Flash the emmc nano with errors at L4T 32.5

hello, We flash the emmc nano with R32.4 system,it’s ok;But now we change to the R32.5 system, the device can not be flashed! it stopped at “tegrarcm --download bct P3448_A00_lpddr4_204Mhz_P987.bct”, and the uart log also has some errors;

###############################################################################

L4T BSP Information:

R32 , REVISION: 5.0

###############################################################################

Target Board Information:

Name: jetson-nano-devkit-emmc, Board Family: t210ref, SoC: Tegra 210,

OpMode: production, Boot Authentication: ,

Disk encryption: disabled ,

###############################################################################
./tegraflash.py --chip 0x21 --applet “/home/h/jetson32.5/Linux_for_Tegra/bootloader/nvtboot_recovery.bin” --skipuid --cmd “dump eeprom boardinfo cvm.bin”
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0020 ] Generating RCM messages
[ 0.0028 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm /home/h/jetson32.5/Linux_for_Tegra/bootloader/nvtboot_recovery.bin 0 0
[ 0.0038 ] RCM 0 is saved as rcm_0.rcm
[ 0.0058 ] RCM 1 is saved as rcm_1.rcm
[ 0.0058 ] List of rcm files are saved in rcm_list.xml
[ 0.0058 ]
[ 0.0058 ] Signing RCM messages
[ 0.0075 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0088 ] Assuming zero filled SBK key
[ 0.0138 ]
[ 0.0138 ] Copying signature to RCM mesages
[ 0.0147 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml
[ 0.0177 ]
[ 0.0178 ] Boot Rom communication
[ 0.0187 ] tegrarcm --chip 0x21 0 --rcm rcm_list_signed.xml --skipuid
[ 0.0194 ] RCM version 0X210001
[ 0.0632 ] Boot Rom communication completed
[ 1.0755 ]
[ 1.0755 ] dump EEPROM info
[ 1.0766 ] tegrarcm --oem platformdetails eeprom /home/h/jetson32.5/Linux_for_Tegra/bootloader/cvm.bin
[ 1.0775 ] Applet version 00.01.0000
[ 1.0817 ] Saved platform info in /home/h/jetson32.5/Linux_for_Tegra/bootloader/cvm.bin
[ 1.1604 ]
[ 1.1614 ] tegrarcm --reboot recovery
[ 1.1621 ] Applet version 00.01.0000
[ 1.1674 ]
Board ID() version()
copying bctfile(/home/h/jetson32.5/Linux_for_Tegra/bootloader/t210ref/BCT/P3448_A00_lpddr4_204Mhz_P987.cfg)… done.
copying bootloader(/home/h/jetson32.5/Linux_for_Tegra/bootloader/t210ref/cboot.bin)… done.
copying initrd(/home/h/jetson32.5/Linux_for_Tegra/bootloader/l4t_initrd.img)… done.
populating kernel to rootfs… done.
populating initrd to rootfs… done.
populating /home/h/jetson32.5/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0000-p3449-0000-a00.dtb to rootfs… done.
Making Boot image… done.
Existing sosfile(/home/h/jetson32.5/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
copying tegraboot(/home/h/jetson32.5/Linux_for_Tegra/bootloader/t210ref/nvtboot.bin)… done.
copying cpu_bootloader(/home/h/jetson32.5/Linux_for_Tegra/bootloader/t210ref/cboot.bin)… done.
copying bpffile(/home/h/jetson32.5/Linux_for_Tegra/bootloader/t210ref/sc7entry-firmware.bin)… done.
Existing badpagefile(/home/h/jetson32.5/Linux_for_Tegra/bootloader/badpage.bin) reused.
