Boot failure after nvmflash.sh

Hi,

This is a follow up post from Secureboot on Nano, How to burn ODM fuse bits?, How to flash a pre built image with secureboot?.

Now that a Nano box won’t boot :)

The error looks very similar to Gpu error on boot, but which is not resolved, yet. So, let me clarify here.

Here’re screenshot images.

I have tried another box, but ended with the same error.

Here’re my steps.

  1. burn fuses with PKC and odm_reserved (for each device)
  2. create a mfi file(once)
  3. flash the mfi file (for each device)

Due to the sequence of the problems resolved above, I did 1 for all of my 5 test boxes. Then, 2, and 3. And now I have this issue.

I had wondered if the device specific odm_reserved value might have something wrong for 2, so tried the following.

  1. burn fuses with PKC (for each device, although already written)
  2. create a mfi file(once)
  3. flash the mfi file (for each device)
  4. burn an odm_reserved fuse (for each device)

But then, 3 got stuck after having reached to 100% of APP partition, which was confirmed by adding --showlogs to nvmflash.sh.

Do you see anything wrong in my steps?

Thanks!

Hi,
If you have not fused odm_production_mode, you should be able flash non-signed binaries:

   - To flash the Tegra device with zero key signed binaries:
     sudo ./flash.sh <device name> mmcblk0p1

Cold you try this? Would like to know if the board is still able to be flashed with non-signed images.

Great, it did work.

