TX2 flash

Hi,

Are you able to boot up the device in 32.7.1 now?

Also, are you saying you flash the same module in second run and it failed? or you are talking about flash it another jetson tx2?

The same p3310 has been refreshed multiple times, the first time it can be refreshed, but not after that.

Could you share me the result of both your host side and uart log of this “second” flash failure?

Do you have other host machine to validate this behavior?

Also tested on other boards, the problem remains the same.
The following picture shows the uart and host information:

111111111111

ongle@yongle-ubuntu:~/project_management/r32.7.1/Linux_for_Tegra$ sudo ./flash.sh jetson-tx2 mmcblk0p1
[sudo] yongle 的密码: 
###############################################################################
# L4T BSP Information:
# R32 , REVISION: 7.1
###############################################################################
# Target Board Information:
# Name: jetson-tx2, Board Family: t186ref, SoC: Tegra 186, 
# OpMode: production, Boot Authentication: NS, 
# Disk encryption: disabled ,
###############################################################################
./tegraflash.py --chip 0x18 --applet "/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin" --skipuid --cmd "dump eeprom boardinfo cvm.bin" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0032 ] Generating RCM messages
[   0.0057 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm /home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin 0 0
[   0.0072 ] RCM 0 is saved as rcm_0.rcm
[   0.0075 ] RCM 1 is saved as rcm_1.rcm
[   0.0075 ] List of rcm files are saved in rcm_list.xml
[   0.0075 ] 
[   0.0076 ] Signing RCM messages
[   0.0099 ] tegrasign_v3.py --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0100 ] Assuming zero filled SBK key
[   0.0139 ] Copying signature to RCM mesages
[   0.0156 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[   0.0165 ] 
[   0.0165 ] Boot Rom communication
[   0.0181 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml --skipuid
[   0.0185 ] RCM version 0X180001
[   0.0193 ] Boot Rom communication completed
[   1.0262 ] 
[   2.0304 ] tegrarcm_v2 --isapplet
[   2.0320 ] Applet version 01.00.0000
[   2.0348 ] 
[   2.0379 ] Retrieving EEPROM data
[   2.0381 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/cvm.bin
[   2.0393 ] Applet version 01.00.0000
[   2.0554 ] Saved platform info in /home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/cvm.bin
[   2.1285 ] 
Board ID(3310) version(D02) sku(1000) revision(L.0)
Copy /home/yongle/project_management/r32.7.1/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb to /home/yongle/project_management/r32.7.1/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb.rec
copying bctfile(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/t186ref/BCT/P3310_A00_8GB_lpddr4_A02_l4t.cfg)... done.
copying misc_config(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)... done.
copying pinmux_config(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg)... done.
copying pmic_config(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg)... done.
copying pmc_config(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg)... done.
copying prod_config(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg)... done.
copying scr_config(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/t186ref/BCT/minimal_scr.cfg)... done.
copying scr_cold_boot_config(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/t186ref/BCT/mobile_scr.cfg)... done.
copying bootrom_config(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg)... done.
copying dev_params(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/t186ref/BCT/emmc.cfg)... done.
Existing bootloader(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
copying initrd(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/l4t_initrd.img)... done.
Making Boot image... done.
/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x18 --key  --cmd sign boot.img kernel
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0003 ] Generating signature
[   0.0025 ] tegrasign_v3.py --getmode mode.txt --key 
[   0.0025 ] Assuming zero filled SBK key : not reading 
[   0.0025 ] sign_type   : 0
[   0.0025 ] header_magic: 414e4452
[   0.0033 ] tegrahost_v2 --chip 0x18 --align 1_boot.img
[   0.0039 ] 
[   0.0056 ] tegrahost_v2 --chip 0x18 0 --appendsigheader 1_boot.img zerosbk
[   0.0069 ] 
[   0.0092 ] tegrasign_v3.py --key  --list 1_boot_sigheader.img_list.xml --pubkeyhash pub_key.key
[   0.0093 ] Assuming zero filled SBK key : not reading 
