Flashing problem on some Jetson Orin Nanos

Hello, I have been flashing some Jetson Orin Nanos on custom carrier boards for a while now, but in the last 2 days I have had 2 of them failing to flash. They are both brand new devices that I have never flashed before, and the flashing operation freezes at the same point on both of them. I have successfully flashed some more in between these 2 failed ones, so it is not an issue with the flashing process. I am flashing them from a standalone Ubuntu system, so no VM or anything. I have tried flashing these 2 that failed in one of the Nvidia devkits, but it made no difference.

Any help or suggestions would be appreciated.

Here is the output from the flashing process (It gets stuck at Sending applet and never gets any further no-matter how long you wait):

user entered nvme0n1p1
*** Checking ONLINE mode … OK.
*** Checking target board connection … 1 connections found.
*** Reading ECID … FUSELEVEL=fuselevel_production hwchipid=0x23 bootauth=NS
*** Reading EEPROM … “/home/apex/Linux_for_Tegra/bootloader/tegraflash.py” --chip 0x23 --applet “/home/apex/Linux_for_Tegra/bootloader/mb1_t234_prod.bin” --cfg readinfo_t234_min_prod.xml --dev_params tegra234-br-bct-diag-boot.dts --device_config tegra234-mb1-bct-device-p3701-0000.dts --misc_config tegra234-mb1-bct-misc-p3701-0000.dts --bins “mb2_applet applet_t234.bin” --skipuid --cmd “dump eeprom cvm cvm.bin; reboot recovery”
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0456 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[ 0.0460 ] File rcm_state open failed
[ 0.0462 ] ERROR: failed to read rcm_state
[ 0.0462 ]
[ 0.0493 ] tegrasign_v3.py --key None --getmode mode.txt
[ 0.0494 ] Assuming zero filled SBK key
[ 0.0465 ] Pre-processing config: tegra234-mb1-bct-device-p3701-0000.dts
[ 0.0548 ] Pre-processing config: tegra234-mb1-bct-misc-p3701-0000.dts
[ 0.0663 ] Parsing partition layout
[ 0.0668 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[ 0.0681 ] Kernel DTB used: None
[ 0.0681 ] WARNING: dce base dtb is not provided

[ 0.0681 ] Parsing partition layout
[ 0.0686 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[ 0.0694 ] Creating list of images to be signed
[ 0.0698 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --list images_list.xml zerosbk
[ 0.0703 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[ 0.0716 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[ 0.0720 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[ 0.0792 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[ 0.0913 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[ 0.1113 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[ 0.1121 ] adding BCH for mb2_t234_aligned.bin
[ 0.1240 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[ 0.1774 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[ 0.1783 ] adding BCH for mb2_t234_aligned.bin
[ 0.2520 ] Filling MB1 storage info
[ 0.2521 ] Parsing dev params for multi chains
[ 0.2794 ] Generating br-bct
[ 0.2807 ] Updating dev and MSS params in BR BCT
[ 0.2807 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[ 0.2832 ] Updating bl info
[ 0.2845 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin
[ 0.2858 ] WARNING: boot chain is not completed. set to 0
[ 0.2890 ] Generating signatures
[ 0.2921 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.2925 ] Assuming zero filled SBK key
[ 0.3496 ] Warning: pub_key.key is not found
[ 0.3474 ] Parsing dev params for multi chains
[ 0.3474 ] Generating br-bct
[ 0.3486 ] Updating dev and MSS params in BR BCT
[ 0.3488 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[ 0.3511 ] Updating bl info
[ 0.3524 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[ 0.3536 ] WARNING: boot chain is not completed. set to 0
[ 0.3605 ] Generating SHA2 Hash
[ 0.3666 ] Sha saved in br_bct_BR.sha
[ 0.3639 ] Get Signed section of bct
[ 0.3651 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml
[ 0.3675 ] Signing BCT
[ 0.3706 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.3710 ] Assuming zero filled SBK key
[ 0.3781 ] Sha saved in br_bct_BR.sha
[ 0.3789 ] Warning: pub_key.key is not found
[ 0.3759 ] Updating BCT with signature
[ 0.3772 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml
[ 0.3784 ] Offset :4608 Len :3584
[ 0.3801 ] Generating SHA2 Hash
[ 0.3832 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512
[ 0.3835 ] Assuming zero filled SBK key
[ 0.3835 ] Assuming zero filled SBK key
[ 0.3910 ] Sha saved in br_bct_BR.sha
[ 0.3887 ] Updating BCT with SHA2 Hash
[ 0.3899 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml
[ 0.3911 ] Offset :4608 Len :3584
[ 0.3923 ] Offset :68 Len :8124
[ 0.3955 ] Generating coldboot mb1-bct
[ 0.3968 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3701-0000_cpp.dtb --device tegra234-mb1-bct-device-p3701-0000_cpp.dtb
[ 0.3980 ] MB1-BCT version: 0.13

