Can not start up tx2

my tx2 module can not start up

when i give to power it only flash as below and stoped。

[0000.185] I> Welcome to MB2(TBoot-BPMP)(version: 01.00.160913-t186-M-00.00-mobile-c4328dc3)
[0000.193] I> Default Heap @ [0xd486400 - 0xd488400]
[0000.198] I> DMA Heap @ [0x85200000 - 0x86200000]
[0000.202] I> bit @ 0xd480000
[0000.205] I> BR-BCT relocated to 0xd7020000
[0000.209] I> Boot-device: eMMC
[0000.213] I> sdmmc bdev is already initialized
[0000.218] I> pmic: reset reason (nverc) : 0x50
[0000.222] I> Reading GPT from 512 for device 00000003
[0000.228] I> Reading GPT from 8388096 for device 00000003
[0000.235] I> Found 13 partitions in 00000003 device
[0000.240] I> Reading GPT from 512 for device 00010003
[0000.247] I> Found 29 partitions in 00010003 device
[0000.252] W> No valid slot number is found in scratch register
[0000.258] W> Return default slot: _a
[0000.261] I> A/B: bin_type (16) slot 0
[0000.265] I> Loading partition bpmp-fw at 0xd7800000
[0000.270] I> Reading two headers - addr:0xd7800000 blocks:1
[0000.275] I> Addr: 0xd7800000, start-block: 58761217, num_blocks: 1
[0000.290] I> Binary(16) of size 529040 is loaded @ 0xd7800000
[0000.296] W> No valid slot number is found in scratch register
[0000.301] W> Return default slot: _a
[0000.305] I> A/B: bin_type (17) slot 0
[0000.308] I> Loading partition bpmp-fw-dtb at 0xd79f0000
[0000.314] I> Reading two headers - addr:0xd79f0000 blocks:1
[0000.319] I> Addr: 0xd79f0000, start-block: 58763633, num_blocks: 1
[0000.333] I> Binary(17) of size 465760 is loaded @ 0xd798e200
[0000.511] I> BPMP-FW load address = 0xd7800000
[0000.515] I> BPMP-FW DTB load address = 0x5018e200
[0000.520] I> Loading SCE-FW …
[0000.523] W> No valid slot number is found in scratch register
[0000.529] W> Return default slot: _a
[0000.532] I> A/B: bin_type (12) slot 0
[0000.536] I> Loading partition sce-fw at 0xd7300000
[0000.541] I> Reading two headers - addr:0xd7300000 blocks:1
[0000.546] I> Addr: 0xd7300000, start-block: 58765633, num_blocks: 1
[0000.555] I> Binary(12) of size 76592 is loaded @ 0xd7300000
[0000.560] I> Init SCE
[0000.563] I> Copy BTCM section
[0000.566] W> No valid slot number is found in scratch register
[0000.571] W> Return default slot: _a
[0000.575] I> A/B: bin_type (13) slot 0
[0000.578] I> Loading partition cpu-bootloader at 0x96000000
[0000.584] I> Reading two headers - addr:0x96000000 blocks:1
[0000.589] I> Addr: 0x96000000, start-block: 58740737, num_blocks: 1
[0000.601] I> Binary(13) of size 280624 is loaded @ 0x96000000
[0000.606] W> No valid slot number is found in scratch register
[0000.612] W> Return default slot: _a
[0000.615] I> A/B: bin_type (20) slot 0
[0000.619] I> Loading partition bootloader-dtb at 0x8520f400
[0000.625] I> Reading two headers - addr:0x8520f400 blocks:1
[0000.630] I> Addr: 0x8520f400, start-block: 58742785, num_blocks: 1
[0000.641] I> Binary(20) of size 216496 is loaded @ 0x8520f400
[0000.646] I> MB2-params(VA) @ 0xd7000000
[0000.650] I> CPUBL-params(VA) @ 0xd7000000
[0000.654] I> CPUBL-params¶ @ 0x277000000
[0000.658] I> CPU-BL loaded @ PA 0x96000000
[0000.662] I> Loading TOS …
[0000.665] W> No valid slot number is found in scratch register
[0000.670] W> Return default slot: _a
[0000.674] I> A/B: bin_type (14) slot 0
[0000.678] I> Loading partition secure-os at 0x8530f600
[0000.683] I> Reading two headers - addr:0x8530f600 blocks:1
[0000.688] I> Addr: 0x8530f600, start-block: 58744833, num_blocks: 1
[0000.696] I> Binary(14) of size 62576 is loaded @ 0x8530f600
[0000.702] I> Copying Monitor (length: 0xf270) from 0x8530f800 to 0x40000000
[0000.709] I> Erasing Monitor @ 0x8530f800
[0000.714] I> Unhalting SCE
[0000.716] I> Primary Memory Start:80000000 Size:70000000
[0000.722] I> Extended Memory Start:f0110000 Size:185ef0000
[0000.728] I> Waypoint2-ACK: 0x52012714
[0000.732] I> MB2(TBoot-BPMP) done

so what‘s the matter?

