sudo ./odmfuse.sh --noburn -i 0x18 --auth PKC -p -k ../.rsa_priv/rsa_priv.pem jetson-tx2-devkit-4gb Odmfuse requires variable FAB and BOARDID in order to run in the offline mode. Otherwise odmfuse needs to access on board EEPROM. Make sure the board is in recovery mode. ./tegraflash.py --chip 0x18 --applet "/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin" --skipuid --cmd "dump eeprom boardinfo cvm.bin" --key "/home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0054 ] Generating RCM messages [ 0.0064 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm /home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin 0 0 [ 0.0070 ] RCM 0 is saved as rcm_0.rcm [ 0.0073 ] RCM 1 is saved as rcm_1.rcm [ 0.0073 ] List of rcm files are saved in rcm_list.xml [ 0.0073 ] [ 0.0073 ] Signing RCM messages [ 0.0079 ] tegrasign_v2 --key /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0084 ] PKC key in Open SSL format [ 0.0086 ] Key size is 256 bytes [ 0.0088 ] Valid PKC key [ 0.0096 ] Saving pkc public key in pub_key.key [ 0.1143 ] [ 0.1143 ] Copying signature to RCM mesages [ 0.1152 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml --pubkeyhash pub_key.key [ 0.1162 ] [ 0.1162 ] Boot Rom communication [ 0.1187 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml --skipuid [ 0.1195 ] RCM version 0X180001 [ 0.1957 ] Boot Rom communication completed [ 1.2037 ] [ 2.2079 ] tegrarcm_v2 --isapplet [ 2.2104 ] Applet version 01.00.0000 [ 2.2889 ] [ 2.2890 ] python script dump EEPROM info [ 2.2920 ] Retrieving EEPROM data [ 2.2924 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/cvm.bin [ 2.2948 ] Applet version 01.00.0000 [ 2.4092 ] Saved platform info in /home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/cvm.bin [ 2.4812 ] Board ID(3489) version(300) sku(0888) revision(H.0) copying sdram_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/P3489_Sku888_4GB_Hynix_4GB_lpddr4_204Mhz_P138_A02_l4t.cfg)... done. copying misc_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)... done. copying pinmux_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg)... done. copying scr_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/minimal_scr.cfg)... done. copying scr_cold_boot_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/mobile_scr.cfg)... done. copying pmc_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg)... done. copying pmic_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-lightning-p3489-1000-a00.cfg)... done. copying br_cmd_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg)... done. copying prod_config(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg)... done. copying dev_params(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/BCT/emmc.cfg)... done. Existing mb2_bootloader(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused. Existing mts_preboot(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/preboot_d15_prod_cr.bin) reused. Existing mts_bootpack(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/mce_mts_d15_prod_cr.bin) reused. copying bootloader_dtb(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3489-0888-a00-00-base.dtb)... done. Existing bpmp_fw(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/bpmp.bin) reused. copying bpmp_fw_dtb(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/tegra186-a02-bpmp-lightning-p3489-a00-00-te770m.dtb)... done. Existing tlk(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/tos-trusty.img) reused. Existing eks(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/eks.img) reused. Existing mb1file(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/mb1_prod.bin) reused. Existing spefile(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/spe.bin) reused. copying