Firmware installation to Jetson TX2 fails often

We are flashing the Jetson with our own firmware in our production environment but we have found that the firmware installation is not working in a robust manner. We have to flash some Jetsons even seven times before the firmware gets installed. We have tested this with several computers and we have changed the cabling and tried to rule out variables that could be causing this but without success.

When the problem occurs the firmware installation continues normally until following line [ 10.5099 ] Sending bct_bootrom
Then it gets stuck and reports a failure: [1813.592661] INFO: task tegrarcm_v2:6676 blocked for more than 120 seconds.

Is there anyone with similar problems? Is this caused by too long usb cabeling? What USB communication method is used during flashing? Why the USB cabeling is so delicate in this application?

Environment description:
Ubuntu 18.04.5 LTS
Dell Precision 3930 rack with Intel(R) Core™ i7-9700 CPU @ 3.00GHz
USB cable: 1m + 1m so we use two cables attached to each other (due to the mass connection interface of production tester)

Example log of failing firmware installation:

[   0.0010 ] Generating RCM messages
[  0.0016 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[  0.0021 ] RCM 0 is saved as rcm_0.rcm
[  0.0023 ] RCM 1 is saved as rcm_1.rcm
[  0.0023 ] List of rcm files are saved in rcm_list.xml
[  0.0023 ] 
[  0.0023 ] Signing RCM messages
[  0.0028 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[  0.0032 ] Assuming zero filled SBK key
[  0.0053 ] 
[  0.0053 ] Copying signature to RCM mesages
[  0.0058 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[  0.0064 ] 
[  0.0065 ] Boot Rom communication
[  0.0069 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[  0.0074 ] BR_CID: 0x81801001645cc402100000000f060340
[  0.0079 ] RCM version 0X180001
[  0.0223 ] Boot Rom communication completed
[  1.0302 ] 
[  2.0342 ] tegrarcm_v2 --isapplet
[  2.0367 ] Applet version 01.00.0000
[  2.0400 ] 
[  2.0425 ] Retrieving EEPROM data
[  2.0428 ] tegrarcm_v2 --oem platformdetails eeprom cvm /tmp/tmp.RTIDFhkuIK/cvm.bin.VQ8RF
[  2.0451 ] Applet version 01.00.0000
[  2.0805 ] Saved platform info in /tmp/tmp.RTIDFhkuIK/cvm.bin.VQ8RF
[  2.1545 ] 
 
