+ set -eo pipefail + trap cleanup EXIT +++ dirname tools/kernel_flash/l4t_initrd_flash.sh ++ cd tools/kernel_flash ++ pwd + L4T_INITRD_FLASH_DIR=/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash + L4T_TOOLS_DIR=/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools + LINUX_BASE_DIR=/home/jhempsey/workspace/d4t/work/Linux_for_Tegra + showlogs=0 + flash_only=0 + initrd_only= + reuse_package= + external_only= + no_flash=0 + target_partname= + max_massflash= + keep= + network= + reuse= + export initrd_flash_step=1 + initrd_flash_step=1 + UDEV_L4T_DIR=/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/host_udev + flash_cmd=/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh + source /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash.func ++ DEFAULT_MAX_MASSFLASH=10 ++ INITRD_FLASHPARAM=initrdflashparam.txt + parse_param --no-flash --showlogs -u /mnt/keys//pkc.pem -v /mnt/keys//sbk -p '-i /mnt/keys/ekb.key --user_key /mnt/keys/user_key_flash' jetson-xavier-nx-devkit-qspi internal + opstr+=u:p:v:c:-:S:k: + getopts u:p:v:c:-:S:k: OPTION + case $OPTION in + case ${OPTARG} in + no_flash=1 + getopts u:p:v:c:-:S:k: OPTION + case $OPTION in + case ${OPTARG} in + showlogs=1 + getopts u:p:v:c:-:S:k: OPTION + case $OPTION in + KEY_FILE=/mnt/keys//pkc.pem + getopts u:p:v:c:-:S:k: OPTION + case $OPTION in + SBK_KEY=/mnt/keys//sbk + getopts u:p:v:c:-:S:k: OPTION + case $OPTION in + OPTIONS='-i /mnt/keys/ekb.key --user_key /mnt/keys/user_key_flash' + getopts u:p:v:c:-:S:k: OPTION + remove_udev_rules + rm -f /etc/udev/rules.d/99-l4t-host.rules + rm -f /etc/udev/rules.d/10-l4t-usb-msd.rules + install_udev_rules ++ realpath /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/host_udev/99-l4t-host.rules + ln -s /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/host_udev/99-l4t-host.rules /etc/udev/rules.d/ ++ realpath /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/host_udev/10-l4t-usb-msd.rules + ln -s /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/host_udev/10-l4t-usb-msd.rules /etc/udev/rules.d/ + fill_devpaths + devpaths=($(find /sys/bus/usb/devices/usb*/ -name devnum -print0 | { found=() while read -r -d "" fn_devnum; do dir="$(dirname "${fn_devnum}")" vendor="$(cat "${dir}/idVendor")" if [ "${vendor}" != "0955" ]; then continue fi product="$(cat "${dir}/idProduct")" case "${product}" in "7018") ;; # TX2i "7418") ;; # TX2 4GB "7c18") ;; # TX2, TX2 NX "7019") ;; # AGX Xavier "7819") ;; # AGXi "7919") ;; # AGXi "7e19") ;; # NX *) continue ;; esac fn_busnum="${dir}/busnum" if [ ! -f "${fn_busnum}" ]; then continue fi fn_devpath="${dir}/devpath" if [ ! -f "${fn_devpath}" ]; then continue fi busnum="$(cat "${fn_busnum}")" devpath="$(cat "${fn_devpath}")" if [ -n "${usb_instance}" ] && [ "${usb_instance}" != "${busnum}-${devpath}" ]; then continue else found+=("${busnum}-${devpath}") fi done echo "${found[@]}" })) ++ find /sys/bus/usb/devices/usb1/ /sys/bus/usb/devices/usb2/ -name devnum -print0 ++ found=() ++ read -r -d '' fn_devnum +++ dirname /sys/bus/usb/devices/usb1/1-10/devnum ++ dir=/sys/bus/usb/devices/usb1/1-10 +++ cat /sys/bus/usb/devices/usb1/1-10/idVendor ++ vendor=8087 ++ '[' 8087 '!=' 0955 ']' ++ continue ++ read -r -d '' fn_devnum +++ dirname /sys/bus/usb/devices/usb1/1-3/devnum ++ dir=/sys/bus/usb/devices/usb1/1-3 +++ cat /sys/bus/usb/devices/usb1/1-3/idVendor ++ vendor=0403 ++ '[' 0403 '!=' 0955 ']' ++ continue ++ read -r -d '' fn_devnum +++ dirname /sys/bus/usb/devices/usb1/devnum ++ dir=/sys/bus/usb/devices/usb1 +++ cat /sys/bus/usb/devices/usb1/idVendor ++ vendor=1d6b ++ '[' 1d6b '!=' 0955 ']' ++ continue ++ read -r -d '' fn_devnum +++ dirname /sys/bus/usb/devices/usb1/1-4/devnum ++ dir=/sys/bus/usb/devices/usb1/1-4 +++ cat /sys/bus/usb/devices/usb1/1-4/idVendor ++ vendor=0955 ++ '[' 0955 '!=' 0955 ']' +++ cat /sys/bus/usb/devices/usb1/1-4/idProduct ++ product=7e19 ++ case "${product}" in ++ fn_busnum=/sys/bus/usb/devices/usb1/1-4/busnum ++ '[' '!' -f /sys/bus/usb/devices/usb1/1-4/busnum ']' ++ fn_devpath=/sys/bus/usb/devices/usb1/1-4/devpath ++ '[' '!' -f /sys/bus/usb/devices/usb1/1-4/devpath ']' +++ cat /sys/bus/usb/devices/usb1/1-4/busnum ++ busnum=1 +++ cat /sys/bus/usb/devices/usb1/1-4/devpath ++ devpath=4 ++ '[' -n '' ']' ++ found+=("${busnum}-${devpath}") ++ read -r -d '' fn_devnum +++ dirname /sys/bus/usb/devices/usb2/devnum ++ dir=/sys/bus/usb/devices/usb2 +++ cat /sys/bus/usb/devices/usb2/idVendor ++ vendor=1d6b ++ '[' 1d6b '!=' 0955 ']' ++ continue ++ read -r -d '' fn_devnum ++ echo 1-4 + '[' 0 = 0 ']' + echo '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh --no-flash --no-flash --showlogs -u /mnt/keys//pkc.pem -v /mnt/keys//sbk -p -i /mnt/keys/ekb.key --user_key /mnt/keys/user_key_flash jetson-xavier-nx-devkit-qspi internal' /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh --no-flash --no-flash --showlogs -u /mnt/keys//pkc.pem -v /mnt/keys//sbk -p -i /mnt/keys/ekb.key --user_key /mnt/keys/user_key_flash jetson-xavier-nx-devkit-qspi internal + /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh --no-flash --no-flash --showlogs -u /mnt/keys//pkc.pem -v /mnt/keys//sbk -p '-i /mnt/keys/ekb.key --user_key /mnt/keys/user_key_flash' jetson-xavier-nx-devkit-qspi internal ************************************ * * * Step 1: Generate flash packages * * * ************************************ Create folder to store images to flash Generate images to be flashed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/flash.sh --no-flash --sign -u "/mnt/keys//pkc.pem" -v "/mnt/keys//sbk" -i /mnt/keys/ekb.key --user_key /mnt/keys/user_key_flash jetson-xavier-nx-devkit-qspi internal ############################################################################### # L4T BSP Information: # R32 , REVISION: 7.1 ############################################################################### copying soft_fuses(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. ./tegraflash.py --chip 0x19 --applet "/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod.bin" --skipuid --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --bins "mb2_applet nvtboot_applet_t194.bin" --cmd "dump eeprom boardinfo cvm.bin;reboot recovery" --key "/mnt/keys//pkc.pem" --encrypt_key "/mnt/keys/sbk" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0061 ] Generating RCM messages [ 0.0082 ] tegrasign_v3.py --key /mnt/keys/sbk --file /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod.bin --offset 4096 [ 0.0088 ] Key is a SBK key [ 0.0270 ] Key Size is 16 bytes [ 0.0272 ] 246336 [ 0.0342 ] [ 0.0362 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt.bin zerosbk [ 0.0368 ] Header already present for /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt.bin [ 0.0392 ] [ 0.0412 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0426 ] K[ 0.0428 ] ey size is 384 bytes [ 0.0450 ] tegrasign_v3.py --file /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt_sigheader.bin --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem --length 1136 --offset 2960 --pubkeyhash pub_key.key [ 0.0463 ] K[ 0.0473 ] ey size is 384 bytes [ 0.0830 ] Saving pkc public key in pub_key.key [ 0.0830 ] Saving Montgomery values in montgomery.bin [ 0.0847 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin --updatesigheader /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt_sigheader.bin /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt_sigheader.sig oem-rsa [ 0.0874 ] [ 0.0895 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg.pdf sfuse.bin [ 0.0902 ] [ 0.0921 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod_encrypt_sigheader.bin 0 0 [ 0.0926 ] RCM 0 is saved as rcm_0.rcm [ 0.0949 ] RCM 1 is saved as rcm_1.rcm [ 0.0949 ] RCM 2 is saved as rcm_2.rcm [ 0.0949 ] List of rcm files are saved in rcm_list.xml [ 0.0949 ] [ 0.0950 ] Signing RCM messages [ 0.0970 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0983 ] K[ 0.0993 ] ey size is 384 bytes [ 0.2046 ] Saving pkc public key in pub_key.key [ 0.2046 ] Saving Montgomery values in montgomery.bin [ 0.2044 ] Copying signature to RCM mesages [ 0.2062 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 0.2073 ] [ 0.2073 ] Boot Rom communication [ 0.2092 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_list_signed.xml --skipuid [ 0.2098 ] RCM version 0X190001 [ 0.2160 ] Boot Rom communication completed [ 1.2524 ] [ 2.2570 ] tegrarcm_v2 --isapplet [ 2.2587 ] Applet version 01.00.0000 [ 2.2773 ] [ 2.2803 ] tegrarcm_v2 --ismb2 [ 2.3170 ] [ 2.3200 ] tegrahost_v2 --chip 0x19 --align nvtboot_applet_t194.bin [ 2.3216 ] [ 2.3226 ] header_magic: 50000ea [ 2.3268 ] tegrasign_v3.py --key /mnt/keys/sbk --list nvtboot_applet_t194.bin_list.xml [ 2.3270 ] Key is a SBK key [ 2.3270 ] Key Size is 16 bytes [ 2.3290 ] 123616 [ 2.3465 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_applet_t194.bin.encrypt nvtboot_applet_t194.bin.hash zerosbk [ 2.3485 ] [ 2.3514 ] tegrahost_v2 --chip 0x19 --align nvtboot_applet_t194.bin.encrypt [ 2.3529 ] [ 2.3531 ] header_magic: ac173d1e [ 2.3559 ] tegrahost_v2 --appendsigheader nvtboot_applet_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid PLDT [ 2.3573 ] adding BCH for nvtboot_applet_t194.bin.encrypt [ 2.3621 ] [ 2.3642 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list nvtboot_applet_t194.bin_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 2.3654 ] Ke[ 2.3657 ] y size is 384 bytes [ 2.4019 ] Saving pkc public key in pub_key.key [ 2.4036 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_applet_t194.bin_sigheader.encrypt.signed nvtboot_applet_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.4054 ] [ 2.4072 ] tegrarcm_v2 --download mb2 nvtboot_applet_t194.bin_sigheader.encrypt.signed [ 2.4078 ] Applet version 01.00.0000 [ 2.4245 ] Sending mb2 [ 2.4246 ] [................................................] 100% [ 2.4434 ] [ 2.4456 ] tegrarcm_v2 --boot recovery [ 2.4463 ] Applet version 01.00.0000 [ 2.4685 ] [ 3.4733 ] tegrarcm_v2 --isapplet [ 3.4934 ] [ 3.4963 ] tegrarcm_v2 --ismb2 [ 3.4977 ] MB2 Applet version 01.00.0000 [ 3.5329 ] [ 3.5357 ] tegrarcm_v2 --ismb2 [ 3.5370 ] MB2 Applet version 01.00.0000 [ 3.5691 ] [ 3.5720 ] Retrieving board information [ 3.5747 ] tegrarcm_v2 --oem platformdetails chip chip_info.bin [ 3.5761 ] MB2 Applet version 01.00.0000 [ 3.6113 ] Saved platform info in chip_info.bin [ 3.6154 ] Chip minor revision: 2 [ 3.6157 ] Bootrom revision: 0xf [ 3.6159 ] Ram code: 0x0 [ 3.6162 ] Chip sku: 0xde [ 3.6162 ] Chip Sample: non es [ 3.6162 ] [ 3.6166 ] Retrieving EEPROM data [ 3.6167 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/cvm.bin [ 3.6180 ] MB2 Applet version 01.00.0000 [ 3.6421 ] Saved platform info in /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/cvm.bin [ 3.6775 ] [ 3.6776 ] Rebooting to recovery mode [ 3.6804 ] tegrarcm_v2 --ismb2 [ 3.6817 ] MB2 Applet version 01.00.0000 [ 3.7039 ] [ 3.7040 ] Rebooting to recovery mode [ 3.7066 ] tegrarcm_v2 --reboot recovery [ 3.7078 ] MB2 Applet version 01.00.0000 [ 3.7482 ] Board ID(3668) version(300) sku(0001) revision(B.0) Copy /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb to /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb.rec Using UUID e24aa370-f732-4e7c-bb1a-3cb0d4e06b7d for mounting root APP partition. copying bctfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg)... done. copying bctfile1(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-memcfg-sw-override.cfg)... done. copying minratchet_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-ratchet-p3668.cfg)... done. copying device_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-bct-device-qspi-p3668.cfg)... done. copying misc_cold_boot_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-sd-l4t.cfg)... done. copying misc_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-flash.cfg)... done. copying pinmux_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-pinmux-p3668-a01.cfg)... done. copying gpioint_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg)... done. copying pmic_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-pmic-p3668-0001-a00.cfg)... done. copying pmc_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-padvoltage-p3668-a01.cfg)... done. copying prod_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-prod-p3668-0001-a00.cfg)... done. copying scr_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying scr_cold_boot_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying bootrom_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-reset-p3668-0001-a00.cfg)... done. copying dev_params(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-br-bct-qspi.cfg)... done. Existing bootloader(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. copying initrd(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/l4t_initrd.img)... done. Making Boot image... done. /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /mnt/keys//pkc.pem --encrypt_key /mnt/keys/user_key_flash --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign boot.img kernel Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0004 ] Generating signature [ 0.0026 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0040 ] K[ 0.0042 ] ey size is 384 bytes [ 0.0064 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem [ 0.0077 ] K[ 0.0088 ] ey size is 384 bytes [ 0.0089 ] Saving Montgomery values in montgomery.bin [ 0.0088 ] Generating ratchet blob [ 0.0106 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0113 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0115 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0115 ] [ 0.0115 ] header_magic: 414e4452 [ 0.0116 ] Encrypting file [ 0.0135 ] tegrahost_v2 --chip 0x19 --align 1_boot.img [ 0.0141 ] [ 0.0142 ] header_magic: 414e4452 [ 0.0167 ] tegrasign_v3.py --key /mnt/keys/user_key_flash --list 1_boot.img_list.xml [ 0.0168 ] Key is a SBK key [ 0.0168 ] Key Size is 16 bytes [ 0.0623 ] 41863168 [ 0.9756 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot.img.encrypt 1_boot.img.hash zerosbk [ 1.1007 ] [ 1.1039 ] tegrahost_v2 --chip 0x19 --align 1_boot.img.encrypt [ 1.1054 ] [ 1.1056 ] header_magic: 7116da2e [ 1.1084 ] tegrahost_v2 --appendsigheader 1_boot.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid KRNL --ratchet_blob ratchet_blob.bin [ 1.1098 ] adding BCH for 1_boot.img.encrypt [ 1.8144 ] [ 1.8170 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list 1_boot.img_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 1.8187 ] K[ 1.8189 ] ey size is 384 bytes [ 1.8912 ] Saving pkc public key in pub_key.key [ 1.8931 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot.img_sigheader.encrypt.signed 1_boot.img_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.3291 ] [ 2.3609 ] Signed and encrypted file: /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/boot.img_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for boot.img_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x27ec800 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot.img_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt.signed done. Making recovery ramdisk for recovery image... Re-generating recovery ramdisk for recovery image... ~/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp ~/workspace/d4t/work/Linux_for_Tegra/bootloader ~/workspace/d4t/work/Linux_for_Tegra 30412 blocks _BASE_KERNEL_VERSION=4.9.253-tegra cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/usr/lib/aarch64-linux-gnu/libpcsclite.so.1': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/usr/lib/aarch64-linux-gnu/libpcsclite.so.1 /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//lib/libpcsclite.so.1 cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/sbin/wpa_supplicant': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/sbin/wpa_supplicant /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//sbin/wpa_supplicant cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/action_wpa.sh': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/action_wpa.sh /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//etc/wpa_supplicant/action_wpa.sh cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/functions.sh': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/functions.sh /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//etc/wpa_supplicant/functions.sh cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/ifupdown.sh': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/ifupdown.sh /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//etc/wpa_supplicant/ifupdown.sh ~/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp/lib ~/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp ~/workspace/d4t/work/Linux_for_Tegra/bootloader ~/workspace/d4t/work/Linux_for_Tegra 111519 blocks Making Recovery image... copying recdtbfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb.rec)... done. 20+0 records in 20+0 records out 20 bytes copied, 0.000335188 s, 59.7 kB/s Existing sosfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing tegraboot(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_t194.bin) reused. Existing cpu_bootloader(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. Existing mb2blfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_recovery_t194.bin) reused. Existing mtspreboot(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/preboot_c10_prod_cr.bin) reused. Existing mcepreboot(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mce_c10_prod_cr.bin) reused. Existing mtsproper(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mts_c10_prod_cr.bin) reused. Existing mb1file(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing bpffile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/bpmp_t194.bin) reused. copying bpfdtbfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/tegra194-a02-bpmp-p3668-a00.dtb)... done. Existing scefile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. Existing camerafw(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/camera-rtcpu-rce.img) reused. Existing spefile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/spe_t194.bin) reused. Existing wb0boot(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/warmboot_t194_prod.bin) reused. Existing tosfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tos-trusty_t194.img) reused. Existing eksfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/eks.img) reused. copying soft_fuses(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. copying dtbfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb)... done. Copying nv_boot_control.conf to rootfs /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /mnt/keys//pkc.pem --encrypt_key /mnt/keys/user_key_flash --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign kernel_tegra194-p3668-all-p3509-0000.dtb kernel_dtb Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0005 ] Generating signature [ 0.0027 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0039 ] K[ 0.0041 ] ey size is 384 bytes [ 0.0062 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem [ 0.0074 ] K[ 0.0084 ] ey size is 384 bytes [ 0.0086 ] Saving Montgomery values in montgomery.bin [ 0.0084 ] Generating ratchet blob [ 0.0100 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0106 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0107 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0107 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0108 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0108 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0108 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0108 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0108 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0108 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0108 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0108 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0108 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0108 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0108 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0108 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0108 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0108 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0108 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0108 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0108 ] [ 0.0109 ] header_magic: d00dfeed [ 0.0110 ] Encrypting file [ 0.0127 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p3668-all-p3509-0000.dtb [ 0.0134 ] [ 0.0136 ] header_magic: d00dfeed [ 0.0161 ] tegrasign_v3.py --key /mnt/keys/user_key_flash --list 1_kernel_tegra194-p3668-all-p3509-0000.dtb_list.xml [ 0.0162 ] Key is a SBK key [ 0.0162 ] Key Size is 16 bytes [ 0.0167 ] 203248 [ 0.0260 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt 1_kernel_tegra194-p3668-all-p3509-0000.dtb.hash zerosbk [ 0.0268 ] [ 0.0288 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt [ 0.0294 ] [ 0.0295 ] header_magic: 816949f0 [ 0.0313 ] tegrahost_v2 --appendsigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid KDTB --ratchet_blob ratchet_blob.bin [ 0.0318 ] adding BCH for 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt [ 0.0356 ] [ 0.0376 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.0389 ] K[ 0.0392 ] ey size is 384 bytes [ 0.0759 ] Saving pkc public key in pub_key.key [ 0.0777 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 0.0801 ] [ 0.0805 ] Signed and encrypted file: /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x319e1 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed done. Skip generating system.img Existing tbcfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/cboot_t194.bin) reused. copying tbcdtbfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb)... done. copying cfgfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t194_qspi_p3668.xml) to flash.xml... done. Existing flasher(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu_t194.bin) reused. Existing flashapp(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py) reused. ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin --sdram_config tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg,tegra194-memcfg-sw-override.cfg --odmdata 0xB8190000 --applet mb1_t194_prod.bin --cmd "sign" --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --cfg flash.xml --chip 0x19 --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --device_config tegra19x-mb1-bct-device-qspi-p3668.cfg --misc_cold_boot_config tegra194-mb1-bct-misc-sd-l4t.cfg --misc_config tegra194-mb1-bct-misc-flash.cfg --pinmux_config tegra19x-mb1-pinmux-p3668-a01.cfg --gpioint_config tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --pmic_config tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --pmc_config tegra19x-mb1-padvoltage-p3668-a01.cfg --prod_config tegra19x-mb1-prod-p3668-0001-a00.cfg --scr_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --scr_cold_boot_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --br_cmd_config tegra194-mb1-bct-reset-p3668-0001-a00.cfg --dev_params tegra194-br-bct-qspi.cfg --bin "mb2_bootloader nvtboot_recovery_t194.bin; mts_preboot preboot_c10_prod_cr.bin; mts_mce mce_c10_prod_cr.bin; mts_proper mts_c10_prod_cr.bin; bpmp_fw bpmp_t194.bin; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00.dtb; spe_fw spe_t194.bin; tlk tos-trusty_t194.img; eks eks.img; bootloader_dtb tegra194-p3668-all-p3509-0000.dtb" --key /mnt/keys//pkc.pem --encrypt_key /mnt/keys/sbk Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0080 ] Reading ramcode from backup chip_info.bin file [ 0.0080 ] RAMCODE Read from Device: 0 [ 0.0080 ] Disable BPMP dtb trim, using default dtb [ 0.0080 ] [ 0.0102 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0115 ] K[ 0.0117 ] ey size is 384 bytes [ 0.0120 ] Generating RCM messages [ 0.0138 ] tegrasign_v3.py --key /mnt/keys/sbk --file mb1_t194_prod.bin --offset 4096 [ 0.0143 ] Key is a SBK key [ 0.0325 ] Key Size is 16 bytes [ 0.0326 ] 246336 [ 0.0395 ] [ 0.0416 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod_encrypt.bin zerosbk [ 0.0422 ] Header already present for mb1_t194_prod_encrypt.bin [ 0.0447 ] [ 0.0467 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0480 ] K[ 0.0482 ] ey size is 384 bytes [ 0.0503 ] tegrasign_v3.py --file mb1_t194_prod_encrypt_sigheader.bin --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem --length 1136 --offset 2960 --pubkeyhash pub_key.key [ 0.0516 ] K[ 0.0526 ] ey size is 384 bytes [ 0.0893 ] Saving pkc public key in pub_key.key [ 0.0893 ] Saving Montgomery values in montgomery.bin [ 0.0910 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin --updatesigheader mb1_t194_prod_encrypt_sigheader.bin mb1_t194_prod_encrypt_sigheader.sig oem-rsa [ 0.0938 ] [ 0.0956 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg sfuse.bin [ 0.0963 ] [ 0.0982 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0987 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0990 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0990 ] [ 0.1008 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_encrypt_sigheader.bin 0 0 [ 0.1013 ] RCM 0 is saved as rcm_0.rcm [ 0.1036 ] RCM 1 is saved as rcm_1.rcm [ 0.1036 ] RCM 2 is saved as rcm_2.rcm [ 0.1036 ] List of rcm files are saved in rcm_list.xml [ 0.1036 ] [ 0.1037 ] Signing RCM messages [ 0.1057 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem --list rcm_list.xml --pubkeyhash pub_key.key [ 0.1069 ] K[ 0.1081 ] ey size is 384 bytes [ 0.2133 ] Saving pkc public key in pub_key.key [ 0.2133 ] Saving Montgomery values in montgomery.bin [ 0.2131 ] Copying signature to RCM mesages [ 0.2150 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 0.2172 ] [ 0.2173 ] Parsing partition layout [ 0.2195 ] tegraparser_v2 --pt flash.xml.tmp [ 0.2205 ] [ 0.2205 ] Creating list of images to be signed [ 0.2224 ] tegrahost_v2 --chip 0x19 --partitionlayout flash.xml.bin --list images_list.xml --ratchet_blob ratchet_blob.bin [ 0.2230 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.2235 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.2238 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.2259 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.2278 ] adding BCH for spe_t194.bin [ 0.2298 ] adding BCH for spe_t194.bin [ 0.2314 ] adding BCH for nvtboot_t194.bin [ 0.2331 ] adding BCH for nvtboot_t194.bin [ 0.2361 ] Header already present for preboot_c10_prod_cr.bin [ 0.2392 ] Header already present for preboot_c10_prod_cr.bin [ 0.2394 ] Header already present for mce_c10_prod_cr.bin [ 0.2396 ] Header already present for mce_c10_prod_cr.bin [ 0.2408 ] adding BCH for mts_c10_prod_cr.bin [ 0.2437 ] adding BCH for mts_c10_prod_cr.bin [ 0.2992 ] Header already present for warmboot_t194_prod.bin [ 0.3533 ] Header already present for warmboot_t194_prod.bin [ 0.3538 ] adding BCH for xusb_sil_rel_fw [ 0.3544 ] adding BCH for xusb_sil_rel_fw [ 0.3566 ] adding BCH for cboot_t194.bin [ 0.3588 ] adding BCH for cboot_t194.bin [ 0.3663 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb [ 0.3739 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb [ 0.3773 ] adding BCH for tos-trusty_t194.img [ 0.3807 ] adding BCH for tos-trusty_t194.img [ 0.3872 ] adding BCH for eks.img [ 0.3936 ] adding BCH for eks.img [ 0.3937 ] adding BCH for adsp-fw.bin [ 0.3938 ] adding BCH for adsp-fw.bin [ 0.3952 ] adding BCH for camera-rtcpu-rce.img [ 0.3966 ] adding BCH for camera-rtcpu-rce.img [ 0.4010 ] adding BCH for bpmp_t194.bin [ 0.4056 ] adding BCH for bpmp_t194.bin [ 0.4193 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 0.4329 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 0.4451 ] [ 0.4471 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list images_list.xml --pubkeyhash pub_key.key [ 0.4477 ] Key size is 384 bytes [ 0.4983 ] Saving pkc public key in pub_key.key [ 1.5764 ] [ 1.5764 ] Generating br-bct [ 1.5783 ] Performing cfg overlay [ 1.5783 ] ['tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg', 'tegra194-memcfg-sw-override.cfg'] [ 1.5786 ] sw_memcfg_overlay.pl -c tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg -s tegra194-memcfg-sw-override.cfg -o /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1.cfg [ 1.6045 ] [ 1.6047 ] Updating dev and MSS params in BR BCT [ 1.6047 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 1.6527 ] [ 1.6527 ] Updating bl info [ 1.6551 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 1.6581 ] [ 1.6606 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin [ 1.6613 ] [ 1.6614 ] header_magic: 4e564441 [ 1.6636 ] tegrasign_v3.py --key /mnt/keys/sbk --list mb1_t194_prod_sigheader.bin_list.xml [ 1.6636 ] Key is a SBK key [ 1.6636 ] Key Size is 16 bytes [ 1.6643 ] 246336 [ 1.6750 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt mb1_t194_prod_sigheader.bin.hash zerosbk [ 1.6779 ] [ 1.6797 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 1.6803 ] [ 1.6804 ] header_magic: 4e564441 [ 1.6826 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mb1_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.6839 ] K[ 1.6841 ] ey size is 384 bytes [ 1.7204 ] Saving pkc public key in pub_key.key [ 1.7222 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 1.7249 ] [ 1.7270 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin [ 1.7276 ] [ 1.7277 ] header_magic: 4e564441 [ 1.7299 ] tegrasign_v3.py --key /mnt/keys/sbk --list mb1_t194_prod_sigheader.bin_list.xml [ 1.7300 ] Key is a SBK key [ 1.7300 ] Key Size is 16 bytes [ 1.7306 ] 246336 [ 1.7410 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt mb1_t194_prod_sigheader.bin.hash zerosbk [ 1.7437 ] [ 1.7456 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 1.7462 ] [ 1.7462 ] header_magic: 4e564441 [ 1.7484 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mb1_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.7497 ] K[ 1.7499 ] ey size is 384 bytes [ 1.7846 ] Saving pkc public key in pub_key.key [ 1.7863 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 1.7890 ] [ 1.7913 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin [ 1.7918 ] [ 1.7919 ] header_magic: 4e564441 [ 1.7941 ] tegrasign_v3.py --key /mnt/keys/sbk --list spe_t194_sigheader.bin_list.xml [ 1.7941 ] Key is a SBK key [ 1.7941 ] Key Size is 16 bytes [ 1.7945 ] 90864 [ 1.8014 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 1.8030 ] [ 1.8049 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin.encrypt [ 1.8055 ] [ 1.8056 ] header_magic: 4e564441 [ 1.8077 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list spe_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.8090 ] K[ 1.8092 ] ey size is 384 bytes [ 1.8454 ] Saving pkc public key in pub_key.key [ 1.8470 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt.signed spe_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 1.8485 ] [ 1.8506 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin [ 1.8513 ] [ 1.8514 ] header_magic: 4e564441 [ 1.8535 ] tegrasign_v3.py --key /mnt/keys/sbk --list spe_t194_sigheader.bin_list.xml [ 1.8536 ] Key is a SBK key [ 1.8536 ] Key Size is 16 bytes [ 1.8540 ] 90864 [ 1.8610 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 1.8632 ] [ 1.8639 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin.encrypt [ 1.8645 ] [ 1.8646 ] header_magic: 4e564441 [ 1.8667 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list spe_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.8680 ] K[ 1.8683 ] ey size is 384 bytes [ 1.9066 ] Saving pkc public key in pub_key.key [ 1.9084 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt.signed spe_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 1.9099 ] [ 1.9120 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin [ 1.9126 ] [ 1.9127 ] header_magic: 4e564441 [ 1.9148 ] tegrasign_v3.py --key /mnt/keys/sbk --list nvtboot_t194_sigheader.bin_list.xml [ 1.9149 ] Key is a SBK key [ 1.9149 ] Key Size is 16 bytes [ 1.9154 ] 177232 [ 1.9241 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt nvtboot_t194_sigheader.bin.hash zerosbk [ 1.9264 ] [ 1.9283 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin.encrypt [ 1.9289 ] [ 1.9290 ] header_magic: 4e564441 [ 1.9312 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list nvtboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.9325 ] K[ 1.9327 ] ey size is 384 bytes [ 1.9687 ] Saving pkc public key in pub_key.key [ 1.9706 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt.signed nvtboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 1.9728 ] [ 1.9750 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin [ 1.9756 ] [ 1.9757 ] header_magic: 4e564441 [ 1.9778 ] tegrasign_v3.py --key /mnt/keys/sbk --list nvtboot_t194_sigheader.bin_list.xml [ 1.9779 ] Key is a SBK key [ 1.9779 ] Key Size is 16 bytes [ 1.9784 ] 177232 [ 1.9870 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt nvtboot_t194_sigheader.bin.hash zerosbk [ 1.9891 ] [ 1.9910 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin.encrypt [ 1.9916 ] [ 1.9917 ] header_magic: 4e564441 [ 1.9938 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list nvtboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.9951 ] Ke[ 1.9953 ] y size is 384 bytes [ 2.0300 ] Saving pkc public key in pub_key.key [ 2.0318 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt.signed nvtboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.0339 ] [ 2.0361 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin [ 2.0367 ] [ 2.0368 ] header_magic: 4e564441 [ 2.0389 ] tegrasign_v3.py --key /mnt/keys/sbk --list preboot_c10_prod_cr_sigheader.bin_list.xml [ 2.0391 ] Key is a SBK key [ 2.0391 ] Key Size is 16 bytes [ 2.0393 ] 19920 [ 2.0445 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.0460 ] [ 2.0479 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin.encrypt [ 2.0485 ] [ 2.0486 ] header_magic: 4e564441 [ 2.0507 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list preboot_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.0520 ] Ke[ 2.0522 ] y size is 384 bytes [ 2.0867 ] Saving pkc public key in pub_key.key [ 2.0885 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt.signed preboot_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.0893 ] [ 2.0914 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin [ 2.0920 ] [ 2.0921 ] header_magic: 4e564441 [ 2.0942 ] tegrasign_v3.py --key /mnt/keys/sbk --list preboot_c10_prod_cr_sigheader.bin_list.xml [ 2.0943 ] Key is a SBK key [ 2.0943 ] Key Size is 16 bytes [ 2.0945 ] 19920 [ 2.0998 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.1007 ] [ 2.1026 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin.encrypt [ 2.1032 ] [ 2.1033 ] header_magic: 4e564441 [ 2.1054 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list preboot_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.1066 ] Ke[ 2.1069 ] y size is 384 bytes [ 2.1430 ] Saving pkc public key in pub_key.key [ 2.1448 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt.signed preboot_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.1457 ] [ 2.1477 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin [ 2.1483 ] [ 2.1484 ] header_magic: 4e564441 [ 2.1505 ] tegrasign_v3.py --key /mnt/keys/sbk --list mce_c10_prod_cr_sigheader.bin_list.xml [ 2.1506 ] Key is a SBK key [ 2.1506 ] Key Size is 16 bytes [ 2.1510 ] 139104 [ 2.1588 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.1607 ] [ 2.1626 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin.encrypt [ 2.1633 ] [ 2.1634 ] header_magic: 4e564441 [ 2.1656 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mce_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.1668 ] K[ 2.1672 ] ey size is 384 bytes [ 2.2033 ] Saving pkc public key in pub_key.key [ 2.2051 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt.signed mce_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.2070 ] [ 2.2091 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin [ 2.2097 ] [ 2.2098 ] header_magic: 4e564441 [ 2.2119 ] tegrasign_v3.py --key /mnt/keys/sbk --list mce_c10_prod_cr_sigheader.bin_list.xml [ 2.2120 ] Key is a SBK key [ 2.2120 ] Key Size is 16 bytes [ 2.2124 ] 139104 [ 2.2202 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.2220 ] [ 2.2239 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin.encrypt [ 2.2245 ] [ 2.2246 ] header_magic: 4e564441 [ 2.2267 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mce_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.2280 ] K[ 2.2282 ] ey size is 384 bytes [ 2.2627 ] Saving pkc public key in pub_key.key [ 2.2645 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt.signed mce_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.2664 ] [ 2.2685 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin [ 2.2691 ] [ 2.2692 ] header_magic: 4e564441 [ 2.2712 ] tegrasign_v3.py --key /mnt/keys/sbk --list mts_c10_prod_cr_sigheader.bin_list.xml [ 2.2713 ] Key is a SBK key [ 2.2713 ] Key Size is 16 bytes [ 2.2764 ] 3426320 [ 2.3610 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.3914 ] [ 2.3936 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin.encrypt [ 2.3942 ] [ 2.3943 ] header_magic: 4e564441 [ 2.3965 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mts_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.3978 ] K[ 2.3980 ] ey size is 384 bytes [ 2.4360 ] Saving pkc public key in pub_key.key [ 2.4379 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt.signed mts_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.4676 ] [ 2.4726 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin [ 2.4732 ] [ 2.4733 ] header_magic: 4e564441 [ 2.4755 ] tegrasign_v3.py --key /mnt/keys/sbk --list mts_c10_prod_cr_sigheader.bin_list.xml [ 2.4756 ] Key is a SBK key [ 2.4756 ] Key Size is 16 bytes [ 2.4806 ] 3426320 [ 2.5646 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.5952 ] [ 2.5973 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin.encrypt [ 2.5979 ] [ 2.5980 ] header_magic: 4e564441 [ 2.6001 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mts_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.6013 ] K[ 2.6015 ] ey size is 384 bytes [ 2.6404 ] Saving pkc public key in pub_key.key [ 2.6424 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt.signed mts_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.6720 ] [ 2.6769 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin [ 2.6776 ] [ 2.6777 ] header_magic: 4e564441 [ 2.6798 ] tegrasign_v3.py --key /mnt/keys/sbk --list warmboot_t194_prod_sigheader.bin_list.xml [ 2.6799 ] Key is a SBK key [ 2.6799 ] Key Size is 16 bytes [ 2.6802 ] 61408 [ 2.6865 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt warmboot_t194_prod_sigheader.bin.hash zerosbk [ 2.6878 ] [ 2.6896 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin.encrypt [ 2.6903 ] [ 2.6904 ] header_magic: 4e564441 [ 2.6926 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list warmboot_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.6940 ] K[ 2.6942 ] ey size is 384 bytes [ 2.7288 ] Saving pkc public key in pub_key.key [ 2.7305 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt.signed warmboot_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.7318 ] [ 2.7339 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin [ 2.7346 ] [ 2.7347 ] header_magic: 4e564441 [ 2.7369 ] tegrasign_v3.py --key /mnt/keys/sbk --list warmboot_t194_prod_sigheader.bin_list.xml [ 2.7370 ] Key is a SBK key [ 2.7370 ] Key Size is 16 bytes [ 2.7374 ] 61408 [ 2.7436 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt warmboot_t194_prod_sigheader.bin.hash zerosbk [ 2.7449 ] [ 2.7468 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin.encrypt [ 2.7475 ] [ 2.7476 ] header_magic: 4e564441 [ 2.7498 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list warmboot_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.7511 ] K[ 2.7514 ] ey size is 384 bytes [ 2.7859 ] Saving pkc public key in pub_key.key [ 2.7877 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt.signed warmboot_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.7889 ] [ 2.7910 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader [ 2.7916 ] [ 2.7917 ] header_magic: 4e564441 [ 2.7939 ] tegrasign_v3.py --key /mnt/keys/sbk --list xusb_sil_rel_fw_sigheader_list.xml [ 2.7940 ] Key is a SBK key [ 2.7940 ] Key Size is 16 bytes [ 2.7944 ] 129024 [ 2.8021 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt xusb_sil_rel_fw_sigheader.hash zerosbk [ 2.8039 ] [ 2.8058 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader.encrypt [ 2.8064 ] [ 2.8065 ] header_magic: 4e564441 [ 2.8087 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list xusb_sil_rel_fw_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 2.8100 ] K[ 2.8102 ] ey size is 384 bytes [ 2.8449 ] Saving pkc public key in pub_key.key [ 2.8467 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt.signed xusb_sil_rel_fw_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.8485 ] [ 2.8506 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader [ 2.8513 ] [ 2.8514 ] header_magic: 4e564441 [ 2.8536 ] tegrasign_v3.py --key /mnt/keys/sbk --list xusb_sil_rel_fw_sigheader_list.xml [ 2.8536 ] Key is a SBK key [ 2.8536 ] Key Size is 16 bytes [ 2.8540 ] 129024 [ 2.8617 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt xusb_sil_rel_fw_sigheader.hash zerosbk [ 2.8635 ] [ 2.8654 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader.encrypt [ 2.8660 ] [ 2.8661 ] header_magic: 4e564441 [ 2.8682 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list xusb_sil_rel_fw_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 2.8695 ] K[ 2.8697 ] ey size is 384 bytes [ 2.9046 ] Saving pkc public key in pub_key.key [ 2.9063 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt.signed xusb_sil_rel_fw_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.9081 ] [ 2.9103 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin [ 2.9109 ] [ 2.9110 ] header_magic: 4e564441 [ 2.9132 ] tegrasign_v3.py --key /mnt/keys/sbk --list cboot_t194_sigheader.bin_list.xml [ 2.9133 ] Key is a SBK key [ 2.9133 ] Key Size is 16 bytes [ 2.9140 ] 466912 [ 2.9290 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt cboot_t194_sigheader.bin.hash zerosbk [ 2.9340 ] [ 2.9359 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin.encrypt [ 2.9366 ] [ 2.9367 ] header_magic: 4e564441 [ 2.9391 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list cboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.9406 ] K[ 2.9409 ] ey size is 384 bytes [ 2.9844 ] Saving pkc public key in pub_key.key [ 2.9862 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt.signed cboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.9909 ] [ 2.9932 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin [ 2.9939 ] [ 2.9939 ] header_magic: 4e564441 [ 2.9961 ] tegrasign_v3.py --key /mnt/keys/sbk --list cboot_t194_sigheader.bin_list.xml [ 2.9962 ] Key is a SBK key [ 2.9962 ] Key Size is 16 bytes [ 2.9969 ] 466912 [ 3.0118 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt cboot_t194_sigheader.bin.hash zerosbk [ 3.0164 ] [ 3.0184 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin.encrypt [ 3.0191 ] [ 3.0191 ] header_magic: 4e564441 [ 3.0213 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list cboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 3.0225 ] Ke[ 3.0228 ] y size is 384 bytes [ 3.0578 ] Saving pkc public key in pub_key.key [ 3.0596 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt.signed cboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.0643 ] [ 3.0666 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb [ 3.0673 ] [ 3.0674 ] header_magic: 4e564441 [ 3.0695 ] tegrasign_v3.py --key /mnt/keys/sbk --list tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 3.0696 ] Key is a SBK key [ 3.0696 ] Key Size is 16 bytes [ 3.0701 ] 203248 [ 3.0796 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 3.0821 ] [ 3.0840 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 3.0846 ] [ 3.0847 ] header_magic: 4e564441 [ 3.0869 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 3.0884 ] K[ 3.0886 ] ey size is 384 bytes [ 3.1296 ] Saving pkc public key in pub_key.key [ 3.1314 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.1339 ] [ 3.1360 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb [ 3.1366 ] [ 3.1367 ] header_magic: 4e564441 [ 3.1389 ] tegrasign_v3.py --key /mnt/keys/sbk --list tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 3.1390 ] Key is a SBK key [ 3.1390 ] Key Size is 16 bytes [ 3.1395 ] 203248 [ 3.1487 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 3.1512 ] [ 3.1531 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 3.1537 ] [ 3.1538 ] header_magic: 4e564441 [ 3.1560 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 3.1573 ] K[ 3.1575 ] ey size is 384 bytes [ 3.1959 ] Saving pkc public key in pub_key.key [ 3.1976 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.2000 ] [ 3.2022 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img [ 3.2028 ] [ 3.2029 ] header_magic: 4e564441 [ 3.2051 ] tegrasign_v3.py --key /mnt/keys/sbk --list tos-trusty_t194_sigheader.img_list.xml [ 3.2052 ] Key is a SBK key [ 3.2052 ] Key Size is 16 bytes [ 3.2058 ] 406464 [ 3.2194 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 3.2235 ] [ 3.2254 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img.encrypt [ 3.2260 ] [ 3.2261 ] header_magic: 4e564441 [ 3.2283 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tos-trusty_t194_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 3.2297 ] Ke[ 3.2300 ] y size is 384 bytes [ 3.2651 ] Saving pkc public key in pub_key.key [ 3.2670 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt.signed tos-trusty_t194_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.2711 ] [ 3.2734 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img [ 3.2740 ] [ 3.2741 ] header_magic: 4e564441 [ 3.2764 ] tegrasign_v3.py --key /mnt/keys/sbk --list tos-trusty_t194_sigheader.img_list.xml [ 3.2765 ] Key is a SBK key [ 3.2765 ] Key Size is 16 bytes [ 3.2771 ] 406464 [ 3.2907 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 3.2950 ] [ 3.2969 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img.encrypt [ 3.2975 ] [ 3.2976 ] header_magic: 4e564441 [ 3.2998 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tos-trusty_t194_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 3.3011 ] K[ 3.3014 ] ey size is 384 bytes [ 3.3401 ] Saving pkc public key in pub_key.key [ 3.3419 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt.signed tos-trusty_t194_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.3460 ] [ 3.3484 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img [ 3.3490 ] [ 3.3491 ] header_magic: 4e564441 [ 3.3512 ] tegrasign_v3.py --key /mnt/keys/sbk --list eks_sigheader.img_list.xml [ 3.3513 ] Key is a SBK key [ 3.3513 ] Key Size is 16 bytes [ 3.3515 ] 1040 [ 3.3565 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 3.3573 ] [ 3.3591 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img.encrypt [ 3.3597 ] [ 3.3598 ] header_magic: 4e564441 [ 3.3619 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list eks_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 3.3633 ] K[ 3.3635 ] ey size is 384 bytes [ 3.4001 ] Saving pkc public key in pub_key.key [ 3.4019 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt.signed eks_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.4026 ] [ 3.4047 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img [ 3.4053 ] [ 3.4054 ] header_magic: 4e564441 [ 3.4075 ] tegrasign_v3.py --key /mnt/keys/sbk --list eks_sigheader.img_list.xml [ 3.4076 ] Key is a SBK key [ 3.4076 ] Key Size is 16 bytes [ 3.4078 ] 1040 [ 3.4129 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 3.4136 ] [ 3.4155 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img.encrypt [ 3.4162 ] [ 3.4163 ] header_magic: 4e564441 [ 3.4184 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list eks_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 3.4198 ] K[ 3.4200 ] ey size is 384 bytes [ 3.4564 ] Saving pkc public key in pub_key.key [ 3.4582 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt.signed eks_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.4590 ] [ 3.4611 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin [ 3.4617 ] [ 3.4618 ] header_magic: 4e564441 [ 3.4639 ] tegrasign_v3.py --key /mnt/keys/sbk --list adsp-fw_sigheader.bin_list.xml [ 3.4640 ] Key is a SBK key [ 3.4640 ] Key Size is 16 bytes [ 3.4643 ] 77216 [ 3.4710 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt adsp-fw_sigheader.bin.hash zerosbk [ 3.4723 ] [ 3.4742 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin.encrypt [ 3.4749 ] [ 3.4750 ] header_magic: 4e564441 [ 3.4772 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list adsp-fw_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 3.4785 ] K[ 3.4787 ] ey size is 384 bytes [ 3.5134 ] Saving pkc public key in pub_key.key [ 3.5151 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.5164 ] [ 3.5186 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin [ 3.5192 ] [ 3.5194 ] header_magic: 4e564441 [ 3.5216 ] tegrasign_v3.py --key /mnt/keys/sbk --list adsp-fw_sigheader.bin_list.xml [ 3.5217 ] Key is a SBK key [ 3.5217 ] Key Size is 16 bytes [ 3.5220 ] 77216 [ 3.5286 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt adsp-fw_sigheader.bin.hash zerosbk [ 3.5300 ] [ 3.5320 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin.encrypt [ 3.5326 ] [ 3.5327 ] header_magic: 4e564441 [ 3.5349 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list adsp-fw_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 3.5362 ] K[ 3.5364 ] ey size is 384 bytes [ 3.5712 ] Saving pkc public key in pub_key.key [ 3.5729 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.5743 ] [ 3.5765 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img [ 3.5772 ] [ 3.5772 ] header_magic: 4e564441 [ 3.5793 ] tegrasign_v3.py --key /mnt/keys/sbk --list camera-rtcpu-rce_sigheader.img_list.xml [ 3.5794 ] Key is a SBK key [ 3.5794 ] Key Size is 16 bytes [ 3.5799 ] 267808 [ 3.5905 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt camera-rtcpu-rce_sigheader.img.hash zerosbk [ 3.5935 ] [ 3.5954 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img.encrypt [ 3.5961 ] [ 3.5962 ] header_magic: 4e564441 [ 3.5984 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list camera-rtcpu-rce_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 3.5997 ] K[ 3.5999 ] ey size is 384 bytes [ 3.6350 ] Saving pkc public key in pub_key.key [ 3.6368 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt.signed camera-rtcpu-rce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.6398 ] [ 3.6420 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img [ 3.6426 ] [ 3.6427 ] header_magic: 4e564441 [ 3.6450 ] tegrasign_v3.py --key /mnt/keys/sbk --list camera-rtcpu-rce_sigheader.img_list.xml [ 3.6450 ] Key is a SBK key [ 3.6450 ] Key Size is 16 bytes [ 3.6456 ] 267808 [ 3.6561 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt camera-rtcpu-rce_sigheader.img.hash zerosbk [ 3.6591 ] [ 3.6610 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img.encrypt [ 3.6616 ] [ 3.6617 ] header_magic: 4e564441 [ 3.6639 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list camera-rtcpu-rce_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 3.6652 ] K[ 3.6654 ] ey size is 384 bytes [ 3.7004 ] Saving pkc public key in pub_key.key [ 3.7021 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt.signed camera-rtcpu-rce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.7051 ] [ 3.7073 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin [ 3.7080 ] [ 3.7080 ] header_magic: 4e564441 [ 3.7101 ] tegrasign_v3.py --key /mnt/keys/sbk --list bpmp_t194_sigheader.bin_list.xml [ 3.7102 ] Key is a SBK key [ 3.7102 ] Key Size is 16 bytes [ 3.7115 ] 852256 [ 3.7350 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 3.7428 ] [ 3.7448 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin.encrypt [ 3.7454 ] [ 3.7455 ] header_magic: 4e564441 [ 3.7477 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list bpmp_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 3.7490 ] K[ 3.7492 ] ey size is 384 bytes [ 3.7862 ] Saving pkc public key in pub_key.key [ 3.7880 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt.signed bpmp_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.7959 ] [ 3.7986 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin [ 3.7992 ] [ 3.7993 ] header_magic: 4e564441 [ 3.8014 ] tegrasign_v3.py --key /mnt/keys/sbk --list bpmp_t194_sigheader.bin_list.xml [ 3.8015 ] Key is a SBK key [ 3.8015 ] Key Size is 16 bytes [ 3.8027 ] 852256 [ 3.8273 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 3.8362 ] [ 3.8381 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin.encrypt [ 3.8392 ] [ 3.8393 ] header_magic: 4e564441 [ 3.8416 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list bpmp_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 3.8430 ] K[ 3.8433 ] ey size is 384 bytes [ 3.8827 ] Saving pkc public key in pub_key.key [ 3.8846 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt.signed bpmp_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.8925 ] [ 3.8951 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb [ 3.8958 ] [ 3.8958 ] header_magic: 4e564441 [ 3.8980 ] tegrasign_v3.py --key /mnt/keys/sbk --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml [ 3.8981 ] Key is a SBK key [ 3.8981 ] Key Size is 16 bytes [ 3.8988 ] 387312 [ 3.9120 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk [ 3.9160 ] [ 3.9179 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 3.9186 ] [ 3.9186 ] header_magic: 4e564441 [ 3.9209 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 3.9222 ] K[ 3.9224 ] ey size is 384 bytes [ 3.9589 ] Saving pkc public key in pub_key.key [ 3.9607 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.9653 ] [ 3.9676 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb [ 3.9682 ] [ 3.9683 ] header_magic: 4e564441 [ 3.9705 ] tegrasign_v3.py --key /mnt/keys/sbk --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml [ 3.9705 ] Key is a SBK key [ 3.9706 ] Key Size is 16 bytes [ 3.9712 ] 387312 [ 3.9846 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk [ 3.9886 ] [ 3.9905 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 3.9912 ] [ 3.9913 ] header_magic: 4e564441 [ 3.9935 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 3.9947 ] Ke[ 3.9950 ] y size is 384 bytes [ 4.0299 ] Saving pkc public key in pub_key.key [ 4.0317 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.0357 ] [ 4.0399 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin [ 4.0405 ] [ 4.0406 ] header_magic: 50000ea [ 4.0428 ] tegrasign_v3.py --key /mnt/keys/sbk --list nvtboot_recovery_t194.bin_list.xml [ 4.0429 ] Key is a SBK key [ 4.0429 ] Key Size is 16 bytes [ 4.0433 ] 177056 [ 4.0518 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194.bin.encrypt nvtboot_recovery_t194.bin.hash zerosbk [ 4.0527 ] [ 4.0546 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin.encrypt [ 4.0553 ] [ 4.0554 ] header_magic: ac173d1e [ 4.0572 ] tegrahost_v2 --appendsigheader nvtboot_recovery_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MB2B --ratchet_blob ratchet_blob.bin [ 4.0578 ] adding BCH for nvtboot_recovery_t194.bin.encrypt [ 4.0611 ] [ 4.0633 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list nvtboot_recovery_t194.bin_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 4.0648 ] K[ 4.0650 ] ey size is 384 bytes [ 4.1029 ] Saving pkc public key in pub_key.key [ 4.1048 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194.bin_sigheader.encrypt.signed nvtboot_recovery_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.1070 ] [ 4.1090 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin [ 4.1096 ] [ 4.1098 ] header_magic: 9000014 [ 4.1120 ] tegrasign_v3.py --key /mnt/keys/sbk --list nvtboot_recovery_cpu_t194.bin_list.xml [ 4.1121 ] Key is a SBK key [ 4.1121 ] Key Size is 16 bytes [ 4.1125 ] 259968 [ 4.1228 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194.bin.encrypt nvtboot_recovery_cpu_t194.bin.hash zerosbk [ 4.1237 ] [ 4.1257 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin.encrypt [ 4.1263 ] [ 4.1264 ] header_magic: cb47d6e [ 4.1282 ] tegrahost_v2 --appendsigheader nvtboot_recovery_cpu_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid CPBL --ratchet_blob ratchet_blob.bin [ 4.1288 ] adding BCH for nvtboot_recovery_cpu_t194.bin.encrypt [ 4.1333 ] [ 4.1355 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list nvtboot_recovery_cpu_t194.bin_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 4.1369 ] K[ 4.1372 ] ey size is 384 bytes [ 4.1742 ] Saving pkc public key in pub_key.key [ 4.1760 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.1789 ] [ 4.1790 ] Copying signed file in /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x [ 4.1796 ] Generating br-bct [ 4.1815 ] Performing cfg overlay [ 4.1815 ] ['/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1.cfg'] [ 4.1815 ] Updating dev and MSS params in BR BCT [ 4.1815 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 4.2278 ] [ 4.2279 ] Updating bl info [ 4.2299 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 4.2339 ] [ 4.2339 ] Generating br-bct [ 4.2360 ] Performing cfg overlay [ 4.2360 ] ['/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1.cfg'] [ 4.2360 ] Updating dev and MSS params in BR BCT [ 4.2360 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 4.2818 ] [ 4.2819 ] Updating bl info [ 4.2838 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 4.2863 ] [ 4.2863 ] Updating smd info [ 4.2883 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 --updatesmdinfo flash.xml.bin [ 4.2917 ] [ 4.2917 ] Updating Odmdata [ 4.2941 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0xB8190000 [ 4.2958 ] [ 4.2959 ] Get encrypted section of bct [ 4.2983 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listencbct bct_list.xml [ 4.2992 ] [ 4.2992 ] Signing BCT [ 4.3010 ] Generating signatures with encryption [ 4.3030 ] tegrasign_v3.py --key /mnt/keys/sbk --offset 2328 --file br_bct_BR.bct [ 4.3036 ] Key is a SBK key [ 4.3186 ] Key Size is 16 bytes [ 4.3188 ] 560 [ 4.3231 ] [ 4.3231 ] Updating BCT with signature [ 4.3234 ] Get Signed section of bct [ 4.3255 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listbct bct_list.xml [ 4.3264 ] [ 4.3284 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list bct_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 4.3290 ] Key size is 384 bytes [ 4.3809 ] Saving pkc public key in pub_key.key [ 4.3837 ] Saving Montgomery values in montgomery.bin [ 4.3842 ] [ 4.3842 ] Updating BCT with signature [ 4.3862 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.3874 ] [ 4.3875 ] Generating coldboot mb1-bct [ 4.3896 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_cold_boot_bct.