TX2 flash

Hello, during the recent batch of p3310 modules flashing, I encountered some problems, which have never been encountered before:

  1. Using the command “sudo ./flash.sh jetson-tx2 mmcblk0p1”, the flashing process stays as shown in the figure below

  1. The whole brushing process is as follows:
yongle@yongle-ubuntu:~/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra$ sudo ./flash.sh jetson-tx2 mmcblk0p1
###############################################################################
# L4T BSP Information:
# R32 , REVISION: 5.1
###############################################################################
# Target Board Information:
# Name: jetson-tx2, Board Family: t186ref, SoC: Tegra 186, 
# OpMode: production, Boot Authentication: NS, 
# Disk encryption: disabled ,
###############################################################################
./tegraflash.py --chip 0x18 --applet "/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin" --skipuid --cmd "dump eeprom boardinfo cvm.bin" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0018 ] Generating RCM messages
[   0.0025 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm /home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin 0 0
[   0.0030 ] RCM 0 is saved as rcm_0.rcm
[   0.0032 ] RCM 1 is saved as rcm_1.rcm
[   0.0032 ] List of rcm files are saved in rcm_list.xml
[   0.0032 ] 
[   0.0032 ] Signing RCM messages
[   0.0038 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0042 ] Assuming zero filled SBK key
[   0.0063 ] 
[   0.0063 ] Copying signature to RCM mesages
[   0.0069 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[   0.0075 ] 
[   0.0075 ] Boot Rom communication
[   0.0080 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml --skipuid
[   0.0085 ] RCM version 0X180001
[   0.0095 ] Boot Rom communication completed
[   1.0167 ] 
[   2.0201 ] tegrarcm_v2 --isapplet
[   2.0218 ] Applet version 01.00.0000
[   2.0249 ] 
[   2.0267 ] Retrieving EEPROM data
[   2.0269 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/cvm.bin
[   2.0286 ] Applet version 01.00.0000
[   2.0621 ] Saved platform info in /home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/cvm.bin
[   2.1360 ] 
Board ID(3310) version(D02) sku(1000) revision(L.0)
Copy /home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb to /home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb.rec
copying bctfile(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/t186ref/BCT/P3310_A00_8GB_lpddr4_A02_l4t.cfg)... done.
copying misc_config(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)... done.
copying pinmux_config(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg)... done.
copying pmic_config(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg)... done.
copying pmc_config(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg)... done.
copying prod_config(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg)... done.
copying scr_config(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/t186ref/BCT/minimal_scr.cfg)... done.
copying scr_cold_boot_config(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/t186ref/BCT/mobile_scr.cfg)... done.
copying bootrom_config(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg)... done.
copying dev_params(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/t186ref/BCT/emmc.cfg)... done.
Existing bootloader(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
copying initrd(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/l4t_initrd.img)... done.
	populating kernel to rootfs... done.
	populating initrd to rootfs... done.
	populating /home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb to rootfs... done.
Making Boot image... done.
/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/tegraflash.py  --chip 0x18 --key  --cmd sign boot.img
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0002 ] Generating signature
[   0.0011 ] tegrasign_v2 --key  --getmode mode.txt
[   0.0016 ] Assuming zero filled SBK key
[   0.0017 ] 
[   0.0018 ] sign_type   : 0
[   0.0018 ] header_magic: 414e4452
[   0.0023 ] tegrahost_v2 --chip 0x18 --align 1_boot.img
[   0.0028 ] 
[   0.0034 ] tegrahost_v2 --appendsigheader 1_boot.img zerosbk
[   0.0044 ] 
[   0.0053 ] tegrasign_v2 --key  --list 1_boot_sigheader.img_list.xml --pubkeyhash pub_key.key
[   0.0057 ] Assuming zero filled SBK key
[   0.0166 ] 
[   0.0175 ] tegrahost_v2 --updatesigheader 1_boot_sigheader.img.encrypt 1_boot_sigheader.img.hash zerosbk
[   0.0186 ] 
[   0.0190 ] Signed file: /home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt
l4t_sign_image.sh: Generate header for boot_sigheader.img.encrypt
l4t_sign_image.sh: chip 0x18: Don't need to do anything
l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot_sigheader.img.encrypt
l4t_sign_image.sh: the signed file is /home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt
done.
Making recovery ramdisk for recovery image...
Re-generating recovery ramdisk for recovery image...
~/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/ramdisk_tmp ~/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader ~/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra
30402 块
_BASE_KERNEL_VERSION=4.9.201-tegra
~/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/ramdisk_tmp/lib ~/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/ramdisk_tmp ~/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader ~/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra
65752 块
Making Recovery image...
copying recdtbfile(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb.rec)... done.
记录了20+0 的读入
记录了20+0 的写出
20 bytes copied, 0.000140241 s, 143 kB/s
Existing sosfile(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin) reused.
copying tegraboot(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/t186ref/nvtboot.bin)... done.
Existing cpu_bootloader(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
Existing mb2blfile(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
Existing mtspreboot(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/preboot_d15_prod_cr.bin) reused.
Existing mts(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/mce_mts_d15_prod_cr.bin) reused.
