############################################################################### # L4T BSP Information: # R32 , REVISION: 5.0 ############################################################################### # Target Board Information: # Name: photon-encrypted-alyce, Board Family: t186ref, SoC: Tegra 194, # OpMode: production, Boot Authentication: SBKPKC, # Disk encryption: enabled , ############################################################################### Copy /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/kernel/dtb/tegra194-xavier-nx-cti-NGX003.dtb to /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/kernel/dtb/tegra194-xavier-nx-cti-NGX003.dtb.rec Using UUID f6743191-23f8-4a16-8d97-6d678cb4f771 for mounting root APP partition. Using UUID 37f842b0-f049-425a-81d0-5cd18da81914 for mounting root APP_enc partition. Using UUID 64c86f7e-4f32-41ba-8e76-da36b2344fdd for mounting boot APP partition. copying bctfile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg)... done. copying bctfile1(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-memcfg-sw-override.cfg)... done. copying device_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-bct-device-qspi-p3668.cfg)... done. copying misc_cold_boot_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-l4t.cfg)... done. copying misc_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-flash.cfg)... done. copying pinmux_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-xavier-nx-cti-mb1-pinmux-p3668-a01.cfg)... done. copying gpioint_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg)... done. copying pmic_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-pmic-p3668-0001-a00.cfg)... done. copying prod_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-prod-p3668-0001-a00.cfg)... done. copying scr_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying scr_cold_boot_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done. copying bootrom_config(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-reset-p3668-0001-a00.cfg)... done. copying dev_params(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-br-bct-qspi.cfg)... done. Existing bootloader(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. copying initrd(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/l4t_initrd.img)... done. prepare_luks_initrd: Begin to copy binaries into initrd 30402 blocs 49606 blocs prepare_luks_initrd: Finish copying binaries into initrd done. populating kernel to rootfs... done. /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /tmp/keys/rsa.key --encrypt_key /tmp/keys/user.hex --cmd sign /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/rootfs/boot/Image Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0065 ] Generating signature [ 0.0072 ] tegrasign_v2 --key /tmp/keys/rsa.key --getmode mode.txt [ 0.0078 ] PKC key in Open SSL format [ 0.0080 ] Key size is 256 bytes [ 0.0082 ] Valid PKC key [ 0.0093 ] [ 0.0095 ] header_magic: c05614 [ 0.0096 ] Encrypting file [ 0.0102 ] tegrahost_v2 --chip 0x19 --align 1_Image [ 0.0110 ] [ 0.0111 ] header_magic: c05614 [ 0.0126 ] tegrasign_v2 --key /tmp/keys/user.hex --list 1_Image_list.xml [ 0.0132 ] Key is a SBK key [ 0.0133 ] Key Size is 16 bytes [ 1.6452 ] [ 1.6469 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_Image.encrypt 1_Image.hash zerosbk [ 1.7155 ] [ 1.7165 ] tegrahost_v2 --chip 0x19 --align 1_Image.encrypt [ 1.7171 ] [ 1.7178 ] tegrahost_v2 --appendsigheader 1_Image.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 1.7184 ] adding BCH for 1_Image.encrypt [ 2.4980 ] [ 2.4981 ] header_magic: 7a109689 [ 2.4991 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list 1_Image_sigheader.encrypt_list.xml [ 2.4998 ] PKC key in Open SSL format [ 2.5000 ] Key size is 256 bytes [ 2.5001 ] Valid PKC key [ 2.5014 ] Saving pkc public key in pub_key.key [ 2.7444 ] [ 2.7454 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_Image_sigheader.encrypt.signed 1_Image_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 3.0986 ] [ 3.1260 ] Signed and encrypted file: /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/Image_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for Image_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x2101808 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for Image_sigheader.encrypt.signed l4t_sign_image.sh: the sign header is saved at /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/rootfs/boot/Image.sig done. populating initrd to rootfs... done. /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /tmp/keys/rsa.key --encrypt_key /tmp/keys/user.hex --cmd sign /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/rootfs/boot/initrd Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0048 ] Generating signature [ 0.0057 ] tegrasign_v2 --key /tmp/keys/rsa.key --getmode mode.txt [ 0.0064 ] PKC key in Open SSL format [ 0.0066 ] Key size is 256 bytes [ 0.0066 ] Valid PKC key [ 0.0078 ] [ 0.0079 ] header_magic: 1f8b0800 [ 0.0080 ] Encrypting file [ 0.0086 ] tegrahost_v2 --chip 0x19 --align 1_initrd [ 0.0093 ] [ 0.0094 ] header_magic: 1f8b0800 [ 0.0108 ] tegrasign_v2 --key /tmp/keys/user.hex --list 1_initrd_list.xml [ 0.0115 ] Key is a SBK key [ 0.0116 ] Key Size is 16 bytes [ 0.4269 ] [ 0.4284 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_initrd.encrypt 1_initrd.hash zerosbk [ 0.4488 ] [ 0.4496 ] tegrahost_v2 --chip 0x19 --align 1_initrd.encrypt [ 0.4502 ] [ 0.4508 ] tegrahost_v2 --appendsigheader 1_initrd.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 0.4513 ] adding BCH for 1_initrd.encrypt [ 0.6550 ] [ 0.6551 ] header_magic: b32f5144 [ 0.6561 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list 1_initrd_sigheader.encrypt_list.xml [ 0.6568 ] PKC key in Open SSL format [ 0.6569 ] Key size is 256 bytes [ 0.6570 ] Valid PKC key [ 0.6582 ] Saving pkc public key in pub_key.key [ 0.7113 ] [ 0.7126 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_initrd_sigheader.encrypt.signed 1_initrd_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.8274 ] [ 0.8342 ] Signed and encrypted file: /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/initrd_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for initrd_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0xad551a to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for initrd_sigheader.encrypt.signed l4t_sign_image.sh: the sign header is saved at /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/rootfs/boot/initrd.sig done. populating /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/kernel/dtb/tegra194-xavier-nx-cti-NGX003.dtb to rootfs... done. Making Boot image... done. /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /tmp/keys/rsa.key --encrypt_key /tmp/keys/user.hex --cmd sign boot.img Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0004 ] Generating signature [ 0.0011 ] tegrasign_v2 --key /tmp/keys/rsa.key --getmode mode.txt [ 0.0017 ] PKC key in Open SSL format [ 0.0021 ] Key size is 256 bytes [ 0.0022 ] Valid PKC key [ 0.0031 ] [ 0.0032 ] header_magic: 414e4452 [ 0.0033 ] Encrypting file [ 0.0045 ] tegrahost_v2 --chip 0x19 --align 1_boot.img [ 0.0059 ] [ 0.0061 ] header_magic: 414e4452 [ 0.0073 ] tegrasign_v2 --key /tmp/keys/user.hex --list 1_boot.img_list.xml [ 0.0078 ] Key is a SBK key [ 0.0081 ] Key Size is 16 bytes [ 1.9884 ] [ 1.9893 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot.img.encrypt 1_boot.img.hash zerosbk [ 2.0606 ] [ 2.0614 ] tegrahost_v2 --chip 0x19 --align 1_boot.img.encrypt [ 2.0621 ] [ 2.0628 ] tegrahost_v2 --appendsigheader 1_boot.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 2.0633 ] adding BCH for 1_boot.img.encrypt [ 3.0901 ] [ 3.0902 ] header_magic: d4aae505 [ 3.0911 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list 1_boot.img_sigheader.encrypt_list.xml [ 3.0917 ] PKC key in Open SSL format [ 3.0918 ] Key size is 256 bytes [ 3.0918 ] Valid PKC key [ 3.0930 ] Saving pkc public key in pub_key.key [ 3.4094 ] [ 3.4104 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot.img_sigheader.encrypt.signed 1_boot.img_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 3.8642 ] [ 3.9115 ] Signed and encrypted file: /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/temp_user_dir/boot.img_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for boot.img_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x2bd8000 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot.img_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt.signed done. Making recovery ramdisk for recovery image... Re-generating recovery ramdisk for recovery image... /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/ramdisk_tmp /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra 30402 blocs _BASE_KERNEL_VERSION=4.9.201-tegra /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/ramdisk_tmp/lib /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/ramdisk_tmp /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra 115060 blocs Making Recovery image... copying recdtbfile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/kernel/dtb/tegra194-xavier-nx-cti-NGX003.dtb.rec)... done. 20+0 enregistrements lus 20+0 enregistrements écrits 20 bytes copied, 0,000182246 s, 110 kB/s Existing sosfile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing tegraboot(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/nvtboot_t194.bin) reused. Existing cpu_bootloader(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. Existing mb2blfile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/nvtboot_recovery_t194.bin) reused. Existing mtspreboot(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/preboot_c10_prod_cr.bin) reused. Existing mcepreboot(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/mce_c10_prod_cr.bin) reused. Existing mtsproper(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/mts_c10_prod_cr.bin) reused. Existing mb1file(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing bpffile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/bpmp_t194.bin) reused. copying bpfdtbfile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/tegra194-a02-bpmp-p3668-a00.dtb)... done. Existing scefile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. Existing