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1.cfg --misc tegra194-mb1-bct-misc-sd-l4t.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 4.3902 ] MB1-BCT version: 0x1 [ 4.3905 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg [ 4.3908 ] Added Platform Config 0 data with size :- 2240 [ 4.3920 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 4.3923 ] Added Platform Config 1 data with size :- 19640 [ 4.4051 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg [ 4.4053 ] Added Platform Config 2 data with size :- 24 [ 4.4055 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 4.4057 ] Added Platform Config 4 data with size :- 348 [ 4.4059 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 4.4061 ] Added Platform Config 3 data with size :- 92 [ 4.4062 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 4.4063 ] Added Platform Config 5 data with size :- 128 [ 4.4064 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 4.4066 ] Added Platform Config 7 data with size :- 392 [ 4.4072 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 4.4073 ] Added Platform Config 9 data with size :- 40 [ 4.4073 ] [ 4.4074 ] Updating mb1-bct with firmware information [ 4.4091 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 4.4098 ] MB1-BCT version: 0x1 [ 4.4109 ] [ 4.4109 ] Updating mb1-bct with storage information [ 4.4128 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 4.4133 ] MB1-BCT version: 0x1 [ 4.4164 ] [ 4.4164 ] Updating mb1-bct with ratchet information [ 4.4182 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 4.4188 ] MB1-BCT version: 0x1 [ 4.4190 ] FwIndex: 1, MinRatchetLevel: 0 [ 4.4192 ] FwIndex: 2, MinRatchetLevel: 0 [ 4.4193 ] FwIndex: 3, MinRatchetLevel: 0 [ 4.4194 ] FwIndex: 4, MinRatchetLevel: 0 [ 4.4194 ] FwIndex: 5, MinRatchetLevel: 0 [ 4.4194 ] FwIndex: 6, MinRatchetLevel: 0 [ 4.4194 ] FwIndex: 7, MinRatchetLevel: 0 [ 4.4194 ] FwIndex: 11, MinRatchetLevel: 0 [ 4.4194 ] FwIndex: 12, MinRatchetLevel: 0 [ 4.4194 ] FwIndex: 13, MinRatchetLevel: 0 [ 4.4194 ] FwIndex: 14, MinRatchetLevel: 0 [ 4.4194 ] FwIndex: 15, MinRatchetLevel: 0 [ 4.4194 ] FwIndex: 16, MinRatchetLevel: 0 [ 4.4194 ] FwIndex: 17, MinRatchetLevel: 0 [ 4.4194 ] FwIndex: 18, MinRatchetLevel: 0 [ 4.4194 ] FwIndex: 19, MinRatchetLevel: 0 [ 4.4194 ] FwIndex: 30, MinRatchetLevel: 0 [ 4.4194 ] FwIndex: 31, MinRatchetLevel: 0 [ 4.4194 ] FwIndex: 32, MinRatchetLevel: 0 [ 4.4194 ] [ 4.4212 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct [ 4.4219 ] [ 4.4220 ] header_magic: c0650000 [ 4.4242 ] tegrasign_v3.py --key /mnt/keys/sbk --list mb1_cold_boot_bct_MB1.bct_list.xml [ 4.4243 ] Key is a SBK key [ 4.4243 ] Key Size is 16 bytes [ 4.4245 ] 26048 [ 4.4303 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1.bct.encrypt mb1_cold_boot_bct_MB1.bct.hash zerosbk [ 4.4312 ] [ 4.4331 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct.encrypt [ 4.4338 ] [ 4.4339 ] header_magic: 480c46cd [ 4.4357 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin [ 4.4363 ] adding BCH for mb1_cold_boot_bct_MB1.bct.encrypt [ 4.4370 ] [ 4.4391 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mb1_cold_boot_bct_MB1.bct_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 4.4405 ] K[ 4.4408 ] ey size is 384 bytes [ 4.4771 ] Saving pkc public key in pub_key.key [ 4.4790 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.4802 ] [ 4.4803 ] Generating recovery mb1-bct [ 4.4823 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_bct.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1.cfg --misc tegra194-mb1-bct-misc-flash.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 4.4829 ] MB1-BCT version: 0x1 [ 4.4833 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg [ 4.4838 ] Added Platform Config 0 data with size :- 2240 [ 4.4850 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 4.4854 ] Added Platform Config 1 data with size :- 19640 [ 4.4986 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg [ 4.4989 ] Added Platform Config 2 data with size :- 24 [ 4.4992 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 4.4995 ] Added Platform Config 4 data with size :- 348 [ 4.4998 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 4.5002 ] Added Platform Config 3 data with size :- 92 [ 4.5004 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 4.5007 ] Added Platform Config 5 data with size :- 128 [ 4.5008 ] [ 4.5008 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 4.5008 ] Added Platform Config 7 data with size :- 392 [ 4.5008 ] [ 4.5008 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 4.5008 ] Added Platform Config 9 data with size :- 40 [ 4.5008 ] [ 4.5008 ] Updating mb1-bct with firmware information [ 4.5026 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin [ 4.5033 ] MB1-BCT version: 0x1 [ 4.5050 ] [ 4.5050 ] Updating mb1-bct with storage information [ 4.5068 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 4.5074 ] MB1-BCT version: 0x1 [ 4.5105 ] [ 4.5105 ] Updating mb1-bct with ratchet information [ 4.5124 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 4.5130 ] MB1-BCT version: 0x1 [ 4.5131 ] FwIndex: 1, MinRatchetLevel: 0 [ 4.5132 ] FwIndex: 2, MinRatchetLevel: 0 [ 4.5133 ] FwIndex: 3, MinRatchetLevel: 0 [ 4.5134 ] FwIndex: 4, MinRatchetLevel: 0 [ 4.5135 ] FwIndex: 5, MinRatchetLevel: 0 [ 4.5135 ] FwIndex: 6, MinRatchetLevel: 0 [ 4.5135 ] FwIndex: 7, MinRatchetLevel: 0 [ 4.5135 ] FwIndex: 11, MinRatchetLevel: 0 [ 4.5135 ] FwIndex: 12, MinRatchetLevel: 0 [ 4.5135 ] FwIndex: 13, MinRatchetLevel: 0 [ 4.5135 ] FwIndex: 14, MinRatchetLevel: 0 [ 4.5135 ] FwIndex: 15, MinRatchetLevel: 0 [ 4.5135 ] FwIndex: 16, MinRatchetLevel: 0 [ 4.5135 ] FwIndex: 17, MinRatchetLevel: 0 [ 4.5135 ] FwIndex: 18, MinRatchetLevel: 0 [ 4.5135 ] FwIndex: 19, MinRatchetLevel: 0 [ 4.5135 ] FwIndex: 30, MinRatchetLevel: 0 [ 4.5135 ] FwIndex: 31, MinRatchetLevel: 0 [ 4.5135 ] FwIndex: 32, MinRatchetLevel: 0 [ 4.5135 ] [ 4.5153 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct [ 4.5159 ] [ 4.5160 ] header_magic: c0650000 [ 4.5182 ] tegrasign_v3.py --key /mnt/keys/sbk --list mb1_bct_MB1.bct_list.xml [ 4.5183 ] Key is a SBK key [ 4.5183 ] Key Size is 16 bytes [ 4.5186 ] 26048 [ 4.5243 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1.bct.encrypt mb1_bct_MB1.bct.hash zerosbk [ 4.5251 ] [ 4.5270 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct.encrypt [ 4.5277 ] [ 4.5277 ] header_magic: 480c46cd [ 4.5296 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin [ 4.5302 ] adding BCH for mb1_bct_MB1.bct.encrypt [ 4.5309 ] [ 4.5331 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mb1_bct_MB1.bct_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 4.5345 ] K[ 4.5348 ] ey size is 384 bytes [ 4.5772 ] Saving pkc public key in pub_key.key [ 4.5794 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1.bct_sigheader.encrypt.signed mb1_bct_MB1.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.5815 ] [ 4.5815 ] Generating coldboot mem-bct [ 4.5834 ] tegrabct_v2 --chip 0x19 0 --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1.cfg --membct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_1.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_2.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_3.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_4.bct [ 4.5840 ] Packing sdram param for instance[0] [ 4.6303 ] Packing sdram param for instance[1] [ 4.6304 ] Packing sdram param for instance[2] [ 4.6305 ] Packing sdram param for instance[3] [ 4.6306 ] Packing sdram param for instance[4] [ 4.6306 ] Packing sdram param for instance[5] [ 4.6307 ] Packing sdram param for instance[6] [ 4.6307 ] Packing sdram param for instance[7] [ 4.6307 ] Packing sdram param for instance[8] [ 4.6307 ] Packing sdram param for instance[9] [ 4.6307 ] Packing sdram param for instance[10] [ 4.6307 ] Packing sdram param for instance[11] [ 4.6307 ] Packing sdram param for instance[12] [ 4.6307 ] Packing sdram param for instance[13] [ 4.6307 ] Packing sdram param for instance[14] [ 4.6307 ] Packing sdram param for instance[15] [ 4.6307 ] [ 4.6307 ] Getting sector size from pt [ 4.6325 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin [ 4.6333 ] [ 4.6334 ] BlockSize read from layout is 200 [ 4.6353 ] tegrasign_v3.py --key /mnt/keys/sbk --file /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_1.bct [ 4.6359 ] Key is a SBK key [ 4.6508 ] Key Size is 16 bytes [ 4.6509 ] 48352 [ 4.6553 ] [ 4.6574 ] tegrasign_v3.py --key /mnt/keys/sbk --file /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_2.bct [ 4.6581 ] Key is a SBK key [ 4.6740 ] Key Size is 16 bytes [ 4.6741 ] 48352 [ 4.6788 ] [ 4.6811 ] tegrasign_v3.py --key /mnt/keys/sbk --file /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_3.bct [ 4.6817 ] Key is a SBK key [ 4.6979 ] Key Size is 16 bytes [ 4.6980 ] 48352 [ 4.7026 ] [ 4.7048 ] tegrasign_v3.py --key /mnt/keys/sbk --file /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_4.bct [ 4.7055 ] Key is a SBK key [ 4.7213 ] Key Size is 16 bytes [ 4.7214 ] 48352 [ 4.7261 ] [ 4.7284 ] tegrahost_v2 --chip 0x19 0 --blocksize 512 --magicid MEMB --addsigheader_multi /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_1_encrypt.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_2_encrypt.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_3_encrypt.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_4_encrypt.bct [ 4.7290 ] adding BCH for /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_1_encrypt.bct [ 4.7310 ] [ 4.7328 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 4.7335 ] [ 4.7336 ] header_magic: 4e564441 [ 4.7358 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mem_coldboot.bct_list.xml --pubkeyhash pub_key.key [ 4.7372 ] K[ 4.7374 ] ey size is 384 bytes [ 4.7745 ] Saving pkc public key in pub_key.key [ 4.7765 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_coldboot.bct.signed mem_coldboot.bct.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.7774 ] [ 4.7793 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 4.7800 ] [ 4.7818 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin --appendsigheader mem_coldboot.bct oem-rsa [ 4.7824 ] Header already present for mem_coldboot.bct [ 4.7827 ] [ 4.7848 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem --list mem_coldboot_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 4.7862 ] Ke[ 4.7873 ] y size is 384 bytes [ 4.8229 ] Saving pkc public key in pub_key.key [ 4.8229 ] Saving Montgomery values in montgomery.bin [ 4.8248 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin --updatesigheader mem_coldboot_sigheader.bct.signed mem_coldboot_sigheader.bct.sig oem-rsa [ 4.8257 ] [ 4.8258 ] Generating recovery mem-bct [ 4.8276 ] tegrabct_v2 --chip 0x19 0 --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1.cfg --membct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_1.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_2.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_3.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/10324/tmpjf4puamn1_4.bct [ 4.8282 ] Packing sdram param for instance[0] [ 4.8733 ] Packing sdram param for instance[1] [ 4.8735 ] Packing sdram param for instance[2] [ 4.8737 ] Packing sdram param for instance[3] [ 4.8738 ] Packing sdram param for instance[4] [ 4.8738 ] Packing sdram param for instance[5] [ 4.8738 ] Packing sdram param for instance[6] [ 4.8738 ] Packing sdram param for instance[7] [ 4.8738 ] Packing sdram param for instance[8] [ 4.8738 ] Packing sdram param for instance[9] [ 4.8738 ] Packing sdram param for instance[10] [ 4.8738 ] Packing sdram param for instance[11] [ 4.8738 ] Packing sdram param for instance[12] [ 4.8738 ] Packing sdram param for instance[13] [ 4.8738 ] Packing sdram param for instance[14] [ 4.8738 ] Packing sdram param for instance[15] [ 4.8738 ] [ 4.8758 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct [ 4.8765 ] [ 4.8766 ] header_magic: 3000000 [ 4.8787 ] tegrasign_v3.py --key /mnt/keys/sbk --list mem_rcm.bct_list.xml [ 4.8788 ] Key is a SBK key [ 4.8788 ] Key Size is 16 bytes [ 4.8791 ] 48352 [ 4.8851 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm.bct.encrypt mem_rcm.bct.hash zerosbk [ 4.8858 ] [ 4.8877 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct.encrypt [ 4.8884 ] [ 4.8884 ] header_magic: 8de37d0f [ 4.8903 ] tegrahost_v2 --appendsigheader mem_rcm.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin [ 4.8909 ] adding BCH for mem_rcm.bct.encrypt [ 4.8920 ] [ 4.8942 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mem_rcm.bct_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 4.8955 ] K[ 4.8958 ] ey size is 384 bytes [ 4.9308 ] Saving pkc public key in pub_key.key [ 4.9326 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm.bct_sigheader.encrypt.signed mem_rcm.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.9337 ] [ 4.9344 ] nvtboot_recovery_t194.bin_sigheader.encrypt.signed [ 4.9346 ] preboot_c10_prod_cr.bin [ 4.9347 ] mce_c10_prod_cr.bin [ 4.9349 ] mts_c10_prod_cr.bin [ 4.9374 ] bpmp_t194.bin [ 4.9380 ] tegra194-a02-bpmp-p3668-a00.dtb [ 4.9384 ] spe_t194.bin [ 4.9385 ] tos-trusty_t194.img [ 4.9388 ] eks.img [ 4.9389 ] tegra194-p3668-all-p3509-0000.dtb [ 4.9391 ] nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed [ 4.9415 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 4.9421 ] [ 4.9422 ] header_magic: 4e564441 [ 4.9444 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mb1_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 4.9458 ] K[ 4.9460 ] ey size is 384 bytes [ 4.9819 ] Saving pkc public key in pub_key.key [ 4.9838 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.9866 ] [ 4.9888 ] tegraparser_v2 --generategpt --pt flash.xml.bin [ 4.9896 ] [ 4.9968 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/flash.xml.tmp flash.idx [ 5.0955 ] /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /mnt/keys//pkc.pem --encrypt_key /mnt/keys/user_key_flash --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign xusb_sil_rel_fw xusb_fw Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0005 ] Generating signature [ 0.0026 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0040 ] K[ 0.0041 ] ey size is 384 bytes [ 0.0064 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem [ 0.0076 ] Ke[ 0.0086 ] y size is 384 bytes [ 0.0087 ] Saving Montgomery values in montgomery.bin [ 0.0086 ] Generating ratchet blob [ 0.0104 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0109 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0111 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0111 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0111 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0111 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0111 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0112 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0112 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0112 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0112 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0112 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0112 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0112 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0112 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0112 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0112 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0112 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0112 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0112 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0112 ] [ 0.0113 ] header_magic: 5b0000 [ 0.0114 ] Encrypting file [ 0.0132 ] tegrahost_v2 --chip 0x19 --align 1_xusb_sil_rel_fw [ 0.0138 ] [ 0.0139 ] header_magic: 5b0000 [ 0.0164 ] tegrasign_v3.py --key /mnt/keys/user_key_flash --list 1_xusb_sil_rel_fw_list.xml [ 0.0165 ] Key is a SBK key [ 0.0165 ] Key Size is 16 bytes [ 0.0169 ] 129024 [ 0.0246 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_xusb_sil_rel_fw.encrypt 1_xusb_sil_rel_fw.hash zerosbk [ 0.0254 ] [ 0.0274 ] tegrahost_v2 --chip 0x19 --align 1_xusb_sil_rel_fw.encrypt [ 0.0279 ] [ 0.0280 ] header_magic: 1be0cc5b [ 0.0298 ] tegrahost_v2 --appendsigheader 1_xusb_sil_rel_fw.encrypt oem-rsa-sbk --chip 0x19 0 --magicid XUSB --ratchet_blob ratchet_blob.bin [ 0.0304 ] adding BCH for 1_xusb_sil_rel_fw.encrypt [ 0.0327 ] [ 0.0349 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list 1_xusb_sil_rel_fw_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.0361 ] K[ 0.0364 ] ey size is 384 bytes [ 0.0713 ] Saving pkc public key in pub_key.key [ 0.0730 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_xusb_sil_rel_fw_sigheader.encrypt.signed 1_xusb_sil_rel_fw_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 0.0748 ] [ 0.0751 ] Signed and encrypted file: /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/xusb_sil_rel_fw_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for xusb_sil_rel_fw_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x1f800 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for xusb_sil_rel_fw_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/xusb_sil_rel_fw_sigheader.encrypt.signed done. ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed --bct br_bct_BR.bct --applet rcm_2_signed.rcm --applet_softfuse rcm_1_signed.rcm --cmd "secureflash;reboot" --cfg secureflash.xml --chip 0x19 --mb1_bct mb1_bct_MB1.bct_sigheader.encrypt.signed --mem_bct mem_rcm.bct_sigheader.encrypt.signed --mb1_cold_boot_bct mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed --mem_bct_cold_boot mem_coldboot_sigheader.bct.signed --bins "mb2_bootloader nvtboot_recovery_t194.bin_sigheader.encrypt.signed; mts_preboot preboot_c10_prod_cr_sigheader.bin.encrypt.signed; mts_mce mce_c10_prod_cr_sigheader.bin.encrypt.signed; mts_proper mts_c10_prod_cr_sigheader.bin.encrypt.signed; bpmp_fw bpmp_t194_sigheader.bin.encrypt.signed; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed; spe_fw spe_t194_sigheader.bin.encrypt.signed; tlk tos-trusty_t194_sigheader.img.encrypt.signed; eks eks_sigheader.img.encrypt.signed; bootloader_dtb tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed" saving flash command in flashcmd.txt *** no-flash flag enabled. Exiting now... *** User can run above saved command in factory environment without providing pkc and sbk keys to flash a device Example: $ cd bootloader $ sudo bash ./flashcmd.txt '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/flash.idx' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/flash.idx' Flash index file is /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/flash.idx Number of lines is 48 max_index=47 Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/br_bct_BR.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/br_bct_BR.bct '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/br_bct_BR.bct' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/br_bct_BR.bct' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mb1_t194_prod_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mb1_t194_prod_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mb1_t194_prod_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mb1_t194_prod_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mb1_t194_prod_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mb1_t194_prod_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mb1_t194_prod_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mb1_t194_prod_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mem_coldboot_sigheader.bct.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mem_coldboot_sigheader.bct.