ARI request timed out: req 85 on CPU 4

Hi,
during factory programming of Jetson TX2 unit with Orbitty carrier board I’ve stumbled on a following issue, it happend exactly once and is not reproducible.
Do you know what may have caused this?

[0010.208] I> bit @ 0xd480000
[0010.211] I> Downloading bct_bootrom at 0x000000004004e800
[0010.218] I> downloaded image bct_bootrom successfully
[0010.225] I> Downloading bct_mb1 at 0x0000000040000000
[0010.234] I> MB1-BCT relocated to 0xd48bc00 from 0x40000000
[0010.240] I> Supported mb1-bct versions 9-14
[0010.244] I> Version of mb1 bct binary 14
[0010.248] W> MB1 BCT does not have controller prod config data
[0010.254] I> Bootrom patch version : 31 (correctly patched)
[0010.259] I> ATE fuse revision : 0x508a0
[0010.263] I> chip revision : A02P
[0010.266] I> disabled_core_mask: 0xffffff0c
[0010.270] I> Enabled Cores: 0xf3
[0010.273] I> TPC disable fuse status: 0
[0010.277] I> Booting Parker Sku
[0010.280] I> Ram repair fuse : 0x0
[0010.283] I> Mem length:2000
[0010.286] I> tegrabl_ast_init_mapper: AST-cache dump
[0010.291] I> allocated(CO:30) base:0x278000000 size:0x8000000 align: 0x8000000
[0010.298] I> allocated(CO:23) base:0xf0100000 size:0x10000 align: 0x10000
[0010.305] I> allocated(CO:31) base:0x0 size:0x0 align: 0x0
[0010.310] I> allocated(CO:1) base:0x277f00000 size:0x100000 align: 0x100000
[0010.317] I> allocated(CO:2) base:0x277e00000 size:0x100000 align: 0x100000
[0010.324] I> allocated(CO:3) base:0x277d00000 size:0x100000 align: 0x100000
[0010.331] I> allocated(CO:4) base:0x277c00000 size:0x100000 align: 0x100000
[0010.338] I> allocated(CO:5) base:0x277b00000 size:0x100000 align: 0x100000
[0010.345] I> allocated(CO:27) base:0x0 size:0x0 align: 0x0
[0010.350] I> allocated(CO:6) base:0x277800000 size:0x200000 align: 0x200000
[0010.357] I> allocated(CO:7) base:0x277400000 size:0x400000 align: 0x400000
[0010.364] I> allocated(CO:8) base:0x277a00000 size:0x100000 align: 0x100000
[0010.371] I> allocated(CO:9) base:0x277300000 size:0x100000 align: 0x100000
[0010.377] I> allocated(CO:10) base:0x276800000 size:0x800000 align: 0x800000
[0010.384] I> allocated(CO:11) base:0x30000000 size:0x40000 align: 0x0
[0010.391] I> allocated(CO:12) base:0xf0000000 size:0x100000 align: 0x100000
[0010.398] I> allocated(CO:13) base:0x30040000 size:0x1000 align: 0x0
[0010.404] I> allocated(CO:14) base:0x30048000 size:0x1000 align: 0x0
[0010.410] I> allocated(CO:15) base:0x30049000 size:0x1000 align: 0x0
[0010.416] I> allocated(CO:16) base:0x3004a000 size:0x1000 align: 0x0
[0010.423] I> allocated(CO:17) base:0x3004b000 size:0x1000 align: 0x0
[0010.429] I> allocated(CO:19) base:0x3004d000 size:0x1000 align: 0x0
[0010.435] I> allocated(CO:18) base:0x3004c000 size:0x1000 align: 0x0
[0010.441] I> allocated(CO:20) base:0x3004e000 size:0x1000 align: 0x0
[0010.448] I> allocated(CO:21) base:0x3004f000 size:0x1000 align: 0x0
[0010.454] I> allocated(CO:22) base:0x0 size:0x0 align: 0x0
