We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
We have been using the NVIDIA Jetson Carrier Boards and we have been able to create system images for distribution using this command there:
sudo ./tools/backup_restore/l4t_backup_restore.sh -b -e nvme0n1 jetson-orin-nano-devkit
However, we are now moving over to the Seed Studio J4012 and the same command in the Linux_for_Tegra
sudo ./tools/backup_restore/l4t_backup_restore.sh -b -e nvme0n1 recomputer-orin-j401 [sudo] password for kallah: Sorry, try again. [sudo] password for kallah: Please install the Secureboot package to use initrd flash for fused board # Entry added by NVIDIA initrd flash tool /home/kallah/seed_studio/Linux_for_Tegra/tools/kernel_flash/tmp 127.0.0.1(rw,nohide,insecure,no_subtree_check,async,no_root_squash) rpcbind: another rpcbind is already running. Aborting Export list for localhost: /home/kallah/seed_studio/Linux_for_Tegra/tools/kernel_flash/tmp 127.0.0.1 /home/kallah/seed_studio/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh --no-flash --initrd --showlogs recomputer-orin-j401 internal ****************************************** * * * Step 1: Generate rcm boot commandline * * * ****************************************** ROOTFS_AB= ROOTFS_ENC= /home/kallah/seed_studio/Linux_for_Tegra/flash.sh --no-flash --rcm-boot recomputer-orin-j401 mmcblk0p1 ############################################################################### # L4T BSP Information: # R36 , REVISION: 4.0 # User release: 0.0 ############################################################################### ECID is 0x80012344705DF30D0C000000080181C0 copying device_config(/home/kallah/seed_studio/Linux_for_Tegra/bootloader/generic/BCT/tegra234-mb1-bct-device-p3767-0000.dts)... done. copying misc_config(/home/kallah/seed_studio/Linux_for_Tegra/bootloader/generic/BCT/tegra234-mb1-bct-misc-p3767-0000.dts)... done. copying emc_fuse_dev_params(/home/kallah/seed_studio/Linux_for_Tegra/bootloader/generic/BCT/tegra234-br-bct-diag-boot.dts)... done. Existing emcfuse(/home/kallah/seed_studio/Linux_for_Tegra/bootloader/fuse_t234.xml) reused. ./tegraflash.py --chip "0x23" --applet "/home/kallah/seed_studio/Linux_for_Tegra/bootloader/mb1_t234_prod.bin" --skipuid --cfg readinfo_t234_min_prod.xml --dev_params tegra234-br-bct-diag-boot.dts --device_config tegra234-mb1-bct-device-p3767-0000.dts --misc_config tegra234-mb1-bct-misc-p3767-0000.dts --bins "mb2_applet applet_t234.bin" --cmd "readfuses fuse_t234.bin fuse_t234.xml; dump eeprom cvm cvm.bin; dump try_custinfo custinfo_out.bin; reboot recovery" Welcome to Tegra Flash version 1.0.0 Type ? or help for help and q or quit to exit Use ! to execute system commands [ 0.0197 ] Reading fuses [ 0.0205 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet [ 0.0208 ] File rcm_state open failed [ 0.0210 ] ERROR: failed to read rcm_state [ 0.0210 ] [ 0.0217 ] tegrasign_v3.py --key None --getmode mode.txt [ 0.0218 ] Assuming zero filled SBK key [ 0.0213 ] Pre-processing config: tegra234-mb1-bct-device-p3767-0000.dts [ 0.0276 ] Pre-processing config: tegra234-mb1-bct-misc-p3767-0000.dts [ 0.0380 ] Parsing partition layout [ 0.0385 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp [ 0.0393 ] Kernel DTB used: None [ 0.0393 ] WARNING: dce base dtb is not provided [ 0.0393 ] Parsing partition layout [ 0.0396 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp [ 0.0401 ] Creating list of images to be signed [ 0.0404 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --list images_list.xml zerosbk [ 0.0406 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin [ 0.0419 ] Header already present for mb1_t234_prod_aligned_sigheader.bin [ 0.0423 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin [ 0.0471 ] Header already present for mb1_t234_prod_aligned_sigheader.bin [ 0.0474 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin [ 0.0517 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin [ 0.0520 ] adding BCH for mb2_t234_aligned.bin [ 0.0545 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin [ 0.0660 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin [ 0.0663 ] adding BCH for mb2_t234_aligned.bin [ 0.0807 ] Filling MB1 storage info [ 0.0807 ] Parsing dev params for multi chains [ 0.0870 ] Generating br-bct [ 0.0872 ] Updating dev and MSS params in BR BCT [ 0.0873 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0 [ 0.0878 ] Updating bl info [ 0.0881 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin [ 0.0883 ] WARNING: boot chain is not completed. set to 0 [ 0.0892 ] Generating signatures [ 0.0899 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.0900 ] Assuming zero filled SBK key [ 0.0982 ] Warning: pub_key.key is not found [ 0.0977 ] Parsing dev params for multi chains [ 0.0977 ] Generating br-bct [ 0.0980 ] Updating dev and MSS params in BR BCT [ 0.0980 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0 [ 0.0986 ] Updating bl info [ 0.0988 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml [ 0.0990 ] WARNING: boot chain is not completed. set to 0 [ 0.1001 ] Generating SHA2 Hash [ 0.1014 ] Sha saved in br_bct_BR.sha [ 0.1008 ] Get Signed section of bct [ 0.1010 