TX2 NX Flash log customised BSP: --------------------------------- hm@hm:~/BSP/tx2nx/test$ cd Linux_for_Tegra/ hm@hm:~/BSP/tx2nx/test/Linux_for_Tegra$ lsusb Bus 002 Device 002: ID 2357:0601 Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 001 Device 005: ID 0955:7c18 NVidia Corp. Bus 001 Device 003: ID 413c:2107 Dell Computer Corp. Bus 001 Device 002: ID 413c:301a Dell Computer Corp. Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub hm@hm:~/BSP/tx2nx/test/Linux_for_Tegra$ sudo ./flash.sh jetson-xavier-nx-devkit-tx2-nx mmcblk0p1 ############################################################################### # L4T BSP Information: # R32 , REVISION: 5.1 ############################################################################### # Target Board Information: # Name: jetson-xavier-nx-devkit-tx2-nx, Board Family: t186ref, SoC: Tegra 186, # OpMode: production, Boot Authentication: NS, # Disk encryption: disabled , ############################################################################### ./tegraflash.py --chip 0x18 --applet "/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin" --skipuid --cmd "dump eeprom boardinfo cvm.bin" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0128 ] Generating RCM messages [ 0.0149 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm /home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin 0 0 [ 0.0172 ] RCM 0 is saved as rcm_0.rcm [ 0.0388 ] RCM 1 is saved as rcm_1.rcm [ 0.0389 ] List of rcm files are saved in rcm_list.xml [ 0.0389 ] [ 0.0390 ] Signing RCM messages [ 0.0591 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0615 ] Assuming zero filled SBK key [ 0.0884 ] [ 0.0885 ] Copying signature to RCM mesages [ 0.0909 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml [ 0.0938 ] [ 0.0940 ] Boot Rom communication [ 0.0962 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml --skipuid [ 0.0982 ] RCM version 0X180001 [ 0.0996 ] Boot Rom communication completed [ 1.1063 ] [ 2.1103 ] tegrarcm_v2 --isapplet [ 2.1125 ] Applet version 01.00.0000 [ 2.1155 ] [ 2.1180 ] Retrieving EEPROM data [ 2.1183 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/cvm.bin [ 2.1204 ] Applet version 01.00.0000 [ 2.1235 ] Saved platform info in /home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/cvm.bin [ 2.1972 ] Board ID(3636) version(300) sku(0001) revision(H.0) Copy /home/hm/BSP/tx2nx/test/Linux_for_Tegra/kernel/dtb/tegra186-p3636-0001-p3509-0000-a01.dtb to /home/hm/BSP/tx2nx/test/Linux_for_Tegra/kernel/dtb/tegra186-p3636-0001-p3509-0000-a01.dtb.rec copying bctfile(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg)... done. copying misc_config(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)... done. copying pinmux_config(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg)... done. copying pmic_config(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-p3636-0001-a00.cfg)... done. copying pmc_config(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-p3636-0001-a00.cfg)... done. copying prod_config(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-p3636-0001-a00.cfg)... done. copying scr_config(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/t186ref/BCT/minimal_scr.cfg)... done. copying scr_cold_boot_config(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/t186ref/BCT/mobile_scr.cfg)... done. copying bootrom_config(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg)... done. copying dev_params(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/t186ref/BCT/emmc.cfg)... done. Existing bootloader(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused. copying initrd(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/l4t_initrd.img)... done. populating kernel to rootfs... done. populating initrd to rootfs... done. populating /home/hm/BSP/tx2nx/test/Linux_for_Tegra/kernel/dtb/tegra186-p3636-0001-p3509-0000-a01.dtb to rootfs... done. Making Boot image... done. /home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x18 --key --cmd sign boot.img Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0003 ] Generating signature [ 0.0010 ] tegrasign_v2 --key --getmode mode.txt [ 0.0018 ] Assuming zero filled SBK key [ 0.0019 ] [ 0.0021 ] sign_type : 0 [ 0.0021 ] header_magic: 414e4452 [ 0.0257 ] tegrahost_v2 --chip 0x18 --align 1_boot.img [ 0.0277 ] [ 0.0285 ] tegrahost_v2 --appendsigheader 1_boot.img zerosbk [ 0.0302 ] [ 0.0475 ] tegrasign_v2 --key --list 1_boot_sigheader.img_list.xml --pubkeyhash pub_key.key [ 0.0483 ] Assuming zero filled SBK key [ 0.0636 ] [ 0.0645 ] tegrahost_v2 --updatesigheader 1_boot_sigheader.img.encrypt 1_boot_sigheader.img.hash zerosbk [ 0.0660 ] [ 0.0667 ] Signed file: /home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt l4t_sign_image.sh: Generate header for boot_sigheader.img.encrypt l4t_sign_image.sh: chip 0x18: Don't need to do anything l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot_sigheader.img.encrypt l4t_sign_image.sh: the signed file is /home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt done. Making recovery ramdisk for recovery image... Re-generating recovery ramdisk for recovery image... ~/BSP/tx2nx/test/Linux_for_Tegra/bootloader/ramdisk_tmp ~/BSP/tx2nx/test/Linux_for_Tegra/bootloader ~/BSP/tx2nx/test/Linux_for_Tegra 30402 blocks _BASE_KERNEL_VERSION=4.9.201-tegra ~/BSP/tx2nx/test/Linux_for_Tegra/bootloader/ramdisk_tmp/lib ~/BSP/tx2nx/test/Linux_for_Tegra/bootloader/ramdisk_tmp ~/BSP/tx2nx/test/Linux_for_Tegra/bootloader ~/BSP/tx2nx/test/Linux_for_Tegra 114813 blocks Making Recovery image... copying recdtbfile(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/kernel/dtb/tegra186-p3636-0001-p3509-0000-a01.dtb.rec)... done. 20+0 records in 20+0 records out 20 bytes copied, 0.000323583 s, 61.8 kB/s Existing sosfile(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin) reused. copying tegraboot(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/t186ref/nvtboot.bin)... done. Existing cpu_bootloader(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused. Existing mb2blfile(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused. Existing mtspreboot(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/preboot_d15_prod_cr.bin) reused. Existing mts(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/mce_mts_d15_prod_cr.bin) reused. Existing mb1file(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/mb1_prod.bin) reused. Existing bpffile(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/bpmp.bin) reused. copying bpfdtbfile(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/t186ref/tegra186-bpmp-p3636-0001-a00-00.dtb)... done. Existing scefile(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. Existing spefile(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/spe.bin) reused. Existing drameccfile(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/dram-ecc.bin) reused. Existing badpagefile(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/badpage.bin) reused. copying wb0boot(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/t186ref/warmboot.bin)... done. Existing tosfile(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/tos-trusty.img) reused. Existing eksfile(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/eks.img) reused. copying dtbfile(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/kernel/dtb/tegra186-p3636-0001-p3509-0000-a01.dtb)... done. Copying nv_boot_control.conf to rootfs /home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x18 --key --cmd sign kernel_tegra186-p3636-0001-p3509-0000-a01.dtb Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0004 ] Generating signature [ 0.0011 ] tegrasign_v2 --key --getmode mode.txt [ 0.0018 ] Assuming zero filled SBK key [ 0.0020 ] [ 0.0022 ] sign_type : 909325875 [ 0.0022 ] header_magic: d00dfeed [ 0.0030 ] tegrahost_v2 --chip 0x18 --align 1_kernel_tegra186-p3636-0001-p3509-0000-a01.dtb [ 0.0038 ] [ 0.0046 ] tegrahost_v2 --appendsigheader 1_kernel_tegra186-p3636-0001-p3509-0000-a01.dtb zerosbk [ 0.0057 ] [ 0.0071 ] tegrasign_v2 --key --list 1_kernel_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 0.0078 ] Assuming zero filled SBK key [ 0.0125 ] [ 0.0135 ] tegrahost_v2 --updatesigheader 1_kernel_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt 1_kernel_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.hash zerosbk [ 0.0146 ] [ 0.0150 ] Signed file: /home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt l4t_sign_image.sh: Generate header for kernel_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt l4t_sign_image.sh: chip 0x18: Don't need to do anything l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt l4t_sign_image.sh: the signed file is /home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt done. Making system.img... populating rootfs from /home/hm/BSP/tx2nx/test/Linux_for_Tegra/rootfs ... done. populating /boot/extlinux/extlinux.conf ... done. Sync'ing system.img ... done. Converting RAW image to Sparse image... done. system.img built successfully. Existing tbcfile(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/cboot.bin) reused. copying tbcdtbfile(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/kernel/dtb/tegra186-p3636-0001-p3509-0000-a01.dtb)... done. copying cfgfile(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml... done. Existing flasher(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu.bin) reused. Existing flashapp(/home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/tegraflash.py) reused. ./tegraflash.py --bl nvtboot_recovery_cpu.bin --sdram_config tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --odmdata 0x2090000 --applet mb1_recovery_prod.bin --cmd "flash; reboot" --cfg flash.xml --chip 0x18 --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmic_config tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --pmc_config tegra186-mb1-bct-pad-p3636-0001-a00.cfg --prod_config tegra186-mb1-bct-prod-p3636-0001-a00.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --dev_params emmc.cfg --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-bpmp-p3636-0001-a00-00.dtb; tlk tos-trusty.img; eks eks.img; bootloader_dtb tegra186-p3636-0001-p3509-0000-a01.dtb" saving flash command in /home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/flashcmd.txt saving Windows flash command to /home/hm/BSP/tx2nx/test/Linux_for_Tegra/bootloader/flash_win.bat *** Flashing target device started. *** Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.1338 ] tegrasign_v2 --key None --getmode mode.txt [ 0.1362 ] Assuming zero filled SBK key [ 0.1503 ] [ 0.1507 ] Generating RCM messages [ 0.1676 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0 [ 0.1704 ] RCM 0 is saved as rcm_0.rcm [ 0.1798 ] RCM 1 is saved as rcm_1.rcm [ 0.1799 ] List of rcm files are saved in rcm_list.xml [ 0.1799 ] [ 0.1800 ] Signing RCM messages [ 0.1822 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key [ 0.1844 ] Assuming zero filled SBK key [ 0.1902 ] [ 0.1902 ] Copying signature to RCM mesages [ 0.1911 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml [ 0.6175 ] [ 0.6176 ] Parsing partition layout [ 0.7807 ] tegraparser_v2 --pt flash.xml.tmp [ 0.7853 ] [ 0.7854 ] Creating list of images to be signed [ 0.8066 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk [ 6.3528 ] [ 6.3529 ] Generating signatures [ 6.3538 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key [ 6.3545 ] Assuming zero filled SBK key [ 7.8206 ] [ 7.8207 ] Generating br-bct [ 7.8562 ] Updating dev and MSS params in BR BCT [ 7.8563 ] tegrabct_v2 --dev_param emmc.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --brbct br_bct.cfg --chip 0x18 0 [ 7.9979 ] [ 7.9980 ] Updating bl info [ 7.9989 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 8.0216 ] [ 8.0217 ] Updating smd info [ 8.0230 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin [ 8.0246 ] [ 8.0247 ] Updating Odmdata [ 8.0259 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x2090000 [ 8.0276 ] [ 8.0277 ] Get Signed section of bct [ 8.0290 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml [ 8.0306 ] [ 8.0322 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key [ 8.0337 ] Assuming zero filled SBK key [ 8.0341 ] [ 8.0342 ] Updating BCT with signature [ 8.0358 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml [ 8.0378 ] [ 8.0379 ] Generating coldboot mb1-bct [ 8.0396 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg [ 8.0411 ] MB1-BCT version: 0xf [ 8.0415 ] Copying Sdram info from 1 to 2 set [ 8.0690 ] Copying Sdram info from 2 to 3 set [ 8.0694 ] Packing sdram param for instance[0] [ 8.0697 ] Packing sdram param for instance[1] [ 8.0701 ] Packing sdram param for instance[2] [ 8.0704 ] Packing sdram param for instance[3] [ 8.0909 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg [ 8.0915 ] Appending platform config data of size :- 2280 [ 8.0920 ] Parsing config file :mobile_scr.cfg [ 8.0924 ] Appending platform config data of size :- 12240 [ 8.0956 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg [ 8.0962 ] Appending platform config data of size :- 24 [ 8.0965 ] [ 8.0966 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg [ 8.0966 ] Appending platform config data of size :- 508 [ 8.0966 ] [ 8.0966 