Script started on 2024-08-24 16:23:16+08:00 [TERM="xterm-256color" TTY="/dev/pts/1" COLUMNS="132" LINES="37"] ]0;jdp@jdp-MacBookPro: ~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegrajdp@jdp-MacBookPro:~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra$ sudo ./flash.sh --no-systemimg -c bootloader/t186ref/cfg/flash_23t234_qspi.xml [sudo] password for jdp: Error: Invalid target board - -c. Usage: sudo ./flash.sh [options] Where, target board: Valid target board name. rootdev: Proper root device. options: -c ---------- Flash partition table config file. -d ---------- device tree file. -f --------- Path to flash application (tegraflash.py) -h -------------------- print this message. -i -- key for disk encryption support. -k ----- partition name or number specified in flash.cfg. -m ------ MTS preboot such as mts_preboot_si. -n --------- Static nfs network assignments ::: -o ---------- ODM data. -r -------------------- skip building and reuse existing system.img. -t -------- tegraboot binary such as nvtboot.bin -u ------ PKC key used for odm fused board. -v ------ Secure Boot Key (SBK) key used for ODM fused board. -w ---------- warm boot binary such as nvtbootwb0.bin -x ---------- Tegra CHIPID. -B ---------- BoardId. -C ---------- Kernel commandline arguments. WARNING: Each option in this kernel commandline gets higher preference over the values set by flash.sh. In case of NFS booting, this script adds NFS booting related arguments, if -i option is omitted. -F ---------- Flash server such as cboot.bin. -G -------- Read partition and save image to file. -I ----------- initrd file. Null initrd is default. -K ----------- Kernel image file such as zImage or Image. -L ------- Bootloader such as cboot.bin or u-boot-dtb.bin. -M --------- MTS boot file such as mts_si. -N ---------- i.e. :/my/exported/nfs/rootfs. -R ------- Sample rootfs directory. -S ------------- Rootfs size in bytes. Valid only for internal rootdev. KiB, MiB, GiB short hands are allowed, for example, 1GiB means 1024 * 1024 * 1024 bytes. -T ---The number of the sectors of the external storage device. The default value is 122159104 if this option is not set. -Z -------------------- Print configurations and then exit. --no-flash ------------ perform all steps except physically flashing the board. This will create a system.img. --external-device------ Generate flash images for external devices --sparseupdate--------- only flash partitions that have changed. Currently only support SPI flash memory --no-systemimg -------- Do not create or re-create system.img. --bup ----------------- Generate bootloader update payload(BUP). --single-image-bup Generate specified single image BUP, this must work with --bup. --bup-type ----- Generate specific type bootloader update payload(BUP), such as bl or kernel. --multi-spec----------- Enable support for building multi-spec BUP. --clean-up------------- Clean up BUP buffer when multi-spec is enabled. --usb-instance --- Specify the USB instance to connect to; = USB port path (e.g. 3-14). --no-root-check ------- Typical usage of this script require root permissions. Pass this option to allow running the script as a regular user, in which case only specific combinations of command-line options will be functional. --uefi-keys Specify UEFI keys configuration file. --rcm-boot ------------ Do RCM boot instead of physically flashing the board. --sign ---------------- Sign images and store them under "bootloader/signed" directory. The board will not be physically flashed. --image --------------- Specify the image to be written into board. --boot-chain-flash Flash only a specific boot chain (ex. "A, "B", "all"). Defaults to "all", inputs are case insensitive. Not suitable for production. --boot-chain-select Specify booting chain (ex. "A" or "B") after the board is flashed. Defaults to "A", inputs are case insensitive. --pv-crt -------------- The certificate for the key that is used to sign cpu_bootloader --with-systemimg ------ Generate system images also when using -k option --pv-enc ----- The encryption key that is used to encrypt cpu_bootloader. --uefi-enc Key file (0x19: 16-byte; 0x23: 32-byte) to encrypt UEFI payloads --uda-dir-------------- Directory to store user data that will be encrypted in UDA partition. --separate-rcmboot-binary ------ Enable use of different binaries for rcmboot and coldboot. --generic-passphrase -- Use generic passphrase for disk encryption. --disable-random-iv --- Disable generation of random IV, SALT1, SALT2 and DERSTR. --read-info ----------- Read and display board related info, fuse info (based on fuse_t234.xml), and EEPROM content. --reuse-uuid --------- Reuse uuid which is already generated first time. ]0;jdp@jdp-MacBookPro: ~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegrajdp@jdp-MacBookPro:~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra$ sudo ./flash.sh --no-systemimg -c bootloader/t186ref/cfg/flash_t234_qspi.xml  ]0;jdp@jdp-MacBookPro: ~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegrajdp@jdp-MacBookPro:~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra$  sudo ./flash.sh --no-systemimg -c bootloader/t186ref/cfg/flash_t234_qspi.xml jetson-orin-nano-devkit jetson-orin-nano-devkit.conf jetson-orin-nano-devkit-nvme.conf ]0;jdp@jdp-MacBookPro: ~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegrajdp@jdp-MacBookPro:~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra$ sudo ./flash.sh --no-systemimg -c bootloader/t186ref/cfg/flash_t234_qspi.xml jetson-orin-nano-devkit jetson-orin-nano-devkit.conf jetson-orin-nano-devkit-nvme.conf ]0;jdp@jdp-MacBookPro: ~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegrajdp@jdp-MacBookPro:~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra$ sudo ./flash.sh --no-systemimg -c bootloader/t186ref/cfg/flash_t234_qspi.xml jetson-orin-nano-devkit-nvme.conf Error: Invalid target board - bootloader/t186ref/cfg/flash_t234_qspi.xml. Usage: sudo ./flash.sh [options] Where, target board: Valid target board name. rootdev: Proper root device. options: -c ---------- Flash partition table config file. -d ---------- device tree file. -f --------- Path to flash application (tegraflash.py) -h -------------------- print this message. -i -- key for disk encryption support. -k ----- partition name or number specified in flash.cfg. -m ------ MTS preboot such as mts_preboot_si. -n --------- Static nfs network assignments ::: -o ---------- ODM data. -r -------------------- skip building and reuse existing system.img. -t -------- tegraboot binary such as nvtboot.bin -u ------ PKC key used for odm fused board. -v ------ Secure Boot Key (SBK) key used for ODM fused board. -w ---------- warm boot binary such as nvtbootwb0.bin -x ---------- Tegra CHIPID. -B ---------- BoardId. -C ---------- Kernel commandline arguments. WARNING: Each option in this kernel commandline gets higher preference over the values set by flash.sh. In case of NFS booting, this script adds NFS booting related arguments, if -i option is omitted. -F ---------- Flash server such as cboot.bin. -G -------- Read partition and save image to file. -I ----------- initrd file. Null initrd is default. -K ----------- Kernel image file such as zImage or Image. -L ------- Bootloader such as cboot.bin or u-boot-dtb.bin. -M --------- MTS boot file such as mts_si. -N ---------- i.e. :/my/exported/nfs/rootfs. -R ------- Sample rootfs directory. -S ------------- Rootfs size in bytes. Valid only for internal rootdev. KiB, MiB, GiB short hands are allowed, for example, 1GiB means 1024 * 1024 * 1024 bytes. -T ---The number of the sectors of the external storage device. The default value is 122159104 if this option is not set. -Z -------------------- Print configurations and then exit. --no-flash ------------ perform all steps except physically flashing the board. This will create a system.img. --external-device------ Generate flash images for external devices --sparseupdate--------- only flash partitions that have changed. Currently only support SPI flash memory --no-systemimg -------- Do not create or re-create system.img. --bup ----------------- Generate bootloader update payload(BUP). --single-image-bup Generate specified single image BUP, this must work with --bup. --bup-type ----- Generate specific type bootloader update payload(BUP), such as bl or kernel. --multi-spec----------- Enable support for building multi-spec BUP. --clean-up------------- Clean up BUP buffer when multi-spec is enabled. --usb-instance --- Specify the USB instance to connect to; = USB port path (e.g. 3-14). --no-root-check ------- Typical usage of this script require root permissions. Pass this option to allow running the script as a regular user, in which case only specific combinations of command-line options will be functional. --uefi-keys Specify UEFI keys configuration file. --rcm-boot ------------ Do RCM boot instead of physically flashing the board. --sign ---------------- Sign images and store them under "bootloader/signed" directory. The board will not be physically flashed. --image --------------- Specify the image to be written into board. --boot-chain-flash Flash only a specific boot chain (ex. "A, "B", "all"). Defaults to "all", inputs are case insensitive. Not suitable for production. --boot-chain-select Specify booting chain (ex. "A" or "B") after the board is flashed. Defaults to "A", inputs are case insensitive. --pv-crt -------------- The certificate for the key that is used to sign cpu_bootloader --with-systemimg ------ Generate system images also when using -k option --pv-enc ----- The encryption key that is used to encrypt cpu_bootloader. --uefi-enc Key file (0x19: 16-byte; 0x23: 32-byte) to encrypt UEFI payloads --uda-dir-------------- Directory to store user data that will be encrypted in UDA partition. --separate-rcmboot-binary ------ Enable use of different binaries for rcmboot and coldboot. --generic-passphrase -- Use generic passphrase for disk encryption. --disable-random-iv --- Disable generation of random IV, SALT1, SALT2 and DERSTR. --read-info ----------- Read and display board related info, fuse info (based on fuse_t234.xml), and EEPROM content. --reuse-uuid --------- Reuse uuid which is already generated first time. ]0;jdp@jdp-MacBookPro: ~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegrajdp@jdp-MacBookPro:~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra$ sudo ./flash.sh --no-systemimg -c bootloader/t186ref/cfg/flash_t234_qspi.xml jetson-orin-nano-devkit-nvme.conf nvme0n1 Error: Invalid target board - jetson-orin-nano-devkit-nvme.conf. Usage: sudo ./flash.sh [options] Where, target board: Valid target board name. rootdev: Proper root device. options: -c ---------- Flash partition table config file. -d ---------- device tree file. -f --------- Path to flash application (tegraflash.py) -h -------------------- print this message. -i -- key for disk encryption support. -k ----- partition name or number specified in flash.cfg. -m ------ MTS preboot such as mts_preboot_si. -n --------- Static nfs network assignments ::: -o ---------- ODM data. -r -------------------- skip building and reuse existing system.img. -t -------- tegraboot binary such as nvtboot.bin -u ------ PKC key used for odm fused board. -v ------ Secure Boot Key (SBK) key used for ODM fused board. -w ---------- warm boot binary such as nvtbootwb0.bin -x ---------- Tegra CHIPID. -B ---------- BoardId. -C ---------- Kernel commandline arguments. WARNING: Each option in this kernel commandline gets higher preference over the values set by flash.sh. In case of NFS booting, this script adds NFS booting related arguments, if -i option is omitted. -F ---------- Flash server such as cboot.bin. -G -------- Read partition and save image to file. -I ----------- initrd file. Null initrd is default. -K ----------- Kernel image file such as zImage or Image. -L ------- Bootloader such as cboot.bin or u-boot-dtb.bin. -M --------- MTS boot file such as mts_si. -N ---------- i.e. :/my/exported/nfs/rootfs. -R ------- Sample rootfs directory. -S ------------- Rootfs size in bytes. Valid only for internal rootdev. KiB, MiB, GiB short hands are allowed, for example, 1GiB means 1024 * 1024 * 1024 bytes. -T ---The number of the sectors of the external storage device. The default value is 122159104 if this option is not set. -Z -------------------- Print configurations and then exit. --no-flash ------------ perform all steps except physically flashing the board. This will create a system.img. --external-device------ Generate flash images for external devices --sparseupdate--------- only flash partitions that have changed. Currently only support SPI flash memory --no-systemimg -------- Do not create or re-create system.img. --bup ----------------- Generate bootloader update payload(BUP). --single-image-bup Generate specified single image BUP, this must work with --bup. --bup-type ----- Generate specific type bootloader update payload(BUP), such as bl or kernel. --multi-spec----------- Enable support for building multi-spec BUP. --clean-up------------- Clean up BUP buffer when multi-spec is enabled. --usb-instance --- Specify the USB instance to connect to; = USB port path (e.g. 3-14). --no-root-check ------- Typical usage of this script require root permissions. Pass this option to allow running the script as a regular user, in which case only specific combinations of command-line options will be functional. --uefi-keys Specify UEFI keys configuration file. --rcm-boot ------------ Do RCM boot instead of physically flashing the board. --sign ---------------- Sign images and store them under "bootloader/signed" directory. The board will not be physically flashed. --image --------------- Specify the image to be written into board. --boot-chain-flash Flash only a specific boot chain (ex. "A, "B", "all"). Defaults to "all", inputs are case insensitive. Not suitable for production. --boot-chain-select Specify booting chain (ex. "A" or "B") after the board is flashed. Defaults to "A", inputs are case insensitive. --pv-crt -------------- The certificate for the key that is used to sign cpu_bootloader --with-systemimg ------ Generate system images also when using -k option --pv-enc ----- The encryption key that is used to encrypt cpu_bootloader. --uefi-enc Key file (0x19: 16-byte; 0x23: 32-byte) to encrypt UEFI payloads --uda-dir-------------- Directory to store user data that will be encrypted in UDA partition. --separate-rcmboot-binary ------ Enable use of different binaries for rcmboot and coldboot. --generic-passphrase -- Use generic passphrase for disk encryption. --disable-random-iv --- Disable generation of random IV, SALT1, SALT2 and DERSTR. --read-info ----------- Read and display board related info, fuse info (based on fuse_t234.xml), and EEPROM content. --reuse-uuid --------- Reuse uuid which is already generated first time. ]0;jdp@jdp-MacBookPro: ~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegrajdp@jdp-MacBookPro:~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra$ sudo ./flash.sh --no-systemimg -c bootloader/t186ref/cfg/flash_t234_qspi.xml jetson-orin-nano-devkit-nvme.conf nvme0n1 Error: Invalid target board - bootloader/t186ref/cfg/flash_t234_qspi.xml. Usage: sudo ./flash.sh [options] Where, target board: Valid target board name. rootdev: Proper root device. options: -c ---------- Flash partition table config file. -d ---------- device tree file. -f --------- Path to flash application (tegraflash.py) -h -------------------- print this message. -i -- key for disk encryption support. -k ----- partition name or number specified in flash.cfg. -m ------ MTS preboot such as mts_preboot_si. -n --------- Static nfs network assignments ::: -o ---------- ODM data. -r -------------------- skip building and reuse existing system.img. -t -------- tegraboot binary such as nvtboot.bin -u ------ PKC key used for odm fused board. -v ------ Secure Boot Key (SBK) key used for ODM fused board. -w ---------- warm boot binary such as nvtbootwb0.bin -x ---------- Tegra CHIPID. -B ---------- BoardId. -C ---------- Kernel commandline arguments. WARNING: Each option in this kernel commandline gets higher preference over the values set by flash.sh. In case of NFS booting, this script adds NFS booting related arguments, if -i option is omitted. -F ---------- Flash server such as cboot.bin. -G -------- Read partition and save image to file. -I ----------- initrd file. Null initrd is default. -K ----------- Kernel image file such as zImage or Image. -L ------- Bootloader such as cboot.bin or u-boot-dtb.bin. -M --------- MTS boot file such as mts_si. -N ---------- i.e. :/my/exported/nfs/rootfs. -R ------- Sample rootfs directory. -S ------------- Rootfs size in bytes. Valid only for internal rootdev. KiB, MiB, GiB short hands are allowed, for example, 1GiB means 1024 * 1024 * 1024 bytes. -T ---The number of the sectors of the external storage device. The default value is 122159104 if this option is not set. -Z -------------------- Print configurations and then exit. --no-flash ------------ perform all steps except physically flashing the board. This will create a system.img. --external-device------ Generate flash images for external devices --sparseupdate--------- only flash partitions that have changed. Currently only support SPI flash memory --no-systemimg -------- Do not create or re-create system.img. --bup ----------------- Generate bootloader update payload(BUP). --single-image-bup Generate specified single image BUP, this must work with --bup. --bup-type ----- Generate specific type bootloader update payload(BUP), such as bl or kernel. --multi-spec----------- Enable support for building multi-spec BUP. --clean-up------------- Clean up BUP buffer when multi-spec is enabled. --usb-instance --- Specify the USB instance to connect to; = USB port path (e.g. 3-14). --no-root-check ------- Typical usage of this script require root permissions. Pass this option to allow running the script as a regular user, in which case only specific combinations of command-line options will be functional. --uefi-keys Specify UEFI keys configuration file. --rcm-boot ------------ Do RCM boot instead of physically flashing the board. --sign ---------------- Sign images and store them under "bootloader/signed" directory. The board will not be physically flashed. --image --------------- Specify the image to be written into board. --boot-chain-flash Flash only a specific boot chain (ex. "A, "B", "all"). Defaults to "all", inputs are case insensitive. Not suitable for production. --boot-chain-select Specify booting chain (ex. "A" or "B") after the board is flashed. Defaults to "A", inputs are case insensitive. --pv-crt -------------- The certificate for the key that is used to sign cpu_bootloader --with-systemimg ------ Generate system images also when using -k option --pv-enc ----- The encryption key that is used to encrypt cpu_bootloader. --uefi-enc Key file (0x19: 16-byte; 0x23: 32-byte) to encrypt UEFI payloads --uda-dir-------------- Directory to store user data that will be encrypted in UDA partition. --separate-rcmboot-binary ------ Enable use of different binaries for rcmboot and coldboot. --generic-passphrase -- Use generic passphrase for disk encryption. --disable-random-iv --- Disable generation of random IV, SALT1, SALT2 and DERSTR. --read-info ----------- Read and display board related info, fuse info (based on fuse_t234.xml), and EEPROM content. --reuse-uuid --------- Reuse uuid which is already generated first time. ]0;jdp@jdp-MacBookPro: ~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegrajdp@jdp-MacBookPro:~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra$ sudo ./flash.sh --no-systemimg -c bootloader/t186ref/cfg/flash_t234_qspi.xml jetson-orin-nano-devkit-nvme nvme0n1 ############################################################################### # L4T BSP Information: # R35 , REVISION: 5.0 # User release: 0.0 ############################################################################### ECID is 0x80012344705DE64A2000000002008140 # Target Board Information: # Name: jetson-orin-nano-devkit-nvme, Board Family: t186ref, SoC: Tegra 234, # OpMode: production, Boot Authentication: NS, # Disk encryption: disabled , ############################################################################### copying emc_fuse_dev_params(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-br-bct-diag-boot.dts)... done. copying device_config(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-device-p3767-0000.dts)... done. copying misc_config(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-misc-p3767-0000.dts)... done. ./tegraflash.py --chip 0x23 --applet "/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/mb1_t234_prod.bin" --skipuid --cfg readinfo_t234_min_prod.xml --dev_params tegra234-br-bct-diag-boot.dts --device_config tegra234-mb1-bct-device-p3767-0000.dts --misc_config tegra234-mb1-bct-misc-p3767-0000.dts --bins "mb2_applet applet_t234.bin" --cmd "dump eeprom cvm cvm.bin; dump custinfo custinfo_out.bin; reboot recovery" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0445 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet [ 0.0461 ] File rcm_state open failed [ 0.0461 ] ERROR: failed to read rcm_state [ 0.0462 ] [ 0.0485 ] tegrasign_v3.py --key None --getmode mode.txt [ 0.0489 ] Assuming zero filled SBK key [ 0.0469 ] Pre-processing config: tegra234-mb1-bct-device-p3767-0000.dts [ 0.0608 ] Pre-processing config: tegra234-mb1-bct-misc-p3767-0000.dts [ 0.0788 ] Parsing partition layout [ 0.0811 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp [ 0.0844 ] Kernel DTB used: None [ 0.0844 ] WARNING: dce base dtb is not provided [ 0.0844 ] Parsing partition layout [ 0.0860 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp [ 0.0881 ] Creating list of images to be signed [ 0.0899 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --list images_list.xml zerosbk [ 0.0914 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin [ 0.0933 ] Header already present for mb1_t234_prod_aligned_sigheader.bin [ 0.0942 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin [ 0.1018 ] Header already present for mb1_t234_prod_aligned_sigheader.bin [ 0.1027 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin [ 0.1105 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin [ 0.1112 ] adding BCH for mb2_t234_aligned.bin [ 0.1152 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin [ 0.1331 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin [ 0.1337 ] adding BCH for mb2_t234_aligned.bin [ 0.1549 ] Filling MB1 storage info [ 0.1550 ] Parsing dev params for multi chains [ 0.1682 ] Generating br-bct [ 0.1699 ] Updating dev and MSS params in BR BCT [ 0.1700 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0 [ 0.1722 ] Updating bl info [ 0.1739 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin [ 0.1752 ] WARNING: boot chain is not completed. set to 0 [ 0.1770 ] Generating signatures [ 0.1793 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.1798 ] Assuming zero filled SBK key [ 0.2045 ] Warning: pub_key.key is not found [ 0.2027 ] Parsing dev params for multi chains [ 0.2027 ] Generating br-bct [ 0.2043 ] Updating dev and MSS params in BR BCT [ 0.2045 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0 [ 0.2064 ] Updating bl info [ 0.2079 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml [ 0.2092 ] WARNING: boot chain is not completed. set to 0 [ 0.2110 ] Get Signed section of bct [ 0.2124 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml [ 0.2141 ] Signing BCT [ 0.2164 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.2168 ] Assuming zero filled SBK key [ 0.2221 ] Sha saved in br_bct_BR.sha [ 0.2226 ] Warning: pub_key.key is not found [ 0.2204 ] Updating BCT with signature [ 0.2217 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml [ 0.2230 ] Offset :4608 Len :3584 [ 0.2239 ] Generating SHA2 Hash [ 0.2262 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512 [ 0.2265 ] Assuming zero filled SBK key [ 0.2266 ] Assuming zero filled SBK key [ 0.2320 ] Sha saved in br_bct_BR.sha [ 0.2304 ] Updating BCT with SHA2 Hash [ 0.2322 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml [ 0.2338 ] Offset :4608 Len :3584 [ 0.2348 ] Offset :68 Len :8124 [ 0.2348 ] [ 0.2350 ] Generating coldboot mb1-bct [ 0.2366 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 0.2378 ] MB1-BCT version: 0.12 [ 0.2381 ] ERROR: /misc/enable_dram_page_blacklisting is not supported [ 0.2388 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported [ 0.2397 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported [ 0.2406 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported [ 0.2409 ] ERROR: /misc/tsc_controls/tsc_locking_config is not supported [ 0.2409 ] ERROR: /misc/tsc_controls/tsc_locking_diff_configuration is not supported [ 0.2409 ] ERROR: /misc/tsc_controls/tsc_locking_ref_frequency_configuration is not supported [ 0.2409 ] ERROR: /misc/tsc_controls/tsc_locking_control