Orin-Nano cannot flashing stuch at RCM

Hi, I am a newbie. I have faced an issue that I cannot flash the image to orin nano devkit since I tried to setup secure boot yesterday. My devkit is being stuck at RCM although I removed the connection RCM pin and GND.

I don’t know whether secure boot will cause this issue or not, I need your expertise to help me resolve this issue.
I was trying to use sdkmanager and this command “sudo ./tools/kernel_flash/l4t_initrd_flash.sh --external-device nvme0n1p1
-c tools/kernel_flash/flash_l4t_external.xml -p “-c bootloader/t186ref/cfg/flash_t234_qspi.xml”
–showlogs --network usb0 jetson-orin-nano-devkit internal”
still have same the result

hao@hao-IdeaPad-L340-15IRH-Gaming:~/bootFromExternalStorage/R35.4.1/Linux_for_Tegra$ sudo ./tools/kernel_flash/l4t_initrd_flash.sh --external-device nvme0n1p1 \
>   -c tools/kernel_flash/flash_l4t_external.xml -p "-c bootloader/t186ref/cfg/flash_t234_qspi.xml" \
>   --showlogs --network usb0 jetson-orin-nano-devkit internal
[sudo] password for hao: 
/home/hao/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh --no-flash --external-device nvme0n1p1 -c tools/kernel_flash/flash_l4t_external.xml -p -c bootloader/t186ref/cfg/flash_t234_qspi.xml --showlogs --network usb0 jetson-orin-nano-devkit internal
************************************
*                                  *
*  Step 1: Generate flash packages *
*                                  *
************************************
Create folder to store images to flash
Generate image for internal storage devices
Generate images to be flashed
ADDITIONAL_DTB_OVERLAY=""  /home/hao/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/flash.sh --no-flash --sign  -c bootloader/t186ref/cfg/flash_t234_qspi.xml jetson-orin-nano-devkit internal

###############################################################################
# L4T BSP Information:
# R35 , REVISION: 4.1
# User release: 0.0
###############################################################################
copying emc_fuse_dev_params(/home/hao/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-br-bct-diag-boot.dts)... done.
copying device_config(/home/hao/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-device-p3767-0000.dts)... done.
copying misc_config(/home/hao/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-misc-p3767-0000.dts)... done.
./tegraflash.py --chip 0x23 --applet "/home/hao/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/mb1_t234_prod.bin" --skipuid --cfg readinfo_t234_min_prod.xml --dev_params tegra234-br-bct-diag-boot.dts --device_config tegra234-mb1-bct-device-p3767-0000.dts --misc_config tegra234-mb1-bct-misc-p3767-0000.dts --bins "mb2_applet applet_t234.bin" --cmd "dump eeprom cvm cvm.bin; dump custinfo custinfo_out.bin; reboot recovery" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0687 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   0.0700 ] File rcm_state open failed
[   0.0705 ] ERROR: failed to read rcm_state
[   0.0705 ] 
[   0.0941 ] tegrasign_v3.py --key None --getmode mode.txt
[   0.0945 ] Assuming zero filled SBK key
[   0.0711 ] Pre-processing config: tegra234-mb1-bct-device-p3767-0000.dts
[   0.1048 ] Pre-processing config: tegra234-mb1-bct-misc-p3767-0000.dts
[   0.1651 ] Parsing partition layout
[   0.2061 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[   0.2134 ] Kernel DTB used: None
[   0.2134 ] WARNING: dce base dtb is not provided

[   0.2134 ] Parsing partition layout
[   0.2175 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[   0.2221 ] Creating list of images to be signed
[   0.2465 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --list images_list.xml zerosbk
[   0.2508 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[   0.2648 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[   0.2660 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[   0.2876 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[   0.2892 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[   0.3164 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[   0.3167 ] adding BCH for mb2_t234_aligned.bin
[   0.3264 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[   0.3444 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[   0.3451 ] adding BCH for mb2_t234_aligned.bin
[   0.3667 ] Filling MB1 storage info
[   0.3667 ] Parsing dev params for multi chains
[   0.3774 ] Generating br-bct
[   0.4175 ] Updating dev and MSS params in BR BCT
[   0.4176 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[   0.4211 ] Updating bl info
[   0.4239 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin
[   0.4267 ] WARNING: boot chain is not completed. set to 0
[   0.4294 ] Generating signatures
[   0.4531 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.4538 ] Assuming zero filled SBK key
[   0.5608 ] Warning: pub_key.key is not found
[   0.5381 ] Parsing dev params for multi chains
[   0.5381 ] Generating br-bct
[   0.5404 ] Updating dev and MSS params in BR BCT
[   0.5406 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[   0.5436 ] Updating bl info
[   0.5455 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[   0.5468 ] WARNING: boot chain is not completed. set to 0
[   0.5483 ] Get Signed section of bct
[   0.5498 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml
[   0.5514 ] Signing BCT
[   0.5751 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.5754 ] Assuming zero filled SBK key
[   0.5801 ] Sha saved in br_bct_BR.sha
[   0.5806 ] Warning: pub_key.key is not found
[   0.5571 ] Updating BCT with signature
[   0.5586 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml
[   0.5599 ] Offset :4608 Len :3584
[   0.5603 ] Generating SHA2 Hash
[   0.5839 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512
[   0.5843 ] Assuming zero filled SBK key
[   0.5843 ] Assuming zero filled SBK key
[   0.5893 ] Sha saved in br_bct_BR.sha
[   0.5663 ] Updating BCT with SHA2 Hash
[   0.5684 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml
[   0.5707 ] Offset :4608 Len :3584
[   0.5712 ] Offset :68 Len :8124
[   0.5716 ] Generating coldboot mb1-bct
[   0.5731 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb
[   0.5745 ] MB1-BCT version: 0.10
[   0.5747 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported
[   0.5752 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported
[   0.5755 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported
[   0.5758 ] ERROR: /misc/tsc_controls/tsc_locking_config is not supported
[   0.5760 ] ERROR: /misc/tsc_controls/tsc_locking_diff_configuration is not supported
[   0.5763 ] ERROR: /misc/tsc_controls/tsc_locking_ref_frequency_configuration is not supported
[   0.5767 ] ERROR: /misc/tsc_controls/tsc_locking_control is not supported
[   0.5768 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_configuration is not supported
[   0.5768 ] ERROR: /misc/tsc_controls/tsc_locking_fast_adjust_configuration is not supported
[   0.5768 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_delta_control is not supported
[   0.5768 ] ERROR: /misc/tsc_controls/tsc_capture_control_ptx is not supported
[   0.5768 ] ERROR: /misc/tsc_controls/tsc_capture_config_ptx is not supported
[   0.5768 ] ERROR: /misc/tsc_controls/tsc_stscrsr is not supported
[   0.5768 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_num_control is not supported
[   0.5768 ] 
[   0.5768 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb 
[   0.5768 ] Added Platform Config 9 data with size :- 100
[   0.5768 ] 
[   0.5769 ] Updating mb1-bct with firmware information
[   0.5783 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin
[   0.5821 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct
[   0.5856 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk
[   0.5872 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[   0.6120 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.6124 ] Assuming zero filled SBK key
[   0.6160 ] Warning: pub_key.key is not found
[   0.5941 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk
[   0.5964 ] Generating recovery mb1-bct
[   0.5979 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb
[   0.5997 ] MB1-BCT version: 0.10
[   0.5999 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported
[   0.6003 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported
[   0.6006 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported
[   0.6009 ] ERROR: /misc/tsc_controls/tsc_locking_config is not supported
[   0.6012 ] ERROR: /misc/tsc_controls/tsc_locking_diff_configuration is not supported
[   0.6016 ] ERROR: /misc/tsc_controls/tsc_locking_ref_frequency_configuration is not supported
[   0.6019 ] ERROR: /misc/tsc_controls/tsc_locking_control is not supported
[   0.6022 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_configuration is not supported
[   0.6022 ] ERROR: /misc/tsc_controls/tsc_locking_fast_adjust_configuration is not supported
[   0.6022 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_delta_control is not supported
[   0.6022 ] ERROR: /misc/tsc_controls/tsc_capture_control_ptx is not supported
[   0.6022 ] ERROR: /misc/tsc_controls/tsc_capture_config_ptx is not supported
[   0.6022 ] ERROR: /misc/tsc_controls/tsc_stscrsr is not supported
[   0.6022 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_num_control is not supported
[   0.6022 ] 
[   0.6022 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb 
[   0.6022 ] Added Platform Config 9 data with size :- 100
[   0.6022 ] 
[   0.6023 ] Updating mb1-bct with firmware information
[   0.6038 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo readinfo_t234_min_prod.xml.bin
[   0.6071 ] tegrahost_v2 --chip 0x23 0 --align mb1_bct_MB1_aligned.bct
[   0.6100 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_bct_MB1_aligned.bct zerosbk
[   0.6114 ] adding BCH for mb1_bct_MB1_aligned.bct
[   0.6362 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.6365 ] Assuming zero filled SBK key
[   0.6394 ] Warning: pub_key.key is not found
[   0.6185 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk
[   0.6211 ] Error: Skip generating mem_bct because sdram_config is not defined
[   0.6212 ] Error: Skip generating mem_bct because sdram_config is not defined
[   0.6212 ] Copying signatures
[   0.6226 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[   0.6304 ] mb1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[   0.6306 ] psc_bl1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[   0.6306 ] Boot Rom communication
[   0.6321 ] tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[   0.6335 ] BR_CID: 0xE9012344705E364B0400000010FE0100
[   0.8366 ] Sending bct_br
[   1.0508 ] Sending mb1
[   1.0519 ] ERROR: might be timeout in USB write.
Error: Return value 3
Command tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
Reading board information failed.
Error: /home/hao/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/bootloader/signed/flash.idx is not found
Error: failed to relocate images to /home/hao/bootFromExternalStorage/R35.4.1/Linux_for_Tegra/tools/kernel_flash/images
Cleaning up...