tegraboot(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/nvtboot.bin)... done. Existing tbcfile(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/cboot.bin) reused. Existing scefile(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. copying wb0boot(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/t186ref/warmboot.bin)... done. done. Existing cfg(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/flash.xml) reused. Existing bl(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu.bin) reused. Existing applet(/home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin) reused. ./tegraflash.py --sdram_config P3489_Sku888_4GB_Hynix_4GB_lpddr4_204Mhz_P138_A02_l4t.cfg --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg --pmic_config tegra186-mb1-bct-pmic-lightning-p3489-1000-a00.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg --prod_config tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg --dev_params emmc.cfg --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bootloader_dtb tegra186-quill-p3489-0888-a00-00-base.dtb; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-lightning-p3489-a00-00-te770m.dtb; tlk tos-trusty.img; eks eks.img" --cfg flash.xml --bl nvtboot_recovery_cpu.bin --odmdata 0x1090000 --chip 0x18 --applet mb1_recovery_prod.bin --key "/home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem" --cmd "sign" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0075 ] tegrasign_v2 --key /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem --getmode mode.txt [ 0.0081 ] PKC key in Open SSL format [ 0.0082 ] Key size is 256 bytes [ 0.0083 ] Valid PKC key [ 0.0093 ] [ 0.0094 ] Generating RCM messages [ 0.0100 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0 [ 0.0106 ] RCM 0 is saved as rcm_0.rcm [ 0.0108 ] RCM 1 is saved as rcm_1.rcm [ 0.0108 ] List of rcm files are saved in rcm_list.xml [ 0.0108 ] [ 0.0108 ] Signing RCM messages [ 0.0114 ] tegrasign_v2 --key /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0120 ] PKC key in Open SSL format [ 0.0121 ] Key size is 256 bytes [ 0.0122 ] Valid PKC key [ 0.0131 ] Saving pkc public key in pub_key.key [ 0.0985 ] [ 0.0985 ] Copying signature to RCM mesages [ 0.0994 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml --pubkeyhash pub_key.key [ 0.1003 ] [ 0.1003 ] Parsing partition layout [ 0.1010 ] tegraparser_v2 --pt flash.xml.tmp [ 0.1020 ] [ 0.1020 ] Creating list of images to be signed [ 0.1026 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml oem-rsa [ 0.1163 ] [ 0.1164 ] Generating signatures [ 0.1171 ] tegrasign_v2 --key /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem --list images_list.xml --pubkeyhash pub_key.key [ 0.1177 ] PKC key in Open SSL format [ 0.1179 ] Key size is 256 bytes [ 0.1179 ] Valid PKC key [ 0.1190 ] Saving pkc public key in pub_key.key [ 1.5105 ] [ 1.5105 ] Generating br-bct [ 1.5114 ] Updating dev and MSS params in BR BCT [ 1.5115 ] tegrabct_v2 --dev_param emmc.cfg --sdram P3489_Sku888_4GB_Hynix_4GB_lpddr4_204Mhz_P138_A02_l4t.cfg --brbct br_bct.cfg --chip 0x18 0 [ 1.5173 ] [ 1.5174 ] Updating bl info [ 1.5182 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 1.5196 ] [ 1.5196 ] Updating smd info [ 1.5203 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin [ 1.5212 ] [ 1.5213 ] Updating Odmdata [ 1.5219 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x1090000 [ 1.5229 ] [ 1.5229 ] Get Signed section of bct [ 1.5236 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml [ 1.5245 ] [ 1.5252 ] tegrasign_v2 --key /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem --list bct_list.xml --pubkeyhash pub_key.key [ 1.5258 ] PKC key in Open SSL format [ 1.5260 ] Key size is 256 bytes [ 1.5261 ] Valid PKC key [ 1.5271 ] Saving pkc public key in pub_key.key [ 1.5692 ] [ 1.5692 ] Updating BCT with signature [ 1.5700 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key [ 1.5710 ] [ 1.5710 ] Generating coldboot mb1-bct [ 1.5716 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram P3489_Sku888_4GB_Hynix_4GB_lpddr4_204Mhz_P138_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg --pmc tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg --pmic tegra186-mb1-bct-pmic-lightning-p3489-1000-a00.