Welcome to Tegra Flash
 
version 1.0.0
 
Type ? or help for help and q or quit to exit
 
Use ! to execute system commands
[  0.0005 ] tegrasign_v2 --key None --getmode mode.txt
[  0.0010 ] Assuming zero filled SBK key
[  0.0010 ] 
[  0.0010 ] Generating RCM messages
[  0.0014 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[  0.0018 ] RCM 0 is saved as rcm_0.rcm
[  0.0020 ] RCM 1 is saved as rcm_1.rcm
[  0.0020 ] List of rcm files are saved in rcm_list.xml
[  0.0020 ] 
[  0.0020 ] Signing RCM messages
[  0.0025 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[  0.0029 ] Assuming zero filled SBK key
[  0.0049 ] 
[  0.0050 ] Copying signature to RCM mesages
[  0.0054 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[  0.0060 ] 
[  0.0061 ] Parsing partition layout
[  0.0065 ] tegraparser_v2 --pt flash.xml.tmp
[  0.0073 ] 
[  0.0073 ] Creating list of images to be signed
[  0.0077 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[  0.0275 ] 
[  0.0275 ] Generating signatures
[  0.0281 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[  0.0286 ] Assuming zero filled SBK key
[  0.1995 ] 
[  0.1996 ] Generating br-bct
[  0.2001 ] Updating dev and MSS params in BR BCT
[  0.2001 ] tegrabct_v2 --dev_param emmc.cfg --sdram vision-tx2.cfg --brbct br_bct.cfg --chip 0x18 0
[  0.2137 ] 
[  0.2137 ] Updating bl info
[  0.2142 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[  0.2151 ] 
[  0.2152 ] Updating smd info
[  0.2156 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[  0.2162 ] 
[  0.2162 ] Updating Odmdata
[  0.2167 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x1090000
[  0.2173 ] 
[  0.2173 ] Get Signed section of bct
[  0.2177 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[  0.2183 ] 
[  0.2188 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key
[  0.2192 ] Assuming zero filled SBK key
[  0.2193 ] 
[  0.2193 ] Updating BCT with signature
[  0.2198 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml
[  0.2204 ] 
[  0.2205 ] Generating coldboot mb1-bct
[  0.2209 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram vision-tx2.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[  0.2214 ] MB1-BCT version: 0xf
[  0.2214 ] Packing sdram param for instance[0]
[  0.2347 ] Packing sdram param for instance[1]
[  0.2348 ] Packing sdram param for instance[2]
[  0.2349 ] Packing sdram param for instance[3]
[  0.2349 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg 
[  0.2351 ] Appending platform config data of size :- 3048
[  0.2352 ] Parsing config file :mobile_scr.cfg 
[  0.2353 ] Appending platform config data of size :- 12240
[  0.2360 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg 
[  0.2362 ] Appending platform config data of size :- 24
[  0.2362 ] 
[  0.2362 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg 
[  0.2362 ] Appending platform config data of size :- 648
[  0.2362 ] 
[  0.2362 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg 
[  0.2362 ] Appending platform config data of size :- 64
[  0.2362 ] 
[  0.2362 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg 
[  0.2362 ] Appending platform config data of size :- 1628
[  0.2362 ] 
[  0.2362 ] Updating mb1-bct with firmware information
[  0.2366 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[  0.2371 ] MB1-BCT version: 0xf
[  4.2658 ] 
[  4.2659 ] Updating mb1-bct with storage information
[  4.2683 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[  4.2706 ] MB1-BCT version: 0xf
[  4.2733 ] 
[  4.2757 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[  4.2780 ] 
[  4.2804 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[  4.2832 ] 
[  4.2864 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml
[  4.2886 ] Assuming zero filled SBK key
[  4.2931 ] 
[  4.2937 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[  4.2943 ] 
[  4.2943 ] Generating recovery mb1-bct
[  4.2948 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram vision-tx2.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[  4.2953 ] MB1-BCT version: 0xf
[  4.2953 ] Packing sdram param for instance[0]
[  4.3089 ] Packing sdram param for instance[1]
[  4.3089 ] Packing sdram param for instance[2]
[  4.3090 ] Packing sdram param for instance[3]
[  4.3091 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg 
[  4.3092 ] Appending platform config data of size :- 3048
[  4.3093 ] Parsing config file :minimal_scr.cfg 
[  4.3094 ] Appending platform config data of size :- 12240
[  4.3102 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg 
[  4.3103 ] Appending platform config data of size :- 24
[  4.3103 ] 
[  4.3103 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg 
[  4.3103 ] Appending platform config data of size :- 648
[  4.3104 ] 
[  4.3104 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg 
[  4.3104 ] Appending platform config data of size :- 64
[  4.3104 ] 
[  4.3104 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg 
[  4.3104 ] Appending platform config data of size :- 1628
[  4.3104 ] 
[  4.3104 ] Updating mb1-bct with firmware information
[  4.3108 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[  4.3112 ] MB1-BCT version: 0xf
[  4.3116 ] 
[  4.3116 ] Updating mb1-bct with storage information
[  4.3120 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[  4.3124 ] MB1-BCT version: 0xf
[  4.3127 ] 
[  4.3132 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[  4.3136 ] 
[  4.3141 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk
[  4.3146 ] 
[  4.3152 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml
[  4.3156 ] Assuming zero filled SBK key
[  4.3165 ] 
[  4.3171 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[  4.3176 ] 
[  4.3177 ] Copying signatures
[  4.3181 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[  4.3481 ] 
[  4.3481 ] Boot Rom communication
[  4.3487 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[  4.3491 ] BootRom is not running
[  9.4513 ] 
[ 10.4552 ] tegrarcm_v2 --isapplet
[ 10.4576 ] Applet version 01.00.0000
[ 10.4733 ] 
[ 10.4734 ] Sending BCTs
[ 10.4758 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[ 10.4780 ] Applet version 01.00.0000
**[ 10.5099 ] Sending bct_bootrom**
**[1813.592661] INFO: task tegrarcm_v2:6676 blocked for more than 120 seconds.**
[1813.677748]       Tainted: G             L    5.4.0-67-generic #75~18.04.1-Ubuntu
[1813.770390] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[1934.424644] INFO: task tegrarcm_v2:6676 blocked for more than 241 seconds.
[1934.509717]       Tainted: G             L    5.4.0-67-generic #75~18.04.1-Ubuntu
[1934.602321] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[2055.256522] INFO: task tegrarcm_v2:6676 blocked for more than 362 seconds.
[2055.341598]       Tainted: G             L    5.4.0-67-generic #75~18.04.1-Ubuntu
[2055.434205] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[2176.088652] INFO: task tegrarcm_v2:6676 blocked for more than 483 seconds.
[2176.173729]       Tainted: G             L    5.4.0-67-generic #75~18.04.1-Ubuntu
[2176.266338] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[2296.920653] INFO: task tegrarcm_v2:6676 blocked for more than 604 seconds.
[2297.005724]       Tainted: G             L    5.4.0-67-generic #75~18.04.1-Ubuntu
[2297.098335] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

