I tried to use the command to back up the AGX Xavier system as before:
sudo ./flash.sh -r -k APP -G clone.img jetson-agx-thor-devkit nvme0n1p1
to back up the system on the current Jetson AGX Thor device, but the result of executing this command was:
Execution Result
ubuntu@dell-3650-1:~/zhongzy/r38.2.1/Linux_for_Tegra$ sudo ./flash.sh -r -k APP -G clone_20251015_1354.img jetson-agx-thor-devkit nvme0n1p1
###############################################################################
L4T BSP Information:
R38 , REVISION: 2.1
User release: 0.0
###############################################################################
Target Board Information:
Name: jetson-agx-thor-devkit, Board Family: generic, SoC: Tegra 264,
OpMode: production, Boot Authentication: NS,
Disk encryption: disabled ,
###############################################################################
copying emc_fuse_dev_params(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/BCT/tegra264-br-bct-diag-boot.dts)… done.
copying rcmbootbctcfg(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/flash_l4t_t264_bct_cfg.xml)… done.
copying sdrambctfile(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/BCT/tegra264-p3834-0008-sdram-bct-l4t.dts)… done.
copying uphy_config(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/BCT/tegra264-mb1-bct-uphy-lanes-p4071-0000.dts)… done.
copying device_config(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/BCT/tegra264-mb1-bct-device-common-l4t.dts)… done.
copying misc_config(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/BCT/tegra264-mb1-bct-misc-p3834-xxxx-p4071-0000.dts)… done.
copying pinmux_config(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/BCT/tegra264-mb1-bct-pinmux-p3834-xxxx-p4071-0000.dts)… done.
copying gpioint_config(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/BCT/tegra264-mb1-bct-gpioint-p3834-xxxx-p4071-0000.dts)… done.
copying pmic_config(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/BCT/tegra264-mb1-bct-pmic-p3834-0008-p4071-0000.dts)… done.
copying pmc_config(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/BCT/tegra264-mb1-bct-padvoltage-p3834-xxxx-p4071-0000.dts)… done.
copying deviceprod_config(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/BCT/tegra264-mb1-bct-cprod-p3834-xxxx-p4071-0000.dts)… done.
copying prod_config(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/BCT/tegra264-mb1-bct-prod-p3834-xxxx-p4071-0000.dts)… done.
copying scr_config(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/BCT/tegra264-mb2-bct-firewall-p3834-xxxx-p4071-0000.dts)… done.
copying mb2bct_cfg(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/BCT/tegra264-mb2-bct-misc-p3834-xxxx-p4071-0000.dts)… done.
copying wb0sdram(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/BCT/tegra264-p3834-0008-sdram-bct-warmboot-l4t.dts)… done.
copying bpmp_mem_config(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/BCT/tegra264-p3834-0008-sdram-dfs.dts)… done.
Updated brbct_cfg/bpmp_mem_cfg to tegra264-p3834-0008-sdram-dfs.dts in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/diag_flash_l4t_t264_bct_cfg.xml
Updated brbct_cfg/brcommand to in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/diag_flash_l4t_t264_bct_cfg.xml
Updated brbct_cfg/wb0sdram to tegra264-p3834-0008-sdram-bct-warmboot-l4t.dts in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/diag_flash_l4t_t264_bct_cfg.xml
Updated brbct_cfg/deviceprod to tegra264-mb1-bct-cprod-p3834-xxxx-p4071-0000.dts in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/diag_flash_l4t_t264_bct_cfg.xml
Updated brbct_cfg/prod to tegra264-mb1-bct-prod-p3834-xxxx-p4071-0000.dts in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/diag_flash_l4t_t264_bct_cfg.xml
Updated brbct_cfg/scr to tegra264-mb2-bct-firewall-p3834-xxxx-p4071-0000.dts in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/diag_flash_l4t_t264_bct_cfg.xml
Updated brbct_cfg/mb2bctcfg to tegra264-mb2-bct-misc-p3834-xxxx-p4071-0000.dts in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/diag_flash_l4t_t264_bct_cfg.xml
Updated brbct_cfg/uphy to tegra264-mb1-bct-uphy-lanes-p4071-0000.dts in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/diag_flash_l4t_t264_bct_cfg.xml
Updated brbct_cfg/device to tegra264-mb1-bct-device-common-l4t.dts in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/diag_flash_l4t_t264_bct_cfg.xml
Updated brbct_cfg/misc to tegra264-mb1-bct-misc-p3834-xxxx-p4071-0000.dts in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/diag_flash_l4t_t264_bct_cfg.xml
Updated brbct_cfg/pinmux to tegra264-mb1-bct-pinmux-p3834-xxxx-p4071-0000.dts in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/diag_flash_l4t_t264_bct_cfg.xml
Updated brbct_cfg/gpioint to tegra264-mb1-bct-gpioint-p3834-xxxx-p4071-0000.dts in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/diag_flash_l4t_t264_bct_cfg.xml
Updated brbct_cfg/pmic to tegra264-mb1-bct-pmic-p3834-0008-p4071-0000.dts in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/diag_flash_l4t_t264_bct_cfg.xml
Updated brbct_cfg/pmc to tegra264-mb1-bct-padvoltage-p3834-xxxx-p4071-0000.dts in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/diag_flash_l4t_t264_bct_cfg.xml
Updated brbct_cfg/dev_param to tegra264-br-bct-diag-boot.dts in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/diag_flash_l4t_t264_bct_cfg.xml
Updated brbct_cfg/sdram to tegra264-p3834-0008-sdram-bct-l4t.dts in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/diag_flash_l4t_t264_bct_cfg.xml
Existing emcfuse(/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/fuse_t264.xml) reused.
./tegraflash.py --chip “0x26” --applet “/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/applet_t264.bin” --rcmboot_bct_cfg diag_flash_l4t_t264_bct_cfg.xml --rcmboot_pt_layout readinfo_t264_min_prod.xml --cmd “readfuses fuse_t264.bin fuse_t264.xml; dump eeprom cvm cvm.bin; dump try_custinfo custinfo_out.bin; reboot recovery”
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0167 ] Reading fuses
[ 0.0169 ] tegrasign_v3.py --key None --getmode mode.txt
[ 0.0170 ] Assuming zero filled SBK key
[ 0.0168 ] Parsing partition layout
[ 0.0174 ] tegraparser_v2 --pt readinfo_t264_min_prod.xml.tmp
[ 0.0183 ] Pre-processing config: tegra264-br-bct-diag-boot.dts
[ 0.0183 ] Bct flags: MEM_BCT
[ 0.0224 ] Pre-processing config: tegra264-p3834-0008-sdram-bct-l4t.dts
[ 0.0224 ] Bct flags: MEM_BCT
[ 0.8399 ] Generating br-bct
[ 0.8405 ] Updating dev and MSS params in BR BCT
[ 0.8406 ] tegrabct_v2 --dev_param tegra264-br-bct-diag-boot_cpp.dtb --sdram tegra264-p3834-0008-sdram-bct-l4t_cpp.dtb --brbct br_bct.cfg --chip 0x26 0
[ 0.8411 ] Field: SecureDebugControlEcid value: 0x0
[ 0.8413 ] Field: SecureDebugControlNoneEcid value: 0x0
[ 0.8413 ] Field: preprod_dev_sign value: 0x0
[ 0.8414 ] File br_bct.cfg saved.
