After flash Jetpack4.6.6, the system cannot start

We used the devkit backplane to burn Jetpack4.6.6 for the Jetson nano module.

Here is the full flash log.

cx@ubuntu:~/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra$ sudo ./flash.sh jetson-nano-emmc mmcblk0p1 
###############################################################################
# L4T BSP Information:
# R32 , REVISION: 7.6
###############################################################################
# Target Board Information:
# Name: jetson-nano-emmc, Board Family: t210ref, SoC: Tegra 210, 
# OpMode: production, Boot Authentication: , 
# Disk encryption: disabled ,
###############################################################################
./tegraflash.py --chip 0x21 --applet "/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/nvtboot_recovery.bin" --skipuid --cmd "dump eeprom boardinfo cvm.bin" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0016 ] Generating RCM messages
[   0.0032 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm /home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/nvtboot_recovery.bin 0 0
[   0.0040 ] RCM 0 is saved as rcm_0.rcm
[   0.0289 ] RCM 1 is saved as rcm_1.rcm
[   0.0289 ] List of rcm files are saved in rcm_list.xml
[   0.0289 ] 
[   0.0290 ] Signing RCM messages
[   0.0627 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0637 ] Assuming zero filled SBK key
[   0.0721 ] 
[   0.0722 ] Copying signature to RCM mesages
[   0.0752 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml
[   0.0766 ] 
[   0.0767 ] Boot Rom communication
[   0.0792 ] tegrarcm --chip 0x21 0 --rcm rcm_list_signed.xml --skipuid
[   0.0807 ] RCM version 0X210001
[   0.1824 ] Boot Rom communication completed
[   1.1923 ] 
[   1.1924 ] dump EEPROM info
[   1.1955 ] tegrarcm --oem platformdetails eeprom /home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/cvm.bin
[   1.1968 ] Applet version 00.01.0000
[   1.2692 ] Saved platform info in /home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/cvm.bin
[   1.3476 ] 
[   1.3506 ] tegrarcm --reboot recovery
[   1.3514 ] Applet version 00.01.0000
[   1.4302 ] 
Board ID(3448) version(402) 
copying bctfile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/t210ref/BCT/P3448_A00_lpddr4_204Mhz_P987.cfg)... done.
copying bootloader(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
copying initrd(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/l4t_initrd.img)... done.
Making Boot image... done.
Existing sosfile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
copying tegraboot(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/t210ref/nvtboot.bin)... done.
copying cpu_bootloader(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
copying bpffile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/t210ref/sc7entry-firmware.bin)... done.
copying wb0boot(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/t210ref/warmboot.bin)... done.
Existing tosfile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/tos-mon-only.img) reused.
Existing eksfile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/eks.img) reused.
./flash.sh: line 2663: [: : integer expression expected
copying dtbfile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb)... done.
Copying nv_boot_control.conf to rootfs
	populating kernel to rootfs... done.
	populating initrd to rootfs... done.
	populating kernel_tegra210-p3448-0002-p3449-0000-b00.dtb to rootfs... done.
Making system.img... 
	populating rootfs from /home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/rootfs ... 	populating /boot/extlinux/extlinux.conf ... done.
	Sync'ing system.img ... done.
	Converting RAW image to Sparse image... done.
system.img built successfully. 
Existing tbcfile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
copying tbcdtbfile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb)... done.
copying cfgfile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/t210ref/cfg/flash_l4t_t210_emmc_p3448.xml) to flash.xml... done.
copying flasher(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
Existing flashapp(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/tegraflash.py) reused.