[ 0.4052 ] Parsing config file :tegra234-mb1-bct-device-p3701-0000_cpp.dtb
[ 0.4060 ] Added Platform Config 9 data with size :- 100
[ 0.4060 ]
[ 0.4060 ] Updating mb1-bct with firmware information
[ 0.4073 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin
[ 0.4388 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct
[ 0.4405 ] Generating SHA2 Hash for mb1bct
[ 0.4470 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha
[ 0.4503 ] Sha saved in mb1_cold_boot_bct_MB1.sha
[ 0.4488 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk
[ 0.4500 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[ 0.4560 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.4563 ] Assuming zero filled SBK key
[ 0.4608 ] Warning: pub_key.key is not found
[ 0.4594 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk
[ 0.4628 ] Generating recovery mb1-bct
[ 0.4642 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3701-0000_cpp.dtb --device tegra234-mb1-bct-device-p3701-0000_cpp.dtb
[ 0.4654 ] MB1-BCT version: 0.13

[ 0.4726 ] Parsing config file :tegra234-mb1-bct-device-p3701-0000_cpp.dtb
[ 0.4733 ] Added Platform Config 9 data with size :- 100
[ 0.4733 ]
[ 0.4733 ] Updating mb1-bct with firmware information
[ 0.4747 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo readinfo_t234_min_prod.xml.bin
[ 0.5087 ] tegrahost_v2 --chip 0x23 0 --align mb1_bct_MB1_aligned.bct
[ 0.5105 ] Generating SHA2 Hash for mb1bct
[ 0.5169 ] Sha saved in mb1_bct_MB1_aligned.sha
[ 0.5202 ] Sha saved in mb1_bct_MB1.sha
[ 0.5188 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_bct_MB1_aligned.bct zerosbk
[ 0.5200 ] adding BCH for mb1_bct_MB1_aligned.bct
[ 0.5259 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.5262 ] Assuming zero filled SBK key
[ 0.5307 ] Warning: pub_key.key is not found
[ 0.5293 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk
[ 0.5328 ] Info: Skip generating mem_bct because sdram_config is not defined
[ 0.5328 ] Info: Skip generating mem_bct because sdram_config is not defined
[ 0.5328 ] Copying signatures
[ 0.5342 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[ 0.5576 ] mb1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[ 0.5582 ] psc_bl1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[ 0.5582 ] Boot Rom communication
[ 0.5595 ] tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[ 0.5608 ] BR_CID: 0x80012344705DD3408C00000018FE0280
[ 0.5627 ] Sending bct_br
[ 0.5631 ] Sending mb1
[ 0.5660 ] Sending psc_bl1
[ 0.5762 ] Sending bct_mb1
[ 0.5822 ] Boot Rom communication completed
[ 0.5845 ] tegrahost_v2 --chip 0x23 0 --align applet_t234_aligned.bin
[ 0.5876 ] tegrahost_v2 --chip 0x23 0 --magicid MB2A --appendsigheader applet_t234_aligned.bin zerosbk
[ 0.5888 ] adding BCH for applet_t234_aligned.bin
[ 0.6304 ] tegrasign_v3.py --key None --list applet_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.6308 ] Assuming zero filled SBK key
[ 0.6376 ] Warning: pub_key.key is not found
[ 0.6362 ] tegrahost_v2 --chip 0x23 0 --updatesigheader applet_t234_aligned_sigheader.bin.encrypt applet_t234_aligned_sigheader.bin.hash zerosbk
[ 0.6424 ] Sending mb2_applet…

[ 0.6438 ] tegrarcm_v2 --chip 0x23 0 --pollbl --download applet applet_t234_sigheader.bin.encrypt
[ 0.6450 ] BL: version 1.4.0.2-t234-54845784-08a4de08 last_boot_error: 0
[ 0.8056 ] Sending applet

Hi,

What is your JP version?
Try to install latest version to cross check whether issue exist.

Thanks

Using JP 6.0
I don’t see how a newer version will fix a problem that only seems to affect a few devices.

Hi,

You could try record a serial log and attach it for us to review.

