############################################################################### # L4T BSP Information: # R34 , REVISION: 1.1 ############################################################################### # Target Board Information: # Name: jetson-agx-orin-devkit, Board Family: t186ref, SoC: Tegra 234, # OpMode: production, Boot Authentication: NS, # Disk encryption: disabled , ############################################################################### copying emc_fuse_dev_params(/home/dji/nvidia/nvidia_sdk/JetPack_5.0.1_DP_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-br-bct-diag-boot.dts)... done. copying device_config(/home/dji/nvidia/nvidia_sdk/JetPack_5.0.1_DP_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-device-p3701-0000.dts)... done. copying misc_config(/home/dji/nvidia/nvidia_sdk/JetPack_5.0.1_DP_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-misc-p3701-0000.dts)... done. ./tegraflash.py --chip 0x23 --applet "/home/dji/nvidia/nvidia_sdk/JetPack_5.0.1_DP_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/bootloader/mb1_t234_prod.bin" --skipuid --cfg readinfo_t234_min_prod.xml --dev_params tegra234-br-bct-diag-boot.dts --device_config tegra234-mb1-bct-device-p3701-0000.dts --misc_config tegra234-mb1-bct-misc-p3701-0000.dts --bins "mb2_applet applet_t234.bin" --cmd "dump eeprom cvm cvm.bin; dump custinfo custinfo_out.bin; reboot recovery" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0080 ] tegrarcm_v2 --chip 0x23 --ismb2applet [ 0.0085 ] File rcm_state open failed [ 0.0086 ] ERROR: failed to read rcm_state [ 0.0086 ] [ 0.0094 ] tegrasign_v3.py --key None --getmode mode.txt [ 0.0095 ] Assuming zero filled SBK key [ 0.0088 ] Pre-processing config: tegra234-mb1-bct-device-p3701-0000.dts [ 0.0124 ] Pre-processing config: tegra234-br-bct-diag-boot.dts [ 0.0155 ] Pre-processing config: tegra234-mb1-bct-misc-p3701-0000.dts [ 0.0250 ] Parsing partition layout [ 0.0261 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp [ 0.0274 ] [ 0.0283 ] Parsing partition layout [ 0.0295 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp [ 0.0311 ] [ 0.0311 ] Creating list of images to be signed [ 0.0324 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --list images_list.xml zerosbk [ 0.0337 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin [ 0.0350 ] Header already present for mb1_t234_prod_aligned_sigheader.bin [ 0.0355 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin [ 0.0412 ] Header already present for mb1_t234_prod_aligned_sigheader.bin [ 0.0415 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin [ 0.0458 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin [ 0.0461 ] adding BCH for mb2_t234_aligned.bin [ 0.0488 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin [ 0.0588 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin [ 0.0590 ] adding BCH for mb2_t234_aligned.bin [ 0.0703 ] [ 0.0704 ] Generating signatures [ 0.0712 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.0713 ] Assuming zero filled SBK key [ 0.0810 ] Warning: pub_key.key is not found [ 0.0803 ] Generating br-bct [ 0.0809 ] Updating dev and MSS params in BR BCT [ 0.0810 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0 [ 0.0818 ] [ 0.0818 ] Updating bl info [ 0.0825 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml [ 0.0831 ] WARNING: boot chain is not completed. set to 0 [ 0.0839 ] [ 0.0839 ] Get Signed section of bct [ 0.0847 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml [ 0.0856 ] [ 0.0857 ] Signing BCT [ 0.0865 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.0867 ] Assuming zero filled SBK key [ 0.0891 ] Sha saved in br_bct_BR.sha [ 0.0895 ] Warning: pub_key.key is not found [ 0.0887 ] Updating BCT with signature [ 0.0894 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml [ 0.0904 ] [ 0.0905 ] Generating SHA2 Hash [ 0.0913 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512 [ 0.0914 ] Assuming zero filled SBK key [ 0.0915 ] Assuming zero filled SBK key [ 0.0943 ] Sha saved in br_bct_BR.sha [ 0.0940 ] Updating BCT with SHA2 Hash [ 0.0948 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 --updatesha bct_list_signed.xml [ 0.0956 ] Offset :68 Len :8124 [ 0.0959 ] [ 0.0959 ] Generating coldboot mb1-bct [ 0.0970 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3701-0000_cpp.dtb --device tegra234-mb1-bct-device-p3701-0000_cpp.dtb [ 0.0978 ] MB1-BCT