Hi,
I compiled the meta-tegra (thud-r32.4.3) branch with meta-sol (zeus-r32.3.1) and successfully generated the flash package. When I try to flash this on Jetson TX2 board (fab=D02) the flash process completes successfully, however it does not boot up after that. It is also not detected using “lsusb” command.
I am posting the flash logs below:
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0017 ] Generating RCM messages
[ 0.0025 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[ 0.0033 ] RCM 0 is saved as rcm_0.rcm
[ 0.0037 ] RCM 1 is saved as rcm_1.rcm
[ 0.0037 ] List of rcm files are saved in rcm_list.xml
[ 0.0037 ]
[ 0.0037 ] Signing RCM messages
[ 0.0046 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0053 ] Assuming zero filled SBK key
[ 0.0082 ]
[ 0.0083 ] Copying signature to RCM mesages
[ 0.0092 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[ 0.0102 ]
[ 0.0103 ] Boot Rom communication
[ 0.0114 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[ 0.0121 ] BR_CID: 0x81801001640971c01800000002030500
[ 0.0398 ] RCM version 0X180001
[ 0.0849 ] Boot Rom communication completed
[ 1.0918 ]
[ 2.0966 ] tegrarcm_v2 --isapplet
[ 2.0995 ] Applet version 01.00.0000
[ 2.1744 ]
[ 2.1782 ] Retrieving EEPROM data
[ 2.1786 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/ubuntu/sol_flash_tx2_23Feb/cvm.bin.QbrI7
[ 2.1813 ] Applet version 01.00.0000
[ 2.2706 ] Saved platform info in /home/ubuntu/sol_flash_tx2_23Feb/cvm.bin.QbrI7
[ 2.3440 ] Welcome to Tegra Flash version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0008 ] tegrasign_v2 --key None --getmode mode.txt
[ 0.0015 ] Assuming zero filled SBK key
[ 0.0017 ]
[ 0.0018 ] Generating RCM messages
[ 0.0026 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[ 0.0033 ] RCM 0 is saved as rcm_0.rcm
[ 0.0036 ] RCM 1 is saved as rcm_1.rcm
[ 0.0036 ] List of rcm files are saved in rcm_list.xml
[ 0.0036 ]
[ 0.0036 ] Signing RCM messages
[ 0.0044 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0051 ] Assuming zero filled SBK key
[ 0.0078 ]
[ 0.0078 ] Copying signature to RCM mesages
[ 0.0085 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[ 0.0095 ]
[ 0.0096 ] Parsing partition layout
[ 0.0104 ] tegraparser_v2 --pt flash.xml.tmp
[ 0.0116 ]
[ 0.0116 ] Creating list of images to be signed
[ 0.0125 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[ 0.0373 ]
[ 0.0374 ] Generating signatures
[ 0.0383 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[ 0.0390 ] Assuming zero filled SBK key
[ 0.2741 ]
[ 0.2741 ] Generating br-bct
[ 0.2753 ] Updating dev and MSS params in BR BCT
[ 0.2754 ] tegrabct_v2 --dev_param emmc.cfg --sdram jetson-tx2-sol-redundant-live.cfg --brbct br_bct.cfg --chip 0x18 0
[ 0.2978 ]
[ 0.2979 ] Updating bl info
[ 0.2990 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[ 0.3006 ]
[ 0.3006 ] Updating smd info
[ 0.3014 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[ 0.3025 ]
[ 0.3025 ] Updating Odmdata
[ 0.3035 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x1090000
[ 0.3045 ]
[ 0.3046 ] Get Signed section of bct
[ 0.3054 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[ 0.3066 ]
[ 0.3077 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key
[ 0.3085 ] Assuming zero filled SBK key
[ 0.3091 ]
[ 0.3092 ] Updating BCT with signature
[ 0.3100 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml
[ 0.3110 ]
[ 0.3110 ] Generating coldboot mb1-bct
[ 0.3118 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram jetson-tx2-sol-redundant-live.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 0.3125 ] MB1-BCT version: 0xf
[ 0.3126 ] Packing sdram param for instance[0]
[ 0.3352 ] Packing sdram param for instance[1]
[ 0.3356 ] Packing sdram param for instance[2]
[ 0.3359 ] Packing sdram param for instance[3]
