ 2.1530 ] [ 2.1530 ] Getting sector size from pt [ 2.1542 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin [ 2.1554 ] [ 2.1556 ] BlockSize read from layout is 200 [ 2.1571 ] tegrahost_v2 --chip 0x19 0 --blocksize 512 --magicid MEMB --addsigheader_multi /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1_1.bct /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1_2.bct /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1_3.bct /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1_4.bct [ 2.1583 ] adding BCH for /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1_1.bct [ 2.1606 ] [ 2.1623 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 2.1636 ] [ 2.1646 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --appendsigheader mem_coldboot.bct zerosbk [ 2.1656 ] Header already present for mem_coldboot.bct [ 2.1657 ] [ 2.1667 ] tegrasign_v2 --key None --list mem_coldboot_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 2.1678 ] Assuming zero filled SBK key [ 2.1679 ] [ 2.1701 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_coldboot_sigheader.bct.encrypt mem_coldboot_sigheader.bct.hash zerosbk [ 2.1717 ] [ 2.1718 ] Generating recovery mem-bct [ 2.1727 ] tegrabct_v2 --chip 0x19 0 --sdram /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1.cfg --membct /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1_1.bct /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1_2.bct /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1_3.bct /home/developer/Floyd_SW/Linux_for_Tegra/bootloader/7402/tmpiECceT1_4.bct [ 2.1736 ] Packing sdram param for instance[0] [ 2.1880 ] Packing sdram param for instance[1] [ 2.1883 ] Packing sdram param for instance[2] [ 2.1890 ] Packing sdram param for instance[3] [ 2.1890 ] Packing sdram param for instance[4] [ 2.1890 ] Packing sdram param for instance[5] [ 2.1890 ] Packing sdram param for instance[6] [ 2.1890 ] Packing sdram param for instance[7] [ 2.1890 ] Packing sdram param for instance[8] [ 2.1891 ] Packing sdram param for instance[9] [ 2.1891 ] Packing sdram param for instance[10] [ 2.1891 ] Packing sdram param for instance[11] [ 2.1891 ] Packing sdram param for instance[12] [ 2.1891 ] Packing sdram param for instance[13] [ 2.1891 ] Packing sdram param for instance[14] [ 2.1891 ] Packing sdram param for instance[15] [ 2.1891 ] [ 2.1906 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct [ 2.1918 ] [ 2.1930 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --appendsigheader mem_rcm.bct zerosbk [ 2.1941 ] adding BCH for mem_rcm.bct [ 2.1958 ] [ 2.1970 ] tegrasign_v2 --key None --list mem_rcm_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 2.1979 ] Assuming zero filled SBK key [ 2.1981 ] [ 2.1993 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm_sigheader.bct.encrypt mem_rcm_sigheader.bct.hash zerosbk [ 2.2018 ] [ 2.2019 ] Copying signatures [ 2.2028 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml [ 3.2305 ] [ 3.2306 ] Boot Rom communication [ 3.2316 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_list_signed.xml [ 3.2323 ] BR_CID: 0x88021911647147031400000013048180 [ 3.2333 ] RCM version 0X190001 [ 3.2361 ] Boot Rom communication completed [ 4.2813 ] [ 5.2840 ] tegrarcm_v2 --isapplet [ 5.2848 ] Applet version 01.00.0000 [ 5.7955 ] [ 5.7955 ] Sending BCTs [ 5.7967 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt --download bct_mem mem_rcm_sigheader.bct.encrypt [ 5.7976 ] Applet version 01.00.0000 [ 5.9250 ] Sending bct_bootrom [ 5.9251 ] [................................................] 100% [ 5.9848 ] Sending bct_mb1 [ 6.0279 ] [................................................] 100% [ 6.0800 ] Sending bct_mem [ 6.2916 ] [................................................] 