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg --prod tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg [ 1.5721 ] MB1-BCT version: 0xf [ 1.5723 ] Copying Sdram info from 2 to 3 set [ 1.5771 ] Copying Sdram info from 3 to 0 set [ 1.5773 ] Copying Sdram info from 0 to 1 set [ 1.5775 ] Packing sdram param for instance[0] [ 1.5776 ] Packing sdram param for instance[1] [ 1.5778 ] Packing sdram param for instance[2] [ 1.5780 ] Packing sdram param for instance[3] [ 1.5782 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg [ 1.5785 ] Appending platform config data of size :- 2952 [ 1.5787 ] Parsing config file :mobile_scr.cfg [ 1.5789 ] Appending platform config data of size :- 12240 [ 1.5789 ] [ 1.5789 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg [ 1.5789 ] Appending platform config data of size :- 24 [ 1.5790 ] [ 1.5790 ] Parsing config file :tegra186-mb1-bct-pmic-lightning-p3489-1000-a00.cfg [ 1.5790 ] Appending platform config data of size :- 744 [ 1.5790 ] [ 1.5790 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg [ 1.5790 ] Appending platform config data of size :- 64 [ 1.5790 ] [ 1.5790 ] Parsing config file :tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg [ 1.5790 ] Appending platform config data of size :- 2132 [ 1.5790 ] [ 1.5790 ] Updating mb1-bct with firmware information [ 1.5798 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 1.5804 ] MB1-BCT version: 0xf [ 1.5808 ] [ 1.5808 ] Updating mb1-bct with storage information [ 1.5816 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 1.5823 ] MB1-BCT version: 0xf [ 1.5826 ] [ 1.5834 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct [ 1.5840 ] [ 1.5846 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct oem-rsa [ 1.5853 ] [ 1.5861 ] tegrasign_v2 --key /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 1.5866 ] PKC key in Open SSL format [ 1.5868 ] Key size is 256 bytes [ 1.5868 ] Valid PKC key [ 1.5878 ] Saving pkc public key in pub_key.key [ 1.6303 ] [ 1.6314 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.signed mb1_cold_boot_bct_MB1_sigheader.bct.sig oem-rsa [ 1.6322 ] [ 1.6323 ] Generating recovery mb1-bct [ 1.6329 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram P3489_Sku888_4GB_Hynix_4GB_lpddr4_204Mhz_P138_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg --pmc tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg --pmic tegra186-mb1-bct-pmic-lightning-p3489-1000-a00.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg --prod tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg [ 1.6335 ] MB1-BCT version: 0xf [ 1.6337 ] Copying Sdram info from 2 to 3 set [ 1.6385 ] Copying Sdram info from 3 to 0 set [ 1.6387 ] Copying Sdram info from 0 to 1 set [ 1.6388 ] Packing sdram param for instance[0] [ 1.6390 ] Packing sdram param for instance[1] [ 1.6391 ] Packing sdram param for instance[2] [ 1.6392 ] Packing sdram param for instance[3] [ 1.6393 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg [ 1.6396 ] Appending platform config data of size :- 2952 [ 1.6397 ] Parsing config file :minimal_scr.cfg [ 1.6399 ] Appending platform config data of size :- 12240 [ 1.6400 