Hi,
If I follow the README, I have gone through all the problems I shared before.
So here’s my exact commands (simply wrapped by a Python command).
1. burn fuses with PKC and odm_reserved (for each device)
$ python3 burn-fuses.py --help
usage: burn-fuses.py [-h] [-p] [-d DEVICEID] [-s SECRET]
device_name pkc_file l4t_for_linux_folder
positional arguments:
device_name the device name, one of jetson-tx2, jetson-nano
pkc_file the file path of the 2048 bit RSA private KEY
file(.pem file) of this device
l4t_for_linux_folder the folder path of the L4T_for_Linux folder
optional arguments:
-h, --help show this help message and exit
-p, --production enable the production mode if set
-d DEVICEID, --deviceid DEVICEID
use this deviceid if set, otherwise it will get from
an id generator service
-s SECRET, --secret SECRET
use this secret key (without 0x) if set, otherwise it
will generate one
example
$ sudo python3 burn-fuses.py jetson-nano '/l4tpool/l4timages/emi_pkc_nano.pem' '/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/' -d abcd0012 -s 9e6b357faad875cad1b4c6a2ba9bacc5a5a34dc000000001
pkc_file: /l4tpool/l4timages/emi_pkc_nano.pem
l4t_for_linux_folder: /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/
entering /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/
making a value for the odm_reserved field
burning fuses...
executing ['sudo', '/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/odmfuse.sh', '-j', '-i', '0x21', '-c', 'PKC', '-k', '/l4tpool/l4timages/emi_pkc_nano.pem', '-o', '0xabcd00129e6b357faad875cad1b4c6a2ba9bacc5a5a34dc00000000100000000']
*** Calculating HASH from keyfile /l4tpool/l4timages/emi_pkc_nano.pem ... done
PKC HASH: 0x78e352f7bb4cc4f0ea430b73947efe33a4e86650f935257d4fdce560e0e9ba0b
*** Generating fuse configuration ... done.
done.
*** Start fusing ...
./tegraflash.py --chip 0x21 --applet nvtboot_recovery.bin --cmd "blowfuses odmfuse_pkc.xml;"
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0052 ] Parsing fuse info as per xml file
[ 0.0069 ] tegraparser --fuse_info odmfuse_pkc.xml blow_fuse_data.bin
[ 0.0093 ]
[ 0.0094 ] Generating RCM messages
[ 0.0111 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm nvtboot_recovery.bin 0 0
[ 0.0128 ] RCM 0 is saved as rcm_0.rcm
[ 0.0138 ] RCM 1 is saved as rcm_1.rcm
[ 0.0142 ] List of rcm files are saved in rcm_list.xml
[ 0.0142 ]
[ 0.0142 ] Signing RCM messages
[ 0.0160 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0178 ] Assuming zero filled SBK key
[ 0.0289 ]
[ 0.0289 ] Copying signature to RCM mesages
[ 0.0309 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml
[ 0.0338 ]
[ 0.0338 ] Boot Rom communication
[ 0.0357 ] tegrarcm --chip 0x21 0 --rcm rcm_list_signed.xml
[ 0.0369 ] BootRom is not running
[ 0.2403 ]
[ 0.2403 ] Blowing fuses
[ 0.2423 ] tegrarcm --oem blowfuses blow_fuse_data.bin
[ 0.2444 ] Applet version 00.01.0000
[ 0.5820 ] Successfully burnt fuses as per fuse info blob
[ 0.5947 ]
*** The fuse configuration is saved in bootloader/odmfuse_pkc.xml
*** The ODM fuse has been secured with PKC keys.
*** Flash "signed BCT and bootloader(s)".
*** done.
finished running burn-fuses.py
2. create a mfi file(once)
$ python3 create-mfi.py --help
usage: create-mfi.py [-h] device_name pkc_file l4t_for_linux_folder
positional arguments:
device_name the device name, one of jetson-tx2, jetson-nano
pkc_file the file path of the 2048 bit RSA private KEY
file(.pem file) of this device
l4t_for_linux_folder the folder path of the L4T_for_Linux folder
optional arguments:
-h, --help show this help message and exit
$ sudo python3 create-mfi.py jetson-nano '/l4tpool/l4timages/emi_pkc_nano.pem' '/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/'
pkc_file: /l4tpool/l4timages/emi_pkc_nano.pem
l4t_for_linux_folder: /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/
entering /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/
burning fuses...
