Odmfuse requires variable FAB and BOARDID in order to run in the offline mode. Otherwise odmfuse needs to access on board EEPROM. Make sure the board is in recovery mode. bootauth is out bootauth CMDARGS is currently bootauth NS ./tegraflash.py --chip 0x18 --applet "/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin" --skipuid --cmd "dump eeprom boardinfo cvm.bin" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0062 ] Generating RCM messages [ 0.0072 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm /home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin 0 0 [ 0.0078 ] RCM 0 is saved as rcm_0.rcm [ 0.0081 ] RCM 1 is saved as rcm_1.rcm [ 0.0081 ] List of rcm files are saved in rcm_list.xml [ 0.0081 ] [ 0.0081 ] Signing RCM messages [ 0.0088 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0094 ] Assuming zero filled SBK key [ 0.0118 ] [ 0.0118 ] Copying signature to RCM mesages [ 0.0126 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml [ 0.0136 ] [ 0.0136 ] Boot Rom communication [ 0.0153 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml --skipuid [ 0.0159 ] RCM version 0X180001 [ 0.1330 ] Boot Rom communication completed [ 1.1394 ] [ 2.1435 ] tegrarcm_v2 --isapplet [ 2.1461 ] Applet version 01.00.0000 [ 2.2235 ] [ 2.2237 ] python script dump EEPROM info [ 2.2266 ] Retrieving EEPROM data [ 2.2269 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/cvm.bin [ 2.2293 ] Applet version 01.00.0000 [ 2.3445 ] Saved platform info in /home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/cvm.bin [ 2.4186 ] Board ID(3489) version(300) sku(0888) revision(N.0) copying sdram_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/P3489_Sku888_4GB_Hynix_4GB_lpddr4_204Mhz_P138_A02_l4t.cfg)... done. copying misc_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)... done. copying pinmux_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg)... done. copying scr_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/minimal_scr.cfg)... done. copying scr_cold_boot_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/mobile_scr.cfg)... done. copying pmc_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg)... done. copying pmic_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-lightning-p3489-1000-a00.cfg)... done. copying br_cmd_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg)... done. copying prod_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg)... done. copying dev_params(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/emmc.cfg)... done. Existing mb2_bootloader(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused. Existing mts_preboot(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/preboot_d15_prod_cr.bin) reused. Existing mts_bootpack(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/mce_mts_d15_prod_cr.bin) reused. copying bootloader_dtb(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3489-0888-a00-00-base.dtb)... done. Existing bpmp_fw(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/bpmp.bin) reused. copying bpmp_fw_dtb(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/tegra186-a02-bpmp-lightning-p3489-a00-00-te770m.dtb)... done. Existing tlk(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/tos-trusty.img) reused. Existing eks(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/eks.img) reused. Existing mb1file(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/mb1_prod.bin) reused. Existing spefile(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/spe.bin) reused. copying tegraboot(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/nvtboot.bin)... done. Existing tbcfile(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/cboot.bin) reused. Existing scefile(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. copying wb0boot(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/warmboot.bin)... done. done. Existing cfg(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/flash.xml) reused. Existing bl(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu.bin) reused. Existing applet(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin) reused. ./tegraflash.py --sdram_config P3489_Sku888_4GB_Hynix_4GB_lpddr4_204Mhz_P138_A02_l4t.cfg --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg --pmic_config tegra186-mb1-bct-pmic-lightning-p3489-1000-a00.