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg [ 8.0966 ] Appending platform config data of size :- 64 [ 8.0966 ] [ 8.0966 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg [ 8.0966 ] Appending platform config data of size :- 1628 [ 8.0966 ] [ 8.0967 ] Updating mb1-bct with firmware information [ 8.0984 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 8.0998 ] MB1-BCT version: 0xf [ 8.1005 ] [ 8.1006 ] Updating mb1-bct with storage information [ 8.1021 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 8.1034 ] MB1-BCT version: 0xf [ 8.1041 ] [ 8.1057 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct [ 8.1072 ] [ 8.1088 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk [ 8.1105 ] [ 8.1125 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 8.1139 ] Assuming zero filled SBK key [ 8.1167 ] [ 8.1186 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk [ 8.1205 ] [ 8.1207 ] Generating recovery mb1-bct [ 8.1221 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg [ 8.1235 ] MB1-BCT version: 0xf [ 8.1239 ] Copying Sdram info from 1 to 2 set [ 8.1479 ] Copying Sdram info from 2 to 3 set [ 8.1482 ] Packing sdram param for instance[0] [ 8.1484 ] Packing sdram param for instance[1] [ 8.1486 ] Packing sdram param for instance[2] [ 8.1489 ] Packing sdram param for instance[3] [ 8.1491 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg [ 8.1495 ] Appending platform config data of size :- 2280 [ 8.1497 ] Parsing config file :minimal_scr.cfg [ 8.1500 ] Appending platform config data of size :- 12240 [ 8.1511 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg [ 8.1512 ] Appending platform config data of size :- 24 [ 8.1512 ] [ 8.1512 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg [ 8.1512 ] Appending platform config data of size :- 508 [ 8.1512 ] [ 8.1513 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg [ 8.1513 ] Appending platform config data of size :- 64 [ 8.1513 ] [ 8.1513 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg [ 8.1513 ] Appending platform config data of size :- 1628 [ 8.1513 ] [ 8.1513 ] Updating mb1-bct with firmware information [ 8.1523 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin [ 8.1531 ] MB1-BCT version: 0xf [ 8.1535 ] [ 8.1535 ] Updating mb1-bct with storage information [ 8.1544 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 8.1552 ] MB1-BCT version: 0xf [ 8.1557 ] [ 8.1566 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct [ 8.1573 ] [ 8.1581 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk [ 8.1590 ] [ 8.1600 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 8.1607 ] Assuming zero filled SBK key [ 8.1622 ] [ 8.1631 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk [ 8.1641 ] [ 8.1644 ] Copying signatures [ 8.1652 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml [ 8.9103 ] [ 8.9104 ] Boot Rom communication [ 8.9130 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml [ 8.9153 ] BootRom is not running [ 14.0196 ] [ 15.0238 ] tegrarcm_v2 --isapplet [ 15.0260 ] Applet version 01.00.0000 [ 15.0287 ] [ 15.0289 ] Sending BCTs [ 15.0313 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt [ 15.0335 ] Applet version 01.00.0000 [ 15.0364 ] Sending bct_bootrom [ 15.0367 ] [................................................] 100% [ 15.0384 ] Sending bct_mb1 [ 15.0391 ] [................................................] 100% [ 15.0553 ] [ 15.0554 ] Generating blob [ 15.0576 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin [ 15.0597 ] [ 15.0617 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk [ 15.0648 ] [ 15.0674 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 15.0694 ] Assuming zero filled SBK key [ 15.0858 ] [ 15.0882 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk [ 15.0912 ] [ 15.0935 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin [ 15.0956 ] [ 15.0976 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk [ 15.1283 ] [ 15.1317 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 15.1339 ] Assuming zero filled SBK key [ 15.1392 ] [ 15.1401 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk [ 15.1411 ] [ 15.1420 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin [ 15.1427 ] [ 15.1435 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk [ 15.1444 ] [ 15.1453 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 15.1459 ] Assuming zero filled SBK key [ 15.1477 ] [ 15.1486 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk [ 15.1495 ] [ 15.1503 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin [ 15.1511 ] [ 15.1518 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk [ 15.1556 ] [ 15.1568 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 15.1575 ] Assuming zero filled SBK key [ 15.2048 ] [ 15.2058 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk [ 15.2088 ] [ 15.2098 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin [ 15.2106 ] [ 15.2115 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk [ 15.2131 ] [ 15.2141 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 15.2149 ] Assuming zero filled SBK key [ 15.2272 ] [ 15.2281 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk [ 15.2295 ] [ 15.2304 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-bpmp-p3636-0001-a00-00.dtb [ 15.2313 ] [ 15.2321 ] tegrahost_v2 --appendsigheader blob_tegra186-bpmp-p3636-0001-a00-00.dtb zerosbk [ 15.2332 ] [ 15.2341 ] tegrasign_v2 --key None --list blob_tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 15.2349 ] Assuming zero filled SBK key [ 15.2379 ] [ 15.2388 ] tegrahost_v2 --updatesigheader blob_tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt blob_tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.hash zerosbk [ 15.2398 ] [ 15.2407 ] tegrahost_v2 --chip 0x18 --align blob_tos-trusty.img [ 15.2415 ] [ 15.2423 ] tegrahost_v2 --appendsigheader blob_tos-trusty.img zerosbk [ 15.2438 ] [ 15.2448 ] tegrasign_v2 --key None --list blob_tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key [ 15.2455 ] Assuming zero filled SBK key [ 15.2548 ] [ 15.2558 ] tegrahost_v2 --updatesigheader blob_tos-trusty_sigheader.img.encrypt blob_tos-trusty_sigheader.img.hash zerosbk [ 15.2571 ] [ 15.2581 ] tegrahost_v2 --chip 0x18 --align blob_eks.img [ 15.2590 ] [ 15.2598 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk [ 15.2608 ] [ 15.2618 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key [ 15.2625 ] Assuming zero filled SBK key [ 15.2627 ] [ 15.2637 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk [ 15.2646 ] [ 15.2654 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-p3636-0001-p3509-0000-a01.dtb [ 15.2661 ] [ 15.2669 ] tegrahost_v2 --appendsigheader blob_tegra186-p3636-0001-p3509-0000-a01.dtb zerosbk [ 15.2679 ] [ 15.2688 ] tegrasign_v2 --key None --list blob_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 15.2695 ] Assuming zero filled SBK key [ 15.2742 ] [ 15.2751 ] tegrahost_v2 --updatesigheader blob_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt blob_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.hash zerosbk [ 15.2762 ] [ 15.2771 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin [ 15.2778 ] number of images in blob are 9 [ 15.2781 ] blobsize is 3694472 [ 15.2782 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 221776 [ 15.2798 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 90176 [ 15.2801 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 63104 [ 15.2805 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2082144 [ 15.2810 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 534816 [ 15.2814 ] Added binary blob_tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt of size 113696 [ 15.2818 ] Added binary blob_tos-trusty_sigheader.img.encrypt of size 395072 [ 15.2821 ] Added binary blob_eks_sigheader.img.encrypt of size 1440 [ 15.2823 ] Added binary blob_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt of size 192096 [ 15.2835 ] [ 15.2835 ] Sending bootloader and pre-requisite binaries [ 15.2844 ] tegrarcm_v2 --download blob blob.bin [ 15.2851 ] Applet version 01.00.0000 [ 15.2881 ] Sending blob [ 15.2881 ] [................................................] 100% [ 15.7068 ] [ 15.7090 ] tegrarcm_v2 --boot recovery [ 15.7109 ] Applet version 01.00.0000 [ 15.7150 ] [ 16.7189 ] tegrarcm_v2 --isapplet [ 16.7211 ] USB communication failed.Check if device is in recovery [ 17.1377 ] [ 17.1758 ] tegradevflash_v2 --iscpubl [ 17.1781 ] Bootloader version 01.00.0000 [ 17.1803 ] Bootloader version 01.00.0000 [ 17.1814 ] [ 17.1815 ] Retrieving storage infomation [ 17.1838 ] tegrarcm_v2 --oem platformdetails storage storage_info.bin [ 17.1859 ] Applet is not running on device. Continue with Bootloader [ 17.1891 ] [ 17.1914 ] tegradevflash_v2 --oem platformdetails storage storage_info.bin [ 17.1932 ] Bootloader version 01.00.0000 [ 17.1954 ] Saved platform info in storage_info.bin [ 17.1999 ] [ 17.1999 ] Flashing the device [ 17.2019 ] tegraparser_v2 --storageinfo storage_info.bin --generategpt --pt flash.xml.bin [ 17.2047 ] [ 17.2067 ] tegradevflash_v2 --pt flash.xml.bin --create [ 17.2084 ] Bootloader version 01.00.0000 [ 17.2105 ] Erasing sdmmc_boot: 3 ......... [Done] [ 17.2213 ] Writing partition secondary_gpt with gpt_secondary_0_3.bin [ 17.2221 ] [................................................] 