[0010.459] I> allocated(CO:32) base:0x276000000 size:0x600000 align: 0x400000
[0010.466] I> allocated(CO:24) base:0x0 size:0x0 align: 0x0
[0010.472] I> allocated(CO:25) base:0x0 size:0x0 align: 0x0
[0010.477] I> allocated(CO:26) base:0x0 size:0x0 align: 0x0
[0010.482] I> allocated(CO:39) base:0x96000000 size:0x2400000 align: 0x2000000
[0010.489] I> allocated(CO:38) base:0x84000000 size:0x400000 align: 0x400000
[0010.496] I> allocated(CO:37) base:0x2772e0000 size:0x20000 align: 0x20000
[0010.503] I> allocated(CO:40) base:0x85000000 size:0x1200000 align: 0x1000000
[0010.510] I> allocated(CO:41) base:0x277000000 size:0x280000 align: 0x200000
[0010.517] I> allocated(CO:28) base:0x84400000 size:0x400000 align: 0x400000
[0010.525] W> MB1 PMIC CFG is version 1.2
[0010.529] W> Rail ID 7 is not found on MB1 BCT
[0010.533] W> MB1 PMIC CFG is version 1.2
[0010.538] C> I2C command failed
[0010.541] C> block index = (4) and rail_id = (1)
[0010.545] C> Addr: Reg = [0xe8:0x07]: 336166925
[0010.550] W> MB1 PMIC CFG is version 1.2
[0010.557] W> MB1 PMIC CFG is version 1.2
[0010.561] I> sdram slot : 1
[0010.564] I> Initializing SDRAM
[0010.570] I> mss encrypt status check successful
[0010.575] I> downloaded image bct_mb1 successfully
[0010.757] I> Downloading blob at 0x0000000084800000
[0011.176] I> downloaded image blob successfully
[0011.209] I> exiting nv3p server
[0011.212] I> MB1-recovery(prd-version : 14.01.171031-t186-M-00.00-6b33ecf5)
[0011.219] I> disabled_core_mask: 0xffffff0c
[0011.223] I> Enabled Cores: 0xf3
[0011.226] I> TPC disable fuse status: 0
[0011.230] I> Booting Parker Sku
[0011.233] I> Setup temp. GSC#29 (base:0x30000000, size:0x00010000)
[0011.239] I> Loading preboot
[0011.244] I> Binary(1) of size 62224 is loaded @ 0x40000000
[0011.249] I> Restrict GSC#29 access to DPMU only
[0011.254] I> Updated LSR_DVCOMP_PARAMS: 0xc07a0f45c
[0011.259] I> Updated LSR_DVCOMP_PARAMS: 0xc07a0f45c
[0011.263] I> WP0 triggered
[0011.266] I> Waypoint-0 ACK received :)
[0011.270] I> WP0.5 triggered
[0011.273] I> Initialized SCRs
[0011.276] W> MB1 PMIC CFG is version 1.2
[0011.284] W> MB1 PMIC CFG is version 1.2
[0011.336] I> Waypoint-0.5 ACK received :)
[0011.340] I> Setup temp. GSC#28 (base:0x84400000, size:0x00400000)
[0011.346] I> Loading MTS-DMCE
[0011.359] I> Binary(2) of size 265472 is loaded @ 0x84400000
[0011.365] I> disabled_core_mask: 0xffffff0c
[0011.369] I> Loading MTS-PROPER
[0011.372] I> Binary(3) of size 1810512 is loaded @ 0x0
[0011.377] I> Restrict GSC#28 access to DPMU only
[0011.381] I> disabled_core_mask: 0xffffff0c
[0011.386] I> WP1 triggered
[0011.388] I> Loading MB2
[0011.391] I> Binary(8) of size 79200 is loaded @ 0x84000000
[0011.397] W> MB1 PMIC CFG is version 1.2
[0011.402] I> Configure DMCE carveout GSC#13
[0011.406] I> CPU reset vector: 0x96000000
[0011.410] I> MB2-params @ 0xd7000000
[0011.414] I> Waypoint-1 ACK received :)
[0011.417] I> Configure SC7 carveout GSC#23
[0011.422] I> MB1 (recovery) done 