copying wb0boot(/home/h/jetson32.5/Linux_for_Tegra/bootloader/t210ref/warmboot.bin)… done.
Existing tosfile(/home/h/jetson32.5/Linux_for_Tegra/bootloader/tos-mon-only.img) reused.
Existing eksfile(/home/h/jetson32.5/Linux_for_Tegra/bootloader/eks.img) reused.
copying dtbfile(/home/h/jetson32.5/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0000-p3449-0000-a00.dtb)… done.
Copying nv_boot_control.conf to rootfs
Making system.img…
populating rootfs from /home/h/jetson32.5/Linux_for_Tegra/rootfs … done.
populating /boot/extlinux/extlinux.conf … done.
Sync’ing system.img … done.
Converting RAW image to Sparse image… done.
system.img built successfully.
Existing tbcfile(/home/h/jetson32.5/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
copying tbcdtbfile(/home/h/jetson32.5/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0000-p3449-0000-a00.dtb)… done.
copying cfgfile(/home/h/jetson32.5/Linux_for_Tegra/bootloader/t210ref/cfg/flash_l4t_t210_emmc_p3448.xml) to flash.xml… done.
copying flasher(/home/h/jetson32.5/Linux_for_Tegra/bootloader/t210ref/cboot.bin)… done.
Existing flashapp(/home/h/jetson32.5/Linux_for_Tegra/bootloader/tegraflash.py) reused.
./tegraflash.py --bl cboot.bin --bct P3448_A00_lpddr4_204Mhz_P987.cfg --odmdata 0xa4000 --bldtb kernel_tegra210-p3448-0000-p3449-0000-a00.dtb --applet nvtboot_recovery.bin --cmd “flash; reboot” --cfg flash.xml --chip 0x21 --bins “EBT cboot.bin; DTB tegra210-p3448-0000-p3449-0000-a00.dtb”
saving flash command in /home/h/jetson32.5/Linux_for_Tegra/bootloader/flashcmd.txt
saving Windows flash command to /home/h/jetson32.5/Linux_for_Tegra/bootloader/flash_win.bat
*** Flashing target device started. ***
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0015 ] tegrasign --key None --getmode mode.txt
[ 0.0025 ] Assuming zero filled SBK key
[ 0.0044 ]
[ 0.0046 ] Generating RCM messages
[ 0.0063 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm nvtboot_recovery.bin 0 0
[ 0.0071 ] RCM 0 is saved as rcm_0.rcm
[ 0.0089 ] RCM 1 is saved as rcm_1.rcm
[ 0.0089 ] List of rcm files are saved in rcm_list.xml
[ 0.0089 ]
[ 0.0090 ] Signing RCM messages
[ 0.0098 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0107 ] Assuming zero filled SBK key
[ 0.0162 ]
[ 0.0163 ] Copying signature to RCM mesages
[ 0.0172 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml
[ 0.0185 ]
[ 0.0185 ] Parsing partition layout
[ 0.0209 ] tegraparser --pt flash.xml.tmp
[ 0.0231 ]
[ 0.0231 ] Creating list of images to be signed
[ 0.0467 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --list images_list.xml
[ 0.1487 ]
[ 0.1495 ] Generating signatures
[ 0.1522 ] tegrasign --key None --list images_list.xml --pubkeyhash pub_key.key
[ 0.1537 ] Assuming zero filled SBK key
[ 0.3412 ]
[ 0.3412 ] Generating br-bct
[ 0.3745 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.cfg --chip 0x21 0
[ 0.3761 ] Copying Sdram info from 2 to 3 set
[ 0.4521 ]
[ 0.4521 ] Updating boot device parameters
[ 0.4550 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatedevparam flash.xml.bin
[ 0.4567 ] Warning: No sdram params
[ 0.4683 ]
[ 0.4683 ] Updating bl info