[ 1.0132 ] Generating mb1-bct
[ 1.0132 ] Pre-processing config: tegra264-mb1-bct-device-common-l4t.dts
[ 1.0132 ] Bct flags: MEM_BCT
[ 1.0171 ] Pre-processing config: tegra264-mb1-bct-cprod-p3834-xxxx-p4071-0000.dts
[ 1.0171 ] Bct flags: MEM_BCT
[ 1.0204 ] Pre-processing config: tegra264-mb1-bct-gpioint-p3834-xxxx-p4071-0000.dts
[ 1.0204 ] Bct flags: MEM_BCT
[ 1.0242 ] Pre-processing config: tegra264-mb1-bct-misc-p3834-xxxx-p4071-0000.dts
[ 1.0242 ] Bct flags: MEM_BCT
[ 1.0329 ] Pre-processing config: tegra264-mb1-bct-pinmux-p3834-xxxx-p4071-0000.dts
[ 1.0329 ] Bct flags: MEM_BCT
[ 1.0435 ] Pre-processing config: tegra264-mb1-bct-pmic-p3834-0008-p4071-0000.dts
[ 1.0435 ] Bct flags: MEM_BCT
[ 1.0491 ] Pre-processing config: tegra264-mb1-bct-prod-p3834-xxxx-p4071-0000.dts
[ 1.0491 ] Bct flags: MEM_BCT
[ 1.0543 ] Pre-processing config: tegra264-mb1-bct-uphy-lanes-p4071-0000.dts
[ 1.0544 ] Bct flags: MEM_BCT
[ 1.0602 ] Pre-processing config: tegra264-p3834-0008-sdram-bct-warmboot-l4t.dts
[ 1.0603 ] Bct flags: MEM_BCT
[ 1.8968 ] Pre-processing config: tegra264-mb1-bct-padvoltage-p3834-xxxx-p4071-0000.dts
[ 1.8968 ] Bct flags: MEM_BCT
[ 1.9011 ] tegrabct_v2 --chip 0x26 0 --mb1bct mb1_bct.cfg --misc tegra264-mb1-bct-misc-p3834-xxxx-p4071-0000_cpp.dtb --wb0sdram tegra264-p3834-0008-sdram-bct-warmboot-l4t_cpp.dtb --pinmux tegra264-mb1-bct-pinmux-p3834-xxxx-p4071-0000_cpp.dtb --pmc tegra264-mb1-bct-padvoltage-p3834-xxxx-p4071-0000_cpp.dtb --pmic tegra264-mb1-bct-pmic-p3834-0008-p4071-0000_cpp.dtb --prod tegra264-mb1-bct-prod-p3834-xxxx-p4071-0000_cpp.dtb --gpioint tegra264-mb1-bct-gpioint-p3834-xxxx-p4071-0000_cpp.dtb --uphy tegra264-mb1-bct-uphy-lanes-p4071-0000_cpp.dtb --device tegra264-mb1-bct-device-common-l4t_cpp.dtb --deviceprod tegra264-mb1-bct-cprod-p3834-xxxx-p4071-0000_cpp.dtb
[ 1.9016 ] MB1-BCT version: 0.2
[ 1.9017 ] /mb1_bct/fmon/fsi_threshold_low: 3756
[ 1.9018 ] /mb1_bct/fmon/fsi_threshold_high: 4244
[ 1.9019 ] /mb1_bct/vmon/vdd_soc/soc_vmon_config@0/: [0].sku_info 0
[ 1.9020 ] /mb1_bct/vmon/vdd_soc/soc_vmon_config@0/: [0].vmin_threshold 15
[ 1.9021 ] /mb1_bct/vmon/vdd_soc/soc_vmon_config@0/: [0].vmax_threshold 114
[ 1.9022 ] /mb1_bct/vmon/vdd_soc/soc_vmon_config@1/: [1].sku_info 163
[ 1.9023 ] /mb1_bct/vmon/vdd_soc/soc_vmon_config@1/: [1].vmin_threshold 21
[ 1.9025 ] /mb1_bct/vmon/vdd_soc/soc_vmon_config@1/: [1].vmax_threshold 114
[ 1.9026 ] /mb1_bct/vmon/vdd_soc/soc_vmon_config@2/: [2].sku_info 160
[ 1.9027 ] /mb1_bct/vmon/vdd_soc/soc_vmon_config@2/: [2].vmin_threshold 21
[ 1.9028 ] /mb1_bct/vmon/vdd_soc/soc_vmon_config@2/: [2].vmax_threshold 114
[ 1.9030 ] /mb1_bct/vmon/vdd_soc/soc_vmon_config@3/: [3].sku_info 224
[ 1.9031 ] /mb1_bct/vmon/vdd_soc/soc_vmon_config@3/: [3].vmin_threshold 13
[ 1.9032 ] /mb1_bct/vmon/vdd_soc/soc_vmon_config@3/: [3].vmax_threshold 117
[ 1.9034 ] /mb1_bct/vmon/vdd_soc/soc_vmon_config@4/: [4].sku_info 226
[ 1.9035 ] /mb1_bct/vmon/vdd_soc/soc_vmon_config@4/: [4].vmin_threshold 21
[ 1.9037 ] /mb1_bct/vmon/vdd_soc/soc_vmon_config@4/: [4].vmax_threshold 114
[ 1.9038 ] /mb1_bct/vmon/vdd_mss/mss_vmon_config@0/: [0].sku_info 0
[ 1.9039 ] /mb1_bct/vmon/vdd_mss/mss_vmon_config@0/: [0].vmin_threshold 15
[ 1.9040 ] /mb1_bct/vmon/vdd_mss/mss_vmon_config@0/: [0].vmax_threshold 114
[ 1.9042 ] /mb1_bct/vmon/vdd_mss/mss_vmon_config@1/: [1].sku_info 163
[ 1.9043 ] /mb1_bct/vmon/vdd_mss/mss_vmon_config@1/: [1].vmin_threshold 21
[ 1.9044 ] /mb1_bct/vmon/vdd_mss/mss_vmon_config@1/: [1].vmax_threshold 114
[ 1.9045 ] /mb1_bct/vmon/vdd_mss/mss_vmon_config@2/: [2].sku_info 160
[ 1.9046 ] /mb1_bct/vmon/vdd_mss/mss_vmon_config@2/: [2].vmin_threshold 21
[ 1.9048 ] /mb1_bct/vmon/vdd_mss/mss_vmon_config@2/: [2].vmax_threshold 114
[ 1.9049 ] /mb1_bct/vmon/vdd_mss/mss_vmon_config@3/: [3].sku_info 224
[ 1.9050 ] /mb1_bct/vmon/vdd_mss/mss_vmon_config@3/: [3].vmin_threshold 13
[ 1.9051 ] /mb1_bct/vmon/vdd_mss/mss_vmon_config@3/: [3].vmax_threshold 116
[ 1.9053 ] /mb1_bct/vmon/vdd_mss/mss_vmon_config@4/: [4].sku_info 226
[ 1.9054 ] /mb1_bct/vmon/vdd_mss/mss_vmon_config@4/: [4].vmin_threshold 21
[ 1.9055 ] /mb1_bct/vmon/vdd_mss/mss_vmon_config@4/: [4].vmax_threshold 114
[ 1.9056 ] /mb1_bct/vmon/vdd_cpu/cpu_vmon_config@0/: [0].sku_info 0
[ 1.9057 ] /mb1_bct/vmon/vdd_cpu/cpu_vmon_config@0/: [0].vmin_threshold 14
[ 1.9057 ] /mb1_bct/vmon/vdd_cpu/cpu_vmon_config@0/: [0].vmax_threshold 114
[ 1.9057 ] /mb1_bct/vmon/vdd_cpu/cpu_vmon_config@1/: [1].sku_info 163
[ 1.9057 ] /mb1_bct/vmon/vdd_cpu/cpu_vmon_config@1/: [1].vmin_threshold 19
[ 1.9057 ] /mb1_bct/vmon/vdd_cpu/cpu_vmon_config@1/: [1].vmax_threshold 114
[ 1.9057 ] /mb1_bct/vmon/vdd_cpu/cpu_vmon_config@2/: [2].sku_info 160
[ 1.9057 ] /mb1_bct/vmon/vdd_cpu/cpu_vmon_config@2/: [2].vmin_threshold 19
