jetsonhacks / bootFromExternalStorage

Shell scripts to setup a NVIDIA Jetson AGX Xavier, Xavier NX, AGX Orin, or Orin Nano Developer Kit to boot from external storage.
MIT License
155 stars 71 forks source link

request : support jetson-agx-xavier-devkit #4

Closed diamondbarcode closed 3 years ago

diamondbarcode commented 3 years ago

Describe the issue I follow instructions on the last step I got this error. I always think all Xavier AGX is the same not sure why mine show as devkit and not support.

jetson@Aurora:~/bootFromExternalStorage$ ./flash_jetson_external_storage.sh /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra Checking Jetson ... *** Checking target board connection ... 1 connections found. jetson-agx-xavier-devkit found. ERROR: Unsupported device. This method currently only works for the Jetson AGX Xavier and Jetson Xavier NX Development Kits.

Which version of Ubuntu on the Host machine Ubuntu version: 18.0.4

What version of L4T/JetPack L4T/JetPack version: 4.6

Which Jetson Jetson: AGX 32GB version

jetsonhacks commented 3 years ago

Yes, it looks like I bungled. This line if [[ $FLASH_BOARDID == *"jetson-xavier-nx-devkit"* ]] ; then I forgot to add in the jetson-agx-xavier-devkit test.

diamondbarcode commented 3 years ago

Thank Jim, i think i got it

diamondbarcode commented 3 years ago

i add or line to that line to make it flash AGX however, when it done my AGX just go blank .. It boot and accept SSH in ( i cant SSH because there is no user name or password ) .. It wont event go to screen that require me to type username and password

jetsonhacks commented 3 years ago

What model and brand of NVMe SSD are you using?

diamondbarcode commented 3 years ago

I am using " Samsung 970 PRO SSD 512GB - M.2 NVMe " . If I restore the system back to jetpack 4.5.1 it boots just fine.

It is something that happens if I flash with SDK manager to jetpack 4.6.1 ( it ask to enter user name and password ) and go blank. When I use this script it won't ask me to enter the user and password it just goes blank .. I can try to SSH in it allow but no user name or password to enter ..

anhmiuhv commented 3 years ago

can you paste the flash log here?

diamondbarcode commented 3 years ago

can you paste the flash log here?

when flashing it successfully no error it goes to the last part end stop normal I did not save it. AGX reboot once during flashing

anhmiuhv commented 3 years ago

Ok I see. Does it show something like this at the end?

Note: The flash process might have added some nvidia-flash-* connections in
NetworkManager to set up USB ethernet through flashing port (L4t USB Device mode).
You might want to check your NetworkManager configuration if you have some special
configuration.
Reboot target
Run command: sync; { sleep 1; reboot; } >/dev/null & on root@fe80::1%usb0
bash: warning: setlocale: LC_ALL: cannot change locale (C.UTF-8)
Success
Cleaning up...
Log is saved to Linux_for_Tegra/initrdlog/flash_1-2.2_0_20210826-114426.log 

If there is no username / password, how do you ssh in ?

diamondbarcode commented 3 years ago

@anhmiuhv I dont think I see this in the last part ..

when i try to ssh it keeps get fails to log on / access deniedd.. I just reflash with 4.5.1 since I can't ssh in or anything .. i will try this again when i back and post copy everything here ..

anhmiuhv commented 3 years ago

NVM, I think for Xavier log looks like this

Ongoing processes: 25568
Ongoing processes: 25568
Ongoing processes: 25568
Ongoing processes: 25568
Ongoing processes: 25568
Ongoing processes: 25568
Ongoing processes:
Flash complete

Regarding the SSH problem, I think you need to do oem-config on the monitor first before you can ssh into the device right?

diamondbarcode commented 3 years ago

here from flash output

` jetson@aurora:~/bootFromExternalStorage$ ./flash_jetson_external_storage.sh /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra Checking Jetson ... Checking target board connection ... 1 connections found. jetson-agx-xavier-devkit found. Flashing to nvme0n1p1 nvme0n1p1 user entered nvme0n1p1 Checking ONLINE mode ... OK. Checking target board connection ... 1 connections found. Reading ECID ... FUSELEVEL=fuselevel_production hwchipid=0x19 bootauth=NS *** Reading EEPROM ... --- Copying tegra194-mb1-soft-fuses-l4t.cfg succeeded. "/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py" --chip 0x19 --applet "/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod.bin" --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --bins "mb2_applet nvtboot_applet_t194.bin" --skipuid --cmd "dump eeprom boardinfo cvm.bin; dump eeprom baseinfo bbd.bin; reboot recovery" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0018 ] Generating RCM messages [ 0.0034 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod.bin zerosbk [ 0.0038 ] Header already present for /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod.bin [ 0.0059 ] [ 0.0078 ] tegrasign_v3.py --getmode mode.txt --key None [ 0.0078 ] Assuming zero filled SBK key [ 0.0094 ] tegrasign_v3.py --file /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.bin --key None --length 1136 --offset 2960 --pubkeyhash pub_key.key [ 0.0094 ] Assuming zero filled SBK key [ 0.0125 ] tegrahost_v2 --chip 0x19 0 --updatesigheader /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.bin /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.hash zerosbk [ 0.0148 ] [ 0.0166 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg.pdf sfuse.bin [ 0.0171 ] [ 0.0189 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.bin 0 0 [ 0.0193 ] RCM 0 is saved as rcm_0.rcm [ 0.0213 ] RCM 1 is saved as rcm_1.rcm [ 0.0214 ] RCM 2 is saved as rcm_2.rcm [ 0.0214 ] List of rcm files are saved in rcm_list.xml [ 0.0214 ] [ 0.0214 ] Signing RCM messages [ 0.0233 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key None --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0233 ] Assuming zero filled SBK key [ 0.0269 ] Copying signature to RCM mesages [ 0.0284 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml [ 0.0292 ] [ 0.0292 ] Boot Rom communication [ 0.0308 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_list_signed.xml --skipuid [ 0.0312 ] RCM version 0X190001 [ 0.3470 ] Boot Rom communication completed [ 1.3633 ] [ 2.3688 ] tegrarcm_v2 --isapplet [ 2.3711 ] Applet version 01.00.0000 [ 3.0204 ] [ 3.0221 ] tegrarcm_v2 --ismb2 [ 3.6919 ] [ 3.6938 ] tegrahost_v2 --chip 0x19 --align nvtboot_applet_t194.bin [ 3.6942 ] [ 3.6960 ] tegrahost_v2 --chip 0x19 0 --magicid PLDT --appendsigheader nvtboot_applet_t194.bin zerosbk [ 3.6964 ] adding BCH for nvtboot_applet_t194.bin [ 3.6982 ] [ 3.7005 ] tegrasign_v3.py --key None --list nvtboot_applet_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 3.7005 ] Assuming zero filled SBK key [ 3.7035 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_applet_t194_sigheader.bin.encrypt nvtboot_applet_t194_sigheader.bin.hash zerosbk [ 3.7052 ] [ 3.7070 ] tegrarcm_v2 --download mb2 nvtboot_applet_t194_sigheader.bin.encrypt [ 3.7077 ] Applet version 01.00.0000 [ 4.1794 ] Sending mb2 [ 4.1796 ] [................................................] 100% [ 4.1951 ] [ 4.1990 ] tegrarcm_v2 --boot recovery [ 4.1996 ] Applet version 01.00.0000 [ 4.8955 ] [ 5.9009 ] tegrarcm_v2 --isapplet [ 6.5563 ] [ 6.5580 ] tegrarcm_v2 --ismb2 [ 6.5584 ] MB2 Applet version 01.00.0000 [ 7.0432 ] [ 7.0471 ] tegrarcm_v2 --ismb2 [ 7.0493 ] MB2 Applet version 01.00.0000 [ 7.7566 ] [ 7.7585 ] Retrieving board information [ 7.7602 ] tegrarcm_v2 --oem platformdetails chip chip_info.bin [ 7.7606 ] MB2 Applet version 01.00.0000 [ 8.4265 ] Saved platform info in chip_info.bin [ 8.4308 ] Chip minor revision: 2 [ 8.4309 ] Bootrom revision: 0xf [ 8.4309 ] Ram code: 0x2 [ 8.4309 ] Chip sku: 0xd0 [ 8.4310 ] Chip Sample: non es [ 8.4315 ] [ 8.4317 ] Retrieving EEPROM data [ 8.4317 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/cvm.bin [ 8.4322 ] MB2 Applet version 01.00.0000 [ 8.5882 ] Saved platform info in /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/cvm.bin [ 8.6222 ] [ 8.6225 ] Generating RCM messages [ 8.6248 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod.bin zerosbk [ 8.6252 ] Header already present for /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod.bin [ 8.6271 ] [ 8.6289 ] tegrasign_v3.py --getmode mode.txt --key None [ 8.6289 ] Assuming zero filled SBK key [ 8.6307 ] tegrasign_v3.py --file /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.bin --key None --length 1136 --offset 2960 --pubkeyhash pub_key.key [ 8.6307 ] Assuming zero filled SBK key [ 8.6337 ] tegrahost_v2 --chip 0x19 0 --updatesigheader /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.bin /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.hash zerosbk [ 8.6358 ] [ 8.6375 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg.pdf sfuse.bin [ 8.6380 ] [ 8.6397 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.bin 0 0 [ 8.6401 ] RCM 0 is saved as rcm_0.rcm [ 8.6420 ] RCM 1 is saved as rcm_1.rcm [ 8.6421 ] RCM 2 is saved as rcm_2.rcm [ 8.6421 ] List of rcm files are saved in rcm_list.xml [ 8.6421 ] [ 8.6421 ] Signing RCM messages [ 8.6440 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key None --list rcm_list.xml --pubkeyhash pub_key.key [ 8.6440 ] Assuming zero filled SBK key [ 8.6480 ] Copying signature to RCM mesages [ 8.6496 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml [ 8.6504 ] [ 8.6504 ] Boot Rom communication [ 8.6519 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_list_signed.xml [ 8.6523 ] BootRom is not running [ 14.2179 ] [ 15.2235 ] tegrarcm_v2 --isapplet [ 15.3676 ] [ 15.3716 ] tegrarcm_v2 --ismb2 [ 15.3738 ] MB2 Applet version 01.00.0000 [ 15.5703 ] [ 15.5720 ] tegrarcm_v2 --ismb2 [ 15.5724 ] MB2 Applet version 01.00.0000 [ 16.2808 ] [ 16.2827 ] Retrieving board information [ 16.2844 ] tegrarcm_v2 --oem platformdetails chip chip_info.bin [ 16.2847 ] MB2 Applet version 01.00.0000 [ 16.8374 ] Saved platform info in chip_info.bin [ 16.8416 ] Chip minor revision: 2 [ 16.8416 ] Bootrom revision: 0xf [ 16.8417 ] Ram code: 0x2 [ 16.8417 ] Chip sku: 0xd0 [ 16.8418 ] Chip Sample: non es [ 16.8424 ] [ 16.8425 ] Retrieving EEPROM data [ 16.8425 ] tegrarcm_v2 --oem platformdetails eeprom cvb /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/bbd.bin [ 16.8430 ] MB2 Applet version 01.00.0000 [ 17.0016 ] Saved platform info in /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/bbd.bin [ 17.0355 ] [ 17.0357 ] Rebooting to recovery mode [ 17.0386 ] tegrarcm_v2 --ismb2 [ 17.0390 ] MB2 Applet version 01.00.0000 [ 17.2026 ] [ 17.2027 ] Rebooting to recovery mode [ 17.2066 ] tegrarcm_v2 --reboot recovery [ 17.2088 ] MB2 Applet version 01.00.0000 [ 17.9191 ] --- Reading board information succeeded. Parsing baseboard EEPROM: --- Parsing board ID (2822) succeeded. --- Parsing board version (700) succeeded. --- Parsing board SKU (0000) succeeded. --- Parsing board REV (K.0) succeeded. Parsing module EEPROM: --- Parsing board ID (2888) succeeded. --- Parsing board version (400) succeeded. --- Parsing board SKU (0004) succeeded. --- Parsing board REV (L.0) succeeded. jetson-agx-xavier-devkit found. Parsing boardid successful Target board is jetson-agx-xavier-devkit External storage specified nvme0n1p1 Flashing Jetson Xavier /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh --no-flash --external-device nvme0n1p1 -c tools/kernel_flash/flash_l4t_external.xml jetson-agx-xavier-devkit nvme0n1p1


###############################################################################

L4T BSP Information:

