Jetson TX2 board flashing successfully but not booting up

Hi,

I compiled the meta-tegra (thud-r32.4.3) branch with meta-sol (zeus-r32.3.1) and successfully generated the flash package. When I try to flash this on Jetson TX2 board (fab=D02) the flash process completes successfully, however it does not boot up after that. It is also not detected using “lsusb” command.

I am posting the flash logs below:
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0017 ] Generating RCM messages
[ 0.0025 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[ 0.0033 ] RCM 0 is saved as rcm_0.rcm
[ 0.0037 ] RCM 1 is saved as rcm_1.rcm
[ 0.0037 ] List of rcm files are saved in rcm_list.xml
[ 0.0037 ]
[ 0.0037 ] Signing RCM messages
[ 0.0046 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0053 ] Assuming zero filled SBK key
[ 0.0082 ]
[ 0.0083 ] Copying signature to RCM mesages
[ 0.0092 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[ 0.0102 ]
[ 0.0103 ] Boot Rom communication
[ 0.0114 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[ 0.0121 ] BR_CID: 0x81801001640971c01800000002030500
[ 0.0398 ] RCM version 0X180001
[ 0.0849 ] Boot Rom communication completed
[ 1.0918 ]
[ 2.0966 ] tegrarcm_v2 --isapplet
[ 2.0995 ] Applet version 01.00.0000
[ 2.1744 ]
[ 2.1782 ] Retrieving EEPROM data
[ 2.1786 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/ubuntu/sol_flash_tx2_23Feb/cvm.bin.QbrI7
[ 2.1813 ] Applet version 01.00.0000
[ 2.2706 ] Saved platform info in /home/ubuntu/sol_flash_tx2_23Feb/cvm.bin.QbrI7
[ 2.3440 ] Welcome to Tegra Flash version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0008 ] tegrasign_v2 --key None --getmode mode.txt
[ 0.0015 ] Assuming zero filled SBK key
[ 0.0017 ]
[ 0.0018 ] Generating RCM messages
[ 0.0026 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[ 0.0033 ] RCM 0 is saved as rcm_0.rcm
[ 0.0036 ] RCM 1 is saved as rcm_1.rcm
[ 0.0036 ] List of rcm files are saved in rcm_list.xml
[ 0.0036 ]
[ 0.0036 ] Signing RCM messages
[ 0.0044 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0051 ] Assuming zero filled SBK key
[ 0.0078 ]
[ 0.0078 ] Copying signature to RCM mesages
[ 0.0085 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[ 0.0095 ]
[ 0.0096 ] Parsing partition layout
[ 0.0104 ] tegraparser_v2 --pt flash.xml.tmp
[ 0.0116 ]
[ 0.0116 ] Creating list of images to be signed
[ 0.0125 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[ 0.0373 ]
[ 0.0374 ] Generating signatures
[ 0.0383 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[ 0.0390 ] Assuming zero filled SBK key
[ 0.2741 ]
[ 0.2741 ] Generating br-bct
[ 0.2753 ] Updating dev and MSS params in BR BCT
[ 0.2754 ] tegrabct_v2 --dev_param emmc.cfg --sdram jetson-tx2-sol-redundant-live.cfg --brbct br_bct.cfg --chip 0x18 0
[ 0.2978 ]
[ 0.2979 ] Updating bl info
[ 0.2990 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[ 0.3006 ]
[ 0.3006 ] Updating smd info
[ 0.3014 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[ 0.3025 ]
[ 0.3025 ] Updating Odmdata
[ 0.3035 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x1090000
[ 0.3045 ]
[ 0.3046 ] Get Signed section of bct
[ 0.3054 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[ 0.3066 ]
[ 0.3077 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key
[ 0.3085 ] Assuming zero filled SBK key
[ 0.3091 ]
[ 0.3092 ] Updating BCT with signature
[ 0.3100 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml
[ 0.3110 ]
[ 0.3110 ] Generating coldboot mb1-bct
[ 0.3118 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram jetson-tx2-sol-redundant-live.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 0.3125 ] MB1-BCT version: 0xf
[ 0.3126 ] Packing sdram param for instance[0]
[ 0.3352 ] Packing sdram param for instance[1]
[ 0.3356 ] Packing sdram param for instance[2]
[ 0.3359 ] Packing sdram param for instance[3]

[ 0.3363 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg
[ 0.3370 ] Appending platform config data of size :- 3032
[ 0.3371 ]
[ 0.3371 ] Parsing config file :mobile_scr.cfg
[ 0.3371 ] Appending platform config data of size :- 12240
[ 0.3371 ]
[ 0.3371 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg
[ 0.3371 ] Appending platform config data of size :- 24
[ 0.3371 ]
[ 0.3371 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg
[ 0.3371 ] Appending platform config data of size :- 672
[ 0.3371 ]
[ 0.3372 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg
[ 0.3372 ] Appending platform config data of size :- 64
[ 0.3372 ]
[ 0.3372 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 0.3372 ] Appending platform config data of size :- 1628
[ 0.3372 ]
[ 0.3373 ] Updating mb1-bct with firmware information
[ 0.3384 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 0.3393 ] MB1-BCT version: 0xf
[ 0.3397 ]
[ 0.3398 ] Updating mb1-bct with storage information
[ 0.3407 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 0.3415 ] MB1-BCT version: 0xf
[ 0.3419 ]
[ 0.3427 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[ 0.3435 ]
[ 0.3442 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[ 0.3451 ]
[ 0.3460 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 0.3466 ] Assuming zero filled SBK key
[ 0.3479 ]
[ 0.3487 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[ 0.3496 ]
[ 0.3497 ] Generating recovery mb1-bct
[ 0.3505 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram jetson-tx2-sol-redundant-live.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 0.3511 ] MB1-BCT version: 0xf
[ 0.3513 ] Packing sdram param for instance[0]
[ 0.3722 ] Packing sdram param for instance[1]
[ 0.3726 ] Packing sdram param for instance[2]
[ 0.3729 ] Packing sdram param for instance[3]

