TX2NX USB problem while flashing

Hello, I have a jetson tx2nx device, when I try to flash, I get this issue: tegradevflash_v2 --iscpubl , Cannot Open USB

do you have any solutions?

# L4T BSP Information:
# R32 , REVISION: 6.1
###############################################################################
# Target Board Information:
# Name: jetson-xavier-nx-devkit-tx2-nx, Board Family: t186ref, SoC: Tegra 186, 
# OpMode: production, Boot Authentication: NS, 
# Disk encryption: disabled ,
###############################################################################
./tegraflash.py --chip 0x18 --applet "/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin" --skipuid --cmd "dump eeprom boardinfo cvm.bin" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0018 ] Generating RCM messages
[   0.0036 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm /opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin 0 0
[   0.0041 ] RCM 0 is saved as rcm_0.rcm
[   0.0043 ] RCM 1 is saved as rcm_1.rcm
[   0.0043 ] List of rcm files are saved in rcm_list.xml
[   0.0043 ] 
[   0.0043 ] Signing RCM messages
[   0.0061 ] tegrasign_v3.py --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0062 ] Assuming zero filled SBK key
[   0.0104 ] Copying signature to RCM mesages
[   0.0120 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[   0.0128 ] 
[   0.0128 ] Boot Rom communication
[   0.0144 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml --skipuid
[   0.0148 ] RCM version 0X180001
[   0.0411 ] Boot Rom communication completed
[   1.0493 ] 
[   2.0549 ] tegrarcm_v2 --isapplet
[   2.0566 ] Applet version 01.00.0000
[   2.1312 ] 
[   2.1343 ] Retrieving EEPROM data
[   2.1345 ] tegrarcm_v2 --oem platformdetails eeprom cvm /opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/cvm.bin
[   2.1359 ] Applet version 01.00.0000
[   2.2275 ] Saved platform info in /opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/cvm.bin
[   2.3015 ] 
Board ID(3636) version(302) sku(0001) revision(C.0)
Copy /opt/4-6-tx2-nx-installer/Linux_for_Tegra/kernel/dtb/tegra186-p3636-0001-p3509-0000-a01.dtb to /opt/4-6-tx2-nx-installer/Linux_for_Tegra/kernel/dtb/tegra186-p3636-0001-p3509-0000-a01.dtb.rec
copying bctfile(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg)... done.
copying misc_config(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)... done.
copying pinmux_config(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg)... done.
copying pmic_config(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-p3636-0001-a00.cfg)... done.
copying pmc_config(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-p3636-0001-a00.cfg)... done.
copying prod_config(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-p3636-0001-a00.cfg)... done.
copying scr_config(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/t186ref/BCT/minimal_scr.cfg)... done.
copying scr_cold_boot_config(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/t186ref/BCT/mobile_scr.cfg)... done.
copying bootrom_config(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg)... done.
copying dev_params(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/t186ref/BCT/emmc.cfg)... done.
Existing bootloader(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
copying initrd(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/l4t_initrd.img)... done.
Making Boot image... done.
/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x18 --key  --cmd sign boot.img kernel
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0002 ] Generating signature
[   0.0021 ] tegrasign_v3.py --getmode mode.txt --key 
[   0.0022 ] Assuming zero filled SBK key : not reading 
[   0.0023 ] sign_type   : 0
[   0.0023 ] header_magic: 414e4452
[   0.0040 ] tegrahost_v2 --chip 0x18 --align 1_boot.img
[   0.0044 ] 
[   0.0055 ] tegrahost_v2 --chip 0x18 0 --appendsigheader 1_boot.img zerosbk
[   0.0067 ] 
[   0.0089 ] tegrasign_v3.py --key  --list 1_boot_sigheader.img_list.xml --pubkeyhash pub_key.key
[   0.0089 ] Assuming zero filled SBK key : not reading 
[   0.0173 ] tegrahost_v2 --chip 0x18 0 --updatesigheader 1_boot_sigheader.img.encrypt 1_boot_sigheader.img.hash zerosbk