R32 , REVISION: 6.1

############################################################################### copying soft_fuses(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. ./tegraflash.py --chip 0x19 --applet "/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod.bin" --skipuid --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --bins "mb2_applet nvtboot_applet_t194.bin" --cmd "dump eeprom boardinfo cvm.bin;reboot recovery" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0020 ] Generating RCM messages [ 0.0038 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod.bin zerosbk [ 0.0044 ] Header already present for /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod.bin [ 0.0063 ] [ 0.0083 ] tegrasign_v3.py --getmode mode.txt --key None [ 0.0083 ] Assuming zero filled SBK key [ 0.0102 ] tegrasign_v3.py --file /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.bin --key None --length 1136 --offset 2960 --pubkeyhash pub_key.key [ 0.0102 ] Assuming zero filled SBK key [ 0.0131 ] tegrahost_v2 --chip 0x19 0 --updatesigheader /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.bin /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.hash zerosbk [ 0.0153 ] [ 0.0170 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg.pdf sfuse.bin [ 0.0175 ] [ 0.0190 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.bin 0 0 [ 0.0194 ] RCM 0 is saved as rcm_0.rcm [ 0.0213 ] RCM 1 is saved as rcm_1.rcm [ 0.0213 ] RCM 2 is saved as rcm_2.rcm [ 0.0213 ] List of rcm files are saved in rcm_list.xml [ 0.0213 ] [ 0.0213 ] Signing RCM messages [ 0.0231 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key None --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0231 ] Assuming zero filled SBK key [ 0.0269 ] Copying signature to RCM mesages [ 0.0284 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml [ 0.0292 ] [ 0.0292 ] Boot Rom communication [ 0.0307 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_list_signed.xml --skipuid [ 0.0312 ] RCM version 0X190001 [ 0.3476 ] Boot Rom communication completed [ 1.3637 ] [ 2.3688 ] tegrarcm_v2 --isapplet [ 2.3712 ] Applet version 01.00.0000 [ 2.5113 ] [ 2.5130 ] tegrarcm_v2 --ismb2 [ 2.7115 ] [ 2.7140 ] tegrahost_v2 --chip 0x19 --align nvtboot_applet_t194.bin [ 2.7145 ] [ 2.7160 ] tegrahost_v2 --chip 0x19 0 --magicid PLDT --appendsigheader nvtboot_applet_t194.bin zerosbk [ 2.7164 ] adding BCH for nvtboot_applet_t194.bin [ 2.7181 ] [ 2.7204 ] tegrasign_v3.py --key None --list nvtboot_applet_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 2.7205 ] Assuming zero filled SBK key [ 2.7232 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_applet_t194_sigheader.bin.encrypt nvtboot_applet_t194_sigheader.bin.hash zerosbk [ 2.7246 ] [ 2.7262 ] tegrarcm_v2 --download mb2 nvtboot_applet_t194_sigheader.bin.encrypt [ 2.7266 ] Applet version 01.00.0000 [ 2.9106 ] Sending mb2 [ 2.9106 ] [................................................] 100% [ 2.9261 ] [ 2.9279 ] tegrarcm_v2 --boot recovery [ 2.9284 ] Applet version 01.00.0000 [ 3.1183 ] [ 4.1235 ] tegrarcm_v2 --isapplet [ 4.2708 ] [ 4.2748 ] tegrarcm_v2 --ismb2 [ 4.2771 ] MB2 Applet version 01.00.0000 [ 4.4750 ] [ 4.4770 ] tegrarcm_v2 --ismb2 [ 4.4774 ] MB2 Applet version 01.00.0000 [ 4.6829 ] [ 4.6847 ] Retrieving board information [ 4.6864 ] tegrarcm_v2 --oem platformdetails chip chip_info.bin [ 4.6868 ] MB2 Applet version 01.00.0000 [ 5.3995 ] Saved platform info in chip_info.bin [ 5.4035 ] Chip minor revision: 2 [ 5.4036 ] Bootrom revision: 0xf [ 5.4037 ] Ram code: 0x2 [ 5.4037 ] Chip sku: 0xd0 [ 5.4037 ] Chip Sample: non es [ 5.4043 ] [ 5.4052 ] Retrieving EEPROM data [ 5.4052 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/cvm.bin [ 5.4057 ] MB2 Applet version 01.00.0000 [ 5.5622 ] Saved platform info in /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/cvm.bin [ 5.5968 ] [ 5.5970 ] Rebooting to recovery mode [ 5.6008 ] tegrarcm_v2 --ismb2 [ 5.6030 ] MB2 Applet version 01.00.0000 [ 5.7643 ] [ 5.7644 ] Rebooting to recovery mode [ 5.7682 ] tegrarcm_v2 --reboot recovery [ 5.7704 ] MB2 Applet version 01.00.0000 [ 5.9791 ] Board ID(2888) version(400) sku(0004) revision(L.0) Copy /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/kernel/dtb/tegra194-p2888-0001-p2822-0000.dtb to /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/kernel/dtb/tegra194-p2888-0001-p2822-0000.dtb.rec copying bctfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-memcfg-p2888.cfg)... done. copying bctfile1(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-memcfg-sw-override.cfg)... done. copying uphy_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg)... done. copying minratchet_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg)... done. copying device_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-bct-device-sdmmc.cfg)... done. copying misc_cold_boot_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-l4t.cfg)... done. copying misc_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-flash.cfg)... done. copying pinmux_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg)... done. copying gpioint_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg)... done. copying pmic_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg)... done. copying pmc_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg)... done. copying prod_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg)... done. copying scr_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini.cfg)... done. copying scr_cold_boot_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini.cfg)... done. copying bootrom_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg)... done. copying dev_params(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-br-bct-sdmmc.cfg)... done. Existing bootloader(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. copying initrd(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/l4t_initrd.img)... done. Making Boot image... done. /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key --minratchet_config tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg --cmd sign boot.img kernel Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0003 ] Generating signature [ 0.0022 ] tegrasign_v3.py --getmode mode.txt --key [ 0.0023 ] Assuming zero filled SBK key : not reading [ 0.0023 ] Generating ratchet blob [ 0.0041 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 0.0047 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0047 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0047 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0047 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0047 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0047 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0047 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0047 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0047 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0047 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0047 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0047 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0047 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0047 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0048 ] [ 0.0049 ] header_magic: 414e4452 [ 0.0054 ] tegrahost_v2 --chip 0x19 --align 1_boot.img [ 0.0059 ] [ 0.0064 ] tegrahost_v2 --chip 0x19 0 --magicid KRNL --ratchet_blob ratchet_blob.bin --appendsigheader 1_boot.img zerosbk [ 0.0067 ] adding BCH for 1_boot.img [ 0.5627 ] [ 0.5651 ] tegrasign_v3.py --key --list 1_boot_sigheader.img_list.xml --pubkeyhash pub_key.key [ 0.5651 ] Assuming zero filled SBK key : not reading [ 0.6213 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot_sigheader.img.encrypt 1_boot_sigheader.img.hash zerosbk [ 0.9901 ] [ 1.0500 ] Signed file: /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt l4t_sign_image.sh: Generate header for boot_sigheader.img.encrypt l4t_sign_image.sh: chip 0x19: add 0x27cb800 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot_sigheader.img.encrypt l4t_sign_image.sh: the signed file is /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt done. Making recovery ramdisk for recovery image... Re-generating recovery ramdisk for recovery image... ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/ramdisk_tmp ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra 30412 blocks _BASE_KERNEL_VERSION=4.9.253-tegra ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/ramdisk_tmp/lib ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/ramdisk_tmp ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra 66117 blocks Making Recovery image... copying recdtbfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/kernel/dtb/tegra194-p2888-0001-p2822-0000.dtb.rec)... done. 20+0 records in 20+0 records out 20 bytes copied, 6.9338e-05 s, 288 kB/s Existing sosfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing tegraboot(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/nvtboot_t194.bin) reused. Existing cpu_bootloader(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. Existing mb2blfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/nvtboot_recovery_t194.bin) reused. Existing mtspreboot(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/preboot_c10_prod_cr.bin) reused. Existing mcepreboot(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mce_c10_prod_cr.bin) reused. Existing mtsproper(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mts_c10_prod_cr.bin) reused. Existing mb1file(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing bpffile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/bpmp_t194.bin) reused. copying bpfdtbfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/tegra194-a02-bpmp-p2888-a04.dtb)... done. Existing scefile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. Existing camerafw(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/camera-rtcpu-rce.img) reused. Existing spefile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/spe_t194.bin) reused. Existing wb0boot(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/warmboot_t194_prod.bin) reused. Existing tosfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tos-trusty_t194.img) reused. Existing eksfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/eks.img) reused. copying soft_fuses(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. copying dtbfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/kernel/dtb/tegra194-p2888-0001-p2822-0000.dtb)... done. Copying nv_boot_control.conf to rootfs /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key --minratchet_config tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg --cmd sign kernel_tegra194-p2888-0001-p2822-0000.dtb kernel_dtb Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0003 ] Generating signature [ 0.0024 ] tegrasign_v3.py --getmode mode.txt --key [ 0.0025 ] Assuming zero filled SBK key : not reading [ 0.0025 ] Generating ratchet blob [ 0.0043 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 0.0047 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0048 ] [ 0.0049 ] header_magic: d00dfeed [ 0.0066 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p2888-0001-p2822-0000.dtb [ 0.0088 ] [ 0.0122 ] tegrahost_v2 --chip 0x19 0 --magicid KDTB --ratchet_blob ratchet_blob.bin --appendsigheader 1_kernel_tegra194-p2888-0001-p2822-0000.dtb zerosbk [ 0.0141 ] adding BCH for 1_kernel_tegra194-p2888-0001-p2822-0000.dtb [ 0.0213 ] [ 0.0234 ] tegrasign_v3.py --key --list 1_kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 0.0234 ] Assuming zero filled SBK key : not reading [ 0.0265 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt 1_kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.hash zerosbk [ 0.0290 ] [ 0.0292 ] Signed file: /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt l4t_sign_image.sh: Generate header for kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt l4t_sign_image.sh: chip 0x19: add 0x45651 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt l4t_sign_image.sh: the signed file is /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt done. populating kernel to rootfs... done. populating initrd to rootfs... done. populating kernel_tegra194-p2888-0001-p2822-0000.dtb to rootfs... done. Making system.img... populating rootfs from /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/rootfs ... populating /boot/extlinux/extlinux.conf ... done. generating sig file of Image ... /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key --minratchet_config tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg --cmd sign ./boot/Image kernel Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0003 ] Generating signature [ 0.0021 ] tegrasign_v3.py --getmode mode.txt --key [ 0.0021 ] Assuming zero filled SBK key : not reading [ 0.0021 ] Generating ratchet blob [ 0.0036 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 0.0040 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0041 ] [ 0.0041 ] header_magic: 405614 [ 0.0057 ] tegrahost_v2 --chip 0x19 --align 1_Image [ 0.0061 ] [ 0.0077 ] tegrahost_v2 --chip 0x19 0 --magicid KRNL --ratchet_blob ratchet_blob.bin --appendsigheader 1_Image zerosbk [ 0.0081 ] adding BCH for 1_Image [ 0.4537 ] [ 0.4562 ] tegrasign_v3.py --key --list 1_Image_sigheader_list.xml --pubkeyhash pub_key.key [ 0.4562 ] Assuming zero filled SBK key : not reading [ 0.4989 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_Image_sigheader.encrypt 1_Image_sigheader.hash zerosbk [ 0.7417 ] [ 0.7564 ] Signed file: /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mnt/Image_sigheader.encrypt l4t_sign_image.sh: Generate header for Image_sigheader.encrypt l4t_sign_image.sh: chip 0x19: add 0x20e3008 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for Image_sigheader.encrypt l4t_sign_image.sh: the sign header is saved at ./boot/Image.sig done. done. generating sig file of kernel_tegra194-p2888-0001-p2822-0000.dtb ... /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key --minratchet_config tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg --cmd sign ./boot/dtb/kernel_tegra194-p2888-0001-p2822-0000.dtb kernel_dtb Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0003 ] Generating signature [ 0.0023 ] tegrasign_v3.py --getmode mode.txt --key [ 0.0023 ] Assuming zero filled SBK key : not reading [ 0.0023 ] Generating ratchet blob [ 0.0039 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 0.0044 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0044 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0044 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0044 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0044 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0044 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0044 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0044 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0044 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0045 ] [ 0.0045 ] header_magic: d00dfeed [ 0.0061 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p2888-0001-p2822-0000.dtb [ 0.0066 ] [ 0.0080 ] tegrahost_v2 --chip 0x19 0 --magicid KDTB --ratchet_blob ratchet_blob.bin --appendsigheader 1_kernel_tegra194-p2888-0001-p2822-0000.dtb zerosbk [ 0.0084 ] adding BCH for 1_kernel_tegra194-p2888-0001-p2822-0000.dtb [ 0.0124 ] [ 0.0146 ] tegrasign_v3.py --key --list 1_kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 0.0146 ] Assuming zero filled SBK key : not reading [ 0.0175 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt 1_kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.hash zerosbk [ 0.0200 ] [ 0.0202 ] Signed file: /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mnt/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt l4t_sign_image.sh: Generate header for kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt l4t_sign_image.sh: chip 0x19: add 0x45651 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt l4t_sign_image.sh: the sign header is saved at ./boot/dtb/kernel_tegra194-p2888-0001-p2822-0000.dtb.sig done. done. generating sig file of initrd ... /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key --cmd sign ./boot/initrd data Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0004 ] Generating signature [ 0.0023 ] tegrasign_v3.py --getmode mode.txt --key [ 0.0024 ] Assuming zero filled SBK key : not reading [ 0.0024 ] header_magic: 1f8b0800 [ 0.0042 ] tegrahost_v2 --chip 0x19 --align 1_initrd [ 0.0049 ] [ 0.0065 ] tegrahost_v2 --chip 0x19 0 --magicid DATA --appendsigheader 1_initrd zerosbk [ 0.0069 ] adding BCH for 1_initrd [ 0.1032 ] [ 0.1056 ] tegrasign_v3.py --key --list 1_initrd_sigheader_list.xml --pubkeyhash pub_key.key [ 0.1057 ] Assuming zero filled SBK key : not reading [ 0.1162 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_initrd_sigheader.encrypt 1_initrd_sigheader.hash zerosbk [ 0.1665 ] [ 0.1696 ] Signed file: /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mnt/initrd_sigheader.encrypt l4t_sign_image.sh: Generate header for initrd_sigheader.encrypt l4t_sign_image.sh: chip 0x19: add 0x6e72c8 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for initrd_sigheader.encrypt l4t_sign_image.sh: the sign header is saved at ./boot/initrd.sig done. done. generating sig file of extlinux.conf ... /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key --cmd sign ./boot/extlinux/extlinux.conf data Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0003 ] Generating signature [ 0.0022 ] tegrasign_v3.py --getmode mode.txt --key [ 0.0022 ] Assuming zero filled SBK key : not reading [ 0.0022 ] header_magic: 54494d45 [ 0.0040 ] tegrahost_v2 --chip 0x19 --align 1_extlinux.conf [ 0.0045 ] [ 0.0063 ] tegrahost_v2 --chip 0x19 0 --magicid DATA --appendsigheader 1_extlinux.conf zerosbk [ 0.0069 ] adding BCH for 1_extlinux.conf [ 0.0070 ] [ 0.0094 ] tegrasign_v3.py --key --list 1_extlinux_sigheader.conf_list.xml --pubkeyhash pub_key.key [ 0.0095 ] Assuming zero filled SBK key : not reading [ 0.0126 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_extlinux_sigheader.conf.encrypt 1_extlinux_sigheader.conf.hash zerosbk [ 0.0131 ] [ 0.0132 ] Signed file: /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mnt/extlinux_sigheader.conf.encrypt l4t_sign_image.sh: Generate header for extlinux_sigheader.conf.encrypt l4t_sign_image.sh: chip 0x19: add 0x360 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for extlinux_sigheader.conf.encrypt l4t_sign_image.sh: the sign header is saved at ./boot/extlinux/extlinux.conf.sig done. done. Sync'ing system.img ... done. Converting RAW image to Sparse image... done. system.img built successfully. Existing tbcfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/cboot_t194.bin) reused. copying tbcdtbfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/kernel/dtb/tegra194-p2888-0001-p2822-0000.dtb)... done. copying cfgfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/flash_l4t_external.xml) to flash.xml... done. Existing flasher(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu_t194.bin) reused. Existing flashapp(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py) reused. ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin --sdram_config tegra194-mb1-bct-memcfg-p2888.cfg,tegra194-memcfg-sw-override.cfg --odmdata 0x9190000 --applet mb1_t194_prod.bin --cmd "sign" --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --cfg flash.xml --chip 0x19 --uphy_config tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg --minratchet_config tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg --device_config tegra19x-mb1-bct-device-sdmmc.cfg --misc_cold_boot_config tegra194-mb1-bct-misc-l4t.cfg --misc_config tegra194-mb1-bct-misc-flash.cfg --pinmux_config tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg --gpioint_config tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg --pmic_config tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg --pmc_config tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg --prod_config tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg --scr_config tegra194-mb1-bct-scr-cbb-mini.cfg --scr_cold_boot_config tegra194-mb1-bct-scr-cbb-mini.cfg --br_cmd_config tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg --dev_params tegra194-br-bct-sdmmc.cfg --bin "mb2_bootloader nvtboot_recovery_t194.bin; mts_preboot preboot_c10_prod_cr.bin; mts_mce mce_c10_prod_cr.bin; mts_proper mts_c10_prod_cr.bin; bpmp_fw bpmp_t194.bin; bpmp_fw_dtb tegra194-a02-bpmp-p2888-a04.dtb; spe_fw spe_t194.bin; tlk tos-trusty_t194.img; eks eks.img; bootloader_dtb tegra194-p2888-0001-p2822-0000.dtb" --external_device --ramcode 2 saving flash command in /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/flashcmd.txt saving Windows flash command to /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/flash_win.bat Sign and generate flashing ready partition images... Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0032 ] Reading ramcode from backup chip_info.bin file [ 0.0032 ] RAMCODE Read from Device: 2