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mem_coldboot_sigheader.bct.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mem_coldboot_sigheader.bct.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mem_coldboot_sigheader.bct.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mem_coldboot_sigheader.bct.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mem_coldboot_sigheader.bct.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mem_coldboot_sigheader.bct.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/spe_t194_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/spe_t194_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/spe_t194_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/spe_t194_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/spe_t194_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/spe_t194_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/spe_t194_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/spe_t194_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/nvtboot_t194_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/nvtboot_t194_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/nvtboot_t194_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/nvtboot_t194_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/nvtboot_t194_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/nvtboot_t194_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/nvtboot_t194_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/nvtboot_t194_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/preboot_c10_prod_cr_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/preboot_c10_prod_cr_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/preboot_c10_prod_cr_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/preboot_c10_prod_cr_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/preboot_c10_prod_cr_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/preboot_c10_prod_cr_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/preboot_c10_prod_cr_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/preboot_c10_prod_cr_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mce_c10_prod_cr_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mce_c10_prod_cr_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mce_c10_prod_cr_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mce_c10_prod_cr_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mce_c10_prod_cr_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mce_c10_prod_cr_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mce_c10_prod_cr_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mce_c10_prod_cr_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mts_c10_prod_cr_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mts_c10_prod_cr_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mts_c10_prod_cr_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mts_c10_prod_cr_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mts_c10_prod_cr_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mts_c10_prod_cr_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/mts_c10_prod_cr_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/mts_c10_prod_cr_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/warmboot_t194_prod_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/warmboot_t194_prod_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/warmboot_t194_prod_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/warmboot_t194_prod_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/warmboot_t194_prod_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/warmboot_t194_prod_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/warmboot_t194_prod_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/warmboot_t194_prod_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/slot_metadata.bin /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/slot_metadata.bin '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/slot_metadata.bin' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/slot_metadata.bin' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/slot_metadata.bin /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/slot_metadata.bin '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/slot_metadata.bin' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/slot_metadata.bin' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/xusb_sil_rel_fw_sigheader.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/xusb_sil_rel_fw_sigheader.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/xusb_sil_rel_fw_sigheader.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/xusb_sil_rel_fw_sigheader.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/xusb_sil_rel_fw_sigheader.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/xusb_sil_rel_fw_sigheader.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/xusb_sil_rel_fw_sigheader.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/xusb_sil_rel_fw_sigheader.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/cboot_t194_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/cboot_t194_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/cboot_t194_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/cboot_t194_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/cboot_t194_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/cboot_t194_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/cboot_t194_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/cboot_t194_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/bmp.blob /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/bmp.blob '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/bmp.blob' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/bmp.blob' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/bmp.blob /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/bmp.blob '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/bmp.blob' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/bmp.blob' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/tos-trusty_t194_sigheader.img.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/tos-trusty_t194_sigheader.img.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/tos-trusty_t194_sigheader.img.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/tos-trusty_t194_sigheader.img.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/tos-trusty_t194_sigheader.img.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/tos-trusty_t194_sigheader.img.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/tos-trusty_t194_sigheader.img.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/tos-trusty_t194_sigheader.img.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/eks_sigheader.img.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/eks_sigheader.img.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/eks_sigheader.img.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/eks_sigheader.img.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/eks_sigheader.img.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/eks_sigheader.img.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/eks_sigheader.img.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/eks_sigheader.img.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/adsp-fw_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/adsp-fw_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/adsp-fw_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/adsp-fw_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/adsp-fw_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/adsp-fw_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/adsp-fw_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/adsp-fw_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/camera-rtcpu-rce_sigheader.img.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/camera-rtcpu-rce_sigheader.img.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/camera-rtcpu-rce_sigheader.img.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/camera-rtcpu-rce_sigheader.img.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/camera-rtcpu-rce_sigheader.img.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/camera-rtcpu-rce_sigheader.img.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/camera-rtcpu-rce_sigheader.img.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/camera-rtcpu-rce_sigheader.img.encrypt.signed' Warning: skip writing sce-fw partition as no image is specified Warning: skip writing sce-fw_b partition as no image is specified Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/bpmp_t194_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/bpmp_t194_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/bpmp_t194_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/bpmp_t194_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/bpmp_t194_sigheader.bin.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/bpmp_t194_sigheader.bin.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/bpmp_t194_sigheader.bin.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/bpmp_t194_sigheader.bin.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed' Warning: skip writing CPUBL-CFG partition as no image is specified Warning: skip writing CPUBL-CFG_b partition as no image is specified Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/qspi_bootblob_ver.txt /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/qspi_bootblob_ver.txt '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/qspi_bootblob_ver.txt' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/qspi_bootblob_ver.txt' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/qspi_bootblob_ver.txt /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/qspi_bootblob_ver.txt '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/qspi_bootblob_ver.txt' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/qspi_bootblob_ver.txt' Copying /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/gpt_secondary_3_0.bin /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/gpt_secondary_3_0.bin '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/gpt_secondary_3_0.bin' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/internal/gpt_secondary_3_0.bin' Copy flash script to /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/l4t_flash_from_kernel.sh' -> '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/images/l4t_flash_from_kernel.sh' Success ****************************************** * * * Step 2: Generate rcm boot commandline * * * ****************************************** /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/flash.sh -u "/mnt/keys//pkc.pem" -v "/mnt/keys//sbk" --no-flash --rcm-boot jetson-xavier-nx-devkit-qspi mmcblk0p1 ############################################################################### # L4T BSP Information: # R32 , REVISION: 7.1 ############################################################################### sbk_keyfile is present, but no user_keyfile; set user_keyfile to zero keyfile Board ID(3668) version(300) sku(0001) revision(B.0) Copy /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb to /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb.rec copying bctfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg)... done. copying bctfile1(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-memcfg-sw-override.cfg)... done. copying minratchet_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-ratchet-p3668.cfg)... done. copying device_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-bct-device-qspi-p3668.cfg)... done. copying misc_cold_boot_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-sd-l4t.cfg)... done. copying misc_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-flash.cfg)... done. copying pinmux_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-pinmux-p3668-a01.cfg)... done. copying gpioint_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg)... done. copying pmic_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-pmic-p3668-0001-a00.cfg)... done. copying pmc_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-padvoltage-p3668-a01.cfg)... done. copying prod_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-prod-p3668-0001-a00.cfg)... done. copying scr_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying scr_cold_boot_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying bootrom_config(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-reset-p3668-0001-a00.cfg)... done. copying dev_params(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-br-bct-qspi.cfg)... done. Existing bootloader(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. copying initrd(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/l4t_initrd.img)... done. Making Boot image... done. /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /mnt/keys//pkc.pem --encrypt_key /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/.zero_.key --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign boot.img kernel Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0004 ] Generating signature [ 0.0027 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0041 ] K[ 0.0043 ] ey size is 384 bytes [ 0.0066 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem [ 0.0079 ] Ke[ 0.0090 ] y size is 384 bytes [ 0.0091 ] Saving Montgomery values in montgomery.bin [ 0.0090 ] Generating ratchet blob [ 0.0108 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0114 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0116 ] [ 0.0117 ] header_magic: 414e4452 [ 0.0117 ] Encrypting file [ 0.0136 ] tegrahost_v2 --chip 0x19 --align 1_boot.img [ 0.0142 ] [ 0.0143 ] header_magic: 414e4452 [ 0.0168 ] tegrasign_v3.py --key /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/.zero_.key --list 1_boot.img_list.xml [ 0.0169 ] Key is a SBK key [ 0.0169 ] Key Size is 16 bytes [ 0.4794 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot.img.encrypt 1_boot.img.hash zerosbk [ 0.6064 ] [ 0.6102 ] tegrahost_v2 --chip 0x19 --align 1_boot.img.encrypt [ 0.6123 ] [ 0.6125 ] header_magic: 414e4452 [ 0.6157 ] tegrahost_v2 --appendsigheader 1_boot.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid KRNL --ratchet_blob ratchet_blob.bin [ 0.6178 ] adding BCH for 1_boot.img.encrypt [ 1.3234 ] [ 1.3258 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list 1_boot.img_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 1.3271 ] K[ 1.3273 ] ey size is 384 bytes [ 1.3995 ] Saving pkc public key in pub_key.key [ 1.4014 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot.img_sigheader.encrypt.signed 1_boot.img_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 1.8380 ] [ 1.8698 ] Signed and encrypted file: /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/boot.img_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for boot.img_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x27ec800 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot.img_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt.signed done. Making recovery ramdisk for recovery image... Re-generating recovery ramdisk for recovery image... ~/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp ~/workspace/d4t/work/Linux_for_Tegra/bootloader ~/workspace/d4t/work/Linux_for_Tegra 30412 blocks _BASE_KERNEL_VERSION=4.9.253-tegra cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/usr/lib/aarch64-linux-gnu/libpcsclite.so.1': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/usr/lib/aarch64-linux-gnu/libpcsclite.so.1 /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//lib/libpcsclite.so.1 cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/sbin/wpa_supplicant': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/sbin/wpa_supplicant /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//sbin/wpa_supplicant cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/action_wpa.sh': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/action_wpa.sh /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//etc/wpa_supplicant/action_wpa.sh cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/functions.sh': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/functions.sh /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//etc/wpa_supplicant/functions.sh cp: cannot stat '/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/ifupdown.sh': No such file or directory warning: cp -f /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/rootfs/etc/wpa_supplicant/ifupdown.sh /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp//etc/wpa_supplicant/ifupdown.sh ~/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp/lib ~/workspace/d4t/work/Linux_for_Tegra/bootloader/ramdisk_tmp ~/workspace/d4t/work/Linux_for_Tegra/bootloader ~/workspace/d4t/work/Linux_for_Tegra 111519 blocks Making Recovery image... copying recdtbfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb.rec)... done. 20+0 records in 20+0 records out 20 bytes copied, 0.000332957 s, 60.1 kB/s Existing sosfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing tegraboot(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_t194.bin) reused. Existing cpu_bootloader(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. Existing mb2blfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_recovery_t194.bin) reused. Existing mtspreboot(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/preboot_c10_prod_cr.bin) reused. Existing mcepreboot(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mce_c10_prod_cr.bin) reused. Existing mtsproper(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mts_c10_prod_cr.bin) reused. Existing mb1file(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing bpffile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/bpmp_t194.bin) reused. copying bpfdtbfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/tegra194-a02-bpmp-p3668-a00.dtb)... done. Existing scefile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. Existing camerafw(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/camera-rtcpu-rce.img) reused. Existing spefile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/spe_t194.bin) reused. Existing wb0boot(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/warmboot_t194_prod.bin) reused. Existing tosfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tos-trusty_t194.img) reused. Existing eksfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/eks.img) reused. copying soft_fuses(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. copying dtbfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb)... done. Copying nv_boot_control.conf to rootfs /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /mnt/keys//pkc.pem --encrypt_key /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/.zero_.key --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign kernel_tegra194-p3668-all-p3509-0000.dtb kernel_dtb Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0005 ] Generating signature [ 0.0027 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0039 ] K[ 0.0042 ] ey size is 384 bytes [ 0.0064 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem [ 0.0077 ] K[ 0.0087 ] ey size is 384 bytes [ 0.0090 ] Saving Montgomery values in montgomery.bin [ 0.0088 ] Generating ratchet blob [ 0.0106 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0112 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0114 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0114 ] [ 0.0115 ] header_magic: d00dfeed [ 0.0116 ] Encrypting file [ 0.0135 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p3668-all-p3509-0000.dtb [ 0.0141 ] [ 0.0142 ] header_magic: d00dfeed [ 0.0168 ] tegrasign_v3.py --key /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/.zero_.key --list 1_kernel_tegra194-p3668-all-p3509-0000.dtb_list.xml [ 0.0169 ] Key is a SBK key [ 0.0169 ] Key Size is 16 bytes [ 0.0229 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt 1_kernel_tegra194-p3668-all-p3509-0000.dtb.hash zerosbk [ 0.0237 ] [ 0.0256 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt [ 0.0262 ] [ 0.0263 ] header_magic: d00dfeed [ 0.0280 ] tegrahost_v2 --appendsigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid KDTB --ratchet_blob ratchet_blob.bin [ 0.0285 ] adding BCH for 1_kernel_tegra194-p3668-all-p3509-0000.dtb.encrypt [ 0.0323 ] [ 0.0344 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.0356 ] Ke[ 0.0359 ] y size is 384 bytes [ 0.0733 ] Saving pkc public key in pub_key.key [ 0.0750 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed 1_kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 0.0775 ] [ 0.0779 ] Signed and encrypted file: /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x319e1 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra194-p3668-all-p3509-0000.dtb_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed done. Skip generating system.img Existing tbcfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/cboot_t194.bin) reused. copying tbcdtbfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb)... done. copying cfgfile(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t194_qspi_p3668.xml) to flash.xml... done. Existing flasher(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu_t194.bin) reused. Existing flashapp(/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py) reused. ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin --sdram_config tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg,tegra194-memcfg-sw-override.cfg --odmdata 0xB8190000 --applet mb1_t194_prod.bin --cmd "sign" --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --cfg flash.xml --chip 0x19 --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --device_config tegra19x-mb1-bct-device-qspi-p3668.cfg --misc_cold_boot_config tegra194-mb1-bct-misc-sd-l4t.cfg --misc_config tegra194-mb1-bct-misc-flash.cfg --pinmux_config tegra19x-mb1-pinmux-p3668-a01.cfg --gpioint_config tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --pmic_config tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --pmc_config tegra19x-mb1-padvoltage-p3668-a01.cfg --prod_config tegra19x-mb1-prod-p3668-0001-a00.cfg --scr_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --scr_cold_boot_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --br_cmd_config tegra194-mb1-bct-reset-p3668-0001-a00.cfg --dev_params tegra194-br-bct-qspi.cfg --bin "mb2_bootloader nvtboot_recovery_t194.bin; mts_preboot preboot_c10_prod_cr.bin; mts_mce mce_c10_prod_cr.bin; mts_proper mts_c10_prod_cr.bin; bpmp_fw bpmp_t194.bin; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00.dtb; spe_fw spe_t194.bin; tlk tos-trusty_t194.img; eks eks.img; kernel boot.img; kernel_dtb tegra194-p3668-all-p3509-0000.dtb; bootloader_dtb tegra194-p3668-all-p3509-0000.dtb" --key /mnt/keys//pkc.pem --encrypt_key /mnt/keys/sbk Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0080 ] Using default ramcode: 0 [ 0.0080 ] Disable BPMP dtb trim, using default dtb [ 0.0080 ] [ 0.0102 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0115 ] K[ 0.0116 ] ey size is 384 bytes [ 0.0119 ] Generating RCM messages [ 0.0138 ] tegrasign_v3.py --key /mnt/keys/sbk --file mb1_t194_prod.bin --offset 4096 [ 0.0143 ] Key is a SBK key [ 0.0325 ] Key Size is 16 bytes [ 0.0327 ] 246336 [ 0.0393 ] [ 0.0414 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod_encrypt.bin zerosbk [ 0.0420 ] Header already present for mb1_t194_prod_encrypt.bin [ 0.0445 ] [ 0.0465 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0477 ] Ke[ 0.0480 ] y size is 384 bytes [ 0.0500 ] tegrasign_v3.py --file mb1_t194_prod_encrypt_sigheader.bin --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem --length 1136 --offset 2960 --pubkeyhash pub_key.key [ 0.0512 ] K[ 0.0523 ] ey size is 384 bytes [ 0.0902 ] Saving pkc public key in pub_key.key [ 0.0902 ] Saving Montgomery values in montgomery.bin [ 0.0919 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin --updatesigheader mb1_t194_prod_encrypt_sigheader.bin mb1_t194_prod_encrypt_sigheader.sig oem-rsa [ 0.0947 ] [ 0.0965 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg sfuse.bin [ 0.0972 ] [ 0.0991 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0996 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0998 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0998 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0998 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0998 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0998 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0998 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0998 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0998 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0998 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0998 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0998 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0998 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0998 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0998 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0998 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0999 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0999 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0999 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0999 ] [ 0.1017 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_encrypt_sigheader.bin 0 0 [ 0.1023 ] RCM 0 is saved as rcm_0.rcm [ 0.1046 ] RCM 1 is saved as rcm_1.rcm [ 0.1046 ] RCM 2 is saved as rcm_2.rcm [ 0.1046 ] List of rcm files are saved in rcm_list.xml [ 0.1046 ] [ 0.1047 ] Signing RCM messages [ 0.1066 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem --list rcm_list.xml --pubkeyhash pub_key.key [ 0.1078 ] Ke[ 0.1089 ] y size is 384 bytes [ 0.2157 ] Saving pkc public key in pub_key.key [ 0.2157 ] Saving Montgomery values in montgomery.bin [ 0.2156 ] Copying signature to RCM mesages [ 0.2174 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 0.2184 ] [ 0.2185 ] Parsing partition layout [ 0.2204 ] tegraparser_v2 --pt flash.xml.tmp [ 0.2214 ] [ 0.2214 ] Creating list of images to be signed [ 0.2232 ] tegrahost_v2 --chip 0x19 --partitionlayout flash.xml.bin --list images_list.xml --ratchet_blob ratchet_blob.bin [ 0.2238 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.2243 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.2248 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.2275 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.2283 ] adding BCH for spe_t194.bin [ 0.2305 ] adding BCH for spe_t194.bin [ 0.2322 ] adding BCH for nvtboot_t194.bin [ 0.2339 ] adding BCH for nvtboot_t194.bin [ 0.2370 ] Header already present for preboot_c10_prod_cr.bin [ 0.2403 ] Header already present for preboot_c10_prod_cr.bin [ 0.2405 ] Header already present for mce_c10_prod_cr.bin [ 0.2409 ] Header already present for mce_c10_prod_cr.bin [ 0.2422 ] adding BCH for mts_c10_prod_cr.bin [ 0.2452 ] adding BCH for mts_c10_prod_cr.bin [ 0.3007 ] Header already present for warmboot_t194_prod.bin [ 0.3552 ] Header already present for warmboot_t194_prod.bin [ 0.3558 ] adding BCH for xusb_sil_rel_fw [ 0.3566 ] adding BCH for xusb_sil_rel_fw [ 0.3588 ] adding BCH for cboot_t194.bin [ 0.3613 ] adding BCH for cboot_t194.bin [ 0.3691 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb [ 0.3767 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb [ 0.3802 ] adding BCH for tos-trusty_t194.img [ 0.3836 ] adding BCH for tos-trusty_t194.img [ 0.3903 ] adding BCH for eks.img [ 0.3972 ] adding BCH for eks.img [ 0.3973 ] adding BCH for adsp-fw.bin [ 0.3975 ] adding BCH for adsp-fw.bin [ 0.3989 ] adding BCH for camera-rtcpu-rce.img [ 0.4005 ] adding BCH for camera-rtcpu-rce.img [ 0.4050 ] adding BCH for bpmp_t194.bin [ 0.4097 ] adding BCH for bpmp_t194.bin [ 0.4235 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 0.4373 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 0.4500 ] [ 0.4520 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list images_list.xml --pubkeyhash pub_key.key [ 0.4526 ] Key size is 384 bytes [ 0.5024 ] Saving pkc public key in pub_key.key [ 1.5817 ] [ 1.5818 ] Generating br-bct [ 1.5836 ] Performing cfg overlay [ 1.5836 ] ['tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg', 'tegra194-memcfg-sw-override.cfg'] [ 1.5840 ] sw_memcfg_overlay.pl -c tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg -s tegra194-memcfg-sw-override.cfg -o /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51.cfg [ 1.6101 ] [ 1.6102 ] Updating dev and MSS params in BR BCT [ 1.6102 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 1.6582 ] [ 1.6583 ] Updating bl info [ 1.6604 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 1.6646 ] [ 1.6673 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin [ 1.6679 ] [ 1.6680 ] header_magic: 4e564441 [ 1.6702 ] tegrasign_v3.py --key /mnt/keys/sbk --list mb1_t194_prod_sigheader.bin_list.xml [ 1.6704 ] Key is a SBK key [ 1.6704 ] Key Size is 16 bytes [ 1.6711 ] 246336 [ 1.6817 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt mb1_t194_prod_sigheader.bin.hash zerosbk [ 1.6847 ] [ 1.6866 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 1.6872 ] [ 1.6873 ] header_magic: 4e564441 [ 1.6895 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mb1_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.6908 ] K[ 1.6911 ] ey size is 384 bytes [ 1.7285 ] Saving pkc public key in pub_key.key [ 1.7303 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 1.7330 ] [ 1.7351 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin [ 1.7357 ] [ 1.7357 ] header_magic: 4e564441 [ 1.7379 ] tegrasign_v3.py --key /mnt/keys/sbk --list mb1_t194_prod_sigheader.bin_list.xml [ 1.7380 ] Key is a SBK key [ 1.7380 ] Key Size is 16 bytes [ 1.7386 ] 246336 [ 1.7488 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt mb1_t194_prod_sigheader.bin.hash zerosbk [ 1.7515 ] [ 1.7533 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 1.7539 ] [ 1.7540 ] header_magic: 4e564441 [ 1.7561 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mb1_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.7574 ] Ke[ 1.7576 ] y size is 384 bytes [ 1.7926 ] Saving pkc public key in pub_key.key [ 1.7944 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 1.7972 ] [ 1.7982 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin [ 1.7989 ] [ 1.7990 ] header_magic: 4e564441 [ 1.8011 ] tegrasign_v3.py --key /mnt/keys/sbk --list spe_t194_sigheader.bin_list.xml [ 1.8012 ] Key is a SBK key [ 1.8012 ] Key Size is 16 bytes [ 1.8015 ] 90864 [ 1.8083 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 1.8098 ] [ 1.8116 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin.encrypt [ 1.8123 ] [ 1.8124 ] header_magic: 4e564441 [ 1.8145 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list spe_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.8157 ] K[ 1.8160 ] ey size is 384 bytes [ 1.8505 ] Saving pkc public key in pub_key.key [ 1.8523 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt.signed spe_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 1.8538 ] [ 1.8559 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin [ 1.8565 ] [ 1.8566 ] header_magic: 4e564441 [ 1.8587 ] tegrasign_v3.py --key /mnt/keys/sbk --list spe_t194_sigheader.bin_list.xml [ 1.8588 ] Key is a SBK key [ 1.8588 ] Key Size is 16 bytes [ 1.8591 ] 90864 [ 1.8659 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 1.9077 ] [ 1.9109 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin.encrypt [ 1.9125 ] [ 1.9127 ] header_magic: 4e564441 [ 1.9162 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list spe_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 1.9194 ] K[ 1.9200 ] ey size is 384 bytes [ 1.9858 ] Saving pkc public key in pub_key.key [ 1.9875 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt.signed spe_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 1.9890 ] [ 1.9911 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin [ 1.9917 ] [ 1.9918 ] header_magic: 4e564441 [ 1.9939 ] tegrasign_v3.py --key /mnt/keys/sbk --list nvtboot_t194_sigheader.bin_list.xml [ 1.9940 ] Key is a SBK key [ 1.9940 ] Key Size is 16 bytes [ 1.9944 ] 177232 [ 2.0031 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt nvtboot_t194_sigheader.bin.hash zerosbk [ 2.0069 ] [ 2.0092 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin.encrypt [ 2.0099 ] [ 2.0100 ] header_magic: 4e564441 [ 2.0122 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list nvtboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.0135 ] K[ 2.0138 ] ey size is 384 bytes [ 2.0524 ] Saving pkc public key in pub_key.key [ 2.0542 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt.signed nvtboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.0564 ] [ 2.0586 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin [ 2.0591 ] [ 2.0592 ] header_magic: 4e564441 [ 2.0613 ] tegrasign_v3.py --key /mnt/keys/sbk --list nvtboot_t194_sigheader.bin_list.xml [ 2.0614 ] Key is a SBK key [ 2.0614 ] Key Size is 16 bytes [ 2.0619 ] 177232 [ 2.0705 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt nvtboot_t194_sigheader.bin.hash zerosbk [ 2.0727 ] [ 2.0746 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin.encrypt [ 2.0752 ] [ 2.0753 ] header_magic: 4e564441 [ 2.0774 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list nvtboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.0786 ] K[ 2.0789 ] ey size is 384 bytes [ 2.1155 ] Saving pkc public key in pub_key.key [ 2.1172 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt.signed nvtboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.1194 ] [ 2.1215 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin [ 2.1221 ] [ 2.1222 ] header_magic: 4e564441 [ 2.1243 ] tegrasign_v3.py --key /mnt/keys/sbk --list preboot_c10_prod_cr_sigheader.bin_list.xml [ 2.1245 ] Key is a SBK key [ 2.1245 ] Key Size is 16 bytes [ 2.1247 ] 19920 [ 2.1300 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.1308 ] [ 2.1327 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin.encrypt [ 2.1333 ] [ 2.1333 ] header_magic: 4e564441 [ 2.1355 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list preboot_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.1368 ] K[ 2.1370 ] ey size is 384 bytes [ 2.1716 ] Saving pkc public key in pub_key.key [ 2.1735 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt.signed preboot_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.1744 ] [ 2.1764 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin [ 2.1770 ] [ 2.1771 ] header_magic: 4e564441 [ 2.1792 ] tegrasign_v3.py --key /mnt/keys/sbk --list preboot_c10_prod_cr_sigheader.bin_list.xml [ 2.1793 ] Key is a SBK key [ 2.1793 ] Key Size is 16 bytes [ 2.1795 ] 19920 [ 2.1847 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.1855 ] [ 2.1874 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin.encrypt [ 2.1880 ] [ 2.1881 ] header_magic: 4e564441 [ 2.1903 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list preboot_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.1915 ] Ke[ 2.1918 ] y size is 384 bytes [ 2.2274 ] Saving pkc public key in pub_key.key [ 2.2292 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt.signed preboot_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.2300 ] [ 2.2320 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin [ 2.2326 ] [ 2.2327 ] header_magic: 4e564441 [ 2.2348 ] tegrasign_v3.py --key /mnt/keys/sbk --list mce_c10_prod_cr_sigheader.bin_list.xml [ 2.2349 ] Key is a SBK key [ 2.2349 ] Key Size is 16 bytes [ 2.2353 ] 139104 [ 2.2431 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.2450 ] [ 2.2469 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin.encrypt [ 2.2475 ] [ 2.2475 ] header_magic: 4e564441 [ 2.2497 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mce_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.2509 ] K[ 2.2511 ] ey size is 384 bytes [ 2.2874 ] Saving pkc public key in pub_key.key [ 2.2892 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt.signed mce_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.2910 ] [ 2.2932 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin [ 2.2938 ] [ 2.2939 ] header_magic: 4e564441 [ 2.2960 ] tegrasign_v3.py --key /mnt/keys/sbk --list mce_c10_prod_cr_sigheader.bin_list.xml [ 2.2961 ] Key is a SBK key [ 2.2961 ] Key Size is 16 bytes [ 2.2965 ] 139104 [ 2.3043 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.3062 ] [ 2.3081 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin.encrypt [ 2.3088 ] [ 2.3089 ] header_magic: 4e564441 [ 2.3111 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mce_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.3123 ] Ke[ 2.3126 ] y size is 384 bytes [ 2.3489 ] Saving pkc public key in pub_key.key [ 2.3507 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt.signed mce_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.3526 ] [ 2.3547 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin [ 2.3553 ] [ 2.3554 ] header_magic: 4e564441 [ 2.3574 ] tegrasign_v3.py --key /mnt/keys/sbk --list mts_c10_prod_cr_sigheader.bin_list.xml [ 2.3575 ] Key is a SBK key [ 2.3575 ] Key Size is 16 bytes [ 2.3625 ] 3426320 [ 2.4464 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.4767 ] [ 2.4789 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin.encrypt [ 2.4796 ] [ 2.4796 ] header_magic: 4e564441 [ 2.4819 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mts_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.4831 ] K[ 2.4834 ] ey size is 384 bytes [ 2.5214 ] Saving pkc public key in pub_key.key [ 2.5233 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt.signed mts_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.5530 ] [ 2.5579 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin [ 2.5586 ] [ 2.5587 ] header_magic: 4e564441 [ 2.5609 ] tegrasign_v3.py --key /mnt/keys/sbk --list mts_c10_prod_cr_sigheader.bin_list.xml [ 2.5610 ] Key is a SBK key [ 2.5610 ] Key Size is 16 bytes [ 2.5661 ] 3426320 [ 2.6507 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 2.6826 ] [ 2.6847 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin.encrypt [ 2.6854 ] [ 2.6855 ] header_magic: 4e564441 [ 2.6877 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mts_c10_prod_cr_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.6892 ] K[ 2.6894 ] ey size is 384 bytes [ 2.7286 ] Saving pkc public key in pub_key.key [ 2.7306 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt.signed mts_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.7603 ] [ 2.7651 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin [ 2.7658 ] [ 2.7659 ] header_magic: 4e564441 [ 2.7680 ] tegrasign_v3.py --key /mnt/keys/sbk --list warmboot_t194_prod_sigheader.bin_list.xml [ 2.7681 ] Key is a SBK key [ 2.7681 ] Key Size is 16 bytes [ 2.7685 ] 61408 [ 2.7750 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt warmboot_t194_prod_sigheader.bin.hash zerosbk [ 2.7763 ] [ 2.7783 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin.encrypt [ 2.7789 ] [ 2.7790 ] header_magic: 4e564441 [ 2.7812 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list warmboot_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.7824 ] Ke[ 2.7827 ] y size is 384 bytes [ 