100% [ 6.4426 ] [ 6.4426 ] Generating blob [ 6.4439 ] tegrahost_v2 --chip 0x19 --align blob_nvtboot_recovery_cpu_t194.bin [ 6.4449 ] [ 6.4458 ] tegrahost_v2 --chip 0x19 0 --magicid CPBL --appendsigheader blob_nvtboot_recovery_cpu_t194.bin zerosbk [ 6.4468 ] adding BCH for blob_nvtboot_recovery_cpu_t194.bin [ 6.4522 ] [ 6.4542 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 6.4552 ] Assuming zero filled SBK key [ 6.4557 ] [ 6.4571 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_nvtboot_recovery_cpu_t194_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_t194_sigheader.bin.hash zerosbk [ 6.4621 ] [ 6.4636 ] tegrahost_v2 --chip 0x19 --align blob_nvtboot_recovery_t194.bin [ 6.4657 ] [ 6.4668 ] tegrahost_v2 --chip 0x19 0 --magicid MB2B --appendsigheader blob_nvtboot_recovery_t194.bin zerosbk [ 6.4677 ] adding BCH for blob_nvtboot_recovery_t194.bin [ 6.4706 ] [ 6.4718 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 6.4732 ] Assuming zero filled SBK key [ 6.4737 ] [ 6.4752 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_nvtboot_recovery_t194_sigheader.bin.encrypt blob_nvtboot_recovery_t194_sigheader.bin.hash zerosbk [ 6.4791 ] [ 6.4808 ] tegrahost_v2 --chip 0x19 --align blob_preboot_c10_prod_cr.bin [ 6.4846 ] [ 6.4858 ] tegrahost_v2 --chip 0x19 0 --magicid MTSP --appendsigheader blob_preboot_c10_prod_cr.bin zerosbk [ 6.4870 ] Header already present for blob_preboot_c10_prod_cr.bin [ 6.4874 ] [ 6.4897 ] tegrasign_v2 --key None --list blob_preboot_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 6.4907 ] Assuming zero filled SBK key [ 6.4909 ] [ 6.4921 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_preboot_c10_prod_cr_sigheader.bin.encrypt blob_preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 6.4932 ] [ 6.4944 ] tegrahost_v2 --chip 0x19 --align blob_mce_c10_prod_cr.bin [ 6.4952 ] [ 6.4961 ] tegrahost_v2 --chip 0x19 0 --magicid MTSM --appendsigheader blob_mce_c10_prod_cr.bin zerosbk [ 6.4970 ] Header already present for blob_mce_c10_prod_cr.bin [ 6.4987 ] [ 6.5004 ] tegrasign_v2 --key None --list blob_mce_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 6.5014 ] Assuming zero filled SBK key [ 6.5017 ] [ 6.5031 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_mce_c10_prod_cr_sigheader.bin.encrypt blob_mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 6.5061 ] [ 6.5077 ] tegrahost_v2 --chip 0x19 --align blob_mts_c10_prod_cr.bin [ 6.5088 ] [ 6.5099 ] tegrahost_v2 --chip 0x19 0 --magicid MTSB --appendsigheader blob_mts_c10_prod_cr.bin zerosbk [ 6.5109 ] adding BCH for blob_mts_c10_prod_cr.bin [ 6.5917 ] [ 6.5931 ] tegrasign_v2 --key None --list blob_mts_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 6.5940 ] Assuming zero filled SBK key [ 6.5988 ] [ 6.6001 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_mts_c10_prod_cr_sigheader.bin.encrypt blob_mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 6.6430 ] [ 6.6445 ] tegrahost_v2 --chip 0x19 --align blob_bpmp_t194.bin [ 6.6455 ] [ 6.6464 ] tegrahost_v2 --chip 0x19 0 --magicid BPMF --appendsigheader blob_bpmp_t194.bin zerosbk [ 6.6476 ] adding BCH for blob_bpmp_t194.bin [ 6.6686 ] [ 6.6699 ] tegrasign_v2 --key None --list blob_bpmp_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 6.6708 ] Assuming zero filled SBK key [ 6.6721 ] [ 6.6735 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_bpmp_t194_sigheader.bin.encrypt blob_bpmp_t194_sigheader.bin.hash zerosbk [ 6.6840 ] [ 6.6866 ] tegrahost_v2 --chip 0x19 --align blob_tegra194-a02-bpmp-p3668-a00.dtb [ 6.6885 ] [ 6.6904 ] tegrahost_v2 --chip 0x19 0 --magicid BPMD --appendsigheader blob_tegra194-a02-bpmp-p3668-a00.dtb zerosbk [ 6.6917 ] adding BCH for blob_tegra194-a02-bpmp-p3668-a00.dtb [ 6.6978 ] [ 6.6999 ] tegrasign_v2 --key None --list