JetPack 4.2.2 Flashing issue on AGX Xavier

Hi!

I am quite new to the Jetson community and would like some help from the experts here in terms of reflashing the Jetson AGX Xavier we have.

My understanding is, the first way to try to do this is as follows:

  1. Download the sdkmanager on a host computer. In my case this is an Ubuntu 18.04 system
  2. Put the Xavier in force-recovery mode
  3. Choose the desired JetPack version (4.2.2) in my case from the sdkmanager
  4. Download the necessary packages to a storage device. In my case I am using an 128 GB SD card because I have run out of space on my Ubuntu SSD
  5. Let the sdkmanager flash
  6. Make Profit

I am facing issues at step 4. All the downloads work. But around 99.5% of “Creating OS Image” the tool aborts with INSTALLATION FAILED. I exported the logs and have attached here.Logs_AGX_Xavier_2020-12-23_17-44-40.zip (1.0 MB)

The second method is to undercut the sdkmanager and do it via the command line. So I navigated to the Linux_for_Tegra folder in my terminal and ran sudo ./flash.sh jetson-xavier mmcblk0p1. This went on for a while. Here are the logs for that.

[   2.4998 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml
[   2.5008 ] 
[   2.5009 ] Generating coldboot mb1-bct
[   2.5142 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_cold_boot_bct.cfg --sdram /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1.cfg --misc tegra194-mb1-bct-misc-l4t.cfg --scr tegra194-mb1-bct-scr-cbb-mini.cfg --pinmux tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg --pmc tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg --pmic tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg --brcommand tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg --prod tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg --gpioint tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg --uphy tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg --device tegra19x-mb1-bct-device-sdmmc.cfg
[   2.5195 ] MB1-BCT version: 0x1

[   2.5198 ] Parsing config file :tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg 
[   2.5202 ] Added Platform Config 0 data with size :- 3008

[   2.5223 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini.cfg 
[   2.5225 ] Added Platform Config 1 data with size :- 19640

[   2.5386 ] Parsing config file :tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg 
[   2.5391 ] Added Platform Config 2 data with size :- 24

[   2.5479 ] Parsing config file :tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg 
[   2.5484 ] Added Platform Config 4 data with size :- 348

[   2.5495 ] Parsing config file :tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg 
[   2.5500 ] Added Platform Config 3 data with size :- 92

[   2.5508 ] Parsing config file :tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg 
[   2.5511 ] Added Platform Config 5 data with size :- 56

[   2.5514 ] Parsing config file :tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg 
[   2.5518 ] Added Platform Config 7 data with size :- 392

[   2.5525 ] Parsing config file :tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg 
[   2.5528 ] Added Platform Config 8 data with size :- 12
[   2.5531 ] 
[   2.5531 ] Parsing config file :tegra19x-mb1-bct-device-sdmmc.cfg 
[   2.5531 ] Added Platform Config 9 data with size :- 32
[   2.5531 ] 
[   2.5531 ] Updating mb1-bct with firmware information
[   2.5541 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[   2.5549 ] MB1-BCT version: 0x1
[   2.5551 ] 
[   2.5551 ] Updating mb1-bct with storage information
[   2.5558 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   2.5566 ] MB1-BCT version: 0x1
[   2.5567 ] 
[   2.5575 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct
[   2.5583 ] 
[   2.5591 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[   2.5603 ] adding BCH for mb1_cold_boot_bct_MB1.bct
[   2.5613 ] 
[   2.5629 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml
[   2.5638 ] Assuming zero filled SBK key
[   2.5643 ] 
[   2.5659 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[   2.5674 ] 
[   2.5675 ] Generating recovery mb1-bct
[   2.5686 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_bct.cfg --sdram /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1.cfg --misc tegra194-mb1-bct-misc-flash.cfg --scr tegra194-mb1-bct-scr-cbb-mini.cfg --pinmux tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg --pmc tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg --pmic tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg --brcommand tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg --prod tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg --gpioint tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg --uphy tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg --device tegra19x-mb1-bct-device-sdmmc.cfg
[   2.5761 ] MB1-BCT version: 0x1

[   2.5771 ] Parsing config file :tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg 
[   2.5784 ] Added Platform Config 0 data with size :- 3008

[   2.5815 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini.cfg 
[   2.5825 ] Added Platform Config 1 data with size :- 19640

[   2.5965 ] Parsing config file :tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg 
[   2.5970 ] Added Platform Config 2 data with size :- 24

[   2.5973 ] Parsing config file :tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg 
[   2.5978 ] Added Platform Config 4 data with size :- 348

[   2.5982 ] Parsing config file :tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg 
[   2.5984 ] Added Platform Config 3 data with size :- 92
[   2.5984 ] 
[   2.5984 ] Parsing config file :tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg 
[   2.5984 ] Added Platform Config 5 data with size :- 56
[   2.5985 ] 
[   2.5985 ] Parsing config file :tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg 
[   2.5985 ] Added Platform Config 7 data with size :- 392
[   2.5985 ] 
[   2.5985 ] Parsing config file :tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg 
[   2.5985 ] Added Platform Config 8 data with size :- 12
[   2.5985 ] 
[   2.5985 ] Parsing config file :tegra19x-mb1-bct-device-sdmmc.cfg 
[   2.5985 ] Added Platform Config 9 data with size :- 32
[   2.5985 ] 
[   2.5985 ] Updating mb1-bct with firmware information
[   2.5998 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[   2.6041 ] MB1-BCT version: 0x1
[   2.6135 ] 
[   2.6135 ] Updating mb1-bct with storage information
[   2.6147 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   2.6156 ] MB1-BCT version: 0x1
[   2.6157 ] 
[   2.6165 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct
[   2.6173 ] 
[   2.6181 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --appendsigheader mb1_bct_MB1.bct zerosbk
[   2.6188 ] adding BCH for mb1_bct_MB1.bct
[   2.6195 ] 
[   2.6205 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml
[   2.6222 ] Assuming zero filled SBK key
[   2.6226 ] 
[   2.6242 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[   2.6261 ] 
[   2.6262 ] Generating coldboot mem-bct
[   2.6273 ] tegrabct_v2 --chip 0x19 0 --sdram /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1.cfg --membct /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1_1.bct /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1_2.bct /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1_3.bct /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1_4.bct
[   2.6436 ] Packing sdram param for instance[0]
[   2.6763 ] Packing sdram param for instance[1]
[   2.6765 ] Packing sdram param for instance[2]
[   2.6767 ] Packing sdram param for instance[3]
[   2.6769 ] Packing sdram param for instance[4]
[   2.6769 ] Packing sdram param for instance[5]
[   2.6770 ] Packing sdram param for instance[6]
[   2.6770 ] Packing sdram param for instance[7]
[   2.6770 ] Packing sdram param for instance[8]
[   2.6770 ] Packing sdram param for instance[9]
[   2.6770 ] Packing sdram param for instance[10]
[   2.6770 ] Packing sdram param for instance[11]
[   2.6770 ] Packing sdram param for instance[12]
[   2.6770 ] Packing sdram param for instance[13]
[   2.6770 ] Packing sdram param for instance[14]
[   2.6770 ] Packing sdram param for instance[15]
[   2.6770 ] 
[   2.6770 ] Getting sector size from pt
[   2.6780 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin
[   2.6790 ] 
[   2.6790 ] BlockSize read from layout is 200

