############################################################################### # L4T BSP Information: # R32 , REVISION: 2.3 ############################################################################### # Target Board Information: # Name: cti/tx2/elroy-revF+, Board Family: t186ref, SoC: Tegra 186, # OpMode: production, Boot Authentication: NS, ############################################################################### ./tegraflash.py --chip 0x18 --applet "/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin" --skipuid --cmd "dump eeprom boardinfo cvm.bin" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0028 ] Generating RCM messages [ 0.0041 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm /home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin 0 0 [ 0.0052 ] RCM 0 is saved as rcm_0.rcm [ 0.0061 ] RCM 1 is saved as rcm_1.rcm [ 0.0061 ] List of rcm files are saved in rcm_list.xml [ 0.0061 ] [ 0.0062 ] Signing RCM messages [ 0.0078 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0094 ] Assuming zero filled SBK key [ 0.0189 ] [ 0.0189 ] Copying signature to RCM mesages [ 0.0202 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml [ 0.0224 ] [ 0.0224 ] Boot Rom communication [ 0.0238 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml --skipuid [ 0.0250 ] RCM version 0X180001 [ 0.0518 ] Boot Rom communication completed [ 1.0593 ] [ 2.0626 ] tegrarcm_v2 --isapplet [ 2.0643 ] Applet version 01.00.0000 [ 2.1407 ] [ 2.1428 ] Retrieving EEPROM data [ 2.1430 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/cvm.bin [ 2.1446 ] Applet version 01.00.0000 [ 2.2329 ] Saved platform info in /home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/cvm.bin [ 2.3065 ] copying bctfile(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/t186ref/BCT/P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg)... done. copying misc_config(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)... done. copying pinmux_config(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg)... done. copying pmic_config(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg)... done. copying pmc_config(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg)... done. copying prod_config(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg)... done. copying scr_config(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/t186ref/BCT/minimal_scr.cfg)... done. copying scr_cold_boot_config(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/t186ref/BCT/mobile_scr.cfg)... done. copying bootrom_config(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg)... done. copying dev_params(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/t186ref/BCT/emmc.cfg)... done. Existing bootloader(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused. copying initrd(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/l4t_initrd.img)... done. populating kernel to rootfs... done. populating initrd to rootfs... done. populating /home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/kernel/dtb/tegra186-tx2-cti-ASG002-revF+.dtb to rootfs... done. Making Boot image... done. Existing sosfile(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin) reused. copying tegraboot(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/t186ref/nvtboot.bin)... done. Existing cpu_bootloader(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused. Existing mb2blfile(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused. Existing mtspreboot(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/preboot_d15_prod_cr.bin) reused. Existing mts(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/mce_mts_d15_prod_cr.bin) reused. Existing mb1file(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/mb1_prod.bin) reused. Existing bpffile(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/bpmp.bin) reused. copying bpfdtbfile(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/t186ref/tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb)... done. Existing scefile(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. Existing spefile(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/spe.bin) reused. Existing drameccfile(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/dram-ecc.bin) reused. Existing badpagefile(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/badpage.bin) reused. copying