Existing mb1file(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/mb1_prod.bin) reused.
Existing bpffile(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/bpmp.bin) reused.
copying bpfdtbfile(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/t186ref/tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb)... done.
Existing scefile(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused.
Existing spefile(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/spe.bin) reused.
Existing drameccfile(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/dram-ecc.bin) reused.
Existing badpagefile(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/badpage.bin) reused.
copying wb0boot(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/t186ref/warmboot.bin)... done.
Existing tosfile(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/tos-trusty.img) reused.
Existing eksfile(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/eks.img) reused.
copying dtbfile(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)... done.
Copying nv_boot_control.conf to rootfs
/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/tegraflash.py  --chip 0x18 --key  --cmd sign kernel_tegra186-quill-p3310-1000-c03-00-base.dtb
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0003 ] Generating signature
[   0.0010 ] tegrasign_v2 --key  --getmode mode.txt
[   0.0017 ] Assuming zero filled SBK key
[   0.0017 ] 
[   0.0018 ] sign_type   : 758133043
[   0.0018 ] header_magic: d00dfeed
[   0.0024 ] tegrahost_v2 --chip 0x18 --align 1_kernel_tegra186-quill-p3310-1000-c03-00-base.dtb
[   0.0031 ] 
[   0.0037 ] tegrahost_v2 --appendsigheader 1_kernel_tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[   0.0047 ] 
[   0.0057 ] tegrasign_v2 --key  --list 1_kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[   0.0064 ] Assuming zero filled SBK key
[   0.0110 ] 
[   0.0119 ] tegrahost_v2 --updatesigheader 1_kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt 1_kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[   0.0128 ] 
[   0.0131 ] Signed file: /home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
l4t_sign_image.sh: Generate header for kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
l4t_sign_image.sh: chip 0x18: Don't need to do anything
l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
l4t_sign_image.sh: the signed file is /home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
done.
Making system.img... 
	populating rootfs from /home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/rootfs ... done.
	populating /boot/extlinux/extlinux.conf ... done.
	Sync'ing system.img ... done.
	Converting RAW image to Sparse image... done.
system.img built successfully. 
Existing tbcfile(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/cboot.bin) reused.
copying tbcdtbfile(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)... done.
copying cfgfile(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml... done.
Existing flasher(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing flashapp(/home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/tegraflash.py) reused.
./tegraflash.py --bl nvtboot_recovery_cpu.bin --sdram_config P3310_A00_8GB_lpddr4_A02_l4t.cfg --odmdata 0x7090000 --applet mb1_recovery_prod.bin --cmd "flash; reboot"  --cfg flash.xml --chip 0x18 --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg  --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb; tlk tos-trusty.img; eks eks.img; bootloader_dtb tegra186-quill-p3310-1000-c03-00-base.dtb"   
saving flash command in /home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/flashcmd.txt
saving Windows flash command to /home/yongle/myfile/TX2_SOURCE/Tegra186_Linux_R32.5.1_aarch64/Linux_for_Tegra/bootloader/flash_win.bat
*** Flashing target device started. ***
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0015 ] tegrasign_v2 --key None --getmode mode.txt
[   0.0021 ] Assuming zero filled SBK key
[   0.0055 ] 
[   0.0056 ] Generating RCM messages
[   0.0065 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[   0.0069 ] RCM 0 is saved as rcm_0.rcm
[   0.0075 ] RCM 1 is saved as rcm_1.rcm
[   0.0075 ] List of rcm files are saved in rcm_list.xml
[   0.0075 ] 
[   0.0075 ] Signing RCM messages
[   0.0080 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0084 ] Assuming zero filled SBK key
[   0.0107 ] 
[   0.0107 ] Copying signature to RCM mesages
[   0.0113 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[   0.0120 ] 
[   0.0120 ] Parsing partition layout
[   0.0134 ] tegraparser_v2 --pt flash.xml.tmp
[   0.0158 ] 
[   0.0158 ] Creating list of images to be signed
[   0.0173 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[   0.1765 ] 
[   0.1765 ] Generating signatures
[   0.1773 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[   0.1778 ] Assuming zero filled SBK key
[   1.2636 ] 
[   1.2636 ] Generating br-bct
[   1.2654 ] Updating dev and MSS params in BR BCT
[   1.2654 ] tegrabct_v2 --dev_param emmc.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --brbct br_bct.cfg --chip 0x18 0
[   1.2854 ] 
[   1.2855 ] Updating bl info
[   1.2863 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   1.2874 ] 
[   1.2874 ] Updating smd info
[   1.2880 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[   1.2886 ] 
[   1.2886 ] Updating Odmdata
[   1.2891 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x7090000
[   1.2897 ] 
[   1.2897 ] Get Signed section of bct
[   1.2902 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[   1.2910 ] 
[   1.2917 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key
[   1.2923 ] Assuming zero filled SBK key
[   1.2925 ] 
[   1.2925 ] Updating BCT with signature
[   1.2934 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml
[   1.2942 ] 
[   1.2942 ] Generating coldboot mb1-bct
[   1.2950 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[   1.3048 ] MB1-BCT version: 0xf
[   1.3069 ] Packing sdram param for instance[0]
[   1.4667 ] Packing sdram param for instance[1]
[   1.4668 ] Packing sdram param for instance[2]
[   1.4669 ] Packing sdram param for instance[3]