$ sudo ./flash.sh -r jetson-nano-emmc mmcblk0p1
[sudo] password for tsato: 
###############################################################################
# L4T BSP Information:
# R32 , REVISION: 3.1
###############################################################################
# Target Board Information:
# Name: jetson-nano-emmc, Board Family: t210ref, SoC: Tegra 210, 
# OpMode: production, Boot Authentication: , 
###############################################################################
./tegraflash.py --chip 0x21 --applet "/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/nvtboot_recovery.bin" --skipuid --cmd "dump eeprom boardinfo cvm.bin" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0478 ] Generating RCM messages
[   0.0510 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/nvtboot_recovery.bin 0 0
[   0.0530 ] RCM 0 is saved as rcm_0.rcm
[   0.0799 ] RCM 1 is saved as rcm_1.rcm
[   0.0799 ] List of rcm files are saved in rcm_list.xml
[   0.0799 ] 
[   0.0800 ] Signing RCM messages
[   0.1002 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.1021 ] Assuming zero filled SBK key
[   0.1160 ] 
[   0.1161 ] Copying signature to RCM mesages
[   0.1182 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml
[   0.1203 ] 
[   0.1204 ] Boot Rom communication
[   0.1225 ] tegrarcm --chip 0x21 0 --rcm rcm_list_signed.xml --skipuid
[   0.1245 ] RCM version 0X210001
[   0.4863 ] Boot Rom communication completed
[   1.4932 ] 
[   1.4933 ] dump EEPROM info
[   1.4955 ] tegrarcm --oem platformdetails eeprom /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/cvm.bin
[   1.4974 ] Applet version 00.01.0000
[   1.8356 ] Saved platform info in /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/cvm.bin
[   1.9120 ] 
Board ID(3448) version(400) 
copying bctfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/BCT/P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg)... done.
copying bootloader(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
copying initrd(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/l4t_initrd.img)... done.
	populating kernel to rootfs... done.
	populating initrd to rootfs... done.
	populating /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb to rootfs... done.
Making Boot image... done.
Existing sosfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
copying tegraboot(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/nvtboot.bin)... done.
copying cpu_bootloader(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
copying bpffile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/sc7entry-firmware.bin)... done.
Existing badpagefile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/badpage.bin) reused.
copying wb0boot(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/warmboot.bin)... done.
Existing tosfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/tos-mon-only.img) reused.
Existing eksfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/eks.img) reused.
copying dtbfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb)... done.
Copying nv_boot_control.conf to rootfs
Reusing existing system.img... 
done.
Existing tbcfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
copying tbcdtbfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb)... done.
copying cfgfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/cfg/flash_l4t_t210_emmc_p3448.xml) to flash.xml... done.
copying flasher(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
Existing flashapp(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/tegraflash.py) reused.
./tegraflash.py --bl cboot.bin --bct  P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg --odmdata 0x94000 --bldtb tegra210-p3448-0002-p3449-0000-b00.dtb --applet nvtboot_recovery.bin --cmd "flash; reboot"  --cfg flash.xml --chip 0x21    --bins "EBT cboot.bin; DTB tegra210-p3448-0002-p3449-0000-b00.dtb" 
saving flash command in /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/flashcmd.txt
saving Windows flash command to /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/flash_win.bat
*** Flashing target device started. ***
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0017 ] tegrasign --key None --getmode mode.txt
[   0.0035 ] Assuming zero filled SBK key
[   0.0038 ] 
[   0.0039 ] Generating RCM messages
[   0.0057 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm nvtboot_recovery.bin 0 0
[   0.0074 ] RCM 0 is saved as rcm_0.rcm
[   0.0085 ] RCM 1 is saved as rcm_1.rcm
[   0.0091 ] List of rcm files are saved in rcm_list.xml
[   0.0092 ] 
[   0.0092 ] Signing RCM messages
[   0.0108 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0124 ] Assuming zero filled SBK key
[   0.0248 ] 
[   0.0248 ] Copying signature to RCM mesages
[   0.0266 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml
[   0.0290 ] 
[   0.0291 ] Parsing partition layout
[   0.0578 ] tegraparser --pt flash.xml.tmp
[   0.0618 ] 
[   0.0619 ] Creating list of images to be signed
[   0.0938 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --list images_list.xml
[   0.1041 ] 
[   0.1042 ] Generating signatures
[   0.1061 ] tegrasign --key None --list images_list.xml --pubkeyhash pub_key.key
[   0.1081 ] Assuming zero filled SBK key
[   0.2080 ] 
[   0.2081 ] Generating br-bct
[   0.2120 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg --chip 0x21 0
[   0.2139 ] Copying Sdram info from 0 to 1 set
[   0.2172 ] Copying Sdram info from 1 to 2 set
[   0.2172 ] Copying Sdram info from 2 to 3 set
[   0.2172 ] 
[   0.2173 ] Updating boot device parameters
[   0.2185 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatedevparam flash.xml.bin
[   0.2203 ] Warning: No sdram params
[   0.2207 ] 
[   0.2208 ] Updating bl info
[   0.2225 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   0.2258 ] 
[   0.2259 ] Updating secondary storage information into bct
[   0.2278 ] tegraparser --pt flash.xml.bin --chip 0x21 0 --updatecustinfo P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct
[   0.2299 ] 
[   0.2299 ] Updating Odmdata
[   0.2316 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatefields Odmdata =0x94000
[   0.2334 ] Warning: No sdram params
[   0.2337 ] 
[   0.2337 ] Get Signed section of bct
[   0.2355 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --listbct bct_list.xml
[   0.2375 ] 
[   0.2375 ] Signing BCT
[   0.2408 ] tegrasign --key None --list bct_list.xml --pubkeyhash pub_key.key
[   0.2423 ] Assuming zero filled SBK key
[   0.2434 ] 
[   0.2434 ] Updating BCT with signature
[   0.2450 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatesig bct_list_signed.xml
[   0.2472 ] 
[   0.2472 ] Copying signatures
[   0.2489 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   0.2563 ] 
[   0.2564 ] Updating BFS information on BCT
[   0.2582 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatebfsinfo flash.xml.bin
[   0.2600 ]    BFS:
[   0.2632 ]      0: [PT ] flash.xml.bin (size=4337/131072)
[   0.2638 ]      1: [TBC] nvtboot_cpu.bin.encrypt (size=65760/196608)
[   0.2644 ]      2: [RP1] tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=215840/1048576)
[   0.2653 ]      3: [EBT] cboot.bin.encrypt (size=484304/655360)
[   0.2660 ]      4: [WB0] warmboot.bin.encrypt (size=3952/131072)
[   0.2666 ]      5: [BPF] sc7entry-firmware.bin.encrypt (size=3376/262144)
[   0.2672 ] BFS0: 131072 @ 2560 SUM 82de0938 over 2883584 bytes
[   0.2678 ]    BFS:
[   0.2681 ]      0: [PT-1] flash.xml.bin (size=4337/131072)
[   0.2686 ]      1: [TBC-1] nvtboot_cpu.bin.encrypt (size=65760/196608)
[   0.2691 ]      2: [RP1-1] tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=215840/1048576)
[   0.2700 ]      3: [EBT-1] cboot.bin.encrypt (size=484304/655360)
[   0.2705 ]      4: [WB0-1] warmboot.bin.encrypt (size=3952/131072)
[   0.2710 ]      5: [BPF-1] sc7entry-firmware.bin.encrypt (size=3376/262144)
[   0.2717 ] BFS1: 131072 @ 8704 SUM 82de0938 over 2883584 bytes
[   0.2722 ]    KFS:
[   0.3083 ]      0: [DTB] tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=215840/1048576)
[   0.3094 ]      1: [TOS] tos-mon-only.img.encrypt (size=54208/6291456)
[   0.3102 ]      2: [EKS] eks.img (size=1028/81920)
[   0.3107 ]      3: [LNX] boot.img.encrypt (size=483328/67092480)
[   0.3113 ] KFS0: 1048576 @ 29376546 SUM ee80c940 over 7905280 bytes
[   0.3129 ]    KFS:
[   0.3450 ]      0: [DTB-1] tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=215840/1048576)
[   0.3459 ]      1: [TOS-1] tos-mon-only.img.encrypt (size=54208/6291456)
[   0.3467 ]      2: [EKS-1] eks.img (size=1028/81920)
[   0.3472 ]      3: [LNX-1] boot.img.encrypt (size=483328/67092480)
[   0.3479 ] KFS1: 1048576 @ 29522082 SUM ee80c940 over 7905280 bytes
[   0.3490 ] 
[   0.3491 ] Boot Rom communication
[   0.3511 ] tegrarcm --chip 0x21 0 --rcm rcm_list_signed.xml
[   0.3525 ] BootRom is not running
[   0.5551 ] 
[   0.5551 ] Sending BCTs
[   0.5571 ] tegrarcm --download bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct
[   0.5591 ] Applet version 00.01.0000
[   0.8968 ] Sending bct
[   0.8970 ] [................................................] 100%
[   1.0735 ] 
[   1.0756 ] tegrahost --chip 0x21 --align cboot.bin
[   1.0777 ] 
[   1.0798 ] tegrahost --magicid EBT --appendsigheader cboot.bin cboot.bin_blheader
[   1.0848 ] 
[   1.0875 ] tegrasign --key None --list cboot.bin_list.xml
[   1.0892 ] Assuming zero filled SBK key
[   1.1119 ] 
[   1.1146 ] tegrahost --updatesigheader cboot.bin_blheader.encrypt cboot.bin_blheader.hash zerosbk
[   1.1178 ] 
[   1.1216 ] tegrahost --chip 0x21 --align tegra210-p3448-0002-p3449-0000-b00.dtb
[   1.1241 ] 
[   1.1260 ] tegrahost --magicid DTB --appendsigheader tegra210-p3448-0002-p3449-0000-b00.dtb tegra210-p3448-0002-p3449-0000-b00.dtb_blheader
[   1.1296 ] 
[   1.1314 ] tegrasign --key None --list tegra210-p3448-0002-p3449-0000-b00.dtb_list.xml
[   1.1331 ] Assuming zero filled SBK key
[   1.1461 ] 
[   1.1483 ] tegrahost --updatesigheader tegra210-p3448-0002-p3449-0000-b00.dtb_blheader.encrypt tegra210-p3448-0002-p3449-0000-b00.dtb_blheader.hash zerosbk
[   1.1512 ] 
[   1.1524 ] Sending bootloader and pre-requisite binaries
[   1.1539 ] tegrarcm --download ebt cboot.bin.encrypt 0 0 --download rp1 tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt 0
[   1.1559 ] Applet version 00.01.0000
[   1.4928 ] Sending ebt
[   1.4932 ] [................................................] 100%
[   1.5970 ] Sending rp1
[   1.6015 ] [................................................] 100%
[   1.6521 ] 
[   1.6542 ] tegrarcm --boot recovery
[   1.6561 ] Applet version 00.01.0000
[   1.9937 ] 
[   1.9937 ] Retrieving storage infomation
[   1.9958 ] tegrarcm --oem platformdetails storage storage_info.bin
[   1.9977 ] Applet is not running on device. Continue with Bootloader
[   2.5637 ] 
[   2.5807 ] tegradevflash --oem platformdetails storage storage_info.bin
[   2.5827 ] Cboot version 00.01.0000
[   2.7488 ] Saved platform info in storage_info.bin
[   2.7502 ] 
[   2.7503 ] Flashing the device
[   2.7522 ] tegradevflash --pt flash.xml.bin --storageinfo storage_info.bin --create
[   2.7542 ] Cboot version 00.01.0000
[   2.9288 ] Writing partition GPT with gpt.bin
[   2.9293 ] [................................................] 100%
[   2.9337 ] Writing partition NVC with nvtboot.bin.encrypt
[   3.3670 ] [................................................] 100%
[   3.3763 ] Writing partition PT with flash.xml.bin
[   3.4006 ] [................................................] 100%
[   3.4047 ] Writing partition TBC with nvtboot_cpu.bin.encrypt
[   3.4272 ] [................................................] 100%
[   3.4459 ] Writing partition RP1 with tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[   3.4938 ] [................................................] 100%
[   3.5169 ] Writing partition EBT with cboot.bin.encrypt
[   3.5663 ] [................................................] 100%
[   3.5985 ] Writing partition WB0 with warmboot.bin.encrypt
[   3.6514 ] [................................................] 100%
[   3.6681 ] Writing partition BPF with sc7entry-firmware.bin.encrypt
[   3.7159 ] [................................................] 100%
[   3.7325 ] Writing partition NVC-1 with nvtboot.bin.encrypt
[   3.7801 ] [................................................] 100%
[   3.8020 ] Writing partition PT-1 with flash.xml.bin
[   3.8633 ] [................................................] 100%
[   3.8802 ] Writing partition TBC-1 with nvtboot_cpu.bin.encrypt
[   3.9402 ] [................................................] 100%
[   3.9590 ] Writing partition RP1-1 with tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[   4.0195 ] [................................................] 100%
[   4.0427 ] Writing partition EBT-1 with cboot.bin.encrypt
[   4.1146 ] [................................................] 100%
[   4.1466 ] Writing partition WB0-1 with warmboot.bin.encrypt
[   4.2124 ] [................................................] 100%
[   4.2293 ] Writing partition BPF-1 with sc7entry-firmware.bin.encrypt
[   4.2896 ] [................................................] 100%
[   4.3064 ] Writing partition VER_b with emmc_bootblob_ver.txt
[   4.3667 ] [................................................] 100%
[   4.3835 ] Writing partition VER with emmc_bootblob_ver.txt
[   4.4337 ] [................................................] 100%
[   4.4504 ] Writing partition APP with system.img
[   4.5003 ] [................................................] 100%
[ 438.6442 ] Writing partition DTB with tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[ 439.8314 ] [................................................] 100%
[ 439.8483 ] Writing partition TOS with tos-mon-only.img.encrypt
[ 439.8867 ] [................................................] 100%
[ 439.8987 ] Warning: EKS partition magic header mismatch!
[ 439.9346 ] Writing partition EKS with eks.img
[ 439.9351 ] [................................................] 100%
[ 439.9451 ] Writing partition LNX with boot.img.encrypt
[ 439.9803 ] [................................................] 100%
[ 440.0062 ] Writing partition DTB-1 with tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[ 440.0359 ] [................................................] 100%
[ 440.0531 ] Writing partition TOS-1 with tos-mon-only.img.encrypt
[ 440.1001 ] [................................................] 100%
[ 440.1122 ] Writing partition EKS-1 with eks.img
[ 440.1481 ] [................................................] 100%
[ 440.1588 ] Writing partition LNX-1 with boot.img.encrypt
[ 440.1942 ] [................................................] 100%
[ 440.2200 ] Writing partition BMP with bmp.blob
[ 440.2500 ] [................................................] 100%
[ 440.2884 ] Writing partition RP4 with rp4.blob
[ 440.3245 ] [................................................] 100%
[ 440.3862 ] 
[ 440.3887 ] tegradevflash --write BCT P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct
[ 440.3907 ] Cboot version 00.01.0000
[ 440.5527 ] Writing partition BCT with P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct
[ 440.5538 ] [................................................] 100%
[ 440.9494 ] 
[ 440.9495 ] Flashing completed

[ 440.9496 ] Coldbooting the device
[ 440.9516 ] tegradevflash --reboot coldboot
[ 440.9536 ] Cboot version 00.01.0000
[ 441.1130 ] 
*** The target t210ref has been flashed successfully. ***
Reset the board to boot from internal eMMC.

