Flash stalls with bigger device tree

Hi,

I have a problem flashing device tree on TX2 and Xavier when the device tree file reached bigger size.
First, after adding a few sensor drivers I got error:

0000000000000004: Size is more than actual size

which was resolved by expanding TBCDTB-NAME, TBCDTB-NAME_b, BPFDTB-NAME, BPFDTB-NAME_b, KERNELDTB-NAME, KERNELDTB-NAME_b partitions in configuration file.

After adding more drivers flashing the dtree stalls on “tegrarcm_v2 --isapplet”

Log:

###############################################################################
# L4T BSP Information:
# R32 , REVISION: 2.0
###############################################################################
# Target Board Information:
# Name: jetson-tx2, Board Family: t186ref, SoC: Tegra 186, 
# OpMode: production, Boot Authentication: NS, 
###############################################################################
./tegraflash.py --chip 0x18 --applet "/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin" --skipuid --cmd "dump eeprom boardinfo cvm.bin" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0207 ] Generating RCM messages
[   0.0249 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm /opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin 0 0
[   0.0266 ] RCM 0 is saved as rcm_0.rcm
[   0.0268 ] RCM 1 is saved as rcm_1.rcm
[   0.0269 ] List of rcm files are saved in rcm_list.xml
[   0.0270 ] 
[   0.0271 ] Signing RCM messages
[   0.0322 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0346 ] Assuming zero filled SBK key
[   0.0425 ] 
[   0.0426 ] Copying signature to RCM mesages
[   0.0440 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[   0.0533 ] 
[   0.0533 ] Boot Rom communication
[   0.0552 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml --skipuid
[   0.0567 ] RCM version 0X180001
[   0.1479 ] Boot Rom communication completed
[   1.1837 ] 
[   2.1866 ] tegrarcm_v2 --isapplet
[   2.1883 ] USB communication failed.Check if device is in recovery
[   2.2953 ] 
[   2.2976 ] tegradevflash_v2 --iscpubl
[   2.3002 ] Cannot Open USB
[   2.4071 ] 
[   3.4101 ] tegrarcm_v2 --isapplet
[   3.4114 ] Applet version 01.00.0000
[   3.6195 ] 
[   3.6211 ] Retrieving EEPROM data
[   3.6212 ] tegrarcm_v2 --oem platformdetails eeprom cvm /opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/cvm.bin
[   3.6225 ] Applet version 01.00.0000
[   3.8158 ] Saved platform info in /opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/cvm.bin
[   4.0417 ] 
Board ID(3310) version(B00) sku(1000) revision(E.0)
copying bctfile(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/t186ref/BCT/P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg)... done.
copying misc_config(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)... done.
copying pinmux_config(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg)... done.
copying pmic_config(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-quill-p3310-1000-c03.cfg)... done.
copying pmc_config(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg)... done.
copying prod_config(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg)... done.
copying scr_config(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/t186ref/BCT/minimal_scr.cfg)... done.
copying scr_cold_boot_config(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/t186ref/BCT/mobile_scr.cfg)... done.
copying bootrom_config(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg)... done.
copying dev_params(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/t186ref/BCT/emmc.cfg)... done.
Existing bootloader(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
copying initrd(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/l4t_initrd.img)... done.
	populating kernel to rootfs... done.
	populating initrd to rootfs... done.
	populating /opt/JetPack_4.2.1/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb to rootfs... done.
Making Boot image... done.
Existing sosfile(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin) reused.
copying tegraboot(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/t186ref/nvtboot.bin)... done.
Existing cpu_bootloader(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
Existing mb2blfile(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
Existing mtspreboot(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/preboot_d15_prod_cr.bin) reused.
Existing mts(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/mce_mts_d15_prod_cr.bin) reused.
Existing mb1file(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/mb1_prod.bin) reused.
Existing bpffile(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/bpmp.bin) reused.
copying bpfdtbfile(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/t186ref/tegra186-a02-bpmp-quill-p3310-1000-c01-00-te770d-ucm2.dtb)... done.
Existing scefile(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused.
Existing spefile(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/spe.bin) reused.
Existing drameccfile(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/dram-ecc.bin) reused.
Existing badpagefile(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/badpage.bin) reused.
copying wb0boot(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/t186ref/warmboot.bin)... done.
Existing tosfile(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/tos-trusty.img) reused.
Existing eksfile(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/eks.img) reused.
copying dtbfile(/opt/JetPack_4.2.1/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)... done.
Copying nv_boot_control.conf to rootfs
Existing tbcfile(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/cboot.bin) reused.
copying tbcdtbfile(/opt/JetPack_4.2.1/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)... done.
copying cfgfile(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml... done.
Existing flasher(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing flashapp(/opt/JetPack_4.2.1/Linux_for_Tegra/bootloader/tegraflash.py) reused.
*** Updating [kernel-dtb] with tegra186-quill-p3310-1000-c03-00-base.dtb ***
./tegraflash.py --bl nvtboot_recovery_cpu.bin  --chip 0x18 --applet mb1_recovery_prod.bin --sdram_config P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c03.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg  --cfg  flash.xml --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c01-00-te770d-ucm2.dtb; tlk tos-trusty.img; eks eks.img; bootloader_dtb tegra186-quill-p3310-1000-c03-00-base.dtb"  --cmd "signwrite kernel-dtb tegra186-quill-p3310-1000-c03-00-base.dtb; reboot"  
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0235 ] tegrasign_v2 --key None --getmode mode.txt
[   0.0341 ] Assuming zero filled SBK key
[   0.0346 ] 
[   0.0348 ] sign_type   : 7566436
[   0.0348 ] header_magic: d00dfeed