I already connect usb serial but there was no logs showing. I’m using ubuntu 20.04

Are you sure you are doing it correctly?

Sorry, I’m able to capture it now, the uart logs below

[0000.073] I> MB1 (version: 1.2.0.0-t234-54845784-562369e5)
[0000.078] I> t234-A01-1-Silicon (0x12347) Prod
[0000.083] I> Boot-mode : Coldboot
[0000.086] I> Entry timestamp: 0x00000000
[0000.089] I> last_boot_error: 0x48480112
[0000.093] I> BR-BCT: preprod_dev_sign: 0
[0000.097] I> rst_source: 0x17, rst_level: 0x1
[0000.101] I> Task: SE error check
[0000.104] I> Task: Bootchain select WAR set
[0000.108] I> Task: Enable SLCG
[0000.111] I> Task: CRC check
[0000.114] I> Task: Initialize MB2 params
[0000.118] I> MB2-params @ 0x40060000
[0000.122] I> Task: Crypto init
[0000.125] I> Task: Perform MB1 KAT tests
[0000.129] I> Task: NVRNG health check
[0000.132] I> NVRNG: Health check success
[0000.136] I> Task: MSS Bandwidth limiter settings for iGPU clients
[0000.142] I> Task: Enabling and initialization of Bandwidth limiter
[0000.148] I> No request to configure MBWT settings for any PC!
[0000.154] I> Task: Secure debug controls
[0000.158] I> Task: strap war set
[0000.161] I> Task: Initialize SOC Therm
[0000.164] I> Task: Program NV master stream id
[0000.169] I> Task: Verify boot mode
[0000.174] I> Task: Alias fuses
[0000.178] W> FUSE_ALIAS: Fuse alias on production fused part is not supported.
[0000.185] I> Task: Print SKU type
[0000.188] I> FUSE_OPT_CCPLEX_CLUSTER_DISABLE = 0x000001c8
[0000.193] I> FUSE_OPT_GPC_DISABLE = 0x00000002
[0000.198] I> FUSE_OPT_TPC_DISABLE = 0x000000f0
[0000.202] I> FUSE_OPT_DLA_DISABLE = 0x00000003
[0000.206] I> FUSE_OPT_PVA_DISABLE = 0x00000001
[0000.210] I> FUSE_OPT_NVENC_DISABLE = 0x00000001
[0000.215] I> FUSE_OPT_NVDEC_DISABLE = 0x00000000
[0000.219] I> FUSE_OPT_FSI_DISABLE = 0x00000001
[0000.224] I> FUSE_OPT_EMC_DISABLE = 0x0000000c
[0000.228] I> FUSE_BOOTROM_PATCH_VERSION = 0x7
[0000.232] I> FUSE_PSCROM_PATCH_VERSION = 0x7
[0000.236] I> FUSE_OPT_ADC_CAL_FUSE_REV = 0x2
[0000.240] I> FUSE_SKU_INFO_0 = 0xd5
[0000.244] I> FUSE_OPT_SAMPLE_TYPE_0 = 0x3 PS
[0000.248] I> FUSE_PACKAGE_INFO_0 = 0x2
[0000.251] I> SKU: Prod
[0000.254] I> Task: Boost clocks
[0000.257] I> Initializing PLLC2 for AXI_CBB.
[0000.261] I> AXI_CBB : src = 35, divisor = 0
[0000.265] I> Task: Voltage monitor
[0000.268] I> VMON: Vmon re-calibration and fine tuning done
[0000.274] I> Task: UPHY init
[0000.278] I> HSIO UPHY init done
[0000.282] W> Skipping GBE UPHY config
[0000.285] I> Task: Boot device init
[0000.288] I> Boot_device: QSPI_FLASH instance: 0
[0000.293] I> Qspi clock source : pllc_out0
[0000.297] I> QSPI Flash: Macronix 64MB
[0000.301] I> QSPI-0l initialized successfully
[0000.305] I> Task: TSC init
[0000.308] I> Task: Load membct
[0000.311] I> RAM_CODE 0x4000421
[0000.314] I> Loading MEMBCT
[0000.317] I> Slot: 1
[0000.319] I> Binary[0] block-66816 (partition size: 0x40000)
[0000.324] I> Binary name: MEM-BCT-0
[0000.327] I> Size of crypto header is 8192
[0000.331] I> Size of crypto header is 8192
[0000.335] I> strt_pg_num(66816) num_of_pgs(16) read_buf(0x40050000)
[0000.342] I> BCH of MEM-BCT-0 read from storage
[0000.346] I> BCH address is : 0x40050000
[0000.350] I> MEM-BCT-0 header integrity check is success
[0000.355] I> Binary magic in BCH component 0 is MEM0
[0000.360] I> component binary type is 0
[0000.364] I> strt_pg_num(66832) num_of_pgs(115) read_buf(0x40040000)
[0000.370] I> MEM-BCT-0 binary is read from storage
[0000.375] I> MEM-BCT-0 binary integrity check is success
[0000.380] I> Binary MEM-BCT-0 loaded successfully at 0x40040000 (0xe580)
[0000.387] I> RAM_CODE 0x4000421
[0000.392] I> RAM_CODE 0x4000421
[0000.396] I> Task: Load Page retirement list
[0000.400] I> Task: SDRAM params override
[0000.404] I> Task: Save mem-bct info
[0000.408] I> Task: Carveout allocate
[0000.411] I> RCM blob carveout will not be allocated
[0000.416] I> Update CCPLEX IST carveout from MB1-BCT
[0000.421] I> ECC region[0]: Start:0x0, End:0x0
[0000.425] I> ECC region[1]: Start:0x0, End:0x0
[0000.429] I> ECC region[2]: Start:0x0, End:0x0
[0000.434] I> ECC region[3]: Start:0x0, End:0x0
[0000.438] I> ECC region[4]: Start:0x0, End:0x0
[0000.442] I> Non-ECC region[0]: Start:0x80000000, End:0x280000000
[0000.448] I> Non-ECC region[1]: Start:0x0, End:0x0
[0000.453] I> Non-ECC region[2]: Start:0x0, End:0x0
[0000.457] I> Non-ECC region[3]: Start:0x0, End:0x0
[0000.462] I> Non-ECC region[4]: Start:0x0, End:0x0
[0000.473] I> allocated(CO:43) base:0x27c000000 size:0x4000000 align: 0x200000
[0000.480] I> allocated(CO:39) base:0x279e00000 size:0x2200000 align: 0x10000
[0000.487] I> allocated(CO:20) base:0x276000000 size:0x2000000 align: 0x2000000
[0000.494] I> allocated(CO:24) base:0x274000000 size:0x2000000 align: 0x2000000
[0000.501] I> allocated(CO:28) base:0x272000000 size:0x2000000 align: 0x2000000