./tegraflash.py --bl cboot.bin --bct  P3448_A00_lpddr4_204Mhz_P987.cfg --odmdata 0xa4000 --bldtb kernel_tegra210-p3448-0002-p3449-0000-b00.dtb --applet nvtboot_recovery.bin  --cmd "flash; reboot"  --cfg flash.xml --chip 0x21    --bins "EBT cboot.bin; DTB tegra210-p3448-0002-p3449-0000-b00.dtb" 
saving flash command in /home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/flashcmd.txt
saving Windows flash command to /home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/flash_win.bat
assign_value: crc-flash.xml.bin 1 131056 1
printf '\x1' | dd of=crc-flash.xml.bin bs=1 seek=131056 count=1 conv=notrunc
1+0 records in
1+0 records out
1 byte copied, 4.2722e-05 s, 23.4 kB/s
assign_value: crc-flash.xml.bin 0 131057 1
printf '\x0' | dd of=crc-flash.xml.bin bs=1 seek=131057 count=1 conv=notrunc
1+0 records in
1+0 records out
1 byte copied, 5.8387e-05 s, 17.1 kB/s
assign_string: crc-flash.xml.bin PTHD 131064 4
echo PTHD | dd of=crc-flash.xml.bin bs=1 seek=131064 count=4 conv=notrunc
4+0 records in
4+0 records out
4 bytes copied, 3.2449e-05 s, 123 kB/s
*** Flashing target device started. ***
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0154 ] tegrasign --getmode mode.txt --key None
[   0.0163 ] Assuming zero filled SBK key
[   0.0252 ] 
[   0.0254 ] Generating RCM messages
[   0.0440 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm nvtboot_recovery.bin 0 0
[   0.0449 ] RCM 0 is saved as rcm_0.rcm
[   0.2824 ] RCM 1 is saved as rcm_1.rcm
[   0.2828 ] List of rcm files are saved in rcm_list.xml
[   0.2829 ] 
[   0.2829 ] Signing RCM messages
[   0.2860 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.2879 ] Assuming zero filled SBK key
[   0.2913 ] 
[   0.2914 ] Copying signature to RCM mesages
[   0.2945 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml
[   0.3971 ] 
[   0.3971 ] Parsing partition layout
[   0.4002 ] tegraparser --pt flash.xml.tmp
[   0.4017 ] 
[   0.4019 ] Using default ramcode: 0
[   0.4019 ] Disable BPMP dtb trim, using default dtb
[   0.4020 ] 
[   0.4020 ] Creating list of images to be signed
[   0.4041 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --list images_list.xml
[   2.9170 ] 
[   2.9170 ] Generating signatures
[   2.9203 ] tegrasign --key None --list images_list.xml --pubkeyhash pub_key.key
[   2.9209 ] Assuming zero filled SBK key
[   5.1261 ] 
[   5.1262 ] Generating br-bct
[   5.3904 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.cfg --chip 0x21 0
[   5.5612 ] 
[   5.5613 ] Updating boot device parameters
[   5.5673 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatedevparam flash.xml.bin
[   5.5695 ] Warning: No sdram params
[   5.5703 ] 
[   5.5703 ] Updating bl info
[   5.5725 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   6.0112 ] 
[   6.0113 ] Updating secondary storage information into bct
[   6.0142 ] tegraparser --pt flash.xml.bin --chip 0x21 0 --updatecustinfo P3448_A00_lpddr4_204Mhz_P987.bct
[   6.0150 ] 
[   6.0150 ] Updating Odmdata
[   6.0171 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatefields Odmdata =0xa4000
[   6.0177 ] Warning: No sdram params
[   6.0189 ] 
[   6.0189 ] Get Signed section of bct
[   6.0222 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --listbct bct_list.xml
[   6.0233 ] 
[   6.0234 ] Signing BCT
[   6.0286 ] tegrasign --key None --list bct_list.xml --pubkeyhash pub_key.key
[   6.0296 ] Assuming zero filled SBK key
[   6.0302 ] 
[   6.0302 ] Updating BCT with signature
[   6.0329 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatesig bct_list_signed.xml
[   6.0341 ] 
[   6.0342 ] Copying signatures
[   6.0369 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   6.0483 ] 
[   6.0483 ] Updating BFS information on BCT
[   6.0523 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatebfsinfo flash.xml.bin
[   6.0545 ]    BFS:
[   6.0557 ]      0: [PT ] crc-flash.xml.bin (size=131072/131072)
[   6.0563 ]      1: [TBC] nvtboot_cpu.bin.encrypt (size=80816/196608)
[   6.0569 ]      2: [RP1] kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=238224/1048576)
[   6.0579 ]      3: [EBT] cboot.bin.encrypt (size=485952/655360)