[ 0.3733 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg
[ 0.3740 ] Appending platform config data of size :- 3032
[ 0.3744 ]
[ 0.3744 ] Parsing config file :minimal_scr.cfg
[ 0.3744 ] Appending platform config data of size :- 12240
[ 0.3744 ]
[ 0.3744 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg
[ 0.3744 ] Appending platform config data of size :- 24
[ 0.3744 ]
[ 0.3744 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg
[ 0.3744 ] Appending platform config data of size :- 672
[ 0.3745 ]
[ 0.3745 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg
[ 0.3745 ] Appending platform config data of size :- 64
[ 0.3745 ]
[ 0.3745 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 0.3745 ] Appending platform config data of size :- 1628
[ 0.3745 ]
[ 0.3746 ] Updating mb1-bct with firmware information
[ 0.3756 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 0.3763 ] MB1-BCT version: 0xf
[ 0.3768 ]
[ 0.3768 ] Updating mb1-bct with storage information
[ 0.3777 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 0.3784 ] MB1-BCT version: 0xf
[ 0.3789 ]
[ 0.3796 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[ 0.3804 ]
[ 0.3811 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk
[ 0.3820 ]
[ 0.3829 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 0.3836 ] Assuming zero filled SBK key
[ 0.3850 ]
[ 0.3859 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[ 0.3868 ]
[ 0.3869 ] Copying signatures
[ 0.3876 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[ 0.4272 ]
[ 0.4273 ] Boot Rom communication
[ 0.4281 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[ 0.4288 ] BootRom is not running
[ 5.5463 ]
[ 6.5505 ] tegrarcm_v2 --isapplet
[ 6.5534 ] Applet version 01.00.0000
[ 6.6254 ]
[ 6.6256 ] Sending BCTs
[ 6.6290 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[ 6.6320 ] Applet version 01.00.0000
[ 6.7220 ] Sending bct_bootrom
[ 6.7231 ] […] 100%
[ 6.7260 ] Sending bct_mb1
[ 6.7268 ] […] 100%
[ 6.7406 ]
[ 6.7407 ] Generating blob
[ 6.7444 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin
[ 6.7476 ]
[ 6.7511 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[ 6.7556 ]
[ 6.7607 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 6.7635 ] Assuming zero filled SBK key
[ 6.7843 ]
[ 6.7872 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[ 6.7910 ]
[ 6.7936 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin
[ 6.7957 ]
[ 6.7978 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[ 6.8004 ]
[ 6.8030 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 6.8048 ] Assuming zero filled SBK key
[ 6.8102 ]
[ 6.8121 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[ 6.8143 ]
[ 6.8162 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin
[ 6.8179 ]
[ 6.8197 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[ 6.8218 ]
[ 6.8242 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 6.8255 ] Assuming zero filled SBK key
[ 6.8282 ]
[ 6.8295 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[ 6.8307 ]
[ 6.8319 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin
[ 6.8330 ]
[ 6.8340 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[ 6.8395 ]
[ 6.8409 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 6.8417 ] Assuming zero filled SBK key
[ 6.8873 ]
[ 6.8884 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[ 6.8916 ]
[ 6.8925 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin
[ 6.8933 ]
[ 6.8941 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk
[ 6.8957 ]
[ 6.8966 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 6.8973 ] Assuming zero filled SBK key
[ 6.9097 ]
[ 6.9108 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[ 6.9123 ]
[ 6.9131 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb
[ 6.9139 ]
[ 6.9147 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk
[ 6.9166 ]
[ 6.9177 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 6.9185 ] Assuming zero filled SBK key
[ 6.9318 ]
[ 6.9329 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[ 6.9344 ]
[ 6.9353 ] tegrahost_v2 --chip 0x18 --align blob_tos-trusty.img
[ 6.9361 ]
[ 6.9369 ] tegrahost_v2 --appendsigheader blob_tos-trusty.img zerosbk
[ 6.9382 ]
[ 6.9392 ] tegrasign_v2 --key None --list blob_tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 6.9399 ] Assuming zero filled SBK key
[ 6.9481 ]
[ 6.9493 ] tegrahost_v2 --updatesigheader blob_tos-trusty_sigheader.img.encrypt blob_tos-trusty_sigheader.img.hash zerosbk
[ 6.9507 ]
[ 6.9519 ] tegrahost_v2 --chip 0x18 --align blob_eks.img
[ 6.9527 ]
[ 6.9534 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk
[ 6.9543 ]
[ 6.9552 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 6.9560 ] Assuming zero filled SBK key
[ 6.9562 ]
[ 6.9574 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[ 6.9582 ]
[ 6.9591 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-quill-p3310-1000-c03-00-base.dtb
[ 6.9598 ]
[ 6.9605 ] tegrahost_v2 --appendsigheader blob_tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[ 6.9618 ]
[ 6.9628 ] tegrasign_v2 --key None --list blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 6.9635 ] Assuming zero filled SBK key
[ 6.9715 ]
[ 6.9724 ] tegrahost_v2 --updatesigheader blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[ 6.9736 ]
[ 6.9745 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin
[ 6.9752 ] number of images in blob are 9
[ 6.9756 ] blobsize is 4335208
[ 6.9757 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 221312
[ 6.9777 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 90016
[ 6.9783 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 63104
[ 6.9789 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2082144
[ 6.9796 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 533904
[ 6.9801 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt of size 605120
[ 6.9811 ] Added binary blob_tos-trusty_sigheader.img.encrypt of size 366400
[ 6.9816 ] Added binary blob_eks_sigheader.img.encrypt of size 1440
[ 6.9820 ] Added binary blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt of size 371616
[ 6.9825 ]
[ 6.9825 ] Sending bootloader and pre-requisite binaries
[ 6.9834 ] tegrarcm_v2 --download blob blob.bin
[ 6.9841 ] Applet version 01.00.0000
[ 7.0674 ] Sending blob
[ 7.0679 ] […] 100%
[ 7.5597 ]
[ 7.5632 ] tegrarcm_v2 --boot recovery
[ 7.5658 ] Applet version 01.00.0000
[ 7.6477 ]
[ 8.6526 ] tegrarcm_v2 --isapplet
[ 9.0231 ]
[ 9.0282 ] tegradevflash_v2 --iscpubl
[ 9.0293 ] Cannot Open USB
[ 9.5557 ]
[ 10.5605 ] tegrarcm_v2 --isapplet
[ 10.6376 ]
[ 10.6412 ] tegradevflash_v2 --iscpubl
[ 10.6441 ] Bootloader version 01.00.0000
[ 10.6901 ] Bootloader version 01.00.0000
[ 10.6904 ]
[ 10.6905 ] Retrieving storage infomation
[ 10.6940 ] tegrarcm_v2 --oem platformdetails storage storage_info.bin
[ 10.6968 ] Applet is not running on device. Continue with Bootloader
[ 10.7879 ]
[ 10.7913 ] tegradevflash_v2 --oem platformdetails storage storage_info.bin
[ 10.7941 ] Bootloader version 01.00.0000
[ 10.8293 ] Saved platform info in storage_info.bin
[ 10.8335 ]
[ 10.8336 ] Flashing the device
[ 10.8371 ] tegraparser_v2 --storageinfo storage_info.bin --generategpt --pt flash.xml.bin
[ 10.8417 ]
[ 10.8453 ] tegradevflash_v2 --pt flash.xml.bin --create
[ 10.8485 ] Bootloader version 01.00.0000
[ 10.8779 ] Erasing sdmmc_boot: 3 … [Done]
[ 10.8894 ] Writing partition secondary_gpt with gpt_secondary_0_3.bin
[ 10.8918 ] […] 100%