[   0.0188 ] tegrahost_v2 --chip 0x18 0 --updatesigheader 1_boot_sigheader.img.encrypt 1_boot_sigheader.img.hash zerosbk
[   0.0199 ] 
[   0.0203 ] Signed file: /home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt
l4t_sign_image.sh: Generate header for boot_sigheader.img.encrypt
l4t_sign_image.sh: chip 0x18: Don't need to do anything
l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot_sigheader.img.encrypt
l4t_sign_image.sh: the signed file is /home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt
done.
Making recovery ramdisk for recovery image...
Re-generating recovery ramdisk for recovery image...
~/project_management/r32.7.1/Linux_for_Tegra/bootloader/ramdisk_tmp ~/project_management/r32.7.1/Linux_for_Tegra/bootloader ~/project_management/r32.7.1/Linux_for_Tegra
30412 块
_BASE_KERNEL_VERSION=4.9.201-tegra
cp: 无法获取'/home/yongle/project_management/r32.7.1/Linux_for_Tegra/rootfs/lib/modules/4.9.201-tegra/kernel/drivers/net/wireless/bcmdhd/bcmdhd.ko' 的文件状态(stat): 没有那个文件或目录
warning: cp -f /home/yongle/project_management/r32.7.1/Linux_for_Tegra/rootfs/lib/modules/4.9.201-tegra/kernel/drivers/net/wireless/bcmdhd/bcmdhd.ko /home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/ramdisk_tmp//lib/modules/4.9.201-tegra/kernel/drivers/net/wireless/bcmdhd/bcmdhd.ko
cp: 无法获取'/home/yongle/project_management/r32.7.1/Linux_for_Tegra/rootfs/lib/modules/4.9.201-tegra/kernel/net/wireless/lib80211.ko' 的文件状态(stat): 没有那个文件或目录
warning: cp -f /home/yongle/project_management/r32.7.1/Linux_for_Tegra/rootfs/lib/modules/4.9.201-tegra/kernel/net/wireless/lib80211.ko /home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/ramdisk_tmp//lib/modules/4.9.201-tegra/kernel/net/wireless/lib80211.ko
cp: 无法获取'/home/yongle/project_management/r32.7.1/Linux_for_Tegra/rootfs/lib/modules/4.9.201-tegra/kernel/net/wireless/cfg80211.ko' 的文件状态(stat): 没有那个文件或目录
warning: cp -f /home/yongle/project_management/r32.7.1/Linux_for_Tegra/rootfs/lib/modules/4.9.201-tegra/kernel/net/wireless/cfg80211.ko /home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/ramdisk_tmp//lib/modules/4.9.201-tegra/kernel/net/wireless/cfg80211.ko
~/project_management/r32.7.1/Linux_for_Tegra/bootloader/ramdisk_tmp/lib ~/project_management/r32.7.1/Linux_for_Tegra/bootloader/ramdisk_tmp ~/project_management/r32.7.1/Linux_for_Tegra/bootloader ~/project_management/r32.7.1/Linux_for_Tegra
61347 块
Making Recovery image...
copying recdtbfile(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb.rec)... done.
记录了20+0 的读入
记录了20+0 的写出
20 bytes copied, 9.4972e-05 s, 211 kB/s
Existing sosfile(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin) reused.
copying tegraboot(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/t186ref/nvtboot.bin)... done.
Existing cpu_bootloader(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
Existing mb2blfile(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
Existing mtspreboot(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/preboot_d15_prod_cr.bin) reused.
Existing mts(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/mce_mts_d15_prod_cr.bin) reused.
Existing mb1file(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/mb1_prod.bin) reused.
Existing bpffile(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/bpmp.bin) reused.
copying bpfdtbfile(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/t186ref/tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb)... done.
Existing scefile(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused.
Existing spefile(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/spe.bin) reused.
copying wb0boot(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/t186ref/warmboot.bin)... done.
Existing tosfile(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/tos-trusty.img) reused.
Existing eksfile(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/eks.img) reused.
copying dtbfile(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)... done.
Copying nv_boot_control.conf to rootfs
/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x18 --key  --cmd sign kernel_tegra186-quill-p3310-1000-c03-00-base.dtb kernel_dtb
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0003 ] Generating signature
[   0.0023 ] tegrasign_v3.py --getmode mode.txt --key 
[   0.0024 ] Assuming zero filled SBK key : not reading 
[   0.0024 ] sign_type   : 758133043
[   0.0024 ] header_magic: d00dfeed
[   0.0041 ] tegrahost_v2 --chip 0x18 --align 1_kernel_tegra186-quill-p3310-1000-c03-00-base.dtb
[   0.0047 ] 
[   0.0064 ] tegrahost_v2 --chip 0x18 0 --appendsigheader 1_kernel_tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[   0.0071 ] 