[0011.427] I> Welcome to MB2(TBoot-BPMP) Recovery(version: 01.00.160913-t186-M-00.00-mobile-cfa59593)
[0011.436] I> Default Heap @ [0xd486400 - 0xd488400]
[0011.441] I> DMA Heap @ [0x85200000 - 0x86200000]
[0011.446] I> bit @ 0xd480000
[0011.449] I> BR-BCT relocated to 0xd7020000
[0011.453] I> Boot-device: eMMC
[0011.477] I> sdmmc ddr50 mode
[0011.480] I> sdmmc bdev is already initialized
[0011.485] I> pmic: reset reason (nverc)        : 0x80
[0011.489] I> Reading GPT from 512 for device 00000003
[0011.495] I> Reading GPT from 8388096 for device 00000003
[0011.502] I> Found 13 partitions in 00000003 device
[0011.507] I> Reading GPT from 512 for device 00010003
[0011.514] I> Found 33 partitions in 00010003 device
[0011.522] I> Binary(16) of size 529040 is loaded @ 0xd7800000
[0011.530] I> Binary(17) of size 465760 is loaded @ 0xd798e4a0
[0011.708] I> BPMP-FW load address = 0xd7800000
[0011.712] I> BPMP-FW DTB load address = 0x5018e4a0
[0011.717] I> Copy BTCM section
[0011.721] I> Binary(13) of size 189648 is loaded @ 0x96000000
[0011.728] I> Binary(20) of size 210800 is loaded @ 0x8520f400
[0011.733] I> MB2-params(VA) @ 0xd7000000
[0011.737] I> CPUBL-params(VA) @ 0xd7000000
[0011.741] I> CPUBL-params(PA) @ 0x277000000
[0011.745] I> CPU-BL loaded @ PA 0x96000000
[0011.749] I> Loading TOS ...
[0011.753] I> Binary(14) of size 62576 is loaded @ 0x8530f600
[0011.758] I> Copying Monitor (length: 0xf270) from 0x8530f800 to 0x40000000
[0011.765] I> Erasing Monitor @ 0x8530f800
[0011.770] I> Unhalting SCE
[0011.772] I> Primary Memory Start:80000000 Size:70000000
[0011.778] I> Extended Memory Start:f0110000 Size:185ef0000
[0011.784] I> Waypoint2-ACK: 0x5200f188
[0011.788] I> MB2(TBoot-BPMP) Recovery done

