+ set -eo pipefail + trap cleanup EXIT +++ dirname tools/kernel_flash/l4t_initrd_flash.sh ++ cd tools/kernel_flash ++ pwd + L4T_INITRD_FLASH_DIR=/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash + L4T_TOOLS_DIR=/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools + LINUX_BASE_DIR=/home/jhempsey/workspace/d4t/work/Linux_for_Tegra + showlogs=0 + flash_only=0 + initrd_only= + reuse_package= + external_only= + no_flash=0 + target_partname= + max_massflash= + keep= + network= + reuse= + export initrd_flash_step=1 + initrd_flash_step=1 + UDEV_L4T_DIR=/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/host_udev + flash_cmd=/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh + source /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash.func ++ DEFAULT_MAX_MASSFLASH=10 ++ INITRD_FLASHPARAM=initrdflashparam.txt + parse_param --no-flash --showlogs --append -u /mnt/keys//pkc.pem -v /mnt/keys//sbk '-p -i /mnt/keys/ekb.key --user_key /mnt/keys/user_key_flash' -c tools/kernel_flash/flash_d4t_sdcard_512GB_rootfs_enc.xml --external-device mmcblk1p1 --external-only -S 100GiB jetson-xavier-nx-devkit-emmc mmcblk1p1 + opstr+=u:p:v:c:-:S:k: + getopts u:p:v:c:-:S:k: OPTION + case $OPTION in + case ${OPTARG} in + no_flash=1 + getopts u:p:v:c:-:S:k: OPTION + case $OPTION in + case ${OPTARG} in + showlogs=1 + getopts u:p:v:c:-:S:k: OPTION + case $OPTION in + case ${OPTARG} in + append=1 + getopts u:p:v:c:-:S:k: OPTION + case $OPTION in + KEY_FILE=/mnt/keys//pkc.pem + getopts u:p:v:c:-:S:k: OPTION + case $OPTION in + SBK_KEY=/mnt/keys//sbk + getopts u:p:v:c:-:S:k: OPTION + case $OPTION in + OPTIONS=' -i /mnt/keys/ekb.key --user_key /mnt/keys/user_key_flash' + getopts u:p:v:c:-:S:k: OPTION + case $OPTION in + config_file=tools/kernel_flash/flash_d4t_sdcard_512GB_rootfs_enc.xml + getopts u:p:v:c:-:S:k: OPTION + case $OPTION in + case ${OPTARG} in + external_device=mmcblk1p1 + OPTIND=13 + getopts u:p:v:c:-:S:k: OPTION + case $OPTION in + case ${OPTARG} in + external_only=--external-only + getopts u:p:v:c:-:S:k: OPTION + case $OPTION in + external_size=100GiB + getopts u:p:v:c:-:S:k: OPTION + remove_udev_rules + rm -f /etc/udev/rules.d/99-l4t-host.rules + rm -f /etc/udev/rules.d/10-l4t-usb-msd.rules + install_udev_rules ++ realpath /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/host_udev/99-l4t-host.rules + ln -s /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/host_udev/99-l4t-host.rules /etc/udev/rules.d/ ++ realpath /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/host_udev/10-l4t-usb-msd.rules + ln -s /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/host_udev/10-l4t-usb-msd.rules /etc/udev/rules.d/ + fill_devpaths + devpaths=($(find /sys/bus/usb/devices/usb*/ -name devnum -print0 | { found=() while read -r -d "" fn_devnum; do dir="$(dirname "${fn_devnum}")" vendor="$(cat "${dir}/idVendor")" if [ "${vendor}" != "0955" ]; then continue fi product="$(cat "${dir}/idProduct")" case "${product}" in "7018") ;; # TX2i "7418") ;; # TX2 4GB "7c18") ;; # TX2, TX2 NX "7019") ;; # AGX Xavier "7819") ;; # AGXi "7919") ;; # AGXi "7e19") ;; # NX *) continue ;; esac fn_busnum="${dir}/busnum" if [ ! -f "${fn_busnum}" ]; then continue fi fn_devpath="${dir}/devpath" if [ ! -f "${fn_devpath}" ]; then continue fi busnum="$(cat "${fn_busnum}")" devpath="$(cat "${fn_devpath}")" if [ -n "${usb_instance}" ] && [ "${usb_instance}" != "${busnum}-${devpath}" ]; then continue else found+=("${busnum}-${devpath}") fi done echo "${found[@]}" })) ++ find /sys/bus/usb/devices/usb1/ /sys/bus/usb/devices/usb2/ -name devnum -print0 ++ found=() ++ read -r -d '' fn_devnum +++ dirname /sys/bus/usb/devices/usb1/1-10/devnum ++ dir=/sys/bus/usb/devices/usb1/1-10 +++ cat /sys/bus/usb/devices/usb1/1-10/idVendor ++ vendor=8087 ++ '[' 8087 '!=' 0955 ']' ++ continue ++ read -r -d '' fn_devnum +++ dirname /sys/bus/usb/devices/usb1/1-3/devnum ++ dir=/sys/bus/usb/devices/usb1/1-3 +++ cat /sys/bus/usb/devices/usb1/1-3/idVendor ++ vendor=0403 ++ '[' 0403 '!=' 0955 ']' ++ continue ++ read -r -d '' fn_devnum +++ dirname /sys/bus/usb/devices/usb1/devnum ++ dir=/sys/bus/usb/devices/usb1 +++ cat /sys/bus/usb/devices/usb1/idVendor ++ vendor=1d6b ++ '[' 1d6b '!=' 0955 ']' ++ continue ++ read -r -d '' fn_devnum +++ dirname /sys/bus/usb/devices/usb1/1-4/devnum ++ dir=/sys/bus/usb/devices/usb1/1-4 +++ cat /sys/bus/usb/devices/usb1/1-4/idVendor ++ vendor=0955 ++ '[' 0955 '!=' 0955 ']' +++ cat /sys/bus/usb/devices/usb1/1-4/idProduct ++ product=7e19 ++ case "${product}" in ++ fn_busnum=/sys/bus/usb/devices/usb1/1-4/busnum ++ '[' '!' -f /sys/bus/usb/devices/usb1/1-4/busnum ']' ++ fn_devpath=/sys/bus/usb/devices/usb1/1-4/devpath ++ '[' '!' -f /sys/bus/usb/devices/usb1/1-4/devpath ']' +++ cat /sys/bus/usb/devices/usb1/1-4/busnum ++ busnum=1 +++ cat /sys/bus/usb/devices/usb1/1-4/devpath ++ devpath=4 ++ '[' -n '' ']' ++ found+=("${busnum}-${devpath}") ++ read -r -d '' fn_devnum +++ dirname /sys/bus/usb/devices/usb2/devnum ++ dir=/sys/bus/usb/devices/usb2 +++ cat /sys/bus/usb/devices/usb2/idVendor ++ vendor=1d6b ++ '[' 1d6b '!=' 0955 ']' ++ continue ++ read -r -d '' fn_devnum ++ echo 1-4 + '[' 0 = 0 ']' + echo '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh --no-flash --no-flash --showlogs --append -u /mnt/keys//pkc.pem -v /mnt/keys//sbk -p -i /mnt/keys/ekb.key --user_key /mnt/keys/user_key_flash -c tools/kernel_flash/flash_d4t_sdcard_512GB_rootfs_enc.xml --external-device mmcblk1p1 --external-only -S 100GiB jetson-xavier-nx-devkit-emmc mmcblk1p1' /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh --no-flash --no-flash --showlogs --append -u /mnt/keys//pkc.pem -v /mnt/keys//sbk -p -i /mnt/keys/ekb.key --user_key /mnt/keys/user_key_flash -c tools/kernel_flash/flash_d4t_sdcard_512GB_rootfs_enc.xml --external-device mmcblk1p1 --external-only -S 100GiB jetson-xavier-nx-devkit-emmc mmcblk1p1 + /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh --no-flash --no-flash --showlogs --append -u /mnt/keys//pkc.pem -v /mnt/keys//sbk '-p -i /mnt/keys/ekb.key --user_key /mnt/keys/user_key_flash' -c tools/kernel_flash/flash_d4t_sdcard_512GB_rootfs_enc.xml --external-device mmcblk1p1 --external-only -S 100GiB jetson-xavier-nx-devkit-emmc mmcblk1p1 ************************************ * * * Step 1: Generate flash packages * * * ************************************ Create folder to store images to flash Generate images to be flashed BOOTDEV=mmcblk1p1 /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/flash.sh --no-flash --sign --external-device -c "tools/kernel_flash/flash_d4t_sdcard_512GB_rootfs_enc.xml" -S "100GiB" -u "/mnt/keys//pkc.pem" -v "/mnt/keys//sbk" -i /mnt/keys/ekb.key --user_key /mnt/keys/user_key_flash jetson-xavier-nx-devkit-emmc mmcblk1p1 ############################################################################### # L4T BSP Information: # R32 , REVISION: 7.1 ############################################################################### Change device boot from mmcblk1p1 to internal copying soft_fuses(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. ./tegraflash.py --chip 0x19 --applet "/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod.bin" --skipuid --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --bins "mb2_applet nvtboot_applet_t194.bin" --cmd "dump eeprom boardinfo cvm.bin;reboot recovery" --key "/mnt/keys//pkc.pem" --encrypt_key "/mnt/keys/sbk" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0061 ] Generating RCM messages [ 0.0083 ] tegrasign_v3.py --key /mnt/keys/sbk --file /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod.bin --offset 4096 [ 0.0088 ] Key is a SBK key [ 0.0268 ] Key Size is 16 bytes [ 0.0269 ] 246336 [ 0.0339 ] [ 0.0360 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt.bin zerosbk [ 0.0365 ] Header already present for /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt.bin [ 0.0391 ] [ 0.0411 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0423 ] Ke[ 0.0426 ] y size is 384 bytes [ 0.0448 ] tegrasign_v3.py --file /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt_sigheader.bin --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem --length 1136 --offset 2960 --pubkeyhash pub_key.key [ 0.0461 ] K[ 0.0472 ] ey size is 384 bytes [ 0.0846 ] Saving pkc public key in pub_key.key [ 0.0846 ] Saving Montgomery values in montgomery.bin [ 0.0863 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin --updatesigheader /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt_sigheader.bin /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt_sigheader.sig oem-rsa [ 0.0890 ] [ 0.0912 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg.pdf sfuse.bin [ 0.0918 ] [ 0.0937 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt_sigheader.bin 0 0 [ 0.0942 ] RCM 0 is saved as rcm_0.rcm [ 0.0964 ] RCM 1 is saved as rcm_1.rcm [ 0.0965 ] RCM 2 is saved as rcm_2.rcm [ 0.0965 ] List of rcm files are saved in rcm_list.xml [ 0.0965 ] [ 0.0965 ] Signing RCM messages [ 0.0985 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0998 ] K[ 0.1009 ] ey size is 384 bytes [ 0.2062 ] Saving pkc public key in pub_key.key [ 0.2063 ] Saving Montgomery values in montgomery.bin [ 0.2061 ] Copying signature to RCM mesages [ 0.2079 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 0.2089 ] [ 0.2090 ] Boot Rom communication [ 0.2109 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_list_signed.xml --skipuid [ 0.2115 ] RCM version 0X190001 [ 0.2176 ] Boot Rom communication completed [ 1.2536 ] [ 2.2582 ] tegrarcm_v2 --isapplet [ 2.2599 ] Applet version 01.00.0000 [ 2.2787 ] [ 2.2818 ] tegrarcm_v2 --ismb2 [ 2.3186 ] [ 2.3218 ] tegrahost_v2 --chip 0x19 --align nvtboot_applet_t194.bin [ 2.3234 ] [ 2.3237 ] header_magic: 50000ea [ 2.3278 ] tegrasign_v3.py --key /mnt/keys/sbk --list nvtboot_applet_t194.bin_list.xml [ 2.3280 ] Key is a SBK key [ 2.3281 ] Key Size is 16 bytes [ 2.3289 ] 123616 [ 2.3467 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_applet_t194.bin.encrypt nvtboot_applet_t194.bin.hash zerosbk [ 2.3487 ] [ 2.3517 ] tegrahost_v2 --chip 0x19 --align nvtboot_applet_t194.bin.encrypt [ 2.3532 ] [ 2.3534 ] header_magic: ac173d1e [ 2.3561 ] tegrahost_v2 --appendsigheader nvtboot_applet_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid PLDT [ 2.3576 ] adding BCH for nvtboot_applet_t194.bin.encrypt [ 2.3627 ] [ 2.3649 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list nvtboot_applet_t194.bin_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 2.3662 ] K[ 2.3664 ] ey size is 384 bytes [ 2.4016 ] Saving pkc public key in pub_key.key [ 2.4032 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_applet_t194.bin_sigheader.encrypt.signed nvtboot_applet_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.4049 ] [ 2.4069 ] tegrarcm_v2 --download mb2 nvtboot_applet_t194.bin_sigheader.encrypt.signed [ 2.4075 ] Applet version 01.00.0000 [ 2.4260 ] Sending mb2 [ 2.4261 ] [................................................] 100% [ 2.4449 ] [ 2.4471 ] tegrarcm_v2 --boot recovery [ 2.4477 ] Applet version 01.00.0000 [ 2.4701 ] [ 3.4744 ] tegrarcm_v2 --isapplet [ 3.4947 ] [ 3.4977 ] tegrarcm_v2 --ismb2 [ 3.4991 ] MB2 Applet version 01.00.0000 [ 3.5345 ] [ 3.5374 ] tegrarcm_v2 --ismb2 [ 3.5387 ] MB2 Applet version 01.00.0000 [ 3.5706 ] [ 3.5736 ] Retrieving board information [ 3.5763 ] tegrarcm_v2 --oem platformdetails chip chip_info.bin [ 3.5776 ] MB2 Applet version 01.00.0000 [ 3.6128 ] Saved platform info in chip_info.bin [ 3.6170 ] Chip minor revision: 2 [ 3.6173 ] Bootrom revision: 0xf [ 3.6175 ] Ram code: 0x0 [ 3.6175 ] Chip sku: 0xde [ 3.6175 ] Chip Sample: non es [ 3.6175 ] [ 3.6179 ] Retrieving EEPROM data [ 3.6180 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/cvm.bin [ 3.6195 ] MB2 Applet version 01.00.0000 [ 3.6411 ] Saved platform info in /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/cvm.bin [ 3.6760 ] [ 3.6761 ] Rebooting to recovery mode [ 3.6789 ] tegrarcm_v2 --ismb2 [ 3.6801 ] MB2 Applet version 01.00.0000 [ 3.6978 ] [ 3.6979 ] Rebooting to recovery mode [ 3.7008 ] tegrarcm_v2 --reboot recovery [ 3.7021 ] MB2 Applet version 01.00.0000 [ 3.7420 ] Board ID(3668) version(300) sku(0001) revision(B.0) Copy /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb to /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb.rec Using UUID 65f5129a-e8d8-466b-b244-bde41a94f7bb for mounting root APP_ext partition. Using UUID 3e8d6581-5f4e-4455-948a-c054c29c7cd6 for mounting root APP_ext_enc partition. Using UUID 1e3fe00f-2e53-4b5b-87c7-2c67f72f498f for mounting boot APP_ext partition. copying bctfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg)... done. copying bctfile1(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-memcfg-sw-override.cfg)... done. copying minratchet_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-ratchet-p3668.cfg)... done. copying device_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-bct-device-qspi-p3668.cfg)... done. copying misc_cold_boot_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-l4t.cfg)... done. copying misc_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-flash.cfg)... done. copying pinmux_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-pinmux-p3668-a01.cfg)... done. copying gpioint_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg)... done. copying pmic_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-pmic-p3668-0001-a00.cfg)... done. copying pmc_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-padvoltage-p3668-a01.cfg)... done. copying prod_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-prod-p3668-0001-a00.cfg)... done. copying scr_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying scr_cold_boot_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying bootrom_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-reset-p3668-0001-a00.cfg)... done. copying dev_params(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-br-bct-qspi.cfg)... done. Using UUID ccd6a3b5-360b-4bc2-ab20-9c85d16a2f59 for mounting UDA_ext partition. Making system_uda_encrypted.img_ext... Sync'ing system_uda_encrypted.img_ext ... done. Converting RAW image to Sparse image... done. system_uda_encrypted.img_ext built successfully. Existing bootloader(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. copying initrd(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/l4t_initrd.img)... done. prepare_luks_initrd: Begin to copy binaries into initrd 30412 blocks 49600 blocks prepare_luks_initrd: Finish copying binaries into initrd done. Making Boot image... done. /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /mnt/keys//pkc.pem --encrypt_key /mnt/keys/user_key_flash --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign boot.img kernel Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0004 ] Generating signature [ 0.0025 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0038 ] K[ 0.0040 ] ey size is 384 bytes [ 0.0062 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem [ 0.0074 ] Ke[ 0.0085 ] y size is 384 bytes [ 0.0086 ] Saving Montgomery values in montgomery.bin [ 0.0085 ] Generating ratchet blob [ 0.0102 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0108 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0109 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0109 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0109 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0109 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0109 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0109 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0109 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0109 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0109 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0109 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0109 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0110 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0110 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0110 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0110 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0110 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0110 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0110 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0110 ] [ 0.0110 ] header_magic: 414e4452 [ 0.0111 ] Encrypting file [ 0.0129 ] tegrahost_v2 --chip 0x19 --align 1_boot.img [ 0.0135 ] [ 0.0136 ] header_magic: 414e4452 [ 0.0162 ] tegrasign_v3.py --key /mnt/keys/user_key_flash --list 1_boot.img_list.xml [ 0.0163 ] Key is a SBK key [ 0.0163 ] Key Size is 16 bytes [ 0.0653 ] 45979648 [ 1.0489 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot.img.encrypt 1_boot.img.hash zerosbk [ 1.1833 ] [ 1.1863 ] tegrahost_v2 --chip 0x19 --align 1_boot.img.encrypt [ 1.1878 ] [ 1.1880 ] header_magic: 7116da2e [ 1.1909 ] tegrahost_v2 --appendsigheader 1_boot.