executing ['sudo', '/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/nvmassflashgen_reuse.sh', 'BOARDID=3448', 'FAB=200', 'BOARDSKU=0002', '-i', '0x21', '-c', 'PKC', '-k', '/l4tpool/l4timages/emi_pkc_nano.pem', 'jetson-nano-emmc', 'mmcblk0p1']
================================================================================
|| Generate Massflash Image in the master host: ||
|| Requires the Jetson connected in RCM mode. ||
================================================================================
1 Jetson devices in RCM mode. USB: 3-9
+-------------------------------------------------------------------------------
| Step 1: Generate Command File
+-------------------------------------------------------------------------------
###############################################################################
# L4T BSP Information:
# R32 , REVISION: 3.1
###############################################################################
Board ID() version()
copying bctfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/BCT/P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg)... done.
copying bootloader(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
copying initrd(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/l4t_initrd.img)... done.
populating kernel to rootfs... done.
populating initrd to rootfs... done.
populating /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0000-p3449-0000-a00.dtb to rootfs... done.
Making Boot image... done.
Existing sosfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
copying tegraboot(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/nvtboot.bin)... done.
copying cpu_bootloader(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
copying bpffile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/sc7entry-firmware.bin)... done.
Existing badpagefile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/badpage.bin) reused.
copying wb0boot(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/warmboot.bin)... done.
Existing tosfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/tos-mon-only.img) reused.
Existing eksfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/eks.img) reused.
copying dtbfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0000-p3449-0000-a00.dtb)... done.
Copying nv_boot_control.conf to rootfs
Reusing existing system.img...
done.
Existing tbcfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
copying tbcdtbfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0000-p3449-0000-a00.dtb)... done.
copying cfgfile(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/cfg/flash_l4t_t210_emmc_p3448.xml) to flash.xml... done.
copying flasher(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
Existing flashapp(/l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/tegraflash.py) reused.
./tegraflash.py --bl cboot.bin --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg --odmdata 0x94000 --bldtb tegra210-p3448-0000-p3449-0000-a00.dtb --applet nvtboot_recovery.bin --cmd "flash; reboot" --cfg flash.xml --chip 0x21 --bins "EBT cboot.bin; DTB tegra210-p3448-0000-p3449-0000-a00.dtb"
saving flash command in /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/flashcmd.txt
saving Windows flash command to /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/flash_win.bat
