hello, I am trying to flash my jetson orin nano and i keep getting an error:
l --pubkeyhash pub_key.key --sha sha512
[ 7.0988 ] Assuming zero filled SBK key
[ 7.1044 ] Warning: pub_key.key is not found
[ 7.1043 ] tegrahost_v2 --chip 0x23 0 --updatesigheader bpmp_t234-TE950M-A1_prod_aligned_sigheader.bin.encrypt bpmp_t234-TE950M-A1_prod_aligned_sigheader.bin.hash zerosbk
[ 7.1118 ] Using bpmp-dtb concatenated with odmdata
[ 7.1119 ] Get magic id
[ 7.1147 ] tegraparser_v2 --get_magic bpmp_fw_dtb
[ 7.1180 ] BPMD
[ 7.1180 ]
[ 7.1181 ] partition type bpmp_fw_dtb, magic id = BPMD
[ 7.1207 ] tegrahost_v2 --chip 0x23 0 --align tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned.dtb
[ 7.1242 ] tegrahost_v2 --chip 0x23 0 --magicid BPMD --ratchet_blob ratchet_blob.bin --appendsigheader tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned.dtb zerosbk
[ 7.1258 ] adding BCH for tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned.dtb
[ 7.1336 ] tegrasign_v3.py --key None --list tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned_sigheader.dtb_list.xml --pubkeyhash pub_key.key --sha sha512
[ 7.1339 ] Assuming zero filled SBK key
[ 7.1374 ] Warning: pub_key.key is not found
[ 7.1373 ] tegrahost_v2 --chip 0x23 0 --updatesigheader tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned_sigheader.dtb.encrypt tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned_sigheader.dtb.hash zerosbk
[ 7.1424 ] Get magic id
[ 7.1457 ] tegraparser_v2 --get_magic sce_fw
[ 7.1483 ] SCEF
[ 7.1484 ]
[ 7.1485 ] partition type sce_fw, magic id = SCEF
[ 7.1515 ] tegrahost_v2 --chip 0x23 0 --align camera-rtcpu-sce_aligned.img
[ 7.1556 ] tegrahost_v2 --chip 0x23 0 --magicid SCEF --ratchet_blob ratchet_blob.bin --appendsigheader camera-rtcpu-sce_aligned.img zerosbk
[ 7.1582 ] adding BCH for camera-rtcpu-sce_aligned.img
[ 7.1679 ] tegrasign_v3.py --key None --list camera-rtcpu-sce_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512
[ 7.1683 ] Assuming zero filled SBK key
[ 7.1723 ] Warning: pub_key.key is not found
[ 7.1735 ] tegrahost_v2 --chip 0x23 0 --updatesigheader camera-rtcpu-sce_aligned_sigheader.img.encrypt camera-rtcpu-sce_aligned_sigheader.img.hash zerosbk
[ 7.1784 ] Get magic id
[ 7.1811 ] tegraparser_v2 --get_magic rce_fw
[ 7.1831 ] RCEF
[ 7.1832 ]
[ 7.1832 ] partition type rce_fw, magic id = RCEF
[ 7.1862 ] tegrahost_v2 --chip 0x23 0 --align camera-rtcpu-t234-rce_aligned.img
[ 7.1897 ] tegrahost_v2 --chip 0x23 0 --magicid RCEF --ratchet_blob ratchet_blob.bin --appendsigheader camera-rtcpu-t234-rce_aligned.img zerosbk
[ 7.1913 ] adding BCH for camera-rtcpu-t234-rce_aligned.img
[ 7.2170 ] tegrasign_v3.py --key None --list camera-rtcpu-t234-rce_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512
[ 7.2173 ] Assuming zero filled SBK key
[ 7.2218 ] Warning: pub_key.key is not found
[ 7.2217 ] tegrahost_v2 --chip 0x23 0 --updatesigheader camera-rtcpu-t234-rce_aligned_sigheader.img.encrypt camera-rtcpu-t234-rce_aligned_sigheader.img.hash zerosbk
[ 7.2259 ] Get magic id
[ 7.2282 ] tegraparser_v2 --get_magic ape_fw
[ 7.2300 ] APEF
[ 7.2302 ] partition type ape_fw, magic id = APEF
[ 7.2338 ] tegrahost_v2 --chip 0x23 0 --align adsp-fw_aligned.bin
[ 7.2400 ] tegrahost_v2 --chip 0x23 0 --magicid APEF --ratchet_blob ratchet_blob.bin --appendsigheader adsp-fw_aligned.bin zerosbk
[ 7.2427 ] adding BCH for adsp-fw_aligned.bin
[ 7.2617 ] tegrasign_v3.py --key None --list adsp-fw_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 7.2622 ] Assuming zero filled SBK key
[ 7.2671 ] Warning: pub_key.key is not found