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg [ 1.6403 ] Appending platform config data of size :- 24 [ 1.6403 ] [ 1.6403 ] Parsing config file :tegra186-mb1-bct-pmic-lightning-p3489-1000-a00.cfg [ 1.6403 ] Appending platform config data of size :- 744 [ 1.6403 ] [ 1.6403 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg [ 1.6403 ] Appending platform config data of size :- 64 [ 1.6403 ] [ 1.6403 ] Parsing config file :tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg [ 1.6403 ] Appending platform config data of size :- 2132 [ 1.6403 ] [ 1.6404 ] Updating mb1-bct with firmware information [ 1.6411 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin [ 1.6417 ] MB1-BCT version: 0xf [ 1.6421 ] [ 1.6421 ] Updating mb1-bct with storage information [ 1.6427 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin [ 1.6433 ] MB1-BCT version: 0xf [ 1.6436 ] [ 1.6442 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct [ 1.6448 ] [ 1.6454 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct oem-rsa [ 1.6460 ] [ 1.6468 ] tegrasign_v2 --key /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key [ 1.6473 ] PKC key in Open SSL format [ 1.6475 ] Key size is 256 bytes [ 1.6476 ] Valid PKC key [ 1.6485 ] Saving pkc public key in pub_key.key [ 1.6913 ] [ 1.6923 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.signed mb1_bct_MB1_sigheader.bct.sig oem-rsa [ 1.6931 ] [ 1.6932 ] Copying signatures [ 1.6938 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml --pubkeyhash pub_key.key [ 1.7122 ] [ 1.7131 ] tegraparser_v2 --generategpt --pt flash.xml.bin [ 1.7141 ] [ 1.7155 ] tegrahost_v2 --chip 0x18 --align nvtboot_recovery.bin [ 1.7162 ] [ 1.7168 ] tegrahost_v2 --appendsigheader nvtboot_recovery.bin oem-rsa [ 1.7176 ] [ 1.7184 ] tegrasign_v2 --key /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem --list nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 1.7190 ] PKC key in Open SSL format [ 1.7192 ] Key size is 256 bytes [ 1.7194 ] Valid PKC key [ 1.7204 ] Saving pkc public key in pub_key.key [ 1.7637 ] [ 1.7646 ] tegrahost_v2 --updatesigheader nvtboot_recovery_sigheader.bin.signed nvtboot_recovery_sigheader.bin.sig oem-rsa [ 1.7655 ] [ 1.7661 ] tegrahost_v2 --chip 0x18 --align preboot_d15_prod_cr.bin [ 1.7667 ] [ 1.7674 ] tegrahost_v2 --appendsigheader preboot_d15_prod_cr.bin oem-rsa [ 1.7682 ] [ 1.7689 ] tegrasign_v2 --key /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem --list preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 1.7695 ] PKC key in Open SSL format [ 1.7697 ] Key size is 256 bytes [ 1.7698 ] Valid PKC key [ 1.7707 ] Saving pkc public key in pub_key.key [ 1.8133 ] [ 1.8143 ] tegrahost_v2 --updatesigheader preboot_d15_prod_cr_sigheader.bin.signed preboot_d15_prod_cr_sigheader.bin.sig oem-rsa [ 1.8151 ] [ 1.8158 ] tegrahost_v2 --chip 0x18 --align mce_mts_d15_prod_cr.bin [ 1.8165 ] [ 1.8171 ] tegrahost_v2 --appendsigheader mce_mts_d15_prod_cr.bin oem-rsa [ 1.8213 ] [ 1.8223 ] tegrasign_v2 --key /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem --list mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 1.8231 ] PKC key in Open SSL format [ 1.8233 ] Key size is 256 bytes [ 1.8234 ] Valid PKC key [ 1.8244 ] Saving pkc public key in pub_key.key [ 1.8874 ] [ 1.8883 ] tegrahost_v2 --updatesigheader mce_mts_d15_prod_cr_sigheader.bin.signed mce_mts_d15_prod_cr_sigheader.bin.sig oem-rsa [ 1.8911 ] [ 1.8919 ] tegrahost_v2 --chip 0x18 --align tegra186-quill-p3489-0888-a00-00-base.dtb [ 1.8926 ] [ 1.8932 ] tegrahost_v2 --appendsigheader tegra186-quill-p3489-0888-a00-00-base.dtb oem-rsa [ 1.8943 ] [ 1.8951 ] tegrasign_v2 --key /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem --list tegra186-quill-p3489-0888-a00-00-base_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 1.8957 ] PKC key in Open SSL format [ 1.8958 ] Key size is 256 bytes [ 1.8959 ] Valid PKC key [ 1.8968 ] Saving pkc public key in pub_key.key [ 1.9422 ] [ 1.9432 ] tegrahost_v2 --updatesigheader tegra186-quill-p3489-0888-a00-00-base_sigheader.dtb.signed tegra186-quill-p3489-0888-a00-00-base_sigheader.dtb.sig oem-rsa [ 1.9443 ] [ 1.9451 ] tegrahost_v2 --chip 0x18 --align bpmp.bin [ 1.9458 ] [ 1.9465 ] tegrahost_v2 --appendsigheader bpmp.bin oem-rsa [ 1.9479 ] [ 1.9489 ] tegrasign_v2 --key /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem --list bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 1.9495 ] PKC key in Open SSL format [ 1.9496 ] Key size is 256 bytes [ 1.9498 ] Valid PKC key [ 1.9507 ] Saving pkc public key in pub_key.key [ 1.9980 ] [ 1.9990 ] tegrahost_v2 --updatesigheader bpmp_sigheader.bin.signed bpmp_sigheader.bin.sig oem-rsa [ 2.0002 ] [ 2.0010 ] tegrahost_v2 --chip 0x18 --align tegra186-a02-bpmp-lightning-p3489-a00-00-te770m.dtb [ 2.0016 ] [ 2.0022 ] tegrahost_v2 --appendsigheader tegra186-a02-bpmp-lightning-p3489-a00-00-te770m.dtb oem-rsa [ 2.0034 ] [ 2.0042 ] tegrasign_v2 --key /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem --list tegra186-a02-bpmp-lightning-p3489-a00-00-te770m_sigheader.dtb_list.xml --pubkeyhash pub_key.key [ 2.0047 ] PKC key in Open SSL format [ 2.0049 ] Key size is 256 bytes [ 2.0050 ] Valid PKC key [ 2.0061 ] Saving pkc public key in pub_key.key [ 2.0511 ] [ 2.0521 ] tegrahost_v2 --updatesigheader tegra186-a02-bpmp-lightning-p3489-a00-00-te770m_sigheader.dtb.signed tegra186-a02-bpmp-lightning-p3489-a00-00-te770m_sigheader.dtb.sig oem-rsa [ 2.0531 ] [ 2.0538 ] tegrahost_v2 --chip 0x18 --align tos-trusty.img [ 2.0545 ] [ 2.0552 ] tegrahost_v2 --appendsigheader tos-trusty.img oem-rsa [ 2.0564 ] [ 2.0572 ] tegrasign_v2 --key /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem --list tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key [ 2.0577 ] PKC key in Open SSL format [ 2.0579 ] Key size is 256 bytes [ 2.0580 ] Valid PKC key [ 2.0590 ] Saving pkc public key in pub_key.key [ 2.1048 ] [ 2.1058 ] tegrahost_v2 --updatesigheader tos-trusty_sigheader.img.signed tos-trusty_sigheader.img.sig oem-rsa [ 2.1069 ] [ 2.1076 ] tegrahost_v2 --chip 0x18 --align eks.img [ 2.1083 ] [ 2.1089 ] tegrahost_v2 --appendsigheader eks.img oem-rsa [ 2.1095 ] [ 2.1103 ] tegrasign_v2 --key /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem --list eks_sigheader.img_list.xml --pubkeyhash pub_key.key [ 2.1108 ] PKC key in Open SSL format [ 2.1111 ] Key size is 256 bytes [ 2.1111 ] Valid PKC key [ 2.1120 ] Saving pkc public key in pub_key.key [ 2.1543 ] [ 2.1553 ] tegrahost_v2 --updatesigheader eks_sigheader.img.signed eks_sigheader.img.sig oem-rsa [ 2.1561 ] [ 2.1567 ] tegrahost_v2 --chip 0x18 --align nvtboot_recovery_cpu.bin [ 2.1574 ] [ 2.1580 ] tegrahost_v2 --appendsigheader nvtboot_recovery_cpu.bin oem-rsa [ 2.1590 ] [ 2.1597 ] tegrasign_v2 --key /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem --list nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key [ 2.1603 ] PKC key in Open SSL format [ 2.1604 ] Key size is 256 bytes [ 2.1605 ] Valid PKC key [ 2.1615 ] Saving pkc public key in pub_key.key [ 2.2054 ] [ 2.2064 ] tegrahost_v2 --updatesigheader nvtboot_recovery_cpu_sigheader.bin.signed nvtboot_recovery_cpu_sigheader.bin.sig oem-rsa [ 2.2073 ] [ 2.2074 ] Copying signed file in /home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/signed [ 2.2224 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/signed/flash.xml.tmp flash.idx [ 2.2955 ] ./tegraflash.py --securedev --bins "mb2_bootloader