Working example log:

[   0.0010 ] Generating RCM messages
[   0.0016 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[   0.0020 ] RCM 0 is saved as rcm_0.rcm
[   0.0023 ] RCM 1 is saved as rcm_1.rcm
[   0.0023 ] List of rcm files are saved in rcm_list.xml
[   0.0023 ][   0.0023 ] Signing RCM messages
[   0.0028 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0032 ] Assuming zero filled SBK key
[   0.0053 ][   0.0053 ] Copying signature to RCM mesages
[   0.0058 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[   0.0064 ][   0.0065 ] Boot Rom communication
[   0.0069 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[   0.0074 ] BR_CID: 0x81801001647d02822400000011038480
[   0.0079 ] RCM version 0X180001
[   0.0251 ] Boot Rom communication completed
[   1.0322 ][   2.0360 ] tegrarcm_v2 --isapplet
[   2.0383 ] Applet version 01.00.0000
[   2.0550 ][   2.0556 ] Retrieving EEPROM data
[   2.0556 ] tegrarcm_v2 --oem platformdetails eeprom cvm /tmp/tmp.BB6SX5H4y2/cvm.bin.WpXfO
[   2.0561 ] Applet version 01.00.0000
[   2.0907 ] Saved platform info in /tmp/tmp.BB6SX5H4y2/cvm.bin.WpXfO
[   2.1645 ] 
 