[ 10.9028 ] Erasing sdmmc_user: 3 … [Done]
[ 11.3687 ] Writing partition master_boot_record with mbr_1_3.bin
[ 11.3698 ] […] 100%
[ 11.3751 ] Writing partition primary_gpt with gpt_primary_1_3.bin
[ 11.3759 ] […] 100%
[ 11.3793 ] Writing partition secondary_gpt with gpt_secondary_1_3.bin
[ 11.3883 ] […] 100%

[ 11.4009 ] Writing partition mb1 with mb1_prod.bin.encrypt
[ 11.4016 ] […] 100%
[ 11.4084 ] Writing partition mb1_b with mb1_prod.bin.encrypt
[ 11.4146 ] […] 100%
[ 11.4224 ] Writing partition dram-ecc-fw with dram-ecc_sigheader.bin.encrypt
[ 11.4276 ] […] 100%
[ 11.4348 ] Writing partition badpage-fw with badpage_sigheader.bin.encrypt
[ 11.4412 ] […] 100%
[ 11.4452 ] Writing partition badpage-fw_b with badpage_sigheader.bin.encrypt
[ 11.4501 ] […] 100%
[ 11.4548 ] Writing partition spe-fw with spe_sigheader.bin.encrypt
[ 11.4593 ] […] 100%
[ 11.4664 ] Writing partition spe-fw_b with spe_sigheader.bin.encrypt
[ 11.4733 ] […] 100%
[ 11.4802 ] Writing partition mb2 with nvtboot_sigheader.bin.encrypt
[ 11.4856 ] […] 100%
[ 11.4939 ] Writing partition mb2_b with nvtboot_sigheader.bin.encrypt
[ 11.4996 ] […] 100%
[ 11.5088 ] Writing partition mts-preboot with preboot_d15_prod_cr_sigheader.bin.encrypt
[ 11.5155 ] […] 100%
[ 11.5215 ] Writing partition mts-preboot_b with preboot_d15_prod_cr_sigheader.bin.encrypt
[ 11.5280 ] […] 100%
[ 11.5330 ] Writing partition SMD with slot_metadata.bin
[ 11.5388 ] […] 100%
[ 11.5436 ] Writing partition SMD_b with slot_metadata.bin
[ 11.5457 ] […] 100%
[ 11.5507 ] Writing partition VER_b with jetson-tx2-sol-redundant-live_bootblob_ver.txt
[ 11.5539 ] […] 100%
[ 11.5568 ] Writing partition VER with jetson-tx2-sol-redundant-live_bootblob_ver.txt
[ 11.5587 ] […] 100%
[ 11.5622 ] Writing partition master_boot_record with mbr_1_3.bin
[ 11.5641 ] […] 100%
[ 11.5680 ] Writing partition APP with core-image-sol.img
[ 11.5699 ] […] 100%
[ 26.6084 ] Writing partition APP_b with core-image-sol.img
[ 26.6676 ] [… ] 060%
[ 26.6676 ] […] 100%
[ 41.7538 ] Writing partition APP_c with core-image-sol.img
[ 41.8149 ] […] 100%
[ 56.8998 ] Writing partition CONFIG with dummy.ext4.img
[ 56.9610 ] […] 100%
[ 102.6548 ] Writing partition DATA with dummy.ext4.img
[ 102.6653 ] […] 100%
[ 148.7051 ] Writing partition mts-bootpack with mce_mts_d15_prod_cr_sigheader.bin.encrypt
[ 148.7173 ] […] 100%
[ 148.8025 ] Writing partition mts-bootpack_b with mce_mts_d15_prod_cr_sigheader.bin.encrypt
[ 148.8211 ] […] 100%
[ 148.9061 ] Writing partition cpu-bootloader with cboot_sigheader.bin.encrypt
[ 148.9244 ] […] 100%
[ 148.9384 ] Writing partition cpu-bootloader_b with cboot_sigheader.bin.encrypt
[ 148.9467 ] […] 100%
[ 148.9585 ] Writing partition bootloader-dtb with tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
[ 148.9671 ] […] 100%
[ 148.9817 ] Writing partition bootloader-dtb_b with tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
[ 148.9901 ] […] 100%
[ 149.0046 ] Writing partition secure-os with tos-trusty_sigheader.img.encrypt
[ 149.0152 ] […] 100%
[ 149.0315 ] Writing partition secure-os_b with tos-trusty_sigheader.img.encrypt
[ 149.0428 ] […] 100%
[ 149.0587 ] Writing partition eks with eks_sigheader.img.encrypt
[ 149.0685 ] […] 100%
[ 149.0728 ] Writing partition adsp-fw with adsp-fw_sigheader.bin.encrypt
[ 149.0773 ] […] 100%
[ 149.0858 ] Writing partition adsp-fw_b with adsp-fw_sigheader.bin.encrypt
[ 149.0925 ] […] 100%
[ 149.1001 ] Writing partition bpmp-fw with bpmp_sigheader.bin.encrypt
[ 149.1060 ] […] 100%
[ 149.1272 ] Writing partition bpmp-fw_b with bpmp_sigheader.bin.encrypt
[ 149.1386 ] […] 100%
[ 149.1612 ] Writing partition bpmp-fw-dtb with tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt
[ 149.1747 ] […] 100%
[ 149.1977 ] Writing partition bpmp-fw-dtb_b with tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt
[ 149.2123 ] […] 100%
[ 149.2348 ] Writing partition sce-fw with camera-rtcpu-sce_sigheader.img.encrypt
[ 149.2471 ] […] 100%
[ 149.2556 ] Writing partition sce-fw_b with camera-rtcpu-sce_sigheader.img.encrypt
[ 149.2621 ] […] 100%
[ 149.2703 ] Writing partition sc7 with warmboot_wbheader.bin.encrypt
[ 149.2751 ] […] 100%
[ 149.2801 ] Writing partition sc7_b with warmboot_wbheader.bin.encrypt
[ 149.2849 ] […] 100%
[ 149.2903 ] Writing partition BMP with bmp.blob
[ 149.2950 ] […] 100%
[ 149.3023 ] Writing partition BMP_b with bmp.blob
[ 149.3075 ] […] 100%
[ 149.3143 ] Writing partition kernel with boot_sigheader.img.encrypt
[ 149.3203 ] […] 100%
[ 149.3391 ] Writing partition kernel_b with boot_sigheader.img.encrypt
[ 149.3489 ] […] 100%
[ 149.3690 ] Writing partition kernel-dtb with tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
[ 149.3798 ] […] 100%
[ 149.3943 ] Writing partition kernel-dtb_b with tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
[ 149.4063 ] […] 100%
[ 149.4274 ]
[ 149.4303 ] tegradevflash_v2 --write BCT br_bct_BR.bct
[ 149.4327 ] Bootloader version 01.00.0000
[ 149.4608 ] Writing partition BCT with br_bct_BR.bct
[ 149.4614 ] […] 100%
[ 149.4715 ]
[ 149.4761 ] tegradevflash_v2 --write MB1_BCT mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 149.4780 ] Bootloader version 01.00.0000
[ 149.5089 ] Writing partition MB1_BCT with mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 149.5107 ] […] 100%
[ 149.5202 ]
[ 149.5231 ] tegradevflash_v2 --write MB1_BCT_b mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 149.5252 ] Bootloader version 01.00.0000
[ 149.5533 ] Writing partition MB1_BCT_b with mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 149.5551 ] […] 100%
[ 149.5638 ]
[ 149.5640 ] Flashing completed

