sudo ./odmfuseread.sh -i 0x19 -S /tmp/keys/sbk.key -k /tmp/keys/rsa.key jetson-xavier-nx-devkit-emmc copying soft_fuses(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. copying soft_fuses(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. ./tegraflash.py --chip 0x19 --applet "/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/mb1_t194_prod.bin" --skipuid --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --bins "mb2_applet nvtboot_applet_t194.bin" --cmd "dump eeprom boardinfo cvm.bin;reboot recovery" --encrypt_key "/tmp/keys/sbk.key" --key "/tmp/keys/rsa.key" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0126 ] Generating RCM messages [ 0.0150 ] tegrasign_v2 --key /tmp/keys/sbk.key --file /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/mb1_t194_prod.bin --offset 4096 [ 0.0164 ] Key is a SBK key [ 0.0199 ] Key Size is 16 bytes [ 0.0311 ] [ 0.0333 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt.bin zerosbk [ 0.0347 ] Header already present for /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt.bin [ 0.0377 ] [ 0.0389 ] tegrasign_v2 --key /tmp/keys/rsa.key --getmode mode.txt [ 0.0401 ] PKC key in Open SSL format [ 0.0403 ] Key size is 256 bytes [ 0.0404 ] Valid PKC key [ 0.0414 ] [ 0.0430 ] tegrasign_v2 --key /tmp/keys/rsa.key --file /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt_sigheader.bin --offset 2960 --length 1136 --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 0.0447 ] PKC key in Open SSL format [ 0.0451 ] Key size is 256 bytes [ 0.0453 ] Valid PKC key [ 0.0461 ] Saving pkc public key in pub_key.key [ 0.0901 ] [ 0.0913 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin --updatesigheader /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt_sigheader.bin /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt_sigheader.sig oem-rsa [ 0.0955 ] [ 0.0982 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg.pdf sfuse.bin [ 0.1039 ] [ 0.1051 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt_sigheader.bin 0 0 [ 0.1059 ] RCM 0 is saved as rcm_0.rcm [ 0.1085 ] RCM 1 is saved as rcm_1.rcm [ 0.1085 ] RCM 2 is saved as rcm_2.rcm [ 0.1085 ] List of rcm files are saved in rcm_list.xml [ 0.1085 ] [ 0.1085 ] Signing RCM messages [ 0.1093 ] tegrasign_v2 --key /tmp/keys/rsa.key --list rcm_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 0.1102 ] PKC key in Open SSL format [ 0.1104 ] Key size is 256 bytes [ 0.1106 ] Valid PKC key [ 0.1114 ] Saving pkc public key in pub_key.key [ 0.2383 ] [ 0.2383 ] Copying signature to RCM mesages [ 0.2394 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml --pubkeyhash pub_key.key [ 0.2409 ] [ 0.2410 ] Boot Rom communication [ 0.2418 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_list_signed.xml --skipuid [ 0.2427 ] RCM version 0X190001 [ 0.2481 ] Boot Rom communication completed [ 1.2810 ] [ 2.2842 ] tegrarcm_v2 --isapplet [ 2.2850 ] Applet version 01.00.0000 [ 2.2896 ] [ 2.2907 ] tegrarcm_v2 --ismb2 [ 2.3117 ] [ 2.3126 ] tegrahost_v2 --chip 0x19 --align nvtboot_applet_t194.bin [ 2.3133 ] [ 2.3141 ] header_magic: 50000ea [ 2.3161 ] tegrasign_v2 --key /tmp/keys/sbk.key --list nvtboot_applet_t194.bin_list.xml [ 2.3171 ] Key is a SBK key [ 2.3174 ] Key Size is 16 bytes [ 2.3222 ] [ 2.3232 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_applet_t194.bin.encrypt nvtboot_applet_t194.bin.hash zerosbk [ 2.3242 ] [ 2.3248 ] tegrahost_v2 --chip 0x19 --align nvtboot_applet_t194.bin.encrypt [ 2.3254 ] [ 2.3260 ] tegrahost_v2 --appendsigheader nvtboot_applet_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid PLDT [ 2.3265 ] adding BCH for nvtboot_applet_t194.bin.encrypt [ 2.3292 ] [ 2.3293 ] header_magic: b0fefbdf [ 2.3303 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list nvtboot_applet_t194.bin_sigheader.encrypt_list.xml [ 2.3309 ] PKC key in Open SSL format [ 2.3312 ] Key size is 256 bytes [ 2.3314 ] Valid PKC key [ 2.3323 ] Saving pkc public key in pub_key.key [ 2.3778 ] [ 2.3789 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_applet_t194.bin_sigheader.encrypt.signed nvtboot_applet_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.3812 ] [ 2.3821 ] tegrarcm_v2 --download mb2 nvtboot_applet_t194.bin_sigheader.encrypt.signed [ 2.3827 ] Applet version 01.00.0000 [ 2.4001 ] Sending mb2 [ 2.4002 ] [................................................] 100% [ 2.4179 ] [ 2.4187 ] tegrarcm_v2 --boot recovery [ 2.4193 ] Applet version 01.00.0000 [ 2.4452 ] [ 3.4485 ] tegrarcm_v2 --isapplet [ 3.4536 ] [ 3.4548 ] tegrarcm_v2 --ismb2 [ 3.4561 ] MB2 Applet version 01.00.0000 [ 3.4776 ] [ 3.4791 ] tegrarcm_v2 --ismb2 [ 3.4800 ] MB2 Applet version 01.00.0000 [ 3.5184 ] [ 3.5196 ] Retrieving board information [ 3.5205 ] tegrarcm_v2 --oem platformdetails chip chip_info.bin [ 3.5216 ] MB2 Applet version 01.00.0000 [ 3.5651 ] Saved platform info in chip_info.bin [ 3.5703 ] Chip minor revision: 2 [ 3.5707 ] Bootrom revision: 0xf [ 3.5710 ] Ram code: 0x0 [ 3.5711 ] Chip sku: 0xde [ 3.5712 ] Chip Sample: non es [ 3.5747 ] [ 3.5756 ] Retrieving EEPROM data [ 3.5757 ] tegrarcm_v2 --oem platformdetails eeprom cvm /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/cvm.bin [ 3.5765 ] MB2 Applet version 01.00.0000 [ 3.5991 ] Saved platform info in /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/cvm.bin [ 3.6399 ] [ 3.6400 ] Rebooting to recovery mode [ 3.6409 ] tegrarcm_v2 --ismb2 [ 3.6415 ] MB2 Applet version 01.00.0000 [ 3.6470 ] [ 3.6471 ] Rebooting to recovery mode [ 3.6482 ] tegrarcm_v2 --reboot recovery [ 3.6492 ] MB2 Applet version 01.00.0000 [ 3.6783 ] Board ID(3668) version(200) sku(0001) revision(G.0) copying sdram_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg)... done. copying sdram_config1(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-memcfg-sw-override.cfg)... done. copying misc_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-flash.cfg)... done. copying pinmux_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-pinmux-p3668-a01.cfg)... done. copying scr_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying scr_cold_boot_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying pmc_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-padvoltage-p3668-a01.cfg)... done. copying pmic_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-pmic-p3668-0001-a00.cfg)... done. copying br_cmd_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-reset-p3668-0001-a00.cfg)... done. copying prod_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-prod-p3668-0001-a00.cfg)... done. copying dev_params(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-br-bct-qspi.cfg)... done. copying misc_cold_boot_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-l4t.cfg)... done. copying device_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-bct-device-qspi-p3668.cfg)... done. copying gpioint_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg)... done. copying soft_fuses(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. Existing mb2_bootloader(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/nvtboot_recovery_t194.bin) reused. Existing mts_preboot(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/preboot_c10_prod_cr.bin) reused. Existing mts_mce(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/mce_c10_prod_cr.bin) reused. Existing mts_proper(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/mts_c10_prod_cr.bin) reused. copying bootloader_dtb(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb)... done. Existing bpmp_fw(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/bpmp_t194.bin) reused. copying bpmp_fw_dtb(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/tegra194-a02-bpmp-p3668-a00.dtb)... done. Existing tlk(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/tos-trusty_t194.img) reused. Existing eks(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/eks.img) reused. Existing spe_fw(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/spe_t194.bin) reused. Existing mb1file(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing spefile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/spe_t194.bin) reused. Existing tegraboot(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/nvtboot_t194.bin) reused. Existing tbcfile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/cboot_t194.bin) reused. Existing scefile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. Existing camerafw(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/camera-rtcpu-rce.img) reused. Existing wb0boot(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/warmboot_t194_prod.bin) reused. done. Existing cfg(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/flash.xml) reused. Existing bl(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu_t194.bin) reused. Existing applet(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. ./tegraflash.py --sdram_config tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg,tegra194-memcfg-sw-override.cfg --misc_config tegra194-mb1-bct-misc-flash.cfg --pinmux_config tegra19x-mb1-pinmux-p3668-a01.cfg --scr_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --scr_cold_boot_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pmc_config tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic_config tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --br_cmd_config tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod_config tegra19x-mb1-prod-p3668-0001-a00.cfg --dev_params tegra194-br-bct-qspi.cfg --misc_cold_boot_config tegra194-mb1-bct-misc-l4t.cfg --device_config tegra19x-mb1-bct-device-qspi-p3668.cfg --gpioint_config tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --bins "mb2_bootloader nvtboot_recovery_t194.bin; mts_preboot preboot_c10_prod_cr.bin; mts_mce mce_c10_prod_cr.bin; mts_proper mts_c10_prod_cr.bin; bootloader_dtb tegra194-p3668-all-p3509-0000.dtb; bpmp_fw bpmp_t194.bin; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00.dtb; tlk tos-trusty_t194.img; eks eks.img; kernel boot.img; kernel_dtb tegra194-p3668-all-p3509-0000.dtb; spe_fw spe_t194.bin" --cfg flash.xml --bl nvtboot_recovery_cpu_t194.bin --odmdata 0xB8190000 --chip 0x19 --applet mb1_t194_prod.bin --key "/tmp/keys/rsa.key" --encrypt_key "/tmp/keys/sbk.key" --cmd "sign" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0085 ] tegrasign_v2 --key /tmp/keys/rsa.key --getmode mode.txt [ 0.0102 ] PKC key in Open SSL format [ 0.0104 ] Key size is 256 bytes [ 0.0106 ] Valid PKC key [ 0.0116 ] [ 0.0118 ] Generating RCM messages [ 0.0125 ] tegrasign_v2 --key /tmp/keys/sbk.key --file mb1_t194_prod.bin --offset 4096 [ 0.0131 ] Key is a SBK key [ 0.0134 ] Key Size is 16 bytes [ 0.0234 ] [ 0.0244 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod_encrypt.bin zerosbk [ 0.0252 ] Header already present for mb1_t194_prod_encrypt.bin [ 0.0282 ] [ 0.0290 ] tegrasign_v2 --key /tmp/keys/rsa.key --getmode mode.txt [ 0.0296 ] PKC key in Open SSL format [ 0.0298 ] Key size is 256 bytes [ 0.0300 ] Valid PKC key [ 0.0310 ] [ 0.0317 ] tegrasign_v2 --key /tmp/keys/rsa.key --file mb1_t194_prod_encrypt_sigheader.bin --offset 2960 --length 1136 --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 0.0323 ] PKC key in Open SSL format [ 0.0325 ] Key size is 256 bytes [ 0.0327 ] Valid PKC key [ 0.0336 ] Saving pkc public key in pub_key.key [ 0.0777 ] [ 0.0787 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin --updatesigheader mb1_t194_prod_encrypt_sigheader.bin mb1_t194_prod_encrypt_sigheader.sig oem-rsa [ 0.0820 ] [ 0.0827 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg sfuse.bin [ 0.0835 ] [ 0.0842 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_encrypt_sigheader.bin 0 0 [ 0.0849 ] RCM 0 is saved as rcm_0.rcm [ 0.0872 ] RCM 1 is saved as rcm_1.rcm [ 0.0873 ] RCM 2 is saved as rcm_2.rcm [ 0.0873 ] List of rcm files are saved in rcm_list.xml [ 0.0873 ] [ 0.0873 ] Signing RCM messages [ 0.0880 ] tegrasign_v2 --key /tmp/keys/rsa.key --list rcm_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 0.0887 ] PKC key in Open SSL format [ 0.0891 ] Key size is 256 bytes [ 0.0894 ] Valid PKC key [ 0.0900 ] Saving pkc public key in pub_key.key [ 0.2128 ] [ 0.2128 ] Copying signature to RCM mesages [ 0.2137 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml --pubkeyhash pub_key.key [ 0.2151 ] [ 0.2152 ] Parsing partition layout [ 0.2281 ] tegraparser_v2 --pt flash.xml.tmp [ 0.2324 ] [ 0.2325 ] Creating list of images to be signed [ 0.2337 ] tegrahost_v2 --chip 0x19 --partitionlayout flash.xml.bin --list images_list.xml [ 0.2345 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.2351 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.2361 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.2385 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.2391 ] adding BCH for spe_t194.bin [ 0.2413 ] adding BCH for spe_t194.bin [ 0.2432 ] adding BCH for nvtboot_t194.bin [ 0.2453 ] adding BCH for nvtboot_t194.bin [ 0.2484 ] Header already present for preboot_c10_prod_cr.bin [ 0.2522 ] Header already present for preboot_c10_prod_cr.bin [ 0.2528 ] Header already present for mce_c10_prod_cr.bin [ 0.2530 ] Header already present for mce_c10_prod_cr.bin [ 0.2542 ] adding BCH for mts_c10_prod_cr.bin [ 0.2573 ] adding BCH for mts_c10_prod_cr.bin [ 0.3213 ] Header already present for warmboot_t194_prod.bin [ 0.3856 ] Header already present for warmboot_t194_prod.bin [ 0.3862 ] adding BCH for cboot_t194.bin [ 0.3869 ] adding BCH for cboot_t194.bin [ 0.3949 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb [ 0.4038 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb [ 0.4072 ] adding BCH for tos-trusty_t194.img [ 0.4111 ] adding BCH for tos-trusty_t194.img [ 0.4184 ] adding BCH for eks.img [ 0.4265 ] adding BCH for eks.img [ 0.4267 ] adding BCH for adsp-fw.bin [ 0.4279 ] adding BCH for adsp-fw.bin [ 0.4293 ] adding BCH for camera-rtcpu-rce.img [ 0.4310 ] adding BCH for camera-rtcpu-rce.img [ 0.4357 ] adding BCH for bpmp_t194.bin [ 0.4411 ] adding BCH for bpmp_t194.bin [ 0.4577 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 0.4739 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 0.4787 ] adding BCH for boot.img [ 0.4831 ] adding BCH for boot.img [ 0.4833 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb [ 0.4836 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb [ 0.4908 ] [ 0.4919 ] tegrasign_v2 --key /tmp/keys/rsa.key --list images_list.xml --pubkeyhash pub_key.key [ 0.4927 ] PKC key in Open SSL format [ 0.4929 ] Key size is 256 bytes [ 0.4930 ] Valid PKC key [ 0.4940 ] Saving pkc public key in pub_key.key [ 1.9840 ] [ 1.9840 ] Generating br-bct [ 1.9849 ] Performing cfg overlay [ 1.9849 ] ['tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg', 'tegra194-memcfg-sw-override.cfg'] [ 1.9851 ] sw_memcfg_overlay.pl -c tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg -s tegra194-memcfg-sw-override.cfg -o /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1.cfg [ 2.0337 ] [ 2.0339 ] Updating dev and MSS params in BR BCT [ 2.0340 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 2.0657 ] [ 2.0657 ] Updating bl info [ 2.0665 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 2.0695 ] [ 2.0709 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin [ 2.0716 ] [ 2.0718 ] header_magic: 4e564441 [ 2.0725 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mb1_t194_prod_sigheader.bin_list.xml [ 2.0748 ] Key is a SBK key [ 2.0751 ] Key Size is 16 bytes [ 2.0850 ] [ 2.0862 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt mb1_t194_prod_sigheader.bin.hash zerosbk [ 2.0897 ] [ 2.0910 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 2.0919 ] [ 2.0931 ] tegrahost_v2 --appendsigheader mb1_t194_prod_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 2.0945 ] Header already present for mb1_t194_prod_sigheader.bin.encrypt [ 2.0971 ] [ 2.0972 ] header_magic: 4e564441 [ 2.0983 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mb1_t194_prod_sigheader.bin.encrypt_list.xml [ 2.0990 ] PKC key in Open SSL format [ 2.0992 ] Key size is 256 bytes [ 2.0993 ] Valid PKC key [ 2.1003 ] Saving pkc public key in pub_key.key [ 2.1453 ] [ 2.1471 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.1510 ] [ 2.1524 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin [ 2.1530 ] [ 2.1531 ] header_magic: 4e564441 [ 2.1541 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mb1_t194_prod_sigheader.bin_list.xml [ 2.1548 ] Key is a SBK key [ 2.1549 ] Key Size is 16 bytes [ 2.1662 ] [ 2.1673 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt mb1_t194_prod_sigheader.bin.hash zerosbk [ 2.1708 ] [ 2.1716 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 2.1723 ] [ 2.1731 ] tegrahost_v2 --appendsigheader mb1_t194_prod_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 2.1739 ] Header already present for mb1_t194_prod_sigheader.bin.encrypt [ 2.1769 ] [ 2.1771 ] header_magic: 4e564441 [ 2.1788 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mb1_t194_prod_sigheader.bin.encrypt_list.xml [ 2.1797 ] PKC key in Open SSL format [ 2.1800 ] Key size is 256 bytes [ 2.1801 ] Valid PKC key [ 2.1810 ] Saving pkc public key in pub_key.key [ 2.2260 ] [ 2.2269 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.2308 ] [ 2.2324 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin [ 2.2331 ] [ 2.2332 ] header_magic: 4e564441 [ 2.2339 ] tegrasign_v2 --key /tmp/keys/sbk.key --list spe_t194_sigheader.bin_list.xml [ 2.2345 ] Key is a SBK key [ 2.2348 ] Key Size is 16 bytes [ 2.2384 ] [ 2.2397 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 2.2420 ] [ 2.2429 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin.encrypt [ 2.2436 ] [ 2.2443 ] tegrahost_v2 --appendsigheader spe_t194_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid SPEF [ 2.2451 ] Header already present for spe_t194_sigheader.bin.encrypt [ 2.2465 ] [ 2.2466 ] header_magic: 4e564441 [ 2.2477 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list spe_t194_sigheader.bin.encrypt_list.xml [ 2.2484 ] PKC key in Open SSL format [ 2.2487 ] Key size is 256 bytes [ 2.2488 ] Valid PKC key [ 2.2498 ] Saving pkc public key in pub_key.key [ 2.2943 ] [ 2.2959 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt.signed spe_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.2983 ] [ 2.3007 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin [ 2.3016 ] [ 2.3018 ] header_magic: 4e564441 [ 2.3028 ] tegrasign_v2 --key /tmp/keys/sbk.key --list spe_t194_sigheader.bin_list.xml [ 2.3036 ] Key is a SBK key [ 2.3037 ] Key Size is 16 bytes [ 2.3074 ] [ 2.3084 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 2.3102 ] [ 2.3109 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin.encrypt [ 2.3117 ] [ 2.3125 ] tegrahost_v2 --appendsigheader spe_t194_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid SPEF [ 2.3131 ] Header already present for spe_t194_sigheader.bin.encrypt [ 2.3144 ] [ 2.3145 ] header_magic: 4e564441 [ 2.3154 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list spe_t194_sigheader.bin.encrypt_list.xml [ 2.3161 ] PKC key in Open SSL format [ 2.3163 ] Key size is 256 bytes [ 2.3165 ] Valid PKC key [ 2.3174 ] Saving pkc public key in pub_key.key [ 2.3606 ] [ 2.3617 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt.signed spe_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.3644 ] [ 2.3656 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin [ 2.3662 ] [ 2.3663 ] header_magic: 4e564441 [ 2.3671 ] tegrasign_v2 --key /tmp/keys/sbk.key --list nvtboot_t194_sigheader.bin_list.xml [ 2.3677 ] Key is a SBK key [ 2.3679 ] Key Size is 16 bytes [ 2.3740 ] [ 2.3755 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt nvtboot_t194_sigheader.bin.hash zerosbk [ 2.3788 ] [ 2.3799 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin.encrypt [ 2.3806 ] [ 2.3812 ] tegrahost_v2 --appendsigheader nvtboot_t194_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MB2B [ 2.3818 ] Header already present for nvtboot_t194_sigheader.bin.encrypt [ 2.3836 ] [ 2.3837 ] header_magic: 4e564441 [ 2.3845 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list nvtboot_t194_sigheader.bin.encrypt_list.xml [ 2.3851 ] PKC key in Open SSL format [ 2.3854 ] Key size is 256 bytes [ 2.3855 ] Valid PKC