Welcome to Tegra Flash
 
version 1.0.0
 
Type ? or help for help and q or quit to exit
 
Use ! to execute system commands
[   0.0005 ] tegrasign_v2 --key None --getmode mode.txt
[   0.0010 ] Assuming zero filled SBK key
[   0.0010 ][   0.0010 ] Generating RCM messages
[   0.0015 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[   0.0019 ] RCM 0 is saved as rcm_0.rcm
[   0.0021 ] RCM 1 is saved as rcm_1.rcm
[   0.0021 ] List of rcm files are saved in rcm_list.xml
[   0.0021 ][   0.0021 ] Signing RCM messages
[   0.0026 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0030 ] Assuming zero filled SBK key
[   0.0051 ][   0.0051 ] Copying signature to RCM mesages
[   0.0055 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[   0.0063 ][   0.0063 ] Parsing partition layout
[   0.0067 ] tegraparser_v2 --pt flash.xml.tmp
[   0.0075 ][   0.0075 ] Creating list of images to be signed
[   0.0079 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[   0.0242 ][   0.0242 ] Generating signatures
[   0.0248 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[   0.0252 ] Assuming zero filled SBK key
[   0.2000 ][   0.2000 ] Generating br-bct
[   0.2005 ] Updating dev and MSS params in BR BCT
[   0.2005 ] tegrabct_v2 --dev_param emmc.cfg --sdram vision-tx2.cfg --brbct br_bct.cfg --chip 0x18 0
[   0.2142 ][   0.2142 ] Updating bl info
[   0.2147 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   0.2157 ][   0.2157 ] Updating smd info
[   0.2161 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[   0.2168 ][   0.2168 ] Updating Odmdata
[   0.2172 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x1090000
[   0.2178 ][   0.2178 ] Get Signed section of bct
[   0.2183 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[   0.2189 ][   0.2193 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key
[   0.2198 ] Assuming zero filled SBK key
[   0.2199 ][   0.2199 ] Updating BCT with signature
[   0.2203 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml
[   0.2210 ][   0.2210 ] Generating coldboot mb1-bct
[   0.2215 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram vision-tx2.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[   0.2219 ] MB1-BCT version: 0xf
[   0.2220 ] Packing sdram param for instance[0]
[   0.2353 ] Packing sdram param for instance[1]
[   0.2354 ] Packing sdram param for instance[2]
[   0.2354 ] Packing sdram param for instance[3]
[   0.2355 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg[   0.2356 ] Appending platform config data of size :- 3048
[   0.2357 ] Parsing config file :mobile_scr.cfg[   0.2358 ] Appending platform config data of size :- 12240
[   0.2366 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg[   0.2367 ] Appending platform config data of size :- 24
[   0.2367 ][   0.2367 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg[   0.2367 ] Appending platform config data of size :- 648
[   0.2367 ][   0.2367 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg[   0.2367 ] Appending platform config data of size :- 64
[   0.2367 ][   0.2367 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg[   0.2367 ] Appending platform config data of size :- 1628
[   0.2367 ][   0.2368 ] Updating mb1-bct with firmware information
[   0.2372 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[   0.2377 ] MB1-BCT version: 0xf
[   4.2528 ][   4.2529 ] Updating mb1-bct with storage information
[   4.2554 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   4.2577 ] MB1-BCT version: 0xf
[   4.2596 ][   4.2620 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[   4.2645 ][   4.2669 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[   4.2697 ][   4.2730 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml
[   4.2752 ] Assuming zero filled SBK key
[   4.2796 ][   4.2802 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[   4.2808 ][   4.2808 ] Generating recovery mb1-bct
[   4.2813 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram vision-tx2.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[   4.2817 ] MB1-BCT version: 0xf
[   4.2818 ] Packing sdram param for instance[0]
[   4.2954 ] Packing sdram param for instance[1]
[   4.2955 ] Packing sdram param for instance[2]
[   4.2956 ] Packing sdram param for instance[3]
[   4.2956 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg[   4.2958 ] Appending platform config data of size :- 3048
[   4.2959 ] Parsing config file :minimal_scr.cfg[   4.2960 ] Appending platform config data of size :- 12240
[   4.2968 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg[   4.2969 ] Appending platform config data of size :- 24
[   4.2969 ][   4.2969 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg[   4.2969 ] Appending platform config data of size :- 648
[   4.2969 ][   4.2969 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg[   4.2969 ] Appending platform config data of size :- 64
[   4.2969 ][   4.2969 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg[   4.2969 ] Appending platform config data of size :- 1628
[   4.2969 ][   4.2969 ] Updating mb1-bct with firmware information
[   4.2973 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[   4.2978 ] MB1-BCT version: 0xf
[   4.2982 ][   4.2982 ] Updating mb1-bct with storage information
[   4.2986 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   4.2991 ] MB1-BCT version: 0xf
[   4.2994 ][   4.2998 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[   4.3003 ][   4.3008 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk
[   4.3013 ][   4.3019 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml
[   4.3024 ] Assuming zero filled SBK key
[   4.3033 ][   4.3039 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[   4.3044 ][   4.3045 ] Copying signatures
[   4.3049 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   4.3352 ][   4.3352 ] Boot Rom communication
[   4.3359 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[   4.3366 ] BootRom is not running
[   9.4949 ][  10.4989 ] tegrarcm_v2 --isapplet
[  10.5011 ] Applet version 01.00.0000
[  10.5174 ][  10.5175 ] Sending BCTs
[  10.5198 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[  10.5219 ] Applet version 01.00.0000
