thang@thang-Vostro-7580:~/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra$ sudo ./build_l4t_bup.sh jetson-nano-emmc mmcblk0p1 [sudo] password for thang: ############################################################################### # L4T BSP Information: # R32 , REVISION: 5.1 ############################################################################### ./tegraflash.py --chip 0x21 --applet "/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/nvtboot_recovery.bin" --skipuid --cmd "dump eeprom boardinfo cvm.bin" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0015 ] Generating RCM messages [ 0.0023 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm /home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/nvtboot_recovery.bin 0 0 [ 0.0030 ] RCM 0 is saved as rcm_0.rcm [ 0.0032 ] RCM 1 is saved as rcm_1.rcm [ 0.0033 ] List of rcm files are saved in rcm_list.xml [ 0.0033 ] [ 0.0033 ] Signing RCM messages [ 0.0039 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0045 ] Assuming zero filled SBK key [ 0.0083 ] [ 0.0083 ] Copying signature to RCM mesages [ 0.0089 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml [ 0.0098 ] [ 0.0099 ] Boot Rom communication [ 0.0105 ] tegrarcm --chip 0x21 0 --rcm rcm_list_signed.xml --skipuid [ 0.0111 ] RCM version 0X210001 [ 0.0554 ] Boot Rom communication completed [ 1.0639 ] [ 1.0641 ] dump EEPROM info [ 1.0677 ] tegrarcm --oem platformdetails eeprom /home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/cvm.bin [ 1.0696 ] Applet version 00.01.0000 [ 1.0851 ] Saved platform info in /home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/cvm.bin [ 1.1626 ] [ 1.1654 ] tegrarcm --reboot recovery [ 1.1677 ] Applet version 00.01.0000 [ 1.1714 ] Board ID(3448) version(400) copying bctfile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/t210ref/BCT/P3448_A00_lpddr4_204Mhz_P987.cfg)... done. copying bootloader(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done. copying initrd(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/l4t_initrd.img)... done. populating kernel to rootfs... done. populating initrd to rootfs... done. populating /home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb to rootfs... done. Making Boot image... done. Existing sosfile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused. copying tegraboot(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/t210ref/nvtboot.bin)... done. copying cpu_bootloader(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done. copying bpffile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/t210ref/sc7entry-firmware.bin)... done. Existing badpagefile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/badpage.bin) reused. copying wb0boot(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/t210ref/warmboot.bin)... done. Existing tosfile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/tos-mon-only.img) reused. Existing eksfile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/eks.img) reused. copying dtbfile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb)... done. Copying nv_boot_control.conf to rootfs Skip generating system.img Existing tbcfile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused. copying tbcdtbfile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb)... done. copying cfgfile(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/t210ref/cfg/flash_l4t_t210_emmc_p3448.xml) to flash.xml... done. copying flasher(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done. Existing flashapp(/home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/tegraflash.py) reused. ./tegraflash.py --bl cboot.bin --bct P3448_A00_lpddr4_204Mhz_P987.cfg --odmdata 0xa4000 --bldtb kernel_tegra210-p3448-0002-p3449-0000-b00.dtb --applet nvtboot_recovery.bin --cmd "sign" --cfg flash.xml --chip 0x21 --bins "EBT cboot.bin; DTB tegra210-p3448-0002-p3449-0000-b00.dtb" saving flash command in /home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/flashcmd.txt saving Windows flash command to /home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/flash_win.bat *** Sign and generate BUP... *** Signing with zerosbk ... Generating signed binaries for 3448-400-0002-F.0-1-0-jetson-nano-emmc-mmcblk0p1 ... ./tegraflash.py --bl cboot.bin --bct P3448_A00_lpddr4_204Mhz_P987.cfg --odmdata 0xa4000 --bldtb kernel_tegra210-p3448-0002-p3449-0000-b00.dtb --applet nvtboot_recovery.bin --cmd "sign" --cfg flash.xml --chip 0x21 --bins "EBT cboot.bin; DTB tegra210-p3448-0002-p3449-0000-b00.dtb" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0036 ] tegrasign --key None --getmode