Hi guys, i’m facing an issue trying to clone the image of a Jetson TX2 4GB. I’m following the instructions from this link https://elinux.org/Jetson/TX2_Cloningfrom elinux website. I did the download of L4 32.6.1 Jetson Driver Package (BSP) https://developer.nvidia.com/embedded/linux-tegra-r3261 and I ran the following command:
sudo ./flash.sh -r -k APP -G backup.img jetson-tx2 mmcblk0p1
This is the obtained output:
sudo ./flash.sh -r -k APP -G backup.img jetson-tx2 mmcblk0p1
###############################################################################
L4T BSP Information:
R32 , REVISION: 6.1
###############################################################################
Target Board Information:
Name: jetson-tx2, Board Family: t186ref, SoC: Tegra 186,
OpMode: production, Boot Authentication: NS,
Disk encryption: disabled ,
###############################################################################
./tegraflash.py --chip 0x18 --applet “/home/gimbal/Descargas/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin” --skipuid --cmd “dump eeprom boardinfo cvm.bin”
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0030 ] Generating RCM messages
[ 0.0051 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm /home/gimbal/Descargas/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin 0 0
[ 0.0058 ] RCM 0 is saved as rcm_0.rcm
[ 0.0060 ] RCM 1 is saved as rcm_1.rcm
[ 0.0061 ] List of rcm files are saved in rcm_list.xml
[ 0.0061 ]
[ 0.0061 ] Signing RCM messages
[ 0.0083 ] tegrasign_v3.py --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0083 ] Assuming zero filled SBK key
[ 0.0140 ] Copying signature to RCM mesages
[ 0.0161 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[ 0.0170 ]
[ 0.0170 ] Boot Rom communication
[ 0.0189 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml --skipuid
[ 0.0195 ] RCM version 0X180001
[ 0.3964 ] Boot Rom communication completed
[ 1.4034 ]
[ 2.4111 ] tegrarcm_v2 --isapplet
[ 2.4152 ] Applet version 01.00.0000
[ 2.7944 ]
[ 2.7967 ] Retrieving EEPROM data
[ 2.7968 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/gimbal/Descargas/Linux_for_Tegra/bootloader/cvm.bin
[ 2.7977 ] Applet version 01.00.0000
[ 3.2092 ] Saved platform info in /home/gimbal/Descargas/Linux_for_Tegra/bootloader/cvm.bin
[ 3.2825 ]
Board ID(3489) version(300) sku(0888) revision(N.0)
copying bctfile(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/t186ref/BCT/P3310_A00_8GB_lpddr4_A02_l4t.cfg)… done.
copying misc_config(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)… done.
copying pinmux_config(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-quill-p3310-1000-a00.cfg)… done.
copying pmic_config(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-quill-p3310-1000-a00.cfg)… done.
copying pmc_config(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-quill-p3310-1000-a00.cfg)… done.
copying prod_config(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-quill-p3310-1000-a00.cfg)… done.
copying scr_config(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/t186ref/BCT/minimal_scr.cfg)… done.
copying scr_cold_boot_config(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/t186ref/BCT/mobile_scr.cfg)… done.
copying bootrom_config(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3310-1000-a00.cfg)… done.
copying dev_params(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/t186ref/BCT/emmc.cfg)… done.
Existing bootloader(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
copying initrd(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/l4t_initrd.img)… done.
Making Boot image… done.
/home/gimbal/Descargas/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x18 --key --cmd sign boot.img kernel
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0004 ] Generating signature
[ 0.0026 ] tegrasign_v3.py --getmode mode.txt --key
[ 0.0027 ] Assuming zero filled SBK key : not reading
[ 0.0026 ] sign_type : 0
[ 0.0026 ] header_magic: 414e4452
[ 0.0045 ] tegrahost_v2 --chip 0x18 --align 1_boot.img
[ 0.0052 ]
[ 0.0070 ] tegrahost_v2 --chip 0x18 0 --appendsigheader 1_boot.img zerosbk
[ 0.0085 ]
[ 0.0112 ] tegrasign_v3.py --key --list 1_boot_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 0.0113 ] Assuming zero filled SBK key : not reading
[ 0.0246 ] tegrahost_v2 --chip 0x18 0 --updatesigheader 1_boot_sigheader.img.encrypt 1_boot_sigheader.img.hash zerosbk
[ 0.0260 ]
[ 0.0266 ] Signed file: /home/gimbal/Descargas/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt
l4t_sign_image.sh: Generate header for boot_sigheader.img.encrypt
l4t_sign_image.sh: chip 0x18: Don’t need to do anything
l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot_sigheader.img.encrypt
l4t_sign_image.sh: the signed file is /home/gimbal/Descargas/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt
done.
Existing sosfile(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin) reused.
copying tegraboot(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/t186ref/nvtboot.bin)… done.
Existing cpu_bootloader(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
Existing mb2blfile(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
Existing mtspreboot(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/preboot_d15_prod_cr.bin) reused.
Existing mts(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/mce_mts_d15_prod_cr.bin) reused.
Existing mb1file(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/mb1_prod.bin) reused.
Existing bpffile(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/bpmp.bin) reused.
copying bpfdtbfile(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/t186ref/tegra186-a02-bpmp-quill-p3310-1000-a00-00-te770d-ucm2.dtb)… done.
Existing scefile(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused.
Existing spefile(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/spe.bin) reused.
copying wb0boot(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/t186ref/warmboot.bin)… done.
Existing tosfile(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/tos-trusty.img) reused.
Existing eksfile(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/eks.img) reused.
copying dtbfile(/home/gimbal/Descargas/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-a00-00-base.dtb)… done.
Copying nv_boot_control.conf to rootfs
sed: impossível ler /home/gimbal/Descargas/Linux_for_Tegra/rootfs/etc/nv_boot_control.conf: Não é pasta
sed: impossível ler /home/gimbal/Descargas/Linux_for_Tegra/rootfs/etc/nv_boot_control.conf: Não é pasta
sed: impossível ler /home/gimbal/Descargas/Linux_for_Tegra/rootfs/etc/nv_boot_control.conf: Não é pasta
sed: impossível ler /home/gimbal/Descargas/Linux_for_Tegra/rootfs/etc/nv_boot_control.conf: Não é pasta
sed: impossível ler /home/gimbal/Descargas/Linux_for_Tegra/rootfs/etc/nv_boot_control.conf: Não é pasta
sed: impossível ler /home/gimbal/Descargas/Linux_for_Tegra/rootfs/etc/nv_boot_control.conf: Não é pasta
sed: impossível ler /home/gimbal/Descargas/Linux_for_Tegra/rootfs/etc/nv_boot_control.conf: Não é pasta
sed: impossível ler /home/gimbal/Descargas/Linux_for_Tegra/rootfs/etc/nv_boot_control.conf: Não é pasta
/home/gimbal/Descargas/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x18 --key --cmd sign kernel_tegra186-quill-p3310-1000-a00-00-base.dtb kernel_dtb
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0005 ] Generating signature
[ 0.0028 ] tegrasign_v3.py --getmode mode.txt --key
[ 0.0029 ] Assuming zero filled SBK key : not reading
[ 0.0028 ] sign_type : 808464433
[ 0.0028 ] header_magic: d00dfeed
[ 0.0047 ] tegrahost_v2 --chip 0x18 --align 1_kernel_tegra186-quill-p3310-1000-a00-00-base.dtb
[ 0.0054 ]
[ 0.0073 ] tegrahost_v2 --chip 0x18 0 --appendsigheader 1_kernel_tegra186-quill-p3310-1000-a00-00-base.dtb zerosbk
[ 0.0085 ]
[ 0.0112 ] tegrasign_v3.py --key --list 1_kernel_tegra186-quill-p3310-1000-a00-00-base_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 0.0113 ] Assuming zero filled SBK key : not reading
[ 0.0213 ] tegrahost_v2 --chip 0x18 0 --updatesigheader 1_kernel_tegra186-quill-p3310-1000-a00-00-base_sigheader.dtb.encrypt 1_kernel_tegra186-quill-p3310-1000-a00-00-base_sigheader.dtb.hash zerosbk
[ 0.0225 ]
[ 0.0229 ] Signed file: /home/gimbal/Descargas/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra186-quill-p3310-1000-a00-00-base_sigheader.dtb.encrypt
l4t_sign_image.sh: Generate header for kernel_tegra186-quill-p3310-1000-a00-00-base_sigheader.dtb.encrypt
l4t_sign_image.sh: chip 0x18: Don’t need to do anything
l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra186-quill-p3310-1000-a00-00-base_sigheader.dtb.encrypt
l4t_sign_image.sh: the signed file is /home/gimbal/Descargas/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra186-quill-p3310-1000-a00-00-base_sigheader.dtb.encrypt
done.
Skip generating system.img
Existing tbcfile(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/cboot.bin) reused.
copying tbcdtbfile(/home/gimbal/Descargas/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-a00-00-base.dtb)… done.
copying cfgfile(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml… done.
Existing flasher(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing flashapp(/home/gimbal/Descargas/Linux_for_Tegra/bootloader/tegraflash.py) reused.
*** Reading [APP] and storing to /home/gimbal/Descargas/Linux_for_Tegra/backup.img ***
./tegraflash.py --bl nvtboot_recovery_cpu.bin --chip 0x18 --applet mb1_recovery_prod.bin --sdram_config P3310_A00_8GB_lpddr4_A02_l4t.cfg --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-a00.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-a00.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-a00.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-a00.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-a00.cfg --dev_params emmc.cfg --cfg flash.xml --bins “mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-a00-00-te770d-ucm2.dtb; tlk tos-trusty.img; eks eks.img; bootloader_dtb tegra186-quill-p3310-1000-a00-00-base.dtb” --odmdata 0x1090000 --cmd “read APP /home/gimbal/Descargas/Linux_for_Tegra/backup.img”
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0060 ] Generating RCM messages
[ 0.0080 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[ 0.0086 ] RCM 0 is saved as rcm_0.rcm
[ 0.0089 ] RCM 1 is saved as rcm_1.rcm
[ 0.0089 ] List of rcm files are saved in rcm_list.xml
[ 0.0089 ]
[ 0.0089 ] Signing RCM messages
[ 0.0109 ] tegrasign_v3.py --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0110 ] Assuming zero filled SBK key
[ 0.0160 ] Copying signature to RCM mesages
[ 0.0178 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[ 0.0188 ]
[ 0.0188 ] Boot Rom communication
[ 0.0207 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[ 0.0215 ] BootRom is not running
[ 5.4542 ]
[ 6.4607 ] tegrarcm_v2 --isapplet
[ 6.4617 ] Applet version 01.00.0000
[ 7.0546 ]
[ 7.0602 ] tegrasign_v3.py --getmode mode.txt --key None
[ 7.0605 ] Assuming zero filled SBK key
[ 7.0611 ] Parsing partition layout
[ 7.0656 ] tegraparser_v2 --pt flash.xml.tmp
[ 7.0710 ]
[ 7.0712 ] Creating list of images to be signed
[ 7.0757 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[ 7.1073 ]
[ 7.1073 ] Generating signatures
[ 7.1096 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key
[ 7.1096 ] Assuming zero filled SBK key
[ 7.3618 ] Reading BCT from device for further operations
[ 7.3618 ] Generating blob
[ 7.3641 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin
[ 7.3648 ]
[ 7.3667 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[ 7.3677 ]
[ 7.3700 ] tegrasign_v3.py --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 7.3701 ] Assuming zero filled SBK key
[ 7.3771 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[ 7.3782 ]
[ 7.3801 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin
[ 7.3808 ]
[ 7.3827 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[ 7.3837 ]
[ 7.3859 ] tegrasign_v3.py --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 7.3860 ] Assuming zero filled SBK key
[ 7.3914 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[ 7.3924 ]
[ 7.3944 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin
[ 7.3951 ]
[ 7.3970 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[ 7.3979 ]
[ 7.4002 ] tegrasign_v3.py --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 7.4002 ] Assuming zero filled SBK key
[ 7.4047 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[ 7.4056 ]
[ 7.4077 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin
[ 7.4087 ]
[ 7.4113 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[ 7.4150 ]
[ 7.4174 ] tegrasign_v3.py --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 7.4174 ] Assuming zero filled SBK key
[ 7.4530 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[ 7.4565 ]
[ 7.4586 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin
[ 7.4592 ]
[ 7.4611 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_bpmp.bin zerosbk
[ 7.4624 ]
[ 7.4646 ] tegrasign_v3.py --key None --list blob_bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 7.4647 ] Assuming zero filled SBK key
[ 7.4762 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[ 7.4776 ]
[ 7.4796 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-a02-bpmp-quill-p3310-1000-a00-00-te770d-ucm2.dtb
[ 7.4803 ]
[ 7.4822 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310-1000-a00-00-te770d-ucm2.dtb zerosbk
[ 7.4837 ]
[ 7.4861 ] tegrasign_v3.py --key None --list blob_tegra186-a02-bpmp-quill-p3310-1000-a00-00-te770d-ucm2_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 7.4861 ] Assuming zero filled SBK key
[ 7.4983 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310-1000-a00-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-p3310-1000-a00-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[ 7.5002 ]
[ 7.5024 ] tegrahost_v2 --chip 0x18 --align blob_tos-trusty.img
[ 7.5031 ]
[ 7.5049 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tos-trusty.img zerosbk
[ 7.5061 ]
[ 7.5084 ] tegrasign_v3.py --key None --list blob_tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 7.5085 ] Assuming zero filled SBK key
[ 7.5181 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tos-trusty_sigheader.img.encrypt blob_tos-trusty_sigheader.img.hash zerosbk
[ 7.5194 ]
[ 7.5214 ] tegrahost_v2 --chip 0x18 --align blob_eks.img
[ 7.5221 ]
[ 7.5240 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_eks.img zerosbk
[ 7.5247 ]
[ 7.5270 ] tegrasign_v3.py --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 7.5270 ] Assuming zero filled SBK key
[ 7.5309 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[ 7.5316 ]
[ 7.5336 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-quill-p3310-1000-a00-00-base.dtb
[ 7.5343 ]
[ 7.5362 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tegra186-quill-p3310-1000-a00-00-base.dtb zerosbk
[ 7.5375 ]
[ 7.5398 ] tegrasign_v3.py --key None --list blob_tegra186-quill-p3310-1000-a00-00-base_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 7.5399 ] Assuming zero filled SBK key
[ 7.5491 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tegra186-quill-p3310-1000-a00-00-base_sigheader.dtb.encrypt blob_tegra186-quill-p3310-1000-a00-00-base_sigheader.dtb.hash zerosbk
[ 7.5503 ]
[ 7.5524 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin
[ 7.5530 ] number of images in blob are 9
[ 7.5533 ] blobsize is 4623768
[ 7.5534 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 225152
[ 7.5549 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 122272
[ 7.5553 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 58384
[ 7.5556 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2298464
[ 7.5560 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 534816
[ 7.5566 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-a00-00-te770d-ucm2_sigheader.dtb.encrypt of size 604880
[ 7.5573 ] Added binary blob_tos-trusty_sigheader.img.encrypt of size 403264
[ 7.5575 ] Added binary blob_eks_sigheader.img.encrypt of size 1440
[ 7.5578 ] Added binary blob_tegra186-quill-p3310-1000-a00-00-base_sigheader.dtb.encrypt of size 374944
[ 7.5600 ]
[ 7.5600 ] Sending bootloader and pre-requisite binaries
[ 7.5621 ] tegrarcm_v2 --download blob blob.bin
[ 7.5627 ] Applet version 01.00.0000
[ 8.3669 ] Sending blob
[ 8.3672 ] […] 100%
[ 8.9982 ]
[ 9.0029 ] tegrarcm_v2 --boot recovery
[ 9.0055 ] Applet version 01.00.0000
[ 9.8025 ]
[ 10.8095 ] tegrarcm_v2 --isapplet
[ 11.6037 ]
[ 11.6095 ] tegradevflash_v2 --iscpubl
[ 11.6129 ] CPU Bootloader is not running on device.
[ 12.0193 ]
[ 13.0271 ] tegrarcm_v2 --isapplet
[ 17.4389 ]
[ 17.4447 ] tegradevflash_v2 --iscpubl
[ 17.4485 ] CPU Bootloader is not running on device.
[ 17.6515 ]
…
[ 75.2239 ] tegrarcm_v2 --isapplet
[ 75.8116 ]
[ 75.8163 ] tegradevflash_v2 --iscpubl
[ 75.8193 ] CPU Bootloader is not running on device.
[ 76.2319 ]
[ 77.2391 ] tegrarcm_v2 --isapplet
[ 78.0359 ]
[ 78.0414 ] tegradevflash_v2 --iscpubl
[ 78.0448 ] CPU Bootloader is not running on device.
[ 78.2438 ]
[ 79.2503 ] tegrarcm_v2 --isapplet
[ 80.0442 ]
[ 80.0501 ] tegradevflash_v2 --iscpubl
[ 80.0539 ] CPU Bootloader is not running on device.
[ 80.2519 ]
Error: None of the bootloaders are running on device. Check the UART log.
*** The [APP] has been read successfully. ***
Converting RAW image to Sparse image… mv: impossível obter informação para ‘/home/gimbal/Descargas/Linux_for_Tegra/backup.img’: Ficheiro ou pasta inexistente
open input file /home/gimbal/Descargas/Linux_for_Tegra/backup.img.raw failed.
I’m running this is a desktop with Ubuntu Mate 20.04. I also have tried the L4T R32.5.1 and the L4T R32.4.4. Same issue!
Do you know what is causing this? I really need to make a backup of this jetson.