PATH/Linux_for_Tegra/bootloader/tegraflash_internal.py:1987: SyntaxWarning: "is not" with a literal. Did you mean "!="? if sig_type is not "zerosbk": /PATH/Linux_for_Tegra/bootloader/tegraflash_internal.py:1990: SyntaxWarning: "is" with a literal. Did you mean "=="? if sig_type is "oem-rsa": /PATH/Linux_for_Tegra/bootloader/tegraflash_internal.py:2425: SyntaxWarning: "is not" with a literal. Did you mean "!="? while count is not 0 and not check_ismb2(): /PATH/Linux_for_Tegra/bootloader/tegraflash_internal.py:2434: SyntaxWarning: "is not" with a literal. Did you mean "!="? while count is not 0: Python version 3.8.10 (default, Jun 2 2021, 10:49:15) [GCC 9.4.0] Version info. sys.version_info(major=3, minor=8, micro=10, releaselevel='final', serial=0) Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0054 ] Burning fuses [ 0.0054 ] Generating RCM messages [ 0.0063 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0 [ 0.0069 ] RCM 0 is saved as rcm_0.rcm [ 0.0073 ] RCM 1 is saved as rcm_1.rcm [ 0.0073 ] List of rcm files are saved in rcm_list.xml [ 0.0073 ] [ 0.0074 ] Signing RCM messages [ 0.0081 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0087 ] Assuming zero filled SBK key [ 0.0111 ] [ 0.0112 ] Copying signature to RCM mesages [ 0.0119 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml [ 0.0128 ] [ 0.0128 ] Boot Rom communication [ 0.0135 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml [ 0.0142 ] BR_CID: 0x81801001645966470000000013040080 [ 0.0868 ] RCM version 0X180001 [ 0.2070 ] Boot Rom communication completed [ 1.2136 ] [ 2.2181 ] tegrarcm_v2 --isapplet [ 2.2211 ] Applet version 01.00.0000 [ 2.4187 ] [ 2.4246 ] Parsing fuse info as per xml file [ 2.4274 ] tegraparser_v2 --fuse_info odmfuse_pkc.xml blow_fuse_data.bin [ 2.4300 ] MagicId=0x45535546 version=0x1 [ 2.4306 ] node: name=SecureBootKey size=16 [ 2.4307 ] value=0x4b05be0a056a173d10b9480fa090d7c8 [ 2.4307 ] node: name=Kek2 size=16 [ 2.4307 ] value=8954b92a12c33c472fd0dbdb487cfc9f [ 2.4307 ] node: name=PublicKeyHash size=32 [ 2.4307 ] value=0x0b8b230a7751d4624a3838245e64fca3e6e024c01f9155c9f50ef7eb158c7304 [ 2.4308 ] node: name=BootSecurityInfo size=4 [ 2.4308 ] value=0x6 [ 2.4308 ] node: name=SecurityMode size=4 [ 2.4308 ] value=0x1 [ 2.4308 ] [ 2.4339 ] tegrarcm_v2 --oem burnfuses blow_fuse_data.bin [ 2.4372 ] Applet version 01.00.0000 [ 2.5369 ] 0000000000000001: Oem commands are not supported [ 2.5380 ] Fuse burning failed [ 2.5380 ] [ 2.5380 ] trying fusing with CPU binary [ 2.5395 ] tegrasign_v2 --key None --getmode mode.txt [ 2.5401 ] Assuming zero filled SBK key [ 2.5402 ] [ 2.5403 ] Parsing partition layout [ 2.5410 ] tegraparser_v2 --pt flash.xml.tmp [ 2.5420 ] [ 2.5420 ] Creating list of images to be signed [ 2.5427 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk [ 2.5585 ] [ 2.5586 ] Generating signatures [ 2.5595 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key [ 2.5601 ] Assuming zero filled SBK key [ 2.7514 ] [ 2.7514 ] Generating br-bct [ 2.7523 ] Updating dev and MSS params in BR BCT [ 2.7524 ] tegrabct_v2 --dev_param emmc.cfg --sdram P3489_Sku888_4GB_Hynix_4GB_lpddr4_204Mhz_P138_A02_l4t.cfg --brbct br_bct.cfg --chip 0x18 0 [ 2.7582 ] [ 2.7582 ] Updating bl info [ 2.7589 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 2.7603 ] [ 2.7603 ] Updating smd info [ 2.7610 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin [ 2.7619 ] [ 2.7620 ] Updating Odmdata [ 2.7626 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x1090000 [ 2.7636 ] [ 2.7637 ] Get Signed section of bct [ 2.7645 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml [ 2.7654 ] [ 2.7661 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key [ 2.7667 ] Assuming zero filled SBK key [ 2.7669 ] [ 2.7670 ] Updating BCT with signature [ 2.7676 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml [ 2.7685 ] [ 2.7685 ] Generating coldboot mb1-bct [ 2.7692 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram P3489_Sku888_4GB_Hynix_4GB_lpddr4_204Mhz_P138_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg --pmc tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg --pmic tegra186-mb1-bct-pmic-lightning-p3489-1000-a00.