[   1.4747 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg 
[   1.4750 ] Appending platform config data of size :- 3032

[   1.4753 ] Parsing config file :mobile_scr.cfg 
[   1.4754 ] Appending platform config data of size :- 12240

[   1.4767 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg 
[   1.4771 ] Appending platform config data of size :- 24
[   1.4773 ] 
[   1.4773 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg 
[   1.4773 ] Appending platform config data of size :- 672
[   1.4773 ] 
[   1.4773 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg 
[   1.4773 ] Appending platform config data of size :- 64
[   1.4774 ] 
[   1.4774 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg 
[   1.4774 ] Appending platform config data of size :- 1628
[   1.4774 ] 
[   1.4774 ] Updating mb1-bct with firmware information
[   1.4789 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[   1.4800 ] MB1-BCT version: 0xf
[   1.4805 ] 
[   1.4805 ] Updating mb1-bct with storage information
[   1.4817 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   1.4828 ] MB1-BCT version: 0xf
[   1.4833 ] 
[   1.4844 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[   1.4856 ] 
[   1.4869 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[   1.4883 ] 
[   1.4899 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[   1.4911 ] Assuming zero filled SBK key
[   1.4939 ] 
[   1.4960 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[   1.4981 ] 
[   1.4983 ] Generating recovery mb1-bct
[   1.5000 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[   1.5016 ] MB1-BCT version: 0xf
[   1.5020 ] Packing sdram param for instance[0]
[   1.5815 ] Packing sdram param for instance[1]
[   1.5817 ] Packing sdram param for instance[2]
[   1.5819 ] Packing sdram param for instance[3]

[   1.5931 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg 
[   1.5979 ] Appending platform config data of size :- 3032

[   1.5981 ] Parsing config file :minimal_scr.cfg 
[   1.5982 ] Appending platform config data of size :- 12240