signed/nvtboot_recovery_sigheader.bin.signed; mts_preboot signed/preboot_d15_prod_cr_sigheader.bin.signed; mts_bootpack signed/mce_mts_d15_prod_cr_sigheader.bin.signed; bootloader_dtb signed/tegra186-quill-p3489-0888-a00-00-base_sigheader.dtb.signed; bpmp_fw signed/bpmp_sigheader.bin.signed; bpmp_fw_dtb signed/tegra186-a02-bpmp-lightning-p3489-a00-00-te770m_sigheader.dtb.signed; tlk signed/tos-trusty_sigheader.img.signed; eks signed/eks_sigheader.img.signed" --bl signed/nvtboot_recovery_cpu_sigheader.bin.signed --bct signed/br_bct_BR.bct --mb1_bct signed/mb1_cold_boot_bct_MB1_sigheader.bct.signed --applet signed/rcm_1_signed.rcm --odmdata 0x1090000 --chip 0x18 --skipuid --cmd "readfuses fuse_info.txt fuses_to_read.xml; reboot recovery" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0048 ] Reading fuses [ 0.0048 ] Boot Rom communication cat: rcm_list_signed.xml: No such file or directory [ 0.0066 ] tegrarcm_v2 --chip 0x18 0 --rcm /home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/signed/rcm_1_signed.rcm --skipuid [ 0.0073 ] Boot Rom communication failed [ 5.2030 ] [ 5.2031 ] Send tboot failed. Bootrom is likely not running, try to detect whether mb1/mb2/cpubl is running. [ 6.2074 ] tegrarcm_v2 --isapplet [ 6.2100 ] Applet version 01.00.0000 [ 6.4228 ] [ 6.4232 ] Parsing fuse info as per xml file [ 6.4260 ] tegraparser_v2 --get_fuse_names fuses_to_read.xml read_fuse_names.txt [ 6.4289 ] MagicId=0x45535546 version=0x1 [ 6.4297 ] [ 6.4302 ] trying to read fuse with CPU binary [ 6.4304 ] Updating Odmdata [ 6.4335 ] tegrabct_v2 --brbct /home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/signed/br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x1090000 [ 6.4422 ] [ 6.4422 ] Sending BCTs [ 6.4431 ] tegrarcm_v2 --download bct_bootrom /home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/signed/br_bct_BR.bct --download bct_mb1 /home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/signed/mb1_cold_boot_bct_MB1_sigheader.bct.signed [ 6.4438 ] Applet version 01.00.0000 [ 6.5399 ] Sending bct_bootrom [ 6.5403 ] [................................................] 100% [ 6.5419 ] Sending bct_mb1 [ 6.5431 ] [................................................] 100% [ 6.5637 ] [ 6.5638 ] Generating blob [ 6.5703 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin [ 6.5729 ] number of images in blob are 9 [ 6.5740 ] blobsize is 4071256 [ 6.5744 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.signed of size 221776 [ 6.5816 ] Added binary blob_nvtboot_recovery_sigheader.bin.signed of size 90176 [ 6.5828 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.signed of size 63104 [ 6.5841 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.signed of size 2082144 [ 6.5864 ] Added binary blob_tegra186-quill-p3489-0888-a00-00-base_sigheader.dtb.signed of size 367184 [ 6.5882 ] Added binary blob_bpmp_sigheader.bin.signed of size 534816 [ 6.5892 ] Added binary blob_tegra186-a02-bpmp-lightning-p3489-a00-00-te770m_sigheader.dtb.signed of size 315392 [ 6.5910 ] Added binary blob_tos-trusty_sigheader.img.signed of size 395072 [ 6.5921 ] Added binary blob_eks_sigheader.img.signed of size 1440 [ 6.5980 ] [ 6.5982 ] Sending bootloader and pre-requisite binaries [ 6.6004 ] tegrarcm_v2 --download blob blob.bin [ 6.6022 ] Applet version 01.00.0000 [ 6.6833 ] Sending blob [ 6.6835 ] [................................................] 