[ 1.9057 ] /mb1_bct/vmon/vdd_cpu/cpu_vmon_config@2/: [2].vmax_threshold 114
[ 1.9057 ] /mb1_bct/vmon/vdd_cpu/cpu_vmon_config@3/: [3].sku_info 224
[ 1.9057 ] /mb1_bct/vmon/vdd_cpu/cpu_vmon_config@3/: [3].vmin_threshold 13
[ 1.9057 ] /mb1_bct/vmon/vdd_cpu/cpu_vmon_config@3/: [3].vmax_threshold 117
[ 1.9057 ] /mb1_bct/vmon/vdd_cpu/cpu_vmon_config@4/: [4].sku_info 226
[ 1.9057 ] /mb1_bct/vmon/vdd_cpu/cpu_vmon_config@4/: [4].vmin_threshold 19
[ 1.9057 ] /mb1_bct/vmon/vdd_cpu/cpu_vmon_config@4/: [4].vmax_threshold 114
[ 1.9057 ] /mb1_bct/vmon/vdd_fsi/fsi_vmon_config@0/: [0].sku_info 0
[ 1.9057 ] /mb1_bct/vmon/vdd_fsi/fsi_vmon_config@0/: [0].vmin_threshold 53
[ 1.9057 ] /mb1_bct/vmon/vdd_fsi/fsi_vmon_config@0/: [0].vmax_threshold 73
[ 1.9057 ] /mb1_bct/vmon/vdd_fsi/fsi_vmon_config@1/: [1].sku_info 163
[ 1.9057 ] /mb1_bct/vmon/vdd_fsi/fsi_vmon_config@1/: [1].vmin_threshold 52
[ 1.9057 ] /mb1_bct/vmon/vdd_fsi/fsi_vmon_config@1/: [1].vmax_threshold 74
[ 1.9057 ] /mb1_bct/vmon/vdd_fsi/fsi_vmon_config@2/: [2].sku_info 160
[ 1.9057 ] /mb1_bct/vmon/vdd_fsi/fsi_vmon_config@2/: [2].vmin_threshold 52
[ 1.9057 ] /mb1_bct/vmon/vdd_fsi/fsi_vmon_config@2/: [2].vmax_threshold 74
[ 1.9057 ] /mb1_bct/vmon/vdd_fsi/fsi_vmon_config@3/: [3].sku_info 224
[ 1.9057 ] /mb1_bct/vmon/vdd_fsi/fsi_vmon_config@3/: [3].vmin_threshold 44
[ 1.9057 ] /mb1_bct/vmon/vdd_fsi/fsi_vmon_config@3/: [3].vmax_threshold 106
[ 1.9057 ] /mb1_bct/vmon/vdd_fsi/fsi_vmon_config@4/: [4].sku_info 226
[ 1.9057 ] /mb1_bct/vmon/vdd_fsi/fsi_vmon_config@4/: [4].vmin_threshold 52
[ 1.9057 ] /mb1_bct/vmon/vdd_fsi/fsi_vmon_config@4/: [4].vmax_threshold 74
[ 1.9057 ] /mb1_bct/vmon/vdd_gpu/gpu_vmon_config@0/: [0].sku_info 0
[ 1.9057 ] /mb1_bct/vmon/vdd_gpu/gpu_vmon_config@0/: [0].vmin_threshold 18
[ 1.9057 ] /mb1_bct/vmon/vdd_gpu/gpu_vmon_config@0/: [0].vmax_threshold 127
[ 1.9057 ] /mb1_bct/vmon/vdd_gpu/gpu_vmon_config@1/: [1].sku_info 163
[ 1.9057 ] /mb1_bct/vmon/vdd_gpu/gpu_vmon_config@1/: [1].vmin_threshold 24
[ 1.9057 ] /mb1_bct/vmon/vdd_gpu/gpu_vmon_config@1/: [1].vmax_threshold 127
[ 1.9057 ] /mb1_bct/vmon/vdd_gpu/gpu_vmon_config@2/: [2].sku_info 160
[ 1.9057 ] /mb1_bct/vmon/vdd_gpu/gpu_vmon_config@2/: [2].vmin_threshold 24
[ 1.9057 ] /mb1_bct/vmon/vdd_gpu/gpu_vmon_config@2/: [2].vmax_threshold 127
[ 1.9057 ] /mb1_bct/vmon/vdd_gpu/gpu_vmon_config@3/: [3].sku_info 224
[ 1.9057 ] /mb1_bct/vmon/vdd_gpu/gpu_vmon_config@3/: [3].vmin_threshold 13
[ 1.9057 ] /mb1_bct/vmon/vdd_gpu/gpu_vmon_config@3/: [3].vmax_threshold 127
[ 1.9057 ] /mb1_bct/vmon/vdd_gpu/gpu_vmon_config@4/: [4].sku_info 226
[ 1.9058 ] /mb1_bct/vmon/vdd_gpu/gpu_vmon_config@4/: [4].vmin_threshold 24
[ 1.9058 ] /mb1_bct/vmon/vdd_gpu/gpu_vmon_config@4/: [4].vmax_threshold 127
[ 1.9058 ] ERROR: disable_die0_igpufw_boot is not supported
[ 1.9058 ] ERROR: disable_die1_igpufw_boot is not supported
[ 1.9058 ]
[ 1.9058 ] Parsing config file :tegra264-mb1-bct-pinmux-p3834-xxxx-p4071-0000_cpp.dtb
[ 1.9058 ]
[ 1.9058 ] Parsing config file :tegra264-mb1-bct-padvoltage-p3834-xxxx-p4071-0000_cpp.dtb
[ 1.9058 ]
[ 1.9058 ] Parsing config file :tegra264-mb1-bct-pmic-p3834-0008-p4071-0000_cpp.dtb
[ 1.9058 ]
[ 1.9058 ] Parsing config file :tegra264-mb1-bct-prod-p3834-xxxx-p4071-0000_cpp.dtb
[ 1.9058 ]
[ 1.9058 ] Parsing config file :tegra264-mb1-bct-gpioint-p3834-xxxx-p4071-0000_cpp.dtb
[ 1.9058 ]
[ 1.9058 ] Parsing config file :tegra264-mb1-bct-uphy-lanes-p4071-0000_cpp.dtb
[ 1.9058 ]
[ 1.9058 ] Parsing config file :tegra264-mb1-bct-device-common-l4t_cpp.dtb
[ 1.9058 ] WARNING: unsupported node <boot_device>
[ 1.9058 ]
[ 1.9058 ] Parsing config file :tegra264-mb1-bct-cprod-p3834-xxxx-p4071-0000_cpp.dtb
[ 1.9058 ] Setting MB1 bct size to 38144
[ 1.9058 ]
[ 1.9058 ] Updating mb1-bct with firmware information
[ 1.9063 ] tegrabct_v2 --chip 0x26 0 --mb1bct mb1_bct_MB1.bct --updatefwinfo readinfo_t264_min_prod.xml.bin
[ 1.9069 ] Setting MB1 bct size to 38144
[ 1.9070 ] Setting MB1 bct size to 38144
[ 1.9073 ] Updating mb1-bct with storage device information
[ 1.9078 ] tegrabct_v2 --chip 0x26 0 --mb1bct mb1_bct_MB1.bct --updatestorageinfo readinfo_t264_min_prod.xml.bin
[ 1.9083 ] Setting MB1 bct size to 38144
[ 1.9084 ] Saving MB1 BCT file as mb1_bct_MB1.bct with suffix (null)
[ 1.9085 ] Setting MB1 bct size to 38144
[ 1.9085 ]
[ 1.9091 ] tegrahost_v2 --chip 0x26 0 --align mb1_bct_MB1_aligned.bct
[ 1.9102 ] tegrahost_v2 --chip 0x26 0 --magicid MBCT --appendsigheader mb1_bct_MB1_aligned.bct zerosbk
[ 1.9107 ] adding BCH for mb1_bct_MB1_aligned.bct
[ 1.9120 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 1.9122 ] Assuming zero filled SBK key
[ 1.9133 ] Warning: pub_key.key is not found
[ 1.9136 ] tegrahost_v2 --chip 0x26 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk
[ 1.9150 ] Generating mem-bct