[ 7.2679 ] tegrahost_v2 --chip 0x23 0 --updatesigheader adsp-fw_aligned_sigheader.bin.encrypt adsp-fw_aligned_sigheader.bin.hash zerosbk
[ 7.2739 ] Get magic id
[ 7.2762 ] tegraparser_v2 --get_magic spe_fw
[ 7.2784 ] SPEF
[ 7.2784 ]
[ 7.2785 ] partition type spe_fw, magic id = SPEF
[ 7.2810 ] tegrahost_v2 --chip 0x23 0 --align spe_t234_aligned.bin
[ 7.2845 ] tegrahost_v2 --chip 0x23 0 --magicid SPEF --ratchet_blob ratchet_blob.bin --appendsigheader spe_t234_aligned.bin zerosbk
[ 7.2864 ] adding BCH for spe_t234_aligned.bin
[ 7.3013 ] tegrasign_v3.py --key None --list spe_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 7.3017 ] Assuming zero filled SBK key
[ 7.3070 ] Warning: pub_key.key is not found
[ 7.3075 ] tegrahost_v2 --chip 0x23 0 --updatesigheader spe_t234_aligned_sigheader.bin.encrypt spe_t234_aligned_sigheader.bin.hash zerosbk
[ 7.3113 ] Get magic id
[ 7.3134 ] tegraparser_v2 --get_magic tos
[ 7.3152 ] TOSB
[ 7.3153 ]
[ 7.3153 ] partition type tos, magic id = TOSB
[ 7.3192 ] tegrahost_v2 --chip 0x23 0 --align tos-optee_t234_aligned.img
[ 7.3228 ] tegrahost_v2 --chip 0x23 0 --magicid TOSB --ratchet_blob ratchet_blob.bin --appendsigheader tos-optee_t234_aligned.img zerosbk
[ 7.3247 ] adding BCH for tos-optee_t234_aligned.img
[ 7.3737 ] tegrasign_v3.py --key None --list tos-optee_t234_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512
[ 7.3740 ] Assuming zero filled SBK key
[ 7.3796 ] Warning: pub_key.key is not found
[ 7.3796 ] tegrahost_v2 --chip 0x23 0 --updatesigheader tos-optee_t234_aligned_sigheader.img.encrypt tos-optee_t234_aligned_sigheader.img.hash zerosbk
[ 7.3881 ] Get magic id
[ 7.3914 ] tegraparser_v2 --get_magic eks
[ 7.3944 ] EKSB
[ 7.3948 ] partition type eks, magic id = EKSB
[ 7.3983 ] tegrahost_v2 --chip 0x23 0 --align eks_t234_aligned.img
[ 7.4022 ] tegrahost_v2 --chip 0x23 0 --magicid EKSB --ratchet_blob ratchet_blob.bin --appendsigheader eks_t234_aligned.img zerosbk
[ 7.4039 ] adding BCH for eks_t234_aligned.img
[ 7.4073 ] tegrasign_v3.py --key None --list eks_t234_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512
[ 7.4076 ] Assuming zero filled SBK key
[ 7.4107 ] Warning: pub_key.key is not found
[ 7.4105 ] tegrahost_v2 --chip 0x23 0 --updatesigheader eks_t234_aligned_sigheader.img.encrypt eks_t234_aligned_sigheader.img.hash zerosbk
[ 7.4252 ] tegrahost_v2 --chip 0x23 0 --align uefi_jetson_with_dtb_aligned.bin
[ 7.4328 ] tegrahost_v2 --chip 0x23 0 --magicid CPBL --ratchet_blob ratchet_blob.bin --appendsigheader uefi_jetson_with_dtb_aligned.bin zerosbk
[ 7.4348 ] adding BCH for uefi_jetson_with_dtb_aligned.bin
[ 7.5481 ] tegrasign_v3.py --key None --list uefi_jetson_with_dtb_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 7.5485 ] Assuming zero filled SBK key
[ 7.5590 ] Warning: pub_key.key is not found
[ 7.5605 ] tegrahost_v2 --chip 0x23 0 --updatesigheader uefi_jetson_with_dtb_aligned_sigheader.bin.encrypt uefi_jetson_with_dtb_aligned_sigheader.bin.hash zerosbk
[ 7.5823 ] Copying enc\/signed file in /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6309 ] Copying br bct for multi chains
[ 7.6312 ] Signed BCT for boot chain A is copied to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/br_bct_BR.bct
[ 7.6314 ] Signed BCT for boot chain B is copied to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/br_bct_b_BR.bct
[ 7.6315 ] Copying BCT backup image bct_backup.img to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/bct_backup.img
[ 7.6406 ] Copying pscfw_t234_prod_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6419 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/pscfw_t234_prod_sigheader.bin.encrypt