100% [ 17.2348 ] Erasing sdmmc_user: 3 ......... [Done] [ 17.7791 ] Writing partition master_boot_record with mbr_1_3.bin [ 17.7801 ] [................................................] 100% [ 17.7839 ] Writing partition primary_gpt with gpt_primary_1_3.bin [ 17.7859 ] [................................................] 100% [ 17.7912 ] Writing partition secondary_gpt with gpt_secondary_1_3.bin [ 17.8006 ] [................................................] 100% [ 17.8130 ] Writing partition mb1 with mb1_prod.bin.encrypt [ 17.8136 ] [................................................] 100% [ 17.8207 ] Writing partition mb1_b with mb1_prod.bin.encrypt [ 17.8262 ] [................................................] 100% [ 17.8333 ] Writing partition dram-ecc-fw with dram-ecc_sigheader.bin.encrypt [ 17.8390 ] [................................................] 100% [ 17.8452 ] Writing partition badpage-fw with badpage_sigheader.bin.encrypt [ 17.8501 ] [................................................] 100% [ 17.8550 ] Writing partition badpage-fw_b with badpage_sigheader.bin.encrypt [ 17.8582 ] [................................................] 100% [ 17.8632 ] Writing partition spe-fw with spe_sigheader.bin.encrypt [ 17.8675 ] [................................................] 100% [ 17.8744 ] Writing partition spe-fw_b with spe_sigheader.bin.encrypt [ 17.8804 ] [................................................] 100% [ 17.8874 ] Writing partition mb2 with nvtboot_sigheader.bin.encrypt [ 17.8933 ] [................................................] 100% [ 17.9007 ] Writing partition mb2_b with nvtboot_sigheader.bin.encrypt [ 17.9064 ] [................................................] 100% [ 17.9139 ] Writing partition mts-preboot with preboot_d15_prod_cr_sigheader.bin.encrypt [ 17.9201 ] [................................................] 100% [ 17.9262 ] Writing partition mts-preboot_b with preboot_d15_prod_cr_sigheader.bin.encrypt [ 17.9318 ] [................................................] 100% [ 17.9382 ] Writing partition SMD with slot_metadata.bin [ 17.9432 ] [................................................] 100% [ 17.9648 ] Writing partition SMD_b with slot_metadata.bin [ 17.9667 ] [................................................] 100% [ 17.9712 ] Writing partition VER_b with emmc_bootblob_ver.txt [ 17.9732 ] [................................................] 100% [ 17.9985 ] Writing partition VER with emmc_bootblob_ver.txt [ 18.0020 ] [................................................] 100% [ 18.0064 ] Writing partition master_boot_record with mbr_1_3.bin [ 18.0084 ] [................................................] 100% [ 18.0124 ] Writing partition APP with system.img [ 18.0142 ] [................................................] 100% [ 284.9143 ] Writing partition mts-bootpack with mce_mts_d15_prod_cr_sigheader.bin.encrypt [ 284.9679 ] [................................................] 100% [ 285.0493 ] Writing partition mts-bootpack_b with mce_mts_d15_prod_cr_sigheader.bin.encrypt [ 285.0678 ] [................................................] 100% [ 285.1484 ] Writing partition cpu-bootloader with cboot_sigheader.bin.encrypt [ 285.1675 ] [................................................] 100% [ 285.1831 ] Writing partition cpu-bootloader_b with cboot_sigheader.bin.encrypt [ 285.1918 ] [................................................] 100% [ 285.2070 ] Writing partition bootloader-dtb with tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt [ 285.2178 ] [................................................] 100% [ 285.2289 ] Writing partition bootloader-dtb_b with tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt [ 285.2370 ] [................................................] 100% [ 285.2485 ] Writing partition secure-os with tos-trusty_sigheader.img.encrypt [ 285.2558 ] [................................................] 