[   2.6798 ] tegrahost_v2 --chip 0x19 0 --blocksize 512 --magicid MEMB --addsigheader_multi /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1_1.bct /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1_2.bct /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1_3.bct /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1_4.bct
[   2.6806 ] adding BCH for /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1_1.bct
[   2.6827 ] 
[   2.6835 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct
[   2.6847 ] 
[   2.6861 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --appendsigheader mem_coldboot.bct zerosbk
[   2.6869 ] Header already present for mem_coldboot.bct
[   2.6873 ] 
[   2.6885 ] tegrasign_v2 --key None --list mem_coldboot_sigheader.bct_list.xml
[   2.6893 ] Assuming zero filled SBK key
[   2.6899 ] 
[   2.6910 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_coldboot_sigheader.bct.encrypt mem_coldboot_sigheader.bct.hash zerosbk
[   2.6921 ] 
[   2.6922 ] Generating recovery mem-bct
[   2.6929 ] tegrabct_v2 --chip 0x19 0 --sdram /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1.cfg --membct /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1_1.bct /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1_2.bct /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1_3.bct /media/swaroophs/3766-3034/nvidia/nvidia_sdk/JetPack_4.2.2_Linux_GA_JETSON_AGX_XAVIER/Linux_for_Tegra/bootloader/32092/tmpdX8f1v1_4.bct
[   2.6937 ] Packing sdram param for instance[0]
[   2.7412 ] Packing sdram param for instance[1]
[   2.7415 ] Packing sdram param for instance[2]
[   2.7418 ] Packing sdram param for instance[3]
[   2.7421 ] Packing sdram param for instance[4]
[   2.7423 ] Packing sdram param for instance[5]
[   2.7426 ] Packing sdram param for instance[6]
[   2.7428 ] Packing sdram param for instance[7]
[   2.7430 ] Packing sdram param for instance[8]
[   2.7433 ] Packing sdram param for instance[9]
[   2.7433 ] Packing sdram param for instance[10]
[   2.7433 ] Packing sdram param for instance[11]
[   2.7433 ] Packing sdram param for instance[12]
[   2.7433 ] Packing sdram param for instance[13]
[   2.7433 ] Packing sdram param for instance[14]
[   2.7433 ] Packing sdram param for instance[15]
[   2.7433 ] 
[   2.7448 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct
[   2.7456 ] 
[   2.7467 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --appendsigheader mem_rcm.bct zerosbk
[   2.7476 ] adding BCH for mem_rcm.bct
[   2.7487 ] 
[   2.7500 ] tegrasign_v2 --key None --list mem_rcm_sigheader.bct_list.xml
[   2.7508 ] Assuming zero filled SBK key
[   2.7512 ] 
[   2.7528 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm_sigheader.bct.encrypt mem_rcm_sigheader.bct.hash zerosbk
[   2.7545 ] 
[   2.7546 ] Copying signatures
[   2.7557 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   3.7119 ] 
[   3.7119 ] Boot Rom communication
[   3.7129 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_list_signed.xml
[   3.7136 ] BR_CID: 0x88021911647057062400000003038100
[   3.7143 ] RCM version 0X190001
[   3.7146 ] Boot Rom communication completed
[   4.7307 ] 
[   5.7359 ] tegrarcm_v2 --isapplet
[   5.7391 ] Applet version 01.00.0000
[   5.7417 ] 
[   5.7418 ] Sending BCTs
[   5.7453 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt --download bct_mem mem_rcm_sigheader.bct.encrypt
[   5.7487 ] Applet version 01.00.0000
[   5.7519 ] Sending bct_bootrom
[   5.7523 ] [................................................] 100%
[   5.7536 ] Sending bct_mb1
[   5.7585 ] [................................................] 100%
[   5.7629 ] Sending bct_mem
[   5.8138 ] [................................................] 100%
[   5.9197 ] 
[   5.9198 ] Generating blob
[   5.9211 ] tegrahost_v2 --chip 0x19 --align blob_nvtboot_recovery_cpu_t194.bin
[   5.9221 ] 
[   5.9231 ] tegrahost_v2 --chip 0x19 0 --magicid CPBL --appendsigheader blob_nvtboot_recovery_cpu_t194.bin zerosbk
[   5.9240 ] adding BCH for blob_nvtboot_recovery_cpu_t194.bin
[   5.9301 ] 
[   5.9316 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_t194_sigheader.bin_list.xml
[   5.9330 ] Assuming zero filled SBK key
[   5.9340 ] 
[   5.9356 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_nvtboot_recovery_cpu_t194_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_t194_sigheader.bin.hash zerosbk
[   5.9399 ] 
[   5.9412 ] tegrahost_v2 --chip 0x19 --align blob_nvtboot_recovery_t194.bin
[   5.9422 ] 
[   5.9433 ] tegrahost_v2 --chip 0x19 0 --magicid MB2B --appendsigheader blob_nvtboot_recovery_t194.bin zerosbk
[   5.9443 ] adding BCH for blob_nvtboot_recovery_t194.bin
[   5.9799 ] 
[   5.9820 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_t194_sigheader.bin_list.xml
[   5.9833 ] Assuming zero filled SBK key
[   5.9842 ] 
[   5.9866 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_nvtboot_recovery_t194_sigheader.bin.encrypt blob_nvtboot_recovery_t194_sigheader.bin.hash zerosbk
[   5.9906 ] 
[   5.9922 ] tegrahost_v2 --chip 0x19 --align blob_preboot_c10_prod_cr.bin
[   5.9934 ] 
[   5.9946 ] tegrahost_v2 --chip 0x19 0 --magicid MTSP --appendsigheader blob_preboot_c10_prod_cr.bin zerosbk
[   5.9958 ] Header already present for blob_preboot_c10_prod_cr.bin
[   5.9964 ] 
[   5.9980 ] tegrasign_v2 --key None --list blob_preboot_c10_prod_cr_sigheader.bin_list.xml
[   5.9991 ] Assuming zero filled SBK key
[   5.9997 ] 
[   6.0014 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_preboot_c10_prod_cr_sigheader.bin.encrypt blob_preboot_c10_prod_cr_sigheader.bin.hash zerosbk
[   6.0030 ] 
[   6.0045 ] tegrahost_v2 --chip 0x19 --align blob_mce_c10_prod_cr.bin
[   6.0057 ] 
[   6.0069 ] tegrahost_v2 --chip 0x19 0 --magicid MTSM --appendsigheader blob_mce_c10_prod_cr.bin zerosbk
[   6.0080 ] Header already present for blob_mce_c10_prod_cr.bin
[   6.0104 ] 
[   6.0129 ] tegrasign_v2 --key None --list blob_mce_c10_prod_cr_sigheader.bin_list.xml
[   6.0143 ] Assuming zero filled SBK key
[   6.0150 ] 
[   6.0168 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_mce_c10_prod_cr_sigheader.bin.encrypt blob_mce_c10_prod_cr_sigheader.bin.hash zerosbk
[   6.0198 ] 
[   6.0211 ] tegrahost_v2 --chip 0x19 --align blob_mts_c10_prod_cr.bin
[   6.0221 ] 
[   6.0232 ] tegrahost_v2 --chip 0x19 0 --magicid MTSB --appendsigheader blob_mts_c10_prod_cr.bin zerosbk
[   6.0242 ] adding BCH for blob_mts_c10_prod_cr.bin
[   6.1034 ] 
[   6.1048 ] tegrasign_v2 --key None --list blob_mts_c10_prod_cr_sigheader.bin_list.xml
[   6.1056 ] Assuming zero filled SBK key
[   6.1100 ] 
[   6.1114 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_mts_c10_prod_cr_sigheader.bin.encrypt blob_mts_c10_prod_cr_sigheader.bin.hash zerosbk
[   6.1509 ] 
[   6.1538 ] tegrahost_v2 --chip 0x19 --align blob_bpmp_t194.bin
[   6.1548 ] 
[   6.1557 ] tegrahost_v2 --chip 0x19 0 --magicid BPMF --appendsigheader blob_bpmp_t194.bin zerosbk
[   6.1564 ] adding BCH for blob_bpmp_t194.bin
[   6.1747 ] 
[   6.1847 ] tegrasign_v2 --key None --list blob_bpmp_t194_sigheader.bin_list.xml
[   6.1856 ] Assuming zero filled SBK key
[   6.1871 ] 
[   6.1883 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_bpmp_t194_sigheader.bin.encrypt blob_bpmp_t194_sigheader.bin.hash zerosbk
[   6.1981 ] 
[   6.1995 ] tegrahost_v2 --chip 0x19 --align blob_tegra194-a02-bpmp-p2888-a04.dtb
[   6.2165 ] 
[   6.2179 ] tegrahost_v2 --chip 0x19 0 --magicid BPMD --appendsigheader blob_tegra194-a02-bpmp-p2888-a04.dtb zerosbk
[   6.2188 ] adding BCH for blob_tegra194-a02-bpmp-p2888-a04.dtb
[   6.2304 ] 
[   6.2321 ] tegrasign_v2 --key None --list blob_tegra194-a02-bpmp-p2888-a04_sigheader.dtb_list.xml
[   6.2333 ] Assuming zero filled SBK key
[   6.2468 ] 
[   6.2487 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt blob_tegra194-a02-bpmp-p2888-a04_sigheader.dtb.hash zerosbk
[   6.2560 ] 
[   6.2575 ] tegrahost_v2 --chip 0x19 --align blob_spe_t194.bin
[   6.2584 ] 
[   6.2593 ] tegrahost_v2 --chip 0x19 0 --magicid SPEF --appendsigheader blob_spe_t194.bin zerosbk
[   6.2602 ] adding BCH for blob_spe_t194.bin
[   6.2644 ] 
[   6.2663 ] tegrasign_v2 --key None --list blob_spe_t194_sigheader.bin_list.xml
[   6.2775 ] Assuming zero filled SBK key
[   6.2781 ] 
[   6.2796 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_spe_t194_sigheader.bin.encrypt blob_spe_t194_sigheader.bin.hash zerosbk
[   6.2814 ] 
[   6.2824 ] tegrahost_v2 --chip 0x19 --align blob_tos-trusty_t194.img
[   6.2832 ] 
[   6.2840 ] tegrahost_v2 --chip 0x19 0 --magicid TOSB --appendsigheader blob_tos-trusty_t194.img zerosbk
[   6.2848 ] adding BCH for blob_tos-trusty_t194.img
[   6.2910 ] 
[   6.2924 ] tegrasign_v2 --key None --list blob_tos-trusty_t194_sigheader.img_list.xml
[   6.2932 ] Assuming zero filled SBK key
[   6.2939 ] 
[   6.2951 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_tos-trusty_t194_sigheader.img.encrypt blob_tos-trusty_t194_sigheader.img.hash zerosbk
[   6.2991 ] 
[   6.3001 ] tegrahost_v2 --chip 0x19 --align blob_eks.img
[   6.3008 ] 
[   6.3017 ] tegrahost_v2 --chip 0x19 0 --magicid EKSB --appendsigheader blob_eks.img zerosbk
[   6.3024 ] adding BCH for blob_eks.img
[   6.3026 ] 
[   6.3037 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml
[   6.3046 ] Assuming zero filled SBK key
[   6.3050 ] 
[   6.3066 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[   6.3233 ] 
[   6.3251 ] tegrahost_v2 --chip 0x19 --align blob_tegra194-p2888-0001-p2822-0000.dtb
[   6.3260 ] 
[   6.3268 ] tegrahost_v2 --chip 0x19 0 --magicid CDTB --appendsigheader blob_tegra194-p2888-0001-p2822-0000.dtb zerosbk
[   6.3277 ] adding BCH for blob_tegra194-p2888-0001-p2822-0000.dtb
[   6.3447 ] 
[   6.3463 ] tegrasign_v2 --key None --list blob_tegra194-p2888-0001-p2822-0000_sigheader.dtb_list.xml
[   6.3472 ] Assuming zero filled SBK key
[   6.3479 ] 
[   6.3498 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt blob_tegra194-p2888-0001-p2822-0000_sigheader.dtb.hash zerosbk
[   6.3542 ] 
[   6.3696 ] tegrahost_v2 --chip 0x19 --generateblob blob.xml blob.bin
[   6.3706 ] number of images in blob are 11
[   6.3709 ] blobsize is 6080728
[   6.3710 ] Added binary blob_nvtboot_recovery_cpu_t194_sigheader.bin.encrypt of size 236912
[   6.3736 ] Added binary blob_nvtboot_recovery_t194_sigheader.bin.encrypt of size 129808
[   6.3739 ] Added binary blob_preboot_c10_prod_cr_sigheader.bin.encrypt of size 23968
[   6.3742 ] Added binary blob_mce_c10_prod_cr_sigheader.bin.encrypt of size 144144
[   6.3745 ] Added binary blob_mts_c10_prod_cr_sigheader.bin.encrypt of size 3372048
[   6.3754 ] Added binary blob_bpmp_t194_sigheader.bin.encrypt of size 853856
[   6.3762 ] Added binary blob_tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt of size 610048
[   6.3767 ] Added binary blob_spe_t194_sigheader.bin.encrypt of size 94960
[   6.3770 ] Added binary blob_tos-trusty_t194_sigheader.img.encrypt of size 324608
[   6.3774 ] Added binary blob_eks_sigheader.img.encrypt of size 5136
[   6.3777 ] Added binary blob_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt of size 285056
[   6.3832 ] 
[   6.3833 ] Sending bootloader and pre-requisite binaries
[   6.3843 ] tegrarcm_v2 --download blob blob.bin
[   6.3850 ] Applet version 01.00.0000
[   6.3876 ] Sending blob
[   6.3876 ] [................................................] 100%
[   7.2632 ] 
[   7.2669 ] tegrarcm_v2 --boot recovery
[   7.2701 ] Applet version 01.00.0000
[   7.2776 ] 
[   8.2827 ] tegrarcm_v2 --isapplet
[   8.5884 ] 
[   8.5922 ] tegrarcm_v2 --ismb2
[   8.5985 ] 
[   8.6181 ] tegradevflash_v2 --iscpubl
[   8.6220 ] Bootloader version 01.00.0000
[   8.6311 ] Bootloader version 01.00.0000
[   8.6318 ] 
[   8.6320 ] Retrieving storage infomation
[   8.6374 ] tegrarcm_v2 --oem platformdetails storage storage_info.bin
[   8.6415 ] Applet is not running on device. Continue with Bootloader
[   8.6592 ] 
[   8.6936 ] tegradevflash_v2 --oem platformdetails storage storage_info.bin
[   8.7097 ] Bootloader version 01.00.0000
[   8.7126 ] Saved platform info in storage_info.bin
[   8.7138 ] 
[   8.7139 ] Flashing the device
[   8.7171 ] tegraparser_v2 --storageinfo storage_info.bin --generategpt --pt flash.xml.bin
[   8.7217 ] 
[   8.7443 ] tegradevflash_v2 --pt flash.xml.bin --create
[   8.7542 ] Bootloader version 01.00.0000
[   8.7560 ] Erasing sdmmc_boot: 3 ......... [Done]
[   9.8599 ] Writing partition secondary_gpt with gpt_secondary_0_3.bin
[   9.8612 ] [................................................] 100%