[   1.6020 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg 
[   1.6023 ] Appending platform config data of size :- 24
[   1.6023 ] 
[   1.6023 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg 
[   1.6023 ] Appending platform config data of size :- 672
[   1.6023 ] 
[   1.6023 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg 
[   1.6023 ] Appending platform config data of size :- 64
[   1.6023 ] 
[   1.6023 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg 
[   1.6023 ] Appending platform config data of size :- 1628
[   1.6023 ] 
[   1.6023 ] Updating mb1-bct with firmware information
[   1.6037 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[   1.6042 ] MB1-BCT version: 0xf
[   1.6045 ] 
[   1.6045 ] Updating mb1-bct with storage information
[   1.6050 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   1.6057 ] MB1-BCT version: 0xf
[   1.6062 ] 
[   1.6070 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[   1.6076 ] 
[   1.6082 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk
[   1.6093 ] 
[   1.6100 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[   1.6104 ] Assuming zero filled SBK key
[   1.6115 ] 
[   1.6123 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[   1.6130 ] 
[   1.6131 ] Copying signatures
[   1.6137 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   1.8851 ] 
[   1.8852 ] Boot Rom communication
[   1.8871 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[   1.8883 ] BootRom is not running
[   6.9706 ] 
[   7.9741 ] tegrarcm_v2 --isapplet
[   7.9758 ] Applet version 01.00.0000
[   7.9787 ] 
[   7.9788 ] Sending BCTs
[   7.9807 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[   7.9824 ] Applet version 01.00.0000
[   8.0013 ] Sending bct_bootrom
[   8.0016 ] [................................................] 100%
[   8.0032 ] Sending bct_mb1
[   8.0035 ] [................................................] 100%
[   8.0223 ] 
[   8.0228 ] Generating blob
[   8.0290 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin
[   8.0409 ] 
[   8.0439 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[   8.0449 ] 
[   8.0457 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   8.0463 ] Assuming zero filled SBK key
[   8.0508 ] 
[   8.0523 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[   8.0535 ] 
[   8.0600 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin
[   8.0698 ] 
[   8.0759 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[   8.0931 ] 
[   8.1109 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   8.1185 ] Assuming zero filled SBK key
[   8.1204 ] 
[   8.1213 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[   8.1221 ] 
[   8.1229 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin
[   8.1314 ] 
[   8.1429 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[   8.1527 ] 
[   8.1622 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   8.1723 ] Assuming zero filled SBK key
[   8.1766 ] 
[   8.1775 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[   8.1783 ] 
[   8.1791 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin
[   8.1797 ] 
[   8.1803 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[   8.1942 ] 
[   8.2057 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   8.2160 ] Assuming zero filled SBK key
[   8.4101 ] 
[   8.4113 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[   8.4137 ] 
[   8.4145 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin
[   8.4151 ] 
[   8.4158 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk
[   8.4169 ] 
[   8.4176 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   8.4180 ] Assuming zero filled SBK key
[   8.4284 ] 
[   8.4292 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[   8.4303 ] 
[   8.4309 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb
[   8.4314 ] 
[   8.4320 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk
[   8.4331 ] 
[   8.4337 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[   8.4341 ] Assuming zero filled SBK key
[   8.4914 ] 
[   8.5064 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[   8.5218 ] 
[   8.5238 ] tegrahost_v2 --chip 0x18 --align blob_tos-trusty.img
[   8.5246 ] 
[   8.5252 ] tegrahost_v2 --appendsigheader blob_tos-trusty.img zerosbk
[   8.5269 ] 
[   8.5281 ] tegrasign_v2 --key None --list blob_tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key
[   8.5287 ] Assuming zero filled SBK key
[   8.5366 ] 
[   8.5377 ] tegrahost_v2 --updatesigheader blob_tos-trusty_sigheader.img.encrypt blob_tos-trusty_sigheader.img.hash zerosbk
[   8.5391 ] 
[   8.5401 ] tegrahost_v2 --chip 0x18 --align blob_eks.img
[   8.5412 ] 
[   8.5424 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk
[   8.5431 ] 
[   8.5441 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key
[   8.5463 ] Assuming zero filled SBK key
[   8.5575 ] 
[   8.5660 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[   8.5673 ] 
[   8.5686 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-quill-p3310-1000-c03-00-base.dtb
[   8.5697 ] 
[   8.5711 ] tegrahost_v2 --appendsigheader blob_tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[   8.5738 ] 
[   8.5759 ] tegrasign_v2 --key None --list blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[   8.5775 ] Assuming zero filled SBK key
[   8.5923 ] 
[   8.5939 ] tegrahost_v2 --updatesigheader blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[   8.5957 ] 
[   8.5971 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin
[   8.5982 ] number of images in blob are 9
[   8.5985 ] blobsize is 4247112
[   8.5986 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 221776
[   8.6071 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 90176
[   8.6071 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 63104
[   8.6071 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2082144
[   8.6071 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 534816
[   8.6071 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt of size 605120
[   8.6071 ] Added binary blob_tos-trusty_sigheader.img.encrypt of size 395072
[   8.6071 ] Added binary blob_eks_sigheader.img.encrypt of size 1440
[   8.6071 ] Added binary blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt of size 253312
[   8.6071 ] 
[   8.6072 ] Sending bootloader and pre-requisite binaries
[   8.6085 ] tegrarcm_v2 --download blob blob.bin
[   8.6093 ] Applet version 01.00.0000
[   8.6121 ] Sending blob
[   8.6122 ] [................................................] 100%
[   9.0842 ] 
[   9.0862 ] tegrarcm_v2 --boot recovery
[   9.0877 ] Applet version 01.00.0000
[   9.1058 ] 
[  10.1082 ] tegrarcm_v2 --isapplet
[  10.7889 ] 
[  10.7919 ] tegradevflash_v2 --iscpubl
[  10.7936 ] Cannot Open USB
[  11.2495 ] 
[  12.2524 ] tegrarcm_v2 --isapplet