wb0boot(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/t186ref/warmboot.bin)... done. Existing tosfile(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/tos-trusty.img) reused. Existing eksfile(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/eks.img) reused. copying dtbfile(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/kernel/dtb/tegra186-tx2-cti-ASG002-revF+.dtb)... done. Copying nv_boot_control.conf to rootfs Reusing existing system.img... done. Existing tbcfile(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/cboot.bin) reused. copying tbcdtbfile(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/kernel/dtb/tegra186-tx2-cti-ASG002-revF+.dtb)... done. copying cfgfile(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml... done. Existing flasher(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu.bin) reused. Existing flashapp(/home/user/L4T_32_2_3_ELROY/Linux_for_Tegra/bootloader/tegraflash.py) reused. *** Updating [kernel-dtb] with tegra186-tx2-cti-ASG002-revF+.dtb *** ./tegraflash.py --bl nvtboot_recovery_cpu.bin --chip 0x18 --applet mb1_recovery_prod.bin --sdram_config P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg --cfg flash.xml --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb; tlk tos-trusty.img; eks eks.img; bootloader_dtb tegra186-tx2-cti-ASG002-revF+.dtb" --cmd "signwrite kernel-dtb tegra186-tx2-cti-ASG002-revF+.dtb; reboot" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0057 ] tegrasign_v2 --key None --getmode mode.txt [ 0.0068 ] Assuming zero filled SBK key [ 0.0072 ] [ 0.0075 ] sign_type : 33554432 [ 0.0075 ] header_magic: d00dfeed [ 0.0091 ] tegrahost_v2 --chip 0x18 --align 1_tegra186-tx2-cti-ASG002-revF+.dtb [ 0.0108 ] [ 0.0122 ] tegrahost_v2 --appendsigheader 1_tegra186-tx2-cti-ASG002-revF+.dtb zerosbk [ 0.0140 ] [ 0.0162 ] tegrasign_v2 --key None --list 1_tegra186-tx2-cti-ASG002-revF+_sigheader.dtb_list.xml [ 0.0173 ] Assuming zero filled SBK key [ 0.0288 ] [ 0.0307 ] tegrahost_v2 --updatesigheader 1_tegra186-tx2-cti-ASG002-revF+_sigheader.dtb.encrypt 1_tegra186-tx2-cti-ASG002-revF+_sigheader.dtb.hash zerosbk [ 0.0332 ] [ 0.0334 ] Generating RCM messages [ 0.0349 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0 [ 0.0363 ] RCM 0 is saved as rcm_0.rcm [ 0.0371 ] RCM 1 is saved as rcm_1.rcm [ 0.0371 ] List of rcm files are saved in rcm_list.xml [ 0.0371 ] [ 0.0372 ] Signing RCM messages [ 0.0387 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0404 ] Assuming zero filled SBK key [ 0.0477 ] [ 0.0478 ] Copying signature to RCM mesages [ 0.0494 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml [ 0.0517 ] [ 0.0518 ] Boot Rom communication [ 0.0531 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml [ 0.0543 ] BootRom is not running [ 5.1908 ] [ 6.1950 ] tegrarcm_v2 --isapplet [ 6.1970 ] Applet version 01.00.0000 [ 6.2763 ] [ 6.2783 ] tegrasign_v2 --key None --getmode mode.txt [ 6.2800 ] Assuming zero filled SBK key [ 6.2804 ] [ 6.2806 ] Parsing partition layout [ 6.2825 ] tegraparser_v2 --pt flash.xml.tmp [ 6.2852 ] [ 6.2853 ] Creating list of images to be signed [ 6.2870 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk [ 6.3121 ] [ 6.3122 ] Generating signatures [ 6.3139 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key [ 6.3153 ] Assuming zero filled SBK key [ 6.5493 ] [ 6.5494 ] Reading BCT from device for further operations [ 6.5494 ] Generating blob [ 6.5514 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin [ 6.5533 ] [ 6.5549 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk [ 6.5576 ] [ 6.5596 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml [ 6.5606 ] Assuming zero filled SBK key [ 6.5731 ] [ 6.5753 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk [ 6.5778 ] [ 6.5800 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin [ 6.5818 ] [ 6.5833 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk [ 6.5852 ] [ 6.5872 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml [ 6.5889 ] Assuming zero filled SBK key [ 6.5943 ] [ 6.5960 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk [ 6.5973 ] [ 6.5989 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin [ 6.6004 ] [ 6.6019 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk [ 6.6038 ] [ 6.6055 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml [ 6.6066 ] Assuming zero filled SBK key [ 6.6120 ] [ 6.6137 