[ 0.3363 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg
[ 0.3370 ] Appending platform config data of size :- 3032
[ 0.3371 ]
[ 0.3371 ] Parsing config file :mobile_scr.cfg
[ 0.3371 ] Appending platform config data of size :- 12240
[ 0.3371 ]
[ 0.3371 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg
[ 0.3371 ] Appending platform config data of size :- 24
[ 0.3371 ]
[ 0.3371 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg
[ 0.3371 ] Appending platform config data of size :- 672
[ 0.3371 ]
[ 0.3372 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg
[ 0.3372 ] Appending platform config data of size :- 64
[ 0.3372 ]
[ 0.3372 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 0.3372 ] Appending platform config data of size :- 1628
[ 0.3372 ]
[ 0.3373 ] Updating mb1-bct with firmware information
[ 0.3384 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 0.3393 ] MB1-BCT version: 0xf
[ 0.3397 ]
[ 0.3398 ] Updating mb1-bct with storage information
[ 0.3407 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 0.3415 ] MB1-BCT version: 0xf
[ 0.3419 ]
[ 0.3427 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[ 0.3435 ]
[ 0.3442 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[ 0.3451 ]
[ 0.3460 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 0.3466 ] Assuming zero filled SBK key
[ 0.3479 ]
[ 0.3487 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[ 0.3496 ]
[ 0.3497 ] Generating recovery mb1-bct
[ 0.3505 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram jetson-tx2-sol-redundant-live.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 0.3511 ] MB1-BCT version: 0xf
[ 0.3513 ] Packing sdram param for instance[0]
[ 0.3722 ] Packing sdram param for instance[1]
[ 0.3726 ] Packing sdram param for instance[2]
[ 0.3729 ] Packing sdram param for instance[3]
[ 0.3733 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg
[ 0.3740 ] Appending platform config data of size :- 3032
[ 0.3744 ]
[ 0.3744 ] Parsing config file :minimal_scr.cfg
[ 0.3744 ] Appending platform config data of size :- 12240
[ 0.3744 ]
[ 0.3744 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg
[ 0.3744 ] Appending platform config data of size :- 24
[ 0.3744 ]
[ 0.3744 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg
[ 0.3744 ] Appending platform config data of size :- 672
[ 0.3745 ]
[ 0.3745 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg
[ 0.3745 ] Appending platform config data of size :- 64
[ 0.3745 ]
[ 0.3745 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 0.3745 ] Appending platform config data of size :- 1628
[ 0.3745 ]
[ 0.3746 ] Updating mb1-bct with firmware information
[ 0.3756 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 0.3763 ] MB1-BCT version: 0xf
[ 0.3768 ]
[ 0.3768 ] Updating mb1-bct with storage information
[ 0.3777 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 0.3784 ] MB1-BCT version: 0xf
[ 0.3789 ]
[ 0.3796 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[ 0.3804 ]
[ 0.3811 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk
[ 0.3820 ]
[ 0.3829 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 0.3836 ] Assuming zero filled SBK key
[ 0.3850 ]
[ 0.3859 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[ 0.3868 ]
[ 0.3869 ] Copying signatures
[ 0.3876 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[ 0.4272 ]
[ 0.4273 ] Boot Rom communication
[ 0.4281 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[ 0.4288 ] BootRom is not running
[ 5.5463 ]
[ 6.5505 ] tegrarcm_v2 --isapplet
[ 6.5534 ] Applet version 01.00.0000
[ 6.6254 ]
[ 6.6256 ] Sending BCTs
[ 6.6290 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[ 6.6320 ] Applet version 01.00.0000
[ 6.7220 ] Sending bct_bootrom
[ 6.7231 ] […] 100%
[ 6.7260 ] Sending bct_mb1
[ 6.7268 ] […] 100%
[ 6.7406 ]