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg --prod_config tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg --dev_params emmc.cfg --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bootloader_dtb tegra186-quill-p3489-0888-a00-00-base.dtb; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-lightning-p3489-a00-00-te770m.dtb; tlk tos-trusty.img; eks eks.img" --cfg flash.xml --bl nvtboot_recovery_cpu.bin --odmdata 0x1090000 --chip 0x18 --applet mb1_recovery_prod.bin --skipuid --cmd "readfuses fuse_info.txt fuses_to_read.xml; reboot recovery" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0067 ] Reading fuses [ 0.0067 ] Generating RCM messages [ 0.0074 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0 [ 0.0080 ] RCM 0 is saved as rcm_0.rcm [ 0.0082 ] RCM 1 is saved as rcm_1.rcm [ 0.0082 ] List of rcm files are saved in rcm_list.xml [ 0.0083 ] [ 0.0083 ] Signing RCM messages [ 0.0089 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0095 ] Assuming zero filled SBK key [ 0.0119 ] [ 0.0119 ] Copying signature to RCM mesages [ 0.0126 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml [ 0.0133 ] [ 0.0134 ] Boot Rom communication [ 0.0150 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml --skipuid [ 0.0156 ] Boot Rom communication failed [ 5.1604 ] [ 5.1605 ] Send tboot failed. Bootrom is likely not running, try to detect whether mb1/mb2/cpubl is running. [ 6.1646 ] tegrarcm_v2 --isapplet [ 6.1673 ] Applet version 01.00.0000 [ 6.2453 ] [ 6.2457 ] Parsing fuse info as per xml file [ 6.2485 ] tegraparser_v2 --get_fuse_names fuses_to_read.xml read_fuse_names.txt [ 6.2511 ] MagicId=0x45535546 version=0x1 [ 6.2517 ] [ 6.2521 ] trying to read fuse with CPU binary [ 6.2548 ] tegrasign_v2 --key None --getmode mode.txt [ 6.2575 ] Assuming zero filled SBK key [ 6.2579 ] [ 6.2583 ] Parsing partition layout [ 6.2613 ] tegraparser_v2 --pt flash.xml.tmp [ 6.2664 ] [ 6.2666 ] Creating list of images to be signed [ 6.2699 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk [ 6.3123 ] [ 6.3123 ] Generating signatures [ 6.3134 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key [ 6.3143 ] Assuming zero filled SBK key [ 6.5127 ] [ 6.5128 ] Generating br-bct [ 6.5136 ] Updating dev and MSS params in BR BCT [ 6.5137 ] tegrabct_v2 --dev_param emmc.cfg --sdram P3489_Sku888_4GB_Hynix_4GB_lpddr4_204Mhz_P138_A02_l4t.cfg --brbct br_bct.cfg --chip 0x18 0 [ 6.5192 ] [ 6.5193 ] Updating bl info [ 6.5200 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 6.5214 ] [ 6.5214 ] Updating smd info [ 6.5221 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin [ 6.5230 ] [ 6.5230 ] Updating Odmdata [ 6.5238 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x1090000 [ 6.5248 ] [ 6.5248 ] Get Signed section of bct [ 6.5255 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml [ 6.5264 ] [ 6.5271 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key [ 6.5278 ] Assuming zero filled SBK key [ 6.5280 ] [ 6.5280 ] Updating BCT with signature [ 6.5287 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml [ 6.5296 ] [ 6.5296 ] Generating coldboot mb1-bct [ 6.5302 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram P3489_Sku888_4GB_Hynix_4GB_lpddr4_204Mhz_P138_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg --pmc tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg --pmic tegra186-mb1-bct-pmic-lightning-p3489-1000-a00.