[ 1.9155 ] tegrabct_v2 --chip 0x26 0 --sdram tegra264-p3834-0008-sdram-bct-l4t_cpp.dtb --wb0sdram tegra264-p3834-0008-sdram-bct-warmboot-l4t_cpp.dtb --membct tegra264-p3834-0008-sdram-bct-l4t_cpp_1.bct tegra264-p3834-0008-sdram-bct-l4t_cpp_2.bct tegra264-p3834-0008-sdram-bct-l4t_cpp_3.bct tegra264-p3834-0008-sdram-bct-l4t_cpp_4.bct tegra264-p3834-0008-sdram-bct-l4t_cpp_5.bct tegra264-p3834-0008-sdram-bct-l4t_cpp_6.bct tegra264-p3834-0008-sdram-bct-l4t_cpp_7.bct tegra264-p3834-0008-sdram-bct-l4t_cpp_8.bct
[ 1.9160 ] packing sdram params with Wb0 file tegra264-p3834-0008-sdram-bct-warmboot-l4t_cpp.dtb
[ 2.0936 ] Packing sdram param for instance[0]
[ 2.0937 ] Packing sdram param for instance[1]
[ 2.0938 ] Packing sdram param for instance[2]
[ 2.0939 ] Packing sdram param for instance[3]
[ 2.0939 ] Packing sdram param for instance[4]
[ 2.0940 ] Packing sdram param for instance[5]
[ 2.0941 ] Packing sdram param for instance[6]
[ 2.0941 ] Packing sdram param for instance[7]
[ 2.0942 ] Packing sdram param for instance[8]
[ 2.0943 ] Packing sdram param for instance[9]
[ 2.0944 ] Packing sdram param for instance[10]
[ 2.0944 ] Packing sdram param for instance[11]
[ 2.0945 ] Packing sdram param for instance[12]
[ 2.0946 ] Packing sdram param for instance[13]
[ 2.0947 ] Packing sdram param for instance[14]
[ 2.0947 ] Packing sdram param for instance[15]
[ 2.2754 ] Reading ramcode from /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/chip_info.bin_bak file
[ 2.2754 ] RAMCODE Read from Device: c
[ 2.2754 ] Using ramcode 12
[ 2.2761 ] tegrahost_v2 --chip 0x26 0 --align membct_6_aligned.bct
[ 2.2772 ] tegrahost_v2 --chip 0x26 0 --magicid MEM6 --appendsigheader membct_6_aligned.bct zerosbk
[ 2.2777 ] adding BCH for membct_6_aligned.bct
[ 2.2791 ] tegrasign_v3.py --key None --list membct_6_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 2.2792 ] Assuming zero filled SBK key
[ 2.2804 ] Warning: pub_key.key is not found
[ 2.2807 ] tegrahost_v2 --chip 0x26 0 --updatesigheader membct_6_aligned_sigheader.bct.encrypt membct_6_aligned_sigheader.bct.hash zerosbk
[ 2.2822 ] tegrahost_v2 --chip 0x26 0 --align membct_0_aligned.bct
[ 2.2835 ] tegrahost_v2 --chip 0x26 0 --magicid MEM0 --appendsigheader membct_0_aligned.bct zerosbk
[ 2.2839 ] adding BCH for membct_0_aligned.bct
[ 2.2852 ] tegrasign_v3.py --key None --list membct_0_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 2.2854 ] Assuming zero filled SBK key
[ 2.2865 ] Warning: pub_key.key is not found
[ 2.2869 ] tegrahost_v2 --chip 0x26 0 --updatesigheader membct_0_aligned_sigheader.bct.encrypt membct_0_aligned_sigheader.bct.hash zerosbk
[ 2.2886 ] tegrahost_v2 --chip 0x26 0 --align membct_1_aligned.bct
[ 2.2895 ] tegrahost_v2 --chip 0x26 0 --magicid MEM1 --appendsigheader membct_1_aligned.bct zerosbk
[ 2.2900 ] adding BCH for membct_1_aligned.bct
[ 2.2914 ] tegrasign_v3.py --key None --list membct_1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 2.2915 ] Assuming zero filled SBK key
[ 2.2926 ] Warning: pub_key.key is not found
[ 2.2929 ] tegrahost_v2 --chip 0x26 0 --updatesigheader membct_1_aligned_sigheader.bct.encrypt membct_1_aligned_sigheader.bct.hash zerosbk
[ 2.2943 ] tegrahost_v2 --chip 0x26 0 --align membct_2_aligned.bct
[ 2.2954 ] tegrahost_v2 --chip 0x26 0 --magicid MEM2 --appendsigheader membct_2_aligned.bct zerosbk
[ 2.2960 ] adding BCH for membct_2_aligned.bct
[ 2.2977 ] tegrasign_v3.py --key None --list membct_2_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 2.2978 ] Assuming zero filled SBK key
[ 2.2992 ] Warning: pub_key.key is not found
[ 2.2997 ] tegrahost_v2 --chip 0x26 0 --updatesigheader membct_2_aligned_sigheader.bct.encrypt membct_2_aligned_sigheader.bct.hash zerosbk
[ 2.3015 ] tegrahost_v2 --chip 0x26 0 --align membct_3_aligned.bct
[ 2.3027 ] tegrahost_v2 --chip 0x26 0 --magicid MEM3 --appendsigheader membct_3_aligned.bct zerosbk
[ 2.3033 ] adding BCH for membct_3_aligned.bct
[ 2.3048 ] tegrasign_v3.py --key None --list membct_3_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 2.3049 ] Assuming zero filled SBK key
[ 2.3062 ] Warning: pub_key.key is not found
[ 2.3066 ] tegrahost_v2 --chip 0x26 0 --updatesigheader membct_3_aligned_sigheader.bct.encrypt membct_3_aligned_sigheader.bct.hash zerosbk
[ 2.3081 ] tegrahost_v2 --chip 0x26 0 --align membct_4_aligned.bct
[ 2.3091 ] tegrahost_v2 --chip 0x26 0 --magicid MEM4 --appendsigheader membct_4_aligned.bct zerosbk
[ 2.3096 ] adding BCH for membct_4_aligned.bct
[ 2.3110 ] tegrasign_v3.py --key None --list membct_4_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 2.3111 ] Assuming zero filled SBK key
[ 2.3121 ] Warning: pub_key.key is not found