100% [ 285.2734 ] Writing partition secure-os_b with tos-trusty_sigheader.img.encrypt [ 285.2844 ] [................................................] 100% [ 285.3032 ] Writing partition eks with eks_sigheader.img.encrypt [ 285.3143 ] [................................................] 100% [ 285.3186 ] Writing partition adsp-fw with adsp-fw_sigheader.bin.encrypt [ 285.3230 ] [................................................] 100% [ 285.3300 ] Writing partition adsp-fw_b with adsp-fw_sigheader.bin.encrypt [ 285.3365 ] [................................................] 100% [ 285.3442 ] Writing partition bpmp-fw with bpmp_sigheader.bin.encrypt [ 285.3503 ] [................................................] 100% [ 285.3734 ] Writing partition bpmp-fw_b with bpmp_sigheader.bin.encrypt [ 285.3859 ] [................................................] 100% [ 285.4091 ] Writing partition bpmp-fw-dtb with tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt [ 285.4219 ] [................................................] 100% [ 285.4302 ] Writing partition bpmp-fw-dtb_b with tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt [ 285.4380 ] [................................................] 100% [ 285.4459 ] Writing partition sce-fw with camera-rtcpu-sce_sigheader.img.encrypt [ 285.4532 ] [................................................] 100% [ 285.4612 ] Writing partition sce-fw_b with camera-rtcpu-sce_sigheader.img.encrypt [ 285.4689 ] [................................................] 100% [ 285.4770 ] Writing partition sc7 with warmboot_wbheader.bin.encrypt [ 285.4835 ] [................................................] 100% [ 285.4884 ] Writing partition sc7_b with warmboot_wbheader.bin.encrypt [ 285.4935 ] [................................................] 100% [ 285.4986 ] Writing partition BMP with bmp.blob [ 285.5034 ] [................................................] 100% [ 285.5532 ] Writing partition BMP_b with bmp.blob [ 285.5608 ] [................................................] 100% [ 285.5698 ] Writing partition recovery with recovery_sigheader.img.encrypt [ 285.5770 ] [................................................] 100% [ 288.0969 ] Writing partition recovery-dtb with tegra186-p3636-0001-p3509-0000-a01.dtb_sigheader.rec.encrypt [ 288.1018 ] [................................................] 100% [ 288.1116 ] Writing partition kernel-bootctrl with kernel_bootctrl.bin [ 288.1196 ] [................................................] 100% [ 288.1456 ] Writing partition kernel-bootctrl_b with kernel_bootctrl.bin [ 288.1492 ] [................................................] 100% [ 288.1546 ] Writing partition kernel with boot_sigheader.img.encrypt [ 288.1566 ] [................................................] 100% [ 288.1793 ] Writing partition kernel_b with boot_sigheader.img.encrypt [ 288.1923 ] [................................................] 100% [ 288.2151 ] Writing partition kernel-dtb with kernel_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt [ 288.2280 ] [................................................] 100% [ 288.2375 ] Writing partition kernel-dtb_b with kernel_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt [ 288.2457 ] [................................................] 100% [ 288.2632 ] [ 288.2653 ] tegradevflash_v2 --write BCT br_bct_BR.bct [ 288.2670 ] Bootloader version 01.00.0000 [ 288.2690 ] Writing partition BCT with br_bct_BR.bct [ 288.2695 ] [................................................] 100% [ 288.2784 ] [ 288.2824 ] tegradevflash_v2 --write MB1_BCT mb1_cold_boot_bct_MB1_sigheader.bct.encrypt [ 288.2842 ] Bootloader version 01.00.0000 [ 288.2865 ] Writing partition MB1_BCT with mb1_cold_boot_bct_MB1_sigheader.bct.encrypt [ 288.2875 ] [................................................] 100% [ 288.2966 ] [ 288.2984 ] tegradevflash_v2 --write MB1_BCT_b mb1_cold_boot_bct_MB1_sigheader.bct.encrypt [ 288.3001 ] Bootloader version 01.00.0000 [ 288.3024 ] Writing partition MB1_BCT_b with mb1_cold_boot_bct_MB1_sigheader.bct.encrypt [ 288.3034 ] [................................................] 100% [ 288.3126 ] [ 288.3127 ] Flashing completed [ 288.3128 ] Coldbooting the device [ 288.3146 ] tegradevflash_v2 --reboot coldboot [ 288.3163 ] Bootloader version 01.00.0000 [ 288.3225 ] *** The target t186ref has been flashed successfully. *** Reset the board to boot from internal eMMC. hm@hm:~/BSP/tx2nx/test/Linux_for_Tegra$ Connection reset by 192.168.0.3 port 22