mode.txt [ 0.0042 ] Assuming zero filled SBK key [ 0.0043 ] [ 0.0047 ] Generating RCM messages [ 0.0053 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm nvtboot_recovery.bin 0 0 [ 0.0059 ] RCM 0 is saved as rcm_0.rcm [ 0.0062 ] RCM 1 is saved as rcm_1.rcm [ 0.0062 ] List of rcm files are saved in rcm_list.xml [ 0.0062 ] [ 0.0062 ] Signing RCM messages [ 0.0068 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key [ 0.0074 ] Assuming zero filled SBK key [ 0.0112 ] [ 0.0112 ] Copying signature to RCM mesages [ 0.0118 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml [ 0.0127 ] [ 0.0127 ] Parsing partition layout [ 0.0134 ] tegraparser --pt flash.xml.tmp [ 0.0142 ] [ 0.0143 ] Creating list of images to be signed [ 0.0149 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --list images_list.xml [ 0.0237 ] [ 0.0239 ] Generating signatures [ 0.0266 ] tegrasign --key None --list images_list.xml --pubkeyhash pub_key.key [ 0.0291 ] Assuming zero filled SBK key [ 0.1323 ] [ 0.1323 ] Generating br-bct [ 0.1331 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.cfg --chip 0x21 0 [ 0.1338 ] Copying Sdram info from 2 to 3 set [ 0.1358 ] [ 0.1358 ] Updating boot device parameters [ 0.1364 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatedevparam flash.xml.bin [ 0.1370 ] Warning: No sdram params [ 0.1371 ] [ 0.1371 ] Updating bl info [ 0.1377 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 0.1387 ] [ 0.1388 ] Updating secondary storage information into bct [ 0.1393 ] tegraparser --pt flash.xml.bin --chip 0x21 0 --updatecustinfo P3448_A00_lpddr4_204Mhz_P987.bct [ 0.1400 ] [ 0.1401 ] Updating Odmdata [ 0.1407 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatefields Odmdata =0xa4000 [ 0.1412 ] Warning: No sdram params [ 0.1414 ] [ 0.1414 ] Get Signed section of bct [ 0.1420 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --listbct bct_list.xml [ 0.1427 ] [ 0.1427 ] Signing BCT [ 0.1439 ] tegrasign --key None --list bct_list.xml --pubkeyhash pub_key.key [ 0.1445 ] Assuming zero filled SBK key [ 0.1448 ] [ 0.1449 ] Updating BCT with signature [ 0.1455 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatesig bct_list_signed.xml [ 0.1462 ] [ 0.1463 ] Copying signatures [ 0.1469 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml [ 0.1545 ] [ 0.1545 ] Updating BFS information on BCT [ 0.1553 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatebfsinfo flash.xml.bin [ 0.1560 ] BFS: [ 0.1569 ] 0: [PT ] flash.xml.bin (size=4359/131072) [ 0.1572 ] 1: [TBC] nvtboot_cpu.bin.encrypt (size=65760/196608) [ 0.1575 ] 2: [RP1] kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=245424/1048576) [ 0.1579 ] 3: [EBT] cboot.bin.encrypt (size=485120/655360) [ 0.1581 ] 4: [WB0] warmboot.bin.encrypt (size=3952/131072) [ 0.1583 ] 5: [BPF] sc7entry-firmware.bin.encrypt (size=3376/262144) [ 0.1586 ] BFS0: 131072 @ 2560 SUM 63eece48 over 2883584 bytes [ 0.1590 ] BFS: [ 0.1590 ] 0: [PT-1] flash.xml.bin (size=4359/131072) [ 0.1592 ] 1: [TBC-1] nvtboot_cpu.bin.encrypt (size=65760/196608) [ 0.1596 ] 2: [RP1-1] kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=245424/1048576) [ 0.1600 ] 3: [EBT-1] cboot.bin.encrypt (size=485120/655360) [ 0.1602 ] 4: [WB0-1] warmboot.bin.encrypt (size=3952/131072) [ 0.1604 ] 5: [BPF-1] sc7entry-firmware.bin.encrypt (size=3376/262144) [ 0.1607 ] 8: [VER_b] emmc_bootblob_ver.txt (size=102/32768) [ 0.1610 ] 9: [VER] emmc_bootblob_ver.txt (size=102/32768) [ 0.1612 ] BFS1: 131072 @ 8704 SUM 63eece48 over 2981888 bytes [ 0.1614 ] KFS: [ 0.1848 ] 0: [DTB] kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=245424/1048576) [ 0.1852 ] 1: [TOS] tos-mon-only.img.encrypt (size=54208/6291456) [ 0.1855 ] 2: [EKS] eks.img (size=1028/81920) [ 0.1857 ] 3: [LNX] boot.img.encrypt (size=661504/67092480) [ 0.1859 ] KFS0: 1048576 @ 29376546 SUM 00782c2f over 8083456 bytes [ 0.1894 ] KFS: [ 0.2128 ] 0: [DTB-1] kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=245424/1048576) [ 0.2131 ] 1: [TOS-1] tos-mon-only.img.encrypt (size=54208/6291456) [ 0.2134 ] 2: [EKS-1] eks.img (size=1028/81920) [ 0.2135 ] 3: [LNX-1] boot.img.encrypt (size=661504/67092480) [ 0.2137 ] KFS1: 1048576 @ 29522082 SUM 00782c2f over 8083456 bytes [ 0.2165 ] [ 0.2165 ] Copying signed file in /home/thang/Projects/FW/VSM_F_NonConfidential_AccessControl_DVT2_1.0.4_20210714_01/Linux_for_Tegra/bootloader/signed signing images succeeded Creating update payloads for Jetson-3448-400-0002-F.0-1-0-jetson-nano-emmc-mmcblk0p1 board ... ls: cannot access 'multi_signed/*jetson-nano-devkit-mmcblk0p1*/*.bct': No such file or directory