[ 0.0033 ] Disable BPMP dtb trim, using default dtb [ 0.0033 ] [ 0.0050 ] tegrasign_v3.py --getmode mode.txt --key None [ 0.0050 ] Assuming zero filled SBK key [ 0.0050 ] Generating RCM messages [ 0.0066 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod.bin zerosbk [ 0.0071 ] Header already present for mb1_t194_prod.bin [ 0.0089 ] [ 0.0107 ] tegrasign_v3.py --getmode mode.txt --key None [ 0.0107 ] Assuming zero filled SBK key [ 0.0126 ] tegrasign_v3.py --file mb1_t194_prod_sigheader.bin --key None --length 1136 --offset 2960 --pubkeyhash pub_key.key [ 0.0126 ] Assuming zero filled SBK key [ 0.0159 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin mb1_t194_prod_sigheader.hash zerosbk [ 0.0182 ] [ 0.0201 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg sfuse.bin [ 0.0208 ] [ 0.0225 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 0.0229 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0230 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0230 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0230 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0230 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0230 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0230 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0230 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0230 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0230 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0231 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0231 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0231 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0231 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0231 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0231 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0231 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0231 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0231 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0231 ] [ 0.0248 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_sigheader.bin 0 0 [ 0.0264 ] RCM 0 is saved as rcm_0.rcm [ 0.0342 ] RCM 1 is saved as rcm_1.rcm [ 0.0342 ] RCM 2 is saved as rcm_2.rcm [ 0.0342 ] List of rcm files are saved in rcm_list.xml [ 0.0342 ] [ 0.0343 ] Signing RCM messages [ 0.0374 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key None --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0376 ] Assuming zero filled SBK key [ 0.0521 ] Copying signature to RCM mesages [ 0.0551 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml [ 0.0579 ] [ 0.0580 ] Parsing partition layout [ 0.0609 ] tegraparser_v2 --pt flash.xml.tmp [ 0.0630 ] [ 0.0631 ] Creating list of images to be signed [ 0.0660 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --ratchet_blob ratchet_blob.bin --list images_list.xml zerosbk [ 0.0676 ] adding BCH for boot.img [ 0.0844 ] adding BCH for boot.img [ 0.6312 ] adding BCH for kernel_tegra194-p2888-0001-p2822-0000.dtb [ 1.2712 ] adding BCH for kernel_tegra194-p2888-0001-p2822-0000.dtb [ 1.2859 ] adding BCH for recovery.img [ 1.3062 ] adding BCH for tegra194-p2888-0001-p2822-0000.dtb.rec [ 1.9437 ] [ 1.9437 ] Filling MB1 storage info [ 1.9437 ] Generating br-bct [ 1.9456 ] Performing cfg overlay [ 1.9456 ] ['tegra194-mb1-bct-memcfg-p2888.cfg', 'tegra194-memcfg-sw-override.cfg'] [ 1.9458 ] sw_memcfg_overlay.pl -c tegra194-mb1-bct-memcfg-p2888.cfg -s tegra194-memcfg-sw-override.cfg -o /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/10429/tmp4993qts21.cfg [ 1.9684 ] [ 1.9685 ] Updating dev and MSS params in BR BCT [ 1.9686 ] tegrabct_v2 --dev_param tegra194-br-bct-sdmmc.cfg --sdram /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/10429/tmp4993qts21.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 2.0022 ] [ 2.0022 ] Updating bl info [ 2.0038 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 2.0043 ] [ 2.0043 ] Generating signatures [ 2.0063 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key [ 2.0064 ] Assuming zero filled SBK key [ 2.2347 ] Copying signatures [ 2.2364 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml [ 3.4807 ] [ 3.4842 ] tegraparser_v2 --generategpt --pt flash.xml.bin [ 3.4869 ] [ 3.4921 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin [ 3.4942 ] [ 3.4976 ] tegrahost_v2 --chip 0x19 0 --magicid MB2B --ratchet_blob ratchet_blob.bin --appendsigheader nvtboot_recovery_t194.bin zerosbk [ 3.4995 ] adding BCH for nvtboot_recovery_t194.bin [ 3.5053 ] [ 3.5073 ] tegrasign_v3.py --key None --list nvtboot_recovery_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 3.5074 ] Assuming zero filled SBK key [ 3.5103 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194_sigheader.bin.encrypt nvtboot_recovery_t194_sigheader.bin.hash zerosbk [ 3.5121 ] [ 3.5137 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr.bin [ 3.5142 ] [ 3.5159 ] tegrahost_v2 --chip 0x19 0 --magicid MTSP --appendsigheader preboot_c10_prod_cr.bin zerosbk [ 3.5163 ] Header already present for preboot_c10_prod_cr.bin [ 3.5165 ] [ 3.5183 ] tegrasign_v3.py --key None --list preboot_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 3.5183 ] Assuming zero filled SBK key [ 3.5210 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 3.5216 ] [ 3.5232 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr.bin [ 3.5238 ] [ 3.5256 ] tegrahost_v2 --chip 0x19 0 --magicid MTSM --appendsigheader mce_c10_prod_cr.bin zerosbk [ 3.5260 ] Header already present for mce_c10_prod_cr.bin [ 3.5270 ] [ 3.5288 ] tegrasign_v3.py --key None --list mce_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 3.5289 ] Assuming zero filled SBK key [ 3.5319 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 3.5335 ] [ 3.5352 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr.bin [ 3.5358 ] [ 3.5375 ] tegrahost_v2 --chip 0x19 0 --magicid MTSB --appendsigheader mts_c10_prod_cr.bin zerosbk [ 3.5379 ] adding BCH for mts_c10_prod_cr.bin [ 3.5834 ] [ 3.5852 ] tegrasign_v3.py --key None --list mts_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 3.5853 ] Assuming zero filled SBK key [ 3.5914 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 3.6154 ] [ 3.6170 ] tegrahost_v2 --chip 0x19 --align bpmp_t194.bin [ 3.6177 ] [ 3.6194 ] tegrahost_v2 --chip 0x19 0 --magicid BPMF --ratchet_blob ratchet_blob.bin --appendsigheader bpmp_t194.bin zerosbk [ 3.6198 ] adding BCH for bpmp_t194.bin [ 3.6313 ] [ 3.6331 ] tegrasign_v3.py --key None --list bpmp_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 3.6332 ] Assuming zero filled SBK key [ 3.6367 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 3.6431 ] [ 3.6447 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p2888-a04.dtb [ 3.6451 ] [ 3.6468 ] tegrahost_v2 --chip 0x19 0 --magicid BPMD --ratchet_blob ratchet_blob.bin --appendsigheader tegra194-a02-bpmp-p2888-a04.dtb zerosbk [ 3.6473 ] adding BCH for tegra194-a02-bpmp-p2888-a04.dtb [ 3.6604 ] [ 3.6624 ] tegrasign_v3.py --key None --list tegra194-a02-bpmp-p2888-a04_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 3.6624 ] Assuming zero filled SBK key [ 3.6660 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt tegra194-a02-bpmp-p2888-a04_sigheader.dtb.hash zerosbk [ 3.6732 ] [ 3.6751 ] tegrahost_v2 --chip 0x19 --align spe_t194.bin [ 3.6757 ] [ 3.6774 ] tegrahost_v2 --chip 0x19 0 --magicid SPEF --ratchet_blob ratchet_blob.bin --appendsigheader spe_t194.bin zerosbk [ 3.6779 ] adding BCH for spe_t194.bin [ 3.6792 ] [ 3.6812 ] tegrasign_v3.py --key None --list spe_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 3.6813 ] Assuming zero filled SBK key [ 3.6844 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 3.6857 ] [ 3.6873 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194.img [ 3.6878 ] [ 3.6894 ] tegrahost_v2 --chip 0x19 0 --magicid TOSB --ratchet_blob ratchet_blob.bin --appendsigheader tos-trusty_t194.img zerosbk [ 3.6899 ] adding BCH for tos-trusty_t194.img [ 3.6953 ] [ 3.6972 ] tegrasign_v3.py --key None --list tos-trusty_t194_sigheader.img_list.xml --pubkeyhash pub_key.key [ 3.6972 ] Assuming zero filled SBK key [ 3.7004 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 3.7037 ] [ 3.7055 ] tegrahost_v2 --chip 0x19 --align eks.img [ 3.7062 ] [ 3.7081 ] tegrahost_v2 --chip 0x19 0 --magicid EKSB --ratchet_blob ratchet_blob.bin --appendsigheader eks.img zerosbk [ 3.7087 ] adding BCH for eks.img [ 3.7088 ] [ 3.7107 ] tegrasign_v3.py --key None --list eks_sigheader.img_list.xml --pubkeyhash pub_key.key [ 3.7108 ] Assuming zero filled SBK key [ 3.7137 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 3.7143 ] [ 3.7160 ] tegrahost_v2 --chip 0x19 --align tegra194-p2888-0001-p2822-0000.dtb [ 3.7167 ] [ 3.7184 ] tegrahost_v2 --chip 0x19 0 --magicid CDTB --ratchet_blob ratchet_blob.bin --appendsigheader tegra194-p2888-0001-p2822-0000.dtb zerosbk [ 3.7188 ] adding BCH for tegra194-p2888-0001-p2822-0000.dtb [ 3.7230 ] [ 3.7251 ] tegrasign_v3.py --key None --list tegra194-p2888-0001-p2822-0000_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 3.7251 ] Assuming zero filled SBK key [ 3.7285 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt tegra194-p2888-0001-p2822-0000_sigheader.dtb.hash zerosbk [ 3.7310 ] [ 3.7326 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin [ 3.7330 ] [ 3.7348 ] tegrahost_v2 --chip 0x19 0 --magicid CPBL --ratchet_blob ratchet_blob.bin --appendsigheader nvtboot_recovery_cpu_t194.bin zerosbk [ 3.7354 ] adding BCH for nvtboot_recovery_cpu_t194.bin [ 3.7390 ] [ 3.7410 ] tegrasign_v3.py --key None --list nvtboot_recovery_cpu_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 3.7411 ] Assuming zero filled SBK key [ 3.7442 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194_sigheader.bin.encrypt nvtboot_recovery_cpu_t194_sigheader.bin.hash zerosbk [ 3.7464 ] [ 3.7465 ] Copying signed file in /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed [ 3.8792 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/flash.xml.tmp flash.idx [ 4.6363 ] '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/flash.idx' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/flash.idx' '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/flash.xml.tmp' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/flash.xml.tmp' Flash index file is /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/flash.idx Number of lines is 14 max_index=13 Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mbr_9_0.bin /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/mbr_9_0.bin '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mbr_9_0.bin' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/mbr_9_0.bin' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/gpt_primary_9_0.bin /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/gpt_primary_9_0.bin '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/gpt_primary_9_0.bin' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/gpt_primary_9_0.bin' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/boot_sigheader.img.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/boot_sigheader.img.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/boot_sigheader.img.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/boot_sigheader.img.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/boot_sigheader.img.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/boot_sigheader.img.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/boot_sigheader.img.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/boot_sigheader.img.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/recovery_sigheader.img.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/recovery_sigheader.img.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/recovery_sigheader.img.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/recovery_sigheader.img.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/tegra194-p2888-0001-p2822-0000.dtb_sigheader.rec.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/tegra194-p2888-0001-p2822-0000.dtb_sigheader.rec.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/tegra194-p2888-0001-p2822-0000.dtb_sigheader.rec.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/tegra194-p2888-0001-p2822-0000.dtb_sigheader.rec.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/kernel_bootctrl.bin /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/kernel_bootctrl.bin '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/kernel_bootctrl.bin' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/kernel_bootctrl.bin' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/kernel_bootctrl.bin /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/kernel_bootctrl.bin '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/kernel_bootctrl.bin' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/kernel_bootctrl.bin' Warning: skip writing RECROOTFS partition as no image is specified Warning: skip writing UDA partition as no image is specified Copying APP image into /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/system.img.raw tar: Write checkpoint 10000 tar: Write checkpoint 20000 tar: Write checkpoint 30000 tar: Write checkpoint 40000 tar: Write checkpoint 50000 tar: Write checkpoint 60000 tar: Write checkpoint 70000 tar: Write checkpoint 80000 tar: Write checkpoint 90000 tar: Write checkpoint 100000 tar: Write checkpoint 110000 tar: Write checkpoint 120000 tar: Write checkpoint 130000 tar: Write checkpoint 140000 tar: Write checkpoint 150000 tar: Write checkpoint 160000 tar: Write checkpoint 170000 tar: Write checkpoint 180000 tar: Write checkpoint 190000 tar: Write checkpoint 200000 tar: Write checkpoint 210000 tar: Write checkpoint 220000 tar: Write checkpoint 230000 tar: Write checkpoint 240000 tar: Write checkpoint 250000 tar: Write checkpoint 260000 tar: Write checkpoint 270000 tar: Write checkpoint 280000 tar: Write checkpoint 290000 tar: Write checkpoint 300000 tar: Write checkpoint 310000 tar: Write checkpoint 320000 tar: Write checkpoint 330000 tar: Write checkpoint 340000 tar: Write checkpoint 350000 tar: Write checkpoint 360000 tar: Write checkpoint 370000 tar: Write checkpoint 380000 tar: Write checkpoint 390000 tar: Write checkpoint 400000 tar: Write checkpoint 410000 tar: Write checkpoint 420000 tar: Write checkpoint 430000 tar: Write checkpoint 440000 tar: Write checkpoint 450000 tar: Write checkpoint 460000 tar: Write checkpoint 470000 tar: Write checkpoint 480000 tar: Write checkpoint 490000 tar: Write checkpoint 500000 tar: Write checkpoint 510000 Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/gpt_secondary_9_0.bin /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/gpt_secondary_9_0.bin '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/gpt_secondary_9_0.bin' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/external/gpt_secondary_9_0.bin' Generate images to be flashed /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/flash.sh --no-flash --sign jetson-agx-xavier-devkit nvme0n1p1

###############################################################################

L4T BSP Information:

R32 , REVISION: 6.1

############################################################################### Board ID(2888) version(400) sku(0004) revision(L.0) Copy /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/kernel/dtb/tegra194-p2888-0001-p2822-0000.dtb to /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/kernel/dtb/tegra194-p2888-0001-p2822-0000.dtb.rec copying bctfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-memcfg-p2888.cfg)... done. copying bctfile1(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-memcfg-sw-override.cfg)... done. copying uphy_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg)... done. copying minratchet_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg)... done. copying device_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-bct-device-sdmmc.cfg)... done. copying misc_cold_boot_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-l4t.cfg)... done. copying misc_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-flash.cfg)... done. copying pinmux_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg)... done. copying gpioint_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg)... done. copying pmic_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg)... done. copying pmc_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg)... done. copying prod_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg)... done. copying scr_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini.cfg)... done. copying scr_cold_boot_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini.cfg)... done. copying bootrom_config(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg)... done. copying dev_params(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-br-bct-sdmmc.cfg)... done. Existing bootloader(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. copying initrd(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/l4t_initrd.img)... done. Making Boot image... done. /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key --minratchet_config tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg --cmd sign boot.img kernel Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0003 ] Generating signature [ 0.0020 ] tegrasign_v3.py --getmode mode.txt --key [ 0.0020 ] Assuming zero filled SBK key : not reading [ 0.0019 ] Generating ratchet blob [ 0.0035 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 0.0039 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0040 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0040 ] [ 0.0041 ] header_magic: 414e4452 [ 0.0057 ] tegrahost_v2 --chip 0x19 --align 1_boot.img [ 0.0061 ] [ 0.0077 ] tegrahost_v2 --chip 0x19 0 --magicid KRNL --ratchet_blob ratchet_blob.bin --appendsigheader 1_boot.img zerosbk [ 0.0081 ] adding BCH for 1_boot.img [ 0.5591 ] [ 0.5614 ] tegrasign_v3.py --key --list 1_boot_sigheader.img_list.xml --pubkeyhash pub_key.key [ 0.5614 ] Assuming zero filled SBK key : not reading [ 0.6175 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot_sigheader.img.encrypt 1_boot_sigheader.img.hash zerosbk [ 1.0243 ] [ 1.0466 ] Signed file: /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt l4t_sign_image.sh: Generate header for boot_sigheader.img.encrypt l4t_sign_image.sh: chip 0x19: add 0x27cb800 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot_sigheader.img.encrypt l4t_sign_image.sh: the signed file is /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt done. Making recovery ramdisk for recovery image... Re-generating recovery ramdisk for recovery image... ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/ramdisk_tmp ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra 30412 blocks _BASE_KERNEL_VERSION=4.9.253-tegra ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/ramdisk_tmp/lib ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/ramdisk_tmp ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra 66117 blocks Making Recovery image... copying recdtbfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/kernel/dtb/tegra194-p2888-0001-p2822-0000.dtb.rec)... done. 20+0 records in 20+0 records out 20 bytes copied, 0.000330492 s, 60.5 kB/s Existing sosfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing tegraboot(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/nvtboot_t194.bin) reused. Existing cpu_bootloader(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. Existing mb2blfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/nvtboot_recovery_t194.bin) reused. Existing mtspreboot(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/preboot_c10_prod_cr.bin) reused. Existing mcepreboot(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mce_c10_prod_cr.bin) reused. Existing mtsproper(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mts_c10_prod_cr.bin) reused. Existing mb1file(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing bpffile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/bpmp_t194.bin) reused. copying bpfdtbfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/tegra194-a02-bpmp-p2888-a04.dtb)... done. Existing scefile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. Existing camerafw(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/camera-rtcpu-rce.img) reused. Existing spefile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/spe_t194.bin) reused. Existing wb0boot(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/warmboot_t194_prod.bin) reused. Existing tosfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tos-trusty_t194.img) reused. Existing eksfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/eks.img) reused. copying soft_fuses(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. copying dtbfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/kernel/dtb/tegra194-p2888-0001-p2822-0000.dtb)... done. Copying nv_boot_control.conf to rootfs /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key --minratchet_config tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg --cmd sign kernel_tegra194-p2888-0001-p2822-0000.dtb kernel_dtb Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0003 ] Generating signature [ 0.0021 ] tegrasign_v3.py --getmode mode.txt --key [ 0.0021 ] Assuming zero filled SBK key : not reading [ 0.0021 ] Generating ratchet blob [ 0.0036 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 0.0040 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0041 ] [ 0.0041 ] header_magic: d00dfeed [ 0.0057 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p2888-0001-p2822-0000.dtb [ 0.0062 ] [ 0.0077 ] tegrahost_v2 --chip 0x19 0 --magicid KDTB --ratchet_blob ratchet_blob.bin --appendsigheader 1_kernel_tegra194-p2888-0001-p2822-0000.dtb zerosbk [ 0.0082 ] adding BCH for 1_kernel_tegra194-p2888-0001-p2822-0000.dtb [ 0.0121 ] [ 0.0143 ] tegrasign_v3.py --key --list 1_kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 0.0143 ] Assuming zero filled SBK key : not reading [ 0.0176 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt 1_kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.hash zerosbk [ 0.0201 ] [ 0.0203 ] Signed file: /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt l4t_sign_image.sh: Generate header for kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt l4t_sign_image.sh: chip 0x19: add 0x45651 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt l4t_sign_image.sh: the signed file is /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt done. generating system.img for booting... Making system.img... populating rootfs from /tmp/tmp.PVrcnCpDz9 ... populating /boot/extlinux/extlinux.conf ... done. generating sig file of Image ... /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key --minratchet_config tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg --cmd sign ./boot/Image kernel Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0003 ] Generating signature [ 0.0021 ] tegrasign_v3.py --getmode mode.txt --key [ 0.0021 ] Assuming zero filled SBK key : not reading [ 0.0021 ] Generating ratchet blob [ 0.0037 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 0.0041 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0042 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0042 ] [ 0.0042 ] header_magic: 405614 [ 0.0058 ] tegrahost_v2 --chip 0x19 --align 1_Image [ 0.0063 ] [ 0.0079 ] tegrahost_v2 --chip 0x19 0 --magicid KRNL --ratchet_blob ratchet_blob.bin --appendsigheader 1_Image zerosbk [ 0.0083 ] adding BCH for 1_Image [ 0.4658 ] [ 0.4682 ] tegrasign_v3.py --key --list 1_Image_sigheader_list.xml --pubkeyhash pub_key.key [ 0.4683 ] Assuming zero filled SBK key : not reading [ 0.5125 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_Image_sigheader.encrypt 1_Image_sigheader.hash zerosbk [ 0.7435 ] [ 0.7594 ] Signed file: /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mnt/Image_sigheader.encrypt l4t_sign_image.sh: Generate header for Image_sigheader.encrypt l4t_sign_image.sh: chip 0x19: add 0x20e3008 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for Image_sigheader.encrypt l4t_sign_image.sh: the sign header is saved at ./boot/Image.sig done. done. generating sig file of kernel_tegra194-p2888-0001-p2822-0000.dtb ... /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key --minratchet_config tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg --cmd sign ./boot/dtb/kernel_tegra194-p2888-0001-p2822-0000.dtb kernel_dtb Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0003 ] Generating signature [ 0.0023 ] tegrasign_v3.py --getmode mode.txt --key [ 0.0023 ] Assuming zero filled SBK key : not reading [ 0.0023 ] Generating ratchet blob [ 0.0041 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 0.0047 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0047 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0047 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0047 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0048 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0048 ] [ 0.0048 ] header_magic: d00dfeed [ 0.0067 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p2888-0001-p2822-0000.dtb [ 0.0074 ] [ 0.0092 ] tegrahost_v2 --chip 0x19 0 --magicid KDTB --ratchet_blob ratchet_blob.bin --appendsigheader 1_kernel_tegra194-p2888-0001-p2822-0000.dtb zerosbk [ 0.0098 ] adding BCH for 1_kernel_tegra194-p2888-0001-p2822-0000.dtb [ 0.0137 ] [ 0.0160 ] tegrasign_v3.py --key --list 1_kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 0.0160 ] Assuming zero filled SBK key : not reading [ 0.0195 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt 1_kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.hash zerosbk [ 0.0221 ] [ 0.0224 ] Signed file: /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mnt/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt l4t_sign_image.sh: Generate header for kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt l4t_sign_image.sh: chip 0x19: add 0x45651 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt l4t_sign_image.sh: the sign header is saved at ./boot/dtb/kernel_tegra194-p2888-0001-p2822-0000.dtb.sig done. done. generating sig file of initrd ... /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key --cmd sign ./boot/initrd data Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0003 ] Generating signature [ 0.0024 ] tegrasign_v3.py --getmode mode.txt --key [ 0.0024 ] Assuming zero filled SBK key : not reading [ 0.0024 ] header_magic: 1f8b0800 [ 0.0043 ] tegrahost_v2 --chip 0x19 --align 1_initrd [ 0.0047 ] [ 0.0063 ] tegrahost_v2 --chip 0x19 0 --magicid DATA --appendsigheader 1_initrd zerosbk [ 0.0067 ] adding BCH for 1_initrd [ 0.1031 ] [ 0.1055 ] tegrasign_v3.py --key --list 1_initrd_sigheader_list.xml --pubkeyhash pub_key.key [ 0.1056 ] Assuming zero filled SBK key : not reading [ 0.1165 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_initrd_sigheader.encrypt 1_initrd_sigheader.hash zerosbk [ 0.1666 ] [ 0.1698 ] Signed file: /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mnt/initrd_sigheader.encrypt l4t_sign_image.sh: Generate header for initrd_sigheader.encrypt l4t_sign_image.sh: chip 0x19: add 0x6e72c8 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for initrd_sigheader.encrypt l4t_sign_image.sh: the sign header is saved at ./boot/initrd.sig done. done. generating sig file of extlinux.conf ... /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key --cmd sign ./boot/extlinux/extlinux.conf data Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0003 ] Generating signature [ 0.0024 ] tegrasign_v3.py --getmode mode.txt --key [ 0.0024 ] Assuming zero filled SBK key : not reading [ 0.0024 ] header_magic: 54494d45 [ 0.0044 ] tegrahost_v2 --chip 0x19 --align 1_extlinux.conf [ 0.0051 ] [ 0.0056 ] tegrahost_v2 --chip 0x19 0 --magicid DATA --appendsigheader 1_extlinux.conf zerosbk [ 0.0060 ] adding BCH for 1_extlinux.conf [ 0.0061 ] [ 0.0083 ] tegrasign_v3.py --key --list 1_extlinux_sigheader.conf_list.xml --pubkeyhash pub_key.key [ 0.0083 ] Assuming zero filled SBK key : not reading [ 0.0113 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_extlinux_sigheader.conf.encrypt 1_extlinux_sigheader.conf.hash zerosbk [ 0.0118 ] [ 0.0119 ] Signed file: /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mnt/extlinux_sigheader.conf.encrypt l4t_sign_image.sh: Generate header for extlinux_sigheader.conf.encrypt l4t_sign_image.sh: chip 0x19: add 0x360 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for extlinux_sigheader.conf.encrypt l4t_sign_image.sh: the sign header is saved at ./boot/extlinux/extlinux.conf.sig done. done. Sync'ing system.img ... done. Converting RAW image to Sparse image... done. system.img built successfully. Existing tbcfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/cboot_t194.bin) reused. copying tbcdtbfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/kernel/dtb/tegra194-p2888-0001-p2822-0000.dtb)... done. copying cfgfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/cfg/flash_t194_sdmmc.xml) to flash.xml... done. Existing flasher(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu_t194.bin) reused. Existing flashapp(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py) reused. ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin --sdram_config tegra194-mb1-bct-memcfg-p2888.cfg,tegra194-memcfg-sw-override.cfg --odmdata 0x9190000 --applet mb1_t194_prod.bin --cmd "sign" --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --cfg flash.xml --chip 0x19 --uphy_config tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg --minratchet_config tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg --device_config tegra19x-mb1-bct-device-sdmmc.cfg --misc_cold_boot_config tegra194-mb1-bct-misc-l4t.cfg --misc_config tegra194-mb1-bct-misc-flash.cfg --pinmux_config tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg --gpioint_config tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg --pmic_config tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg --pmc_config tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg --prod_config tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg --scr_config tegra194-mb1-bct-scr-cbb-mini.cfg --scr_cold_boot_config tegra194-mb1-bct-scr-cbb-mini.cfg --br_cmd_config tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg --dev_params tegra194-br-bct-sdmmc.cfg --bin "mb2_bootloader nvtboot_recovery_t194.bin; mts_preboot preboot_c10_prod_cr.bin; mts_mce mce_c10_prod_cr.bin; mts_proper mts_c10_prod_cr.bin; bpmp_fw bpmp_t194.bin; bpmp_fw_dtb tegra194-a02-bpmp-p2888-a04.dtb; spe_fw spe_t194.bin; tlk tos-trusty_t194.img; eks eks.img; bootloader_dtb tegra194-p2888-0001-p2822-0000.dtb" --skipuid --ramcode 2 saving flash command in /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/flashcmd.txt saving Windows flash command to /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/flash_win.bat Sign and generate flashing ready partition images... Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0041 ] Got ramcode 2 from the command line [ 0.0041 ] Disable BPMP dtb trim, using default dtb [ 0.0041 ] [ 0.0061 ] tegrasign_v3.py --getmode mode.txt --key None [ 0.0062 ] Assuming zero filled SBK key [ 0.0120 ] Generating RCM messages [ 0.0138 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod.bin zerosbk [ 0.0144 ] Header already present for mb1_t194_prod.bin [ 0.0163 ] [ 0.0182 ] tegrasign_v3.py --getmode mode.txt --key None [ 0.0183 ] Assuming zero filled SBK key [ 0.0199 ] tegrasign_v3.py --file mb1_t194_prod_sigheader.bin --key None --length 1136 --offset 2960 --pubkeyhash pub_key.key [ 0.0200 ] Assuming zero filled SBK key [ 0.0218 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin mb1_t194_prod_sigheader.hash zerosbk [ 0.0240 ] [ 0.0257 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg sfuse.bin [ 0.0262 ] [ 0.0277 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 0.0282 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0283 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0283 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0283 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0283 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0283 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0283 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0283 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0283 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0283 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0283 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0284 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0284 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0284 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0284 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0284 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0284 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0284 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0284 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0284 ] [ 0.0300 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_sigheader.bin 0 0 [ 0.0304 ] RCM 0 is saved as rcm_0.rcm [ 0.0323 ] RCM 1 is saved as rcm_1.rcm [ 0.0323 ] RCM 2 is saved as rcm_2.rcm [ 0.0323 ] List of rcm files are saved in rcm_list.xml [ 0.0323 ] [ 0.0323 ] Signing RCM messages [ 0.0340 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key None --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0341 ] Assuming zero filled SBK key [ 0.0377 ] Copying signature to RCM mesages [ 0.0394 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml [ 0.0402 ] [ 0.0402 ] Parsing partition layout [ 0.0418 ] tegraparser_v2 --pt flash.xml.tmp [ 0.0426 ] [ 0.0427 ] Creating list of images to be signed [ 0.0431 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --ratchet_blob ratchet_blob.bin --list images_list.xml zerosbk [ 0.0436 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.0439 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.0441 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.0458 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.0464 ] adding BCH for spe_t194.bin [ 0.0480 ] adding BCH for spe_t194.bin [ 0.0492 ] adding BCH for nvtboot_t194.bin [ 0.0505 ] adding BCH for nvtboot_t194.bin [ 0.0528 ] Header already present for preboot_c10_prod_cr.bin [ 0.0552 ] Header already present for preboot_c10_prod_cr.bin [ 0.0554 ] Header already present for mce_c10_prod_cr.bin [ 0.0555 ] Header already present for mce_c10_prod_cr.bin [ 0.0565 ] adding BCH for mts_c10_prod_cr.bin [ 0.0584 ] adding BCH for mts_c10_prod_cr.bin [ 0.1036 ] adding BCH for cboot_t194.bin [ 0.1481 ] adding BCH for cboot_t194.bin [ 0.1542 ] adding BCH for tegra194-p2888-0001-p2822-0000.dtb [ 0.1604 ] adding BCH for tegra194-p2888-0001-p2822-0000.dtb [ 0.1640 ] adding BCH for tos-trusty_t194.img [ 0.1677 ] adding BCH for tos-trusty_t194.img [ 0.1729 ] adding BCH for eks.img [ 0.1781 ] adding BCH for eks.img [ 0.1782 ] adding BCH for bpmp_t194.bin [ 0.1785 ] adding BCH for bpmp_t194.bin [ 0.1898 ] adding BCH for tegra194-a02-bpmp-p2888-a04.dtb [ 0.2011 ] adding BCH for tegra194-a02-bpmp-p2888-a04.dtb [ 0.2140 ] adding BCH for xusb_sil_rel_fw [ 0.2269 ] adding BCH for xusb_sil_rel_fw [ 0.2286 ] adding BCH for camera-rtcpu-rce.img [ 0.2304 ] adding BCH for camera-rtcpu-rce.img [ 0.2338 ] adding BCH for adsp-fw.bin [ 0.2374 ] adding BCH for adsp-fw.bin [ 0.2384 ] Header already present for warmboot_t194_prod.bin [ 0.2395 ] Header already present for warmboot_t194_prod.bin [ 0.2400 ] adding BCH for recovery.img [ 0.2557 ] adding BCH for tegra194-p2888-0001-p2822-0000.dtb.rec [ 0.8906 ] adding BCH for boot.img [ 0.9069 ] adding BCH for boot.img [ 1.4543 ] adding BCH for kernel_tegra194-p2888-0001-p2822-0000.dtb [ 2.0956 ] adding BCH for kernel_tegra194-p2888-0001-p2822-0000.dtb [ 2.1162 ] [ 2.1162 ] Filling MB1 storage info [ 2.1162 ] Generating br-bct [ 2.1181 ] Performing cfg overlay [ 2.1181 ] ['tegra194-mb1-bct-memcfg-p2888.cfg', 'tegra194-memcfg-sw-override.cfg'] [ 2.1182 ] sw_memcfg_overlay.pl -c tegra194-mb1-bct-memcfg-p2888.cfg -s tegra194-memcfg-sw-override.cfg -o /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11.cfg [ 2.1403 ] [ 2.1404 ] Updating dev and MSS params in BR BCT [ 2.1404 ] tegrabct_v2 --dev_param tegra194-br-bct-sdmmc.cfg --sdram /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 2.1741 ] [ 2.1742 ] Updating bl info [ 2.1758 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 2.1777 ] [ 2.1778 ] Generating signatures [ 2.1800 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key [ 2.1800 ] Assuming zero filled SBK key [ 2.4529 ] Generating br-bct [ 2.4547 ] Performing cfg overlay [ 2.4547 ] ['/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11.cfg'] [ 2.4547 ] Updating dev and MSS params in BR BCT [ 2.4548 ] tegrabct_v2 --dev_param tegra194-br-bct-sdmmc.cfg --sdram /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 2.5019 ] [ 2.5019 ] Updating bl info [ 2.5038 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 2.5064 ] [ 2.5064 ] Updating smd info [ 2.5080 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 --updatesmdinfo flash.xml.bin [ 2.5086 ] [ 2.5086 ] Updating Odmdata [ 2.5103 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0x9190000 [ 2.5112 ] [ 2.5112 ] Get Signed section of bct [ 2.5129 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listbct bct_list.xml [ 2.5135 ] [ 2.5151 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 2.5156 ] Assuming zero filled SBK key [ 2.5532 ] [ 2.5533 ] Updating BCT with signature [ 2.5550 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml [ 2.5556 ] [ 2.5556 ] Generating coldboot mb1-bct [ 2.5574 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_cold_boot_bct.cfg --sdram /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11.cfg --misc tegra194-mb1-bct-misc-l4t.cfg --scr tegra194-mb1-bct-scr-cbb-mini.cfg --pinmux tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg --pmc tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg --pmic tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg --brcommand tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg --prod tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg --gpioint tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg --uphy tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg --device tegra19x-mb1-bct-device-sdmmc.cfg [ 2.5579 ] MB1-BCT version: 0x1

[ 2.5581 ] Parsing config file :tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg [ 2.5584 ] Added Platform Config 0 data with size :- 3008

[ 2.5591 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini.cfg [ 2.5594 ] File read failed [ 2.5611 ] File read failed [ 2.5660 ] Added Platform Config 1 data with size :- 19640

[ 2.5661 ] Parsing config file :tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg [ 2.5664 ] Added Platform Config 2 data with size :- 24

[ 2.5665 ] Parsing config file :tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg [ 2.5667 ] Added Platform Config 4 data with size :- 348 [ 2.5668 ] [ 2.5668 ] Parsing config file :tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg [ 2.5668 ] Added Platform Config 3 data with size :- 92 [ 2.5668 ] [ 2.5668 ] Parsing config file :tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg [ 2.5668 ] Added Platform Config 5 data with size :- 68 [ 2.5668 ] [ 2.5668 ] Parsing config file :tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg [ 2.5668 ] Added Platform Config 7 data with size :- 392 [ 2.5668 ] [ 2.5668 ] Parsing config file :tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg [ 2.5668 ] Added Platform Config 8 data with size :- 12 [ 2.5668 ] [ 2.5668 ] Parsing config file :tegra19x-mb1-bct-device-sdmmc.cfg [ 2.5668 ] Added Platform Config 9 data with size :- 32 [ 2.5668 ] [ 2.5668 ] Updating mb1-bct with firmware information [ 2.5685 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 2.5690 ] MB1-BCT version: 0x1 [ 2.5692 ] [ 2.5692 ] Updating mb1-bct with storage information [ 2.5708 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 2.5713 ] MB1-BCT version: 0x1 [ 2.5715 ] [ 2.5715 ] Updating mb1-bct with ratchet information [ 2.5731 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 2.5736 ] MB1-BCT version: 0x1 [ 2.5737 ] FwIndex: 1, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 2, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 3, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 4, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 5, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 6, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 7, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 11, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 12, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 13, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 14, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 15, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 16, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 17, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 18, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 19, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 30, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 31, MinRatchetLevel: 0 [ 2.5738 ] FwIndex: 32, MinRatchetLevel: 0 [ 2.5738 ] [ 2.5754 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct [ 2.5760 ] [ 2.5776 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk [ 2.5780 ] adding BCH for mb1_cold_boot_bct_MB1.bct [ 2.5785 ] [ 2.5804 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 2.5804 ] Assuming zero filled SBK key [ 2.5823 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk [ 2.5830 ] [ 2.5830 ] Generating recovery mb1-bct [ 2.5849 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_bct.cfg --sdram /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11.cfg --misc tegra194-mb1-bct-misc-flash.cfg --scr tegra194-mb1-bct-scr-cbb-mini.cfg --pinmux tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg --pmc tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg --pmic tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg --brcommand tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg --prod tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg --gpioint tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg --uphy tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg --device tegra19x-mb1-bct-device-sdmmc.cfg [ 2.5853 ] MB1-BCT version: 0x1

[ 2.5855 ] Parsing config file :tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg [ 2.5857 ] Added Platform Config 0 data with size :- 3008

[ 2.5864 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini.cfg [ 2.5865 ] File read failed [ 2.5883 ] File read failed [ 2.5934 ] Added Platform Config 1 data with size :- 19640

[ 2.5935 ] Parsing config file :tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg [ 2.5938 ] Added Platform Config 2 data with size :- 24