[   0.0184 ] 
[   0.0187 ] Signed file: /opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt
l4t_sign_image.sh: Generate header for boot_sigheader.img.encrypt
l4t_sign_image.sh: chip 0x18: Don't need to do anything
l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot_sigheader.img.encrypt
l4t_sign_image.sh: the signed file is /opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/temp_user_dir/boot_sigheader.img.encrypt
done.
Making recovery ramdisk for recovery image...
Re-generating recovery ramdisk for recovery image...
/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/ramdisk_tmp /opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader /opt/4-6-tx2-nx-installer/Linux_for_Tegra
30412 blocks
_BASE_KERNEL_VERSION=4.9.253-tegra
/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/ramdisk_tmp/lib /opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/ramdisk_tmp /opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader /opt/4-6-tx2-nx-installer/Linux_for_Tegra
66121 blocks
Making Recovery image...
copying recdtbfile(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/kernel/dtb/tegra186-p3636-0001-p3509-0000-a01.dtb.rec)... done.
20+0 records in
20+0 records out
20 bytes copied, 8,615e-05 s, 232 kB/s
Existing sosfile(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/mb1_recovery_prod.bin) reused.
copying tegraboot(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/t186ref/nvtboot.bin)... done.
Existing cpu_bootloader(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
Existing mb2blfile(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
Existing mtspreboot(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/preboot_d15_prod_cr.bin) reused.
Existing mts(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/mce_mts_d15_prod_cr.bin) reused.
Existing mb1file(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/mb1_prod.bin) reused.
Existing bpffile(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/bpmp.bin) reused.
copying bpfdtbfile(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/t186ref/tegra186-bpmp-p3636-0001-a00-00.dtb)... done.
Existing scefile(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/camera-rtcpu-sce.img) reused.
Existing spefile(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/spe.bin) reused.
copying wb0boot(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/t186ref/warmboot.bin)... done.
Existing tosfile(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/tos-trusty.img) reused.
Existing eksfile(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/eks.img) reused.
copying dtbfile(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/kernel/dtb/tegra186-p3636-0001-p3509-0000-a01.dtb)... done.
Copying nv_boot_control.conf to rootfs
/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/tegraflash.py --chip 0x18 --key  --cmd sign kernel_tegra186-p3636-0001-p3509-0000-a01.dtb kernel_dtb
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0003 ] Generating signature
[   0.0022 ] tegrasign_v3.py --getmode mode.txt --key 
[   0.0022 ] Assuming zero filled SBK key : not reading 
[   0.0023 ] sign_type   : 811674928
[   0.0023 ] header_magic: d00dfeed
[   0.0041 ] tegrahost_v2 --chip 0x18 --align 1_kernel_tegra186-p3636-0001-p3509-0000-a01.dtb
[   0.0046 ] 
[   0.0057 ] tegrahost_v2 --chip 0x18 0 --appendsigheader 1_kernel_tegra186-p3636-0001-p3509-0000-a01.dtb zerosbk
[   0.0064 ] 
[   0.0086 ] tegrasign_v3.py --key  --list 1_kernel_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[   0.0086 ] Assuming zero filled SBK key : not reading 
[   0.0131 ] tegrahost_v2 --chip 0x18 0 --updatesigheader 1_kernel_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt 1_kernel_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.hash zerosbk
[   0.0139 ] 
[   0.0141 ] Signed file: /opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt
l4t_sign_image.sh: Generate header for kernel_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt
l4t_sign_image.sh: chip 0x18: Don't need to do anything
l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt
l4t_sign_image.sh: the signed file is /opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/temp_user_dir/kernel_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt
done.
Reusing existing system.img... 
done.
Existing tbcfile(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/cboot.bin) reused.
copying tbcdtbfile(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/kernel/dtb/tegra186-p3636-0001-p3509-0000-a01.dtb)... done.
copying cfgfile(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml... done.
Existing flasher(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing flashapp(/opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/tegraflash.py) reused.
./tegraflash.py --bl nvtboot_recovery_cpu.bin --sdram_config tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --odmdata 0x2090000 --applet mb1_recovery_prod.bin  --cmd "flash; reboot"  --cfg flash.xml --chip 0x18 --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmic_config tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --pmc_config tegra186-mb1-bct-pad-p3636-0001-a00.cfg --prod_config tegra186-mb1-bct-prod-p3636-0001-a00.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --dev_params emmc.cfg  --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-bpmp-p3636-0001-a00-00.dtb; tlk tos-trusty.img; eks eks.img; bootloader_dtb tegra186-p3636-0001-p3509-0000-a01.dtb"   
saving flash command in /opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/flashcmd.txt
saving Windows flash command to /opt/4-6-tx2-nx-installer/Linux_for_Tegra/bootloader/flash_win.bat
*** Flashing target device started. ***
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0054 ] tegrasign_v3.py --getmode mode.txt --key None
[   0.0055 ] Assuming zero filled SBK key
[   0.0020 ] Generating RCM messages
[   0.0037 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[   0.0043 ] RCM 0 is saved as rcm_0.rcm
[   0.0045 ] RCM 1 is saved as rcm_1.rcm
[   0.0045 ] List of rcm files are saved in rcm_list.xml
[   0.0045 ] 
[   0.0045 ] Signing RCM messages
[   0.0098 ] tegrasign_v3.py --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0098 ] Assuming zero filled SBK key
[   0.0097 ] Copying signature to RCM mesages
[   0.0113 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[   0.0120 ] 
[   0.0120 ] Parsing partition layout
[   0.0137 ] tegraparser_v2 --pt flash.xml.tmp
[   0.0146 ] 
[   0.0146 ] Using default ramcode: 0
[   0.0147 ] Disable BPMP dtb trim, using default dtb
[   0.0147 ] 
[   0.0147 ] Creating list of images to be signed
[   0.0165 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[   0.0823 ] 
[   0.0824 ] Generating signatures
[   0.0880 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key
[   0.0881 ] Assuming zero filled SBK key
[   0.6204 ] Generating br-bct
[   0.6221 ] Updating dev and MSS params in BR BCT
[   0.6222 ] tegrabct_v2 --dev_param emmc.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --brbct br_bct.cfg --chip 0x18 0
[   0.6285 ] 
[   0.6285 ] Updating bl info
[   0.6304 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   0.6334 ] 
[   0.6334 ] Updating smd info
[   0.6351 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[   0.6368 ] 
[   0.6369 ] Updating Odmdata
[   0.6386 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x2090000
[   0.6401 ] 
[   0.6401 ] Get Signed section of bct
[   0.6418 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[   0.6425 ] 
[   0.6442 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key
[   0.6447 ] Assuming zero filled SBK key
[   0.6580 ] 
[   0.6580 ] Updating BCT with signature
[   0.6600 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml
[   0.6619 ] 
[   0.6619 ] Generating coldboot mb1-bct
[   0.6637 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[   0.6643 ] MB1-BCT version: 0xf
[   0.6644 ] Copying Sdram info from 1 to 2 set
[   0.6702 ] Copying Sdram info from 2 to 3 set
[   0.6703 ] Packing sdram param for instance[0]
[   0.6704 ] Packing sdram param for instance[1]
[   0.6704 ] Packing sdram param for instance[2]
[   0.6705 ] Packing sdram param for instance[3]