[ 149.5642 ] Coldbooting the device
[ 149.5675 ] tegradevflash_v2 --reboot coldboot
[ 149.5705 ] Bootloader version 01.00.0000
[ 149.6102 ]

Note: I am able to flash the board successfully using the packages generated from latest default Nvidia SDK

It mostly seems to be an incorrect cfg file being picked up. Any pointers would be appreciated. Thanks!

The module released later may not work in some early release due to PCN update.

The components in the module got updated so need to use later jetpack release to flash it.

Hi Wayne

Thanks for your prompt response. Yes, I read that the support for “D02” boards is added after L4T-32.4.2 version and that is the reason I switched to L4T-32.4.3. The conf file also shows support for “D02”. Do you still think this could be the reason? If yes, which version do you recommend using?

If you already checked the PCN update is not related, then you need to share the serial console log.

Cannot boot could have various reasons.

Hi Wayne,

Please find the serial logs as below:
Hi Wayne,

I am able to flash the Jetson TX2 board but it does not boot up. I am pasting the serial console logs below:
[0000.272] I> Welcome to MB2(TBoot-BPMP)(version: 01.00.160913-t186-M-00.00-mobile-c700205d)
[0000.281] I> bit @ 0xd480000
[0000.284] I> Boot-device: eMMC
[0000.291] I> sdmmc bdev is already initialized
[0000.296] I> pmic: reset reason (nverc) : 0x40
[0000.327] I> Found 18 partitions in SDMMC_BOOT (instance 3)
[0000.346] I> Found 37 partitions in SDMMC_USER (instance 3)
[0000.352] I> A/B: bin_type (16) slot 0
[0000.356] I> Loading partition bpmp-fw at 0xd7800000
[0000.361] I> Reading two headers - addr:0xd7800000 blocks:1
[0000.366] I> Addr: 0xd7800000, start-block: 56473176, num_blocks: 1
[0000.391] I> Binary(16) of size 533504 is loaded @ 0xd7800000
[0000.397] I> A/B: bin_type (17) slot 0
[0000.400] I> Loading partition bpmp-fw-dtb at 0xd79f0000
[0000.406] I> Reading two headers - addr:0xd79f0000 blocks:1
[0000.411] I> Addr: 0xd79f0000, start-block: 56475592, num_blocks: 1
[0000.437] I> Binary(17) of size 604720 is loaded @ 0xd796c400
[0000.667] I> Loading SCE-FW …
[0000.670] I> A/B: bin_type (12) slot 0
[0000.674] I> Loading partition sce-fw at 0xd7300000
[0000.679] I> Reading two headers - addr:0xd7300000 blocks:1
[0000.684] I> Addr: 0xd7300000, start-block: 56479688, num_blocks: 1
[0000.703] I> Binary(12) of size 125168 is loaded @ 0xd7300000
[0000.709] I> Init SCE
[0000.711] I> Loading APE-FW …
[0000.714] I> A/B: bin_type (11) slot 0
[0000.718] I> Loading partition adsp-fw at 0xd7400000
[0000.723] I> Reading two headers - addr:0xd7400000 blocks:1
[0000.728] I> Addr: 0xd7400000, start-block: 56456792, num_blocks: 1
[0000.747] I> Binary(11) of size 107808 is loaded @ 0xd7400000
[0000.753] I> Copy BTCM section
[0000.756] I> A/B: bin_type (13) slot 0
[0000.760] I> Loading partition cpu-bootloader at 0x96000000
[0000.765] I> Reading two headers - addr:0x96000000 blocks:1
[0000.771] I> Addr: 0x96000000, start-block: 56436312, num_blocks: 1
[0000.792] I> Binary(13) of size 289360 is loaded @ 0x96000000
[0000.798] I> A/B: bin_type (20) slot 0
[0000.801] I> Loading partition bootloader-dtb at 0x8520f400
[0000.807] I> Reading two headers - addr:0x8520f400 blocks:1
[0000.812] I> Addr: 0x8520f400, start-block: 56438360, num_blocks: 1
[0000.834] I> Binary(20) of size 371216 is loaded @ 0x8520f400
[0000.840] I> A/B: bin_type (14) slot 0
[0000.843] I> Loading partition secure-os at 0x8530f600
[0000.848] I> Reading two headers - addr:0x8530f600 blocks:1
[0000.854] I> Addr: 0x8530f600, start-block: 56440408, num_blocks: 1
[0000.876] I> Binary(14) of size 366000 is loaded @ 0x8530f600
[0000.883] I> TOS boot-params @ 0x85000000
[0000.887] I> TOS params prepared
[0000.890] I> Loading EKS …
[0000.893] I> A/B: bin_type (15) slot 0
[0000.897] I> Loading partition eks at 0x8590f800
[0000.901] I> Reading two headers - addr:0x8590f800 blocks:1
[0000.907] I> Addr: 0x8590f800, start-block: 56452696, num_blocks: 1
[0000.925] I> Binary(15) of size 1040 is loaded @ 0x8590f800
[0000.931] I> EKB detected (length: 0x400) @ 0x8590f800
[0000.936] I> Copied encrypted keys
[0000.940] I> boot profiler @ 0x275844000
[0000.944] I> boot profiler for TOS @ 0x275844000
[0000.948] I> Unhalting SCE
[0000.951] I> Primary Memory Start:80000000 Size:70000000
[0000.956] I> Extended Memory Start:f0110000 Size:1856f0000
[0000.963] I> MB2(TBoot-BPMP) done