[   0.0094 ] tegrasign_v3.py --key  --list 1_kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[   0.0094 ] Assuming zero filled SBK key : not reading 
[   0.0148 ] tegrahost_v2 --chip 0x18 0 --updatesigheader 1_kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt 1_kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[   0.0156 ] 
[   0.0159 ] Signed file: /home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
l4t_sign_image.sh: Generate header for kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
l4t_sign_image.sh: chip 0x18: Don't need to do anything
l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
l4t_sign_image.sh: the signed file is /home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
done.
	populating kernel to rootfs... done.
	populating initrd to rootfs... done.
	populating kernel_tegra186-quill-p3310-1000-c03-00-base.dtb to rootfs... done.
Making system.img... 
	populating rootfs from /home/yongle/project_management/r32.7.1/Linux_for_Tegra/rootfs ... 	populating /boot/extlinux/extlinux.conf ... done.
	Sync'ing system.img ... done.
	Converting RAW image to Sparse image... done.
system.img built successfully. 
Existing tbcfile(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/cboot.bin) reused.
copying tbcdtbfile(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)... done.
copying cfgfile(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml... done.
Existing flasher(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing flashapp(/home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/tegraflash.py) reused.
./tegraflash.py --bl nvtboot_recovery_cpu.bin --sdram_config P3310_A00_8GB_lpddr4_A02_l4t.cfg --odmdata 0x1090000 --applet mb1_recovery_prod.bin  --cmd "flash; reboot"  --cfg flash.xml --chip 0x18 --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg  --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb; tlk tos-trusty.img; eks eks.img; bootloader_dtb tegra186-quill-p3310-1000-c03-00-base.dtb"   
saving flash command in /home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/flashcmd.txt
saving Windows flash command to /home/yongle/project_management/r32.7.1/Linux_for_Tegra/bootloader/flash_win.bat
*** Flashing target device started. ***
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0059 ] tegrasign_v3.py --getmode mode.txt --key None
[   0.0059 ] Assuming zero filled SBK key
[   0.0022 ] Generating RCM messages
[   0.0040 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[   0.0045 ] RCM 0 is saved as rcm_0.rcm
[   0.0049 ] RCM 1 is saved as rcm_1.rcm
[   0.0049 ] List of rcm files are saved in rcm_list.xml
[   0.0049 ] 
[   0.0049 ] Signing RCM messages
[   0.0104 ] tegrasign_v3.py --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0104 ] Assuming zero filled SBK key
[   0.0140 ] Copying signature to RCM mesages
[   0.0163 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[   0.0173 ] 
[   0.0173 ] Parsing partition layout
[   0.0184 ] tegraparser_v2 --pt flash.xml.tmp
[   0.0201 ] 
[   0.0201 ] Using default ramcode: 0
[   0.0201 ] Disable BPMP dtb trim, using default dtb
[   0.0201 ] 
[   0.0201 ] Creating list of images to be signed
[   0.0210 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[   0.1355 ] 
[   0.1356 ] Generating signatures
[   0.1412 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key
[   0.1413 ] Assuming zero filled SBK key
[   0.7952 ] Generating br-bct
[   0.7981 ] Updating dev and MSS params in BR BCT
[   0.7982 ] tegrabct_v2 --dev_param emmc.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --brbct br_bct.cfg --chip 0x18 0
[   0.8133 ] 
[   0.8133 ] Updating bl info
[   0.8153 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   0.8163 ] 
[   0.8164 ] Updating smd info
[   0.8181 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[   0.8189 ] 
[   0.8189 ] Updating Odmdata
[   0.8206 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x1090000
[   0.8213 ] 
[   0.8214 ] Get Signed section of bct
[   0.8231 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[   0.8240 ] 
[   0.8265 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key
[   0.8278 ] Assuming zero filled SBK key
[   0.8754 ] 
[   0.8754 ] Updating BCT with signature
[   0.8774 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml
[   0.8781 ] 
[   0.8781 ] Generating coldboot mb1-bct
[   0.8798 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[   0.8804 ] MB1-BCT version: 0xf
[   0.8805 ] Packing sdram param for instance[0]
[   0.8947 ] Packing sdram param for instance[1]
[   0.8948 ] Packing sdram param for instance[2]
[   0.8950 ] Packing sdram param for instance[3]