[ 0.4695 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[ 0.4887 ]
[ 0.4888 ] Updating secondary storage information into bct
[ 0.4904 ] tegraparser --pt flash.xml.bin --chip 0x21 0 --updatecustinfo P3448_A00_lpddr4_204Mhz_P987.bct
[ 0.5017 ]
[ 0.5018 ] Updating Odmdata
[ 0.5051 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatefields Odmdata =0xa4000
[ 0.5075 ] Warning: No sdram params
[ 0.5174 ]
[ 0.5175 ] Get Signed section of bct
[ 0.5191 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --listbct bct_list.xml
[ 0.5213 ]
[ 0.5214 ] Signing BCT
[ 0.5290 ] tegrasign --key None --list bct_list.xml --pubkeyhash pub_key.key
[ 0.5308 ] Assuming zero filled SBK key
[ 0.5312 ]
[ 0.5312 ] Updating BCT with signature
[ 0.5330 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatesig bct_list_signed.xml
[ 0.5373 ]
[ 0.5374 ] Copying signatures
[ 0.5403 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[ 0.6158 ]
[ 0.6159 ] Updating BFS information on BCT
[ 0.6176 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatebfsinfo flash.xml.bin
[ 0.6193 ] BFS:
[ 0.6209 ] 0: [PT ] flash.xml.bin (size=4367/131072)
[ 0.6211 ] 1: [TBC] nvtboot_cpu.bin.encrypt (size=65760/196608)
[ 0.6214 ] 2: [RP1] kernel_tegra210-p3448-0000-p3449-0000-a00.dtb.encrypt (size=243904/1048576)
[ 0.6217 ] 3: [EBT] cboot.bin.encrypt (size=485120/655360)
[ 0.6221 ] 4: [WB0] warmboot.bin.encrypt (size=3952/131072)
[ 0.6223 ] 5: [BPF] sc7entry-firmware.bin.encrypt (size=3376/262144)
[ 0.6226 ] BFS0: 131072 @ 2560 SUM 7f9718dd over 2883584 bytes
[ 0.6270 ] BFS:
[ 0.6280 ] 0: [PT-1] flash.xml.bin (size=4367/131072)
[ 0.6283 ] 1: [TBC-1] nvtboot_cpu.bin.encrypt (size=65760/196608)
[ 0.6286 ] 2: [RP1-1] kernel_tegra210-p3448-0000-p3449-0000-a00.dtb.encrypt (size=243904/1048576)
[ 0.6290 ] 3: [EBT-1] cboot.bin.encrypt (size=485120/655360)
[ 0.6295 ] 4: [WB0-1] warmboot.bin.encrypt (size=3952/131072)
[ 0.6301 ] 5: [BPF-1] sc7entry-firmware.bin.encrypt (size=3376/262144)
[ 0.6306 ] 8: [VER_b] emmc_bootblob_ver.txt (size=91/32768)
[ 0.6354 ] 9: [VER] emmc_bootblob_ver.txt (size=91/32768)
[ 0.6358 ] BFS1: 131072 @ 8704 SUM 7f9718dd over 2981888 bytes
[ 0.6371 ] KFS:
[ 0.6641 ] 0: [DTB] kernel_tegra210-p3448-0000-p3449-0000-a00.dtb.encrypt (size=243904/1048576)
[ 0.6646 ] 1: [TOS] tos-mon-only.img.encrypt (size=54208/6291456)
[ 0.6652 ] 2: [EKS] eks.img (size=1028/81920)
[ 0.6850 ] 3: [LNX] boot.img.encrypt (size=661504/67092480)
[ 0.6854 ] KFS0: 1048576 @ 29376546 SUM d7553793 over 8083456 bytes
[ 0.6870 ] KFS:
[ 0.7171 ] 0: [DTB-1] kernel_tegra210-p3448-0000-p3449-0000-a00.dtb.encrypt (size=243904/1048576)
[ 0.7174 ] 1: [TOS-1] tos-mon-only.img.encrypt (size=54208/6291456)
[ 0.7177 ] 2: [EKS-1] eks.img (size=1028/81920)
[ 0.7180 ] 3: [LNX-1] boot.img.encrypt (size=661504/67092480)
[ 0.7182 ] KFS1: 1048576 @ 29522082 SUM d7553793 over 8083456 bytes
[ 0.7262 ]
[ 0.7263 ] Boot Rom communication
[ 0.7290 ] tegrarcm --chip 0x21 0 --rcm rcm_list_signed.xml
[ 0.7303 ] BootRom is not running
[ 0.7739 ]
[ 0.7745 ] Sending BCTs
[ 0.7764 ] tegrarcm --download bct P3448_A00_lpddr4_204Mhz_P987.bct