[   9.8654 ] Erasing sdmmc_user: 3 ......... [Done]
[  10.1850 ] Writing partition master_boot_record with mbr_1_3.bin
[  10.1862 ] [................................................] 100%
[  10.1874 ] Writing partition primary_gpt with gpt_primary_1_3.bin
[  10.1886 ] [................................................] 100%
[  10.1906 ] Writing partition secondary_gpt with gpt_secondary_1_3.bin
[  10.1928 ] [................................................] 100%

[  10.1951 ] Writing partition mb1 with mb1_t194_prod_sigheader.bin.encrypt
[  10.1965 ] [................................................] 100%
[  10.2064 ] Writing partition mb1_b with mb1_t194_prod_sigheader.bin.encrypt
[  10.2965 ] [................................................] 100%
[  10.3051 ] Writing partition spe-fw with spe_t194_sigheader.bin.encrypt
[  10.3163 ] [................................................] 100%
[  10.3203 ] Writing partition spe-fw_b with spe_t194_sigheader.bin.encrypt
[  10.3253 ] [................................................] 100%
[  10.3294 ] Writing partition mb2 with nvtboot_t194_sigheader.bin.encrypt
[  10.3344 ] [................................................] 100%
[  10.3416 ] Writing partition mb2_b with nvtboot_t194_sigheader.bin.encrypt
[  10.3484 ] [................................................] 100%
[  10.3553 ] Writing partition mts-preboot with preboot_c10_prod_cr_sigheader.bin.encrypt
[  10.3632 ] [................................................] 100%
[  10.3651 ] Writing partition mts-preboot_b with preboot_c10_prod_cr_sigheader.bin.encrypt
[  10.3680 ] [................................................] 100%
[  10.3699 ] Writing partition SMD with slot_metadata.bin
[  10.3851 ] [................................................] 100%
[  10.3883 ] Writing partition SMD_b with slot_metadata.bin
[  10.3899 ] [................................................] 100%
[  10.3918 ] Writing partition master_boot_record with mbr_1_3.bin
[  10.3936 ] [................................................] 100%
[  10.3955 ] Writing partition APP with system.img
[  10.3968 ] [................................................] 100%
[ 312.9811 ] Writing partition mts-mce with mce_c10_prod_cr_sigheader.bin.encrypt
[ 313.0184 ] [................................................] 100%
[ 313.0270 ] Writing partition mts-mce_b with mce_c10_prod_cr_sigheader.bin.encrypt
[ 313.0307 ] [................................................] 100%
[ 313.0346 ] Writing partition mts-proper with mts_c10_prod_cr_sigheader.bin.encrypt
[ 313.0378 ] [................................................] 100%
[ 313.1790 ] Writing partition mts-proper_b with mts_c10_prod_cr_sigheader.bin.encrypt
[ 313.1830 ] [................................................] 100%
[ 313.3219 ] Writing partition cpu-bootloader with cboot_t194_sigheader.bin.encrypt
[ 313.3262 ] [................................................] 100%
[ 313.3559 ] Writing partition cpu-bootloader_b with cboot_t194_sigheader.bin.encrypt
[ 313.3620 ] [................................................] 100%
[ 313.3808 ] Writing partition bootloader-dtb with tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt
[ 313.3822 ] [................................................] 100%
[ 313.3944 ] Writing partition bootloader-dtb_b with tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt
[ 313.3983 ] [................................................] 100%
[ 313.4056 ] Writing partition secure-os with tos-trusty_t194_sigheader.img.encrypt
[ 313.4087 ] [................................................] 100%
[ 313.4238 ] Writing partition secure-os_b with tos-trusty_t194_sigheader.img.encrypt
[ 313.4274 ] [................................................] 100%
[ 313.4364 ] Writing partition eks with eks_sigheader.img.encrypt
[ 313.4412 ] [................................................] 100%
[ 313.4447 ] Writing partition eks_b with eks_sigheader.img.encrypt
[ 313.4538 ] [................................................] 100%
[ 313.4550 ] Writing partition bpmp-fw with bpmp_t194_sigheader.bin.encrypt
[ 313.4565 ] [................................................] 100%
[ 313.4925 ] Writing partition bpmp-fw_b with bpmp_t194_sigheader.bin.encrypt
[ 313.5018 ] [................................................] 100%
[ 313.5285 ] Writing partition bpmp-fw-dtb with tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt
[ 313.5377 ] [................................................] 100%
[ 313.5647 ] Writing partition bpmp-fw-dtb_b with tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt
[ 313.5718 ] [................................................] 100%
[ 313.5914 ] Writing partition xusb-fw with xusb_sil_rel_fw
[ 313.5978 ] [................................................] 100%
[ 313.6079 ] Writing partition xusb-fw_b with xusb_sil_rel_fw
[ 313.6097 ] [................................................] 100%
[ 313.6136 ] Writing partition rce-fw with camera-rtcpu-rce_sigheader.img.encrypt
[ 313.6156 ] [................................................] 100%
[ 313.6307 ] Writing partition rce-fw_b with camera-rtcpu-rce_sigheader.img.encrypt
[ 313.6362 ] [................................................] 100%
[ 313.6445 ] Writing partition adsp-fw with adsp-fw_sigheader.bin.encrypt
[ 313.6484 ] [................................................] 100%
[ 313.6568 ] Writing partition adsp-fw_b with adsp-fw_sigheader.bin.encrypt
[ 313.6592 ] [................................................] 100%
[ 313.6625 ] Writing partition sc7 with warmboot_t194_prod_sigheader.bin.encrypt
[ 313.6650 ] [................................................] 100%
[ 313.6705 ] Writing partition sc7_b with warmboot_t194_prod_sigheader.bin.encrypt
[ 313.6726 ] [................................................] 100%
[ 313.6751 ] Writing partition BMP with bmp.blob
[ 313.6765 ] [................................................] 100%
[ 313.6829 ] Writing partition BMP_b with bmp.blob
[ 313.6854 ] [................................................] 100%
[ 313.6877 ] Writing partition kernel with boot_sigheader.img.encrypt
[ 313.6897 ] [................................................] 100%
[ 315.2502 ] Writing partition kernel_b with boot_sigheader.img.encrypt
[ 315.2600 ] [................................................] 100%
[ 316.8271 ] Writing partition kernel-dtb with tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt
[ 316.8384 ] [................................................] 100%
[ 316.8471 ] Writing partition kernel-dtb_b with tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt
[ 316.8533 ] [................................................] 100%
[ 316.8796 ] 
[ 316.8841 ] tegradevflash_v2 --write BCT br_bct_BR.bct
[ 316.8859 ] Bootloader version 01.00.0000
[ 316.8878 ] Writing partition BCT with br_bct_BR.bct
[ 316.8882 ] [................................................] 100%
[ 316.8988 ] 
[ 316.9122 ] tegradevflash_v2 --write MB1_BCT mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 316.9133 ] Bootloader version 01.00.0000
[ 316.9150 ] Writing partition MB1_BCT with mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 316.9154 ] [................................................] 100%
[ 316.9379 ] 
[ 316.9394 ] tegradevflash_v2 --write MB1_BCT_b mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 316.9552 ] Bootloader version 01.00.0000
[ 316.9568 ] Writing partition MB1_BCT_b with mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 316.9573 ] [................................................] 100%
[ 316.9647 ] 
[ 316.9778 ] tegradevflash_v2 --write MEM_BCT mem_coldboot_sigheader.bct.encrypt
[ 316.9788 ] Bootloader version 01.00.0000
[ 316.9804 ] Writing partition MEM_BCT with mem_coldboot_sigheader.bct.encrypt
[ 316.9807 ] [................................................] 100%
[ 317.0082 ] 
[ 317.0186 ] tegradevflash_v2 --write MEM_BCT_b mem_coldboot_sigheader.bct.encrypt
[ 317.0198 ] Bootloader version 01.00.0000
[ 317.0217 ] Writing partition MEM_BCT_b with mem_coldboot_sigheader.bct.encrypt
[ 317.0221 ] [................................................] 100%
[ 317.0473 ] 
[ 317.0474 ] Flashing completed