[ 2.3125 ] tegrahost_v2 --chip 0x26 0 --updatesigheader membct_4_aligned_sigheader.bct.encrypt membct_4_aligned_sigheader.bct.hash zerosbk
[ 2.3139 ] tegrahost_v2 --chip 0x26 0 --align membct_5_aligned.bct
[ 2.3149 ] tegrahost_v2 --chip 0x26 0 --magicid MEM5 --appendsigheader membct_5_aligned.bct zerosbk
[ 2.3154 ] adding BCH for membct_5_aligned.bct
[ 2.3167 ] tegrasign_v3.py --key None --list membct_5_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 2.3168 ] Assuming zero filled SBK key
[ 2.3180 ] Warning: pub_key.key is not found
[ 2.3183 ] tegrahost_v2 --chip 0x26 0 --updatesigheader membct_5_aligned_sigheader.bct.encrypt membct_5_aligned_sigheader.bct.hash zerosbk
[ 2.3198 ] tegrahost_v2 --chip 0x26 0 --align membct_6_aligned.bct
[ 2.3207 ] tegrahost_v2 --chip 0x26 0 --magicid MEM6 --appendsigheader membct_6_aligned.bct zerosbk
[ 2.3211 ] adding BCH for membct_6_aligned.bct
[ 2.3225 ] tegrasign_v3.py --key None --list membct_6_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 2.3226 ] Assuming zero filled SBK key
[ 2.3238 ] Warning: pub_key.key is not found
[ 2.3241 ] tegrahost_v2 --chip 0x26 0 --updatesigheader membct_6_aligned_sigheader.bct.encrypt membct_6_aligned_sigheader.bct.hash zerosbk
[ 2.3255 ] tegrahost_v2 --chip 0x26 0 --align membct_7_aligned.bct
[ 2.3266 ] tegrahost_v2 --chip 0x26 0 --magicid MEM7 --appendsigheader membct_7_aligned.bct zerosbk
[ 2.3270 ] adding BCH for membct_7_aligned.bct
[ 2.3284 ] tegrasign_v3.py --key None --list membct_7_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 2.3285 ] Assuming zero filled SBK key
[ 2.3295 ] Warning: pub_key.key is not found
[ 2.3299 ] tegrahost_v2 --chip 0x26 0 --updatesigheader membct_7_aligned_sigheader.bct.encrypt membct_7_aligned_sigheader.bct.hash zerosbk
[ 2.3309 ] Pre-processing config: tegra264-mb2-bct-firewall-p3834-xxxx-p4071-0000.dts
[ 2.3309 ] Bct flags: ENABLE_DCE
[ 3.0198 ] Pre-processing config: tegra264-mb2-bct-misc-p3834-xxxx-p4071-0000.dts
[ 3.0198 ] Bct flags: ENABLE_DCE
[ 3.0290 ] Generating mb2-bct
[ 3.0290 ] tegrabct_v2 --chip 0x26 0 --mb2bct mb2_bct.cfg --mb2bctcfg tegra264-mb2-bct-misc-p3834-xxxx-p4071-0000_cpp.dtb --scr tegra264-mb2-bct-firewall-p3834-xxxx-p4071-0000_cpp.dtb
[ 3.0295 ] Field: skip_mods_sp_load, value: 1
[ 3.0297 ] Field: enable_xusb_fw, value: 1
[ 3.0297 ] Field: enable_rtid_load, value: 0
[ 3.0298 ] Field: enable_eks, value: 0
[ 3.0299 ] Field: enable_pva_fw, value: 0
[ 3.0299 ] Field: enable_tsec, value: 1
[ 3.0300 ] Field: enable_pvit, value: 0
[ 3.0300 ] Field: enable_ccplex_wdt, value: 1
[ 3.0301 ] Field: ccplex_wdt_period_sec, value: 10
[ 3.0302 ] Field: skip_failed_pkc_revoke_req, value: 1
[ 3.0303 ] Field: disable_skip_invalid_bct, value: 0
[ 3.0304 ] Field: skip_fsi_key_load, value: 1
[ 3.0304 ] Field: reset_fsi_can_controllers, value: 1
[ 3.0305 ] mc_stat_emc_filter 00: 0x00000000
[ 3.0306 ] mc_stat_emc_filter 01: 0x00000000
[ 3.0306 ] mc_stat_emc_filter 02: 0x00000000
[ 3.0307 ] mc_stat_emc_filter 03: 0x00000000
[ 3.0308 ] mc_stat_emc_filter 04: 0x00000000
[ 3.0309 ] mc_stat_emc_filter 05: 0x00000000
[ 3.0309 ] mc_stat_emc_filter 06: 0x00000000
[ 3.0310 ] mc_stat_emc_filter 07: 0x00000000
[ 3.0311 ] mc_stat_emc_filter 08: 0x00000000
[ 3.0311 ] mc_stat_emc_filter 09: 0x00000000
[ 3.0312 ] mc_stat_emc_filter 10: 0x00000000
[ 3.0313 ] mc_stat_emc_filter 11: 0x00000000
[ 3.0313 ] mc_stat_emc_filter 12: 0x00000000
[ 3.0314 ] mc_stat_emc_filter 13: 0x00000000
[ 3.0315 ] mc_stat_emc_filter 14: 0x00000000
[ 3.0315 ] mc_stat_emc_filter 15: 0x00000000
[ 3.0682 ] Updating mb2-bct with storage information
[ 3.0688 ] tegrabct_v2 --chip 0x26 0 --mb2bct mb2_bct_MB2.bct --updatestorageinfo readinfo_t264_min_prod.xml.bin
[ 3.0693 ] Saving MB2 BCT file as mb2_bct_MB2.bct with suffix (null)
[ 3.0700 ] WARNING: BPMP mem-dtb partition is not present in partition layout
[ 3.0700 ] WARNING: Skipping generation of BPMP mem dvfs binaries
[ 3.0701 ] Concatenating mb2-bct to mb2 binary
[ 3.0701 ] mb2_bin_file = mb2_t264.bin
[ 3.0701 ] mb2_bct_file = mb2_bct_MB2.bct
[ 3.0709 ] dce_bin = None
kernel_dtb_file None
[ 3.0710 ] Kernel DTB used: None
[ 3.0710 ] Parsing partition layout
[ 3.0716 ] tegraparser_v2 --pt readinfo_t264_min_prod.xml.tmp
[ 3.0722 ] Updating bl info
[ 3.0727 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x26 0 --updateblinfo readinfo_t264_min_prod.xml.bin
[ 3.0731 ] File br_bct_BR.bct saved.
[ 3.0733 ] BCH present 400384
[ 3.0734 ] StartBlock 4
[ 3.0735 ] StartPage 4
[ 3.0735 ] BCH present 400384
[ 3.0739 ] StartBlock 6
[ 3.0739 ] StartPage 4
[ 3.0739 ] BCH present 201456
[ 3.0742 ] StartBlock 8
[ 3.0742 ] StartPage 4
[ 3.0742 ] BCH present 201456
[ 3.0744 ] StartBlock 10
[ 3.0744 ] StartPage 4
[ 3.0744 ] WARNING: boot chain is not completed. set to 0
[ 3.0746 ] File br_bct_BR.bct saved.