100% [ 7.1537 ] [ 7.1569 ] tegrarcm_v2 --boot recovery [ 7.1594 ] Applet version 01.00.0000 [ 7.2366 ] [ 8.2410 ] tegrarcm_v2 --isapplet [ 8.3684 ] [ 8.3719 ] tegradevflash_v2 --iscpubl [ 8.3746 ] Cannot Open USB [ 8.8356 ] [ 9.8399 ] tegrarcm_v2 --isapplet [ 9.9191 ] [ 9.9222 ] tegradevflash_v2 --iscpubl [ 9.9247 ] Bootloader version 01.00.0000 [ 10.0843 ] Bootloader version 01.00.0000 [ 10.0857 ] [ 10.0865 ] tegraparser_v2 --read_fusetype PublicKeyHash read_fuse.bin [ 10.0872 ] [ 10.0878 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 10.0884 ] Bootloader version 01.00.0000 [ 10.1795 ] Saved read fuses in file __fuse_read_scatter.bin [ 10.1870 ] Fuse read successful [ 10.1870 ] [ 10.1902 ] tegraparser_v2 --read_fusetype SecureBootKey read_fuse.bin [ 10.1939 ] [ 10.1960 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 10.1967 ] Bootloader version 01.00.0000 [ 10.2994 ] Saved read fuses in file __fuse_read_scatter.bin [ 10.3076 ] Fuse read successful [ 10.3077 ] [ 10.3110 ] tegraparser_v2 --read_fusetype Kek0 read_fuse.bin [ 10.3122 ] [ 10.3129 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 10.3134 ] Bootloader version 01.00.0000 [ 10.4195 ] Saved read fuses in file __fuse_read_scatter.bin [ 10.4274 ] Fuse read successful [ 10.4275 ] [ 10.4306 ] tegraparser_v2 --read_fusetype Kek1 read_fuse.bin [ 10.4337 ] [ 10.4370 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 10.4403 ] Bootloader version 01.00.0000 [ 10.5396 ] Saved read fuses in file __fuse_read_scatter.bin [ 10.5472 ] Fuse read successful [ 10.5472 ] [ 10.5504 ] tegraparser_v2 --read_fusetype Kek2 read_fuse.bin [ 10.5538 ] [ 10.5574 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 10.5601 ] Bootloader version 01.00.0000 [ 10.6638 ] Saved read fuses in file __fuse_read_scatter.bin [ 10.6715 ] Fuse read successful [ 10.6715 ] [ 10.6747 ] tegraparser_v2 --read_fusetype Kek256 read_fuse.bin [ 10.6783 ] [ 10.6813 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 10.6840 ] Bootloader version 01.00.0000 [ 10.7877 ] Saved read fuses in file __fuse_read_scatter.bin [ 10.7953 ] Fuse read successful [ 10.7953 ] [ 10.7985 ] tegraparser_v2 --read_fusetype BootSecurityInfo read_fuse.bin [ 10.8020 ] [ 10.8051 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 10.8078 ] Bootloader version 01.00.0000 [ 10.9114 ] Saved read fuses in file __fuse_read_scatter.bin [ 10.9190 ] Fuse read successful [ 10.9191 ] [ 10.9222 ] tegraparser_v2 --read_fusetype JtagDisable read_fuse.bin [ 10.9254 ] [ 10.9284 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 10.9311 ] Bootloader version 01.00.0000 [ 11.0774 ] Saved read fuses in file __fuse_read_scatter.bin [ 11.0858 ] Fuse read successful [ 11.0858 ] [ 11.0891 ] tegraparser_v2 --read_fusetype SecurityMode read_fuse.bin [ 11.0926 ] [ 11.0956 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 11.0983 ] Bootloader version 01.00.0000 [ 11.1757 ] Saved read fuses in file __fuse_read_scatter.bin [ 11.1840 ] Fuse read successful [ 11.1840 ] [ 11.1873 ] tegraparser_v2 --read_fusetype SwReserved read_fuse.bin [ 11.1889 ] [ 11.1896 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 11.1902 ] Bootloader version 01.00.0000 [ 11.2991 ] Saved read fuses in file __fuse_read_scatter.bin [ 11.3069 ] Fuse read successful [ 11.3074 ] [ 11.3108 ] tegraparser_v2 --read_fusetype DebugAuthentication read_fuse.bin [ 11.3141 ] [ 11.3172 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 11.3199 ] Bootloader version 01.00.0000 [ 11.4201 ] Saved read fuses in file __fuse_read_scatter.bin [ 11.4275 ] Fuse read successful [ 11.4275 ] [ 11.4307 ] tegraparser_v2 --read_fusetype OdmId read_fuse.bin [ 11.4339 ] [ 11.4369 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 11.4403 ] Bootloader version 01.00.0000 [ 11.5400 ] Saved read fuses in file __fuse_read_scatter.bin [ 11.5473 ] Fuse read successful [ 11.5473 ] [ 11.5505 ] tegraparser_v2 --read_fusetype OdmLock read_fuse.bin [ 11.5542 ] [ 11.5572 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 11.5598 ] Bootloader