[0000.508] I> allocated(CO:22) base:0x278000000 size:0x1000000 align: 0x1000000
[0000.515] I> allocated(CO:35) base:0x279000000 size:0xe00000 align: 0x10000
[0000.522] I> allocated(CO:02) base:0x271800000 size:0x800000 align: 0x800000
[0000.529] I> allocated(CO:03) base:0x271000000 size:0x800000 align: 0x800000
[0000.536] I> allocated(CO:06) base:0x270800000 size:0x800000 align: 0x800000
[0000.543] I> allocated(CO:56) base:0x270000000 size:0x800000 align: 0x200000
[0000.550] I> allocated(CO:07) base:0x26fc00000 size:0x400000 align: 0x400000
[0000.557] I> allocated(CO:33) base:0x26f800000 size:0x400000 align: 0x200000
[0000.564] I> allocated(CO:23) base:0x26f600000 size:0x200000 align: 0x200000
[0000.571] I> allocated(CO:01) base:0x26f500000 size:0x100000 align: 0x100000
[0000.578] I> allocated(CO:04) base:0x26f400000 size:0x100000 align: 0x100000
[0000.584] I> allocated(CO:05) base:0x26f300000 size:0x100000 align: 0x100000
[0000.591] I> allocated(CO:08) base:0x26f200000 size:0x100000 align: 0x100000
[0000.598] I> allocated(CO:09) base:0x26f100000 size:0x100000 align: 0x100000
[0000.605] I> allocated(CO:15) base:0x26f000000 size:0x100000 align: 0x100000
[0000.612] I> allocated(CO:17) base:0x26ef00000 size:0x100000 align: 0x100000
[0000.619] I> allocated(CO:27) base:0x26ee00000 size:0x100000 align: 0x100000
[0000.626] I> allocated(CO:42) base:0x26ed00000 size:0x100000 align: 0x100000
[0000.633] I> allocated(CO:54) base:0x26ec80000 size:0x80000 align: 0x80000
[0000.640] I> allocated(CO:34) base:0x26ec70000 size:0x10000 align: 0x10000
[0000.647] I> allocated(CO:72) base:0x26ea70000 size:0x200000 align: 0x10000
[0000.653] I> allocated(CO:47) base:0x26e600000 size:0x400000 align: 0x200000
[0000.660] I> allocated(CO:48) base:0x26ea50000 size:0x20000 align: 0x10000
[0000.667] I> allocated(CO:69) base:0x26ea30000 size:0x20000 align: 0x10000
[0000.674] I> allocated(CO:49) base:0x26ea20000 size:0x10000 align: 0x10000
[0000.681] I> allocated(CO:50) base:0x26ea10000 size:0x10000 align: 0x10000
[0000.687] I> NSDRAM base: 0x80000000, end: 0x26ea70000, size: 0x1eea70000
[0000.694] I> Task: Thermal check
[0000.697] I> max_chip_limit = 105
[0000.700] I> min_chip_limit = -28
[0000.703] I> max temp read = 34
[0000.706] I> min temp read = 32
[0000.709] I> Task: Update FSI SCR with thermal fuse data
[0000.715] I> Task: Enable WDT 5th expiry
[0000.718] I> Task: I2C register
[0000.721] I> Task: Set I2C bus freq
[0000.725] I> Task: Reset FSI
[0000.727] I> Task: Pinmux init
[0000.731] I> skipped mmio_addr = 0x9240008
[0000.735] I> skipped mmio_addr = 0x9240000
[0000.738] I> skipped mmio_addr = 0x9240010
[0000.742] I> skipped mmio_addr = 0x9240018
[0000.746] I> skipped mmio_addr = 0x9240020
[0000.750] I> skipped mmio_addr = 0x9240030
[0000.754] I> skipped mmio_addr = 0x9240028
[0000.758] I> skipped mmio_addr = 0x9240038
[0000.762] I> skipped mmio_addr = 0x9240040
[0000.766] I> skipped mmio_addr = 0x9240048
[0000.770] I> skipped mmio_addr = 0x9241000
[0000.774] I> skipped mmio_addr = 0x9241008
[0000.778] I> skipped mmio_addr = 0x9241010
[0000.782] I> skipped mmio_addr = 0x9241018
[0000.786] I> skipped mmio_addr = 0x9241020
[0000.790] I> skipped mmio_addr = 0x9241028
[0000.794] I> skipped mmio_addr = 0x9241030
[0000.798] I> skipped mmio_addr = 0x9241038
[0000.801] I> skipped mmio_addr = 0x9241040
[0000.805] I> skipped mmio_addr = 0x9242000
[0000.809] I> skipped mmio_addr = 0x9242008
[0000.813] I> Task: Prod config init
[0000.817] I> Task: Pad voltage init
[0000.820] I> Task: Prod init
[0000.823] I> Task: Program rst req config reg
[0000.827] I> Task: Common rail init
[0000.830] I> DONE: Thermal config
[0000.834] W> DEVICE_PROD: module = 13, instance = 4 not found in device prod.
[0000.842] I> DONE: SOC rail config
[0000.846] W> PMIC_CONFIG: Rail: MEMIO rail config not found in MB1 BCT.
[0000.853] I> DONE: MEMIO rail config
[0000.857] W> PMIC_CONFIG: Rail: GPU rail info not found in MB1 BCT.
[0000.863] I> DONE: GPU rail info
[0000.866] W> PMIC_CONFIG: Rail: CV rail info not found in MB1 BCT.
[0000.872] I> DONE: CV rail info
[0000.875] I> Task: Mem clock src
[0000.878] I> Task: Misc. board config
[0000.882] I> PMIC_CONFIG: Platform config not found in MB1 BCT.
[0000.887] I> Task: SDRAM init
[0000.890] I> MemoryType: 4 MemBctRevision: 1
[0000.897] I> MSS CAR: PLLM/HUB programming for MemoryType: 4 and MemBctRevision: 1
[0000.904] I> MSS CAR: Init PLLM
[0000.907] I> MSS CAR: Init PLLHUB
[0000.912] I> Encryption:   MTS: en, TX: en, VPR: en, GSC: en
[0000.966] E> MSS: Failed to initialize SDRAM.
[0000.970] C> Task 0x2f failed (err: 0x48480112)
[0000.975] E> Top caller module: MSS, error module: MSS, reason: 0x12, aux_info: 0x01
[0000.982] C> Boot Info Table status dump :
01111111001110001111111111111111111111111111101