[   0.8954 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg 
[   0.8957 ] Appending platform config data of size :- 3032

[   0.8962 ] Parsing config file :mobile_scr.cfg 
[   0.8964 ] Appending platform config data of size :- 12240

[   0.8994 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg 
[   0.8997 ] Appending platform config data of size :- 24

[   0.8998 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg 
[   0.9001 ] Appending platform config data of size :- 672
[   0.9001 ] 
[   0.9001 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg 
[   0.9002 ] Appending platform config data of size :- 64
[   0.9002 ] 
[   0.9002 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg 
[   0.9002 ] Appending platform config data of size :- 1628
[   0.9002 ] 
[   0.9002 ] Updating mb1-bct with firmware information
[   0.9025 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[   0.9032 ] MB1-BCT version: 0xf
[   0.9035 ] 
[   0.9035 ] Updating mb1-bct with storage information
[   0.9052 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   0.9057 ] MB1-BCT version: 0xf
[   0.9060 ] 
[   0.9077 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[   0.9084 ] 
[   0.9100 ] tegrahost_v2 --chip 0x18 0 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[   0.9107 ] 
[   0.9164 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[   0.9165 ] Assuming zero filled SBK key
[   0.9168 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[   0.9178 ] 
[   0.9179 ] Generating recovery mb1-bct
[   0.9199 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[   0.9206 ] MB1-BCT version: 0xf
[   0.9208 ] Packing sdram param for instance[0]
[   0.9369 ] Packing sdram param for instance[1]
[   0.9371 ] Packing sdram param for instance[2]
[   0.9373 ] Packing sdram param for instance[3]

[   0.9374 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg 
[   0.9376 ] Appending platform config data of size :- 3032

[   0.9378 ] Parsing config file :minimal_scr.cfg 
[   0.9379 ] Appending platform config data of size :- 12240