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid KRNL --ratchet_blob ratchet_blob.bin [ 1.1924 ] adding BCH for 1_boot.img.encrypt [ 1.9395 ] [ 1.9421 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list 1_boot.img_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 1.9437 ] K[ 1.9439 ] ey size is 384 bytes [ 2.0169 ] Saving pkc public key in pub_key.key [ 2.0189 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot.img_sigheader.encrypt.signed 1_boot.img_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.4841 ] [ 2.5165 ] Signed and encrypted file: /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/boot.img_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for boot.img_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x2bd9800 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot.img_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt.signed done. Making recovery ramdisk for recovery image... Re-generating recovery ramdisk for recovery image... ~/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp ~/workspace/d4t/work/Linux_for_Tegra/bootloader ~/workspace/d4t/work/Linux_for_Tegra 30412 blocks _BASE_KERNEL_VERSION=4.9.253-tegra cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/usr/lib/aarch64-linux-gnu/libpcsclite.so.1': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/usr/lib/aarch64-linux-gnu/libpcsclite.so.1 /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//lib/libpcsclite.so.1 cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/sbin/wpa_supplicant': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/sbin/wpa_supplicant /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//sbin/wpa_supplicant cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/action_wpa.sh': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/action_wpa.sh /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//etc/wpa_supplicant/action_wpa.sh cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/functions.sh': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/functions.sh /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//etc/wpa_supplicant/functions.sh cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/ifupdown.sh': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/ifupdown.sh /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//etc/wpa_supplicant/ifupdown.sh ~/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp/lib ~/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp ~/workspace/d4t/work/Linux_for_Tegra/bootloader ~/workspace/d4t/work/Linux_for_Tegra 111519 blocks Making Recovery image... copying recdtbfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb.rec)... done. 20+0 records in 20+0 records out 20 bytes copied, 0.000330242 s, 60.6 kB/s Existing sosfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing tegraboot(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_t194.bin) reused. Existing cpu_bootloader(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. Existing mb2blfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_recovery_t194.bin) reused. Existing mtspreboot(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/preboot_c10_prod_cr.bin) reused. Existing mcepreboot(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mce_c10_prod_cr.bin) reused. Existing mtsproper(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mts_c10_prod_cr.bin) reused. Existing mb1file(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing bpffile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/bpmp_t194.bin) reused. copying bpfdtbfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/tegra194-a02-bpmp-p3668-a00.dtb)... done. Existing scefile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. Existing camerafw(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/camera-rtcpu-rce.img) reused. Existing spefile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/spe_t194.bin) reused. Existing wb0boot(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/warmboot_t194_prod.bin) reused. Existing tosfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tos-trusty_t194.img) reused. Existing eksfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/eks.img) reused. copying soft_fuses(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. copying dtbfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb)... done. Copying nv_boot_control.conf to rootfs XPath set is empty /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /mnt/keys//pkc.pem --encrypt_key /mnt/keys/user_key_flash --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign kernel_tegra194-p3668-all-p3509-0000.dtb kernel_dtb Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0005 ] Generating signature [ 0.0027 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0040 ] K[ 0.0041 ] ey size is 384 bytes [ 0.0065 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem [ 0.0078 ] K[ 0.0088 ] ey size is 384 bytes [ 0.0090 ] Saving Montgomery values in montgomery.bin [ 0.0088 ] Generating ratchet blob [ 0.0107 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0113 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0116 ] [ 0.0117 ] header_magic: d00dfeed [ 0.0117 ] Encrypting file [ 0.0135 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p3668-all-p3509-0000.dtb [ 0.0141 ] [ 0.0142 ] header_magic: d00dfeed [ 0.0167 ] tegrasign_v3.py --key /mnt/keys/user_key_flash --list 1_kernel_tegra194-p3668-all-p3509-0000.dtb_list.xml [ 0.0168 ] Key is a SBK key [ 0.0168 ] Key Size is 16 bytes [ 0.0173 ] 203248 [ 0.0267 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt 1_kernel_tegra194-p3668-all-p3509-0000.dtb.hash zerosbk [ 0.0276 ] [ 0.0295 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt [ 0.0301 ] [ 0.0302 ] header_magic: 816949f0 [ 0.0319 ] tegrahost_v2 --appendsigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid KDTB --ratchet_blob ratchet_blob.bin [ 0.0324 ] adding BCH for 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt [ 0.0363 ] [ 0.0383 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.0395 ] Ke[ 0.0398 ] y size is 384 bytes [ 0.0766 ] Saving pkc public key in pub_key.key [ 0.0783 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 0.0807 ] [ 0.0812 ] Signed and encrypted file: /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x319e1 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed done. populating kernel to rootfs... done. populating initrd to rootfs... done. populating kernel_tegra194-p3668-all-p3509-0000.dtb to rootfs... done. Making system_boot.img... populating bootfs from /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/boot ... done. populating extlinux/extlinux.conf ... done. generating sig file of Image ... /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /mnt/keys//pkc.pem --encrypt_key /mnt/keys/user_key_flash --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign ./Image kernel Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0017 ] Generating signature [ 0.0039 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0052 ] K[ 0.0054 ] ey size is 384 bytes [ 0.0078 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem [ 0.0091 ] K[ 0.0102 ] ey size is 384 bytes [ 0.0103 ] Saving Montgomery values in montgomery.bin [ 0.0101 ] Generating ratchet blob [ 0.0119 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0124 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0126 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0126 ] [ 0.0127 ] header_magic: c05614 [ 0.0128 ] Encrypting file [ 0.0146 ] tegrahost_v2 --chip 0x19 --align 1_Image [ 0.0152 ] [ 0.0154 ] header_magic: c05614 [ 0.0179 ] tegrasign_v3.py --key /mnt/keys/user_key_flash --list 1_Image_list.xml [ 0.0180 ] Key is a SBK key [ 0.0180 ] Key Size is 16 bytes [ 0.0539 ] 34619408 [ 0.8054 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_Image.encrypt 1_Image.hash zerosbk [ 0.8629 ] [ 0.8651 ] tegrahost_v2 --chip 0x19 --align 1_Image.encrypt [ 0.8657 ] [ 0.8658 ] header_magic: 56eb42ee [ 0.8677 ] tegrahost_v2 --appendsigheader 1_Image.encrypt oem-rsa-sbk --chip 0x19 0 --magicid KRNL --ratchet_blob ratchet_blob.bin [ 0.8683 ] adding BCH for 1_Image.encrypt [ 1.4366 ] [ 1.4391 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list 1_Image_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 1.4408 ] K[ 1.4410 ] ey size is 384 bytes [ 1.5091 ] Saving pkc public key in pub_key.key [ 1.5111 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_Image_sigheader.encrypt.signed 1_Image_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 1.8155 ] [ 1.8396 ] Signed and encrypted file: /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mnt/Image_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for Image_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x2104008 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for Image_sigheader.encrypt.signed l4t_sign_image.sh: the sign header is saved at ./Image.sig done. done. generating sig file of kernel_tegra194-p3668-all-p3509-0000.dtb ... /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /mnt/keys//pkc.pem --encrypt_key /mnt/keys/user_key_flash --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign ./dtb/kernel_tegra194-p3668-all-p3509-0000.dtb kernel_dtb Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0017 ] Generating signature [ 0.0038 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0051 ] K[ 0.0053 ] ey size is 384 bytes [ 0.0076 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem [ 0.0088 ] K[ 0.0098 ] ey size is 384 bytes [ 0.0100 ] Saving Montgomery values in montgomery.bin [ 0.0099 ] Generating ratchet blob [ 0.0116 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0122 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0123 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0124 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0124 ] [ 0.0125 ] header_magic: d00dfeed [ 0.0126 ] Encrypting file [ 0.0143 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p3668-all-p3509-0000.dtb [ 0.0149 ] [ 0.0150 ] header_magic: d00dfeed [ 0.0175 ] tegrasign_v3.py --key /mnt/keys/user_key_flash --list 1_kernel_tegra194-p3668-all-p3509-0000.dtb_list.xml [ 0.0176 ] Key is a SBK key [ 0.0176 ] Key Size is 16 bytes [ 0.0180 ] 203248 [ 0.0272 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt 1_kernel_tegra194-p3668-all-p3509-0000.dtb.hash zerosbk [ 0.0282 ] [ 0.0302 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt [ 0.0308 ] [ 0.0308 ] header_magic: 816949f0 [ 0.0327 ] tegrahost_v2 --appendsigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid KDTB --ratchet_blob ratchet_blob.bin [ 0.0333 ] adding BCH for 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt [ 0.0370 ] [ 0.0391 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.0403 ] K[ 0.0405 ] ey size is 384 bytes [ 0.0777 ] Saving pkc public key in pub_key.key [ 0.0795 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 0.0819 ] [ 0.0824 ] Signed and encrypted file: /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mnt/kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x319e1 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: the sign header is saved at ./dtb/kernel_tegra194-p3668-all-p3509-0000.dtb.sig done. done. generating sig file of initrd ... /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /mnt/keys//pkc.pem --encrypt_key /mnt/keys/user_key_flash --cmd sign ./initrd data Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0017 ] Generating signature [ 0.0039 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0052 ] K[ 0.0055 ] ey size is 384 bytes [ 0.0078 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem [ 0.0090 ] K[ 0.0100 ] ey size is 384 bytes [ 0.0102 ] Saving Montgomery values in montgomery.bin [ 0.0102 ] header_magic: 1f8b0800 [ 0.0103 ] Encrypting file [ 0.0121 ] tegrahost_v2 --chip 0x19 --align 1_initrd [ 0.0127 ] [ 0.0128 ] header_magic: 1f8b0800 [ 0.0153 ] tegrasign_v3.py --key /mnt/keys/user_key_flash --list 1_initrd_list.xml [ 0.0154 ] Key is a SBK key [ 0.0154 ] Key Size is 16 bytes [ 0.0274 ] 11355952 [ 0.2796 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_initrd.encrypt 1_initrd.hash zerosbk [ 0.2946 ] [ 0.2969 ] tegrahost_v2 --chip 0x19 --align 1_initrd.encrypt [ 0.2978 ] [ 0.2979 ] header_magic: effee7ce [ 0.2999 ] tegrahost_v2 --appendsigheader 1_initrd.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 0.3006 ] adding BCH for 1_initrd.encrypt [ 0.4861 ] [ 0.4889 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list 1_initrd_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.4903 ] Ke[ 0.4905 ] y size is 384 bytes [ 0.5355 ] Saving pkc public key in pub_key.key [ 0.5378 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_initrd_sigheader.encrypt.signed 1_initrd_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 0.6376 ] [ 0.6456 ] Signed and encrypted file: /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mnt/initrd_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for initrd_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0xad4726 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for initrd_sigheader.encrypt.signed l4t_sign_image.sh: the sign header is saved at ./initrd.sig done. done. generating sig file of extlinux/extlinux.conf ... /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /mnt/keys//pkc.pem --encrypt_key /mnt/keys/user_key_flash --cmd sign extlinux/extlinux.conf data Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0017 ] Generating signature [ 0.0040 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0052 ] K[ 0.0054 ] ey size is 384 bytes [ 0.0077 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem [ 0.0089 ] K[ 0.0100 ] ey size is 384 bytes [ 0.0101 ] Saving Montgomery values in montgomery.bin [ 0.0100 ] header_magic: 54494d45 [ 0.0101 ] Encrypting file [ 0.0120 ] tegrahost_v2 --chip 0x19 --align 1_extlinux.conf [ 0.0126 ] [ 0.0127 ] header_magic: 54494d45 [ 0.0152 ] tegrasign_v3.py --key /mnt/keys/user_key_flash --list 1_extlinux.conf_list.xml [ 0.0153 ] Key is a SBK key [ 0.0153 ] Key Size is 16 bytes [ 0.0156 ] 880 [ 0.0205 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_extlinux.conf.encrypt 1_extlinux.conf.hash zerosbk [ 0.0212 ] [ 0.0232 ] tegrahost_v2 --chip 0x19 --align 1_extlinux.conf.encrypt [ 0.0238 ] [ 0.0239 ] header_magic: a3446c81 [ 0.0255 ] tegrahost_v2 --appendsigheader 1_extlinux.conf.