also some times it go on with

NUnhandled Exception in EL3.
x30 = 0x0000000000000000
x0 = 0x0000000000000000
x1 = 0x0000000000000000
x2 = 0x0000000000000000
x3 = 0x0000000000000000
x4 = 0x0000000000000000
x5 = 0x0000000000000000
x6 = 0x0000000000000000
x7 = 0x0000000000000000
x8 = 0x0000000000000000
x9 = 0x0000000000000000
x10 = 0x0000000000000000
x11 = 0x0000000000000000
x12 = 0x0000000000000000
x13 = 0x0000000000000000
x14 = 0x0000000000000000
x15 = 0x0000000000000000
x16 = 0x0000000000000000
x17 = 0x0000000000000000
x18 = 0x0000000000000000
x19 = 0x0000000000000000
x20 = 0x0000000000000000
x21 = 0x0000000000000000
x22 = 0x0000000000000000
x23 = 0x0000000000000000
x24 = 0x0000000000000000
x25 = 0x0000000000000000
x26 = 0x0000000000000000
x27 = 0x0000000000000000
x28 = 0x0000000000000000
x29 = 0x0000000000000000
scr_el3 = 0x0000000000000000
sctlr_el3 = 0x0000000000000000
cptr_el3 = 0x0000000000000000
tcr_el3 = 0x0000000000000000
daif = 0x0000000000000000
mair_el3 = 0x0000000000000000
spsr_el3 = 0x0000000000000000
elr_el3 = 0x0000000000000000
ttbr0_el3 = 0x0000000000000000
esr_el3 = 0x0000000000000000
far_el3 = 0x0000000000000000
spsr_el1 = 0x0000000000000000
elr_el1 = 0x0000000000000000
spsr_abt = 0x0000000000000000
spsr_und = 0x0000000000000000
spsr_irq = 0x0000000000000000
spsr_fiq = 0x0000000000000000
sctlr_el1 = 0x0000000000000000
actlr_el1 = 0x0000000000000000
cpacr_el1 = 0x0000000000000000
csselr_el1 = 0x0000000000000000
sp_el1 = 0x0000000000000000
esr_el1 = 0x0000000000000000
ttbr0_el1 = 0x0000000000000000
ttbr1_el1 = 0x0000000000000000
mair_el1 = 0x0000000000000000
amair_el1 = 0x0000000000000000
tcr_el1 = 0x0000000000000000
tpidr_el1 = 0x0000000000000000
tpidr_el0 = 0x0000000000000000
tpidrro_el0 = 0x0000000000000000
dacr32_el2 = 0x0000000000000000
ifsr32_el2 = 0x0000000000000000
par_el1 = 0x0000000000000000
mpidr_el1 = 0x0000000000000000
afsr0_el1 = 0x0000000000000000
afsr1_el1 = 0x0000000000000000
contextidr_el1 = 0x0000000000000000
vbar_el1 = 0x0000000000000000
cntp_ctl_el0 = 0x0000000000000000
cntp_cval_el0 = 0x0000000000000000
cntv_ctl_el0 = 0x0000000000000000
cntv_cval_el0 = 0x0000000000000000
cntkctl_el1 = 0x0000000000000000
fpexc32_el2 = 0x0000000000000000
sp_el0 = 0x0000000000000000
isr_el1 = 0x0000000000000000
cpuectlr_el1 = 0x0000000000000000
gicc_hppir = 0x0000000000000000
gicc_ahppir = 0x0000000000000000
gicc_ctlr = 0x0000000000000000
gicd_ispendr regs (Offsets 0x200 - 0x278)
Offset: value
0000000000000200: 0x0000000000000000
0000000000000208: 0x0000000000000000
0000000000000210: 0x0000000000000000
0000000000000218: 0x0000000000000000
0000000000000220: 0x0000000000000000
0000000000000228: 0x0000000000000000
0000000000000230: 0x0000000000000000
0000000000000238: 0x0000000000000000
0000000000000240: 0x0000000000000000
0000000000000248: 0x0000000000000000
0000000000000250: 0x0000000000000000
0000000000000258: 0x0000000000000000
0000000000000260: 0x0000000000000000
0000000000000268: 0x0000000000000000
0000000000000270: 0x0000000000000000
0000000000000278: 0x0000000000000000

I use my custom board, but it is not the custom board matter, because my other tx2 module can work well.

when i want to flash the module, it also can not finish

If other TX2 modules are working fine on your custom carrier board, then I think this problematic module has hw defect.

Is it still working on devkit? When the flash stuck, could you also dump the UART log?

1 Like

also it can not work on devkit.

when I use

sudo ./flash.sh -r -k kernel jetson-tx2 mmcblk0p1

the flash windows is

Target Board Information:

Name: jetson-tx2, Board Family: t186ref, SoC: Tegra 186,

OpMode: production, Boot Authentication: ,

###############################################################################
./tegraflash.py --chip 0x18 --applet “/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin” --cmd “dump eeprom boardinfo cvm.bin” --skipuid
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0028 ] Generating RCM messages
[ 0.0041 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 --download rcm /home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin 0 0
[ 0.0051 ] RCM 0 is saved as rcm_0.rcm
[ 0.0058 ] RCM 1 is saved as rcm_1.rcm
[ 0.0058 ] List of rcm files are saved in rcm_list.xml
[ 0.0058 ]
[ 0.0058 ] Signing RCM messages
[ 0.0069 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0080 ] Assuming zero filled SBK key
[ 0.0138 ]
[ 0.0138 ] Copying signature to RCM mesages
[ 0.0151 ] tegrarcm_v2 --chip 0x18 --updatesig rcm_list_signed.xml
[ 0.0166 ]
[ 0.0167 ] Boot Rom communication
[ 0.0180 ] tegrarcm_v2 --chip 0x18 --rcm rcm_list_signed.xml --skipuid
[ 0.0192 ] RCM version 0X180001
[ 0.0203 ] Boot Rom communication completed
[ 1.0272 ]
[ 1.0315 ] tegrarcm_v2 --isapplet
[ 1.0349 ] Applet version 01.00.0000
[ 1.0527 ]
[ 1.0566 ] Retrieving EEPROM data
[ 1.0571 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/cvm.bin
[ 1.0602 ] Applet version 01.00.0000
[ 1.0927 ] Saved platform info in /home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/cvm.bin
[ 1.1710 ]
Board ID(3310) version(D00)
copying bctfile(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg)… done.
copying misc_config(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)… done.
copying pinmux_config(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg)… done.
copying pmic_config(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg)… done.
copying pmc_config(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg)… done.
copying prod_config(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg)… done.
copying scr_config(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/minimal_scr.cfg)… done.
copying scr_cold_boot_config(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/mobile_scr.cfg)… done.
copying bootrom_config(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg)… done.
copying dev_params(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/emmc.cfg)… done.
Existing bootloader(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
Making Boot image… done.
Existing sosfile(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin) reused.
copying tegraboot(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/t186ref/nvtboot.bin)… done.
Existing mb2blfile(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
Existing mtspreboot(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/preboot_d15_prod_cr.bin) reused.
Existing mts(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/mce_mts_d15_prod_cr.bin) reused.
Existing mb1file(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/mb1_prod.bin) reused.
Existing bpffile(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/bpmp.bin) reused.
copying bpfdtbfile(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/t186ref/tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb)… done.
Existing scefile(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/camera-rtcpu-sce.bin) reused.
Existing spefile(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/spe.bin) reused.
copying wb0boot(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/t186ref/warmboot.bin)… done.
Existing tosfile(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/tos.img) reused.
Existing eksfile(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/eks.img) reused.
copying dtbfile(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)… done.
Reusing existing system.img…
done.
Existing tbcfile(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/cboot.bin) reused.
copying tbcdtbfile(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)… done.
copying cfgfile(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml… done.
Existing flasher(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing flashapp(/home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/tegraflash.py) reused.
*** Updating [kernel] with boot.img ***
./tegraflash.py --bl nvtboot_recovery_cpu.bin --chip 0x18 --applet mb1_recovery_prod.bin --cfg flash.xml --sdram_config P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --sdram_config P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg --cfg flash.xml --bins “mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb; tlk tos.img; eks eks.img; bootloader_dtb tegra186-quill-p3310-1000-c03-00-base.dtb” --cmd “sign; write kernel ./signed/boot_sigheader.img.encrypt; reboot”
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0105 ] tegrasign_v2 --key None --getmode mode.txt
[ 0.0118 ] Assuming zero filled SBK key
[ 0.0118 ]
[ 0.0119 ] Generating RCM messages
[ 0.0130 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 --download rcm mb1_recovery_prod.bin 0 0
[ 0.0140 ] RCM 0 is saved as rcm_0.rcm
[ 0.0144 ] RCM 1 is saved as rcm_1.rcm
[ 0.0144 ] List of rcm files are saved in rcm_list.xml
[ 0.0144 ]
[ 0.0144 ] Signing RCM messages
[ 0.0152 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0161 ] Assuming zero filled SBK key
[ 0.0199 ]
[ 0.0200 ] Copying signature to RCM mesages
[ 0.0210 ] tegrarcm_v2 --chip 0x18 --updatesig rcm_list_signed.xml
[ 0.0222 ]
[ 0.0223 ] Parsing partition layout
[ 0.0233 ] tegraparser_v2 --pt flash.xml.tmp
[ 0.0247 ]
[ 0.0247 ] Creating list of images to be signed
[ 0.0256 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[ 0.1652 ]
[ 0.1653 ] Generating signatures
[ 0.1665 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[ 0.1674 ] Assuming zero filled SBK key
[ 1.5821 ]
[ 1.5822 ] Generating br-bct
[ 1.5854 ] Updating dev and MSS params in BR BCT
[ 1.5856 ] tegrabct_v2 --dev_param emmc.cfg --sdram P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --brbct br_bct.cfg --chip 0x18
[ 1.6267 ]
[ 1.6267 ] Updating bl info
[ 1.6279 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[ 1.6297 ]
[ 1.6298 ] Updating smd info
[ 1.6307 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[ 1.6318 ]
[ 1.6319 ] Get Signed section bct
[ 1.6328 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --listbct bct_list.xml
[ 1.6338 ]
[ 1.6338 ] Signing BCT
[ 1.6356 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key
[ 1.6366 ] Assuming zero filled SBK key
[ 1.6370 ]
[ 1.6370 ] Updating BCT with signature
[ 1.6383 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesig bct_list_signed.xml
[ 1.6396 ]
[ 1.6396 ] Generating coldboot mb1-bct
[ 1.6410 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct.cfg --sdram P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 1.6422 ] MB1-BCT version: 0xe
[ 1.6424 ] Copying Sdram info from 2 to 3 set
[ 1.6661 ] Packing sdram param for instance[0]
[ 1.6664 ] Packing sdram param for instance[1]
[ 1.6666 ] Packing sdram param for instance[2]
[ 1.6668 ] Packing sdram param for instance[3]

[ 1.6670 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg
[ 1.6674 ] Appending platform config data of size :- 2880

[ 1.6676 ] Parsing config file :mobile_scr.cfg
[ 1.6679 ] Appending platform config data of size :- 12240