version 01.00.0000 [ 11.6592 ] Saved read fuses in file __fuse_read_scatter.bin [ 11.6668 ] Fuse read successful [ 11.6668 ] [ 11.6700 ] tegraparser_v2 --read_fusetype ReservedOdm0 read_fuse.bin [ 11.6733 ] [ 11.6763 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 11.6789 ] Bootloader version 01.00.0000 [ 11.8338 ] Saved read fuses in file __fuse_read_scatter.bin [ 11.8418 ] Fuse read successful [ 11.8419 ] [ 11.8450 ] tegraparser_v2 --read_fusetype ReservedOdm1 read_fuse.bin [ 11.8483 ] [ 11.8512 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 11.8540 ] Bootloader version 01.00.0000 [ 11.9786 ] Saved read fuses in file __fuse_read_scatter.bin [ 11.9862 ] Fuse read successful [ 11.9862 ] [ 11.9894 ] tegraparser_v2 --read_fusetype ReservedOdm2 read_fuse.bin [ 11.9926 ] [ 11.9957 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 11.9983 ] Bootloader version 01.00.0000 [ 12.0745 ] Saved read fuses in file __fuse_read_scatter.bin [ 12.0820 ] Fuse read successful [ 12.0820 ] [ 12.0860 ] tegraparser_v2 --read_fusetype ReservedOdm3 read_fuse.bin [ 12.0900 ] [ 12.0933 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 12.0960 ] Bootloader version 01.00.0000 [ 12.1957 ] Saved read fuses in file __fuse_read_scatter.bin [ 12.2035 ] Fuse read successful [ 12.2035 ] [ 12.2067 ] tegraparser_v2 --read_fusetype ReservedOdm4 read_fuse.bin [ 12.2103 ] [ 12.2134 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 12.2160 ] Bootloader version 01.00.0000 [ 12.3665 ] Saved read fuses in file __fuse_read_scatter.bin [ 12.3736 ] Fuse read successful [ 12.3740 ] [ 12.3749 ] tegraparser_v2 --read_fusetype ReservedOdm5 read_fuse.bin [ 12.3756 ] [ 12.3762 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 12.3768 ] Bootloader version 01.00.0000 [ 12.5016 ] Saved read fuses in file __fuse_read_scatter.bin [ 12.5091 ] Fuse read successful [ 12.5091 ] [ 12.5126 ] tegraparser_v2 --read_fusetype ReservedOdm6 read_fuse.bin [ 12.5159 ] [ 12.5200 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 12.5231 ] Bootloader version 01.00.0000 [ 12.6070 ] Saved read fuses in file __fuse_read_scatter.bin [ 12.6149 ] Fuse read successful [ 12.6150 ] [ 12.6178 ] tegraparser_v2 --read_fusetype ReservedOdm7 read_fuse.bin [ 12.6204 ] [ 12.6224 ] tegradevflash_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin [ 12.6243 ] Bootloader version 01.00.0000 [ 12.7268 ] Saved read fuses in file __fuse_read_scatter.bin [ 12.7344 ] Fuse read successful [ 12.7346 ] [ 12.7350 ] Rebooting to recovery mode [ 12.7365 ] tegradevflash_v2 --reboot recovery [ 12.7379 ] Bootloader version 01.00.0000 [ 12.8513 ] Fuse reading is done. The fuse values have been saved in: /home/mharr418/Documents/enc_rootfs_inv/Linux_for_Tegra/bootloader/fuse_info.txt PublicKeyHash: 0b8b230a7751d4624a3838245e64fca3e6e024c01f9155c9f50ef7eb158c7304 SecureBootKey: 00000000000000000000000000000000 Kek0: 00000000000000000000000000000000 Kek1: 00000000000000000000000000000000 Kek2: 112233445566778899aabbccddeeff00 Kek256: 0000000000000000000000000000000000000000000000000000000000000000 BootSecurityInfo: 00000001 JtagDisable: 00000000 SecurityMode: 00000000 SwReserved: 00000000 DebugAuthentication: 00000000 OdmId: 0000000000000000 OdmLock: 00000000 ReservedOdm0: 00000000 ReservedOdm1: 00000000 ReservedOdm2: 00000000 ReservedOdm3: 00000000 ReservedOdm4: 00000000 ReservedOdm5: 00000000 ReservedOdm6: 00000000 ReservedOdm7: 00000000 *** Calculating HASH from keyfile /home/mharr418/Documents/enc_rootfs_inv/.rsa_priv/rsa_priv.pem ... done PKC HASH: 0x04738c15ebf70ef5c955911fc024e0e6a3fc645e2438384a62d451770a238b0b *** Generating fuse configuration ... done. *** Start preparing fuse configuration ... *** done. FORDNA1\mha