[   0.9389 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg 
[   0.9391 ] Appending platform config data of size :- 24
[   0.9391 ] 
[   0.9391 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg 
[   0.9391 ] Appending platform config data of size :- 672
[   0.9391 ] 
[   0.9391 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg 
[   0.9391 ] Appending platform config data of size :- 64
[   0.9391 ] 
[   0.9391 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg 
[   0.9391 ] Appending platform config data of size :- 1628
[   0.9391 ] 
[   0.9392 ] Updating mb1-bct with firmware information
[   0.9411 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[   0.9418 ] MB1-BCT version: 0xf
[   0.9421 ] 
[   0.9421 ] Updating mb1-bct with storage information
[   0.9438 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   0.9444 ] MB1-BCT version: 0xf
[   0.9446 ] 
[   0.9463 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[   0.9475 ] 
[   0.9485 ] tegrahost_v2 --chip 0x18 0 --appendsigheader mb1_bct_MB1.bct zerosbk
[   0.9497 ] 
[   0.9561 ] tegrasign_v3.py --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[   0.9562 ] Assuming zero filled SBK key
[   0.9564 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[   0.9570 ] 
[   0.9571 ] Copying signatures
[   0.9576 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   1.0871 ] 
[   1.0871 ] Boot Rom communication
[   1.0881 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[   1.0888 ] BootRom is not running
[   6.2899 ] 
[   7.2947 ] tegrarcm_v2 --isapplet
[   7.2965 ] Applet version 01.00.0000
[   7.2991 ] 
[   7.2992 ] Sending BCTs
[   7.3022 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[   7.3040 ] Applet version 01.00.0000
[   7.3204 ] Sending bct_bootrom
[   7.3206 ] [................................................] 100%
[   7.3221 ] Sending bct_mb1
[   7.3228 ] [................................................] 100%
[   7.3394 ] 
[   7.3395 ] Generating blob
[   7.3432 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin
[   7.3452 ] 
[   7.3486 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[   7.3532 ] 
[   7.3597 ] tegrasign_v3.py --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   7.3598 ] Assuming zero filled SBK key
[   7.3629 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[   7.3640 ] 
[   7.3663 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin
[   7.3672 ] 
[   7.3679 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[   7.3692 ] 
[   7.3752 ] tegrasign_v3.py --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   7.3752 ] Assuming zero filled SBK key
[   7.3815 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[   7.3824 ] 
[   7.3843 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin
[   7.3850 ] 
[   7.3867 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[   7.3874 ] 
[   7.3933 ] tegrasign_v3.py --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   7.3934 ] Assuming zero filled SBK key
[   7.3948 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[   7.3957 ] 
[   7.4014 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin
[   7.4027 ] 
[   7.4035 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[   7.4079 ] 
[   7.4139 ] tegrasign_v3.py --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   7.4140 ] Assuming zero filled SBK key
[   7.4391 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[   7.4428 ] 
[   7.4448 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin
[   7.4453 ] 
[   7.4459 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_bpmp.bin zerosbk
[   7.4469 ] 
[   7.4525 ] tegrasign_v3.py --key None --list blob_bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   7.4526 ] Assuming zero filled SBK key
[   7.4595 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[   7.4615 ] 
[   7.4636 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb
[   7.4644 ] 
[   7.4664 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk
[   7.4682 ] 
[   7.4742 ] tegrasign_v3.py --key None --list blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[   7.4742 ] Assuming zero filled SBK key
[   7.4795 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[   7.4806 ] 
[   7.4826 ] tegrahost_v2 --chip 0x18 --align blob_tos-trusty.img
[   7.4837 ] 
[   7.4856 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tos-trusty.img zerosbk
[   7.4871 ] 
[   7.4935 ] tegrasign_v3.py --key None --list blob_tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key
[   7.4936 ] Assuming zero filled SBK key
[   7.5012 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tos-trusty_sigheader.img.encrypt blob_tos-trusty_sigheader.img.hash zerosbk
[   7.5024 ] 
[   7.5034 ] tegrahost_v2 --chip 0x18 --align blob_eks.img
[   7.5041 ] 
[   7.5058 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_eks.img zerosbk
[   7.5066 ] 
[   7.5123 ] tegrasign_v3.py --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key
[   7.5124 ] Assuming zero filled SBK key
[   7.5123 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[   7.5134 ] 
[   7.5157 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-quill-p3310-1000-c03-00-base.dtb
[   7.5169 ] 
[   7.5179 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[   7.5189 ] 
[   7.5254 ] tegrasign_v3.py --key None --list blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[   7.5254 ] Assuming zero filled SBK key
[   7.5294 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[   7.5304 ] 
[   7.5323 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin
[   7.5328 ] number of images in blob are 9
[   7.5329 ] blobsize is 4440376
[   7.5330 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 225168
[   7.5344 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 122272
[   7.5347 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 58384
[   7.5349 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2236640
[   7.5356 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 534816
[   7.5359 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt of size 604928
[   7.5364 ] Added binary blob_tos-trusty_sigheader.img.encrypt of size 403264
[   7.5365 ] Added binary blob_eks_sigheader.img.encrypt of size 1440
[   7.5367 ] Added binary blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt of size 253312
[   7.5385 ] 
[   7.5385 ] Sending bootloader and pre-requisite binaries
[   7.5404 ] tegrarcm_v2 --download blob blob.bin
[   7.5409 ] Applet version 01.00.0000
[   7.5559 ] Sending blob
[   7.5560 ] [................................................] 100%
[   8.0535 ] 
[   8.0574 ] tegrarcm_v2 --boot recovery
[   8.0590 ] Applet version 01.00.0000
[   8.0815 ] 
[   9.0863 ] tegrarcm_v2 --isapplet
[   9.7945 ] 
[   9.7998 ] tegradevflash_v2 --iscpubl
[   9.8015 ] Cannot Open USB
[  10.2603 ] 
[  11.2650 ] tegrarcm_v2 --isapplet