2.8175 ] Saving pkc public key in pub_key.key [ 2.8193 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt.signed warmboot_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.8206 ] [ 2.8226 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin [ 2.8232 ] [ 2.8233 ] header_magic: 4e564441 [ 2.8255 ] tegrasign_v3.py --key /mnt/keys/sbk --list warmboot_t194_prod_sigheader.bin_list.xml [ 2.8255 ] Key is a SBK key [ 2.8255 ] Key Size is 16 bytes [ 2.8259 ] 61408 [ 2.8323 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt warmboot_t194_prod_sigheader.bin.hash zerosbk [ 2.8342 ] [ 2.8366 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin.encrypt [ 2.8372 ] [ 2.8373 ] header_magic: 4e564441 [ 2.8395 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list warmboot_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 2.8408 ] K[ 2.8410 ] ey size is 384 bytes [ 2.8756 ] Saving pkc public key in pub_key.key [ 2.8774 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt.signed warmboot_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.8787 ] [ 2.8807 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader [ 2.8814 ] [ 2.8814 ] header_magic: 4e564441 [ 2.8836 ] tegrasign_v3.py --key /mnt/keys/sbk --list xusb_sil_rel_fw_sigheader_list.xml [ 2.8837 ] Key is a SBK key [ 2.8837 ] Key Size is 16 bytes [ 2.8840 ] 129024 [ 2.8919 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt xusb_sil_rel_fw_sigheader.hash zerosbk [ 2.8939 ] [ 2.8958 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader.encrypt [ 2.8965 ] [ 2.8966 ] header_magic: 4e564441 [ 2.8987 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list xusb_sil_rel_fw_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 2.9001 ] Ke[ 2.9004 ] y size is 384 bytes [ 2.9356 ] Saving pkc public key in pub_key.key [ 2.9374 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt.signed xusb_sil_rel_fw_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.9391 ] [ 2.9413 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader [ 2.9419 ] [ 2.9420 ] header_magic: 4e564441 [ 2.9441 ] tegrasign_v3.py --key /mnt/keys/sbk --list xusb_sil_rel_fw_sigheader_list.xml [ 2.9442 ] Key is a SBK key [ 2.9442 ] Key Size is 16 bytes [ 2.9446 ] 129024 [ 2.9523 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt xusb_sil_rel_fw_sigheader.hash zerosbk [ 2.9541 ] [ 2.9561 ] tegrahost_v2 --chip 0x19 --align xusb_sil_rel_fw_sigheader.encrypt [ 2.9567 ] [ 2.9568 ] header_magic: 4e564441 [ 2.9589 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list xusb_sil_rel_fw_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 2.9602 ] Ke[ 2.9606 ] y size is 384 bytes [ 2.9955 ] Saving pkc public key in pub_key.key [ 2.9974 ] tegrahost_v2 --chip 0x19 0 --updatesigheader xusb_sil_rel_fw_sigheader.encrypt.signed xusb_sil_rel_fw_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 2.9992 ] [ 3.0014 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin [ 3.0020 ] [ 3.0021 ] header_magic: 4e564441 [ 3.0043 ] tegrasign_v3.py --key /mnt/keys/sbk --list cboot_t194_sigheader.bin_list.xml [ 3.0043 ] Key is a SBK key [ 3.0044 ] Key Size is 16 bytes [ 3.0051 ] 466912 [ 3.0201 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt cboot_t194_sigheader.bin.hash zerosbk [ 3.0248 ] [ 3.0267 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin.encrypt [ 3.0273 ] [ 3.0274 ] header_magic: 4e564441 [ 3.0296 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list cboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 3.0309 ] K[ 3.0311 ] ey size is 384 bytes [ 3.0674 ] Saving pkc public key in pub_key.key [ 3.0692 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt.signed cboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.0738 ] [ 3.0764 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin [ 3.0770 ] [ 3.0771 ] header_magic: 4e564441 [ 3.0793 ] tegrasign_v3.py --key /mnt/keys/sbk --list cboot_t194_sigheader.bin_list.xml [ 3.0794 ] Key is a SBK key [ 3.0794 ] Key Size is 16 bytes [ 3.0801 ] 466912 [ 3.0951 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt cboot_t194_sigheader.bin.hash zerosbk [ 3.0998 ] [ 3.1017 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin.encrypt [ 3.1023 ] [ 3.1024 ] header_magic: 4e564441 [ 3.1046 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list cboot_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 3.1061 ] K[ 3.1063 ] ey size is 384 bytes [ 3.1470 ] Saving pkc public key in pub_key.key [ 3.1488 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt.signed cboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.1534 ] [ 3.1559 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb [ 3.1566 ] [ 3.1566 ] header_magic: 4e564441 [ 3.1588 ] tegrasign_v3.py --key /mnt/keys/sbk --list tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 3.1589 ] Key is a SBK key [ 3.1589 ] Key Size is 16 bytes [ 3.1594 ] 203248 [ 3.1687 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 3.1711 ] [ 3.1731 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 3.1737 ] [ 3.1738 ] header_magic: 4e564441 [ 3.1759 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 3.1773 ] K[ 3.1775 ] ey size is 384 bytes [ 3.2125 ] Saving pkc public key in pub_key.key [ 3.2143 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.2167 ] [ 3.2189 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb [ 3.2195 ] [ 3.2196 ] header_magic: 4e564441 [ 3.2218 ] tegrasign_v3.py --key /mnt/keys/sbk --list tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml [ 3.2219 ] Key is a SBK key [ 3.2219 ] Key Size is 16 bytes [ 3.2224 ] 203248 [ 3.2316 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk [ 3.2342 ] [ 3.2361 ] tegrahost_v2 --chip 0x19 --align tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt [ 3.2368 ] [ 3.2369 ] header_magic: 4e564441 [ 3.2391 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 3.2404 ] Key[ 3.2407 ] size is 384 bytes [ 3.2771 ] Saving pkc public key in pub_key.key [ 3.2789 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.2814 ] [ 3.2836 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img [ 3.2842 ] [ 3.2844 ] header_magic: 4e564441 [ 3.2864 ] tegrasign_v3.py --key /mnt/keys/sbk --list tos-trusty_t194_sigheader.img_list.xml [ 3.2865 ] Key is a SBK key [ 3.2865 ] Key Size is 16 bytes [ 3.2872 ] 406464 [ 3.3010 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 3.3051 ] [ 3.3071 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img.encrypt [ 3.3077 ] [ 3.3078 ] header_magic: 4e564441 [ 3.3100 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tos-trusty_t194_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 3.3113 ] K[ 3.3116 ] ey size is 384 bytes [ 3.3468 ] Saving pkc public key in pub_key.key [ 3.3485 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt.signed tos-trusty_t194_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.3527 ] [ 3.3551 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img [ 3.3557 ] [ 3.3558 ] header_magic: 4e564441 [ 3.3580 ] tegrasign_v3.py --key /mnt/keys/sbk --list tos-trusty_t194_sigheader.img_list.xml [ 3.3581 ] Key is a SBK key [ 3.3581 ] Key Size is 16 bytes [ 3.3588 ] 406464 [ 3.3725 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 3.3766 ] [ 3.3786 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img.encrypt [ 3.3792 ] [ 3.3793 ] header_magic: 4e564441 [ 3.3815 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tos-trusty_t194_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 3.3828 ] K[ 3.3830 ] ey size is 384 bytes [ 3.4181 ] Saving pkc public key in pub_key.key [ 3.4198 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt.signed tos-trusty_t194_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.4239 ] [ 3.4263 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img [ 3.4270 ] [ 3.4270 ] header_magic: 4e564441 [ 3.4292 ] tegrasign_v3.py --key /mnt/keys/sbk --list eks_sigheader.img_list.xml [ 3.4293 ] Key is a SBK key [ 3.4293 ] Key Size is 16 bytes [ 3.4295 ] 1040 [ 3.4347 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 3.4354 ] [ 3.4373 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img.encrypt [ 3.4380 ] [ 3.4381 ] header_magic: 4e564441 [ 3.4402 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list eks_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 3.4416 ] K[ 3.4418 ] ey size is 384 bytes [ 3.4768 ] Saving pkc public key in pub_key.key [ 3.4786 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt.signed eks_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.4794 ] [ 3.4815 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img [ 3.4822 ] [ 3.4823 ] header_magic: 4e564441 [ 3.4845 ] tegrasign_v3.py --key /mnt/keys/sbk --list eks_sigheader.img_list.xml [ 3.4846 ] Key is a SBK key [ 3.4846 ] Key Size is 16 bytes [ 3.4848 ] 1040 [ 3.4899 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 3.4924 ] [ 3.4943 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img.encrypt [ 3.4949 ] [ 3.4950 ] header_magic: 4e564441 [ 3.4971 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list eks_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 3.4984 ] K[ 3.4987 ] ey size is 384 bytes [ 3.5337 ] Saving pkc public key in pub_key.key [ 3.5354 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt.signed eks_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.5362 ] [ 3.5383 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin [ 3.5389 ] [ 3.5390 ] header_magic: 4e564441 [ 3.5412 ] tegrasign_v3.py --key /mnt/keys/sbk --list adsp-fw_sigheader.bin_list.xml [ 3.5412 ] Key is a SBK key [ 3.5412 ] Key Size is 16 bytes [ 3.5416 ] 77216 [ 3.5482 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt adsp-fw_sigheader.bin.hash zerosbk [ 3.5496 ] [ 3.5515 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin.encrypt [ 3.5521 ] [ 3.5523 ] header_magic: 4e564441 [ 3.5544 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list adsp-fw_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 3.5558 ] K[ 3.5560 ] ey size is 384 bytes [ 3.5924 ] Saving pkc public key in pub_key.key [ 3.5942 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.5955 ] [ 3.5977 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin [ 3.5984 ] [ 3.5985 ] header_magic: 4e564441 [ 3.6006 ] tegrasign_v3.py --key /mnt/keys/sbk --list adsp-fw_sigheader.bin_list.xml [ 3.6007 ] Key is a SBK key [ 3.6007 ] Key Size is 16 bytes [ 3.6011 ] 77216 [ 3.6079 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt adsp-fw_sigheader.bin.hash zerosbk [ 3.6094 ] [ 3.6113 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin.encrypt [ 3.6119 ] [ 3.6120 ] header_magic: 4e564441 [ 3.6143 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list adsp-fw_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 3.6157 ] K[ 3.6159 ] ey size is 384 bytes [ 3.6544 ] Saving pkc public key in pub_key.key [ 3.6562 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.6576 ] [ 3.6597 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img [ 3.6604 ] [ 3.6605 ] header_magic: 4e564441 [ 3.6626 ] tegrasign_v3.py --key /mnt/keys/sbk --list camera-rtcpu-rce_sigheader.img_list.xml [ 3.6627 ] Key is a SBK key [ 3.6627 ] Key Size is 16 bytes [ 3.6632 ] 267808 [ 3.6740 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt camera-rtcpu-rce_sigheader.img.hash zerosbk [ 3.6769 ] [ 3.6789 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img.encrypt [ 3.6795 ] [ 3.6796 ] header_magic: 4e564441 [ 3.6818 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list camera-rtcpu-rce_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 3.6831 ] K[ 3.6833 ] ey size is 384 bytes [ 3.7198 ] Saving pkc public key in pub_key.key [ 3.7216 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt.signed camera-rtcpu-rce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.7246 ] [ 3.7268 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img [ 3.7275 ] [ 3.7275 ] header_magic: 4e564441 [ 3.7297 ] tegrasign_v3.py --key /mnt/keys/sbk --list camera-rtcpu-rce_sigheader.img_list.xml [ 3.7298 ] Key is a SBK key [ 3.7298 ] Key Size is 16 bytes [ 3.7304 ] 267808 [ 3.7411 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt camera-rtcpu-rce_sigheader.img.hash zerosbk [ 3.7440 ] [ 3.7459 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img.encrypt [ 3.7466 ] [ 3.7467 ] header_magic: 4e564441 [ 3.7488 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list camera-rtcpu-rce_sigheader.img.encrypt_list.xml --pubkeyhash pub_key.key [ 3.7501 ] Ke[ 3.7504 ] y size is 384 bytes [ 3.7868 ] Saving pkc public key in pub_key.key [ 3.7885 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt.signed camera-rtcpu-rce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.7914 ] [ 3.7937 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin [ 3.7943 ] [ 3.7944 ] header_magic: 4e564441 [ 3.7966 ] tegrasign_v3.py --key /mnt/keys/sbk --list bpmp_t194_sigheader.bin_list.xml [ 3.7966 ] Key is a SBK key [ 3.7967 ] Key Size is 16 bytes [ 3.7978 ] 852256 [ 3.8227 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 3.8310 ] [ 3.8318 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin.encrypt [ 3.8326 ] [ 3.8327 ] header_magic: 4e564441 [ 3.8349 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list bpmp_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 3.8363 ] Ke[ 3.8366 ] y size is 384 bytes [ 3.8740 ] Saving pkc public key in pub_key.key [ 3.8759 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt.signed bpmp_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.8837 ] [ 3.8865 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin [ 3.8872 ] [ 3.8873 ] header_magic: 4e564441 [ 3.8895 ] tegrasign_v3.py --key /mnt/keys/sbk --list bpmp_t194_sigheader.bin_list.xml [ 3.8895 ] Key is a SBK key [ 3.8896 ] Key Size is 16 bytes [ 3.8907 ] 852256 [ 3.9143 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 3.9221 ] [ 3.9241 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin.encrypt [ 3.9248 ] [ 3.9248 ] header_magic: 4e564441 [ 3.9270 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list bpmp_t194_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 3.9283 ] Ke[ 3.9286 ] y size is 384 bytes [ 3.9657 ] Saving pkc public key in pub_key.key [ 3.9675 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt.signed bpmp_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 3.9753 ] [ 3.9781 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb [ 3.9787 ] [ 3.9788 ] header_magic: 4e564441 [ 3.9810 ] tegrasign_v3.py --key /mnt/keys/sbk --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml [ 3.9811 ] Key is a SBK key [ 3.9811 ] Key Size is 16 bytes [ 3.9817 ] 387312 [ 3.9950 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk [ 3.9990 ] [ 4.0010 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 4.0016 ] [ 4.0017 ] header_magic: 4e564441 [ 4.0038 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 4.0052 ] K[ 4.0054 ] ey size is 384 bytes [ 4.0403 ] Saving pkc public key in pub_key.key [ 4.0421 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.0461 ] [ 4.0484 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb [ 4.0490 ] [ 4.0491 ] header_magic: 4e564441 [ 4.0513 ] tegrasign_v3.py --key /mnt/keys/sbk --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml [ 4.0514 ] Key is a SBK key [ 4.0514 ] Key Size is 16 bytes [ 4.0520 ] 387312 [ 4.0652 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk [ 4.0692 ] [ 4.0712 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 4.0718 ] [ 4.0719 ] header_magic: 4e564441 [ 4.0742 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt_list.xml --pubkeyhash pub_key.key [ 4.0755 ] K[ 4.0757 ] ey size is 384 bytes [ 4.1107 ] Saving pkc public key in pub_key.key [ 4.1124 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.1164 ] [ 4.1206 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin [ 4.1213 ] [ 4.1214 ] header_magic: 50000ea [ 4.1236 ] tegrasign_v3.py --key /mnt/keys/sbk --list nvtboot_recovery_t194.bin_list.xml [ 4.1236 ] Key is a SBK key [ 4.1236 ] Key Size is 16 bytes [ 4.1240 ] 177056 [ 4.1327 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194.bin.encrypt nvtboot_recovery_t194.bin.hash zerosbk [ 4.1335 ] [ 4.1355 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin.encrypt [ 4.1361 ] [ 4.1362 ] header_magic: ac173d1e [ 4.1380 ] tegrahost_v2 --appendsigheader nvtboot_recovery_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MB2B --ratchet_blob ratchet_blob.bin [ 4.1386 ] adding BCH for nvtboot_recovery_t194.bin.encrypt [ 4.1417 ] [ 4.1439 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list nvtboot_recovery_t194.bin_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 4.1453 ] K[ 4.1456 ] ey size is 384 bytes [ 4.1822 ] Saving pkc public key in pub_key.key [ 4.1840 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194.bin_sigheader.encrypt.signed nvtboot_recovery_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.1863 ] [ 4.1882 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin [ 4.1889 ] [ 4.1890 ] header_magic: 9000014 [ 4.1912 ] tegrasign_v3.py --key /mnt/keys/sbk --list nvtboot_recovery_cpu_t194.bin_list.xml [ 4.1912 ] Key is a SBK key [ 4.1912 ] Key Size is 16 bytes [ 4.1917 ] 259968 [ 4.2021 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194.bin.encrypt nvtboot_recovery_cpu_t194.bin.hash zerosbk [ 4.2030 ] [ 4.2049 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin.encrypt [ 4.2055 ] [ 4.2056 ] header_magic: cb47d6e [ 4.2074 ] tegrahost_v2 --appendsigheader nvtboot_recovery_cpu_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid CPBL --ratchet_blob ratchet_blob.bin [ 4.2080 ] adding BCH for nvtboot_recovery_cpu_t194.bin.encrypt [ 4.2128 ] [ 4.2150 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list nvtboot_recovery_cpu_t194.bin_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 4.2164 ] Ke[ 4.2167 ] y size is 384 bytes [ 4.2539 ] Saving pkc public key in pub_key.key [ 4.2556 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.2585 ] [ 4.2586 ] Copying signed file in /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x [ 4.2592 ] Generating br-bct [ 4.2611 ] Performing cfg overlay [ 4.2611 ] ['/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51.cfg'] [ 4.2611 ] Updating dev and MSS params in BR BCT [ 4.2611 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 4.3070 ] [ 4.3070 ] Updating bl info [ 4.3089 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 4.3116 ] [ 4.3116 ] Generating br-bct [ 4.3140 ] Performing cfg overlay [ 4.3140 ] ['/home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51.cfg'] [ 4.3140 ] Updating dev and MSS params in BR BCT [ 4.3141 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 4.3597 ] [ 4.3597 ] Updating bl info [ 4.3618 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 4.3687 ] [ 4.3687 ] Updating smd info [ 4.3709 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 --updatesmdinfo flash.xml.bin [ 4.3731 ] [ 4.3731 ] Updating Odmdata [ 4.3755 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0xB8190000 [ 4.3806 ] [ 4.3807 ] Get encrypted section of bct [ 4.3830 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listencbct bct_list.xml [ 4.3839 ] [ 4.3839 ] Signing BCT [ 4.3858 ] Generating signatures with encryption [ 4.3876 ] tegrasign_v3.py --key /mnt/keys/sbk --offset 2328 --file br_bct_BR.bct [ 4.3883 ] Key is a SBK key [ 4.4036 ] Key Size is 16 bytes [ 4.4037 ] 560 [ 4.4080 ] [ 4.4081 ] Updating BCT with signature [ 4.4084 ] Get Signed section of bct [ 4.4105 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listbct bct_list.xml [ 4.4114 ] [ 4.4134 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list bct_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 4.4140 ] Key size is 384 bytes [ 4.4679 ] Saving pkc public key in pub_key.key [ 4.4706 ] Saving Montgomery values in montgomery.bin [ 4.4709 ] [ 4.4709 ] Updating BCT with signature [ 4.4730 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.4774 ] [ 4.4775 ] Generating coldboot mb1-bct [ 4.4796 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_cold_boot_bct.