Cannot flash jetson orin nano

hello, I am trying to flash my jetson orin nano and i keep getting an error:

l --pubkeyhash pub_key.key --sha sha512
[   7.0988 ] Assuming zero filled SBK key
[   7.1044 ] Warning: pub_key.key is not found
[   7.1043 ] tegrahost_v2 --chip 0x23 0 --updatesigheader bpmp_t234-TE950M-A1_prod_aligned_sigheader.bin.encrypt bpmp_t234-TE950M-A1_prod_aligned_sigheader.bin.hash zerosbk
[   7.1118 ] Using bpmp-dtb concatenated with odmdata
[   7.1119 ] Get magic id
[   7.1147 ] tegraparser_v2 --get_magic bpmp_fw_dtb
[   7.1180 ] BPMD
[   7.1180 ] 
[   7.1181 ] partition type bpmp_fw_dtb, magic id = BPMD
[   7.1207 ] tegrahost_v2 --chip 0x23 0 --align tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned.dtb
[   7.1242 ] tegrahost_v2 --chip 0x23 0 --magicid BPMD --ratchet_blob ratchet_blob.bin --appendsigheader tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned.dtb zerosbk
[   7.1258 ] adding BCH for tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned.dtb
[   7.1336 ] tegrasign_v3.py --key None --list tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned_sigheader.dtb_list.xml --pubkeyhash pub_key.key --sha sha512
[   7.1339 ] Assuming zero filled SBK key
[   7.1374 ] Warning: pub_key.key is not found
[   7.1373 ] tegrahost_v2 --chip 0x23 0 --updatesigheader tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned_sigheader.dtb.encrypt tegra234-bpmp-3767-0003-3509-a02_with_odm_aligned_sigheader.dtb.hash zerosbk
[   7.1424 ] Get magic id
[   7.1457 ] tegraparser_v2 --get_magic sce_fw
[   7.1483 ] SCEF
[   7.1484 ] 
[   7.1485 ] partition type sce_fw, magic id = SCEF
[   7.1515 ] tegrahost_v2 --chip 0x23 0 --align camera-rtcpu-sce_aligned.img
[   7.1556 ] tegrahost_v2 --chip 0x23 0 --magicid SCEF --ratchet_blob ratchet_blob.bin --appendsigheader camera-rtcpu-sce_aligned.img zerosbk
[   7.1582 ] adding BCH for camera-rtcpu-sce_aligned.img
[   7.1679 ] tegrasign_v3.py --key None --list camera-rtcpu-sce_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512
[   7.1683 ] Assuming zero filled SBK key
[   7.1723 ] Warning: pub_key.key is not found
[   7.1735 ] tegrahost_v2 --chip 0x23 0 --updatesigheader camera-rtcpu-sce_aligned_sigheader.img.encrypt camera-rtcpu-sce_aligned_sigheader.img.hash zerosbk
[   7.1784 ] Get magic id
[   7.1811 ] tegraparser_v2 --get_magic rce_fw
[   7.1831 ] RCEF
[   7.1832 ] 
[   7.1832 ] partition type rce_fw, magic id = RCEF
[   7.1862 ] tegrahost_v2 --chip 0x23 0 --align camera-rtcpu-t234-rce_aligned.img
[   7.1897 ] tegrahost_v2 --chip 0x23 0 --magicid RCEF --ratchet_blob ratchet_blob.bin --appendsigheader camera-rtcpu-t234-rce_aligned.img zerosbk
[   7.1913 ] adding BCH for camera-rtcpu-t234-rce_aligned.img
[   7.2170 ] tegrasign_v3.py --key None --list camera-rtcpu-t234-rce_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512
[   7.2173 ] Assuming zero filled SBK key
[   7.2218 ] Warning: pub_key.key is not found
[   7.2217 ] tegrahost_v2 --chip 0x23 0 --updatesigheader camera-rtcpu-t234-rce_aligned_sigheader.img.encrypt camera-rtcpu-t234-rce_aligned_sigheader.img.hash zerosbk
[   7.2259 ] Get magic id
[   7.2282 ] tegraparser_v2 --get_magic ape_fw
[   7.2300 ] APEF
[   7.2302 ] partition type ape_fw, magic id = APEF
[   7.2338 ] tegrahost_v2 --chip 0x23 0 --align adsp-fw_aligned.bin
[   7.2400 ] tegrahost_v2 --chip 0x23 0 --magicid APEF --ratchet_blob ratchet_blob.bin --appendsigheader adsp-fw_aligned.bin zerosbk
[   7.2427 ] adding BCH for adsp-fw_aligned.bin
[   7.2617 ] tegrasign_v3.py --key None --list adsp-fw_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   7.2622 ] Assuming zero filled SBK key
[   7.2671 ] Warning: pub_key.key is not found
[   7.2679 ] tegrahost_v2 --chip 0x23 0 --updatesigheader adsp-fw_aligned_sigheader.bin.encrypt adsp-fw_aligned_sigheader.bin.hash zerosbk
[   7.2739 ] Get magic id
[   7.2762 ] tegraparser_v2 --get_magic spe_fw
[   7.2784 ] SPEF
[   7.2784 ] 
[   7.2785 ] partition type spe_fw, magic id = SPEF
[   7.2810 ] tegrahost_v2 --chip 0x23 0 --align spe_t234_aligned.bin
[   7.2845 ] tegrahost_v2 --chip 0x23 0 --magicid SPEF --ratchet_blob ratchet_blob.bin --appendsigheader spe_t234_aligned.bin zerosbk
[   7.2864 ] adding BCH for spe_t234_aligned.bin
[   7.3013 ] tegrasign_v3.py --key None --list spe_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   7.3017 ] Assuming zero filled SBK key
[   7.3070 ] Warning: pub_key.key is not found
[   7.3075 ] tegrahost_v2 --chip 0x23 0 --updatesigheader spe_t234_aligned_sigheader.bin.encrypt spe_t234_aligned_sigheader.bin.hash zerosbk
[   7.3113 ] Get magic id
[   7.3134 ] tegraparser_v2 --get_magic tos
[   7.3152 ] TOSB
[   7.3153 ] 
[   7.3153 ] partition type tos, magic id = TOSB
[   7.3192 ] tegrahost_v2 --chip 0x23 0 --align tos-optee_t234_aligned.img
[   7.3228 ] tegrahost_v2 --chip 0x23 0 --magicid TOSB --ratchet_blob ratchet_blob.bin --appendsigheader tos-optee_t234_aligned.img zerosbk
[   7.3247 ] adding BCH for tos-optee_t234_aligned.img
[   7.3737 ] tegrasign_v3.py --key None --list tos-optee_t234_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512
[   7.3740 ] Assuming zero filled SBK key
[   7.3796 ] Warning: pub_key.key is not found
[   7.3796 ] tegrahost_v2 --chip 0x23 0 --updatesigheader tos-optee_t234_aligned_sigheader.img.encrypt tos-optee_t234_aligned_sigheader.img.hash zerosbk
[   7.3881 ] Get magic id
[   7.3914 ] tegraparser_v2 --get_magic eks
[   7.3944 ] EKSB
[   7.3948 ] partition type eks, magic id = EKSB
[   7.3983 ] tegrahost_v2 --chip 0x23 0 --align eks_t234_aligned.img
[   7.4022 ] tegrahost_v2 --chip 0x23 0 --magicid EKSB --ratchet_blob ratchet_blob.bin --appendsigheader eks_t234_aligned.img zerosbk
[   7.4039 ] adding BCH for eks_t234_aligned.img
[   7.4073 ] tegrasign_v3.py --key None --list eks_t234_aligned_sigheader.img_list.xml --pubkeyhash pub_key.key --sha sha512
[   7.4076 ] Assuming zero filled SBK key
[   7.4107 ] Warning: pub_key.key is not found
[   7.4105 ] tegrahost_v2 --chip 0x23 0 --updatesigheader eks_t234_aligned_sigheader.img.encrypt eks_t234_aligned_sigheader.img.hash zerosbk
[   7.4252 ] tegrahost_v2 --chip 0x23 0 --align uefi_jetson_with_dtb_aligned.bin
[   7.4328 ] tegrahost_v2 --chip 0x23 0 --magicid CPBL --ratchet_blob ratchet_blob.bin --appendsigheader uefi_jetson_with_dtb_aligned.bin zerosbk
[   7.4348 ] adding BCH for uefi_jetson_with_dtb_aligned.bin
[   7.5481 ] tegrasign_v3.py --key None --list uefi_jetson_with_dtb_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   7.5485 ] Assuming zero filled SBK key
[   7.5590 ] Warning: pub_key.key is not found
[   7.5605 ] tegrahost_v2 --chip 0x23 0 --updatesigheader uefi_jetson_with_dtb_aligned_sigheader.bin.encrypt uefi_jetson_with_dtb_aligned_sigheader.bin.hash zerosbk
[   7.5823 ] Copying enc\/signed file in /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6309 ] Copying br bct for multi chains
[   7.6312 ] Signed BCT for boot chain A is copied to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/br_bct_BR.bct

[   7.6314 ] Signed BCT for boot chain B is copied to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/br_bct_b_BR.bct

[   7.6315 ] Copying BCT backup image bct_backup.img to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/bct_backup.img
[   7.6406 ] Copying pscfw_t234_prod_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6419 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/pscfw_t234_prod_sigheader.bin.encrypt
[   7.6420 ] Copying mce_flash_o10_cr_prod_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6426 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/mce_flash_o10_cr_prod_sigheader.bin.encrypt
[   7.6426 ] Copying applet_t234_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6435 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/applet_t234_sigheader.bin.encrypt
[   7.6435 ] Copying mb2_t234_with_mb2_bct_MB2_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6443 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/mb2_t234_with_mb2_bct_MB2_sigheader.bin.encrypt
[   7.6443 ] Copying xusb_t234_prod_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6447 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/xusb_t234_prod_sigheader.bin.encrypt
[   7.6447 ] Copying display-t234-dce_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6534 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/display-t234-dce_sigheader.bin.encrypt
[   7.6534 ] Copying nvdec_t234_prod_sigheader.fw.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6540 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/nvdec_t234_prod_sigheader.fw.encrypt
[   7.6540 ] Copying bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6552 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt
[   7.6553 ] Copying tegra234-bpmp-3767-0003-3509-a02_with_odm_sigheader.dtb.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6555 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/tegra234-bpmp-3767-0003-3509-a02_with_odm_sigheader.dtb.encrypt
[   7.6555 ] Copying camera-rtcpu-sce_sigheader.img.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6558 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/camera-rtcpu-sce_sigheader.img.encrypt
[   7.6558 ] Copying camera-rtcpu-t234-rce_sigheader.img.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6565 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/camera-rtcpu-t234-rce_sigheader.img.encrypt
[   7.6565 ] Copying adsp-fw_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6571 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/adsp-fw_sigheader.bin.encrypt
[   7.6571 ] Copying spe_t234_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6575 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/spe_t234_sigheader.bin.encrypt
[   7.6575 ] Copying tos-optee_t234_sigheader.img.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6588 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/tos-optee_t234_sigheader.img.encrypt
[   7.6588 ] Copying eks_t234_sigheader.img.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6590 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/eks_t234_sigheader.img.encrypt
[   7.6590 ] Copying uefi_jetson_with_dtb_sigheader.bin.encrypt to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed
[   7.6625 ] Signed file: /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/uefi_jetson_with_dtb_sigheader.bin.encrypt
[   7.6661 ] tegraparser_v2 --pt flash.xml.bin --generateflashindex /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/flash.xml.tmp flash.idx
Using bpmp-dtb concatenated with odmdata in blob for t23x
./tegraflash.py --bl uefi_jetson_with_dtb_sigheader.bin.encrypt --bct br_bct_BR.bct --securedev  --bldtb tegra234-p3767-0003-p3768-0000-a0.dtb --applet rcm_2_encrypt.rcm --applet_softfuse rcm_1_encrypt.rcm --cmd "rcmboot"  --cfg secureflash.xml --chip 0x23 --mb1_bct mb1_bct_MB1_sigheader.bct.encrypt --mem_bct mem_rcm_sigheader.bct.encrypt --mb1_cold_boot_bct mb1_cold_boot_bct_MB1_sigheader.bct.encrypt --mb1_bin mb1_t234_prod_aligned_sigheader.bin.encrypt --psc_bl1_bin psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --mem_bct_cold_boot mem_coldboot_sigheader.bct.encrypt  --bins "psc_fw pscfw_t234_prod_sigheader.bin.encrypt; mts_mce mce_flash_o10_cr_prod_sigheader.bin.encrypt; mb2_applet applet_t234_sigheader.bin.encrypt; mb2_bootloader mb2_t234_with_mb2_cold_boot_bct_MB2_sigheader.bin.encrypt; xusb_fw xusb_t234_prod_sigheader.bin.encrypt; dce_fw display-t234-dce_sigheader.bin.encrypt; nvdec nvdec_t234_prod_sigheader.fw.encrypt; bpmp_fw bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt; bpmp_fw_dtb tegra234-bpmp-3767-0003-3509-a02_with_odm_sigheader.dtb.encrypt; sce_fw camera-rtcpu-sce_sigheader.img.encrypt; rce_fw camera-rtcpu-t234-rce_sigheader.img.encrypt; ape_fw adsp-fw_sigheader.bin.encrypt; spe_fw spe_t234_sigheader.bin.encrypt; tos tos-optee_t234_sigheader.img.encrypt; eks eks_t234_sigheader.img.encrypt; kernel boot.img; kernel_dtb tegra234-p3767-0003-p3768-0000-a0.dtb"    --secondary_gpt_backup  --bct_backup 
saving flash command in flashcmd.txt

*** no-flash flag enabled. Exiting now... *** 

User can run above saved command in factory environment without 
providing pkc and sbk keys to flash a device

Example:

    $ cd bootloader 
    $ sudo bash ./flashcmd.txt

Save initrd flashing command parameters to /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/tools/kernel_flash/initrdflashparam.txt
/tmp/tmp.urbRGhGvTP /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra
writing boot image config in bootimg.cfg
extracting kernel in zImage
extracting ramdisk in initrd.img
/tmp/tmp.urbRGhGvTP/initrd /tmp/tmp.urbRGhGvTP /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra
58248 blocks
84422 blocks
/tmp/tmp.urbRGhGvTP /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra
flashimg0=boot0.img
/home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra
Success
Cleaning up...
Finish generating flash package.
/home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh --network usb0 --usb-instance 1-5 --device-instance 0 --flash-only --external-device nvme0n1p1 -c "tools/kernel_flash/flash_l4t_t234_nvme.xml" --network usb0 jetson-orin-nano-devkit internal
**********************************************
*                                            *
*  Step 1: Build the flashing environment    *
*                                            *
**********************************************
Create flash environment 0
/home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra
/home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra
Finish creating flash environment 0.
****************************************************
*                                                  *
*  Step 2: Boot the device with flash initrd image *
*                                                  *
****************************************************
/home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/temp_initrdflash/bootloader0 /home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra
./tegraflash.py --bl uefi_jetson_with_dtb_sigheader.bin.encrypt --bct br_bct_BR.bct --securedev  --bldtb tegra234-p3767-0003-p3768-0000-a0.dtb --applet rcm_2_encrypt.rcm --applet_softfuse rcm_1_encrypt.rcm --cmd "rcmboot"  --cfg secureflash.xml --chip 0x23 --mb1_bct mb1_bct_MB1_sigheader.bct.encrypt --mem_bct mem_rcm_sigheader.bct.encrypt --mb1_cold_boot_bct mb1_cold_boot_bct_MB1_sigheader.bct.encrypt --mb1_bin mb1_t234_prod_aligned_sigheader.bin.encrypt --psc_bl1_bin psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --mem_bct_cold_boot mem_coldboot_sigheader.bct.encrypt  --bins "psc_fw pscfw_t234_prod_sigheader.bin.encrypt; mts_mce mce_flash_o10_cr_prod_sigheader.bin.encrypt; mb2_applet applet_t234_sigheader.bin.encrypt; mb2_bootloader mb2_t234_with_mb2_cold_boot_bct_MB2_sigheader.bin.encrypt; xusb_fw xusb_t234_prod_sigheader.bin.encrypt; dce_fw display-t234-dce_sigheader.bin.encrypt; nvdec nvdec_t234_prod_sigheader.fw.encrypt; bpmp_fw bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt; bpmp_fw_dtb tegra234-bpmp-3767-0003-3509-a02_with_odm_sigheader.dtb.encrypt; sce_fw camera-rtcpu-sce_sigheader.img.encrypt; rce_fw camera-rtcpu-t234-rce_sigheader.img.encrypt; ape_fw adsp-fw_sigheader.bin.encrypt; spe_fw spe_t234_sigheader.bin.encrypt; tos tos-optee_t234_sigheader.img.encrypt; eks eks_t234_sigheader.img.encrypt; kernel boot0.img; kernel_dtb tegra234-p3767-0003-p3768-0000-a0.dtb"    --secondary_gpt_backup  --bct_backup  --instance 1-5
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 

 Entering RCM boot

[   0.0553 ] mb1_t234_prod_aligned_sigheader.bin.encrypt filename is from --mb1_bin
[   0.0553 ] psc_bl1_t234_prod_aligned_sigheader.bin.encrypt filename is from --psc_bl1_bin
[   0.0553 ] rcm boot with presigned binaries
[   0.0568 ] tegrarcm_v2 --instance 1-5 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[   0.0582 ] BR_CID: 0x80012344705DF0C9140000000CFF0100
[   0.0865 ] Sending bct_br
[   0.1125 ] Sending mb1
[   0.1131 ] Sending psc_bl1
[   0.1244 ] Sending bct_mb1
[   0.1302 ] Generating blob for T23x
[   0.1333 ] tegrahost_v2 --chip 0x23 0 --generateblob blob.xml blob.bin
[   0.1347 ] The number of images in blob is 18
[   0.1352 ] blobsize is 73372442
[   0.1354 ] Added binary blob_uefi_jetson_with_dtb_sigheader.bin.encrypt of size 2924608
[   0.1905 ] Added binary blob_pscfw_t234_prod_sigheader.bin.encrypt of size 375168
[   0.1915 ] Added binary blob_mce_flash_o10_cr_prod_sigheader.bin.encrypt of size 190592
[   0.1922 ] Added binary blob_applet_t234_sigheader.bin.encrypt of size 277312
[   0.1928 ] Not supported type: mb2_applet
[   0.1931 ] Added binary blob_mb2_t234_with_mb2_cold_boot_bct_MB2_sigheader.bin.encrypt of size 438768
[   0.1939 ] Added binary blob_xusb_t234_prod_sigheader.bin.encrypt of size 164864
[   0.1946 ] Added binary blob_display-t234-dce_sigheader.bin.encrypt of size 9097216
[   0.2008 ] Added binary blob_nvdec_t234_prod_sigheader.fw.encrypt of size 294912
[   0.2034 ] Added binary blob_bpmp_t234-TE950M-A1_prod_sigheader.bin.encrypt of size 1051136
[   0.2048 ] Added binary blob_tegra234-bpmp-3767-0003-3509-a02_with_odm_sigheader.dtb.encrypt of size 110080
[   0.2058 ] Added binary blob_camera-rtcpu-sce_sigheader.img.encrypt of size 166304
[   0.2065 ] Added binary blob_camera-rtcpu-t234-rce_sigheader.img.encrypt of size 537952
[   0.2077 ] Added binary blob_adsp-fw_sigheader.bin.encrypt of size 400864
[   0.2082 ] Added binary blob_spe_t234_sigheader.bin.encrypt of size 270336
[   0.2088 ] Added binary blob_tos-optee_t234_sigheader.img.encrypt of size 1127568
[   0.2095 ] Added binary blob_eks_t234_sigheader.img.encrypt of size 9232
[   0.2101 ] Added binary blob_boot0.img of size 55586816
[   0.2590 ] Added binary blob_tegra234-p3767-0003-p3768-0000-a0.dtb of size 347610
[   0.3397 ] tegrarcm_v2 --instance 1-5 --chip 0x23 0 --pollbl --download bct_mem mem_rcm_sigheader.bct.encrypt --download blob blob.bin
[   0.3410 ] BL: version 1.2.0.0-t234-54845784-562369e5 last_boot_error: 0
[   0.3728 ] Sending bct_mem
[   0.3994 ] Sending blob
[   3.8172 ] RCM-boot started

/home/castej/bootFromExternalStorage/R35.4.1/Linux_for_Tegra
***************************************
*                                     *
*  Step 3: Start the flashing process *
*                                     *
***************************************
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for target to boot-up...
Waiting for device to expose ssh ......RTNETLINK answers: File exists
RTNETLINK answers: File exists
Waiting for device to expose ssh ...Run command: flash on fc00:1:1:0::2
SSH ready
mount.nfs: Connection timed out
Flash failure
Cleaning up...

My host pc is running ubuntu 20.04.6. I had this orin previously flashed with jetpack 5.1.1 but i wanted to upgrade but the new one will not build it keeps timing out.
also its the developerkit that comes from nvidia

here is the log from the SDK Manager
SDKM_logs_JetPack_5.1.2_Linux_for_Jetson_Orin_Nano_modules_2023-11-03_23-36-29.zip (175.4 KB)

Hi,

We also need serial console log from the device side; only flashing log from the host side is not enough for identifying the real issue.

hello @DaveYYY thanks for the reply,

I looked at the video, are the steps the same for the jetson Orin nano? and how could i extract the serial console log from the device? i see in the video he just booted up the jetson but I’m not sure where the log files are stored.

thank you for your time.

YES, the pins are the same, and you need a TTL-USB cable for doing that.
If you are not familiar with minicom, then picocom should also do it:

sudo picocom -b 115200 /dev/ttyUSB0

Then just copy everything printed on the screen into a text file.

hello @DaveYYY i was able to get both the logs, I am actually trying to flash the Jetson orin NX module with the Jetson Orin Nano developer kit board. here are the logs:
SDKM_logs_JetPack_5.1.2_Linux_for_Jetson_Orin_NX_modules_2023-11-08_17-04-14.zip (269.5 KB)
serial-console-log-jetson-rin-nx.txt (102.3 KB)

Would it succeed if you flash 5.1.1 again now?
Your device seems to be working fine, and it looks like some permission issues on your host.

The NFS server is not handled by us, and you may need to search for the solution yourself.
Or just find another host PC for flashing.

1 Like

@DaveYYY I was able to use a different computer to flash the jetson. although im not sure why it did not flash on my laptop since thats what i used to fash it the first time.

thank you for your help the issue is resolved!

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.