[ 1.6694 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg
[ 1.6700 ] Appending platform config data of size :- 24
[ 1.6700 ]
[ 1.6700 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg
[ 1.6700 ] Appending platform config data of size :- 720
[ 1.6700 ]
[ 1.6700 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg
[ 1.6700 ] Appending platform config data of size :- 64
[ 1.6700 ]
[ 1.6700 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 1.6700 ] Appending platform config data of size :- 1652
[ 1.6700 ]
[ 1.6701 ] Updating mb1-bct with firmware information
[ 1.6717 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 1.6730 ] MB1-BCT version: 0xe
[ 1.6735 ]
[ 1.6735 ] Updating mb1-bct with storage information
[ 1.6746 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 1.6759 ] MB1-BCT version: 0xe
[ 1.6764 ]
[ 1.6776 ] tegrahost_v2 --align mb1_cold_boot_bct_MB1.bct
[ 1.6786 ]
[ 1.6795 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[ 1.6806 ]
[ 1.6818 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml
[ 1.6827 ] Assuming zero filled SBK key
[ 1.6850 ]
[ 1.6864 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[ 1.6879 ]
[ 1.6880 ] Generating recovery mb1-bct
[ 1.6889 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct.cfg --sdram P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 1.6899 ] MB1-BCT version: 0xe
[ 1.6901 ] Copying Sdram info from 2 to 3 set
[ 1.7130 ] Packing sdram param for instance[0]
[ 1.7133 ] Packing sdram param for instance[1]
[ 1.7136 ] Packing sdram param for instance[2]
[ 1.7138 ] Packing sdram param for instance[3]

[ 1.7141 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg
[ 1.7146 ] Appending platform config data of size :- 2880