[ 7.6420 ] Copying mce_flash_o10_cr_prod_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6426 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/mce_flash_o10_cr_prod_sigheader.bin.encrypt
[ 7.6426 ] Copying applet_t234_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6435 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/applet_t234_sigheader.bin.encrypt
[ 7.6435 ] Copying mb2_t234_with_mb2_bct_MB2_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6443 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/mb2_t234_with_mb2_bct_MB2_sigheader.bin.encrypt
[ 7.6443 ] Copying xusb_t234_prod_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6447 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/xusb_t234_prod_sigheader.bin.encrypt
[ 7.6447 ] Copying display-t234-dce_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6534 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/display-t234-dce_sigheader.bin.encrypt
[ 7.6534 ] Copying nvdec_t234_prod_sigheader.fw.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6540 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/nvdec_t234_prod_sigheader.fw.encrypt
[ 7.6540 ] Copying bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6552 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt
[ 7.6553 ] Copying tegra234-bpmp-3767-0003-3509-a02_with_odm_sigheader.dtb.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6555 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/tegra234-bpmp-3767-0003-3509-a02_with_odm_sigheader.dtb.encrypt
[ 7.6555 ] Copying camera-rtcpu-sce_sigheader.img.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6558 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/camera-rtcpu-sce_sigheader.img.encrypt
[ 7.6558 ] Copying camera-rtcpu-t234-rce_sigheader.img.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6565 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/camera-rtcpu-t234-rce_sigheader.img.encrypt
[ 7.6565 ] Copying adsp-fw_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6571 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/adsp-fw_sigheader.bin.encrypt
[ 7.6571 ] Copying spe_t234_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6575 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/spe_t234_sigheader.bin.encrypt
[ 7.6575 ] Copying tos-optee_t234_sigheader.img.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6588 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/tos-optee_t234_sigheader.img.encrypt
[ 7.6588 ] Copying eks_t234_sigheader.img.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6590 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/eks_t234_sigheader.img.encrypt
[ 7.6590 ] Copying uefi_jetson_with_dtb_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[ 7.6625 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/uefi_jetson_with_dtb_sigheader.bin.encrypt
[ 7.6661 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/flash.xml.tmp flash.idx
Using bpmp-dtb concatenated with odmdata in blob for t23x
./tegraflash.py --bl uefi_jetson_with_dtb_sigheader.bin.encrypt --bct br_bct_BR.bct --securedev --bldtb tegra234-p3767-0003-p3768-0000-a0.dtb --applet rcm_2_encrypt.rcm --applet_softfuse rcm_1_encrypt.rcm --cmd "rcmboot" --cfg secureflash.xml --chip 0x23 --mb1_bct mb1_bct_MB1_sigheader.bct.encrypt --mem_bct mem_rcm_sigheader.bct.encrypt --mb1_cold_boot_bct mb1_cold_boot_bct_MB1_sigheader.bct.encrypt --mb1_bin mb1_t234_prod_aligned_sigheader.bin.encrypt --psc_bl1_bin psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --mem_bct_cold_boot mem_coldboot_sigheader.bct.encrypt --bins "psc_fw pscfw_t234_prod_sigheader.bin.encrypt; mts_mce mce_flash_o10_cr_prod_sigheader.bin.encrypt; mb2_applet