ERROR:   ARI request timed out: req 85 on CPU 4
NOTICE:  BL31: v1.2(release):e1e4477
NOTICE:  BL31: Built : 00:08:30, May 17 2018
ERROR:   ARI request timed out: req 95 on CPU 4
ERROR:   ARI request timed out: req 85 on CPU 4
NOTICE:  Trusty image missing.
ERROR:   Error initializing runtime service trusty_fast

Host side:

Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0014 ] Generating RCM messages
[   0.0022 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 --download rcm mb1_recovery_prod.bin 0 0
[   0.0028 ] RCM 0 is saved as rcm_0.rcm
[   0.0031 ] RCM 1 is saved as rcm_1.rcm
[   0.0031 ] List of rcm files are saved in rcm_list.xml
[   0.0031 ] 
[   0.0031 ] Signing RCM messages
[   0.0036 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0041 ] Assuming zero filled SBK key
[   0.0068 ] 
[   0.0068 ] Copying signature to RCM mesages
[   0.0073 ] tegrarcm_v2 --chip 0x18 --updatesig rcm_list_signed.xml
[   0.0081 ] 
[   0.0082 ] Boot Rom communication
[   0.0087 ] tegrarcm_v2 --chip 0x18 --rcm rcm_list_signed.xml
[   0.0092 ] BR_CID: 0x81801001643215c00c00000003030240
[   0.0097 ] RCM version 0X180001
[   0.0249 ] Boot Rom communication completed
[   1.0314 ] 
[   1.0331 ] tegrarcm_v2 --isapplet
[   1.0346 ] Applet version 01.00.0000
[   1.0507 ] 
[   1.0530 ] Retrieving EEPROM data
[   1.0532 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/pfigiel/343_jetson/tegraflash/cvm.bin
[   1.0551 ] Applet version 01.00.0000
[   1.0863 ] Saved platform info in /home/pfigiel/343_jetson/tegraflash/cvm.bin
[   1.1638 ] 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0008 ] tegrasign_v2 --key None --getmode mode.txt
[   0.0013 ] Assuming zero filled SBK key
[   0.0014 ] 
[   0.0014 ] Generating RCM messages
[   0.0020 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 --download rcm mb1_recovery_prod.bin 0 0
[   0.0025 ] RCM 0 is saved as rcm_0.rcm
[   0.0027 ] RCM 1 is saved as rcm_1.rcm
[   0.0027 ] List of rcm files are saved in rcm_list.xml
[   0.0027 ] 
[   0.0028 ] Signing RCM messages
[   0.0033 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0038 ] Assuming zero filled SBK key
[   0.0064 ] 
[   0.0064 ] Copying signature to RCM mesages
[   0.0070 ] tegrarcm_v2 --chip 0x18 --updatesig rcm_list_signed.xml
[   0.0078 ] 
[   0.0078 ] Parsing partition layout
[   0.0083 ] tegraparser_v2 --pt flash.xml.tmp
[   0.0091 ] 
[   0.0091 ] Creating list of images to be signed
[   0.0097 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[   0.0253 ] 
[   0.0254 ] Generating signatures
[   0.0261 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[   0.0268 ] Assuming zero filled SBK key
[   0.2249 ] 
[   0.2250 ] Generating br-bct
[   0.2259 ] Updating dev and MSS params in BR BCT
[   0.2259 ] tegrabct_v2 --dev_param emmc.cfg --sdram jetsontx2orbitty.cfg --brbct br_bct.cfg --chip 0x18
[   0.2409 ] 
[   0.2409 ] Updating bl info
[   0.2419 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   0.2431 ] 
[   0.2431 ] Updating smd info
[   0.2438 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[   0.2447 ] 
[   0.2447 ] Updating Odmdata
[   0.2454 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatefields Odmdata =0x1090000
[   0.2462 ] 
[   0.2462 ] Get Signed section bct
[   0.2469 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --listbct bct_list.xml
[   0.2477 ] 
[   0.2477 ] Signing BCT
[   0.2488 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key
[   0.2493 ] Assuming zero filled SBK key
[   0.2494 ] 
[   0.2495 ] Updating BCT with signature
[   0.2500 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesig bct_list_signed.xml
[   0.2508 ] 
[   0.2508 ] Generating coldboot mb1-bct
[   0.2513 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct.cfg --sdram jetsontx2orbitty.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[   0.2519 ] MB1-BCT version: 0xe
[   0.2520 ] Copying Sdram info from 2 to 3 set
[   0.2657 ] Packing sdram param for instance[0]
[   0.2659 ] Packing sdram param for instance[1]
[   0.2660 ] Packing sdram param for instance[2]
[   0.2662 ] Packing sdram param for instance[3]

[   0.2664 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg 
[   0.2667 ] Appending platform config data of size :- 2904

[   0.2670 ] Parsing config file :mobile_scr.cfg 
[   0.2672 ] Appending platform config data of size :- 12240

[   0.2676 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg 
[   0.2678 ] Appending platform config data of size :- 24
[   0.2678 ] 
[   0.2678 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg 
[   0.2678 ] Appending platform config data of size :- 708
[   0.2678 ] 
[   0.2678 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg 
[   0.2678 ] Appending platform config data of size :- 64
[   0.2678 ] 
[   0.2678 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg 
[   0.2678 ] Appending platform config data of size :- 1652
[   0.2678 ] 
[   0.2679 ] Updating mb1-bct with firmware information
[   0.2686 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[   0.2692 ] MB1-BCT version: 0xe
[   0.2695 ] 
[   0.2695 ] Updating mb1-bct with storage information
[   0.2701 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   0.2706 ] MB1-BCT version: 0xe
[   0.2709 ] 
[   0.2716 ] tegrahost_v2 --align mb1_cold_boot_bct_MB1.bct
[   0.2724 ] 
[   0.2733 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[   0.2740 ] 
[   0.2747 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml
[   0.2754 ] Assuming zero filled SBK key
[   0.2767 ] 
[   0.2776 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[   0.2783 ] 
[   0.2784 ] Generating recovery mb1-bct
[   0.2790 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct.cfg --sdram jetsontx2orbitty.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[   0.2795 ] MB1-BCT version: 0xe
[   0.2797 ] Copying Sdram info from 2 to 3 set
[   0.2932 ] Packing sdram param for instance[0]
[   0.2933 ] Packing sdram param for instance[1]
[   0.2935 ] Packing sdram param for instance[2]
[   0.2936 ] Packing sdram param for instance[3]

