Hello,
I followed this tutorial: Jetson/TX2 Cloning - eLinux.org
System Information:
Jetpack 3.3
Host: Ubuntu 16.04, Laptop (not a VM)
Cloning the Jetson TX2 is not a problem. I don’t get any errors.
But when I try to flash the Image to another Jetson TX2 with the command:
$ sudo ./flash.sh -r -k APP jetson-tx2 mmcblk0p1
I get the following output:
###############################################################################
L4T BSP Information:
R28 (release), REVISION: 2.1, GCID: 11272647, BOARD: t186ref, EABI: aarch64,
DATE: Thu May 17 07:29:06 UTC 2018
###############################################################################
Target Board Information:
Name: jetson-tx2, Board Family: t186ref, SoC: Tegra 186,
OpMode: production, Boot Authentication: ,
###############################################################################
./tegraflash.py --chip 0x18 --applet “/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin” --cmd “dump eeprom boardinfo cvm.bin” --skipuid
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0014 ] Generating RCM messages
[ 0.0021 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 --download rcm /home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin 0 0
[ 0.0027 ] RCM 0 is saved as rcm_0.rcm
[ 0.0030 ] RCM 1 is saved as rcm_1.rcm
[ 0.0030 ] List of rcm files are saved in rcm_list.xml
[ 0.0030 ]
[ 0.0030 ] Signing RCM messages
[ 0.0036 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0043 ] Assuming zero filled SBK key
[ 0.0072 ]
[ 0.0072 ] Copying signature to RCM mesages
[ 0.0078 ] tegrarcm_v2 --chip 0x18 --updatesig rcm_list_signed.xml
[ 0.0087 ]
[ 0.0087 ] Boot Rom communication
[ 0.0093 ] tegrarcm_v2 --chip 0x18 --rcm rcm_list_signed.xml --skipuid
[ 0.0098 ] RCM version 0X180001
[ 0.0108 ] Boot Rom communication completed
[ 1.0178 ]
[ 1.0201 ] tegrarcm_v2 --isapplet
[ 1.0221 ] Applet version 01.00.0000
[ 1.0396 ]
[ 1.0419 ] Retrieving EEPROM data
[ 1.0421 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/cvm.bin
[ 1.0440 ] Applet version 01.00.0000
[ 1.0759 ] Saved platform info in /home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/cvm.bin
[ 1.1535 ]
copying bctfile(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg)… done.
copying misc_config(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)… done.
copying pinmux_config(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg)… done.
copying pmic_config(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg)… done.
copying pmc_config(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg)… done.
copying prod_config(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg)… done.
copying scr_config(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/minimal_scr.cfg)… done.
copying scr_cold_boot_config(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/mobile_scr.cfg)… done.
copying bootrom_config(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg)… done.
copying dev_params(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/t186ref/BCT/emmc.cfg)… done.
Existing bootloader(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
populating kernel to rootfs… done.
populating initrd to rootfs… done.
populating extlinux.conf.emmc to rootfs… done.
populating /home/ubuntu/64_TX2/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb to rootfs… done.
done.
Making Boot image… done.
Existing sosfile(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin) reused.
copying tegraboot(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/t186ref/nvtboot.bin)… done.
Existing mb2blfile(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
Existing mtspreboot(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/preboot_d15_prod_cr.bin) reused.
Existing mts(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/mce_mts_d15_prod_cr.bin) reused.
Existing mb1file(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/mb1_prod.bin) reused.
Existing bpffile(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/bpmp.bin) reused.
copying bpfdtbfile(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/t186ref/tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb)… done.
Existing scefile(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/camera-rtcpu-sce.bin) reused.
Existing spefile(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/spe.bin) reused.
copying wb0boot(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/t186ref/warmboot.bin)… done.
Existing tosfile(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/tos.img) reused.
Existing eksfile(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/eks.img) reused.
copying dtbfile(/home/ubuntu/64_TX2/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)… done.
Reusing existing system.img…
done.