key [ 2.3864 ] Saving pkc public key in pub_key.key [ 2.4302 ] [ 2.4311 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt.signed nvtboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.4336 ] [ 2.4347 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin [ 2.4354 ] [ 2.4355 ] header_magic: 4e564441 [ 2.4364 ] tegrasign_v2 --key /tmp/keys/sbk.key --list nvtboot_t194_sigheader.bin_list.xml [ 2.4371 ] Key is a SBK key [ 2.4374 ] Key Size is 16 bytes [ 2.4442 ] [ 2.4454 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt nvtboot_t194_sigheader.bin.hash zerosbk [ 2.4479 ] [ 2.4486 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin.encrypt [ 2.4492 ] [ 2.4499 ] tegrahost_v2 --appendsigheader nvtboot_t194_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MB2B [ 2.4505 ] Header already present for nvtboot_t194_sigheader.bin.encrypt [ 2.4527 ] [ 2.4528 ] header_magic: 4e564441 [ 2.4538 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list nvtboot_t194_sigheader.bin.encrypt_list.xml [ 2.4548 ] PKC key in Open SSL format [ 2.4551 ] Key size is 256 bytes [ 2.4553 ] Valid PKC key [ 2.4565 ] Saving pkc public key in pub_key.key [ 2.5013 ] [ 2.5023 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt.signed nvtboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.5049 ] [ 2.5071 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin [ 2.5084 ] [ 2.5085 ] header_magic: 4e564441 [ 2.5093 ] tegrasign_v2 --key /tmp/keys/sbk.key --list preboot_c10_prod_cr_sigheader.bin_list.xml [ 2.5099 ] Key is a SBK key [ 2.5101 ] Key Size is 16 bytes [ 2.5109 ] [ 2.5118 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.5139 ] [ 2.5148 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin.encrypt [ 2.5155 ] [ 2.5163 ] tegrahost_v2 --appendsigheader preboot_c10_prod_cr_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MTSP [ 2.5171 ] Header already present for preboot_c10_prod_cr_sigheader.bin.encrypt [ 2.5174 ] [ 2.5175 ] header_magic: 4e564441 [ 2.5183 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list preboot_c10_prod_cr_sigheader.bin.encrypt_list.xml [ 2.5189 ] PKC key in Open SSL format [ 2.5191 ] Key size is 256 bytes [ 2.5192 ] Valid PKC key [ 2.5202 ] Saving pkc public key in pub_key.key [ 2.5653 ] [ 2.5667 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt.signed preboot_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.5678 ] [ 2.5689 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin [ 2.5696 ] [ 2.5697 ] header_magic: 4e564441 [ 2.5706 ] tegrasign_v2 --key /tmp/keys/sbk.key --list preboot_c10_prod_cr_sigheader.bin_list.xml [ 2.5712 ] Key is a SBK key [ 2.5714 ] Key Size is 16 bytes [ 2.5725 ] [ 2.5734 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.5744 ] [ 2.5753 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin.encrypt [ 2.5760 ] [ 2.5766 ] tegrahost_v2 --appendsigheader preboot_c10_prod_cr_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MTSP [ 2.5775 ] Header already present for preboot_c10_prod_cr_sigheader.bin.encrypt [ 2.5781 ] [ 2.5782 ] header_magic: 4e564441 [ 2.5800 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list preboot_c10_prod_cr_sigheader.bin.encrypt_list.xml [ 2.5810 ] PKC key in Open SSL format [ 2.5812 ] Key size is 256 bytes [ 2.5815 ] Valid PKC key [ 2.5824 ] Saving pkc public key in pub_key.key [ 2.6277 ] [ 2.6291 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt.signed preboot_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.6309 ] [ 2.6325 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin [ 2.6332 ] [ 2.6333 ] header_magic: 4e564441 [ 2.6340 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mce_c10_prod_cr_sigheader.bin_list.xml [ 2.6346 ] Key is a SBK key [ 2.6347 ] Key Size is 16 bytes [ 2.6408 ] [ 2.6418 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.6442 ] [ 2.6450 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin.encrypt [ 2.6458 ] [ 2.6471 ] tegrahost_v2 --appendsigheader mce_c10_prod_cr_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MTSM [ 2.6478 ] Header already present for mce_c10_prod_cr_sigheader.bin.encrypt [ 2.6493 ] [ 2.6494 ] header_magic: 4e564441 [ 2.6502 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mce_c10_prod_cr_sigheader.bin.encrypt_list.xml [ 2.6508 ] PKC key in Open SSL format [ 2.6510 ] Key size is 256 bytes [ 2.6512 ] Valid PKC key [ 2.6521 ] Saving pkc public key in pub_key.key [ 2.6959 ] [ 2.6976 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt.signed mce_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.7003 ] [ 2.7021 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin [ 2.7029 ] [ 2.7031 ] header_magic: 4e564441 [ 2.7042 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mce_c10_prod_cr_sigheader.bin_list.xml [ 2.7050 ] Key is a SBK key [ 2.7051 ] Key Size is 16 bytes [ 2.7109 ] [ 2.7118 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.7142 ] [ 2.7150 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin.encrypt [ 2.7156 ] [ 2.7163 ] tegrahost_v2 --appendsigheader mce_c10_prod_cr_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MTSM [ 2.7168 ] Header already present for mce_c10_prod_cr_sigheader.bin.encrypt [ 2.7184 ] [ 2.7185 ] header_magic: 4e564441 [ 2.7194 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mce_c10_prod_cr_sigheader.bin.encrypt_list.xml [ 2.7200 ] PKC key in Open SSL format [ 2.7203 ] Key size is 256 bytes [ 2.7205 ] Valid PKC key [ 2.7213 ] Saving pkc public key in pub_key.key [ 2.7657 ] [ 2.7667 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt.signed mce_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 2.7690 ] [ 2.7702 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin [ 2.7708 ] [ 2.7710 ] header_magic: 4e564441 [ 2.7717 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mts_c10_prod_cr_sigheader.bin_list.xml [ 2.7723 ] Key is a SBK key [ 2.7725 ] Key Size is 16 bytes [ 2.9087 ] [ 2.9099 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.9490 ] [ 2.9502 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin.encrypt [ 2.9513 ] [ 2.9528 ] tegrahost_v2 --appendsigheader mts_c10_prod_cr_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MTSB [ 2.9536 ] Header already present for mts_c10_prod_cr_sigheader.bin.encrypt [ 2.9992 ] [ 2.9994 ] header_magic: 4e564441 [ 3.0006 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mts_c10_prod_cr_sigheader.bin.encrypt_list.xml [ 3.0014 ] PKC key in Open SSL format [ 3.0016 ] Key size is 256 bytes [ 3.0018 ] Valid PKC key [ 3.0027 ] Saving pkc public key in pub_key.key [ 3.0659 ] [ 3.0669 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt.signed mts_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 3.1038 ] [ 3.1147 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin [ 3.1154 ] [ 3.1156 ] header_magic: 4e564441 [ 3.1166 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mts_c10_prod_cr_sigheader.bin_list.xml [ 3.1171 ] Key is a SBK key [ 3.1173 ] Key Size is 16 bytes [ 3.2587 ] [ 3.2597 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 3.2987 ] [ 3.2997 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin.encrypt [ 3.3004 ] [ 3.3014 ] tegrahost_v2 --appendsigheader mts_c10_prod_cr_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MTSB [ 3.3027 ] Header already present for mts_c10_prod_cr_sigheader.bin.encrypt [ 3.3406 ] [ 3.3407 ] header_magic: 4e564441 [ 3.3420 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mts_c10_prod_cr_sigheader.bin.encrypt_list.xml [ 3.3428 ] PKC key in Open SSL format [ 3.3430 ] Key size is 256 bytes [ 3.3432 ] Valid PKC key [ 3.3444 ] Saving pkc public key in pub_key.key [ 3.3952 ] [ 3.3963 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt.signed mts_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 3.4339 ] [ 3.4411 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin [ 3.4418 ] [ 3.4420 ] header_magic: 4e564441 [ 3.4428 ] tegrasign_v2 --key /tmp/keys/sbk.key --list warmboot_t194_prod_sigheader.bin_list.xml [ 3.4434 ] Key is a SBK key [ 3.4436 ] Key Size is 16 bytes [ 3.4460 ] [ 3.4469 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt warmboot_t194_prod_sigheader.bin.hash zerosbk [ 3.4491 ] [ 3.4500 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin.encrypt [ 3.4506 ] [ 3.4513 ] tegrahost_v2 --appendsigheader warmboot_t194_prod_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 3.4518 ] Header already present for warmboot_t194_prod_sigheader.bin.encrypt [ 3.4525 ] [ 3.4526 ] header_magic: 4e564441 [ 3.4547 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list warmboot_t194_prod_sigheader.bin.encrypt_list.xml [ 3.4566 ] PKC key in Open SSL format [ 3.4569 ] Key size is 256 bytes [ 3.4573 ] Valid PKC key [ 3.4585 ] Saving pkc public key in pub_key.key [ 3.5083 ] [ 3.5093 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt.signed warmboot_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 3.5109 ] [ 3.5120 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin [ 3.5129 ] [ 3.5131 ] header_magic: 4e564441 [ 3.5149 ] tegrasign_v2 --key /tmp/keys/sbk.key --list warmboot_t194_prod_sigheader.bin_list.xml [ 3.5161 ] Key is a SBK key [ 3.5165 ] Key Size is 16 bytes [ 3.5202 ] [ 3.5233 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt warmboot_t194_prod_sigheader.bin.hash zerosbk [ 3.5271 ] [ 3.5281 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin.encrypt [ 3.5288 ] [ 3.5299 ] tegrahost_v2 --appendsigheader warmboot_t194_prod_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 3.5319 ] Header already present for warmboot_t194_prod_sigheader.bin.encrypt [ 3.5330 ] [ 3.5331 ] header_magic: 4e564441 [ 3.5344 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list warmboot_t194_prod_sigheader.bin.encrypt_list.xml [ 3.5356 ] PKC key in Open SSL format [ 3.5359 ] Key size is 256 bytes [ 3.5363 ] Valid PKC key [ 3.5373 ] Saving pkc public key in pub_key.key [ 3.5817 ] [ 3.5827 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt.signed warmboot_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 3.5843 ] [ 3.5862 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin [ 3.5870 ] [ 3.5872 ] header_magic: 4e564441 [ 3.5880 ] tegrasign_v2 --key /tmp/keys/sbk.key --list cboot_t194_sigheader.bin_list.xml [ 3.5890 ] Key is a SBK key [ 3.5893 ] Key Size is 16 bytes [ 3.6102 ] [ 3.6117 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt cboot_t194_sigheader.bin.hash zerosbk [ 3.6224 ] [ 3.6235 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin.encrypt [ 3.6243 ] [ 3.6251 ] tegrahost_v2 --appendsigheader cboot_t194_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 3.6258 ] Header already present for cboot_t194_sigheader.bin.encrypt [ 3.6304 ] [ 3.6306 ] header_magic: 4e564441 [ 3.6324 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list cboot_t194_sigheader.bin.encrypt_list.xml [ 3.6333 ] PKC key in Open SSL format [ 3.6336 ] Key size is 256 bytes [ 3.6339 ] Valid PKC key [ 3.6347 ] Saving pkc public key in pub_key.key [ 3.6855 ] [ 3.6868 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt.signed cboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 3.6934 ] [ 3.6956 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin [ 3.6970 ] [ 3.6972 ] header_magic: 4e564441 [ 3.7000 ] tegrasign_v2 --key /tmp/keys/sbk.key --list cboot_t194_sigheader.bin_list.xml [ 3.7019 ] Key is a SBK key [ 3.7020 ] Key Size is 16 bytes [ 3.7235 ] [ 3.7253 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt cboot_t194_sigheader.bin.hash zerosbk [ 3.7319 ] [ 3.7339 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin.encrypt [ 3.7352 ] [ 3.7365 ] tegrahost_v2 --appendsigheader cboot_t194_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 3.7373 ] Header already present for cboot_t194_sigheader.bin.encrypt [ 3.7427 ] [ 3.7427 ] header_magic: 4e564441 [ 3.7437 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list cboot_t194_sigheader.bin.encrypt_list.xml [ 3.7443 ] PKC key in Open SSL format [ 3.7446 ] Key size is 256 bytes [ 3.7450 ] Valid PKC key [ 3.7458 ] Saving pkc public key in pub_key.key [ 3.7954 ] [ 3.7964 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt.signed cboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 3.8033 ] [ 3.8055 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb [ 3.8062 ] [ 3.8064 ] header_magic: 4e564441 [ 3.8087 ] tegrasign_v2 --key /tmp/keys/sbk.key --list tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 3.8097 ] Key is a SBK key [ 3.8099 ] Key Size is 16 bytes [ 3.8203 ] [ 3.8218 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 3.8258 ] [ 3.8266 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 3.8273 ] [ 3.8280 ] tegrahost_v2 --appendsigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 3.8287 ] Header already present for tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 3.8307 ] [ 3.8308 ] header_magic: 4e564441 [ 3.8329 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml [ 3.8343 ] PKC key in Open SSL format [ 3.8346 ] Key size is 256 bytes [ 3.8349 ] Valid PKC key [ 3.8358 ] Saving pkc public key in pub_key.key [ 3.8806 ] [ 3.8825 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 3.8864 ] [ 3.8959 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb [ 3.8966 ] [ 3.8967 ] header_magic: 4e564441 [ 3.8978 ] tegrasign_v2 --key /tmp/keys/sbk.key --list tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 3.8984 ] Key is a SBK key [ 3.8986 ] Key Size is 16 bytes [ 3.9066 ] [ 3.9073 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 3.9105 ] [ 3.9117 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 3.9126 ] [ 3.9139 ] tegrahost_v2 --appendsigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 3.9157 ] Header already present for tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 3.9183 ] [ 3.9184 ] header_magic: 4e564441 [ 3.9195 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml [ 3.9200 ] PKC key in Open SSL format [ 3.9203 ] Key size is 256 bytes [ 3.9205 ] Valid PKC key [ 3.9213 ] Saving pkc public key in pub_key.key [ 3.9677 ] [ 3.9687 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 3.9719 ] [ 3.9734 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img [ 3.9740 ] [ 3.9741 ] header_magic: 4e564441 [ 3.9750 ] tegrasign_v2 --key /tmp/keys/sbk.key --list tos-trusty_t194_sigheader.img_list.xml [ 3.9757 ] Key is a SBK key [ 3.9759 ] Key Size is 16 bytes [ 3.9920 ] [ 3.9931 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 3.9993 ] [ 4.0002 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img.encrypt [ 4.0008 ] [ 4.0016 ] tegrahost_v2 --appendsigheader tos-trusty_t194_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 4.0024 ] Header already present for tos-trusty_t194_sigheader.img.encrypt [ 4.0072 ] [ 4.0073 ] header_magic: 4e564441 [ 4.0085 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list tos-trusty_t194_sigheader.img.encrypt_list.xml [ 4.0095 ] PKC key in Open SSL format [ 4.0099 ] Key size is 256 bytes [ 4.0102 ] Valid PKC key [ 4.0110 ] Saving pkc public key in pub_key.key [ 4.0577 ] [ 4.0587 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt.signed tos-trusty_t194_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 4.0644 ] [ 4.0691 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img [ 4.0701 ] [ 4.0702 ] header_magic: 4e564441 [ 4.0715 ] tegrasign_v2 --key /tmp/keys/sbk.key --list tos-trusty_t194_sigheader.img_list.xml [ 4.0722 ] Key is a SBK key [ 4.0724 ] Key Size is 16 bytes [ 4.0887 ] [ 4.0900 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 4.0963 ] [ 4.0975 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img.encrypt [ 4.0992 ] [ 4.1005 ] tegrahost_v2 --appendsigheader tos-trusty_t194_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 4.1016 ] Header already present for tos-trusty_t194_sigheader.img.encrypt [ 4.1062 ] [ 4.1064 ] header_magic: 4e564441 [ 4.1074 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list tos-trusty_t194_sigheader.img.encrypt_list.xml [ 4.1080 ] PKC key in Open SSL format [ 4.1083 ] Key size is 256 bytes [ 4.1084 ] Valid PKC key [ 4.1093 ] Saving pkc public key in pub_key.key [ 4.1549 ] [ 4.1562 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt.signed tos-trusty_t194_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 4.1616 ] [ 4.1641 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img [ 4.1659 ] [ 4.1661 ] header_magic: 4e564441 [ 4.1673 ] tegrasign_v2 --key /tmp/keys/sbk.key --list eks_sigheader.img_list.xml [ 4.1680 ] Key is a SBK key [ 4.1681 ] Key Size is 16 bytes [ 4.1681 ] [ 4.1689 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 4.1698 ] [ 4.1705 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img.encrypt [ 4.1712 ] [ 4.1719 ] tegrahost_v2 --appendsigheader eks_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 4.1726 ] Header already present for eks_sigheader.img.encrypt [ 4.1727 ] [ 4.1727 ] header_magic: 4e564441 [ 4.1736 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list eks_sigheader.img.encrypt_list.xml [ 4.1742 ] PKC key in Open SSL format [ 4.1744 ] Key size is 256 bytes [ 4.1746 ] Valid PKC key [ 4.1755 ] Saving pkc public key in pub_key.key [ 4.2198 ] [ 4.2214 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt.signed eks_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 4.2223 ] [ 4.2232 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img [ 4.2239 ] [ 4.2240 ] header_magic: 4e564441 [ 4.2249 ] tegrasign_v2 --key /tmp/keys/sbk.key --list eks_sigheader.img_list.xml [ 4.2255 ] Key is a SBK key [ 4.2258 ] Key Size is 16 bytes [ 4.2259 ] [ 4.2266 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 4.2275 ] [ 4.2282 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img.encrypt [ 4.2289 ] [ 4.2296 ] tegrahost_v2 --appendsigheader eks_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 4.2302 ] Header already present for eks_sigheader.img.encrypt [ 4.2304 ] [ 4.2305 ] header_magic: 4e564441 [ 4.2318 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list eks_sigheader.img.encrypt_list.xml [ 4.2328 ] PKC key in Open SSL format [ 4.2331 ] Key size is 256 bytes [ 4.2333 ] Valid PKC key [ 4.2341 ] Saving pkc public key in pub_key.key [ 4.2791 ] [ 4.2801 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt.signed eks_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 4.2811 ] [ 4.2822 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin [ 4.2828 ] [ 4.2829 ] header_magic: 4e564441 [ 4.2838 ] tegrasign_v2 --key /tmp/keys/sbk.key --list adsp-fw_sigheader.bin_list.xml [ 4.2845 ] Key is a SBK key [ 4.2848 ] Key Size is 16 bytes [ 4.2879 ] [ 4.2891 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt adsp-fw_sigheader.bin.hash zerosbk [ 4.2914 ] [ 4.2931 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin.encrypt [ 4.2939 ] [ 4.2946 ] tegrahost_v2 --appendsigheader adsp-fw_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 4.2952 ] Header already present for adsp-fw_sigheader.bin.encrypt [ 4.2960 ] [ 4.2961 ] header_magic: 4e564441 [ 4.2969 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list adsp-fw_sigheader.bin.encrypt_list.xml [ 4.2975 ] PKC key in Open SSL format [ 4.2978 ] Key size is 256 bytes [ 4.2980 ] Valid PKC key [ 4.2989 ] Saving pkc public key in pub_key.key [ 4.3423 ] [ 4.3434 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 4.3451 ] [ 4.3465 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin [ 4.3473 ] [ 4.3474 ] header_magic: 4e564441 [ 4.3492 ] tegrasign_v2 --key /tmp/keys/sbk.key --list adsp-fw_sigheader.bin_list.xml [ 4.3514 ] Key is a SBK key [ 4.3516 ] Key Size is 16 bytes [ 4.3552 ] [ 4.3575 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt adsp-fw_sigheader.bin.hash zerosbk [ 4.3595 ] [ 4.3604 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin.encrypt [ 4.3612 ] [ 4.3618 ] tegrahost_v2 --appendsigheader adsp-fw_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 4.3625 ] Header already present for adsp-fw_sigheader.bin.encrypt [ 4.3635 ] [ 4.3636 ] header_magic: 4e564441 [ 4.3646 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list adsp-fw_sigheader.bin.encrypt_list.xml [ 4.3653 ] PKC key in Open SSL format [ 4.3656 ] Key size is 256 bytes [ 4.3657 ] Valid PKC key [ 4.3666 ] Saving pkc public key in pub_key.key [ 4.4120 ] [ 4.4149 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 4.4177 ] [ 4.4190 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img [ 4.4198 ] [ 4.4200 ] header_magic: 4e564441 [ 4.4207 ] tegrasign_v2 --key /tmp/keys/sbk.key --list camera-rtcpu-rce_sigheader.img_list.xml [ 4.4213 ] Key is a SBK key [ 4.4215 ] Key Size is 16 bytes [ 4.4316 ] [ 4.4330 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt camera-rtcpu-rce_sigheader.img.hash zerosbk [ 4.4367 ] [ 4.4376 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img.encrypt [ 4.4385 ] [ 4.4392 ] tegrahost_v2 --appendsigheader camera-rtcpu-rce_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 4.4398 ] Header already present for camera-rtcpu-rce_sigheader.img.encrypt [ 4.4431 ] [ 4.4433 ] header_magic: 4e564441 [ 4.4448 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list camera-rtcpu-rce_sigheader.img.encrypt_list.xml [ 4.4458 ] PKC key in Open SSL format [ 4.4461 ] Key size is 256 bytes [ 4.4463 ] Valid PKC key [ 4.4472 ] Saving pkc public key in pub_key.key [ 4.4915 ] [ 4.4930 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt.signed camera-rtcpu-rce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 4.4979 ] [ 4.5008 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img [ 4.5016 ] [ 4.5017 ] header_magic: 4e564441 [ 4.5028 ] tegrasign_v2 --key /tmp/keys/sbk.key --list camera-rtcpu-rce_sigheader.img_list.xml [ 4.5036 ] Key is a SBK key [ 4.5039 ] Key Size is 16 bytes [ 4.5150 ] [ 4.5162 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt camera-rtcpu-rce_sigheader.img.hash zerosbk [ 4.5201 ] [ 4.5209 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img.encrypt [ 4.5216 ] [ 4.5223 ] tegrahost_v2 --appendsigheader camera-rtcpu-rce_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 4.5228 ] Header already present for camera-rtcpu-rce_sigheader.img.encrypt [ 4.5259 ] [ 4.5261 ] header_magic: 4e564441 [ 4.5274 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list camera-rtcpu-rce_sigheader.img.encrypt_list.xml [ 4.5289 ] PKC key in Open SSL format [ 4.5292 ] Key size is 256 bytes [ 4.5295 ] Valid PKC key [ 4.5302 ] Saving pkc public key in pub_key.key [ 4.5754 ] [ 4.5764 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt.signed camera-rtcpu-rce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 4.5799 ] [ 4.5817 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin [ 4.5827 ] [ 4.5828 ] header_magic: 4e564441 [ 4.5837 ] tegrasign_v2 --key /tmp/keys/sbk.key --list bpmp_t194_sigheader.bin_list.xml [ 4.5844 ] Key is a SBK key [ 4.5846 ] Key Size is 16 bytes [ 4.6204 ] [ 4.6217 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 4.6307 ] [ 4.6319 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin.encrypt [ 4.6327 ] [ 4.6335 ] tegrahost_v2 --appendsigheader bpmp_t194_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 4.6343 ] Header already present for bpmp_t194_sigheader.bin.encrypt [ 4.6439 ] [ 4.6440 ] header_magic: 4e564441 [ 4.6450 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list bpmp_t194_sigheader.bin.encrypt_list.xml [ 4.6456 ] PKC key in Open SSL format [ 4.6458 ] Key size is 256 bytes [ 4.6460 ] Valid PKC key [ 4.6469 ] Saving pkc public key in pub_key.key [ 4.6940 ] [ 4.6950 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt.signed bpmp_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 4.7048 ] [ 4.7105 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin [ 4.7113 ] [ 4.7115 ] header_magic: 4e564441 [ 4.7124 ] tegrasign_v2 --key /tmp/keys/sbk.key --list bpmp_t194_sigheader.bin_list.xml [ 4.7131 ] Key is a SBK key [ 4.7134 ] Key Size is 16 bytes [ 4.7498 ] [ 4.7512 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 4.7621 ] [ 4.7633 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin.encrypt [ 4.7647 ] [ 4.7666 ] tegrahost_v2 --appendsigheader bpmp_t194_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 4.7686 ] Header already present for bpmp_t194_sigheader.bin.encrypt [ 4.7801 ] [ 4.7802 ] header_magic: 4e564441 [ 4.7813 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list bpmp_t194_sigheader.bin.encrypt_list.xml [ 4.7822 ] PKC key in Open SSL format [ 4.7826 ] Key size is 256 bytes [ 4.7830 ] Valid PKC key [ 4.7842 ] Saving pkc public key in pub_key.key [ 4.8368 ] [ 4.8378 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt.signed bpmp_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 4.8471 ] [ 4.8508 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb [ 4.8517 ] [ 4.8519 ] header_magic: 4e564441 [ 4.8530 ] tegrasign_v2 --key /tmp/keys/sbk.key --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml [ 4.8537 ] Key is a SBK key [ 4.8539 ] Key Size is 16 bytes [ 4.8623 ] [ 4.8637 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk [ 4.8682 ] [ 4.8693 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 4.8706 ] [ 4.8725 ] tegrahost_v2 --appendsigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 4.8736 ] Header already present for tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 4.8761 ] [ 4.8762 ] header_magic: 4e564441 [ 4.8772 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt_list.xml [ 4.8779 ] PKC key in Open SSL format [ 4.8781 ] Key size is 256 bytes [ 4.8783 ] Valid PKC key [ 4.8791 ] Saving pkc public key in pub_key.key [ 4.9239 ] [ 4.9248 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 4.9283 ] [ 4.9307 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb [ 4.9319 ] [ 4.9321 ] header_magic: 4e564441 [ 4.9338 ] tegrasign_v2 --key /tmp/keys/sbk.key --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml [ 4.9345 ] Key is a SBK key [ 4.9347 ] Key Size is 16 bytes [ 4.9437 ] [ 4.9448 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk [ 4.9479 ] [ 4.9490 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 4.9501 ] [ 4.9517 ] tegrahost_v2 --appendsigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 4.9524 ] Header already present for tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 4.9549 ] [ 4.9550 ] header_magic: 4e564441 [ 4.9561 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt_list.xml [ 4.9568 ] PKC key in Open SSL format [ 4.9569 ] Key size is 256 bytes [ 4.9570 ] Valid PKC key [ 4.9581 ] Saving pkc public key in pub_key.key [ 5.0051 ] [ 5.0064 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.0097 ] [ 5.0116 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img [ 5.0127 ] [ 5.0128 ] header_magic: 4e564441 [ 5.0138 ] tegrasign_v2 --key /tmp/keys/sbk.key --list boot_sigheader.img_list.xml [ 5.0144 ] Key is a SBK key [ 5.0146 ] Key Size is 16 bytes [ 5.0146 ] [ 5.0158 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt boot_sigheader.img.hash zerosbk [ 5.0170 ] [ 5.0182 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img.encrypt [ 5.0192 ] [ 5.0200 ] tegrahost_v2 --appendsigheader boot_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 5.0209 ] Header already present for boot_sigheader.img.encrypt [ 5.0213 ] [ 5.0214 ] header_magic: 4e564441 [ 5.0236 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list boot_sigheader.img.encrypt_list.xml [ 5.0245 ] PKC key in Open SSL format [ 5.0250 ] Key size is 256 bytes [ 5.0252 ] Valid PKC key [ 5.0262 ] Saving pkc public key in pub_key.key [ 5.0719 ] [ 5.0728 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt.signed boot_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.0737 ] [ 5.0746 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img [ 5.0752 ] [ 5.0753 ] header_magic: 4e564441 [ 5.0761 ] tegrasign_v2 --key /tmp/keys/sbk.key --list boot_sigheader.img_list.xml [ 5.0766 ] Key is a SBK key [ 5.0768 ] Key Size is 16 bytes [ 5.0769 ] [ 5.0776 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt boot_sigheader.img.hash zerosbk [ 5.0783 ] [ 5.0789 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img.encrypt [ 5.0795 ] [ 5.0801 ] tegrahost_v2 --appendsigheader boot_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 5.0806 ] Header already present for boot_sigheader.img.encrypt [ 5.0809 ] [ 5.0809 ] header_magic: 4e564441 [ 5.0836 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list boot_sigheader.img.encrypt_list.xml [ 5.0844 ] PKC key in Open SSL format [ 5.0847 ] Key size is 256 bytes [ 5.0850 ] Valid PKC key [ 5.0857 ] Saving pkc public key in pub_key.key [ 5.1298 ] [ 5.1309 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt.signed boot_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.1318 ] [ 5.1331 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb [ 5.1341 ] [ 5.1343 ] header_magic: 4e564441 [ 5.1353 ] tegrasign_v2 --key /tmp/keys/sbk.key --list tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 5.1359 ] Key is a SBK key [ 5.1361 ] Key Size is 16 bytes [ 5.1446 ] [ 5.1457 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 5.1488 ] [ 5.1496 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 5.1503 ] [ 5.1510 ] tegrahost_v2 --appendsigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 5.1516 ] Header already present for tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 5.1540 ] [ 5.1541 ] header_magic: 4e564441 [ 5.1550 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml [ 5.1557 ] PKC key in Open SSL format [ 5.1569 ] Key size is 256 bytes [ 5.1572 ] Valid PKC key [ 5.1574 ] Saving pkc public key in pub_key.key [ 5.2019 ] [ 5.2029 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.2060 ] [ 5.2072 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb [ 5.2079 ] [ 5.2081 ] header_magic: 4e564441 [ 5.2089 ] tegrasign_v2 --key /tmp/keys/sbk.key --list tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 5.2096 ] Key is a SBK key [ 5.2099 ] Key Size is 16 bytes [ 5.2189 ] [ 5.2202 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 5.2236 ] [ 5.2248 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 5.2257 ] [ 5.2266 ] tegrahost_v2 --appendsigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 5.2274 ] Header already present for tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 5.2299 ] [ 5.2300 ] header_magic: 4e564441 [ 5.2311 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml [ 5.2317 ] PKC key in Open SSL format [ 5.2320 ] Key size is 256 bytes [ 5.2322 ] Valid PKC key [ 5.2333 ] Saving pkc public key in pub_key.key [ 5.2775 ] [ 5.2796 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.2840 ] [ 5.2894 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin [ 5.2903 ] [ 5.2905 ] header_magic: 50000ea [ 5.2916 ] tegrasign_v2 --key /tmp/keys/sbk.key --list nvtboot_recovery_t194.bin_list.xml [ 5.2926 ] Key is a SBK key [ 5.2928 ] Key Size is 16 bytes [ 5.2981 ] [ 5.2991 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194.bin.encrypt nvtboot_recovery_t194.bin.hash zerosbk [ 5.3006 ] [ 5.3015 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin.encrypt [ 5.3021 ] [ 5.3028 ] tegrahost_v2 --appendsigheader nvtboot_recovery_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MB2B [ 5.3034 ] adding BCH for nvtboot_recovery_t194.bin.encrypt [ 5.3061 ] [ 5.3061 ] header_magic: b0fefbdf [ 5.3071 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list nvtboot_recovery_t194.bin_sigheader.encrypt_list.xml [ 5.3079 ] PKC key in Open SSL format [ 5.3081 ] Key size is 256 bytes [ 5.3082 ] Valid PKC key [ 5.3237 ] Saving pkc public key in pub_key.key [ 5.3559 ] [ 5.3585 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194.bin_sigheader.encrypt.signed nvtboot_recovery_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.3618 ] [ 5.3630 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin [ 5.3642 ] [ 5.3644 ] header_magic: 9000014 [ 5.3655 ] tegrasign_v2 --key /tmp/keys/sbk.key --list nvtboot_recovery_cpu_t194.bin_list.xml [ 5.3663 ] Key is a SBK key [ 5.3667 ] Key Size is 16 bytes [ 5.3768 ] [ 5.3778 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194.bin.encrypt nvtboot_recovery_cpu_t194.bin.hash zerosbk [ 5.3790 ] [ 5.3802 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin.encrypt [ 5.3810 ] [ 5.3817 ] tegrahost_v2 --appendsigheader nvtboot_recovery_cpu_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid CPBL [ 5.3824 ] adding BCH for nvtboot_recovery_cpu_t194.bin.encrypt [ 5.3876 ] [ 5.3877 ] header_magic: 5a1bd1fc [ 5.3891 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list nvtboot_recovery_cpu_t194.bin_sigheader.encrypt_list.xml [ 5.3898 ] PKC key in Open SSL format [ 5.3900 ] Key size is 256 bytes [ 5.3902 ] Valid PKC key [ 5.3913 ] Saving pkc public key in pub_key.key [ 5.4367 ] [ 5.4378 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.4412 ] [ 5.4413 ] Copying signed file in /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/encrypted_signed_t19x [ 5.4426 ] Generating br-bct [ 5.4438 ] Performing cfg overlay [ 5.4439 ] ['/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1.cfg'] [ 5.4440 ] Updating dev and MSS params in BR BCT [ 5.4440 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 5.4801 ] [ 5.4802 ] Updating bl info [ 5.4809 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 5.4830 ] [ 5.4831 ] Generating br-bct [ 5.4839 ] Performing cfg overlay [ 5.4840 ] ['/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1.cfg'] [ 5.4840 ] Updating dev and MSS params in BR BCT [ 5.4841 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 5.5118 ] [ 5.5119 ] Updating bl info [ 5.5131 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 5.5168 ] [ 5.5172 ] Updating smd info [ 5.5184 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 --updatesmdinfo flash.xml.bin [ 5.5195 ] [ 5.5195 ] Updating Odmdata [ 5.5202 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0xB8190000 [ 5.5211 ] [ 5.5212 ] Get encrypted section of bct [ 5.5218 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listencbct bct_list.xml [ 5.5226 ] [ 5.5227 ] Signing BCT [ 5.5233 ] Generating signatures with encryption [ 5.5240 ] tegrasign_v2 --key /tmp/keys/sbk.key --offset 2328 --file br_bct_BR.bct [ 5.5245 ] Key is a SBK key [ 5.5247 ] Key Size is 16 bytes [ 5.5247 ] [ 5.5247 ] Updating BCT with signature [ 5.5250 ] Get Signed section of bct [ 5.5257 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listbct bct_list.xml [ 5.5267 ] [ 5.5273 ] tegrasign_v2 --key /tmp/keys/rsa.key --list bct_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 5.5279 ] PKC key in Open SSL format [ 5.5281 ] Key size is 256 bytes [ 5.5283 ] Valid PKC key [ 5.5293 ] Saving pkc public key in pub_key.key [ 5.5756 ] [ 5.5756 ] Updating BCT with signature [ 5.5765 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key [ 5.5775 ] [ 5.5776 ] Generating coldboot mb1-bct [ 5.5785 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_cold_boot_bct.cfg --sdram /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1.cfg --misc tegra194-mb1-bct-misc-l4t.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 5.5792 ] MB1-BCT version: 0x1 [ 5.5794 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg [ 5.5798 ] Added Platform Config 0 data with size :- 2496 [ 5.5809 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 5.5812 ] Added Platform Config 1 data with size :- 19640 [ 5.5909 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg [ 5.5913 ] Added Platform Config 2 data with size :- 24 [ 5.5917 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 5.5923 ] Added Platform Config 4 data with size :- 348 [ 5.5923 ] [ 5.5923 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 5.5923 ] Added Platform Config 3 data with size :- 92 [ 5.5923 ] [ 5.5923 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 5.5924 ] Added Platform Config 5 data with size :- 128 [ 5.5924 ] [ 5.5924 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 5.5924 ] Added Platform Config 7 data with size :- 392 [ 5.5924 ] [ 5.5924 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 5.5924 ] Added Platform Config 9 data with size :- 40 [ 5.5924 ] [ 5.5924 ] Updating mb1-bct with firmware information [ 5.5932 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 5.5939 ] MB1-BCT version: 0x1 [ 5.5942 ] [ 5.5943 ] Updating mb1-bct with storage information [ 5.5949 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 5.5955 ] MB1-BCT version: 0x1 [ 5.5960 ] [ 5.5966 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct [ 5.5973 ] [ 5.5974 ] header_magic: c0660000 [ 5.5983 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mb1_cold_boot_bct_MB1.bct_list.xml [ 5.5989 ] Key is a SBK key [ 5.5992 ] Key Size is 16 bytes [ 5.6003 ] [ 5.6012 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1.bct.encrypt mb1_cold_boot_bct_MB1.bct.hash zerosbk [ 5.6021 ] [ 5.6027 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct.encrypt [ 5.6036 ] [ 5.6043 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MBCT [ 5.6049 ] adding BCH for mb1_cold_boot_bct_MB1.bct.encrypt [ 5.6061 ] [ 5.6063 ] header_magic: 3df3f8b3 [ 5.6079 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mb1_cold_boot_bct_MB1.bct_sigheader.encrypt_list.xml [ 5.6094 ] PKC key in Open SSL format [ 5.6100 ] Key size is 256 bytes [ 5.6102 ] Valid PKC key [ 5.6111 ] Saving pkc public key in pub_key.key [ 5.6556 ] [ 5.6566 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.6577 ] [ 5.6578 ] Generating recovery mb1-bct [ 5.6586 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_bct.cfg --sdram /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1.cfg --misc tegra194-mb1-bct-misc-flash.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 5.6593 ] MB1-BCT version: 0x1 [ 5.6595 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg [ 5.6603 ] Added Platform Config 0 data with size :- 2496 [ 5.6615 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 5.6621 ] Added Platform Config 1 data with size :- 19640 [ 5.6708 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg [ 5.6714 ] Added Platform Config 2 data with size :- 24 [ 5.6720 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 5.6726 ] Added Platform Config 4 data with size :- 348 [ 5.6730 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 5.6733 ] Added Platform Config 3 data with size :- 92 [ 5.6733 ] [ 5.6733 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 5.6733 ] Added Platform Config 5 data with size :- 128 [ 5.6733 ] [ 5.6733 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 5.6733 ] Added Platform Config 7 data with size :- 392 [ 5.6733 ] [ 5.6733 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 5.6734 ] Added Platform Config 9 data with size :- 40 [ 5.6734 ] [ 5.6734 ] Updating mb1-bct with firmware information [ 5.6742 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin [ 5.6748 ] MB1-BCT version: 0x1 [ 5.6753 ] [ 5.6753 ] Updating mb1-bct with storage information [ 5.6760 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 5.6766 ] MB1-BCT version: 0x1 [ 5.6769 ] [ 5.6776 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct [ 5.6784 ] [ 5.6785 ] header_magic: c0660000 [ 5.6792 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mb1_bct_MB1.bct_list.xml [ 5.6798 ] Key is a SBK key [ 5.6800 ] Key Size is 16 bytes [ 5.6811 ] [ 5.6819 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1.bct.encrypt mb1_bct_MB1.bct.hash zerosbk [ 5.6827 ] [ 5.6835 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct.encrypt [ 5.6841 ] [ 5.6848 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MBCT [ 5.6854 ] adding BCH for mb1_bct_MB1.bct.encrypt [ 5.6862 ] [ 5.6863 ] header_magic: 3df3f8b3 [ 5.6871 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mb1_bct_MB1.bct_sigheader.encrypt_list.xml [ 5.6877 ] PKC key in Open SSL format [ 5.6880 ] Key size is 256 bytes [ 5.6882 ] Valid PKC key [ 5.6893 ] Saving pkc public key in pub_key.key [ 5.7335 ] [ 5.7354 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1.bct_sigheader.encrypt.signed mb1_bct_MB1.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.7365 ] [ 5.7366 ] Generating coldboot mem-bct [ 5.7372 ] tegrabct_v2 --chip 0x19 0 --sdram /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1.cfg --membct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_1.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_2.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_3.