Hi,

Could you share the full log instead of pasting just a picture?

Also, since you said this board was flashed successfully once, are you still able to boot up and dump us the cvm eeprom?

The picture shows all the output logs, the uart output has only these lines.
The successful log has not been found。

Hi,

Ok, does not matter. Could you reply the question here?

Could you try to fully read and reply every question we shared? I give you two questions so i would expect 2 answers here. Would like to check the boot log and cvm eeprom.

麻煩一次就回答完我們所有的問題…謝謝

Hello WayneWWW,
jumping in as we have the same problems with a new lot of TX2 modules (Board Part Number 699-83310-1000-D02 L.0) which we can not flash via our custom base board (which i think is the main point here).
Flashing the modules on our custom board fails and gives us a waypoint error. I was able to fully flash the module with the devkit and run it (on the devkit). When i move the module to our custom board (flashed on the devkit) it wont’t start up and only outputs the waypoint error Yolomei already shared on the serial console.

So my question is, do you know of any hardware requirement a D02 has which was not relevant for B0x-D00 modules,

Thank you

Hi @GiantDwarf ,

I think this point is important. Didn’t know this is custom board.

Could you also attach the boot up log of your module and share it here.

@Yolomei are you using custom board for this issue too?

BTW, i already checked that the ram code strap pins are not connected in our design.

And also the boot log when you put the same module on devkit.

Hi @WayneWWW ,
can you confirm the finding that the problem comes from:

module: #define TEGRABL_ERR_CPUINIT 0x32U
error: #define TEGRABL_ERR_TIMEOUT 0x06U

Does the bootloader try to communicate with periperhals from the devkit (devkit eeprom)?

jetson-tx2-l4t-32.6.1-serial-uart.log (244 Bytes)

And here the log when same module is started from the devkit:
jetson-tx2-l4t-32.6.1-serial-uart-devkit.log (78.7 KB)

how to get cvm eeprom

Let tegraflash download the content and check it with chkbdinfo.

python3 tegraflash.py --chip 0x18 --applet mb1_recovery_prod.bin --cmd "dump eeprom boardinfo cvm.bin"
./chkbdinfo -a -i -k -f -r -v cvm.bin
1 Like

Hi @WayneWWW ,
do you have an update to my questions or the issue and the possible cause?
The main question is what the D02 does during boot loader stage, different to the previous revisions.
This information would give us the chance for further investigations.

Hi @GiantDwarf ,

Just want to confirm, is rel-32.7.2 giving you same problem or not?

I don’t think this is related to carrier board eeprom. We also have lots of partners who making their own board with TX2, but so far we don’t receive any report from them either. They don’t have eeprom on their carrier board either.

It could be a hardware diff between devkti and custom board.

I have not checked that as the PCN did not point in that direction but i can try that next.

Same problem for 32.7.2

In the end it was a wrongly connected ram strap pin.
When i checked the schematic of our carrier i overlooked the naming change from “Tegra: UART1_RTS” to “Jetson TX2: UART0_RTS” and interpreted things wrong. After checking the hardware i recognized that a pulldown was attached to the UART RTS line which caused the bootloader to decide for the wrong sdram config.