Cannot Open USB while flashing TX2

Hello,

We are trying to flash a new/frash Jetson we have with one of the old frozen images. We have seen this Cannot Open USB after few seconds. We have also tried to flash a fresh system.img instead of using the old image, but still facing the same situation. How can we know what’s the exact issue?.

From the lsusb, we see that the device is properly in recovery mode, however, it doesn’t work. Any leads is appreciated.

root@greece:/64_TX2/Linux_for_Tegra/bootloader# cd … && ./flash.sh -r orbitty mmcblk0p1
###############################################################################

L4T BSP Information:

R28 (release), REVISION: 2.0, GCID: 10567845, BOARD: t186ref, EABI: aarch64,

DATE: Fri Mar 2 04:57:01 UTC 2018

###############################################################################

Target Board Information:

Name: orbitty, Board Family: t186ref, SoC: Tegra 186,

OpMode: production, Boot Authentication: ,

###############################################################################
./tegraflash.py --chip 0x18 --applet “/64_TX2/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin” --cmd “dump eeprom boardinfo cvm.bin” --skipuid
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0017 ] Generating RCM messages
[ 0.0023 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 --download rcm /64_TX2/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin 0 0
[ 0.0029 ] RCM 0 is saved as rcm_0.rcm
[ 0.0034 ] RCM 1 is saved as rcm_1.rcm
[ 0.0034 ] List of rcm files are saved in rcm_list.xml
[ 0.0034 ]
[ 0.0035 ] Signing RCM messages
[ 0.0041 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0047 ] Assuming zero filled SBK key
[ 0.0072 ]
[ 0.0073 ] Copying signature to RCM mesages
[ 0.0079 ] tegrarcm_v2 --chip 0x18 --updatesig rcm_list_signed.xml
[ 0.0088 ]
[ 0.0089 ] Boot Rom communication
[ 0.0095 ] tegrarcm_v2 --chip 0x18 --rcm rcm_list_signed.xml --skipuid
[ 0.0100 ] RCM version 0X180001
[ 0.0109 ] Boot Rom communication completed
[ 1.0176 ]
[ 1.0206 ] tegrarcm_v2 --isapplet
[ 1.0233 ] Applet version 01.00.0000
[ 1.0443 ]
[ 1.0474 ] Retrieving EEPROM data
[ 1.0477 ] tegrarcm_v2 --oem platformdetails eeprom cvm /64_TX2/Linux_for_Tegra/bootloader/cvm.bin
[ 1.0504 ] Applet version 01.00.0000
[ 1.0836 ] Saved platform info in /64_TX2/Linux_for_Tegra/bootloader/cvm.bin
[ 1.1619 ]

copying bctfile(/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg)… done.
copying misc_config(/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)… done.
copying pinmux_config(/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg)… done.
copying pmic_config(/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg)… done.
copying pmc_config(/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg)… done.
copying prod_config(/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg)… done.
copying scr_config(/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/minimal_scr.cfg)… done.
copying scr_cold_boot_config(/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/mobile_scr.cfg)… done.
copying bootrom_config(/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg)… done.
copying dev_params(/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/emmc.cfg)… done.
Existing bootloader(/64_TX2/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
populating kernel to rootfs… done.
populating initrd to rootfs… done.
populating extlinux.conf.emmc to rootfs… done.
populating /64_TX2/Linux_for_Tegra/kernel/dtb/tegra186-tx2-cti-ASG001-USB3.dtb to rootfs… done.
done.
Making Boot image… done.
Existing sosfile(/64_TX2/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin) reused.
copying tegraboot(/64_TX2/Linux_for_Tegra/bootloader/t186ref/nvtboot.bin)… done.
Existing mb2blfile(/64_TX2/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
Existing mtspreboot(/64_TX2/Linux_for_Tegra/bootloader/preboot_d15_prod_cr.bin) reused.
Existing mts(/64_TX2/Linux_for_Tegra/bootloader/mce_mts_d15_prod_cr.bin) reused.
Existing mb1file(/64_TX2/Linux_for_Tegra/bootloader/mb1_prod.bin) reused.
Existing bpffile(/64_TX2/Linux_for_Tegra/bootloader/bpmp.bin) reused.
copying bpfdtbfile(/64_TX2/Linux_for_Tegra/bootloader/t186ref/tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb)… done.
Existing scefile(/64_TX2/Linux_for_Tegra/bootloader/camera-rtcpu-sce.bin) reused.
Existing spefile(/64_TX2/Linux_for_Tegra/bootloader/spe.bin) reused.
copying wb0boot(/64_TX2/Linux_for_Tegra/bootloader/t186ref/warmboot.bin)… done.
Existing tosfile(/64_TX2/Linux_for_Tegra/bootloader/tos.img) reused.
Existing eksfile(/64_TX2/Linux_for_Tegra/bootloader/eks.img) reused.
copying dtbfile(/64_TX2/Linux_for_Tegra/kernel/dtb/tegra186-tx2-cti-ASG001-USB3.dtb)… done.
Reusing existing system.img…
done.
Existing tbcfile(/64_TX2/Linux_for_Tegra/bootloader/cboot.bin) reused.
copying tbcdtbfile(/64_TX2/Linux_for_Tegra/kernel/dtb/tegra186-tx2-cti-ASG001-USB3.dtb)… done.
copying cfgfile(/64_TX2/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml… done.
Existing flasher(/64_TX2/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing flashapp(/64_TX2/Linux_for_Tegra/bootloader/tegraflash.py) reused.
./tegraflash.py --bl nvtboot_recovery_cpu.bin --sdram_config P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --odmdata 0x1090000 --applet mb1_recovery_prod.bin --cmd “flash; reboot” --cfg flash.xml --chip 0x18 --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg --bins “mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb; tlk tos.img; eks eks.img; bootloader_dtb tegra186-tx2-cti-ASG001-USB3.dtb”
saving flash command in /64_TX2/Linux_for_Tegra/bootloader/flashcmd.txt
./tegraflash.py --bl nvtboot_recovery_cpu.bin --sdram_config P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --odmdata 0x1090000 --applet mb1_recovery_prod.bin --cmd “flash; reboot” --cfg flash.xml --chip 0x18 --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg --bins “mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb; tlk tos.img; eks eks.img; bootloader_dtb tegra186-tx2-cti-ASG001-USB3.dtb”
copying boot image (boot.img.sb)… done.
copying partition layout (flash.xml.sb)… done.
copying kernel dtb (tegra186-tx2-cti-ASG001-USB3.dtb.sb)… done.
saving flash parameters in /64_TX2/Linux_for_Tegra/bootloader/flash_parameters.txt
–bl nvtboot_recovery_cpu.bin --sdram_config P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --odmdata 0x1090000 --applet mb1_recovery_prod.bin --cmd “flash; reboot” --cfg flash.xml --chip 0x18 --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg --bins “mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb; tlk tos.img; eks eks.img; bootloader_dtb tegra186-tx2-cti-ASG001-USB3.dtb”
*** Flashing target device started. ***
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0006 ] tegrasign_v2 --key None --getmode mode.txt
[ 0.0014 ] Assuming zero filled SBK key
[ 0.0014 ]
[ 0.0014 ] Generating RCM messages
[ 0.0019 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 --download rcm mb1_recovery_prod.bin 0 0
[ 0.0024 ] RCM 0 is saved as rcm_0.rcm
[ 0.0027 ] RCM 1 is saved as rcm_1.rcm
[ 0.0027 ] List of rcm files are saved in rcm_list.xml
[ 0.0027 ]
[ 0.0027 ] Signing RCM messages
[ 0.0032 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0037 ] Assuming zero filled SBK key
[ 0.0060 ]
[ 0.0060 ] Copying signature to RCM mesages
[ 0.0065 ] tegrarcm_v2 --chip 0x18 --updatesig rcm_list_signed.xml
[ 0.0072 ]
[ 0.0073 ] Parsing partition layout
[ 0.0078 ] tegraparser_v2 --pt flash.xml.tmp
[ 0.0085 ]
[ 0.0086 ] Creating list of images to be signed
[ 0.0091 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[ 0.0263 ]
[ 0.0264 ] Generating signatures
[ 0.0294 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[ 0.0324 ] Assuming zero filled SBK key
[ 0.2339 ]
[ 0.2340 ] Generating br-bct
[ 0.2346 ] Updating dev and MSS params in BR BCT
[ 0.2346 ] tegrabct_v2 --dev_param emmc.cfg --sdram P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --brbct br_bct.cfg --chip 0x18
[ 0.2490 ]
[ 0.2490 ] Updating bl info
[ 0.2497 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[ 0.2508 ]
[ 0.2508 ] Updating smd info
[ 0.2513 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[ 0.2521 ]
[ 0.2521 ] Updating Odmdata
[ 0.2526 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatefields Odmdata =0x1090000
[ 0.2533 ]
[ 0.2533 ] Get Signed section bct
[ 0.2538 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --listbct bct_list.xml
[ 0.2544 ]
[ 0.2544 ] Signing BCT
[ 0.2554 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key
[ 0.2558 ] Assuming zero filled SBK key
[ 0.2560 ]
[ 0.2560 ] Updating BCT with signature
[ 0.2566 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesig bct_list_signed.xml
[ 0.2572 ]
[ 0.2572 ] Generating coldboot mb1-bct
[ 0.2578 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct.cfg --sdram P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 0.2583 ] MB1-BCT version: 0xe
[ 0.2584 ] Copying Sdram info from 2 to 3 set
[ 0.2717 ] Packing sdram param for instance[0]
[ 0.2719 ] Packing sdram param for instance[1]
[ 0.2721 ] Packing sdram param for instance[2]
[ 0.2723 ] Packing sdram param for instance[3]

[ 0.2725 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg
[ 0.2729 ] Appending platform config data of size :- 2904

[ 0.2731 ] Parsing config file :mobile_scr.cfg
[ 0.2733 ] Appending platform config data of size :- 12240

[ 0.2739 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg
[ 0.2742 ] Appending platform config data of size :- 24
[ 0.2742 ]
[ 0.2742 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg
[ 0.2742 ] Appending platform config data of size :- 708
[ 0.2742 ]
[ 0.2742 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg
[ 0.2742 ] Appending platform config data of size :- 64
[ 0.2742 ]
[ 0.2742 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 0.2742 ] Appending platform config data of size :- 1652
[ 0.2742 ]
[ 0.2743 ] Updating mb1-bct with firmware information
[ 0.2749 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 0.2754 ] MB1-BCT version: 0xe
[ 0.2758 ]
[ 0.2758 ] Updating mb1-bct with storage information
[ 0.2765 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 0.2771 ] MB1-BCT version: 0xe
[ 0.2774 ]
[ 0.2781 ] tegrahost_v2 --align mb1_cold_boot_bct_MB1.bct
[ 0.2787 ]
[ 0.2794 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[ 0.2801 ]
[ 0.2809 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml
[ 0.2814 ] Assuming zero filled SBK key
[ 0.2825 ]
[ 0.2833 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[ 0.2840 ]
[ 0.2840 ] Generating recovery mb1-bct
[ 0.2846 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct.cfg --sdram P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 0.2852 ] MB1-BCT version: 0xe
[ 0.2854 ] Copying Sdram info from 2 to 3 set
[ 0.2987 ] Packing sdram param for instance[0]
[ 0.2988 ] Packing sdram param for instance[1]
[ 0.2990 ] Packing sdram param for instance[2]
[ 0.2992 ] Packing sdram param for instance[3]

[ 0.2994 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg
[ 0.2998 ] Appending platform config data of size :- 2904

[ 0.3000 ] Parsing config file :minimal_scr.cfg
[ 0.3002 ] Appending platform config data of size :- 12240

[ 0.3009 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg
[ 0.3012 ] Appending platform config data of size :- 24
[ 0.3012 ]
[ 0.3012 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg
[ 0.3012 ] Appending platform config data of size :- 708
[ 0.3012 ]
[ 0.3012 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg
[ 0.3012 ] Appending platform config data of size :- 64
[ 0.3012 ]
[ 0.3012 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 0.3013 ] Appending platform config data of size :- 1652
[ 0.3013 ]
[ 0.3013 ] Updating mb1-bct with firmware information
[ 0.3019 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 0.3024 ] MB1-BCT version: 0xe
[ 0.3027 ]
[ 0.3027 ] Updating mb1-bct with storage information
[ 0.3032 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 0.3037 ] MB1-BCT version: 0xe
[ 0.3040 ]
[ 0.3045 ] tegrahost_v2 --align mb1_bct_MB1.bct
[ 0.3051 ]
[ 0.3056 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk
[ 0.3063 ]
[ 0.3070 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml
[ 0.3075 ] Assuming zero filled SBK key
[ 0.3086 ]
[ 0.3095 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[ 0.3103 ]
[ 0.3104 ] Copying signatures
[ 0.3110 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[ 0.3435 ]
[ 0.3437 ] Boot Rom communication
[ 0.3461 ] tegrarcm_v2 --chip 0x18 --rcm rcm_list_signed.xml
[ 0.3484 ] BootRom is not running
[ 1.3525 ]
[ 1.3554 ] tegrarcm_v2 --isapplet
[ 1.3582 ] Applet version 01.00.0000
[ 1.3750 ]
[ 1.3750 ] Retrieving board information
[ 1.3771 ] tegrarcm_v2 --oem platformdetails chip chip_info.bin
[ 1.3792 ] Applet version 01.00.0000
[ 1.4112 ] Saved platform info in chip_info.bin
[ 1.4130 ] Chip minor revision: 2
[ 1.4131 ]
[ 1.4131 ] Sending BCTs
[ 1.4153 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[ 1.4167 ] Applet version 01.00.0000
[ 1.4512 ] Sending bct_bootrom
[ 1.4518 ] […] 100%
[ 1.4618 ] Sending bct_mb1
[ 1.4670 ] […] 100%
[ 1.8241 ]
[ 1.8242 ] Generating blob
[ 1.8265 ] tegrahost_v2 --align blob_nvtboot_recovery_cpu.bin
[ 1.8287 ]
[ 1.8307 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[ 1.8336 ]
[ 1.8359 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml
[ 1.8377 ] Assuming zero filled SBK key
[ 1.8517 ]
[ 1.8550 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[ 1.8578 ]
[ 1.8600 ] tegrahost_v2 --align blob_nvtboot_recovery.bin
[ 1.8620 ]
[ 1.8640 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[ 1.8666 ]
[ 1.8691 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml
[ 1.8709 ] Assuming zero filled SBK key
[ 1.8766 ]
[ 1.8796 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[ 1.8824 ]
[ 1.8849 ] tegrahost_v2 --align blob_preboot_d15_prod_cr.bin
[ 1.8871 ]
[ 1.8893 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[ 1.8917 ]
[ 1.8940 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml
[ 1.8958 ] Assuming zero filled SBK key
[ 1.9004 ]
[ 1.9026 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[ 1.9044 ]
[ 1.9058 ] tegrahost_v2 --align blob_mce_mts_d15_prod_cr.bin
[ 1.9070 ]
[ 1.9082 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[ 1.9139 ]
[ 1.9154 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml
[ 1.9162 ] Assuming zero filled SBK key
[ 1.9629 ]
[ 1.9638 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[ 1.9662 ]
[ 1.9669 ] tegrahost_v2 --align blob_bpmp.bin
[ 1.9675 ]
[ 1.9681 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk
[ 1.9692 ]
[ 1.9699 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml
[ 1.9704 ] Assuming zero filled SBK key
[ 1.9803 ]
[ 1.9812 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[ 1.9823 ]
[ 1.9830 ] tegrahost_v2 --align blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb
[ 1.9836 ]
[ 1.9841 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk
[ 1.9851 ]
[ 1.9860 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml
[ 1.9866 ] Assuming zero filled SBK key
[ 1.9950 ]
[ 1.9958 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[ 1.9967 ]
[ 1.9974 ] tegrahost_v2 --align blob_tos.img
[ 1.9979 ]
[ 1.9985 ] tegrahost_v2 --appendsigheader blob_tos.img zerosbk
[ 1.9992 ]
[ 1.9999 ] tegrasign_v2 --key None --list blob_tos_sigheader.img_list.xml
[ 2.0004 ] Assuming zero filled SBK key
[ 2.0017 ]
[ 2.0024 ] tegrahost_v2 --updatesigheader blob_tos_sigheader.img.encrypt blob_tos_sigheader.img.hash zerosbk
[ 2.0030 ]
[ 2.0037 ] tegrahost_v2 --align blob_eks.img
[ 2.0043 ]
[ 2.0049 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk
[ 2.0056 ]
[ 2.0064 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml
[ 2.0070 ] Assuming zero filled SBK key
[ 2.0072 ]
[ 2.0081 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[ 2.0088 ]
[ 2.0094 ] tegrahost_v2 --align blob_tegra186-tx2-cti-ASG001-USB3.dtb
[ 2.0100 ]
[ 2.0105 ] tegrahost_v2 --appendsigheader blob_tegra186-tx2-cti-ASG001-USB3.dtb zerosbk
[ 2.0113 ]
[ 2.0119 ] tegrasign_v2 --key None --list blob_tegra186-tx2-cti-ASG001-USB3_sigheader.dtb_list.xml
[ 2.0125 ] Assuming zero filled SBK key
[ 2.0163 ]
[ 2.0171 ] tegrahost_v2 --updatesigheader blob_tegra186-tx2-cti-ASG001-USB3_sigheader.dtb.encrypt blob_tegra186-tx2-cti-ASG001-USB3_sigheader.dtb.hash zerosbk
[ 2.0179 ]
[ 2.0186 ] tegrahost_v2 --generateblob blob.xml blob.bin
[ 2.0191 ] number of images in blob are 9
[ 2.0194 ] blobsize is 3680376
[ 2.0195 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 189824
[ 2.0209 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 79440
[ 2.0213 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 63024
[ 2.0218 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2076832
[ 2.0223 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 529440
[ 2.0227 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt of size 466160
[ 2.0233 ] Added binary blob_tos_sigheader.img.encrypt of size 62976
[ 2.0236 ] Added binary blob_eks_sigheader.img.encrypt of size 1488
[ 2.0239 ] Added binary blob_tegra186-tx2-cti-ASG001-USB3_sigheader.dtb.encrypt of size 211040
[ 2.0246 ]
[ 2.0246 ] Sending bootloader and pre-requisite binaries
[ 2.0252 ] tegrarcm_v2 --download blob blob.bin
[ 2.0258 ] Applet version 01.00.0000
[ 2.0426 ] Sending blob
[ 2.0426 ] […] 100%
[ 2.4520 ]
[ 2.4541 ] tegrarcm_v2 --boot recovery
[ 2.4562 ] Applet version 01.00.0000
[ 2.4757 ]
[ 2.4786 ] tegrarcm_v2 --isapplet
[ 4.2264 ]
[ 4.2283 ] tegradevflash_v2 --iscpubl
[ 4.2301 ] Cannot Open USB
[ 4.6903 ]
^CTraceback (most recent call last):
File “./tegraflash.py”, line 1101, in
tegraflash_run_commands()
File “./tegraflash.py”, line 1008, in tegraflash_run_commands
interpreter.onecmd(command)
File “/usr/lib/python2.7/cmd.py”, line 221, in onecmd
return func(arg)
File “./tegraflash.py”, line 189, in do_flash
tegraflash_flash(exports)
File “/64_TX2/Linux_for_Tegra/bootloader/tegraflash_internal.py”, line 240, in tegraflash_flash
tegraflash_boot(‘recovery’)
File “/64_TX2/Linux_for_Tegra/bootloader/tegraflash_internal.py”, line 847, in tegraflash_boot
tegraflash_poll_applet_bl()
File “/64_TX2/Linux_for_Tegra/bootloader/tegraflash_internal.py”, line 1577, in tegraflash_poll_applet_bl
run_command(command, enable_print)
File “/64_TX2/Linux_for_Tegra/bootloader/tegraflash_internal.py”, line 168, in run_command
return_code = process.wait()
File “/usr/lib/python2.7/subprocess.py”, line 1392, in wait
pid, sts = _eintr_retry_call(os.waitpid, self.pid, 0)
File “/usr/lib/python2.7/subprocess.py”, line 476, in _eintr_retry_call
return func(*args)
KeyboardInterrupt
Failed flashing t186ref.

Thanks in advance!

Please use some new jetpack release like jetpack4.5.1 or jetpack3.3.3.

Thanks for answering rapidly. The thing is we have some changes in this frozen image. However, we were able to clone in a different one in the past, but how can we know the exact issue?.

Could you check the sticker on this TX2 module and show us what it is? Is it a D02 one?

You can use pure jetpack to validate that module first. To avoid unnecessary check on such frozen image.

Yes you are right. it is (699-83310-1000-D02) D02 module.
Regarding the jetpack, I have also tried to flash a fresh system image, but the issue still persists.

If this is D02, then you need to use new jetpack release due to the PCN announcement in below.

If you want to stay on rel-28.2.1 due to production, then we provide a tarball here.

Good to know. Yes due to production, we cannot migrate right away. This could be a good reason to start migrating. So with this overlay, we just need to extract and ovelay these files in the directory and this should work?.
Will this effect our frozen image somehow?.

Thank you,

It should not. Most changes are in bootloader.

Awesome. I will give it a shot and get back to us.

Thank you so much for such imminent replies.

Ok I have just tried, now atleast it started flashing on the device. Just a question out of curiosity, if I overlay this tarball, on to my current jetpack folder, will I have problem flashing D00 boards?, so basically my question is, is it backward compatible?. Please let me know.

Thanks in advance.

Yes, it is backward compatible.

Awesome. Thank you very much.