[   0.6706 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg 
[   0.6707 ] Appending platform config data of size :- 2472

[   0.6708 ] Parsing config file :mobile_scr.cfg 
[   0.6709 ] Appending platform config data of size :- 12240

[   0.6716 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg 
[   0.6717 ] Appending platform config data of size :- 24
[   0.6717 ] 
[   0.6717 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg 
[   0.6717 ] Appending platform config data of size :- 508
[   0.6717 ] 
[   0.6717 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg 
[   0.6717 ] Appending platform config data of size :- 64
[   0.6717 ] 
[   0.6717 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg 
[   0.6717 ] Appending platform config data of size :- 1628
[   0.6717 ] 
[   0.6718 ] Updating mb1-bct with firmware information
[   0.6736 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[   0.6741 ] MB1-BCT version: 0xf
[   0.6755 ] 
[   0.6755 ] Updating mb1-bct with storage information
[   0.6772 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   0.6778 ] MB1-BCT version: 0xf
[   0.6788 ] 
[   0.6807 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[   0.6814 ] 
[   0.6833 ] tegrahost_v2 --chip 0x18 0 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[   0.6841 ] 
[   0.6896 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[   0.6897 ] Assuming zero filled SBK key
[   0.6895 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[   0.6901 ] 
[   0.6902 ] Generating recovery mb1-bct
[   0.6917 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[   0.6922 ] MB1-BCT version: 0xf
[   0.6923 ] Copying Sdram info from 1 to 2 set
[   0.6981 ] Copying Sdram info from 2 to 3 set
[   0.6982 ] Packing sdram param for instance[0]
[   0.6983 ] Packing sdram param for instance[1]
[   0.6984 ] Packing sdram param for instance[2]
[   0.6984 ] Packing sdram param for instance[3]

[   0.6985 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg 
[   0.6986 ] Appending platform config data of size :- 2472

[   0.6987 ] Parsing config file :minimal_scr.cfg 
[   0.6988 ] Appending platform config data of size :- 12240