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 0.0261 ] adding BCH for 1_extlinux.conf.encrypt [ 0.0262 ] [ 0.0285 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list 1_extlinux.conf_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.0298 ] K[ 0.0300 ] ey size is 384 bytes [ 0.0650 ] Saving pkc public key in pub_key.key [ 0.0669 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_extlinux.conf_sigheader.encrypt.signed 1_extlinux.conf_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 0.0676 ] [ 0.0679 ] Signed and encrypted file: /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mnt/extlinux.conf_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for extlinux.conf_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x370 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for extlinux.conf_sigheader.encrypt.signed l4t_sign_image.sh: the sign header is saved at extlinux/extlinux.conf.sig done. done. Sync'ing system_boot.img ... done. Converting RAW image to Sparse image... done. system_boot.img built successfully. Making system_root_encrypted.img_ext... populating rootfs from /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs ... done. Sync'ing system_root_encrypted.img_ext ... done. Converting RAW image to Sparse image... done. system_root_encrypted.img_ext built successfully. Existing tbcfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/cboot_t194.bin) reused. copying tbcdtbfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb)... done. copying cfgfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/flash_d4t_sdcard_512GB_rootfs_enc.xml) to flash.xml... done. Existing flasher(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu_t194.bin) reused. Existing flashapp(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py) reused. ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin --sdram_config tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg,tegra194-memcfg-sw-override.cfg --odmdata 0xB8190000 --applet mb1_t194_prod.bin --cmd "sign" --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --cfg flash.xml --chip 0x19 --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --device_config tegra19x-mb1-bct-device-qspi-p3668.cfg --misc_cold_boot_config tegra194-mb1-bct-misc-l4t.cfg --misc_config tegra194-mb1-bct-misc-flash.cfg --pinmux_config tegra19x-mb1-pinmux-p3668-a01.cfg --gpioint_config tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --pmic_config tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --pmc_config tegra19x-mb1-padvoltage-p3668-a01.cfg --prod_config tegra19x-mb1-prod-p3668-0001-a00.cfg --scr_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --scr_cold_boot_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --br_cmd_config tegra194-mb1-bct-reset-p3668-0001-a00.cfg --dev_params tegra194-br-bct-qspi.cfg --bin "mb2_bootloader nvtboot_recovery_t194.bin; mts_preboot preboot_c10_prod_cr.bin; mts_mce mce_c10_prod_cr.bin; mts_proper mts_c10_prod_cr.bin; bpmp_fw bpmp_t194.bin; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00.dtb; spe_fw spe_t194.bin; tlk tos-trusty_t194.img; eks eks.img; bootloader_dtb tegra194-p3668-all-p3509-0000.dtb" --external_device --key /mnt/keys//pkc.pem --encrypt_key /mnt/keys/sbk Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0076 ] Reading ramcode from backup chip_info.bin file [ 0.0078 ] RAMCODE Read from Device: 0 [ 0.0078 ] Disable BPMP dtb trim, using default dtb [ 0.0078 ] [ 0.0101 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0141 ] K[ 0.0261 ] ey size is 384 bytes [ 0.0271 ] Generating RCM messages [ 0.0301 ] tegrasign_v3.py --key /mnt/keys/sbk --file mb1_t194_prod.bin --offset 4096 [ 0.0315 ] Key is a SBK key [ 0.1226 ] Key Size is 16 bytes [ 0.1228 ] 246336 [ 0.1397 ] [ 0.1459 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod_encrypt.bin zerosbk [ 0.1474 ] Header already present for mb1_t194_prod_encrypt.bin [ 0.1567 ] [ 0.1598 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.1629 ] K[ 0.1633 ] ey size is 384 bytes [ 0.1667 ] tegrasign_v3.py --file mb1_t194_prod_encrypt_sigheader.bin --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem --length 1136 --offset 2960 --pubkeyhash pub_key.key [ 0.1697 ] K[ 0.1726 ] ey size is 384 bytes [ 0.2339 ] Saving pkc public key in pub_key.key [ 0.2339 ] Saving Montgomery values in montgomery.bin [ 0.2356 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin --updatesigheader mb1_t194_prod_encrypt_sigheader.bin mb1_t194_prod_encrypt_sigheader.sig oem-rsa [ 0.2384 ] [ 0.2449 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg sfuse.bin [ 0.2497 ] [ 0.2517 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.2523 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.2551 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.2551 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.2551 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.2551 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.2551 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.2551 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.2551 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.2551 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.2551 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.2552 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.2552 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.2552 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.2552 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.2552 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.2552 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.2552 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.2552 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.2552 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.2552 ] [ 0.2586 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_encrypt_sigheader.bin 0 0 [ 0.2595 ] RCM 0 is saved as rcm_0.rcm [ 0.2650 ] RCM 1 is saved as rcm_1.rcm [ 0.2651 ] RCM 2 is saved as rcm_2.rcm [ 0.2652 ] List of rcm files are saved in rcm_list.xml [ 0.2653 ] [ 0.2653 ] Signing RCM messages [ 0.2674 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem --list rcm_list.xml --pubkeyhash pub_key.key [ 0.2686 ] K[ 0.2697 ] ey size is 384 bytes [ 0.3771 ] Saving pkc public key in pub_key.key [ 0.3771 ] Saving Montgomery values in montgomery.bin [ 0.3770 ] Copying signature to RCM mesages [ 0.3791 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 0.3805 ] [ 0.3806 ] Parsing partition layout [ 0.3856 ] tegraparser_v2 --pt flash.xml.tmp [ 0.3910 ] [ 0.3911 ] Creating list of images to be signed [ 0.3930 ] tegrahost_v2 --chip 0x19 --partitionlayout flash.xml.bin --list images_list.xml --ratchet_blob ratchet_blob.bin [ 0.3936 ] adding BCH for recovery.img [ 0.5152 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb.rec [ 1.4023 ] adding BCH for boot.img [ 1.5051 ] adding BCH for boot.img [ 2.2571 ] adding BCH for kernel_tegra194-p3668-all-p3509-0000.dtb [ 3.0796 ] adding BCH for kernel_tegra194-p3668-all-p3509-0000.dtb [ 3.0976 ] [ 3.1008 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list images_list.xml --pubkeyhash pub_key.key [ 3.1025 ] Key size is 384 bytes [ 3.1817 ] Saving pkc public key in pub_key.key [ 3.5664 ] [ 3.5664 ] Generating br-bct [ 3.5686 ] Performing cfg overlay [ 3.5686 ] ['tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg', 'tegra194-memcfg-sw-override.cfg'] [ 3.5690 ] sw_memcfg_overlay.pl -c tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg -s tegra194-memcfg-sw-override.cfg -o /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/16272/tmpycqkel4y1.cfg [ 3.6052 ] [ 3.6053 ] Updating dev and MSS params in BR BCT [ 3.6054 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/16272/tmpycqkel4y1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 3.6536 ] [ 3.6536 ] Updating bl info [ 3.6555 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 3.6562 ] [ 3.6583 ] tegrahost_v2 --chip 0x19 --align recovery_sigheader.img [ 3.6590 ] [ 3.6591 ] header_magic: 4e564441 [ 3.6612 ] tegrasign_v3.py --key /mnt/keys/sbk --list recovery_sigheader.img_list.xml [ 3.6613 ] Key is a SBK key [ 3.6613 ] Key Size is 16 bytes [ 3.7405 ] 56137728 [ 5.0758 ] tegrahost_v2 --chip 0x19 0 --updatesigheader recovery_sigheader.img.encrypt recovery_sigheader.img.hash zerosbk [ 5.6438 ] [ 5.6472 ] tegrahost_v2 --chip 0x19 --align recovery_sigheader.img.encrypt [ 5.6491 ] [ 5.6494 ] header_magic: 4e564441 [ 5.6530 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list recovery_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 5.6562 ] K[ 5.6567 ] ey size is 384 bytes [ 5.8512 ] Saving pkc public key in pub_key.key [ 5.8548 ] tegrahost_v2 --chip 0x19 0 --updatesigheader recovery_sigheader.img.encrypt.signed recovery_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 6.4605 ] [ 6.6177 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000.dtb_sigheader.rec [ 6.6205 ] [ 6.6208 ] header_magic: 4e564441 [ 6.6255 ] tegrasign_v3.py --key /mnt/keys/sbk --list tegra194-p3668-all-p3509-0000.dtb_sigheader.rec_list.xml [ 6.6258 ] Key is a SBK key [ 6.6258 ] Key Size is 16 bytes [ 6.6277 ] 203248 [ 6.6441 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.hash zerosbk [ 6.6467 ] [ 6.6486 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt [ 6.6492 ] [ 6.6493 ] header_magic: 4e564441 [ 6.6514 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt_list.xml --pubkeyhash pub_key.key [ 6.6527 ] K[ 6.6529 ] ey size is 384 bytes [ 6.6901 ] Saving pkc public key in pub_key.key [ 6.6919 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt.signed tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 6.6943 ] [ 6.6965 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img [ 6.6971 ] [ 6.6972 ] header_magic: 4e564441 [ 6.6993 ] tegrasign_v3.py --key /mnt/keys/sbk --list boot_sigheader.img_list.xml [ 6.6994 ] Key is a SBK key [ 6.6994 ] Key Size is 16 bytes [ 6.7638 ] 45979648 [ 7.8733 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt boot_sigheader.img.hash zerosbk [ 8.3444 ] [ 8.3478 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img.encrypt [ 8.3497 ] [ 8.3500 ] header_magic: 4e564441 [ 8.3538 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list boot_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 8.3575 ] K[ 8.3581 ] ey size is 384 bytes [ 8.5181 ] Saving pkc public key in pub_key.key [ 8.5219 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt.signed boot_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 9.0280 ] [ 9.1378 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img [ 9.1404 ] [ 9.1407 ] header_magic: 4e564441 [ 9.1452 ] tegrasign_v3.py --key /mnt/keys/sbk --list boot_sigheader.img_list.xml [ 9.1455 ] Key is a SBK key [ 9.1455 ] Key Size is 16 bytes [ 9.2356 ] 45979648 [ 10.3310 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt boot_sigheader.img.hash zerosbk [ 10.9155 ] [ 10.9200 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img.encrypt [ 10.9228 ] [ 10.9232 ] header_magic: 4e564441 [ 10.9383 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list boot_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 10.9430 ] K[ 10.9654 ] ey size is 384 bytes [ 11.3035 ] Saving pkc public key in pub_key.key [ 11.3090 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt.signed boot_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 11.9742 ] [ 12.2191 ] tegrahost_v2 --chip 0x19 --align kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb [ 12.2224 ] [ 12.2229 ] header_magic: 4e564441 [ 12.2297 ] tegrasign_v3.py --key /mnt/keys/sbk --list kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 12.2302 ] Key is a SBK key [ 12.2302 ] Key Size is 16 bytes [ 12.2325 ] 203248 [ 12.2672 ] tegrahost_v2 --chip 0x19 0 --updatesigheader kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 12.2902 ] [ 12.2927 ] tegrahost_v2 --chip 0x19 --align kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 12.2938 ] [ 12.3099 ] header_magic: 4e564441 [ 12.3133 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 12.3163 ] K[ 12.3496 ] ey size is 384 bytes [ 12.4321 ] Saving pkc public key in pub_key.key [ 12.4364 ] tegrahost_v2 --chip 0x19 0 --updatesigheader kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 12.4591 ] [ 12.4644 ] tegrahost_v2 --chip 0x19 --align kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb [ 12.4676 ] [ 12.4679 ] header_magic: 4e564441 [ 12.4829 ] tegrasign_v3.py --key /mnt/keys/sbk --list kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 12.4831 ] Key is a SBK key [ 12.4831 ] Key Size is 16 bytes [ 12.4841 ] 203248 [ 12.5084 ] tegrahost_v2 --chip 0x19 0 --updatesigheader kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 12.5301 ] [ 12.5348 ] tegrahost_v2 --chip 0x19 --align kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 12.5376 ] [ 12.5380 ] header_magic: 4e564441 [ 12.5592 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 12.5651 ] K[ 12.5867 ] ey size is 384 bytes [ 12.6804 ] Saving pkc public key in pub_key.key [ 12.6824 ] tegrahost_v2 --chip 0x19 0 --updatesigheader kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 12.7004 ] [ 12.7267 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin [ 12.7297 ] [ 12.7436 ] header_magic: 50000ea [ 12.7498 ] tegrasign_v3.py --key /mnt/keys/sbk --list nvtboot_recovery_t194.bin_list.xml [ 12.7502 ] Key is a SBK key [ 12.7502 ] Key Size is 16 bytes [ 12.7598 ] 177056 [ 12.7879 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194.bin.encrypt nvtboot_recovery_t194.bin.hash zerosbk [ 12.7966 ] [ 12.7994 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin.encrypt [ 12.8012 ] [ 12.8014 ] header_magic: ac173d1e [ 12.8042 ] tegrahost_v2 --appendsigheader nvtboot_recovery_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MB2B --ratchet_blob ratchet_blob.bin [ 12.8060 ] adding BCH for nvtboot_recovery_t194.bin.encrypt [ 12.8144 ] [ 12.8179 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list nvtboot_recovery_t194.bin_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 12.8211 ] K[ 12.8343 ] ey size is 384 bytes [ 12.9273 ] Saving pkc public key in pub_key.key [ 12.9296 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194.bin_sigheader.encrypt.signed nvtboot_recovery_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 12.9354 ] [ 12.9378 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin [ 12.9387 ] [ 12.9388 ] header_magic: 9000014 [ 12.9411 ] tegrasign_v3.py --key /mnt/keys/sbk --list nvtboot_recovery_cpu_t194.bin_list.xml [ 12.9412 ] Key is a SBK key [ 12.9412 ] Key Size is 16 bytes [ 12.9418 ] 259968 [ 12.9553 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194.bin.encrypt nvtboot_recovery_cpu_t194.bin.hash zerosbk [ 12.9574 ] [ 12.9596 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin.encrypt [ 12.9606 ] [ 12.9607 ] header_magic: cb47d6e [ 12.9629 ] tegrahost_v2 --appendsigheader nvtboot_recovery_cpu_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid CPBL --ratchet_blob ratchet_blob.bin [ 12.9642 ] adding BCH for nvtboot_recovery_cpu_t194.bin.encrypt [ 12.9715 ] [ 12.9742 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list nvtboot_recovery_cpu_t194.bin_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 12.9763 ] K[ 12.9814 ] ey size is 384 bytes [ 13.0351 ] Saving pkc public key in pub_key.key [ 13.0371 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 13.0590 ] [ 13.0591 ] Copying signed file in /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x [ 13.0827 ] Generating br-bct [ 13.0849 ] Performing cfg overlay [ 13.0849 ] ['/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/16272/tmpycqkel4y1.cfg'] [ 13.0849 ] Updating dev and MSS params in BR BCT [ 13.0850 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/16272/tmpycqkel4y1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 13.1756 ] [ 13.1756 ] Updating bl info [ 13.1779 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 13.1960 ] [ 13.1963 ] nvtboot_recovery_t194.bin_sigheader.encrypt.signed [ 13.1969 ] preboot_c10_prod_cr.bin [ 13.2141 ] mce_c10_prod_cr.bin [ 13.2318 ] mts_c10_prod_cr.bin [ 13.2519 ] bpmp_t194.bin [ 13.2622 ] tegra194-a02-bpmp-p3668-a00.dtb [ 13.2663 ] spe_t194.bin [ 13.2685 ] tos-trusty_t194.img [ 13.2711 ] eks.img [ 13.2727 ] tegra194-p3668-all-p3509-0000.dtb [ 13.2735 ] nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed [ 13.2783 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 13.2806 ] [ 13.2819 ] header_magic: 4e564441 [ 13.2863 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mb1_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 13.2907 ] K[ 13.2914 ] ey size is 384 bytes [ 13.3582 ] Saving pkc public key in pub_key.key [ 13.3600 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 13.3689 ] [ 13.3714 ] tegraparser_v2 --generategpt --pt flash.xml.bin [ 13.3723 ] [ 13.3775 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/flash.xml.tmp flash.idx [ 14.5165 ] ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed --bct br_bct_BR.bct --applet rcm_2_signed.rcm --applet_softfuse rcm_1_signed.rcm --cmd "secureflash;reboot" --cfg secureflash.xml --chip 0x19 --mb1_bct mb1_bct_MB1.bct_sigheader.encrypt.signed --mem_bct mem_rcm.bct_sigheader.encrypt.signed --mb1_cold_boot_bct mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed --mem_bct_cold_boot mem_coldboot_sigheader.bct.signed --bins "mb2_bootloader nvtboot_recovery_t194.bin_sigheader.encrypt.signed; mts_preboot preboot_c10_prod_cr_sigheader.bin.encrypt.signed; mts_mce mce_c10_prod_cr_sigheader.bin.encrypt.signed; mts_proper mts_c10_prod_cr_sigheader.bin.encrypt.signed; bpmp_fw bpmp_t194_sigheader.bin.encrypt.signed; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed; spe_fw spe_t194_sigheader.bin.encrypt.signed; tlk tos-trusty_t194_sigheader.img.encrypt.signed; eks eks_sigheader.img.encrypt.signed; bootloader_dtb tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed" saving flash command in flashcmd.txt *** no-flash flag enabled. Exiting now... *** User can run above saved command in factory environment without providing pkc and sbk keys to flash a device Example: $ cd bootloader $ sudo bash ./flashcmd.txt '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/flash.idx' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/flash.idx' Flash index file is /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/flash.idx Number of lines is 15 max_index=14 Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mbr_9_0.bin /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/mbr_9_0.bin '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mbr_9_0.bin' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/mbr_9_0.bin' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/gpt_primary_9_0.bin /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/gpt_primary_9_0.bin '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/gpt_primary_9_0.bin' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/gpt_primary_9_0.bin' Copying APP image into /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/system_boot.img.raw Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/system_root_encrypted.img_ext /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/system_root_encrypted.img_ext '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/system_root_encrypted.img_ext' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/system_root_encrypted.img_ext' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/recovery_sigheader.img.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/recovery_sigheader.img.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/recovery_sigheader.img.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/recovery_sigheader.img.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/kernel_bootctrl.bin /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/kernel_bootctrl.bin '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/kernel_bootctrl.bin' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/kernel_bootctrl.bin' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/kernel_bootctrl.bin /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/kernel_bootctrl.bin '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/kernel_bootctrl.bin' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/kernel_bootctrl.bin' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/boot_sigheader.img.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/boot_sigheader.img.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/boot_sigheader.img.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/boot_sigheader.img.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/boot_sigheader.img.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/boot_sigheader.img.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/boot_sigheader.img.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/boot_sigheader.img.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed' Warning: skip writing RECROOTFS partition as no image is specified Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/system_uda_encrypted.img_ext /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/system_uda_encrypted.img_ext '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/system_uda_encrypted.img_ext' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/system_uda_encrypted.img_ext' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/gpt_secondary_9_0.bin /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/gpt_secondary_9_0.bin '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/gpt_secondary_9_0.bin' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/external/gpt_secondary_9_0.bin' Skip generating internal storage images Copy flash script to /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/l4t_flash_from_kernel.sh' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/l4t_flash_from_kernel.sh' Success ****************************************** * * * Step 2: Generate rcm boot commandline * * * ****************************************** /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/flash.sh -u "/mnt/keys//pkc.pem" -v "/mnt/keys//sbk" --no-flash --rcm-boot jetson-xavier-nx-devkit-emmc mmcblk0p1 ############################################################################### # L4T BSP Information: # R32 , REVISION: 7.1 ############################################################################### Change device boot from mmcblk0p1 to internal sbk_keyfile is present, but no user_keyfile; set user_keyfile to zero keyfile Board ID(3668) version(300) sku(0001) revision(B.0) Copy /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb to /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb.rec Using UUID e24aa370-f732-4e7c-bb1a-3cb0d4e06b7d for mounting root APP partition. Using UUID a60a6b5f-af04-4e08-9202-76d505badda0 for mounting root APP_enc partition. Using UUID a7a00014-cfe0-4bdc-9d90-cafdec386715 for mounting boot APP partition. copying bctfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg)... done. copying bctfile1(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-memcfg-sw-override.cfg)... done. copying minratchet_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-ratchet-p3668.cfg)... done. copying device_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-bct-device-qspi-p3668.cfg)... done. copying misc_cold_boot_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-l4t.cfg)... done. copying misc_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-flash.cfg)... done. copying pinmux_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-pinmux-p3668-a01.cfg)... done. copying gpioint_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg)... done. copying pmic_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-pmic-p3668-0001-a00.cfg)... done. copying pmc_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-padvoltage-p3668-a01.cfg)... done. copying prod_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-prod-p3668-0001-a00.cfg)... done. copying scr_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying scr_cold_boot_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying bootrom_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-reset-p3668-0001-a00.cfg)... done. copying dev_params(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-br-bct-qspi.cfg)... done. Skip generating encrypted UDA partition Existing bootloader(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. copying initrd(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/l4t_initrd.img)... done. prepare_luks_initrd: Begin to copy binaries into initrd 30412 blocks 49600 blocks prepare_luks_initrd: Finish copying binaries into initrd done. Making Boot image... done. /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /mnt/keys//pkc.pem --encrypt_key /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/.zero_.key --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign boot.img kernel Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0012 ] Generating signature [ 0.0049 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0082 ] K[ 0.0087 ] ey size is 384 bytes [ 0.0126 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem [ 0.0158 ] K[ 0.0188 ] ey size is 384 bytes [ 0.0191 ] Saving Montgomery values in montgomery.bin [ 0.0186 ] Generating ratchet blob [ 0.0214 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0228 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0232 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0233 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0233 ] [ 0.0234 ] header_magic: 414e4452 [ 0.0236 ] Encrypting file [ 0.0264 ] tegrahost_v2 --chip 0x19 --align 1_boot.img [ 0.0279 ] [ 0.0281 ] header_magic: 414e4452 [ 0.0329 ] tegrasign_v3.py --key /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/.zero_.key --list 1_boot.img_list.xml [ 0.0331 ] Key is a SBK key [ 0.0331 ] Key Size is 16 bytes [ 0.5466 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot.img.encrypt 1_boot.img.hash zerosbk [ 0.7509 ] [ 0.7545 ] tegrahost_v2 --chip 0x19 --align 1_boot.img.encrypt [ 0.7563 ] [ 0.7566 ] header_magic: 414e4452 [ 0.7598 ] tegrahost_v2 --appendsigheader 1_boot.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid KRNL --ratchet_blob ratchet_blob.bin [ 0.7614 ] adding BCH for 1_boot.img.encrypt [ 1.5077 ] [ 1.5106 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list 1_boot.img_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 1.5118 ] K[ 1.5120 ] ey size is 384 bytes [ 1.5832 ] Saving pkc public key in pub_key.key [ 1.5847 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot.img_sigheader.encrypt.signed 1_boot.img_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.0605 ] [ 2.0924 ] Signed and encrypted file: /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/boot.img_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for boot.img_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x2bd9800 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot.img_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt.signed done. Making recovery ramdisk for recovery image... Re-generating recovery ramdisk for recovery image... ~/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp ~/workspace/d4t/work/Linux_for_Tegra/bootloader ~/workspace/d4t/work/Linux_for_Tegra 30412 blocks _BASE_KERNEL_VERSION=4.9.253-tegra cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/usr/lib/aarch64-linux-gnu/libpcsclite.so.1': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/usr/lib/aarch64-linux-gnu/libpcsclite.so.1 /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//lib/libpcsclite.so.1 cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/sbin/wpa_supplicant': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/sbin/wpa_supplicant /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//sbin/wpa_supplicant cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/action_wpa.sh': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/action_wpa.sh /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//etc/wpa_supplicant/action_wpa.sh cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/functions.sh': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/functions.sh /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//etc/wpa_supplicant/functions.sh cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/ifupdown.sh': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/ifupdown.sh /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//etc/wpa_supplicant/ifupdown.sh ~/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp/lib ~/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp ~/workspace/d4t/work/Linux_for_Tegra/bootloader ~/workspace/d4t/work/Linux_for_Tegra 111519 blocks Making Recovery image... copying recdtbfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb.rec)... done. 20+0 records in 20+0 records out 20 bytes copied, 0.000327384 s, 61.1 kB/s Existing sosfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing tegraboot(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_t194.bin) reused. Existing cpu_bootloader(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. Existing mb2blfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_recovery_t194.bin) reused. Existing mtspreboot(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/preboot_c10_prod_cr.bin) reused. Existing mcepreboot(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mce_c10_prod_cr.bin) reused. Existing mtsproper(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mts_c10_prod_cr.bin) reused. Existing mb1file(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing bpffile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/bpmp_t194.bin) reused. copying bpfdtbfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/tegra194-a02-bpmp-p3668-a00.dtb)... done. Existing scefile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. Existing camerafw(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/camera-rtcpu-rce.img) reused. Existing spefile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/spe_t194.bin) reused. Existing wb0boot(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/warmboot_t194_prod.bin) reused. Existing tosfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tos-trusty_t194.img) reused. Existing eksfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/eks.img) reused. copying soft_fuses(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. copying dtbfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb)... done. Copying nv_boot_control.conf to rootfs /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /mnt/keys//pkc.pem --encrypt_key /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/.zero_.key --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign kernel_tegra194-p3668-all-p3509-0000.dtb kernel_dtb Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0005 ] Generating signature [ 0.0027 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0040 ] K[ 0.0042 ] ey size is 384 bytes [ 0.0065 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem [ 0.0077 ] K[ 0.0087 ] ey size is 384 bytes [ 0.0089 ] Saving Montgomery values in montgomery.bin [ 0.0088 ] Generating ratchet blob [ 0.0107 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0113 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0115 ] [ 0.0117 ] header_magic: d00dfeed [ 0.0118 ] Encrypting file [ 0.0136 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p3668-all-p3509-0000.dtb [ 0.0142 ] [ 0.0143 ] header_magic: d00dfeed [ 0.0167 ] tegrasign_v3.py --key /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/.zero_.key --list 1_kernel_tegra194-p3668-all-p3509-0000.dtb_list.xml [ 0.0168 ] Key is a SBK key [ 0.0168 ] Key Size is 16 bytes [ 0.0227 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt 1_kernel_tegra194-p3668-all-p3509-0000.dtb.hash zerosbk [ 0.0236 ] [ 0.0255 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt [ 0.0261 ] [ 0.0262 ] header_magic: d00dfeed [ 0.0280 ] tegrahost_v2 --appendsigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid KDTB --ratchet_blob ratchet_blob.bin [ 0.0285 ] adding BCH for 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt [ 0.0322 ] [ 0.0343 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.0354 ] K[ 0.0357 ] ey size is 384 bytes [ 0.0714 ] Saving pkc public key in pub_key.key [ 0.0732 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 0.0756 ] [ 0.0760 ] Signed and encrypted file: /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x319e1 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed done. Skip generating system_boot.img & system_root_encrypted.img Existing tbcfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/cboot_t194.bin) reused. copying tbcdtbfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb)... done. copying cfgfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t194_spi_emmc_p3668_enc_rfs.xml) to flash.xml... done. Existing flasher(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu_t194.bin) reused. Existing flashapp(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py) reused. ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin --sdram_config tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg,tegra194-memcfg-sw-override.cfg --odmdata 0xB8190000 --applet mb1_t194_prod.bin --cmd "sign" --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --cfg flash.xml --chip 0x19 --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --device_config tegra19x-mb1-bct-device-qspi-p3668.cfg --misc_cold_boot_config tegra194-mb1-bct-misc-l4t.cfg --misc_config tegra194-mb1-bct-misc-flash.cfg --pinmux_config tegra19x-mb1-pinmux-p3668-a01.cfg --gpioint_config tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --pmic_config tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --pmc_config tegra19x-mb1-padvoltage-p3668-a01.cfg --prod_config tegra19x-mb1-prod-p3668-0001-a00.cfg --scr_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --scr_cold_boot_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --br_cmd_config tegra194-mb1-bct-reset-p3668-0001-a00.cfg --dev_params tegra194-br-bct-qspi.cfg --bin "mb2_bootloader nvtboot_recovery_t194.bin; mts_preboot preboot_c10_prod_cr.bin; mts_mce mce_c10_prod_cr.bin; mts_proper mts_c10_prod_cr.bin; bpmp_fw bpmp_t194.bin; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00.dtb; spe_fw spe_t194.bin; tlk tos-trusty_t194.img; eks eks.img; kernel boot.img; kernel_dtb tegra194-p3668-all-p3509-0000.dtb; bootloader_dtb tegra194-p3668-all-p3509-0000.dtb" --key /mnt/keys//pkc.pem --encrypt_key /mnt/keys/sbk Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0084 ] Using default ramcode: 0 [ 0.0084 ] Disable BPMP dtb trim, using default dtb [ 0.0084 ] [ 0.0105 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0118 ] K[ 0.0120 ] ey size is 384 bytes [ 0.0124 ] Generating RCM messages [ 0.0141 ] tegrasign_v3.py --key /mnt/keys/sbk --file mb1_t194_prod.bin --offset 4096 [ 0.0147 ] Key is a SBK key [ 0.0335 ] Key Size is 16 bytes [ 0.0337 ] 246336 [ 0.0407 ] [ 0.0428 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod_encrypt.bin zerosbk [ 0.0434 ] Header already present for mb1_t194_prod_encrypt.bin [ 0.0458 ] [ 0.0478 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0491 ] K[ 0.0493 ] ey size is 384 bytes [ 0.0514 ] tegrasign_v3.py --file mb1_t194_prod_encrypt_sigheader.bin --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem --length 1136 --offset 2960 --pubkeyhash pub_key.key [ 0.0526 ] Ke[ 0.0537 ] y size is 384 bytes [ 0.0908 ] Saving pkc public key in pub_key.key [ 0.0908 ] Saving Montgomery values in montgomery.bin [ 0.0925 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin --updatesigheader mb1_t194_prod_encrypt_sigheader.bin mb1_t194_prod_encrypt_sigheader.sig oem-rsa [ 0.0952 ] [ 0.0971 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg sfuse.bin [ 0.0978 ] [ 0.0996 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.1002 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.1004 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.1004 ] [ 0.1022 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_encrypt_sigheader.bin 0 0 [ 0.1028 ] RCM 0 is saved as rcm_0.rcm [ 0.1050 ] RCM 1 is saved as rcm_1.rcm [ 0.1051 ] RCM 2 is saved as rcm_2.rcm [ 0.1051 ] List of rcm files are saved in rcm_list.xml [ 0.1051 ] [ 0.1051 ] Signing RCM messages [ 0.1071 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem --list rcm_list.xml --pubkeyhash pub_key.key [ 0.1082 ] K[ 0.1095 ] ey size is 384 bytes [ 0.2147 ] Saving pkc public key in pub_key.key [ 0.2147 ] Saving Montgomery values in montgomery.bin [ 0.2146 ] Copying signature to RCM mesages [ 0.2165 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 0.2175 ] [ 0.2176 ] Parsing partition layout [ 0.2195 ] tegraparser_v2 --pt flash.xml.tmp [ 0.2205 ] [ 0.2205 ] Creating list of images to be signed [ 0.2224 ] tegrahost_v2 --chip 0x19 --partitionlayout flash.xml.bin --list images_list.xml --ratchet_blob ratchet_blob.bin [ 0.2230 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.2234 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.2239 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.2261 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.2266 ] adding BCH for spe_t194.bin [ 0.2288 ] adding BCH for spe_t194.bin [ 0.2304 ] adding BCH for nvtboot_t194.bin [ 0.2320 ] adding BCH for nvtboot_t194.bin [ 0.2349 ] Header already present for preboot_c10_prod_cr.bin [ 0.2380 ] Header already present for preboot_c10_prod_cr.bin [ 0.2383 ] Header already present for mce_c10_prod_cr.bin [ 0.2386 ] Header already present for mce_c10_prod_cr.bin [ 0.2399 ] adding BCH for mts_c10_prod_cr.bin [ 0.2426 ] adding BCH for mts_c10_prod_cr.bin [ 0.2977 ] Header already present for warmboot_t194_prod.bin [ 0.3517 ] Header already present for warmboot_t194_prod.bin [ 0.3523 ] adding BCH for xusb_sil_rel_fw [ 0.3635 ] adding BCH for xusb_sil_rel_fw [ 0.3656 ] adding BCH for cboot_t194.bin [ 0.3679 ] adding BCH for cboot_t194.bin [ 0.3754 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb [ 0.3829 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb [ 0.3863 ] adding BCH for tos-trusty_t194.img [ 0.3896 ] adding BCH for tos-trusty_t194.img [ 0.3959 ] adding BCH for eks.img [ 0.4023 ] adding BCH for eks.img [ 0.4024 ] adding BCH for adsp-fw.bin [ 0.4046 ] adding BCH for adsp-fw.bin [ 0.4060 ] adding BCH for camera-rtcpu-rce.img [ 0.4074 ] adding BCH for camera-rtcpu-rce.img [ 0.4117 ] adding BCH for bpmp_t194.bin [ 0.4163 ] adding BCH for bpmp_t194.bin [ 0.4300 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 0.4438 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 0.4500 ] adding BCH for boot.img [ 0.4768 ] adding BCH for boot.img [ 1.2173 ] adding BCH for kernel_tegra194-p3668-all-p3509-0000.dtb [ 2.0324 ] adding BCH for kernel_tegra194-p3668-all-p3509-0000.dtb [ 2.0414 ] adding BCH for recovery.img [ 2.0870 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb.rec [ 2.9698 ] [ 2.9717 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list images_list.xml --pubkeyhash pub_key.key [ 2.9722 ] Key size is 384 bytes [ 3.0233 ] Saving pkc public key in pub_key.key [ 4.5300 ] [ 4.5300 ] Generating br-bct [ 4.5320 ] Performing cfg overlay [ 4.5320 ] ['tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg', 'tegra194-memcfg-sw-override.cfg'] [ 4.5324 ] sw_memcfg_overlay.pl -c tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg -s tegra194-memcfg-sw-override.cfg -o /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1.cfg [ 4.5591 ] [ 4.5592 ] Updating dev and MSS params in BR BCT [ 4.5592 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 4.6077 ] [ 4.6078 ] Updating bl info [ 4.6105 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 4.6138 ] [ 4.6172 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin [ 4.6183 ] [ 4.6186 ] header_magic: 4e564441 [ 4.6215 ] tegrasign_v3.py --key /mnt/keys/sbk --list mb1_t194_prod_sigheader.bin_list.xml [ 4.6217 ] Key is a SBK key [ 4.6217 ] Key Size is 16 bytes [ 4.6229 ] 246336 [ 4.6369 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt mb1_t194_prod_sigheader.bin.hash zerosbk [ 4.6397 ] [ 4.6416 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 4.6422 ] [ 4.6423 ] header_magic: 4e564441 [ 4.6444 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mb1_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 4.6457 ] K[ 4.6459 ] ey size is 384 bytes [ 4.6816 ] Saving pkc public key in pub_key.key [ 4.6834 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.6861 ] [ 4.6885 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin [ 4.6890 ] [ 4.6891 ] header_magic: 4e564441 [ 4.6913 ] tegrasign_v3.py --key /mnt/keys/sbk --list mb1_t194_prod_sigheader.bin_list.xml [ 4.6914 ] Key is a SBK key [ 4.6914 ] Key Size is 16 bytes [ 4.6919 ] 246336 [ 4.7021 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt mb1_t194_prod_sigheader.bin.hash zerosbk [ 4.7048 ] [ 4.7068 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 4.7074 ] [ 4.7075 ] header_magic: 4e564441 [ 4.7097 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mb1_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 4.7110 ] K[ 4.7113 ] ey size is 384 bytes [ 4.7472 ] Saving pkc public key in pub_key.key [ 4.7491 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.7518 ] [ 4.7541 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin [ 4.7547 ] [ 4.7548 ] header_magic: 4e564441 [ 4.7569 ] tegrasign_v3.py --key /mnt/keys/sbk --list spe_t194_sigheader.bin_list.xml [ 4.7570 ] Key is a SBK key [ 4.7570 ] Key Size is 16 bytes [ 4.7574 ] 90864 [ 4.7644 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 4.7658 ] [ 4.7678 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin.encrypt [ 4.7684 ] [ 4.7685 ] header_magic: 4e564441 [ 4.7707 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list spe_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 4.7719 ] K[ 4.7721 ] ey size is 384 bytes [ 4.8085 ] Saving pkc public key in pub_key.key [ 4.8103 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt.signed spe_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.8117 ] [ 4.8138 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin [ 4.8144 ] [ 4.8145 ] header_magic: 4e564441 [ 4.8166 ] tegrasign_v3.py --key /mnt/keys/sbk --list spe_t194_sigheader.bin_list.xml [ 4.8167 ] Key is a SBK key [ 4.8167 ] Key Size is 16 bytes [ 4.8170 ] 90864 [ 4.8237 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 4.8252 ] [ 4.8272 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin.encrypt [ 4.8278 ] [ 4.8278 ] header_magic: 4e564441 [ 4.8300 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list spe_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 4.8313 ] K[ 4.8315 ] ey size is 384 bytes [ 4.8679 ] Saving pkc public key in pub_key.key [ 4.8697 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt.signed spe_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.8712 ] [ 4.8732 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin [ 4.8738 ] [ 4.8739 ] header_magic: 4e564441 [ 4.8760 ] tegrasign_v3.py --key /mnt/keys/sbk --list nvtboot_t194_sigheader.bin_list.xml [ 4.8761 ] Key is a SBK key [ 4.8761 ] Key Size is 16 bytes [ 4.8766 ] 177232 [ 4.8859 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt nvtboot_t194_sigheader.bin.hash zerosbk [ 4.8882 ] [ 4.8901 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin.encrypt [ 4.8907 ] [ 4.8908 ] header_magic: 4e564441 [ 4.8930 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list nvtboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 4.8943 ] K[ 4.8945 ] ey size is 384 bytes [ 4.9311 ] Saving pkc public key in pub_key.key [ 4.9329 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt.signed nvtboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.9351 ] [ 4.9373 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin [ 4.9379 ] [ 4.9380 ] header_magic: 4e564441 [ 4.9401 ] tegrasign_v3.py --key /mnt/keys/sbk --list nvtboot_t194_sigheader.bin_list.xml [ 4.9402 ] Key is a SBK key [ 4.9402 ] Key Size is 16 bytes [ 4.9407 ] 177232 [ 4.9493 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt nvtboot_t194_sigheader.bin.hash zerosbk [ 4.9515 ] [ 4.9534 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin.encrypt [ 4.9540 ] [ 4.9541 ] header_magic: 4e564441 [ 4.9562 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list nvtboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 4.9575 ] K[ 4.9577 ] ey size is 384 bytes [ 4.9927 ] Saving pkc public key in pub_key.key [ 4.9945 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt.signed nvtboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.9967 ] [ 4.9989 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin [ 4.9995 ] [ 4.9996 ] header_magic: 4e564441 [ 5.0017 ] tegrasign_v3.py --key /mnt/keys/sbk --list preboot_c10_prod_cr_sigheader.bin_list.xml [ 5.0018 ] Key is a SBK key [ 5.0018 ] Key Size is 16 bytes [ 5.0020 ] 19920 [ 5.0073 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 5.0082 ] [ 5.0100 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin.encrypt [ 5.0106 ] [ 5.0107 ] header_magic: 4e564441 [ 5.0128 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list preboot_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 5.0140 ] K[ 5.0142 ] ey size is 384 bytes [ 5.0495 ] Saving pkc public key in pub_key.key [ 5.0513 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt.signed preboot_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 5.0522 ] [ 5.0542 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin [ 5.0548 ] [ 5.0549 ] header_magic: 4e564441 [ 5.0570 ] tegrasign_v3.py --key /mnt/keys/sbk --list preboot_c10_prod_cr_sigheader.bin_list.xml [ 5.0571 ] Key is a SBK key [ 5.0571 ] Key Size is 16 bytes [ 5.0573 ] 19920 [ 5.0626 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 5.0635 ] [ 5.0653 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin.encrypt [ 5.0660 ] [ 5.0661 ] header_magic: 4e564441 [ 5.0682 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list preboot_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 5.0695 ] K[ 5.0697 ] ey size is 384 bytes [ 5.1046 ] Saving pkc public key in pub_key.key [ 5.1063 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt.signed preboot_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 5.1072 ] [ 5.1092 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin [ 5.1098 ] [ 5.1099 ] header_magic: 4e564441 [ 5.1120 ] tegrasign_v3.py --key /mnt/keys/sbk --list mce_c10_prod_cr_sigheader.bin_list.xml [ 5.1121 ] Key is a SBK key [ 5.1121 ] Key Size is 16 bytes [ 5.1126 ] 139104 [ 5.1204 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 5.1223 ] [ 5.1242 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin.encrypt [ 5.1248 ] [ 5.1249 ] header_magic: 4e564441 [ 5.1271 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mce_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 5.1283 ] K[ 5.1286 ] ey size is 384 bytes [ 5.1629 ] Saving pkc public key in pub_key.key [ 5.1646 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt.signed mce_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 5.1665 ] [ 5.1685 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin [ 5.1691 ] [ 5.1692 ] header_magic: 4e564441 [ 5.1713 ] tegrasign_v3.py --key /mnt/keys/sbk --list mce_c10_prod_cr_sigheader.bin_list.xml [ 5.1714 ] Key is a SBK key [ 5.1714 ] Key Size is 16 bytes [ 5.1718 ] 139104 [ 5.1796 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 5.1815 ] [ 5.1834 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin.encrypt [ 5.1840 ] [ 5.1841 ] header_magic: 4e564441 [ 5.1864 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mce_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 