Board information:

###############################################################################
# L4T BSP Information:
# R35 , REVISION: 4.1
# User release: 0.0
###############################################################################
# Target Board Information:
# Name: jetson-orin-nano-devkit, Board Family: t186ref, SoC: Tegra 234,
# OpMode: production, Boot Authentication: SBKPKC,
# Disk encryption: disabled ,
###############################################################################

I have re-flashed the image by using this command sudo ./tools/kernel_flash/l4t_initrd_flash.sh -u ./rsa.pem -v ./sbk.key --external-device nvme0n1p1 -c tools/kernel_flash/flash_l4t_external.xml -p “-c bootloader/t186ref/cfg/flash_t234_qspi.xml --no-systemimg” --showlogs --network usb0 jetson-orin-nano-devkit internal

and faced the error

Copying /home/fsbox1/l6a-builder/Linux_for_Tegra/bootloader/enc_signed/gpt_secondary_6_0.bin  /home/fsbox1/l6a-builder/Linux_for_Tegra/tools/kernel_flash/images/external/gpt_secondary_6_0.bin
'/home/fsbox1/l6a-builder/Linux_for_Tegra/bootloader/enc_signed/gpt_secondary_6_0.bin' -> '/home/fsbox1/l6a-builder/Linux_for_Tegra/tools/kernel_flash/images/external/gpt_secondary_6_0.bin'
Copy flash script to /home/fsbox1/l6a-builder/Linux_for_Tegra/tools/kernel_flash/images
'/home/fsbox1/l6a-builder/Linux_for_Tegra/tools/kernel_flash/l4t_flash_from_kernel.sh' -> '/home/fsbox1/l6a-builder/Linux_for_Tegra/tools/kernel_flash/images/l4t_flash_from_kernel.sh'
Success
******************************************
*                                        *
*  Step 2: Generate rcm boot commandline *
*                                        *
******************************************
ROOTFS_AB= ROOTFS_ENC= /home/fsbox1/l6a-builder/Linux_for_Tegra/flash.sh -u "./rsa.pem" -v "./sbk.key"  --no-flash --rcm-boot jetson-orin-nano-devkit mmcblk0p1
###############################################################################
# L4T BSP Information:
# R35 , REVISION: 4.1
# User release: 0.0
###############################################################################
copying emc_fuse_dev_params(/home/fsbox1/l6a-builder/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-br-bct-diag-boot.dts)... done.
copying device_config(/home/fsbox1/l6a-builder/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-device-p3767-0000.dts)... done.
copying misc_config(/home/fsbox1/l6a-builder/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-misc-p3767-0000.dts)... done.
./tegraflash.py --chip 0x23 --applet "/home/fsbox1/l6a-builder/Linux_for_Tegra/bootloader/mb1_t234_prod.bin" --skipuid --cfg readinfo_t234_min_prod.xml --dev_params tegra234-br-bct-diag-boot.dts --device_config tegra234-mb1-bct-device-p3767-0000.dts --misc_config tegra234-mb1-bct-misc-p3767-0000.dts --bins "mb2_applet applet_t234.bin" --cmd "dump eeprom cvm cvm.bin; dump custinfo custinfo_out.bin; reboot recovery" --key "/home/fsbox1/l6a-builder/Linux_for_Tegra/rsa.pem" --encrypt_key "/home/fsbox1/l6a-builder/Linux_for_Tegra/sbk.key"
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[   0.0278 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   0.0288 ] File rcm_state open failed
[   0.0291 ] ERROR: failed to read rcm_state
[   0.0291 ]
[   0.0321 ] tegrasign_v3.py --key /home/fsbox1/l6a-builder/Linux_for_Tegra/rsa.pem --getmode mode.txt
[   0.0338 ] Key size is 384 bytes
[   0.0317 ] Pre-processing config: tegra234-mb1-bct-device-p3767-0000.dts
[   0.0447 ] Pre-processing config: tegra234-mb1-bct-misc-p3767-0000.dts
[   0.0556 ] Parsing partition layout
[   0.0575 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[   0.0597 ] Kernel DTB used: None
[   0.0598 ] WARNING: dce base dtb is not provided