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg --prod tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg [ 6.5307 ] MB1-BCT version: 0xf [ 6.5309 ] Copying Sdram info from 2 to 3 set [ 6.5360 ] Copying Sdram info from 3 to 0 set [ 6.5363 ] Copying Sdram info from 0 to 1 set [ 6.5366 ] Packing sdram param for instance[0] [ 6.5368 ] Packing sdram param for instance[1] [ 6.5370 ] Packing sdram param for instance[2] [ 6.5373 ] Packing sdram param for instance[3] [ 6.5375 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg [ 6.5380 ] Appending platform config data of size :- 2952 [ 6.5380 ] [ 6.5380 ] Parsing config file :mobile_scr.cfg [ 6.5380 ] Appending platform config data of size :- 12240 [ 6.5380 ] [ 6.5380 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg [ 6.5380 ] Appending platform config data of size :- 24 [ 6.5381 ] [ 6.5381 ] Parsing config file :tegra186-mb1-bct-pmic-lightning-p3489-1000-a00.cfg [ 6.5381 ] Appending platform config data of size :- 744 [ 6.5381 ] [ 6.5381 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg [ 6.5381 ] Appending platform config data of size :- 64 [ 6.5381 ] [ 6.5381 ] Parsing config file :tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg [ 6.5381 ] Appending platform config data of size :- 2132 [ 6.5381 ] [ 6.5381 ] Updating mb1-bct with firmware information [ 6.5391 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 6.5398 ] MB1-BCT version: 0xf [ 6.5403 ] [ 6.5403 ] Updating mb1-bct with storage information [ 6.5409 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 6.5414 ] MB1-BCT version: 0xf [ 6.5418 ] [ 6.5423 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct [ 6.5429 ] [ 6.5435 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk [ 6.5444 ] [ 6.5452 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 6.5458 ] Assuming zero filled SBK key [ 6.5469 ] [ 6.5477 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk [ 6.5485 ] [ 6.5486 ] Generating recovery mb1-bct [ 6.5493 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram P3489_Sku888_4GB_Hynix_4GB_lpddr4_204Mhz_P138_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg --pmc tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg --pmic tegra186-mb1-bct-pmic-lightning-p3489-1000-a00.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg --prod tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg [ 6.5499 ] MB1-BCT version: 0xf [ 6.5501 ] Copying Sdram info from 2 to 3 set [ 6.5550 ] Copying Sdram info from 3 to 0 set [ 6.5552 ] Copying Sdram info from 0 to 1 set [ 6.5554 ] Packing sdram param for instance[0] [ 6.5556 ] Packing sdram param for instance[1] [ 6.5559 ] Packing sdram param for instance[2] [ 6.5561 ] Packing sdram param for instance[3] [ 6.5563 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg [ 6.5567 ] Appending platform config data of size :- 2952 [ 6.5570 ] Parsing config file :minimal_scr.cfg [ 6.5572 ] Appending platform config data of size :- 12240 [ 6.5572 ] [ 6.5572 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg [ 6.5572 ] Appending platform config data of size :- 24 [ 6.5572 ] [ 6.5572 ] Parsing config file :tegra186-mb1-bct-pmic-lightning-p3489-1000-a00.cfg [ 6.5572 ] Appending platform config data of size :- 744 [ 6.5572 ] [ 6.5572 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg [ 6.5572 ] Appending platform config data of size :- 64 [ 6.5572 ] [ 6.5572 ] Parsing config file :tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg [ 6.5572 ] Appending platform config data of size :- 2132 [ 6.5572 ] [ 6.5573 ] Updating mb1-bct with firmware information [ 6.5581 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin [ 6.5588 ] MB1-BCT version: 0xf [ 6.5593 ] [ 6.5593 ] Updating mb1-bct with storage information [ 6.5601 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 6.5607 ] MB1-BCT version: 0xf [ 6.5612 ] [ 6.5618 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct [ 6.5625 ] [ 6.5631 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk [ 6.5638 ] [ 6.5648 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 6.5654 ] Assuming zero filled SBK key [ 6.5666 ] [ 6.5674 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk [ 6.5682 ] [ 6.5683 ] Copying signatures [ 6.5690 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml [ 6.5871 ] [ 6.5871 ] Sending BCTs [ 6.5880 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt [ 6.5886 ] Applet version 01.00.0000 [ 6.6688 ] Sending bct_bootrom [ 6.6692 ] [................................................] 100% [ 6.6708 ] Sending bct_mb1 [ 6.6713 ] [................................................] 