blob_tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 6.7016 ] Assuming zero filled SBK key [ 6.7022 ] [ 6.7042 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt blob_tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk [ 6.7081 ] [ 6.7105 ] tegrahost_v2 --chip 0x19 --align blob_spe_t194.bin [ 6.7136 ] [ 6.7167 ] tegrahost_v2 --chip 0x19 0 --magicid SPEF --appendsigheader blob_spe_t194.bin zerosbk [ 6.7182 ] adding BCH for blob_spe_t194.bin [ 6.7208 ] [ 6.7305 ] tegrasign_v2 --key None --list blob_spe_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 6.7324 ] Assuming zero filled SBK key [ 6.7329 ] [ 6.7344 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_spe_t194_sigheader.bin.encrypt blob_spe_t194_sigheader.bin.hash zerosbk [ 6.7366 ] [ 6.7377 ] tegrahost_v2 --chip 0x19 --align blob_tos-trusty_t194.img [ 6.7388 ] [ 6.7398 ] tegrahost_v2 --chip 0x19 0 --magicid TOSB --appendsigheader blob_tos-trusty_t194.img zerosbk [ 6.7409 ] adding BCH for blob_tos-trusty_t194.img [ 6.7503 ] [ 6.7522 ] tegrasign_v2 --key None --list blob_tos-trusty_t194_sigheader.img_list.xml --pubkeyhash pub_key.key [ 6.7534 ] Assuming zero filled SBK key [ 6.7542 ] [ 6.7561 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_tos-trusty_t194_sigheader.img.encrypt blob_tos-trusty_t194_sigheader.img.hash zerosbk [ 6.7621 ] [ 6.7637 ] tegrahost_v2 --chip 0x19 --align blob_eks.img [ 6.7648 ] [ 6.7657 ] tegrahost_v2 --chip 0x19 0 --magicid EKSB --appendsigheader blob_eks.img zerosbk [ 6.7666 ] adding BCH for blob_eks.img [ 6.7668 ] [ 6.7679 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key [ 6.7687 ] Assuming zero filled SBK key [ 6.7689 ] [ 6.7703 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk [ 6.7713 ] [ 6.7721 ] tegrahost_v2 --chip 0x19 --align blob_tegra194-p3668-all-p3509-0000.dtb [ 6.7729 ] [ 6.7738 ] tegrahost_v2 --chip 0x19 0 --magicid CDTB --appendsigheader blob_tegra194-p3668-all-p3509-0000.dtb zerosbk [ 6.7746 ] adding BCH for blob_tegra194-p3668-all-p3509-0000.dtb [ 6.7836 ] [ 6.7851 ] tegrasign_v2 --key None --list blob_tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 6.7862 ] Assuming zero filled SBK key [ 6.7867 ] [ 6.7880 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt blob_tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 6.7911 ] [ 6.7923 ] tegrahost_v2 --chip 0x19 --generateblob blob.xml blob.bin [ 6.7933 ] number of images in blob are 11 [ 6.7940 ] blobsize is 5694200 [ 6.7943 ] Added binary blob_nvtboot_recovery_cpu_t194_sigheader.bin.encrypt of size 258144 [ 6.7964 ] Added binary blob_nvtboot_recovery_t194_sigheader.bin.encrypt of size 129936 [ 6.7970 ] Added binary blob_preboot_c10_prod_cr_sigheader.bin.encrypt of size 24016 [ 6.7978 ] Added binary blob_mce_c10_prod_cr_sigheader.bin.encrypt of size 142592 [ 6.7983 ] Added binary blob_mts_c10_prod_cr_sigheader.bin.encrypt of size 3430800 [ 6.8005 ] Added binary blob_bpmp_t194_sigheader.bin.encrypt of size 856112 [ 6.8013 ] Added binary blob_tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt of size 172688 [ 6.8019 ] Added binary blob_spe_t194_sigheader.bin.encrypt of size 94960 [ 6.8024 ] Added binary blob_tos-trusty_t194_sigheader.img.encrypt of size 373696 [ 6.8030 ] Added binary blob_eks_sigheader.img.encrypt of size 5136 [ 6.8034 ] Added binary blob_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt of size 205936 [ 6.8043 ] [ 6.8044 ] Sending bootloader and pre-requisite binaries [ 6.8056 ] tegrarcm_v2 --download blob blob.bin [ 6.8065 ] Applet version 01.00.0000 [ 6.8773 ] Sending blob [ 6.8774 ] [................................................] 100% [ 8.2829 ] [ 8.2845 ] tegrarcm_v2 --boot recovery [ 8.2864 ] Applet version 01.00.0000 [ 8.3741 ] [ 9.3771 ] tegrarcm_v2 --isapplet