[   0.0598 ] Parsing partition layout
[   0.0612 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[   0.0629 ] Creating list of images to be encrypted and signed
[   0.0651 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --list images_list.xml oem-rsa
[   0.0665 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[   0.0683 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[   0.0689 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[   0.0762 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[   0.0768 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[   0.0833 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[   0.0838 ] adding BCH for mb2_t234_aligned.bin
[   0.0867 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[   0.0994 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[   0.0998 ] adding BCH for mb2_t234_aligned.bin
[   0.1185 ] tegrasign_v3.py --file mb1_t234_prod_aligned_sigheader.bin --key /home/fsbox1/l6a-builder/Linux_for_Tegra/sbk.key --kdf kdf_file=kdf_args_mb1_t234_prod_aligned_sigheader.yaml
[   0.1201 ] Perform key derivation on mb1_t234_prod_aligned_sigheader.bin
[   0.1529 ] Key Size is 32 bytes
[   0.1542 ] Performing aes-gcm encryption
[   0.1547 ] --key fa3ae7e3dfd503ee15c6119923c4da4ad7a44d6bc97920d510dffac39841c9c6
[   0.1552 ] --iv 000000000000000000000000
[   0.1554 ] --aad 4d42314290290400000000500000005001020100000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
[   0.1687 ] Sha saved in mb1_t234_prod_aligned_sigheader_tmp0_encrypt.sha
[   0.1682 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_mb1 mb1_bootloader mb1_t234_prod_aligned_sigheader_encrypt.bin
[   0.1693 ] INFO: updated file for <A_mb1 mb1_bootloader mb1_t234_prod_aligned_sigheader_encrypt.bin> successfully
[   0.1707 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_mb1 mb1_bootloader mb1_t234_prod_aligned_sigheader_encrypt.bin
[   0.1720 ] INFO: updated file for <B_mb1 mb1_bootloader mb1_t234_prod_aligned_sigheader_encrypt.bin> successfully
[   0.1756 ] tegrasign_v3.py --file mb1_t234_prod_aligned_sigheader.bin --key /home/fsbox1/l6a-builder/Linux_for_Tegra/sbk.key --kdf kdf_file=kdf_args_mb1_t234_prod_aligned_sigheader.yaml
[   0.1773 ] Perform key derivation on mb1_t234_prod_aligned_sigheader.bin
[   0.2120 ] Key Size is 32 bytes
[   0.2138 ] Performing aes-gcm encryption
[   0.2143 ] --key fa3ae7e3dfd503ee15c6119923c4da4ad7a44d6bc97920d510dffac39841c9c6
[   0.2149 ] --iv 000000000000000000000000
[   0.2151 ] --aad 4d42314290290400000000500000005001020100000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
[   0.2282 ] Sha saved in mb1_t234_prod_aligned_sigheader_tmp0_encrypt.sha
[   0.2284 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_mb1 mb1_bootloader mb1_t234_prod_aligned_sigheader_encrypt.bin
[   0.2296 ] INFO: updated file for <A_mb1 mb1_bootloader mb1_t234_prod_aligned_sigheader_encrypt.bin> successfully
[   0.2313 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_mb1 mb1_bootloader mb1_t234_prod_aligned_sigheader_encrypt.bin
[   0.2325 ] INFO: updated file for <B_mb1 mb1_bootloader mb1_t234_prod_aligned_sigheader_encrypt.bin> successfully
[   0.2361 ] tegrasign_v3.py --file psc_bl1_t234_prod_aligned_sigheader.bin --key /home/fsbox1/l6a-builder/Linux_for_Tegra/sbk.key --kdf kdf_file=kdf_args_psc_bl1_t234_prod_aligned_sigheader.yaml
[   0.2375 ] Perform key derivation on psc_bl1_t234_prod_aligned_sigheader.bin
[   0.2692 ] Key Size is 32 bytes
[   0.2704 ] Performing aes-gcm encryption
[   0.2707 ] --key 0d3f7d8e0174b758a5a9745adcddec94ac720d9e8a87561f37122f3a603fa511
[   0.2713 ] --iv 000000000000000000000000
[   0.2715 ] --aad 50534342f0bf0100000012000004120006010200000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
[   0.2770 ] Sha saved in psc_bl1_t234_prod_aligned_sigheader_tmp0_encrypt.sha
[   0.2758 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_psc_bl1 psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin
[   0.2769 ] INFO: updated file for <A_psc_bl1 psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin> successfully
[   0.2786 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_psc_bl1 psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin
[   0.2797 ] INFO: updated file for <B_psc_bl1 psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin> successfully
[   0.2833 ] tegrasign_v3.py --file mb2_t234_sigheader.bin --key /home/fsbox1/l6a-builder/Linux_for_Tegra/sbk.key --kdf kdf_file=kdf_args_mb2_t234_sigheader.yaml
[   0.2853 ] Perform key derivation on mb2_t234_sigheader.bin
[   0.3193 ] Key Size is 32 bytes
[   0.3209 ] Performing aes-gcm encryption
[   0.3214 ] --key b0bd8a0d550ab825b7676a10c609d32454baba316e4742cf2e3b8dc26fd6392e
[   0.3220 ] --iv 000000000000000000000000
[   0.3222 ] --aad 4d423242a0f10500000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
[   0.3424 ] Sha saved in mb2_t234_sigheader_tmp0_encrypt.sha
[   0.3424 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_mb2 mb2_bootloader mb2_t234_sigheader_encrypt.bin
[   0.3435 ] INFO: updated file for <A_mb2 mb2_bootloader mb2_t234_sigheader_encrypt.bin> successfully
[   0.3451 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_mb2 mb2_bootloader mb2_t234_sigheader_encrypt.bin
[   0.3465 ] INFO: updated file for <B_mb2 mb2_bootloader mb2_t234_sigheader_encrypt.bin> successfully
[   0.3502 ] tegrasign_v3.py --file psc_bl1_t234_prod_aligned_sigheader.bin --key /home/fsbox1/l6a-builder/Linux_for_Tegra/sbk.key --kdf kdf_file=kdf_args_psc_bl1_t234_prod_aligned_sigheader.yaml
[   0.3517 ] Perform key derivation on psc_bl1_t234_prod_aligned_sigheader.bin
[   0.3853 ] Key Size is 32 bytes
[   0.3867 ] Performing aes-gcm encryption
[   0.3871 ] --key 0d3f7d8e0174b758a5a9745adcddec94ac720d9e8a87561f37122f3a603fa511
[   0.3876 ] --iv 000000000000000000000000
[   0.3878 ] --aad 50534342f0bf0100000012000004120006010200000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
[   0.3933 ] Sha saved in psc_bl1_t234_prod_aligned_sigheader_tmp0_encrypt.sha
[   0.3923 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_psc_bl1 psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin
[   0.3933 ] INFO: updated file for <A_psc_bl1 psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin> successfully
[   0.3946 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_psc_bl1 psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin
[   0.3954 ] INFO: updated file for <B_psc_bl1 psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin> successfully
[   0.3989 ] tegrasign_v3.py --file mb2_t234_sigheader.bin --key /home/fsbox1/l6a-builder/Linux_for_Tegra/sbk.key --kdf kdf_file=kdf_args_mb2_t234_sigheader.yaml
[   0.4008 ] Perform key derivation on mb2_t234_sigheader.bin
[   0.4348 ] Key Size is 32 bytes
[   0.4363 ] Performing aes-gcm encryption
[   0.4368 ] --key b0bd8a0d550ab825b7676a10c609d32454baba316e4742cf2e3b8dc26fd6392e
[   0.4372 ] --iv 000000000000000000000000
[   0.4374 ] --aad 4d423242a0f10500000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
[   0.4534 ] Sha saved in mb2_t234_sigheader_tmp0_encrypt.sha
[   0.4544 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename A_mb2 mb2_bootloader mb2_t234_sigheader_encrypt.bin
[   0.4558 ] INFO: updated file for <A_mb2 mb2_bootloader mb2_t234_sigheader_encrypt.bin> successfully
[   0.4574 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.bin --update_part_filename B_mb2 mb2_bootloader mb2_t234_sigheader_encrypt.bin
[   0.4587 ] INFO: updated file for <B_mb2 mb2_bootloader mb2_t234_sigheader_encrypt.bin> successfully
[   0.4623 ] tegrasign_v3.py --key /home/fsbox1/l6a-builder/Linux_for_Tegra/rsa.pem --list images_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.4639 ] Key size is 384 bytes
[   0.7710 ] Saving pkc public key in pub_key.key
[   0.7681 ] Parsing dev params for multi chains
[   0.7754 ] Generating br-bct
[   0.7774 ] Updating dev and MSS params in BR BCT
[   0.7776 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[   0.7791 ] Updating bl info
[   0.7803 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[   0.7814 ] WARNING: boot chain is not completed. set to 0
[   0.7825 ] Perform encryption on bct
[   0.7857 ] tegrasign_v3.py --file br_bct_BR.bct --key /home/fsbox1/l6a-builder/Linux_for_Tegra/sbk.key --kdf kdf_file=kdf_args_br_bct_BR.yaml
[   0.7868 ] Perform key derivation on br_bct_BR.bct
[   0.7882 ] ERROR: 0 pay load offset 6544
[   0.8211 ] Key Size is 32 bytes
[   0.8222 ] Performing aes-gcm encryption
[   0.8225 ] --key 0ad9e158db70cf153ff6807042d0d6b762e0c89df0fdb98671fd1c7d51dd8934
[   0.8227 ] --iv 000000000000000000000000
[   0.8227 ] --aad 0000000000000000000000000000000042435442000000000000000000000000000000000000000000000000000000000000000000000000
[   0.8242 ] Sha saved in br_bct_BR_tmp_encrypt.sha
[   0.8218 ] Get Signed section of bct
[   0.8229 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml
[   0.8241 ] Signing BCT
[   0.8271 ] tegrasign_v3.py --key /home/fsbox1/l6a-builder/Linux_for_Tegra/rsa.pem --list bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.8283 ] Key size is 384 bytes
[   0.8845 ] Saving pkc public key in pub_key.key