[ 1.7150 ] Parsing config file :minimal_scr.cfg
[ 1.7153 ] Appending platform config data of size :- 12240
[ 1.7156 ]
[ 1.7156 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg
[ 1.7156 ] Appending platform config data of size :- 24
[ 1.7156 ]
[ 1.7156 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg
[ 1.7156 ] Appending platform config data of size :- 720
[ 1.7156 ]
[ 1.7156 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg
[ 1.7156 ] Appending platform config data of size :- 64
[ 1.7156 ]
[ 1.7157 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 1.7157 ] Appending platform config data of size :- 1652
[ 1.7157 ]
[ 1.7157 ] Updating mb1-bct with firmware information
[ 1.7168 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 1.7176 ] MB1-BCT version: 0xe
[ 1.7180 ]
[ 1.7180 ] Updating mb1-bct with storage information
[ 1.7188 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 1.7197 ] MB1-BCT version: 0xe
[ 1.7203 ]
[ 1.7215 ] tegrahost_v2 --align mb1_bct_MB1.bct
[ 1.7226 ]
[ 1.7237 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk
[ 1.7248 ]
[ 1.7259 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml
[ 1.7267 ] Assuming zero filled SBK key
[ 1.7283 ]
[ 1.7295 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[ 1.7305 ]
[ 1.7306 ] Copying signatures
[ 1.7315 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[ 1.9026 ]
[ 1.9043 ] tegrahost_v2 --align nvtboot_recovery.bin
[ 1.9057 ]
[ 1.9069 ] tegrahost_v2 --appendsigheader nvtboot_recovery.bin zerosbk
[ 1.9082 ]
[ 1.9095 ] tegrasign_v2 --key None --list nvtboot_recovery_sigheader.bin_list.xml
[ 1.9103 ] Assuming zero filled SBK key
[ 1.9131 ]
[ 1.9148 ] tegrahost_v2 --updatesigheader nvtboot_recovery_sigheader.bin.encrypt nvtboot_recovery_sigheader.bin.hash zerosbk
[ 1.9161 ]
[ 1.9172 ] tegrahost_v2 --align preboot_d15_prod_cr.bin
[ 1.9181 ]
[ 1.9191 ] tegrahost_v2 --appendsigheader preboot_d15_prod_cr.bin zerosbk
[ 1.9206 ]
[ 1.9222 ] tegrasign_v2 --key None --list preboot_d15_prod_cr_sigheader.bin_list.xml
[ 1.9233 ] Assuming zero filled SBK key
[ 1.9257 ]
[ 1.9271 ] tegrahost_v2 --updatesigheader preboot_d15_prod_cr_sigheader.bin.encrypt preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[ 1.9284 ]
[ 1.9295 ] tegrahost_v2 --align mce_mts_d15_prod_cr.bin
[ 1.9305 ]
[ 1.9316 ] tegrahost_v2 --appendsigheader mce_mts_d15_prod_cr.bin zerosbk
[ 1.9374 ]
[ 1.9391 ] tegrasign_v2 --key None --list mce_mts_d15_prod_cr_sigheader.bin_list.xml
[ 1.9403 ] Assuming zero filled SBK key
[ 2.0042 ]
[ 2.0057 ] tegrahost_v2 --updatesigheader mce_mts_d15_prod_cr_sigheader.bin.encrypt mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[ 2.0097 ]
[ 2.0107 ] tegrahost_v2 --align bpmp.bin
[ 2.0116 ]
[ 2.0125 ] tegrahost_v2 --appendsigheader bpmp.bin zerosbk
[ 2.0144 ]
[ 2.0158 ] tegrasign_v2 --key None --list bpmp_sigheader.bin_list.xml
[ 2.0167 ] Assuming zero filled SBK key
[ 2.0329 ]
[ 2.0343 ] tegrahost_v2 --updatesigheader bpmp_sigheader.bin.encrypt bpmp_sigheader.bin.hash zerosbk
[ 2.0364 ]
[ 2.0375 ] tegrahost_v2 --align tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb
[ 2.0385 ]
[ 2.0394 ] tegrahost_v2 --appendsigheader tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk
[ 2.0419 ]
[ 2.0432 ] tegrasign_v2 --key None --list tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml
[ 2.0443 ] Assuming zero filled SBK key
[ 2.0594 ]
[ 2.0609 ] tegrahost_v2 --updatesigheader tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[ 2.0626 ]
[ 2.0636 ] tegrahost_v2 --align tos.img
[ 2.0646 ]
[ 2.0654 ] tegrahost_v2 --appendsigheader tos.img zerosbk
[ 2.0666 ]
[ 2.0678 ] tegrasign_v2 --key None --list tos_sigheader.img_list.xml
[ 2.0687 ] Assuming zero filled SBK key
[ 2.0711 ]
[ 2.0731 ] tegrahost_v2 --updatesigheader tos_sigheader.img.encrypt tos_sigheader.img.hash zerosbk
[ 2.0745 ]
[ 2.0755 ] tegrahost_v2 --align eks.img
[ 2.0766 ]
[ 2.0776 ] tegrahost_v2 --appendsigheader eks.img zerosbk
[ 2.0787 ]
[ 2.0800 ] tegrasign_v2 --key None --list eks_sigheader.img_list.xml
[ 2.0809 ] Assuming zero filled SBK key
[ 2.0812 ]
[ 2.0825 ] tegrahost_v2 --updatesigheader eks_sigheader.img.encrypt eks_sigheader.img.hash zerosbk
[ 2.0835 ]
[ 2.0844 ] tegrahost_v2 --align tegra186-quill-p3310-1000-c03-00-base.dtb
[ 2.0853 ]
[ 2.0863 ] tegrahost_v2 --appendsigheader tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[ 2.0882 ]
[ 2.0897 ] tegrasign_v2 --key None --list tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml
[ 2.0907 ] Assuming zero filled SBK key
[ 2.0978 ]
[ 2.0991 ] tegrahost_v2 --updatesigheader tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[ 2.1004 ]
[ 2.1014 ] tegrahost_v2 --align nvtboot_recovery_cpu.bin
[ 2.1024 ]
[ 2.1036 ] tegrahost_v2 --appendsigheader nvtboot_recovery_cpu.bin zerosbk
[ 2.1053 ]
[ 2.1074 ] tegrasign_v2 --key None --list nvtboot_recovery_cpu_sigheader.bin_list.xml
[ 2.1085 ] Assuming zero filled SBK key
[ 2.1150 ]
[ 2.1164 ] tegrahost_v2 --updatesigheader nvtboot_recovery_cpu_sigheader.bin.encrypt nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[ 2.1178 ]
[ 2.1179 ] Copying signed file in /home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/signed
[ 2.2777 ] Generating RCM messages
[ 2.2789 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 --download rcm mb1_recovery_prod.bin 0 0
[ 2.2798 ] RCM 0 is saved as rcm_0.rcm
[ 2.2802 ] RCM 1 is saved as rcm_1.rcm
[ 2.2802 ] List of rcm files are saved in rcm_list.xml
[ 2.2802 ]
[ 2.2803 ] Signing RCM messages
[ 2.2812 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 2.2821 ] Assuming zero filled SBK key
[ 2.2858 ]
[ 2.2859 ] Copying signature to RCM mesages