[  10.5537 ] Sending bct_bootrom
[  10.5541 ] [................................................] 100%
[  10.5552 ] Sending bct_mb1
[  10.5561 ] [................................................] 100%
[  10.5728 ][  10.5729 ] Generating blob
[  10.5756 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin
[  10.5780 ][  10.5803 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[  10.5838 ][  10.5869 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml
[  10.5891 ] Assuming zero filled SBK key
[  10.5961 ][  10.5967 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[  10.5974 ][  10.5979 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin
[  10.5984 ][  10.5989 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[  10.5994 ][  10.6000 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml
[  10.6004 ] Assuming zero filled SBK key
[  10.6020 ][  10.6026 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[  10.6032 ][  10.6037 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin
[  10.6041 ][  10.6046 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[  10.6051 ][  10.6057 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml
[  10.6062 ] Assuming zero filled SBK key
[  10.6073 ][  10.6079 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[  10.6085 ][  10.6090 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin
[  10.6094 ][  10.6099 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[  10.6122 ][  10.6128 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml
[  10.6133 ] Assuming zero filled SBK key
[  10.6483 ][  10.6489 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[  10.6507 ][  10.6513 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin
[  10.6517 ][  10.6522 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk
[  10.6531 ][  10.6537 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml
[  10.6541 ] Assuming zero filled SBK key
[  10.6631 ][  10.6637 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[  10.6645 ][  10.6650 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb
[  10.6655 ][  10.6660 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk
[  10.6669 ][  10.6675 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml
[  10.6679 ] Assuming zero filled SBK key
[  10.6757 ][  10.6764 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[  10.6772 ][  10.6778 ] tegrahost_v2 --chip 0x18 --align blob_tos-mon-only.img
[  10.6783 ][  10.6788 ] tegrahost_v2 --appendsigheader blob_tos-mon-only.img zerosbk
[  10.6793 ][  10.6800 ] tegrasign_v2 --key None --list blob_tos-mon-only_sigheader.img_list.xml
[  10.6804 ] Assuming zero filled SBK key
[  10.6821 ][  10.6828 ] tegrahost_v2 --updatesigheader blob_tos-mon-only_sigheader.img.encrypt blob_tos-mon-only_sigheader.img.hash zerosbk
[  10.6834 ][  10.6840 ] tegrahost_v2 --chip 0x18 --align blob_eks.img
[  10.6845 ][  10.6850 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk
[  10.6855 ][  10.6862 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml
[  10.6867 ] Assuming zero filled SBK key
[  10.6868 ][  10.6876 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[  14.7872 ][  14.7899 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-quill-p3310-1000-c03-00-base.dtb
[  14.7924 ][  14.7948 ] tegrahost_v2 --appendsigheader blob_tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[  14.7985 ][  14.8017 ] tegrasign_v2 --key None --list blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml
[  14.8040 ] Assuming zero filled SBK key
[  14.8109 ][  14.8115 ] tegrahost_v2 --updatesigheader blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[  14.8122 ][  14.8128 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin
[  14.8133 ] number of images in blob are 9
[  14.8134 ] blobsize is 3768904
[  14.8134 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 202832
[  14.8143 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 89184
[  14.8145 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 63104
[  14.8146 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2082144
[  14.8151 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 533056
[  14.8153 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt of size 466240
[  14.8156 ] Added binary blob_tos-mon-only_sigheader.img.encrypt of size 83760
[  14.8157 ] Added binary blob_eks_sigheader.img.encrypt of size 1440
[  14.8158 ] Added binary blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt of size 246992
[  14.8166 ][  14.8167 ] Sending bootloader and pre-requisite binaries
[  14.8172 ] tegrarcm_v2 --download blob blob.bin
[  14.8176 ] Applet version 01.00.0000
[  14.8330 ] Sending blob
[  14.8331 ] [.............                                   ] 027%
[  14.8331 ] [...........................                     ] 055%
[  14.8331 ] [.........................................       ] 083%
[  14.8331 ] [................................................] 100%
[  15.2716 ][  15.2741 ] tegrarcm_v2 --boot recovery
[  15.2764 ] Applet version 01.00.0000
[  15.2944 ][  16.2983 ] tegrarcm_v2 --isapplet
[  16.3158 ][  16.3184 ] tegradevflash_v2 --iscpubl
[  16.3207 ] CPU Bootloader is not running on device.
[  16.3353 ][  17.3392 ] tegrarcm_v2 --isapplet
[  17.3614 ][  17.3619 ] tegradevflash_v2 --iscpubl
[  17.3624 ] Bootloader version 01.00.0000
[  17.3803 ] Bootloader version 01.00.0000
[  17.3816 ][  17.3816 ] Retrieving storage infomation
[  17.3821 ] tegrarcm_v2 --oem platformdetails storage storage_info.bin
[  17.3826 ] Applet is not running on device. Continue with Bootloader
[  17.4176 ][  17.4181 ] tegradevflash_v2 --oem platformdetails storage storage_info.bin
[  17.4186 ] Bootloader version 01.00.0000
[  17.4367 ] Saved platform info in storage_info.bin
[  17.4416 ][  17.4416 ] Flashing the device
[  17.4421 ] tegraparser_v2 --storageinfo storage_info.bin --generategpt --pt flash.xml.bin
[  17.4428 ][  17.4432 ] tegradevflash_v2 --pt flash.xml.bin --create
[  17.4437 ] Bootloader version 01.00.0000
[  17.4603 ] Erasing sdmmc_boot: 3 ......... [Done]
[  17.4744 ] Writing partition secondary_gpt with gpt_secondary_0_3.bin
[  17.4751 ] [................................................] 100%
 