applet_t234_sigheader.bin.encrypt; mb2_bootloader mb2_t234_with_mb2_cold_boot_bct_MB2_sigheader.bin.encrypt; xusb_fw xusb_t234_prod_sigheader.bin.encrypt; dce_fw display-t234-dce_sigheader.bin.encrypt; nvdec nvdec_t234_prod_sigheader.fw.encrypt; bpmp_fw bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt; bpmp_fw_dtb tegra234-bpmp-3767-0003-3509-a02_with_odm_sigheader.dtb.encrypt; sce_fw camera-rtcpu-sce_sigheader.img.encrypt; rce_fw camera-rtcpu-t234-rce_sigheader.img.encrypt; ape_fw adsp-fw_sigheader.bin.encrypt; spe_fw spe_t234_sigheader.bin.encrypt; tos tos-optee_t234_sigheader.img.encrypt; eks eks_t234_sigheader.img.encrypt; kernel boot.img; kernel_dtb tegra234-p3767-0003-p3768-0000-a0.dtb" --secondary_gpt_backup --bct_backup
saving flash command in flashcmd.txt
*** no-flash flag enabled. Exiting now... ***
User can run above saved command in factory environment without
providing pkc and sbk keys to flash a device
Example:
$ cd bootloader
$ sudo bash ./flashcmd.txt
Save initrd flashing command parameters to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/tools/kernel_flash/initrdflashparam.txt
/tmp/tmp.urbRGhGvTP /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra
writing boot image config in bootimg.cfg
extracting kernel in zImage
extracting ramdisk in initrd.img
/tmp/tmp.urbRGhGvTP/initrd /tmp/tmp.urbRGhGvTP /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra
58248 blocks
84422 blocks
/tmp/tmp.urbRGhGvTP /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra
flashimg0=boot0.img
/home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra
Success
Cleaning up...
Finish generating flash package.
/home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh --network usb0 --usb-instance 1-5 --device-instance 0 --flash-only --external-device nvme0n1p1 -c "tools/kernel_flash/flash_l4t_t234_nvme.xml" --network usb0 jetson-orin-nano-devkit internal
**********************************************
* *
* Step 1: Build the flashing environment *
* *
**********************************************
Create flash environment 0
/home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra
/home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra
Finish creating flash environment 0.
****************************************************
* *
* Step 2: Boot the device with flash initrd image *
* *
****************************************************
/home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/temp_initrdflash/bootloader0 /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra
./tegraflash.py --bl uefi_jetson_with_dtb_sigheader.bin.encrypt --bct br_bct_BR.bct --securedev --bldtb tegra234-p3767-0003-p3768-0000-a0.dtb --applet rcm_2_encrypt.rcm --applet_softfuse rcm_1_encrypt.rcm --cmd "rcmboot" --cfg secureflash.xml --chip 0x23 --mb1_bct mb1_bct_MB1_sigheader.bct.encrypt --mem_bct mem_rcm_sigheader.bct.encrypt --mb1_cold_boot_bct mb1_cold_boot_bct_MB1_sigheader.bct.encrypt --mb1_bin mb1_t234_prod_aligned_sigheader.bin.encrypt --psc_bl1_bin psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --mem_bct_cold_boot mem_coldboot_sigheader.bct.encrypt --bins "psc_fw pscfw_t234_prod_sigheader.bin.encrypt; mts_mce mce_flash_o10_cr_prod_sigheader.bin.encrypt; mb2_applet applet_t234_sigheader.bin.encrypt; mb2_bootloader mb2_t234_with_mb2_cold_boot_bct_MB2_sigheader.bin.encrypt; xusb_fw xusb_t234_prod_sigheader.bin.encrypt; dce_fw display-t234-dce_sigheader.bin.encrypt; nvdec nvdec_t234_prod_sigheader.fw.encrypt; bpmp_fw bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt; bpmp_fw_dtb tegra234-bpmp-3767-0003-3509-a02_with_odm_sigheader.dtb.encrypt; sce_fw camera-rtcpu-sce_sigheader.img.encrypt; rce_fw camera-rtcpu-t234-rce_sigheader.img.encrypt; ape_fw adsp-fw_sigheader.bin.encrypt; spe_fw spe_t234_sigheader.bin.encrypt; tos tos-optee_t234_sigheader.img.encrypt; eks eks_t234_sigheader.img.encrypt; kernel boot0.img; kernel_dtb tegra234-p3767-0003-p3768-0000-a0.dtb" --secondary_gpt_backup --bct_backup --instance 1-5