[ 2.5939 ] Parsing config file :tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg [ 2.5941 ] Added Platform Config 4 data with size :- 348 [ 2.5941 ] [ 2.5941 ] Parsing config file :tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg [ 2.5941 ] Added Platform Config 3 data with size :- 92 [ 2.5941 ] [ 2.5941 ] Parsing config file :tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg [ 2.5941 ] Added Platform Config 5 data with size :- 68 [ 2.5941 ] [ 2.5941 ] Parsing config file :tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg [ 2.5942 ] Added Platform Config 7 data with size :- 392 [ 2.5942 ] [ 2.5942 ] Parsing config file :tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg [ 2.5942 ] Added Platform Config 8 data with size :- 12 [ 2.5942 ] [ 2.5942 ] Parsing config file :tegra19x-mb1-bct-device-sdmmc.cfg [ 2.5942 ] Added Platform Config 9 data with size :- 32 [ 2.5942 ] [ 2.5942 ] Updating mb1-bct with firmware information [ 2.5958 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin [ 2.5962 ] MB1-BCT version: 0x1 [ 2.5964 ] [ 2.5965 ] Updating mb1-bct with storage information [ 2.5982 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 2.5986 ] MB1-BCT version: 0x1 [ 2.5988 ] [ 2.5988 ] Updating mb1-bct with ratchet information [ 2.6005 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 2.6010 ] MB1-BCT version: 0x1 [ 2.6011 ] FwIndex: 1, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 2, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 3, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 4, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 5, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 6, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 7, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 11, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 12, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 13, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 14, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 15, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 16, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 17, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 18, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 19, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 30, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 31, MinRatchetLevel: 0 [ 2.6012 ] FwIndex: 32, MinRatchetLevel: 0 [ 2.6012 ] [ 2.6029 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct [ 2.6034 ] [ 2.6051 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_bct_MB1.bct zerosbk [ 2.6056 ] adding BCH for mb1_bct_MB1.bct [ 2.6061 ] [ 2.6079 ] tegrasign_v3.py --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 2.6080 ] Assuming zero filled SBK key [ 2.6108 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk [ 2.6115 ] [ 2.6115 ] Generating coldboot mem-bct [ 2.6133 ] tegrabct_v2 --chip 0x19 0 --sdram /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11.cfg --membct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11_1.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11_2.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11_3.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11_4.bct [ 2.6137 ] Packing sdram param for instance[0] [ 2.6470 ] Packing sdram param for instance[1] [ 2.6471 ] Packing sdram param for instance[2] [ 2.6472 ] Packing sdram param for instance[3] [ 2.6472 ] Packing sdram param for instance[4] [ 2.6472 ] Packing sdram param for instance[5] [ 2.6472 ] Packing sdram param for instance[6] [ 2.6472 ] Packing sdram param for instance[7] [ 2.6472 ] Packing sdram param for instance[8] [ 2.6472 ] Packing sdram param for instance[9] [ 2.6472 ] Packing sdram param for instance[10] [ 2.6472 ] Packing sdram param for instance[11] [ 2.6472 ] Packing sdram param for instance[12] [ 2.6472 ] Packing sdram param for instance[13] [ 2.6472 ] Packing sdram param for instance[14] [ 2.6472 ] Packing sdram param for instance[15] [ 2.6473 ] [ 2.6473 ] Getting sector size from pt [ 2.6488 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin [ 2.6494 ] [ 2.6494 ] BlockSize read from layout is 200

[ 2.6513 ] tegrahost_v2 --chip 0x19 0 --blocksize 512 --magicid MEMB --addsigheader_multi /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11_1.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11_2.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11_3.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11_4.bct [ 2.6519 ] adding BCH for /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11_1.bct [ 2.6534 ] [ 2.6540 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 2.6544 ] [ 2.6550 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin --appendsigheader mem_coldboot.bct zerosbk [ 2.6554 ] Header already present for mem_coldboot.bct [ 2.6556 ] [ 2.6576 ] tegrasign_v3.py --key None --list mem_coldboot_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 2.6576 ] Assuming zero filled SBK key [ 2.6609 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_coldboot_sigheader.bct.encrypt mem_coldboot_sigheader.bct.hash zerosbk [ 2.6615 ] [ 2.6616 ] Generating recovery mem-bct [ 2.6633 ] tegrabct_v2 --chip 0x19 0 --sdram /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11.cfg --membct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11_1.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11_2.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11_3.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/12235/tmpapligxf11_4.bct [ 2.6637 ] Packing sdram param for instance[0] [ 2.6969 ] Packing sdram param for instance[1] [ 2.6970 ] Packing sdram param for instance[2] [ 2.6971 ] Packing sdram param for instance[3] [ 2.6971 ] Packing sdram param for instance[4] [ 2.6971 ] Packing sdram param for instance[5] [ 2.6971 ] Packing sdram param for instance[6] [ 2.6971 ] Packing sdram param for instance[7] [ 2.6971 ] Packing sdram param for instance[8] [ 2.6971 ] Packing sdram param for instance[9] [ 2.6971 ] Packing sdram param for instance[10] [ 2.6971 ] Packing sdram param for instance[11] [ 2.6971 ] Packing sdram param for instance[12] [ 2.6971 ] Packing sdram param for instance[13] [ 2.6971 ] Packing sdram param for instance[14] [ 2.6971 ] Packing sdram param for instance[15] [ 2.6971 ] [ 2.6990 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct [ 2.6994 ] [ 2.6999 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin --appendsigheader mem_rcm.bct zerosbk [ 2.7004 ] adding BCH for mem_rcm.bct [ 2.7011 ] [ 2.7031 ] tegrasign_v3.py --key None --list mem_rcm_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 2.7032 ] Assuming zero filled SBK key [ 2.7049 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm_sigheader.bct.encrypt mem_rcm_sigheader.bct.hash zerosbk [ 2.7058 ] [ 2.7058 ] Copying signatures [ 2.7074 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml [ 4.0267 ] [ 4.0289 ] tegraparser_v2 --generategpt --pt flash.xml.bin [ 4.0303 ] [ 4.0334 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin [ 4.0345 ] [ 4.0368 ] tegrahost_v2 --chip 0x19 0 --magicid MB2B --ratchet_blob ratchet_blob.bin --appendsigheader nvtboot_recovery_t194.bin zerosbk [ 4.0379 ] adding BCH for nvtboot_recovery_t194.bin [ 4.0433 ] [ 4.0455 ] tegrasign_v3.py --key None --list nvtboot_recovery_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 4.0455 ] Assuming zero filled SBK key [ 4.0491 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194_sigheader.bin.encrypt nvtboot_recovery_t194_sigheader.bin.hash zerosbk [ 4.0511 ] [ 4.0529 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr.bin [ 4.0536 ] [ 4.0553 ] tegrahost_v2 --chip 0x19 0 --magicid MTSP --appendsigheader preboot_c10_prod_cr.bin zerosbk [ 4.0558 ] Header already present for preboot_c10_prod_cr.bin [ 4.0561 ] [ 4.0580 ] tegrasign_v3.py --key None --list preboot_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 4.0580 ] Assuming zero filled SBK key [ 4.0611 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 4.0618 ] [ 4.0624 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr.bin [ 4.0629 ] [ 4.0646 ] tegrahost_v2 --chip 0x19 0 --magicid MTSM --appendsigheader mce_c10_prod_cr.bin zerosbk [ 4.0651 ] Header already present for mce_c10_prod_cr.bin [ 4.0664 ] [ 4.0683 ] tegrasign_v3.py --key None --list mce_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 4.0684 ] Assuming zero filled SBK key [ 4.0717 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 4.0731 ] [ 4.0736 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr.bin [ 4.0741 ] [ 4.0759 ] tegrahost_v2 --chip 0x19 0 --magicid MTSB --appendsigheader mts_c10_prod_cr.bin zerosbk [ 4.0765 ] adding BCH for mts_c10_prod_cr.bin [ 4.1232 ] [ 4.1254 ] tegrasign_v3.py --key None --list mts_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 4.1255 ] Assuming zero filled SBK key [ 4.1325 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 4.1566 ] [ 4.1583 ] tegrahost_v2 --chip 0x19 --align bpmp_t194.bin [ 4.1588 ] [ 4.1606 ] tegrahost_v2 --chip 0x19 0 --magicid BPMF --ratchet_blob ratchet_blob.bin --appendsigheader bpmp_t194.bin zerosbk [ 4.1612 ] adding BCH for bpmp_t194.bin [ 4.1726 ] [ 4.1746 ] tegrasign_v3.py --key None --list bpmp_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 4.1746 ] Assuming zero filled SBK key [ 4.1772 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 4.1835 ] [ 4.1852 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p2888-a04.dtb [ 4.1857 ] [ 4.1862 ] tegrahost_v2 --chip 0x19 0 --magicid BPMD --ratchet_blob ratchet_blob.bin --appendsigheader tegra194-a02-bpmp-p2888-a04.dtb zerosbk [ 4.1866 ] adding BCH for tegra194-a02-bpmp-p2888-a04.dtb [ 4.2000 ] [ 4.2021 ] tegrasign_v3.py --key None --list tegra194-a02-bpmp-p2888-a04_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 4.2022 ] Assuming zero filled SBK key [ 4.2065 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt tegra194-a02-bpmp-p2888-a04_sigheader.dtb.hash zerosbk [ 4.2140 ] [ 4.2157 ] tegrahost_v2 --chip 0x19 --align spe_t194.bin [ 4.2162 ] [ 4.2167 ] tegrahost_v2 --chip 0x19 0 --magicid SPEF --ratchet_blob ratchet_blob.bin --appendsigheader spe_t194.bin zerosbk [ 4.2172 ] adding BCH for spe_t194.bin [ 4.2185 ] [ 4.2204 ] tegrasign_v3.py --key None --list spe_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 4.2204 ] Assuming zero filled SBK key [ 4.2223 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 4.2235 ] [ 4.2252 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194.img [ 4.2257 ] [ 4.2262 ] tegrahost_v2 --chip 0x19 0 --magicid TOSB --ratchet_blob ratchet_blob.bin --appendsigheader tos-trusty_t194.img zerosbk [ 4.2266 ] adding BCH for tos-trusty_t194.img [ 4.2322 ] [ 4.2342 ] tegrasign_v3.py --key None --list tos-trusty_t194_sigheader.img_list.xml --pubkeyhash pub_key.key [ 4.2342 ] Assuming zero filled SBK key [ 4.2364 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 4.2397 ] [ 4.2414 ] tegrahost_v2 --chip 0x19 --align eks.img [ 4.2419 ] [ 4.2424 ] tegrahost_v2 --chip 0x19 0 --magicid EKSB --ratchet_blob ratchet_blob.bin --appendsigheader eks.img zerosbk [ 4.2429 ] adding BCH for eks.img [ 4.2429 ] [ 4.2447 ] tegrasign_v3.py --key None --list eks_sigheader.img_list.xml --pubkeyhash pub_key.key [ 4.2448 ] Assuming zero filled SBK key [ 4.2465 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 4.2470 ] [ 4.2486 ] tegrahost_v2 --chip 0x19 --align tegra194-p2888-0001-p2822-0000.dtb [ 4.2491 ] [ 4.2496 ] tegrahost_v2 --chip 0x19 0 --magicid CDTB --ratchet_blob ratchet_blob.bin --appendsigheader tegra194-p2888-0001-p2822-0000.dtb zerosbk [ 4.2501 ] adding BCH for tegra194-p2888-0001-p2822-0000.dtb [ 4.2541 ] [ 4.2559 ] tegrasign_v3.py --key None --list tegra194-p2888-0001-p2822-0000_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 4.2560 ] Assuming zero filled SBK key [ 4.2592 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt tegra194-p2888-0001-p2822-0000_sigheader.dtb.hash zerosbk [ 4.2617 ] [ 4.2623 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin [ 4.2628 ] [ 4.2646 ] tegrahost_v2 --chip 0x19 0 --magicid CPBL --ratchet_blob ratchet_blob.bin --appendsigheader nvtboot_recovery_cpu_t194.bin zerosbk [ 4.2652 ] adding BCH for nvtboot_recovery_cpu_t194.bin [ 4.2688 ] [ 4.2710 ] tegrasign_v3.py --key None --list nvtboot_recovery_cpu_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 4.2712 ] Assuming zero filled SBK key [ 4.2806 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194_sigheader.bin.encrypt nvtboot_recovery_cpu_t194_sigheader.bin.hash zerosbk [ 4.2829 ] [ 4.2830 ] Copying signed file in /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed [ 4.4467 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/flash.xml.tmp flash.idx [ 5.2989 ] '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/flash.idx' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/flash.idx' '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/flash.xml.tmp' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/flash.xml.tmp' Flash index file is /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/flash.idx Number of lines is 63 max_index=62 Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/br_bct_BR.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/br_bct_BR.bct '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/br_bct_BR.bct' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/br_bct_BR.bct' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mb1_t194_prod_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mb1_t194_prod_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mb1_t194_prod_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mb1_t194_prod_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mb1_t194_prod_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mb1_t194_prod_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mb1_t194_prod_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mb1_t194_prod_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mb1_cold_boot_bct_MB1_sigheader.bct.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mb1_cold_boot_bct_MB1_sigheader.bct.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mb1_cold_boot_bct_MB1_sigheader.bct.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mb1_cold_boot_bct_MB1_sigheader.bct.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mb1_cold_boot_bct_MB1_sigheader.bct.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mb1_cold_boot_bct_MB1_sigheader.bct.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mb1_cold_boot_bct_MB1_sigheader.bct.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mb1_cold_boot_bct_MB1_sigheader.bct.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mem_coldboot_sigheader.bct.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mem_coldboot_sigheader.bct.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mem_coldboot_sigheader.bct.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mem_coldboot_sigheader.bct.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mem_coldboot_sigheader.bct.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mem_coldboot_sigheader.bct.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mem_coldboot_sigheader.bct.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mem_coldboot_sigheader.bct.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/spe_t194_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/spe_t194_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/spe_t194_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/spe_t194_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/spe_t194_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/spe_t194_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/spe_t194_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/spe_t194_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/nvtboot_t194_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/nvtboot_t194_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/nvtboot_t194_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/nvtboot_t194_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/nvtboot_t194_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/nvtboot_t194_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/nvtboot_t194_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/nvtboot_t194_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/preboot_c10_prod_cr_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/preboot_c10_prod_cr_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/preboot_c10_prod_cr_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/preboot_c10_prod_cr_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/preboot_c10_prod_cr_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/preboot_c10_prod_cr_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/preboot_c10_prod_cr_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/preboot_c10_prod_cr_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/slot_metadata.bin /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/slot_metadata.bin '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/slot_metadata.bin' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/slot_metadata.bin' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/slot_metadata.bin /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/slot_metadata.bin '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/slot_metadata.bin' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/slot_metadata.bin' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/emmc_bootblob_ver.txt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/emmc_bootblob_ver.txt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/emmc_bootblob_ver.txt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/emmc_bootblob_ver.txt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/emmc_bootblob_ver.txt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/emmc_bootblob_ver.txt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/emmc_bootblob_ver.txt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/emmc_bootblob_ver.txt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/gpt_secondary_0_3.bin /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/gpt_secondary_0_3.bin '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/gpt_secondary_0_3.bin' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/gpt_secondary_0_3.bin' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mbr_1_3.bin /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mbr_1_3.bin '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mbr_1_3.bin' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mbr_1_3.bin' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/gpt_primary_1_3.bin /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/gpt_primary_1_3.bin '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/gpt_primary_1_3.bin' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/gpt_primary_1_3.bin' Copying APP image into /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/system.img.raw Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mce_c10_prod_cr_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mce_c10_prod_cr_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mce_c10_prod_cr_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mce_c10_prod_cr_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mce_c10_prod_cr_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mce_c10_prod_cr_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mce_c10_prod_cr_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mce_c10_prod_cr_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mts_c10_prod_cr_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mts_c10_prod_cr_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mts_c10_prod_cr_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mts_c10_prod_cr_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mts_c10_prod_cr_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mts_c10_prod_cr_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/mts_c10_prod_cr_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/mts_c10_prod_cr_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/cboot_t194_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/cboot_t194_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/cboot_t194_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/cboot_t194_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/cboot_t194_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/cboot_t194_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/cboot_t194_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/cboot_t194_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/tos-trusty_t194_sigheader.img.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/tos-trusty_t194_sigheader.img.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/tos-trusty_t194_sigheader.img.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/tos-trusty_t194_sigheader.img.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/tos-trusty_t194_sigheader.img.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/tos-trusty_t194_sigheader.img.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/tos-trusty_t194_sigheader.img.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/tos-trusty_t194_sigheader.img.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/eks_sigheader.img.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/eks_sigheader.img.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/eks_sigheader.img.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/eks_sigheader.img.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/eks_sigheader.img.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/eks_sigheader.img.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/eks_sigheader.img.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/eks_sigheader.img.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/bpmp_t194_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/bpmp_t194_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/bpmp_t194_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/bpmp_t194_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/bpmp_t194_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/bpmp_t194_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/bpmp_t194_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/bpmp_t194_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/xusb_sil_rel_fw_sigheader.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/xusb_sil_rel_fw_sigheader.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/xusb_sil_rel_fw_sigheader.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/xusb_sil_rel_fw_sigheader.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/xusb_sil_rel_fw_sigheader.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/xusb_sil_rel_fw_sigheader.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/xusb_sil_rel_fw_sigheader.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/xusb_sil_rel_fw_sigheader.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/camera-rtcpu-rce_sigheader.img.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/camera-rtcpu-rce_sigheader.img.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/camera-rtcpu-rce_sigheader.img.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/camera-rtcpu-rce_sigheader.img.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/camera-rtcpu-rce_sigheader.img.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/camera-rtcpu-rce_sigheader.img.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/camera-rtcpu-rce_sigheader.img.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/camera-rtcpu-rce_sigheader.img.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/adsp-fw_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/adsp-fw_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/adsp-fw_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/adsp-fw_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/adsp-fw_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/adsp-fw_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/adsp-fw_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/adsp-fw_sigheader.bin.encrypt' Warning: skip writing sce-fw partition as no image is specified Warning: skip writing sce-fw_b partition as no image is specified Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/warmboot_t194_prod_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/warmboot_t194_prod_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/warmboot_t194_prod_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/warmboot_t194_prod_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/warmboot_t194_prod_sigheader.bin.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/warmboot_t194_prod_sigheader.bin.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/warmboot_t194_prod_sigheader.bin.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/warmboot_t194_prod_sigheader.bin.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/bmp.blob /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/bmp.blob '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/bmp.blob' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/bmp.blob' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/bmp.blob /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/bmp.blob '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/bmp.blob' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/bmp.blob' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/recovery_sigheader.img.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/recovery_sigheader.img.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/recovery_sigheader.img.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/recovery_sigheader.img.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/tegra194-p2888-0001-p2822-0000.dtb_sigheader.rec.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-p2888-0001-p2822-0000.dtb_sigheader.rec.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/tegra194-p2888-0001-p2822-0000.dtb_sigheader.rec.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/tegra194-p2888-0001-p2822-0000.dtb_sigheader.rec.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/kernel_bootctrl.bin /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/kernel_bootctrl.bin '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/kernel_bootctrl.bin' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/kernel_bootctrl.bin' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/kernel_bootctrl.bin /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/kernel_bootctrl.bin '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/kernel_bootctrl.bin' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/kernel_bootctrl.bin' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/boot_sigheader.img.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/boot_sigheader.img.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/boot_sigheader.img.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/boot_sigheader.img.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/boot_sigheader.img.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/boot_sigheader.img.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/boot_sigheader.img.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/boot_sigheader.img.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt' Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt' Warning: skip writing CPUBL-CFG partition as no image is specified Warning: skip writing RP1 partition as no image is specified Warning: skip writing RP2 partition as no image is specified Warning: skip writing RECROOTFS partition as no image is specified Warning: skip writing UDA partition as no image is specified Copying /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/gpt_secondary_1_3.bin /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/gpt_secondary_1_3.bin '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/gpt_secondary_1_3.bin' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/internal/gpt_secondary_1_3.bin' Copy flash script to /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/l4t_flash_from_kernel.sh' -> '/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/images/l4t_flash_from_kernel.sh' Success