[ 6.7407 ] Generating blob
[ 6.7444 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin
[ 6.7476 ]
[ 6.7511 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[ 6.7556 ]
[ 6.7607 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 6.7635 ] Assuming zero filled SBK key
[ 6.7843 ]
[ 6.7872 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[ 6.7910 ]
[ 6.7936 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin
[ 6.7957 ]
[ 6.7978 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[ 6.8004 ]
[ 6.8030 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 6.8048 ] Assuming zero filled SBK key
[ 6.8102 ]
[ 6.8121 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[ 6.8143 ]
[ 6.8162 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin
[ 6.8179 ]
[ 6.8197 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[ 6.8218 ]
[ 6.8242 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 6.8255 ] Assuming zero filled SBK key
[ 6.8282 ]
[ 6.8295 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[ 6.8307 ]
[ 6.8319 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin
[ 6.8330 ]
[ 6.8340 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[ 6.8395 ]
[ 6.8409 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 6.8417 ] Assuming zero filled SBK key
[ 6.8873 ]
[ 6.8884 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[ 6.8916 ]
[ 6.8925 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin
[ 6.8933 ]
[ 6.8941 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk
[ 6.8957 ]
[ 6.8966 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 6.8973 ] Assuming zero filled SBK key
[ 6.9097 ]
[ 6.9108 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[ 6.9123 ]
[ 6.9131 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb
[ 6.9139 ]
[ 6.9147 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk
[ 6.9166 ]
[ 6.9177 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 6.9185 ] Assuming zero filled SBK key
[ 6.9318 ]
[ 6.9329 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[ 6.9344 ]
[ 6.9353 ] tegrahost_v2 --chip 0x18 --align blob_tos-trusty.img
[ 6.9361 ]
[ 6.9369 ] tegrahost_v2 --appendsigheader blob_tos-trusty.img zerosbk
[ 6.9382 ]
[ 6.9392 ] tegrasign_v2 --key None --list blob_tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 6.9399 ] Assuming zero filled SBK key
[ 6.9481 ]
[ 6.9493 ] tegrahost_v2 --updatesigheader blob_tos-trusty_sigheader.img.encrypt blob_tos-trusty_sigheader.img.hash zerosbk
[ 6.9507 ]
[ 6.9519 ] tegrahost_v2 --chip 0x18 --align blob_eks.img
[ 6.9527 ]
[ 6.9534 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk
[ 6.9543 ]
[ 6.9552 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 6.9560 ] Assuming zero filled SBK key
[ 6.9562 ]
[ 6.9574 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[ 6.9582 ]
[ 6.9591 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-quill-p3310-1000-c03-00-base.dtb
[ 6.9598 ]
[ 6.9605 ] tegrahost_v2 --appendsigheader blob_tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[ 6.9618 ]
[ 6.9628 ] tegrasign_v2 --key None --list blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 6.9635 ] Assuming zero filled SBK key
[ 6.9715 ]
[ 6.9724 ] tegrahost_v2 --updatesigheader blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[ 6.9736 ]
[ 6.9745 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin
[ 6.9752 ] number of images in blob are 9
[ 6.9756 ] blobsize is 4335208
[ 6.9757 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 221312
[ 6.9777 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 90016
[ 6.9783 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 63104
[ 6.9789 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2082144
[ 6.9796 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 533904
