[Jetson Orin Nano] [OTA] [35.5.0][36.3] Failed to boot after OTA upgrade from 35.5.0 to 36.3

@KevinFFF I’ve tried and am seeing the same problem:

�k Running
SHA Task Started
DCE: FW Boot Complete
Admin Task Running
SHA Task Running
��I> strt_pg_num(30488) num_of_pgs(512) read_buf(0x82e043f80)
I> strt_pg_num(31000) num_of_pgs(512) read_buf(0x82e083f80)
I> cpubl : decompressed to 3649664 bytes
I> cpubl: plain binary integrity check is success
I> Partition name: A_secure-os
I> Size of partition: 4194304
I> Binary@ device:3/0 block-32000 (partition size: 0x400000), name: A_secure-os
I> strt_pg_num(32000) num_of_pgs(16) read_buf(0x40066880)
I> strt_pg_num(32016) num_of_pgs(3104) read_buf(0x83fd7c000)
I> MB2-params @ 0x40060000
I> NSDRAM carveout base: 0x80000000, size: 0x7acdf0000
I> cpubl_params: nsdram: carveout: 1, encryption: 1
I> cpubl: Authentication Finalize Done
I> Binary cpubl loaded successfully at 0x82c800000
I> tos: Authentication Finalize Done
I> Binary tos loaded successfully at 0x83fd7c000
I> Relocating OP-TEE dtb from: 0x83feff0f0 to 0x83c040020, size: 0x2889
I> [0] START: 0x80000000, SIZE: 0x7acdf0000
I> [1] START: 0x832000000, SIZE: 0x2000000
I> Setting NS memory ranges to OP-TEE dtb finished.
I> Partition name: A_eks
I> Size of partition: 262144
I> Binary@ device:3/0 block-44288 (partition size: 0x40000), name: A_eks
I> strt_pg_num(44288) num_of_pgs(16) read_buf(0x40066880)
I> strt_pg_num(44304) num_of_pgs(8) read_buf(0x83c020000)
I> eks: Authentication Finalize Done
I> Binary eks loaded successfully at 0x83c020000
I> EKB detected (length: 0x410) @ VA:0x83c020000
I> Task: Add cpubl params integrity check
I> Added cpubl params digest.
I> Task: Prepare TOS params
I> Setting EKB blob info to OPTEE dtb finished.
I> Setting OPTEE arg3: 0x83c040020
I> NVRNG: Health check success
I> NVRNG: Health check success
I> Task: OEM SC7 context save
I> OEM sc7 context saved
I> Task: Disable MSS perf stats
I> Task: Program display sticky bits
I> Task: Storage device deinit
I> Task: SMMU external bypass disable
I> Task: SMMU init
I> Task: Program GICv3 registers
I> Task: Audit firewall settings
I> Task: Bootchain failure check
I> Current Boot-Chain Slot: 0
I> BR-BCT Boot-Chain is 0, and status is 1. Set UPDATE_BRBCT bit to 0
I> Task: Burn RESERVED_ODM0 fuse
I> Task: Lock fusing
I> Task: Clear dec source key
I> MB2 finished

