TX2 Clone USB Problem

I try to read back from TX2 board from Virtual box under Windows 7 64 bits.
The board in recovery mode and NVidia USB is detected. When I run flash utility, I receive the next output:

ubuntu@L4T281-TX2:~/workspace/64_TX2/Linux_for_Tegra$ lsusb
Bus 001 Device 006: ID 0955:7c18 NVidia Corp. 
Bus 001 Device 002: ID 80ee:0021 VirtualBox USB Tablet
Bus 001 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
ubuntu@L4T281-TX2:~/workspace/64_TX2/Linux_for_Tegra$ sudo ./flash.sh -r -k 
APP -G /media/sf_TempShared/backup.img jetson-tx2 mmcblk0p1

./tegraflash.py --chip 0x18 --applet "/home/ubuntu/workspace/64_TX2/
Linux_for_Tegra/bootloader/mb1_recovery_prod.bin" --cmd "dump eeprom 
boardinfo cvm.bin" --skipuid 

Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0020 ] Generating RCM messages
[   0.0031 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 --download rcm /
home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin 
0 0

[   0.0041 ] RCM 0 is saved as rcm_0.rcm
[   0.0050 ] RCM 1 is saved as rcm_1.rcm
[   0.0053 ] List of rcm files are saved in rcm_list.xml
[   0.0182 ] 
[   0.0182 ] Signing RCM messages
[   0.0197 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.
key

[   0.0209 ] Assuming zero filled SBK key
[   0.0372 ] 
[   0.0372 ] Copying signature to RCM mesages
[   0.0386 ] tegrarcm_v2 --chip 0x18 --updatesig rcm_list_signed.xml
[   0.0488 ] 
[   0.0488 ] Boot Rom communication
[   0.0500 ] tegrarcm_v2 --chip 0x18 --rcm rcm_list_signed.xml --skipuid
[   0.0512 ] RCM version 0X180001
[   0.0700 ] Boot Rom communication completed
[   1.2087 ] 
[   1.2103 ] tegrarcm_v2 --isapplet
<b>[   1.2140 ] USB communication failed.Check if device is in recovery</b>
[   2.2573 ] 
[   2.2701 ] tegradevflash_v2 --iscpubl
[   2.2730 ] CPU Bootloader is not running on device.
[   2.3878 ] 
[   3.5341 ] Retrieving EEPROM data
[   3.5347 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/ubuntu/
workspace/64_TX2/Linux_for_Tegra/bootloader/cvm.bin

[   3.5395 ] Applet version 01.00.0000
[   3.6442 ] Saved platform info in /home/ubuntu/workspace/64_TX2/
Linux_for_Tegra/bootloader/cvm.bin

[   3.8534 ] 
Board ID(3310) version(B02) 
copying bctfile(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
t186ref/BCT/P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg)... done.

copying misc_config(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)... done.

copying pinmux_config(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader
/t186ref/BCT/tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg)... done.

copying pmic_config(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
t186ref/BCT/tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg)... done.

copying pmc_config(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
t186ref/BCT/tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg)... done.

copying prod_config(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
t186ref/BCT/tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg)... done.

copying scr_config(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
t186ref/BCT/minimal_scr.cfg)... done.

copying scr_cold_boot_config(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/
bootloader/t186ref/BCT/mobile_scr.cfg)... done.

copying bootrom_config(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/
bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg)... 
done.

copying dev_params(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
t186ref/BCT/emmc.cfg)... done.

Existing bootloader(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
nvtboot_cpu.bin) reused.

	populating kernel to rootfs... done.
	populating initrd to rootfs... done.
	populating extlinux.conf.emmc to rootfs... done.
	populating /home/ubuntu/workspace/64_TX2/Linux_for_Tegra/kernel/dtb/tegra186-
quill-p3310-1000-c03-00-base.dtb to rootfs... done.

done.
Making Boot image... done.
Existing sosfile(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
mb1_recovery_prod.bin) reused.

copying tegraboot(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
t186ref/nvtboot.bin)... done.

Existing mb2blfile(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
nvtboot_recovery.bin) reused.

Existing mtspreboot(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
preboot_d15_prod_cr.bin) reused.

Existing mts(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
mce_mts_d15_prod_cr.bin) reused.

Existing mb1file(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
mb1_prod.bin) reused.

Existing bpffile(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/bpmp
.bin) reused.

copying bpfdtbfile(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
t186ref/tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb)... done.

Existing scefile(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
camera-rtcpu-sce.bin) reused.

Existing spefile(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/spe.
bin) reused.

copying wb0boot(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
t186ref/warmboot.bin)... done.

Existing tosfile(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/tos.
img) reused.

Existing eksfile(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/eks.
img) reused.

copying dtbfile(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/kernel/dtb/
tegra186-quill-p3310-1000-c03-00-base.dtb)... done.