But it won’t boot up by showing the NVIDIA log forever.

Hi,
Please share odm_reserved value for reference. The value we have flashed in the other post looks ok,

Besides, please try if you can flash other version(such as r32.2.3) through SDKManager.

Hi,

I was able to flash the 32.3.1 image successfully.

And it booted up!

Then, I have checked odm values.

$ sudo cat /sys/devices/7000f800.efuse/7000f800.efuse\:efuse-burn/reserved_odm*
[sudo] password for emi: 
0x00000000
0x00000001
0x6780768b
0xac3038fd
0x0f1c1fcb
0x4a634923
0x23ca516e
0xabcd0013

Hi,
Sorry it is a bit confusing. Would like to clarify:
1 Can flash the board through SDKManager, and can boot up to Ubuntu desktop
2 Can flash the board through $ sudo ./flash.sh -r jetson-nano-emmc mmcblk0p1, but cannot boot to Ubuntu desktop

Please check if above two items are correct.

Yes. Correct.

Hi,
Please also try the case without -r
$ sudo ./flash.sh jetson-nano-emmc mmcblk0p1
Would like to try the case of rebuilding system.img

Hi, the flash was successful, but won’t boot.

$ sudo ./flash.sh jetson-nano-emmc mmcblk0p1
[sudo] password for tsato: 
###############################################################################
# L4T BSP Information:
# R32 , REVISION: 3.1
###############################################################################
# Target Board Information:
# Name: jetson-nano-emmc, Board Family: t210ref, SoC: Tegra 210, 
# OpMode: production, Boot Authentication: NS, 
###############################################################################
./tegraflash.py --chip 0x21 --applet "/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/nvtboot_recovery.bin" --skipuid --cmd "dump eeprom boardinfo cvm.bin" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0053 ] Generating RCM messages
[   0.0071 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/nvtboot_recovery.bin 0 0
[   0.0088 ] RCM 0 is saved as rcm_0.rcm
[   0.0104 ] RCM 1 is saved as rcm_1.rcm
[   0.0104 ] List of rcm files are saved in rcm_list.xml
[   0.0104 ] 
[   0.0104 ] Signing RCM messages
[   0.0121 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0139 ] Assuming zero filled SBK key
[   0.0264 ] 
[   0.0264 ] Copying signature to RCM mesages
[   0.0285 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml
[   0.0311 ] 
[   0.0311 ] Boot Rom communication
[   0.0331 ] tegrarcm --chip 0x21 0 --rcm rcm_list_signed.xml --skipuid
[   0.0350 ] RCM version 0X210001
[   0.3972 ] Boot Rom communication completed
[   1.4041 ] 
[   1.4043 ] dump EEPROM info
[   1.4064 ] tegrarcm --oem platformdetails eeprom /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/cvm.bin
[   1.4085 ] Applet version 00.01.0000
[   1.7465 ] Saved platform info in /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/cvm.bin
[   1.8229 ] 
Board ID(3448) version(400) 
copying bctfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/BCT/P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg)... done.
copying bootloader(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
copying initrd(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/l4t_initrd.img)... done.
	populating kernel to rootfs... done.
	populating initrd to rootfs... done.
	populating /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb to rootfs... done.
Making Boot image... done.
Existing sosfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
copying tegraboot(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/nvtboot.bin)... done.
copying cpu_bootloader(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
copying bpffile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/sc7entry-firmware.bin)... done.
Existing badpagefile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/badpage.bin) reused.
copying wb0boot(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/warmboot.bin)... done.
Existing tosfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/tos-mon-only.img) reused.
Existing eksfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/eks.img) reused.
copying dtbfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb)... done.
Copying nv_boot_control.conf to rootfs
Making system.img... 
	populating rootfs from /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/rootfs ... done.
	Sync'ing system.img ... done.
	Converting RAW image to Sparse image... 