[   0.0361 ] tegrahost_v2 --chip 0x18 --align 1_tegra186-quill-p3310-1000-c03-00-base.dtb
[   0.0377 ] 
[   0.0391 ] tegrahost_v2 --appendsigheader 1_tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[   0.0427 ] 
[   0.0446 ] tegrasign_v2 --key None --list 1_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml
[   0.0462 ] Assuming zero filled SBK key
[   0.0929 ] 
[   0.0952 ] tegrahost_v2 --updatesigheader 1_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt 1_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[   0.1228 ] 
[   0.1250 ] Generating RCM messages
[   0.1266 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[   0.1312 ] RCM 0 is saved as rcm_0.rcm
[   0.1314 ] RCM 1 is saved as rcm_1.rcm
[   0.1315 ] List of rcm files are saved in rcm_list.xml
[   0.1316 ] 
[   0.1317 ] Signing RCM messages
[   0.1335 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.1350 ] Assuming zero filled SBK key
[   0.1548 ] 
[   0.1550 ] Copying signature to RCM mesages
[   0.1672 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[   0.1696 ] 
[   0.1696 ] Boot Rom communication
[   0.1707 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[   0.1732 ] BootRom is not running
[   5.6063 ] 
[   6.6091 ] tegrarcm_v2 --isapplet
[   6.6103 ] Applet version 01.00.0000
[   7.0330 ] 
[   7.0348 ] tegrasign_v2 --key None --getmode mode.txt
[   7.0359 ] Assuming zero filled SBK key
[   7.0364 ] 
[   7.0367 ] Parsing partition layout
[   7.0381 ] tegraparser_v2 --pt flash.xml.tmp
[   7.0397 ] 
[   7.0398 ] Creating list of images to be signed
[   7.0420 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[   7.1389 ] 
[   7.1390 ] Generating signatures
[   7.1404 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[   7.1417 ] Assuming zero filled SBK key
[   7.6268 ] 
[   7.6268 ] Reading BCT from device for further operations
[   7.6269 ] Generating blob
[   7.6286 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin
[   7.6347 ] 
[   7.6360 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[   7.6388 ] 
[   7.6403 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml
[   7.6467 ] Assuming zero filled SBK key
[   7.6483 ] 
[   7.6506 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[   7.6592 ] 
[   7.6626 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin
[   7.6637 ] 
[   7.6650 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[   7.6708 ] 
[   7.6726 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml
[   7.6751 ] Assuming zero filled SBK key
[   7.6785 ] 
[   7.6802 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[   7.6820 ] 
[   7.6834 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin
[   7.6846 ] 
[   7.6881 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[   7.7002 ] 
[   7.7018 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml
[   7.7075 ] Assuming zero filled SBK key
[   7.7102 ] 
[   7.7118 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[   7.7134 ] 
[   7.7147 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin
[   7.7159 ] 
[   7.7197 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[   7.7271 ] 
[   7.7290 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml
[   7.7315 ] Assuming zero filled SBK key
[   7.8098 ] 
[   7.8120 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[   7.8284 ] 
[   7.8393 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin
[   7.8408 ] 
[   7.8429 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk
[   7.8478 ] 
[   7.8496 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml
[   7.8506 ] Assuming zero filled SBK key
[   7.8686 ] 
[   7.8711 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[   7.8835 ] 
[   7.8852 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-a02-bpmp-quill-p3310-1000-c01-00-te770d-ucm2.dtb
[   7.8947 ] 
[   7.8963 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c01-00-te770d-ucm2.dtb zerosbk
[   7.9107 ] 
[   7.9128 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-quill-p3310-1000-c01-00-te770d-ucm2_sigheader.dtb_list.xml
[   7.9153 ] Assuming zero filled SBK key
[   7.9346 ] 
[   7.9369 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c01-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-p3310-1000-c01-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[   7.9505 ] 
[   7.9524 ] tegrahost_v2 --chip 0x18 --align blob_tos-trusty.img
[   7.9667 ] 
[   7.9684 ] tegrahost_v2 --appendsigheader blob_tos-trusty.img zerosbk
[   7.9827 ] 
[   7.9847 ] tegrasign_v2 --key None --list blob_tos-trusty_sigheader.img_list.xml
[   7.9875 ] Assuming zero filled SBK key
[   8.0061 ] 
[   8.0084 ] tegrahost_v2 --updatesigheader blob_tos-trusty_sigheader.img.encrypt blob_tos-trusty_sigheader.img.hash zerosbk
[   8.0220 ] 
[   8.0238 ] tegrahost_v2 --chip 0x18 --align blob_eks.img
[   8.0347 ] 
[   8.0363 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk
[   8.0507 ] 
[   8.0527 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml
[   8.0542 ] Assuming zero filled SBK key
[   8.0668 ] 
[   8.0689 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[   8.0828 ] 
[   8.0847 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-quill-p3310-1000-c03-00-base.dtb
[   8.0970 ] 
[   8.0991 ] tegrahost_v2 --appendsigheader blob_tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[   8.1148 ] 
[   8.1168 ] tegrasign_v2 --key None --list blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml
[   8.1183 ] Assuming zero filled SBK key
[   8.1621 ] 
[   8.1643 ] tegrahost_v2 --updatesigheader blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[   8.1828 ] 
[   8.1848 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin
[   8.1863 ] number of images in blob are 9
[   8.1889 ] blobsize is 4826408
[   8.1891 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 203312
[   8.1988 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 89360
[   8.1997 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 63104
[   8.2014 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2082144
[   8.2065 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 533904
[   8.2106 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-c01-00-te770d-ucm2_sigheader.dtb.encrypt of size 466240
[   8.2180 ] Added binary blob_tos-trusty_sigheader.img.encrypt of size 313152
[   8.2184 ] Added binary blob_eks_sigheader.img.encrypt of size 1440
[   8.2185 ] Added binary blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt of size 1073600
[   8.2186 ] 
[   8.2188 ] Sending bootloader and pre-requisite binaries
[   8.2292 ] tegrarcm_v2 --download blob blob.bin
[   8.2306 ] Applet version 01.00.0000
[   8.4124 ] Sending blob
[   8.4126 ] [................................................] 100%
[  10.3261 ] 
[  10.3276 ] tegrarcm_v2 --boot recovery
[  10.3291 ] Applet version 01.00.0000
[  10.5789 ] 
[  11.5817 ] tegrarcm_v2 --isapplet