Thanks

[0003.672] I> Task: Program NV master stream id
[0003.676] I> Task: Verify boot mode
[0003.682] I> Task: Alias fuses
[0003.685] W> FUSE_ALIAS: Fuse alias on production fused part is not supported.
[0003.692] I> Task: Print SKU type
[0003.695] I> FUSE_OPT_CCPLEX_CLUSTER_DISABLE = 0x00000078
[0003.700] I> FUSE_OPT_GPC_DISABLE = 0x00000002
[0003.704] I> FUSE_OPT_TPC_DISABLE = 0x000000fc
[0003.709] I> FUSE_OPT_DLA_DISABLE = 0x00000003
[0003.713] I> FUSE_OPT_PVA_DISABLE = 0x00000001
[0003.717] I> FUSE_OPT_NVENC_DISABLE = 0x00000001
[0003.722] I> FUSE_OPT_NVDEC_DISABLE = 0x00000000
[0003.726] I> FUSE_OPT_FSI_DISABLE = 0x00000001
[0003.730] I> FUSE_OPT_EMC_DISABLE = 0x0000000c
[0003.735] I> FUSE_BOOTROM_PATCH_VERSION = 0x7
[0003.739] I> FUSE_PSCROM_PATCH_VERSION = 0x7
[0003.743] I> FUSE_OPT_ADC_CAL_FUSE_REV = 0x2
[0003.747] I> FUSE_SKU_INFO_0 = 0xd6
[0003.750] I> FUSE_OPT_SAMPLE_TYPE_0 = 0x3 PS
[0003.755] I> FUSE_PACKAGE_INFO_0 = 0x2
[0003.758] I> SKU: Prod
[0003.760] I> Task: Boost clocks
[0003.763] I> Initializing NAFLL for BPMP_CPU_NIC.
[0003.769] I> BPMP NAFLL: fll_lock = 1, dvco_min_reached = 0
[0003.774] I> BPMP NAFLL lock success.
[0003.777] I> BPMP_CPU_NIC : src = 42, divisor = 0
[0003.782] I> Initializing PLLC2 for AXI_CBB.
[0003.786] I> AXI_CBB : src = 35, divisor = 0
[0003.790] I> Task: Voltage monitor
[0003.794] I> VMON: Vmon re-calibration and fine tuning done
[0003.799] I> Task: UPHY init
[0003.802] W> UPHY: UPHY lane info table is empty in MB1 BCT.
[0003.808] I> Task: Boot device init
[0003.811] I> Boot_device: RCM
[0003.814] I> USB configuration success
[0003.818] I> Task: TSC init
[0003.820] I> Task: Enable WDT 5th expiry
[0003.824] I> Task: I2C register
[0003.827] I> Task: Set I2C bus freq
[0003.831] I> Task: Reset FSI
[0003.833] I> Task: Enable clock-mon
[0003.837] I> FMON: Fmon re-programming done
[0003.841] I> Task: Mapper init
[0003.844] I> Task: MB1 fixed firewalls
[0003.851] W> Firewall readback mismatch
[0003.856] I> Task: Load MB2/Applet/FSKP
[0003.859] I> Loading MB2 Applet
[0003.862] I> Slot: 0
[0003.864] I> Binary[21] block-352321536 (partition size: 0x50000)
[0003.870] I> Binary name: MB2-Applet
[0003.874] I> Size of crypto header is 8192
[0003.878] I> Size of crypto header is 8192
[0003.882] I> BCH of MB2-Applet read from storage
[0003.886] I> BCH address is : 0x4004e000
[0003.890] I> MB2-Applet header integrity check is success
[0003.895] I> Binary magic in BCH component 0 is MB2A
[0003.900] I> component binary type is 21
[0003.904] I> Size of crypto header is 8192
[0003.917] I> MB2-Applet binary is read from storage
[0003.922] I> MB2-Applet binary integrity check is success
[0003.927] I> Binary MB2-Applet loaded successfully at 0x40000000 (0x42440)
[0003.934] I> Task: Prepare MB2 params
[0003.938] I> Task: Misc NV security settings
[0003.942] I> NVDEC sticky bits programming done
[0003.947] I> Successfully powergated NVDEC
[0003.951] I> Task: Disable/Reload WDT
[0003.954] I> Task: Program misc carveouts
[0003.958] I> Task: Disable SCPM/POD reset
[0003.962] I> SLCG Global override status := 0x0
[0003.966] I> MB1: MSS reconfig completed
[0003.970] W> Firewall readback mismatch
[0003.974] W> Firewall readback mismatch
[0003.977] W> Firewall readback mismatch
[0003.981] W> Firewall readback mismatch
[0003.985] W> Firewall readback mismatch
[0003.988] W> Firewall readback mismatch
[0003.992] W> Firewall readback mismatch
[0003.996] W> Firewall readback mismatch
[0003.999] W> Firewall readback mismatch
[0004.003] W> Firewall readback mismatch
I> Applet (version: 0.0.0.0-t234-54845784-b648c465)
I> t234-A01-0-Silicon (0x12347) Prod
I> Emulation:
I> Entry timestamp: 0x00000000
I> Task: Pinmux init
I> Task: Crypto init
I> Task: Boot device init
I> Applet do storage init
I> Boot_device: QSPI_FLASH instance: 0
I> Qspi clock source : clk_m
E> SPI_FLASH: Invalid value device id: 13.
E> STORAGE: Failed to open QSPI Flash: 0.
E> STORAGE: Failed to initialize boot device: 3.
C> Applet primary storage init failed
C> Task 0x0 failed (err: 0x3c3c0902)
E> Top caller module: SPI_FLASH, error module: SPI_FLASH, reason: 0x02, aux_info: 0x09
I> Busy Spin