---- Raw to Sparse Image Converter v1.0 ----------------------------
  0: RAW:     5242880(      5 blks) ==>          28:5242892
  1: SKP:    32505856(     31 blks) ==>     5242920:12
  2: RAW:     1048576(      1 blks) ==>     5242932:1048588
  3: SKP:    95420416(     91 blks) ==>     6291520:12
  4: RAW:     1048576(      1 blks) ==>     6291532:1048588
  5: SKP:     3145728(      3 blks) ==>     7340120:12
  6: RAW:    60817408(     58 blks) ==>     7340132:60817420
  7: SKP:     1048576(      1 blks) ==>    68157552:12
  8: RAW:    91226112(     87 blks) ==>    68157564:91226124
  9: SKP:     2097152(      2 blks) ==>   159383688:12
 10: RAW:   110100480(    105 blks) ==>   159383700:110100492
 11: SKP:     3145728(      3 blks) ==>   269484192:12
 12: RAW:     6291456(      6 blks) ==>   269484204:6291468
 13: SKP:     6291456(      6 blks) ==>   275775672:12
 14: RAW:    40894464(     39 blks) ==>   275775684:40894476
 15: SKP:     1048576(      1 blks) ==>   316670160:12
 16: RAW:   118489088(    113 blks) ==>   316670172:118489100
 17: SKP:    15728640(     15 blks) ==>   435159272:12
 18: RAW:    76546048(     73 blks) ==>   435159284:76546060
 19: SKP:     3145728(      3 blks) ==>   511705344:12
 20: RAW:    59768832(     57 blks) ==>   511705356:59768844
 21: SKP:     3145728(      3 blks) ==>   571474200:12
 22: RAW:   156237824(    149 blks) ==>   571474212:156237836
 23: SKP:     3145728(      3 blks) ==>   727712048:12
 24: RAW:    22020096(     21 blks) ==>   727712060:22020108
 25: SKP:     3145728(      3 blks) ==>   749732168:12
 26: RAW:    17825792(     17 blks) ==>   749732180:17825804
 27: SKP:     3145728(      3 blks) ==>   767557984:12
 28: RAW:    16777216(     16 blks) ==>   767557996:16777228
 29: SKP:     4194304(      4 blks) ==>   784335224:12
 30: RAW:   244318208(    233 blks) ==>   784335236:244318220
 31: SKP:     7340032(      7 blks) ==>  1028653456:12
 32: RAW:   220200960(    210 blks) ==>  1028653468:220200972
 33: SKP:     6291456(      6 blks) ==>  1248854440:12
 34: RAW:   292552704(    279 blks) ==>  1248854452:292552716
 35: SKP:     1048576(      1 blks) ==>  1541407168:12
 36: RAW:   317718528(    303 blks) ==>  1541407180:317718540
 37: SKP:     1048576(      1 blks) ==>  1859125720:12
 38: RAW:    99614720(     95 blks) ==>  1859125732:99614732
 39: SKP:    26214400(     25 blks) ==>  1958740464:12
 40: RAW:    11534336(     11 blks) ==>  1958740476:11534348
 41: SKP:    89128960(     85 blks) ==>  1970274824:12
 42: RAW:  1074790400(   1025 blks) ==>  1970274836:1074790412
 43: SKP:     3145728(      3 blks) ==>  3045065248:12
 44: RAW:    71303168(     68 blks) ==>  3045065260:71303180
 45: SKP:     1048576(      1 blks) ==>  3116368440:12
 46: RAW:   102760448(     98 blks) ==>  3116368452:102760460
 47: SKP:     1048576(      1 blks) ==>  3219128912:12
 48: RAW:    49283072(     47 blks) ==>  3219128924:49283084
 49: SKP:     5242880(      5 blks) ==>  3268412008:12
 50: RAW:    34603008(     33 blks) ==>  3268412020:34603020
 51: SKP:     3145728(      3 blks) ==>  3303015040:12
 52: RAW:     2097152(      2 blks) ==>  3303015052:2097164
 53: SKP:     2097152(      2 blks) ==>  3305112216:12
 54: RAW:   245366784(    234 blks) ==>  3305112228:245366796
 55: SKP:     6291456(      6 blks) ==>  3550479024:12
 56: RAW:    29360128(     28 blks) ==>  3550479036:29360140
 57: SKP:     4194304(      4 blks) ==>  3579839176:12
 58: RAW:   189792256(    181 blks) ==>  3579839188:189792268
 59: SKP:     3145728(      3 blks) ==>  3769631456:12
 60: RAW:    38797312(     37 blks) ==>  3769631468:38797324
 61: SKP:     3145728(      3 blks) ==>  3808428792:12
 62: RAW:    90177536(     86 blks) ==>  3808428804:90177548
 63: SKP:     2097152(      2 blks) ==>  3898606352:12
 64: RAW:    59768832(     57 blks) ==>  3898606364:59768844
 65: SKP:    24117248(     23 blks) ==>  3958375208:12
 66: RAW:    19922944(     19 blks) ==>  3958375220:19922956
 67: SKP:    80740352(     77 blks) ==>  3978298176:12
 68: RAW:  1212153856(   1156 blks) ==>  3978298188:1212153868
 69: SKP:     1048576(      1 blks) ==>  5190452056:12
 70: RAW:   586153984(    559 blks) ==>  5190452068:586153996
 71: SKP:     4194304(      4 blks) ==>  5776606064:12
 72: RAW:   126877696(    121 blks) ==>  5776606076:126877708
 73: SKP:     7340032(      7 blks) ==>  5903483784:12
 74: RAW:    82837504(     79 blks) ==>  5903483796:82837516
 75: SKP:    26214400(     25 blks) ==>  5986321312:12
 76: RAW:    18874368(     18 blks) ==>  5986321324:18874380
 77: SKP:    81788928(     78 blks) ==>  6005195704:12
 78: RAW:     1048576(      1 blks) ==>  6005195716:1048588
 79: SKP:     3145728(      3 blks) ==>  6006244304:12
 80: RAW:    74448896(     71 blks) ==>  6006244316:74448908
 81: SKP:     5242880(      5 blks) ==>  6080693224:12
 82: RAW:   975175680(    930 blks) ==>  6080693236:975175692
 83: SKP:     6291456(      6 blks) ==>  7055868928:12
 84: RAW:    73400320(     70 blks) ==>  7055868940:73400332
 85: SKP:     2097152(      2 blks) ==>  7129269272:12
 86: RAW:    53477376(     51 blks) ==>  7129269284:53477388
 87: SKP:     5242880(      5 blks) ==>  7182746672:12
 88: RAW:    56623104(     54 blks) ==>  7182746684:56623116
 89: SKP:     2097152(      2 blks) ==>  7239369800:12
 90: RAW:    79691776(     76 blks) ==>  7239369812:79691788
 91: SKP:     4194304(      4 blks) ==>  7319061600:12
 92: RAW:    54525952(     52 blks) ==>  7319061612:54525964
 93: SKP:     4194304(      4 blks) ==>  7373587576:12
 94: RAW:   214958080(    205 blks) ==>  7373587588:214958092
 95: SKP:     3145728(      3 blks) ==>  7588545680:12
 96: RAW:    49283072(     47 blks) ==>  7588545692:49283084
 97: SKP:     1048576(      1 blks) ==>  7637828776:12
 98: RAW:    91226112(     87 blks) ==>  7637828788:91226124
 99: SKP:     1048576(      1 blks) ==>  7729054912:12
100: RAW:    70254592(     67 blks) ==>  7729054924:70254604
101: SKP:     5242880(      5 blks) ==>  7799309528:12
102: RAW:   183500800(    175 blks) ==>  7799309540:183500812
103: SKP:     1048576(      1 blks) ==>  7982810352:12
104: RAW:     1048576(      1 blks) ==>  7982810364:1048588
105: SKP:    24117248(     23 blks) ==>  7983858952:12
106: RAW:    22020096(     21 blks) ==>  7983858964:22020108
107: SKP:    78643200(     75 blks) ==>  8005879072:12
108: RAW:   209715200(    200 blks) ==>  8005879084:209715212
109: SKP:     2097152(      2 blks) ==>  8215594296:12
110: RAW:   658505728(    628 blks) ==>  8215594308:658505740
111: SKP:     2097152(      2 blks) ==>  8874100048:12
112: RAW:    80740352(     77 blks) ==>  8874100060:80740364
113: SKP:     3145728(      3 blks) ==>  8954840424:12
114: RAW:   108003328(    103 blks) ==>  8954840436:108003340
115: SKP:     1048576(      1 blks) ==>  9062843776:12
116: RAW:    14680064(     14 blks) ==>  9062843788:14680076
117: SKP:     2097152(      2 blks) ==>  9077523864:12
118: RAW:    39845888(     38 blks) ==>  9077523876:39845900
119: SKP:     2097152(      2 blks) ==>  9117369776:12
120: RAW:    48234496(     46 blks) ==>  9117369788:48234508
121: SKP:     2097152(      2 blks) ==>  9165604296:12
122: RAW:   198180864(    189 blks) ==>  9165604308:198180876
123: SKP:     3145728(      3 blks) ==>  9363785184:12
124: RAW:   132120576(    126 blks) ==>  9363785196:132120588
125: SKP:     2097152(      2 blks) ==>  9495905784:12
126: RAW:    33554432(     32 blks) ==>  9495905796:33554444
127: SKP:   469762048(    448 blks) ==>  9529460240:12
128: RAW:    11534336(     11 blks) ==>  9529460252:11534348
129: SKP:    22020096(     21 blks) ==>  9540994600:12
130: RAW:    17825792(     17 blks) ==>  9540994612:17825804
131: SKP:    82837504(     79 blks) ==>  9558820416:12
132: RAW:     1048576(      1 blks) ==>  9558820428:1048588
133: SKP:     3145728(      3 blks) ==>  9559869016:12
134: RAW:  1890582528(   1803 blks) ==>  9559869028:1890582540
135: SKP:   118489088(    113 blks) ==> 11450451568:12
136: RAW:     9437184(      9 blks) ==> 11450451580:9437196
137: SKP:    24117248(     23 blks) ==> 11459888776:12
138: RAW:    15728640(     15 blks) ==> 11459888788:15728652
139: SKP:    84934656(     81 blks) ==> 11475617440:12
140: RAW:   291504128(    278 blks) ==> 11475617452:291504140
141: SKP:  1721761792(   1642 blks) ==> 11767121592:12
-- Total: ---------------------------------------------------
142 CHUNK 15032385536(  14336 blks) ==> 11767121604(11222 blks)