[   6.0584 ]      4: [WB0] warmboot.bin.encrypt (size=3952/131072)
[   6.0590 ]      5: [BPF] sc7entry-firmware.bin.encrypt (size=3376/262144)
[   6.0597 ] BFS0: 131072 @ 2560 SUM 703ec141 over 2883584 bytes
[   6.0603 ]    BFS:
[   6.0604 ]      0: [PT-1] crc-flash.xml.bin (size=131072/131072)
[   6.0613 ]      1: [TBC-1] nvtboot_cpu.bin.encrypt (size=80816/196608)
[   6.0621 ]      2: [RP1-1] kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=238224/1048576)
[   6.0631 ]      3: [EBT-1] cboot.bin.encrypt (size=485952/655360)
[   6.0636 ]      4: [WB0-1] warmboot.bin.encrypt (size=3952/131072)
[   6.0641 ]      5: [BPF-1] sc7entry-firmware.bin.encrypt (size=3376/262144)
[   6.0647 ]      8: [VER_b] emmc_bootblob_ver.txt (size=102/32768)
[   6.1232 ]      9: [VER] emmc_bootblob_ver.txt (size=102/32768)
[   6.1236 ] BFS1: 131072 @ 8704 SUM 703ec141 over 2981888 bytes
[   6.1239 ]    KFS:
[   6.1512 ]      0: [DTB] kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=238224/1048576)
[   6.1521 ]      1: [TOS] tos-mon-only.img.encrypt (size=54208/6291456)
[   6.1524 ]      2: [EKS] eks.img (size=1028/81920)
[   6.1526 ]      3: [LNX] boot.img.encrypt (size=667648/67092480)
[   6.1529 ] KFS0: 1048576 @ 29376546 SUM 0d87734f over 8089600 bytes
[   6.1567 ]    KFS:
[   6.1791 ]      0: [DTB-1] kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=238224/1048576)
[   6.1796 ]      1: [TOS-1] tos-mon-only.img.encrypt (size=54208/6291456)
[   6.1798 ]      2: [EKS-1] eks.img (size=1028/81920)
[   6.1799 ]      3: [LNX-1] boot.img.encrypt (size=667648/67092480)
[   6.1801 ] KFS1: 1048576 @ 29522082 SUM 0d87734f over 8089600 bytes
[   6.1835 ] 
[   6.1835 ] Boot Rom communication
[   6.1867 ] tegrarcm --chip 0x21 0 --rcm rcm_list_signed.xml
[   6.1877 ] BR_CID: 0x32101001644147c50c0000000b078380
[   6.2231 ] RCM version 0X210001
[   6.2634 ] Boot Rom communication completed
[   7.2758 ] 
[   7.2759 ] Sending BCTs
[   7.2804 ] tegrarcm --download bct P3448_A00_lpddr4_204Mhz_P987.bct
[   7.2838 ] Applet version 00.01.0000
[   7.3585 ] Sending bct
[   7.3586 ] [................................................] 100%
[   7.5859 ] 
[   7.5882 ] tegrahost --chip 0x21 --align cboot.bin
[   7.5889 ] 
[   7.5907 ] tegrahost --magicid EBT --appendsigheader cboot.bin cboot.bin_blheader
[   7.5929 ] 
[   7.5958 ] tegrasign --key None --list cboot.bin_list.xml
[   7.5965 ] Assuming zero filled SBK key
[   7.6077 ] 
[   7.6102 ] tegrahost --updatesigheader cboot.bin_blheader.encrypt cboot.bin_blheader.hash zerosbk
[   7.6116 ] 
[   7.6151 ] tegrahost --chip 0x21 --align tegra210-p3448-0002-p3449-0000-b00.dtb
[   7.6166 ] 
[   7.6197 ] tegrahost --magicid DTB --appendsigheader tegra210-p3448-0002-p3449-0000-b00.dtb tegra210-p3448-0002-p3449-0000-b00.dtb_blheader
[   7.6223 ] 
[   7.6250 ] tegrasign --key None --list tegra210-p3448-0002-p3449-0000-b00.dtb_list.xml
[   7.6257 ] Assuming zero filled SBK key
[   7.6315 ] 
[   7.6340 ] tegrahost --updatesigheader tegra210-p3448-0002-p3449-0000-b00.dtb_blheader.encrypt tegra210-p3448-0002-p3449-0000-b00.dtb_blheader.hash zerosbk
[   7.6354 ] 
[   7.6356 ] Sending bootloader and pre-requisite binaries
[   7.6381 ] tegrarcm --download ebt cboot.bin.encrypt 0 0 --download rp1 tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt 0
[   7.6389 ] Applet version 00.01.0000
[   7.7166 ] Sending ebt
[   7.7167 ] [................................................] 100%
[   7.8365 ] Sending rp1
[   7.8470 ] [................................................] 100%
[   7.9135 ] 
[   7.9159 ] tegrarcm --boot recovery
[   7.9166 ] Applet version 00.01.0000
[   8.0015 ] 
[   8.0015 ] Retrieving storage infomation
[   8.0044 ] tegrarcm --oem platformdetails storage storage_info.bin
[   8.0056 ] Applet is not running on device. Continue with Bootloader
[   8.6048 ] 
[   8.6390 ] tegradevflash --oem platformdetails storage storage_info.bin
[   8.6400 ] Cboot version 00.01.0000
[   8.6768 ] Saved platform info in storage_info.bin
[   8.6835 ] 
[   8.6836 ] Flashing the device
[   8.6858 ] tegradevflash --pt flash.xml.bin --storageinfo storage_info.bin --create