[   0.8816 ] Updating BCT with signature
[   0.8826 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml --pubkeyhash pub_key.key
[   0.8835 ] Offset :4608 Len :3584
[   0.8840 ] Generating SHA2 Hash
[   0.8870 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512
[   0.8872 ] Assuming zero filled SBK key
[   0.8872 ] Assuming zero filled SBK key
[   0.8903 ] Sha saved in br_bct_BR.sha
[   0.8878 ] Updating BCT with SHA2 Hash
[   0.8888 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml
[   0.8897 ] Offset :4608 Len :3584
[   0.8901 ] Offset :68 Len :8124
[   0.8904 ] Generating coldboot mb1-bct
[   0.8916 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb
[   0.8927 ] MB1-BCT version: 0.10
[   0.8929 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported
[   0.8936 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported
[   0.8942 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported
[   0.8948 ] ERROR: /misc/tsc_controls/tsc_locking_config is not supported
[   0.8953 ] ERROR: /misc/tsc_controls/tsc_locking_diff_configuration is not supported
[   0.8953 ] ERROR: /misc/tsc_controls/tsc_locking_ref_frequency_configuration is not supported
[   0.8953 ] ERROR: /misc/tsc_controls/tsc_locking_control is not supported
[   0.8953 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_configuration is not supported
[   0.8953 ] ERROR: /misc/tsc_controls/tsc_locking_fast_adjust_configuration is not supported
[   0.8953 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_delta_control is not supported
[   0.8953 ] ERROR: /misc/tsc_controls/tsc_capture_control_ptx is not supported
[   0.8954 ] ERROR: /misc/tsc_controls/tsc_capture_config_ptx is not supported
[   0.8954 ] ERROR: /misc/tsc_controls/tsc_stscrsr is not supported
[   0.8954 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_num_control is not supported
[   0.8954 ]
[   0.8954 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb
[   0.8954 ] Added Platform Config 9 data with size :- 100
[   0.8954 ]
[   0.8955 ] Updating mb1-bct with firmware information
[   0.8967 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin
[   0.8981 ] mb1_cold_boot_bct_MB1.bct
[   0.8982 ] Encrypting and signing mb1_cold_boot_bct_MB1.bct
[   0.8982 ] header_magic: 4d423142
[   0.8995 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct
[   0.9016 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct oem-rsa --chip 0x23 0 --magicid MBCT
[   0.9025 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[   0.9064 ] tegrasign_v3.py --file mb1_cold_boot_bct_MB1_aligned_sigheader.bct --key /home/fsbox1/l6a-builder/Linux_for_Tegra/sbk.key --kdf kdf_file=kdf_args_mb1_cold_boot_bct_MB1_aligned_sigheader.yaml
[   0.9074 ] Perform key derivation on mb1_cold_boot_bct_MB1_aligned_sigheader.bct
[   0.9379 ] Key Size is 32 bytes
[   0.9391 ] Performing aes-gcm encryption
[   0.9395 ] --key e6961d1d3dacbd09382164c8ca33e5be9c74037190c18e9293a85d320496f07b
[   0.9398 ] --iv 000000000000000000000000
[   0.9398 ] --aad 4d42435430150000000004400000044001010000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
[   0.9414 ] Sha saved in mb1_cold_boot_bct_MB1_aligned_sigheader_tmp0_encrypt.sha
[   0.9421 ] tegrasign_v3.py --key /home/fsbox1/l6a-builder/Linux_for_Tegra/rsa.pem --list mb1_cold_boot_bct_MB1_aligned_sigheader_encrypt.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.9433 ] Key size is 384 bytes
[   0.9944 ] Saving pkc public key in pub_key.key
[   0.9927 ] tegrahost_v2 --chip 0x23 0 --pubkeyhash pub_key.key --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader_encrypt.bct.signed mb1_cold_boot_bct_MB1_aligned_sigheader_encrypt.bct.sig oem-rsa
[   0.9946 ] Generating recovery mb1-bct
[   0.9956 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb
[   0.9966 ] MB1-BCT version: 0.10
[   0.9968 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported
[   0.9972 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported
[   0.9976 ] ERROR: carveout /misc/carveout/aux_info@CARVEOUT_UNUSED1/ is not supported
[   0.9979 ] ERROR: /misc/tsc_controls/tsc_locking_config is not supported
[   0.9983 ] ERROR: /misc/tsc_controls/tsc_locking_diff_configuration is not supported
[   0.9986 ] ERROR: /misc/tsc_controls/tsc_locking_ref_frequency_configuration is not supported
[   0.9991 ] ERROR: /misc/tsc_controls/tsc_locking_control is not supported
[   0.9992 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_configuration is not supported
[   0.9992 ] ERROR: /misc/tsc_controls/tsc_locking_fast_adjust_configuration is not supported
[   0.9992 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_delta_control is not supported
[   0.9992 ] ERROR: /misc/tsc_controls/tsc_capture_control_ptx is not supported
[   0.9992 ] ERROR: /misc/tsc_controls/tsc_capture_config_ptx is not supported
[   0.9992 ] ERROR: /misc/tsc_controls/tsc_stscrsr is not supported
[   0.9992 ] ERROR: /misc/tsc_controls/tsc_locking_adjust_num_control is not supported
[   0.9992 ]
[   0.9992 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb
[   0.9992 ] Added Platform Config 9 data with size :- 100
[   0.9992 ]
[   0.9993 ] Updating mb1-bct with firmware information
[   1.0003 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo readinfo_t234_min_prod.xml.bin
[   1.0015 ] mb1_bct_MB1.bct
[   1.0015 ] Encrypting and signing mb1_bct_MB1.bct
[   1.0016 ] header_magic: 4d423142
[   1.0028 ] tegrahost_v2 --chip 0x23 0 --align mb1_bct_MB1_aligned.bct
[   1.0049 ] tegrahost_v2 --appendsigheader mb1_bct_MB1_aligned.bct oem-rsa --chip 0x23 0 --magicid MBCT
[   1.0059 ] adding BCH for mb1_bct_MB1_aligned.bct
[   1.0097 ] tegrasign_v3.py --file mb1_bct_MB1_aligned_sigheader.bct --key /home/fsbox1/l6a-builder/Linux_for_Tegra/sbk.key --kdf kdf_file=kdf_args_mb1_bct_MB1_aligned_sigheader.yaml
[   1.0106 ] Perform key derivation on mb1_bct_MB1_aligned_sigheader.bct
[   1.0417 ] Key Size is 32 bytes
[   1.0428 ] Performing aes-gcm encryption
[   1.0431 ] --key e6961d1d3dacbd09382164c8ca33e5be9c74037190c18e9293a85d320496f07b
[   1.0434 ] --iv 000000000000000000000000
[   1.0434 ] --aad 4d42435430150000000004400000044001010000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
[   1.0450 ] Sha saved in mb1_bct_MB1_aligned_sigheader_tmp0_encrypt.sha
[   1.0457 ] tegrasign_v3.py --key /home/fsbox1/l6a-builder/Linux_for_Tegra/rsa.pem --list mb1_bct_MB1_aligned_sigheader_encrypt.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   1.0469 ] Key size is 384 bytes
[   1.1033 ] Saving pkc public key in pub_key.key
[   1.1015 ] tegrahost_v2 --chip 0x23 0 --pubkeyhash pub_key.key --updatesigheader mb1_bct_MB1_aligned_sigheader_encrypt.bct.signed mb1_bct_MB1_aligned_sigheader_encrypt.bct.sig oem-rsa
[   1.1031 ] Error: Skip generating mem_bct because sdram_config is not defined
[   1.1031 ] Error: Skip generating mem_bct because sdram_config is not defined
[   1.1031 ] Copying signatures
[   1.1042 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml --pubkeyhash pub_key.key
[   1.1101 ] mb1_t234_prod_aligned_sigheader_encrypt.bin.signed filename is from images_list
[   1.1103 ] psc_bl1_t234_prod_aligned_sigheader_encrypt.bin.signed filename is from images_list
[   1.1103 ] Boot Rom communication
[   1.1117 ] tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader_encrypt.bin.signed --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader_encrypt.bin.signed --download bct_mb1 mb1_bct_MB1_sigheader_encrypt.bct.signed
[   1.1129 ] BR_CID: 0xE9012344705DE5DE040000000D008180
[   1.1416 ] Sending bct_br
[   1.1846 ] Sending mb1
[   1.1858 ] Sending psc_bl1
[   1.1985 ] Sending bct_mb1
[   1.2044 ] Boot Rom communication completed
[   1.2045 ] applet_t234.bin
[   1.2046 ] Encrypting and signing applet_t234.bin
[   1.2049 ] header_magic: 60000ea
[   1.2085 ] tegrahost_v2 --chip 0x23 0 --align applet_t234_aligned.bin
[   1.2124 ] tegrahost_v2 --appendsigheader applet_t234_aligned.bin oem-rsa --chip 0x23 0 --magicid MB2A
[   1.2142 ] adding BCH for applet_t234_aligned.bin
[   1.2279 ] tegrasign_v3.py --file applet_t234_aligned_sigheader.bin --key /home/fsbox1/l6a-builder/Linux_for_Tegra/sbk.key --kdf kdf_file=kdf_args_applet_t234_aligned_sigheader.yaml
[   1.2292 ] Perform key derivation on applet_t234_aligned_sigheader.bin
[   1.2652 ] Key Size is 32 bytes
[   1.2666 ] Performing aes-gcm encryption
[   1.2672 ] --key cacca839c29fc3f9e5a7e3e82fc7a744b0f66143bcd0ca504ae56ac7c9917077
[   1.2676 ] --iv 000000000000000000000000
[   1.2678 ] --aad 4d423241401b0400000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
[   1.2850 ] Sha saved in applet_t234_aligned_sigheader_tmp0_encrypt.sha
[   1.2870 ] tegrasign_v3.py --key /home/fsbox1/l6a-builder/Linux_for_Tegra/rsa.pem --list applet_t234_aligned_sigheader_encrypt.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   1.2885 ] Key size is 384 bytes
[   1.3420 ] Saving pkc public key in pub_key.key
[   1.3405 ] tegrahost_v2 --chip 0x23 0 --pubkeyhash pub_key.key --updatesigheader applet_t234_aligned_sigheader_encrypt.bin.signed applet_t234_aligned_sigheader_encrypt.bin.sig oem-rsa
[   1.3431 ] Sending mb2_applet...