done.
system.img built successfully. 
Existing tbcfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
copying tbcdtbfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb)... done.
copying cfgfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/cfg/flash_l4t_t210_emmc_p3448.xml) to flash.xml... done.
copying flasher(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
Existing flashapp(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/tegraflash.py) reused.
./tegraflash.py --bl cboot.bin --bct  P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg --odmdata 0x94000 --bldtb tegra210-p3448-0002-p3449-0000-b00.dtb --applet nvtboot_recovery.bin --cmd "flash; reboot"  --cfg flash.xml --chip 0x21    --bins "EBT cboot.bin; DTB tegra210-p3448-0002-p3449-0000-b00.dtb" 
saving flash command in /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/flashcmd.txt
saving Windows flash command to /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/flash_win.bat
*** Flashing target device started. ***
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0826 ] tegrasign --key None --getmode mode.txt
[   0.0849 ] Assuming zero filled SBK key
[   0.0853 ] 
[   0.0854 ] Generating RCM messages
[   0.1472 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm nvtboot_recovery.bin 0 0
[   0.1494 ] RCM 0 is saved as rcm_0.rcm
[   0.1775 ] RCM 1 is saved as rcm_1.rcm
[   0.1777 ] List of rcm files are saved in rcm_list.xml
[   0.1778 ] 
[   0.1778 ] Signing RCM messages
[   0.1802 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.1823 ] Assuming zero filled SBK key
[   0.1941 ] 
[   0.1941 ] Copying signature to RCM mesages
[   0.1961 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml
[   0.1991 ] 
[   0.1992 ] Parsing partition layout
[   0.2570 ] tegraparser --pt flash.xml.tmp
[   0.2603 ] 
[   0.2604 ] Creating list of images to be signed
[   0.3149 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --list images_list.xml
[   0.4172 ] 
[   0.4173 ] Generating signatures
[   0.4196 ] tegrasign --key None --list images_list.xml --pubkeyhash pub_key.key
[   0.4217 ] Assuming zero filled SBK key
[   0.6526 ] 
[   0.6527 ] Generating br-bct
[   0.7028 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg --chip 0x21 0
[   0.7049 ] Copying Sdram info from 0 to 1 set
[   0.7378 ] Copying Sdram info from 1 to 2 set
[   0.7379 ] Copying Sdram info from 2 to 3 set
[   0.7379 ] 
[   0.7379 ] Updating boot device parameters
[   0.7399 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatedevparam flash.xml.bin
[   0.7419 ] Warning: No sdram params
[   0.7422 ] 
[   0.7423 ] Updating bl info
[   0.7443 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   0.7482 ] 
[   0.7482 ] Updating secondary storage information into bct
[   0.7502 ] tegraparser --pt flash.xml.bin --chip 0x21 0 --updatecustinfo P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct
[   0.7525 ] 
[   0.7526 ] Updating Odmdata
[   0.7545 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatefields Odmdata =0x94000
[   0.7562 ] Warning: No sdram params
[   0.7566 ] 
[   0.7567 ] Get Signed section of bct
[   0.7585 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --listbct bct_list.xml
[   0.7608 ] 
[   0.7608 ] Signing BCT
[   0.7647 ] tegrasign --key None --list bct_list.xml --pubkeyhash pub_key.key
[   0.7666 ] Assuming zero filled SBK key
[   0.7680 ] 
[   0.7681 ] Updating BCT with signature
[   0.7699 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatesig bct_list_signed.xml
[   0.7722 ] 
[   0.7722 ] Copying signatures
[   0.7744 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   0.7812 ] 
[   0.7812 ] Updating BFS information on BCT
[   0.7832 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatebfsinfo flash.xml.bin
[   0.7851 ]    BFS:
[   0.7884 ]      0: [PT ] flash.xml.bin (size=4337/131072)
[   0.7890 ]      1: [TBC] nvtboot_cpu.bin.encrypt (size=65760/196608)
[   0.7897 ]      2: [RP1] tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=215840/1048576)
[   0.7907 ]      3: [EBT] cboot.bin.encrypt (size=484304/655360)
[   0.7914 ]      4: [WB0] warmboot.bin.encrypt (size=3952/131072)
[   0.7921 ]      5: [BPF] sc7entry-firmware.bin.encrypt (size=3376/262144)
[   0.7928 ] BFS0: 131072 @ 2560 SUM 8ae54f1e over 2883584 bytes
[   0.7935 ]    BFS:
[   0.7936 ]      0: [PT-1] flash.xml.bin (size=4337/131072)
[   0.7942 ]      1: [TBC-1] nvtboot_cpu.bin.encrypt (size=65760/196608)
[   0.7949 ]      2: [RP1-1] tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=215840/1048576)
[   0.7960 ]      3: [EBT-1] cboot.bin.encrypt (size=484304/655360)
[   0.7964 ]      4: [WB0-1] warmboot.bin.encrypt (size=3952/131072)
[   0.7968 ]      5: [BPF-1] sc7entry-firmware.bin.encrypt (size=3376/262144)
[   0.7973 ] BFS1: 131072 @ 8704 SUM 8ae54f1e over 2883584 bytes
[   0.7977 ]    KFS:
[   0.8368 ]      0: [DTB] tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=215840/1048576)
[   0.8378 ]      1: [TOS] tos-mon-only.img.encrypt (size=54208/6291456)
[   0.8385 ]      2: [EKS] eks.img (size=1028/81920)
[   0.8616 ]      3: [LNX] boot.img.encrypt (size=483328/67092480)
[   0.8623 ] KFS0: 1048576 @ 29376546 SUM ee80c940 over 7905280 bytes
[   0.8711 ]    KFS:
[   0.9142 ]      0: [DTB-1] tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=215840/1048576)
[   0.9154 ]      1: [TOS-1] tos-mon-only.img.encrypt (size=54208/6291456)
[   0.9162 ]      2: [EKS-1] eks.img (size=1028/81920)
[   0.9168 ]      3: [LNX-1] boot.img.encrypt (size=483328/67092480)
[   0.9175 ] KFS1: 1048576 @ 29522082 SUM ee80c940 over 7905280 bytes
[   0.9208 ] 
[   0.9209 ] Boot Rom communication
[   0.9224 ] tegrarcm --chip 0x21 0 --rcm rcm_list_signed.xml
[   0.9237 ] BootRom is not running
[   1.0640 ] 
[   1.0640 ] Sending BCTs
[   1.0665 ] tegrarcm --download bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct
[   1.0686 ] Applet version 00.01.0000
[   1.1824 ] Sending bct
[   1.1826 ] [................................................] 100%
[   1.3597 ] 
[   1.3621 ] tegrahost --chip 0x21 --align cboot.bin
[   1.3642 ] 
[   1.3665 ] tegrahost --magicid EBT --appendsigheader cboot.bin cboot.bin_blheader
[   1.3715 ] 
[   1.3742 ] tegrasign --key None --list cboot.bin_list.xml
[   1.3760 ] Assuming zero filled SBK key
[   1.3972 ] 
[   1.4003 ] tegrahost --updatesigheader cboot.bin_blheader.encrypt cboot.bin_blheader.hash zerosbk
[   1.4036 ] 
[   1.4079 ] tegrahost --chip 0x21 --align tegra210-p3448-0002-p3449-0000-b00.dtb
[   1.4094 ] 
[   1.4113 ] tegrahost --magicid DTB --appendsigheader tegra210-p3448-0002-p3449-0000-b00.dtb tegra210-p3448-0002-p3449-0000-b00.dtb_blheader
[   1.4147 ] 
[   1.4167 ] tegrasign --key None --list tegra210-p3448-0002-p3449-0000-b00.dtb_list.xml
[   1.4182 ] Assuming zero filled SBK key
[   1.4301 ] 
[   1.4323 ] tegrahost --updatesigheader tegra210-p3448-0002-p3449-0000-b00.dtb_blheader.encrypt tegra210-p3448-0002-p3449-0000-b00.dtb_blheader.hash zerosbk
[   1.4349 ] 
[   1.4361 ] Sending bootloader and pre-requisite binaries
[   1.4380 ] tegrarcm --download ebt cboot.bin.encrypt 0 0 --download rp1 tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt 0
[   1.4395 ] Applet version 00.01.0000
[   1.7780 ] Sending ebt
[   1.7785 ] [................................................] 100%
[   1.8822 ] Sending rp1
[   1.8867 ] [................................................] 100%
[   1.9371 ] 
[   1.9398 ] tegrarcm --boot recovery
[   1.9418 ] Applet version 00.01.0000
[   2.0394 ] 
[   2.0394 ] Retrieving storage infomation
[   2.0419 ] tegrarcm --oem platformdetails storage storage_info.bin
[   2.0439 ] Applet is not running on device. Continue with Bootloader
[   2.6097 ] 
[   2.6901 ] tegradevflash --oem platformdetails storage storage_info.bin
[   2.6924 ] Cboot version 00.01.0000
[   2.7907 ] Saved platform info in storage_info.bin
[   2.7919 ] 
[   2.7920 ] Flashing the device
[   2.7943 ] tegradevflash --pt flash.xml.bin --storageinfo storage_info.bin --create
[   2.7964 ] Cboot version 00.01.0000
[   2.9343 ] Writing partition GPT with gpt.bin
[   2.9348 ] [................................................] 100%
[   2.9391 ] Writing partition NVC with nvtboot.bin.encrypt
[   3.3750 ] [................................................] 100%
[   3.3841 ] Writing partition PT with flash.xml.bin
[   3.4080 ] [................................................] 100%
[   3.4121 ] Writing partition TBC with nvtboot_cpu.bin.encrypt
[   3.4346 ] [................................................] 100%
[   3.4532 ] Writing partition RP1 with tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[   3.5013 ] [................................................] 100%
[   3.5240 ] Writing partition EBT with cboot.bin.encrypt
[   3.5838 ] [................................................] 100%
[   3.6153 ] Writing partition WB0 with warmboot.bin.encrypt
[   3.6684 ] [................................................] 100%
[   3.6850 ] Writing partition BPF with sc7entry-firmware.bin.encrypt
[   3.7328 ] [................................................] 100%
[   3.7492 ] Writing partition NVC-1 with nvtboot.bin.encrypt
[   3.7969 ] [................................................] 100%
[   3.8187 ] Writing partition PT-1 with flash.xml.bin
[   3.8801 ] [................................................] 100%
[   3.8969 ] Writing partition TBC-1 with nvtboot_cpu.bin.encrypt
[   3.9569 ] [................................................] 100%
[   3.9757 ] Writing partition RP1-1 with tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[   4.0371 ] [................................................] 100%
[   4.0600 ] Writing partition EBT-1 with cboot.bin.encrypt
[   4.1218 ] [................................................] 100%
[   4.1536 ] Writing partition WB0-1 with warmboot.bin.encrypt
[   4.2189 ] [................................................] 100%
[   4.2359 ] Writing partition BPF-1 with sc7entry-firmware.bin.encrypt
[   4.2962 ] [................................................] 100%
[   4.3123 ] Writing partition VER_b with emmc_bootblob_ver.txt
[   4.3725 ] [................................................] 100%
[   4.5218 ] Writing partition VER with emmc_bootblob_ver.txt
[   4.5719 ] [................................................] 100%
[   4.5886 ] Writing partition APP with system.img
[   4.6385 ] [................................................] 100%
[ 391.3925 ] Writing partition DTB with tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[ 392.5752 ] [................................................] 100%
[ 392.5916 ] Writing partition TOS with tos-mon-only.img.encrypt
[ 392.6308 ] [................................................] 100%
[ 392.6424 ] Warning: EKS partition magic header mismatch!
[ 392.6781 ] Writing partition EKS with eks.img
[ 392.6786 ] [................................................] 100%
[ 392.6886 ] Writing partition LNX with boot.img.encrypt
[ 392.7238 ] [................................................] 100%
[ 392.7489 ] Writing partition DTB-1 with tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[ 392.7795 ] [................................................] 100%
[ 392.7959 ] Writing partition TOS-1 with tos-mon-only.img.encrypt
[ 392.8341 ] [................................................] 100%
[ 392.8461 ] Writing partition EKS-1 with eks.img
[ 392.8825 ] [................................................] 100%
[ 392.8931 ] Writing partition LNX-1 with boot.img.encrypt
[ 392.9286 ] [................................................] 100%
[ 392.9538 ] Writing partition BMP with bmp.blob
[ 392.9841 ] [................................................] 100%
[ 393.0240 ] Writing partition RP4 with rp4.blob
[ 393.0603 ] [................................................] 100%
[ 393.1457 ] 
[ 393.1484 ] tegradevflash --write BCT P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct
[ 393.1505 ] Cboot version 00.01.0000
[ 393.3097 ] Writing partition BCT with P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct
[ 393.3107 ] [................................................] 100%
[ 393.7063 ] 
[ 393.7064 ] Flashing completed