NOTICE: BL31: v1.3(release):41d46a9cf
NOTICE: BL31: Built : 21:14:44, Jun 25 2020
ipc-unittest-main: 1519: Welcome to IPC unittest!!!
ipc-unittest-main: 1531: waiting forever
ipc-unittest-srv: 329: Init unittest services!!!
hwkey-agent: 40: hwkey-agent is running!!
hwkey-agent: 182: key_mgnt_processing …
hwkey-agent: 157: Init hweky-agent services!!
platform_bootstrap_epilog: trusty bootstrap complete
[0001.336] I> Welcome to Cboot
[0001.339] I> Cboot Version: 32.04.03-poky-t186-fe47b8bb
[0001.344] I> CPU-BL Params @ 0x275800000
[0001.348] I> 0) Base:0x00000000 Size:0x00000000
[0001.352] I> 1) Base:0x277f00000 Size:0x00100000
[0001.357] I> 2) Base:0x277e00000 Size:0x00100000
[0001.361] I> 3) Base:0x277d00000 Size:0x00100000
[0001.366] I> 4) Base:0x277c00000 Size:0x00100000
[0001.370] I> 5) Base:0x277b00000 Size:0x00100000
[0001.375] I> 6) Base:0x277800000 Size:0x00200000
[0001.379] I> 7) Base:0x277400000 Size:0x00400000
[0001.384] I> 8) Base:0x277a00000 Size:0x00100000
[0001.388] I> 9) Base:0x277300000 Size:0x00100000
[0001.393] I> 10) Base:0x276800000 Size:0x00800000
[0001.397] I> 11) Base:0x30000000 Size:0x00040000
[0001.402] I> 12) Base:0xf0000000 Size:0x00100000
[0001.406] I> 13) Base:0x30040000 Size:0x00001000
[0001.411] I> 14) Base:0x30048000 Size:0x00001000
[0001.415] I> 15) Base:0x30049000 Size:0x00001000
[0001.419] I> 16) Base:0x3004a000 Size:0x00001000
[0001.424] I> 17) Base:0x3004b000 Size:0x00001000
[0001.428] I> 18) Base:0x3004c000 Size:0x00001000
[0001.433] I> 19) Base:0x3004d000 Size:0x00001000
[0001.437] I> 20) Base:0x3004e000 Size:0x00001000
[0001.442] I> 21) Base:0x3004f000 Size:0x00001000
[0001.446] I> 22) Base:0x00000000 Size:0x00000000
[0001.450] I> 23) Base:0xf0100000 Size:0x00010000
[0001.455] I> 24) Base:0x00000000 Size:0x00000000
[0001.459] I> 25) Base:0x00000000 Size:0x00000000
[0001.464] I> 26) Base:0x00000000 Size:0x00000000
[0001.468] I> 27) Base:0x00000000 Size:0x00000000
[0001.473] I> 28) Base:0x84400000 Size:0x00400000
[0001.477] I> 29) Base:0x30000000 Size:0x00010000
[0001.481] I> 30) Base:0x278000000 Size:0x08000000
[0001.486] I> 31) Base:0x00000000 Size:0x00000000
[0001.490] I> 32) Base:0x276000000 Size:0x00600000
[0001.495] I> 33) Base:0x80000000 Size:0x70000000
[0001.499] I> 34) Base:0xf0110000 Size:0x1856f0000
[0001.504] I> 35) Base:0x00000000 Size:0x00000000
[0001.508] I> 36) Base:0x00000000 Size:0x00000000
[0001.513] I> 37) Base:0x2772e0000 Size:0x00020000
[0001.517] I> 38) Base:0x84000000 Size:0x00400000
[0001.522] I> 39) Base:0x96000000 Size:0x02000000
[0001.526] I> 40) Base:0x85000000 Size:0x01200000
[0001.531] I> 41) Base:0x275800000 Size:0x00500000
[0001.535] I> 42) Base:0x00000000 Size:0x00000000
[0001.539] I> 43) Base:0x00000000 Size:0x00000000
[0001.544] GIC-SPI Target CPU: 4
[0001.547] Interrupts Init done
[0001.550] calling constructors
[0001.554] initializing heap
[0001.556] initializing threads
[0001.559] initializing timers
[0001.563] creating bootstrap completion thread
[0001.567] top of bootstrap2()
[0001.570] CPU: ARM Cortex A57
[0001.573] CPU: MIDR: 0x411FD073, MPIDR: 0x80000100
[0001.579] initializing platform
[0001.582] I> Bl_dtb @0x8520f400
[0001.585] I> gpio framework initialized
[0001.591] I> tegrabl_gpio_driver_register: register ‘nvidia,tegra186-gpio’ driver
[0001.601] I> tegrabl_gpio_driver_register: register ‘nvidia,tegra186-gpio-aon’ driver
[0001.609] I> GPIO framework and drivers are initialized.
[0001.614] I> Boot-device: eMMC
[0001.621] I> sdmmc bdev is already initialized
[0001.652] I> Found 18 partitions in SDMMC_BOOT (instance 3)
[0001.669] I> Found 37 partitions in SDMMC_USER (instance 3)
[0001.675] W> opt-in fuse is not set, skip fuse_burning
[0001.680] I> Reserved memory at 0xfbe00000 for U-Boot relocation
[0001.685] I> A/B: bin_type (21) slot 0
[0001.689] I> Loading kernel-dtb from partition
[0001.693] I> Loading partition kernel-dtb at 0x80000000 from device(0x1)
[0001.710] I> Kernel_dtb @0x80000000
[0001.714] I> tegrabl_tca9539_init: i2c bus: 0, slave addr: 0xee
[0001.722] E> I2C: slave not found in slaves.
[0001.726] E> I2C: Could not write 0 bytes to slave: 0x00ee with repeat start false.
[0001.734] E> I2C_DEV: Failed to send register address 0x00000004.
[0001.740] E> I2C_DEV: Could not write 1 registers of size 1 to slave 0xee at 0x00000004 via instance 0.
[0001.749] E> tca9539_device_init: failed to write polar reg
[0001.754] E> tegrabl_tca9539_init: failed to init device!
[0001.759] I> tegrabl_tca9539_init: i2c bus: 0, slave addr: 0xe8
[0001.768] I> tegrabl_gpio_driver_register: register ‘tca9539_gpio_driver’ driver