The uart log:
[0005.599] Enabled early print
[0005.602] [L4T TegraBoot] (version ▒▒▒)
[0005.606] Processing in recovery mode
[0005.609] A02 Bootrom Patch rev = 1023
[0005.613] Power-up reason: pmc por
[0005.616] Established communication link with host
[0006.607] NvTbootI2cWrite(): error code 0x00045100 Error while starting write t ransaction
[0006.615] NvTbootI2cDeviceRead(): error code 0x00045001 Error while sending the offset to slave
[0006.623] NvTbootI2c: Read failed for slave 0xac, offset 0x00 with error code 0 x00045001

with the R32.4,it’s ok!

###############################################################################

L4T BSP Information:

R32 , REVISION: 4.3

###############################################################################

Target Board Information:

Name: jetson-nano-devkit-emmc, Board Family: t210ref, SoC: Tegra 210,

OpMode: production, Boot Authentication: ,

###############################################################################
./tegraflash.py --chip 0x21 --applet “/home/h/jetson-nano/Linux_for_Tegra/bootloader/nvtboot_recovery.bin” --skipuid --cmd “dump eeprom boardinfo cvm.bin”
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0024 ] Generating RCM messages
[ 0.0044 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm /home/h/jetson-nano/Linux_for_Tegra/bootloader/nvtboot_recovery.bin 0 0
[ 0.0053 ] RCM 0 is saved as rcm_0.rcm
[ 0.0070 ] RCM 1 is saved as rcm_1.rcm
[ 0.0070 ] List of rcm files are saved in rcm_list.xml
[ 0.0070 ]
[ 0.0070 ] Signing RCM messages
[ 0.0093 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0150 ] Assuming zero filled SBK key
[ 0.0188 ]
[ 0.0189 ] Copying signature to RCM mesages
[ 0.0210 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml
[ 0.0236 ]
[ 0.0237 ] Boot Rom communication
[ 0.0259 ] tegrarcm --chip 0x21 0 --rcm rcm_list_signed.xml --skipuid
[ 0.0291 ] RCM version 0X210001
[ 0.0751 ] Boot Rom communication completed
[ 1.0839 ]
[ 1.0840 ] dump EEPROM info
[ 1.0851 ] tegrarcm --oem platformdetails eeprom /home/h/jetson-nano/Linux_for_Tegra/bootloader/cvm.bin
[ 1.0864 ] Applet version 00.01.0000
[ 1.0922 ] Saved platform info in /home/h/jetson-nano/Linux_for_Tegra/bootloader/cvm.bin
[ 1.1713 ]
Board ID(3448) version(400)
copying bctfile(/home/h/jetson-nano/Linux_for_Tegra/bootloader/t210ref/BCT/P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg)… done.
copying bootloader(/home/h/jetson-nano/Linux_for_Tegra/bootloader/t210ref/cboot.bin)… done.
copying initrd(/home/h/jetson-nano/Linux_for_Tegra/bootloader/l4t_initrd.img)… done.
populating kernel to rootfs… done.
populating initrd to rootfs… done.
populating /home/h/jetson-nano/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb to rootfs… done.
Making Boot image… done.
Existing sosfile(/home/h/jetson-nano/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
copying tegraboot(/home/h/jetson-nano/Linux_for_Tegra/bootloader/t210ref/nvtboot.bin)… done.
copying cpu_bootloader(/home/h/jetson-nano/Linux_for_Tegra/bootloader/t210ref/cboot.bin)… done.
copying bpffile(/home/h/jetson-nano/Linux_for_Tegra/bootloader/t210ref/sc7entry-firmware.bin)… done.
Existing badpagefile(/home/h/jetson-nano/Linux_for_Tegra/bootloader/badpage.bin) reused.
copying wb0boot(/home/h/jetson-nano/Linux_for_Tegra/bootloader/t210ref/warmboot.bin)… done.
Existing tosfile(/home/h/jetson-nano/Linux_for_Tegra/bootloader/tos-mon-only.img) reused.
Existing eksfile(/home/h/jetson-nano/Linux_for_Tegra/bootloader/eks.img) reused.