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_4.bct [ 5.7378 ] Packing sdram param for instance[0] [ 5.7630 ] Packing sdram param for instance[1] [ 5.7632 ] Packing sdram param for instance[2] [ 5.7636 ] Packing sdram param for instance[3] [ 5.7640 ] Packing sdram param for instance[4] [ 5.7643 ] Packing sdram param for instance[5] [ 5.7644 ] Packing sdram param for instance[6] [ 5.7644 ] Packing sdram param for instance[7] [ 5.7644 ] Packing sdram param for instance[8] [ 5.7644 ] Packing sdram param for instance[9] [ 5.7644 ] Packing sdram param for instance[10] [ 5.7644 ] Packing sdram param for instance[11] [ 5.7644 ] Packing sdram param for instance[12] [ 5.7644 ] Packing sdram param for instance[13] [ 5.7644 ] Packing sdram param for instance[14] [ 5.7644 ] Packing sdram param for instance[15] [ 5.7644 ] [ 5.7644 ] Getting sector size from pt [ 5.7656 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin [ 5.7678 ] [ 5.7681 ] BlockSize read from layout is 200 [ 5.7700 ] tegrasign_v2 --key /tmp/keys/sbk.key --file /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_1.bct [ 5.7709 ] Key is a SBK key [ 5.7711 ] Key Size is 16 bytes [ 5.7731 ] [ 5.7739 ] tegrasign_v2 --key /tmp/keys/sbk.key --file /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_2.bct [ 5.7745 ] Key is a SBK key [ 5.7747 ] Key Size is 16 bytes [ 5.7766 ] [ 5.7774 ] tegrasign_v2 --key /tmp/keys/sbk.key --file /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_3.bct [ 5.7788 ] Key is a SBK key [ 5.7791 ] Key Size is 16 bytes [ 5.7811 ] [ 5.7819 ] tegrasign_v2 --key /tmp/keys/sbk.key --file /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_4.bct [ 5.7825 ] Key is a SBK key [ 5.7827 ] Key Size is 16 bytes [ 5.7848 ] [ 5.7857 ] tegrahost_v2 --chip 0x19 0 --blocksize 512 --magicid MEMB --addsigheader_multi /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_1_encrypt.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_2_encrypt.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_3_encrypt.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_4_encrypt.bct [ 5.7863 ] adding BCH for /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_1_encrypt.bct [ 5.7883 ] [ 5.7890 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 5.7897 ] [ 5.7903 ] tegrahost_v2 --appendsigheader mem_coldboot.bct oem-rsa-sbk --chip 0x19 0 --magicid MEMB [ 5.7909 ] Header already present for mem_coldboot.bct [ 5.7914 ] [ 5.7914 ] header_magic: 4e564441 [ 5.7923 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mem_coldboot.bct_list.xml [ 5.7930 ] PKC key in Open SSL format [ 5.7933 ] Key size is 256 bytes [ 5.7935 ] Valid PKC key [ 5.7945 ] Saving pkc public key in pub_key.key [ 5.8367 ] [ 5.8377 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_coldboot.bct.signed mem_coldboot.bct.sig oem-rsa --pubkeyhash pub_key.key [ 5.8389 ] [ 5.8397 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 5.8403 ] [ 5.8410 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --appendsigheader mem_coldboot.bct oem-rsa [ 5.8417 ] Header already present for mem_coldboot.bct [ 5.8422 ] [ 5.8431 ] tegrasign_v2 --key /tmp/keys/rsa.key --list mem_coldboot_sigheader.bct_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 5.8437 ] PKC key in Open SSL format [ 5.8440 ] Key size is 256 bytes [ 5.8442 ] Valid PKC key [ 5.8453 ] Saving pkc public key in pub_key.key [ 5.8899 ] [ 5.8908 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --updatesigheader mem_coldboot_sigheader.bct.signed mem_coldboot_sigheader.bct.sig oem-rsa [ 5.8919 ] [ 5.8920 ] Generating recovery mem-bct [ 5.8926 ] tegrabct_v2 --chip 0x19 0 --sdram /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1.cfg --membct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_1.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_2.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_3.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/2870/tmpka5wm72q1_4.bct [ 5.8933 ] Packing sdram param for instance[0] [ 5.9182 ] Packing sdram param for instance[1] [ 5.9184 ] Packing sdram param for instance[2] [ 5.9188 ] Packing sdram param for instance[3] [ 5.9191 ] Packing sdram param for instance[4] [ 5.9194 ] Packing sdram param for instance[5] [ 5.9195 ] Packing sdram param for instance[6] [ 5.9195 ] Packing sdram param for instance[7] [ 5.9195 ] Packing sdram param for instance[8] [ 5.9196 ] Packing sdram param for instance[9] [ 5.9196 ] Packing sdram param for instance[10] [ 5.9196 ] Packing sdram param for instance[11] [ 5.9196 ] Packing sdram param for instance[12] [ 5.9196 ] Packing sdram param for instance[13] [ 5.9196 ] Packing sdram param for instance[14] [ 5.9196 ] Packing sdram param for instance[15] [ 5.9196 ] [ 5.9197 ] Reading ramcode from backup chip_info.bin file [ 5.9198 ] RAMCODE Read from Device: 0 [ 5.9198 ] Disabled BPMP dtb trim, using default dtb [ 5.9198 ] [ 5.9210 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct [ 5.9220 ] [ 5.9222 ] header_magic: 3000000 [ 5.9243 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mem_rcm.bct_list.xml [ 5.9254 ] Key is a SBK key [ 5.9257 ] Key Size is 16 bytes [ 5.9277 ] [ 5.9287 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm.bct.encrypt mem_rcm.bct.hash zerosbk [ 5.9297 ] [ 5.9305 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct.encrypt [ 5.9311 ] [ 5.9318 ] tegrahost_v2 --appendsigheader mem_rcm.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MEMB [ 5.9324 ] adding BCH for mem_rcm.bct.encrypt [ 5.9343 ] [ 5.9347 ] header_magic: 1ec6b915 [ 5.9364 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mem_rcm.bct_sigheader.encrypt_list.xml [ 5.9372 ] PKC key in Open SSL format [ 5.9374 ] Key size is 256 bytes [ 5.9377 ] Valid PKC key [ 5.9387 ] Saving pkc public key in pub_key.key [ 5.9840 ] [ 5.9851 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm.bct_sigheader.encrypt.signed mem_rcm.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.9874 ] [ 5.9917 ] nvtboot_recovery_t194.bin_sigheader.encrypt.signed [ 5.9922 ] preboot_c10_prod_cr.bin [ 5.9925 ] mce_c10_prod_cr.bin [ 5.9936 ] mts_c10_prod_cr.bin [ 6.0142 ] tegra194-p3668-all-p3509-0000.dtb [ 6.0164 ] bpmp_t194.bin [ 6.0222 ] tegra194-a02-bpmp-p3668-a00.dtb [ 6.0241 ] tos-trusty_t194.img [ 6.0279 ] eks.img [ 6.0285 ] boot.img [ 6.0288 ] tegra194-p3668-all-p3509-0000.dtb [ 6.0293 ] spe_t194.bin [ 6.0302 ] nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed [ 6.0331 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 6.0342 ] [ 6.0354 ] tegrahost_v2 --appendsigheader mb1_t194_prod_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MB1B [ 6.0362 ] Header already present for mb1_t194_prod_sigheader.bin.encrypt [ 6.0405 ] [ 6.0406 ] header_magic: 4e564441 [ 6.0419 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mb1_t194_prod_sigheader.bin.encrypt_list.xml [ 6.0426 ] PKC key in Open SSL format [ 6.0429 ] Key size is 256 bytes [ 6.0431 ] Valid PKC key [ 6.0442 ] Saving pkc public key in pub_key.key [ 6.0988 ] [ 6.1001 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 6.1073 ] [ 6.1100 ] tegraparser_v2 --generategpt --pt flash.xml.bin [ 6.1134 ] [ 6.1347 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/encrypted_signed_t19x/flash.xml.tmp flash.idx [ 6.3027 ] ./tegraflash.py --securedev --bins "mb2_bootloader encrypted_signed_t19x/nvtboot_recovery_t194.bin_sigheader.encrypt.signed; mts_preboot encrypted_signed_t19x/preboot_c10_prod_cr_sigheader.bin.encrypt.signed; mts_mce encrypted_signed_t19x/mce_c10_prod_cr_sigheader.bin.encrypt.signed; mts_proper encrypted_signed_t19x/mts_c10_prod_cr_sigheader.bin.encrypt.signed; bootloader_dtb encrypted_signed_t19x/tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed; bpmp_fw encrypted_signed_t19x/bpmp_t194_sigheader.bin.encrypt.signed; bpmp_fw_dtb encrypted_signed_t19x/tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed; tlk encrypted_signed_t19x/tos-trusty_t194_sigheader.img.encrypt.signed; eks encrypted_signed_t19x/eks_sigheader.img.encrypt.signed; spe_fw encrypted_signed_t19x/spe_t194_sigheader.bin.encrypt.signed" --bl encrypted_signed_t19x/nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed --bct encrypted_signed_t19x/br_bct_BR.bct --mb1_bct encrypted_signed_t19x/mb1_bct_MB1.bct_sigheader.encrypt.signed --mem_bct encrypted_signed_t19x/mem_rcm.bct_sigheader.encrypt.signed --mb1_cold_boot_bct encrypted_signed_t19x/mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed --mem_bct_cold_boot encrypted_signed_t19x/mem_coldboot_sigheader.bct.signed --applet encrypted_signed_t19x/rcm_2_signed.rcm --applet_softfuse encrypted_signed_t19x/rcm_1_signed.rcm --odmdata 0xB8190000 --chip 0x19 --cmd "readfuses fuse_info.txt fuses_to_read.xml; reboot recovery" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0043 ] Reading fuses [ 0.0044 ] Boot Rom communication [ 0.0052 ] tegrarcm_v2 --chip 0x19 0 --rcm /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/encrypted_signed_t19x/rcm_1_signed.rcm --rcm /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/encrypted_signed_t19x/rcm_2_signed.rcm [ 0.0058 ] BR_CID: 0xd8021911647076c2100000000f018000 [ 0.0069 ] Boot Rom communication completed [ 1.0544 ] [ 2.0625 ] tegrarcm_v2 --isapplet [ 2.0641 ] Applet version 01.00.0000 [ 2.0845 ] [ 2.0846 ] Parsing fuse info as per xml file [ 2.0855 ] tegraparser_v2 --get_fuse_names fuses_to_read.xml read_fuse_names.txt [ 2.0861 ] MagicId=0x45535546 version=0x1 [ 2.0863 ] [ 2.0864 ] trying to read fuse with CPU binary [ 2.0864 ] Updating Odmdata [ 2.0870 ] tegrabct_v2 --brbct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/encrypted_signed_t19x/br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0xB8190000 [ 2.0880 ] [ 2.0881 ] Sending BCTs [ 2.0888 ] tegrarcm_v2 --download bct_bootrom /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/encrypted_signed_t19x/br_bct_BR.bct --download bct_mb1 /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mb1_bct_MB1.bct_sigheader.encrypt.signed --download bct_mem /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mem_rcm.bct_sigheader.encrypt.signed [ 2.0894 ] Applet version 01.00.0000 [ 2.1246 ] Sending bct_bootrom [ 2.1248 ] [................................................] 