[ 0.0003 ] Generating signature [ 0.0021 ] tegrasign_v3.py --getmode mode.txt --key [ 0.0021 ] Assuming zero filled SBK key : not reading [ 0.0020 ] Generating ratchet blob [ 0.0036 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 0.0040 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0041 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0041 ] [ 0.0042 ] header_magic: 414e4452 [ 0.0058 ] tegrahost_v2 --chip 0x19 --align 1_boot.img [ 0.0062 ] [ 0.0078 ] tegrahost_v2 --chip 0x19 0 --magicid KRNL --ratchet_blob ratchet_blob.bin --appendsigheader 1_boot.img zerosbk [ 0.0082 ] adding BCH for 1_boot.img [ 0.5597 ] [ 0.5622 ] tegrasign_v3.py --key --list 1_boot_sigheader.img_list.xml --pubkeyhash pub_key.key [ 0.5622 ] Assuming zero filled SBK key : not reading [ 0.6131 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_boot_sigheader.img.encrypt 1_boot_sigheader.img.hash zerosbk [ 0.9763 ] [ 1.0203 ] Signed file: /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt l4t_sign_image.sh: Generate header for boot_sigheader.img.encrypt l4t_sign_image.sh: chip 0x19: add 0x27cb800 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot_sigheader.img.encrypt l4t_sign_image.sh: the signed file is /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt done. Making recovery ramdisk for recovery image... Re-generating recovery ramdisk for recovery image... ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/ramdisk_tmp ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra 30412 blocks _BASE_KERNEL_VERSION=4.9.253-tegra ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/ramdisk_tmp/lib ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/ramdisk_tmp ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra 66117 blocks Making Recovery image... copying recdtbfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/kernel/dtb/tegra194-p2888-0001-p2822-0000.dtb.rec)... done. 20+0 records in 20+0 records out 20 bytes copied, 0.000320912 s, 62.3 kB/s Existing sosfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing tegraboot(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/nvtboot_t194.bin) reused. Existing cpu_bootloader(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused. Existing mb2blfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/nvtboot_recovery_t194.bin) reused. Existing mtspreboot(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/preboot_c10_prod_cr.bin) reused. Existing mcepreboot(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mce_c10_prod_cr.bin) reused. Existing mtsproper(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mts_c10_prod_cr.bin) reused. Existing mb1file(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused. Existing bpffile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/bpmp_t194.bin) reused. copying bpfdtbfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/tegra194-a02-bpmp-p2888-a04.dtb)... done. Existing scefile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. Existing camerafw(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/camera-rtcpu-rce.img) reused. Existing spefile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/spe_t194.bin) reused. Existing wb0boot(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/warmboot_t194_prod.bin) reused. Existing tosfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tos-trusty_t194.img) reused. Existing eksfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/eks.img) reused. copying soft_fuses(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done. copying dtbfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/kernel/dtb/tegra194-p2888-0001-p2822-0000.dtb)... done. Copying nv_boot_control.conf to rootfs /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x19 --key --minratchet_config tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg --cmd sign kernel_tegra194-p2888-0001-p2822-0000.dtb kernel_dtb Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0003 ] Generating signature [ 0.0021 ] tegrasign_v3.py --getmode mode.txt --key [ 0.0022 ] Assuming zero filled SBK key : not reading [ 0.0021 ] Generating ratchet blob [ 0.0039 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 0.0044 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0045 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0046 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0046 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0046 ] [ 0.0046 ] header_magic: d00dfeed [ 0.0052 ] tegrahost_v2 --chip 0x19 --align 1_kernel_tegra194-p2888-0001-p2822-0000.dtb [ 0.0057 ] [ 0.0062 ] tegrahost_v2 --chip 0x19 0 --magicid KDTB --ratchet_blob ratchet_blob.bin --appendsigheader 1_kernel_tegra194-p2888-0001-p2822-0000.dtb zerosbk [ 0.0066 ] adding BCH for 1_kernel_tegra194-p2888-0001-p2822-0000.dtb [ 0.0105 ] [ 0.0129 ] tegrasign_v3.py --key --list 1_kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 0.0130 ] Assuming zero filled SBK key : not reading [ 0.0226 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt 1_kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.hash zerosbk [ 0.0325 ] [ 0.0337 ] Signed file: /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt l4t_sign_image.sh: Generate header for kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt l4t_sign_image.sh: chip 0x19: add 0x45651 to offset 0x8 in sig file l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt l4t_sign_image.sh: the signed file is /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt done. Skip generating system.img Existing tbcfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/cboot_t194.bin) reused. copying tbcdtbfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/kernel/dtb/tegra194-p2888-0001-p2822-0000.dtb)... done. copying cfgfile(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/t186ref/cfg/flash_t194_sdmmc.xml) to flash.xml... done. Existing flasher(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu_t194.bin) reused. Existing flashapp(/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/tegraflash.py) reused. ./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin --sdram_config tegra194-mb1-bct-memcfg-p2888.cfg,tegra194-memcfg-sw-override.cfg --odmdata 0x9190000 --applet mb1_t194_prod.bin --cmd "sign" --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --cfg flash.xml --chip 0x19 --uphy_config tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg --minratchet_config tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg --device_config tegra19x-mb1-bct-device-sdmmc.cfg --misc_cold_boot_config tegra194-mb1-bct-misc-l4t.cfg --misc_config tegra194-mb1-bct-misc-flash.cfg --pinmux_config tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg --gpioint_config tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg --pmic_config tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg --pmc_config tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg --prod_config tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg --scr_config tegra194-mb1-bct-scr-cbb-mini.cfg --scr_cold_boot_config tegra194-mb1-bct-scr-cbb-mini.cfg --br_cmd_config tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg --dev_params tegra194-br-bct-sdmmc.cfg --bin "mb2_bootloader nvtboot_recovery_t194.bin; mts_preboot preboot_c10_prod_cr.bin; mts_mce mce_c10_prod_cr.bin; mts_proper mts_c10_prod_cr.bin; bpmp_fw bpmp_t194.bin; bpmp_fw_dtb tegra194-a02-bpmp-p2888-a04.dtb; spe_fw spe_t194.bin; tlk tos-trusty_t194.img; eks eks.img; kernel boot.img; kernel_dtb tegra194-p2888-0001-p2822-0000.dtb; bootloader_dtb tegra194-p2888-0001-p2822-0000.dtb"
Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands

[ 0.0044 ] Using default ramcode: 0 [ 0.0044 ] Disable BPMP dtb trim, using default dtb [ 0.0044 ] [ 0.0064 ] tegrasign_v3.py --getmode mode.txt --key None [ 0.0064 ] Assuming zero filled SBK key [ 0.0065 ] Generating RCM messages [ 0.0084 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod.bin zerosbk [ 0.0090 ] Header already present for mb1_t194_prod.bin [ 0.0109 ] [ 0.0128 ] tegrasign_v3.py --getmode mode.txt --key None [ 0.0128 ] Assuming zero filled SBK key [ 0.0147 ] tegrasign_v3.py --file mb1_t194_prod_sigheader.bin --key None --length 1136 --offset 2960 --pubkeyhash pub_key.key [ 0.0148 ] Assuming zero filled SBK key [ 0.0180 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin mb1_t194_prod_sigheader.hash zerosbk [ 0.0202 ] [ 0.0218 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg sfuse.bin [ 0.0223 ] [ 0.0239 ] tegrabct_v2 --chip 0x19 0 --ratchet_blob ratchet_blob.bin --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 0.0243 ] FwIndex: 1, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 2, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 3, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 4, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 5, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 6, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 7, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 11, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 12, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 13, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 14, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 15, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 16, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 17, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 18, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 19, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 30, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 31, MinRatchetLevel: 0 [ 0.0244 ] FwIndex: 32, MinRatchetLevel: 0 [ 0.0244 ] [ 0.0262 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_sigheader.bin 0 0 [ 0.0269 ] RCM 0 is saved as rcm_0.rcm [ 0.0288 ] RCM 1 is saved as rcm_1.rcm [ 0.0288 ] RCM 2 is saved as rcm_2.rcm [ 0.0288 ] List of rcm files are saved in rcm_list.xml [ 0.0288 ] [ 0.0288 ] Signing RCM messages [ 0.0306 ] tegrasign_v3.py --getmontgomeryvalues montgomery.bin --key None --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0306 ] Assuming zero filled SBK key [ 0.0343 ] Copying signature to RCM mesages [ 0.0359 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml [ 0.0366 ] [ 0.0366 ] Parsing partition layout [ 0.0381 ] tegraparser_v2 --pt flash.xml.tmp [ 0.0389 ] [ 0.0389 ] Creating list of images to be signed [ 0.0404 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --ratchet_blob ratchet_blob.bin --list images_list.xml zerosbk [ 0.0409 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.0412 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.0415 ] MB1: Nvheader already present is mb1_t194_prod.bin [ 0.0432 ] Header already present for mb1_t194_prod_sigheader.bin [ 0.0439 ] adding BCH for spe_t194.bin [ 0.0456 ] adding BCH for spe_t194.bin [ 0.0469 ] adding BCH for nvtboot_t194.bin [ 0.0481 ] adding BCH for nvtboot_t194.bin [ 0.0505 ] Header already present for preboot_c10_prod_cr.bin [ 0.0528 ] Header already present for preboot_c10_prod_cr.bin [ 0.0530 ] Header already present for mce_c10_prod_cr.bin [ 0.0533 ] Header already present for mce_c10_prod_cr.bin [ 0.0542 ] adding BCH for mts_c10_prod_cr.bin [ 0.0561 ] adding BCH for mts_c10_prod_cr.bin [ 0.1017 ] adding BCH for cboot_t194.bin [ 0.1464 ] adding BCH for cboot_t194.bin [ 0.1525 ] adding BCH for tegra194-p2888-0001-p2822-0000.dtb [ 0.1586 ] adding BCH for tegra194-p2888-0001-p2822-0000.dtb [ 0.1623 ] adding BCH for tos-trusty_t194.img [ 0.1660 ] adding BCH for tos-trusty_t194.img [ 0.1713 ] adding BCH for eks.img [ 0.1765 ] adding BCH for eks.img [ 0.1765 ] adding BCH for bpmp_t194.bin [ 0.1768 ] adding BCH for bpmp_t194.bin [ 0.1880 ] adding BCH for tegra194-a02-bpmp-p2888-a04.dtb [ 0.1994 ] adding BCH for tegra194-a02-bpmp-p2888-a04.dtb [ 0.2124 ] adding BCH for xusb_sil_rel_fw [ 0.2253 ] adding BCH for xusb_sil_rel_fw [ 0.2271 ] adding BCH for camera-rtcpu-rce.img [ 0.2289 ] adding BCH for camera-rtcpu-rce.img [ 0.2323 ] adding BCH for adsp-fw.bin [ 0.2358 ] adding BCH for adsp-fw.bin [ 0.2369 ] Header already present for warmboot_t194_prod.bin [ 0.2381 ] Header already present for warmboot_t194_prod.bin [ 0.2386 ] adding BCH for recovery.img [ 0.2547 ] adding BCH for tegra194-p2888-0001-p2822-0000.dtb.rec [ 0.8904 ] adding BCH for boot.img [ 0.9073 ] adding BCH for boot.img [ 1.4541 ] adding BCH for kernel_tegra194-p2888-0001-p2822-0000.dtb [ 2.0708 ] adding BCH for kernel_tegra194-p2888-0001-p2822-0000.dtb [ 2.0909 ] [ 2.0910 ] Filling MB1 storage info [ 2.0910 ] Generating br-bct [ 2.0928 ] Performing cfg overlay [ 2.0928 ] ['tegra194-mb1-bct-memcfg-p2888.cfg', 'tegra194-memcfg-sw-override.cfg'] [ 2.0930 ] sw_memcfg_overlay.pl -c tegra194-mb1-bct-memcfg-p2888.cfg -s tegra194-memcfg-sw-override.cfg -o /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1.cfg [ 2.1156 ] [ 2.1157 ] Updating dev and MSS params in BR BCT [ 2.1157 ] tegrabct_v2 --dev_param tegra194-br-bct-sdmmc.cfg --sdram /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 2.1500 ] [ 2.1501 ] Updating bl info [ 2.1519 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin [ 2.1537 ] [ 2.1537 ] Generating signatures [ 2.1557 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key [ 2.1558 ] Assuming zero filled SBK key [ 2.4436 ] Generating br-bct [ 2.4470 ] Performing cfg overlay [ 2.4471 ] ['/home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1.cfg'] [ 2.4471 ] Updating dev and MSS params in BR BCT [ 2.4472 ] tegrabct_v2 --dev_param tegra194-br-bct-sdmmc.cfg --sdram /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0 [ 2.5007 ] [ 2.5007 ] Updating bl info [ 2.5027 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 2.5054 ] [ 2.5054 ] Updating smd info [ 2.5074 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 --updatesmdinfo flash.xml.bin [ 2.5084 ] [ 2.5084 ] Updating Odmdata [ 2.5103 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0x9190000 [ 2.5112 ] [ 2.5113 ] Get Signed section of bct [ 2.5130 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listbct bct_list.xml [ 2.5135 ] [ 2.5154 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin [ 2.5160 ] Assuming zero filled SBK key [ 2.5292 ] [ 2.5292 ] Updating BCT with signature [ 2.5310 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml [ 2.5316 ] [ 2.5317 ] Generating coldboot mb1-bct [ 2.5334 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_cold_boot_bct.cfg --sdram /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1.cfg --misc tegra194-mb1-bct-misc-l4t.cfg --scr tegra194-mb1-bct-scr-cbb-mini.cfg --pinmux tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg --pmc tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg --pmic tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg --brcommand tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg --prod tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg --gpioint tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg --uphy tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg --device tegra19x-mb1-bct-device-sdmmc.cfg [ 2.5339 ] MB1-BCT version: 0x1

[ 2.5341 ] Parsing config file :tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg [ 2.5344 ] Added Platform Config 0 data with size :- 3008

[ 2.5353 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini.cfg [ 2.5354 ] File read failed [ 2.5373 ] File read failed [ 2.5422 ] Added Platform Config 1 data with size :- 19640