copying dtbfile(/home/h/jetson-nano/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb)… done.
Copying nv_boot_control.conf to rootfs
Reusing existing system.img…
done.
Existing tbcfile(/home/h/jetson-nano/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
copying tbcdtbfile(/home/h/jetson-nano/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb)… done.
copying cfgfile(/home/h/jetson-nano/Linux_for_Tegra/bootloader/t210ref/cfg/flash_l4t_t210_emmc_p3448.xml) to flash.xml… done.
copying flasher(/home/h/jetson-nano/Linux_for_Tegra/bootloader/t210ref/cboot.bin)… done.
Existing flashapp(/home/h/jetson-nano/Linux_for_Tegra/bootloader/tegraflash.py) reused.
./tegraflash.py --bl cboot.bin --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg --odmdata 0x94000 --bldtb tegra210-p3448-0002-p3449-0000-b00.dtb --applet nvtboot_recovery.bin --cmd “flash; reboot” --cfg flash.xml --chip 0x21 --bins “EBT cboot.bin; DTB tegra210-p3448-0002-p3449-0000-b00.dtb”
saving flash command in /home/h/jetson-nano/Linux_for_Tegra/bootloader/flashcmd.txt
saving Windows flash command to /home/h/jetson-nano/Linux_for_Tegra/bootloader/flash_win.bat
*** Flashing target device started. ***
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0016 ] tegrasign --key None --getmode mode.txt
[ 0.0025 ] Assuming zero filled SBK key
[ 0.0026 ]
[ 0.0027 ] Generating RCM messages
[ 0.0035 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm nvtboot_recovery.bin 0 0
[ 0.0044 ] RCM 0 is saved as rcm_0.rcm
[ 0.0049 ] RCM 1 is saved as rcm_1.rcm
[ 0.0049 ] List of rcm files are saved in rcm_list.xml
[ 0.0050 ]
[ 0.0050 ] Signing RCM messages
[ 0.0059 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0067 ] Assuming zero filled SBK key
[ 0.0134 ]
[ 0.0135 ] Copying signature to RCM mesages
[ 0.0162 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml
[ 0.0194 ]
[ 0.0195 ] Parsing partition layout
[ 0.0218 ] tegraparser --pt flash.xml.tmp
[ 0.0266 ]
[ 0.0266 ] Creating list of images to be signed
[ 0.0302 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --list images_list.xml
[ 0.0388 ]
[ 0.0389 ] Generating signatures
[ 0.0434 ] tegrasign --key None --list images_list.xml --pubkeyhash pub_key.key
[ 0.0458 ] Assuming zero filled SBK key
[ 0.1364 ]
[ 0.1366 ] Generating br-bct
[ 0.1390 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.cfg --chip 0x21 0
[ 0.1413 ] Copying Sdram info from 0 to 1 set
[ 0.1424 ] Copying Sdram info from 1 to 2 set
[ 0.1424 ] Copying Sdram info from 2 to 3 set
[ 0.1424 ]
[ 0.1424 ] Updating boot device parameters
[ 0.1438 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatedevparam flash.xml.bin
[ 0.1455 ] Warning: No sdram params
[ 0.1460 ]
[ 0.1460 ] Updating bl info
[ 0.1483 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[ 0.1517 ]
[ 0.1518 ] Updating secondary storage information into bct
[ 0.1528 ] tegraparser --pt flash.xml.bin --chip 0x21 0 --updatecustinfo P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct
[ 0.1547 ]
[ 0.1548 ] Updating Odmdata
[ 0.1560 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatefields Odmdata =0x94000
[ 0.1572 ] Warning: No sdram params
[ 0.1575 ]
[ 0.1575 ] Get Signed section of bct
[ 0.1583 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --listbct bct_list.xml
[ 0.1593 ]
[ 0.1594 ] Signing BCT
[ 0.1616 ] tegrasign --key None --list bct_list.xml --pubkeyhash pub_key.key
[ 0.1623 ] Assuming zero filled SBK key
[ 0.1627 ]
[ 0.1628 ] Updating BCT with signature