100% [ 2.1288 ] Sending bct_mb1 [ 2.1382 ] [................................................] 100% [ 2.1448 ] Sending bct_mem [ 2.1987 ] [................................................] 100% [ 2.2787 ] [ 2.2790 ] Generating blob [ 2.2818 ] tegrahost_v2 --chip 0x19 --generateblob blob.xml blob.bin [ 2.2827 ] number of images in blob are 11 [ 2.2830 ] blobsize is 5778824 [ 2.2833 ] Added binary blob_nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed of size 260032 [ 2.2862 ] Added binary blob_nvtboot_recovery_t194.bin_sigheader.encrypt.signed of size 130928 [ 2.2872 ] Added binary blob_preboot_c10_prod_cr_sigheader.bin.encrypt.signed of size 24016 [ 2.2880 ] Added binary blob_mce_c10_prod_cr_sigheader.bin.encrypt.signed of size 143200 [ 2.2890 ] Added binary blob_mts_c10_prod_cr_sigheader.bin.encrypt.signed of size 3430416 [ 2.2895 ] Added binary blob_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed of size 203968 [ 2.2900 ] Added binary blob_bpmp_t194_sigheader.bin.encrypt.signed of size 856352 [ 2.2907 ] Added binary blob_tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed of size 227264 [ 2.2917 ] Added binary blob_tos-trusty_t194_sigheader.img.encrypt.signed of size 402368 [ 2.2917 ] Added binary blob_eks_sigheader.img.encrypt.signed of size 5136 [ 2.2917 ] Added binary blob_spe_t194_sigheader.bin.encrypt.signed of size 94960 [ 2.2917 ] [ 2.2918 ] Sending bootloader and pre-requisite binaries [ 2.2929 ] tegrarcm_v2 --download blob blob.bin [ 2.2957 ] Applet version 01.00.0000 [ 2.3197 ] Sending blob [ 2.3199 ] [................................................] 100% [ 3.1929 ] [ 3.1937 ] tegrarcm_v2 --boot recovery [ 3.1945 ] Applet version 01.00.0000 [ 3.2192 ] [ 4.2230 ] tegrarcm_v2 --isapplet [ 4.6378 ] [ 4.6390 ] tegrarcm_v2 --ismb2 [ 4.6599 ] [ 4.6699 ] tegradevflash_v2 --iscpubl [ 4.6714 ] Bootloader version 01.00.0000 [ 4.6753 ] Bootloader version 01.00.0000 [ 4.6801 ] [ 4.6817 ] tegraparser_v2 --read_fusetype PublicKeyHash read_fuse.bin [ 4.6825 ] [ 4.6831 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.6837 ] Bootloader version 01.00.0000 [ 4.6870 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.6900 ] Fuse read successful [ 4.6906 ] [ 4.6917 ] tegraparser_v2 --read_fusetype SecureBootKey read_fuse.bin [ 4.6933 ] [ 4.6940 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.6946 ] Bootloader version 01.00.0000 [ 4.7118 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.7151 ] Fuse read successful [ 4.7157 ] [ 4.7166 ] tegraparser_v2 --read_fusetype Kek0 read_fuse.bin [ 4.7174 ] [ 4.7179 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.7185 ] Bootloader version 01.00.0000 [ 4.7401 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.7439 ] Fuse read successful [ 4.7447 ] [ 4.7456 ] tegraparser_v2 --read_fusetype Kek1 read_fuse.bin [ 4.7464 ] [ 4.7470 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.7476 ] Bootloader version 01.00.0000 [ 4.7510 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.7541 ] Fuse read successful [ 4.7551 ] [ 4.7563 ] tegraparser_v2 --read_fusetype Kek2 read_fuse.bin [ 4.7572 ] [ 4.7579 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.7585 ] Bootloader version 01.00.0000 [ 4.7756 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.7784 ] Fuse read successful [ 4.7791 ] [ 4.7801 ] tegraparser_v2 --read_fusetype Kek256 read_fuse.bin [ 4.7811 ] [ 4.7818 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.7824 ] Bootloader version 01.00.0000 [ 4.8007 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.8036 ] Fuse read successful [ 4.8042 ] [ 4.8051 ] tegraparser_v2 --read_fusetype BootSecurityInfo read_fuse.bin [ 4.8061 ] [ 4.8068 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.8074 ] Bootloader version 01.00.0000 [ 4.8113 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.8150 ] Fuse read successful [ 4.8157 ] [ 4.8172 ] tegraparser_v2 --read_fusetype JtagDisable read_fuse.bin [ 4.8192 ] [ 4.8200 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.8206 ] Bootloader version 01.00.0000 [ 4.8242 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.8284 ] Fuse read successful [ 4.8288 ] [ 4.8298 ] tegraparser_v2 --read_fusetype SecurityMode read_fuse.bin [ 4.8311 ] [ 4.8323 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.8329 ] Bootloader version 01.00.0000 [ 4.8364 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.8392 ] Fuse read successful [ 4.8399 ] [ 4.8405 ] tegraparser_v2 --read_fusetype SwReserved read_fuse.bin [ 4.8412 ] [ 4.8419 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.8424 ] Bootloader version 01.00.0000 [ 4.8605 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.8637 ] Fuse read successful [ 4.8648 ] [ 4.8658 ] tegraparser_v2 --read_fusetype DebugAuthentication read_fuse.bin [ 4.8667 ] [ 4.8673 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.8678 ] Bootloader version 01.00.0000 [ 4.8712 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.8741 ] Fuse read successful [ 4.8748 ] [ 4.8755 ] tegraparser_v2 --read_fusetype OdmId read_fuse.bin [ 4.8762 ] [ 4.8769 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.8774 ] Bootloader version 01.00.0000 [ 4.8960 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.8995 ] Fuse read successful [ 4.9000 ] [ 4.9009 ] tegraparser_v2 --read_fusetype OdmLock read_fuse.bin [ 4.9017 ] [ 4.9022 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.9028 ] Bootloader version 01.00.0000 [ 4.9194 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.9242 ] Fuse read successful [ 4.9249 ] [ 4.9257 ] tegraparser_v2 --read_fusetype ReservedOdm0 read_fuse.bin [ 4.9265 ] [ 4.9271 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.9277 ] Bootloader version 01.00.0000 [ 4.9311 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.9342 ] Fuse read successful [ 4.9347 ] [ 4.9355 ] tegraparser_v2 --read_fusetype ReservedOdm1 read_fuse.bin [ 4.9362 ] [ 4.9369 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.9374 ] Bootloader version 01.00.0000 [ 4.9552 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.9581 ] Fuse read successful [ 4.9587 ] [ 4.9596 ] tegraparser_v2 --read_fusetype ReservedOdm2 read_fuse.bin [ 4.9603 ] [ 4.9609 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.9615 ] Bootloader version 01.00.0000 [ 4.9804 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.9840 ] Fuse read successful [ 4.9847 ] [ 4.9857 ] tegraparser_v2 --read_fusetype ReservedOdm3 read_fuse.bin [ 4.9869 ] [ 4.9879 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.9887 ] Bootloader version 01.00.0000 [ 4.9922 ] Saved read fuses in file __fuse_read_scatter.bin [ 4.9952 ] Fuse read successful [ 4.9957 ] [ 4.9965 ] tegraparser_v2 --read_fusetype ReservedOdm4 read_fuse.bin [ 4.9974 ] [ 4.9981 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 4.9986 ] Bootloader version 01.00.0000 [ 5.0172 ] Saved read fuses in file __fuse_read_scatter.bin [ 5.0201 ] Fuse read successful [ 5.0207 ] [ 5.0215 ] tegraparser_v2 --read_fusetype ReservedOdm5 read_fuse.bin [ 5.0223 ] [ 5.0228 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 5.0234 ] Bootloader version 01.00.0000 [ 5.0270 ] Saved read fuses in file __fuse_read_scatter.bin [ 5.0299 ] Fuse read successful [ 5.0306 ] [ 5.0314 ] tegraparser_v2 --read_fusetype ReservedOdm6 read_fuse.bin [ 5.0322 ] [ 5.0328 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 5.0333 ] Bootloader version 01.00.0000 [ 5.0519 ] Saved read fuses in file __fuse_read_scatter.bin [ 5.0548 ] Fuse read successful [ 5.0555 ] [ 5.0564 ] tegraparser_v2 --read_fusetype ReservedOdm7 read_fuse.bin [ 5.0571 ] [ 5.0577 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 5.0582 ] Bootloader version 01.00.0000 [ 5.0767 ] Saved read fuses in file __fuse_read_scatter.bin [ 5.0812 ] Fuse read successful [ 5.0828 ] [ 5.0837 ] tegraparser_v2 --read_fusetype ReservedOdm8 read_fuse.bin [ 5.0845 ] [ 5.0851 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 5.0857 ] Bootloader version 01.00.0000 [ 5.0889 ] Saved read fuses in file __fuse_read_scatter.bin [ 5.0918 ] Fuse read successful [ 5.0925 ] [ 5.0931 ] tegraparser_v2 --read_fusetype ReservedOdm9 read_fuse.bin [ 5.0938 ] [ 5.0944 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 5.0950 ] Bootloader version 01.00.0000 [ 5.1123 ] Saved read fuses in file __fuse_read_scatter.bin [ 5.1160 ] Fuse read successful [ 5.1167 ] [ 5.1175 ] tegraparser_v2 --read_fusetype ReservedOdm10 read_fuse.bin [ 5.1184 ] [ 5.1190 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 5.1197 ] Bootloader version 01.00.0000 [ 5.1231 ] Saved read fuses in file __fuse_read_scatter.bin [ 5.1261 ] Fuse read successful [ 5.1267 ] [ 5.1276 ] tegraparser_v2 --read_fusetype ReservedOdm11 read_fuse.bin [ 5.1286 ] [ 5.1293 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 5.1300 ] Bootloader version 01.00.0000 [ 5.1473 ] Saved read fuses in file __fuse_read_scatter.bin [ 5.1505 ] Fuse read successful [ 5.1510 ] [ 5.1513 ] Rebooting to recovery mode [ 5.1521 ] tegrarcm_v2 --ismb2 [ 5.1892 ] [ 5.1901 ] tegradevflash_v2 --reboot recovery [ 5.1906 ] Bootloader version 01.00.0000 [ 5.2085 ] Fuse reading is done. The fuse values have been saved in: /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/fuse_info.txt PublicKeyHash: aec946d54bbc310946dbe01788229b06983f119ba7aa37e6e0dbd24fc900f62c SecureBootKey: ffffffffffffffffffffffffffffffff Kek0: ffffffffffffffffffffffffffffffff Kek1: ffffffffffffffffffffffffffffffff Kek2: ffffffffffffffffffffffffffffffff Kek256: ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff BootSecurityInfo: 00000005 JtagDisable: 00000001 SecurityMode: 00000001 SwReserved: 00000000 DebugAuthentication: 00000000 OdmId: 0000000000000000 OdmLock: 00000000 ReservedOdm0: 00000000 ReservedOdm1: 00000000 ReservedOdm2: 00000000 ReservedOdm3: 00000000 ReservedOdm4: 00000000 ReservedOdm5: 00000000 ReservedOdm6: 00000000 ReservedOdm7: 00000000 ReservedOdm8: 00000000 ReservedOdm9: 00000000 ReservedOdm10: 00000000 ReservedOdm11: 00000000