*** no-flash flag enabled. Exiting now... ***
+-------------------------------------------------------------------------------
| Step 2: Sign Binaries
+-------------------------------------------------------------------------------
./tegraflash.py --bl cboot.bin --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg --odmdata 0x94000 --bldtb tegra210-p3448-0000-p3449-0000-a00.dtb --applet nvtboot_recovery.bin --cmd " sign" --cfg flash.xml --chip 0x21 --bins "EBT cboot.bin; DTB tegra210-p3448-0000-p3449-0000-a00.dtb" --keep --skipuid
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0305 ] tegrasign --key None --getmode mode.txt
[ 0.0323 ] Assuming zero filled SBK key
[ 0.0326 ]
[ 0.0797 ] Generating RCM messages
[ 0.0817 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm nvtboot_recovery.bin 0 0
[ 0.0830 ] RCM 0 is saved as rcm_0.rcm
[ 0.0839 ] RCM 1 is saved as rcm_1.rcm
[ 0.0841 ] List of rcm files are saved in rcm_list.xml
[ 0.0841 ]
[ 0.0841 ] Signing RCM messages
[ 0.0861 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0878 ] Assuming zero filled SBK key
[ 0.1387 ]
[ 0.1387 ] Copying signature to RCM mesages
[ 0.1409 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml
[ 0.1439 ]
[ 0.1439 ] Parsing partition layout
[ 0.1460 ] tegraparser --pt flash.xml.tmp
[ 0.1490 ]
[ 0.1490 ] Creating list of images to be signed
[ 0.1651 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --list images_list.xml
[ 0.2521 ]
[ 0.2522 ] Generating signatures
[ 0.2545 ] tegrasign --key None --list images_list.xml --pubkeyhash pub_key.key
[ 0.2565 ] Assuming zero filled SBK key
[ 0.3754 ]
[ 0.3755 ] Generating br-bct
[ 0.4901 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg --chip 0x21 0
[ 0.4922 ] Copying Sdram info from 0 to 1 set
[ 0.4955 ] Copying Sdram info from 1 to 2 set
[ 0.4956 ] Copying Sdram info from 2 to 3 set
[ 0.4956 ]
[ 0.4956 ] Updating boot device parameters
[ 0.4976 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatedevparam flash.xml.bin
[ 0.4995 ] Warning: No sdram params
[ 0.4999 ]
[ 0.4999 ] Updating bl info
[ 0.5020 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[ 0.5042 ]
[ 0.5043 ] Updating secondary storage information into bct
[ 0.5063 ] tegraparser --pt flash.xml.bin --chip 0x21 0 --updatecustinfo P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct
[ 0.5078 ]
[ 0.5079 ] Updating Odmdata
[ 0.5098 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatefields Odmdata =0x94000
[ 0.5117 ] Warning: No sdram params
[ 0.5121 ]
[ 0.5121 ] Get Signed section of bct
[ 0.5135 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --listbct bct_list.xml
[ 0.5156 ]
[ 0.5157 ] Signing BCT
[ 0.5187 ] tegrasign --key None --list bct_list.xml --pubkeyhash pub_key.key
[ 0.5202 ] Assuming zero filled SBK key
[ 0.5215 ]
[ 0.5216 ] Updating BCT with signature
[ 0.5233 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatesig bct_list_signed.xml
[ 0.5253 ]
[ 0.5253 ] Copying signatures
[ 0.5270 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[ 0.5353 ]
[ 0.5353 ] Updating BFS information on BCT
[ 0.5372 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatebfsinfo flash.xml.bin
[ 0.5391 ] BFS:
[ 0.5423 ] 0: [PT ] flash.xml.bin (size=4337/131072)