[ 0.1638 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatesig bct_list_signed.xml
[ 0.1658 ]
[ 0.1659 ] Copying signatures
[ 0.1668 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[ 0.1764 ]
[ 0.1764 ] Updating BFS information on BCT
[ 0.1815 ] tegrabct --bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatebfsinfo flash.xml.bin
[ 0.1826 ] BFS:
[ 0.1839 ] 0: [PT ] flash.xml.bin (size=4339/131072)
[ 0.1843 ] 1: [TBC] nvtboot_cpu.bin.encrypt (size=65760/196608)
[ 0.1851 ] 2: [RP1] tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=197104/1048576)
[ 0.1858 ] 3: [EBT] cboot.bin.encrypt (size=483872/655360)
[ 0.1862 ] 4: [WB0] warmboot.bin.encrypt (size=3952/131072)
[ 0.1867 ] 5: [BPF] sc7entry-firmware.bin.encrypt (size=3376/262144)
[ 0.1873 ] BFS0: 131072 @ 2560 SUM 0f78c454 over 2883584 bytes
[ 0.1879 ] BFS:
[ 0.1880 ] 0: [PT-1] flash.xml.bin (size=4339/131072)
[ 0.1885 ] 1: [TBC-1] nvtboot_cpu.bin.encrypt (size=65760/196608)
[ 0.1890 ] 2: [RP1-1] tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=197104/1048576)
[ 0.1897 ] 3: [EBT-1] cboot.bin.encrypt (size=483872/655360)
[ 0.1900 ] 4: [WB0-1] warmboot.bin.encrypt (size=3952/131072)
[ 0.1903 ] 5: [BPF-1] sc7entry-firmware.bin.encrypt (size=3376/262144)
[ 0.1907 ] 8: [VER_b] emmc_bootblob_ver.txt (size=102/32768)
[ 0.1910 ] 9: [VER] emmc_bootblob_ver.txt (size=102/32768)
[ 0.1913 ] BFS1: 131072 @ 8704 SUM 0f78c454 over 2981888 bytes
[ 0.1916 ] KFS:
[ 0.2171 ] 0: [DTB] tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=197104/1048576)
[ 0.2176 ] 1: [TOS] tos-mon-only.img.encrypt (size=54208/6291456)
[ 0.2180 ] 2: [EKS] eks.img (size=1028/81920)
[ 0.2182 ] 3: [LNX] boot.img.encrypt (size=485376/67092480)
[ 0.2184 ] KFS0: 1048576 @ 29376546 SUM cfb2d7ce over 7907328 bytes
[ 0.2227 ] KFS:
[ 0.2475 ] 0: [DTB-1] tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=197104/1048576)
[ 0.2482 ] 1: [TOS-1] tos-mon-only.img.encrypt (size=54208/6291456)
[ 0.2485 ] 2: [EKS-1] eks.img (size=1028/81920)
[ 0.2487 ] 3: [LNX-1] boot.img.encrypt (size=485376/67092480)
[ 0.2490 ] KFS1: 1048576 @ 29522082 SUM cfb2d7ce over 7907328 bytes
[ 0.2539 ]
[ 0.2540 ] Boot Rom communication
[ 0.2562 ] tegrarcm --chip 0x21 0 --rcm rcm_list_signed.xml
[ 0.2585 ] BootRom is not running
[ 0.3111 ]
[ 0.3112 ] Sending BCTs
[ 0.3134 ] tegrarcm --download bct P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct
[ 0.3158 ] Applet version 00.01.0000
[ 0.3338 ] Sending bct
[ 0.3339 ] […] 100%
[ 0.5134 ]
[ 0.5150 ] tegrahost --chip 0x21 --align cboot.bin
[ 0.5159 ]
[ 0.5168 ] tegrahost --magicid EBT --appendsigheader cboot.bin cboot.bin_blheader
[ 0.5207 ]
[ 0.5221 ] tegrasign --key None --list cboot.bin_list.xml
[ 0.5232 ] Assuming zero filled SBK key
[ 0.5369 ]
[ 0.5447 ] tegrahost --updatesigheader cboot.bin_blheader.encrypt cboot.bin_blheader.hash zerosbk
[ 0.5469 ]
[ 0.5497 ] tegrahost --chip 0x21 --align tegra210-p3448-0002-p3449-0000-b00.dtb
[ 0.5570 ]
[ 0.5586 ] tegrahost --magicid DTB --appendsigheader tegra210-p3448-0002-p3449-0000-b00.dtb tegra210-p3448-0002-p3449-0000-b00.dtb_blheader
[ 0.5621 ]
[ 0.5649 ] tegrasign --key None --list tegra210-p3448-0002-p3449-0000-b00.dtb_list.xml
[ 0.5717 ] Assuming zero filled SBK key
[ 0.5718 ]
[ 0.5747 ] tegrahost --updatesigheader tegra210-p3448-0002-p3449-0000-b00.dtb_blheader.encrypt tegra210-p3448-0002-p3449-0000-b00.dtb_blheader.hash zerosbk
[ 0.5777 ]
[ 0.5786 ] Sending bootloader and pre-requisite binaries