[ 2.5424 ] Parsing config file :tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg [ 2.5426 ] Added Platform Config 2 data with size :- 24

[ 2.5427 ] Parsing config file :tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg [ 2.5429 ] Added Platform Config 4 data with size :- 348 [ 2.5430 ] [ 2.5430 ] Parsing config file :tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg [ 2.5430 ] Added Platform Config 3 data with size :- 92 [ 2.5430 ] [ 2.5430 ] Parsing config file :tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg [ 2.5430 ] Added Platform Config 5 data with size :- 68 [ 2.5431 ] [ 2.5431 ] Parsing config file :tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg [ 2.5431 ] Added Platform Config 7 data with size :- 392 [ 2.5431 ] [ 2.5431 ] Parsing config file :tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg [ 2.5431 ] Added Platform Config 8 data with size :- 12 [ 2.5431 ] [ 2.5431 ] Parsing config file :tegra19x-mb1-bct-device-sdmmc.cfg [ 2.5431 ] Added Platform Config 9 data with size :- 32 [ 2.5431 ] [ 2.5431 ] Updating mb1-bct with firmware information [ 2.5448 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 2.5453 ] MB1-BCT version: 0x1 [ 2.5456 ] [ 2.5456 ] Updating mb1-bct with storage information [ 2.5473 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 2.5478 ] MB1-BCT version: 0x1 [ 2.5481 ] [ 2.5481 ] Updating mb1-bct with ratchet information [ 2.5499 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 2.5503 ] MB1-BCT version: 0x1 [ 2.5505 ] FwIndex: 1, MinRatchetLevel: 0 [ 2.5506 ] FwIndex: 2, MinRatchetLevel: 0 [ 2.5506 ] FwIndex: 3, MinRatchetLevel: 0 [ 2.5506 ] FwIndex: 4, MinRatchetLevel: 0 [ 2.5507 ] FwIndex: 5, MinRatchetLevel: 0 [ 2.5507 ] FwIndex: 6, MinRatchetLevel: 0 [ 2.5507 ] FwIndex: 7, MinRatchetLevel: 0 [ 2.5507 ] FwIndex: 11, MinRatchetLevel: 0 [ 2.5507 ] FwIndex: 12, MinRatchetLevel: 0 [ 2.5507 ] FwIndex: 13, MinRatchetLevel: 0 [ 2.5507 ] FwIndex: 14, MinRatchetLevel: 0 [ 2.5507 ] FwIndex: 15, MinRatchetLevel: 0 [ 2.5507 ] FwIndex: 16, MinRatchetLevel: 0 [ 2.5507 ] FwIndex: 17, MinRatchetLevel: 0 [ 2.5507 ] FwIndex: 18, MinRatchetLevel: 0 [ 2.5507 ] FwIndex: 19, MinRatchetLevel: 0 [ 2.5507 ] FwIndex: 30, MinRatchetLevel: 0 [ 2.5507 ] FwIndex: 31, MinRatchetLevel: 0 [ 2.5507 ] FwIndex: 32, MinRatchetLevel: 0 [ 2.5507 ] [ 2.5525 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct [ 2.5530 ] [ 2.5546 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk [ 2.5551 ] adding BCH for mb1_cold_boot_bct_MB1.bct [ 2.5555 ] [ 2.5576 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 2.5576 ] Assuming zero filled SBK key [ 2.5605 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk [ 2.5612 ] [ 2.5613 ] Generating recovery mb1-bct [ 2.5629 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_bct.cfg --sdram /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1.cfg --misc tegra194-mb1-bct-misc-flash.cfg --scr tegra194-mb1-bct-scr-cbb-mini.cfg --pinmux tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg --pmc tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg --pmic tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg --brcommand tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg --prod tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg --gpioint tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg --uphy tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg --device tegra19x-mb1-bct-device-sdmmc.cfg [ 2.5634 ] MB1-BCT version: 0x1

[ 2.5636 ] Parsing config file :tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg [ 2.5638 ] Added Platform Config 0 data with size :- 3008

[ 2.5645 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini.cfg [ 2.5647 ] File read failed [ 2.5665 ] File read failed [ 2.5714 ] Added Platform Config 1 data with size :- 19640

[ 2.5715 ] Parsing config file :tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg [ 2.5717 ] Added Platform Config 2 data with size :- 24

[ 2.5719 ] Parsing config file :tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg [ 2.5721 ] Added Platform Config 4 data with size :- 348 [ 2.5722 ] [ 2.5722 ] Parsing config file :tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg [ 2.5722 ] Added Platform Config 3 data with size :- 92 [ 2.5722 ] [ 2.5722 ] Parsing config file :tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg [ 2.5722 ] Added Platform Config 5 data with size :- 68 [ 2.5722 ] [ 2.5722 ] Parsing config file :tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg [ 2.5722 ] Added Platform Config 7 data with size :- 392 [ 2.5722 ] [ 2.5722 ] Parsing config file :tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg [ 2.5722 ] Added Platform Config 8 data with size :- 12 [ 2.5722 ] [ 2.5722 ] Parsing config file :tegra19x-mb1-bct-device-sdmmc.cfg [ 2.5722 ] Added Platform Config 9 data with size :- 32 [ 2.5722 ] [ 2.5722 ] Updating mb1-bct with firmware information [ 2.5739 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin [ 2.5744 ] MB1-BCT version: 0x1 [ 2.5747 ] [ 2.5747 ] Updating mb1-bct with storage information [ 2.5765 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 2.5769 ] MB1-BCT version: 0x1 [ 2.5772 ] [ 2.5772 ] Updating mb1-bct with ratchet information [ 2.5787 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --minratchet tegra194-mb1-bct-ratchet-p2888-0000-p2822-0000.cfg [ 2.5792 ] MB1-BCT version: 0x1 [ 2.5793 ] FwIndex: 1, MinRatchetLevel: 0 [ 2.5794 ] FwIndex: 2, MinRatchetLevel: 0 [ 2.5794 ] FwIndex: 3, MinRatchetLevel: 0 [ 2.5794 ] FwIndex: 4, MinRatchetLevel: 0 [ 2.5794 ] FwIndex: 5, MinRatchetLevel: 0 [ 2.5794 ] FwIndex: 6, MinRatchetLevel: 0 [ 2.5794 ] FwIndex: 7, MinRatchetLevel: 0 [ 2.5794 ] FwIndex: 11, MinRatchetLevel: 0 [ 2.5794 ] FwIndex: 12, MinRatchetLevel: 0 [ 2.5795 ] FwIndex: 13, MinRatchetLevel: 0 [ 2.5795 ] FwIndex: 14, MinRatchetLevel: 0 [ 2.5795 ] FwIndex: 15, MinRatchetLevel: 0 [ 2.5795 ] FwIndex: 16, MinRatchetLevel: 0 [ 2.5795 ] FwIndex: 17, MinRatchetLevel: 0 [ 2.5795 ] FwIndex: 18, MinRatchetLevel: 0 [ 2.5795 ] FwIndex: 19, MinRatchetLevel: 0 [ 2.5795 ] FwIndex: 30, MinRatchetLevel: 0 [ 2.5795 ] FwIndex: 31, MinRatchetLevel: 0 [ 2.5795 ] FwIndex: 32, MinRatchetLevel: 0 [ 2.5795 ] [ 2.5812 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct [ 2.5817 ] [ 2.5834 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_bct_MB1.bct zerosbk [ 2.5839 ] adding BCH for mb1_bct_MB1.bct [ 2.5844 ] [ 2.5864 ] tegrasign_v3.py --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 2.5864 ] Assuming zero filled SBK key [ 2.5893 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk [ 2.5900 ] [ 2.5900 ] Generating coldboot mem-bct [ 2.5916 ] tegrabct_v2 --chip 0x19 0 --sdram /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1.cfg --membct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1_1.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1_2.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1_3.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1_4.bct [ 2.5921 ] Packing sdram param for instance[0] [ 2.6254 ] Packing sdram param for instance[1] [ 2.6256 ] Packing sdram param for instance[2] [ 2.6257 ] Packing sdram param for instance[3] [ 2.6257 ] Packing sdram param for instance[4] [ 2.6257 ] Packing sdram param for instance[5] [ 2.6257 ] Packing sdram param for instance[6] [ 2.6257 ] Packing sdram param for instance[7] [ 2.6257 ] Packing sdram param for instance[8] [ 2.6257 ] Packing sdram param for instance[9] [ 2.6257 ] Packing sdram param for instance[10] [ 2.6257 ] Packing sdram param for instance[11] [ 2.6257 ] Packing sdram param for instance[12] [ 2.6257 ] Packing sdram param for instance[13] [ 2.6257 ] Packing sdram param for instance[14] [ 2.6257 ] Packing sdram param for instance[15] [ 2.6257 ] [ 2.6257 ] Getting sector size from pt [ 2.6274 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin [ 2.6279 ] [ 2.6280 ] BlockSize read from layout is 200

[ 2.6295 ] tegrahost_v2 --chip 0x19 0 --blocksize 512 --magicid MEMB --addsigheader_multi /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1_1.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1_2.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1_3.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1_4.bct [ 2.6300 ] adding BCH for /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1_1.bct [ 2.6314 ] [ 2.6332 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct [ 2.6339 ] [ 2.6358 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin --appendsigheader mem_coldboot.bct zerosbk [ 2.6365 ] Header already present for mem_coldboot.bct [ 2.6366 ] [ 2.6388 ] tegrasign_v3.py --key None --list mem_coldboot_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 2.6388 ] Assuming zero filled SBK key [ 2.6422 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_coldboot_sigheader.bct.encrypt mem_coldboot_sigheader.bct.hash zerosbk [ 2.6429 ] [ 2.6430 ] Generating recovery mem-bct [ 2.6447 ] tegrabct_v2 --chip 0x19 0 --sdram /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1.cfg --membct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1_1.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1_2.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1_3.bct /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/14502/tmpdn5nifui1_4.bct [ 2.6451 ] Packing sdram param for instance[0] [ 2.6783 ] Packing sdram param for instance[1] [ 2.6784 ] Packing sdram param for instance[2] [ 2.6785 ] Packing sdram param for instance[3] [ 2.6785 ] Packing sdram param for instance[4] [ 2.6785 ] Packing sdram param for instance[5] [ 2.6785 ] Packing sdram param for instance[6] [ 2.6785 ] Packing sdram param for instance[7] [ 2.6785 ] Packing sdram param for instance[8] [ 2.6786 ] Packing sdram param for instance[9] [ 2.6786 ] Packing sdram param for instance[10] [ 2.6786 ] Packing sdram param for instance[11] [ 2.6786 ] Packing sdram param for instance[12] [ 2.6786 ] Packing sdram param for instance[13] [ 2.6786 ] Packing sdram param for instance[14] [ 2.6786 ] Packing sdram param for instance[15] [ 2.6786 ] [ 2.6804 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct [ 2.6809 ] [ 2.6825 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --ratchet_blob ratchet_blob.bin --appendsigheader mem_rcm.bct zerosbk [ 2.6829 ] adding BCH for mem_rcm.bct [ 2.6838 ] [ 2.6857 ] tegrasign_v3.py --key None --list mem_rcm_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 2.6857 ] Assuming zero filled SBK key [ 2.6885 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm_sigheader.bct.encrypt mem_rcm_sigheader.bct.hash zerosbk [ 2.6894 ] [ 2.6894 ] Copying signatures [ 2.6910 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml [ 4.0401 ] [ 4.0424 ] tegraparser_v2 --generategpt --pt flash.xml.bin [ 4.0436 ] [ 4.0466 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_t194.bin [ 4.0478 ] [ 4.0501 ] tegrahost_v2 --chip 0x19 0 --magicid MB2B --ratchet_blob ratchet_blob.bin --appendsigheader nvtboot_recovery_t194.bin zerosbk [ 4.0514 ] adding BCH for nvtboot_recovery_t194.bin [ 4.0570 ] [ 4.0590 ] tegrasign_v3.py --key None --list nvtboot_recovery_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 4.0590 ] Assuming zero filled SBK key [ 4.0622 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_t194_sigheader.bin.encrypt nvtboot_recovery_t194_sigheader.bin.hash zerosbk [ 4.0640 ] [ 4.0658 ] tegrahost_v2 --chip 0x19 --align preboot_c10_prod_cr.bin [ 4.0666 ] [ 4.0684 ] tegrahost_v2 --chip 0x19 0 --magicid MTSP --appendsigheader preboot_c10_prod_cr.bin zerosbk [ 4.0689 ] Header already present for preboot_c10_prod_cr.bin [ 4.0691 ] [ 4.0711 ] tegrasign_v3.py --key None --list preboot_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 4.0712 ] Assuming zero filled SBK key [ 4.0743 ] tegrahost_v2 --chip 0x19 0 --updatesigheader preboot_c10_prod_cr_sigheader.bin.encrypt preboot_c10_prod_cr_sigheader.bin.hash zerosbk [ 4.0750 ] [ 4.0768 ] tegrahost_v2 --chip 0x19 --align mce_c10_prod_cr.bin [ 4.0773 ] [ 4.0779 ] tegrahost_v2 --chip 0x19 0 --magicid MTSM --appendsigheader mce_c10_prod_cr.bin zerosbk [ 4.0783 ] Header already present for mce_c10_prod_cr.bin [ 4.0794 ] [ 4.0813 ] tegrasign_v3.py --key None --list mce_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 4.0813 ] Assuming zero filled SBK key [ 4.0845 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mce_c10_prod_cr_sigheader.bin.encrypt mce_c10_prod_cr_sigheader.bin.hash zerosbk [ 4.0862 ] [ 4.0881 ] tegrahost_v2 --chip 0x19 --align mts_c10_prod_cr.bin [ 4.0889 ] [ 4.0907 ] tegrahost_v2 --chip 0x19 0 --magicid MTSB --appendsigheader mts_c10_prod_cr.bin zerosbk [ 4.0915 ] adding BCH for mts_c10_prod_cr.bin [ 4.1429 ] [ 4.1452 ] tegrasign_v3.py --key None --list mts_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 4.1452 ] Assuming zero filled SBK key [ 4.1522 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mts_c10_prod_cr_sigheader.bin.encrypt mts_c10_prod_cr_sigheader.bin.hash zerosbk [ 4.1763 ] [ 4.1781 ] tegrahost_v2 --chip 0x19 --align bpmp_t194.bin [ 4.1785 ] [ 4.1804 ] tegrahost_v2 --chip 0x19 0 --magicid BPMF --ratchet_blob ratchet_blob.bin --appendsigheader bpmp_t194.bin zerosbk [ 4.1810 ] adding BCH for bpmp_t194.bin [ 4.1925 ] [ 4.1946 ] tegrasign_v3.py --key None --list bpmp_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 4.1946 ] Assuming zero filled SBK key [ 4.1987 ] tegrahost_v2 --chip 0x19 0 --updatesigheader bpmp_t194_sigheader.bin.encrypt bpmp_t194_sigheader.bin.hash zerosbk [ 4.2052 ] [ 4.2069 ] tegrahost_v2 --chip 0x19 --align tegra194-a02-bpmp-p2888-a04.dtb [ 4.2074 ] [ 4.2092 ] tegrahost_v2 --chip 0x19 0 --magicid BPMD --ratchet_blob ratchet_blob.bin --appendsigheader tegra194-a02-bpmp-p2888-a04.dtb zerosbk [ 4.2099 ] adding BCH for tegra194-a02-bpmp-p2888-a04.dtb [ 4.2235 ] [ 4.2257 ] tegrasign_v3.py --key None --list tegra194-a02-bpmp-p2888-a04_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 4.2257 ] Assuming zero filled SBK key [ 4.2301 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt tegra194-a02-bpmp-p2888-a04_sigheader.dtb.hash zerosbk [ 4.2376 ] [ 4.2393 ] tegrahost_v2 --chip 0x19 --align spe_t194.bin [ 4.2398 ] [ 4.2416 ] tegrahost_v2 --chip 0x19 0 --magicid SPEF --ratchet_blob ratchet_blob.bin --appendsigheader spe_t194.bin zerosbk [ 4.2422 ] adding BCH for spe_t194.bin [ 4.2436 ] [ 4.2456 ] tegrasign_v3.py --key None --list spe_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 4.2456 ] Assuming zero filled SBK key [ 4.2475 ] tegrahost_v2 --chip 0x19 0 --updatesigheader spe_t194_sigheader.bin.encrypt spe_t194_sigheader.bin.hash zerosbk [ 4.2487 ] [ 4.2504 ] tegrahost_v2 --chip 0x19 --align tos-trusty_t194.img [ 4.2509 ] [ 4.2526 ] tegrahost_v2 --chip 0x19 0 --magicid TOSB --ratchet_blob ratchet_blob.bin --appendsigheader tos-trusty_t194.img zerosbk [ 4.2531 ] adding BCH for tos-trusty_t194.img [ 4.2586 ] [ 4.2606 ] tegrasign_v3.py --key None --list tos-trusty_t194_sigheader.img_list.xml --pubkeyhash pub_key.key [ 4.2606 ] Assuming zero filled SBK key [ 4.2638 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tos-trusty_t194_sigheader.img.encrypt tos-trusty_t194_sigheader.img.hash zerosbk [ 4.2671 ] [ 4.2688 ] tegrahost_v2 --chip 0x19 --align eks.img [ 4.2692 ] [ 4.2708 ] tegrahost_v2 --chip 0x19 0 --magicid EKSB --ratchet_blob ratchet_blob.bin --appendsigheader eks.img zerosbk [ 4.2713 ] adding BCH for eks.img [ 4.2713 ] [ 4.2733 ] tegrasign_v3.py --key None --list eks_sigheader.img_list.xml --pubkeyhash pub_key.key [ 4.2734 ] Assuming zero filled SBK key [ 4.2764 ] tegrahost_v2 --chip 0x19 0 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk [ 4.2772 ] [ 4.2789 ] tegrahost_v2 --chip 0x19 --align tegra194-p2888-0001-p2822-0000.dtb [ 4.2794 ] [ 4.2812 ] tegrahost_v2 --chip 0x19 0 --magicid CDTB --ratchet_blob ratchet_blob.bin --appendsigheader tegra194-p2888-0001-p2822-0000.dtb zerosbk [ 4.2836 ] adding BCH for tegra194-p2888-0001-p2822-0000.dtb [ 4.2900 ] [ 4.2920 ] tegrasign_v3.py --key None --list tegra194-p2888-0001-p2822-0000_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 4.2920 ] Assuming zero filled SBK key [ 4.2952 ] tegrahost_v2 --chip 0x19 0 --updatesigheader tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt tegra194-p2888-0001-p2822-0000_sigheader.dtb.hash zerosbk [ 4.2977 ] [ 4.2993 ] tegrahost_v2 --chip 0x19 --align nvtboot_recovery_cpu_t194.bin [ 4.2997 ] [ 4.3013 ] tegrahost_v2 --chip 0x19 0 --magicid CPBL --ratchet_blob ratchet_blob.bin --appendsigheader nvtboot_recovery_cpu_t194.bin zerosbk [ 4.3018 ] adding BCH for nvtboot_recovery_cpu_t194.bin [ 4.3054 ] [ 4.3075 ] tegrasign_v3.py --key None --list nvtboot_recovery_cpu_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 4.3076 ] Assuming zero filled SBK key [ 4.3114 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_recovery_cpu_t194_sigheader.bin.encrypt nvtboot_recovery_cpu_t194_sigheader.bin.hash zerosbk [ 4.3243 ] [ 4.3246 ] Copying signed file in /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed [ 4.4987 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/bootloader/signed/flash.xml.tmp flash.idx [ 5.3759 ] ./tegraflash.py --bl nvtboot_recovery_cpu_t194_sigheader.bin.encrypt --bct br_bct_BR.bct --securedev --applet rcm_2_encrypt.rcm --applet_softfuse rcm_1_encrypt.rcm --cmd "rcmboot" --cfg secureflash.xml --chip 0x19 --mb1_bct mb1_bct_MB1_sigheader.bct.encrypt --mem_bct mem_rcm_sigheader.bct.encrypt --mb1_cold_boot_bct mb1_cold_boot_bct_MB1_sigheader.bct.encrypt --mem_bct_cold_boot mem_coldboot_sigheader.bct.encrypt --bins "mb2_bootloader nvtboot_recovery_t194_sigheader.bin.encrypt; mts_preboot preboot_c10_prod_cr_sigheader.bin.encrypt; mts_mce mce_c10_prod_cr_sigheader.bin.encrypt; mts_proper mts_c10_prod_cr_sigheader.bin.encrypt; bpmp_fw bpmp_t194_sigheader.bin.encrypt; bpmp_fw_dtb tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt; spe_fw spe_t194_sigheader.bin.encrypt; tlk tos-trusty_t194_sigheader.img.encrypt; eks eks_sigheader.img.encrypt; kernel boot.img; kernel_dtb kernel_tegra194-p2888-0001-p2822-0000.dtb; bootloader_dtb tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt" --skipuid --ramcode 2 saving flash command in flashcmd.txt