[ 3.0746 ]
[ 3.0746 ] Creating list of images to be signed
[ 3.0751 ] tegrahost_v2 --chip 0x26 0 --partitionlayout readinfo_t264_min_prod.xml.bin --list images_list.xml zerosbk
[ 3.0756 ] MB1: Nvheader already present is mb1_t264_prod_aligned.bin
[ 3.0762 ] Header already present for mb1_t264_prod_aligned_sigheader.bin
[ 3.0765 ] MB1: Nvheader already present is mb1_t264_prod_aligned.bin
[ 3.0807 ] Header already present for mb1_t264_prod_aligned_sigheader.bin
[ 3.0809 ] MB1: Nvheader already present is psc_bl1_t264_prod_aligned.bin
[ 3.0852 ] Header already present for psc_bl1_t264_prod_aligned_sigheader.bin
[ 3.0853 ] adding BCH for mb2_t264_with_mb2_bct_MB2_aligned.bin
[ 3.0881 ] MB1: Nvheader already present is psc_bl1_t264_prod_aligned.bin
[ 3.1024 ] Header already present for psc_bl1_t264_prod_aligned_sigheader.bin
[ 3.1025 ] adding BCH for mb2_t264_with_mb2_bct_MB2_aligned.bin
[ 3.1187 ] Generating signatures
[ 3.1189 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key --sha sha512
[ 3.1191 ] Assuming zero filled SBK key
[ 3.1281 ] Warning: pub_key.key is not found
[ 3.1280 ] Updating bl info
[ 3.1285 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x26 0 --updateblinfo readinfo_t264_min_prod.xml.bin --updatesig images_list_signed.xml
[ 3.1290 ] File br_bct_BR.bct saved.
[ 3.1291 ] BCH present 400384
[ 3.1292 ] StartBlock 4
[ 3.1292 ] StartPage 4
[ 3.1293 ] BCH present 400384
[ 3.1295 ] StartBlock 6
[ 3.1295 ] StartPage 4
[ 3.1295 ] BCH present 201456
[ 3.1298 ] StartBlock 8
[ 3.1299 ] StartPage 4
[ 3.1299 ] BCH present 201456
[ 3.1299 ] StartBlock 10
[ 3.1300 ] StartPage 4
[ 3.1300 ] WARNING: boot chain is not completed. set to 0
[ 3.1302 ] File br_bct_BR.bct saved.
[ 3.1303 ] File br_bct_BR.bct saved.
[ 3.1303 ] File br_bct_BR.bct saved.
[ 3.1303 ]
[ 3.1303 ] Get Signed section of bct
[ 3.1309 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x26 0 --listbct bct_list.xml
[ 3.1314 ] File br_bct_BR.bct saved.
[ 3.1316 ] Signing BCT
[ 3.1318 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 3.1320 ] Assuming zero filled SBK key
[ 3.1320 ] Assuming zero filled SBK key
[ 3.1338 ] Sha saved in br_bct_BR.sha
[ 3.1340 ] Warning: pub_key.key is not found
[ 3.1338 ] Updating BCT with signature
[ 3.1343 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x26 0 --updatesig bct_list_signed.xml
[ 3.1348 ] File br_bct_BR.bct saved.
[ 3.1349 ] Offset :5632 Len :2560
[ 3.1350 ] File br_bct_BR.bct saved.
[ 3.1350 ] Generating SHA2 Hash
[ 3.1352 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512
[ 3.1354 ] Assuming zero filled SBK key
[ 3.1354 ] Assuming zero filled SBK key
[ 3.1372 ] Sha saved in br_bct_BR.sha
[ 3.1372 ] Updating BCT with SHA2 Hash
[ 3.1377 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x26 0 --updatesha bct_list_signed.xml
[ 3.1382 ] File br_bct_BR.bct saved.
[ 3.1383 ] Offset :5632 Len :2560
[ 3.1383 ] Offset :4 Len :8188
[ 3.1384 ] File br_bct_BR.bct saved.
[ 3.1384 ]
[ 3.1384 ] Copying signatures
[ 3.1389 ] tegrahost_v2 --chip 0x26 0 --partitionlayout readinfo_t264_min_prod.xml.bin --updatesig images_list_signed.xml
[ 3.1435 ] Boot Rom communication
[ 3.1440 ] tegrarcm_v2 --new_session --chip 0x26 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t264_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t264_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[ 3.1445 ] BR_CID: 0x80012641783DE20608000000070301C0
[ 3.1452 ] Sending bct_br
[ 3.1452 ] Sending mb1
[ 3.1459 ] Sending psc_bl1
[ 3.1690 ] Sending bct_mb1
[ 3.1800 ] Boot Rom communication completed
[ 3.1838 ] tegrahost_v2 --chip 0x26 0 --align applet_t264_aligned.bin
[ 3.1885 ] tegrahost_v2 --chip 0x26 0 --magicid MB2A --appendsigheader applet_t264_aligned.bin zerosbk
[ 3.1905 ] adding BCH for applet_t264_aligned.bin
[ 3.2000 ] tegrasign_v3.py --key None --list applet_t264_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 3.2001 ] Assuming zero filled SBK key
[ 3.2017 ] Warning: pub_key.key is not found
[ 3.2026 ] tegrahost_v2 --chip 0x26 0 --updatesigheader applet_t264_aligned_sigheader.bin.encrypt applet_t264_aligned_sigheader.bin.hash zerosbk
[ 3.2055 ] All applet flow required files are saved in applet folder
[ 3.2056 ] Sending mb2_applet…
[ 3.2067 ] tegrarcm_v2 --chip 0x26 0 --pollbl --download applet applet_t264_sigheader.bin.encrypt
[ 3.2078 ] BL: version 0.23.0.1-t264-75019003-35ec65c7 last_boot_error: 0
[ 3.3984 ] Sending applet
[ 3.7496 ] completed
[ 3.7524 ] tegrarcm_v2 --chip 0x26 0 --ismb2applet
[ 3.7548 ] MB2 Applet version 01.00.0000
[ 3.8734 ] tegrarcm_v2 --chip 0x26 0 --ismb2applet
[ 3.8758 ] MB2 Applet version 01.00.0000
[ 3.8829 ] Parsing fuse info as per xml file
[ 3.8853 ] tegraparser_v2 --chip 0x26 0 --get_fuse_names fuse_t264.xml read_fuse_names.txt
[ 3.8876 ] MagicId=0x45535546 version=0x2
[ 3.8880 ] trying to read fuse with MB2 Applet
[ 3.8908 ] tegraparser_v2 --chip 0x26 0 --read_fusetype PublicKeyHash read_fuse.bin
[ 3.8956 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 3.8978 ] MB2 Applet version 01.00.0000
[ 3.9049 ] Saved read fuses in file __fuse_read_scatter.bin
[ 3.9107 ] Fuse read successful
[ 3.9137 ] tegraparser_v2 --chip 0x26 0 --read_fusetype OptInEnable read_fuse.bin
[ 3.9148 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 3.9153 ] MB2 Applet version 01.00.0000
[ 3.9217 ] Saved read fuses in file __fuse_read_scatter.bin
[ 3.9273 ] Fuse read successful
[ 3.9307 ] tegraparser_v2 --chip 0x26 0 --read_fusetype BootSecurityInfo read_fuse.bin
[ 3.9319 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 3.9324 ] MB2 Applet version 01.00.0000
[ 3.9388 ] Saved read fuses in file __fuse_read_scatter.bin
[ 3.9444 ] Fuse read successful
[ 3.9478 ] tegraparser_v2 --chip 0x26 0 --read_fusetype ArmJtagDisable read_fuse.bin
[ 3.9490 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 3.9494 ] MB2 Applet version 01.00.0000
[ 3.9559 ] Saved read fuses in file __fuse_read_scatter.bin
[ 3.9614 ] Fuse read successful
[ 3.9648 ] tegraparser_v2 --chip 0x26 0 --read_fusetype SecurityMode read_fuse.bin