[   0.2937 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg 
[   0.2940 ] Appending platform config data of size :- 2904

[   0.2942 ] Parsing config file :minimal_scr.cfg 
[   0.2944 ] Appending platform config data of size :- 12240

[   0.2953 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg 
[   0.2956 ] Appending platform config data of size :- 24
[   0.2956 ] 
[   0.2956 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg 
[   0.2956 ] Appending platform config data of size :- 708
[   0.2956 ] 
[   0.2956 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg 
[   0.2956 ] Appending platform config data of size :- 64
[   0.2956 ] 
[   0.2956 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg 
[   0.2956 ] Appending platform config data of size :- 1652
[   0.2956 ] 
[   0.2957 ] Updating mb1-bct with firmware information
[   0.2963 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[   0.2969 ] MB1-BCT version: 0xe
[   0.2972 ] 
[   0.2972 ] Updating mb1-bct with storage information
[   0.2978 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   0.2983 ] MB1-BCT version: 0xe
[   0.2986 ] 
[   0.2991 ] tegrahost_v2 --align mb1_bct_MB1.bct
[   0.2997 ] 
[   0.3003 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk
[   0.3009 ] 
[   0.3016 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml
[   0.3021 ] Assuming zero filled SBK key
[   0.3034 ] 
[   0.3041 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[   0.3048 ] 
[   0.3048 ] Copying signatures
[   0.3054 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   0.3313 ] 
[   0.3313 ] Boot Rom communication
[   0.3322 ] tegrarcm_v2 --chip 0x18 --rcm rcm_list_signed.xml
[   0.3328 ] BootRom is not running
[   1.3381 ] 
[   1.3395 ] tegrarcm_v2 --isapplet
[   1.3407 ] Applet version 01.00.0000
[   1.3599 ] 
[   1.3600 ] Retrieving board information
[   1.3616 ] tegrarcm_v2 --oem platformdetails chip chip_info.bin
[   1.3624 ] Applet version 01.00.0000
[   1.3956 ] Saved platform info in chip_info.bin
[   1.3969 ] Chip minor revision: 2
[   1.3977 ] 
[   1.3977 ] Sending BCTs
[   1.3984 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[   1.3990 ] Applet version 01.00.0000
[   1.4318 ] Sending bct_bootrom
[   1.4320 ] [................................................] 100%
[   1.4417 ] Sending bct_mb1
[   1.4477 ] [................................................] 100%
[   1.8045 ] 
[   1.8046 ] Generating blob
[   1.8058 ] tegrahost_v2 --align blob_nvtboot_recovery_cpu.bin
[   1.8067 ] 
[   1.8075 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[   1.8087 ] 
[   1.8097 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml
[   1.8105 ] Assuming zero filled SBK key
[   1.8169 ] 
[   1.8177 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[   1.8185 ] 
[   1.8192 ] tegrahost_v2 --align blob_nvtboot_recovery.bin
[   1.8197 ] 
[   1.8202 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[   1.8209 ] 
[   1.8216 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml
[   1.8221 ] Assuming zero filled SBK key
[   1.8239 ] 
[   1.8246 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[   1.8252 ] 
[   1.8259 ] tegrahost_v2 --align blob_preboot_d15_prod_cr.bin
[   1.8265 ] 
[   1.8270 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[   1.8276 ] 
[   1.8283 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml
[   1.8288 ] Assuming zero filled SBK key
[   1.8302 ] 
[   1.8309 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[   1.8316 ] 
[   1.8322 ] tegrahost_v2 --align blob_mce_mts_d15_prod_cr.bin
[   1.8328 ] 
[   1.8333 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[   1.8362 ] 
[   1.8371 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml
[   1.8376 ] Assuming zero filled SBK key
[   1.8861 ] 
[   1.8872 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[   1.8899 ] 
[   1.8906 ] tegrahost_v2 --align blob_bpmp.bin