  1. The numbers of the p3310 modules are:S/N:1420622073116
  2. The two modes of 7c18 and 7c20 cannot be switched normally, they must be powered off and restarted to take effect

Is the host PC a VM? It is losing USB, and although this can be a signal quality issue (“charger” cables are notorious for this), this happens a lot with VMs since they need to be set up to pass through that USB again when it disconnects and reconnects. If not a VM, then are you using one of the NVIDIA USB cables? If not, then I suggest trying several different brands of micro-B UBS cables (I’d say about 2 out of 3 charger cables fail like this).

  1. I am using the ubuntu18.04 host system and not using a virtual machine;
  2. The flashing line can ensure that there is no problem, it has been used all the time, but this batch of modules has such problems

Whole batch got this problem? OR just some of them?

Hello, I have tried two of this batch so far and have this problem.
jetson:r32.5.1

hello Yolomei,

is it possible to replace these modules to other carrier boards for cross validation?
thanks

Yes, I’ve done that, but the problem persists

hello Yolomei,

could you please have a try to assign the board info to the command-line.
for example,
$ sudo BOARDID=3310 FAB=C03 ./flash.sh -r jetson-tx2 mmcblk0p1

I tried it, but it still doesn’t work, still stuck

hello Yolomei,

is the failure always show the same as… “Cannot Open USB”?
had you setup serial console on the target? may I know what’s the message pop-up while image flashing?
thanks

Yes, it’s stuck in the same position every time, the uart is as follows

333333333333333333

hello Yolomei,

please contact the NVIDIA Customer Care team for the RMA process.
thanks

You mean there is something wrong with these two mods? Can i fix it on the spot.

Have you checked if any PCN update is required for your module? Flash with your module with rel-32.7.2 first instead of 32.5.

PCN update? Can you tell me in detail, this is a new mod I bought, and I use it for the first time.It is mainly the r32.5.1 version that has been used all the time, and the upgrade will face many other problems. Currently this mod can only be used by upgrading?

Please just flash it with rel-32.7.2 first. We can discuss it after we get your result.

I currently have the source code of r32.6.1 in my hand, can I solve the current problem?

Hello, I would like to confirm, does this mod operate the same as the previous mods in terms of mode switching (7c18, 7c20)?

Could you just flash it with r32.7.2 first? The operation on any TX2 modules are always same.

Hello, I tried to flash R32.7.1(r32.7.2 was not found in the download interface of the official website), the first flash was successful, the second time I repeated the flash failure, the flashing process also stayed as shown above