no-flash flag enabled. Exiting now...

User can run above saved command in factory environment without providing pkc and sbk keys to flash a device

Example:

$ cd bootloader 
$ sudo bash ./flashcmd.txt

Save initrd flashing command parameters to /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/initrdflashparam.txt /tmp/tmp.PsOUouUET1 ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra writing boot image config in bootimg.cfg extracting kernel in zImage extracting ramdisk in initrd.img /tmp/tmp.PsOUouUET1/initrd /tmp/tmp.PsOUouUET1 ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra 66117 blocks 66709 blocks /tmp/tmp.PsOUouUET1 ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra flashimg0=boot0.img ~/bootFromExternalStorage/R32.6.1/Linux_for_Tegra Success Cleaning up... Finish generating flash package. /home/jetson/bootFromExternalStorage/R32.6.1/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh --skipuid --usb-instance 1-2 --device-instance 0 --flash-only --external-device nvme0n1p1 -c "tools/kernel_flash/flash_l4t_external.xml" jetson-agx-xavier-devkit nvme0n1p1 Start flashing device: 1-2, rcm instance: 0, PID: 14849 Log will be saved to Linux_for_Tegra/initrdlog/flash_1-2_0_20210831-143159.log Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: 14849 Ongoing processes: jetson@aurora:~/bootFromExternalStorage$

`

anhmiuhv commented 3 years ago

Yeah so that means that it succeeds. I think you also need to do oem-config when flashing device for the first time on the monitor right? Was you able to do oem-config?

diamondbarcode commented 3 years ago

The monitor that I connect to AGX via HDMI only show blank, nothing happen and I can't SSH since no long on account .. it just weird .. I know if I reflash with 4.5.1 it just work ..

On Tue, Aug 31, 2021, 14:58 Linh Hoang @.***> wrote:

Yeah so that means that it succeeds. I think you also need to do oem-config when flashing device for the first time on the monitor right? Was you able to do oem-config?

— You are receiving this because you modified the open/close state. Reply to this email directly, view it on GitHub https://github.com/jetsonhacks/bootFromExternalStorage/issues/4#issuecomment-909573446, or unsubscribe https://github.com/notifications/unsubscribe-auth/AETMPHITUESBJPUG43JJBMDT7UX75ANCNFSM5DCM7JFQ . Triage notifications on the go with GitHub Mobile for iOS https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675 or Android https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub.

anhmiuhv commented 3 years ago

That is unfortunate. One last thing you can do is creating username password before flashing

cd Linux_for_Tegra/
 sudo ./tools/l4t_create_default_user.sh -u ubuntu -p ubuntu # this command create username ubuntu and password ubuntu
jetsonhacks commented 3 years ago

@diamondbarcode Are you using a VM for your host machine? I think the next step is for you to to provide a serial debug console log. oem-config should have come up on the monitor.

diamondbarcode commented 3 years ago

My host is Ubuntu 18.0.4 install on SSD alongside with windows 10 not VM.

I am not sure how to do serials console log sorry. I am limited on this..

On Tue, Aug 31, 2021, 19:15 Jetsonhacks @.***> wrote:

@diamondbarcode https://github.com/diamondbarcode Are you using a VM for your host machine? I think the next step is for you to to provide a serial debug console log. T

— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub https://github.com/jetsonhacks/bootFromExternalStorage/issues/4#issuecomment-909751036, or unsubscribe https://github.com/notifications/unsubscribe-auth/AETMPHIQOQ6AOWCMPIJJCXLT7VWDVANCNFSM5DCM7JFQ . Triage notifications on the go with GitHub Mobile for iOS https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675 or Android https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub.

anhmiuhv commented 3 years ago

It is actually pretty easy. You just need an microUSB to USB cable from Xavier to your PC and the minicom program.

https://developer.ridgerun.com/wiki/index.php?title=Xavier%2FIn_Board%2FGetting_in_Board%2FSerial_Console

RchGrav commented 3 years ago

I didn't read this first just did a pull for the obvious typo. Seems I'm getting the same outcome.

jetsonhacks commented 3 years ago

@RchGrav Do you have a serial console log to share?

jetsonhacks commented 3 years ago

Thank you @anhmiuhv for looking into these issues.

RchGrav commented 3 years ago

@jetsonhack Let me get one.. give me a few.

RchGrav commented 3 years ago

[0063.517] W> RATCHET: MB1 binary ratchet value 4 is too large than ratchet leve l 2 from HW fuses. [0063.526] I> MB1 (prd-version: 1.5.1.7-t194-41334769-98030a79) [0063.531] I> Boot-mode: Platform RCM [0063.534] I> Chip revision : A02P [0063.537] I> Bootrom patch version : 15 (correctly patched) [0063.543] I> ATE fuse revision : 0x200 [0063.546] I> Ram repair fuse : 0x0 [0063.549] I> Ram Code : 0x2 [0063.552] I> rst_source : 0x0 [0063.555] I> rst_level : 0x0 [0063.558] I> USB configuration success [0065.645] I> mb2 image downloaded [0065.668] I> Recovery boot mode 0 [0065.672] I> Boot-device: eMMC [0065.677] I> UPHY full init done [0065.681] I> MB1 done

[0065.686] W> Profiler not initialized [0065.689] I> Welcome to MB2(TBoot-BPMP) Applet (version: 00.00.2018.32-mobile-7 8b59fcb) [0065.697] W> Profiler not initialized [0065.701] I> DMA Heap @ [0x40020000 - 0x40065800] [0065.705] I> Default Heap @ [0xd486400 - 0xd48a400] [0065.710] W> Profiler not initialized [0065.714] W> Profiler not initialized [0065.717] E> DEVICE_PROD: Invalid value data = 0, size = 0. [0065.723] W> device prod register failed [0065.726] W> Profiler not initialized [0065.794] I> sdmmc DDR50 mode [0065.798] I> No supported QSPI flash found [0065.802] E> QSPI Flash: Insufficient flash size (0 MB) [0065.807] I> QSPI Flash is not present. [0065.858] E> Link startup dme_set failed [0065.862] E> UFS initialization failed [0065.866] I> UFS is not present [0065.869] W> Profiler not initialized [0065.876] I> Found 17 partitions in SDMMC_BOOT (instance 3) [0065.886] I> Found 42 partitions in SDMMC_USER (instance 3) [0065.891] W> Profiler not initialized [0065.894] W> Profiler not initialized [0065.898] W> Profiler not initialized [0065.902] I> Entering 3p server [0065.905] I> USB configuration success [0066.788] I> Populate chip info [0066.815] I> Populate eeprom info [0066.819] I> Populate eeprom info for module cvm [0073.086] I> Populate chip info [0073.115] I> Populate eeprom info [0073.119] I> Populate eeprom info for module cvb [0073.211] I> Rebooting : reboot-recovery

[007▒▒ [0002.283] W> RATCHET: MB1 binary ratchet value 4 is too large than ratchet leve l 2 from HW fuses. [0002.292] I> MB1 (prd-version: 1.5.1.7-t194-41334769-98030a79) [0002.297] I> Boot-mode: Platform RCM [0002.301] I> Chip revision : A02P [0002.304] I> Bootrom patch version : 15 (correctly patched) [0002.309] I> ATE fuse revision : 0x200 [0002.312] I> Ram repair fuse : 0x0 [0002.315] I> Ram Code : 0x2 [0002.318] I> rst_source : 0xb [0002.321] I> rst_level : 0x1 [0002.324] I> USB configuration success [0004.395] I> mb2 image downloaded [0004.424] I> Recovery boot mode 0 [0004.427] I> Boot-device: eMMC [0004.432] I> UPHY full init done [0004.436] I> MB1 done

[0004.441] W> Profiler not initialized [0004.444] I> Welcome to MB2(TBoot-BPMP) Applet (version: 00.00.2018.32-mobile-7 8b59fcb) [0004.452] W> Profiler not initialized [0004.456] I> DMA Heap @ [0x40020000 - 0x40065800] [0004.460] I> Default Heap @ [0xd486400 - 0xd48a400] [0004.465] W> Profiler not initialized [0004.469] W> Profiler not initialized [0004.472] E> DEVICE_PROD: Invalid value data = 0, size = 0. [0004.477] W> device prod register failed [0004.481] W> Profiler not initialized [0004.506] I> sdmmc DDR50 mode [0004.510] I> No supported QSPI flash found [0004.514] E> QSPI Flash: Insufficient flash size (0 MB) [0004.519] I> QSPI Flash is not present. [0004.570] E> Link startup dme_set failed [0004.574] E> UFS initialization failed [0004.577] I> UFS is not present [0004.580] W> Profiler not initialized [0004.589] I> Found 17 partitions in SDMMC_BOOT (instance 3) [0004.599] I> Found 42 partitions in SDMMC_USER (instance 3) [0004.604] W> Profiler not initialized [0004.608] W> Profiler not initialized [0004.611] W> Profiler not initialized [0004.615] I> Entering 3p server [0004.618] I> USB configuration success [0005.574] I> Populate chip info [0005.602] I> Populate eeprom info [0005.606] I> Populate eeprom info for module cvm [0011.926] I> Populate chip info [0011.966] I> Populate eeprom info [0011.969] I> Populate eeprom info for module cvb [0012.058] I> Rebooting : reboot-recovery

[001▒▒ [0002.472] W> RATCHET: MB1 binary ratchet value 4 is too large than ratchet leve l 2 from HW fuses. [0002.481] I> MB1 (prd-version: 1.5.1.7-t194-41334769-98030a79) [0002.486] I> Boot-mode: Platform RCM [0002.490] I> Chip revision : A02P [0002.493] I> Bootrom patch version : 15 (correctly patched) [0002.498] I> ATE fuse revision : 0x200 [0002.501] I> Ram repair fuse : 0x0 [0002.504] I> Ram Code : 0x2 [0002.507] I> rst_source : 0xb [0002.510] I> rst_level : 0x1 [0002.513] I> USB configuration success [0004.599] I> mb2 image downloaded [0004.627] I> Recovery boot mode 0 [0004.631] I> Boot-device: eMMC [0004.636] I> UPHY full init done [0004.640] I> MB1 done

[0004.645] W> Profiler not initialized [0004.648] I> Welcome to MB2(TBoot-BPMP) Applet (version: 00.00.2018.32-mobile-7 8b59fcb) [0004.656] W> Profiler not initialized [0004.659] I> DMA Heap @ [0x40020000 - 0x40065800] [0004.664] I> Default Heap @ [0xd486400 - 0xd48a400] [0004.669] W> Profiler not initialized [0004.672] W> Profiler not initialized [0004.676] E> DEVICE_PROD: Invalid value data = 0, size = 0. [0004.681] W> device prod register failed [0004.685] W> Profiler not initialized [0004.710] I> sdmmc DDR50 mode [0004.714] I> No supported QSPI flash found [0004.718] E> QSPI Flash: Insufficient flash size (0 MB) [0004.723] I> QSPI Flash is not present. [0004.774] E> Link startup dme_set failed [0004.778] E> UFS initialization failed [0004.781] I> UFS is not present [0004.784] W> Profiler not initialized [0004.793] I> Found 17 partitions in SDMMC_BOOT (instance 3) [0004.803] I> Found 42 partitions in SDMMC_USER (instance 3) [0004.808] W> Profiler not initialized [0004.812] W> Profiler not initialized [0004.815] W> Profiler not initialized [0004.819] I> Entering 3p server [0004.822] I> USB configuration success [0005.774] I> Populate chip info [0005.814] I> Populate eeprom info [0005.818] I> Populate eeprom info for module cvm [0005.910] I> Rebooting : reboot-recovery

[000

RchGrav commented 3 years ago

More coming...

RchGrav commented 3 years ago

https://pastebin.com/raw/SYRpNzBR

jetsonhacks commented 3 years ago

Thanks @RchGrav @anhmiuhv Does the JAX eMMC need to be flashed with 32.6.1 before preparing to flash from external storage?

RchGrav commented 3 years ago

I had already flashed to the newer Jetpack 4.6 via SDK manager if it is meaningful in anyway.

(In other words I was already on 32.6.1 and my Cboot had nvme at a higher priority on the bootflow sequence.)

RchGrav commented 3 years ago

So I installed SDK manager and reflashed with that just to get back to a known state but I still booted up with the same blank screen.... I had to interrupt the boot process at the countdown (debug console) and issue the following.

setvar boot-order emmc boot

Then I was able to accept the EULA stuff and set my user name, etc.

I'm just putting this here for anyone who gets spooked when attempting to reflash using the SDK method and it doesn't fix the issue.. either remove the NVMe temporarily to recover or interrupt boot and issue the above commands. ;-)

anhmiuhv commented 3 years ago

Flash from external storage should already flash to emmc in the process.

Oem-config is expected to run fine when booting from NVMe; but in case when flashing to NVMe and oem-config fails to start, you can run

sudo ./tools/l4t_create_default_user.sh -u ubuntu -p ubuntu # this command create username ubuntu and password ubuntu

to skip oem-config

anhmiuhv commented 3 years ago

https://pastebin.com/raw/SYRpNzBR

From this log, it does seems OEM-config fails to run for some reason