camerafw(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/camera-rtcpu-rce.img) reused. Existing spefile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/spe_t194.bin) reused. Existing drameccfile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/dram-ecc.bin) reused. Existing badpagefile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/badpage.bin) reused. Existing wb0boot(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/warmboot_t194_prod.bin) reused. Existing tosfile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/tos-trusty_t194.img) reused. Existing eksfile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/eks.img) reused. copying soft_fuses(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. copying dtbfile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/kernel/dtb/tegra194-xavier-nx-cti-NGX003.dtb)... done. Copying nv_boot_control.conf to rootfs /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /tmp/keys/rsa.key --encrypt_key /tmp/keys/user.hex --cmd sign kernel_tegra194-xavier-nx-cti-NGX003.dtb Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0005 ] Generating signature [ 0.0014 ] tegrasign_v2 --key /tmp/keys/rsa.key --getmode mode.txt [ 0.0019 ] PKC key in Open SSL format [ 0.0021 ] Key size is 256 bytes [ 0.0022 ] Valid PKC key [ 0.0033 ] [ 0.0034 ] header_magic: d00dfeed [ 0.0035 ] Encrypting file [ 0.0042 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb [ 0.0049 ] [ 0.0050 ] header_magic: d00dfeed [ 0.0069 ] tegrasign_v2 --key /tmp/keys/user.hex --list 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb_list.xml [ 0.0085 ] Key is a SBK key [ 0.0087 ] Key Size is 16 bytes [ 0.0167 ] [ 0.0177 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb.encrypt 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb.hash zerosbk [ 0.0188 ] [ 0.0195 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb.encrypt [ 0.0202 ] [ 0.0208 ] tegrahost_v2 --appendsigheader 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 0.0215 ] adding BCH for 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb.encrypt [ 0.0255 ] [ 0.0256 ] header_magic: 5166e312 [ 0.0268 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb_sigheader.encrypt_list.xml [ 0.0275 ] PKC key in Open SSL format [ 0.0277 ] Key size is 256 bytes [ 0.0278 ] Valid PKC key [ 0.0290 ] Saving pkc public key in pub_key.key [ 0.0884 ] [ 0.0914 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb_sigheader.encrypt.signed 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.0948 ] [ 0.0953 ] Signed and encrypted file: /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-xavier-nx-cti-NGX003.dtb_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for kernel_tegra194-xavier-nx-cti-NGX003.dtb_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x2bba7 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra194-xavier-nx-cti-NGX003.dtb_sigheader.encrypt.signed l4t_sign_image.sh: the sign header is saved at kernel_tegra194-xavier-nx-cti-NGX003.dtb.sig done. /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key /tmp/keys/rsa.key --encrypt_key /tmp/keys/user.hex --cmd sign kernel_tegra194-xavier-nx-cti-NGX003.dtb Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0005 ] Generating signature [ 0.0014 ] tegrasign_v2 --key /tmp/keys/rsa.key --getmode mode.txt [ 0.0021 ] PKC key in Open SSL format [ 0.0023 ] Key size is 256 bytes [ 0.0023 ] Valid PKC key [ 0.0037 ] [ 0.0038 ] header_magic: d00dfeed [ 0.0039 ] Encrypting file [ 0.0049 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb [ 0.0059 ] [ 0.0061 ] header_magic: d00dfeed [ 0.0075 ] tegrasign_v2 --key /tmp/keys/user.hex --list 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb_list.xml [ 0.0081 ] Key is a SBK key [ 0.0082 ] Key Size is 16 bytes [ 0.0156 ] [ 0.0169 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb.encrypt 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb.hash zerosbk [ 0.0186 ] [ 0.0202 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb.encrypt [ 0.0233 ] [ 0.0248 ] tegrahost_v2 --appendsigheader 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 0.0257 ] adding BCH for 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb.encrypt [ 0.0295 ] [ 0.0296 ] header_magic: 5166e312 [ 0.0306 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb_sigheader.encrypt_list.xml [ 0.0313 ] PKC key in Open SSL format [ 0.0314 ] Key size is 256 bytes [ 0.0315 ] Valid PKC key [ 0.0326 ] Saving pkc public key in pub_key.key [ 0.0865 ] [ 0.0932 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb_sigheader.encrypt.signed 1_kernel_tegra194-xavier-nx-cti-NGX003.dtb_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 0.0978 ] [ 0.0984 ] Signed and encrypted file: /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-xavier-nx-cti-NGX003.dtb_sigheader.encrypt.signed l4t_sign_image.sh: Generate header for kernel_tegra194-xavier-nx-cti-NGX003.dtb_sigheader.encrypt.signed l4t_sign_image.sh: chip 0x19: add 0x2bba7 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra194-xavier-nx-cti-NGX003.dtb_sigheader.encrypt.signed l4t_sign_image.sh: the signed file is /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt.signed done. Making system_boot.img... populating bootfs from /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/rootfs/boot ... done. populating /extlinux/extlinux.conf ... done. Sync'ing system_boot.img ... done. Converting RAW image to Sparse image... done. system_boot.img built successfully. Making system_root_encrypted.img... populating rootfs from /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/rootfs ... done. Sync'ing system_root_encrypted.img ... done. Converting RAW image to Sparse image... done. system_root_encrypted.img built successfully. Existing tbcfile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/cboot_t194.bin) reused. copying tbcdtbfile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/kernel/dtb/tegra194-xavier-nx-cti-NGX003.dtb)... done. copying cfgfile(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t194_spi_emmc_p3668-encrypted.xml) to flash.xml... done. Existing flasher(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu_t194.bin) reused. Existing flashapp(/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/tegraflash.py) reused. ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin --sdram_config tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg,tegra194-memcfg-sw-override.cfg --odmdata 0xB8190000 --applet mb1_t194_prod.bin --cmd "sign" --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --cfg flash.xml --chip 0x19 --device_config tegra19x-mb1-bct-device-qspi-p3668.cfg --misc_cold_boot_config tegra194-mb1-bct-misc-l4t.cfg --misc_config tegra194-mb1-bct-misc-flash.cfg --pinmux_config tegra19x-xavier-nx-cti-mb1-pinmux-p3668-a01.cfg --gpioint_config tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --pmic_config tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --prod_config tegra19x-mb1-prod-p3668-0001-a00.cfg --scr_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --scr_cold_boot_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --br_cmd_config tegra194-mb1-bct-reset-p3668-0001-a00.cfg --dev_params tegra194-br-bct-qspi.cfg --bin "mb2_bootloader nvtboot_recovery_t194.bin; mts_preboot preboot_c10_prod_cr.bin; mts_mce mce_c10_prod_cr.bin; mts_proper mts_c10_prod_cr.bin; bpmp_fw bpmp_t194.bin; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00.dtb; spe_fw spe_t194.bin; tlk tos-trusty_t194.img; eks eks.img; bootloader_dtb tegra194-xavier-nx-cti-NGX003.dtb" --key /tmp/keys/rsa.key --encrypt_key /tmp/keys/sbk.key Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0093 ] tegrasign_v2 --key /tmp/keys/rsa.key --getmode mode.txt [ 0.0101 ] PKC key in Open SSL format [ 0.0144 ] Key size is 256 bytes [ 0.0147 ] Valid PKC key [ 0.0159 ] [ 0.0161 ] Generating RCM messages [ 0.0170 ] tegrasign_v2 --key /tmp/keys/sbk.key --file mb1_t194_prod.bin --offset 4096 [ 0.0177 ] SBK key is in string form [ 0.0192 ] Key Size is 32 bytes [ 0.0330 ] [ 0.0352 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod_encrypt.bin zerosbk [ 0.0364 ] Header already present for mb1_t194_prod_encrypt.bin [ 0.0432 ] [ 0.0442 ] tegrasign_v2 --key /tmp/keys/rsa.key --getmode mode.txt [ 0.0449 ] PKC key in Open SSL format [ 0.0453 ] Key size is 256 bytes [ 0.0456 ] Valid PKC key [ 0.0471 ] [ 0.0481 ] tegrasign_v2 --key /tmp/keys/rsa.key --file mb1_t194_prod_encrypt_sigheader.bin --offset 2960 --length 1136 --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 0.0488 ] PKC key in Open SSL format [ 0.0489 ] Key size is 256 bytes [ 0.0492 ] Valid PKC key [ 0.0504 ] Saving pkc public key in pub_key.key [ 0.0978 ] [ 0.0989 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --setmontgomeryvalues montgomery.bin --updatesigheader mb1_t194_prod_encrypt_sigheader.bin mb1_t194_prod_encrypt_sigheader.sig oem-rsa [ 0.1024 ] [ 0.1044 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg sfuse.bin [ 0.1091 ] [ 0.1118 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_encrypt_sigheader.bin 0 0 [ 0.1129 ] RCM 0 is saved as rcm_0.rcm [ 0.1161 ] RCM 1 is saved as rcm_1.rcm [ 0.1161 ] RCM 2 is saved as rcm_2.rcm [ 0.1162 ] List of rcm files are saved in rcm_list.xml [ 0.1162 ] [ 0.1162 ] Signing RCM messages [ 0.1171 ] tegrasign_v2 --key /tmp/keys/rsa.key --list rcm_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 0.1178 ] PKC key in Open SSL format [ 0.1180 ] Key size is 256 bytes [ 0.1182 ] Valid PKC key [ 0.1194 ] Saving pkc public key in pub_key.key [ 0.2623 ] [ 0.2624 ] Copying signature to RCM mesages [ 0.2635 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml --pubkeyhash pub_key.key [ 0.2652 ] [ 0.2653 ] Parsing partition layout [ 0.2674 ] tegraparser_v2 --pt flash.xml.tmp [ 0.2710 ] [ 0.2711 ] Creating list of images to be signed [ 0.2719 ] tegrahost_v2 --chip 0x19 --partitionlayout flash.xml.bin --list images_list.xml [ 0.2726 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.2731 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.2740 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.2776 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.2780 ] adding BCH for spe_t194.bin [ 0.2808 ] adding BCH for spe_t194.bin [ 0.2825 ] adding BCH for nvtboot_t194.bin [ 0.2847 ] adding BCH for nvtboot_t194.bin [ 0.2877 ] Header already present for preboot_c10_prod_cr.bin [ 0.2919 ] Header already present for preboot_c10_prod_cr.bin [ 0.2926 ] Header already present for mce_c10_prod_cr.bin [ 0.2936 ] Header already present for mce_c10_prod_cr.bin [ 0.2960 ] adding BCH for mts_c10_prod_cr.bin [ 0.3025 ] adding BCH for mts_c10_prod_cr.bin [ 0.3704 ] Header already present for warmboot_t194_prod.bin [ 0.4391 ] Header already present for warmboot_t194_prod.bin [ 0.4397 ] adding BCH for cboot_t194.bin [ 0.4404 ] adding BCH for cboot_t194.bin [ 0.4485 ] adding BCH for tegra194-xavier-nx-cti-NGX003.dtb [ 0.4591 ] adding BCH for tegra194-xavier-nx-cti-NGX003.dtb [ 0.4622 ] adding BCH for tos-trusty_t194.img [ 0.4686 ] adding BCH for tos-trusty_t194.img [ 0.4769 ] adding BCH for eks.img [ 0.4849 ] adding BCH for eks.img [ 0.4850 ] adding BCH for adsp-fw.bin [ 0.4858 ] adding BCH for adsp-fw.bin [ 0.4871 ] adding BCH for camera-rtcpu-rce.img [ 0.4895 ] adding BCH for camera-rtcpu-rce.img [ 0.4946 ] adding BCH for bpmp_t194.bin [ 0.5025 ] adding BCH for bpmp_t194.bin [ 0.5187 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 0.5414 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb [ 0.5453 ] adding BCH for boot.img [ 0.6122 ] adding BCH for boot.img [ 1.4919 ] adding BCH for kernel_tegra194-xavier-nx-cti-NGX003.dtb [ 2.4012 ] adding BCH for kernel_tegra194-xavier-nx-cti-NGX003.dtb [ 2.4042 ] adding BCH for recovery.img [ 2.4868 ] adding BCH for tegra194-xavier-nx-cti-NGX003.dtb.rec [ 3.5333 ] [ 3.5345 ] tegrasign_v2 --key /tmp/keys/rsa.key --list images_list.xml --pubkeyhash pub_key.key [ 3.5353 ] PKC key in Open SSL format [ 3.5355 ] Key size is 256 bytes [ 3.5356 ] Valid PKC key [ 3.5367 ] Saving pkc public key in pub_key.key [ 5.3339 ] [ 5.3339 ] Generating br-bct [ 5.3351 ] Performing cfg overlay [ 5.3351 ] ['tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg', 'tegra194-memcfg-sw-override.cfg'] [ 5.3355 ] sw_memcfg_overlay.pl -c tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg -s tegra194-memcfg-sw-override.cfg -o /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1.cfg [ 5.3830 ] [ 5.3831 ] Updating dev and MSS params in BR BCT [ 5.3832 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 5.4115 ] [ 5.4116 ] Updating bl info [ 5.4126 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 5.4152 ] [ 5.4180 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin [ 5.4189 ] [ 5.4190 ] header_magic: 4e564441 [ 5.4199 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mb1_t194_prod_sigheader.bin_list.xml [ 5.4205 ] SBK key is in string form [ 5.4208 ] Key Size is 32 bytes [ 5.4346 ] [ 5.4359 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt mb1_t194_prod_sigheader.bin.hash zerosbk [ 5.4397 ] [ 5.4405 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 5.4413 ] [ 5.4419 ] tegrahost_v2 --appendsigheader mb1_t194_prod_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 5.4426 ] Header already present for mb1_t194_prod_sigheader.bin.encrypt [ 5.4449 ] [ 5.4450 ] header_magic: 4e564441 [ 5.4460 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mb1_t194_prod_sigheader.bin.encrypt_list.xml [ 5.4469 ] PKC key in Open SSL format [ 5.4473 ] Key size is 256 bytes [ 5.4474 ] Valid PKC key [ 5.4486 ] Saving pkc public key in pub_key.key [ 5.4939 ] [ 5.4951 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.4985 ] [ 5.5015 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin [ 5.5022 ] [ 5.5023 ] header_magic: 4e564441 [ 5.5033 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mb1_t194_prod_sigheader.bin_list.xml [ 5.5040 ] SBK key is in string form [ 5.5042 ] Key Size is 32 bytes [ 5.5185 ] [ 5.5196 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt mb1_t194_prod_sigheader.bin.hash zerosbk [ 5.5235 ] [ 5.5249 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 5.5261 ] [ 5.5279 ] tegrahost_v2 --appendsigheader mb1_t194_prod_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 5.5287 ] Header already present for mb1_t194_prod_sigheader.bin.encrypt [ 5.5315 ] [ 5.5317 ] header_magic: 4e564441 [ 5.5334 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mb1_t194_prod_sigheader.bin.encrypt_list.xml [ 5.5342 ] PKC key in Open SSL format [ 5.5344 ] Key size is 256 bytes [ 5.5346 ] Valid PKC key [ 5.5354 ] Saving pkc public key in pub_key.key [ 5.5821 ] [ 5.5841 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.5879 ] [ 5.5893 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin [ 5.5901 ] [ 5.5902 ] header_magic: 4e564441 [ 5.5911 ] tegrasign_v2 --key /tmp/keys/sbk.key --list spe_t194_sigheader.bin_list.xml [ 5.5918 ] SBK key is in string form [ 5.5920 ] Key Size is 32 bytes [ 5.5967 ] [ 5.5976 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 5.5995 ] [ 5.6003 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin.encrypt [ 5.6011 ] [ 5.6019 ] tegrahost_v2 --appendsigheader spe_t194_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid SPEF [ 5.6036 ] Header already present for spe_t194_sigheader.bin.encrypt [ 5.6050 ] [ 5.6051 ] header_magic: 4e564441 [ 5.6064 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list spe_t194_sigheader.bin.encrypt_list.xml [ 5.6071 ] PKC key in Open SSL format [ 5.6073 ] Key size is 256 bytes [ 5.6075 ] Valid PKC key [ 5.6084 ] Saving pkc public key in pub_key.key [ 5.6551 ] [ 5.6564 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt.signed spe_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.6583 ] [ 5.6594 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin [ 5.6600 ] [ 5.6602 ] header_magic: 4e564441 [ 5.6611 ] tegrasign_v2 --key /tmp/keys/sbk.key --list spe_t194_sigheader.bin_list.xml [ 5.6617 ] SBK key is in string form [ 5.6619 ] Key Size is 32 bytes [ 5.6672 ] [ 5.6685 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 5.6706 ] [ 5.6717 ] tegrahost_v2 --chip 0x19 --align spe_t194_sigheader.bin.encrypt [ 5.6727 ] [ 5.6737 ] tegrahost_v2 --appendsigheader spe_t194_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid SPEF [ 5.6744 ] Header already present for spe_t194_sigheader.bin.encrypt [ 5.6757 ] [ 5.6758 ] header_magic: 4e564441 [ 5.6768 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list spe_t194_sigheader.bin.encrypt_list.xml [ 5.6775 ] PKC key in Open SSL format [ 5.6778 ] Key size is 256 bytes [ 5.6781 ] Valid PKC key [ 5.6788 ] Saving pkc public key in pub_key.key [ 5.7266 ] [ 5.7278 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt.signed spe_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.7297 ] [ 5.7308 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin [ 5.7314 ] [ 5.7316 ] header_magic: 4e564441 [ 5.7326 ] tegrasign_v2 --key /tmp/keys/sbk.key --list nvtboot_t194_sigheader.bin_list.xml [ 5.7332 ] SBK key is in string form [ 5.7336 ] Key Size is 32 bytes [ 5.7431 ] [ 5.7443 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt nvtboot_t194_sigheader.bin.hash zerosbk [ 5.7470 ] [ 5.7477 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin.encrypt [ 5.7485 ] [ 5.7493 ] tegrahost_v2 --appendsigheader nvtboot_t194_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MB2B [ 5.7502 ] Header already present for nvtboot_t194_sigheader.bin.encrypt [ 5.7521 ] [ 5.7523 ] header_magic: 4e564441 [ 5.7534 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list nvtboot_t194_sigheader.bin.encrypt_list.xml [ 5.7541 ] PKC key in Open SSL format [ 5.7546 ] Key size is 256 bytes [ 5.7549 ] Valid PKC key [ 5.7556 ] Saving pkc public key in pub_key.key [ 5.8025 ] [ 5.8037 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt.signed nvtboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.8064 ] [ 5.8077 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin [ 5.8089 ] [ 5.8091 ] header_magic: 4e564441 [ 5.8111 ] tegrasign_v2 --key /tmp/keys/sbk.key --list nvtboot_t194_sigheader.bin_list.xml [ 5.8118 ] SBK key is in string form [ 5.8121 ] Key Size is 32 bytes [ 5.8218 ] [ 5.8232 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt nvtboot_t194_sigheader.bin.hash zerosbk [ 5.8264 ] [ 5.8277 ] tegrahost_v2 --chip 0x19 --align nvtboot_t194_sigheader.bin.encrypt [ 5.8286 ] [ 5.8298 ] tegrahost_v2 --appendsigheader nvtboot_t194_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MB2B [ 5.8308 ] Header already present for nvtboot_t194_sigheader.bin.encrypt [ 5.8334 ] [ 5.8336 ] header_magic: 4e564441 [ 5.8350 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list nvtboot_t194_sigheader.bin.encrypt_list.xml [ 5.8360 ] PKC key in Open SSL format [ 5.8362 ] Key size is 256 bytes [ 5.8364 ] Valid PKC key [ 5.8378 ] Saving pkc public key in pub_key.key [ 5.8879 ] [ 5.8892 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_t194_sigheader.bin.encrypt.signed nvtboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.8919 ] [ 5.8932 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin [ 5.8940 ] [ 5.8941 ] header_magic: 4e564441 [ 5.8949 ] tegrasign_v2 --key /tmp/keys/sbk.key --list preboot_c10_prod_cr_sigheader.bin_list.xml [ 5.8955 ] SBK key is in string form [ 5.8959 ] Key Size is 32 bytes [ 5.8968 ] [ 5.8976 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 5.8988 ] [ 5.8996 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin.encrypt [ 5.9004 ] [ 5.9011 ] tegrahost_v2 --appendsigheader preboot_c10_prod_cr_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MTSP [ 5.9018 ] Header already present for preboot_c10_prod_cr_sigheader.bin.encrypt [ 5.9022 ] [ 5.9022 ] header_magic: 4e564441 [ 5.9031 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list preboot_c10_prod_cr_sigheader.bin.encrypt_list.xml [ 5.9037 ] PKC key in Open SSL format [ 5.9040 ] Key size is 256 bytes [ 5.9041 ] Valid PKC key [ 5.9050 ] Saving pkc public key in pub_key.key [ 5.9537 ] [ 5.9549 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt.signed preboot_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 5.9560 ] [ 5.9570 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin [ 5.9577 ] [ 5.9578 ] header_magic: 4e564441 [ 5.9587 ] tegrasign_v2 --key /tmp/keys/sbk.key --list preboot_c10_prod_cr_sigheader.bin_list.xml [ 5.9593 ] SBK key is in string form [ 5.9596 ] Key Size is 32 bytes [ 5.9607 ] [ 5.9615 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 5.9625 ] [ 5.9632 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr_sigheader.bin.encrypt [ 5.9639 ] [ 5.9646 ] tegrahost_v2 --appendsigheader preboot_c10_prod_cr_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MTSP [ 5.9653 ] Header already present for preboot_c10_prod_cr_sigheader.bin.encrypt [ 5.9658 ] [ 5.9659 ] header_magic: 4e564441 [ 5.9670 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list preboot_c10_prod_cr_sigheader.bin.encrypt_list.xml [ 5.9678 ] PKC key in Open SSL format [ 5.9682 ] Key size is 256 bytes [ 5.9684 ] Valid PKC key [ 5.9691 ] Saving pkc public key in pub_key.key [ 6.0119 ] [ 6.0131 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt.signed preboot_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 6.0143 ] [ 6.0152 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin [ 6.0160 ] [ 6.0161 ] header_magic: 4e564441 [ 6.0169 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mce_c10_prod_cr_sigheader.bin_list.xml [ 6.0176 ] SBK key is in string form [ 6.0179 ] Key Size is 32 bytes [ 6.0255 ] [ 6.0267 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 6.0291 ] [ 6.0299 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin.encrypt [ 6.0307 ] [ 6.0315 ] tegrahost_v2 --appendsigheader mce_c10_prod_cr_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MTSM [ 6.0321 ] Header already present for mce_c10_prod_cr_sigheader.bin.encrypt [ 6.0338 ] [ 6.0339 ] header_magic: 4e564441 [ 6.0349 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mce_c10_prod_cr_sigheader.bin.encrypt_list.xml [ 6.0356 ] PKC key in Open SSL format [ 6.0359 ] Key size is 256 bytes [ 6.0361 ] Valid PKC key [ 6.0369 ] Saving pkc public key in pub_key.key [ 6.0835 ] [ 6.0847 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt.signed mce_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 6.0869 ] [ 6.0882 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin [ 6.0889 ] [ 6.0890 ] header_magic: 4e564441 [ 6.0900 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mce_c10_prod_cr_sigheader.bin_list.xml [ 6.0906 ] SBK key is in string form [ 6.0908 ] Key Size is 32 bytes [ 6.0984 ] [ 6.0998 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 6.1026 ] [ 6.1037 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr_sigheader.bin.encrypt [ 6.1045 ] [ 6.1052 ] tegrahost_v2 --appendsigheader mce_c10_prod_cr_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MTSM [ 6.1058 ] Header already present for mce_c10_prod_cr_sigheader.bin.encrypt [ 6.1074 ] [ 6.1076 ] header_magic: 4e564441 [ 6.1086 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mce_c10_prod_cr_sigheader.bin.encrypt_list.xml [ 6.1092 ] PKC key in Open SSL format [ 6.1095 ] Key size is 256 bytes [ 6.1097 ] Valid PKC key [ 6.1105 ] Saving pkc public key in pub_key.key [ 6.1568 ] [ 6.1587 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt.signed mce_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 6.1611 ] [ 6.1625 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin [ 6.1633 ] [ 6.1635 ] header_magic: 4e564441 [ 6.1645 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mts_c10_prod_cr_sigheader.bin_list.xml [ 6.1656 ] SBK key is in string form [ 6.1661 ] Key Size is 32 bytes [ 6.3472 ] [ 6.3487 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 6.3887 ] [ 6.3898 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin.encrypt [ 6.3917 ] [ 6.3930 ] tegrahost_v2 --appendsigheader mts_c10_prod_cr_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MTSB [ 6.3937 ] Header already present for mts_c10_prod_cr_sigheader.bin.encrypt [ 6.4278 ] [ 6.4280 ] header_magic: 4e564441 [ 6.4307 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mts_c10_prod_cr_sigheader.bin.encrypt_list.xml [ 6.4319 ] PKC key in Open SSL format [ 6.4322 ] Key size is 256 bytes [ 6.4324 ] Valid PKC key [ 6.4333 ] Saving pkc public key in pub_key.key [ 6.4871 ] [ 6.4882 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt.signed mts_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 6.5271 ] [ 6.5357 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin [ 6.5365 ] [ 6.5366 ] header_magic: 4e564441 [ 6.5376 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mts_c10_prod_cr_sigheader.bin_list.xml [ 6.5381 ] SBK key is in string form [ 6.5384 ] Key Size is 32 bytes [ 6.7280 ] [ 6.7291 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 6.7664 ] [ 6.7684 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr_sigheader.bin.encrypt [ 6.7696 ] [ 6.7705 ] tegrahost_v2 --appendsigheader mts_c10_prod_cr_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MTSB [ 6.7723 ] Header already present for mts_c10_prod_cr_sigheader.bin.encrypt [ 6.8073 ] [ 6.8075 ] header_magic: 4e564441 [ 6.8102 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mts_c10_prod_cr_sigheader.bin.encrypt_list.xml [ 6.8122 ] PKC key in Open SSL format [ 6.8125 ] Key size is 256 bytes [ 6.8127 ] Valid PKC key [ 6.8136 ] Saving pkc public key in pub_key.key [ 6.8671 ] [ 6.8683 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt.signed mts_c10_prod_cr_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 6.9061 ] [ 6.9121 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin [ 6.9129 ] [ 6.9131 ] header_magic: 4e564441 [ 6.9140 ] tegrasign_v2 --key /tmp/keys/sbk.key --list warmboot_t194_prod_sigheader.bin_list.xml [ 6.9147 ] SBK key is in string form [ 6.9150 ] Key Size is 32 bytes [ 6.9184 ] [ 6.9197 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt warmboot_t194_prod_sigheader.bin.hash zerosbk [ 6.9212 ] [ 6.9220 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin.encrypt [ 6.9228 ] [ 6.9236 ] tegrahost_v2 --appendsigheader warmboot_t194_prod_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 6.9251 ] Header already present for warmboot_t194_prod_sigheader.bin.encrypt [ 6.9259 ] [ 6.9260 ] header_magic: 4e564441 [ 6.9269 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list warmboot_t194_prod_sigheader.bin.encrypt_list.xml [ 6.9277 ] PKC key in Open SSL format [ 6.9281 ] Key size is 256 bytes [ 6.9284 ] Valid PKC key [ 6.9292 ] Saving pkc public key in pub_key.key [ 6.9752 ] [ 6.9764 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt.signed warmboot_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 6.9780 ] [ 6.9790 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin [ 6.9802 ] [ 6.9804 ] header_magic: 4e564441 [ 6.9831 ] tegrasign_v2 --key /tmp/keys/sbk.key --list warmboot_t194_prod_sigheader.bin_list.xml [ 6.9850 ] SBK key is in string form [ 6.9854 ] Key Size is 32 bytes [ 6.9899 ] [ 6.9917 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt warmboot_t194_prod_sigheader.bin.hash zerosbk [ 6.9935 ] [ 6.9943 ] tegrahost_v2 --chip 0x19 --align warmboot_t194_prod_sigheader.bin.encrypt [ 6.9950 ] [ 6.9958 ] tegrahost_v2 --appendsigheader warmboot_t194_prod_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 6.9965 ] Header already present for warmboot_t194_prod_sigheader.bin.encrypt [ 6.9973 ] [ 6.9974 ] header_magic: 4e564441 [ 6.9984 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list warmboot_t194_prod_sigheader.bin.encrypt_list.xml [ 6.9991 ] PKC key in Open SSL format [ 6.9994 ] Key size is 256 bytes [ 6.9995 ] Valid PKC key [ 7.0004 ] Saving pkc public key in pub_key.key [ 7.0471 ] [ 7.0483 ] tegrahost_v2 --chip 0x19 0 --updatesigheader warmboot_t194_prod_sigheader.bin.encrypt.signed warmboot_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 7.0498 ] [ 7.0520 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin [ 7.0531 ] [ 7.0533 ] header_magic: 4e564441 [ 7.0545 ] tegrasign_v2 --key /tmp/keys/sbk.key --list cboot_t194_sigheader.bin_list.xml [ 7.0555 ] SBK key is in string form [ 7.0557 ] Key Size is 32 bytes [ 7.0797 ] [ 7.0808 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt cboot_t194_sigheader.bin.hash zerosbk [ 7.0871 ] [ 7.0883 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin.encrypt [ 7.0890 ] [ 7.0897 ] tegrahost_v2 --appendsigheader cboot_t194_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 7.0903 ] Header already present for cboot_t194_sigheader.bin.encrypt [ 7.0945 ] [ 7.0946 ] header_magic: 4e564441 [ 7.0954 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list cboot_t194_sigheader.bin.encrypt_list.xml [ 7.0960 ] PKC key in Open SSL format [ 7.0963 ] Key size is 256 bytes [ 7.0966 ] Valid PKC key [ 7.0974 ] Saving pkc public key in pub_key.key [ 7.1451 ] [ 7.1464 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt.signed cboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 7.1529 ] [ 7.1550 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin [ 7.1558 ] [ 7.1559 ] header_magic: 4e564441 [ 7.1569 ] tegrasign_v2 --key /tmp/keys/sbk.key --list cboot_t194_sigheader.bin_list.xml [ 7.1576 ] SBK key is in string form [ 7.1579 ] Key Size is 32 bytes [ 7.1830 ] [ 7.1843 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt cboot_t194_sigheader.bin.hash zerosbk [ 7.1905 ] [ 7.1914 ] tegrahost_v2 --chip 0x19 --align cboot_t194_sigheader.bin.encrypt [ 7.1921 ] [ 7.1928 ] tegrahost_v2 --appendsigheader cboot_t194_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 7.1934 ] Header already present for cboot_t194_sigheader.bin.encrypt [ 7.1981 ] [ 7.1982 ] header_magic: 4e564441 [ 7.1992 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list cboot_t194_sigheader.bin.encrypt_list.xml [ 7.2000 ] PKC key in Open SSL format [ 7.2002 ] Key size is 256 bytes [ 7.2005 ] Valid PKC key [ 7.2016 ] Saving pkc public key in pub_key.key [ 7.2487 ] [ 7.2500 ] tegrahost_v2 --chip 0x19 0 --updatesigheader cboot_t194_sigheader.bin.encrypt.signed cboot_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 7.2564 ] [ 7.2583 ] tegrahost_v2 --chip 0x19 --align tegra194-xavier-nx-cti-NGX003_sigheader.dtb [ 7.2591 ] [ 7.2592 ] header_magic: 4e564441 [ 7.2602 ] tegrasign_v2 --key /tmp/keys/sbk.key --list tegra194-xavier-nx-cti-NGX003_sigheader.dtb_list.xml [ 7.2611 ] SBK key is in string form [ 7.2614 ] Key Size is 32 bytes [ 7.2713 ] [ 7.2724 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt tegra194-xavier-nx-cti-NGX003_sigheader.dtb.hash zerosbk [ 7.2751 ] [ 7.2760 ] tegrahost_v2 --chip 0x19 --align tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt [ 7.2768 ] [ 7.2777 ] tegrahost_v2 --appendsigheader tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 7.2785 ] Header already present for tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt [ 7.2807 ] [ 7.2809 ] header_magic: 4e564441 [ 7.2829 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt_list.xml [ 7.2838 ] PKC key in Open SSL format [ 7.2840 ] Key size is 256 bytes [ 7.2843 ] Valid PKC key [ 7.2856 ] Saving pkc public key in pub_key.key [ 7.3326 ] [ 7.3342 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt.signed tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 7.3387 ] [ 7.3411 ] tegrahost_v2 --chip 0x19 --align tegra194-xavier-nx-cti-NGX003_sigheader.dtb [ 7.3424 ] [ 7.3426 ] header_magic: 4e564441 [ 7.3443 ] tegrasign_v2 --key /tmp/keys/sbk.key --list tegra194-xavier-nx-cti-NGX003_sigheader.dtb_list.xml [ 7.3453 ] SBK key is in string form [ 7.3456 ] Key Size is 32 bytes [ 7.3557 ] [ 7.3569 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt tegra194-xavier-nx-cti-NGX003_sigheader.dtb.hash zerosbk [ 7.3598 ] [ 7.3608 ] tegrahost_v2 --chip 0x19 --align tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt [ 7.3616 ] [ 7.3624 ] tegrahost_v2 --appendsigheader tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 7.3635 ] Header already present for tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt [ 7.3661 ] [ 7.3662 ] header_magic: 4e564441 [ 7.3676 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt_list.xml [ 7.3694 ] PKC key in Open SSL format [ 7.3697 ] Key size is 256 bytes [ 7.3698 ] Valid PKC key [ 7.3707 ] Saving pkc public key in pub_key.key [ 7.4210 ] [ 7.4223 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt.signed tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 7.4259 ] [ 7.4276 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img [ 7.4284 ] [ 7.4285 ] header_magic: 4e564441 [ 7.4294 ] tegrasign_v2 --key /tmp/keys/sbk.key --list tos-trusty_t194_sigheader.img_list.xml [ 7.4301 ] SBK key is in string form [ 7.4303 ] Key Size is 32 bytes [ 7.4518 ] [ 7.4536 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 7.4606 ] [ 7.4618 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img.encrypt [ 7.4625 ] [ 7.4633 ] tegrahost_v2 --appendsigheader tos-trusty_t194_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 7.4640 ] Header already present for tos-trusty_t194_sigheader.img.encrypt [ 7.4683 ] [ 7.4686 ] header_magic: 4e564441 [ 7.4702 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list tos-trusty_t194_sigheader.img.encrypt_list.xml [ 7.4709 ] PKC key in Open SSL format [ 7.4711 ] Key size is 256 bytes [ 7.4713 ] Valid PKC key [ 7.4722 ] Saving pkc public key in pub_key.key [ 7.5192 ] [ 7.5205 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt.signed tos-trusty_t194_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 7.5258 ] [ 7.5281 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img [ 7.5292 ] [ 7.5294 ] header_magic: 4e564441 [ 7.5308 ] tegrasign_v2 --key /tmp/keys/sbk.key --list tos-trusty_t194_sigheader.img_list.xml [ 7.5316 ] SBK key is in string form [ 7.5318 ] Key Size is 32 bytes [ 7.5545 ] [ 7.5559 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 7.5614 ] [ 7.5625 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194_sigheader.img.encrypt [ 7.5632 ] [ 7.5640 ] tegrahost_v2 --appendsigheader tos-trusty_t194_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 7.5646 ] Header already present for tos-trusty_t194_sigheader.img.encrypt [ 7.5694 ] [ 7.5695 ] header_magic: 4e564441 [ 7.5713 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list tos-trusty_t194_sigheader.img.encrypt_list.xml [ 7.5720 ] PKC key in Open SSL format [ 7.5723 ] Key size is 256 bytes [ 7.5725 ] Valid PKC key [ 7.5734 ] Saving pkc public key in pub_key.key [ 7.6212 ] [ 7.6224 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt.signed tos-trusty_t194_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 7.6272 ] [ 7.6288 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img [ 7.6296 ] [ 7.6298 ] header_magic: 4e564441 [ 7.6306 ] tegrasign_v2 --key /tmp/keys/sbk.key --list eks_sigheader.img_list.xml [ 7.6314 ] SBK key is in string form [ 7.6316 ] Key Size is 32 bytes [ 7.6316 ] [ 7.6324 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 7.6335 ] [ 7.6345 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img.encrypt [ 7.6354 ] [ 7.6362 ] tegrahost_v2 --appendsigheader eks_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 7.6368 ] Header already present for eks_sigheader.img.encrypt [ 7.6370 ] [ 7.6370 ] header_magic: 4e564441 [ 7.6378 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list eks_sigheader.img.encrypt_list.xml [ 7.6384 ] PKC key in Open SSL format [ 7.6387 ] Key size is 256 bytes [ 7.6389 ] Valid PKC key [ 7.6397 ] Saving pkc public key in pub_key.key [ 7.6854 ] [ 7.6866 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt.signed eks_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 7.6876 ] [ 7.6886 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img [ 7.6892 ] [ 7.6893 ] header_magic: 4e564441 [ 7.6902 ] tegrasign_v2 --key /tmp/keys/sbk.key --list eks_sigheader.img_list.xml [ 7.6909 ] SBK key is in string form [ 7.6911 ] Key Size is 32 bytes [ 7.6912 ] [ 7.6920 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 7.6928 ] [ 7.6935 ] tegrahost_v2 --chip 0x19 --align eks_sigheader.img.encrypt [ 7.6942 ] [ 7.6949 ] tegrahost_v2 --appendsigheader eks_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 7.6955 ] Header already present for eks_sigheader.img.encrypt [ 7.6956 ] [ 7.6957 ] header_magic: 4e564441 [ 7.6967 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list eks_sigheader.img.encrypt_list.xml [ 7.6975 ] PKC key in Open SSL format [ 7.6977 ] Key size is 256 bytes [ 7.6979 ] Valid PKC key [ 7.6989 ] Saving pkc public key in pub_key.key [ 7.7427 ] [ 7.7439 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt.signed eks_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 7.7450 ] [ 7.7460 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin [ 7.7468 ] [ 7.7469 ] header_magic: 4e564441 [ 7.7476 ] tegrasign_v2 --key /tmp/keys/sbk.key --list adsp-fw_sigheader.bin_list.xml [ 7.7482 ] SBK key is in string form [ 7.7485 ] Key Size is 32 bytes [ 7.7524 ] [ 7.7533 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt adsp-fw_sigheader.bin.hash zerosbk [ 7.7552 ] [ 7.7559 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin.encrypt [ 7.7566 ] [ 7.7573 ] tegrahost_v2 --appendsigheader adsp-fw_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 7.7580 ] Header already present for adsp-fw_sigheader.bin.encrypt [ 7.7592 ] [ 7.7593 ] header_magic: 4e564441 [ 7.7604 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list adsp-fw_sigheader.bin.encrypt_list.xml [ 7.7611 ] PKC key in Open SSL format [ 7.7614 ] Key size is 256 bytes [ 7.7615 ] Valid PKC key [ 7.7624 ] Saving pkc public key in pub_key.key [ 7.8111 ] [ 7.8123 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 7.8142 ] [ 7.8154 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin [ 7.8161 ] [ 7.8163 ] header_magic: 4e564441 [ 7.8171 ] tegrasign_v2 --key /tmp/keys/sbk.key --list adsp-fw_sigheader.bin_list.xml [ 7.8178 ] SBK key is in string form [ 7.8182 ] Key Size is 32 bytes [ 7.8228 ] [ 7.8240 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt adsp-fw_sigheader.bin.hash zerosbk [ 7.8259 ] [ 7.8268 ] tegrahost_v2 --chip 0x19 --align adsp-fw_sigheader.bin.encrypt [ 7.8275 ] [ 7.8281 ] tegrahost_v2 --appendsigheader adsp-fw_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 7.8289 ] Header already present for adsp-fw_sigheader.bin.encrypt [ 7.8301 ] [ 7.8302 ] header_magic: 4e564441 [ 7.8313 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list adsp-fw_sigheader.bin.encrypt_list.xml [ 7.8320 ] PKC key in Open SSL format [ 7.8324 ] Key size is 256 bytes [ 7.8325 ] Valid PKC key [ 7.8335 ] Saving pkc public key in pub_key.key [ 7.8824 ] [ 7.8836 ] tegrahost_v2 --chip 0x19 0 --updatesigheader adsp-fw_sigheader.bin.encrypt.signed adsp-fw_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 7.8854 ] [ 7.8866 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img [ 7.8873 ] [ 7.8874 ] header_magic: 4e564441 [ 7.8882 ] tegrasign_v2 --key /tmp/keys/sbk.key --list camera-rtcpu-rce_sigheader.img_list.xml [ 7.8888 ] SBK key is in string form [ 7.8890 ] Key Size is 32 bytes [ 7.9040 ] [ 7.9052 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt camera-rtcpu-rce_sigheader.img.hash zerosbk [ 7.9088 ] [ 7.9097 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img.encrypt [ 7.9104 ] [ 7.9111 ] tegrahost_v2 --appendsigheader camera-rtcpu-rce_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 7.9118 ] Header already present for camera-rtcpu-rce_sigheader.img.encrypt [ 7.9149 ] [ 7.9152 ] header_magic: 4e564441 [ 7.9174 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list camera-rtcpu-rce_sigheader.img.encrypt_list.xml [ 7.9184 ] PKC key in Open SSL format [ 7.9187 ] Key size is 256 bytes [ 7.9189 ] Valid PKC key [ 7.9201 ] Saving pkc public key in pub_key.key [ 7.9705 ] [ 7.9716 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt.signed camera-rtcpu-rce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 7.9758 ] [ 7.9776 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img [ 7.9784 ] [ 7.9785 ] header_magic: 4e564441 [ 7.9794 ] tegrasign_v2 --key /tmp/keys/sbk.key --list camera-rtcpu-rce_sigheader.img_list.xml [ 7.9800 ] SBK key is in string form [ 7.9803 ] Key Size is 32 bytes [ 7.9954 ] [ 7.9978 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt camera-rtcpu-rce_sigheader.img.hash zerosbk [ 8.0033 ] [ 8.0044 ] tegrahost_v2 --chip 0x19 --align camera-rtcpu-rce_sigheader.img.encrypt [ 8.0053 ] [ 8.0062 ] tegrahost_v2 --appendsigheader camera-rtcpu-rce_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 8.0072 ] Header already present for camera-rtcpu-rce_sigheader.img.encrypt [ 8.0104 ] [ 8.0105 ] header_magic: 4e564441 [ 8.0118 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list camera-rtcpu-rce_sigheader.img.encrypt_list.xml [ 8.0127 ] PKC key in Open SSL format [ 8.0130 ] Key