[ 6.9801 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt of size 605120
[ 6.9811 ] Added binary blob_tos-trusty_sigheader.img.encrypt of size 366400
[ 6.9816 ] Added binary blob_eks_sigheader.img.encrypt of size 1440
[ 6.9820 ] Added binary blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt of size 371616
[ 6.9825 ]
[ 6.9825 ] Sending bootloader and pre-requisite binaries
[ 6.9834 ] tegrarcm_v2 --download blob blob.bin
[ 6.9841 ] Applet version 01.00.0000
[ 7.0674 ] Sending blob
[ 7.0679 ] […] 100%
[ 7.5597 ]
[ 7.5632 ] tegrarcm_v2 --boot recovery
[ 7.5658 ] Applet version 01.00.0000
[ 7.6477 ]
[ 8.6526 ] tegrarcm_v2 --isapplet
[ 9.0231 ]
[ 9.0282 ] tegradevflash_v2 --iscpubl
[ 9.0293 ] Cannot Open USB
[ 9.5557 ]
[ 10.5605 ] tegrarcm_v2 --isapplet
[ 10.6376 ]
[ 10.6412 ] tegradevflash_v2 --iscpubl
[ 10.6441 ] Bootloader version 01.00.0000
[ 10.6901 ] Bootloader version 01.00.0000
[ 10.6904 ]
[ 10.6905 ] Retrieving storage infomation
[ 10.6940 ] tegrarcm_v2 --oem platformdetails storage storage_info.bin
[ 10.6968 ] Applet is not running on device. Continue with Bootloader
[ 10.7879 ]
[ 10.7913 ] tegradevflash_v2 --oem platformdetails storage storage_info.bin
[ 10.7941 ] Bootloader version 01.00.0000
[ 10.8293 ] Saved platform info in storage_info.bin
[ 10.8335 ]
[ 10.8336 ] Flashing the device
[ 10.8371 ] tegraparser_v2 --storageinfo storage_info.bin --generategpt --pt flash.xml.bin
[ 10.8417 ]
[ 10.8453 ] tegradevflash_v2 --pt flash.xml.bin --create
[ 10.8485 ] Bootloader version 01.00.0000
[ 10.8779 ] Erasing sdmmc_boot: 3 … [Done]
[ 10.8894 ] Writing partition secondary_gpt with gpt_secondary_0_3.bin
[ 10.8918 ] […] 100%
[ 10.9028 ] Erasing sdmmc_user: 3 … [Done]
[ 11.3687 ] Writing partition master_boot_record with mbr_1_3.bin
[ 11.3698 ] […] 100%
[ 11.3751 ] Writing partition primary_gpt with gpt_primary_1_3.bin
[ 11.3759 ] […] 100%
[ 11.3793 ] Writing partition secondary_gpt with gpt_secondary_1_3.bin
[ 11.3883 ] […] 100%
[ 11.4009 ] Writing partition mb1 with mb1_prod.bin.encrypt
[ 11.4016 ] […] 100%
[ 11.4084 ] Writing partition mb1_b with mb1_prod.bin.encrypt
[ 11.4146 ] […] 100%
[ 11.4224 ] Writing partition dram-ecc-fw with dram-ecc_sigheader.bin.encrypt
[ 11.4276 ] […] 100%
[ 11.4348 ] Writing partition badpage-fw with badpage_sigheader.bin.encrypt
[ 11.4412 ] […] 100%
[ 11.4452 ] Writing partition badpage-fw_b with badpage_sigheader.bin.encrypt
[ 11.4501 ] […] 100%
[ 11.4548 ] Writing partition spe-fw with spe_sigheader.bin.encrypt
[ 11.4593 ] […] 100%
[ 11.4664 ] Writing partition spe-fw_b with spe_sigheader.bin.encrypt
[ 11.4733 ] […] 100%
[ 11.4802 ] Writing partition mb2 with nvtboot_sigheader.bin.encrypt
[ 11.4856 ] […] 100%
[ 11.4939 ] Writing partition mb2_b with nvtboot_sigheader.bin.encrypt
[ 11.4996 ] […] 100%
[ 11.5088 ] Writing partition mts-preboot with preboot_d15_prod_cr_sigheader.bin.encrypt
[ 11.5155 ] […] 100%
[ 11.5215 ] Writing partition mts-preboot_b with preboot_d15_prod_cr_sigheader.bin.encrypt
[ 11.5280 ] […] 100%
[ 11.5330 ] Writing partition SMD with slot_metadata.bin
[ 11.5388 ] […] 100%
[ 11.5436 ] Writing partition SMD_b with slot_metadata.bin
[ 11.5457 ] […] 100%
[ 11.5507 ] Writing partition VER_b with jetson-tx2-sol-redundant-live_bootblob_ver.txt
[ 11.5539 ] […] 100%
[ 11.5568 ] Writing partition VER with jetson-tx2-sol-redundant-live_bootblob_ver.txt
[ 11.5587 ] […] 100%
[ 11.5622 ] Writing partition master_boot_record with mbr_1_3.bin
[ 11.5641 ] […] 100%
[ 11.5680 ] Writing partition APP with core-image-sol.img
[ 11.5699 ] […] 100%
[ 26.6084 ] Writing partition APP_b with core-image-sol.img
[ 26.6676 ] [… ] 060%
[ 26.6676 ] […] 100%
[ 41.7538 ] Writing partition APP_c with core-image-sol.img
[ 41.8149 ] […] 100%
[ 56.8998 ] Writing partition CONFIG with dummy.ext4.img
[ 56.9610 ] […] 100%