[ 0.5802 ] tegrarcm --download ebt cboot.bin.encrypt 0 0 --download rp1 tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt 0
[ 0.5815 ] Applet version 00.01.0000
[ 0.5984 ] Sending ebt
[ 0.5987 ] […] 100%
[ 0.7120 ] Sending rp1
[ 0.7179 ] […] 100%
[ 0.7680 ]
[ 0.7691 ] tegrarcm --boot recovery
[ 0.7699 ] Applet version 00.01.0000
[ 0.7756 ]
[ 0.7757 ] Retrieving storage infomation
[ 0.7776 ] tegrarcm --oem platformdetails storage storage_info.bin
[ 0.7786 ] Applet is not running on device. Continue with Bootloader
[ 1.3465 ]
[ 1.3487 ] tegradevflash --oem platformdetails storage storage_info.bin
[ 1.3498 ] Cboot version 00.01.0000
[ 1.3537 ] Saved platform info in storage_info.bin
[ 1.3568 ]
[ 1.3569 ] Flashing the device
[ 1.3579 ] tegradevflash --pt flash.xml.bin --storageinfo storage_info.bin --create
[ 1.3598 ] Cboot version 00.01.0000
[ 1.3780 ] Writing partition GPT with gpt.bin
[ 1.3783 ] […] 100%
[ 1.3842 ] Writing partition PT with flash.xml.bin
[ 2.1684 ] […] 100%
[ 2.1743 ] Writing partition PT-1 with flash.xml.bin
[ 2.1967 ] […] 100%
[ 2.2157 ] Writing partition NVC with nvtboot.bin.encrypt
[ 2.2767 ] […] 100%
[ 2.2956 ] Writing partition TBC with nvtboot_cpu.bin.encrypt
[ 2.3268 ] […] 100%
[ 2.3484 ] Writing partition RP1 with tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[ 2.3970 ] […] 100%
[ 2.4250 ] Writing partition EBT with cboot.bin.encrypt
[ 2.4752 ] […] 100%
[ 2.5153 ] Writing partition WB0 with warmboot.bin.encrypt
[ 2.5779 ] […] 100%
[ 2.5969 ] Writing partition BPF with sc7entry-firmware.bin.encrypt
[ 2.6452 ] […] 100%
[ 2.6634 ] Writing partition NVC-1 with nvtboot.bin.encrypt
[ 2.7117 ] […] 100%
[ 2.7381 ] Writing partition TBC-1 with nvtboot_cpu.bin.encrypt
[ 2.8000 ] […] 100%
[ 2.8206 ] Writing partition RP1-1 with tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[ 2.8816 ] […] 100%
[ 2.9079 ] Writing partition EBT-1 with cboot.bin.encrypt
[ 2.9700 ] […] 100%
[ 3.0102 ] Writing partition WB0-1 with warmboot.bin.encrypt
[ 3.0760 ] […] 100%
[ 3.0950 ] Writing partition BPF-1 with sc7entry-firmware.bin.encrypt
[ 3.1563 ] […] 100%
[ 3.1746 ] Writing partition VER_b with emmc_bootblob_ver.txt
[ 3.2354 ] […] 100%
[ 3.2537 ] Writing partition VER with emmc_bootblob_ver.txt
[ 3.3045 ] […] 100%
[ 3.3227 ] Writing partition APP with system.img
[ 3.3752 ] […] 100%
[ 652.2055 ] Writing partition DTB with tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[ 653.6345 ] […] 100%
[ 653.6678 ] Writing partition TOS with tos-mon-only.img.encrypt
[ 653.7076 ] […] 100%
[ 653.7219 ] Warning: EKS partition magic header mismatch!
[ 653.7581 ] Writing partition EKS with eks.img
[ 653.7582 ] […] 100%
[ 653.7702 ] Writing partition LNX with boot.img.encrypt
[ 653.8067 ] […] 100%
[ 653.8424 ] Writing partition DTB-1 with tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[ 653.8742 ] […] 100%
[ 653.8968 ] Writing partition TOS-1 with tos-mon-only.img.encrypt
[ 653.9360 ] […] 100%
[ 653.9508 ] Writing partition EKS-1 with eks.img
[ 653.9897 ] […] 100%
[ 654.0024 ] Writing partition LNX-1 with boot.img.encrypt
[ 654.0393 ] […] 100%
[ 654.0734 ] Writing partition BMP with bmp.blob
[ 654.1039 ] […] 100%
[ 654.1273 ] Writing partition RP4 with rp4.blob
[ 654.1653 ] […] 100%
[ 654.2222 ]
[ 654.2241 ] tegradevflash --write BCT P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct
[ 654.2258 ] Cboot version 00.01.0000
[ 654.2313 ] Writing partition BCT with P3448_A00_4GB_Micron_4GB_lpddr4_204Mhz_P987.bct
[ 654.2324 ] […] 100%
[ 654.6314 ]
[ 654.6314 ] Flashing completed