size is 256 bytes [ 8.0133 ] Valid PKC key [ 8.0141 ] Saving pkc public key in pub_key.key [ 8.0623 ] [ 8.0638 ] tegrahost_v2 --chip 0x19 0 --updatesigheader camera-rtcpu-rce_sigheader.img.encrypt.signed camera-rtcpu-rce_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 8.0677 ] [ 8.0708 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin [ 8.0727 ] [ 8.0729 ] header_magic: 4e564441 [ 8.0742 ] tegrasign_v2 --key /tmp/keys/sbk.key --list bpmp_t194_sigheader.bin_list.xml [ 8.0753 ] SBK key is in string form [ 8.0757 ] Key Size is 32 bytes [ 8.1217 ] [ 8.1237 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 8.1352 ] [ 8.1371 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin.encrypt [ 8.1381 ] [ 8.1389 ] tegrahost_v2 --appendsigheader bpmp_t194_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 8.1395 ] Header already present for bpmp_t194_sigheader.bin.encrypt [ 8.1475 ] [ 8.1476 ] header_magic: 4e564441 [ 8.1486 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list bpmp_t194_sigheader.bin.encrypt_list.xml [ 8.1493 ] PKC key in Open SSL format [ 8.1496 ] Key size is 256 bytes [ 8.1497 ] Valid PKC key [ 8.1506 ] Saving pkc public key in pub_key.key [ 8.1958 ] [ 8.1970 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt.signed bpmp_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 8.2080 ] [ 8.2107 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin [ 8.2115 ] [ 8.2116 ] header_magic: 4e564441 [ 8.2125 ] tegrasign_v2 --key /tmp/keys/sbk.key --list bpmp_t194_sigheader.bin_list.xml [ 8.2132 ] SBK key is in string form [ 8.2134 ] Key Size is 32 bytes [ 8.2605 ] [ 8.2618 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 8.2708 ] [ 8.2720 ] tegrahost_v2 --chip 0x19 --align bpmp_t194_sigheader.bin.encrypt [ 8.2731 ] [ 8.2742 ] tegrahost_v2 --appendsigheader bpmp_t194_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 8.2749 ] Header already present for bpmp_t194_sigheader.bin.encrypt [ 8.2839 ] [ 8.2840 ] header_magic: 4e564441 [ 8.2853 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list bpmp_t194_sigheader.bin.encrypt_list.xml [ 8.2860 ] PKC key in Open SSL format [ 8.2862 ] Key size is 256 bytes [ 8.2863 ] Valid PKC key [ 8.2874 ] Saving pkc public key in pub_key.key [ 8.3378 ] [ 8.3394 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt.signed bpmp_t194_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 8.3501 ] [ 8.3538 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb [ 8.3556 ] [ 8.3558 ] header_magic: 4e564441 [ 8.3568 ] tegrasign_v2 --key /tmp/keys/sbk.key --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml [ 8.3576 ] SBK key is in string form [ 8.3580 ] Key Size is 32 bytes [ 8.3705 ] [ 8.3718 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk [ 8.3768 ] [ 8.3783 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 8.3796 ] [ 8.3804 ] tegrahost_v2 --appendsigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 8.3811 ] Header already present for tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 8.3836 ] [ 8.3838 ] header_magic: 4e564441 [ 8.3853 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt_list.xml [ 8.3874 ] PKC key in Open SSL format [ 8.3877 ] Key size is 256 bytes [ 8.3879 ] Valid PKC key [ 8.3890 ] Saving pkc public key in pub_key.key [ 8.4419 ] [ 8.4435 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 8.4477 ] [ 8.4495 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb [ 8.4503 ] [ 8.4504 ] header_magic: 4e564441 [ 8.4516 ] tegrasign_v2 --key /tmp/keys/sbk.key --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml [ 8.4527 ] SBK key is in string form [ 8.4530 ] Key Size is 32 bytes [ 8.4651 ] [ 8.4666 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk [ 8.4702 ] [ 8.4713 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 8.4723 ] [ 8.4735 ] tegrahost_v2 --appendsigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 8.4764 ] Header already present for tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt [ 8.4793 ] [ 8.4795 ] header_magic: 4e564441 [ 8.4807 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt_list.xml [ 8.4815 ] PKC key in Open SSL format [ 8.4817 ] Key size is 256 bytes [ 8.4821 ] Valid PKC key [ 8.4829 ] Saving pkc public key in pub_key.key [ 8.5290 ] [ 8.5304 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 8.5341 ] [ 8.5366 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img [ 8.5395 ] [ 8.5397 ] header_magic: 4e564441 [ 8.5414 ] tegrasign_v2 --key /tmp/keys/sbk.key --list boot_sigheader.img_list.xml [ 8.5422 ] SBK key is in string form [ 8.5425 ] Key Size is 32 bytes [ 10.9946 ] [ 10.9958 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt boot_sigheader.img.hash zerosbk [ 11.4748 ] [ 11.4758 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img.encrypt [ 11.4766 ] [ 11.4773 ] tegrahost_v2 --appendsigheader boot_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 11.4779 ] Header already present for boot_sigheader.img.encrypt [ 11.9245 ] [ 11.9247 ] header_magic: 4e564441 [ 11.9263 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list boot_sigheader.img.encrypt_list.xml [ 11.9273 ] PKC key in Open SSL format [ 11.9276 ] Key size is 256 bytes [ 11.9278 ] Valid PKC key [ 11.9289 ] Saving pkc public key in pub_key.key [ 12.0611 ] [ 12.0623 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt.signed boot_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 12.5440 ] [ 12.6152 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img [ 12.6159 ] [ 12.6160 ] header_magic: 4e564441 [ 12.6169 ] tegrasign_v2 --key /tmp/keys/sbk.key --list boot_sigheader.img_list.xml [ 12.6175 ] SBK key is in string form [ 12.6178 ] Key Size is 32 bytes [ 15.0935 ] [ 15.0946 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt boot_sigheader.img.hash zerosbk [ 15.5627 ] [ 15.5639 ] tegrahost_v2 --chip 0x19 --align boot_sigheader.img.encrypt [ 15.5647 ] [ 15.5654 ] tegrahost_v2 --appendsigheader boot_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 15.5660 ] Header already present for boot_sigheader.img.encrypt [ 16.0342 ] [ 16.0343 ] header_magic: 4e564441 [ 16.0356 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list boot_sigheader.img.encrypt_list.xml [ 16.0362 ] PKC key in Open SSL format [ 16.0366 ] Key size is 256 bytes [ 16.0369 ] Valid PKC key [ 16.0376 ] Saving pkc public key in pub_key.key [ 16.1813 ] [ 16.1824 ] tegrahost_v2 --chip 0x19 0 --updatesigheader boot_sigheader.img.encrypt.signed boot_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 16.6593 ] [ 16.7382 ] tegrahost_v2 --chip 0x19 --align kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb [ 16.7408 ] [ 16.7410 ] header_magic: 4e564441 [ 16.7433 ] tegrasign_v2 --key /tmp/keys/sbk.key --list kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb_list.xml [ 16.7444 ] SBK key is in string form [ 16.7449 ] Key Size is 32 bytes [ 16.7549 ] [ 16.7563 ] tegrahost_v2 --chip 0x19 0 --updatesigheader kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.hash zerosbk [ 16.7596 ] [ 16.7616 ] tegrahost_v2 --chip 0x19 --align kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt [ 16.7630 ] [ 16.7638 ] tegrahost_v2 --appendsigheader kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 16.7645 ] Header already present for kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt [ 16.7667 ] [ 16.7668 ] header_magic: 4e564441 [ 16.7684 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt_list.xml [ 16.7693 ] PKC key in Open SSL format [ 16.7696 ] Key size is 256 bytes [ 16.7698 ] Valid PKC key [ 16.7708 ] Saving pkc public key in pub_key.key [ 16.8159 ] [ 16.8170 ] tegrahost_v2 --chip 0x19 0 --updatesigheader kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt.signed kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 16.8199 ] [ 16.8231 ] tegrahost_v2 --chip 0x19 --align kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb [ 16.8241 ] [ 16.8242 ] header_magic: 4e564441 [ 16.8253 ] tegrasign_v2 --key /tmp/keys/sbk.key --list kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb_list.xml [ 16.8261 ] SBK key is in string form [ 16.8265 ] Key Size is 32 bytes [ 16.8367 ] [ 16.8381 ] tegrahost_v2 --chip 0x19 0 --updatesigheader kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.hash zerosbk [ 16.8416 ] [ 16.8428 ] tegrahost_v2 --chip 0x19 --align kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt [ 16.8437 ] [ 16.8446 ] tegrahost_v2 --appendsigheader kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 16.8455 ] Header already present for kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt [ 16.8478 ] [ 16.8480 ] header_magic: 4e564441 [ 16.8493 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt_list.xml [ 16.8501 ] PKC key in Open SSL format [ 16.8505 ] Key size is 256 bytes [ 16.8510 ] Valid PKC key [ 16.8515 ] Saving pkc public key in pub_key.key [ 16.9008 ] [ 16.9021 ] tegrahost_v2 --chip 0x19 0 --updatesigheader kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt.signed kernel_tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 16.9051 ] [ 16.9066 ] tegrahost_v2 --chip 0x19 --align recovery_sigheader.img [ 16.9073 ] [ 16.9075 ] header_magic: 4e564441 [ 16.9083 ] tegrasign_v2 --key /tmp/keys/sbk.key --list recovery_sigheader.img_list.xml [ 16.9089 ] SBK key is in string form [ 16.9094 ] Key Size is 32 bytes [ 19.9905 ] [ 19.9920 ] tegrahost_v2 --chip 0x19 0 --updatesigheader recovery_sigheader.img.encrypt recovery_sigheader.img.hash zerosbk [ 20.5776 ] [ 20.5786 ] tegrahost_v2 --chip 0x19 --align recovery_sigheader.img.encrypt [ 20.5793 ] [ 20.5800 ] tegrahost_v2 --appendsigheader recovery_sigheader.img.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 20.5806 ] Header already present for recovery_sigheader.img.encrypt [ 21.1235 ] [ 21.1236 ] header_magic: 4e564441 [ 21.1247 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list recovery_sigheader.img.encrypt_list.xml [ 21.1256 ] PKC key in Open SSL format [ 21.1260 ] Key size is 256 bytes [ 21.1263 ] Valid PKC key [ 21.1274 ] Saving pkc public key in pub_key.key [ 21.2743 ] [ 21.2754 ] tegrahost_v2 --chip 0x19 0 --updatesigheader recovery_sigheader.img.encrypt.signed recovery_sigheader.img.