[ 317.0474 ] Coldbooting the device
[ 317.0659 ] tegrarcm_v2 --ismb2
[ 317.0690 ] 
[ 317.0699 ] tegradevflash_v2 --reboot coldboot
[ 317.0708 ] Bootloader version 01.00.0000
[ 317.0731 ] 
*** The target t186ref has been flashed successfully. ***
Reset the board to boot from internal eMMC.

After this though, the Xavier goes on a reboot loop. In the connected HDMI display, I see the Nvidia logo splash screen and the message

trusty-log panic notifier

And then reboots in 5 seconds.

Any ideas on what I might be doing wrong?

Technically the command line flash was completely successful. To some extent it means that the software which was actually flashed was in some way incorrect. One possibility is if the software was somehow downloaded with a failure, e.g., a file was not quite correct. Another possibility is that something is different about the Xavier, e.g., it has had security fuses burned (this would never be the case from a freshly purchased Xavier, and you’d very likely know if fuses were intentionally burned).

Probably the next two steps would be to eliminate your host’s “~/nvidia/nvidia_sdk/JetPack...version.../” content, and allow this to be reinstalled, and try again. The second step would be to get a serial console boot log. You wouldn’t need to log a lot of repeated boots, but you would want serial console to show start and one reboot.

Thanks so much for giving me some hints. Here is what I tried based on your suggestions.

1.Cleared the downloads folder for nvidia (in my case the SD card)
2.Downloaded (but not install) the necessary Jetpack version from the sdkmanager
3.Using command line, set the following env variables:
export BOARD="jetson-xavier"
export L4T_RELEASE_PACKAGE="Jetson_Linux_R32.2.1_aarch64.tbz2"
export SAMPLE_FS_PACKAGE="Tegra_Linux_Sample-Root-Filesystem_R32.2.1_aarch64.tbz2"

4.From the download folder, execute following command:
$ tar xf ${L4T_RELEASE_PACKAGE}

5.Then do the following:
$ cd Linux_for_Tegra/rootfs/
$ sudo tar xpf ../../${SAMPLE_FS_PACKAGE}

6.The tar commmand results in a bunch of Cannot change ownership issues. Pasting last few lines of logs below:

tar: usr/share/icons/default: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/icons: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/maven-repo/org/libreoffice/unoloader/debian: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/maven-repo/org/libreoffice/unoloader/6.0.7: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/maven-repo/org/libreoffice/unoloader: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/maven-repo/org/libreoffice/ridl/debian: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/maven-repo/org/libreoffice/ridl/6.0.7: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/maven-repo/org/libreoffice/ridl: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/maven-repo/org/libreoffice/juh/debian: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/maven-repo/org/libreoffice/juh/6.0.7: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/maven-repo/org/libreoffice/juh: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/maven-repo/org/libreoffice/jurt/debian: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/maven-repo/org/libreoffice/jurt/6.0.7: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/maven-repo/org/libreoffice/jurt: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/maven-repo/org/libreoffice: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/maven-repo/org: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/maven-repo: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/plymouth/themes: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/plymouth: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/misc: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/pixmaps: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/unity-control-center/keybindings: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/unity-control-center: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/libtool/build-aux: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/libtool: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/dbus-1/services: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/dbus-1: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/US: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/Mexico: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/Antarctica: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/Chile: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/Brazil: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/Atlantic: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/Africa: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/US: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/Mexico: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/Antarctica: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/Chile: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/Brazil: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/Atlantic: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/Africa: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/Asia: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/Etc: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/SystemV: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/Europe: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/Canada: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/America/Indiana: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/America/Kentucky: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/America/Argentina: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/America: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/Pacific: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right/Indian: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/right: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/Asia: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/Etc: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/SystemV: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/Europe: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/Canada: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/America/Indiana: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/America/Kentucky: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/America/Argentina: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/America: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/Pacific: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/US: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/Mexico: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/Antarctica: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/Chile: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/Brazil: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/Australia: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/Atlantic: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/Africa: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/Asia: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/Etc: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/SystemV: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/Arctic: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/Europe: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/Canada: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/America/Indiana: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/America/Kentucky: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/America/Argentina: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/America/North_Dakota: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/America: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/Pacific: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix/Indian: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/posix: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo/Indian: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/zoneinfo: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/gdm/greeter/autostart: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/gdm/greeter: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/gdm/dconf: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/gdm: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/accountsservice/interfaces: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/accountsservice: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/ubuntu-wayland/applications: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/ubuntu-wayland: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/groff: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/applications: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/ghostscript/9.26/Resource/CIDFSubst: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/ghostscript/9.26/Resource: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/ghostscript/9.26: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share/ghostscript: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/share: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/sbin: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/aspell: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/bfd-plugins: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/ubuntu-release-upgrader: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/gcc/aarch64-linux-gnu/7: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/gcc/aarch64-linux-gnu: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/gcc: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/apt/planners: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/apt: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/gold-ld: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/python2.7/dist-packages: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/python2.7/config-aarch64-linux-gnu: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/python2.7: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/compat-ld: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/aarch64-linux-gnu/qt-default/qtchooser: Directory renamed before its status could be extracted
tar: usr/lib/aarch64-linux-gnu/qt-default: Directory renamed before its status could be extracted
tar: usr/lib/aarch64-linux-gnu/qtchooser: Directory renamed before its status could be extracted
tar: usr/lib/aarch64-linux-gnu/perl/cross-config-5.26.1: Directory renamed before its status could be extracted
tar: usr/lib/aarch64-linux-gnu/perl: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/aarch64-linux-gnu: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/python3.6/config-3.6m-aarch64-linux-gnu: Directory renamed before its status could be extracted
tar: usr/lib/python3.6: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/ssl: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/python3/dist-packages: Directory renamed before its status could be extracted
tar: usr/lib/python3: Directory renamed before its status could be extracted
tar: usr/lib/man-db: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/environment.d: Directory renamed before its status could be extracted
tar: usr/lib/thunderbird/distribution: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/thunderbird/defaults/pref: Directory renamed before its status could be extracted
tar: usr/lib/thunderbird/defaults: Directory renamed before its status could be extracted
tar: usr/lib/thunderbird: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/gnupg2: Directory renamed before its status could be extracted
tar: usr/lib/libreoffice/program/classes: Directory renamed before its status could be extracted
tar: usr/lib/libreoffice/program: Directory renamed before its status could be extracted
tar: usr/lib/libreoffice/share/uno_packages: Directory renamed before its status could be extracted
tar: usr/lib/libreoffice/share/registry: Directory renamed before its status could be extracted
tar: usr/lib/libreoffice/share/config: Directory renamed before its status could be extracted
tar: usr/lib/libreoffice/share/prereg: Directory renamed before its status could be extracted
tar: usr/lib/libreoffice/share/psprint: Directory renamed before its status could be extracted
tar: usr/lib/libreoffice/share: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/libreoffice: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/systemd/user/graphical-session.target.wants: Directory renamed before its status could be extracted
tar: usr/lib/systemd/user/unity-panel-service.service.wants: Directory renamed before its status could be extracted
tar: usr/lib/systemd/user/unity-session.target.requires: Directory renamed before its status could be extracted
tar: usr/lib/systemd/user/sockets.target.wants: Directory renamed before its status could be extracted
tar: usr/lib/systemd/user/unity-panel-service-lockscreen.service.wants: Directory renamed before its status could be extracted
tar: usr/lib/systemd/user/graphical-session-pre.target.wants: Directory renamed before its status could be extracted
tar: usr/lib/systemd/user/unity-session.target.wants: Directory renamed before its status could be extracted
tar: usr/lib/systemd/user: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/systemd: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr/lib/grub: Directory renamed before its status could be extracted
tar: usr/lib: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: usr: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: sbin: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: run: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: lib/firmware/libertas: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gm204/acr: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gm204/gr: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gm204: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp102/gr: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp102: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gm20b/gr: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gm20b: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp107/acr: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp107/gr: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp107/nvdec: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp107/sec2: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp107: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gm206/acr: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gm206/gr: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gm206: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp104/acr: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp104/gr: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp104/nvdec: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp104/sec2: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp104: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp106/acr: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp106/gr: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp106/nvdec: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp106/sec2: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp106: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp100/gr: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia/gp100: Directory renamed before its status could be extracted
tar: lib/firmware/nvidia: Directory renamed before its status could be extracted
tar: lib/firmware: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: lib/udev: Directory renamed before its status could be extracted
tar: lib/systemd/system/kexec.target.wants: Directory renamed before its status could be extracted
tar: lib/systemd/system/graphical.target.wants: Directory renamed before its status could be extracted
tar: lib/systemd/system/multi-user.target.wants: Directory renamed before its status could be extracted
tar: lib/systemd/system/timers.target.wants: Directory renamed before its status could be extracted
tar: lib/systemd/system/sysinit.target.wants: Directory renamed before its status could be extracted
tar: lib/systemd/system/system-update.target.wants: Directory renamed before its status could be extracted
tar: lib/systemd/system/local-fs.target.wants: Directory renamed before its status could be extracted
tar: lib/systemd/system/sockets.target.wants: Directory renamed before its status could be extracted
tar: lib/systemd/system/rescue.target.wants: Directory renamed before its status could be extracted
tar: lib/systemd/system/halt.target.wants: Directory renamed before its status could be extracted
tar: lib/systemd/system/getty.target.wants: Directory renamed before its status could be extracted
tar: lib/systemd/system/reboot.target.wants: Directory renamed before its status could be extracted
tar: lib/systemd/system/poweroff.target.wants: Directory renamed before its status could be extracted
tar: lib/systemd/system/initrd-switch-root.target.wants: Directory renamed before its status could be extracted
tar: lib/systemd/system/basic.target.wants: Directory renamed before its status could be extracted
tar: lib/systemd/system: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: lib/systemd: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: lib: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: etc/mysql: Directory renamed before its status could be extracted
tar: etc/alternatives: Directory renamed before its status could be extracted
tar: etc/dhcp/dhclient-exit-hooks.d: Directory renamed before its status could be extracted
tar: etc/dhcp/dhclient-enter-hooks.d: Directory renamed before its status could be extracted
tar: etc/dhcp: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: etc/apparmor.d/disable: Directory renamed before its status could be extracted
tar: etc/apparmor.d: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: etc/fonts/conf.d: Directory renamed before its status could be extracted
tar: etc/fonts: Directory renamed before its status could be extracted
tar: etc/xdg/systemd: Directory renamed before its status could be extracted
tar: etc/xdg: Directory renamed before its status could be extracted
tar: etc/sgml: Directory renamed before its status could be extracted
tar: etc/apparmor/init/network-interface-security: Directory renamed before its status could be extracted
tar: etc/apparmor/init: Directory renamed before its status could be extracted
tar: etc/apparmor: Directory renamed before its status could be extracted
tar: etc/rc2.d: Directory renamed before its status could be extracted
tar: etc/rc3.d: Directory renamed before its status could be extracted
tar: etc/ssl/certs: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: etc/ssl: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: etc/rc0.d: Directory renamed before its status could be extracted
tar: etc/modules-load.d: Directory renamed before its status could be extracted
tar: etc/rc4.d: Directory renamed before its status could be extracted
tar: etc/ifplugd/action.d: Directory renamed before its status could be extracted
tar: etc/ifplugd: Directory renamed before its status could be extracted
tar: etc/network/if-pre-up.d: Directory renamed before its status could be extracted
tar: etc/network/if-down.d: Directory renamed before its status could be extracted
tar: etc/network/if-up.d: Directory renamed before its status could be extracted
tar: etc/network/if-post-down.d: Directory renamed before its status could be extracted
tar: etc/network: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: etc/newt: Directory renamed before its status could be extracted
tar: etc/modprobe.d: Directory renamed before its status could be extracted
tar: etc/apm/suspend.d: Directory renamed before its status could be extracted
tar: etc/apm/resume.d: Directory renamed before its status could be extracted
tar: etc/apm: Directory renamed before its status could be extracted
tar: etc/rcS.d: Directory renamed before its status could be extracted
tar: etc/kernel/postinst.d: Directory renamed before its status could be extracted
tar: etc/kernel: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: etc/sysctl.d: Directory renamed before its status could be extracted
tar: etc/rc1.d: Directory renamed before its status could be extracted
tar: etc/rc6.d: Directory renamed before its status could be extracted
tar: etc/systemd/user/default.target.wants: Directory renamed before its status could be extracted
tar: etc/systemd/user: Directory renamed before its status could be extracted
tar: etc/systemd/system/bluetooth.target.wants: Directory renamed before its status could be extracted
tar: etc/systemd/system/paths.target.wants: Directory renamed before its status could be extracted
tar: etc/systemd/system/systemd-resolved.service.wants: Directory renamed before its status could be extracted
tar: etc/systemd/system/graphical.target.wants: Directory renamed before its status could be extracted
tar: etc/systemd/system/network-online.target.wants: Directory renamed before its status could be extracted
tar: etc/systemd/system/spice-vdagentd.target.wants: Directory renamed before its status could be extracted
tar: etc/systemd/system/multi-user.target.wants: Directory renamed before its status could be extracted
tar: etc/systemd/system/remote-fs.target.wants: Directory renamed before its status could be extracted
tar: etc/systemd/system/timers.target.wants: Directory renamed before its status could be extracted
tar: etc/systemd/system/sysinit.target.wants: Directory renamed before its status could be extracted
tar: etc/systemd/system/sockets.target.wants: Directory renamed before its status could be extracted
tar: etc/systemd/system/cloud-final.service.wants: Directory renamed before its status could be extracted
tar: etc/systemd/system/default.target.wants: Directory renamed before its status could be extracted
tar: etc/systemd/system/final.target.wants: Directory renamed before its status could be extracted
tar: etc/systemd/system/getty.target.wants: Directory renamed before its status could be extracted
tar: etc/systemd/system: Directory renamed before its status could be extracted
tar: etc/systemd: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: etc/dictionaries-common: Directory renamed before its status could be extracted
tar: etc/rc5.d: Directory renamed before its status could be extracted
tar: etc: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: bin: Cannot change ownership to uid 0, gid 0: Operation not permitted
tar: Exiting with failure status due to previous errors