[ 3.9660 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 3.9666 ] MB2 Applet version 01.00.0000
[ 3.9731 ] Saved read fuses in file __fuse_read_scatter.bin
[ 3.9785 ] Fuse read successful
[ 3.9820 ] tegraparser_v2 --chip 0x26 0 --read_fusetype SwReserved read_fuse.bin
[ 3.9831 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 3.9837 ] MB2 Applet version 01.00.0000
[ 3.9901 ] Saved read fuses in file __fuse_read_scatter.bin
[ 3.9957 ] Fuse read successful
[ 3.9991 ] tegraparser_v2 --chip 0x26 0 --read_fusetype DebugAuthentication read_fuse.bin
[ 4.0002 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 4.0007 ] MB2 Applet version 01.00.0000
[ 4.0072 ] Saved read fuses in file __fuse_read_scatter.bin
[ 4.0127 ] Fuse read successful
[ 4.0161 ] tegraparser_v2 --chip 0x26 0 --read_fusetype OdmInfo read_fuse.bin
[ 4.0171 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 4.0176 ] MB2 Applet version 01.00.0000
[ 4.0240 ] Saved read fuses in file __fuse_read_scatter.bin
[ 4.0297 ] Fuse read successful
[ 4.0331 ] tegraparser_v2 --chip 0x26 0 --read_fusetype OdmId read_fuse.bin
[ 4.0343 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 4.0348 ] MB2 Applet version 01.00.0000
[ 4.0412 ] Saved read fuses in file __fuse_read_scatter.bin
[ 4.0467 ] Fuse read successful
[ 4.0502 ] tegraparser_v2 --chip 0x26 0 --read_fusetype OdmLock read_fuse.bin
[ 4.0513 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 4.0518 ] MB2 Applet version 01.00.0000
[ 4.0582 ] Saved read fuses in file __fuse_read_scatter.bin
[ 4.0638 ] Fuse read successful
[ 4.0672 ] tegraparser_v2 --chip 0x26 0 --read_fusetype ReservedOdm0 read_fuse.bin
[ 4.0683 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 4.0688 ] MB2 Applet version 01.00.0000
[ 4.0753 ] Saved read fuses in file __fuse_read_scatter.bin
[ 4.0808 ] Fuse read successful
[ 4.0843 ] tegraparser_v2 --chip 0x26 0 --read_fusetype ReservedOdm1 read_fuse.bin
[ 4.0854 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 4.0859 ] MB2 Applet version 01.00.0000
[ 4.0923 ] Saved read fuses in file __fuse_read_scatter.bin
[ 4.0978 ] Fuse read successful
[ 4.1012 ] tegraparser_v2 --chip 0x26 0 --read_fusetype ReservedOdm2 read_fuse.bin
[ 4.1023 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 4.1028 ] MB2 Applet version 01.00.0000
[ 4.1092 ] Saved read fuses in file __fuse_read_scatter.bin
[ 4.1148 ] Fuse read successful
[ 4.1183 ] tegraparser_v2 --chip 0x26 0 --read_fusetype ReservedOdm3 read_fuse.bin
[ 4.1194 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 4.1199 ] MB2 Applet version 01.00.0000
[ 4.1264 ] Saved read fuses in file __fuse_read_scatter.bin
[ 4.1319 ] Fuse read successful
[ 4.1353 ] tegraparser_v2 --chip 0x26 0 --read_fusetype ReservedOdm4 read_fuse.bin
[ 4.1364 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 4.1369 ] MB2 Applet version 01.00.0000
[ 4.1433 ] Saved read fuses in file __fuse_read_scatter.bin
[ 4.1488 ] Fuse read successful
[ 4.1523 ] tegraparser_v2 --chip 0x26 0 --read_fusetype ReservedOdm5 read_fuse.bin
[ 4.1533 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 4.1539 ] MB2 Applet version 01.00.0000
[ 4.1602 ] Saved read fuses in file __fuse_read_scatter.bin
[ 4.1658 ] Fuse read successful
[ 4.1692 ] tegraparser_v2 --chip 0x26 0 --read_fusetype ReservedOdm6 read_fuse.bin
[ 4.1703 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 4.1708 ] MB2 Applet version 01.00.0000
[ 4.1772 ] Saved read fuses in file __fuse_read_scatter.bin
[ 4.1828 ] Fuse read successful
[ 4.1862 ] tegraparser_v2 --chip 0x26 0 --read_fusetype ReservedOdm7 read_fuse.bin
[ 4.1873 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 4.1878 ] MB2 Applet version 01.00.0000
[ 4.1942 ] Saved read fuses in file __fuse_read_scatter.bin
[ 4.1997 ] Fuse read successful
[ 4.2032 ] tegraparser_v2 --chip 0x26 0 --read_fusetype Sku read_fuse.bin
[ 4.2043 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 4.2048 ] MB2 Applet version 01.00.0000
[ 4.2112 ] Saved read fuses in file __fuse_read_scatter.bin
[ 4.2167 ] Fuse read successful
[ 4.2201 ] tegraparser_v2 --chip 0x26 0 --read_fusetype Uid read_fuse.bin
[ 4.2212 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 4.2217 ] MB2 Applet version 01.00.0000
[ 4.2281 ] Saved read fuses in file __fuse_read_scatter.bin
[ 4.2336 ] Fuse read successful
[ 4.2371 ] tegrarcm_v2 --chip 0x26 0 --ismb2applet
[ 4.2377 ] MB2 Applet version 01.00.0000
[ 4.2446 ] tegrarcm_v2 --chip 0x26 0 --ismb2applet
[ 4.2451 ] MB2 Applet version 01.00.0000
[ 4.2520 ] Retrieving board information
[ 4.2525 ] tegrarcm_v2 --chip 0x26 0 --oem platformdetails chip chip_info.bin
[ 4.2530 ] MB2 Applet version 01.00.0000
[ 4.2595 ] Saved platform info in chip_info.bin
[ 4.2640 ] Chip minor revision: 1
[ 4.2641 ] Bootrom revision: 0x3
[ 4.2641 ] Ram code: 0xc
[ 4.2642 ] Chip sku: 0xa0
[ 4.2642 ] Chip Sample: prod
[ 4.2670 ] Retrieving boot device information
[ 4.2675 ] tegrarcm_v2 --chip 0x26 0 --oem platformdetails bootdeviceinfo bootdevice_info.bin
[ 4.2681 ] MB2 Applet version 01.00.0000
[ 4.2745 ] Saved platform info in bootdevice_info.bin
[ 4.2796 ] INFO: boot device type: 0x3
[ 4.2825 ] INFO: bootdevice_info.bin exists and the same
[ 4.2825 ] Retrieving EEPROM data
[ 4.2825 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/cvm.bin --chip 0x26 0
[ 4.2830 ] MB2 Applet version 01.00.0000
[ 4.2894 ] Saved platform info in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/cvm.bin
[ 4.3263 ] tegrarcm_v2 --chip 0x26 0 --ismb2applet
[ 4.3285 ] MB2 Applet version 01.00.0000
[ 4.3371 ] tegrarcm_v2 --chip 0x26 0 --ismb2applet
[ 4.3376 ] MB2 Applet version 01.00.0000
[ 4.3442 ] Dumping customer Info
[ 4.3445 ] Removing existing copy of /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/custinfo_out.bin
[ 4.3468 ] tegrarcm_v2 --chip 0x26 0 --oem dump bct tmp.bct
[ 4.3490 ] MB2 Applet version 01.00.0000
[ 4.3556 ] Saved bct in tmp.bct
[ 4.5354 ] tegrabct_v2 --brbct tmp.bct --chip 0x26 0 --custinfo /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/custinfo_out.bin
[ 4.5380 ] File tmp.bct saved.