[ 654.6315 ] Coldbooting the device
[ 654.6323 ] tegradevflash --reboot coldboot
[ 654.6329 ] Cboot version 00.01.0000
[ 654.6378 ]
*** The target t210ref has been flashed successfully. ***
Reset the board to boot from internal eMMC.

Hello,

Just a try… Will this board get flashed if you use jetp4.3?

Hello,
for R32.5.0/1— We flashed the board using an Ubuntu VM,it failed,and then flashed the board using an host ubuntu, it sucessed.
for R32.4.3 We successfully flashed baord with the two system.

Hi,

Then we have no solution for your problem. Sdkmanager and flash.sh do not support Ubuntu VM from the beginning.

Hello,

we have faced the same or a similar issue, and we have resolved it removing the following lines in tegraflash_internal.py:

   command = exec_file('tegrarcm')
   command.extend(['--reboot', 'recovery'])
   run_command(command)
   time.sleep(2)

in the function tegraflash_dumpeeprom.

It seems that the virtual machine doesn’t handle well the reconnection of the usb device caused by the reboot command.

Maybe someone from Nvidia can tell us in which situation is this reboot really needed.

Hope this help you.

FYI, Jetsons will disconnect and reconnect (perhaps multiple times) during flash. You would always need this to be handled correctly by any VM, whereas it should “just work” with a native Ubuntu host PC. Once flash is complete, then the Jetson will again reboot, but it will be “normal” boot, and not recovery mode.