[ 393.7065 ] Coldbooting the device
[ 393.7085 ] tegradevflash --reboot coldboot
[ 393.7105 ] Cboot version 00.01.0000
[ 393.8698 ] 
*** The target t210ref has been flashed successfully. ***
Reset the board to boot from internal eMMC.

Hi TakenoriSato,

There are much error here and it is not good if we cannot converge all the problems here.

  1. The gpu error
    Do you see the gpu error in every boot? Actually, the gpu error in another post happens on devkit module and that use is not able to hit gpu error when he flashed it with sdkmanager. You are using a production module with no sdcard slot on module, right?

  2. The hang on screen
    Unfortunately, the cause of such error is still unknown. We need to know if you hit such hang in every reboot.
    If yes, please use the oem-config to configure your user account first and the uart serial console should be able to login then. After you could login, please dump the dmesg or boot up log with us.
    https://docs.nvidia.com/jetson/l4t/index.html#page/Tegra%20Linux%20Driver%20Package%20Development%20Guide%2Fflashing.html%23wwpID0E0JD0HA

Hi,

I agree. But please stay focused on the first problem of this issue.

Yes, I see this issue at every boot with a production module. Not a single box. But I can reproduce this on another.

After a particular method of flash, yes, a box will hang every time. This is again reproducible.

I have actually tried, but unfortunately, can’t find any ports except for the micro usb when I opened our box.

We could try, but can ignore this error by focusing on the first issue.

Let me clarify the expected sequence that I have explained in the first post. Then, I will try the sequence on a new box.

I meant the following procedure is correct?

  1. burn fuses with PKC (for each device, although already written)
  2. create a mfi file(once)
  3. flash the mfi file (for each device)
  4. burn an odm_reserved fuse (for each device)

Hi,
It could be similar reason as

We would expect all fuses are burned in one single command, along with the public key. In the steps, public key is burned in one command and odm_reserved is burned in another command. This is not a condition we have handled in odmfuse.sh, and possibly does not work well.

Do you see issue if you don’t execute step 4? Only do 1-3:

  1. burn fuses with PKC (for each device, although already written)
  2. create a mfi file(once)
  3. flash the mfi file (for each device)

Hi, thanks for your conformation.

I see, will follow the expectation.

It was actually what I have done. But with some try and errors.

At the step 2, what condition do you expect for the Linux_for_Tegra folder?
I mean, if I do it after 1 on a particular device, it would contain unexpected contents dependent on the device?

Thanks!

Hi,
Step 1 follows README_secureboot.txt and step 2, 3 follow README_Massflash.txt. It is supposed to work fine. Could you share the exact commands you run for reference? See if we can get more clues from the commands.

Hi,

If I follow the README, I have gone through all the problems I shared before.

So here’s my exact commands (simply wrapped by a Python command).

1. burn fuses with PKC and odm_reserved (for each device)

$ python3 burn-fuses.py --help
usage: burn-fuses.py [-h] [-p] [-d DEVICEID] [-s SECRET]
                     device_name pkc_file l4t_for_linux_folder

positional arguments:
  device_name           the device name, one of jetson-tx2, jetson-nano
  pkc_file              the file path of the 2048 bit RSA private KEY
                        file(.pem file) of this device
  l4t_for_linux_folder  the folder path of the L4T_for_Linux folder

optional arguments:
  -h, --help            show this help message and exit
  -p, --production      enable the production mode if set
  -d DEVICEID, --deviceid DEVICEID
                        use this deviceid if set, otherwise it will get from
                        an id generator service
  -s SECRET, --secret SECRET
                        use this secret key (without 0x) if set, otherwise it
                        will generate one
                       

example

$ sudo python3 burn-fuses.py jetson-nano '/l4tpool/l4timages/emi_pkc_nano.pem' '/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/' -d abcd0012 -s 9e6b357faad875cad1b4c6a2ba9bacc5a5a34dc000000001
pkc_file: /l4tpool/l4timages/emi_pkc_nano.pem
l4t_for_linux_folder: /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/
entering /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/
making a value for the odm_reserved field
burning fuses...
executing ['sudo', '/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/odmfuse.sh', '-j', '-i', '0x21', '-c', 'PKC', '-k', '/l4tpool/l4timages/emi_pkc_nano.pem', '-o', '0xabcd00129e6b357faad875cad1b4c6a2ba9bacc5a5a34dc00000000100000000']
*** Calculating HASH from keyfile /l4tpool/l4timages/emi_pkc_nano.pem ... done
PKC HASH: 0x78e352f7bb4cc4f0ea430b73947efe33a4e86650f935257d4fdce560e0e9ba0b
*** Generating fuse configuration ... done.
done.
*** Start fusing  ... 
./tegraflash.py --chip 0x21 --applet nvtboot_recovery.bin --cmd "blowfuses odmfuse_pkc.xml;"
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0052 ] Parsing fuse info as per xml file
[   0.0069 ] tegraparser --fuse_info odmfuse_pkc.xml blow_fuse_data.bin
[   0.0093 ] 
[   0.0094 ] Generating RCM messages
[   0.0111 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm nvtboot_recovery.bin 0 0
[   0.0128 ] RCM 0 is saved as rcm_0.rcm
[   0.0138 ] RCM 1 is saved as rcm_1.rcm
[   0.0142 ] List of rcm files are saved in rcm_list.xml
[   0.0142 ] 
[   0.0142 ] Signing RCM messages
[   0.0160 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0178 ] Assuming zero filled SBK key
[   0.0289 ] 
[   0.0289 ] Copying signature to RCM mesages
[   0.0309 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml
[   0.0338 ] 
[   0.0338 ] Boot Rom communication
[   0.0357 ] tegrarcm --chip 0x21 0 --rcm rcm_list_signed.xml
[   0.0369 ] BootRom is not running
[   0.2403 ] 
[   0.2403 ] Blowing fuses
[   0.2423 ] tegrarcm --oem blowfuses blow_fuse_data.bin
[   0.2444 ] Applet version 00.01.0000
[   0.5820 ] Successfully burnt fuses as per fuse info blob
[   0.5947 ] 
*** The fuse configuration is saved in bootloader/odmfuse_pkc.xml
*** The ODM fuse has been secured with PKC keys.
*** Flash "signed BCT and bootloader(s)".
*** done.

finished running burn-fuses.py

2. create a mfi file(once)