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml [ 0.1014 ] Signing BCT [ 0.1021 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.1022 ] Assuming zero filled SBK key [ 0.1037 ] Sha saved in br_bct_BR.sha [ 0.1038 ] Warning: pub_key.key is not found [ 0.1032 ] Updating BCT with signature [ 0.1034 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml [ 0.1036 ] Offset :4608 Len :3584 [ 0.1040 ] Generating SHA2 Hash [ 0.1047 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512 [ 0.1048 ] Assuming zero filled SBK key [ 0.1048 ] Assuming zero filled SBK key [ 0.1064 ] Sha saved in br_bct_BR.sha [ 0.1059 ] Updating BCT with SHA2 Hash [ 0.1062 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml [ 0.1065 ] Offset :4608 Len :3584 [ 0.1068 ] Offset :68 Len :8124 [ 0.1070 ] Generating coldboot mb1-bct [ 0.1072 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 0.1075 ] MB1-BCT version: 0.13 [ 0.1087 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 0.1089 ] Added Platform Config 9 data with size :- 100 [ 0.1089 ] [ 0.1089 ] Updating mb1-bct with firmware information [ 0.1092 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin [ 0.1102 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct [ 0.1107 ] Generating SHA2 Hash for mb1bct [ 0.1121 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha [ 0.1129 ] Sha saved in mb1_cold_boot_bct_MB1.sha [ 0.1128 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk [ 0.1134 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct [ 0.1151 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.1153 ] Assuming zero filled SBK key [ 0.1164 ] Warning: pub_key.key is not found [ 0.1160 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk [ 0.1167 ] Generating recovery mb1-bct [ 0.1170 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 0.1172 ] MB1-BCT version: 0.13 [ 0.1185 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb [ 0.1186 ] Added Platform Config 9 data with size :- 100 [ 0.1186 ] [ 0.1186 ] Updating mb1-bct with firmware information [ 0.1189 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo readinfo_t234_min_prod.xml.bin [ 0.1199 ] tegrahost_v2 --chip 0x23 0 --align mb1_bct_MB1_aligned.bct [ 0.1202 ] Generating SHA2 Hash for mb1bct [ 0.1216 ] Sha saved in mb1_bct_MB1_aligned.sha [ 0.1223 ] Sha saved in mb1_bct_MB1.sha [ 0.1220 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_bct_MB1_aligned.bct zerosbk [ 0.1223 ] adding BCH for mb1_bct_MB1_aligned.bct [ 0.1238 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512 [ 0.1239 ] Assuming zero filled SBK key [ 0.1248 ] Warning: pub_key.key is not found [ 0.1245 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk [ 0.1252 ] Info: Skip generating mem_bct because sdram_config is not defined [ 0.1252 ] Info: Skip generating mem_bct because sdram_config is not defined [ 0.1252 ] Copying signatures [ 0.1255 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml [ 0.1301 ] mb1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list [ 0.1303 ] psc_bl1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list [ 0.1303 ] Boot Rom communication [ 0.1306 ] tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt [ 0.1308 ] BR_CID: 0x80012344705DF30D0C000000080181C0 [ 0.3557 ] Sending bct_br [ 0.5600 ] ERROR: might be timeout in USB write. Error: Return value 3 Command tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt [ 10.9070 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet [ 10.9079 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet [ 10.9087 ] Retrieving board information [ 10.9090 ] tegrarcm_v2 --chip 0x23 0 --oem platformdetails chip chip_info.bin [ 10.9096 ] Retrieving EEPROM data [ 10.9096 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/kallah/seed_studio/Linux_for_Tegra/bootloader/cvm.bin --chip 0x23 0 [ 10.9103 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet [ 10.9110 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet [ 10.9115 ] Dumping customer Info [ 10.9117 ] tegrarcm_v2 --chip 0x23 0 --oem dump bct tmp.bct [ 10.9124 ] tegrabct_v2 --brbct tmp.bct --chip 0x23 0 --custinfo /home/kallah/seed_studio/Linux_for_Tegra/bootloader/custinfo_out.bin [ 10.9127 ] File tmp.bct open failed [ 10.9129 ] Error: try getting custinfo fail. Moving on [ 10.9129 ] Rebooting to recovery mode [ 10.9132 ] tegrarcm_v2 --chip 0x23 0 --ismb2 [ 10.9137 ] Rebooting to recovery mode [ 10.9139 ] tegrarcm_v2 --chip 0x23 0 --reboot recovery Parsing board information failed. Cleaning up...
I am not sure if this is how you are supposed to do this on the seed studio boards, so any clarification here would be super helpful! Thank you
The text was updated successfully, but these errors were encountered:
bigbearishappy
No branches or pull requests
We have been using the NVIDIA Jetson Carrier Boards and we have been able to create system images for distribution using this command there:
However, we are now moving over to the Seed Studio J4012 and the same command in the Linux_for_Tegra
I am not sure if this is how you are supposed to do this on the seed studio boards, so any clarification here would be super helpful! Thank you
The text was updated successfully, but these errors were encountered: