CPU Bootloader is not running on device

Hi,
I am facing this issue while flash new DTB & Image to Jetson Xavier NX. Although everything works fine with SDK Manager & original DTB. But with customized device tree and kernel I could not flash board.

Here is error snapshot:

sudo cp /data/driver/tegra194-p3668-all-p3509-0000.dtb /data/nvidia/build/JetPack_4.4_Linux_JETSON_XAVIER_NX_DEVKIT/Linux_for_Tegra/kernel/dtb/

sudo ./flash.sh jetson-xavier-nx-devkit mmcblk0p1
###############################################################################
# L4T BSP Information:
# R32 , REVISION: 4.3
###############################################################################
# Target Board Information:
# Name: jetson-xavier-nx-devkit, Board Family: t186ref, SoC: Tegra 194, 
# OpMode: production, Boot Authentication: NS, 
###############################################################################
copying soft_fuses(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done.
./tegraflash.py --chip 0x19 --applet "/data/leopard/driver/Linux_for_Tegra/bootloader/mb1_t194_prod.bin" --skipuid --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg --bins "mb2_applet nvtboot_applet_t194.bin" --cmd "dump eeprom boardinfo cvm.bin;reboot recovery" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0383 ] Generating RCM messages
[   0.0592 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader /data/leopard/driver/Linux_for_Tegra/bootloader/mb1_t194_prod.bin zerosbk
[   0.0609 ] Header already present for /data/leopard/driver/Linux_for_Tegra/bootloader/mb1_t194_prod.bin
[   0.1065 ] 
[   0.1291 ] tegrasign_v2 --key None --getmode mode.txt
[   0.1315 ] Assuming zero filled SBK key
[   0.2026 ] 
[   0.2040 ] tegrasign_v2 --key None --file /data/leopard/driver/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.bin --offset 2960 --length 1136 --pubkeyhash pub_key.key
[   0.2052 ] Assuming zero filled SBK key
[   0.2060 ] 
[   0.2075 ] tegrahost_v2 --chip 0x19 0 --updatesigheader /data/leopard/driver/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.bin /data/leopard/driver/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.hash zerosbk
[   0.2134 ] 
[   0.2505 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg.pdf sfuse.bin
[   0.2723 ] 
[   0.2737 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm /data/leopard/driver/Linux_for_Tegra/bootloader/mb1_t194_prod_sigheader.bin 0 0
[   0.2749 ] RCM 0 is saved as rcm_0.rcm
[   0.2804 ] RCM 1 is saved as rcm_1.rcm
[   0.2804 ] RCM 2 is saved as rcm_2.rcm
[   0.2804 ] List of rcm files are saved in rcm_list.xml
[   0.2804 ] 
[   0.2805 ] Signing RCM messages
[   0.2819 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin
[   0.2834 ] Assuming zero filled SBK key
[   0.2844 ] 
[   0.2844 ] Copying signature to RCM mesages
[   0.2858 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml
[   0.2880 ] 
[   0.2880 ] Boot Rom communication
[   0.2894 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_list_signed.xml --skipuid
[   0.2926 ] RCM version 0X190001
[   0.2937 ] Boot Rom communication completed
[   1.3096 ] 
[   2.3131 ] tegrarcm_v2 --isapplet
[   2.3148 ] Applet version 01.00.0000
[   2.3305 ] 
[   2.3322 ] tegrarcm_v2 --ismb2
[   2.3506 ] 
[   2.3534 ] tegrahost_v2 --chip 0x19 --align nvtboot_applet_t194.bin
[   2.3561 ] 
[   2.3578 ] tegrahost_v2 --chip 0x19 0 --magicid PLDT --appendsigheader nvtboot_applet_t194.bin zerosbk[   2.3605 ] adding BCH for nvtboot_applet_t194.bin
[   2.3920 ] 
[   2.3948 ] tegrasign_v2 --key None --list nvtboot_applet_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   2.3971 ] Assuming zero filled SBK key
[   2.3980 ] 
[   2.4039 ] tegrahost_v2 --chip 0x19 0 --updatesigheader nvtboot_applet_t194_sigheader.bin.encrypt nvtboot_applet_t194_sigheader.bin.hash zerosbk
[   2.4073 ] 
[   2.4089 ] tegrarcm_v2 --download mb2 nvtboot_applet_t194_sigheader.bin.encrypt
[   2.4104 ] Applet version 01.00.0000
[   2.4266 ] Sending mb2
[   2.4268 ] [................................................] 100%
[   2.4407 ] 
[   2.4433 ] tegrarcm_v2 --boot recovery
[   2.4456 ] Applet version 01.00.0000
[   2.4519 ] 
[   3.4539 ] tegrarcm_v2 --isapplet
[   3.4579 ] 
[   3.4594 ] tegrarcm_v2 --ismb2
[   3.4607 ] MB2 Applet version 01.00.0000
[   3.4951 ] 
[   3.4973 ] tegrarcm_v2 --ismb2
[   3.4997 ] MB2 Applet version 01.00.0000
[   3.5273 ] 
[   3.5296 ] Retrieving EEPROM data
[   3.5299 ] tegrarcm_v2 --oem platformdetails eeprom cvm /data/leopard/driver/Linux_for_Tegra/bootloader/cvm.bin
[   3.5314 ] MB2 Applet version 01.00.0000
[   3.5496 ] Saved platform info in /data/leopard/driver/Linux_for_Tegra/bootloader/cvm.bin
[   3.5839 ] 
[   3.5840 ] Rebooting to recovery mode
[   3.5860 ] tegrarcm_v2 --ismb2
[   3.5883 ] MB2 Applet version 01.00.0000
[   3.6070 ] 
[   3.6071 ] Rebooting to recovery mode
[   3.6096 ] tegrarcm_v2 --reboot recovery
[   3.6127 ] MB2 Applet version 01.00.0000
[   3.6540 ] 
Board ID(3668) version(200) sku(0000) revision(H.0)
copying bctfile(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg)... done.
copying bctfile1(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-memcfg-sw-override.cfg)... done.
copying device_config(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-bct-device-qspi-p3668.cfg)... done.
copying misc_cold_boot_config(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-l4t.cfg)... done.
copying misc_config(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-misc-flash.cfg)... done.
copying pinmux_config(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-pinmux-p3668-a01.cfg)... done.
copying gpioint_config(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg)... done.
copying pmic_config(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-pmic-p3668-0001-a00.cfg)... done.
copying pmc_config(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-padvoltage-p3668-a01.cfg)... done.
copying prod_config(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/BCT/tegra19x-mb1-prod-p3668-0001-a00.cfg)... done.
copying scr_config(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done.
copying scr_cold_boot_config(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-scr-cbb-mini-p3668.cfg)... done.
copying bootrom_config(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-bct-reset-p3668-0001-a00.cfg)... done.
copying dev_params(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-br-bct-qspi.cfg)... done.
Existing bootloader(/data/leopard/driver/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused.
copying initrd(/data/leopard/driver/Linux_for_Tegra/bootloader/l4t_initrd.img)... done.
	populating kernel to rootfs... done.
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0039 ] Generating signature
[   0.0054 ] tegrasign_v2 --key  --getmode mode.txt
[   0.0067 ] Assuming zero filled SBK key
[   0.0073 ] 
[   0.0074 ] header_magic: 5614
[   0.0090 ] tegrahost_v2 --chip 0x19 --align 1_Image[   0.0106 ] 
[   0.0119 ] tegrahost_v2 --chip 0x19 0 --magicid DATA --appendsigheader 1_Image zerosbk
[   0.0132 ] adding BCH for 1_Image
[   1.3591 ] 
[   1.3925 ] tegrasign_v2 --key  --list 1_Image_sigheader_list.xml --pubkeyhash pub_key.key
[   1.3940 ] Assuming zero filled SBK key
[   1.5034 ] 
[   1.5119 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_Image_sigheader.encrypt 1_Image_sigheader.hash zerosbk
[   2.5356 ] 
[   2.5838 ] Signed file: /data/leopard/driver/Linux_for_Tegra/bootloader/Image_sigheader.encrypt
Generate header for Image_sigheader.encrypt
Generate 16-byte-size-aligned base file for Image_sigheader.encrypt
Remove temporary file
done.
	populating initrd to rootfs... done.
	populating /data/leopard/driver/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb to rootfs... done.
Making Boot image... done.
Existing sosfile(/data/leopard/driver/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused.
Existing tegraboot(/data/leopard/driver/Linux_for_Tegra/bootloader/nvtboot_t194.bin) reused.
Existing cpu_bootloader(/data/leopard/driver/Linux_for_Tegra/bootloader/nvtboot_cpu_t194.bin) reused.
Existing mb2blfile(/data/leopard/driver/Linux_for_Tegra/bootloader/nvtboot_recovery_t194.bin) reused.
Existing mtspreboot(/data/leopard/driver/Linux_for_Tegra/bootloader/preboot_c10_prod_cr.bin) reused.
Existing mcepreboot(/data/leopard/driver/Linux_for_Tegra/bootloader/mce_c10_prod_cr.bin) reused.
Existing mtsproper(/data/leopard/driver/Linux_for_Tegra/bootloader/mts_c10_prod_cr.bin) reused.
Existing mb1file(/data/leopard/driver/Linux_for_Tegra/bootloader/mb1_t194_prod.bin) reused.
Existing bpffile(/data/leopard/driver/Linux_for_Tegra/bootloader/bpmp_t194.bin) reused.
copying bpfdtbfile(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/tegra194-a02-bpmp-p3668-a00.dtb)... done.
Existing scefile(/data/leopard/driver/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused.
Existing camerafw(/data/leopard/driver/Linux_for_Tegra/bootloader/camera-rtcpu-rce.img) reused.
Existing spefile(/data/leopard/driver/Linux_for_Tegra/bootloader/spe_t194.bin) reused.
Existing drameccfile(/data/leopard/driver/Linux_for_Tegra/bootloader/dram-ecc.bin) reused.
Existing badpagefile(/data/leopard/driver/Linux_for_Tegra/bootloader/badpage.bin) reused.
Existing wb0boot(/data/leopard/driver/Linux_for_Tegra/bootloader/warmboot_t194_prod.bin) reused.
Existing tosfile(/data/leopard/driver/Linux_for_Tegra/bootloader/tos-trusty_t194.img) reused.
Existing eksfile(/data/leopard/driver/Linux_for_Tegra/bootloader/eks.img) reused.
copying soft_fuses(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/BCT/tegra194-mb1-soft-fuses-l4t.cfg)... done.
copying dtbfile(/data/leopard/driver/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb)... done.
Copying nv_boot_control.conf to rootfs
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0039 ] Generating signature
[   0.0053 ] tegrasign_v2 --key  --getmode mode.txt
[   0.0090 ] Assuming zero filled SBK key
[   0.0098 ] 
[   0.0099 ] header_magic: d00dfeed
[   0.0112 ] tegrahost_v2 --chip 0x19 --align 1_tegra194-p3668-all-p3509-0000.dtb
[   0.0125 ] 
[   0.0137 ] tegrahost_v2 --chip 0x19 0 --magicid DATA --appendsigheader 1_tegra194-p3668-all-p3509-0000.dtb zerosbk
[   0.0148 ] adding BCH for 1_tegra194-p3668-all-p3509-0000.dtb
[   0.0230 ] 
[   0.0262 ] tegrasign_v2 --key  --list 1_tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[   0.0288 ] Assuming zero filled SBK key[   0.0300 ] 
[   0.0334 ] tegrahost_v2 --chip 0x19 0 --updatesigheader 1_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt 1_tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk
[   0.0394 ] 
[   0.0402 ] Signed file: /data/leopard/driver/Linux_for_Tegra/bootloader/tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt
Generate header for tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt
Generate 16-byte-size-aligned base file for tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt
Remove temporary file
done.
Making system.img... 
	populating rootfs from /data/leopard/driver/Linux_for_Tegra/rootfs ... done.
	populating /boot/extlinux/extlinux.conf ... done.
	Sync'ing system.img ... done.
	Converting RAW image to Sparse image... done.
system.img built successfully. 
Existing tbcfile(/data/leopard/driver/Linux_for_Tegra/bootloader/cboot_t194.bin) reused.
copying tbcdtbfile(/data/leopard/driver/Linux_for_Tegra/kernel/dtb/tegra194-p3668-all-p3509-0000.dtb)... done.
copying cfgfile(/data/leopard/driver/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t194_spi_sd_p3668.xml) to flash.xml... done.
Existing flasher(/data/leopard/driver/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu_t194.bin) reused.
Existing flashapp(/data/leopard/driver/Linux_for_Tegra/bootloader/tegraflash.py) reused.
./tegraflash.py --bl nvtboot_recovery_cpu_t194.bin --sdram_config tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg,tegra194-memcfg-sw-override.cfg  --odmdata 0xB8190000 --applet mb1_t194_prod.bin --cmd "flash; reboot" --soft_fuses tegra194-mb1-soft-fuses-l4t.cfg  --cfg flash.xml --chip 0x19 --device_config tegra19x-mb1-bct-device-qspi-p3668.cfg --misc_cold_boot_config tegra194-mb1-bct-misc-l4t.cfg --misc_config tegra194-mb1-bct-misc-flash.cfg --pinmux_config tegra19x-mb1-pinmux-p3668-a01.cfg --gpioint_config tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --pmic_config tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --pmc_config tegra19x-mb1-padvoltage-p3668-a01.cfg --prod_config tegra19x-mb1-prod-p3668-0001-a00.cfg --scr_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --scr_cold_boot_config tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --br_cmd_config tegra194-mb1-bct-reset-p3668-0001-a00.cfg --dev_params tegra194-br-bct-qspi.cfg  --bin "mb2_bootloader nvtboot_recovery_t194.bin; mts_preboot preboot_c10_prod_cr.bin; mts_mce mce_c10_prod_cr.bin; mts_proper mts_c10_prod_cr.bin; bpmp_fw bpmp_t194.bin; bpmp_fw_dtb tegra194-a02-bpmp-p3668-a00.dtb; spe_fw spe_t194.bin; tlk tos-trusty_t194.img; eks eks.img; bootloader_dtb tegra194-p3668-all-p3509-0000.dtb"   
saving flash command in /data/leopard/driver/Linux_for_Tegra/bootloader/flashcmd.txt
saving Windows flash command to /data/leopard/driver/Linux_for_Tegra/bootloader/flash_win.bat
*** Flashing target device started. ***
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0293 ] tegrasign_v2 --key None --getmode mode.txt
[   0.0317 ] Assuming zero filled SBK key
[   0.1484 ] 
[   0.1485 ] Generating RCM messages
[   0.2260 ] tegrahost_v2 --chip 0x19 0 --magicid MB1B --appendsigheader mb1_t194_prod.bin zerosbk
[   0.2279 ] Header already present for mb1_t194_prod.bin
[   0.3529 ] 
[   0.3560 ] tegrasign_v2 --key None --getmode mode.txt
[   0.3585 ] Assuming zero filled SBK key
[   0.3590 ] 
[   0.3609 ] tegrasign_v2 --key None --file mb1_t194_prod_sigheader.bin --offset 2960 --length 1136 --pubkeyhash pub_key.key
[   0.3634 ] Assuming zero filled SBK key
[   0.3653 ] 
[   0.3684 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_t194_prod_sigheader.bin mb1_t194_prod_sigheader.hash zerosbk
[   0.3745 ] 
[   0.4063 ] tegrabct_v2 --chip 0x19 0 --sfuse tegra194-mb1-soft-fuses-l4t.cfg sfuse.bin
[   0.8231 ] 
[   0.8562 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x19 0 --sfuses sfuse.bin --download rcm mb1_t194_prod_sigheader.bin 0 0
[   0.8580 ] RCM 0 is saved as rcm_0.rcm
[   0.9296 ] RCM 1 is saved as rcm_1.rcm
[   0.9296 ] RCM 2 is saved as rcm_2.rcm
[   0.9296 ] List of rcm files are saved in rcm_list.xml
[   0.9296 ] 
[   0.9297 ] Signing RCM messages
[   0.9317 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin
[   0.9331 ] Assuming zero filled SBK key
[   0.9340 ] 
[   0.9340 ] Copying signature to RCM mesages
[   0.9354 ] tegrarcm_v2 --chip 0x19 0 --updatesig rcm_list_signed.xml
[   0.9374 ] 
[   0.9374 ] Parsing partition layout[   0.9781 ] tegraparser_v2 --pt flash.xml.tmp
[   1.0224 ] 
[   1.0224 ] Creating list of images to be signed
[   1.0243 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[   1.0258 ] MB1: Nvheader already present is mb1_t194_prod.bin
[   1.0272 ] Header already present for mb1_t194_prod_sigheader.bin
[   1.0281 ] MB1: Nvheader already present is mb1_t194_prod.bin
[   1.0344 ] Header already present for mb1_t194_prod_sigheader.bin
[   1.0359 ] adding BCH for spe_t194.bin
[   1.1247 ] adding BCH for spe_t194.bin
[   1.1290 ] adding BCH for nvtboot_t194.bin
[   1.2489 ] adding BCH for nvtboot_t194.bin
[   1.2577 ] Header already present for preboot_c10_prod_cr.bin
[   1.3518 ] Header already present for preboot_c10_prod_cr.bin
[   1.3524 ] Header already present for mce_c10_prod_cr.bin
[   1.3904 ] Header already present for mce_c10_prod_cr.bin
[   1.3933 ] adding BCH for mts_c10_prod_cr.bin
[   1.4880 ] adding BCH for mts_c10_prod_cr.bin
[   1.6093 ] Header already present for warmboot_t194_prod.bin
[   1.8485 ] Header already present for warmboot_t194_prod.bin
[   1.8517 ] adding BCH for cboot_t194.bin
[   1.8541 ] adding BCH for cboot_t194.bin
[   1.8784 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb
[   1.8924 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb
[   1.8994 ] adding BCH for tos-trusty_t194.img
[   1.9682 ] adding BCH for tos-trusty_t194.img
[   1.9816 ] adding BCH for eks.img
[   2.0884 ] adding BCH for eks.img
[   2.0889 ] adding BCH for adsp-fw.bin
[   2.1032 ] adding BCH for adsp-fw.bin
[   2.1099 ] adding BCH for camera-rtcpu-rce.img
[   2.1673 ] adding BCH for camera-rtcpu-rce.img
[   2.1820 ] adding BCH for bpmp_t194.bin
[   2.2471 ] adding BCH for bpmp_t194.bin
[   2.2836 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb
[   2.3450 ] adding BCH for tegra194-a02-bpmp-p3668-a00.dtb
[   2.3604 ] adding BCH for boot.img
[   2.4046 ] adding BCH for boot.img
[   3.7618 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb
[   7.0094 ] adding BCH for tegra194-p3668-all-p3509-0000.dtb
[   7.0268 ] 
[   7.0268 ] Filling MB1 storage info
[   7.0269 ] Generating br-bct
[   7.0282 ] Performing cfg overlay
[   7.0282 ] ['tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg', 'tegra194-memcfg-sw-override.cfg']
[   7.0294 ] sw_memcfg_overlay.pl -c tegra194-mb1-bct-memcfg-p3668-0001-a00.cfg -s tegra194-memcfg-sw-override.cfg -o /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11.cfg
[   7.1880 ] 
[   7.1881 ] Updating dev and MSS params in BR BCT
[   7.1881 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0
[   7.2963 ] 
[   7.2964 ] Updating bl info
[   7.2976 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin
[   7.3019 ] 
[   7.3020 ] Generating signatures
[   7.3033 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[   7.3044 ] Assuming zero filled SBK key[   8.8698 ] 
[   8.8699 ] Generating br-bct
[   8.8733 ] Performing cfg overlay
[   8.8734 ] ['/data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11.cfg']
[   8.8735 ] Updating dev and MSS params in BR BCT
[   8.8738 ] tegrabct_v2 --dev_param tegra194-br-bct-qspi.cfg --sdram /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11.cfg --brbct br_bct.cfg --sfuse tegra194-mb1-soft-fuses-l4t.cfg --chip 0x19 0
[   8.9137 ] 
[   8.9137 ] Updating bl info
[   8.9155 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   8.9554 ] 
[   8.9555 ] Updating smd info
[   8.9583 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 --updatesmdinfo flash.xml.bin
[   8.9603 ] 
[   8.9604 ] Updating Odmdata
[   8.9618 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatefields Odmdata =0xB8190000
[   8.9646 ] 
[   8.9647 ] Get Signed section of bct
[   8.9681 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --listbct bct_list.xml
[   8.9715 ] 
[   8.9729 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key --getmontgomeryvalues montgomery.bin
[   8.9740 ] Assuming zero filled SBK key
[   8.9745 ] 
[   8.9745 ] Updating BCT with signature
[   8.9759 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml
[   8.9779 ] 
[   8.9780 ] Generating coldboot mb1-bct
[   9.0155 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_cold_boot_bct.cfg --sdram /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11.cfg --misc tegra194-mb1-bct-misc-l4t.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg
[   9.0188 ] MB1-BCT version: 0x1

[   9.0201 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg 
[   9.0212 ] Added Platform Config 0 data with size :- 2496

[   9.0654 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg 
[   9.0665 ] Added Platform Config 1 data with size :- 19640

[   9.1818 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg 
[   9.1827 ] Added Platform Config 2 data with size :- 24

[   9.2026 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg 
[   9.2036 ] Added Platform Config 4 data with size :- 348

[   9.2045 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg 
[   9.2057 ] Added Platform Config 3 data with size :- 92

[   9.2371 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg 
[   9.2390 ] Added Platform Config 5 data with size :- 128

[   9.2403 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg 
[   9.2416 ] Added Platform Config 7 data with size :- 392

[   9.2755 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg 
[   9.2768 ] Added Platform Config 9 data with size :- 40
[   9.3067 ] 
[   9.3068 ] Updating mb1-bct with firmware information
[   9.3098 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[   9.3134 ] MB1-BCT version: 0x1
[   9.3148 ] 
[   9.3148 ] Updating mb1-bct with storage information
[   9.3176 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   9.3201 ] MB1-BCT version: 0x1
[   9.3216 ] 
[   9.3231 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct
[   9.3245 ] 
[   9.3258 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[   9.3270 ] adding BCH for mb1_cold_boot_bct_MB1.bct
[   9.3282 ] 
[   9.3299 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[   9.3310 ] Assuming zero filled SBK key
[   9.3315 ] 
[   9.3332 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[   9.3350 ] [   9.3351 ] Generating recovery mb1-bct
[   9.3366 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_bct.cfg --sdram /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11.cfg --misc tegra194-mb1-bct-misc-flash.cfg --scr tegra194-mb1-bct-scr-cbb-mini-p3668.cfg --pinmux tegra19x-mb1-pinmux-p3668-a01.cfg --pmc tegra19x-mb1-padvoltage-p3668-a01.cfg --pmic tegra194-mb1-bct-pmic-p3668-0001-a00.cfg --brcommand tegra194-mb1-bct-reset-p3668-0001-a00.cfg --prod tegra19x-mb1-prod-p3668-0001-a00.cfg --gpioint tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg --device tegra19x-mb1-bct-device-qspi-p3668.cfg
[   9.3380 ] MB1-BCT version: 0x1

[   9.3387 ] Parsing config file :tegra19x-mb1-pinmux-p3668-a01.cfg 
[   9.3392 ] Added Platform Config 0 data with size :- 2496

[   9.3420 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini-p3668.cfg 
[   9.3427 ] Added Platform Config 1 data with size :- 19640

[   9.3664 ] Parsing config file :tegra19x-mb1-padvoltage-p3668-a01.cfg 
[   9.3670 ] Added Platform Config 2 data with size :- 24

[   9.3674 ] Parsing config file :tegra194-mb1-bct-pmic-p3668-0001-a00.cfg 
[   9.3680 ] Added Platform Config 4 data with size :- 348
[   9.3684 ] 
[   9.3684 ] Parsing config file :tegra194-mb1-bct-reset-p3668-0001-a00.cfg 
[   9.3684 ] Added Platform Config 3 data with size :- 92
[   9.3684 ] 
[   9.3684 ] Parsing config file :tegra19x-mb1-prod-p3668-0001-a00.cfg 
[   9.3684 ] Added Platform Config 5 data with size :- 128
[   9.3684 ] 
[   9.3684 ] Parsing config file :tegra194-mb1-bct-gpioint-p3668-0001-a00.cfg 
[   9.3684 ] Added Platform Config 7 data with size :- 392
[   9.3684 ] 
[   9.3684 ] Parsing config file :tegra19x-mb1-bct-device-qspi-p3668.cfg 
[   9.3684 ] Added Platform Config 9 data with size :- 40
[   9.3684 ] 
[   9.3685 ] Updating mb1-bct with firmware information
[   9.3696 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[   9.3708 ] MB1-BCT version: 0x1
[   9.3713 ] 
[   9.3713 ] Updating mb1-bct with storage information
[   9.3725 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   9.3763 ] MB1-BCT version: 0x1
[   9.3771 ] 
[   9.3790 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct
[   9.3814 ] 
[   9.3827 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --appendsigheader mb1_bct_MB1.bct zerosbk
[   9.3840 ] adding BCH for mb1_bct_MB1.bct
[   9.3852 ] 
[   9.3868 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[   9.3879 ] Assuming zero filled SBK key
[   9.3885 ] 
[   9.3921 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[   9.3942 ] 
[   9.3944 ] Generating coldboot mem-bct
[   9.3963 ] tegrabct_v2 --chip 0x19 0 --sdram /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11.cfg --membct /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11_1.bct /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11_2.bct /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11_3.bct /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11_4.bct
[   9.3986 ] Packing sdram param for instance[0]
[   9.4184 ] Packing sdram param for instance[1]
[   9.4188 ] Packing sdram param for instance[2]
[   9.4193 ] Packing sdram param for instance[3]
[   9.4193 ] Packing sdram param for instance[4]
[   9.4193 ] Packing sdram param for instance[5]
[   9.4193 ] Packing sdram param for instance[6]
[   9.4193 ] Packing sdram param for instance[7]
[   9.4194 ] Packing sdram param for instance[8]
[   9.4194 ] Packing sdram param for instance[9]
[   9.4194 ] Packing sdram param for instance[10]
[   9.4194 ] Packing sdram param for instance[11]
[   9.4194 ] Packing sdram param for instance[12]
[   9.4194 ] Packing sdram param for instance[13]
[   9.4194 ] Packing sdram param for instance[14]
[   9.4194 ] Packing sdram param for instance[15]
[   9.4194 ] 
[   9.4194 ] Getting sector size from pt[   9.4207 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin
[   9.4222 ] 
[   9.4223 ] BlockSize read from layout is 200

[   9.4237 ] tegrahost_v2 --chip 0x19 0 --blocksize 512 --magicid MEMB --addsigheader_multi /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11_1.bct /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11_2.bct /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11_3.bct /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11_4.bct
[   9.4249 ] adding BCH for /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11_1.bct
[   9.4382 ] 
[   9.4422 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct
[   9.4440 ] 
[   9.4459 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --appendsigheader mem_coldboot.bct zerosbk
[   9.4478 ] Header already present for mem_coldboot.bct
[   9.4485 ] 
[   9.4511 ] tegrasign_v2 --key None --list mem_coldboot_sigheader.bct_list.xml --pubkeyhash pub_key.key
[   9.4533 ] Assuming zero filled SBK key
[   9.4552 ] 
[   9.4578 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_coldboot_sigheader.bct.encrypt mem_coldboot_sigheader.bct.hash zerosbk
[   9.4603 ] 
[   9.4605 ] Generating recovery mem-bct
[   9.4623 ] tegrabct_v2 --chip 0x19 0 --sdram /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11.cfg --membct /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11_1.bct /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11_2.bct /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11_3.bct /data/leopard/driver/Linux_for_Tegra/bootloader/377926/tmpvTIcw11_4.bct
[   9.4643 ] Packing sdram param for instance[0]
[   9.4839 ] Packing sdram param for instance[1]
[   9.4844 ] Packing sdram param for instance[2]
[   9.4850 ] Packing sdram param for instance[3]
[   9.4850 ] Packing sdram param for instance[4]
[   9.4850 ] Packing sdram param for instance[5]
[   9.4850 ] Packing sdram param for instance[6]
[   9.4850 ] Packing sdram param for instance[7]
[   9.4850 ] Packing sdram param for instance[8]
[   9.4850 ] Packing sdram param for instance[9]
[   9.4850 ] Packing sdram param for instance[10]
[   9.4851 ] Packing sdram param for instance[11]
[   9.4851 ] Packing sdram param for instance[12]
[   9.4851 ] Packing sdram param for instance[13]
[   9.4851 ] Packing sdram param for instance[14]
[   9.4851 ] Packing sdram param for instance[15]
[   9.4851 ] 
[   9.4873 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct
[   9.4891 ] 
[   9.4907 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --appendsigheader mem_rcm.bct zerosbk
[   9.4929 ] adding BCH for mem_rcm.bct
[   9.4954 ] 
[   9.4999 ] tegrasign_v2 --key None --list mem_rcm_sigheader.bct_list.xml --pubkeyhash pub_key.key
[   9.5016 ] Assuming zero filled SBK key
[   9.5022 ] 
[   9.5039 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm_sigheader.bct.encrypt mem_rcm_sigheader.bct.hash zerosbk
[   9.5064 ] 
[   9.5065 ] Copying signatures
[   9.5077 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[  13.0956 ] 
[  13.0956 ] Boot Rom communication
[  13.0977 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_list_signed.xml
[  13.0993 ] BR_CID: 0x88021911647076c20800000011000100
[  13.1003 ] RCM version 0X190001[  13.1156 ] Boot Rom communication completed
[  14.1309 ] 
[  15.1354 ] tegrarcm_v2 --isapplet
[  15.1384 ] Applet version 01.00.0000
[  15.1563 ] 
[  15.1564 ] Sending BCTs
[  15.1605 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt --download bct_mem mem_rcm_sigheader.bct.encrypt
[  15.1643 ] Applet version 01.00.0000
[  15.1845 ] Sending bct_bootrom
[  15.1847 ] [................................................] 100%
[  15.1860 ] Sending bct_mb1
[  15.1906 ] [................................................] 100%
[  15.1945 ] Sending bct_mem
[  15.2441 ] [................................................] 100%
[  15.3178 ] 
[  15.3179 ] Generating blob
[  15.3197 ] tegrahost_v2 --chip 0x19 --align blob_nvtboot_recovery_cpu_t194.bin
[  15.3215 ] 
[  15.3234 ] tegrahost_v2 --chip 0x19 0 --magicid CPBL --appendsigheader blob_nvtboot_recovery_cpu_t194.bin zerosbk
[  15.3257 ] adding BCH for blob_nvtboot_recovery_cpu_t194.bin
[  15.3379 ] 
[  15.3407 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  15.3421 ] Assuming zero filled SBK key
[  15.3431 ] 
[  15.3455 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_nvtboot_recovery_cpu_t194_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_t194_sigheader.bin.hash zerosbk
[  15.3523 ] 
[  15.3552 ] tegrahost_v2 --chip 0x19 --align blob_nvtboot_recovery_t194.bin
[  15.3567 ] 
[  15.3581 ] tegrahost_v2 --chip 0x19 0 --magicid MB2B --appendsigheader blob_nvtboot_recovery_t194.bin zerosbk
[  15.3592 ] adding BCH for blob_nvtboot_recovery_t194.bin
[  15.3959 ] 
[  15.3982 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  15.3996 ] Assuming zero filled SBK key
[  15.4004 ] 
[  15.4036 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_nvtboot_recovery_t194_sigheader.bin.encrypt blob_nvtboot_recovery_t194_sigheader.bin.hash zerosbk
[  15.4084 ] 
[  15.4109 ] tegrahost_v2 --chip 0x19 --align blob_preboot_c10_prod_cr.bin
[  15.4137 ] 
[  15.4158 ] tegrahost_v2 --chip 0x19 0 --magicid MTSP --appendsigheader blob_preboot_c10_prod_cr.bin zerosbk
[  15.4178 ] Header already present for blob_preboot_c10_prod_cr.bin
[  15.4186 ] 
[  15.4207 ] tegrasign_v2 --key None --list blob_preboot_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  15.4224 ] Assuming zero filled SBK key
[  15.4234 ] 
[  15.4258 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_preboot_c10_prod_cr_sigheader.bin.encrypt blob_preboot_c10_prod_cr_sigheader.bin.hash zerosbk
[  15.4278 ] 
[  15.4305 ] tegrahost_v2 --chip 0x19 --align blob_mce_c10_prod_cr.bin
[  15.4391 ] 
[  15.4426 ] tegrahost_v2 --chip 0x19 0 --magicid MTSM --appendsigheader blob_mce_c10_prod_cr.bin zerosbk
[  15.4447 ] Header already present for blob_mce_c10_prod_cr.bin
[  15.4479 ] 
[  15.4506 ] tegrasign_v2 --key None --list blob_mce_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  15.4530 ] Assuming zero filled SBK key
[  15.4540 ] 
[  15.4559 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_mce_c10_prod_cr_sigheader.bin.encrypt blob_mce_c10_prod_cr_sigheader.bin.hash zerosbk
[  15.4600 ] 
[  15.4617 ] tegrahost_v2 --chip 0x19 --align blob_mts_c10_prod_cr.bin
[  15.4630 ] 
[  15.4644 ] tegrahost_v2 --chip 0x19 0 --magicid MTSB --appendsigheader blob_mts_c10_prod_cr.bin zerosbk
[  15.4657 ] adding BCH for blob_mts_c10_prod_cr.bin[  15.5905 ] 
[  15.5921 ] tegrasign_v2 --key None --list blob_mts_c10_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  15.5932 ] Assuming zero filled SBK key
[  15.5990 ] 
[  15.6008 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_mts_c10_prod_cr_sigheader.bin.encrypt blob_mts_c10_prod_cr_sigheader.bin.hash zerosbk
[  15.6664 ] 
[  15.6680 ] tegrahost_v2 --chip 0x19 --align blob_bpmp_t194.bin
[  15.6693 ] 
[  15.6706 ] tegrahost_v2 --chip 0x19 0 --magicid BPMF --appendsigheader blob_bpmp_t194.bin zerosbk
[  15.6719 ] adding BCH for blob_bpmp_t194.bin
[  15.7043 ] 
[  15.7071 ] tegrasign_v2 --key None --list blob_bpmp_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  15.7087 ] Assuming zero filled SBK key
[  15.7111 ] 
[  15.7133 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_bpmp_t194_sigheader.bin.encrypt blob_bpmp_t194_sigheader.bin.hash zerosbk
[  15.7323 ] 
[  15.7353 ] tegrahost_v2 --chip 0x19 --align blob_tegra194-a02-bpmp-p3668-a00.dtb
[  15.7365 ] 
[  15.7378 ] tegrahost_v2 --chip 0x19 0 --magicid BPMD --appendsigheader blob_tegra194-a02-bpmp-p3668-a00.dtb zerosbk
[  15.7389 ] adding BCH for blob_tegra194-a02-bpmp-p3668-a00.dtb
[  15.7448 ] 
[  15.7463 ] tegrasign_v2 --key None --list blob_tegra194-a02-bpmp-p3668-a00_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[  15.7474 ] Assuming zero filled SBK key
[  15.7480 ] 
[  15.7497 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt blob_tegra194-a02-bpmp-p3668-a00_sigheader.dtb.hash zerosbk
[  15.7539 ] 
[  15.7555 ] tegrahost_v2 --chip 0x19 --align blob_spe_t194.bin
[  15.7571 ] 
[  15.7585 ] tegrahost_v2 --chip 0x19 0 --magicid SPEF --appendsigheader blob_spe_t194.bin zerosbk
[  15.7598 ] adding BCH for blob_spe_t194.bin
[  15.7635 ] 
[  15.7659 ] tegrasign_v2 --key None --list blob_spe_t194_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  15.7680 ] Assuming zero filled SBK key
[  15.7687 ] 
[  15.7705 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_spe_t194_sigheader.bin.encrypt blob_spe_t194_sigheader.bin.hash zerosbk
[  15.7736 ] 
[  15.7751 ] tegrahost_v2 --chip 0x19 --align blob_tos-trusty_t194.img
[  15.7763 ] 
[  15.7774 ] tegrahost_v2 --chip 0x19 0 --magicid TOSB --appendsigheader blob_tos-trusty_t194.img zerosbk
[  15.7786 ] adding BCH for blob_tos-trusty_t194.img
[  15.7929 ] 
[  15.7975 ] tegrasign_v2 --key None --list blob_tos-trusty_t194_sigheader.img_list.xml --pubkeyhash pub_key.key
[  15.7989 ] Assuming zero filled SBK key
[  15.8000 ] 
[  15.8020 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_tos-trusty_t194_sigheader.img.encrypt blob_tos-trusty_t194_sigheader.img.hash zerosbk
[  15.8108 ] 
[  15.8137 ] tegrahost_v2 --chip 0x19 --align blob_eks.img
[  15.8160 ] 
[  15.8175 ] tegrahost_v2 --chip 0x19 0 --magicid EKSB --appendsigheader blob_eks.img zerosbk
[  15.8188 ] adding BCH for blob_eks.img
[  15.8192 ] 
[  15.8217 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key
[  15.8239 ] Assuming zero filled SBK key
[  15.8243 ] 
[  15.8285 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[  15.8320 ] 
[  15.8341 ] tegrahost_v2 --chip 0x19 --align blob_tegra194-p3668-all-p3509-0000.dtb
[  15.8366 ] 
[  15.8386 ] tegrahost_v2 --chip 0x19 0 --magicid CDTB --appendsigheader blob_tegra194-p3668-all-p3509-0000.dtb zerosbk
[  15.8404 ] adding BCH for blob_tegra194-p3668-all-p3509-0000.dtb
[  15.8482 ] 
[  15.8505 ] tegrasign_v2 --key None --list blob_tegra194-p3668-all-p3509-0000_sigheader.dtb_list.xml --pubkeyhash pub_key.key[  15.8531 ] Assuming zero filled SBK key
[  15.8535 ] 
[  15.8568 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt blob_tegra194-p3668-all-p3509-0000_sigheader.dtb.hash zerosbk
[  15.8635 ] 
[  15.8662 ] tegrahost_v2 --chip 0x19 --generateblob blob.xml blob.bin
[  15.8682 ] number of images in blob are 11
[  15.8690 ] blobsize is 5706840
[  15.8692 ] Added binary blob_nvtboot_recovery_cpu_t194_sigheader.bin.encrypt of size 258144
[  15.8729 ] Added binary blob_nvtboot_recovery_t194_sigheader.bin.encrypt of size 129936
[  15.8737 ] Added binary blob_preboot_c10_prod_cr_sigheader.bin.encrypt of size 24016
[  15.8746 ] Added binary blob_mce_c10_prod_cr_sigheader.bin.encrypt of size 142592
[  15.8753 ] Added binary blob_mts_c10_prod_cr_sigheader.bin.encrypt of size 3430800
[  15.8765 ] Added binary blob_bpmp_t194_sigheader.bin.encrypt of size 856112
[  15.8779 ] Added binary blob_tegra194-a02-bpmp-p3668-a00_sigheader.dtb.encrypt of size 172688
[  15.8788 ] Added binary blob_spe_t194_sigheader.bin.encrypt of size 94960
[  15.8794 ] Added binary blob_tos-trusty_t194_sigheader.img.encrypt of size 373696
[  15.8801 ] Added binary blob_eks_sigheader.img.encrypt of size 5136
[  15.8807 ] Added binary blob_tegra194-p3668-all-p3509-0000_sigheader.dtb.encrypt of size 218576
[  15.8841 ] 
[  15.8842 ] Sending bootloader and pre-requisite binaries
[  15.8854 ] tegrarcm_v2 --download blob blob.bin
[  15.8867 ] Applet version 01.00.0000
[  15.9049 ] Sending blob
[  15.9050 ] [................................................] 100%
[  16.6818 ] 
[  16.6848 ] tegrarcm_v2 --boot recovery
[  16.6873 ] Applet version 01.00.0000
[  16.7091 ] 
[  17.7117 ] tegrarcm_v2 --isapplet
[ 1021.7248 ] 
[ 1021.7268 ] tegrarcm_v2 --ismb2
[ 2037.5328 ] 
[ 2037.5620 ] tegradevflash_v2 --iscpubl
[ 2037.5636 ] CPU Bootloader is not running on device.
[ 3053.3408 ] 
[ 3054.3431 ] tegrarcm_v2 --isapplet
[ 4069.1487 ] 
[ 4069.1501 ] tegrarcm_v2 --ismb2
[ 5084.9567 ] 
[ 5084.9581 ] tegradevflash_v2 --iscpubl
[ 5084.9593 ] CPU Bootloader is not running on device.
1 Like

Hi,

Could you rule out which is the cause? The dtb or kernel? Generally, such change should not cause the problem,

Maybe you could help dump the device log for us to check.

https://elinux.org/Jetson/General_debug

I have checked uart log and see that it could not load GPIO & I2C driver properly. IMO the problem is caused by dtb file. Whenever I revert back to original dtb file, the flashing process works fine. If I replace to custom dtb file “kernel/dtb/tegra194-p3668-all-p3509-0000.dtb” the problem occurs.

[0066.442] I> Rebooting : reboot-recovery


[006��
[0010.724] W> RATCHET: MB1 binary ratchet value 4 is too large than ratchet level 2 from HW fuses.
[0010.733] I> MB1 (prd-version: 1.5.1.3-t194-41334769-d2a21c57)
[0010.738] I> Boot-mode: RCM
[0010.741] I> Chip revision : A02P
[0010.744] I> Bootrom patch version : 15 (correctly patched)
[0010.749] I> ATE fuse revision : 0x200
[0010.753] I> Ram repair fuse : 0x0
[0010.756] I> Ram Code : 0x0
[0010.758] I> rst_source : 0xb
[0010.761] I> rst_level : 0x1
[0010.765] I> USB configuration success
[0017.905] I> bct_bootrom image downloaded
[0017.914] W> MB1_PLATFORM_CONFIG: device prod data is empty in MB1 BCT.
[0017.921] I> Temperature = 30500
[0017.924] W> Skipping boost for clk: BPMP_CPU_NIC
[0017.929] W> Skipping boost for clk: BPMP_APB
[0017.933] W> Skipping boost for clk: AXI_CBB
[0017.937] W> Skipping boost for clk: AON_CPU_NIC
[0017.941] W> Skipping boost for clk: CAN1
[0017.945] W> Skipping boost for clk: CAN2
[0017.949] I> Boot-device: QSPI
[0017.952] I> Boot-device: QSPI
[0017.955] I> Qspi flash params source = mb1bct
[0017.959] I> bct_mb1 image downloaded
[0017.969] I> ECC region[0]: Start:0x0, End:0x0
[0017.973] I> ECC region[1]: Start:0x0, End:0x0
[0017.977] I> ECC region[2]: Start:0x0, End:0x0
[0017.981] I> ECC region[3]: Start:0x0, End:0x0
[0017.986] I> ECC region[4]: Start:0x0, End:0x0
[0017.990] I> Non-ECC region[0]: Start:0x80000000, End:0x100000000
[0017.995] I> Non-ECC region[1]: Start:0x0, End:0x0
[0018.000] I> Non-ECC region[2]: Start:0x0, End:0x0
[0018.004] I> Non-ECC region[3]: Start:0x0, End:0x0
[0018.009] I> Non-ECC region[4]: Start:0x0, End:0x0
[0018.015] E> FAILED: Thermal config
[0018.022] E> FAILED: MEMIO rail config
[0018.033] I> bct_mem image downloaded
[0019.401] I> blob image downloaded
[0019.424] I> Recovery boot mode 0
[0019.491] I> MB1 done

����main enter
SPE VERSION #: R01.00.14 Created: Sep 19 2018 @ 11:03:21
HW Function test
Start Scheduler.
in late init
��
  [0019.501] I> Welcome to MB2(TBoot-BPMP) Recovery (version: 00.00.2018.32-mobile-269daa9d)
[0019.502] I> DMA Heap @ [0x526fa000 - 0x52ffa000]
[0019.502] I> Default Heap @ [0xd486400 - 0xd48a400]
[0019.503] E> DEVICE_PROD: Invalid value data = 70020000, size = 0.
[0019.509] W> device prod register failed
[0019.514] I> parsing oem signed section of bpmp-fw header done
[0019.52] I> bpmp-fw binary copied from blob
[0019.523] I> oem authentication of bpmp-fw header done
[0019.528] I> bpmp-fw: Authentication init Done
[0019.532] I> parsing oem signed section of cpubl header done
[0019.538] I> cpubl binary copied from blob
[0019.542] I> bpmp-fw: Authentication Finalize Done
[0019.546] I> oem authentication of cpubl header done
[0019.551] I> cpubl: Authentication init Done
[0019.555] I> parsing oem signed section of tos header done
[0019.562] I> tos binary copied from blob
[0019.565] I> Relocating BR-BCT
[0019.567] I> cpubl: Authentication Finalize Done
[0019.572] I> oem authentication of tos header done
[0019.576] I> tos: Authentication init Done
[0019.580] I> parsing oem signed section of bpmp-fw-dtb header done
[0019.587] I> bpmp-fw-dtb binary copied from blob
[0019.591] I> tos: Authentication Finalize Done
[0019.597] I> oem authentication of bpmp-fw-dtb header done
[0019.600] I> bpmp-fw-dtb: Authentication init Done
[0019.605] I> parsing oem signed section of cpubl-dtb header done
[0019.611] I> cpubl-dtb binary copied from blob
[0019.615] I> bpmp-fw-dtb: Authentication Finalize Done
[0019.692] I> oem authentication of cpubl-dtb header done
[0019.692] I> cpubl-dtb: Authentication init Done
[0019.693] I> parsing oem signed section of eks header done
[0019.694] I> eks binary copied from blob
[0019.694] I> cpubl-dtb: Authentication Finalize Done
[0019.695] I> oem authentication of eks header done
[0019.695] I> eks: Authentication init Done
[0019.699] I> eks: Authentication Finalize Done
[0019.703] I> EKB detected (length: 0x410) @ VA:0x526fb600
��NOTICE:  BL31: v1.3(release):41d46a9cf
NOTICE:  BL31: Built : 21:14:52, Jun 25 2020
ipc-unittest-main: 1519: Welcome to IPC unittest!!!
ipc-unittest-main: 1531: waiting forever
ipc-unittest-srv: 329: Init unittest services!!!
hwkey-agent: 40: hwkey-agent is running!!
hwkey-agent: 182: key_mgnt_processing .......
hwkey-agent: 157: Init hweky-agent services!!
platform_bootstrap_epilog: trusty bootstrap complete
��

welcome to lk
calling constructors
initializing heap
creating bootstrap completion thread
top of bootstrap2()
initializing platform
bpmp: platform_init
tag is 57f8a77779f848bf2ecf21dabee5645f
tag_show initialized
dt initialized
mail initialized
chipid initialized
fuse initialized
sku initialized
speedo initialized
ec_get_ec_list: found 45 ecs
ec initialized
ec_mrq initialized
vmon_populate_monitors: found 3 monitors
vmon initialized
adc initialized
fmo_populate_monitors: found 73 monitors
fmon initialized
fmon_mrq initialized
reset initialized
nvhs initialized
391 clocks registered
clk_mrq_init: mrq handler registered
clk initialized
nvlink initialized
io_dpd initialized
io_dpd initialized
thermal initialized
i2c5 controller initialized
initialized i2c mrq handling
i2c initialized
regulator initialized
avfs_clk_platform_init: bad clk id in clock@cluster1_avfs
avfs_clk_platform initialized
soctherm initialized
aotag initialized
powergate initialized
dvs initialized
pm initialized
pg_late initialized
strap initialized
tag initialized
emc initialized
clk_dt initialized
avfs_ccplex_platform initialized
tj_max: dt node not found
tj_init initialized
/uphy is not enabled status = disabled
uphy_dt initialized
uphy initialized
safereg_init: period 80 ms
ec_late initialized
mrq initialized
��
  [0020.038] I> Welcome to TBoot-CPU Recovery
��WARNING: no registered clock for FMON_NAFLL_CLUSTER1 (id 281)
fmon_post initialized
��[0020.039] I> Heap: [0xa4000000 ... 0xaa000000
��clk_set_parent failed for clk can1, parent pll_aon (-22)
clk_set_parent failed for clk can2, parent pll_aon (-22)
clk_set_parent failed for clk dmic5, parent pll_aon (-22)
clk_set_parent failed for clk i2c2, parent pll_aon (-22)
clk_set_parent failed for clk i2c8, parent pll_aon (-22)
clk_set_parent failed for clk spi2, parent pll_aon (-22)
clk_set_parent failed for clk pwm4, parent pll_aon (-22)
clk_dt_late initialized
machine_check initialized
pm_post initialized
dbells initialized
avfs_clk_platform_post initialized
dmce initialized
cvc initialized
ccplex_avfs_hw_init: nafll_cluster0: not monitored
ccplex_avfs_hw_init: nafll_cluster2: not monitored
ccplex_avfs_hw_init: nafll_cluster3: not monitored
avfs_clk_mach_post initialized
regulator_post initialized
rm initialized
sc7_diag initialized
thermal_test initiaized
serial_late initialized
clk_post initialized
clk_dt_post initialized
mc_reg initialized
pg_post initialized
dyn_modules initialized
sku_debugfs initialized
speedo_debugfs initialized
adc_debugfs initialized
Failed to register PTO counter for id 281
Failed to register PTO counter for id 281
Failed to register PTO counter for id 281
Failed to register PTO counter for id 281
clk_debugfs initialized
emc_debugfs initialized
dvs_debugfs initialized
fmon_debugfs_init_one: no clock debugfs node to attach FMON_NAFLL_CLUSTER1
fmon_debugfs initialized
vmon_debugfs initialized
pg_debugfs initialized
profile_fs initialized
debugfs_cons initialized
mail_fs initialized
profile initialized
cvc_debugfs initialized
dmce_debugfs initialized
ec_debugfs initialized
rm_rail_debugfs_init: /rm/vdd_cpu: failed
rm_rail_debugfs_init: /rm/vdd_cpu: failed
rm_debugfs initialized
soctherm_debug initialized
gr_reader initialized
mods initialized
dt_fs initialized
debugfs_mrq initialized
debug_mrq initialized
debug_safereg initialized
initializing target
calling apps_init()
starting app shell
entering main console loop
] ��[0020.049] I> gpio framework initialized
[0020.228] E> fetch_phandle_from_dt: failed to get node nvidia,tegra194-gpio
[0020.235] W> tegrabl_gpio_driver_init failed to fetch phandle for nvidia,tegra194-gpio
[0020.243] I> tegrabl_gpio_driver_register: register 'nvidia,tegra194-gpio' driver
[0020.250] E> fetch_phandle_from_dt: failed to get node nvidia,tegra194-gpio-aon
[0020.257] W> tegrabl_gpio_driver_init failed to fetch phandle for nvidia,tegra194-gpio-aon
[0020.265] I> tegrabl_gpio_driver_register: register 'nvidia,tegra194-gpio-aon' driver
[0020.273] I> tegrabl_tca9539_init: i2c bus: 1, slave addr: 0x46
[0020.279] E> Error -11 when finding node with path /i2c@c240000
[0020.285] E> fetch_driver_phandle_from_dt: failed to get i2c node for tca9539
[0020.292] E> Error -11 when finding node with path /i2c@c240000
[0020.297] E> fetch_driver_phandle_from_dt: failed to get i2c node for tca9539
[0020.304] W> tegrabl_tca9539_init: failed to fetch phandle from dt
[0020.311] I> tegrabl_tca9539_init: i2c bus: 1, slave addr: 0x44
[0020.316] E> Error -11 when finding node with path /i2c@c240000
[0020.322] E> fetch_driver_phandle_from_dt: failed to get i2c node for tca9539
[0020.329] E> Error -11 when finding node with path /i2c@c240000
[0020.335] E> fetch_driver_phandle_from_dt: failed to get i2c node for tca9539
[0020.342] W> tegrabl_tca9539_init: failed to fetch phandle from dt

What did you change in the dtb?

Hi Wayne,
Here is my device tree diff file. I got it from Leopard to support IMX577 for (Xavier NX + LI-XNX-6CAM). Please help me take a look to see what is wrong in this file.

PS: Currently I am using Xavier NX SDCard version.

Thank you so much for your support.
IMX577_NX_devicetree.zip (5.5 KB)

Here is another UART log. Seems that bootloader could not init SDCard

���
[0016.831] W> RATCHET: MB1 binary ratchet value 4 is too large than ratchet level 2 from HW fuses.
[0016.839] I> MB1 (prd-version: 1.5.1.3-t194-41334769-d2a21c57)
[0016.845] I> Boot-mode: Platform RCM
[0016.848] I> Chip revision : A02P
[0016.851] I> Bootrom patch version : 15 (correctly patched)
[0016.856] I> ATE fuse revision : 0x200
[0016.860] I> Ram repair fuse : 0x0
[0016.863] I> Ram Code : 0x0
[0016.865] I> rst_source : 0x0
[0016.868] I> rst_level : 0x0
[0016.872] I> USB configuration success
[0018.979] I> mb2 image downloaded
[0019.002] I> Recovery boot mode 0
[0019.005] I> Boot-device: QSPI
[0019.010] I> UPHY full init done
[0019.014] I> MB1 done

[0019.019] W> Profiler not initialized
[0019.023] I> Welcome to MB2(TBoot-BPMP) Applet (version: 00.00.2018.32-mobile-9af8dd5a)
[0019.030] W> Profiler not initialized
[0019.034] I> DMA Heap @ [0x40020000 - 0x40065800]
[0019.039] I> Default Heap @ [0xd486400 - 0xd48a400]
[0019.043] W> Profiler not initialized
[0019.047] W> Profiler not initialized
[0019.050] E> DEVICE_PROD: Invalid value data = 0, size = 0.
[0019.056] W> device prod register failed
[0019.060] W> Profiler not initialized
[0019.064] E> Error in command_complete 18000 int_status
[0019.069] E> OCR failed, error = f0f0706
[0019.073] I> SDMMC is not present.
[0019.077] I> QSPI Flash Size = 32 MB
[0019.087] I> Qspi initialized successfully
[0019.139] E> Link startup dme_set failed
[0019.143] E> UFS initialization failed
[0019.146] I> UFS is not present
[0019.149] W> Profiler not initialized[0019.154] I> Found 47 partitions in QSPI_FLASH (instance 0)
[0019.160] W> Profiler not initialized
[0019.163] W> Profiler not initialized
[0019.167] W> Profiler not initialized
[0019.170] I> Entering 3p server
[0019.174] I> USB configuration success
[0020.092] I> Populate eeprom info
[0020.096] I> Populate eeprom info for module cvm
[0020.176] I> Rebooting : reboot-recovery


[002��
[0012.457] W> RATCHET: MB1 binary ratchet value 4 is too large than ratchet level 2 from HW fuses.
[0012.466] I> MB1 (prd-version: 1.5.1.3-t194-41334769-d2a21c57)
[0012.471] I> Boot-mode: RCM
[0012.474] I> Chip revision : A02P
[0012.477] I> Bootrom patch version : 15 (correctly patched)
[0012.482] I> ATE fuse revision : 0x200
[0012.485] I> Ram repair fuse : 0x0
[0012.489] I> Ram Code : 0x0
[0012.491] I> rst_source : 0xb
[0012.494] I> rst_level : 0x1
[0012.498] I> USB configuration success
[0019.889] I> bct_bootrom image downloaded
[0019.897] W> MB1_PLATFORM_CONFIG: device prod data is empty in MB1 BCT.
[0019.905] I> Temperature = 32000
[0019.908] W> Skipping boost for clk: BPMP_CPU_NIC
[0019.912] W> Skipping boost for clk: BPMP_APB
[0019.916] W> Skipping boost for clk: AXI_CBB
[0019.920] W> Skipping boost for clk: AON_CPU_NIC
[0019.925] W> Skipping boost for clk: CAN1
[0019.928] W> Skipping boost for clk: CAN2
[0019.933] I> Boot-device: QSPI
[0019.936] I> Boot-device: QSPI
[0019.938] I> Qspi flash params source = mb1bct
[0019.943] I> bct_mb1 image downloaded[0019.953] I> ECC region[0]: Start:0x0, End:0x0
[0019.957] I> ECC region[1]: Start:0x0, End:0x0
[0019.961] I> ECC region[2]: Start:0x0, End:0x0
[0019.965] I> ECC region[3]: Start:0x0, End:0x0
[0019.969] I> ECC region[4]: Start:0x0, End:0x0
[0019.973] I> Non-ECC region[0]: Start:0x80000000, End:0x100000000
[0019.979] I> Non-ECC region[1]: Start:0x0, End:0x0
[0019.983] I> Non-ECC region[2]: Start:0x0, End:0x0
[0019.988] I> Non-ECC region[3]: Start:0x0, End:0x0
[0019.992] I> Non-ECC region[4]: Start:0x0, End:0x0
[0019.999] E> FAILED: Thermal config
[0020.006] E> FAILED: MEMIO rail config
[0020.016] I> bct_mem image downloaded
[0021.366] I> blob image downloaded
[0021.392] I> Recovery boot mode 0
[0021.459] I> MB1 done

����main enter
SPE VERSION #: R01.00.14 Created: Sep 19 2018 @ 11:03:21
HW Function test
Start Scheduler.
in late init
��
  [0021.469] I> Welcome to MB2(TBoot-BPMP) Recovery (version: 00.00.2018.32-mobile-269daa9d)
[0021.469] I> DMA Heap @ [0x526fa000 - 0x52ffa000]
[0021.470] I> Default Heap @ [0xd486400 - 0xd48a400]
[0021.471] E> DEVICE_PROD: Invalid value data = 70020000, size = 0.
[0021.477] W> device prod register failed
[0021.482] I> parsing oem signed section of bpmp-fw header done
[0021.489] I> bpmp-fw binary copied from blob
[0021.491] I> oem authentication of bpmp-fw header done
[0021.496] I> bpmp-fw: Authentication init Done
[0021.500] I> parsing oem signed section of cpubl header done
[0021.506] I> cpubl binary copied from blob
[0021.510] I> bpmp-fw: Authentication Finalize Done
[0021.514] I> oem authentication of cpubl header done
[0021.519] I> cpubl: Authentication init Done
[0021.523] I> parsing oem signed section of tos header done
[0021.530] I> tos binary copied from blob
[0021.532] I> Relocating BR-BCT
[0021.535] I> cpubl: Authentication Finalize Done
[0021.540] I> oem authentication of tos header done
[0021.544] I> tos: Authentication init Done
[0021.548] I> parsing oem signed section of bpmp-fw-dtb header done
[0021555] I> bpmp-fw-dtb binary copied from blob
[0021.559] I> tos: Authentication Finalize Done
[0021.565] I> oem authentication of bpmp-fw-dtb header done
[0021.568] I> bpmp-fw-dtb: Authentication init Done
[0021.573] I> parsing oem signed section of cpubl-dtb header done
[0021.579] I> cpubl-dtb binary copied from blob
[0021.583] I> bpmp-fw-dtb: Authentication Finalize Done
[0021.660] I> oem authentication of cpubl-dtb header done
[0021.660] I> cpubl-dtb: Authentication init Done
[0021.661] I> parsing oem signed section of eks header done
[0021.661] I> eks binary copied from blob
[0021.662] I> cpubl-dtb: Authentication Finalize Done
[0021.663] I> oem authentication of eks header done
[0021.663] I> eks: Authentication init Done
[0021.667] I> eks: Authentication Finalize Done
[0021.671] I> EKB detected (length: 0x410) @ VA:0x526fb600
��NOTICE:  BL31: v1.3(release):41d46a9cf
NOTICE:  BL31: Built : 21:14:52, Jun 25 2020
ipc-unittest-main: 1519: Welcome to IPC unittest!!!
ipc-unittest-main: 1531: waiting forever
ipc-unittest-srv: 329: Init unittest services!!!
hwkey-agent: 40: hwkey-agent is running!!
hwkey-agent: 182: key_mgnt_processing .......
hwkey-agent: 157: Init hweky-agent services!!
platform_bootstrap_epilog: trusty bootstrap complete
��

welcome to lk
calling constructors
initializing heap
creating bootstrap completion thread
top of bootstrap2()
initializing platform
bpmp: platform_init
tag is 57f8a77779f848bf2ecf21dabee5645f
tag_show initializeddt initialized
mail initialized
chipid initialized
fuse initialized
sku initialized
speedo initialized
ec_get_ec_list: found 45 ecs
ec initialized
ec_mrq initialized
vmon_populate_monitors: found 3 monitors
vmon initialized
adc initialized
fmon_populate_monitors: found 73 monitors
fmon initialized
fmon_mrq initialized
reset initialized
nvhs initialized
391 clocks registered
clk_mrq_init: mrq handler registered
clk initialized
nvlink initialized
io_dpd initialized
io_dpd initialized
thermal initialized
i2c5 controller initialized
initialized i2c mrq handling
i2c initialized
regulator initialized
avfs_clk_platform_init: bad clk id in clock@cluster1_avfs
avfs_clk_platform initialized
soctherm initialized
aotag initialized
powergate initialized
dvs initialized
pm initialized
pg_late initialized
strap initialized
tag initializedemc initialized
clk_dt initialized
avfs_ccplex_platform initialized
tj_max: dt node not found
tj_init initialized
/uphy is not enabled status = disabled
uphy_dt initialized
uphy initialized
safereg_init: period 80 ms
ec_late initialized
mrq initialized
��
  [0022.006] I> Welcome to TBoot-CPU Recovery
��WARNING: no registered clock for FMON_NAFLL_CLUSTER1 (id 281)
fmon_post initialized
��[0022.007] I> Heap: [0xa4000000 ... 0xaa000000
��clk_set_parent failed for clk can1, parent pll_aon (-22)
clk_set_parent failed for clk can2, parent pll_aon (-22)
clk_set_parent failed for clk dmic5, parent pll_aon (-22)
clk_set_parent failed for clk i2c2, parent pll_aon (-22)
clk_set_parent failed for clk i2c8, parent pll_aon (-22)
clk_set_parent failed for clk spi2, parent pll_aon (-22)
clk_set_parent failed for clk pwm4, parent pll_aon (-22)
clk_dt_late initialized
machine_check initialized
pm_post initialized
dbells initialized
avfs_clk_platform_post initialized
dmce initialized
cvc initialized
ccplex_avfs_hw_init: nafll_cluster0: not monitored
ccplex_avfs_hw_init: nafll_cluster2: not monitored
ccplex_avfs_hw_init: nafll_cluster3: not monitored
avfs_clk_mach_post initialized
regulator_post initialized
rm initialized
sc7_diag initialized
thermal_test initiaized
serial_late initialized
clk_post initialized
clk_dt_post initialized
mc_reg initialized
pg_post initialized
dyn_modules initialized
sku_debugfs initialized
speedo_debugfs initialized
adc_debugfs initialized
Failed to register PTO counter for id 281
Failed to register PTO counter for id 281
Failed to register PTO counter for id 281
Failed to register PTO counter for id 281
clk_debugfs initialized
emc_debugfs initialized
dvs_debugfs initialized
fmon_debugfs_init_one: no clock debugfs node to attach FMON_NAFLL_CLUSTER1
fmon_debugfs initialized
vmon_debugfs initialized
pg_debugfs initialized
profile_fs initialized
debugfs_cons initialized
mail_fs initialized
profile initialized
cvc_debugfs initialized
dmce_debugfs initialized
ec_debugfs initialized
rm_rail_debugfs_init: /rm/vdd_cpu: failed
rm_rail_debugfs_init: /rm/vdd_cpu: failed
rm_debugfs initialized
soctherm_debug initialized
gr_reader initialized
mods initialized
dt_fs initialized
debugfs_mrq initialized
debug_mrq initialized
debug_safereg initialized
initializing target
calling apps_init()
starting app shell
entering main console loop
] ��[0022.017] I> gpio framework initialized
[0022.203] I> tegrabl_gpio_driver_register: register 'nvidia,tegra194-gpio' driver
[0022.208] I> tegrabl_gpio_driver_register: register 'nvidia,tegra194-gpio-aon' driver
[0022.211] I> tegrabl_tca9539_init: i2c bus: 1, slave addr: 0x46
[0022.223] E> fetch_driver_phandle_from_dt: failed to get node with compatible ti,tca9539
[0022.229] E> fetch_driver_phandle_from_dt: failed to get node with compatible nxp,tca9539
[0022.233] W> tegrabl_tca9539_init: failed to fetch phandle from dt
[0022.239] I> tegrabl_tca9539_init: i2c bus: 1, slave addr: 0x44
[0022.249] E> fetch_driver_phandle_from_dt: failed to get node with compatible ti,tca9539
[0022.256] E> fetch_driver_phandle_from_dt: failed to get node with compatible nxp,tca9539
[0022.261] W> tegrabl_tca9539_init: failed to fetch phandle from dt
[0022.270] I> fixed regulator driver initialized
[0022.281] I> CPU: Nvidia Carmel
[0022.282] I> CPU: MIDR: 0x4e0f0040, MPIDR: 0x80000000
[0022.282] I> chip revision : A02P
[0022.282] I> Boot-device: QSPI
[0022.285] I> Boot_device: QSPI_FLASH instance: 0
[0022.290] I> QSPI source rate = 204000 Khz
[0022.294] I> Requested rate for QSPI clock = 34000 Khz
[0022.299] I> BPMP-set rate for QSPI clk = 34000 Khz
[0022.304] I> QSPI Flash Size = 32 MB
[0022.311] I> Qspi initialized successfully
[0022.312] I> qspi flash-0 params source = boot args
[0022.316] I> Found sdcard
[0022.321] I> enabling 'vdd-sdmmc1-sw' regulator
[0022.329] I> regulator 'vdd-sdmmc1-sw' already enabled
[0022.334] E> Error in command_complete 18001 int_status
[0022.334] E> Sending CMD_SD_SEND_IF_COND failed
[0022.347] W> Error opening sdcard-0
[0022.347] I> -0 params source = 
[0022.347] E> Failed to initialize device 6-0
[0022.348] E> Top caller module: SDMMC, error module: SDMMC, reason: 0x06, aux_info: 0x07
[0022.355] I> TBoot-CPU Recovery hang

Hi huy.dang,

It is weird that a dtb could cause flash failure but not boot failure.

Could you share your detail steps of how you build the dtb, copy dtb to where and with what commands to flash the board again?

Also, what is the size of the dtb file now?

Hi Wayne,

At first I thought like that. Changing the dtb should not have any effect to booting process. After had a deeper look into device tree file, I found the reason that cause issue:

Original device tree file tegra194-fixed-regulator-p3668.dtsi can boot successfully to OS

	p3668_vdd_sdmmc1_sw: regulator@106 {
		compatible = "regulator-fixed";
		reg = <106>;
		regulator-name = "vdd-sdmmc1-sw";
		regulator-min-microvolt = <3300000>;
		regulator-max-microvolt = <3300000>;
		gpio = <&tegra_main_gpio TEGRA194_MAIN_GPIO(G, 2) 0>;
		enable-active-high;
	};

After changed as below, board could not boot to OS and hung at bootloader.

	p3668_vdd_sdmmc1_sw: regulator@106 {
		compatible = "regulator-fixed";
		reg = <106>;
		regulator-name = "vdd-sdmmc1-sw";
		regulator-min-microvolt = <3300000>;
		regulator-max-microvolt = <3300000>;
		gpio = <&tegra_main_gpio TEGRA194_MAIN_GPIO(Q, 1) 0>;
		enable-active-high;
	};

In UART log we can see this error lines

[0022.321] I> enabling 'vdd-sdmmc1-sw' regulator
[0022.329] I> regulator 'vdd-sdmmc1-sw' already enabled
[0022.334] E> Error in command_complete 18001 int_status
[0022.334] E> Sending CMD_SD_SEND_IF_COND failed
[0022.347] W> Error opening sdcard-0
[0022.347] I> -0 params source = 

So I think dtb is always loaded and used at very first booting stage (cboot bootloader). After reverted back to original, the issue is gone.

Thank you so much for your support.

1 Like

Hi,

I think there is a statement that is not correct in your comment.

At first I thought like that. Changing the dtb should not have any effect to booting process.

Changing dtb will have effect to booting. But what we are talking about is flashing. These two are different.

Hi,
Sorry it was my typo: “Changing dtb should not have any effect to flashing process”.

Seems that bootloader loads new dtb before flashing it to sdcard.

Hi, Is there any update on this issue

Just a comment on this…

In the earlier days no DTB was used prior to U-Boot. In all of the (even semi-recent) releases the device tree is used in early boot stages, and passed along from one stage to the next. Some content of the tree which is passed on can be edited.

The Xavier (and I think also Xavier NX) does not use U-Boot, but early boot stages do access the device tree. Changing the device tree can have a major effect on ability to boot.

As for the flashing process itself, you would think that changing the dtb would not have any effect on the procedure. For the most part you are correct, but if your new device tree exceeds the partition size (there is more than one possible device tree destination…I don’t know if your tree is going into a signed partition or not), then flash itself could end in error.

Note that the size of your dtb, for cases where the content goes to a partition, must be smaller than the actual partition. This is because signing adds to space requirements. I do not know if your flash puts custom dtb content into a partition, someone else will have to answer that based on what you are changing and the particular release and flash command.

Hi @linuxdev,

Thanks for your clarifying. Checking the kernel_dtb & kernel_dtb_b partition size was the first thing I did when facing this issue. IMO this issue is not related to partition size exceeding problem.

As log file shows the procedure when flashing: before flashing new dtb, bootloader tries to read & take new dtb into account. So flashing process could end in error if dtb has booting issue.

Hi, it happened to me as well. I’m using the same carrier board and after many tries, I can’t get past this error when I use the devkit OSM. I tried this procedure on 3 different devkit OSMs and they all had the same result.
however, when I’m using the production OSM I can flash it and the dtb works as expected with the IMX477 camera.
did you find any solution to this problem?

Could you file a new topic and tag me there ? @lidor.shim