Hi,

Is above log tested on the dev kit?

Thanks

No, this was on a custom carrier board (the debug console is more easily accessible on our custom board), but the flashing fails in exactly the same place on the dev kit.

Hi,

What is the fail rate about those two Orin Nano modules?
Also could you try to flash your Orin Nano modules with dev kit using sdk manager?

Thanks

In the last few months I have flashed about 30 Orin Nano modules successfully.
Now I have 2 with this problem. This is the first time I have encountered this particular error.

I have tried flashing in SDK manager in both the dev kit and our custom board with the same result.

So no any successful flash with those two, right?

No, I have tried many times (In SDK manager and the terminal with different commands) but these 2 always fail at the same point in the process.

Hi,

Could you use QR code app with Data Matrix format supported to scan the barcode in the modules and share the results with us to review.

Thanks

Ok, I managed to scan them.
The results for the 2 faulty ones are:
1614123120227,48B02DF7A87A,699-13767-0004-300
1614123120325,48B02DF7A871,699-13767-0004-300

Hi

Could you execute below command for us to review?
Some later modules will have new overlay, so old bsp like (36.0) might not support in default.

cat /ect/nv_tegra_release

Thanks

R36 (release), REVISION: 3.0, GCID: 36191598, BOARD: generic, EABI: aarch64, DATE: Mon May 6 17:34:21 UTC 2024

KERNEL_VARIANT: oot

TARGET_USERSPACE_LIB_DIR=nvidia
TARGET_USERSPACE_LIB_DIR_PATH=usr/lib/aarch64-linux-gnu/nvidia

Is there any follow up to this?

Hi,

Could you install latest bsp (36.4.3) for those two modules in our devkit to cross check?
Need your help to check since some overlay will updated in latest bsp.

Thanks

sudo ./flash.sh --no-systemimg -c bootloader/generic/cfg/flash_t234_qspi.xml p3768-0000-p3767-0000-a0-qspi mmcblk0p1
###############################################################################

L4T BSP Information:

R36 , REVISION: 4.3

User release: 0.0

./flash.sh: line 1993: /home/apex/Linux_for_Tegra/rootfs/etc/user_release_version: No such file or directory
###############################################################################
ECID is 0x80012344705DD2DE500000000C018200

Target Board Information:

Name: p3768-0000-p3767-0000-a0-qspi, Board Family: generic, SoC: Tegra 234,

OpMode: production, Boot Authentication: NS,

Disk encryption: disabled ,

###############################################################################
copying device_config(/home/apex/Linux_for_Tegra/bootloader/generic/BCT/tegra234-mb1-bct-device-p3767-0000.dts)… done.
copying misc_config(/home/apex/Linux_for_Tegra/bootloader/generic/BCT/tegra234-mb1-bct-misc-p3767-0000.dts)… done.
copying emc_fuse_dev_params(/home/apex/Linux_for_Tegra/bootloader/generic/BCT/tegra234-br-bct-diag-boot.dts)… done.
copying minratchet_config(/home/apex/Linux_for_Tegra/bootloader/generic/BCT/tegra234-mb1-bct-ratchet-p3767-0000.dts)… done.
Existing emcfuse(/home/apex/Linux_for_Tegra/bootloader/fuse_t234.xml) reused.
./tegraflash.py --chip “0x23” --applet “/home/apex/Linux_for_Tegra/bootloader/mb1_t234_prod.bin” --skipuid --cfg readinfo_t234_min_prod.xml --dev_params tegra234-br-bct-diag-boot.dts --device_config tegra234-mb1-bct-device-p3767-0000.dts --misc_config tegra234-mb1-bct-misc-p3767-0000.dts --bins “mb2_applet applet_t234.bin” --minratchet_config tegra234-mb1-bct-ratchet-p3767-0000.dts --cmd “readfuses fuse_t234.bin fuse_t234.xml; dump eeprom cvm cvm.bin; dump try_custinfo custinfo_out.bin; reboot recovery”
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0360 ] Reading fuses
[ 0.0364 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[ 0.0367 ] File rcm_state open failed
[ 0.0369 ] ERROR: failed to read rcm_state
[ 0.0369 ]
[ 0.0428 ] tegrasign_v3.py --key None --getmode mode.txt
[ 0.0430 ] Assuming zero filled SBK key
[ 0.0372 ] Pre-processing config: tegra234-mb1-bct-device-p3767-0000.dts
[ 0.0430 ] Pre-processing config: tegra234-mb1-bct-misc-p3767-0000.dts
[ 0.0517 ] Pre-processing config: tegra234-mb1-bct-ratchet-p3767-0000.dts
[ 0.0582 ] Parsing partition layout
[ 0.0586 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[ 0.0595 ] Kernel DTB used: None
[ 0.0595 ] WARNING: dce base dtb is not provided

[ 0.0595 ] Parsing partition layout
[ 0.0598 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[ 0.0603 ] Creating list of images to be signed
[ 0.0606 ] Generating ratchet blob
[ 0.0607 ] Generating coldboot mb1-bct
[ 0.0609 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin
[ 0.0612 ] MB1-BCT version: 0.13

[ 0.0628 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb
[ 0.0630 ] Added Platform Config 9 data with size :- 100
[ 0.0630 ]
[ 0.0630 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb
[ 0.0630 ]
[ 0.0630 ] Updating mb1-bct with firmware information
[ 0.0633 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin
[ 0.0651 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct
[ 0.0658 ] Generating SHA2 Hash for mb1bct
[ 0.0732 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha
[ 0.0747 ] Sha saved in mb1_cold_boot_bct_MB1.sha
[ 0.0697 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk
[ 0.0704 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[ 0.0774 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.0777 ] Assuming zero filled SBK key
[ 0.0792 ] Warning: pub_key.key is not found
[ 0.0738 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk
[ 0.0747 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --ratchet_blob ratchet_blob.bin --list images_list.xml zerosbk
[ 0.0750 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[ 0.0761 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[ 0.0765 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[ 0.0819 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[ 0.0824 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[ 0.0878 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[ 0.0881 ] adding BCH for mb2_t234_aligned.bin
[ 0.0915 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[ 0.1097 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[ 0.1102 ] adding BCH for mb2_t234_aligned.bin
[ 0.1446 ] Filling MB1 storage info
[ 0.1446 ] Parsing dev params for multi chains
[ 0.1708 ] Generating br-bct
[ 0.1721 ] Updating dev and MSS params in BR BCT
[ 0.1722 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[ 0.1746 ] Updating bl info
[ 0.1760 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin
[ 0.1773 ] WARNING: boot chain is not completed. set to 0
[ 0.1807 ] Generating signatures
[ 0.1866 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.1870 ] Assuming zero filled SBK key
[ 0.2175 ] Warning: pub_key.key is not found
[ 0.2125 ] Parsing dev params for multi chains
[ 0.2125 ] Generating br-bct
[ 0.2138 ] Updating dev and MSS params in BR BCT
[ 0.2139 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[ 0.2165 ] Updating bl info
[ 0.2179 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[ 0.2192 ] WARNING: boot chain is not completed. set to 0
[ 0.2250 ] Generating SHA2 Hash
[ 0.2340 ] Sha saved in br_bct_BR.sha
[ 0.2284 ] Get Signed section of bct
[ 0.2297 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml
[ 0.2322 ] Signing BCT
[ 0.2382 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.2386 ] Assuming zero filled SBK key
[ 0.2460 ] Sha saved in br_bct_BR.sha
[ 0.2468 ] Warning: pub_key.key is not found
[ 0.2410 ] Updating BCT with signature
[ 0.2423 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml
[ 0.2435 ] Offset :4608 Len :3584
[ 0.2452 ] Generating SHA2 Hash
[ 0.2511 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512
[ 0.2515 ] Assuming zero filled SBK key
[ 0.2515 ] Assuming zero filled SBK key
[ 0.2588 ] Sha saved in br_bct_BR.sha
[ 0.2538 ] Updating BCT with SHA2 Hash
[ 0.2551 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml
[ 0.2563 ] Offset :4608 Len :3584
[ 0.2576 ] Offset :68 Len :8124
[ 0.2588 ] Generating coldboot mb1-bct
[ 0.2601 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin
[ 0.2614 ] MB1-BCT version: 0.13