5.1876 ] K[ 5.1878 ] ey size is 384 bytes [ 5.2232 ] Saving pkc public key in pub_key.key [ 5.2250 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt.signed mce_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 5.2268 ] [ 5.2289 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin [ 5.2295 ] [ 5.2296 ] header_magic: 4e564441 [ 5.2318 ] tegrasign_v3.py --key /mnt/keys/sbk --list mts_c10_prod_cr_sigheader.bin_list.xml [ 5.2318 ] Key is a SBK key [ 5.2318 ] Key Size is 16 bytes [ 5.2366 ] 3426320 [ 5.3173 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 5.3470 ] [ 5.3492 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin.encrypt [ 5.3498 ] [ 5.3499 ] header_magic: 4e564441 [ 5.3521 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mts_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 5.3534 ] K[ 5.3536 ] ey size is 384 bytes [ 5.3913 ] Saving pkc public key in pub_key.key [ 5.3933 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt.signed mts_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 5.4228 ] [ 5.4275 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin [ 5.4282 ] [ 5.4282 ] header_magic: 4e564441 [ 5.4305 ] tegrasign_v3.py --key /mnt/keys/sbk --list mts_c10_prod_cr_sigheader.bin_list.xml [ 5.4306 ] Key is a SBK key [ 5.4306 ] Key Size is 16 bytes [ 5.4352 ] 3426320 [ 5.5164 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 5.5459 ] [ 5.5480 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin.encrypt [ 5.5486 ] [ 5.5487 ] header_magic: 4e564441 [ 5.5509 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mts_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 5.5521 ] K[ 5.5524 ] ey size is 384 bytes [ 5.6010 ] Saving pkc public key in pub_key.key [ 5.6031 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt.signed mts_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 5.6344 ] [ 5.6394 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin [ 5.6400 ] [ 5.6401 ] header_magic: 4e564441 [ 5.6424 ] tegrasign_v3.py --key /mnt/keys/sbk --list warmboot_t194_prod_sigheader.bin_list.xml [ 5.6425 ] Key is a SBK key [ 5.6425 ] Key Size is 16 bytes [ 5.6428 ] 61408 [ 5.6493 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt warmboot_t194_prod_sigheader.bin.hash zerosbk [ 5.9900 ] [ 5.9945 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin.encrypt [ 5.9972 ] [ 5.9976 ] header_magic: 4e564441 [ 6.0022 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list warmboot_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 6.0068 ] K[ 6.0075 ] ey size is 384 bytes [ 6.0515 ] Saving pkc public key in pub_key.key [ 6.0534 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt.signed warmboot_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 6.0808 ] [ 6.0846 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin [ 6.0862 ] [ 6.0864 ] header_magic: 4e564441 [ 6.0900 ] tegrasign_v3.py --key /mnt/keys/sbk --list warmboot_t194_prod_sigheader.bin_list.xml [ 6.0902 ] Key is a SBK key [ 6.0902 ] Key Size is 16 bytes [ 6.0910 ] 61408 [ 6.1059 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt warmboot_t194_prod_sigheader.bin.hash zerosbk [ 6.1092 ] [ 6.1123 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin.encrypt [ 6.1139 ] [ 6.1142 ] header_magic: 4e564441 [ 6.1177 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list warmboot_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 6.1211 ] K[ 6.1217 ] ey size is 384 bytes [ 6.1850 ] Saving pkc public key in pub_key.key [ 6.1869 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt.signed warmboot_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 6.1943 ] [ 6.1968 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader [ 6.1975 ] [ 6.1976 ] header_magic: 4e564441 [ 6.1998 ] tegrasign_v3.py --key /mnt/keys/sbk --list xusb_sil_rel_fw_sigheader_list.xml [ 6.1999 ] Key is a SBK key [ 6.1999 ] Key Size is 16 bytes [ 6.2002 ] 129024 [ 6.2080 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt xusb_sil_rel_fw_sigheader.hash zerosbk [ 6.2151 ] [ 6.2176 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader.encrypt [ 6.2183 ] [ 6.2184 ] header_magic: 4e564441 [ 6.2206 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list xusb_sil_rel_fw_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 6.2220 ] K[ 6.2222 ] ey size is 384 bytes [ 6.4056 ] Saving pkc public key in pub_key.key [ 6.4102 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt.signed xusb_sil_rel_fw_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 6.4177 ] [ 6.4222 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader [ 6.4243 ] [ 6.4246 ] header_magic: 4e564441 [ 6.4287 ] tegrasign_v3.py --key /mnt/keys/sbk --list xusb_sil_rel_fw_sigheader_list.xml [ 6.4290 ] Key is a SBK key [ 6.4290 ] Key Size is 16 bytes [ 6.4301 ] 129024 [ 6.4497 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt xusb_sil_rel_fw_sigheader.hash zerosbk [ 6.5837 ] [ 6.5876 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader.encrypt [ 6.5896 ] [ 6.5899 ] header_magic: 4e564441 [ 6.5939 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list xusb_sil_rel_fw_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 6.5976 ] K[ 6.5983 ] ey size is 384 bytes [ 6.6640 ] Saving pkc public key in pub_key.key [ 6.6658 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt.signed xusb_sil_rel_fw_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 6.6676 ] [ 6.6697 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin [ 6.6704 ] [ 6.6704 ] header_magic: 4e564441 [ 6.6726 ] tegrasign_v3.py --key /mnt/keys/sbk --list cboot_t194_sigheader.bin_list.xml [ 6.6727 ] Key is a SBK key [ 6.6727 ] Key Size is 16 bytes [ 6.6734 ] 466912 [ 6.6882 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt cboot_t194_sigheader.bin.hash zerosbk [ 6.6929 ] [ 6.6949 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin.encrypt [ 6.6955 ] [ 6.6956 ] header_magic: 4e564441 [ 6.6978 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list cboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 6.6991 ] K[ 6.6993 ] ey size is 384 bytes [ 6.7347 ] Saving pkc public key in pub_key.key [ 6.7365 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt.signed cboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 6.7411 ] [ 6.7435 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin [ 6.7441 ] [ 6.7442 ] header_magic: 4e564441 [ 6.7464 ] tegrasign_v3.py --key /mnt/keys/sbk --list cboot_t194_sigheader.bin_list.xml [ 6.7465 ] Key is a SBK key [ 6.7465 ] Key Size is 16 bytes [ 6.7472 ] 466912 [ 6.7624 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt cboot_t194_sigheader.bin.hash zerosbk [ 6.7670 ] [ 6.7689 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin.encrypt [ 6.7695 ] [ 6.7696 ] header_magic: 4e564441 [ 6.7717 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list cboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 6.7731 ] K[ 6.7733 ] ey size is 384 bytes [ 6.8101 ] Saving pkc public key in pub_key.key [ 6.8119 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt.signed cboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 6.8165 ] [ 6.8189 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb [ 6.8195 ] [ 6.8196 ] header_magic: 4e564441 [ 6.8218 ] tegrasign_v3.py --key /mnt/keys/sbk --list tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 6.8218 ] Key is a SBK key [ 6.8218 ] Key Size is 16 bytes [ 6.8223 ] 203248 [ 6.8316 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 6.8340 ] [ 6.8360 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 6.8366 ] [ 6.8367 ] header_magic: 4e564441 [ 6.8389 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 6.8402 ] K[ 6.8406 ] ey size is 384 bytes [ 6.8769 ] Saving pkc public key in pub_key.key [ 6.8786 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 6.8811 ] [ 6.8833 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb [ 6.8840 ] [ 6.8840 ] header_magic: 4e564441 [ 6.8862 ] tegrasign_v3.py --key /mnt/keys/sbk --list tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 6.8863 ] Key is a SBK key [ 6.8863 ] Key Size is 16 bytes [ 6.8868 ] 203248 [ 6.8961 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 6.8985 ] [ 6.9004 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 6.9011 ] [ 6.9012 ] header_magic: 4e564441 [ 6.9034 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 6.9047 ] Ke[ 6.9049 ] y size is 384 bytes [ 6.9399 ] Saving pkc public key in pub_key.key [ 6.9419 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 6.9443 ] [ 6.9465 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img [ 6.9471 ] [ 6.9472 ] header_magic: 4e564441 [ 6.9493 ] tegrasign_v3.py --key /mnt/keys/sbk --list tos-trusty_t194_sigheader.img_list.xml [ 6.9494 ] Key is a SBK key [ 6.9494 ] Key Size is 16 bytes [ 6.9501 ] 406464 [ 6.9636 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 6.9678 ] [ 6.9698 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img.encrypt [ 6.9704 ] [ 6.9706 ] header_magic: 4e564441 [ 6.9727 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tos-trusty_t194_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 6.9740 ] K[ 6.9742 ] ey size is 384 bytes [ 7.0128 ] Saving pkc public key in pub_key.key [ 7.0146 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt.signed tos-trusty_t194_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 7.0187 ] [ 7.0210 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img [ 7.0217 ] [ 7.0218 ] header_magic: 4e564441 [ 7.0240 ] tegrasign_v3.py --key /mnt/keys/sbk --list tos-trusty_t194_sigheader.img_list.xml [ 7.0240 ] Key is a SBK key [ 7.0240 ] Key Size is 16 bytes [ 7.0247 ] 406464 [ 7.0383 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 7.0447 ] [ 7.0467 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img.encrypt [ 7.0474 ] [ 7.0475 ] header_magic: 4e564441 [ 7.0497 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tos-trusty_t194_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 7.0511 ] K[ 7.0514 ] ey size is 384 bytes [ 7.0954 ] Saving pkc public key in pub_key.key [ 7.0975 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt.signed tos-trusty_t194_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 7.1016 ] [ 7.1039 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img [ 7.1046 ] [ 7.1047 ] header_magic: 4e564441 [ 7.1069 ] tegrasign_v3.py --key /mnt/keys/sbk --list eks_sigheader.img_list.xml [ 7.1070 ] Key is a SBK key [ 7.1070 ] Key Size is 16 bytes [ 7.1072 ] 1040 [ 7.1124 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 7.1131 ] [ 7.1151 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img.encrypt [ 7.1157 ] [ 7.1158 ] header_magic: 4e564441 [ 7.1180 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list eks_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 7.1193 ] K[ 7.1195 ] ey size is 384 bytes [ 7.1579 ] Saving pkc public key in pub_key.key [ 7.1597 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt.signed eks_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 7.1627 ] [ 7.1652 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img [ 7.1659 ] [ 7.1660 ] header_magic: 4e564441 [ 7.1682 ] tegrasign_v3.py --key /mnt/keys/sbk --list eks_sigheader.img_list.xml [ 7.1683 ] Key is a SBK key [ 7.1683 ] Key Size is 16 bytes [ 7.1686 ] 1040 [ 7.1738 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 7.1758 ] [ 7.1779 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img.encrypt [ 7.1786 ] [ 7.1787 ] header_magic: 4e564441 [ 7.1809 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list eks_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 7.1823 ] K[ 7.1825 ] ey size is 384 bytes [ 7.2189 ] Saving pkc public key in pub_key.key [ 7.2206 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt.signed eks_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 7.2214 ] [ 7.2233 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin [ 7.2239 ] [ 7.2240 ] header_magic: 4e564441 [ 7.2262 ] tegrasign_v3.py --key /mnt/keys/sbk --list adsp-fw_sigheader.bin_list.xml [ 7.2263 ] Key is a SBK key [ 7.2263 ] Key Size is 16 bytes [ 7.2266 ] 77216 [ 7.2332 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt adsp-fw_sigheader.bin.hash zerosbk [ 7.2379 ] [ 7.2413 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin.encrypt [ 7.2429 ] [ 7.2431 ] header_magic: 4e564441 [ 7.2467 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list adsp-fw_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 7.2501 ] K[ 7.2506 ] ey size is 384 bytes [ 7.3181 ] Saving pkc public key in pub_key.key [ 7.3199 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 7.3218 ] [ 7.3240 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin [ 7.3248 ] [ 7.3249 ] header_magic: 4e564441 [ 7.3270 ] tegrasign_v3.py --key /mnt/keys/sbk --list adsp-fw_sigheader.bin_list.xml [ 7.3271 ] Key is a SBK key [ 7.3271 ] Key Size is 16 bytes [ 7.3274 ] 77216 [ 7.3341 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt adsp-fw_sigheader.bin.hash zerosbk [ 7.3356 ] [ 7.3376 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin.encrypt [ 7.3382 ] [ 7.3383 ] header_magic: 4e564441 [ 7.3405 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list adsp-fw_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 7.3418 ] K[ 7.3420 ] ey size is 384 bytes [ 7.3769 ] Saving pkc public key in pub_key.key [ 7.3786 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 7.3800 ] [ 7.3821 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img [ 7.3828 ] [ 7.3828 ] header_magic: 4e564441 [ 7.3850 ] tegrasign_v3.py --key /mnt/keys/sbk --list camera-rtcpu-rce_sigheader.img_list.xml [ 7.3851 ] Key is a SBK key [ 7.3851 ] Key Size is 16 bytes [ 7.3856 ] 267808 [ 7.3965 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt camera-rtcpu-rce_sigheader.img.hash zerosbk [ 7.3994 ] [ 7.4014 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img.encrypt [ 7.4020 ] [ 7.4021 ] header_magic: 4e564441 [ 7.4042 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list camera-rtcpu-rce_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 7.4056 ] K[ 7.4058 ] ey size is 384 bytes [ 7.4407 ] Saving pkc public key in pub_key.key [ 7.4425 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt.signed camera-rtcpu-rce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 7.4455 ] [ 7.4477 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img [ 7.4485 ] [ 7.4486 ] header_magic: 4e564441 [ 7.4508 ] tegrasign_v3.py --key /mnt/keys/sbk --list camera-rtcpu-rce_sigheader.img_list.xml [ 7.4509 ] Key is a SBK key [ 7.4509 ] Key Size is 16 bytes [ 7.4514 ] 267808 [ 7.4622 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt camera-rtcpu-rce_sigheader.img.hash zerosbk [ 7.4652 ] [ 7.4671 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img.encrypt [ 7.4677 ] [ 7.4678 ] header_magic: 4e564441 [ 7.4700 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list camera-rtcpu-rce_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 7.4713 ] K[ 7.4716 ] ey size is 384 bytes [ 7.5063 ] Saving pkc public key in pub_key.key [ 7.5081 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt.signed camera-rtcpu-rce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 7.5126 ] [ 7.5165 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin [ 7.5181 ] [ 7.5183 ] header_magic: 4e564441 [ 7.5218 ] tegrasign_v3.py --key /mnt/keys/sbk --list bpmp_t194_sigheader.bin_list.xml [ 7.5221 ] Key is a SBK key [ 7.5221 ] Key Size is 16 bytes [ 7.5249 ] 852256 [ 7.5728 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 7.5811 ] [ 7.5831 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin.encrypt [ 7.5838 ] [ 7.5839 ] header_magic: 4e564441 [ 7.5862 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list bpmp_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 