$ sudo ./odmfuse.sh --test -X tools/pkc/fuse_config.xml -i 0x23 -k tools/pkc/rsa_priv.pem -S tools/pkc/sbk-32.key jetson-orin-nano-devkit-super copying minratchet_config(/mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-ratchet-p3767-0000.dts)... done. ./tegraflash.py --chip 0x23 --applet "/mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/bootloader/mb1_t234_prod.bin" --skipuid --cfg readinfo_t234_min_prod.xml --dev_params tegra234-br-bct-diag-boot.dts --device_config tegra234-mb1-bct-device-p3767-0000.dts --misc_config tegra234-mb1-bct-misc-p3767-0000.dts --bins "mb2_applet applet_t234.bin" --cmd "dump eeprom cvm cvm.bin; dump custinfo custinfo_out.bin; reboot recovery" --encrypt_key "/mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key" --key "/mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/rsa_priv.pem" --minratchet_config tegra234-mb1-bct-ratchet-p3767-0000.dts Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0305 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet [ 0.0317 ] File rcm_state open failed [ 0.0321 ] ERROR: failed to read rcm_state [ 0.0321 ] [ 0.0334 ] tegrasign_v3.py --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/rsa_priv.pem --getmode mode.txt [ 0.0348 ] Key size is 384 bytes [ 0.0342 ] Pre-processing config: tegra234-mb1-bct-device-p3767-0000.dts [ 0.0450 ] Pre-processing config: tegra234-mb1-bct-misc-p3767-0000.dts [ 0.0624 ] Pre-processing config: tegra234-mb1-bct-ratchet-p3767-0000.dts [ 0.0705 ] Parsing partition layout [ 0.0723 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp [ 0.0750 ] Kernel DTB used: None [ 0.0750 ] WARNING: dce base dtb is not provided [ 0.0750 ] Parsing partition layout [ 0.0768 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp [ 0.0787 ] Creating list of images to be encrypted and signed [ 0.0807 ] Generating ratchet blob [ 0.0807 ] Generating coldboot mb1-bct [ 0.0825 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin [ 0.0847 ] MB1-BCT version: 0.13 [ 0.0876 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 0.0879 ] Added Platform Config 9 data with size :- 100 [ 0.0880 ] [ 0.0881 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb [ 0.0881 ] [ 0.0881 ] Updating mb1-bct with firmware information [ 0.0900 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin [ 0.0921 ] mb1_cold_boot_bct_MB1.bct [ 0.0922 ] Encrypting and signing mb1_cold_boot_bct_MB1.bct [ 0.0923 ] header_magic: 4d423142 [ 0.0944 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct [ 0.0964 ] Generating SHA2 Hash for mb1bct [ 0.1004 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha [ 0.1029 ] Sha saved in mb1_cold_boot_bct_MB1.sha [ 0.1035 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct oem-rsa --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin [ 0.1051 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct [ 0.1075 ] tegrasign_v3.py --file mb1_cold_boot_bct_MB1_aligned_sigheader.bct --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=mb1_cold_boot_bct_MB1_aligned_sigheader_kdf.yaml [ 0.1093 ] Perform key derivation on mb1_cold_boot_bct_MB1_aligned_sigheader.bct [ 0.1382 ] Key Size is 32 bytes [ 0.1397 ] Performing aes-gcm encryption [ 0.1401 ] --key 22b1b0a73f2819907fedb6a0d37236d7a1291177a91adad73622ff4c7fa9daf0 [ 0.1404 ] --iv ce2abe8af864dc0a2b98f737 [ 0.1405 ] --aad 4d4243544016000000000000000000000000000000000000000000000000000400000000000000000000000000000000b2966f819ba6faa80169a6b34e40a31900000000ce2abe8af864dc0a2b98f737 [ 0.1428 ] Sha saved in mb1_cold_boot_bct_MB1_aligned_sigheader_tmp0_encrypt.sha [ 0.1433 ] tegrasign_v3.py --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/rsa_priv.pem --list mb1_cold_boot_bct_MB1_aligned_sigheader_encrypt.bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.1447 ] Key size is 384 bytes [ 0.1786 ] Saving pkc public key in pub_key.key [ 0.1795 ] tegrahost_v2 --chip 0x23 0 --pubkeyhash pub_key.key --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader_encrypt.bct.signed mb1_cold_boot_bct_MB1_aligned_sigheader_encrypt.bct.sig oem-rsa [ 0.1831 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --ratchet_blob ratchet_blob.bin --list images_list.xml oem-rsa [ 0.1850 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin [ 0.1869 ] Header already present for mb1_t234_prod_aligned_sigheader.bin [ 0.1877 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin [ 0.1954 ] Header already present for mb1_t234_prod_aligned_sigheader.bin [ 0.1962 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin [ 0.2025 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin [ 0.2030 ] adding BCH for mb2_t234_aligned.bin [ 0.2058 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin [ 0.2180 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin [ 0.2185 ] adding BCH for mb2_t234_aligned.bin [ 0.2350 ] tegrasign_v3.py --file mb1_t234_prod_aligned_sigheader.bin --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=mb1_t234_prod_aligned_sigheader_kdf.yaml [ 0.2372 ] Perform key derivation on mb1_t234_prod_aligned_sigheader.bin [ 0.2651 ] Key Size is 32 bytes [ 0.2670 ] Performing aes-gcm encryption [ 0.2676 ] --key 943870e3f576dc430540b78e241a4b8d81f116f0b58eaa18d509a3f6f8b4642e [ 0.2679 ] --iv 85afb5bc4594e0be4de17d6b [ 0.2680 ] --aad 4d4231429030040000000050000000500104010000000000000000000000000400000000000000000000000000000000014f109d7dd5ea58665c2074e4d563d20000000085afb5bc4594e0be4de17d6b [ 0.2825 ] Sha saved in mb1_t234_prod_aligned_sigheader_tmp0_encrypt.sha [ 0.2851 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_mb1 mb1_bootloader mb1_t234_prod_aligned_sigheader_encrypt.bin [ 0.2868 ] INFO: updated file for successfully [ 0.2891 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_mb1 mb1_bootloader mb1_t234_prod_aligned_sigheader_encrypt.bin [ 0.2909 ] INFO: updated file for successfully [ 0.2928 ] tegrasign_v3.py --file mb1_t234_prod_aligned_sigheader.bin --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=mb1_t234_prod_aligned_sigheader_kdf.yaml [ 0.2943 ] Perform key derivation on mb1_t234_prod_aligned_sigheader.bin [ 0.3226 ] Key Size is 32 bytes [ 0.3246 ] Performing aes-gcm encryption [ 0.3255 ] --key e783ad7e324635722015ad687829f47ce14c5b1aeee150ed2c89a2e8b6a48c3a [ 0.3261 ] --iv 498c6da7c0def4cfaf7ccd61 [ 0.3263 ] --aad 4d42314290300400000000500000005001040100000000000000000000000004000000000000000000000000000000001ffc9b03d632302cf44d804f7d98d63200000000498c6da7c0def4cfaf7ccd61 [ 0.3437 ] Sha saved in mb1_t234_prod_aligned_sigheader_tmp0_encrypt.sha [ 0.3459 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_mb1 mb1_bootloader mb1_t234_prod_aligned_sigheader_encrypt.bin [ 0.3477 ] INFO: updated file for successfully [ 0.3499 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_mb1 mb1_bootloader mb1_t234_prod_aligned_sigheader_encrypt.bin [ 0.3515 ] INFO: updated file for successfully [ 0.3534 ] tegrasign_v3.py --file psc_bl1_t234_prod_aligned_sigheader.bin --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=psc_bl1_t234_prod_aligned_sigheader_kdf.yaml [ 0.3547 ] Perform key derivation on psc_bl1_t234_prod_aligned_sigheader.bin [ 0.3829 ] Key Size is 32 bytes [ 0.3849 ] Performing aes-gcm encryption [ 0.3855 ] --key 6a410559ab158c0e83a73472632ead29675370514c2f11978ba9885963eb5faf [ 0.3860 ] --iv 