[   0.6996 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg 
[   0.6996 ] Appending platform config data of size :- 24
[   0.6996 ] 
[   0.6996 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg 
[   0.6996 ] Appending platform config data of size :- 508
[   0.6996 ] 
[   0.6996 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg 
[   0.6996 ] Appending platform config data of size :- 64
[   0.6996 ] 
[   0.6996 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg 
[   0.6996 ] Appending platform config data of size :- 1628
[   0.6996 ] 
[   0.6996 ] Updating mb1-bct with firmware information
[   0.7012 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[   0.7017 ] MB1-BCT version: 0xf
[   0.7031 ] 
[   0.7031 ] Updating mb1-bct with storage information
[   0.7047 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   0.7052 ] MB1-BCT version: 0xf
[   0.7055 ] 
[   0.7072 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[   0.7078 ] 
[   0.7083 ] tegrahost_v2 --chip 0x18 0 --appendsigheader mb1_bct_MB1.bct zerosbk
[   0.7089 ] 
[   0.7133 ] tegrasign_v3.py --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[   0.7134 ] Assuming zero filled SBK key
[   0.7133 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[   0.7140 ] 
[   0.7140 ] Copying signatures
[   0.7157 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   0.7998 ] 
[   0.7999 ] Boot Rom communication
[   0.8019 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[   0.8024 ] BootRom is not running
[   5.8692 ] 
[   6.8746 ] tegrarcm_v2 --isapplet
[   6.8762 ] Applet version 01.00.0000
[   6.9517 ] 
[   6.9518 ] Sending BCTs
[   6.9546 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[   6.9558 ] Applet version 01.00.0000
[   7.0437 ] Sending bct_bootrom
[   7.0439 ] [................................................] 100%
[   7.0453 ] Sending bct_mb1
[   7.0463 ] [................................................] 100%
[   7.0637 ] 
[   7.0638 ] Generating blob
[   7.0667 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin
[   7.0681 ] 
[   7.0707 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[   7.0725 ] 
[   7.0790 ] tegrasign_v3.py --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   7.0791 ] Assuming zero filled SBK key
[   7.0867 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[   7.0884 ] 
[   7.0910 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin
[   7.0921 ] 
[   7.0944 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[   7.0956 ] 
[   7.1017 ] tegrasign_v3.py --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   7.1017 ] Assuming zero filled SBK key
[   7.1035 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[   7.1045 ] 
[   7.1065 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin
[   7.1072 ] 
[   7.1091 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[   7.1099 ] 
[   7.1154 ] tegrasign_v3.py --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   7.1155 ] Assuming zero filled SBK key
[   7.1158 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[   7.1165 ] 
[   7.1183 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin
[   7.1188 ] 
[   7.1205 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[   7.1233 ] 
[   7.1288 ] tegrasign_v3.py --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   7.1289 ] Assuming zero filled SBK key
[   7.1474 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[   7.1514 ] 
[   7.1532 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin
[   7.1537 ] 
[   7.1556 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_bpmp.bin zerosbk
[   7.1567 ] 
[   7.1623 ] tegrasign_v3.py --key None --list blob_bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key
[   7.1623 ] Assuming zero filled SBK key
[   7.1663 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[   7.1674 ] 
[   7.1692 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-bpmp-p3636-0001-a00-00.dtb
[   7.1698 ] 
[   7.1715 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tegra186-bpmp-p3636-0001-a00-00.dtb zerosbk
[   7.1723 ] 
[   7.1777 ] tegrasign_v3.py --key None --list blob_tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[   7.1778 ] Assuming zero filled SBK key
[   7.1783 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt blob_tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.hash zerosbk
[   7.1791 ] 
[   7.1809 ] tegrahost_v2 --chip 0x18 --align blob_tos-trusty.img
[   7.1815 ] 
[   7.1831 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tos-trusty.img zerosbk
[   7.1840 ] 
[   7.1894 ] tegrasign_v3.py --key None --list blob_tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key
[   7.1895 ] Assuming zero filled SBK key
[   7.1922 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tos-trusty_sigheader.img.encrypt blob_tos-trusty_sigheader.img.hash zerosbk
[   7.1930 ] 
[   7.1948 ] tegrahost_v2 --chip 0x18 --align blob_eks.img
[   7.1954 ] 
[   7.1972 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_eks.img zerosbk
[   7.1978 ] 
[   7.2032 ] tegrasign_v3.py --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key
[   7.2033 ] Assuming zero filled SBK key
[   7.2030 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[   7.2036 ] 
[   7.2054 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-p3636-0001-p3509-0000-a01.dtb
[   7.2060 ] 
[   7.2077 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tegra186-p3636-0001-p3509-0000-a01.dtb zerosbk
[   7.2085 ] 
[   7.2140 ] tegrasign_v3.py --key None --list blob_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[   7.2140 ] Assuming zero filled SBK key
[   7.2151 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt blob_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.hash zerosbk
[   7.2158 ] 
[   7.2176 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin
[   7.2182 ] number of images in blob are 9
[   7.2183 ] blobsize is 3950264
[   7.2183 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 225152
[   7.2193 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 122272
[   7.2195 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 58384
[   7.2196 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2298464
[   7.2203 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 534816
[   7.2205 ] Added binary blob_tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt of size 113600
[   7.2207 ] Added binary blob_tos-trusty_sigheader.img.encrypt of size 403264
[   7.2208 ] Added binary blob_eks_sigheader.img.encrypt of size 1440
[   7.2209 ] Added binary blob_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt of size 192720
[   7.2220 ] 
[   7.2221 ] Sending bootloader and pre-requisite binaries
[   7.2239 ] tegrarcm_v2 --download blob blob.bin
[   7.2245 ] Applet version 01.00.0000
[   7.3042 ] Sending blob
[   7.3043 ] [................................................] 100%
[   7.7724 ] 
[   7.7761 ] tegrarcm_v2 --boot recovery
[   7.7777 ] Applet version 01.00.0000
[   7.8531 ] 
[   8.8585 ] tegrarcm_v2 --isapplet
[   9.5419 ] 
[   9.5453 ] tegradevflash_v2 --iscpubl
[   9.5467 ] Cannot Open USB
[  10.4287 ] 
[  11.4333 ] tegrarcm_v2 --isapplet


Check what is the serial log from your board during this flash failure.

This is the uart log:

[0063.436] E> Waypoint-0.5 ACK pending: 0x8
[0063.440] C> MTS error (2) : dram alias check failure
[0063.445] C> cpu waypoint 0.5 failed
[0063.448] C> ERROR: Highest Layer Module = 0x32, Lowest Layer Module = 0x32,
Aux Info = 0x1, Reason = 0x6

Hi,

Some questions to confirm,
Is your TX2NX using a dev kit or a custom carrier board?

Please try to install bsp 32.7.6 first to cross check.

Thanks