[ 2.2869 ] tegrarcm_v2 --chip 0x18 --updatesig rcm_list_signed.xml
[ 2.2882 ]
[ 2.2882 ] Boot Rom communication
[ 2.2892 ] tegrarcm_v2 --chip 0x18 --rcm rcm_list_signed.xml
[ 2.2901 ] BootRom is not running
[ 3.2966 ]
[ 3.2994 ] tegrarcm_v2 --isapplet
[ 3.3020 ] Applet version 01.00.0000
[ 3.3188 ]
[ 3.3216 ] tegrasign_v2 --key None --getmode mode.txt
[ 3.3244 ] Assuming zero filled SBK key
[ 3.3248 ]
[ 3.3251 ] Parsing partition layout
[ 3.3284 ] tegraparser_v2 --pt flash.xml.tmp
[ 3.3311 ]
[ 3.3312 ] Creating list of images to be signed
[ 3.3324 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[ 3.4967 ]
[ 3.4968 ] Generating signatures
[ 3.5001 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[ 3.5031 ] Assuming zero filled SBK key
[ 4.8346 ]
[ 4.8347 ] Reading BCT from device for further operations
[ 4.8347 ] Generating blob
[ 4.8359 ] tegrahost_v2 --align blob_nvtboot_recovery_cpu.bin
[ 4.8369 ]
[ 4.8378 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[ 4.8390 ]
[ 4.8401 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml
[ 4.8409 ] Assuming zero filled SBK key
[ 4.8461 ]
[ 4.8475 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[ 4.8488 ]
[ 4.8499 ] tegrahost_v2 --align blob_nvtboot_recovery.bin
[ 4.8507 ]
[ 4.8515 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[ 4.8525 ]
[ 4.8536 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml
[ 4.8544 ] Assuming zero filled SBK key
[ 4.8568 ]
[ 4.8580 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[ 4.8589 ]
[ 4.8599 ] tegrahost_v2 --align blob_preboot_d15_prod_cr.bin
[ 4.8607 ]
[ 4.8616 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[ 4.8628 ]
[ 4.8640 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml
[ 4.8650 ] Assuming zero filled SBK key
[ 4.8672 ]
[ 4.8685 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[ 4.8696 ]
[ 4.8706 ] tegrahost_v2 --align blob_mce_mts_d15_prod_cr.bin
[ 4.8715 ]
[ 4.8724 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[ 4.8765 ]
[ 4.8776 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml
[ 4.8785 ] Assuming zero filled SBK key
[ 4.9341 ]
[ 4.9354 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[ 4.9386 ]
[ 4.9396 ] tegrahost_v2 --align blob_bpmp.bin
[ 4.9404 ]
[ 4.9413 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk
[ 4.9430 ]
[ 4.9441 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml
[ 4.9449 ] Assuming zero filled SBK key
[ 4.9602 ]
[ 4.9614 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[ 4.9630 ]
[ 4.9645 ] tegrahost_v2 --align blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb
[ 4.9658 ]
[ 4.9667 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk
[ 4.9684 ]
[ 4.9696 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml
[ 4.9705 ] Assuming zero filled SBK key
[ 4.9840 ]
[ 4.9855 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[ 4.9872 ]
[ 4.9883 ] tegrahost_v2 --align blob_tos.img
[ 4.9893 ]
[ 4.9902 ] tegrahost_v2 --appendsigheader blob_tos.img zerosbk
[ 4.9913 ]
[ 4.9925 ] tegrasign_v2 --key None --list blob_tos_sigheader.img_list.xml
[ 4.9935 ] Assuming zero filled SBK key
[ 4.9956 ]
[ 4.9974 ] tegrahost_v2 --updatesigheader blob_tos_sigheader.img.encrypt blob_tos_sigheader.img.hash zerosbk
[ 4.9987 ]
[ 4.9997 ] tegrahost_v2 --align blob_eks.img
[ 5.0007 ]
[ 5.0017 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk
[ 5.0027 ]
[ 5.0039 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml
[ 5.0048 ] Assuming zero filled SBK key
[ 5.0051 ]
[ 5.0064 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[ 5.0074 ]
[ 5.0085 ] tegrahost_v2 --align blob_tegra186-quill-p3310-1000-c03-00-base.dtb
[ 5.0095 ]
[ 5.0104 ] tegrahost_v2 --appendsigheader blob_tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[ 5.0117 ]
[ 5.0129 ] tegrasign_v2 --key None --list blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml
[ 5.0137 ] Assuming zero filled SBK key
[ 5.0200 ]
[ 5.0213 ] tegrahost_v2 --updatesigheader blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[ 5.0226 ]
[ 5.0238 ] tegrahost_v2 --generateblob blob.xml blob.bin
[ 5.0248 ] number of images in blob are 9
[ 5.0250 ] blobsize is 3686568
[ 5.0251 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 190048
[ 5.0273 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 79600
[ 5.0278 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 63024
[ 5.0283 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2076832
[ 5.0288 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 529440
[ 5.0293 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt of size 466160
[ 5.0300 ] Added binary blob_tos_sigheader.img.encrypt of size 62976
[ 5.0303 ] Added binary blob_eks_sigheader.img.encrypt of size 1488
[ 5.0306 ] Added binary blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt of size 216848
[ 5.0314 ]
[ 5.0315 ] Sending bootloader and pre-requisite binaries
[ 5.0326 ] tegrarcm_v2 --download blob blob.bin
[ 5.0334 ] Applet version 01.00.0000
[ 5.0505 ] Sending blob
[ 5.0506 ] […] 100%
[ 5.8883 ]
[ 5.8917 ] tegrarcm_v2 --boot recovery
[ 5.8946 ] Applet version 01.00.0000
[ 5.9129 ]
[ 5.9163 ] tegrarcm_v2 --isapplet
[ 6.5788 ]
[ 6.5823 ] tegradevflash_v2 --iscpubl
[ 6.5857 ] CPU Bootloader is not running on device.
[ 6.5869 ]
[ 37.9697 ] Writing partition
[ 37.9716 ] tegradevflash_v2 --write kernel /home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/signed/boot_sigheader.img.encrypt
[ 37.9735 ] CPU Bootloader is not running on device.
[ 37.9745 ]
Error: Return value 4
Command tegradevflash_v2 --write kernel /home/zxkj/JetPack3.3-src/64_TX2/Linux_for_Tegra/bootloader/signed/boot_sigheader.img.encrypt
Failed to flash/read t186ref.