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg --prod tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg [ 2.7698 ] MB1-BCT version: 0xf [ 2.7699 ] Copying Sdram info from 2 to 3 set [ 2.7749 ] Copying Sdram info from 3 to 0 set [ 2.7750 ] Copying Sdram info from 0 to 1 set [ 2.7751 ] Packing sdram param for instance[0] [ 2.7752 ] Packing sdram param for instance[1] [ 2.7754 ] Packing sdram param for instance[2] [ 2.7755 ] Packing sdram param for instance[3] [ 2.7756 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg [ 2.7760 ] Appending platform config data of size :- 2952 [ 2.7761 ] Parsing config file :mobile_scr.cfg [ 2.7763 ] Appending platform config data of size :- 12240 [ 2.7772 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg [ 2.7775 ] Appending platform config data of size :- 24 [ 2.7777 ] Parsing config file :tegra186-mb1-bct-pmic-lightning-p3489-1000-a00.cfg [ 2.7779 ] Appending platform config data of size :- 744 [ 2.7780 ] [ 2.7780 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg [ 2.7780 ] Appending platform config data of size :- 64 [ 2.7780 ] [ 2.7780 ] Parsing config file :tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg [ 2.7780 ] Appending platform config data of size :- 2132 [ 2.7780 ] [ 2.7780 ] Updating mb1-bct with firmware information [ 2.7787 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 2.7793 ] MB1-BCT version: 0xf [ 2.7797 ] [ 2.7798 ] Updating mb1-bct with storage information [ 2.7805 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 2.7812 ] MB1-BCT version: 0xf [ 2.7817 ] [ 2.7825 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct [ 2.7832 ] [ 2.7840 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk [ 2.7851 ] [ 2.7861 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 2.7867 ] Assuming zero filled SBK key [ 2.7879 ] [ 2.7886 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk [ 2.7894 ] [ 2.7894 ] Generating recovery mb1-bct [ 2.7902 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram P3489_Sku888_4GB_Hynix_4GB_lpddr4_204Mhz_P138_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg --pmc tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg --pmic tegra186-mb1-bct-pmic-lightning-p3489-1000-a00.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg --prod tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg [ 2.7908 ] MB1-BCT version: 0xf [ 2.7909 ] Copying Sdram info from 2 to 3 set [ 2.7958 ] Copying Sdram info from 3 to 0 set [ 2.7960 ] Copying Sdram info from 0 to 1 set [ 2.7961 ] Packing sdram param for instance[0] [ 2.7962 ] Packing sdram param for instance[1] [ 2.7964 ] Packing sdram param for instance[2] [ 2.7965 ] Packing sdram param for instance[3] [ 2.7966 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg [ 2.7968 ] Appending platform config data of size :- 2952 [ 2.7970 ] Parsing config file :minimal_scr.cfg [ 2.7972 ] Appending platform config data of size :- 12240 [ 2.7982 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg [ 2.7985 ] Appending platform config data of size :- 24 [ 2.7986 ] Parsing config file :tegra186-mb1-bct-pmic-lightning-p3489-1000-a00.cfg [ 2.7987 ] Appending platform config data of size :- 744 [ 2.7987 ] [ 2.7987 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg [ 2.7987 ] Appending platform config data of size :- 64 [ 2.7987 ] [ 2.7987 ] Parsing config file :tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg [ 2.7987 ] Appending platform config data of size :- 2132 [ 2.7987 ] [ 2.7988 ] Updating mb1-bct with firmware information [ 2.7995 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin [ 2.8001 ] MB1-BCT version: 0xf [ 2.8005 ] [ 2.8006 ] Updating mb1-bct with storage information [ 2.8013 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 2.8019 ] MB1-BCT version: 0xf [ 2.8023 ] [ 2.8029 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct [ 2.8035 ] [ 2.8042 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk [ 2.8048 ] [ 2.8057 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 2.8063 ] Assuming zero filled SBK key [ 2.8074 ] [ 2.8081 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk [ 2.8088 ] [ 2.8089 ] Copying signatures [ 2.8096 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml [ 2.8277 ] [ 2.8277 ] Sending BCTs [ 2.8287 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt [ 2.8293 ] Applet version 01.00.0000 [ 3.0835 ] Sending bct_bootrom [ 3.0836 ] [................................................] 100% [ 3.0849 ] Sending bct_mb1 [ 3.0861 ] [................................................] 100% [ 3.1057 ] [ 3.1058 ] Generating blob [ 3.1067 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin [ 3.1074 ] [ 3.1081 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk [ 3.1091 ] [ 3.1099 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 3.1106 ] Assuming zero filled SBK key [ 3.1150 ] [ 3.1158 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk [ 3.1168 ] [ 3.1176 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin [ 3.1183 ] [ 3.1189 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk [ 3.1197 ] [ 3.1205 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 3.1211 ] Assuming zero filled SBK key [ 3.1230 ] [ 3.1238 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk [ 3.1246 ] [ 3.1254 