Existing tbcfile(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
cboot.bin) reused.

copying tbcdtbfile(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/kernel/dtb/
tegra186-quill-p3310-1000-c03-00-base.dtb)... done.

copying cfgfile(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
t186ref/cfg/flash_l4t_t186.xml) to flash.xml... done.

Existing flasher(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
nvtboot_recovery_cpu.bin) reused.

Existing flashapp(/home/ubuntu/workspace/64_TX2/Linux_for_Tegra/bootloader/
tegraflash.py) reused.

*** Reading :APP and storing to /media/sf_TempShared/backup.img ***
./flash.sh: line 1617: [: -eq: unary operator expected
./tegraflash.py  --bl nvtboot_recovery_cpu.bin   --chip 0x18 --applet 
mb1_recovery_prod.bin --sdram_config 
P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --misc_config tegra186-mb1
-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-
c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --
pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config 
tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --
scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-
quill-p3310-1000-c03.cfg --dev_params emmc.cfg  --cfg  flash.xml --bins "
mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; 
mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-
a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb; tlk tos.img; eks eks.img; 
bootloader_dtb tegra186-quill-p3310-1000-c03-00-base.dtb"  --cmd "read APP /
media/sf_TempShared/backup.img;"  

Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0105 ] Generating RCM messages
[   0.0204 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 --download rcm 
mb1_recovery_prod.bin 0 0

[   0.0225 ] RCM 0 is saved as rcm_0.rcm
[   0.0225 ] RCM 1 is saved as rcm_1.rcm
[   0.0225 ] List of rcm files are saved in rcm_list.xml
[   0.0225 ] 
[   0.0226 ] Signing RCM messages
[   0.0258 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.
key

[   0.0320 ] Assuming zero filled SBK key
[   0.0322 ] 
[   0.0323 ] Copying signature to RCM mesages
[   0.0337 ] tegrarcm_v2 --chip 0x18 --updatesig rcm_list_signed.xml
[   0.0493 ] 
[   0.0493 ] Boot Rom communication
[   0.0575 ] tegrarcm_v2 --chip 0x18 --rcm rcm_list_signed.xml
[   0.0586 ] BootRom is not running
[   1.0721 ] 
[   1.0780 ] tegrarcm_v2 --isapplet
[   1.0828 ] Applet version 01.00.0000
[   1.2050 ] 
[   1.2063 ] tegrasign_v2 --key None --getmode mode.txt
[   1.2073 ] Assuming zero filled SBK key
[   1.2089 ] 
[   1.2090 ] Parsing partition layout
[   1.2100 ] tegraparser_v2 --pt flash.xml.tmp
[   1.2210 ] 
[   1.2210 ] Creating list of images to be signed
[   1.2222 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --list 
images_list.xml zerosbk

[   1.2368 ] 
[   1.2369 ] Generating signatures
[   1.2385 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash 
pub_key.key

[   1.2398 ] Assuming zero filled SBK key
[   1.3490 ] 
[   1.3491 ] Reading BCT from device for further operations
[   1.3491 ] Generating blob
[   1.3504 ] tegrahost_v2 --align blob_nvtboot_recovery_cpu.bin
[   1.3615 ] 
[   1.3626 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin 
zerosbk

[   1.3732 ] 
[   1.3747 ] tegrasign_v2 --key None --list 
blob_nvtboot_recovery_cpu_sigheader.bin_list.xml

[   1.3756 ] Assuming zero filled SBK key
[   1.3886 ] 
[   1.3902 ] tegrahost_v2 --updatesigheader 
blob_nvtboot_recovery_cpu_sigheader.bin.encrypt 
blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk

[   1.4016 ] 
[   1.4030 ] tegrahost_v2 --align blob_nvtboot_recovery.bin
[   1.4136 ] 
[   1.4148 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[   1.4248 ] 
[   1.4264 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.
bin_list.xml

[   1.4273 ] Assuming zero filled SBK key
[   1.4371 ] 
[   1.4392 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.
bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk

[   1.4491 ] 
[   1.4504 ] tegrahost_v2 --align blob_preboot_d15_prod_cr.bin
[   1.4610 ] 
[   1.4622 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin 
zerosbk

[   1.4731 ] 
[   1.4746 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader
.bin_list.xml

[   1.4757 ] Assuming zero filled SBK key
[   1.4848 ] 
[   1.4865 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader
.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk

[   1.4929 ] 
[   1.4942 ] tegrahost_v2 --align blob_mce_mts_d15_prod_cr.bin
[   1.5051 ] 
[   1.5066 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin 
zerosbk

[   1.5175 ] 
[   1.5208 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader
.bin_list.xml

[   1.5221 ] Assuming zero filled SBK key
[   1.5852 ] 
[   1.5869 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader
.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk

[   1.6012 ] 
[   1.6026 ] tegrahost_v2 --align blob_bpmp.bin
[   1.6137 ] 
[   1.6150 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk
[   1.6225 ] 
[   1.6242 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml
[   1.6293 ] Assuming zero filled SBK key
[   1.6457 ] 
[   1.6473 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt 
blob_bpmp_sigheader.bin.hash zerosbk