the uart windows is

[0036.668] I> Welcome to MB1-recovery(prd-version : 14.01.171031-t186-M-00.00-6b33ecf5)
[0036.676] I> rst_source : 0x0
[0036.679] I> rst_level : 0x0
[0036.681] I> Read lock all AES keyslots
[0036.685] I> Read lock all RSA keyslots
[0036.689] I> Clear SE keyslots left open by BR
[0036.693] I> Boot-device: eMMC
[0036.696] I> Entering into 3p server…
[0036.700] I> Transport interface is USB
[0036.704] I> tegrabl_usbf_priv_init:2576 full init:: [0036.708] I> HIGH SPEED
[0037.170] W> Get desc.Unsupported req: desc_index = 0
[0037.177] I> transport_usbf_priv_open USB configuration success
[0037.186] W> Get desc.Unsupported req: desc_index = 0
[0037.733] I> Populate eeprom info for module cvm
[0044.351] I> bit @ 0xd480000
[0044.354] I> BCT @ 0x0
[0044.356] I> Boot-device: eMMC
[0044.392] I> sdmmc ddr50 mode
[0044.396] I> Boot-device: eMMC
[0044.400] I> Binary(18) of size 3584 is loaded @ 0x4004e800
[0044.405] I> Binary(18) of size 3584 is loaded @ 0x4004e800
[0044.411] E> Blob is not set
[0044.414] I> Boot-device: eMMC
[0044.417] I> sdmmc bdev is already initialized
[0044.421] I> Boot-device: eMMC
[0044.424] I> BR-BCT @ 0x4004e800
[0044.427] I> MB1-BCT @ block-1088 (partition-size: 0x4c0)
[0044.435] I> Binary(0) of size 49632 is loaded @ 0x40000000
[0044.440] I> Binary(0) of size 49632 is loaded @ 0x40000000
[0044.446] I> MB1-BCT relocated to 0xd48bc00 from 0x40000000
[0044.451] I> Supported mb1-bct versions 9-14
[0044.455] I> Version of mb1 bct binary 14
[0044.459] W> MB1 BCT does not have controller prod config data
[0044.465] I> Bootrom patch version : 31 (correctly patched)
[0044.470] I> ATE fuse revision : 0x700a0
[0044.474] I> chip revision : A02P
[0044.477] I> disabled_core_mask: 0xffffff0c
[0044.481] I> Enabled Cores: 0xf3
[0044.485] I> TPC disable fuse status: 0
[0044.488] I> Booting Parker Sku
[0044.491] I> Ram repair fuse : 0x0
[0044.494] I> Mem length:2000
[0044.497] I> tegrabl_ast_init_mapper: AST-cache dump
[0044.502] I> allocated(CO:30) base:0x278000000 size:0x8000000 align: 0x8000000
[0044.509] I> allocated(CO:23) base:0xf0100000 size:0x10000 align: 0x10000
[0044.516] I> allocated(CO:31) base:0x0 size:0x0 align: 0x0
[0044.521] I> allocated(CO:1) base:0x277f00000 size:0x100000 align: 0x100000
[0044.528] I> allocated(CO:2) base:0x277e00000 size:0x100000 align: 0x100000
[0044.535] I> allocated(CO:3) base:0x277d00000 size:0x100000 align: 0x100000
[0044.542] I> allocated(CO:4) base:0x277c00000 size:0x100000 align: 0x100000
[0044.549] I> allocated(CO:5) base:0x277b00000 size:0x100000 align: 0x100000
[0044.556] I> allocated(CO:27) base:0x0 size:0x0 align: 0x0
[0044.561] I> allocated(CO:6) base:0x277800000 size:0x200000 align: 0x200000
[0044.568] I> allocated(CO:7) base:0x277400000 size:0x400000 align: 0x400000
[0044.575] I> allocated(CO:8) base:0x277a00000 size:0x100000 align: 0x100000
[0044.582] I> allocated(CO:9) base:0x277300000 size:0x100000 align: 0x100000
[0044.589] I> allocated(CO:10) base:0x276800000 size:0x800000 align: 0x800000
[0044.596] I> allocated(CO:11) base:0x30000000 size:0x40000 align: 0x0
[0044.602] I> allocated(CO:12) base:0xf0000000 size:0x100000 align: 0x100000
[0044.609] I> allocated(CO:13) base:0x30040000 size:0x1000 align: 0x0
[0044.615] I> allocated(CO:14) base:0x30048000 size:0x1000 align: 0x0
[0044.622] I> allocated(CO:15) base:0x30049000 size:0x1000 align: 0x0
[0044.628] I> allocated(CO:16) base:0x3004a000 size:0x1000 align: 0x0
[0044.634] I> allocated(CO:17) base:0x3004b000 size:0x1000 align: 0x0
[0044.640] I> allocated(CO:19) base:0x3004d000 size:0x1000 align: 0x0
[0044.647] I> allocated(CO:18) base:0x3004c000 size:0x1000 align: 0x0
[0044.653] I> allocated(CO:20) base:0x3004e000 size:0x1000 align: 0x0
[0044.659] I> allocated(CO:21) base:0x3004f000 size:0x1000 align: 0x0
[0044.665] I> allocated(CO:22) base:0x0 size:0x0 align: 0x0
[0044.671] I> allocated(CO:32) base:0x276000000 size:0x600000 align: 0x400000
[0044.678] I> allocated(CO:24) base:0x0 size:0x0 align: 0x0
[0044.683] I> allocated(CO:25) base:0x0 size:0x0 align: 0x0
[0044.688] I> allocated(CO:26) base:0x0 size:0x0 align: 0x0
[0044.694] I> allocated(CO:39) base:0x96000000 size:0x2400000 align: 0x2000000
[0044.701] I> allocated(CO:38) base:0x84000000 size:0x400000 align: 0x400000
[0044.708] I> allocated(CO:37) base:0x2772e0000 size:0x20000 align: 0x20000
[0044.714] I> allocated(CO:40) base:0x85000000 size:0x1200000 align: 0x1000000
[0044.721] I> allocated(CO:41) base:0x277000000 size:0x280000 align: 0x200000
[0044.728] I> allocated(CO:28) base:0x84400000 size:0x400000 align: 0x400000
[0044.736] W> MB1 PMIC CFG is version 1.2
[0044.740] W> Rail ID 7 is not found on MB1 BCT
[0044.744] W> MB1 PMIC CFG is version 1.2
[0044.749] W> MB1 PMIC CFG is version 1.2
[0044.756] W> MB1 PMIC CFG is version 1.2
[0044.760] I> sdram slot : 2
[0044.763] I> Initializing SDRAM
[0044.770] I> mss encrypt status check successful
[0044.775] I> Downloading blob at 0x0000000084800000
[0045.183] I> downloaded image blob successfully
[0045.213] I> exiting nv3p server
[0045.216] I> MB1-recovery(prd-version : 14.01.171031-t186-M-00.00-6b33ecf5)
[0045.224] I> disabled_core_mask: 0xffffff0c
[0045.228] I> Enabled Cores: 0xf3
[0045.231] I> TPC disable fuse status: 0
[0045.234] I> Booting Parker Sku
[0045.237] I> Setup temp. GSC#29 (base:0x30000000, size:0x00010000)
[0045.243] I> Loading preboot
[0045.248] I> Binary(1) of size 62224 is loaded @ 0x40000000
[0045.254] I> Restrict GSC#29 access to DPMU only
[0045.258] I> Updated LSR_DVCOMP_PARAMS: 0xc07c0f85c
[0045.263] I> Updated LSR_DVCOMP_PARAMS: 0xc07c0f85c
[0045.268] I> WP0 triggered
[0045.270] I> Waypoint-0 ACK received :)
[0045.274] I> WP0.5 triggered
[0045.280] I> Initialized SCRs
[0045.283] W> MB1 PMIC CFG is version 1.2
[0045.291] W> MB1 PMIC CFG is version 1.2
[0045.340] I> Waypoint-0.5 ACK received :)
[0045.344] I> Setup temp. GSC#28 (base:0x84400000, size:0x00400000)
[0045.350] I> Loading MTS-DMCE
[0045.364] I> Binary(2) of size 265472 is loaded @ 0x84400000
[0045.369] I> disabled_core_mask: 0xffffff0c
[0045.373] I> Loading MTS-PROPER
[0045.376] I> Binary(3) of size 1810512 is loaded @ 0x0
[0045.381] I> Restrict GSC#28 access to DPMU only
[0045.386] I> disabled_core_mask: 0xffffff0c
[0045.390] I> WP1 triggered
[0045.393] I> Loading MB2
[0045.396] I> Binary(8) of size 79200 is loaded @ 0x84000000
[0045.401] W> MB1 PMIC CFG is version 1.2
[0045.406] I> Configure DMCE carveout GSC#13
[0045.410] I> CPU reset vector: 0x96000000
[0045.414] I> MB2-params @ 0xd7000000
[0045.418] I> Waypoint-1 ACK received :)
[0045.422] I> Configure SC7 carveout GSC#23
[0045.426] I> MB1 (recovery) done