[   1.3444 ] tegrarcm_v2 --chip 0x23 0 --pollbl --download applet applet_t234_sigheader_encrypt.bin.signed
[   1.3455 ] BL: version 1.2.0.0-t234-54845784-562369e5 last_boot_error: 656573201
[   1.4196 ] Sending applet
[   1.4452 ] ERROR: might be timeout in USB write.
Error: Return value 3
Command tegrarcm_v2 --chip 0x23 0 --pollbl --download applet applet_t234_sigheader_encrypt.bin.signed
Reading board information failed.
Cleaning up..

serial log:

[> MB1 (version: 1.2.0.084-562369e5)
[0013.22701-1-Silicon (0x12347) Prod
[0013t-mode : BPMP Diagnostic
 I> last_boo72283110x00000000
[0013.242] I>prod_dev_sign: 0
[0013t_source: 0xb, rst_leve13.250] I> Task: Initiaams
[0013.255] I> MB2-para000
[0013.258] I> Taskit
5] I> Task: NVRNG health check
[0013.268] I> h check success
[0013.272] I> Tass
[0013.276] I> Taskset
[0013.279] I> Task: Program Neam id
[0013.283] I> Task: Verify
                          [0013.289] I> Taskes
[0013.292] W> Fuse alias on production fused parported.
[0 SKU type
> FUSE_OPT_CCPLEX_CLUST= 0x000001c8] I> FUSE_OLE = 0x0000000000f0
[0013.316] I> FUSE_OPT_DLA0x00000003
[0013.321] I> FUSE_OPT = 0x00000001
[0013.325] I> FUSE_OPT_NVENC_DISABLE = 0x00000001
[0013.329] I> FUSE_OPT_NVDEC_DISABLE = 0x00000000
[0013.334] I> FUSE_OPT_FSI_DISABLE = 0x00000001
[0013.338] I> FUSE_OPT_EMC_DISABLE = 0x0000000c
[0013.342] I> FUSE_BOOTROM_PATCH_VERSION = 0x7
[0013.347] I> FUSE_PSCROM_PATCH_VERSION = 0x7
[0013.351] I> FUSE_OPT_ADC_CAL_FUSE_REV = 0x2
[0013.355] I> FUSE_SKU_INFO_0 = 0xd5
[0013.358] I> FUSE_OPT_SAMPLE_TYPE_0 = 0x3 PS
[0013.362] I> FUSE_PACKAGE_INFO_0 = 0xsor = 0
[0ine tuning [0013.407]C init
[0013.410] I> Task: Enable WDT 5th expiry
[0013.413] I> Task: I2C register
[0013.416] I> Task: Set I2C bus freq
[0013.420] I> Task: Reset FSI
[0013.422] I> Task: Enable clock-mon
[0013.426] I> FMON: Fmon re-programming done
[0013.430] I> Task: Mapper init
[0013.433] I> ixed firewal W> Firewall readback mismatch
[0013.445] I> Task: Load MB2/Applet/FSKP
[0013.448] I> Loading MB2 Applet
[0013.452] I> Slot: 1
[0013.454] E> BLOCK_DEV: Failed to open blockdev.
[0013.459] E> LOADER: Failed to open blockdev 0(0).
[0013.464] E> LOADER: Failed to get storage info for binary 21 from loader.
[0013.471] C> LOADER: Could not read binary 21.
▒▒
[0063.401] I> MB1.2.0.0-t234-54845784-50063.406] I> t234-A01-1-Silicon (0
[0063.410] I> Boot-mode : BPMP D[0063.414] Iestamp: 0x0063.418] I> last_boot_error: 0x2722422] I> BR-BCT: preprodurce: 0xb, x1
[0063.4 Initialize
 I> Task: Crypto init63.434] I> MB2-params @ 0x40060000
[0063.440] form MB1 KAT tests
[0063.444] I> Task: NVRNG health check
[0063.heck success
[0063.451] I> Task: Secure debug controls
I> Task: st
           [0063.458]ogram NV master stream id
[0063.463] I> Task: Verify boo[0063.468]ias fuses
[0063.472] W>  Fuse alias on production fused parported.
[0063.479] I> Task: Print SKU type
[0063.482] ICCPLEX_CLUSTER_DISABLE 8
[0063.487PT_GPC_DISABLE = 0x0000.492] I> FUSE_OPT_TPC_DISABLE = 0x0063.496] I> FUSE_OPT_DL0x00000003
[0063.500] E = 0x00000001
[0063.505] I> FUSE_OPT_NVENC_DISABLE = 0x00000001
[0063.509] I> FUSE_OPT_NVDEC_DISABLE = 0x00000000
[0063.513] I> FUSE_OPT_FSI_DISABLE = 0x00000001
[0063SE_OPT_EMC_DISABLE = 0x0000000c
[0 FUSE_BOOTRO I> FUSE_OPT_ADC_CAL_FUSE_REV = 0x] I> FUSE_SKU_INFO_0 = 0xd5
[0063.538] I> FUSE_TYPE_0 = 0x3 PS
[00FUSE_PACKAGEx2
[0063.546] I> SKU: Prod
[0063.548] I> Task: Boost cl.551] I> Ini_CBB.
[00AXI_CBB : srisor = 0
] I> VMON: Vration and fine tuning.568] I> Ta71] W> UPHY: UPHY lane s empty in MB1 BCT.
[ Task: Boot
[0063.579] I> Boot_device: RCM
[0063.582nfiguration success
[> Task: TSC init
[0063.589] I> Task: Enable WDT 5th ex.593] I> Task: I2C register
[0063.596] I> Task: Set I2C 0063.599] I> Task: Reset FSI
[0063.602] I> Task: Enable clock-mon
[0063.606] I> FMON: Fmon re-programming done
[0063.610] I> Task: Mapper init
[0063.613] I> Task: MB1 fixed firewalls
[0063.619] W> Firewall readback mismatch
[0063.624] I> Task: Load MB2/Applet/FSKP
[0063.628] I> Loading MB2 Applet
[0063.631] I> Slot: 1
[0063.634] E> BLOCK_DEV: Failed to open blockdev.
[0063.639] E> LOADER: Failed to open blockdev 0(0).
[0063.644] E> LOADER: Failed to get storage info for binary 21 from loader.
[0063.651] C> LOADER: Could not read binary 21.
[0063.655] E> Failed to load MB2
[0063.658] C> Task 0x46 failed (err: 0x27228311)
[0063.663] E> Top caller module: MB2_PARAMS, error module: LOADER, reason: 0x11, aux_info: 0x83
[0063.671] C> Boot Info Table status dump :
0111100000111000110111111111000000011110000000000000011000001
▒▒
[0063.752] I> MB1 (version: 1.54845784-562369e5)
[00t234-A01-1-Silicon (0x12347) Prod
[0063.762]  : BPMP Diagnostic
[0063.765] I> tamp: 0x00000000
[0063.769] I> lasr: 0x2722831T: preprod_dev_sign: 0
[0063.777] I> rst_source: 0xb, rst_level: 0x1B2 params
40060000
[0063.789] I> Task: Crypto init
[0063.791] I> Task: Perform MB1 KAT tests
[0063.795] I> Task: NVRNG health check
[0063.799] I> NVRNG:ck success
[0063.803] I> Task: Secure debug controls
[0063.807] I> Task: strap war set
[0063.810] Iram NV master stream i] I> Task: Verify boot mode
0063.820] I> Task: Alias fuses
 I> FUSE_OPT_CCPLEX_CLUS = 0x000001c9] I> FUSE_OPT_GPC_DISA00002.831] I> Task: Print SKU type
[0063SE_OPT_TPC_DISABLE = 0x0063.848] I>A_DISABLE = 0x00000003
[0063.852] I> FUSE_OPT_PVA_DISABLE = 0x00000001
[0063.856] I> FUSEDISABLE = 0x00000001
[0063.861] I> FUSE_OPT_NVDEC_DISABLE = 0x00000000
[0063.86BLE = 0x0003.869] I> FUDISABLE = 0x0000000c
[0063.874] I>OM_PATCH_VERSION = 0x7
[0063.878]ROM_PATCH_V
[0063.882T_ADC_CAL_FUSE_REV = 0x2
[0063.886] I> FUSE_SKU_INFO_0 =3.889] I> FULE_TYPE_0 = 0x3 PS
[0 FUSE_PACKAGE_INFO_0 = 097] I> SKU: Prod
[0063.899] I> Talocks
[0063.902] I> Initializing PI_CBB.
[0063.906] I> AXI_CBB : src = 35, di[0063.911] I> Task: Voltage monitor
[0063.914] I> VMON: Vmon re-calibration and fine tuning done
[0063.919] I> Task: UPHY init
[0063.923] W> UPHY: UPHY lane info table is empty in MB1 BCT.
[0063.928] I> Task: Boot device init
[0063.931] I> Boot_device: RCM
[0063.934] I> USB configuration success
[0063k: TSC init
[0063.941] I> Task: Enable WDT 5th expiry
[0063.945] I> Task: I
                     [0063.948] I> Task: Set I2C bus freq
[0063.951] I> Task: Reset FSI
[0063.954] I> Task: Enable clock-mon
[0063.958] I> FMON: Fmon re-programming done
[0063.962] I> Task:
                    [0063.965] I> Task: MB1 fixed firewalls
[971] W> Firewall readback mismatch[0063.976] I> Ta/Applet/FSK] I> Loading MB2 Applet
[0063.983] I> Slot: 1
[0063.986] E: Failed to open blockdev.
[0063.991] Eailed to open blockdev 0(0).
3] C> LOADE read binary 21.rage info for om loader.
[0064.007] E> Failed to load MB2
[0064.010] C> Taled (err: 0x27228311)
[0064.015] E> Top calle2_PARAMS, e LOADER, reason: 0x11, x83
[0064.023] C> Boot Info Table status dump :
0111100000111000110111111111100000000000000110000