[   8.6865 ] Cboot version 00.01.0000
[   8.7185 ] Writing partition GPT with gpt.bin
[   8.7187 ] [................................................] 100%
[   8.7269 ] Writing partition PT with crc-flash.xml.bin
[   9.4650 ] [................................................] 100%
[   9.4790 ] Writing partition PT-1 with crc-flash.xml.bin
[   9.4926 ] [................................................] 100%
[   9.5183 ] Writing partition NVC with nvtboot.bin.encrypt
[   9.5608 ] [................................................] 100%
[   9.5824 ] Writing partition TBC with nvtboot_cpu.bin.encrypt
[   9.6166 ] [................................................] 100%
[   9.6406 ] Writing partition RP1 with kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[   9.6900 ] [................................................] 100%
[   9.7225 ] Writing partition EBT with cboot.bin.encrypt
[   9.7741 ] [................................................] 100%
[   9.8116 ] Writing partition WB0 with warmboot.bin.encrypt
[   9.8686 ] [................................................] 100%
[   9.8867 ] Writing partition BPF with sc7entry-firmware.bin.encrypt
[   9.9347 ] [................................................] 100%
[   9.9529 ] Writing partition NVC-1 with nvtboot.bin.encrypt
[  10.0024 ] [................................................] 100%
[  10.0324 ] Writing partition TBC-1 with nvtboot_cpu.bin.encrypt
[  10.0966 ] [................................................] 100%
[  10.1220 ] Writing partition RP1-1 with kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[  10.1833 ] [................................................] 100%
[  10.2206 ] Writing partition EBT-1 with cboot.bin.encrypt
[  10.2855 ] [................................................] 100%
[  10.3359 ] Writing partition WB0-1 with warmboot.bin.encrypt
[  10.4094 ] [................................................] 100%
[  10.4323 ] Writing partition BPF-1 with sc7entry-firmware.bin.encrypt
[  10.4938 ] [................................................] 100%
[  10.5191 ] Writing partition VER_b with emmc_bootblob_ver.txt
[  10.5810 ] [................................................] 100%
[  10.6006 ] Writing partition VER with emmc_bootblob_ver.txt
[  10.6550 ] [................................................] 100%
[  10.6749 ] Writing partition APP with system.img
[  10.7260 ] [................................................] 100%
[ 293.2138 ] Writing partition DTB with kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[ 294.1456 ] [................................................] 100%
[ 294.1730 ] Writing partition TOS with tos-mon-only.img.encrypt
[ 294.2145 ] [................................................] 100%
[ 294.2313 ] Warning: EKS partition magic header mismatch!
[ 294.2686 ] Writing partition EKS with eks.img
[ 294.2687 ] [................................................] 100%
[ 294.2819 ] Writing partition LNX with boot.img.encrypt
[ 294.3178 ] [................................................] 100%
[ 294.3592 ] Writing partition DTB-1 with kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[ 294.4098 ] [................................................] 100%
[ 294.4367 ] Writing partition TOS-1 with tos-mon-only.img.encrypt
[ 294.4803 ] [................................................] 100%
[ 294.4967 ] Writing partition EKS-1 with eks.img
[ 294.5334 ] [................................................] 100%
[ 294.5458 ] Writing partition LNX-1 with boot.img.encrypt
[ 294.5829 ] [................................................] 100%
[ 294.6364 ] Writing partition BMP with bmp.blob
[ 294.6817 ] [................................................] 100%
[ 294.7242 ] Writing partition RP4 with rp4.blob
[ 294.7642 ] [................................................] 100%
[ 294.8337 ] 
[ 294.8358 ] tegradevflash --write BCT P3448_A00_lpddr4_204Mhz_P987.bct
[ 294.8366 ] Cboot version 00.01.0000
[ 294.8675 ] Writing partition BCT with P3448_A00_lpddr4_204Mhz_P987.bct
[ 294.8678 ] [................................................] 100%
[ 295.2693 ] 
[ 295.2693 ] Flashing completed