version: 0.7 [ 0.0980 ] ERROR: /misc/axi_ap_virtual_client is not supported [ 0.0990 ] Parsing config file :tegra234-mb1-bct-device-p3701-0000_cpp.dtb [ 0.0992 ] Added Platform Config 9 data with size :- 80 [ 0.0992 ] [ 0.0992 ] Updating mb1-bct with firmware information [ 0.1000 ] tegrabct_v2 --chip 0x23 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin [ 0.1012 ] [ 0.1022 ] tegrahost_v2 --chip 0x23 --align mb1_cold_boot_bct_MB1_aligned.bct [ 0.1030 ] [ 0.1039 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk [ 0.1046 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct [ 0.1052 ] [ 0.1064 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --sha sha512 [ 0.1067 ] Assuming zero filled SBK key [ 0.1088 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk [ 0.1101 ] [ 0.1103 ] Generating recovery mb1-bct [ 0.1110 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3701-0000_cpp.dtb --device tegra234-mb1-bct-device-p3701-0000_cpp.dtb [ 0.1117 ] MB1-BCT version: 0.7 [ 0.1119 ] ERROR: /misc/axi_ap_virtual_client is not supported [ 0.1128 ] Parsing config file :tegra234-mb1-bct-device-p3701-0000_cpp.dtb [ 0.1130 ] Added Platform Config 9 data with size :- 80 [ 0.1130 ] [ 0.1131 ] Updating mb1-bct with firmware information [ 0.1138 ] tegrabct_v2 --chip 0x23 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo readinfo_t234_min_prod.xml.bin [ 0.1149 ] [ 0.1158 ] tegrahost_v2 --chip 0x23 --align mb1_bct_MB1_aligned.bct [ 0.1166 ] [ 0.1174 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_bct_MB1_aligned.bct zerosbk [ 0.1182 ] adding BCH for mb1_bct_MB1_aligned.bct [ 0.1187 ] [ 0.1198 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --sha sha512 [ 0.1200 ] Assuming zero filled SBK key [ 0.1218 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk [ 0.1231 ] [ 0.1233 ] Error: Skip generating mem_bct because sdram_config is not defined [ 0.1234 ] Error: Skip generating mem_bct because sdram_config is not defined [ 0.1234 ] Copying signatures [ 0.1242 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml [ 0.1285 ] [ 0.1290 ] Boot Rom communication [ 0.1298 ] tegrarcm_v2 --new_session --chip 0x23 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt [ 0.1305 ] BR_CID: 0x80012344705DD10F2000000017028280 [ 0.1316 ] Sending bct_br [ 0.1462 ] Sending mb1 [ 0.1468 ] Sending psc_bl1 [ 0.1554 ] Sending bct_mb1 [ 0.1613 ] [ 0.1613 ] Boot Rom communication completed [ 0.1631 ] tegrahost_v2 --chip 0x23 --align applet_t234_aligned.bin [ 0.1643 ] [ 0.1657 ] tegrahost_v2 --chip 0x23 0 --magicid MB2A --appendsigheader applet_t234_aligned.bin zerosbk [ 0.1671 ] adding BCH for applet_t234_aligned.bin [ 0.1797 ] [ 0.1808 ] tegrasign_v3.py --key None --list applet_t234_aligned_sigheader.bin_list.xml --sha sha512 [ 0.1810 ] Assuming zero filled SBK key [ 0.1829 ] tegrahost_v2 --chip 0x23 0 --updatesigheader applet_t234_aligned_sigheader.bin.encrypt applet_t234_aligned_sigheader.bin.hash zerosbk [ 0.1842 ] [ 0.1846 ] Sending mb2_applet... [ 0.1853 ] tegrarcm_v2 --chip 0x23 --pollbl --download applet applet_t234_sigheader.bin.encrypt [ 0.1860 ] BL: version 0.11.0.0-t234-54845784-7fb1fa27 last_boot_error: 0 [ 0.3571 ] Sending applet [ 0.4757 ] [ 0.4757 ] completed [ 0.4769 ] tegrarcm_v2 --chip 0x23 --ismb2applet [ 0.4778 ] MB2 Applet version 01.00.0000 [ 0.6712 ] [ 0.6723 ] tegrarcm_v2 --chip 0x23 --ismb2applet [ 0.6730 ] MB2 Applet version 01.00.0000 [ 0.6752 ] [ 0.6760 ] Retrieving board information [ 0.6767 ] tegrarcm_v2 --chip 0x23 --oem platformdetails chip chip_info.bin [ 0.6775 ] MB2 Applet version 01.00.0000 [ 0.6998 ] Saved platform info in chip_info.bin [ 0.7050 ] Chip minor revision: 1 [ 0.7051 ] Bootrom revision: 0x7 [ 0.7052 ] Ram code: 0x0 [ 0.7052 ] Chip sku: 0xd0 [ 0.7053 ] Chip Sample: prod [ 0.7058 ] [ 0.7060 ] Retrieving EEPROM data [ 0.7060 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/dji/nvidia/nvidia_sdk/JetPack_5.0.1_DP_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/bootloader/cvm.bin --chip 0x23 [ 0.7068 ] MB2 Applet version 01.00.0000 [ 0.7238 ] Saved platform info in /home/dji/nvidia/nvidia_sdk/JetPack_5.0.1_DP_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/bootloader/cvm.bin [ 0.7561 ] [ 0.7577 ] tegrarcm_v2 --chip 0x23 --ismb2applet [ 0.7588 ] MB2 Applet version 01.00.0000 [ 0.7611 ] [ 0.7621 ] tegrarcm_v2 --chip 0x23 --ismb2applet [ 0.7632 ] MB2 Applet version 01.00.0000 [ 0.7798 ] [ 0.7799 ] Dumping customer Info [ 0.7813 ] tegrarcm_v2 --chip 0x23 --oem dump bct tmp.bct [ 0.7824 ] MB2 Applet version 01.00.0000 [ 0.8000 ] Saved bct in tmp.bct [ 0.8070 ] [ 0.8083 ] tegrabct_v2 --brbct tmp.bct --chip 0x23 0 --custinfo /home/dji/nvidia/nvidia_sdk/JetPack_5.0.1_DP_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/bootloader/custinfo_out.bin [ 0.8094 ] Customer data saved in /home/dji/nvidia/nvidia_sdk/JetPack_5.0.1_DP_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/bootloader/custinfo_out.bin successfully [ 0.8101 ] Rebooting to recovery mode [ 0.8113 ] tegrarcm_v2 --chip 0x23 --ismb2 [ 0.8147 ] [ 0.8159 ] tegrarcm_v2 --chip 0x23 --ismb2applet [ 0.8169 ] MB2 Applet version 01.00.0000 [ 0.8318 ] [ 0.8318 ] Booting to recovery mode [ 0.8328 ] tegrarcm_v2 --chip 0x23 --reboot recovery [ 0.8336 ] MB2 Applet version 01.00.0000 [ 0.8558 ] Board ID(3701) version(500) sku(0000) revision(H.0) Error: missing dtbfile (/home/dji/nvidia/nvidia_sdk/JetPack_5.0.1_DP_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/kernel/dtb/tegra234-p3701-0000-p3737-0000.dtb). Usage: sudo ./flash.sh [options] t186ref mmcblk0p1 options: -b --------- Boot control table config file. -c --------- Flash partition table config file. -d --------- device tree file. -e ------- Target device's eMMC size. -f -------- Path to flash application (tegraflash.py) -h ------------------- print this message. -i - key for disk encryption support. -k ---- partition name or number specified in flash.cfg. -m ----- MTS preboot such as mts_preboot_si. -n -------- Static nfs network assignments ::: -o --------- ODM data. -p --------- Total eMMC HW boot partition size. -r ------------------- skip building and reuse existing system.img. -s ----- PKC key used for signing and building bl_update_payload. -t ------- tegraboot binary such as nvtboot.bin -u ----- PKC key used for odm fused board. -v ----- Secure Boot Key (SBK) key used for ODM fused board. -w --------- warm boot binary such as nvtbootwb0.bin -x --------- Tegra CHIPID. default = 0x18(jetson-tx2) 0x21(jetson-tx1). -z -------------- Serial Number of target board. -B --------- BoardId. -C --------- Kernel commandline arguments. WARNING: Each option in this kernel commandline gets higher preference over the values set by flash.sh. In case of NFS booting, this script adds NFS booting related arguments, if -i option is omitted. -F --------- Flash server such as cboot.bin. -G ------- Read partition and save image to file. -I ---------- initrd file. Null initrd is default. -K ---------- Kernel image file such as zImage or Image. -L ------ Bootloader such as cboot.bin or u-boot-dtb.bin. -M -------- MTS boot file such as mts_si. -N --------- i.e. :/my/exported/nfs/rootfs. -P -- Primary GPT start address + size of PPT + 1. -R ------ Sample rootfs directory. -S ------------ Rootfs size in bytes. Valid only for internal rootdev. KiB, MiB, GiB short hands are allowed, for example, 1GiB means 1024 * 1024 * 1024 bytes. -Z ------------------- Print configurations and then exit. --no-flash ----------- perform all steps except physically flashing the board. This will create a system.img. --external-device----- Generate flash images for external devices --sparseupdate-------- only flash partitions that have changed. Currently only support SPI flash memory --no-systemimg ------- Do not create or re-create system.img. --bup ---------------- Generate bootloader update payload(BUP). --multi-spec---------- Enable support for building multi-spec BUP. --clean-up------------ Clean up BUP buffer when multi-spec is enabled. --usb-instance -- Specify the USB instance to connect to; = USB port path (e.g. 3-14). --no-root-check ------ Typical usage of this script require root permissions. Pass this option to allow running the script as a regular user, in which case only specific combinations of command-line options will be functional. --user_key User provided key file (16-byte) to encrypt user images, like kernel, kernel-dtb and initrd. If user_key is specified, SBK key (-v) has to be specified. For now, user_key file must contain all 0's. --rcm-boot ----------- Do RCM boot instead of physically flashing the board. --sign --------------- Sign images and store them under "bootloader/signed" directory. The board will not be physically flashed. --image -------------- Specify the image to be written into board.