100% [ 6.6920 ] [ 6.6921 ] Generating blob [ 6.6957 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin [ 6.6986 ] [ 6.7017 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk [ 6.7061 ] [ 6.7107 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 6.7137 ] Assuming zero filled SBK key [ 6.7306 ] [ 6.7330 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk [ 6.7349 ] [ 6.7366 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin [ 6.7379 ] [ 6.7391 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk [ 6.7405 ] [ 6.7421 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 6.7431 ] Assuming zero filled SBK key [ 6.7458 ] [ 6.7472 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk [ 6.7484 ] [ 6.7493 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin [ 6.7500 ] [ 6.7508 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk [ 6.7518 ] [ 6.7527 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 6.7533 ] Assuming zero filled SBK key [ 6.7549 ] [ 6.7558 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk [ 6.7567 ] [ 6.7575 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin [ 6.7582 ] [ 6.7588 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk [ 6.7620 ] [ 6.7629 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 6.7635 ] Assuming zero filled SBK key [ 6.8046 ] [ 6.8055 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk [ 6.8084 ] [ 6.8094 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-quill-p3489-0888-a00-00-base.dtb [ 6.8101 ] [ 6.8108 ] tegrahost_v2 --appendsigheader blob_tegra186-quill-p3489-0888-a00-00-base.dtb zerosbk [ 6.8120 ] [ 6.8128 ] tegrasign_v2 --key None --list blob_tegra186-quill-p3489-0888-a00-00-base_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 6.8133 ] Assuming zero filled SBK key [ 6.8208 ] [ 6.8220 ] tegrahost_v2 --updatesigheader blob_tegra186-quill-p3489-0888-a00-00-base_sigheader.dtb.encrypt blob_tegra186-quill-p3489-0888-a00-00-base_sigheader.dtb.hash zerosbk [ 6.8231 ] [ 6.8239 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin [ 6.8246 ] [ 6.8252 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk [ 6.8265 ] [ 6.8272 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 6.8278 ] Assuming zero filled SBK key [ 6.8388 ] [ 6.8399 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk [ 6.8412 ] [ 6.8423 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-a02-bpmp-lightning-p3489-a00-00-te770m.dtb [ 6.8430 ] [ 6.8436 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-lightning-p3489-a00-00-te770m.dtb zerosbk [ 6.8447 ] [ 6.8455 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-lightning-p3489-a00-00-te770m_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 6.8460 ] Assuming zero filled SBK key [ 6.8532 ] [ 6.8542 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-lightning-p3489-a00-00-te770m_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-lightning-p3489-a00-00-te770m_sigheader.dtb.hash zerosbk [ 6.8552 ] [ 6.8560 ] tegrahost_v2 --chip 0x18 --align blob_tos-trusty.img [ 6.8567 ] [ 6.8573 ] tegrahost_v2 --appendsigheader blob_tos-trusty.img zerosbk [ 6.8583 ] [ 6.8591 ] tegrasign_v2 --key None --list blob_tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key [ 6.8596 ] Assuming zero filled SBK key [ 6.8676 ] [ 6.8686 ] tegrahost_v2 --updatesigheader blob_tos-trusty_sigheader.img.encrypt blob_tos-trusty_sigheader.img.hash zerosbk [ 6.8698 ] [ 6.8707 ] tegrahost_v2 --chip 0x18 --align blob_eks.img [ 6.8713 ] [ 6.8719 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk [ 6.8725 ] [ 6.8733 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key [ 6.8738 ] Assuming zero filled SBK key [ 6.8740 ] [ 6.8747 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk [ 6.8753 ] [ 6.8761 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin [ 6.8767 ] number of images in blob are 9 [ 6.8769 ] blobsize is 4071256 [ 6.8770 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 221776 [ 6.8789 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 90176 [ 6.8793 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 63104 [ 6.8798 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2082144 [ 6.8801 ] Added binary blob_tegra186-quill-p3489-0888-a00-00-base_sigheader.dtb.encrypt of size 367184 [ 6.8806 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 534816 [ 6.8809 ] Added binary blob_tegra186-a02-bpmp-lightning-p3489-a00-00-te770m_sigheader.dtb.encrypt of size 315392 [ 6.8814 ] Added binary blob_tos-trusty_sigheader.img.encrypt of size 395072 [ 6.8817 ] Added binary blob_eks_sigheader.img.encrypt of size 1440 [ 6.8823 ] [ 6.8823 ] Sending bootloader and pre-requisite binaries [ 6.8832 ] tegrarcm_v2 --download blob blob.bin [ 6.8838 ] Applet version 01.00.0000 [ 6.9611 ] Sending blob [ 6.9613 ] [................................................] 