4159f1a03c1abf06aa03bc41 [ 0.3862 ] --aad 5053434200000200000012000004120008020200000000000000000000000004000000000000000000000000000000008df81e9bbef837d9a9c665398a066b11000000004159f1a03c1abf06aa03bc41 [ 0.3967 ] Sha saved in psc_bl1_t234_prod_aligned_sigheader_tmp0_encrypt.sha [ 0.3987 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_psc_bl1 psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin [ 0.4005 ] INFO: updated file for successfully [ 0.4031 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_psc_bl1 psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin [ 0.4052 ] INFO: updated file for successfully [ 0.4072 ] tegrasign_v3.py --file mb2_t234_sigheader.bin --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=mb2_t234_sigheader_kdf.yaml [ 0.4089 ] Perform key derivation on mb2_t234_sigheader.bin [ 0.4439 ] Key Size is 32 bytes [ 0.4460 ] Performing aes-gcm encryption [ 0.4467 ] --key 758b0b69e6e88d448030f8138cee1cecf88d6c4cae6d4505bc24c5d85f49dd8a [ 0.4472 ] --iv d74a6c086090e2ca5f20b7ad [ 0.4475 ] --aad 4d423242c0eb0500000000000000000000000000000000000000000000000004000000000000000000000000000000002ded35eb488ce77304331cd06485968800000000d74a6c086090e2ca5f20b7ad [ 0.4666 ] Sha saved in mb2_t234_sigheader_tmp0_encrypt.sha [ 0.4706 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_mb2 mb2_bootloader mb2_t234_sigheader_encrypt.bin [ 0.4729 ] INFO: updated file for successfully [ 0.4756 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_mb2 mb2_bootloader mb2_t234_sigheader_encrypt.bin [ 0.4777 ] INFO: updated file for successfully [ 0.4795 ] tegrasign_v3.py --file psc_bl1_t234_prod_aligned_sigheader.bin --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=psc_bl1_t234_prod_aligned_sigheader_kdf.yaml [ 0.4804 ] Perform key derivation on psc_bl1_t234_prod_aligned_sigheader.bin [ 0.5110 ] Key Size is 32 bytes [ 0.5129 ] Performing aes-gcm encryption [ 0.5134 ] --key 32f7bd8cd08cdcb85ce512782269c6b797c286ced27742acbbeba08bbfcaea65 [ 0.5136 ] --iv 7b0ca9eb433ffd74fdb1b897 [ 0.5138 ] --aad 5053434200000200000012000004120008020200000000000000000000000004000000000000000000000000000000002dc772e6e83b86f4638eb596a4b95950000000007b0ca9eb433ffd74fdb1b897 [ 0.5232 ] Sha saved in psc_bl1_t234_prod_aligned_sigheader_tmp0_encrypt.sha [ 0.5253 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_psc_bl1 psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin [ 0.5272 ] INFO: updated file for successfully [ 0.5300 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_psc_bl1 psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin [ 0.5320 ] INFO: updated file for successfully [ 0.5339 ] tegrasign_v3.py --file mb2_t234_sigheader.bin --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=mb2_t234_sigheader_kdf.yaml [ 0.5356 ] Perform key derivation on mb2_t234_sigheader.bin [ 0.5637 ] Key Size is 32 bytes [ 0.5660 ] Performing aes-gcm encryption [ 0.5669 ] --key 40bbd80660c202afb301991c0bc1b6b643700286cf837a8cbd6557774315d0b3 [ 0.5675 ] --iv 0c6669450804f2c2ceae68c0 [ 0.5678 ] --aad 4d423242c0eb0500000000000000000000000000000000000000000000000004000000000000000000000000000000007c9f92b57001421339d2961715895400000000000c6669450804f2c2ceae68c0 [ 0.5877 ] Sha saved in mb2_t234_sigheader_tmp0_encrypt.sha [ 0.5908 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_mb2 mb2_bootloader mb2_t234_sigheader_encrypt.bin [ 0.5929 ] INFO: updated file for successfully [ 0.5953 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_mb2 mb2_bootloader mb2_t234_sigheader_encrypt.bin [ 0.5970 ] INFO: updated file for successfully [ 0.5990 ] tegrasign_v3.py --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/rsa_priv.pem --list images_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.6009 ] Key size is 384 bytes [ 0.8102 ] Saving pkc public key in pub_key.key [ 0.8091 ] Parsing dev params for multi chains [ 0.8218 ] Generating br-bct [ 0.8238 ] Updating dev and MSS params in BR BCT [ 0.8240 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0 [ 0.8264 ] Updating bl info [ 0.8284 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml [ 0.8302 ] WARNING: boot chain is not completed. set to 0 [ 0.8319 ] Perform encryption on bct [ 0.8334 ] tegrasign_v3.py --file br_bct_BR.bct --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=br_bct_BR_kdf.yaml [ 0.8345 ] Perform key derivation on br_bct_BR.bct [ 0.8360 ] ERROR: 0[ 0.8643 ] Key Size is 32 bytes [ 0.8657 ] Performing aes-gcm encryption [ 0.8663 ] --key 729c2286a75eaddfc6d582ee18a8a646af19063e8b2d98b4ee62874f936de999 [ 0.8665 ] --iv 094352fce6c34384599b0128 [ 0.8665 ] --aad aab426701d90dcc6620c38a60115e38342435442c40b1f170000000000000000000000000000000000000000094352fce6c34384599b0128 [ 0.8691 ] Sha saved in br_bct_BR_tmp_encrypt.sha [ 0.8685 ] Get Signed section of bct [ 0.8700 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml [ 0.8720 ] Signing BCT [ 0.8734 ] tegrasign_v3.py --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/rsa_priv.pem --list bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.8755 ] Key size is 384 bytes [ 0.9090 ] Saving pkc public key in pub_key.key [ 0.9078 ] Updating BCT with signature [ 0.9098 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key [ 0.9119 ] Offset :4608 Len :3584 [ 0.9129 ] Generating SHA2 Hash [ 0.9143 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512 [ 0.9145 ] Assuming zero filled SBK key [ 0.9146 ] Assuming zero filled SBK key [ 0.9201 ] Sha saved in br_bct_BR.sha [ 0.9193 ] Updating BCT with SHA2 Hash [ 0.9210 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml [ 0.9227 ] Offset :4608 Len :3584 [ 0.9232 ] Offset :68 Len :8124 [ 0.9235 ] Generating coldboot mb1-bct [ 0.9257 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin [ 0.9276 ] MB1-BCT version: 0.13 [ 0.9293 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 0.9296 ] Added Platform Config 9 data with size :- 100 [ 0.9297 ] [ 0.9297 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb [ 0.9297 ] [ 0.9298 ] Updating mb1-bct with firmware information [ 0.9317 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin [ 0.9339 ] mb1_cold_boot_bct_MB1.bct [ 0.9340 ] Encrypting and signing mb1_cold_boot_bct_MB1.bct [ 0.9340 ] header_magic: 4d423142 [ 0.9361 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct [ 0.9383 ] Generating SHA2 Hash for mb1bct [ 0.9427 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha [ 0.9455 ] Sha saved in mb1_cold_boot_bct_MB1.sha [ 0.9465 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct oem-rsa --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin [ 0.9486 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct [ 0.9514 ] tegrasign_v3.py --file mb1_cold_boot_bct_MB1_aligned_sigheader.bct --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=mb1_cold_boot_bct_MB1_aligned_sigheader_kdf.yaml [ 0.9529 ] Perform key derivation on mb1_cold_boot_bct_MB1_aligned_sigheader.bct [ 0.9819 ] Key Size is 32 bytes [ 0.9838 ] Performing aes-gcm encryption [ 0.9843 ] --key 147f3dcad4779c7de2251f00f4f79ad78f0987eb8106b4a61279c1ae06718957 [ 0.9847 ] --iv 63a1c9339c6b0a7acdae3c89 [ 0.9848 ] --aad 4d4243544016000000000000000000000000000000000000000000000000000400000000000000000000000000000000d34eede227514d7d37a4238d7ad4303f0000000063a1c9339c6b0a7acdae3c89 [ 0.9878 ] Sha saved in mb1_cold_boot_bct_MB1_aligned_sigheader_tmp0_encrypt.sha [ 0.9887 ] tegrasign_v3.py --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/rsa_priv.pem --list mb1_cold_boot_bct_MB1_aligned_sigheader_encrypt.bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.9905 ] Key size is 384 bytes [ 1.0263 ] Saving pkc public key in pub_key.key [ 1.0265 ] tegrahost_v2 --chip 0x23 0 --pubkeyhash pub_key.key --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader_encrypt.bct.signed mb1_cold_boot_bct_MB1_aligned_sigheader_encrypt.bct.sig oem-rsa [ 1.0299 ] Generating recovery mb1-bct [ 1.0320 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin [ 1.0341 ] MB1-BCT version: 0.13 [ 1.0367 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 1.0370 ] Added Platform Config 9 data with size :- 100 [ 1.0372 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb [ 1.0374 ] Updating mb1-bct with firmware information [ 1.0391 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo readinfo_t234_min_prod.xml.bin [ 1.0412 ] mb1_bct_MB1.bct [ 1.0412 ] Encrypting and signing mb1_bct_MB1.bct [ 1.0413 ] header_magic: 4d423142 [ 1.0429 ] tegrahost_v2 --chip 0x23 0 --align mb1_bct_MB1_aligned.bct [ 1.0450 ] Generating SHA2 Hash for mb1bct [ 1.0490 ] Sha saved in mb1_bct_MB1_aligned.sha [ 1.0510 ] Sha saved in mb1_bct_MB1.sha [ 1.0517 ] tegrahost_v2 --appendsigheader mb1_bct_MB1_aligned.bct oem-rsa --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin [ 1.0536 ] adding BCH for mb1_bct_MB1_aligned.bct [ 1.0562 ] tegrasign_v3.py --file mb1_bct_MB1_aligned_sigheader.bct --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/sbk-32.key --kdf kdf_file=mb1_bct_MB1_aligned_sigheader_kdf.yaml [ 1.0575 ] Perform key derivation on mb1_bct_MB1_aligned_sigheader.bct [ 1.0864 ] Key Size is 32 bytes [ 1.0880 ] Performing aes-gcm encryption [ 1.0884 ] --key bdd1d739fd098f5aa13fb5f71948c6dff59ac4496af80883de854cd777c3ad3c [ 1.0886 ] --iv e9746fd456e8893199102d4b [ 1.0887 ] --aad 4d4243544016000000000000000000000000000000000000000000000000000400000000000000000000000000000000bf1c2dc5c73f5abfcd1d148643362cf000000000e9746fd456e8893199102d4b [ 1.0910 ] Sha saved in mb1_bct_MB1_aligned_sigheader_tmp0_encrypt.sha [ 1.0916 ] tegrasign_v3.py --key /mnt/ssd/work/nvidia_platform/jetpack515/orin_jetpack515/Linux_for_Tegra/tools/pkc/rsa_priv.pem --list mb1_bct_MB1_aligned_sigheader_encrypt.bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 1.0930 ] Key size is 384 bytes [ 1.1209 ] Saving pkc public key in pub_key.key [ 1.1215 ] tegrahost_v2 --chip 0x23 0 --pubkeyhash pub_key.key --updatesigheader mb1_bct_MB1_aligned_sigheader_encrypt.bct.signed mb1_bct_MB1_aligned_sigheader_encrypt.bct.sig oem-rsa [ 1.1245 ] Error: Skip generating mem_bct because sdram_config is not defined [ 1.1245 ] Error: Skip generating mem_bct because sdram_config is not defined [ 1.1245 ] Copying signatures [ 1.1267 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml --pubkeyhash pub_key.key [ 1.1378 ] Boot Rom communication [ 1.1398 ] tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader_encrypt.bin.signed --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin.signed --download bct_mb1 mb1_bct_MB1_sigheader_encrypt.bct.signed [ 1.1417 ] BR_CID: 0x89012344705DD3CF8C0000000DFF02C0 [ 1.1680 ] Sending bct_br [ 1.2152 ] Sending mb1 [ 1.2159 ] ERROR: might be timeout in USB write. Error: Return value 3 Command tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader_encrypt.bin.signed --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin.signed --download bct_mb1 mb1_bct_MB1_sigheader_encrypt.bct.signed Reading board information failed.