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 21.9195 ] [ 22.0345 ] tegrahost_v2 --chip 0x19 --align tegra194-xavier-nx-cti-NGX003.dtb_sigheader.rec [ 22.0373 ] [ 22.0374 ] header_magic: 4e564441 [ 22.0390 ] tegrasign_v2 --key /tmp/keys/sbk.key --list tegra194-xavier-nx-cti-NGX003.dtb_sigheader.rec_list.xml [ 22.0397 ] SBK key is in string form [ 22.0399 ] Key Size is 32 bytes [ 22.0503 ] [ 22.0515 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-xavier-nx-cti-NGX003.dtb_sigheader.rec.encrypt tegra194-xavier-nx-cti-NGX003.dtb_sigheader.rec.hash zerosbk [ 22.0545 ] [ 22.0557 ] tegrahost_v2 --chip 0x19 --align tegra194-xavier-nx-cti-NGX003.dtb_sigheader.rec.encrypt [ 22.0569 ] [ 22.0579 ] tegrahost_v2 --appendsigheader tegra194-xavier-nx-cti-NGX003.dtb_sigheader.rec.encrypt oem-rsa-sbk --chip 0x19 0 --magicid DATA [ 22.0594 ] Header already present for tegra194-xavier-nx-cti-NGX003.dtb_sigheader.rec.encrypt [ 22.0630 ] [ 22.0631 ] header_magic: 4e564441 [ 22.0645 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list tegra194-xavier-nx-cti-NGX003.dtb_sigheader.rec.encrypt_list.xml [ 22.0654 ] PKC key in Open SSL format [ 22.0659 ] Key size is 256 bytes [ 22.0661 ] Valid PKC key [ 22.0673 ] Saving pkc public key in pub_key.key [ 22.1131 ] [ 22.1143 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-xavier-nx-cti-NGX003.dtb_sigheader.rec.encrypt.signed tegra194-xavier-nx-cti-NGX003.dtb_sigheader.rec.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.1177 ] [ 22.1221 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin [ 22.1241 ] [ 22.1247 ] header_magic: 50000ea [ 22.1260 ] tegrasign_v2 --key /tmp/keys/sbk.key --list nvtboot_recovery_t194.bin_list.xml [ 22.1273 ] SBK key is in string form [ 22.1276 ] Key Size is 32 bytes [ 22.1361 ] [ 22.1373 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194.bin.encrypt nvtboot_recovery_t194.bin.hash zerosbk [ 22.1385 ] [ 22.1394 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin.encrypt [ 22.1401 ] [ 22.1408 ] tegrahost_v2 --appendsigheader nvtboot_recovery_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MB2B [ 22.1416 ] adding BCH for nvtboot_recovery_t194.bin.encrypt [ 22.1446 ] [ 22.1447 ] header_magic: b6e2badd [ 22.1459 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list nvtboot_recovery_t194.bin_sigheader.encrypt_list.xml [ 22.1471 ] PKC key in Open SSL format [ 22.1476 ] Key size is 256 bytes [ 22.1479 ] Valid PKC key [ 22.1495 ] Saving pkc public key in pub_key.key [ 22.1949 ] [ 22.1961 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194.bin_sigheader.encrypt.signed nvtboot_recovery_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.1984 ] [ 22.1992 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin [ 22.1999 ] [ 22.2000 ] header_magic: 9000014 [ 22.2008 ] tegrasign_v2 --key /tmp/keys/sbk.key --list nvtboot_recovery_cpu_t194.bin_list.xml [ 22.2015 ] SBK key is in string form [ 22.2017 ] Key Size is 32 bytes [ 22.2157 ] [ 22.2169 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194.bin.encrypt nvtboot_recovery_cpu_t194.bin.hash zerosbk [ 22.2183 ] [ 22.2191 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin.encrypt [ 22.2198 ] [ 22.2205 ] tegrahost_v2 --appendsigheader nvtboot_recovery_cpu_t194.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid CPBL [ 22.2212 ] adding BCH for nvtboot_recovery_cpu_t194.bin.encrypt [ 22.2262 ] [ 22.2264 ] header_magic: a5c49b0e [ 22.2285 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list nvtboot_recovery_cpu_t194.bin_sigheader.encrypt_list.xml [ 22.2297 ] PKC key in Open SSL format [ 22.2300 ] Key size is 256 bytes [ 22.2301 ] Valid PKC key [ 22.2311 ] Saving pkc public key in pub_key.key [ 22.2766 ] [ 22.2781 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.2833 ] [ 22.2834 ] Copying signed file in /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/encrypted_signed_t19x [ 22.2843 ] Generating br-bct [ 22.2853 ] Performing cfg overlay [ 22.2853 ] ['/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1.cfg'] [ 22.2853 ] Updating dev and MSS params in BR BCT [ 22.2853 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 22.3130 ] [ 22.3131 ] Updating bl info [ 22.3141 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 22.3161 ] [ 22.3161 ] Generating br-bct [ 22.3169 ] Performing cfg overlay [ 22.3170 ] ['/data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1.cfg'] [ 22.3170 ] Updating dev and MSS params in BR BCT [ 22.3171 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 22.3524 ] [ 22.3525 ] Updating bl info [ 22.3540 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 22.3579 ] [ 22.3580 ] Updating smd info [ 22.3593 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 --updatesmdinfo flash.xml.bin [ 22.3606 ] [ 22.3606 ] Updating Odmdata [ 22.3615 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0xB8190000 [ 22.3625 ] [ 22.3625 ] Get encrypted section of bct [ 22.3633 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listencbct bct_list.xml [ 22.3641 ] [ 22.3642 ] Signing BCT [ 22.3649 ] Generating signatures with encryption [ 22.3655 ] tegrasign_v2 --key /tmp/keys/sbk.key --offset 2328 --file br_bct_BR.bct [ 22.3662 ] SBK key is in string form [ 22.3663 ] Key Size is 32 bytes [ 22.3664 ] [ 22.3664 ] Updating BCT with signature [ 22.3668 ] Get Signed section of bct [ 22.3674 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listbct bct_list.xml [ 22.3683 ] [ 22.3689 ] tegrasign_v2 --key /tmp/keys/rsa.key --list bct_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 22.3695 ] PKC key in Open SSL format [ 22.3699 ] Key size is 256 bytes [ 22.3700 ] Valid PKC key [ 22.3708 ] Saving pkc public key in pub_key.key [ 22.4147 ] [ 22.4147 ] Updating BCT with signature [ 22.4157 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key [ 22.4167 ] [ 22.4167 ] Generating coldboot mb1-bct [ 22.4183 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_cold_boot_bct.cfg --sdram /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1.cfg --misc tegra194-mb1-bct-misc-l4t.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-xavier-nx-cti-mb1-pinmux-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 22.4190 ] MB1-BCT version: 0x1 [ 22.4193 ] Parsing config file :tegra19x-xavier-nx-cti-mb1-pinmux-p3668-a01.cfg [ 22.4202 ] Added Platform Config 0 data with size :- 2400 [ 22.4207 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 22.4213 ] Added Platform Config 1 data with size :- 19640 [ 22.4299 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 22.4307 ] Added Platform Config 4 data with size :- 348 [ 22.4312 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 22.4316 ] Added Platform Config 3 data with size :- 92 [ 22.4316 ] [ 22.4316 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 22.4316 ] Added Platform Config 5 data with size :- 128 [ 22.4316 ] [ 22.4316 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 22.4316 ] Added Platform Config 7 data with size :- 392 [ 22.4316 ] [ 22.4316 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 22.4316 ] Added Platform Config 9 data with size :- 40 [ 22.4316 ] [ 22.4317 ] Updating mb1-bct with firmware information [ 22.4326 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 22.4332 ] MB1-BCT version: 0x1 [ 22.4336 ] [ 22.4336 ] Updating mb1-bct with storage information [ 22.4343 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 22.4349 ] MB1-BCT version: 0x1 [ 22.4352 ] [ 22.4359 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct [ 22.4365 ] [ 22.4367 ] header_magic: 50660000 [ 22.4375 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mb1_cold_boot_bct_MB1.bct_list.xml [ 22.4381 ] SBK key is in string form [ 22.4385 ] Key Size is 32 bytes [ 22.4397 ] [ 22.4406 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1.bct.encrypt mb1_cold_boot_bct_MB1.bct.hash zerosbk [ 22.4417 ] [ 22.4426 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct.encrypt [ 22.4437 ] [ 22.4446 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MBCT [ 22.4453 ] adding BCH for mb1_cold_boot_bct_MB1.bct.encrypt [ 22.4461 ] [ 22.4462 ] header_magic: 11629848 [ 22.4483 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mb1_cold_boot_bct_MB1.bct_sigheader.encrypt_list.xml [ 22.4493 ] PKC key in Open SSL format [ 22.4495 ] Key size is 256 bytes [ 22.4497 ] Valid PKC key [ 22.4506 ] Saving pkc public key in pub_key.key [ 22.4931 ] [ 22.4943 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.4954 ] [ 22.4955 ] Generating recovery mb1-bct [ 22.4966 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_bct.cfg --sdram /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1.cfg --misc tegra194-mb1-bct-misc-flash.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-xavier-nx-cti-mb1-pinmux-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg [ 22.4984 ] MB1-BCT version: 0x1 [ 22.4987 ] Parsing config file :tegra19x-xavier-nx-cti-mb1-pinmux-p3668-a01.cfg [ 22.4993 ] Added Platform Config 0 data with size :- 2400 [ 22.4997 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg [ 22.4999 ] Added Platform Config 1 data with size :- 19640 [ 22.5088 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg [ 22.5095 ] Added Platform Config 4 data with size :- 348 [ 22.5095 ] [ 22.5095 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg [ 22.5095 ] Added Platform Config 3 data with size :- 92 [ 22.5095 ] [ 22.5095 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg [ 22.5095 ] Added Platform Config 5 data with size :- 128 [ 22.5095 ] [ 22.5095 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg [ 22.5095 ] Added Platform Config 7 data with size :- 392 [ 22.5095 ] [ 22.5095 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg [ 22.5095 ] Added Platform Config 9 data with size :- 40 [ 22.5095 ] [ 22.5096 ] Updating mb1-bct with firmware information [ 22.5107 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin [ 22.5116 ] MB1-BCT version: 0x1 [ 22.5122 ] [ 22.5122 ] Updating mb1-bct with storage information [ 22.5132 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 22.5138 ] MB1-BCT version: 0x1 [ 22.5143 ] [ 22.5151 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct [ 22.5158 ] [ 22.5159 ] header_magic: 50660000 [ 22.5166 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mb1_bct_MB1.bct_list.xml [ 22.5172 ] SBK key is in string form [ 22.5176 ] Key Size is 32 bytes [ 22.5188 ] [ 22.5195 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1.bct.encrypt mb1_bct_MB1.bct.hash zerosbk [ 22.5203 ] [ 22.5210 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct.encrypt [ 22.5217 ] [ 22.5223 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MBCT [ 22.5230 ] adding BCH for mb1_bct_MB1.bct.encrypt [ 22.5236 ] [ 22.5237 ] header_magic: 11629848 [ 22.5246 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mb1_bct_MB1.bct_sigheader.encrypt_list.xml [ 22.5252 ] PKC key in Open SSL format [ 22.5255 ] Key size is 256 bytes [ 22.5257 ] Valid PKC key [ 22.5266 ] Saving pkc public key in pub_key.key [ 22.5724 ] [ 22.5746 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1.bct_sigheader.encrypt.signed mb1_bct_MB1.