7.5878 ] K[ 7.5880 ] ey size is 384 bytes [ 7.6308 ] Saving pkc public key in pub_key.key [ 7.6325 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt.signed bpmp_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 7.6404 ] [ 7.6430 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin [ 7.6436 ] [ 7.6437 ] header_magic: 4e564441 [ 7.6460 ] tegrasign_v3.py --key /mnt/keys/sbk --list bpmp_t194_sigheader.bin_list.xml [ 7.6461 ] Key is a SBK key [ 7.6461 ] Key Size is 16 bytes [ 7.6472 ] 852256 [ 7.6707 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 7.6785 ] [ 7.6805 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin.encrypt [ 7.6811 ] [ 7.6812 ] header_magic: 4e564441 [ 7.6834 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list bpmp_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 7.6848 ] K[ 7.6850 ] ey size is 384 bytes [ 7.7208 ] Saving pkc public key in pub_key.key [ 7.7226 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt.signed bpmp_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 7.7305 ] [ 7.7332 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb [ 7.7338 ] [ 7.7339 ] header_magic: 4e564441 [ 7.7361 ] tegrasign_v3.py --key /mnt/keys/sbk --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml [ 7.7362 ] Key is a SBK key [ 7.7362 ] Key Size is 16 bytes [ 7.7369 ] 387312 [ 7.7501 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk [ 7.7541 ] [ 7.7560 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 7.7567 ] [ 7.7568 ] header_magic: 4e564441 [ 7.7589 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 7.7602 ] Ke[ 7.7605 ] y size is 384 bytes [ 7.7959 ] Saving pkc public key in pub_key.key [ 7.7977 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 7.8017 ] [ 7.8041 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb [ 7.8048 ] [ 7.8049 ] header_magic: 4e564441 [ 7.8071 ] tegrasign_v3.py --key /mnt/keys/sbk --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml [ 7.8072 ] Key is a SBK key [ 7.8072 ] Key Size is 16 bytes [ 7.8078 ] 387312 [ 7.8210 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk [ 7.8249 ] [ 7.8269 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 7.8275 ] [ 7.8276 ] header_magic: 4e564441 [ 7.8298 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 7.8312 ] K[ 7.8314 ] ey size is 384 bytes [ 7.8665 ] Saving pkc public key in pub_key.key [ 7.8684 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 7.8724 ] [ 7.8748 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img [ 7.8754 ] [ 7.8755 ] header_magic: 4e564441 [ 7.8777 ] tegrasign_v3.py --key /mnt/keys/sbk --list boot_sigheader.img_list.xml [ 7.8778 ] Key is a SBK key [ 7.8778 ] Key Size is 16 bytes [ 7.9409 ] 45979648 [ 9.0392 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt boot_sigheader.img.hash zerosbk [ 9.5057 ] [ 9.5089 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img.encrypt [ 9.5105 ] [ 9.5107 ] header_magic: 4e564441 [ 9.5145 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list boot_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 9.5182 ] K[ 9.5188 ] ey size is 384 bytes [ 9.6961 ] Saving pkc public key in pub_key.key [ 9.7001 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt.signed boot_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 10.1811 ] [ 10.3187 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img [ 10.3211 ] [ 10.3214 ] header_magic: 4e564441 [ 10.3257 ] tegrasign_v3.py --key /mnt/keys/sbk --list boot_sigheader.img_list.xml [ 10.3260 ] Key is a SBK key [ 10.3260 ] Key Size is 16 bytes [ 10.4123 ] 45979648 [ 11.5099 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt boot_sigheader.img.hash zerosbk [ 12.0150 ] [ 12.0189 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img.encrypt [ 12.0212 ] [ 12.0215 ] header_magic: 4e564441 [ 12.0255 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list boot_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 12.0291 ] K[ 12.0297 ] ey size is 384 bytes [ 12.2054 ] Saving pkc public key in pub_key.key [ 12.2091 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt.signed boot_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 12.7008 ] [ 12.8346 ] tegrahost_v2 --chip 0x19 --align kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb [ 12.8374 ] [ 12.8378 ] header_magic: 4e564441 [ 12.8423 ] tegrasign_v3.py --key /mnt/keys/sbk --list kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 12.8427 ] Key is a SBK key [ 12.8427 ] Key Size is 16 bytes [ 12.8442 ] 203248 [ 12.8604 ] tegrahost_v2 --chip 0x19 0 --updatesigheader kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 12.8630 ] [ 12.8650 ] tegrahost_v2 --chip 0x19 --align kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 12.8656 ] [ 12.8657 ] header_magic: 4e564441 [ 12.8679 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 12.8694 ] K[ 12.8696 ] ey size is 384 bytes [ 12.9066 ] Saving pkc public key in pub_key.key [ 12.9085 ] tegrahost_v2 --chip 0x19 0 --updatesigheader kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 12.9109 ] [ 12.9131 ] tegrahost_v2 --chip 0x19 --align kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb [ 12.9137 ] [ 12.9139 ] header_magic: 4e564441 [ 12.9161 ] tegrasign_v3.py --key /mnt/keys/sbk --list kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 12.9162 ] Key is a SBK key [ 12.9162 ] Key Size is 16 bytes [ 12.9167 ] 203248 [ 12.9261 ] tegrahost_v2 --chip 0x19 0 --updatesigheader kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 12.9285 ] [ 12.9305 ] tegrahost_v2 --chip 0x19 --align kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 12.9311 ] [ 12.9312 ] header_magic: 4e564441 [ 12.9334 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 12.9347 ] K[ 12.9349 ] ey size is 384 bytes [ 12.9699 ] Saving pkc public key in pub_key.key [ 12.9719 ] tegrahost_v2 --chip 0x19 0 --updatesigheader kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 12.9744 ] [ 12.9765 ] tegrahost_v2 --chip 0x19 --align recovery_sigheader.img [ 12.9771 ] [ 12.9772 ] header_magic: 4e564441 [ 12.9794 ] tegrasign_v3.py --key /mnt/keys/sbk --list recovery_sigheader.img_list.xml [ 12.9795 ] Key is a SBK key [ 12.9795 ] Key Size is 16 bytes [ 13.0573 ] 56137728 [ 14.3894 ] tegrahost_v2 --chip 0x19 0 --updatesigheader recovery_sigheader.img.encrypt recovery_sigheader.img.hash zerosbk [ 14.9791 ] [ 14.9828 ] tegrahost_v2 --chip 0x19 --align recovery_sigheader.img.encrypt [ 14.9850 ] [ 14.9853 ] header_magic: 4e564441 [ 14.9889 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list recovery_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 14.9923 ] K[ 14.9930 ] ey size is 384 bytes [ 15.2026 ] Saving pkc public key in pub_key.key [ 15.2061 ] tegrahost_v2 --chip 0x19 0 --updatesigheader recovery_sigheader.img.encrypt.signed recovery_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 15.8103 ] [ 15.9662 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000.dtb_sigheader.rec [ 15.9691 ] [ 15.9695 ] header_magic: 4e564441 [ 15.9743 ] tegrasign_v3.py --key /mnt/keys/sbk --list tegra194-p3668-all-p3509-0000.dtb_sigheader.rec_list.xml [ 15.9747 ] Key is a SBK key [ 15.9747 ] Key Size is 16 bytes [ 15.9763 ] 203248 [ 15.9929 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.hash zerosbk [ 15.9956 ] [ 15.9975 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt [ 15.9982 ] [ 15.9983 ] header_magic: 4e564441 [ 16.0006 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt_list.xml --pubkeyhash pub_key.key [ 16.0020 ] K[ 16.0023 ] ey size is 384 bytes [ 16.0397 ] Saving pkc public key in pub_key.key [ 16.0415 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt.signed tegra194-p3668-all-p3509-0000.dtb_sigheader.rec.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 16.0439 ] [ 16.0485 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin [ 16.0491 ] [ 16.0492 ] header_magic: 50000ea [ 16.0514 ] tegrasign_v3.py --key /mnt/keys/sbk --list nvtboot_recovery_t194.bin_list.xml [ 16.0515 ] Key is a SBK key [ 16.0515 ] Key Size is 16 bytes [ 16.0518 ] 177056 [ 16.0605 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194.bin.encrypt nvtboot_recovery_t194.bin.hash zerosbk [ 16.0613 ] [ 16.0633 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin.encrypt [ 16.0639 ] [ 16.0640 ] header_magic: ac173d1e [ 16.0659 ] tegrahost_v2 --appendsigheader nvtboot_recovery_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MB2B --ratchet_blob ratchet_blob.bin [ 16.0665 ] adding BCH for nvtboot_recovery_t194.bin.encrypt [ 16.0699 ] [ 16.0721 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list nvtboot_recovery_t194.bin_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 16.0736 ] K[ 16.0738 ] ey size is 384 bytes [ 16.1123 ] Saving pkc public key in pub_key.key [ 16.1141 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194.bin_sigheader.encrypt.signed nvtboot_recovery_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 16.1164 ] [ 16.1184 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin [ 16.1190 ] [ 16.1191 ] header_magic: 9000014 [ 16.1213 ] tegrasign_v3.py --key /mnt/keys/sbk --list nvtboot_recovery_cpu_t194.bin_list.xml [ 16.1214 ] Key is a SBK key [ 16.1214 ] Key Size is 16 bytes [ 16.1218 ] 259968 [ 16.1322 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194.bin.encrypt nvtboot_recovery_cpu_t194.bin.hash zerosbk [ 16.1332 ] [ 16.1351 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin.encrypt [ 16.1358 ] [ 16.1359 ] header_magic: cb47d6e [ 16.1377 ] tegrahost_v2 --appendsigheader nvtboot_recovery_cpu_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid CPBL --ratchet_blob ratchet_blob.bin [ 16.1383 ] adding BCH for nvtboot_recovery_cpu_t194.bin.encrypt [ 16.1431 ] [ 16.1454 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list nvtboot_recovery_cpu_t194.bin_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 16.1468 ] K[ 16.1471 ] ey size is 384 bytes [ 16.1878 ] Saving pkc public key in pub_key.key [ 16.1886 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 16.1914 ] [ 16.1915 ] Copying signed file in /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x [ 16.1921 ] Generating br-bct [ 16.1940 ] Performing cfg overlay [ 16.1940 ] ['/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1.cfg'] [ 16.1940 ] Updating dev and MSS params in BR BCT [ 16.1940 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 16.2401 ] [ 16.2402 ] Updating bl info [ 16.2422 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 16.2440 ] [ 16.2440 ] Generating br-bct [ 16.2460 ] Performing cfg overlay [ 16.2460 ] ['/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1.cfg'] [ 16.2460 ] Updating dev and MSS params in BR BCT [ 16.2461 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 16.2920 ] [ 16.2921 ] Updating bl info [ 16.2940 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 16.2968 ] [ 16.2968 ] Updating smd info [ 16.2987 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 --updatesmdinfo flash.xml.bin [ 16.3021 ] [ 16.3022 ] Updating Odmdata [ 16.3045 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0xB8190000 [ 16.3055 ] [ 16.3056 ] Get encrypted section of bct [ 16.3074 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listencbct bct_list.xml [ 16.3082 ] [ 16.3082 ] Signing BCT [ 16.3102 ] Generating signatures with encryption [ 16.3120 ] tegrasign_v3.py --key /mnt/keys/sbk --offset 2328 --file br_bct_BR.bct [ 16.3127 ] Key is a SBK key [ 16.3268 ] Key Size is 16 bytes [ 16.3270 ] 560 [ 16.3311 ] [ 16.3311 ] Updating BCT with signature [ 16.3315 ] Get Signed section of bct [ 16.3335 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listbct bct_list.xml [ 16.3343 ] [ 16.3364 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list bct_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 16.3371 ] Key size is 384 bytes [ 16.3908 ] Saving pkc public key in pub_key.key [ 16.3936 ] Saving Montgomery values in montgomery.bin [ 16.3940 ] [ 16.3940 ] Updating BCT with signature [ 16.3962 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 16.3987 ] [ 16.3988 ] Generating coldboot mb1-bct [ 16.4008 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_cold_boot_bct.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1.cfg --misc tegra194-mb1-bct-misc-l4t.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 16.4014 ] MB1-BCT version: 0x1 [ 16.4017 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg [ 16.4020 ] Added Platform Config 0 data with size :- 2240 [ 16.4032 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 16.4036 ] Added Platform Config 1 data with size :- 19640 [ 16.4166 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg [ 16.4170 ] Added Platform Config 2 data with size :- 24 [ 16.4172 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 16.4175 ] Added Platform Config 4 data with size :- 348 [ 16.4178 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 16.4181 ] Added Platform Config 3 data with size :- 92 [ 16.4182 ] [ 16.4182 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 16.4182 ] Added Platform Config 5 data with size :- 128 [ 16.4182 ] [ 16.4182 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 16.4182 ] Added Platform Config 7 data with size :- 392 [ 16.4182 ] [ 16.4182 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 16.4182 ] Added Platform Config 9 data with size :- 40 [ 16.4182 ] [ 16.4183 ] Updating mb1-bct with firmware information [ 16.4201 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 16.4207 ] MB1-BCT version: 0x1 [ 16.4217 ] [ 16.4217 ] Updating mb1-bct with storage information [ 16.4236 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 16.4242 ] MB1-BCT version: 0x1 [ 16.4248 ] [ 16.4248 ] Updating mb1-bct with ratchet information [ 16.4267 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 16.4273 ] MB1-BCT version: 0x1 [ 16.4274 ] FwIndex: 1, MinRatchetLevel: 0 [ 16.4276 ] FwIndex: 2, MinRatchetLevel: 0 [ 16.4278 ] FwIndex: 3, MinRatchetLevel: 0 [ 16.4279 ] FwIndex: 4, MinRatchetLevel: 0 [ 16.4281 ] FwIndex: 5, MinRatchetLevel: 0 [ 16.4283 ] FwIndex: 6, MinRatchetLevel: 0 [ 16.4284 ] FwIndex: 7, MinRatchetLevel: 0 [ 16.4286 ] FwIndex: 11, MinRatchetLevel: 0 [ 16.4287 ] FwIndex: 12, MinRatchetLevel: 0 [ 16.4289 ] FwIndex: 13, MinRatchetLevel: 0 [ 16.4290 ] FwIndex: 14, MinRatchetLevel: 0 [ 16.4292 ] FwIndex: 15, MinRatchetLevel: 0 [ 16.4293 ] FwIndex: 16, MinRatchetLevel: 0 [ 16.4295 ] FwIndex: 17, MinRatchetLevel: 0 [ 16.4296 ] FwIndex: 18, MinRatchetLevel: 0 [ 16.4298 ] FwIndex: 19, MinRatchetLevel: 0 [ 16.4299 ] FwIndex: 30, MinRatchetLevel: 0 [ 16.4301 ] FwIndex: 31, MinRatchetLevel: 0 [ 16.4301 ] FwIndex: 32, MinRatchetLevel: 0 [ 16.4301 ] [ 16.4319 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct [ 16.4326 ] [ 16.4327 ] header_magic: c0650000 [ 16.4349 ] tegrasign_v3.py --key /mnt/keys/sbk --list mb1_cold_boot_bct_MB1.bct_list.xml [ 16.4350 ] Key is a SBK key [ 16.4350 ] Key Size is 16 bytes [ 16.4352 ] 26048 [ 16.4412 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1.bct.encrypt mb1_cold_boot_bct_MB1.bct.hash zerosbk [ 16.4420 ] [ 16.4439 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct.encrypt [ 16.4446 ] [ 16.4447 ] header_magic: 480c46cd [ 16.4466 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin [ 16.4472 ] adding BCH for mb1_cold_boot_bct_MB1.bct.encrypt [ 16.4479 ] [ 16.4502 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mb1_cold_boot_bct_MB1.bct_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 16.4516 ] K[ 16.4519 ] ey size is 384 bytes [ 16.4888 ] Saving pkc public key in pub_key.key [ 16.4906 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 16.4915 ] [ 16.4916 ] Generating recovery mb1-bct [ 16.4937 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_bct.