[ 0.5428 ] 1: [TBC] nvtboot_cpu.bin.encrypt (size=65760/196608)
[ 0.5433 ] 2: [RP1] tegra210-p3448-0000-p3449-0000-a00.dtb.encrypt (size=215392/1048576)
[ 0.5440 ] 3: [EBT] cboot.bin.encrypt (size=484304/655360)
[ 0.5445 ] 4: [WB0] warmboot.bin.encrypt (size=3952/131072)
[ 0.5450 ] 5: [BPF] sc7entry-firmware.bin.encrypt (size=3376/262144)
[ 0.5456 ] BFS0: 131072 @ 2560 SUM 7ef3f446 over 2883584 bytes
[ 0.5461 ] BFS:
[ 0.5469 ] 0: [PT-1] flash.xml.bin (size=4337/131072)
[ 0.5474 ] 1: [TBC-1] nvtboot_cpu.bin.encrypt (size=65760/196608)
[ 0.5479 ] 2: [RP1-1] tegra210-p3448-0000-p3449-0000-a00.dtb.encrypt (size=215392/1048576)
[ 0.5486 ] 3: [EBT-1] cboot.bin.encrypt (size=484304/655360)
[ 0.5491 ] 4: [WB0-1] warmboot.bin.encrypt (size=3952/131072)
[ 0.5496 ] 5: [BPF-1] sc7entry-firmware.bin.encrypt (size=3376/262144)
[ 0.5500 ] BFS1: 131072 @ 8704 SUM 7ef3f446 over 2883584 bytes
[ 0.5503 ] KFS:
[ 0.5906 ] 0: [DTB] tegra210-p3448-0000-p3449-0000-a00.dtb.encrypt (size=215392/1048576)
[ 0.5913 ] 1: [TOS] tos-mon-only.img.encrypt (size=54208/6291456)
[ 0.5919 ] 2: [EKS] eks.img (size=1028/81920)
[ 0.5923 ] 3: [LNX] boot.img.encrypt (size=483328/67092480)
[ 0.5928 ] KFS0: 1048576 @ 29376546 SUM 23c068dd over 7905280 bytes
[ 0.5964 ] KFS:
[ 0.6354 ] 0: [DTB-1] tegra210-p3448-0000-p3449-0000-a00.dtb.encrypt (size=215392/1048576)
[ 0.6363 ] 1: [TOS-1] tos-mon-only.img.encrypt (size=54208/6291456)
[ 0.6369 ] 2: [EKS-1] eks.img (size=1028/81920)
[ 0.6374 ] 3: [LNX-1] boot.img.encrypt (size=483328/67092480)
[ 0.6379 ] KFS1: 1048576 @ 29522082 SUM 23c068dd over 7905280 bytes
[ 0.6407 ]
[ 0.6408 ] Copying signed file in /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/signed
Keep temporary directory /l4tpool/l4timages/Nano/L4T32.3.1/Linux_for_Tegra/bootloader/21426
+-------------------------------------------------------------------------------
| Step 3: Generate Mass-flash scripts
+-------------------------------------------------------------------------------
+-------------------------------------------------------------------------------
| Step 4: Generate Mass-flash image tarball
+-------------------------------------------------------------------------------
copying nvmflash.sh ... succeeded.
copying nvaflash.sh ... succeeded.
copying emmc_bootblob_ver.txt ... succeeded.
mfi_jetson-nano-emmc/
mfi_jetson-nano-emmc/nvaflash.sh
mfi_jetson-nano-emmc/rcm_0.rcm
mfi_jetson-nano-emmc/nvmflash.sh
mfi_jetson-nano-emmc/mfi.log
mfi_jetson-nano-emmc/rcm_list_signed.xml
mfi_jetson-nano-emmc/sc7entry-firmware.bin
mfi_jetson-nano-emmc/tegradevflash
mfi_jetson-nano-emmc/NVIDIA_Trademark_License_Addendum_SW.pdf
mfi_jetson-nano-emmc/rp4.blob
mfi_jetson-nano-emmc/tos-mon-only.img.encrypt
mfi_jetson-nano-emmc/tegraflash_internal.py
mfi_jetson-nano-emmc/cvm.bin
mfi_jetson-nano-emmc/P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg
mfi_jetson-nano-emmc/LICENSE.chkbdinfo
mfi_jetson-nano-emmc/tegrarcm
mfi_jetson-nano-emmc/flash.xml.bin
mfi_jetson-nano-emmc/bct_list.xml
mfi_jetson-nano-emmc/cboot.bin.encrypt
mfi_jetson-nano-emmc/nvtboot_cpu.bin
mfi_jetson-nano-emmc/nvtboot.bin.encrypt
mfi_jetson-nano-emmc/LICENSE.mkbootimg
mfi_jetson-nano-emmc/tos.img
mfi_jetson-nano-emmc/rcm_1.rcm
mfi_jetson-nano-emmc/warmboot.bin.encrypt