[0001.779] I> fixed regulator driver initialized
[0001.811] I> register ‘maxim’ power off handle
[0001.817] I> virtual i2c enabled
[0001.820] I> registered ‘maxim,max77620’ pmic
[0001.824] I> tegrabl_gpio_driver_register: register ‘max77620-gpio’ driver
[0001.837] I> Find /i2c@c250000’s alias i2c7
[0001.841] I> Reading eeprom i2c=7 address=0x50
[0001.871] I> Device at /i2c@c250000:0x50
[0001.875] I> Reading eeprom i2c=7 address=0x57
[0001.879] E> I2C: slave not found in slaves.
[0001.883] E> I2C: Could not write 0 bytes to slave: 0x00ae with repeat start true.
[0001.891] E> I2C_DEV: Failed to send register address 0x00000000.
[0001.897] E> I2C_DEV: Could not read 256 registers of size 1 from slave 0xae at 0x00000000 via instance 7.
[0001.906] E> eeprom: Failed to read I2C slave device
[0001.911] I> Eeprom read failed 0x3526070d
[0001.915] I> Find /i2c@c240000’s alias i2c1
[0001.919] I> Reading eeprom i2c=1 address=0x51
[0001.925] E> I2C: slave not found in slaves.
[0001.929] E> I2C: Could not write 0 bytes to slave: 0x00a2 with repeat start true.
[0001.936] E> I2C_DEV: Failed to send register address 0x00000000.
[0001.942] E> I2C_DEV: Could not read 256 registers of size 1 from slave 0xa2 at 0x00000000 via instance 1.
[0001.952] E> eeprom: Retry to read I2C slave device.
[0001.957] E> I2C: slave not found in slaves.
[0001.961] E> I2C: Could not write 0 bytes to slave: 0x00a2 with repeat start true.
[0001.969] E> I2C_DEV: Failed to send register address 0x00000000.
[0001.974] E> I2C_DEV: Could not read 256 registers of size 1 from slave 0xa2 at 0x00000000 via instance 1.
[0001.984] E> eeprom: Failed to read I2C slave device
[0001.989] I> Eeprom read failed 0x3526070d
[0001.993] I> Find /i2c@3160000’s alias i2c0
[0001.997] I> Reading eeprom i2c=0 address=0x50
[0002.002] E> I2C: slave not found in slaves.
[0002.006] E> I2C: Could not write 0 bytes to slave: 0x00a0 with repeat start true.
[0002.013] E> I2C_DEV: Failed to send register address 0x00000000.
[0002.019] E> I2C_DEV: Could not read 256 registers of size 1 from slave 0xa0 at 0x00000000 via instance 0.
[0002.029] E> eeprom: Failed to read I2C slave device
[0002.033] I> Eeprom read failed 0x3526070d
[0002.038] I> Find /i2c@3180000’s alias i2c2
[0002.042] I> Reading eeprom i2c=2 address=0x54
[0002.046] I> Enabling gpio chip_id = 2, gpio pin = 9
[0002.051] C> GPIO driver for chip_id 0x2 could not be found
[0002.057] E> cam_eeprom_read: Can’t get gpio driver
[0002.061] I> Eeprom read failed 0x4d4d000d
[0002.065] I> Reading eeprom i2c=2 address=0x57
[0002.070] I> Enabling gpio chip_id = 2, gpio pin = 9
[0002.074] C> GPIO driver for chip_id 0x2 could not be found
[0002.080] E> cam_eeprom_read: Can’t get gpio driver
[0002.084] I> Eeprom read failed 0x4d4d000d
[0002.088] I> create_pm_ids: id: 3310-1000-D02-K, len: 15
[0002.093] I> config: mem-type:00,power-config:00,misc-config:00,modem-config:00,touch-config:00,display-config:00, len: 93
[0002.128] I> enabling ‘vdd-hdmi’ regulator
[0002.143] I> regulator ‘vdd-hdmi’ already enabled
[0002.148] E> tegrabl_display_init_regulator: hdmi cable is not connected
[0002.154] E> tegrabl_display_get_pdata, failed to parse dtb settings
[0002.163] E> cannot find any other nvdisp nodes
[0002.168] E> no valid display unit config found in dtb
[0002.173] W> display init failed
[0002.176] initializing target
[0002.179] calling apps_init()
[0002.183] starting app kernel_boot_app
[0002.205] I> found decompressor handler: lz4-legacy
[0002.210] I> decompressing BMP blob …
[0002.220] I> Kernel type = Normal
[0002.223] I> Loading kernel-bootctrl from partition
[0002.228] I> Loading partition kernel-bootctrl at 0xa8000000 from device(0x1)
[0002.244] W> tegrabl_get_kernel_bootctrl: magic number(0x00000000) is invalid
[0002.251] W> tegrabl_get_kernel_bootctrl: use default dummy boot control data
[0002.258] I> ########## Fixed storage boot ##########
[0002.263] I> A/B: bin_type (24) slot 0
[0002.278] I> Boot image size read from image header: 7663b
[0002.284] I> Boot image load address: 0x80400000
[0002.288] I> Loading kernel from partition
[0002.292] I> Loading partition kernel at 0x80400000 from device(0x1)
[0003.341] I> Validate kernel …
[0003.344] I> T18x: Authenticate kernel (bin_type 24), max size 0x4000000
[0003.352] I> kernel-dtb is already loaded
[0003.356] I> Validate kernel-dtb …
[0003.359] I> T18x: Authenticate kernel-dtb (bin_type 21), max size 0x100000
[0003.367] I> Checking boot.img header magic … [0003.371] I> [OK]
[0003.373] I> Kernel hdr @0x80400000
