thang@thang-Vostro-7580:~/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra$ sudo BOARDID=3448 BOARDSKU=0002 FAB=300 ./build_l4t_bup.sh jetson-nano-emmc mmcblk0p1 ############################################################################### # L4T BSP Information: # R32 , REVISION: 5.1 ############################################################################### Board ID(3448) version(300) copying bctfile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/t210ref/BCT/P3448_A00_lpddr4_204Mhz_P987.cfg)... done. copying bootloader(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done. copying initrd(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/l4t_initrd.img)... done. populating kernel to rootfs... done. populating initrd to rootfs... done. populating /home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb to rootfs... done. Making Boot image... done. Existing sosfile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused. copying tegraboot(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/t210ref/nvtboot.bin)... done. copying cpu_bootloader(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done. copying bpffile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/t210ref/sc7entry-firmware.bin)... done. Existing badpagefile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/badpage.bin) reused. copying wb0boot(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/t210ref/warmboot.bin)... done. Existing tosfile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/tos-mon-only.img) reused. Existing eksfile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/eks.img) reused. copying dtbfile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb)... done. Copying nv_boot_control.conf to rootfs Skip generating system.img Existing tbcfile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused. copying tbcdtbfile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb)... done. copying cfgfile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/t210ref/cfg/flash_l4t_t210_emmc_p3448.xml) to flash.xml... done. copying flasher(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done. Existing flashapp(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/tegraflash.py) reused. ./tegraflash.py --bl cboot.bin --bct P3448_A00_lpddr4_204Mhz_P987.cfg --odmdata 0xa4000 --bldtb kernel_tegra210-p3448-0002-p3449-0000-b00.dtb --applet nvtboot_recovery.bin --cmd "sign" --cfg flash.xml --chip 0x21 --bins "EBT cboot.bin; DTB tegra210-p3448-0002-p3449-0000-b00.dtb" saving flash command in /home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/flashcmd.txt saving Windows flash command to /home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/flash_win.bat *** Sign and generate BUP... *** Signing with zerosbk ... Generating signed binaries for 3448-300-0002--1-0-jetson-nano-emmc-mmcblk0p1 ... ./tegraflash.py --bl cboot.bin --bct P3448_A00_lpddr4_204Mhz_P987.cfg --odmdata 0xa4000 --bldtb kernel_tegra210-p3448-0002-p3449-0000-b00.dtb --applet nvtboot_recovery.bin --cmd "sign" --cfg flash.xml --chip 0x21 --bins "EBT cboot.bin; DTB tegra210-p3448-0002-p3449-0000-b00.dtb" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0036 ] tegrasign --key None --getmode mode.txt [ 0.0043 ] Assuming zero filled SBK key [ 0.0043 ] [ 0.0048 ] Generating RCM messages [ 0.0054 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm nvtboot_recovery.bin 0 0 [ 0.0060 ] RCM 0 is saved as rcm_0.rcm [ 0.0063 ] RCM 1 is saved as rcm_1.rcm [ 0.0063 ] List of rcm files are saved in rcm_list.xml [ 0.0063 ] [ 0.0063 ] Signing RCM messages [ 0.0069 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0075 ] Assuming zero filled SBK key [ 0.0113 ] [ 0.0114 ] Copying signature to RCM mesages [ 0.0121 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml [ 0.0130 ] [ 0.0131 ] Parsing partition layout [ 0.0137 ] tegraparser --pt flash.xml.tmp [ 0.0146 ] [ 0.0146 ] Creating list of images to be signed [ 0.0152 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --list images_list.xml [ 0.0222 ] [ 0.0222 ] Generating signatures [ 0.0230 ] tegrasign --key None --list images_list.xml --pubkeyhash pub_key.key [ 0.0237 ] Assuming zero filled SBK key [ 0.0993 ] [ 0.0993 ] Generating br-bct [ 0.1001 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.cfg --chip 0x21 0 [ 0.1007 ] Copying Sdram info from 2 to 3 set [ 0.1027 ] [ 0.1027 ] Updating boot device parameters [ 0.1034 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatedevparam flash.xml.bin [ 0.1040 ] Warning: No sdram params [ 0.1040 ] [ 