��NOTICE:  BL31: v2.8(release):
NOTICE:  BL31: Built : 18:49:22, Jun 25 2024
I/TC: 
I/TC: Non-secure external DT found
I/TC: OP-TEE version: 3.22 (gcc version 11.3.0 (Buildroot 2022.08)) #2 Tue Jun 25 15:48:24 UTC 2024 aarch64
I/TC: WARNING: This OP-TEE configuration might be insecure!
I/TC: WARNING: Please check https://optee.readthedocs.io/en/latest/architecture/porting_guidelines.html
I/TC: Primary CPU initializing
I/TC: Test OEM keys are being used. This is insecure for shipping products!
I/TC: Primary CPU switching to normal world boot
Unhandled Exception from EL1
x0             = 0x0edc921a7260d168
x1             = 0xb7b456695649ad6f
x2             = 0x00000000000f4240
x3             = 0x0000000081000000
x4             = 0x0000000000000001
x5             = 0x000000083c1ead38
x6             = 0xffffffffffffffff
x7             = 0x000000083c261ef0
x8             = 0x0000000000000020
x9             = 0x000000083c261ef0
x10            = 0x00000000000010c0
x11            = 0x0000000000000000
x12            = 0x00000000ffffffd8
x13            = 0x000000083c10e755
x14            = 0x000000083c261f94
x15            = 0x0000000842240020
x16            = 0x000000083c0af1c8
x17            = 0x0000000000000000
x18            = 0x000000083c261f44
x19            = 0x0000000000000000
x20            = 0x000000083c040020
x21            = 0x000000083c278b10
x22            = 0x000000083c1eb520
x23            = 0x0000000000000000
x24            = 0x0000000000000000
x25            = 0x0000000000000000
x26            = 0x0000000000000000
x27            = 0x0000000000000000
x28            = 0x0000000000000000
x29            = 0x0000000000000000
x30            = 0x000000083c080170
scr_el3        = 0x0000000000000e34
sctlr_el3      = 0x0000000030cd183f
cptr_el3       = 0x0000000000000000
tcr_el3        = 0x0000000080823518
daif           = 0x00000000000002c0
mair_el3       = 0x00000000004404ff
spsr_el3       = 0x00000000600003c4
elr_el3        = 0x000000083c08017c
ttbr0_el3      = 0x0000000050023e01
esr_el3        = 0x0000000062320802
far_el3        = 0x0000000000000000
spsr_el1       = 0x0000000000000000
elr_el1        = 0x0000000000000000
spsr_abt       = 0x0000000000000000
spsr_und       = 0x0000000000000000
spsr_irq       = 0x0000000000000000
spsr_fiq       = 0x0000000000000000
sctlr_el1      = 0x0000000030d8180d
actlr_el1      = 0x0000000000000000
cpacr_el1      = 0x0000000000000000
csselr_el1     = 0x0000000000000000
sp_el1         = 0x000000083c1eb520
esr_el1        = 0x0000000000000000
ttbr0_el1      = 0x000000083c24b000
ttbr1_el1      = 0x0000000000000000
mair_el1       = 0x00000000ff00ff04
amair_el1      = 0x0000000000000000
tcr_el1        = 0x0000000280803f1a
tpidr_el1      = 0x0000000000000000
tpidr_el0      = 0x0000000000000000
tpidrro_el0    = 0x0000000000000000
par_el1        = 0xff0000083c22e980
mpidr_el1      = 0x0000000081000000
afsr0_el1      = 0x0000000000000000
afsr1_el1      = 0x0000000000000000
contextidr_el1 = 0x0000000000000000
vbar_el1       = 0x000000083c083000
cntp_ctl_el0   = 0x0000000000000000
cntp_cval_el0  = 0x0000000000000000
cntv_ctl_el0   = 0x0000000000000000
cntv_cval_el0  = 0x0000000000000000
cntkctl_el1    = 0x0000000000000000
sp_el0         = 0x0000000050016bf0
isr_el1        = 0x0000000000000000
cpuectlr_el1   = 0xa000000b40543000
gicd_ispendr regs (Offsets 0x200 - 0x278)
 Offset:                        value
0000000000000200:               0x0000000000000000
0000000000000204:               0x0000000000000000
0000000000000208:               0x0000000000000000
000000000000020c:               0x0000000000000000
0000000000000210:               0x0000000000000000
0000000000000214:               0x0000000000000000
0000000000000218:               0x0000000000000000
000000000000021c:               0x0000000000020000
0000000000000220:               0x0000000000000000
0000000000000224:               0x0000000000000000
0000000000000228:               0x0000000000000000
000000000000022c:               0x0000000000000000
0000000000000230:               0x0000000000000000
0000000000000234:               0x0000000000000000
0000000000000238:               0x0000000000000000
000000000000023c:               0x0000000000000000
0000000000000240:               0x0000000000000000
0000000000000244:               0x0000000000000000
0000000000000248:               0x0000000000000000
000000000000024c:               0x0000000000000000
0000000000000250:               0x0000000000000000
0000000000000254:               0x0000000000000000
0000000000000258:               0x0000000000000000
000000000000025c:               0x0000000000000000
0000000000000260:               0x0000000000000000
0000000000000264:               0x0000000000000000
0000000000000268:               0x0000000000000000
000000000000026c:               0x0000000000000000
0000000000000270:               0x0000000000000000
0000000000000274:               0x0000000000000000
0000000000000278:               0x0000000000000000
000000000000027c:               0x0000000000000000

Do you enable both disk-encryption and UEFI secureboot in R36.3?
If so, it seems there’re still some issues to enable both in JP6.

No, I’m not using secureboot nor disk-encryption @KevinFFF

Why you add ROOTFS_ENC=1 in your command if you don’t enable disk-encryption?

@KevinFFF I’m sorry, can you please point me to where I’m adding ROOTFS_ENC=1 in my command?

If you are referring to the topmost post, then that is not written by me.

Sorry that I mis-understand the details in your case.
Could you help to open another topic and share all your steps for us to verify?

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.