[0003.376] I> Kernel dtb @0x80000000
[0003.379] I> decompressor handler not found
[0003.383] I> Copying kernel image (484923 bytes) from 0x80400800 to 0x80600000 … [0003.391] I> Done
[0003.392] I> Move ramdisk (len: 0) from 0x80477000 to 0x947b0000
[0003.400] I> Updated bpmp info to DTB
[0003.406] I> Ramdisk: Base: 0x947b0000; Size: 0x0
[0003.410] I> Updated initrd info to DTB
[0003.414] E> tegrabl_linuxboot_add_disp_param, du 0 failed to get display params
[0003.421] E> tegrabl_linuxboot_add_disp_param, du 0 failed to get display params
[0003.428] E> tegrabl_linuxboot_add_disp_param, du 0 failed to get display params
[0003.435] I> disabled_core_mask: 0xffffff0c
[0003.439] I> Active slot suffix:
[0003.443] I> add_boot_slot_suffix: slot_suffix =
[0003.447] I> Linux Cmdline: console=ttyS0,115200 console=tty0 fbcon=map:0 isolcpus=1-2 video=tegrafb no_console_suspend=1 earlycon=uart8250,mmio32,0x3100000 nvdumper_reserved=0x2772e0000 gpt usbcore.old
[0003.479] I> Updated bootarg info to DTB
[0003.483] I> eeprom_get_mac_addr: MAC (type: 0): 48:b0:2d:1f:0c:21
[0003.489] I> eeprom_get_mac_addr: MAC (type: 1): 48:b0:2d:1f:0c:22
[0003.495] I> eeprom_get_mac_addr: MAC (type: 2): 48:b0:2d:1f:0c:23
[0003.501] E> Found no plugin manager ids in source DT
[0003.506] W> Add plugin manager ids from board info
[0003.511] W> “plugin-manager” doesn’t exist, creating
[0003.516] W> “ids” doesn’t exist, creating
[0003.520] W> “connection” doesn’t exist, creating
[0003.525] W> “configs” doesn’t exist, creating
[0003.529] I> create_pm_ids: id: 3310-1000-D02-K, len: 15
[0003.534] I> config: mem-type:00,power-config:00,misc-config:00,modem-config:00,touch-config:00,display-config:00, len: 93
[0003.545] I> Adding plugin-manager/ids/3310-1000-D02=/i2c@c250000:module@0x50
[0003.552] W> “i2c@c250000” doesn’t exist, creating
[0003.557] W> “module@0x50” doesn’t exist, creating
[0003.564] I> Adding plugin-manager/ids/3310-1000-D02-K
[0003.571] I> Adding plugin-manager/configs/3310-mem-type 00
[0003.576] I> Adding plugin-manager/configs/3310-power-config 00
[0003.582] I> Adding plugin-manager/configs/3310-misc-config 00
[0003.588] I> Adding plugin-manager/configs/3310-modem-config 00
[0003.594] I> Adding plugin-manager/configs/3310-touch-config 00
[0003.600] I> Adding plugin-manager/configs/3310-display-config 00
[0003.606] I> Adding plugin-manager/cvm
[0003.610] W> “chip-id” doesn’t exist, creating
[0003.614] I> Adding plugin-manager/chip-id/A02P
[0003.619] W> “odm-data” doesn’t exist, creating
[0003.623] I> Adding /chosen/plugin-manager/odm-data
[0003.633] I> added [base:0x80000000, size:0x70000000] to /memory
[0003.639] I> added [base:0xf0200000, size:0x185600000] to /memory
[0003.645] I> added [base:0x275e00000, size:0x200000] to /memory
[0003.650] I> added [base:0x276600000, size:0x200000] to /memory
[0003.656] I> added [base:0x277000000, size:0x200000] to /memory
[0003.662] I> Updated memory info to DTB
[0003.666] E> add_disp_param: failed to get display params for du=0
[0003.674] W> “reset” doesn’t exist, creating
[0003.678] W> “pmc-reset-reason” doesn’t exist, creating
[0003.684] W> “pmic-reset-reason” doesn’t exist, creating
[0003.690] I> Adding ecid(00000001640971c01800000002030500) to DT
[0003.696] I> disabled_core_mask: 0xffffff0c
[0003.709] I> Add serial number:1424121102601 as DT property
[0003.718] I> Plugin-manager override starting
[0003.723] I> node /plugin-manager/fragement@0 matches
[0003.733] I> node /plugin-manager/fragement@4 matches
[0003.746] I> node /plugin-manager/fragment-sdwake-p3310-1000-300 matches
[0003.765] I> node /plugin-manager/fragement-pmon-p3310-1000-300 matches
[0003.775] I> node /plugin-manager/fragement-pmon-p3310-1000-800 matches
[0003.783] I> node /plugin-manager/fragment-devslp@0 matches
[0003.796] I> node /plugin-manager/fragment-500-pcie-config matches
[0003.810] I> node /plugin-manager/fragment-500-xusb-config matches
[0003.833] I> node /plugin-manager/fragment-p3310-c00-comm matches
[0003.846] I> node /plugin-manager/fragment-p3310-c00-pmic matches
[0003.856] I> node /plugin-manager/fragment-p3310-c01 matches
[0003.869] I> node /plugin-manager/fragment-p3310-c03 matches
[0003.907] I> node /plugin-manager/fragment-p3310-c00-camera matches
[0003.933] I> Disable plugin-manager status in FDT
[0003.937] I> Plugin-manager override finished successfully
[0003.942] I> tegrabl_load_kernel_and_dtb: Done
[0003.947] E> tegrabl_display_clear: display is not initialized
[0003.952] W> Boot logo display failed…
[0003.956] I> Kernel EP: 0x80600000, DTB: 0x80000000