[0045.432] I> Welcome to MB2(TBoot-BPMP) Recovery(version: 01.00.160913-t186-M-00.00-mobile-cfa59593)
[0045.441] I> Default Heap @ [0xd486400 - 0xd488400]
[0045.446] I> DMA Heap @ [0x85200000 - 0x86200000]
[0045.450] I> bit @ 0xd480000
[0045.453] I> BR-BCT relocated to 0xd7020000
[0045.458] I> Boot-device: eMMC
[0045.493] I> sdmmc ddr50 mode
[0045.497] I> sdmmc bdev is already initialized
[0045.502] I> pmic: reset reason (nverc) : 0x0
[0045.506] I> Reading GPT from 512 for device 00000003
[0045.512] I> Reading GPT from 8388096 for device 00000003
[0045.519] I> Found 13 partitions in 00000003 device
[0045.524] I> Reading GPT from 512 for device 00010003
[0045.531] I> Found 29 partitions in 00010003 device
[0045.539] I> Binary(16) of size 529040 is loaded @ 0xd7800000
[0045.547] I> Binary(17) of size 465760 is loaded @ 0xd798e4a0
[0045.724] I> BPMP-FW load address = 0xd7800000
[0045.728] I> BPMP-FW DTB load address = 0x5018e4a0
[0045.733] I> Copy BTCM section
[0045.737] I> Binary(13) of size 189648 is loaded @ 0x96000000
[0045.744] I> Binary(20) of size 216448 is loaded @ 0x8520f400
[0045.750] I> MB2-params(VA) @ 0xd7000000
[0045.753] I> CPUBL-params(VA) @ 0xd7000000
[0045.757] I> CPUBL-params¶ @ 0x277000000
[0045.761] I> CPU-BL loaded @ PA 0x96000000
[0045.765] I> Loading TOS …
[0045.769] I> Binary(14) of size 62576 is loaded @ 0x8530f600
[0045.775] I> Copying Monitor (length: 0xf270) from 0x8530f800 to 0x40000000
[0045.782] I> Erasing Monitor @ 0x8530f800
[0045.786] I> Unhalting SCE
[0045.789] I> Primary Memory Start:80000000 Size:70000000
[0045.794] I> Extended Memory Start:f0110000 Size:185ef0000
[0045.801] I> Waypoint2-ACK: 0x5200f188
[0045.804] I> MB2(TBoot-BPMP) Recovery done

so what i can do?

If only this TX2 module has this problem, I would suggest to RMA.

1 Like