100% [ 7.4199 ] [ 7.4230 ] tegrarcm_v2 --boot recovery [ 7.4256 ] Applet version 01.00.0000 [ 7.5022 ] [ 8.5066 ] tegrarcm_v2 --isapplet [ 8.6283 ] [ 8.6315 ] tegradevflash_v2 --iscpubl [ 8.6345 ] Cannot Open USB [ 9.0880 ] [ 10.0924 ] tegrarcm_v2 --isapplet [ 10.1691 ] [ 10.1723 ] tegradevflash_v2 --iscpubl [ 10.1749 ] Bootloader version 01.00.0000 [ 10.2840 ] Bootloader version 01.00.0000 [ 10.2852 ] [ 10.2884 ] tegraparser_v2 --read_fusetype PublicKeyHash read_fuse.bin [ 10.2915 ] [ 10.2945 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 10.2972 ] Bootloader version 01.00.0000 [ 10.4004 ] Saved read fuses in file __fuse_read_scatter.bin [ 10.4092 ] Fuse read successful [ 10.4092 ] [ 10.4129 ] tegraparser_v2 --read_fusetype SecureBootKey read_fuse.bin [ 10.4160 ] [ 10.4190 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 10.4217 ] Bootloader version 01.00.0000 [ 10.5466 ] Saved read fuses in file __fuse_read_scatter.bin [ 10.5545 ] Fuse read successful [ 10.5545 ] [ 10.5578 ] tegraparser_v2 --read_fusetype Kek0 read_fuse.bin [ 10.5611 ] [ 10.5643 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 10.5670 ] Bootloader version 01.00.0000 [ 10.6407 ] Saved read fuses in file __fuse_read_scatter.bin [ 10.6486 ] Fuse read successful [ 10.6486 ] [ 10.6518 ] tegraparser_v2 --read_fusetype Kek1 read_fuse.bin [ 10.6550 ] [ 10.6582 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 10.6611 ] Bootloader version 01.00.0000 [ 10.7724 ] Saved read fuses in file __fuse_read_scatter.bin [ 10.7803 ] Fuse read successful [ 10.7803 ] [ 10.7835 ] tegraparser_v2 --read_fusetype Kek2 read_fuse.bin [ 10.7867 ] [ 10.7899 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 10.7927 ] Bootloader version 01.00.0000 [ 10.8927 ] Saved read fuses in file __fuse_read_scatter.bin [ 10.9009 ] Fuse read successful [ 10.9009 ] [ 10.9046 ] tegraparser_v2 --read_fusetype Kek256 read_fuse.bin [ 10.9079 ] [ 10.9109 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 10.9139 ] Bootloader version 01.00.0000 [ 11.0172 ] Saved read fuses in file __fuse_read_scatter.bin [ 11.0253 ] Fuse read successful [ 11.0253 ] [ 11.0287 ] tegraparser_v2 --read_fusetype BootSecurityInfo read_fuse.bin [ 11.0323 ] [ 11.0358 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 11.0386 ] Bootloader version 01.00.0000 [ 11.1363 ] Saved read fuses in file __fuse_read_scatter.bin [ 11.1442 ] Fuse read successful [ 11.1442 ] [ 11.1478 ] tegraparser_v2 --read_fusetype JtagDisable read_fuse.bin [ 11.1510 ] [ 11.1548 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 11.1578 ] Bootloader version 01.00.0000 [ 11.2530 ] Saved read fuses in file __fuse_read_scatter.bin [ 11.2612 ] Fuse read successful [ 11.2623 ] [ 11.2658 ] tegraparser_v2 --read_fusetype SecurityMode read_fuse.bin [ 11.2695 ] [ 11.2730 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 11.2766 ] Bootloader version 01.00.0000 [ 11.4150 ] Saved read fuses in file __fuse_read_scatter.bin [ 11.4224 ] Fuse read successful [ 11.4225 ] [ 11.4267 ] tegraparser_v2 --read_fusetype SwReserved read_fuse.bin [ 11.4299 ] [ 11.4329 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 11.4346 ] Bootloader version 01.00.0000 [ 11.5087 ] Saved read fuses in file __fuse_read_scatter.bin [ 11.5156 ] Fuse read successful [ 11.5157 ] [ 11.5192 ] tegraparser_v2 --read_fusetype DebugAuthentication read_fuse.bin [ 11.5225 ] [ 11.5257 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 11.5287 ] Bootloader version 01.00.0000 [ 11.6240 ] Saved read fuses in file __fuse_read_scatter.bin [ 11.6315 ] Fuse read successful [ 11.6315 ] [ 11.6348 ] tegraparser_v2 --read_fusetype OdmId read_fuse.bin [ 11.6383 ] [ 11.6418 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 11.6446 ] Bootloader version 01.00.0000 [ 11.7490 ] Saved read fuses in file __fuse_read_scatter.bin [ 11.7565 ] Fuse read successful [ 11.7565 ] [ 11.7605 ] tegraparser_v2 --read_fusetype OdmLock read_fuse.bin [ 11.7640 ] [ 11.7671 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 11.7698 ] Bootloader version 01.00.0000 [ 11.8688 ] Saved read fuses in file __fuse_read_scatter.bin [ 11.8761 ] Fuse read successful [ 11.8762 ] [ 11.8795 ] tegraparser_v2 --read_fusetype ReservedOdm0 read_fuse.bin [ 11.8828 ] [ 11.8859 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 11.8889 ] Bootloader version 01.00.0000 [ 11.9927 ] Saved read fuses in file __fuse_read_scatter.bin [ 12.0006 ] Fuse read successful [ 12.0007 ] [ 12.0049 ] tegraparser_v2 --read_fusetype ReservedOdm1 read_fuse.bin [ 12.0089 ] [ 12.0123 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 12.0156 ] Bootloader version 01.00.0000 [ 12.1472 ] Saved read fuses in file __fuse_read_scatter.bin [ 12.1545 ] Fuse read successful [ 12.1545 ] [ 12.1579 ] tegraparser_v2 --read_fusetype ReservedOdm2 read_fuse.bin [ 12.1615 ] [ 12.1646 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 12.1674 ] Bootloader version 01.00.0000 [ 12.2868 ] Saved read fuses in file __fuse_read_scatter.bin [ 12.2945 ] Fuse read successful [ 12.2945 ] [ 12.2978 ] tegraparser_v2 --read_fusetype ReservedOdm3 read_fuse.bin [ 12.3012 ] [ 12.3045 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 12.3073 ] Bootloader version 01.00.0000 [ 12.3879 ] Saved read fuses in file __fuse_read_scatter.bin [ 12.3956 ] Fuse read successful [ 12.3956 ] [ 12.3988 ] tegraparser_v2 --read_fusetype ReservedOdm4 read_fuse.bin [ 12.4025 ] [ 12.4057 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 12.4084 ] Bootloader version 01.00.0000 [ 12.5351 ] Saved read fuses in file __fuse_read_scatter.bin [ 12.5424 ] Fuse read successful [ 12.5425 ] [ 12.5457 ] tegraparser_v2 --read_fusetype ReservedOdm5 read_fuse.bin [ 12.5489 ] [ 12.5523 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 12.5552 ] Bootloader version 01.00.0000 [ 12.6370 ] Saved read fuses in file __fuse_read_scatter.bin [ 12.6443 ] Fuse read successful [ 12.6443 ] [ 12.6475 ] tegraparser_v2 --read_fusetype ReservedOdm6 read_fuse.bin [ 12.6507 ] [ 12.6537 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 12.6564 ] Bootloader version 01.00.0000 [ 12.7609 ] Saved read fuses in file __fuse_read_scatter.bin [ 12.7687 ] Fuse read successful [ 12.7687 ] [ 12.7719 ] tegraparser_v2 --read_fusetype ReservedOdm7 read_fuse.bin [ 12.7751 ] [ 12.7783 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 12.7810 ] Bootloader version 01.00.0000 [ 12.9308 ] Saved read fuses in file __fuse_read_scatter.bin [ 12.9380 ] Fuse read successful [ 12.9380 ] [ 12.9387 ] Rebooting to recovery mode [ 12.9416 ] tegradevflash_v2 --reboot recovery [ 12.9441 ] Bootloader version 01.00.0000 [ 13.0328 ] Fuse reading is done. The fuse values have been saved in: /home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/fuse_info.txt PublicKeyHash: 0000000000000000000000000000000000000000000000000000000000000000 SecureBootKey: 00000000000000000000000000000000 Kek0: 00000000000000000000000000000000 Kek1: 00000000000000000000000000000000 Kek2: 00000000000000000000000000000000 Kek256: 0000000000000000000000000000000000000000000000000000000000000000 BootSecurityInfo: 00000000 JtagDisable: 00000000 SecurityMode: 00000000 SwReserved: 00000000 DebugAuthentication: 00000000 OdmId: 0000000000000000 OdmLock: 00000000 ReservedOdm0: 00000000 ReservedOdm1: 00000000 ReservedOdm2: 00000000 ReservedOdm3: 00000000 ReservedOdm4: 00000000 ReservedOdm5: 00000000 ReservedOdm6: 00000000 ReservedOdm7: 00000000 *** Calculating HASH from keyfile /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem ... done PKC HASH: 0x04738c15ebf70ef5c955911fc024e0e6a3fc645e2438384a62d451770a238b0b *** Generating fuse configuration ... done. Test mode: using dummy so no fuses will be burned. *** Start preparing fuse configuration ... *** done.