If I remove few sensors from dtree description and flash again, the procedure is successful.

compiled DTB_FILE tegra186-quill-p3310-100-a00-00-base.dtb 1MB (OK), 1.1MB (ERROR - with all added drivers) .

I’m on L4T-32.2, on L4T-28.2 I didn’t experience second problem, but on 28.2 full DTB_FILE is 950kB.

Is there some restriction on DTB_FILE, partition size, or something I could try to fix this problem?

Flash cmd:

sudo ./flash -k kernel-dtb jetson-tx2 mmcblk0p1

Thanks!

Hi d.kristofic,

I ran into a similar problem on Xavier with L4T-32.1. On my setup, flashing the device tree would fail if the .dtb file size exceeded 512 KB.

I found that the device tree was exceeding the size of the kernel-dtb partition, which is defined in the following file: Linux_for_Tegra/bootloader/t186ref/cfg/flash_t194_sdmmc.xml

The solution was to do the following:

  1. Increase the size of the kernel-dtb and kernel-dtb_b partitions in the .xml file listed above
  2. Reflash the entire board:
sudo ./flash.sh jetson-xavier mmcblk0p1

Hope that helps!

Mike

Hi Mike,

thank you for the suggestion.

I resized partitions in configuration files to 1MB for TX2 and Xavier, reflashed the system and it solved the first problem of the dtb size (dtb size < 512kB).

The second problem occurs when dtb file exceeds 1MB, and then flash process stalls as mentioned above.

I tried to resize TX2 partitions described above to 2MB but it doesn’t help with the flash stalling.

Now I am wondering if the partition size is restricted somewhere else, or there is something else I haven’t done.