Usually that means the module itself is broken.

I was working fine until I enable secure boot on my devkit

hello anhhao.hcmus,

may I know what’s your steps to enable SecureBoot. had you also check the fuseblob creation (by using --test options) to confirm all the keys has included correctly?
anyways, as you’ve enable SecureBoot, you should given keys to the flash command-line.

please see-also Topic 263458 for ours steps of fuse burning, and image flashing on Orin NX with a success.

Hi JerryChange, thank for your sharing!

here is the command that I executed
sudo ./tools/kernel_flash/l4t_initrd_flash.sh -u ./rsa.pem -v ./sbk.key --external-device nvme0n1p1 -c tools/kernel_flash/flash_l4t_external.xml -p “-c bootloader/t186ref/cfg/flash_t234_qspi.xml --no-systemimg” --showlogs --network usb0 jetson-orin-nano-devkit internal

hello anhhao.hcmus,

did you really fuse the target? for instance, had you execute odmfuse.sh to program the fuse?

Yes, I did it on Friday last week, and it boot up successfully.

After that, I unplugged the SSD with R35.4.1 and attached another SSD with R35.3.1 to compare the boot process logs. I repeated this switching process 2 or 3 times and encountered this issue.

[0000.966] E> MSS: Failed to initialize SDRAM.
[0000.970] C> Task 0x2f failed (err: 0x48480112)
[0000.975] E> Top caller module: MSS, error module: MSS, reason: 0x12, aux_info: 0x01
[0000.982] C> Boot Info Table status dump :

hello anhhao.hcmus,

please try re-flash the target, let’s check whether it could be restore.

Hi Jerry,
just to confirm does this command use to re-flash target?
sudo ./tools/kernel_flash/l4t_initrd_flash.sh -u ./rsa.pem -v ./sbk.key --external-device nvme0n1p1 -c tools/kernel_flash/flash_l4t_external.xml -p “-c bootloader/t186ref/cfg/flash_t234_qspi.xml --no-systemimg” --showlogs --network usb0 jetson-orin-nano-devkit internal

hello anhhao.hcmus,

I assume your internal QSPI still functional. and, it is NVMe SSD as your root file system, right?
please give it another try with following command.
$ sudo ADDITIONAL_DTB_OVERLAY_OPT="BootOrderNvme.dtbo" ./tools/kernel_flash/l4t_initrd_flash.sh --external-device nvme0n1p1 -c ./tools/kernel_flash/flash_l4t_external.xml --showlogs jetson-orin-nano-devkit nvme0n1p1

Hi Jerry thanks for your supporting!
you can close this topic now, cuz my production is using package R35.3.1 which had issue the file “tegrasign_v3_oemkey.yaml” is missing. I will create new or reopen again if we upgrade to use the new package version.
And before you close this, may I know Disk Encryption feature for SSD need Secure boot enabled?
Any tickets reference would be helpful

hello anhhao.hcmus,

Disk Encryption feature could be enabled without SecureBoot.
keys for disk encryption (i.e. sym2_t234.key) has put into EKS image, which using all 0s by default.
you should updating the EKS image manually if you’re using customize key, please see-also Topic 238756 for reference.

Hi Jerry, I already done disk encryption for ssd. But how can I retrieve the passphrase to open it manually.
Updated: just try below command but didn’t get the result
haossd@motorolasolutions:~$ nvluks-srv-app --context-string “0885b1c7-94b6-4b96-809a-9f2ef978231a” --get-unique-pass
nvluks-srv-app: TEEC_InitializeContext failed with code 0xffff0008

what did you meant to open it manually? are you trying to unplug the SSD from Orin NX, and intend to read the content via other platform?

yes, correct