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1.cfg --misc tegra194-mb1-bct-misc-flash.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 16.4943 ] MB1-BCT version: 0x1 [ 16.4946 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg [ 16.4949 ] Added Platform Config 0 data with size :- 2240 [ 16.4961 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 16.4964 ] Added Platform Config 1 data with size :- 19640 [ 16.5096 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg [ 16.5098 ] Added Platform Config 2 data with size :- 24 [ 16.5101 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 16.5104 ] Added Platform Config 4 data with size :- 348 [ 16.5106 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 16.5109 ] Added Platform Config 3 data with size :- 92 [ 16.5111 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 16.5112 ] Added Platform Config 5 data with size :- 128 [ 16.5112 ] [ 16.5113 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 16.5113 ] Added Platform Config 7 data with size :- 392 [ 16.5113 ] [ 16.5113 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 16.5113 ] Added Platform Config 9 data with size :- 40 [ 16.5113 ] [ 16.5113 ] Updating mb1-bct with firmware information [ 16.5131 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin [ 16.5137 ] MB1-BCT version: 0x1 [ 16.5158 ] [ 16.5158 ] Updating mb1-bct with storage information [ 16.5176 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 16.5182 ] MB1-BCT version: 0x1 [ 16.5212 ] [ 16.5213 ] Updating mb1-bct with ratchet information [ 16.5232 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 16.5238 ] MB1-BCT version: 0x1 [ 16.5239 ] FwIndex: 1, MinRatchetLevel: 0 [ 16.5241 ] FwIndex: 2, MinRatchetLevel: 0 [ 16.5242 ] FwIndex: 3, MinRatchetLevel: 0 [ 16.5242 ] FwIndex: 4, MinRatchetLevel: 0 [ 16.5242 ] FwIndex: 5, MinRatchetLevel: 0 [ 16.5242 ] FwIndex: 6, MinRatchetLevel: 0 [ 16.5242 ] FwIndex: 7, MinRatchetLevel: 0 [ 16.5243 ] FwIndex: 11, MinRatchetLevel: 0 [ 16.5243 ] FwIndex: 12, MinRatchetLevel: 0 [ 16.5243 ] FwIndex: 13, MinRatchetLevel: 0 [ 16.5243 ] FwIndex: 14, MinRatchetLevel: 0 [ 16.5243 ] FwIndex: 15, MinRatchetLevel: 0 [ 16.5243 ] FwIndex: 16, MinRatchetLevel: 0 [ 16.5243 ] FwIndex: 17, MinRatchetLevel: 0 [ 16.5243 ] FwIndex: 18, MinRatchetLevel: 0 [ 16.5243 ] FwIndex: 19, MinRatchetLevel: 0 [ 16.5243 ] FwIndex: 30, MinRatchetLevel: 0 [ 16.5243 ] FwIndex: 31, MinRatchetLevel: 0 [ 16.5243 ] FwIndex: 32, MinRatchetLevel: 0 [ 16.5243 ] [ 16.5261 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct [ 16.5268 ] [ 16.5269 ] header_magic: c0650000 [ 16.5291 ] tegrasign_v3.py --key /mnt/keys/sbk --list mb1_bct_MB1.bct_list.xml [ 16.5292 ] Key is a SBK key [ 16.5292 ] Key Size is 16 bytes [ 16.5295 ] 26048 [ 16.5361 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1.bct.encrypt mb1_bct_MB1.bct.hash zerosbk [ 16.5371 ] [ 16.5391 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct.encrypt [ 16.5399 ] [ 16.5400 ] header_magic: 480c46cd [ 16.5420 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin [ 16.5427 ] adding BCH for mb1_bct_MB1.bct.encrypt [ 16.5435 ] [ 16.5458 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mb1_bct_MB1.bct_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 16.5475 ] K[ 16.5478 ] ey size is 384 bytes [ 16.5885 ] Saving pkc public key in pub_key.key [ 16.5903 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1.bct_sigheader.encrypt.signed mb1_bct_MB1.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 16.5913 ] [ 16.5914 ] Generating coldboot mem-bct [ 16.5933 ] tegrabct_v2 --chip 0x19 0 --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1.cfg --membct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_1.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_2.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_3.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_4.bct [ 16.5939 ] Packing sdram param for instance[0] [ 16.6388 ] Packing sdram param for instance[1] [ 16.6390 ] Packing sdram param for instance[2] [ 16.6391 ] Packing sdram param for instance[3] [ 16.6391 ] Packing sdram param for instance[4] [ 16.6391 ] Packing sdram param for instance[5] [ 16.6391 ] Packing sdram param for instance[6] [ 16.6391 ] Packing sdram param for instance[7] [ 16.6391 ] Packing sdram param for instance[8] [ 16.6391 ] Packing sdram param for instance[9] [ 16.6391 ] Packing sdram param for instance[10] [ 16.6391 ] Packing sdram param for instance[11] [ 16.6391 ] Packing sdram param for instance[12] [ 16.6391 ] Packing sdram param for instance[13] [ 16.6391 ] Packing sdram param for instance[14] [ 16.6391 ] Packing sdram param for instance[15] [ 16.6391 ] [ 16.6392 ] Getting sector size from pt [ 16.6410 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin [ 16.6416 ] [ 16.6417 ] BlockSize read from layout is 200 [ 16.6436 ] tegrasign_v3.py --key /mnt/keys/sbk --file /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_1.bct [ 16.6442 ] Key is a SBK key [ 16.6592 ] Key Size is 16 bytes [ 16.6593 ] 48352 [ 16.6639 ] [ 16.6661 ] tegrasign_v3.py --key /mnt/keys/sbk --file /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_2.bct [ 16.6666 ] Key is a SBK key [ 16.6816 ] Key Size is 16 bytes [ 16.6817 ] 48352 [ 16.6864 ] [ 16.6885 ] tegrasign_v3.py --key /mnt/keys/sbk --file /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_3.bct [ 16.6892 ] Key is a SBK key [ 16.7050 ] Key Size is 16 bytes [ 16.7051 ] 48352 [ 16.7097 ] [ 16.7118 ] tegrasign_v3.py --key /mnt/keys/sbk --file /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_4.bct [ 16.7125 ] Key is a SBK key [ 16.7282 ] Key Size is 16 bytes [ 16.7283 ] 48352 [ 16.7330 ] [ 16.7351 ] tegrahost_v2 --chip 0x19 0 --blocksize 512 --magicid MEMB --addsigheader_multi /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_1_encrypt.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_2_encrypt.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_3_encrypt.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_4_encrypt.bct [ 16.7357 ] adding BCH for /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_1_encrypt.bct [ 16.7377 ] [ 16.7396 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 16.7403 ] [ 16.7404 ] header_magic: 4e564441 [ 16.7427 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mem_coldboot.bct_list.xml --pubkeyhash pub_key.key [ 16.7441 ] K[ 16.7443 ] ey size is 384 bytes [ 16.7805 ] Saving pkc public key in pub_key.key [ 16.7823 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_coldboot.bct.signed mem_coldboot.bct.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 16.7833 ] [ 16.7852 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 16.7859 ] [ 16.7878 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin --appendsigheader mem_coldboot.bct oem-rsa [ 16.7885 ] Header already present for mem_coldboot.bct [ 16.7888 ] [ 16.7910 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem --list mem_coldboot_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 16.7923 ] Ke[ 16.7935 ] y size is 384 bytes [ 16.8291 ] Saving pkc public key in pub_key.key [ 16.8291 ] Saving Montgomery values in montgomery.bin [ 16.8310 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin --updatesigheader mem_coldboot_sigheader.bct.signed mem_coldboot_sigheader.bct.sig oem-rsa [ 16.8319 ] [ 16.8320 ] Generating recovery mem-bct [ 16.8339 ] tegrabct_v2 --chip 0x19 0 --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1.cfg --membct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_1.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_2.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_3.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/18104/tmpyncsushj1_4.bct [ 16.8345 ] Packing sdram param for instance[0] [ 16.8797 ] Packing sdram param for instance[1] [ 16.8799 ] Packing sdram param for instance[2] [ 16.8801 ] Packing sdram param for instance[3] [ 16.8802 ] Packing sdram param for instance[4] [ 16.8802 ] Packing sdram param for instance[5] [ 16.8802 ] Packing sdram param for instance[6] [ 16.8802 ] Packing sdram param for instance[7] [ 16.8802 ] Packing sdram param for instance[8] [ 16.8802 ] Packing sdram param for instance[9] [ 16.8802 ] Packing sdram param for instance[10] [ 16.8802 ] Packing sdram param for instance[11] [ 16.8802 ] Packing sdram param for instance[12] [ 16.8802 ] Packing sdram param for instance[13] [ 16.8802 ] Packing sdram param for instance[14] [ 16.8802 ] Packing sdram param for instance[15] [ 16.8802 ] [ 16.8822 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct [ 16.8829 ] [ 16.8830 ] header_magic: 3000000 [ 16.8851 ] tegrasign_v3.py --key /mnt/keys/sbk --list mem_rcm.bct_list.xml [ 16.8852 ] Key is a SBK key [ 16.8852 ] Key Size is 16 bytes [ 16.8855 ] 48352 [ 16.8916 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm.bct.encrypt mem_rcm.bct.hash zerosbk [ 16.8924 ] [ 16.8944 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct.encrypt [ 16.8950 ] [ 16.8951 ] header_magic: 8de37d0f [ 16.8969 ] tegrahost_v2 --appendsigheader mem_rcm.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin [ 16.8975 ] adding BCH for mem_rcm.bct.encrypt [ 16.8987 ] [ 16.9008 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mem_rcm.bct_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 16.9021 ] Ke[ 16.9023 ] y size is 384 bytes [ 16.9371 ] Saving pkc public key in pub_key.key [ 16.9378 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm.bct_sigheader.encrypt.signed mem_rcm.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 16.9390 ] [ 16.9396 ] nvtboot_recovery_t194.bin_sigheader.encrypt.signed [ 16.9398 ] preboot_c10_prod_cr.bin [ 16.9399 ] mce_c10_prod_cr.bin [ 16.9401 ] mts_c10_prod_cr.bin [ 16.9427 ] bpmp_t194.bin [ 16.9433 ] tegra194-a02-bpmp-p3668-a00.dtb [ 16.9437 ] spe_t194.bin [ 16.9438 ] tos-trusty_t194.img [ 16.9441 ] eks.img [ 16.9442 ] boot.img [ 17.0468 ] tegra194-p3668-all-p3509-0000.dtb [ 17.0475 ] tegra194-p3668-all-p3509-0000.dtb [ 17.0686 ] nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed [ 17.0741 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 17.0768 ] [ 17.0771 ] header_magic: 4e564441 [ 17.0817 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mb1_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 17.0863 ] K[ 17.0870 ] ey size is 384 bytes [ 17.1544 ] Saving pkc public key in pub_key.key [ 17.1563 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 17.1591 ] [ 17.1614 ] tegraparser_v2 --generategpt --pt flash.xml.bin [ 17.1624 ] [ 17.1680 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/flash.xml.tmp flash.idx [ 18.3973 ] /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /mnt/keys//pkc.pem --encrypt_key /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/.zero_.key --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign xusb_sil_rel_fw xusb_fw Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0005 ] Generating signature [ 0.0027 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0039 ] K[ 0.0041 ] ey size is 384 bytes [ 0.0064 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem [ 0.0076 ] K[ 0.0086 ] ey size is 384 bytes [ 0.0088 ] Saving Montgomery values in montgomery.bin [ 0.0087 ] Generating ratchet blob [ 0.0105 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0111 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0113 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0113 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0113 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0113 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0113 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0113 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0113 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0113 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0113 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0113 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0114 ] [ 0.0115 ] header_magic: 5b0000 [ 0.0115 ] Encrypting file [ 0.0132 ] tegrahost_v2 --chip 0x19 --align 1_xusb_sil_rel_fw [ 0.0137 ] [ 0.0139 ] header_magic: 5b0000 [ 0.0162 ] tegrasign_v3.py --key /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/.zero_.key --list 1_xusb_sil_rel_fw_list.xml [ 0.0163 ] Key is a SBK key [ 0.0163 ] Key Size is 16 bytes [ 0.0212 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_xusb_sil_rel_fw.encrypt 1_xusb_sil_rel_fw.hash zerosbk [ 0.0220 ] [ 0.0239 ] tegrahost_v2 --chip 0x19 --align 1_xusb_sil_rel_fw.encrypt [ 0.0245 ] [ 0.0246 ] header_magic: 5b0000 [ 0.0264 ] tegrahost_v2 --appendsigheader 1_xusb_sil_rel_fw.encrypt oem-rsa-sbk --chip 0x19 0 --magicid XUSB --ratchet_blob ratchet_blob.bin [ 0.0269 ] adding BCH for 1_xusb_sil_rel_fw.encrypt [ 0.0294 ] [ 0.0314 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list 1_xusb_sil_rel_fw_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.0326 ] K[ 0.0329 ] ey size is 384 bytes [ 0.0701 ] Saving pkc public key in pub_key.key [ 0.0719 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_xusb_sil_rel_fw_sigheader.encrypt.signed 1_xusb_sil_rel_fw_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 0.0736 ] [ 0.0740 ] Signed and encrypted file: /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/xusb_sil_rel_fw_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for xusb_sil_rel_fw_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x1f800 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for xusb_sil_rel_fw_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/xusb_sil_rel_fw_sigheader.encrypt.signed done. ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed --bct br_bct_BR.bct --securedev --applet rcm_2_signed.rcm --applet_softfuse rcm_1_signed.rcm --cmd "rcmboot" --cfg secureflash.xml --chip 0x19 --mb1_bct mb1_bct_MB1.bct_sigheader.encrypt.signed --mem_bct mem_rcm.bct_sigheader.encrypt.signed --mb1_cold_boot_bct mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed --mem_bct_cold_boot mem_coldboot_sigheader.bct.signed --bins "mb2_bootloader nvtboot_recovery_t194.bin_sigheader.encrypt.signed; mts_preboot preboot_c10_prod_cr_sigheader.bin.encrypt.signed; mts_mce mce_c10_prod_cr_sigheader.bin.encrypt.signed; mts_proper mts_c10_prod_cr_sigheader.bin.encrypt.signed; bpmp_fw bpmp_t194_sigheader.bin.encrypt.signed; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed; spe_fw spe_t194_sigheader.bin.encrypt.signed; tlk tos-trusty_t194_sigheader.img.encrypt.signed; eks eks_sigheader.img.encrypt.signed; kernel boot.img; kernel_dtb kernel_tegra194-p3668-all-p3509-0000.dtb; bootloader_dtb tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed" --skipuid saving flash command in flashcmd.txt *** no-flash flag enabled. Exiting now... *** User can run above saved command in factory environment without providing pkc and sbk keys to flash a device Example: $ cd bootloader $ sudo bash ./flashcmd.txt Save initrd flashing command parameters to /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/initrdflashparam.txt /tmp/tmp.vDVI9sUyK1 ~/workspace/d4t/work/Linux_for_Tegra writing boot image config in bootimg.cfg extracting kernel in zImage extracting ramdisk in initrd.img /tmp/tmp.vDVI9sUyK1/initrd /tmp/tmp.vDVI9sUyK1 ~/workspace/d4t/work/Linux_for_Tegra 111519 blocks 126889 blocks /tmp/tmp.vDVI9sUyK1 ~/workspace/d4t/work/Linux_for_Tegra flashimg0=boot0.img ~/workspace/d4t/work/Linux_for_Tegra Success Cleaning up... + echo 'Finish generating flash package.' Finish generating flash package. + '[' 1 = 1 ']' + echo 'Put device in recovery mode, run with option --flash-only to flash device.' Put device in recovery mode, run with option --flash-only to flash device. + exit 0 + cleanup + remove_udev_rules + rm -f /etc/udev/rules.d/99-l4t-host.rules + rm -f /etc/udev/rules.d/10-l4t-usb-msd.rules + clean_up_network_flash + '[' -n '' ']'