[   1.8912 ] 
[   1.8918 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk
[   1.8929 ] 
[   1.8938 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml
[   1.8945 ] Assuming zero filled SBK key
[   1.9070 ] 
[   1.9079 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[   1.9091 ] 
[   1.9098 ] tegrahost_v2 --align blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb
[   1.9104 ] 
[   1.9110 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk
[   1.9122 ] 
[   1.9130 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml
[   1.9135 ] Assuming zero filled SBK key
[   1.9250 ] 
[   1.9262 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[   1.9275 ] 
[   1.9283 ] tegrahost_v2 --align blob_tos.img
[   1.9288 ] 
[   1.9295 ] tegrahost_v2 --appendsigheader blob_tos.img zerosbk
[   1.9302 ] 
[   1.9309 ] tegrasign_v2 --key None --list blob_tos_sigheader.img_list.xml
[   1.9315 ] Assuming zero filled SBK key
[   1.9329 ] 
[   1.9336 ] tegrahost_v2 --updatesigheader blob_tos_sigheader.img.encrypt blob_tos_sigheader.img.hash zerosbk
[   1.9343 ] 
[   1.9349 ] tegrahost_v2 --align blob_eks.img
[   1.9354 ] 
[   1.9360 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk
[   1.9366 ] 
[   1.9374 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml
[   1.9379 ] Assuming zero filled SBK key
[   1.9380 ] 
[   1.9388 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[   1.9394 ] 
[   1.9401 ] tegrahost_v2 --align blob_tegra186-tx2-cti-ASG001-USB3.dtb
[   1.9406 ] 
[   1.9412 ] tegrahost_v2 --appendsigheader blob_tegra186-tx2-cti-ASG001-USB3.dtb zerosbk
[   1.9421 ] 
[   1.9428 ] tegrasign_v2 --key None --list blob_tegra186-tx2-cti-ASG001-USB3_sigheader.dtb_list.xml
[   1.9434 ] Assuming zero filled SBK key
[   1.9484 ] 
[   1.9492 ] tegrahost_v2 --updatesigheader blob_tegra186-tx2-cti-ASG001-USB3_sigheader.dtb.encrypt blob_tegra186-tx2-cti-ASG001-USB3_sigheader.dtb.hash zerosbk
[   1.9502 ] 
[   1.9510 ] tegrahost_v2 --generateblob blob.xml blob.bin
[   1.9517 ] number of images in blob are 9
[   1.9519 ] blobsize is 3680920
[   1.9520 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 190048
[   1.9534 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 79600
[   1.9538 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 63024
[   1.9542 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2076832
[   1.9549 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 529440
[   1.9555 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt of size 466160
[   1.9562 ] Added binary blob_tos_sigheader.img.encrypt of size 62976
[   1.9565 ] Added binary blob_eks_sigheader.img.encrypt of size 1488
[   1.9568 ] Added binary blob_tegra186-tx2-cti-ASG001-USB3_sigheader.dtb.encrypt of size 211200
[   1.9581 ] 
[   1.9581 ] Sending bootloader and pre-requisite binaries
[   1.9588 ] tegrarcm_v2 --download blob blob.bin
[   1.9593 ] Applet version 01.00.0000
[   1.9800 ] Sending blob
[   1.9801 ] [................................................] 100%
[   2.4056 ] 
[   2.4078 ] tegrarcm_v2 --boot recovery
[   2.4098 ] Applet version 01.00.0000
[   2.4329 ] 
[   2.4339 ] tegrarcm_v2 --isapplet
[  28.3468 ] 
[  28.3492 ] tegradevflash_v2 --iscpubl
[  28.3509 ] CPU Bootloader is not running on device.
[  28.3517 ] 
[  59.4670 ] Retrieving storage infomation
[  59.4679 ] tegrarcm_v2 --oem platformdetails storage storage_info.bin
[  59.4685 ] Applet is not running on device. Continue with Bootloader
[  59.4818 ] 
[  59.4825 ] tegradevflash_v2 --oem platformdetails storage storage_info.bin
[  59.4830 ] CPU Bootloader is not running on device.
[  59.4977 ] 
Error: Return value 4
Command tegradevflash_v2 --oem platformdetails storage storage_info.bin

Host-side it’s the programming script provided from meta-tegra.

It’s looks like trusted firmware wait something time out.
It’s better can reproduce to narrow down the root cause.