[ 102.6548 ] Writing partition DATA with dummy.ext4.img
[ 102.6653 ] […] 100%
[ 148.7051 ] Writing partition mts-bootpack with mce_mts_d15_prod_cr_sigheader.bin.encrypt
[ 148.7173 ] […] 100%
[ 148.8025 ] Writing partition mts-bootpack_b with mce_mts_d15_prod_cr_sigheader.bin.encrypt
[ 148.8211 ] […] 100%
[ 148.9061 ] Writing partition cpu-bootloader with cboot_sigheader.bin.encrypt
[ 148.9244 ] […] 100%
[ 148.9384 ] Writing partition cpu-bootloader_b with cboot_sigheader.bin.encrypt
[ 148.9467 ] […] 100%
[ 148.9585 ] Writing partition bootloader-dtb with tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
[ 148.9671 ] […] 100%
[ 148.9817 ] Writing partition bootloader-dtb_b with tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
[ 148.9901 ] […] 100%
[ 149.0046 ] Writing partition secure-os with tos-trusty_sigheader.img.encrypt
[ 149.0152 ] […] 100%
[ 149.0315 ] Writing partition secure-os_b with tos-trusty_sigheader.img.encrypt
[ 149.0428 ] […] 100%
[ 149.0587 ] Writing partition eks with eks_sigheader.img.encrypt
[ 149.0685 ] […] 100%
[ 149.0728 ] Writing partition adsp-fw with adsp-fw_sigheader.bin.encrypt
[ 149.0773 ] […] 100%
[ 149.0858 ] Writing partition adsp-fw_b with adsp-fw_sigheader.bin.encrypt
[ 149.0925 ] […] 100%
[ 149.1001 ] Writing partition bpmp-fw with bpmp_sigheader.bin.encrypt
[ 149.1060 ] […] 100%
[ 149.1272 ] Writing partition bpmp-fw_b with bpmp_sigheader.bin.encrypt
[ 149.1386 ] […] 100%
[ 149.1612 ] Writing partition bpmp-fw-dtb with tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt
[ 149.1747 ] […] 100%
[ 149.1977 ] Writing partition bpmp-fw-dtb_b with tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt
[ 149.2123 ] […] 100%
[ 149.2348 ] Writing partition sce-fw with camera-rtcpu-sce_sigheader.img.encrypt
[ 149.2471 ] […] 100%
[ 149.2556 ] Writing partition sce-fw_b with camera-rtcpu-sce_sigheader.img.encrypt
[ 149.2621 ] […] 100%
[ 149.2703 ] Writing partition sc7 with warmboot_wbheader.bin.encrypt
[ 149.2751 ] […] 100%
[ 149.2801 ] Writing partition sc7_b with warmboot_wbheader.bin.encrypt
[ 149.2849 ] […] 100%
[ 149.2903 ] Writing partition BMP with bmp.blob
[ 149.2950 ] […] 100%
[ 149.3023 ] Writing partition BMP_b with bmp.blob
[ 149.3075 ] […] 100%
[ 149.3143 ] Writing partition kernel with boot_sigheader.img.encrypt
[ 149.3203 ] […] 100%
[ 149.3391 ] Writing partition kernel_b with boot_sigheader.img.encrypt
[ 149.3489 ] […] 100%
[ 149.3690 ] Writing partition kernel-dtb with tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
[ 149.3798 ] […] 100%
[ 149.3943 ] Writing partition kernel-dtb_b with tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
[ 149.4063 ] […] 100%
[ 149.4274 ]
[ 149.4303 ] tegradevflash_v2 --write BCT br_bct_BR.bct
[ 149.4327 ] Bootloader version 01.00.0000
[ 149.4608 ] Writing partition BCT with br_bct_BR.bct
[ 149.4614 ] […] 100%
[ 149.4715 ]
[ 149.4761 ] tegradevflash_v2 --write MB1_BCT mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 149.4780 ] Bootloader version 01.00.0000
[ 149.5089 ] Writing partition MB1_BCT with mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 149.5107 ] […] 100%
[ 149.5202 ]
[ 149.5231 ] tegradevflash_v2 --write MB1_BCT_b mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 149.5252 ] Bootloader version 01.00.0000
[ 149.5533 ] Writing partition MB1_BCT_b with mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 149.5551 ] […] 100%
[ 149.5638 ]
[ 149.5640 ] Flashing completed
[ 149.5642 ] Coldbooting the device
[ 149.5675 ] tegradevflash_v2 --reboot coldboot
[ 149.5705 ] Bootloader version 01.00.0000
[ 149.6102 ]
Note: I am able to flash the board successfully using the packages generated from latest default Nvidia SDK
It mostly seems to be an incorrect cfg file being picked up. Any pointers would be appreciated. Thanks!