0.1041 ] Updating bl info [ 0.1048 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 0.1058 ] [ 0.1058 ] Updating secondary storage information into bct [ 0.1064 ] tegraparser --pt flash.xml.bin --chip 0x21 0 --updatecustinfo P3448_A00_lpddr4_204Mhz_P987.bct [ 0.1071 ] [ 0.1072 ] Updating Odmdata [ 0.1077 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatefields Odmdata =0xa4000 [ 0.1083 ] Warning: No sdram params [ 0.1084 ] [ 0.1084 ] Get Signed section of bct [ 0.1090 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --listbct bct_list.xml [ 0.1097 ] [ 0.1097 ] Signing BCT [ 0.1110 ] tegrasign --key None --list bct_list.xml --pubkeyhash pub_key.key [ 0.1116 ] Assuming zero filled SBK key [ 0.1119 ] [ 0.1119 ] Updating BCT with signature [ 0.1125 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatesig bct_list_signed.xml [ 0.1132 ] [ 0.1132 ] Copying signatures [ 0.1138 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml [ 0.1213 ] [ 0.1214 ] Updating BFS information on BCT [ 0.1224 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatebfsinfo flash.xml.bin [ 0.1230 ] BFS: [ 0.1241 ] 0: [PT ] flash.xml.bin (size=4359/131072) [ 0.1243 ] 1: [TBC] nvtboot_cpu.bin.encrypt (size=65760/196608) [ 0.1245 ] 2: [RP1] kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=245424/1048576) [ 0.1249 ] 3: [EBT] cboot.bin.encrypt (size=485120/655360) [ 0.1251 ] 4: [WB0] warmboot.bin.encrypt (size=3952/131072) [ 0.1253 ] 5: [BPF] sc7entry-firmware.bin.encrypt (size=3376/262144) [ 0.1256 ] BFS0: 131072 @ 2560 SUM 411396bb over 2883584 bytes [ 0.1258 ] BFS: [ 0.1261 ] 0: [PT-1] flash.xml.bin (size=4359/131072) [ 0.1264 ] 1: [TBC-1] nvtboot_cpu.bin.encrypt (size=65760/196608) [ 0.1267 ] 2: [RP1-1] kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=245424/1048576) [ 0.1270 ] 3: [EBT-1] cboot.bin.encrypt (size=485120/655360) [ 0.1272 ] 4: [WB0-1] warmboot.bin.encrypt (size=3952/131072) [ 0.1274 ] 5: [BPF-1] sc7entry-firmware.bin.encrypt (size=3376/262144) [ 0.1277 ] 8: [VER_b] emmc_bootblob_ver.txt (size=102/32768) [ 0.1279 ] 9: [VER] emmc_bootblob_ver.txt (size=102/32768) [ 0.1282 ] BFS1: 131072 @ 8704 SUM 411396bb over 2981888 bytes [ 0.1285 ] KFS: [ 0.1506 ] 0: [DTB] kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=245424/1048576) [ 0.1510 ] 1: [TOS] tos-mon-only.img.encrypt (size=54208/6291456) [ 0.1513 ] 2: [EKS] eks.img (size=1028/81920) [ 0.1515 ] 3: [LNX] boot.img.encrypt (size=661504/67092480) [ 0.1518 ] KFS0: 1048576 @ 29376546 SUM 00782c2f over 8083456 bytes [ 0.1539 ] KFS: [ 0.1770 ] 0: [DTB-1] kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=245424/1048576) [ 0.1774 ] 1: [TOS-1] tos-mon-only.img.encrypt (size=54208/6291456) [ 0.1777 ] 2: [EKS-1] eks.img (size=1028/81920) [ 0.1778 ] 3: [LNX-1] boot.img.encrypt (size=661504/67092480) [ 0.1781 ] KFS1: 1048576 @ 29522082 SUM 00782c2f over 8083456 bytes [ 0.1801 ] [ 0.1802 ] Copying signed file in /home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/signed signing images succeeded Creating update payloads for Jetson-3448-300-0002--1-0-jetson-nano-emmc-mmcblk0p1 board ... creating bl_and_kernel payload PARTITION INFO : multi_signed/3448-300-0002--1-0-jetson-nano-emmc-mmcblk0p1/P3448_A00_lpddr4_204Mhz_P987.bct BCT 2 0 3448-300-0002--1-0-jetson-nano-emmc-mmcblk0p1;multi_signed/3448-300-0002--1-0-jetson-nano-emmc-mmcblk0p1/kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt RP1 2 0 3448-300-0002--1-0-jetson-nano-emmc-mmcblk0p1;multi_signed/3448-300-0002--1-0-jetson-nano-emmc-mmcblk0p1/flash.xml.bin PT 2 0 3448-300-0002--1-0-jetson-nano-emmc-mmcblk0p1;multi_signed/3448-300-0002--1-0-jetson-nano-emmc-mmcblk0p1/emmc_bootblob_ver.txt VER 2 0 3448-300-0002--1-0-jetson-nano-emmc-mmcblk0p1;signed/nvtboot.bin.encrypt NVC 2 0 common;signed/nvtboot_cpu.bin.encrypt TBC 2 0 common;signed/cboot.bin.encrypt EBT 2 0 common;signed/warmboot.bin.encrypt WB0 2 0 common;signed/sc7entry-firmware.bin.encrypt BPF 2 0 common;signed/tos-mon-only.img.encrypt TOS 2 0 common;eks.img EKS 2 0 common;bmp.blob BMP 2 0 common;multi_signed/3448-300-0002--1-0-jetson-nano-emmc-mmcblk0p1/kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt DTB 2 0 3448-300-0002--1-0-jetson-nano-emmc-mmcblk0p1;multi_signed/3448-300-0002--1-0-jetson-nano-emmc-mmcblk0p1/boot.img.encrypt LNX 2 0 3448-300-0002--1-0-jetson-nano-emmc-mmcblk0p1 SUCCESS: bl_update_payload created creating xusb payload PARTITION INFO : rp4.blob RP4 2 0 common SUCCESS: xusb_only_payload created Payloads saved to "/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/payloads_t21x/"