is not supported [ 0.2410 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_configuration is not supported [ 0.2410 ] ERROR: /misc/tsc_controls/tsc_locking_fast_adjust_configuration is not supported [ 0.2410 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_delta_control is not supported [ 0.2410 ] ERROR: /misc/tsc_controls/tsc_capture_control_ptx is not supported [ 0.2410 ] ERROR: /misc/tsc_controls/tsc_capture_config_ptx is not supported [ 0.2410 ] ERROR: /misc/tsc_controls/tsc_stscrsr is not supported [ 0.2410 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_num_control is not supported [ 0.2410 ] [ 0.2410 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 0.2411 ] Added Platform Config 9 data with size :- 100 [ 0.2411 ] [ 0.2411 ] Updating mb1-bct with firmware information [ 0.2427 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin [ 0.2459 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct [ 0.2473 ] Generating SHA2 Hash for mb1bct [ 0.2517 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha [ 0.2540 ] Sha saved in mb1_cold_boot_bct_MB1.sha [ 0.2532 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk [ 0.2546 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct [ 0.2583 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.2586 ] Assuming zero filled SBK key [ 0.2617 ] Warning: pub_key.key is not found [ 0.2618 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk [ 0.2652 ] Generating recovery mb1-bct [ 0.2670 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 0.2686 ] MB1-BCT version: 0.12 [ 0.2689 ] ERROR: /misc/enable_dram_page_blacklisting is not supported [ 0.2696 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported [ 0.2704 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported [ 0.2713 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported [ 0.2715 ] ERROR: /misc/tsc_controls/tsc_locking_config is not supported [ 0.2716 ] ERROR: /misc/tsc_controls/tsc_locking_diff_configuration is not supported [ 0.2716 ] ERROR: /misc/tsc_controls/tsc_locking_ref_frequency_configuration is not supported [ 0.2716 ] ERROR: /misc/tsc_controls/tsc_locking_control is not supported [ 0.2716 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_configuration is not supported [ 0.2716 ] ERROR: /misc/tsc_controls/tsc_locking_fast_adjust_configuration is not supported [ 0.2716 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_delta_control is not supported [ 0.2716 ] ERROR: /misc/tsc_controls/tsc_capture_control_ptx is not supported [ 0.2716 ] ERROR: /misc/tsc_controls/tsc_capture_config_ptx is not supported [ 0.2716 ] ERROR: /misc/tsc_controls/tsc_stscrsr is not supported [ 0.2716 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_num_control is not supported [ 0.2717 ] [ 0.2717 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 0.2717 ] Added Platform Config 9 data with size :- 100 [ 0.2717 ] [ 0.2718 ] Updating mb1-bct with firmware information [ 0.2731 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo readinfo_t234_min_prod.xml.bin [ 0.2765 ] tegrahost_v2 --chip 0x23 0 --align mb1_bct_MB1_aligned.bct [ 0.2777 ] Generating SHA2 Hash for mb1bct [ 0.2820 ] Sha saved in mb1_bct_MB1_aligned.sha [ 0.2840 ] Sha saved in mb1_bct_MB1.sha [ 0.2833 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_bct_MB1_aligned.bct zerosbk [ 0.2845 ] adding BCH for mb1_bct_MB1_aligned.bct [ 0.2881 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.2884 ] Assuming zero filled SBK key [ 0.2912 ] Warning: pub_key.key is not found [ 0.2909 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk [ 0.2938 ] Error: Skip generating mem_bct because sdram_config is not defined [ 0.2939 ] Error: Skip generating mem_bct because sdram_config is not defined [ 0.2939 ] Copying signatures [ 0.2960 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml [ 0.3047 ] Boot Rom communication [ 0.3062 ] tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt [ 0.3074 ] BR_CID: 0x80012344705DE64A2000000002008140 [ 0.3360 ] Sending bct_br [ 0.3793 ] Sending mb1 [ 0.3803 ] Sending psc_bl1 [ 0.3913 ] Sending bct_mb1 [ 0.3969 ] Boot Rom communication completed [ 0.3995 ] tegrahost_v2 --chip 0x23 0 --align applet_t234_aligned.bin [ 0.4027 ] tegrahost_v2 --chip 0x23 0 --magicid MB2A --appendsigheader applet_t234_aligned.bin zerosbk [ 0.4042 ] adding BCH for applet_t234_aligned.bin [ 0.4243 ] tegrasign_v3.py --key None --list applet_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.4248 ] Assuming zero filled SBK key [ 0.4299 ] Warning: pub_key.key is not found [ 0.4299 ] tegrahost_v2 --chip 0x23 0 --updatesigheader applet_t234_aligned_sigheader.bin.encrypt applet_t234_aligned_sigheader.bin.hash zerosbk [ 0.4336 ] Sending mb2_applet... [ 0.4351 ] tegrarcm_v2 --chip 0x23 0 --pollbl --download applet applet_t234_sigheader.bin.encrypt [ 0.4364 ] BL: version 1.4.0.1-t234-54845784-08e631ca last_boot_error: 0 [ 0.6042 ] Sending applet [ 0.7028 ] completed [ 0.7054 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet [ 0.7078 ] MB2 Applet version 01.00.0000 [ 0.8989 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet [ 0.9014 ] MB2 Applet version 01.00.0000 [ 0.9321 ] Retrieving board information [ 0.9342 ] tegrarcm_v2 --chip 0x23 0 --oem platformdetails chip chip_info.bin [ 0.9367 ] MB2 Applet version 01.00.0000 [ 0.9855 ] Saved platform info in chip_info.bin [ 0.9914 ] Chip minor revision: 1 [ 0.9915 ] Bootrom revision: 0x7 [ 0.9915 ] Ram code: 0x2 [ 0.9915 ] Chip sku: 0xd5 [ 0.9915 ] Chip Sample: prod [ 0.9915 ] [ 0.9922 ] Retrieving EEPROM data [ 0.9923 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/cvm.bin --chip 0x23 0 [ 0.9946 ] MB2 Applet version 01.00.0000 [ 1.0292 ] Saved platform info in /home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/cvm.bin [ 1.0634 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet [ 1.0653 ] MB2 Applet version 01.00.0000 [ 1.0969 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet [ 1.0991 ] MB2 Applet version 01.00.0000 [ 1.1463 ] Dumping customer Info [ 1.1488 ] tegrarcm_v2 --chip 0x23 0 --oem dump bct tmp.bct [ 1.1509 ] MB2 Applet version 01.00.0000 [ 1.1976 ] Saved bct in tmp.bct [ 1.2061 ] tegrabct_v2 --brbct tmp.bct --chip 0x23 0 --custinfo /home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/custinfo_out.bin [ 1.2077 ] Cu[ 1.2084 ] stomer data saved in /home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/custinfo_out.bin successfully [ 1.2086 ] Rebooting to recovery mode [ 1.2113 ] tegrarcm_v2 --chip 0x23 0 --ismb2 [ 1.2434 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet [ 1.2452 ] MB2 Applet version 01.00.0000 [ 1.2891 ] Booting to recovery mode [ 1.2917 ] tegrarcm_v2 --chip 0x23 0 --reboot recovery [ 1.2937 ] MB2 Applet version 01.00.0000 Board ID(3767) version(300) sku(0003) revision(P.1) Chip SKU(00:00:00:D5) ramcode(00:00:00:02) fuselevel(fuselevel_production) board_FAB(300) emc_opt_disable_fuse:(0) Copy /home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/kernel/dtb/tegra234-p3767-0003-p3768-0000-a0.dtb to /home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/kernel/dtb/tegra234-p3767-0003-p3768-0000-a0.dtb.rec copying bctfile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-p3767-0001-sdram-l4t.dts)... done. copying minratchet_config(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-ratchet-p3767-0000.dts)... done. copying device_config(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-device-p3767-0000.dts)... done. copying misc_config(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-misc-p3767-0000.dts)... done. copying pinmux_config(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-pinmux-p3767-dp-a03.dtsi)... done. copying gpioint_config(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-gpioint-p3767-0000.dts)... done. copying pmic_config(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-pmic-p3767-0000-a02.dts)... done. copying pmc_config(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-padvoltage-p3767-dp-a03.dtsi)... done. copying deviceprod_config(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-cprod-p3767-0000.dts)... done. copying prod_config(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-prod-p3767-0000.dts)... done. copying scr_config(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb2-bct-scr-p3767-0000.dts)... done. copying wb0sdram(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-p3767-0001-wb0sdram-l4t.dts)... done. copying bootrom_config(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-reset-p3767-0000.dts)... done. Existing uphylane_config(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/tegra234-mb1-bct-uphylane-si.dtsi) reused. copying dev_params(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-br-bct-p3767-0000-l4t.dts)... done. copying dev_params_b(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-br-bct_b-p3767-0000-l4t.dts)... done. copying mb2bct_cfg(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb2-bct-misc-p3767-0000.dts)... done. Existing pscfwfile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/pscfw_t234_prod.bin) reused. Existing pscbl1file(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/psc_bl1_t234_prod.bin) reused. Existing mtsmcefile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/mce_flash_o10_cr_prod.bin) reused. Existing mb2applet(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/applet_t234.bin) reused. Existing bootloader(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/mb2_t234.bin) reused. copying initrd(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/l4t_initrd.img)... done. bl is uefi Making Boot image... done. Not signing of boot.img Making recovery ramdisk for recovery image... Re-generating recovery ramdisk for recovery image... /home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/ramdisk_tmp /home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader /home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra 41966 blocks gzip: /home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/kernel/Image: not in gzip format _BASE_KERNEL_VERSION=5.10.192-tegra 58213 blocks Making Recovery image... copying recdtbfile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/kernel/dtb/tegra234-p3767-0003-p3768-0000-a0.dtb.rec)... done. 20+0 records in 20+0 records out 20 bytes copied, 0.000279853 s, 71.5 kB/s Existing sosfile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/mb1_t234_prod.bin) reused. Existing tegraboot(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/mb2_t234.bin) reused. Existing cpu_bootloader(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/mb2_t234.bin) reused. Existing mb2blfile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/mb2_t234.bin) reused. Existing xusbfile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/xusb_t234_prod.bin) reused. Existing dcefile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/display-t234-dce.bin) reused. Existing nvdecfile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/nvdec_t234_prod.fw) reused. Existing psc_rf(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/psc_rf_t234_prod.bin) reused. Existing mb2_rf(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/mb2rf_t234.bin) reused. Existing mb1file(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/mb1_t234_prod.bin) reused. Existing bpffile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/bpmp_t234-TE950M-A1_prod.bin) reused. copying bpfdtbfile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/tegra234-bpmp-3767-0003-3509-a02.dtb)... done. Existing scefile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused. Existing camerafw(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/camera-rtcpu-t234-rce.img) reused. Existing apefile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/adsp-fw.bin) reused. Existing spefile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/spe_t234.bin) reused. Existing wb0boot(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/sc7_t234_prod.bin) reused. Existing tosfile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/tos-optee_t234.img) reused. Existing eksfile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/eks_t234.img) reused. copying dtbfile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/kernel/dtb/tegra234-p3767-0003-p3768-0000-a0.dtb)... done. Copying nv_boot_control.conf to rootfs Skip generating system.img Not signing of kernel-dtb Existing tbcfile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/uefi_jetson.bin) reused. 