7.I persist and follow the steps.
$ cd ..
$ sudo ./apply_binaries.sh

8.The above command outputs the following:
Using rootfs directory of: /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/rootfs install: cannot change owner and permissions of ‘/media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/rootfs’: Operation not permitted

9.Still I persist and follow the steps to flash. Have also attached those logs below:
sudo ./flash.sh ${BOARD} mmcblk0p1

[   3.6142 ] Assuming zero filled SBK key
[   3.6147 ] 
[   3.6147 ] Updating BCT with signature
[   3.6157 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x19 0 --updatesig bct_list_signed.xml
[   3.6167 ] 
[   3.6168 ] Generating coldboot mb1-bct
[   3.6342 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_cold_boot_bct.cfg --sdram /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1.cfg --misc tegra194-mb1-bct-misc-l4t.cfg --scr tegra194-mb1-bct-scr-cbb-mini.cfg --pinmux tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg --pmc tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg --pmic tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg --brcommand tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg --prod tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg --gpioint tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg --uphy tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg --device tegra19x-mb1-bct-device-sdmmc.cfg
[   3.6359 ] MB1-BCT version: 0x1

[   3.6362 ] Parsing config file :tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg 
[   3.6366 ] Added Platform Config 0 data with size :- 3008

[   3.6389 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini.cfg 
[   3.6391 ] Added Platform Config 1 data with size :- 19640

[   3.6566 ] Parsing config file :tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg 
[   3.6571 ] Added Platform Config 2 data with size :- 24

[   3.6661 ] Parsing config file :tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg 
[   3.6665 ] Added Platform Config 4 data with size :- 348

[   3.6676 ] Parsing config file :tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg 
[   3.6680 ] Added Platform Config 3 data with size :- 92

[   3.6682 ] Parsing config file :tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg 
[   3.6686 ] Added Platform Config 5 data with size :- 56

[   3.6688 ] Parsing config file :tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg 
[   3.6691 ] Added Platform Config 7 data with size :- 392

[   3.6695 ] Parsing config file :tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg 
[   3.6698 ] Added Platform Config 8 data with size :- 12
[   3.6701 ] 
[   3.6701 ] Parsing config file :tegra19x-mb1-bct-device-sdmmc.cfg 
[   3.6701 ] Added Platform Config 9 data with size :- 32
[   3.6701 ] 
[   3.6701 ] Updating mb1-bct with firmware information
[   3.6711 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[   3.6719 ] MB1-BCT version: 0x1
[   3.6721 ] 
[   3.6721 ] Updating mb1-bct with storage information
[   3.6731 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   3.6740 ] MB1-BCT version: 0x1
[   3.6742 ] 
[   3.6749 ] tegrahost_v2 --chip 0x19 --align mb1_cold_boot_bct_MB1.bct
[   3.6758 ] 
[   3.6767 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[   3.6776 ] adding BCH for mb1_cold_boot_bct_MB1.bct
[   3.6783 ] 
[   3.6977 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml
[   3.6986 ] Assuming zero filled SBK key
[   3.6990 ] 
[   3.7002 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[   3.7014 ] 
[   3.7014 ] Generating recovery mb1-bct
[   3.7023 ] tegrabct_v2 --chip 0x19 0 --mb1bct mb1_bct.cfg --sdram /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1.cfg --misc tegra194-mb1-bct-misc-flash.cfg --scr tegra194-mb1-bct-scr-cbb-mini.cfg --pinmux tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg --pmc tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg --pmic tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg --brcommand tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg --prod tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg --gpioint tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg --uphy tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg --device tegra19x-mb1-bct-device-sdmmc.cfg
[   3.7031 ] MB1-BCT version: 0x1

[   3.7033 ] Parsing config file :tegra19x-mb1-pinmux-p2888-0000-a04-p2822-0000-b01.cfg 
[   3.7039 ] Added Platform Config 0 data with size :- 3008