mfi_jetson-nano-emmc/LICENSE.mkbctpart
mfi_jetson-nano-emmc/flash_win.bat
mfi_jetson-nano-emmc/LICENSE.tos-mon-only.img.arm-trusted-firmware
mfi_jetson-nano-emmc/LICENSE.mkgpt
mfi_jetson-nano-emmc/BUP_generator.py
mfi_jetson-nano-emmc/rcm_1_encrypt.rcm
mfi_jetson-nano-emmc/odmfuse_pkc.xml
mfi_jetson-nano-emmc/images_list_signed.xml
mfi_jetson-nano-emmc/LICENSE.mksparse
mfi_jetson-nano-emmc/nvtboot_cpu.bin.encrypt
mfi_jetson-nano-emmc/tegrasign
mfi_jetson-nano-emmc/nvtboot_recovery_cpu.bin
mfi_jetson-nano-emmc/bct_list_signed.xml
mfi_jetson-nano-emmc/tegraflash.py
mfi_jetson-nano-emmc/rcm_list.xml
mfi_jetson-nano-emmc/sc7entry-firmware.bin.encrypt
mfi_jetson-nano-emmc/flash.xml
mfi_jetson-nano-emmc/mkgpt
mfi_jetson-nano-emmc/LICENSE
mfi_jetson-nano-emmc/nvidia-l4t-bootloader_32.3.1-20191209225816_arm64.deb
mfi_jetson-nano-emmc/badpage.bin
mfi_jetson-nano-emmc/nvtboot.bin
mfi_jetson-nano-emmc/tegrabct
mfi_jetson-nano-emmc/boot.img
mfi_jetson-nano-emmc/tegra210-p3448-0000-p3449-0000-a00.dtb.encrypt
mfi_jetson-nano-emmc/images_list.xml
mfi_jetson-nano-emmc/rcm_0_encrypt.rcm
mfi_jetson-nano-emmc/extlinux.conf
mfi_jetson-nano-emmc/P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct.encrypt
mfi_jetson-nano-emmc/l4t_initrd.img
mfi_jetson-nano-emmc/cboot.bin
mfi_jetson-nano-emmc/warmboot.bin
mfi_jetson-nano-emmc/mksparse
mfi_jetson-nano-emmc/system.img
mfi_jetson-nano-emmc/P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct
mfi_jetson-nano-emmc/LICENSE.u-boot
mfi_jetson-nano-emmc/tegra210-p3448-0002-p3449-0000-b00.dtb
mfi_jetson-nano-emmc/nv_boot_control.conf
mfi_jetson-nano-emmc/tegrahost
mfi_jetson-nano-emmc/tos-mon-only.img
mfi_jetson-nano-emmc/tegraparser
mfi_jetson-nano-emmc/mkbootimg
mfi_jetson-nano-emmc/initrd
mfi_jetson-nano-emmc/nvtboot_recovery.bin
mfi_jetson-nano-emmc/mkbctpart
mfi_jetson-nano-emmc/tegraflash_internal.pyc
mfi_jetson-nano-emmc/emmc_bootblob_ver.txt
mfi_jetson-nano-emmc/chkbdinfo
mfi_jetson-nano-emmc/boot.img.encrypt
mfi_jetson-nano-emmc/tegra210-p3448-0000-p3449-0000-a00.dtb
mfi_jetson-nano-emmc/eks.img
mfi_jetson-nano-emmc/bmp.blob
********************************************************************************
*** Mass Flashing tarball mfi_jetson-nano-emmc.tbz2 is ready.
********************************************************************************
1. Download mfi_jetson-nano-emmc.tbz2 to each flashing hosts.
2. Untar mfi_jetson-nano-emmc.tbz2. ( tar xvjf mfi_jetson-nano-emmc.tbz2 )
3. cd mfi_jetson-nano-emmc
4. Connect Jetson boards(jetson-nano-emmc only) and put them in RCM mode.
5. ./nvmflash.sh
finished running burn-fuses.py
3. flash the mfi file (for each device)
- Download mfi_jetson-nano-emmc.tbz2 to each flashing hosts.
- Untar mfi_jetson-nano-emmc.tbz2. ( tar xvjf mfi_jetson-nano-emmc.tbz2 )
- cd mfi_jetson-nano-emmc
- Connect Jetson boards(jetson-nano-emmc only) and put them in RCM mode.
- sudo ./nvmflash.sh
$ sudo ./nvmflash.sh
[sudo] password for tsato:
Start flashing device: 3-9, PID: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes: 5569
Ongoing processes:
Flash complete (SUCCESS)
At the step 2, what condition do you expect for the Linux_for_Tegra folder?
Let me ask again. Does this matter or not? I don’t need to create a fresh Linux_for_Tegra folder after burning fuses to devices?