131072+0 records in 131072+0 records out 67108864 bytes (67 MB, 64 MiB) copied, 0.4812 s, 139 MB/s Sync'ing esp.img ... done. copying tbcdtbfile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/kernel/dtb/tegra234-p3767-0003-p3768-0000-a0.dtb)... done. copying cfgfile(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/t186ref/cfg/flash_t234_qspi.xml) to flash.xml... done. Existing flashapp(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/tegraflash.py) reused. copying overlay_dtb(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/kernel/dtb/L4TConfiguration.dtbo)... done. copying overlay_dtb(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/kernel/dtb/tegra234-p3767-overlay.dtbo)... done. copying overlay_dtb(/home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/kernel/dtb/tegra234-p3768-overlay.dtbo)... done. /home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/L4TConfiguration_updated.dts: Warning (unit_address_vs_reg): Node /fragment@0 has a unit name, but no reg property /home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/L4TConfiguration.dtbo: Warning (unit_address_vs_reg): Node /fragment@0 has a unit name, but no reg property ./tegraflash.py --bl uefi_jetson_with_dtb.bin --odmdata gbe-uphy-config-8,hsstp-lane-map-3,hsio-uphy-config-0 --overlay_dtb L4TConfiguration.dtbo,tegra234-p3767-overlay.dtbo,tegra234-p3768-overlay.dtbo, --bldtb tegra234-p3767-0003-p3768-0000-a0.dtb --applet mb1_t234_prod.bin --cmd "flash; reboot" --cfg flash.xml --chip 0x23 --concat_cpubl_bldtb --cpubl uefi_jetson.bin --minratchet_config tegra234-mb1-bct-ratchet-p3767-0000.dts --device_config tegra234-mb1-bct-device-p3767-0000.dts --misc_config tegra234-mb1-bct-misc-p3767-0000.dts --pinmux_config tegra234-mb1-bct-pinmux-p3767-dp-a03.dtsi --gpioint_config tegra234-mb1-bct-gpioint-p3767-0000.dts --pmic_config tegra234-mb1-bct-pmic-p3767-0000-a02.dts --pmc_config tegra234-mb1-bct-padvoltage-p3767-dp-a03.dtsi --deviceprod_config tegra234-mb1-bct-cprod-p3767-0000.dts --prod_config tegra234-mb1-bct-prod-p3767-0000.dts --scr_config tegra234-mb2-bct-scr-p3767-0000.dts --wb0sdram_config tegra234-p3767-0001-wb0sdram-l4t.dts --br_cmd_config tegra234-mb1-bct-reset-p3767-0000.dts --uphy tegra234-mb1-bct-uphylane-si.dtsi --dev_params tegra234-br-bct-p3767-0000-l4t.dts,tegra234-br-bct_b-p3767-0000-l4t.dts --mb2bct_cfg tegra234-mb2-bct-misc-p3767-0000.dts --bins "psc_fw pscfw_t234_prod.bin; mts_mce mce_flash_o10_cr_prod.bin; mb2_applet applet_t234.bin; mb2_bootloader mb2_t234.bin; xusb_fw xusb_t234_prod.bin; dce_fw display-t234-dce.bin; nvdec nvdec_t234_prod.fw; bpmp_fw bpmp_t234-TE950M-A1_prod.bin; bpmp_fw_dtb tegra234-bpmp-3767-0003-3509-a02.dtb; sce_fw camera-rtcpu-sce.img; rce_fw camera-rtcpu-t234-rce.img; ape_fw adsp-fw.bin; spe_fw spe_t234.bin; tos tos-optee_t234.img; eks eks_t234.img" --sdram_config tegra234-p3767-0001-sdram-l4t.dts --cust_info custinfo_out.bin --bct_backup --boot_chain A saving flash command in /home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/flashcmd.txt saving Windows flash command to /home/jdp/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra/bootloader/flash_win.bat *** Flashing target device started. *** Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0417 ] tegrasign_v3.py --key None --getmode mode.txt [ 0.0419 ] Assuming zero filled SBK key [ 0.0399 ] Parsing partition layout [ 0.0415 ] tegraparser_v2 --pt flash.xml.tmp [ 0.0505 ] Change tegra234-bpmp-3767-0003-3509-a02.dtb to tegra234-bpmp-3767-0003-3509-a02_with_odm.dtb [ 0.0506 ] Change tegra234-bpmp-3767-0003-3509-a02.dtb to tegra234-bpmp-3767-0003-3509-a02_with_odm.dtb [ 0.1051 ] /usr/bin/python3 dtbcheck.py -c t234 -o tegra234-bpmp-3767-0003-3509-a02_with_odm.dtb tegra234-bpmp-3767-0003-3509-a02_with_odm_tmp.dtb [ 0.7103 ] Concatenating L4TConfiguration.dtbo,tegra234-p3767-overlay.dtbo,tegra234-p3768-overlay.dtbo to tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay.dtb [ 0.7106 ] Concatenating bl dtb to cpubl binary [ 0.7150 ] MB2 binary: mb2_t234.bin [ 0.7151 ] Pre-processing mb2bct config: tegra234-mb2-bct-misc-p3767-0000.dts [ 0.7381 ] Pre-processing mb2bct config: tegra234-mb2-bct-scr-p3767-0000.dts [ 1.3280 ] Generating coldboot mb2-bct [ 1.3281 ] tegrabct_v2 --chip 0x23 0 --mb2bct mb2_cold_boot_bct.cfg --mb2bctcfg tegra234-mb2-bct-misc-p3767-0000_cpp.dtb --scr tegra234-mb2-bct-scr-p3767-0000_cpp.dtb [ 1.3298 ] ERROR: value 0x31 is out of range [ 1.3324 ] ERROR: value 0x31 is out of range [ 1.3327 ] ERROR: value 0x31 is out of range [ 1.3331 ] ERROR: value 0x31 is out of range [ 1.3335 ] WARNING: unknown property 'tfc_version' [ 1.3339 ] WARNING: unknown property 'addr_header_version' [ 1.3487 ] Updating mb2-bct with storage information [ 1.3516 ] tegrabct_v2 --chip 0x23 0 --mb2bct mb2_cold_boot_bct_MB2.bct --updatestorageinfo flash.xml.bin [ 1.3568 ] Concatenating mb2-bct to mb2 binary [ 1.3569 ] mb2_bin_file = mb2_t234.bin [ 1.3569 ] mb2_bct_file = mb2_cold_boot_bct_MB2.bct [ 1.3638 ] DCE binary: display-t234-dce.bin [ 1.3640 ] Kernel DTB used: tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay.dtb [ 1.3640 ] Concatenating kernel-dtb to dce-fw binary [ 1.3641 ] dce_bin = display-t234-dce.bin [ 1.3641 ] kernel_dtb = tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay.dtb [ 1.3641 ] dce_with_dtb = display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay.bin [ 1.3732 ] Update display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay.bin to dce_fw partitions [ 1.3758 ] Parsing partition layout [ 1.3779 ] tegraparser_v2 --pt flash.xml.tmp [ 1.3811 ] Creating list of images to be signed [ 1.3830 ] Generating ratchet blob [ 1.3831 ] Pre-processing config: tegra234-mb1-bct-reset-p3767-0000.dts [ 1.3958 ] Pre-processing config: tegra234-mb1-bct-device-p3767-0000.dts [ 1.4087 ] Pre-processing config: tegra234-mb1-bct-cprod-p3767-0000.dts [ 1.4204 ] Pre-processing config: tegra234-mb1-bct-gpioint-p3767-0000.dts [ 1.4339 ] Pre-processing config: tegra234-mb1-bct-misc-p3767-0000.dts [ 1.4527 ] Pre-processing config: tegra234-mb1-bct-pinmux-p3767-dp-a03.dtsi [ 1.4767 ] Pre-processing config: tegra234-mb1-bct-padvoltage-p3767-dp-a03.dtsi [ 1.4908 ] Pre-processing config: tegra234-mb1-bct-pmic-p3767-0000-a02.dts [ 1.5039 ] Pre-processing config: tegra234-mb1-bct-prod-p3767-0000.dts [ 1.5171 ] Pre-processing config: tegra234-p3767-0001-sdram-l4t.dts [ 3.0914 ] Pre-processing config: tegra234-mb1-bct-uphylane-si.dtsi [ 3.1040 ] Pre-processing config: tegra234-p3767-0001-wb0sdram-l4t.dts [ 4.6976 ] Pre-processing config: tegra234-mb1-bct-ratchet-p3767-0000.dts [ 4.7124 ] Generating coldboot mb1-bct [ 4.7144 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --wb0sdram tegra234-p3767-0001-wb0sdram-l4t_cpp.dtb --pinmux tegra234-mb1-bct-pinmux-p3767-dp-a03_cpp.dtb --pmc tegra234-mb1-bct-padvoltage-p3767-dp-a03_cpp.dtb --pmic tegra234-mb1-bct-pmic-p3767-0000-a02_cpp.dtb --brcommand tegra234-mb1-bct-reset-p3767-0000_cpp.dtb --prod tegra234-mb1-bct-prod-p3767-0000_cpp.dtb --gpioint tegra234-mb1-bct-gpioint-p3767-0000_cpp.dtb --uphy tegra234-mb1-bct-uphylane-si_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --deviceprod tegra234-mb1-bct-cprod-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin [ 4.7162 ] MB1-BCT version: 0.12 [ 4.7166 ] ERROR: /misc/enable_dram_page_blacklisting is not supported [ 4.7173 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported [ 4.7183 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported [ 4.7194 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported [ 4.7207 ] ERROR: /misc/tsc_controls/tsc_locking_config is not supported [ 4.7215 ] ERROR: /misc/tsc_controls/tsc_locking_diff_configuration is not supported [ 4.7225 ] ERROR: /misc/tsc_controls/tsc_locking_ref_frequency_configuration is not supported [ 4.7235 ] ERROR: /misc/tsc_controls/tsc_locking_control is not supported [ 4.7242 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_configuration is not supported [ 4.7251 ] ERROR: /misc/tsc_controls/tsc_locking_fast_adjust_configuration is not supported [ 4.7260 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_delta_control is not supported [ 4.7274 ] ERROR: /misc/tsc_controls/tsc_capture_control_ptx is not supported [ 4.7275 ] ERROR: /misc/tsc_controls/tsc_capture_config_ptx is not supported [ 4.7275 ] ERROR: /misc/tsc_controls/tsc_stscrsr is not supported [ 4.7275 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_num_control is not supported [ 4.7275 ] [ 4.7275 ] Parsing config file :tegra234-mb1-bct-pinmux-p3767-dp-a03_cpp.dtb [ 4.7275 ] Added Platform Config 0 data with size :- 2416 [ 4.7276 ] [ 4.7276 ] Parsing config file :tegra234-mb1-bct-padvoltage-p3767-dp-a03_cpp.dtb [ 4.7276 ] WARNING: unknown node 'g2' [ 4.7276 ] WARNING: unknown node 'g2' [ 4.7276 ] WARNING: unknown node 'g9' [ 4.7276 ] WARNING: unknown node 'g9' [ 4.7276 ] Added Platform Config 2 data with size :- 24 [ 4.7276 ] [ 4.7277 ] Parsing config file :tegra234-mb1-bct-pmic-p3767-0000-a02_cpp.dtb [ 4.7277 ] Added Platform Config 4 data with size :- 288 [ 4.7277 ] [ 4.7277 ] Parsing config file :tegra234-mb1-bct-reset-p3767-0000_cpp.dtb [ 4.7277 ] Added Platform Config 3 data with size :- 52 [ 4.7277 ] [ 4.7277 ] Parsing config file :tegra234-mb1-bct-prod-p3767-0000_cpp.dtb [ 4.7277 ] WARNING: unknown property 'major' [ 4.7278 ] WARNING: unknown property 'minor' [ 4.7278 ] Added Platform Config 5 data with size :- 512 [ 4.7278 ] [ 4.7278 ] Parsing config file :tegra234-mb1-bct-gpioint-p3767-0000_cpp.dtb [ 4.7279 ] WARNING: unknown property 'major' [ 4.7279 ] WARNING: unknown property 'minor' [ 4.7279 ] Added Platform Config 7 data with size :- 380 [ 4.7279 ] [ 4.7279 ] Parsing config file :tegra234-mb1-bct-uphylane-si_cpp.dtb [ 4.7280 ] Added Platform Config 8 data with size :- 24 [ 4.7280 ] [ 4.7280 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 4.7280 ] Added Platform Config 9 data with size :- 100 [ 4.7281 ] [ 4.7281 ] Parsing config file :tegra234-mb1-bct-cprod-p3767-0000_cpp.dtb [ 4.7281 ] ModuleCount 0 NumProdNames 0 [ 4.7281 ] Added Platform Config 6 data with size :- 16 [ 4.7281 ] [ 4.7281 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb [ 4.7281 ] ERROR: /ratchet/atf is not supported [ 4.7282 ] [ 4.7283 ] Updating mb1-bct with firmware information [ 4.7299 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 4.7364 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct [ 4.7386 ] Generating SHA2 Hash for mb1bct [ 4.7438 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha [ 4.7472 ] Sha saved in mb1_cold_boot_bct_MB1.sha [ 4.7470 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk [ 4.7487 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct [ 4.7528 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 4.7531 ] Assuming zero filled SBK key [ 4.7564 ] Warning: pub_key.key is not found [ 4.7563 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk [ 4.7598 ] tegrahost_v2 --chip 0x23 0 --partitionlayout flash.xml.bin --ratchet_blob ratchet_blob.bin --list images_list.xml zerosbk [ 4.7617 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin [ 4.7638 ] Header already present for mb1_t234_prod_aligned_sigheader.bin [ 4.7647 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin [ 4.7731 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin [ 4.7740 ] Header already present for nvdec_t234_prod_aligned.fw [ 4.7776 ] adding BCH for mb2_t234_with_mb2_cold_boot_bct_MB2_aligned.bin [ 4.7856 ] adding BCH for xusb_t234_prod_aligned.bin [ 4.8057 ] Header already present for bpmp_t234-TE950M-A1_prod_aligned.bin [ 4.8157 ] adding BCH for tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned.dtb [ 4.8393 ] Header already present for pscfw_t234_prod_aligned.bin [ 4.8486 ] Header already present for mce_flash_o10_cr_prod_aligned.bin [ 4.8587 ] Header already present for sc7_t234_prod.bin [ 4.8632 ] Header already present for psc_rf_t234_prod_aligned.bin [ 4.8678 ] adding BCH for mb2rf_t234_aligned.bin [ 4.8708 ] INFO: compressing uefi_jetson_with_dtb_aligned.bin [ 4.9732 ] INFO: complete compression, uefi_jetson_with_dtb_aligned.bin, ratio = 91% [ 4.9821 ] adding BCH for uefi_jetson_with_dtb_aligned_blob_w_bin_aligned.bin [ 5.0601 ] adding BCH for tos-optee_t234_aligned.img [ 5.1409 ] adding BCH for eks_t234_aligned.img [ 5.1960 ] INFO: compressing display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay_aligned.bin [ 5.4159 ] INFO: complete compression, display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay_aligned.bin, ratio = 7% [ 5.4492 ] adding BCH for display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay_aligned_blob_w_bin_aligned.bin [ 5.4700 ] adding BCH for spe_t234_aligned.bin [ 5.4866 ] adding BCH for camera-rtcpu-t234-rce_aligned.img [ 5.4995 ] adding BCH for adsp-fw_aligned.bin [ 5.5238 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin [ 5.5428 ] Header already present for mb1_t234_prod_aligned_sigheader.bin [ 5.5436 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin [ 5.5506 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin [ 5.5523 ] Header already present for nvdec_t234_prod_aligned.fw [ 5.5934 ] adding BCH for mb2_t234_with_mb2_cold_boot_bct_MB2_aligned.bin [ 5.6037 ] adding BCH for xusb_t234_prod_aligned.bin [ 5.6228 ] Header already present for bpmp_t234-TE950M-A1_prod_aligned.bin [ 5.6341 ] adding BCH for tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned.dtb [ 5.6600 ] Header already present for pscfw_t234_prod_aligned.bin [ 5.6680 ] Header already present for mce_flash_o10_cr_prod_aligned.bin [ 5.6775 ] Header already present for sc7_t234_prod.bin [ 5.6819 ] Header already present for psc_rf_t234_prod_aligned.bin [ 5.6876 ] adding BCH for mb2rf_t234_aligned.bin [ 5.6909 ] INFO: compressing uefi_jetson_with_dtb_aligned.bin [ 5.7720 ] INFO: complete compression, uefi_jetson_with_dtb_aligned.bin, ratio = 91% [ 5.7808 ] adding BCH for uefi_jetson_with_dtb_aligned_blob_w_bin_aligned.bin [ 5.8517 ] adding BCH for tos-optee_t234_aligned.img [ 5.9208 ] adding BCH for eks_t234_aligned.img [ 5.9826 ] INFO: compressing display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay_aligned.bin [ 6.2056 ] INFO: complete compression, display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay_aligned.bin, ratio = 7% [ 6.2370 ] adding BCH for display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay_aligned_blob_w_bin_aligned.bin [ 6.2596 ] adding BCH for spe_t234_aligned.bin [ 6.2774 ] adding BCH for camera-rtcpu-t234-rce_aligned.img [ 6.2904 ] adding BCH for adsp-fw_aligned.bin [ 6.3337 ] Filling MB1 storage info [ 6.3338 ] Parsing dev params for multi chains [ 6.3458 ] Generating br-bct [ 6.3475 ] Updating dev and MSS params in BR BCT [ 6.3476 ] tegrabct_v2 --dev_param tegra234-br-bct-p3767-0000-l4t_cpp.dtb --sdram tegra234-p3767-0001-sdram-l4t_cpp.dtb --brbct br_bct.cfg --chip 0x23 0 [ 6.5389 ] Updating bl info [ 6.5406 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo flash.xml.bin [ 6.5540 ] Generating br-bct [ 6.5562 ] Updating dev and MSS params in BR BCT [ 6.5563 ] tegrabct_v2 --dev_param tegra234-br-bct_b-p3767-0000-l4t_cpp.dtb --sdram tegra234-p3767-0001-sdram-l4t_cpp.dtb --brbct br_bct.cfg --chip 0x23 0 [ 6.7316 ] Updating bl info [ 6.7344 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo flash.xml.bin [ 6.7394 ] Generating BCT backup image [ 6.7396 ] dd if=/dev/zero of=bct_backup.img bs=1 count=32768 [ 6.7423 ] 32768+0 records in [ 6.8285 ] 32768+0 records out [ 6.8285 ] 32768 bytes (33 kB, 32 KiB) copied, 0.0853512 s, 384 kB/s [ 6.8285 ] [ 6.8286 ] Concatenating BCT for chain A to bct_backup.img [ 6.8287 ] dd if=br_bct_BR.bct of=bct_backup.img bs=1 seek=0 conv=notrunc [ 6.8309 ] 8192+0 records in [ 6.8459 ] 8192+0 records out [ 6.8459 ] 8192 bytes (8.2 kB, 8.0 KiB) copied, 0.0141728 s, 578 kB/s [ 6.8460 ] [ 6.8460 ] Concatenating BCT for chain B to bct_backup.img [ 6.8461 ] dd if=br_bct_b_BR.bct of=bct_backup.img bs=1 seek=16384 conv=notrunc [ 6.8493 ] 8192+0 records in [ 6.8677 ] 8192+0 records out [ 6.8678 ] 8192 bytes (8.2 kB, 8.0 KiB) copied, 0.0174151 s, 470 kB/s [ 6.8679 ] [ 6.8679 ] Generating signatures [ 6.8702 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key --sha sha512 [ 6.8705 ] Assuming zero filled SBK key [ 7.0427 ] Warning: pub_key.key is not found [ 7.0448 ] Parsing dev params for multi chains [ 7.0448 ] Generating br-bct [ 7.0472 ] Updating dev and MSS params in BR BCT [ 7.0474 ] tegrabct_v2 --dev_param tegra234-br-bct-p3767-0000-l4t_cpp.dtb --sdram tegra234-p3767-0001-sdram-l4t_cpp.dtb --brbct br_bct.cfg --chip 0x23 0 [ 7.2375 ] Updating customer data section [ 7.2404 ] tegrabct_v2 --chip 0x23 0 --brbct br_bct_BR.bct --update_custinfo custinfo_out.bin [ 7.2458 ] Updating bl info [ 7.2478 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 7.2520 ] Get Signed section of bct [ 7.2546 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml [ 7.2581 ] Signing BCT [ 7.2604 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 7.2607 ] Assuming zero filled SBK key [ 7.2661 ] Sha saved in br_bct_BR.sha [ 7.2668 ] Warning: pub_key.key is not found [ 7.2647 ] Updating BCT with signature [ 7.2668 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml [ 7.2690 ] Offset :4608 Len :3584 [ 7.2698 ] Generating SHA2 Hash [ 7.2721 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512 [ 7.2725 ] Assuming zero filled SBK key [ 7.2725 ] Assuming zero filled SBK key [ 7.2795 ] Sha saved in br_bct_BR.sha [ 7.2780 ] Updating BCT with SHA2 Hash [ 7.2799 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml [ 7.2819 ] Offset :4608 Len :3584 [ 7.2827 ] Offset :68 Len :8124 [ 7.2827 ] [ 7.2829 ] Generating br-bct [ 7.2850 ] Updating dev and MSS params in BR BCT [ 7.2852 ] tegrabct_v2 --dev_param tegra234-br-bct_b-p3767-0000-l4t_cpp.dtb --sdram tegra234-p3767-0001-sdram-l4t_cpp.dtb --brbct br_bct.cfg --chip 0x23 0 [ 7.4669 ] Updating customer data section [ 7.4696 ] tegrabct_v2 --chip 0x23 0 --brbct br_bct_BR.bct --update_custinfo custinfo_out.bin [ 7.4758 ] Updating bl info [ 7.4777 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml [ 7.4822 ] Get Signed section of bct [ 7.4844 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml [ 7.4869 ] Signing BCT [ 7.4892 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 7.4897 ] Assuming zero filled SBK key [ 7.4968 ] Sha saved in br_bct_BR.sha [ 7.4977 ] Warning: pub_key.key is not found [ 7.4956 ] Updating BCT with signature [ 7.4982 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml [ 7.5005 ] Offset :4608 Len :3584 [ 7.5014 ] Generating SHA2 Hash [ 7.5036 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512 [ 7.5040 ] Assuming zero filled SBK key [ 7.5040 ] Assuming zero filled SBK key [ 7.5107 ] Sha saved in br_bct_BR.sha [ 7.5092 ] Updating BCT with SHA2 Hash [ 7.5110 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml [ 7.5126 ] Offset :4608 Len :3584 [ 7.5134 ] Offset :68 Len :8124 [ 7.5135 ] [ 7.5136 ] Generating BCT backup image [ 7.5137 ] dd if=/dev/zero of=bct_backup.img bs=1 count=32768 [ 7.5156 ] 32768+0 records in [ 7.5951 ] 32768+0 records out [ 7.5951 ] 32768 bytes (33 kB, 32 KiB) copied, 0.0785627 s, 417 kB/s [ 7.5952 ] [ 7.5952 ] Concatenating BCT for chain A to bct_backup.img [ 7.5953 ] dd if=br_bct_BR.bct of=bct_backup.img bs=1 seek=0 conv=notrunc [ 7.5987 ] 8192+0 records in [ 7.6183 ] 8192+0 records out [ 7.6183 ] 8192 bytes (8.2 kB, 8.0 KiB) copied, 0.0184698 s, 444 kB/s [ 7.6184 ] [ 7.6184 ] Concatenating BCT for chain B to bct_backup.img [ 7.6185 ] dd if=br_bct_b_BR.bct of=bct_backup.img bs=1 seek=16384 conv=notrunc [ 7.6216 ] 8192+0 records in [ 7.6406 ] 8192+0 records out [ 7.6406 ] 8192 bytes (8.2 kB, 8.0 KiB) copied, 0.0180922 s, 453 kB/s [ 7.6406 ] [ 7.6408 ] Generating coldboot mb1-bct [ 7.6433 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --wb0sdram tegra234-p3767-0001-wb0sdram-l4t_cpp.dtb --pinmux tegra234-mb1-bct-pinmux-p3767-dp-a03_cpp.dtb --pmc tegra234-mb1-bct-padvoltage-p3767-dp-a03_cpp.dtb --pmic tegra234-mb1-bct-pmic-p3767-0000-a02_cpp.dtb --brcommand tegra234-mb1-bct-reset-p3767-0000_cpp.dtb --prod tegra234-mb1-bct-prod-p3767-0000_cpp.dtb --gpioint tegra234-mb1-bct-gpioint-p3767-0000_cpp.dtb --uphy tegra234-mb1-bct-uphylane-si_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --deviceprod tegra234-mb1-bct-cprod-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin [ 7.6453 ] MB1-BCT version: 0.12 [ 7.6456 ] ERROR: /misc/enable_dram_page_blacklisting is not supported [ 7.6463 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported [ 7.6471 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported [ 7.6478 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported [ 7.6487 ] ERROR: /misc/tsc_controls/tsc_locking_config is not supported [ 7.6496 ] ERROR: /misc/tsc_controls/tsc_locking_diff_configuration is not supported [ 7.6505 ] ERROR: /misc/tsc_controls/tsc_locking_ref_frequency_configuration is not supported [ 7.6516 ] ERROR: /misc/tsc_controls/tsc_locking_control is not supported [ 7.6524 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_configuration is not supported [ 7.6534 ] ERROR: /misc/tsc_controls/tsc_locking_fast_adjust_configuration is not supported [ 7.6542 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_delta_control is not supported [ 7.6542 ] ERROR: /misc/tsc_controls/tsc_capture_control_ptx is not supported [ 7.6542 ] ERROR: /misc/tsc_controls/tsc_capture_config_ptx is not supported [ 7.6542 ] ERROR: /misc/tsc_controls/tsc_stscrsr is not supported [ 7.6542 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_num_control is not supported [ 7.6542 ] [ 7.6542 ] Parsing config file :tegra234-mb1-bct-pinmux-p3767-dp-a03_cpp.dtb [ 7.6542 ] Added Platform Config 0 data with size :- 2416 [ 7.6542 ] [ 7.6543 ] Parsing config file :tegra234-mb1-bct-padvoltage-p3767-dp-a03_cpp.dtb [ 7.6543 ] WARNING: unknown node 'g2' [ 7.6543 ] WARNING: unknown node 'g2' [ 7.6543 ] WARNING: unknown node 'g9' [ 7.6543 ] WARNING: unknown node 'g9' [ 7.6543 ] Added Platform Config 2 data with size :- 24 [ 7.6543 ] [ 7.6543 ] Parsing config file :tegra234-mb1-bct-pmic-p3767-0000-a02_cpp.dtb [ 7.6543 ] Added Platform Config 4 data with size :- 288 [ 7.6543 ] [ 7.6543 ] Parsing config file :tegra234-mb1-bct-reset-p3767-0000_cpp.dtb [ 7.6544 ] Added Platform Config 3 data with size :- 52 [ 7.6544 ] [ 7.6544 ] Parsing config file :tegra234-mb1-bct-prod-p3767-0000_cpp.dtb [ 7.6544 ] WARNING: unknown property 'major' [ 7.6544 ] WARNING: unknown property 'minor' [ 7.6544 ] Added Platform Config 5 data with size :- 512 [ 7.6544 ] [ 7.6544 ] Parsing config file :tegra234-mb1-bct-gpioint-p3767-0000_cpp.dtb [ 7.6544 ] WARNING: unknown property 'major' [ 7.6544 ] WARNING: unknown property 'minor' [ 7.6545 ] Added Platform Config 7 data with size :- 380 [ 7.6545 ] [ 7.6545 ] Parsing config file :tegra234-mb1-bct-uphylane-si_cpp.dtb [ 7.6545 ] Added Platform Config 8 data with size :- 24 [ 7.6545 ] [ 7.6545 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 7.6545 ] Added Platform Config 9 data with size :- 100 [ 7.6545 ] [ 7.6545 ] Parsing config file :tegra234-mb1-bct-cprod-p3767-0000_cpp.dtb [ 7.6545 ] ModuleCount 0 NumProdNames 0 [ 7.6546 ] Added Platform Config 6 data with size :- 16 [ 7.6546 ] [ 7.6546 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb [ 7.6546 ] ERROR: /ratchet/atf is not supported [ 7.6546 ] [ 7.6547 ] Updating mb1-bct with firmware information [ 7.6571 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin [ 7.6620 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct [ 7.6638 ] Generating SHA2 Hash for mb1bct [ 7.6689 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha [ 7.6717 ] Sha saved in mb1_cold_boot_bct_MB1.sha [ 7.6715 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk [ 7.6736 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct [ 7.6775 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 7.6778 ] Assuming zero filled SBK key [ 7.6828 ] Warning: pub_key.key is not found [ 7.6829 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk [ 7.6866 ] Generating recovery mb1-bct [ 7.6898 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --wb0sdram tegra234-p3767-0001-wb0sdram-l4t_cpp.dtb --pinmux tegra234-mb1-bct-pinmux-p3767-dp-a03_cpp.dtb --pmc tegra234-mb1-bct-padvoltage-p3767-dp-a03_cpp.dtb --pmic tegra234-mb1-bct-pmic-p3767-0000-a02_cpp.dtb --brcommand tegra234-mb1-bct-reset-p3767-0000_cpp.dtb --prod tegra234-mb1-bct-prod-p3767-0000_cpp.dtb --gpioint tegra234-mb1-bct-gpioint-p3767-0000_cpp.dtb --uphy tegra234-mb1-bct-uphylane-si_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --deviceprod tegra234-mb1-bct-cprod-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin [ 7.6920 ] MB1-BCT version: 0.12 [ 7.6926 ] ERROR: /misc/enable_dram_page_blacklisting is not supported [ 7.6933 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported [ 7.6942 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported [ 7.6951 