$ python3 create-mfi.py --help
usage: create-mfi.py [-h] device_name pkc_file l4t_for_linux_folder

positional arguments:
  device_name           the device name, one of jetson-tx2, jetson-nano
  pkc_file              the file path of the 2048 bit RSA private KEY
                        file(.pem file) of this device
  l4t_for_linux_folder  the folder path of the L4T_for_Linux folder

optional arguments:
  -h, --help            show this help message and exit
$ sudo python3 create-mfi.py jetson-nano '/l4tpool/l4timages/emi_pkc_nano.pem' '/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/'
pkc_file: /l4tpool/l4timages/emi_pkc_nano.pem
l4t_for_linux_folder: /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/
entering /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/
burning fuses...
executing ['sudo', '/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/nvmassflashgen_reuse.sh', 'BOARDID=3448', 'FAB=200', 'BOARDSKU=0002', '-i', '0x21', '-c', 'PKC', '-k', '/l4tpool/l4timages/emi_pkc_nano.pem', 'jetson-nano-emmc', 'mmcblk0p1']
================================================================================
|| Generate Massflash Image in the master host:                               ||
|| Requires the Jetson connected in RCM mode.                                 ||
================================================================================
1 Jetson devices in RCM mode. USB: 3-9
+-------------------------------------------------------------------------------
| Step 1: Generate Command File
+-------------------------------------------------------------------------------
###############################################################################
# L4T BSP Information:
# R32 , REVISION: 3.1
###############################################################################
Board ID() version() 
copying bctfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/BCT/P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg)... done.
copying bootloader(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
copying initrd(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/l4t_initrd.img)... done.
	populating kernel to rootfs... done.
	populating initrd to rootfs... done.
	populating /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0000-p3449-0000-a00.dtb to rootfs... done.
Making Boot image... done.
Existing sosfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
copying tegraboot(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/nvtboot.bin)... done.
copying cpu_bootloader(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
copying bpffile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/sc7entry-firmware.bin)... done.
Existing badpagefile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/badpage.bin) reused.
copying wb0boot(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/warmboot.bin)... done.
Existing tosfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/tos-mon-only.img) reused.
Existing eksfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/eks.img) reused.
copying dtbfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0000-p3449-0000-a00.dtb)... done.
Copying nv_boot_control.conf to rootfs
Reusing existing system.img... 
done.
Existing tbcfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
copying tbcdtbfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0000-p3449-0000-a00.dtb)... done.
copying cfgfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/cfg/flash_l4t_t210_emmc_p3448.xml) to flash.xml... done.
copying flasher(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
Existing flashapp(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/tegraflash.py) reused.
./tegraflash.py --bl cboot.bin --bct  P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg --odmdata 0x94000 --bldtb tegra210-p3448-0000-p3449-0000-a00.dtb --applet nvtboot_recovery.bin --cmd "flash; reboot"  --cfg flash.xml --chip 0x21    --bins "EBT cboot.bin; DTB tegra210-p3448-0000-p3449-0000-a00.dtb" 
saving flash command in /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/flashcmd.txt
saving Windows flash command to /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/flash_win.bat
*** no-flash flag enabled. Exiting now... *** 
+-------------------------------------------------------------------------------
| Step 2: Sign Binaries
+-------------------------------------------------------------------------------
./tegraflash.py --bl cboot.bin --bct  P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg --odmdata 0x94000 --bldtb tegra210-p3448-0000-p3449-0000-a00.dtb --applet nvtboot_recovery.bin --cmd " sign"  --cfg flash.xml --chip 0x21    --bins "EBT cboot.bin; DTB tegra210-p3448-0000-p3449-0000-a00.dtb"  --keep --skipuid
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0305 ] tegrasign --key None --getmode mode.txt
[   0.0323 ] Assuming zero filled SBK key
[   0.0326 ] 
[   0.0797 ] Generating RCM messages
[   0.0817 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm nvtboot_recovery.bin 0 0
[   0.0830 ] RCM 0 is saved as rcm_0.rcm
[   0.0839 ] RCM 1 is saved as rcm_1.rcm
[   0.0841 ] List of rcm files are saved in rcm_list.xml
[   0.0841 ] 
[   0.0841 ] Signing RCM messages
[   0.0861 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0878 ] Assuming zero filled SBK key
[   0.1387 ] 
[   0.1387 ] Copying signature to RCM mesages
[   0.1409 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml
[   0.1439 ] 
[   0.1439 ] Parsing partition layout
[   0.1460 ] tegraparser --pt flash.xml.tmp
[   0.1490 ] 
[   0.1490 ] Creating list of images to be signed
[   0.1651 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --list images_list.xml
[   0.2521 ] 
[   0.2522 ] Generating signatures
[   0.2545 ] tegrasign --key None --list images_list.xml --pubkeyhash pub_key.key
[   0.2565 ] Assuming zero filled SBK key
[   0.3754 ] 
[   0.3755 ] Generating br-bct
[   0.4901 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg --chip 0x21 0
[   0.4922 ] Copying Sdram info from 0 to 1 set
[   0.4955 ] Copying Sdram info from 1 to 2 set
[   0.4956 ] Copying Sdram info from 2 to 3 set
[   0.4956 ] 
[   0.4956 ] Updating boot device parameters
[   0.4976 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatedevparam flash.xml.bin
[   0.4995 ] Warning: No sdram params
[   0.4999 ] 
[   0.4999 ] Updating bl info
[   0.5020 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   0.5042 ] 
[   0.5043 ] Updating secondary storage information into bct
[   0.5063 ] tegraparser --pt flash.xml.bin --chip 0x21 0 --updatecustinfo P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct
[   0.5078 ] 
[   0.5079 ] Updating Odmdata
[   0.5098 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatefields Odmdata =0x94000
[   0.5117 ] Warning: No sdram params
[   0.5121 ] 
[   0.5121 ] Get Signed section of bct
[   0.5135 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --listbct bct_list.xml
[   0.5156 ] 
[   0.5157 ] Signing BCT
[   0.5187 ] tegrasign --key None --list bct_list.xml --pubkeyhash pub_key.key
[   0.5202 ] Assuming zero filled SBK key
[   0.5215 ] 
[   0.5216 ] Updating BCT with signature
[   0.5233 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatesig bct_list_signed.xml
[   0.5253 ] 
[   0.5253 ] Copying signatures
[   0.5270 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   0.5353 ] 
[   0.5353 ] Updating BFS information on BCT
[   0.5372 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatebfsinfo flash.xml.bin
[   0.5391 ]    BFS:
[   0.5423 ]      0: [PT ] flash.xml.bin (size=4337/131072)
[   0.5428 ]      1: [TBC] nvtboot_cpu.bin.encrypt (size=65760/196608)
[   0.5433 ]      2: [RP1] tegra210-p3448-0000-p3449-0000-a00.dtb.encrypt (size=215392/1048576)
[   0.5440 ]      3: [EBT] cboot.bin.encrypt (size=484304/655360)
[   0.5445 ]      4: [WB0] warmboot.bin.encrypt (size=3952/131072)
[   0.5450 ]      5: [BPF] sc7entry-firmware.bin.encrypt (size=3376/262144)
[   0.5456 ] BFS0: 131072 @ 2560 SUM 7ef3f446 over 2883584 bytes
[   0.5461 ]    BFS:
[   0.5469 ]      0: [PT-1] flash.xml.bin (size=4337/131072)
[   0.5474 ]      1: [TBC-1] nvtboot_cpu.bin.encrypt (size=65760/196608)
[   0.5479 ]      2: [RP1-1] tegra210-p3448-0000-p3449-0000-a00.dtb.encrypt (size=215392/1048576)
[   0.5486 ]      3: [EBT-1] cboot.bin.encrypt (size=484304/655360)
[   0.5491 ]      4: [WB0-1] warmboot.bin.encrypt (size=3952/131072)
[   0.5496 ]      5: [BPF-1] sc7entry-firmware.bin.encrypt (size=3376/262144)
[   0.5500 ] BFS1: 131072 @ 8704 SUM 7ef3f446 over 2883584 bytes
[   0.5503 ]    KFS:
[   0.5906 ]      0: [DTB] tegra210-p3448-0000-p3449-0000-a00.dtb.encrypt (size=215392/1048576)
[   0.5913 ]      1: [TOS] tos-mon-only.img.encrypt (size=54208/6291456)
[   0.5919 ]      2: [EKS] eks.img (size=1028/81920)
[   0.5923 ]      3: [LNX] boot.img.encrypt (size=483328/67092480)
[   0.5928 ] KFS0: 1048576 @ 29376546 SUM 23c068dd over 7905280 bytes
[   0.5964 ]    KFS:
[   0.6354 ]      0: [DTB-1] tegra210-p3448-0000-p3449-0000-a00.dtb.encrypt (size=215392/1048576)
[   0.6363 ]      1: [TOS-1] tos-mon-only.img.encrypt (size=54208/6291456)
[   0.6369 ]      2: [EKS-1] eks.img (size=1028/81920)
[   0.6374 ]      3: [LNX-1] boot.img.encrypt (size=483328/67092480)
[   0.6379 ] KFS1: 1048576 @ 29522082 SUM 23c068dd over 7905280 bytes
[   0.6407 ] 
[   0.6408 ] Copying signed file in /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/signed
Keep temporary directory /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/21426
+-------------------------------------------------------------------------------
| Step 3: Generate Mass-flash scripts
+-------------------------------------------------------------------------------
+-------------------------------------------------------------------------------
| Step 4: Generate Mass-flash image tarball
+-------------------------------------------------------------------------------
copying nvmflash.sh ... succeeded.
copying nvaflash.sh ... succeeded.
copying emmc_bootblob_ver.txt ... succeeded.
mfi_jetson-nano-emmc/
mfi_jetson-nano-emmc/nvaflash.sh
mfi_jetson-nano-emmc/rcm_0.rcm
mfi_jetson-nano-emmc/nvmflash.sh
mfi_jetson-nano-emmc/mfi.log
mfi_jetson-nano-emmc/rcm_list_signed.xml
mfi_jetson-nano-emmc/sc7entry-firmware.bin
mfi_jetson-nano-emmc/tegradevflash
mfi_jetson-nano-emmc/NVIDIA_Trademark_License_Addendum_SW.pdf
mfi_jetson-nano-emmc/rp4.blob
mfi_jetson-nano-emmc/tos-mon-only.img.encrypt
mfi_jetson-nano-emmc/tegraflash_internal.py
mfi_jetson-nano-emmc/cvm.bin
mfi_jetson-nano-emmc/P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg
mfi_jetson-nano-emmc/LICENSE.chkbdinfo
mfi_jetson-nano-emmc/tegrarcm
mfi_jetson-nano-emmc/flash.xml.bin
mfi_jetson-nano-emmc/bct_list.xml
mfi_jetson-nano-emmc/cboot.bin.encrypt
mfi_jetson-nano-emmc/nvtboot_cpu.bin
mfi_jetson-nano-emmc/nvtboot.bin.encrypt
mfi_jetson-nano-emmc/LICENSE.mkbootimg
mfi_jetson-nano-emmc/tos.img
mfi_jetson-nano-emmc/rcm_1.rcm
mfi_jetson-nano-emmc/warmboot.bin.encrypt
mfi_jetson-nano-emmc/LICENSE.mkbctpart
mfi_jetson-nano-emmc/flash_win.bat
mfi_jetson-nano-emmc/LICENSE.tos-mon-only.img.arm-trusted-firmware
mfi_jetson-nano-emmc/LICENSE.mkgpt
mfi_jetson-nano-emmc/BUP_generator.py
mfi_jetson-nano-emmc/rcm_1_encrypt.rcm
mfi_jetson-nano-emmc/odmfuse_pkc.xml
mfi_jetson-nano-emmc/images_list_signed.xml
mfi_jetson-nano-emmc/LICENSE.mksparse
mfi_jetson-nano-emmc/nvtboot_cpu.bin.encrypt
mfi_jetson-nano-emmc/tegrasign
mfi_jetson-nano-emmc/nvtboot_recovery_cpu.bin
mfi_jetson-nano-emmc/bct_list_signed.xml
mfi_jetson-nano-emmc/tegraflash.py
mfi_jetson-nano-emmc/rcm_list.xml
mfi_jetson-nano-emmc/sc7entry-firmware.bin.encrypt
mfi_jetson-nano-emmc/flash.xml
mfi_jetson-nano-emmc/mkgpt
mfi_jetson-nano-emmc/LICENSE
mfi_jetson-nano-emmc/nvidia-l4t-bootloader_32.3.1-20191209225816_arm64.deb
mfi_jetson-nano-emmc/badpage.bin
mfi_jetson-nano-emmc/nvtboot.bin
mfi_jetson-nano-emmc/tegrabct
mfi_jetson-nano-emmc/boot.img
mfi_jetson-nano-emmc/tegra210-p3448-0000-p3449-0000-a00.dtb.encrypt
mfi_jetson-nano-emmc/images_list.xml
mfi_jetson-nano-emmc/rcm_0_encrypt.rcm
mfi_jetson-nano-emmc/extlinux.conf
mfi_jetson-nano-emmc/P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct.encrypt
mfi_jetson-nano-emmc/l4t_initrd.img
mfi_jetson-nano-emmc/cboot.bin
mfi_jetson-nano-emmc/warmboot.bin
mfi_jetson-nano-emmc/mksparse
mfi_jetson-nano-emmc/system.img
mfi_jetson-nano-emmc/P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct
mfi_jetson-nano-emmc/LICENSE.u-boot
mfi_jetson-nano-emmc/tegra210-p3448-0002-p3449-0000-b00.dtb
mfi_jetson-nano-emmc/nv_boot_control.conf
mfi_jetson-nano-emmc/tegrahost
mfi_jetson-nano-emmc/tos-mon-only.img
mfi_jetson-nano-emmc/tegraparser
mfi_jetson-nano-emmc/mkbootimg
mfi_jetson-nano-emmc/initrd
mfi_jetson-nano-emmc/nvtboot_recovery.bin
mfi_jetson-nano-emmc/mkbctpart
mfi_jetson-nano-emmc/tegraflash_internal.pyc
mfi_jetson-nano-emmc/emmc_bootblob_ver.txt
mfi_jetson-nano-emmc/chkbdinfo
mfi_jetson-nano-emmc/boot.img.encrypt
mfi_jetson-nano-emmc/tegra210-p3448-0000-p3449-0000-a00.dtb
mfi_jetson-nano-emmc/eks.img
mfi_jetson-nano-emmc/bmp.blob
********************************************************************************
*** Mass Flashing tarball mfi_jetson-nano-emmc.tbz2 is ready.
********************************************************************************
    1. Download mfi_jetson-nano-emmc.tbz2 to each flashing hosts.
    2. Untar mfi_jetson-nano-emmc.tbz2. ( tar xvjf mfi_jetson-nano-emmc.tbz2 )
    3. cd mfi_jetson-nano-emmc
    4. Connect Jetson boards(jetson-nano-emmc only) and put them in RCM mode.
    5. ./nvmflash.sh