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.5760 ] [ 22.5761 ] Generating coldboot mem-bct [ 22.5768 ] tegrabct_v2 --chip 0x19 0 --sdram /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1.cfg --membct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_1.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_2.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_3.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_4.bct [ 22.5775 ] Packing sdram param for instance[0] [ 22.6028 ] Packing sdram param for instance[1] [ 22.6028 ] Packing sdram param for instance[2] [ 22.6028 ] Packing sdram param for instance[3] [ 22.6028 ] Packing sdram param for instance[4] [ 22.6028 ] Packing sdram param for instance[5] [ 22.6028 ] Packing sdram param for instance[6] [ 22.6028 ] Packing sdram param for instance[7] [ 22.6029 ] Packing sdram param for instance[8] [ 22.6029 ] Packing sdram param for instance[9] [ 22.6029 ] Packing sdram param for instance[10] [ 22.6029 ] Packing sdram param for instance[11] [ 22.6029 ] Packing sdram param for instance[12] [ 22.6029 ] Packing sdram param for instance[13] [ 22.6029 ] Packing sdram param for instance[14] [ 22.6029 ] Packing sdram param for instance[15] [ 22.6030 ] [ 22.6030 ] Getting sector size from pt [ 22.6047 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin [ 22.6066 ] [ 22.6067 ] BlockSize read from layout is 200 [ 22.6075 ] tegrasign_v2 --key /tmp/keys/sbk.key --file /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_1.bct [ 22.6082 ] SBK key is in string form [ 22.6085 ] Key Size is 32 bytes [ 22.6109 ] [ 22.6117 ] tegrasign_v2 --key /tmp/keys/sbk.key --file /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_2.bct [ 22.6123 ] SBK key is in string form [ 22.6125 ] Key Size is 32 bytes [ 22.6153 ] [ 22.6168 ] tegrasign_v2 --key /tmp/keys/sbk.key --file /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_3.bct [ 22.6175 ] SBK key is in string form [ 22.6178 ] Key Size is 32 bytes [ 22.6201 ] [ 22.6208 ] tegrasign_v2 --key /tmp/keys/sbk.key --file /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_4.bct [ 22.6214 ] SBK key is in string form [ 22.6216 ] Key Size is 32 bytes [ 22.6243 ] [ 22.6254 ] tegrahost_v2 --chip 0x19 0 --blocksize 512 --magicid MEMB --addsigheader_multi /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_1_encrypt.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_2_encrypt.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_3_encrypt.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_4_encrypt.bct [ 22.6260 ] adding BCH for /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_1_encrypt.bct [ 22.6281 ] [ 22.6287 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 22.6295 ] [ 22.6302 ] tegrahost_v2 --appendsigheader mem_coldboot.bct oem-rsa-sbk --chip 0x19 0 --magicid MEMB [ 22.6308 ] Header already present for mem_coldboot.bct [ 22.6311 ] [ 22.6312 ] header_magic: 4e564441 [ 22.6321 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mem_coldboot.bct_list.xml [ 22.6329 ] PKC key in Open SSL format [ 22.6333 ] Key size is 256 bytes [ 22.6334 ] Valid PKC key [ 22.6341 ] Saving pkc public key in pub_key.key [ 22.6775 ] [ 22.6787 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_coldboot.bct.signed mem_coldboot.bct.sig oem-rsa --pubkeyhash pub_key.key [ 22.6799 ] [ 22.6807 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 22.6813 ] [ 22.6820 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --appendsigheader mem_coldboot.bct oem-rsa [ 22.6826 ] Header already present for mem_coldboot.bct [ 22.6832 ] [ 22.6845 ] tegrasign_v2 --key /tmp/keys/rsa.key --list mem_coldboot_sigheader.bct_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 22.6866 ] PKC key in Open SSL format [ 22.6870 ] Key size is 256 bytes [ 22.6872 ] Valid PKC key [ 22.6878 ] Saving pkc public key in pub_key.key [ 22.7319 ] [ 22.7331 ] tegrahost_v2 --chip 0x19 0 --pubkeyhash pub_key.key --updatesigheader mem_coldboot_sigheader.bct.signed mem_coldboot_sigheader.bct.sig oem-rsa [ 22.7343 ] [ 22.7344 ] Generating recovery mem-bct [ 22.7353 ] tegrabct_v2 --chip 0x19 0 --sdram /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1.cfg --membct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_1.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_2.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_3.bct /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/5131/tmp3jlcjo1n1_4.bct [ 22.7360 ] Packing sdram param for instance[0] [ 22.7616 ] Packing sdram param for instance[1] [ 22.7619 ] Packing sdram param for instance[2] [ 22.7619 ] Packing sdram param for instance[3] [ 22.7619 ] Packing sdram param for instance[4] [ 22.7619 ] Packing sdram param for instance[5] [ 22.7620 ] Packing sdram param for instance[6] [ 22.7620 ] Packing sdram param for instance[7] [ 22.7620 ] Packing sdram param for instance[8] [ 22.7620 ] Packing sdram param for instance[9] [ 22.7620 ] Packing sdram param for instance[10] [ 22.7620 ] Packing sdram param for instance[11] [ 22.7620 ] Packing sdram param for instance[12] [ 22.7621 ] Packing sdram param for instance[13] [ 22.7621 ] Packing sdram param for instance[14] [ 22.7621 ] Packing sdram param for instance[15] [ 22.7621 ] [ 22.7622 ] Using default ramcode 0 [ 22.7623 ] Disabled BPMP dtb trim, using default dtb [ 22.7623 ] [ 22.7643 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct [ 22.7662 ] [ 22.7664 ] header_magic: 3000000 [ 22.7675 ] tegrasign_v2 --key /tmp/keys/sbk.key --list mem_rcm.bct_list.xml [ 22.7682 ] SBK key is in string form [ 22.7686 ] Key Size is 32 bytes [ 22.7710 ] [ 22.7721 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm.bct.encrypt mem_rcm.bct.hash zerosbk [ 22.7736 ] [ 22.7770 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct.encrypt [ 22.7783 ] [ 22.7792 ] tegrahost_v2 --appendsigheader mem_rcm.bct.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MEMB [ 22.7799 ] adding BCH for mem_rcm.bct.encrypt [ 22.7809 ] [ 22.7809 ] header_magic: d80489be [ 22.7819 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mem_rcm.bct_sigheader.encrypt_list.xml [ 22.7825 ] PKC key in Open SSL format [ 22.7830 ] Key size is 256 bytes [ 22.7831 ] Valid PKC key [ 22.7839 ] Saving pkc public key in pub_key.key [ 22.8283 ] [ 22.8294 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm.bct_sigheader.encrypt.signed mem_rcm.bct_sigheader.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.8310 ] [ 22.8332 ] nvtboot_recovery_t194.bin_sigheader.encrypt.signed [ 22.8336 ] preboot_c10_prod_cr.bin [ 22.8338 ] mce_c10_prod_cr.bin [ 22.8343 ] mts_c10_prod_cr.bin [ 22.8404 ] bpmp_t194.bin [ 22.8423 ] tegra194-a02-bpmp-p3668-a00.dtb [ 22.8431 ] spe_t194.bin [ 22.8435 ] tos-trusty_t194.img [ 22.8444 ] eks.img [ 22.8446 ] tegra194-xavier-nx-cti-NGX003.dtb [ 22.8452 ] nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed [ 22.8472 ] tegrahost_v2 --chip 0x19 --align mb1_t194_prod_sigheader.bin.encrypt [ 22.8480 ] [ 22.8491 ] tegrahost_v2 --appendsigheader mb1_t194_prod_sigheader.bin.encrypt oem-rsa-sbk --chip 0x19 0 --magicid MB1B [ 22.8500 ] Header already present for mb1_t194_prod_sigheader.bin.encrypt [ 22.8532 ] [ 22.8535 ] header_magic: 4e564441 [ 22.8554 ] tegrasign_v2 --key /tmp/keys/rsa.key --pubkeyhash pub_key.key --list mb1_t194_prod_sigheader.bin.encrypt_list.xml [ 22.8566 ] PKC key in Open SSL format [ 22.8571 ] Key size is 256 bytes [ 22.8575 ] Valid PKC key [ 22.8583 ] Saving pkc public key in pub_key.key [ 22.9057 ] [ 22.9070 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin.encrypt.signed mb1_t194_prod_sigheader.bin.encrypt.sig oem-rsa --pubkeyhash pub_key.key [ 22.9117 ] [ 22.9134 ] tegraparser_v2 --generategpt --pt flash.xml.bin [ 22.9149 ] [ 22.9215 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /data/nvidia/nvidia_sdk/JetPack_4.5_Linux_JETSON_XAVIER_NX/Linux_for_Tegra/bootloader/encrypted_signed_t19x/flash.xml.tmp flash.idx [ 24.2179 ] ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin_sigheader.encrypt.signed --bct br_bct_BR.bct --applet rcm_2_signed.rcm --applet_softfuse rcm_1_signed.rcm --cmd "secureflash;reboot" --cfg secureflash.xml --chip 0x19 --mb1_bct mb1_bct_MB1.bct_sigheader.encrypt.signed --mem_bct mem_rcm.bct_sigheader.encrypt.signed --mb1_cold_boot_bct mb1_cold_boot_bct_MB1.bct_sigheader.encrypt.signed --mem_bct_cold_boot mem_coldboot_sigheader.bct.signed --bins "mb2_bootloader nvtboot_recovery_t194.bin_sigheader.encrypt.signed; mts_preboot preboot_c10_prod_cr_sigheader.bin.encrypt.signed; mts_mce mce_c10_prod_cr_sigheader.bin.encrypt.signed; mts_proper mts_c10_prod_cr_sigheader.bin.encrypt.signed; bpmp_fw bpmp_t194_sigheader.bin.encrypt.signed; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt.signed; spe_fw spe_t194_sigheader.bin.encrypt.signed; tlk tos-trusty_t194_sigheader.img.encrypt.signed; eks eks_sigheader.img.encrypt.signed; bootloader_dtb tegra194-xavier-nx-cti-NGX003_sigheader.dtb.encrypt.signed" --skipuid saving flash command in flashcmd.txt *** Flashing target device started. *** Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0076 ] Parsing partition layout [ 0.0086 ] tegraparser_v2 --pt secureflash.xml.tmp [ 0.0103 ] [ 0.0106 ] Boot Rom communication [ 0.0119 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_1_signed.rcm --rcm rcm_2_signed.rcm --skipuid [ 0.0128 ] Bootrom returned error 22 [ 0.0421 ] Boot Rom communication failed [ 0.0422 ] Error: Return value 22