[ 0.2691 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb
[ 0.2706 ] Added Platform Config 9 data with size :- 100
[ 0.2707 ]
[ 0.2707 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb
[ 0.2707 ]
[ 0.2708 ] Updating mb1-bct with firmware information
[ 0.2724 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin
[ 0.2769 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct
[ 0.2787 ] Generating SHA2 Hash for mb1bct
[ 0.2880 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha
[ 0.2915 ] Sha saved in mb1_cold_boot_bct_MB1.sha
[ 0.2873 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk
[ 0.2886 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[ 0.2976 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.2980 ] Assuming zero filled SBK key
[ 0.3029 ] Warning: pub_key.key is not found
[ 0.2988 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk
[ 0.3033 ] Generating recovery mb1-bct
[ 0.3050 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin
[ 0.3064 ] MB1-BCT version: 0.13

[ 0.3139 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb
[ 0.3151 ] Added Platform Config 9 data with size :- 100
[ 0.3151 ]
[ 0.3151 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb
[ 0.3151 ]
[ 0.3152 ] Updating mb1-bct with firmware information
[ 0.3166 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo readinfo_t234_min_prod.xml.bin
[ 0.3210 ] tegrahost_v2 --chip 0x23 0 --align mb1_bct_MB1_aligned.bct
[ 0.3228 ] Generating SHA2 Hash for mb1bct
[ 0.3321 ] Sha saved in mb1_bct_MB1_aligned.sha
[ 0.3356 ] Sha saved in mb1_bct_MB1.sha
[ 0.3313 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_bct_MB1_aligned.bct zerosbk
[ 0.3327 ] adding BCH for mb1_bct_MB1_aligned.bct
[ 0.3422 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.3427 ] Assuming zero filled SBK key
[ 0.3476 ] Warning: pub_key.key is not found
[ 0.3435 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk
[ 0.3470 ] Info: Skip generating mem_bct because sdram_config is not defined
[ 0.3470 ] Info: Skip generating mem_bct because sdram_config is not defined
[ 0.3471 ] Copying signatures
[ 0.3485 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[ 0.3700 ] mb1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[ 0.3708 ] psc_bl1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[ 0.3708 ] Boot Rom communication
[ 0.3725 ] tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[ 0.3738 ] BR_CID: 0x80012344705DD2DE500000000C018200
[ 0.3759 ] Sending bct_br
[ 0.3763 ] Sending mb1
[ 0.3778 ] Sending psc_bl1
[ 0.3887 ] Sending bct_mb1
[ 0.3947 ] Boot Rom communication completed
[ 0.3972 ] tegrahost_v2 --chip 0x23 0 --align applet_t234_aligned.bin
[ 0.4007 ] tegrahost_v2 --chip 0x23 0 --magicid MB2A --ratchet_blob ratchet_blob.bin --appendsigheader applet_t234_aligned.bin zerosbk
[ 0.4020 ] adding BCH for applet_t234_aligned.bin
[ 0.4472 ] tegrasign_v3.py --key None --list applet_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.4476 ] Assuming zero filled SBK key
[ 0.4533 ] Warning: pub_key.key is not found
[ 0.4492 ] tegrahost_v2 --chip 0x23 0 --updatesigheader applet_t234_aligned_sigheader.bin.encrypt applet_t234_aligned_sigheader.bin.hash zerosbk
[ 0.4549 ] Sending mb2_applet…

[ 0.4563 ] tegrarcm_v2 --chip 0x23 0 --pollbl --download applet applet_t234_sigheader.bin.encrypt
[ 0.4576 ] BL: version 1.4.0.4-t234-54845784-e89ea9bc last_boot_error: 0
[ 0.6185 ] Sending applet
[ 0.7175 ] completed
[ 0.7190 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet

It gets stuck at that point and doesn’t progress any further.

It’s been a week since I posted the results of the last test. Is there any feedback please?