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported [ 7.6960 ] ERROR: /misc/tsc_controls/tsc_locking_config is not supported [ 7.6968 ] ERROR: /misc/tsc_controls/tsc_locking_diff_configuration is not supported [ 7.6977 ] ERROR: /misc/tsc_controls/tsc_locking_ref_frequency_configuration is not supported [ 7.6997 ] ERROR: /misc/tsc_controls/tsc_locking_control is not supported [ 7.7009 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_configuration is not supported [ 7.7009 ] ERROR: /misc/tsc_controls/tsc_locking_fast_adjust_configuration is not supported [ 7.7009 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_delta_control is not supported [ 7.7009 ] ERROR: /misc/tsc_controls/tsc_capture_control_ptx is not supported [ 7.7009 ] ERROR: /misc/tsc_controls/tsc_capture_config_ptx is not supported [ 7.7009 ] ERROR: /misc/tsc_controls/tsc_stscrsr is not supported [ 7.7009 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_num_control is not supported [ 7.7009 ] [ 7.7009 ] Parsing config file :tegra234-mb1-bct-pinmux-p3767-dp-a03_cpp.dtb [ 7.7010 ] Added Platform Config 0 data with size :- 2416 [ 7.7010 ] [ 7.7010 ] Parsing config file :tegra234-mb1-bct-padvoltage-p3767-dp-a03_cpp.dtb [ 7.7010 ] WARNING: unknown node 'g2' [ 7.7010 ] WARNING: unknown node 'g2' [ 7.7010 ] WARNING: unknown node 'g9' [ 7.7010 ] WARNING: unknown node 'g9' [ 7.7010 ] Added Platform Config 2 data with size :- 24 [ 7.7010 ] [ 7.7010 ] Parsing config file :tegra234-mb1-bct-pmic-p3767-0000-a02_cpp.dtb [ 7.7011 ] Added Platform Config 4 data with size :- 288 [ 7.7011 ] [ 7.7011 ] Parsing config file :tegra234-mb1-bct-reset-p3767-0000_cpp.dtb [ 7.7011 ] Added Platform Config 3 data with size :- 52 [ 7.7011 ] [ 7.7011 ] Parsing config file :tegra234-mb1-bct-prod-p3767-0000_cpp.dtb [ 7.7011 ] WARNING: unknown property 'major' [ 7.7011 ] WARNING: unknown property 'minor' [ 7.7011 ] Added Platform Config 5 data with size :- 512 [ 7.7012 ] [ 7.7012 ] Parsing config file :tegra234-mb1-bct-gpioint-p3767-0000_cpp.dtb [ 7.7012 ] WARNING: unknown property 'major' [ 7.7012 ] WARNING: unknown property 'minor' [ 7.7012 ] Added Platform Config 7 data with size :- 380 [ 7.7012 ] [ 7.7012 ] Parsing config file :tegra234-mb1-bct-uphylane-si_cpp.dtb [ 7.7012 ] Added Platform Config 8 data with size :- 24 [ 7.7012 ] [ 7.7012 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 7.7013 ] Added Platform Config 9 data with size :- 100 [ 7.7013 ] [ 7.7013 ] Parsing config file :tegra234-mb1-bct-cprod-p3767-0000_cpp.dtb [ 7.7013 ] ModuleCount 0 NumProdNames 0 [ 7.7013 ] Added Platform Config 6 data with size :- 16 [ 7.7013 ] [ 7.7013 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb [ 7.7013 ] ERROR: /ratchet/atf is not supported [ 7.7013 ] [ 7.7014 ] Updating mb1-bct with firmware information [ 7.7032 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo flash.xml.bin [ 7.7091 ] tegrahost_v2 --chip 0x23 0 --align mb1_bct_MB1_aligned.bct [ 7.7110 ] Generating SHA2 Hash for mb1bct [ 7.7161 ] Sha saved in mb1_bct_MB1_aligned.sha [ 7.7190 ] Sha saved in mb1_bct_MB1.sha [ 7.7194 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_bct_MB1_aligned.bct zerosbk [ 7.7222 ] adding BCH for mb1_bct_MB1_aligned.bct [ 7.7262 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 7.7266 ] Assuming zero filled SBK key [ 7.7304 ] Warning: pub_key.key is not found [ 7.7305 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk [ 7.7337 ] Generating coldboot mem-bct [ 7.7354 ] tegrabct_v2 --chip 0x23 0 --sdram tegra234-p3767-0001-sdram-l4t_cpp.dtb --wb0sdram tegra234-p3767-0001-wb0sdram-l4t_cpp.dtb --membct tegra234-p3767-0001-sdram-l4t_cpp_1.bct tegra234-p3767-0001-sdram-l4t_cpp_2.bct tegra234-p3767-0001-sdram-l4t_cpp_3.bct tegra234-p3767-0001-sdram-l4t_cpp_4.bct [ 7.7370 ] packing sdram params with Wb0 file tegra234-p3767-0001-wb0sdram-l4t_cpp.dtb [ 7.9156 ] Packing sdram param for instance[0] [ 7.9160 ] Packing sdram param for instance[1] [ 7.9164 ] Packing sdram param for instance[2] [ 7.9168 ] Packing sdram param for instance[3] [ 7.9171 ] Packing sdram param for instance[4] [ 7.9175 ] Packing sdram param for instance[5] [ 7.9179 ] Packing sdram param for instance[6] [ 7.9182 ] Packing sdram param for instance[7] [ 7.9186 ] Packing sdram param for instance[8] [ 7.9190 ] Packing sdram param for instance[9] [ 7.9194 ] Packing sdram param for instance[10] [ 7.9198 ] Packing sdram param for instance[11] [ 7.9202 ] Packing sdram param for instance[12] [ 7.9206 ] Packing sdram param for instance[13] [ 7.9210 ] Packing sdram param for instance[14] [ 7.9214 ] Packing sdram param for instance[15] [ 8.0881 ] Getting sector size from pt [ 8.0918 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin [ 8.0956 ] BlockSize read from layout is 0x200 [ 8.0980 ] tegrahost_v2 --chip 0x23 0 --blocksize 512 --magicid MEMB --addsigheader_multi tegra234-p3767-0001-sdram-l4t_cpp_1.bct tegra234-p3767-0001-sdram-l4t_cpp_2.bct tegra234-p3767-0001-sdram-l4t_cpp_3.bct tegra234-p3767-0001-sdram-l4t_cpp_4.bct [ 8.1001 ] Binary 0 length is 58752 [ 8.1005 ] Binary 0 align length is 58880 [ 8.1032 ] Binary 1 length is 58752 [ 8.1035 ] Binary 1 align length is 58880 [ 8.1060 ] Binary 2 length is 58752 [ 8.1063 ] Binary 2 align length is 58880 [ 8.1078 ] Binary 3 length is 58752 [ 8.1082 ] Binary 3 align length is 58880 [ 8.1094 ] Buffer length is 235520 [ 8.1097 ] adding BCH for tegra234-p3767-0001-sdram-l4t_cpp_1.bct [ 8.1105 ] new length is 243712 [ 8.1105 ] [ 8.1131 ] tegrahost_v2 --chip 0x23 0 --align mem_coldboot_aligned.bct [ 8.1168 ] tegrahost_v2 --chip 0x23 0 --magicid MEMB --ratchet_blob ratchet_blob.bin --appendsigheader mem_coldboot_aligned.bct zerosbk [ 8.1191 ] Header already present for mem_coldboot_aligned.bct [ 8.1234 ] tegrasign_v3.py --key None --list mem_coldboot_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 8.1240 ] Assuming zero filled SBK key [ 8.1289 ] Warning: pub_key.key is not found [ 8.1292 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mem_coldboot_aligned_sigheader.bct.encrypt mem_coldboot_aligned_sigheader.bct.hash zerosbk [ 8.1332 ] Generating recovery mem-bct [ 8.1357 ] tegrabct_v2 --chip 0x23 0 --sdram tegra234-p3767-0001-sdram-l4t_cpp.dtb --wb0sdram tegra234-p3767-0001-wb0sdram-l4t_cpp.dtb --membct tegra234-p3767-0001-sdram-l4t_cpp_1.bct tegra234-p3767-0001-sdram-l4t_cpp_2.bct tegra234-p3767-0001-sdram-l4t_cpp_3.bct tegra234-p3767-0001-sdram-l4t_cpp_4.bct [ 8.1375 ] packing sdram params with Wb0 file tegra234-p3767-0001-wb0sdram-l4t_cpp.dtb [ 8.3086 ] Packing sdram param for instance[0] [ 8.3090 ] Packing sdram param for instance[1] [ 8.3094 ] Packing sdram param for instance[2] [ 8.3098 ] Packing sdram param for instance[3] [ 8.3102 ] Packing sdram param for instance[4] [ 8.3106 ] Packing sdram param for instance[5] [ 8.3110 ] Packing sdram param for instance[6] [ 8.3114 ] Packing sdram param for instance[7] [ 8.3118 ] Packing sdram param for instance[8] [ 8.3121 ] Packing sdram param for instance[9] [ 8.3126 ] Packing sdram param for instance[10] [ 8.3131 ] Packing sdram param for instance[11] [ 8.3137 ] Packing sdram param for instance[12] [ 8.3141 ] Packing sdram param for instance[13] [ 8.3147 ] Packing sdram param for instance[14] [ 8.3153 ] Packing sdram param for instance[15] [ 8.4817 ] Reading ramcode from backup chip_info.bin file [ 8.4819 ] RAMCODE Read from Device: 2 [ 8.4819 ] Using ramcode 0 [ 8.4820 ] Disabled BPMP dtb trim, using default dtb [ 8.4820 ] [ 8.4854 ] tegrahost_v2 --chip 0x23 0 --align mem_rcm_aligned.bct [ 8.4904 ] tegrahost_v2 --chip 0x23 0 --magicid MEM0 --ratchet_blob ratchet_blob.bin --appendsigheader mem_rcm_aligned.bct zerosbk [ 8.4921 ] adding BCH for mem_rcm_aligned.bct [ 8.5003 ] tegrasign_v3.py --key None --list mem_rcm_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 8.5008 ] Assuming zero filled SBK key [ 8.5045 ] Warning: pub_key.key is not found [ 8.5046 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mem_rcm_aligned_sigheader.bct.encrypt mem_rcm_aligned_sigheader.bct.hash zerosbk [ 8.5075 ] Copying signatures [ 8.5101 ] tegrahost_v2 --chip 0x23 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml [ 8.5787 ] Boot Rom communication [ 8.5818 ] tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt [ 8.5838 ] BR_CID: 0x80012344705DE64A2000000002008140 [ 8.6143 ] Sending bct_br [ 8.6617 ] Sending mb1 [ 8.6625 ] Sending psc_bl1 [ 8.6720 ] Sending bct_mb1 [ 8.6775 ] Boot Rom communication completed [ 8.6776 ] Generating blob for T23x [ 8.6843 ] tegrahost_v2 --chip 0x23 0 --align blob_uefi_jetson_with_dtb_aligned.bin [ 8.6887 ] tegrahost_v2 --chip 0x23 0 --magicid CPBL --ratchet_blob ratchet_blob.bin --appendsigheader blob_uefi_jetson_with_dtb_aligned.bin zerosbk [ 8.6906 ] adding BCH for blob_uefi_jetson_with_dtb_aligned.bin [ 8.8723 ] tegrasign_v3.py --key None --list blob_uefi_jetson_with_dtb_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512 [ 8.8731 ] Assuming zero filled SBK key [ 8.8892 ] Warning: pub_key.key is not found [ 8.8896 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_uefi_jetson_with_dtb_aligned_sigheader.bin.encrypt blob_uefi_jetson_with_dtb_aligned_sigheader.bin.hash zerosbk [ 8.9055 ] Get magic id [ 8.9081 ] tegraparser_v2 --get_magic psc_fw [ 8.9100 ] PFWP [ 8.9103 ] partition type psc_fw, magic id = PFWP [ 8.9133 ] tegrahost_v2 --chip 0x23 0 --align blob_pscfw_t234_prod_aligned.bin [ 8.9175 ] tegrahost_v2 --chip 0x23 0 --magicid PFWP --ratchet_blob ratchet_blob.bin --appendsigheader blob_pscfw_t234_prod_aligned.bin zerosbk [ 8.9195 ] Header already present for blob_pscfw_t234_prod_aligned.bin [ 8.9390 ] tegrasign_v3.py --key None --list blob_pscfw_t234_prod_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512 [ 8.9393 ] Assuming zero filled SBK key [ 8.9443 ] Warning: pub_key.key is not found [ 8.9450 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_pscfw_t234_prod_aligned_sigheader.bin.encrypt blob_pscfw_t234_prod_aligned_sigheader.bin.hash zerosbk [ 8.9500 ] Get magic id [ 8.9524 ] tegraparser_v2 --get_magic mts_mce [ 8.9547 ] MTSM [ 8.9550 ] partition type mts_mce, magic id = MTSM [ 8.9575 ] tegrahost_v2 --chip 0x23 0 --align blob_mce_flash_o10_cr_prod_aligned.bin [ 8.9616 ] tegrahost_v2 --chip 0x23 0 --magicid MTSM --ratchet_blob ratchet_blob.bin --appendsigheader blob_mce_flash_o10_cr_prod_aligned.bin zerosbk [ 8.9636 ] Header already present for blob_mce_flash_o10_cr_prod_aligned.bin [ 8.9733 ] tegrasign_v3.py --key None --list blob_mce_flash_o10_cr_prod_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512 [ 8.9736 ] Assuming zero filled SBK key [ 8.9780 ] Warning: pub_key.key is not found [ 8.9787 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_mce_flash_o10_cr_prod_aligned_sigheader.bin.encrypt blob_mce_flash_o10_cr_prod_aligned_sigheader.bin.hash zerosbk [ 8.9835 ] Get magic id [ 8.9861 ] tegraparser_v2 --get_magic mb2_applet [ 8.9888 ] MB2A [ 8.9892 ] partition type mb2_applet, magic id = MB2A [ 8.9922 ] tegrahost_v2 --chip 0x23 0 --align blob_applet_t234_aligned.bin [ 8.9968 ] tegrahost_v2 --chip 0x23 0 --magicid MB2A --ratchet_blob ratchet_blob.bin --appendsigheader blob_applet_t234_aligned.bin zerosbk [ 8.9988 ] adding BCH for blob_applet_t234_aligned.bin [ 9.0178 ] tegrasign_v3.py --key None --list blob_applet_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512 [ 9.0187 ] Assuming zero filled SBK key [ 9.0239 ] Warning: pub_key.key is not found [ 9.0248 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_applet_t234_aligned_sigheader.bin.encrypt blob_applet_t234_aligned_sigheader.bin.hash zerosbk [ 9.0311 ] Generating recovery mb2-bct [ 9.0311 ] tegrabct_v2 --chip 0x23 0 --mb2bct mb2_bct.cfg --recov --mb2bctcfg tegra234-mb2-bct-misc-p3767-0000_cpp.dtb --scr tegra234-mb2-bct-scr-p3767-0000_cpp.dtb [ 9.0330 ] ERROR: value 0x31 is out of range [ 9.0350 ] ERROR: value 0x31 is out of range [ 9.0355 ] ERROR: value 0x31 is out of range [ 9.0359 ] ERROR: value 0x31 is out of range [ 9.0363 ] WARNING: unknown property 'tfc_version' [ 9.0368 ] WARNING: unknown property 'addr_header_version' [ 9.0545 ] Updating mb2-bct with storage information [ 9.0569 ] tegrabct_v2 --chip 0x23 0 --mb2bct mb2_bct_MB2.bct --updatestorageinfo flash.xml.bin [ 9.0596 ] Concatenating mb2-bct to mb2 binary [ 9.0597 ] mb2_bin_file = mb2_t234.bin [ 9.0597 ] mb2_bct_file = mb2_bct_MB2.bct [ 9.0608 ] Get magic id [ 9.0640 ] tegraparser_v2 --get_magic mb2_bootloader [ 9.0661 ] MB2B [ 9.0663 ] partition type mb2_bootloader, magic id = MB2B [ 9.0692 ] tegrahost_v2 --chip 0x23 0 --align blob_mb2_t234_with_mb2_bct_MB2_aligned.bin [ 9.0730 ] tegrahost_v2 --chip 0x23 0 --magicid MB2B --ratchet_blob ratchet_blob.bin --appendsigheader blob_mb2_t234_with_mb2_bct_MB2_aligned.bin zerosbk [ 9.0751 ] adding BCH for blob_mb2_t234_with_mb2_bct_MB2_aligned.bin [ 9.1009 ] tegrasign_v3.py --key None --list blob_mb2_t234_with_mb2_bct_MB2_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512 [ 9.1012 ] Assuming zero filled SBK key [ 9.1057 ] Warning: pub_key.key is not found [ 9.1060 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_mb2_t234_with_mb2_bct_MB2_aligned_sigheader.bin.encrypt blob_mb2_t234_with_mb2_bct_MB2_aligned_sigheader.bin.hash zerosbk [ 9.1106 ] Get magic id [ 9.1137 ] tegraparser_v2 --get_magic xusb_fw [ 9.1167 ] XUSB [ 9.1171 ] partition type xusb_fw, magic id = XUSB [ 9.1211 ] tegrahost_v2 --chip 0x23 0 --align blob_xusb_t234_prod_aligned.bin [ 9.1249 ] tegrahost_v2 --chip 0x23 0 --magicid XUSB --ratchet_blob ratchet_blob.bin --appendsigheader blob_xusb_t234_prod_aligned.bin zerosbk [ 9.1266 ] adding BCH for blob_xusb_t234_prod_aligned.bin [ 9.1405 ] tegrasign_v3.py --key None --list blob_xusb_t234_prod_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512 [ 9.1412 ] Assuming zero filled SBK key [ 9.1475 ] Warning: pub_key.key is not found [ 9.1488 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_xusb_t234_prod_aligned_sigheader.bin.encrypt blob_xusb_t234_prod_aligned_sigheader.bin.hash zerosbk [ 9.1531 ] Kernel DTB used: tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay.dtb [ 9.1532 ] Concatenating kernel-dtb to dce-fw binary [ 9.1532 ] dce_bin = display-t234-dce.bin [ 9.1532 ] kernel_dtb = tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay.dtb [ 9.1532 ] dce_with_dtb = display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay.bin [ 9.1641 ] Get magic id [ 9.1662 ] tegraparser_v2 --get_magic dce_fw [ 9.1680 ] DCEF [ 9.1682 ] partition type dce_fw, magic id = DCEF [ 9.1792 ] tegrahost_v2 --chip 0x23 0 --align blob_display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay_aligned.bin [ 9.1846 ] tegrahost_v2 --chip 0x23 0 --magicid DCEF --ratchet_blob ratchet_blob.bin --appendsigheader blob_display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay_aligned.bin zerosbk [ 9.1868 ] adding BCH for blob_display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay_aligned.bin [ 9.5901 ] tegrasign_v3.py --key None --list blob_display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512 [ 9.5908 ] Assuming zero filled SBK key [ 9.6331 ] Warning: pub_key.key is not found [ 9.6333 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay_aligned_sigheader.bin.encrypt blob_display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay_aligned_sigheader.bin.hash zerosbk [ 9.6880 ] Get magic id [ 9.6902 ] tegraparser_v2 --get_magic nvdec [ 9.6921 ] NDEC [ 9.6924 ] partition type nvdec, magic id = NDEC [ 9.6950 ] tegrahost_v2 --chip 0x23 0 --align blob_nvdec_t234_prod_aligned.fw [ 9.6989 ] tegrahost_v2 --chip 0x23 0 --magicid NDEC --ratchet_blob ratchet_blob.bin --appendsigheader blob_nvdec_t234_prod_aligned.fw zerosbk [ 9.7008 ] Header already present for blob_nvdec_t234_prod_aligned.fw [ 9.7147 ] tegrasign_v3.py --key None --list blob_nvdec_t234_prod_aligned_sigheader.fw_list.xml --pubkeyhash pub_key.key --sha sha512 [ 9.7152 ] Assuming zero filled SBK key [ 9.7199 ] Warning: pub_key.key is not found [ 9.7214 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_nvdec_t234_prod_aligned_sigheader.fw.encrypt blob_nvdec_t234_prod_aligned_sigheader.fw.hash zerosbk [ 9.7256 ] Get magic id [ 9.7274 ] tegraparser_v2 --get_magic bpmp_fw [ 9.7291 ] BPMF [ 9.7294 ] partition type bpmp_fw, magic id = BPMF [ 9.7328 ] tegrahost_v2 --chip 0x23 0 --align blob_bpmp_t234-TE950M-A1_prod_aligned.bin [ 9.7370 ] tegrahost_v2 --chip 0x23 0 --magicid BPMF --ratchet_blob ratchet_blob.bin --appendsigheader blob_bpmp_t234-TE950M-A1_prod_aligned.bin zerosbk [ 9.7387 ] Header already present for blob_bpmp_t234-TE950M-A1_prod_aligned.bin [ 9.7714 ] tegrasign_v3.py --key None --list blob_bpmp_t234-TE950M-A1_prod_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512 [ 9.7720 ] Assuming zero filled SBK key [ 9.7796 ] Warning: pub_key.key is not found [ 9.7799 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_bpmp_t234-TE950M-A1_prod_aligned_sigheader.bin.encrypt blob_bpmp_t234-TE950M-A1_prod_aligned_sigheader.bin.hash zerosbk [ 9.7877 ] Using bpmp-dtb concatenated with odmdata in blob [ 9.7879 ] Get magic id [ 9.7903 ] tegraparser_v2 --get_magic bpmp_fw_dtb [ 9.7931 ] BPMD [ 9.7931 ] [ 9.7932 ] partition type bpmp_fw_dtb, magic id = BPMD [ 9.7966 ] tegrahost_v2 --chip 0x23 0 --align blob_tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned.dtb [ 9.8007 ] tegrahost_v2 --chip 0x23 0 --magicid BPMD --ratchet_blob ratchet_blob.bin --appendsigheader blob_tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned.dtb zerosbk [ 9.8025 ] adding BCH for blob_tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned.dtb [ 9.8182 ] tegrasign_v3.py --key None --list blob_tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned_sigheader.dtb_list.xml --pubkeyhash pub_key.key --sha sha512 [ 9.8188 ] Assuming zero filled SBK key [ 9.8245 ] Warning: pub_key.key is not found [ 9.8258 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned_sigheader.dtb.encrypt blob_tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned_sigheader.dtb.hash zerosbk [ 9.8294 ] Get magic id [ 9.8312 ] tegraparser_v2 --get_magic sce_fw [ 9.8332 ] SCEF [ 9.8334 ] partition type sce_fw, magic id = SCEF [ 9.8359 ] tegrahost_v2 --chip 0x23 0 --align blob_camera-rtcpu-sce_aligned.img [ 9.8397 ] tegrahost_v2 --chip 0x23 0 --magicid SCEF --ratchet_blob ratchet_blob.bin --appendsigheader blob_camera-rtcpu-sce_aligned.img zerosbk [ 9.8416 ] adding BCH for blob_camera-rtcpu-sce_aligned.img [ 9.8563 ] tegrasign_v3.py --key None --list blob_camera-rtcpu-sce_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512 [ 9.8569 ] Assuming zero filled SBK key [ 9.8632 ] Warning: pub_key.key is not found [ 9.8635 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_camera-rtcpu-sce_aligned_sigheader.img.encrypt blob_camera-rtcpu-sce_aligned_sigheader.img.hash zerosbk [ 9.8679 ] Get magic id [ 9.8701 ] tegraparser_v2 --get_magic rce_fw [ 9.8719 ] RCEF [ 9.8722 ] partition type rce_fw, magic id = RCEF [ 9.8752 ] tegrahost_v2 --chip 0x23 0 --align blob_camera-rtcpu-t234-rce_aligned.img [ 9.8801 ] tegrahost_v2 --chip 0x23 0 --magicid RCEF --ratchet_blob ratchet_blob.bin --appendsigheader blob_camera-rtcpu-t234-rce_aligned.img zerosbk [ 9.8822 ] adding BCH for blob_camera-rtcpu-t234-rce_aligned.img [ 9.9141 ] tegrasign_v3.py --key None --list blob_camera-rtcpu-t234-rce_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512 [ 9.9148 ] Assuming zero filled SBK key [ 9.9210 ] Warning: pub_key.key is not found [ 9.9211 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_camera-rtcpu-t234-rce_aligned_sigheader.img.encrypt blob_camera-rtcpu-t234-rce_aligned_sigheader.img.hash zerosbk [ 9.9258 ] Get magic id [ 9.9277 ] tegraparser_v2 --get_magic ape_fw [ 9.9300 ] APEF [ 9.9302 ] partition type ape_fw, magic id = APEF [ 9.9328 ] tegrahost_v2 --chip 0x23 0 --align blob_adsp-fw_aligned.bin [ 9.9368 ] tegrahost_v2 --chip 0x23 0 --magicid APEF --ratchet_blob ratchet_blob.bin --appendsigheader blob_adsp-fw_aligned.bin zerosbk [ 9.9388 ] adding BCH for blob_adsp-fw_aligned.bin [ 9.9647 ] tegrasign_v3.py --key None --list blob_adsp-fw_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512 [ 9.9653 ] Assuming zero filled SBK key [ 9.9725 ] Warning: pub_key.key is not found [ 9.9738 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_adsp-fw_aligned_sigheader.bin.encrypt blob_adsp-fw_aligned_sigheader.bin.hash zerosbk [ 9.9793 ] Get magic id [ 9.9815 ] tegraparser_v2 --get_magic spe_fw [ 9.9835 ] SPEF [ 9.9839 ] partition type spe_fw, magic id = SPEF [ 9.9865 ] tegrahost_v2 --chip 0x23 0 --align blob_spe_t234_aligned.bin [ 9.9902 ] tegrahost_v2 --chip 0x23 0 --magicid SPEF --ratchet_blob ratchet_blob.bin --appendsigheader blob_spe_t234_aligned.bin zerosbk [ 9.9921 ] adding BCH for blob_spe_t234_aligned.bin [ 10.0127 ] tegrasign_v3.py --key None --list blob_spe_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512 [ 10.0135 ] Assuming zero filled SBK key [ 10.0183 ] Warning: pub_key.key is not found [ 10.0187 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_spe_t234_aligned_sigheader.bin.encrypt blob_spe_t234_aligned_sigheader.bin.hash zerosbk [ 10.0229 ] Get magic id [ 10.0250 ] tegraparser_v2 --get_magic tos [ 10.0270 ] TOSB [ 10.0272 ] partition type tos, magic id = TOSB [ 10.0305 ] tegrahost_v2 --chip 0x23 0 --align blob_tos-optee_t234_aligned.img [ 10.0350 ] tegrahost_v2 --chip 0x23 0 --magicid TOSB --ratchet_blob ratchet_blob.bin --appendsigheader blob_tos-optee_t234_aligned.img zerosbk [ 10.0374 ] adding BCH for blob_tos-optee_t234_aligned.img [ 10.1001 ] tegrasign_v3.py --key None --list blob_tos-optee_t234_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512 [ 10.1007 ] Assuming zero filled SBK key [ 10.1091 ] Warning: pub_key.key is not found [ 10.1097 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_tos-optee_t234_aligned_sigheader.img.encrypt blob_tos-optee_t234_aligned_sigheader.img.hash zerosbk [ 10.1192 ] Get magic id [ 10.1214 ] tegraparser_v2 --get_magic eks [ 10.1236 ] EKSB [ 10.1237 ] [ 10.1237 ] partition type eks, magic id = EKSB [ 10.1265 ] tegrahost_v2 --chip 0x23 0 --align blob_eks_t234_aligned.img [ 10.1311 ] tegrahost_v2 --chip 0x23 0 --magicid EKSB --ratchet_blob ratchet_blob.bin --appendsigheader blob_eks_t234_aligned.img zerosbk [ 10.1334 ] adding BCH for blob_eks_t234_aligned.img [ 10.1369 ] tegrasign_v3.py --key None --list blob_eks_t234_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512 [ 10.1372 ] Assuming zero filled SBK key [ 10.1414 ] Warning: pub_key.key is not found [ 10.1418 ] tegrahost_v2 --chip 0x23 0 --updatesigheader blob_eks_t234_aligned_sigheader.img.encrypt blob_eks_t234_aligned_sigheader.img.hash zerosbk [ 10.1474 ] tegrahost_v2 --chip 0x23 0 --generateblob blob.xml blob.bin [ 10.1493 ] The number of images in blob is 16 [ 10.1500 ] blobsize is 18287312 [ 10.1503 ] Added binary blob_uefi_jetson_with_dtb_sigheader.bin.encrypt of size 3186752 [ 10.1632 ] Added binary blob_pscfw_t234_prod_sigheader.bin.encrypt of size 375168 [ 10.1642 ] Added binary blob_mce_flash_o10_cr_prod_sigheader.bin.encrypt of size 190592 [ 10.1652 ] Added binary blob_applet_t234_sigheader.bin.encrypt of size 277312 [ 10.1660 ] Not supported type: mb2_applet [ 10.1663 ] Added binary blob_mb2_t234_with_mb2_bct_MB2_sigheader.bin.encrypt of size 437008 [ 10.1672 ] Added binary blob_xusb_t234_prod_sigheader.bin.encrypt of size 164864 [ 10.1679 ] Added binary blob_display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay_sigheader.bin.encrypt of size 9457728 [ 10.1740 ] Added binary blob_nvdec_t234_prod_sigheader.fw.encrypt of size 294912 [ 10.1753 ] Added binary blob_bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt of size 1027008 [ 10.1764 ] Added binary blob_tegra234-bpmp-3767-0003-3509-a02_with_odm_sigheader.dtb.encrypt of size 199936 [ 10.1775 ] Added binary blob_camera-rtcpu-sce_sigheader.img.encrypt of size 166304 [ 10.1785 ] Added binary blob_camera-rtcpu-t234-rce_sigheader.img.encrypt of size 540000 [ 10.1794 ] Added binary blob_adsp-fw_sigheader.bin.encrypt of size 400960 [ 10.1802 ] Added binary blob_spe_t234_sigheader.bin.encrypt of size 270336 [ 10.1811 ] Added binary blob_tos-optee_t234_sigheader.img.encrypt of size 1288096 [ 10.1820 ] Added binary blob_eks_t234_sigheader.img.encrypt of size 9232 [ 10.1953 ] Sending membct and RCM blob [ 10.1986 ] tegrarcm_v2 --chip 0x23 0 --pollbl --download bct_mem mem_rcm_sigheader.bct.encrypt --download blob blob.bin [ 10.2011 ] BL: version 1.4.0.1-t234-54845784-08e631ca last_boot_error: 0 [ 10.2341 ] Sending bct_mem [ 10.2814 ] Sending blob [ 11.5487 ] completed [ 11.5488 ] Retrieving storage infomation [ 11.5525 ] tegrarcm_v2 --chip 0x23 0 --oem platformdetails storage storage_info.bin [ 11.5558 ] MB2 version 01.00.0000 [ 12.1763 ] Saved platform info in storage_info.bin [ 13.1851 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet [ 13.2187 ] tegrarcm_v2 --chip 0x23 0 --ismb2 [ 13.2221 ] MB2 version 01.00.0000 [ 13.2710 ] Flashing the device [ 13.2745 ] tegraparser_v2 --storageinfo storage_info.bin --generategpt --pt flash.xml.bin [ 13.2777 ] gpt_secondary_3_0.bin: [ 13.2786 ] partition_id partition_name StartingLba EndingLba [ 13.2795 ] 1 BCT 0 2047 [ 13.2803 ] 2 A_mb1 2048 3071 [ 13.2821 ] 3 A_psc_bl1 3072 3583 [ 13.2824 ] 4 A_MB1_BCT 3584 3839 [ 13.2824 ] 5 A_MEM_BCT 3840 4351 [ 13.2825 ] 6 A_tsec-fw 4352 6399 [ 13.2825 ] 7 A_nvdec 6400 8447 [ 13.2825 ] 8 A_mb2 8448 9471 [ 13.2825 ] 9 A_xusb-fw 9472 9983 [ 13.2825 ] 10 A_bpmp-fw 9984 13055 [ 13.2825 ] 11 A_bpmp-fw-dtb 13056 21247 [ 13.2826 ] 12 A_psc-fw 21248 22783 [ 13.2826 ] 13 A_mts-mce 22784 23807 [ 13.2826 ] 14 A_sc7 23808 24191 [ 13.2826 ] 15 A_pscrf 24192 24575 [ 13.2826 ] 16 A_mb2rf 24576 24831 [ 13.2826 ] 17 A_cpu-bootloader 24832 31999 [ 13.2826 ] 18 A_secure-os 32000 40191 [ 13.2826 ] 19 A_smm-fw 40192 44287 [ 13.2827 ] 20 A_eks 44288 44799 [ 13.2827 ] 21 A_dce-fw 44800 55039 [ 13.2827 ] 22 A_spe-fw 55040 56191 [ 13.2827 ] 23 A_rce-fw 56192 58239 [ 13.2827 ] 24 A_adsp-fw 58240 62335 [ 13.2827 ] 25 A_reserved_on_boot 62336 65023 [ 13.2827 ] 26 B_mb1 65024 66047 [ 13.2827 ] 27 B_psc_bl1 66048 66559 [ 13.2828 ] 28 B_MB1_BCT 66560 66815 [ 13.2828 ] 29 B_MEM_BCT 66816 67327 [ 13.2828 ] 30 B_tsec-fw 67328 69375 [ 13.2828 ] 31 B_nvdec 69376 71423 [ 13.2828 ] 32 B_mb2 71424 72447 [ 13.2828 ] 33 B_xusb-fw 72448 72959 [ 13.2828 ] 34 B_bpmp-fw 72960 76031 [ 13.2828 ] 35 B_bpmp-fw-dtb 76032 84223 [ 13.2829 ] 36 B_psc-fw 84224 85759 [ 13.2829 ] 37 B_mts-mce 85760 86783 [ 13.2829 ] 38 B_sc7 86784 87167 [ 13.2829 ] 39 B_pscrf 87168 87551 [ 13.2829 ] 40 B_mb2rf 87552 87807 [ 13.2829 ] 41 B_cpu-bootloader 87808 94975 [ 13.2829 ] 42 B_secure-os 94976 103167 [ 13.2829 ] 43 B_smm-fw 103168 107263 [ 13.2830 ] 44 B_eks 107264 107775 [ 13.2830 ] 45 B_dce-fw 107776 118015 [ 13.2830 ] 46 B_spe-fw 118016 119167 [ 13.2830 ] 47 B_rce-fw 119168 121215 [ 13.2830 ] 48 B_adsp-fw 121216 125311 [ 13.2830 ] 49 B_reserved_on_boot 125312 127999 [ 13.2830 ] 50 uefi_variables 128000 128511 [ 13.2830 ] 51 uefi_ftw 128512 129535 [ 13.2831 ] 52 worm 129920 130303 [ 13.2831 ] 53 BCT-boot-chain_backup 130304 130431 [ 13.2831 ] 54 reserved_partition 130432 130559 [ 13.2831 ] 55 secondary_gpt_backup 130560 130687 [ 13.2831 ] 56 B_VER 130688 130815 [ 13.2831 ] 57 A_VER 130816 130943 [ 13.2831 ] [ 13.2832 ] Start flashing [ 13.2861 ] tegradevflash_v2 --pt flash.xml.bin --create [ 13.2881 ] Bootloader version 01.00.0000 [ 13.3153 ] Erasing spi: 0 ......... [Done] [ 183.3448 ] Writing partition secondary_gpt with gpt_secondary_3_0.bin [ 16896 bytes ] [ 183.3466 ] [................................................] 100% [ 183.5655 ] Writing partition A_mb1 with mb1_t234_prod_aligned_sigheader.bin.encrypt [ 281328 bytes ] [ 183.5678 ] [................................................] 100% [ 183.5783 ] Writing partition A_psc_bl1 with psc_bl1_t234_prod_aligned_sigheader.bin.encrypt [ 123008 bytes ] [ 187.0392 ] [................................................] 100% [ 187.0450 ] Writing partition A_nvdec with nvdec_t234_prod_sigheader.fw.encrypt [ 294912 bytes ] [ 188.5650 ] [................................................] 100% [ 188.5761 ] Writing partition A_mb2 with mb2_t234_with_mb2_cold_boot_bct_MB2_sigheader.bin.encrypt [ 437008 bytes ] [ 192.1986 ] [................................................] 100% [ 192.2126 ] Writing partition A_xusb-fw with xusb_t234_prod_sigheader.bin.encrypt [ 164864 bytes ] [ 197.5825 ] [................................................] 100% [ 197.5905 ] Writing partition A_bpmp-fw with bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt [ 1027008 bytes ] [ 199.6175 ] [................................................] 100% [ 199.6516 ] Writing partition A_bpmp-fw-dtb with tegra234-bpmp-3767-0003-3509-a02_with_odm_sigheader.dtb.encrypt [ 199936 bytes ] [ 212.2566 ] [................................................] 100% [ 212.2646 ] Writing partition A_psc-fw with pscfw_t234_prod_sigheader.bin.encrypt [ 375168 bytes ] [ 214.7265 ] [................................................] 100% [ 214.7407 ] Writing partition A_mts-mce with mce_flash_o10_cr_prod_sigheader.bin.encrypt [ 190592 bytes ] [ 219.3507 ] [................................................] 100% [ 219.3585 ] Writing partition A_sc7 with sc7_t234_prod_sigheader.bin.encrypt [ 185408 bytes ] [ 221.7075 ] [................................................] 100% [ 221.7150 ] Writing partition A_pscrf with psc_rf_t234_prod_sigheader.bin.encrypt [ 122464 bytes ] [ 224.0017 ] [................................................] 100% [ 224.0075 ] Writing partition A_mb2rf with mb2rf_t234_sigheader.bin.encrypt [ 122816 bytes ] [ 225.5219 ] [................................................] 100% [ 225.5281 ] Writing partition A_cpu-bootloader with uefi_jetson_with_dtb_aligned_blob_w_bin_sigheader.bin.encrypt [ 2912752 bytes ] [ 227.0426 ] [................. ] 035% [ 227.0426 ] [................................... ] 071% [ 227.0426 ] [................................................] 100% [ 252.8739 ] Writing partition A_secure-os with tos-optee_t234_sigheader.img.encrypt [ 1288096 bytes ] [ 262.8839 ] [........................................ ] 081% [ 262.8839 ] [................................................] 100% [ 275.7930 ] Writing partition A_eks with eks_t234_sigheader.img.encrypt [ 9232 bytes ] [ 278.7378 ] [................................................] 100% [ 278.7410 ] Writing partition A_dce-fw with display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay_aligned_blob_w_bin_sigheader.bin.encrypt [ 738272 bytes ] [ 278.8690 ] [................................................] 100% [ 278.8924 ] Writing partition A_spe-fw with spe_t234_sigheader.bin.encrypt [ 270336 bytes ] [ 287.9533 ] [................................................] 100% [ 287.9647 ] Writing partition A_rce-fw with camera-rtcpu-t234-rce_sigheader.img.encrypt [ 540000 bytes ] [ 291.2853 ] [................................................] 100% [ 291.3030 ] Writing partition A_adsp-fw with adsp-fw_sigheader.bin.encrypt [ 400960 bytes ] [ 297.9348 ] [................................................] 100% [ 297.9497 ] Writing partition B_mb1 with mb1_t234_prod_aligned_sigheader.bin.encrypt [ 281328 bytes ] [ 302.8802 ] [................................................] 100% [ 302.8897 ] Writing partition B_psc_bl1 with psc_bl1_t234_prod_aligned_sigheader.bin.encrypt [ 123008 bytes ] [ 306.3505 ] [................................................] 100% [ 306.3566 ] Writing partition B_nvdec with nvdec_t234_prod_sigheader.fw.encrypt [ 294912 bytes ] [ 307.8770 ] [................................................] 100% [ 307.8883 ] Writing partition B_mb2 with mb2_t234_with_mb2_cold_boot_bct_MB2_sigheader.bin.encrypt [ 437008 bytes ] [ 311.5108 ] [................................................] 100% [ 311.5249 ] Writing partition B_xusb-fw with xusb_t234_prod_sigheader.bin.encrypt [ 164864 bytes ] [ 316.8948 ] [................................................] 100% [ 316.9026 ] Writing partition B_bpmp-fw with bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt [ 1027008 bytes ] [ 318.9295 ] [................................................] 100% [ 318.9623 ] Writing partition B_bpmp-fw-dtb with tegra234-bpmp-3767-0003-3509-a02_with_odm_sigheader.dtb.encrypt [ 199936 bytes ] [ 331.5672 ] [................................................] 100% [ 331.5748 ] Writing partition B_psc-fw with pscfw_t234_prod_sigheader.bin.encrypt [ 375168 bytes ] [ 334.0370 ] [................................................] 100% [ 334.0513 ] Writing partition B_mts-mce with mce_flash_o10_cr_prod_sigheader.bin.encrypt [ 190592 bytes ] [ 338.6615 ] [................................................] 100% [ 338.6699 ] Writing partition B_sc7 with sc7_t234_prod_sigheader.bin.encrypt [ 185408 bytes ] [ 341.0186 ] [................................................] 100% [ 341.0268 ] Writing partition B_pscrf with psc_rf_t234_prod_sigheader.bin.encrypt [ 122464 bytes ] [ 343.3137 ] [................................................] 100% [ 343.3191 ] Writing partition B_mb2rf with mb2rf_t234_sigheader.bin.encrypt [ 122816 bytes ] [ 344.8333 ] [................................................] 100% [ 344.8389 ] Writing partition B_cpu-bootloader with uefi_jetson_with_dtb_aligned_blob_w_bin_sigheader.bin.encrypt [ 2912752 bytes ] [ 346.3533 ] [................. ] 035% [ 346.3533 ] [................................... ] 071% [ 346.3533 ] [................................................] 100% [ 372.1835 ] Writing partition B_secure-os with tos-optee_t234_sigheader.img.encrypt [ 1288096 bytes ] [ 382.1933 ] [........................................ ] 081% [ 382.1933 ] [................................................] 100% [ 395.1001 ] Writing partition B_eks with eks_t234_sigheader.img.encrypt [ 9232 bytes ] [ 398.0447 ] [................................................] 100% [ 398.0480 ] Writing partition B_dce-fw with display-t234-dce_with_tegra234-p3767-0003-p3768-0000-a0_with_odm_overlay_aligned_blob_w_bin_sigheader.bin.encrypt [ 738272 bytes ] [ 398.1758 ] [................................................] 100% [ 398.1974 ] Writing partition B_spe-fw with spe_t234_sigheader.bin.encrypt [ 270336 bytes ] [ 407.2594 ] [................................................] 100% [ 407.2691 ] Writing partition B_rce-fw with camera-rtcpu-t234-rce_sigheader.img.encrypt [ 540000 bytes ] [ 410.5902 ] [................................................] 100% [ 410.6085 ] Writing partition B_adsp-fw with adsp-fw_sigheader.bin.encrypt [ 400960 bytes ] [ 417.2405 ] [................................................] 100% [ 417.2557 ] Writing partition secondary_gpt_backup with gpt_backup_secondary_3_0.bin [ 16896 bytes ] [ 422.1862 ] [................................................] 100% [ 422.1904 ] Writing partition B_VER with qspi_bootblob_ver.txt [ 109 bytes ] [ 422.4016 ] [................................................] 100% [ 422.4045 ] Writing partition A_VER with qspi_bootblob_ver.txt [ 109 bytes ] [ 422.4132 ] [................................................] 100% [ 422.4289 ] tegradevflash_v2 --write BCT br_bct_BR.bct [ 422.4315 ] Bootloader version 01.00.0000 [ 422.4632 ] Writing partition BCT with br_bct_BR.bct [ 8192 bytes ] [ 422.4644 ] [................................................] 100% [ 429.0353 ] tegradevflash_v2 --write BCT-boot-chain_backup bct_backup.img [ 429.0385 ] Bootloader version 01.00.0000 [ 429.0714 ] Writing partition BCT-boot-chain_backup with bct_backup.img [ 32768 bytes ] [ 429.0725 ] [................................................] 100% [ 429.4880 ] tegradevflash_v2 --write A_MB1_BCT mb1_cold_boot_bct_MB1_sigheader.bct.encrypt [ 429.4910 ] Bootloader version 01.00.0000 [ 429.5191 ] Writing partition A_MB1_BCT with mb1_cold_boot_bct_MB1_sigheader.bct.encrypt [ 17600 bytes ] [ 429.5207 ] [................................................] 100% [ 429.7521 ] tegradevflash_v2 --write B_MB1_BCT mb1_cold_boot_bct_MB1_sigheader.bct.encrypt [ 429.7551 ] Bootloader version 01.00.0000 [ 429.7874 ] Writing partition B_MB1_BCT with mb1_cold_boot_bct_MB1_sigheader.bct.encrypt [ 17600 bytes ] [ 429.7893 ] [................................................] 100% [ 430.0229 ] tegradevflash_v2 --write A_MEM_BCT mem_coldboot_sigheader.bct.encrypt [ 430.0258 ] Bootloader version 01.00.0000 [ 430.0595 ] Writing partition A_MEM_BCT with mem_coldboot_sigheader.bct.encrypt [ 243712 bytes ] [ 430.0609 ] [................................................] 100% [ 433.0655 ] tegradevflash_v2 --write B_MEM_BCT mem_coldboot_sigheader.bct.encrypt [ 433.0682 ] Bootloader version 01.00.0000 [ 433.0996 ] Writing partition B_MEM_BCT with mem_coldboot_sigheader.bct.encrypt [ 243712 bytes ] [ 433.1007 ] [................................................] 100% [ 436.1026 ] Flashing completed [ 436.1029 ] Coldbooting the device [ 436.1062 ] tegrarcm_v2 --chip 0x23 0 --ismb2 [ 436.1088 ] MB2 version 01.00.0000 [ 436.1435 ] Coldbooting the device [ 436.1466 ] tegrarcm_v2 --chip 0x23 0 --reboot coldboot [ 436.1495 ] MB2 version 01.00.0000 *** The target t186ref has been flashed successfully. *** Make the target filesystem available to the device and reset the board to boot from external nvme0n1. ]0;jdp@jdp-MacBookPro: ~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegrajdp@jdp-MacBookPro:~/nvidia/nvidia_sdk/JetPack_5.1.3_Linux_JETSON_ORIN_NANO_TARGETS/Linux_for_Tegra$ exit exit Script done on 2024-08-24 16:33:10+08:00 [COMMAND_EXIT_CODE="0"]