[ 295.2694 ] Coldbooting the device
[ 295.2721 ] tegradevflash --reboot coldboot
[ 295.2735 ] Cboot version 00.01.0000
[ 295.3104 ] 
*** The target t210ref has been flashed successfully. ***
Reset the board to boot from internal eMMC.

Attached is the log information obtained through the serial console after the flash has finished.
[com COM53] (2025-01-15_162649) COM53 (USB Serial Port (COM53)).log (29.7 KB)

How to solve this problem? The same problem has occurred to 21pcs in our batch.

apply PCN overlay in the rel-32.7.5 l4t archive page.

Can this issue be resolved in L4T version 32.7.6? End customers want to go straight to the latest version.

The batches known so far are:699-13448-0002-402

Is that what it means?

cd Linux_for_Tegra
tar xpf overlay_32.7.5_PCN211181.tbz2

or

cd Linux_for_Tegra/..
tar xpf overlay_32.7.5_PCN211181.tbz2

It looks a little different from the previous overlay package.

This package can solve the problem of not being able to boot in version 32.7.5, but our client wants to use the latest version 32.7.6, is there any overlay package for 32,7,6?

這包package所有的東西都是open source的. 你想放在那一板都可以

像这样么:

mkdir workspace && cd workspace
wget  https://developer.nvidia.com/downloads/embedded/l4t/r32_release_v7.6/t210/jetson-210_linux_r32.7.6_aarch64.tbz2
wget https://developer.nvidia.com/downloads/embedded/l4t/r32_release_v7.6/t210/tegra_linux_sample-root-filesystem_r32.7.6_aarch64.tbz2
wget https://developer.nvidia.com/downloads/embedded/L4T/r32_Release_v7.5/overlay_32.7.5_PCN211181.tbz2
tar -xf jetson-210_linux_r32.7.6_aarch64.tbz2
sudo tar -xpf tegra_linux_sample-root-filesystem_r32.7.6_aarch64.tbz2 -C Linux_for_Tegra/rootfs/
sudo tar -xpf overlay_32.7.5_PCN211181.tbz2
cd Linux_for_Tegra
sudo ./apply_binaries.sh
sudo ./tools/l4t_flash_prerequisites.sh 
sudo ./flash.sh jetson-nano-emmc mmcblk0p1

是的. 或是你可以自己看內容… 如同我上面說的, 這份檔案所有的東西都是open source.

1 Like

Thanks

1 Like

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.