[ 4.5388 ] Customer data saved in /home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/custinfo_out.bin successfully
[ 4.5390 ] Rebooting to recovery mode
[ 4.5414 ] tegrarcm_v2 --chip 0x26 0 --ismb2
[ 4.5531 ] tegrarcm_v2 --chip 0x26 0 --ismb2applet
[ 4.5553 ] MB2 Applet version 01.00.0000
[ 4.5621 ] Booting to recovery mode
[ 4.5628 ] tegrarcm_v2 --chip 0x26 0 --reboot recovery
[ 4.5634 ] MB2 Applet version 01.00.0000
Board ID(3834) version(400) sku(0008) revision(G.5) Platform ID() Board Boot Device()
RAMCODE is 12
Chip SKU(00:00:00:A0) ramcode(12) fuselevel(fuselevel_production) board_FAB(400)
Error: missing cfgfile (/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/cfg).
Usage: sudo ./flash.sh [options] generic nvme0n1p1
options:
-b <emc_bctfile> ------ use the specified emc_bct file.
-c ---------- Flash partition table config file.
-d ---------- device tree file.
-e <bpmp_file> -------- use the specified bpmp file.
-f --------- Path to flash application (tegraflash.py)
-g <bpmp_dtb_file> ---- use the specified bpmp dtb file
-h -------------------- print this message.
-i – key for disk encryption support.
-k ----- partition name or number specified in flash.cfg.
-l ------- cpu bootloader dtb file.
-m ------ MTS preboot such as mts_preboot_si.
-n --------- Static nfs network assignments
:::
-o ---------- ODM data.
-r -------------------- skip building and reuse existing system.img.
-t -------- tegraboot binary such as nvtboot.bin
-u ------ PKC key or PKC keylist used for odm fused board.
This option is also used for cpu-bootloader signing in PV key feature.
-v ------ Secure Boot Key (SBK) key used for ODM fused board.
-w ---------- warm boot binary such as nvtbootwb0.bin
-x ---------- Tegra CHIPID.
-B ---------- BoardId.
-C ---------- Kernel commandline arguments.
WARNING:
Each option in this kernel commandline gets
higher preference over the values set by
flash.sh. In case of NFS booting, this script
adds NFS booting related arguments, if -i option
is omitted.
-F ---------- Flash server such as cboot.bin.
-G -------- Read partition and save image to file.
-I ----------- initrd file. Null initrd is default.
-K ----------- Kernel image file such as zImage or Image.
-L ------- Bootloader such as cboot.bin or u-boot-dtb.bin.
-M --------- MTS boot file such as mts_si.
-N ---------- i.e. :/my/exported/nfs/rootfs.
-R ------- Sample rootfs directory.
-S ------------- Rootfs size in bytes. Valid only for internal
rootdev. KiB, MiB, GiB short hands are allowed,
for example, 1GiB means 1024 * 1024 * 1024 bytes.
-T —The number of the sectors of the external storage device.
The default value is 119537664 if this option is not set.
-U —The number of the sectors of the internal storage device.
The default value is 119537664 if this option is not set.
-Z -------------------- Print configurations and then exit.
–no-flash ------------ perform all steps except physically flashing the board.
This will create a system.img.
If combined with --rcm-boot, the command will generate rcmboot_blob.
If combined with --read-info, the command will generate readinfocmd.txt.
–external-device------ Generate flash images for external devices
–sparseupdate--------- only flash partitions that have changed. Currently only support SPI flash memory
–no-systemimg -------- Do not create or re-create system.img.
–bup ----------------- Generate bootloader update payload(BUP).
–single-image-bup Generate specified single image BUP, this must work with --bup.
–bup-type ----- Generate specific type bootloader update payload(BUP), such as bl or kernel.
–multi-spec----------- Enable support for building multi-spec BUP.
–clean-up------------- Clean up BUP buffer when multi-spec is enabled.
–usb-instance — Specify the USB instance to connect to;
= USB port path (e.g. 3-14).
–no-root-check ------- Typical usage of this script require root permissions.
Pass this option to allow running the script as a
regular user, in which case only specific combinations
of command-line options will be functional.
–uefi-keys <keys_conf> Specify UEFI keys configuration file.
–rcm-boot ------------ Do RCM boot instead of physically flashing the board.
–sign ---------------- Sign images and store them under “bootloader/signed”
directory. The board will not be physically flashed.
–image --------------- Specify the image to be written into board.
–boot-chain-flash Flash only a specific boot chain (ex. "A, “B”, “all”).
Defaults to “all”, inputs are case insensitive.
Not suitable for production.
–boot-chain-select Specify booting chain (ex. “A” or “B”) after the board is flashed.
Defaults to “A”, inputs are case insensitive.
–pv-crt -------------- The certificate for the key that is used to sign cpu_bootloader
–with-systemimg ------ Generate system images also when using -k option
–pv-enc <enc_key>----- The encryption key that is used to encrypt cpu_bootloader.
–uefi-enc <uefi_enc_key> Key file (0x19: 16-byte; 0x23: 32-byte) to encrypt UEFI payloads
–uda-dir-------------- Directory to store user data that will be encrypted in UDA partition.
–generic-passphrase – Use generic passphrase for disk encryption.
–disable-random-iv — Disable generation of random IV, SALT1, SALT2 and DERSTR.
–read-info ----------- Read and display board related info, fuse info (based on fuse_t234.xml),
and EEPROM content.
–reuse-uuid --------- Reuse uuid which is already generated first time.
–qspi-only --------- Flash QSPI device only.
–passthrough -------- Additional options to passthrough the tegraflash command
–read-ramcode ------- Generate read_ramcode script in the flashcmd.txt command script.
–gen-read-eeprom ---- Generate read_eeprom script with all signed binaries. User later can run
read_eeprom.sh from host to dump EEPROM content on a target device after
putting the target device in RCM mode. Since all binaries are signed already,
there is no key needed even the device has PKC fuse burned.
–hsm ---------------- Enable HSM for signing (and encrypting) images. This option must be used with
-u option (image signing). -v or --pv-enc is optional (image encryption).
–debug -------------- Enable debug mode, and enable ‘–keep’ option to tegraflash.py
For now, the debug mode will enable saving of unencrypted and unsigned files
for UEFI encryption/signing debugging.
–gen-systemimg-only - Generate system.img only, program then exits.
How should I resolve the problem caused by
Error: missing cfgfile (/home/ubuntu/zhongzy/r38.2.1/Linux_for_Tegra/bootloader/generic/cfg).
Did I write the command incorrectly, or does AGX Thor no longer support this operation?