finished running burn-fuses.py

3. flash the mfi file (for each device)

  1. Download mfi_jetson-nano-emmc.tbz2 to each flashing hosts.
  2. Untar mfi_jetson-nano-emmc.tbz2. ( tar xvjf mfi_jetson-nano-emmc.tbz2 )
  3. cd mfi_jetson-nano-emmc
  4. Connect Jetson boards(jetson-nano-emmc only) and put them in RCM mode.
  5. sudo ./nvmflash.sh
$ sudo ./nvmflash.sh 
[sudo] password for tsato: 
Start flashing device: 3-9, PID: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes:
Flash complete (SUCCESS)

At the step 2, what condition do you expect for the Linux_for_Tegra folder?

Let me ask again. Does this matter or not? I don’t need to create a fresh Linux_for_Tegra folder after burning fuses to devices?

Hi TakenoriSato,

We’re follow below steps, confirm the device can boot up success:

  1. Burn fuses with PKC

$ sudo ./odmfuse.sh -i 0x21 -c PKC -k …/emi_pkc.pem -o 0x0000000000000000000000000000000000000000000000000000000100000000

  1. Create the mfi file

$ sudo ./nvmassflashgen.sh BOARDID=3448 FAB=200 BOARDSKU=0002 -x 0x21 -y PKC -u rsa_priv.pem jetson-nano-emmc mmcblk0p1

  1. flash the mfi file

tar xvjf mfi_jetson-nano-emmc.tbz2 cd mfi_jetson-nano-emmc
$ sudo ./nvmflash.sh --showlogs

We also tried add ‘-r’ command in nvmassflashgen.sh, result pass too.
You can reference: How to flash a pre built image with secureboot?

Hi,

That sound encouraging! I have received 5 new boxes, and will try today.

Thanks.

Hi,

I have successfully burned and flashed a signed image with the procedure.

I am not sure if this is related or not, but I found a bug in my python program, in which -k was used for the nvmassflashgen.sh. It had to be -u.

I will try flashing another new box, then mark this issue as resolved.

Thanks.

1 Like

Confirmed it worked. Thanks!

1 Like