[   3.7052 ] Parsing config file :tegra194-mb1-bct-scr-cbb-mini.cfg 
[   3.7054 ] Added Platform Config 1 data with size :- 19640

[   3.7234 ] Parsing config file :tegra19x-mb1-padvoltage-p2888-0000-a00-p2822-0000-a00.cfg 
[   3.7240 ] Added Platform Config 2 data with size :- 24

[   3.7244 ] Parsing config file :tegra194-mb1-bct-pmic-p2888-0001-a04-E-0-p2822-0000.cfg 
[   3.7249 ] Added Platform Config 4 data with size :- 348

[   3.7256 ] Parsing config file :tegra194-mb1-bct-reset-p2888-0000-p2822-0000.cfg 
[   3.7261 ] Added Platform Config 3 data with size :- 92

[   3.7266 ] Parsing config file :tegra19x-mb1-prod-p2888-0000-p2822-0000.cfg 
[   3.7271 ] Added Platform Config 5 data with size :- 56

[   3.7274 ] Parsing config file :tegra194-mb1-bct-gpioint-p2888-0000-p2822-0000.cfg 
[   3.7279 ] Added Platform Config 7 data with size :- 392

[   3.7295 ] Parsing config file :tegra194-mb1-uphy-lane-p2888-0000-p2822-0000.cfg 
[   3.7299 ] Added Platform Config 8 data with size :- 12

[   3.7303 ] Parsing config file :tegra19x-mb1-bct-device-sdmmc.cfg 
[   3.7307 ] Added Platform Config 9 data with size :- 32
[   3.7313 ] 
[   3.7314 ] Updating mb1-bct with firmware information
[   3.7326 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[   3.7334 ] MB1-BCT version: 0x1
[   3.7337 ] 
[   3.7337 ] Updating mb1-bct with storage information
[   3.7345 ] tegrabct_v2 --chip 0x19 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   3.7356 ] MB1-BCT version: 0x1
[   3.7358 ] 
[   3.7367 ] tegrahost_v2 --chip 0x19 --align mb1_bct_MB1.bct
[   3.7376 ] 
[   3.7385 ] tegrahost_v2 --chip 0x19 0 --magicid MBCT --appendsigheader mb1_bct_MB1.bct zerosbk
[   3.7394 ] adding BCH for mb1_bct_MB1.bct
[   3.7401 ] 
[   3.7561 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml
[   3.7597 ] Assuming zero filled SBK key
[   3.7601 ] 
[   3.7615 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[   3.7626 ] 
[   3.7627 ] Generating coldboot mem-bct
[   3.7635 ] tegrabct_v2 --chip 0x19 0 --sdram /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1.cfg --membct /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1_1.bct /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1_2.bct /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1_3.bct /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1_4.bct
[   3.7642 ] Packing sdram param for instance[0]
[   3.8067 ] Packing sdram param for instance[1]
[   3.8069 ] Packing sdram param for instance[2]
[   3.8071 ] Packing sdram param for instance[3]
[   3.8072 ] Packing sdram param for instance[4]
[   3.8074 ] Packing sdram param for instance[5]
[   3.8076 ] Packing sdram param for instance[6]
[   3.8077 ] Packing sdram param for instance[7]
[   3.8077 ] Packing sdram param for instance[8]
[   3.8077 ] Packing sdram param for instance[9]
[   3.8077 ] Packing sdram param for instance[10]
[   3.8077 ] Packing sdram param for instance[11]
[   3.8077 ] Packing sdram param for instance[12]
[   3.8077 ] Packing sdram param for instance[13]
[   3.8077 ] Packing sdram param for instance[14]
[   3.8077 ] Packing sdram param for instance[15]
[   3.8077 ] 
[   3.8077 ] Getting sector size from pt
[   3.8087 ] tegraparser_v2 --getsectorsize flash.xml.bin sector_info.bin
[   3.8096 ] 
[   3.8097 ] BlockSize read from layout is 200