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk [ 6.6154 ] [ 6.6170 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin [ 6.6188 ] [ 6.6203 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk [ 6.6254 ] [ 6.6272 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml [ 6.6285 ] Assuming zero filled SBK key [ 6.6829 ] [ 6.6850 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk [ 6.6933 ] [ 6.6958 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin [ 6.6979 ] [ 6.6998 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk [ 6.7035 ] [ 6.7052 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml [ 6.7063 ] Assuming zero filled SBK key [ 6.7204 ] [ 6.7225 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk [ 6.7265 ] [ 6.7283 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb [ 6.7297 ] [ 6.7312 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk [ 6.7337 ] [ 6.7357 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml [ 6.7370 ] Assuming zero filled SBK key [ 6.7519 ] [ 6.7538 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk [ 6.7572 ] [ 6.7590 ] tegrahost_v2 --chip 0x18 --align blob_tos-trusty.img [ 6.7607 ] [ 6.7623 ] tegrahost_v2 --appendsigheader blob_tos-trusty.img zerosbk [ 6.7651 ] [ 6.7667 ] tegrasign_v2 --key None --list blob_tos-trusty_sigheader.img_list.xml [ 6.7677 ] Assuming zero filled SBK key [ 6.7803 ] [ 6.7822 ] tegrahost_v2 --updatesigheader blob_tos-trusty_sigheader.img.encrypt blob_tos-trusty_sigheader.img.hash zerosbk [ 6.7850 ] [ 6.7867 ] tegrahost_v2 --chip 0x18 --align blob_eks.img [ 6.7882 ] [ 6.7896 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk [ 6.7912 ] [ 6.7928 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml [ 6.7941 ] Assuming zero filled SBK key [ 6.7948 ] [ 6.7964 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk [ 6.7981 ] [ 6.7996 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-tx2-cti-ASG002-revF+.dtb [ 6.8011 ] [ 6.8023 ] tegrahost_v2 --appendsigheader blob_tegra186-tx2-cti-ASG002-revF+.dtb zerosbk [ 6.8046 ] [ 6.8059 ] tegrasign_v2 --key None --list blob_tegra186-tx2-cti-ASG002-revF+_sigheader.dtb_list.xml [ 6.8067 ] Assuming zero filled SBK key [ 6.8200 ] [ 6.8217 ] tegrahost_v2 --updatesigheader blob_tegra186-tx2-cti-ASG002-revF+_sigheader.dtb.encrypt blob_tegra186-tx2-cti-ASG002-revF+_sigheader.dtb.hash zerosbk [ 6.8243 ] [ 6.8265 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin [ 6.8281 ] number of images in blob are 9 [ 6.8288 ] blobsize is 3988472 [ 6.8291 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 203856 [ 6.8327 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 89360 [ 6.8337 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 63104 [ 6.8345 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2082144 [ 6.8352 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 533904 [ 6.8359 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt of size 466240 [ 6.8367 ] Added binary blob_tos-trusty_sigheader.img.encrypt of size 313152 [ 6.8372 ] Added binary blob_eks_sigheader.img.encrypt of size 1440 [ 6.8375 ] Added binary blob_tegra186-tx2-cti-ASG002-revF+_sigheader.dtb.encrypt of size 235120 [ 6.8403 ] [ 6.8404 ] Sending bootloader and pre-requisite binaries [ 6.8419 ] tegrarcm_v2 --download blob blob.bin [ 6.8430 ] Applet version 01.00.0000 [ 6.9205 ] Sending blob [ 6.9207 ] [................................................] 100% [ 7.5291 ] [ 7.5312 ] tegrarcm_v2 --boot recovery [ 7.5328 ] Applet version 01.00.0000 [ 7.6067 ] [ 8.6108 ] tegrarcm_v2 --isapplet [ 8.6873 ] [ 8.6893 ] tegradevflash_v2 --iscpubl [ 8.6910 ] CPU Bootloader is not running on device. [ 8.7428 ] [ 9.7470 ] tegrarcm_v2 --isapplet [ 9.8247 ] [ 9.8268 ] tegradevflash_v2 --iscpubl [ 9.8284 ] Bootloader version 01.00.0000 [ 9.8725 ] Bootloader version 01.00.0000 [ 9.8741 ] [ 9.8741 ] Writing partition [ 9.8760 ] tegradevflash_v2 --write kernel-dtb 1_tegra186-tx2-cti-ASG002-revF+_sigheader.dtb.encrypt [ 9.8776 ] Bootloader version 01.00.0000 [ 9.9207 ] Writing partition kernel-dtb with 1_tegra186-tx2-cti-ASG002-revF+_sigheader.dtb.encrypt [ 9.9218 ] [................................................] 100% [ 9.9454 ] [ 9.9456 ] Coldbooting the device [ 9.9475 ] tegradevflash_v2 --reboot coldboot [ 9.9495 ] Bootloader version 01.00.0000 [ 9.9812 ] *** The [kernel-dtb] has been updated successfully. ***