U-Boot 2016.07 (Feb 23 2024 - 10:18:06 +0000)

TEGRA186
Model: NVIDIA P2771-0000-500
DRAM: 7.8 GiB
MC: Tegra SD/MMC: 0, Tegra SD/MMC: 2
*** Warning - bad CRC, using default environment

In: serial
Out: serial
Err: serial
Net: eth0: ethernet@2490000
meta-sol ref d50af5e9b1d826d0afd1ce2ac9f584d9f2c4b020
TMRing info files
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
Reading info for filesizes
TMRing file #1 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
TMRing file #2 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
TMRing file #3 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
Hit any key to stop autoboot: 0
Bad Linux ARM64 Image magic!
meta-sol ref d50af5e9b1d826d0afd1ce2ac9f584d9f2c4b020
TMRing info files
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
Reading info for filesizes
TMRing file #1 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
TMRing file #2 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
TMRing file #3 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
Hit any key to stop autoboot: 0
Bad Linux ARM64 Image magic!
meta-sol ref d50af5e9b1d826d0afd1ce2ac9f584d9f2c4b020
TMRing info files
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
Reading info for filesizes
TMRing file #1 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
TMRing file #2 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
TMRing file #3 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
Hit any key to stop autoboot: 0
Bad Linux ARM64 Image magic!
meta-sol ref d50af5e9b1d826d0afd1ce2ac9f584d9f2c4b020
TMRing info files
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
Reading info for filesizes
TMRing file #1 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
TMRing file #2 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
TMRing file #3 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
Hit any key to stop autoboot: 0
Bad Linux ARM64 Image magic!
meta-sol ref d50af5e9b1d826d0afd1ce2ac9f584d9f2c4b020
TMRing info files
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
Reading info for filesizes
TMRing file #1 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
TMRing file #2 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
TMRing file #3 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
Hit any key to stop autoboot: 0
Bad Linux ARM64 Image magic!
meta-sol ref d50af5e9b1d826d0afd1ce2ac9f584d9f2c4b020
TMRing info files
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
Reading info for filesizes
TMRing file #1 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
TMRing file #2 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa0000000
TMRing file #3 of size 0
Finding mmc device 0
Initializing mmc device 0
Reading from mmc
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
1 blocks read: OK
loaded files with hashes
none of the hashes were correct. storing tmr result at 0xa000000

When is the last time this device got flashed and boot?

Uboot shows it got stuck when trying to access emmc. And meta-sol is showing in that.

I even flashed the default images now and that is working fine. It seems some wrong configuration is picked up during flashing. Can you please help point out something from the logs?

I don’t get your comment. Sorry.

Are you talking about default image can work fine or not?

I meant default image is working fine even right now. There is some issue with this custom compiled image. Do you see any wrong configuration getting picked up from the above serial logs?

No, I cannot help because I have no idea what is meta-sol.
That thing makes your kernel not able to boot. That is the only thing I can tell now.

meta-sol is a custom repository for “Space operating linux”

It is based on zeus-r32.3.1 branch of L4T

For yocto project, sugges to contact with Ridgerun for the support.

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.