[  17.4879 ] Erasing sdmmc_user: 3 ......... [Done]
[  18.1834 ] Writing partition master_boot_record with mbr_1_3.bin
[  18.1841 ] [................................................] 100%
[  18.1880 ] Writing partition primary_gpt with gpt_primary_1_3.bin
[  18.1898 ] [................................................] 100%
[  18.1942 ] Writing partition secondary_gpt with gpt_secondary_1_3.bin
[  18.2076 ] [................................................] 100%
 
[  18.2200 ] Writing partition mb1 with mb1_prod.bin.encrypt
[  18.2206 ] [................................................] 100%
[  18.2278 ] Writing partition mb1_b with mb1_prod.bin.encrypt
[  18.2336 ] [................................................] 100%
[  18.2407 ] Writing partition dram-ecc-fw with dram-ecc_sigheader.bin.encrypt
[  18.2454 ] [................................................] 100%
[  18.2516 ] Writing partition badpage-fw with badpage_sigheader.bin.encrypt
[  18.2567 ] [................................................] 100%
[  18.2614 ] Writing partition badpage-fw_b with badpage_sigheader.bin.encrypt
[  18.2655 ] [................................................] 100%
[  18.2704 ] Writing partition spe-fw with spe_sigheader.bin.encrypt
[  18.2737 ] [................................................] 100%
[  18.2807 ] Writing partition spe-fw_b with spe_sigheader.bin.encrypt
[  18.2867 ] [................................................] 100%
[  18.2938 ] Writing partition mb2 with nvtboot_sigheader.bin.encrypt
[  18.2997 ] [................................................] 100%
[  18.3068 ] Writing partition mb2_b with nvtboot_sigheader.bin.encrypt
[  18.3125 ] [................................................] 100%
[  18.3199 ] Writing partition mts-preboot with preboot_d15_prod_cr_sigheader.bin.encrypt
[  18.3257 ] [................................................] 100%
[  18.3323 ] Writing partition mts-preboot_b with preboot_d15_prod_cr_sigheader.bin.encrypt
[  18.3381 ] [................................................] 100%
[  18.3447 ] Writing partition SMD with slot_metadata.bin
[  18.3502 ] [................................................] 100%
[  18.3545 ] Writing partition SMD_b with slot_metadata.bin
[  18.3564 ] [................................................] 100%
[  18.3608 ] Writing partition master_boot_record with mbr_1_3.bin
[  18.3628 ] [................................................] 100%
[  18.3668 ] Writing partition APP with core-image-vision.img
[  18.3687 ] [                                                ] 000%

And so on…

hello lauri.anttila,

is this based-on the virtual machine? it sometimes the usb port forwarding issue with VMs.

is this based-on the virtual machine? it sometimes the usb port forwarding issue with VMs.

No. This is not based on a virtual machine. The PC has a native Ubuntu installed.

hello lauri.anttila,

please clarify what did “1m+1m” you’ve mentioned here, thanks

We have one 1 meter cable coming from PC USB port to mass connection interface and when test fixture is attached the second 1 meter cable gets connected to it and the second cable connects to Jetson via carrier board micro usb connector. So in total 1 meter + 1 meter cable.

When this cabeling method is used the firmware flashing script hangs at [ 10.5099 ] Sending bct_bootrom and after a long wait period comes back with a following line [1813.592661] INFO: task tegrarcm_v2:6676 blocked for more than 120 seconds until it quits as the first log example shows. It remains unclear that what happens during this Sending bct_bootrom step and what could be causing it to fail? Should there be better error handling in communication for corrupted messages if the 1m+1m cabeling is causing this? Why some boards success all the time but some need 7 firmware installation times before the firmware installation is PASS?

hello lauri.anttila,

could you please also confirm you’re able to flash a target without issues by connected to the flash machine (i.e. x86 host) directly?
this looks like flashing issue through USB Hub. it’s also usb port forwarding issue.

Hi!

Our firmware development team uses short (<1m) USB cables without extension cables and they are able to do the flashing without problems. Is the USB so delicate in this application that short cable is needed to be used?

hello lauri.anttila,

the issue is related to extension cables, it should be workable by having single device connection with a 1.5m USB cable, because I’m using that all the time and don’t see such failure.

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.