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51.cfg --misc tegra194-mb1-bct-misc-sd-l4t.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 4.4802 ] MB1-BCT version: 0x1 [ 4.4806 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg [ 4.4808 ] Added Platform Config 0 data with size :- 2240 [ 4.4821 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 4.4823 ] Added Platform Config 1 data with size :- 19640 [ 4.4957 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg [ 4.4958 ] Added Platform Config 2 data with size :- 24 [ 4.4960 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 4.4961 ] Added Platform Config 4 data with size :- 348 [ 4.4963 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 4.4964 ] Added Platform Config 3 data with size :- 92 [ 4.4965 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 4.4967 ] Added Platform Config 5 data with size :- 128 [ 4.4968 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 4.4970 ] Added Platform Config 7 data with size :- 392 [ 4.4976 ] [ 4.4976 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 4.4976 ] Added Platform Config 9 data with size :- 40 [ 4.4976 ] [ 4.4977 ] Updating mb1-bct with firmware information [ 4.4995 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 4.5001 ] MB1-BCT version: 0x1 [ 4.5031 ] [ 4.5032 ] Updating mb1-bct with storage information [ 4.5050 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 4.5056 ] MB1-BCT version: 0x1 [ 4.5074 ] [ 4.5074 ] Updating mb1-bct with ratchet information [ 4.5092 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 4.5099 ] MB1-BCT version: 0x1 [ 4.5100 ] FwIndex: 1, MinRatchetLevel: 0 [ 4.5102 ] FwIndex: 2, MinRatchetLevel: 0 [ 4.5103 ] FwIndex: 3, MinRatchetLevel: 0 [ 4.5105 ] FwIndex: 4, MinRatchetLevel: 0 [ 4.5107 ] FwIndex: 5, MinRatchetLevel: 0 [ 4.5109 ] FwIndex: 6, MinRatchetLevel: 0 [ 4.5109 ] FwIndex: 7, MinRatchetLevel: 0 [ 4.5109 ] FwIndex: 11, MinRatchetLevel: 0 [ 4.5109 ] FwIndex: 12, MinRatchetLevel: 0 [ 4.5109 ] FwIndex: 13, MinRatchetLevel: 0 [ 4.5109 ] FwIndex: 14, MinRatchetLevel: 0 [ 4.5109 ] FwIndex: 15, MinRatchetLevel: 0 [ 4.5109 ] FwIndex: 16, MinRatchetLevel: 0 [ 4.5109 ] FwIndex: 17, MinRatchetLevel: 0 [ 4.5109 ] FwIndex: 18, MinRatchetLevel: 0 [ 4.5109 ] FwIndex: 19, MinRatchetLevel: 0 [ 4.5109 ] FwIndex: 30, MinRatchetLevel: 0 [ 4.5109 ] FwIndex: 31, MinRatchetLevel: 0 [ 4.5109 ] FwIndex: 32, MinRatchetLevel: 0 [ 4.5109 ] [ 4.5127 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct [ 4.5134 ] [ 4.5135 ] header_magic: c0650000 [ 4.5157 ] tegrasign_v3.py --key /mnt/keys/sbk --list mb1_cold_boot_bct_MB1.bct_list.xml [ 4.5158 ] Key is a SBK key [ 4.5158 ] Key Size is 16 bytes [ 4.5161 ] 26048 [ 4.5219 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1.bct.encrypt mb1_cold_boot_bct_MB1.bct.hash zerosbk [ 4.5226 ] [ 4.5245 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct.encrypt [ 4.5252 ] [ 4.5253 ] header_magic: 480c46cd [ 4.5271 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin [ 4.5278 ] adding BCH for mb1_cold_boot_bct_MB1.bct.encrypt [ 4.5284 ] [ 4.5306 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mb1_cold_boot_bct_MB1.bct_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 4.5320 ] Ke[ 4.5323 ] y size is 384 bytes [ 4.5723 ] Saving pkc public key in pub_key.key [ 4.5745 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.5859 ] [ 4.5860 ] Generating recovery mb1-bct [ 4.5886 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_bct.cfg --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51.cfg --misc tegra194-mb1-bct-misc-flash.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 4.5893 ] MB1-BCT version: 0x1 [ 4.5896 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg [ 4.5899 ] Added Platform Config 0 data with size :- 2240 [ 4.5910 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 4.5913 ] Added Platform Config 1 data with size :- 19640 [ 4.6047 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg [ 4.6050 ] Added Platform Config 2 data with size :- 24 [ 4.6051 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 4.6053 ] Added Platform Config 4 data with size :- 348 [ 4.6055 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 4.6057 ] Added Platform Config 3 data with size :- 92 [ 4.6059 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 4.6061 ] Added Platform Config 5 data with size :- 128 [ 4.6063 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 4.6065 ] Added Platform Config 7 data with size :- 392 [ 4.6068 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 4.6069 ] Added Platform Config 9 data with size :- 40 [ 4.6069 ] [ 4.6069 ] Updating mb1-bct with firmware information [ 4.6087 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin [ 4.6093 ] MB1-BCT version: 0x1 [ 4.6114 ] [ 4.6114 ] Updating mb1-bct with storage information [ 4.6132 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 4.6139 ] MB1-BCT version: 0x1 [ 4.6151 ] [ 4.6151 ] Updating mb1-bct with ratchet information [ 4.6170 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 4.6176 ] MB1-BCT version: 0x1 [ 4.6177 ] FwIndex: 1, MinRatchetLevel: 0 [ 4.6179 ] FwIndex: 2, MinRatchetLevel: 0 [ 4.6181 ] FwIndex: 3, MinRatchetLevel: 0 [ 4.6182 ] FwIndex: 4, MinRatchetLevel: 0 [ 4.6184 ] FwIndex: 5, MinRatchetLevel: 0 [ 4.6185 ] FwIndex: 6, MinRatchetLevel: 0 [ 4.6186 ] FwIndex: 7, MinRatchetLevel: 0 [ 4.6186 ] FwIndex: 11, MinRatchetLevel: 0 [ 4.6187 ] FwIndex: 12, MinRatchetLevel: 0 [ 4.6188 ] FwIndex: 13, MinRatchetLevel: 0 [ 4.6189 ] FwIndex: 14, MinRatchetLevel: 0 [ 4.6190 ] FwIndex: 15, MinRatchetLevel: 0 [ 4.6191 ] FwIndex: 16, MinRatchetLevel: 0 [ 4.6191 ] FwIndex: 17, MinRatchetLevel: 0 [ 4.6192 ] FwIndex: 18, MinRatchetLevel: 0 [ 4.6193 ] FwIndex: 19, MinRatchetLevel: 0 [ 4.6194 ] FwIndex: 30, MinRatchetLevel: 0 [ 4.6195 ] FwIndex: 31, MinRatchetLevel: 0 [ 4.6196 ] FwIndex: 32, MinRatchetLevel: 0 [ 4.6209 ] [ 4.6228 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct [ 4.6234 ] [ 4.6235 ] header_magic: c0650000 [ 4.6258 ] tegrasign_v3.py --key /mnt/keys/sbk --list mb1_bct_MB1.bct_list.xml [ 4.6259 ] Key is a SBK key [ 4.6259 ] Key Size is 16 bytes [ 4.6262 ] 26048 [ 4.6320 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1.bct.encrypt mb1_bct_MB1.bct.hash zerosbk [ 4.6328 ] [ 4.6348 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct.encrypt [ 4.6355 ] [ 4.6356 ] header_magic: 480c46cd [ 4.6374 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin [ 4.6380 ] adding BCH for mb1_bct_MB1.bct.encrypt [ 4.6387 ] [ 4.6409 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mb1_bct_MB1.bct_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 4.6424 ] K[ 4.6426 ] ey size is 384 bytes [ 4.6787 ] Saving pkc public key in pub_key.key [ 4.6804 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1.bct_sigheader.encrypt.signed mb1_bct_MB1.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.6814 ] [ 4.6815 ] Generating coldboot mem-bct [ 4.6834 ] tegrabct_v2 --chip 0x19 0 --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51.cfg --membct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_1.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_2.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_3.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_4.bct [ 4.6840 ] Packing sdram param for instance[0] [ 4.7292 ] Packing sdram param for instance[1] [ 4.7293 ] Packing sdram param for instance[2] [ 4.7294 ] Packing sdram param for instance[3] [ 4.7295 ] Packing sdram param for instance[4] [ 4.7296 ] Packing sdram param for instance[5] [ 4.7296 ] Packing sdram param for instance[6] [ 4.7296 ] Packing sdram param for instance[7] [ 4.7296 ] Packing sdram param for instance[8] [ 4.7296 ] Packing sdram param for instance[9] [ 4.7296 ] Packing sdram param for instance[10] [ 4.7296 ] Packing sdram param for instance[11] [ 4.7296 ] Packing sdram param for instance[12] [ 4.7296 ] Packing sdram param for instance[13] [ 4.7296 ] Packing sdram param for instance[14] [ 4.7296 ] Packing sdram param for instance[15] [ 4.7296 ] [ 4.7296 ] Getting sector size from pt [ 4.7314 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin [ 4.7324 ] [ 4.7325 ] BlockSize read from layout is 200 [ 4.7343 ] tegrasign_v3.py --key /mnt/keys/sbk --file /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_1.bct [ 4.7349 ] Key is a SBK key [ 4.7499 ] Key Size is 16 bytes [ 4.7500 ] 48352 [ 4.7545 ] [ 4.7566 ] tegrasign_v3.py --key /mnt/keys/sbk --file /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_2.bct [ 4.7572 ] Key is a SBK key [ 4.7722 ] Key Size is 16 bytes [ 4.7723 ] 48352 [ 4.7770 ] [ 4.7792 ] tegrasign_v3.py --key /mnt/keys/sbk --file /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_3.bct [ 4.7798 ] Key is a SBK key [ 4.7956 ] Key Size is 16 bytes [ 4.7957 ] 48352 [ 4.8006 ] [ 4.8029 ] tegrasign_v3.py --key /mnt/keys/sbk --file /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_4.bct [ 4.8035 ] Key is a SBK key [ 4.8193 ] Key Size is 16 bytes [ 4.8193 ] 48352 [ 4.8241 ] [ 4.8264 ] tegrahost_v2 --chip 0x19 0 --blocksize 512 --magicid MEMB --addsigheader_multi /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_1_encrypt.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_2_encrypt.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_3_encrypt.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_4_encrypt.bct [ 4.8270 ] adding BCH for /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_1_encrypt.bct [ 4.8290 ] [ 4.8308 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 4.8314 ] [ 4.8315 ] header_magic: 4e564441 [ 4.8338 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mem_coldboot.bct_list.xml --pubkeyhash pub_key.key [ 4.8352 ] K[ 4.8355 ] ey size is 384 bytes [ 4.8744 ] Saving pkc public key in pub_key.key [ 4.8763 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_coldboot.bct.signed mem_coldboot.bct.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 4.8772 ] [ 4.8791 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 4.8798 ] [ 4.8817 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin --appendsigheader mem_coldboot.bct oem-rsa [ 4.8823 ] Header already present for mem_coldboot.bct [ 4.8826 ] [ 4.8847 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem --list mem_coldboot_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 4.8860 ] K[ 4.8870 ] ey size is 384 bytes [ 4.9232 ] Saving pkc public key in pub_key.key [ 4.9232 ] Saving Montgomery values in montgomery.bin [ 4.9250 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin --updatesigheader mem_coldboot_sigheader.bct.signed mem_coldboot_sigheader.bct.sig oem-rsa [ 4.9259 ] [ 4.9260 ] Generating recovery mem-bct [ 4.9279 ] tegrabct_v2 --chip 0x19 0 --sdram /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51.cfg --membct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_1.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_2.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_3.bct /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/13161/tmpzyklh5b51_4.bct [ 4.9285 ] Packing sdram param for instance[0] [ 4.9736 ] Packing sdram param for instance[1] [ 4.9738 ] Packing sdram param for instance[2] [ 4.9739 ] Packing sdram param for instance[3] [ 4.9741 ] Packing sdram param for instance[4] [ 4.9741 ] Packing sdram param for instance[5] [ 4.9741 ] Packing sdram param for instance[6] [ 4.9741 ] Packing sdram param for instance[7] [ 4.9741 ] Packing sdram param for instance[8] [ 4.9741 ] Packing sdram param for instance[9] [ 4.9741 ] Packing sdram param for instance[10] [ 4.9741 ] Packing sdram param for instance[11] [ 4.9741 ] Packing sdram param for instance[12] [ 4.9741 ] Packing sdram param for instance[13] [ 4.9741 ] Packing sdram param for instance[14] [ 4.9741 ] Packing sdram param for instance[15] [ 4.9741 ] [ 4.9763 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct [ 4.9770 ] [ 4.9771 ] header_magic: 3000000 [ 4.9792 ] tegrasign_v3.py --key /mnt/keys/sbk --list mem_rcm.bct_list.xml [ 4.9793 ] Key is a SBK key [ 4.9793 ] Key Size is 16 bytes [ 4.9796 ] 48352 [ 4.9856 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm.bct.encrypt mem_rcm.bct.hash zerosbk [ 4.9863 ] [ 4.9883 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct.encrypt [ 4.9889 ] [ 4.9890 ] header_magic: 8de37d0f [ 4.9908 ] tegrahost_v2 --appendsigheader mem_rcm.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin [ 4.9914 ] adding BCH for mem_rcm.bct.encrypt [ 4.9925 ] [ 4.9946 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mem_rcm.bct_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 4.9958 ] Ke[ 4.9961 ] y size is 384 bytes [ 5.0311 ] Saving pkc public key in pub_key.key [ 5.0329 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm.bct_sigheader.encrypt.signed mem_rcm.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 5.0340 ] [ 5.0347 ] nvtboot_recovery_t194.bin_sigheader.encrypt.signed [ 5.0349 ] preboot_c10_prod_cr.bin [ 5.0350 ] mce_c10_prod_cr.bin [ 5.0351 ] mts_c10_prod_cr.bin [ 5.0379 ] bpmp_t194.bin [ 5.0385 ] tegra194-a02-bpmp-p3668-a00.dtb [ 5.0389 ] spe_t194.bin [ 5.0390 ] tos-trusty_t194.img [ 5.0393 ] eks.img [ 5.0394 ] boot.img [ 5.1521 ] tegra194-p3668-all-p3509-0000.dtb [ 5.1531 ] tegra194-p3668-all-p3509-0000.dtb [ 5.1591 ] nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed [ 5.1659 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 5.1691 ] [ 5.1695 ] header_magic: 4e564441 [ 5.1749 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list mb1_t194_prod_sigheader.bin.encrypt_list.xml --pubkeyhash pub_key.key [ 5.1803 ] K[ 5.1813 ] ey size is 384 bytes [ 5.2492 ] Saving pkc public key in pub_key.key [ 5.2510 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 5.2538 ] [ 5.2560 ] tegraparser_v2 --generategpt --pt flash.xml.bin [ 5.2569 ] [ 5.2608 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/encrypted_signed_t19x/flash.xml.tmp flash.idx [ 5.3562 ] /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /mnt/keys//pkc.pem --encrypt_key /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/.zero_.key --minratchet_config tegra194-mb1-bct-ratchet-p3668.cfg --cmd sign xusb_sil_rel_fw xusb_fw Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0005 ] Generating signature [ 0.0027 ] tegrasign_v3.py --getmode mode.txt --key /mnt/keys/pkc.pem [ 0.0042 ] K[ 0.0044 ] ey size is 384 bytes [ 0.0067 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key /mnt/keys/pkc.pem [ 0.0079 ] K[ 0.0090 ] ey size is 384 bytes [ 0.0091 ] Saving Montgomery values in montgomery.bin [ 0.0090 ] Generating ratchet blob [ 0.0109 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p3668.cfg [ 0.0114 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0116 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0117 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0117 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0117 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0117 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0117 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0117 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0117 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0117 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0117 ] [ 0.0118 ] header_magic: 5b0000 [ 0.0119 ] Encrypting file [ 0.0136 ] tegrahost_v2 --chip 0x19 --align 1_xusb_sil_rel_fw [ 0.0142 ] [ 0.0143 ] header_magic: 5b0000 [ 0.0168 ] tegrasign_v3.py --key /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/.zero_.key --list 1_xusb_sil_rel_fw_list.xml [ 0.0168 ] Key is a SBK key [ 0.0168 ] Key Size is 16 bytes [ 0.0219 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_xusb_sil_rel_fw.encrypt 1_xusb_sil_rel_fw.hash zerosbk [ 0.0227 ] [ 0.0247 ] tegrahost_v2 --chip 0x19 --align 1_xusb_sil_rel_fw.encrypt [ 0.0253 ] [ 0.0254 ] header_magic: 5b0000 [ 0.0271 ] tegrahost_v2 --appendsigheader 1_xusb_sil_rel_fw.encrypt oem-rsa-sbk --chip 0x19 0 --magicid XUSB --ratchet_blob ratchet_blob.bin [ 0.0277 ] adding BCH for 1_xusb_sil_rel_fw.encrypt [ 0.0302 ] [ 0.0323 ] tegrasign_v3.py --key /mnt/keys/pkc.pem --list 1_xusb_sil_rel_fw_sigheader.encrypt_list.xml --pubkeyhash pub_key.key [ 0.0336 ] Ke[ 0.0338 ] y size is 384 bytes [ 0.0686 ] Saving pkc public key in pub_key.key [ 0.0704 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_xusb_sil_rel_fw_sigheader.encrypt.signed 1_xusb_sil_rel_fw_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin [ 0.0722 ] [ 0.0726 ] Signed and encrypted file: /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/xusb_sil_rel_fw_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for xusb_sil_rel_fw_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x1f800 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for xusb_sil_rel_fw_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/bootloader/temp_user_dir/xusb_sil_rel_fw_sigheader.encrypt.signed done. ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed --bct br_bct_BR.bct --securedev --applet rcm_2_signed.rcm --applet_softfuse rcm_1_signed.rcm --cmd "rcmboot" --cfg secureflash.xml --chip 0x19 --mb1_bct mb1_bct_MB1.bct_sigheader.encrypt.signed --mem_bct mem_rcm.bct_sigheader.encrypt.signed --mb1_cold_boot_bct mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed --mem_bct_cold_boot mem_coldboot_sigheader.bct.signed --bins "mb2_bootloader nvtboot_recovery_t194.bin_sigheader.encrypt.signed; mts_preboot preboot_c10_prod_cr_sigheader.bin.encrypt.signed; mts_mce mce_c10_prod_cr_sigheader.bin.encrypt.signed; mts_proper mts_c10_prod_cr_sigheader.bin.encrypt.signed; bpmp_fw bpmp_t194_sigheader.bin.encrypt.signed; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed; spe_fw spe_t194_sigheader.bin.encrypt.signed; tlk tos-trusty_t194_sigheader.img.encrypt.signed; eks eks_sigheader.img.encrypt.signed; kernel boot.img; kernel_dtb kernel_tegra194-p3668-all-p3509-0000.dtb; bootloader_dtb tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt.signed" --skipuid saving flash command in flashcmd.txt *** no-flash flag enabled. Exiting now... *** User can run above saved command in factory environment without providing pkc and sbk keys to flash a device Example: $ cd bootloader $ sudo bash ./flashcmd.txt Save initrd flashing command parameters to /home/jhempsey/workspace/d4t/work/Linux_for_Tegra/tools/kernel_flash/initrdflashparam.txt /tmp/tmp.PMXYDmwQwn ~/workspace/d4t/work/Linux_for_Tegra writing boot image config in bootimg.cfg extracting kernel in zImage extracting ramdisk in initrd.img /tmp/tmp.PMXYDmwQwn/initrd /tmp/tmp.PMXYDmwQwn ~/workspace/d4t/work/Linux_for_Tegra 111519 blocks 126889 blocks /tmp/tmp.PMXYDmwQwn ~/workspace/d4t/work/Linux_for_Tegra flashimg0=boot0.img ~/workspace/d4t/work/Linux_for_Tegra Success Cleaning up... + echo 'Finish generating flash package.' Finish generating flash package. + '[' 1 = 1 ']' + echo 'Put device in recovery mode, run with option --flash-only to flash device.' Put device in recovery mode, run with option --flash-only to flash device. + exit 0 + cleanup + remove_udev_rules + rm -f /etc/udev/rules.d/99-l4t-host.rules + rm -f /etc/udev/rules.d/10-l4t-usb-msd.rules + clean_up_network_flash + '[' -n '' ']'