[   3.8104 ] tegrahost_v2 --chip 0x19 0 --blocksize 512 --magicid MEMB --addsigheader_multi /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1_1.bct /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1_2.bct /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1_3.bct /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1_4.bct
[   3.8111 ] adding BCH for /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1_1.bct
[   3.8132 ] 
[   3.8140 ] tegrahost_v2 --chip 0x19 --align mem_coldboot.bct
[   3.8148 ] 
[   3.8156 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --appendsigheader mem_coldboot.bct zerosbk
[   3.8163 ] Header already present for mem_coldboot.bct
[   3.8166 ] 
[   3.8177 ] tegrasign_v2 --key None --list mem_coldboot_sigheader.bct_list.xml
[   3.8185 ] Assuming zero filled SBK key
[   3.8192 ] 
[   3.8208 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_coldboot_sigheader.bct.encrypt mem_coldboot_sigheader.bct.hash zerosbk
[   3.8219 ] 
[   3.8220 ] Generating recovery mem-bct
[   3.8227 ] tegrabct_v2 --chip 0x19 0 --sdram /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1.cfg --membct /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1_1.bct /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1_2.bct /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1_3.bct /media/swaroophs/3766-3034/nvidia/sdkm_downloads/Linux_for_Tegra/bootloader/27824/tmpiFm64u1_4.bct
[   3.8234 ] Packing sdram param for instance[0]
[   3.8606 ] Packing sdram param for instance[1]
[   3.8609 ] Packing sdram param for instance[2]
[   3.8612 ] Packing sdram param for instance[3]
[   3.8614 ] Packing sdram param for instance[4]
[   3.8617 ] Packing sdram param for instance[5]
[   3.8620 ] Packing sdram param for instance[6]
[   3.8623 ] Packing sdram param for instance[7]
[   3.8626 ] Packing sdram param for instance[8]
[   3.8629 ] Packing sdram param for instance[9]
[   3.8631 ] Packing sdram param for instance[10]
[   3.8639 ] Packing sdram param for instance[11]
[   3.8640 ] Packing sdram param for instance[12]
[   3.8640 ] Packing sdram param for instance[13]
[   3.8640 ] Packing sdram param for instance[14]
[   3.8640 ] Packing sdram param for instance[15]
[   3.8640 ] 
[   3.8660 ] tegrahost_v2 --chip 0x19 --align mem_rcm.bct
[   3.8736 ] 
[   3.8749 ] tegrahost_v2 --chip 0x19 0 --magicid MEMB --appendsigheader mem_rcm.bct zerosbk
[   3.8759 ] adding BCH for mem_rcm.bct
[   3.8770 ] 
[   3.8782 ] tegrasign_v2 --key None --list mem_rcm_sigheader.bct_list.xml
[   3.8791 ] Assuming zero filled SBK key
[   3.8795 ] 
[   3.8842 ] tegrahost_v2 --chip 0x19 0 --updatesigheader mem_rcm_sigheader.bct.encrypt mem_rcm_sigheader.bct.hash zerosbk
[   3.8995 ] 
[   3.8997 ] Copying signatures
[   3.9016 ] tegrahost_v2 --chip 0x19 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   4.8577 ] 
[   4.8577 ] Boot Rom communication
[   4.8586 ] tegrarcm_v2 --chip 0x19 0 --rcm rcm_list_signed.xml
[   4.8593 ] BR_CID: 0x88021911647057062400000003038100
[   4.8600 ] RCM version 0X190001
[   4.8604 ] Boot Rom communication completed
[   5.8766 ] 
[   6.8816 ] tegrarcm_v2 --isapplet
[   6.8848 ] Applet version 01.00.0000
[   6.8886 ] 
[   6.8887 ] Sending BCTs
[   6.8919 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt --download bct_mem mem_rcm_sigheader.bct.encrypt
[   6.8951 ] Applet version 01.00.0000
[   6.8990 ] Sending bct_bootrom
[   6.9003 ] [................................................] 100%
[   6.9018 ] Sending bct_mb1
[   6.9046 ] [................................................] 100%
[   6.9090 ] Sending bct_mem
[   6.9596 ] [................................................] 100%
[   7.0662 ] 
[   7.0663 ] Generating blob
[   7.0685 ] tegrahost_v2 --chip 0x19 --align blob_nvtboot_recovery_cpu_t194.bin
[   7.0703 ] 
[   7.0721 ] tegrahost_v2 --chip 0x19 0 --magicid CPBL --appendsigheader blob_nvtboot_recovery_cpu_t194.bin zerosbk
[   7.0740 ] adding BCH for blob_nvtboot_recovery_cpu_t194.bin
[   7.0930 ] 
[   7.0984 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_t194_sigheader.bin_list.xml
[   7.1018 ] Assuming zero filled SBK key
[   7.1052 ] 
[   7.1103 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_nvtboot_recovery_cpu_t194_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_t194_sigheader.bin.hash zerosbk
[   7.1193 ] 
[   7.1217 ] tegrahost_v2 --chip 0x19 --align blob_nvtboot_recovery_t194.bin
[   7.1379 ] 
[   7.1407 ] tegrahost_v2 --chip 0x19 0 --magicid MB2B --appendsigheader blob_nvtboot_recovery_t194.bin zerosbk
[   7.1416 ] adding BCH for blob_nvtboot_recovery_t194.bin
[   7.1472 ] 
[   7.1490 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_t194_sigheader.bin_list.xml
[   7.1503 ] Assuming zero filled SBK key
[   7.1675 ] 
[   7.1693 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_nvtboot_recovery_t194_sigheader.bin.encrypt blob_nvtboot_recovery_t194_sigheader.bin.hash zerosbk
[   7.1715 ] 
[   7.1727 ] tegrahost_v2 --chip 0x19 --align blob_preboot_c10_prod_cr.bin
[   7.1736 ] 
[   7.1800 ] tegrahost_v2 --chip 0x19 0 --magicid MTSP --appendsigheader blob_preboot_c10_prod_cr.bin zerosbk
[   7.1813 ] Header already present for blob_preboot_c10_prod_cr.bin
[   7.1949 ] 
[   7.1966 ] tegrasign_v2 --key None --list blob_preboot_c10_prod_cr_sigheader.bin_list.xml
[   7.1975 ] Assuming zero filled SBK key
[   7.1979 ] 
[   7.1997 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_preboot_c10_prod_cr_sigheader.bin.encrypt blob_preboot_c10_prod_cr_sigheader.bin.hash zerosbk
[   7.2155 ] 
[   7.2208 ] tegrahost_v2 --chip 0x19 --align blob_mce_c10_prod_cr.bin
[   7.2218 ] 
[   7.2226 ] tegrahost_v2 --chip 0x19 0 --magicid MTSM --appendsigheader blob_mce_c10_prod_cr.bin zerosbk
[   7.2235 ] Header already present for blob_mce_c10_prod_cr.bin
[   7.2251 ] 
[   7.2266 ] tegrasign_v2 --key None --list blob_mce_c10_prod_cr_sigheader.bin_list.xml
[   7.2275 ] Assuming zero filled SBK key
[   7.2435 ] 
[   7.2496 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_mce_c10_prod_cr_sigheader.bin.encrypt blob_mce_c10_prod_cr_sigheader.bin.hash zerosbk
[   7.2523 ] 
[   7.2537 ] tegrahost_v2 --chip 0x19 --align blob_mts_c10_prod_cr.bin
[   7.2546 ] 
[   7.2557 ] tegrahost_v2 --chip 0x19 0 --magicid MTSB --appendsigheader blob_mts_c10_prod_cr.bin zerosbk
[   7.2567 ] adding BCH for blob_mts_c10_prod_cr.bin
[   7.3353 ] 
[   7.3366 ] tegrasign_v2 --key None --list blob_mts_c10_prod_cr_sigheader.bin_list.xml
[   7.3374 ] Assuming zero filled SBK key
[   7.3416 ] 
[   7.3430 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_mts_c10_prod_cr_sigheader.bin.encrypt blob_mts_c10_prod_cr_sigheader.bin.hash zerosbk
[   7.3819 ] 
[   7.3833 ] tegrahost_v2 --chip 0x19 --align blob_bpmp_t194.bin
[   7.3885 ] 
[   7.3896 ] tegrahost_v2 --chip 0x19 0 --magicid BPMF --appendsigheader blob_bpmp_t194.bin zerosbk
[   7.3905 ] adding BCH for blob_bpmp_t194.bin
[   7.4102 ] 
[   7.4202 ] tegrasign_v2 --key None --list blob_bpmp_t194_sigheader.bin_list.xml
[   7.4211 ] Assuming zero filled SBK key
[   7.4225 ] 
[   7.4236 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_bpmp_t194_sigheader.bin.encrypt blob_bpmp_t194_sigheader.bin.hash zerosbk
[   7.4475 ] 
[   7.4505 ] tegrahost_v2 --chip 0x19 --align blob_tegra194-a02-bpmp-p2888-a04.dtb
[   7.4515 ] 
[   7.4523 ] tegrahost_v2 --chip 0x19 0 --magicid BPMD --appendsigheader blob_tegra194-a02-bpmp-p2888-a04.dtb zerosbk
[   7.4531 ] adding BCH for blob_tegra194-a02-bpmp-p2888-a04.dtb
[   7.4755 ] 
[   7.4844 ] tegrasign_v2 --key None --list blob_tegra194-a02-bpmp-p2888-a04_sigheader.dtb_list.xml
[   7.4853 ] Assuming zero filled SBK key
[   7.4865 ] 
[   7.4878 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt blob_tegra194-a02-bpmp-p2888-a04_sigheader.dtb.hash zerosbk
[   7.4958 ] 
[   7.5126 ] tegrahost_v2 --chip 0x19 --align blob_spe_t194.bin
[   7.5137 ] 
[   7.5146 ] tegrahost_v2 --chip 0x19 0 --magicid SPEF --appendsigheader blob_spe_t194.bin zerosbk
[   7.5154 ] adding BCH for blob_spe_t194.bin
[   7.5172 ] 
[   7.5183 ] tegrasign_v2 --key None --list blob_spe_t194_sigheader.bin_list.xml
[   7.5195 ] Assuming zero filled SBK key
[   7.5202 ] 
[   7.5217 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_spe_t194_sigheader.bin.encrypt blob_spe_t194_sigheader.bin.hash zerosbk
[   7.5241 ] 
[   7.5255 ] tegrahost_v2 --chip 0x19 --align blob_tos-trusty_t194.img
[   7.5433 ] 
[   7.5443 ] tegrahost_v2 --chip 0x19 0 --magicid TOSB --appendsigheader blob_tos-trusty_t194.img zerosbk
[   7.5451 ] adding BCH for blob_tos-trusty_t194.img
[   7.5513 ] 
[   7.5529 ] tegrasign_v2 --key None --list blob_tos-trusty_t194_sigheader.img_list.xml
[   7.5538 ] Assuming zero filled SBK key
[   7.5547 ] 
[   7.5602 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_tos-trusty_t194_sigheader.img.encrypt blob_tos-trusty_t194_sigheader.img.hash zerosbk
[   7.5773 ] 
[   7.5784 ] tegrahost_v2 --chip 0x19 --align blob_eks.img
[   7.5792 ] 
[   7.5800 ] tegrahost_v2 --chip 0x19 0 --magicid EKSB --appendsigheader blob_eks.img zerosbk
[   7.5810 ] adding BCH for blob_eks.img
[   7.5812 ] 
[   7.5826 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml
[   7.5835 ] Assuming zero filled SBK key
[   7.5840 ] 
[   7.5854 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[   7.5864 ] 
[   7.5924 ] tegrahost_v2 --chip 0x19 --align blob_tegra194-p2888-0001-p2822-0000.dtb
[   7.6061 ] 
[   7.6071 ] tegrahost_v2 --chip 0x19 0 --magicid CDTB --appendsigheader blob_tegra194-p2888-0001-p2822-0000.dtb zerosbk
[   7.6079 ] adding BCH for blob_tegra194-p2888-0001-p2822-0000.dtb
[   7.6136 ] 
[   7.6153 ] tegrasign_v2 --key None --list blob_tegra194-p2888-0001-p2822-0000_sigheader.dtb_list.xml
[   7.6162 ] Assuming zero filled SBK key
[   7.6170 ] 
[   7.6187 ] tegrahost_v2 --chip 0x19 0 --updatesigheader blob_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt blob_tegra194-p2888-0001-p2822-0000_sigheader.dtb.hash zerosbk
[   7.6402 ] 
[   7.6414 ] tegrahost_v2 --chip 0x19 --generateblob blob.xml blob.bin
[   7.6422 ] number of images in blob are 11
[   7.6424 ] blobsize is 6080728
[   7.6425 ] Added binary blob_nvtboot_recovery_cpu_t194_sigheader.bin.encrypt of size 236912
[   7.6459 ] Added binary blob_nvtboot_recovery_t194_sigheader.bin.encrypt of size 129808
[   7.6463 ] Added binary blob_preboot_c10_prod_cr_sigheader.bin.encrypt of size 23968
[   7.6466 ] Added binary blob_mce_c10_prod_cr_sigheader.bin.encrypt of size 144144
[   7.6469 ] Added binary blob_mts_c10_prod_cr_sigheader.bin.encrypt of size 3372048
[   7.6486 ] Added binary blob_bpmp_t194_sigheader.bin.encrypt of size 853856
[   7.6500 ] Added binary blob_tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt of size 610048
[   7.6505 ] Added binary blob_spe_t194_sigheader.bin.encrypt of size 94960
[   7.6509 ] Added binary blob_tos-trusty_t194_sigheader.img.encrypt of size 324608
[   7.6513 ] Added binary blob_eks_sigheader.img.encrypt of size 5136
[   7.6517 ] Added binary blob_tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt of size 285056
[   7.6569 ] 
[   7.6570 ] Sending bootloader and pre-requisite binaries
[   7.6718 ] tegrarcm_v2 --download blob blob.bin
[   7.6727 ] Applet version 01.00.0000
[   7.6754 ] Sending blob
[   7.6754 ] [................................................] 100%
[   8.5395 ] 
[   8.5431 ] tegrarcm_v2 --boot recovery
[   8.5462 ] Applet version 01.00.0000
[   8.5543 ] 
[   9.5593 ] tegrarcm_v2 --isapplet
[   9.8630 ] 
[   9.8669 ] tegrarcm_v2 --ismb2
[   9.8725 ] 
[   9.8904 ] tegradevflash_v2 --iscpubl
[   9.8944 ] Bootloader version 01.00.0000
[   9.9034 ] Bootloader version 01.00.0000
[   9.9035 ] 
[   9.9037 ] Retrieving storage infomation
[   9.9100 ] tegrarcm_v2 --oem platformdetails storage storage_info.bin
[   9.9138 ] Applet is not running on device. Continue with Bootloader
[   9.9332 ] 
[   9.9493 ] tegradevflash_v2 --oem platformdetails storage storage_info.bin
[   9.9691 ] Bootloader version 01.00.0000
[   9.9822 ] Saved platform info in storage_info.bin
[   9.9836 ] 
[   9.9838 ] Flashing the device
[  10.0003 ] tegraparser_v2 --storageinfo storage_info.bin --generategpt --pt flash.xml.bin
[  10.0031 ] 
[  10.0051 ] tegradevflash_v2 --pt flash.xml.bin --create
[  10.0148 ] Bootloader version 01.00.0000
[  10.0224 ] Erasing sdmmc_boot: 3 ......... [Done]
[  11.1194 ] Writing partition secondary_gpt with gpt_secondary_0_3.bin
[  11.1209 ] [................................................] 100%