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin [ 3.1260 ] [ 3.1267 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk [ 3.1274 ] [ 3.1282 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 3.1287 ] Assuming zero filled SBK key [ 3.1302 ] [ 3.1310 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk [ 3.1318 ] [ 3.1325 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin [ 3.1332 ] [ 3.1338 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk [ 3.1370 ] [ 3.1380 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 3.1386 ] Assuming zero filled SBK key [ 3.1784 ] [ 3.1794 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk [ 3.1822 ] [ 3.1831 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-quill-p3489-0888-a00-00-base.dtb [ 3.1838 ] [ 3.1845 ] tegrahost_v2 --appendsigheader blob_tegra186-quill-p3489-0888-a00-00-base.dtb zerosbk [ 3.1856 ] [ 3.1864 ] tegrasign_v2 --key None --list blob_tegra186-quill-p3489-0888-a00-00-base_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 3.1870 ] Assuming zero filled SBK key [ 3.1943 ] [ 3.1951 ] tegrahost_v2 --updatesigheader blob_tegra186-quill-p3489-0888-a00-00-base_sigheader.dtb.encrypt blob_tegra186-quill-p3489-0888-a00-00-base_sigheader.dtb.hash zerosbk [ 3.1962 ] [ 3.1970 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin [ 3.1977 ] [ 3.1985 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk [ 3.2002 ] [ 3.2012 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 3.2018 ] Assuming zero filled SBK key [ 3.2127 ] [ 3.2136 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk [ 3.2148 ] [ 3.2156 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-a02-bpmp-lightning-p3489-a00-00-te770m.dtb [ 3.2162 ] [ 3.2168 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-lightning-p3489-a00-00-te770m.dtb zerosbk [ 3.2179 ] [ 3.2187 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-lightning-p3489-a00-00-te770m_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 3.2193 ] Assuming zero filled SBK key [ 3.2256 ] [ 3.2264 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-lightning-p3489-a00-00-te770m_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-lightning-p3489-a00-00-te770m_sigheader.dtb.hash zerosbk [ 3.2274 ] [ 3.2282 ] tegrahost_v2 --chip 0x18 --align blob_tos-trusty.img [ 3.2288 ] [ 3.2294 ] tegrahost_v2 --appendsigheader blob_tos-trusty.img zerosbk [ 3.2306 ] [ 3.2314 ] tegrasign_v2 --key None --list blob_tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key [ 3.2319 ] Assuming zero filled SBK key [ 3.2396 ] [ 3.2406 ] tegrahost_v2 --updatesigheader blob_tos-trusty_sigheader.img.encrypt blob_tos-trusty_sigheader.img.hash zerosbk [ 3.2417 ] [ 3.2425 ] tegrahost_v2 --chip 0x18 --align blob_eks.img [ 3.2432 ] [ 3.2440 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk [ 3.2447 ] [ 3.2456 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key [ 3.2462 ] Assuming zero filled SBK key [ 3.2464 ] [ 3.2473 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk [ 3.2480 ] [ 3.2489 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin [ 3.2495 ] number of images in blob are 9 [ 3.2498 ] blobsize is 4071256 [ 3.2499 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 221776 [ 3.2513 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 90176 [ 3.2515 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 63104 [ 3.2518 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2082144 [ 3.2522 ] Added binary blob_tegra186-quill-p3489-0888-a00-00-base_sigheader.dtb.encrypt of size 367184 [ 3.2526 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 534816 [ 3.2528 ] Added binary blob_tegra186-a02-bpmp-lightning-p3489-a00-00-te770m_sigheader.dtb.encrypt of size 315392 [ 3.2533 ] Added binary blob_tos-trusty_sigheader.img.encrypt of size 395072 [ 3.2536 ] Added binary blob_eks_sigheader.img.encrypt of size 1440 [ 3.2548 ] [ 3.2549 ] Sending bootloader and pre-requisite binaries [ 3.2558 ] tegrarcm_v2 --download blob blob.bin [ 3.2563 ] Applet version 01.00.0000 [ 3.4613 ] Sending blob [ 3.4614 ] [................................................] 100% [ 3.8989 ] [ 3.8998 ] tegrarcm_v2 --boot recovery [ 3.9004 ] Applet version 01.00.0000 [ 4.1488 ] [ 5.1501 ] tegrarcm_v2 --isapplet [ 5.2692 ] [ 5.2701 ] tegradevflash_v2 --iscpubl [ 5.2709 ] Cannot Open USB [ 5.7319 ] [ 6.7338 ] tegrarcm_v2 --isapplet [ 6.8082 ] [ 6.8091 ] tegradevflash_v2 --iscpubl [ 6.8098 ] Bootloader version 01.00.0000 [ 6.9242 ] Bootloader version 01.00.0000 [ 6.9255 ] [ 6.9255 ] tegradevflash_v2 --oem burnfuses blow_fuse_data.bin [ 6.9263 ] Bootloader version 01.00.0000 [ 7.0420 ] Fusing burning successful [ 7.2279 ] [ 7.2307 ] tegradevflash_v2 --reboot recovery [ 7.2330 ] Bootloader version 01.00.0000