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
Entering RCM boot
[ 0.0553 ] mb1_t234_prod_aligned_sigheader.bin.encrypt filename is from --mb1_bin
[ 0.0553 ] psc_bl1_t234_prod_aligned_sigheader.bin.encrypt filename is from --psc_bl1_bin
[ 0.0553 ] rcm boot with presigned binaries
[ 0.0568 ] tegrarcm_v2 --instance 1-5 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[ 0.0582 ] BR_CID: 0x80012344705DF0C9140000000CFF0100
[ 0.0865 ] Sending bct_br
[ 0.1125 ] Sending mb1
[ 0.1131 ] Sending psc_bl1
[ 0.1244 ] Sending bct_mb1
[ 0.1302 ] Generating blob for T23x
[ 0.1333 ] tegrahost_v2 --chip 0x23 0 --generateblob blob.xml blob.bin
[ 0.1347 ] The number of images in blob is 18
[ 0.1352 ] blobsize is 73372442
[ 0.1354 ] Added binary blob_uefi_jetson_with_dtb_sigheader.bin.encrypt of size 2924608
[ 0.1905 ] Added binary blob_pscfw_t234_prod_sigheader.bin.encrypt of size 375168
[ 0.1915 ] Added binary blob_mce_flash_o10_cr_prod_sigheader.bin.encrypt of size 190592
[ 0.1922 ] Added binary blob_applet_t234_sigheader.bin.encrypt of size 277312
[ 0.1928 ] Not supported type: mb2_applet
[ 0.1931 ] Added binary blob_mb2_t234_with_mb2_cold_boot_bct_MB2_sigheader.bin.encrypt of size 438768
[ 0.1939 ] Added binary blob_xusb_t234_prod_sigheader.bin.encrypt of size 164864
[ 0.1946 ] Added binary blob_display-t234-dce_sigheader.bin.encrypt of size 9097216
[ 0.2008 ] Added binary blob_nvdec_t234_prod_sigheader.fw.encrypt of size 294912
[ 0.2034 ] Added binary blob_bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt of size 1051136
[ 0.2048 ] Added binary blob_tegra234-bpmp-3767-0003-3509-a02_with_odm_sigheader.dtb.encrypt of size 110080
[ 0.2058 ] Added binary blob_camera-rtcpu-sce_sigheader.img.encrypt of size 166304
[ 0.2065 ] Added binary blob_camera-rtcpu-t234-rce_sigheader.img.encrypt of size 537952
[ 0.2077 ] Added binary blob_adsp-fw_sigheader.bin.encrypt of size 400864
[ 0.2082 ] Added binary blob_spe_t234_sigheader.bin.encrypt of size 270336
[ 0.2088 ] Added binary blob_tos-optee_t234_sigheader.img.encrypt of size 1127568
[ 0.2095 ] Added binary blob_eks_t234_sigheader.img.encrypt of size 9232
[ 0.2101 ] Added binary blob_boot0.img of size 55586816
[ 0.2590 ] Added binary blob_tegra234-p3767-0003-p3768-0000-a0.dtb of size 347610
[ 0.3397 ] tegrarcm_v2 --instance 1-5 --chip 0x23 0 --pollbl --download bct_mem mem_rcm_sigheader.bct.encrypt --download blob blob.bin
[ 0.3410 ] BL: version 1.2.0.0-t234-54845784-562369e5 last_boot_error: 0
[ 0.3728 ] Sending bct_mem
[ 0.3994 ] Sending blob
[ 3.8172 ] RCM-boot started
/home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra
***************************************
* *
* Step 3: Start the flashing process *
* *
***************************************
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for device to expose ssh ......RTNETLINK answers: File exists
RTNETLINK answers: File exists
Waiting for device to expose ssh ...Run command: flash on fc00:1:1:0::2
SSH ready
mount.nfs: Connection timed out
Flash failure
Cleaning up...
My host pc is running ubuntu 20.04.6. I had this orin previously flashed with jetpack 5.1.1 but i wanted to upgrade but the new one will not build it keeps timing out.
also its the developerkit that comes from nvidia