[  11.1237 ] Erasing sdmmc_user: 3 ......... [Done]
[  11.5301 ] Writing partition master_boot_record with mbr_1_3.bin
[  11.5315 ] [................................................] 100%
[  11.5331 ] Writing partition primary_gpt with gpt_primary_1_3.bin
[  11.5345 ] [................................................] 100%
[  11.5357 ] Writing partition secondary_gpt with gpt_secondary_1_3.bin
[  11.5389 ] [................................................] 100%

[  11.5415 ] Writing partition mb1 with mb1_t194_prod_sigheader.bin.encrypt
[  11.5436 ] [................................................] 100%
[  11.5537 ] Writing partition mb1_b with mb1_t194_prod_sigheader.bin.encrypt
[  11.6485 ] [................................................] 100%
[  11.6664 ] Writing partition spe-fw with spe_t194_sigheader.bin.encrypt
[  11.6768 ] [................................................] 100%
[  11.6805 ] Writing partition spe-fw_b with spe_t194_sigheader.bin.encrypt
[  11.6860 ] [................................................] 100%
[  11.6901 ] Writing partition mb2 with nvtboot_t194_sigheader.bin.encrypt
[  11.6954 ] [................................................] 100%
[  11.7028 ] Writing partition mb2_b with nvtboot_t194_sigheader.bin.encrypt
[  11.7096 ] [................................................] 100%
[  11.7166 ] Writing partition mts-preboot with preboot_c10_prod_cr_sigheader.bin.encrypt
[  11.7228 ] [................................................] 100%
[  11.7243 ] Writing partition mts-preboot_b with preboot_c10_prod_cr_sigheader.bin.encrypt
[  11.7269 ] [................................................] 100%
[  11.7286 ] Writing partition SMD with slot_metadata.bin
[  11.7315 ] [................................................] 100%
[  11.7465 ] Writing partition SMD_b with slot_metadata.bin
[  11.7478 ] [................................................] 100%
[  11.7489 ] Writing partition master_boot_record with mbr_1_3.bin
[  11.7513 ] [................................................] 100%
[  11.7525 ] Writing partition APP with system.img
[  11.7553 ] [................................................] 100%
[ 185.9003 ] Writing partition mts-mce with mce_c10_prod_cr_sigheader.bin.encrypt
[ 185.9169 ] [................................................] 100%
[ 185.9214 ] Writing partition mts-mce_b with mce_c10_prod_cr_sigheader.bin.encrypt
[ 185.9249 ] [................................................] 100%
[ 185.9299 ] Writing partition mts-proper with mts_c10_prod_cr_sigheader.bin.encrypt
[ 185.9327 ] [................................................] 100%
[ 186.0505 ] Writing partition mts-proper_b with mts_c10_prod_cr_sigheader.bin.encrypt
[ 186.0646 ] [................................................] 100%
[ 186.2096 ] Writing partition cpu-bootloader with cboot_t194_sigheader.bin.encrypt
[ 186.2139 ] [................................................] 100%
[ 186.2264 ] Writing partition cpu-bootloader_b with cboot_t194_sigheader.bin.encrypt
[ 186.2326 ] [................................................] 100%
[ 186.2448 ] Writing partition bootloader-dtb with tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt
[ 186.2498 ] [................................................] 100%
[ 186.2598 ] Writing partition bootloader-dtb_b with tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt
[ 186.2645 ] [................................................] 100%
[ 186.2724 ] Writing partition secure-os with tos-trusty_t194_sigheader.img.encrypt
[ 186.2767 ] [................................................] 100%
[ 186.2858 ] Writing partition secure-os_b with tos-trusty_t194_sigheader.img.encrypt
[ 186.2896 ] [................................................] 100%
[ 186.2993 ] Writing partition eks with eks_sigheader.img.encrypt
[ 186.3053 ] [................................................] 100%
[ 186.3065 ] Writing partition eks_b with eks_sigheader.img.encrypt
[ 186.3081 ] [................................................] 100%
[ 186.3094 ] Writing partition bpmp-fw with bpmp_t194_sigheader.bin.encrypt
[ 186.3110 ] [................................................] 100%
[ 186.3344 ] Writing partition bpmp-fw_b with bpmp_t194_sigheader.bin.encrypt
[ 186.3463 ] [................................................] 100%
[ 186.3690 ] Writing partition bpmp-fw-dtb with tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt
[ 186.3785 ] [................................................] 100%
[ 186.3950 ] Writing partition bpmp-fw-dtb_b with tegra194-a02-bpmp-p2888-a04_sigheader.dtb.encrypt
[ 186.4017 ] [................................................] 100%
[ 186.4186 ] Writing partition xusb-fw with xusb_sil_rel_fw
[ 186.4249 ] [................................................] 100%
[ 186.4510 ] Writing partition xusb-fw_b with xusb_sil_rel_fw
[ 186.4533 ] [................................................] 100%
[ 186.4581 ] Writing partition rce-fw with camera-rtcpu-rce_sigheader.img.encrypt
[ 186.4605 ] [................................................] 100%
[ 186.4681 ] Writing partition rce-fw_b with camera-rtcpu-rce_sigheader.img.encrypt
[ 186.4740 ] [................................................] 100%
[ 186.4821 ] Writing partition adsp-fw with adsp-fw_sigheader.bin.encrypt
[ 186.4864 ] [................................................] 100%
[ 186.4900 ] Writing partition adsp-fw_b with adsp-fw_sigheader.bin.encrypt
[ 186.4921 ] [................................................] 100%
[ 186.4960 ] Writing partition sc7 with warmboot_t194_prod_sigheader.bin.encrypt
[ 186.4997 ] [................................................] 100%
[ 186.5019 ] Writing partition sc7_b with warmboot_t194_prod_sigheader.bin.encrypt
[ 186.5046 ] [................................................] 100%
[ 186.5068 ] Writing partition BMP with bmp.blob
[ 186.5090 ] [................................................] 100%
[ 186.5138 ] Writing partition BMP_b with bmp.blob
[ 186.5156 ] [................................................] 100%
[ 186.5183 ] Writing partition kernel with boot_sigheader.img.encrypt
[ 186.5204 ] [................................................] 100%
[ 187.9750 ] Writing partition kernel_b with boot_sigheader.img.encrypt
[ 187.9844 ] [................................................] 100%
[ 189.4708 ] Writing partition kernel-dtb with tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt
[ 189.4805 ] [................................................] 100%
[ 189.4889 ] Writing partition kernel-dtb_b with tegra194-p2888-0001-p2822-0000_sigheader.dtb.encrypt
[ 189.4959 ] [................................................] 100%
[ 189.5086 ] 
[ 189.5104 ] tegradevflash_v2 --write BCT br_bct_BR.bct
[ 189.5119 ] Bootloader version 01.00.0000
[ 189.5137 ] Writing partition BCT with br_bct_BR.bct
[ 189.5141 ] [................................................] 100%
[ 189.5323 ] 
[ 189.5572 ] tegradevflash_v2 --write MB1_BCT mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 189.5616 ] Bootloader version 01.00.0000
[ 189.5636 ] Writing partition MB1_BCT with mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 189.5645 ] [................................................] 100%
[ 189.5802 ] 
[ 189.5826 ] tegradevflash_v2 --write MB1_BCT_b mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 189.6043 ] Bootloader version 01.00.0000
[ 189.6123 ] Writing partition MB1_BCT_b with mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 189.6130 ] [................................................] 100%
[ 189.6360 ] 
[ 189.6490 ] tegradevflash_v2 --write MEM_BCT mem_coldboot_sigheader.bct.encrypt
[ 189.6501 ] Bootloader version 01.00.0000
[ 189.6519 ] Writing partition MEM_BCT with mem_coldboot_sigheader.bct.encrypt
[ 189.6523 ] [................................................] 100%
[ 189.6872 ] 
[ 189.6978 ] tegradevflash_v2 --write MEM_BCT_b mem_coldboot_sigheader.bct.encrypt
[ 189.6989 ] Bootloader version 01.00.0000
[ 189.7005 ] Writing partition MEM_BCT_b with mem_coldboot_sigheader.bct.encrypt
[ 189.7009 ] [................................................] 100%
[ 189.7289 ] 
[ 189.7289 ] Flashing completed

[ 189.7290 ] Coldbooting the device
[ 189.7303 ] tegrarcm_v2 --ismb2
[ 189.7454 ] 
[ 189.7465 ] tegradevflash_v2 --reboot coldboot
[ 189.7474 ] Bootloader version 01.00.0000
[ 189.7654 ] 
*** The target t186ref has been flashed successfully. ***
Reset the board to boot from internal eMMC.

10.Still see the same boot sequence. This time, I used minicom to get the serial logs of the boot sequence. I tried to optimize the number of boots in this log so it is not redundant. You can find this in this attached file. reboot_log_copy (251.5 KB)

Please let me know if there is anything else I can provide to help debug this.

FYI: This Xavier had a working Jetpack version 4.3 with correct bootup and OS, and we tried to downgrade version since one of our camera boards was not operating as expected…

Ahh, that’s it! You are using an SD card, and it is not formatted with a Linux filesystem type. Without that permissions cannot be preserved. For example, there is no such thing as a Windows filesystem with “group”, “sticky bit”, “suid”, or “guid” bits.

You will have to reformat your SD card where you keep this to ext4. It seems your SD card is currently something like VFAT or NTFS. Windows won’t be able to use that partition, but flash steps should probably work after that without the permissions errors.

Thanks! I reformatted the SD card with ext4 and repeated the steps and that resulted in a successful flash process!

Thanks again for all the help.