[   1.6572 ] 
[   1.6594 ] tegrahost_v2 --align blob_tegra186-a02-bpmp-quill-p3310-1000-c04-
00-te770d-ucm2.dtb

[   1.6677 ] 
[   1.6690 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310
-1000-c04-00-te770d-ucm2.dtb zerosbk

[   1.6813 ] 
[   1.6828 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-quill-p3310
-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml

[   1.6856 ] Assuming zero filled SBK key
[   1.7048 ] 
[   1.7064 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310
-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-
p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk

[   1.7171 ] 
[   1.7189 ] tegrahost_v2 --align blob_tos.img
[   1.7293 ] 
[   1.7304 ] tegrahost_v2 --appendsigheader blob_tos.img zerosbk
[   1.7413 ] 
[   1.7427 ] tegrasign_v2 --key None --list blob_tos_sigheader.img_list.xml
[   1.7439 ] Assuming zero filled SBK key
[   1.7568 ] 
[   1.7588 ] tegrahost_v2 --updatesigheader blob_tos_sigheader.img.encrypt 
blob_tos_sigheader.img.hash zerosbk

[   1.7688 ] 
[   1.7703 ] tegrahost_v2 --align blob_eks.img
[   1.7830 ] 
[   1.7845 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk
[   1.7933 ] 
[   1.7948 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml
[   1.7959 ] Assuming zero filled SBK key
[   1.8048 ] 
[   1.8065 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt 
blob_eks_sigheader.img.hash zerosbk

[   1.8169 ] 
[   1.8186 ] tegrahost_v2 --align blob_tegra186-quill-p3310-1000-c03-00-base.
dtb

[   1.8288 ] 
[   1.8302 ] tegrahost_v2 --appendsigheader blob_tegra186-quill-p3310-1000-c03
-00-base.dtb zerosbk

[   1.8462 ] 
[   1.8476 ] tegrasign_v2 --key None --list blob_tegra186-quill-p3310-1000-c03
-00-base_sigheader.dtb_list.xml

[   1.8488 ] Assuming zero filled SBK key
[   1.8649 ] 
[   1.8665 ] tegrahost_v2 --updatesigheader blob_tegra186-quill-p3310-1000-c03
-00-base_sigheader.dtb.encrypt blob_tegra186-quill-p3310-1000-c03-00-
base_sigheader.dtb.hash zerosbk

[   1.8790 ] 
[   1.8819 ] tegrahost_v2 --generateblob blob.xml blob.bin
[   1.8831 ] number of images in blob are 9
[   1.8845 ] blobsize is 3725048
[   1.8854 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of 
size 184576

[   1.8903 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 
78080

[   1.8932 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of 
size 61472

[   1.8945 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of 
size 2077088

[   1.8982 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 528800
[   1.9011 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-
te770d-ucm2_sigheader.dtb.encrypt of size 466160

[   1.9038 ] Added binary blob_tos_sigheader.img.encrypt of size 58880
[   1.9045 ] Added binary blob_eks_sigheader.img.encrypt of size 1488
[   1.9051 ] Added binary blob_tegra186-quill-p3310-1000-c03-00-base_sigheader
.dtb.encrypt of size 268352

[   1.9169 ] 
[   1.9170 ] Sending bootloader and pre-requisite binaries
[   1.9216 ] tegrarcm_v2 --download blob blob.bin
[   1.9249 ] Applet version 01.00.0000
[   2.0238 ] Sending blob
[   2.0239 ] [................................................] 100%
[   3.6832 ] 
[   3.6868 ] tegrarcm_v2 --boot recovery
[   3.6890 ] Applet version 01.00.0000
[   3.8339 ] 
[   3.8370 ] tegrarcm_v2 --isapplet
[   4.4655 ] 
[   4.4702 ] tegradevflash_v2 --iscpubl
[   4.4745 ] CPU Bootloader is not running on device.
[   4.4968 ]

There is a message in time tag 1.214 : “USB communication failed.Check if device is in recovery”
Sometimes I receive the message “Cannot Open USB”

I payed attention that Windows 7 64 bit doesn’t install the NVidia APX driver, but the virtual box can see USB.
What is the reason for failure?

In a nutshell Jetpack doesn’t work from a VM, as it seems to me.
However, if you are VM developer you may raise an issue at Virtualbox forum. In my opinion, some specificity of their USB pass-through method may prevent the Jetpack from flashing the Jetson.

You may find some info here : [url]https://devtalk.nvidia.com/default/topic/1023934/jetson-tx1/jetpack-install-from-an-ubuntu-vm-host-on-a-mac/[/url] and [url]https://devtalk.nvidia.com/default/topic/1002081/jetson-tx2/jetpack-3-0-install-with-a-vm/[/url]

I try all suggestions from links above. No one works good. I use the Virtual box successfully for cloning TK1 and TX1 boards. So the issue only with TX2 board.