Hi,

What flash command did you use after updating partition size? Please note that you have to do full flash (w/o “-k”) if you change the partition size.

I didn’t use “-k”, I flashed the system with:

sudo ./flash.sh jetson-tx2 mmcblk0p1

Here is the log of all mmcblk0 partition size, and you can see that all kernel-dtb sizes are 2.0 MiB.

nvidia@nvidia-desktop:~$ sudo gdisk -l /dev/mmcblk0
[sudo] password for nvidia: 
GPT fdisk (gdisk) version 1.0.3

Partition table scan:
  MBR: protective
  BSD: not present
  APM: not present
  GPT: present

Found valid GPT with protective MBR; using GPT.
Disk /dev/mmcblk0: 61071360 sectors, 29.1 GiB
Sector size (logical/physical): 512/512 bytes
Disk identifier (GUID): 00000000-0000-0000-0000-000000000000
Partition table holds up to 31 entries
Main partition table begins at sector 2 and ends at sector 9
First usable sector is 4104, last usable sector is 61071327
Partitions will be aligned on 8-sector boundaries
Total free space is 1 sectors (512 bytes)

Number  Start (sector)    End (sector)  Size       Code  Name
   1            4104        58724359   28.0 GiB    0700  APP
   2        58724360        58732551   4.0 MiB     0700  mts-bootpack
   3        58732552        58740743   4.0 MiB     0700  mts-bootpack_b
   4        58740744        58742791   1024.0 KiB  0700  cpu-bootloader
   5        58742792        58744839   1024.0 KiB  0700  cpu-bootloader_b
   6        58744840        58748935   2.0 MiB     0700  bootloader-dtb
   7        58748936        58753031   2.0 MiB     0700  bootloader-dtb_b
   8        58753032        58759175   3.0 MiB     0700  secure-os
   9        58759176        58765319   3.0 MiB     0700  secure-os_b
  10        58765320        58769415   2.0 MiB     0700  eks
  11        58769416        58777607   4.0 MiB     0700  adsp-fw
  12        58777608        58785799   4.0 MiB     0700  adsp-fw_b
  13        58785800        58787007   604.0 KiB   0700  bpmp-fw
  14        58787008        58788215   604.0 KiB   0700  bpmp-fw_b
  15        58788216        58792215   2.0 MiB     0700  bpmp-fw-dtb
  16        58792216        58796215   2.0 MiB     0700  bpmp-fw-dtb_b
  17        58796216        58800311   2.0 MiB     0700  sce-fw
  18        58800312        58804407   2.0 MiB     0700  sce-fw_b
  19        58804408        58816695   6.0 MiB     0700  sc7
  20        58816696        58828983   6.0 MiB     0700  sc7_b
  21        58828984        58833079   2.0 MiB     0700  FBNAME
  22        58833080        59095223   128.0 MiB   0700  BMP
  23        59095224        59357367   128.0 MiB   0700  BMP_b
  24        59357368        59422903   32.0 MiB    0700  SOS
  25        59422904        59488439   32.0 MiB    0700  SOS_b
  26        59488440        59619511   64.0 MiB    0700  kernel
  27        59619512        59750583   64.0 MiB    0700  kernel_b
  28        59750584        59754679   2.0 MiB     0700  kernel-dtb
  29        59754680        59758775   2.0 MiB     0700  kernel-dtb_b
  30        59758776        60283063   256.0 MiB   0700  CAC
  31        60283064        61071326   384.9 MiB   0700  UDA

Could you think off something I could try? Did you maybe try to flash the system with kernel dtb larger than 1MB?

Thanks!

Hi,

Could you share your dtb as an attachment here? We would like to test.

Attach the dtb from @d.kristofic
tegra186-quill-p3310-1000-a00-00-base.dtb.tar.gz (90.9 KB)

Hi d.kristofic,

I just checked and notice the bootloader has the size limitation of dtb as 1MiB.

Could you share what you’ve added in your device tree so that it exceeds 1MiB?

We added plugin-manager dtree support for 15 image sensors, for now.

Could you point me, where could I change the size limitation or is there some kind of workaround?

Thanks!

d.kristofic,

This may need to check with our internal team since 1MiB limit was a fix for some old bugs.

ok, please get back to me when you check with the team.

Hi,

Sorry that I think you might try to shrink your dtb size. The difficulties are:

  1. There is no rel-32.x cboot source released so it cannot be changed from source.

  2. The DTB partition has only 1 MiB size available. If you want to enlarge it, other partition needs to be adjusted too. It means you might hit some new problems on other partitions too…