Existing tbcfile(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/cboot.bin) reused.
copying tbcdtbfile(/home/ubuntu/64_TX2/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)… done.
copying cfgfile(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml… done.
Existing flasher(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing flashapp(/home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/tegraflash.py) reused.
*** Updating [APP] with system.img ***
./tegraflash.py --bl nvtboot_recovery_cpu.bin --chip 0x18 --applet mb1_recovery_prod.bin --sdram_config P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg --cfg flash.xml --bins “mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb; tlk tos.img; eks eks.img; bootloader_dtb tegra186-quill-p3310-1000-c03-00-base.dtb” --cmd “write APP system.img; reboot”
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0062 ] Generating RCM messages
[ 0.0069 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 --download rcm mb1_recovery_prod.bin 0 0
[ 0.0075 ] RCM 0 is saved as rcm_0.rcm
[ 0.0078 ] RCM 1 is saved as rcm_1.rcm
[ 0.0078 ] List of rcm files are saved in rcm_list.xml
[ 0.0078 ]
[ 0.0078 ] Signing RCM messages
[ 0.0085 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0092 ] Assuming zero filled SBK key
[ 0.0121 ]
[ 0.0121 ] Copying signature to RCM mesages
[ 0.0127 ] tegrarcm_v2 --chip 0x18 --updatesig rcm_list_signed.xml
[ 0.0137 ]
[ 0.0137 ] Boot Rom communication
[ 0.0144 ] tegrarcm_v2 --chip 0x18 --rcm rcm_list_signed.xml
[ 0.0151 ] BootRom is not running
[ 1.0215 ]
[ 1.0230 ] tegrarcm_v2 --isapplet
[ 1.0243 ] Applet version 01.00.0000
[ 1.0397 ]
[ 1.0414 ] tegrasign_v2 --key None --getmode mode.txt
[ 1.0429 ] Assuming zero filled SBK key
[ 1.0431 ]
[ 1.0432 ] Parsing partition layout
[ 1.0447 ] tegraparser_v2 --pt flash.xml.tmp
[ 1.0470 ]
[ 1.0471 ] Creating list of images to be signed
[ 1.0486 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[ 1.0679 ]
[ 1.0680 ] Generating signatures
[ 1.0689 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[ 1.0696 ] Assuming zero filled SBK key
[ 1.2957 ]
[ 1.2957 ] Reading BCT from device for further operations
[ 1.2957 ] Generating blob
[ 1.2966 ] tegrahost_v2 --align blob_nvtboot_recovery_cpu.bin
[ 1.2974 ]
[ 1.2982 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[ 1.2992 ]
[ 1.3000 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml
[ 1.3006 ] Assuming zero filled SBK key
[ 1.3055 ]
[ 1.3065 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[ 1.3074 ]
[ 1.3083 ] tegrahost_v2 --align blob_nvtboot_recovery.bin
[ 1.3090 ]
[ 1.3096 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[ 1.3105 ]
[ 1.3114 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml
[ 1.3120 ] Assuming zero filled SBK key
[ 1.3144 ]
[ 1.3154 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[ 1.3162 ]
[ 1.3170 ] tegrahost_v2 --align blob_preboot_d15_prod_cr.bin
[ 1.3177 ]
[ 1.3184 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[ 1.3193 ]
[ 1.3201 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml
[ 1.3208 ] Assuming zero filled SBK key
[ 1.3226 ]
[ 1.3235 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[ 1.3243 ]
[ 1.3251 ] tegrahost_v2 --align blob_mce_mts_d15_prod_cr.bin
[ 1.3258 ]
[ 1.3266 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[ 1.3306 ]
[ 1.3318 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml
[ 1.3326 ] Assuming zero filled SBK key
[ 1.3835 ]
[ 1.3846 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[ 1.3875 ]
[ 1.3884 ] tegrahost_v2 --align blob_bpmp.bin
[ 1.3891 ]
[ 1.3899 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk
[ 1.3914 ]
[ 1.3923 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml
[ 1.3929 ] Assuming zero filled SBK key
[ 1.4058 ]
[ 1.4067 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[ 1.4081 ]
[ 1.4089 ] tegrahost_v2 --align blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb
[ 1.4096 ]
[ 1.4103 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk
[ 1.4117 ]
[ 1.4124 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml
[ 1.4131 ] Assuming zero filled SBK key
[ 1.4239 ]
[ 1.4246 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[ 1.4260 ]
[ 1.4267 ] tegrahost_v2 --align blob_tos.img
[ 1.4275 ]
[ 1.4282 ] tegrahost_v2 --appendsigheader blob_tos.img zerosbk
[ 1.4290 ]
[ 1.4299 ] tegrasign_v2 --key None --list blob_tos_sigheader.img_list.xml
[ 1.4306 ] Assuming zero filled SBK key
[ 1.4324 ]
[ 1.4333 ] tegrahost_v2 --updatesigheader blob_tos_sigheader.img.encrypt blob_tos_sigheader.img.hash zerosbk
[ 1.4343 ]
[ 1.4353 ] tegrahost_v2 --align blob_eks.img
[ 1.4361 ]
[ 1.4367 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk
[ 1.4375 ]
[ 1.4384 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml
[ 1.4391 ] Assuming zero filled SBK key
[ 1.4392 ]
[ 1.4402 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[ 1.4409 ]
[ 1.4418 ] tegrahost_v2 --align blob_tegra186-quill-p3310-1000-c03-00-base.dtb
[ 1.4425 ]
[ 1.4432 ] tegrahost_v2 --appendsigheader blob_tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[ 1.4444 ]
[ 1.4453 ] tegrasign_v2 --key None --list blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml
[ 1.4460 ] Assuming zero filled SBK key
[ 1.4546 ]
[ 1.4554 ] tegrahost_v2 --updatesigheader blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[ 1.4566 ]
[ 1.4575 ] tegrahost_v2 --generateblob blob.xml blob.bin
[ 1.4582 ] number of images in blob are 9
[ 1.4584 ] blobsize is 3749384
[ 1.4585 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 190048
[ 1.4599 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 79600
[ 1.4601 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 63024
[ 1.4604 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2076832
[ 1.4610 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 529440
[ 1.4614 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt of size 466160
[ 1.4619 ] Added binary blob_tos_sigheader.img.encrypt of size 62976
[ 1.4621 ] Added binary blob_eks_sigheader.img.encrypt of size 1488
[ 1.4623 ] Added binary blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt of size 279664
[ 1.4635 ]
[ 1.4636 ] Sending bootloader and pre-requisite binaries
[ 1.4644 ] tegrarcm_v2 --download blob blob.bin
[ 1.4650 ] Applet version 01.00.0000
[ 1.4834 ] Sending blob
[ 1.4835 ] [… ] 027%
[ 1.4835 ] [… ] 055%
[ 1.4835 ] [… ] 083%
[ 1.4835 ] […] 100%
[ 2.3164 ]
[ 2.3176 ] tegrarcm_v2 --boot recovery
[ 2.3185 ] Applet version 01.00.0000
[ 2.3369 ]
[ 2.3381 ] tegrarcm_v2 --isapplet
[ 2.9930 ]
[ 2.9951 ] tegradevflash_v2 --iscpubl
[ 2.9969 ] CPU Bootloader is not running on device.
[ 2.9976 ]
[ 4.4700 ] Writing partition
[ 4.4716 ] tegradevflash_v2 --write APP /home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/system.img
[ 4.4733 ] Bootloader version 01.00.0000
[ 4.4917 ] Writing partition APP with /home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/system.img
[ 4.4929 ] 0000000000000004: Size is more than actual size
[ 4.5070 ]
[ 4.5070 ]
Error: Return value 4
Command tegradevflash_v2 --write APP /home/ubuntu/64_TX2/Linux_for_Tegra/bootloader/system.img
Failed to flash/read t186ref.
Does anyone understand this?
Please let me know if you need further information.